2 This file is part of systemd.
4 Copyright 2012 Lennart Poettering
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
26 #include "alloc-util.h"
29 #include "fstab-util.h"
30 #include "generator.h"
33 #include "mount-setup.h"
34 #include "mount-util.h"
35 #include "parse-util.h"
36 #include "path-util.h"
37 #include "proc-cmdline.h"
39 #include "stat-util.h"
40 #include "string-util.h"
42 #include "unit-name.h"
45 #include "volatile-util.h"
47 static const char *arg_dest
= "/tmp";
48 static const char *arg_dest_late
= "/tmp";
49 static bool arg_fstab_enabled
= true;
50 static char *arg_root_what
= NULL
;
51 static char *arg_root_fstype
= NULL
;
52 static char *arg_root_options
= NULL
;
53 static char *arg_root_hash
= NULL
;
54 static int arg_root_rw
= -1;
55 static char *arg_usr_what
= NULL
;
56 static char *arg_usr_fstype
= NULL
;
57 static char *arg_usr_options
= NULL
;
58 static VolatileMode arg_volatile_mode
= _VOLATILE_MODE_INVALID
;
60 static int write_options(FILE *f
, const char *options
) {
61 _cleanup_free_
char *o
= NULL
;
66 if (streq(options
, "defaults"))
69 o
= strreplace(options
, "%", "%%");
73 fprintf(f
, "Options=%s\n", o
);
77 static int write_what(FILE *f
, const char *what
) {
78 _cleanup_free_
char *w
= NULL
;
80 w
= strreplace(what
, "%", "%%");
84 fprintf(f
, "What=%s\n", w
);
94 _cleanup_free_
char *name
= NULL
, *unit
= NULL
;
95 _cleanup_fclose_
FILE *f
= NULL
;
101 if (access("/proc/swaps", F_OK
) < 0) {
102 log_info("Swap not supported, ignoring fstab swap entry for %s.", what
);
106 if (detect_container() > 0) {
107 log_info("Running in a container, ignoring fstab swap entry for %s.", what
);
111 r
= unit_name_from_path(what
, ".swap", &name
);
113 return log_error_errno(r
, "Failed to generate unit name: %m");
115 unit
= strjoin(arg_dest
, "/", name
);
119 f
= fopen(unit
, "wxe");
121 return log_error_errno(errno
,
123 "Failed to create swap unit file %s, as it already exists. Duplicate entry in /etc/fstab?" :
124 "Failed to create unit file %s: %m",
127 fputs("# Automatically generated by systemd-fstab-generator\n\n"
129 "SourcePath=/etc/fstab\n"
130 "Documentation=man:fstab(5) man:systemd-fstab-generator(8)\n\n"
133 r
= write_what(f
, what
);
137 r
= write_options(f
, me
->mnt_opts
);
141 r
= fflush_and_check(f
);
143 return log_error_errno(r
, "Failed to write unit file %s: %m", unit
);
145 /* use what as where, to have a nicer error message */
146 r
= generator_write_timeouts(arg_dest
, what
, what
, me
->mnt_opts
, NULL
);
151 r
= generator_add_symlink(arg_dest
, SPECIAL_SWAP_TARGET
,
152 nofail
? "wants" : "requires", name
);
160 static bool mount_is_network(struct mntent
*me
) {
163 return fstab_test_option(me
->mnt_opts
, "_netdev\0") ||
164 fstype_is_network(me
->mnt_type
);
167 static bool mount_in_initrd(struct mntent
*me
) {
170 return fstab_test_option(me
->mnt_opts
, "x-initrd.mount\0") ||
171 streq(me
->mnt_dir
, "/usr");
174 static int write_timeout(FILE *f
, const char *where
, const char *opts
,
175 const char *filter
, const char *variable
) {
176 _cleanup_free_
char *timeout
= NULL
;
177 char timespan
[FORMAT_TIMESPAN_MAX
];
181 r
= fstab_filter_options(opts
, filter
, NULL
, &timeout
, NULL
);
183 return log_warning_errno(r
, "Failed to parse options: %m");
187 r
= parse_sec_fix_0(timeout
, &u
);
189 log_warning("Failed to parse timeout for %s, ignoring: %s", where
, timeout
);
193 fprintf(f
, "%s=%s\n", variable
, format_timespan(timespan
, sizeof(timespan
), u
, 0));
198 static int write_idle_timeout(FILE *f
