2012-01-25 05:20:38 +04:00
systemd System and Service Manager
2010-05-13 05:30:21 +04:00
WEB SITE:
2022-01-12 12:33:57 +03:00
https://systemd.io
2010-05-13 05:30:21 +04:00
GIT:
2015-06-03 01:57:50 +03:00
git@github.com:systemd/systemd.git
https://github.com/systemd/systemd
2010-05-13 05:30:21 +04:00
MAILING LIST:
2017-02-21 17:56:04 +03:00
https://lists.freedesktop.org/mailman/listinfo/systemd-devel
2010-05-13 05:30:21 +04:00
IRC:
2021-05-25 13:09:05 +03:00
#systemd on irc.libera.chat
2010-05-13 05:30:21 +04:00
BUG REPORTS:
2015-06-03 01:57:50 +03:00
https://github.com/systemd/systemd/issues
2010-05-13 05:30:21 +04:00
2022-01-12 12:33:57 +03:00
OLDER DOCUMENTATION:
2022-11-12 04:04:19 +03:00
https://0pointer.de/blog/projects/systemd.html
2022-01-12 12:33:57 +03:00
https://www.freedesktop.org/wiki/Software/systemd
2010-05-13 05:30:21 +04:00
AUTHOR:
2012-04-12 02:20:58 +04:00
Lennart Poettering
Kay Sievers
...and many others
2010-05-13 05:30:21 +04:00
2011-07-15 01:53:53 +04:00
LICENSE:
2021-09-29 20:42:57 +03:00
LGPL-2.1-or-later for all code, exceptions noted in LICENSES/README.md
2011-07-15 01:53:53 +04:00
2010-05-13 05:30:21 +04:00
REQUIREMENTS:
2024-12-12 15:42:12 +03:00
Linux kernel ≥ 4.3
2022-04-05 11:24:27 +03:00
≥ 4.5 for pids controller in cgroup v2
≥ 4.6 for cgroup namespaces
≥ 4.9 for RENAME_NOREPLACE support in vfat
≥ 4.10 for cgroup-bpf egress and ingress hooks
≥ 4.15 for cgroup-bpf device hook and cpu controller in cgroup v2
≥ 4.17 for cgroup-bpf socket address hooks
2022-04-07 12:23:32 +03:00
≥ 4.20 for PSI (used by systemd-oomd)
2022-04-05 11:24:27 +03:00
≥ 5.3 for bounded loops in BPF program
2024-10-15 19:36:51 +03:00
≥ 5.4 for pidfd and signed Verity images
≥ 5.7 for CLONE_INTO_CGROUP, BPF links and the BPF LSM hook
2022-04-05 11:24:27 +03:00
2024-12-12 15:42:12 +03:00
⛔ Kernel versions below 4.3 ("minimum baseline") are not supported at
2022-09-07 11:16:04 +03:00
all, and are missing required functionality (e.g. CLOCK_BOOTTIME
2024-12-13 21:08:16 +03:00
support for timerfd_create(), ambient capabilities, or memfd_create()).
2022-09-06 17:58:17 +03:00
2024-10-15 19:36:51 +03:00
⚠️ Kernel versions below 5.4 ("recommended baseline") have significant
2022-09-06 17:58:17 +03:00
gaps in functionality and are not recommended for use with this version
2024-10-15 19:36:51 +03:00
of systemd (e.g. lack race-free process tracking by pidfd and new mount API
2022-09-06 17:58:17 +03:00
support). Taint flag 'old-kernel' will be set. systemd will most likely
still function, but upstream support and testing are limited.
