]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/mount.c
units: never pull in sysinit from utmp, so that we can shutdown from emergency mode...
[thirdparty/systemd.git] / src / mount.c
CommitLineData
d6c9574f 1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
5cb5a6ff 2
a7334b09
LP
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
5cb5a6ff 22#include <errno.h>
b08d03ff
LP
23#include <stdio.h>
24#include <mntent.h>
ef734fd6 25#include <sys/epoll.h>
e537352b 26#include <signal.h>
5cb5a6ff 27
87f0e418 28#include "unit.h"
5cb5a6ff
LP
29#include "mount.h"
30#include "load-fragment.h"
5cb5a6ff 31#include "load-dropin.h"
b08d03ff 32#include "log.h"
e537352b
LP
33#include "strv.h"
34#include "mount-setup.h"
9e2f7c11 35#include "unit-name.h"
4139c1b2 36#include "dbus-mount.h"
514f4ef5 37#include "special.h"
8a0867d6 38#include "bus-errors.h"
9a57c629 39#include "exit-status.h"
f6a6225e 40#include "def.h"
5cb5a6ff 41
f50e0a01
LP
42static const UnitActiveState state_translation_table[_MOUNT_STATE_MAX] = {
43 [MOUNT_DEAD] = UNIT_INACTIVE,
44 [MOUNT_MOUNTING] = UNIT_ACTIVATING,
e537352b 45 [MOUNT_MOUNTING_DONE] = UNIT_ACTIVE,
f50e0a01 46 [MOUNT_MOUNTED] = UNIT_ACTIVE,
032ff4af 47 [MOUNT_REMOUNTING] = UNIT_RELOADING,
f50e0a01 48 [MOUNT_UNMOUNTING] = UNIT_DEACTIVATING,
e537352b
LP
49 [MOUNT_MOUNTING_SIGTERM] = UNIT_DEACTIVATING,
50 [MOUNT_MOUNTING_SIGKILL] = UNIT_DEACTIVATING,
032ff4af
LP
51 [MOUNT_REMOUNTING_SIGTERM] = UNIT_RELOADING,
52 [MOUNT_REMOUNTING_SIGKILL] = UNIT_RELOADING,
e537352b
LP
53 [MOUNT_UNMOUNTING_SIGTERM] = UNIT_DEACTIVATING,
54 [MOUNT_UNMOUNTING_SIGKILL] = UNIT_DEACTIVATING,
fdf20a31 55 [MOUNT_FAILED] = UNIT_FAILED
f50e0a01 56};
5cb5a6ff 57
a16e1123
LP
58static void mount_init(Unit *u) {
59 Mount *m = MOUNT(u);
5cb5a6ff 60
a16e1123
LP
61 assert(u);
62 assert(u->meta.load_state == UNIT_STUB);
63
64 m->timeout_usec = DEFAULT_TIMEOUT_USEC;
3e5235b0
LP
65 m->directory_mode = 0755;
66
c3686083 67 exec_context_init(&m->exec_context);
d893269d
LP
68
69 /* The stdio/kmsg bridge socket is on /, in order to avoid a
70 * dep loop, don't use kmsg logging for -.mount */
71 if (!unit_has_name(u, "-.mount"))
72 m->exec_context.std_output = EXEC_OUTPUT_KMSG;
c3686083 73
a16e1123
LP
74 /* We need to make sure that /bin/mount is always called in
75 * the same process group as us, so that the autofs kernel
76 * side doesn't send us another mount request while we are
77 * already trying to comply its last one. */
74922904 78 m->exec_context.same_pgrp = true;
8d567588 79
a16e1123
LP
80 m->timer_watch.type = WATCH_INVALID;
81
82 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
8d567588
LP
83}
84
a16e1123 85static void mount_unwatch_control_pid(Mount *m) {
5e94833f
LP
86 assert(m);
87
88 if (m->control_pid <= 0)
89 return;
90
91 unit_unwatch_pid(UNIT(m), m->control_pid);
92 m->control_pid = 0;
93}
94
e537352b
LP
95static void mount_parameters_done(MountParameters *p) {
96 assert(p);
97
98 free(p->what);
99 free(p->options);
100 free(p->fstype);
101
102 p->what = p->options = p->fstype = NULL;
103}
104
87f0e418 105static void mount_done(Unit *u) {
ef734fd6 106 Mount *m = MOUNT(u);
e0fa621b 107 Meta *other;
034c6ed7 108
ef734fd6 109 assert(m);
034c6ed7 110
e537352b
LP
111 free(m->where);
112 m->where = NULL;
f50e0a01 113
e0fa621b
LP
114 /* Try to detach us from the automount unit if there is any */
115 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_AUTOMOUNT]) {
116 Automount *a = (Automount*) other;
117
118 if (a->mount == m)
119 a->mount = NULL;
120 }
121
e537352b
LP
122 mount_parameters_done(&m->parameters_etc_fstab);
123 mount_parameters_done(&m->parameters_proc_self_mountinfo);
124 mount_parameters_done(&m->parameters_fragment);
ef734fd6 125
e537352b
LP
126 exec_context_done(&m->exec_context);
127 exec_command_done_array(m->exec_command, _MOUNT_EXEC_COMMAND_MAX);
128 m->control_command = NULL;
f50e0a01 129
a16e1123 130 mount_unwatch_control_pid(m);
f50e0a01 131
e537352b 132 unit_unwatch_timer(u, &m->timer_watch);
f50e0a01
LP
133}
134
cb39ed3f
LP
135static MountParameters* get_mount_parameters_configured(Mount *m) {
136 assert(m);
137
138 if (m->from_fragment)
139 return &m->parameters_fragment;
140 else if (m->from_etc_fstab)
141 return &m->parameters_etc_fstab;
142
143 return NULL;
144}
145
146static MountParameters* get_mount_parameters(Mount *m) {
147 assert(m);
148
149 if (m->from_proc_self_mountinfo)
150 return &m->parameters_proc_self_mountinfo;
151
152 return get_mount_parameters_configured(m);
153}
154
6e2ef85b
LP
155static int mount_add_mount_links(Mount *m) {
156 Meta *other;
b08d03ff 157 int r;
5c78d8e2 158 MountParameters *pm;
b08d03ff 159
6e2ef85b 160 assert(m);
b08d03ff 161
cb39ed3f 162 pm = get_mount_parameters_configured(m);
5c78d8e2 163
6e2ef85b
LP
164 /* Adds in links to other mount points that might lie below or
165 * above us in the hierarchy */
e537352b 166
6e2ef85b
LP
167 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_MOUNT]) {
168 Mount *n = (Mount*) other;
5c78d8e2 169 MountParameters *pn;
07b0b134 170
6e2ef85b
LP
171 if (n == m)
172 continue;
b08d03ff 173
6e2ef85b
LP
174 if (n->meta.load_state != UNIT_LOADED)
175 continue;
b08d03ff 176
cb39ed3f 177 pn = get_mount_parameters_configured(n);
5c78d8e2 178
6e2ef85b 179 if (path_startswith(m->where, n->where)) {
b08d03ff 180
6e2ef85b
LP
181 if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
182 return r;
b08d03ff 183
cb39ed3f 184 if (pn)
6e2ef85b
LP
185 if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
186 return r;
b08d03ff 187
6e2ef85b 188 } else if (path_startswith(n->where, m->where)) {
b08d03ff 189
5c78d8e2
LP
190 if ((r = unit_add_dependency(UNIT(n), UNIT_AFTER, UNIT(m), true)) < 0)
191 return r;
192
cb39ed3f 193 if (pm)
5c78d8e2
LP
194 if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
195 return r;
196
197 } else if (pm && path_startswith(pm->what, n->where)) {
198
199 if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
6e2ef85b
LP
200 return r;
201
cb39ed3f
LP
202 if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
203 return r;
5c78d8e2
LP
204
205 } else if (pn && path_startswith(pn->what, m->where)) {
206
207 if ((r = unit_add_dependency(UNIT(n), UNIT_AFTER, UNIT(m), true)) < 0)
208 return r;
209
cb39ed3f
LP
210 if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
211 return r;
6e2ef85b
LP
212 }
213 }
b08d03ff
LP
214
215 return 0;
216}
217
