Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package systemd for openSUSE:Factory checked 
in at 2023-03-17 17:00:51
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/systemd (Old)
 and      /work/SRC/openSUSE:Factory/.systemd.new.31432 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "systemd"

Fri Mar 17 17:00:51 2023 rev:383 rq:1072270 version:253.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/systemd/systemd.changes  2023-03-15 
18:53:41.868124916 +0100
+++ /work/SRC/openSUSE:Factory/.systemd.new.31432/systemd.changes       
2023-03-17 17:00:52.960617931 +0100
@@ -1,0 +2,47 @@
+Thu Mar 16 07:33:21 UTC 2023 - Franck Bui <f...@suse.com>
+
+- Add 5002-systemctl-explicitly-cast-the-constants-to-uint64_t.patch 
(bsc#1209305)
+
+  Added temporarily until it's merged in either the stable v253 branch or in 
the
+  SUSE git repo.
+
+-------------------------------------------------------------------
+Thu Mar 16 07:29:24 UTC 2023 - Franck Bui <f...@suse.com>
+
+- Add 5001-Revert-core-propagate-stop-too-if-restart-is-issued.patch until
+  https://github.com/systemd/systemd/issues/26839 is fixed properly.
+
+-------------------------------------------------------------------
+Mon Mar 13 18:50:39 UTC 2023 - Franck Bui <f...@suse.com>
+
+- testsuite: mtools is required by TEST-58-REPART
+
+-------------------------------------------------------------------
+Mon Mar 13 17:12:14 UTC 2023 - Franck Bui <f...@suse.com>
+
+- testsuite: swtpm and tpm2.0-tools are needed by TEST-70-TPM2
+
+-------------------------------------------------------------------
+Thu Mar  9 10:38:10 UTC 2023 - Franck Bui <f...@suse.com>
+
+- Add 5000-core-manager-run-generators-directly-when-we-are-in-.patch, a
+  temporary workaround until https://github.com/dracutdevs/dracut/issues/2211 
is
+  fixed in dracut.
+
+-------------------------------------------------------------------
+Mon Mar  6 10:08:33 UTC 2023 - Franck Bui <f...@suse.com>
+
+- Upgrade to v253.1 (commit 6c327d74aa0d350482e82a247d7018559699798d)
+
+  See https://github.com/openSUSE/systemd/blob/SUSE/v253/NEWS for details.
+
+  * Rebased 0001-conf-parser-introduce-early-drop-ins.patch
+
+  * Ship systemd-journald-audit.socket again: it can now be disabled via the
+    usual "systemctl disable" mechanism to stop collection of audit
+    messages. Note that it's handled by the preset logic, which turns it off by
+    default.
+
+  * TEST_06_SELINUX needs selinux-policy-devel.
+
+-------------------------------------------------------------------

Old:
----
  systemd-v252.7+suse.50.gd447802fee.tar.xz

New:
----
  5000-core-manager-run-generators-directly-when-we-are-in-.patch
  5001-Revert-core-propagate-stop-too-if-restart-is-issued.patch
  5002-systemctl-explicitly-cast-the-constants-to-uint64_t.patch
  systemd-v253.1.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ systemd.spec ++++++
--- /var/tmp/diff_new_pack.J5Eos7/_old  2023-03-17 17:00:53.964623191 +0100
+++ /var/tmp/diff_new_pack.J5Eos7/_new  2023-03-17 17:00:53.968623212 +0100
@@ -19,7 +19,7 @@
 %global flavor @BUILD_FLAVOR@%{nil}
 
 %define min_kernel_version 4.5
-%define archive_version +suse.50.gd447802fee
+%define archive_version %nil
 
 %define _testsuitedir /usr/lib/systemd/tests
 %define xinitconfdir %{?_distconfdir}%{!?_distconfdir:%{_sysconfdir}}/X11/xinit
@@ -72,7 +72,7 @@
 
 Name:           systemd%{?mini}
 URL:            http://www.freedesktop.org/wiki/Software/systemd
-Version:        252.7
+Version:        253.1
 Release:        0
 Summary:        A System and Session Manager
 License:        LGPL-2.1-or-later
@@ -209,9 +209,12 @@
 
