summaryrefslogtreecommitdiffstats
path: root/src/gpt-auto-generator
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:49:52 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:49:52 +0000
commit55944e5e40b1be2afc4855d8d2baf4b73d1876b5 (patch)
tree33f869f55a1b149e9b7c2b7e201867ca5dd52992 /src/gpt-auto-generator
parentInitial commit. (diff)
downloadsystemd-55944e5e40b1be2afc4855d8d2baf4b73d1876b5.tar.xz
systemd-55944e5e40b1be2afc4855d8d2baf4b73d1876b5.zip
Adding upstream version 255.4.upstream/255.4
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/gpt-auto-generator')
-rw-r--r--src/gpt-auto-generator/gpt-auto-generator.c1019
-rw-r--r--src/gpt-auto-generator/meson.build10
2 files changed, 1029 insertions, 0 deletions
diff --git a/src/gpt-auto-generator/gpt-auto-generator.c b/src/gpt-auto-generator/gpt-auto-generator.c
new file mode 100644
index 0000000..07531ec
--- /dev/null
+++ b/src/gpt-auto-generator/gpt-auto-generator.c
@@ -0,0 +1,1019 @@
+/* SPDX-License-Identifier: LGPL-2.1-or-later */
+
+#include <stdlib.h>
+#include <sys/file.h>
+#include <unistd.h>
+
+#include "sd-device.h"
+#include "sd-id128.h"
+
+#include "alloc-util.h"
+#include "blkid-util.h"
+#include "blockdev-util.h"
+#include "btrfs-util.h"
+#include "device-util.h"
+#include "devnum-util.h"
+#include "dirent-util.h"
+#include "dissect-image.h"
+#include "dropin.h"
+#include "efi-loader.h"
+#include "fd-util.h"
+#include "fileio.h"
+#include "fs-util.h"
+#include "fstab-util.h"
+#include "generator.h"
+#include "gpt.h"
+#include "image-policy.h"
+#include "initrd-util.h"
+#include "mountpoint-util.h"
+#include "parse-util.h"
+#include "path-util.h"
+#include "proc-cmdline.h"
+#include "special.h"
+#include "specifier.h"
+#include "stat-util.h"
+#include "string-util.h"
+#include "strv.h"
+#include "unit-name.h"
+#include "virt.h"
+
+static const char *arg_dest = NULL;
+static bool arg_enabled = true;
+static bool arg_root_enabled = true;
+static bool arg_swap_enabled = true;
+static char *arg_root_fstype = NULL;
+static char *arg_root_options = NULL;
+static int arg_root_rw = -1;
+static ImagePolicy *arg_image_policy = NULL;
+
+STATIC_DESTRUCTOR_REGISTER(arg_image_policy, image_policy_freep);
+
+STATIC_DESTRUCTOR_REGISTER(arg_root_fstype, freep);
+STATIC_DESTRUCTOR_REGISTER(arg_root_options, freep);
+
+static int add_cryptsetup(
+ const char *id,
+ const char *what,
+ bool rw,
+ bool require,
+ bool measure,
+ char **ret_device) {
+
+#if HAVE_LIBCRYPTSETUP
+ _cleanup_free_ char *e = NULL, *n = NULL, *d = NULL, *options = NULL;
+ _cleanup_fclose_ FILE *f = NULL;
+ int r;
+
+ assert(id);
+ assert(what);
+
+ r = unit_name_from_path(what, ".device", &d);
+ if (r < 0)
+ return log_error_errno(r, "Failed to generate unit name: %m");
+
+ e = unit_name_escape(id);
+ if (!e)
+ return log_oom();
+
+ r = unit_name_build("systemd-cryptsetup", e, ".service", &n);
+ if (r < 0)
+ return log_error_errno(r, "Failed to generate unit name: %m");
+
+ r = generator_open_unit_file(arg_dest, /* source = */ NULL, n, &f);
+ if (r < 0)
+ return r;
+
+ r = generator_write_cryptsetup_unit_section(f, NULL);
+ if (r < 0)
+ return r;
+
+ fprintf(f,
+ "Before=umount.target cryptsetup.target\n"
+ "Conflicts=umount.target\n"
+ "BindsTo=%s\n"
+ "After=%s\n",
+ d, d);
+
+ if (!rw) {
+ options = strdup("read-only");
+ if (!options)
+ return log_oom();
+ }
+
+ r = efi_measured_uki(LOG_WARNING);
+ if (r > 0)
+ /* Enable TPM2 based unlocking automatically, if we have a TPM. See #30176. */
+ if (!strextend_with_separator(&options, ",", "tpm2-device=auto"))
+ return log_oom();
+
+ if (measure) {
