Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2192394/?format=api
{ "id": 2192394, "url": "http://patchwork.ozlabs.org/api/patches/2192394/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/patch/20260203134550.1375006-1-buildroot@bubu1.eu/", "project": { "id": 27, "url": "http://patchwork.ozlabs.org/api/projects/27/?format=api", "name": "Buildroot development", "link_name": "buildroot", "list_id": "buildroot.buildroot.org", "list_email": "buildroot@buildroot.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260203134550.1375006-1-buildroot@bubu1.eu>", "list_archive_url": null, "date": "2026-02-03T13:44:56", "name": "[v2] package/systemd: bump to 258.3", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "b68774ce34e093824d4ade510dfbac281e3f3457", "submitter": { "id": 87807, "url": "http://patchwork.ozlabs.org/api/people/87807/?format=api", "name": "Marcus Hoffmann", "email": "buildroot@bubu1.eu" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/buildroot/patch/20260203134550.1375006-1-buildroot@bubu1.eu/mbox/", "series": [ { "id": 490814, "url": "http://patchwork.ozlabs.org/api/series/490814/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/list/?series=490814", "date": "2026-02-03T13:44:56", "name": "[v2] package/systemd: bump to 258.3", "version": 2, "mbox": "http://patchwork.ozlabs.org/series/490814/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2192394/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2192394/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<buildroot-bounces@buildroot.org>", "X-Original-To": [ "incoming-buildroot@patchwork.ozlabs.org", "buildroot@buildroot.org" ], "Delivered-To": [ "patchwork-incoming-buildroot@legolas.ozlabs.org", "buildroot@buildroot.org" ], "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=ptH0brk5;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=140.211.166.138; helo=smtp1.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)" ], "Received": [ "from smtp1.osuosl.org (smtp1.osuosl.org [140.211.166.138])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4f54WK3p3Qz1xtl\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Wed, 04 Feb 2026 00:45:49 +1100 (AEDT)", "from localhost (localhost [127.0.0.1])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id BC3A581456;\n\tTue, 3 Feb 2026 13:45:47 +0000 (UTC)", "from smtp1.osuosl.org ([127.0.0.1])\n by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id 82zQ6fsJzRHg; Tue, 3 Feb 2026 13:45:46 +0000 (UTC)", "from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id 5CDF8814C0;\n\tTue, 3 Feb 2026 13:45:46 +0000 (UTC)", "from smtp2.osuosl.org (smtp2.osuosl.org [140.211.166.133])\n by lists1.osuosl.org (Postfix) with ESMTP id 4D92313D\n for <buildroot@buildroot.org>; Tue, 3 Feb 2026 13:45:44 +0000 (UTC)", "from localhost (localhost [127.0.0.1])\n by smtp2.osuosl.org (Postfix) with ESMTP id 47BB640461\n for <buildroot@buildroot.org>; Tue, 3 Feb 2026 13:45:44 +0000 (UTC)", "from smtp2.osuosl.org ([127.0.0.1])\n by localhost (smtp2.