Hello community, here is the log from the commit of package systemd for openSUSE:Factory checked in at 2017-02-21 13:33:13 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/systemd (Old) and /work/SRC/openSUSE:Factory/.systemd.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "systemd" Changes: -------- --- /work/SRC/openSUSE:Factory/systemd/systemd-mini.changes 2017-02-11 01:24:35.405436364 +0100 +++ /work/SRC/openSUSE:Factory/.systemd.new/systemd-mini.changes 2017-02-21 13:33:16.512811439 +0100 @@ -1,0 +2,51 @@ +Mon Feb 20 10:53:11 UTC 2017 - f...@suse.com + +- Don't ship systemd-resolved for now (bsc#1024897) + + If resolved is enabled , systemd-tmpfiles creates a wrong symlink in + /etc/resolv.conf which confuses the network manager actually used. + +------------------------------------------------------------------- +Thu Feb 9 14:06:46 UTC 2017 - f...@suse.com + +- More indentation cleanup (no functional changes) + +------------------------------------------------------------------- +Wed Feb 8 08:45:09 CET 2017 - ku...@suse.de + +- Remove obsolete insserv requirements for udev again [bsc#999841] + +------------------------------------------------------------------- +Mon Feb 6 14:13:00 UTC 2017 - f...@suse.com + +- Import commit cd97d5d5fef79ab9d957bf6504d085c0faca6bfc + + e587b6ce0 disable RestrictAddressFamilies on all architectures but x86_64 one (bsc#1023460) + c8ae05632 journald: don't flush to /var/log/journal before we get asked to (bsc#1004094) + 7261eaf3e sd-event: fix sd_event_source_get_priority() (#4712) + +------------------------------------------------------------------- +Fri Feb 3 08:37:22 UTC 2017 - f...@suse.com + +- Move fix for permission set on /var/lib/systemd/linger/* (no functional changes) + + Move that part after the fix on timer timestamp files otherwise the + comment doesn't make sense. + +------------------------------------------------------------------- +Wed Feb 1 15:06:06 UTC 2017 - f...@suse.com + +- Import commit 028fd9b60580976dffb09b3576a2b652ee35137c + + cc2ca55ff build-sys: do not install ctrl-alt-del.target symlink twice + ececae77a device: Avoid calling unit_free(NULL) in device setup logic (#4748) + +------------------------------------------------------------------- +Wed Feb 1 14:32:28 UTC 2017 - f...@suse.com + +- Ship systemd-resolved but it's disabled by default (bsc#1018387) + + The NSS plugin will also be disabled, users need to enable it + manually. + +------------------------------------------------------------------- systemd.changes: same change ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ systemd-mini.spec ++++++ --- /var/tmp/diff_new_pack.290t6b/_old 2017-02-21 13:33:17.436681110 +0100 +++ /var/tmp/diff_new_pack.290t6b/_new 2017-02-21 13:33:17.436681110 +0100 @@ -230,7 +230,6 @@ Requires(pre): /usr/bin/getent Requires(post): sed Requires(post): /usr/bin/systemctl -Requires(postun): %insserv_prereq Requires(post): coreutils Requires(postun): coreutils @@ -399,9 +398,6 @@ %prep %setup -q -n systemd-%{version} -echo "Checking whether upstream rpm macros changed..." -#skipped for now -#[ -z "`diff -Naru "%{S:10}" src/core/macros.systemd.in`" ] || exit 1 # only needed for bootstrap %if 0%{?bootstrap} @@ -706,11 +702,6 @@ *) rm -f %{_prefix}/lib/systemd/system/tmp.mount esac -# Same for user lingering created by logind. -for username in $(ls /var/lib/systemd/linger/* 2>/dev/null); do - chmod 0644 $username -done - # v228 wrongly set world writable suid root permissions on timestamp # files used by permanent