6e2ef85b 218static int mount_add_swap_links(Mount *m) {
ef734fd6 219 Meta *other;
b08d03ff
LP
220 int r;
221
6e2ef85b 222 assert(m);
b08d03ff 223
6e2ef85b
LP
224 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_SWAP])
225 if ((r = swap_add_one_mount_link((Swap*) other, m)) < 0)
226 return r;
b08d03ff 227
6e2ef85b
LP
228 return 0;
229}
b08d03ff 230
01f78473
LP
231static int mount_add_path_links(Mount *m) {
232 Meta *other;
233 int r;
234
235 assert(m);
236
237 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_PATH])
238 if ((r = path_add_one_mount_link((Path*) other, m)) < 0)
239 return r;
240
241 return 0;
242}
243
6e2ef85b
LP
244static int mount_add_automount_links(Mount *m) {
245 Meta *other;
246 int r;
e537352b 247
6e2ef85b 248 assert(m);
b08d03ff 249
6e2ef85b
LP
250 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_AUTOMOUNT])
251 if ((r = automount_add_one_mount_link((Automount*) other, m)) < 0)
252 return r;
b08d03ff 253
6e2ef85b
LP
254 return 0;
255}
b08d03ff 256
6e2ef85b
LP
257static int mount_add_socket_links(Mount *m) {
258 Meta *other;
259 int r;
b08d03ff 260
6e2ef85b 261 assert(m);
b08d03ff 262
6e2ef85b
LP
263 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_SOCKET])
264 if ((r = socket_add_one_mount_link((Socket*) other, m)) < 0)
265 return r;
b08d03ff
LP
266
267 return 0;
268}
269
07b0b134 270static char* mount_test_option(const char *haystack, const char *needle) {
e537352b
LP
271 struct mntent me;
272
273 assert(needle);
274
275 /* Like glibc's hasmntopt(), but works on a string, not a
276 * struct mntent */
277
278 if (!haystack)
279 return false;
280
281 zero(me);
282 me.mnt_opts = (char*) haystack;
283
07b0b134 284 return hasmntopt(&me, needle);
e537352b
LP
285}
286
cb39ed3f
LP
287static bool mount_is_network(MountParameters *p) {
288 assert(p);
289
290 if (mount_test_option(p->options, "_netdev"))
291 return true;
292
293 if (p->fstype && fstype_is_network(p->fstype))
294 return true;
295
296 return false;
297}
298
299static bool mount_is_bind(MountParameters *p) {
300 assert(p);
301
302 if (mount_test_option(p->options, "bind"))
303 return true;
304
305 if (p->fstype && streq(p->fstype, "bind"))
306 return true;
307
308 return false;
309}
310
311static bool needs_quota(MountParameters *p) {
312 assert(p);
313
314 if (mount_is_network(p))
315 return false;
316
317 if (mount_is_bind(p))
318 return false;
319
320 return mount_test_option(p->options, "usrquota") ||
321 mount_test_option(p->options, "grpquota");
322}
323
e537352b 324static int mount_add_target_links(Mount *m) {
a55da3cd 325 const char *target, *after = NULL;
e537352b 326 MountParameters *p;
a16e1123 327 Unit *tu;
e537352b 328 int r;
d9143006 329 bool noauto, nofail, handle, automount;
e537352b
LP
330
331 assert(m);
332
cb39ed3f 333 if (!(p = get_mount_parameters_configured(m)))
e537352b
LP
334 return 0;
335
07b0b134 336 noauto = !!mount_test_option(p->options, MNTOPT_NOAUTO);
d9143006 337 nofail = !!mount_test_option(p->options, "nofail");
d4a7e06d
LP
338 handle =
339 mount_test_option(p->options, "comment=systemd.mount") ||
340 mount_test_option(p->options, "x-systemd-mount") ||
d3689161 341 m->meta.manager->mount_auto;
d4a7e06d
LP
342 automount =
343 mount_test_option(p->options, "comment=systemd.automount") ||
344 mount_test_option(p->options, "x-systemd-automount");
e537352b 345
cb39ed3f 346 if (mount_is_network(p)) {
e537352b 347 target = SPECIAL_REMOTE_FS_TARGET;
a55da3cd
LP
348
349 if (m->meta.manager->running_as == MANAGER_SYSTEM)
350 after = SPECIAL_NETWORK_TARGET;
351 } else
e537352b
LP
352 target = SPECIAL_LOCAL_FS_TARGET;
353
398ef8ba 354 if ((r = manager_load_unit(m->meta.manager, target, NULL, NULL, &tu)) < 0)
e537352b
LP
355 return r;
356
a55da3cd 357 if (after)
50483512 358 if ((r = unit_add_dependency_by_name(UNIT(m), UNIT_AFTER, after, NULL, true)) < 0)
a55da3cd
LP
359 return r;
360
a3d4e06d 361 if (automount && m->meta.manager->running_as == MANAGER_SYSTEM) {
a16e1123
LP
362 Unit *am;
363
364 if ((r = unit_load_related_unit(UNIT(m), ".automount", &am)) < 0)
9fcc065a 365 return r;
e537352b 366
2c966c03 367 return unit_add_two_dependencies(tu, UNIT_AFTER, UNIT_WANTS, UNIT(am), true);
a16e1123
LP
368 } else {
369
81bf310e
LP
370 /* Automatically add mount points that aren't natively
371 * configured to local-fs.target */
372 if (!noauto &&
d9143006 373 !nofail &&
81bf310e 374 handle &&
510051fc
LP
375 m->from_etc_fstab &&
376 m->meta.manager->running_as == MANAGER_SYSTEM)
377 if ((r = unit_add_dependency(tu, UNIT_WANTS, UNIT(m), true)) < 0)
378 return r;
a16e1123 379
701cc384 380 return unit_add_dependency(UNIT(m), UNIT_BEFORE, tu, true);
a16e1123 381 }
e537352b
LP
382}
383
173a8d04
LP
384static int mount_add_device_links(Mount *m) {
385 MountParameters *p;
9fff8a1f 386 int r;
173a8d04
LP
387
388 assert(m);
389
cb39ed3f 390 if (!(p = get_mount_parameters_configured(m)))
173a8d04
LP
391 return 0;
392
9fff8a1f 393 if (!p->what)
173a8d04 394 return 0;
5c78d8e2 395
9fff8a1f
LP
396 if (!mount_is_bind(p) && !path_equal(m->where, "/")) {
397 bool nofail, noauto;
173a8d04 398
9fff8a1f
LP
399 noauto = !!mount_test_option(p->options, MNTOPT_NOAUTO);
400 nofail = !!mount_test_option(p->options, "nofail");
401
402 if ((r = unit_add_node_link(UNIT(m), p->what,
403 !noauto && nofail &&
404 UNIT(m)->meta.manager->running_as == MANAGER_SYSTEM)) < 0)
405 return r;
406 }
407
491ad5dc 408 if (p->passno > 0 &&
ff2e0f05 409 !mount_is_bind(p) &&
b65a25f2
LP
410 UNIT(m)->meta.manager->running_as == MANAGER_SYSTEM &&
411 !path_equal(m->where, "/")) {
9fff8a1f
LP
412 char *name;
413 Unit *fsck;
414 /* Let's add in the fsck service */
173a8d04 415
a9e1f5ec 416 /* aka SPECIAL_FSCK_SERVICE */
9fff8a1f
LP
417 if (!(name = unit_name_from_path_instance("fsck", p->what, ".service")))
418 return -ENOMEM;
419
420 if ((r = manager_load_unit_prepare(m->meta.manager, name, NULL, NULL, &fsck)) < 0) {
421 log_warning("Failed to prepare unit %s: %s", name, strerror(-r));
422 free(name);
423 return r;
424 }
425
426 free(name);
427
428 SERVICE(fsck)->fsck_passno = p->passno;
429
0355825f 430 if ((r = unit_add_two_dependencies(UNIT(m), UNIT_AFTER, UNIT_REQUIRES, fsck, true)) < 0)
9fff8a1f
LP
431 return r;
432 }
433
434 return 0;
173a8d04
LP
435}
436
2edd4434
LP
437static int mount_add_default_dependencies(Mount *m) {
438 int r;
439
440 assert(m);
441
75d287d3
LP
442 if (m->meta.manager->running_as == MANAGER_SYSTEM &&
