2020-03-04 17:35:06 +08:00
|
|
|
#!/usr/bin/env bash
|
2012-05-22 00:55:48 +08:00
|
|
|
# -*- mode: shell-script; indent-tabs-mode: nil; sh-basic-offset: 4; -*-
|
2021-10-01 19:04:32 +08:00
|
|
|
# SPDX-License-Identifier: LGPL-2.1-or-later
|
|
|
|
#
|
|
|
|
# shellcheck disable=SC2030,SC2031
|
2021-04-17 00:36:27 +08:00
|
|
|
# ex: ts=8 sw=4 sts=4 et filetype=sh tw=180
|
|
|
|
# Note: the shellcheck line above disables warning for variables which were
|
|
|
|
# modified in a subshell. In our case this behavior is expected, but
|
|
|
|
# `shellcheck` can't distinguish this because of poor variable tracking,
|
|
|
|
# which results in warning for every instance of such variable used
|
|
|
|
# throughout this file.
|
|
|
|
# See:
|
|
|
|
# * comment in function install_verity_minimal()
|
|
|
|
# * koalaman/shellcheck#280
|
|
|
|
set -o pipefail
|
|
|
|
|
2023-11-20 19:17:05 +08:00
|
|
|
# Simple wrapper to unify boolean checks.
|
|
|
|
# Note: this function needs to stay near the top of the file, so we can use it
|
|
|
|
# in code in the outermost scope.
|
|
|
|
get_bool() {
|
|
|
|
# Make the value lowercase to make the regex matching simpler
|
|
|
|
local _bool="${1,,}"
|
|
|
|
|
|
|
|
# Consider empty value as "false"
|
|
|
|
if [[ -z "$_bool" || "$_bool" =~ ^(0|no|false)$ ]]; then
|
|
|
|
return 1
|
|
|
|
elif [[ "$_bool" =~ ^(1|yes|true)$ ]]; then
|
|
|
|
return 0
|
|
|
|
else
|
|
|
|
echo >&2 "Value '$_bool' is not a valid boolean value"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2012-05-22 00:55:48 +08:00
|
|
|
PATH=/sbin:/bin:/usr/sbin:/usr/bin
|
|
|
|
export PATH
|
|
|
|
|
2020-08-27 17:59:45 +08:00
|
|
|
os_release=$(test -e /etc/os-release && echo /etc/os-release || echo /usr/lib/os-release)
|
2021-04-17 00:33:44 +08:00
|
|
|
# shellcheck source=/dev/null
|
|
|
|
source "$os_release"
|
2023-11-20 19:17:05 +08:00
|
|
|
[[ "$ID" == "debian" || " $ID_LIKE " == *" debian "* ]] && LOOKS_LIKE_DEBIAN=yes || LOOKS_LIKE_DEBIAN=no
|
|
|
|
[[ "$ID" == "arch" || " $ID_LIKE " == *" arch "* ]] && LOOKS_LIKE_ARCH=yes || LOOKS_LIKE_ARCH=no
|
2023-11-20 19:33:58 +08:00
|
|
|
[[ "$ID" == "fedora" ]] && LOOKS_LIKE_FEDORA=yes || LOOKS_LIKE_FEDORA=no
|
2023-11-20 19:17:05 +08:00
|
|
|
[[ " $ID_LIKE " == *" suse "* ]] && LOOKS_LIKE_SUSE=yes || LOOKS_LIKE_SUSE=no
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
KERNEL_VER="${KERNEL_VER-$(uname -r)}"
|
2022-08-26 22:19:42 +08:00
|
|
|
QEMU_TIMEOUT="${QEMU_TIMEOUT:-1800}"
|
|
|
|
NSPAWN_TIMEOUT="${NSPAWN_TIMEOUT:-1800}"
|
2016-06-24 18:11:19 +08:00
|
|
|
TIMED_OUT= # will be 1 after run_* if *_TIMEOUT is set and test timed out
|
2024-02-19 18:23:31 +08:00
|
|
|
get_bool "$LOOKS_LIKE_SUSE" && FSTYPE="${FSTYPE:-btrfs}" || FSTYPE="${FSTYPE:-ext4}"
|
2016-11-16 00:38:04 +08:00
|
|
|
UNIFIED_CGROUP_HIERARCHY="${UNIFIED_CGROUP_HIERARCHY:-default}"
|
2019-12-10 01:52:35 +08:00
|
|
|
EFI_MOUNT="${EFI_MOUNT:-$(bootctl -x 2>/dev/null || echo /boot)}"
|
2021-01-07 05:42:28 +08:00
|
|
|
# Note that defining a different IMAGE_NAME in a test setup script will only result
|
|
|
|
# in default.img being copied and renamed. It can then be extended by defining
|
|
|
|
# a test_append_files() function. The $1 parameter will be the root directory.
|
|
|
|
# To force creating a new image from scratch (eg: to encrypt it), also define
|
|
|
|
# TEST_FORCE_NEWIMAGE=1 in the test setup script.
|
2019-12-12 16:37:19 +08:00
|
|
|
IMAGE_NAME=${IMAGE_NAME:-default}
|
2019-12-17 19:52:35 +08:00
|
|
|
TEST_REQUIRE_INSTALL_TESTS="${TEST_REQUIRE_INSTALL_TESTS:-1}"
|
2020-05-17 16:48:16 +08:00
|
|
|
TEST_PARALLELIZE="${TEST_PARALLELIZE:-0}"
|
2022-02-17 03:29:14 +08:00
|
|
|
TEST_SUPPORTING_SERVICES_SHOULD_BE_MASKED="${TEST_SUPPORTING_SERVICES_SHOULD_BE_MASKED:-1}"
|
2020-03-21 03:17:11 +08:00
|
|
|
LOOPDEV=
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2022-07-08 02:00:46 +08:00
|
|
|
# Since in Bash we can have only one handler per signal, let's overcome this
|
|
|
|
# limitation by having one global handler for the EXIT signal which executes
|
|
|
|
# all registered handlers
|
|
|
|
_AT_EXIT_HANDLERS=()
|
|
|
|
_at_exit() {
|
|
|
|
set +e
|
|
|
|
|
|
|
|
# Run the EXIT handlers in reverse order
|
|
|
|
for ((i = ${#_AT_EXIT_HANDLERS[@]} - 1; i >= 0; i--)); do
|
|
|
|
ddebug "Running EXIT handler '${_AT_EXIT_HANDLERS[$i]}'"
|
2023-06-03 02:28:41 +08:00
|
|
|
eval "${_AT_EXIT_HANDLERS[$i]}"
|
2022-07-08 02:00:46 +08:00
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
trap _at_exit EXIT
|
|
|
|
|
|
|
|
add_at_exit_handler() {
|
2023-06-03 02:28:41 +08:00
|
|
|
_AT_EXIT_HANDLERS+=("${1:?}")
|
2022-07-08 02:00:46 +08:00
|
|
|
}
|
|
|
|
|
2022-05-04 18:29:31 +08:00
|
|
|
# Decide if we can (and want to) run qemu with KVM acceleration.
|
2019-09-27 05:29:38 +08:00
|
|
|
# Check if nested KVM is explicitly enabled (TEST_NESTED_KVM). If not,
|
|
|
|
# check if it's not explicitly disabled (TEST_NO_KVM) and we're not already
|
|
|
|
# running under KVM. If these conditions are met, enable KVM (and possibly
|
|
|
|
# nested KVM), otherwise disable it.
|
2022-08-27 01:18:20 +08:00
|
|
|
if get_bool "${TEST_NESTED_KVM:=}" || (! get_bool "${TEST_NO_KVM:=}" && ! systemd-detect-virt -qv); then
|
2019-09-27 05:29:38 +08:00
|
|
|
QEMU_KVM=yes
|
|
|
|
else
|
|
|
|
QEMU_KVM=no
|
|
|
|
fi
|
|
|
|
|
2015-02-02 07:19:29 +08:00
|
|
|
if ! ROOTLIBDIR=$(pkg-config --variable=systemdutildir systemd); then
|
2023-06-12 09:15:19 +08:00
|
|
|
echo "WARNING! Cannot determine libdir from pkg-config, assuming /usr/lib/systemd" >&2
|
2015-02-02 07:19:29 +08:00
|
|
|
ROOTLIBDIR=/usr/lib/systemd
|
|
|
|
fi
|
|
|
|
|
2021-01-27 05:46:10 +08:00
|
|
|
# The calling test.sh scripts have TEST_BASE_DIR set via their Makefile, but we don't need them to provide it
|
2021-04-17 00:33:44 +08:00
|
|
|
TEST_BASE_DIR=${TEST_BASE_DIR:-$(realpath "$(dirname "${BASH_SOURCE[0]}")")}
|
2021-04-27 01:20:18 +08:00
|
|
|
TEST_UNITS_DIR="$(realpath "$TEST_BASE_DIR/units")"
|
2021-01-27 05:46:10 +08:00
|
|
|
SOURCE_DIR=$(realpath "$TEST_BASE_DIR/..")
|
2021-04-17 00:33:44 +08:00
|
|
|
# These variables are used by test scripts
|
2023-03-22 17:33:58 +08:00
|
|
|
export TEST_BASE_DIR TEST_UNITS_DIR SOURCE_DIR
|
2021-01-27 05:46:10 +08:00
|
|
|
|
2023-03-22 17:33:58 +08:00
|
|
|
TOOLS_DIR="$SOURCE_DIR/tools"
|
2020-11-18 04:39:37 +08:00
|
|
|
# note that find-build-dir.sh will return $BUILD_DIR if provided, else it will try to find it
|
2021-08-03 14:44:47 +08:00
|
|
|
if get_bool "${NO_BUILD:=}"; then
|
|
|
|
BUILD_DIR="$SOURCE_DIR"
|
|
|
|
elif ! BUILD_DIR="$("$TOOLS_DIR"/find-build-dir.sh)"; then
|
|
|
|
echo "ERROR: no build found, please set BUILD_DIR or use NO_BUILD" >&2
|
|
|
|
exit 1
|
2020-11-18 04:39:37 +08:00
|
|
|
fi
|
|
|
|
|
2021-04-17 00:37:49 +08:00
|
|
|
PATH_TO_INIT="$ROOTLIBDIR/systemd"
|
|
|
|
SYSTEMD_JOURNALD="${SYSTEMD_JOURNALD:-$(command -v "$BUILD_DIR/systemd-journald" || command -v "$ROOTLIBDIR/systemd-journald")}"
|
2022-04-24 15:31:33 +08:00
|
|
|
SYSTEMD_JOURNAL_REMOTE="${SYSTEMD_JOURNAL_REMOTE:-$(command -v "$BUILD_DIR/systemd-journal-remote" || command -v "$ROOTLIBDIR/systemd-journal-remote" || echo "")}"
|
2021-04-17 00:37:49 +08:00
|
|
|
SYSTEMD="${SYSTEMD:-$(command -v "$BUILD_DIR/systemd" || command -v "$ROOTLIBDIR/systemd")}"
|
|
|
|
SYSTEMD_NSPAWN="${SYSTEMD_NSPAWN:-$(command -v "$BUILD_DIR/systemd-nspawn" || command -v systemd-nspawn)}"
|
|
|
|
JOURNALCTL="${JOURNALCTL:-$(command -v "$BUILD_DIR/journalctl" || command -v journalctl)}"
|
2021-12-14 03:50:28 +08:00
|
|
|
SYSTEMCTL="${SYSTEMCTL:-$(command -v "$BUILD_DIR/systemctl" || command -v systemctl)}"
|
2024-01-12 17:27:43 +08:00
|
|
|
SYSTEMD_ID128="${SYSTEMD_ID128:-$(command -v "$BUILD_DIR/systemd-id128" || command -v systemd-id128)}"
|
2018-07-05 23:14:07 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
TESTFILE="${BASH_SOURCE[1]}"
|
2021-01-27 05:46:10 +08:00
|
|
|
if [ -z "$TESTFILE" ]; then
|
|
|
|
echo "ERROR: test-functions must be sourced from one of the TEST-*/test.sh scripts" >&2
|
|
|
|
exit 1
|
|
|
|
fi
|
2021-04-17 00:33:44 +08:00
|
|
|
TESTNAME="$(basename "$(dirname "$(realpath "$TESTFILE")")")"
|
2023-03-21 23:44:41 +08:00
|
|
|
|
|
|
|
WORKDIR="/var/tmp/systemd-tests"
|
|
|
|
if get_bool "${NO_BUILD:=}"; then
|
|
|
|
STATEDIR="$WORKDIR/$TESTNAME"
|
|
|
|
else
|
|
|
|
STATEDIR="$BUILD_DIR/test/$TESTNAME"
|
|
|
|
fi
|
|
|
|
|
2020-11-18 05:02:14 +08:00
|
|
|
STATEFILE="$STATEDIR/.testdir"
|
|
|
|
IMAGESTATEDIR="$STATEDIR/.."
|
|
|
|
TESTLOG="$STATEDIR/test.log"
|
|
|
|
|
2021-04-27 01:20:18 +08:00
|
|
|
if ! [[ "$TESTNAME" =~ ^TEST\-([0-9]+)\-.+$ ]]; then
|
|
|
|
echo "ERROR: Test name '$TESTNAME' is not in the expected format: TEST-[0-9]+-*" >&2
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
TESTID="${BASH_REMATCH[1]:?}"
|
|
|
|
|
|
|
|
if [[ ! -f "$TEST_UNITS_DIR/testsuite-$TESTID.service" ]]; then
|
|
|
|
echo "ERROR: Test '$TESTNAME' is missing its service file '$TEST_UNITS_DIR/testsuite-$TESTID.service" >&2
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2019-12-10 03:35:51 +08:00
|
|
|
BASICTOOLS=(
|
2019-12-10 22:31:09 +08:00
|
|
|
awk
|
2021-06-15 14:34:41 +08:00
|
|
|
base64
|
2019-12-10 22:31:09 +08:00
|
|
|
basename
|
2019-12-10 03:35:51 +08:00
|
|
|
bash
|
2019-12-10 22:31:09 +08:00
|
|
|
capsh
|
2019-12-10 03:35:51 +08:00
|
|
|
cat
|
2023-12-05 04:33:15 +08:00
|
|
|
chgrp
|
2019-12-10 03:35:51 +08:00
|
|
|
chmod
|
|
|
|
chown
|
2022-12-05 20:52:28 +08:00
|
|
|
chroot
|
2019-12-10 03:35:51 +08:00
|
|
|
cmp
|
2023-11-20 23:26:49 +08:00
|
|
|
cp
|
2019-12-10 03:35:51 +08:00
|
|
|
cryptsetup
|
2019-12-10 22:31:09 +08:00
|
|
|
cut
|
2019-12-10 03:35:51 +08:00
|
|
|
date
|
2019-12-10 22:31:09 +08:00
|
|
|
dd
|
2023-11-20 23:26:49 +08:00
|
|
|
dhclient
|
2019-12-10 22:31:09 +08:00
|
|
|
diff
|
|
|
|
dirname
|
2019-12-10 03:35:51 +08:00
|
|
|
dmsetup
|
|
|
|
echo
|
|
|
|
env
|
|
|
|
false
|
2023-11-20 23:26:49 +08:00
|
|
|
find
|
2023-10-25 23:42:07 +08:00
|
|
|
findmnt
|
2022-03-12 01:15:03 +08:00
|
|
|
flock
|
2020-08-14 16:20:43 +08:00
|
|
|
getconf
|
2019-12-10 22:31:09 +08:00
|
|
|
getent
|
|
|
|
getfacl
|
2023-10-19 18:28:37 +08:00
|
|
|
getfattr
|
2020-03-21 03:22:42 +08:00
|
|
|
grep
|
2023-11-20 23:26:49 +08:00
|
|
|
grep
|
2019-12-10 22:31:09 +08:00
|
|
|
gunzip
|
2019-12-10 03:35:51 +08:00
|
|
|
gzip
|
|
|
|
head
|
2023-11-20 23:26:49 +08:00
|
|
|
hostname
|
|
|
|
id
|
2019-12-10 22:31:09 +08:00
|
|
|
ionice
|
2019-12-10 04:45:46 +08:00
|
|
|
ip
|
2022-09-11 20:16:34 +08:00
|
|
|
jq
|
2022-09-06 03:02:25 +08:00
|
|
|
killall
|
2021-08-23 05:45:33 +08:00
|
|
|
ldd
|
2019-12-10 03:35:51 +08:00
|
|
|
ln
|
2023-11-20 23:26:49 +08:00
|
|
|
ln
|
2019-12-10 03:35:51 +08:00
|
|
|
loadkeys
|
|
|
|
login
|
2021-12-20 22:34:17 +08:00
|
|
|
losetup
|
2023-11-20 23:26:49 +08:00
|
|
|
ls
|
2023-05-12 23:39:41 +08:00
|
|
|
lsattr
|
2023-10-25 23:42:07 +08:00
|
|
|
lsblk
|
2019-12-10 22:31:09 +08:00
|
|
|
lz4cat
|
2023-11-20 23:26:49 +08:00
|
|
|
mkdir
|
2019-12-10 20:32:20 +08:00
|
|
|
mkfifo
|
2023-04-14 18:58:51 +08:00
|
|
|
mknod
|
2019-12-10 20:32:20 +08:00
|
|
|
mktemp
|
2019-12-10 03:35:51 +08:00
|
|
|
modprobe
|
|
|
|
mount
|
2020-06-09 22:51:55 +08:00
|
|
|
mountpoint
|
2019-12-10 04:26:59 +08:00
|
|
|
mv
|
|
|
|
nc
|
2019-12-10 22:31:09 +08:00
|
|
|
nproc
|
2023-11-20 23:26:49 +08:00
|
|
|
ping
|
2022-06-01 07:56:08 +08:00
|
|
|
pkill
|
2023-11-20 23:26:49 +08:00
|
|
|
ps
|
2019-12-10 20:32:20 +08:00
|
|
|
readlink
|
2022-11-08 19:43:57 +08:00
|
|
|
realpath
|
2019-12-10 22:31:09 +08:00
|
|
|
rev
|
2019-12-10 03:35:51 +08:00
|
|
|
rm
|
2019-12-10 04:45:46 +08:00
|
|
|
rmdir
|
2022-06-01 07:56:08 +08:00
|
|
|
rmmod
|
2023-05-12 23:56:22 +08:00
|
|
|
script
|
2019-12-10 03:35:51 +08:00
|
|
|
sed
|
2019-12-10 22:31:09 +08:00
|
|
|
seq
|
2023-05-17 21:35:10 +08:00
|
|
|
setfacl
|
2021-02-09 17:47:34 +08:00
|
|
|
setfattr
|
2019-12-10 03:35:51 +08:00
|
|
|
setfont
|
2023-03-14 22:21:29 +08:00
|
|
|
setpriv
|
2019-12-10 03:35:51 +08:00
|
|
|
setsid
|
2020-03-21 03:22:42 +08:00
|
|
|
sfdisk
|
2019-12-10 03:35:51 +08:00
|
|
|
sh
|
|
|
|
sleep
|
2023-11-20 23:26:49 +08:00
|
|
|
sort
|
2019-12-10 04:26:59 +08:00
|
|
|
stat
|
2023-04-07 01:14:12 +08:00
|
|
|
stty
|
2020-03-21 02:05:36 +08:00
|
|
|
su
|
2019-12-10 03:35:51 +08:00
|
|
|
sulogin
|
2019-12-10 04:45:46 +08:00
|
|
|
sysctl
|
2019-12-10 03:35:51 +08:00
|
|
|
tail
|
2019-12-10 16:10:28 +08:00
|
|
|
tar
|
2019-12-10 03:35:51 +08:00
|
|
|
tee
|
|
|
|
test
|
2020-04-03 15:13:51 +08:00
|
|
|
timeout
|
2019-12-10 03:53:38 +08:00
|
|
|
touch
|
2019-12-10 22:31:09 +08:00
|
|
|
tr
|
2019-12-10 03:35:51 +08:00
|
|
|
true
|
2020-03-21 03:22:42 +08:00
|
|
|
truncate
|
2023-11-20 23:26:49 +08:00
|
|
|
tty
|
2019-12-10 03:35:51 +08:00
|
|
|
umount
|
2019-12-10 22:31:09 +08:00
|
|
|
uname
|
2019-12-10 04:45:46 +08:00
|
|
|
unshare
|
2022-06-01 07:56:08 +08:00
|
|
|
useradd
|
|
|
|
userdel
|
2021-09-22 15:04:52 +08:00
|
|
|
wc
|
2024-02-16 23:22:05 +08:00
|
|
|
whoami
|
2019-12-10 03:35:51 +08:00
|
|
|
xargs
|
2019-12-10 22:31:09 +08:00
|
|
|
xzcat
|
2019-12-10 03:35:51 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
DEBUGTOOLS=(
|
|
|
|
df
|
|
|
|
dmesg
|
|
|
|
du
|
|
|
|
free
|
|
|
|
less
|
|
|
|
strace
|
|
|
|
vi
|
2022-04-16 20:43:17 +08:00
|
|
|
/usr/libexec/vi
|
2019-12-10 03:35:51 +08:00
|
|
|
)
|
2013-11-06 06:32:56 +08:00
|
|
|
|
2018-07-05 12:09:30 +08:00
|
|
|
is_built_with_asan() {
|
2022-06-16 01:43:11 +08:00
|
|
|
local _bin="${1:?}"
|
|
|
|
|
2018-07-05 12:09:30 +08:00
|
|
|
if ! type -P objdump >/dev/null; then
|
2023-11-21 00:41:20 +08:00
|
|
|
echo "Failed to find objdump, assuming systemd hasn't been built with ASAN."
|
2018-07-05 12:09:30 +08:00
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Borrowed from https://github.com/google/oss-fuzz/blob/cd9acd02f9d3f6e80011cc1e9549be526ce5f270/infra/base-images/base-runner/bad_build_check#L182
|
2021-04-17 00:33:44 +08:00
|
|
|
local _asan_calls
|
2022-06-16 01:43:11 +08:00
|
|
|
_asan_calls="$(objdump -dC "$_bin" | grep -E "(callq?|brasl?|bl)\s.+__asan" -c)"
|
2021-04-17 00:33:44 +08:00
|
|
|
if ((_asan_calls < 1000)); then
|
2018-07-05 12:09:30 +08:00
|
|
|
return 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2021-10-22 00:34:21 +08:00
|
|
|
is_built_with_coverage() {
|
|
|
|
if get_bool "${NO_BUILD:=}" || ! command -v meson >/dev/null; then
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
meson configure "${BUILD_DIR:?}" | grep 'b_coverage' | awk '{ print $2 }' | grep -q 'true'
|
|
|
|
}
|
|
|
|
|
2022-06-16 01:43:11 +08:00
|
|
|
IS_BUILT_WITH_ASAN=$(is_built_with_asan "$SYSTEMD_JOURNALD" && echo yes || echo no)
|
2021-10-22 00:34:21 +08:00
|
|
|
IS_BUILT_WITH_COVERAGE=$(is_built_with_coverage && echo yes || echo no)
|
2018-07-05 12:09:30 +08:00
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$IS_BUILT_WITH_ASAN"; then
|
2023-05-25 21:31:48 +08:00
|
|
|
PATH_TO_INIT="$ROOTLIBDIR/systemd-under-asan"
|
2022-06-21 18:09:35 +08:00
|
|
|
QEMU_MEM="${QEMU_MEM:-2G}"
|
2021-03-07 05:21:30 +08:00
|
|
|
QEMU_SMP="${QEMU_SMP:-4}"
|
2019-05-25 04:35:52 +08:00
|
|
|
|
|
|
|
# We need to correctly distinguish between gcc's and clang's ASan DSOs.
|
2021-04-30 19:26:54 +08:00
|
|
|
if ASAN_RT_NAME="$(awk '/libasan.so/ {x=$1; exit} END {print x; exit x==""}' < <(ldd "$SYSTEMD"))"; then
|
2019-05-25 04:35:52 +08:00
|
|
|
ASAN_COMPILER=gcc
|
2021-03-07 05:21:30 +08:00
|
|
|
ASAN_RT_PATH="$(readlink -f "$(${CC:-gcc} --print-file-name "$ASAN_RT_NAME")")"
|
2021-04-30 19:26:54 +08:00
|
|
|
elif ASAN_RT_NAME="$(awk '/libclang_rt.asan/ {x=$1; exit} END {print x; exit x==""}' < <(ldd "$SYSTEMD"))"; then
|
2019-05-25 04:35:52 +08:00
|
|
|
ASAN_COMPILER=clang
|
2021-03-07 05:21:30 +08:00
|
|
|
ASAN_RT_PATH="$(readlink -f "$(${CC:-clang} --print-file-name "$ASAN_RT_NAME")")"
|
2019-05-25 04:35:52 +08:00
|
|
|
|
|
|
|
# As clang's ASan DSO is usually in a non-standard path, let's check if
|
|
|
|
# the environment is set accordingly. If not, warn the user and exit.
|
|
|
|
# We're not setting the LD_LIBRARY_PATH automagically here, because
|
|
|
|
# user should encounter (and fix) the same issue when running the unit
|
|
|
|
# tests (meson test)
|
2019-08-13 19:52:57 +08:00
|
|
|
if ldd "$SYSTEMD" | grep -q "libclang_rt.asan.*not found"; then
|
2021-03-07 05:21:30 +08:00
|
|
|
echo >&2 "clang's ASan DSO ($ASAN_RT_NAME) is not present in the runtime library path"
|
|
|
|
echo >&2 "Consider setting LD_LIBRARY_PATH=${ASAN_RT_PATH%/*}"
|
2019-05-25 04:35:52 +08:00
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
echo >&2 "systemd is not linked against the ASan DSO"
|
|
|
|
echo >&2 "gcc does this by default, for clang compile with -shared-libasan"
|
|
|
|
exit 1
|
|
|
|
fi
|
2021-03-07 05:21:30 +08:00
|
|
|
|
|
|
|
echo "Detected ASan RT '$ASAN_RT_NAME' located at '$ASAN_RT_PATH'"
|
2018-07-05 12:09:30 +08:00
|
|
|
fi
|
|
|
|
|
2023-06-03 03:10:08 +08:00
|
|
|
test_require_bin() {
|
|
|
|
local bin
|
|
|
|
|
|
|
|
for bin in "$@"; do
|
|
|
|
if ! command -v "$bin" >/dev/null; then
|
|
|
|
echo "Required binary $bin not available, skipping the test"
|
|
|
|
exit 0
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
find_qemu_bin() {
|
|
|
|
QEMU_BIN="${QEMU_BIN:-""}"
|
2018-05-03 02:06:13 +08:00
|
|
|
# SUSE and Red Hat call the binary qemu-kvm. Debian and Gentoo call it kvm.
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$QEMU_KVM"; then
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ -n "$QEMU_BIN" ]] || QEMU_BIN="$(command -v kvm qemu-kvm 2>/dev/null | grep '^/' -m1)"
|
2018-05-03 02:06:13 +08:00
|
|
|
fi
|
2013-12-08 07:01:53 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ -n "$ARCH" ]] || ARCH="$(uname -m)"
|
2013-12-08 07:01:53 +08:00
|
|
|
case $ARCH in
|
|
|
|
x86_64)
|
|
|
|
# QEMU's own build system calls it qemu-system-x86_64
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ -n "$QEMU_BIN" ]] || QEMU_BIN="$(command -v qemu-system-x86_64 2>/dev/null | grep '^/' -m1)"
|
2013-12-08 07:01:53 +08:00
|
|
|
;;
|
|
|
|
i*86)
|
|
|
|
# new i386 version of QEMU
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ -n "$QEMU_BIN" ]] || QEMU_BIN="$(command -v qemu-system-i386 2>/dev/null | grep '^/' -m1)"
|
2013-12-08 07:01:53 +08:00
|
|
|
|
|
|
|
# i386 version of QEMU
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ -n "$QEMU_BIN" ]] || QEMU_BIN="$(command -v qemu 2>/dev/null | grep '^/' -m1)"
|
2013-12-08 07:01:53 +08:00
|
|
|
;;
|
2016-11-20 11:45:23 +08:00
|
|
|
ppc64*)
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ -n "$QEMU_BIN" ]] || QEMU_BIN="$(command -v qemu-system-ppc64 2>/dev/null | grep '^/' -m1)"
|
2016-11-20 11:45:23 +08:00
|
|
|
;;
|
2013-12-08 07:01:53 +08:00
|
|
|
esac
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
if [[ ! -e "$QEMU_BIN" ]]; then
|
2022-05-04 18:29:31 +08:00
|
|
|
echo "Could not find a suitable qemu binary" >&2
|
2013-12-08 07:01:53 +08:00
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2023-06-03 02:28:41 +08:00
|
|
|
qemu_setup_swtpm_socket() {
|
|
|
|
local pid state_dir tpm_device
|
|
|
|
|
|
|
|
if ! tpm_device="$(qemu_get_tpm_device)"; then
|
|
|
|
dinfo "Found QEMU version is too old for TPM2 on ppc64le"
|
|
|
|
exit 0
|
|
|
|
fi
|
|
|
|
|
|
|
|
state_dir="$(mktemp -d)"
|
|
|
|
swtpm socket --tpm2 --tpmstate dir="$state_dir" --ctrl type=unixio,path="$state_dir/sock" &
|
|
|
|
pid=$!