timers. Fix the timestamps that might have # been created by the affected versions of systemd (bsc#1020601). @@ -718,6 +709,11 @@ chmod 0644 $stamp done +# Same for user lingering created by logind. +for username in $(ls /var/lib/systemd/linger/* 2>/dev/null); do + chmod 0644 $username +done + # Convert /var/lib/machines subvolume to make it suitable for # rollbacks, if needed. See bsc#992573. The installer has been fixed # to create it at installation time. @@ -797,7 +793,6 @@ %postun -n udev%{?mini} %regenerate_initrd_post -%insserv_cleanup systemctl daemon-reload || : # On package update: the restart of the socket units will probably # fail as the daemon is most likely running. It's not really an issue @@ -1002,7 +997,6 @@ %dir %{_sysconfdir}/systemd/system %dir %{_sysconfdir}/systemd/user %dir %{_sysconfdir}/xdg/systemd -%{_sysconfdir}/systemd/system/ctrl-alt-del.target %{_sysconfdir}/xdg/systemd/user %{_sysconfdir}/X11/xinit/xinitrc.d/50-systemd-user.sh ++++++ systemd.spec ++++++ --- /var/tmp/diff_new_pack.290t6b/_old 2017-02-21 13:33:17.464677161 +0100 +++ /var/tmp/diff_new_pack.290t6b/_new 2017-02-21 13:33:17.468676597 +0100 @@ -228,7 +228,6 @@ Requires(pre): /usr/bin/getent Requires(post): sed Requires(post): /usr/bin/systemctl -Requires(postun): %insserv_prereq Requires(post): coreutils Requires(postun): coreutils @@ -397,9 +396,6 @@ %prep %setup -q -n systemd-%{version} -echo "Checking whether upstream rpm macros changed..." -#skipped for now -#[ -z "`diff -Naru "%{S:10}" src/core/macros.systemd.in`" ] || exit 1 # only needed for bootstrap %if 0%{?bootstrap} @@ -704,11 +700,6 @@ *) rm -f %{_prefix}/lib/systemd/system/tmp.mount esac -# Same for user lingering created by logind. -for username in $(ls /var/lib/systemd/linger/* 2>/dev/null); do - chmod 0644 $username -done - # v228 wrongly set world writable suid root permissions on timestamp # files used by permanent timers. Fix the timestamps that might have # been created by the affected versions of systemd (bsc#1020601). @@ -716,6 +707,11 @@ chmod 0644 $stamp done +# Same for user lingering created by logind. +for username in $(ls /var/lib/systemd/linger/* 2>/dev/null); do + chmod 0644 $username +done + # Convert /var/lib/machines subvolume to make it suitable for # rollbacks, if needed. See bsc#992573. The installer has been fixed # to create it at installation time. @@ -795,7 +791,6 @@ %postun -n udev%{?mini} %regenerate_initrd_post -%insserv_cleanup systemctl daemon-reload || : # On package update: the restart of the socket units will probably # fail as the daemon is most likely running. It's not really an issue @@ -1000,7 +995,6 @@ %dir %{_sysconfdir}/systemd/system %dir %{_sysconfdir}/systemd/user %dir %{_sysconfdir}/xdg/systemd -%{_sysconfdir}/systemd/system/ctrl-alt-del.target %{_sysconfdir}/xdg/systemd/user %{_sysconfdir}/X11/xinit/xinitrc.d/50-systemd-user.sh ++++++ systemd-232.tar.xz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-232/Makefile.am new/systemd-232/Makefile.am --- old/systemd-232/Makefile.am 2017-01-25 15:27:21.000000000 +0100 +++ new/systemd-232/Makefile.am 2017-02-06 15:11:10.000000000 +0100 @@ -639,7 +639,6 @@ units/halt-local.service.in GENERAL_ALIASES += \ - $(systemunitdir)/reboot.target $(pkgsysconfdir)/system/ctrl-alt-del.target \ $(systemunitdir)/machines.target $(pkgsysconfdir)/system/multi-user.target.wants/machines.target dist_doc_DATA = \ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-232/src/core/device.c new/systemd-232/src/core/device.c --- old/systemd-232/src/core/device.c 