]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/mount.c
service/systemctl: don't consider LSB exit codes 5 and 6 as failure, and decode exit...
[thirdparty/systemd.git] / src / mount.c
CommitLineData
d6c9574f 1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
5cb5a6ff 2
a7334b09
LP
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
5cb5a6ff 22#include <errno.h>
b08d03ff
LP
23#include <stdio.h>
24#include <mntent.h>
ef734fd6 25#include <sys/epoll.h>
e537352b 26#include <signal.h>
5cb5a6ff 27
87f0e418 28#include "unit.h"
5cb5a6ff
LP
29#include "mount.h"
30#include "load-fragment.h"
5cb5a6ff 31#include "load-dropin.h"
b08d03ff 32#include "log.h"
e537352b
LP
33#include "strv.h"
34#include "mount-setup.h"
9e2f7c11 35#include "unit-name.h"
4139c1b2
LP
36#include "mount.h"
37#include "dbus-mount.h"
514f4ef5 38#include "special.h"
5cb5a6ff 39
f50e0a01
LP
40static const UnitActiveState state_translation_table[_MOUNT_STATE_MAX] = {
41 [MOUNT_DEAD] = UNIT_INACTIVE,
42 [MOUNT_MOUNTING] = UNIT_ACTIVATING,
e537352b 43 [MOUNT_MOUNTING_DONE] = UNIT_ACTIVE,
f50e0a01 44 [MOUNT_MOUNTED] = UNIT_ACTIVE,
032ff4af 45 [MOUNT_REMOUNTING] = UNIT_RELOADING,
f50e0a01 46 [MOUNT_UNMOUNTING] = UNIT_DEACTIVATING,
e537352b
LP
47 [MOUNT_MOUNTING_SIGTERM] = UNIT_DEACTIVATING,
48 [MOUNT_MOUNTING_SIGKILL] = UNIT_DEACTIVATING,
032ff4af
LP
49 [MOUNT_REMOUNTING_SIGTERM] = UNIT_RELOADING,
50 [MOUNT_REMOUNTING_SIGKILL] = UNIT_RELOADING,
e537352b
LP
51 [MOUNT_UNMOUNTING_SIGTERM] = UNIT_DEACTIVATING,
52 [MOUNT_UNMOUNTING_SIGKILL] = UNIT_DEACTIVATING,
032ff4af 53 [MOUNT_MAINTENANCE] = UNIT_MAINTENANCE
f50e0a01 54};
5cb5a6ff 55
a16e1123
LP
56static void mount_init(Unit *u) {
57 Mount *m = MOUNT(u);
5cb5a6ff 58
a16e1123
LP
59 assert(u);
60 assert(u->meta.load_state == UNIT_STUB);
61
62 m->timeout_usec = DEFAULT_TIMEOUT_USEC;
3e5235b0
LP
63 m->directory_mode = 0755;
64
c3686083
LP
65 exec_context_init(&m->exec_context);
66
a16e1123
LP
67 /* We need to make sure that /bin/mount is always called in
68 * the same process group as us, so that the autofs kernel
69 * side doesn't send us another mount request while we are
70 * already trying to comply its last one. */
74922904 71 m->exec_context.same_pgrp = true;
8d567588 72
a16e1123
LP
73 m->timer_watch.type = WATCH_INVALID;
74
75 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
8d567588
LP
76}
77
a16e1123 78static void mount_unwatch_control_pid(Mount *m) {
5e94833f
LP
79 assert(m);
80
81 if (m->control_pid <= 0)
82 return;
83
84 unit_unwatch_pid(UNIT(m), m->control_pid);
85 m->control_pid = 0;
86}
87
e537352b
LP
88static void mount_parameters_done(MountParameters *p) {
89 assert(p);
90
91 free(p->what);
92 free(p->options);
93 free(p->fstype);
94
95 p->what = p->options = p->fstype = NULL;
96}
97
87f0e418 98static void mount_done(Unit *u) {
ef734fd6 99 Mount *m = MOUNT(u);
034c6ed7 100
ef734fd6 101 assert(m);
034c6ed7 102
e537352b
LP
103 free(m->where);
104 m->where = NULL;
f50e0a01 105
e537352b
LP
106 mount_parameters_done(&m->parameters_etc_fstab);
107 mount_parameters_done(&m->parameters_proc_self_mountinfo);
108 mount_parameters_done(&m->parameters_fragment);
ef734fd6 109
e537352b
LP
110 exec_context_done(&m->exec_context);
111 exec_command_done_array(m->exec_command, _MOUNT_EXEC_COMMAND_MAX);
112 m->control_command = NULL;
f50e0a01 113
a16e1123 114 mount_unwatch_control_pid(m);
f50e0a01 115
e537352b 116 unit_unwatch_timer(u, &m->timer_watch);
f50e0a01
LP
117}
118
6e2ef85b
LP
119static int mount_add_mount_links(Mount *m) {
120 Meta *other;
b08d03ff
LP
121 int r;
122
6e2ef85b 123 assert(m);
b08d03ff 124
6e2ef85b
LP
125 /* Adds in links to other mount points that might lie below or
126 * above us in the hierarchy */
e537352b 127
6e2ef85b
LP
128 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_MOUNT]) {
129 Mount *n = (Mount*) other;
07b0b134 130
6e2ef85b
LP
131 if (n == m)
132 continue;
b08d03ff 133
6e2ef85b
LP
134 if (n->meta.load_state != UNIT_LOADED)
135 continue;
b08d03ff 136
6e2ef85b 137 if (path_startswith(m->where, n->where)) {
b08d03ff 138
6e2ef85b
LP
139 if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
140 return r;
b08d03ff 141
6e2ef85b
LP
142 if (n->from_etc_fstab || n->from_fragment)
143 if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
144 return r;
b08d03ff 145
6e2ef85b 146 } else if (path_startswith(n->where, m->where)) {
b08d03ff 147
6e2ef85b
LP
148 if ((r = unit_add_dependency(UNIT(m), UNIT_BEFORE, UNIT(n), true)) < 0)
149 return r;
150
151 if (m->from_etc_fstab || m->from_fragment)
152 if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
153 return r;
154 }
155 }
b08d03ff
LP
156
157 return 0;
158}
159
6e2ef85b 160static int mount_add_swap_links(Mount *m) {
ef734fd6 161 Meta *other;
b08d03ff
LP
162 int r;
163
6e2ef85b 164 assert(m);
b08d03ff 165
6e2ef85b
LP
166 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_SWAP])
167 if ((r = swap_add_one_mount_link((Swap*) other, m)) < 0)
168 return r;
b08d03ff 169
6e2ef85b
LP
170 return 0;
171}
b08d03ff 172
01f78473
LP
173static int mount_add_path_links(Mount *m) {
174 Meta *other;
175 int r;
176
177 assert(m);
178
179 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_PATH])
180 if ((r = path_add_one_mount_link((Path*) other, m)) < 0)
181 return r;
182
183 return 0;
184}
185
6e2ef85b
LP
186static int mount_add_automount_links(Mount *m) {
187 Meta *other;
188 int r;
