From 639daba3928542d89d19514323a0322d08b62d54e2746c8777d440b07df9c027 Mon Sep 17 00:00:00 2001 From: Franck Bui Date: Tue, 22 Nov 2022 14:51:55 +0000 Subject: [PATCH] - Import commit 3bd3e4e6c1efe0d6df776107efde47e15e58fe96 d28e81d65c test: fix the default timeout values described in README.testsuite d921c83f53 meson: install test-kernel-install only when -Dkernel-install=true c3b6c4b584 tests: update install_suse_systemd() 3c77335b19 tests: install dmi-sysfs module on openSUSE df632130cd tests: install systemd-resolved on openSUSE - Add 6000-Revert-tmpfiles-whenever-creating-an-inode-immediate.patch until upstream issue #25468 is fixed. - Drop 0001-meson-build-kernel-install-man-page-when-necessary.patch, the patch has been merged in the SUSE git repo. This includes the following bug fixes: - upstream commit 67c3e1f63a5221b47a8fea85ae421671f29f3b7e (bsc#1200723) OBS-URL: https://build.opensuse.org/package/show/Base:System/systemd?expand=0&rev=1329 --- ...whenever-creating-an-inode-immediate.patch | 474 ++++++++++++++++++ ...st-kernel-install-only-when-Dkernel-.patch | 29 -- systemd-v252.1+suse.21.g64dc546913.tar.xz | 3 - systemd-v252.1+suse.27.g3bd3e4e6c1.tar.xz | 3 + systemd.changes | 21 + systemd.spec | 4 +- 6 files changed, 500 insertions(+), 34 deletions(-) create mode 100644 6000-Revert-tmpfiles-whenever-creating-an-inode-immediate.patch delete mode 100644 6000-meson-install-test-kernel-install-only-when-Dkernel-.patch delete mode 100644 systemd-v252.1+suse.21.g64dc546913.tar.xz create mode 100644 systemd-v252.1+suse.27.g3bd3e4e6c1.tar.xz diff --git a/6000-Revert-tmpfiles-whenever-creating-an-inode-immediate.patch b/6000-Revert-tmpfiles-whenever-creating-an-inode-immediate.patch new file mode 100644 index 00000000..209ed181 --- /dev/null +++ b/6000-Revert-tmpfiles-whenever-creating-an-inode-immediate.patch @@ -0,0 +1,474 @@ +From 9420aaad2680981323b0786c479b14891444f5cb Mon Sep 17 00:00:00 2001 +From: Franck Bui +Date: Tue, 22 Nov 2022 14:45:56 +0100 +Subject: [PATCH 6000/6000] Revert "tmpfiles: whenever creating an inode, + immediately O_PATH open it to pin it" + +This reverts commit 8f6fb95cd069884f4ce0a24eb20efc821ae3bc5e. +--- + src/tmpfiles/tmpfiles.c | 283 +++++++++++++++++----------------------- + 1 file changed, 118 insertions(+), 165 deletions(-) + +diff --git a/src/tmpfiles/tmpfiles.c b/src/tmpfiles/tmpfiles.c +index 784b895577..2c44856c3a 100644 +--- a/src/tmpfiles/tmpfiles.c ++++ b/src/tmpfiles/tmpfiles.c +@@ -31,7 +31,6 @@ + #include "dirent-util.h" + #include "dissect-image.h" + #include "env-util.h" +-#include "errno-util.h" + #include "escape.h" + #include "fd-util.h" + #include "fileio.h" +@@ -1515,9 +1514,11 @@ static int create_file(Item *i, const char *path) { + st = &stbuf; + creation = CREATION_EXISTING; + } else { +- r = write_argument_data(i, fd, path); +- if (r < 0) +- return r; ++ if (item_binary_argument(i)) { ++ r = write_argument_data(i, fd, path); ++ if (r < 0) ++ return r; ++ } + + creation = CREATION_NORMAL; + } +@@ -1617,7 +1618,6 @@ static int truncate_file(Item *i, const char *path) { + static int copy_files(Item *i) { + _cleanup_close_ int dfd = -1, fd = -1; + _cleanup_free_ char *bn = NULL; +- struct stat st, a; + int r; + + log_debug("Copying tree \"%s\" to \"%s\".", i->argument, i->path); +@@ -1637,40 +1637,46 @@ static int copy_files(Item *i) { + i->uid_set ? i->uid : UID_INVALID, + i->gid_set ? i->gid : GID_INVALID, + COPY_REFLINK | COPY_MERGE_EMPTY | COPY_MAC_CREATE | COPY_HARDLINKS); ++ if (r < 0) { ++ struct stat a, b; + +- fd = openat(dfd, bn, O_NOFOLLOW|O_CLOEXEC|O_PATH); +- if (fd < 0) { +- if (r < 0) /* Look at original error first */ +- return log_error_errno(r, "Failed to copy files to %s: %m", i->path); ++ /* If the target already exists on read-only filesystems, trying ++ * to create the target will not fail with EEXIST but with ++ * EROFS. */ ++ if (r == -EROFS && faccessat(dfd, bn, F_OK, AT_SYMLINK_NOFOLLOW) == 0) ++ r = -EEXIST; + +- return log_error_errno(errno, "Failed to openat(%s): %m", i->path); +- } ++ if (r != -EEXIST) ++ return log_error_errno(r, "Failed to copy files to %s: %m", i->path); + +- if (fstat(fd, &st) < 0) +- return log_error_errno(errno, "Failed to fstat(%s): %m", i->path); ++ if (stat(i->argument, &a) < 0) ++ return log_error_errno(errno, "stat(%s) failed: %m", i->argument); + +- if (stat(i->argument, &a) < 0) +- return log_error_errno(errno, "Failed to stat(%s): %m", i->argument); ++ if (fstatat(dfd, bn, &b, AT_SYMLINK_NOFOLLOW) < 0) ++ return log_error_errno(errno, "stat(%s) failed: %m", i->path); + +- if (((st.st_mode ^ a.st_mode) & S_IFMT) != 0) { +- log_debug("Can't copy to %s, file exists already and is of different type", i->path); +- return 0; ++ if ((a.st_mode ^ b.st_mode) & S_IFMT) { ++ log_debug("Can't copy to %s, file exists already and is of different type", i->path); ++ return 0; ++ } + } + +- return fd_set_perms(i, fd, i->path, &st, _CREATION_MODE_INVALID); ++ fd = openat(dfd, bn, O_NOFOLLOW|O_CLOEXEC|O_PATH); ++ if (fd < 0) ++ return log_error_errno(errno, "Failed to openat(%s): %m", i->path); ++ ++ return fd_set_perms(i, fd, i->path, /* st = */ NULL, _CREATION_MODE_INVALID); + } + + static int create_directory_or_subvolume( + const char *path, + mode_t mode, + bool subvol, +- struct stat *ret_st, + CreationMode *ret_creation) { + + _cleanup_free_ char *bn = NULL; + _cleanup_close_ int pfd = -1; +- CreationMode creation; +- struct stat st; ++ CreationMode c; + int r, fd; + + assert(path); +@@ -1690,7 +1696,7 @@ static int create_directory_or_subvolume( + log_warning_errno(r, "Cannot parse value of $SYSTEMD_TMPFILES_FORCE_SUBVOL, ignoring."); + r = btrfs_is_subvol(empty_to_root(arg_root)) > 0; + } +- if (r == 0) ++ if (!r) + /* Don't create a subvolume unless the root directory is one, too. We do this under + * the assumption that if the root directory is just a plain directory (i.e. very + * light-weight), we shouldn't try to split it up into subvolumes (i.e. more +@@ -1706,36 +1712,37 @@ static int create_directory_or_subvolume( + } else + r = 0; + +- if (!subvol || ERRNO_IS_NOT_SUPPORTED(r)) ++ if (!subvol || r == -ENOTTY) + RUN_WITH_UMASK(0000) + r = mkdirat_label(pfd, bn, mode); + +- creation = r >= 0 ? CREATION_NORMAL : CREATION_EXISTING; +- +- fd = openat(pfd, bn, O_NOFOLLOW|O_CLOEXEC|O_DIRECTORY|O_PATH); +- if (fd < 