2010-08-14 21:59:25 +04:00
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2010-03-31 18:29:55 +04:00
/***
This file is part of systemd .
Copyright 2010 Lennart Poettering
systemd is free software ; you can redistribute it and / or modify it
under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
systemd is distributed in the hope that it will be useful , but
WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the GNU
General Public License for more details .
You should have received a copy of the GNU General Public License
along with systemd ; If not , see < http : //www.gnu.org/licenses/>.
* * */
# include <sys/mount.h>
# include <errno.h>
# include <sys/stat.h>
# include <stdlib.h>
# include <string.h>
# include <libgen.h>
# include <assert.h>
2010-10-27 07:47:48 +04:00
# include <unistd.h>
2010-11-08 06:59:39 +03:00
# include <ftw.h>
2010-03-31 18:29:55 +04:00
# include "mount-setup.h"
# include "log.h"
2010-04-08 03:43:07 +04:00
# include "macro.h"
# include "util.h"
2010-09-15 03:38:07 +04:00
# include "label.h"
2010-03-31 18:29:55 +04:00
2011-01-04 03:58:38 +03:00
# ifndef TTY_GID
# define TTY_GID 5
# endif
2010-04-12 23:58:01 +04:00
typedef struct MountPoint {
const char * what ;
const char * where ;
const char * type ;
const char * options ;
unsigned long flags ;
2010-04-17 01:22:32 +04:00
bool fatal ;
2010-04-12 23:58:01 +04:00
} MountPoint ;
static const MountPoint mount_table [ ] = {
2010-08-25 06:58:16 +04:00
{ " proc " , " /proc " , " proc " , NULL , MS_NOSUID | MS_NOEXEC | MS_NODEV , true } ,
{ " sysfs " , " /sys " , " sysfs " , NULL , MS_NOSUID | MS_NOEXEC | MS_NODEV , true } ,
{ " devtmpfs " , " /dev " , " devtmpfs " , " mode=755 " , MS_NOSUID , true } ,
2010-12-24 00:33:24 +03:00
{ " tmpfs " , " /dev/shm " , " tmpfs " , " mode=1777 " , MS_NOSUID | MS_NODEV , true } ,
2011-01-04 03:58:38 +03:00
{ " devpts " , " /dev/pts " , " devpts " , " mode=620,gid= " STRINGIFY ( TTY_GID ) , MS_NOSUID | MS_NOEXEC , false } ,
2011-03-25 07:07:20 +03:00
{ " tmpfs " , " /run " , " tmpfs " , " mode=755 " , MS_NOSUID | MS_NOEXEC | MS_NODEV , true } ,
2011-04-13 00:15:59 +04:00
{ " tmpfs " , " /sys/fs/cgroup " , " tmpfs " , " mode=755 " , MS_NOSUID | MS_NOEXEC | MS_NODEV , false } ,
{ " cgroup " , " /sys/fs/cgroup/systemd " , " cgroup " , " none,name=systemd " , MS_NOSUID | MS_NOEXEC | MS_NODEV , false } ,
2010-03-31 18:29:55 +04:00
} ;
2010-07-16 04:56:57 +04:00
/* These are API file systems that might be mounted by other software,
2010-11-25 00:27:45 +03:00
* we just list them here so that we know that we should ignore them */
2010-07-16 04:56:57 +04:00
static const char * const ignore_paths [ ] = {
" /selinux " ,
" /proc/bus/usb " ,
" /var/lib/nfs/rpc_pipefs " ,
" /proc/fs/nfsd "
} ;
2010-04-10 19:42:00 +04:00
bool mount_point_is_api ( const char * path ) {
unsigned i ;
/* Checks if this mount point is considered "API", and hence
* should be ignored */
2010-04-12 23:58:01 +04:00
