1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
25 #include <sys/epoll.h>
30 #include "load-fragment.h"
31 #include "load-dropin.h"
35 #include "path-util.h"
36 #include "mount-setup.h"
37 #include "unit-name.h"
38 #include "dbus-mount.h"
40 #include "bus-errors.h"
41 #include "exit-status.h"
44 static const UnitActiveState state_translation_table[_MOUNT_STATE_MAX] = {
45 [MOUNT_DEAD] = UNIT_INACTIVE,
46 [MOUNT_MOUNTING] = UNIT_ACTIVATING,
47 [MOUNT_MOUNTING_DONE] = UNIT_ACTIVE,
48 [MOUNT_MOUNTED] = UNIT_ACTIVE,
49 [MOUNT_REMOUNTING] = UNIT_RELOADING,
50 [MOUNT_UNMOUNTING] = UNIT_DEACTIVATING,
51 [MOUNT_MOUNTING_SIGTERM] = UNIT_DEACTIVATING,
52 [MOUNT_MOUNTING_SIGKILL] = UNIT_DEACTIVATING,
53 [MOUNT_REMOUNTING_SIGTERM] = UNIT_RELOADING,
54 [MOUNT_REMOUNTING_SIGKILL] = UNIT_RELOADING,
55 [MOUNT_UNMOUNTING_SIGTERM] = UNIT_DEACTIVATING,
56 [MOUNT_UNMOUNTING_SIGKILL] = UNIT_DEACTIVATING,
57 [MOUNT_FAILED] = UNIT_FAILED
60 static void mount_init(Unit *u) {
64 assert(u->load_state == UNIT_STUB);
66 m->timeout_usec = DEFAULT_TIMEOUT_USEC;
67 m->directory_mode = 0755;
69 exec_context_init(&m->exec_context);
71 if (unit_has_name(u, "-.mount")) {
72 /* Don't allow start/stop for root directory */
73 UNIT(m)->refuse_manual_start = true;
74 UNIT(m)->refuse_manual_stop = true;
76 /* The stdio/kmsg bridge socket is on /, in order to avoid a
77 * dep loop, don't use kmsg logging for -.mount */
78 m->exec_context.std_output = u->manager->default_std_output;
79 m->exec_context.std_error = u->manager->default_std_error;
82 kill_context_init(&m->kill_context);
84 /* We need to make sure that /bin/mount is always called in
85 * the same process group as us, so that the autofs kernel
86 * side doesn't send us another mount request while we are
87 * already trying to comply its last one. */
88 m->exec_context.same_pgrp = true;
90 m->timer_watch.type = WATCH_INVALID;
92 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
94 UNIT(m)->ignore_on_isolate = true;
97 static void mount_unwatch_control_pid(Mount *m) {
100 if (m->control_pid <= 0)
103 unit_unwatch_pid(UNIT(m), m->control_pid);
107 static void mount_parameters_done(MountParameters *p) {
114 p->what = p->options = p->fstype = NULL;
117 static void mount_done(Unit *u) {
125 mount_parameters_done(&m->parameters_proc_self_mountinfo);
126 mount_parameters_done(&m->parameters_fragment);
128 exec_context_done(&m->exec_context);
129 exec_command_done_array(m->exec_command, _MOUNT_EXEC_COMMAND_MAX);
130 m->control_command = NULL;
132 mount_unwatch_control_pid(m);
134 unit_unwatch_timer(u, &m->timer_watch);
137 static MountParameters* get_mount_parameters_fragment(Mount *m) {
140 if (m->from_fragment)
141 return &m->parameters_fragment;
146 static MountParameters* get_mount_parameters(Mount *m) {
149 if (m->from_proc_self_mountinfo)
150 return &m->parameters_proc_self_mountinfo;
152 return get_mount_parameters_fragment(m);
155 static int mount_add_mount_links(Mount *m) {
162 pm = get_mount_parameters_fragment(m);
164 /* Adds in links to other mount points that might lie below or
165 * above us in the hierarchy */
167 LIST_FOREACH(units_by_type, other, UNIT(m)->manager->units_by_type[UNIT_MOUNT]) {
168 Mount *n = MOUNT(other);
174 if (UNIT(n)->load_state != UNIT_LOADED)
177 pn = get_mount_parameters_fragment(n);
179 if (path_startswith(m->where, n->where)) {
181 if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
185 if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
188 } else if (path_startswith(n->where, m->where)) {
190 if ((r = unit_add_dependency(UNIT(n), UNIT_AFTER, UNIT(m), true)) < 0)
194 if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
197 } else if (pm && pm->what && path_startswith(pm->what, n->where)) {
199 if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
202 if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
205 } else if (pn && pn->what && path_startswith(pn->what, m->where)) {
207 if ((r = unit_add_dependency(UNIT(n), UNIT_AFTER, UNIT(m), true)) < 0)
210 if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
218 static int mount_add_swap_links(Mount *m) {
224 LIST_FOREACH(units_by_type, other, UNIT(m)->manager->units_by_type[UNIT_SWAP])
225 if ((r = swap_add_one_mount_link(SWAP(other), m)) < 0)
231 static int mount_add_path_links(Mount *m) {
