2012-01-25 05:20:38 +04:00
systemd System and Service Manager
2010-05-13 05:30:21 +04:00
DETAILS:
http://0pointer.de/blog/projects/systemd.html
WEB SITE:
2017-02-21 17:56:04 +03:00
https://www.freedesktop.org/wiki/Software/systemd
2010-05-13 05:30:21 +04:00
GIT:
2015-06-03 01:57:50 +03:00
git@github.com:systemd/systemd.git
https://github.com/systemd/systemd
2010-05-13 05:30:21 +04:00
MAILING LIST:
2017-02-21 17:56:04 +03:00
https://lists.freedesktop.org/mailman/listinfo/systemd-devel
2010-05-13 05:30:21 +04:00
IRC:
2021-05-25 13:09:05 +03:00
#systemd on irc.libera.chat
2010-05-13 05:30:21 +04:00
BUG REPORTS:
2015-06-03 01:57:50 +03:00
https://github.com/systemd/systemd/issues
2010-05-13 05:30:21 +04:00
AUTHOR:
2012-04-12 02:20:58 +04:00
Lennart Poettering
Kay Sievers
...and many others
2010-05-13 05:30:21 +04:00
2011-07-15 01:53:53 +04:00
LICENSE:
2021-09-29 20:42:57 +03:00
LGPL-2.1-or-later for all code, exceptions noted in LICENSES/README.md
2011-07-15 01:53:53 +04:00
2010-05-13 05:30:21 +04:00
REQUIREMENTS:
2017-03-02 21:11:37 +03:00
Linux kernel >= 3.13
2015-09-06 16:58:20 +03:00
Linux kernel >= 4.2 for unified cgroup hierarchy support
2020-11-28 04:54:02 +03:00
Linux kernel >= 4.10 for cgroup-bpf egress and ingress hooks
Linux kernel >= 4.15 for cgroup-bpf device hook
Linux kernel >= 4.17 for cgroup-bpf socket address hooks
Linux kernel >= 5.3 for bounded-loops in BPF program
2020-06-02 17:35:58 +03:00
Linux kernel >= 5.4 for signed Verity images support
2020-12-22 22:27:50 +03:00
Linux kernel >= 5.7 for BPF links and the BPF LSM hook
2014-03-22 21:27:35 +04:00
Kernel Config Options:
2013-03-06 22:36:39 +04:00
CONFIG_DEVTMPFS
2014-05-03 21:15:23 +04:00
CONFIG_CGROUPS (it is OK to disable all controllers)
2013-03-06 22:36:39 +04:00
CONFIG_INOTIFY_USER
CONFIG_SIGNALFD
CONFIG_TIMERFD
CONFIG_EPOLL
2021-02-16 19:26:51 +03:00
CONFIG_UNIX (it requires CONFIG_NET, but every other flag in it is not necessary)
2013-03-06 22:36:39 +04:00
CONFIG_SYSFS
2013-12-09 19:04:06 +04:00
CONFIG_PROC_FS
2014-02-15 20:21:49 +04:00
CONFIG_FHANDLE (libudev, mount and bind mount handling)
2013-03-06 22:36:39 +04:00
2017-02-26 06:42:27 +03:00
Kernel crypto/hash API
CONFIG_CRYPTO_USER_API_HASH
CONFIG_CRYPTO_HMAC
CONFIG_CRYPTO_SHA256
2014-08-30 13:34:20 +04:00
udev will fail to work with the legacy sysfs layout:
2013-03-06 23:01:45 +04:00
CONFIG_SYSFS_DEPRECATED=n
2013-03-06 22:36:39 +04:00
Legacy hotplug slows down the system and confuses udev:
CONFIG_UEVENT_HELPER_PATH=""
2014-08-30 13:34:20 +04:00
Userspace firmware loading is not supported and should
be disabled in the kernel:
2013-03-06 22:36:39 +04:00
CONFIG_FW_LOADER_USER_HELPER=n
Some udev rules and virtualization detection relies on it:
CONFIG_DMIID
2013-09-15 09:29:25 +04:00
Support for some SCSI devices serial number retrieval, to
create additional symlinks in /dev/disk/ and /dev/tape:
CONFIG_BLK_DEV_BSG
2018-01-15 19:55:11 +03:00
Required for PrivateNetwork= in service units:
2014-03-31 22:28:23 +04:00
CONFIG_NET_NS
2014-12-30 17:57:01 +03:00
Note that systemd-localed.service and other systemd units use
2018-01-15 19:55:11 +03:00
PrivateNetwork so this is effectively required.