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id 4nHyFh1JbueF for <buildroot@buildroot.org>;\n Tue, 3 Feb 2026 13:45:42 +0000 (UTC)", "from smtp.bubu1.eu (smtp.bubu1.eu [176.9.145.28])\n by smtp2.osuosl.org (Postfix) with ESMTPS id E448640060\n for <buildroot@buildroot.org>; Tue, 3 Feb 2026 13:45:41 +0000 (UTC)", "from framework-OT.home (231.94-243-81.adsl-dyn.isp.belgacom.be\n [81.243.94.231])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange x25519 server-signature RSA-PSS (4096 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp.bubu1.eu (Postfix) with ESMTPSA id 1855C2C83144;\n Tue, 03 Feb 2026 14:45:39 +0100 (CET)" ], "X-Virus-Scanned": [ "amavis at osuosl.org", "amavis at osuosl.org" ], "X-Comment": "SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ", "DKIM-Filter": [ "OpenDKIM Filter v2.11.0 smtp1.osuosl.org 5CDF8814C0", "OpenDKIM Filter v2.11.0 smtp2.osuosl.org E448640060" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1770126346;\n\tbh=5AqY/jtiEbawiaOy0m03UTBVI4dTsAP8W24Ls67HkqE=;\n\th=To:Cc:Date:Subject:List-Id:List-Unsubscribe:List-Archive:\n\t List-Post:List-Help:List-Subscribe:From:Reply-To:From;\n\tb=ptH0brk5TUfVUnr/cvCGEefU7HE0/prDIzjW0HUFgrZKY2L+tieeGAYkD2YyanfUd\n\t /MO1mupn6iOSBG2DMvZh4keeYM2PsiViXa78PkWSa4wA01Qzg+p0t/34DN4/068dA8\n\t amWnUiJm55ihNWb9pZQiw0QdwbAPa0TUE7EGUl7rg3mF/64g2UhryJU2HjvWzjeLNB\n\t pVcLcoe6WKqHXokNV7G1Ublqa9pnzkvg6JkymGGqekR+kmODW5Z01THPmmAf5mWVC3\n\t GqaqRuxN7WsjZeFeyN2142fIR3hlHCNZT9Y3KMPcekmezZntXgKOgVZx9w05FRjkG+\n\t 4onksjbWmd/Ng==", "Received-SPF": "Pass (mailfrom) identity=mailfrom; client-ip=176.9.145.28;\n helo=smtp.bubu1.eu; envelope-from=buildroot@bubu1.eu; receiver=<UNKNOWN>", "DMARC-Filter": "OpenDMARC Filter v1.4.2 smtp2.osuosl.org E448640060", "To": "buildroot@buildroot.org", "Cc": "Norbert Lange <nolange79@gmail.com>,\n\tSen Hastings <sen@hastings.org>", "Date": "Tue, 3 Feb 2026 14:44:56 +0100", "Message-ID": "<20260203134550.1375006-1-buildroot@bubu1.eu>", "X-Mailer": "git-send-email 2.52.0", "MIME-Version": "1.0", "X-Mailman-Original-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=bubu1.eu; s=bubu;\n t=1770126339; bh=OeoRgop6UblVzWONCEtabe/DxWPM06QZnNIUwn4RUkY=;\n h=From:To:Cc:Subject:Date;\n b=ZV0D69bkBtm4UDkiOBtFfbRyMMQjk8zzMe+u9bR5vUbg5YQSimz980wKy6XtJNdXu\n EEAwI6EaO7b2tjhBShFO8rTWaO0+NLZuAq+9l3wd4NaH5sYEZbD+bxaYCG/8o5Ze75\n kxbZsq4CPER1Ks3b3CskM9kdzlb1IEmK2rZWeZvw488Tq0xQfcMeToCQHNRCzMZm0w\n XgsnkXGUl0iQeTqv9PJXKeNyUhqZWvdYo48uprS6SKOYI2BkTJ8F5vZxW8LIACoej4\n 8DDk8K6NJKQRdlRiCfe7am6nTPTPYSIscpkk3S/rPbV7+DL9Q94oaozrtQABiV/BHY\n WwyzNXHaTdq1g==", "X-Mailman-Original-Authentication-Results": [ "smtp2.osuosl.org;\n dmarc=pass (p=reject dis=none)\n header.from=bubu1.eu", "smtp2.osuosl.org;\n dkim=pass (2048-bit key,\n unprotected) header.d=bubu1.eu header.i=@bubu1.eu header.a=rsa-sha256\n header.s=bubu header.b=ZV0D69bk" ], "Subject": "[Buildroot] [PATCH v2] package/systemd: bump to 258.3", "X-BeenThere": "buildroot@buildroot.org", "X-Mailman-Version": "2.1.30", "Precedence": "list", "List-Id": "Discussion