2020-03-04 17:35:06 +08:00
|
|
|
#!/usr/bin/env bash
|
2012-05-22 00:55:48 +08:00
|
|
|
# -*- mode: shell-script; indent-tabs-mode: nil; sh-basic-offset: 4; -*-
|
|
|
|
# ex: ts=8 sw=4 sts=4 et filetype=sh
|
|
|
|
PATH=/sbin:/bin:/usr/sbin:/usr/bin
|
|
|
|
export PATH
|
|
|
|
|
2020-08-27 17:59:45 +08:00
|
|
|
os_release=$(test -e /etc/os-release && echo /etc/os-release || echo /usr/lib/os-release)
|
|
|
|
LOOKS_LIKE_DEBIAN=$(source $os_release && [[ "$ID" = "debian" || " $ID_LIKE " = *" debian "* ]] && echo yes || :)
|
|
|
|
LOOKS_LIKE_ARCH=$(source $os_release && [[ "$ID" = "arch" || " $ID_LIKE " = *" arch "* ]] && echo yes || :)
|
|
|
|
LOOKS_LIKE_SUSE=$(source $os_release && [[ " $ID_LIKE " = *" suse "* ]] && echo yes || :)
|
2012-05-26 00:32:55 +08:00
|
|
|
KERNEL_VER=${KERNEL_VER-$(uname -r)}
|
|
|
|
KERNEL_MODS="/lib/modules/$KERNEL_VER/"
|
2016-02-25 02:22:06 +08:00
|
|
|
QEMU_TIMEOUT="${QEMU_TIMEOUT:-infinity}"
|
2016-04-13 21:57:06 +08:00
|
|
|
NSPAWN_TIMEOUT="${NSPAWN_TIMEOUT:-infinity}"
|
2016-06-24 18:11:19 +08:00
|
|
|
TIMED_OUT= # will be 1 after run_* if *_TIMEOUT is set and test timed out
|
2017-11-07 22:51:30 +08:00
|
|
|
[[ "$LOOKS_LIKE_SUSE" ]] && FSTYPE="${FSTYPE:-btrfs}" || FSTYPE="${FSTYPE:-ext4}"
|
2016-11-16 00:38:04 +08:00
|
|
|
UNIFIED_CGROUP_HIERARCHY="${UNIFIED_CGROUP_HIERARCHY:-default}"
|
2019-12-10 01:52:35 +08:00
|
|
|
EFI_MOUNT="${EFI_MOUNT:-$(bootctl -x 2>/dev/null || echo /boot)}"
|
2019-01-11 22:51:07 +08:00
|
|
|
QEMU_MEM="${QEMU_MEM:-512M}"
|
2021-01-07 05:42:28 +08:00
|
|
|
# Note that defining a different IMAGE_NAME in a test setup script will only result
|
|
|
|
# in default.img being copied and renamed. It can then be extended by defining
|
|
|
|
# a test_append_files() function. The $1 parameter will be the root directory.
|
|
|
|
# To force creating a new image from scratch (eg: to encrypt it), also define
|
|
|
|
# TEST_FORCE_NEWIMAGE=1 in the test setup script.
|
2019-12-12 16:37:19 +08:00
|
|
|
IMAGE_NAME=${IMAGE_NAME:-default}
|
2019-12-17 19:52:35 +08:00
|
|
|
TEST_REQUIRE_INSTALL_TESTS="${TEST_REQUIRE_INSTALL_TESTS:-1}"
|
2020-05-17 16:48:16 +08:00
|
|
|
TEST_PARALLELIZE="${TEST_PARALLELIZE:-0}"
|
2020-03-21 03:17:11 +08:00
|
|
|
LOOPDEV=
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2019-09-27 05:29:38 +08:00
|
|
|
# Decide if we can (and want to) run QEMU with KVM acceleration.
|
|
|
|
# Check if nested KVM is explicitly enabled (TEST_NESTED_KVM). If not,
|
|
|
|
# check if it's not explicitly disabled (TEST_NO_KVM) and we're not already
|
|
|
|
# running under KVM. If these conditions are met, enable KVM (and possibly
|
|
|
|
# nested KVM), otherwise disable it.
|
|
|
|
if [[ -n "$TEST_NESTED_KVM" || ( -z "$TEST_NO_KVM" && $(systemd-detect-virt -v) != kvm ) ]]; then
|
|
|
|
QEMU_KVM=yes
|
|
|
|
else
|
|
|
|
QEMU_KVM=no
|
|
|
|
fi
|
|
|
|
|
2015-02-02 07:19:29 +08:00
|
|
|
if ! ROOTLIBDIR=$(pkg-config --variable=systemdutildir systemd); then
|
|
|
|
echo "WARNING! Cannot determine rootlibdir from pkg-config, assuming /usr/lib/systemd" >&2
|
|
|
|
ROOTLIBDIR=/usr/lib/systemd
|
|
|
|
fi
|
|
|
|
|
2021-01-27 05:46:10 +08:00
|
|
|
# The calling test.sh scripts have TEST_BASE_DIR set via their Makefile, but we don't need them to provide it
|
|
|
|
TEST_BASE_DIR=${TEST_BASE_DIR:-$(realpath $(dirname "$BASH_SOURCE"))}
|
|
|
|
TEST_UNITS_DIR="$TEST_BASE_DIR/units"
|
|
|
|
SOURCE_DIR=$(realpath "$TEST_BASE_DIR/..")
|
|
|
|
TOOLS_DIR="$SOURCE_DIR/tools"
|
|
|
|
|
2020-11-18 04:39:37 +08:00
|
|
|
# note that find-build-dir.sh will return $BUILD_DIR if provided, else it will try to find it
|
|
|
|
if ! BUILD_DIR=$($TOOLS_DIR/find-build-dir.sh); then
|
2020-11-18 06:20:22 +08:00
|
|
|
if [ "$NO_BUILD" ]; then
|
|
|
|
BUILD_DIR=$SOURCE_DIR
|
|
|
|
else
|
|
|
|
echo "ERROR: no build found, please set BUILD_DIR or use NO_BUILD" >&2
|
|
|
|
exit 1
|
|
|
|
fi
|
2020-11-18 04:39:37 +08:00
|
|
|
fi
|
|
|
|
|
2018-07-05 23:14:07 +08:00
|
|
|
PATH_TO_INIT=$ROOTLIBDIR/systemd
|
2019-08-13 19:52:57 +08:00
|
|
|
[ "$SYSTEMD_JOURNALD" ] || SYSTEMD_JOURNALD=$(which -a $BUILD_DIR/systemd-journald $ROOTLIBDIR/systemd-journald 2>/dev/null | grep '^/' -m1)
|
2020-04-26 23:19:55 +08:00
|
|
|
[ "$SYSTEMD_JOURNAL_REMOTE" ] || SYSTEMD_JOURNAL_REMOTE=$(which -a $BUILD_DIR/systemd-journal-remote $ROOTLIBDIR/systemd-journal-remote 2>/dev/null | grep '^/' -m1)
|
2019-08-13 19:52:57 +08:00
|
|
|
[ "$SYSTEMD" ] || SYSTEMD=$(which -a $BUILD_DIR/systemd $ROOTLIBDIR/systemd 2>/dev/null | grep '^/' -m1)
|
|
|
|
[ "$SYSTEMD_NSPAWN" ] || SYSTEMD_NSPAWN=$(which -a $BUILD_DIR/systemd-nspawn systemd-nspawn 2>/dev/null | grep '^/' -m1)
|
|
|
|
[ "$JOURNALCTL" ] || JOURNALCTL=$(which -a $BUILD_DIR/journalctl journalctl 2>/dev/null | grep '^/' -m1)
|
2018-07-05 23:14:07 +08:00
|
|
|
|
2021-01-27 05:46:10 +08:00
|
|
|
TESTFILE=${BASH_SOURCE[1]}
|
|
|
|
if [ -z "$TESTFILE" ]; then
|
|
|
|
echo "ERROR: test-functions must be sourced from one of the TEST-*/test.sh scripts" >&2
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
TESTNAME=$(basename $(dirname $(realpath $TESTFILE)))
|
|
|
|
STATEDIR="$BUILD_DIR/test/$TESTNAME"
|
2020-11-18 05:02:14 +08:00
|
|
|
STATEFILE="$STATEDIR/.testdir"
|
|
|
|
IMAGESTATEDIR="$STATEDIR/.."
|
|
|
|
TESTLOG="$STATEDIR/test.log"
|
|
|
|
|
2019-12-10 03:35:51 +08:00
|
|
|
BASICTOOLS=(
|
2019-12-10 22:31:09 +08:00
|
|
|
awk
|
|
|
|
basename
|
2019-12-10 03:35:51 +08:00
|
|
|
bash
|
2019-12-10 04:45:46 +08:00
|
|
|
busybox
|
2019-12-10 22:31:09 +08:00
|
|
|
capsh
|
2019-12-10 03:35:51 +08:00
|
|
|
cat
|
|
|
|
chmod
|
|
|
|
chown
|
|
|
|
cmp
|
|
|
|
cryptsetup
|
2019-12-10 22:31:09 +08:00
|
|
|
cut
|
2019-12-10 03:35:51 +08:00
|
|
|
date
|
2019-12-10 22:31:09 +08:00
|
|
|
dd
|
|
|
|
diff
|
|
|
|
dirname
|
2019-12-10 03:35:51 +08:00
|
|
|
dmsetup
|
|
|
|
echo
|
|
|
|
env
|
|
|
|
false
|
2020-08-14 16:20:43 +08:00
|
|
|
getconf
|
2019-12-10 22:31:09 +08:00
|
|
|
getent
|
|
|
|
getfacl
|
2020-03-21 03:22:42 +08:00
|
|
|
grep
|
2019-12-10 22:31:09 +08:00
|
|
|
gunzip
|
2019-12-10 03:35:51 +08:00
|
|
|
gzip
|
|
|
|
head
|
2019-12-10 22:31:09 +08:00
|
|
|
ionice
|
2019-12-10 04:45:46 +08:00
|
|
|
ip
|
2019-12-10 03:35:51 +08:00
|
|
|
ln
|
|
|
|
loadkeys
|
|
|
|
login
|
2019-12-10 22:31:09 +08:00
|
|
|
lz4cat
|
2019-12-10 20:32:20 +08:00
|
|
|
mkfifo
|
|
|
|
mktemp
|
2019-12-10 03:35:51 +08:00
|
|
|
modprobe
|
|
|
|
mount
|
2020-06-09 22:51:55 +08:00
|
|
|
mountpoint
|
2019-12-10 04:26:59 +08:00
|
|
|
mv
|
|
|
|
nc
|
2019-12-10 22:31:09 +08:00
|
|
|
nproc
|
2019-12-10 20:32:20 +08:00
|
|
|
readlink
|
2019-12-10 22:31:09 +08:00
|
|
|
rev
|
2019-12-10 03:35:51 +08:00
|
|
|
rm
|
2019-12-10 04:45:46 +08:00
|
|
|
rmdir
|
2019-12-10 03:35:51 +08:00
|
|
|
sed
|
2019-12-10 22:31:09 +08:00
|
|
|
seq
|
2021-02-09 17:47:34 +08:00
|
|
|
setfattr
|
2019-12-10 03:35:51 +08:00
|
|
|
setfont
|
|
|
|
setsid
|
2020-03-21 03:22:42 +08:00
|
|
|
sfdisk
|
2019-12-10 03:35:51 +08:00
|
|
|
sh
|
|
|
|
sleep
|
2019-12-10 03:42:48 +08:00
|
|
|
socat
|
2019-12-10 04:26:59 +08:00
|
|
|
stat
|
2020-03-21 02:05:36 +08:00
|
|
|
su
|
2019-12-10 03:35:51 +08:00
|
|
|
sulogin
|
2019-12-10 04:45:46 +08:00
|
|
|
sysctl
|
2019-12-10 03:35:51 +08:00
|
|
|
tail
|
2019-12-10 16:10:28 +08:00
|
|
|
tar
|
2019-12-10 03:35:51 +08:00
|
|
|
tee
|
|
|
|
test
|
2020-04-03 15:13:51 +08:00
|
|
|
timeout
|
2019-12-10 03:53:38 +08:00
|
|
|
touch
|
2019-12-10 22:31:09 +08:00
|
|
|
tr
|
2019-12-10 03:35:51 +08:00
|
|
|
true
|
2020-03-21 03:22:42 +08:00
|
|
|
truncate
|
2019-12-10 03:35:51 +08:00
|
|
|
umount
|
2019-12-10 22:31:09 +08:00
|
|
|
uname
|
2019-12-10 04:45:46 +08:00
|
|
|
unshare
|
2019-12-10 03:35:51 +08:00
|
|
|
xargs
|
2019-12-10 22:31:09 +08:00
|
|
|
xzcat
|
2019-12-10 03:35:51 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
DEBUGTOOLS=(
|
|
|
|
cp
|
|
|
|
df
|
|
|
|
dhclient
|
|
|
|
dmesg
|
|
|
|
du
|
|
|
|
find
|
|
|
|
free
|
|
|
|
grep
|
|
|
|
hostname
|
|
|
|
id
|
|
|
|
less
|
|
|
|
ln
|
|
|
|
ls
|
|
|
|
mkdir
|
|
|
|
ping
|
|
|
|
ps
|
|
|
|
route
|
|
|
|
sort
|
|
|
|
strace
|
|
|
|
stty
|
|
|
|
tty
|
|
|
|
vi
|
|
|
|
)
|
2013-11-06 06:32:56 +08:00
|
|
|
|
2018-07-05 12:09:30 +08:00
|
|
|
is_built_with_asan() {
|
|
|
|
if ! type -P objdump >/dev/null; then
|
|
|
|
ddebug "Failed to find objdump. Assuming systemd hasn't been built with ASAN."
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Borrowed from https://github.com/google/oss-fuzz/blob/cd9acd02f9d3f6e80011cc1e9549be526ce5f270/infra/base-images/base-runner/bad_build_check#L182
|
2021-02-10 17:16:09 +08:00
|
|
|
local _asan_calls=$(objdump -dC $SYSTEMD_JOURNALD | egrep "callq?\s+[0-9a-f]+\s+<__asan" -c)
|
2018-07-05 12:09:30 +08:00
|
|
|
if (( $_asan_calls < 1000 )); then
|
|
|
|
return 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
IS_BUILT_WITH_ASAN=$(is_built_with_asan && echo yes || echo no)
|
|
|
|
|
|
|
|
if [[ "$IS_BUILT_WITH_ASAN" = "yes" ]]; then
|
|
|
|
STRIP_BINARIES=no
|
2019-05-10 01:30:13 +08:00
|
|
|
SKIP_INITRD="${SKIP_INITRD:-yes}"
|
2018-07-05 23:14:07 +08:00
|
|
|
PATH_TO_INIT=$ROOTLIBDIR/systemd-under-asan
|
2019-07-16 23:01:26 +08:00
|
|
|
QEMU_MEM="2048M"
|
2019-01-11 23:51:49 +08:00
|
|
|
QEMU_SMP=4
|
2019-05-25 04:35:52 +08:00
|
|
|
|
|
|
|
# We need to correctly distinguish between gcc's and clang's ASan DSOs.
|
2019-08-13 19:52:57 +08:00
|
|
|
if ldd $SYSTEMD | grep -q libasan.so; then
|
2019-05-25 04:35:52 +08:00
|
|
|
ASAN_COMPILER=gcc
|
2019-08-13 19:52:57 +08:00
|
|
|
elif ldd $SYSTEMD | grep -q libclang_rt.asan; then
|
2019-05-25 04:35:52 +08:00
|
|
|
ASAN_COMPILER=clang
|
|
|
|
|
|
|
|
# As clang's ASan DSO is usually in a non-standard path, let's check if
|
|
|
|
# the environment is set accordingly. If not, warn the user and exit.
|
|
|
|
# We're not setting the LD_LIBRARY_PATH automagically here, because
|
|
|
|
# user should encounter (and fix) the same issue when running the unit
|
|
|
|
# tests (meson test)
|
2019-08-13 19:52:57 +08:00
|
|
|
if ldd "$SYSTEMD" | grep -q "libclang_rt.asan.*not found"; then
|
|
|
|
_asan_rt_name="$(ldd $SYSTEMD | awk '/libclang_rt.asan/ {print $1; exit}')"
|
2019-05-25 04:35:52 +08:00
|
|
|
_asan_rt_path="$(find /usr/lib* /usr/local/lib* -type f -name "$_asan_rt_name" 2>/dev/null | sed 1q)"
|
|
|
|
echo >&2 "clang's ASan DSO ($_asan_rt_name) is not present in the runtime library path"
|
|
|
|
echo >&2 "Consider setting LD_LIBRARY_PATH=${_asan_rt_path%/*}"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
echo >&2 "systemd is not linked against the ASan DSO"
|
|
|
|
echo >&2 "gcc does this by default, for clang compile with -shared-libasan"
|
|
|
|
exit 1
|
|
|
|
fi
|
2018-07-05 12:09:30 +08:00
|
|
|
fi
|
|
|
|
|
2013-12-08 07:01:53 +08:00
|
|
|
function find_qemu_bin() {
|
2018-05-03 02:06:13 +08:00
|
|
|
# SUSE and Red Hat call the binary qemu-kvm. Debian and Gentoo call it kvm.
|
2019-09-27 05:29:38 +08:00
|
|
|
if [[ $QEMU_KVM == "yes" ]]; then
|
2018-05-03 02:06:13 +08:00
|
|
|
[ "$QEMU_BIN" ] || QEMU_BIN=$(which -a kvm qemu-kvm 2>/dev/null | grep '^/' -m1)
|
|
|
|
fi
|
2013-12-08 07:01:53 +08:00
|
|
|
|
|
|
|
[ "$ARCH" ] || ARCH=$(uname -m)
|
|
|
|
case $ARCH in
|
|
|
|
x86_64)
|
|
|
|
# QEMU's own build system calls it qemu-system-x86_64
|
|
|
|
[ "$QEMU_BIN" ] || QEMU_BIN=$(which -a qemu-system-x86_64 2>/dev/null | grep '^/' -m1)
|
|
|
|
;;
|
|
|
|
i*86)
|
|
|
|
# new i386 version of QEMU
|
|
|
|
[ "$QEMU_BIN" ] || QEMU_BIN=$(which -a qemu-system-i386 2>/dev/null | grep '^/' -m1)
|
|
|
|
|
|
|
|
# i386 version of QEMU
|
|
|
|
[ "$QEMU_BIN" ] || QEMU_BIN=$(which -a qemu 2>/dev/null | grep '^/' -m1)
|
|
|
|
;;
|
2016-11-20 11:45:23 +08:00
|
|
|
ppc64*)
|
2019-08-14 09:48:26 +08:00
|
|
|
[ "$QEMU_BIN" ] || QEMU_BIN=$(which -a qemu-system-ppc64 2>/dev/null | grep '^/' -m1)
|
2016-11-20 11:45:23 +08:00
|
|
|
;;
|
2013-12-08 07:01:53 +08:00
|
|
|
esac
|
|
|
|
|
|
|
|
if [ ! -e "$QEMU_BIN" ]; then
|
|
|
|
echo "Could not find a suitable QEMU binary" >&2
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2020-12-15 19:05:14 +08:00
|
|
|
# Compares argument #1=X.Y.Z (X&Y&Z = numeric) to the version of the installed qemu
|
|
|
|
# returns 0 if newer or equal
|
|
|
|
# returns 1 if older
|
|
|
|
# returns 2 if failing
|
|
|
|
function qemu_min_version() {
|
|
|
|
find_qemu_bin || return 2
|
|
|
|
|
|
|
|
# get version from binary
|
2020-12-16 23:33:50 +08:00
|
|
|
qemu_ver=$($QEMU_BIN --version | awk '/^QEMU emulator version ([0-9]*\.[0-9]*\.[0-9]*)/ {print $4}')
