systemd.git
5 years agoMerge version 245.5-3+rpi1 and 245.6-1 to produce 245.6-1+rpi1 archive/raspbian/245.6-1+rpi1 raspbian/245.6-1+rpi1
Raspbian automatic forward porter [Thu, 11 Jun 2020 05:15:06 +0000 (06:15 +0100)]
Merge version 245.5-3+rpi1 and 245.6-1 to produce 245.6-1+rpi1

5 years agoMerge systemd (245.6-1) import into refs/heads/workingbranch
Michael Biebl [Sun, 7 Jun 2020 22:56:37 +0000 (23:56 +0100)]
Merge systemd (245.6-1) import into refs/heads/workingbranch

5 years agoRevert "job: Don't mark as redundant if deps are relevant"
Michael Biebl [Thu, 12 Mar 2020 12:37:08 +0000 (13:37 +0100)]
Revert "job: Don't mark as redundant if deps are relevant"

This reverts commit 097537f07a2fab3cb73aef7bc59f2a66aa93f533.

See https://github.com/systemd/systemd/issues/15091

Closes: #953670
Gbp-Pq: Topic debian
Gbp-Pq: Name Revert-job-Don-t-mark-as-redundant-if-deps-are-relevant.patch

5 years agoudev: drop SystemCallArchitectures=native from systemd-udevd.service
Michael Biebl [Tue, 19 Nov 2019 08:10:23 +0000 (09:10 +0100)]
udev: drop SystemCallArchitectures=native from systemd-udevd.service

We can't really control what helper programs are run from other udev
rules. E.g. running i386 binaries under amd64 is a valid use case and
should not trigger a SIGSYS failure.

Closes: #869719
Gbp-Pq: Topic debian
Gbp-Pq: Name udev-drop-SystemCallArchitectures-native-from-systemd-ude.patch

5 years agoblacklist-upstream-test-24-ppc64el
Dan Streetman [Wed, 6 Nov 2019 14:14:54 +0000 (09:14 -0500)]
blacklist-upstream-test-24-ppc64el

Bug: https://github.com/systemd/systemd/issues/11612

Gbp-Pq: Topic debian
Gbp-Pq: Name blacklist-upstream-test-24-ppc64el.patch

5 years agoblacklist-upstream-test-25
Dan Streetman [Wed, 6 Nov 2019 14:14:50 +0000 (09:14 -0500)]
blacklist-upstream-test-25

Bug: https://github.com/systemd/systemd/issues/13973

Gbp-Pq: Topic debian
Gbp-Pq: Name blacklist-upstream-test-25.patch

5 years agoDrop seccomp system call filter for udev
Michael Biebl [Wed, 18 Jul 2018 21:49:16 +0000 (23:49 +0200)]
Drop seccomp system call filter for udev

The seccomp based system call whitelist requires at least systemd 239 to
be the active init and during a dist-upgrade we can't guarantee that
systemd has been fully configured before udev is restarted.

This partially reverts upstream commit
ee8f26180d01e3ddd4e5f20b03b81e5e737657ae.

Once buster is released, this patch can be dropped.

Closes: #903224
Gbp-Pq: Topic debian
Gbp-Pq: Name Drop-seccomp-system-call-filter-for-udev.patch

5 years agoAdd env variable for machine ID path
Martin Pitt [Wed, 18 Jan 2017 10:21:35 +0000 (11:21 +0100)]
Add env variable for machine ID path

During package build, in minimal chroots, or other systems which do not already
have an /etc/machine-id we get six test failures. Introduce a
$SYSTEMD_MACHINE_ID_PATH environment variable which can specify a location
other than /etc/machine-id, so that the unit tests are independent from the
environment.

Also adjust test-fs-util to not assume that /etc/machine-id exists. Use
/etc/passwd instead which is created by base-files.

Closes: #851445
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=62344

Gbp-Pq: Topic debian
Gbp-Pq: Name Add-env-variable-for-machine-ID-path.patch

5 years agoLet graphical-session-pre.target be manually started
Iain Lane [Mon, 22 Aug 2016 05:03:27 +0000 (07:03 +0200)]
Let graphical-session-pre.target be manually started

This is needed until https://github.com/systemd/systemd/issues/3750 is fixed.

Forwarded: not-needed
Bug-Ubuntu: https://launchpad.net/bugs/1615341

Gbp-Pq: Topic debian
Gbp-Pq: Name Let-graphical-session-pre.target-be-manually-started.patch

5 years agoRevert "core: enable TasksMax= for all services by default, and set it to 512"
Martin Pitt [Mon, 9 May 2016 19:24:38 +0000 (21:24 +0200)]
Revert "core: enable TasksMax= for all services by default, and set it to 512"

This reverts commit 9ded9cd14cc03c67291b10a5c42ce5094ba0912f.

Introducing a default limit on number of threads broke a lot of software which
regularly needs more, such as MySQL and RabbitMQ, or services that spawn off an
indefinite number of subtasks that are not in a scope, like LXC or cron.

15% is way too much for most "simple" services, and it's too little for others
such as the ones mentioned above. There is also no particular rationale about
any particular global limit, so even if we'd bump it higher we'd just make the
limit even less useful while still breaking software.

It is both much safer and also much more effective in terms of guarding against
berserk programs/bugs/unintended fork bombs etc. to set limits in units
individually. Once someone looks at one, this is then a great time to also flip
on the other resource and privilege limitations that systemd offers.

Bug: https://github.com/systemd/systemd/issues/3211
Bug-Debian: https://bugs.debian.org/823530
Bug-Ubuntu: https://launchpad.net/bugs/1578080

Gbp-Pq: Topic debian
Gbp-Pq: Name Revert-core-enable-TasksMax-for-all-services-by-default-a.patch

5 years agoRevert "core: set RLIMIT_CORE to unlimited by default"
Martin Pitt [Sat, 27 Feb 2016 11:27:06 +0000 (12:27 +0100)]
Revert "core: set RLIMIT_CORE to unlimited by default"

Partially revert commit 15a900327ab as this completely breaks core dumps
without systemd-coredump. It's also contradicting core(8), and it's not
systemd's place to redefine the kernel definitions of core files.

Commit bdfd7b2c now honours the process' RLIMIT_CORE for systemd-coredump. This
isn't what RLIMIT_CORE is supposed to do (it limits the size of the core
*file*, but the kernel deliberately ignores it for piping), so set a static
2^63 core size limit for systemd-coredump to go back to the previous behaviour
(otherwise the change above would break systemd-coredump).

Bug-Debian: https://bugs.debian.org/815020

Gbp-Pq: Topic debian
Gbp-Pq: Name Revert-core-set-RLIMIT_CORE-to-unlimited-by-default.patch

5 years agoRevert "core: one step back again, for nspawn we actually can't wait for cgroups...
Martin Pitt [Mon, 27 Apr 2015 13:29:13 +0000 (15:29 +0200)]
Revert "core: one step back again, for nspawn we actually can't wait for cgroups running empty since systemd will get exactly zero notifications about it"

This reverts commit 743970d2ea6d08aa7c7bff8220f6b7702f2b1db7.

Bug-Debian: https://bugs.debian.org/784720
Bug-Ubuntu: https://launchpad.net/bugs/1448259
Bug-Fedora: https://bugzilla.redhat.com/show_bug.cgi?id=1141137

Gbp-Pq: Topic debian
Gbp-Pq: Name Revert-core-one-step-back-again-for-nspawn-we-actual.patch

5 years agoSkip filesystem check if already done by the initramfs
Nis Martensen [Tue, 19 Jan 2016 21:01:43 +0000 (22:01 +0100)]
Skip filesystem check if already done by the initramfs

Newer versions of initramfs-tools already fsck and mount / and /usr in
the initramfs. Skip the filesystem check in this case.

Based on a previous patch by Michael Biebl <biebl@debian.org>.

