chiark / gitweb /
mount: make device timeout configurable
[elogind.git] / src / mount.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <errno.h>
23 #include <stdio.h>
24 #include <mntent.h>
25 #include <sys/epoll.h>
26 #include <signal.h>
27
28 #include "unit.h"
29 #include "mount.h"
30 #include "load-fragment.h"
31 #include "load-dropin.h"
32 #include "log.h"
33 #include "strv.h"
34 #include "mount-setup.h"
35 #include "unit-name.h"
36 #include "dbus-mount.h"
37 #include "special.h"
38 #include "bus-errors.h"
39 #include "exit-status.h"
40 #include "def.h"
41
42 static const UnitActiveState state_translation_table[_MOUNT_STATE_MAX] = {
43         [MOUNT_DEAD] = UNIT_INACTIVE,
44         [MOUNT_MOUNTING] = UNIT_ACTIVATING,
45         [MOUNT_MOUNTING_DONE] = UNIT_ACTIVE,
46         [MOUNT_MOUNTED] = UNIT_ACTIVE,
47         [MOUNT_REMOUNTING] = UNIT_RELOADING,
48         [MOUNT_UNMOUNTING] = UNIT_DEACTIVATING,
49         [MOUNT_MOUNTING_SIGTERM] = UNIT_DEACTIVATING,
50         [MOUNT_MOUNTING_SIGKILL] = UNIT_DEACTIVATING,
51         [MOUNT_REMOUNTING_SIGTERM] = UNIT_RELOADING,
52         [MOUNT_REMOUNTING_SIGKILL] = UNIT_RELOADING,
53         [MOUNT_UNMOUNTING_SIGTERM] = UNIT_DEACTIVATING,
54         [MOUNT_UNMOUNTING_SIGKILL] = UNIT_DEACTIVATING,
55         [MOUNT_FAILED] = UNIT_FAILED
56 };
57
58 static void mount_init(Unit *u) {
59         Mount *m = MOUNT(u);
60
61         assert(u);
62         assert(u->meta.load_state == UNIT_STUB);
63
64         m->timeout_usec = DEFAULT_TIMEOUT_USEC;
65         m->directory_mode = 0755;
66
67         exec_context_init(&m->exec_context);
68
69         /* The stdio/kmsg bridge socket is on /, in order to avoid a
70          * dep loop, don't use kmsg logging for -.mount */
71         if (!unit_has_name(u, "-.mount"))
72                 m->exec_context.std_output = EXEC_OUTPUT_KMSG;
73
74         /* We need to make sure that /bin/mount is always called in
75          * the same process group as us, so that the autofs kernel
76          * side doesn't send us another mount request while we are
77          * already trying to comply its last one. */
78         m->exec_context.same_pgrp = true;
79
80         m->timer_watch.type = WATCH_INVALID;
81
82         m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
83
84         m->meta.ignore_on_isolate = true;
85 }
86
87 static void mount_unwatch_control_pid(Mount *m) {
88         assert(m);
89
90         if (m->control_pid <= 0)
91                 return;
92
93         unit_unwatch_pid(UNIT(m), m->control_pid);
94         m->control_pid = 0;
95 }
96
97 static void mount_parameters_done(MountParameters *p) {
98         assert(p);
99
100         free(p->what);
101         free(p->options);
102         free(p->fstype);
103
104         p->what = p->options = p->fstype = NULL;
105 }
106
107 static void mount_done(Unit *u) {
108         Mount *m = MOUNT(u);
109         Meta *other;
110
111         assert(m);
112
113         free(m->where);
114         m->where = NULL;
115
116         /* Try to detach us from the automount unit if there is any */
117         LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_AUTOMOUNT]) {
118                 Automount *a = (Automount*) other;
119
120                 if (a->mount == m)
121                         a->mount = NULL;
122         }
123
124         mount_parameters_done(&m->parameters_etc_fstab);
125         mount_parameters_done(&m->parameters_proc_self_mountinfo);
126         mount_parameters_done(&m->parameters_fragment);
127
128         exec_context_done(&m->exec_context);
129         exec_command_done_array(m->exec_command, _MOUNT_EXEC_COMMAND_MAX);
130         m->control_command = NULL;
131
132         mount_unwatch_control_pid(m);
133
134         unit_unwatch_timer(u, &m->timer_watch);
135 }
136
137 static MountParameters* get_mount_parameters_configured(Mount *m) {
138         assert(m);
139
140         if (m->from_fragment)
141                 return &m->parameters_fragment;
142         else if (m->from_etc_fstab)
143                 return &m->parameters_etc_fstab;
144
145         return NULL;
146 }
147
148 static MountParameters* get_mount_parameters(Mount *m) {
149         assert(m);
150
151         if (m->from_proc_self_mountinfo)
152                 return &m->parameters_proc_self_mountinfo;
153
154         return get_mount_parameters_configured(m);
155 }
156
157 static int mount_add_mount_links(Mount *m) {
158         Meta *other;
159         int r;
160         MountParameters *pm;
161
162         assert(m);
163
164         pm = get_mount_parameters_configured(m);
165
166         /* Adds in links to other mount points that might lie below or
167          * above us in the hierarchy */
168
169         LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_MOUNT]) {
170                 Mount *n = (Mount*) other;
171                 MountParameters *pn;
172
173                 if (n == m)
174                         continue;
175
176                 if (n->meta.load_state != UNIT_LOADED)
