chiark / gitweb /
209e19c175d127a07f15b30547d7ddfd6b36c5d3
[elogind.git] / src / mount.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <errno.h>
23 #include <stdio.h>
24 #include <mntent.h>
25 #include <sys/epoll.h>
26 #include <signal.h>
27
28 #include "unit.h"
29 #include "mount.h"
30 #include "load-fragment.h"
31 #include "load-dropin.h"
32 #include "log.h"
33 #include "strv.h"
34 #include "mount-setup.h"
35 #include "unit-name.h"
36 #include "dbus-mount.h"
37 #include "special.h"
38 #include "bus-errors.h"
39 #include "exit-status.h"
40 #include "def.h"
41
42 static const UnitActiveState state_translation_table[_MOUNT_STATE_MAX] = {
43         [MOUNT_DEAD] = UNIT_INACTIVE,
44         [MOUNT_MOUNTING] = UNIT_ACTIVATING,
45         [MOUNT_MOUNTING_DONE] = UNIT_ACTIVE,
46         [MOUNT_MOUNTED] = UNIT_ACTIVE,
47         [MOUNT_REMOUNTING] = UNIT_RELOADING,
48         [MOUNT_UNMOUNTING] = UNIT_DEACTIVATING,
49         [MOUNT_MOUNTING_SIGTERM] = UNIT_DEACTIVATING,
50         [MOUNT_MOUNTING_SIGKILL] = UNIT_DEACTIVATING,
51         [MOUNT_REMOUNTING_SIGTERM] = UNIT_RELOADING,
52         [MOUNT_REMOUNTING_SIGKILL] = UNIT_RELOADING,
53         [MOUNT_UNMOUNTING_SIGTERM] = UNIT_DEACTIVATING,
54         [MOUNT_UNMOUNTING_SIGKILL] = UNIT_DEACTIVATING,
55         [MOUNT_FAILED] = UNIT_FAILED
56 };
57
58 static void mount_init(Unit *u) {
59         Mount *m = MOUNT(u);
60
61         assert(u);
62         assert(u->meta.load_state == UNIT_STUB);
63
64         m->timeout_usec = DEFAULT_TIMEOUT_USEC;
65         m->directory_mode = 0755;
66
67         exec_context_init(&m->exec_context);
68         m->exec_context.std_output = EXEC_OUTPUT_KMSG;
69
70         /* We need to make sure that /bin/mount is always called in
71          * the same process group as us, so that the autofs kernel
72          * side doesn't send us another mount request while we are
73          * already trying to comply its last one. */
74         m->exec_context.same_pgrp = true;
75
76         m->timer_watch.type = WATCH_INVALID;
77
78         m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
79 }
80
81 static void mount_unwatch_control_pid(Mount *m) {
82         assert(m);
83
84         if (m->control_pid <= 0)
85                 return;
86
87         unit_unwatch_pid(UNIT(m), m->control_pid);
88         m->control_pid = 0;
89 }
90
91 static void mount_parameters_done(MountParameters *p) {
92         assert(p);
93
94         free(p->what);
95         free(p->options);
96         free(p->fstype);
97
98         p->what = p->options = p->fstype = NULL;
99 }
100
101 static void mount_done(Unit *u) {
102         Mount *m = MOUNT(u);
103         Meta *other;
104
105         assert(m);
106
107         free(m->where);
108         m->where = NULL;
109
110         /* Try to detach us from the automount unit if there is any */
111         LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_AUTOMOUNT]) {
112                 Automount *a = (Automount*) other;
113
114                 if (a->mount == m)
115                         a->mount = NULL;
116         }
117
118         mount_parameters_done(&m->parameters_etc_fstab);
119         mount_parameters_done(&m->parameters_proc_self_mountinfo);
120         mount_parameters_done(&m->parameters_fragment);
121
122         exec_context_done(&m->exec_context);
123         exec_command_done_array(m->exec_command, _MOUNT_EXEC_COMMAND_MAX);
124         m->control_command = NULL;
125
126         mount_unwatch_control_pid(m);
127
128         unit_unwatch_timer(u, &m->timer_watch);
129 }
130
131 static MountParameters* get_mount_parameters_configured(Mount *m) {
132         assert(m);
133
134         if (m->from_fragment)
135                 return &m->parameters_fragment;
136         else if (m->from_etc_fstab)
137                 return &m->parameters_etc_fstab;
138
139         return NULL;
140 }
141
142 static MountParameters* get_mount_parameters(Mount *m) {
143         assert(m);
144
145         if (m->from_proc_self_mountinfo)
146                 return &m->parameters_proc_self_mountinfo;
147
148         return get_mount_parameters_configured(m);
149 }
150
151 static int mount_add_mount_links(Mount *m) {
152         Meta *other;
153         int r;
154         MountParameters *pm;
155
156         assert(m);
157
158         pm = get_mount_parameters_configured(m);
159
160         /* Adds in links to other mount points that might lie below or
161          * above us in the hierarchy */
162
163         LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_MOUNT]) {
164                 Mount *n = (Mount*) other;
165                 MountParameters *pn;
166
167                 if (n == m)
168                         continue;
169
170                 if (n->meta.load_state != UNIT_LOADED)
171                         continue;
172
173                 pn = get_mount_parameters_configured(n);
174
175                 if (path_startswith(m->where, n->where)) {
176
177                         if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
178                                 return r;
179
180                         if (pn)
181                                 if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
182                                         return r;
183
184                 } else if (path_startswith(n->where, m->where)) {
185
186                         if ((r = unit_add_dependency(UNIT(n), UNIT_AFTER, UNIT(m), true)) < 0)
187                                 return r;
188
189                         if (pm)
190                                 if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
191                                         return r;
192
193                 } else if (pm && path_startswith(pm->what, n->where)) {
194
195                         if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
196                                 return r;
197
198                         if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
199                                 return r;
200
201                 } else if (pn && path_startswith(pn->what, m->where)) {
202
203                         if ((r = unit_add_dependency(UNIT(n), UNIT_AFTER, UNIT(m), true)) < 0)
204                                 return r;
205
206                         if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
207                                 return r;
208                 }
209         }
210
211         return 0;
212 }
213
214 static int mount_add_swap_links(Mount *m) {
215         Meta *other;
216         int r;
217
218         assert(m);
219
220         LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_SWAP])
221                 if ((r = swap_add_one_mount_link((Swap*) other, m)) < 0)
222                         return r;
223
224         return 0;
225 }
226
227 static int mount_add_path_links(Mount *m) {
228         Meta *other;
229         int r;
230
231         assert(m);
232
233         LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_PATH])
234                 if ((r = path_add_one_mount_link((Path*) other, m)) < 0)
235                         return r;
236
237         return 0;
238 }
239
240 static int mount_add_automount_links(Mount *m) {
241         Meta *other;
242         int r;
243
244         assert(m);
245
246         LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_AUTOMOUNT])
247                 if ((r = automount_add_one_mount_link((Automount*) other, m)) < 0)
248                         return r;
249
250         return 0;
251 }
252
253 static int mount_add_socket_links(Mount *m) {
254         Meta *other;
255         int r;
256
257         assert(m);
258
259         LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_SOCKET])
260                 if ((r = socket_add_one_mount_link((Socket*) other, m)) < 0)