443 !path_equal(m->where, "/")) {
0c380104 444 MountParameters *p;
2edd4434 445
cb39ed3f
LP
446 p = get_mount_parameters_configured(m);
447
448 if (p && needs_quota(p)) {
0c380104
AB
449 if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_WANTS, SPECIAL_QUOTACHECK_SERVICE, NULL, true)) < 0 ||
450 (r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_WANTS, SPECIAL_QUOTAON_SERVICE, NULL, true)) < 0)
451 return r;
cb39ed3f 452 }
2edd4434 453
ead8e478 454 if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_UMOUNT_TARGET, NULL, true)) < 0)
75d287d3 455 return r;
2edd4434
LP
456 }
457
458 return 0;
459}
460
8d567588
LP
461static int mount_verify(Mount *m) {
462 bool b;
463 char *e;
464 assert(m);
465
8cbef760 466 if (m->meta.load_state != UNIT_LOADED)
8d567588
LP
467 return 0;
468
8cbef760
LP
469 if (!m->from_etc_fstab && !m->from_fragment && !m->from_proc_self_mountinfo)
470 return -ENOENT;
471
a16e1123 472 if (!(e = unit_name_from_path(m->where, ".mount")))
8d567588
LP
473 return -ENOMEM;
474
475 b = unit_has_name(UNIT(m), e);
476 free(e);
477
478 if (!b) {
4cd1fbcc 479 log_error("%s's Where setting doesn't match unit name. Refusing.", m->meta.id);
8d567588
LP
480 return -EINVAL;
481 }
482
33ff02c9
LP
483 if (mount_point_is_api(m->where) || mount_point_ignore(m->where)) {
484 log_error("Cannot create mount unit for API file system %s. Refusing.", m->where);
485 return -EINVAL;
486 }
487
4e85aff4 488 if (m->meta.fragment_path && !m->parameters_fragment.what) {
4cd1fbcc 489 log_error("%s's What setting is missing. Refusing.", m->meta.id);
4e85aff4
LP
490 return -EBADMSG;
491 }
492
2e22afe9 493 if (m->exec_context.pam_name && m->exec_context.kill_mode != KILL_CONTROL_GROUP) {
4d0e5dbd
LP
494 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", m->meta.id);
495 return -EINVAL;
496 }
497
8d567588
LP
498 return 0;
499}
500
e537352b
LP
501static int mount_load(Unit *u) {
502 Mount *m = MOUNT(u);
503 int r;
504
505 assert(u);
506 assert(u->meta.load_state == UNIT_STUB);
507
508 if ((r = unit_load_fragment_and_dropin_optional(u)) < 0)
509 return r;
510
511 /* This is a new unit? Then let's add in some extras */
512 if (u->meta.load_state == UNIT_LOADED) {
27abbe82
LP
513 if ((r = unit_add_exec_dependencies(u, &m->exec_context)) < 0)
514 return r;
515
4e85aff4
LP
516 if (m->meta.fragment_path)
517 m->from_fragment = true;
e537352b 518
a16e1123
LP
519 if (!m->where)
520 if (!(m->where = unit_name_to_path(u->meta.id)))
521 return -ENOMEM;
522
523 path_kill_slashes(m->where);
524
4e85aff4
LP
525 if (!m->meta.description)
526 if ((r = unit_set_description(u, m->where)) < 0)
527 return r;
e537352b 528
173a8d04
LP
529 if ((r = mount_add_device_links(m)) < 0)
530 return r;
6e2ef85b
LP
531
532 if ((r = mount_add_mount_links(m)) < 0)
533 return r;
534
535 if ((r = mount_add_socket_links(m)) < 0)
536 return r;
537
538 if ((r = mount_add_swap_links(m)) < 0)
e537352b
LP
539 return r;
540
01f78473
LP
541 if ((r = mount_add_path_links(m)) < 0)
542 return r;
543
6e2ef85b 544 if ((r = mount_add_automount_links(m)) < 0)
e537352b
LP
545 return r;
546
6e2ef85b 547 if ((r = mount_add_target_links(m)) < 0)
e537352b
LP
548 return r;
549
d686d8a9 550 if ((r = unit_add_default_cgroups(u)) < 0)
e537352b 551 return r;
4e67ddd6 552
2edd4434
LP
553 if (m->meta.default_dependencies)
554 if ((r = mount_add_default_dependencies(m)) < 0)
4e67ddd6 555 return r;
e537352b
LP
556 }
557
8d567588 558 return mount_verify(m);
e537352b
LP
559}
560
a16e1123
LP
561static int mount_notify_automount(Mount *m, int status) {
562 Unit *p;
563 int r;
564
565 assert(m);
566
567 if ((r = unit_get_related_unit(UNIT(m), ".automount", &p)) < 0)
568 return r == -ENOENT ? 0 : r;
569
570 return automount_send_ready(AUTOMOUNT(p), status);
571}
572
e537352b
LP
573static void mount_set_state(Mount *m, MountState state) {
574 MountState old_state;
575 assert(m);
576
577 old_state = m->state;
578 m->state = state;
579
580 if (state != MOUNT_MOUNTING &&
581 state != MOUNT_MOUNTING_DONE &&
582 state != MOUNT_REMOUNTING &&
583 state != MOUNT_UNMOUNTING &&
584 state != MOUNT_MOUNTING_SIGTERM &&
585 state != MOUNT_MOUNTING_SIGKILL &&
586 state != MOUNT_UNMOUNTING_SIGTERM &&
587 state != MOUNT_UNMOUNTING_SIGKILL &&
588 state != MOUNT_REMOUNTING_SIGTERM &&
589 state != MOUNT_REMOUNTING_SIGKILL) {
590 unit_unwatch_timer(UNIT(m), &m->timer_watch);
a16e1123 591 mount_unwatch_control_pid(m);
e537352b 592 m->control_command = NULL;
a16e1123 593 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
e537352b
LP
594 }
595
8d567588
LP
596 if (state == MOUNT_MOUNTED ||
597 state == MOUNT_REMOUNTING)
598 mount_notify_automount(m, 0);
599 else if (state == MOUNT_DEAD ||
600 state == MOUNT_UNMOUNTING ||
601 state == MOUNT_MOUNTING_SIGTERM ||
602 state == MOUNT_MOUNTING_SIGKILL ||
603 state == MOUNT_REMOUNTING_SIGTERM ||
604 state == MOUNT_REMOUNTING_SIGKILL ||
605 state == MOUNT_UNMOUNTING_SIGTERM ||
606 state == MOUNT_UNMOUNTING_SIGKILL ||
fdf20a31 607 state == MOUNT_FAILED)
8d567588
LP
608 mount_notify_automount(m, -ENODEV);
609
e537352b 610 if (state != old_state)
40d50879 611 log_debug("%s changed %s -> %s",
4cd1fbcc 612 m->meta.id,
a16e1123
LP
613 mount_state_to_string(old_state),
614 mount_state_to_string(state));
e537352b 615
e2f3b44c
LP
616 unit_notify(UNIT(m), state_translation_table[old_state], state_translation_table[state], !m->reload_failure);
617 m->reload_failure = false;
e537352b
LP
618}
619
620static int mount_coldplug(Unit *u) {
621 Mount *m = MOUNT(u);
a16e1123
LP
622 MountState new_state = MOUNT_DEAD;
623 int r;
e537352b
LP
624
625 assert(m);
626 assert(m->state == MOUNT_DEAD);
627
a16e1123
LP
628 if (m->deserialized_state != m->state)
629 new_state = m->deserialized_state;
630 else if (m->from_proc_self_mountinfo)
631 new_state = MOUNT_MOUNTED;
e537352b 632
a16e1123 633 if (new_state != m->state) {
e537352b 634
a16e1123
LP
635 if (new_state == MOUNT_MOUNTING ||
636 new_state == MOUNT_MOUNTING_DONE ||
637 new_state == MOUNT_REMOUNTING ||
638 new_state == MOUNT_UNMOUNTING ||
639 new_state == MOUNT_MOUNTING_SIGTERM ||
640 new_state == MOUNT_MOUNTING_SIGKILL ||
641 new_state == MOUNT_UNMOUNTING_SIGTERM ||
642 new_state == MOUNT_UNMOUNTING_SIGKILL ||
643 new_state == MOUNT_REMOUNTING_SIGTERM ||
644 new_state == MOUNT_REMOUNTING_SIGKILL) {
e537352b 645
a16e1123
LP
646 if (m->control_pid <= 0)
647 return -EBADMSG;
e537352b 648
a16e1123
LP