Closes: #782522
Closes: #810748
Gbp-Pq: Topic debian
Gbp-Pq: Name Skip-filesystem-check-if-already-done-by-the-initram.patch

5 years agofsckd daemon for inter-fsckd communication
Didier Roche [Fri, 22 May 2015 11:04:38 +0000 (13:04 +0200)]
fsckd daemon for inter-fsckd communication

Global logic:
Add systemd-fsckd multiplexer which accepts multiple (via systemd-fsck's
/run/systemd/fsck.progress socket) fsck instances to connect to it and sends
progress report. systemd-fsckd then computes and writes to /dev/console the
number of devices currently being checked and the minimum fsck progress.

Plymouth and user interaction:
Forward the progress to plymouth and support canellation of in progress fsck.
Try to connect and send to plymouth (if running) some checked report progress,
using direct plymouth protocole.

Update message is the following:
fsckd:<num_devices>:<progress>:<string>
* num_devices corresponds to the current number of devices being checked (int)
* progress corresponds to the current minimum percentage of all devices being
  checked (float, from 0 to 100)
* string is a translated message ready to be displayed by the plymouth theme
  displaying the information above. It can be overridden by plymouth themes
  supporting i18n.

Grab in fsckd plymouth watch key Control+C, and propagate this cancel request
to systemd-fsck which will terminate fsck.

Send a message to signal to user what key we are grabbing for fsck cancel.

Message is: fsckd-cancel-msg:<string>
Where string is a translated string ready to be displayed by the plymouth theme
indicating that Control+C can be used to cancel current checks. It can be
overridden (matching only fsckd-cancel-msg prefix) for themes supporting i18n.

Misc:
systemd-fsckd stops on idle when no fsck is connected.
Add man page explaining the plymouth theme protocol, usage of the daemon
as well as the socket activation part. Adapt existing fsck man page.

Note that fsckd had lived in the upstream tree for a while, but was removed.
More information at
http://lists.freedesktop.org/archives/systemd-devel/2015-April/030175.html
-

Gbp-Pq: Topic debian
Gbp-Pq: Name fsckd-daemon-for-inter-fsckd-communication.patch

5 years agoOnly start logind if dbus is installed
Martin Pitt [Mon, 9 Feb 2015 09:53:43 +0000 (10:53 +0100)]
Only start logind if dbus is installed

logind fails to start in environments without dbus, such as LXC containers or
servers. Add a startup condition to avoid the very noisy startup failure.

Part of #772700

Gbp-Pq: Topic debian
Gbp-Pq: Name Only-start-logind-if-dbus-is-installed.patch

5 years agoDon't enable audit by default
Martin Pitt [Sun, 28 Dec 2014 11:49:35 +0000 (12:49 +0100)]
Don't enable audit by default

It causes flooding of dmesg and syslog, suppressing actually important
messages.

Don't enable it for now, until a better solution is found:
http://lists.freedesktop.org/archives/systemd-devel/2014-December/026591.html

Bug-Debian: https://bugs.debian.org/773528

Gbp-Pq: Topic debian
Gbp-Pq: Name Don-t-enable-audit-by-default.patch

5 years agoRe-enable journal forwarding to syslog
Martin Pitt [Fri, 28 Nov 2014 13:43:25 +0000 (14:43 +0100)]
Re-enable journal forwarding to syslog

Revert upstream commit 46b131574fdd7d77 for now, until Debian's sysloggers
can/do all read from the journal directly. See

  http://lists.freedesktop.org/archives/systemd-devel/2014-November/025550.html

for details. Once we grow a journal.conf.d/ directory, sysloggers can be moved
to pulling from the journal one by one and disable forwarding again in such a
conf.d snippet.

Gbp-Pq: Topic debian
Gbp-Pq: Name Re-enable-journal-forwarding-to-syslog.patch

5 years agoAdd support for TuxOnIce hibernation
Julien Muchembled [Tue, 29 Apr 2014 09:40:50 +0000 (11:40 +0200)]
Add support for TuxOnIce hibernation

systemd does not support non-mainline kernel features so upstream rejected this
patch.
It is however required for systemd integration by tuxonice-userui package.

Forwarded: http://lists.freedesktop.org/archives/systemd-devel/2014-April/018960.html

Gbp-Pq: Topic debian
Gbp-Pq: Name Add-support-for-TuxOnIce-hibernation.patch

5 years agoMake /run/lock tmpfs an API fs
Michael Biebl [Thu, 4 Sep 2014 23:15:16 +0000 (01:15 +0200)]
Make /run/lock tmpfs an API fs

The /run/lock directory is world-writable in Debian due to historic
reasons. To avoid user processes filling up /run, we mount a separate
tmpfs for /run/lock. As this directory needs to be available during
early boot, we make it an API fs.

Drop it from tmpfiles.d/legacy.conf to not clobber the permissions.

Closes: #751392
Gbp-Pq: Topic debian
Gbp-Pq: Name Make-run-lock-tmpfs-an-API-fs.patch

5 years agoBring tmpfiles.d/tmp.conf in line with Debian defaults
Tollef Fog Heen [Tue, 5 Jun 2012 18:59:36 +0000 (20:59 +0200)]
Bring tmpfiles.d/tmp.conf in line with Debian defaults

Closes: #675422
Gbp-Pq: Topic debian
Gbp-Pq: Name Bring-tmpfiles.d-tmp.conf-in-line-with-Debian-defaul.patch

5 years agoUse Debian specific config files
Michael Biebl [Thu, 18 Jul 2013 18:11:02 +0000 (20:11 +0200)]
Use Debian specific config files

Use /etc/default/locale instead of /etc/locale.conf for locale settings.

Use /etc/default/keyboard instead of /etc/X11/xorg.conf.d/00-keyboard.conf for
keyboard configuration.

Read/write /etc/timezone if /etc/localtime does not exist.

Gbp-Pq: Topic debian
Gbp-Pq: Name Use-Debian-specific-config-files.patch

5 years agocore: make sure to restore the control command id, too
Lennart Poettering [Wed, 22 Apr 2020 18:34:02 +0000 (20:34 +0200)]
core: make sure to restore the control command id, too

Fixes: #15356
(cherry picked from commit e9da62b18af647bfa73807e1c7fc3bfa4bb4b2ac)

Gbp-Pq: Name core-make-sure-to-restore-the-control-command-id-too.patch

5 years agonss-systemd: don't synthesize root/nobody when iterating
Lennart Poettering [Thu, 23 Apr 2020 07:55:06 +0000 (09:55 +0200)]
nss-systemd: don't synthesize root/nobody when iterating

Fixes: #15160
Gbp-Pq: Name nss-systemd-don-t-synthesize-root-nobody-when-iterating.patch

5 years agonss-systemd: use _cleanup_ for pthread_mutex_{lock,unlock}
Zbigniew Jędrzejewski-Szmek [Sat, 28 Mar 2020 12:26:25 +0000 (13:26 +0100)]
nss-systemd: use _cleanup_ for pthread_mutex_{lock,unlock}

v2: separate the declaration from the assignment to appease clang.
(cherry picked from commit 37bc9dcc0988fe81b2d98ad0686dd33df2271c2f)

Gbp-Pq: Name nss-systemd-use-_cleanup_-for-pthread_mutex_-lock-unlock.patch

5 years agobasic: add _cleanup_ wrappers for pthread_mutex_{lock,unlock}
Zbigniew Jędrzejewski-Szmek [Sat, 28 Mar 2020 12:24:44 +0000 (13:24 +0100)]
basic: add _cleanup_ wrappers for pthread_mutex_{lock,unlock}

I put the helper functions in a separate header file, because they don't fit
anywhere else. pthread_mutex_{lock,unlock} is used in two places: nss-systemd
and hashmap. I don't indent to convert hashmap to use the helpers, because
there it'd make the code more complicated. Is it worth to create a new header
file even if the only use is in nss-systemd.c? I think yes, because it feels
clean and also I think it's likely that pthread_mutex_{lock,unlock} will be
used in other places later.