+ /* We only measure the root volume key into PCR 15 if we are booted with sd-stub (i.e. in a
+ * UKI), and sd-stub measured the UKI. We do this in order not to step into people's own PCR
+ * assignment, under the assumption that people who are fine to use sd-stub with its PCR
+ * assignments are also OK with our PCR 15 use here. */
+ if (r > 0)
+ if (!strextend_with_separator(&options, ",", "tpm2-measure-pcr=yes"))
+ return log_oom();
+ if (r == 0)
+ log_debug("Will not measure volume key of volume '%s', not booted via systemd-stub with measurements enabled.", id);
+ }
+
+ r = generator_write_cryptsetup_service_section(f, id, what, NULL, options);
+ if (r < 0)
+ return r;
+
+ r = fflush_and_check(f);
+ if (r < 0)
+ return log_error_errno(r, "Failed to write file %s: %m", n);
+
+ r = generator_add_symlink(arg_dest, d, "wants", n);
+ if (r < 0)
+ return r;
+
+ const char *dmname = strjoina("dev-mapper-", e, ".device");
+
+ if (require) {
+ r = generator_add_symlink(arg_dest, "cryptsetup.target", "requires", n);
+ if (r < 0)
+ return r;
+
+ r = generator_add_symlink(arg_dest, dmname, "requires", n);
+ if (r < 0)
+ return r;
+ }
+
+ r = write_drop_in_format(arg_dest, dmname, 50, "job-timeout",
+ "# Automatically generated by systemd-gpt-auto-generator\n\n"
+ "[Unit]\n"
+ "JobTimeoutSec=infinity"); /* the binary handles timeouts anyway */
+ if (r < 0)
+ log_warning_errno(r, "Failed to write device timeout drop-in, ignoring: %m");
+
+ if (ret_device) {
+ char *s;
+
+ s = path_join("/dev/mapper", id);
+ if (!s)
+ return log_oom();
+
+ *ret_device = s;
+ }
+
+ return 0;
+#else
+ return log_error_errno(SYNTHETIC_ERRNO(EOPNOTSUPP),
+ "Partition is encrypted, but systemd-gpt-auto-generator was compiled without libcryptsetup support");
+#endif
+}
+
+static int add_mount(
+ const char *id,
+ const char *what,
+ const char *where,
+ const char *fstype,
+ bool rw,
+ bool growfs,
+ bool measure,
+ const char *options,
+ const char *description,
+ const char *post) {
+
+ _cleanup_free_ char *unit = NULL, *crypto_what = NULL;
+ _cleanup_fclose_ FILE *f = NULL;
+ int r;
+
+ /* Note that we don't apply specifier escaping on the input strings here, since we know they are not configured
+ * externally, but all originate from our own sources here, and hence we know they contain no % characters that
+ * could potentially be understood as specifiers. */
+
+ assert(id);
+ assert(what);
+ assert(where);
+ assert(description);
+
+ log_debug("Adding %s: %s fstype=%s", where, what, fstype ?: "(any)");
+
+ if (streq_ptr(fstype, "crypto_LUKS")) {
+ r = add_cryptsetup(id, what, rw, /* require= */ true, measure, &crypto_what);
+ if (r < 0)
+ return r;
+
+ what = crypto_what;
+ fstype = NULL;
+ } else if (fstype) {
+ r = dissect_fstype_ok(fstype);
+ if (r < 0)
+ return log_error_errno(r, "Unable to determine of dissected file system type '%s' is permitted: %m", fstype);
+ if (!r)
+ return log_error_errno(
+ SYNTHETIC_ERRNO(EIDRM),
+ "Refusing to automatically mount uncommon file system '%s' to '%s'.",
+ fstype, where);
+ }
+
+ r = unit_name_from_path(where, ".mount", &unit);
+ if (r < 0)
+ return log_error_errno(r, "Failed to generate unit name: %m");
+
+ r = generator_open_unit_file(arg_dest, /* source = */ NULL, unit, &f);
+ if (r < 0)
+ return r;
+
+ fprintf(f,
+ "[Unit]\n"
+ "Description=%s\n"
+ "Documentation=man:systemd-gpt-auto-generator(8)\n",
+ description);
+
+ if (post)
+ fprintf(f, "Before=%s\n", post);
+
+ r = generator_write_fsck_deps(f, arg_dest, what, where, fstype);
+ if (r < 0)
+ return r;
+
+ r = generator_write_blockdev_dependency(f, what);
+ if (r < 0)
+ return r;
+
+ fprintf(f,
