2020-11-09 05:23:58 +01:00
|
|
|
/* SPDX-License-Identifier: LGPL-2.1-or-later */
|
2015-10-26 18:44:13 +01:00
|
|
|
#pragma once
|
|
|
|
|
|
|
|
#include <mntent.h>
|
2015-11-30 21:43:37 +01:00
|
|
|
#include <stdio.h>
|
2020-06-27 10:38:07 +02:00
|
|
|
#include <unistd.h>
|
2015-10-27 13:45:00 +01:00
|
|
|
|
2020-11-27 00:34:51 +01:00
|
|
|
#include "alloc-util.h"
|
2020-06-27 10:38:07 +02:00
|
|
|
#include "errno-util.h"
|
2015-11-30 21:43:37 +01:00
|
|
|
#include "macro.h"
|
2015-10-26 18:44:13 +01:00
|
|
|
|
2020-07-24 22:05:21 +02:00
|
|
|
/* 4MB for contents of regular files, 64k inodes for directories, symbolic links and device specials, using
|
|
|
|
* large storage array systems as a baseline */
|
2020-04-14 15:39:36 +02:00
|
|
|
#define TMPFS_LIMITS_DEV ",size=4m,nr_inodes=64k"
|
2020-07-24 22:05:21 +02:00
|
|
|
|
2020-04-14 15:39:36 +02:00
|
|
|
/* Very little, if any use expected */
|
|
|
|
#define TMPFS_LIMITS_EMPTY_OR_ALMOST ",size=4m,nr_inodes=1k"
|
|
|
|
#define TMPFS_LIMITS_SYS TMPFS_LIMITS_EMPTY_OR_ALMOST
|
|
|
|
#define TMPFS_LIMITS_SYS_FS_CGROUP TMPFS_LIMITS_EMPTY_OR_ALMOST
|
2020-07-24 22:05:21 +02:00
|
|
|
|
|
|
|
/* On an extremely small device with only 256MB of RAM, 20% of RAM should be enough for the re-execution of
|
|
|
|
* PID1 because 16MB of free space is required. */
|
2020-05-15 17:33:45 +02:00
|
|
|
#define TMPFS_LIMITS_RUN ",size=20%,nr_inodes=800k"
|
2020-07-24 22:05:21 +02:00
|
|
|
|
2020-12-08 19:04:43 +01:00
|
|
|
/* The limit used for various nested tmpfs mounts, in particular for guests started by systemd-nspawn.
|
2020-07-24 22:05:21 +02:00
|
|
|
* 10% of RAM (using 16GB of RAM as a baseline) translates to 400k inodes (assuming 4k each) and 25%
|
|
|
|
* translates to 1M inodes.
|
2020-07-30 13:36:10 +02:00
|
|
|
* (On the host, /tmp is configured through a .mount unit file.) */
|
|
|
|
#define NESTED_TMPFS_LIMITS ",size=10%,nr_inodes=400k"
|
2020-07-24 22:05:21 +02:00
|
|
|
|
2020-05-15 17:33:45 +02:00
|
|
|
/* More space for volatile root and /var */
|
2020-04-14 15:39:36 +02:00
|
|
|
#define TMPFS_LIMITS_VAR ",size=25%,nr_inodes=1m"
|
|
|
|
#define TMPFS_LIMITS_ROOTFS TMPFS_LIMITS_VAR
|
|
|
|
#define TMPFS_LIMITS_VOLATILE_STATE TMPFS_LIMITS_VAR
|
|
|
|
|
2020-09-22 15:16:15 +02:00
|
|
|
int mount_fd(const char *source, int target_fd, const char *filesystemtype, unsigned long mountflags, const void *data);
|
|
|
|
int mount_nofollow(const char *source, const char *target, const char *filesystemtype, unsigned long mountflags, const void *data);
|
|
|
|
|
2015-10-27 14:25:58 +01:00
|
|
|
int repeat_unmount(const char *path, int flags);
|
2015-10-26 18:44:13 +01:00
|
|
|
int umount_recursive(const char *target, int flags);
|
2020-06-23 08:31:16 +02:00
|
|
|
int bind_remount_recursive(const char *prefix, unsigned long new_flags, unsigned long flags_mask, char **deny_list);
|
|
|
|
int bind_remount_recursive_with_mountinfo(const char *prefix, unsigned long new_flags, unsigned long flags_mask, char **deny_list, FILE *proc_self_mountinfo);
|
2020-01-09 15:06:06 +01:00
|
|
|
int bind_remount_one_with_mountinfo(const char *path, unsigned long new_flags, unsigned long flags_mask, FILE *proc_self_mountinfo);
|
2015-10-26 18:44:13 +01:00
|
|
|
|
|
|
|
int mount_move_root(const char *path);
|
|
|
|
|
|
|
|
DEFINE_TRIVIAL_CLEANUP_FUNC(FILE*, endmntent);
|
|
|
|
#define _cleanup_endmntent_ _cleanup_(endmntentp)
|
2015-10-27 13:45:00 +01:00
|
|
|
|
2020-09-22 15:51:17 +02:00
|
|
|
int mount_verbose_full(
|
nspawn,mount-util: add [u]mount_verbose and use it in nspawn
This makes it easier to debug failed nspawn invocations:
Mounting sysfs on /var/lib/machines/fedora-rawhide/sys (MS_RDONLY|MS_NOSUID|MS_NOEXEC|MS_NODEV "")...