177                         continue;
178
179                 pn = get_mount_parameters_configured(n);
180
181                 if (path_startswith(m->where, n->where)) {
182
183                         if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
184                                 return r;
185
186                         if (pn)
187                                 if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
188                                         return r;
189
190                 } else if (path_startswith(n->where, m->where)) {
191
192                         if ((r = unit_add_dependency(UNIT(n), UNIT_AFTER, UNIT(m), true)) < 0)
193                                 return r;
194
195                         if (pm)
196                                 if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
197                                         return r;
198
199                 } else if (pm && path_startswith(pm->what, n->where)) {
200
201                         if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
202                                 return r;
203
204                         if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
205                                 return r;
206
207                 } else if (pn && path_startswith(pn->what, m->where)) {
208
209                         if ((r = unit_add_dependency(UNIT(n), UNIT_AFTER, UNIT(m), true)) < 0)
210                                 return r;
211
212                         if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
213                                 return r;
214                 }
215         }
216
217         return 0;
218 }
219
220 static int mount_add_swap_links(Mount *m) {
221         Meta *other;
222         int r;
223
224         assert(m);
225
226         LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_SWAP])
227                 if ((r = swap_add_one_mount_link((Swap*) other, m)) < 0)
228                         return r;
229
230         return 0;
231 }
232
233 static int mount_add_path_links(Mount *m) {
234         Meta *other;
235         int r;
236
237         assert(m);
238
239         LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_PATH])
240                 if ((r = path_add_one_mount_link((Path*) other, m)) < 0)
241                         return r;
242
243         return 0;
244 }
245
246 static int mount_add_automount_links(Mount *m) {
247         Meta *other;
248         int r;
249
250         assert(m);
251
252         LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_AUTOMOUNT])
253                 if ((r = automount_add_one_mount_link((Automount*) other, m)) < 0)
254                         return r;
255
256         return 0;
257 }
258
259 static int mount_add_socket_links(Mount *m) {
260         Meta *other;
261         int r;
262
263         assert(m);
264
265         LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_SOCKET])
266                 if ((r = socket_add_one_mount_link((Socket*) other, m)) < 0)
267                         return r;
268
269         return 0;
270 }
271
272 static char* mount_test_option(const char *haystack, const char *needle) {
273         struct mntent me;
274
275         assert(needle);
276
277         /* Like glibc's hasmntopt(), but works on a string, not a
278          * struct mntent */
279
280         if (!haystack)
281                 return false;
282
283         zero(me);
284         me.mnt_opts = (char*) haystack;
285
286         return hasmntopt(&me, needle);
287 }
288
289 static bool mount_is_network(MountParameters *p) {
290         assert(p);
291
292         if (mount_test_option(p->options, "_netdev"))
293                 return true;
294
295         if (p->fstype && fstype_is_network(p->fstype))
296                 return true;
297
298         return false;
299 }
300
301 static bool mount_is_bind(MountParameters *p) {
302         assert(p);
303
304         if (mount_test_option(p->options, "bind"))
305                 return true;
306
307         if (p->fstype && streq(p->fstype, "bind"))
308                 return true;
309
310         return false;
311 }
312
313 static bool needs_quota(MountParameters *p) {
314         assert(p);
315
316         if (mount_is_network(p))
317                 return false;
318
319         if (mount_is_bind(p))
320                 return false;
321
322         return mount_test_option(p->options, "usrquota") ||
323                 mount_test_option(p->options, "grpquota");
324 }
325
326 static int mount_add_target_links(Mount *m) {
327         const char *target, *after = NULL;
328         MountParameters *p;
329         Unit *tu;
330         int r;
331         bool noauto, nofail, handle, automount;
332
333         assert(m);
334
335         if (!(p = get_mount_parameters_configured(m)))
336                 return 0;
337
338         noauto = !!mount_test_option(p->options, MNTOPT_NOAUTO);
339         nofail = !!mount_test_option(p->options, "nofail");
340         handle =
