Compare commits
15 Commits
cfec6ec663
...
8a1b0aa839
Author | SHA1 | Date |
---|---|---|
Luca Boccassi | 8a1b0aa839 | |
Ani Sinha | 4b356c90dc | |
Léane GRASSER | f28e16d14e | |
Yu Watanabe | 9e05e33871 | |
Lennart Poettering | 95116bdfd5 | |
Lennart Poettering | 2bd290ca02 | |
Yu Watanabe | 1e9fb1d456 | |
Yu Watanabe | 56c761f8c6 | |
Yu Watanabe | b76730f3fe | |
Yu Watanabe | 3dda236c5c | |
Zbigniew Jędrzejewski-Szmek | 5598454a3f | |
Yu Watanabe | 2994ca354b | |
Yu Watanabe | eb14b993bb | |
Luca Boccassi | 2b3ebe1e6a | |
Luca Boccassi | c6cb6aee4d |
4
po/fr.po
4
po/fr.po
|
@ -12,7 +12,7 @@ msgid ""
|
|||
msgstr ""
|
||||
"Report-Msgid-Bugs-To: \n"
|
||||
"POT-Creation-Date: 2024-11-06 14:42+0000\n"
|
||||
"PO-Revision-Date: 2024-11-20 19:13+0000\n"
|
||||
"PO-Revision-Date: 2024-11-23 10:38+0000\n"
|
||||
"Last-Translator: Léane GRASSER <leane.grasser@proton.me>\n"
|
||||
"Language-Team: French <https://translate.fedoraproject.org/projects/systemd/"
|
||||
"main/fr/>\n"
|
||||
|
@ -1258,7 +1258,7 @@ msgstr ""
|
|||
|
||||
#: src/sysupdate/org.freedesktop.sysupdate1.policy:75
|
||||
msgid "Manage optional features"
|
||||
msgstr "Gérer les fonctionnalités en option"
|
||||
msgstr "Gérer les fonctionnalités facultatives"
|
||||
|
||||
#: src/sysupdate/org.freedesktop.sysupdate1.policy:76
|
||||
msgid "Authentication is required to manage optional features"
|
||||
|
|
|
@ -21,7 +21,7 @@
|
|||
#define AUTOFS_MIN_PROTO_VERSION 3
|
||||
#define AUTOFS_MAX_PROTO_VERSION 5
|
||||
|
||||
#define AUTOFS_PROTO_SUBVERSION 5
|
||||
#define AUTOFS_PROTO_SUBVERSION 6
|
||||
|
||||
/*
|
||||
* The wait_queue_token (autofs_wqt_t) is part of a structure which is passed
|
||||
|
|
|
@ -1121,6 +1121,9 @@ enum bpf_attach_type {
|
|||
|
||||
#define MAX_BPF_ATTACH_TYPE __MAX_BPF_ATTACH_TYPE
|
||||
|
||||
/* Add BPF_LINK_TYPE(type, name) in bpf_types.h to keep bpf_link_type_strs[]
|
||||
* in sync with the definitions below.
|
||||
*/
|
||||
enum bpf_link_type {
|
||||
BPF_LINK_TYPE_UNSPEC = 0,
|
||||
BPF_LINK_TYPE_RAW_TRACEPOINT = 1,
|
||||
|
@ -2851,7 +2854,7 @@ union bpf_attr {
|
|||
* **TCP_SYNCNT**, **TCP_USER_TIMEOUT**, **TCP_NOTSENT_LOWAT**,
|
||||
* **TCP_NODELAY**, **TCP_MAXSEG**, **TCP_WINDOW_CLAMP**,
|
||||
* **TCP_THIN_LINEAR_TIMEOUTS**, **TCP_BPF_DELACK_MAX**,
|
||||
* **TCP_BPF_RTO_MIN**.
|
||||
* **TCP_BPF_RTO_MIN**, **TCP_BPF_SOCK_OPS_CB_FLAGS**.
|
||||
* * **IPPROTO_IP**, which supports *optname* **IP_TOS**.
|
||||
* * **IPPROTO_IPV6**, which supports the following *optname*\ s:
|
||||
* **IPV6_TCLASS**, **IPV6_AUTOFLOWLABEL**.
|
||||
|
@ -5519,11 +5522,12 @@ union bpf_attr {
|
|||
* **-EOPNOTSUPP** if the hash calculation failed or **-EINVAL** if
|
||||
* invalid arguments are passed.
|
||||
*
|
||||
* void *bpf_kptr_xchg(void *map_value, void *ptr)
|
||||
* void *bpf_kptr_xchg(void *dst, void *ptr)
|
||||
* Description
|
||||
* Exchange kptr at pointer *map_value* with *ptr*, and return the
|
||||
* old value. *ptr* can be NULL, otherwise it must be a referenced
|
||||
* pointer which will be released when this helper is called.
|
||||
* Exchange kptr at pointer *dst* with *ptr*, and return the old value.
|
||||
* *dst* can be map value or local kptr. *ptr* can be NULL, otherwise
|
||||
* it must be a referenced pointer which will be released when this helper
|
||||
* is called.
|
||||
* Return
|
||||
* The old value of kptr (which can be NULL). The returned pointer
|
||||
* if not NULL, is a reference which must be released using its
|
||||
|
@ -6046,11 +6050,6 @@ enum {
|
|||
BPF_F_MARK_ENFORCE = (1ULL << 6),
|
||||
};
|
||||
|
||||
/* BPF_FUNC_clone_redirect and BPF_FUNC_redirect flags. */
|
||||
enum {
|
||||
BPF_F_INGRESS = (1ULL << 0),
|
||||
};
|
||||
|
||||
/* BPF_FUNC_skb_set_tunnel_key and BPF_FUNC_skb_get_tunnel_key flags. */
|
||||
enum {
|
||||
BPF_F_TUNINFO_IPV6 = (1ULL << 0),
|
||||
|
@ -6197,10 +6196,12 @@ enum {
|
|||
BPF_F_BPRM_SECUREEXEC = (1ULL << 0),
|
||||
};
|
||||
|
||||
/* Flags for bpf_redirect_map helper */
|
||||
/* Flags for bpf_redirect and bpf_redirect_map helpers */
|
||||
enum {
|
||||
BPF_F_BROADCAST = (1ULL << 3),
|
||||
BPF_F_EXCLUDE_INGRESS = (1ULL << 4),
|
||||
BPF_F_INGRESS = (1ULL << 0), /* used for skb path */
|
||||
BPF_F_BROADCAST = (1ULL << 3), /* used for XDP path */
|
||||
BPF_F_EXCLUDE_INGRESS = (1ULL << 4), /* used for XDP path */
|
||||
#define BPF_F_REDIRECT_FLAGS (BPF_F_INGRESS | BPF_F_BROADCAST | BPF_F_EXCLUDE_INGRESS)
|
||||
};
|
||||
|
||||
#define __bpf_md_ptr(type, name) \
|
||||
|
@ -7080,6 +7081,7 @@ enum {
|
|||
TCP_BPF_SYN = 1005, /* Copy the TCP header */
|
||||
TCP_BPF_SYN_IP = 1006, /* Copy the IP[46] and TCP header */
|
||||
TCP_BPF_SYN_MAC = 1007, /* Copy the MAC, IP[46], and TCP header */
|
||||
TCP_BPF_SOCK_OPS_CB_FLAGS = 1008, /* Get or Set TCP sock ops flags */
|
||||
};
|
||||
|
||||
enum {
|
||||
|
@ -7512,4 +7514,13 @@ struct bpf_iter_num {
|
|||
__u64 __opaque[1];
|
||||
} __attribute__((aligned(8)));
|
||||
|
||||
/*
|
||||
* Flags to control BPF kfunc behaviour.