(cherry picked from commit 29d4392ca05a31db53176f552041bb6183351d63)

Gbp-Pq: Name basic-add-_cleanup_-wrappers-for-pthread_mutex_-lock-unlo.patch

5 years agologind: avoid shadow lookups when doing userdb client side
Lennart Poettering [Thu, 9 Apr 2020 12:28:56 +0000 (14:28 +0200)]
logind: avoid shadow lookups when doing userdb client side

Let's not trigger MACs needlessly.

Ideally everybody would turn on userdb, but if people insist in not
doing so, then let's not attempt to open shadow.

It's a bit ugly to implement this, since shadow information is more than
just passwords (but accound validity metadata), and thus userdb's own
"privieleged" scheme is orthogonal to this, but let's still do this for
the client side.

Fixes: #15105
(cherry picked from commit b062ca616c778358d4da008a2950615fac74aa24)

Gbp-Pq: Name logind-avoid-shadow-lookups-when-doing-userdb-client-side.patch

5 years agouserdb: when doing client-side NSS look-ups optionally avoid shadow look-ups
Lennart Poettering [Thu, 9 Apr 2020 12:28:34 +0000 (14:28 +0200)]
userdb: when doing client-side NSS look-ups optionally avoid shadow look-ups

Gbp-Pq: Name userdb-when-doing-client-side-NSS-look-ups-optionally-avo.patch

5 years agotest: verify RoutesToDNS= is independent of UseGateway=
Dan Streetman [Wed, 15 Apr 2020 22:30:33 +0000 (18:30 -0400)]
test: verify RoutesToDNS= is independent of UseGateway=

(cherry picked from commit 06c2b0c76bf7e2756f8e9ef18765c85dee99ae14)

Gbp-Pq: Name test-verify-RoutesToDNS-is-independent-of-UseGateway.patch

5 years agonetwork: honor SetDNSRoutes= even if UseGateway=False
Dan Streetman [Wed, 15 Apr 2020 22:05:14 +0000 (18:05 -0400)]
network: honor SetDNSRoutes= even if UseGateway=False

(cherry picked from commit 244490f5e0a98f83190e92033fbdaa1bbcd9b000)

Gbp-Pq: Name network-honor-SetDNSRoutes-even-if-UseGateway-False.patch

5 years agotest: modify/add tests for UseRoutes= and UseGateway= configuration
Dan Streetman [Wed, 15 Apr 2020 20:26:20 +0000 (16:26 -0400)]
test: modify/add tests for UseRoutes= and UseGateway= configuration

The last commit changed the UseGateway= default to the value of UseRoutes=
so the tests need to check for all combinations of the two parameters.

(cherry picked from commit 7c0d36ff5fc31d00e26661fd2ad45291ed0eb6f7)

Gbp-Pq: Name test-modify-add-tests-for-UseRoutes-and-UseGateway-config.patch

5 years agonetwork: change UseGateway= default to UseRoutes= setting
Dan Streetman [Wed, 15 Apr 2020 18:40:21 +0000 (14:40 -0400)]
network: change UseGateway= default to UseRoutes= setting

Anyone previously using the UseRoutes=false parameter expected their
dhcp4-provided gateway route to be ignored, as well.  However, with
the introduction of the UseGateway= parameter, this is no longer true.

In order to keep backwards compatibility, this sets the UseGateway=
default value to whatever UseRoutes= has been set to.

(cherry picked from commit 589397a27759bd650b3674029cb0ef73347c913b)

Gbp-Pq: Name network-change-UseGateway-default-to-UseRoutes-setting.patch

5 years agotest-network: add a test case for DHCPv4.UseGateway=no
Yu Watanabe [Mon, 16 Mar 2020 10:08:36 +0000 (19:08 +0900)]
test-network: add a test case for DHCPv4.UseGateway=no

(cherry picked from commit 0d7bd445d26590aad7b05040c9d8423fcd6e5d4f)

Gbp-Pq: Name test-network-add-a-test-case-for-DHCPv4.UseGateway-no.patch

5 years agonetwork: add a flag to ignore gateway provided by DHCP server
Yu Watanabe [Mon, 16 Mar 2020 09:55:10 +0000 (18:55 +0900)]
network: add a flag to ignore gateway provided by DHCP server

Closes #15117.

(cherry picked from commit b453122789ec4c6f39e6ceb9900e0e80a6abeb99)

Gbp-Pq: Name network-add-a-flag-to-ignore-gateway-provided-by-DHCP-ser.patch

5 years agounits: make sure systemd-pstore stops at shutdown
Lennart Poettering [Wed, 8 Apr 2020 14:25:03 +0000 (16:25 +0200)]
units: make sure systemd-pstore stops at shutdown

This doesn't matter too much given that the service doesn't do anything
on shutdown, but let's still stop it to make things cleaner.

(cherry picked from commit b0c1a07654c80d3cbbbcc52f860d4206707c0b08)

Gbp-Pq: Name units-make-sure-systemd-pstore-stops-at-shutdown.patch

5 years agounits: drop systemd-remount-fs.service dependency from more services
Lennart Poettering [Wed, 8 Apr 2020 14:24:23 +0000 (16:24 +0200)]
units: drop systemd-remount-fs.service dependency from more services

All services using StateDirectory= don't need the explicit dep anymore,
let's hence drop it everywhere.

(cherry picked from commit e0f968ad96e9a6340edced8e22089c802c2f6497)

Gbp-Pq: Name units-drop-systemd-remount-fs.service-dependency-from-mor.patch

5 years agounits: drop dependency on systemd-remount-fs.service from systemd-pstore.service
Lennart Poettering [Wed, 8 Apr 2020 14:10:38 +0000 (16:10 +0200)]
units: drop dependency on systemd-remount-fs.service from systemd-pstore.service

This dependency is now generated automatically given we use
StateDirectory=. Moreover the combination of Wants= and After= was too
strong anyway, as whether remount-fs is pulled in or not should not be up
to systemd-pstore.service, and in fact is part of the initial
transaction anyway.

(cherry picked from commit 0c978faa16fa9ecf92f0bbb5c7cc709dc472d115)

Gbp-Pq: Name units-drop-dependency-on-systemd-remount-fs.service-from-.patch

5 years agocore: automatically add dependency on systemd-remount-fs.service if StateDirectory...
Lennart Poettering [Wed, 8 Apr 2020 14:08:35 +0000 (16:08 +0200)]
core: automatically add dependency on systemd-remount-fs.service if StateDirectory= is used

And similar for other settings that require a writable /var/.

Rationale: if these options are used for early-boot services (such as
systemd-pstore.service) we need /var/ writable. And if /var/ is on the
root fs, then systemd-remount-fs.service is the service that ensures
that /var/ is writable.

This allows us to remove explicit deps in services such as
systemd-pstore.service.

(cherry picked from commit f3b7a79b973a28af4f7a592a8b2e199cc194218b)

Gbp-Pq: Name core-automatically-add-dependency-on-systemd-remount-fs.s.patch

5 years agounits: pull in systemd-pstore.service from sysinit.target
Lennart Poettering [Wed, 8 Apr 2020 14:12:00 +0000 (16:12 +0200)]
units: pull in systemd-pstore.service from sysinit.target

sysinit.target is the target our early boot services are generally
pulled in from, make systemd-pstore.service not an exception of that.

Effectively this doesn't mean much, either way our unit is part of the
initial transaction.