|
|
|
|
if ! kill -0 "$pid"; then
|
2023-09-23 15:13:56 +08:00
|
|
|
derror "Failed to start swtpm"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
if ! timeout 5 bash -c "until [[ -S $state_dir/sock ]]; do sleep .5; done"; then
|
|
|
|
derror "Failed to setup swtpm socket"
|
2023-06-03 02:28:41 +08:00
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
dinfo "Started swtpm as PID $pid with state dir $state_dir"
|
|
|
|
|
|
|
|
add_at_exit_handler "kill -TERM $pid 2>/dev/null; rm -rf '$state_dir'"
|
|
|
|
|
|
|
|
QEMU_OPTIONS+=" -chardev socket,id=chrtpm,path=$state_dir/sock -tpmdev emulator,id=tpm0,chardev=chrtpm -device $tpm_device,tpmdev=tpm0"
|
|
|
|
dinfo "Configured emulated TPM2 device $tpm_device"
|
|
|
|
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
qemu_get_tpm_device() {
|
|
|
|
local tpm_device="tpm-tis"
|
|
|
|
|
|
|
|
if [[ "$(uname -m)" == "ppc64le" ]]; then
|
|
|
|
# tpm-spapr support was introduced in qemu 5.0.0
|
|
|
|
if ! qemu_min_version "5.0.0"; then
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
tpm_device="tpm-spapr"
|
|
|
|
fi
|
|
|
|
|
|
|
|
echo "$tpm_device"
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2020-12-15 19:05:14 +08:00
|
|
|
# Compares argument #1=X.Y.Z (X&Y&Z = numeric) to the version of the installed qemu
|
|
|
|
# returns 0 if newer or equal
|
|
|
|
# returns 1 if older
|
|
|
|
# returns 2 if failing
|
2021-04-17 00:33:44 +08:00
|
|
|
qemu_min_version() {
|
2020-12-15 19:05:14 +08:00
|
|
|
find_qemu_bin || return 2
|
|
|
|
|
|
|
|
# get version from binary
|
2021-04-17 00:33:44 +08:00
|
|
|
local qemu_ver
|
|
|
|
qemu_ver="$("$QEMU_BIN" --version | awk '/^QEMU emulator version ([0-9]*\.[0-9]*\.[0-9]*)/ {print $4}')"
|
2020-12-15 19:05:14 +08:00
|
|
|
|
|
|
|
# Check version string format
|
|
|
|
echo "$qemu_ver" | grep -q '^[0-9]*\.[0-9]*\.[0-9]*$' || return 2
|
|
|
|
echo "$1" | grep -q '^[0-9]*\.[0-9]*\.[0-9]*$' || return 2
|
|
|
|
|
|
|
|
# compare as last command to return that value
|
|
|
|
printf "%s\n%s\n" "$1" "$qemu_ver" | sort -V -C
|
|
|
|
}
|
|
|
|
|
2023-06-30 01:03:08 +08:00
|
|
|
# Pads a file to multiple of 4 bytes
|
|
|
|
pad4_file() {
|
|
|
|
local size
|
|
|
|
size=$(stat -c "%s" "$1")
|
|
|
|
local padded
|
|
|
|
padded=$((((size + 3) / 4) * 4))
|
|
|
|
truncate -s "$padded" "$1"
|
|
|
|
}
|
|
|
|
|
2022-05-04 18:29:31 +08:00
|
|
|
# Return 0 if qemu did run (then you must check the result state/logs for actual
|
|
|
|
# success), or 1 if qemu is not available.
|
2013-11-06 06:32:56 +08:00
|
|
|
run_qemu() {
|
2023-06-30 01:03:08 +08:00
|
|
|
if declare -F run_qemu_hook >/dev/null; then
|
|
|
|
if ! run_qemu_hook "${workspace}"; then
|
|
|
|
derror "check_qemu_hook() returned with EC > 0"
|
|
|
|
ret=4
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2022-05-26 19:19:11 +08:00
|
|
|
# If the test provided its own initrd, use it (e.g. TEST-24)
|
|
|
|
if [[ -z "$INITRD" && -f "${TESTDIR:?}/initrd.img" ]]; then
|
|
|
|
INITRD="$TESTDIR/initrd.img"
|
|
|
|
fi
|
|
|
|
|
2015-02-03 17:43:24 +08:00
|
|
|
if [ -f /etc/machine-id ]; then
|
2021-04-17 00:33:44 +08:00
|
|
|
read -r MACHINE_ID </etc/machine-id
|
2017-11-17 21:09:11 +08:00
|
|
|
[ -z "$INITRD" ] && [ -e "$EFI_MOUNT/$MACHINE_ID/$KERNEL_VER/initrd" ] \
|
|
|
|
&& INITRD="$EFI_MOUNT/$MACHINE_ID/$KERNEL_VER/initrd"
|
|
|
|
[ -z "$KERNEL_BIN" ] && [ -e "$EFI_MOUNT/$MACHINE_ID/$KERNEL_VER/linux" ] \
|
|
|
|
&& KERNEL_BIN="$EFI_MOUNT/$MACHINE_ID/$KERNEL_VER/linux"
|
2015-02-03 17:43:24 +08:00
|
|
|
fi
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
local CONSOLE=ttyS0
|
2018-02-20 20:01:40 +08:00
|
|
|
|
2023-11-26 03:22:24 +08:00
|
|
|
# Reset the boot counter, if present
|
|
|
|
rm -f "${initdir:?}/var/tmp/.systemd_reboot_count"
|
2020-04-21 19:18:36 +08:00
|
|
|
rm -f "$initdir"/{testok,failed,skipped}
|
2019-12-13 21:21:31 +08:00
|
|
|
# make sure the initdir is not mounted to avoid concurrent access
|
|
|
|
cleanup_initdir
|
|
|
|
umount_loopback
|
|
|
|
|
2016-11-11 10:45:38 +08:00
|
|
|
if [[ ! "$KERNEL_BIN" ]]; then
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$LOOKS_LIKE_ARCH"; then
|
2016-11-11 10:45:38 +08:00
|
|
|
KERNEL_BIN=/boot/vmlinuz-linux
|
|
|
|
else
|
2018-02-20 04:47:41 +08:00
|
|
|
[ "$ARCH" ] || ARCH=$(uname -m)
|
|
|
|
case $ARCH in
|
|
|
|
ppc64*)
|
2021-08-09 20:32:43 +08:00
|
|
|
# Ubuntu ppc64* calls the kernel binary as vmlinux-*, RHEL/CentOS
|
|
|
|
# uses the "standard" vmlinuz- prefix
|
|
|
|
[[ -e "/boot/vmlinux-$KERNEL_VER" ]] && KERNEL_BIN="/boot/vmlinux-$KERNEL_VER" || KERNEL_BIN="/boot/vmlinuz-$KERNEL_VER"
|
|
|
|
CONSOLE=hvc0
|
|
|
|
;;
|
2018-02-20 04:47:41 +08:00
|
|
|
*)
|
2021-08-09 20:32:43 +08:00
|
|
|
KERNEL_BIN="/boot/vmlinuz-$KERNEL_VER"
|
|
|
|
;;
|
2018-02-20 04:47:41 +08:00
|
|
|
esac
|
2016-11-11 10:45:38 +08:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
local default_fedora_initrd="/boot/initramfs-${KERNEL_VER}.img"
|
|
|
|
local default_debian_initrd="/boot/initrd.img-${KERNEL_VER}"
|
|
|
|
local default_arch_initrd="/boot/initramfs-linux-fallback.img"
|
|
|
|
local default_suse_initrd="/boot/initrd-${KERNEL_VER}"
|
2016-11-11 10:45:38 +08:00
|
|
|
if [[ ! "$INITRD" ]]; then
|
|
|
|
if [[ -e "$default_fedora_initrd" ]]; then
|
|
|
|
INITRD="$default_fedora_initrd"
|
2023-11-20 19:17:05 +08:00
|
|
|
elif get_bool "$LOOKS_LIKE_DEBIAN" && [[ -e "$default_debian_initrd" ]]; then
|
2016-11-11 10:45:38 +08:00
|
|
|
INITRD="$default_debian_initrd"
|
2023-11-20 19:17:05 +08:00
|
|
|
elif get_bool "$LOOKS_LIKE_ARCH" && [[ -e "$default_arch_initrd" ]]; then
|
2016-11-11 10:45:38 +08:00
|
|
|
INITRD="$default_arch_initrd"
|
2023-11-20 19:17:05 +08:00
|
|
|
elif get_bool "$LOOKS_LIKE_SUSE" && [[ -e "$default_suse_initrd" ]]; then
|
2017-07-07 02:30:14 +08:00
|
|
|
INITRD="$default_suse_initrd"
|
2016-11-11 10:45:38 +08:00
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2019-03-05 23:08:00 +08:00
|
|
|
# If QEMU_SMP was not explicitly set, try to determine the value 'dynamically'
|
|
|
|
# i.e. use the number of online CPUs on the host machine. If the nproc utility
|
|
|
|
# is not installed or there's some other error when calling it, fall back
|
|
|
|
# to the original value (QEMU_SMP=1).
|
2021-04-17 00:33:44 +08:00
|
|
|
if [[ -z "${QEMU_SMP:=}" ]]; then
|
2019-03-05 23:08:00 +08:00
|
|
|
if ! QEMU_SMP=$(nproc); then
|
|
|
|
dwarn "nproc utility is not installed, falling back to QEMU_SMP=1"
|
|
|
|
QEMU_SMP=1
|
|
|
|
fi
|
|
|
|
fi
|
2013-12-08 07:01:53 +08:00
|
|
|
|
|
|
|
find_qemu_bin || return 1
|
|
|
|
|
2023-06-03 02:28:41 +08:00
|
|
|
if get_bool "${TEST_SETUP_SWTPM:-}"; then
|
|
|
|
qemu_setup_swtpm_socket || return 1
|
|
|
|
fi
|
|
|
|
|
2019-12-12 16:37:19 +08:00
|
|
|
# Umount initdir to avoid concurrent access to the filesystem
|
2021-04-17 00:40:30 +08:00
|
|
|
_umount_dir "$initdir"
|
|
|
|
|
|
|
|
local kernel_params=()
|
|
|
|
local qemu_options=()
|
|
|
|
local qemu_cmd=("$QEMU_BIN")
|
2019-12-12 16:37:19 +08:00
|
|
|
|
2016-11-16 00:38:04 +08:00
|
|
|
if [[ "$UNIFIED_CGROUP_HIERARCHY" = "yes" ]]; then
|
2021-04-17 00:40:30 +08:00
|
|
|
kernel_params+=("systemd.unified_cgroup_hierarchy=yes")
|
2016-11-16 00:38:04 +08:00
|
|
|
elif [[ "$UNIFIED_CGROUP_HIERARCHY" = "no" ]]; then
|
2021-04-17 00:40:30 +08:00
|
|
|
kernel_params+=("systemd.unified_cgroup_hierarchy=no" "systemd.legacy_systemd_cgroup_controller=yes")
|
2016-11-16 00:38:04 +08:00
|
|
|
elif [[ "$UNIFIED_CGROUP_HIERARCHY" = "hybrid" ]]; then
|
2021-04-17 00:40:30 +08:00
|
|
|
kernel_params+=("systemd.unified_cgroup_hierarchy=no" "systemd.legacy_systemd_cgroup_controller=no")
|
2016-11-16 00:38:04 +08:00
|
|
|
elif [[ "$UNIFIED_CGROUP_HIERARCHY" != "default" ]]; then
|
|
|
|
dfatal "Unknown UNIFIED_CGROUP_HIERARCHY. Got $UNIFIED_CGROUP_HIERARCHY, expected [yes|no|hybrid|default]"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$LOOKS_LIKE_SUSE"; then
|
2021-04-17 00:40:30 +08:00
|
|
|
kernel_params+=("rd.hostonly=0")
|
scripts: use 4 space indentation
We had all kinds of indentation: 2 sp, 3 sp, 4 sp, 8 sp, and mixed.
4 sp was the most common, in particular the majority of scripts under test/
used that. Let's standarize on 4 sp, because many commandlines are long and
there's a lot of nesting, and with 8sp indentation less stuff fits. 4 sp
also seems to be the default indentation, so this will make it less likely
that people will mess up if they don't load the editor config. (I think people
often use vi, and vi has no support to load project-wide configuration
automatically. We distribute a .vimrc file, but it is not loaded by default,
and even the instructions in it seem to discourage its use for security
reasons.)
Also remove the few vim config lines that were left. We should either have them
on all files, or none.
Also remove some strange stuff like '#!/bin/env bash', yikes.
2019-04-04 20:10:42 +08:00
|
|
|
fi
|
2017-07-07 02:30:14 +08:00
|
|
|
|
2023-05-18 20:08:56 +08:00
|
|
|
# Debian/Ubuntu's initramfs tries to check if it can resume from hibernation
|
|
|
|
# and wastes a minute or so probing disks, skip that as it's not useful here
|
2021-04-17 00:40:30 +08:00
|
|
|
kernel_params+=(
|
2021-09-14 00:14:05 +08:00
|
|
|
"root=LABEL=systemd_boot"
|
2021-04-17 00:40:30 +08:00
|
|
|
"rw"
|
|
|
|
"raid=noautodetect"
|
|
|
|
"rd.luks=0"
|
|
|
|
"loglevel=2"
|
|
|
|
"init=$PATH_TO_INIT"
|
|
|
|
"console=$CONSOLE"
|
|
|
|
"SYSTEMD_UNIT_PATH=/usr/lib/systemd/tests/testdata/testsuite-$1.units:/usr/lib/systemd/tests/testdata/units:"
|
|
|
|
"systemd.unit=testsuite.target"
|
|
|
|
"systemd.wants=testsuite-$1.service"
|
2023-05-18 20:08:56 +08:00
|
|
|
"noresume"
|
2023-10-24 18:35:03 +08:00
|
|
|
"oops=panic"
|
2023-06-05 16:47:21 +08:00
|
|
|
${TEST_MATCH_SUBTEST:+"systemd.setenv=TEST_MATCH_SUBTEST=$TEST_MATCH_SUBTEST"}
|
|
|
|
${TEST_MATCH_TESTCASE:+"systemd.setenv=TEST_MATCH_TESTCASE=$TEST_MATCH_TESTCASE"}
|
2021-04-17 00:40:30 +08:00
|
|
|
)
|
|
|
|
|
2023-10-24 18:35:03 +08:00
|
|
|
if ! get_bool "$INTERACTIVE_DEBUG" && ! get_bool "$TEST_SKIP_SHUTDOWN"; then
|
2022-09-30 14:48:53 +08:00
|
|
|
kernel_params+=(
|
|
|
|
"panic=1"
|
2023-11-03 22:15:33 +08:00
|
|
|
"softlockup_panic=1"
|
2022-09-30 14:48:53 +08:00
|
|
|
"systemd.wants=end.service"
|
|
|
|
)
|
2019-12-10 01:56:13 +08:00
|
|
|
fi
|
|
|
|
|
2020-05-17 16:46:34 +08:00
|
|
|
[ -e "$IMAGE_PRIVATE" ] && image="$IMAGE_PRIVATE" || image="$IMAGE_PUBLIC"
|
2021-04-17 00:40:30 +08:00
|
|
|
qemu_options+=(
|
|
|
|
-smp "$QEMU_SMP"
|
|
|
|
-net none
|
2022-08-25 20:52:30 +08:00
|
|
|
-m "${QEMU_MEM:-768M}"
|
2021-04-17 00:40:30 +08:00
|
|
|
-nographic
|
|
|
|
-kernel "$KERNEL_BIN"
|
|
|
|
-drive "format=raw,cache=unsafe,file=$image"
|
2022-06-02 15:31:55 +08:00
|
|
|
-device "virtio-rng-pci,max-bytes=1024,period=1000"
|
2021-04-17 00:40:30 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
if [[ -n "${QEMU_OPTIONS:=}" ]]; then
|
|
|
|
local user_qemu_options
|
|
|
|
read -ra user_qemu_options <<< "$QEMU_OPTIONS"
|
|
|
|
qemu_options+=("${user_qemu_options[@]}")
|
|
|
|
fi
|
2023-04-08 02:33:32 +08:00
|
|
|
qemu_options+=(${QEMU_OPTIONS_ARRAY:+"${QEMU_OPTIONS_ARRAY[@]}"})
|
2021-04-17 00:40:30 +08:00
|
|
|
|
2023-06-07 21:21:10 +08:00
|
|
|
if [[ -n "$INITRD" ]]; then
|
2023-06-30 01:03:08 +08:00
|
|
|
if [[ -n "$INITRD_EXTRA" ]]; then
|
|
|
|
# An addition initrd has been specified, let's combine it with the main one.
|
|
|
|
local t="$WORKDIR"/initrd.combined."$RANDOM"
|
|
|
|
|
|
|
|
# First, show contents of additional initrd
|
|
|
|
echo "Additional initrd contents:"
|
|
|
|
cpio -tv < "$INITRD_EXTRA"
|
|
|
|
|
|
|
|
# Copy the main initrd
|
|
|
|
zstd -d -c -f "$INITRD" > "$t"
|
|
|
|
add_at_exit_handler "rm $t"
|
|
|
|
# Kernel requires this to be padded to multiple of 4 bytes with zeroes
|
|
|
|
pad4_file "$t"
|
|
|
|
|
|
|
|
# Copy the additional initrd
|
|
|
|
cat "$INITRD_EXTRA" >> "$t"
|
|
|
|
pad4_file "$t"
|
|
|
|
|
|
|
|
qemu_options+=(-initrd "$t")
|
|
|
|
else
|
|
|
|
qemu_options+=(-initrd "$INITRD")
|
|
|
|
fi
|
2013-12-08 07:01:53 +08:00
|
|
|
fi
|
|
|
|
|
2019-09-27 05:29:38 +08:00
|
|
|
# Let's use KVM if possible
|
2021-07-04 18:21:23 +08:00
|
|
|
if [[ -c /dev/kvm ]] && get_bool $QEMU_KVM; then
|
2021-04-17 00:40:30 +08:00
|
|
|
qemu_options+=(-machine "accel=kvm" -enable-kvm -cpu host)
|
2015-11-19 20:17:15 +08:00
|
|
|
fi
|
|
|
|
|
2016-02-25 02:22:06 +08:00
|
|
|
if [[ "$QEMU_TIMEOUT" != "infinity" ]]; then
|
2021-04-17 00:40:30 +08:00
|
|
|
qemu_cmd=(timeout --foreground "$QEMU_TIMEOUT" "$QEMU_BIN")
|
2016-02-25 02:22:06 +08:00
|
|
|
fi
|
2021-04-17 00:40:30 +08:00
|
|
|
|
2023-11-09 22:33:31 +08:00
|
|
|
(set -x; "${qemu_cmd[@]}" "${qemu_options[@]}" -append "${kernel_params[*]} ${KERNEL_APPEND:-}" |& tee "${TESTDIR:?}/console.log")
|
2016-06-24 18:11:19 +08:00
|
|
|
rc=$?
|
2021-07-04 18:21:23 +08:00
|
|
|
if [ "$rc" -eq 124 ] && [ "$QEMU_TIMEOUT" != "infinity" ]; then
|
|
|
|
derror "Test timed out after ${QEMU_TIMEOUT}s"
|
2016-06-24 18:11:19 +08:00
|
|
|
TIMED_OUT=1
|
|
|
|
else
|
2022-05-04 18:29:31 +08:00
|
|
|
[ "$rc" != 0 ] && derror "qemu failed with exit code $rc"
|
2016-06-24 18:11:19 +08:00
|
|
|
fi
|
|
|
|
return 0
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2016-06-24 22:23:39 +08:00
|
|
|
# Return 0 if nspawn did run (then you must check the result state/logs for actual
|
|
|
|
# success), or 1 if nspawn is not available.
|
2013-11-06 06:32:56 +08:00
|
|
|
run_nspawn() {
|
2016-06-24 22:23:39 +08:00
|
|
|
[[ -d /run/systemd/system ]] || return 1
|
2023-11-26 03:22:24 +08:00
|
|
|
# Reset the boot counter, if present
|
|
|
|
rm -f "${initdir:?}/var/tmp/.systemd_reboot_count"
|
2021-04-17 00:40:30 +08:00
|
|
|
rm -f "${initdir:?}"/{testok,failed,skipped}
|
|
|
|
|
|
|
|
local nspawn_cmd=()
|
|
|
|
local nspawn_options=(
|
|
|
|
"--register=no"
|
|
|
|
"--kill-signal=SIGKILL"
|
|
|
|
"--directory=${1:?}"
|
|
|
|
"--setenv=SYSTEMD_UNIT_PATH=/usr/lib/systemd/tests/testdata/testsuite-$2.units:/usr/lib/systemd/tests/testdata/units:"
|
2022-08-26 21:59:37 +08:00
|
|
|
"--machine=TEST-$TESTID"
|
2021-04-17 00:40:30 +08:00
|
|
|
)
|
|
|
|
local kernel_params=(
|
|
|
|
"$PATH_TO_INIT"
|
|
|
|
"systemd.unit=testsuite.target"
|
|
|
|
"systemd.wants=testsuite-$2.service"
|
2023-06-05 16:47:21 +08:00
|
|
|
${TEST_MATCH_SUBTEST:+"systemd.setenv=TEST_MATCH_SUBTEST=$TEST_MATCH_SUBTEST"}
|
|
|
|
${TEST_MATCH_TESTCASE:+"systemd.setenv=TEST_MATCH_TESTCASE=$TEST_MATCH_TESTCASE"}
|
2019-12-10 01:56:13 +08:00
|
|
|
)
|
|
|
|
|
2023-08-29 04:42:36 +08:00
|
|
|
if get_bool "$INTERACTIVE_DEBUG"; then
|
|
|
|
nspawn_options+=("--console=interactive")
|
2023-10-24 18:35:03 +08:00
|
|
|
elif ! get_bool "$TEST_SKIP_SHUTDOWN"; then
|
2021-04-17 00:40:30 +08:00
|
|
|
kernel_params+=("systemd.wants=end.service")
|
2019-12-10 01:56:13 +08:00
|
|
|
fi
|
|
|
|
|
2021-04-17 00:40:30 +08:00
|
|
|
if [[ -n "${NSPAWN_ARGUMENTS:=}" ]]; then
|
|
|
|
local user_nspawn_arguments
|
|
|
|
read -ra user_nspawn_arguments <<< "$NSPAWN_ARGUMENTS"
|
|
|
|
nspawn_options+=("${user_nspawn_arguments[@]}")
|
|
|
|
fi
|
|
|
|
|
2016-11-16 00:38:04 +08:00
|
|
|
if [[ "$UNIFIED_CGROUP_HIERARCHY" = "hybrid" ]]; then
|
2019-09-27 20:17:41 +08:00
|
|
|
dwarn "nspawn doesn't support SYSTEMD_NSPAWN_UNIFIED_HIERARCHY=hybrid, skipping"
|
2016-11-16 00:38:04 +08:00
|
|
|
exit
|
|
|
|
elif [[ "$UNIFIED_CGROUP_HIERARCHY" = "yes" || "$UNIFIED_CGROUP_HIERARCHY" = "no" ]]; then
|
2021-04-17 00:40:30 +08:00
|
|
|
nspawn_cmd+=(env "SYSTEMD_NSPAWN_UNIFIED_HIERARCHY=$UNIFIED_CGROUP_HIERARCHY")
|
2016-11-16 00:38:04 +08:00
|
|
|
elif [[ "$UNIFIED_CGROUP_HIERARCHY" = "default" ]]; then
|
2021-04-17 00:40:30 +08:00
|
|
|
nspawn_cmd+=(env "--unset=UNIFIED_CGROUP_HIERARCHY" "--unset=SYSTEMD_NSPAWN_UNIFIED_HIERARCHY")
|
2016-11-16 00:38:04 +08:00
|
|
|
else
|
|
|
|
dfatal "Unknown UNIFIED_CGROUP_HIERARCHY. Got $UNIFIED_CGROUP_HIERARCHY, expected [yes|no|hybrid|default]"
|
|
|
|
exit 1
|
|
|
|
fi
|
2016-06-03 17:17:00 +08:00
|
|
|
|
2021-04-17 00:40:30 +08:00
|
|
|
if [[ "$NSPAWN_TIMEOUT" != "infinity" ]]; then
|
|
|
|
nspawn_cmd+=(timeout --foreground "$NSPAWN_TIMEOUT" "$SYSTEMD_NSPAWN")
|
|
|
|
else
|
|
|
|
nspawn_cmd+=("$SYSTEMD_NSPAWN")
|
|
|
|
fi
|
|
|
|
|
2023-11-09 22:33:31 +08:00
|
|
|
# Word splitting here is intentional
|
|
|
|
# shellcheck disable=SC2086
|
|
|
|
(set -x; "${nspawn_cmd[@]}" "${nspawn_options[@]}" "${kernel_params[@]}" ${KERNEL_APPEND:-} |& tee "${TESTDIR:?}/console.log")
|
2016-06-24 18:11:19 +08:00
|
|
|
rc=$?
|
2021-07-04 18:21:23 +08:00
|
|
|
if [ "$rc" -eq 124 ] && [ "$NSPAWN_TIMEOUT" != "infinity" ]; then
|
|
|
|
derror "Test timed out after ${NSPAWN_TIMEOUT}s"
|
2016-06-24 18:11:19 +08:00
|
|
|
TIMED_OUT=1
|
|
|
|
else
|
|
|
|
[ "$rc" != 0 ] && derror "nspawn failed with exit code $rc"
|
|
|
|
fi
|
|
|
|
return 0
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2020-08-28 21:17:31 +08:00
|
|
|
# Build two very minimal root images, with two units, one is the same and one is different across them
|
|
|
|
install_verity_minimal() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Set up a set of minimal images for verity verification"
|
|
|
|
if [ -e "$initdir/usr/share/minimal.raw" ]; then
|
2020-08-28 21:17:31 +08:00
|
|
|
return
|
|
|
|
fi
|
|
|
|
if ! command -v mksquashfs >/dev/null 2>&1; then
|
|
|
|
dfatal "mksquashfs not found"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
if ! command -v veritysetup >/dev/null 2>&1; then
|
|
|
|
dfatal "veritysetup not found"
|
|
|
|
exit 1
|
|
|
|
fi
|
2021-04-17 00:33:44 +08:00
|
|
|
# Local modifications of some global variables is intentional in this
|
|
|
|
# subshell (SC2030)
|
|
|
|
# shellcheck disable=SC2030
|
2020-08-28 21:17:31 +08:00
|
|
|
(
|
|
|
|
BASICTOOLS=(
|
|
|
|
bash
|
|
|
|
cat
|
2021-02-22 20:20:33 +08:00
|
|
|
grep
|
2020-08-28 21:17:31 +08:00
|
|
|
mount
|
|
|
|
sleep
|
2023-06-20 19:53:45 +08:00
|
|
|
touch
|
2020-08-28 21:17:31 +08:00
|
|
|
)
|
2021-04-17 00:33:44 +08:00
|
|
|
oldinitdir="$initdir"
|
|
|
|
rm -rfv "$TESTDIR/minimal"
|
|
|
|
export initdir="$TESTDIR/minimal"
|
2022-01-27 22:10:34 +08:00
|
|
|
# app0 will use TemporaryFileSystem=/var/lib, app1 will need the mount point in the base image
|
|
|
|
mkdir -p "$initdir/usr/lib/systemd/system" "$initdir/usr/lib/extension-release.d" "$initdir/etc" "$initdir/var/tmp" "$initdir/opt" "$initdir/var/lib/app1"
