mirror of
https://github.com/systemd/systemd
synced 2026-04-01 04:34:51 +02:00
Compare commits
5 Commits
096a154acc
...
6dbfbc4667
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
6dbfbc4667 | ||
|
|
8e4de611eb | ||
|
|
d2a39812fd | ||
|
|
8d5b38e568 | ||
|
|
035af7adfe |
@ -10,7 +10,7 @@ System and Service Manager
|
||||
[](https://github.com/systemd/systemd/actions)<br/>
|
||||
[](https://bestpractices.coreinfrastructure.org/projects/1369)<br/>
|
||||
[](https://lgtm.com/projects/g/systemd/systemd/context:cpp)<br/>
|
||||
[](https://jenkins-systemd.apps.ocp.ci.centos.org/job/upstream-centos7/)<br/>
|
||||
[](https://jenkins-systemd.apps.ocp.ci.centos.org/job/upstream-centos8/)<br/>
|
||||
[](https://jenkins-systemd.apps.ocp.ci.centos.org/job/upstream-vagrant-archlinux/)<br/>
|
||||
[&job=upstream-vagrant-archlinux-sanitizers)](https://jenkins-systemd.apps.ocp.ci.centos.org/job/upstream-vagrant-archlinux-sanitizers/)<br/>
|
||||
[](https://fossies.org/linux/test/systemd-main.tar.gz/codespell.html)</br>
|
||||
|
||||
3
TODO
3
TODO
@ -293,6 +293,9 @@ Features:
|
||||
* special case some calls of chase_symlinks() to use openat2() internally, so
|
||||
that the kernel does what we otherwise do.
|
||||
|
||||
* add a new flag to chase_symlinks() that stops chasing once the first missing
|
||||
component is found and then allows the caller to create the rest.
|
||||
|
||||
* make use of new glibc 2.32 APIs sigabbrev_np() and strerrorname_np().
|
||||
|
||||
* add /etc/integritytab, to support dm-integrity setups. In particular those
|
||||
|
||||
@ -1117,11 +1117,11 @@ install_systemd() {
|
||||
mkdir "$initdir/etc/systemd/system/user@.service.d/"
|
||||
echo -e "[Service]\nPassEnvironment=SYSTEMD_UNIT_PATH\n" >"$initdir/etc/systemd/system/user@.service.d/override.conf"
|
||||
|
||||
# When built with gcov, disable ProtectSystem= in the test images, since
|
||||
# it prevents gcov to write the coverage reports (*.gcda files)
|
||||
# When built with gcov, disable ProtectSystem= and ProtectHome in the test
|
||||
# images, since it prevents gcov to write the coverage reports (*.gcda files)
|
||||
if get_bool "$IS_BUILT_WITH_COVERAGE"; then
|
||||
mkdir -p "$initdir/etc/systemd/system/service.d/"
|
||||
echo -e "[Service]\nProtectSystem=no\n" >"$initdir/etc/systemd/system/service.d/override.conf"
|
||||
echo -e "[Service]\nProtectSystem=no\nProtectHome=no\n" >"$initdir/etc/systemd/system/service.d/gcov-override.conf"
|
||||
fi
|
||||
}
|
||||
|
||||
|
||||
@ -307,7 +307,10 @@ def setUpModule():
|
||||
if use_valgrind or asan_options or lsan_options or ubsan_options:
|
||||
drop_in += ['MemoryDenyWriteExecute=no']
|
||||
if with_coverage:
|
||||
drop_in += ['ProtectSystem=no']
|
||||
drop_in += [
|
||||
'ProtectSystem=no',
|
||||
'ProtectHome=no',
|
||||
]
|
||||
|
||||
os.makedirs('/run/systemd/system/systemd-networkd.service.d', exist_ok=True)
|
||||
with open('/run/systemd/system/systemd-networkd.service.d/00-override.conf', mode='w') as f:
|
||||
@ -335,7 +338,10 @@ def setUpModule():
|
||||
if use_valgrind or asan_options or lsan_options or ubsan_options:
|
||||
drop_in += ['MemoryDenyWriteExecute=no']
|
||||
if with_coverage:
|
||||
drop_in += ['ProtectSystem=no']
|
||||
drop_in += [
|
||||
'ProtectSystem=no',
|
||||
'ProtectHome=no',
|
||||
]
|
||||
|
||||
os.makedirs('/run/systemd/system/systemd-resolved.service.d', exist_ok=True)
|
||||
with open('/run/systemd/system/systemd-resolved.service.d/00-override.conf', mode='w') as f:
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user