|
2020-12-15 19:05:14 +08:00
|
|
|
|
|
|
|
# Check version string format
|
|
|
|
echo "$qemu_ver" | grep -q '^[0-9]*\.[0-9]*\.[0-9]*$' || return 2
|
|
|
|
echo "$1" | grep -q '^[0-9]*\.[0-9]*\.[0-9]*$' || return 2
|
|
|
|
|
|
|
|
# compare as last command to return that value
|
|
|
|
printf "%s\n%s\n" "$1" "$qemu_ver" | sort -V -C
|
|
|
|
}
|
|
|
|
|
2016-06-24 18:11:19 +08:00
|
|
|
# Return 0 if QEMU did run (then you must check the result state/logs for actual
|
|
|
|
# success), or 1 if QEMU is not available.
|
2013-11-06 06:32:56 +08:00
|
|
|
run_qemu() {
|
2015-02-03 17:43:24 +08:00
|
|
|
if [ -f /etc/machine-id ]; then
|
|
|
|
read MACHINE_ID < /etc/machine-id
|
2017-11-17 21:09:11 +08:00
|
|
|
[ -z "$INITRD" ] && [ -e "$EFI_MOUNT/$MACHINE_ID/$KERNEL_VER/initrd" ] \
|
|
|
|
&& INITRD="$EFI_MOUNT/$MACHINE_ID/$KERNEL_VER/initrd"
|
|
|
|
[ -z "$KERNEL_BIN" ] && [ -e "$EFI_MOUNT/$MACHINE_ID/$KERNEL_VER/linux" ] \
|
|
|
|
&& KERNEL_BIN="$EFI_MOUNT/$MACHINE_ID/$KERNEL_VER/linux"
|
2015-02-03 17:43:24 +08:00
|
|
|
fi
|
|
|
|
|
2018-02-20 20:01:40 +08:00
|
|
|
CONSOLE=ttyS0
|
|
|
|
|
2020-04-21 19:18:36 +08:00
|
|
|
rm -f "$initdir"/{testok,failed,skipped}
|
2019-12-13 21:21:31 +08:00
|
|
|
# make sure the initdir is not mounted to avoid concurrent access
|
|
|
|
cleanup_initdir
|
|
|
|
umount_loopback
|
|
|
|
|
2016-11-11 10:45:38 +08:00
|
|
|
if [[ ! "$KERNEL_BIN" ]]; then
|
|
|
|
if [[ "$LOOKS_LIKE_ARCH" ]]; then
|
|
|
|
KERNEL_BIN=/boot/vmlinuz-linux
|
|
|
|
else
|
2018-02-20 04:47:41 +08:00
|
|
|
[ "$ARCH" ] || ARCH=$(uname -m)
|
|
|
|
case $ARCH in
|
|
|
|
ppc64*)
|
|
|
|
KERNEL_BIN=/boot/vmlinux-$KERNEL_VER
|
2018-02-20 20:01:40 +08:00
|
|
|
CONSOLE=hvc0
|
2018-02-20 04:47:41 +08:00
|
|
|
;;
|
|
|
|
*)
|
|
|
|
KERNEL_BIN=/boot/vmlinuz-$KERNEL_VER
|
|
|
|
;;
|
|
|
|
esac
|
2016-11-11 10:45:38 +08:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2015-11-20 13:21:06 +08:00
|
|
|
default_fedora_initrd=/boot/initramfs-${KERNEL_VER}.img
|
|
|
|
default_debian_initrd=/boot/initrd.img-${KERNEL_VER}
|
2019-02-02 12:05:42 +08:00
|
|
|
default_arch_initrd=/boot/initramfs-linux-fallback.img
|
2017-07-07 02:30:14 +08:00
|
|
|
default_suse_initrd=/boot/initrd-${KERNEL_VER}
|
2016-11-11 10:45:38 +08:00
|
|
|
if [[ ! "$INITRD" ]]; then
|
|
|
|
if [[ -e "$default_fedora_initrd" ]]; then
|
|
|
|
INITRD="$default_fedora_initrd"
|
|
|
|
elif [[ "$LOOKS_LIKE_DEBIAN" && -e "$default_debian_initrd" ]]; then
|
|
|
|
INITRD="$default_debian_initrd"
|
|
|
|
elif [[ "$LOOKS_LIKE_ARCH" && -e "$default_arch_initrd" ]]; then
|
|
|
|
INITRD="$default_arch_initrd"
|
2017-07-07 02:30:14 +08:00
|
|
|
elif [[ "$LOOKS_LIKE_SUSE" && -e "$default_suse_initrd" ]]; then
|
|
|
|
INITRD="$default_suse_initrd"
|
2016-11-11 10:45:38 +08:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2019-03-05 23:08:00 +08:00
|
|
|
# If QEMU_SMP was not explicitly set, try to determine the value 'dynamically'
|
|
|
|
# i.e. use the number of online CPUs on the host machine. If the nproc utility
|
|
|
|
# is not installed or there's some other error when calling it, fall back
|
|
|
|
# to the original value (QEMU_SMP=1).
|
|
|
|
if ! [ "$QEMU_SMP" ]; then
|
|
|
|
if ! QEMU_SMP=$(nproc); then
|
|
|
|
dwarn "nproc utility is not installed, falling back to QEMU_SMP=1"
|
|
|
|
QEMU_SMP=1
|
|
|
|
fi
|
|
|
|
fi
|
2013-12-08 07:01:53 +08:00
|
|
|
|
|
|
|
find_qemu_bin || return 1
|
|
|
|
|
2019-12-12 16:37:19 +08:00
|
|
|
# Umount initdir to avoid concurrent access to the filesystem
|
2020-03-21 03:17:11 +08:00
|
|
|
_umount_dir $initdir
|
2019-12-12 16:37:19 +08:00
|
|
|
|
2016-11-16 00:38:04 +08:00
|
|
|
local _cgroup_args
|
|
|
|
if [[ "$UNIFIED_CGROUP_HIERARCHY" = "yes" ]]; then
|
|
|
|
_cgroup_args="systemd.unified_cgroup_hierarchy=yes"
|
|
|
|
elif [[ "$UNIFIED_CGROUP_HIERARCHY" = "no" ]]; then
|
|
|
|
_cgroup_args="systemd.unified_cgroup_hierarchy=no systemd.legacy_systemd_cgroup_controller=yes"
|
|
|
|
elif [[ "$UNIFIED_CGROUP_HIERARCHY" = "hybrid" ]]; then
|
|
|
|
_cgroup_args="systemd.unified_cgroup_hierarchy=no systemd.legacy_systemd_cgroup_controller=no"
|
|
|
|
elif [[ "$UNIFIED_CGROUP_HIERARCHY" != "default" ]]; then
|
|
|
|
dfatal "Unknown UNIFIED_CGROUP_HIERARCHY. Got $UNIFIED_CGROUP_HIERARCHY, expected [yes|no|hybrid|default]"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
scripts: use 4 space indentation
We had all kinds of indentation: 2 sp, 3 sp, 4 sp, 8 sp, and mixed.
4 sp was the most common, in particular the majority of scripts under test/
used that. Let's standarize on 4 sp, because many commandlines are long and
there's a lot of nesting, and with 8sp indentation less stuff fits. 4 sp
also seems to be the default indentation, so this will make it less likely
that people will mess up if they don't load the editor config. (I think people
often use vi, and vi has no support to load project-wide configuration
automatically. We distribute a .vimrc file, but it is not loaded by default,
and even the instructions in it seem to discourage its use for security
reasons.)
Also remove the few vim config lines that were left. We should either have them
on all files, or none.
Also remove some strange stuff like '#!/bin/env bash', yikes.
2019-04-04 20:10:42 +08:00
|
|
|
if [[ "$LOOKS_LIKE_SUSE" ]]; then
|
|
|
|
PARAMS+="rd.hostonly=0"
|
|
|
|
fi
|
2017-07-07 02:30:14 +08:00
|
|
|
|
2019-12-10 01:56:13 +08:00
|
|
|
local _end
|
|
|
|
if [[ ! "$INTERACTIVE_DEBUG" ]]; then
|
|
|
|
_end="systemd.wants=end.service"
|
|
|
|
else
|
|
|
|
_end=""
|
|
|
|
fi
|
|
|
|
|
scripts: use 4 space indentation
We had all kinds of indentation: 2 sp, 3 sp, 4 sp, 8 sp, and mixed.
4 sp was the most common, in particular the majority of scripts under test/
used that. Let's standarize on 4 sp, because many commandlines are long and
there's a lot of nesting, and with 8sp indentation less stuff fits. 4 sp
also seems to be the default indentation, so this will make it less likely
that people will mess up if they don't load the editor config. (I think people
often use vi, and vi has no support to load project-wide configuration
automatically. We distribute a .vimrc file, but it is not loaded by default,
and even the instructions in it seem to discourage its use for security
reasons.)
Also remove the few vim config lines that were left. We should either have them
on all files, or none.
Also remove some strange stuff like '#!/bin/env bash', yikes.
2019-04-04 20:10:42 +08:00
|
|
|
KERNEL_APPEND="$PARAMS \
|
2017-07-07 02:30:14 +08:00
|
|
|
root=/dev/sda1 \
|
2019-12-12 22:17:30 +08:00
|
|
|
rw \
|
2013-12-08 07:01:53 +08:00
|
|
|
raid=noautodetect \
|
2019-11-14 02:46:08 +08:00
|
|
|
rd.luks=0 \
|
2013-12-08 07:01:53 +08:00
|
|
|
loglevel=2 \
|
2018-07-05 23:14:07 +08:00
|
|
|
init=$PATH_TO_INIT \
|
2018-02-20 20:01:40 +08:00
|
|
|
console=$CONSOLE \
|
2013-12-08 07:01:53 +08:00
|
|
|
selinux=0 \
|
2016-11-16 00:38:04 +08:00
|
|
|
$_cgroup_args \
|
2019-12-10 02:19:05 +08:00
|
|
|
SYSTEMD_UNIT_PATH=/usr/lib/systemd/tests/testdata/testsuite-$1.units:/usr/lib/systemd/tests/testdata/units: \
|
2019-12-10 01:56:13 +08:00
|
|
|
systemd.unit=testsuite.target \
|
2019-12-12 22:17:30 +08:00
|
|
|
systemd.wants=testsuite-$1.service ${_end} \
|
2013-12-08 07:01:53 +08:00
|
|
|
$KERNEL_APPEND \
|
|
|
|
"
|
|
|
|
|
2020-05-17 16:46:34 +08:00
|
|
|
[ -e "$IMAGE_PRIVATE" ] && image="$IMAGE_PRIVATE" || image="$IMAGE_PUBLIC"
|
2015-11-19 20:17:15 +08:00
|
|
|
QEMU_OPTIONS="-smp $QEMU_SMP \
|
2013-12-08 07:01:53 +08:00
|
|
|
-net none \
|
2019-01-11 22:51:07 +08:00
|
|
|
-m $QEMU_MEM \
|
2013-12-08 07:01:53 +08:00
|
|
|
-nographic \
|
|
|
|
-kernel $KERNEL_BIN \
|
2020-05-17 16:46:34 +08:00
|
|
|
-drive format=raw,cache=unsafe,file=$image \
|
2019-06-26 04:45:15 +08:00
|
|
|
$QEMU_OPTIONS \
|
2013-12-08 07:01:53 +08:00
|
|
|
"
|
|
|
|
|
2016-02-25 02:22:06 +08:00
|
|
|
if [[ "$INITRD" && "$SKIP_INITRD" != "yes" ]]; then
|
2013-12-08 07:01:53 +08:00
|
|
|
QEMU_OPTIONS="$QEMU_OPTIONS -initrd $INITRD"
|
|
|
|
fi
|
|
|
|
|
2019-09-27 05:29:38 +08:00
|
|
|
# Let's use KVM if possible
|
|
|
|
if [[ -c /dev/kvm && $QEMU_KVM == "yes" ]]; then
|
2015-11-19 20:17:15 +08:00
|
|
|
QEMU_OPTIONS="$QEMU_OPTIONS -machine accel=kvm -enable-kvm -cpu host"
|
|
|
|
fi
|
|
|
|
|
2016-02-25 02:22:06 +08:00
|
|
|
if [[ "$QEMU_TIMEOUT" != "infinity" ]]; then
|
|
|
|
QEMU_BIN="timeout --foreground $QEMU_TIMEOUT $QEMU_BIN"
|
|
|
|
fi
|
2016-06-24 18:11:19 +08:00
|
|
|
(set -x; $QEMU_BIN $QEMU_OPTIONS -append "$KERNEL_APPEND")
|
|
|
|
rc=$?
|
|
|
|
if [ "$rc" = 124 ] && [ "$QEMU_TIMEOUT" != "infinity" ]; then
|
|
|
|
derror "test timed out after $QEMU_TIMEOUT s"
|
|
|
|
TIMED_OUT=1
|
|
|
|
else
|
|
|
|
[ "$rc" != 0 ] && derror "QEMU failed with exit code $rc"
|
|
|
|
fi
|
|
|
|
return 0
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2016-06-24 22:23:39 +08:00
|
|
|
# Return 0 if nspawn did run (then you must check the result state/logs for actual
|
|
|
|
# success), or 1 if nspawn is not available.
|
2013-11-06 06:32:56 +08:00
|
|
|
run_nspawn() {
|
2016-06-24 22:23:39 +08:00
|
|
|
[[ -d /run/systemd/system ]] || return 1
|
2020-04-21 19:18:36 +08:00
|
|
|
rm -f "$initdir"/{testok,failed,skipped}
|
2016-06-24 22:23:39 +08:00
|
|
|
|
2019-12-10 01:56:13 +08:00
|
|
|
local _nspawn_cmd=(
|
|
|
|
--register=no
|
|
|
|
--kill-signal=SIGKILL
|
2019-12-13 21:21:31 +08:00
|
|
|
--directory=$1
|
2019-12-10 02:19:05 +08:00
|
|
|
--setenv=SYSTEMD_UNIT_PATH=/usr/lib/systemd/tests/testdata/testsuite-$2.units:/usr/lib/systemd/tests/testdata/units:
|
2019-12-10 01:56:13 +08:00
|
|
|
$PATH_TO_INIT
|
|
|
|
$KERNEL_APPEND
|
|
|
|
systemd.unit=testsuite.target
|
|
|
|
systemd.wants=testsuite-$2.service
|
|
|
|
)
|
|
|
|
|
|
|
|
if [[ ! "$INTERACTIVE_DEBUG" ]]; then
|
|
|
|
_nspawn_cmd+=( systemd.wants=end.service )
|
|
|
|
fi
|
|
|
|
|
|
|
|
local _nspawn_pre
|
2016-04-13 21:57:06 +08:00
|
|
|
if [[ "$NSPAWN_TIMEOUT" != "infinity" ]]; then
|
2019-12-10 01:56:13 +08:00
|
|
|
_nspawn_pre=(timeout --foreground $NSPAWN_TIMEOUT)
|
|
|
|
else
|
|
|
|
_nspawn_pre=()
|
2016-04-13 21:57:06 +08:00
|
|
|
fi
|
2016-06-03 17:17:00 +08:00
|
|
|
|
2016-11-16 00:38:04 +08:00
|
|
|
if [[ "$UNIFIED_CGROUP_HIERARCHY" = "hybrid" ]]; then
|
2019-09-27 20:17:41 +08:00
|
|
|
dwarn "nspawn doesn't support SYSTEMD_NSPAWN_UNIFIED_HIERARCHY=hybrid, skipping"
|
2016-11-16 00:38:04 +08:00
|
|
|
exit
|
|
|
|
elif [[ "$UNIFIED_CGROUP_HIERARCHY" = "yes" || "$UNIFIED_CGROUP_HIERARCHY" = "no" ]]; then
|
2020-05-22 07:08:48 +08:00
|
|
|
_nspawn_pre=("${_nspawn_pre[@]}" env SYSTEMD_NSPAWN_UNIFIED_HIERARCHY=$UNIFIED_CGROUP_HIERARCHY)
|
2016-11-16 00:38:04 +08:00
|
|
|
elif [[ "$UNIFIED_CGROUP_HIERARCHY" = "default" ]]; then
|
2020-05-22 07:08:48 +08:00
|
|
|
_nspawn_pre=("${_nspawn_pre[@]}" env --unset=UNIFIED_CGROUP_HIERARCHY --unset=SYSTEMD_NSPAWN_UNIFIED_HIERARCHY)
|
2016-11-16 00:38:04 +08:00
|
|
|
else
|
|
|
|
dfatal "Unknown UNIFIED_CGROUP_HIERARCHY. Got $UNIFIED_CGROUP_HIERARCHY, expected [yes|no|hybrid|default]"
|
|
|
|
exit 1
|
|
|
|
fi
|
2016-06-03 17:17:00 +08:00
|
|
|
|
2019-12-10 01:56:13 +08:00
|
|
|
(set -x; "${_nspawn_pre[@]}" "$SYSTEMD_NSPAWN" $NSPAWN_ARGUMENTS "${_nspawn_cmd[@]}")
|
2016-06-24 18:11:19 +08:00
|
|
|
rc=$?
