Compare commits
11 Commits
d1e51dfac2
...
cfec6ec663
Author | SHA1 | Date |
---|---|---|
Luca Boccassi | cfec6ec663 | |
Christian Hesse | c946b13575 | |
Lennart Poettering | e39cbb1442 | |
Marco Tomaschett | bc4a027f9c | |
Lennart Poettering | d209e197f8 | |
Antonio Alvarez Feijoo | 9ed090230e | |
Lennart Poettering | 47c5ca237b | |
Lennart Poettering | 7f8a4f12df | |
Lennart Poettering | e412fc5e04 | |
Luca Boccassi | 2b3ebe1e6a | |
Luca Boccassi | c6cb6aee4d |
|
@ -953,6 +953,15 @@ sensor:modalias:acpi:MXC6655*:dmi:*:svnDefaultstring*:pnP612F:*
|
|||
sensor:modalias:acpi:SMO8500*:dmi:*:svnPEAQ:pnPEAQPMMC1010MD99187:*
|
||||
ACCEL_MOUNT_MATRIX=-1, 0, 0; 0, 1, 0; 0, 0, 1
|
||||
|
||||
#########################################
|
||||
# Pine64
|
||||
#########################################
|
||||
|
||||
# PineTab2
|
||||
|
||||
sensor:modalias:of:NaccelerometerT_null_Csilan,sc7a20:*
|
||||
ACCEL_MOUNT_MATRIX=0, 0, -1; 1, 0, 0; 0, -1, 0
|
||||
|
||||
#########################################
|
||||
# Pipo
|
||||
#########################################
|
||||
|
|
|
@ -24,6 +24,10 @@
|
|||
#include "uid-range.h"
|
||||
#include "virt.h"
|
||||
|
||||
/* Root namespace inode number, as per include/linux/proc_ns.h in the kernel source tree, since v3.8:
|
||||
* https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=98f842e675f96ffac96e6c50315790912b2812be */
|
||||
#define PROC_PID_INIT_INO UINT64_C(0xEFFFFFFC)
|
||||
|
||||
enum {
|
||||
SMBIOS_VM_BIT_SET,
|
||||
SMBIOS_VM_BIT_UNSET,
|
||||
|
@ -645,6 +649,20 @@ static int running_in_cgroupns(void) {
|
|||
}
|
||||
}
|
||||
|
||||
static int running_in_pidns(void) {
|
||||
_cleanup_close_ int pidns_fd = -EBADF;
|
||||
struct stat st;
|
||||
|
||||
pidns_fd = namespace_open_by_type(NAMESPACE_PID);
|
||||
if (pidns_fd < 0)
|
||||
return log_debug_errno(pidns_fd, "Failed to open PID namespace, ignoring: %m");
|
||||
|
||||
if (fstat(pidns_fd, &st) < 0)
|
||||
return log_debug_errno(errno, "Failed to fstat pid namespace fd, ignoring: %m");
|
||||
|
||||
return (uint64_t) st.st_ino != PROC_PID_INIT_INO;
|
||||
}
|
||||
|
||||
static Virtualization detect_container_files(void) {
|
||||
static const struct {
|
||||
const char *file_path;
|
||||
|
@ -790,12 +808,21 @@ check_files:
|
|||
|
||||
r = running_in_cgroupns();
|
||||
if (r > 0) {
|
||||
log_debug("Running in a cgroup namespace, assuming unknown container manager.");
|
||||
v = VIRTUALIZATION_CONTAINER_OTHER;
|
||||
goto finish;
|
||||
}
|
||||
if (r < 0)
|
||||
log_debug_errno(r, "Failed to detect cgroup namespace: %m");
|
||||
|
||||
/* Finally, the root pid namespace has an hardcoded inode number of 0xEFFFFFFC since kernel 3.8, so
|
||||
* if all else fails we can check the inode number of our pid namespace and compare it. */
|
||||
if (running_in_pidns() > 0) {
|
||||
log_debug("Running in a pid namespace, assuming unknown container manager.");
|
||||
v = VIRTUALIZATION_CONTAINER_OTHER;
|
||||
goto finish;
|
||||
}
|
||||
|
||||
/* If none of that worked, give up, assume no container manager. */
|
||||
v = VIRTUALIZATION_NONE;
|
||||
goto finish;
|
||||
|
|
|
@ -16,7 +16,7 @@ int varlink_get_peer_pidref(sd_varlink *v, PidRef *ret) {
|
|||
|
||||
int pidfd = sd_varlink_get_peer_pidfd(v);
|
||||
if (pidfd < 0) {
|
||||
if (!ERRNO_IS_NEG_NOT_SUPPORTED(pidfd))
|
||||
if (!ERRNO_IS_NEG_NOT_SUPPORTED(pidfd) && pidfd != -EINVAL)
|
||||
return pidfd;
|
||||
|
||||
pid_t pid;
|
||||
|
|
|
@ -392,7 +392,7 @@ int tpm2_make_pcr_json_array(uint32_t pcr_mask, sd_json_variant **ret);
|
|||
int tpm2_parse_pcr_json_array(sd_json_variant *v, uint32_t *ret);
|
||||
|
||||
int tpm2_make_luks2_json(int keyslot, uint32_t hash_pcr_mask, uint16_t pcr_bank, const struct iovec *pubkey, uint32_t pubkey_pcr_mask, uint16_t primary_alg, const struct iovec blobs[], size_t n_blobs, const struct iovec policy_hash[], size_t n_policy_hash, const struct iovec *salt, const struct iovec *srk, const struct iovec *pcrlock_nv, TPM2Flags flags, sd_json_variant **ret);