e537352b 189
6e2ef85b 190 assert(m);
b08d03ff 191
6e2ef85b
LP
192 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_AUTOMOUNT])
193 if ((r = automount_add_one_mount_link((Automount*) other, m)) < 0)
194 return r;
b08d03ff 195
6e2ef85b
LP
196 return 0;
197}
b08d03ff 198
6e2ef85b
LP
199static int mount_add_socket_links(Mount *m) {
200 Meta *other;
201 int r;
b08d03ff 202
6e2ef85b 203 assert(m);
b08d03ff 204
6e2ef85b
LP
205 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_SOCKET])
206 if ((r = socket_add_one_mount_link((Socket*) other, m)) < 0)
207 return r;
b08d03ff
LP
208
209 return 0;
210}
211
07b0b134 212static char* mount_test_option(const char *haystack, const char *needle) {
e537352b
LP
213 struct mntent me;
214
215 assert(needle);
216
217 /* Like glibc's hasmntopt(), but works on a string, not a
218 * struct mntent */
219
220 if (!haystack)
221 return false;
222
223 zero(me);
224 me.mnt_opts = (char*) haystack;
225
07b0b134 226 return hasmntopt(&me, needle);
e537352b
LP
227}
228
229static int mount_add_target_links(Mount *m) {
230 const char *target;
231 MountParameters *p;
a16e1123 232 Unit *tu;
e537352b 233 int r;
307e85ef 234 bool noauto, handle, automount, user;
e537352b
LP
235
236 assert(m);
237
238 if (m->from_fragment)
239 p = &m->parameters_fragment;
240 else if (m->from_etc_fstab)
241 p = &m->parameters_etc_fstab;
242 else
243 return 0;
244
07b0b134 245 noauto = !!mount_test_option(p->options, MNTOPT_NOAUTO);
307e85ef 246 user = mount_test_option(p->options, "user") || mount_test_option(p->options, "users");
07b0b134
ML
247 handle = !!mount_test_option(p->options, "comment=systemd.mount");
248 automount = !!mount_test_option(p->options, "comment=systemd.automount");
e537352b 249
e537352b
LP
250 if (mount_test_option(p->options, "_netdev") ||
251 fstype_is_network(p->fstype))
252 target = SPECIAL_REMOTE_FS_TARGET;
253 else
254 target = SPECIAL_LOCAL_FS_TARGET;
255
398ef8ba 256 if ((r = manager_load_unit(m->meta.manager, target, NULL, NULL, &tu)) < 0)
e537352b
LP
257 return r;
258
a3d4e06d 259 if (automount && m->meta.manager->running_as == MANAGER_SYSTEM) {
a16e1123
LP
260 Unit *am;
261
262 if ((r = unit_load_related_unit(UNIT(m), ".automount", &am)) < 0)
9fcc065a 263 return r;
e537352b 264
2c966c03 265 return unit_add_two_dependencies(tu, UNIT_AFTER, UNIT_WANTS, UNIT(am), true);
a16e1123
LP
266 } else {
267
4e85aff4 268 if (!noauto && handle)
a3d4e06d 269 if (user || m->meta.manager->running_as == MANAGER_SYSTEM)
307e85ef
LP
270 if ((r = unit_add_dependency(tu, UNIT_WANTS, UNIT(m), true)) < 0)
271 return r;
a16e1123 272
701cc384 273 return unit_add_dependency(UNIT(m), UNIT_BEFORE, tu, true);
a16e1123 274 }
e537352b
LP
275}
276
2edd4434
LP
277static int mount_add_default_dependencies(Mount *m) {
278 int r;
279
280 assert(m);
281
75d287d3
LP
282 if (m->meta.manager->running_as == MANAGER_SYSTEM &&
283 !path_equal(m->where, "/")) {
2edd4434 284
922cc001 285 if ((r = unit_add_dependency_by_name(UNIT(m), UNIT_AFTER, SPECIAL_FSCK_TARGET, NULL, true)) < 0)
2edd4434
LP
286 return r;
287
69dd2852 288 if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_CONFLICTED_BY, SPECIAL_UMOUNT_TARGET, NULL, true)) < 0)
75d287d3 289 return r;
2edd4434
LP
290 }
291
292 return 0;
293}
294
8d567588
LP
295static int mount_verify(Mount *m) {
296 bool b;
297 char *e;
298 assert(m);
299
8cbef760 300 if (m->meta.load_state != UNIT_LOADED)
8d567588
LP
301 return 0;
302
8cbef760
LP
303 if (!m->from_etc_fstab && !m->from_fragment && !m->from_proc_self_mountinfo)
304 return -ENOENT;
305
a16e1123 306 if (!(e = unit_name_from_path(m->where, ".mount")))
8d567588
LP
307 return -ENOMEM;
308
309 b = unit_has_name(UNIT(m), e);
310 free(e);
311
312 if (!b) {
4cd1fbcc 313 log_error("%s's Where setting doesn't match unit name. Refusing.", m->meta.id);
8d567588
LP
314 return -EINVAL;
315 }
316
4e85aff4 317 if (m->meta.fragment_path && !m->parameters_fragment.what) {
4cd1fbcc 318 log_error("%s's What setting is missing. Refusing.", m->meta.id);
4e85aff4
LP
319 return -EBADMSG;
320 }
321
2e22afe9 322 if (m->exec_context.pam_name && m->exec_context.kill_mode != KILL_CONTROL_GROUP) {
4d0e5dbd
LP
323 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", m->meta.id);
324 return -EINVAL;
325 }
326
8d567588
LP
327 return 0;
328}
329
e537352b
LP
330static int mount_load(Unit *u) {
331 Mount *m = MOUNT(u);
332 int r;
333
334 assert(u);
335 assert(u->meta.load_state == UNIT_STUB);
336
337 if ((r = unit_load_fragment_and_dropin_optional(u)) < 0)
338 return r;
339
340 /* This is a new unit? Then let's add in some extras */
341 if (u->meta.load_state == UNIT_LOADED) {
4e85aff4 342 const char *what = NULL;
6e2ef85b 343
4e85aff4
LP
344 if (m->meta.fragment_path)
345 m->from_fragment = true;
e537352b 346
a16e1123
LP
347 if (!m->where)
348 if (!(m->where = unit_name_to_path(u->meta.id)))
349 return -ENOMEM;
350
351 path_kill_slashes(m->where);
352
4e85aff4
LP
353 if (!m->meta.description)
354 if ((r = unit_set_description(u, m->where)) < 0)
355 return r;
e537352b 356
4e85aff4
LP
357 if (m->from_fragment && m->parameters_fragment.what)
358 what = m->parameters_fragment.what;
359 else if (m->from_etc_fstab && m->parameters_etc_fstab.what)
360 what = m->parameters_etc_fstab.what;
361 else if (m->from_proc_self_mountinfo && m->parameters_proc_self_mountinfo.what)
362 what = m->parameters_proc_self_mountinfo.what;