2014-03-31 22:28:23 +04:00
2017-02-06 23:13:21 +03:00
Required for PrivateUsers= in service units:
2017-01-24 05:18:07 +03:00
CONFIG_USER_NS
2013-03-06 22:36:39 +04:00
Optional but strongly recommended:
CONFIG_IPV6
2021-06-24 18:30:51 +03:00
CONFIG_AUTOFS_FS
2013-03-06 22:36:39 +04:00
CONFIG_TMPFS_XATTR
2018-01-04 10:53:44 +03:00
CONFIG_{TMPFS,EXT4_FS,XFS,BTRFS_FS,...}_POSIX_ACL
2013-03-06 23:01:45 +04:00
CONFIG_SECCOMP
2016-09-06 01:16:13 +03:00
CONFIG_SECCOMP_FILTER (required for seccomp support)
2015-05-18 17:35:24 +03:00
CONFIG_CHECKPOINT_RESTORE (for the kcmp() syscall)
2013-03-06 22:36:39 +04:00
2015-07-11 20:18:35 +03:00
Required for CPUShares= in resource control unit settings
2014-06-11 01:29:30 +04:00
CONFIG_CGROUP_SCHED
CONFIG_FAIR_GROUP_SCHED
2015-07-11 20:18:35 +03:00
Required for CPUQuota= in resource control unit settings
2014-11-18 18:13:43 +03:00
CONFIG_CFS_BANDWIDTH
2020-11-28 04:54:02 +03:00
Required for IPAddressDeny=, IPAddressAllow=, IPIngressFilterPath=,
IPEgressFilterPath= in resource control unit settings
2017-11-22 01:54:20 +03:00
unit settings
2020-11-28 04:54:02 +03:00
CONFIG_BPF
CONFIG_BPF_SYSCALL
CONFIG_BPF_JIT
CONFIG_HAVE_EBPF_JIT
CONFIG_CGROUP_BPF
2021-07-13 19:03:31 +03:00
Required for SocketBind{Allow|Deny}=, RestrictNetworkInterfaces= in
resource control unit settings
2020-11-28 04:54:02 +03:00
CONFIG_BPF
CONFIG_BPF_SYSCALL
CONFIG_BPF_JIT
CONFIG_HAVE_EBPF_JIT
2017-11-22 01:54:20 +03:00
CONFIG_CGROUP_BPF
2013-03-06 23:01:45 +04:00
For UEFI systems:
2014-03-22 04:41:12 +04:00
CONFIG_EFIVAR_FS
2013-03-06 23:01:45 +04:00
CONFIG_EFI_PARTITION
2020-06-02 17:35:58 +03:00
Required for signed Verity images support:
CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG
2020-12-22 22:27:50 +03:00
Required for RestrictFileSystems= in service units:
CONFIG_BPF
CONFIG_BPF_SYSCALL
CONFIG_BPF_LSM
CONFIG_DEBUG_INFO_BTF
CONFIG_LSM="...,bpf" or kernel booted with lsm="...,bpf".
2015-07-11 20:18:35 +03:00
We recommend to turn off Real-Time group scheduling in the
kernel when using systemd. RT group scheduling effectively
makes RT scheduling unavailable for most userspace, since it
requires explicit assignment of RT budgets to each unit whose
processes making use of RT. As there's no sensible way to
assign these budgets automatically this cannot really be
fixed, and it's best to disable group scheduling hence.
CONFIG_RT_GROUP_SCHED=n
2017-07-24 12:28:04 +03:00
It's a good idea to disable the implicit creation of networking bonding
devices by the kernel networking bonding module, so that the
automatically created "bond0" interface doesn't conflict with any such
2017-08-02 15:41:18 +03:00
device created by systemd-networkd (or other tools). Ideally there
would be a kernel compile-time option for this, but there currently
isn't. The next best thing is to make this change through a modprobe.d
drop-in. This is shipped by default, see modprobe.d/systemd.conf.
