73cdf10f1f
In the hwclock, procfs and sysfs service scripts, we automatically attempt to load the kernel modules we need before we take any action. We shouldn't do this, because there are systems which do not use kernel modules and do not have the kmod package installed. With this change, we continue to load the modules ourselves, but we warn the admin that they need to be added to /etc/conf.d/modules or built into the kernel. In the future, this automatic loading will be dropped. X-Gentoo-Bug: 342313 X-Gentoo-Bug-URL: https://bugs.gentoo.org/show_bug.cgi?id=342313
172 lines
4.6 KiB
Plaintext
172 lines
4.6 KiB
Plaintext
#!@SBINDIR@/openrc-run
|
|
# Copyright (c) 2007-2015 The OpenRC Authors.
|
|
# See the Authors file at the top-level directory of this distribution and
|
|
# https://github.com/OpenRC/openrc/blob/master/AUTHORS
|
|
#
|
|
# This file is part of OpenRC. It is subject to the license terms in
|
|
# the LICENSE file found in the top-level directory of this
|
|
# distribution and at https://github.com/OpenRC/openrc/blob/master/LICENSE
|
|
# This file may not be copied, modified, propagated, or distributed
|
|
# except according to the terms contained in the LICENSE file.
|
|
|
|
description="Mount the sys filesystem."
|
|
|
|
sysfs_opts=nodev,noexec,nosuid
|
|
|
|
depend()
|
|
{
|
|
want modules
|
|
keyword -docker -lxc -prefix -systemd-nspawn -vserver
|
|
}
|
|
|
|
mount_sys()
|
|
{
|
|
grep -Eq "[[:space:]]+sysfs$" /proc/filesystems || return 1
|
|
mountinfo -q /sys && return 0
|
|
|
|
if [ ! -d /sys ]; then
|
|
if ! mkdir -m 0755 /sys; then
|
|
ewarn "Could not create /sys!"
|
|
return 1
|
|
fi
|
|
fi
|
|
|
|
ebegin "Mounting /sys"
|
|
if ! fstabinfo --mount /sys; then
|
|
mount -n -t sysfs -o ${sysfs_opts} sysfs /sys
|
|
fi
|
|
eend $?
|
|
}
|
|
|
|
mount_misc()
|
|
{
|
|
# Setup Kernel Support for securityfs
|
|
if [ -d /sys/kernel/security ] && \
|
|
! mountinfo -q /sys/kernel/security; then
|
|
if grep -qs securityfs /proc/filesystems; then
|
|
ebegin "Mounting security filesystem"
|
|
mount -n -t securityfs -o ${sysfs_opts} \
|
|
securityfs /sys/kernel/security
|
|
eend $?
|
|
fi
|
|
fi
|
|
|
|
# Setup Kernel Support for debugfs
|
|
if [ -d /sys/kernel/debug ] && ! mountinfo -q /sys/kernel/debug; then
|
|
if grep -qs debugfs /proc/filesystems; then
|
|
ebegin "Mounting debug filesystem"
|
|
mount -n -t debugfs -o ${sysfs_opts} debugfs /sys/kernel/debug
|
|
eend $?
|
|
fi
|
|
fi
|
|
|
|
# Setup Kernel Support for configfs
|
|
if [ -d /sys/kernel/config ] && ! mountinfo -q /sys/kernel/config; then
|
|
if grep -qs configfs /proc/filesystems; then
|
|
ebegin "Mounting config filesystem"
|
|
mount -n -t configfs -o ${sysfs_opts} configfs /sys/kernel/config
|
|
eend $?
|
|
fi
|
|
fi
|
|
|
|
# set up kernel support for fusectl
|
|
if [ -d /sys/fs/fuse/connections ] \
|
|
&& ! mountinfo -q /sys/fs/fuse/connections; then
|
|
if grep -qs fusectl /proc/filesystems; then
|
|
ebegin "Mounting fuse control filesystem"
|
|
mount -n -t fusectl -o ${sysfs_opts} \
|
|
fusectl /sys/fs/fuse/connections
|
|
eend $?
