From 3fec55246854d53412fd34b3beec83a79ad67076 Mon Sep 17 00:00:00 2001 From: Lennart Poettering Date: Tue, 14 Jan 2020 16:53:43 +0100 Subject: docs: rework HTML into GitHub Markdown table Presumably this should render better on https://systemd.io/DISCOVERABLE_PARTITIONS then. As pointed out on: https://github.com/systemd/systemd/pull/14390#issuecomment-574205631 --- docs/DISCOVERABLE_PARTITIONS.md | 186 +++++----------------------------------- 1 file changed, 20 insertions(+), 166 deletions(-) (limited to 'docs') diff --git a/docs/DISCOVERABLE_PARTITIONS.md b/docs/DISCOVERABLE_PARTITIONS.md index d80a667497..8b1a7b46e3 100644 --- a/docs/DISCOVERABLE_PARTITIONS.md +++ b/docs/DISCOVERABLE_PARTITIONS.md @@ -39,172 +39,26 @@ Interface](https://systemd.io/BOOT_LOADER_INTERFACE). ## Defined Partition Type UUIDs - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Partition Type UUIDNameAllowed File SystemsExplanation
44479540-f297-41b2-9af7-d131d5f0458aRoot Partition (x86)Any native, optionally in LUKSOn systems with matching architecture, the first partition with -this type UUID on the disk containing the active EFI ESP is automatically -mounted to the root directory /. If the partition is encrypted with -LUKS or has dm-verity integrity data (see below), the device mapper file will -be named /dev/mapper/root.
4f68bce3-e8cd-4db1-96e7-fbcaf984b709Root Partition (x86-64)
69dad710-2ce4-4e3c-b16c-21a1d49abed3Root Partition (32-bit ARM)
b921b045-1df0-41c3-af44-4c6f280d3faeRoot Partition (64-bit ARM/AArch64)
993d8d3d-f80e-4225-855a-9daf8ed7ea97Root Partition (Itanium/IA-64)
d13c5d3b-b5d1-422a-b29f-9454fdc89d76Root Verity Partition (x86)A dm-verity superblock followed by hash dataOn systems with matching architecture, contains dm-verity -integrity hash data for the matching root partition. If this feature is used -the partition UUID of the root partition should be the first 128bit of the root -hash of the dm-verity hash data, and the partition UUID of this dm-verity -partition should be the final 128bit of it, so that the root partition and its -verity partition can be discovered easily, simply by specifying the root -hash.
2c7357ed-ebd2-46d9-aec1-23d437ec2bf5Root Verity Partition (x86-64)
7386cdf2-203c-47a9-a498-f2ecce45a2d6Root Verity Partition (32-bit ARM)
df3300ce-d69f-4c92-978c-9bfb0f38d820Root Verity Partition (64-bit ARM/AArch64)
86ed10d5-b607-45bb-8957-d350f23d0571Root Verity Partition (Itanium/IA-64)
933ac7e1-2eb4-4f13-b844-0e14e2aef915Home PartitionAny native, optionally in LUKSThe first partition with this type UUID on the disk containing the root -partition is automatically mounted to /home/. If the partition is encrypted -with LUKS, the device mapper file will be named /dev/mapper/home.
3b8f8425-20e0-4f3b-907f-1a25a76f98e8Server Data PartitionAny native, optionally in LUKSThe first partition with this type UUID on the disk containing the root -partition is automatically mounted to /srv/. If the partition is encrypted -with LUKS, the device mapper file will be named /dev/mapper/srv.
4d21b016-b534-45c2-a9fb-5c16e091fd2dVariable Data PartitionAny native, optionally in LUKSThe first partition with this type UUID on the disk containing the root -partition is automatically mounted to /var/ — under the condition that -its partition UUID matches the first 128 bit of HMAC-SHA256(machine-id, -0x4d21b016b53445c2a9fb5c16e091fd2d) (i.e. the SHA256 HMAC hash of the -binary type UUID keyed by the machine ID as read from /etc/machine-id. This -special requirement is made because /var/ (unlike the other partition -types listed here) is inherently private to a specific installation and cannot -possibly be shared between multiple OS installations on the same disk, and thus -should be bound to a specific instance of the OS, identified by its machine ID. -If the partition is encrypted with LUKS, the device mapper file will be named -/dev/mapper/var.