0) { +- /* We couldn't open it because it is not actually a directory? */ +- if (errno == ENOTDIR) +- return log_error_errno(SYNTHETIC_ERRNO(EEXIST), "\"%s\" already exists and is not a directory.", path); ++ if (r < 0) { ++ int k; + +- /* Then look at the original error */ +- if (r < 0) ++ if (!IN_SET(r, -EEXIST, -EROFS)) + return log_error_errno(r, "Failed to create directory or subvolume \"%s\": %m", path); + +- return log_error_errno(errno, "Failed to open directory/subvolume we just created '%s': %m", path); +- } ++ k = is_dir_full(pfd, bn, /* follow= */ false); ++ if (k == -ENOENT && r == -EROFS) ++ return log_error_errno(r, "%s does not exist and cannot be created as the file system is read-only.", path); ++ if (k < 0) ++ return log_error_errno(k, "Failed to check if %s exists: %m", path); ++ if (!k) ++ return log_warning_errno(SYNTHETIC_ERRNO(EEXIST), ++ "\"%s\" already exists and is not a directory.", path); + +- if (fstat(fd, &st) < 0) +- return log_error_errno(errno, "Failed to fstat(%s): %m", path); ++ c = CREATION_EXISTING; ++ } else ++ c = CREATION_NORMAL; + +- assert(S_ISDIR(st.st_mode)); /* we used O_DIRECTORY above */ ++ log_debug("%s directory \"%s\".", creation_mode_verb_to_string(c), path); + +- log_debug("%s directory \"%s\".", creation_mode_verb_to_string(creation), path); ++ fd = openat(pfd, bn, O_NOCTTY|O_CLOEXEC|O_DIRECTORY); ++ if (fd < 0) ++ return log_error_errno(errno, "Failed to open directory '%s': %m", bn); + +- if (ret_st) +- *ret_st = st; + if (ret_creation) +- *ret_creation = creation; ++ *ret_creation = c; + + return fd; + } +@@ -1743,30 +1750,28 @@ static int create_directory_or_subvolume( + static int create_directory(Item *i, const char *path) { + _cleanup_close_ int fd = -1; + CreationMode creation; +- struct stat st; + + assert(i); + assert(IN_SET(i->type, CREATE_DIRECTORY, TRUNCATE_DIRECTORY)); + +- fd = create_directory_or_subvolume(path, i->mode, /* subvol= */ false, &st, &creation); ++ fd = create_directory_or_subvolume(path, i->mode, /* subvol= */ false, &creation); + if (fd == -EEXIST) + return 0; + if (fd < 0) + return fd; + +- return fd_set_perms(i, fd, path, &st, creation); ++ return fd_set_perms(i, fd, path, /* st= */ NULL, creation); + } + + static int create_subvolume(Item *i, const char *path) { + _cleanup_close_ int fd = -1; + CreationMode creation; +- struct stat st; + int r, q = 0; + + assert(i); + assert(IN_SET(i->type, CREATE_SUBVOLUME, CREATE_SUBVOLUME_NEW_QUOTA, CREATE_SUBVOLUME_INHERIT_QUOTA)); + +- fd = create_directory_or_subvolume(path, i->mode, /* subvol = */ true, &st, &creation); ++ fd = create_directory_or_subvolume(path, i->mode, /* subvol = */ true, &creation); + if (fd == -EEXIST) + return 0; + if (fd < 0) +@@ -1789,7 +1794,7 @@ static int create_subvolume(Item *i, const char *path) { + log_debug("Quota for subvolume \"%s\" already in place, no change made.", i->path); + } + +- r = fd_set_perms(i, fd, path, &st, creation); ++ r = fd_set_perms(i, fd, path, /* st= */ NULL, creation); + if (q < 0) /* prefer the quota change error from above */ + return q; + +@@ -1830,11 +1835,9 @@ static int create_device(Item *i, mode_t file_type) { + _cleanup_close_ int