blob: b1fbf284a12c6b73097a9bd309f3c2dac7d970ef [file] [log] [blame]
Lennart Poetteringd657c512012-01-25 02:20:38 +01001systemd System and Service Manager
Lennart Poettering31cee6f2010-05-13 03:30:21 +02002
3DETAILS:
4 http://0pointer.de/blog/projects/systemd.html
5
6WEB SITE:
AsciiWolf19d93722017-02-21 15:56:04 +01007 https://www.freedesktop.org/wiki/Software/systemd
Lennart Poettering31cee6f2010-05-13 03:30:21 +02008
9GIT:
Jonathan Boulleeb0914f2015-06-02 15:57:50 -070010 git@github.com:systemd/systemd.git
Jonathan Boulleeb0914f2015-06-02 15:57:50 -070011 https://github.com/systemd/systemd
Lennart Poettering31cee6f2010-05-13 03:30:21 +020012
13MAILING LIST:
AsciiWolf19d93722017-02-21 15:56:04 +010014 https://lists.freedesktop.org/mailman/listinfo/systemd-devel
Lennart Poettering31cee6f2010-05-13 03:30:21 +020015
16IRC:
17 #systemd on irc.freenode.org
18
19BUG REPORTS:
Jonathan Boulleeb0914f2015-06-02 15:57:50 -070020 https://github.com/systemd/systemd/issues
Lennart Poettering31cee6f2010-05-13 03:30:21 +020021
22AUTHOR:
Lennart Poettering5430f7f2012-04-12 00:20:58 +020023 Lennart Poettering
24 Kay Sievers
25 ...and many others
Lennart Poettering31cee6f2010-05-13 03:30:21 +020026
Lennart Poettering673eab92011-07-14 23:53:53 +020027LICENSE:
Lennart Poettering5430f7f2012-04-12 00:20:58 +020028 LGPLv2.1+ for all code
Kay Sieversa0953152015-06-09 14:27:33 +020029 - except src/basic/MurmurHash2.c which is Public Domain
30 - except src/basic/siphash24.c which is CC0 Public Domain
Kay Sievers85424722013-08-14 22:58:21 +020031 - except src/journal/lookup3.c which is Public Domain
32 - except src/udev/* which is (currently still) GPLv2, GPLv2+
Tim Teichmann0490b442019-10-06 17:59:53 +020033 - except tools/chromiumos/* which is BSD-style
Lennart Poettering673eab92011-07-14 23:53:53 +020034
Lennart Poettering31cee6f2010-05-13 03:30:21 +020035REQUIREMENTS:
Michael Biebldcce98a2017-03-02 19:11:37 +010036 Linux kernel >= 3.13
Lennart Poetteringa0c3e162015-09-06 15:58:20 +020037 Linux kernel >= 4.2 for unified cgroup hierarchy support
Luca Boccassic2923fd2020-06-02 15:35:58 +010038 Linux kernel >= 5.4 for signed Verity images support
Kay Sievers23aedd02014-03-22 18:27:35 +010039
40 Kernel Config Options:
Kay Sievers713bc0c2013-03-06 19:36:39 +010041 CONFIG_DEVTMPFS
Jan Engelhardtd28315e2014-05-03 19:15:23 +020042 CONFIG_CGROUPS (it is OK to disable all controllers)
Kay Sievers713bc0c2013-03-06 19:36:39 +010043 CONFIG_INOTIFY_USER
44 CONFIG_SIGNALFD
45 CONFIG_TIMERFD
46 CONFIG_EPOLL
Kay Sievers41938692013-03-06 19:51:52 +010047 CONFIG_NET
Kay Sievers713bc0c2013-03-06 19:36:39 +010048 CONFIG_SYSFS
Shawn Landden06d461e2013-12-09 07:04:06 -080049 CONFIG_PROC_FS
Kay Sievers5d319742014-02-15 17:21:49 +010050 CONFIG_FHANDLE (libudev, mount and bind mount handling)
Kay Sievers713bc0c2013-03-06 19:36:39 +010051
Mike Gilbert9c7f7d82017-02-25 22:42:27 -050052 Kernel crypto/hash API
53 CONFIG_CRYPTO_USER_API_HASH
54 CONFIG_CRYPTO_HMAC
55 CONFIG_CRYPTO_SHA256
56
Kay Sieversbe2ea722014-08-30 11:34:20 +020057 udev will fail to work with the legacy sysfs layout:
Kay Sieversf28cbd02013-03-06 20:01:45 +010058 CONFIG_SYSFS_DEPRECATED=n