, const char *where
, const char *opts
) {
199 return write_timeout(f
, where
, opts
,
200 "x-systemd.idle-timeout\0", "TimeoutIdleSec");
203 static int write_mount_timeout(FILE *f
, const char *where
, const char *opts
) {
204 return write_timeout(f
, where
, opts
,
205 "x-systemd.mount-timeout\0", "TimeoutSec");
208 static int write_dependency(FILE *f
, const char *opts
,
209 const char *filter
, const char *format
) {
210 _cleanup_strv_free_
char **names
= NULL
, **units
= NULL
;
211 _cleanup_free_
char *res
= NULL
;
218 r
= fstab_extract_values(opts
, filter
, &names
);
220 return log_warning_errno(r
, "Failed to parse options: %m");
224 STRV_FOREACH(s
, names
) {
227 r
= unit_name_mangle_with_suffix(*s
, UNIT_NAME_NOGLOB
, ".mount", &x
);
229 return log_error_errno(r
, "Failed to generate unit name: %m");
230 r
= strv_consume(&units
, x
);
236 res
= strv_join(units
, " ");
239 #pragma GCC diagnostic push
240 #pragma GCC diagnostic ignored "-Wformat-nonliteral"
241 fprintf(f
, format
, res
);
242 #pragma GCC diagnostic pop
248 static int write_after(FILE *f
, const char *opts
) {
249 return write_dependency(f
, opts
, "x-systemd.after", "After=%1$s\n");
252 static int write_requires_after(FILE *f
, const char *opts
) {
253 return write_dependency(f
, opts
,
254 "x-systemd.requires", "After=%1$s\nRequires=%1$s\n");
257 static int write_before(FILE *f
, const char *opts
) {
258 return write_dependency(f
, opts
,
259 "x-systemd.before", "Before=%1$s\n");
262 static int write_requires_mounts_for(FILE *f
, const char *opts
) {
263 _cleanup_strv_free_
char **paths
= NULL
;
264 _cleanup_free_
char *res
= NULL
;
270 r
= fstab_extract_values(opts
, "x-systemd.requires-mounts-for", &paths
);
272 return log_warning_errno(r
, "Failed to parse options: %m");
276 res
= strv_join(paths
, " ");
280 fprintf(f
, "RequiresMountsFor=%s\n", res
);
285 static int add_mount(
296 const char *source
) {
299 *name
= NULL
, *unit
= NULL
,
300 *automount_name
= NULL
, *automount_unit
= NULL
,
302 _cleanup_fclose_
FILE *f
= NULL
;
311 if (streq_ptr(fstype
, "autofs"))
314 if (!is_path(where
)) {
315 log_warning("Mount point %s is not a valid path, ignoring.", where
);
319 if (mount_point_is_api(where
) ||
320 mount_point_ignore(where
))
323 if (path_equal(where
, "/")) {
325 log_warning("Ignoring \"noauto\" for root device");
327 log_warning("Ignoring \"nofail\" for root device");
329 log_warning("Ignoring automount option for root device");
331 noauto
= nofail
= automount
= false;
334 r
= unit_name_from_path(where
, ".mount", &name
);
336 return log_error_errno(r
, "Failed to generate unit name: %m");
338 unit
= strjoin(dest
, "/", name
);
342 f
= fopen(unit
, "wxe");
344 return log_error_errno(errno
,
346 "Failed to create mount unit file %s, as it already exists. Duplicate entry in /etc/fstab?" :
347 "Failed to create unit file %s: %m",
351 "# Automatically generated by systemd-fstab-generator\n\n"
354 "Documentation=man:fstab(5) man:systemd-fstab-generator(8)\n",
357 if (STRPTR_IN_SET(fstype
, "nfs", "nfs4") && !automount
&&
358 fstab_test_yes_no_option(opts
, "bg\0" "fg\0")) {
359 /* The default retry timeout that mount.nfs uses for 'bg' mounts
360 * is 10000 minutes, where as it uses 2 minutes for 'fg' mounts.
361 * As we are making 'bg' mounts look like an 'fg' mount to
362 * mount.nfs (so systemd can manage the job-control aspects of 'bg'),
363 * we need to explicitly preserve that default, and also ensure
364 * the systemd mount-timeout doesn't interfere.