|
||||
* - BPF_F_PAD_ZEROS: Pad destination buffer with zeros. (See the respective
|
||||
* helper documentation for details.)
|
||||
*/
|
||||
enum bpf_kfunc_flags {
|
||||
BPF_F_PAD_ZEROS = (1ULL << 0),
|
||||
};
|
||||
|
||||
#endif /* __LINUX_BPF_H__ */
|
||||
|
|
|
@ -28,6 +28,23 @@
|
|||
#define _BITUL(x) (_UL(1) << (x))
|
||||
#define _BITULL(x) (_ULL(1) << (x))
|
||||
|
||||
#if !defined(__ASSEMBLY__)
|
||||
/*
|
||||
* Missing __asm__ support
|
||||
*
|
||||
* __BIT128() would not work in the __asm__ code, as it shifts an
|
||||
* 'unsigned __init128' data type as direct representation of
|
||||
* 128 bit constants is not supported in the gcc compiler, as
|
||||
* they get silently truncated.
|
||||
*
|
||||
* TODO: Please revisit this implementation when gcc compiler
|
||||
* starts representing 128 bit constants directly like long
|
||||
* and unsigned long etc. Subsequently drop the comment for
|
||||
* GENMASK_U128() which would then start supporting __asm__ code.
|
||||
*/
|
||||
#define _BIT128(x) ((unsigned __int128)(1) << (x))
|
||||
#endif
|
||||
|
||||
#define __ALIGN_KERNEL(x, a) __ALIGN_KERNEL_MASK(x, (__typeof__(x))(a) - 1)
|
||||
#define __ALIGN_KERNEL_MASK(x, mask) (((x) + (mask)) & ~(mask))
|
||||
|
||||
|
|
|
@ -2531,4 +2531,20 @@ struct ethtool_link_settings {
|
|||
* __u32 map_lp_advertising[link_mode_masks_nwords];
|
||||
*/
|
||||
};
|
||||
|
||||
/**
|
||||
* enum phy_upstream - Represents the upstream component a given PHY device
|
||||
* is connected to, as in what is on the other end of the MII bus. Most PHYs
|
||||
* will be attached to an Ethernet MAC controller, but in some cases, there's
|
||||
* an intermediate PHY used as a media-converter, which will driver another
|
||||
* MII interface as its output.
|
||||
* @PHY_UPSTREAM_MAC: Upstream component is a MAC (a switch port,
|
||||
* or ethernet controller)
|
||||
* @PHY_UPSTREAM_PHY: Upstream component is a PHY (likely a media converter)
|
||||
*/
|
||||
enum phy_upstream {
|
||||
PHY_UPSTREAM_MAC,
|
||||
PHY_UPSTREAM_PHY,
|
||||
};
|
||||
|
||||
#endif /* _LINUX_ETHTOOL_H */
|
||||
|
|
|
@ -67,6 +67,7 @@ enum {
|
|||
FRA_IP_PROTO, /* ip proto */
|
||||
FRA_SPORT_RANGE, /* sport */
|
||||
FRA_DPORT_RANGE, /* dport */
|
||||
FRA_DSCP, /* dscp */
|
||||
__FRA_MAX
|
||||
};
|
||||
|
||||
|
|
|
@ -230,8 +230,8 @@ struct tpacket_hdr_v1 {
|
|||
* ts_first_pkt:
|
||||
* Is always the time-stamp when the block was opened.
|
||||
* Case a) ZERO packets
|
||||
* No packets to deal with but atleast you know the
|
||||
* time-interval of this block.
|
||||
* No packets to deal with but at least you know
|
||||
* the time-interval of this block.
|
||||
* Case b) Non-zero packets
|
||||
* Use the ts of the first packet in the block.
|
||||
*
|
||||
|
@ -265,7 +265,8 @@ enum tpacket_versions {
|
|||
- struct tpacket_hdr
|
||||
- pad to TPACKET_ALIGNMENT=16
|
||||
- struct sockaddr_ll
|
||||
- Gap, chosen so that packet data (Start+tp_net) alignes to TPACKET_ALIGNMENT=16
|
||||
- Gap, chosen so that packet data (Start+tp_net) aligns to
|
||||
TPACKET_ALIGNMENT=16
|
||||
- Start+tp_mac: [ Optional MAC header ]
|
||||
- Start+tp_net: Packet data, aligned to TPACKET_ALIGNMENT=16.
|
||||
- Pad to align to TPACKET_ALIGNMENT=16
|
||||
|
|
|
@ -141,7 +141,7 @@ struct in_addr {
|
|||
*/
|
||||
#define IP_PMTUDISC_INTERFACE 4
|
||||
/* weaker version of IP_PMTUDISC_INTERFACE, which allows packets to get
|
||||
* fragmented if they exeed the interface mtu
|
||||
* fragmented if they exceed the interface mtu
|
||||
*/
|
||||
#define IP_PMTUDISC_OMIT 5
|
||||
|
||||
|
|
|
@ -140,25 +140,6 @@
|
|||
|
||||
#endif /* _NETINET_IN_H */
|
||||
|
||||
/* Coordinate with glibc netipx/ipx.h header. */
|
||||
#if defined(__NETIPX_IPX_H)
|
||||
|
||||
#define __UAPI_DEF_SOCKADDR_IPX 0
|
||||
#define __UAPI_DEF_IPX_ROUTE_DEFINITION 0
|
||||
#define __UAPI_DEF_IPX_INTERFACE_DEFINITION 0
|
||||
#define __UAPI_DEF_IPX_CONFIG_DATA 0
|
||||
#define __UAPI_DEF_IPX_ROUTE_DEF 0
|
||||
|
||||
#else /* defined(__NETIPX_IPX_H) */
|
||||
|
||||
#define __UAPI_DEF_SOCKADDR_IPX 1
|
||||
#define __UAPI_DEF_IPX_ROUTE_DEFINITION 1
|
||||
#define __UAPI_DEF_IPX_INTERFACE_DEFINITION 1
|
||||
#define __UAPI_DEF_IPX_CONFIG_DATA 1
|
||||
#define __UAPI_DEF_IPX_ROUTE_DEF 1
|
||||
|
||||
#endif /* defined(__NETIPX_IPX_H) */
|
||||
|
||||
/* Definitions for xattr.h */
|
||||
#if defined(_SYS_XATTR_H)
|
||||
#define __UAPI_DEF_XATTR 0
|
||||
|
@ -240,23 +221,6 @@
|
|||
#define __UAPI_DEF_IP6_MTUINFO 1
|
||||
#endif
|
||||
|
||||
/* Definitions for ipx.h */
|
||||
#ifndef __UAPI_DEF_SOCKADDR_IPX
|
||||
#define __UAPI_DEF_SOCKADDR_IPX 1
|
||||
#endif
|
||||
#ifndef __UAPI_DEF_IPX_ROUTE_DEFINITION
|
||||
#define __UAPI_DEF_IPX_ROUTE_DEFINITION 1
|
||||
#endif
|
||||
#ifndef __UAPI_DEF_IPX_INTERFACE_DEFINITION
|
||||
#define __UAPI_DEF_IPX_INTERFACE_DEFINITION 1
|
||||
#endif
|
||||
#ifndef __UAPI_DEF_IPX_CONFIG_DATA
|
||||
#define __UAPI_DEF_IPX_CONFIG_DATA 1
|
||||
#endif
|
||||
#ifndef __UAPI_DEF_IPX_ROUTE_DEF
|
||||
#define __UAPI_DEF_IPX_ROUTE_DEF 1
|
||||
#endif
|
||||
|
||||
/* Definitions for xattr.h */
|
||||
#ifndef __UAPI_DEF_XATTR
|
||||
#define __UAPI_DEF_XATTR 1
|
||||
|
|
|
@ -436,7 +436,7 @@ enum nft_set_elem_flags {
|
|||
* @NFTA_SET_ELEM_KEY: key value (NLA_NESTED: nft_data)
|
||||