Kay Sievers713bc0c2013-03-06 19:36:39 +010059
60 Legacy hotplug slows down the system and confuses udev:
61 CONFIG_UEVENT_HELPER_PATH=""
62
Kay Sieversbe2ea722014-08-30 11:34:20 +020063 Userspace firmware loading is not supported and should
64 be disabled in the kernel:
Kay Sievers713bc0c2013-03-06 19:36:39 +010065 CONFIG_FW_LOADER_USER_HELPER=n
66
67 Some udev rules and virtualization detection relies on it:
68 CONFIG_DMIID
69
Kay Sieversa5c724b2013-09-15 07:29:25 +020070 Support for some SCSI devices serial number retrieval, to
71 create additional symlinks in /dev/disk/ and /dev/tape:
72 CONFIG_BLK_DEV_BSG
73
Alan Jenkins45a582d2018-01-15 16:55:11 +000074 Required for PrivateNetwork= in service units:
Mike Gilbert13468822014-03-31 14:28:23 -040075 CONFIG_NET_NS
Zbigniew Jędrzejewski-Szmekb52a4a32014-12-30 09:57:01 -050076 Note that systemd-localed.service and other systemd units use
Alan Jenkins45a582d2018-01-15 16:55:11 +000077 PrivateNetwork so this is effectively required.
Mike Gilbert13468822014-03-31 14:28:23 -040078
Lennart Poettering0ca48bb2017-02-06 21:13:21 +010079 Required for PrivateUsers= in service units:
Lucas Werkmeister87fe1702017-01-24 03:18:07 +010080 CONFIG_USER_NS
81
Kay Sievers713bc0c2013-03-06 19:36:39 +010082 Optional but strongly recommended:
83 CONFIG_IPV6
84 CONFIG_AUTOFS4_FS
Kay Sievers713bc0c2013-03-06 19:36:39 +010085 CONFIG_TMPFS_XATTR
George G0ceced32018-01-04 07:53:44 +000086 CONFIG_{TMPFS,EXT4_FS,XFS,BTRFS_FS,...}_POSIX_ACL
Kay Sieversf28cbd02013-03-06 20:01:45 +010087 CONFIG_SECCOMP
Felipe Satelerfd74fa72016-09-05 19:16:13 -030088 CONFIG_SECCOMP_FILTER (required for seccomp support)
Lennart Poettering3b920d72015-05-18 16:35:24 +020089 CONFIG_CHECKPOINT_RESTORE (for the kcmp() syscall)
Kay Sievers713bc0c2013-03-06 19:36:39 +010090
Lennart Poetteringf4e74be2015-07-11 14:18:35 -030091 Required for CPUShares= in resource control unit settings
Umut Tezduyar Lindskoga21b4672014-06-10 23:29:30 +020092 CONFIG_CGROUP_SCHED
93 CONFIG_FAIR_GROUP_SCHED
94
Lennart Poetteringf4e74be2015-07-11 14:18:35 -030095 Required for CPUQuota= in resource control unit settings
WaLyong Cho0acd5a02014-11-19 00:13:43 +090096 CONFIG_CFS_BANDWIDTH
97
Andrew Jeddelohb1b96382017-11-21 14:54:20 -080098 Required for IPAddressDeny= and IPAddressAllow= in resource control
99 unit settings
100 CONFIG_CGROUP_BPF
101
Kay Sieversf28cbd02013-03-06 20:01:45 +0100102 For UEFI systems:
Thomas Bächlerf33016f2014-03-22 01:41:12 +0100103 CONFIG_EFIVAR_FS
Kay Sieversf28cbd02013-03-06 20:01:45 +0100104 CONFIG_EFI_PARTITION
105
Luca Boccassic2923fd2020-06-02 15:35:58 +0100106 Required for signed Verity images support:
107 CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG
108
Lennart Poetteringf4e74be2015-07-11 14:18:35 -0300109 We recommend to turn off Real-Time group scheduling in the
110 kernel when using systemd. RT group scheduling effectively
111 makes RT scheduling unavailable for most userspace, since it
112 requires explicit assignment of RT budgets to each unit whose
113 processes making use of RT. As there's no sensible way to
114 assign these budgets automatically this cannot really be
115 fixed, and it's best to disable group scheduling hence.
