summaryrefslogtreecommitdiffstats
path: root/test/TEST-13-NSPAWN-SMOKE (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-11-16cgroup: when determining which controllers we need, always extend the mask ↵Lennart Poettering1-6/+11
according to cpu/cpuacct joint mounting Note that for cgroup_context_get_mask() this doesn't actually change much, but it does prepare the ground for #10507 later on.
2018-11-16cgroup: add new helper that knows which controllers are mounted togetherLennart Poettering1-0/+9
2018-11-16core: remove JoinControllers= configuration settingLennart Poettering9-257/+82
This removes the ability to configure which cgroup controllers to mount together. Instead, we'll now hardcode that "cpu" and "cpuacct" are mounted together as well as "net_cls" and "net_prio". The concept of mounting controllers together has no future as it does not exist to cgroupsv2. Moreover, the current logic is systematically broken, as revealed by the discussions in #10507. Also, we surveyed Red Hat customers and couldn't find a single user of the concept (which isn't particularly surprising, as it is broken...) This reduced the (already way too complex) cgroup handling for us, since we now know whenever we make a change to a cgroup for one controller to which other controllers it applies.
2018-11-16core: fix capitalization of CPUShares= settingsLennart Poettering1-2/+2
2018-11-16cgtop: use FOREACH_STRING() for fun and profitLennart Poettering1-23/+6
2018-11-16cgtop: use automatic clean-upLennart Poettering1-4/+4
2018-11-16sd-bus: make strict asan shut upLennart Poettering1-3/+6
asan doesn't like it if we use strndup() (i.e. a string function) on a non-NULL terminated buffer (i.e. something that isn't really a string). Let's hence use memdup_suffix0() instead of strndup(), which is more appropriate for binary data that is to become a string. Fixes: #10385
2018-11-16test: initialize syslog_fd in fuzz-journald-kmsg tooEvgeny Vereshchagin1-0/+1
This is a follow-up to 8857fb9beb9dcb that prevents the fuzzer from crashing with ``` ==220==ERROR: AddressSanitizer: ABRT on unknown address 0x0000000000dc (pc 0x7ff4953c8428 bp 0x7ffcf66ec290 sp 0x7ffcf66ec128 T0) SCARINESS: 10 (signal) #0 0x7ff4953c8427 in gsignal (/lib/x86_64-linux-gnu/libc.so.6+0x35427) #1 0x7ff4953ca029 in abort (/lib/x86_64-linux-gnu/libc.so.6+0x37029) #2 0x7ff49666503a in log_assert_failed_realm /work/build/../../src/systemd/src/basic/log.c:805:9 #3 0x7ff496614ecf in safe_close /work/build/../../src/systemd/src/basic/fd-util.c:66:17 #4 0x548806 in server_done /work/build/../../src/systemd/src/journal/journald-server.c:2064:9 #5 0x5349fa in LLVMFuzzerTestOneInput /work/build/../../src/systemd/src/fuzz/fuzz-journald-kmsg.c:26:9 #6 0x592755 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/libfuzzer/FuzzerLoop.cpp:571:15 #7 0x590627 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) /src/libfuzzer/FuzzerLoop.cpp:480:3 #8 0x594432 in fuzzer::Fuzzer::MutateAndTestOne() /src/libfuzzer/FuzzerLoop.cpp:708:19 #9 0x5973c6 in fuzzer::Fuzzer::Loop(std::__1::vector<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> >, fuzzer::fuzzer_allocator<std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<char> > > > const&) /src/libfuzzer/FuzzerLoop.cpp:839:5 #10 0x574541 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/libfuzzer/FuzzerDriver.cpp:764:6 #11 0x5675fc in main /src/libfuzzer/FuzzerMain.cpp:20:10 #12 0x7ff4953b382f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #13 0x420f58 in _start (/out/fuzz-journald-kmsg+0x420f58) ```
2018-11-16units: fix Description= of systemd-exit.serviceLennart Poettering1-1/+1
This file was probably copied from the --user version, let's use some more appropriate wording for the --system version.
2018-11-16units: use correct command to exitLennart Poettering1-1/+1
Otherwise we'll end a cyclic loop.
2018-11-16units: add the same ordering deps for systemd-exit.service as for ↵Lennart Poettering1-2/+2
systemd-poweroff.service and friends This stuff runs in containers, and should really behave the same everywhere.
2018-11-16core: show error code even when debug loggingLennart Poettering1-1/+1
2018-11-16hibernate-resume-generator: fix minor memory leak on error pathLennart Poettering1-1/+4
2018-11-16debug-generator: fix minor memory leakLennart Poettering1-0/+2
2018-11-16udev-util: read resolve_names from udev.confYu Watanabe1-1/+2
Fixes CID#1396866.
2018-11-16journal: simplify use of sd_event_source_get_enabled()Zbigniew Jędrzejewski-Szmek1-9/+5
2018-11-16journal-file: get rid of a helper variableZbigniew Jędrzejewski-Szmek1-7/+4
It doesn't really save much in code length. Having the event source named explicitly makes it easier to understand the code at a glance.
2018-11-16sd-event: make sd_event_source_get_enabled return more infoZbigniew Jędrzejewski-Szmek2-9/+11
2018-11-16sd-event: do not use assert_return for something that is not an errorZbigniew Jędrzejewski-Szmek1-1/+3
It's totally OK for description to be unset, so let's not log about this even at debug level.