2017-07-24 12:28:04 +03:00
2018-01-15 19:55:11 +03:00
Required for systemd-nspawn:
CONFIG_DEVPTS_MULTIPLE_INSTANCES or Linux kernel >= 4.7
2021-02-23 13:06:58 +03:00
Required for systemd-oomd:
CONFIG_PSI
2013-05-10 02:14:12 +04:00
Note that kernel auditing is broken when used with systemd's
container code. When using systemd in conjunction with
2013-10-22 03:50:48 +04:00
containers, please make sure to either turn off auditing at
2013-05-10 02:14:12 +04:00
runtime using the kernel command line option "audit=0", or
turn it off at kernel compile time using:
CONFIG_AUDIT=n
2014-03-11 08:40:36 +04:00
If systemd is compiled with libseccomp support on
architectures which do not use socketcall() and where seccomp
is supported (this effectively means x86-64 and ARM, but
2014-05-03 21:15:24 +04:00
excludes 32-bit x86!), then nspawn will now install a
2014-03-11 08:40:36 +04:00
work-around seccomp filter that makes containers boot even
with audit being enabled. This works correctly only on kernels
3.14 and newer though. TL;DR: turn audit off, still.
2013-05-10 02:14:12 +04:00
2015-04-10 20:39:17 +03:00
glibc >= 2.16
2011-02-16 21:09:11 +03:00
libcap
2017-09-15 15:47:57 +03:00
libmount >= 2.30 (from util-linux)
(util-linux *must* be built without --enable-libmount-support-mtab)
2016-10-05 14:58:55 +03:00
libseccomp >= 2.3.1 (optional)
2014-12-13 03:56:56 +03:00
libblkid >= 2.24 (from util-linux) (optional)
2013-10-17 21:49:19 +04:00
libkmod >= 15 (optional)
2011-02-16 21:09:11 +03:00
PAM >= 1.1.2 (optional)
2020-06-02 17:35:58 +03:00
libcryptsetup (optional), >= 2.3.0 required for signed Verity images support
2011-02-16 21:09:11 +03:00
libaudit (optional)
2011-07-12 15:57:48 +04:00
libacl (optional)
2020-11-28 04:54:02 +03:00
libbpf >= 0.2.0 (optional)
2020-08-18 09:09:38 +03:00
libfdisk >= 2.33 (from util-linux) (optional)
2011-02-16 21:09:11 +03:00
libselinux (optional)
2011-07-12 15:57:48 +04:00
liblzma (optional)
2018-10-29 20:32:51 +03:00
liblz4 >= 1.3.0 / 130 (optional)
2020-04-12 02:09:05 +03:00
libzstd >= 1.4.0 (optional)
2012-09-28 02:46:32 +04:00
libgcrypt (optional)
libqrencode (optional)
libmicrohttpd (optional)
2012-11-22 18:30:50 +04:00
libpython (optional)
2017-05-10 04:56:34 +03:00
libidn2 or libidn (optional)
2019-10-29 22:26:05 +03:00
gnutls >= 3.1.4 (optional, >= 3.6.0 is required to support DNS-over-TLS with gnutls)
2018-07-27 00:47:50 +03:00
openssl >= 1.1.0 (optional, required to support DNS-over-TLS with openssl)
2014-06-23 14:42:17 +04:00
elfutils >= 158 (optional)
2017-11-13 23:54:45 +03:00
polkit (optional)
2019-02-28 17:37:06 +03:00
tzdata >= 2014f (optional)
2017-07-03 03:21:34 +03:00
pkg-config
2017-08-06 01:30:37 +03:00
gperf
2017-07-03 03:21:34 +03:00
docbook-xsl (optional, required for documentation)
xsltproc (optional, required for documentation)
2021-05-16 16:31:00 +03:00
python-jinja2
2017-07-03 03:21:34 +03:00
python-lxml (optional, required to build the indices)
2019-01-13 03:42:28 +03:00
python >= 3.5
rpm: use a helper script to actually invoke systemctl commands
Instead of embedding the commands to invoke directly in the macros,
let's use a helper script as indirection. This has a couple of advantages:
- the macro language is awkward, we need to suffix most commands by "|| :"
and "\", which is easy to get wrong. In the new scheme, the macro becomes
a single simple command.
