mirror of
https://github.com/systemd/systemd
synced 2026-04-13 10:35:08 +02:00
Compare commits
10 Commits
edaca18739
...
b09869eaf7
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
b09869eaf7 | ||
|
|
5ab9addd68 | ||
|
|
e916276016 | ||
|
|
d7cb60daf6 | ||
|
|
30b6f7d714 | ||
|
|
39f83dd760 | ||
|
|
01f5177ffd | ||
|
|
70a5c6dce0 | ||
|
|
78ab2b5064 | ||
|
|
37361f46d5 |
@ -984,7 +984,7 @@ bpf_framework_required = want_bpf_framework == 'true'
|
||||
libbpf = dependency('libbpf', required : bpf_framework_required, version : '>= 0.2')
|
||||
conf.set10('HAVE_LIBBPF', libbpf.found())
|
||||
|
||||
if want_bpf_framework == 'false'
|
||||
if want_bpf_framework == 'false' or not libbpf.found()
|
||||
conf.set10('BPF_FRAMEWORK', 0)
|
||||
else
|
||||
# Support 'versioned' clang/llvm-strip binaries, as seen on Debian/Ubuntu
|
||||
@ -1030,7 +1030,7 @@ else
|
||||
required : bpf_framework_required,
|
||||
version : '>= 5.6')
|
||||
|
||||
deps_found = libbpf.found() and clang_found and clang_supports_bpf and clang_supports_flags and llvm_strip.found() and bpftool.found()
|
||||
deps_found = clang_found and clang_supports_bpf and clang_supports_flags and llvm_strip.found() and bpftool.found()
|
||||
|
||||
# Can build BPF program from source code in restricted C
|
||||
conf.set10('BPF_FRAMEWORK', deps_found)
|
||||
|
||||
@ -1151,6 +1151,8 @@ static int mount_image(const MountEntry *m, const char *root_directory) {
|
||||
NULL);
|
||||
if (r < 0)
|
||||
return log_debug_errno(r, "Failed to acquire 'os-release' data of OS tree '%s': %m", empty_to_root(root_directory));
|
||||
if (isempty(host_os_release_id))
|
||||
return log_debug_errno(SYNTHETIC_ERRNO(EINVAL), "'ID' field not found or empty in 'os-release' data of OS tree '%s': %m", empty_to_root(root_directory));
|
||||
}
|
||||
|
||||
r = verity_dissect_and_mount(
|
||||
|
||||
@ -152,7 +152,9 @@ int device_set_syspath(sd_device *device, const char *_syspath, bool verify) {
|
||||
if (verify) {
|
||||
r = chase_symlinks(_syspath, NULL, 0, &syspath, NULL);
|
||||
if (r == -ENOENT)
|
||||
return -ENODEV; /* the device does not exist (any more?) */
|
||||
/* the device does not exist (any more?) */
|
||||
return log_debug_errno(SYNTHETIC_ERRNO(ENODEV),
|
||||
"sd-device: Failed to chase symlinks in \"%s\".", _syspath);
|
||||
if (r < 0)
|
||||
return log_debug_errno(r, "sd-device: Failed to get target of '%s': %m", _syspath);
|
||||
|
||||
@ -173,7 +175,7 @@ int device_set_syspath(sd_device *device, const char *_syspath, bool verify) {
|
||||
|
||||
new_syspath = path_join("/sys", p);
|
||||
if (!new_syspath)
|
||||
return -ENOMEM;
|
||||
return log_oom_debug();
|
||||
|
||||
free_and_replace(syspath, new_syspath);
|
||||
path_simplify(syspath);
|
||||
@ -187,30 +189,31 @@ int device_set_syspath(sd_device *device, const char *_syspath, bool verify) {
|
||||
if (access(path, F_OK) < 0) {
|
||||
if (errno == ENOENT)
|
||||
/* this is not a valid device */
|
||||
return -ENODEV;
|
||||
return log_debug_errno(SYNTHETIC_ERRNO(ENODEV),
|
||||
"sd-device: the uevent file \"%s\" does not exist.", path);
|
||||
|
||||
return log_debug_errno(errno, "sd-device: cannot access uevent file for %s: %m", syspath);
|
||||
}
|
||||
} else {
|
||||
/* everything else just needs to be a directory */
|
||||
if (!is_dir(syspath, false))
|
||||
return -ENODEV;
|
||||
return log_debug_errno(SYNTHETIC_ERRNO(ENODEV),
|
||||
"sd-device: the syspath \"%s\" is not a directory.", syspath);
|
||||
}
|
||||
} else {
|
||||
syspath = strdup(_syspath);
|
||||
if (!syspath)
|
||||
return -ENOMEM;
|
||||
return log_oom_debug();
|
||||
}
|
||||
|
||||
devpath = syspath + STRLEN("/sys");
|
||||
|
||||
if (devpath[0] != '/')
|
||||
/* '/sys' alone is not a valid device path */
|
||||
return -ENODEV;
|
||||
return log_debug_errno(SYNTHETIC_ERRNO(ENODEV), "sd-device: \"/sys\" alone is not a valid device path.");
|
||||
|
||||
r = device_add_property_internal(device, "DEVPATH", devpath);
|
||||
if (r < 0)
|
||||
return r;
|
||||
return log_debug_errno(r, "sd-device: Failed to add \"DEVPATH\" property for device \"%s\": %m", syspath);
|
||||
|
||||
free_and_replace(device->syspath, syspath);
|
||||
device->devpath = devpath;
|
||||
|
||||
@ -3534,9 +3534,9 @@ int verity_dissect_and_mount(
|
||||
/* If we got os-release values from the caller, then we need to match them with the image's
|
||||
* extension-release.d/ content. Return -EINVAL if there's any mismatch.