116 CONFIG_RT_GROUP_SCHED=n
117
Lennart Poetteringf5a93d52017-07-24 11:28:04 +0200118 It's a good idea to disable the implicit creation of networking bonding
119 devices by the kernel networking bonding module, so that the
120 automatically created "bond0" interface doesn't conflict with any such
Dimitri John Ledkov582faeb2017-08-02 13:41:18 +0100121 device created by systemd-networkd (or other tools). Ideally there
122 would be a kernel compile-time option for this, but there currently
123 isn't. The next best thing is to make this change through a modprobe.d
124 drop-in. This is shipped by default, see modprobe.d/systemd.conf.
Lennart Poetteringf5a93d52017-07-24 11:28:04 +0200125
Alan Jenkins45a582d2018-01-15 16:55:11 +0000126 Required for systemd-nspawn:
127 CONFIG_DEVPTS_MULTIPLE_INSTANCES or Linux kernel >= 4.7
128
Lennart Poettering77b6e192013-05-10 00:14:12 +0200129 Note that kernel auditing is broken when used with systemd's
130 container code. When using systemd in conjunction with
Jan Engelhardt19aadac2013-10-22 01:50:48 +0200131 containers, please make sure to either turn off auditing at
Lennart Poettering77b6e192013-05-10 00:14:12 +0200132 runtime using the kernel command line option "audit=0", or
133 turn it off at kernel compile time using:
134 CONFIG_AUDIT=n
Lennart Poetteringa7b1c392014-03-11 05:40:36 +0100135 If systemd is compiled with libseccomp support on
136 architectures which do not use socketcall() and where seccomp
137 is supported (this effectively means x86-64 and ARM, but
Jan Engelhardt70a44af2014-05-03 19:15:24 +0200138 excludes 32-bit x86!), then nspawn will now install a
Lennart Poetteringa7b1c392014-03-11 05:40:36 +0100139 work-around seccomp filter that makes containers boot even
140 with audit being enabled. This works correctly only on kernels
141 3.14 and newer though. TL;DR: turn audit off, still.