|
|
fi
|
|
fi
|
|
|
|
# Setup Kernel Support for SELinux
|
|
if [ -d /sys/fs/selinux ] && ! mountinfo -q /sys/fs/selinux; then
|
|
if grep -qs selinuxfs /proc/filesystems; then
|
|
ebegin "Mounting SELinux filesystem"
|
|
mount -t selinuxfs selinuxfs /sys/fs/selinux
|
|
eend $?
|
|
fi
|
|
fi
|
|
|
|
# Setup Kernel Support for persistent storage
|
|
if [ -d /sys/fs/pstore ] && ! mountinfo -q /sys/fs/pstore; then
|
|
if grep -qs 'pstore$' /proc/filesystems; then
|
|
ebegin "Mounting persistent storage (pstore) filesystem"
|
|
mount -t pstore pstore -o ${sysfs_opts} /sys/fs/pstore
|
|
eend $?
|
|
fi
|
|
fi
|
|
|
|
# setup up kernel support for efivarfs
|
|
# slightly complicated, as if it's build as a module but NOT yet loaded,
|
|
# it will NOT appear in /proc/filesystems yet
|
|
if [ -d /sys/firmware/efi/efivars ] \
|
|
&& ! mountinfo -q /sys/firmware/efi/efivars; then
|
|
if modprobe -q efivarfs; then
|
|
ewarn "The efivarfs module needs to be configured in \
|
|
@SYSCONFDIR@/conf.d/modules or built in"
|
|
fi
|
|
if grep -qs efivarfs /proc/filesystems; then
|
|
ebegin "Mounting efivarfs filesystem"
|
|
mount -n -t efivarfs -o ${sysfs_opts} \
|
|
efivarfs /sys/firmware/efi/efivars
|
|
eend $?
|
|
fi
|
|
fi
|
|
}
|
|
|
|
mount_cgroups()
|
|
{
|
|
# set up kernel support for cgroups
|
|
if [ -d /sys/fs/cgroup ] && ! mountinfo -q /sys/fs/cgroup; then
|
|
if grep -qs cgroup /proc/filesystems; then
|
|
ebegin "Mounting cgroup filesystem"
|
|
local opts="${sysfs_opts},mode=755,size=${rc_cgroupsize:-10m}"
|
|
mount -n -t tmpfs -o ${opts} cgroup_root /sys/fs/cgroup
|
|
eend $?
|
|
fi
|
|
fi
|
|
|
|
mountinfo -q /sys/fs/cgroup || return 0
|
|
|
|
if ! mountinfo -q /sys/fs/cgroup/openrc; then
|
|
local agent="@LIBEXECDIR@/sh/cgroup-release-agent.sh"
|
|
mkdir /sys/fs/cgroup/openrc
|
|
mount -n -t cgroup \
|
|
-o none,${sysfs_opts},name=openrc,release_agent="$agent" \
|
|
openrc /sys/fs/cgroup/openrc
|
|
printf 1 > /sys/fs/cgroup/openrc/notify_on_release
|
|
fi
|
|
|
|
yesno ${rc_controller_cgroups:-YES} && [ -e /proc/cgroups ] || return 0
|
|
while read name hier groups enabled rest; do
|
|
case "${enabled}" in
|
|
1) mountinfo -q /sys/fs/cgroup/${name} && continue
|
|
mkdir /sys/fs/cgroup/${name}
|
|
mount -n -t cgroup -o ${sysfs_opts},${name} \
|
|
${name} /sys/fs/cgroup/${name}
|
|
;;
|
|
esac
|
|
done < /proc/cgroups
|
|
}
|
|
|
|
restorecon_sys()
|
|
{
|
|
if [ -x /sbin/restorecon ]; then
|
|
ebegin "Restoring SELinux contexts in /sys"
|
|
restorecon -F /sys/devices/system/cpu/online >/dev/null 2>&1
|
|
restorecon -rF /sys/fs/cgroup >/dev/null 2>&1
|
|
eend $?
|
|
fi
|
|
}
|
|
|
|
start()
|
|
{
|
|
mount_sys
|
|
mount_misc
|
|
mount_cgroups
|
|
restorecon_sys
|
|
return 0
|
|
}
|