- in the script we can use normal syntax highlighting, shellcheck, etc.
- it's also easier to test the invoked commands by invoking the helper
manually.
- most importantly, the logic is contained in the helper, i.e. we can
update systemd rpm and everything uses the new helper. Before, we would
have to rebuild all packages to update the macro definition.
This raises the question whether it makes sense to use the lua scriptlets when
the real work is done in a bash script. I think it's OK: we still have the
efficient lua scripts that do the short scripts, and we use a single shared
implementation in bash to do the more complex stuff.
The meson version is raised to 0.47 because that's needed for install_mode.
We were planning to raise the required version anyway…
2021-07-22 12:22:33 +03:00
meson >= 0.47 (>= 0.49 is required to build position-independent executables)
2019-01-13 03:42:28 +03:00
ninja
Drop dependency on m4
m4 was hugely popular in the past, because autotools, automake, flex, bison and
many other things used it. But nowadays it much less popular, and might not even
be installed in the buildroot. (m4 is small, so it doesn't make a big difference.)
(FWIW, Fedora dropped make from the buildroot now,
https://fedoraproject.org/wiki/Changes/Remove_make_from_BuildRoot. I think it's
reasonable to assume that m4 will be dropped at some point too.)
The main reason to drop m4 is that the syntax is not very nice, and we should
minimize the number of different syntaxes that we use. We still have two
(configure_file() with @FOO@ and jinja2 templates with {{foo}} and the
pythonesque conditional expressions), but at least we don't need m4 (with
m4_dnl and `quotes').
2021-05-16 16:20:46 +03:00
gcc, awk, sed, grep, and similar tools
2020-11-28 04:54:02 +03:00
clang >= 10.0, llvm >= 10.0 (optional, required to build BPF programs
from source code in C)
2012-11-22 18:30:50 +04:00
2013-10-22 03:50:48 +04:00
During runtime, you need the following additional
dependencies:
2012-11-22 18:30:50 +04:00
2015-11-02 19:05:20 +03:00
util-linux >= v2.27.1 required
2019-12-20 14:26:17 +03:00
dbus >= 1.4.0 (strictly speaking optional, but recommended)
NOTE: If using dbus < 1.9.18, you should override the default
policy directory (--with-dbuspolicydir=/etc/dbus-1/system.d).
2012-11-22 18:30:50 +04:00
dracut (optional)
2018-07-16 13:44:24 +03:00
polkit (optional)
2011-02-16 21:09:11 +03:00
2017-04-19 04:52:30 +03:00
To build in directory build/:
2020-12-11 13:33:39 +03:00
meson setup build/ && meson compile -C build/
2017-04-19 04:52:30 +03:00
2019-04-27 03:22:40 +03:00
Any configuration options can be specified as -Darg=value... arguments
2017-04-19 04:52:30 +03:00
to meson. After the build directory is initially configured, meson will
refuse to run again, and options must be changed with:
2021-01-11 16:04:33 +03:00
meson configure -Darg=value build/
meson configure without any arguments will print out available options and
2017-04-19 04:52:30 +03:00
their current values.
Useful commands:
2020-12-11 13:33:39 +03:00
meson compile -v -C build/ some/target
meson test -C build/
sudo meson install -C build/
DESTDIR=... meson install -C build/
2017-04-19 04:52:30 +03:00
2017-07-03 03:21:34 +03:00
A tarball can be created with:
2015-06-23 14:40:53 +03:00
git archive --format=tar --prefix=systemd-222/ v222 | xz > systemd-222.tar.xz
2013-10-22 03:50:48 +04:00
When systemd-hostnamed is used, it is strongly recommended to
install nss-myhostname to ensure that, in a world of
dynamically changing hostnames, the hostname stays resolvable
2011-05-17 21:35:56 +04:00
under all circumstances. In fact, systemd-hostnamed will warn
2013-01-24 13:31:34 +04:00
if nss-myhostname is not installed.