Lennart Poettering77b6e192013-05-10 00:14:12 +0200142
Łukasz Stelmach3dd26f32015-04-10 19:39:17 +0200143 glibc >= 2.16
Lennart Poettering3ede8352011-02-16 19:09:11 +0100144 libcap
Zbigniew Jędrzejewski-Szmekd6e80962017-09-15 14:47:57 +0200145 libmount >= 2.30 (from util-linux)
146 (util-linux *must* be built without --enable-libmount-support-mtab)
hbrueckner6abfd302016-10-05 13:58:55 +0200147 libseccomp >= 2.3.1 (optional)
Gabriel de Perthuisd47f6ca2014-12-13 01:56:56 +0100148 libblkid >= 2.24 (from util-linux) (optional)
Tom Gundersena18535d2013-10-17 19:49:19 +0200149 libkmod >= 15 (optional)
Lennart Poettering3ede8352011-02-16 19:09:11 +0100150 PAM >= 1.1.2 (optional)
Luca Boccassic2923fd2020-06-02 15:35:58 +0100151 libcryptsetup (optional), >= 2.3.0 required for signed Verity images support
Lennart Poettering3ede8352011-02-16 19:09:11 +0100152 libaudit (optional)
Zbigniew Jędrzejewski-Szmek19d5d4c2011-07-12 13:57:48 +0200153 libacl (optional)
Anita Zhange71f5582020-08-17 23:09:38 -0700154 libfdisk >= 2.33 (from util-linux) (optional)
Lennart Poettering3ede8352011-02-16 19:09:11 +0100155 libselinux (optional)
Zbigniew Jędrzejewski-Szmek19d5d4c2011-07-12 13:57:48 +0200156 liblzma (optional)
Zbigniew Jędrzejewski-Szmeke0a1d4b2018-10-29 18:32:51 +0100157 liblz4 >= 1.3.0 / 130 (optional)
Norbert Langeef5924a2020-04-12 01:09:05 +0200158 libzstd >= 1.4.0 (optional)
Lennart Poettering7b17a7d2012-09-28 00:46:32 +0200159 libgcrypt (optional)
160 libqrencode (optional)
161 libmicrohttpd (optional)
Zbigniew Jędrzejewski-Szmek2cc86f02012-11-22 15:30:50 +0100162 libpython (optional)
Zbigniew Jędrzejewski-Szmek87057e22017-05-09 21:56:34 -0400163 libidn2 or libidn (optional)
Iwan Timmer38e053c2019-10-29 20:26:05 +0100164 gnutls >= 3.1.4 (optional, >= 3.6.0 is required to support DNS-over-TLS with gnutls)
Iwan Timmer096cbdc2018-07-26 22:47:50 +0100165 openssl >= 1.1.0 (optional, required to support DNS-over-TLS with openssl)
Lennart Poettering5b244712014-06-23 12:42:17 +0200166 elfutils >= 158 (optional)
Zbigniew Jędrzejewski-Szmekd79a2f52017-11-13 21:54:45 +0100167 polkit (optional)
Zbigniew Jędrzejewski-Szmek781748a2019-02-28 15:37:06 +0100168 tzdata >= 2014f (optional)
Zbigniew Jędrzejewski-Szmek72cdb3e2017-07-02 20:21:34 -0400169 pkg-config
Mike Gilbert8f968c72017-08-05 18:30:37 -0400170 gperf
Zbigniew Jędrzejewski-Szmek72cdb3e2017-07-02 20:21:34 -0400171 docbook-xsl (optional, required for documentation)
172 xsltproc (optional, required for documentation)
173 python-lxml (optional, required to build the indices)
Yu Watanabe40f116f2019-01-13 09:42:28 +0900174 python >= 3.5
175 meson >= 0.46 (>= 0.49 is required to build position-independent executables)
176 ninja
Zbigniew Jędrzejewski-Szmek72cdb3e2017-07-02 20:21:34 -0400177 gcc, awk, sed, grep, m4, and similar tools
Lennart Poettering3ede8352011-02-16 19:09:11 +0100178
Jan Engelhardt19aadac2013-10-22 01:50:48 +0200179 During runtime, you need the following additional
180 dependencies:
Zbigniew Jędrzejewski-Szmek2cc86f02012-11-22 15:30:50 +0100181
Martin Pitt1d40ddb2015-11-02 10:05:20 -0600182 util-linux >= v2.27.1 required
Lennart Poetteringb895fa02019-12-20 12:26:17 +0100183 dbus >= 1.4.0 (strictly speaking optional, but recommended)
184 NOTE: If using dbus < 1.9.18, you should override the default
185 policy directory (--with-dbuspolicydir=/etc/dbus-1/system.d).