|
2020-08-28 21:17:31 +08:00
|
|
|
setup_basic_dirs
|
|
|
|
install_basic_tools
|
2022-10-05 21:26:16 +08:00
|
|
|
install_ld_so_conf
|
2021-04-17 00:33:44 +08:00
|
|
|
# Shellcheck treats [[ -v VAR ]] as an assignment to avoid a different
|
|
|
|
# issue, thus falsely triggering SC2030 in this case
|
|
|
|
# See: koalaman/shellcheck#1409
|
2021-03-07 05:22:32 +08:00
|
|
|
if [[ -v ASAN_RT_PATH ]]; then
|
|
|
|
# If we're compiled with ASan, install the ASan RT (and its dependencies)
|
|
|
|
# into the verity images to get rid of the annoying errors about
|
|
|
|
# missing $LD_PRELOAD libraries.
|
|
|
|
inst_libs "$ASAN_RT_PATH"
|
|
|
|
inst_library "$ASAN_RT_PATH"
|
|
|
|
fi
|
2021-04-17 00:33:44 +08:00
|
|
|
cp "$os_release" "$initdir/usr/lib/os-release"
|
|
|
|
ln -s ../usr/lib/os-release "$initdir/etc/os-release"
|
|
|
|
touch "$initdir/etc/machine-id" "$initdir/etc/resolv.conf"
|
|
|
|
touch "$initdir/opt/some_file"
|
|
|
|
echo MARKER=1 >>"$initdir/usr/lib/os-release"
|
2022-01-27 22:07:20 +08:00
|
|
|
echo "PORTABLE_PREFIXES=app0 minimal minimal-app0" >>"$initdir/usr/lib/os-release"
|
|
|
|
cat >"$initdir/usr/lib/systemd/system/minimal-app0.service" <<EOF
|
|
|
|
[Service]
|
|
|
|
ExecStartPre=cat /usr/lib/os-release
|
|
|
|
ExecStart=sleep 120
|
|
|
|
EOF
|
|
|
|
cp "$initdir/usr/lib/systemd/system/minimal-app0.service" "$initdir/usr/lib/systemd/system/minimal-app0-foo.service"
|
2021-04-17 00:33:44 +08:00
|
|
|
|
2022-03-08 00:20:42 +08:00
|
|
|
mksquashfs "$initdir" "$oldinitdir/usr/share/minimal_0.raw" -noappend
|
2021-04-17 00:33:44 +08:00
|
|
|
veritysetup format "$oldinitdir/usr/share/minimal_0.raw" "$oldinitdir/usr/share/minimal_0.verity" | \
|
|
|
|
grep '^Root hash:' | cut -f2 | tr -d '\n' >"$oldinitdir/usr/share/minimal_0.roothash"
|
|
|
|
|
|
|
|
sed -i "s/MARKER=1/MARKER=2/g" "$initdir/usr/lib/os-release"
|
2022-01-27 22:07:20 +08:00
|
|
|
rm "$initdir/usr/lib/systemd/system/minimal-app0-foo.service"
|
|
|
|
cp "$initdir/usr/lib/systemd/system/minimal-app0.service" "$initdir/usr/lib/systemd/system/minimal-app0-bar.service"
|
2021-04-17 00:33:44 +08:00
|
|
|
|
2022-03-08 00:20:42 +08:00
|
|
|
mksquashfs "$initdir" "$oldinitdir/usr/share/minimal_1.raw" -noappend
|
2021-04-17 00:33:44 +08:00
|
|
|
veritysetup format "$oldinitdir/usr/share/minimal_1.raw" "$oldinitdir/usr/share/minimal_1.verity" | \
|
|
|
|
grep '^Root hash:' | cut -f2 | tr -d '\n' >"$oldinitdir/usr/share/minimal_1.roothash"
|
2021-02-22 20:20:33 +08:00
|
|
|
|
|
|
|
# Rolling distros like Arch do not set VERSION_ID
|
|
|
|
local version_id=""
|
2021-04-17 00:33:44 +08:00
|
|
|
if grep -q "^VERSION_ID=" "$os_release"; then
|
|
|
|
version_id="$(grep "^VERSION_ID=" "$os_release")"
|
2021-02-22 20:20:33 +08:00
|
|
|
fi
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
export initdir="$TESTDIR/app0"
|
|
|
|
mkdir -p "$initdir/usr/lib/extension-release.d" "$initdir/usr/lib/systemd/system" "$initdir/opt"
|
|
|
|
grep "^ID=" "$os_release" >"$initdir/usr/lib/extension-release.d/extension-release.app0"
|
|
|
|
echo "${version_id}" >>"$initdir/usr/lib/extension-release.d/extension-release.app0"
|
2023-03-23 09:23:04 +08:00
|
|
|
( echo "${version_id}"
|
|
|
|
echo "SYSEXT_IMAGE_ID=app" ) >>"$initdir/usr/lib/extension-release.d/extension-release.app0"
|
2021-04-17 00:33:44 +08:00
|
|
|
cat >"$initdir/usr/lib/systemd/system/app0.service" <<EOF
|
2021-02-22 20:20:33 +08:00
|
|
|
[Service]
|
|
|
|
Type=oneshot
|
|
|
|
RemainAfterExit=yes
|
|
|
|
ExecStart=/opt/script0.sh
|
2022-01-27 22:10:34 +08:00
|
|
|
TemporaryFileSystem=/var/lib
|
|
|
|
StateDirectory=app0
|
|
|
|
RuntimeDirectory=app0
|
2021-02-22 20:20:33 +08:00
|
|
|
EOF
|
2021-04-17 00:33:44 +08:00
|
|
|
cat >"$initdir/opt/script0.sh" <<EOF
|
2021-02-22 20:20:33 +08:00
|
|
|
#!/bin/bash
|
|
|
|
set -e
|
|
|
|
test -e /usr/lib/os-release
|
2023-02-06 04:41:24 +08:00
|
|
|
echo bar >\${STATE_DIRECTORY}/foo
|
2021-02-22 20:20:33 +08:00
|
|
|
cat /usr/lib/extension-release.d/extension-release.app0
|
|
|
|
EOF
|
2021-04-17 00:33:44 +08:00
|
|
|
chmod +x "$initdir/opt/script0.sh"
|
|
|
|
echo MARKER=1 >"$initdir/usr/lib/systemd/system/some_file"
|
2022-03-08 00:20:42 +08:00
|
|
|
mksquashfs "$initdir" "$oldinitdir/usr/share/app0.raw" -noappend
|
2021-04-17 00:33:44 +08:00
|
|
|
|
2023-08-17 02:43:06 +08:00
|
|
|
export initdir="$TESTDIR/conf0"
|
|
|
|
mkdir -p "$initdir/etc/extension-release.d" "$initdir/etc/systemd/system" "$initdir/opt"
|
|
|
|
grep "^ID=" "$os_release" >"$initdir/etc/extension-release.d/extension-release.conf0"
|
|
|
|
echo "${version_id}" >>"$initdir/etc/extension-release.d/extension-release.conf0"
|
|
|
|
( echo "${version_id}"
|
|
|
|
echo "CONFEXT_IMAGE_ID=app" ) >>"$initdir/etc/extension-release.d/extension-release.conf0"
|
|
|
|
echo MARKER_1 >"$initdir/etc/systemd/system/some_file"
|
|
|
|
mksquashfs "$initdir" "$oldinitdir/usr/share/conf0.raw" -noappend
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
export initdir="$TESTDIR/app1"
|
|
|
|
mkdir -p "$initdir/usr/lib/extension-release.d" "$initdir/usr/lib/systemd/system" "$initdir/opt"
|
2021-07-23 03:41:34 +08:00
|
|
|
grep "^ID=" "$os_release" >"$initdir/usr/lib/extension-release.d/extension-release.app2"
|
2021-11-23 23:34:40 +08:00
|
|
|
( echo "${version_id}"
|
|
|
|
echo "SYSEXT_SCOPE=portable"
|
2023-03-23 09:23:04 +08:00
|
|
|
echo "SYSEXT_IMAGE_ID=app"
|
|
|
|
echo "SYSEXT_IMAGE_VERSION=1"
|
2021-11-23 23:34:40 +08:00
|
|
|
echo "PORTABLE_PREFIXES=app1" ) >>"$initdir/usr/lib/extension-release.d/extension-release.app2"
|
2021-07-23 03:41:34 +08:00
|
|
|
setfattr -n user.extension-release.strict -v false "$initdir/usr/lib/extension-release.d/extension-release.app2"
|
2021-04-17 00:33:44 +08:00
|
|
|
cat >"$initdir/usr/lib/systemd/system/app1.service" <<EOF
|
2021-02-22 20:20:33 +08:00
|
|
|
[Service]
|
|
|
|
Type=oneshot
|
|
|
|
RemainAfterExit=yes
|
|
|
|
ExecStart=/opt/script1.sh
|
2022-01-27 22:10:34 +08:00
|
|
|
StateDirectory=app1
|
|
|
|
RuntimeDirectory=app1
|
2021-02-22 20:20:33 +08:00
|
|
|
EOF
|
2021-04-17 00:33:44 +08:00
|
|
|
cat >"$initdir/opt/script1.sh" <<EOF
|
2021-02-22 20:20:33 +08:00
|
|
|
#!/bin/bash
|
|
|
|
set -e
|
|
|
|
test -e /usr/lib/os-release
|
2023-02-06 04:41:24 +08:00
|
|
|
echo baz >\${STATE_DIRECTORY}/foo
|
2021-07-23 03:41:34 +08:00
|
|
|
cat /usr/lib/extension-release.d/extension-release.app2
|
2021-02-22 20:20:33 +08:00
|
|
|
EOF
|
2021-04-17 00:33:44 +08:00
|
|
|
chmod +x "$initdir/opt/script1.sh"
|
|
|
|
echo MARKER=1 >"$initdir/usr/lib/systemd/system/other_file"
|
2022-03-08 00:20:42 +08:00
|
|
|
mksquashfs "$initdir" "$oldinitdir/usr/share/app1.raw" -noappend
|
2022-08-09 19:34:18 +08:00
|
|
|
|
|
|
|
export initdir="$TESTDIR/app-nodistro"
|
|
|
|
mkdir -p "$initdir/usr/lib/extension-release.d" "$initdir/usr/lib/systemd/system"
|
2022-08-09 23:07:20 +08:00
|
|
|
( echo "ID=_any"
|
|
|
|
echo "ARCHITECTURE=_any" ) >"$initdir/usr/lib/extension-release.d/extension-release.app-nodistro"
|
2022-08-09 19:34:18 +08:00
|
|
|
echo MARKER=1 >"$initdir/usr/lib/systemd/system/some_file"
|
|
|
|
mksquashfs "$initdir" "$oldinitdir/usr/share/app-nodistro.raw" -noappend
|
2023-08-15 02:29:13 +08:00
|
|
|
|
|
|
|
export initdir="$TESTDIR/service-scoped-test"
|
|
|
|
mkdir -p "$initdir/etc/extension-release.d" "$initdir/etc/systemd/system"
|
|
|
|
( echo "ID=_any"
|
|
|
|
echo "ARCHITECTURE=_any" ) >"$initdir/etc/extension-release.d/extension-release.service-scoped-test"
|
|
|
|
echo MARKER_CONFEXT_123 >"$initdir/etc/systemd/system/some_file"
|
|
|
|
mksquashfs "$initdir" "$oldinitdir/etc/service-scoped-test.raw" -noappend
|
2023-04-25 20:06:59 +08:00
|
|
|
|
|
|
|
# We need to create a dedicated sysext image to test the reload mechanism. If we share an image to install the
|
|
|
|
# 'foo.service' it will be loaded from another test run, which will impact the targeted test.
|
|
|
|
export initdir="$TESTDIR/app-reload"
|
|
|
|
mkdir -p "$initdir/usr/lib/extension-release.d" "$initdir/usr/lib/systemd/system"
|
|
|
|
( echo "ID=_any"
|
|
|
|
echo "ARCHITECTURE=_any"
|
|
|
|
echo "EXTENSION_RELOAD_MANAGER=1" ) >"$initdir/usr/lib/extension-release.d/extension-release.app-reload"
|
|
|
|
mkdir -p "$initdir/usr/lib/systemd/system/multi-user.target.d"
|
|
|
|
cat >"${initdir}/usr/lib/systemd/system/foo.service" <<EOF
|
|
|
|
[Service]
|
|
|
|
Type=oneshot
|
|
|
|
RemainAfterExit=yes
|
|
|
|
ExecStart=echo foo
|
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|
|
|
|
EOF
|
|
|
|
{ echo "[Unit]"; echo "Upholds=foo.service"; } > "$initdir/usr/lib/systemd/system/multi-user.target.d/10-foo-service.conf"
|
|
|
|
mksquashfs "$initdir" "$oldinitdir/usr/share/app-reload.raw" -noappend
|
2020-08-28 21:17:31 +08:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
setup_basic_environment() {
|
|
|
|
# create the basic filesystem layout
|
|
|
|
setup_basic_dirs
|
|
|
|
|
|
|
|
install_systemd
|
|
|
|
install_missing_libraries
|
|
|
|
install_config_files
|
2019-12-10 22:31:09 +08:00
|
|
|
install_zoneinfo
|
2013-11-06 06:32:56 +08:00
|
|
|
create_rc_local
|
|
|
|
install_basic_tools
|
|
|
|
install_libnss
|
|
|
|
install_pam
|
|
|
|
install_dbus
|
|
|
|
install_fonts
|
2022-06-14 08:13:00 +08:00
|
|
|
install_locales
|
2013-11-06 06:32:56 +08:00
|
|
|
install_keymaps
|
2022-06-14 08:12:00 +08:00
|
|
|
install_x11_keymaps
|
2013-11-06 06:32:56 +08:00
|
|
|
install_terminfo
|
|
|
|
install_execs
|
2021-04-21 15:58:26 +08:00
|
|
|
install_fs_tools
|
|
|
|
install_modules
|
2013-11-06 06:32:56 +08:00
|
|
|
install_plymouth
|
2021-08-06 22:47:32 +08:00
|
|
|
install_haveged
|
2013-11-06 06:32:56 +08:00
|
|
|
install_debug_tools
|
|
|
|
install_ld_so_conf
|
2020-03-21 02:05:36 +08:00
|
|
|
install_testuser
|
|
|
|
has_user_dbus_socket && install_user_dbus
|
2016-01-25 10:45:43 +08:00
|
|
|
setup_selinux
|
2013-11-06 06:32:56 +08:00
|
|
|
install_depmod_files
|
|
|
|
generate_module_dependencies
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$IS_BUILT_WITH_ASAN"; then
|
2019-05-25 04:35:52 +08:00
|
|
|
create_asan_wrapper
|
2018-07-05 12:09:30 +08:00
|
|
|
fi
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$TEST_INSTALL_VERITY_MINIMAL"; then
|
2020-08-28 21:17:31 +08:00
|
|
|
install_verity_minimal
|
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2016-01-25 10:45:43 +08:00
|
|
|
setup_selinux() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Setup SELinux"
|
2016-01-25 10:45:43 +08:00
|
|
|
# don't forget KERNEL_APPEND='... selinux=1 ...'
|
2021-07-04 18:21:23 +08:00
|
|
|
if ! get_bool "$SETUP_SELINUX"; then
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "SETUP_SELINUX != yes, skipping SELinux configuration"
|
2016-01-25 10:45:43 +08:00
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
|
2023-11-14 19:53:51 +08:00
|
|
|
for dir in /etc/selinux /usr/share/selinux; do
|
|
|
|
rm -rf "${initdir:?}/$dir"
|
|
|
|
if ! cp -ar "$dir" "$initdir/$dir"; then
|
|
|
|
dfatal "Failed to copy $dir"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
done
|
2016-01-25 10:45:43 +08:00
|
|
|
|
2023-06-06 04:32:27 +08:00
|
|
|
# We use a custom autorelabel service instead of the SELinux provided set
|
|
|
|
# of units & a generator, since the generator overrides the default target
|
|
|
|
# to the SELinux one when it detects /.autorelabel. However, we use
|
|
|
|
# systemd.unit= on the kernel command cmdline which always takes precedence,
|
|
|
|
# rendering all SELinux efforts useless. Also, pulling in selinux-autorelabel.service
|
|
|
|
# explicitly doesn't work either, as it doesn't check for the presence of /.autorelabel
|
|
|
|
# and does the relabeling unconditionally which always ends with a reboot, so
|
|
|
|
# we end up in a reboot loop (and it also spews quite a lot of errors as it
|
|
|
|
# wants /etc/fstab and dracut-initramfs-restore).
|
2021-04-17 00:33:44 +08:00
|
|
|
touch "$initdir/.autorelabel"
|
|
|
|
mkdir -p "$initdir/usr/lib/systemd/tests/testdata/units/basic.target.wants"
|
|
|
|
ln -sf ../autorelabel.service "$initdir/usr/lib/systemd/tests/testdata/units/basic.target.wants/"
|
2016-01-25 10:45:43 +08:00
|
|
|
|
2023-11-14 19:53:51 +08:00
|
|
|
# Tools requires by fixfiles
|
|
|
|
image_install awk bash cat chcon expr egrep find grep head secon setfiles rm sort uname uniq
|
|
|
|
image_install fixfiles getenforce load_policy selinuxenabled sestatus
|
2016-01-25 10:45:43 +08:00
|
|
|
}
|
|
|
|
|
2016-01-14 16:09:09 +08:00
|
|
|
install_valgrind() {
|
|
|
|
if ! type -p valgrind; then
|
|
|
|
dfatal "Failed to install valgrind"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2023-05-08 19:43:03 +08:00
|
|
|
local valgrind_bins valgrind_libs valgrind_supp
|
2021-04-17 00:33:44 +08:00
|
|
|
|
2023-05-08 19:43:03 +08:00
|
|
|
readarray -t valgrind_bins < <(strace -e execve valgrind /bin/true 2>&1 >/dev/null |
|
|
|
|
sed -r -n 's/execve\("([^"]*)".*/\1/p')
|
2022-05-04 04:50:39 +08:00
|
|
|
image_install "${valgrind_bins[@]}"
|
2016-01-14 16:09:09 +08:00
|
|
|
|
2023-05-08 19:43:03 +08:00
|
|
|
readarray -t valgrind_libs < <(LD_DEBUG=files valgrind /bin/true 2>&1 >/dev/null |
|
|
|
|
sed -r -n 's|.*calling init: (/.*vgpreload_.*)|\1|p')
|
2022-05-04 04:50:39 +08:00
|
|
|
image_install "${valgrind_libs[@]}"
|
2016-01-14 16:09:09 +08:00
|
|
|
|
2023-05-08 19:43:03 +08:00
|
|
|
readarray -t valgrind_supp < <(strace -e open valgrind /bin/true 2>&1 >/dev/null |
|
|
|
|
sed -r -n 's,open\("([^"]*(/debug[^"]*|\.supp))".*= [0-9].*,\1,p')
|
|
|
|
image_install "${valgrind_supp[@]}"
|
2016-01-14 16:09:09 +08:00
|
|
|
}
|
|
|
|
|
2016-01-15 10:52:12 +08:00
|
|
|
create_valgrind_wrapper() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local valgrind_wrapper="$initdir/$ROOTLIBDIR/systemd-under-valgrind"
|
|
|
|
ddebug "Create $valgrind_wrapper"
|
|
|
|
cat >"$valgrind_wrapper" <<EOF
|
2020-03-04 17:35:06 +08:00
|
|
|
#!/usr/bin/env bash
|
2016-01-15 10:52:12 +08:00
|
|
|
|
2016-08-26 23:49:56 +08:00
|
|
|
mount -t proc proc /proc
|
2022-05-04 04:51:56 +08:00
|
|
|
exec valgrind --leak-check=full --track-fds=yes --log-file=/valgrind.out $ROOTLIBDIR/systemd "\$@"
|
2016-01-15 10:52:12 +08:00
|
|
|
EOF
|
2021-04-17 00:33:44 +08:00
|
|
|
chmod 0755 "$valgrind_wrapper"
|
2016-01-15 10:52:12 +08:00
|
|
|
}
|
|
|
|
|
2018-07-03 11:25:53 +08:00
|
|
|
create_asan_wrapper() {
|
2023-06-23 20:28:30 +08:00
|
|
|
local asan_wrapper default_asan_options default_ubsan_options default_environment manager_environment
|
2019-05-25 04:35:52 +08:00
|
|
|
|
2021-03-07 05:21:30 +08:00
|
|
|
[[ -z "$ASAN_RT_PATH" ]] && dfatal "ASAN_RT_PATH is empty, but it shouldn't be"
|
|
|
|
|
2024-01-05 03:31:32 +08:00
|
|
|
default_asan_options="${ASAN_OPTIONS:-strict_string_checks=1:detect_stack_use_after_return=1:check_initialization_order=1:strict_init_order=1:disable_coredump=0:use_madv_dontdump=1}"
|
2023-05-25 21:31:48 +08:00
|
|
|
default_ubsan_options="${UBSAN_OPTIONS:-print_stacktrace=1:print_summary=1:halt_on_error=1}"
|
2019-05-25 04:35:52 +08:00
|
|
|
|
2023-05-25 21:31:48 +08:00
|
|
|
if [[ "$ASAN_COMPILER" == "clang" ]]; then
|
|
|
|
# clang: install llvm-symbolizer to generate useful reports
|
|
|
|
# See: https://clang.llvm.org/docs/AddressSanitizer.html#symbolizing-the-reports
|
|
|
|
image_install "llvm-symbolizer"
|
2018-07-03 11:25:53 +08:00
|
|
|
|
2023-05-25 21:31:48 +08:00
|
|
|
# Let's add the ASan DSO's path to the dynamic linker's cache. This is pretty
|
|
|
|
# unnecessary for gcc & libasan, however, for clang this is crucial, as its
|
|
|
|
# runtime ASan DSO is in a non-standard (library) path.
|
|
|
|
mkdir -p "${initdir:?}/etc/ld.so.conf.d/"
|
|
|
|
echo "${ASAN_RT_PATH%/*}" >"${initdir:?}/etc/ld.so.conf.d/asan-path-override.conf"
|
2023-06-07 21:19:44 +08:00
|
|
|
ldconfig -r "$initdir"
|
2023-05-25 21:31:48 +08:00
|
|
|
fi
|
2022-09-24 06:00:36 +08:00
|
|
|
|
2023-05-25 21:31:48 +08:00
|
|
|
# Create a simple environment file which can be included by systemd services
|
|
|
|
# that need it (i.e. services that utilize DynamicUser=true and bash, etc.)
|
|
|
|
cat >"${initdir:?}/usr/lib/systemd/systemd-asan-env" <<EOF
|
2022-09-24 06:00:36 +08:00
|
|
|
LD_PRELOAD=$ASAN_RT_PATH
|
2023-05-25 21:31:48 +08:00
|
|
|
ASAN_OPTIONS=$default_asan_options
|
2022-10-12 23:28:47 +08:00
|
|
|
LSAN_OPTIONS=detect_leaks=0
|
2023-05-25 21:31:48 +08:00
|
|
|
UBSAN_OPTIONS=$default_ubsan_options
|
|
|
|
EOF
|
2018-07-03 11:25:53 +08:00
|
|
|
|
2023-05-25 21:31:48 +08:00
|
|
|
default_environment=(
|
|
|
|
"ASAN_OPTIONS='$default_asan_options'"
|
|
|
|
"UBSAN_OPTIONS='$default_ubsan_options'"
|
|
|
|
"ASAN_RT_PATH='$ASAN_RT_PATH'"
|
|
|
|
)
|
2023-06-23 20:28:30 +08:00
|
|
|
manager_environment=(
|
|
|
|
"ASAN_OPTIONS='$default_asan_options:log_path=/systemd-pid1.asan.log:log_to_syslog=1'"
|
|
|
|
"UBSAN_OPTIONS='$default_ubsan_options:log_path=/systemd-pid1.ubsan.log:log_to_syslog=1'"
|
|
|
|
"ASAN_RT_PATH='$ASAN_RT_PATH'"
|
|
|
|
)
|
2021-03-07 05:21:30 +08:00
|
|
|
|
2023-05-25 21:31:48 +08:00
|
|
|
mkdir -p "${initdir:?}/etc/systemd/system.conf.d/"
|
|
|
|
cat >"${initdir:?}/etc/systemd/system.conf.d/asan.conf" <<EOF
|
|
|
|
[Manager]
|
|
|
|
DefaultEnvironment=${default_environment[*]}
|
2023-06-23 20:28:30 +08:00
|
|
|
ManagerEnvironment=${manager_environment[*]}
|
2023-05-25 21:31:48 +08:00
|
|
|
DefaultTimeoutStartSec=180s
|
|
|
|
EOF
|
2018-07-03 11:25:53 +08:00
|
|
|
|
2023-05-25 21:31:48 +08:00
|
|
|
# ASAN and syscall filters aren't compatible with each other.
|
|
|
|
find "${initdir:?}" -name '*.service' -type f -print0 | xargs -0 sed -i 's/^\(MemoryDeny\|SystemCall\)/#\1/'
|
2018-07-03 11:25:53 +08:00
|
|
|
|
2023-05-25 21:31:48 +08:00
|
|
|
mkdir -p "${initdir:?}/etc/systemd/system/systemd-journald.service.d/"
|
|
|
|
cat >"${initdir:?}/etc/systemd/system/systemd-journald.service.d/asan-env.conf" <<EOF
|
|
|
|
[Service]
|
2018-07-04 03:29:42 +08:00
|
|
|
# The redirection of ASAN reports to a file prevents them from ending up in /dev/null.
|
|
|
|
# But, apparently, sometimes it doesn't work: https://github.com/google/sanitizers/issues/886.
|
2023-05-25 21:31:48 +08:00
|
|
|
Environment=ASAN_OPTIONS=$default_asan_options:log_path=/systemd-journald.asan.log UBSAN_OPTIONS=$default_ubsan_options:log_path=/systemd-journald.ubsan.log
|
2018-07-04 03:29:42 +08:00
|
|
|
|
2019-05-10 08:47:03 +08:00
|
|
|
# Sometimes UBSan sends its reports to stderr regardless of what is specified in log_path
|
|
|
|
# Let's try to catch them by redirecting stderr (and stdout just in case) to a file
|
|
|
|
# See https://github.com/systemd/systemd/pull/12524#issuecomment-491108821
|
2023-05-25 21:31:48 +08:00
|
|
|
StandardOutput=file:/systemd-journald.out
|
|
|
|
EOF
|
2019-05-10 08:47:03 +08:00
|
|
|
|
2023-05-25 21:31:48 +08:00
|
|
|
# 90s isn't enough for some services to finish when literally everything is run
|
|
|
|
# under ASan+UBSan in containers, which, in turn, are run in VMs.
|
|
|
|
# Let's limit which environments such services should be executed in.
|
|
|
|
mkdir -p "${initdir:?}/etc/systemd/system/systemd-hwdb-update.service.d/"
|
|
|
|
cat >"${initdir:?}/etc/systemd/system/systemd-hwdb-update.service.d/asan.conf" <<EOF
|
|
|
|
[Unit]
|
|
|
|
ConditionVirtualization=container
|
2018-12-24 08:15:43 +08:00
|
|
|
|
2023-05-25 21:31:48 +08:00
|
|
|
[Service]
|
|
|
|
TimeoutSec=240s
|
|
|
|
EOF
|
2019-05-11 00:33:35 +08:00
|
|
|
|
2023-05-25 21:31:48 +08:00
|
|
|
# Let's override another hard-coded timeout that kicks in too early
|
|
|
|
mkdir -p "${initdir:?}/etc/systemd/system/systemd-journal-flush.service.d/"
|
|
|
|
cat >"${initdir:?}/etc/systemd/system/systemd-journal-flush.service.d/asan.conf" <<EOF
|
|
|
|
[Service]
|
|
|
|
TimeoutSec=180s
|
2018-07-03 11:25:53 +08:00
|
|
|
EOF
|
|
|
|
|
2023-05-25 21:31:48 +08:00
|
|
|
asan_wrapper="${initdir:?}/${PATH_TO_INIT:?}"
|
|
|
|
# Sanity check to make sure we don't overwrite something we shouldn't.
|
|
|
|
[[ "$asan_wrapper" =~ systemd-under-asan$ ]]
|
|
|
|
|
|
|
|
cat >"$asan_wrapper" <<EOF
|
|
|
|
#!/usr/bin/env bash
|
|
|
|
set -eux
|
|
|
|
|
2023-06-15 19:11:24 +08:00
|
|
|
export PATH="/sbin:/bin:/usr/sbin:/usr/bin"
|
2023-06-23 20:28:30 +08:00
|
|
|
export ${manager_environment[@]}
|
2023-05-25 21:31:48 +08:00
|
|
|
[[ -n "\$ASAN_OPTIONS" && -n "\$UBSAN_OPTIONS" ]]
|
2023-06-15 19:11:24 +08:00
|
|
|
|
2023-05-25 21:31:48 +08:00
|
|
|
exec "$ROOTLIBDIR/systemd" "\$@"
|
|
|
|
EOF
|
2021-04-17 00:33:44 +08:00
|
|
|
chmod 0755 "$asan_wrapper"
|
2018-07-03 11:25:53 +08:00
|
|
|
}
|
|
|
|
|
2016-03-04 09:55:46 +08:00
|
|
|
create_strace_wrapper() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local strace_wrapper="$initdir/$ROOTLIBDIR/systemd-under-strace"
|
|
|
|
ddebug "Create $strace_wrapper"
|
|
|
|
cat >"$strace_wrapper" <<EOF
|
2020-03-04 17:35:06 +08:00
|
|
|
#!/usr/bin/env bash
|
2016-03-04 09:55:46 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
exec strace -f -D -o /strace.out "$ROOTLIBDIR/systemd" "\$@"
|
2016-03-04 09:55:46 +08:00
|
|
|
EOF
|
2021-04-17 00:33:44 +08:00
|
|
|
chmod 0755 "$strace_wrapper"
|
2016-03-04 09:55:46 +08:00
|
|
|
}
|
|
|
|
|
2021-04-21 15:58:26 +08:00
|
|
|
install_fs_tools() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install fsck"
|
2021-09-08 19:33:34 +08:00
|
|
|
image_install /sbin/fsck*
|
|
|
|
image_install -o /bin/fsck*
|
2016-04-04 19:07:56 +08:00
|
|
|
|
|
|
|
# fskc.reiserfs calls reiserfsck. so, install it
|
2021-09-08 19:33:34 +08:00
|
|
|
image_install -o reiserfsck
|
2021-04-21 15:58:26 +08:00
|
|
|
|
|
|
|
# we use mkfs in system-repart tests
|
2021-09-08 19:33:34 +08:00
|
|
|
image_install /sbin/mkfs.ext4
|
|
|
|
image_install /sbin/mkfs.vfat
|
2021-04-21 15:58:26 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
install_modules() {
|
|
|
|
dinfo "Install modules"
|
|
|
|
|
2024-02-14 18:24:05 +08:00
|
|
|
instmods bridge dummy ext4 ipvlan macvlan vfat veth
|
2023-05-14 19:13:24 +08:00
|
|
|
instmods loop =block
|
2021-06-18 23:10:30 +08:00
|
|
|
instmods nls_ascii =nls
|
2023-05-14 19:13:24 +08:00
|
|
|
instmods overlay =overlayfs
|
2023-05-20 04:01:05 +08:00
|
|
|
instmods scsi_debug
|
2021-04-21 15:58:26 +08:00
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$LOOKS_LIKE_SUSE"; then
|
2024-02-14 18:24:05 +08:00
|
|
|
instmods af_packet
|
2021-04-21 15:58:26 +08:00
|
|
|
fi
|
2016-01-16 16:06:59 +08:00
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
install_dmevent() {
|
|
|
|
instmods dm_crypt =crypto
|
2019-07-14 11:03:26 +08:00
|
|
|
inst_binary dmeventd
|
2021-09-14 00:39:00 +08:00
|
|
|
image_install "${ROOTLIBDIR:?}"/system/dm-event.{service,socket}
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$LOOKS_LIKE_DEBIAN"; then
|
2016-01-17 11:32:37 +08:00
|
|
|
# dmsetup installs 55-dm and 60-persistent-storage-dm on Debian/Ubuntu
|
2018-02-15 04:34:55 +08:00
|
|
|
# and since buster/bionic 95-dm-notify.rules
|
|
|
|
# see https://gitlab.com/debian-lvm/lvm2/blob/master/debian/patches/udev.patch
|
|
|
|
inst_rules 55-dm.rules 60-persistent-storage-dm.rules 95-dm-notify.rules
|
2016-01-17 11:32:37 +08:00
|
|
|
else
|
|
|
|
inst_rules 10-dm.rules 13-dm-disk.rules 95-dm-notify.rules
|
|
|
|
fi
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$LOOKS_LIKE_SUSE"; then
|
2020-07-22 04:14:53 +08:00
|
|
|
inst_rules 60-persistent-storage.rules 61-persistent-storage-compat.rules 99-systemd.rules
|
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2021-09-09 00:17:46 +08:00
|
|
|
install_multipath() {
|
|
|
|
instmods "=md" multipath
|
|
|
|
image_install kpartx /lib/udev/kpartx_id lsmod mpathpersist multipath multipathd partx
|
|
|
|
image_install "${ROOTLIBDIR:?}"/system/multipathd.{service,socket}
|
|
|
|
if get_bool "$LOOKS_LIKE_DEBIAN"; then
|
2024-01-05 03:28:37 +08:00
|
|
|
# Note: try both 60-kpartx.rules (as seen on Debian Sid with 0.9.4-7) and 95-kpartx.rules (as seen on
|
2024-01-04 00:24:03 +08:00
|
|
|
# Ubuntu Jammy with 0.8.8-1ubuntu1.22.04.4)
|
2024-01-05 03:28:37 +08:00
|
|
|
inst_rules 56-dm-parts.rules 56-dm-mpath.rules 60-kpartx.rules 60-multipath.rules 68-del-part-nodes.rules 95-kpartx.rules
|
2021-09-09 00:17:46 +08:00
|
|
|
else
|
|
|
|
inst_rules 11-dm-mpath.rules 11-dm-parts.rules 62-multipath.rules 66-kpartx.rules 68-del-part-nodes.rules
|
|
|
|
fi
|
|
|
|
mkdir -p "${initdir:?}/etc/multipath"
|
|
|
|
|
|
|
|
local file
|
|
|
|
while read -r file; do
|
|
|
|
# Install libraries required by the given library
|
|
|
|
inst_libs "$file"
|
|
|
|
# Install the library itself and create necessary symlinks
|
|
|
|
inst_library "$file"
|
|
|
|
done < <(find /lib*/multipath -type f)
|
|
|
|
}
|
|
|
|
|
2021-09-14 00:39:22 +08:00
|
|
|
install_lvm() {
|
2023-12-13 19:27:17 +08:00
|
|
|
local lvm_rules rule_prefix
|
|
|
|
|
2021-09-14 00:39:22 +08:00
|
|
|
image_install lvm
|
|
|
|
image_install "${ROOTLIBDIR:?}"/system/lvm2-lvmpolld.{service,socket}
|
2021-11-02 03:55:38 +08:00
|
|
|
image_install "${ROOTLIBDIR:?}"/system/{blk-availability,lvm2-monitor}.service
|
2021-09-14 00:39:22 +08:00
|
|
|
image_install -o "/lib/tmpfiles.d/lvm2.conf"
|
2023-12-13 19:27:17 +08:00
|
|
|
|
2021-09-14 00:39:22 +08:00
|
|
|
if get_bool "$LOOKS_LIKE_DEBIAN"; then
|
2023-12-13 19:27:17 +08:00
|
|
|
lvm_rules="56-lvm.rules"
|
|
|
|
rule_prefix=""
|
2021-09-14 00:39:22 +08:00
|
|
|
else
|
2023-12-13 19:27:17 +08:00
|
|
|
lvm_rules="11-dm-lvm.rules"
|
|
|
|
rule_prefix="dm-"
|
2021-09-14 00:39:22 +08:00
|
|
|
fi
|
2023-12-13 19:27:17 +08:00
|
|
|
|
|
|
|
# Support the new udev autoactivation introduced in lvm 2.03.14
|
|
|
|
# https://sourceware.org/git/?p=lvm2.git;a=commit;h=67722b312390cdab29c076c912e14bd739c5c0f6
|
|
|
|
# Static autoactivation (via lvm2-activation-generator) was dropped
|
|
|
|
# in lvm 2.03.15
|
|
|
|
# https://sourceware.org/git/?p=lvm2.git;a=commit;h=ee8fb0310c53ed003a43b324c99cdfd891dd1a7c
|
|
|
|
if [[ -f "/lib/udev/rules.d/69-${rule_prefix}lvm.rules" ]]; then
|
|
|
|
inst_rules "$lvm_rules" "69-${rule_prefix}lvm.rules"
|
|
|
|
else
|
|
|
|
image_install "${ROOTLIBDIR:?}"/system-generators/lvm2-activation-generator
|
|
|
|
image_install "${ROOTLIBDIR:?}"/system/lvm2-pvscan@.service
|
|
|
|
inst_rules "$lvm_rules" "69-${rule_prefix}lvm-metad.rules"
|
|
|
|
fi
|
|
|
|
|
2021-09-14 00:39:22 +08:00
|
|
|
mkdir -p "${initdir:?}/etc/lvm"
|
|
|
|
}
|
|
|
|
|
2023-12-06 12:29:36 +08:00
|
|
|
host_has_btrfs() (
|
|
|
|
set -e
|
|
|
|
modprobe -nv btrfs && command -v mkfs.btrfs && command -v btrfs || return $?
