]> git.ipfire.org Git - thirdparty/systemd.git/log
thirdparty/systemd.git
7 weeks agoukify: default --hwids to /usr/lib/systemd/boot/hwids/<EFI_ARCH>/ 40541/head
Luca Boccassi [Tue, 24 Feb 2026 22:00:35 +0000 (22:00 +0000)] 
ukify: default --hwids to /usr/lib/systemd/boot/hwids/<EFI_ARCH>/

If the option is not manually specified, and the hwids directory exists
for the target EFI architecture, default to it. Allow passing '' to skip.

Fixes https://github.com/systemd/systemd/issues/40542

7 weeks agoman: fix line breaking in ukify manpage
Luca Boccassi [Tue, 24 Feb 2026 21:56:48 +0000 (21:56 +0000)] 
man: fix line breaking in ukify manpage

Follow-up for 098e44d03cf1968434990b7d62a0e6221fc675e0

7 weeks agoInstall hwids in /usr/lib/systemd/boot/hwids/<EFI_ARCH>/
Luca Boccassi [Tue, 24 Feb 2026 21:09:26 +0000 (21:09 +0000)] 
Install hwids in /usr/lib/systemd/boot/hwids/<EFI_ARCH>/

These are meant to ship with ukify, in the same package,
so install them when ukify is enabled. Given they are
hardware-specific, use a per-arch subdirectory to make it
easier to enable them by default in ukify.

7 weeks agoboot: import Snapdragon device hwid json files
Tobias Heider [Mon, 2 Feb 2026 11:08:46 +0000 (12:08 +0100)] 
boot: import Snapdragon device hwid json files

Add hwids json files for Snapdragon devices that use of this
feature since they don't ship with devie trees embedded in firmware.
The json files were originally generated for Ubuntu stubble and
are kown to work since they ship in all Ubuntu arm64 ISOs by default.

Some of the devices might not be supported in mainline Linux yet
and use preliminary compatible strings.

7 weeks agotest: move test hwids to separate subdirectory
Luca Boccassi [Tue, 24 Feb 2026 18:17:45 +0000 (18:17 +0000)] 
test: move test hwids to separate subdirectory

Will allow installing the actual hwids as a single subdir

7 weeks agomkosi: update fedora commit reference to 23a1c1fed99e152d9c498204175a7643371a822c
Luca Boccassi [Wed, 25 Feb 2026 13:50:25 +0000 (13:50 +0000)] 
mkosi: update fedora commit reference to 23a1c1fed99e152d9c498204175a7643371a822c

23a1c1fed9 Install /usr/lib/systemd/boot/hwids/ in ukify package
985170fdc6 Version 259.1
2e10d7da1e Revert getty changes a bit harder
96c683c3de Revert all remaing changes to getty@.service
24a305a398 Revert to previous handling of getty@.service
6a500eb814 Create getty@tty1.service again and move autovt@.service alias to /usr/lib
88bd4ab206 Properly enable systemd-tmpfiles-clear.service in scriptlets
d9f3f02206 Raise the number of placeholder sections in kernel and addon stubs
e301db0151 Stop enabling getty@tty1.service
a1c33507a2 Fix unit names in systemd-udev scriptlet
b7b3e024d6 Enable getty@.service through presets
ec5e1b1ed7 Move tpm2 and getty support to -udev subpackage
9c9976a7f8 Rebuilt for https://fedoraproject.org/wiki/Fedora_44_Mass_Rebuild
f353d244fd Add 2 patches for automatic aarch64 DTB selection change
399885597c Revert "Disable sysinit-path for upstream builds"

7 weeks agoNEWS: two news things (#40826)
Luca Boccassi [Wed, 25 Feb 2026 13:26:02 +0000 (13:26 +0000)] 
NEWS: two news things (#40826)

7 weeks agoNEWS: mention userns mapping change 40826/head
Zbigniew Jędrzejewski-Szmek [Wed, 25 Feb 2026 13:07:02 +0000 (14:07 +0100)] 
NEWS: mention userns mapping change

Closes #40495.
C.f. 24c73c79204bd22d243430bc0d9c2a7d814250bf,
     705cc82938b67fa110f2f6f5d28bfb9ec2f339c0.

7 weeks agoNEWS: typos and rewordings
Zbigniew Jędrzejewski-Szmek [Wed, 25 Feb 2026 12:53:33 +0000 (13:53 +0100)] 
NEWS: typos and rewordings

7 weeks agoAdditions to nsresourced and vmspawn required for making use of the foreign UID range...
Daan De Meyer [Wed, 25 Feb 2026 12:49:19 +0000 (13:49 +0100)] 
Additions to nsresourced and vmspawn required for making use of the foreign UID range in mkosi (#40415)

7 weeks agopo: Update translation files
Hosted Weblate [Wed, 25 Feb 2026 11:59:20 +0000 (11:59 +0000)] 
po: Update translation files

Updated by "Update PO files to match POT (msgmerge)" hook in Weblate.

Co-authored-by: Hosted Weblate <hosted@weblate.org>
Translate-URL: https://translate.fedoraproject.org/projects/systemd/main/
Translation: systemd/main

7 weeks agomkosi: add groupadd/groupmod to ASAN wrappers list
Luca Boccassi [Wed, 25 Feb 2026 11:16:28 +0000 (11:16 +0000)] 
mkosi: add groupadd/groupmod to ASAN wrappers list

TEST-74-AUX-UTILS.sh[3789]: + groupadd haldo
TEST-74-AUX-UTILS.sh[3875]: ==3875==ASan runtime does not come first in initial library list; you should either link runtime to your application or manually preload it with LD_PRELOAD.