|
||||
* First, check the distro ID. If that matches, then check the new SYSEXT_LEVEL value if
|
||||
* available, or else fallback to VERSION_ID. */
|
||||
if (required_host_os_release_id &&
|
||||
(required_host_os_release_version_id || required_host_os_release_sysext_level)) {
|
||||
* available, or else fallback to VERSION_ID. If neither is present (eg: rolling release),
|
||||
* then a simple match on the ID will be performed. */
|
||||
if (required_host_os_release_id) {
|
||||
_cleanup_strv_free_ char **extension_release = NULL;
|
||||
|
||||
r = load_extension_release_pairs(dest, dissected_image->image_name, &extension_release);
|
||||
|
||||
@ -13,6 +13,7 @@
|
||||
#include "errno-util.h"
|
||||
#include "escape.h"
|
||||
#include "fd-util.h"
|
||||
#include "id128-util.h"
|
||||
#include "log.h"
|
||||
#include "macro.h"
|
||||
#include "parse-util.h"
|
||||
@ -337,6 +338,7 @@ bool device_for_action(sd_device *dev, sd_device_action_t a) {
|
||||
|
||||
void log_device_uevent(sd_device *device, const char *str) {
|
||||
sd_device_action_t action = _SD_DEVICE_ACTION_INVALID;
|
||||
sd_id128_t event_id = SD_ID128_NULL;
|
||||
uint64_t seqnum = 0;
|
||||
|
||||
if (!DEBUG_LOGGING)
|
||||
@ -344,9 +346,12 @@ void log_device_uevent(sd_device *device, const char *str) {
|
||||
|
||||
(void) sd_device_get_seqnum(device, &seqnum);
|
||||
(void) sd_device_get_action(device, &action);
|
||||
log_device_debug(device, "%s%s(SEQNUM=%"PRIu64", ACTION=%s)",
|
||||
(void) sd_device_get_trigger_uuid(device, &event_id);
|
||||
log_device_debug(device, "%s%s(SEQNUM=%"PRIu64", ACTION=%s%s%s)",
|
||||
strempty(str), isempty(str) ? "" : " ",
|
||||
seqnum, strna(device_action_to_string(action)));
|
||||
seqnum, strna(device_action_to_string(action)),
|
||||
sd_id128_is_null(event_id) ? "" : ", UUID=",
|
||||
sd_id128_is_null(event_id) ? "" : id128_to_uuid_string(event_id, (char[ID128_UUID_STRING_MAX]){}));
|
||||
}
|
||||
|
||||
int udev_rule_parse_value(char *str, char **ret_value, char **ret_endpos) {
|
||||
|
||||
@ -2,6 +2,7 @@
|
||||
|
||||
#include <fcntl.h>
|
||||
#include <getopt.h>
|
||||
#include <linux/loop.h>
|
||||
#include <sys/mount.h>
|
||||
#include <unistd.h>
|
||||
|
||||
@ -529,7 +530,11 @@ static int merge_subprocess(Hashmap *images, const char *workspace) {
|
||||
if (verity_settings.data_path)
|
||||
flags |= DISSECT_IMAGE_NO_PARTITION_TABLE;
|
||||
|
||||
r = loop_device_make_by_path(img->path, O_RDONLY, 0, &d);
|
||||
r = loop_device_make_by_path(
|
||||
img->path,
|
||||
O_RDONLY,
|
||||
FLAGS_SET(flags, DISSECT_IMAGE_NO_PARTITION_TABLE) ? 0 : LO_FLAGS_PARTSCAN,
|
||||
&d);
|
||||
if (r < 0)
|
||||
return log_error_errno(r, "Failed to set up loopback device for %s: %m", img->path);