237 LIST_FOREACH(units_by_type, other, UNIT(m)->manager->units_by_type[UNIT_PATH])
238 if ((r = path_add_one_mount_link(PATH(other), m)) < 0)
244 static int mount_add_automount_links(Mount *m) {
250 LIST_FOREACH(units_by_type, other, UNIT(m)->manager->units_by_type[UNIT_AUTOMOUNT])
251 if ((r = automount_add_one_mount_link(AUTOMOUNT(other), m)) < 0)
257 static int mount_add_socket_links(Mount *m) {
263 LIST_FOREACH(units_by_type, other, UNIT(m)->manager->units_by_type[UNIT_SOCKET])
264 if ((r = socket_add_one_mount_link(SOCKET(other), m)) < 0)
270 static int mount_add_requires_mounts_links(Mount *m) {
276 LIST_FOREACH(has_requires_mounts_for, other, UNIT(m)->manager->has_requires_mounts_for) {
277 r = unit_add_one_mount_link(other, m);
285 static char* mount_test_option(const char *haystack, const char *needle) {
290 /* Like glibc's hasmntopt(), but works on a string, not a
297 me.mnt_opts = (char*) haystack;
299 return hasmntopt(&me, needle);
302 static bool mount_is_network(MountParameters *p) {
305 if (mount_test_option(p->options, "_netdev"))
308 if (p->fstype && fstype_is_network(p->fstype))
314 static bool mount_is_bind(MountParameters *p) {
317 if (mount_test_option(p->options, "bind"))
320 if (p->fstype && streq(p->fstype, "bind"))
326 static bool needs_quota(MountParameters *p) {
329 if (mount_is_network(p))
332 if (mount_is_bind(p))
335 return mount_test_option(p->options, "usrquota") ||
336 mount_test_option(p->options, "grpquota") ||
337 mount_test_option(p->options, "quota") ||
338 mount_test_option(p->options, "usrjquota") ||
339 mount_test_option(p->options, "grpjquota");
342 static int mount_add_device_links(Mount *m) {
348 p = get_mount_parameters_fragment(m);
355 if (!mount_is_bind(p) &&
356 !path_equal(m->where, "/")) {
357 r = unit_add_node_link(UNIT(m), p->what, false);
364 !path_equal(m->where, "/") &&
365 UNIT(m)->manager->running_as == SYSTEMD_SYSTEM) {
368 /* Let's add in the fsck service */
370 /* aka SPECIAL_FSCK_SERVICE */
371 name = unit_name_from_path_instance("systemd-fsck", p->what, ".service");
375 r = manager_load_unit_prepare(UNIT(m)->manager, name, NULL, NULL, &fsck);
377 log_warning("Failed to prepare unit %s: %s", name, strerror(-r));
383 SERVICE(fsck)->fsck_passno = p->passno;
385 r = unit_add_two_dependencies(UNIT(m), UNIT_AFTER, UNIT_REQUIRES, fsck, true);
393 static int mount_add_quota_links(Mount *m) {
399 if (UNIT(m)->manager->running_as != SYSTEMD_SYSTEM)
402 p = get_mount_parameters_fragment(m);
409 r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_WANTS, SPECIAL_QUOTACHECK_SERVICE, NULL, true);
413 r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_WANTS, SPECIAL_QUOTAON_SERVICE, NULL, true);
420 static int mount_add_default_dependencies(Mount *m) {
427 if (UNIT(m)->manager->running_as != SYSTEMD_SYSTEM)
430 p = get_mount_parameters_fragment(m);
434 if (path_equal(m->where, "/"))
437 if (mount_is_network(p))
438 after = SPECIAL_REMOTE_FS_PRE_TARGET;
440 after = SPECIAL_LOCAL_FS_PRE_TARGET;
442 r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_WANTS, UNIT_AFTER, after, NULL, true);
446 r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_UMOUNT_TARGET, NULL, true);
453 static int mount_fix_timeouts(Mount *m) {
455 const char *timeout = NULL;
464 p = get_mount_parameters_fragment(m);
468 /* Allow configuration how long we wait for a device that
469 * backs a mount point to show up. This is useful to support
470 * endless device timeouts for devices that show up only after
471 * user input, like crypto devices. */
473 if ((timeout = mount_test_option(p->options, "comment=systemd.device-timeout")))
475 else if ((timeout = mount_test_option(p->options, "x-systemd.device-timeout")))
480 t = strndup(timeout, strcspn(timeout, ",;" WHITESPACE));
484 r = parse_usec(t, &u);
488 log_warning("Failed to parse timeout for %s, ignoring: %s", m->where, timeout);
492 SET_FOREACH(other, UNIT(m)->dependencies[UNIT_AFTER], i) {
493 if (other->type != UNIT_DEVICE)
496 other->job_timeout = u;
502 static int mount_verify(Mount *m) {
507 if (UNIT(m)->load_state != UNIT_LOADED)
510 if (!m->from_fragment && !m->from_proc_self_mountinfo)
513 if (!(e = unit_name_from_path(m->where, ".mount")))
516 b = unit_has_name(UNIT(m), e);
520 log_error("%s's Where setting doesn't match unit name. Refusing.", UNIT(m)->id);