2014-03-22 21:27:35 +04:00
Kernel Config Options:
2013-03-06 22:36:39 +04:00
CONFIG_DEVTMPFS
2014-05-03 21:15:23 +04:00
CONFIG_CGROUPS (it is OK to disable all controllers)
2013-03-06 22:36:39 +04:00
CONFIG_INOTIFY_USER
CONFIG_SIGNALFD
CONFIG_TIMERFD
CONFIG_EPOLL
2021-02-16 19:26:51 +03:00
CONFIG_UNIX (it requires CONFIG_NET, but every other flag in it is not necessary)
2013-03-06 22:36:39 +04:00
CONFIG_SYSFS
2013-12-09 19:04:06 +04:00
CONFIG_PROC_FS
2014-02-15 20:21:49 +04:00
CONFIG_FHANDLE (libudev, mount and bind mount handling)
2013-03-06 22:36:39 +04:00
2014-08-30 13:34:20 +04:00
udev will fail to work with the legacy sysfs layout:
2013-03-06 23:01:45 +04:00
CONFIG_SYSFS_DEPRECATED=n
2013-03-06 22:36:39 +04:00
Legacy hotplug slows down the system and confuses udev:
CONFIG_UEVENT_HELPER_PATH=""
2022-05-16 20:22:11 +03:00
Userspace firmware loading is not supported and should be disabled in
the kernel:
2013-03-06 22:36:39 +04:00
CONFIG_FW_LOADER_USER_HELPER=n
Some udev rules and virtualization detection relies on it:
CONFIG_DMIID
2022-05-16 20:22:11 +03:00
Support for some SCSI devices serial number retrieval, to create
additional symlinks in /dev/disk/ and /dev/tape:
2013-09-15 09:29:25 +04:00
CONFIG_BLK_DEV_BSG
2018-01-15 19:55:11 +03:00
Required for PrivateNetwork= in service units:
2014-03-31 22:28:23 +04:00
CONFIG_NET_NS
2014-12-30 17:57:01 +03:00
Note that systemd-localed.service and other systemd units use
2018-01-15 19:55:11 +03:00
PrivateNetwork so this is effectively required.
2014-03-31 22:28:23 +04:00
2017-02-06 23:13:21 +03:00
Required for PrivateUsers= in service units:
2017-01-24 05:18:07 +03:00
CONFIG_USER_NS
2013-03-06 22:36:39 +04:00
Optional but strongly recommended:
CONFIG_IPV6
2021-06-24 18:30:51 +03:00
CONFIG_AUTOFS_FS
2013-03-06 22:36:39 +04:00
CONFIG_TMPFS_XATTR
2018-01-04 10:53:44 +03:00
CONFIG_{TMPFS,EXT4_FS,XFS,BTRFS_FS,...}_POSIX_ACL
2013-03-06 23:01:45 +04:00
CONFIG_SECCOMP
2016-09-06 01:16:13 +03:00
CONFIG_SECCOMP_FILTER (required for seccomp support)
2022-05-16 20:22:11 +03:00
CONFIG_KCMP (for the kcmp() syscall, used to be under
CONFIG_CHECKPOINT_RESTORE before ~5.12)
2024-02-22 21:03:06 +03:00
CONFIG_NET_SCHED
CONFIG_NET_SCH_FQ_CODEL
2013-03-06 22:36:39 +04:00
2022-05-16 20:22:11 +03:00
Required for CPUShares= in resource control unit settings:
2014-06-11 01:29:30 +04:00
CONFIG_CGROUP_SCHED
CONFIG_FAIR_GROUP_SCHED
2022-05-16 20:22:11 +03:00
Required for CPUQuota= in resource control unit settings:
2014-11-18 18:13:43 +03:00
CONFIG_CFS_BANDWIDTH
2020-11-28 04:54:02 +03:00
Required for IPAddressDeny=, IPAddressAllow=, IPIngressFilterPath=,
2022-05-16 20:22:11 +03:00
IPEgressFilterPath= in resource control unit settings unit settings:
2020-11-28 04:54:02 +03:00
CONFIG_BPF
CONFIG_BPF_SYSCALL
CONFIG_BPF_JIT
CONFIG_HAVE_EBPF_JIT
CONFIG_CGROUP_BPF
2021-07-13 19:03:31 +03:00
Required for SocketBind{Allow|Deny}=, RestrictNetworkInterfaces= in
2022-05-16 20:22:11 +03:00
resource control unit settings:
2020-11-28 04:54:02 +03:00
CONFIG_BPF
CONFIG_BPF_SYSCALL
CONFIG_BPF_JIT
CONFIG_HAVE_EBPF_JIT
2017-11-22 01:54:20 +03:00
CONFIG_CGROUP_BPF
2013-03-06 23:01:45 +04:00
For UEFI systems:
2014-03-22 04:41:12 +04:00
CONFIG_EFIVAR_FS
2013-03-06 23:01:45 +04:00
CONFIG_EFI_PARTITION
2020-06-02 17:35:58 +03:00
Required for signed Verity images support:
CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG
2024-07-04 18:58:46 +03:00
Required to verify signed Verity images using keys enrolled in the MOK
(Machine-Owner Key) and DB UEFI certificate stores:
2022-11-12 04:07:13 +03:00
CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG_SECONDARY_KEYRING
2024-07-04 18:58:46 +03:00
CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG_PLATFORM_KEYRING
2022-11-12 04:07:13 +03:00
CONFIG_IMA_ARCH_POLICY
CONFIG_INTEGRITY_MACHINE_KEYRING
2020-06-02 17:35:58 +03:00
2023-12-04 13:13:59 +03:00
Required for reading credentials from SMBIOS:
CONFIG_DMI
CONFIG_DMI_SYSFS
2020-12-22 22:27:50 +03:00
Required for RestrictFileSystems= in service units:
CONFIG_BPF
CONFIG_BPF_SYSCALL
CONFIG_BPF_LSM
CONFIG_DEBUG_INFO_BTF
CONFIG_LSM="...,bpf" or kernel booted with lsm="...,bpf".