* @NFTA_SET_ELEM_DATA: data value of mapping (NLA_NESTED: nft_data_attributes)
|
||||
* @NFTA_SET_ELEM_FLAGS: bitmask of nft_set_elem_flags (NLA_U32)
|
||||
* @NFTA_SET_ELEM_TIMEOUT: timeout value (NLA_U64)
|
||||
* @NFTA_SET_ELEM_TIMEOUT: timeout value, zero means never times out (NLA_U64)
|
||||
* @NFTA_SET_ELEM_EXPIRATION: expiration time (NLA_U64)
|
||||
* @NFTA_SET_ELEM_USERDATA: user data (NLA_BINARY)
|
||||
* @NFTA_SET_ELEM_EXPR: expression (NLA_NESTED: nft_expr_attributes)
|
||||
|
@ -1694,7 +1694,7 @@ enum nft_flowtable_flags {
|
|||
*
|
||||
* @NFTA_FLOWTABLE_TABLE: name of the table containing the expression (NLA_STRING)
|
||||
* @NFTA_FLOWTABLE_NAME: name of this flow table (NLA_STRING)
|
||||
* @NFTA_FLOWTABLE_HOOK: netfilter hook configuration(NLA_U32)
|
||||
* @NFTA_FLOWTABLE_HOOK: netfilter hook configuration (NLA_NESTED)
|
||||
* @NFTA_FLOWTABLE_USE: number of references to this flow table (NLA_U32)
|
||||
* @NFTA_FLOWTABLE_HANDLE: object handle (NLA_U64)
|
||||
* @NFTA_FLOWTABLE_FLAGS: flags (NLA_U32)
|
||||
|
|
|
@ -16,10 +16,15 @@ struct nhmsg {
|
|||
struct nexthop_grp {
|
||||
__u32 id; /* nexthop id - must exist */
|
||||
__u8 weight; /* weight of this nexthop */
|
||||
__u8 resvd1;
|
||||
__u8 weight_high; /* high order bits of weight */
|
||||
__u16 resvd2;
|
||||
};
|
||||
|
||||
static __inline__ __u16 nexthop_grp_weight(const struct nexthop_grp *entry)
|
||||
{
|
||||
return ((entry->weight_high << 8) | entry->weight) + 1;
|
||||
}
|
||||
|
||||
enum {
|
||||
NEXTHOP_GRP_TYPE_MPATH, /* hash-threshold nexthop group
|
||||
* default type if not specified
|
||||
|
@ -33,6 +38,9 @@ enum {
|
|||
#define NHA_OP_FLAG_DUMP_STATS BIT(0)
|
||||
#define NHA_OP_FLAG_DUMP_HW_STATS BIT(1)
|
||||
|
||||
/* Response OP_FLAGS. */
|
||||
#define NHA_OP_FLAG_RESP_GRP_RESVD_0 BIT(31) /* Dump clears resvd fields. */
|
||||
|
||||
enum {
|
||||
NHA_UNSPEC,
|
||||
NHA_ID, /* u32; id for nexthop. id == 0 means auto-assign */
|
||||
|
|
|
@ -531,20 +531,24 @@ int is_idmapping_supported(const char *path) {
|
|||
userns_fd = userns_acquire(uid_map, gid_map);
|
||||
if (ERRNO_IS_NEG_NOT_SUPPORTED(userns_fd) || ERRNO_IS_NEG_PRIVILEGE(userns_fd))
|
||||
return false;
|
||||
if (userns_fd == -ENOSPC) {
|
||||
log_debug_errno(userns_fd, "Failed to acquire new user namespace, user.max_user_namespaces seems to be exhausted or maybe even zero, assuming ID-mapping is not supported: %m");
|
||||
return false;
|
||||
}
|
||||
if (userns_fd < 0)
|
||||
return log_debug_errno(userns_fd, "ID-mapping supported namespace acquire failed for '%s' : %m", path);
|
||||
return log_debug_errno(userns_fd, "Failed to acquire new user namespace for checking if '%s' supports ID-mapping: %m", path);
|
||||
|
||||
dir_fd = RET_NERRNO(open(path, O_RDONLY | O_CLOEXEC | O_NOFOLLOW));
|
||||
if (ERRNO_IS_NEG_NOT_SUPPORTED(dir_fd))
|
||||
return false;
|
||||
if (dir_fd < 0)
|
||||
return log_debug_errno(dir_fd, "ID-mapping supported open failed for '%s' : %m", path);
|
||||
return log_debug_errno(dir_fd, "Failed to open '%s', cannot determine if ID-mapping is supported: %m", path);
|
||||
|
||||
mount_fd = RET_NERRNO(open_tree(dir_fd, "", AT_EMPTY_PATH | OPEN_TREE_CLONE | OPEN_TREE_CLOEXEC));
|
||||
if (ERRNO_IS_NEG_NOT_SUPPORTED(mount_fd) || ERRNO_IS_NEG_PRIVILEGE(mount_fd) || mount_fd == -EINVAL)
|
||||
return false;
|
||||
if (mount_fd < 0)
|
||||
return log_debug_errno(mount_fd, "ID-mapping supported open_tree failed for '%s' : %m", path);
|
||||
return log_debug_errno(mount_fd, "Failed to open mount tree '%s', cannot determine if ID-mapping is supported: %m", path);
|
||||
|
||||
r = RET_NERRNO(mount_setattr(mount_fd, "", AT_EMPTY_PATH,
|
||||
&(struct mount_attr) {
|
||||
|
@ -554,7 +558,7 @@ int is_idmapping_supported(const char *path) {
|
|||
if (ERRNO_IS_NEG_NOT_SUPPORTED(r) || ERRNO_IS_NEG_PRIVILEGE(r) || r == -EINVAL)
|
||||
return false;
|
||||
if (r < 0)
|
||||
return log_debug_errno(r, "ID-mapping supported setattr failed for '%s' : %m", path);
|
||||
return log_debug_errno(r, "Failed to set mount attribute to '%s', cannot determine if ID-mapping is supported: %m", path);
|
||||
|
||||
return true;
|
||||
}
|
||||
|
|
|
@ -24,6 +24,10 @@
|
|||
#include "uid-range.h"
|
||||
#include "virt.h"
|
||||
|
||||
/* Root namespace inode number, as per include/linux/proc_ns.h in the kernel source tree, since v3.8:
|
||||
* https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=98f842e675f96ffac96e6c50315790912b2812be */
|
||||
#define PROC_PID_INIT_INO UINT64_C(0xEFFFFFFC)
|
||||
|
||||
enum {
|
||||
SMBIOS_VM_BIT_SET,
|
||||
SMBIOS_VM_BIT_UNSET,
|
||||
|
@ -645,6 +649,20 @@ static int running_in_cgroupns(void) {
|
|||
}
|
||||
}
|
||||
|
||||
static int running_in_pidns(void) {
|
||||
_cleanup_close_ int pidns_fd = -EBADF;
|
||||
struct stat st;
|
||||
|
||||
pidns_fd = namespace_open_by_type(NAMESPACE_PID);
|
||||
if (pidns_fd < 0)
|
||||
return log_debug_errno(pidns_fd, "Failed to open PID namespace, ignoring: %m");
|
||||
|
||||
if (fstat(pidns_fd, &st) < 0)
|
||||
return log_debug_errno(errno, "Failed to fstat pid namespace fd, ignoring: %m");
|
||||
|
||||
return (uint64_t) st.st_ino != PROC_PID_INIT_INO;
|
||||
}
|
||||
|
||||
static Virtualization detect_container_files(void) {
|
||||
static const struct {
|
||||
const char *file_path;
|
||||
|