|
|
|
|
)
|
|
|
|
|
2021-09-18 01:19:23 +08:00
|
|
|
install_btrfs() {
|
|
|
|
instmods btrfs
|
|
|
|
# Not all utilities provided by btrfs-progs are listed here; extend the list
|
|
|
|
# if necessary
|
|
|
|
image_install btrfs btrfstune mkfs.btrfs
|
|
|
|
inst_rules 64-btrfs-dm.rules
|
|
|
|
}
|
|
|
|
|
2021-09-22 03:32:30 +08:00
|
|
|
install_iscsi() {
|
|
|
|
# Install both client and server side stuff by default
|
|
|
|
local inst="${1:-}"
|
|
|
|
local file
|
|
|
|
|
|
|
|
# Install client-side stuff ("initiator" in iSCSI jargon) - Open-iSCSI in this case
|
|
|
|
# (open-iscsi on Debian, iscsi-initiator-utils on Fedora, etc.)
|
|
|
|
if [[ -z "$inst" || "$inst" =~ (client|initiator) ]]; then
|
|
|
|
image_install iscsi-iname iscsiadm iscsid iscsistart
|
|
|
|
image_install -o "${ROOTLIBDIR:?}"/system/iscsi-{init,onboot,shutdown}.service
|
|
|
|
image_install "${ROOTLIBDIR:?}"/system/iscsid.{service,socket}
|
|
|
|
image_install "${ROOTLIBDIR:?}"/system/iscsi.service
|
|
|
|
mkdir -p "${initdir:?}"/var/lib/iscsi/{ifaces,isns,nodes,send_targets,slp,static}
|
|
|
|
mkdir -p "${initdir:?}/etc/iscsi"
|
|
|
|
echo "iscsid.startup = /bin/systemctl start iscsid.socket" >"${initdir:?}/etc/iscsi/iscsid.conf"
|
2022-09-27 05:14:18 +08:00
|
|
|
# Since open-iscsi 2.1.2 [0] the initiator name should be generated via
|
|
|
|
# a one-time service instead of distro package's post-install scripts.
|
|
|
|
# However, some distros still use this approach even after this patch,
|
|
|
|
# so prefer the already existing initiatorname.iscsi file if it exists.
|
|
|
|
#
|
|
|
|
# [0] https://github.com/open-iscsi/open-iscsi/commit/f37d5b653f9f251845db3f29b1a3dcb90ec89731
|
|
|
|
if [[ ! -e /etc/iscsi/initiatorname.iscsi ]]; then
|
|
|
|
image_install "${ROOTLIBDIR:?}"/system/iscsi-init.service
|
2022-10-03 04:51:56 +08:00
|
|
|
if get_bool "$IS_BUILT_WITH_ASAN"; then
|
|
|
|
# The iscsi-init.service calls `sh` which might, in certain circumstances,
|
|
|
|
# pull in instrumented systemd NSS modules causing `sh` to fail. Let's mitigate
|
|
|
|
# this by pulling in an env file crafted by `create_asan_wrapper()` that
|
|
|
|
# (among others) pre-loads ASan's DSO.
|
|
|
|
mkdir -p "${initdir:?}/etc/systemd/system/iscsi-init.service.d/"
|
|
|
|
printf "[Service]\nEnvironmentFile=/usr/lib/systemd/systemd-asan-env" >"${initdir:?}/etc/systemd/system/iscsi-init.service.d/asan-env.conf"
|
|
|
|
fi
|
2022-09-27 05:14:18 +08:00
|
|
|
else
|
|
|
|
inst_simple "/etc/iscsi/initiatorname.iscsi"
|
|
|
|
fi
|
2021-09-22 03:32:30 +08:00
|
|
|
fi
|
|
|
|
|
|
|
|
# Install server-side stuff ("target" in iSCSI jargon) - TGT in this case
|
|
|
|
# (tgt on Debian, scsi-target-utils on Fedora, etc.)
|
|
|
|
if [[ -z "$inst" || "$inst" =~ (server|target) ]]; then
|
|
|
|
image_install tgt-admin tgt-setup-lun tgtadm tgtd tgtimg
|
|
|
|
image_install -o /etc/sysconfig/tgtd
|
|
|
|
image_install "${ROOTLIBDIR:?}"/system/tgtd.service
|
|
|
|
mkdir -p "${initdir:?}/etc/tgt"
|
|
|
|
touch "${initdir:?}"/etc/tgt/{tgtd,targets}.conf
|
|
|
|
# Install perl modules required by tgt-admin
|
|
|
|
#
|
|
|
|
# Forgive me father for I have sinned. The monstrosity below appends
|
|
|
|
# a perl snippet to the `tgt-admin` perl script on the fly, which
|
|
|
|
# dumps a list of files (perl modules) required by `tgt-admin` at
|
|
|
|
# the runtime plus any DSOs loaded via DynaLoader. This list is then
|
|
|
|
# passed to `inst_simple` which installs the necessary files into the image
|
2021-09-30 02:30:08 +08:00
|
|
|
#
|
|
|
|
# shellcheck disable=SC2016
|
2021-09-22 03:32:30 +08:00
|
|
|
while read -r file; do
|
|
|
|
inst_simple "$file"
|
2021-09-30 02:30:08 +08:00
|
|
|
done < <(perl -- <(cat "$(command -v tgt-admin)" <(echo -e 'use DynaLoader; print map { "$_\n" } values %INC; print join("\n", @DynaLoader::dl_shared_objects)')) -p | awk '/^\// { print $1 }')
|
2021-09-22 03:32:30 +08:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2023-12-06 12:29:36 +08:00
|
|
|
host_has_mdadm() (
|
|
|
|
set -e
|
|
|
|
command -v mdadm || return $?
|
|
|
|
)
|
|
|
|
|
2022-04-08 00:03:17 +08:00
|
|
|
install_mdadm() {
|
|
|
|
local unit
|
|
|
|
local mdadm_units=(
|
|
|
|
system/mdadm-grow-continue@.service
|
|
|
|
system/mdadm-last-resort@.service
|
|
|
|
system/mdadm-last-resort@.timer
|
|
|
|
system/mdmon@.service
|
|
|
|
system/mdmonitor-oneshot.service
|
|
|
|
system/mdmonitor-oneshot.timer
|
|
|
|
system/mdmonitor.service
|
|
|
|
system-shutdown/mdadm.shutdown
|
|
|
|
)
|
|
|
|
|
2023-12-06 12:32:15 +08:00
|
|
|
instmods "=md"
|
2022-04-08 00:03:17 +08:00
|
|
|
image_install mdadm mdmon
|
|
|
|
inst_rules 01-md-raid-creating.rules 63-md-raid-arrays.rules 64-md-raid-assembly.rules 69-md-clustered-confirm-device.rules
|
|
|
|
# Fedora/CentOS/RHEL ships this rule file
|
|
|
|
[[ -f /lib/udev/rules.d/65-md-incremental.rules ]] && inst_rules 65-md-incremental.rules
|
|
|
|
|
|
|
|
for unit in "${mdadm_units[@]}"; do
|
|
|
|
image_install "${ROOTLIBDIR:?}/$unit"
|
|
|
|
done
|
2023-12-13 13:28:00 +08:00
|
|
|
|
|
|
|
# Disable the mdmonitor service, since it fails if there's no valid email address
|
|
|
|
# configured in /etc/mdadm.conf, which just unnecessarily pollutes the logs
|
|
|
|
"${SYSTEMCTL:?}" mask --root "${initdir:?}" mdmonitor.service || :
|
2022-04-08 00:03:17 +08:00
|
|
|
}
|
|
|
|
|
2020-11-18 06:20:22 +08:00
|
|
|
install_compiled_systemd() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install compiled systemd"
|
2020-08-27 19:10:30 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
local ninja_bin
|
|
|
|
ninja_bin="$(type -P ninja || type -P ninja-build)"
|
|
|
|
if [[ -z "$ninja_bin" ]]; then
|
2017-08-07 17:06:07 +08:00
|
|
|
dfatal "ninja was not found"
|
|
|
|
exit 1
|
|
|
|
fi
|
2021-04-17 00:33:44 +08:00
|
|
|
(set -x; DESTDIR="$initdir" "$ninja_bin" -C "$BUILD_DIR" install)
|
2021-10-03 23:50:38 +08:00
|
|
|
|
|
|
|
# If we are doing coverage runs, copy over the binary notes files, as lcov expects to
|
|
|
|
# find them in the same directory as the runtime data counts
|
2021-10-22 00:06:36 +08:00
|
|
|
if get_bool "$IS_BUILT_WITH_COVERAGE"; then
|
2021-10-03 23:50:38 +08:00
|
|
|
mkdir -p "${initdir}/${BUILD_DIR:?}/"
|
|
|
|
rsync -am --include='*/' --include='*.gcno' --exclude='*' "${BUILD_DIR:?}/" "${initdir}/${BUILD_DIR:?}/"
|
2022-02-14 18:58:54 +08:00
|
|
|
# Set effective & default ACLs for the build dir so unprivileged
|
|
|
|
# processes can write gcda files with coverage stats
|
|
|
|
setfacl -R -m 'd:o:rwX' -m 'o:rwX' "${initdir}/${BUILD_DIR:?}/"
|
2021-10-03 23:50:38 +08:00
|
|
|
fi
|
2020-11-18 06:20:22 +08:00
|
|
|
}
|
|
|
|
|
2023-12-14 22:06:12 +08:00
|
|
|
install_package_file() {
|
|
|
|
local file="${1:?}"
|
|
|
|
|
|
|
|
# Skip missing files (like /etc/machine-info)
|
|
|
|
[[ ! -e "$file" ]] && return 0
|
|
|
|
# Skip python unit tests, since the image_install machinery will try to pull
|
|
|
|
# in the whole python stack in a very questionable state, making the tests fail.
|
|
|
|
# And given we're trying to transition to mkosi-based images anyway I'm not even
|
|
|
|
# going to bother
|
|
|
|
[[ "$file" =~ /tests/unit-tests/.*.py$ ]] && return 0
|
|
|
|
# If the current file is a directory, create it with the original
|
|
|
|
# mode; if it's a symlink to a directory, copy it as-is
|
|
|
|
if [[ -d "$file" ]]; then
|
|
|
|
inst_dir "$file"
|
|
|
|
else
|
|
|
|
inst "$file"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2020-11-18 06:20:22 +08:00
|
|
|
install_debian_systemd() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install debian systemd"
|
2020-11-18 06:20:22 +08:00
|
|
|
|
2023-12-14 22:06:12 +08:00
|
|
|
local deb file
|
2021-04-17 00:36:27 +08:00
|
|
|
|
|
|
|
while read -r deb; do
|
2020-11-18 06:20:22 +08:00
|
|
|
ddebug "Install debian files from package $deb"
|
2023-12-14 22:06:12 +08:00
|
|
|
while read -r file; do
|
|
|
|
install_package_file "$file"
|
|
|
|
done < <(dpkg-query -L "$deb" 2>/dev/null)
|
2021-04-17 00:36:27 +08:00
|
|
|
done < <(grep -E '^Package:' "${SOURCE_DIR}/debian/control" | cut -d ':' -f 2)
|
2020-11-18 06:20:22 +08:00
|
|
|
}
|
|
|
|
|
2023-11-20 19:33:58 +08:00
|
|
|
install_rpm() {
|
|
|
|
local rpm="${1:?}"
|
|
|
|
local file
|
|
|
|
|
|
|
|
if ! rpm -q "$rpm" >/dev/null; then
|
|
|
|
derror "RPM $rpm is not installed"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
dinfo "Installing contents of RPM $rpm"
|
|
|
|
while read -r file; do
|
2023-12-14 22:06:12 +08:00
|
|
|
install_package_file "$file"
|
2023-11-20 19:33:58 +08:00
|
|
|
done < <(rpm -ql "$rpm")
|
|
|
|
}
|
|
|
|
|
2021-08-03 14:18:13 +08:00
|
|
|
install_suse_systemd() {
|
|
|
|
local pkgs
|
|
|
|
|
2024-02-14 17:01:57 +08:00
|
|
|
dinfo "Install basic filesystem structure"
|
|
|
|
install_rpm filesystem
|
|
|
|
|
2021-08-03 14:18:13 +08:00
|
|
|
dinfo "Install SUSE systemd"
|
|
|
|
|
|
|
|
pkgs=(
|
|
|
|
systemd
|
2024-02-14 01:12:42 +08:00
|
|
|
systemd-boot
|
2021-08-03 14:18:13 +08:00
|
|
|
systemd-container
|
|
|
|
systemd-coredump
|
|
|
|
systemd-experimental
|
2023-08-02 01:40:34 +08:00
|
|
|
systemd-homed
|
2021-08-03 14:18:13 +08:00
|
|
|
systemd-journal-remote
|
2022-11-08 23:01:59 +08:00
|
|
|
# Since commit fb6f25d7b979134a, systemd-resolved, which is shipped by
|
|
|
|
# systemd-network sub-package on openSUSE, has its own testsuite.
|
|
|
|
systemd-network
|
2021-08-03 14:18:13 +08:00
|
|
|
systemd-portable
|
|
|
|
udev
|
|
|
|
)
|
|
|
|
|
|
|
|
for p in "${pkgs[@]}"; do
|
|
|
|
rpm -q "$p" &>/dev/null || continue
|
|
|
|
|
2023-11-20 19:33:58 +08:00
|
|
|
install_rpm "$p"
|
2021-08-03 14:18:13 +08:00
|
|
|
done
|
|
|
|
|
2023-03-21 01:23:33 +08:00
|
|
|
dinfo "Install the data needed by the tests at runtime"
|
2022-11-18 17:18:19 +08:00
|
|
|
inst_recursive "${SOURCE_DIR}/testdata"
|
2023-08-08 17:40:36 +08:00
|
|
|
inst_recursive "${SOURCE_DIR}/unit-tests/manual"
|
2022-11-18 17:18:19 +08:00
|
|
|
|
|
|
|
# On openSUSE, this directory is not created at package install, at least
|
|
|
|
# for now.
|
2021-08-03 14:18:13 +08:00
|
|
|
mkdir -p "$initdir/var/log/journal/remote"
|
|
|
|
}
|
|
|
|
|
2023-11-20 19:33:58 +08:00
|
|
|
install_fedora_systemd() {
|
|
|
|
local required_packages=(
|
|
|
|
systemd
|
|
|
|
systemd-container
|
|
|
|
systemd-libs
|
|
|
|
systemd-pam
|
|
|
|
systemd-tests
|
|
|
|
systemd-udev
|
|
|
|
)
|
|
|
|
local optional_packages=(
|
|
|
|
systemd-boot-unsigned
|
|
|
|
systemd-bootchart
|
|
|
|
systemd-journal-remote
|
|
|
|
systemd-networkd
|
|
|
|
systemd-oomd-defaults
|
|
|
|
systemd-resolved
|
|
|
|
)
|
|
|
|
local package
|
|
|
|
|
|
|
|
for package in "${required_packages[@]}"; do
|
|
|
|
install_rpm "$package"
|
|
|
|
done
|
|
|
|
|
|
|
|
for package in "${optional_packages[@]}"; do
|
|
|
|
rpm -q "$package" >/dev/null || continue
|
|
|
|
install_rpm "$package"
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2020-11-18 06:20:22 +08:00
|
|
|
install_distro_systemd() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install distro systemd"
|
2020-11-18 06:20:22 +08:00
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$LOOKS_LIKE_DEBIAN"; then
|
2020-11-18 06:20:22 +08:00
|
|
|
install_debian_systemd
|
2021-08-03 14:18:13 +08:00
|
|
|
elif get_bool "$LOOKS_LIKE_SUSE"; then
|
|
|
|
install_suse_systemd
|
2023-11-20 19:33:58 +08:00
|
|
|
elif get_bool "$LOOKS_LIKE_FEDORA"; then
|
|
|
|
install_fedora_systemd
|
2020-11-18 06:20:22 +08:00
|
|
|
else
|
|
|
|
dfatal "NO_BUILD not supported for this distro"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
install_systemd() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install systemd"
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$NO_BUILD"; then
|
2020-11-18 06:20:22 +08:00
|
|
|
install_distro_systemd
|
|
|
|
else
|
|
|
|
install_compiled_systemd
|
|
|
|
fi
|
|
|
|
|
2023-05-14 14:15:33 +08:00
|
|
|
# Remove unneeded documentation
|
2021-10-22 00:06:36 +08:00
|
|
|
rm -fr "${initdir:?}"/usr/share/{man,doc}
|
2016-04-26 02:20:57 +08:00
|
|
|
|
2023-05-14 14:15:33 +08:00
|
|
|
# Enable debug logging in PID1
|
|
|
|
mkdir -p "$initdir/etc/systemd/system.conf.d/"
|
|
|
|
echo -ne "[Manager]\nLogLevel=debug\n" >"$initdir/etc/systemd/system.conf.d/10-log-level.conf"
|
2022-02-15 09:13:10 +08:00
|
|
|
if [[ -n "$TEST_SYSTEMD_LOG_LEVEL" ]]; then
|
2023-05-14 14:15:33 +08:00
|
|
|
echo DefaultEnvironment=SYSTEMD_LOG_LEVEL="$TEST_SYSTEMD_LOG_LEVEL" >>"$initdir/etc/systemd/system.conf.d/99-log-level.conf"
|
2022-02-15 09:13:10 +08:00
|
|
|
fi
|
2023-09-25 19:25:27 +08:00
|
|
|
# Enable debug logging for user instances as well
|
|
|
|
mkdir -p "$initdir/etc/systemd/user.conf.d/"
|
|
|
|
echo -ne "[Manager]\nLogLevel=debug\n" >"$initdir/etc/systemd/user.conf.d/10-log-level.conf"
|
2023-05-14 14:15:33 +08:00
|
|
|
# Store coredumps in journal
|
|
|
|
mkdir -p "$initdir/etc/systemd/coredump.conf.d/"
|
|
|
|
echo -ne "[Coredump]\nStorage=journal\n" >"$initdir/etc/systemd/coredump.conf.d/10-storage-journal.conf"
|
2021-09-09 23:12:55 +08:00
|
|
|
# Propagate SYSTEMD_UNIT_PATH to user systemd managers
|
2023-05-14 14:15:33 +08:00
|
|
|
mkdir -p "$initdir/etc/systemd/system/user@.service.d/"
|
|
|
|
echo -ne "[Service]\nPassEnvironment=SYSTEMD_UNIT_PATH\n" >"$initdir/etc/systemd/system/user@.service.d/99-SYSTEMD_UNIT_PATH.conf"
|
2021-10-22 00:06:36 +08:00
|
|
|
|
2022-02-15 03:19:51 +08:00
|
|
|
# When built with gcov, disable ProtectSystem= and ProtectHome= in the test
|
|
|
|
# images, since it prevents gcov to write the coverage reports (*.gcda
|
2022-02-16 22:55:09 +08:00
|
|
|
# files)
|
2021-10-22 00:06:36 +08:00
|
|
|
if get_bool "$IS_BUILT_WITH_COVERAGE"; then
|
|
|
|
mkdir -p "$initdir/etc/systemd/system/service.d/"
|
2023-05-14 14:15:33 +08:00
|
|
|
echo -ne "[Service]\nProtectSystem=no\nProtectHome=no\n" >"$initdir/etc/systemd/system/service.d/99-gcov-override.conf"
|
2023-06-19 05:08:24 +08:00
|
|
|
# Similarly, set ReadWritePaths= to the $BUILD_DIR in the test image to make the coverage work with
|
|
|
|
# units using DynamicUser=yes. Do this only for services with test- prefix and a couple of
|
|
|
|
# known-to-use DynamicUser=yes services, as setting this system-wide has many undesirable
|
|
|
|
# side-effects, as it creates its own namespace.
|
|
|
|
for service in test- systemd-journal-{gatewayd,upload}; do
|
|
|
|
mkdir -p "$initdir/etc/systemd/system/$service.service.d/"
|
|
|
|
echo -ne "[Service]\nReadWritePaths=${BUILD_DIR:?}\n" >"$initdir/etc/systemd/system/$service.service.d/99-gcov-rwpaths-override.conf"
|
|
|
|
done
|
2023-04-01 00:42:38 +08:00
|
|
|
# Ditto, but for the user daemon
|
|
|
|
mkdir -p "$initdir/etc/systemd/user/test-.service.d/"
|
2023-05-14 14:15:33 +08:00
|
|
|
echo -ne "[Service]\nReadWritePaths=${BUILD_DIR:?}\n" >"$initdir/etc/systemd/user/test-.service.d/99-gcov-rwpaths-override.conf"
|
2023-05-14 17:28:30 +08:00
|
|
|
# Bind the $BUILD_DIR into nspawn containers that are executed using
|
|
|
|
# machinectl. Unfortunately, the .nspawn files don't support drop-ins
|
|
|
|
# so we have to inject the bind mount directly into
|
|
|
|
# the systemd-nspawn@.service unit.
|
|
|
|
cp "$initdir/usr/lib/systemd/system/systemd-nspawn@.service" "$initdir/etc/systemd/system/systemd-nspawn@.service"
|
|
|
|
sed -ri "s/^ExecStart=.+$/& --bind=${BUILD_DIR//\//\\\/}/" "$initdir/etc/systemd/system/systemd-nspawn@.service"
|
2023-05-15 16:06:18 +08:00
|
|
|
# Pass the $BUILD_DIR as $COVERAGE_BUILD_DIR env variable to the system
|
|
|
|
# manager, similarly to what we do with $ASAN_RT_PATH during sanitized
|
|
|
|
# builds
|
|
|
|
mkdir -p "$initdir/etc/systemd/system.conf.d/"
|
|
|
|
echo -ne "[Manager]\nDefaultEnvironment=COVERAGE_BUILD_DIR=$BUILD_DIR\n" >"$initdir/etc/systemd/system.conf.d/99-COVERAGE_BUILD_DIR.conf"
|
2021-10-22 00:06:36 +08:00
|
|
|
fi
|
2022-01-31 21:19:09 +08:00
|
|
|
|
|
|
|
# If we're built with -Dportabled=false, tests with systemd-analyze
|
|
|
|
# --profile will fail. Since we need just the profile (text) files, let's
|
|
|
|
# copy them into the image if they don't exist there.
|
|
|
|
local portable_dir="${initdir:?}${ROOTLIBDIR:?}/portable"
|
|
|
|
if [[ ! -d "$portable_dir/profile/strict" ]]; then
|
|
|
|
dinfo "Couldn't find portable profiles in the test image"
|
|
|
|
dinfo "Copying them directly from the source tree"
|
|
|
|
mkdir -p "$portable_dir"
|
|
|
|
cp -frv "${SOURCE_DIR:?}/src/portable/profile" "$portable_dir"
|
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2016-07-03 23:17:13 +08:00
|
|
|
get_ldpath() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local rpath
|
|
|
|
rpath="$(objdump -p "${1:?}" 2>/dev/null | awk "/R(UN)?PATH/ { print \"$initdir\" \$2 }" | paste -sd :)"
|
2019-11-28 01:25:52 +08:00
|
|
|
|
|
|
|
if [ -z "$rpath" ] ; then
|
2021-04-17 00:33:44 +08:00
|
|
|
echo "$BUILD_DIR"
|
2019-11-28 01:25:52 +08:00
|
|
|
else
|
2021-04-17 00:33:44 +08:00
|
|
|
echo "$rpath"
|
2019-11-28 01:25:52 +08:00
|
|
|
fi
|
2016-07-03 23:17:13 +08:00
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
install_missing_libraries() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install missing libraries"
|
2013-11-06 06:32:56 +08:00
|
|
|
# install possible missing libraries
|
2023-01-26 23:07:17 +08:00
|
|
|
for i in "${initdir:?}"{,/usr}/{sbin,bin}/* "$initdir"{,/usr}/lib/systemd/{,tests/unit-tests/{,manual/,unsafe/}}*; do
|
2021-04-17 00:33:44 +08:00
|
|
|
LD_LIBRARY_PATH="${LD_LIBRARY_PATH:+$LD_LIBRARY_PATH:}$(get_ldpath "$i")" inst_libs "$i"
|
2013-11-06 06:32:56 +08:00
|
|
|
done
|
2020-12-09 17:15:36 +08:00
|
|
|
|
2022-08-02 19:54:57 +08:00
|
|
|
# Install libgcc_s.so if available, since it's dlopen()ed by libpthread
|
|
|
|
# and might cause unexpected failures during pthread_exit()/pthread_cancel()
|
|
|
|
# if not present
|
|
|
|
# See: https://github.com/systemd/systemd/pull/23858
|
|
|
|
while read -r libgcc_s; do
|
|
|
|
[[ -e "$libgcc_s" ]] && inst_library "$libgcc_s"
|
|
|
|
done < <(ldconfig -p | awk '/\/libgcc_s.so.1$/ { print $4 }')
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
local lib path
|
2020-12-09 17:15:36 +08:00
|
|
|
# A number of dependencies is now optional via dlopen, so the install
|
|
|
|
# script will not pick them up, since it looks at linkage.
|
2024-01-24 19:28:41 +08:00
|
|
|
for lib in libcryptsetup libidn libidn2 pwquality libqrencode tss2-esys tss2-rc tss2-mu tss2-tcti-device libfido2 libbpf libelf libdw xkbcommon p11-kit-1 libarchive; do
|
2021-01-15 00:48:13 +08:00
|
|
|
ddebug "Searching for $lib via pkg-config"
|
2021-04-17 00:33:44 +08:00
|
|
|
if pkg-config --exists "$lib"; then
|
|
|
|
path="$(pkg-config --variable=libdir "$lib")"
|
2021-01-15 00:48:13 +08:00
|
|
|
if [ -z "${path}" ]; then
|
|
|
|
ddebug "$lib.pc does not contain a libdir variable, skipping"
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
|
|
|
|
if ! [[ ${lib} =~ ^lib ]]; then
|
|
|
|
lib="lib${lib}"
|
|
|
|
fi
|
2022-12-17 09:33:46 +08:00
|
|
|
# p11-kit-1's .so doesn't have the API level in the name
|
|
|
|
if [[ ${lib} =~ p11-kit-1$ ]]; then
|
|
|
|
lib="libp11-kit"
|
|
|
|
fi
|
2021-01-15 00:48:13 +08:00
|
|
|
# Some pkg-config files are broken and give out the wrong paths
|
|
|
|
# (eg: libcryptsetup), so just ignore them
|
|
|
|
inst_libs "${path}/${lib}.so" || true
|
|
|
|
inst_library "${path}/${lib}.so" || true
|
2022-06-14 08:12:00 +08:00
|
|
|
|
|
|
|
if [[ "$lib" == "libxkbcommon" ]]; then
|
|
|
|
install_x11_keymaps full
|
|
|
|
fi
|
2021-01-15 00:48:13 +08:00
|
|
|
else
|
|
|
|
ddebug "$lib.pc not found, skipping"
|
|
|
|
continue
|
|
|
|
fi
|
2020-12-09 17:15:36 +08:00
|
|
|
done
|
2022-09-18 04:35:19 +08:00
|
|
|
|
|
|
|
# Install extra openssl 3 stuff
|
|
|
|
path="$(pkg-config --variable=libdir libcrypto)"
