James Coglan [Mon, 10 Jun 2024 12:15:53 +0000 (13:15 +0100)]
resolved: tests for dns_packet_append_opt()
James Coglan [Mon, 10 Jun 2024 11:30:48 +0000 (12:30 +0100)]
resolved: tests for dns_packet_append_key() domain name compression
James Coglan [Mon, 10 Jun 2024 10:12:51 +0000 (11:12 +0100)]
resolved: tests for basic usage of dns_packet_append_key()
James Coglan [Mon, 10 Jun 2024 09:16:01 +0000 (10:16 +0100)]
resolved: tests for dns_packet_set_flags()
James Coglan [Tue, 11 Jun 2024 15:14:09 +0000 (16:14 +0100)]
resolved: tests for DNS parameter formatters
James Coglan [Tue, 11 Jun 2024 09:54:18 +0000 (10:54 +0100)]
resolved: tests for dns_packet_is_reply_for()
James Coglan [Mon, 10 Jun 2024 09:15:19 +0000 (10:15 +0100)]
resolved: tests for dns_packet_validate_{query,reply}()
James Coglan [Tue, 11 Jun 2024 14:48:30 +0000 (15:48 +0100)]
resolved: tests for dns_packet_has_nsid_request()
James Coglan [Tue, 11 Jun 2024 14:26:27 +0000 (15:26 +0100)]
resolved: tests for dns_packet_ede_rcode()
James Coglan [Tue, 11 Jun 2024 13:47:59 +0000 (14:47 +0100)]
resolved: tests for dns_ede_rcode_is_dnssec()
James Coglan [Tue, 11 Jun 2024 13:44:26 +0000 (14:44 +0100)]
resolved: tests for dns_packet_equal()
James Coglan [Wed, 12 Jun 2024 17:47:30 +0000 (18:47 +0100)]
resolved: tests for dns_packet_extract(); parsing LOC records
James Coglan [Wed, 12 Jun 2024 12:27:52 +0000 (13:27 +0100)]
resolved: tests for dns_packet_extract(); parsing TXT records
James Coglan [Tue, 11 Jun 2024 10:57:36 +0000 (11:57 +0100)]
resolved: tests for dns_packet_extract(); parsing OPT records
These tests identify a couple of problems with OPT pseudo-RR parsing.
First, any TTL value with the high bit set is replaced with zero before
checking the record type. For most types this is correct, since TTLs
have the range of signed int32. But for OPT records where the TTL is
repurposed to hold the extended RCODE, EDNS version and flags, it means
that the high bit cannot be used in extended RCODEs. Any RCODE with the
high bit set will be read as zero.
Second, the DNS_PACKET_RCODE() function bit-shifts the extended RCODE by
24 places instead of 20, so that it ends up forming the lower 8 bits of
a 12-bit RCODE, instead of the upper 8 bits as intended.
We intend to fix these issues in other pull requests.
James Coglan [Tue, 11 Jun 2024 09:36:10 +0000 (10:36 +0100)]
resolved: tests for dns_packet_extract(); parsing NAPTR records
James Coglan [Tue, 11 Jun 2024 09:26:02 +0000 (10:26 +0100)]
resolved: tests for dns_packet_extract(); parsing HINFO records
James Coglan [Tue, 11 Jun 2024 08:32:24 +0000 (09:32 +0100)]
resolved: tests for dns_packet_extract(); parsing SVCB and HTTPS records
James Coglan [Fri, 7 Jun 2024 14:42:31 +0000 (15:42 +0100)]
resolved: tests for dns_packet_extract(); parsing RRSIG records
James Coglan [Fri, 7 Jun 2024 13:45:56 +0000 (14:45 +0100)]
resolved: tests for dns_packet_extract(); parsing SRV records
James Coglan [Fri, 7 Jun 2024 08:56:40 +0000 (09:56 +0100)]
resolved: tests for dns_packet_extract(); handling ANY class/type in answers
James Coglan [Fri, 7 Jun 2024 08:22:26 +0000 (09:22 +0100)]
resolved: tests for dns_packet_extract(); parsing SOA records
James Coglan [Fri, 7 Jun 2024 07:54:18 +0000 (08:54 +0100)]
resolved: tests for dns_packet_extract(); parsing NS records
James Coglan [Fri, 7 Jun 2024 07:28:00 +0000 (08:28 +0100)]
resolved: tests for dns_packet_extract(); parsing A records