e537352b 363
4e85aff4 364 if (what)
a3d4e06d 365 if ((r = unit_add_node_link(u, what, u->meta.manager->running_as == MANAGER_SYSTEM)) < 0)
4e85aff4 366 return r;
6e2ef85b
LP
367
368 if ((r = mount_add_mount_links(m)) < 0)
369 return r;
370
371 if ((r = mount_add_socket_links(m)) < 0)
372 return r;
373
374 if ((r = mount_add_swap_links(m)) < 0)
e537352b
LP
375 return r;
376
01f78473
LP
377 if ((r = mount_add_path_links(m)) < 0)
378 return r;
379
6e2ef85b 380 if ((r = mount_add_automount_links(m)) < 0)
e537352b
LP
381 return r;
382
6e2ef85b 383 if ((r = mount_add_target_links(m)) < 0)
e537352b
LP
384 return r;
385
386 if ((r = unit_add_default_cgroup(u)) < 0)
387 return r;
4e67ddd6 388
2edd4434
LP
389 if (m->meta.default_dependencies)
390 if ((r = mount_add_default_dependencies(m)) < 0)
4e67ddd6 391 return r;
e537352b
LP
392 }
393
8d567588 394 return mount_verify(m);
e537352b
LP
395}
396
a16e1123
LP
397static int mount_notify_automount(Mount *m, int status) {
398 Unit *p;
399 int r;
400
401 assert(m);
402
403 if ((r = unit_get_related_unit(UNIT(m), ".automount", &p)) < 0)
404 return r == -ENOENT ? 0 : r;
405
406 return automount_send_ready(AUTOMOUNT(p), status);
407}
408
e537352b
LP
409static void mount_set_state(Mount *m, MountState state) {
410 MountState old_state;
411 assert(m);
412
413 old_state = m->state;
414 m->state = state;
415
416 if (state != MOUNT_MOUNTING &&
417 state != MOUNT_MOUNTING_DONE &&
418 state != MOUNT_REMOUNTING &&
419 state != MOUNT_UNMOUNTING &&
420 state != MOUNT_MOUNTING_SIGTERM &&
421 state != MOUNT_MOUNTING_SIGKILL &&
422 state != MOUNT_UNMOUNTING_SIGTERM &&
423 state != MOUNT_UNMOUNTING_SIGKILL &&
424 state != MOUNT_REMOUNTING_SIGTERM &&
425 state != MOUNT_REMOUNTING_SIGKILL) {
426 unit_unwatch_timer(UNIT(m), &m->timer_watch);
a16e1123 427 mount_unwatch_control_pid(m);
e537352b 428 m->control_command = NULL;
a16e1123 429 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
e537352b
LP
430 }
431
8d567588
LP
432 if (state == MOUNT_MOUNTED ||
433 state == MOUNT_REMOUNTING)
434 mount_notify_automount(m, 0);
435 else if (state == MOUNT_DEAD ||
436 state == MOUNT_UNMOUNTING ||
437 state == MOUNT_MOUNTING_SIGTERM ||
438 state == MOUNT_MOUNTING_SIGKILL ||
439 state == MOUNT_REMOUNTING_SIGTERM ||
440 state == MOUNT_REMOUNTING_SIGKILL ||
441 state == MOUNT_UNMOUNTING_SIGTERM ||
442 state == MOUNT_UNMOUNTING_SIGKILL ||
18c78fb1 443 state == MOUNT_MAINTENANCE)
8d567588
LP
444 mount_notify_automount(m, -ENODEV);
445
e537352b 446 if (state != old_state)
40d50879 447 log_debug("%s changed %s -> %s",
4cd1fbcc 448 m->meta.id,
a16e1123
LP
449 mount_state_to_string(old_state),
450 mount_state_to_string(state));
e537352b
LP
451
452 unit_notify(UNIT(m), state_translation_table[old_state], state_translation_table[state]);
453}
454
455static int mount_coldplug(Unit *u) {
456 Mount *m = MOUNT(u);
a16e1123
LP
457 MountState new_state = MOUNT_DEAD;
458 int r;
e537352b
LP
459
460 assert(m);
461 assert(m->state == MOUNT_DEAD);
462
a16e1123
LP
463 if (m->deserialized_state != m->state)
464 new_state = m->deserialized_state;
465 else if (m->from_proc_self_mountinfo)
466 new_state = MOUNT_MOUNTED;
e537352b 467
a16e1123 468 if (new_state != m->state) {
e537352b 469
a16e1123
LP
470 if (new_state == MOUNT_MOUNTING ||
471 new_state == MOUNT_MOUNTING_DONE ||
472 new_state == MOUNT_REMOUNTING ||
473 new_state == MOUNT_UNMOUNTING ||
474 new_state == MOUNT_MOUNTING_SIGTERM ||
475 new_state == MOUNT_MOUNTING_SIGKILL ||
476 new_state == MOUNT_UNMOUNTING_SIGTERM ||
477 new_state == MOUNT_UNMOUNTING_SIGKILL ||
478 new_state == MOUNT_REMOUNTING_SIGTERM ||
479 new_state == MOUNT_REMOUNTING_SIGKILL) {
e537352b 480
a16e1123
LP
481 if (m->control_pid <= 0)
482 return -EBADMSG;
e537352b 483
a16e1123
LP
484 if ((r = unit_watch_pid(UNIT(m), m->control_pid)) < 0)
485 return r;
e537352b 486
a16e1123
LP
487 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
488 return r;
489 }
e537352b 490
a16e1123
LP
491 mount_set_state(m, new_state);
492 }
e537352b
LP
493
494 return 0;
e537352b
LP
495}
496
497static void mount_dump(Unit *u, FILE *f, const char *prefix) {
498 Mount *m = MOUNT(u);
499 MountParameters *p;
500
501 assert(m);
502 assert(f);
503
504 if (m->from_proc_self_mountinfo)
505 p = &m->parameters_proc_self_mountinfo;
506 else if (m->from_fragment)
507 p = &m->parameters_fragment;
508 else
509 p = &m->parameters_etc_fstab;
510
511 fprintf(f,
512 "%sMount State: %s\n"
513 "%sWhere: %s\n"
514 "%sWhat: %s\n"
515 "%sFile System Type: %s\n"
516 "%sOptions: %s\n"
517 "%sFrom /etc/fstab: %s\n"
518 "%sFrom /proc/self/mountinfo: %s\n"
519 "%sFrom fragment: %s\n"
3e5235b0 520 "%sDirectoryMode: %04o\n",
a16e1123 521 prefix, mount_state_to_string(m->state),
e537352b
LP
522 prefix, m->where,
523 prefix, strna(p->what),
524 prefix, strna(p->fstype),
525 prefix, strna(p->options),
526 prefix, yes_no(m->from_etc_fstab),
527 prefix, yes_no(m->from_proc_self_mountinfo),
528 prefix, yes_no(m->from_fragment),
3e5235b0 529 prefix, m->directory_mode);
e537352b
LP
530
531 if (m->control_pid > 0)
532 fprintf(f,
bb00e604
LP
533 "%sControl PID: %lu\n",
534 prefix, (unsigned long) m->control_pid);
e537352b
LP
535
536 exec_context_dump(&m->exec_context, f, prefix);
537}
538
a16e1123
LP
539static int mount_spawn(Mount *m, ExecCommand *c, pid_t *_pid) {
540 pid_t pid;
541 int r;
542
543 assert(m);
544 assert(c);