7ec6f557-3bc5-4aca-b293-16ef5df639d1Temporary Data PartitionAny native, optionally in LUKSThe first partition with this type UUID on the disk containing the root -partition is automatically mounted to /var/tmp/. If the partition is -encrypted with LUKS, the device mapper file will be named -/dev/mapper/tmp. Note that the intended mount point is indeed -/var/tmp/, not /tmp/. The latter is typically maintained in -memory via tmpfs and does not require a partition on disk. In some -cases it might be desirable to make /tmp/ persistent too, in which -case it is recommended to make it a symlink or bind mount to -/var/tmp/, thus not requiring its own partition type UUID.
0657fd6d-a4ab-43c4-84e5-0933c84b4f4fSwapSwapAll swap partitions on the disk containing the root partition are automatically enabled.
c12a7328-f81f-11d2-ba4b-00a0c93ec93bEFI System PartitionVFATThe ESP used for the current boot is automatically mounted to -/efi/ (or /boot/ as fallback), unless a different partition -is mounted there (possibly via /etc/fstab, or because the Extended -Boot Loader Partition — see below — exists) or the directory is non-empty on -the root disk. This partition type is defined by the UEFI Specification.
bc13c2ff-59e6-4262-a352-b275fd6f7172Extended Boot Loader PartitionTypically VFATThe Extended Boot Loader Partition (XBOOTLDR) used for the current boot is -automatically mounted to /boot/, unless a different partition is -mounted there (possibly via /etc/fstab) or the directory is non-empty -on the root disk. This partition type is defined by the Boot Loader -Specification.
0fc63daf-8483-4772-8e79-3d69d8477de4Other Data PartitionsAny native, optionally in LUKSNo automatic mounting takes place for other Linux data partitions. This -partition type should be used for all partitions that carry Linux file -systems. The installer needs to mount them explicitly via entries in -/etc/fstab. Optionally, these partitions may be encrypted with LUKS.
+| Partition Type UUID | Name | Allowed File Systems | Explanation | +|---------------------|------|----------------------|-------------| +| `44479540-f297-41b2-9af7-d131d5f0458a` | _Root Partition (x86)_ | Any native, optionally in LUKS | On systems with matching architecture, the first partition with this type UUID on the disk containing the active EFI ESP is automatically mounted to the root directory /. If the partition is encrypted with LUKS or has dm-verity integrity data (see below), the device mapper file will be named `/dev/mapper/root`. | +| `4f68bce3-e8cd-4db1-96e7-fbcaf984b709` | _Root Partition (x86-64)_ | ditto | ditto | +| `69dad710-2ce4-4e3c-b16c-21a1d49abed3` | _Root Partition (32-bit ARM)_ | ditto | ditto | +| `b921b045-1df0-41c3-af44-4c6f280d3fae` | _Root Partition (64-bit ARM/AArch64)_ | ditto | ditto | +| `993d8d3d-f80e-4225-855a-9daf8ed7ea97` | _Root Partition (Itanium/IA-64)_ | ditto | ditto | +| `d13c5d3b-b5d1-422a-b29f-9454fdc89d76` | _Root Verity Partition (x86)_ | A dm-verity superblock followed by hash data | On systems with matching architecture, contains dm-verity integrity hash data for the matching root partition. If this feature is used the partition UUID of the root partition should be the first 128bit of the root hash of the dm-verity hash data, and the partition UUID of this dm-verity partition should be the final 128bit of it, so that the root partition and its verity partition can be discovered easily, simply by specifying the root hash. | +| `2c7357ed-ebd2-46d9-aec1-23d437ec2bf5` | _Root Verity Partition (x86-64)_ | ditto | ditto | +| `7386cdf2-203c-47a9-a498-f2ecce45a2d6` | _Root Verity Partition (32-bit ARM)_ | ditto | ditto | +| `df3300ce-d69f-4c92-978c-9bfb0f38d820` | _Root Verity Partition (64-bit ARM/AArch64)_ | ditto | ditto | +| `86ed10d5-b607-45bb-8957-d350f23d0571` | _Root Verity Partition (Itanium/IA-64)_ | ditto | ditto | +| `933ac7e1-2eb4-4f13-b844-0e14e2aef915` | _Home Partition_ | Any native, optionally in LUKS | The first partition with this type UUID on the disk containing the root partition is automatically mounted to `/home/`. If the partition is encrypted with LUKS, the device mapper file will be named `/dev/mapper/home`. | +| `3b8f8425-20e0-4f3b-907f-1a25a76f98e8` | _Server Data Partition_ | Any native, optionally in LUKS | The first partition with this type UUID on the disk containing the root partition is automatically mounted to `/srv/`. If the partition is encrypted with LUKS, the device mapper file will be named `/dev/mapper/srv`. | +| `4d21b016-b534-45c2-a9fb-5c16e091fd2d` | _Variable Data Partition_ | Any native, optionally in LUKS | The first partition with this type UUID on the disk containing the root partition is automatically mounted to `/var/` — under the condition that its partition UUID matches the first 128 bit of `HMAC-SHA256(machine-id, 0x4d21b016b53445c2a9fb5c16e091fd2d)` (i.e. the SHA256 HMAC hash of the binary type UUID keyed by the machine ID as read from [`/etc/machine-id`](https://www.freedesktop.org/software/systemd/man/machine-id.html). This special requirement is made because `/var/` (unlike the other partition types listed here) is inherently private to a specific installation and cannot possibly be shared between multiple OS installations on the same disk, and thus should be bound to a specific instance of the OS, identified by its machine ID. If the partition is encrypted with LUKS, the device mapper file will be named `/dev/mapper/var`. | +| `7ec6f557-3bc5-4aca-b293-16ef5df639d1` | _Temporary Data Partition_ | Any native, optionally in LUKS | The first partition with this type UUID on the disk containing the root partition is automatically mounted to `/var/tmp/`. If the partition is encrypted with LUKS, the device mapper file will be named `/dev/mapper/tmp`. Note that the intended mount point is indeed `/var/tmp/`, not `/tmp/`. The latter is typically maintained in memory via tmpfs and does not require a partition on disk. In some cases it might be desirable to make `/tmp/` persistent too, in which case it is recommended to make it a symlink or bind mount to `/var/tmp/`, thus not requiring its own partition type UUID. | +| `0657fd6d-a4ab-43c4-84e5-0933c84b4f4f` | _Swap_ | Swap | All swap partitions on the disk containing the root partition are automatically enabled. | +| `c12a7328-f81f-11d2-ba4b-00a0c93ec93b` | _EFI System Partition_ | VFAT | The ESP used for the current boot is automatically mounted to `/efi/` (or `/boot/` as fallback), unless a different partition is mounted there (possibly via `/etc/fstab`, or because the Extended Boot Loader Partition — see below — exists) or the directory is non-empty on the root disk. This partition type is defined by the [UEFI Specification](http://www.uefi.org/specifications). | +| `bc13c2ff-59e6-4262-a352-b275fd6f7172` | _Extended Boot Loader Partition_ | Typically VFAT | The Extended Boot Loader Partition (XBOOTLDR) used for the current boot is automatically mounted to /boot/, unless a different partition is mounted there (possibly via /etc/fstab) or the directory is non-empty on the root disk. This partition type is defined by the [Boot Loader Specification](https://systemd.io/BOOT_LOADER_SPECIFICATION). | +| `0fc63daf-8483-4772-8e79-3d69d8477de4` | _Other Data Partitions_ | Any native, optionally in LUKS | No automatic mounting takes place for other Linux data partitions. This partition type should be used for all partitions that carry Linux file systems. The installer needs to mount them explicitly via entries in /etc/fstab. Optionally, these partitions may be encrypted with LUKS. | Other GPT type IDs might be used on Linux, for example to mark software RAID or LVM partitions. The definitions of those GPT types is outside of the scope of -- cgit v1.2.1