649 if ((r = unit_watch_pid(UNIT(m), m->control_pid)) < 0)
650 return r;
e537352b 651
a16e1123
LP
652 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
653 return r;
654 }
e537352b 655
a16e1123
LP
656 mount_set_state(m, new_state);
657 }
e537352b
LP
658
659 return 0;
e537352b
LP
660}
661
662static void mount_dump(Unit *u, FILE *f, const char *prefix) {
663 Mount *m = MOUNT(u);
664 MountParameters *p;
665
666 assert(m);
667 assert(f);
668
cb39ed3f 669 p = get_mount_parameters(m);
e537352b
LP
670
671 fprintf(f,
672 "%sMount State: %s\n"
673 "%sWhere: %s\n"
674 "%sWhat: %s\n"
675 "%sFile System Type: %s\n"
676 "%sOptions: %s\n"
677 "%sFrom /etc/fstab: %s\n"
678 "%sFrom /proc/self/mountinfo: %s\n"
679 "%sFrom fragment: %s\n"
3e5235b0 680 "%sDirectoryMode: %04o\n",
a16e1123 681 prefix, mount_state_to_string(m->state),
e537352b
LP
682 prefix, m->where,
683 prefix, strna(p->what),
684 prefix, strna(p->fstype),
685 prefix, strna(p->options),
686 prefix, yes_no(m->from_etc_fstab),
687 prefix, yes_no(m->from_proc_self_mountinfo),
688 prefix, yes_no(m->from_fragment),
3e5235b0 689 prefix, m->directory_mode);
e537352b
LP
690
691 if (m->control_pid > 0)
692 fprintf(f,
bb00e604
LP
693 "%sControl PID: %lu\n",
694 prefix, (unsigned long) m->control_pid);
e537352b
LP
695
696 exec_context_dump(&m->exec_context, f, prefix);
697}
698
a16e1123
LP
699static int mount_spawn(Mount *m, ExecCommand *c, pid_t *_pid) {
700 pid_t pid;
701 int r;
702
703 assert(m);
704 assert(c);
705 assert(_pid);
706
707 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
708 goto fail;
709
710 if ((r = exec_spawn(c,
711 NULL,
712 &m->exec_context,
713 NULL, 0,
1137a57c 714 m->meta.manager->environment,
a16e1123
LP
715 true,
716 true,
1e3ad081 717 true,
c3686083 718 m->meta.manager->confirm_spawn,
4cd1fbcc 719 m->meta.cgroup_bondings,
a16e1123
LP
720 &pid)) < 0)
721 goto fail;
722
723 if ((r = unit_watch_pid(UNIT(m), pid)) < 0)
724 /* FIXME: we need to do something here */
725 goto fail;
726
727 *_pid = pid;
728
729 return 0;
730
731fail:
732 unit_unwatch_timer(UNIT(m), &m->timer_watch);
733
734 return r;
735}
736
e537352b
LP
737static void mount_enter_dead(Mount *m, bool success) {
738 assert(m);
739
740 if (!success)
741 m->failure = true;
742
fdf20a31 743 mount_set_state(m, m->failure ? MOUNT_FAILED : MOUNT_DEAD);
e537352b
LP
744}
745
80876c20
LP
746static void mount_enter_mounted(Mount *m, bool success) {
747 assert(m);
748
749 if (!success)
750 m->failure = true;
751
752 mount_set_state(m, MOUNT_MOUNTED);
753}
754
e537352b
LP
755static void mount_enter_signal(Mount *m, MountState state, bool success) {
756 int r;
ca949c9d
LP
757 Set *pid_set = NULL;
758 bool wait_for_exit = false;
e537352b
LP
759
760 assert(m);
761
762 if (!success)
763 m->failure = true;
764
2e22afe9 765 if (m->exec_context.kill_mode != KILL_NONE) {
80876c20
LP
766 int sig = (state == MOUNT_MOUNTING_SIGTERM ||
767 state == MOUNT_UNMOUNTING_SIGTERM ||
2e22afe9 768 state == MOUNT_REMOUNTING_SIGTERM) ? m->exec_context.kill_signal : SIGKILL;
e537352b 769
ca949c9d 770 if (m->control_pid > 0) {
cd25cce9 771 if (kill_and_sigcont(m->control_pid, sig) < 0 && errno != ESRCH)
e537352b 772
ca949c9d
LP
773 log_warning("Failed to kill control process %li: %m", (long) m->control_pid);
774 else
775 wait_for_exit = true;
e537352b
LP
776 }
777
ca949c9d 778 if (m->exec_context.kill_mode == KILL_CONTROL_GROUP) {
2e22afe9 779
ca949c9d
LP
780 if (!(pid_set = set_new(trivial_hash_func, trivial_compare_func))) {
781 r = -ENOMEM;
e537352b
LP
782 goto fail;
783 }
ca949c9d
LP
784
785 /* Exclude the control pid from being killed via the cgroup */
786 if (m->control_pid > 0)
787 if ((r = set_put(pid_set, LONG_TO_PTR(m->control_pid))) < 0)
788 goto fail;
789
430c18ed 790 if ((r = cgroup_bonding_kill_list(m->meta.cgroup_bondings, sig, true, pid_set)) < 0) {
ca949c9d
LP
791 if (r != -EAGAIN && r != -ESRCH && r != -ENOENT)
792 log_warning("Failed to kill control group: %s", strerror(-r));
793 } else if (r > 0)
794 wait_for_exit = true;
795
796 set_free(pid_set);
da19d5c1 797 pid_set = NULL;
ca949c9d 798 }
e537352b
LP
799 }
800
ca949c9d 801 if (wait_for_exit) {
80876c20
LP
802 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
803 goto fail;
e537352b 804
80876c20
LP
805 mount_set_state(m, state);
806 } else if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
807 mount_enter_mounted(m, true);
808 else
e537352b
LP
809 mount_enter_dead(m, true);
810
811 return;
812
813fail:
4cd1fbcc 814 log_warning("%s failed to kill processes: %s", m->meta.id, strerror(-r));
e537352b 815
80876c20
LP
816 if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
817 mount_enter_mounted(m, false);
818 else
819 mount_enter_dead(m, false);
ca949c9d
LP
820
821 if (pid_set)
822 set_free(pid_set);
e537352b
LP
823}
824
825static void mount_enter_unmounting(Mount *m, bool success) {
e537352b
LP
826 int r;
827
828 assert(m);
829
830 if (!success)
831 m->failure = true;
832
a16e1123
LP
833 m->control_command_id = MOUNT_EXEC_UNMOUNT;
834 m->control_command = m->exec_command + MOUNT_EXEC_UNMOUNT;
e537352b
LP
835
836 if ((r = exec_command_set(
a16e1123 837 m->control_command,
e537352b
LP
838 "/bin/umount",
839 m->where,
840 NULL)) < 0)
841 goto fail;
842
a16e1123 843 mount_unwatch_control_pid(m);
5e94833f 844
a16e1123 845 if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
e537352b
LP
846 goto fail;
847
848 mount_set_state(m, MOUNT_UNMOUNTING);
849
850 return;
851
852fail:
4cd1fbcc 853 log_warning("%s failed to run 'umount' task: %s", m->meta.id, strerror(-r));
e537352b
LP
854 mount_enter_mounted(m, false);
855}
856
8d567588 857static void mount_enter_mounting(Mount *m) {
e537352b 858 int r;
cb39ed3f 859 MountParameters *p;
e537352b
LP
860
861 assert(m);
862
a16e1123
LP
863 m->control_command_id = MOUNT_EXEC_MOUNT;
864 m->control_command = m->exec_command + MOUNT_EXEC_MOUNT;
e537352b 865
3e5235b0
LP
866 mkdir_p(m->where, m->directory_mode);
867
cb39ed3f
LP
868 /* Create the source directory for bind-mounts if needed */
869 p = get_mount_parameters_configured(m);
870 if (p && mount_is_bind(p))
871 mkdir_p(p->what, m->directory_mode);
2b583ce6 872
e537352b
LP
873 if (m->from_fragment)
874 r = exec_command_set(
a16e1123 875 m->control_command,
e537352b
LP
876 "/bin/mount",
877 m->parameters_fragment.what,
878 m->where,
40b8a332 879 "-t", m->parameters_fragment.fstype ? m->parameters_fragment.fstype : "auto",