James Coglan [Mon, 10 Jun 2024 13:46:55 +0000 (14:46 +0100)]
resolved: tests for dns_packet_extract(); check handling of self-referential compression pointers
James Coglan [Thu, 6 Jun 2024 14:46:43 +0000 (15:46 +0100)]
resolved: tests for dns_packet_extract(); checking for malformed queries
James Coglan [Wed, 5 Jun 2024 15:24:13 +0000 (16:24 +0100)]
resolved: tests for dns_packet_extract(); A and CNAME answers with domain compression
James Coglan [Wed, 5 Jun 2024 14:31:05 +0000 (15:31 +0100)]
resolved: tests for dns_packet_extract(); parsing of queries
James Coglan [Wed, 5 Jun 2024 14:07:45 +0000 (15:07 +0100)]
resolved: tests for parsing DNS packet headers
Lennart Poettering [Wed, 3 Jul 2024 08:55:13 +0000 (10:55 +0200)]
update TODO
Daan De Meyer [Wed, 3 Jul 2024 06:21:31 +0000 (08:21 +0200)]
mkosi: update fedora commit reference
*
f9fe17dbde Use vmlinux.h from kernel-devel
*
9cbad936a6 Pull in openssl-devel-engine
*
8ae009f929 Only add Requires on python3-zstd on Fedora
*
750e910c7c Drop BuildRequires on python3-zstd
Daan De Meyer [Tue, 2 Jul 2024 20:27:01 +0000 (22:27 +0200)]
mkosi: Don't touch the packaging checkout if work is being done
If work is being done in a separate branch, don't touch the packaging
checkout.
Daan De Meyer [Tue, 2 Jul 2024 15:50:57 +0000 (17:50 +0200)]
meson: Define __TARGET_ARCH macros required by bpf
These are required by the bpf_tracing.h header in libbpf, see
https://github.com/libbpf/libbpf/blob/master/src/bpf_tracing.h.
bpf_tracing.h does have a few fallbacks in case __TARGET_ARCH_XXX
is not defined but recommends using the __TARGET_ARCH macros instead
so let's do that.
Luca Boccassi [Tue, 2 Jul 2024 14:28:47 +0000 (15:28 +0100)]
coredump: correctly take tmpfs size into account for compression
We calculate the amount of uncompressed data we can write by taking the limits
into account and halving it to ensure there's room for switching to compression
on the fly when storing cores on a tmpfs (eg: due read-only rootfs).
But the logic is flawed, as taking into account the size of the tmpfs storage
was applied after the halving, so in practice when an uncompressed core file
was larger than the tmpfs, we fill it and then fail.
Rearrange the logic so that the halving is done after taking into account
the tmpfs size.
Mike Yuan [Tue, 2 Jul 2024 17:20:01 +0000 (19:20 +0200)]
docs/CODING_STYLE: document that we nowadays prefer (const char*) for func ret type
Addresses https://github.com/systemd/systemd/pull/33567#discussion_r1662818225
Luca Boccassi [Tue, 2 Jul 2024 21:35:33 +0000 (23:35 +0200)]
Merge pull request #33577 from fbuihuu/testsuite-tweaks-for-v256-on-SUSE
Testsuite tweaks for v256 on suse
Lennart Poettering [Tue, 2 Jul 2024 19:16:37 +0000 (21:16 +0200)]
Merge pull request #33574 from poettering/get-efi-var-raw
efi: efi variable refactoring
Franck Bui [Tue, 2 Jul 2024 16:55:17 +0000 (18:55 +0200)]
test: fix TEST-74-AUX-UTILS.ssh.sh on SUSE
Franck Bui [Tue, 2 Jul 2024 13:20:18 +0000 (15:20 +0200)]
test: preserve symlink in inst_recursive()
On SUSE this function is used to copy symlinks installed in *.wants/
directories.
Franck Bui [Tue, 2 Jul 2024 08:33:29 +0000 (10:33 +0200)]
test: fix TEST-24-CRYPTSETUP on SUSE
/etc/systemd/journald.conf.d drop-in dir already exists on SUSE.
Franck Bui [Mon, 1 Jul 2024 16:06:45 +0000 (18:06 +0200)]
test: install /etc/hosts
Needed for resolving the "localhost" hostname.