|
|
|
|
inst_simple "${path}/ossl-modules/legacy.so" || true
|
|
|
|
inst_simple "${path}/ossl-modules/fips.so" || true
|
|
|
|
inst_simple "${path}/engines-3/afalg.so" || true
|
|
|
|
inst_simple "${path}/engines-3/capi.so" || true
|
|
|
|
inst_simple "${path}/engines-3/loader_attic.so" || true
|
|
|
|
inst_simple "${path}/engines-3/padlock.so" || true
|
2022-10-11 16:50:58 +08:00
|
|
|
|
|
|
|
# Binaries from mtools depend on the gconv modules to translate between codepages. Because there's no
|
|
|
|
# pkg-config file for these, we copy every gconv/ directory we can find in /usr/lib and /usr/lib64.
|
|
|
|
# shellcheck disable=SC2046
|
|
|
|
inst_recursive $(find /usr/lib* -name gconv 2>/dev/null)
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2020-03-21 03:17:11 +08:00
|
|
|
cleanup_loopdev() {
|
2021-04-17 00:33:44 +08:00
|
|
|
if [ -n "${LOOPDEV:=}" ]; then
|
2020-03-21 03:17:11 +08:00
|
|
|
ddebug "losetup -d $LOOPDEV"
|
|
|
|
losetup -d "${LOOPDEV}"
|
2020-05-26 04:48:01 +08:00
|
|
|
unset LOOPDEV
|
2020-03-21 03:17:11 +08:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2022-07-08 02:00:46 +08:00
|
|
|
add_at_exit_handler cleanup_loopdev
|
2020-03-21 03:17:11 +08:00
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
create_empty_image() {
|
2023-06-04 21:33:24 +08:00
|
|
|
if [[ -z "${IMAGE_NAME:=}" ]]; then
|
2019-12-12 16:37:19 +08:00
|
|
|
echo "create_empty_image: \$IMAGE_NAME not set"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2022-07-07 20:13:32 +08:00
|
|
|
# Partition sizes are in MiBs
|
2023-04-11 23:23:23 +08:00
|
|
|
local root_size=768
|
|
|
|
local data_size=100
|
2023-12-05 15:31:53 +08:00
|
|
|
local esp_size=128
|
|
|
|
local boot_size=128
|
|
|
|
local total=
|
2021-07-04 18:21:23 +08:00
|
|
|
if ! get_bool "$NO_BUILD"; then
|
2021-06-17 04:50:23 +08:00
|
|
|
if meson configure "${BUILD_DIR:?}" | grep 'static-lib\|standalone-binaries' | awk '{ print $2 }' | grep -q 'true'; then
|
2023-06-04 21:33:24 +08:00
|
|
|
root_size=$((root_size + 200))
|
2021-06-17 04:50:23 +08:00
|
|
|
fi
|
|
|
|
if meson configure "${BUILD_DIR:?}" | grep 'link-.*-shared' | awk '{ print $2 }' | grep -q 'false'; then
|
2023-06-04 21:33:24 +08:00
|
|
|
root_size=$((root_size + 200))
|
2021-06-17 04:50:23 +08:00
|
|
|
fi
|
2021-10-22 00:06:36 +08:00
|
|
|
if get_bool "$IS_BUILT_WITH_COVERAGE"; then
|
2023-06-04 21:33:24 +08:00
|
|
|
root_size=$((root_size + 250))
|
2021-10-03 23:50:38 +08:00
|
|
|
fi
|
2023-04-11 23:23:23 +08:00
|
|
|
if get_bool "$IS_BUILT_WITH_ASAN"; then
|
|
|
|
root_size=$((root_size * 2))
|
|
|
|
fi
|
2021-05-06 12:28:19 +08:00
|
|
|
fi
|
2023-04-11 23:23:23 +08:00
|
|
|
|
2023-06-05 15:39:51 +08:00
|
|
|
if [[ "${IMAGE_ADDITIONAL_ROOT_SIZE:-0}" -gt 0 ]]; then
|
|
|
|
root_size=$((root_size + IMAGE_ADDITIONAL_ROOT_SIZE))
|
|
|
|
fi
|
|
|
|
if [[ "${IMAGE_ADDITIONAL_DATA_SIZE:-0}" -gt 0 ]]; then
|
|
|
|
data_size=$((data_size + IMAGE_ADDITIONAL_DATA_SIZE))
|
2022-11-10 19:33:02 +08:00
|
|
|
fi
|
2019-12-11 00:33:58 +08:00
|
|
|
|
2023-12-05 15:31:53 +08:00
|
|
|
total=$((root_size + data_size + esp_size + boot_size))
|
|
|
|
|
|
|
|
echo "Setting up ${IMAGE_PUBLIC:?} (${total} MB)"
|
2021-04-17 00:33:44 +08:00
|
|
|
rm -f "${IMAGE_PRIVATE:?}" "$IMAGE_PUBLIC"
|
2019-12-13 21:21:31 +08:00
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
# Create the blank file to use as a root filesystem
|
2023-12-05 15:31:53 +08:00
|
|
|
truncate -s "${total}M" "$IMAGE_PUBLIC"
|
2019-12-13 21:21:31 +08:00
|
|
|
|
2023-06-04 21:33:24 +08:00
|
|
|
LOOPDEV="$(losetup --show -P -f "$IMAGE_PUBLIC")"
|
|
|
|
[[ -b "$LOOPDEV" ]] || return 1
|
2022-07-07 20:13:32 +08:00
|
|
|
# Create two partitions - a root one and a data one (utilized by some tests)
|
2015-02-03 17:44:27 +08:00
|
|
|
sfdisk "$LOOPDEV" <<EOF
|
2022-07-07 20:13:32 +08:00
|
|
|
label: gpt
|
2023-12-05 15:31:53 +08:00
|
|
|
type=C12A7328-F81F-11D2-BA4B-00A0C93EC93B name=esp size=${esp_size}M
|
2024-01-12 17:27:43 +08:00
|
|
|
type=$("${SYSTEMD_ID128:?}" show root -Pu) name=root size=${root_size}M bootable
|
2023-12-05 15:31:53 +08:00
|
|
|
type=BC13C2FF-59E6-4262-A352-B275FD6F7172 name=boot size=${boot_size}M
|
2022-07-07 20:13:32 +08:00
|
|
|
type=0FC63DAF-8483-4772-8E79-3D69D8477DE4 name=data
|
2013-11-06 06:32:56 +08:00
|
|
|
EOF
|
|
|
|
|
2018-03-29 12:20:57 +08:00
|
|
|
udevadm settle
|
|
|
|
|
2023-12-05 15:31:53 +08:00
|
|
|
if ! mkfs -t vfat "${LOOPDEV}p1"; then
|
|
|
|
dfatal "Failed to mkfs -t vfat ${LOOPDEV}p1"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2021-09-14 00:14:05 +08:00
|
|
|
local label=(-L systemd_boot)
|
2016-04-04 19:07:56 +08:00
|
|
|
# mkfs.reiserfs doesn't know -L. so, use --label instead
|
2021-09-14 00:14:05 +08:00
|
|
|
[[ "$FSTYPE" == "reiserfs" ]] && label=(--label systemd_boot)
|
2023-12-05 15:31:53 +08:00
|
|
|
if ! mkfs -t "${FSTYPE}" "${label[@]}" "${LOOPDEV}p2" -q; then
|
|
|
|
dfatal "Failed to mkfs -t ${FSTYPE} ${label[*]} ${LOOPDEV}p2 -q"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
local label=(-L xbootldr)
|
|
|
|
[[ "$FSTYPE" == "reiserfs" ]] && label=(--label xbootldr)
|
|
|
|
if ! mkfs -t "${FSTYPE}" "${label[@]}" "${LOOPDEV}p3" -q; then
|
|
|
|
dfatal "Failed to mkfs -t ${FSTYPE} ${label[*]} ${LOOPDEV}p3 -q"
|
2016-04-04 19:07:56 +08:00
|
|
|
exit 1
|
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2019-12-12 16:37:19 +08:00
|
|
|
mount_initdir() {
|
2021-04-17 00:33:44 +08:00
|
|
|
if [ -z "${LOOPDEV:=}" ]; then
|
|
|
|
[ -e "${IMAGE_PRIVATE:?}" ] && image="$IMAGE_PRIVATE" || image="${IMAGE_PUBLIC:?}"
|
|
|
|
LOOPDEV="$(losetup --show -P -f "$image")"
|
2019-12-12 16:37:19 +08:00
|
|
|
[ -b "$LOOPDEV" ] || return 1
|
|
|
|
|
2020-03-21 03:17:11 +08:00
|
|
|
udevadm settle
|
|
|
|
fi
|
2019-07-12 23:47:26 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
if ! mountpoint -q "${initdir:?}"; then
|
|
|
|
mkdir -p "$initdir"
|
2023-12-05 15:31:53 +08:00
|
|
|
mount "${LOOPDEV}p2" "$initdir"
|
2020-03-21 03:17:11 +08:00
|
|
|
TEST_SETUP_CLEANUP_ROOTDIR=1
|
2019-12-12 16:37:19 +08:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2019-12-13 21:21:31 +08:00
|
|
|
cleanup_initdir() {
|
|
|
|
# only umount if create_empty_image_rootdir() was called to mount it
|
2022-10-02 03:56:08 +08:00
|
|
|
if get_bool "$TEST_SETUP_CLEANUP_ROOTDIR"; then
|
|
|
|
_umount_dir "${initdir:?}"
|
|
|
|
fi
|
2019-12-13 21:21:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
umount_loopback() {
|
|
|
|
# unmount the loopback device from all places. Otherwise we risk file
|
|
|
|
# system corruption.
|
2021-04-17 00:33:44 +08:00
|
|
|
for device in $(losetup -l | awk '$6=="'"${IMAGE_PUBLIC:?}"'" {print $1}'); do
|
2019-12-13 21:21:31 +08:00
|
|
|
ddebug "Unmounting all uses of $device"
|
|
|
|
mount | awk '/^'"${device}"'p/{print $1}' | xargs --no-run-if-empty umount -v
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2019-12-12 16:37:19 +08:00
|
|
|
create_empty_image_rootdir() {
|
|
|
|
create_empty_image
|
|
|
|
mount_initdir
|
|
|
|
}
|
|
|
|
|
2018-12-25 15:31:50 +08:00
|
|
|
check_asan_reports() {
|
|
|
|
local ret=0
|
2021-04-17 00:33:44 +08:00
|
|
|
local root="${1:?}"
|
2023-06-23 20:28:30 +08:00
|
|
|
local log report
|
2018-12-25 15:31:50 +08:00
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$IS_BUILT_WITH_ASAN"; then
|
2018-12-25 15:31:50 +08:00
|
|
|
ls -l "$root"
|
|
|
|
if [[ -e "$root/systemd.asan.log.1" ]]; then
|
|
|
|
cat "$root/systemd.asan.log.1"
|
2021-04-17 00:33:44 +08:00
|
|
|
ret=$((ret+1))
|
2018-12-23 21:46:00 +08:00
|
|
|
fi
|
2018-12-23 22:30:41 +08:00
|
|
|
|
2023-06-23 20:28:30 +08:00
|
|
|
for log in pid1 journald; do
|
|
|
|
report="$(find "$root" -name "systemd-$log.*san.log*" -exec cat {} \;)"
|
|
|
|
if [[ -n "$report" ]]; then
|
|
|
|
printf "%s\n" "$report"
|
|
|
|
# shellcheck disable=SC2015
|
|
|
|
[[ "$log" == journald ]] && cat "$root/systemd-journald.out" || :
|
|
|
|
ret=$((ret+1))
|
|
|
|
fi
|
|
|
|
done
|
2018-12-23 22:48:18 +08:00
|
|
|
|
2023-05-08 19:43:03 +08:00
|
|
|
# May 08 13:23:31 H testleak[2907148]: SUMMARY: AddressSanitizer: 4 byte(s) leaked in 1 allocation(s).
|
2021-04-17 00:33:44 +08:00
|
|
|
pids="$(
|
2023-05-08 19:43:03 +08:00
|
|
|
"$JOURNALCTL" -D "$root/var/log/journal" --grep 'SUMMARY: .*Sanitizer:' |
|
|
|
|
grep -v -E 'dbus-daemon|dbus-broker-launch' |
|
|
|
|
sed -r -n 's/.* .+\[([0-9]+)\]: SUMMARY:.*/\1/p'
|
2021-04-17 00:33:44 +08:00
|
|
|
)"
|
2023-05-08 19:43:03 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
if [[ -n "$pids" ]]; then
|
|
|
|
ret=$((ret+1))
|
2018-12-23 22:48:18 +08:00
|
|
|
for pid in $pids; do
|
2021-04-17 00:33:44 +08:00
|
|
|
"$JOURNALCTL" -D "$root/var/log/journal" _PID="$pid" --no-pager
|
2018-12-23 22:48:18 +08:00
|
|
|
done
|
2019-01-30 09:19:45 +08:00
|
|
|
fi
|
2018-12-23 21:46:00 +08:00
|
|
|
fi
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
return $ret
|
|
|
|
}
|
|
|
|
|
2021-10-03 23:50:38 +08:00
|
|
|
check_coverage_reports() {
|
|
|
|
local root="${1:?}"
|
|
|
|
|
|
|
|
if get_bool "$NO_BUILD"; then
|
|
|
|
return 0
|
|
|
|
fi
|
2021-10-22 00:06:36 +08:00
|
|
|
if ! get_bool "$IS_BUILT_WITH_COVERAGE"; then
|
2021-10-03 23:50:38 +08:00
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -n "${ARTIFACT_DIRECTORY}" ]; then
|
|
|
|
dest="${ARTIFACT_DIRECTORY}/${testname:?}.coverage-info"
|
|
|
|
else
|
|
|
|
dest="${TESTDIR:?}/coverage-info"
|
|
|
|
fi
|
|
|
|
|
2023-03-25 04:15:28 +08:00
|
|
|
if [[ ! -e "${TESTDIR:?}/coverage-base" ]]; then
|
|
|
|
# This shouldn't happen, as the report is generated during the setup
|
|
|
|
# phase (test_setup()).
|
|
|
|
derror "Missing base coverage report"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
2023-05-19 17:07:07 +08:00
|
|
|
# Create a coverage report that will later be uploaded. Remove info about system
|
|
|
|
# libraries/headers and generated files, as we don't really care about them.
|
2023-03-25 04:15:28 +08:00
|
|
|
lcov --directory "${root}/${BUILD_DIR:?}" --capture --output-file "${dest}.new"
|
2021-10-25 17:35:47 +08:00
|
|
|
if [[ -f "$dest" ]]; then
|
|
|
|
# If the destination report file already exists, don't overwrite it, but
|
2023-03-25 04:15:28 +08:00
|
|
|
# merge it with the already present one - this usually happens when
|
|
|
|
# running both "parts" of a test in one run (the qemu and the nspawn part).
|
2021-10-25 17:35:47 +08:00
|
|
|
lcov --add-tracefile "${dest}" --add-tracefile "${dest}.new" -o "${dest}"
|
|
|
|
else
|
2023-03-25 04:15:28 +08:00
|
|
|
# If there's no prior coverage report, merge the new one with the base
|
|
|
|
# report we did during the setup phase (see test_setup()).
|
|
|
|
lcov --add-tracefile "${TESTDIR:?}/coverage-base" --add-tracefile "${dest}.new" -o "${dest}"
|
2021-10-25 17:35:47 +08:00
|
|
|
fi
|
2023-05-19 17:07:07 +08:00
|
|
|
lcov --remove "$dest" -o "$dest" '/usr/include/*' '/usr/lib/*' "${BUILD_DIR:?}/*"
|
2023-03-25 04:15:28 +08:00
|
|
|
rm -f "${dest}.new"
|
2021-10-03 23:50:38 +08:00
|
|
|
|
2022-02-14 19:20:02 +08:00
|
|
|
# If the test logs contain lines like:
|
|
|
|
#
|
|
|
|
# ...systemd-resolved[735885]: profiling:/systemd-meson-build/src/shared/libsystemd-shared-250.a.p/base-filesystem.c.gcda:Cannot open
|
|
|
|
#
|
|
|
|
# it means we're possibly missing some coverage since gcov can't write the stats,
|
|
|
|
# usually due to the sandbox being too restrictive (e.g. ProtectSystem=yes,
|
|
|
|
# ProtectHome=yes) or the $BUILD_DIR being inaccessible to non-root users - see
|
|
|
|
# `setfacl` stuff in install_compiled_systemd().
|
2023-03-25 04:15:28 +08:00
|
|
|
#
|
|
|
|
# Also, a note: some tests, like TEST-46, overmount /home with tmpfs, which
|
|
|
|
# means if your build dir is under /home/your-user (which is usually the
|
2023-04-21 03:54:59 +08:00
|
|
|
# case) you might get bogus errors and missing coverage.
|
2022-04-07 18:45:13 +08:00
|
|
|
if ! get_bool "${IGNORE_MISSING_COVERAGE:=}" && \
|
|
|
|
"${JOURNALCTL:?}" -q --no-pager -D "${root:?}/var/log/journal" --grep "profiling:.+?gcda:[Cc]annot open"; then
|
2022-02-14 19:20:02 +08:00
|
|
|
derror "Detected possibly missing coverage, check the journal"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
2021-10-03 23:50:38 +08:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2020-03-30 22:39:31 +08:00
|
|
|
save_journal() {
|
2023-11-21 06:34:09 +08:00
|
|
|
local source_dir="${1:?}"
|
|
|
|
local state="${2:?}"
|
2021-07-02 22:38:14 +08:00
|
|
|
# Default to always saving journal
|
|
|
|
local save="yes"
|
2023-11-21 06:34:09 +08:00
|
|
|
local dest_dir dest_name dest
|
2021-07-02 22:38:14 +08:00
|
|
|
|
2023-11-21 06:34:09 +08:00
|
|
|
if [[ "${TEST_SAVE_JOURNAL:-}" == "no" ]]; then
|
2021-07-02 22:38:14 +08:00
|
|
|
save="no"
|
2023-11-21 06:34:09 +08:00
|
|
|
elif [[ "${TEST_SAVE_JOURNAL:-}" == "fail" && "$state" -eq 0 ]]; then
|
2021-07-02 22:38:14 +08:00
|
|
|
save="no"
|
|
|
|
fi
|
|
|
|
|
2023-11-21 06:34:09 +08:00
|
|
|
if [[ -n "${ARTIFACT_DIRECTORY:-}" ]]; then
|
|
|
|
dest_dir="$ARTIFACT_DIRECTORY"
|
|
|
|
dest_name="${testname:?}.journal"
|
2020-03-31 03:29:52 +08:00
|
|
|
else
|
2023-11-21 06:34:09 +08:00
|
|
|
dest_dir="${TESTDIR:?}"
|
|
|
|
dest_name="system.journal"
|
2020-03-31 03:29:52 +08:00
|
|
|
fi
|
2020-03-30 22:39:31 +08:00
|
|
|
|
test: don't redirect stdout/stderr to console
Turns out that redirecting a lot of output to the console can have some
funny effects, like random kernel soft lockups. I spotted this in
various CIs, but it remained almost entirely hidden thanks to
`softlockup_panic=1`, until 1a36d2672f which introduced a couple of
tests that log quite a lot in a short amount of time. This, in
combination with newer kernel version, which, for some reason, seem to
be more susceptible to such soft lockups, made the Arch Linux jobs soft
lockup quite a lot, see [0].
While debugging this I also noticed that runs which don't redirect
stdout/stderr to the console are noticeably faster, e.g.:
# TEST-71 nspawn + QEMU (KVM), StandardOutput=journal+console
Elapsed (wall clock) time (h:mm:ss or m:ss): 0:24.64
# TEST-71 nspawn + QEMU (KVM), StandardOutput=journal
Elapsed (wall clock) time (h:mm:ss or m:ss): 0:17.95
# TEST-71 nspawn + QEMU, StandardOutput=journal+console
Elapsed (wall clock) time (h:mm:ss or m:ss): 2:04.70
# TEST-71 nspawn + QEMU, StandardOutput=journal
Elapsed (wall clock) time (h:mm:ss or m:ss): 1:44.48
# TEST-04 QEMU, StandardOutput=journal+console
Elapsed (wall clock) time (h:mm:ss or m:ss): 4:22.70
# TEST-04 QEMU, StandardOutput=console
Elapsed (wall clock) time (h:mm:ss or m:ss): 5:04.67
Given all this, let's effectively revert ba7abf79a5, and dump the
testsuite-related journal messages only after the test finishes, so they
don't go through the slow console.
Resolves: systemd/systemd-centos-ci#660
[0] https://github.com/systemd/systemd-centos-ci/issues/660
2023-11-21 16:37:21 +08:00
|
|
|
# Show messages from the testsuite-XX.service or messages with priority "warning" and higher
|
|
|
|
echo " --- $source_dir ---"
|
2024-02-16 20:49:50 +08:00
|
|
|
"$JOURNALCTL" --all --no-pager --no-hostname -o short-monotonic -D "$source_dir" \
|
2023-12-29 20:28:05 +08:00
|
|
|
_SYSTEMD_UNIT="testsuite-${TESTID:?}.service" + SYSLOG_IDENTIFIER="testsuite-$TESTID.sh" + \
|
|
|
|
PRIORITY=4 + PRIORITY=3 + PRIORITY=2 + PRIORITY=1 + PRIORITY=0
|
2020-03-31 03:45:21 +08:00
|
|
|
|
2023-11-21 06:34:09 +08:00
|
|
|
if get_bool "$save"; then
|
|
|
|
# If we don't have systemd-journal-remote copy all journals from /var/log/journal/
|
|
|
|
# to $dest_dir/journals/ as is, otherwise merge all journals into a single .journal
|
|
|
|
# file
|
|
|
|
if [[ -z "${SYSTEMD_JOURNAL_REMOTE:-}" ]]; then
|
|
|
|
dest="$dest_dir/journals"
|
|
|
|
mkdir -p "$dest"
|
|
|
|
cp -a "$source_dir/*" "$dest/"
|
|
|
|
else
|
|
|
|
dest="$dest_dir/$dest_name"
|
|
|
|
"$SYSTEMD_JOURNAL_REMOTE" -o "$dest" --getter="$JOURNALCTL -o export -D $source_dir"
|
2020-03-31 03:45:21 +08:00
|
|
|
fi
|
|
|
|
|
2023-11-21 06:34:09 +08:00
|
|
|
if [[ -n "${SUDO_USER:-}" ]]; then
|
|
|
|
setfacl -R -m "user:$SUDO_USER:r-X" "$dest"
|
|
|
|
fi
|
2021-07-02 22:38:14 +08:00
|
|
|
|
2023-11-21 06:34:09 +08:00
|
|
|
# we want to print this sometime later, so save this in a variable
|
|
|
|
JOURNAL_LIST="$(ls -lR "$dest")"
|
2021-05-06 14:47:01 +08:00
|
|
|
fi
|
|
|
|
|
2023-11-21 06:34:09 +08:00
|
|
|
rm -rf "${source_dir:?}"/*
|
2020-03-30 22:39:31 +08:00
|
|
|
}
|
|
|
|
|
2021-04-23 16:55:49 +08:00
|
|
|
check_result_common() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local workspace="${1:?}"
|
2021-04-23 16:55:49 +08:00
|
|
|
local ret
|
|
|
|
|
|
|
|
if [ -s "$workspace/failed" ]; then
|
2021-04-29 15:13:12 +08:00
|
|
|
# Non-empty …/failed has highest priority
|
2021-04-23 16:55:49 +08:00
|
|
|
cp -a "$workspace/failed" "${TESTDIR:?}/"
|
2021-05-06 14:47:01 +08:00
|
|
|
if [ -n "${SUDO_USER}" ]; then
|
|
|
|
setfacl -m "user:${SUDO_USER:?}:r-X" "${TESTDIR:?}/"failed
|
|
|
|
fi
|
2021-04-23 16:55:49 +08:00
|
|
|
ret=1
|
2021-08-20 20:08:18 +08:00
|
|
|
elif get_bool "$TIMED_OUT"; then
|
|
|
|
echo "(timeout)" >"${TESTDIR:?}/failed"
|
|
|
|
ret=2
|
2021-04-23 16:55:49 +08:00
|
|
|
elif [ -e "$workspace/testok" ]; then
|
|
|
|
# …/testok always counts (but with lower priority than …/failed)
|
|
|
|
ret=0
|
|
|
|
elif [ -e "$workspace/skipped" ]; then
|
|
|
|
# …/skipped always counts (a message is expected)
|
|
|
|
echo "${TESTNAME:?} was skipped:"
|
|
|
|
cat "$workspace/skipped"
|
|
|
|
ret=0
|
|
|
|
else
|
2021-04-29 15:13:12 +08:00
|
|
|
echo "(failed; see logs)" >"${TESTDIR:?}/failed"
|
|
|
|
ret=3
|
2021-04-23 16:55:49 +08:00
|
|
|
fi
|
|
|
|
|
2021-04-29 15:13:12 +08:00
|
|
|
check_asan_reports "$workspace" || ret=4
|
2021-04-23 16:55:49 +08:00
|
|
|
|
2021-10-03 23:50:38 +08:00
|
|
|
check_coverage_reports "$workspace" || ret=5
|
|
|
|
|
2021-07-02 22:38:14 +08:00
|
|
|
save_journal "$workspace/var/log/journal" $ret
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
if [ -d "${ARTIFACT_DIRECTORY}" ] && [ -f "$workspace/strace.out" ]; then
|
|
|
|
cp "$workspace/strace.out" "${ARTIFACT_DIRECTORY}/"
|
|
|
|
fi
|
2021-04-23 16:55:49 +08:00
|
|
|
|
2021-04-29 15:13:12 +08:00
|
|
|
if [ ${ret:?} != 0 ] && [ -f "$TESTDIR/failed" ]; then
|
|
|
|
echo -n "${TESTNAME:?}: "
|
|
|
|
cat "$TESTDIR/failed"
|
|
|
|
fi
|
2021-04-23 16:55:49 +08:00
|
|
|
echo "${JOURNAL_LIST:-"No journals were saved"}"
|
|
|
|
|
2021-04-29 15:13:12 +08:00
|
|
|
return ${ret:?}
|
2021-04-23 16:55:49 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
check_result_nspawn() {
|
|
|
|
local workspace="${1:?}"
|
2023-08-11 22:39:30 +08:00
|
|
|
local ret=0
|
2021-04-23 16:55:49 +08:00
|
|
|
|
2022-06-17 23:28:13 +08:00
|
|
|
# Run a test-specific checks if defined by check_result_nspawn_hook()
|
2021-04-27 01:22:42 +08:00
|
|
|
if declare -F check_result_nspawn_hook >/dev/null; then
|
2022-02-18 21:10:15 +08:00
|
|
|
if ! check_result_nspawn_hook "${workspace}"; then
|
2021-04-27 01:22:42 +08:00
|
|
|
derror "check_result_nspawn_hook() returned with EC > 0"
|
|
|
|
ret=4
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2023-08-11 22:39:30 +08:00
|
|
|
check_result_common "${workspace}" || ret=$?
|
2022-06-17 23:28:13 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
_umount_dir "${initdir:?}"
|
2021-04-23 16:55:49 +08:00
|
|
|
|
2018-12-25 15:31:50 +08:00
|
|
|
return $ret
|
|
|
|
}
|
|
|
|
|
2017-08-04 20:34:14 +08:00
|
|
|
# can be overridden in specific test
|
|
|
|
check_result_qemu() {
|
2023-08-11 22:39:30 +08:00
|
|
|
local ret=0
|
2019-12-12 16:37:19 +08:00
|
|
|
mount_initdir
|
2021-04-23 16:55:49 +08:00
|
|
|
|
2022-06-17 23:28:13 +08:00
|
|
|
# Run a test-specific checks if defined by check_result_qemu_hook()
|
2021-04-27 01:22:42 +08:00
|
|
|
if declare -F check_result_qemu_hook >/dev/null; then
|
2022-02-18 21:10:15 +08:00
|
|
|
if ! check_result_qemu_hook "${initdir:?}"; then
|
2021-04-27 01:22:42 +08:00
|
|
|
derror "check_result_qemu_hook() returned with EC > 0"
|
|
|
|
ret=4
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2023-08-11 22:39:30 +08:00
|
|
|
check_result_common "${initdir:?}" || ret=$?
|
2022-06-17 23:28:13 +08:00
|
|
|
|
2022-02-18 21:10:15 +08:00
|
|
|
_umount_dir "${initdir:?}"
|
|
|
|
|
2017-08-04 20:34:14 +08:00
|
|
|
return $ret
|
|
|
|
}
|
|
|
|
|
2021-06-22 03:05:47 +08:00
|
|
|
check_result_nspawn_unittests() {
|
|
|
|
local workspace="${1:?}"
|
|
|
|
local ret=1
|
|
|
|
|
|
|
|
[[ -e "$workspace/testok" ]] && ret=0
|
|
|
|
|
|
|
|
if [[ -s "$workspace/failed" ]]; then
|
|
|
|
ret=$((ret + 1))
|
|
|
|
echo "=== Failed test log ==="
|
|
|
|
cat "$workspace/failed"
|
|
|
|
else
|
|
|
|
if [[ -s "$workspace/skipped" ]]; then
|
|
|
|
echo "=== Skipped test log =="
|
|
|
|
cat "$workspace/skipped"
|
|
|
|
# We might have only skipped tests - that should not fail the job
|
|
|
|
ret=0
|
|
|
|
fi
|
|
|
|
if [[ -s "$workspace/testok" ]]; then
|
|
|
|
echo "=== Passed tests ==="
|
|
|
|
cat "$workspace/testok"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
get_bool "${TIMED_OUT:=}" && ret=1
|
2021-10-20 19:00:37 +08:00
|
|
|
check_coverage_reports "$workspace" || ret=5
|
2021-07-02 22:38:14 +08:00
|
|
|
|
|
|
|
save_journal "$workspace/var/log/journal" $ret
|
2023-11-27 08:42:15 +08:00
|
|
|
echo "${JOURNAL_LIST:-"No journals were saved"}"
|
2021-07-02 22:38:14 +08:00
|
|
|
|
2021-06-22 03:05:47 +08:00
|
|
|
_umount_dir "${initdir:?}"
|
|
|
|
|
|
|
|
return $ret
|
|
|
|
}
|
|
|
|
|
|
|
|
check_result_qemu_unittests() {
|
|
|
|
local ret=1
|
|
|
|
|
|
|
|
mount_initdir
|
|
|
|
[[ -e "${initdir:?}/testok" ]] && ret=0
|
|
|
|
|
|
|
|
if [[ -s "$initdir/failed" ]]; then
|
|
|
|
ret=$((ret + 1))
|
|
|
|
echo "=== Failed test log ==="
|
|
|
|
cat "$initdir/failed"
|
|
|
|
else
|
|
|
|
if [[ -s "$initdir/skipped" ]]; then
|
|
|
|
echo "=== Skipped test log =="
|
|
|
|
cat "$initdir/skipped"
|
|
|
|
# We might have only skipped tests - that should not fail the job
|
|
|
|
ret=0
|
|
|
|
fi
|
|
|
|
if [[ -s "$initdir/testok" ]]; then
|
|
|
|
echo "=== Passed tests ==="
|
|
|
|
cat "$initdir/testok"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
get_bool "${TIMED_OUT:=}" && ret=1
|
2021-10-20 19:00:37 +08:00
|
|
|
check_coverage_reports "$initdir" || ret=5
|
2021-07-02 22:38:14 +08:00
|
|
|
|
|
|
|
save_journal "$initdir/var/log/journal" $ret
|
2023-11-27 08:42:15 +08:00
|
|
|
echo "${JOURNAL_LIST:-"No journals were saved"}"
|
2021-07-02 22:38:14 +08:00
|
|
|
|
2021-06-22 03:05:47 +08:00
|
|
|
_umount_dir "$initdir"
|
|
|
|
|
|
|
|
return $ret
|
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
create_rc_local() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Create rc.local"
|
|
|
|
mkdir -p "${initdir:?}/etc/rc.d"
|
|
|
|
cat >"$initdir/etc/rc.d/rc.local" <<EOF
|
2020-03-04 17:35:06 +08:00
|
|
|
#!/usr/bin/env bash
|
2013-11-06 06:32:56 +08:00
|
|
|
exit 0
|
|
|
|
EOF
|
2021-04-17 00:33:44 +08:00
|
|
|
chmod 0755 "$initdir/etc/rc.d/rc.local"
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
install_execs() {
|
2021-04-17 00:33:44 +08:00
|
|
|
ddebug "Install executables from the service files"
|
|
|
|
|
|
|
|
local pkg_config_path="${BUILD_DIR:?}/src/core/"
|
|
|
|
local systemunitdir userunitdir exe
|
|
|
|
systemunitdir="$(PKG_CONFIG_PATH="$pkg_config_path" pkg-config --variable=systemdsystemunitdir systemd)"
|
|
|
|
userunitdir="$(PKG_CONFIG_PATH="$pkg_config_path" pkg-config --variable=systemduserunitdir systemd)"
|
|
|
|
while read -r exe; do
|
|
|
|
# some {rc,halt}.local scripts and programs are okay to not exist, the rest should
|
|
|
|
# also, plymouth is pulled in by rescue.service, but even there the exit code
|
|
|
|
# is ignored; as it's not present on some distros, don't fail if it doesn't exist
|
|
|
|
dinfo "Attempting to install $exe (based on unit file reference)"
|
|
|
|
inst "$exe" || [ "${exe%.local}" != "$exe" ] || [ "${exe%systemd-update-done}" != "$exe" ] || [ "${exe##*/}" == "plymouth" ]
|
|
|
|
done < <(sed -r -n 's|^Exec[a-zA-Z]*=[@+!-]*([^ ]+).*|\1|gp' "${initdir:?}"/{"$systemunitdir","$userunitdir"}/*.service | sort -u)
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
generate_module_dependencies() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Generate modules dependencies"
|
|
|
|
if [[ -d "${initdir:?}/lib/modules/${KERNEL_VER:?}" ]] && \
|
|
|
|
! depmod -a -b "$initdir" "$KERNEL_VER"; then
|
2013-11-06 06:32:56 +08:00
|
|
|
dfatal "\"depmod -a $KERNEL_VER\" failed."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
install_depmod_files() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install depmod files"
|
|
|
|
inst "/lib/modules/${KERNEL_VER:?}/modules.order"
|
|
|
|
inst "/lib/modules/$KERNEL_VER/modules.builtin"
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
install_plymouth() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install plymouth"
|
2013-11-06 06:32:56 +08:00
|
|
|
# install plymouth, if found... else remove plymouth service files
|
|
|
|
# if [ -x /usr/libexec/plymouth/plymouth-populate-initrd ]; then
|
|
|
|
# PLYMOUTH_POPULATE_SOURCE_FUNCTIONS="$TEST_BASE_DIR/test-functions" \
|
|
|
|
# /usr/libexec/plymouth/plymouth-populate-initrd -t $initdir
|
2021-09-08 19:33:34 +08:00
|
|
|
# image_install plymouth plymouthd
|
2013-11-06 06:32:56 +08:00
|
|
|
# else
|
2021-04-17 00:33:44 +08:00
|
|
|
rm -f "${initdir:?}"/{usr/lib,lib,etc}/systemd/system/plymouth* "$initdir"/{usr/lib,lib,etc}/systemd/system/*/plymouth*