8d567588 880 m->parameters_fragment.options ? "-o" : NULL, m->parameters_fragment.options,
e537352b
LP
881 NULL);
882 else if (m->from_etc_fstab)
883 r = exec_command_set(
a16e1123 884 m->control_command,
e537352b
LP
885 "/bin/mount",
886 m->where,
887 NULL);
888 else
889 r = -ENOENT;
890
891 if (r < 0)
892 goto fail;
893
a16e1123 894 mount_unwatch_control_pid(m);
5e94833f 895
a16e1123 896 if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
e537352b
LP
897 goto fail;
898
899 mount_set_state(m, MOUNT_MOUNTING);
900
901 return;
902
903fail:
4cd1fbcc 904 log_warning("%s failed to run 'mount' task: %s", m->meta.id, strerror(-r));
e537352b
LP
905 mount_enter_dead(m, false);
906}
907
8d567588 908static void mount_enter_mounting_done(Mount *m) {
e537352b
LP
909 assert(m);
910
e537352b
LP
911 mount_set_state(m, MOUNT_MOUNTING_DONE);
912}
913
914static void mount_enter_remounting(Mount *m, bool success) {
e537352b
LP
915 int r;
916
917 assert(m);
918
919 if (!success)
920 m->failure = true;
921
a16e1123
LP
922 m->control_command_id = MOUNT_EXEC_REMOUNT;
923 m->control_command = m->exec_command + MOUNT_EXEC_REMOUNT;
e537352b
LP
924
925 if (m->from_fragment) {
926 char *buf = NULL;
927 const char *o;
928
929 if (m->parameters_fragment.options) {
930 if (!(buf = strappend("remount,", m->parameters_fragment.options))) {
931 r = -ENOMEM;
932 goto fail;
933 }
934
935 o = buf;
936 } else
937 o = "remount";
938
939 r = exec_command_set(
a16e1123 940 m->control_command,
e537352b
LP
941 "/bin/mount",
942 m->parameters_fragment.what,
943 m->where,
40b8a332 944 "-t", m->parameters_fragment.fstype ? m->parameters_fragment.fstype : "auto",
e537352b
LP
945 "-o", o,
946 NULL);
947
948 free(buf);
949 } else if (m->from_etc_fstab)
950 r = exec_command_set(
a16e1123 951 m->control_command,
e537352b
LP
952 "/bin/mount",
953 m->where,
954 "-o", "remount",
955 NULL);
956 else
957 r = -ENOENT;
958
60b912f6 959 if (r < 0)
e537352b 960 goto fail;
e537352b 961
a16e1123 962 mount_unwatch_control_pid(m);
5e94833f 963
a16e1123 964 if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
e537352b
LP
965 goto fail;
966
967 mount_set_state(m, MOUNT_REMOUNTING);
968
969 return;
970
971fail:
e364ad06 972 log_warning("%s failed to run 'remount' task: %s", m->meta.id, strerror(-r));
e2f3b44c
LP
973 m->reload_failure = true;
974 mount_enter_mounted(m, true);
e537352b
LP
975}
976
977static int mount_start(Unit *u) {
978 Mount *m = MOUNT(u);
979
980 assert(m);
981
982 /* We cannot fulfill this request right now, try again later
983 * please! */
984 if (m->state == MOUNT_UNMOUNTING ||
985 m->state == MOUNT_UNMOUNTING_SIGTERM ||
60b912f6
LP
986 m->state == MOUNT_UNMOUNTING_SIGKILL ||
987 m->state == MOUNT_MOUNTING_SIGTERM ||
988 m->state == MOUNT_MOUNTING_SIGKILL)
e537352b
LP
989 return -EAGAIN;
990
991 /* Already on it! */
60b912f6 992 if (m->state == MOUNT_MOUNTING)
e537352b
LP
993 return 0;
994
fdf20a31 995 assert(m->state == MOUNT_DEAD || m->state == MOUNT_FAILED);
e537352b
LP
996
997 m->failure = false;
8d567588 998 mount_enter_mounting(m);
e537352b
LP
999 return 0;
1000}
1001
1002static int mount_stop(Unit *u) {
1003 Mount *m = MOUNT(u);
1004
1005 assert(m);
1006
e537352b
LP
1007 /* Already on it */
1008 if (m->state == MOUNT_UNMOUNTING ||
1009 m->state == MOUNT_UNMOUNTING_SIGKILL ||
60b912f6
LP
1010 m->state == MOUNT_UNMOUNTING_SIGTERM ||
1011 m->state == MOUNT_MOUNTING_SIGTERM ||
1012 m->state == MOUNT_MOUNTING_SIGKILL)
e537352b
LP
1013 return 0;
1014
3f6c78dc
LP
1015 assert(m->state == MOUNT_MOUNTING ||
1016 m->state == MOUNT_MOUNTING_DONE ||
1017 m->state == MOUNT_MOUNTED ||
3f6c78dc
LP
1018 m->state == MOUNT_REMOUNTING ||
1019 m->state == MOUNT_REMOUNTING_SIGTERM ||
1020 m->state == MOUNT_REMOUNTING_SIGKILL);
e537352b
LP
1021
1022 mount_enter_unmounting(m, true);
1023 return 0;
1024}
1025
1026static int mount_reload(Unit *u) {
1027 Mount *m = MOUNT(u);
1028
1029 assert(m);
1030
1031 if (m->state == MOUNT_MOUNTING_DONE)
1032 return -EAGAIN;
1033
1034 assert(m->state == MOUNT_MOUNTED);
1035
1036 mount_enter_remounting(m, true);
1037 return 0;
1038}
1039
a16e1123
LP
1040static int mount_serialize(Unit *u, FILE *f, FDSet *fds) {
1041 Mount *m = MOUNT(u);
1042
1043 assert(m);
1044 assert(f);
1045 assert(fds);
1046
1047 unit_serialize_item(u, f, "state", mount_state_to_string(m->state));
1048 unit_serialize_item(u, f, "failure", yes_no(m->failure));
1049
1050 if (m->control_pid > 0)
5925dd3c 1051 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) m->control_pid);
a16e1123
LP
1052
1053 if (m->control_command_id >= 0)
1054 unit_serialize_item(u, f, "control-command", mount_exec_command_to_string(m->control_command_id));
1055
1056 return 0;
1057}
1058
1059static int mount_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1060 Mount *m = MOUNT(u);
a16e1123
LP
1061
1062 assert(u);
1063 assert(key);
1064 assert(value);
1065 assert(fds);
1066
1067 if (streq(key, "state")) {
1068 MountState state;
1069
1070 if ((state = mount_state_from_string(value)) < 0)
1071 log_debug("Failed to parse state value %s", value);
1072 else
1073 m->deserialized_state = state;
1074 } else if (streq(key, "failure")) {
1075 int b;
1076
1077 if ((b = parse_boolean(value)) < 0)
1078 log_debug("Failed to parse failure value %s", value);
1079 else
1080 m->failure = b || m->failure;
1081
1082 } else if (streq(key, "control-pid")) {
5925dd3c 1083 pid_t pid;
a16e1123 1084
e364ad06 1085 if (parse_pid(value, &pid) < 0)
a16e1123
LP
1086 log_debug("Failed to parse control-pid value %s", value);
1087 else
5925dd3c 1088 m->control_pid = pid;
a16e1123
LP
1089 } else if (streq(key, "control-command")) {
1090 MountExecCommand id;
1091
1092 if ((id = mount_exec_command_from_string(value)) < 0)
1093 log_debug("Failed to parse exec-command value %s", value);
1094 else {
1095 m->control_command_id = id;
1096 m->control_command = m->exec_command + id;
1097 }
1098
1099 } else
1100 log_debug("Unknown serialization key '%s'", key);
1101
1102 return 0;
1103}
1104
e537352b
LP
1105static UnitActiveState mount_active_state(Unit *u) {
1106 assert(u);
1107
1108 return state_translation_table[MOUNT(u)->state];
1109}
1110
10a94420
LP
1111static const char *mount_sub_state_to_string(Unit *u) {
1112 assert(u);
1113
a16e1123 1114 return mount_state_to_string(MOUNT(u)->state);
10a94420
LP
1115}
1116
701cc384
LP
1117static bool mount_check_gc(Unit *u) {
1118 Mount *m = MOUNT(u);
