mirror of
https://github.com/systemd/systemd
synced 2026-04-26 17:04:50 +02:00
Compare commits
8 Commits
4374d7eaac
...
fa2ba7aea8
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
fa2ba7aea8 | ||
|
|
e370edbefc | ||
|
|
206c0897a2 | ||
|
|
8e78dca982 | ||
|
|
c66e2f6c2c | ||
|
|
d31b8a66d1 | ||
|
|
52fdbf8ce7 | ||
|
|
eb1446f8f1 |
7
NEWS
7
NEWS
@ -71,6 +71,13 @@ CHANGES WITH 251:
|
|||||||
(as exposed via the SystemCallFilter= setting in service unit files).
|
(as exposed via the SystemCallFilter= setting in service unit files).
|
||||||
It is apparently used by the linker now.
|
It is apparently used by the linker now.
|
||||||
|
|
||||||
|
* The tmpfiles entries that create the /run/systemd/netif directory and
|
||||||
|
its subdirectories were moved from tmpfiles.d/systemd.conf to
|
||||||
|
tmpfiles.d/systemd-network.conf.
|
||||||
|
|
||||||
|
Users might need to adjust their files that override tmpfiles.d/systemd.conf
|
||||||
|
to account for this change.
|
||||||
|
|
||||||
Changes in the Boot Loader Specification, kernel-install and sd-boot:
|
Changes in the Boot Loader Specification, kernel-install and sd-boot:
|
||||||
|
|
||||||
* kernel-install's and bootctl's Boot Loader Specification Type #1
|
* kernel-install's and bootctl's Boot Loader Specification Type #1
|
||||||
|
|||||||
@ -699,6 +699,10 @@ evdev:atkbd:dmi:bvn*:bvr*:bd*:svnHP:pnHPEliteBookFolioG1:*
|
|||||||
KEYBOARD_KEY_64=calendar
|
KEYBOARD_KEY_64=calendar
|
||||||
KEYBOARD_KEY_81=f20
|
KEYBOARD_KEY_81=f20
|
||||||
|
|
||||||
|
# HP EliteBook 845 G7
|
||||||
|
evdev:atkbd:dmi:bvn*:bvr*:bd*:svnHP*:pnHPEliteBook845G7*:pvr*
|
||||||
|
KEYBOARD_KEY_68=unknown # Fn+F12 HP Programmable Key
|
||||||
|
|
||||||
# HP ProBook 650
|
# HP ProBook 650
|
||||||
evdev:atkbd:dmi:bvn*:bvr*:bd*:svnHewlett-Packard*:pnHP*ProBook*650*:*
|
evdev:atkbd:dmi:bvn*:bvr*:bd*:svnHewlett-Packard*:pnHP*ProBook*650*:*
|
||||||
KEYBOARD_KEY_f8=wlan # Wireless HW switch button
|
KEYBOARD_KEY_f8=wlan # Wireless HW switch button
|
||||||
|
|||||||
@ -413,25 +413,25 @@ static sd_network_monitor* FD_TO_MONITOR(int fd) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
static int monitor_add_inotify_watch(int fd) {
|
static int monitor_add_inotify_watch(int fd) {
|
||||||
int k;
|
int wd;
|
||||||
|
|
||||||
k = inotify_add_watch(fd, "/run/systemd/netif/links/", IN_MOVED_TO|IN_DELETE);
|
wd = inotify_add_watch(fd, "/run/systemd/netif/links/", IN_MOVED_TO|IN_DELETE);
|
||||||
if (k >= 0)
|
if (wd >= 0)
|
||||||
return 0;
|
return wd;
|
||||||
else if (errno != ENOENT)
|
else if (errno != ENOENT)
|
||||||
return -errno;
|
return -errno;
|
||||||
|
|
||||||
k = inotify_add_watch(fd, "/run/systemd/netif/", IN_CREATE|IN_ISDIR);
|
wd = inotify_add_watch(fd, "/run/systemd/netif/", IN_CREATE|IN_ISDIR);
|
||||||
if (k >= 0)
|
if (wd >= 0)
|
||||||
return 0;
|
return wd;
|
||||||
else if (errno != ENOENT)
|
else if (errno != ENOENT)
|
||||||
return -errno;
|
return -errno;
|
||||||
|
|
||||||
k = inotify_add_watch(fd, "/run/systemd/", IN_CREATE|IN_ISDIR);
|
wd = inotify_add_watch(fd, "/run/systemd/", IN_CREATE|IN_ISDIR);