|
||||
int tpm2_parse_luks2_json(sd_json_variant *v, int *ret_keyslot, uint32_t *ret_hash_pcr_mask, uint16_t *ret_pcr_bank, struct iovec *ret_pubkey, uint32_t *ret_pubkey_pcr_mask, uint16_t *ret_primary_alg, struct iovec **ret_blobs, size_t *ret_n_blobs, struct iovec **ret_policy_hash, size_t *ret_n_policy_hash, struct iovec *ret_salt, struct iovec *ret_srk, struct iovec *pcrlock_nv, TPM2Flags *ret_flags);
|
||||
int tpm2_parse_luks2_json(sd_json_variant *v, int *ret_keyslot, uint32_t *ret_hash_pcr_mask, uint16_t *ret_pcr_bank, struct iovec *ret_pubkey, uint32_t *ret_pubkey_pcr_mask, uint16_t *ret_primary_alg, struct iovec **ret_blobs, size_t *ret_n_blobs, struct iovec **ret_policy_hash, size_t *ret_n_policy_hash, struct iovec *ret_salt, struct iovec *ret_srk, struct iovec *ret_pcrlock_nv, TPM2Flags *ret_flags);
|
||||
|
||||
/* Default to PCR 7 only */
|
||||
#define TPM2_PCR_INDEX_DEFAULT UINT32_C(7)
|
||||
|
|
|
@ -23,6 +23,7 @@
|
|||
#include "user-util.h"
|
||||
#include "userdb.h"
|
||||
#include "verbs.h"
|
||||
#include "virt.h"
|
||||
|
||||
static enum {
|
||||
OUTPUT_CLASSIC,
|
||||
|
@ -139,10 +140,16 @@ static int show_user(UserRecord *ur, Table *table) {
|
|||
return 0;
|
||||
}
|
||||
|
||||
static bool test_show_mapped(void) {
|
||||
/* Show mapped user range only in environments where user mapping is a thing. */
|
||||
return running_in_userns() > 0;
|
||||
}
|
||||
|
||||
static const struct {
|
||||
uid_t first, last;
|
||||
const char *name;
|
||||
UserDisposition disposition;
|
||||
bool (*test)(void);
|
||||
} uid_range_table[] = {
|
||||
{
|
||||
.first = 1,
|
||||
|
@ -175,11 +182,12 @@ static const struct {
|
|||
.last = MAP_UID_MAX,
|
||||
.name = "mapped",
|
||||
.disposition = USER_REGULAR,
|
||||
.test = test_show_mapped,
|
||||
},
|
||||
};
|
||||
|
||||
static int table_add_uid_boundaries(Table *table, const UIDRange *p) {
|
||||
int r;
|
||||
int r, n_added = 0;
|
||||
|
||||
assert(table);
|
||||
|
||||
|
@ -192,6 +200,9 @@ static int table_add_uid_boundaries(Table *table, const UIDRange *p) {
|
|||
if (!uid_range_covers(p, i->first, i->last - i->first + 1))
|
||||
continue;
|
||||
|
||||
if (i->test && !i->test())
|
||||
continue;
|
||||
|
||||
name = strjoin(special_glyph(SPECIAL_GLYPH_ARROW_DOWN),
|
||||
" begin ", i->name, " users ",
|
||||
special_glyph(SPECIAL_GLYPH_ARROW_DOWN));
|
||||
|
@ -249,9 +260,11 @@ static int table_add_uid_boundaries(Table *table, const UIDRange *p) {
|
|||
TABLE_INT, 1); /* sort after any other entry with the same UID */
|
||||
if (r < 0)
|
||||
return table_log_add_error(r);
|
||||
|
||||
n_added += 2;
|
||||
}
|
||||
|
||||
return ELEMENTSOF(uid_range_table) * 2;
|
||||
return n_added;
|
||||
}
|
||||
|
||||
static int add_unavailable_uid(Table *table, uid_t start, uid_t end) {
|
||||
|
@ -565,16 +578,22 @@ static int show_group(GroupRecord *gr, Table *table) {
|
|||
}
|
||||
|
||||
static int table_add_gid_boundaries(Table *table, const UIDRange *p) {
|
||||
int r;
|
||||
int r, n_added = 0;
|
||||
|
||||
assert(table);
|
||||
|
||||
FOREACH_ELEMENT(i, uid_range_table) {
|
||||
_cleanup_free_ char *name = NULL, *comment = NULL;
|
||||
|
||||
if (!FLAGS_SET(arg_disposition_mask, UINT64_C(1) << i->disposition))
|
||||
continue;
|
||||
|
||||
if (!uid_range_covers(p, i->first, i->last - i->first + 1))
|
||||
continue;
|
||||
|
||||
if (i->test && !i->test())
|
||||
continue;
|
||||
|
||||
name = strjoin(special_glyph(SPECIAL_GLYPH_ARROW_DOWN),
|
||||
" begin ", i->name, " groups ",
|
||||
special_glyph(SPECIAL_GLYPH_ARROW_DOWN));
|
||||
|
@ -626,9 +645,11 @@ static int table_add_gid_boundaries(Table *table, const UIDRange *p) {
|
|||
TABLE_INT, 1); /* sort after any other entry with the same GID */
|
||||
if (r < 0)
|
||||
return table_log_add_error(r);
|
||||
|
||||
n_added += 2;
|
||||
}
|
||||
|
||||
return ELEMENTSOF(uid_range_table) * 2;
|
||||
return n_added;