(cherry picked from commit 167241912f51fbc0d7d0869b9af34c15b5ecc4b6)

Gbp-Pq: Name units-pull-in-systemd-pstore.service-from-sysinit.target.patch

5 years agodocs: add a longer document explaining our rules on user/group names
Lennart Poettering [Tue, 7 Apr 2020 08:38:39 +0000 (10:38 +0200)]
docs: add a longer document explaining our rules on user/group names

(cherry picked from commit cafed7b32cdac13024c4093b7942a49ee8602dcf)

Gbp-Pq: Name docs-add-a-longer-document-explaining-our-rules-on-user-g.patch

5 years agopid1: by default make user units inherit their umask from the user manager
Franck Bui [Fri, 3 Apr 2020 08:00:25 +0000 (10:00 +0200)]
pid1: by default make user units inherit their umask from the user manager

This patch changes the way user managers set the default umask for the units it
manages.

Indeed one can expect that if user manager's umask is redefined through PAM
(via /etc/login.defs or pam_umask), all its children including the units it
spawns have their umask set to the new value.

Hence make user units inherit their umask value from their parent instead of
the hard coded value 0022 but allow them to override this value via their unit
file.

Note that reexecuting managers with 'systemctl daemon-reexec' after changing
UMask= has no effect. To take effect managers need to be restarted with
'systemct restart' instead. This behavior was already present before this
patch.

Fixes #6077.

(cherry picked from commit 5e37d1930b41b24c077ce37c6db0e36c745106c7)

Gbp-Pq: Name pid1-by-default-make-user-units-inherit-their-umask-from-.patch

5 years agosystemd (245.6-1) unstable; urgency=medium
Michael Biebl [Sun, 7 Jun 2020 22:56:37 +0000 (23:56 +0100)]
systemd (245.6-1) unstable; urgency=medium

  [ Michael Biebl ]
  * New upstream version 245.6
  * Rebase patches

  [ Balint Reczey ]
  * debian/tests/boot-and-services: Handle missing fstab (LP: #1877078)

[dgit import unpatched systemd 245.6-1]

5 years agoImport systemd_245.6.orig.tar.gz
Michael Biebl [Sun, 7 Jun 2020 22:56:37 +0000 (23:56 +0100)]
Import systemd_245.6.orig.tar.gz

[dgit import orig systemd_245.6.orig.tar.gz]

5 years agoImport systemd_245.6-1.debian.tar.xz
Michael Biebl [Sun, 7 Jun 2020 22:56:37 +0000 (23:56 +0100)]
Import systemd_245.6-1.debian.tar.xz

[dgit import tarball systemd 245.6-1 systemd_245.6-1.debian.tar.xz]

5 years agoMerge version 245.5-2+rpi1 and 245.5-3 to produce 245.5-3+rpi1 archive/raspbian/245.5-3+rpi1 raspbian/245.5-3+rpi1
Raspbian automatic forward porter [Wed, 20 May 2020 04:55:20 +0000 (05:55 +0100)]
Merge version 245.5-2+rpi1 and 245.5-3 to produce 245.5-3+rpi1

5 years agoMerge systemd (245.5-3) import into refs/heads/workingbranch
Michael Biebl [Sun, 17 May 2020 17:28:49 +0000 (18:28 +0100)]
Merge systemd (245.5-3) import into refs/heads/workingbranch

5 years agoRevert "job: Don't mark as redundant if deps are relevant"
Michael Biebl [Thu, 12 Mar 2020 12:37:08 +0000 (13:37 +0100)]
Revert "job: Don't mark as redundant if deps are relevant"

This reverts commit 097537f07a2fab3cb73aef7bc59f2a66aa93f533.

See https://github.com/systemd/systemd/issues/15091

Closes: #953670
Gbp-Pq: Topic debian
Gbp-Pq: Name Revert-job-Don-t-mark-as-redundant-if-deps-are-relevant.patch

5 years agoudev: drop SystemCallArchitectures=native from systemd-udevd.service
Michael Biebl [Tue, 19 Nov 2019 08:10:23 +0000 (09:10 +0100)]
udev: drop SystemCallArchitectures=native from systemd-udevd.service

We can't really control what helper programs are run from other udev
rules. E.g. running i386 binaries under amd64 is a valid use case and
should not trigger a SIGSYS failure.

Closes: #869719
Gbp-Pq: Topic debian
Gbp-Pq: Name udev-drop-SystemCallArchitectures-native-from-systemd-ude.patch

5 years agoblacklist-upstream-test-24-ppc64el
Dan Streetman [Wed, 6 Nov 2019 14:14:54 +0000 (09:14 -0500)]
blacklist-upstream-test-24-ppc64el

Bug: https://github.com/systemd/systemd/issues/11612

Gbp-Pq: Topic debian
Gbp-Pq: Name blacklist-upstream-test-24-ppc64el.patch

5 years agoblacklist-upstream-test-25
Dan Streetman [Wed, 6 Nov 2019 14:14:50 +0000 (09:14 -0500)]
blacklist-upstream-test-25

Bug: https://github.com/systemd/systemd/issues/13973

Gbp-Pq: Topic debian
Gbp-Pq: Name blacklist-upstream-test-25.patch

5 years agoDrop seccomp system call filter for udev
Michael Biebl [Wed, 18 Jul 2018 21:49:16 +0000 (23:49 +0200)]
Drop seccomp system call filter for udev

The seccomp based system call whitelist requires at least systemd 239 to
be the active init and during a dist-upgrade we can't guarantee that
systemd has been fully configured before udev is restarted.

This partially reverts upstream commit
ee8f26180d01e3ddd4e5f20b03b81e5e737657ae.

Once buster is released, this patch can be dropped.

Closes: #903224
Gbp-Pq: Topic debian
Gbp-Pq: Name Drop-seccomp-system-call-filter-for-udev.patch

5 years agoAdd env variable for machine ID path
Martin Pitt [Wed, 18 Jan 2017 10:21:35 +0000 (11:21 +0100)]
Add env variable for machine ID path

During package build, in minimal chroots, or other systems which do not already
have an /etc/machine-id we get six test failures. Introduce a
$SYSTEMD_MACHINE_ID_PATH environment variable which can specify a location
other than /etc/machine-id, so that the unit tests are independent from the
environment.

Also adjust test-fs-util to not assume that /etc/machine-id exists. Use
/etc/passwd instead which is created by base-files.

Closes: #851445
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=62344

Gbp-Pq: Topic debian
Gbp-Pq: Name Add-env-variable-for-machine-ID-path.patch

5 years agoLet graphical-session-pre.target be manually started
Iain Lane [Mon, 22 Aug 2016 05:03:27 +0000 (07:03 +0200)]
Let graphical-session-pre.target be manually started

This is needed until https://github.com/systemd/systemd/issues/3750 is fixed.

Forwarded: not-needed
Bug-Ubuntu: https://launchpad.net/bugs/1615341

Gbp-Pq: Topic debian
Gbp-Pq: Name Let-graphical-session-pre.target-be-manually-started.patch

5 years agoRevert "core: enable TasksMax= for all services by default, and set it to 512"
Martin Pitt [Mon, 9 May 2016 19:24:38 +0000 (21:24 +0200)]
Revert "core: enable TasksMax= for all services by default, and set it to 512"

This reverts commit 9ded9cd14cc03c67291b10a5c42ce5094ba0912f.

Introducing a default limit on number of threads broke a lot of software which
regularly needs more, such as MySQL and RabbitMQ, or services that spawn off an
indefinite number of subtasks that are not in a scope, like LXC or cron.

15% is way too much for most "simple" services, and it's too little for others
such as the ones mentioned above. There is also no particular rationale about
any particular global limit, so even if we'd bump it higher we'd just make the
limit even less useful while still breaking software.

It is both much safer and also much more effective in terms of guarding against
berserk programs/bugs/unintended fork bombs etc. to set limits in units
individually. Once someone looks at one, this is then a great time to also flip
on the other resource and privilege limitations that systemd offers.