 # Patches listed below are put in quarantine. Normally all changes must go to
 # upstream first and then are cherry-picked in the SUSE git repository. But for
-# very few cases, some stuff might be broken in upstream and need to be fixed
-# quickly. But even in these cases, the patches are temporary and should be
-# removed as soon as a fix is merged by upstream.
+# very few cases, some stuff might be broken in upstream and need to be fixed 
or
+# worked around quickly. In these cases, the patches are added temporarily and
+# will be removed as soon as a proper fix will be merged by upstream.
+Patch5000:      5000-core-manager-run-generators-directly-when-we-are-in-.patch
+Patch5001:      5001-Revert-core-propagate-stop-too-if-restart-is-issued.patch
+Patch5002:      5002-systemctl-explicitly-cast-the-constants-to-uint64_t.patch
 
 %description
 Systemd is a system and service manager, compatible with SysV and LSB
@@ -499,6 +502,9 @@
 Recommends:     python3-colorama
 # Optional dep for mkfs.vfat needed by test-loop-block (otherwise skipped)
 Recommends:     dosfstools
+# Optional deps needed by TEST-70-TPM2 (otherwise skipped)
+Recommends:     swtpm
+Recommends:     tpm2.0-tools
 # The following deps on libs are for test-dlopen-so whereas the pkgconfig ones
 # are used by test-funtions to find the libs on the host and install them in 
the
 # image, see install_missing_libraries() for details.
@@ -526,10 +532,12 @@
 Requires:       libtss2-rc0
 Requires:       lz4
 Requires:       make
+Requires:       mtools
 Requires:       netcat
 Requires:       python3-pexpect
 Requires:       qemu-kvm
 Requires:       quota
+Requires:       selinux-policy-devel
 Requires:       socat
 Requires:       squashfs
 Requires:       systemd-container
@@ -885,8 +893,8 @@
 echo 'disable *' >%{buildroot}%{_presetdir}/99-default.preset
 echo 'disable *' >%{buildroot}%{_userpresetdir}/99-default.preset
 
-# The tmpfiles dealing with the generic paths is pretty messy
-# currently because:
+# The current situation with tmpfiles snippets dealing with the generic paths 
is
+# pretty messy currently because:
 #
 #  1. filesystem package wants to define the generic paths and some of them
 #     conflict with the definition given by systemd in var.conf, see
@@ -930,12 +938,6 @@
 # still be used by yast.
 cat %{SOURCE14} >>%{buildroot}%{_datarootdir}/systemd/kbd-model-map
 
-# Don't ship systemd-journald-audit.socket as there's no other way for us to
-# prevent journald from recording audit messages in the journal by default
-# (bsc#1109252).
-rm -f %{buildroot}%{_unitdir}/systemd-journald-audit.socket
-rm -f 
%{buildroot}%{_unitdir}/sockets.target.wants/systemd-journald-audit.socket
-
 %if %{with testsuite}
 # -Dinstall_test took care of installing the unit tests only (those in
 # src/tests) and testdata directory. Here we copy the integration tests
@@ -964,6 +966,7 @@
 %systemd_pre remote-fs.target
 %systemd_pre getty@.service
 %systemd_pre systemd-timesyncd.service
+%systemd_pre systemd-journald-audit.socket
 
 %post
 # Make /etc/machine-id an empty file during package installation. On the first
@@ -1023,6 +1026,7 @@
 %systemd_post remote-fs.target
 %systemd_post getty@.service
 %systemd_post systemd-timesyncd.service
+%systemd_post systemd-journald-audit.socket
 
 # v228 wrongly set world writable suid root permissions on timestamp files used
 # by permanent timers. Fix the timestamps that might have been created by the
@@ -1314,13 +1318,13 @@
 %defattr(-,root,root)
 %license LICENSE.LGPL2.1
 %{_libdir}/libsystemd.so.0
-%{_libdir}/libsystemd.so.0.35.0
+%{_libdir}/libsystemd.so.0.36.0
 