|
||||
}
|
||||
|
||||
static int add_unavailable_gid(Table *table, uid_t start, uid_t end) {
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
# SPDX-License-Identifier: LGPL-2.1-or-later
|
||||
# Container-specific auxiliary tests. VM-based ones go in TEST-87-AUX-UTILS-VM.
|
||||
|
||||
integration_tests += [
|
||||
integration_test_template + {
|
||||
'name' : fs.name(meson.current_source_dir()),
|
||||
'storage': 'persistent',
|
||||
'vm' : true,
|
||||
},
|
||||
]
|
||||
|
||||
|
|
|
@ -0,0 +1 @@
|
|||
../TEST-01-BASIC/Makefile
|
|
@ -0,0 +1,10 @@
|
|||
# SPDX-License-Identifier: LGPL-2.1-or-later
|
||||
# VM-specific auxiliary tests. Container-based ones go in TEST-74-AUX-UTILS.
|
||||
|
||||
integration_tests += [
|
||||
integration_test_template + {
|
||||
'name' : fs.name(meson.current_source_dir()),
|
||||
'storage': 'persistent',
|
||||
'vm' : true,
|
||||
},
|
||||
]
|
|
@ -0,0 +1,44 @@
|
|||
#!/usr/bin/env bash
|
||||
# SPDX-License-Identifier: LGPL-2.1-or-later
|
||||
set -e
|
||||
|
||||
TEST_DESCRIPTION="Tests for auxiliary utilities (VM)"
|
||||
TEST_NO_NSPAWN=1
|
||||
|
||||
# shellcheck source=test/test-functions
|
||||
. "${TEST_BASE_DIR:?}/test-functions"
|
||||
|
||||
# Make sure vsock is available in the VM
|
||||
CID=$((RANDOM + 3))
|
||||
QEMU_OPTIONS+=" -device vhost-vsock-pci,guest-cid=$CID"
|
||||
|
||||
test_append_files() {
|
||||
local workspace="${1:?}"
|
||||
|
||||
if ! get_bool "${TEST_PREFER_NSPAWN:-}" && ! get_bool "${TEST_NO_QEMU:-}"; then
|
||||
# Check if we can correctly boot with an invalid machine ID only if we run
|
||||
# the QEMU test, as nspawn refuses the invalid machine ID with -EUCLEAN
|
||||
printf "556f48e837bc4424a710fa2e2c9d3e3c\ne3d\n" >"$workspace/etc/machine-id"
|
||||
fi
|
||||
|
||||
if host_has_btrfs && host_has_mdadm; then
|
||||
install_btrfs
|
||||
install_mdadm
|
||||
generate_module_dependencies
|
||||
fi
|
||||
|
||||
inst_binary socat
|
||||
inst_binary ssh
|
||||
inst_binary sshd
|
||||
inst_binary ssh-keygen
|
||||
image_install -o /usr/lib/ssh/sshd-session /usr/libexec/openssh/sshd-session
|
||||
inst_binary usermod
|
||||
instmods vmw_vsock_virtio_transport
|
||||
instmods vsock_loopback
|
||||
instmods vmw_vsock_vmci_transport
|
||||
inst_binary gcc
|
||||
generate_module_dependencies
|
||||
inst_binary openssl
|
||||
}
|
||||
|
||||
do_test "$@"
|
|
@ -379,6 +379,7 @@ foreach dirname : [
|
|||
'TEST-84-STORAGETM',
|
||||
'TEST-85-NETWORK',
|
||||
'TEST-86-MULTI-PROFILE-UKI',
|
||||
'TEST-87-AUX-UTILS-VM',
|
||||
]
|
||||
subdir(dirname)
|
||||
endforeach
|
||||
|
|
|
@ -39,149 +39,3 @@ systemd-mount --type=overlay --options="lowerdir=/etc,upperdir=$WORK_DIR/upper,w
|
|||
touch "$WORK_DIR/overlay/foo"
|
||||
test -e "$WORK_DIR/upper/foo"
|
||||
systemd-umount "$WORK_DIR/overlay"
|
||||
|
||||
# We're going to play around with block/loop devices, so bail out early
|
||||
# if we're running in nspawn
|
||||
if systemd-detect-virt --container >/dev/null; then
|
||||
echo "Container detected, skipping the test"
|
||||
exit 0
|
||||
fi
|
||||
|
||||
# Set up a simple block device for further tests
|
||||
dd if=/dev/zero of="$WORK_DIR/simple.img" bs=1M count=16
|
||||
mkfs.ext4 -L sd-mount-test "$WORK_DIR/simple.img"
|
||||
LOOP="$(losetup --show --find "$WORK_DIR/simple.img")"
|
||||
udevadm wait --timeout 60 --settle "$LOOP"