Lennart Poettering [Tue, 2 Jul 2024 16:09:55 +0000 (18:09 +0200)]
efivars: rename efivar_get_uint_string() → efivar_get_uint64_str16()
Be explicit with the type, and more inline with our other code, that
likes to indicate the string char width in the name.
Also, switch to a fixed size type, since EFI variables should really be
binary exact the same on all archs.
Lennart Poettering [Tue, 2 Jul 2024 16:07:35 +0000 (18:07 +0200)]
efi: rename efivar_(set|get)() → efivar_(set|get)_str16()
These functions after all write EFI UTF-16 strings, i.e. are relatively
high-level, hence give them a specific name indicating the type, to
match our other helpers that have similar type suffixes.
Lennart Poettering [Tue, 2 Jul 2024 15:50:47 +0000 (17:50 +0200)]
efivars: use appropropriate uint8_t type when dealing with "raw" bytes
We don't actually want chars here, but rather raw bytes, in particular
to avoid signedness issues. Hence, let's use uint8_t here.
Lennart Poettering [Tue, 2 Jul 2024 15:49:52 +0000 (17:49 +0200)]
efivars: change return parameter of efivar_get_raw() to be void**
This is the "raw", untyped version after all, hence we should return a
void pointer, and let the client cast, if they know more.
Replaces: #30812
Lennart Poettering [Tue, 2 Jul 2024 15:44:24 +0000 (17:44 +0200)]
efi: split out efivars.[ch] from util.[ch]
These are quite a bunch of functions, let's give them their own file.
No code changes, just some trivial refactoring.
Daan De Meyer [Tue, 2 Jul 2024 13:46:09 +0000 (15:46 +0200)]
mkosi: Install perf
It's already installed on ubuntu via linux-tools-common.
Lennart Poettering [Tue, 2 Jul 2024 13:59:00 +0000 (15:59 +0200)]
update TODO
Daniel Rusek [Thu, 6 Jun 2024 21:44:38 +0000 (23:44 +0200)]
test: split the resolved test suite into separate test cases
Although being far from ideal and the first two test cases have to be run
before the setup phase otherwise they will fail, it still makes the test
suite look much better and easier to read
Luca Boccassi [Tue, 2 Jul 2024 08:07:20 +0000 (10:07 +0200)]
Merge pull request #33496 from YHNdnzj/fd-is-mount-symlink
mountpoint-util: do not assume symlinks are not mountpoints
Luca Boccassi [Tue, 2 Jul 2024 08:05:49 +0000 (10:05 +0200)]
Merge pull request #33560 from YHNdnzj/trivial-cleanup-2
2 trivial follow-ups for recent PRs
Luca Boccassi [Mon, 1 Jul 2024 23:48:40 +0000 (01:48 +0200)]
Merge pull request #33523 from neighbourhoodie/fix/dns-opt-extended-rcode
Fix DNS OPT extended rcode parsing
dependabot[bot] [Mon, 1 Jul 2024 11:19:36 +0000 (11:19 +0000)]
build(deps): bump github/codeql-action from 3.24.7 to 3.25.11
Bumps [github/codeql-action](https://github.com/github/codeql-action) from 3.24.7 to 3.25.11.
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](https://github.com/github/codeql-action/compare/
3ab4101902695724f9365a384f86c1074d94e18c...
b611370bb5703a7efb587f9d136a52ea24c5c38c)
---
updated-dependencies:
- dependency-name: github/codeql-action
dependency-type: direct:production
update-type: version-update:semver-minor
...
Signed-off-by: dependabot[bot] <support@github.com>
Luca Boccassi [Mon, 1 Jul 2024 14:49:55 +0000 (15:49 +0100)]
mkosi: update debian commit reference
*
abf24e775c Add recommends on linux-sysctl-defaults
*
76cb4138d2 autopkgtest: skip qemu tests on arm64
*
0935d73526 Install new systemd-import generator
Mike Yuan [Mon, 1 Jul 2024 17:13:58 +0000 (19:13 +0200)]
shared/condition: add missing space after 'if'
Follow-up for
98b1ecc9175a8bb241292f6f441a754b6759dd97
Mike Yuan [Mon, 1 Jul 2024 16:59:28 +0000 (18:59 +0200)]
shared/mount-util: return early if param is NULL
To make things more readable and consistent.