@ -790,12 +808,21 @@ check_files:
|
|||
|
||||
r = running_in_cgroupns();
|
||||
if (r > 0) {
|
||||
log_debug("Running in a cgroup namespace, assuming unknown container manager.");
|
||||
v = VIRTUALIZATION_CONTAINER_OTHER;
|
||||
goto finish;
|
||||
}
|
||||
if (r < 0)
|
||||
log_debug_errno(r, "Failed to detect cgroup namespace: %m");
|
||||
|
||||
/* Finally, the root pid namespace has an hardcoded inode number of 0xEFFFFFFC since kernel 3.8, so
|
||||
* if all else fails we can check the inode number of our pid namespace and compare it. */
|
||||
if (running_in_pidns() > 0) {
|
||||
log_debug("Running in a pid namespace, assuming unknown container manager.");
|
||||
v = VIRTUALIZATION_CONTAINER_OTHER;
|
||||
goto finish;
|
||||
}
|
||||
|
||||
/* If none of that worked, give up, assume no container manager. */
|
||||
v = VIRTUALIZATION_NONE;
|
||||
goto finish;
|
||||
|
|
|
@ -98,16 +98,11 @@ static int parse_proc_cmdline_item(const char *key, const char *value, void *dat
|
|||
}
|
||||
}
|
||||
|
||||
#if HAVE_SYSV_COMPAT
|
||||
else if (streq(key, "fastboot") && !value) {
|
||||
log_warning("Please pass 'fsck.mode=skip' rather than 'fastboot' on the kernel command line.");
|
||||
else if (streq(key, "fastboot") && !value)
|
||||
arg_skip = true;
|
||||
|
||||
} else if (streq(key, "forcefsck") && !value) {
|
||||
log_warning("Please pass 'fsck.mode=force' rather than 'forcefsck' on the kernel command line.");
|
||||
else if (streq(key, "forcefsck") && !value)
|
||||
arg_force = true;
|
||||
}
|
||||
#endif
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
|
|
@ -108,6 +108,7 @@ static int help(int argc, char *argv[], void *userdata) {
|
|||
" --ucode=PATH Path to microcode image file %7$s .ucode\n"
|
||||
" --splash=PATH Path to splash bitmap file %7$s .splash\n"
|
||||
" --dtb=PATH Path to DeviceTree file %7$s .dtb\n"
|
||||
" --dtbauto=PATH Path to DeviceTree file for auto selection %7$s .dtbauto\n"
|
||||
" --uname=PATH Path to 'uname -r' file %7$s .uname\n"
|
||||
" --sbat=PATH Path to SBAT file %7$s .sbat\n"
|
||||
" --pcrpkey=PATH Path to public key for PCR signatures %7$s .pcrpkey\n"
|
||||
|
|
|
@ -2280,10 +2280,9 @@ static int copy_devnode_one(const char *dest, const char *node, bool ignore_mkno
|
|||
r = path_extract_directory(from, &parent);
|
||||
if (r < 0)
|
||||
return log_error_errno(r, "Failed to extract directory from %s: %m", from);
|
||||
if (!path_equal(parent, "/dev/")) {
|
||||
if (userns_mkdir(dest, parent, 0755, 0, 0) < 0)
|
||||
r = userns_mkdir(dest, parent, 0755, 0, 0);
|
||||
if (r < 0)
|
||||
return log_error_errno(r, "Failed to create directory %s: %m", parent);
|
||||
}
|
||||
|
||||
if (mknod(to, st.st_mode, st.st_rdev) < 0) {
|
||||
r = -errno; /* Save the original error code. */
|
||||
|
@ -4654,7 +4653,7 @@ static int nspawn_dispatch_notify_fd(sd_event_source *source, int fd, uint32_t r
|
|||
|
||||
ucred = CMSG_FIND_DATA(&msghdr, SOL_SOCKET, SCM_CREDENTIALS, struct ucred);
|
||||
if (!ucred || ucred->pid != inner_child_pid) {
|
||||
log_debug("Received notify message without valid credentials. Ignoring.");
|
||||
log_debug("Received notify message from process that is not the payload's PID 1. Ignoring.");
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
|
|
@ -36,14 +36,9 @@ static int parse_proc_cmdline_item(const char *key, const char *value, void *dat
|
|||
arg_skip = true;
|
||||
else
|
||||
log_warning("Invalid quotacheck.mode= value, ignoring: %s", value);
|
||||
}
|
||||
|
||||
#if HAVE_SYSV_COMPAT
|
||||
else if (streq(key, "forcequotacheck") && !value) {
|
||||
log_warning("Please use 'quotacheck.mode=force' rather than 'forcequotacheck' on the kernel command line. Proceeding anyway.");
|
||||
} else if (streq(key, "forcequotacheck") && !value)
|
||||
arg_force = true;
|
||||
}
|
||||
#endif
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
|
|
@ -98,15 +98,17 @@ static int delete_dm(DeviceMapper *m) {
|
|||
assert(major(m->devnum) != 0);
|
||||
assert(m->path);
|
||||
|
||||
fd = open(m->path, O_RDONLY|O_CLOEXEC|O_NONBLOCK);
|
||||
if (fd < 0)
|
||||
log_debug_errno(errno, "Failed to open DM block device %s for syncing, ignoring: %m", m->path);
|
||||
else {
|
||||
(void) sync_with_progress(fd);
|
||||
fd = safe_close(fd);
|
||||
}
|
||||
|
||||
fd = open("/dev/mapper/control", O_RDWR|O_CLOEXEC);
|
||||
if (fd < 0)
|
||||
return -errno;
|
||||
|
||||
_cleanup_close_ int block_fd = open(m->path, O_RDONLY|O_CLOEXEC|O_NONBLOCK);
|
||||
if (block_fd < 0)
|
||||
log_debug_errno(errno, "Failed to open DM block device %s for syncing, ignoring: %m", m->path);
|
||||
else
|
||||
(void) sync_with_progress(block_fd);
|
||||
return log_debug_errno(errno, "Failed to open /dev/mapper/control: %m");
|
||||
|
||||
return RET_NERRNO(ioctl(fd, DM_DEV_REMOVE, &(struct dm_ioctl) {
|
||||
.version = {
|
||||
|
|
|
@ -211,10 +211,8 @@ static int sync_making_progress(unsigned long long *prev_dirty) {
|
|||
continue;
|
||||
|
||||
errno = 0;
|
||||
if (sscanf(line, "%*s %llu %*s", &ull) != 1) {
|
||||
log_warning_errno(errno_or_else(EIO), "Failed to parse /proc/meminfo field, ignoring: %m");
|
||||
return false;
|
||||
}
|
||||
if (sscanf(line, "%*s %llu %*s", &ull) != 1)
|
||||
return log_warning_errno(errno_or_else(EIO), "Failed to parse /proc/meminfo field: %m");
|
||||
|
||||
val += ull;