|
||||
# Also wait for the .device unit for the loop device is active. Otherwise, the .device unit activation
|
||||
# that is triggered by the .mount unit introduced by systemd-mount below may time out.
|
||||
timeout 60 bash -c "until systemctl is-active $LOOP; do sleep 1; done"
|
||||
mount "$LOOP" "$WORK_DIR/mnt"
|
||||
touch "$WORK_DIR/mnt/foo.bar"
|
||||
umount "$LOOP"
|
||||
(! mountpoint "$WORK_DIR/mnt")
|
||||
# Wait for the mount unit to be unloaded. Otherwise, creation of the transient unit below may fail.
|
||||
MOUNT_UNIT=$(systemd-escape --path --suffix=mount "$WORK_DIR/mnt")
|
||||
timeout 60 bash -c "while [[ -n \$(systemctl list-units --all --no-legend $MOUNT_UNIT) ]]; do sleep 1; done"
|
||||
|
||||
# Mount with both source and destination set
|
||||
systemd-mount "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$WORK_DIR/mnt"
|
||||
systemd-mount --list --full
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Same thing, but with explicitly specified filesystem and disabled filesystem check
|
||||
systemd-mount --type=ext4 --fsck=no --collect "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").mount"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemd-mount --umount "$LOOP"
|
||||
# Discover additional metadata (unit description should now contain filesystem label)
|
||||
systemd-mount --no-ask-password --discover "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Description "$WORK_DIR/mnt" | grep -q sd-mount-test
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Set a unit description
|
||||
systemd-mount --description="Very Important Unit" "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Description "$WORK_DIR/mnt" | grep -q "Very Important Unit"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Set a property
|
||||
systemd-mount --property="Description=Foo Bar" "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Description "$WORK_DIR/mnt" | grep -q "Foo Bar"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Set mount options
|
||||
systemd-mount --options=ro,x-foo-bar "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Options "$WORK_DIR/mnt" | grep -Eq "(^ro|,ro)"
|
||||
systemctl show -P Options "$WORK_DIR/mnt" | grep -q "x-foo-bar"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
|
||||
# Mount with only source set
|
||||
systemd-mount "$LOOP"
|
||||
systemctl status /run/media/system/sd-mount-test
|
||||
systemd-mount --list --full
|
||||
test -e /run/media/system/sd-mount-test/foo.bar
|
||||
systemd-umount LABEL=sd-mount-test
|
||||
|
||||
# Automount
|
||||
systemd-mount --automount=yes "$LOOP" "$WORK_DIR/mnt"
|
||||
systemd-mount --list --full
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").automount"
|
||||
[[ "$(systemctl show -P ActiveState "$WORK_DIR/mnt")" == inactive ]]
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl status "$WORK_DIR/mnt"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Automount + automount-specific property
|
||||
systemd-mount -A --automount-property="Description=Bar Baz" "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl show -P Description "$(systemd-escape --path "$WORK_DIR/mnt").automount" | grep -q "Bar Baz"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
# Call --umount via --machine=, first with a relative path (bad) and then with
|
||||
# an absolute one (good)
|
||||
(! systemd-umount --machine=.host "$(realpath --relative-to=. "$WORK_DIR/mnt")")
|
||||
systemd-umount --machine=.host "$WORK_DIR/mnt"
|
||||
|
||||
# ext4 doesn't support uid=/gid=
|
||||
(! systemd-mount -t ext4 --owner=testuser "$LOOP" "$WORK_DIR/mnt")
|
||||
|
||||
# Automount + --bind-device
|
||||
systemd-mount --automount=yes --bind-device --timeout-idle-sec=1 "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").automount"
|
||||
# Trigger the automount
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
# Wait until it's idle again
|
||||
sleep 1.5
|
||||
# Safety net for slower/overloaded systems
|
||||
timeout 10s bash -c "while systemctl is-active -q $WORK_DIR/mnt; do sleep .2; done"
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").automount"
|
||||
# Disassemble the underlying block device
|
||||
losetup -d "$LOOP"
|
||||
unset LOOP
|
||||
# The automount unit should disappear once the underlying blockdev is gone
|
||||
timeout 10s bash -c "while systemctl status '$(systemd-escape --path "$WORK_DIR/mnt".automount)'; do sleep .2; done"
|
||||
|
||||
# Mount a disk image
|
||||
systemd-mount --discover "$WORK_DIR/simple.img"