 %files -n libudev%{?mini}1
 %defattr(-,root,root)
 %license LICENSE.LGPL2.1
 %{_libdir}/libudev.so.1
-%{_libdir}/libudev.so.1.7.5
+%{_libdir}/libudev.so.1.7.6
 
 %if %{with coredump}
 %files coredump

++++++ 0001-conf-parser-introduce-early-drop-ins.patch ++++++
--- /var/tmp/diff_new_pack.J5Eos7/_old  2023-03-17 17:00:53.996623359 +0100
+++ /var/tmp/diff_new_pack.J5Eos7/_new  2023-03-17 17:00:53.996623359 +0100
@@ -1,7 +1,7 @@
-From 288be40eb94ddc1d549a98556baea71d20df224f Mon Sep 17 00:00:00 2001
+From 77391d9baf86f10daf210ccf5527e0155a33fc73 Mon Sep 17 00:00:00 2001
 From: Franck Bui <f...@suse.com>
 Date: Fri, 22 Jan 2021 14:57:08 +0100
-Subject: [PATCH 1/8] conf-parser: introduce 'early' drop-ins
+Subject: [PATCH 1/1] conf-parser: introduce 'early' drop-ins
 MIME-Version: 1.0
 Content-Type: text/plain; charset=UTF-8
 Content-Transfer-Encoding: 8bit
@@ -62,14 +62,14 @@
 Fixes: #2121
 ---
  src/shared/conf-parser.c    |  55 ++++++++++--
- src/test/test-conf-parser.c | 164 ++++++++++++++++++++++++++++++++++++
- 2 files changed, 214 insertions(+), 5 deletions(-)
+ src/test/test-conf-parser.c | 166 +++++++++++++++++++++++++++++++++++-
+ 2 files changed, 215 insertions(+), 6 deletions(-)
 
 diff --git a/src/shared/conf-parser.c b/src/shared/conf-parser.c
-index 5cb41a39da..86dc1c95f6 100644
+index 29051ca0e3..72935030ea 100644
 --- a/src/shared/conf-parser.c
 +++ b/src/shared/conf-parser.c
-@@ -478,6 +478,7 @@ int hashmap_put_stats_by_path(Hashmap **stats_by_path, 
const char *path, const s
+@@ -477,6 +477,7 @@ int hashmap_put_stats_by_path(Hashmap **stats_by_path, 
const char *path, const s
  
  static int config_parse_many_files(
                  const char* const* conf_files,
@@ -77,7 +77,7 @@
                  char **files,
                  const char *sections,
                  ConfigItemLookup lookup,
-@@ -496,6 +497,20 @@ static int config_parse_many_files(
+@@ -495,6 +496,20 @@ static int config_parse_many_files(
                          return -ENOMEM;
          }
  
@@ -98,7 +98,7 @@
          /* First read the first found main config file. */
          STRV_FOREACH(fn, conf_files) {
                  r = config_parse(NULL, *fn, NULL, sections, lookup, table, 
flags, userdata, &st);
-@@ -534,6 +549,27 @@ static int config_parse_many_files(
+@@ -533,6 +548,27 @@ static int config_parse_many_files(
          return 0;
  }
  
@@ -126,7 +126,7 @@
  /* Parse each config file in the directories specified as nulstr. */
  int config_parse_many_nulstr(
                  const char *conf_file,
-@@ -545,15 +581,19 @@ int config_parse_many_nulstr(
+@@ -544,15 +580,19 @@ int config_parse_many_nulstr(
                  void *userdata,
                  Hashmap **ret_stats_by_path) {
  
@@ -149,7 +149,7 @@
                                         ret_stats_by_path);
  }
  
-@@ -591,6 +631,7 @@ int config_parse_many(
+@@ -590,6 +630,7 @@ int config_parse_many(
                  Hashmap **ret_stats_by_path,
                  char ***ret_dropin_files) {
  
@@ -157,7 +157,7 @@
          _cleanup_strv_free_ char **files = NULL;
          int r;
  
-@@ -603,12 +644,16 @@ int config_parse_many(
+@@ -602,12 +643,16 @@ int config_parse_many(
          if (r < 0)
                  return r;
  