|
||||
}
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
# SPDX-License-Identifier: LGPL-2.1-or-later
|
||||
# Container-specific auxiliary tests. VM-based ones go in TEST-87-AUX-UTILS-VM.
|
||||
|
||||
integration_tests += [
|
||||
integration_test_template + {
|
||||
'name' : fs.name(meson.current_source_dir()),
|
||||
'storage': 'persistent',
|
||||
'vm' : true,
|
||||
},
|
||||
]
|
||||
|
||||
|
|
|
@ -0,0 +1 @@
|
|||
../TEST-01-BASIC/Makefile
|
|
@ -0,0 +1,10 @@
|
|||
# SPDX-License-Identifier: LGPL-2.1-or-later
|
||||
# VM-specific auxiliary tests. Container-based ones go in TEST-74-AUX-UTILS.
|
||||
|
||||
integration_tests += [
|
||||
integration_test_template + {
|
||||
'name' : fs.name(meson.current_source_dir()),
|
||||
'storage': 'persistent',
|
||||
'vm' : true,
|
||||
},
|
||||
]
|
|
@ -0,0 +1,44 @@
|
|||
#!/usr/bin/env bash
|
||||
# SPDX-License-Identifier: LGPL-2.1-or-later
|
||||
set -e
|
||||
|
||||
TEST_DESCRIPTION="Tests for auxiliary utilities (VM)"
|
||||
TEST_NO_NSPAWN=1
|
||||
|
||||
# shellcheck source=test/test-functions
|
||||
. "${TEST_BASE_DIR:?}/test-functions"
|
||||
|
||||
# Make sure vsock is available in the VM
|
||||
CID=$((RANDOM + 3))
|
||||
QEMU_OPTIONS+=" -device vhost-vsock-pci,guest-cid=$CID"
|
||||
|
||||
test_append_files() {
|
||||
local workspace="${1:?}"
|
||||
|
||||
if ! get_bool "${TEST_PREFER_NSPAWN:-}" && ! get_bool "${TEST_NO_QEMU:-}"; then
|
||||
# Check if we can correctly boot with an invalid machine ID only if we run
|
||||
# the QEMU test, as nspawn refuses the invalid machine ID with -EUCLEAN
|
||||
printf "556f48e837bc4424a710fa2e2c9d3e3c\ne3d\n" >"$workspace/etc/machine-id"
|
||||
fi
|
||||
|
||||
if host_has_btrfs && host_has_mdadm; then
|
||||
install_btrfs
|
||||
install_mdadm
|
||||
generate_module_dependencies
|
||||
fi
|
||||
|
||||
inst_binary socat
|
||||
inst_binary ssh
|
||||
inst_binary sshd
|
||||
inst_binary ssh-keygen
|
||||
image_install -o /usr/lib/ssh/sshd-session /usr/libexec/openssh/sshd-session
|
||||
inst_binary usermod
|
||||
instmods vmw_vsock_virtio_transport
|
||||
instmods vsock_loopback
|
||||
instmods vmw_vsock_vmci_transport
|
||||
inst_binary gcc
|
||||
generate_module_dependencies
|
||||
inst_binary openssl
|
||||
}
|
||||
|
||||
do_test "$@"
|
|
@ -379,6 +379,7 @@ foreach dirname : [
|
|||
'TEST-84-STORAGETM',
|
||||
'TEST-85-NETWORK',
|
||||
'TEST-86-MULTI-PROFILE-UKI',
|
||||
'TEST-87-AUX-UTILS-VM',
|
||||
]
|
||||
subdir(dirname)
|
||||
endforeach
|
||||
|
|
|
@ -960,10 +960,13 @@ exec $(systemctl cat systemd-networkd.service | sed -n '/^ExecStart=/ {{ s/^.*=/
|
|||
|
||||
# wait until devices got created
|
||||
for _ in range(50):
|
||||
out = subprocess.check_output(['ip', 'a', 'show', 'dev', self.if_router])
|
||||
if b'state UP' in out and b'scope global' in out:
|
||||
if subprocess.run(['ip', 'link', 'show', 'dev', self.if_router],
|
||||
stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL).returncode == 0:
|
||||
break
|
||||
time.sleep(0.1)
|
||||
else:
|
||||
subprocess.call(['ip', 'link', 'show', 'dev', self.if_router])
|
||||
self.fail('Timed out waiting for {ifr} created.'.format(ifr=self.if_router))
|
||||
|
||||
def shutdown_iface(self):
|
||||
'''Remove test interface and stop DHCP server'''
|
||||
|
|
|
@ -39,149 +39,3 @@ systemd-mount --type=overlay --options="lowerdir=/etc,upperdir=$WORK_DIR/upper,w
|
|||
touch "$WORK_DIR/overlay/foo"
|
||||
test -e "$WORK_DIR/upper/foo"
|
||||
systemd-umount "$WORK_DIR/overlay"
|
||||
|
||||
# We're going to play around with block/loop devices, so bail out early
|
||||
# if we're running in nspawn
|
||||
if systemd-detect-virt --container >/dev/null; then
|
||||
echo "Container detected, skipping the test"
|
||||
exit 0
|
||||
fi
|
||||
|
||||
# Set up a simple block device for further tests
|
||||
dd if=/dev/zero of="$WORK_DIR/simple.img" bs=1M count=16
|
||||
mkfs.ext4 -L sd-mount-test "$WORK_DIR/simple.img"
|
||||
LOOP="$(losetup --show --find "$WORK_DIR/simple.img")"
|
||||
udevadm wait --timeout 60 --settle "$LOOP"
|
||||
# Also wait for the .device unit for the loop device is active. Otherwise, the .device unit activation
|
||||
# that is triggered by the .mount unit introduced by systemd-mount below may time out.
|
||||
timeout 60 bash -c "until systemctl is-active $LOOP; do sleep 1; done"
|
||||
mount "$LOOP" "$WORK_DIR/mnt"
|
||||
touch "$WORK_DIR/mnt/foo.bar"
|
||||
umount "$LOOP"
|
||||
(! mountpoint "$WORK_DIR/mnt")