and development of buildroot <buildroot.buildroot.org>", "List-Unsubscribe": "<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>", "List-Archive": "<http://lists.buildroot.org/pipermail/buildroot/>", "List-Post": "<mailto:buildroot@buildroot.org>", "List-Help": "<mailto:buildroot-request@buildroot.org?subject=help>", "List-Subscribe": "<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>", "From": "Marcus Hoffmann via buildroot <buildroot@buildroot.org>", "Reply-To": "Marcus Hoffmann <buildroot@bubu1.eu>", "Content-Type": "text/plain; charset=\"utf-8\"", "Content-Transfer-Encoding": "base64", "Errors-To": "buildroot-bounces@buildroot.org", "Sender": "\"buildroot\" <buildroot-bounces@buildroot.org>" }, "content": "Removed patch that fixed building with libseccomp and old kernel headers\nas systemd has fixed that upstream now.\n\nNoteable changes:\n - Add -Dlibmount=enabled to host and target build. Disabling this\n option disables building most of systemd's tools apart from\n libsystemd.\n\n - remove gcrypt and gnutls from dependencies and build options.\n openssl is the only supported crypto library now.\n\n - Disable nspawn build for host variant and add a Config.in option\n for the target variant.\n\n - systemd now requires kernel >= 5.4 while the recommended kernel\n version moved to >=5.7. This make systemd depend on\n BR2_TOOLCHAIN_HEADERS_AT_LEAST_5_4, removing various dependencies\n on older kernel header versions from sub options.\n\n - The sha256sum of LICENSES/README.md changed due to various\n license clarification, removal of some vendored files as well as\n changing some file paths. Licensing did not actually change.\n\nFor changelog, see:\nhttps://github.com/systemd/systemd/blob/v258.3/NEWS\n\nTested with `./support/testing/run-tests tests.init.test_systemd`\nAll tests passed\n\nOne of the tests now needs a bigger rootfs size.\n\nSigned-off-by: Marcus Hoffmann <buildroot@bubu1.eu>\n---\nv1 -> v2: rebase on master, remove no longer required patch\n---\n ...nly-add-bpf-syscall-to-seccomp-allow.patch | 46 -------------------\n package/systemd/Config.in | 38 ++++++++-------\n package/systemd/systemd.hash | 4 +-\n package/systemd/systemd.mk | 33 +++++--------\n support/testing/tests/init/test_systemd.py | 1 +\n system/Config.in | 10 ++--\n 6 files changed, 38 insertions(+), 94 deletions(-)\n delete mode 100644 package/systemd/0001-nspawn-seccomp-only-add-bpf-syscall-to-seccomp-allow.patch", "diff": "diff --git a/package/systemd/0001-nspawn-seccomp-only-add-bpf-syscall-to-seccomp-allow.patch b/package/systemd/0001-nspawn-seccomp-only-add-bpf-syscall-to-seccomp-allow.patch\ndeleted file mode 100644\nindex 4a74083391..0000000000\n--- a/package/systemd/0001-nspawn-seccomp-only-add-bpf-syscall-to-seccomp-allow.patch\n+++ /dev/null\n@@ -1,46 +0,0 @@\n-From e6ab723c96b91e7c4c495fcef0654102fac26570 Mon Sep 17 00:00:00 2001\n-From: Marcus Hoffmann <bubu@bubu1.eu>\n-Date: Mon, 2 Feb 2026 18:26:19 +0100\n-Subject: [PATCH] nspawn-seccomp: only add bpf