|
||||
# We can access files in the image even if the loopback block device is not initialized by udevd.
|
||||
test -e /run/media/system/simple.img/foo.bar
|
||||
# systemd-mount --list and systemd-umount require the loopback block device is initialized by udevd.
|
||||
udevadm settle --timeout 30
|
||||
assert_in "/dev/loop.* ext4 +sd-mount-test" "$(systemd-mount --list --full)"
|
||||
LOOP_AUTO=$(systemd-mount --list --full --no-legend | awk '$7 == "sd-mount-test" { print $1 }')
|
||||
LOOP_AUTO_DEVPATH=$(udevadm info --query property --property DEVPATH --value "$LOOP_AUTO")
|
||||
systemd-umount "$WORK_DIR/simple.img"
|
||||
# Wait for 'change' uevent for the device with DISK_MEDIA_CHANGE=1.
|
||||
# After the event, the backing_file attribute should be removed.
|
||||
timeout 60 bash -c "while [[ -e /sys/$LOOP_AUTO_DEVPATH/loop/backing_file ]]; do sleep 1; done"
|
||||
|
||||
# --owner + vfat
|
||||
#
|
||||
# Create a vfat image, as ext4 doesn't support uid=/gid= fixating for all
|
||||
# files/directories
|
||||
dd if=/dev/zero of="$WORK_DIR/owner-vfat.img" bs=1M count=16
|
||||
mkfs.vfat -n owner-vfat "$WORK_DIR/owner-vfat.img"
|
||||
LOOP="$(losetup --show --find "$WORK_DIR/owner-vfat.img")"
|
||||
# If the synthesized uevent triggered by inotify event has been processed earlier than the kernel finishes to
|
||||
# attach the backing file, then SYSTEMD_READY=0 is set for the device. As a workaround, monitor sysattr
|
||||
# and re-trigger uevent after that.
|
||||
LOOP_DEVPATH=$(udevadm info --query property --property DEVPATH --value "$LOOP")
|
||||
timeout 60 bash -c "until [[ -e /sys/$LOOP_DEVPATH/loop/backing_file ]]; do sleep 1; done"
|
||||
udevadm trigger --settle "$LOOP"
|
||||
# Also wait for the .device unit for the loop device is active. Otherwise, the .device unit activation
|
||||
# that is triggered by the .mount unit introduced by systemd-mount below may time out.
|
||||
if ! timeout 60 bash -c "until systemctl is-active $LOOP; do sleep 1; done"; then
|
||||
# For debugging issue like
|
||||
# https://github.com/systemd/systemd/issues/32680#issuecomment-2120959238
|
||||
# https://github.com/systemd/systemd/issues/32680#issuecomment-2122074805
|
||||
udevadm info "$LOOP"
|
||||
udevadm info --attribute-walk "$LOOP"
|
||||
cat /sys/"$(udevadm info --query property --property DEVPATH --value "$LOOP")"/loop/backing_file || :
|
||||
false
|
||||
fi
|
||||
# Mount it and check the UID/GID
|
||||
[[ "$(stat -c "%U:%G" "$WORK_DIR/mnt")" == "root:root" ]]
|
||||
systemd-mount --owner=testuser "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$WORK_DIR/mnt"
|
||||
[[ "$(stat -c "%U:%G" "$WORK_DIR/mnt")" == "testuser:testuser" ]]
|
||||
touch "$WORK_DIR/mnt/hello"
|
||||
[[ "$(stat -c "%U:%G" "$WORK_DIR/mnt/hello")" == "testuser:testuser" ]]
|
||||
systemd-umount LABEL=owner-vfat
|
||||
|
|
|
@ -3,11 +3,6 @@
|
|||
set -eux
|
||||
set -o pipefail
|
||||
|
||||
if systemd-detect-virt --quiet --container; then
|
||||
echo "running on container, skipping."
|
||||
exit 0
|
||||
fi
|
||||
|
||||
if ! command -v bootctl >/dev/null; then
|
||||
echo "bootctl not found, skipping."
|
||||
exit 0
|
||||
|
@ -24,6 +19,8 @@ fi
|
|||
# shellcheck source=test/units/test-control.sh
|
||||
. "$(dirname "$0")"/test-control.sh
|
||||
|
||||
(! systemd-detect-virt -cq)
|
||||
|
||||
basic_tests() {
|
||||
bootctl "$@" --help
|
||||
bootctl "$@" --version
|
|
@ -19,12 +19,9 @@ at_exit() {
|
|||
rm -fv -- "$CORE_TEST_BIN" "$CORE_TEST_UNPRIV_BIN" "$MAKE_DUMP_SCRIPT" "$MAKE_STACKTRACE_DUMP"
|
||||
}
|
||||
|
||||
trap at_exit EXIT
|
||||
(! systemd-detect-virt -cq)
|
||||
|
||||
if systemd-detect-virt -cq; then
|
||||
echo "Running in a container, skipping the systemd-coredump test..."