261                         return r;
262
263         return 0;
264 }
265
266 static char* mount_test_option(const char *haystack, const char *needle) {
267         struct mntent me;
268
269         assert(needle);
270
271         /* Like glibc's hasmntopt(), but works on a string, not a
272          * struct mntent */
273
274         if (!haystack)
275                 return false;
276
277         zero(me);
278         me.mnt_opts = (char*) haystack;
279
280         return hasmntopt(&me, needle);
281 }
282
283 static bool mount_is_network(MountParameters *p) {
284         assert(p);
285
286         if (mount_test_option(p->options, "_netdev"))
287                 return true;
288
289         if (p->fstype && fstype_is_network(p->fstype))
290                 return true;
291
292         return false;
293 }
294
295 static bool mount_is_bind(MountParameters *p) {
296         assert(p);
297
298         if (mount_test_option(p->options, "bind"))
299                 return true;
300
301         if (p->fstype && streq(p->fstype, "bind"))
302                 return true;
303
304         return false;
305 }
306
307 static bool needs_quota(MountParameters *p) {
308         assert(p);
309
310         if (mount_is_network(p))
311                 return false;
312
313         if (mount_is_bind(p))
314                 return false;
315
316         return mount_test_option(p->options, "usrquota") ||
317                 mount_test_option(p->options, "grpquota");
318 }
319
320 static int mount_add_target_links(Mount *m) {
321         const char *target, *after = NULL;
322         MountParameters *p;
323         Unit *tu;
324         int r;
325         bool noauto, nofail, handle, automount;
326
327         assert(m);
328
329         if (!(p = get_mount_parameters_configured(m)))
330                 return 0;
331
332         noauto = !!mount_test_option(p->options, MNTOPT_NOAUTO);
333         nofail = !!mount_test_option(p->options, "nofail");
334         handle =
335                 mount_test_option(p->options, "comment=systemd.mount") ||
336                 mount_test_option(p->options, "x-systemd-mount") ||
337                 m->meta.manager->mount_auto;
338         automount =
339                 mount_test_option(p->options, "comment=systemd.automount") ||
340                 mount_test_option(p->options, "x-systemd-automount");
341
342         if (mount_is_network(p)) {
343                 target = SPECIAL_REMOTE_FS_TARGET;
344
345                 if (m->meta.manager->running_as == MANAGER_SYSTEM)
346                         after = SPECIAL_NETWORK_TARGET;
347         } else
348                 target = SPECIAL_LOCAL_FS_TARGET;
349
350         if ((r = manager_load_unit(m->meta.manager, target, NULL, NULL, &tu)) < 0)
351                 return r;
352
353         if (after)
354                 if ((r = unit_add_dependency_by_name(UNIT(m), UNIT_AFTER, after, NULL, true)) < 0)
355                         return r;
356
357         if (automount && m->meta.manager->running_as == MANAGER_SYSTEM) {
358                 Unit *am;
359
360                 if ((r = unit_load_related_unit(UNIT(m), ".automount", &am)) < 0)
361                         return r;
362
363                 return unit_add_two_dependencies(tu, UNIT_AFTER, UNIT_WANTS, UNIT(am), true);
364         } else {
365
366                 /* Automatically add mount points that aren't natively
367                  * configured to local-fs.target */
368                 if (!noauto &&
369                     !nofail &&
370                     handle &&
371                     m->from_etc_fstab &&
372                     m->meta.manager->running_as == MANAGER_SYSTEM)
373                         if ((r = unit_add_dependency(tu, UNIT_WANTS, UNIT(m), true)) < 0)
374                                 return r;
375
376                 return unit_add_dependency(UNIT(m), UNIT_BEFORE, tu, true);
377         }
378 }
379
380 static int mount_add_device_links(Mount *m) {
381         MountParameters *p;
382         int r;
383
384         assert(m);
385
386         if (!(p = get_mount_parameters_configured(m)))
387                 return 0;
388
389         if (!p->what)
390                 return 0;
391
392         if (!mount_is_bind(p) && !path_equal(m->where, "/")) {
393                 bool nofail, noauto;
394
395                 noauto = !!mount_test_option(p->options, MNTOPT_NOAUTO);
396                 nofail = !!mount_test_option(p->options, "nofail");
397
398                 if ((r = unit_add_node_link(UNIT(m), p->what,
399                                             !noauto && nofail &&
400                                             UNIT(m)->meta.manager->running_as == MANAGER_SYSTEM)) < 0)
401                         return r;
402         }
403
404         if (p->passno > 0 &&
405             !mount_is_bind(p) &&
406             UNIT(m)->meta.manager->running_as == MANAGER_SYSTEM &&
407             !path_equal(m->where, "/")) {
408                 char *name;
409                 Unit *fsck;
410                 /* Let's add in the fsck service */
411
412                 /* aka SPECIAL_FSCK_SERVICE */
413                 if (!(name = unit_name_from_path_instance("fsck", p->what, ".service")))
414                         return -ENOMEM;
415
416                 if ((r = manager_load_unit_prepare(m->meta.manager, name, NULL, NULL, &fsck)) < 0) {
417                         log_warning("Failed to prepare unit %s: %s", name, strerror(-r));
418                         free(name);
419                         return r;
420                 }
421
422                 free(name);
423
424                 SERVICE(fsck)->fsck_passno = p->passno;
425
426                 if ((r = unit_add_two_dependencies(UNIT(m), UNIT_AFTER, UNIT_REQUIRES, fsck, true)) < 0)
427                         return r;
428         }
429
430         return 0;
431 }
432
433 static int mount_add_default_dependencies(Mount *m) {
434         int r;
435
436         assert(m);
437
438         if (m->meta.manager->running_as == MANAGER_SYSTEM &&
439             !path_equal(m->where, "/")) {
440                 MountParameters *p;
441
442                 p = get_mount_parameters_configured(m);
443
444                 if (p && needs_quota(p)) {
445                         if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_WANTS, SPECIAL_QUOTACHECK_SERVICE, NULL, true)) < 0 ||
446                             (r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_WANTS, SPECIAL_QUOTAON_SERVICE, NULL, true)) < 0)
447                                 return r;
448                 }
449
450                 if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_UMOUNT_TARGET, NULL, true)) < 0)
451                         return r;
452         }
453
454         return 0;
455 }
456
457 static int mount_verify(Mount *m) {
458         bool b;
459         char *e;
460         assert(m);
461
462         if (m->meta.load_state != UNIT_LOADED)
463                 return 0;
464
465         if (!m->from_etc_fstab && !m->from_fragment && !m->from_proc_self_mountinfo)
466                 return -ENOENT;
467
468         if (!(e = unit_name_from_path(m->where, ".mount")))
469                 return -ENOMEM;
470
471         b = unit_has_name(UNIT(m), e);
472         free(e);
473
474         if (!b) {
475                 log_error("%s's Where setting doesn't match unit name. Refusing.", m->meta.id);
476                 return -EINVAL;
477         }
478
479         if (m->meta.fragment_path && !m->parameters_fragment.what) {
480                 log_error("%s's What setting is missing. Refusing.", m->meta.id);
481                 return -EBADMSG;
482         }
483
484         if (m->exec_context.pam_name && m->exec_context.kill_mode != KILL_CONTROL_GROUP) {