524 if (mount_point_is_api(m->where) || mount_point_ignore(m->where)) {
525 log_error("Cannot create mount unit for API file system %s. Refusing.", m->where);
529 if (UNIT(m)->fragment_path && !m->parameters_fragment.what) {
530 log_error("%s's What setting is missing. Refusing.", UNIT(m)->id);
534 if (m->exec_context.pam_name && m->kill_context.kill_mode != KILL_CONTROL_GROUP) {
535 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", UNIT(m)->id);
542 static int mount_add_extras(Mount *m) {
546 r = unit_add_exec_dependencies(u, &m->exec_context);
550 if (UNIT(m)->fragment_path)
551 m->from_fragment = true;
554 m->where = unit_name_to_path(u->id);
559 path_kill_slashes(m->where);
561 if (!UNIT(m)->description) {
562 r = unit_set_description(u, m->where);
567 r = mount_add_device_links(m);
571 r = mount_add_mount_links(m);
575 r = mount_add_socket_links(m);
579 r = mount_add_swap_links(m);
583 r = mount_add_path_links(m);
587 r = mount_add_requires_mounts_links(m);
591 r = mount_add_automount_links(m);
595 r = mount_add_quota_links(m);
599 if (UNIT(m)->default_dependencies) {
600 r = mount_add_default_dependencies(m);
605 r = unit_add_default_cgroups(u);
609 r = mount_fix_timeouts(m);
616 static int mount_load(Unit *u) {
621 assert(u->load_state == UNIT_STUB);
623 if (m->from_proc_self_mountinfo)
624 r = unit_load_fragment_and_dropin_optional(u);
626 r = unit_load_fragment_and_dropin(u);
631 /* This is a new unit? Then let's add in some extras */
632 if (u->load_state == UNIT_LOADED) {
633 r = mount_add_extras(m);
637 r = unit_exec_context_defaults(u, &m->exec_context);
642 return mount_verify(m);
645 static int mount_notify_automount(Mount *m, int status) {
652 SET_FOREACH(p, UNIT(m)->dependencies[UNIT_TRIGGERED_BY], i)
653 if (p->type == UNIT_AUTOMOUNT) {
654 r = automount_send_ready(AUTOMOUNT(p), status);
662 static void mount_set_state(Mount *m, MountState state) {
663 MountState old_state;
666 old_state = m->state;
669 if (state != MOUNT_MOUNTING &&
670 state != MOUNT_MOUNTING_DONE &&
671 state != MOUNT_REMOUNTING &&
672 state != MOUNT_UNMOUNTING &&
673 state != MOUNT_MOUNTING_SIGTERM &&
674 state != MOUNT_MOUNTING_SIGKILL &&
675 state != MOUNT_UNMOUNTING_SIGTERM &&
676 state != MOUNT_UNMOUNTING_SIGKILL &&
677 state != MOUNT_REMOUNTING_SIGTERM &&
678 state != MOUNT_REMOUNTING_SIGKILL) {
679 unit_unwatch_timer(UNIT(m), &m->timer_watch);
680 mount_unwatch_control_pid(m);
681 m->control_command = NULL;
682 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
685 if (state == MOUNT_MOUNTED ||
686 state == MOUNT_REMOUNTING)
687 mount_notify_automount(m, 0);
688 else if (state == MOUNT_DEAD ||
689 state == MOUNT_UNMOUNTING ||
690 state == MOUNT_MOUNTING_SIGTERM ||
691 state == MOUNT_MOUNTING_SIGKILL ||
692 state == MOUNT_REMOUNTING_SIGTERM ||
693 state == MOUNT_REMOUNTING_SIGKILL ||
694 state == MOUNT_UNMOUNTING_SIGTERM ||
695 state == MOUNT_UNMOUNTING_SIGKILL ||
696 state == MOUNT_FAILED) {
697 if (state != old_state)
698 mount_notify_automount(m, -ENODEV);
701 if (state != old_state)
702 log_debug("%s changed %s -> %s",
704 mount_state_to_string(old_state),
705 mount_state_to_string(state));
707 unit_notify(UNIT(m), state_translation_table[old_state], state_translation_table[state], m->reload_result == MOUNT_SUCCESS);
708 m->reload_result = MOUNT_SUCCESS;
711 static int mount_coldplug(Unit *u) {
713 MountState new_state = MOUNT_DEAD;
717 assert(m->state == MOUNT_DEAD);
719 if (m->deserialized_state != m->state)
720 new_state = m->deserialized_state;
721 else if (m->from_proc_self_mountinfo)
722 new_state = MOUNT_MOUNTED;
724 if (new_state != m->state) {
726 if (new_state == MOUNT_MOUNTING ||
727 new_state == MOUNT_MOUNTING_DONE ||
728 new_state == MOUNT_REMOUNTING ||
729 new_state == MOUNT_UNMOUNTING ||
730 new_state == MOUNT_MOUNTING_SIGTERM ||
731 new_state == MOUNT_MOUNTING_SIGKILL ||
732 new_state == MOUNT_UNMOUNTING_SIGTERM ||
733 new_state == MOUNT_UNMOUNTING_SIGKILL ||
734 new_state == MOUNT_REMOUNTING_SIGTERM ||
735 new_state == MOUNT_REMOUNTING_SIGKILL) {
737 if (m->control_pid <= 0)
740 if ((r = unit_watch_pid(UNIT(m), m->control_pid)) < 0)
743 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
747 mount_set_state(m, new_state);
753 static void mount_dump(Unit *u, FILE *f, const char *prefix) {