|
||||||
if (k < 0)
|
if (wd < 0)
|
||||||
return -errno;
|
return -errno;
|
||||||
|
|
||||||
return 0;
|
return wd;
|
||||||
}
|
}
|
||||||
|
|
||||||
int sd_network_monitor_new(sd_network_monitor **m, const char *category) {
|
int sd_network_monitor_new(sd_network_monitor **m, const char *category) {
|
||||||
@ -470,7 +470,7 @@ sd_network_monitor* sd_network_monitor_unref(sd_network_monitor *m) {
|
|||||||
int sd_network_monitor_flush(sd_network_monitor *m) {
|
int sd_network_monitor_flush(sd_network_monitor *m) {
|
||||||
union inotify_event_buffer buffer;
|
union inotify_event_buffer buffer;
|
||||||
ssize_t l;
|
ssize_t l;
|
||||||
int fd, k;
|
int fd;
|
||||||
|
|
||||||
assert_return(m, -EINVAL);
|
assert_return(m, -EINVAL);
|
||||||
|
|
||||||
@ -486,15 +486,18 @@ int sd_network_monitor_flush(sd_network_monitor *m) {
|
|||||||
|
|
||||||
FOREACH_INOTIFY_EVENT(e, buffer, l) {
|
FOREACH_INOTIFY_EVENT(e, buffer, l) {
|
||||||
if (e->mask & IN_ISDIR) {
|
if (e->mask & IN_ISDIR) {
|
||||||
k = monitor_add_inotify_watch(fd);
|
int wd;
|
||||||
if (k < 0)
|
|
||||||
return k;
|
|
||||||
|
|
||||||
k = inotify_rm_watch(fd, e->wd);
|
wd = monitor_add_inotify_watch(fd);
|
||||||
if (k < 0)
|
if (wd < 0)
|
||||||
|
return wd;
|
||||||
|
|
||||||
|
if (wd != e->wd) {
|
||||||
|
if (inotify_rm_watch(fd, e->wd) < 0)
|
||||||
return -errno;
|
return -errno;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|||||||
@ -752,17 +752,17 @@ install_valgrind() {
|
|||||||
|
|
||||||
local valgrind_bins valgrind_libs valgrind_dbg_and_supp
|
local valgrind_bins valgrind_libs valgrind_dbg_and_supp
|
||||||
|
|
||||||
valgrind_bins="$(strace -e execve valgrind /bin/true 2>&1 >/dev/null | perl -lne 'print $1 if /^execve\("([^"]+)"/')"
|
readarray -t valgrind_bins < <(strace -e execve valgrind /bin/true 2>&1 >/dev/null | perl -lne 'print $1 if /^execve\("([^"]+)"/')
|
||||||
image_install "$valgrind_bins"
|
image_install "${valgrind_bins[@]}"
|
||||||
|
|
||||||
valgrind_libs="$(LD_DEBUG=files valgrind /bin/true 2>&1 >/dev/null | perl -lne 'print $1 if m{calling init: (/.*vgpreload_.*)}')"
|
readarray -t valgrind_libs < <(LD_DEBUG=files valgrind /bin/true 2>&1 >/dev/null | perl -lne 'print $1 if m{calling init: (/.*vgpreload_.*)}')
|
||||||
image_install "$valgrind_libs"
|
image_install "${valgrind_libs[@]}"
|
||||||
|
|
||||||
valgrind_dbg_and_supp="$(
|
readarray -t valgrind_dbg_and_supp < <(
|
||||||
strace -e open valgrind /bin/true 2>&1 >/dev/null |
|
strace -e open valgrind /bin/true 2>&1 >/dev/null |
|
||||||
perl -lne 'if (my ($fname) = /^open\("([^"]+).*= (?!-)\d+/) { print $fname if $fname =~ /debug|\.supp$/ }'
|
perl -lne 'if (my ($fname) = /^open\("([^"]+).*= (?!-)\d+/) { print $fname if $fname =~ /debug|\.supp$/ }'
|
||||||
)"
|
)
|
||||||
image_install "$valgrind_dbg_and_supp"
|
image_install "${valgrind_dbg_and_supp[@]}"
|
||||||
}
|
}
|
||||||
|
|
||||||
create_valgrind_wrapper() {
|
create_valgrind_wrapper() {
|
||||||
@ -772,7 +772,7 @@ create_valgrind_wrapper() {
|
|||||||
#!/usr/bin/env bash