545 assert(_pid);
546
547 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
548 goto fail;
549
550 if ((r = exec_spawn(c,
551 NULL,
552 &m->exec_context,
553 NULL, 0,
1137a57c 554 m->meta.manager->environment,
a16e1123
LP
555 true,
556 true,
1e3ad081 557 true,
c3686083 558 m->meta.manager->confirm_spawn,
4cd1fbcc 559 m->meta.cgroup_bondings,
a16e1123
LP
560 &pid)) < 0)
561 goto fail;
562
563 if ((r = unit_watch_pid(UNIT(m), pid)) < 0)
564 /* FIXME: we need to do something here */
565 goto fail;
566
567 *_pid = pid;
568
569 return 0;
570
571fail:
572 unit_unwatch_timer(UNIT(m), &m->timer_watch);
573
574 return r;
575}
576
e537352b
LP
577static void mount_enter_dead(Mount *m, bool success) {
578 assert(m);
579
580 if (!success)
581 m->failure = true;
582
18c78fb1 583 mount_set_state(m, m->failure ? MOUNT_MAINTENANCE : MOUNT_DEAD);
e537352b
LP
584}
585
80876c20
LP
586static void mount_enter_mounted(Mount *m, bool success) {
587 assert(m);
588
589 if (!success)
590 m->failure = true;
591
592 mount_set_state(m, MOUNT_MOUNTED);
593}
594
e537352b
LP
595static void mount_enter_signal(Mount *m, MountState state, bool success) {
596 int r;
80876c20 597 bool sent = false;
e537352b
LP
598
599 assert(m);
600
601 if (!success)
602 m->failure = true;
603
2e22afe9 604 if (m->exec_context.kill_mode != KILL_NONE) {
80876c20
LP
605 int sig = (state == MOUNT_MOUNTING_SIGTERM ||
606 state == MOUNT_UNMOUNTING_SIGTERM ||
2e22afe9 607 state == MOUNT_REMOUNTING_SIGTERM) ? m->exec_context.kill_signal : SIGKILL;
e537352b 608
2e22afe9 609 if (m->exec_context.kill_mode == KILL_CONTROL_GROUP) {
e537352b 610
4cd1fbcc 611 if ((r = cgroup_bonding_kill_list(m->meta.cgroup_bondings, sig)) < 0) {
e537352b
LP
612 if (r != -EAGAIN && r != -ESRCH)
613 goto fail;
614 } else
615 sent = true;
616 }
617
80876c20 618 if (!sent && m->control_pid > 0)
2e22afe9
LP
619 if (kill(m->exec_context.kill_mode == KILL_PROCESS ?
620 m->control_pid :
621 -m->control_pid, sig) < 0 && errno != ESRCH) {
622
e537352b
LP
623 r = -errno;
624 goto fail;
625 }
626 }
627
80876c20
LP
628 if (sent) {
629 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
630 goto fail;
e537352b 631
80876c20
LP
632 mount_set_state(m, state);
633 } else if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
634 mount_enter_mounted(m, true);
635 else
e537352b
LP
636 mount_enter_dead(m, true);
637
638 return;
639
640fail:
4cd1fbcc 641 log_warning("%s failed to kill processes: %s", m->meta.id, strerror(-r));
e537352b 642
80876c20
LP
643 if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
644 mount_enter_mounted(m, false);
645 else
646 mount_enter_dead(m, false);
e537352b
LP
647}
648
649static void mount_enter_unmounting(Mount *m, bool success) {
e537352b
LP
650 int r;
651
652 assert(m);
653
654 if (!success)
655 m->failure = true;
656
a16e1123
LP
657 m->control_command_id = MOUNT_EXEC_UNMOUNT;
658 m->control_command = m->exec_command + MOUNT_EXEC_UNMOUNT;
e537352b
LP
659
660 if ((r = exec_command_set(
a16e1123 661 m->control_command,
e537352b
LP
662 "/bin/umount",
663 m->where,
664 NULL)) < 0)
665 goto fail;
666
a16e1123 667 mount_unwatch_control_pid(m);
5e94833f 668
a16e1123 669 if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
e537352b
LP
670 goto fail;
671
672 mount_set_state(m, MOUNT_UNMOUNTING);
673
674 return;
675
676fail:
4cd1fbcc 677 log_warning("%s failed to run 'umount' task: %s", m->meta.id, strerror(-r));
e537352b
LP
678 mount_enter_mounted(m, false);
679}
680
8d567588 681static void mount_enter_mounting(Mount *m) {
e537352b
LP
682 int r;
683
684 assert(m);
685
a16e1123
LP
686 m->control_command_id = MOUNT_EXEC_MOUNT;
687 m->control_command = m->exec_command + MOUNT_EXEC_MOUNT;
e537352b 688
3e5235b0
LP
689 mkdir_p(m->where, m->directory_mode);
690
e537352b
LP
691 if (m->from_fragment)
692 r = exec_command_set(
a16e1123 693 m->control_command,
e537352b
LP
694 "/bin/mount",
695 m->parameters_fragment.what,
696 m->where,
697 "-t", m->parameters_fragment.fstype,
8d567588 698 m->parameters_fragment.options ? "-o" : NULL, m->parameters_fragment.options,
e537352b
LP
699 NULL);
700 else if (m->from_etc_fstab)
701 r = exec_command_set(
a16e1123 702 m->control_command,
e537352b
LP
703 "/bin/mount",
704 m->where,
705 NULL);
706 else
707 r = -ENOENT;
708
709 if (r < 0)
710 goto fail;
711
a16e1123 712 mount_unwatch_control_pid(m);
5e94833f 713
a16e1123 714 if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
e537352b
LP
715 goto fail;
716
717 mount_set_state(m, MOUNT_MOUNTING);
718
719 return;
720
721fail:
4cd1fbcc 722 log_warning("%s failed to run 'mount' task: %s", m->meta.id, strerror(-r));
e537352b
LP
723 mount_enter_dead(m, false);
724}
725
8d567588 726static void mount_enter_mounting_done(Mount *m) {
e537352b
LP
727 assert(m);
728
e537352b
LP
729 mount_set_state(m, MOUNT_MOUNTING_DONE);
730}
731
732static void mount_enter_remounting(Mount *m, bool success) {
e537352b
LP
733 int r;
734
735 assert(m);
736
737 if (!success)
738 m->failure = true;
739
a16e1123
LP
740 m->control_command_id = MOUNT_EXEC_REMOUNT;
741 m->control_command = m->exec_command + MOUNT_EXEC_REMOUNT;
e537352b
LP
742
743 if (m->from_fragment) {
744 char *buf = NULL;
745 const char *o;
746
747 if (m->parameters_fragment.options) {
748 if (!(buf = strappend("remount,", m->parameters_fragment.options))) {
749 r = -ENOMEM;
750 goto fail;
751 }
752
753 o = buf;
754 } else