|
|
|
|
if [ "$rc" = 124 ] && [ "$NSPAWN_TIMEOUT" != "infinity" ]; then
|
|
|
|
derror "test timed out after $NSPAWN_TIMEOUT s"
|
|
|
|
TIMED_OUT=1
|
|
|
|
else
|
|
|
|
[ "$rc" != 0 ] && derror "nspawn failed with exit code $rc"
|
|
|
|
fi
|
|
|
|
return 0
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2020-08-28 21:17:31 +08:00
|
|
|
# Build two very minimal root images, with two units, one is the same and one is different across them
|
|
|
|
install_verity_minimal() {
|
|
|
|
if [ -e $initdir/usr/share/minimal.raw ]; then
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
if ! command -v mksquashfs >/dev/null 2>&1; then
|
|
|
|
dfatal "mksquashfs not found"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
if ! command -v veritysetup >/dev/null 2>&1; then
|
|
|
|
dfatal "veritysetup not found"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
(
|
|
|
|
BASICTOOLS=(
|
|
|
|
bash
|
|
|
|
cat
|
2021-02-22 20:20:33 +08:00
|
|
|
grep
|
2020-08-28 21:17:31 +08:00
|
|
|
mount
|
|
|
|
sleep
|
|
|
|
)
|
|
|
|
oldinitdir=$initdir
|
|
|
|
rm -rfv $TESTDIR/minimal
|
|
|
|
export initdir=$TESTDIR/minimal
|
2021-02-22 20:20:33 +08:00
|
|
|
mkdir -p $initdir/usr/lib/systemd/system $initdir/usr/lib/extension-release.d $initdir/etc $initdir/var/tmp $initdir/opt
|
2020-08-28 21:17:31 +08:00
|
|
|
setup_basic_dirs
|
|
|
|
install_basic_tools
|
|
|
|
cp $os_release $initdir/usr/lib/os-release
|
|
|
|
ln -s ../usr/lib/os-release $initdir/etc/os-release
|
|
|
|
touch $initdir/etc/machine-id $initdir/etc/resolv.conf
|
2021-02-22 20:20:33 +08:00
|
|
|
touch $initdir/opt/some_file
|
2020-08-28 21:17:31 +08:00
|
|
|
echo MARKER=1 >> $initdir/usr/lib/os-release
|
|
|
|
echo -e "[Service]\nExecStartPre=cat /usr/lib/os-release\nExecStart=sleep 120" > $initdir/usr/lib/systemd/system/app0.service
|
|
|
|
cp $initdir/usr/lib/systemd/system/app0.service $initdir/usr/lib/systemd/system/app0-foo.service
|
|
|
|
|
|
|
|
mksquashfs $initdir $oldinitdir/usr/share/minimal_0.raw
|
|
|
|
veritysetup format $oldinitdir/usr/share/minimal_0.raw $oldinitdir/usr/share/minimal_0.verity | \
|
|
|
|
grep '^Root hash:' | cut -f2 | tr -d '\n' > $oldinitdir/usr/share/minimal_0.roothash
|
|
|
|
|
|
|
|
sed -i "s/MARKER=1/MARKER=2/g" $initdir/usr/lib/os-release
|
|
|
|
rm $initdir/usr/lib/systemd/system/app0-foo.service
|
|
|
|
cp $initdir/usr/lib/systemd/system/app0.service $initdir/usr/lib/systemd/system/app0-bar.service
|
|
|
|
|
|
|
|
mksquashfs $initdir $oldinitdir/usr/share/minimal_1.raw
|
|
|
|
veritysetup format $oldinitdir/usr/share/minimal_1.raw $oldinitdir/usr/share/minimal_1.verity | \
|
|
|
|
grep '^Root hash:' | cut -f2 | tr -d '\n' > $oldinitdir/usr/share/minimal_1.roothash
|
2021-02-22 20:20:33 +08:00
|
|
|
|
|
|
|
# Rolling distros like Arch do not set VERSION_ID
|
|
|
|
local version_id=""
|
|
|
|
if grep -q "^VERSION_ID=" $os_release; then
|
|
|
|
version_id="$(grep "^VERSION_ID=" $os_release)"
|
|
|
|
fi
|
|
|
|
|
|
|
|
export initdir=$TESTDIR/app0
|
|
|
|
mkdir -p $initdir/usr/lib/extension-release.d $initdir/usr/lib/systemd/system $initdir/opt
|
|
|
|
grep "^ID=" $os_release > $initdir/usr/lib/extension-release.d/extension-release.app0
|
|
|
|
echo "${version_id}" >> $initdir/usr/lib/extension-release.d/extension-release.app0
|
|
|
|
cat <<EOF > $initdir/usr/lib/systemd/system/app0.service
|
|
|
|
[Service]
|
|
|
|
Type=oneshot
|
|
|
|
RemainAfterExit=yes
|
|
|
|
ExecStart=/opt/script0.sh
|
|
|
|
EOF
|
|
|
|
cat <<EOF > $initdir/opt/script0.sh
|
|
|
|
#!/bin/bash
|
|
|
|
set -e
|
|
|
|
test -e /usr/lib/os-release
|
|
|
|
cat /usr/lib/extension-release.d/extension-release.app0
|
|
|
|
EOF
|
|
|
|
chmod +x $initdir/opt/script0.sh
|
|
|
|
echo MARKER=1 > $initdir/usr/lib/systemd/system/some_file
|
|
|
|
mksquashfs $initdir $oldinitdir/usr/share/app0.raw
|
|
|
|
|
|
|
|
export initdir=$TESTDIR/app1
|
|
|
|
mkdir -p $initdir/usr/lib/extension-release.d $initdir/usr/lib/systemd/system $initdir/opt
|
|
|
|
grep "^ID=" $os_release > $initdir/usr/lib/extension-release.d/extension-release.app1
|
|
|
|
echo "${version_id}" >> $initdir/usr/lib/extension-release.d/extension-release.app1
|
|
|
|
cat <<EOF > $initdir/usr/lib/systemd/system/app1.service
|
|
|
|
[Service]
|
|
|
|
Type=oneshot
|
|
|
|
RemainAfterExit=yes
|
|
|
|
ExecStart=/opt/script1.sh
|
|
|
|
EOF
|
|
|
|
cat <<EOF > $initdir/opt/script1.sh
|
|
|
|
#!/bin/bash
|
|
|
|
set -e
|
|
|
|
test -e /usr/lib/os-release
|
|
|
|
cat /usr/lib/extension-release.d/extension-release.app1
|
|
|
|
EOF
|
|
|
|
chmod +x $initdir/opt/script1.sh
|
|
|
|
echo MARKER=1 > $initdir/usr/lib/systemd/system/other_file
|
|
|
|
mksquashfs $initdir $oldinitdir/usr/share/app1.raw
|
2020-08-28 21:17:31 +08:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
setup_basic_environment() {
|
|
|
|
# create the basic filesystem layout
|
|
|
|
setup_basic_dirs
|
|
|
|
|
|
|
|
install_systemd
|
|
|
|
install_missing_libraries
|
|
|
|
install_config_files
|
2019-12-10 22:31:09 +08:00
|
|
|
install_zoneinfo
|
2013-11-06 06:32:56 +08:00
|
|
|
create_rc_local
|
|
|
|
install_basic_tools
|
|
|
|
install_libnss
|
|
|
|
install_pam
|
|
|
|
install_dbus
|
|
|
|
install_fonts
|
|
|
|
install_keymaps
|
|
|
|
install_terminfo
|
|
|
|
install_execs
|
2016-01-16 16:06:59 +08:00
|
|
|
install_fsck
|
2013-11-06 06:32:56 +08:00
|
|
|
install_plymouth
|
|
|
|
install_debug_tools
|
|
|
|
install_ld_so_conf
|
2020-03-21 02:05:36 +08:00
|
|
|
install_testuser
|
|
|
|
has_user_dbus_socket && install_user_dbus
|
2016-01-25 10:45:43 +08:00
|
|
|
setup_selinux
|
2013-11-06 06:32:56 +08:00
|
|
|
strip_binaries
|
|
|
|
install_depmod_files
|
|
|
|
generate_module_dependencies
|
2018-07-05 12:09:30 +08:00
|
|
|
if [[ "$IS_BUILT_WITH_ASAN" = "yes" ]]; then
|
2019-05-25 04:35:52 +08:00
|
|
|
create_asan_wrapper
|
2018-07-05 12:09:30 +08:00
|
|
|
fi
|
2020-08-28 21:17:31 +08:00
|
|
|
if [ -n "$TEST_INSTALL_VERITY_MINIMAL" ]; then
|
|
|
|
install_verity_minimal
|
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2016-01-25 10:45:43 +08:00
|
|
|
setup_selinux() {
|
|
|
|
# don't forget KERNEL_APPEND='... selinux=1 ...'
|
|
|
|
if [[ "$SETUP_SELINUX" != "yes" ]]; then
|
|
|
|
ddebug "Don't setup SELinux"
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
ddebug "Setup SELinux"
|
|
|
|
local _conf_dir=/etc/selinux
|
|
|
|
local _fixfiles_tools="bash uname cat sort uniq awk grep egrep head expr find rm secon setfiles"
|
|
|
|
|
|
|
|
rm -rf $initdir/$_conf_dir
|
|
|
|
if ! cp -ar $_conf_dir $initdir/$_conf_dir; then
|
|
|
|
dfatal "Failed to copy $_conf_dir"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
touch $initdir/.autorelabel
|
2019-12-11 03:46:48 +08:00
|
|
|
mkdir -p $initdir/usr/lib/systemd/tests/testdata/units/basic.target.wants
|
|
|
|
ln -sf ../autorelabel.service $initdir/usr/lib/systemd/tests/testdata/units/basic.target.wants/
|
2016-01-25 10:45:43 +08:00
|
|
|
|
|
|
|
dracut_install $_fixfiles_tools
|
|
|
|
dracut_install fixfiles
|
|
|
|
dracut_install sestatus
|
|
|
|
}
|
|
|
|
|
2016-01-14 16:09:09 +08:00
|
|
|
install_valgrind() {
|
|
|
|
if ! type -p valgrind; then
|
|
|
|
dfatal "Failed to install valgrind"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
local _valgrind_bins=$(strace -e execve valgrind /bin/true 2>&1 >/dev/null | perl -lne 'print $1 if /^execve\("([^"]+)"/')
|
|
|
|
dracut_install $_valgrind_bins
|
|
|
|
|
|
|
|
local _valgrind_libs=$(LD_DEBUG=files valgrind /bin/true 2>&1 >/dev/null | perl -lne 'print $1 if m{calling init: (/.*vgpreload_.*)}')
|
|
|
|
dracut_install $_valgrind_libs
|
|
|
|
|
|
|
|
local _valgrind_dbg_and_supp=$(
|
|
|
|
strace -e open valgrind /bin/true 2>&1 >/dev/null |
|
|
|
|
perl -lne 'if (my ($fname) = /^open\("([^"]+).*= (?!-)\d+/) { print $fname if $fname =~ /debug|\.supp$/ }'
|
|
|
|
)
|
|
|
|
dracut_install $_valgrind_dbg_and_supp
|
|
|
|
}
|
|
|
|
|
2016-01-15 10:52:12 +08:00
|
|
|
create_valgrind_wrapper() {
|
|
|
|
local _valgrind_wrapper=$initdir/$ROOTLIBDIR/systemd-under-valgrind
|
|
|
|
ddebug "Create $_valgrind_wrapper"
|
|
|
|
cat >$_valgrind_wrapper <<EOF
|
2020-03-04 17:35:06 +08:00
|
|
|
#!/usr/bin/env bash
|
2016-01-15 10:52:12 +08:00
|
|
|
|
2016-08-26 23:49:56 +08:00
|
|
|
mount -t proc proc /proc
|
2016-01-15 10:52:12 +08:00
|
|
|
exec valgrind --leak-check=full --log-file=/valgrind.out $ROOTLIBDIR/systemd "\$@"
|
|
|
|
EOF
|
|
|
|
chmod 0755 $_valgrind_wrapper
|
|
|
|
}
|
|
|
|
|
2018-07-03 11:25:53 +08:00
|
|
|
create_asan_wrapper() {
|
|
|
|
local _asan_wrapper=$initdir/$ROOTLIBDIR/systemd-under-asan
|
2019-05-25 04:35:52 +08:00
|
|
|
local _asan_rt_pattern
|
2018-07-03 11:25:53 +08:00
|
|
|
ddebug "Create $_asan_wrapper"
|
2019-05-25 04:35:52 +08:00
|
|
|
|
|
|
|
case "$ASAN_COMPILER" in
|
|
|
|
gcc)
|
|
|
|
_asan_rt_pattern="*libasan*"
|
|
|
|
;;
|
|
|
|
clang)
|
|
|
|
_asan_rt_pattern="libclang_rt.asan-*"
|
|
|
|
# Install llvm-symbolizer to generate useful reports
|
|
|
|
# See: https://clang.llvm.org/docs/AddressSanitizer.html#symbolizing-the-reports
|
|
|
|
dracut_install "llvm-symbolizer"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
dfail "Unsupported compiler: $ASAN_COMPILER"
|
|
|
|
exit 1
|
|
|
|
esac
|
|
|
|
|
2018-07-03 11:25:53 +08:00
|
|
|
cat >$_asan_wrapper <<EOF
|
2020-03-04 17:35:06 +08:00
|
|
|
#!/usr/bin/env bash
|
2018-07-03 11:25:53 +08:00
|
|
|
|
|
|
|
set -x
|
|
|
|
|
2019-07-08 19:47:46 +08:00
|
|
|
DEFAULT_ASAN_OPTIONS=${ASAN_OPTIONS:-strict_string_checks=1:detect_stack_use_after_return=1:check_initialization_order=1:strict_init_order=1}
|
|
|
|
DEFAULT_UBSAN_OPTIONS=${UBSAN_OPTIONS:-print_stacktrace=1:print_summary=1:halt_on_error=1}
|
2019-01-30 10:16:14 +08:00
|
|
|
DEFAULT_ENVIRONMENT="ASAN_OPTIONS=\$DEFAULT_ASAN_OPTIONS UBSAN_OPTIONS=\$DEFAULT_UBSAN_OPTIONS"
|
2018-07-03 11:25:53 +08:00
|
|
|
|
2019-05-25 04:35:52 +08:00
|
|
|
# As right now bash is the PID 1, we can't expect PATH to have a sane value.
|
|
|
|
# Let's make one to prevent unexpected "<bin> not found" issues in the future
|
|
|
|
export PATH="/sbin:/bin:/usr/sbin:/usr/bin"
|
|
|
|
|
2018-07-03 11:25:53 +08:00
|
|
|
mount -t proc proc /proc
|
|
|
|
mount -t sysfs sysfs /sys
|
|
|
|
mount -o remount,rw /
|
|
|
|
|
2019-05-25 04:35:52 +08:00
|
|
|
PATH_TO_ASAN=\$(find / -name '$_asan_rt_pattern' | sed 1q)
|
2018-07-03 11:25:53 +08:00
|
|
|
if [[ "\$PATH_TO_ASAN" ]]; then
|
|
|
|
# A lot of services (most notably dbus) won't start without preloading libasan
|
|
|
|
# See https://github.com/systemd/systemd/issues/5004
|
|
|
|
DEFAULT_ENVIRONMENT="\$DEFAULT_ENVIRONMENT LD_PRELOAD=\$PATH_TO_ASAN"
|
2019-05-25 04:35:52 +08:00
|
|
|
# Let's add the ASan DSO's path to the dynamic linker's cache. This is pretty
|
|
|
|
# unnecessary for gcc & libasan, however, for clang this is crucial, as its
|
|
|
|
# runtime ASan DSO is in a non-standard (library) path.
|
|
|
|
echo \${PATH_TO_ASAN%/*} > /etc/ld.so.conf.d/asan-path-override.conf
|
|
|
|
ldconfig
|
2018-07-03 11:25:53 +08:00
|
|
|
fi
|
|
|
|
echo DefaultEnvironment=\$DEFAULT_ENVIRONMENT >>/etc/systemd/system.conf
|
2018-12-25 13:13:45 +08:00
|
|
|
echo DefaultTimeoutStartSec=180s >>/etc/systemd/system.conf
|
2019-05-25 04:35:52 +08:00
|
|
|
echo DefaultStandardOutput=journal+console >>/etc/systemd/system.conf
|
2018-07-03 11:25:53 +08:00
|
|
|
|
|
|
|
# ASAN and syscall filters aren't compatible with each other.
|
|
|
|
find / -name '*.service' -type f | xargs sed -i 's/^\\(MemoryDeny\\|SystemCall\\)/#\\1/'
|
|
|
|
|
2018-07-04 03:29:42 +08:00
|
|
|
# The redirection of ASAN reports to a file prevents them from ending up in /dev/null.
|
|
|
|
# But, apparently, sometimes it doesn't work: https://github.com/google/sanitizers/issues/886.
|
|
|
|
JOURNALD_CONF_DIR=/etc/systemd/system/systemd-journald.service.d
|
|
|
|
mkdir -p "\$JOURNALD_CONF_DIR"
|
2019-05-10 07:00:29 +08:00
|
|
|
printf "[Service]\nEnvironment=ASAN_OPTIONS=\$DEFAULT_ASAN_OPTIONS:log_path=/systemd-journald.asan.log UBSAN_OPTIONS=\$DEFAULT_UBSAN_OPTIONS:log_path=/systemd-journald.ubsan.log\n" >"\$JOURNALD_CONF_DIR/env.conf"
|
2018-07-04 03:29:42 +08:00
|
|
|
|
2019-05-10 08:47:03 +08:00
|
|
|
# Sometimes UBSan sends its reports to stderr regardless of what is specified in log_path
|
|
|
|
# Let's try to catch them by redirecting stderr (and stdout just in case) to a file
|
|
|
|
# See https://github.com/systemd/systemd/pull/12524#issuecomment-491108821
|
|
|
|
printf "[Service]\nStandardOutput=file:/systemd-journald.out\n" >"\$JOURNALD_CONF_DIR/out.conf"
|
|
|
|
|
2018-12-24 08:15:43 +08:00
|
|
|
# 90s isn't enough for some services to finish when literally everything is run
|
|
|
|
# under ASan+UBSan in containers, which, in turn, are run in VMs.
|
2019-01-12 17:48:13 +08:00
|
|
|
# Let's limit which environments such services should be executed in.
|
2018-12-24 08:15:43 +08:00
|
|
|
mkdir -p /etc/systemd/system/systemd-hwdb-update.service.d
|
2020-06-29 00:53:28 +08:00
|
|
|
printf "[Unit]\nConditionVirtualization=container\n\n[Service]\nTimeoutSec=240s\n" >/etc/systemd/system/systemd-hwdb-update.service.d/env-override.conf
|
2018-12-24 08:15:43 +08:00
|
|
|
|
2019-05-11 00:33:35 +08:00
|
|
|
# Let's override another hard-coded timeout that kicks in too early
|
|
|
|
mkdir -p /etc/systemd/system/systemd-journal-flush.service.d
|
|
|
|
printf "[Service]\nTimeoutSec=180s\n" >/etc/systemd/system/systemd-journal-flush.service.d/timeout.conf