341                 mount_test_option(p->options, "comment=systemd.mount") ||
342                 mount_test_option(p->options, "x-systemd-mount") ||
343                 m->meta.manager->mount_auto;
344         automount =
345                 mount_test_option(p->options, "comment=systemd.automount") ||
346                 mount_test_option(p->options, "x-systemd-automount");
347
348         if (mount_is_network(p)) {
349                 target = SPECIAL_REMOTE_FS_TARGET;
350
351                 if (m->meta.manager->running_as == MANAGER_SYSTEM)
352                         after = SPECIAL_NETWORK_TARGET;
353         } else
354                 target = SPECIAL_LOCAL_FS_TARGET;
355
356         if ((r = manager_load_unit(m->meta.manager, target, NULL, NULL, &tu)) < 0)
357                 return r;
358
359         if (after)
360                 if ((r = unit_add_dependency_by_name(UNIT(m), UNIT_AFTER, after, NULL, true)) < 0)
361                         return r;
362
363         if (automount && m->meta.manager->running_as == MANAGER_SYSTEM) {
364                 Unit *am;
365
366                 if ((r = unit_load_related_unit(UNIT(m), ".automount", &am)) < 0)
367                         return r;
368
369                 return unit_add_two_dependencies(tu, UNIT_AFTER, UNIT_WANTS, UNIT(am), true);
370         } else {
371
372                 /* Automatically add mount points that aren't natively
373                  * configured to local-fs.target */
374                 if (!noauto &&
375                     !nofail &&
376                     handle &&
377                     m->from_etc_fstab &&
378                     m->meta.manager->running_as == MANAGER_SYSTEM)
379                         if ((r = unit_add_dependency(tu, UNIT_WANTS, UNIT(m), true)) < 0)
380                                 return r;
381
382                 return unit_add_dependency(UNIT(m), UNIT_BEFORE, tu, true);
383         }
384 }
385
386 static int mount_add_device_links(Mount *m) {
387         MountParameters *p;
388         int r;
389
390         assert(m);
391
392         if (!(p = get_mount_parameters_configured(m)))
393                 return 0;
394
395         if (!p->what)
396                 return 0;
397
398         if (!mount_is_bind(p) && !path_equal(m->where, "/")) {
399                 bool nofail, noauto;
400
401                 noauto = !!mount_test_option(p->options, MNTOPT_NOAUTO);
402                 nofail = !!mount_test_option(p->options, "nofail");
403
404                 if ((r = unit_add_node_link(UNIT(m), p->what,
405                                             !noauto && nofail &&
406                                             UNIT(m)->meta.manager->running_as == MANAGER_SYSTEM)) < 0)
407                         return r;
408         }
409
410         if (p->passno > 0 &&
411             !mount_is_bind(p) &&
412             UNIT(m)->meta.manager->running_as == MANAGER_SYSTEM &&
413             !path_equal(m->where, "/")) {
414                 char *name;
415                 Unit *fsck;
416                 /* Let's add in the fsck service */
417
418                 /* aka SPECIAL_FSCK_SERVICE */
419                 if (!(name = unit_name_from_path_instance("fsck", p->what, ".service")))
420                         return -ENOMEM;
421
422                 if ((r = manager_load_unit_prepare(m->meta.manager, name, NULL, NULL, &fsck)) < 0) {
423                         log_warning("Failed to prepare unit %s: %s", name, strerror(-r));
424                         free(name);
425                         return r;
426                 }
427
428                 free(name);
429
430                 SERVICE(fsck)->fsck_passno = p->passno;
431
432                 if ((r = unit_add_two_dependencies(UNIT(m), UNIT_AFTER, UNIT_REQUIRES, fsck, true)) < 0)
433                         return r;
434         }
435
436         return 0;
437 }
438
439 static int mount_add_default_dependencies(Mount *m) {
440         int r;
441
442         assert(m);
443
444         if (m->meta.manager->running_as == MANAGER_SYSTEM &&
445             !path_equal(m->where, "/")) {
446                 MountParameters *p;
447
448                 p = get_mount_parameters_configured(m);
449
450                 if (p && needs_quota(p)) {
451                         if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_WANTS, SPECIAL_QUOTACHECK_SERVICE, NULL, true)) < 0 ||
452                             (r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_WANTS, SPECIAL_QUOTAON_SERVICE, NULL, true)) < 0)
453                                 return r;
454                 }
455
456                 if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_UMOUNT_TARGET, NULL, true)) < 0)
457                         return r;
458         }
459
460         return 0;
461 }
462
463 static void mount_fix_timeouts(Mount *m) {
464         MountParameters *p;
465         const char *timeout = NULL;
466         Unit *other;
467         Iterator i;
468         usec_t u;
469
470         assert(m);
471