+ "\n"
+ "[Mount]\n"
+ "What=%s\n"
+ "Where=%s\n",
+ what, where);
+
+ if (fstype)
+ fprintf(f, "Type=%s\n", fstype);
+
+ if (options)
+ fprintf(f, "Options=%s\n", options);
+
+ r = fflush_and_check(f);
+ if (r < 0)
+ return log_error_errno(r, "Failed to write unit %s: %m", unit);
+
+ if (growfs) {
+ r = generator_hook_up_growfs(arg_dest, where, post);
+ if (r < 0)
+ return r;
+ }
+
+ if (measure) {
+ r = generator_hook_up_pcrfs(arg_dest, where, post);
+ if (r < 0)
+ return r;
+ }
+
+ if (post) {
+ r = generator_add_symlink(arg_dest, post, "requires", unit);
+ if (r < 0)
+ return r;
+ }
+
+ return 0;
+}
+
+static int path_is_busy(const char *where) {
+ int r;
+
+ assert(where);
+
+ /* already a mountpoint; generators run during reload */
+ r = path_is_mount_point(where, NULL, AT_SYMLINK_FOLLOW);
+ if (r > 0)
+ return false;
+ /* The directory will be created by the mount or automount unit when it is started. */
+ if (r == -ENOENT)
+ return false;
+
+ if (r < 0)
+ return log_warning_errno(r, "Cannot check if \"%s\" is a mount point: %m", where);
+
+ /* not a mountpoint but it contains files */
+ r = dir_is_empty(where, /* ignore_hidden_or_backup= */ false);
+ if (r == -ENOTDIR) {
+ log_debug("\"%s\" is not a directory, ignoring.", where);
+ return true;
+ } else if (r < 0)
+ return log_warning_errno(r, "Cannot check if \"%s\" is empty: %m", where);
+ else if (r == 0) {
+ log_debug("\"%s\" already populated, ignoring.", where);
+ return true;
+ }
+
+ return false;
+}
+
+static int add_partition_mount(
+ PartitionDesignator d,
+ DissectedPartition *p,
+ const char *id,
+ const char *where,
+ const char *description) {
+
+ _cleanup_free_ char *options = NULL;
+ int r;
+
+ assert(p);
+
+ r = path_is_busy(where);
+ if (r != 0)
+ return r < 0 ? r : 0;
+
+ r = partition_pick_mount_options(
+ d,
+ dissected_partition_fstype(p),
+ p->rw,
+ /* discard= */ true,
+ &options,
+ /* ret_ms_flags= */ NULL);
+ if (r < 0)
+ return r;
+
+ return add_mount(
+ id,
+ p->node,
+ where,
+ p->fstype,
+ p->rw,
+ p->growfs,
+ /* measure= */ STR_IN_SET(id, "root", "var"), /* by default measure rootfs and /var, since they contain the "identity" of the system */
+ options,
+ description,
+ SPECIAL_LOCAL_FS_TARGET);
+}
+
+static int add_partition_swap(DissectedPartition *p) {
+ const char *what;
+ _cleanup_free_ char *name = NULL, *crypto_what = NULL;
+ _cleanup_fclose_ FILE *f = NULL;
+ int r;
+
+ assert(p);
+ assert(p->node);
+
+ if (!arg_swap_enabled)
+ return 0;
+
+ /* Disable the swap auto logic if at least one swap is defined in /etc/fstab, see #6192. */
+ r = fstab_has_fstype("swap");
+ if (r < 0)
+ return log_error_errno(r, "Failed to parse fstab: %m");
+ if (r > 0) {
+ log_debug("swap specified in fstab, ignoring.");
+ return 0;
+ }
+
+ if (streq_ptr(p->fstype, "crypto_LUKS")) {
+ r = add_cryptsetup("swap", p->node, /* rw= */ true, /* require= */ true, /* measure= */ false, &crypto_what);
+ if (r < 0)
+ return r;
+ what = crypto_what;
+ } else
+ what = p->node;
+
+ log_debug("Adding swap: %s", what);
+
+ r = unit_name_from_path(what, ".swap", &name);
+ if (r < 0)
+ return log_error_errno(r, "Failed to generate unit name: %m");
+
+ r = generator_open_unit_file(arg_dest, /* source = */ NULL, name, &f);
+ if (r < 0)
+ return r;
+
+ fprintf(f,
+ "[Unit]\n"
+ "Description=Swap Partition\n"
+ "Documentation=man:systemd-gpt-auto-generator(8)\n");
+
+ r = generator_write_blockdev_dependency(f, what);
+ if (r < 0)
+ return r;
+
+ fprintf(f,
+ "\n"
+ "[Swap]\n"
+ "What=%s\n",
+ what);
+
+ r = fflush_and_check(f);
+ if (r < 0)
+ return log_error_errno(r, "Failed to write unit %s: %m", name);