|
||||
exit 0
|
||||
fi
|
||||
trap at_exit EXIT
|
||||
|
||||
# To make all coredump entries stored in system.journal.
|
||||
journalctl --rotate
|
||||
|
@ -81,7 +78,7 @@ timeout 30 bash -c "while [[ \$(coredumpctl list -q --no-legend $CORE_TEST_BIN |
|
|||
|
||||
if cgroupfs_supports_user_xattrs; then
|
||||
# Make sure we can forward crashes back to containers
|
||||
CONTAINER="TEST-74-AUX-UTILS-container"
|
||||
CONTAINER="TEST-87-AUX-UTILS-VM-container"
|
||||
|
||||
mkdir -p "/var/lib/machines/$CONTAINER"
|
||||
mkdir -p "/run/systemd/system/systemd-nspawn@$CONTAINER.service.d"
|
|
@ -0,0 +1,11 @@
|
|||
#!/usr/bin/env bash
|
||||
# SPDX-License-Identifier: LGPL-2.1-or-later
|
||||
set -eux
|
||||
set -o pipefail
|
||||
|
||||
(! systemd-detect-virt -cq)
|
||||
|
||||
SYSTEMD_IN_CHROOT=1 systemd-detect-virt --chroot
|
||||
(! SYSTEMD_IN_CHROOT=0 systemd-detect-virt --chroot)
|
||||
|
||||
unshare --mount-proc --fork --user --pid systemd-detect-virt --container
|
|
@ -10,12 +10,9 @@ at_exit() {
|
|||
rm -rfv "${CONFIG_FILE:?}"
|
||||
}
|
||||
|
||||
trap at_exit EXIT
|
||||
(! systemd-detect-virt -cq)
|
||||
|
||||
if systemd-detect-virt -cq; then
|
||||
echo "Running in a container, skipping the systemd-modules-load test..."
|
||||
exit 0
|
||||
fi
|
||||
trap at_exit EXIT
|
||||
|
||||
ORIG_MODULES_LOAD_CONFIG="$(systemd-analyze cat-config modules-load.d)"
|
||||
|
|
@ -0,0 +1,182 @@
|
|||
#!/usr/bin/env bash
|
||||
# SPDX-License-Identifier: LGPL-2.1-or-later
|
||||
set -eux
|
||||
set -o pipefail
|
||||
|
||||
# shellcheck source=test/units/util.sh
|
||||
. "$(dirname "$0")"/util.sh
|
||||
|
||||
at_exit() {
|
||||
set +e
|
||||
|
||||
[[ -n "${LOOP:-}" ]] && losetup -d "$LOOP"
|
||||
[[ -n "${WORK_DIR:-}" ]] && rm -fr "$WORK_DIR"
|
||||
}
|
||||
|
||||
(! systemd-detect-virt -cq)
|
||||
|
||||
trap at_exit EXIT
|
||||
|
||||
WORK_DIR="$(mktemp -d)"
|
||||
mkdir -p "$WORK_DIR/mnt"
|
||||
|
||||
systemd-mount --list
|
||||
systemd-mount --list --full
|
||||
systemd-mount --list --no-legend
|
||||
systemd-mount --list --no-pager
|
||||
systemd-mount --list --quiet
|
||||
systemd-mount --list --json=pretty
|
||||
|
||||
# tmpfs
|
||||
mkdir -p "$WORK_DIR/mnt/foo/bar"
|
||||
systemd-mount --tmpfs "$WORK_DIR/mnt/foo"
|
||||
test ! -d "$WORK_DIR/mnt/foo/bar"
|
||||
touch "$WORK_DIR/mnt/foo/baz"
|
||||
systemd-umount "$WORK_DIR/mnt/foo"
|
||||
test -d "$WORK_DIR/mnt/foo/bar"
|
||||
test ! -e "$WORK_DIR/mnt/foo/baz"
|
||||
|
||||
# overlay
|
||||
systemd-mount --type=overlay --options="lowerdir=/etc,upperdir=$WORK_DIR/upper,workdir=$WORK_DIR/work" /etc "$WORK_DIR/overlay"
|
||||
touch "$WORK_DIR/overlay/foo"
|
||||
test -e "$WORK_DIR/upper/foo"
|
||||
systemd-umount "$WORK_DIR/overlay"
|
||||
|
||||
# Set up a simple block device for further tests
|
||||
dd if=/dev/zero of="$WORK_DIR/simple.img" bs=1M count=16
|
||||
mkfs.ext4 -L sd-mount-test "$WORK_DIR/simple.img"
|
||||
LOOP="$(losetup --show --find "$WORK_DIR/simple.img")"
|
||||
udevadm wait --timeout 60 --settle "$LOOP"