1119
1120 assert(m);
1121
1122 return m->from_etc_fstab || m->from_proc_self_mountinfo;
1123}
1124
e537352b
LP
1125static void mount_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1126 Mount *m = MOUNT(u);
1127 bool success;
1128
1129 assert(m);
1130 assert(pid >= 0);
1131
8c47c732
LP
1132 if (pid != m->control_pid)
1133 return;
e537352b 1134
e537352b
LP
1135 m->control_pid = 0;
1136
8c47c732
LP
1137 success = is_clean_exit(code, status);
1138 m->failure = m->failure || !success;
1139
a16e1123 1140 if (m->control_command) {
169c1bda 1141 exec_status_exit(&m->control_command->exec_status, pid, code, status, m->exec_context.utmp_id);
a16e1123
LP
1142 m->control_command = NULL;
1143 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
1144 }
1145
92abbefb
LP
1146 log_full(success ? LOG_DEBUG : LOG_NOTICE,
1147 "%s mount process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
e537352b
LP
1148
1149 /* Note that mount(8) returning and the kernel sending us a
1150 * mount table change event might happen out-of-order. If an
1151 * operation succeed we assume the kernel will follow soon too
1152 * and already change into the resulting state. If it fails
1153 * we check if the kernel still knows about the mount. and
1154 * change state accordingly. */
1155
1156 switch (m->state) {
1157
1158 case MOUNT_MOUNTING:
1159 case MOUNT_MOUNTING_DONE:
1160 case MOUNT_MOUNTING_SIGKILL:
1161 case MOUNT_MOUNTING_SIGTERM:
e537352b 1162
19b160fa 1163 if (success)
e537352b
LP
1164 mount_enter_mounted(m, true);
1165 else if (m->from_proc_self_mountinfo)
1166 mount_enter_mounted(m, false);
1167 else
1168 mount_enter_dead(m, false);
1169 break;
1170
e2f3b44c
LP
1171 case MOUNT_REMOUNTING:
1172 case MOUNT_REMOUNTING_SIGKILL:
1173 case MOUNT_REMOUNTING_SIGTERM:
1174
1175 m->reload_failure = !success;
1176 if (m->from_proc_self_mountinfo)
1177 mount_enter_mounted(m, true);
1178 else
1179 mount_enter_dead(m, true);
1180
1181 break;
1182
e537352b
LP
1183 case MOUNT_UNMOUNTING:
1184 case MOUNT_UNMOUNTING_SIGKILL:
1185 case MOUNT_UNMOUNTING_SIGTERM:
1186
1187 if (success)
1188 mount_enter_dead(m, true);
1189 else if (m->from_proc_self_mountinfo)
1190 mount_enter_mounted(m, false);
1191 else
1192 mount_enter_dead(m, false);
1193 break;
1194
1195 default:
1196 assert_not_reached("Uh, control process died at wrong time.");
1197 }
c4e2ceae
LP
1198
1199 /* Notify clients about changed exit status */
1200 unit_add_to_dbus_queue(u);
e537352b
LP
1201}
1202
1203static void mount_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
1204 Mount *m = MOUNT(u);
1205
1206 assert(m);
1207 assert(elapsed == 1);
1208 assert(w == &m->timer_watch);
1209
1210 switch (m->state) {
1211
1212 case MOUNT_MOUNTING:
1213 case MOUNT_MOUNTING_DONE:
9e2f7c11 1214 log_warning("%s mounting timed out. Stopping.", u->meta.id);
e537352b
LP
1215 mount_enter_signal(m, MOUNT_MOUNTING_SIGTERM, false);
1216 break;
1217
1218 case MOUNT_REMOUNTING:
9e2f7c11 1219 log_warning("%s remounting timed out. Stopping.", u->meta.id);
e2f3b44c
LP
1220 m->reload_failure = true;
1221 mount_enter_mounted(m, true);
e537352b
LP
1222 break;
1223
1224 case MOUNT_UNMOUNTING:
9e2f7c11 1225 log_warning("%s unmounting timed out. Stopping.", u->meta.id);
e537352b
LP
1226 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGTERM, false);
1227 break;
1228
1229 case MOUNT_MOUNTING_SIGTERM:
ba035df2
LP
1230 if (m->exec_context.send_sigkill) {
1231 log_warning("%s mounting timed out. Killing.", u->meta.id);
1232 mount_enter_signal(m, MOUNT_MOUNTING_SIGKILL, false);
1233 } else {
1234 log_warning("%s mounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1235
1236 if (m->from_proc_self_mountinfo)
1237 mount_enter_mounted(m, false);
1238 else
1239 mount_enter_dead(m, false);
1240 }
e537352b
LP
1241 break;
1242
1243 case MOUNT_REMOUNTING_SIGTERM:
ba035df2
LP
1244 if (m->exec_context.send_sigkill) {
1245 log_warning("%s remounting timed out. Killing.", u->meta.id);
1246 mount_enter_signal(m, MOUNT_REMOUNTING_SIGKILL, false);
1247 } else {
1248 log_warning("%s remounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1249
1250 if (m->from_proc_self_mountinfo)
1251 mount_enter_mounted(m, false);
1252 else
1253 mount_enter_dead(m, false);
1254 }
e537352b
LP
1255 break;
1256
1257 case MOUNT_UNMOUNTING_SIGTERM:
ba035df2
LP
1258 if (m->exec_context.send_sigkill) {
1259 log_warning("%s unmounting timed out. Killing.", u->meta.id);
1260 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGKILL, false);
1261 } else {
1262 log_warning("%s unmounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1263
1264 if (m->from_proc_self_mountinfo)
1265 mount_enter_mounted(m, false);
1266 else
1267 mount_enter_dead(m, false);
1268 }
e537352b
LP
1269 break;
1270
1271 case MOUNT_MOUNTING_SIGKILL:
1272 case MOUNT_REMOUNTING_SIGKILL:
1273 case MOUNT_UNMOUNTING_SIGKILL:
9e2f7c11 1274 log_warning("%s mount process still around after SIGKILL. Ignoring.", u->meta.id);
e537352b
LP
1275
1276 if (m->from_proc_self_mountinfo)
1277 mount_enter_mounted(m, false);
1278 else
1279 mount_enter_dead(m, false);
1280 break;
1281
1282 default:
1283 assert_not_reached("Timeout at wrong time.");
1284 }
1285}
1286
1287static int mount_add_one(
1288 Manager *m,
1289 const char *what,
1290 const char *where,
1291 const char *options,
1292 const char *fstype,
9fff8a1f 1293 int passno,
e537352b
LP
1294 bool from_proc_self_mountinfo,
1295 bool set_flags) {
b08d03ff
LP
1296 int r;
1297 Unit *u;
1298 bool delete;
e537352b 1299 char *e, *w = NULL, *o = NULL, *f = NULL;
4e85aff4 1300 MountParameters *p;
b08d03ff 1301
f50e0a01 1302 assert(m);
b08d03ff
LP
1303 assert(what);
1304 assert(where);
e537352b
LP
1305 assert(options);
1306 assert(fstype);
1307
1308 assert(!set_flags || from_proc_self_mountinfo);
1309
1310 /* Ignore API mount points. They should never be referenced in
1311 * dependencies ever. */
33ff02c9 1312 if (mount_point_is_api(where) || mount_point_ignore(where))
57f2a956 1313 return 0;
b08d03ff 1314
8d567588
LP
1315 if (streq(fstype, "autofs"))
1316 return 0;
1317
4e85aff4
LP
1318 /* probably some kind of swap, ignore */
1319 if (!is_path(where))
b08d03ff
LP
1320 return 0;
1321
a16e1123 1322 if (!(e = unit_name_from_path(where, ".mount")))
b08d03ff
LP
1323 return -ENOMEM;
1324
1325 if (!(u = manager_get_unit(m, e))) {
1326 delete = true;
1327
1328 if (!(u = unit_new(m))) {
1329 free(e);