+
+ return generator_add_symlink(arg_dest, SPECIAL_SWAP_TARGET, "wants", name);
+}
+
+static int add_automount(
+ const char *id,
+ const char *what,
+ const char *where,
+ const char *fstype,
+ bool rw,
+ bool growfs,
+ const char *options,
+ const char *description,
+ usec_t timeout) {
+
+ _cleanup_free_ char *unit = NULL;
+ _cleanup_fclose_ FILE *f = NULL;
+ int r;
+
+ assert(id);
+ assert(where);
+ assert(description);
+
+ r = add_mount(id,
+ what,
+ where,
+ fstype,
+ rw,
+ growfs,
+ /* measure= */ false,
+ options,
+ description,
+ NULL);
+ if (r < 0)
+ return r;
+
+ r = unit_name_from_path(where, ".automount", &unit);
+ if (r < 0)
+ return log_error_errno(r, "Failed to generate unit name: %m");
+
+ r = generator_open_unit_file(arg_dest, /* source = */ NULL, unit, &f);
+ if (r < 0)
+ return r;
+
+ fprintf(f,
+ "[Unit]\n"
+ "Description=%s\n"
+ "Documentation=man:systemd-gpt-auto-generator(8)\n"
+ "[Automount]\n"
+ "Where=%s\n"
+ "TimeoutIdleSec="USEC_FMT"\n",
+ description,
+ where,
+ timeout / USEC_PER_SEC);
+
+ r = fflush_and_check(f);
+ if (r < 0)
+ return log_error_errno(r, "Failed to write unit %s: %m", unit);
+
+ return generator_add_symlink(arg_dest, SPECIAL_LOCAL_FS_TARGET, "wants", unit);
+}
+
+static int slash_boot_in_fstab(void) {
+ static int cache = -1;
+
+ if (cache >= 0)
+ return cache;
+
+ cache = fstab_is_mount_point("/boot");
+ if (cache < 0)
+ return log_error_errno(cache, "Failed to parse fstab: %m");
+ return cache;
+}
+
+static int add_partition_xbootldr(DissectedPartition *p) {
+ _cleanup_free_ char *options = NULL;
+ int r;
+
+ assert(p);
+
+ if (in_initrd()) {
+ log_debug("In initrd, ignoring the XBOOTLDR partition.");
+ return 0;
+ }
+
+ r = slash_boot_in_fstab();
+ if (r < 0)
+ return r;
+ if (r > 0) {
+ log_debug("/boot/ specified in fstab, ignoring XBOOTLDR partition.");
+ return 0;
+ }
+
+ r = path_is_busy("/boot");
+ if (r < 0)
+ return r;
+ if (r > 0)
+ return 0;
+
+ r = partition_pick_mount_options(
+ PARTITION_XBOOTLDR,
+ dissected_partition_fstype(p),
+ /* rw= */ true,
+ /* discard= */ false,
+ &options,
+ /* ret_ms_flags= */ NULL);
+ if (r < 0)
+ return log_error_errno(r, "Failed to determine default mount options for /boot/: %m");
+
+ return add_automount(
+ "boot",
+ p->node,
+ "/boot",
+ p->fstype,
+ /* rw= */ true,
+ /* growfs= */ false,
+ options,
+ "Boot Loader Partition",
+ 120 * USEC_PER_SEC);
+}
+
+#if ENABLE_EFI
+static int slash_efi_in_fstab(void) {
+ static int cache = -1;
+
+ if (cache >= 0)
+ return cache;
+
+ cache = fstab_is_mount_point("/efi");
+ if (cache < 0)
+ return log_error_errno(cache, "Failed to parse fstab: %m");
+ return cache;
+}
+
+static bool slash_boot_exists(void) {
+ static int cache = -1;
+
+ if (cache >= 0)
+ return cache;
+
+ if (access("/boot", F_OK) >= 0)
+ return (cache = true);
+ if (errno != ENOENT)
+ log_error_errno(errno, "Failed to determine whether /boot/ exists, assuming no: %m");
+ else
+ log_debug_errno(errno, "/boot/: %m");
+ return (cache = false);
+}
+
+static int add_partition_esp(DissectedPartition *p, bool has_xbootldr) {
+ const char *esp_path = NULL, *id = NULL;
+ _cleanup_free_ char *options = NULL;
+ int r;
+
+ assert(p);
+
+ if (in_initrd()) {
+ log_debug("In initrd, ignoring the ESP.");
+ return 0;
+ }
+
+ /* Check if there's an existing fstab entry for ESP. If so, we just skip the gpt-auto logic. */
+ r = fstab_has_node(p->node);
+ if (r < 0)
+ return log_error_errno(r,
+ "Failed to check if fstab entry for device '%s' exists: %m", p->node);
+ if (r > 0)
+ return 0;
+
+ /* If /boot/ is present, unused, and empty, we'll take that.