|
||||
# Also wait for the .device unit for the loop device is active. Otherwise, the .device unit activation
|
||||
# that is triggered by the .mount unit introduced by systemd-mount below may time out.
|
||||
timeout 60 bash -c "until systemctl is-active $LOOP; do sleep 1; done"
|
||||
mount "$LOOP" "$WORK_DIR/mnt"
|
||||
touch "$WORK_DIR/mnt/foo.bar"
|
||||
umount "$LOOP"
|
||||
(! mountpoint "$WORK_DIR/mnt")
|
||||
# Wait for the mount unit to be unloaded. Otherwise, creation of the transient unit below may fail.
|
||||
MOUNT_UNIT=$(systemd-escape --path --suffix=mount "$WORK_DIR/mnt")
|
||||
timeout 60 bash -c "while [[ -n \$(systemctl list-units --all --no-legend $MOUNT_UNIT) ]]; do sleep 1; done"
|
||||
|
||||
# Mount with both source and destination set
|
||||
systemd-mount "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$WORK_DIR/mnt"
|
||||
systemd-mount --list --full
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Same thing, but with explicitly specified filesystem and disabled filesystem check
|
||||
systemd-mount --type=ext4 --fsck=no --collect "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").mount"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemd-mount --umount "$LOOP"
|
||||
# Discover additional metadata (unit description should now contain filesystem label)
|
||||
systemd-mount --no-ask-password --discover "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Description "$WORK_DIR/mnt" | grep -q sd-mount-test
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Set a unit description
|
||||
systemd-mount --description="Very Important Unit" "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Description "$WORK_DIR/mnt" | grep -q "Very Important Unit"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Set a property
|
||||
systemd-mount --property="Description=Foo Bar" "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Description "$WORK_DIR/mnt" | grep -q "Foo Bar"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Set mount options
|
||||
systemd-mount --options=ro,x-foo-bar "$LOOP" "$WORK_DIR/mnt"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl show -P Options "$WORK_DIR/mnt" | grep -Eq "(^ro|,ro)"
|
||||
systemctl show -P Options "$WORK_DIR/mnt" | grep -q "x-foo-bar"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
|
||||
# Mount with only source set
|
||||
systemd-mount "$LOOP"
|
||||
systemctl status /run/media/system/sd-mount-test
|
||||
systemd-mount --list --full
|
||||
test -e /run/media/system/sd-mount-test/foo.bar
|
||||
systemd-umount LABEL=sd-mount-test
|
||||
|
||||
# Automount
|
||||
systemd-mount --automount=yes "$LOOP" "$WORK_DIR/mnt"
|
||||
systemd-mount --list --full
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").automount"
|
||||
[[ "$(systemctl show -P ActiveState "$WORK_DIR/mnt")" == inactive ]]
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
systemctl status "$WORK_DIR/mnt"
|
||||
systemd-umount "$WORK_DIR/mnt"
|
||||
# Automount + automount-specific property
|
||||
systemd-mount -A --automount-property="Description=Bar Baz" "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl show -P Description "$(systemd-escape --path "$WORK_DIR/mnt").automount" | grep -q "Bar Baz"
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
# Call --umount via --machine=, first with a relative path (bad) and then with
|
||||
# an absolute one (good)
|
||||
(! systemd-umount --machine=.host "$(realpath --relative-to=. "$WORK_DIR/mnt")")
|
||||
systemd-umount --machine=.host "$WORK_DIR/mnt"
|
||||
|
||||
# ext4 doesn't support uid=/gid=
|
||||
(! systemd-mount -t ext4 --owner=testuser "$LOOP" "$WORK_DIR/mnt")
|
||||
|
||||
# Automount + --bind-device
|
||||
systemd-mount --automount=yes --bind-device --timeout-idle-sec=1 "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").automount"
|
||||
# Trigger the automount
|
||||
test -e "$WORK_DIR/mnt/foo.bar"
|
||||
# Wait until it's idle again
|
||||
sleep 1.5
|
||||
# Safety net for slower/overloaded systems
|
||||
timeout 10s bash -c "while systemctl is-active -q $WORK_DIR/mnt; do sleep .2; done"
|
||||
systemctl status "$(systemd-escape --path "$WORK_DIR/mnt").automount"
|
||||
# Disassemble the underlying block device
|
||||
losetup -d "$LOOP"
|
||||
unset LOOP
|
||||
# The automount unit should disappear once the underlying blockdev is gone
|
||||
timeout 10s bash -c "while systemctl status '$(systemd-escape --path "$WORK_DIR/mnt".automount)'; do sleep .2; done"
|
||||
|
||||
# Mount a disk image
|
||||
systemd-mount --discover "$WORK_DIR/simple.img"