for ( i = 0 ; i < ELEMENTSOF ( mount_table ) ; i + + )
2010-08-20 05:26:15 +04:00
if ( path_equal ( path , mount_table [ i ] . where ) )
2010-04-10 19:42:00 +04:00
return true ;
2010-11-11 13:15:16 +03:00
return path_startswith ( path , " /sys/fs/cgroup/ " ) ;
}
bool mount_point_ignore ( const char * path ) {
2010-11-25 00:27:45 +03:00
unsigned i ;
2010-11-11 13:15:16 +03:00
2010-07-16 04:56:57 +04:00
for ( i = 0 ; i < ELEMENTSOF ( ignore_paths ) ; i + + )
2010-08-20 05:26:15 +04:00
if ( path_equal ( path , ignore_paths [ i ] ) )
2010-07-16 04:56:57 +04:00
return true ;
2010-11-11 13:15:16 +03:00
return false ;
2010-04-10 19:42:00 +04:00
}
2010-04-12 23:58:01 +04:00
static int mount_one ( const MountPoint * p ) {
2010-03-31 18:29:55 +04:00
int r ;
2010-04-12 23:58:01 +04:00
assert ( p ) ;
2010-03-31 18:29:55 +04:00
2011-04-07 01:38:01 +04:00
/* Relabel first, just in case */
label_fix ( p - > where , true ) ;
2010-04-17 01:24:39 +04:00
if ( ( r = path_is_mount_point ( p - > where ) ) < 0 )
2010-03-31 18:29:55 +04:00
return r ;
if ( r > 0 )
2011-04-07 01:38:01 +04:00
return 0 ;
2010-03-31 18:29:55 +04:00
2010-04-06 23:55:58 +04:00
/* The access mode here doesn't really matter too much, since
* the mounted file system will take precedence anyway . */
2010-04-12 23:58:01 +04:00
mkdir_p ( p - > where , 0755 ) ;
2010-04-06 23:55:58 +04:00
2010-03-31 18:29:55 +04:00
log_debug ( " Mounting %s to %s of type %s with options %s. " ,
2010-04-12 23:58:01 +04:00
p - > what ,
p - > where ,
p - > type ,
strna ( p - > options ) ) ;
if ( mount ( p - > what ,
p - > where ,
p - > type ,
p - > flags ,
p - > options ) < 0 ) {
log_error ( " Failed to mount %s: %s " , p - > where , strerror ( errno ) ) ;
2010-04-17 01:22:32 +04:00
return p - > fatal ? - errno : 0 ;
2010-03-31 18:29:55 +04:00
}
2011-04-07 01:38:01 +04:00
/* Relabel again, since we now mounted something fresh here */
2011-02-25 03:47:31 +03:00
label_fix ( p - > where , false ) ;
2010-09-15 03:38:07 +04:00
2010-03-31 18:29:55 +04:00
return 0 ;
}
2010-04-17 01:22:32 +04:00
static int mount_cgroup_controllers ( void ) {
int r ;
FILE * f ;
2011-04-07 20:48:50 +04:00
char buf [ LINE_MAX ] ;
2010-04-17 01:22:32 +04:00
2010-05-18 05:10:17 +04:00
/* Mount all available cgroup controllers that are built into the kernel. */
2010-04-17 01:22:32 +04:00
if ( ! ( f = fopen ( " /proc/cgroups " , " re " ) ) )
return - ENOENT ;
/* Ignore the header line */
2010-05-10 05:34:31 +04:00
( void ) fgets ( buf , sizeof ( buf ) , f ) ;
2010-04-17 01:22:32 +04:00
for ( ; ; ) {
MountPoint p ;
char * controller , * where ;
2010-11-22 00:29:10 +03:00
int enabled = false ;
2010-04-17 01:22:32 +04:00
2010-11-22 13:06:38 +03:00
if ( fscanf ( f , " %ms %*i %*i %i " , & controller , & enabled ) ! = 2 ) {
2010-04-17 01:22:32 +04:00
if ( feof ( f ) )
break ;
log_error ( " Failed to parse /proc/cgroups. " ) ;
r = - EIO ;
goto finish ;
}
2010-11-22 00:29:10 +03:00
if ( ! enabled ) {
free ( controller ) ;
continue ;
}
2010-08-25 06:58:16 +04:00