485                 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", m->meta.id);
486                 return -EINVAL;
487         }
488
489         return 0;
490 }
491
492 static int mount_load(Unit *u) {
493         Mount *m = MOUNT(u);
494         int r;
495
496         assert(u);
497         assert(u->meta.load_state == UNIT_STUB);
498
499         if ((r = unit_load_fragment_and_dropin_optional(u)) < 0)
500                 return r;
501
502         /* This is a new unit? Then let's add in some extras */
503         if (u->meta.load_state == UNIT_LOADED) {
504                 if ((r = unit_add_exec_dependencies(u, &m->exec_context)) < 0)
505                         return r;
506
507                 if (m->meta.fragment_path)
508                         m->from_fragment = true;
509
510                 if (!m->where)
511                         if (!(m->where = unit_name_to_path(u->meta.id)))
512                                 return -ENOMEM;
513
514                 path_kill_slashes(m->where);
515
516                 if (!m->meta.description)
517                         if ((r = unit_set_description(u, m->where)) < 0)
518                                 return r;
519
520                 if ((r = mount_add_device_links(m)) < 0)
521                         return r;
522
523                 if ((r = mount_add_mount_links(m)) < 0)
524                         return r;
525
526                 if ((r = mount_add_socket_links(m)) < 0)
527                         return r;
528
529                 if ((r = mount_add_swap_links(m)) < 0)
530                         return r;
531
532                 if ((r = mount_add_path_links(m)) < 0)
533                         return r;
534
535                 if ((r = mount_add_automount_links(m)) < 0)
536                         return r;
537
538                 if ((r = mount_add_target_links(m)) < 0)
539                         return r;
540
541                 if ((r = unit_add_default_cgroups(u)) < 0)
542                         return r;
543
544                 if (m->meta.default_dependencies)
545                         if ((r = mount_add_default_dependencies(m)) < 0)
546                                 return r;
547         }
548
549         return mount_verify(m);
550 }
551
552 static int mount_notify_automount(Mount *m, int status) {
553         Unit *p;
554         int r;
555
556         assert(m);
557
558         if ((r = unit_get_related_unit(UNIT(m), ".automount", &p)) < 0)
559                 return r == -ENOENT ? 0 : r;
560
561         return automount_send_ready(AUTOMOUNT(p), status);
562 }
563
564 static void mount_set_state(Mount *m, MountState state) {
565         MountState old_state;
566         assert(m);
567
568         old_state = m->state;
569         m->state = state;
570
571         if (state != MOUNT_MOUNTING &&
572             state != MOUNT_MOUNTING_DONE &&
573             state != MOUNT_REMOUNTING &&
574             state != MOUNT_UNMOUNTING &&
575             state != MOUNT_MOUNTING_SIGTERM &&
576             state != MOUNT_MOUNTING_SIGKILL &&
577             state != MOUNT_UNMOUNTING_SIGTERM &&
578             state != MOUNT_UNMOUNTING_SIGKILL &&
579             state != MOUNT_REMOUNTING_SIGTERM &&
580             state != MOUNT_REMOUNTING_SIGKILL) {
581                 unit_unwatch_timer(UNIT(m), &m->timer_watch);
582                 mount_unwatch_control_pid(m);
583                 m->control_command = NULL;
584                 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
585         }
586
587         if (state == MOUNT_MOUNTED ||
588             state == MOUNT_REMOUNTING)
589                 mount_notify_automount(m, 0);
590         else if (state == MOUNT_DEAD ||
591                  state == MOUNT_UNMOUNTING ||
592                  state == MOUNT_MOUNTING_SIGTERM ||
593                  state == MOUNT_MOUNTING_SIGKILL ||
594                  state == MOUNT_REMOUNTING_SIGTERM ||
595                  state == MOUNT_REMOUNTING_SIGKILL ||
596                  state == MOUNT_UNMOUNTING_SIGTERM ||
597                  state == MOUNT_UNMOUNTING_SIGKILL ||
598                  state == MOUNT_FAILED)
599                 mount_notify_automount(m, -ENODEV);
600
601         if (state != old_state)
602                 log_debug("%s changed %s -> %s",
603                           m->meta.id,
604                           mount_state_to_string(old_state),
605                           mount_state_to_string(state));
606
607         unit_notify(UNIT(m), state_translation_table[old_state], state_translation_table[state], !m->reload_failure);
608         m->reload_failure = false;
609 }
610
611 static int mount_coldplug(Unit *u) {
612         Mount *m = MOUNT(u);
613         MountState new_state = MOUNT_DEAD;
614         int r;
615
616         assert(m);
617         assert(m->state == MOUNT_DEAD);
618
619         if (m->deserialized_state != m->state)
620                 new_state = m->deserialized_state;
621         else if (m->from_proc_self_mountinfo)
622                 new_state = MOUNT_MOUNTED;
623
624         if (new_state != m->state) {
625
626                 if (new_state == MOUNT_MOUNTING ||
627                     new_state == MOUNT_MOUNTING_DONE ||
628                     new_state == MOUNT_REMOUNTING ||
629                     new_state == MOUNT_UNMOUNTING ||
630                     new_state == MOUNT_MOUNTING_SIGTERM ||
631                     new_state == MOUNT_MOUNTING_SIGKILL ||
632                     new_state == MOUNT_UNMOUNTING_SIGTERM ||
633                     new_state == MOUNT_UNMOUNTING_SIGKILL ||
634                     new_state == MOUNT_REMOUNTING_SIGTERM ||
635                     new_state == MOUNT_REMOUNTING_SIGKILL) {
636
637                         if (m->control_pid <= 0)
638                                 return -EBADMSG;
639
640                         if ((r = unit_watch_pid(UNIT(m), m->control_pid)) < 0)
641                                 return r;
642
643                         if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
644                                 return r;
645                 }
646
647                 mount_set_state(m, new_state);
648         }
649
650         return 0;
651 }
652
653 static void mount_dump(Unit *u, FILE *f, const char *prefix) {
654         Mount *m = MOUNT(u);
655         MountParameters *p;
656
657         assert(m);
658         assert(f);
659
660         p = get_mount_parameters(m);
661
662         fprintf(f,
663                 "%sMount State: %s\n"
664                 "%sWhere: %s\n"
665                 "%sWhat: %s\n"
666                 "%sFile System Type: %s\n"
667                 "%sOptions: %s\n"
668                 "%sFrom /etc/fstab: %s\n"
669                 "%sFrom /proc/self/mountinfo: %s\n"
670                 "%sFrom fragment: %s\n"
671                 "%sDirectoryMode: %04o\n",
672                 prefix, mount_state_to_string(m->state),
673                 prefix, m->where,
674                 prefix, strna(p->what),
675                 prefix, strna(p->fstype),
676                 prefix, strna(p->options),
677                 prefix, yes_no(m->from_etc_fstab),
678                 prefix, yes_no(m->from_proc_self_mountinfo),
679                 prefix, yes_no(m->from_fragment),
680                 prefix, m->directory_mode);
681
682         if (m->control_pid > 0)
683                 fprintf(f,
684                         "%sControl PID: %lu\n",
685                         prefix, (unsigned long) m->control_pid);
686
687         exec_context_dump(&m->exec_context, f, prefix);
688 }
689
690 static int mount_spawn(Mount *m, ExecCommand *c, pid_t *_pid) {
691         pid_t pid;
692         int r;
693
694         assert(m);