syscall to seccomp allowlist if\n- headers define CAP_BPF\n-MIME-Version: 1.0\n-Content-Type: text/plain; charset=UTF-8\n-Content-Transfer-Encoding: 8bit\n-\n-When building systemd with kernel headers < 5.8 (which added CAP_BPF) it fails with:\n-\n- ../src/nspawn/nspawn-seccomp.c: In function ‘add_syscall_filters’:\n- ../src/nspawn/nspawn-seccomp.c:114:19: error: ‘CAP_BPF’ undeclared (first use in this function)\n- 114 | { CAP_BPF, \"bpf\", },\n- | ^~~~~~~\n- ../src/nspawn/nspawn-seccomp.c:114:19: note: each undeclared identifier is reported only once for each function it appears in\n-\n-If the kernel headers don't define CAP_BPF, it's likely that the running\n-kernel doesn't know about this capability either, so we can assume that\n-we'd never allow this syscall anyway.\n-\n-So if CAP_BPF isn't defined, just skip this allow_list entry entirely.\n-\n-Signed-off-by: Marcus Hoffmann <bubu@bubu1.eu>\n-Upstream: N/A - fixed in systemd >= 258 by introducing vendored kernel headers for this use-casea\n----\n- src/nspawn/nspawn-seccomp.c | 2 ++\n- 1 file changed, 2 insertions(+)\n-\n-diff --git a/src/nspawn/nspawn-seccomp.c b/src/nspawn/nspawn-seccomp.c\n-index 6956689ab5..aaac6085b6 100644\n---- a/src/nspawn/nspawn-seccomp.c\n-+++ b/src/nspawn/nspawn-seccomp.c\n-@@ -108,7 +108,9 @@ static int add_syscall_filters(\n- { CAP_SYS_BOOT, \"reboot\" },\n- { CAP_SYSLOG, \"syslog\" },\n- { CAP_SYS_TTY_CONFIG, \"vhangup\" },\n-+#ifdef CAP_BPF\n- { CAP_BPF, \"bpf\", },\n-+# endif\n- \n- /*\n- * The following syscalls and groups are knowingly excluded:\n--- \n-2.52.0\n-\ndiff --git a/package/systemd/Config.in b/package/systemd/Config.in\nindex 931134911a..84bf554fee 100644\n--- a/package/systemd/Config.in\n+++ b/package/systemd/Config.in\n@@ -21,7 +21,7 @@ menuconfig BR2_PACKAGE_SYSTEMD\n \tdepends on !BR2_STATIC_LIBS # kmod\n \tdepends on BR2_TOOLCHAIN_USES_GLIBC\n \tdepends on BR2_TOOLCHAIN_HAS_SSP\n-\tdepends on BR2_TOOLCHAIN_HEADERS_AT_LEAST_3_15\n+\tdepends on BR2_TOOLCHAIN_HEADERS_AT_LEAST_5_4\n \tdepends on BR2_TOOLCHAIN_GCC_AT_LEAST_8\n \tdepends on BR2_HOST_GCC_AT_LEAST_8 # host-systemd\n \tselect BR2_ROOTFS_MERGED_USR\n@@ -54,13 +54,11 @@ menuconfig BR2_PACKAGE_SYSTEMD\n \t an elaborate transactional dependency-based service control\n \t logic. It can work as a drop-in replacement for sysvinit.\n \n-\t Kernel versions below 5.4 (\"recommended baseline\") have\n+\t Kernel versions below 5.7 (\"recommended baseline\") have\n \t significant gaps in functionality and are not recommended\n-\t for use with this version of systemd. (e.g. lack race-free\n-\t process tracking by pidfd, systemd-networkd, and new mount\n-\t API support).\n+\t for use with this version of systemd.\n \n-\t Systemd requires a Linux kernel >= 3.15 with the following\n+\t Systemd requires a Linux kernel >= 5.4 with the following\n \t options enabled:\n \n \t - CONFIG_DEVTMPFS\n@@ -94,10 +92,10 @@ menuconfig BR2_PACKAGE_SYSTEMD\n \t The selection of other packages will enable some features:\n \n \t - acl package will add support for multi-seat.