1
0
mirror of https://github.com/systemd/systemd synced 2026-04-25 08:25:12 +02:00

Compare commits

..

No commits in common. "673d1f4ab9a6b685db6b52f3784711a662458763" and "3d935cea2cf966a3b11c8433af95f78e7b214923" have entirely different histories.

6 changed files with 7 additions and 23 deletions

View File

@ -96,6 +96,10 @@ EOF
rm -rf debian/patches rm -rf debian/patches
# disable autopkgtests which are not for upstream # disable autopkgtests which are not for upstream
sed -i '/# NOUPSTREAM/ q' debian/tests/control sed -i '/# NOUPSTREAM/ q' debian/tests/control
# TODO: rebooting via autopkgtest-reboot seems to be broken, disable these tests for now
sed -i -n '1,/Tests: boot-and-services/p;/Tests: udev/,$p' debian/tests/control
sed -i '/Tests: boot-and-services/d' debian/tests/control
sed -i '/Tests: boot-smoke/,$d' debian/tests/control
# enable more unit tests # enable more unit tests
sed -i '/^CONFFLAGS =/ s/=/= --werror -Dtests=unsafe -Dsplit-usr=true -Dslow-tests=true -Dfuzz-tests=true -Dman=true /' debian/rules sed -i '/^CONFFLAGS =/ s/=/= --werror -Dtests=unsafe -Dsplit-usr=true -Dslow-tests=true -Dfuzz-tests=true -Dman=true /' debian/rules
# no orig tarball # no orig tarball

View File

@ -47,9 +47,6 @@ fuzzer_build = want_ossfuzz or want_libfuzzer
# More items are added later after they have been detected. # More items are added later after they have been detected.
summary({'build mode' : get_option('mode')}) summary({'build mode' : get_option('mode')})
# GCOV doesn't define any macro when compiled with, so let's define it ourselves
conf.set10('BUILT_WITH_COVERAGE', get_option('b_coverage'))
##################################################################### #####################################################################
# Try to install the git pre-commit hook # Try to install the git pre-commit hook

View File

@ -29,19 +29,6 @@
#define _alignptr_ __attribute__((__aligned__(sizeof(void*)))) #define _alignptr_ __attribute__((__aligned__(sizeof(void*))))
#define _warn_unused_result_ __attribute__((__warn_unused_result__)) #define _warn_unused_result_ __attribute__((__warn_unused_result__))
#if defined(BUILT_WITH_COVERAGE) && BUILT_WITH_COVERAGE
/* We need to explicitly call __gcov_dump() in places where we use _exit(), since
* _exit() skips at-exit hooks resulting in lost coverage */
# include <unistd.h>
extern void __gcov_dump(void);
_noreturn_ static inline void _coverage__exit(int status) {
__gcov_dump();
_exit(status);
}
# define _exit(x) _coverage__exit(x)
#endif
#if !defined(HAS_FEATURE_MEMORY_SANITIZER) #if !defined(HAS_FEATURE_MEMORY_SANITIZER)
# if defined(__has_feature) # if defined(__has_feature)
# if __has_feature(memory_sanitizer) # if __has_feature(memory_sanitizer)

View File

@ -329,7 +329,7 @@ static bool ipv4acd_arp_conflict(sd_ipv4acd *acd, const struct ether_arp *arp, b
if (acd->check_mac_callback && if (acd->check_mac_callback &&
acd->check_mac_callback(acd, (const struct ether_addr*) arp->arp_sha, acd->check_mac_userdata) > 0) acd->check_mac_callback(acd, (const struct ether_addr*) arp->arp_sha, acd->check_mac_userdata) > 0)
/* sender hardware is one of the host's interfaces, ignoring. */ /* sender hardware is one of the host's interfaces, ignoring. */
return false; return true;
return true; /* conflict! */ return true; /* conflict! */
} }

View File

@ -4,10 +4,6 @@ set -e
TEST_DESCRIPTION="Run unit tests under containers" TEST_DESCRIPTION="Run unit tests under containers"
RUN_IN_UNPRIVILEGED_CONTAINER=yes RUN_IN_UNPRIVILEGED_CONTAINER=yes
# Some tests make collecting coverage impossible (like test-mount-util, which
# remounts the whole / as read-only), so let's ignore the gcov errors in such
# case
IGNORE_MISSING_COVERAGE=yes
# embed some newlines in the kernel command line to stress our test suite # embed some newlines in the kernel command line to stress our test suite
KERNEL_APPEND=" KERNEL_APPEND="

View File

@ -1406,8 +1406,8 @@ check_coverage_reports() {
# usually due to the sandbox being too restrictive (e.g. ProtectSystem=yes, # usually due to the sandbox being too restrictive (e.g. ProtectSystem=yes,
# ProtectHome=yes) or the $BUILD_DIR being inaccessible to non-root users - see # ProtectHome=yes) or the $BUILD_DIR being inaccessible to non-root users - see
# `setfacl` stuff in install_compiled_systemd(). # `setfacl` stuff in install_compiled_systemd().
if ! get_bool "${IGNORE_MISSING_COVERAGE:=}" && \
"${JOURNALCTL:?}" -q --no-pager -D "${root:?}/var/log/journal" --grep "profiling:.+?gcda:[Cc]annot open"; then if "${JOURNALCTL:?}" -q --no-pager -D "${root:?}/var/log/journal" --grep "profiling:.+?gcda:[Cc]annot open"; then
derror "Detected possibly missing coverage, check the journal" derror "Detected possibly missing coverage, check the journal"
return 1 return 1
fi fi