Lennart Poettering [Mon, 1 Jul 2024 16:53:14 +0000 (18:53 +0200)]
Merge pull request #33475 from poettering/name-to-handle-at-fid
teach inode_same() the concept of name_to_handle_at() FIDs to properly detect inode identities
Daan De Meyer [Mon, 1 Jul 2024 12:25:20 +0000 (14:25 +0200)]
mkfs-util: Simplify logic
Lennart Poettering [Mon, 1 Jul 2024 10:40:33 +0000 (12:40 +0200)]
units: add dep on systemd-logind.service by user@.service
Let's make sure logind is accessible by the time user@.service runs, and
that logind stays around as long as it does so.
Addresses an issue reported here:
https://lists.freedesktop.org/archives/systemd-devel/2024-June/050468.html
This addresses an issued introduced by
278e815bfa3e4c2e3914e00121c37fc844cb2025, which dropped the a dependency
from user@.service systemd-user-sessions.service without replacement.
While dropping that dependency does make sense, it should have been
replaced with the weaker dependency on systemd-logind.service, hence fix
that now.
user@.service is after all a logind concept, hence logind really should
be around for its lifetime.
systemd-user-sessions.service is a later milestone that only really
should apply to regular users (not root), hence it's too strong a
requirement.
Daan De Meyer [Fri, 28 Jun 2024 18:12:51 +0000 (20:12 +0200)]
Use read_full_file_full() in read_smbios11_field()
read_virtual_file() will only read up to page size bytes of data
from /sys/firmware/dmi/entries/.../raw so let's use read_full_file_full()
instead to make sure we read all data.
This should be safe since smbios11 data can be considered immutable
during the lifetime of the system.
Lennart Poettering [Mon, 1 Jul 2024 16:51:54 +0000 (18:51 +0200)]
Merge pull request #33553 from poettering/list-devices
add --list-devices switch to various tools that accept block devices to list candidate devices
Lennart Poettering [Mon, 1 Jul 2024 09:55:52 +0000 (11:55 +0200)]
storagetm: add --list-devices command
Lennart Poettering [Mon, 1 Jul 2024 09:54:21 +0000 (11:54 +0200)]
repart: add --list-devices switch for listing candidate block devices
Lennart Poettering [Mon, 1 Jul 2024 09:51:14 +0000 (11:51 +0200)]
cryptenroll: add --list-devices switch that shows candidate block devices
Lennart Poettering [Mon, 1 Jul 2024 09:45:12 +0000 (11:45 +0200)]
util: add generic block device listener helper
Various of our tools operate on block devices, and it's not always
obvious to know which block devices are actually appropriate for use.
Hence, let's add a helper that allows to list block devices, and
supports some limited filtering.
Lennart Poettering [Mon, 1 Jul 2024 09:44:26 +0000 (11:44 +0200)]
blockdev-util: add partscan check function that takes an sd_device*
Lennart Poettering [Mon, 1 Jul 2024 08:25:38 +0000 (10:25 +0200)]
repart: add sections to --help text
Lennart Poettering [Tue, 25 Jun 2024 11:03:55 +0000 (13:03 +0200)]
test: beef up test case for fid-based equality checks
Lennart Poettering [Tue, 25 Jun 2024 10:46:52 +0000 (12:46 +0200)]
stat-util: port inode_same_at() to use FID file handle data to determine inode identity
Let's be good boys, and use FID for this.
Lennart Poettering [Tue, 25 Jun 2024 10:46:19 +0000 (12:46 +0200)]
mountpoint-util: clarify that EOVERFLOW is visible on nfs4/autofs mounts
Lennart Poettering [Tue, 25 Jun 2024 10:44:19 +0000 (12:44 +0200)]
mountpoint-util: use the FID stuff for detecting the root of mounts
In the unlikely event that sandboxes block statx() but let
name_to_handle_at() through it's a good way to determine the root inode
of the namespace, since its parent inode will have the same FID and
mnt_id.
Lennart Poettering [Tue, 25 Jun 2024 10:41:03 +0000 (12:41 +0200)]
mountpoint-util: add new helper name_to_handle_at_try_fid()
Newer kernels support a new flag for name_to_handle_at(): AT_HANDLE_FID.
This flag is supposed to return an identifier for an inode that we can
use for checking inode identity. It's supposed to be a replacement for
checking .st_ino which doesn't work anymore today because inode numbers
are no longer unique on file systems (not on overlayfs, and not on btrfs
for example). Hence, be a good citizen and add infrastructure to support
AT_HANDLE_FID. Unfortunately that doesn't work for old kernels, hence
add a fallback logic: if we can use the flag, use it. If we cannot use
name_to_handle_at() without it, which might give us a good ID too. But
of course tha tcan fail as well, which callers have to check.