Zbigniew Jędrzejewski-Szmek2cc86f02012-11-22 15:30:50 +0100186 dracut (optional)
Zbigniew Jędrzejewski-Szmekd35f51e2018-07-16 12:44:24 +0200187 polkit (optional)
Zbigniew Jędrzejewski-Szmek2cc86f02012-11-22 15:30:50 +0100188
Zbigniew Jędrzejewski-Szmek3e609a82017-04-18 21:52:30 -0400189 To build in directory build/:
190 meson build/ && ninja -C build
191
Ben Boeckel5238e952019-04-26 20:22:40 -0400192 Any configuration options can be specified as -Darg=value... arguments
Zbigniew Jędrzejewski-Szmek3e609a82017-04-18 21:52:30 -0400193 to meson. After the build directory is initially configured, meson will
194 refuse to run again, and options must be changed with:
195 mesonconf -Darg=value...
196 mesonconf without any arguments will print out available options and
197 their current values.
198
199 Useful commands:
200 ninja -v some/target
201 ninja test
202 sudo ninja install
203 DESTDIR=... ninja install
204
Zbigniew Jędrzejewski-Szmek72cdb3e2017-07-02 20:21:34 -0400205 A tarball can be created with:
Kay Sievers82627062015-06-23 13:40:53 +0200206 git archive --format=tar --prefix=systemd-222/ v222 | xz > systemd-222.tar.xz
207
Jan Engelhardt19aadac2013-10-22 01:50:48 +0200208 When systemd-hostnamed is used, it is strongly recommended to
209 install nss-myhostname to ensure that, in a world of
210 dynamically changing hostnames, the hostname stays resolvable
Lennart Poetteringfff2e5b2011-05-17 19:35:56 +0200211 under all circumstances. In fact, systemd-hostnamed will warn
Kay Sieversbf9e4772013-01-24 10:31:34 +0100212 if nss-myhostname is not installed.
Lennart Poetteringfff2e5b2011-05-17 19:35:56 +0200213
Lennart Poettering01c89382017-11-17 11:39:14 +0100214 nss-systemd must be enabled on systemd systems, as that's required for
215 DynamicUser= to work. Note that we ship services out-of-the-box that
216 make use of DynamicUser= now, hence enabling nss-systemd is not
217 optional.
218
Lennart Poettering1815dfb2018-07-16 12:18:36 +0200219 Note that the build prefix for systemd must be /usr. (Moreover,
220 packages systemd relies on — such as D-Bus — really should use the same
221 prefix, otherwise you are on your own.) -Dsplit-usr=false (which is the
222 default and does not need to be specified) is the recommended setting,
223 and -Dsplit-usr=true should be used on systems which have /usr on a
224 separate partition.
Lennart Poettering01c89382017-11-17 11:39:14 +0100225
Zbigniew Jędrzejewski-Szmeka2fc3d82016-10-15 20:51:19 -0400226 Additional packages are necessary to run some tests:
227 - busybox (used by test/TEST-13-NSPAWN-SMOKE)
228 - nc (used by test/TEST-12-ISSUE-3171)
229 - python3-pyparsing
230 - python3-evdev (used by hwdb parsing tests)
231 - strace (used by test/test-functions)
Zbigniew Jędrzejewski-Szmeke94681a2017-02-12 00:22:20 -0500232 - capsh (optional, used by test-execute)
Zbigniew Jędrzejewski-Szmeka2fc3d82016-10-15 20:51:19 -0400233
Lennart Poetteringa24c64f2013-03-05 18:53:21 +0100234USERS AND GROUPS:
Lennart Poettering37495ee2013-03-05 19:15:31 +0100235 Default udev rules use the following standard system group
236 names, which need to be resolvable by getgrnam() at any time,
237 even in the very early boot stages, where no other databases
238 and network are available:
239
Lennart Poettering2422bd22017-11-20 12:30:42 +0100240 audio, cdrom, dialout, disk, input, kmem, kvm, lp, render, tape, tty, video
Kay Sievers37c0e8f2013-03-05 19:04:48 +0100241
Jan Engelhardt19aadac2013-10-22 01:50:48 +0200242 During runtime, the journal daemon requires the
Michael Biebl1a9ce3f2013-03-05 19:19:26 +0100243 "systemd-journal" system group to exist. New journal files will
Jan Engelhardt19aadac2013-10-22 01:50:48 +0200244 be readable by this group (but not writable), which may be used
Zbigniew Jędrzejewski-Szmeka48a62a2015-01-18 15:05:40 -0500245 to grant specific users read access. In addition, system
246 groups "wheel" and "adm" will be given read-only access to
247 journal files using systemd-tmpfiles.service.