2022-05-16 20:22:11 +03:00
We recommend to turn off Real-Time group scheduling in the kernel when
using systemd. RT group scheduling effectively makes RT scheduling
unavailable for most userspace, since it requires explicit assignment of
RT budgets to each unit whose processes making use of RT. As there's no
sensible way to assign these budgets automatically this cannot really be
fixed, and it's best to disable group scheduling hence:
2015-07-11 20:18:35 +03:00
CONFIG_RT_GROUP_SCHED=n
2017-07-24 12:28:04 +03:00
It's a good idea to disable the implicit creation of networking bonding
devices by the kernel networking bonding module, so that the
automatically created "bond0" interface doesn't conflict with any such
2022-05-16 20:22:11 +03:00
device created by systemd-networkd (or other tools). Ideally there would
be a kernel compile-time option for this, but there currently isn't. The
next best thing is to make this change through a modprobe.d drop-in.
This is shipped by default, see modprobe.d/systemd.conf.
2017-07-24 12:28:04 +03:00
2018-01-15 19:55:11 +03:00
Required for systemd-nspawn:
CONFIG_DEVPTS_MULTIPLE_INSTANCES or Linux kernel >= 4.7
2021-02-23 13:06:58 +03:00
Required for systemd-oomd:
CONFIG_PSI
2024-07-03 22:00:04 +03:00
CONFIG_MEMCG
2021-02-23 13:06:58 +03:00
2022-05-16 20:22:11 +03:00
Note that kernel auditing is broken when used with systemd's container
code. When using systemd in conjunction with containers, please make
sure to either turn off auditing at runtime using the kernel command
line option "audit=0", or turn it off at kernel compile time using:
2013-05-10 02:14:12 +04:00
CONFIG_AUDIT=n
2023-06-30 18:39:30 +03:00
2022-05-16 20:22:11 +03:00
If systemd is compiled with libseccomp support on architectures which do
not use socketcall() and where seccomp is supported (this effectively
means x86-64 and ARM, but excludes 32-bit x86!), then nspawn will now
install a work-around seccomp filter that makes containers boot even
with audit being enabled. This works correctly only on kernels 3.14 and
newer though. TL;DR: turn audit off, still.