Follow-up for 1012c6ce76ce10772ece1c51b997b53b848054f5

7 weeks agoChores for RC1 (#40814)
Luca Boccassi [Wed, 25 Feb 2026 11:59:07 +0000 (11:59 +0000)] 
Chores for RC1 (#40814)

7 weeks agoMinor follow-ups to inhibitor bug fixes
Adrian Vovk [Wed, 25 Feb 2026 00:15:29 +0000 (19:15 -0500)] 
Minor follow-ups to inhibitor bug fixes

Addresses Zbigniew's comments left on the previous MR after merging:
https://github.com/systemd/systemd/pull/40400#pullrequestreview-3849602215

7 weeks agoseccomp-util: add lsm_get_self_attr and lsm_list_modules to @default
Nick Rosbrook [Mon, 23 Feb 2026 20:25:27 +0000 (15:25 -0500)] 
seccomp-util: add lsm_get_self_attr and lsm_list_modules to @default

These syscalls are part of a newer kernel API to replace interaction
with /proc/self/attr, with the goal of allowing LSM stacking. These are
being used now by e.g. libapparmor, so should be more easily available
to services using seccomp filtering.

7 weeks agonspawn: Add support for delegated UID ranges 40415/head
Daan De Meyer [Fri, 20 Feb 2026 13:16:48 +0000 (14:16 +0100)] 
nspawn: Add support for delegated UID ranges

We expose this via --private-users-delegate= which takes the number of
ranges to delegate. On top of delegating the ranges, we also mount in
the nsresourced socket and the mountfsd socket so that nested containers
can use nsresourced to allocate from the delegated ranges and mountfsd to
mount images.

Finally, we also create /run/systemd/dissect-root with systemd-tmpfiles to
make sure it is always available as unpriv users won't be able to create it
themselves.

7 weeks agovmspawn: Add support for foreign UID range owned directories
Daan De Meyer [Thu, 22 Jan 2026 12:50:14 +0000 (13:50 +0100)] 
vmspawn: Add support for foreign UID range owned directories

7 weeks agoUpdate po files 40814/head
Luca Boccassi [Tue, 24 Feb 2026 18:49:38 +0000 (18:49 +0000)] 
Update po files

ninja -C build systemd-update-po

7 weeks agoUpdate systemd.pot
Luca Boccassi [Tue, 24 Feb 2026 18:43:25 +0000 (18:43 +0000)] 
Update systemd.pot

ninja -C build systemd-pot

7 weeks agoUpdate man/rules/meson.build
Luca Boccassi [Tue, 24 Feb 2026 18:42:43 +0000 (18:42 +0000)] 
Update man/rules/meson.build

ninja -C build update-man-rules

7 weeks agoman: drop conditional for systemd-mstack manpage
Luca Boccassi [Tue, 24 Feb 2026 18:40:49 +0000 (18:40 +0000)] 
man: drop conditional for systemd-mstack manpage

Follow-up for eb581ff6d9556d29f1b9b57d6a40c4adefde16a6

7 weeks agoUpdate hwdb autosuspend
Luca Boccassi [Tue, 24 Feb 2026 18:38:55 +0000 (18:38 +0000)] 
Update hwdb autosuspend

ninja -C build update-hwdb-autosuspend

7 weeks agoUpdate hwdb
Luca Boccassi [Tue, 24 Feb 2026 18:38:26 +0000 (18:38 +0000)] 
Update hwdb

ninja -C build update-hwdb

7 weeks agouserdbd: avoid sending gshadow hash to unprivileged callers via varlink
Luca Boccassi [Wed, 25 Feb 2026 00:21:17 +0000 (00:21 +0000)] 
userdbd: avoid sending gshadow hash to unprivileged callers via varlink

Reported on yeswehack as YWH-PGM9780-59

Follow-up for d093b62c941ebd6cf16ef9dd6430841eb361ed92

7 weeks agoNEWS: note recently added features
Luca Boccassi [Tue, 24 Feb 2026 23:53:45 +0000 (23:53 +0000)] 
NEWS: note recently added features

7 weeks agosystemctl-start-unit: drop redundant check for enqueue-marked-jobs --wait
Mike Yuan [Tue, 24 Feb 2026 17:48:31 +0000 (18:48 +0100)] 
systemctl-start-unit: drop redundant check for enqueue-marked-jobs --wait

Follow-up for c008f88dede789ce4572c21a2bca16ff7eede193

The check at the beginning of the function already covers this.

7 weeks agotest: avoid hanging forever waiting for udev if not a booted system
Luca Boccassi [Fri, 20 Feb 2026 19:28:34 +0000 (19:28 +0000)] 
test: avoid hanging forever waiting for udev if not a booted system

test_sd_device_enumerator_filter_subsystem hangs forever in OBS builds,
as it waits for the udev queue to be drained. But this is not a booted
system, with systemd and udev, so nothing will do that.
Skip the test in that case.