1330 return -ENOMEM;
1331 }
1332
1333 r = unit_add_name(u, e);
1334 free(e);
1335
1336 if (r < 0)
1337 goto fail;
1338
e537352b 1339 if (!(MOUNT(u)->where = strdup(where))) {
07b0b134
ML
1340 r = -ENOMEM;
1341 goto fail;
1342 }
f50e0a01 1343
f94ea366 1344 unit_add_to_load_queue(u);
b08d03ff
LP
1345 } else {
1346 delete = false;
1347 free(e);
1348 }
1349
e537352b
LP
1350 if (!(w = strdup(what)) ||
1351 !(o = strdup(options)) ||
1352 !(f = strdup(fstype))) {
1353 r = -ENOMEM;
1354 goto fail;
1355 }
1356
1357 if (from_proc_self_mountinfo) {
4e85aff4 1358 p = &MOUNT(u)->parameters_proc_self_mountinfo;
e537352b
LP
1359
1360 if (set_flags) {
1361 MOUNT(u)->is_mounted = true;
1362 MOUNT(u)->just_mounted = !MOUNT(u)->from_proc_self_mountinfo;
4e85aff4 1363 MOUNT(u)->just_changed = !streq_ptr(p->options, o);
e537352b 1364 }
ef734fd6 1365
f50e0a01 1366 MOUNT(u)->from_proc_self_mountinfo = true;
ef734fd6 1367 } else {
4e85aff4 1368 p = &MOUNT(u)->parameters_etc_fstab;
f50e0a01 1369 MOUNT(u)->from_etc_fstab = true;
ef734fd6 1370 }
f50e0a01 1371
4e85aff4
LP
1372 free(p->what);
1373 p->what = w;
b08d03ff 1374
4e85aff4
LP
1375 free(p->options);
1376 p->options = o;
e537352b 1377
4e85aff4
LP
1378 free(p->fstype);
1379 p->fstype = f;
b08d03ff 1380
9fff8a1f
LP
1381 p->passno = passno;
1382
c1e1601e
LP
1383 unit_add_to_dbus_queue(u);
1384
b08d03ff
LP
1385 return 0;
1386
1387fail:
e537352b
LP
1388 free(w);
1389 free(o);
1390 free(f);
1391
b08d03ff
LP
1392 if (delete && u)
1393 unit_free(u);
1394
4e85aff4 1395 return r;
b08d03ff
LP
1396}
1397
07b0b134
ML
1398static int mount_find_pri(char *options) {
1399 char *end, *pri;
1400 unsigned long r;
1401
1402 if (!(pri = mount_test_option(options, "pri=")))
1403 return 0;
1404
1405 pri += 4;
1406
1407 errno = 0;
1408 r = strtoul(pri, &end, 10);
1409
1410 if (errno != 0)
1411 return -errno;
1412
1413 if (end == pri || (*end != ',' && *end != 0))
1414 return -EINVAL;
1415
1416 return (int) r;
1417}
1418
e537352b 1419static int mount_load_etc_fstab(Manager *m) {
b08d03ff 1420 FILE *f;
60b912f6 1421 int r = 0;
b08d03ff
LP
1422 struct mntent* me;
1423
1424 assert(m);
1425
1426 errno = 0;
1427 if (!(f = setmntent("/etc/fstab", "r")))
1428 return -errno;
1429
1430 while ((me = getmntent(f))) {
1431 char *where, *what;
60b912f6 1432 int k;
b08d03ff
LP
1433
1434 if (!(what = fstab_node_to_udev_node(me->mnt_fsname))) {
1435 r = -ENOMEM;
1436 goto finish;
1437 }
1438
1439 if (!(where = strdup(me->mnt_dir))) {
1440 free(what);
1441 r = -ENOMEM;
1442 goto finish;
1443 }
1444
1445 if (what[0] == '/')
1446 path_kill_slashes(what);
1447
1448 if (where[0] == '/')
1449 path_kill_slashes(where);
1450
07b0b134
ML
1451 if (streq(me->mnt_type, "swap")) {
1452 int pri;
1453
1454 if ((pri = mount_find_pri(me->mnt_opts)) < 0)
60b912f6 1455 k = pri;
07b0b134 1456 else
60b912f6 1457 k = swap_add_one(m,
07b0b134 1458 what,
60b912f6 1459 NULL,
07b0b134 1460 pri,
4e85aff4 1461 !!mount_test_option(me->mnt_opts, MNTOPT_NOAUTO),
173a8d04 1462 !!mount_test_option(me->mnt_opts, "nofail"),
4e85aff4 1463 !!mount_test_option(me->mnt_opts, "comment=systemd.swapon"),
07b0b134
ML
1464 false);
1465 } else
9fff8a1f 1466 k = mount_add_one(m, what, where, me->mnt_opts, me->mnt_type, me->mnt_passno, false, false);
07b0b134 1467
b08d03ff
LP
1468 free(what);
1469 free(where);
1470
1471 if (r < 0)
60b912f6 1472 r = k;
b08d03ff
LP
1473 }
1474
b08d03ff
LP
1475finish:
1476
1477 endmntent(f);
1478 return r;
1479}
1480
ef734fd6 1481static int mount_load_proc_self_mountinfo(Manager *m, bool set_flags) {
60b912f6 1482 int r = 0;
1ddff895 1483 unsigned i;
a2e0f3d3 1484 char *device, *path, *options, *options2, *fstype, *d, *p, *o;
b08d03ff
LP
1485
1486 assert(m);
1487
ef734fd6 1488 rewind(m->proc_self_mountinfo);
b08d03ff 1489
1ddff895 1490 for (i = 1;; i++) {
b08d03ff 1491 int k;
e537352b 1492
a2e0f3d3 1493 device = path = options = options2 = fstype = d = p = o = NULL;
b08d03ff 1494
ef734fd6 1495 if ((k = fscanf(m->proc_self_mountinfo,
b08d03ff
LP
1496 "%*s " /* (1) mount id */
1497 "%*s " /* (2) parent id */
1498 "%*s " /* (3) major:minor */
1499 "%*s " /* (4) root */
1500 "%ms " /* (5) mount point */
e537352b 1501 "%ms" /* (6) mount options */
b08d03ff 1502 "%*[^-]" /* (7) optional fields */
c899f8c6 1503 "- " /* (8) separator */
e537352b 1504 "%ms " /* (9) file system type */
ef734fd6 1505 "%ms" /* (10) mount source */
a2e0f3d3 1506 "%ms" /* (11) mount options 2 */
ef734fd6 1507 "%*[^\n]", /* some rubbish at the end */
b08d03ff 1508 &path,
e537352b
LP
1509 &options,
1510 &fstype,
a2e0f3d3
LP
1511 &device,
1512 &options2)) != 5) {
b08d03ff 1513
ef734fd6
LP
1514 if (k == EOF)
1515 break;
b08d03ff 1516
1ddff895
FF
1517 log_warning("Failed to parse /proc/self/mountinfo:%u.", i);
1518 goto clean_up;
b08d03ff
LP
1519 }
1520
a2e0f3d3
LP
1521 if (asprintf(&o, "%s,%s", options, options2) < 0) {
1522 r = -ENOMEM;
1523 goto finish;
1524 }
1525
e537352b
LP
1526 if (!(d = cunescape(device)) ||
1527 !(p = cunescape(path))) {
1528 r = -ENOMEM;
1529 goto finish;
b08d03ff 1530 }
b08d03ff 1531
9fff8a1f 1532 if ((k = mount_add_one(m, d, p, o, fstype, 0, true, set_flags)) < 0)
60b912f6 1533 r = k;
b08d03ff 1534
1ddff895 1535clean_up:
e537352b
LP
1536 free(device);
1537 free(path);
1538 free(options);
a2e0f3d3 1539 free(options2);
e537352b 1540 free(fstype);
b08d03ff
LP
1541 free(d);
1542 free(p);
a2e0f3d3 1543 free(o);
b08d03ff
LP
1544 }
1545
e537352b
LP
1546finish:
1547 free(device);
1548 free(path);
1549 free(options);
a2e0f3d3 1550 free(options2);
e537352b
LP
1551 free(fstype);
1552 free(d);
1553 free(p);
a2e0f3d3 1554 free(o);
e537352b
LP
1555
1556 return r;
1557}
1558
1559static void mount_shutdown(Manager *m) {
1560 assert(m);
1561
a16e1123 1562 if (m->proc_self_mountinfo) {
e537352b 1563 fclose(m->proc_self_mountinfo);
a16e1123
LP
1564 m->proc_self_mountinfo = NULL;
1565 }
b08d03ff
LP
1566}
1567
1568static int mount_enumerate(Manager *m) {
1569 int r;
ef734fd6 1570 struct epoll_event ev;
b08d03ff
LP
1571 assert(m);
1572
a16e1123
LP
1573 if (!m->proc_self_mountinfo) {
1574 if (!(m->proc_self_mountinfo = fopen("/proc/self/mountinfo", "re")))
1575 return -errno;
ef734fd6 1576
a16e1123
LP
1577 m->mount_watch.type = WATCH_MOUNT;
1578 m->mount_watch.fd = fileno(m->proc_self_mountinfo);
ef734fd6 1579
a16e1123 1580 zero(ev);
4e434314 1581 ev.events = EPOLLPRI;
a16e1123 1582 ev.data.ptr = &m->mount_watch;
ef734fd6 1583
a16e1123
LP