472         if (!(p = get_mount_parameters_configured(m)))
473                 return;
474
475         /* Allow configuration how long we wait for a device that
476          * backs a mount point to show up. This is useful to support
477          * endless device timeouts for devices that show up only after
478          * user input, like crypto devices. */
479
480         if ((timeout = mount_test_option(p->options, "comment=systemd.device-timeout")))
481                 timeout += 31;
482         else if ((timeout = mount_test_option(p->options, "x-systemd-device-timeout")))
483                 timeout += 25;
484         else
485                 return;
486
487         if (parse_usec(timeout, &u) < 0) {
488                 log_warning("Failed to parse timeout for %s, ignoring: %s", m->where, timeout);
489                 return;
490         }
491
492         SET_FOREACH(other, m->meta.dependencies[UNIT_AFTER], i) {
493                 if (other->meta.type != UNIT_DEVICE)
494                         continue;
495
496                 other->meta.job_timeout = u;
497         }
498 }
499
500 static int mount_verify(Mount *m) {
501         bool b;
502         char *e;
503         assert(m);
504
505         if (m->meta.load_state != UNIT_LOADED)
506                 return 0;
507
508         if (!m->from_etc_fstab && !m->from_fragment && !m->from_proc_self_mountinfo)
509                 return -ENOENT;
510
511         if (!(e = unit_name_from_path(m->where, ".mount")))
512                 return -ENOMEM;
513
514         b = unit_has_name(UNIT(m), e);
515         free(e);
516
517         if (!b) {
518                 log_error("%s's Where setting doesn't match unit name. Refusing.", m->meta.id);
519                 return -EINVAL;
520         }
521
522         if (mount_point_is_api(m->where) || mount_point_ignore(m->where)) {
523                 log_error("Cannot create mount unit for API file system %s. Refusing.", m->where);
524                 return -EINVAL;
525         }
526
527         if (m->meta.fragment_path && !m->parameters_fragment.what) {
528                 log_error("%s's What setting is missing. Refusing.", m->meta.id);
529                 return -EBADMSG;
530         }
531
532         if (m->exec_context.pam_name && m->exec_context.kill_mode != KILL_CONTROL_GROUP) {
533                 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", m->meta.id);
534                 return -EINVAL;
535         }
536
537         return 0;
538 }
539
540 static int mount_load(Unit *u) {
541         Mount *m = MOUNT(u);
542         int r;
543
544         assert(u);
545         assert(u->meta.load_state == UNIT_STUB);
546
547         if ((r = unit_load_fragment_and_dropin_optional(u)) < 0)
548                 return r;
549
550         /* This is a new unit? Then let's add in some extras */
551         if (u->meta.load_state == UNIT_LOADED) {
552                 if ((r = unit_add_exec_dependencies(u, &m->exec_context)) < 0)
553                         return r;
554
555                 if (m->meta.fragment_path)
556                         m->from_fragment = true;
557
558                 if (!m->where)
559                         if (!(m->where = unit_name_to_path(u->meta.id)))
560                                 return -ENOMEM;
561
562                 path_kill_slashes(m->where);
563
564                 if (!m->meta.description)
565                         if ((r = unit_set_description(u, m->where)) < 0)
566                                 return r;
567
568                 if ((r = mount_add_device_links(m)) < 0)
569                         return r;
570
571                 if ((r = mount_add_mount_links(m)) < 0)
572                         return r;
573
574                 if ((r = mount_add_socket_links(m)) < 0)
575                         return r;
576
577                 if ((r = mount_add_swap_links(m)) < 0)
578                         return r;
579
580                 if ((r = mount_add_path_links(m)) < 0)
581                         return r;
582
583                 if ((r = mount_add_automount_links(m)) < 0)
584                         return r;
585
586                 if ((r = mount_add_target_links(m)) < 0)
587                         return r;
588
589                 if ((r = unit_add_default_cgroups(u)) < 0)
590                         return r;
591
592                 if (m->meta.default_dependencies)
593                         if ((r = mount_add_default_dependencies(m)) < 0)
594                                 return r;
595
596                 mount_fix_timeouts(m);
597         }
598
599         return mount_verify(m);
600 }
601
602 static int mount_notify_automount(Mount *m, int status) {
603         Unit *p;
604         int r;
605
606         assert(m);
607
608         if ((r = unit_get_related_unit(UNIT(m), ".automount", &p)) < 0)
609                 return r == -ENOENT ? 0 : r;
610
611         return automount_send_ready(AUTOMOUNT(p), status);
612 }
613
614 static void mount_set_state(Mount *m, MountState state) {
615         MountState old_state;