7 weeks agonetwork: several follow-ups for new varlink methods (#40808)
Daan De Meyer [Tue, 24 Feb 2026 18:59:01 +0000 (19:59 +0100)] 
network: several follow-ups for new varlink methods (#40808)

7 weeks agocore: check selinux/polkit access on varlink SetProperty
Luca Boccassi [Tue, 24 Feb 2026 15:38:47 +0000 (15:38 +0000)] 
core: check selinux/polkit access on varlink SetProperty

Reported on yeswehack.com as:
YWH-PGM9780-92

Follow-up for 0e1c4de235908dfe507fbbddb06ad49b53ccb86b

7 weeks agotree-wide: a small number of small fixlets all over the place (#40797)
Luca Boccassi [Tue, 24 Feb 2026 18:53:17 +0000 (18:53 +0000)] 
tree-wide: a small number of small fixlets all over the place (#40797)

7 weeks agobash-completion/systemctl: add enqueue-marked-jobs and deprecate --marked
Yu Watanabe [Tue, 24 Feb 2026 17:43:31 +0000 (02:43 +0900)] 
bash-completion/systemctl: add enqueue-marked-jobs and deprecate --marked

Follow-up for #40810.

7 weeks agodissect: Go via service on ENOENT from loop_device_make() as well
Daan De Meyer [Sat, 21 Feb 2026 20:36:16 +0000 (21:36 +0100)] 
dissect: Go via service on ENOENT from loop_device_make() as well

ENOENT means /dev/loop-control isn't there which means we're in a
container and should go via mountfsd.

At the same time, reverse the check for fatal actions as almost all
actions can be done via mountfsd, only --attach needs the loop device.

7 weeks agomountfsd: Relax user namespace checks
Daan De Meyer [Fri, 20 Feb 2026 18:14:55 +0000 (19:14 +0100)] 
mountfsd: Relax user namespace checks

- Allow foreign UID range
- Allow delegated UID ranges

Both of these can now be mapped by nsresourced into user namespaces
and hence should be accepted by mountfsd.

7 weeks agonsresourced: Optionally map foreign UID range
Daan De Meyer [Thu, 29 Jan 2026 15:45:59 +0000 (16:45 +0100)] 
nsresourced: Optionally map foreign UID range

Whenever delegating UID ranges to a user namespace, it can also be
useful to map the foreign UID range, so that the container running in
the user namespace with delegated UID ranges can download container
images and unpack them to the foreign UID range.

Let's add an option mapForeign to make this possible. Note that this option
gives unprivileged users full access to the any foreign UID range owned directory
that they can access. Hence it is recommended (and already was recommended) to
store foreign UID range owned directories in a 0700 directory owned by the
owner of the tree to avoid access and modifications by other users.

This is already the case for the main users of the foreign UID range,
namely /var/lib/machines, /var/lib/portables and /home/<user> which all
use 0700 as their mode.

Users will also be able to create foreign UID range owned inodes in any
directories their own user can write to (on most systems this means /tmp,
/var/tmp and /home/<user>).

7 weeks agonsresourced: Add support for self mappings with delegations
Daan De Meyer [Sat, 24 Jan 2026 00:03:35 +0000 (01:03 +0100)] 
nsresourced: Add support for self mappings with delegations

mkosi does all of its environment setup in an unprivileged user
namespace with an identity mapping. When it invokes nspawn and nspawn
tries to get a transient userns from nsresourced, this fails as no
transient ranges are mapped into mkosi's unprivileged userns (as doing
so would require privileges).

To fix this problem, let's allow allocating unprivileged self user
namespaces in nsresourced, similar to what the kernel allows, except that
we also support delegations for these. This means that mkosi can get its
unprivileged userns as before from nsresourced, but it can also request a
delegated 64K range inside that userns as well, which nsresourced can then
allocate to nspawn later when it asks for one.

Similar to the kernel, we disallow setgroups for self mappings. However,
instead of doing this via /proc/self/setgroups, which applies to the current
user namespace and all its child user namespaces, we use the BPF LSM to deny
setgroups instead, so that it can still be allowed for child user namespaces.
We need this because as soon as a container launches in a child user namespace
using one of the delegated mappings, it has to be able to do setgroups() to be
able to function properly.

To allow mapping the root user, we need to add the CAP_SETFCAP capability to
nsresourced.

7 weeks agonsresourced: Add support for delegated ranges
Daan De Meyer [Fri, 23 Jan 2026 11:31:47 +0000 (12:31 +0100)] 
nsresourced: Add support for delegated ranges

We want to support the scenario where we bind mount the nsresourced
varlink socket into a container to allow nested containers where the
outer container runs in its own transient range from nsresourced but
can still allocate transient ranges for its own nested containers.

To support this use case let's add support for delegation. Delegated
ranges are allocated when allocating the primary range and are propagated
1:1 to the user namespace. We track delegated ranges in ".delegate" files
in the userns registry so that they can't be used for other range allocations.

We make one exception for delegated ranges though, if we get a request from
a user namespace that is a child of the user namespace that owns the delegated
ranges, we allow allocating from the delegated range. The parent userns already
has full ownership over the child userns, so it doesn't matter that the parent
userns and the child userns share the same range. This allows making use of
delegated ranges without having to run another copy of nsresourced inside the
parent userns to hand out from the delegated range.

To support recursive delegations, we keep track of the previous owners of the
delegated range and restore ownership to the last previous owner when the current
owner is freed.

7 weeks agonsresourced: Allow operations outside transient UID/GID ranges
Daan De Meyer [Fri, 23 Jan 2026 11:30:59 +0000 (12:30 +0100)] 
nsresourced: Allow operations outside transient UID/GID ranges

The purpose of the userns-restrict BPF-LSM program is to prevent the
transient ranges leaking to disk, so let's allow operations outside the
transient UID ranges, even if the mount is not allowlisted.

This is preparation for the next commits where we'll add support for mapping
the current user and the foreign UID range into the user namespaces provisioned
by nsresourced. Operations creating files/directories as these UIDs/GIDs should
not need the corresponding mount to be allowlisted with nsresourced.