760 p = get_mount_parameters(m);
763 "%sMount State: %s\n"
767 "%sFile System Type: %s\n"
769 "%sFrom /proc/self/mountinfo: %s\n"
770 "%sFrom fragment: %s\n"
771 "%sDirectoryMode: %04o\n",
772 prefix, mount_state_to_string(m->state),
773 prefix, mount_result_to_string(m->result),
775 prefix, strna(p->what),
776 prefix, strna(p->fstype),
777 prefix, strna(p->options),
778 prefix, yes_no(m->from_proc_self_mountinfo),
779 prefix, yes_no(m->from_fragment),
780 prefix, m->directory_mode);
782 if (m->control_pid > 0)
784 "%sControl PID: %lu\n",
785 prefix, (unsigned long) m->control_pid);
787 exec_context_dump(&m->exec_context, f, prefix);
788 kill_context_dump(&m->kill_context, f, prefix);
791 static int mount_spawn(Mount *m, ExecCommand *c, pid_t *_pid) {
799 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
802 if ((r = exec_spawn(c,
806 UNIT(m)->manager->environment,
810 UNIT(m)->manager->confirm_spawn,
811 UNIT(m)->cgroup_bondings,
812 UNIT(m)->cgroup_attributes,
819 if ((r = unit_watch_pid(UNIT(m), pid)) < 0)
820 /* FIXME: we need to do something here */
828 unit_unwatch_timer(UNIT(m), &m->timer_watch);
833 static void mount_enter_dead(Mount *m, MountResult f) {
836 if (f != MOUNT_SUCCESS)
839 mount_set_state(m, m->result != MOUNT_SUCCESS ? MOUNT_FAILED : MOUNT_DEAD);
842 static void mount_enter_mounted(Mount *m, MountResult f) {
845 if (f != MOUNT_SUCCESS)
848 mount_set_state(m, MOUNT_MOUNTED);
851 static void mount_enter_signal(Mount *m, MountState state, MountResult f) {
854 bool wait_for_exit = false;
858 if (f != MOUNT_SUCCESS)
861 if (m->kill_context.kill_mode != KILL_NONE) {
862 int sig = (state == MOUNT_MOUNTING_SIGTERM ||
863 state == MOUNT_UNMOUNTING_SIGTERM ||
864 state == MOUNT_REMOUNTING_SIGTERM) ? m->kill_context.kill_signal : SIGKILL;
866 if (m->control_pid > 0) {
867 if (kill_and_sigcont(m->control_pid, sig) < 0 && errno != ESRCH)
869 log_warning("Failed to kill control process %li: %m", (long) m->control_pid);
871 wait_for_exit = true;
874 if (m->kill_context.kill_mode == KILL_CONTROL_GROUP) {
876 if (!(pid_set = set_new(trivial_hash_func, trivial_compare_func))) {
881 /* Exclude the control pid from being killed via the cgroup */
882 if (m->control_pid > 0)
883 if ((r = set_put(pid_set, LONG_TO_PTR(m->control_pid))) < 0)
886 r = cgroup_bonding_kill_list(UNIT(m)->cgroup_bondings, sig, true, false, pid_set, NULL);
888 if (r != -EAGAIN && r != -ESRCH && r != -ENOENT)
889 log_warning("Failed to kill control group: %s", strerror(-r));
891 wait_for_exit = true;
899 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
902 mount_set_state(m, state);
903 } else if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
904 mount_enter_mounted(m, MOUNT_SUCCESS);
906 mount_enter_dead(m, MOUNT_SUCCESS);
911 log_warning("%s failed to kill processes: %s", UNIT(m)->id, strerror(-r));
913 if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
914 mount_enter_mounted(m, MOUNT_FAILURE_RESOURCES);
916 mount_enter_dead(m, MOUNT_FAILURE_RESOURCES);
922 static void mount_enter_unmounting(Mount *m) {
927 m->control_command_id = MOUNT_EXEC_UNMOUNT;
928 m->control_command = m->exec_command + MOUNT_EXEC_UNMOUNT;
930 if ((r = exec_command_set(
937 mount_unwatch_control_pid(m);
939 if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
942 mount_set_state(m, MOUNT_UNMOUNTING);
947 log_warning("%s failed to run 'umount' task: %s", UNIT(m)->id, strerror(-r));
948 mount_enter_mounted(m, MOUNT_FAILURE_RESOURCES);
951 static void mount_enter_mounting(Mount *m) {
957 m->control_command_id = MOUNT_EXEC_MOUNT;
958 m->control_command = m->exec_command + MOUNT_EXEC_MOUNT;
960 mkdir_p_label(m->where, m->directory_mode);
962 if (dir_is_empty(m->where) <= 0)
963 log_notice("%s: Directory %s to mount over is not empty, mounting anyway. (To see the over-mounted files, please manually mount the underlying file system to a secondary location.)", m->meta.id, m->where);
965 /* Create the source directory for bind-mounts if needed */
966 p = get_mount_parameters_fragment(m);
967 if (p && mount_is_bind(p))
968 mkdir_p_label(p->what, m->directory_mode);
970 if (m->from_fragment)
971 r = exec_command_set(
974 m->parameters_fragment.what,
976 "-t", m->parameters_fragment.fstype ? m->parameters_fragment.fstype : "auto",