2011-05-17 21:35:56 +04:00
2017-11-17 13:39:14 +03:00
nss-systemd must be enabled on systemd systems, as that's required for
DynamicUser= to work. Note that we ship services out-of-the-box that
make use of DynamicUser= now, hence enabling nss-systemd is not
optional.
2018-07-16 13:18:36 +03:00
Note that the build prefix for systemd must be /usr. (Moreover,
packages systemd relies on — such as D-Bus — really should use the same
prefix, otherwise you are on your own.) -Dsplit-usr=false (which is the
Deprecate builds with split-usr, prepare for removal
There is no technical reason to support systems with split-usr, except for
backwards compatibility. Even though systemd itself makes an effort to support
this, many other tools aren't as careful. Despite those efforts, we
(collectively) get it wrong often, because doing it "wrong" on systems with
merged-usr has no consequences. Since almost all developers are on such
systems, any issues are only discovered late. Supporting this split-usr mode
makes both code and documentation more complicated. The split is purely
artificial and has no justification except to allow old installation to not
update. Mechanisms to update existing systems are available though: Fedora
did that in https://fedoraproject.org/wiki/Features/UsrMove, Debian has
the usrmerge package.
The next version of Debian will only support systems with split-usr=false,
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978636#178:
The Technical Committee resolves that Debian 'bookworm' should
support only the merged-usr root filesystem layout, dropping support
for the non-merged-usr layout.
Let's start warning if split-usr mode is used, in preparation to removing the
split in one of the future releases.
2021-02-03 12:20:49 +03:00
default and does not need to be specified) is the recommended setting.
-Dsplit-usr=true can be used to give a semblance of support for systems
with programs installed split between / and /usr. Moving everything
under /usr is strongly encouraged.
2017-11-17 13:39:14 +03:00
2016-10-16 03:51:19 +03:00
Additional packages are necessary to run some tests:
- busybox (used by test/TEST-13-NSPAWN-SMOKE)
- nc (used by test/TEST-12-ISSUE-3171)
- python3-pyparsing
- python3-evdev (used by hwdb parsing tests)
- strace (used by test/test-functions)
2017-02-12 08:22:20 +03:00
- capsh (optional, used by test-execute)
2016-10-16 03:51:19 +03:00
2013-03-05 21:53:21 +04:00
USERS AND GROUPS:
2013-03-05 22:15:31 +04:00
Default udev rules use the following standard system group
names, which need to be resolvable by getgrnam() at any time,
even in the very early boot stages, where no other databases
and network are available:
2017-11-20 14:30:42 +03:00
audio, cdrom, dialout, disk, input, kmem, kvm, lp, render, tape, tty, video
2013-03-05 22:04:48 +04:00
2013-10-22 03:50:48 +04:00
During runtime, the journal daemon requires the
2013-03-05 22:19:26 +04:00
"systemd-journal" system group to exist. New journal files will
2013-10-22 03:50:48 +04:00
be readable by this group (but not writable), which may be used
2015-01-18 23:05:40 +03:00
to grant specific users read access. In addition, system
groups "wheel" and "adm" will be given read-only access to
journal files using systemd-tmpfiles.service.
2013-03-05 21:53:21 +04:00
2018-05-01 09:15:44 +03:00
The journal remote daemon requires the
"systemd-journal-remote" system user and group to
2013-03-05 22:15:31 +04:00
exist. During execution this network facing service will drop
privileges and assume this uid/gid for security reasons.
2014-06-28 02:48:28 +04:00
Similarly, the network management daemon requires the
2014-06-04 13:17:32 +04:00
"systemd-network" system user and group to exist.
2014-06-28 02:48:28 +04:00
Similarly, the name resolution daemon requires the
2014-06-04 13:17:32 +04:00
"systemd-resolve" system user and group to exist.
2016-02-09 01:35:24 +03:00
Similarly, the coredump support requires the
"systemd-coredump" system user and group to exist.
2014-08-19 23:55:10 +04:00
NSS:
2016-07-14 20:19:49 +03:00
systemd ships with four glibc NSS modules:
2014-08-19 23:55:10 +04:00
2020-07-07 22:58:12 +03:00
nss-myhostname resolves the local hostname to locally configured IP
addresses, as well as "localhost" to 127.0.0.1/::1.