755 o = "remount";
756
757 r = exec_command_set(
a16e1123 758 m->control_command,
e537352b
LP
759 "/bin/mount",
760 m->parameters_fragment.what,
761 m->where,
762 "-t", m->parameters_fragment.fstype,
763 "-o", o,
764 NULL);
765
766 free(buf);
767 } else if (m->from_etc_fstab)
768 r = exec_command_set(
a16e1123 769 m->control_command,
e537352b
LP
770 "/bin/mount",
771 m->where,
772 "-o", "remount",
773 NULL);
774 else
775 r = -ENOENT;
776
777 if (r < 0) {
778 r = -ENOMEM;
779 goto fail;
780 }
781
a16e1123 782 mount_unwatch_control_pid(m);
5e94833f 783
a16e1123 784 if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
e537352b
LP
785 goto fail;
786
787 mount_set_state(m, MOUNT_REMOUNTING);
788
789 return;
790
791fail:
e364ad06 792 log_warning("%s failed to run 'remount' task: %s", m->meta.id, strerror(-r));
e537352b
LP
793 mount_enter_mounted(m, false);
794}
795
796static int mount_start(Unit *u) {
797 Mount *m = MOUNT(u);
798
799 assert(m);
800
801 /* We cannot fulfill this request right now, try again later
802 * please! */
803 if (m->state == MOUNT_UNMOUNTING ||
804 m->state == MOUNT_UNMOUNTING_SIGTERM ||
805 m->state == MOUNT_UNMOUNTING_SIGKILL)
806 return -EAGAIN;
807
808 /* Already on it! */
809 if (m->state == MOUNT_MOUNTING ||
810 m->state == MOUNT_MOUNTING_SIGTERM ||
811 m->state == MOUNT_MOUNTING_SIGKILL)
812 return 0;
813
18c78fb1 814 assert(m->state == MOUNT_DEAD || m->state == MOUNT_MAINTENANCE);
e537352b
LP
815
816 m->failure = false;
8d567588 817 mount_enter_mounting(m);
e537352b
LP
818 return 0;
819}
820
821static int mount_stop(Unit *u) {
822 Mount *m = MOUNT(u);
823
824 assert(m);
825
e537352b
LP
826 /* Already on it */
827 if (m->state == MOUNT_UNMOUNTING ||
828 m->state == MOUNT_UNMOUNTING_SIGKILL ||
829 m->state == MOUNT_UNMOUNTING_SIGTERM)
830 return 0;
831
3f6c78dc
LP
832 assert(m->state == MOUNT_MOUNTING ||
833 m->state == MOUNT_MOUNTING_DONE ||
834 m->state == MOUNT_MOUNTED ||
835 m->state == MOUNT_MOUNTING_SIGTERM ||
836 m->state == MOUNT_MOUNTING_SIGKILL ||
837 m->state == MOUNT_REMOUNTING ||
838 m->state == MOUNT_REMOUNTING_SIGTERM ||
839 m->state == MOUNT_REMOUNTING_SIGKILL);
e537352b
LP
840
841 mount_enter_unmounting(m, true);
842 return 0;
843}
844
845static int mount_reload(Unit *u) {
846 Mount *m = MOUNT(u);
847
848 assert(m);
849
850 if (m->state == MOUNT_MOUNTING_DONE)
851 return -EAGAIN;
852
853 assert(m->state == MOUNT_MOUNTED);
854
855 mount_enter_remounting(m, true);
856 return 0;
857}
858
a16e1123
LP
859static int mount_serialize(Unit *u, FILE *f, FDSet *fds) {
860 Mount *m = MOUNT(u);
861
862 assert(m);
863 assert(f);
864 assert(fds);
865
866 unit_serialize_item(u, f, "state", mount_state_to_string(m->state));
867 unit_serialize_item(u, f, "failure", yes_no(m->failure));
868
869 if (m->control_pid > 0)
5925dd3c 870 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) m->control_pid);
a16e1123
LP
871
872 if (m->control_command_id >= 0)
873 unit_serialize_item(u, f, "control-command", mount_exec_command_to_string(m->control_command_id));
874
875 return 0;
876}
877
878static int mount_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
879 Mount *m = MOUNT(u);
a16e1123
LP
880
881 assert(u);
882 assert(key);
883 assert(value);
884 assert(fds);
885
886 if (streq(key, "state")) {
887 MountState state;
888
889 if ((state = mount_state_from_string(value)) < 0)
890 log_debug("Failed to parse state value %s", value);
891 else
892 m->deserialized_state = state;
893 } else if (streq(key, "failure")) {
894 int b;
895
896 if ((b = parse_boolean(value)) < 0)
897 log_debug("Failed to parse failure value %s", value);
898 else
899 m->failure = b || m->failure;
900
901 } else if (streq(key, "control-pid")) {
5925dd3c 902 pid_t pid;
a16e1123 903
e364ad06 904 if (parse_pid(value, &pid) < 0)
a16e1123
LP
905 log_debug("Failed to parse control-pid value %s", value);
906 else
5925dd3c 907 m->control_pid = pid;
a16e1123
LP
908 } else if (streq(key, "control-command")) {
909 MountExecCommand id;
910
911 if ((id = mount_exec_command_from_string(value)) < 0)
912 log_debug("Failed to parse exec-command value %s", value);
913 else {
914 m->control_command_id = id;
915 m->control_command = m->exec_command + id;
916 }
917
918 } else
919 log_debug("Unknown serialization key '%s'", key);
920
921 return 0;
922}
923
e537352b
LP
924static UnitActiveState mount_active_state(Unit *u) {
925 assert(u);
926
927 return state_translation_table[MOUNT(u)->state];
928}
929
10a94420
LP
930static const char *mount_sub_state_to_string(Unit *u) {
931 assert(u);
932
a16e1123 933 return mount_state_to_string(MOUNT(u)->state);
10a94420
LP
934}
935
701cc384
LP
936static bool mount_check_gc(Unit *u) {
937 Mount *m = MOUNT(u);
938
939 assert(m);
940
941 return m->from_etc_fstab || m->from_proc_self_mountinfo;
942}
943
e537352b
LP
944static void mount_sigchld_event(Unit *u, pid_t pid, int code, int status) {
945 Mount *m = MOUNT(u);
946 bool success;
947
948 assert(m);
949 assert(pid >= 0);
950
8c47c732
LP
951 if (pid != m->control_pid)
952 return;
e537352b 953
e537352b
LP
954 m->control_pid = 0;
955
8c47c732
LP
956 success = is_clean_exit(code, status);
957 m->failure = m->failure || !success;
958
a16e1123 959 if (m->control_command) {
b58b4116 960 exec_status_exit(&m->control_command->exec_status, pid, code, status);
a16e1123
LP
961 m->control_command = NULL;