7 weeks agosystemctl: introduce enqueue-marked-jobs verb (#40810)
Mike Yuan [Tue, 24 Feb 2026 17:08:22 +0000 (18:08 +0100)] 
systemctl: introduce enqueue-marked-jobs verb (#40810)

7 weeks agoman: coredump: KeepFree/MaxUse clarification of default values (#40796)
Yu Watanabe [Tue, 24 Feb 2026 16:35:38 +0000 (01:35 +0900)] 
man: coredump: KeepFree/MaxUse clarification of default values (#40796)

On sd-coredump for both `MaxUse` and `KeepFree` defaults has a caveat,
it may set it differently if not explicit configured.
On `MaxUse` it'll cap to 4GiB as seem
[here](https://github.com/systemd/systemd/blob/d39b10371964d048a3c5d7dbf84552ecdba66bbe/src/coredump/coredump-vacuum.c#L82).
Similar for `KeepFree`
[here](https://github.com/systemd/systemd/blob/d39b10371964d048a3c5d7dbf84552ecdba66bbe/src/coredump/coredump-vacuum.c#L98)

Also show that `MaxUse` takes precedence.

Making this clear at the man page

7 weeks agoimport/pull-oci: fix several OOM checks
Antonio Alvarez Feijoo [Tue, 24 Feb 2026 14:26:16 +0000 (15:26 +0100)] 
import/pull-oci: fix several OOM checks

Follow-up for a9f6ba04969d6eb2e629e30299fab7538ef42a57

7 weeks agoupdate TODO 40797/head
Lennart Poettering [Sun, 22 Feb 2026 20:08:45 +0000 (21:08 +0100)] 
update TODO

7 weeks agoanalyzer: remove spurious empty line
Lennart Poettering [Mon, 23 Feb 2026 20:56:40 +0000 (21:56 +0100)] 
analyzer: remove spurious empty line

7 weeks agosd-varlink: add a bit of debug logging indicating when exit-on-idle triggers
Lennart Poettering [Mon, 23 Feb 2026 12:22:44 +0000 (13:22 +0100)] 
sd-varlink: add a bit of debug logging indicating when exit-on-idle triggers

7 weeks agosd-varlink: use correct error variable
Lennart Poettering [Mon, 23 Feb 2026 12:22:27 +0000 (13:22 +0100)] 
sd-varlink: use correct error variable

7 weeks agosd-netlink: pin reply slot while we execute callback
Lennart Poettering [Mon, 23 Feb 2026 12:25:17 +0000 (13:25 +0100)] 
sd-netlink: pin reply slot while we execute callback

The callback might drop the last ref to the slot object, and we still
want to access it. Hence do what we usually do in these cases: keep an
extra reference while processing the callback.

7 weeks agonetwork: enable LLDP for links that use only link-local addressing
Lennart Poettering [Sun, 22 Feb 2026 13:15:20 +0000 (14:15 +0100)] 
network: enable LLDP for links that use only link-local addressing

Links with link-local-only communication are typically peer-to-peer
links between two laptops or similar. In such cases it makes sense to be
able to see which device one is specifically connected to, hence let's
just enable LLDP for it. This doesn't leak any data really, given that
this is inherently local, and typically only used between isolated
systems that are under the same user's possession.

Background: I recently connected multiple laptops via thunderbolt networking
and was kinda annoyed not being able to see what system I was actually
talking to.

(Also, the file touched here is an example only anyway, so even if this
would leak too much info, it's not in effect by default)

7 weeks agojournalctl: order systemd-journalctl.socket after systemd-sysusers
Kai Lüke [Tue, 24 Feb 2026 11:10:48 +0000 (20:10 +0900)] 
journalctl: order systemd-journalctl.socket after systemd-sysusers

The socket failed on boot due to a ordering problem caused by
systemd-sysusers running later and thus the socket group was still
missing. The socket unit can only start when systemd-sysusers created
the group.
Order the socket after systemd-sysusers.service to have the group
available.

7 weeks agoudev: hwdb: replace ID_INPUT_JOYSTICK_INTEGRATION (#40761)
Yu Watanabe [Tue, 24 Feb 2026 15:13:15 +0000 (00:13 +0900)] 
udev: hwdb: replace ID_INPUT_JOYSTICK_INTEGRATION (#40761)

Could ask to Bastien Nocera who originally commited the joysticks hwdb
integration
https://gitlab.freedesktop.org/libinput/libinput/-/merge_requests/1429#note_3338386
and stated that was for use in iio-sensor but later anything was done.

As the variable was never used replace it with the new variable actually
in the process to be use in libinput. Even more at least some of the
idea that was planed for ID_INPUT_JOYSTICK_INTEGRATION could be done in
libinput.

Actually ID_INPUT_JOYSTICK_INTEGRATION was never used anywhere, replace
it with ID_INTEGRATION.

Follow up: a4381cae8bfacb1160967ac499c2919da7ff8c2b.

7 weeks agoman/systemctl: deprecate --marked 40810/head
Mike Yuan [Tue, 24 Feb 2026 14:43:21 +0000 (15:43 +0100)] 
man/systemctl: deprecate --marked

7 weeks agosystemctl: introduce enqueue-marked-jobs verb, stop lumping it with distinct verbs
Mike Yuan [Tue, 24 Feb 2026 14:41:20 +0000 (15:41 +0100)] 
systemctl: introduce enqueue-marked-jobs verb, stop lumping it with distinct verbs

7 weeks agovarlink-idl: allow to pass polkit arguments to io.systemd.service.Reload() 40808/head
Yu Watanabe [Tue, 24 Feb 2026 12:54:54 +0000 (21:54 +0900)] 
varlink-idl: allow to pass polkit arguments to io.systemd.service.Reload()

Then, varlink interfaces with unprivileged access can be implement the
method.