Lennart Poetteringa24c64f2013-03-05 18:53:21 +0100248
Yu Watanabef959c5c2018-05-01 15:15:44 +0900249 The journal remote daemon requires the
250 "systemd-journal-remote" system user and group to
Lennart Poettering37495ee2013-03-05 19:15:31 +0100251 exist. During execution this network facing service will drop
252 privileges and assume this uid/gid for security reasons.
253
Jan Engelhardt8d0e0dd2014-06-28 00:48:28 +0200254 Similarly, the network management daemon requires the
Lennart Poettering323a2f02014-06-04 11:17:32 +0200255 "systemd-network" system user and group to exist.
Lennart Poetteringe15007b2014-06-01 09:35:19 +0200256
Jan Engelhardt8d0e0dd2014-06-28 00:48:28 +0200257 Similarly, the name resolution daemon requires the
Lennart Poettering323a2f02014-06-04 11:17:32 +0200258 "systemd-resolve" system user and group to exist.
259
Lennart Poettering888e3782016-02-08 23:35:24 +0100260 Similarly, the coredump support requires the
261 "systemd-coredump" system user and group to exist.
262
Lennart Poetteringa4a79602014-08-19 21:55:10 +0200263NSS:
Lennart Poettering409093f2016-07-14 19:19:49 +0200264 systemd ships with four glibc NSS modules:
Lennart Poetteringa4a79602014-08-19 21:55:10 +0200265
Lennart Poettering38ccb552020-07-07 21:58:12 +0200266 nss-myhostname resolves the local hostname to locally configured IP
267 addresses, as well as "localhost" to 127.0.0.1/::1.
Lennart Poetteringa4a79602014-08-19 21:55:10 +0200268
Lennart Poettering38ccb552020-07-07 21:58:12 +0200269 nss-resolve enables DNS resolution via the systemd-resolved DNS/LLMNR
270 caching stub resolver "systemd-resolved".
Lennart Poetteringa4a79602014-08-19 21:55:10 +0200271
Lennart Poettering409093f2016-07-14 19:19:49 +0200272 nss-mymachines enables resolution of all local containers registered
Lennart Poettering38ccb552020-07-07 21:58:12 +0200273 with machined to their respective IP addresses.
Lennart Poetteringa4a79602014-08-19 21:55:10 +0200274
Lennart Poettering38ccb552020-07-07 21:58:12 +0200275 nss-systemd enables resolution of users/group registered via the
276 User/Group Record Lookup API (https://systemd.io/USER_GROUP_API/),
277 including all dynamically allocated service users. (See the
278 DynamicUser= setting in unit files.)
Lennart Poetteringa4a79602014-08-19 21:55:10 +0200279
Lennart Poettering409093f2016-07-14 19:19:49 +0200280 To make use of these NSS modules, please add them to the "hosts:",
281 "passwd:" and "group:" lines in /etc/nsswitch.conf. The "resolve"
282 module should replace the glibc "dns" module in this file (and don't
283 worry, it chain-loads the "dns" module if it can't talk to resolved).
