mirror of
https://github.com/systemd/systemd
synced 2026-04-01 04:34:51 +02:00
Compare commits
No commits in common. "6dbfbc4667656b51cd03a5db393441710bde4dd9" and "096a154acc1c574eed1fd964fbe21f20674576b6" have entirely different histories.
6dbfbc4667
...
096a154acc
@ -10,7 +10,7 @@ System and Service Manager
|
||||
[](https://github.com/systemd/systemd/actions)<br/>
|
||||
[](https://bestpractices.coreinfrastructure.org/projects/1369)<br/>
|
||||
[](https://lgtm.com/projects/g/systemd/systemd/context:cpp)<br/>
|
||||
[](https://jenkins-systemd.apps.ocp.ci.centos.org/job/upstream-centos8/)<br/>
|
||||
[](https://jenkins-systemd.apps.ocp.ci.centos.org/job/upstream-centos7/)<br/>
|
||||
[](https://jenkins-systemd.apps.ocp.ci.centos.org/job/upstream-vagrant-archlinux/)<br/>
|
||||
[&job=upstream-vagrant-archlinux-sanitizers)](https://jenkins-systemd.apps.ocp.ci.centos.org/job/upstream-vagrant-archlinux-sanitizers/)<br/>
|
||||
[](https://fossies.org/linux/test/systemd-main.tar.gz/codespell.html)</br>
|
||||
|
||||
3
TODO
3
TODO
@ -293,9 +293,6 @@ Features:
|
||||
* special case some calls of chase_symlinks() to use openat2() internally, so
|
||||
that the kernel does what we otherwise do.
|
||||
|
||||
* add a new flag to chase_symlinks() that stops chasing once the first missing
|
||||
component is found and then allows the caller to create the rest.
|
||||
|
||||
* make use of new glibc 2.32 APIs sigabbrev_np() and strerrorname_np().
|
||||
|
||||
* add /etc/integritytab, to support dm-integrity setups. In particular those
|
||||
|
||||
@ -1117,11 +1117,11 @@ install_systemd() {
|
||||
mkdir "$initdir/etc/systemd/system/user@.service.d/"
|
||||
echo -e "[Service]\nPassEnvironment=SYSTEMD_UNIT_PATH\n" >"$initdir/etc/systemd/system/user@.service.d/override.conf"
|
||||
|
||||
# When built with gcov, disable ProtectSystem= and ProtectHome in the test
|
||||
# images, since it prevents gcov to write the coverage reports (*.gcda files)
|
||||
# When built with gcov, disable ProtectSystem= in the test images, since
|
||||
# it prevents gcov to write the coverage reports (*.gcda files)
|
||||
if get_bool "$IS_BUILT_WITH_COVERAGE"; then
|
||||
mkdir -p "$initdir/etc/systemd/system/service.d/"
|
||||
echo -e "[Service]\nProtectSystem=no\nProtectHome=no\n" >"$initdir/etc/systemd/system/service.d/gcov-override.conf"
|
||||
echo -e "[Service]\nProtectSystem=no\n" >"$initdir/etc/systemd/system/service.d/override.conf"
|
||||
fi
|
||||
}
|
||||
|
||||
|
||||
@ -307,10 +307,7 @@ def setUpModule():
|
||||
if use_valgrind or asan_options or lsan_options or ubsan_options:
|
||||
drop_in += ['MemoryDenyWriteExecute=no']
|
||||
if with_coverage:
|
||||
drop_in += [
|
||||
'ProtectSystem=no',
|
||||
'ProtectHome=no',
|
||||
]
|
||||
drop_in += ['ProtectSystem=no']
|
||||
|
||||
os.makedirs('/run/systemd/system/systemd-networkd.service.d', exist_ok=True)
|
||||
with open('/run/systemd/system/systemd-networkd.service.d/00-override.conf', mode='w') as f:
|
||||
@ -338,10 +335,7 @@ def setUpModule():
|
||||
if use_valgrind or asan_options or lsan_options or ubsan_options:
|
||||
drop_in += ['MemoryDenyWriteExecute=no']
|
||||
if with_coverage:
|
||||
drop_in += [
|
||||
'ProtectSystem=no',
|
||||
'ProtectHome=no',
|
||||
]
|
||||
drop_in += ['ProtectSystem=no']
|
||||
|
||||
os.makedirs('/run/systemd/system/systemd-resolved.service.d', exist_ok=True)
|
||||
with open('/run/systemd/system/systemd-resolved.service.d/00-override.conf', mode='w') as f:
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user