From: Zbigniew Jędrzejewski-Szmek Date: Sat, 15 Nov 2025 15:13:47 +0000 (+0100) Subject: tree-wide: drop space after shell redirection ops X-Git-Tag: v259-rc1~14^2 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=01100f15ad5f0bc368f22f279cf90ca91a4ee649;p=thirdparty%2Fsystemd.git tree-wide: drop space after shell redirection ops Those are all unary operators. --- diff --git a/test/integration-tests/TEST-80-NOTIFYACCESS/TEST-80-NOTIFYACCESS.units/reload-timeout.sh b/test/integration-tests/TEST-80-NOTIFYACCESS/TEST-80-NOTIFYACCESS.units/reload-timeout.sh index 266c3cfef2c..ac0f4d27a5d 100755 --- a/test/integration-tests/TEST-80-NOTIFYACCESS/TEST-80-NOTIFYACCESS.units/reload-timeout.sh +++ b/test/integration-tests/TEST-80-NOTIFYACCESS/TEST-80-NOTIFYACCESS.units/reload-timeout.sh @@ -17,7 +17,7 @@ wait_for_signal() { } sighup_handler() { - echo "hup$(( ++COUNTER ))" > /tmp/syncfifo1 + echo "hup$(( ++COUNTER ))" >/tmp/syncfifo1 } trap sighup_handler SIGHUP diff --git a/test/integration-tests/TEST-80-NOTIFYACCESS/TEST-80-NOTIFYACCESS.units/test.sh b/test/integration-tests/TEST-80-NOTIFYACCESS/TEST-80-NOTIFYACCESS.units/test.sh index c3a6a3982d6..a59d2296395 100755 --- a/test/integration-tests/TEST-80-NOTIFYACCESS/TEST-80-NOTIFYACCESS.units/test.sh +++ b/test/integration-tests/TEST-80-NOTIFYACCESS/TEST-80-NOTIFYACCESS.units/test.sh @@ -10,7 +10,7 @@ sync_in() { } sync_out() { - echo "$1" > /tmp/syncfifo1 + echo "$1" >/tmp/syncfifo1 } export SYSTEMD_LOG_LEVEL=debug diff --git a/test/test-bootctl-json.sh b/test/test-bootctl-json.sh index 4d7c468241b..81355ee1098 100755 --- a/test/test-bootctl-json.sh +++ b/test/test-bootctl-json.sh @@ -37,7 +37,7 @@ if ret=$("bootctl" --print-boot-path); then test "$ret" = "/efi" -o "$ret" = "/boot" -o "$ret" = "/boot/efi" fi -if "$bootctl" -R > /dev/null ; then +if "$bootctl" -R >/dev/null ; then P=$("$bootctl" -R) PP=$("$bootctl" -RR) diff --git a/test/units/TEST-07-PID1.issue-31752.sh b/test/units/TEST-07-PID1.issue-31752.sh index 73b6cc69ee6..4904b341afd 100755 --- a/test/units/TEST-07-PID1.issue-31752.sh +++ b/test/units/TEST-07-PID1.issue-31752.sh @@ -21,7 +21,7 @@ cleanup() { trap cleanup EXIT -cat > /run/systemd/system/"$UNIT" </run/systemd/system/"$UNIT" < /run/systemd/system/"$UNIT".d/desc.conf </run/systemd/system/"$UNIT".d/desc.conf < /run/systemd/system/"$UNIT" </run/systemd/system/"$UNIT" < /run/systemd/system/"$UNIT".d/desc.conf </run/systemd/system/"$UNIT".d/desc.conf < /run/systemd/system/mqueue-ownership.socket +cat </run/systemd/system/mqueue-ownership.socket [Unit] Description=Create a message queue with customized ownership [Socket] @@ -30,7 +30,7 @@ SocketGroup=$group SocketMode=$mode EOF -cat << 'EOF' > /run/systemd/system/mqueue-ownership.service +cat </run/systemd/system/mqueue-ownership.service [Unit] Description=Dummy service for the socket unit Requires=%N.socket diff --git a/test/units/TEST-13-NSPAWN.machined.sh b/test/units/TEST-13-NSPAWN.machined.sh index a9e38176885..7ae23558dca 100755 --- a/test/units/TEST-13-NSPAWN.machined.sh +++ b/test/units/TEST-13-NSPAWN.machined.sh @@ -397,7 +397,7 @@ rm -f /tmp/none-existent-file # server side, to not generate early