@@ -177,20 +177,22 @@
          return 0;
  }
 diff --git a/src/test/test-conf-parser.c b/src/test/test-conf-parser.c
-index 8c27dcac3f..745e4a127a 100644
+index 0acb4131b5..96a52e759f 100644
 --- a/src/test/test-conf-parser.c
 +++ b/src/test/test-conf-parser.c
-@@ -5,6 +5,9 @@
+@@ -5,7 +5,10 @@
  #include "fs-util.h"
  #include "log.h"
  #include "macro.h"
+-#include "string-util.h"
 +#include "mkdir.h"
++#include "nulstr-util.h"
 +#include "path-util.h"
 +#include "rm-rf.h"
- #include "string-util.h"
  #include "strv.h"
  #include "tests.h"
-@@ -391,4 +394,165 @@ TEST(config_parse) {
+ #include "tmpfile-util.h"
+@@ -390,4 +393,165 @@ TEST(config_parse) {
                  test_config_parse_one(i, config_file[i]);
  }
  

++++++ 5000-core-manager-run-generators-directly-when-we-are-in-.patch ++++++
>From 9d0f728f65e6c3ad586e276c1ed3c2cd8cc944be Mon Sep 17 00:00:00 2001
From: Yu Watanabe <watanabe.yu+git...@gmail.com>
Date: Mon, 20 Feb 2023 12:00:30 +0900
Subject: [PATCH 5000/5000] core/manager: run generators directly when we are
 in initrd

Some initrd system write files at ourside of /run, /etc, or other
allowed places. This is a kind of workaround, but in most cases, such
sandboxing is not necessary as the filesystem is on ramfs when we are in
initrd.

Fixes #26488.
---
 src/core/manager.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/src/core/manager.c b/src/core/manager.c
index 380a4e30d7..6135205761 100644
--- a/src/core/manager.c
+++ b/src/core/manager.c
@@ -3822,8 +3822,8 @@ static int manager_run_generators(Manager *m) {
         /* If we are the system manager, we fork and invoke the generators in 
a sanitized mount namespace. If
          * we are the user manager, let's just execute the generators 
directly. We might not have the
          * necessary privileges, and the system manager has already mounted 
/tmp/ and everything else for us.
-         */
-        if (MANAGER_IS_USER(m)) {
+         * If we are in initrd, let's also execute the generators directly, as 
we are in ramfs. */
+        if (MANAGER_IS_USER(m) || in_initrd()) {
                 r = manager_execute_generators(m, paths, /* remount_ro= */ 
false);
                 goto finish;
         }
-- 
2.35.3


++++++ 5001-Revert-core-propagate-stop-too-if-restart-is-issued.patch ++++++
>From 7e094b534978a8c5e980271a00ebccdba98ae6f7 Mon Sep 17 00:00:00 2001
From: Franck Bui <f...@suse.com>
Date: Wed, 15 Mar 2023 19:48:52 +0100
Subject: [PATCH 5001/5001] Revert "core: propagate stop too if restart is
 issued"

This reverts commit 017a7ba4f406adcf69d6b3ec15b9f2d9ed5ad853.

Until https://github.com/systemd/systemd/issues/26839 is properly fixed.
---
 src/core/transaction.c | 42 +++++++++++++++---------------------------
 1 file changed, 15 insertions(+), 27 deletions(-)

diff --git a/src/core/transaction.c b/src/core/transaction.c
index a6fd184e33..9689d5faab 100644
--- a/src/core/transaction.c
+++ b/src/core/transaction.c
@@ -1047,39 +1047,27 @@ int transaction_add_job_and_dependencies(
                 }
 
                 if (IN_SET(type, JOB_STOP, JOB_RESTART)) {
-                        _cleanup_set_free_ Set *propagated_restart = NULL;
+                        UnitDependencyAtom atom;
+                        JobType ptype;
+
                         /* We propagate STOP as STOP, but RESTART only as 
TRY_RESTART, in order not to start
                          * dependencies that are not around. */
+                        if (type == JOB_RESTART) {
+                                atom = UNIT_ATOM_PROPAGATE_RESTART;
+                                ptype = JOB_TRY_RESTART;
+                        } else {
+                                ptype = JOB_STOP;
+                                atom = UNIT_ATOM_PROPAGATE_STOP;
+                        }
 