+ * Otherwise, if /efi/ is unused and empty (or missing), we'll take that.
+ * Otherwise, we do nothing. */
+ if (!has_xbootldr && slash_boot_exists()) {
+ r = slash_boot_in_fstab();
+ if (r < 0)
+ return r;
+ if (r == 0) {
+ r = path_is_busy("/boot");
+ if (r < 0)
+ return r;
+ if (r == 0) {
+ esp_path = "/boot";
+ id = "boot";
+ }
+ }
+ }
+
+ if (!esp_path) {
+ r = slash_efi_in_fstab();
+ if (r < 0)
+ return r;
+ if (r > 0)
+ return 0;
+
+ r = path_is_busy("/efi");
+ if (r < 0)
+ return r;
+ if (r > 0)
+ return 0;
+
+ esp_path = "/efi";
+ id = "efi";
+ }
+
+ r = partition_pick_mount_options(
+ PARTITION_ESP,
+ dissected_partition_fstype(p),
+ /* rw= */ true,
+ /* discard= */ false,
+ &options,
+ /* ret_ms_flags= */ NULL);
+ if (r < 0)
+ return log_error_errno(r, "Failed to determine default mount options for %s: %m", esp_path);
+
+ return add_automount(
+ id,
+ p->node,
+ esp_path,
+ p->fstype,
+ /* rw= */ true,
+ /* growfs= */ false,
+ options,
+ "EFI System Partition Automount",
+ 120 * USEC_PER_SEC);
+}
+#else
+static int add_partition_esp(DissectedPartition *p, bool has_xbootldr) {
+ return 0;
+}
+#endif
+
+static int add_partition_root_rw(DissectedPartition *p) {
+ const char *path;
+ int r;
+
+ assert(p);
+ assert(!in_initrd());
+
+ /* Invoked on the main system (not initrd), to honour GPT flag 60 on the root fs (ro) */
+
+ if (arg_root_rw >= 0) {
+ log_debug("Parameter ro/rw specified on kernel command line, not generating drop-in for systemd-remount-fs.service.");
+ return 0;
+ }
+
+ if (!p->rw) {
+ log_debug("Root partition marked read-only in GPT partition table, not generating drop-in for systemd-remount-fs.service.");
+ return 0;
+ }
+
+ r = generator_enable_remount_fs_service(arg_dest);
+ if (r < 0)
+ return r;
+
+ path = strjoina(arg_dest, "/systemd-remount-fs.service.d/50-remount-rw.conf");
+
+ r = write_string_file(path,
+ "# Automatically generated by systemd-gpt-auto-generator\n\n"
+ "[Service]\n"
+ "Environment=SYSTEMD_REMOUNT_ROOT_RW=1\n",
+ WRITE_STRING_FILE_CREATE|WRITE_STRING_FILE_NOFOLLOW|WRITE_STRING_FILE_MKDIR_0755);
+ if (r < 0)
+ return log_error_errno(r, "Failed to write drop-in file %s: %m", path);
+
+ return 0;
+}
+
+static int add_partition_root_growfs(DissectedPartition *p) {
+
+ assert(p);
+ assert(!in_initrd());
+
+ /* Invoked on the main system (not initrd), to honour GPT flag 59 on the root fs (growfs) */
+
+ if (!p->growfs) {
+ log_debug("Root partition not marked for growing the file system in the GPT partition table, not generating drop-in for systemd-growfs-root.service.");
+ return 0;
+ }
+
+ return generator_hook_up_growfs(arg_dest, "/", SPECIAL_LOCAL_FS_TARGET);
+}
+
+static int add_partition_root_flags(DissectedPartition *p) {
+ int r = 0;
+
+ assert(p);
+ assert(!in_initrd());
+
+ RET_GATHER(r, add_partition_root_growfs(p));
+ RET_GATHER(r, add_partition_root_rw(p));
+
+ return r;
+}
+
+#if ENABLE_EFI
+static int add_root_cryptsetup(void) {
+#if HAVE_LIBCRYPTSETUP
+
+ /* If a device /dev/gpt-auto-root-luks appears, then make it pull in systemd-cryptsetup-root.service, which
+ * sets it up, and causes /dev/gpt-auto-root to appear which is all we are looking for. */
+