695         assert(c);
696         assert(_pid);
697
698         if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
699                 goto fail;
700
701         if ((r = exec_spawn(c,
702                             NULL,
703                             &m->exec_context,
704                             NULL, 0,
705                             m->meta.manager->environment,
706                             true,
707                             true,
708                             true,
709                             m->meta.manager->confirm_spawn,
710                             m->meta.cgroup_bondings,
711                             &pid)) < 0)
712                 goto fail;
713
714         if ((r = unit_watch_pid(UNIT(m), pid)) < 0)
715                 /* FIXME: we need to do something here */
716                 goto fail;
717
718         *_pid = pid;
719
720         return 0;
721
722 fail:
723         unit_unwatch_timer(UNIT(m), &m->timer_watch);
724
725         return r;
726 }
727
728 static void mount_enter_dead(Mount *m, bool success) {
729         assert(m);
730
731         if (!success)
732                 m->failure = true;
733
734         mount_set_state(m, m->failure ? MOUNT_FAILED : MOUNT_DEAD);
735 }
736
737 static void mount_enter_mounted(Mount *m, bool success) {
738         assert(m);
739
740         if (!success)
741                 m->failure = true;
742
743         mount_set_state(m, MOUNT_MOUNTED);
744 }
745
746 static void mount_enter_signal(Mount *m, MountState state, bool success) {
747         int r;
748         Set *pid_set = NULL;
749         bool wait_for_exit = false;
750
751         assert(m);
752
753         if (!success)
754                 m->failure = true;
755
756         if (m->exec_context.kill_mode != KILL_NONE) {
757                 int sig = (state == MOUNT_MOUNTING_SIGTERM ||
758                            state == MOUNT_UNMOUNTING_SIGTERM ||
759                            state == MOUNT_REMOUNTING_SIGTERM) ? m->exec_context.kill_signal : SIGKILL;
760
761                 if (m->control_pid > 0) {
762                         if (kill_and_sigcont(m->control_pid, sig) < 0 && errno != ESRCH)
763
764                                 log_warning("Failed to kill control process %li: %m", (long) m->control_pid);
765                         else
766                                 wait_for_exit = true;
767                 }
768
769                 if (m->exec_context.kill_mode == KILL_CONTROL_GROUP) {
770
771                         if (!(pid_set = set_new(trivial_hash_func, trivial_compare_func))) {
772                                 r = -ENOMEM;
773                                 goto fail;
774                         }
775
776                         /* Exclude the control pid from being killed via the cgroup */
777                         if (m->control_pid > 0)
778                                 if ((r = set_put(pid_set, LONG_TO_PTR(m->control_pid))) < 0)
779                                         goto fail;
780
781                         if ((r = cgroup_bonding_kill_list(m->meta.cgroup_bondings, sig, true, pid_set)) < 0) {
782                                 if (r != -EAGAIN && r != -ESRCH && r != -ENOENT)
783                                         log_warning("Failed to kill control group: %s", strerror(-r));
784                         } else if (r > 0)
785                                 wait_for_exit = true;
786
787                         set_free(pid_set);
788                 }
789         }
790
791         if (wait_for_exit) {
792                 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
793                         goto fail;
794
795                 mount_set_state(m, state);
796         } else if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
797                 mount_enter_mounted(m, true);
798         else
799                 mount_enter_dead(m, true);
800
801         return;
802
803 fail:
804         log_warning("%s failed to kill processes: %s", m->meta.id, strerror(-r));
805
806         if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
807                 mount_enter_mounted(m, false);
808         else
809                 mount_enter_dead(m, false);
810
811         if (pid_set)
812                 set_free(pid_set);
813 }
814
815 static void mount_enter_unmounting(Mount *m, bool success) {
816         int r;
817
818         assert(m);
819
820         if (!success)
821                 m->failure = true;
822
823         m->control_command_id = MOUNT_EXEC_UNMOUNT;
824         m->control_command = m->exec_command + MOUNT_EXEC_UNMOUNT;
825
826         if ((r = exec_command_set(
827                              m->control_command,
828                              "/bin/umount",
829                              m->where,
830                              NULL)) < 0)
831                 goto fail;
832
833         mount_unwatch_control_pid(m);
834
835         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
836                 goto fail;
837
838         mount_set_state(m, MOUNT_UNMOUNTING);
839
840         return;
841
842 fail:
843         log_warning("%s failed to run 'umount' task: %s", m->meta.id, strerror(-r));
844         mount_enter_mounted(m, false);
845 }
846
847 static void mount_enter_mounting(Mount *m) {
848         int r;
849         MountParameters *p;
850
851         assert(m);
852
853         m->control_command_id = MOUNT_EXEC_MOUNT;
854         m->control_command = m->exec_command + MOUNT_EXEC_MOUNT;
855
856         mkdir_p(m->where, m->directory_mode);
857
858         /* Create the source directory for bind-mounts if needed */
859         p = get_mount_parameters_configured(m);
860         if (p && mount_is_bind(p))
861                 mkdir_p(p->what, m->directory_mode);
862
863         if (m->from_fragment)
864                 r = exec_command_set(
865                                 m->control_command,
866                                 "/bin/mount",
867                                 m->parameters_fragment.what,
868                                 m->where,
869                                 "-t", m->parameters_fragment.fstype ? m->parameters_fragment.fstype : "auto",
870                                 m->parameters_fragment.options ? "-o" : NULL, m->parameters_fragment.options,
871                                 NULL);
872         else if (m->from_etc_fstab)
873                 r = exec_command_set(
874                                 m->control_command,
875                                 "/bin/mount",
876                                 m->where,
877                                 NULL);
878         else
879                 r = -ENOENT;
880
881         if (r < 0)
882                 goto fail;
883
884         mount_unwatch_control_pid(m);
885
886         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
887                 goto fail;
888
889         mount_set_state(m, MOUNT_MOUNTING);
890
891         return;
892
893 fail:
894         log_warning("%s failed to run 'mount' task: %s", m->meta.id, strerror(-r));
895         mount_enter_dead(m, false);
896 }
897
898 static void mount_enter_mounting_done(Mount *m) {
899         assert(m);
900
901         mount_set_state(m, MOUNT_MOUNTING_DONE);
902 }
903
904 static void mount_enter_remounting(Mount *m, bool success) {
905         int r;
906
907         assert(m);
908
909         if (!success)
910                 m->failure = true;
911
912         m->control_command_id = MOUNT_EXEC_REMOUNT;
913         m->control_command = m->exec_command + MOUNT_EXEC_REMOUNT;
914
915         if (m->from_fragment) {
916                 char *buf = NULL;
917                 const char *o;
918
919                 if (m->parameters_fragment.options) {