-                        if (type == JOB_RESTART)
-                                UNIT_FOREACH_DEPENDENCY(dep, ret->unit, 
UNIT_ATOM_PROPAGATE_RESTART) {
-                                        JobType nt;
-
-                                        r = 
set_ensure_put(&propagated_restart, NULL, dep);
-                                        if (r < 0)
-                                                return r;
-
-                                        nt = 
job_type_collapse(JOB_TRY_RESTART, dep);
-                                        if (nt == JOB_NOP)
-                                                continue;
-
-                                        r = 
transaction_add_job_and_dependencies(tr, nt, dep, ret, true, false, false, 
ignore_order, e);
-                                        if (r < 0) {
-                                                if (r != -EBADR) /* job type 
not applicable */
-                                                        return r;
-
-                                                sd_bus_error_free(e);
-                                        }
-                                }
+                        UNIT_FOREACH_DEPENDENCY(dep, ret->unit, atom) {
+                                JobType nt;
 
-                        /* The 'stop' part of a restart job is also propagated 
to
-                         * units with UNIT_ATOM_PROPAGATE_STOP */
-                        UNIT_FOREACH_DEPENDENCY(dep, ret->unit, 
UNIT_ATOM_PROPAGATE_STOP) {
-                                /* Units experienced restart propagation are 
skipped */
-                                if (set_contains(propagated_restart, dep))
+                                nt = job_type_collapse(ptype, dep);
+                                if (nt == JOB_NOP)
                                         continue;
 
-                                r = transaction_add_job_and_dependencies(tr, 
JOB_STOP, dep, ret, true, false, false, ignore_order, e);
+                                r = transaction_add_job_and_dependencies(tr, 
nt, dep, ret, true, false, false, ignore_order, e);
                                 if (r < 0) {
                                         if (r != -EBADR) /* job type not 
applicable */
                                                 return r;
-- 
2.35.3


++++++ 5002-systemctl-explicitly-cast-the-constants-to-uint64_t.patch ++++++
>From 1d88ce4c9ca16b95d6c29d107f26265ffc7d4379 Mon Sep 17 00:00:00 2001
From: Frantisek Sumsal <franti...@sumsal.cz>
Date: Fri, 3 Mar 2023 12:17:27 +0100
Subject: [PATCH 5002/5002] systemctl: explicitly cast the constants to
 uint64_t

Otherwise under certain conditions `va_arg()` might get garbage instead
of the expected value, i.e.:

$ sudo build-o0/systemctl disable asdfasfaf
sd_bus_message_appendv: Got uint64_t: 0
Failed to disable unit: Unit file asdfasfaf.service does not exist.

$ sudo build-o1/systemctl disable asdfasfaf
sd_bus_message_appendv: Got uint64_t: 7954875719681572864
Failed to disable unit: Invalid argument

(reproduced on an armv7hl machine)

Resolves: #26568
Follow-up to: bf1bea43f15
Related issue: 
https://github.com/systemd/systemd/pull/14470#discussion_r362893735

(cherry picked from commit c63bfd0884cf20e48befbee49d41f667660a8802)

[fbui: fixes bsc#1209305]
---
 src/systemctl/systemctl-enable.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/src/systemctl/systemctl-enable.c b/src/systemctl/systemctl-enable.c
index 86d9f602fa..f94a286122 100644
--- a/src/systemctl/systemctl-enable.c
+++ b/src/systemctl/systemctl-enable.c
@@ -211,7 +211,7 @@ int verb_enable(int argc, char *argv[], void *userdata) {
 
                 if (send_runtime) {
                         if (streq(method, 
"DisableUnitFilesWithFlagsAndInstallInfo"))
-                                r = sd_bus_message_append(m, "t", arg_runtime 
? UNIT_FILE_RUNTIME : 0);
+                                r = sd_bus_message_append(m, "t", arg_runtime 
? (uint64_t) UNIT_FILE_RUNTIME : UINT64_C(0));
                         else
                                 r = sd_bus_message_append(m, "b", arg_runtime);
                         if (r < 0)
-- 
2.35.3