|
||||
# Wait for the mount unit to be unloaded. Otherwise, creation of the transient unit below may fail.
|
||||
MOUNT_UNIT=$(systemd-escape --path --suffix=mount "$WORK_DIR/mnt")
|
||||
timeout 60 bash -c "while [[ -n \$(systemctl list-units --all --no-legend $MOUNT_UNIT) ]]; do sleep 1; done"
|
||||
|
||||
# Mount with both source and destination set
|
||||
systemd-mount "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$WORK_DIR/mnt"
|
||||
systemd-mount --list --full
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Same thing, but with explicitly specified filesystem and disabled filesystem check
|
||||
systemd-mount --type=ext4 --fsck=no --collect "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").mount"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemd-mount --umount "$LOOP"
|
||||
# Discover additional metadata (unit description should now contain filesystem label)
|
||||
systemd-mount --no-ask-password --discover "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Description "$WORK_DIR/mnt" | grep -q sd-mount-test
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Set a unit description
|
||||
systemd-mount --description="Very Important Unit" "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Description "$WORK_DIR/mnt" | grep -q "Very Important Unit"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Set a property
|
||||
systemd-mount --property="Description=Foo Bar" "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Description "$WORK_DIR/mnt" | grep -q "Foo Bar"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Set mount options
|
||||
systemd-mount --options=ro,x-foo-bar "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Options "$WORK_DIR/mnt" | grep -Eq "(^ro|,ro)"
|
||||
systemctl show -P Options "$WORK_DIR/mnt" | grep -q "x-foo-bar"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
|
||||
# Mount with only source set
|
||||
systemd-mount "$LOOP"
|
||||
systemctl status /run/media/system/sd-mount-test
|
||||
systemd-mount --list --full
|
||||
test -e /run/media/system/sd-mount-test/foo.bar
|
||||
systemd-umount LABEL=sd-mount-test
|
||||
|
||||
# Automount
|
||||
systemd-mount --automount=yes "$LOOP" "$WORK_DIR/mnt"
|
||||
systemd-mount --list --full
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").automount"
|
||||
[[ "$(systemctl show -P ActiveState "$WORK_DIR/mnt")" == inactive ]]
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl status "$WORK_DIR/mnt"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Automount + automount-specific property
|
||||
systemd-mount -A --automount-property="Description=Bar Baz" "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl show -P Description "$(systemd-escape --path "$WORK_DIR/mnt").automount" | grep -q "Bar Baz"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
# Call --umount via --machine=, first with a relative path (bad) and then with
|
||||
# an absolute one (good)
|
||||
(! systemd-umount --machine=.host "$(realpath --relative-to=. "$WORK_DIR/mnt")")
|
||||
systemd-umount --machine=.host "$WORK_DIR/mnt"
|
||||
|
||||
# ext4 doesn't support uid=/gid=
|
||||
(! systemd-mount -t ext4 --owner=testuser "$LOOP" "$WORK_DIR/mnt")
|
||||
|
||||
# Automount + --bind-device
|
||||
systemd-mount --automount=yes --bind-device --timeout-idle-sec=1 "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").automount"
|
||||
# Trigger the automount
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
# Wait until it's idle again
|
||||
sleep 1.5
|
||||
# Safety net for slower/overloaded systems
|
||||
timeout 10s bash -c "while systemctl is-active -q $WORK_DIR/mnt; do sleep .2; done"
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").automount"
|
||||
# Disassemble the underlying block device
|
||||
losetup -d "$LOOP"
|
||||
unset LOOP
|
||||
# The automount unit should disappear once the underlying blockdev is gone
|
||||
timeout 10s bash -c "while systemctl status '$(systemd-escape --path "$WORK_DIR/mnt".automount)'; do sleep .2; done"
|
||||
|
||||
# Mount a disk image
|
||||
systemd-mount --discover "$WORK_DIR/simple.img"
|
||||
# We can access files in the image even if the loopback block device is not initialized by udevd.
|
||||
test -e /run/media/system/simple.img/foo.bar
|
||||
# systemd-mount --list and systemd-umount require the loopback block device is initialized by udevd.
|
||||
udevadm settle --timeout 30
|
||||
assert_in "/dev/loop.* ext4 +sd-mount-test" "$(systemd-mount --list --full)"
|
||||
LOOP_AUTO=$(systemd-mount --list --full --no-legend | awk '$7 == "sd-mount-test" { print $1 }')
|
||||
LOOP_AUTO_DEVPATH=$(udevadm info --query property --property DEVPATH --value "$LOOP_AUTO")
|
||||
systemd-umount "$WORK_DIR/simple.img"
|
||||
# Wait for 'change' uevent for the device with DISK_MEDIA_CHANGE=1.
|
||||
# After the event, the backing_file attribute should be removed.
|
||||
timeout 60 bash -c "while [[ -e /sys/$LOOP_AUTO_DEVPATH/loop/backing_file ]]; do sleep 1; done"
|
||||
|
||||
# --owner + vfat
|
||||
#
|
||||
# Create a vfat image, as ext4 doesn't support uid=/gid= fixating for all
|
||||
# files/directories
|
||||
dd if=/dev/zero of="$WORK_DIR/owner-vfat.img" bs=1M count=16
|
||||
mkfs.vfat -n owner-vfat "$WORK_DIR/owner-vfat.img"
|
||||
LOOP="$(losetup --show --find "$WORK_DIR/owner-vfat.img")"
|
||||
# If the synthesized uevent triggered by inotify event has been processed earlier than the kernel finishes to
|
||||
# attach the backing file, then SYSTEMD_READY=0 is set for the device. As a workaround, monitor sysattr
|
||||
# and re-trigger uevent after that.
|
||||
LOOP_DEVPATH=$(udevadm info --query property --property DEVPATH --value "$LOOP")
|
||||
timeout 60 bash -c "until [[ -e /sys/$LOOP_DEVPATH/loop/backing_file ]]; do sleep 1; done"
|
||||
udevadm trigger --settle "$LOOP"
|
||||
# Also wait for the .device unit for the loop device is active. Otherwise, the .device unit activation
|
||||
# that is triggered by the .mount unit introduced by systemd-mount below may time out.
|
||||
if ! timeout 60 bash -c "until systemctl is-active $LOOP; do sleep 1; done"; then
|
||||
# For debugging issue like
|
||||
# https://github.com/systemd/systemd/issues/32680#issuecomment-2120959238
|
||||
# https://github.com/systemd/systemd/issues/32680#issuecomment-2122074805
|
||||
udevadm info "$LOOP"
|
||||
udevadm info --attribute-walk "$LOOP"
|
||||
cat /sys/"$(udevadm info --query property --property DEVPATH --value "$LOOP")"/loop/backing_file || :
|
||||
false
|
||||
fi
|
||||
# Mount it and check the UID/GID
|
||||
[[ "$(stat -c "%U:%G" "$WORK_DIR/mnt")" == "root:root" ]]
|
||||
systemd-mount --owner=testuser "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$WORK_DIR/mnt"
|
||||
[[ "$(stat -c "%U:%G" "$WORK_DIR/mnt")" == "testuser:testuser" ]]
|
||||
touch "$WORK_DIR/mnt/hello"
|
||||
[[ "$(stat -c "%U:%G" "$WORK_DIR/mnt/hello")" == "testuser:testuser" ]]
|
||||
systemd-umount LABEL=owner-vfat
|
||||
|
|
|
@ -3,11 +3,6 @@
|
|||
set -eux
|
||||
set -o pipefail
|
||||
|
||||
if systemd-detect-virt --quiet --container; then
|
||||
echo "running on container, skipping."