Bug: https://github.com/systemd/systemd/issues/3211
Bug-Debian: https://bugs.debian.org/823530
Bug-Ubuntu: https://launchpad.net/bugs/1578080

Gbp-Pq: Topic debian
Gbp-Pq: Name Revert-core-enable-TasksMax-for-all-services-by-default-a.patch

5 years agoRevert "core: set RLIMIT_CORE to unlimited by default"
Martin Pitt [Sat, 27 Feb 2016 11:27:06 +0000 (12:27 +0100)]
Revert "core: set RLIMIT_CORE to unlimited by default"

Partially revert commit 15a900327ab as this completely breaks core dumps
without systemd-coredump. It's also contradicting core(8), and it's not
systemd's place to redefine the kernel definitions of core files.

Commit bdfd7b2c now honours the process' RLIMIT_CORE for systemd-coredump. This
isn't what RLIMIT_CORE is supposed to do (it limits the size of the core
*file*, but the kernel deliberately ignores it for piping), so set a static
2^63 core size limit for systemd-coredump to go back to the previous behaviour
(otherwise the change above would break systemd-coredump).

Bug-Debian: https://bugs.debian.org/815020

Gbp-Pq: Topic debian
Gbp-Pq: Name Revert-core-set-RLIMIT_CORE-to-unlimited-by-default.patch

5 years agoRevert "core: one step back again, for nspawn we actually can't wait for cgroups...
Martin Pitt [Mon, 27 Apr 2015 13:29:13 +0000 (15:29 +0200)]
Revert "core: one step back again, for nspawn we actually can't wait for cgroups running empty since systemd will get exactly zero notifications about it"

This reverts commit 743970d2ea6d08aa7c7bff8220f6b7702f2b1db7.

Bug-Debian: https://bugs.debian.org/784720
Bug-Ubuntu: https://launchpad.net/bugs/1448259
Bug-Fedora: https://bugzilla.redhat.com/show_bug.cgi?id=1141137

Gbp-Pq: Topic debian
Gbp-Pq: Name Revert-core-one-step-back-again-for-nspawn-we-actual.patch

5 years agoSkip filesystem check if already done by the initramfs
Nis Martensen [Tue, 19 Jan 2016 21:01:43 +0000 (22:01 +0100)]
Skip filesystem check if already done by the initramfs

Newer versions of initramfs-tools already fsck and mount / and /usr in
the initramfs. Skip the filesystem check in this case.

Based on a previous patch by Michael Biebl <biebl@debian.org>.

Closes: #782522
Closes: #810748
Gbp-Pq: Topic debian
Gbp-Pq: Name Skip-filesystem-check-if-already-done-by-the-initram.patch

5 years agofsckd daemon for inter-fsckd communication
Didier Roche [Fri, 22 May 2015 11:04:38 +0000 (13:04 +0200)]
fsckd daemon for inter-fsckd communication

Global logic:
Add systemd-fsckd multiplexer which accepts multiple (via systemd-fsck's
/run/systemd/fsck.progress socket) fsck instances to connect to it and sends
progress report. systemd-fsckd then computes and writes to /dev/console the
number of devices currently being checked and the minimum fsck progress.

Plymouth and user interaction:
Forward the progress to plymouth and support canellation of in progress fsck.
Try to connect and send to plymouth (if running) some checked report progress,
using direct plymouth protocole.

Update message is the following:
fsckd:<num_devices>:<progress>:<string>
* num_devices corresponds to the current number of devices being checked (int)
* progress corresponds to the current minimum percentage of all devices being
  checked (float, from 0 to 100)
* string is a translated message ready to be displayed by the plymouth theme
  displaying the information above. It can be overridden by plymouth themes
  supporting i18n.

Grab in fsckd plymouth watch key Control+C, and propagate this cancel request
to systemd-fsck which will terminate fsck.

Send a message to signal to user what key we are grabbing for fsck cancel.

Message is: fsckd-cancel-msg:<string>
Where string is a translated string ready to be displayed by the plymouth theme
indicating that Control+C can be used to cancel current checks. It can be
overridden (matching only fsckd-cancel-msg prefix) for themes supporting i18n.

Misc:
systemd-fsckd stops on idle when no fsck is connected.
Add man page explaining the plymouth theme protocol, usage of the daemon
as well as the socket activation part. Adapt existing fsck man page.

Note that fsckd had lived in the upstream tree for a while, but was removed.
More information at
http://lists.freedesktop.org/archives/systemd-devel/2015-April/030175.html
-

Gbp-Pq: Topic debian
Gbp-Pq: Name fsckd-daemon-for-inter-fsckd-communication.patch

5 years agoOnly start logind if dbus is installed
Martin Pitt [Mon, 9 Feb 2015 09:53:43 +0000 (10:53 +0100)]
Only start logind if dbus is installed

logind fails to start in environments without dbus, such as LXC containers or
servers. Add a startup condition to avoid the very noisy startup failure.

Part of #772700

Gbp-Pq: Topic debian
Gbp-Pq: Name Only-start-logind-if-dbus-is-installed.patch

5 years agoDon't enable audit by default
Martin Pitt [Sun, 28 Dec 2014 11:49:35 +0000 (12:49 +0100)]
Don't enable audit by default

It causes flooding of dmesg and syslog, suppressing actually important
messages.

Don't enable it for now, until a better solution is found:
http://lists.freedesktop.org/archives/systemd-devel/2014-December/026591.html

Bug-Debian: https://bugs.debian.org/773528

Gbp-Pq: Topic debian
Gbp-Pq: Name Don-t-enable-audit-by-default.patch

5 years agoRe-enable journal forwarding to syslog
Martin Pitt [Fri, 28 Nov 2014 13:43:25 +0000 (14:43 +0100)]
Re-enable journal forwarding to syslog

Revert upstream commit 46b131574fdd7d77 for now, until Debian's sysloggers
can/do all read from the journal directly. See

  http://lists.freedesktop.org/archives/systemd-devel/2014-November/025550.html

for details. Once we grow a journal.conf.d/ directory, sysloggers can be moved
to pulling from the journal one by one and disable forwarding again in such a
conf.d snippet.

Gbp-Pq: Topic debian
Gbp-Pq: Name Re-enable-journal-forwarding-to-syslog.patch

5 years agoAdd support for TuxOnIce hibernation
Julien Muchembled [Tue, 29 Apr 2014 09:40:50 +0000 (11:40 +0200)]
Add support for TuxOnIce hibernation

systemd does not support non-mainline kernel features so upstream rejected this
patch.
It is however required for systemd integration by tuxonice-userui package.

Forwarded: http://lists.freedesktop.org/archives/systemd-devel/2014-April/018960.html

Gbp-Pq: Topic debian
Gbp-Pq: Name Add-support-for-TuxOnIce-hibernation.patch

5 years agoMake /run/lock tmpfs an API fs
Michael Biebl [Thu, 4 Sep 2014 23:15:16 +0000 (01:15 +0200)]
Make /run/lock tmpfs an API fs

The /run/lock directory is world-writable in Debian due to historic
reasons. To avoid user processes filling up /run, we mount a separate
tmpfs for /run/lock. As this directory needs to be available during
early boot, we make it an API fs.

Drop it from tmpfiles.d/legacy.conf to not clobber the permissions.

Closes: #751392
Gbp-Pq: Topic debian
Gbp-Pq: Name Make-run-lock-tmpfs-an-API-fs.patch

5 years agoBring tmpfiles.d/tmp.conf in line with Debian defaults
Tollef Fog Heen [Tue, 5 Jun 2012 18:59:36 +0000 (20:59 +0200)]
Bring tmpfiles.d/tmp.conf in line with Debian defaults

Closes: #675422
Gbp-Pq: Topic debian
Gbp-Pq: Name Bring-tmpfiles.d-tmp.conf-in-line-with-Debian-defaul.patch

5 years agoUse Debian specific config files
Michael Biebl [Thu, 18 Jul 2013 18:11:02 +0000 (20:11 +0200)]
Use Debian specific config files

Use /etc/default/locale instead of /etc/locale.conf for locale settings.