++++++ files.devel ++++++
--- /var/tmp/diff_new_pack.J5Eos7/_old  2023-03-17 17:00:54.172624281 +0100
+++ /var/tmp/diff_new_pack.J5Eos7/_new  2023-03-17 17:00:54.176624302 +0100
@@ -197,6 +197,8 @@
 %{_mandir}/man3/sd_bus_emit_properties_changed.3.gz
 %{_mandir}/man3/sd_bus_emit_properties_changed_strv.3.gz
 %{_mandir}/man3/sd_bus_emit_signal.3.gz
+%{_mandir}/man3/sd_bus_emit_signal_to.3.gz
+%{_mandir}/man3/sd_bus_emit_signal_tov.3.gz
 %{_mandir}/man3/sd_bus_emit_signalv.3.gz
 %{_mandir}/man3/sd_bus_enqueue_for_read.3.gz
 %{_mandir}/man3/sd_bus_error.3.gz
@@ -312,6 +314,7 @@
 %{_mandir}/man3/sd_bus_message_new_method_errorf.3.gz
 %{_mandir}/man3/sd_bus_message_new_method_return.3.gz
 %{_mandir}/man3/sd_bus_message_new_signal.3.gz
+%{_mandir}/man3/sd_bus_message_new_signal_to.3.gz
 %{_mandir}/man3/sd_bus_message_open_container.3.gz
 %{_mandir}/man3/sd_bus_message_peek_type.3.gz
 %{_mandir}/man3/sd_bus_message_read.3.gz
@@ -663,6 +666,14 @@
 %{_mandir}/man3/sd_pid_notify.3.gz
 %{_mandir}/man3/sd_pid_notify_with_fds.3.gz
 %{_mandir}/man3/sd_pid_notifyf.3.gz
+%{_mandir}/man3/sd_pidfd_get_cgroup.3.gz
+%{_mandir}/man3/sd_pidfd_get_machine_name.3.gz
+%{_mandir}/man3/sd_pidfd_get_owner_uid.3.gz
+%{_mandir}/man3/sd_pidfd_get_session.3.gz
+%{_mandir}/man3/sd_pidfd_get_slice.3.gz
+%{_mandir}/man3/sd_pidfd_get_unit.3.gz
+%{_mandir}/man3/sd_pidfd_get_user_slice.3.gz
+%{_mandir}/man3/sd_pidfd_get_user_unit.3.gz
 %{_mandir}/man3/sd_seat_can_graphical.3.gz
 %{_mandir}/man3/sd_seat_can_tty.3.gz
 %{_mandir}/man3/sd_seat_get_active.3.gz