|
|
|
|
|
2019-05-10 01:20:34 +08:00
|
|
|
# The 'mount' utility doesn't behave well under libasan, causing unexpected
|
|
|
|
# fails during boot and subsequent test results check:
|
|
|
|
# bash-5.0# mount -o remount,rw -v /
|
|
|
|
# mount: /dev/sda1 mounted on /.
|
|
|
|
# bash-5.0# echo \$?
|
|
|
|
# 1
|
|
|
|
# Let's workaround this by clearing the previously set LD_PRELOAD env variable,
|
|
|
|
# so the libasan library is not loaded for this particular service
|
2020-01-31 14:13:14 +08:00
|
|
|
unset_ld_preload() {
|
|
|
|
local _dropin_dir="/etc/systemd/system/\$1.service.d"
|
|
|
|
mkdir -p "\$_dropin_dir"
|
|
|
|
printf "[Service]\nUnsetEnvironment=LD_PRELOAD\n" >"\$_dropin_dir/unset_ld_preload.conf"
|
|
|
|
}
|
|
|
|
|
|
|
|
unset_ld_preload systemd-remount-fs
|
2019-12-10 01:56:13 +08:00
|
|
|
unset_ld_preload testsuite-
|
2019-05-10 01:20:34 +08:00
|
|
|
|
2018-09-15 22:21:33 +08:00
|
|
|
export ASAN_OPTIONS=\$DEFAULT_ASAN_OPTIONS:log_path=/systemd.asan.log UBSAN_OPTIONS=\$DEFAULT_UBSAN_OPTIONS
|
2018-07-03 11:25:53 +08:00
|
|
|
exec $ROOTLIBDIR/systemd "\$@"
|
|
|
|
EOF
|
|
|
|
|
|
|
|
chmod 0755 $_asan_wrapper
|
|
|
|
}
|
|
|
|
|
2016-03-04 09:55:46 +08:00
|
|
|
create_strace_wrapper() {
|
|
|
|
local _strace_wrapper=$initdir/$ROOTLIBDIR/systemd-under-strace
|
|
|
|
ddebug "Create $_strace_wrapper"
|
|
|
|
cat >$_strace_wrapper <<EOF
|
2020-03-04 17:35:06 +08:00
|
|
|
#!/usr/bin/env bash
|
2016-03-04 09:55:46 +08:00
|
|
|
|
2021-01-15 06:11:14 +08:00
|
|
|
exec strace -f -D -o /strace.out $ROOTLIBDIR/systemd "\$@"
|
2016-03-04 09:55:46 +08:00
|
|
|
EOF
|
|
|
|
chmod 0755 $_strace_wrapper
|
|
|
|
}
|
|
|
|
|
2016-01-16 16:06:59 +08:00
|
|
|
install_fsck() {
|
|
|
|
dracut_install /sbin/fsck*
|
|
|
|
dracut_install -o /bin/fsck*
|
2016-04-04 19:07:56 +08:00
|
|
|
|
|
|
|
# fskc.reiserfs calls reiserfsck. so, install it
|
|
|
|
dracut_install -o reiserfsck
|
2016-01-16 16:06:59 +08:00
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
install_dmevent() {
|
|
|
|
instmods dm_crypt =crypto
|
2019-07-14 11:03:26 +08:00
|
|
|
inst_binary dmeventd
|
2016-01-17 11:32:37 +08:00
|
|
|
if [[ "$LOOKS_LIKE_DEBIAN" ]]; then
|
|
|
|
# dmsetup installs 55-dm and 60-persistent-storage-dm on Debian/Ubuntu
|
2018-02-15 04:34:55 +08:00
|
|
|
# and since buster/bionic 95-dm-notify.rules
|
|
|
|
# see https://gitlab.com/debian-lvm/lvm2/blob/master/debian/patches/udev.patch
|
|
|
|
inst_rules 55-dm.rules 60-persistent-storage-dm.rules 95-dm-notify.rules
|
2016-01-17 11:32:37 +08:00
|
|
|
else
|
|
|
|
inst_rules 10-dm.rules 13-dm-disk.rules 95-dm-notify.rules
|
|
|
|
fi
|
2020-07-22 04:14:53 +08:00
|
|
|
if [[ "$LOOKS_LIKE_SUSE" ]]; then
|
|
|
|
inst_rules 60-persistent-storage.rules 61-persistent-storage-compat.rules 99-systemd.rules
|
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2020-11-18 06:20:22 +08:00
|
|
|
install_compiled_systemd() {
|
2020-08-27 19:10:30 +08:00
|
|
|
ddebug "Install compiled systemd"
|
|
|
|
|
2017-08-07 17:06:07 +08:00
|
|
|
local _ninja_bin=$(type -P ninja || type -P ninja-build)
|
|
|
|
if [[ -z "$_ninja_bin" ]]; then
|
|
|
|
dfatal "ninja was not found"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
(set -x; DESTDIR=$initdir "$_ninja_bin" -C $BUILD_DIR install)
|
2020-11-18 06:20:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
install_debian_systemd() {
|
|
|
|
ddebug "Install debian systemd"
|
|
|
|
|
2021-02-15 03:29:42 +08:00
|
|
|
local _systemd_pkgs=$(grep -E '^Package:' ${SOURCE_DIR}/debian/control | cut -d ':' -f 2)
|
2020-11-18 06:20:22 +08:00
|
|
|
local _files=""
|
|
|
|
for deb in $_systemd_pkgs; do
|
|
|
|
_files=$(dpkg-query -L $deb 2>/dev/null) || continue
|
|
|
|
ddebug "Install debian files from package $deb"
|
|
|
|
for file in $_files; do
|
|
|
|
[ -e "$file" ] || continue
|
|
|
|
[ -d "$file" ] && continue
|
|
|
|
inst $file
|
|
|
|
done
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
install_distro_systemd() {
|
|
|
|
ddebug "Install distro systemd"
|
|
|
|
|
|
|
|
if [ "$LOOKS_LIKE_DEBIAN" ]; then
|
|
|
|
install_debian_systemd
|
|
|
|
else
|
|
|
|
dfatal "NO_BUILD not supported for this distro"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
install_systemd() {
|
|
|
|
if [ "$NO_BUILD" ]; then
|
|
|
|
install_distro_systemd
|
|
|
|
else
|
|
|
|
install_compiled_systemd
|
|
|
|
fi
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
# remove unneeded documentation
|
2015-06-03 06:09:23 +08:00
|
|
|
rm -fr $initdir/usr/share/{man,doc}
|
2016-04-26 02:20:57 +08:00
|
|
|
|
2019-12-12 16:37:19 +08:00
|
|
|
[[ "$LOOKS_LIKE_SUSE" ]] && setup_suse
|
2017-07-07 02:30:14 +08:00
|
|
|
|
2016-04-26 02:20:57 +08:00
|
|
|
# enable debug logging in PID1
|
|
|
|
echo LogLevel=debug >> $initdir/etc/systemd/system.conf
|
2019-08-13 06:14:54 +08:00
|
|
|
# store coredumps in journal
|
|
|
|
echo Storage=journal >> $initdir/etc/systemd/coredump.conf
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2016-07-03 23:17:13 +08:00
|
|
|
get_ldpath() {
|
|
|
|
local _bin="$1"
|
2019-11-28 01:25:52 +08:00
|
|
|
local rpath=$(objdump -p "$_bin" 2>/dev/null | awk "/R(UN)?PATH/ { print \"$initdir\" \$2 }" | paste -sd :)
|
|
|
|
|
|
|
|
if [ -z "$rpath" ] ; then
|
|
|
|
echo $BUILD_DIR
|
|
|
|
else
|
|
|
|
echo $rpath
|
|
|
|
fi
|
2016-07-03 23:17:13 +08:00
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
install_missing_libraries() {
|
|
|
|
# install possible missing libraries
|
2018-09-12 17:19:45 +08:00
|
|
|
for i in $initdir{,/usr}/{sbin,bin}/* $initdir{,/usr}/lib/systemd/{,tests/{,manual/,unsafe/}}*; do
|
2021-01-20 01:39:50 +08:00
|
|
|
LD_LIBRARY_PATH="${LD_LIBRARY_PATH:+$LD_LIBRARY_PATH:}$(get_ldpath $i)" inst_libs $i
|
2013-11-06 06:32:56 +08:00
|
|
|
done
|
2020-12-09 17:15:36 +08:00
|
|
|
|
|
|
|
# A number of dependencies is now optional via dlopen, so the install
|
|
|
|
# script will not pick them up, since it looks at linkage.
|
2020-12-10 04:13:58 +08:00
|
|
|
for lib in libcryptsetup libidn libidn2 pwquality libqrencode tss2-esys tss2-rc tss2-mu libfido2; do
|
2021-01-15 00:48:13 +08:00
|
|
|
ddebug "Searching for $lib via pkg-config"
|
|
|
|
if pkg-config --exists ${lib}; then
|
|
|
|
path=$(pkg-config --variable=libdir ${lib})
|
|
|
|
if [ -z "${path}" ]; then
|
|
|
|
ddebug "$lib.pc does not contain a libdir variable, skipping"
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
|
|
|
|
if ! [[ ${lib} =~ ^lib ]]; then
|
|
|
|
lib="lib${lib}"
|
|
|
|
fi
|
|
|
|
# Some pkg-config files are broken and give out the wrong paths
|
|
|
|
# (eg: libcryptsetup), so just ignore them
|
|
|
|
inst_libs "${path}/${lib}.so" || true
|
|
|
|
inst_library "${path}/${lib}.so" || true
|
|
|
|
else
|
|
|
|
ddebug "$lib.pc not found, skipping"
|
|
|
|
continue
|
|
|
|
fi
|
2020-12-09 17:15:36 +08:00
|
|
|
done
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2020-03-21 03:17:11 +08:00
|
|
|
cleanup_loopdev() {
|
|
|
|
if [ -n "${LOOPDEV}" ]; then
|
|
|
|
ddebug "losetup -d $LOOPDEV"
|
|
|
|
losetup -d "${LOOPDEV}"
|
2020-05-26 04:48:01 +08:00
|
|
|
unset LOOPDEV
|
2020-03-21 03:17:11 +08:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2020-03-31 17:46:00 +08:00
|
|
|
trap cleanup_loopdev EXIT INT QUIT PIPE
|
2020-03-21 03:17:11 +08:00
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
create_empty_image() {
|
2019-12-12 16:37:19 +08:00
|
|
|
if [ -z "$IMAGE_NAME" ]; then
|
|
|
|
echo "create_empty_image: \$IMAGE_NAME not set"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2018-06-30 13:19:01 +08:00
|
|
|
local _size=500
|
|
|
|
if [[ "$STRIP_BINARIES" = "no" ]]; then
|
2019-05-25 04:35:52 +08:00
|
|
|
_size=$((4*_size))
|
2018-06-30 13:19:01 +08:00
|
|
|
fi
|
2019-12-11 00:33:58 +08:00
|
|
|
|
2020-05-17 16:46:34 +08:00
|
|
|
echo "Setting up $IMAGE_PUBLIC (${_size} MB)"
|
|
|
|
rm -f "$IMAGE_PRIVATE" "$IMAGE_PUBLIC"
|
2019-12-13 21:21:31 +08:00
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
# Create the blank file to use as a root filesystem
|
2020-05-26 04:48:01 +08:00
|
|
|
truncate -s "${_size}M" "$IMAGE_PUBLIC"
|
2019-12-13 21:21:31 +08:00
|
|
|
|
2020-05-17 16:46:34 +08:00
|
|
|
LOOPDEV=$(losetup --show -P -f "$IMAGE_PUBLIC")
|
2013-12-10 20:39:42 +08:00
|
|
|
[ -b "$LOOPDEV" ] || return 1
|
2015-02-03 17:44:27 +08:00
|
|
|
sfdisk "$LOOPDEV" <<EOF
|
2019-03-15 12:54:35 +08:00
|
|
|
,$((_size-50))M
|
2013-11-06 06:32:56 +08:00
|
|
|
,
|
|
|
|
EOF
|
|
|
|
|
2018-03-29 12:20:57 +08:00
|
|
|
udevadm settle
|
|
|
|
|
2019-12-12 22:17:30 +08:00
|
|
|
local _label="-L systemd.${name}"
|
2016-04-04 19:07:56 +08:00
|
|
|
# mkfs.reiserfs doesn't know -L. so, use --label instead
|
2019-12-12 22:17:30 +08:00
|
|
|
[[ "$FSTYPE" == "reiserfs" ]] && _label="--label systemd.${name}"
|
2020-03-21 03:17:11 +08:00
|
|
|
mkfs -t "${FSTYPE}" ${_label} "${LOOPDEV}p1" -q; ret=$?
|
|
|
|
if [ $ret -ne 0 ] ; then
|
2016-04-04 19:07:56 +08:00
|
|
|
dfatal "Failed to mkfs -t ${FSTYPE}"
|
|
|
|
exit 1
|
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2019-12-12 16:37:19 +08:00
|
|
|
mount_initdir() {
|
|
|
|
if [ -z "${LOOPDEV}" ]; then
|
2020-05-17 16:46:34 +08:00
|
|
|
[ -e "$IMAGE_PRIVATE" ] && image="$IMAGE_PRIVATE" || image="$IMAGE_PUBLIC"
|
2019-12-12 16:37:19 +08:00
|
|
|
LOOPDEV=$(losetup --show -P -f "$image")
|
|
|
|
[ -b "$LOOPDEV" ] || return 1
|
|
|
|
|
2020-03-21 03:17:11 +08:00
|
|
|
udevadm settle
|
|
|
|
fi
|
2019-07-12 23:47:26 +08:00
|
|
|
|
2020-03-21 03:17:11 +08:00
|
|
|
if ! mountpoint -q $initdir; then
|
|
|
|
mkdir -p $initdir
|
|
|
|
mount ${LOOPDEV}p1 $initdir
|
|
|
|
TEST_SETUP_CLEANUP_ROOTDIR=1
|
2019-12-12 16:37:19 +08:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2019-12-13 21:21:31 +08:00
|
|
|
cleanup_initdir() {
|
|
|
|
# only umount if create_empty_image_rootdir() was called to mount it
|
|
|
|
[[ -z $TEST_SETUP_CLEANUP_ROOTDIR ]] || _umount_dir $initdir
|
|
|
|
}
|
|
|
|
|
|
|
|
umount_loopback() {
|
|
|
|
# unmount the loopback device from all places. Otherwise we risk file
|
|
|
|
# system corruption.
|
2020-05-17 16:46:34 +08:00
|
|
|
for device in $(losetup -l | awk '$6=="'"$IMAGE_PUBLIC"'" {print $1}'); do
|
2019-12-13 21:21:31 +08:00
|
|
|
ddebug "Unmounting all uses of $device"
|
|
|
|
mount | awk '/^'"${device}"'p/{print $1}' | xargs --no-run-if-empty umount -v
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2019-12-12 16:37:19 +08:00
|
|
|
create_empty_image_rootdir() {
|
|
|
|
create_empty_image
|
|
|
|
mount_initdir
|
|
|
|
}
|
|
|
|
|
2018-12-25 15:31:50 +08:00
|
|
|
check_asan_reports() {
|
|
|
|
local ret=0
|
|
|
|
local root="$1"
|
|
|
|
|
2018-12-23 21:46:00 +08:00
|
|
|
if [[ "$IS_BUILT_WITH_ASAN" = "yes" ]]; then
|
2018-12-25 15:31:50 +08:00
|
|
|
ls -l "$root"
|
|
|
|
if [[ -e "$root/systemd.asan.log.1" ]]; then
|
|
|
|
cat "$root/systemd.asan.log.1"
|
2018-12-23 21:46:00 +08:00
|
|
|
ret=$(($ret+1))
|
|
|
|
fi
|
2018-12-23 22:30:41 +08:00
|
|
|
|
2019-05-10 07:00:29 +08:00
|
|
|
journald_report=$(find "$root" -name "systemd-journald.*san.log*" -exec cat {} \;)
|
2019-01-30 09:19:45 +08:00
|
|
|
if [[ ! -z "$journald_report" ]]; then
|
2019-05-10 08:47:03 +08:00
|
|
|
printf "%s\n" "$journald_report"
|
2019-07-19 08:34:57 +08:00
|
|
|
cat "$root/systemd-journald.out" || :
|
2018-12-23 22:30:41 +08:00
|
|
|
ret=$(($ret+1))
|
2019-01-30 09:19:45 +08:00
|
|
|
fi
|
2018-12-23 22:48:18 +08:00
|
|
|
|
2019-01-30 09:19:45 +08:00
|
|
|
pids=$(
|
2019-08-13 19:52:57 +08:00
|
|
|
"$JOURNALCTL" -D "$root/var/log/journal" | perl -alne '
|
2019-01-30 09:19:45 +08:00
|
|
|
BEGIN {
|
|
|
|
%services_to_ignore = (
|
|
|
|
"dbus-daemon" => undef,
|
|
|
|
);
|
|
|
|
}
|
2019-03-16 22:49:43 +08:00
|
|
|
print $2 if /\s(\S*)\[(\d+)\]:\s*SUMMARY:\s+\w+Sanitizer/ && !exists $services_to_ignore{$1}'
|
2019-01-30 09:19:45 +08:00
|
|
|
)
|
|
|
|
if [[ ! -z "$pids" ]]; then
|
2018-12-23 22:48:18 +08:00
|
|
|
ret=$(($ret+1))
|
|
|
|
for pid in $pids; do
|
2019-08-13 19:52:57 +08:00
|
|
|
"$JOURNALCTL" -D "$root/var/log/journal" _PID=$pid --no-pager
|
2018-12-23 22:48:18 +08:00
|
|
|
done
|
2019-01-30 09:19:45 +08:00
|
|
|
fi
|
2018-12-23 21:46:00 +08:00
|
|
|
fi
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
return $ret
|
|
|
|
}
|
|
|
|
|
2020-03-30 22:39:31 +08:00
|
|
|
save_journal() {
|
2020-03-31 03:29:52 +08:00
|
|
|
if [ -n "${ARTIFACT_DIRECTORY}" ]; then
|
|
|
|
dest="${ARTIFACT_DIRECTORY}/${testname}.journal"
|
|
|
|
else
|
|
|
|
dest="$TESTDIR/system.journal"
|
|
|
|
fi
|
2020-03-30 22:39:31 +08:00
|
|
|
|
2020-03-31 03:29:52 +08:00
|
|
|
for j in $1/*; do
|
2020-04-26 23:19:55 +08:00
|
|
|
$SYSTEMD_JOURNAL_REMOTE \
|
2020-03-31 03:29:52 +08:00
|
|
|
-o $dest \
|
2020-04-26 23:19:55 +08:00
|
|
|
--getter="$JOURNALCTL -o export -D $j"
|
2020-03-31 03:45:21 +08:00
|
|
|
|
|
|
|
if [ -n "${TEST_SHOW_JOURNAL}" ]; then
|
|
|
|
echo "---- $j ----"
|
2020-04-26 23:19:55 +08:00
|
|
|
$JOURNALCTL --no-pager -o short-monotonic --no-hostname --priority=${TEST_SHOW_JOURNAL} -D $j
|
2020-03-31 03:45:21 +08:00
|
|
|
fi
|
|
|
|
|
2020-03-31 03:29:52 +08:00
|
|
|
rm -r $j
|
|
|
|
done
|
2020-03-30 22:39:31 +08:00
|
|
|
|
|
|
|
# we want to print this sometime later, so save this in a variable
|
2020-03-31 03:29:52 +08:00
|
|
|
JOURNAL_LIST="$(ls -l $dest*)"
|
2020-03-30 22:39:31 +08:00
|
|
|
}
|
|
|
|
|
2018-12-25 15:31:50 +08:00
|
|
|
check_result_nspawn() {
|
|
|
|
local ret=1
|
|
|
|
local journald_report=""
|
|
|
|
local pids=""
|
2019-12-13 21:21:31 +08:00
|
|
|
[[ -e $1/testok ]] && ret=0
|
|
|
|
[[ -f $1/failed ]] && cp -a $1/failed $TESTDIR
|
2020-03-30 22:39:31 +08:00
|
|
|
save_journal $1/var/log/journal
|
2018-12-25 15:31:50 +08:00
|
|
|
[[ -f $TESTDIR/failed ]] && cat $TESTDIR/failed
|
2020-03-30 22:39:31 +08:00
|
|
|
echo $JOURNAL_LIST
|
2018-12-25 15:31:50 +08:00
|
|
|
test -s $TESTDIR/failed && ret=$(($ret+1))
|
|
|
|
[ -n "$TIMED_OUT" ] && ret=$(($ret+1))
|
2019-12-13 21:21:31 +08:00
|
|
|
check_asan_reports "$1" || ret=$(($ret+1))
|
2021-01-15 06:11:14 +08:00
|
|
|
if [ -d "${ARTIFACT_DIRECTORY}" ] && [ -f $1/strace.out ]; then
|
|
|
|
cp $1/strace.out "${ARTIFACT_DIRECTORY}/"
|
|
|
|
fi
|
2020-03-21 03:17:11 +08:00