616         assert(m);
617
618         old_state = m->state;
619         m->state = state;
620
621         if (state != MOUNT_MOUNTING &&
622             state != MOUNT_MOUNTING_DONE &&
623             state != MOUNT_REMOUNTING &&
624             state != MOUNT_UNMOUNTING &&
625             state != MOUNT_MOUNTING_SIGTERM &&
626             state != MOUNT_MOUNTING_SIGKILL &&
627             state != MOUNT_UNMOUNTING_SIGTERM &&
628             state != MOUNT_UNMOUNTING_SIGKILL &&
629             state != MOUNT_REMOUNTING_SIGTERM &&
630             state != MOUNT_REMOUNTING_SIGKILL) {
631                 unit_unwatch_timer(UNIT(m), &m->timer_watch);
632                 mount_unwatch_control_pid(m);
633                 m->control_command = NULL;
634                 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
635         }
636
637         if (state == MOUNT_MOUNTED ||
638             state == MOUNT_REMOUNTING)
639                 mount_notify_automount(m, 0);
640         else if (state == MOUNT_DEAD ||
641                  state == MOUNT_UNMOUNTING ||
642                  state == MOUNT_MOUNTING_SIGTERM ||
643                  state == MOUNT_MOUNTING_SIGKILL ||
644                  state == MOUNT_REMOUNTING_SIGTERM ||
645                  state == MOUNT_REMOUNTING_SIGKILL ||
646                  state == MOUNT_UNMOUNTING_SIGTERM ||
647                  state == MOUNT_UNMOUNTING_SIGKILL ||
648                  state == MOUNT_FAILED)
649                 mount_notify_automount(m, -ENODEV);
650
651         if (state != old_state)
652                 log_debug("%s changed %s -> %s",
653                           m->meta.id,
654                           mount_state_to_string(old_state),
655                           mount_state_to_string(state));
656
657         unit_notify(UNIT(m), state_translation_table[old_state], state_translation_table[state], !m->reload_failure);
658         m->reload_failure = false;
659 }
660
661 static int mount_coldplug(Unit *u) {
662         Mount *m = MOUNT(u);
663         MountState new_state = MOUNT_DEAD;
664         int r;
665
666         assert(m);
667         assert(m->state == MOUNT_DEAD);
668
669         if (m->deserialized_state != m->state)
670                 new_state = m->deserialized_state;
671         else if (m->from_proc_self_mountinfo)
672                 new_state = MOUNT_MOUNTED;
673
674         if (new_state != m->state) {
675
676                 if (new_state == MOUNT_MOUNTING ||
677                     new_state == MOUNT_MOUNTING_DONE ||
678                     new_state == MOUNT_REMOUNTING ||
679                     new_state == MOUNT_UNMOUNTING ||
680                     new_state == MOUNT_MOUNTING_SIGTERM ||
681                     new_state == MOUNT_MOUNTING_SIGKILL ||
682                     new_state == MOUNT_UNMOUNTING_SIGTERM ||
683                     new_state == MOUNT_UNMOUNTING_SIGKILL ||
684                     new_state == MOUNT_REMOUNTING_SIGTERM ||
685                     new_state == MOUNT_REMOUNTING_SIGKILL) {
686
687                         if (m->control_pid <= 0)
688                                 return -EBADMSG;
689
690                         if ((r = unit_watch_pid(UNIT(m), m->control_pid)) < 0)
691                                 return r;
692
693                         if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
694                                 return r;
695                 }
696
697                 mount_set_state(m, new_state);
698         }
699
700         return 0;
701 }
702
703 static void mount_dump(Unit *u, FILE *f, const char *prefix) {
704         Mount *m = MOUNT(u);
705         MountParameters *p;
706
707         assert(m);
708         assert(f);
709
710         p = get_mount_parameters(m);
711
712         fprintf(f,
713                 "%sMount State: %s\n"
714                 "%sWhere: %s\n"
715                 "%sWhat: %s\n"
716                 "%sFile System Type: %s\n"
717                 "%sOptions: %s\n"
718                 "%sFrom /etc/fstab: %s\n"
719                 "%sFrom /proc/self/mountinfo: %s\n"
720                 "%sFrom fragment: %s\n"
721                 "%sDirectoryMode: %04o\n",
722                 prefix, mount_state_to_string(m->state),
723                 prefix, m->where,
724                 prefix, strna(p->what),
725                 prefix, strna(p->fstype),
726                 prefix, strna(p->options),
727                 prefix, yes_no(m->from_etc_fstab),
728                 prefix, yes_no(m->from_proc_self_mountinfo),
729                 prefix, yes_no(m->from_fragment),
730                 prefix, m->directory_mode);
731
732         if (m->control_pid > 0)
733                 fprintf(f,
734                         "%sControl PID: %lu\n",
735                         prefix, (unsigned long) m->control_pid);
736
737         exec_context_dump(&m->exec_context, f, prefix);
738 }
739
740 static int mount_spawn(Mount *m, ExecCommand *c, pid_t *_pid) {
741         pid_t pid;
742         int r;
743