2013-05-10 02:14:12 +04:00
2015-04-10 20:39:17 +03:00
glibc >= 2.16
2011-02-16 21:09:11 +03:00
libcap
2017-09-15 15:47:57 +03:00
libmount >= 2.30 (from util-linux)
(util-linux *must* be built without --enable-libmount-support-mtab)
2016-10-05 14:58:55 +03:00
libseccomp >= 2.3.1 (optional)
2014-12-13 03:56:56 +03:00
libblkid >= 2.24 (from util-linux) (optional)
2013-10-17 21:49:19 +04:00
libkmod >= 15 (optional)
2011-02-16 21:09:11 +03:00
PAM >= 1.1.2 (optional)
2020-06-02 17:35:58 +03:00
libcryptsetup (optional), >= 2.3.0 required for signed Verity images support
2011-02-16 21:09:11 +03:00
libaudit (optional)
2011-07-12 15:57:48 +04:00
libacl (optional)
2022-10-14 15:27:48 +03:00
libbpf >= 0.1.0 (optional)
2022-02-24 16:29:54 +03:00
libfdisk >= 2.32 (from util-linux) (optional)
2011-02-16 21:09:11 +03:00
libselinux (optional)
2011-07-12 15:57:48 +04:00
liblzma (optional)
2018-10-29 20:32:51 +03:00
liblz4 >= 1.3.0 / 130 (optional)
2020-04-12 02:09:05 +03:00
libzstd >= 1.4.0 (optional)
2012-09-28 02:46:32 +04:00
libgcrypt (optional)
libqrencode (optional)
libmicrohttpd (optional)
2017-05-10 04:56:34 +03:00
libidn2 or libidn (optional)
2019-10-29 22:26:05 +03:00
gnutls >= 3.1.4 (optional, >= 3.6.0 is required to support DNS-over-TLS with gnutls)
2018-07-27 00:47:50 +03:00
openssl >= 1.1.0 (optional, required to support DNS-over-TLS with openssl)
2014-06-23 14:42:17 +04:00
elfutils >= 158 (optional)
2017-11-13 23:54:45 +03:00
polkit (optional)
2019-02-28 17:37:06 +03:00
tzdata >= 2014f (optional)
2017-07-03 03:21:34 +03:00
pkg-config
2017-08-06 01:30:37 +03:00
gperf
2017-07-03 03:21:34 +03:00
docbook-xsl (optional, required for documentation)
xsltproc (optional, required for documentation)
2023-05-07 12:16:21 +03:00
python >= 3.7 (required by meson too, >= 3.9 is required for ukify)
2021-05-16 16:31:00 +03:00
python-jinja2
2023-05-07 12:16:21 +03:00
python-pefile (optional, required for ukify)
2017-07-03 03:21:34 +03:00
python-lxml (optional, required to build the indices)
2023-05-07 12:16:21 +03:00
pyelftools (optional, required for systemd-boot)
2023-07-07 13:44:54 +03:00
meson >= 0.60.0
2019-01-13 03:42:28 +03:00
ninja
2024-02-05 13:02:49 +03:00
gcc >= 8.4
2022-07-14 01:14:25 +03:00
awk, sed, grep, and similar tools
2020-11-28 04:54:02 +03:00
clang >= 10.0, llvm >= 10.0 (optional, required to build BPF programs
from source code in C)
2012-11-22 18:30:50 +04:00
2013-10-22 03:50:48 +04:00
During runtime, you need the following additional
dependencies:
2012-11-22 18:30:50 +04:00
2023-02-10 14:58:20 +03:00
util-linux >= v2.27.1 required (including but not limited to: mount,
umount, swapon, swapoff, sulogin,
agetty, fsck)
2019-12-20 14:26:17 +03:00
dbus >= 1.4.0 (strictly speaking optional, but recommended)
NOTE: If using dbus < 1.9.18, you should override the default
policy directory (--with-dbuspolicydir=/etc/dbus-1/system.d).
2018-07-16 13:44:24 +03:00
polkit (optional)
2011-02-16 21:09:11 +03:00
2017-04-19 04:52:30 +03:00
To build in directory build/:
2022-04-12 13:05:53 +03:00
meson setup build/ && ninja -C build/
2017-04-19 04:52:30 +03:00
2019-04-27 03:22:40 +03:00
Any configuration options can be specified as -Darg=value... arguments
2017-04-19 04:52:30 +03:00
to meson. After the build directory is initially configured, meson will
refuse to run again, and options must be changed with:
2021-01-11 16:04:33 +03:00
meson configure -Darg=value build/
meson configure without any arguments will print out available options and
2017-04-19 04:52:30 +03:00
their current values.
Useful commands:
2022-04-12 13:05:53 +03:00
ninja -C build -v some/target
2020-12-11 13:33:39 +03:00
meson test -C build/
2022-05-16 20:23:37 +03:00
sudo meson install -C build/ --no-rebuild
2020-12-11 13:33:39 +03:00
DESTDIR=... meson install -C build/
2017-04-19 04:52:30 +03:00
2017-07-03 03:21:34 +03:00
A tarball can be created with:
2022-04-12 13:27:23 +03:00
v=250 && git archive --prefix=systemd-$v/ v$v | zstd >systemd-$v.tar.zstd
2015-06-23 14:40:53 +03:00
2022-05-16 20:22:11 +03:00
When systemd-hostnamed is used, it is strongly recommended to install
nss-myhostname to ensure that, in a world of dynamically changing
hostnames, the hostname stays resolvable under all circumstances. In
fact, systemd-hostnamed will warn if nss-myhostname is not installed.
