aboutsummaryrefslogtreecommitdiff
path: root/init.d/sysfs.in
blob: 9edd915526eecb1c059674151df5d3e65111ebc1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
#!@SBINDIR@/openrc-run
# Copyright (c) 2007-2009 Roy Marples <roy@marples.name>
# Released under the 2-clause BSD license.

description="Mount the sys filesystem."

sysfs_opts=nodev,noexec,nosuid

depend()
{
	keyword -lxc -prefix -vserver
}

mount_sys()
{
	grep -Eq "[[:space:]]+sysfs$" /proc/filesystems || return 1
	mountinfo -q /sys && return 0

	if [ ! -d /sys ]; then
		if ! mkdir -m 0755 /sys; then
			ewarn "Could not create /sys!"
			return 1
		fi
	fi

	ebegin "Mounting /sys"
	if ! fstabinfo --mount /sys; then
		mount -n -t sysfs -o ${sysfs_opts} sysfs /sys
	fi
	eend $?
}

mount_misc()
{
	# Setup Kernel Support for securityfs
	if [ -d /sys/kernel/security ] && \
		! mountinfo -q /sys/kernel/security; then
		if grep -qs securityfs /proc/filesystems; then
			ebegin "Mounting security filesystem"
			mount -n -t securityfs -o ${sysfs_opts} \
				securityfs /sys/kernel/security
			eend $?
		fi
	fi

	# Setup Kernel Support for debugfs
	if [ -d /sys/kernel/debug ] && ! mountinfo -q /sys/kernel/debug; then
		if grep -qs debugfs /proc/filesystems; then
			ebegin "Mounting debug filesystem"
			mount -n -t debugfs -o ${sysfs_opts} debugfs /sys/kernel/debug
			eend $?
		fi
	fi

	# Setup Kernel Support for configfs
	if [ -d /sys/kernel/config ] && ! mountinfo -q /sys/kernel/config; then
		if grep -qs configfs /proc/filesystems; then
			ebegin "Mounting config filesystem"
			mount -n -t configfs -o  ${sysfs_opts} configfs /sys/kernel/config
			eend $?
		fi
	fi

	# set up kernel support for cgroups
	if [ -d /sys/fs/cgroup ] && ! mountinfo -q /sys/fs/cgroup; then
		if grep -qs cgroup /proc/filesystems; then
			ebegin "Mounting cgroup filesystem"
			local opts="${sysfs_opts},mode=755,size=${rc_cgroupsize:-10m}"
			mount -n -t tmpfs -o ${opts} cgroup_root /sys/fs/cgroup
			eend $?
		fi
	fi

	# set up kernel support for fusectl
	if [ -d /sys/fs/fuse/connections ] \
		&& ! mountinfo -q /sys/fs/fuse/connections; then
		if grep -qs fusectl /proc/filesystems; then
			ebegin "Mounting fuse control filesystem"
			mount -n -t fusectl -o ${sysfs_opts} \
				fusectl /sys/fs/fuse/connections
			eend $?
		fi
	fi

	# setup up kernel support for efivarfs
	# slightly complicated, as if it's build as a module but NOT yet loaded,
	# it will NOT appear in /proc/filesystems yet
	if [ -d /sys/firmware/efi/efivars ] \
		&& ! mountinfo -q /sys/firmware/efi/efivars; then
		modprobe -q efivarfs
		if grep -qs efivarfs /proc/filesystems; then
			ebegin "Mounting efivarfs filesystem"
			mount -n -t efivarfs -o ${sysfs_opts} \
				efivarfs /sys/firmware/efi/efivars
			eend $?
		fi
	fi
}

mount_cgroups()
{
		mountinfo -q /sys/fs/cgroup || return 0
		mountinfo -q /sys/fs/cgroup/openrc || return 0

	local agent="@LIBEXECDIR@/sh/cgroup-release-agent.sh"
	mkdir /sys/fs/cgroup/openrc
	mount -n -t cgroup \
		-o none,${sysfs_opts},name=openrc,release_agent="$agent" \
		openrc /sys/fs/cgroup/openrc
	echo 1 > /sys/fs/cgroup/openrc/notify_on_release

	yesno ${rc_controller_cgroups:-YES} && [ -e /proc/cgroups ] || return 0
	while read name hier groups enabled rest; do
		case "${enabled}" in
			1)	mkdir /sys/fs/cgroup/${name}
				mount -n -t cgroup -o ${sysfs_opts},${name} \
					${name} /sys/fs/cgroup/${name}
				;;
		esac
	done < /proc/cgroups
}

start()
{
	local retval
	mount_sys
	retval=$?
	if [ $retval -eq 0 ]; then
		mount_misc
		retval=$?
	fi
	if [ $retval -eq 0 ]; then
		mount_cgroups
		retval=$?
	fi
	return $retval
}