744         assert(m);
745         assert(c);
746         assert(_pid);
747
748         if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
749                 goto fail;
750
751         if ((r = exec_spawn(c,
752                             NULL,
753                             &m->exec_context,
754                             NULL, 0,
755                             m->meta.manager->environment,
756                             true,
757                             true,
758                             true,
759                             m->meta.manager->confirm_spawn,
760                             m->meta.cgroup_bondings,
761                             &pid)) < 0)
762                 goto fail;
763
764         if ((r = unit_watch_pid(UNIT(m), pid)) < 0)
765                 /* FIXME: we need to do something here */
766                 goto fail;
767
768         *_pid = pid;
769
770         return 0;
771
772 fail:
773         unit_unwatch_timer(UNIT(m), &m->timer_watch);
774
775         return r;
776 }
777
778 static void mount_enter_dead(Mount *m, bool success) {
779         assert(m);
780
781         if (!success)
782                 m->failure = true;
783
784         mount_set_state(m, m->failure ? MOUNT_FAILED : MOUNT_DEAD);
785 }
786
787 static void mount_enter_mounted(Mount *m, bool success) {
788         assert(m);
789
790         if (!success)
791                 m->failure = true;
792
793         mount_set_state(m, MOUNT_MOUNTED);
794 }
795
796 static void mount_enter_signal(Mount *m, MountState state, bool success) {
797         int r;
798         Set *pid_set = NULL;
799         bool wait_for_exit = false;
800
801         assert(m);
802
803         if (!success)
804                 m->failure = true;
805
806         if (m->exec_context.kill_mode != KILL_NONE) {
807                 int sig = (state == MOUNT_MOUNTING_SIGTERM ||
808                            state == MOUNT_UNMOUNTING_SIGTERM ||
809                            state == MOUNT_REMOUNTING_SIGTERM) ? m->exec_context.kill_signal : SIGKILL;
810
811                 if (m->control_pid > 0) {
812                         if (kill_and_sigcont(m->control_pid, sig) < 0 && errno != ESRCH)
813
814                                 log_warning("Failed to kill control process %li: %m", (long) m->control_pid);
815                         else
816                                 wait_for_exit = true;
817                 }
818
819                 if (m->exec_context.kill_mode == KILL_CONTROL_GROUP) {
820
821                         if (!(pid_set = set_new(trivial_hash_func, trivial_compare_func))) {
822                                 r = -ENOMEM;
823                                 goto fail;
824                         }
825
826                         /* Exclude the control pid from being killed via the cgroup */
827                         if (m->control_pid > 0)
828                                 if ((r = set_put(pid_set, LONG_TO_PTR(m->control_pid))) < 0)
829                                         goto fail;
830
831                         if ((r = cgroup_bonding_kill_list(m->meta.cgroup_bondings, sig, true, pid_set)) < 0) {
832                                 if (r != -EAGAIN && r != -ESRCH && r != -ENOENT)
833                                         log_warning("Failed to kill control group: %s", strerror(-r));
834                         } else if (r > 0)
835                                 wait_for_exit = true;
836
837                         set_free(pid_set);
838                         pid_set = NULL;
839                 }
840         }
841
842         if (wait_for_exit) {
843                 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
844                         goto fail;
845
846                 mount_set_state(m, state);
847         } else if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
848                 mount_enter_mounted(m, true);
849         else
850                 mount_enter_dead(m, true);
851
852         return;
853
854 fail:
855         log_warning("%s failed to kill processes: %s", m->meta.id, strerror(-r));
856
857         if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
858                 mount_enter_mounted(m, false);
859         else
860                 mount_enter_dead(m, false);
861
862         if (pid_set)
863                 set_free(pid_set);
864 }
865
866 static void mount_enter_unmounting(Mount *m, bool success) {
867         int r;
868
869         assert(m);
870
871         if (!success)
872                 m->failure = true;
873
874         m->control_command_id = MOUNT_EXEC_UNMOUNT;
875         m->control_command = m->exec_command + MOUNT_EXEC_UNMOUNT;
876
877         if ((r = exec_command_set(
878                              m->control_command,
879                              "/bin/umount",
880                              m->where,
881                              NULL)) < 0)
882                 goto fail;
883
884         mount_unwatch_control_pid(m);
885
886         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