|
2013-11-06 06:32:56 +08:00
|
|
|
# fi
|
|
|
|
}
|
|
|
|
|
2021-08-06 22:47:32 +08:00
|
|
|
install_haveged() {
|
2021-08-31 21:49:43 +08:00
|
|
|
# If haveged is installed, it's probably included in initrd and needs to be
|
2021-08-06 22:47:32 +08:00
|
|
|
# installed in the image too.
|
|
|
|
if [ -x /usr/sbin/haveged ]; then
|
|
|
|
dinfo "Install haveged files"
|
|
|
|
inst /usr/sbin/haveged
|
2021-08-31 21:49:43 +08:00
|
|
|
for u in /usr/lib/systemd/system/haveged*; do
|
2021-09-30 02:30:08 +08:00
|
|
|
inst "$u"
|
2021-08-31 21:49:43 +08:00
|
|
|
done
|
2021-08-06 22:47:32 +08:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
install_ld_so_conf() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install /etc/ld.so.conf*"
|
|
|
|
cp -a /etc/ld.so.conf* "${initdir:?}/etc"
|
2013-11-06 06:32:56 +08:00
|
|
|
ldconfig -r "$initdir"
|
|
|
|
}
|
|
|
|
|
2020-03-21 02:05:36 +08:00
|
|
|
install_testuser() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Set up a test user"
|
2020-03-21 02:05:36 +08:00
|
|
|
# create unprivileged user for user manager tests
|
2021-04-17 00:33:44 +08:00
|
|
|
mkdir -p "${initdir:?}/etc/sysusers.d"
|
|
|
|
cat >"$initdir/etc/sysusers.d/testuser.conf" <<EOF
|
2024-02-10 15:24:10 +08:00
|
|
|
u testuser 4711 "Test User" /home/testuser /bin/bash
|
2020-03-21 02:05:36 +08:00
|
|
|
EOF
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
mkdir -p "$initdir/home/testuser"
|
|
|
|
chmod 0700 "$initdir/home/testuser"
|
|
|
|
chown 4711:4711 "$initdir/home/testuser"
|
2020-03-21 02:05:36 +08:00
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
install_config_files() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install config files"
|
2019-07-19 08:34:57 +08:00
|
|
|
inst /etc/sysconfig/init || :
|
2013-11-06 06:32:56 +08:00
|
|
|
inst /etc/passwd
|
|
|
|
inst /etc/shadow
|
2020-07-22 04:14:53 +08:00
|
|
|
inst_any /etc/login.defs /usr/etc/login.defs
|
2013-11-06 06:32:56 +08:00
|
|
|
inst /etc/group
|
|
|
|
inst /etc/shells
|
2020-06-23 13:42:15 +08:00
|
|
|
inst_any /etc/nsswitch.conf /usr/etc/nsswitch.conf
|
2019-07-19 08:34:57 +08:00
|
|
|
inst /etc/pam.conf || :
|
2020-08-27 17:59:45 +08:00
|
|
|
inst_any /etc/os-release /usr/lib/os-release
|
2013-11-06 06:32:56 +08:00
|
|
|
inst /etc/localtime
|
|
|
|
# we want an empty environment
|
2021-04-17 00:33:44 +08:00
|
|
|
: >"${initdir:?}/etc/environment"
|
|
|
|
: >"$initdir/etc/machine-id"
|
|
|
|
: >"$initdir/etc/resolv.conf"
|
2019-12-10 20:45:48 +08:00
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
# set the hostname
|
2021-05-04 19:54:33 +08:00
|
|
|
echo 'H' >"$initdir/etc/hostname"
|
2020-03-25 20:43:20 +08:00
|
|
|
|
|
|
|
# let's set up just one image with the traditional verbose output
|
2021-04-17 00:33:44 +08:00
|
|
|
if [ "${IMAGE_NAME:?}" != "basic" ]; then
|
|
|
|
mkdir -p "$initdir/etc/systemd/system.conf.d"
|
|
|
|
echo -e '[Manager]\nStatusUnitFormat=name' >"$initdir/etc/systemd/system.conf.d/status.conf"
|
2020-03-25 20:43:20 +08:00
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
install_basic_tools() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install basic tools"
|
2021-09-08 19:33:34 +08:00
|
|
|
image_install "${BASICTOOLS[@]}"
|
|
|
|
image_install -o sushell
|
2015-02-02 07:19:33 +08:00
|
|
|
# in Debian ldconfig is just a shell script wrapper around ldconfig.real
|
2021-09-08 19:33:34 +08:00
|
|
|
image_install -o ldconfig.real
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
install_debug_tools() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install debug tools"
|
2021-09-22 14:37:34 +08:00
|
|
|
image_install -o "${DEBUGTOOLS[@]}"
|
2019-03-17 00:46:08 +08:00
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$INTERACTIVE_DEBUG"; then
|
2019-03-17 00:46:08 +08:00
|
|
|
# Set default TERM from vt220 to linux, so at least basic key shortcuts work
|
2021-04-17 00:33:44 +08:00
|
|
|
local getty_override="${initdir:?}/etc/systemd/system/serial-getty@.service.d"
|
|
|
|
mkdir -p "$getty_override"
|
|
|
|
echo -e "[Service]\nEnvironment=TERM=linux" >"$getty_override/default-TERM.conf"
|
2022-04-18 01:49:17 +08:00
|
|
|
echo 'export TERM=linux' >>"$initdir/etc/profile"
|
2019-03-17 00:46:08 +08:00
|
|
|
|
2022-04-18 01:49:17 +08:00
|
|
|
if command -v resize >/dev/null; then
|
|
|
|
image_install resize
|
|
|
|
echo "resize" >>"$initdir/etc/profile"
|
|
|
|
fi
|
2022-09-06 03:02:25 +08:00
|
|
|
|
|
|
|
# Sometimes we might end up with plymouthd still running (especially
|
|
|
|
# with the initrd -> asan_wrapper -> systemd transition), which will eat
|
|
|
|
# our inputs and make debugging via tty impossible. Let's fix this by
|
|
|
|
# killing plymouthd explicitly for the interactive sessions.
|
|
|
|
# Note: we can't use pkill/pidof/etc. here due to a bug in libasan, see:
|
|
|
|
# - https://github.com/llvm/llvm-project/issues/49223
|
|
|
|
# - https://bugzilla.redhat.com/show_bug.cgi?id=2098125
|
|
|
|
local plymouth_unit="${initdir:?}/etc/systemd/system/kill-plymouth.service"
|
|
|
|
cat >"$plymouth_unit" <<EOF
|
|
|
|
[Unit]
|
|
|
|
After=multi-user.target
|
|
|
|
|
|
|
|
[Service]
|
|
|
|
ExecStart=sh -c 'killall --verbose plymouthd || :'
|
|
|
|
|
|
|
|
[Install]
|
|
|
|
WantedBy=multi-user.target
|
|
|
|
EOF
|
|
|
|
"${SYSTEMCTL:?}" enable --root "${initdir:?}" kill-plymouth.service
|
2019-03-17 00:46:08 +08:00
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
install_libnss() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install libnss"
|
2013-11-06 06:32:56 +08:00
|
|
|
# install libnss_files for login
|
2021-04-17 00:40:30 +08:00
|
|
|
local NSS_LIBS
|
|
|
|
mapfile -t NSS_LIBS < <(LD_DEBUG=files getent passwd 2>&1 >/dev/null | sed -n '/calling init: .*libnss_/ {s!^.* /!/!; p}')
|
2022-09-06 20:04:37 +08:00
|
|
|
if [[ ${#NSS_LIBS[@]} -gt 0 ]]; then
|
|
|
|
image_install "${NSS_LIBS[@]}"
|
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
install_dbus() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install dbus"
|
|
|
|
inst "${ROOTLIBDIR:?}/system/dbus.socket"
|
2018-11-11 19:13:48 +08:00
|
|
|
|
2019-11-14 02:32:24 +08:00
|
|
|
# Newer Fedora versions use dbus-broker by default. Let's install it if it's available.
|
2021-04-17 00:33:44 +08:00
|
|
|
if [ -f "$ROOTLIBDIR/system/dbus-broker.service" ]; then
|
|
|
|
inst "$ROOTLIBDIR/system/dbus-broker.service"
|
2019-04-29 22:09:36 +08:00
|
|
|
inst /usr/bin/dbus-broker
|
|
|
|
inst /usr/bin/dbus-broker-launch
|
2024-01-11 18:02:05 +08:00
|
|
|
image_install -o {/etc,/usr/lib}/systemd/system/dbus.service
|
2021-04-17 00:33:44 +08:00
|
|
|
elif [ -f "$ROOTLIBDIR/system/dbus-daemon.service" ]; then
|
2019-04-29 22:09:36 +08:00
|
|
|
# Fedora rawhide replaced dbus.service with dbus-daemon.service
|
2021-04-17 00:33:44 +08:00
|
|
|
inst "$ROOTLIBDIR/system/dbus-daemon.service"
|
2018-11-11 19:13:48 +08:00
|
|
|
# Alias symlink
|
2024-01-11 18:02:05 +08:00
|
|
|
image_install -o {/etc,/usr/lib}/systemd/system/dbus.service
|
2018-11-11 19:13:48 +08:00
|
|
|
else
|
2021-04-17 00:33:44 +08:00
|
|
|
inst "$ROOTLIBDIR/system/dbus.service"
|
2018-11-11 19:13:48 +08:00
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
|
2021-04-17 00:36:27 +08:00
|
|
|
while read -r file; do
|
|
|
|
inst "$file"
|
|
|
|
done < <(find /etc/dbus-1 /usr/share/dbus-1 -xtype f 2>/dev/null)
|
2019-12-10 18:49:39 +08:00
|
|
|
|
|
|
|
# setup policy for Type=dbus test
|
2021-04-17 00:33:44 +08:00
|
|
|
mkdir -p "${initdir:?}/etc/dbus-1/system.d"
|
|
|
|
cat >"$initdir/etc/dbus-1/system.d/systemd.test.ExecStopPost.conf" <<EOF
|
2019-12-10 18:49:39 +08:00
|
|
|
<?xml version="1.0"?>
|
|
|
|
<!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN"
|
2022-06-28 18:00:47 +08:00
|
|
|
"https://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
|
2019-12-10 18:49:39 +08:00
|
|
|
<busconfig>
|
|
|
|
<policy user="root">
|
|
|
|
<allow own="systemd.test.ExecStopPost"/>
|
|
|
|
</policy>
|
|
|
|
</busconfig>
|
|
|
|
EOF
|
2023-01-18 01:04:30 +08:00
|
|
|
|
|
|
|
# If we run without KVM, bump the service start timeout
|
|
|
|
if ! get_bool "$QEMU_KVM"; then
|
|
|
|
cat >"$initdir/etc/dbus-1/system.d/service.timeout.conf" <<EOF
|
|
|
|
<?xml version="1.0"?>
|
|
|
|
<!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN"
|
|
|
|
"https://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
|
|
|
|
<busconfig>
|
2023-03-09 20:27:57 +08:00
|
|
|
<limit name="service_start_timeout">120000</limit>
|
2023-01-18 01:04:30 +08:00
|
|
|
</busconfig>
|
|
|
|
EOF
|
2023-01-24 01:40:38 +08:00
|
|
|
# Bump the client-side timeout in sd-bus as well
|
|
|
|
mkdir -p "$initdir/etc/systemd/system.conf.d"
|
2023-03-09 20:27:57 +08:00
|
|
|
echo -e '[Manager]\nDefaultEnvironment=SYSTEMD_BUS_TIMEOUT=120' >"$initdir/etc/systemd/system.conf.d/bus-timeout.conf"
|
2023-01-18 01:04:30 +08:00
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2019-11-14 02:32:24 +08:00
|
|
|
install_user_dbus() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install user dbus"
|
2020-12-23 01:47:39 +08:00
|
|
|
local userunitdir
|
2021-04-17 00:33:44 +08:00
|
|
|
if ! userunitdir="$(pkg-config --variable=systemduserunitdir systemd)"; then
|
|
|
|
dwarn "WARNING! Cannot determine userunitdir from pkg-config, assuming /usr/lib/systemd/user"
|
|
|
|
userunitdir=/usr/lib/systemd/user
|
2020-12-23 01:47:39 +08:00
|
|
|
fi
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
inst "$userunitdir/dbus.socket"
|
|
|
|
inst_symlink "$userunitdir/sockets.target.wants/dbus.socket" || inst_symlink /etc/systemd/user/sockets.target.wants/dbus.socket
|
2019-11-14 02:32:24 +08:00
|
|
|
|
|
|
|
# Append the After= dependency on dbus in case it isn't already set up
|
2021-04-17 00:33:44 +08:00
|
|
|
mkdir -p "${initdir:?}/etc/systemd/system/user@.service.d/"
|
|
|
|
cat >"$initdir/etc/systemd/system/user@.service.d/dbus.conf" <<EOF
|
2019-11-14 02:32:24 +08:00
|
|
|
[Unit]
|
|
|
|
After=dbus.service
|
|
|
|
EOF
|
|
|
|
|
|
|
|
# Newer Fedora versions use dbus-broker by default. Let's install it if it's available.
|
2021-04-17 00:33:44 +08:00
|
|
|
if [ -f "$userunitdir/dbus-broker.service" ]; then
|
|
|
|
inst "$userunitdir/dbus-broker.service"
|
2024-01-11 18:02:05 +08:00
|
|
|
image_install -o {/etc,/usr/lib}/systemd/user/dbus.service
|
2021-04-17 00:33:44 +08:00
|
|
|
elif [ -f "${ROOTLIBDIR:?}/system/dbus-daemon.service" ]; then
|
2019-11-14 02:32:24 +08:00
|
|
|
# Fedora rawhide replaced dbus.service with dbus-daemon.service
|
2021-04-17 00:33:44 +08:00
|
|
|
inst "$userunitdir/dbus-daemon.service"
|
2019-11-14 02:32:24 +08:00
|
|
|
# Alias symlink
|
2024-01-11 18:02:05 +08:00
|
|
|
image_install -o {/etc,/usr/lib}/systemd/user/dbus.service
|
2019-11-14 02:32:24 +08:00
|
|
|
else
|
2021-04-17 00:33:44 +08:00
|
|
|
inst "$userunitdir/dbus.service"
|
2019-11-14 02:32:24 +08:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
install_pam() {
|
2021-04-17 00:36:27 +08:00
|
|
|
dinfo "Install PAM"
|
|
|
|
local paths=()
|
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$LOOKS_LIKE_DEBIAN" && type -p dpkg-architecture &>/dev/null; then
|
2021-04-17 00:36:27 +08:00
|
|
|
paths+=("/lib/$(dpkg-architecture -qDEB_HOST_MULTIARCH)/security")
|
2017-08-08 03:09:21 +08:00
|
|
|
else
|
2021-04-17 00:36:27 +08:00
|
|
|
paths+=(/lib*/security)
|
2017-08-08 03:09:21 +08:00
|
|
|
fi
|
2021-04-17 00:36:27 +08:00
|
|
|
|
2022-04-11 17:00:07 +08:00
|
|
|
for d in /etc/pam.d /{usr/,}etc/security /usr/{etc,lib}/pam.d; do
|
2021-04-17 00:36:27 +08:00
|
|
|
[ -d "$d" ] && paths+=("$d")
|
2013-11-06 06:32:56 +08:00
|
|
|
done
|
2015-11-17 07:58:20 +08:00
|
|
|
|
2021-04-17 00:36:27 +08:00
|
|
|
while read -r file; do
|
|
|
|
inst "$file"
|
|
|
|
done < <(find "${paths[@]}" -xtype f)
|
|
|
|
|
2016-01-25 13:00:34 +08:00
|
|
|
# pam_unix depends on unix_chkpwd.
|
|
|
|
# see http://www.linux-pam.org/Linux-PAM-html/sag-pam_unix.html
|
2021-09-08 19:33:34 +08:00
|
|
|
image_install -o unix_chkpwd
|
2016-01-25 13:00:34 +08:00
|
|
|
|
2016-04-26 02:03:27 +08:00
|
|
|
# set empty root password for easy debugging
|
2021-04-17 00:33:44 +08:00
|
|
|
sed -i 's/^root:x:/root::/' "${initdir:?}/etc/passwd"
|
2021-08-05 21:34:37 +08:00
|
|
|
|
|
|
|
# And make sure pam_unix will accept it by making sure that
|
|
|
|
# the PAM module has the nullok option.
|
|
|
|
for d in /etc/pam.d /usr/{etc,lib}/pam.d; do
|
|
|
|
[ -d "$initdir/$d" ] || continue
|
|
|
|
sed -i '/^auth.*pam_unix.so/s/$/ nullok/' "$initdir/$d"/*
|
|
|
|
done
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2022-06-14 08:13:00 +08:00
|
|
|
install_locales() {
|
|
|
|
# install only C.UTF-8 and English locales
|
|
|
|
dinfo "Install locales"
|
|
|
|
|
|
|
|
if command -v meson >/dev/null \
|
|
|
|
&& (meson configure "${BUILD_DIR:?}" | grep 'localegen-path */') \
|
|
|
|
|| get_bool "$LOOKS_LIKE_DEBIAN"; then
|
|
|
|
# locale-gen support
|
|
|
|
image_install -o locale-gen localedef
|
|
|
|
inst /etc/locale.gen || :
|
|
|
|
inst /usr/share/i18n/SUPPORTED || :
|
|
|
|
inst_recursive /usr/share/i18n/charmaps
|
|
|
|
inst_recursive /usr/share/i18n/locales
|
2022-11-07 18:57:59 +08:00
|
|
|
inst_recursive /usr/share/locale/en*
|
|
|
|
inst_recursive /usr/share/locale/de*
|
|
|
|
image_install /usr/share/locale/locale.alias
|
|
|
|
# locale-gen might either generate each locale separately or merge them
|
|
|
|
# into a single archive
|
|
|
|
if ! (inst_recursive /usr/lib/locale/C.*8 /usr/lib/locale/en_*8 ||
|
|
|
|
image_install /usr/lib/locale/locale-archive); then
|
|
|
|
dfatal "Failed to install required locales"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
inst_recursive /usr/lib/locale/C.*8 /usr/lib/locale/en_*8
|
2022-06-14 08:13:00 +08:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2021-09-30 02:30:08 +08:00
|
|
|
# shellcheck disable=SC2120
|
2013-11-06 06:32:56 +08:00
|
|
|
install_keymaps() {
|
2022-06-14 08:10:00 +08:00
|
|
|
local i p
|
|
|
|
local -a prefix=(
|
2022-11-07 19:07:27 +08:00
|
|
|
"/usr/lib"
|
|
|
|
"/usr/share"
|
2022-06-14 08:10:00 +08:00
|
|
|
)
|
2018-09-19 09:54:28 +08:00
|
|
|
|
2022-06-14 08:10:00 +08:00
|
|
|
dinfo "Install console keymaps"
|
|
|
|
|
|
|
|
if (( $# == 0 )); then
|
|
|
|
for p in "${prefix[@]}"; do
|
|
|
|
# The first three paths may be deprecated.
|
|
|
|
# It seems now the last three paths are used by many distributions.
|
|
|
|
for i in \
|
2022-11-07 19:07:27 +08:00
|
|
|
"$p"/kbd/keymaps/include/* \
|
|
|
|
"$p"/kbd/keymaps/i386/include/* \
|
|
|
|
"$p"/kbd/keymaps/i386/qwerty/us.* \
|
|
|
|
"$p"/kbd/keymaps/legacy/include/* \
|
|
|
|
"$p"/kbd/keymaps/legacy/i386/qwerty/us.* \
|
|
|
|
"$p"/kbd/keymaps/xkb/us*; do
|
2022-06-14 08:10:00 +08:00
|
|
|
[[ -f "$i" ]] || continue
|
|
|
|
inst "$i"
|
|
|
|
done
|
|
|
|
done
|
|
|
|
else
|
|
|
|
# When it takes any argument, then install more keymaps.
|
|
|
|
for p in "${prefix[@]}"; do
|
|
|
|
for i in \
|
2022-11-07 19:07:27 +08:00
|
|
|
"$p"/kbd/keymaps/include/* \
|
|
|
|
"$p"/kbd/keymaps/i386/*/* \
|
|
|
|
"$p"/kbd/keymaps/legacy/i386/*/* \
|
|
|
|
"$p"/kbd/keymaps/xkb/*; do
|
2022-06-14 08:10:00 +08:00
|
|
|
[[ -f "$i" ]] || continue
|
|
|
|
inst "$i"
|
|
|
|
done
|
2018-09-19 09:54:28 +08:00
|
|
|
done
|
|
|
|
fi
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2022-06-14 08:12:00 +08:00
|
|
|
install_x11_keymaps() {
|
|
|
|
dinfo "Install x11 keymaps"
|
|
|
|
|
|
|
|
if (( $# == 0 )); then
|
|
|
|
# Install only keymap list.
|
|
|
|
inst /usr/share/X11/xkb/rules/base.lst
|
|
|
|
else
|
|
|
|
# When it takes any argument, then install all keymaps.
|
|
|
|
inst_recursive /usr/share/X11/xkb
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2018-09-12 17:20:31 +08:00
|
|
|
install_zoneinfo() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install time zones"
|
2019-12-10 22:31:09 +08:00
|
|
|
inst_any /usr/share/zoneinfo/Asia/Seoul
|
|
|
|
inst_any /usr/share/zoneinfo/Asia/Vladivostok
|
|
|
|
inst_any /usr/share/zoneinfo/Australia/Sydney
|
|
|
|
inst_any /usr/share/zoneinfo/Europe/Berlin
|
2021-03-22 19:51:47 +08:00
|
|
|
inst_any /usr/share/zoneinfo/Europe/Dublin
|
2019-12-10 22:31:09 +08:00
|
|
|
inst_any /usr/share/zoneinfo/Europe/Kiev
|
|
|
|
inst_any /usr/share/zoneinfo/Pacific/Auckland
|
|
|
|
inst_any /usr/share/zoneinfo/Pacific/Honolulu
|
|
|
|
inst_any /usr/share/zoneinfo/CET
|
|
|
|
inst_any /usr/share/zoneinfo/EET
|
|
|
|
inst_any /usr/share/zoneinfo/UTC
|
2018-09-12 17:20:31 +08:00
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
install_fonts() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install system fonts"
|
2013-11-06 06:32:56 +08:00
|
|
|
for i in \
|
2023-08-02 01:38:13 +08:00
|
|
|
/usr/{lib,share}/kbd/consolefonts/eurlatgr* \
|
|
|
|
/usr/{lib,share}/kbd/consolefonts/latarcyrheb-sun16*; do
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ -f "$i" ]] || continue
|
|
|
|
inst "$i"
|
2013-11-06 06:32:56 +08:00
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
install_terminfo() {
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Install terminfo files"
|
|
|
|
local terminfodir
|
|
|
|
for terminfodir in /lib/terminfo /etc/terminfo /usr/share/terminfo; do
|
|
|
|
[ -f "${terminfodir}/l/linux" ] && break
|
2013-11-06 06:32:56 +08:00
|
|
|
done
|
2021-09-08 19:33:34 +08:00
|
|
|
image_install -o "${terminfodir}/l/linux"
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2019-11-14 02:32:24 +08:00
|
|
|
has_user_dbus_socket() {
|
|
|
|
if [ -f /usr/lib/systemd/user/dbus.socket ] || [ -f /etc/systemd/user/dbus.socket ]; then
|
|
|
|
return 0
|
|
|
|
else
|
|
|
|
echo "Per-user instances are not supported. Skipping..."
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2021-12-22 18:50:08 +08:00
|
|
|
setup_nspawn_root_hook() { :;}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
setup_nspawn_root() {
|
2019-12-12 16:37:19 +08:00
|
|
|
if [ -z "${initdir}" ]; then
|
|
|
|
dfatal "\$initdir not defined"
|
|
|
|
exit 1
|
|
|
|
fi
|
2019-12-13 21:21:31 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
rm -rf "${TESTDIR:?}/unprivileged-nspawn-root"
|
2020-03-21 02:09:35 +08:00
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$RUN_IN_UNPRIVILEGED_CONTAINER"; then
|
2019-12-13 21:21:31 +08:00
|
|
|
ddebug "cp -ar $initdir $TESTDIR/unprivileged-nspawn-root"
|
2021-04-17 00:33:44 +08:00
|
|
|
cp -ar "$initdir" "$TESTDIR/unprivileged-nspawn-root"
|
2018-08-30 12:01:18 +08:00
|
|
|
fi
|
2021-12-22 18:50:08 +08:00
|
|
|
|
|
|
|
setup_nspawn_root_hook
|
2013-11-06 06:32:56 +08:00
|
|
|
}
|
|
|
|
|
2012-05-26 00:32:55 +08:00
|
|
|
setup_basic_dirs() {
|
2021-04-17 00:33:44 +08:00
|
|
|
mkdir -p "${initdir:?}/run"
|
|
|
|
mkdir -p "$initdir/etc/systemd/system"
|
|
|
|
mkdir -p "$initdir/var/log/journal"
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
for d in usr/bin usr/sbin bin etc lib "${libdir:?}" sbin tmp usr var var/log var/tmp dev proc sys sysroot root run run/lock run/initramfs; do
|
2012-05-22 00:55:48 +08:00
|
|
|
if [ -L "/$d" ]; then
|
|
|
|
inst_symlink "/$d"
|
|
|
|
else
|
2012-05-26 00:32:55 +08:00
|
|
|
inst_dir "/$d"
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
ln -sfn /run "$initdir/var/run"
|
|
|
|
ln -sfn /run/lock "$initdir/var/lock"
|
|
|
|
}
|
|
|
|
|
2019-10-08 15:10:12 +08:00
|
|
|
mask_supporting_services() {
|
|
|
|
# mask some services that we do not want to run in these tests
|
2021-05-01 03:02:41 +08:00
|
|
|
ln -fsv /dev/null "${initdir:?}/etc/systemd/system/systemd-hwdb-update.service"
|
|
|
|
ln -fsv /dev/null "$initdir/etc/systemd/system/systemd-journal-catalog-update.service"
|
|
|
|
ln -fsv /dev/null "$initdir/etc/systemd/system/systemd-networkd.service"
|
|
|
|
ln -fsv /dev/null "$initdir/etc/systemd/system/systemd-networkd.socket"
|
|
|
|
ln -fsv /dev/null "$initdir/etc/systemd/system/systemd-resolved.service"
|
2019-10-08 15:10:12 +08:00
|
|
|
}
|
|
|
|
|
2012-05-22 00:55:48 +08:00
|
|
|
inst_libs() {
|
2021-04-17 00:36:27 +08:00
|
|
|
local bin="${1:?}"
|
|
|
|
local so_regex='([^ ]*/lib[^/]*/[^ ]*\.so[^ ]*)'
|
|
|
|
local file line
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2021-04-17 00:36:27 +08:00
|
|
|
while read -r line; do
|
|
|
|
[[ "$line" = 'not a dynamic executable' ]] && break
|
2021-12-15 16:14:44 +08:00
|
|
|
# Ignore errors about our own stuff missing. This is most likely caused
|
|
|
|
# by ldd attempting to use the unprefixed RPATH.
|
2023-08-05 00:02:01 +08:00
|
|
|
[[ "$line" =~ (libsystemd|libudev).*\ not\ found ]] && continue
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2021-04-17 00:36:27 +08:00
|
|
|
if [[ "$line" =~ not\ found ]]; then
|
|
|
|
dfatal "Missing a shared library required by $bin."
|
|
|
|
dfatal "Run \"ldd $bin\" to find out what it is."
|
|
|
|
dfatal "$line"
|
2021-09-08 19:33:34 +08:00
|
|
|
dfatal "Cannot create a test image."
