X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?a=blobdiff_plain;f=src%2Fmount-setup.c;h=b85ac6d3fe0db6d7356658c64dc52a2dcca5f355;hb=1888c9074ab1cb82c1719090561a31d7902df286;hp=fe99f58b6688daa7fb967265e2fca19a5301bf78;hpb=5c0532d1cc989d2f78d2cd4a18058daa58143705;p=elogind.git diff --git a/src/mount-setup.c b/src/mount-setup.c index fe99f58b6..b85ac6d3f 100644 --- a/src/mount-setup.c +++ b/src/mount-setup.c @@ -27,6 +27,7 @@ #include #include #include +#include #include "mount-setup.h" #include "log.h" @@ -47,14 +48,14 @@ static const MountPoint mount_table[] = { { "proc", "/proc", "proc", NULL, MS_NOSUID|MS_NOEXEC|MS_NODEV, true }, { "sysfs", "/sys", "sysfs", NULL, MS_NOSUID|MS_NOEXEC|MS_NODEV, true }, { "devtmpfs", "/dev", "devtmpfs", "mode=755", MS_NOSUID, true }, - { "tmpfs", "/dev/shm", "tmpfs", "mode=1777", MS_NOSUID|MS_NOEXEC|MS_NODEV, true }, + { "tmpfs", "/dev/shm", "tmpfs", "mode=1777", MS_NOSUID|MS_NODEV, true }, { "devpts", "/dev/pts", "devpts", NULL, MS_NOSUID|MS_NOEXEC, false }, { "tmpfs", "/sys/fs/cgroup", "tmpfs", "mode=755", MS_NOSUID|MS_NOEXEC|MS_NODEV, true }, { "cgroup", "/sys/fs/cgroup/systemd", "cgroup", "none,name=systemd", MS_NOSUID|MS_NOEXEC|MS_NODEV, true }, }; /* These are API file systems that might be mounted by other software, - * we just list them here so that we know that we should igore them */ + * we just list them here so that we know that we should ignore them */ static const char * const ignore_paths[] = { "/selinux", @@ -73,11 +74,17 @@ bool mount_point_is_api(const char *path) { if (path_equal(path, mount_table[i].where)) return true; + return path_startswith(path, "/sys/fs/cgroup/"); +} + +bool mount_point_ignore(const char *path) { + unsigned i; + for (i = 0; i < ELEMENTSOF(ignore_paths); i++) if (path_equal(path, ignore_paths[i])) return true; - return path_startswith(path, "/sys/fs/cgroup/"); + return false; } static int mount_one(const MountPoint *p) { @@ -131,8 +138,9 @@ static int mount_cgroup_controllers(void) { for (;;) { MountPoint p; char *controller, *where; + int enabled = false; - if (fscanf(f, "%ms %*i %*i %*i", &controller) != 1) { + if (fscanf(f, "%ms %*i %*i %i", &controller, &enabled) != 2) { if (feof(f)) break; @@ -142,6 +150,11 @@ static int mount_cgroup_controllers(void) { goto finish; } + if (!enabled) { + free(controller); + continue; + } + if (asprintf(&where, "/sys/fs/cgroup/%s", controller) < 0) { free(controller); r = -ENOMEM; @@ -189,9 +202,23 @@ static int symlink_and_label(const char *old_path, const char *new_path) { return r; } +static int nftw_cb( + const char *fpath, + const struct stat *sb, + int tflag, + struct FTW *ftwbuf) { + + /* No need to label /dev twice in a row... */ + if (ftwbuf->level == 0) + return 0; + + label_fix(fpath); + return 0; +}; + int mount_setup(void) { - const char *symlinks = + const char symlinks[] = "/proc/kcore\0" "/dev/core\0" "/proc/self/fd\0" "/dev/fd\0" "/proc/self/fd/0\0" "/dev/stdin\0" @@ -207,6 +234,13 @@ int mount_setup(void) { if ((r = mount_one(mount_table+i)) < 0) return r; + /* Nodes in devtmpfs need to be manually updated for the + * appropriate labels, after mounting. The other virtual API + * file systems do not need. */ + + if (unlink("/dev/.systemd/relabel-devtmpfs") >= 0) + nftw("/dev", nftw_cb, 64, FTW_MOUNT|FTW_PHYS); + /* Create a few default symlinks, which are normally created * bei udevd, but some scripts might need them before we start * udevd. */