]>
Commit | Line | Data |
---|---|---|
db9ecf05 | 1 | /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
4349cd7c LP |
2 | #pragma once |
3 | ||
4349cd7c | 4 | #include <mntent.h> |
11c3a366 | 5 | #include <stdio.h> |
e49ee285 | 6 | #include <unistd.h> |
4e036b7a | 7 | |
75f79cd2 | 8 | #include "alloc-util.h" |
70599967 | 9 | #include "dissect-image.h" |
e49ee285 | 10 | #include "errno-util.h" |
11c3a366 | 11 | #include "macro.h" |
4349cd7c | 12 | |
362a55fc ZJS |
13 | /* 4MB for contents of regular files, 64k inodes for directories, symbolic links and device specials, using |
14 | * large storage array systems as a baseline */ | |
7d85383e | 15 | #define TMPFS_LIMITS_DEV ",size=4m,nr_inodes=64k" |
362a55fc | 16 | |
7d85383e TM |
17 | /* Very little, if any use expected */ |
18 | #define TMPFS_LIMITS_EMPTY_OR_ALMOST ",size=4m,nr_inodes=1k" | |
19 | #define TMPFS_LIMITS_SYS TMPFS_LIMITS_EMPTY_OR_ALMOST | |
20 | #define TMPFS_LIMITS_SYS_FS_CGROUP TMPFS_LIMITS_EMPTY_OR_ALMOST | |
362a55fc ZJS |
21 | |
22 | /* On an extremely small device with only 256MB of RAM, 20% of RAM should be enough for the re-execution of | |
23 | * PID1 because 16MB of free space is required. */ | |
b4e1563f | 24 | #define TMPFS_LIMITS_RUN ",size=20%,nr_inodes=800k" |
362a55fc | 25 | |
84f9a680 | 26 | /* The limit used for various nested tmpfs mounts, in particular for guests started by systemd-nspawn. |
362a55fc ZJS |
27 | * 10% of RAM (using 16GB of RAM as a baseline) translates to 400k inodes (assuming 4k each) and 25% |
28 | * translates to 1M inodes. | |
b67ec8e5 ZJS |
29 | * (On the host, /tmp is configured through a .mount unit file.) */ |
30 | #define NESTED_TMPFS_LIMITS ",size=10%,nr_inodes=400k" | |
362a55fc | 31 | |
b4e1563f | 32 | /* More space for volatile root and /var */ |
7d85383e TM |
33 | #define TMPFS_LIMITS_VAR ",size=25%,nr_inodes=1m" |
34 | #define TMPFS_LIMITS_ROOTFS TMPFS_LIMITS_VAR | |
35 | #define TMPFS_LIMITS_VOLATILE_STATE TMPFS_LIMITS_VAR | |
36 | ||
28126409 LP |
37 | int mount_fd(const char *source, int target_fd, const char *filesystemtype, unsigned long mountflags, const void *data); |
38 | int mount_nofollow(const char *source, const char *target, const char *filesystemtype, unsigned long mountflags, const void *data); | |
39 | ||
3f2c0bec | 40 | int repeat_unmount(const char *path, int flags); |
4349cd7c | 41 | int umount_recursive(const char *target, int flags); |
6b000af4 LP |
42 | int bind_remount_recursive(const char *prefix, unsigned long new_flags, unsigned long flags_mask, char **deny_list); |
43 | int bind_remount_recursive_with_mountinfo(const char *prefix, unsigned long new_flags, unsigned long flags_mask, char **deny_list, FILE *proc_self_mountinfo); | |
7cce68e1 | 44 | int bind_remount_one_with_mountinfo(const char *path, unsigned long new_flags, unsigned long flags_mask, FILE *proc_self_mountinfo); |
4349cd7c LP |
45 | |
46 | int mount_move_root(const char *path); | |
47 | ||
fd421c4a | 48 | DEFINE_TRIVIAL_CLEANUP_FUNC_FULL(FILE*, endmntent, NULL); |
4349cd7c | 49 | #define _cleanup_endmntent_ _cleanup_(endmntentp) |
4e036b7a | 50 | |
511a8cfe | 51 | int mount_verbose_full( |
60e76d48 ZJS |
52 | int error_log_level, |
53 | const char *what, | |
54 | const char *where, | |
55 | const char *type, | |
56 | unsigned long flags, | |
511a8cfe LP |
57 | const char *options, |
58 | bool follow_symlink); | |
59 | ||
60 | static inline int mount_follow_verbose( | |
61 | int error_log_level, | |
62 | const char *what, | |
63 | const char *where, | |
64 | const char *type, | |
65 | unsigned long flags, | |
66 | const char *options) { | |
67 | return mount_verbose_full(error_log_level, what, where, type, flags, options, true); | |
68 | } | |
69 | ||
70 | static inline int mount_nofollow_verbose( | |
71 | int error_log_level, | |
72 | const char *what, | |
73 | const char *where, | |
74 | const char *type, | |
75 | unsigned long flags, | |
76 | const char *options) { | |
77 | return mount_verbose_full(error_log_level, what, where, type, flags, options, false); | |
78 | } | |
79 | ||
30f5d104 LP |
80 | int umount_verbose( |
81 | int error_log_level, | |
82 | const char *where, | |
83 | int flags); | |
83555251 | 84 | |
9e7f941a YW |
85 | int mount_option_mangle( |
86 | const char *options, | |
87 | unsigned long mount_flags, | |
88 | unsigned long *ret_mount_flags, | |
89 | char **ret_remaining_options); | |
be1791ad | 90 | |
e5f10caf | 91 | int mode_to_inaccessible_node(const char *runtime_dir, mode_t mode, char **dest); |
e49ee285 LP |
92 | |
93 | /* Useful for usage with _cleanup_(), unmounts, removes a directory and frees the pointer */ | |
f93ba375 | 94 | static inline char* umount_and_rmdir_and_free(char *p) { |
e49ee285 LP |
95 | PROTECT_ERRNO; |
96 | (void) umount_recursive(p, 0); | |
97 | (void) rmdir(p); | |
75f79cd2 | 98 | return mfree(p); |
e49ee285 LP |
99 | } |
100 | DEFINE_TRIVIAL_CLEANUP_FUNC(char*, umount_and_rmdir_and_free); | |
6af52c3a LB |
101 | |
102 | int bind_mount_in_namespace(pid_t target, const char *propagate_path, const char *incoming_path, const char *src, const char *dest, bool read_only, bool make_file_or_directory); | |
70599967 | 103 | int mount_image_in_namespace(pid_t target, const char *propagate_path, const char *incoming_path, const char *src, const char *dest, bool read_only, bool make_file_or_directory, const MountOptions *options); |