887                 goto fail;
888
889         mount_set_state(m, MOUNT_UNMOUNTING);
890
891         return;
892
893 fail:
894         log_warning("%s failed to run 'umount' task: %s", m->meta.id, strerror(-r));
895         mount_enter_mounted(m, false);
896 }
897
898 static void mount_enter_mounting(Mount *m) {
899         int r;
900         MountParameters *p;
901
902         assert(m);
903
904         m->control_command_id = MOUNT_EXEC_MOUNT;
905         m->control_command = m->exec_command + MOUNT_EXEC_MOUNT;
906
907         mkdir_p(m->where, m->directory_mode);
908
909         /* Create the source directory for bind-mounts if needed */
910         p = get_mount_parameters_configured(m);
911         if (p && mount_is_bind(p))
912                 mkdir_p(p->what, m->directory_mode);
913
914         if (m->from_fragment)
915                 r = exec_command_set(
916                                 m->control_command,
917                                 "/bin/mount",
918                                 m->parameters_fragment.what,
919                                 m->where,
920                                 "-t", m->parameters_fragment.fstype ? m->parameters_fragment.fstype : "auto",
921                                 m->parameters_fragment.options ? "-o" : NULL, m->parameters_fragment.options,
922                                 NULL);
923         else if (m->from_etc_fstab)
924                 r = exec_command_set(
925                                 m->control_command,
926                                 "/bin/mount",
927                                 m->where,
928                                 NULL);
929         else
930                 r = -ENOENT;
931
932         if (r < 0)
933                 goto fail;
934
935         mount_unwatch_control_pid(m);
936
937         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
938                 goto fail;
939
940         mount_set_state(m, MOUNT_MOUNTING);
941
942         return;
943
944 fail:
945         log_warning("%s failed to run 'mount' task: %s", m->meta.id, strerror(-r));
946         mount_enter_dead(m, false);
947 }
948
949 static void mount_enter_mounting_done(Mount *m) {
950         assert(m);
951
952         mount_set_state(m, MOUNT_MOUNTING_DONE);
953 }
954
955 static void mount_enter_remounting(Mount *m, bool success) {
956         int r;
957
958         assert(m);
959
960         if (!success)
961                 m->failure = true;
962
963         m->control_command_id = MOUNT_EXEC_REMOUNT;
964         m->control_command = m->exec_command + MOUNT_EXEC_REMOUNT;
965
966         if (m->from_fragment) {
967                 char *buf = NULL;
968                 const char *o;
969
970                 if (m->parameters_fragment.options) {
971                         if (!(buf = strappend("remount,", m->parameters_fragment.options))) {
972                                 r = -ENOMEM;
973                                 goto fail;
974                         }
975
976                         o = buf;
977                 } else
978                         o = "remount";
979
980                 r = exec_command_set(
981                                 m->control_command,
982                                 "/bin/mount",
983                                 m->parameters_fragment.what,
984                                 m->where,
985                                 "-t", m->parameters_fragment.fstype ? m->parameters_fragment.fstype : "auto",
986                                 "-o", o,
987                                 NULL);
988
989                 free(buf);
990         } else if (m->from_etc_fstab)
991                 r = exec_command_set(
992                                 m->control_command,
993                                 "/bin/mount",
994                                 m->where,
995                                 "-o", "remount",
996                                 NULL);
997         else
998                 r = -ENOENT;
999
1000         if (r < 0)
1001                 goto fail;
1002
1003         mount_unwatch_control_pid(m);
1004
1005         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
1006                 goto fail;
1007
1008         mount_set_state(m, MOUNT_REMOUNTING);
1009
1010         return;
1011
1012 fail:
1013         log_warning("%s failed to run 'remount' task: %s", m->meta.id, strerror(-r));
1014         m->reload_failure = true;
1015         mount_enter_mounted(m, true);
1016 }
1017
1018 static int mount_start(Unit *u) {
1019         Mount *m = MOUNT(u);
1020
1021         assert(m);
1022
1023         /* We cannot fulfill this request right now, try again later
1024          * please! */
1025         if (m->state == MOUNT_UNMOUNTING ||
1026             m->state == MOUNT_UNMOUNTING_SIGTERM ||
1027             m->state == MOUNT_UNMOUNTING_SIGKILL ||
1028             m->state == MOUNT_MOUNTING_SIGTERM ||
1029             m->state == MOUNT_MOUNTING_SIGKILL)
1030                 return -EAGAIN;
1031
1032         /* Already on it! */