2017-01-25 15:27:21.000000000 +0100 +++ new/systemd-232/src/core/device.c 2017-02-06 15:11:10.000000000 +0100 @@ -403,7 +403,7 @@ fail: log_unit_warning_errno(u, r, "Failed to set up device unit: %m"); - if (delete) + if (delete && u) unit_free(u); return r; diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-232/src/core/execute.c new/systemd-232/src/core/execute.c --- old/systemd-232/src/core/execute.c 2017-01-25 15:27:21.000000000 +0100 +++ new/systemd-232/src/core/execute.c 2017-02-06 15:11:10.000000000 +0100 @@ -1329,7 +1329,11 @@ Iterator i; int r; -#if defined(__i386__) +#if !defined(__x86_64__) + /* Temporarly disable RestrictAddressFamilies on all + * architectures but x86_64. This is currently broken but + * should be fixed once v233 will be released. + * See issue #4575 and bsc#1023460 for details. */ return 0; #endif diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-232/src/journal/journald-server.c new/systemd-232/src/journal/journald-server.c --- old/systemd-232/src/journal/journald-server.c 2017-01-25 15:27:21.000000000 +0100 +++ new/systemd-232/src/journal/journald-server.c 2017-02-06 15:11:10.000000000 +0100 @@ -283,17 +283,16 @@ } static bool flushed_flag_is_set(void) { - return (access("/run/systemd/journal/flushed", F_OK) >= 0); + return access("/run/systemd/journal/flushed", F_OK) >= 0; } static int system_journal_open(Server *s, bool flush_requested) { - bool flushed = false; const char *fn; int r = 0; if (!s->system_journal && - (s->storage == STORAGE_PERSISTENT || s->storage == STORAGE_AUTO) && - (flush_requested || (flushed = flushed_flag_is_set()))) { + IN_SET(s->storage, STORAGE_PERSISTENT, STORAGE_AUTO) && + (flush_requested || flushed_flag_is_set())) { /* If in auto mode: first try to create the machine * path, but not the prefix. @@ -326,8 +325,8 @@ * Perform an implicit flush to var, leaving the runtime * journal closed, now that the system journal is back. */ - if (s->runtime_journal && flushed) - (void) server_flush_to_var(s); + if (!flush_requested) + (void) server_flush_to_var(s, true); } if (!s->runtime_journal && @@ -1183,7 +1182,7 @@ dispatch_message_real(s, iovec, n, m, ucred, tv, label, label_len, unit_id, priority, object_pid); } -int server_flush_to_var(Server *s) { +int server_flush_to_var(Server *s, bool require_flag_file) { sd_id128_t machine; sd_journal *j = NULL; char ts[FORMAT_TIMESPAN_MAX]; @@ -1193,13 +1192,15 @@ assert(s); - if (s->storage != STORAGE_AUTO && - s->storage != STORAGE_PERSISTENT) + if (!IN_SET(s->storage, STORAGE_AUTO, STORAGE_PERSISTENT)) return 0; if (!s->runtime_journal) return 0; + if (require_flag_file && !flushed_flag_is_set()) + return 0; + (void) system_journal_open(s, true); if (!s->system_journal) @@ -1411,7 +1412,7 @@ log_info("Received request to flush runtime journal from PID " PID_FMT, si->ssi_pid); - (void) server_flush_to_var(s); + (void) server_flush_to_var(s, false); server_sync(s); server_vacuum(s, false); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-232/src/journal/journald-server.h new/systemd-232/src/journal/journald-server.h --- old/systemd-232/src/journal/journald-server.h 2017-01-25 15:27:21.000000000 +0100 +++ new/systemd-232/src/journal/journald-server.h 2017-02-06 15:11:10.000000000 +0100 @@ -197,7 +197,7 @@ int server_vacuum(Server *s, bool verbose); void server_rotate(Server *s); int server_schedule_sync(Server *s, int priority); -int server_flush_to_var(Server *s); +int server_flush_to_var(Server *s, bool require_flag_file); void server_maybe_append_tags(Server *s); int server_process_datagram(sd_event_source *es, int fd, uint32_t revents, void *userdata); void server_space_usage_message(Server *s, JournalStorage *storage); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-232/src/journal/journald.c new/systemd-232/src/journal/journald.c --- old/systemd-232/src/journal/journald.c 2017-01-25 15:27:21.000000000 +0100 +++ new/systemd-232/src/journal/journald.c 2017-02-06 15:11:10.000000000 +0100 @@ -52,7 +52,7 @@ goto finish; server_vacuum(&server, false); - server_flush_to_var(&server); + server_flush_to_var(&server, true); server_flush_dev_kmsg(&server); log_debug("systemd-journald running as pid "PID_FMT, getpid()); diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-232/src/libsystemd/sd-event/sd-event.c new/systemd-232/src/libsystemd/sd-event/sd-event.c --- old/systemd-232/src/libsystemd/sd-event/sd-event.c 2017-01-25 15:27:21.000000000 +0100 +++ new/systemd-232/src/libsystemd/sd-event/sd-event.c 2017-02-06 15:11:10.000000000 +0100 @@ -1539,7 +1539,8 @@ assert_return(s, -EINVAL); assert_return(!event_pid_changed(s->event), -ECHILD); - return s->priority; + *priority = s->priority; + return 0; } _public_ int sd_event_source_set_priority(sd_event_source *s, int64_t priority) { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/systemd-232/src/libsystemd/sd-event/test-event.c new/systemd-232/src/libsystemd/sd-event/test-event.c --- old/systemd-232/src/libsystemd/sd-event/test-event.c 2017-01-25 15:27:21.000000000 +0100 +++ new/systemd-232/src/libsystemd/sd-event/test-event.c 2017-02-06 15:11:10.000000000 +0100 @@ -172,6 +172,7 @@ static const char ch = 'x'; int a[2] = { -1, -1 }, b[2] = { -1, -1}, d[2] = { -1, -1}, k[2] = { -1, -1 }; uint64_t event_now; + int64_t priority; assert_se(pipe(a) >= 0); assert_se(pipe(b) >= 0); @@ -209,6 +210,8 @@ assert_se(sd_event_add_exit(e, &q, exit_handler, INT_TO_PTR('g')) >= 0); assert_se(sd_event_source_set_priority(x, 99) >= 0); + assert_se(sd_event_source_get_priority(x, &priority) >= 0); + assert_se(priority == 99); assert_se(sd_event_source_set_enabled(y, SD_EVENT_ONESHOT) >= 0); assert_se(sd_event_source_set_prepare(x, prepare_handler) >= 0); assert_se(sd_event_source_set_priority(z, 50) >= 0); ++++++ systemd-mini-rpmlintrc ++++++ --- /var/tmp/diff_new_pack.290t6b/_old 2017-02-21 13:33:20.864197599 +0100 +++ /var/tmp/diff_new_pack.290t6b/_new 2017-02-21 13:33:20.864197599 +0100 @@ -19,6 +19,7 @@ addFilter("nss-systemd.*shlib-policy-name-error.*") addFilter("nss-myhostname.*shlib-policy-name-error.*") addFilter("nss-mymachines.*shlib-policy-name-error.*") +addFilter("nss-resolve.*shlib-policy-name-error.*") addFilter("systemd-logger.*useless-provides sysvinit(syslog).*") addFilter("devel-file-in-non-devel-package.*/usr/share/pkgconfig/(udev|systemd)\.pc.*") addFilter(".*script-without-shebang.*/usr/lib/udev/rule_generator.functions.*") ++++++ systemd-rpmlintrc ++++++ --- /var/tmp/diff_new_pack.290t6b/_old 2017-02-21 13:33:20.888194214 +0100 +++ /var/tmp/diff_new_pack.290t6b/_new 2017-02-21 13:33:20.888194214 +0100 @@ -19,6 +19,7 @@ addFilter("nss-systemd.*shlib-policy-name-error.*") addFilter("nss-myhostname.*shlib-policy-name-error.*") addFilter("nss-mymachines.*shlib-policy-name-error.*") +addFilter("nss-resolve.*shlib-policy-name-error.*") addFilter("systemd-logger.*useless-provides sysvinit(syslog).*") addFilter("devel-file-in-non-devel-package.*/usr/share/pkgconfig/(udev|systemd)\.pc.*") addFilter(".*script-without-shebang.*/usr/lib/udev/rule_generator.functions.*")