|
|
|
_umount_dir $initdir
|
2018-12-25 15:31:50 +08:00
|
|
|
return $ret
|
|
|
|
}
|
|
|
|
|
2017-08-04 20:34:14 +08:00
|
|
|
# can be overridden in specific test
|
|
|
|
check_result_qemu() {
|
2018-09-14 12:25:02 +08:00
|
|
|
local ret=1
|
2019-12-12 16:37:19 +08:00
|
|
|
mount_initdir
|
2019-08-15 21:39:31 +08:00
|
|
|
[[ -e $initdir/testok ]] && ret=0
|
|
|
|
[[ -f $initdir/failed ]] && cp -a $initdir/failed $TESTDIR
|
2020-03-30 22:39:31 +08:00
|
|
|
save_journal $initdir/var/log/journal
|
2019-08-15 21:39:31 +08:00
|
|
|
check_asan_reports "$initdir" || ret=$(($ret+1))
|
2021-01-15 06:11:14 +08:00
|
|
|
if [ -d "${ARTIFACT_DIRECTORY}" ] && [ -f $initdir/strace.out ]; then
|
|
|
|
cp $initdir/strace.out "${ARTIFACT_DIRECTORY}/"
|
|
|
|
fi
|
2020-03-21 03:17:11 +08:00
|
|
|
_umount_dir $initdir
|
2017-08-04 20:34:14 +08:00
|
|
|
[[ -f $TESTDIR/failed ]] && cat $TESTDIR/failed
|
2020-03-30 22:39:31 +08:00
|
|
|
echo $JOURNAL_LIST
|
2017-08-04 20:34:14 +08:00
|
|
|
test -s $TESTDIR/failed && ret=$(($ret+1))
|
|
|
|
[ -n "$TIMED_OUT" ] && ret=$(($ret+1))
|
|
|
|
return $ret
|
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
strip_binaries() {
|
2016-01-18 14:45:20 +08:00
|
|
|
if [[ "$STRIP_BINARIES" = "no" ]]; then
|
|
|
|
ddebug "Don't strip binaries"
|
|
|
|
return 0
|
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
ddebug "Strip binaries"
|
2019-04-04 21:06:34 +08:00
|
|
|
find "$initdir" -executable -not -path '*/lib/modules/*.ko' -type f | \
|
|
|
|
xargs strip --strip-unneeded |& \
|
2019-07-14 01:29:48 +08:00
|
|
|
grep -vi 'file format not recognized' | \
|
2019-04-04 21:06:34 +08:00
|
|
|
ddebug
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
create_rc_local() {
|
|
|
|
mkdir -p $initdir/etc/rc.d
|
|
|
|
cat >$initdir/etc/rc.d/rc.local <<EOF
|
2020-03-04 17:35:06 +08:00
|
|
|
#!/usr/bin/env bash
|
2013-11-06 06:32:56 +08:00
|
|
|
exit 0
|
|
|
|
EOF
|
|
|
|
chmod 0755 $initdir/etc/rc.d/rc.local
|
|
|
|
}
|
|
|
|
|
|
|
|
install_execs() {
|
2015-11-16 01:26:05 +08:00
|
|
|
ddebug "install any Execs from the service files"
|
|
|
|
(
|
2017-07-02 00:01:30 +08:00
|
|
|
export PKG_CONFIG_PATH=$BUILD_DIR/src/core/
|
2015-11-16 01:26:05 +08:00
|
|
|
systemdsystemunitdir=$(pkg-config --variable=systemdsystemunitdir systemd)
|
|
|
|
systemduserunitdir=$(pkg-config --variable=systemduserunitdir systemd)
|
2018-09-15 16:12:18 +08:00
|
|
|
sed -r -n 's|^Exec[a-zA-Z]*=[@+!-]*([^ ]+).*|\1|gp' $initdir/{$systemdsystemunitdir,$systemduserunitdir}/*.service \
|
2017-11-07 00:00:13 +08:00
|
|
|
| sort -u | while read i; do
|
2017-08-08 03:09:21 +08:00
|
|
|
# some {rc,halt}.local scripts and programs are okay to not exist, the rest should
|
2019-01-19 03:49:29 +08:00
|
|
|
# also, plymouth is pulled in by rescue.service, but even there the exit code
|
|
|
|
# is ignored; as it's not present on some distros, don't fail if it doesn't exist
|
2021-01-19 04:16:14 +08:00
|
|
|
dinfo "Attempting to install $i (based on unit file reference)"
|
2020-04-07 20:00:28 +08:00
|
|
|
inst $i || [ "${i%.local}" != "$i" ] || [ "${i%systemd-update-done}" != "$i" ] || [ "${i##*/}" == "plymouth" ]
|
2015-11-16 01:26:05 +08:00
|
|
|
done
|
|
|
|
)
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
generate_module_dependencies() {
|
|
|
|
if [[ -d $initdir/lib/modules/$KERNEL_VER ]] && \
|
|
|
|
! depmod -a -b "$initdir" $KERNEL_VER; then
|
|
|
|
dfatal "\"depmod -a $KERNEL_VER\" failed."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
install_depmod_files() {
|
|
|
|
inst /lib/modules/$KERNEL_VER/modules.order
|
|
|
|
inst /lib/modules/$KERNEL_VER/modules.builtin
|
|
|
|
}
|
|
|
|
|
|
|
|
install_plymouth() {
|
|
|
|
# install plymouth, if found... else remove plymouth service files
|
|
|
|
# if [ -x /usr/libexec/plymouth/plymouth-populate-initrd ]; then
|
|
|
|
# PLYMOUTH_POPULATE_SOURCE_FUNCTIONS="$TEST_BASE_DIR/test-functions" \
|
|
|
|
# /usr/libexec/plymouth/plymouth-populate-initrd -t $initdir
|
|
|
|
# dracut_install plymouth plymouthd
|
|
|
|
# else
|
2020-04-26 23:19:55 +08:00
|
|
|
rm -f $initdir/{usr/lib,lib,etc}/systemd/system/plymouth* $initdir/{usr/lib,lib,etc}/systemd/system/*/plymouth*
|
2013-11-06 06:32:56 +08:00
|
|
|
# fi
|
|
|
|
}
|
|
|
|
|
|
|
|
install_ld_so_conf() {
|
|
|
|
cp -a /etc/ld.so.conf* $initdir/etc
|
|
|
|
ldconfig -r "$initdir"
|
|
|
|
}
|
|
|
|
|
2020-03-21 02:05:36 +08:00
|
|
|
install_testuser() {
|
|
|
|
# create unprivileged user for user manager tests
|
|
|
|
mkdir -p $initdir/etc/sysusers.d
|
|
|
|
cat >$initdir/etc/sysusers.d/testuser.conf <<EOF
|
|
|
|
u testuser 4711 "Test User" /home/testuser
|
|
|
|
EOF
|
|
|
|
|
|
|
|
mkdir -p $initdir/home/testuser -m 0700
|
|
|
|
chown 4711:4711 $initdir/home/testuser
|
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
install_config_files() {
|
2019-07-19 08:34:57 +08:00
|
|
|
inst /etc/sysconfig/init || :
|
2013-11-06 06:32:56 +08:00
|
|
|
inst /etc/passwd
|
|
|
|
inst /etc/shadow
|
2020-07-22 04:14:53 +08:00
|
|
|
inst_any /etc/login.defs /usr/etc/login.defs
|
2013-11-06 06:32:56 +08:00
|
|
|
inst /etc/group
|
|
|
|
inst /etc/shells
|
2020-06-23 13:42:15 +08:00
|
|
|
inst_any /etc/nsswitch.conf /usr/etc/nsswitch.conf
|
2019-07-19 08:34:57 +08:00
|
|
|
inst /etc/pam.conf || :
|
2020-08-27 17:59:45 +08:00
|
|
|
inst_any /etc/os-release /usr/lib/os-release
|
2013-11-06 06:32:56 +08:00
|
|
|
inst /etc/localtime
|
|
|
|
# we want an empty environment
|
|
|
|
> $initdir/etc/environment
|
|
|
|
> $initdir/etc/machine-id
|
2021-02-03 01:16:41 +08:00
|
|
|
> $initdir/etc/resolv.conf
|
2019-12-10 20:45:48 +08:00
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
# set the hostname
|
|
|
|
echo systemd-testsuite > $initdir/etc/hostname
|
2020-03-25 20:43:20 +08:00
|
|
|
|
|
|
|
# let's set up just one image with the traditional verbose output
|
|
|
|
if [ ${IMAGE_NAME} != "basic" ]; then
|
|
|
|
mkdir -p $initdir/etc/systemd/system.conf.d
|
|
|
|
echo -e '[Manager]\nStatusUnitFormat=name' >$initdir/etc/systemd/system.conf.d/status.conf
|
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
install_basic_tools() {
|
2019-12-10 03:35:51 +08:00
|
|
|
dracut_install "${BASICTOOLS[@]}"
|
2015-02-02 07:19:28 +08:00
|
|
|
dracut_install -o sushell
|
2015-02-02 07:19:33 +08:00
|
|
|
# in Debian ldconfig is just a shell script wrapper around ldconfig.real
|
|
|
|
dracut_install -o ldconfig.real
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
install_debug_tools() {
|
2019-12-10 03:35:51 +08:00
|
|
|
dracut_install "${DEBUGTOOLS[@]}"
|
2019-03-17 00:46:08 +08:00
|
|
|
|
|
|
|
if [[ $INTERACTIVE_DEBUG ]]; then
|
|
|
|
# Set default TERM from vt220 to linux, so at least basic key shortcuts work
|
|
|
|
local _getty_override="$initdir/etc/systemd/system/serial-getty@.service.d"
|
|
|
|
mkdir -p "$_getty_override"
|
|
|
|
echo -e "[Service]\nEnvironment=TERM=linux" > "$_getty_override/default-TERM.conf"
|
|
|
|
|
|
|
|
cat > "$initdir/etc/motd" << EOF
|
|
|
|
To adjust the terminal size use:
|
|
|
|
export COLUMNS=xx
|
|
|
|
export LINES=yy
|
|
|
|
or
|
|
|
|
stty cols xx rows yy
|
|
|
|
EOF
|
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
install_libnss() {
|
|
|
|
# install libnss_files for login
|
2015-02-02 07:19:31 +08:00
|
|
|
NSS_LIBS=$(LD_DEBUG=files getent passwd 2>&1 >/dev/null |sed -n '/calling init: .*libnss_/ {s!^.* /!/!; p}')
|
2015-02-03 17:45:25 +08:00
|
|
|
dracut_install $NSS_LIBS
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
install_dbus() {
|
2015-02-02 07:19:29 +08:00
|
|
|
inst $ROOTLIBDIR/system/dbus.socket
|
2018-11-11 19:13:48 +08:00
|
|
|
|
2019-11-14 02:32:24 +08:00
|
|
|
# Newer Fedora versions use dbus-broker by default. Let's install it if it's available.
|
2019-04-29 22:09:36 +08:00
|
|
|
if [ -f $ROOTLIBDIR/system/dbus-broker.service ]; then
|
|
|
|
inst $ROOTLIBDIR/system/dbus-broker.service
|
|
|
|
inst_symlink /etc/systemd/system/dbus.service
|
|
|
|
inst /usr/bin/dbus-broker
|
|
|
|
inst /usr/bin/dbus-broker-launch
|
|
|
|
elif [ -f $ROOTLIBDIR/system/dbus-daemon.service ]; then
|
|
|
|
# Fedora rawhide replaced dbus.service with dbus-daemon.service
|
2018-11-11 19:13:48 +08:00
|
|
|
inst $ROOTLIBDIR/system/dbus-daemon.service
|
|
|
|
# Alias symlink
|
|
|
|
inst_symlink /etc/systemd/system/dbus.service
|
|
|
|
else
|
|
|
|
inst $ROOTLIBDIR/system/dbus.service
|
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
|
|
|
|
find \
|
2015-11-05 02:33:37 +08:00
|
|
|
/etc/dbus-1 /usr/share/dbus-1 -xtype f \
|
2013-11-06 06:32:56 +08:00
|
|
|
| while read file; do
|
|
|
|
inst $file
|
|
|
|
done
|
2019-12-10 18:49:39 +08:00
|
|
|
|
|
|
|
# setup policy for Type=dbus test
|
|
|
|
mkdir -p $initdir/etc/dbus-1/system.d
|
|
|
|
cat > $initdir/etc/dbus-1/system.d/systemd.test.ExecStopPost.conf <<EOF
|
|
|
|
<?xml version="1.0"?>
|
|
|
|
<!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN"
|
|
|
|
"http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
|
|
|
|
<busconfig>
|
|
|
|
<policy user="root">
|
|
|
|
<allow own="systemd.test.ExecStopPost"/>
|
|
|
|
</policy>
|
|
|
|
</busconfig>
|
|
|
|
EOF
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2019-11-14 02:32:24 +08:00
|
|
|
install_user_dbus() {
|
2020-12-23 01:47:39 +08:00
|
|
|
local userunitdir
|
|
|
|
if ! userunitdir=$(pkg-config --variable=systemduserunitdir systemd); then
|
|
|
|
echo "WARNING! Cannot determine userunitdir from pkg-config, assuming /usr/lib/systemd/user" >&2
|
|
|
|
local userunitdir=/usr/lib/systemd/user
|
|
|
|
fi
|
|
|
|
|
|
|
|
inst $userunitdir/dbus.socket
|
|
|
|
inst_symlink $userunitdir/sockets.target.wants/dbus.socket || inst_symlink /etc/systemd/user/sockets.target.wants/dbus.socket
|
2019-11-14 02:32:24 +08:00
|
|
|
|
|
|
|
# Append the After= dependency on dbus in case it isn't already set up
|
|
|
|
mkdir -p "$initdir/etc/systemd/system/user@.service.d/"
|
|
|
|
cat <<EOF >"$initdir/etc/systemd/system/user@.service.d/dbus.conf"
|
|
|
|
[Unit]
|
|
|
|
After=dbus.service
|
|
|
|
EOF
|
|
|
|
|
|
|
|
# Newer Fedora versions use dbus-broker by default. Let's install it if it's available.
|
2020-12-23 01:47:39 +08:00
|
|
|
if [ -f $userunitdir/dbus-broker.service ]; then
|
|
|
|
inst $userunitdir/dbus-broker.service
|
2019-11-14 02:32:24 +08:00
|
|
|
inst_symlink /etc/systemd/user/dbus.service
|
|
|
|
elif [ -f $ROOTLIBDIR/system/dbus-daemon.service ]; then
|
|
|
|
# Fedora rawhide replaced dbus.service with dbus-daemon.service
|
2020-12-23 01:47:39 +08:00
|
|
|
inst $userunitdir/dbus-daemon.service
|
2019-11-14 02:32:24 +08:00
|
|
|
# Alias symlink
|
|
|
|
inst_symlink /etc/systemd/user/dbus.service
|
|
|
|
else
|
2020-12-23 01:47:39 +08:00
|
|
|
inst $userunitdir/dbus.service
|
2019-11-14 02:32:24 +08:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
install_pam() {
|
2015-11-16 04:38:56 +08:00
|
|
|
(
|
2017-08-08 03:09:21 +08:00
|
|
|
if [[ "$LOOKS_LIKE_DEBIAN" ]] && type -p dpkg-architecture &>/dev/null; then
|
|
|
|
find "/lib/$(dpkg-architecture -qDEB_HOST_MULTIARCH)/security" -xtype f
|
|
|
|
else
|
|
|
|
find /lib*/security -xtype f
|
|
|
|
fi
|
2020-11-21 02:41:03 +08:00
|
|
|
for d in /etc/pam.d /etc/security /usr/lib/pam.d; do
|
|
|
|
[ -d "$d" ] && find $d -xtype f
|
|
|
|
done
|
2015-11-16 04:38:56 +08:00
|
|
|
) | while read file; do
|
2013-11-06 06:32:56 +08:00
|
|
|
inst $file
|
|
|
|
done
|
2015-11-17 07:58:20 +08:00
|
|
|
|
2016-01-25 13:00:34 +08:00
|
|
|
# pam_unix depends on unix_chkpwd.
|
|
|
|
# see http://www.linux-pam.org/Linux-PAM-html/sag-pam_unix.html
|
|
|
|
dracut_install -o unix_chkpwd
|
|
|
|
|
2016-04-26 02:03:27 +08:00
|
|
|
# set empty root password for easy debugging
|
|
|
|
sed -i 's/^root:x:/root::/' $initdir/etc/passwd
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
install_keymaps() {
|
2018-09-19 09:54:16 +08:00
|
|
|
# The first three paths may be deprecated.
|
|
|
|
# It seems now the last two paths are used by many distributions.
|
2013-11-06 06:32:56 +08:00
|
|
|
for i in \
|
|
|
|
/usr/lib/kbd/keymaps/include/* \
|
|
|
|
/usr/lib/kbd/keymaps/i386/include/* \
|
2018-09-19 09:54:16 +08:00
|
|
|
/usr/lib/kbd/keymaps/i386/qwerty/us.* \
|
|
|
|
/usr/lib/kbd/keymaps/legacy/include/* \
|
|
|
|
/usr/lib/kbd/keymaps/legacy/i386/qwerty/us.*; do
|
2013-11-06 06:32:56 +08:00
|
|
|
[[ -f $i ]] || continue
|
|
|
|
inst $i
|
|
|
|
done
|
2018-09-19 09:54:28 +08:00
|
|
|
|
|
|
|
# When it takes any argument, then install more keymaps.
|
|
|
|
if [[ -n $1 ]]; then
|
|
|
|
for i in \
|
|
|
|
/usr/lib/kbd/keymaps/i386/*/* \
|
|
|
|
/usr/lib/kbd/keymaps/legacy/i386/*/*; do
|
|
|
|
[[ -f $i ]] || continue
|
|
|
|
inst $i
|
|
|
|
done
|
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2018-09-12 17:20:31 +08:00
|
|
|
install_zoneinfo() {
|
2019-12-10 22:31:09 +08:00
|
|
|
inst_any /usr/share/zoneinfo/Asia/Seoul
|
|
|
|
inst_any /usr/share/zoneinfo/Asia/Vladivostok
|
|
|
|
inst_any /usr/share/zoneinfo/Australia/Sydney
|
|
|
|
inst_any /usr/share/zoneinfo/Europe/Berlin
|
|
|
|
inst_any /usr/share/zoneinfo/Europe/Kiev
|
|
|
|
inst_any /usr/share/zoneinfo/Pacific/Auckland
|
|
|
|
inst_any /usr/share/zoneinfo/Pacific/Honolulu
|
|
|
|
inst_any /usr/share/zoneinfo/CET
|
|
|
|
inst_any /usr/share/zoneinfo/EET
|
|
|
|
inst_any /usr/share/zoneinfo/UTC
|
2018-09-12 17:20:31 +08:00
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
install_fonts() {
|
|
|
|
for i in \
|
2015-01-15 20:44:17 +08:00
|
|
|
/usr/lib/kbd/consolefonts/eurlatgr* \
|
2013-11-06 06:32:56 +08:00
|
|
|
/usr/lib/kbd/consolefonts/latarcyrheb-sun16*; do
|
|
|
|
[[ -f $i ]] || continue
|
|
|
|
inst $i
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
install_terminfo() {
|
|
|
|
for _terminfodir in /lib/terminfo /etc/terminfo /usr/share/terminfo; do
|
|
|
|
[ -f ${_terminfodir}/l/linux ] && break
|
|
|
|
done
|
|
|
|
dracut_install -o ${_terminfodir}/l/linux
|
|
|
|
}
|
|
|
|
|
2019-11-14 02:32:24 +08:00
|
|
|
has_user_dbus_socket() {
|
|
|
|
if [ -f /usr/lib/systemd/user/dbus.socket ] || [ -f /etc/systemd/user/dbus.socket ]; then
|
|
|
|
return 0
|
|
|
|
else
|
|
|
|
echo "Per-user instances are not supported. Skipping..."