920                         if (!(buf = strappend("remount,", m->parameters_fragment.options))) {
921                                 r = -ENOMEM;
922                                 goto fail;
923                         }
924
925                         o = buf;
926                 } else
927                         o = "remount";
928
929                 r = exec_command_set(
930                                 m->control_command,
931                                 "/bin/mount",
932                                 m->parameters_fragment.what,
933                                 m->where,
934                                 "-t", m->parameters_fragment.fstype ? m->parameters_fragment.fstype : "auto",
935                                 "-o", o,
936                                 NULL);
937
938                 free(buf);
939         } else if (m->from_etc_fstab)
940                 r = exec_command_set(
941                                 m->control_command,
942                                 "/bin/mount",
943                                 m->where,
944                                 "-o", "remount",
945                                 NULL);
946         else
947                 r = -ENOENT;
948
949         if (r < 0)
950                 goto fail;
951
952         mount_unwatch_control_pid(m);
953
954         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
955                 goto fail;
956
957         mount_set_state(m, MOUNT_REMOUNTING);
958
959         return;
960
961 fail:
962         log_warning("%s failed to run 'remount' task: %s", m->meta.id, strerror(-r));
963         m->reload_failure = true;
964         mount_enter_mounted(m, true);
965 }
966
967 static int mount_start(Unit *u) {
968         Mount *m = MOUNT(u);
969
970         assert(m);
971
972         /* We cannot fulfill this request right now, try again later
973          * please! */
974         if (m->state == MOUNT_UNMOUNTING ||
975             m->state == MOUNT_UNMOUNTING_SIGTERM ||
976             m->state == MOUNT_UNMOUNTING_SIGKILL ||
977             m->state == MOUNT_MOUNTING_SIGTERM ||
978             m->state == MOUNT_MOUNTING_SIGKILL)
979                 return -EAGAIN;
980
981         /* Already on it! */
982         if (m->state == MOUNT_MOUNTING)
983                 return 0;
984
985         assert(m->state == MOUNT_DEAD || m->state == MOUNT_FAILED);
986
987         m->failure = false;
988         mount_enter_mounting(m);
989         return 0;
990 }
991
992 static int mount_stop(Unit *u) {
993         Mount *m = MOUNT(u);
994
995         assert(m);
996
997         /* Already on it */
998         if (m->state == MOUNT_UNMOUNTING ||
999             m->state == MOUNT_UNMOUNTING_SIGKILL ||
1000             m->state == MOUNT_UNMOUNTING_SIGTERM ||
1001             m->state == MOUNT_MOUNTING_SIGTERM ||
1002             m->state == MOUNT_MOUNTING_SIGKILL)
1003                 return 0;
1004
1005         assert(m->state == MOUNT_MOUNTING ||
1006                m->state == MOUNT_MOUNTING_DONE ||
1007                m->state == MOUNT_MOUNTED ||
1008                m->state == MOUNT_REMOUNTING ||
1009                m->state == MOUNT_REMOUNTING_SIGTERM ||
1010                m->state == MOUNT_REMOUNTING_SIGKILL);
1011
1012         mount_enter_unmounting(m, true);
1013         return 0;
1014 }
1015
1016 static int mount_reload(Unit *u) {
1017         Mount *m = MOUNT(u);
1018
1019         assert(m);
1020
1021         if (m->state == MOUNT_MOUNTING_DONE)
1022                 return -EAGAIN;
1023
1024         assert(m->state == MOUNT_MOUNTED);
1025
1026         mount_enter_remounting(m, true);
1027         return 0;
1028 }
1029
1030 static int mount_serialize(Unit *u, FILE *f, FDSet *fds) {
1031         Mount *m = MOUNT(u);
1032
1033         assert(m);
1034         assert(f);
1035         assert(fds);
1036
1037         unit_serialize_item(u, f, "state", mount_state_to_string(m->state));
1038         unit_serialize_item(u, f, "failure", yes_no(m->failure));
1039
1040         if (m->control_pid > 0)
1041                 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) m->control_pid);
1042
1043         if (m->control_command_id >= 0)
1044                 unit_serialize_item(u, f, "control-command", mount_exec_command_to_string(m->control_command_id));
1045
1046         return 0;
1047 }
1048
1049 static int mount_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1050         Mount *m = MOUNT(u);
1051
1052         assert(u);
1053         assert(key);
1054         assert(value);
1055         assert(fds);
1056
1057         if (streq(key, "state")) {
1058                 MountState state;
1059
1060                 if ((state = mount_state_from_string(value)) < 0)
1061                         log_debug("Failed to parse state value %s", value);
1062                 else
1063                         m->deserialized_state = state;
1064         } else if (streq(key, "failure")) {
1065                 int b;
1066
1067                 if ((b = parse_boolean(value)) < 0)
1068                         log_debug("Failed to parse failure value %s", value);
1069                 else
1070                         m->failure = b || m->failure;
1071
1072         } else if (streq(key, "control-pid")) {
1073                 pid_t pid;
1074
1075                 if (parse_pid(value, &pid) < 0)
1076                         log_debug("Failed to parse control-pid value %s", value);
1077                 else
1078                         m->control_pid = pid;
1079         } else if (streq(key, "control-command")) {
1080                 MountExecCommand id;
1081
1082                 if ((id = mount_exec_command_from_string(value)) < 0)
1083                         log_debug("Failed to parse exec-command value %s", value);
1084                 else {
1085                         m->control_command_id = id;
1086                         m->control_command = m->exec_command + id;
1087                 }
1088
1089         } else
1090                 log_debug("Unknown serialization key '%s'", key);
1091
1092         return 0;
1093 }
1094
1095 static UnitActiveState mount_active_state(Unit *u) {
1096         assert(u);
1097
1098         return state_translation_table[MOUNT(u)->state];
1099 }
1100
1101 static const char *mount_sub_state_to_string(Unit *u) {
1102         assert(u);
1103
1104         return mount_state_to_string(MOUNT(u)->state);
1105 }
1106
1107 static bool mount_check_gc(Unit *u) {
1108         Mount *m = MOUNT(u);
1109
1110         assert(m);
1111
1112         return m->from_etc_fstab || m->from_proc_self_mountinfo;
1113 }
1114
1115 static void mount_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1116         Mount *m = MOUNT(u);
1117         bool success;
1118
1119         assert(m);
1120         assert(pid >= 0);
1121
1122         if (pid != m->control_pid)
1123                 return;
1124
1125         m->control_pid = 0;
1126
1127         success = is_clean_exit(code, status);
1128         m->failure = m->failure || !success;
1129
1130         if (m->control_command) {
1131                 exec_status_exit(&m->control_command->exec_status, pid, code, status, m->exec_context.utmp_id);
1132                 m->control_command = NULL;
1133                 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
1134         }
1135
1136         log_full(success ? LOG_DEBUG : LOG_NOTICE,
1137                  "%s mount process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
1138
1139         /* Note that mount(8) returning and the kernel sending us a
1140          * mount table change event might happen out-of-order. If an
1141          * operation succeed we assume the kernel will follow soon too
1142          * and already change into the resulting state.  If it fails