Use /etc/default/keyboard instead of /etc/X11/xorg.conf.d/00-keyboard.conf for
keyboard configuration.

Read/write /etc/timezone if /etc/localtime does not exist.

Gbp-Pq: Topic debian
Gbp-Pq: Name Use-Debian-specific-config-files.patch

5 years agocore: make sure to restore the control command id, too
Lennart Poettering [Wed, 22 Apr 2020 18:34:02 +0000 (20:34 +0200)]
core: make sure to restore the control command id, too

Fixes: #15356
(cherry picked from commit e9da62b18af647bfa73807e1c7fc3bfa4bb4b2ac)

Gbp-Pq: Name core-make-sure-to-restore-the-control-command-id-too.patch

5 years agocore: make sure we don't get confused when setting TERM for a tty fd
Lennart Poettering [Wed, 22 Apr 2020 19:52:22 +0000 (21:52 +0200)]
core: make sure we don't get confused when setting TERM for a tty fd

Fixes: #15344
(cherry picked from commit e8cf09b2a2ad0d48e5493050d54251d5f512d9b6)

Gbp-Pq: Name core-make-sure-we-don-t-get-confused-when-setting-TERM-fo.patch

5 years agonss-systemd: don't synthesize root/nobody when iterating
Lennart Poettering [Thu, 23 Apr 2020 07:55:06 +0000 (09:55 +0200)]
nss-systemd: don't synthesize root/nobody when iterating

Fixes: #15160
Gbp-Pq: Name nss-systemd-don-t-synthesize-root-nobody-when-iterating.patch

5 years agonss-systemd: use _cleanup_ for pthread_mutex_{lock,unlock}
Zbigniew Jędrzejewski-Szmek [Sat, 28 Mar 2020 12:26:25 +0000 (13:26 +0100)]
nss-systemd: use _cleanup_ for pthread_mutex_{lock,unlock}

v2: separate the declaration from the assignment to appease clang.
(cherry picked from commit 37bc9dcc0988fe81b2d98ad0686dd33df2271c2f)

Gbp-Pq: Name nss-systemd-use-_cleanup_-for-pthread_mutex_-lock-unlock.patch

5 years agobasic: add _cleanup_ wrappers for pthread_mutex_{lock,unlock}
Zbigniew Jędrzejewski-Szmek [Sat, 28 Mar 2020 12:24:44 +0000 (13:24 +0100)]
basic: add _cleanup_ wrappers for pthread_mutex_{lock,unlock}

I put the helper functions in a separate header file, because they don't fit
anywhere else. pthread_mutex_{lock,unlock} is used in two places: nss-systemd
and hashmap. I don't indent to convert hashmap to use the helpers, because
there it'd make the code more complicated. Is it worth to create a new header
file even if the only use is in nss-systemd.c? I think yes, because it feels
clean and also I think it's likely that pthread_mutex_{lock,unlock} will be
used in other places later.

(cherry picked from commit 29d4392ca05a31db53176f552041bb6183351d63)

Gbp-Pq: Name basic-add-_cleanup_-wrappers-for-pthread_mutex_-lock-unlo.patch

5 years agologind: avoid shadow lookups when doing userdb client side
Lennart Poettering [Thu, 9 Apr 2020 12:28:56 +0000 (14:28 +0200)]
logind: avoid shadow lookups when doing userdb client side

Let's not trigger MACs needlessly.

Ideally everybody would turn on userdb, but if people insist in not
doing so, then let's not attempt to open shadow.

It's a bit ugly to implement this, since shadow information is more than
just passwords (but accound validity metadata), and thus userdb's own
"privieleged" scheme is orthogonal to this, but let's still do this for
the client side.

Fixes: #15105
(cherry picked from commit b062ca616c778358d4da008a2950615fac74aa24)

Gbp-Pq: Name logind-avoid-shadow-lookups-when-doing-userdb-client-side.patch

5 years agouserdb: when doing client-side NSS look-ups optionally avoid shadow look-ups
Lennart Poettering [Thu, 9 Apr 2020 12:28:34 +0000 (14:28 +0200)]
userdb: when doing client-side NSS look-ups optionally avoid shadow look-ups

Gbp-Pq: Name userdb-when-doing-client-side-NSS-look-ups-optionally-avo.patch

5 years agotest: verify RoutesToDNS= is independent of UseGateway=
Dan Streetman [Wed, 15 Apr 2020 22:30:33 +0000 (18:30 -0400)]
test: verify RoutesToDNS= is independent of UseGateway=

(cherry picked from commit 06c2b0c76bf7e2756f8e9ef18765c85dee99ae14)

Gbp-Pq: Name test-verify-RoutesToDNS-is-independent-of-UseGateway.patch

5 years agonetwork: honor SetDNSRoutes= even if UseGateway=False
Dan Streetman [Wed, 15 Apr 2020 22:05:14 +0000 (18:05 -0400)]
network: honor SetDNSRoutes= even if UseGateway=False

(cherry picked from commit 244490f5e0a98f83190e92033fbdaa1bbcd9b000)

Gbp-Pq: Name network-honor-SetDNSRoutes-even-if-UseGateway-False.patch

5 years agotest: modify/add tests for UseRoutes= and UseGateway= configuration
Dan Streetman [Wed, 15 Apr 2020 20:26:20 +0000 (16:26 -0400)]
test: modify/add tests for UseRoutes= and UseGateway= configuration

The last commit changed the UseGateway= default to the value of UseRoutes=
so the tests need to check for all combinations of the two parameters.

(cherry picked from commit 7c0d36ff5fc31d00e26661fd2ad45291ed0eb6f7)

Gbp-Pq: Name test-modify-add-tests-for-UseRoutes-and-UseGateway-config.patch

5 years agonetwork: change UseGateway= default to UseRoutes= setting
Dan Streetman [Wed, 15 Apr 2020 18:40:21 +0000 (14:40 -0400)]
network: change UseGateway= default to UseRoutes= setting

Anyone previously using the UseRoutes=false parameter expected their
dhcp4-provided gateway route to be ignored, as well.  However, with
the introduction of the UseGateway= parameter, this is no longer true.

In order to keep backwards compatibility, this sets the UseGateway=
default value to whatever UseRoutes= has been set to.

(cherry picked from commit 589397a27759bd650b3674029cb0ef73347c913b)

Gbp-Pq: Name network-change-UseGateway-default-to-UseRoutes-setting.patch

5 years agotest-network: add a test case for DHCPv4.UseGateway=no
Yu Watanabe [Mon, 16 Mar 2020 10:08:36 +0000 (19:08 +0900)]
test-network: add a test case for DHCPv4.UseGateway=no

(cherry picked from commit 0d7bd445d26590aad7b05040c9d8423fcd6e5d4f)

Gbp-Pq: Name test-network-add-a-test-case-for-DHCPv4.UseGateway-no.patch

5 years agonetwork: add a flag to ignore gateway provided by DHCP server
Yu Watanabe [Mon, 16 Mar 2020 09:55:10 +0000 (18:55 +0900)]
network: add a flag to ignore gateway provided by DHCP server

Closes #15117.

(cherry picked from commit b453122789ec4c6f39e6ceb9900e0e80a6abeb99)

Gbp-Pq: Name network-add-a-flag-to-ignore-gateway-provided-by-DHCP-ser.patch

5 years agounits: make sure systemd-pstore stops at shutdown
Lennart Poettering [Wed, 8 Apr 2020 14:25:03 +0000 (16:25 +0200)]
units: make sure systemd-pstore stops at shutdown

This doesn't matter too much given that the service doesn't do anything
on shutdown, but let's still stop it to make things cleaner.