SIGHUP. Hence, let's just invoke "sleep # infinity" client side, once we acquired the fd (passing it to it), and kill # it once we verified everything worked. -PID=$(systemd-notify --fork -- varlinkctl --exec call /run/systemd/machine/io.systemd.Machine io.systemd.Machine.Open '{"name": ".host", "mode": "shell", "user": "root", "path": "/usr/bin/bash", "args": ["bash", "-c", "echo $FOO > /tmp/none-existent-file"], "environment": ["FOO=BAR"]}' -- sleep infinity) +PID=$(systemd-notify --fork -- varlinkctl --exec call /run/systemd/machine/io.systemd.Machine io.systemd.Machine.Open '{"name": ".host", "mode": "shell", "user": "root", "path": "/usr/bin/bash", "args": ["bash", "-c", "echo $FOO >/tmp/none-existent-file"], "environment": ["FOO=BAR"]}' -- sleep infinity) timeout 30 bash -c "until test -e /tmp/none-existent-file; do sleep .5; done" grep -q "BAR" /tmp/none-existent-file kill "$PID" @@ -424,7 +424,7 @@ diff /tmp/foo /var/lib/machines/long-running/root/foo (! varlinkctl call /run/systemd/machine/io.systemd.Machine io.systemd.Machine.CopyTo '{"name": "long-running", "source": "/tmp/foo", "destination": "/root/foo"}') # FileExists varlinkctl call /run/systemd/machine/io.systemd.Machine io.systemd.Machine.CopyTo '{"name": "long-running", "source": "/tmp/foo", "destination": "/root/foo", "replace": true}' -echo "sample-test-output" > /tmp/foo +echo "sample-test-output" >/tmp/foo varlinkctl call /run/systemd/machine/io.systemd.Machine io.systemd.Machine.CopyTo '{"name": "long-running", "source": "/tmp/foo", "destination": "/root/foo", "replace": true}' diff /tmp/foo /var/lib/machines/long-running/root/foo rm -f /tmp/foo /var/lib/machines/long-running/root/foo diff --git a/test/units/TEST-13-NSPAWN.unpriv.sh b/test/units/TEST-13-NSPAWN.unpriv.sh index 7ae2c74efa3..22bc03e5db7 100755 --- a/test/units/TEST-13-NSPAWN.unpriv.sh +++ b/test/units/TEST-13-NSPAWN.unpriv.sh @@ -164,7 +164,7 @@ assert_not_in 'nurps' "$(run0 --pipe -u testuser machinectl --user list-images)" assert_not_in 'kurps' "$(run0 --pipe -u testuser machinectl --user list-images)" mkdir /home/testuser/.local/state/machines/inodetest -echo hallo > /home/testuser/.local/state/machines/inodetest/testfile +echo hallo >/home/testuser/.local/state/machines/inodetest/testfile # Make the file sparse, set an xattr, set an ACL, set a chattr flag, and make it hardlink ln /home/testuser/.local/state/machines/inodetest/testfile /home/testuser/.local/state/machines/inodetest/testfile.hard @@ -176,7 +176,7 @@ chown foreign-0:foreign-0 /home/testuser/.local/state/machines/inodetest/testfil ls -al /home/testuser/.local/state/machines/inodetest # Verify UID squashing -echo gaga > /home/testuser/.local/state/machines/inodetest/squashtest +echo gaga >/home/testuser/.local/state/machines/inodetest/squashtest chown 1000:1000 /home/testuser/.local/state/machines/inodetest/squashtest # Ensure hardlinked symlinks work @@ -217,7 +217,7 @@ run0 -u testuser machinectl --user remove inodetest2 # Test tree mangling (i.e. moving the root dir one level up on extract) mkdir -p /var/tmp/mangletest/mangletest-0.1/usr/lib -echo "ID=brumm" > /var/tmp/mangletest/mangletest-0.1/usr/lib/os-release +echo "ID=brumm" >/var/tmp/mangletest/mangletest-0.1/usr/lib/os-release tar -C /var/tmp/mangletest/ -cvzf /var/tmp/mangletest.tar.gz mangletest-0.1 run0 --pipe -u testuser importctl -m --user import-tar /var/tmp/mangletest.tar.gz cmp /var/tmp/mangletest/mangletest-0.1/usr/lib/os-release /home/testuser/.local/state/machines/mangletest/usr/lib/os-release diff --git a/test/units/TEST-16-EXTEND-TIMEOUT.sh b/test/units/TEST-16-EXTEND-TIMEOUT.sh index 19f3ed771b2..93fc0b78f60 100755 --- a/test/units/TEST-16-EXTEND-TIMEOUT.sh +++ b/test/units/TEST-16-EXTEND-TIMEOUT.sh @@ -86,7 +86,7 @@ systemd-run \ -u runtime-max-sec-test-3.service \ sh -c "while true; do sleep 1; done" mkdir -p /etc/systemd/system/runtime-max-sec-test-3.service.d/ -cat > /etc/systemd/system/runtime-max-sec-test-3.service.d/override.conf << EOF +cat >/etc/systemd/system/runtime-max-sec-test-3.service.d/override.conf < /etc/systemd/system/runtime-max-sec-test-4.scope.d/override.conf << EOF +cat >/etc/systemd/system/runtime-max-sec-test-4.scope.d/override.conf < /run/credstore/udev.conf.50-testme </run/credstore/udev.conf.50-testme < /run/credstore/udev.rules.50-testme </run/credstore/udev.rules.50-testme < /tmp/C/3/f1 +echo -n ABC >/tmp/C/3/f1 systemd-tmpfiles --create - < /tmp/test-extra-fd/1.txt -echo "Extra" > /tmp/test-extra-fd/2.txt +echo "Hello" >/tmp/test-extra-fd/1.txt +echo "Extra" >/tmp/test-extra-fd/2.txt # Open files and assign FD to variables exec {TEST_FD1} /var/cache/wrongext/usr/lib/systemd/system/app0.service +echo "[Service]" >/var/cache/wrongext/usr/lib/systemd/system/app0.service touch /var/cache/wrongext/usr/lib/extension-release.d/extension-release.wrongext_somethingwrong.txt cp /tmp/rootdir/usr/lib/os-release /var/cache/wrongext/usr/lib/extension-release.d/extension-release.app0 setfattr -n user.extension-release.strict -v "false" /var/cache/wrongext/usr/lib/extension-release.d/extension-release.app0 diff --git a/test/units/TEST-35-LOGIN.sh b/test/units/TEST-35-LOGIN.sh index 813ea593803..d4a07faca13 100755 --- a/test/units/TEST-35-LOGIN.sh +++ b/test/units/TEST-35-LOGIN.sh @@ -674,7 +674,7 @@ testcase_ambient_caps() { TRANSIENTUNIT="capwakealarm$RANDOM.service" SCRIPT="/tmp/capwakealarm$RANDOM.sh" - cat > /etc/pam.d/"$PAMSERVICE" </etc/pam.d/"$PAMSERVICE" < /etc/pam.d/"$PAMSERVICE" </etc/pam.d/"$PAMSERVICE" </dev/null read -r SHA256SUM1 _ < <(systemd-dissect --copy-from /tmp/img etc/os-release | sha256sum) test "$SHA256SUM1" != "" -echo abc > abc +echo abc >abc systemd-dissect --copy-to /tmp/img abc /abc test -f /tmp/img/abc diff --git a/test/units/TEST-50-DISSECT.mountfsd.sh b/test/units/TEST-50-DISSECT.mountfsd.sh index 92d497903f2..a70cf6df0fa 100755 --- a/test/units/TEST-50-DISSECT.mountfsd.sh +++ b/test/units/TEST-50-DISSECT.mountfsd.sh @@ -122,7 +122,7 @@ cmp /tmp/unpriv.raw.mtree /tmp/unpriv2.raw.mtree # Make sure nspawn works unpriv, too (for now do not nest) if ! systemd-detect-virt -c; then - systemd-nspawn --pipe -i /var/tmp/unpriv.raw --read-only echo thisisatest > /tmp/unpriv.out + systemd-nspawn --pipe -i /var/tmp/unpriv.raw --read-only echo thisisatest >/tmp/unpriv.out echo thisisatest | cmp /tmp/unpriv.out - # The unpriv user has no rights