++++++ files.experimental ++++++
--- /var/tmp/diff_new_pack.J5Eos7/_old  2023-03-17 17:00:54.208624469 +0100
+++ /var/tmp/diff_new_pack.J5Eos7/_new  2023-03-17 17:00:54.212624490 +0100
@@ -27,6 +27,7 @@
 %{_mandir}/man1/oomctl.1.gz
 %if %{with sd_boot}
 %{_mandir}/man1/systemd-measure.1.gz
+%{_mandir}/man1/ukify.1.gz
 %endif
 %{_mandir}/man1/userdbctl.1.gz
 %{_mandir}/man5/homed.conf.5.gz
@@ -43,6 +44,9 @@
 %{_mandir}/man8/systemd-oomd.8.gz
 %{_mandir}/man8/systemd-oomd.service.8.gz
 %if %{with sd_boot}
+%{_mandir}/man8/systemd-pcrfs-root.service.8.gz
+%{_mandir}/man8/systemd-pc...@.service.8.gz
+%{_mandir}/man8/systemd-pcrmachine.service.8.gz
 %{_mandir}/man8/systemd-pcrphase-initrd.service.8.gz
 %{_mandir}/man8/systemd-pcrphase-sysinit.service.8.gz
 %{_mandir}/man8/systemd-pcrphase.8.gz
@@ -72,9 +76,13 @@
 %{_systemd_util_dir}/systemd-sysupdate
 %{_systemd_util_dir}/systemd-userdbd
 %{_systemd_util_dir}/systemd-userwork
+%if %{with sd_boot}
+%{_systemd_util_dir}/ukify
+%endif
 %{_sysusersdir}/systemd-oom.conf
 %if %{with sd_boot}
 %{_unitdir}/initrd.target.wants/systemd-pcrphase-initrd.service
+%{_unitdir}/sysinit.target.wants/systemd-pcrmachine.service
 %{_unitdir}/sysinit.target.wants/systemd-pcrphase-sysinit.service
 %{_unitdir}/sysinit.target.wants/systemd-pcrphase.service
 %endif
@@ -83,6 +91,9 @@
 %{_unitdir}/systemd-oomd.service
 %{_unitdir}/systemd-oomd.socket
 %if %{with sd_boot}
+%{_unitdir}/systemd-pcrfs-root.service
+%{_unitdir}/systemd-pcrfs@.service
+%{_unitdir}/systemd-pcrmachine.service
 %{_unitdir}/systemd-pcrphase-initrd.service
 %{_unitdir}/systemd-pcrphase-sysinit.service
 %{_unitdir}/systemd-pcrphase.service

++++++ files.systemd ++++++
--- /var/tmp/diff_new_pack.J5Eos7/_old  2023-03-17 17:00:54.264624763 +0100
+++ /var/tmp/diff_new_pack.J5Eos7/_new  2023-03-17 17:00:54.268624784 +0100
@@ -100,6 +100,7 @@
 %{_bindir}/localectl
 %{_bindir}/loginctl
 %{_bindir}/systemctl
+%{_bindir}/systemd-ac-power
 %{_bindir}/systemd-analyze
 %{_bindir}/systemd-ask-password
 %{_bindir}/systemd-cat
@@ -232,8 +233,8 @@
 %{_libdir}/libnss_myhostname.so.2
 %{_libdir}/libnss_systemd.so.2
 %endif
-%{_libdir}/systemd/libsystemd-core-252.so
-%{_libdir}/systemd/libsystemd-shared-252.so
+%{_libdir}/systemd/libsystemd-core-253.so
+%{_libdir}/systemd/libsystemd-shared-253.so
 %if %{without bootstrap}
 %{_mandir}/man1/busctl.1.gz
 %{_mandir}/man1/hostnamectl.1.gz
@@ -242,6 +243,7 @@
 %{_mandir}/man1/localectl.1.gz
 %{_mandir}/man1/loginctl.1.gz
 %{_mandir}/man1/systemctl.1.gz
+%{_mandir}/man1/systemd-ac-power.1.gz
 %{_mandir}/man1/systemd-analyze.1.gz
 %{_mandir}/man1/systemd-ask-password.1.gz
 %{_mandir}/man1/systemd-cat.1.gz
@@ -445,7 +447,6 @@
 %{_systemd_util_dir}/scripts/upgrade-from-pre-210.sh
 %{_systemd_util_dir}/system-preset/99-default.preset
 %{_systemd_util_dir}/systemd
-%{_systemd_util_dir}/systemd-ac-power
 %{_systemd_util_dir}/systemd-binfmt
 %{_systemd_util_dir}/systemd-boot-check-no-failures
 %{_systemd_util_dir}/systemd-cgroups-agent
@@ -505,6 +506,7 @@
 %{_systemdgeneratordir}/systemd-system-update-generator
 %{_sysusersdir}/systemd-journal.conf
 %{_sysusersdir}/systemd-timesync.conf
+%{_tmpfilesdir}/credstore.conf
 %{_tmpfilesdir}/journal-nocow.conf
 %{_tmpfilesdir}/provision.conf
 %{_tmpfilesdir}/suse.conf
@@ -641,6 +643,7 @@
 %{_unitdir}/systemd-hybrid-sleep.service
 %{_unitdir}/systemd-journal-catalog-update.service
 %{_unitdir}/systemd-journal-flush.service
+%{_unitdir}/systemd-journald-audit.socket
 %{_unitdir}/systemd-journald-dev-log.socket
 %{_unitdir}/systemd-journald-varlink@.socket
 %{_unitdir}/systemd-journald.service