\n-\t - xz and/or l4 packages will add compression support in\n+\t - bzip, lz4, xz,and/or zstd packages will add compression support in\n \t journal and coredump.\n \t - libcurl package will add support for systemd-journal-upload.\n-\t - libgcrypt package will add support for journal sealing and\n+\t - openssl package will add support for journal sealing and\n \t DNSSEC verification in resolved.\n \n \t Notice that systemd selects the fsck wrapper from util-linux\n@@ -246,7 +244,6 @@ config BR2_PACKAGE_SYSTEMD_HOMED\n \tdepends on BR2_USE_MMU # cryptsetup -> lvm2\n \tdepends on !BR2_STATIC_LIBS # cryptsetup -> lvm2\n \tdepends on BR2_TOOLCHAIN_HAS_SYNC_4 # cryptsetup -> json-c\n-\tdepends on BR2_TOOLCHAIN_HEADERS_AT_LEAST_4_12 # fscrypt_key\n \tselect BR2_PACKAGE_CRYPTSETUP\n \tselect BR2_PACKAGE_OPENSSL\n \tselect BR2_PACKAGE_OPENSSL_FORCE_LIBOPENSSL\n@@ -257,11 +254,11 @@ config BR2_PACKAGE_SYSTEMD_HOMED\n \n \t https://www.freedesktop.org/software/systemd/man/systemd-homed.service.html\n \n-comment \"homed support needs a toolchain w/ threads, dynamic library, kernel headers >= 4.12\"\n+comment \"homed support needs a toolchain w/ threads, dynamic library\"\n \tdepends on BR2_USE_MMU\n \tdepends on BR2_TOOLCHAIN_HAS_SYNC_4\n \tdepends on !BR2_TOOLCHAIN_HAS_THREADS || \\\n-\t\tBR2_STATIC_LIBS || !BR2_TOOLCHAIN_HEADERS_AT_LEAST_4_12\n+\t\tBR2_STATIC_LIBS\n \n config BR2_PACKAGE_SYSTEMD_HOSTNAMED\n \tbool \"enable hostname daemon\"\n@@ -285,9 +282,8 @@ config BR2_PACKAGE_SYSTEMD_HWDB\n \n config BR2_PACKAGE_SYSTEMD_IMPORTD\n \tbool \"enable import daemon\"\n-\tdepends on BR2_PACKAGE_LIBGPG_ERROR_ARCH_SUPPORTS # libgcrypt\n \tselect BR2_PACKAGE_LIBCURL\n-\tselect BR2_PACKAGE_LIBGCRYPT\n+\tselect BR2_PACKAGE_OPENSSL\n \tselect BR2_PACKAGE_XZ\n \tselect BR2_PACKAGE_ZLIB\n \thelp\n@@ -336,6 +332,14 @@ config BR2_PACKAGE_SYSTEMD_MACHINED\n \n \t https://www.freedesktop.org/software/systemd/man/systemd-machined.service.html\n \n+config BR2_PACKAGE_SYSTEMD_NSPAWN\n+\tbool \"enable nspawn\"\n+\thelp\n+\t systemd-nspawn is a tool to spawn a command or OS in\n+\t a lightweight container.\n+\n+\t https://www.freedesktop.org/software/systemd/man/latest/systemd-nspawn.html\n+\n config BR2_PACKAGE_SYSTEMD_NSRESOURCED\n \tbool \"enable nsresourced\"\n \thelp\n@@ -358,8 +362,7 @@ config BR2_PACKAGE_SYSTEMD_MYHOSTNAME\n \n config BR2_PACKAGE_SYSTEMD_NETWORKD\n \tbool \"enable network manager\"\n-\tdefault y if BR2_TOOLCHAIN_HEADERS_AT_LEAST_5_4\n-\tdepends on BR2_TOOLCHAIN_HEADERS_AT_LEAST_5_4\n+\tdefault y\n \thelp\n \t systemd-networkd is a system service that manages networks.\n \t It detects and configures network devices as they appear, as\n@@ -370,9 +373,6 @@ config BR2_PACKAGE_SYSTEMD_NETWORKD\n \n \t https://www.freedesktop.org/software/systemd/man/systemd-networkd.html\n \n-comment \"systemd-networkd needs a toolchain with kernel headers >= 5.4\"\n-\tdepends on !BR2_TOOLCHAIN_HEADERS_AT_LEAST_5_4\n-\n config BR2_PACKAGE_SYSTEMD_OOMD\n \tbool \"enable out-of-memory killer\"\n \thelp\n@@ -481,8 +481,6 @@ config BR2_PACKAGE_SYSTEMD_SMACK_SUPPORT\n \t Control Kernel, a minimal approach to Access Control\n \t implemented as a kernel LSM.