mirror of
https://github.com/systemd/systemd.git
synced 2024-12-22 17:35:35 +03:00
Revert "pid1: order units using TTYVHangup= after vconsole setup"
This reverts commit e019ea738d
.
In the new approach, a lock on /dev/console will be used. This lock will solve
the issue for services which run in early boot. Services which run later are
ordered after sysinit.target, so they'll run much later anyway so this
automatic dependency is not useful. Let's remove it again to make the code
simpler.
This commit is contained in:
parent
6cfb3ebc60
commit
84214541fa
@ -70,12 +70,8 @@
|
||||
|
||||
<listitem><para>Units whose standard output or error output is connected to <option>journal</option> or
|
||||
<option>kmsg</option> (or their combinations with console output, see below) automatically acquire
|
||||
dependencies of type <varname>After=</varname> on <filename>systemd-journald.socket</filename>.
|
||||
</para></listitem>
|
||||
|
||||
<listitem><para>Units using the terminal (standard input, output, or error are connected to a terminal
|
||||
or <varname>TTYPath=</varname> is used) automatically acquire an <varname>After=</varname> dependency
|
||||
on <filename>systemd-vconsole-setup.service</filename>.</para></listitem>
|
||||
dependencies of type <varname>After=</varname> on
|
||||
<filename>systemd-journald.socket</filename>.</para></listitem>
|
||||
|
||||
<listitem><para>Units using <varname>LogNamespace=</varname> will automatically gain ordering and
|
||||
requirement dependencies on the two socket units associated with
|
||||
|
@ -86,7 +86,6 @@
|
||||
#define SPECIAL_QUOTACHECK_SERVICE "systemd-quotacheck.service"
|
||||
#define SPECIAL_QUOTAON_SERVICE "quotaon.service"
|
||||
#define SPECIAL_REMOUNT_FS_SERVICE "systemd-remount-fs.service"
|
||||
#define SPECIAL_VCONSOLE_SETUP_SERVICE "systemd-vconsole-setup.service"
|
||||
#define SPECIAL_VOLATILE_ROOT_SERVICE "systemd-volatile-root.service"
|
||||
#define SPECIAL_UDEVD_SERVICE "systemd-udevd.service"
|
||||
#define SPECIAL_GROWFS_SERVICE "systemd-growfs@.service"
|
||||
|
@ -7219,16 +7219,6 @@ bool exec_context_has_encrypted_credentials(ExecContext *c) {
|
||||
return false;
|
||||
}
|
||||
|
||||
int exec_context_add_default_dependencies(Unit *u, const ExecContext *c) {
|
||||
assert(u);
|
||||
assert(u->default_dependencies);
|
||||
|
||||
if (c && exec_context_needs_term(c))
|
||||
return unit_add_dependency_by_name(u, UNIT_AFTER, SPECIAL_VCONSOLE_SETUP_SERVICE,
|
||||
/* add_reference= */ true, UNIT_DEPENDENCY_DEFAULT);
|
||||
return 0;
|
||||
}
|
||||
|
||||
void exec_status_start(ExecStatus *s, pid_t pid) {
|
||||
assert(s);
|
||||
|
||||
|
@ -501,7 +501,6 @@ void exec_context_revert_tty(ExecContext *c);
|
||||
|
||||
int exec_context_get_clean_directories(ExecContext *c, char **prefix, ExecCleanMask mask, char ***ret);
|
||||
int exec_context_get_clean_mask(ExecContext *c, ExecCleanMask *ret);
|
||||
int exec_context_add_default_dependencies(Unit *u, const ExecContext *c);
|
||||
|
||||
void exec_status_start(ExecStatus *s, pid_t pid);
|
||||
void exec_status_exit(ExecStatus *s, const ExecContext *context, pid_t pid, int code, int status);
|
||||
|
@ -608,7 +608,7 @@ static int mount_add_default_dependencies(Mount *m) {
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
return exec_context_add_default_dependencies(UNIT(m), &m->exec_context);
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int mount_verify(Mount *m) {
|
||||
|
@ -747,12 +747,7 @@ static int service_add_default_dependencies(Service *s) {
|
||||
return r;
|
||||
|
||||
/* Third, add us in for normal shutdown. */
|
||||
r = unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, true, UNIT_DEPENDENCY_DEFAULT);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
/* Fourth, add generic dependencies */
|
||||
return exec_context_add_default_dependencies(UNIT(s), &s->exec_context);
|
||||
return unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, true, UNIT_DEPENDENCY_DEFAULT);
|
||||
}
|
||||
|
||||
static void service_fix_stdio(Service *s) {
|
||||
|
@ -283,11 +283,7 @@ static int socket_add_default_dependencies(Socket *s) {
|
||||
return r;
|
||||
}
|
||||
|
||||
r = unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, true, UNIT_DEPENDENCY_DEFAULT);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
return exec_context_add_default_dependencies(UNIT(s), &s->exec_context);
|
||||
return unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, true, UNIT_DEPENDENCY_DEFAULT);
|
||||
}
|
||||
|
||||
_pure_ static bool socket_has_exec(Socket *s) {
|
||||
|
@ -270,11 +270,7 @@ static int swap_add_default_dependencies(Swap *s) {
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
r = unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_UMOUNT_TARGET, true, UNIT_DEPENDENCY_DEFAULT);
|
||||
if (r < 0)
|
||||
return r;
|
||||
|
||||
return exec_context_add_default_dependencies(UNIT(s), &s->exec_context);
|
||||
return unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_UMOUNT_TARGET, true, UNIT_DEPENDENCY_DEFAULT);
|
||||
}
|
||||
|
||||
static int swap_verify(Swap *s) {
|
||||
|
Loading…
Reference in New Issue
Block a user