2011-05-17 21:35:56 +04:00
2017-11-17 13:39:14 +03:00
nss-systemd must be enabled on systemd systems, as that's required for
DynamicUser= to work. Note that we ship services out-of-the-box that
make use of DynamicUser= now, hence enabling nss-systemd is not
optional.
2023-06-12 04:15:19 +03:00
Note that the build prefix for systemd must be /usr/. (Moreover, packages
2022-05-16 20:22:11 +03:00
systemd relies on — such as D-Bus — really should use the same prefix,
2023-06-12 04:15:19 +03:00
otherwise you are on your own.) Split-usr and unmerged-usr systems are no
longer supported, and moving everything under /usr/ is required. Systems
with a separate /usr/ partition must mount it before transitioning into it
(i.e.: from the initrd). For more information see:
2024-05-28 15:43:50 +03:00
https://systemd.io/SEPARATE_USR_IS_BROKEN
https://systemd.io/THE_CASE_FOR_THE_USR_MERGE
2017-11-17 13:39:14 +03:00
2016-10-16 03:51:19 +03:00
Additional packages are necessary to run some tests:
- nc (used by test/TEST-12-ISSUE-3171)
2023-05-07 12:16:21 +03:00
- python (test-udev which is installed is in python)
- python-pyparsing
- python-evdev (used by hwdb parsing tests)
2016-10-16 03:51:19 +03:00
- strace (used by test/test-functions)
2017-02-12 08:22:20 +03:00
- capsh (optional, used by test-execute)
2016-10-16 03:51:19 +03:00
2022-05-16 20:49:20 +03:00
POLICY FOR SUPPORT OF DISTRIBUTIONS AND ARCHITECTURES:
systemd main branch and latest major or stable releases are generally
expected to compile on current versions of popular distributions (at
least all non-EOL versions of Fedora, Debian unstable/testing/stable,
latest Ubuntu LTS and non-LTS releases, openSUSE Tumbleweed/Leap,
2022-05-18 09:28:48 +03:00
CentOS Stream 8 and 9, up-to-date Arch, etc.) We will generally
2022-05-16 20:49:20 +03:00
attempt to support also other non-EOL versions of various distros.
2023-05-15 23:35:10 +03:00
Features which would break compilation on slightly older distributions
2022-05-16 20:49:20 +03:00
will only be introduced if there are significant reasons for this
(i.e. supporting them interferes with development or requires too many
resources to support). In some cases backports of specific libraries or
tools might be required.
2023-05-15 23:35:10 +03:00
The policy is similar for architecture support. systemd is regularly
2022-05-16 20:49:20 +03:00
tested on popular architectures (currently amd64, i386, arm64, ppc64el,
and s390x), but should compile and work also on other architectures, for
which support has been added. systemd will emit warnings when
architecture-specific constants are not defined.
2023-05-15 23:35:10 +03:00
STATIC COMPILATION AND "STANDALONE" BINARIES:
systemd provides a public shared libraries libsystemd.so and
libudev.so. The latter is deprecated, and the sd-device APIs in
libsystemd should be used instead for new code. In addition, systemd is
built with a private shared library, libsystemd-shared-<suffix>.so,
that also includes the libsystemd code, and by default most systemd
binaries are linked to it. Using shared libraries saves disk space and
memory at runtime, because only one copy of the code is needed.
It is possible to build static versions of systemd public shared
libraries (via the configuration options '-Dstatic-libsystemd' and
'-Dstatic-libudev'). This allows the libsystemd and libudev code to be
2023-06-30 18:39:30 +03:00
linked statically into programs. Note that mixing & matching different
versions of libsystemd and systemd is generally not recommended, since
various of its APIs wrap internal state and protocols of systemd
(e.g. logind and udev databases), which are not considered
stable. Hence, using static libraries is not recommended since it
generally means that version of the static libsystemd linked into
applications and the host systemd are not in sync, and will thus create
compatibility problems.