if ( asprintf ( & where , " /sys/fs/cgroup/%s " , controller ) < 0 ) {
2010-04-17 01:22:32 +04:00
free ( controller ) ;
r = - ENOMEM ;
goto finish ;
}
zero ( p ) ;
p . what = " cgroup " ;
p . where = where ;
p . type = " cgroup " ;
p . options = controller ;
p . flags = MS_NOSUID | MS_NOEXEC | MS_NODEV ;
p . fatal = false ;
r = mount_one ( & p ) ;
free ( controller ) ;
free ( where ) ;
if ( r < 0 )
goto finish ;
}
r = 0 ;
finish :
fclose ( f ) ;
return r ;
}
2010-10-27 07:47:48 +04:00
static int symlink_and_label ( const char * old_path , const char * new_path ) {
int r ;
assert ( old_path ) ;
assert ( new_path ) ;
if ( ( r = label_symlinkfile_set ( new_path ) ) < 0 )
return r ;
if ( symlink ( old_path , new_path ) < 0 )
r = - errno ;
label_file_clear ( ) ;
return r ;
}
2010-11-08 06:59:39 +03:00
static int nftw_cb (
const char * fpath ,
const struct stat * sb ,
int tflag ,
struct FTW * ftwbuf ) {
2010-11-11 03:22:42 +03:00
/* No need to label /dev twice in a row... */
if ( ftwbuf - > level = = 0 )
return 0 ;
2011-02-25 03:47:31 +03:00
label_fix ( fpath , true ) ;
2010-11-08 06:59:39 +03:00
return 0 ;
} ;
2010-03-31 18:29:55 +04:00
int mount_setup ( void ) {
2010-10-27 07:47:48 +04:00
2010-11-18 21:23:17 +03:00
const char symlinks [ ] =
2010-10-27 07:47:48 +04:00
" /proc/kcore \0 " " /dev/core \0 "
" /proc/self/fd \0 " " /dev/fd \0 "
" /proc/self/fd/0 \0 " " /dev/stdin \0 "
" /proc/self/fd/1 \0 " " /dev/stdout \0 "
2011-03-09 21:48:02 +03:00
" /proc/self/fd/2 \0 " " /dev/stderr \0 " ;
2010-10-27 07:47:48 +04:00
2010-03-31 18:29:55 +04:00
int r ;
2010-04-10 19:42:00 +04:00
unsigned i ;
2010-10-27 07:47:48 +04:00
const char * j , * k ;
2010-03-31 18:29:55 +04:00
2010-04-12 23:58:01 +04:00
for ( i = 0 ; i < ELEMENTSOF ( mount_table ) ; i + + )
if ( ( r = mount_one ( mount_table + i ) ) < 0 )
2010-03-31 18:29:55 +04:00
return r ;
2011-04-07 23:22:41 +04:00
/* Nodes in devtmpfs and /run need to be manually updated for
* the appropriate labels , after mounting . The other virtual
* API file systems like / sys and / proc do not need that , they
* use the same label for all their files . */
2011-04-04 18:56:51 +04:00
if ( unlink ( " /dev/.systemd-relabel-run-dev " ) > = 0 ) {
2010-11-08 06:59:39 +03:00
nftw ( " /dev " , nftw_cb , 64 , FTW_MOUNT | FTW_PHYS ) ;
2011-04-04 18:56:51 +04:00
nftw ( " /run " , nftw_cb , 64 , FTW_MOUNT | FTW_PHYS ) ;
}
2010-11-08 06:59:39 +03:00
2010-10-27 07:47:48 +04:00
/* Create a few default symlinks, which are normally created
2011-04-07 23:22:41 +04:00
* by udevd , but some scripts might need them before we start
2010-10-27 07:47:48 +04:00
* udevd . */
NULSTR_FOREACH_PAIR ( j , k , symlinks )
symlink_and_label ( j , k ) ;
2011-03-10 00:45:47 +03:00
/* Create a few directories we always want around */
2011-03-25 07:07:20 +03:00
mkdir ( " /run/systemd " , 0755 ) ;
2011-03-10 00:45:47 +03:00
2010-04-17 01:22:32 +04:00
return mount_cgroup_controllers ( ) ;
2010-03-31 18:29:55 +04:00
}