+ return add_cryptsetup("root", "/dev/gpt-auto-root-luks", /* rw= */ true, /* require= */ false, /* measure= */ true, NULL);
+#else
+ return 0;
+#endif
+}
+#endif
+
+static int add_root_mount(void) {
+#if ENABLE_EFI
+ _cleanup_free_ char *options = NULL;
+ int r;
+
+ if (!is_efi_boot()) {
+ log_debug("Not an EFI boot, not creating root mount.");
+ return 0;
+ }
+
+ r = efi_loader_get_device_part_uuid(NULL);
+ if (r == -ENOENT) {
+ log_notice("EFI loader partition unknown, exiting.\n"
+ "(The boot loader did not set EFI variable LoaderDevicePartUUID.)");
+ return 0;
+ } else if (r < 0)
+ return log_error_errno(r, "Failed to read loader partition UUID: %m");
+
+ /* OK, we have an ESP/XBOOTLDR partition, this is fantastic, so let's wait for a root device to show up.
+ * A udev rule will create the link for us under the right name. */
+
+ if (in_initrd()) {
+ r = generator_write_initrd_root_device_deps(arg_dest, "/dev/gpt-auto-root");
+ if (r < 0)
+ return 0;
+
+ r = add_root_cryptsetup();
+ if (r < 0)
+ return r;
+ }
+
+ /* Note that we do not need to enable systemd-remount-fs.service here. If /etc/fstab exists,
+ * systemd-fstab-generator will pull it in for us, and otherwise add_partition_root_flags() will do
+ * it, after the initrd transition. */
+
+ r = partition_pick_mount_options(
+ PARTITION_ROOT,
+ arg_root_fstype,
+ arg_root_rw > 0,
+ /* discard= */ true,
+ &options,
+ /* ret_ms_flags= */ NULL);
+ if (r < 0)
+ return log_error_errno(r, "Failed to pick root mount options: %m");
+
+ if (arg_root_options)
+ if (!strextend_with_separator(&options, ",", arg_root_options))
+ return log_oom();
+
+ return add_mount(
+ "root",
+ "/dev/gpt-auto-root",
+ in_initrd() ? "/sysroot" : "/",
+ arg_root_fstype,
+ /* rw= */ arg_root_rw > 0,
+ /* growfs= */ false,
+ /* measure= */ true,
+ options,
+ "Root Partition",
+ in_initrd() ? SPECIAL_INITRD_ROOT_FS_TARGET : SPECIAL_LOCAL_FS_TARGET);
+#else
+ return 0;
+#endif
+}
+
+static int process_loader_partitions(DissectedPartition *esp, DissectedPartition *xbootldr) {
+ sd_id128_t loader_uuid;
+ int r;
+
+ assert(esp);
+ assert(xbootldr);
+
+ if (!is_efi_boot()) {
+ log_debug("Not an EFI boot, skipping loader partition UUID check.");
+ goto mount;
+ }
+
+ /* Let's check if LoaderDevicePartUUID points to either ESP or XBOOTLDR. We prefer it pointing
+ * to the ESP, but we accept XBOOTLDR too. If it points to neither of them, don't mount any
+ * loader partitions, since they are not the ones used for booting. */
+
+ r = efi_loader_get_device_part_uuid(&loader_uuid);
+ if (r == -ENOENT) {
+ log_debug_errno(r, "EFI loader partition unknown, skipping ESP and XBOOTLDR mounts.");
+ return 0;
+ }
+ if (r < 0)
+ return log_debug_errno(r, "Failed to read loader partition UUID, ignoring: %m");
+
+ if (esp->found && sd_id128_equal(esp->uuid, loader_uuid))
+ goto mount;
+
+ if (xbootldr->found && sd_id128_equal(xbootldr->uuid, loader_uuid)) {
+ log_debug("LoaderDevicePartUUID points to XBOOTLDR partition.");
+ goto mount;
+ }
+
+ log_debug("LoaderDevicePartUUID points to neither ESP nor XBOOTLDR, ignoring.");
+ return 0;
+
+mount:
+ r = 0;
+
+ if (xbootldr->found)
+ RET_GATHER(r, add_partition_xbootldr(xbootldr));
+ if (esp->found)