In addition, it is possible to disable the use of
libsystemd-shared-<suffix>.so for various components (via the
configuration options '-Dlink-*-shared'). In this mode, the libsystemd
and libsystemd-shared code is linked statically into selected
binaries. This option is intended for systems where some of the
components are intended to be delivered independently of the main
2023-05-15 23:35:10 +03:00
systemd package. Finally, some binaries can be compiled in a second
version (via the configuration option '-Dstandalone-binaries'). The
version suffixed with ".standalone" has the libsystemd and
libsystemd-shared code linked statically. Those binaries are intended
as replacements to be used in limited installations where the full
2023-06-30 18:39:30 +03:00
systemd suite is not installed. Yet another option is to rebuild
systemd with a different '-Dshared-lib-tag' setting, allowing different
systemd binaries to be linked to instances of the private shared
library that can be installed in parallel.
Again: Using the default shared linking is recommended, building static
or "standalone" versions is not. Mixing versions of systemd components
that would normally be built and used together (in particular various
daemons and the manager) is not recommended: we do not test such
combinations upstream and cannot provide support. Distributors making
use of those options are responsible if things do not work as expected.
2023-05-15 23:35:10 +03:00
2013-03-05 21:53:21 +04:00
USERS AND GROUPS:
2022-05-16 20:22:11 +03:00
Default udev rules use the following standard system group names, which
need to be resolvable by getgrnam() at any time, even in the very early
boot stages, where no other databases and network are available:
2013-03-05 22:15:31 +04:00
2017-11-20 14:30:42 +03:00
audio, cdrom, dialout, disk, input, kmem, kvm, lp, render, tape, tty, video
2013-03-05 22:04:48 +04:00
2022-05-16 20:22:11 +03:00
During runtime, the journal daemon requires the "systemd-journal" system
group to exist. New journal files will be readable by this group (but
not writable), which may be used to grant specific users read access. In
addition, system groups "wheel" and "adm" will be given read-only access
2023-03-18 20:32:50 +03:00
to journal files using systemd-tmpfiles-setup.service.
2013-03-05 21:53:21 +04:00
2022-05-16 20:22:11 +03:00
The journal remote daemon requires the "systemd-journal-remote" system
user and group to exist. During execution this network facing service
will drop privileges and assume this uid/gid for security reasons.
2013-03-05 22:15:31 +04:00
2022-05-16 20:22:11 +03:00
Similarly, the network management daemon requires the "systemd-network"
system user and group to exist.
2014-06-04 13:17:32 +04:00
2022-05-16 20:22:11 +03:00
Similarly, the name resolution daemon requires the "systemd-resolve"
system user and group to exist.
2014-06-04 13:17:32 +04:00
2022-05-16 20:22:11 +03:00
Similarly, the coredump support requires the "systemd-coredump" system
user and group to exist.
2016-02-09 01:35:24 +03:00
2022-09-07 12:30:21 +03:00
GLIBC NSS:
2016-07-14 20:19:49 +03:00
systemd ships with four glibc NSS modules:
2014-08-19 23:55:10 +04:00
2020-07-07 22:58:12 +03:00
nss-myhostname resolves the local hostname to locally configured IP
addresses, as well as "localhost" to 127.0.0.1/::1.
2014-08-19 23:55:10 +04:00
2020-07-07 22:58:12 +03:00
nss-resolve enables DNS resolution via the systemd-resolved DNS/LLMNR
caching stub resolver "systemd-resolved".
2014-08-19 23:55:10 +04:00
2016-07-14 20:19:49 +03:00
nss-mymachines enables resolution of all local containers registered
2020-07-07 22:58:12 +03:00
with machined to their respective IP addresses.
2014-08-19 23:55:10 +04:00
2020-07-07 22:58:12 +03:00
nss-systemd enables resolution of users/group registered via the
2021-02-19 02:14:52 +03:00
User/Group Record Lookup API (https://systemd.io/USER_GROUP_API),
2020-07-07 22:58:12 +03:00
including all dynamically allocated service users. (See the
DynamicUser= setting in unit files.)
2014-08-19 23:55:10 +04:00
2016-07-14 20:19:49 +03:00
To make use of these NSS modules, please add them to the "hosts:",
2023-09-20 12:50:20 +03:00
"passwd:", "group:", "shadow:" and "gshadow:" lines in
/etc/nsswitch.conf.