dfd = -1, fd = -1; + _cleanup_free_ char *bn = NULL; + CreationMode creation; +- struct stat st; + int r; + + assert(i); +- assert(IN_SET(i->type, CREATE_BLOCK_DEVICE, CREATE_CHAR_DEVICE)); + assert(IN_SET(file_type, S_IFBLK, S_IFCHR)); + + r = path_extract_filename(i->path, &bn); +@@ -1854,166 +1857,116 @@ static int create_device(Item *i, mode_t file_type) { + r = RET_NERRNO(mknodat(dfd, bn, i->mode | file_type, i->major_minor)); + mac_selinux_create_file_clear(); + } +- creation = r >= 0 ? CREATION_NORMAL : CREATION_EXISTING; +- +- /* Try to open the inode via O_PATH, regardless if we could create it or not. Maybe everything is in +- * order anyway and we hence can ignore the error to create the device node */ +- fd = openat(dfd, bn, O_NOFOLLOW|O_CLOEXEC|O_PATH); +- if (fd < 0) { +- /* OK, so opening the inode failed, let's look at the original error then. */ + +- if (r < 0) { +- if (ERRNO_IS_PRIVILEGE(r)) +- goto handle_privilege; ++ if (r < 0) { ++ struct stat st; + +- return log_error_errno(r, "Failed to create device node '%s': %m", i->path); ++ if (r == -EPERM) { ++ log_debug_errno(r, ++ "We lack permissions, possibly because of cgroup configuration; " ++ "skipping creation of device node %s.", i->path); ++ return 0; + } + +- return log_error_errno(errno, "Failed to open device node '%s' we just created: %m", i->path); +- } ++ if (r != -EEXIST) ++ return log_error_errno(r, "Failed to create device node %s: %m", i->path); + +- if (fstat(fd, &st) < 0) +- return log_error_errno(errno, "Failed to fstat(%s): %m", i->path); ++ if (fstatat(dfd, bn, &st, 0) < 0) ++ return log_error_errno(errno, "stat(%s) failed: %m", i->path); + +- if (((st.st_mode ^ file_type) & S_IFMT) != 0) { ++ if ((st.st_mode & S_IFMT) != file_type) { + +- if (i->append_or_force) { +- fd = safe_close(fd); ++ if (i->append_or_force) { + +- RUN_WITH_UMASK(0000) { +- mac_selinux_create_file_prepare(i->path, file_type); +- r = mknodat_atomic(dfd, bn, i->mode | file_type, i->major_minor); +- mac_selinux_create_file_clear(); +- } +- if (ERRNO_IS_PRIVILEGE(r)) +- goto handle_privilege; +- if (IN_SET(r, -EISDIR, -EEXIST, -ENOTEMPTY)) { +- r = rm_rf_child(dfd, bn, REMOVE_PHYSICAL); +- if (r < 0) +- return log_error_errno(r, "rm -rf %s failed: %m", i->path); ++ RUN_WITH_UMASK(0000) { ++ mac_selinux_create_file_prepare(i->path, file_type); ++ /* FIXME: need to introduce mknodat_atomic() */ ++ r = mknod_atomic(i->path, i->mode | file_type, i->major_minor); ++ mac_selinux_create_file_clear(); ++ } + +- mac_selinux_create_file_prepare(i->path, file_type); +- r = RET_NERRNO(mknodat(dfd, bn, i->mode | file_type, i->major_minor)); +- mac_selinux_create_file_clear(); ++ if (r < 0) ++ return log_error_errno(r, "Failed to create device node \"%s\": %m", i->path); ++ creation = CREATION_FORCE; ++ } else { ++ log_warning("\"%s\" already exists is not a device node.", i->path); ++ return 0; + } +- if (r < 0) +- return log_error_errno(r, "Failed to create device node '%s': %m", i->path); +- +- fd = openat(dfd, bn, O_NOFOLLOW|O_CLOEXEC|O_PATH); +- if (fd < 0) +- return log_error_errno(errno, "Failed to open device node we just created '%s': %m", i->path); +- +- /* Validate