|
||||
exit 0
|
||||
fi
|
||||
|
||||
if ! command -v bootctl >/dev/null; then
|
||||
echo "bootctl not found, skipping."
|
||||
exit 0
|
||||
|
@ -24,6 +19,8 @@ fi
|
|||
# shellcheck source=test/units/test-control.sh
|
||||
. "$(dirname "$0")"/test-control.sh
|
||||
|
||||
(! systemd-detect-virt -cq)
|
||||
|
||||
basic_tests() {
|
||||
bootctl "$@" --help
|
||||
bootctl "$@" --version
|
|
@ -19,12 +19,9 @@ at_exit() {
|
|||
rm -fv -- "$CORE_TEST_BIN" "$CORE_TEST_UNPRIV_BIN" "$MAKE_DUMP_SCRIPT" "$MAKE_STACKTRACE_DUMP"
|
||||
}
|
||||
|
||||
trap at_exit EXIT
|
||||
(! systemd-detect-virt -cq)
|
||||
|
||||
if systemd-detect-virt -cq; then
|
||||
echo "Running in a container, skipping the systemd-coredump test..."
|
||||
exit 0
|
||||
fi
|
||||
trap at_exit EXIT
|
||||
|
||||
# To make all coredump entries stored in system.journal.
|
||||
journalctl --rotate
|
||||
|
@ -81,7 +78,7 @@ timeout 30 bash -c "while [[ \$(coredumpctl list -q --no-legend $CORE_TEST_BIN |
|
|||
|
||||
if cgroupfs_supports_user_xattrs; then
|
||||
# Make sure we can forward crashes back to containers
|
||||
CONTAINER="TEST-74-AUX-UTILS-container"
|
||||
CONTAINER="TEST-87-AUX-UTILS-VM-container"
|
||||
|
||||
mkdir -p "/var/lib/machines/$CONTAINER"
|
||||
mkdir -p "/run/systemd/system/systemd-nspawn@$CONTAINER.service.d"
|
|
@ -0,0 +1,11 @@
|
|||
#!/usr/bin/env bash
|
||||
# SPDX-License-Identifier: LGPL-2.1-or-later
|
||||
set -eux
|
||||
set -o pipefail
|
||||
|
||||
(! systemd-detect-virt -cq)
|
||||
|
||||
SYSTEMD_IN_CHROOT=1 systemd-detect-virt --chroot
|
||||
(! SYSTEMD_IN_CHROOT=0 systemd-detect-virt --chroot)
|
||||
|
||||
unshare --mount-proc --fork --user --pid systemd-detect-virt --container
|
|
@ -10,12 +10,9 @@ at_exit() {
|
|||
rm -rfv "${CONFIG_FILE:?}"
|
||||
}
|
||||
|
||||
trap at_exit EXIT
|
||||
(! systemd-detect-virt -cq)
|
||||
|
||||
if systemd-detect-virt -cq; then
|
||||
echo "Running in a container, skipping the systemd-modules-load test..."
|
||||
exit 0
|
||||
fi
|
||||
trap at_exit EXIT
|
||||
|
||||
ORIG_MODULES_LOAD_CONFIG="$(systemd-analyze cat-config modules-load.d)"
|
||||
|
|
@ -0,0 +1,182 @@
|
|||
#!/usr/bin/env bash
|
||||
# SPDX-License-Identifier: LGPL-2.1-or-later
|
||||
set -eux
|
||||
set -o pipefail
|
||||
|
||||
# shellcheck source=test/units/util.sh
|
||||
. "$(dirname "$0")"/util.sh
|
||||
|
||||
at_exit() {
|
||||
set +e
|
||||
|
||||
[[ -n "${LOOP:-}" ]] && losetup -d "$LOOP"
|
||||
[[ -n "${WORK_DIR:-}" ]] && rm -fr "$WORK_DIR"
|
||||
}
|
||||
|
||||
(! systemd-detect-virt -cq)
|
||||
|
||||
trap at_exit EXIT
|
||||
|
||||
WORK_DIR="$(mktemp -d)"
|
||||
mkdir -p "$WORK_DIR/mnt"
|
||||
|
||||
systemd-mount --list
|
||||
systemd-mount --list --full
|
||||
systemd-mount --list --no-legend
|
||||
systemd-mount --list --no-pager
|
||||
systemd-mount --list --quiet
|
||||
systemd-mount --list --json=pretty
|
||||
|
||||
# tmpfs
|
||||
mkdir -p "$WORK_DIR/mnt/foo/bar"
|
||||
systemd-mount --tmpfs "$WORK_DIR/mnt/foo"
|
||||
test ! -d "$WORK_DIR/mnt/foo/bar"
|
||||
touch "$WORK_DIR/mnt/foo/baz"
|
||||
systemd-umount "$WORK_DIR/mnt/foo"
|
||||
test -d "$WORK_DIR/mnt/foo/bar"
|
||||
test ! -e "$WORK_DIR/mnt/foo/baz"
|
||||
|
||||
# overlay
|
||||
systemd-mount --type=overlay --options="lowerdir=/etc,upperdir=$WORK_DIR/upper,workdir=$WORK_DIR/work" /etc "$WORK_DIR/overlay"
|
||||
touch "$WORK_DIR/overlay/foo"
|
||||
test -e "$WORK_DIR/upper/foo"
|
||||
systemd-umount "$WORK_DIR/overlay"
|
||||
|
||||
# Set up a simple block device for further tests
|
||||
dd if=/dev/zero of="$WORK_DIR/simple.img" bs=1M count=16
|
||||
mkfs.ext4 -L sd-mount-test "$WORK_DIR/simple.img"
|
||||
LOOP="$(losetup --show --find "$WORK_DIR/simple.img")"
|
||||
udevadm wait --timeout 60 --settle "$LOOP"
|
||||
# Also wait for the .device unit for the loop device is active. Otherwise, the .device unit activation
|
||||
# that is triggered by the .mount unit introduced by systemd-mount below may time out.
|
||||
timeout 60 bash -c "until systemctl is-active $LOOP; do sleep 1; done"
|
||||
mount "$LOOP" "$WORK_DIR/mnt"
|
||||
touch "$WORK_DIR/mnt/foo.bar"
|
||||
umount "$LOOP"
|
||||
(! mountpoint "$WORK_DIR/mnt")