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
setup_nspawn_root() {
|
2019-12-12 16:37:19 +08:00
|
|
|
if [ -z "${initdir}" ]; then
|
|
|
|
dfatal "\$initdir not defined"
|
|
|
|
exit 1
|
|
|
|
fi
|
2019-12-13 21:21:31 +08:00
|
|
|
|
2020-03-21 02:09:35 +08:00
|
|
|
rm -rf "$TESTDIR/unprivileged-nspawn-root"
|
|
|
|
|
2018-08-30 12:01:18 +08:00
|
|
|
if [[ "$RUN_IN_UNPRIVILEGED_CONTAINER" = "yes" ]]; then
|
2019-12-13 21:21:31 +08:00
|
|
|
ddebug "cp -ar $initdir $TESTDIR/unprivileged-nspawn-root"
|
|
|
|
cp -ar $initdir $TESTDIR/unprivileged-nspawn-root
|
2018-08-30 12:01:18 +08:00
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2012-05-26 00:32:55 +08:00
|
|
|
setup_basic_dirs() {
|
2013-11-06 06:32:56 +08:00
|
|
|
mkdir -p $initdir/run
|
|
|
|
mkdir -p $initdir/etc/systemd/system
|
|
|
|
mkdir -p $initdir/var/log/journal
|
|
|
|
|
2021-02-03 05:13:44 +08:00
|
|
|
for d in usr/bin usr/sbin bin etc lib "$libdir" sbin tmp usr var var/log var/tmp dev proc sys sysroot root run run/lock run/initramfs; do
|
2012-05-22 00:55:48 +08:00
|
|
|
if [ -L "/$d" ]; then
|
|
|
|
inst_symlink "/$d"
|
|
|
|
else
|
2012-05-26 00:32:55 +08:00
|
|
|
inst_dir "/$d"
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
ln -sfn /run "$initdir/var/run"
|
|
|
|
ln -sfn /run/lock "$initdir/var/lock"
|
|
|
|
}
|
|
|
|
|
2019-10-08 15:10:12 +08:00
|
|
|
mask_supporting_services() {
|
|
|
|
# mask some services that we do not want to run in these tests
|
|
|
|
ln -fs /dev/null $initdir/etc/systemd/system/systemd-hwdb-update.service
|
|
|
|
ln -fs /dev/null $initdir/etc/systemd/system/systemd-journal-catalog-update.service
|
|
|
|
ln -fs /dev/null $initdir/etc/systemd/system/systemd-networkd.service
|
|
|
|
ln -fs /dev/null $initdir/etc/systemd/system/systemd-networkd.socket
|
|
|
|
ln -fs /dev/null $initdir/etc/systemd/system/systemd-resolved.service
|
|
|
|
}
|
|
|
|
|
2012-05-22 00:55:48 +08:00
|
|
|
inst_libs() {
|
|
|
|
local _bin=$1
|
|
|
|
local _so_regex='([^ ]*/lib[^/]*/[^ ]*\.so[^ ]*)'
|
|
|
|
local _file _line
|
|
|
|
|
|
|
|
LC_ALL=C ldd "$_bin" 2>/dev/null | while read _line; do
|
|
|
|
[[ $_line = 'not a dynamic executable' ]] && break
|
|
|
|
|
|
|
|
if [[ $_line =~ $_so_regex ]]; then
|
|
|
|
_file=${BASH_REMATCH[1]}
|
|
|
|
[[ -e ${initdir}/$_file ]] && continue
|
|
|
|
inst_library "$_file"
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [[ $_line =~ not\ found ]]; then
|
|
|
|
dfatal "Missing a shared library required by $_bin."
|
|
|
|
dfatal "Run \"ldd $_bin\" to find out what it is."
|
|
|
|
dfatal "$_line"
|
|
|
|
dfatal "dracut cannot create an initrd."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
import_testdir() {
|
2020-03-21 03:17:11 +08:00
|
|
|
# make sure we don't get a stale LOOPDEV value from old times
|
|
|
|
__LOOPDEV=$LOOPDEV
|
2012-05-22 00:55:48 +08:00
|
|
|
[[ -e $STATEFILE ]] && . $STATEFILE
|
2020-03-21 03:17:11 +08:00
|
|
|
LOOPDEV=$__LOOPDEV
|
2019-03-13 05:44:25 +08:00
|
|
|
if [[ ! -d "$TESTDIR" ]]; then
|
|
|
|
if [[ -z "$TESTDIR" ]]; then
|
|
|
|
TESTDIR=$(mktemp --tmpdir=/var/tmp -d -t systemd-test.XXXXXX)
|
|
|
|
else
|
|
|
|
mkdir -p "$TESTDIR"
|
|
|
|
fi
|
|
|
|
|
2019-12-12 16:37:19 +08:00
|
|
|
cat >$STATEFILE<<EOF
|
|
|
|
TESTDIR="$TESTDIR"
|
|
|
|
EOF
|
2012-05-22 00:55:48 +08:00
|
|
|
export TESTDIR
|
|
|
|
fi
|
2020-05-17 16:46:34 +08:00
|
|
|
|
|
|
|
IMAGE_PRIVATE="${TESTDIR}/${IMAGE_NAME}.img"
|
|
|
|
IMAGE_PUBLIC="${IMAGESTATEDIR}/${IMAGE_NAME}.img"
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
import_initdir() {
|
|
|
|
initdir=$TESTDIR/root
|
2019-08-18 00:24:00 +08:00
|
|
|
mkdir -p $initdir
|
2013-11-06 06:32:56 +08:00
|
|
|
export initdir
|
|
|
|
}
|
|
|
|
|
2012-05-22 00:55:48 +08:00
|
|
|
## @brief Converts numeric logging level to the first letter of level name.
|
|
|
|
#
|
|
|
|
# @param lvl Numeric logging level in range from 1 to 6.
|
|
|
|
# @retval 1 if @a lvl is out of range.
|
|
|
|
# @retval 0 if @a lvl is correct.
|
|
|
|
# @result Echoes first letter of level name.
|
|
|
|
_lvl2char() {
|
|
|
|
case "$1" in
|
|
|
|
1) echo F;;
|
|
|
|
2) echo E;;
|
|
|
|
3) echo W;;
|
|
|
|
4) echo I;;
|
|
|
|
5) echo D;;
|
|
|
|
6) echo T;;
|
|
|
|
*) return 1;;
|
|
|
|
esac
|
|
|
|
}
|
|
|
|
|
|
|
|
## @brief Internal helper function for _do_dlog()
|
|
|
|
#
|
|
|
|
# @param lvl Numeric logging level.
|
|
|
|
# @param msg Message.
|
|
|
|
# @retval 0 It's always returned, even if logging failed.
|
|
|
|
#
|
|
|
|
# @note This function is not supposed to be called manually. Please use
|
|
|
|
# dtrace(), ddebug(), or others instead which wrap this one.
|
|
|
|
#
|
|
|
|
# This function calls _do_dlog() either with parameter msg, or if
|
|
|
|
# none is given, it will read standard input and will use every line as
|
|
|
|
# a message.
|
|
|
|
#
|
|
|
|
# This enables:
|
|
|
|
# dwarn "This is a warning"
|
|
|
|
# echo "This is a warning" | dwarn
|
2018-10-23 15:09:23 +08:00
|
|
|
LOG_LEVEL=${LOG_LEVEL:-4}
|
2012-05-22 00:55:48 +08:00
|
|
|
|
|
|
|
dlog() {
|
|
|
|
[ -z "$LOG_LEVEL" ] && return 0
|
|
|
|
[ $1 -le $LOG_LEVEL ] || return 0
|
|
|
|
local lvl="$1"; shift
|
|
|
|
local lvlc=$(_lvl2char "$lvl") || return 0
|
|
|
|
|
|
|
|
if [ $# -ge 1 ]; then
|
|
|
|
echo "$lvlc: $*"
|
|
|
|
else
|
|
|
|
while read line; do
|
|
|
|
echo "$lvlc: " "$line"
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
## @brief Logs message at TRACE level (6)
|
|
|
|
#
|
|
|
|
# @param msg Message.
|
|
|
|
# @retval 0 It's always returned, even if logging failed.
|
|
|
|
dtrace() {
|
|
|
|
set +x
|
|
|
|
dlog 6 "$@"
|
|
|
|
[ -n "$debug" ] && set -x || :
|
|
|
|
}
|
|
|
|
|
|
|
|
## @brief Logs message at DEBUG level (5)
|
|
|
|
#
|
|
|
|
# @param msg Message.
|
|
|
|
# @retval 0 It's always returned, even if logging failed.
|
|
|
|
ddebug() {
|
2012-05-26 00:32:55 +08:00
|
|
|
# set +x
|
2012-05-22 00:55:48 +08:00
|
|
|
dlog 5 "$@"
|
2012-05-26 00:32:55 +08:00
|
|
|
# [ -n "$debug" ] && set -x || :
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
## @brief Logs message at INFO level (4)
|
|
|
|
#
|
|
|
|
# @param msg Message.
|
|
|
|
# @retval 0 It's always returned, even if logging failed.
|
|
|
|
dinfo() {
|
|
|
|
set +x
|
|
|
|
dlog 4 "$@"
|
|
|
|
[ -n "$debug" ] && set -x || :
|
|
|
|
}
|
|
|
|
|
|
|
|
## @brief Logs message at WARN level (3)
|
|
|
|
#
|
|
|
|
# @param msg Message.
|
|
|
|
# @retval 0 It's always returned, even if logging failed.
|
|
|
|
dwarn() {
|
|
|
|
set +x
|
|
|
|
dlog 3 "$@"
|
|
|
|
[ -n "$debug" ] && set -x || :
|
|
|
|
}
|
|
|
|
|
|
|
|
## @brief Logs message at ERROR level (2)
|
|
|
|
#
|
|
|
|
# @param msg Message.
|
|
|
|
# @retval 0 It's always returned, even if logging failed.
|
|
|
|
derror() {
|
2012-05-26 00:32:55 +08:00
|
|
|
# set +x
|
2012-05-22 00:55:48 +08:00
|
|
|
dlog 2 "$@"
|
2012-05-26 00:32:55 +08:00
|
|
|
# [ -n "$debug" ] && set -x || :
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
## @brief Logs message at FATAL level (1)
|
|
|
|
#
|
|
|
|
# @param msg Message.
|
|
|
|
# @retval 0 It's always returned, even if logging failed.
|
|
|
|
dfatal() {
|
|
|
|
set +x
|
|
|
|
dlog 1 "$@"
|
|
|
|
[ -n "$debug" ] && set -x || :
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
# Generic substring function. If $2 is in $1, return 0.
|
|
|
|
strstr() { [ "${1#*$2*}" != "$1" ]; }
|
|
|
|
|
|
|
|
# normalize_path <path>
|
|
|
|
# Prints the normalized path, where it removes any duplicated
|
|
|
|
# and trailing slashes.
|
|
|
|
# Example:
|
|
|
|
# $ normalize_path ///test/test//
|
|
|
|
# /test/test
|
|
|
|
normalize_path() {
|
|
|
|
shopt -q -s extglob
|
|
|
|
set -- "${1//+(\/)//}"
|
|
|
|
shopt -q -u extglob
|
|
|
|
echo "${1%/}"
|
|
|
|
}
|
|
|
|
|
|
|
|
# convert_abs_rel <from> <to>
|
|
|
|
# Prints the relative path, when creating a symlink to <to> from <from>.
|
|
|
|
# Example:
|
|
|
|
# $ convert_abs_rel /usr/bin/test /bin/test-2
|
|
|
|
# ../../bin/test-2
|
|
|
|
# $ ln -s $(convert_abs_rel /usr/bin/test /bin/test-2) /usr/bin/test
|
|
|
|
convert_abs_rel() {
|
|
|
|
local __current __absolute __abssize __cursize __newpath
|
|
|
|
local -i __i __level
|
|
|
|
|
|
|
|
set -- "$(normalize_path "$1")" "$(normalize_path "$2")"
|
|
|
|
|
|
|
|
# corner case #1 - self looping link
|
|
|
|
[[ "$1" == "$2" ]] && { echo "${1##*/}"; return; }
|
|
|
|
|
|
|
|
# corner case #2 - own dir link
|
|
|
|
[[ "${1%/*}" == "$2" ]] && { echo "."; return; }
|
|
|
|
|
|
|
|
IFS="/" __current=($1)
|
|
|
|
IFS="/" __absolute=($2)
|
|
|
|
|
|
|
|
__abssize=${#__absolute[@]}
|
|
|
|
__cursize=${#__current[@]}
|
|
|
|
|
|
|
|
while [[ ${__absolute[__level]} == ${__current[__level]} ]]
|
|
|
|
do
|
|
|
|
(( __level++ ))
|
|
|
|
if (( __level > __abssize || __level > __cursize ))
|
|
|
|
then
|
|
|
|
break
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
for ((__i = __level; __i < __cursize-1; __i++))
|
|
|
|
do
|
|
|
|
if ((__i > __level))
|
|
|
|
then
|
|
|
|
__newpath=$__newpath"/"
|
|
|
|
fi
|
|
|
|
__newpath=$__newpath".."
|
|
|
|
done
|
|
|
|
|
|
|
|
for ((__i = __level; __i < __abssize; __i++))
|
|
|
|
do
|
|
|
|
if [[ -n $__newpath ]]
|
|
|
|
then
|
|
|
|
__newpath=$__newpath"/"
|
|
|
|
fi
|
|
|
|
__newpath=$__newpath${__absolute[__i]}
|
|
|
|
done
|
|
|
|
|
|
|
|
echo "$__newpath"
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
# Install a directory, keeping symlinks as on the original system.
|
|
|
|
# Example: if /lib points to /lib64 on the host, "inst_dir /lib/file"
|
|
|
|
# will create ${initdir}/lib64, ${initdir}/lib64/file,
|
|
|
|
# and a symlink ${initdir}/lib -> lib64.
|
|
|
|
inst_dir() {
|
|
|
|
[[ -e ${initdir}/"$1" ]] && return 0 # already there
|
|
|
|
|
|
|
|
local _dir="$1" _part="${1%/*}" _file
|
|
|
|
while [[ "$_part" != "${_part%/*}" ]] && ! [[ -e "${initdir}/${_part}" ]]; do
|
|
|
|
_dir="$_part $_dir"
|
|
|
|
_part=${_part%/*}
|
|
|
|
done
|
|
|
|
|
|
|
|
# iterate over parent directories
|
|
|
|
for _file in $_dir; do
|
|
|
|
[[ -e "${initdir}/$_file" ]] && continue
|
|
|
|
if [[ -L $_file ]]; then
|
|
|
|
inst_symlink "$_file"
|
|
|
|
else
|
|
|
|
# create directory
|
|
|
|
mkdir -m 0755 -p "${initdir}/$_file" || return 1
|
|
|
|
[[ -e "$_file" ]] && chmod --reference="$_file" "${initdir}/$_file"
|
|
|
|
chmod u+w "${initdir}/$_file"
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
# $1 = file to copy to ramdisk
|
|
|
|
# $2 (optional) Name for the file on the ramdisk
|
|
|
|
# Location of the image dir is assumed to be $initdir
|
|
|
|
# We never overwrite the target if it exists.
|
|
|
|
inst_simple() {
|
|
|
|
[[ -f "$1" ]] || return 1
|
|
|
|
strstr "$1" "/" || return 1
|
|
|
|
|
|
|
|
local _src=$1 target="${2:-$1}"
|
|
|
|
if ! [[ -d ${initdir}/$target ]]; then
|
|
|
|
[[ -e ${initdir}/$target ]] && return 0
|
|
|
|
[[ -L ${initdir}/$target ]] && return 0
|
|
|
|
[[ -d "${initdir}/${target%/*}" ]] || inst_dir "${target%/*}"
|
|
|
|
fi
|
|
|
|
# install checksum files also
|
|
|
|
if [[ -e "${_src%/*}/.${_src##*/}.hmac" ]]; then
|
|
|
|
inst "${_src%/*}/.${_src##*/}.hmac" "${target%/*}/.${target##*/}.hmac"
|
|
|
|
fi
|
|
|
|
ddebug "Installing $_src"
|
|
|
|
cp --sparse=always -pfL "$_src" "${initdir}/$target"
|
|
|
|
}
|
|
|
|
|
|
|
|
# find symlinks linked to given library file
|
|
|
|
# $1 = library file
|
|
|
|
# Function searches for symlinks by stripping version numbers appended to
|
|
|
|
# library filename, checks if it points to the same target and finally
|
|
|
|
# prints the list of symlinks to stdout.
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
# rev_lib_symlinks libfoo.so.8.1
|
|
|
|
# output: libfoo.so.8 libfoo.so
|
|
|
|
# (Only if libfoo.so.8 and libfoo.so exists on host system.)
|
|
|
|
rev_lib_symlinks() {
|
|
|
|
[[ ! $1 ]] && return 0
|
|
|
|
|
|
|
|
local fn="$1" orig="$(readlink -f "$1")" links=''
|
|
|
|
|
|
|
|
[[ ${fn} =~ .*\.so\..* ]] || return 1
|
|
|
|
|
|
|
|
until [[ ${fn##*.} == so ]]; do
|
|
|
|
fn="${fn%.*}"
|
|
|
|
[[ -L ${fn} && $(readlink -f "${fn}") == ${orig} ]] && links+=" ${fn}"
|
|
|
|
done
|
|
|
|
|
|
|
|
echo "${links}"
|
|
|
|
}
|
|
|
|
|
|
|
|
# Same as above, but specialized to handle dynamic libraries.
|
|
|
|
# It handles making symlinks according to how the original library
|
|
|
|
# is referenced.
|
|
|
|
inst_library() {
|
|
|
|
local _src="$1" _dest=${2:-$1} _lib _reallib _symlink
|
|
|
|
strstr "$1" "/" || return 1
|
|
|
|
[[ -e $initdir/$_dest ]] && return 0
|
|
|
|
if [[ -L $_src ]]; then
|
|
|
|
# install checksum files also
|
|
|
|
if [[ -e "${_src%/*}/.${_src##*/}.hmac" ]]; then
|
|
|
|
inst "${_src%/*}/.${_src##*/}.hmac" "${_dest%/*}/.${_dest##*/}.hmac"
|
|
|
|
fi
|
|
|
|
_reallib=$(readlink -f "$_src")
|
|
|
|
inst_simple "$_reallib" "$_reallib"
|
|
|
|
inst_dir "${_dest%/*}"
|
|
|
|
[[ -d "${_dest%/*}" ]] && _dest=$(readlink -f "${_dest%/*}")/${_dest##*/}
|
|
|
|
ln -sfn $(convert_abs_rel "${_dest}" "${_reallib}") "${initdir}/${_dest}"
|
|
|
|
else
|
|
|
|
inst_simple "$_src" "$_dest"
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Create additional symlinks. See rev_symlinks description.
