From: Zbigniew Jędrzejewski-Szmek Date: Mon, 25 Feb 2019 14:37:40 +0000 (+0100) Subject: fuzz-unit-file: add some directives for stuff coverage reports as not covered X-Git-Tag: v242-rc1~243^2~1 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=4c4589227e103345dae5393b45b98696c7e739ad;p=thirdparty%2Fsystemd.git fuzz-unit-file: add some directives for stuff coverage reports as not covered Some of those directives appear in the corpus, but without arguments, so maybe the fuzzing libraries can't trigger the right cases. Let's help them. --- diff --git a/test/fuzz/fuzz-unit-file/systemd-machined.service b/test/fuzz/fuzz-unit-file/systemd-machined.service index 448f062ecf6..70b627c5f40 100644 --- a/test/fuzz/fuzz-unit-file/systemd-machined.service +++ b/test/fuzz/fuzz-unit-file/systemd-machined.service @@ -15,6 +15,14 @@ Documentation=https://www.freedesktop.org/wiki/Software/systemd/machined Wants=machine.slice After=machine.slice RequiresMountsFor=/var/lib/machines +ConditionNull=true +ConditionNull= +ConditionNull=|!false +OnFailureIsolate=false +FailureActionExitStatus=222 +FailureActionExitStatus= +SuccessActionExitStatus=0 +SuccessActionExitStatus= [Service] ExecStart=/usr/lib/systemd/systemd-machined @@ -32,3 +40,13 @@ IPAddressDeny=any # Note that machined cannot be placed in a mount namespace, since it # needs access to the host's mount namespace in order to implement the # "machinectl bind" operation. + +SELinuxContext=system_u:system_r:kernel_t:s0 +AppArmorProfile=profile +SELinuxContext=-system_u:system_r:kernel_t:s22 +AppArmorProfile=-profile +IODeviceLatencyTargetSec=/dev/sda 25ms +IODeviceLatencyTargetSec=/dev/sdb 2h +PIDFile=%t/mypid +PIDFile= +DisableControllers=