365 * By placing these options first, they can be over-ridden by
366 * settings in /etc/fstab. */
367 opts
= strjoina("x-systemd.mount-timeout=infinity,retry=10000,", opts
, ",fg");
371 if (!nofail
&& !automount
)
372 fprintf(f
, "Before=%s\n", post
);
374 if (!automount
&& opts
) {
375 r
= write_after(f
, opts
);
378 r
= write_requires_after(f
, opts
);
381 r
= write_before(f
, opts
);
384 r
= write_requires_mounts_for(f
, opts
);
390 r
= generator_write_fsck_deps(f
, dest
, what
, where
, fstype
);
401 r
= write_what(f
, what
);
405 if (!isempty(fstype
) && !streq(fstype
, "auto"))
406 fprintf(f
, "Type=%s\n", fstype
);
408 r
= generator_write_timeouts(dest
, what
, where
, opts
, &filtered
);
412 r
= generator_write_device_deps(dest
, what
, where
, opts
);
416 r
= write_mount_timeout(f
, where
, opts
);
420 r
= write_options(f
, filtered
);
424 r
= fflush_and_check(f
);
426 return log_error_errno(r
, "Failed to write unit file %s: %m", unit
);
428 if (!noauto
&& !automount
) {
429 r
= generator_add_symlink(dest
, post
,
430 nofail
? "wants" : "requires", name
);
436 r
= unit_name_from_path(where
, ".automount", &automount_name
);
438 return log_error_errno(r
, "Failed to generate unit name: %m");
440 automount_unit
= strjoin(dest
, "/", automount_name
);
445 f
= fopen(automount_unit
, "wxe");
447 return log_error_errno(errno
, "Failed to create unit file %s: %m", automount_unit
);
450 "# Automatically generated by systemd-fstab-generator\n\n"
453 "Documentation=man:fstab(5) man:systemd-fstab-generator(8)\n",
456 fprintf(f
, "Before=%s\n", post
);
459 r
= write_after(f
, opts
);
462 r
= write_requires_after(f
, opts
);
465 r
= write_before(f
, opts
);
468 r
= write_requires_mounts_for(f
, opts
);
479 r
= write_idle_timeout(f
, where
, opts
);
483 r
= fflush_and_check(f
);
485 return log_error_errno(r
, "Failed to write unit file %s: %m", automount_unit
);
487 r
= generator_add_symlink(dest
, post
,
488 nofail
? "wants" : "requires", automount_name
);
496 static int parse_fstab(bool initrd
) {
497 _cleanup_endmntent_
FILE *f
= NULL
;
498 const char *fstab_path
;
502 fstab_path
= initrd
? "/sysroot/etc/fstab" : "/etc/fstab";
503 f
= setmntent(fstab_path
, "re");
508 return log_error_errno(errno
, "Failed to open %s: %m", fstab_path
);
511 while ((me
= getmntent(f
))) {
512 _cleanup_free_
char *where
= NULL
, *what
= NULL
;
516 if (initrd
&& !mount_in_initrd(me
))
519 what
= fstab_node_to_udev_node(me
->mnt_fsname
);
523 if (is_device_path(what
) && path_is_read_only_fs("sys") > 0) {
524 log_info("Running in a container, ignoring fstab device entry for %s.", what
);
528 where
= initrd
? strappend("/sysroot/", me
->mnt_dir
) : strdup(me
->mnt_dir
);
533 path_kill_slashes(where
);
535 noauto
= fstab_test_yes_no_option(me
->mnt_opts
, "noauto\0" "auto\0");
536 nofail
= fstab_test_yes_no_option(me
->mnt_opts
, "nofail\0" "fail\0");
537 log_debug("Found entry what=%s where=%s type=%s nofail=%s noauto=%s",
538 what
, where
, me
->mnt_type
,
539 yes_no(noauto
), yes_no(nofail
));
541 if (streq(me
->mnt_type
, "swap"))
542 k
= add_swap(what
, me
, noauto
, nofail
);
547 automount
= fstab_test_option(me
->mnt_opts
,
548 "comment=systemd.automount\0"
549 "x-systemd.automount\0");
551 post
= SPECIAL_INITRD_FS_TARGET
;
552 else if (mount_is_network(me
))
553 post
= SPECIAL_REMOTE_FS_TARGET
;
555 post
= SPECIAL_LOCAL_FS_TARGET
;
557 k
= add_mount(arg_dest
,
577 static int add_sysroot_mount(void) {
578 _cleanup_free_
char *what
= NULL
;
582 if (isempty(arg_root_what
)) {
583 log_debug("Could not find a root= entry on the kernel command line.");
587 if (streq(arg_root_what
, "gpt-auto")) {
588 /* This is handled by the gpt-auto generator */
589 log_debug("Skipping root directory handling, as gpt-auto was requested.");
593 if (path_equal(arg_root_what