962 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
963 }
964
92abbefb
LP
965 log_full(success ? LOG_DEBUG : LOG_NOTICE,
966 "%s mount process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
e537352b
LP
967
968 /* Note that mount(8) returning and the kernel sending us a
969 * mount table change event might happen out-of-order. If an
970 * operation succeed we assume the kernel will follow soon too
971 * and already change into the resulting state. If it fails
972 * we check if the kernel still knows about the mount. and
973 * change state accordingly. */
974
975 switch (m->state) {
976
977 case MOUNT_MOUNTING:
978 case MOUNT_MOUNTING_DONE:
979 case MOUNT_MOUNTING_SIGKILL:
980 case MOUNT_MOUNTING_SIGTERM:
981 case MOUNT_REMOUNTING:
982 case MOUNT_REMOUNTING_SIGKILL:
983 case MOUNT_REMOUNTING_SIGTERM:
984
19b160fa 985 if (success)
e537352b
LP
986 mount_enter_mounted(m, true);
987 else if (m->from_proc_self_mountinfo)
988 mount_enter_mounted(m, false);
989 else
990 mount_enter_dead(m, false);
991 break;
992
993 case MOUNT_UNMOUNTING:
994 case MOUNT_UNMOUNTING_SIGKILL:
995 case MOUNT_UNMOUNTING_SIGTERM:
996
997 if (success)
998 mount_enter_dead(m, true);
999 else if (m->from_proc_self_mountinfo)
1000 mount_enter_mounted(m, false);
1001 else
1002 mount_enter_dead(m, false);
1003 break;
1004
1005 default:
1006 assert_not_reached("Uh, control process died at wrong time.");
1007 }
1008}
1009
1010static void mount_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
1011 Mount *m = MOUNT(u);
1012
1013 assert(m);
1014 assert(elapsed == 1);
1015 assert(w == &m->timer_watch);
1016
1017 switch (m->state) {
1018
1019 case MOUNT_MOUNTING:
1020 case MOUNT_MOUNTING_DONE:
9e2f7c11 1021 log_warning("%s mounting timed out. Stopping.", u->meta.id);
e537352b
LP
1022 mount_enter_signal(m, MOUNT_MOUNTING_SIGTERM, false);
1023 break;
1024
1025 case MOUNT_REMOUNTING:
9e2f7c11 1026 log_warning("%s remounting timed out. Stopping.", u->meta.id);
e537352b
LP
1027 mount_enter_signal(m, MOUNT_REMOUNTING_SIGTERM, false);
1028 break;
1029
1030 case MOUNT_UNMOUNTING:
9e2f7c11 1031 log_warning("%s unmounting timed out. Stopping.", u->meta.id);
e537352b
LP
1032 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGTERM, false);
1033 break;
1034
1035 case MOUNT_MOUNTING_SIGTERM:
9e2f7c11 1036 log_warning("%s mounting timed out. Killing.", u->meta.id);
e537352b
LP
1037 mount_enter_signal(m, MOUNT_MOUNTING_SIGKILL, false);
1038 break;
1039
1040 case MOUNT_REMOUNTING_SIGTERM:
9e2f7c11 1041 log_warning("%s remounting timed out. Killing.", u->meta.id);
e537352b
LP
1042 mount_enter_signal(m, MOUNT_REMOUNTING_SIGKILL, false);
1043 break;
1044
1045 case MOUNT_UNMOUNTING_SIGTERM:
9e2f7c11 1046 log_warning("%s unmounting timed out. Killing.", u->meta.id);
e537352b
LP
1047 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGKILL, false);
1048 break;
1049
1050 case MOUNT_MOUNTING_SIGKILL:
1051 case MOUNT_REMOUNTING_SIGKILL:
1052 case MOUNT_UNMOUNTING_SIGKILL:
9e2f7c11 1053 log_warning("%s mount process still around after SIGKILL. Ignoring.", u->meta.id);
e537352b
LP
1054
1055 if (m->from_proc_self_mountinfo)
1056 mount_enter_mounted(m, false);
1057 else
1058 mount_enter_dead(m, false);
1059 break;
1060
1061 default:
1062 assert_not_reached("Timeout at wrong time.");
1063 }
1064}
1065
1066static int mount_add_one(
1067 Manager *m,
1068 const char *what,
1069 const char *where,
1070 const char *options,
1071 const char *fstype,
1072 bool from_proc_self_mountinfo,
1073 bool set_flags) {
b08d03ff
LP
1074 int r;
1075 Unit *u;
1076 bool delete;
e537352b 1077 char *e, *w = NULL, *o = NULL, *f = NULL;
4e85aff4 1078 MountParameters *p;
b08d03ff 1079
f50e0a01 1080 assert(m);
b08d03ff
LP
1081 assert(what);
1082 assert(where);
e537352b
LP
1083 assert(options);
1084 assert(fstype);
1085
1086 assert(!set_flags || from_proc_self_mountinfo);
1087
1088 /* Ignore API mount points. They should never be referenced in
1089 * dependencies ever. */
1090 if (mount_point_is_api(where))
1091 return 0;
b08d03ff 1092
8d567588
LP
1093 if (streq(fstype, "autofs"))
1094 return 0;
1095
4e85aff4
LP
1096 /* probably some kind of swap, ignore */
1097 if (!is_path(where))
b08d03ff
LP
1098 return 0;
1099
a16e1123 1100 if (!(e = unit_name_from_path(where, ".mount")))
b08d03ff
LP
1101 return -ENOMEM;
1102
1103 if (!(u = manager_get_unit(m, e))) {
1104 delete = true;
1105
1106 if (!(u = unit_new(m))) {
1107 free(e);
1108 return -ENOMEM;
1109 }
1110
1111 r = unit_add_name(u, e);
1112 free(e);
1113
1114 if (r < 0)
1115 goto fail;
1116
e537352b 1117 if (!(MOUNT(u)->where = strdup(where))) {
07b0b134
ML
1118 r = -ENOMEM;
1119 goto fail;
1120 }
f50e0a01 1121
f94ea366 1122 unit_add_to_load_queue(u);
b08d03ff
LP
1123 } else {
1124 delete = false;
1125 free(e);
1126 }
1127
e537352b
LP
1128 if (!(w = strdup(what)) ||
1129 !(o = strdup(options)) ||
1130 !(f = strdup(fstype))) {
1131 r = -ENOMEM;
1132 goto fail;
1133 }
1134
1135 if (from_proc_self_mountinfo) {
4e85aff4 1136 p = &MOUNT(u)->parameters_proc_self_mountinfo;
e537352b
LP
1137
1138 if (set_flags) {
1139 MOUNT(u)->is_mounted = true;
1140 MOUNT(u)->just_mounted = !MOUNT(u)->from_proc_self_mountinfo;
4e85aff4 1141 MOUNT(u)->just_changed = !streq_ptr(p->options, o);
e537352b 1142 }
ef734fd6 1143
f50e0a01 1144 MOUNT(u)->from_proc_self_mountinfo = true;
ef734fd6 1145 } else {
4e85aff4 1146 p = &MOUNT(u)->parameters_etc_fstab;