Lennart Poettering [Tue, 25 Jun 2024 10:39:55 +0000 (12:39 +0200)]
mountpoint-util: use ERRNO_IS_xyz() at more places
Lennart Poettering [Tue, 25 Jun 2024 10:37:32 +0000 (12:37 +0200)]
mountpoint-util: add public helper for comparing file handles
We already have the code, let's move it to a function of its own and
export it.
Lennart Poettering [Tue, 25 Jun 2024 10:35:29 +0000 (12:35 +0200)]
mountpoint-util: make is_name_to_handle_at_fatal_error() an exported API
And while we are at it, make it use ERRNO_IS_xyz() where appropriate.
And move it up a bit, so we can use in the whole of mountpoint-util.c
(which we want to later).
dependabot[bot] [Mon, 1 Jul 2024 09:49:46 +0000 (09:49 +0000)]
build(deps): bump actions/checkout from 4.1.6 to 4.1.7
Bumps [actions/checkout](https://github.com/actions/checkout) from 4.1.6 to 4.1.7.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](https://github.com/actions/checkout/compare/
a5ac7e51b41094c92402da3b24376905380afc29...
692973e3d937129bcbf40652eb9f2f61becf3332)
---
updated-dependencies:
- dependency-name: actions/checkout
dependency-type: direct:production
update-type: version-update:semver-patch
...
Signed-off-by: dependabot[bot] <support@github.com>
rhellstrom [Thu, 27 Jun 2024 08:00:00 +0000 (11:00 +0300)]
Conditional PSI check to reflect changes done in 5.13
cpu.pressure 'full' is undefined for system-wide checks since 5.13 but still reported with values set to 0 for backwards compatibility. Made changes to reflect this for system-wide checks so that the conditional comparison is not made against the 0 value and instead fall back to 'some'.
https://www.kernel.org/doc/html/latest/accounting/psi.html
Luca Boccassi [Sat, 29 Jun 2024 17:31:23 +0000 (18:31 +0100)]
core: try again bind mounting if the destination was already created
If the destination mount point is on a shared filesystem and is
missing on the first attempt, we try to create it, but then
fail with -EEXIST if something else created it in the meanwhile.
Enter the retry logic on EEXIST, as we can just use the mount
point if it was already created.
Fixes https://github.com/systemd/systemd/issues/29690
Luca Boccassi [Sat, 29 Jun 2024 19:31:04 +0000 (21:31 +0200)]
Merge pull request #33544 from DaanDeMeyer/sector-size
repart: Two sector size improvements
Mike Yuan [Sat, 29 Jun 2024 14:48:18 +0000 (16:48 +0200)]
NEWS: fix typo
Mike Yuan [Sat, 29 Jun 2024 14:35:26 +0000 (16:35 +0200)]
NEWS: nscd has been dropped for good
Follow-up for
28f1f1a5e652508d6e61ace8918e8b831e4b62b4
Mike Yuan [Sat, 29 Jun 2024 14:11:44 +0000 (16:11 +0200)]
Merge pull request #33258 from YHNdnzj/cg-runtime-accounting
core/cgroup: various fixes for accounting
Daan De Meyer [Sat, 29 Jun 2024 13:27:02 +0000 (15:27 +0200)]
mkfs-util: Set sector size for btrfs as well
btrfs used to default the sector size to the page size and didn't
support anything else. Since 6.7, it defaults to 4K and using 4K
makes the filesystem compatible with all page sizes. So let's make
sure we use minimum 4K as well (lower causes failures on systems with
a 4K page size) but still allow larger sector sizes if specified by
the user.
Daan De Meyer [Sat, 29 Jun 2024 13:36:28 +0000 (15:36 +0200)]
repart: Don't set filesystem sector size to 512
We want to use 4K as the default sector size for filesystems so they
don't have to be regenerated to work on 512, 2048 or 4096 sector sizes.
