1
0
mirror of https://github.com/systemd/systemd synced 2025-10-06 12:14:46 +02:00

Compare commits

..

No commits in common. "6b1ed5e7e68fc5992a7bdabe4a05a7a3e1e1d898" and "798c65cf1f4cc9d58969e1ed33708e24ff890b66" have entirely different histories.

4 changed files with 4 additions and 13 deletions

11
TODO
View File

@ -22,17 +22,6 @@ Janitorial Clean-ups:
Features: Features:
* maybe add a tool that displays most recent journal logs as QR code to scan
off screen and run it automatically on boot failures, emergency logs and
such. Use DRM APIs directly, see
https://github.com/dvdhrm/docs/blob/master/drm-howto/modeset.c for an example
for doing that.
* pass systemd-detect-virt result to generators as env var. Modifying behaviour
based on whether we are virtualized or not is a pretty common thing, hence
maybe just pass that info along for free in an env var. We cache the result
anyway, so it's basically free.
* systemd-repart: read LUKS encryption key from $CREDENTIALS_PATH * systemd-repart: read LUKS encryption key from $CREDENTIALS_PATH
* introduce /dev/disk/root/* symlinks that allow referencing partitions on the * introduce /dev/disk/root/* symlinks that allow referencing partitions on the

View File

@ -68,7 +68,7 @@ int get_block_device(const char *path, dev_t *ret) {
/* Gets the block device directly backing a file system. If the block device is encrypted, returns /* Gets the block device directly backing a file system. If the block device is encrypted, returns
* the device mapper block device. */ * the device mapper block device. */
fd = open(path, O_RDONLY|O_NOFOLLOW|O_CLOEXEC); fd = open(path, O_NOFOLLOW|O_CLOEXEC);
if (fd < 0) if (fd < 0)
return -errno; return -errno;

View File

@ -389,7 +389,7 @@ static int netdev_ip6tnl_fill_message_create(NetDev *netdev, Link *link, sd_netl
if (t->allow_localremote >= 0) if (t->allow_localremote >= 0)
SET_FLAG(t->flags, IP6_TNL_F_ALLOW_LOCAL_REMOTE, t->allow_localremote); SET_FLAG(t->flags, IP6_TNL_F_ALLOW_LOCAL_REMOTE, t->allow_localremote);
if (t->encap_limit != 0) { if (t->encap_limit != IPV6_DEFAULT_TNL_ENCAP_LIMIT) {
r = sd_netlink_message_append_u8(m, IFLA_IPTUN_ENCAP_LIMIT, t->encap_limit); r = sd_netlink_message_append_u8(m, IFLA_IPTUN_ENCAP_LIMIT, t->encap_limit);
if (r < 0) if (r < 0)
return log_netdev_error_errno(netdev, r, "Could not append IFLA_IPTUN_ENCAP_LIMIT attribute: %m"); return log_netdev_error_errno(netdev, r, "Could not append IFLA_IPTUN_ENCAP_LIMIT attribute: %m");

View File

@ -2994,6 +2994,8 @@ static int partition_acquire_label(Context *context, Partition *p, char **ret) {
break; break;
label = mfree(label); label = mfree(label);
if (asprintf(&label, "%s-%u", prefix, ++k) < 0) if (asprintf(&label, "%s-%u", prefix, ++k) < 0)
return log_oom(); return log_oom();
} }