f50e0a01 1147 MOUNT(u)->from_etc_fstab = true;
ef734fd6 1148 }
f50e0a01 1149
4e85aff4
LP
1150 free(p->what);
1151 p->what = w;
b08d03ff 1152
4e85aff4
LP
1153 free(p->options);
1154 p->options = o;
e537352b 1155
4e85aff4
LP
1156 free(p->fstype);
1157 p->fstype = f;
b08d03ff 1158
c1e1601e
LP
1159 unit_add_to_dbus_queue(u);
1160
b08d03ff
LP
1161 return 0;
1162
1163fail:
e537352b
LP
1164 free(w);
1165 free(o);
1166 free(f);
1167
b08d03ff
LP
1168 if (delete && u)
1169 unit_free(u);
1170
4e85aff4 1171 return r;
b08d03ff
LP
1172}
1173
1174static char *fstab_node_to_udev_node(char *p) {
1175 char *dn, *t;
1176 int r;
1177
1178 /* FIXME: to follow udev's logic 100% we need to leave valid
1179 * UTF8 chars unescaped */
1180
1181 if (startswith(p, "LABEL=")) {
1182
f50e0a01 1183 if (!(t = xescape(p+6, "/ ")))
b08d03ff
LP
1184 return NULL;
1185
f50e0a01 1186 r = asprintf(&dn, "/dev/disk/by-label/%s", t);
b08d03ff
LP
1187 free(t);
1188
1189 if (r < 0)
1190 return NULL;
1191
1192 return dn;
1193 }
1194
1195 if (startswith(p, "UUID=")) {
1196
f50e0a01 1197 if (!(t = xescape(p+5, "/ ")))
b08d03ff
LP
1198 return NULL;
1199
f50e0a01 1200 r = asprintf(&dn, "/dev/disk/by-uuid/%s", ascii_strlower(t));
b08d03ff
LP
1201 free(t);
1202
1203 if (r < 0)
1204 return NULL;
1205
1206 return dn;
1207 }
1208
1209 return strdup(p);
1210}
1211
07b0b134
ML
1212static int mount_find_pri(char *options) {
1213 char *end, *pri;
1214 unsigned long r;
1215
1216 if (!(pri = mount_test_option(options, "pri=")))
1217 return 0;
1218
1219 pri += 4;
1220
1221 errno = 0;
1222 r = strtoul(pri, &end, 10);
1223
1224 if (errno != 0)
1225 return -errno;
1226
1227 if (end == pri || (*end != ',' && *end != 0))
1228 return -EINVAL;
1229
1230 return (int) r;
1231}
1232
e537352b 1233static int mount_load_etc_fstab(Manager *m) {
b08d03ff
LP
1234 FILE *f;
1235 int r;
1236 struct mntent* me;
1237
1238 assert(m);
1239
1240 errno = 0;
1241 if (!(f = setmntent("/etc/fstab", "r")))
1242 return -errno;
1243
1244 while ((me = getmntent(f))) {
1245 char *where, *what;
1246
1247 if (!(what = fstab_node_to_udev_node(me->mnt_fsname))) {
1248 r = -ENOMEM;
1249 goto finish;
1250 }
1251
1252 if (!(where = strdup(me->mnt_dir))) {
1253 free(what);
1254 r = -ENOMEM;
1255 goto finish;
1256 }
1257
1258 if (what[0] == '/')
1259 path_kill_slashes(what);
1260
1261 if (where[0] == '/')
1262 path_kill_slashes(where);
1263
07b0b134
ML
1264 if (streq(me->mnt_type, "swap")) {
1265 int pri;
1266
1267 if ((pri = mount_find_pri(me->mnt_opts)) < 0)
1268 r = pri;
1269 else
1270 r = swap_add_one(m,
1271 what,
07b0b134 1272 pri,
4e85aff4
LP
1273 !!mount_test_option(me->mnt_opts, MNTOPT_NOAUTO),
1274 !!mount_test_option(me->mnt_opts, "comment=systemd.swapon"),
07b0b134
ML
1275 false);
1276 } else
1277 r = mount_add_one(m, what, where, me->mnt_opts, me->mnt_type, false, false);
1278
b08d03ff
LP
1279 free(what);
1280 free(where);
1281
1282 if (r < 0)
1283 goto finish;
1284 }
1285
1286 r = 0;
1287finish:
1288
1289 endmntent(f);
1290 return r;
1291}
1292
ef734fd6 1293static int mount_load_proc_self_mountinfo(Manager *m, bool set_flags) {
b08d03ff 1294 int r;
a2e0f3d3 1295 char *device, *path, *options, *options2, *fstype, *d, *p, *o;
b08d03ff
LP
1296
1297 assert(m);
1298
ef734fd6 1299 rewind(m->proc_self_mountinfo);
b08d03ff
LP
1300
1301 for (;;) {
1302 int k;
e537352b 1303
a2e0f3d3 1304 device = path = options = options2 = fstype = d = p = o = NULL;
b08d03ff 1305
ef734fd6 1306 if ((k = fscanf(m->proc_self_mountinfo,
b08d03ff
LP
1307 "%*s " /* (1) mount id */
1308 "%*s " /* (2) parent id */
1309 "%*s " /* (3) major:minor */
1310 "%*s " /* (4) root */
1311 "%ms " /* (5) mount point */
e537352b 1312 "%ms" /* (6) mount options */
b08d03ff
LP
1313 "%*[^-]" /* (7) optional fields */
1314 "- " /* (8) seperator */
e537352b 1315 "%ms " /* (9) file system type */
ef734fd6 1316 "%ms" /* (10) mount source */
a2e0f3d3 1317 "%ms" /* (11) mount options 2 */
ef734fd6 1318 "%*[^\n]", /* some rubbish at the end */
b08d03ff 1319 &path,
e537352b
LP
1320 &options,
1321 &fstype,
a2e0f3d3
LP
1322 &device,
1323 &options2)) != 5) {
b08d03ff 1324
ef734fd6
LP
1325 if (k == EOF)
1326 break;
b08d03ff 1327
e537352b
LP
1328 r = -EBADMSG;
1329 goto finish;
b08d03ff
LP
1330 }
1331
a2e0f3d3
LP
1332 if (asprintf(&o, "%s,%s", options, options2) < 0) {
1333 r = -ENOMEM;
1334 goto finish;
1335 }
1336
e537352b
LP
1337 if (!(d = cunescape(device)) ||
1338 !(p = cunescape(path))) {
1339 r = -ENOMEM;
1340 goto finish;
b08d03ff 1341 }
b08d03ff 1342
a2e0f3d3 1343 if ((r = mount_add_one(m, d, p, o, fstype, true, set_flags)) < 0)
e537352b 1344 goto finish;
b08d03ff 1345
e537352b
LP
1346 free(device);
1347 free(path);
1348 free(options);
a2e0f3d3 1349 free(options2);
e537352b 1350 free(fstype);
b08d03ff
LP
1351 free(d);
1352 free(p);
a2e0f3d3 1353 free(o);
b08d03ff
LP
1354 }
1355
e537352b
LP
1356 r = 0;
1357
1358finish:
1359 free(device);
1360 free(path);
1361 free(options);
a2e0f3d3 1362 free(options2);
e537352b
LP
1363 free(fstype);
1364 free(d);
1365 free(p);
a2e0f3d3 1366 free(o);
e537352b
LP
1367
1368 return r;
1369}
1370
1371static void mount_shutdown(Manager *m) {
1372 assert(m);
1373
a16e1123 1374 if (m->proc_self_mountinfo) {
e537352b 1375 fclose(m->proc_self_mountinfo);
a16e1123
LP
1376 m->proc_self_mountinfo = NULL;
1377 }
b08d03ff
LP
1378}
1379
1380static int mount_enumerate(Manager *m) {
1381 int r;