|
||||
# We can access files in the image even if the loopback block device is not initialized by udevd.
|
||||
test -e /run/media/system/simple.img/foo.bar
|
||||
# systemd-mount --list and systemd-umount require the loopback block device is initialized by udevd.
|
||||
udevadm settle --timeout 30
|
||||
assert_in "/dev/loop.* ext4 +sd-mount-test" "$(systemd-mount --list --full)"
|
||||
LOOP_AUTO=$(systemd-mount --list --full --no-legend | awk '$7 == "sd-mount-test" { print $1 }')
|
||||
LOOP_AUTO_DEVPATH=$(udevadm info --query property --property DEVPATH --value "$LOOP_AUTO")
|
||||
systemd-umount "$WORK_DIR/simple.img"
|
||||
# Wait for 'change' uevent for the device with DISK_MEDIA_CHANGE=1.
|
||||
# After the event, the backing_file attribute should be removed.
|
||||
timeout 60 bash -c "while [[ -e /sys/$LOOP_AUTO_DEVPATH/loop/backing_file ]]; do sleep 1; done"
|
||||
|
||||
# --owner + vfat
|
||||
#
|
||||
# Create a vfat image, as ext4 doesn't support uid=/gid= fixating for all
|
||||
# files/directories
|
||||
dd if=/dev/zero of="$WORK_DIR/owner-vfat.img" bs=1M count=16
|
||||
mkfs.vfat -n owner-vfat "$WORK_DIR/owner-vfat.img"
|
||||
LOOP="$(losetup --show --find "$WORK_DIR/owner-vfat.img")"
|
||||
# If the synthesized uevent triggered by inotify event has been processed earlier than the kernel finishes to
|
||||
# attach the backing file, then SYSTEMD_READY=0 is set for the device. As a workaround, monitor sysattr
|
||||
# and re-trigger uevent after that.
|
||||
LOOP_DEVPATH=$(udevadm info --query property --property DEVPATH --value "$LOOP")
|
||||
timeout 60 bash -c "until [[ -e /sys/$LOOP_DEVPATH/loop/backing_file ]]; do sleep 1; done"
|
||||
udevadm trigger --settle "$LOOP"
|
||||
# Also wait for the .device unit for the loop device is active. Otherwise, the .device unit activation
|
||||
# that is triggered by the .mount unit introduced by systemd-mount below may time out.
|
||||
if ! timeout 60 bash -c "until systemctl is-active $LOOP; do sleep 1; done"; then
|
||||
# For debugging issue like
|
||||
# https://github.com/systemd/systemd/issues/32680#issuecomment-2120959238
|
||||
# https://github.com/systemd/systemd/issues/32680#issuecomment-2122074805
|
||||
udevadm info "$LOOP"
|
||||
udevadm info --attribute-walk "$LOOP"
|
||||
cat /sys/"$(udevadm info --query property --property DEVPATH --value "$LOOP")"/loop/backing_file || :
|
||||
false
|
||||
fi
|
||||
# Mount it and check the UID/GID
|
||||
[[ "$(stat -c "%U:%G" "$WORK_DIR/mnt")" == "root:root" ]]
|
||||
systemd-mount --owner=testuser "$LOOP" "$WORK_DIR/mnt"
|
||||
systemctl status "$WORK_DIR/mnt"
|
||||
[[ "$(stat -c "%U:%G" "$WORK_DIR/mnt")" == "testuser:testuser" ]]
|
||||
touch "$WORK_DIR/mnt/hello"
|
||||
[[ "$(stat -c "%U:%G" "$WORK_DIR/mnt/hello")" == "testuser:testuser" ]]
|
||||
systemd-umount LABEL=owner-vfat
|
|
@ -5,10 +5,7 @@ set -o pipefail
|
|||
|
||||
systemctl log-level info
|
||||
|
||||
if systemd-detect-virt -cq; then
|
||||
echo "Running in a container, skipping the systemd-pstore test..."
|
||||
exit 0
|
||||
fi
|
||||
(! systemd-detect-virt -cq)
|
||||
|
||||
DUMMY_DMESG_0="$(mktemp)"
|
||||
cat >"$DUMMY_DMESG_0" <<\EOF
|
|
@ -0,0 +1,11 @@
|
|||
#!/usr/bin/env bash
|
||||
# SPDX-License-Identifier: LGPL-2.1-or-later
|
||||
set -eux
|
||||
set -o pipefail
|
||||
|
||||
# shellcheck source=test/units/test-control.sh
|
||||
. "$(dirname "$0")"/test-control.sh
|
||||
|
||||
run_subtests
|
||||
|
||||
touch /testok
|
|
@ -13,11 +13,12 @@
|
|||
|
||||
d /run/lock 0755 root root -
|
||||
L /var/lock - - - - ../run/lock
|
||||
|
||||
{% if HAVE_SYSV_COMPAT %}
|
||||
{% if CREATE_LOG_DIRS %}
|
||||
L$ /var/log/README - - - - ../..{{DOC_DIR}}/README.logs
|
||||
{% endif %}
|
||||
|
||||
{% if HAVE_SYSV_COMPAT %}
|
||||
# /run/lock/subsys is used for serializing SysV service execution, and
|
||||
# hence without use on SysV-less systems.
|
||||
d /run/lock/subsys 0755 root root -
|
||||
|
|
Loading…
Reference in New Issue