977 m->parameters_fragment.options ? "-o" : NULL, m->parameters_fragment.options,
985 mount_unwatch_control_pid(m);
987 r = mount_spawn(m, m->control_command, &m->control_pid);
991 mount_set_state(m, MOUNT_MOUNTING);
996 log_warning("%s failed to run 'mount' task: %s", UNIT(m)->id, strerror(-r));
997 mount_enter_dead(m, MOUNT_FAILURE_RESOURCES);
1000 static void mount_enter_mounting_done(Mount *m) {
1003 mount_set_state(m, MOUNT_MOUNTING_DONE);
1006 static void mount_enter_remounting(Mount *m) {
1011 m->control_command_id = MOUNT_EXEC_REMOUNT;
1012 m->control_command = m->exec_command + MOUNT_EXEC_REMOUNT;
1014 if (m->from_fragment) {
1018 if (m->parameters_fragment.options) {
1019 if (!(buf = strappend("remount,", m->parameters_fragment.options))) {
1028 r = exec_command_set(
1031 m->parameters_fragment.what,
1033 "-t", m->parameters_fragment.fstype ? m->parameters_fragment.fstype : "auto",
1044 mount_unwatch_control_pid(m);
1046 if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
1049 mount_set_state(m, MOUNT_REMOUNTING);
1054 log_warning("%s failed to run 'remount' task: %s", UNIT(m)->id, strerror(-r));
1055 m->reload_result = MOUNT_FAILURE_RESOURCES;
1056 mount_enter_mounted(m, MOUNT_SUCCESS);
1059 static int mount_start(Unit *u) {
1060 Mount *m = MOUNT(u);
1064 /* We cannot fulfill this request right now, try again later
1066 if (m->state == MOUNT_UNMOUNTING ||
1067 m->state == MOUNT_UNMOUNTING_SIGTERM ||
1068 m->state == MOUNT_UNMOUNTING_SIGKILL ||
1069 m->state == MOUNT_MOUNTING_SIGTERM ||
1070 m->state == MOUNT_MOUNTING_SIGKILL)
1073 /* Already on it! */
1074 if (m->state == MOUNT_MOUNTING)
1077 assert(m->state == MOUNT_DEAD || m->state == MOUNT_FAILED);
1079 m->result = MOUNT_SUCCESS;
1080 m->reload_result = MOUNT_SUCCESS;
1082 mount_enter_mounting(m);
1086 static int mount_stop(Unit *u) {
1087 Mount *m = MOUNT(u);
1092 if (m->state == MOUNT_UNMOUNTING ||
1093 m->state == MOUNT_UNMOUNTING_SIGKILL ||
1094 m->state == MOUNT_UNMOUNTING_SIGTERM ||
1095 m->state == MOUNT_MOUNTING_SIGTERM ||
1096 m->state == MOUNT_MOUNTING_SIGKILL)
1099 assert(m->state == MOUNT_MOUNTING ||
1100 m->state == MOUNT_MOUNTING_DONE ||
1101 m->state == MOUNT_MOUNTED ||
1102 m->state == MOUNT_REMOUNTING ||
1103 m->state == MOUNT_REMOUNTING_SIGTERM ||
1104 m->state == MOUNT_REMOUNTING_SIGKILL);
1106 mount_enter_unmounting(m);
1110 static int mount_reload(Unit *u) {
1111 Mount *m = MOUNT(u);
1115 if (m->state == MOUNT_MOUNTING_DONE)
1118 assert(m->state == MOUNT_MOUNTED);
1120 mount_enter_remounting(m);
1124 static int mount_serialize(Unit *u, FILE *f, FDSet *fds) {
1125 Mount *m = MOUNT(u);
1131 unit_serialize_item(u, f, "state", mount_state_to_string(m->state));
1132 unit_serialize_item(u, f, "result", mount_result_to_string(m->result));
1133 unit_serialize_item(u, f, "reload-result", mount_result_to_string(m->reload_result));
1135 if (m->control_pid > 0)
1136 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) m->control_pid);
1138 if (m->control_command_id >= 0)
1139 unit_serialize_item(u, f, "control-command", mount_exec_command_to_string(m->control_command_id));
1144 static int mount_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1145 Mount *m = MOUNT(u);
1152 if (streq(key, "state")) {
1155 if ((state = mount_state_from_string(value)) < 0)
1156 log_debug("Failed to parse state value %s", value);
1158 m->deserialized_state = state;
1159 } else if (streq(key, "result")) {
1162 f = mount_result_from_string(value);
1164 log_debug("Failed to parse result value %s", value);
1165 else if (f != MOUNT_SUCCESS)
1168 } else if (streq(key, "reload-result")) {
1171 f = mount_result_from_string(value);
1173 log_debug("Failed to parse reload result value %s", value);
1174 else if (f != MOUNT_SUCCESS)
1175 m->reload_result = f;
1177 } else if (streq(key, "control-pid")) {
1180 if (parse_pid(value, &pid) < 0)
1181 log_debug("Failed to parse control-pid value %s", value);
1183 m->control_pid = pid;
1184 } else if (streq(key, "control-command")) {
1185 MountExecCommand id;
1187 if ((id = mount_exec_command_from_string(value)) < 0)
1188 log_debug("Failed to parse exec-command value %s", value);
1190 m->control_command_id = id;
1191 m->control_command = m->exec_command + id;
1195 log_debug("Unknown serialization key '%s'", key);
1200 static UnitActiveState mount_active_state(Unit *u) {