\n \n-\t This feature requires a kernel >= 3.8.\n-\n \t When this feature is enabled, Systemd mounts smackfs and\n \t manages security labels for sockets.\n \ndiff --git a/package/systemd/systemd.hash b/package/systemd/systemd.hash\nindex d68950f934..193c6b5eb0 100644\n--- a/package/systemd/systemd.hash\n+++ b/package/systemd/systemd.hash\n@@ -1,5 +1,5 @@\n # sha256 locally computed\n-sha256 5a2f477e6268630f6e2829c7bb3e442017549798a4122635817934eaa0c6ac10 systemd-257.10.tar.gz\n+sha256 a800facc2effb509bff67700ce1224da96a36fb658e29e03c843fb74fa1edbdc systemd-258.3.tar.gz\n sha256 ac4985facb553559981f507982444d779115e3e3a4c8b7847ae956198490c1b3 LICENSE.GPL2\n sha256 6d9bb3b7fc818a8facc4cc296060a0883fef8710d6498f86165335846e82ee9d LICENSE.LGPL2.1\n sha256 c9e7bf5b7c243c719b8b43c36158effb9b54c5e80abc9d82e4b2d4b2a4aa64ad LICENSES/alg-sha1-public-domain.txt\n@@ -13,4 +13,4 @@ sha256 8a6fc0879cecc0b96bf4c08159b9d733bf0f15fcf32879aec98c4ffd05424554 LICENS\n sha256 b85dcd3e453d05982552c52b5fc9e0bdd6d23c6f8e844b984a88af32570b0cc0 LICENSES/MIT.txt\n sha256 2a98749f6bec00dfaed86fa9c1edea871aaae4f11ee4d100b671aaf4ce353a73 LICENSES/murmurhash2-public-domain.txt\n sha256 1a7adaa2c86cedfd6c7f5c0c7c72fd6d3e02cd0c9593f21fdb53c89bb2b130ec LICENSES/OFL-1.1.txt\n-sha256 768ecb25cb1e6e41672fc655571f45ba46a3f03fcbc6ab56c7a09ac5928eb37b LICENSES/README.md\n+sha256 bce1d2e9bad517b493168b37604c5d02a7fb638b4d1b9fc730adafa06c603456 LICENSES/README.md\ndiff --git a/package/systemd/systemd.mk b/package/systemd/systemd.mk\nindex 6d04ee2581..7596edd13e 100644\n--- a/package/systemd/systemd.mk\n+++ b/package/systemd/systemd.mk\n@@ -19,7 +19,7 @@\n # - Diff sysusers.d with the previous version\n # - Diff factory/etc/nsswitch.conf with the previous version\n # (details are often sprinkled around in README and manpages)\n-SYSTEMD_VERSION = 257.10\n+SYSTEMD_VERSION = 258.3\n SYSTEMD_SITE = $(call github,systemd,systemd,v$(SYSTEMD_VERSION))\n SYSTEMD_LICENSE = \\\n \tLGPL-2.1+, \\\n@@ -107,7 +107,8 @@ SYSTEMD_CONF_OPTS += \\\n \t-Dbpf-framework=disabled \\\n \t-Dvmlinux-h=disabled \\\n \t-Dumount-path=/usr/bin/umount \\\n-\t-Dxenctrl=disabled\n+\t-Dxenctrl=disabled \\\n+\t-Dlibmount=enabled\n \n SYSTEMD_CFLAGS = $(TARGET_CFLAGS)\n ifeq ($(BR2_OPTIMIZE_FAST),y)\n@@ -267,13 +268,6 @@ else\n SYSTEMD_CONF_OPTS += -Dlibcurl=disabled\n endif\n \n-ifeq ($(BR2_PACKAGE_LIBGCRYPT),y)\n-SYSTEMD_DEPENDENCIES += libgcrypt\n-SYSTEMD_CONF_OPTS += -Dgcrypt=enabled\n-else\n-SYSTEMD_CONF_OPTS += -Dgcrypt=disabled\n-endif\n-\n ifeq ($(BR2_PACKAGE_P11_KIT),y)\n SYSTEMD_DEPENDENCIES += p11-kit\n SYSTEMD_CONF_OPTS += -Dp11kit=enabled\n@@ -567,6 +561,12 @@ else\n SYSTEMD_CONF_OPTS += -Dsysupdate=disabled\n endif\n \n+ifeq ($(BR2_PACKAGE_SYSTEMD_NSPAWN),y)\n+SYSTEMD_CONF_OPTS += -Dnspawn=enabled\n+else\n+SYSTEMD_CONF_OPTS += -Dnspawn=disabled\n+endif\n+\n