1
0
mirror of https://github.com/systemd/systemd synced 2025-10-02 18:24:46 +02:00

Compare commits

...

5 Commits

Author SHA1 Message Date
Luca Boccassi
b33cd6b3ee core: do not set noexec on sysfs/procfs
It causes a regression in certain running environments (networkd under LXC),
so avoid enabling for now.

Fixes #18795

Suggested-by: Topi Miettinen <toiwoton@gmail.com>
2021-02-26 20:20:53 +00:00
Daan De Meyer
da0d560905
Merge pull request #18516 from systemd/revert-18515-temporarily-pin-arch-repos
Revert "ci: temporarily pin Arch repositories to glibc 2.32-5"
2021-02-26 18:16:42 +00:00
Lennart Poettering
ee1aa61c47 copy: handle copy_file_range() weirdness on procfs/sysfs
This addresses the issue described in https://lwn.net/Articles/846403/
and makes sure we will be able to stream bytes from procfs/sysfs via
copy_bytes() if people ask us to.
2021-02-26 18:38:22 +01:00
Frantisek Sumsal
d227b6a7c0 ci: build an upstream version of systemd-nspawn
Ubuntu's systemd-nspawn doesn't support faccessat2() syscall, which is
required, since current Arch's glibc implements faccessat() via
faccessat2().
2021-02-26 17:06:25 +01:00
Frantisek Sumsal
b12dba35d1 Revert "ci: temporarily pin Arch repositories to glibc 2.32-5"
This reverts commit 67c972c610de61789d1b6560d28340f70d4b1196.
2021-02-26 16:46:35 +01:00
4 changed files with 79 additions and 36 deletions

View File

@ -29,18 +29,22 @@ jobs:
- name: Install
run: sudo apt-get update && sudo apt-get install --no-install-recommends python3-pexpect
# glibc 2.33-3 shipped on 2021-02-06 breaks running Arch containers on
# systems with older kernels (like Ubuntu Focal). Until the issue is
# resolved, let's pin the Arch repositories to glibc 2.32-5 to mitigate
# the annoying CI fails.
#
# See: https://bugs.archlinux.org/task/69563
- name: Pin repositories to 2021-02-05
run: sed -i '/^\[Distribution\]/aMirror=https://archive.archlinux.org/repos/2021/02/05/' .mkosi/mkosi.arch
- name: Symlink
run: ln -s .mkosi/mkosi.${{ matrix.distro }} mkosi.default
# Ubuntu's systemd-nspawn doesn't support faccessat2() syscall, which is
# required, since current Arch's glibc implements faccessat() via faccessat2().
- name: Update systemd-nspawn
if: ${{ matrix.distro == 'arch' }}
run: |
echo "deb-src http://archive.ubuntu.com/ubuntu/ $(lsb_release -cs) main restricted universe multiverse" | sudo tee -a /etc/apt/sources.list
sudo apt update
sudo apt build-dep systemd
meson build
ninja -C build
sudo ln -svf $PWD/build/systemd-nspawn `which systemd-nspawn`
systemd-nspawn --version
- name: Build ${{ matrix.distro }}
run: sudo python3 -m mkosi --password= --qemu-headless build