|
2012-05-22 00:55:48 +08:00
|
|
|
exit 1
|
|
|
|
fi
|
2023-08-05 00:02:01 +08:00
|
|
|
|
|
|
|
if [[ "$line" =~ $so_regex ]]; then
|
|
|
|
file="${BASH_REMATCH[1]}"
|
|
|
|
[[ -e "${initdir:?}/$file" ]] && continue
|
|
|
|
inst_library "$file"
|
|
|
|
fi
|
2021-04-17 00:36:27 +08:00
|
|
|
done < <(LC_ALL=C ldd "$bin" 2>/dev/null)
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
import_testdir() {
|
2020-03-21 03:17:11 +08:00
|
|
|
# make sure we don't get a stale LOOPDEV value from old times
|
2021-04-17 00:33:44 +08:00
|
|
|
local _LOOPDEV="${LOOPDEV:=}"
|
|
|
|
# We don't want shellcheck to follow & check the $STATEFILE
|
|
|
|
# shellcheck source=/dev/null
|
|
|
|
[[ -e "$STATEFILE" ]] && . "$STATEFILE"
|
|
|
|
LOOPDEV="$_LOOPDEV"
|
2019-03-13 05:44:25 +08:00
|
|
|
if [[ ! -d "$TESTDIR" ]]; then
|
|
|
|
if [[ -z "$TESTDIR" ]]; then
|
2023-03-21 23:44:41 +08:00
|
|
|
TESTDIR="$(mktemp --tmpdir=$WORKDIR -d -t systemd-test.XXXXXX)"
|
2019-03-13 05:44:25 +08:00
|
|
|
else
|
|
|
|
mkdir -p "$TESTDIR"
|
|
|
|
fi
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
cat >"$STATEFILE" <<EOF
|
2019-12-12 16:37:19 +08:00
|
|
|
TESTDIR="$TESTDIR"
|
|
|
|
EOF
|
2012-05-22 00:55:48 +08:00
|
|
|
export TESTDIR
|
|
|
|
fi
|
2020-05-17 16:46:34 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
IMAGE_PRIVATE="${TESTDIR}/${IMAGE_NAME:?}.img"
|
|
|
|
IMAGE_PUBLIC="${IMAGESTATEDIR:?}/${IMAGE_NAME}.img"
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
2013-11-06 06:32:56 +08:00
|
|
|
import_initdir() {
|
2021-04-17 00:33:44 +08:00
|
|
|
initdir="${TESTDIR:?}/root"
|
|
|
|
mkdir -p "$initdir"
|
2013-11-06 06:32:56 +08:00
|
|
|
export initdir
|
|
|
|
}
|
|
|
|
|
2022-02-02 03:18:29 +08:00
|
|
|
get_cgroup_hierarchy() {
|
|
|
|
case "$(stat -c '%T' -f /sys/fs/cgroup)" in
|
|
|
|
cgroup2fs)
|
|
|
|
echo "unified"
|
|
|
|
;;
|
|
|
|
tmpfs)
|
|
|
|
if [[ -d /sys/fs/cgroup/unified && "$(stat -c '%T' -f /sys/fs/cgroup/unified)" == cgroup2fs ]]; then
|
|
|
|
echo "hybrid"
|
|
|
|
else
|
|
|
|
echo "legacy"
|
|
|
|
fi
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
dfatal "Failed to determine host's cgroup hierarchy"
|
|
|
|
exit 1
|
|
|
|
esac
|
|
|
|
}
|
|
|
|
|
2012-05-22 00:55:48 +08:00
|
|
|
## @brief Converts numeric logging level to the first letter of level name.
|
|
|
|
#
|
|
|
|
# @param lvl Numeric logging level in range from 1 to 6.
|
|
|
|
# @retval 1 if @a lvl is out of range.
|
|
|
|
# @retval 0 if @a lvl is correct.
|
|
|
|
# @result Echoes first letter of level name.
|
|
|
|
_lvl2char() {
|
|
|
|
case "$1" in
|
|
|
|
1) echo F;;
|
|
|
|
2) echo E;;
|
|
|
|
3) echo W;;
|
|
|
|
4) echo I;;
|
|
|
|
5) echo D;;
|
|
|
|
6) echo T;;
|
|
|
|
*) return 1;;
|
|
|
|
esac
|
|
|
|
}
|
|
|
|
|
|
|
|
## @brief Internal helper function for _do_dlog()
|
|
|
|
#
|
|
|
|
# @param lvl Numeric logging level.
|
|
|
|
# @param msg Message.
|
|
|
|
# @retval 0 It's always returned, even if logging failed.
|
|
|
|
#
|
|
|
|
# @note This function is not supposed to be called manually. Please use
|
|
|
|
# dtrace(), ddebug(), or others instead which wrap this one.
|
|
|
|
#
|
|
|
|
# This function calls _do_dlog() either with parameter msg, or if
|
|
|
|
# none is given, it will read standard input and will use every line as
|
|
|
|
# a message.
|
|
|
|
#
|
|
|
|
# This enables:
|
|
|
|
# dwarn "This is a warning"
|
|
|
|
# echo "This is a warning" | dwarn
|
2021-04-17 00:33:44 +08:00
|
|
|
LOG_LEVEL="${LOG_LEVEL:-4}"
|
2012-05-22 00:55:48 +08:00
|
|
|
|
|
|
|
dlog() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local lvl lvlc
|
|
|
|
|
2012-05-22 00:55:48 +08:00
|
|
|
[ -z "$LOG_LEVEL" ] && return 0
|
2021-04-17 00:33:44 +08:00
|
|
|
lvl="${1:?}"; shift
|
|
|
|
[ "$lvl" -le "$LOG_LEVEL" ] || return 0
|
|
|
|
lvlc="$(_lvl2char "$lvl")" || return 0
|
2012-05-22 00:55:48 +08:00
|
|
|
|
|
|
|
if [ $# -ge 1 ]; then
|
|
|
|
echo "$lvlc: $*"
|
|
|
|
else
|
2021-04-17 00:33:44 +08:00
|
|
|
while read -r line; do
|
2012-05-22 00:55:48 +08:00
|
|
|
echo "$lvlc: " "$line"
|
|
|
|
done
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
## @brief Logs message at TRACE level (6)
|
|
|
|
#
|
|
|
|
# @param msg Message.
|
|
|
|
# @retval 0 It's always returned, even if logging failed.
|
|
|
|
dtrace() {
|
|
|
|
set +x
|
|
|
|
dlog 6 "$@"
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "${debug:=}"; then
|
2021-04-17 00:33:44 +08:00
|
|
|
set -x
|
|
|
|
fi
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
## @brief Logs message at DEBUG level (5)
|
|
|
|
#
|
|
|
|
# @param msg Message.
|
|
|
|
# @retval 0 It's always returned, even if logging failed.
|
|
|
|
ddebug() {
|
|
|
|
dlog 5 "$@"
|
|
|
|
}
|
|
|
|
|
|
|
|
## @brief Logs message at INFO level (4)
|
|
|
|
#
|
|
|
|
# @param msg Message.
|
|
|
|
# @retval 0 It's always returned, even if logging failed.
|
|
|
|
dinfo() {
|
|
|
|
set +x
|
|
|
|
dlog 4 "$@"
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "${debug:=}"; then
|
2021-04-17 00:33:44 +08:00
|
|
|
set -x
|
|
|
|
fi
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
## @brief Logs message at WARN level (3)
|
|
|
|
#
|
|
|
|
# @param msg Message.
|
|
|
|
# @retval 0 It's always returned, even if logging failed.
|
|
|
|
dwarn() {
|
|
|
|
set +x
|
|
|
|
dlog 3 "$@"
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "${debug:=}"; then
|
2021-04-17 00:33:44 +08:00
|
|
|
set -x
|
|
|
|
fi
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
## @brief Logs message at ERROR level (2)
|
|
|
|
#
|
|
|
|
# @param msg Message.
|
|
|
|
# @retval 0 It's always returned, even if logging failed.
|
|
|
|
derror() {
|
|
|
|
dlog 2 "$@"
|
|
|
|
}
|
|
|
|
|
|
|
|
## @brief Logs message at FATAL level (1)
|
|
|
|
#
|
|
|
|
# @param msg Message.
|
|
|
|
# @retval 0 It's always returned, even if logging failed.
|
|
|
|
dfatal() {
|
|
|
|
set +x
|
|
|
|
dlog 1 "$@"
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "${debug:=}"; then
|
2021-04-17 00:33:44 +08:00
|
|
|
set -x
|
|
|
|
fi
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
# Generic substring function. If $2 is in $1, return 0.
|
2021-11-23 03:51:15 +08:00
|
|
|
strstr() { [ "${1#*"$2"*}" != "$1" ]; }
|
2012-05-22 00:55:48 +08:00
|
|
|
|
|
|
|
# normalize_path <path>
|
|
|
|
# Prints the normalized path, where it removes any duplicated
|
|
|
|
# and trailing slashes.
|
|
|
|
# Example:
|
|
|
|
# $ normalize_path ///test/test//
|
|
|
|
# /test/test
|
|
|
|
normalize_path() {
|
|
|
|
shopt -q -s extglob
|
|
|
|
set -- "${1//+(\/)//}"
|
|
|
|
shopt -q -u extglob
|
|
|
|
echo "${1%/}"
|
|
|
|
}
|
|
|
|
|
|
|
|
# convert_abs_rel <from> <to>
|
|
|
|
# Prints the relative path, when creating a symlink to <to> from <from>.
|
|
|
|
# Example:
|
|
|
|
# $ convert_abs_rel /usr/bin/test /bin/test-2
|
|
|
|
# ../../bin/test-2
|
|
|
|
# $ ln -s $(convert_abs_rel /usr/bin/test /bin/test-2) /usr/bin/test
|
|
|
|
convert_abs_rel() {
|
|
|
|
local __current __absolute __abssize __cursize __newpath
|
|
|
|
local -i __i __level
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
set -- "$(normalize_path "${1:?}")" "$(normalize_path "${2:?}")"
|
2012-05-22 00:55:48 +08:00
|
|
|
|
|
|
|
# corner case #1 - self looping link
|
|
|
|
[[ "$1" == "$2" ]] && { echo "${1##*/}"; return; }
|
|
|
|
|
|
|
|
# corner case #2 - own dir link
|
|
|
|
[[ "${1%/*}" == "$2" ]] && { echo "."; return; }
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
IFS="/" read -ra __current <<< "$1"
|
|
|
|
IFS="/" read -ra __absolute <<< "$2"
|
2012-05-22 00:55:48 +08:00
|
|
|
|
|
|
|
__abssize=${#__absolute[@]}
|
|
|
|
__cursize=${#__current[@]}
|
|
|
|
|
2022-06-14 20:06:06 +08:00
|
|
|
while [[ "${__absolute[__level]}" == "${__current[__level]}" ]]; do
|
2012-05-22 00:55:48 +08:00
|
|
|
(( __level++ ))
|
|
|
|
if (( __level > __abssize || __level > __cursize ))
|
|
|
|
then
|
|
|
|
break
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
2022-06-14 20:06:06 +08:00
|
|
|
for ((__i = __level; __i < __cursize-1; __i++)); do
|
2012-05-22 00:55:48 +08:00
|
|
|
if ((__i > __level))
|
|
|
|
then
|
|
|
|
__newpath=$__newpath"/"
|
|
|
|
fi
|
|
|
|
__newpath=$__newpath".."
|
|
|
|
done
|
|
|
|
|
2022-06-14 20:06:06 +08:00
|
|
|
for ((__i = __level; __i < __abssize; __i++)); do
|
2012-05-22 00:55:48 +08:00
|
|
|
if [[ -n $__newpath ]]
|
|
|
|
then
|
|
|
|
__newpath=$__newpath"/"
|
|
|
|
fi
|
|
|
|
__newpath=$__newpath${__absolute[__i]}
|
|
|
|
done
|
|
|
|
|
|
|
|
echo "$__newpath"
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
# Install a directory, keeping symlinks as on the original system.
|
|
|
|
# Example: if /lib points to /lib64 on the host, "inst_dir /lib/file"
|
|
|
|
# will create ${initdir}/lib64, ${initdir}/lib64/file,
|
|
|
|
# and a symlink ${initdir}/lib -> lib64.
|
|
|
|
inst_dir() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local dir="${1:?}"
|
|
|
|
local part="${dir%/*}"
|
|
|
|
local file
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ -e "${initdir:?}/${dir}" ]] && return 0 # already there
|
|
|
|
|
|
|
|
while [[ "$part" != "${part%/*}" ]] && ! [[ -e "${initdir}/${part}" ]]; do
|
|
|
|
dir="$part $dir"
|
|
|
|
part="${part%/*}"
|
2012-05-22 00:55:48 +08:00
|
|
|
done
|
|
|
|
|
|
|
|
# iterate over parent directories
|
2021-04-17 00:33:44 +08:00
|
|
|
for file in $dir; do
|
|
|
|
[[ -e "${initdir}/$file" ]] && continue
|
|
|
|
if [[ -L $file ]]; then
|
|
|
|
inst_symlink "$file"
|
2012-05-22 00:55:48 +08:00
|
|
|
else
|
|
|
|
# create directory
|
2021-04-17 00:33:44 +08:00
|
|
|
mkdir -m 0755 "${initdir}/$file" || return 1
|
|
|
|
[[ -e "$file" ]] && chmod --reference="$file" "${initdir}/$file"
|
|
|
|
chmod u+w "${initdir}/$file"
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
# $1 = file to copy to ramdisk
|
|
|
|
# $2 (optional) Name for the file on the ramdisk
|
|
|
|
# Location of the image dir is assumed to be $initdir
|
|
|
|
# We never overwrite the target if it exists.
|
|
|
|
inst_simple() {
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ -f "${1:?}" ]] || return 1
|
2012-05-22 00:55:48 +08:00
|
|
|
strstr "$1" "/" || return 1
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
local src="$1"
|
|
|
|
local target="${2:-$1}"
|
|
|
|
if ! [[ -d ${initdir:?}/$target ]]; then
|
2012-05-22 00:55:48 +08:00
|
|
|
[[ -e ${initdir}/$target ]] && return 0
|
|
|
|
[[ -L ${initdir}/$target ]] && return 0
|
|
|
|
[[ -d "${initdir}/${target%/*}" ]] || inst_dir "${target%/*}"
|
|
|
|
fi
|
|
|
|
# install checksum files also
|
2021-04-17 00:33:44 +08:00
|
|
|
if [[ -e "${src%/*}/.${src##*/}.hmac" ]]; then
|
|
|
|
inst "${src%/*}/.${src##*/}.hmac" "${target%/*}/.${target##*/}.hmac"
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
2021-04-17 00:33:44 +08:00
|
|
|
ddebug "Installing $src"
|
2023-06-12 19:21:11 +08:00
|
|
|
cp --sparse=always --force --dereference --preserve=all "$src" "${initdir}/$target"
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
# find symlinks linked to given library file
|
|
|
|
# $1 = library file
|
|
|
|
# Function searches for symlinks by stripping version numbers appended to
|
|
|
|
# library filename, checks if it points to the same target and finally
|
|
|
|
# prints the list of symlinks to stdout.
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
# rev_lib_symlinks libfoo.so.8.1
|
|
|
|
# output: libfoo.so.8 libfoo.so
|
|
|
|
# (Only if libfoo.so.8 and libfoo.so exists on host system.)
|
|
|
|
rev_lib_symlinks() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local fn="${1:?}"
|
|
|
|
local links=""
|
|
|
|
local orig
|
|
|
|
orig="$(readlink -f "$1")"
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ "${fn}" =~ .*\.so\..* ]] || return 1
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
until [[ "${fn##*.}" == so ]]; do
|
2012-05-22 00:55:48 +08:00
|
|
|
fn="${fn%.*}"
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ -L "${fn}" && "$(readlink -f "${fn}")" == "${orig}" ]] && links+=" ${fn}"
|
2012-05-22 00:55:48 +08:00
|
|
|
done
|
|
|
|
|
|
|
|
echo "${links}"
|
|
|
|
}
|
|
|
|
|
|
|
|
# Same as above, but specialized to handle dynamic libraries.
|
|
|
|
# It handles making symlinks according to how the original library
|
|
|
|
# is referenced.
|
|
|
|
inst_library() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local src="${1:?}"
|
|
|
|
local dest="${2:-$1}"
|
|
|
|
local reallib symlink
|
|
|
|
|
2012-05-22 00:55:48 +08:00
|
|
|
strstr "$1" "/" || return 1
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ -e ${initdir:?}/$dest ]] && return 0
|
|
|
|
if [[ -L $src ]]; then
|
2012-05-22 00:55:48 +08:00
|
|
|
# install checksum files also
|
2021-04-17 00:33:44 +08:00
|
|
|
if [[ -e "${src%/*}/.${src##*/}.hmac" ]]; then
|
|
|
|
inst "${src%/*}/.${src##*/}.hmac" "${dest%/*}/.${dest##*/}.hmac"
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
2021-04-17 00:33:44 +08:00
|
|
|
reallib="$(readlink -f "$src")"
|
|
|
|
inst_simple "$reallib" "$reallib"
|
|
|
|
inst_dir "${dest%/*}"
|
|
|
|
[[ -d "${dest%/*}" ]] && dest="$(readlink -f "${dest%/*}")/${dest##*/}"
|
2022-08-03 00:28:43 +08:00
|
|
|
ddebug "Creating symlink $reallib -> $dest"
|
2021-04-17 00:33:44 +08:00
|
|
|
ln -sfn -- "$(convert_abs_rel "${dest}" "${reallib}")" "${initdir}/${dest}"
|
2012-05-22 00:55:48 +08:00
|
|
|
else
|
2021-04-17 00:33:44 +08:00
|
|
|
inst_simple "$src" "$dest"
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
|
|
|
|
|
|
|
# Create additional symlinks. See rev_symlinks description.
|
2021-04-17 00:33:44 +08:00
|
|
|
for symlink in $(rev_lib_symlinks "$src") ${reallib:+$(rev_lib_symlinks "$reallib")}; do
|
|
|
|
if [[ ! -e "$initdir/$symlink" ]]; then
|
|
|
|
ddebug "Creating extra symlink: $symlink"
|
|
|
|
inst_symlink "$symlink"
|
|
|
|
fi
|
2012-05-22 00:55:48 +08:00
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
# find a binary. If we were not passed the full path directly,
|
|
|
|
# search in the usual places to find the binary.
|
|
|
|
find_binary() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local bin="${1:?}"
|
|
|
|
if [[ -z ${bin##/*} ]]; then
|
|
|
|
if [[ -x "$bin" ]] || { strstr "$bin" ".so" && ldd "$bin" &>/dev/null; }; then
|
|
|
|
echo "$bin"
|
2012-05-22 00:55:48 +08:00
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
type -P "$bin"
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
# Same as above, but specialized to install binary executables.
|
|
|
|
# Install binary executable, and all shared library dependencies, if any.
|
|
|
|
inst_binary() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local bin="${1:?}"
|
|
|
|
local path target
|
2019-07-09 03:05:51 +08:00
|
|
|
|
|
|
|
# In certain cases we might attempt to install a binary which is already
|
|
|
|
# present in the test image, yet it's missing from the host system.
|
|
|
|
# In such cases, let's check if the binary indeed exists in the image
|
2021-12-15 16:14:44 +08:00
|
|
|
# before doing any other checks. If it does, immediately return with
|
2019-07-09 03:05:51 +08:00
|
|
|
# success.
|
2021-04-17 00:33:44 +08:00
|
|
|
if [[ $# -eq 1 ]]; then
|
|
|
|
for path in "" bin sbin usr/bin usr/sbin; do
|
|
|
|
[[ -e "${initdir:?}${path:+/$path}/${bin}" ]] && return 0
|
|
|
|
done
|
|
|
|
fi
|
2019-07-09 03:05:51 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
bin="$(find_binary "$bin")" || return 1
|
|
|
|
target="${2:-$bin}"
|
|
|
|
[[ -e "${initdir:?}/$target" ]] && return 0
|
|
|
|
[[ -L "$bin" ]] && inst_symlink "$bin" "$target" && return 0
|
|
|
|
|
|
|
|
local file line
|
|
|
|
local so_regex='([^ ]*/lib[^/]*/[^ ]*\.so[^ ]*)'
|
2022-06-15 04:54:39 +08:00
|
|
|
# DSOs provided by systemd
|
|
|
|
local systemd_so_regex='/(libudev|libsystemd.*|.+[\-_]systemd([\-_].+)?|libnss_(mymachines|myhostname|resolve)).so'
|
|
|
|
local wrap_binary=0
|
2023-06-28 15:53:13 +08:00
|
|
|
local enable_lsan=0
|
2012-05-22 00:55:48 +08:00
|
|
|
# I love bash!
|
2021-04-17 00:33:44 +08:00
|
|
|
while read -r line; do
|
|
|
|
[[ "$line" = 'not a dynamic executable' ]] && break
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2021-12-15 16:14:44 +08:00
|
|
|
# Ignore errors about our own stuff missing. This is most likely caused
|
|
|
|
# by ldd attempting to use the unprefixed RPATH.
|
|
|
|
[[ "$line" =~ libsystemd.*\ not\ found ]] && continue
|
|
|
|
|
2022-06-15 04:54:39 +08:00
|
|
|
# We're built with ASan and the target binary loads one of the systemd's
|
|
|
|
# DSOs, so we need to tweak the environment before executing the binary
|
|
|
|
if get_bool "$IS_BUILT_WITH_ASAN" && [[ "$line" =~ $systemd_so_regex ]]; then
|
|
|
|
wrap_binary=1
|
|
|
|
fi
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
if [[ "$line" =~ $so_regex ]]; then
|
|
|
|
file="${BASH_REMATCH[1]}"
|
|
|
|
[[ -e "${initdir}/$file" ]] && continue
|
|
|
|
inst_library "$file"
|
2012-05-22 00:55:48 +08:00
|
|
|
continue
|
|
|
|
fi
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
if [[ "$line" =~ not\ found ]]; then
|
|
|
|
dfatal "Missing a shared library required by $bin."
|
|
|
|
dfatal "Run \"ldd $bin\" to find out what it is."
|
|
|
|
dfatal "$line"
|
2021-09-08 19:33:34 +08:00
|
|
|
dfatal "Cannot create a test image."
|
2012-05-22 00:55:48 +08:00
|
|
|
exit 1
|
|
|
|
fi
|
2021-04-17 00:33:44 +08:00
|
|
|
done < <(LC_ALL=C ldd "$bin" 2>/dev/null)
|
2022-06-15 04:54:39 +08:00
|
|
|
|
|
|
|
# Same as above, but we need to wrap certain libraries unconditionally
|
|
|
|
#
|
2023-12-05 04:33:15 +08:00
|
|
|
# chgrp, chown, getent, login, setfacl, su, useradd, userdel
|
2023-05-18 23:30:36 +08:00
|
|
|
# - dlopen() (not only) systemd's PAM modules
|
2023-03-14 22:21:29 +08:00
|
|
|
# ls, mkfs.*, mksquashfs, mkswap, setpriv, stat
|
2023-05-18 23:30:36 +08:00
|
|
|
# - pull in nss_systemd with certain options (like ls -l) when
|
|
|
|
# nsswitch.conf uses [SUCCESS=merge] (like on Arch Linux)
|
2023-03-16 18:42:12 +08:00
|
|
|
# delv, dig - pull in nss_resolve if `resolve` is in nsswitch.conf
|
2022-06-15 04:54:39 +08:00
|
|
|
# tar - called by machinectl in TEST-25
|
2023-12-05 04:33:15 +08:00
|
|
|
bin_rx='/(agetty|chgrp|chown|curl|delv|dig|getfacl|getent|id|login|ls|mkfs\.[a-z0-9]+|mksquashfs|mkswap|setfacl|setpriv|stat|su|tar|useradd|userdel)$'
|
2023-03-16 18:42:12 +08:00
|
|
|
if get_bool "$IS_BUILT_WITH_ASAN" && [[ "$bin" =~ $bin_rx ]]; then
|
2022-06-15 04:54:39 +08:00
|
|
|
wrap_binary=1
|
2023-06-28 15:53:13 +08:00
|
|
|
# Ugh, so we want to disable LSan in most cases for the wrapped binaries, since
|
|
|
|
# we don't care about memory leaks in such binaries. However, in certain cases
|
|
|
|
# the external binary is the only interface for the systemd code, like for
|
|
|
|
# the systemd NSS modules, where we want to detect memory leaks. So let's
|
|
|
|
# do another check to decide if we want to enable LSan for given binary.
|
|
|
|
if [[ "$bin" =~ /getent$ ]]; then
|
|
|
|
enable_lsan=1
|
|
|
|
fi
|
2022-06-15 04:54:39 +08:00
|
|
|
fi
|
|
|
|
|
2022-06-16 01:43:11 +08:00
|
|
|
# If the target binary is built with ASan support, we don't need to wrap
|
|
|
|
# it, as it should handle everything by itself
|
|
|
|
if get_bool "$wrap_binary" && ! is_built_with_asan "$bin"; then
|
2022-06-15 04:54:39 +08:00
|
|
|
dinfo "Creating ASan-compatible wrapper for binary '$target'"
|
|
|
|
# Install the target binary with a ".orig" suffix
|
|
|
|
inst_simple "$bin" "${target}.orig"
|
|
|
|
# Create a simple shell wrapper in place of the target binary, which
|
|
|
|
# sets necessary ASan-related env variables and then exec()s the
|
|
|
|
# suffixed target binary
|
|
|
|
cat >"$initdir/$target" <<EOF
|
|
|
|
#!/bin/bash
|
|
|
|
# Preload the ASan runtime DSO, otherwise ASAn will complain
|
|
|
|
export LD_PRELOAD="$ASAN_RT_PATH"
|
|
|
|
# Disable LSan to speed things up, since we don't care about leak reports
|
|
|
|
# from 'external' binaries
|
2023-06-28 15:53:13 +08:00
|
|
|
export ASAN_OPTIONS=detect_leaks=$enable_lsan
|
2022-06-15 04:54:39 +08:00
|
|
|
# Set argv[0] to the original binary name without the ".orig" suffix
|
|
|
|
exec -a "\$0" -- "${target}.orig" "\$@"
|
|
|
|
EOF
|
|
|
|
chmod +x "$initdir/$target"
|
|
|
|
else
|
|
|
|
inst_simple "$bin" "$target"
|
|
|
|
fi
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
# same as above, except for shell scripts.
|
|
|
|
# If your shell script does not start with shebang, it is not a shell script.
|
|
|
|
inst_script() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local bin line shebang_regex
|
|
|
|
bin="$(find_binary "${1:?}")" || return 1
|
2012-05-22 00:55:48 +08:00
|
|
|
shift
|
2021-04-17 00:33:44 +08:00
|
|
|
|
|
|
|
read -r -n 80 line <"$bin"
|
2012-05-22 00:55:48 +08:00
|
|
|
# If debug is set, clean unprintable chars to prevent messing up the term
|
2021-07-04 18:21:23 +08:00
|
|
|
get_bool "${debug:=}" && line="$(echo -n "$line" | tr -c -d '[:print:][:space:]')"
|
2021-04-17 00:33:44 +08:00
|
|
|
shebang_regex='(#! *)(/[^ ]+).*'
|
|
|
|
[[ "$line" =~ $shebang_regex ]] || return 1
|
|
|
|
inst "${BASH_REMATCH[2]}" && inst_simple "$bin" "$@"
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
# same as above, but specialized for symlinks
|
|
|
|
inst_symlink() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local src="${1:?}"
|
|
|
|
local target="${2:-$src}"
|
|
|
|
local realsrc
|
|
|
|
|
|
|
|
strstr "$src" "/" || return 1
|
|
|
|
[[ -L "$src" ]] || return 1
|
|
|
|
[[ -L "${initdir:?}/$target" ]] && return 0
|
|
|
|
realsrc="$(readlink -f "$src")"
|
|
|
|
if ! [[ -e "$initdir/$realsrc" ]]; then
|
|
|
|
if [[ -d "$realsrc" ]]; then
|
|
|
|
inst_dir "$realsrc"
|
2012-05-22 00:55:48 +08:00
|
|
|
else
|
2021-04-17 00:33:44 +08:00
|
|
|
inst "$realsrc"
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
|
|
|
fi
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ ! -e "$initdir/${target%/*}" ]] && inst_dir "${target%/*}"
|
|
|
|
[[ -d "${target%/*}" ]] && target="$(readlink -f "${target%/*}")/${target##*/}"
|
|
|
|
ln -sfn -- "$(convert_abs_rel "${target}" "${realsrc}")" "$initdir/$target"
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
# attempt to install any programs specified in a udev rule
|
|
|
|
inst_rule_programs() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local rule="${1:?}"
|
|
|
|
local prog bin
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2021-06-17 20:38:21 +08:00
|
|
|
sed -rn 's/^.*?PROGRAM==?"([^ "]+).*$/\1/p' "$rule" | while read -r prog; do
|
2021-04-17 00:33:44 +08:00
|
|
|
if [ -x "/lib/udev/$prog" ]; then
|
|
|
|
bin="/lib/udev/$prog"
|
|
|
|
else
|
|
|
|
if ! bin="$(find_binary "$prog")"; then
|
|
|
|
dinfo "Skipping program $prog used in udev rule $(basename "$rule") as it cannot be found"
|
|
|
|
continue
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
2021-04-17 00:33:44 +08:00
|
|
|
fi
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
#dinfo "Installing $_bin due to it's use in the udev rule $(basename $1)"
|
2021-09-08 19:33:34 +08:00
|
|
|
image_install "$bin"
|
2021-04-17 00:33:44 +08:00
|
|
|
done
|
2012-05-22 00:55:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
# udev rules always get installed in the same place, so
|
|
|
|
# create a function to install them to make life simpler.
|
|
|
|
inst_rules() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local target=/etc/udev/rules.d
|
|
|
|
local found rule
|
2012-05-22 00:55:48 +08:00
|
|
|
|
|
|
|
inst_dir "/lib/udev/rules.d"
|
2021-04-17 00:33:44 +08:00
|
|
|
inst_dir "$target"
|
|
|
|
for rule in "$@"; do
|
2012-05-22 00:55:48 +08:00
|
|
|
if [ "${rule#/}" = "$rule" ]; then
|
|
|
|
for r in /lib/udev/rules.d /etc/udev/rules.d; do
|
2021-04-17 00:33:44 +08:00
|
|
|
if [[ -f "$r/$rule" ]]; then
|
|
|
|
found="$r/$rule"
|
|
|
|
inst_simple "$found"
|
|
|
|
inst_rule_programs "$found"
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
fi
|
2021-04-17 00:33:44 +08:00
|
|
|
for r in '' ./; do
|
|
|
|
if [[ -f "${r}${rule}" ]]; then
|
|
|
|
found="${r}${rule}"
|
|
|
|
inst_simple "$found" "$target/${found##*/}"
|
|
|
|
inst_rule_programs "$found"
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
|
|
|
done
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ $found ]] || dinfo "Skipping udev rule: $rule"
|
|
|
|
found=
|
2012-05-22 00:55:48 +08:00
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
# general purpose installation function
|
|
|
|
# Same args as above.
|
|
|
|
inst() {
|
|
|
|
case $# in
|
|
|
|
1) ;;
|
2021-04-17 00:33:44 +08:00
|
|
|
2)
|
|
|
|
[[ ! "$initdir" && -d "$2" ]] && export initdir="$2"
|
|
|
|
[[ "$initdir" = "$2" ]] && set "$1"
|
|
|
|
;;
|
|
|
|
3)
|
|
|
|
[[ -z "$initdir" ]] && export initdir="$2"
|
|
|
|
set "$1" "$3"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
dfatal "inst only takes 1 or 2 or 3 arguments"
|
|
|
|
exit 1
|
|
|
|
;;
|
2012-05-22 00:55:48 +08:00
|
|
|
esac
|
2021-04-17 00:33:44 +08:00
|
|
|
|
|
|
|
local fun
|
|
|
|
for fun in inst_symlink inst_script inst_binary inst_simple; do
|
|
|
|
"$fun" "$@" && return 0
|
2012-05-22 00:55:48 +08:00
|
|
|
done
|
2021-09-22 16:59:52 +08:00
|
|
|
|
|
|
|
dwarn "Failed to install '$1'"
|
2012-05-22 00:55:48 +08:00
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
# install any of listed files
|
|
|
|
#
|
|
|
|
# If first argument is '-d' and second some destination path, first accessible
|
|
|
|
# source is installed into this path, otherwise it will installed in the same
|
|
|
|
# path as source. If none of listed files was installed, function return 1.
|
|
|
|
# On first successful installation it returns with 0 status.
|
|
|
|
#
|
|
|
|
# Example:
|
|
|
|
#
|
|
|
|
# inst_any -d /bin/foo /bin/bar /bin/baz
|
|
|
|
#
|
|
|
|
# Lets assume that /bin/baz exists, so it will be installed as /bin/foo in
|
2022-09-23 20:59:02 +08:00
|
|
|
# initrd.
|
2012-05-22 00:55:48 +08:00
|
|
|
inst_any() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local dest file
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ "${1:?}" = '-d' ]] && dest="${2:?}" && shift 2
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
for file in "$@"; do
|
|
|
|
if [[ -e "$file" ]]; then
|
|
|
|
[[ -n "$dest" ]] && inst "$file" "$dest" && return 0
|
|
|
|
inst "$file" && return 0
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
2022-06-14 08:11:00 +08:00
|
|
|
inst_recursive() {
|
|
|
|
local p item
|
|
|
|
|
|
|
|
for p in "$@"; do
|
2022-11-07 18:55:29 +08:00
|
|
|
# Make sure the source exists, as the process substitution below
|
|
|
|
# suppresses errors
|
|
|
|
stat "$p" >/dev/null || return 1
|
|
|
|
|
2022-06-14 08:11:00 +08:00
|
|
|
while read -r item; do
|
|
|
|
if [[ -d "$item" ]]; then
|
|
|
|
inst_dir "$item"
|
|
|
|
elif [[ -f "$item" ]]; then
|
|
|
|
inst_simple "$item"
|
|
|
|
fi
|
|
|
|
done < <(find "$p" 2>/dev/null)
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2021-09-08 19:33:34 +08:00
|
|
|
# image_install [-o ] <file> [<file> ... ]
|
|
|
|
# Install <file> to the test image
|
2012-05-22 00:55:48 +08:00
|
|
|
# -o optionally install the <file> and don't fail, if it is not there
|
2021-09-08 19:33:34 +08:00
|
|
|
image_install() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local optional=no
|
|
|
|
local prog="${1:?}"
|
|
|
|
|
|
|
|
if [[ "$prog" = '-o' ]]; then
|
|
|
|
optional=yes
|
2012-05-22 00:55:48 +08:00
|
|
|
shift
|
|
|
|
fi
|
2021-04-17 00:33:44 +08:00
|
|
|
|
|
|
|
for prog in "$@"; do
|
|
|
|
if ! inst "$prog" ; then
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$optional"; then
|
2021-04-17 00:33:44 +08:00
|
|
|
dinfo "Skipping program $prog as it cannot be found and is" \
|
2012-05-22 00:55:48 +08:00
|
|
|
"flagged to be optional"
|
|
|
|
else
|
2021-04-17 00:33:44 +08:00
|
|
|
dfatal "Failed to install $prog"
|
2012-05-22 00:55:48 +08:00
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2012-05-26 00:32:55 +08:00
|
|
|
# Install a single kernel module along with any firmware it may require.
|
|
|
|
# $1 = full path to kernel module to install
|
|
|
|
install_kmod_with_fw() {
|
2021-04-17 00:42:00 +08:00
|
|
|
local module="${1:?}"
|
2012-05-26 00:32:55 +08:00
|
|
|
# no need to go further if the module is already installed
|
2021-11-23 03:51:15 +08:00
|
|
|
[[ -e "${initdir:?}/lib/modules/${KERNEL_VER:?}/${module##*"/lib/modules/$KERNEL_VER/"}" ]] && return 0
|
2021-04-17 00:42:00 +08:00
|
|
|
[[ -e "$initdir/.kernelmodseen/${module##*/}" ]] && return 0
|
2012-05-26 00:32:55 +08:00
|
|
|
|
2021-04-17 00:42:00 +08:00
|
|
|
[ -d "$initdir/.kernelmodseen" ] && : >"$initdir/.kernelmodseen/${module##*/}"
|
2012-05-26 00:32:55 +08:00
|
|
|
|
2021-11-23 03:51:15 +08:00
|
|
|
inst_simple "$module" "/lib/modules/$KERNEL_VER/${module##*"/lib/modules/$KERNEL_VER/"}" || return $?