1203 return state_translation_table[MOUNT(u)->state];
1206 static const char *mount_sub_state_to_string(Unit *u) {
1209 return mount_state_to_string(MOUNT(u)->state);
1212 static bool mount_check_gc(Unit *u) {
1213 Mount *m = MOUNT(u);
1217 return m->from_proc_self_mountinfo;
1220 static void mount_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1221 Mount *m = MOUNT(u);
1227 if (pid != m->control_pid)
1232 if (is_clean_exit(code, status, NULL))
1234 else if (code == CLD_EXITED)
1235 f = MOUNT_FAILURE_EXIT_CODE;
1236 else if (code == CLD_KILLED)
1237 f = MOUNT_FAILURE_SIGNAL;
1238 else if (code == CLD_DUMPED)
1239 f = MOUNT_FAILURE_CORE_DUMP;
1241 assert_not_reached("Unknown code");
1243 if (f != MOUNT_SUCCESS)
1246 if (m->control_command) {
1247 exec_status_exit(&m->control_command->exec_status, &m->exec_context, pid, code, status);
1249 m->control_command = NULL;
1250 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
1253 log_full(f == MOUNT_SUCCESS ? LOG_DEBUG : LOG_NOTICE,
1254 "%s mount process exited, code=%s status=%i", u->id, sigchld_code_to_string(code), status);
1256 /* Note that mount(8) returning and the kernel sending us a
1257 * mount table change event might happen out-of-order. If an
1258 * operation succeed we assume the kernel will follow soon too
1259 * and already change into the resulting state. If it fails
1260 * we check if the kernel still knows about the mount. and
1261 * change state accordingly. */
1265 case MOUNT_MOUNTING:
1266 case MOUNT_MOUNTING_DONE:
1267 case MOUNT_MOUNTING_SIGKILL:
1268 case MOUNT_MOUNTING_SIGTERM:
1270 if (f == MOUNT_SUCCESS)
1271 mount_enter_mounted(m, f);
1272 else if (m->from_proc_self_mountinfo)
1273 mount_enter_mounted(m, f);
1275 mount_enter_dead(m, f);
1278 case MOUNT_REMOUNTING:
1279 case MOUNT_REMOUNTING_SIGKILL:
1280 case MOUNT_REMOUNTING_SIGTERM:
1282 m->reload_result = f;
1283 if (m->from_proc_self_mountinfo)
1284 mount_enter_mounted(m, MOUNT_SUCCESS);
1286 mount_enter_dead(m, MOUNT_SUCCESS);
1290 case MOUNT_UNMOUNTING:
1291 case MOUNT_UNMOUNTING_SIGKILL:
1292 case MOUNT_UNMOUNTING_SIGTERM:
1294 if (f == MOUNT_SUCCESS)
1295 mount_enter_dead(m, f);
1296 else if (m->from_proc_self_mountinfo)
1297 mount_enter_mounted(m, f);
1299 mount_enter_dead(m, f);
1303 assert_not_reached("Uh, control process died at wrong time.");
1306 /* Notify clients about changed exit status */
1307 unit_add_to_dbus_queue(u);
1310 static void mount_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
1311 Mount *m = MOUNT(u);
1314 assert(elapsed == 1);
1315 assert(w == &m->timer_watch);
1319 case MOUNT_MOUNTING:
1320 case MOUNT_MOUNTING_DONE:
1321 log_warning("%s mounting timed out. Stopping.", u->id);
1322 mount_enter_signal(m, MOUNT_MOUNTING_SIGTERM, MOUNT_FAILURE_TIMEOUT);
1325 case MOUNT_REMOUNTING:
1326 log_warning("%s remounting timed out. Stopping.", u->id);
1327 m->reload_result = MOUNT_FAILURE_TIMEOUT;
1328 mount_enter_mounted(m, MOUNT_SUCCESS);
1331 case MOUNT_UNMOUNTING:
1332 log_warning("%s unmounting timed out. Stopping.", u->id);
1333 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGTERM, MOUNT_FAILURE_TIMEOUT);
1336 case MOUNT_MOUNTING_SIGTERM:
1337 if (m->kill_context.send_sigkill) {
1338 log_warning("%s mounting timed out. Killing.", u->id);
1339 mount_enter_signal(m, MOUNT_MOUNTING_SIGKILL, MOUNT_FAILURE_TIMEOUT);
1341 log_warning("%s mounting timed out. Skipping SIGKILL. Ignoring.", u->id);
1343 if (m->from_proc_self_mountinfo)
1344 mount_enter_mounted(m, MOUNT_FAILURE_TIMEOUT);
1346 mount_enter_dead(m, MOUNT_FAILURE_TIMEOUT);
1350 case MOUNT_REMOUNTING_SIGTERM:
1351 if (m->kill_context.send_sigkill) {
1352 log_warning("%s remounting timed out. Killing.", u->id);
1353 mount_enter_signal(m, MOUNT_REMOUNTING_SIGKILL, MOUNT_FAILURE_TIMEOUT);
1355 log_warning("%s remounting timed out. Skipping SIGKILL. Ignoring.", u->id);
1357 if (m->from_proc_self_mountinfo)
1358 mount_enter_mounted(m, MOUNT_FAILURE_TIMEOUT);
1360 mount_enter_dead(m, MOUNT_FAILURE_TIMEOUT);
1364 case MOUNT_UNMOUNTING_SIGTERM:
1365 if (m->kill_context.send_sigkill) {
1366 log_warning("%s unmounting timed out. Killing.", u->id);
1367 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGKILL, MOUNT_FAILURE_TIMEOUT);
1369 log_warning("%s unmounting timed out. Skipping SIGKILL. Ignoring.", u->id);