7 weeks agonetwork: rename dispatch_interface() and make it take flags
Yu Watanabe [Tue, 24 Feb 2026 12:06:43 +0000 (21:06 +0900)] 
network: rename dispatch_interface() and make it take flags

No functional change. Just refactoring and preparation for later change.

7 weeks agonetwork: rename io.systemd.Network.LinkUp()/LinkDown()
Yu Watanabe [Tue, 24 Feb 2026 11:55:40 +0000 (20:55 +0900)] 
network: rename io.systemd.Network.LinkUp()/LinkDown()

Then, this also moves their implementations to networkd-link-varlink.c.

7 weeks agoRevert "systemctl: allow --marker with start/stop too"
Mike Yuan [Tue, 24 Feb 2026 14:22:28 +0000 (15:22 +0100)] 
Revert "systemctl: allow --marker with start/stop too"

This reverts commit 351b4dd123f89f7f8491239b2d3f77bef5d00797.

I'm pretty sure we should not create more of these multiplexer
interfaces, which in this specific also leads to a fair bit of
confusion: start/stop/reload-or-restart --marked all enqueue
all job types.

Instead, a dedicated verb will be introduced in later commits.

7 weeks agoinclude: update kernel headers from v7.0-rc1
Yu Watanabe [Tue, 24 Feb 2026 11:27:08 +0000 (20:27 +0900)] 
include: update kernel headers from v7.0-rc1

In v7.0-rc1, the kernel introduces typelimits.h to define __KERNEL_INT_MIN/_MAX.
Also, NULL_FS_MAGIC has been introduced for immutable rootfs..

7 weeks agotest: test io.systemd.JournalAccess
Yu Watanabe [Tue, 24 Feb 2026 11:10:14 +0000 (20:10 +0900)] 
test: test io.systemd.JournalAccess

Follow-up for a109189fabe6a4c307528459f891c2d545361622.

7 weeks agoerrno-list: filter out EFSBADCRC and EFSCORRUPTED
Yu Watanabe [Tue, 24 Feb 2026 11:19:45 +0000 (20:19 +0900)] 
errno-list: filter out EFSBADCRC and EFSCORRUPTED

These are introduced in kernel v7.0.

7 weeks agoNEWS: update for recent merges
Luca Boccassi [Tue, 24 Feb 2026 12:00:06 +0000 (12:00 +0000)] 
NEWS: update for recent merges

7 weeks agoudev: Trigger uaccess builtin on xaccess-* prefix
Alessandro Astone [Tue, 24 Feb 2026 09:48:49 +0000 (10:48 +0100)] 
udev: Trigger uaccess builtin on xaccess-* prefix

Fixup xaccess trigger after the rework.
There's no single `xaccess` tag anymore; instead we match on a prefix.

7 weeks agoresolved: Add ifindex=0 support for BrowseServices to browse all mDNS interfaces...
Luca Boccassi [Tue, 24 Feb 2026 11:53:47 +0000 (11:53 +0000)] 
resolved: Add ifindex=0 support for BrowseServices to browse all mDNS interfaces (#40133)

With v259, resolved can be used to replace Avahi for mDNS service
discovery and announcement. One key difference in the API is that Avahi
by default browses on all available interfaces by passing a special
`AVAHI_IF_UNSPEC` (-1) interface index value. With this change, passing
ifindex value `0` can be used to achieve the same , so this will work:
```
# Browse on all available interfaces
varlinkctl call --more unix:/run/systemd/resolve/io.systemd.Resolve \
    io.systemd.Resolve.BrowseServices \
    '{"domain":"local","type":"_display._tcp","ifindex":0,"flags":0}'
```
Not having to iterate through all interfaces on the client side then
also makes it more straight forward to build a resolve-avahi-compat
library for painlessly replacing Avahi with systemd-resolved.

A PoC compat lib requiring this change is available at
https://github.com/LorbusChris/resolve-avahi-compat

7 weeks agoSome bug fixes for logind inhibitors (#40400)
Luca Boccassi [Tue, 24 Feb 2026 11:50:01 +0000 (11:50 +0000)] 
Some bug fixes for logind inhibitors (#40400)

See individual commits

Related:
- https://gitlab.gnome.org/GNOME/gnome-shell/-/merge_requests/4040
- https://gitlab.gnome.org/GNOME/gnome-session/-/merge_requests/170
-
https://gitlab.gnome.org/GNOME/gnome-control-center/-/merge_requests/3309

7 weeks agoNEWS: Add note about logind's Can* return values 40400/head
Adrian Vovk [Tue, 24 Feb 2026 01:02:03 +0000 (20:02 -0500)] 
NEWS: Add note about logind's Can* return values

We've changed them to return additional values, which may be a breaking
change for desktop environments. In practice, it doesn't seem to be a
major issue. However, let's make sure to document the changes in the
NEWS anyway!

7 weeks agologin1: Emit NCurrentInhibitors changed events
Adrian Vovk [Tue, 20 Jan 2026 00:26:30 +0000 (19:26 -0500)] 
login1: Emit NCurrentInhibitors changed events

Currently, there's no way for a desktop environment to detect when a
systemd inhibitor has been added or removed. This means that a desktop
environment that wishes to show current inhibitors to the user will be
either forced to poll systemd or just use stale data.

Now, the desktop can listen for changed events on NCurrentInhibitors and
call GetInhibitors() in response to that.