to lock the image or write to it. Let's diff --git a/test/units/TEST-54-CREDS.sh b/test/units/TEST-54-CREDS.sh index 5cfa19905ab..6878141aae6 100755 --- a/test/units/TEST-54-CREDS.sh +++ b/test/units/TEST-54-CREDS.sh @@ -490,24 +490,24 @@ fi # Decrypt/encrypt via varlink DATA="Zm9vYmFyCg==" -echo "{\"data\":\"$DATA\"}" > /tmp/vlcredsdata +echo "{\"data\":\"$DATA\"}" >/tmp/vlcredsdata varlinkctl call /run/systemd/io.systemd.Credentials io.systemd.Credentials.Encrypt "$(cat /tmp/vlcredsdata)" | \ - varlinkctl call --json=short /run/systemd/io.systemd.Credentials io.systemd.Credentials.Decrypt > /tmp/vlcredsdata2 + varlinkctl call --json=short /run/systemd/io.systemd.Credentials io.systemd.Credentials.Decrypt >/tmp/vlcredsdata2 cmp /tmp/vlcredsdata /tmp/vlcredsdata2 rm /tmp/vlcredsdata2 # Pick a key type explicitly varlinkctl call /run/systemd/io.systemd.Credentials io.systemd.Credentials.Encrypt "{\"data\":\"$DATA\",\"withKey\":\"host\"}" | \ - varlinkctl call --json=short /run/systemd/io.systemd.Credentials io.systemd.Credentials.Decrypt > /tmp/vlcredsdata2 + varlinkctl call --json=short /run/systemd/io.systemd.Credentials io.systemd.Credentials.Decrypt >/tmp/vlcredsdata2 cmp /tmp/vlcredsdata /tmp/vlcredsdata2 rm /tmp/vlcredsdata2 varlinkctl call /run/systemd/io.systemd.Credentials io.systemd.Credentials.Encrypt "{\"data\":\"$DATA\",\"withKey\":\"null\"}" | \ jq '.["allowNull"] = true' | - varlinkctl call --json=short /run/systemd/io.systemd.Credentials io.systemd.Credentials.Decrypt > /tmp/vlcredsdata2 + varlinkctl call --json=short /run/systemd/io.systemd.Credentials io.systemd.Credentials.Decrypt >/tmp/vlcredsdata2 cmp /tmp/vlcredsdata /tmp/vlcredsdata2 rm /tmp/vlcredsdata /tmp/vlcredsdata2 diff --git a/test/units/TEST-63-PATH.sh b/test/units/TEST-63-PATH.sh index fa58ff382c0..5a49dfb4e90 100755 --- a/test/units/TEST-63-PATH.sh +++ b/test/units/TEST-63-PATH.sh @@ -110,11 +110,11 @@ assert_in "test63-issue-24577-dep.service" "$output" systemctl start test63-pr-30768.path exec {lock}<>/tmp/noexit flock -e $lock -echo test1 > /tmp/copyme +echo test1 >/tmp/copyme # shellcheck disable=SC2016 timeout 30 bash -c 'until test "$(systemctl show test63-pr-30768.service -P ActiveState)" = deactivating; do sleep .2; done' diff /tmp/copyme /tmp/copied -echo test2 > /tmp/copyme +echo test2 >/tmp/copyme exec {lock}<&- timeout 30 bash -c 'until diff /tmp/copyme /tmp/copied >/dev/null; do sleep .2; done' diff --git a/test/units/TEST-70-TPM2.creds.sh b/test/units/TEST-70-TPM2.creds.sh index e66bfd19c51..15899d10578 100755 --- a/test/units/TEST-70-TPM2.creds.sh +++ b/test/units/TEST-70-TPM2.creds.sh @@ -6,7 +6,7 @@ set -o pipefail export SYSTEMD_LOG_LEVEL=debug # Ensure that sandboxing doesn't stop creds from being accessible -echo "test" > /tmp/testdata +echo "test" >/tmp/testdata systemd-creds encrypt /tmp/testdata /tmp/testdata.encrypted --with-key=tpm2 # LoadCredentialEncrypted systemd-run -p PrivateDevices=yes -p LoadCredentialEncrypted=testdata.encrypted:/tmp/testdata.encrypted --pipe --wait systemd-creds cat testdata.encrypted | cmp - /tmp/testdata diff --git a/test/units/TEST-70-TPM2.cryptsetup.sh b/test/units/TEST-70-TPM2.cryptsetup.sh