|
|
|
|
for _symlink in $(rev_lib_symlinks $_src) $(rev_lib_symlinks $_reallib); do
|
2017-08-08 03:09:21 +08:00
|
|
|
[[ -e $initdir/$_symlink ]] || {
|
2012-05-22 00:55:48 +08:00
|
|
|
ddebug "Creating extra symlink: $_symlink"
|
|
|
|
inst_symlink $_symlink
|
|
|
|
}
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
# find a binary. If we were not passed the full path directly,
|
|
|
|
# search in the usual places to find the binary.
|
|
|
|
find_binary() {
|
|
|
|
if [[ -z ${1##/*} ]]; then
|
|
|
|
if [[ -x $1 ]] || { strstr "$1" ".so" && ldd $1 &>/dev/null; }; then
|
|
|
|
echo $1
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
type -P $1
|
|
|
|
}
|
|
|
|
|
|
|
|
# Same as above, but specialized to install binary executables.
|
|
|
|
# Install binary executable, and all shared library dependencies, if any.
|
|
|
|
inst_binary() {
|
|
|
|
local _bin _target
|
2019-07-09 03:05:51 +08:00
|
|
|
|
|
|
|
# In certain cases we might attempt to install a binary which is already
|
|
|
|
# present in the test image, yet it's missing from the host system.
|
|
|
|
# In such cases, let's check if the binary indeed exists in the image
|
|
|
|
# before doing any other chcecks. If it does, immediately return with
|
|
|
|
# success.
|
2020-12-23 01:50:34 +08:00
|
|
|
[[ $# -eq 1 && -e $initdir/$1 || -e $initdir/bin/$1 || -e $initdir/sbin/$1 || -e $initdir/usr/bin/$1 || -e $initdir/usr/sbin/$1 ]] && return 0
|
2019-07-09 03:05:51 +08:00
|
|
|
|
2012-05-22 00:55:48 +08:00
|
|
|
_bin=$(find_binary "$1") || return 1
|
|
|
|
_target=${2:-$_bin}
|
|
|
|
[[ -e $initdir/$_target ]] && return 0
|
|
|
|
[[ -L $_bin ]] && inst_symlink $_bin $_target && return 0
|
|
|
|
local _file _line
|
|
|
|
local _so_regex='([^ ]*/lib[^/]*/[^ ]*\.so[^ ]*)'
|
|
|
|
# I love bash!
|
|
|
|
LC_ALL=C ldd "$_bin" 2>/dev/null | while read _line; do
|
|
|
|
[[ $_line = 'not a dynamic executable' ]] && break
|
|
|
|
|
|
|
|
if [[ $_line =~ $_so_regex ]]; then
|
|
|
|
_file=${BASH_REMATCH[1]}
|
|
|
|
[[ -e ${initdir}/$_file ]] && continue
|
|
|
|
inst_library "$_file"
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [[ $_line =~ not\ found ]]; then
|
|
|
|
dfatal "Missing a shared library required by $_bin."
|
|
|
|
dfatal "Run \"ldd $_bin\" to find out what it is."
|
|
|
|
dfatal "$_line"
|
|
|
|
dfatal "dracut cannot create an initrd."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
inst_simple "$_bin" "$_target"
|
|
|
|
}
|
|
|
|
|
|
|
|
# same as above, except for shell scripts.
|
|
|
|
# If your shell script does not start with shebang, it is not a shell script.
|
|
|
|
inst_script() {
|
|
|
|
local _bin
|
|
|
|
_bin=$(find_binary "$1") || return 1
|
|
|
|
shift
|
|
|
|
local _line _shebang_regex
|
|
|
|
read -r -n 80 _line <"$_bin"
|
|
|
|
# If debug is set, clean unprintable chars to prevent messing up the term
|
|
|
|
[[ $debug ]] && _line=$(echo -n "$_line" | tr -c -d '[:print:][:space:]')
|
|
|
|
_shebang_regex='(#! *)(/[^ ]+).*'
|
|
|
|
[[ $_line =~ $_shebang_regex ]] || return 1
|
|
|
|
inst "${BASH_REMATCH[2]}" && inst_simple "$_bin" "$@"
|
|
|
|
}
|
|
|
|
|
|
|
|
# same as above, but specialized for symlinks
|
|
|
|
inst_symlink() {
|
|
|
|
local _src=$1 _target=${2:-$1} _realsrc
|
|
|
|
strstr "$1" "/" || return 1
|
|
|
|
[[ -L $1 ]] || return 1
|
|
|
|
[[ -L $initdir/$_target ]] && return 0
|
|
|
|
_realsrc=$(readlink -f "$_src")
|
|
|
|
if ! [[ -e $initdir/$_realsrc ]]; then
|
|
|
|
if [[ -d $_realsrc ]]; then
|
|
|
|
inst_dir "$_realsrc"
|
|
|
|
else
|
|
|
|
inst "$_realsrc"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
[[ ! -e $initdir/${_target%/*} ]] && inst_dir "${_target%/*}"
|
|
|
|
[[ -d ${_target%/*} ]] && _target=$(readlink -f ${_target%/*})/${_target##*/}
|
|
|
|
ln -sfn $(convert_abs_rel "${_target}" "${_realsrc}") "$initdir/$_target"
|
|
|
|
}
|
|
|
|
|
|
|
|
# attempt to install any programs specified in a udev rule
|
|
|
|
inst_rule_programs() {
|
|
|
|
local _prog _bin
|
|
|
|
|
|
|
|
if grep -qE 'PROGRAM==?"[^ "]+' "$1"; then
|
|
|
|
for _prog in $(grep -E 'PROGRAM==?"[^ "]+' "$1" | sed -r 's/.*PROGRAM==?"([^ "]+).*/\1/'); do
|
|
|
|
if [ -x /lib/udev/$_prog ]; then
|
|
|
|
_bin=/lib/udev/$_prog
|
|
|
|
else
|
|
|
|
_bin=$(find_binary "$_prog") || {
|
|
|
|
dinfo "Skipping program $_prog using in udev rule $(basename $1) as it cannot be found"
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
fi
|
|
|
|
|
|
|
|
#dinfo "Installing $_bin due to it's use in the udev rule $(basename $1)"
|
|
|
|
dracut_install "$_bin"
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# udev rules always get installed in the same place, so
|
|
|
|
# create a function to install them to make life simpler.
|
|
|
|
inst_rules() {
|
|
|
|
local _target=/etc/udev/rules.d _rule _found
|
|
|
|
|
|
|
|
inst_dir "/lib/udev/rules.d"
|
|
|
|
inst_dir "$_target"
|
|
|
|
for _rule in "$@"; do
|
|
|
|
if [ "${rule#/}" = "$rule" ]; then
|
|
|
|
for r in /lib/udev/rules.d /etc/udev/rules.d; do
|
|
|
|
if [[ -f $r/$_rule ]]; then
|
|
|
|
_found="$r/$_rule"
|
|
|
|
inst_simple "$_found"
|
|
|
|
inst_rule_programs "$_found"
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
for r in '' ./ $dracutbasedir/rules.d/; do
|
|
|
|
if [[ -f ${r}$_rule ]]; then
|
|
|
|
_found="${r}$_rule"
|
|
|
|
inst_simple "$_found" "$_target/${_found##*/}"
|
|
|
|
inst_rule_programs "$_found"
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
[[ $_found ]] || dinfo "Skipping udev rule: $_rule"
|
2018-02-16 21:26:26 +08:00
|
|
|
_found=
|
2012-05-22 00:55:48 +08:00
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
# general purpose installation function
|
|
|
|
# Same args as above.
|
|
|
|
inst() {
|
|
|
|
local _x
|
|
|
|
|
|
|
|
case $# in
|
|
|
|
1) ;;
|
|
|
|
2) [[ ! $initdir && -d $2 ]] && export initdir=$2
|
|
|
|
[[ $initdir = $2 ]] && set $1;;
|
|
|
|
3) [[ -z $initdir ]] && export initdir=$2
|
|
|
|
set $1 $3;;
|
|
|
|
*) dfatal "inst only takes 1 or 2 or 3 arguments"
|
|
|
|
exit 1;;
|
|
|
|
esac
|
|
|
|
for _x in inst_symlink inst_script inst_binary inst_simple; do
|
|
|
|
$_x "$@" && return 0
|
|
|
|
done
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
# install any of listed files
|
|
|
|
#
|
|
|
|
# If first argument is '-d' and second some destination path, first accessible
|
|
|
|
# source is installed into this path, otherwise it will installed in the same
|
|
|
|
# path as source. If none of listed files was installed, function return 1.
|
|
|
|
# On first successful installation it returns with 0 status.
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
#
|
|
|
|
# inst_any -d /bin/foo /bin/bar /bin/baz
|
|
|
|
#
|
|
|
|
# Lets assume that /bin/baz exists, so it will be installed as /bin/foo in
|
|
|
|
# initramfs.
|
|
|
|
inst_any() {
|
|
|
|
local to f
|
|
|
|
|
|
|
|
[[ $1 = '-d' ]] && to="$2" && shift 2
|
|
|
|
|
|
|
|
for f in "$@"; do
|
|
|
|
if [[ -e $f ]]; then
|
|
|
|
[[ $to ]] && inst "$f" "$to" && return 0
|
|
|
|
inst "$f" && return 0
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
# dracut_install [-o ] <file> [<file> ... ]
|
|
|
|
# Install <file> to the initramfs image
|
|
|
|
# -o optionally install the <file> and don't fail, if it is not there
|
|
|
|
dracut_install() {
|
|
|
|
local _optional=no
|
|
|
|
if [[ $1 = '-o' ]]; then
|
|
|
|
_optional=yes
|
|
|
|
shift
|
|
|
|
fi
|
|
|
|
while (($# > 0)); do
|
|
|
|
if ! inst "$1" ; then
|
|
|
|
if [[ $_optional = yes ]]; then
|
|
|
|
dinfo "Skipping program $1 as it cannot be found and is" \
|
|
|
|
"flagged to be optional"
|
|
|
|
else
|
|
|
|
dfatal "Failed to install $1"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
shift
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2012-05-26 00:32:55 +08:00
|
|
|
# Install a single kernel module along with any firmware it may require.
|
|
|
|
# $1 = full path to kernel module to install
|
|
|
|
install_kmod_with_fw() {
|
|
|
|
# no need to go further if the module is already installed
|
|
|
|
|
|
|
|
[[ -e "${initdir}/lib/modules/$KERNEL_VER/${1##*/lib/modules/$KERNEL_VER/}" ]] \
|
|
|
|
&& return 0
|
|
|
|
|
|
|
|
[[ -e "$initdir/.kernelmodseen/${1##*/}" ]] && return 0
|
|
|
|
|
|
|
|
if [[ $omit_drivers ]]; then
|
|
|
|
local _kmod=${1##*/}
|
|
|
|
_kmod=${_kmod%.ko}
|
|
|
|
_kmod=${_kmod/-/_}
|
|
|
|
if [[ "$_kmod" =~ $omit_drivers ]]; then
|
|
|
|
dinfo "Omitting driver $_kmod"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
if [[ "${1##*/lib/modules/$KERNEL_VER/}" =~ $omit_drivers ]]; then
|
|
|
|
dinfo "Omitting driver $_kmod"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
[ -d "$initdir/.kernelmodseen" ] && \
|
|
|
|
> "$initdir/.kernelmodseen/${1##*/}"
|
|
|
|
|
|
|
|
inst_simple "$1" "/lib/modules/$KERNEL_VER/${1##*/lib/modules/$KERNEL_VER/}" \
|
|
|
|
|| return $?
|
|
|
|
|
|
|
|
local _modname=${1##*/} _fwdir _found _fw
|
|
|
|
_modname=${_modname%.ko*}
|
|
|
|
for _fw in $(modinfo -k $KERNEL_VER -F firmware $1 2>/dev/null); do
|
|
|
|
_found=''
|
|
|
|
for _fwdir in $fw_dir; do
|
|
|
|
if [[ -d $_fwdir && -f $_fwdir/$_fw ]]; then
|
|
|
|
inst_simple "$_fwdir/$_fw" "/lib/firmware/$_fw"
|
|
|
|
_found=yes
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
if [[ $_found != yes ]]; then
|
|
|
|
if ! grep -qe "\<${_modname//-/_}\>" /proc/modules; then
|
|
|
|
dinfo "Possible missing firmware \"${_fw}\" for kernel module" \
|
|
|
|
"\"${_modname}.ko\""
|
|
|
|
else
|
|
|
|
dwarn "Possible missing firmware \"${_fw}\" for kernel module" \
|
|
|
|
"\"${_modname}.ko\""
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
# Do something with all the dependencies of a kernel module.
|
|
|
|
# Note that kernel modules depend on themselves using the technique we use
|
|
|
|
# $1 = function to call for each dependency we find
|
|
|
|
# It will be passed the full path to the found kernel module
|
|
|
|
# $2 = module to get dependencies for
|
|
|
|
# rest of args = arguments to modprobe
|
|
|
|
# _fderr specifies FD passed from surrounding scope
|
|
|
|
for_each_kmod_dep() {
|
|
|
|
local _func=$1 _kmod=$2 _cmd _modpath _options _found=0
|
|
|
|
shift 2
|
|
|
|
modprobe "$@" --ignore-install --show-depends $_kmod 2>&${_fderr} | (
|
|
|
|
while read _cmd _modpath _options; do
|
|
|
|
[[ $_cmd = insmod ]] || continue
|
|
|
|
$_func ${_modpath} || exit $?
|
|
|
|
_found=1
|
|
|
|
done
|
|
|
|
[[ $_found -eq 0 ]] && exit 1
|
|
|
|
exit 0
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
# filter kernel modules to install certain modules that meet specific
|
|
|
|
# requirements.
|
|
|
|
# $1 = search only in subdirectory of /kernel/$1
|
|
|
|
# $2 = function to call with module name to filter.
|
|
|
|
# This function will be passed the full path to the module to test.
|
2012-09-05 01:24:16 +08:00
|
|
|
# The behavior of this function can vary depending on whether $hostonly is set.
|
2012-05-26 00:32:55 +08:00
|
|
|
# If it is, we will only look at modules that are already in memory.
|
|
|
|
# If it is not, we will look at all kernel modules
|
|
|
|
# This function returns the full filenames of modules that match $1
|
|
|
|
filter_kernel_modules_by_path () (
|
|
|
|
local _modname _filtercmd
|
|
|
|
if ! [[ $hostonly ]]; then
|
|
|
|
_filtercmd='find "$KERNEL_MODS/kernel/$1" "$KERNEL_MODS/extra"'
|
|
|
|
_filtercmd+=' "$KERNEL_MODS/weak-updates" -name "*.ko" -o -name "*.ko.gz"'
|
|
|
|
_filtercmd+=' -o -name "*.ko.xz"'
|
|
|
|
_filtercmd+=' 2>/dev/null'
|
|
|
|
else
|
|
|
|
_filtercmd='cut -d " " -f 1 </proc/modules|xargs modinfo -F filename '
|
|
|
|
_filtercmd+='-k $KERNEL_VER 2>/dev/null'
|
|
|
|
fi
|
|
|
|
for _modname in $(eval $_filtercmd); do
|
|
|
|
case $_modname in
|
|
|
|
*.ko) "$2" "$_modname" && echo "$_modname";;
|
|
|
|
*.ko.gz) gzip -dc "$_modname" > $initdir/$$.ko
|
|
|
|
$2 $initdir/$$.ko && echo "$_modname"
|
|
|
|
rm -f $initdir/$$.ko
|
|
|
|
;;
|
|
|
|
*.ko.xz) xz -dc "$_modname" > $initdir/$$.ko
|
|
|
|
$2 $initdir/$$.ko && echo "$_modname"
|
|
|
|
rm -f $initdir/$$.ko
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
)
|
|
|
|
find_kernel_modules_by_path () (
|
|
|
|
if ! [[ $hostonly ]]; then
|
|
|
|
find "$KERNEL_MODS/kernel/$1" "$KERNEL_MODS/extra" "$KERNEL_MODS/weak-updates" \
|
|
|
|
-name "*.ko" -o -name "*.ko.gz" -o -name "*.ko.xz" 2>/dev/null
|
|
|
|
else
|
|
|
|
cut -d " " -f 1 </proc/modules \
|
|
|
|
| xargs modinfo -F filename -k $KERNEL_VER 2>/dev/null
|
|
|
|
fi
|
|
|
|
)
|
|
|
|
|
|
|
|
filter_kernel_modules () {
|
|
|
|
filter_kernel_modules_by_path drivers "$1"
|
|
|
|
}
|
|
|
|
|
|
|
|
find_kernel_modules () {
|
|
|
|
find_kernel_modules_by_path drivers
|
|
|
|
}
|
|
|
|
|
|
|
|
# instmods [-c] <kernel module> [<kernel module> ... ]
|
|
|
|
# instmods [-c] <kernel subsystem>
|
|
|
|
# install kernel modules along with all their dependencies.
|
|
|
|
# <kernel subsystem> can be e.g. "=block" or "=drivers/usb/storage"
|
|
|
|
instmods() {
|
|
|
|
[[ $no_kernel = yes ]] && return
|
|
|
|
# called [sub]functions inherit _fderr
|
|
|
|
local _fderr=9
|
|
|
|
local _check=no
|
|
|
|
if [[ $1 = '-c' ]]; then
|
|
|
|
_check=yes
|
|
|
|
shift
|
|
|
|
fi
|
|
|
|
|
|
|
|
function inst1mod() {
|
|
|
|
local _ret=0 _mod="$1"
|
|
|
|
case $_mod in
|
|
|
|
=*)
|
|
|
|
if [ -f $KERNEL_MODS/modules.${_mod#=} ]; then
|
|
|
|
( [[ "$_mpargs" ]] && echo $_mpargs
|
|
|
|
cat "${KERNEL_MODS}/modules.${_mod#=}" ) \
|
|
|
|
| instmods
|
|
|
|
else
|
|
|
|
( [[ "$_mpargs" ]] && echo $_mpargs
|
2019-07-14 09:39:03 +08:00
|
|
|
find "$KERNEL_MODS" -path "*/${_mod#=}/*" -type f -printf '%f\n' ) \
|
2012-05-26 00:32:55 +08:00
|
|
|
| instmods
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
--*) _mpargs+=" $_mod" ;;
|
|
|
|
i2o_scsi) return ;; # Do not load this diagnostic-only module
|
|
|
|
*)
|
|
|
|
_mod=${_mod##*/}
|
|
|
|
# if we are already installed, skip this module and go on
|
|
|
|
# to the next one.
|
|
|
|
[[ -f "$initdir/.kernelmodseen/${_mod%.ko}.ko" ]] && return
|
|
|
|
|
|
|
|
if [[ $omit_drivers ]] && [[ "$1" =~ $omit_drivers ]]; then
|
|
|
|
dinfo "Omitting driver ${_mod##$KERNEL_MODS}"
|
|
|
|
return
|
|
|
|
fi
|
|
|
|
# If we are building a host-specific initramfs and this
|
|
|
|
# module is not already loaded, move on to the next one.
|
|
|
|
[[ $hostonly ]] && ! grep -qe "\<${_mod//-/_}\>" /proc/modules \
|
|
|
|
&& ! echo $add_drivers | grep -qe "\<${_mod}\>" \
|
|
|
|
&& return
|
|
|
|
|
|
|
|
# We use '-d' option in modprobe only if modules prefix path
|
|
|
|
# differs from default '/'. This allows us to use Dracut with
|
|
|
|
# old version of modprobe which doesn't have '-d' option.
|
|
|
|
local _moddirname=${KERNEL_MODS%%/lib/modules/*}
|
|
|
|
[[ -n ${_moddirname} ]] && _moddirname="-d ${_moddirname}/"
|
|
|
|
|
|
|
|
# ok, load the module, all its dependencies, and any firmware
|
|
|
|
# it may require
|
|
|
|
for_each_kmod_dep install_kmod_with_fw $_mod \
|
|
|
|
--set-version $KERNEL_VER ${_moddirname} $_mpargs
|
|
|
|
((_ret+=$?))