(cherry picked from commit b0c1a07654c80d3cbbbcc52f860d4206707c0b08)

Gbp-Pq: Name units-make-sure-systemd-pstore-stops-at-shutdown.patch

5 years agounits: drop systemd-remount-fs.service dependency from more services
Lennart Poettering [Wed, 8 Apr 2020 14:24:23 +0000 (16:24 +0200)]
units: drop systemd-remount-fs.service dependency from more services

All services using StateDirectory= don't need the explicit dep anymore,
let's hence drop it everywhere.

(cherry picked from commit e0f968ad96e9a6340edced8e22089c802c2f6497)

Gbp-Pq: Name units-drop-systemd-remount-fs.service-dependency-from-mor.patch

5 years agounits: drop dependency on systemd-remount-fs.service from systemd-pstore.service
Lennart Poettering [Wed, 8 Apr 2020 14:10:38 +0000 (16:10 +0200)]
units: drop dependency on systemd-remount-fs.service from systemd-pstore.service

This dependency is now generated automatically given we use
StateDirectory=. Moreover the combination of Wants= and After= was too
strong anyway, as whether remount-fs is pulled in or not should not be up
to systemd-pstore.service, and in fact is part of the initial
transaction anyway.

(cherry picked from commit 0c978faa16fa9ecf92f0bbb5c7cc709dc472d115)

Gbp-Pq: Name units-drop-dependency-on-systemd-remount-fs.service-from-.patch

5 years agocore: automatically add dependency on systemd-remount-fs.service if StateDirectory...
Lennart Poettering [Wed, 8 Apr 2020 14:08:35 +0000 (16:08 +0200)]
core: automatically add dependency on systemd-remount-fs.service if StateDirectory= is used

And similar for other settings that require a writable /var/.

Rationale: if these options are used for early-boot services (such as
systemd-pstore.service) we need /var/ writable. And if /var/ is on the
root fs, then systemd-remount-fs.service is the service that ensures
that /var/ is writable.

This allows us to remove explicit deps in services such as
systemd-pstore.service.

(cherry picked from commit f3b7a79b973a28af4f7a592a8b2e199cc194218b)

Gbp-Pq: Name core-automatically-add-dependency-on-systemd-remount-fs.s.patch

5 years agounits: pull in systemd-pstore.service from sysinit.target
Lennart Poettering [Wed, 8 Apr 2020 14:12:00 +0000 (16:12 +0200)]
units: pull in systemd-pstore.service from sysinit.target

sysinit.target is the target our early boot services are generally
pulled in from, make systemd-pstore.service not an exception of that.

Effectively this doesn't mean much, either way our unit is part of the
initial transaction.

(cherry picked from commit 167241912f51fbc0d7d0869b9af34c15b5ecc4b6)

Gbp-Pq: Name units-pull-in-systemd-pstore.service-from-sysinit.target.patch

5 years agodocs: add a longer document explaining our rules on user/group names
Lennart Poettering [Tue, 7 Apr 2020 08:38:39 +0000 (10:38 +0200)]
docs: add a longer document explaining our rules on user/group names

(cherry picked from commit cafed7b32cdac13024c4093b7942a49ee8602dcf)

Gbp-Pq: Name docs-add-a-longer-document-explaining-our-rules-on-user-g.patch

5 years agopid1: by default make user units inherit their umask from the user manager
Franck Bui [Fri, 3 Apr 2020 08:00:25 +0000 (10:00 +0200)]
pid1: by default make user units inherit their umask from the user manager

This patch changes the way user managers set the default umask for the units it
manages.

Indeed one can expect that if user manager's umask is redefined through PAM
(via /etc/login.defs or pam_umask), all its children including the units it
spawns have their umask set to the new value.

Hence make user units inherit their umask value from their parent instead of
the hard coded value 0022 but allow them to override this value via their unit
file.

Note that reexecuting managers with 'systemctl daemon-reexec' after changing
UMask= has no effect. To take effect managers need to be restarted with
'systemct restart' instead. This behavior was already present before this
patch.

Fixes #6077.

(cherry picked from commit 5e37d1930b41b24c077ce37c6db0e36c745106c7)

Gbp-Pq: Name pid1-by-default-make-user-units-inherit-their-umask-from-.patch

5 years agosystemd (245.5-3) unstable; urgency=medium
Michael Biebl [Sun, 17 May 2020 17:28:49 +0000 (18:28 +0100)]
systemd (245.5-3) unstable; urgency=medium

  [ Michael Biebl ]
  * Bump priority of libnss-systemd to standard
  * logind: avoid shadow lookups when doing userdb client side
  * Disable DNSSEC support by default in resolved.
    The upstream default, DNSSEC=allow-downgrade can lead to compatibility
    issues with certain network access points. Previously, DNSSEC support
    was only turned off when built for a stable Debian release, but it is
    safer and more consistent to just generally change the default to
    DNSSEC=no. (Closes: #959996)
  * Bump debhelper compatibility level to 13.
    Use the debhelper-compat package to declare the compatibility level and
    drop debian/compat.
  * Convert to dh_installsystemd and disable dh_installsystemduser
  * Drop custom initramfs update code.
    Now handled by dh_installinitramfs which is enabled by default in compat
    level 12 and above.

  [ Dan Streetman ]
  * Cherry-pick fix from upstream master to adjust UseGateway= default
    - network: change UseGateway= default to UseRoutes= setting
    - network: honor SetDNSRoutes= even if UseGateway=False
    (LP: #1867375)

  [ Topi Miettinen ]
  * Delete empty lines at end of file.
    Upstream commit hooks don't allow empty lines and of course they serve no
    purpose.

[dgit import unpatched systemd 245.5-3]

5 years agoImport systemd_245.5-3.debian.tar.xz
Michael Biebl [Sun, 17 May 2020 17:28:49 +0000 (18:28 +0100)]
Import systemd_245.5-3.debian.tar.xz

[dgit import tarball systemd 245.5-3 systemd_245.5-3.debian.tar.xz]

5 years agoMerge version 245.5-1+rpi1 and 245.5-2 to produce 245.5-2+rpi1 archive/raspbian/245.5-2+rpi1 raspbian/245.5-2+rpi1
Raspbian automatic forward porter [Mon, 11 May 2020 15:32:25 +0000 (16:32 +0100)]
Merge version 245.5-1+rpi1 and 245.5-2 to produce 245.5-2+rpi1

5 years agoMerge systemd (245.5-2) import into refs/heads/workingbranch
Michael Biebl [Mon, 27 Apr 2020 15:38:44 +0000 (16:38 +0100)]
Merge systemd (245.5-2) import into refs/heads/workingbranch

5 years agoRevert "job: Don't mark as redundant if deps are relevant"
Michael Biebl [Thu, 12 Mar 2020 12:37:08 +0000 (13:37 +0100)]
Revert "job: Don't mark as redundant if deps are relevant"

This reverts commit 097537f07a2fab3cb73aef7bc59f2a66aa93f533.

See https://github.com/systemd/systemd/issues/15091

Closes: #953670
Gbp-Pq: Topic debian
Gbp-Pq: Name Revert-job-Don-t-mark-as-redundant-if-deps-are-relevant.patch

5 years agoudev: drop SystemCallArchitectures=native from systemd-udevd.service
Michael Biebl [Tue, 19 Nov 2019 08:10:23 +0000 (09:10 +0100)]
udev: drop SystemCallArchitectures=native from systemd-udevd.service

We can't really control what helper programs are run from other udev
rules. E.g. running i386 binaries under amd64 is a valid use case and
should not trigger a SIGSYS failure.