1143          * we check if the kernel still knows about the mount. and
1144          * change state accordingly. */
1145
1146         switch (m->state) {
1147
1148         case MOUNT_MOUNTING:
1149         case MOUNT_MOUNTING_DONE:
1150         case MOUNT_MOUNTING_SIGKILL:
1151         case MOUNT_MOUNTING_SIGTERM:
1152
1153                 if (success)
1154                         mount_enter_mounted(m, true);
1155                 else if (m->from_proc_self_mountinfo)
1156                         mount_enter_mounted(m, false);
1157                 else
1158                         mount_enter_dead(m, false);
1159                 break;
1160
1161         case MOUNT_REMOUNTING:
1162         case MOUNT_REMOUNTING_SIGKILL:
1163         case MOUNT_REMOUNTING_SIGTERM:
1164
1165                 m->reload_failure = !success;
1166                 if (m->from_proc_self_mountinfo)
1167                         mount_enter_mounted(m, true);
1168                 else
1169                         mount_enter_dead(m, true);
1170
1171                 break;
1172
1173         case MOUNT_UNMOUNTING:
1174         case MOUNT_UNMOUNTING_SIGKILL:
1175         case MOUNT_UNMOUNTING_SIGTERM:
1176
1177                 if (success)
1178                         mount_enter_dead(m, true);
1179                 else if (m->from_proc_self_mountinfo)
1180                         mount_enter_mounted(m, false);
1181                 else
1182                         mount_enter_dead(m, false);
1183                 break;
1184
1185         default:
1186                 assert_not_reached("Uh, control process died at wrong time.");
1187         }
1188
1189         /* Notify clients about changed exit status */
1190         unit_add_to_dbus_queue(u);
1191 }
1192
1193 static void mount_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
1194         Mount *m = MOUNT(u);
1195
1196         assert(m);
1197         assert(elapsed == 1);
1198         assert(w == &m->timer_watch);
1199
1200         switch (m->state) {
1201
1202         case MOUNT_MOUNTING:
1203         case MOUNT_MOUNTING_DONE:
1204                 log_warning("%s mounting timed out. Stopping.", u->meta.id);
1205                 mount_enter_signal(m, MOUNT_MOUNTING_SIGTERM, false);
1206                 break;
1207
1208         case MOUNT_REMOUNTING:
1209                 log_warning("%s remounting timed out. Stopping.", u->meta.id);
1210                 m->reload_failure = true;
1211                 mount_enter_mounted(m, true);
1212                 break;
1213
1214         case MOUNT_UNMOUNTING:
1215                 log_warning("%s unmounting timed out. Stopping.", u->meta.id);
1216                 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGTERM, false);
1217                 break;
1218
1219         case MOUNT_MOUNTING_SIGTERM:
1220                 if (m->exec_context.send_sigkill) {
1221                         log_warning("%s mounting timed out. Killing.", u->meta.id);
1222                         mount_enter_signal(m, MOUNT_MOUNTING_SIGKILL, false);
1223                 } else {
1224                         log_warning("%s mounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1225
1226                         if (m->from_proc_self_mountinfo)
1227                                 mount_enter_mounted(m, false);
1228                         else
1229                                 mount_enter_dead(m, false);
1230                 }
1231                 break;
1232
1233         case MOUNT_REMOUNTING_SIGTERM:
1234                 if (m->exec_context.send_sigkill) {
1235                         log_warning("%s remounting timed out. Killing.", u->meta.id);
1236                         mount_enter_signal(m, MOUNT_REMOUNTING_SIGKILL, false);
1237                 } else {
1238                         log_warning("%s remounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1239
1240                         if (m->from_proc_self_mountinfo)
1241                                 mount_enter_mounted(m, false);
1242                         else
1243                                 mount_enter_dead(m, false);
1244                 }
1245                 break;
1246
1247         case MOUNT_UNMOUNTING_SIGTERM:
1248                 if (m->exec_context.send_sigkill) {
1249                         log_warning("%s unmounting timed out. Killing.", u->meta.id);
1250                         mount_enter_signal(m, MOUNT_UNMOUNTING_SIGKILL, false);
1251                 } else {
1252                         log_warning("%s unmounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1253
1254                         if (m->from_proc_self_mountinfo)
1255                                 mount_enter_mounted(m, false);
1256                         else
1257                                 mount_enter_dead(m, false);
1258                 }
1259                 break;
1260
1261         case MOUNT_MOUNTING_SIGKILL:
1262         case MOUNT_REMOUNTING_SIGKILL:
1263         case MOUNT_UNMOUNTING_SIGKILL:
1264                 log_warning("%s mount process still around after SIGKILL. Ignoring.", u->meta.id);
1265
1266                 if (m->from_proc_self_mountinfo)
1267                         mount_enter_mounted(m, false);
1268                 else
1269                         mount_enter_dead(m, false);
1270                 break;
1271
1272         default:
1273                 assert_not_reached("Timeout at wrong time.");
1274         }
1275 }
1276
1277 static int mount_add_one(
1278                 Manager *m,
1279                 const char *what,
1280                 const char *where,
1281                 const char *options,
1282                 const char *fstype,
1283                 int passno,
1284                 bool from_proc_self_mountinfo,
1285                 bool set_flags) {
1286         int r;
1287         Unit *u;
1288         bool delete;
1289         char *e, *w = NULL, *o = NULL, *f = NULL;
1290         MountParameters *p;
1291
1292         assert(m);
1293         assert(what);
1294         assert(where);
1295         assert(options);
1296         assert(fstype);
1297
1298         assert(!set_flags || from_proc_self_mountinfo);
1299
1300         /* Ignore API mount points. They should never be referenced in
1301          * dependencies ever. */
1302         if (mount_point_is_api(where))
1303                 return 0;
1304         if (mount_point_ignore(where))
1305                 return 0;
1306
1307         if (streq(fstype, "autofs"))
1308                 return 0;
1309
1310         /* probably some kind of swap, ignore */
1311         if (!is_path(where))
1312                 return 0;
1313
1314         if (!(e = unit_name_from_path(where, ".mount")))
1315                 return -ENOMEM;
1316
1317         if (!(u = manager_get_unit(m, e))) {
1318                 delete = true;
1319
1320                 if (!(u = unit_new(m))) {
1321                         free(e);
1322                         return -ENOMEM;
1323                 }
1324
1325                 r = unit_add_name(u, e);
1326                 free(e);
1327
1328                 if (r < 0)
1329                         goto fail;
1330
1331                 if (!(MOUNT(u)->where = strdup(where))) {
1332                         r = -ENOMEM;
1333                         goto fail;
1334                 }
1335
1336                 unit_add_to_load_queue(u);
1337         } else {
1338                 delete = false;
1339                 free(e);
1340         }
1341
1342         if (!(w = strdup(what)) ||
1343             !(o = strdup(options)) ||
1344             !(f = strdup(fstype))) {
1345                 r = -ENOMEM;
1346                 goto fail;
1347         }
1348
1349         if (from_proc_self_mountinfo) {