type before change ownership below */ +- if (fstat(fd, &st) < 0) +- return log_error_errno(errno, "Failed to fstat(%s): %m", i->path); +- +- if (((st.st_mode ^ file_type) & S_IFMT) != 0) +- return log_error_errno(SYNTHETIC_ERRNO(EBADF), "Device node we just created is not a device node, refusing."); +- +- creation = CREATION_FORCE; +- } else { +- log_warning("\"%s\" already exists and is not a device node.", i->path); +- return 0; +- } +- } ++ } else ++ creation = CREATION_EXISTING; ++ } else ++ creation = CREATION_NORMAL; + + log_debug("%s %s device node \"%s\" %u:%u.", + creation_mode_verb_to_string(creation), + i->type == CREATE_BLOCK_DEVICE ? "block" : "char", + i->path, major(i->mode), minor(i->mode)); + +- return fd_set_perms(i, fd, i->path, &st, creation); ++ fd = openat(dfd, bn, O_NOFOLLOW|O_CLOEXEC|O_PATH); ++ if (fd < 0) ++ return log_error_errno(errno, "Failed to openat(%s): %m", i->path); + +-handle_privilege: +- log_debug_errno(r, +- "We lack permissions, possibly because of cgroup configuration; " +- "skipping creation of device node '%s'.", i->path); +- return 0; ++ return fd_set_perms(i, fd, i->path, /* st = */ NULL, creation); + } + +-static int create_fifo(Item *i) { ++static int create_fifo(Item *i, const char *path) { + _cleanup_close_ int pfd = -1, fd = -1; + _cleanup_free_ char *bn = NULL; + CreationMode creation; + struct stat st; + int r; + +- assert(i); +- assert(i->type == CREATE_FIFO); +- + r = path_extract_filename(i->path, &bn); + if (r < 0) +- return log_error_errno(r, "Failed to extract filename from path '%s': %m", i->path); ++ return log_error_errno(r, "Failed to extract filename from path '%s': %m", path); + if (r == O_DIRECTORY) +- return log_error_errno(SYNTHETIC_ERRNO(EISDIR), "Cannot open path '%s' for creating FIFO, is a directory.", i->path); ++ return log_error_errno(SYNTHETIC_ERRNO(EISDIR), "Cannot open path '%s' for creating FIFO, is a directory.", path); + +- pfd = path_open_parent_safe(i->path); ++ pfd = path_open_parent_safe(path); + if (pfd < 0) + return pfd; + + RUN_WITH_UMASK(0000) { +- mac_selinux_create_file_prepare(i->path, S_IFIFO); ++ mac_selinux_create_file_prepare(path, S_IFIFO); + r = RET_NERRNO(mkfifoat(pfd, bn, i->mode)); + mac_selinux_create_file_clear(); + } + +- creation = r >= 0 ? CREATION_NORMAL : CREATION_EXISTING; +- +- /* Open the inode via O_PATH, regardless if we managed to create it or not. Maybe it is is already the FIFO we want */ +- fd = openat(pfd, bn, O_NOFOLLOW|O_CLOEXEC|O_PATH); +- if (fd < 0) { +- if (r < 0) +- return log_error_errno(r, "Failed to create FIFO %s: %m", i->path); /* original error! */ +- +- return log_error_errno(errno, "Failed to open FIFO we just created %s: %m", i->path); +- } ++ if (r < 0) { ++ if (r != -EEXIST) ++ return log_error_errno(r, "Failed to create fifo %s: %m", path); + +- if (fstat(fd, &st) < 0) +- return log_error_errno(errno, "Failed to fstat(%s): %m", i->path); ++ if (fstatat(pfd, bn, &st, AT_SYMLINK_NOFOLLOW) < 0) ++ return log_error_errno(errno, "stat(%s) failed: %m", path); + +- if (!S_ISFIFO(st.st_mode)) { ++ if (!S_ISFIFO(st.st_mode)) { + +- if (i->append_or_force) { +- fd = safe_close(fd); ++ if (i->append_or_force) { ++ RUN_WITH_UMASK(0000) { ++ mac_selinux_create_file_prepare(path, S_IFIFO); ++ r = mkfifoat_atomic(pfd, bn, i->mode); ++ mac_selinux_create_file_clear(); ++ } + +- RUN_WITH_UMASK(0000) { +- mac_selinux_create_file_prepare(i->path, S_IFIFO); +- r = mkfifoat_atomic(pfd, bn, i->mode); +- mac_selinux_create_file_clear(); +- } +- if (IN_SET(r, -EISDIR, -EEXIST, -ENOTEMPTY)) { +- r = rm_rf_child(pfd, bn, REMOVE_PHYSICAL); + if (r < 0) +- return log_error_errno(r, "rm -rf %s failed: %m", i->path); +- +- mac_selinux_create_file_prepare(i->path, S_IFIFO); +- r = RET_NERRNO(mkfifoat(pfd, bn, i->mode)); +- mac_selinux_create_file_clear(); ++ return log_error_errno(r, "Failed to create fifo %s: %m", path); ++ creation = CREATION_FORCE; ++ } else { ++ log_warning("\"%s\" already exists and is not a fifo.", path); ++ return 0; + } +- if (r < 0) +- return log_error_errno(r, "Failed to create FIFO %s: %m", i->path); +- +- fd = openat(pfd, bn, O_NOFOLLOW|O_CLOEXEC|O_PATH); +- if (fd < 0) +- return log_error_errno(errno, "Failed to open FIFO we just created '%s': %m", i->path); +- +- /* Validate type before change ownership below */ +- if (fstat(fd, &st) < 0) +- return log_error_errno(errno, "Failed to fstat(%s): %m", i->path); ++ } else ++ creation = CREATION_EXISTING; ++ } else ++ creation = CREATION_NORMAL; + +- if (!S_ISFIFO(st.st_mode)) +- return log_error_errno(SYNTHETIC_ERRNO(EBADF), "FIFO inode we just created is not a FIFO, refusing."); ++ log_debug("%s fifo \"%s\".", creation_mode_verb_to_string(creation), path); + +- creation = CREATION_FORCE; +- } else { +- log_warning("\"%s\" already exists and is not a FIFO.", i->path); +- return 0; +- } +- } +- +- log_debug("%s fifo \"%s\".", creation_mode_verb_to_string(creation), i->path); ++ fd = openat(pfd, bn, O_NOFOLLOW|O_CLOEXEC|O_PATH); ++ if (fd < 0) ++ return log_error_errno(errno, "Failed to openat(%s): %m", path); + +- return fd_set_perms(i, fd, i->path, &st, creation); ++ return fd_set_perms(i, fd, i->path, /* st = */ NULL, creation); + } + + static int create_symlink(Item *i) { +@@ -2482,7 +2435,7 @@ static int create_item(Item *i) { + if (r < 0) + return r; + +- r = create_fifo(i); ++ r = create_fifo(i, i->path); + if (r < 0) + return r; + break; +-- +2.35.3 + diff --git a/6000-meson-install-test-kernel-install-only-when-Dkernel-.patch b/6000-meson-install-test-kernel-install-only-when-Dkernel-.patch deleted file mode 100644 index 3217bafa..00000000 --- a/6000-meson-install-test-kernel-install-only-when-Dkernel-.patch +++ /dev/null @@ -1,29 +0,0 @@ -From c34a72017fe66998f7bd40b5e90d27accd69376c Mon Sep 17 00:00:00 2001 -From: Franck Bui -Date: Tue, 15 Nov 2022 09:04:42 +0100 -Subject: [PATCH 6000/6000] meson: install test-kernel-install only when - -Dkernel-install=true - -This patch fixes the following build failure: - - meson.build:3853:8: ERROR: Unknown variable "test_kernel_install_sh". ---- - meson.build | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/meson.build b/meson.build -index 00daeac1b6..0fd0129820 100644 ---- a/meson.build -+++ b/meson.build -@@ -3968,7 +3968,7 @@ exe = custom_target( - install_dir : bindir) - public_programs += exe - --if want_tests != 'false' -+if want_tests != 'false' and want_kernel_install - test('test-kernel-install', - test_kernel_install_sh, - args : [exe.full_path(), loaderentry_install]) --- -2.35.3 - diff --git a/systemd-v252.1+suse.21.g64dc546913.tar.xz b/systemd-v252.1+suse.21.g64dc546913.tar.xz deleted file mode 100644 index 53405b75..00000000 --- a/systemd-v252.1+suse.21.g64dc546913.tar.xz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:61e92987f1ac3c83d3b3be029497159b683c84869e259d904d0422c4691432e9 -size 8034368 diff --git a/systemd-v252.1+suse.27.g3bd3e4e6c1.tar.xz b/systemd-v252.1+suse.27.g3bd3e4e6c1.tar.xz new file mode 100644 index 00000000..b2fb19b4 --- /dev/null +++ b/systemd-v252.1+suse.27.g3bd3e4e6c1.tar.xz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f361fb4824b21acec02b87b4c209b1a5ad864dff7753baf575ee358d12022d43 +size 8035180 diff --git a/systemd.changes b/systemd.changes index f6fbb553..2a7cc1b4 100644 --- a/systemd.changes +++ b/systemd.changes @@ -1,3 +1,20 @@ +------------------------------------------------------------------- +Tue Nov 22 13:52:07 UTC 2022 - Franck Bui + +- Import commit 3bd3e4e6c1efe0d6df776107efde47e15e58fe96 + + d28e81d65c test: fix the default timeout values described in README.testsuite + d921c83f53 meson: install test-kernel-install only when -Dkernel-install=true + c3b6c4b584 tests: update install_suse_systemd() + 3c77335b19 tests: install dmi-sysfs module on openSUSE + df632130cd tests: install systemd-resolved on openSUSE + +- Add 6000-Revert-tmpfiles-whenever-creating-an-inode-immediate.patch until + upstream issue #25468 is fixed. + +- Drop 0001-meson-build-kernel-install-man-page-when-necessary.patch, the patch + has been merged in the SUSE git repo. + ------------------------------------------------------------------- Fri Nov 18 08:07:33 UTC 2022 - Franck Bui @@ -11,6 +28,10 @@ Mon Nov 14 11:15:06 UTC 2022 - Franck Bui See https://github.com/openSUSE/systemd/blob/SUSE/v252/NEWS for details. + This includes the following bug fixes: + + - upstream commit 67c3e1f63a5221b47a8fea85ae421671f29f3b7e (bsc#1200723) + * Rebased 0001-conf-parser-introduce-early-drop-ins.patch 1000-Revert-getty-Pass-tty-to-use-by-agetty-via-stdin.patch diff --git a/systemd.spec b/systemd.spec index e44bd068..909d0ecd 100644 --- a/systemd.spec +++ b/systemd.spec @@ -19,7 +19,7 @@ %global flavor @BUILD_FLAVOR@%{nil} %define min_kernel_version 4.5 -%define archive_version +suse.21.g64dc546913 +%define archive_version +suse.27.g3bd3e4e6c1 %define _testsuitedir /usr/lib/systemd/tests %define xinitconfdir %{?_distconfdir}%{!?_distconfdir:%{_sysconfdir}}/X11/xinit @@ -216,7 +216,7 @@ Patch1000: 1000-Revert-getty-Pass-tty-to-use-by-agetty-via-stdin.patch # very few cases, some stuff might be broken in upstream and need to be fixed # quickly. But even in these cases, the patches are temporary and should be # removed as soon as a fix is merged by upstream. -Patch6000: 6000-meson-install-test-kernel-install-only-when-Dkernel-.patch +Patch6000: 6000-Revert-tmpfiles-whenever-creating-an-inode-immediate.patch %description Systemd is a system and service manager, compatible with SysV and LSB