+ RET_GATHER(r, add_partition_esp(esp, xbootldr->found));
+
+ return r;
+}
+
+static int enumerate_partitions(dev_t devnum) {
+ _cleanup_(dissected_image_unrefp) DissectedImage *m = NULL;
+ _cleanup_(loop_device_unrefp) LoopDevice *loop = NULL;
+ _cleanup_free_ char *devname = NULL;
+ int r;
+
+ assert(!in_initrd());
+
+ /* Run on the final root fs (not in the initrd), to mount auxiliary partitions, and hook in rw
+ * remount and growfs of the root partition */
+
+ r = block_get_whole_disk(devnum, &devnum);
+ if (r < 0)
+ return log_debug_errno(r, "Failed to get whole block device for " DEVNUM_FORMAT_STR ": %m",
+ DEVNUM_FORMAT_VAL(devnum));
+
+ r = devname_from_devnum(S_IFBLK, devnum, &devname);
+ if (r < 0)
+ return log_debug_errno(r, "Failed to get device node of " DEVNUM_FORMAT_STR ": %m",
+ DEVNUM_FORMAT_VAL(devnum));
+
+ /* Let's take a LOCK_SH lock on the block device, in case udevd is already running. If we don't take
+ * the lock, udevd might end up issuing BLKRRPART in the middle, and we don't want that, since that
+ * might remove all partitions while we are operating on them. */
+ r = loop_device_open_from_path(devname, O_RDONLY, LOCK_SH, &loop);
+ if (r < 0)
+ return log_debug_errno(r, "Failed to open %s: %m", devname);
+
+ r = dissect_loop_device(
+ loop,
+ /* verity= */ NULL,
+ /* mount_options= */ NULL,
+ arg_image_policy ?: &image_policy_host,
+ DISSECT_IMAGE_GPT_ONLY|
+ DISSECT_IMAGE_USR_NO_ROOT|
+ DISSECT_IMAGE_DISKSEQ_DEVNODE|
+ DISSECT_IMAGE_ALLOW_EMPTY,
+ /* NB! Unlike most other places where we dissect block devices we do not use
+ * DISSECT_IMAGE_ADD_PARTITION_DEVICES here: we want that the kernel finds the
+ * devices, and udev probes them before we mount them via .mount units much later
+ * on. And thus we also don't set DISSECT_IMAGE_PIN_PARTITION_DEVICES here, because
+ * we don't actually mount anything immediately. */
+ &m);
+ if (r < 0) {
+ bool ok = r == -ENOPKG;
+ dissect_log_error(ok ? LOG_DEBUG : LOG_ERR, r, devname, NULL);
+ return ok ? 0 : r;
+ }
+
+ if (m->partitions[PARTITION_SWAP].found)
+ RET_GATHER(r, add_partition_swap(m->partitions + PARTITION_SWAP));
+
+ RET_GATHER(r, process_loader_partitions(m->partitions + PARTITION_ESP, m->partitions + PARTITION_XBOOTLDR));
+
+ if (m->partitions[PARTITION_HOME].found)
+ RET_GATHER(r, add_partition_mount(PARTITION_HOME, m->partitions + PARTITION_HOME,
+ "home", "/home", "Home Partition"));
+
+ if (m->partitions[PARTITION_SRV].found)
+ RET_GATHER(r, add_partition_mount(PARTITION_SRV, m->partitions + PARTITION_SRV,
+ "srv", "/srv", "Server Data Partition"));
+
+ if (m->partitions[PARTITION_VAR].found)
+ RET_GATHER(r, add_partition_mount(PARTITION_VAR, m->partitions + PARTITION_VAR,
+ "var", "/var", "Variable Data Partition"));
+
+ if (m->partitions[PARTITION_TMP].found)
+ RET_GATHER(r, add_partition_mount(PARTITION_TMP, m->partitions + PARTITION_TMP,
+ "var-tmp", "/var/tmp", "Temporary Data Partition"));
+
+ if (m->partitions[PARTITION_ROOT].found)
+ RET_GATHER(r, add_partition_root_flags(m->partitions + PARTITION_ROOT));
+
+ return r;
+}
+
+static int add_mounts(void) {
+ dev_t devno;
+ int r;
+
+ r = blockdev_get_root(LOG_ERR, &devno);
+ if (r < 0)
+ return r;