, "/dev/nfs")) {
594 /* This is handled by the kernel or the initrd */
595 log_debug("Skipping root directory handling, as /dev/nfs was requested.");
599 what
= fstab_node_to_udev_node(arg_root_what
);
603 if (!arg_root_options
)
604 opts
= arg_root_rw
> 0 ? "rw" : "ro";
605 else if (arg_root_rw
>= 0 ||
606 !fstab_test_option(arg_root_options
, "ro\0" "rw\0"))
607 opts
= strjoina(arg_root_options
, ",", arg_root_rw
> 0 ? "rw" : "ro");
609 opts
= arg_root_options
;
611 log_debug("Found entry what=%s where=/sysroot type=%s", what
, strna(arg_root_fstype
));
613 if (is_device_path(what
)) {
614 r
= generator_write_initrd_root_device_deps(arg_dest
, what
);
619 return add_mount(arg_dest
,
624 is_device_path(what
) ? 1 : 0, /* passno */
625 false, /* noauto off */
626 false, /* nofail off */
627 false, /* automount off */
628 SPECIAL_INITRD_ROOT_FS_TARGET
,
632 static int add_sysroot_usr_mount(void) {
633 _cleanup_free_
char *what
= NULL
;
636 if (!arg_usr_what
&& !arg_usr_fstype
&& !arg_usr_options
)
639 if (arg_root_what
&& !arg_usr_what
) {
640 /* Copy over the root device, in case the /usr mount just differs in a mount option (consider btrfs subvolumes) */
641 arg_usr_what
= strdup(arg_root_what
);
646 if (arg_root_fstype
&& !arg_usr_fstype
) {
647 arg_usr_fstype
= strdup(arg_root_fstype
);
652 if (arg_root_options
&& !arg_usr_options
) {
653 arg_usr_options
= strdup(arg_root_options
);
654 if (!arg_usr_options
)
661 what
= fstab_node_to_udev_node(arg_usr_what
);
665 if (!arg_usr_options
)
666 opts
= arg_root_rw
> 0 ? "rw" : "ro";
667 else if (!fstab_test_option(arg_usr_options
, "ro\0" "rw\0"))
668 opts
= strjoina(arg_usr_options
, ",", arg_root_rw
> 0 ? "rw" : "ro");
670 opts
= arg_usr_options
;
672 log_debug("Found entry what=%s where=/sysroot/usr type=%s", what
, strna(arg_usr_fstype
));
673 return add_mount(arg_dest
,
678 is_device_path(what
) ? 1 : 0, /* passno */
679 false, /* noauto off */
680 false, /* nofail off */
681 false, /* automount off */
682 SPECIAL_INITRD_FS_TARGET
,
686 static int add_volatile_root(void) {
687 const char *from
, *to
;
689 if (arg_volatile_mode
!= VOLATILE_YES
)
692 /* Let's add in systemd-remount-volatile.service which will remount the root device to tmpfs if this is
693 * requested, leaving only /usr from the root mount inside. */
695 from
= strjoina(SYSTEM_DATA_UNIT_PATH
"/systemd-volatile-root.service");
696 to
= strjoina(arg_dest
, "/" SPECIAL_INITRD_ROOT_FS_TARGET
, ".requires/systemd-volatile-root.service");
698 (void) mkdir_parents(to
, 0755);
700 if (symlink(from
, to
) < 0)
701 return log_error_errno(errno
, "Failed to hook in volatile remount service: %m");
706 static int add_volatile_var(void) {
708 if (arg_volatile_mode
!= VOLATILE_STATE
)
711 /* If requested, mount /var as tmpfs, but do so only if there's nothing else defined for this. */
713 return add_mount(arg_dest_late
,
722 SPECIAL_LOCAL_FS_TARGET
,
726 static int parse_proc_cmdline_item(const char *key
, const char *value
, void *data
) {
729 /* root=, usr=, usrfstype= and roofstype= may occur more than once, the last
730 * instance should take precedence. In the case of multiple rootflags=
731 * or usrflags= the arguments should be concatenated */
733 if (STR_IN_SET(key
, "fstab", "rd.fstab")) {
735 r
= value
? parse_boolean(value
) : 1;
737 log_warning("Failed to parse fstab switch %s. Ignoring.", value
);
739 arg_fstab_enabled
= r
;
741 } else if (streq(key
, "root")) {
743 if (proc_cmdline_value_missing(key
, value
))
746 if (free_and_strdup(&arg_root_what
, value
) < 0)
749 } else if (streq(key
, "rootfstype")) {
751 if (proc_cmdline_value_missing(key
, value
))
754 if (free_and_strdup(&arg_root_fstype
, value
) < 0)
757 } else if (streq(key
, "rootflags")) {
760 if (proc_cmdline_value_missing(key
, value
))
763 o
= arg_root_options
?