1371 if (m->from_proc_self_mountinfo)
1372 mount_enter_mounted(m, MOUNT_FAILURE_TIMEOUT);
1374 mount_enter_dead(m, MOUNT_FAILURE_TIMEOUT);
1378 case MOUNT_MOUNTING_SIGKILL:
1379 case MOUNT_REMOUNTING_SIGKILL:
1380 case MOUNT_UNMOUNTING_SIGKILL:
1381 log_warning("%s mount process still around after SIGKILL. Ignoring.", u->id);
1383 if (m->from_proc_self_mountinfo)
1384 mount_enter_mounted(m, MOUNT_FAILURE_TIMEOUT);
1386 mount_enter_dead(m, MOUNT_FAILURE_TIMEOUT);
1390 assert_not_reached("Timeout at wrong time.");
1394 static int mount_add_one(
1398 const char *options,
1405 char *e, *w = NULL, *o = NULL, *f = NULL;
1414 /* Ignore API mount points. They should never be referenced in
1415 * dependencies ever. */
1416 if (mount_point_is_api(where) || mount_point_ignore(where))
1419 if (streq(fstype, "autofs"))
1422 /* probably some kind of swap, ignore */
1423 if (!is_path(where))
1426 e = unit_name_from_path(where, ".mount");
1430 u = manager_get_unit(m, e);
1434 u = unit_new(m, sizeof(Mount));
1440 r = unit_add_name(u, e);
1446 MOUNT(u)->where = strdup(where);
1447 if (!MOUNT(u)->where) {
1452 unit_add_to_load_queue(u);
1457 if (u->load_state == UNIT_ERROR) {
1458 u->load_state = UNIT_LOADED;
1460 r = mount_add_extras(MOUNT(u));
1466 if (!(w = strdup(what)) ||
1467 !(o = strdup(options)) ||
1468 !(f = strdup(fstype))) {
1473 p = &MOUNT(u)->parameters_proc_self_mountinfo;
1475 MOUNT(u)->is_mounted = true;
1476 MOUNT(u)->just_mounted = !MOUNT(u)->from_proc_self_mountinfo;
1477 MOUNT(u)->just_changed = !streq_ptr(p->options, o);
1480 MOUNT(u)->from_proc_self_mountinfo = true;
1493 unit_add_to_dbus_queue(u);
1508 static int mount_load_proc_self_mountinfo(Manager *m, bool set_flags) {
1511 char *device, *path, *options, *options2, *fstype, *d, *p, *o;
1515 rewind(m->proc_self_mountinfo);
1520 device = path = options = options2 = fstype = d = p = o = NULL;
1522 if ((k = fscanf(m->proc_self_mountinfo,
1523 "%*s " /* (1) mount id */
1524 "%*s " /* (2) parent id */
1525 "%*s " /* (3) major:minor */
1526 "%*s " /* (4) root */
1527 "%ms " /* (5) mount point */
1528 "%ms" /* (6) mount options */
1529 "%*[^-]" /* (7) optional fields */
1530 "- " /* (8) separator */
1531 "%ms " /* (9) file system type */
1532 "%ms" /* (10) mount source */
1533 "%ms" /* (11) mount options 2 */
1534 "%*[^\n]", /* some rubbish at the end */
1544 log_warning("Failed to parse /proc/self/mountinfo:%u.", i);
1548 o = strjoin(options, ",", options2, NULL);
1554 if (!(d = cunescape(device)) ||
1555 !(p = cunescape(path))) {
1560 if ((k = mount_add_one(m, d, p, o, fstype, 0, set_flags)) < 0)
1587 static void mount_shutdown(Manager *m) {
1590 if (m->proc_self_mountinfo) {
1591 fclose(m->proc_self_mountinfo);
1592 m->proc_self_mountinfo = NULL;
1596 static int mount_enumerate(Manager *m) {
1598 struct epoll_event ev;
1601 if (!m->proc_self_mountinfo) {
1602 if (!(m->proc_self_mountinfo = fopen("/proc/self/mountinfo", "re")))
1605 m->mount_watch.type = WATCH_MOUNT;
1606 m->mount_watch.fd = fileno(m->proc_self_mountinfo);
1609 ev.events = EPOLLPRI;
1610 ev.data.ptr = &m->mount_watch;
1612 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->mount_watch.fd, &ev) < 0)
1616 if ((r = mount_load_proc_self_mountinfo(m, false)) < 0)
1626 void mount_fd_event(Manager *m, int events) {
1631 assert(events & EPOLLPRI);
1633 /* The manager calls this for every fd event happening on the
1634 * /proc/self/mountinfo file, which informs us about mounting
1637 if ((r = mount_load_proc_self_mountinfo(m, true)) < 0) {
1638 log_error("Failed to reread /proc/self/mountinfo: %s", strerror(-r));
1640 /* Reset flags, just in case, for later calls */
1641 LIST_FOREACH(units_by_type, u, m->units_by_type[UNIT_MOUNT]) {
1642 Mount *mount = MOUNT(u);
1644 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1650 manager_dispatch_load_queue(m);
1652 LIST_FOREACH(units_by_type, u, m->units_by_type[UNIT_MOUNT]) {
1653 Mount *mount = MOUNT(u);
1655 if (!mount->is_mounted) {
1656 /* This has just been unmounted. */
1658 mount->from_proc_self_mountinfo = false;
1660 switch (mount->state) {
1663 mount_enter_dead(mount, MOUNT_SUCCESS);
1667 mount_set_state(mount, mount->state);
1672 } else if (mount->just_mounted || mount->just_changed) {
1674 /* New or changed mount entry */