1350                 p = &MOUNT(u)->parameters_proc_self_mountinfo;
1351
1352                 if (set_flags) {
1353                         MOUNT(u)->is_mounted = true;
1354                         MOUNT(u)->just_mounted = !MOUNT(u)->from_proc_self_mountinfo;
1355                         MOUNT(u)->just_changed = !streq_ptr(p->options, o);
1356                 }
1357
1358                 MOUNT(u)->from_proc_self_mountinfo = true;
1359         } else {
1360                 p = &MOUNT(u)->parameters_etc_fstab;
1361                 MOUNT(u)->from_etc_fstab = true;
1362         }
1363
1364         free(p->what);
1365         p->what = w;
1366
1367         free(p->options);
1368         p->options = o;
1369
1370         free(p->fstype);
1371         p->fstype = f;
1372
1373         p->passno = passno;
1374
1375         unit_add_to_dbus_queue(u);
1376
1377         return 0;
1378
1379 fail:
1380         free(w);
1381         free(o);
1382         free(f);
1383
1384         if (delete && u)
1385                 unit_free(u);
1386
1387         return r;
1388 }
1389
1390 static int mount_find_pri(char *options) {
1391         char *end, *pri;
1392         unsigned long r;
1393
1394         if (!(pri = mount_test_option(options, "pri=")))
1395                 return 0;
1396
1397         pri += 4;
1398
1399         errno = 0;
1400         r = strtoul(pri, &end, 10);
1401
1402         if (errno != 0)
1403                 return -errno;
1404
1405         if (end == pri || (*end != ',' && *end != 0))
1406                 return -EINVAL;
1407
1408         return (int) r;
1409 }
1410
1411 static int mount_load_etc_fstab(Manager *m) {
1412         FILE *f;
1413         int r = 0;
1414         struct mntent* me;
1415
1416         assert(m);
1417
1418         errno = 0;
1419         if (!(f = setmntent("/etc/fstab", "r")))
1420                 return -errno;
1421
1422         while ((me = getmntent(f))) {
1423                 char *where, *what;
1424                 int k;
1425
1426                 if (!(what = fstab_node_to_udev_node(me->mnt_fsname))) {
1427                         r = -ENOMEM;
1428                         goto finish;
1429                 }
1430
1431                 if (!(where = strdup(me->mnt_dir))) {
1432                         free(what);
1433                         r = -ENOMEM;
1434                         goto finish;
1435                 }
1436
1437                 if (what[0] == '/')
1438                         path_kill_slashes(what);
1439
1440                 if (where[0] == '/')
1441                         path_kill_slashes(where);
1442
1443                 if (streq(me->mnt_type, "swap")) {
1444                         int pri;
1445
1446                         if ((pri = mount_find_pri(me->mnt_opts)) < 0)
1447                                 k = pri;
1448                         else
1449                                 k = swap_add_one(m,
1450                                                  what,
1451                                                  NULL,
1452                                                  pri,
1453                                                  !!mount_test_option(me->mnt_opts, MNTOPT_NOAUTO),
1454                                                  !!mount_test_option(me->mnt_opts, "nofail"),
1455                                                  !!mount_test_option(me->mnt_opts, "comment=systemd.swapon"),
1456                                                  false);
1457                 } else
1458                         k = mount_add_one(m, what, where, me->mnt_opts, me->mnt_type, me->mnt_passno, false, false);
1459
1460                 free(what);
1461                 free(where);
1462
1463                 if (r < 0)
1464                         r = k;
1465         }
1466
1467 finish:
1468
1469         endmntent(f);
1470         return r;
1471 }
1472
1473 static int mount_load_proc_self_mountinfo(Manager *m, bool set_flags) {
1474         int r = 0;
1475         unsigned i;
1476         char *device, *path, *options, *options2, *fstype, *d, *p, *o;
1477
1478         assert(m);
1479
1480         rewind(m->proc_self_mountinfo);
1481
1482         for (i = 1;; i++) {
1483                 int k;
1484
1485                 device = path = options = options2 = fstype = d = p = o = NULL;
1486
1487                 if ((k = fscanf(m->proc_self_mountinfo,
1488                                 "%*s "       /* (1) mount id */
1489                                 "%*s "       /* (2) parent id */
1490                                 "%*s "       /* (3) major:minor */
1491                                 "%*s "       /* (4) root */
1492                                 "%ms "       /* (5) mount point */
1493                                 "%ms"        /* (6) mount options */
1494                                 "%*[^-]"     /* (7) optional fields */
1495                                 "- "         /* (8) separator */
1496                                 "%ms "       /* (9) file system type */
1497                                 "%ms"        /* (10) mount source */
1498                                 "%ms"        /* (11) mount options 2 */
1499                                 "%*[^\n]",   /* some rubbish at the end */
1500                                 &path,
1501                                 &options,
1502                                 &fstype,
1503                                 &device,
1504                                 &options2)) != 5) {
1505
1506                         if (k == EOF)
1507                                 break;
1508
1509                         log_warning("Failed to parse /proc/self/mountinfo:%u.", i);
1510                         goto clean_up;
1511                 }
1512
1513                 if (asprintf(&o, "%s,%s", options, options2) < 0) {
1514                         r = -ENOMEM;
1515                         goto finish;
1516                 }
1517
1518                 if (!(d = cunescape(device)) ||
1519                     !(p = cunescape(path))) {
1520                         r = -ENOMEM;
1521                         goto finish;
1522                 }
1523
1524                 if ((k = mount_add_one(m, d, p, o, fstype, 0, true, set_flags)) < 0)
1525                         r = k;
1526
1527 clean_up:
1528                 free(device);
1529                 free(path);
1530                 free(options);
1531                 free(options2);
1532                 free(fstype);
1533                 free(d);
1534                 free(p);
1535                 free(o);
1536         }
1537
1538 finish:
1539         free(device);
1540         free(path);
1541         free(options);
1542         free(options2);
1543         free(fstype);
1544         free(d);
1545         free(p);
1546         free(o);
1547
1548         return r;
1549 }
1550
1551 static void mount_shutdown(Manager *m) {
1552         assert(m);
1553
1554         if (m->proc_self_mountinfo) {
1555                 fclose(m->proc_self_mountinfo);
1556                 m->proc_self_mountinfo = NULL;
1557         }
1558 }
1559
1560 static int mount_enumerate(Manager *m) {
1561         int r;
1562         struct epoll_event ev;
1563         assert(m);
1564
1565         if (!m->proc_self_mountinfo) {
1566                 if (!(m->proc_self_mountinfo = fopen("/proc/self/mountinfo", "re")))
1567                         return -errno;
1568
1569                 m->mount_watch.type = WATCH_MOUNT;
1570                 m->mount_watch.fd = fileno(m->proc_self_mountinfo);
1571
1572                 zero(ev);
1573                 ev.events = EPOLLPRI;
1574                 ev.data.ptr = &m->mount_watch;
1575
1576                 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->mount_watch.fd, &ev) < 0)
1577                         return -errno;