|
2012-05-26 00:32:55 +08:00
|
|
|
|
2021-04-17 00:42:00 +08:00
|
|
|
local modname="${module##*/}"
|
|
|
|
local fwdir found fw
|
|
|
|
modname="${modname%.ko*}"
|
2012-05-26 00:32:55 +08:00
|
|
|
|
2021-04-17 00:42:00 +08:00
|
|
|
while read -r fw; do
|
|
|
|
found=
|
|
|
|
for fwdir in /lib/firmware/updates /lib/firmware; do
|
|
|
|
if [[ -d "$fwdir" && -f "$fwdir/$fw" ]]; then
|
|
|
|
inst_simple "$fwdir/$fw" "/lib/firmware/$fw"
|
|
|
|
found=yes
|
2012-05-26 00:32:55 +08:00
|
|
|
fi
|
|
|
|
done
|
2021-07-04 18:21:23 +08:00
|
|
|
if ! get_bool "$found"; then
|
2021-04-17 00:42:00 +08:00
|
|
|
if ! grep -qe "\<${modname//-/_}\>" /proc/modules; then
|
|
|
|
dinfo "Possible missing firmware \"${fw}\" for kernel module" \
|
|
|
|
"\"${modname}.ko\""
|
2012-05-26 00:32:55 +08:00
|
|
|
else
|
2021-04-17 00:42:00 +08:00
|
|
|
dwarn "Possible missing firmware \"${fw}\" for kernel module" \
|
|
|
|
"\"${modname}.ko\""
|
2012-05-26 00:32:55 +08:00
|
|
|
fi
|
|
|
|
fi
|
2021-04-17 00:42:00 +08:00
|
|
|
done < <(modinfo -k "$KERNEL_VER" -F firmware "$module" 2>/dev/null)
|
2012-05-26 00:32:55 +08:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
# Do something with all the dependencies of a kernel module.
|
|
|
|
# Note that kernel modules depend on themselves using the technique we use
|
|
|
|
# $1 = function to call for each dependency we find
|
|
|
|
# It will be passed the full path to the found kernel module
|
|
|
|
# $2 = module to get dependencies for
|
|
|
|
# rest of args = arguments to modprobe
|
|
|
|
for_each_kmod_dep() {
|
2021-04-17 00:42:00 +08:00
|
|
|
local func="${1:?}"
|
|
|
|
local kmod="${2:?}"
|
|
|
|
local found=0
|
|
|
|
local cmd modpath
|
2012-05-26 00:32:55 +08:00
|
|
|
shift 2
|
|
|
|
|
2021-04-17 00:42:00 +08:00
|
|
|
while read -r cmd modpath _; do
|
|
|
|
[[ "$cmd" = insmod ]] || continue
|
|
|
|
"$func" "$modpath" || return $?
|
|
|
|
found=1
|
|
|
|
done < <(modprobe "$@" --ignore-install --show-depends "$kmod")
|
2012-05-26 00:32:55 +08:00
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
! get_bool "$found" && return 1
|
2021-04-17 00:42:00 +08:00
|
|
|
return 0
|
2012-05-26 00:32:55 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
# instmods [-c] <kernel module> [<kernel module> ... ]
|
|
|
|
# instmods [-c] <kernel subsystem>
|
|
|
|
# install kernel modules along with all their dependencies.
|
|
|
|
# <kernel subsystem> can be e.g. "=block" or "=drivers/usb/storage"
|
2021-04-17 00:42:00 +08:00
|
|
|
# FIXME(?): dracutdevs/dracut@f4e38c0da8d6bf3764c1ad753d9d52aef63050e5
|
2012-05-26 00:32:55 +08:00
|
|
|
instmods() {
|
2021-04-17 00:42:00 +08:00
|
|
|
local check=no
|
|
|
|
if [[ $# -ge 0 && "$1" = '-c' ]]; then
|
|
|
|
check=yes
|
2012-05-26 00:32:55 +08:00
|
|
|
shift
|
|
|
|
fi
|
|
|
|
|
2021-04-17 00:42:00 +08:00
|
|
|
inst1mod() {
|
|
|
|
local mod="${1:?}"
|
|
|
|
local ret=0
|
|
|
|
local mod_dir="/lib/modules/${KERNEL_VER:?}/"
|
|
|
|
|
|
|
|
case "$mod" in
|
2012-05-26 00:32:55 +08:00
|
|
|
=*)
|
2021-04-17 00:42:00 +08:00
|
|
|
if [ -f "${mod_dir}/modules.${mod#=}" ]; then
|
|
|
|
(
|
|
|
|
[[ "$mpargs" ]] && echo "$mpargs"
|
|
|
|
cat "${mod_dir}/modules.${mod#=}"
|
|
|
|
) | instmods
|
2012-05-26 00:32:55 +08:00
|
|
|
else
|
2021-04-17 00:42:00 +08:00
|
|
|
(
|
|
|
|
[[ "$mpargs" ]] && echo "$mpargs"
|
2021-08-08 19:18:18 +08:00
|
|
|
find "$mod_dir" -path "*/${mod#=}/*" -name "*.ko*" -type f -printf '%f\n'
|
2021-04-17 00:42:00 +08:00
|
|
|
) | instmods
|
2012-05-26 00:32:55 +08:00
|
|
|
fi
|
|
|
|
;;
|
2021-04-17 00:42:00 +08:00
|
|
|
--*)
|
|
|
|
mpargs+=" $mod"
|
|
|
|
;;
|
|
|
|
i2o_scsi)
|
|
|
|
# Do not load this diagnostic-only module
|
|
|
|
return
|
|
|
|
;;
|
2012-05-26 00:32:55 +08:00
|
|
|
*)
|
2021-04-17 00:42:00 +08:00
|
|
|
mod=${mod##*/}
|
2012-05-26 00:32:55 +08:00
|
|
|
# if we are already installed, skip this module and go on
|
|
|
|
# to the next one.
|
2021-04-17 00:42:00 +08:00
|
|
|
[[ -f "${initdir:?}/.kernelmodseen/${mod%.ko}.ko" ]] && return
|
2012-05-26 00:32:55 +08:00
|
|
|
|
|
|
|
# We use '-d' option in modprobe only if modules prefix path
|
|
|
|
# differs from default '/'. This allows us to use Dracut with
|
|
|
|
# old version of modprobe which doesn't have '-d' option.
|
2021-04-17 00:42:00 +08:00
|
|
|
local mod_dirname=${mod_dir%%/lib/modules/*}
|
|
|
|
[[ -n ${mod_dirname} ]] && mod_dirname="-d ${mod_dirname}/"
|
2012-05-26 00:32:55 +08:00
|
|
|
|
|
|
|
# ok, load the module, all its dependencies, and any firmware
|
|
|
|
# it may require
|
2021-04-17 00:42:00 +08:00
|
|
|
for_each_kmod_dep install_kmod_with_fw "$mod" \
|
|
|
|
--set-version "$KERNEL_VER" \
|
|
|
|
${mod_dirname:+"$mod_dirname"} \
|
|
|
|
${mpargs:+"$mpargs"}
|
|
|
|
((ret+=$?))
|
2012-05-26 00:32:55 +08:00
|
|
|
;;
|
|
|
|
esac
|
2021-04-23 16:55:49 +08:00
|
|
|
return "$ret"
|
2012-05-26 00:32:55 +08:00
|
|
|
}
|
|
|
|
|
2021-04-17 00:42:00 +08:00
|
|
|
local mod mpargs
|
|
|
|
|
|
|
|
if [[ $# -eq 0 ]]; then # filenames from stdin
|
|
|
|
while read -r mod; do
|
|
|
|
if ! inst1mod "${mod%.ko*}" && [ "$check" = "yes" ]; then
|
|
|
|
dfatal "Failed to install $mod"
|
|
|
|
return 1
|
|
|
|
fi
|
2012-05-26 00:32:55 +08:00
|
|
|
done
|
2021-04-17 00:42:00 +08:00
|
|
|
fi
|
2012-05-26 00:32:55 +08:00
|
|
|
|
2021-04-17 00:42:00 +08:00
|
|
|
for mod in "$@"; do # filenames as arguments
|
|
|
|
if ! inst1mod "${mod%.ko*}" && [ "$check" = "yes" ]; then
|
|
|
|
dfatal "Failed to install $mod"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
return 0
|
2012-05-26 00:32:55 +08:00
|
|
|
}
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2019-08-13 19:50:59 +08:00
|
|
|
_umount_dir() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local mountpoint="${1:?}"
|
|
|
|
if mountpoint -q "$mountpoint"; then
|
|
|
|
ddebug "umount $mountpoint"
|
|
|
|
umount "$mountpoint"
|
2019-08-13 19:50:59 +08:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2019-07-12 23:47:26 +08:00
|
|
|
# can be overridden in specific test
|
|
|
|
test_setup_cleanup() {
|
2019-12-13 21:21:31 +08:00
|
|
|
cleanup_initdir
|
2019-07-12 23:47:26 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
_test_cleanup() {
|
2019-07-13 02:09:48 +08:00
|
|
|
# (post-test) cleanup should always ignore failure and cleanup as much as possible
|
|
|
|
(
|
|
|
|
set +e
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ -n "$initdir" ]] && _umount_dir "$initdir"
|
|
|
|
[[ -n "$IMAGE_PUBLIC" ]] && rm -vf "$IMAGE_PUBLIC"
|
2021-01-28 21:26:35 +08:00
|
|
|
# If multiple setups/cleans are ran in parallel, this can cause a race
|
2021-09-30 02:30:08 +08:00
|
|
|
if [[ -n "$IMAGESTATEDIR" && $TEST_PARALLELIZE -ne 1 ]]; then
|
2021-01-28 21:26:35 +08:00
|
|
|
rm -vf "${IMAGESTATEDIR}/default.img"
|
|
|
|
fi
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ -n "$TESTDIR" ]] && rm -vfr "$TESTDIR"
|
|
|
|
[[ -n "$STATEFILE" ]] && rm -vf "$STATEFILE"
|
2019-07-19 08:34:57 +08:00
|
|
|
) || :
|
2019-07-12 23:47:26 +08:00
|
|
|
}
|
|
|
|
|
2017-08-04 20:34:14 +08:00
|
|
|
# can be overridden in specific test
|
|
|
|
test_cleanup() {
|
2019-07-12 23:47:26 +08:00
|
|
|
_test_cleanup
|
2017-08-04 20:34:14 +08:00
|
|
|
}
|
|
|
|
|
2020-03-21 02:09:35 +08:00
|
|
|
test_cleanup_again() {
|
|
|
|
[ -n "$TESTDIR" ] || return
|
|
|
|
rm -rf "$TESTDIR/unprivileged-nspawn-root"
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ -n "$initdir" ]] && _umount_dir "$initdir"
|
2024-03-20 20:55:02 +08:00
|
|
|
# Test specific images are not reused, so delete them or we run out of disk space
|
|
|
|
if [[ -n "$IMAGE_PUBLIC" ]] && [ "$(basename "$IMAGE_PUBLIC")" != "default.img" ]; then
|
|
|
|
rm -vf "$IMAGE_PUBLIC"
|
|
|
|
fi
|
|
|
|
if [[ -n "$IMAGE_PRIVATE" ]] && [ "$(basename "$IMAGE_PRIVATE")" != "default.img" ]; then
|
|
|
|
rm -vf "$IMAGE_PRIVATE"
|
|
|
|
fi
|
2020-03-21 02:09:35 +08:00
|
|
|
}
|
|
|
|
|
2019-12-12 16:37:19 +08:00
|
|
|
test_create_image() {
|
2019-12-10 23:40:31 +08:00
|
|
|
create_empty_image_rootdir
|
|
|
|
|
|
|
|
# Create what will eventually be our root filesystem onto an overlay
|
|
|
|
(
|
|
|
|
LOG_LEVEL=5
|
|
|
|
setup_basic_environment
|
|
|
|
)
|
2019-12-12 16:37:19 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
test_setup() {
|
2023-12-14 22:06:46 +08:00
|
|
|
if ! get_bool "$NO_BUILD" && \
|
|
|
|
get_bool "${TEST_REQUIRE_INSTALL_TESTS:?}" && \
|
|
|
|
command -v meson >/dev/null && \
|
|
|
|
[[ "$(meson configure "${BUILD_DIR:?}" | grep install-tests | awk '{ print $2 }')" != "true" ]]; then
|
2020-03-31 21:13:13 +08:00
|
|
|
dfatal "$BUILD_DIR needs to be built with -Dinstall-tests=true"
|
2019-12-12 16:37:19 +08:00
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
if [ -e "${IMAGE_PRIVATE:?}" ]; then
|
|
|
|
echo "Reusing existing image $IMAGE_PRIVATE → $(realpath "$IMAGE_PRIVATE")"
|
2019-12-12 16:37:19 +08:00
|
|
|
mount_initdir
|
2020-05-26 04:48:01 +08:00
|
|
|
else
|
2021-04-17 00:33:44 +08:00
|
|
|
if [ ! -e "${IMAGE_PUBLIC:?}" ]; then
|
2021-01-07 05:42:28 +08:00
|
|
|
# default.img is the base that every test uses and optionally appends to
|
2021-04-17 00:33:44 +08:00
|
|
|
if [ ! -e "${IMAGESTATEDIR:?}/default.img" ] || [ -n "${TEST_FORCE_NEWIMAGE:=}" ]; then
|
2021-01-07 05:42:28 +08:00
|
|
|
# Create the backing public image, but then completely unmount
|
|
|
|
# it and drop the loopback device responsible for it, since we're
|
|
|
|
# going to symlink/copy the image and mount it again from
|
|
|
|
# elsewhere.
|
2021-04-17 00:33:44 +08:00
|
|
|
local image_old="${IMAGE_PUBLIC}"
|
2021-01-07 05:42:28 +08:00
|
|
|
if [ -z "${TEST_FORCE_NEWIMAGE}" ]; then
|
|
|
|
IMAGE_PUBLIC="${IMAGESTATEDIR}/default.img"
|
|
|
|
fi
|
|
|
|
test_create_image
|
|
|
|
test_setup_cleanup
|
|
|
|
umount_loopback
|
|
|
|
cleanup_loopdev
|
|
|
|
IMAGE_PUBLIC="${image_old}"
|
|
|
|
fi
|
2021-07-04 18:21:23 +08:00
|
|
|
if [ "${IMAGE_NAME:?}" != "default" ] && ! get_bool "${TEST_FORCE_NEWIMAGE}"; then
|
2021-01-07 05:42:28 +08:00
|
|
|
cp -v "$(realpath "${IMAGESTATEDIR}/default.img")" "$IMAGE_PUBLIC"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
local hook_defined
|
|
|
|
declare -f -F test_append_files >/dev/null && hook_defined=yes || hook_defined=no
|
2020-05-26 04:48:01 +08:00
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
echo "Reusing existing cached image $IMAGE_PUBLIC → $(realpath "$IMAGE_PUBLIC")"
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$TEST_PARALLELIZE" || get_bool "$hook_defined"; then
|
2021-04-17 00:33:44 +08:00
|
|
|
cp -v -- "$(realpath "$IMAGE_PUBLIC")" "$IMAGE_PRIVATE"
|
2020-05-17 16:48:16 +08:00
|
|
|
else
|
2021-04-17 00:33:44 +08:00
|
|
|
ln -sv -- "$(realpath "$IMAGE_PUBLIC")" "$IMAGE_PRIVATE"
|
2020-05-17 16:48:16 +08:00
|
|
|
fi
|
2020-05-26 04:48:01 +08:00
|
|
|
|
2019-12-12 16:37:19 +08:00
|
|
|
mount_initdir
|
2022-02-17 03:29:14 +08:00
|
|
|
|
|
|
|
if get_bool "${TEST_SUPPORTING_SERVICES_SHOULD_BE_MASKED}"; then
|
2021-06-24 18:13:52 +08:00
|
|
|
dinfo "Masking supporting services"
|
|
|
|
mask_supporting_services
|
|
|
|
fi
|
|
|
|
|
2023-03-25 04:15:28 +08:00
|
|
|
if get_bool "$IS_BUILT_WITH_COVERAGE"; then
|
|
|
|
# Do an initial coverage capture, to make sure the final report includes
|
|
|
|
# files that the tests didn't touch at all
|
|
|
|
lcov --initial --capture --directory "${initdir}/${BUILD_DIR:?}" --output-file "${TESTDIR:?}/coverage-base"
|
|
|
|
fi
|
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "$hook_defined"; then
|
2021-04-17 00:33:44 +08:00
|
|
|
test_append_files "${initdir:?}"
|
2021-01-07 05:42:28 +08:00
|
|
|
fi
|
2019-12-12 16:37:19 +08:00
|
|
|
fi
|
|
|
|
|
2019-12-10 23:40:31 +08:00
|
|
|
setup_nspawn_root
|
|
|
|
}
|
|
|
|
|
2017-08-04 20:34:14 +08:00
|
|
|
test_run() {
|
2021-04-17 00:33:44 +08:00
|
|
|
local test_id="${1:?}"
|
2019-12-13 19:34:41 +08:00
|
|
|
mount_initdir
|
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
if ! get_bool "${TEST_NO_QEMU:=}"; then
|
2021-04-17 00:33:44 +08:00
|
|
|
if run_qemu "$test_id"; then
|
2022-05-04 18:29:31 +08:00
|
|
|
check_result_qemu || { echo "qemu test failed"; return 1; }
|
2017-08-04 20:34:14 +08:00
|
|
|
else
|
2022-05-04 18:29:31 +08:00
|
|
|
dwarn "can't run qemu, skipping"
|
2017-08-04 20:34:14 +08:00
|
|
|
fi
|
|
|
|
fi
|
2021-07-04 18:21:23 +08:00
|
|
|
if ! get_bool "${TEST_NO_NSPAWN:=}"; then
|
2019-12-13 21:21:31 +08:00
|
|
|
mount_initdir
|
2021-04-17 00:33:44 +08:00
|
|
|
if run_nspawn "${initdir:?}" "$test_id"; then
|
2019-12-13 21:21:31 +08:00
|
|
|
check_result_nspawn "$initdir" || { echo "nspawn-root test failed"; return 1; }
|
2017-08-04 20:34:14 +08:00
|
|
|
else
|
|
|
|
dwarn "can't run systemd-nspawn, skipping"
|
|
|
|
fi
|
2018-08-30 12:01:18 +08:00
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "${RUN_IN_UNPRIVILEGED_CONTAINER:=}"; then
|
2019-12-13 21:21:31 +08:00
|
|
|
dir="$TESTDIR/unprivileged-nspawn-root"
|
2021-04-17 00:33:44 +08:00
|
|
|
if NSPAWN_ARGUMENTS="-U --private-network ${NSPAWN_ARGUMENTS:-}" run_nspawn "$dir" "$test_id"; then
|
2019-12-13 21:21:31 +08:00
|
|
|
check_result_nspawn "$dir" || { echo "unprivileged-nspawn-root test failed"; return 1; }
|
2018-08-30 12:01:18 +08:00
|
|
|
else
|
|
|
|
dwarn "can't run systemd-nspawn, skipping"
|
|
|
|
fi
|
2019-01-30 09:19:45 +08:00
|
|
|
fi
|
2017-08-04 20:34:14 +08:00
|
|
|
fi
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2012-05-22 00:55:48 +08:00
|
|
|
do_test() {
|
2012-05-25 20:53:29 +08:00
|
|
|
if [[ $UID != "0" ]]; then
|
|
|
|
echo "TEST: $TEST_DESCRIPTION [SKIPPED]: not root" >&2
|
|
|
|
exit 0
|
|
|
|
fi
|
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "${TEST_NO_QEMU:=}" && get_bool "${TEST_NO_NSPAWN:=}"; then
|
2022-05-04 18:29:31 +08:00
|
|
|
echo "TEST: $TEST_DESCRIPTION [SKIPPED]: both qemu and nspawn disabled" >&2
|
2020-12-23 01:51:40 +08:00
|
|
|
exit 0
|
|
|
|
fi
|
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "${TEST_QEMU_ONLY:=}" && ! get_bool "$TEST_NO_NSPAWN"; then
|
2022-05-04 18:29:31 +08:00
|
|
|
echo "TEST: $TEST_DESCRIPTION [SKIPPED]: qemu-only tests requested" >&2
|
2020-12-27 04:11:55 +08:00
|
|
|
exit 0
|
|
|
|
fi
|
|
|
|
|
2021-07-04 18:21:23 +08:00
|
|
|
if get_bool "${TEST_PREFER_NSPAWN:=}" && ! get_bool "$TEST_NO_NSPAWN"; then
|
2021-01-01 01:29:58 +08:00
|
|
|
TEST_NO_QEMU=1
|
|
|
|
fi
|
|
|
|
|
scripts: use 4 space indentation
We had all kinds of indentation: 2 sp, 3 sp, 4 sp, 8 sp, and mixed.
4 sp was the most common, in particular the majority of scripts under test/
used that. Let's standarize on 4 sp, because many commandlines are long and
there's a lot of nesting, and with 8sp indentation less stuff fits. 4 sp
also seems to be the default indentation, so this will make it less likely
that people will mess up if they don't load the editor config. (I think people
often use vi, and vi has no support to load project-wide configuration
automatically. We distribute a .vimrc file, but it is not loaded by default,
and even the instructions in it seem to discourage its use for security
reasons.)
Also remove the few vim config lines that were left. We should either have them
on all files, or none.
Also remove some strange stuff like '#!/bin/env bash', yikes.
2019-04-04 20:10:42 +08:00
|
|
|
# Detect lib paths
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ "$libdir" ]] || for libdir in /lib64 /lib; do
|
2012-05-22 00:55:48 +08:00
|
|
|
[[ -d $libdir ]] && libdirs+=" $libdir" && break
|
|
|
|
done
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
[[ "$usrlibdir" ]] || for usrlibdir in /usr/lib64 /usr/lib; do
|
2012-05-22 00:55:48 +08:00
|
|
|
[[ -d $usrlibdir ]] && libdirs+=" $usrlibdir" && break
|
|
|
|
done
|
|
|
|
|
2023-03-21 23:44:41 +08:00
|
|
|
mkdir -p "$WORKDIR"
|
2017-08-07 23:30:11 +08:00
|
|
|
mkdir -p "$STATEDIR"
|
|
|
|
|
2012-05-22 00:55:48 +08:00
|
|
|
import_testdir
|
2013-11-06 06:32:56 +08:00
|
|
|
import_initdir
|
2012-05-22 00:55:48 +08:00
|
|
|
|
2021-04-20 23:47:50 +08:00
|
|
|
if [ -n "${SUDO_USER}" ]; then
|
|
|
|
ddebug "Making ${TESTDIR:?} readable for ${SUDO_USER} (acquired from sudo)"
|
|
|
|
setfacl -m "user:${SUDO_USER:?}:r-X" "${TESTDIR:?}"
|
|
|
|
fi
|
|
|
|
|
2021-04-17 00:33:44 +08:00
|
|
|
testname="$(basename "$PWD")"
|
2020-03-25 20:15:37 +08:00
|
|
|
|
2012-05-22 00:55:48 +08:00
|
|
|
while (($# > 0)); do
|
|
|
|
case $1 in
|
|
|
|
--run)
|
2020-03-25 20:15:37 +08:00
|
|
|
echo "${testname} RUN: $TEST_DESCRIPTION"
|
2021-04-27 01:20:18 +08:00
|
|
|
test_run "$TESTID"
|
2018-09-14 12:25:02 +08:00
|
|
|
ret=$?
|
2021-04-17 00:33:44 +08:00
|
|
|
if [ $ret -eq 0 ]; then
|
2020-03-25 20:15:37 +08:00
|
|
|
echo "${testname} RUN: $TEST_DESCRIPTION [OK]"
|
2012-05-22 00:55:48 +08:00
|
|
|
else
|
2020-03-25 20:15:37 +08:00
|
|
|
echo "${testname} RUN: $TEST_DESCRIPTION [FAILED]"
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
2021-07-04 18:21:23 +08:00
|
|
|
exit $ret
|
|
|
|
;;
|
2012-05-22 00:55:48 +08:00
|
|
|
--setup)
|
2020-03-25 20:15:37 +08:00
|
|
|
echo "${testname} SETUP: $TEST_DESCRIPTION"
|
2012-05-22 00:55:48 +08:00
|
|
|
test_setup
|
2019-07-12 23:47:26 +08:00
|
|
|
test_setup_cleanup
|
2017-08-08 03:09:21 +08:00
|
|
|
;;
|
2020-03-21 02:09:35 +08:00
|
|
|
--clean)
|
2020-03-25 20:15:37 +08:00
|
|
|
echo "${testname} CLEANUP: $TEST_DESCRIPTION"
|
2012-05-22 00:55:48 +08:00
|
|
|
test_cleanup
|
2017-08-08 03:09:21 +08:00
|
|
|
;;
|
2020-03-21 02:09:35 +08:00
|
|
|
--clean-again)
|
2020-03-25 20:15:37 +08:00
|
|
|
echo "${testname} CLEANUP AGAIN: $TEST_DESCRIPTION"
|
2020-03-21 02:09:35 +08:00
|
|
|
test_cleanup_again
|
|
|
|
;;
|
2012-05-22 00:55:48 +08:00
|
|
|
--all)
|
2017-08-08 03:09:21 +08:00
|
|
|
ret=0
|
2020-03-25 20:15:37 +08:00
|
|
|
echo -n "${testname}: $TEST_DESCRIPTION "
|
2021-02-17 07:47:34 +08:00
|
|
|
# Do not use a subshell, otherwise cleanup variables (LOOPDEV) will be lost
|
|
|
|
# and loop devices will leak
|
|
|
|
test_setup </dev/null >"$TESTLOG" 2>&1 || ret=$?
|
|
|
|
if [ $ret -eq 0 ]; then
|
|
|
|
test_setup_cleanup </dev/null >>"$TESTLOG" 2>&1 || ret=$?
|
|
|
|
fi
|
|
|
|
if [ $ret -eq 0 ]; then
|
2021-04-27 01:20:18 +08:00
|
|
|
test_run "$TESTID" </dev/null >>"$TESTLOG" 2>&1 || ret=$?
|
2021-02-17 07:47:34 +08:00
|
|
|
fi
|
2019-07-13 02:09:48 +08:00
|
|
|
test_cleanup
|
2012-05-22 00:55:48 +08:00
|
|
|
if [ $ret -eq 0 ]; then
|
2023-03-29 07:07:45 +08:00
|
|
|
# $TESTLOG is in $STATEDIR, so clean it up only on success
|
|
|
|
[[ -n "$STATEDIR" ]] && rm -vfr "$STATEDIR"
|
2012-05-22 00:55:48 +08:00
|
|
|
echo "[OK]"
|
|
|
|
else
|
|
|
|
echo "[FAILED]"
|
2017-08-07 23:30:11 +08:00
|
|
|
echo "see $TESTLOG"
|
2012-05-22 00:55:48 +08:00
|
|
|
fi
|
2021-07-04 18:21:23 +08:00
|
|
|
exit $ret
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
break
|
|
|
|
;;
|
2012-05-22 00:55:48 +08:00
|
|
|
esac
|
|
|
|
shift
|
|
|
|
done
|
|
|
|
}
|