7 weeks agologin1: Add "inhibited" state to Can* methods
Adrian Vovk [Mon, 19 Jan 2026 23:15:53 +0000 (18:15 -0500)] 
login1: Add "inhibited" state to Can* methods

Desktops cannot currently tell the difference between a power action
being set to challenge permanently (i.e. because the sysadmin wanted to
restrict the given user) and a power action being set to challenge
because it's temporarily inhibited.

Thus, a desktop might take an action that is valid in the first case but
not the second case. For instance: GNOME hides all of its automatic
suspend settings from the UI whenever a sleep inhibitor is active.

This now returns a new state: "inhibited". It communicates to the
desktop that the action is available normally, but at the moment the
desktop isn't allowed to perform the action due to an inhibitor.

Related: https://github.com/systemd/systemd/issues/37311

7 weeks agomanager: add needs-stop/needs-start (#40709)
Zbigniew Jędrzejewski-Szmek [Mon, 23 Feb 2026 23:36:06 +0000 (00:36 +0100)] 
manager: add needs-stop/needs-start (#40709)

Intend to use these in the deb packaging scriptlets

Fixes: #19755
7 weeks agomkosi: update debian commit reference to 89a825b80ee85e58b530cd95438988a6fb3531a3
Luca Boccassi [Mon, 23 Feb 2026 20:49:26 +0000 (20:49 +0000)] 
mkosi: update debian commit reference to 89a825b80ee85e58b530cd95438988a6fb3531a3

89a825b80e Install new files for upstream build
38b1a75eaa systemd.postinst: update journal catalog after reexecing managers
9420ffa0dd Install new files for upstream build
cb5fdf4df0 Install sd-report from new path
2501efe312 homed: drop dependency satisfied since bookworm/noble
424262b674 d/control: add TODO
9aaa01c99d d/libsystemd-shared.preinst: refuse to upgrade without unified cgroupv2 hierarchy
7d0ac8a4b8 Install new files for upstream build
7e55d41841 Do not install legacy.conf in upstream builds
190387958e d/e/checkout-upstream: try to install build deps with sudo in case it fails
2a4aa9f426 Disable installing runlevel targets for upstream build
e02600f2d9 Install new files for upstream build
0f1a56cf10 Update changelog for 259.1-1 release
e463300b1a d/e/checkout-upstream: try to install build deps again after switching to CI branch
b3f72821e5 Install ask-password polkit policy file
8219d561ae Restrict the tpm2-generator manpage to arches where it is built
30a0f27283 systemd.postinst: reexec system manager before user instances
1fc9ea2790 systemd.postinst: reexec before restarting any service
d9991aeb22 d/control: use libarchive13t64 | libarchive13 for bookworm/jammy
b750346711 d/control: make systemd-container Depends: libarchive13t64

Fixes https://github.com/systemd/systemd/issues/40777

7 weeks agosd-device,udev: several fixlets and cleanups for managing tags (#40786)
Luca Boccassi [Mon, 23 Feb 2026 21:53:28 +0000 (21:53 +0000)] 
sd-device,udev: several fixlets and cleanups for managing tags (#40786)

7 weeks agosysupdated: Split Update() into Acquire() and Install() D-Bus methods (#40628)
Lennart Poettering [Mon, 23 Feb 2026 21:08:37 +0000 (22:08 +0100)] 
sysupdated: Split Update() into Acquire() and Install() D-Bus methods (#40628)

These mirror the `sysupdate acquire` and `sysupdate install` verbs,
which are themselves a split of `sysupdate update` into downloading and
installing stages.

I have dropped the existing `Update()` method in the final commit, as
per the suggestion on
https://gitlab.gnome.org/GNOME/gnome-software/-/merge_requests/2004#note_2145880.
If the D-Bus API for `sysupdated` is considered stable now, though, I
can drop that commit.

CC @AdrianVovk

Fixes https://github.com/systemd/systemd/issues/34814

7 weeks agoSeveral follow-ups for JournalAccess varlink interface (#40794)
Daan De Meyer [Mon, 23 Feb 2026 19:17:31 +0000 (20:17 +0100)] 
Several follow-ups for JournalAccess varlink interface (#40794)

7 weeks agoman: coredump: MaxUse takes precedence 40796/head
André Paiusco [Mon, 23 Feb 2026 16:43:09 +0000 (16:43 +0000)] 
man: coredump: MaxUse takes precedence

7 weeks agosysupdated: Drop the Update() D-Bus method 40628/head
Philip Withnall [Mon, 19 Jan 2026 18:33:27 +0000 (18:33 +0000)] 
sysupdated: Drop the Update() D-Bus method

Now that it’s been replaced by `Acquire()` and `Install()`, there’s no
need to expose it as a separate method. Wrappers around `sysupdated` can
still expose an ‘update’ convenience verb by calling those two methods.

Signed-off-by: Philip Withnall <pwithnall@gnome.org>
Helps: https://github.com/systemd/systemd/issues/34814

7 weeks agotest: Expand sysupdate test to test updatectl update
Philip Withnall [Mon, 19 Jan 2026 18:12:39 +0000 (18:12 +0000)] 
test: Expand sysupdate test to test updatectl update

This further expands the sysupdate test to run the suite a fourth time,
testing that `updatectl update` behaves the same as `sysupdate update`
and `sysupdate acquire; sysupdate update --offline`.

Signed-off-by: Philip Withnall <pwithnall@gnome.org>
7 weeks agoupdatectl: Expose partial/pending updates in the updatectl list output
Philip Withnall [Mon, 19 Jan 2026 17:11:18 +0000 (17:11 +0000)] 
updatectl: Expose partial/pending updates in the updatectl list output

And expand the tests to catch if any more JSON fields are added to the
sysupdated output in future without being added to `updatectl`’s parser.