Lennart Poetteringa4a79602014-08-19 21:55:10 +0200284
Lennart Poettering409093f2016-07-14 19:19:49 +0200285 The four modules should be used in the following order:
286
Lennart Poettering38ccb552020-07-07 21:58:12 +0200287 passwd: compat systemd
288 group: compat systemd
Yu Watanabea42d4f52018-05-01 15:18:10 +0900289 hosts: files mymachines resolve [!UNAVAIL=return] dns myhostname
Lennart Poetteringa4a79602014-08-19 21:55:10 +0200290
Martin Pitt0f0467e2015-05-27 17:04:49 +0200291SYSV INIT.D SCRIPTS:
292 When calling "systemctl enable/disable/is-enabled" on a unit which is a
293 SysV init.d script, it calls /usr/lib/systemd/systemd-sysv-install;
294 this needs to translate the action into the distribution specific
295 mechanism such as chkconfig or update-rc.d. Packagers need to provide
296 this script if you need this functionality (you don't if you disabled
297 SysV init support).
298
299 Please see src/systemctl/systemd-sysv-install.SKELETON for how this
300 needs to look like, and provide an implementation at the marked places.
301
Lennart Poettering21bc9232011-02-23 01:12:07 +0100302WARNINGS:
Lennart Poettering9e93f6f2017-11-17 11:39:48 +0100303 systemd will warn during early boot if /usr is not already mounted at
304 this point (that means: either located on the same file system as / or
305 already mounted in the initrd). While in systemd itself very little
306 will break if /usr is on a separate, late-mounted partition, many of
307 its dependencies very likely will break sooner or later in one form or
308 another. For example, udev rules tend to refer to binaries in /usr,
309 binaries that link to libraries in /usr or binaries that refer to data
310 files in /usr. Since these breakages are not always directly visible,
311 systemd will warn about this, since this kind of file system setup is
312 not really supported anymore by the basic set of Linux OS components.
Lennart Poetteringfc7a7442011-03-01 23:44:26 +0100313
Lennart Poettering47bc23c2014-02-26 02:54:37 +0100314 systemd requires that the /run mount point exists. systemd also
Ronny Chevalier8f42ccd2015-05-30 10:31:41 +0200315 requires that /var/run is a symlink to /run.
Lennart Poettering47bc23c2014-02-26 02:54:37 +0100316
Lennart Poetteringaa167132011-03-04 05:07:01 +0100317 For more information on this issue consult
AsciiWolfc6749ba2017-02-21 18:26:23 +0100318 https://www.freedesktop.org/wiki/Software/systemd/separate-usr-is-broken
Lennart Poetteringaa167132011-03-04 05:07:01 +0100319
Zbigniew Jędrzejewski-Szmekd18cb392018-05-13 22:28:24 +0200320 To run systemd under valgrind, compile with meson option
321 -Dvalgrind=true and have valgrind development headers installed
322 (i.e. valgrind-devel or equivalent). Otherwise, false positives will be
323 triggered by code which violates some rules but is actually safe. Note
324 that valgrind generates nice output only on exit(), hence on shutdown
325 we don't execve() systemd-shutdown.
Lennart Poettering2b671e92014-11-06 15:27:13 +0100326
Filipe Brandenburgerba9e3fc2019-02-15 11:05:04 -0800327STABLE BRANCHES AND BACKPORTS:
Lennart Poetteringbfeb3702020-08-16 18:25:18 +0200328 Stable branches with backported patches are available in the
329 systemd-stable repo at https://github.com/systemd/systemd-stable.
Zbigniew Jędrzejewski-Szmek94ac2012018-03-26 10:40:45 +0200330
Lennart Poetteringbfeb3702020-08-16 18:25:18 +0200331 Stable branches are started for certain releases of systemd and named
332 after them, e.g. v238-stable. Stable branches are managed by
333 distribution maintainers on an as needed basis. See
334 https://www.freedesktop.org/wiki/Software/systemd/Backports/ for some
335 more information and examples.
Zbigniew Jędrzejewski-Szmek94ac2012018-03-26 10:40:45 +0200336
Lennart Poetteringada64a02015-12-10 11:57:08 +0100337ENGINEERING AND CONSULTING SERVICES:
338 Kinvolk (https://kinvolk.io) offers professional engineering
339 and consulting services for systemd. Please contact Chris Kühl
340 <chris@kinvolk.io> for more information.