View File

@ -112,7 +112,7 @@ int copy_bytes_full(
copy_progress_bytes_t progress,
void *userdata) {
bool try_cfr = true, try_sendfile = true, try_splice = true;
bool try_cfr = true, try_sendfile = true, try_splice = true, copied_something = false;
int r, nonblock_pipe = -1;
size_t m = SSIZE_MAX; /* that is the maximum that sendfile and c_f_r accept */
@ -211,9 +211,20 @@ int copy_bytes_full(
try_cfr = false;
/* use fallback below */
} else if (n == 0) /* EOF */
break;
else
} else if (n == 0) { /* likely EOF */
if (copied_something)
break;
/* So, we hit EOF immediately, without having copied a single byte. This
* could indicate two things: the file is actually empty, or we are on some
* virtual file system such as procfs/sysfs where the syscall actually
* doesn't work but doesn't return an error. Try to handle that, by falling
* back to simple read()s in case we encounter empty files.
*
* See: https://lwn.net/Articles/846403/ */
try_cfr = try_sendfile = try_splice = false;
} else
/* Success! */
goto next;
}
@ -227,9 +238,14 @@ int copy_bytes_full(
try_sendfile = false;
/* use fallback below */
} else if (n == 0) /* EOF */
} else if (n == 0) { /* likely EOF */
if (copied_something)
break;
try_sendfile = try_splice = false; /* same logic as above for copy_file_range() */
break;
else
} else
/* Success! */
goto next;
}
@ -239,14 +255,14 @@ int copy_bytes_full(
/* splice()'s asynchronous I/O support is a bit weird. When it encounters a pipe file
* descriptor, then it will ignore its O_NONBLOCK flag and instead only honour the
* SPLICE_F_NONBLOCK flag specified in its flag parameter. Let's hide this behaviour here, and
* check if either of the specified fds are a pipe, and if so, let's pass the flag
* automatically, depending on O_NONBLOCK being set.
* SPLICE_F_NONBLOCK flag specified in its flag parameter. Let's hide this behaviour
* here, and check if either of the specified fds are a pipe, and if so, let's pass
* the flag automatically, depending on O_NONBLOCK being set.
*
* Here's a twist though: when we use it to move data between two pipes of which one has
* O_NONBLOCK set and the other has not, then we have no individual control over O_NONBLOCK
* behaviour. Hence in that case we can't use splice() and still guarantee systematic
* O_NONBLOCK behaviour, hence don't. */
* Here's a twist though: when we use it to move data between two pipes of which one
* has O_NONBLOCK set and the other has not, then we have no individual control over
* O_NONBLOCK behaviour. Hence in that case we can't use splice() and still guarantee
* systematic O_NONBLOCK behaviour, hence don't. */
if (nonblock_pipe < 0) {
int a, b;
@ -264,12 +280,13 @@ int copy_bytes_full(
(a == FD_IS_BLOCKING_PIPE && b == FD_IS_NONBLOCKING_PIPE) ||
(a == FD_IS_NONBLOCKING_PIPE && b == FD_IS_BLOCKING_PIPE))
/* splice() only works if one of the fds is a pipe. If neither is, let's skip
* this step right-away. As mentioned above, if one of the two fds refers to a
* blocking pipe and the other to a non-blocking pipe, we can't use splice()
* either, hence don't try either. This hence means we can only use splice() if
* either only one of the two fds is a pipe, or if both are pipes with the same
* nonblocking flag setting. */
/* splice() only works if one of the fds is a pipe. If neither is,
* let's skip this step right-away. As mentioned above, if one of the
* two fds refers to a blocking pipe and the other to a non-blocking
* pipe, we can't use splice() either, hence don't try either. This
* hence means we can only use splice() if either only one of the two
* fds is a pipe, or if both are pipes with the same nonblocking flag
* setting. */
try_splice = false;
else
@ -285,9 +302,13 @@ int copy_bytes_full(
try_splice = false;
/* use fallback below */
} else if (n == 0) /* EOF */
break;
else
} else if (n == 0) { /* likely EOF */
if (copied_something)
break;
try_splice = false; /* same logic as above for copy_file_range() + sendfile() */
} else
/* Success! */
goto next;
}
@ -345,11 +366,12 @@ int copy_bytes_full(
max_bytes -= n;
}
/* sendfile accepts at most SSIZE_MAX-offset bytes to copy,
* so reduce our maximum by the amount we already copied,
* but don't go below our copy buffer size, unless we are
* close the limit of bytes we are allowed to copy. */
/* sendfile accepts at most SSIZE_MAX-offset bytes to copy, so reduce our maximum by the
* amount we already copied, but don't go below our copy buffer size, unless we are close the
* limit of bytes we are allowed to copy. */
m = MAX(MIN(COPY_BUFFER_SIZE, max_bytes), m - n);
copied_something = true;
}
return 0; /* return 0 if we hit EOF earlier than the size limit */

View File

@ -272,7 +272,7 @@ static bool mount_entry_read_only(const MountEntry *p) {
static bool mount_entry_noexec(const MountEntry *p) {
assert(p);
return p->noexec || IN_SET(p->mode, NOEXEC, INACCESSIBLE, SYSFS, PROCFS);
return p->noexec || IN_SET(p->mode, NOEXEC, INACCESSIBLE);
}
static bool mount_entry_exec(const MountEntry *p) {

View File

@ -304,6 +304,22 @@ static void test_copy_atomic(void) {
assert_se(copy_file_atomic("/etc/fstab", q, 0644, 0, 0, COPY_REPLACE) >= 0);
}
static void test_copy_proc(void) {
_cleanup_(rm_rf_physical_and_freep) char *p = NULL;
_cleanup_free_ char *f = NULL, *a = NULL, *b = NULL;
/* Check if copying data from /proc/ works correctly, i.e. let's see if https://lwn.net/Articles/846403/ is a problem for us */
assert_se(mkdtemp_malloc(NULL, &p) >= 0);
assert_se(f = path_join(p, "version"));
assert_se(copy_file("/proc/version", f, 0, (mode_t) -1, 0, 0, 0) >= 0);
assert_se(read_one_line_file("/proc/version", &a) >= 0);
assert_se(read_one_line_file(f, &b) >= 0);
assert_se(streq(a, b));
assert_se(strlen(a) > 0);
}
int main(int argc, char *argv[]) {
test_setup_logging(LOG_DEBUG);
@ -318,6 +334,7 @@ int main(int argc, char *argv[]) {
test_copy_bytes_regular_file(argv[0], false, 32000); /* larger than copy buffer size */
test_copy_bytes_regular_file(argv[0], true, 32000);
test_copy_atomic();
test_copy_proc();
return 0;
}