2014-08-19 23:55:10 +04:00
2020-07-07 22:58:12 +03:00
nss-resolve enables DNS resolution via the systemd-resolved DNS/LLMNR
caching stub resolver "systemd-resolved".
2014-08-19 23:55:10 +04:00
2016-07-14 20:19:49 +03:00
nss-mymachines enables resolution of all local containers registered
2020-07-07 22:58:12 +03:00
with machined to their respective IP addresses.
2014-08-19 23:55:10 +04:00
2020-07-07 22:58:12 +03:00
nss-systemd enables resolution of users/group registered via the
2021-02-19 02:14:52 +03:00
User/Group Record Lookup API (https://systemd.io/USER_GROUP_API),
2020-07-07 22:58:12 +03:00
including all dynamically allocated service users. (See the
DynamicUser= setting in unit files.)
2014-08-19 23:55:10 +04:00
2016-07-14 20:19:49 +03:00
To make use of these NSS modules, please add them to the "hosts:",
"passwd:" and "group:" lines in /etc/nsswitch.conf. The "resolve"
module should replace the glibc "dns" module in this file (and don't
worry, it chain-loads the "dns" module if it can't talk to resolved).
2014-08-19 23:55:10 +04:00
2016-07-14 20:19:49 +03:00
The four modules should be used in the following order:
2020-07-07 22:58:12 +03:00
passwd: compat systemd
group: compat systemd
2018-05-01 09:18:10 +03:00
hosts: files mymachines resolve [!UNAVAIL=return] dns myhostname
2014-08-19 23:55:10 +04:00
2015-05-27 18:04:49 +03:00
SYSV INIT.D SCRIPTS:
When calling "systemctl enable/disable/is-enabled" on a unit which is a
SysV init.d script, it calls /usr/lib/systemd/systemd-sysv-install;
this needs to translate the action into the distribution specific
mechanism such as chkconfig or update-rc.d. Packagers need to provide
this script if you need this functionality (you don't if you disabled
SysV init support).
Please see src/systemctl/systemd-sysv-install.SKELETON for how this
needs to look like, and provide an implementation at the marked places.
2011-02-23 03:12:07 +03:00
WARNINGS:
2017-11-17 13:39:48 +03:00
systemd will warn during early boot if /usr is not already mounted at
this point (that means: either located on the same file system as / or
already mounted in the initrd). While in systemd itself very little
will break if /usr is on a separate, late-mounted partition, many of
its dependencies very likely will break sooner or later in one form or
another. For example, udev rules tend to refer to binaries in /usr,
binaries that link to libraries in /usr or binaries that refer to data
files in /usr. Since these breakages are not always directly visible,
systemd will warn about this, since this kind of file system setup is
not really supported anymore by the basic set of Linux OS components.
2011-03-02 01:44:26 +03:00
2014-02-26 05:54:37 +04:00
systemd requires that the /run mount point exists. systemd also
2015-05-30 11:31:41 +03:00
requires that /var/run is a symlink to /run.
2014-02-26 05:54:37 +04:00
2011-03-04 07:07:01 +03:00
For more information on this issue consult
2017-02-21 20:26:23 +03:00
https://www.freedesktop.org/wiki/Software/systemd/separate-usr-is-broken
2011-03-04 07:07:01 +03:00
2018-05-13 23:28:24 +03:00
To run systemd under valgrind, compile with meson option
-Dvalgrind=true and have valgrind development headers installed
(i.e. valgrind-devel or equivalent). Otherwise, false positives will be
triggered by code which violates some rules but is actually safe. Note
that valgrind generates nice output only on exit(), hence on shutdown
we don't execve() systemd-shutdown.
2014-11-06 17:27:13 +03:00
2019-02-15 22:05:04 +03:00
STABLE BRANCHES AND BACKPORTS:
2020-08-16 19:25:18 +03:00
Stable branches with backported patches are available in the
systemd-stable repo at https://github.com/systemd/systemd-stable.
Stable branches are started for certain releases of systemd and named
after them, e.g. v238-stable. Stable branches are managed by
distribution maintainers on an as needed basis. See
https://www.freedesktop.org/wiki/Software/systemd/Backports/ for some
more information and examples.