1584 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->mount_watch.fd, &ev) < 0)
1585 return -errno;
1586 }
ef734fd6 1587
e537352b 1588 if ((r = mount_load_etc_fstab(m)) < 0)
b08d03ff
LP
1589 goto fail;
1590
ef734fd6 1591 if ((r = mount_load_proc_self_mountinfo(m, false)) < 0)
b08d03ff
LP
1592 goto fail;
1593
1594 return 0;
1595
1596fail:
1597 mount_shutdown(m);
1598 return r;
5cb5a6ff
LP
1599}
1600
ef734fd6
LP
1601void mount_fd_event(Manager *m, int events) {
1602 Meta *meta;
1603 int r;
1604
1605 assert(m);
4e434314 1606 assert(events & EPOLLPRI);
ef734fd6
LP
1607
1608 /* The manager calls this for every fd event happening on the
1609 * /proc/self/mountinfo file, which informs us about mounting
1610 * table changes */
1611
1612 if ((r = mount_load_proc_self_mountinfo(m, true)) < 0) {
e364ad06 1613 log_error("Failed to reread /proc/self/mountinfo: %s", strerror(-r));
e537352b
LP
1614
1615 /* Reset flags, just in case, for later calls */
1616 LIST_FOREACH(units_per_type, meta, m->units_per_type[UNIT_MOUNT]) {
1617 Mount *mount = (Mount*) meta;
1618
1619 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1620 }
1621
ef734fd6
LP
1622 return;
1623 }
1624
1625 manager_dispatch_load_queue(m);
1626
1627 LIST_FOREACH(units_per_type, meta, m->units_per_type[UNIT_MOUNT]) {
1628 Mount *mount = (Mount*) meta;
1629
e537352b
LP
1630 if (!mount->is_mounted) {
1631 /* This has just been unmounted. */
1632
ef734fd6 1633 mount->from_proc_self_mountinfo = false;
e537352b
LP
1634
1635 switch (mount->state) {
1636
1637 case MOUNT_MOUNTED:
1638 mount_enter_dead(mount, true);
1639 break;
1640
1641 default:
1642 mount_set_state(mount, mount->state);
1643 break;
1644
1645 }
1646
1647 } else if (mount->just_mounted || mount->just_changed) {
1648
60b912f6 1649 /* New or changed mount entry */
e537352b
LP
1650
1651 switch (mount->state) {
1652
1653 case MOUNT_DEAD:
fdf20a31 1654 case MOUNT_FAILED:
e537352b
LP
1655 mount_enter_mounted(mount, true);
1656 break;
1657
1658 case MOUNT_MOUNTING:
8d567588 1659 mount_enter_mounting_done(mount);
e537352b
LP
1660 break;
1661
1662 default:
1663 /* Nothing really changed, but let's
1664 * issue an notification call
1665 * nonetheless, in case somebody is
1666 * waiting for this. (e.g. file system
1667 * ro/rw remounts.) */
1668 mount_set_state(mount, mount->state);
1669 break;
1670 }
1671 }
1672
1673 /* Reset the flags for later calls */
1674 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1675 }
1676}
1677
fdf20a31 1678static void mount_reset_failed(Unit *u) {
5632e374
LP
1679 Mount *m = MOUNT(u);
1680
1681 assert(m);
1682
fdf20a31 1683 if (m->state == MOUNT_FAILED)
5632e374
LP
1684 mount_set_state(m, MOUNT_DEAD);
1685
1686 m->failure = false;
1687}
1688
8a0867d6
LP
1689static int mount_kill(Unit *u, KillWho who, KillMode mode, int signo, DBusError *error) {
1690 Mount *m = MOUNT(u);
1691 int r = 0;
1692 Set *pid_set = NULL;
1693
1694 assert(m);
1695
1696 if (who == KILL_MAIN) {
1697 dbus_set_error(error, BUS_ERROR_NO_SUCH_PROCESS, "Mount units have no main processes");
1698 return -EINVAL;
1699 }
1700
1701 if (m->control_pid <= 0 && who == KILL_CONTROL) {
1702 dbus_set_error(error, BUS_ERROR_NO_SUCH_PROCESS, "No control process to kill");
1703 return -ENOENT;
1704 }
1705
1706 if (m->control_pid > 0)
cd25cce9 1707 if (kill(m->control_pid, signo) < 0)
8a0867d6
LP
1708 r = -errno;
1709
1710 if (mode == KILL_CONTROL_GROUP) {
1711 int q;
1712
1713 if (!(pid_set = set_new(trivial_hash_func, trivial_compare_func)))
1714 return -ENOMEM;
1715
1716 /* Exclude the control pid from being killed via the cgroup */
1717 if (m->control_pid > 0)
1718 if ((q = set_put(pid_set, LONG_TO_PTR(m->control_pid))) < 0) {
1719 r = q;
1720 goto finish;
1721 }
1722
430c18ed 1723 if ((q = cgroup_bonding_kill_list(m->meta.cgroup_bondings, signo, false, pid_set)) < 0)
8a0867d6
LP
1724 if (r != -EAGAIN && r != -ESRCH && r != -ENOENT)
1725 r = q;
1726 }
1727
1728finish:
1729 if (pid_set)
1730 set_free(pid_set);
1731
1732 return r;
1733}
1734
a16e1123
LP
1735static const char* const mount_state_table[_MOUNT_STATE_MAX] = {
1736 [MOUNT_DEAD] = "dead",
1737 [MOUNT_MOUNTING] = "mounting",
1738 [MOUNT_MOUNTING_DONE] = "mounting-done",
1739 [MOUNT_MOUNTED] = "mounted",
1740 [MOUNT_REMOUNTING] = "remounting",
1741 [MOUNT_UNMOUNTING] = "unmounting",
1742 [MOUNT_MOUNTING_SIGTERM] = "mounting-sigterm",
1743 [MOUNT_MOUNTING_SIGKILL] = "mounting-sigkill",
1744 [MOUNT_REMOUNTING_SIGTERM] = "remounting-sigterm",
1745 [MOUNT_REMOUNTING_SIGKILL] = "remounting-sigkill",
1746 [MOUNT_UNMOUNTING_SIGTERM] = "unmounting-sigterm",
1747 [MOUNT_UNMOUNTING_SIGKILL] = "unmounting-sigkill",
fdf20a31 1748 [MOUNT_FAILED] = "failed"
a16e1123
LP
1749};
1750
1751DEFINE_STRING_TABLE_LOOKUP(mount_state, MountState);
1752
1753static const char* const mount_exec_command_table[_MOUNT_EXEC_COMMAND_MAX] = {
1754 [MOUNT_EXEC_MOUNT] = "ExecMount",
1755 [MOUNT_EXEC_UNMOUNT] = "ExecUnmount",
1756 [MOUNT_EXEC_REMOUNT] = "ExecRemount",
1757};
1758
1759DEFINE_STRING_TABLE_LOOKUP(mount_exec_command, MountExecCommand);
1760
87f0e418 1761const UnitVTable mount_vtable = {
5cb5a6ff
LP
1762 .suffix = ".mount",
1763
e537352b 1764 .no_alias = true,
9e2f7c11 1765 .no_instances = true,
c497c7a9 1766 .no_isolate = true,
9e58ff9c 1767 .show_status = true,
e537352b
LP
1768
1769 .init = mount_init,
1770 .load = mount_load,
034c6ed7 1771 .done = mount_done,
e537352b 1772
f50e0a01
LP
1773 .coldplug = mount_coldplug,
1774
034c6ed7 1775 .dump = mount_dump,
5cb5a6ff 1776
e537352b
LP
1777 .start = mount_start,
1778 .stop = mount_stop,
1779 .reload = mount_reload,
1780
8a0867d6
LP
1781 .kill = mount_kill,
1782
a16e1123
LP
1783 .serialize = mount_serialize,
1784 .deserialize_item = mount_deserialize_item,
1785
f50e0a01 1786 .active_state = mount_active_state,
10a94420 1787 .sub_state_to_string = mount_sub_state_to_string,
b08d03ff 1788
701cc384
LP
1789 .check_gc = mount_check_gc,
1790
e537352b
LP
1791 .sigchld_event = mount_sigchld_event,
1792 .timer_event = mount_timer_event,
1793
fdf20a31 1794 .reset_failed = mount_reset_failed,
5632e374 1795
c4e2ceae 1796 .bus_interface = "org.freedesktop.systemd1.Mount",
4139c1b2 1797 .bus_message_handler = bus_mount_message_handler,
c4e2ceae 1798 .bus_invalidating_properties = bus_mount_invalidating_properties,
4139c1b2 1799
f50e0a01
LP
1800 .enumerate = mount_enumerate,
1801 .shutdown = mount_shutdown
5cb5a6ff 1802};