|
||||
|
||||
|
||||
@ -11,8 +11,10 @@ setup() {
|
||||
ACTION=="add", SUBSYSTEM=="mem", KERNEL=="null", OPTIONS="log_level=debug"
|
||||
ACTION=="add", SUBSYSTEM=="mem", KERNEL=="null", PROGRAM=="/bin/sleep 60"
|
||||
EOF
|
||||
echo "event_timeout=10" >>/etc/udev/udev.conf
|
||||
echo "timeout_signal=SIGABRT" >>/etc/udev/udev.conf
|
||||
cat >>/etc/udev/udev.conf <<EOF
|
||||
event_timeout=10
|
||||
timeout_signal=SIGABRT
|
||||
EOF
|
||||
|
||||
systemctl restart systemd-udevd.service
|
||||
}
|
||||
|
||||
@ -390,6 +390,10 @@ testcase_btrfs_basic() {
|
||||
uuid="deadbeef-dead-dead-beef-000000000000"
|
||||
label="btrfs_root"
|
||||
mkfs.btrfs -L "$label" -U "$uuid" "${devices[0]}"
|
||||
# We need to do some active waiting anyway, as it may take kernel a bit
|
||||
# to trigger the newly created btrfs
|
||||
helper_wait_for_dev "/dev/disk/by-uuid/$uuid"
|
||||
helper_wait_for_dev "/dev/disk/by-label/$label"
|
||||
udevadm settle
|
||||
btrfs filesystem show
|
||||
test -e "/dev/disk/by-uuid/$uuid"
|
||||
@ -409,6 +413,8 @@ name="diskpart4", size=85M
|
||||
EOF
|
||||
udevadm settle
|
||||
mkfs.btrfs -d single -m raid1 -L "$label" -U "$uuid" /dev/disk/by-partlabel/diskpart{1..4}
|
||||
helper_wait_for_dev "/dev/disk/by-uuid/$uuid"
|
||||
helper_wait_for_dev "/dev/disk/by-label/$label"
|
||||
udevadm settle
|
||||
btrfs filesystem show
|
||||
test -e "/dev/disk/by-uuid/$uuid"
|
||||
@ -420,6 +426,8 @@ EOF
|
||||
uuid="deadbeef-dead-dead-beef-000000000002"
|
||||
label="btrfs_mdisk"
|
||||
mkfs.btrfs -M -d raid10 -m raid10 -L "$label" -U "$uuid" "${devices[@]}"
|
||||
helper_wait_for_dev "/dev/disk/by-uuid/$uuid"
|
||||
helper_wait_for_dev "/dev/disk/by-label/$label"
|
||||
udevadm settle
|
||||
btrfs filesystem show
|
||||
test -e "/dev/disk/by-uuid/$uuid"
|
||||
@ -457,6 +465,8 @@ EOF
|
||||
ls -l /dev/mapper/encbtrfs{0..3}
|
||||
# Create a multi-device btrfs filesystem on the LUKS devices
|
||||
mkfs.btrfs -M -d raid1 -m raid1 -L "$label" -U "$uuid" /dev/mapper/encbtrfs{0..3}
|
||||
helper_wait_for_dev "/dev/disk/by-uuid/$uuid"
|
||||
helper_wait_for_dev "/dev/disk/by-label/$label"
|
||||
udevadm settle
|
||||
btrfs filesystem show
|
||||
test -e "/dev/disk/by-uuid/$uuid"
|
||||
@ -483,6 +493,8 @@ EOF
|
||||
# Start the corresponding mount unit and check if the btrfs device was reconstructed
|
||||
# correctly
|
||||
systemctl start "${mpoint##*/}.mount"
|
||||
helper_wait_for_dev "/dev/disk/by-uuid/$uuid"
|
||||
helper_wait_for_dev "/dev/disk/by-label/$label"
|
||||
btrfs filesystem show
|
||||
test -e "/dev/disk/by-uuid/$uuid"
|
||||
test -e "/dev/disk/by-label/$label"
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user