1676 switch (mount->state) {
1680 mount_enter_mounted(mount, MOUNT_SUCCESS);
1683 case MOUNT_MOUNTING:
1684 mount_enter_mounting_done(mount);
1688 /* Nothing really changed, but let's
1689 * issue an notification call
1690 * nonetheless, in case somebody is
1691 * waiting for this. (e.g. file system
1692 * ro/rw remounts.) */
1693 mount_set_state(mount, mount->state);
1698 /* Reset the flags for later calls */
1699 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1703 static void mount_reset_failed(Unit *u) {
1704 Mount *m = MOUNT(u);
1708 if (m->state == MOUNT_FAILED)
1709 mount_set_state(m, MOUNT_DEAD);
1711 m->result = MOUNT_SUCCESS;
1712 m->reload_result = MOUNT_SUCCESS;
1715 static int mount_kill(Unit *u, KillWho who, int signo, DBusError *error) {
1716 Mount *m = MOUNT(u);
1718 Set *pid_set = NULL;
1722 if (who == KILL_MAIN) {
1723 dbus_set_error(error, BUS_ERROR_NO_SUCH_PROCESS, "Mount units have no main processes");
1727 if (m->control_pid <= 0 && who == KILL_CONTROL) {
1728 dbus_set_error(error, BUS_ERROR_NO_SUCH_PROCESS, "No control process to kill");
1732 if (who == KILL_CONTROL || who == KILL_ALL)
1733 if (m->control_pid > 0)
1734 if (kill(m->control_pid, signo) < 0)
1737 if (who == KILL_ALL) {
1740 pid_set = set_new(trivial_hash_func, trivial_compare_func);
1744 /* Exclude the control pid from being killed via the cgroup */
1745 if (m->control_pid > 0) {
1746 q = set_put(pid_set, LONG_TO_PTR(m->control_pid));
1753 q = cgroup_bonding_kill_list(UNIT(m)->cgroup_bondings, signo, false, false, pid_set, NULL);
1754 if (q < 0 && q != -EAGAIN && q != -ESRCH && q != -ENOENT)
1765 static const char* const mount_state_table[_MOUNT_STATE_MAX] = {
1766 [MOUNT_DEAD] = "dead",
1767 [MOUNT_MOUNTING] = "mounting",
1768 [MOUNT_MOUNTING_DONE] = "mounting-done",
1769 [MOUNT_MOUNTED] = "mounted",
1770 [MOUNT_REMOUNTING] = "remounting",
1771 [MOUNT_UNMOUNTING] = "unmounting",
1772 [MOUNT_MOUNTING_SIGTERM] = "mounting-sigterm",
1773 [MOUNT_MOUNTING_SIGKILL] = "mounting-sigkill",
1774 [MOUNT_REMOUNTING_SIGTERM] = "remounting-sigterm",
1775 [MOUNT_REMOUNTING_SIGKILL] = "remounting-sigkill",
1776 [MOUNT_UNMOUNTING_SIGTERM] = "unmounting-sigterm",
1777 [MOUNT_UNMOUNTING_SIGKILL] = "unmounting-sigkill",
1778 [MOUNT_FAILED] = "failed"
1781 DEFINE_STRING_TABLE_LOOKUP(mount_state, MountState);
1783 static const char* const mount_exec_command_table[_MOUNT_EXEC_COMMAND_MAX] = {
1784 [MOUNT_EXEC_MOUNT] = "ExecMount",
1785 [MOUNT_EXEC_UNMOUNT] = "ExecUnmount",
1786 [MOUNT_EXEC_REMOUNT] = "ExecRemount",
1789 DEFINE_STRING_TABLE_LOOKUP(mount_exec_command, MountExecCommand);
1791 static const char* const mount_result_table[_MOUNT_RESULT_MAX] = {
1792 [MOUNT_SUCCESS] = "success",
1793 [MOUNT_FAILURE_RESOURCES] = "resources",
1794 [MOUNT_FAILURE_TIMEOUT] = "timeout",
1795 [MOUNT_FAILURE_EXIT_CODE] = "exit-code",
1796 [MOUNT_FAILURE_SIGNAL] = "signal",
1797 [MOUNT_FAILURE_CORE_DUMP] = "core-dump"
1800 DEFINE_STRING_TABLE_LOOKUP(mount_result, MountResult);
1802 const UnitVTable mount_vtable = {
1803 .object_size = sizeof(Mount),
1804 .exec_context_offset = offsetof(Mount, exec_context),
1812 .no_instances = true,
1818 .coldplug = mount_coldplug,
1822 .start = mount_start,
1824 .reload = mount_reload,
1828 .serialize = mount_serialize,
1829 .deserialize_item = mount_deserialize_item,
1831 .active_state = mount_active_state,
1832 .sub_state_to_string = mount_sub_state_to_string,
1834 .check_gc = mount_check_gc,
1836 .sigchld_event = mount_sigchld_event,
1837 .timer_event = mount_timer_event,
1839 .reset_failed = mount_reset_failed,
1841 .bus_interface = "org.freedesktop.systemd1.Mount",
1842 .bus_message_handler = bus_mount_message_handler,
1843 .bus_invalidating_properties = bus_mount_invalidating_properties,
1845 .enumerate = mount_enumerate,
1846 .shutdown = mount_shutdown,
1848 .status_message_formats = {
1849 .starting_stopping = {
1850 [0] = "Mounting %s...",
1851 [1] = "Unmounting %s...",
1853 .finished_start_job = {
1854 [JOB_DONE] = "Mounted %s.",
1855 [JOB_FAILED] = "Failed to mount %s.",
1856 [JOB_DEPENDENCY] = "Dependency failed for %s.",
1857 [JOB_TIMEOUT] = "Timed out mounting %s.",
1859 .finished_stop_job = {
1860 [JOB_DONE] = "Unmounted %s.",
1861 [JOB_FAILED] = "Failed unmounting %s.",
1862 [JOB_TIMEOUT] = "Timed out unmounting %s.",