764 strjoin(arg_root_options
, ",", value
) :
769 free(arg_root_options
);
770 arg_root_options
= o
;
771 } else if (streq(key
, "roothash")) {
773 if (proc_cmdline_value_missing(key
, value
))
776 if (free_and_strdup(&arg_root_hash
, value
) < 0)
779 } else if (streq(key
, "mount.usr")) {
781 if (proc_cmdline_value_missing(key
, value
))
784 if (free_and_strdup(&arg_usr_what
, value
) < 0)
787 } else if (streq(key
, "mount.usrfstype")) {
789 if (proc_cmdline_value_missing(key
, value
))
792 if (free_and_strdup(&arg_usr_fstype
, value
) < 0)
795 } else if (streq(key
, "mount.usrflags")) {
798 if (proc_cmdline_value_missing(key
, value
))
801 o
= arg_usr_options
?
802 strjoin(arg_usr_options
, ",", value
) :
807 free(arg_usr_options
);
810 } else if (streq(key
, "rw") && !value
)
812 else if (streq(key
, "ro") && !value
)
814 else if (streq(key
, "systemd.volatile")) {
818 m
= volatile_mode_from_string(value
);
820 log_warning("Failed to parse systemd.volatile= argument: %s", value
);
822 arg_volatile_mode
= m
;
824 arg_volatile_mode
= VOLATILE_YES
;
830 static int determine_root(void) {
831 /* If we have a root hash but no root device then Verity is used, and we use the "root" DM device as root. */
839 arg_root_what
= strdup("/dev/mapper/root");
843 log_info("Using verity root device %s.", arg_root_what
);
848 int main(int argc
, char *argv
[]) {
851 if (argc
> 1 && argc
!= 4) {
852 log_error("This program takes three or no arguments.");
859 arg_dest_late
= argv
[3];
861 log_set_target(LOG_TARGET_SAFE
);
862 log_parse_environment();
867 r
= proc_cmdline_parse(parse_proc_cmdline_item
, NULL
, 0);
869 log_warning_errno(r
, "Failed to parse kernel command line, ignoring: %m");
871 (void) determine_root();
873 /* Always honour root= and usr= in the kernel command line if we are in an initrd */
877 r
= add_sysroot_mount();
879 k
= add_sysroot_usr_mount();
883 k
= add_volatile_root();
887 r
= add_volatile_var();
889 /* Honour /etc/fstab only when that's enabled */
890 if (arg_fstab_enabled
) {
893 log_debug("Parsing /etc/fstab");
895 /* Parse the local /etc/fstab, possibly from the initrd */
896 k
= parse_fstab(false);
900 /* If running in the initrd also parse the /etc/fstab from the host */
902 log_debug("Parsing /sysroot/etc/fstab");
904 k
= parse_fstab(true);
911 free(arg_root_fstype
);
912 free(arg_root_options
);
916 free(arg_usr_fstype
);
917 free(arg_usr_options
);
919 return r
< 0 ? EXIT_FAILURE
: EXIT_SUCCESS
;