2014-08-19 23:55:10 +04:00
2016-07-14 20:19:49 +03:00
The four modules should be used in the following order:
2023-09-20 12:50:20 +03:00
passwd: files systemd
group: files [SUCCESS=merge] systemd
shadow: files systemd
gshadow: files systemd
hosts: mymachines resolve [!UNAVAIL=return] files myhostname dns
2014-08-19 23:55:10 +04:00
2015-05-27 18:04:49 +03:00
SYSV INIT.D SCRIPTS:
When calling "systemctl enable/disable/is-enabled" on a unit which is a
SysV init.d script, it calls /usr/lib/systemd/systemd-sysv-install;
this needs to translate the action into the distribution specific
mechanism such as chkconfig or update-rc.d. Packagers need to provide
this script if you need this functionality (you don't if you disabled
SysV init support).
Please see src/systemctl/systemd-sysv-install.SKELETON for how this
needs to look like, and provide an implementation at the marked places.
2022-04-05 21:31:03 +03:00
WARNINGS and TAINT FLAGS:
systemd requires that the /run mount point exists. systemd also
requires that /var/run is a symlink to /run. Taint flag 'var-run-bad'
will be set when this condition is detected.
Systemd will also warn when the cgroup support is unavailable in the
kernel (taint flag 'cgroups-missing'), the system is using the old
cgroup hierarchy (taint flag 'cgroupsv1'), the hardware clock is
running in non-UTC mode (taint flag 'local-hwclock'), the kernel
overflow UID or GID are not 65534 (taint flags 'overflowuid-not-65534'
and 'overflowgid-not-65534'), the UID or GID range assigned to the
running systemd instance covers less than 0…65534 (taint flags
'short-uid-range' and 'short-gid-range').
Taint conditions are logged during boot, but may also be checked at any
time with:
busctl get-property org.freedesktop.systemd1 /org/freedesktop/systemd1 org.freedesktop.systemd1.Manager Tainted
2022-07-09 18:42:07 +03:00
See org.freedesktop.systemd1(5) for more information.
2022-04-05 21:31:03 +03:00
VALGRIND:
meson: merge our two valgrind configuration conditions into one
Most of the support for valgrind was under HAVE_VALGRIND_VALGRIND_H, i.e. we
would enable if the valgrind headers were found. The operations then we be
conditionalized on RUNNING_UNDER_VALGRIND.
But in a few places we had code which was conditionalized on VALGRIND, i.e. the
config option. I noticed because I compiled with -Dvalgrind=true on a machine
that didn't have valgrind.h, and the build failed because
RUNNING_UNDER_VALGRIND was not defined. My first idea was to add a check that
the header is present if the option is set, but it seems better to just remove
the option. The code to support valgrind is trivial, and if we're
!RUNNING_UNDER_VALGRIND, it has negligible cost. And the case of running under
valgrind is always some special testing/debugging mode, so we should just do
those extra steps to make valgrind output cleaner. Removing the option makes
things simpler and we don't have to think if something should be covered by the
one or the other configuration bit.
I had a vague recollection that in some places we used -Dvalgrind=true not
for valgrind support, but to enable additional cleanup under other sanitizers.
But that code would fail to build without the valgrind headers anyway, so
I'm not sure if that was still used. If there are uses like that, we can
extend the condition for cleanup_pools().
2023-02-21 21:59:57 +03:00
To run systemd under valgrind, compile systemd with the valgrind
development headers available (i.e. valgrind-devel or equivalent).
Otherwise, false positives will be triggered by code which violates
some rules but is actually safe. Note that valgrind generates nice
output only on exit(), hence on shutdown we don't execve()
systemd-shutdown.
2014-11-06 17:27:13 +03:00
2019-02-15 22:05:04 +03:00
STABLE BRANCHES AND BACKPORTS:
2020-08-16 19:25:18 +03:00
Stable branches with backported patches are available in the
systemd-stable repo at https://github.com/systemd/systemd-stable.
Stable branches are started for certain releases of systemd and named
after them, e.g. v238-stable. Stable branches are managed by
distribution maintainers on an as needed basis. See
2024-05-28 15:45:08 +03:00
https://systemd.io/BACKPORTS for some more information and examples.