Signed-off-by: Philip Withnall <pwithnall@gnome.org>
Helps: https://github.com/systemd/systemd/issues/34814

7 weeks agoupdatectl: Use sysupdated’s Acquire() and Install() methods
Philip Withnall [Mon, 19 Jan 2026 17:19:39 +0000 (17:19 +0000)] 
updatectl: Use sysupdated’s Acquire() and Install() methods

Rather than calling `Update()`. This should allow us to eventually drop
`Update()`.

This should just be an internal change, and should not result in any
user-visible changes to the behaviour of `updatectl update`.

Signed-off-by: Philip Withnall <pwithnall@gnome.org>
Helps: https://github.com/systemd/systemd/issues/34814

7 weeks agosysupdated: Add Acquire() and Install() D-Bus methods
Philip Withnall [Mon, 19 Jan 2026 17:16:54 +0000 (17:16 +0000)] 
sysupdated: Add Acquire() and Install() D-Bus methods

These mirror the `sysupdate acquire` and `sysupdate update --offline`
verbs, which are themselves a split of `sysupdate update` into
downloading and installing stages.

The existing `sysupdated` `Update()` method is kept for now, for
convenience. It might be dropped in future.

Signed-off-by: Philip Withnall <pwithnall@gnome.org>
Helps: https://github.com/systemd/systemd/issues/34814

7 weeks agoman: coredump: KeepFree/MaxUse clarification of default values
André Paiusco [Mon, 23 Feb 2026 16:22:32 +0000 (16:22 +0000)] 
man: coredump: KeepFree/MaxUse clarification of default values

7 weeks agocore: Introduce ConditionPathIsSocket= (#40791)
Mike Yuan [Mon, 23 Feb 2026 16:07:28 +0000 (17:07 +0100)] 
core: Introduce ConditionPathIsSocket= (#40791)

7 weeks agorepart: Use new mkfs.xfs support for populating from directories
DaanDeMeyer [Sat, 27 Dec 2025 20:07:13 +0000 (21:07 +0100)] 
repart: Use new mkfs.xfs support for populating from directories

xfsprogs 6.17.0 added support for populating xfs filesystems from
directories. As this supports extended attributes unlike our current
hack with protofiles. Let's make use of the new feature in mkfs-util.c

As there's no clean way to do feature detection on the mkfs.xfs binary,
we drop support for the old hack with protofiles that we had before.

7 weeks agosystemctl: allow --marker with start/stop too 40709/head
Luca Boccassi [Thu, 19 Feb 2026 16:32:49 +0000 (16:32 +0000)] 
systemctl: allow --marker with start/stop too

7 weeks agomanager: add 'needs-stop/needs-start' markers
Luca Boccassi [Sat, 27 Dec 2025 11:02:30 +0000 (11:02 +0000)] 
manager: add 'needs-stop/needs-start' markers

Useful for packaging scripts, when units are removed.
When multiple markers are assigned without +/-, the last one wins.
When using +/-, the job merging logic is followed to the extent possible.

7 weeks agocore: Introduce ConditionPathIsSocket= 40791/head
Daan De Meyer [Sat, 21 Feb 2026 16:52:49 +0000 (17:52 +0100)] 
core: Introduce ConditionPathIsSocket=

7 weeks agotest-condition: Migrate to new assertion macros
Daan De Meyer [Mon, 23 Feb 2026 11:27:56 +0000 (12:27 +0100)] 
test-condition: Migrate to new assertion macros

7 weeks agomountfsd: Try to polkit auth when the verity key is not available
Daan De Meyer [Sat, 21 Feb 2026 21:10:56 +0000 (22:10 +0100)] 
mountfsd: Try to polkit auth when the verity key is not available

If we include a verity signature but the corresponding key is not in
the kernel keyring or userspace, try to get polkit auth similar to how
we do the same if the image doesn't pass the policy.

7 weeks agoTranslations update from Fedora Weblate (#40789)
Luca Boccassi [Mon, 23 Feb 2026 10:54:21 +0000 (10:54 +0000)] 
Translations update from Fedora Weblate (#40789)

Translations update from [Fedora
Weblate](https://translate.fedoraproject.org) for
[systemd/main](https://translate.fedoraproject.org/projects/systemd/main/).

Current translation status:

![Weblate translation
status](https://translate.fedoraproject.org/widget/systemd/main/horizontal-auto.svg)

7 weeks agojournalctl-vl-server: allow querying units for specific uid in system scope 40794/head
Mike Yuan [Mon, 23 Feb 2026 07:04:17 +0000 (08:04 +0100)] 
journalctl-vl-server: allow querying units for specific uid in system scope

This also moves journal_add_unit_matches() back to
journalctl-filter.[ch], as I see more appropriate.

7 weeks agojournalctl-vl-server: do not output in reverse order
Mike Yuan [Mon, 23 Feb 2026 08:09:02 +0000 (09:09 +0100)] 
journalctl-vl-server: do not output in reverse order

While at it, do not log from varlink method callback,
as per our usual style.