Closes: #869719
Gbp-Pq: Topic debian
Gbp-Pq: Name udev-drop-SystemCallArchitectures-native-from-systemd-ude.patch

5 years agoblacklist-upstream-test-24-ppc64el
Dan Streetman [Wed, 6 Nov 2019 14:14:54 +0000 (09:14 -0500)]
blacklist-upstream-test-24-ppc64el

Bug: https://github.com/systemd/systemd/issues/11612

Gbp-Pq: Topic debian
Gbp-Pq: Name blacklist-upstream-test-24-ppc64el.patch

5 years agoblacklist-upstream-test-25
Dan Streetman [Wed, 6 Nov 2019 14:14:50 +0000 (09:14 -0500)]
blacklist-upstream-test-25

Bug: https://github.com/systemd/systemd/issues/13973

Gbp-Pq: Topic debian
Gbp-Pq: Name blacklist-upstream-test-25.patch

5 years agoDrop seccomp system call filter for udev
Michael Biebl [Wed, 18 Jul 2018 21:49:16 +0000 (23:49 +0200)]
Drop seccomp system call filter for udev

The seccomp based system call whitelist requires at least systemd 239 to
be the active init and during a dist-upgrade we can't guarantee that
systemd has been fully configured before udev is restarted.

This partially reverts upstream commit
ee8f26180d01e3ddd4e5f20b03b81e5e737657ae.

Once buster is released, this patch can be dropped.

Closes: #903224
Gbp-Pq: Topic debian
Gbp-Pq: Name Drop-seccomp-system-call-filter-for-udev.patch

5 years agoAdd env variable for machine ID path
Martin Pitt [Wed, 18 Jan 2017 10:21:35 +0000 (11:21 +0100)]
Add env variable for machine ID path

During package build, in minimal chroots, or other systems which do not already
have an /etc/machine-id we get six test failures. Introduce a
$SYSTEMD_MACHINE_ID_PATH environment variable which can specify a location
other than /etc/machine-id, so that the unit tests are independent from the
environment.

Also adjust test-fs-util to not assume that /etc/machine-id exists. Use
/etc/passwd instead which is created by base-files.

Closes: #851445
Bug: https://bugs.freedesktop.org/show_bug.cgi?id=62344

Gbp-Pq: Topic debian
Gbp-Pq: Name Add-env-variable-for-machine-ID-path.patch

5 years agoLet graphical-session-pre.target be manually started
Iain Lane [Mon, 22 Aug 2016 05:03:27 +0000 (07:03 +0200)]
Let graphical-session-pre.target be manually started

This is needed until https://github.com/systemd/systemd/issues/3750 is fixed.

Forwarded: not-needed
Bug-Ubuntu: https://launchpad.net/bugs/1615341

Gbp-Pq: Topic debian
Gbp-Pq: Name Let-graphical-session-pre.target-be-manually-started.patch

5 years agoRevert "core: enable TasksMax= for all services by default, and set it to 512"
Martin Pitt [Mon, 9 May 2016 19:24:38 +0000 (21:24 +0200)]
Revert "core: enable TasksMax= for all services by default, and set it to 512"

This reverts commit 9ded9cd14cc03c67291b10a5c42ce5094ba0912f.

Introducing a default limit on number of threads broke a lot of software which
regularly needs more, such as MySQL and RabbitMQ, or services that spawn off an
indefinite number of subtasks that are not in a scope, like LXC or cron.

15% is way too much for most "simple" services, and it's too little for others
such as the ones mentioned above. There is also no particular rationale about
any particular global limit, so even if we'd bump it higher we'd just make the
limit even less useful while still breaking software.

It is both much safer and also much more effective in terms of guarding against
berserk programs/bugs/unintended fork bombs etc. to set limits in units
individually. Once someone looks at one, this is then a great time to also flip
on the other resource and privilege limitations that systemd offers.

Bug: https://github.com/systemd/systemd/issues/3211
Bug-Debian: https://bugs.debian.org/823530
Bug-Ubuntu: https://launchpad.net/bugs/1578080

Gbp-Pq: Topic debian
Gbp-Pq: Name Revert-core-enable-TasksMax-for-all-services-by-default-a.patch

5 years agoRevert "core: set RLIMIT_CORE to unlimited by default"
Martin Pitt [Sat, 27 Feb 2016 11:27:06 +0000 (12:27 +0100)]
Revert "core: set RLIMIT_CORE to unlimited by default"

Partially revert commit 15a900327ab as this completely breaks core dumps
without systemd-coredump. It's also contradicting core(8), and it's not
systemd's place to redefine the kernel definitions of core files.

Commit bdfd7b2c now honours the process' RLIMIT_CORE for systemd-coredump. This
isn't what RLIMIT_CORE is supposed to do (it limits the size of the core
*file*, but the kernel deliberately ignores it for piping), so set a static
2^63 core size limit for systemd-coredump to go back to the previous behaviour
(otherwise the change above would break systemd-coredump).

Bug-Debian: https://bugs.debian.org/815020

Gbp-Pq: Topic debian
Gbp-Pq: Name Revert-core-set-RLIMIT_CORE-to-unlimited-by-default.patch

5 years agoRevert "core: one step back again, for nspawn we actually can't wait for cgroups...
Martin Pitt [Mon, 27 Apr 2015 13:29:13 +0000 (15:29 +0200)]
Revert "core: one step back again, for nspawn we actually can't wait for cgroups running empty since systemd will get exactly zero notifications about it"

This reverts commit 743970d2ea6d08aa7c7bff8220f6b7702f2b1db7.

Bug-Debian: https://bugs.debian.org/784720
Bug-Ubuntu: https://launchpad.net/bugs/1448259
Bug-Fedora: https://bugzilla.redhat.com/show_bug.cgi?id=1141137

Gbp-Pq: Topic debian
Gbp-Pq: Name Revert-core-one-step-back-again-for-nspawn-we-actual.patch

5 years agoSkip filesystem check if already done by the initramfs
Nis Martensen [Tue, 19 Jan 2016 21:01:43 +0000 (22:01 +0100)]
Skip filesystem check if already done by the initramfs

Newer versions of initramfs-tools already fsck and mount / and /usr in
the initramfs. Skip the filesystem check in this case.

Based on a previous patch by Michael Biebl <biebl@debian.org>.

Closes: #782522
Closes: #810748
Gbp-Pq: Topic debian
Gbp-Pq: Name Skip-filesystem-check-if-already-done-by-the-initram.patch

5 years agofsckd daemon for inter-fsckd communication
Didier Roche [Fri, 22 May 2015 11:04:38 +0000 (13:04 +0200)]
fsckd daemon for inter-fsckd communication

Global logic:
Add systemd-fsckd multiplexer which accepts multiple (via systemd-fsck's
/run/systemd/fsck.progress socket) fsck instances to connect to it and sends
progress report. systemd-fsckd then computes and writes to /dev/console the
number of devices currently being checked and the minimum fsck progress.

Plymouth and user interaction:
Forward the progress to plymouth and support canellation of in progress fsck.
Try to connect and send to plymouth (if running) some checked report progress,
using direct plymouth protocole.

Update message is the following:
fsckd:<num_devices>:<progress>:<string>
* num_devices corresponds to the current number of devices being checked (int)
* progress corresponds to the current minimum percentage of all devices being
  checked (float, from 0 to 100)
* string is a translated message ready to be displayed by the plymouth theme
  displaying the information above. It can be overridden by plymouth themes
  supporting i18n.

Grab in fsckd plymouth watch key Control+C, and propagate this cancel request
to systemd-fsck which will terminate fsck.

Send a message to signal to user what key we are grabbing for fsck cancel.

Message is: fsckd-cancel-msg:<string>
Where string is a translated string ready to be displayed by the plymouth theme
indicating that Control+C can be used to cancel current checks. It can be
overridden (matching only fsckd-cancel-msg prefix) for themes supporting i18n.

Misc:
systemd-fsckd stops on idle when no fsck is connected.
Add man page explaining the plymouth theme protocol, usage of the daemon
as well as the socket activation part. Adapt existing fsck man page.

Note that fsckd had lived in the upstream tree for a while, but was removed.
More information at
http://lists.freedesktop.org/archives/systemd-devel/2015-April/030175.html
-

Gbp-Pq: Topic debian
Gbp-Pq: Name fsckd-daemon-for-inter-fsckd-communication.patch