ef734fd6 1382 struct epoll_event ev;
b08d03ff
LP
1383 assert(m);
1384
a16e1123
LP
1385 if (!m->proc_self_mountinfo) {
1386 if (!(m->proc_self_mountinfo = fopen("/proc/self/mountinfo", "re")))
1387 return -errno;
ef734fd6 1388
a16e1123
LP
1389 m->mount_watch.type = WATCH_MOUNT;
1390 m->mount_watch.fd = fileno(m->proc_self_mountinfo);
ef734fd6 1391
a16e1123
LP
1392 zero(ev);
1393 ev.events = EPOLLERR;
1394 ev.data.ptr = &m->mount_watch;
ef734fd6 1395
a16e1123
LP
1396 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->mount_watch.fd, &ev) < 0)
1397 return -errno;
1398 }
ef734fd6 1399
e537352b 1400 if ((r = mount_load_etc_fstab(m)) < 0)
b08d03ff
LP
1401 goto fail;
1402
ef734fd6 1403 if ((r = mount_load_proc_self_mountinfo(m, false)) < 0)
b08d03ff
LP
1404 goto fail;
1405
1406 return 0;
1407
1408fail:
1409 mount_shutdown(m);
1410 return r;
5cb5a6ff
LP
1411}
1412
ef734fd6
LP
1413void mount_fd_event(Manager *m, int events) {
1414 Meta *meta;
1415 int r;
1416
1417 assert(m);
f94ea366 1418 assert(events == EPOLLERR);
ef734fd6
LP
1419
1420 /* The manager calls this for every fd event happening on the
1421 * /proc/self/mountinfo file, which informs us about mounting
1422 * table changes */
1423
1424 if ((r = mount_load_proc_self_mountinfo(m, true)) < 0) {
e364ad06 1425 log_error("Failed to reread /proc/self/mountinfo: %s", strerror(-r));
e537352b
LP
1426
1427 /* Reset flags, just in case, for later calls */
1428 LIST_FOREACH(units_per_type, meta, m->units_per_type[UNIT_MOUNT]) {
1429 Mount *mount = (Mount*) meta;
1430
1431 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1432 }
1433
ef734fd6
LP
1434 return;
1435 }
1436
1437 manager_dispatch_load_queue(m);
1438
1439 LIST_FOREACH(units_per_type, meta, m->units_per_type[UNIT_MOUNT]) {
1440 Mount *mount = (Mount*) meta;
1441
e537352b
LP
1442 if (!mount->is_mounted) {
1443 /* This has just been unmounted. */
1444
ef734fd6 1445 mount->from_proc_self_mountinfo = false;
e537352b
LP
1446
1447 switch (mount->state) {
1448
1449 case MOUNT_MOUNTED:
1450 mount_enter_dead(mount, true);
1451 break;
1452
1453 default:
1454 mount_set_state(mount, mount->state);
1455 break;
1456
1457 }
1458
1459 } else if (mount->just_mounted || mount->just_changed) {
1460
1461 /* New or changed entrymount */
1462
1463 switch (mount->state) {
1464
1465 case MOUNT_DEAD:
18c78fb1 1466 case MOUNT_MAINTENANCE:
e537352b
LP
1467 mount_enter_mounted(mount, true);
1468 break;
1469
1470 case MOUNT_MOUNTING:
8d567588 1471 mount_enter_mounting_done(mount);
e537352b
LP
1472 break;
1473
1474 default:
1475 /* Nothing really changed, but let's
1476 * issue an notification call
1477 * nonetheless, in case somebody is
1478 * waiting for this. (e.g. file system
1479 * ro/rw remounts.) */
1480 mount_set_state(mount, mount->state);
1481 break;
1482 }
1483 }
1484
1485 /* Reset the flags for later calls */
1486 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1487 }
1488}
1489
5632e374
LP
1490static void mount_reset_maintenance(Unit *u) {
1491 Mount *m = MOUNT(u);
1492
1493 assert(m);
1494
1495 if (m->state == MOUNT_MAINTENANCE)
1496 mount_set_state(m, MOUNT_DEAD);
1497
1498 m->failure = false;
1499}
1500
a16e1123
LP
1501static const char* const mount_state_table[_MOUNT_STATE_MAX] = {
1502 [MOUNT_DEAD] = "dead",
1503 [MOUNT_MOUNTING] = "mounting",
1504 [MOUNT_MOUNTING_DONE] = "mounting-done",
1505 [MOUNT_MOUNTED] = "mounted",
1506 [MOUNT_REMOUNTING] = "remounting",
1507 [MOUNT_UNMOUNTING] = "unmounting",
1508 [MOUNT_MOUNTING_SIGTERM] = "mounting-sigterm",
1509 [MOUNT_MOUNTING_SIGKILL] = "mounting-sigkill",
1510 [MOUNT_REMOUNTING_SIGTERM] = "remounting-sigterm",
1511 [MOUNT_REMOUNTING_SIGKILL] = "remounting-sigkill",
1512 [MOUNT_UNMOUNTING_SIGTERM] = "unmounting-sigterm",
1513 [MOUNT_UNMOUNTING_SIGKILL] = "unmounting-sigkill",
18c78fb1 1514 [MOUNT_MAINTENANCE] = "maintenance"
a16e1123
LP
1515};
1516
1517DEFINE_STRING_TABLE_LOOKUP(mount_state, MountState);
1518
1519static const char* const mount_exec_command_table[_MOUNT_EXEC_COMMAND_MAX] = {
1520 [MOUNT_EXEC_MOUNT] = "ExecMount",
1521 [MOUNT_EXEC_UNMOUNT] = "ExecUnmount",
1522 [MOUNT_EXEC_REMOUNT] = "ExecRemount",
1523};
1524
1525DEFINE_STRING_TABLE_LOOKUP(mount_exec_command, MountExecCommand);
1526
87f0e418 1527const UnitVTable mount_vtable = {
5cb5a6ff
LP
1528 .suffix = ".mount",
1529
e537352b 1530 .no_alias = true,
9e2f7c11 1531 .no_instances = true,
c497c7a9 1532 .no_isolate = true,
9e58ff9c 1533 .show_status = true,
e537352b
LP
1534
1535 .init = mount_init,
1536 .load = mount_load,
034c6ed7 1537 .done = mount_done,
e537352b 1538
f50e0a01
LP
1539 .coldplug = mount_coldplug,
1540
034c6ed7 1541 .dump = mount_dump,
5cb5a6ff 1542
e537352b
LP
1543 .start = mount_start,
1544 .stop = mount_stop,
1545 .reload = mount_reload,
1546
a16e1123
LP
1547 .serialize = mount_serialize,
1548 .deserialize_item = mount_deserialize_item,
1549
f50e0a01 1550 .active_state = mount_active_state,
10a94420 1551 .sub_state_to_string = mount_sub_state_to_string,
b08d03ff 1552
701cc384
LP
1553 .check_gc = mount_check_gc,
1554
e537352b
LP
1555 .sigchld_event = mount_sigchld_event,
1556 .timer_event = mount_timer_event,
1557
5632e374
LP
1558 .reset_maintenance = mount_reset_maintenance,
1559
4139c1b2
LP
1560 .bus_message_handler = bus_mount_message_handler,
1561
f50e0a01
LP
1562 .enumerate = mount_enumerate,
1563 .shutdown = mount_shutdown
5cb5a6ff 1564};