7 weeks agojournalctl-vl-server: 'entry' is never NULL
Mike Yuan [Mon, 23 Feb 2026 08:01:16 +0000 (09:01 +0100)] 
journalctl-vl-server: 'entry' is never NULL

7 weeks agojournalctl-vl-server: use SD_JSON_BUILD_PAIR_VARIANT
Mike Yuan [Mon, 23 Feb 2026 08:18:53 +0000 (09:18 +0100)] 
journalctl-vl-server: use SD_JSON_BUILD_PAIR_VARIANT

7 weeks agojournalctl-vl-server: return proper error if unit pattern has no match
Mike Yuan [Mon, 23 Feb 2026 07:54:12 +0000 (08:54 +0100)] 
journalctl-vl-server: return proper error if unit pattern has no match

Note that SD_VARLINK_ERROR_INVALID_PARAMETERS requires
the invalid param name to be specified, hence we would
otherwise have reported an invalid INVALID_PARAMETERS
error ;)

7 weeks agologs-show: clean up journal_entry_to_json() a bit
Mike Yuan [Mon, 23 Feb 2026 06:48:43 +0000 (07:48 +0100)] 
logs-show: clean up journal_entry_to_json() a bit

* Make sure ret is initialized on success return
* Drop unneeded 'object' variable
* No need to ref/unref json objects when constructing
  intermediary array

7 weeks agounits/user/systemd-journalctl.socket: drop MaxConnectionsPerSource=
Mike Yuan [Mon, 23 Feb 2026 08:30:17 +0000 (09:30 +0100)] 
units/user/systemd-journalctl.socket: drop MaxConnectionsPerSource=

For AF_UNIX sockets connection sources are accounted for
based on UID, hence in user scope this effectively
limits total number of connections, which is not really
desirable.

7 weeks agounits/systemd-journalctl@.service: run with DynamicUser=yes
Mike Yuan [Mon, 23 Feb 2026 06:21:04 +0000 (07:21 +0100)] 
units/systemd-journalctl@.service: run with DynamicUser=yes

Follow-up for a109189fabe6a4c307528459f891c2d545361622

This follows the existing practice for
systemd-journal-{upload,gatewayd}.service,
as I think allocating a full-blown user
specifically for this purpose is an overkill.
And with DynamicUser=yes we can also take
advantage of implied sandboxing.

7 weeks agounits/systemd-journalctl@.service: require mount for /var/log/journal/
Mike Yuan [Mon, 23 Feb 2026 05:58:44 +0000 (06:58 +0100)] 
units/systemd-journalctl@.service: require mount for /var/log/journal/

7 weeks agounits/systemd-pcrlock.socket: drop [Install] section
Mike Yuan [Mon, 23 Feb 2026 08:20:54 +0000 (09:20 +0100)] 
units/systemd-pcrlock.socket: drop [Install] section

The socket is statically enabled.

7 weeks agoTODO: drop completed entry
Mike Yuan [Mon, 23 Feb 2026 09:21:23 +0000 (10:21 +0100)] 
TODO: drop completed entry

7 weeks agopo: Translated using Weblate (German) 40789/head
Ettore Atalan [Sun, 22 Feb 2026 23:58:46 +0000 (23:58 +0000)] 
po: Translated using Weblate (German)

Currently translated at 100.0% (264 of 264 strings)

Co-authored-by: Ettore Atalan <atalanttore@googlemail.com>
Translate-URL: https://translate.fedoraproject.org/projects/systemd/main/de/
Translation: systemd/main

7 weeks agopo: Translated using Weblate (Hebrew)
Yaron Shahrabani [Sun, 22 Feb 2026 23:58:46 +0000 (23:58 +0000)] 
po: Translated using Weblate (Hebrew)

Currently translated at 100.0% (264 of 264 strings)

Co-authored-by: Yaron Shahrabani <sh.yaron@gmail.com>
Translate-URL: https://translate.fedoraproject.org/projects/systemd/main/he/
Translation: systemd/main

7 weeks agoman/systemd.mstack: use <varname> instead of <variable>
Antonio Alvarez Feijoo [Mon, 23 Feb 2026 08:38:09 +0000 (09:38 +0100)] 
man/systemd.mstack: use <varname> instead of <variable>

Otherwise, `<variable>location</variable>` is rendered:

```
[2365/2925] Generating man/systemd.mstack.7 with a custom command
Element variable in namespace '' encountered in para, but no template matches.
```

7 weeks agoresolved: Add test for ifindex=0 BrowseServices functionality 40133/head
Christian Glombek [Thu, 18 Dec 2025 11:46:56 +0000 (12:46 +0100)] 
resolved: Add test for ifindex=0 BrowseServices functionality

Add integration tests for the new ifindex=0 support
in BrowseServices that allows browsing all mDNS interfaces.

Integration test (in TEST-89-RESOLVED-MDNS.sh):
- testcase_browse_all_interfaces_ifindex_zero: Test with ifindex=0

Assisted-by: Claude Opus 4.5 (Preview)
7 weeks agoresolved: Add ifindex=0 support for BrowseServices to browse all mDNS interfaces
Christian Glombek [Sun, 22 Feb 2026 22:51:22 +0000 (23:51 +0100)] 
resolved: Add ifindex=0 support for BrowseServices to browse all mDNS interfaces

Avahi provides AVAHI_IF_UNSPEC (-1) to browse mDNS services on all
interfaces simultaneously. Currently, systemd-resolved's BrowseServices
varlink API requires a specific interface index and lacks the ability to browse on
all available interfaces.

This change adds support for ifindex = 0 to mean \"browse on all mDNS-enabled
interfaces\" to match the Avahi API.

When ifindex = 0 is specified the browser will now iterate all mDNS scopes
instead of a single interface.

This enables applications to discover services on any network interface
without needing to know the specific interface index in advance.

Assisted-by: Claude Opus 4.6 (Eclipse Theia IDE AI)