Mounting tmpfs on /var/lib/machines/fedora-rawhide/dev (MS_NOSUID|MS_STRICTATIME "mode=755,uid=1450901504,gid=1450901504")...
Mounting tmpfs on /var/lib/machines/fedora-rawhide/dev/shm (MS_NOSUID|MS_NODEV|MS_STRICTATIME "mode=1777,uid=1450901504,gid=1450901504")...
Mounting tmpfs on /var/lib/machines/fedora-rawhide/run (MS_NOSUID|MS_NODEV|MS_STRICTATIME "mode=755,uid=1450901504,gid=1450901504")...
Bind-mounting /sys/fs/selinux on /var/lib/machines/fedora-rawhide/sys/fs/selinux (MS_BIND "")...
Remounting /var/lib/machines/fedora-rawhide/sys/fs/selinux (MS_RDONLY|MS_NOSUID|MS_NOEXEC|MS_NODEV|MS_BIND|MS_REMOUNT "")...
Mounting proc on /proc (MS_NOSUID|MS_NOEXEC|MS_NODEV "")...
Bind-mounting /proc/sys on /proc/sys (MS_BIND "")...
Remounting /proc/sys (MS_RDONLY|MS_NOSUID|MS_NOEXEC|MS_NODEV|MS_BIND|MS_REMOUNT "")...
Bind-mounting /proc/sysrq-trigger on /proc/sysrq-trigger (MS_BIND "")...
Remounting /proc/sysrq-trigger (MS_RDONLY|MS_NOSUID|MS_NOEXEC|MS_NODEV|MS_BIND|MS_REMOUNT "")...
Mounting tmpfs on /tmp (MS_STRICTATIME "mode=1777,uid=0,gid=0")...
Mounting tmpfs on /sys/fs/cgroup (MS_NOSUID|MS_NOEXEC|MS_NODEV|MS_STRICTATIME "mode=755,uid=0,gid=0")...
Mounting cgroup on /sys/fs/cgroup/systemd (MS_NOSUID|MS_NOEXEC|MS_NODEV "none,name=systemd,xattr")...
Failed to mount cgroup on /sys/fs/cgroup/systemd (MS_NOSUID|MS_NOEXEC|MS_NODEV "none,name=systemd,xattr"): No such file or directory
2016-10-10 21:55:20 +02:00
|
|
|
int error_log_level,
|
|
|
|
const char *what,
|
|
|
|
const char *where,
|
|
|
|
const char *type,
|
|
|
|
unsigned long flags,
|
2020-09-22 15:51:17 +02:00
|
|
|
const char *options,
|
|
|
|
bool follow_symlink);
|
|
|
|
|
|
|
|
static inline int mount_follow_verbose(
|
|
|
|
int error_log_level,
|
|
|
|
const char *what,
|
|
|
|
const char *where,
|
|
|
|
const char *type,
|
|
|
|
unsigned long flags,
|
|
|
|
const char *options) {
|
|
|
|
return mount_verbose_full(error_log_level, what, where, type, flags, options, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int mount_nofollow_verbose(
|
|
|
|
int error_log_level,
|
|
|
|
const char *what,
|
|
|
|
const char *where,
|
|
|
|
const char *type,
|
|
|
|
unsigned long flags,
|
|
|
|
const char *options) {
|
|
|
|
return mount_verbose_full(error_log_level, what, where, type, flags, options, false);
|
|
|
|
}
|
|
|
|
|
2020-09-22 16:32:07 +02:00
|
|
|
int umount_verbose(
|
|
|
|
int error_log_level,
|
|
|
|
const char *where,
|
|
|
|
int flags);
|
2016-11-22 20:19:08 +01:00
|
|
|
|
2018-02-15 01:32:04 +01:00
|
|
|
int mount_option_mangle(
|
|
|
|
const char *options,
|
|
|
|
unsigned long mount_flags,
|
|
|
|
unsigned long *ret_mount_flags,
|
|
|
|
char **ret_remaining_options);
|
2018-08-13 10:59:44 +02:00
|
|
|
|
2019-11-19 23:24:52 +01:00
|
|
|
int mode_to_inaccessible_node(const char *runtime_dir, mode_t mode, char **dest);
|
2020-06-27 10:38:07 +02:00
|
|
|
|
|
|
|
/* Useful for usage with _cleanup_(), unmounts, removes a directory and frees the pointer */
|
2020-09-25 18:26:53 +02:00
|
|
|
static inline char* umount_and_rmdir_and_free(char *p) {
|
2020-06-27 10:38:07 +02:00
|
|
|
PROTECT_ERRNO;
|
|
|
|
(void) umount_recursive(p, 0);
|
|
|
|
(void) rmdir(p);
|
2020-11-27 00:34:51 +01:00
|
|
|
return mfree(p);
|
2020-06-27 10:38:07 +02:00
|
|
|
}
|
|
|
|
DEFINE_TRIVIAL_CLEANUP_FUNC(char*, umount_and_rmdir_and_free);
|