+ if (r == 0) {
+ log_debug("Skipping automatic GPT dissection logic, root file system not backed by a (single) whole block device.");
+ return 0;
+ }
+
+ return enumerate_partitions(devno);
+}
+
+static int parse_proc_cmdline_item(const char *key, const char *value, void *data) {
+ int r;
+
+ assert(key);
+
+ if (proc_cmdline_key_streq(key, "systemd.gpt_auto") ||
+ proc_cmdline_key_streq(key, "rd.systemd.gpt_auto")) {
+
+ r = value ? parse_boolean(value) : 1;
+ if (r < 0)
+ log_warning_errno(r, "Failed to parse gpt-auto switch \"%s\", ignoring: %m", value);
+ else
+ arg_enabled = r;
+
+ } else if (streq(key, "root")) {
+
+ if (proc_cmdline_value_missing(key, value))
+ return 0;
+
+ /* Disable root disk logic if there's a root= value
+ * specified (unless it happens to be "gpt-auto") */
+
+ if (!streq(value, "gpt-auto")) {
+ arg_root_enabled = false;
+ log_debug("Disabling root partition auto-detection, root= is defined.");
+ }
+
+ } else if (streq(key, "roothash")) {
+
+ if (proc_cmdline_value_missing(key, value))
+ return 0;
+
+ /* Disable root disk logic if there's roothash= defined (i.e. verity enabled) */
+
+ arg_root_enabled = false;
+
+ } else if (streq(key, "rootfstype")) {
+
+ if (proc_cmdline_value_missing(key, value))
+ return 0;
+
+ return free_and_strdup_warn(&arg_root_fstype, value);
+
+ } else if (streq(key, "rootflags")) {
+
+ if (proc_cmdline_value_missing(key, value))
+ return 0;
+
+ if (!strextend_with_separator(&arg_root_options, ",", value))
+ return log_oom();
+
+ } else if (streq(key, "rw") && !value)
+ arg_root_rw = true;
+ else if (streq(key, "ro") && !value)
+ arg_root_rw = false;
+ else if (proc_cmdline_key_streq(key, "systemd.image_policy"))
+ return parse_image_policy_argument(value, &arg_image_policy);
+
+ else if (streq(key, "systemd.swap")) {
+
+ r = value ? parse_boolean(value) : 1;
+ if (r < 0)
+ log_warning_errno(r, "Failed to parse swap switch \"%s\", ignoring: %m", value);
+ else
+ arg_swap_enabled = r;
+
+ if (!arg_swap_enabled)
+ log_debug("Disabling swap partitions auto-detection, systemd.swap=no is defined.");
+
+ }
+
+ return 0;
+}
+
+static int run(const char *dest, const char *dest_early, const char *dest_late) {
+ int r, k;
+
+ assert_se(arg_dest = dest_late);
+
+ if (detect_container() > 0) {
+ log_debug("In a container, exiting.");
+ return 0;
+ }
+
+ r = proc_cmdline_parse(parse_proc_cmdline_item, NULL, 0);
+ if (r < 0)
+ log_warning_errno(r, "Failed to parse kernel command line, ignoring: %m");
+
+ if (!arg_enabled) {
+ log_debug("Disabled, exiting.");
+ return 0;
+ }
+
+ if (arg_root_enabled)
+ r = add_root_mount();
+
+ if (!in_initrd()) {
+ k = add_mounts();
+ if (r >= 0)
+ r = k;
+ }
+
+ return r;
+}
+
+DEFINE_MAIN_GENERATOR_FUNCTION(run);
diff --git a/src/gpt-auto-generator/meson.build b/src/gpt-auto-generator/meson.build
new file mode 100644
index 0000000..c7cbfbb
--- /dev/null
+++ b/src/gpt-auto-generator/meson.build
@@ -0,0 +1,10 @@
+# SPDX-License-Identifier: LGPL-2.1-or-later
+
+executables += [
+ generator_template + {
+ 'name' : 'systemd-gpt-auto-generator',
+ 'conditions' : ['HAVE_BLKID'],
+ 'sources' : files('gpt-auto-generator.c'),
+ 'dependencies' : libblkid,
+ },
+]