ifeq ($(BR2_PACKAGE_SYSTEMD_NETWORKD),y)\n SYSTEMD_CONF_OPTS += -Dnetworkd=true\n SYSTEMD_NETWORKD_USER = systemd-network -1 systemd-network -1 * - - - systemd Network Management\n@@ -595,22 +595,11 @@ endif\n \n ifeq ($(BR2_PACKAGE_LIBOPENSSL),y)\n SYSTEMD_CONF_OPTS += \\\n-\t-Dgnutls=disabled \\\n-\t-Dopenssl=enabled \\\n \t-Ddns-over-tls=openssl \\\n \t-Ddefault-dns-over-tls=opportunistic\n SYSTEMD_DEPENDENCIES += openssl\n-else ifeq ($(BR2_PACKAGE_GNUTLS),y)\n-SYSTEMD_CONF_OPTS += \\\n-\t-Dgnutls=enabled \\\n-\t-Dopenssl=disabled \\\n-\t-Ddns-over-tls=gnutls \\\n-\t-Ddefault-dns-over-tls=opportunistic\n-SYSTEMD_DEPENDENCIES += gnutls\n else\n SYSTEMD_CONF_OPTS += \\\n-\t-Dgnutls=disabled \\\n-\t-Dopenssl=disabled \\\n \t-Ddns-over-tls=false \\\n \t-Ddefault-dns-over-tls=no\n endif\n@@ -1015,7 +1004,9 @@ HOST_SYSTEMD_CONF_OPTS = \\\n \t-Dp11kit=disabled \\\n \t-Dlibfido2=disabled \\\n \t-Dpcre2=disabled \\\n-\t-Dsysupdated=disabled\n+\t-Dsysupdated=disabled \\\n+\t-Dnspawn=disabled \\\n+\t-Dlibmount=enabled\n \n HOST_SYSTEMD_DEPENDENCIES = \\\n \t$(BR2_COREUTILS_HOST_DEPENDENCY) \\\ndiff --git a/support/testing/tests/init/test_systemd.py b/support/testing/tests/init/test_systemd.py\nindex 7fdd5d1798..41545cbeed 100644\n--- a/support/testing/tests/init/test_systemd.py\n+++ b/support/testing/tests/init/test_systemd.py\n@@ -210,6 +210,7 @@ class TestInitSystemSystemdRwFull(InitSystemSystemdBase):\n BR2_PACKAGE_SYSTEMD_SYSUSERS=y\n BR2_PACKAGE_SYSTEMD_VCONSOLE=y\n BR2_TARGET_ROOTFS_EXT2=y\n+ BR2_TARGET_ROOTFS_EXT2_SIZE=\"120M\"\n \"\"\"\n \n def test_run(self):\ndiff --git a/system/Config.in b/system/Config.in\nindex 98bbd93092..95fd5f0816 100644\n--- a/system/Config.in\n+++ b/system/Config.in\n@@ -123,24 +123,24 @@ config BR2_INIT_SYSTEMD\n \tdepends on BR2_TOOLCHAIN_USES_GLIBC\n \tdepends on BR2_TOOLCHAIN_HAS_SSP\n \tdepends on BR2_TOOLCHAIN_HAS_THREADS\n-\tdepends on BR2_TOOLCHAIN_HEADERS_AT_LEAST_3_15\n+\tdepends on BR2_TOOLCHAIN_HEADERS_AT_LEAST_5_4\n \tdepends on BR2_TOOLCHAIN_GCC_AT_LEAST_8\n \tdepends on BR2_HOST_GCC_AT_LEAST_8\n \tselect BR2_PACKAGE_SYSTEMD\n \tselect BR2_PACKAGE_SKELETON_INIT_SYSTEMD if BR2_ROOTFS_SKELETON_DEFAULT\n \n-comment \"systemd needs a glibc toolchain w/ SSP, headers >= 3.15, host and target gcc >= 8\"\n+comment \"systemd needs a glibc toolchain w/ SSP, headers >= 5.4, host and target gcc >= 8\"\n \tdepends on BR2_PACKAGE_SYSTEMD_ARCH_SUPPORTS\n \tdepends on BR2_USE_MMU\n \tdepends on !BR2_TOOLCHAIN_USES_GLIBC || \\\n \t\t!BR2_TOOLCHAIN_HAS_SSP || \\\n-\t\t!BR2_TOOLCHAIN_HEADERS_AT_LEAST_3_15 || \\\n+\t\t!BR2_TOOLCHAIN_HEADERS_AT_LEAST_5_4 || \\\n \t\t!BR2_TOOLCHAIN_GCC_AT_LEAST_8 || \\\n \t\t!BR2_HOST_GCC_AT_LEAST_8\n \n-comment \"systemd highly recommends Linux >= 4.15\"\n+comment \"systemd highly recommends Linux >= 5.7\"\n \tdepends on BR2_INIT_SYSTEMD\n-\tdepends on !BR2_TOOLCHAIN_HEADERS_AT_LEAST_4_15\n+\tdepends on !BR2_TOOLCHAIN_HEADERS_AT_LEAST_5_7\n \n comment \"Special purpose (read help)\"\n \n", "prefixes": [ "v2" ] }