|
||||
# Wait for the mount unit to be unloaded. Otherwise, creation of the transient unit below may fail.
|
||||
MOUNT_UNIT=$(systemd-escape --path --suffix=mount "$WORK_DIR/mnt")
|
||||
timeout 60 bash -c "while [[ -n \$(systemctl list-units --all --no-legend $MOUNT_UNIT) ]]; do sleep 1; done"
|
||||
|
||||
# Mount with both source and destination set
|
||||
systemd-mount "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$WORK_DIR/mnt"
|
||||
systemd-mount --list --full
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Same thing, but with explicitly specified filesystem and disabled filesystem check
|
||||
systemd-mount --type=ext4 --fsck=no --collect "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").mount"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemd-mount --umount "$LOOP"
|
||||
# Discover additional metadata (unit description should now contain filesystem label)
|
||||
systemd-mount --no-ask-password --discover "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Description "$WORK_DIR/mnt" | grep -q sd-mount-test
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Set a unit description
|
||||
systemd-mount --description="Very Important Unit" "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Description "$WORK_DIR/mnt" | grep -q "Very Important Unit"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Set a property
|
||||
systemd-mount --property="Description=Foo Bar" "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Description "$WORK_DIR/mnt" | grep -q "Foo Bar"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Set mount options
|
||||
systemd-mount --options=ro,x-foo-bar "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Options "$WORK_DIR/mnt" | grep -Eq "(^ro|,ro)"
|
||||
systemctl show -P Options "$WORK_DIR/mnt" | grep -q "x-foo-bar"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
|
||||
# Mount with only source set
|
||||
systemd-mount "$LOOP"
|
||||
systemctl status /run/media/system/sd-mount-test
|
||||
systemd-mount --list --full
|
||||
test -e /run/media/system/sd-mount-test/foo.bar
|
||||
systemd-umount LABEL=sd-mount-test
|
||||
|
||||
# Automount
|
||||
systemd-mount --automount=yes "$LOOP" "$WORK_DIR/mnt"
|
||||
systemd-mount --list --full
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").automount"
|
||||
[[ "$(systemctl show -P ActiveState "$WORK_DIR/mnt")" == inactive ]]
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl status "$WORK_DIR/mnt"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Automount + automount-specific property
|
||||
systemd-mount -A --automount-property="Description=Bar Baz" "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl show -P Description "$(systemd-escape --path "$WORK_DIR/mnt").automount" | grep -q "Bar Baz"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
# Call --umount via --machine=, first with a relative path (bad) and then with
|
||||
# an absolute one (good)
|
||||
(! systemd-umount --machine=.host "$(realpath --relative-to=. "$WORK_DIR/mnt")")
|
||||
systemd-umount --machine=.host "$WORK_DIR/mnt"
|
||||
|
||||
# ext4 doesn't support uid=/gid=
|
||||
(! systemd-mount -t ext4 --owner=testuser "$LOOP" "$WORK_DIR/mnt")
|
||||
|
||||
# Automount + --bind-device
|
||||
systemd-mount --automount=yes --bind-device --timeout-idle-sec=1 "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").automount"
|
||||
# Trigger the automount
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
# Wait until it's idle again
|
||||
sleep 1.5
|
||||
# Safety net for slower/overloaded systems
|
||||
timeout 10s bash -c "while systemctl is-active -q $WORK_DIR/mnt; do sleep .2; done"
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").automount"
|
||||
# Disassemble the underlying block device
|
||||
losetup -d "$LOOP"
|
||||
unset LOOP
|
||||
# The automount unit should disappear once the underlying blockdev is gone
|
||||
timeout 10s bash -c "while systemctl status '$(systemd-escape --path "$WORK_DIR/mnt".automount)'; do sleep .2; done"
|
||||
|
||||
# Mount a disk image
|
||||
systemd-mount --discover "$WORK_DIR/simple.img"
|
||||
# We can access files in the image even if the loopback block device is not initialized by udevd.
|
||||
test -e /run/media/system/simple.img/foo.bar
|
||||
# systemd-mount --list and systemd-umount require the loopback block device is initialized by udevd.
|
||||
udevadm settle --timeout 30
|
||||
assert_in "/dev/loop.* ext4 +sd-mount-test" "$(systemd-mount --list --full)"
|
||||
LOOP_AUTO=$(systemd-mount --list --full --no-legend | awk '$7 == "sd-mount-test" { print $1 }')
|
||||
LOOP_AUTO_DEVPATH=$(udevadm info --query property --property DEVPATH --value "$LOOP_AUTO")
|
||||
systemd-umount "$WORK_DIR/simple.img"
|
||||
# Wait for 'change' uevent for the device with DISK_MEDIA_CHANGE=1.
|
||||
# After the event, the backing_file attribute should be removed.
|
||||
timeout 60 bash -c "while [[ -e /sys/$LOOP_AUTO_DEVPATH/loop/backing_file ]]; do sleep 1; done"
|
||||
|
||||
# --owner + vfat
|
||||
#
|
||||
# Create a vfat image, as ext4 doesn't support uid=/gid= fixating for all
|
||||
# files/directories
|
||||
dd if=/dev/zero of="$WORK_DIR/owner-vfat.img" bs=1M count=16
|
||||
mkfs.vfat -n owner-vfat "$WORK_DIR/owner-vfat.img"
|
||||
LOOP="$(losetup --show --find "$WORK_DIR/owner-vfat.img")"
|
||||
# If the synthesized uevent triggered by inotify event has been processed earlier than the kernel finishes to
|
||||
# attach the backing file, then SYSTEMD_READY=0 is set for the device. As a workaround, monitor sysattr
|
||||
# and re-trigger uevent after that.
|
||||
LOOP_DEVPATH=$(udevadm info --query property --property DEVPATH --value "$LOOP")
|
||||
timeout 60 bash -c "until [[ -e /sys/$LOOP_DEVPATH/loop/backing_file ]]; do sleep 1; done"
|
||||
udevadm trigger --settle "$LOOP"
|
||||
# Also wait for the .device unit for the loop device is active. Otherwise, the .device unit activation
|
||||
# that is triggered by the .mount unit introduced by systemd-mount below may time out.
|
||||
if ! timeout 60 bash -c "until systemctl is-active $LOOP; do sleep 1; done"; then
|
||||
# For debugging issue like
|
||||
# https://github.com/systemd/systemd/issues/32680#issuecomment-2120959238
|
||||
# https://github.com/systemd/systemd/issues/32680#issuecomment-2122074805
|
||||
udevadm info "$LOOP"
|
||||
udevadm info --attribute-walk "$LOOP"
|
||||
cat /sys/"$(udevadm info --query property --property DEVPATH --value "$LOOP")"/loop/backing_file || :
|
||||
false
|
||||
fi
|
||||
# Mount it and check the UID/GID
|
||||
[[ "$(stat -c "%U:%G" "$WORK_DIR/mnt")" == "root:root" ]]
|
||||
systemd-mount --owner=testuser "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$WORK_DIR/mnt"
|
||||
[[ "$(stat -c "%U:%G" "$WORK_DIR/mnt")" == "testuser:testuser" ]]
|
||||
touch "$WORK_DIR/mnt/hello"
|
||||
[[ "$(stat -c "%U:%G" "$WORK_DIR/mnt/hello")" == "testuser:testuser" ]]
|
||||
systemd-umount LABEL=owner-vfat
|
|
@ -5,10 +5,7 @@ set -o pipefail
|
|||
|
||||
systemctl log-level info
|
||||
|
||||
if systemd-detect-virt -cq; then
|
||||
echo "Running in a container, skipping the systemd-pstore test..."
|
||||
exit 0
|
||||
fi
|
||||
(! systemd-detect-virt -cq)
|
||||
|
||||
DUMMY_DMESG_0="$(mktemp)"
|
||||
cat >"$DUMMY_DMESG_0" <<\EOF
|
|
@ -0,0 +1,11 @@
|
|||
#!/usr/bin/env bash
|
||||
# SPDX-License-Identifier: LGPL-2.1-or-later
|
||||
set -eux
|
||||
set -o pipefail
|
||||
|
||||
# shellcheck source=test/units/test-control.sh
|
||||
. "$(dirname "$0")"/test-control.sh
|
||||
|
||||
run_subtests
|
||||
|
||||
touch /testok
|
Loading…
Reference in New Issue