|
#!/usr/bin/env bash
|
||||||
|
|
||||||
mount -t proc proc /proc
|
mount -t proc proc /proc
|
||||||
exec valgrind --leak-check=full --log-file=/valgrind.out $ROOTLIBDIR/systemd "\$@"
|
exec valgrind --leak-check=full --track-fds=yes --log-file=/valgrind.out $ROOTLIBDIR/systemd "\$@"
|
||||||
EOF
|
EOF
|
||||||
chmod 0755 "$valgrind_wrapper"
|
chmod 0755 "$valgrind_wrapper"
|
||||||
}
|
}
|
||||||
|
|||||||
@ -5,12 +5,13 @@ enable_tmpfiles = conf.get('ENABLE_TMPFILES') == 1
|
|||||||
files = [['README', ''],
|
files = [['README', ''],
|
||||||
['home.conf', ''],
|
['home.conf', ''],
|
||||||
['journal-nocow.conf', ''],
|
['journal-nocow.conf', ''],
|
||||||
|
['portables.conf', 'ENABLE_PORTABLED'],
|
||||||
|
['systemd-network.conf', 'ENABLE_NETWORKD'],
|
||||||
['systemd-nologin.conf', 'HAVE_PAM'],
|
['systemd-nologin.conf', 'HAVE_PAM'],
|
||||||
['systemd-nspawn.conf', 'ENABLE_MACHINED'],
|
['systemd-nspawn.conf', 'ENABLE_MACHINED'],
|
||||||
|
['systemd-pstore.conf', 'ENABLE_PSTORE'],
|
||||||
['systemd-resolve.conf', 'ENABLE_RESOLVE'],
|
['systemd-resolve.conf', 'ENABLE_RESOLVE'],
|
||||||
['systemd-tmp.conf', ''],
|
['systemd-tmp.conf', ''],
|
||||||
['portables.conf', 'ENABLE_PORTABLED'],
|
|
||||||
['systemd-pstore.conf', 'ENABLE_PSTORE'],
|
|
||||||
['tmp.conf', ''],
|
['tmp.conf', ''],
|
||||||
['x11.conf', ''],
|
['x11.conf', ''],
|
||||||
]
|
]
|
||||||
|
|||||||
13
tmpfiles.d/systemd-network.conf
Normal file
13
tmpfiles.d/systemd-network.conf
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
# This file is part of systemd.
|
||||||
|
#
|
||||||
|
# systemd is free software; you can redistribute it and/or modify it
|
||||||
|
# under the terms of the GNU Lesser General Public License as published by
|
||||||
|
# the Free Software Foundation; either version 2.1 of the License, or
|
||||||
|
# (at your option) any later version.
|
||||||
|
|
||||||
|
# See tmpfiles.d(5) for details
|
||||||
|
|
||||||
|
d /run/systemd/netif 0755 systemd-network systemd-network -
|
||||||
|
d /run/systemd/netif/links 0755 systemd-network systemd-network -
|
||||||
|
d /run/systemd/netif/leases 0755 systemd-network systemd-network -
|
||||||
|
d /run/systemd/netif/lldp 0755 systemd-network systemd-network -
|
||||||
@ -18,12 +18,6 @@ d /run/systemd/sessions 0755 root root -
|
|||||||
d /run/systemd/users 0755 root root -
|
d /run/systemd/users 0755 root root -
|
||||||
d /run/systemd/machines 0755 root root -
|
d /run/systemd/machines 0755 root root -
|
||||||
d /run/systemd/shutdown 0755 root root -
|
d /run/systemd/shutdown 0755 root root -
|
||||||
{% if ENABLE_NETWORKD %}
|
|
||||||
d /run/systemd/netif 0755 systemd-network systemd-network -
|
|
||||||
d /run/systemd/netif/links 0755 systemd-network systemd-network -
|
|
||||||
d /run/systemd/netif/leases 0755 systemd-network systemd-network -
|
|
||||||
d /run/systemd/netif/lldp 0755 systemd-network systemd-network -
|
|
||||||
{% endif %}
|
|
||||||
|
|
||||||
d /run/log 0755 root root -
|
d /run/log 0755 root root -
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user