From bff7cd661320119ffc70a396c619682ff3c78fb0 Mon Sep 17 00:00:00 2001 From: Paul Wallrabe <54737071+raballew@users.noreply.github.com> Date: Wed, 16 Aug 2023 16:57:59 +0200 Subject: [PATCH] add inplace var mount --- src/boot/ostree-prepare-root.service | 1 + src/switchroot/ostree-prepare-root.c | 35 ++++++++++++++++++++++++++++ 2 files changed, 36 insertions(+) diff --git a/src/boot/ostree-prepare-root.service b/src/boot/ostree-prepare-root.service index 510d866a4c..fbf22ba5a0 100644 --- a/src/boot/ostree-prepare-root.service +++ b/src/boot/ostree-prepare-root.service @@ -22,6 +22,7 @@ ConditionPathExists=/etc/initrd-release OnFailure=emergency.target After=sysroot.mount Requires=sysroot.mount +Before=systemd-volatile-root.service Before=initrd-root-fs.target [Service] diff --git a/src/switchroot/ostree-prepare-root.c b/src/switchroot/ostree-prepare-root.c index db76de1221..9f77f254b4 100644 --- a/src/switchroot/ostree-prepare-root.c +++ b/src/switchroot/ostree-prepare-root.c @@ -349,6 +349,29 @@ load_composefs_config (GKeyFile *config, GError **error) return g_steal_pointer (&ret); } +static gboolean +copy_selinux_context (const char *src_path, const char *dst_path, GError **error) +{ + ssize_t bytes_read, real_size; + + if (TEMP_FAILURE_RETRY (bytes_read = lgetxattr (src_path, "security.selinux", NULL, 0)) < 0) + { + if (errno == ENODATA || errno == ENOTSUP) + return TRUE; /* no selinux context, we're done */ + return glnx_throw_errno_prefix (error, "lgetxattr(security.selinux)"); + } + + g_autofree guint8 *buf = g_malloc (bytes_read); + if (TEMP_FAILURE_RETRY (real_size = lgetxattr (src_path, "security.selinux", buf, bytes_read)) + < 0) + return glnx_throw_errno_prefix (error, "lgetxattr(security.selinux)"); + + if (lsetxattr (dst_path, "security.selinux", buf, real_size, 0) < 0) + return glnx_throw_errno_prefix (error, "lsetxattr(security.selinux)"); + + return TRUE; +} + int main (int argc, char *argv[]) { @@ -639,6 +662,18 @@ main (int argc, char *argv[]) err (EXIT_FAILURE, "failed to prepare /var bind-mount at %s", srcpath); if (mount ("../../var", "../../var", NULL, MS_BIND | MS_REMOUNT | MS_SILENT, NULL) < 0) err (EXIT_FAILURE, "failed to make writable /var bind-mount at %s", srcpath); + + if (mkdirat (AT_FDCWD, "/inplace", 0731) < 0) + err (EXIT_FAILURE, "Failed to create %s", "/inplace"); + if (mkdirat (AT_FDCWD, "/inplace/var", 0731) < 0) + err (EXIT_FAILURE, "Failed to create %s", "/inplace/var"); + + g_autoptr (GError) local_error = NULL; + if (!copy_selinux_context ("../../var", "/inplace/var", &local_error)) + err (EXIT_FAILURE, "failed to copy /var selinux label: %s", local_error->message); + + if (mount ("../../var", "/inplace/var", NULL, MS_BIND | MS_SILENT, NULL) < 0) + err (EXIT_FAILURE, "failed to bind mount ../../var to /inplace/var"); } /* When running under systemd, /var will be handled by a 'var.mount' unit outside