1578         }
1579
1580         if ((r = mount_load_etc_fstab(m)) < 0)
1581                 goto fail;
1582
1583         if ((r = mount_load_proc_self_mountinfo(m, false)) < 0)
1584                 goto fail;
1585
1586         return 0;
1587
1588 fail:
1589         mount_shutdown(m);
1590         return r;
1591 }
1592
1593 void mount_fd_event(Manager *m, int events) {
1594         Meta *meta;
1595         int r;
1596
1597         assert(m);
1598         assert(events & EPOLLPRI);
1599
1600         /* The manager calls this for every fd event happening on the
1601          * /proc/self/mountinfo file, which informs us about mounting
1602          * table changes */
1603
1604         if ((r = mount_load_proc_self_mountinfo(m, true)) < 0) {
1605                 log_error("Failed to reread /proc/self/mountinfo: %s", strerror(-r));
1606
1607                 /* Reset flags, just in case, for later calls */
1608                 LIST_FOREACH(units_per_type, meta, m->units_per_type[UNIT_MOUNT]) {
1609                         Mount *mount = (Mount*) meta;
1610
1611                         mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1612                 }
1613
1614                 return;
1615         }
1616
1617         manager_dispatch_load_queue(m);
1618
1619         LIST_FOREACH(units_per_type, meta, m->units_per_type[UNIT_MOUNT]) {
1620                 Mount *mount = (Mount*) meta;
1621
1622                 if (!mount->is_mounted) {
1623                         /* This has just been unmounted. */
1624
1625                         mount->from_proc_self_mountinfo = false;
1626
1627                         switch (mount->state) {
1628
1629                         case MOUNT_MOUNTED:
1630                                 mount_enter_dead(mount, true);
1631                                 break;
1632
1633                         default:
1634                                 mount_set_state(mount, mount->state);
1635                                 break;
1636
1637                         }
1638
1639                 } else if (mount->just_mounted || mount->just_changed) {
1640
1641                         /* New or changed mount entry */
1642
1643                         switch (mount->state) {
1644
1645                         case MOUNT_DEAD:
1646                         case MOUNT_FAILED:
1647                                 mount_enter_mounted(mount, true);
1648                                 break;
1649
1650                         case MOUNT_MOUNTING:
1651                                 mount_enter_mounting_done(mount);
1652                                 break;
1653
1654                         default:
1655                                 /* Nothing really changed, but let's
1656                                  * issue an notification call
1657                                  * nonetheless, in case somebody is
1658                                  * waiting for this. (e.g. file system
1659                                  * ro/rw remounts.) */
1660                                 mount_set_state(mount, mount->state);
1661                                 break;
1662                         }
1663                 }
1664
1665                 /* Reset the flags for later calls */
1666                 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1667         }
1668 }
1669
1670 static void mount_reset_failed(Unit *u) {
1671         Mount *m = MOUNT(u);
1672
1673         assert(m);
1674
1675         if (m->state == MOUNT_FAILED)
1676                 mount_set_state(m, MOUNT_DEAD);
1677
1678         m->failure = false;
1679 }
1680
1681 static int mount_kill(Unit *u, KillWho who, KillMode mode, int signo, DBusError *error) {
1682         Mount *m = MOUNT(u);
1683         int r = 0;
1684         Set *pid_set = NULL;
1685
1686         assert(m);
1687
1688         if (who == KILL_MAIN) {
1689                 dbus_set_error(error, BUS_ERROR_NO_SUCH_PROCESS, "Mount units have no main processes");
1690                 return -EINVAL;
1691         }
1692
1693         if (m->control_pid <= 0 && who == KILL_CONTROL) {
1694                 dbus_set_error(error, BUS_ERROR_NO_SUCH_PROCESS, "No control process to kill");
1695                 return -ENOENT;
1696         }
1697
1698         if (m->control_pid > 0)
1699                 if (kill(m->control_pid, signo) < 0)
1700                         r = -errno;
1701
1702         if (mode == KILL_CONTROL_GROUP) {
1703                 int q;
1704
1705                 if (!(pid_set = set_new(trivial_hash_func, trivial_compare_func)))
1706                         return -ENOMEM;
1707
1708                 /* Exclude the control pid from being killed via the cgroup */
1709                 if (m->control_pid > 0)
1710                         if ((q = set_put(pid_set, LONG_TO_PTR(m->control_pid))) < 0) {
1711                                 r = q;
1712                                 goto finish;
1713                         }
1714
1715                 if ((q = cgroup_bonding_kill_list(m->meta.cgroup_bondings, signo, false, pid_set)) < 0)
1716                         if (r != -EAGAIN && r != -ESRCH && r != -ENOENT)
1717                                 r = q;
1718         }
1719
1720 finish:
1721         if (pid_set)
1722                 set_free(pid_set);
1723
1724         return r;
1725 }
1726
1727 static const char* const mount_state_table[_MOUNT_STATE_MAX] = {
1728         [MOUNT_DEAD] = "dead",
1729         [MOUNT_MOUNTING] = "mounting",
1730         [MOUNT_MOUNTING_DONE] = "mounting-done",
1731         [MOUNT_MOUNTED] = "mounted",
1732         [MOUNT_REMOUNTING] = "remounting",
1733         [MOUNT_UNMOUNTING] = "unmounting",
1734         [MOUNT_MOUNTING_SIGTERM] = "mounting-sigterm",
1735         [MOUNT_MOUNTING_SIGKILL] = "mounting-sigkill",
1736         [MOUNT_REMOUNTING_SIGTERM] = "remounting-sigterm",
1737         [MOUNT_REMOUNTING_SIGKILL] = "remounting-sigkill",
1738         [MOUNT_UNMOUNTING_SIGTERM] = "unmounting-sigterm",
1739         [MOUNT_UNMOUNTING_SIGKILL] = "unmounting-sigkill",
1740         [MOUNT_FAILED] = "failed"
1741 };
1742
1743 DEFINE_STRING_TABLE_LOOKUP(mount_state, MountState);
1744
1745 static const char* const mount_exec_command_table[_MOUNT_EXEC_COMMAND_MAX] = {
1746         [MOUNT_EXEC_MOUNT] = "ExecMount",
1747         [MOUNT_EXEC_UNMOUNT] = "ExecUnmount",
1748         [MOUNT_EXEC_REMOUNT] = "ExecRemount",
1749 };
1750
1751 DEFINE_STRING_TABLE_LOOKUP(mount_exec_command, MountExecCommand);
1752
1753 const UnitVTable mount_vtable = {
1754         .suffix = ".mount",
1755
1756         .no_alias = true,
1757         .no_instances = true,
1758         .no_isolate = true,
1759         .show_status = true,
1760
1761         .init = mount_init,
1762         .load = mount_load,
1763         .done = mount_done,
1764
1765         .coldplug = mount_coldplug,
1766
1767         .dump = mount_dump,
1768
1769         .start = mount_start,
1770         .stop = mount_stop,
1771         .reload = mount_reload,
1772
1773         .kill = mount_kill,
1774
1775         .serialize = mount_serialize,
1776         .deserialize_item = mount_deserialize_item,
1777
1778         .active_state = mount_active_state,
1779         .sub_state_to_string = mount_sub_state_to_string,
1780
1781         .check_gc = mount_check_gc,
1782
1783         .sigchld_event = mount_sigchld_event,
1784         .timer_event = mount_timer_event,
1785
1786         .reset_failed = mount_reset_failed,
1787
1788         .bus_interface = "org.freedesktop.systemd1.Mount",
1789         .bus_message_handler = bus_mount_message_handler,
1790         .bus_invalidating_properties =  bus_mount_invalidating_properties,
1791
1792         .enumerate = mount_enumerate,
1793         .shutdown = mount_shutdown
1794 };