DocNITE [Fri, 28 Jun 2024 15:47:15 +0000 (18:47 +0300)]
Added mised EVDEV_ABS_35 & EVDEV_ABS_36 for GAOMON s620
Luca Boccassi [Sat, 29 Jun 2024 08:36:16 +0000 (10:36 +0200)]
Merge pull request #30360 from keszybz/nscd-drop
Drop support for nscd
Luca Boccassi [Sat, 29 Jun 2024 08:31:11 +0000 (10:31 +0200)]
Merge pull request #33536 from teknoraver/hashmap_ensure_replace
Hashmap ensure replace
Daan De Meyer [Fri, 28 Jun 2024 17:36:50 +0000 (19:36 +0200)]
repart: Log more about filesystem sector size
Luca Boccassi [Sat, 29 Jun 2024 00:09:21 +0000 (02:09 +0200)]
Merge pull request #33518 from DaanDeMeyer/aarch64
Various integration test fixes
Mike Yuan [Fri, 28 Jun 2024 13:32:33 +0000 (15:32 +0200)]
core/unit: follow merged units before updating SourcePath= timestamp too
Currently, we only follow merged units for unit_load_dropin() call.
But if the unit is an alias, we should always perform operations
on the "canonical" unit.
Matteo Croce [Fri, 28 Jun 2024 15:19:26 +0000 (17:19 +0200)]
Use hashmap_ensure_replace()
Use the new function `hashmap_ensure_replace()` where we're using
`hashmap_ensure_allocated()` and `hashmap_ensure_replace()`.
Signed-off-by: Matteo Croce <teknoraver@meta.com>
Luca Boccassi [Fri, 28 Jun 2024 17:06:31 +0000 (19:06 +0200)]
Merge pull request #33517 from keszybz/a-few-unrelated-cleanups
A few unrelated cleanups
Matteo Croce [Fri, 28 Jun 2024 14:16:50 +0000 (16:16 +0200)]
introduce hashmap_ensure_replace()
Similar to hashmap_ensure_put(), but replace existing items in the map,
as hashmap_replace().
Zbigniew Jędrzejewski-Szmek [Fri, 28 Jun 2024 16:52:59 +0000 (18:52 +0200)]
meson: use less verbose quoting
Zbigniew Jędrzejewski-Szmek [Tue, 11 Jul 2023 21:43:27 +0000 (23:43 +0200)]
Drop support for nscd
nscd is known to be racy [1] and it was already deprecated and later dropped in
Fedora a while back [1,2]. We don't need to support obsolete stuff in systemd,
and the cache in systemd-resolved provides a better solution anyway.
We announced the plan to drop nscd in
d44934f3785ad9ca4aab757beb80a9b11ba4bc04.
[1] https://fedoraproject.org/wiki/Changes/DeprecateNSCD
[2] https://fedoraproject.org/wiki/Changes/RemoveNSCD
The option is kept as a stub without any effect to make the transition easier.
Luca Boccassi [Fri, 28 Jun 2024 16:25:36 +0000 (18:25 +0200)]
Merge pull request #33202 from bluca/extension_dedup
core: deduplicate identical dm-verity ExtensionImages=
Daan De Meyer [Fri, 28 Jun 2024 14:22:15 +0000 (16:22 +0200)]
TEST-54-CREDS: Use UEFI firmware if available
On aarch64, SMBIOS is only available when using UEFI, so let's make
sure that the creds test uses UEFI when available so that it can
read creds from SMBIOS when running in a virtual machine.
Daan De Meyer [Fri, 28 Jun 2024 14:21:51 +0000 (16:21 +0200)]
TEST-18-FAILUREACTION: Set auto firmware
This test runs in nspawn by default but will still run in qemu when
tests are run unprivileged so make sure we use UEFI if available to
avoid hangs when using the linux firmware.
Daan De Meyer [Fri, 28 Jun 2024 14:19:38 +0000 (16:19 +0200)]
TEST-09-REBOOT: Set auto firmware
This test runs in nspawn by default but will still run in qemu when
tests are run unprivileged so make sure we use UEFI if available to
avoid hangs when using the linux firmware.
Daan De Meyer [Fri, 28 Jun 2024 13:50:35 +0000 (15:50 +0200)]
TEST-06-SELINUX: Explicitly pull in autorelabel.service
Daan De Meyer [Fri, 28 Jun 2024 13:28:16 +0000 (15:28 +0200)]
TEST-70-TPM2: Use UEFI firmware if available
On x86 this doesn't matter but on aarch64 we need to make sure UEFI
is used so that /sys/kernel/security/tpm0/binary_bios_measurements
is there which is required for TEST-70-TPM2.