summaryrefslogtreecommitdiff
path: root/src/test/test-execute.c
diff options
context:
space:
mode:
authorYu Watanabe <watanabe.yu+github@gmail.com>2023-02-17 10:21:58 +0900
committerLennart Poettering <lennart@poettering.net>2023-02-17 09:55:05 +0100
commitd51e31ac4197d971a468ff41f15593bb6fdb29f3 (patch)
tree5e7351698ee4ecbd572c6a43c4e5db596843b31c /src/test/test-execute.c
parent8c2264abb9c16bc2933f95be299f15ee66c21181 (diff)
downloadsystemd-d51e31ac4197d971a468ff41f15593bb6fdb29f3.tar.gz
test-execute: also mount tmpfs on /dev/shm
Otherwise, if /dev/shm has a directory that cannot be accessible by unprivileged user, then we cannot pick a dynamic user, and test service may fail with unexpected error code: --- Failed to enter shared memory directory /dev/shm/systemd-watch-bind-BqAGlN: Permission denied exec-dynamicuser-supplementarygroups.service: Failed to update dynamic user credentials: Device or resource busy exec-dynamicuser-supplementarygroups.service: Failed at step USER spawning /bin/sh: Device or resource busy src/test/test-execute.c:885:test_exec_dynamicuser: exec-dynamicuser-supplementarygroups.service: can_unshare=no: exit status 217, expected 216 --- Follow-up for 4e032f654b94c2544ccf937209303766dfa66c24.
Diffstat (limited to 'src/test/test-execute.c')
-rw-r--r--src/test/test-execute.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/test/test-execute.c b/src/test/test-execute.c
index e19565ef92..f8c64b6042 100644
--- a/src/test/test-execute.c
+++ b/src/test/test-execute.c
@@ -1267,7 +1267,7 @@ static int prepare_ns(const char *process_name) {
assert_se(mkdir_p(PRIVATE_UNIT_DIR, 0755) >= 0);
/* Mount tmpfs on the following directories to make not StateDirectory= or friends disturb the host. */
- FOREACH_STRING(p, "/root", "/tmp", "/var/tmp", "/var/lib", PRIVATE_UNIT_DIR)
+ FOREACH_STRING(p, "/dev/shm", "/root", "/tmp", "/var/tmp", "/var/lib", PRIVATE_UNIT_DIR)
assert_se(mount_nofollow_verbose(LOG_DEBUG, "tmpfs", p, "tmpfs", MS_NOSUID|MS_NODEV, NULL) >= 0);
/* Copy unit files to make them accessible even when unprivileged. */