index 8c1a362fbcc..e8f3c9b7078 100755 --- a/test/units/TEST-70-TPM2.cryptsetup.sh +++ b/test/units/TEST-70-TPM2.cryptsetup.sh @@ -135,7 +135,7 @@ if tpm_has_pcr sha256 12; then tpm2_pcrread -Q -o /tmp/pcr.dat sha256:12 CURRENT_PCR_VALUE=$(cat /sys/class/tpm/tpm0/pcr-sha256/12) tpm2_readpublic -c 0x81000001 -o /tmp/srk.pub - systemd-analyze srk > /tmp/srk2.pub + systemd-analyze srk >/tmp/srk2.pub cmp /tmp/srk.pub /tmp/srk2.pub if [ -f /run/systemd/tpm2-srk-public-key.tpm2b_public ] ; then cmp /tmp/srk.pub /run/systemd/tpm2-srk-public-key.tpm2b_public @@ -203,7 +203,7 @@ if openssl_supports_kdf SSKDF; then # Make sure that --tpm2-device-key= also works with systemd-repart tpm2_readpublic -c 0x81000001 -o /tmp/srk.pub mkdir /tmp/dditest - cat > /tmp/dditest/50-root.conf </tmp/dditest/50-root.conf < /run/systemd/system/systemd-pcrextend.socket.d/50-no-condition.conf </run/systemd/system/systemd-pcrextend.socket.d/50-no-condition.conf < /run/systemd/system/systemd-pcrlock.socket.d/50-no-condition.conf </run/systemd/system/systemd-pcrlock.socket.d/50-no-condition.conf < /dev/null + systemd-firstboot --root="$ROOT" --prompt-keymap-auto >/dev/null fi echo -ne "Europe/Berlin\n" | systemd-firstboot --root="$ROOT" --prompt-timezone readlink "$ROOT/etc/localtime" | grep -q "Europe/Berlin$" diff --git a/test/units/TEST-74-AUX-UTILS.keyutil.sh b/test/units/TEST-74-AUX-UTILS.keyutil.sh index 0c5c0d5d9b2..172939253e4 100755 --- a/test/units/TEST-74-AUX-UTILS.keyutil.sh +++ b/test/units/TEST-74-AUX-UTILS.keyutil.sh @@ -49,20 +49,20 @@ testcase_public() { verify_pkcs7() { # Verify using internal certificate - openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify > /dev/null + openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify >/dev/null # Verify using external (original) certificate - openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify -certfile /tmp/test.crt -nointern > /dev/null + openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify -certfile /tmp/test.crt -nointern >/dev/null } verify_pkcs7_fail() { # Verify using internal certificate - (! openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify > /dev/null) + (! openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify >/dev/null) # Verify using external (original) certificate - (! openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify -certfile /tmp/test.crt -nointern > /dev/null) + (! openssl smime -verify -binary -inform der -in /tmp/payload.p7s -content /tmp/payload -noverify -certfile /tmp/test.crt -nointern >/dev/null) } testcase_pkcs7() { - echo -n "test" > /tmp/payload + echo -n "test" >/tmp/payload for hashalg in sha256 sha384 sha512; do # shellcheck disable=SC2086 diff --git a/test/units/TEST-74-AUX-UTILS.network-generator.sh b/test/units/TEST-74-AUX-UTILS.network-generator.sh index 5b5b0a13a39..44912b2a0f3 100755 --- a/test/units/TEST-74-AUX-UTILS.network-generator.sh +++ b/test/units/TEST-74-AUX-UTILS.network-generator.sh @@ -15,12 +15,12 @@ at_exit() { trap at_exit EXIT mkdir -p /run/credstore -cat > /run/credstore/network.conf.50-testme </run/credstore/network.conf.50-testme < /run/credstore/network.network.50-testme </run/credstore/network.network.50-testme < /tmp/describe1.json -varlinkctl --exec call /run/systemd/io.systemd.Hostname io.systemd.Hostname.Describe '{}' -- jq > /tmp/describe2.json +varlinkctl call /run/systemd/io.systemd.Hostname io.systemd.Hostname.Describe '{}' | jq >/tmp/describe1.json +varlinkctl --exec call /run/systemd/io.systemd.Hostname io.systemd.Hostname.Describe '{}' -- jq >/tmp/describe2.json cmp /tmp/describe1.json /tmp/describe2.json rm /tmp/describe1.json /tmp/describe2.json diff --git a/test/units/TEST-75-RESOLVED.sh b/test/units/TEST-75-RESOLVED.sh index 4d2257d6e0f..b2dbd2d1b18 100755 --- a/test/units/TEST-75-RESOLVED.sh +++ b/test/units/TEST-75-RESOLVED.sh @@ -817,7 +817,7 @@ testcase_09_resolvectl_showcache() { echo "[NetDev]" echo "Name=dns2" echo "Kind=dummy" - } > /run/systemd/network/10-dns2.netdev + } >/run/systemd/network/10-dns2.netdev { echo "[Match]" echo "Name=dns2" @@ -825,7 +825,7 @@ testcase_09_resolvectl_showcache() { echo "IPv6AcceptRA=no" echo "Address=10.123.0.1/24" echo "DNS=10.0.0.1" - } > /run/systemd/network/10-dns2.network + } >/run/systemd/network/10-dns2.network networkctl reload networkctl reconfigure dns2 @@ -834,7 +834,7 @@ testcase_09_resolvectl_showcache() { echo "[Resolve]" echo "DNSSEC=no" echo "DNSOverTLS=no" - } > /run/systemd/resolved.conf.d/90-resolved.conf + } >/run/systemd/resolved.conf.d/90-resolved.conf systemctl reload systemd-resolved.service test "$(resolvectl show-cache --json=short | jq -rc '.[] | select(.ifname == "dns2" and .protocol == "dns") | .dnssec')" == 'no' @@ -844,7 +844,7 @@ testcase_09_resolvectl_showcache() { echo "[Resolve]" echo "DNSSEC=allow-downgrade" echo "DNSOverTLS=opportunistic" - } > /run/systemd/resolved.conf.d/90-resolved.conf + } >/run/systemd/resolved.conf.d/90-resolved.conf systemctl reload systemd-resolved.service test "$(resolvectl show-cache --json=short | jq -rc '.[] | select(.ifname == "dns2" and .protocol == "dns") | .dnssec')" == 'allow-downgrade' diff --git a/test/units/TEST-80-NOTIFYACCESS.sh b/test/units/TEST-80-NOTIFYACCESS.sh index 22a5a3af80d..bac4af1988a 100755 --- a/test/units/TEST-80-NOTIFYACCESS.sh +++ b/test/units/TEST-80-NOTIFYACCESS.sh @@ -15,7 +15,7 @@ sync_in() { } sync_out() { - echo "$1" > /tmp/syncfifo2 + echo "$1" >/tmp/syncfifo2 } export SYSTEMD_LOG_LEVEL=debug diff --git a/test/units/TEST-87-AUX-UTILS-VM.validatefs.sh b/test/units/TEST-87-AUX-UTILS-VM.validatefs.sh index 86120975be7..f3f06137780 100755 --- a/test/units/TEST-87-AUX-UTILS-VM.validatefs.sh +++ b/test/units/TEST-87-AUX-UTILS-VM.validatefs.sh @@ -28,14 +28,14 @@ at_exit() { trap at_exit EXIT mkdir /tmp/validatefs-test -cat > /tmp/validatefs-test/validatefs-root.conf </tmp/validatefs-test/validatefs-root.conf < /tmp/validatefs-test/validatefs-usr.conf </tmp/validatefs-test/validatefs-usr.conf < /tmp/validatefs-test/validatefs-usr-verity.conf </tmp/validatefs-test/validatefs-usr-verity.conf < /tmp/validatefs-test/validatefs-home.conf </tmp/validatefs-test/validatefs-home.conf < /tmp/validatefs-test/validatefs-esp.conf </tmp/validatefs-test/validatefs-esp.conf < /tmp/validatefs-test/validatefs-generic.conf </tmp/validatefs-test/validatefs-generic.conf <