++++++ files.udev ++++++
--- /var/tmp/diff_new_pack.J5Eos7/_old  2023-03-17 17:00:54.320625056 +0100
+++ /var/tmp/diff_new_pack.J5Eos7/_new  2023-03-17 17:00:54.320625056 +0100
@@ -94,7 +94,6 @@
 %endif
 %{_prefix}/lib/udev/fido_id
 %{_prefix}/lib/udev/mtd_probe
-%{_prefix}/lib/udev/path_id_compat
 %{_prefix}/lib/udev/scsi_id
 %{_prefix}/lib/udev/v4l_id
 %{_systemd_util_dir}/network/99-default.link
@@ -174,7 +173,6 @@
 %{_udevrulesdir}/60-persistent-v4l.rules
 %{_udevrulesdir}/60-sensor.rules
 %{_udevrulesdir}/60-serial.rules
-%{_udevrulesdir}/61-persistent-storage-compat.rules
 %{_udevrulesdir}/64-btrfs.rules
 %{_udevrulesdir}/70-camera.rules
 %{_udevrulesdir}/70-joystick.rules
@@ -226,6 +224,8 @@
 %{_unitdir}/system-systemd\x2dcryptsetup.slice
 %endif
 %{_unitdir}/systemd-backlight@.service
+%{_unitdir}/systemd-growfs-root.service
+%{_unitdir}/systemd-growfs@.service
 %{_unitdir}/systemd-hwdb-update.service
 %if %{without bootstrap}
 %{_unitdir}/systemd-modules-load.service

++++++ files.uefi-boot ++++++
--- /var/tmp/diff_new_pack.J5Eos7/_old  2023-03-17 17:00:54.344625182 +0100
+++ /var/tmp/diff_new_pack.J5Eos7/_new  2023-03-17 17:00:54.348625203 +0100
@@ -26,20 +26,21 @@
 %{_mandir}/man8/systemd-bless-boot-generator.8.gz
 %{_mandir}/man8/systemd-bless-boot.8.gz
 %{_mandir}/man8/systemd-bless-boot.service.8.gz
-%{_mandir}/man8/systemd-boot-system-token.service.8.gz
+%{_mandir}/man8/systemd-boot-random-seed.service.8.gz
 %endif
 %{_prefix}/lib/kernel/install.conf
 %{_prefix}/lib/kernel/install.d/50-depmod.install
 %{_prefix}/lib/kernel/install.d/90-loaderentry.install
+%{_prefix}/lib/kernel/install.d/90-uki-copy.install
 # These are the few exceptions where glob pattern is allowed.
 %{_systemd_util_dir}/boot/efi/linux*.efi.stub
 %{_systemd_util_dir}/boot/efi/linux*.elf.stub
 %{_systemd_util_dir}/boot/efi/systemd-boot*.efi
 %{_systemd_util_dir}/systemd-bless-boot
 %{_systemdgeneratordir}/systemd-bless-boot-generator
-%{_unitdir}/sysinit.target.wants/systemd-boot-system-token.service
+%{_unitdir}/sysinit.target.wants/systemd-boot-random-seed.service
 %{_unitdir}/systemd-bless-boot.service
-%{_unitdir}/systemd-boot-system-token.service
+%{_unitdir}/systemd-boot-random-seed.service
 %{_unitdir}/systemd-boot-update.service
 %endif
 

++++++ systemd-v252.7+suse.50.gd447802fee.tar.xz -> systemd-v253.1.tar.xz ++++++
/work/SRC/openSUSE:Factory/systemd/systemd-v252.7+suse.50.gd447802fee.tar.xz 
/work/SRC/openSUSE:Factory/.systemd.new.31432/systemd-v253.1.tar.xz differ: 
char 26, line 1

Reply via email to