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
return $_ret
|
|
|
|
}
|
|
|
|
|
|
|
|
function instmods_1() {
|
|
|
|
local _mod _mpargs
|
|
|
|
if (($# == 0)); then # filenames from stdin
|
|
|
|
while read _mod; do
|
|
|
|
inst1mod "${_mod%.ko*}" || {
|
|
|
|
if [ "$_check" = "yes" ]; then
|
|
|
|
dfatal "Failed to install $_mod"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
while (($# > 0)); do # filenames as arguments
|
|
|
|
inst1mod ${1%.ko*} || {
|
|
|
|
if [ "$_check" = "yes" ]; then
|
|
|
|
dfatal "Failed to install $1"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
shift
|
|
|
|
done
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
local _ret _filter_not_found='FATAL: Module .* not found.'
|
|
|
|
set -o pipefail
|
|
|
|
# Capture all stderr from modprobe to _fderr. We could use {var}>...
|
|
|
|
# redirections, but that would make dracut require bash4 at least.
|
|
|
|
eval "( instmods_1 \"\$@\" ) ${_fderr}>&1" \
|
|
|
|
| while read line; do [[ "$line" =~ $_filter_not_found ]] && echo $line || echo $line >&2 ;done | derror
|
|
|
|
_ret=$?
|
|
|
|
set +o pipefail
|
|
|
|
return $_ret
|
|
|
|
}
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2017-07-07 02:30:14 +08:00
|
|
|
setup_suse() {
|
2018-03-06 02:02:25 +08:00
|
|
|
ln -fs ../usr/bin/systemctl $initdir/bin/
|
|
|
|
ln -fs ../usr/lib/systemd $initdir/lib/
|
2017-07-07 02:30:14 +08:00
|
|
|
inst_simple "/usr/lib/systemd/system/haveged.service"
|
2020-07-22 04:14:53 +08:00
|
|
|
instmods ext4
|
2017-07-07 02:30:14 +08:00
|
|
|
}
|
|
|
|
|
2019-08-13 19:50:59 +08:00
|
|
|
_umount_dir() {
|
|
|
|
if mountpoint -q $1; then
|
|
|
|
ddebug "umount $1"
|
|
|
|
umount $1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2019-07-12 23:47:26 +08:00
|
|
|
# can be overridden in specific test
|
|
|
|
test_setup_cleanup() {
|
2019-12-13 21:21:31 +08:00
|
|
|
cleanup_initdir
|
2019-07-12 23:47:26 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
_test_cleanup() {
|
2019-07-13 02:09:48 +08:00
|
|
|
# (post-test) cleanup should always ignore failure and cleanup as much as possible
|
|
|
|
(
|
|
|
|
set +e
|
2020-03-21 03:17:11 +08:00
|
|
|
_umount_dir $initdir
|
2020-05-17 16:46:34 +08:00
|
|
|
rm -vf "$IMAGE_PUBLIC"
|
2021-01-28 21:26:35 +08:00
|
|
|
# If multiple setups/cleans are ran in parallel, this can cause a race
|
|
|
|
if [ ${TEST_PARALLELIZE} -ne 1 ]; then
|
|
|
|
rm -vf "${IMAGESTATEDIR}/default.img"
|
|
|
|
fi
|
2019-12-12 16:37:19 +08:00
|
|
|
rm -vfr "$TESTDIR"
|
|
|
|
rm -vf "$STATEFILE"
|
2019-07-19 08:34:57 +08:00
|
|
|
) || :
|
2019-07-12 23:47:26 +08:00
|
|
|
}
|
|
|
|
|
2017-08-04 20:34:14 +08:00
|
|
|
# can be overridden in specific test
|
|
|
|
test_cleanup() {
|
2019-07-12 23:47:26 +08:00
|
|
|
_test_cleanup
|
2017-08-04 20:34:14 +08:00
|
|
|
}
|
|
|
|
|
2020-03-21 02:09:35 +08:00
|
|
|
test_cleanup_again() {
|
|
|
|
[ -n "$TESTDIR" ] || return
|
|
|
|
rm -rf "$TESTDIR/unprivileged-nspawn-root"
|
2020-03-21 03:17:11 +08:00
|
|
|
_umount_dir $initdir
|
2020-03-21 02:09:35 +08:00
|
|
|
}
|
|
|
|
|
2019-12-12 16:37:19 +08:00
|
|
|
test_create_image() {
|
2019-12-10 23:40:31 +08:00
|
|
|
create_empty_image_rootdir
|
|
|
|
|
|
|
|
# Create what will eventually be our root filesystem onto an overlay
|
|
|
|
(
|
|
|
|
LOG_LEVEL=5
|
|
|
|
setup_basic_environment
|
|
|
|
mask_supporting_services
|
|
|
|
)
|
2019-12-12 16:37:19 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
test_setup() {
|
2019-12-17 19:52:35 +08:00
|
|
|
if [ ${TEST_REQUIRE_INSTALL_TESTS} -ne 0 ] && \
|
|
|
|
type -P meson >/dev/null && \
|
|
|
|
[[ "$(meson configure $BUILD_DIR | grep install-tests | awk '{ print $2 }')" != "true" ]]; then
|
2020-03-31 21:13:13 +08:00
|
|
|
dfatal "$BUILD_DIR needs to be built with -Dinstall-tests=true"
|
2019-12-12 16:37:19 +08:00
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2020-05-17 16:46:34 +08:00
|
|
|
if [ -e "$IMAGE_PRIVATE" ]; then
|
|
|
|
echo "Reusing existing image $IMAGE_PRIVATE → $(realpath $IMAGE_PRIVATE)"
|
2019-12-12 16:37:19 +08:00
|
|
|
mount_initdir
|
2020-05-26 04:48:01 +08:00
|
|
|
else
|
|
|
|
if [ ! -e "$IMAGE_PUBLIC" ]; then
|
2021-01-07 05:42:28 +08:00
|
|
|
# default.img is the base that every test uses and optionally appends to
|
|
|
|
if [ ! -e "${IMAGESTATEDIR}/default.img" ] || [ -n "${TEST_FORCE_NEWIMAGE}" ]; then
|
|
|
|
# Create the backing public image, but then completely unmount
|
|
|
|
# it and drop the loopback device responsible for it, since we're
|
|
|
|
# going to symlink/copy the image and mount it again from
|
|
|
|
# elsewhere.
|
|
|
|
local image_old=${IMAGE_PUBLIC}
|
|
|
|
if [ -z "${TEST_FORCE_NEWIMAGE}" ]; then
|
|
|
|
IMAGE_PUBLIC="${IMAGESTATEDIR}/default.img"
|
|
|
|
fi
|
|
|
|
test_create_image
|
|
|
|
test_setup_cleanup
|
|
|
|
umount_loopback
|
|
|
|
cleanup_loopdev
|
|
|
|
IMAGE_PUBLIC="${image_old}"
|
|
|
|
fi
|
|
|
|
if [ "${IMAGE_NAME}" != "default" ] && [ -z "${TEST_FORCE_NEWIMAGE}" ]; then
|
|
|
|
cp -v "$(realpath "${IMAGESTATEDIR}/default.img")" "$IMAGE_PUBLIC"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
local hook_defined=1
|
|
|
|
if declare -f -F test_append_files > /dev/null; then
|
|
|
|
hook_defined=$?
|
2020-05-26 04:48:01 +08:00
|
|
|
fi
|
|
|
|
|
2020-05-17 16:46:34 +08:00
|
|
|
echo "Reusing existing cached image $IMAGE_PUBLIC → $(realpath $IMAGE_PUBLIC)"
|
2021-01-07 05:42:28 +08:00
|
|
|
if [ ${TEST_PARALLELIZE} -ne 0 ] || [ ${hook_defined} -eq 0 ]; then
|
2020-05-17 16:48:16 +08:00
|
|
|
cp -v "$(realpath $IMAGE_PUBLIC)" "$IMAGE_PRIVATE"
|
|
|
|
else
|
|
|
|
ln -sv "$(realpath $IMAGE_PUBLIC)" "$IMAGE_PRIVATE"
|
|
|
|
fi
|
2020-05-26 04:48:01 +08:00
|
|
|
|
2019-12-12 16:37:19 +08:00
|
|
|
mount_initdir
|
2021-01-07 05:42:28 +08:00
|
|
|
if [ ${hook_defined} -eq 0 ]; then
|
|
|
|
test_append_files "$initdir"
|
|
|
|
fi
|
2019-12-12 16:37:19 +08:00
|
|
|
fi
|
|
|
|
|
2019-12-10 23:40:31 +08:00
|
|
|
setup_nspawn_root
|
|
|
|
}
|
|
|
|
|
2017-08-04 20:34:14 +08:00
|
|
|
test_run() {
|
2019-12-13 19:34:41 +08:00
|
|
|
mount_initdir
|
|
|
|
|
2017-08-04 20:34:14 +08:00
|
|
|
if [ -z "$TEST_NO_QEMU" ]; then
|
2019-12-10 01:56:13 +08:00
|
|
|
if run_qemu "$1"; then
|
2020-03-21 00:16:30 +08:00
|
|
|
check_result_qemu || { echo "QEMU test failed"; return 1; }
|
2017-08-04 20:34:14 +08:00
|
|
|
else
|
|
|
|
dwarn "can't run QEMU, skipping"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
if [ -z "$TEST_NO_NSPAWN" ]; then
|
2019-12-13 21:21:31 +08:00
|
|
|
mount_initdir
|
|
|
|
if run_nspawn "$initdir" "$1"; then
|
|
|
|
check_result_nspawn "$initdir" || { echo "nspawn-root test failed"; return 1; }
|
2017-08-04 20:34:14 +08:00
|
|
|
else
|
|
|
|
dwarn "can't run systemd-nspawn, skipping"
|
|
|
|
fi
|
2018-08-30 12:01:18 +08:00
|
|
|
|
|
|
|
if [[ "$RUN_IN_UNPRIVILEGED_CONTAINER" = "yes" ]]; then
|
2019-12-13 21:21:31 +08:00
|
|
|
dir="$TESTDIR/unprivileged-nspawn-root"
|
|
|
|
if NSPAWN_ARGUMENTS="-U --private-network $NSPAWN_ARGUMENTS" run_nspawn "$dir" "$1"; then
|
|
|
|
check_result_nspawn "$dir" || { echo "unprivileged-nspawn-root test failed"; return 1; }
|
2018-08-30 12:01:18 +08:00
|
|
|
else
|
|
|
|
dwarn "can't run systemd-nspawn, skipping"
|
|
|
|
fi
|
2019-01-30 09:19:45 +08:00
|
|
|
fi
|
2017-08-04 20:34:14 +08:00
|
|
|
fi
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2012-05-22 00:55:48 +08:00
|
|
|
do_test() {
|
2012-05-25 20:53:29 +08:00
|
|
|
if [[ $UID != "0" ]]; then
|
|
|
|
echo "TEST: $TEST_DESCRIPTION [SKIPPED]: not root" >&2
|
|
|
|
exit 0
|
|
|
|
fi
|
|
|
|
|
2020-12-23 01:51:40 +08:00
|
|
|
if [ -n "$TEST_NO_QEMU" ] && [ -n "$TEST_NO_NSPAWN" ]; then
|
|
|
|
echo "TEST: $TEST_DESCRIPTION [SKIPPED]: both QEMU and nspawn disabled" >&2
|
|
|
|
exit 0
|
|
|
|
fi
|
|
|
|
|
2020-12-27 04:11:55 +08:00
|
|
|
if [ -n "$TEST_QEMU_ONLY" ] && [ -z "$TEST_NO_NSPAWN" ]; then
|
|
|
|
echo "TEST: $TEST_DESCRIPTION [SKIPPED]: QEMU-only tests requested" >&2
|
|
|
|
exit 0
|
|
|
|
fi
|
|
|
|
|
2021-01-01 01:29:58 +08:00
|
|
|
if [ -n "$TEST_PREFER_NSPAWN" ] && [ -z "$TEST_NO_NSPAWN" ]; then
|
|
|
|
TEST_NO_QEMU=1
|
|
|
|
fi
|
|
|
|
|
scripts: use 4 space indentation
We had all kinds of indentation: 2 sp, 3 sp, 4 sp, 8 sp, and mixed.
4 sp was the most common, in particular the majority of scripts under test/
used that. Let's standarize on 4 sp, because many commandlines are long and
there's a lot of nesting, and with 8sp indentation less stuff fits. 4 sp
also seems to be the default indentation, so this will make it less likely
that people will mess up if they don't load the editor config. (I think people
often use vi, and vi has no support to load project-wide configuration
automatically. We distribute a .vimrc file, but it is not loaded by default,
and even the instructions in it seem to discourage its use for security
reasons.)
Also remove the few vim config lines that were left. We should either have them
on all files, or none.
Also remove some strange stuff like '#!/bin/env bash', yikes.
2019-04-04 20:10:42 +08:00
|
|
|
# Detect lib paths
|
2012-05-22 00:55:48 +08:00
|
|
|
[[ $libdir ]] || for libdir in /lib64 /lib; do
|
|
|
|
[[ -d $libdir ]] && libdirs+=" $libdir" && break
|
|
|
|
done
|
|
|
|
|
|
|
|
[[ $usrlibdir ]] || for usrlibdir in /usr/lib64 /usr/lib; do
|
|
|
|
[[ -d $usrlibdir ]] && libdirs+=" $usrlibdir" && break
|
|
|
|
done
|
|
|
|
|
2017-08-07 23:30:11 +08:00
|
|
|
mkdir -p "$STATEDIR"
|
|
|
|
|
2012-05-22 00:55:48 +08:00
|
|
|
import_testdir
|
2013-11-06 06:32:56 +08:00
|
|
|
import_initdir
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2020-03-25 20:15:37 +08:00
|
|
|
testname="$(basename $PWD)"
|
|
|
|
|
2012-05-22 00:55:48 +08:00
|
|
|
while (($# > 0)); do
|
|
|
|
case $1 in
|
|
|
|
--run)
|
2020-03-25 20:15:37 +08:00
|
|
|
echo "${testname} RUN: $TEST_DESCRIPTION"
|
2019-12-10 01:56:13 +08:00
|
|
|
test_run "$2"
|
2018-09-14 12:25:02 +08:00
|
|
|
ret=$?
|
|
|
|
if (( $ret == 0 )); then
|
2020-03-25 20:15:37 +08:00
|
|
|
echo "${testname} RUN: $TEST_DESCRIPTION [OK]"
|
2012-05-22 00:55:48 +08:00
|
|
|
else
|
2020-03-25 20:15:37 +08:00
|
|
|
echo "${testname} RUN: $TEST_DESCRIPTION [FAILED]"
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
|
|
|
exit $ret;;
|
|
|
|
--setup)
|
2020-03-25 20:15:37 +08:00
|
|
|
echo "${testname} SETUP: $TEST_DESCRIPTION"
|
2012-05-22 00:55:48 +08:00
|
|
|
test_setup
|
2019-07-12 23:47:26 +08:00
|
|
|
test_setup_cleanup
|
2017-08-08 03:09:21 +08:00
|
|
|
;;
|
2020-03-21 02:09:35 +08:00
|
|
|
--clean)
|
2020-03-25 20:15:37 +08:00
|
|
|
echo "${testname} CLEANUP: $TEST_DESCRIPTION"
|
2012-05-22 00:55:48 +08:00
|
|
|
test_cleanup
|
2017-08-08 03:09:21 +08:00
|
|
|
;;
|
2020-03-21 02:09:35 +08:00
|
|
|
--clean-again)
|
2020-03-25 20:15:37 +08:00
|
|
|
echo "${testname} CLEANUP AGAIN: $TEST_DESCRIPTION"
|
2020-03-21 02:09:35 +08:00
|
|
|
test_cleanup_again
|
|
|
|
;;
|
2012-05-22 00:55:48 +08:00
|
|
|
--all)
|
2017-08-08 03:09:21 +08:00
|
|
|
ret=0
|
2020-03-25 20:15:37 +08:00
|
|
|
echo -n "${testname}: $TEST_DESCRIPTION "
|
2021-02-17 07:47:34 +08:00
|
|
|
# Do not use a subshell, otherwise cleanup variables (LOOPDEV) will be lost
|
|
|
|
# and loop devices will leak
|
|
|
|
test_setup </dev/null >"$TESTLOG" 2>&1 || ret=$?
|
|
|
|
if [ $ret -eq 0 ]; then
|
|
|
|
test_setup_cleanup </dev/null >>"$TESTLOG" 2>&1 || ret=$?
|
|
|
|
fi
|
|
|
|
if [ $ret -eq 0 ]; then
|
|
|
|
test_run "$2" </dev/null >>"$TESTLOG" 2>&1 || ret=$?
|
|
|
|
fi
|
2019-07-13 02:09:48 +08:00
|
|
|
test_cleanup
|
2012-05-22 00:55:48 +08:00
|
|
|
if [ $ret -eq 0 ]; then
|
2017-08-07 23:30:11 +08:00
|
|
|
rm "$TESTLOG"
|
2012-05-22 00:55:48 +08:00
|
|
|
echo "[OK]"
|
|
|
|
else
|
|
|
|
echo "[FAILED]"
|
2017-08-07 23:30:11 +08:00
|
|
|
echo "see $TESTLOG"
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
|
|
|
exit $ret;;
|
|
|
|
*) break ;;
|
|
|
|
esac
|
|
|
|
shift
|
|
|
|
done
|
|
|
|
}
|