1033         if (m->state == MOUNT_MOUNTING)
1034                 return 0;
1035
1036         assert(m->state == MOUNT_DEAD || m->state == MOUNT_FAILED);
1037
1038         m->failure = false;
1039         mount_enter_mounting(m);
1040         return 0;
1041 }
1042
1043 static int mount_stop(Unit *u) {
1044         Mount *m = MOUNT(u);
1045
1046         assert(m);
1047
1048         /* Already on it */
1049         if (m->state == MOUNT_UNMOUNTING ||
1050             m->state == MOUNT_UNMOUNTING_SIGKILL ||
1051             m->state == MOUNT_UNMOUNTING_SIGTERM ||
1052             m->state == MOUNT_MOUNTING_SIGTERM ||
1053             m->state == MOUNT_MOUNTING_SIGKILL)
1054                 return 0;
1055
1056         assert(m->state == MOUNT_MOUNTING ||
1057                m->state == MOUNT_MOUNTING_DONE ||
1058                m->state == MOUNT_MOUNTED ||
1059                m->state == MOUNT_REMOUNTING ||
1060                m->state == MOUNT_REMOUNTING_SIGTERM ||
1061                m->state == MOUNT_REMOUNTING_SIGKILL);
1062
1063         mount_enter_unmounting(m, true);
1064         return 0;
1065 }
1066
1067 static int mount_reload(Unit *u) {
1068         Mount *m = MOUNT(u);
1069
1070         assert(m);
1071
1072         if (m->state == MOUNT_MOUNTING_DONE)
1073                 return -EAGAIN;
1074
1075         assert(m->state == MOUNT_MOUNTED);
1076
1077         mount_enter_remounting(m, true);
1078         return 0;
1079 }
1080
1081 static int mount_serialize(Unit *u, FILE *f, FDSet *fds) {
1082         Mount *m = MOUNT(u);
1083
1084         assert(m);
1085         assert(f);
1086         assert(fds);
1087
1088         unit_serialize_item(u, f, "state", mount_state_to_string(m->state));
1089         unit_serialize_item(u, f, "failure", yes_no(m->failure));
1090
1091         if (m->control_pid > 0)
1092                 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) m->control_pid);
1093
1094         if (m->control_command_id >= 0)
1095                 unit_serialize_item(u, f, "control-command", mount_exec_command_to_string(m->control_command_id));
1096
1097         return 0;
1098 }
1099
1100 static int mount_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1101         Mount *m = MOUNT(u);
1102
1103         assert(u);
1104         assert(key);
1105         assert(value);
1106         assert(fds);
1107
1108         if (streq(key, "state")) {
1109                 MountState state;
1110
1111                 if ((state = mount_state_from_string(value)) < 0)
1112                         log_debug("Failed to parse state value %s", value);
1113                 else
1114                         m->deserialized_state = state;
1115         } else if (streq(key, "failure")) {
1116                 int b;
1117
1118                 if ((b = parse_boolean(value)) < 0)
1119                         log_debug("Failed to parse failure value %s", value);
1120                 else
1121                         m->failure = b || m->failure;
1122
1123         } else if (streq(key, "control-pid")) {
1124                 pid_t pid;
1125
1126                 if (parse_pid(value, &pid) < 0)
1127                         log_debug("Failed to parse control-pid value %s", value);
1128                 else
1129                         m->control_pid = pid;
1130         } else if (streq(key, "control-command")) {
1131                 MountExecCommand id;
1132
1133                 if ((id = mount_exec_command_from_string(value)) < 0)
1134                         log_debug("Failed to parse exec-command value %s", value);
1135                 else {
1136                         m->control_command_id = id;
1137                         m->control_command = m->exec_command + id;
1138                 }
1139
1140         } else
1141                 log_debug("Unknown serialization key '%s'", key);
1142
1143         return 0;
1144 }
1145
1146 static UnitActiveState mount_active_state(Unit *u) {
1147         assert(u);
1148
1149         return state_translation_table[MOUNT(u)->state];
1150 }
1151
1152 static const char *mount_sub_state_to_string(Unit *u) {
1153         assert(u);
1154
1155         return mount_state_to_string(MOUNT(u)->state);
1156 }
1157
1158 static bool mount_check_gc(Unit *u) {
1159         Mount *m = MOUNT(u);
1160
1161         assert(m);
1162
1163         return m->from_etc_fstab || m->from_proc_self_mountinfo;
1164 }
1165
1166 static void mount_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1167         Mount *m = MOUNT(u);
1168         bool success;
1169
1170         assert(m);
1171         assert(pid >= 0);
1172
1173         if (pid != m->control_pid)
1174                 return;
1175
1176         m->control_pid = 0;
1177
1178         success = is_clean_exit(code, status);
1179         m->failure = m->failure || !success;
1180
1181         if (m->control_command) {
1182                 exec_status_exit(&m->control_command->exec_status, pid, code, status, m->exec_context.utmp_id);
1183                 m->control_command = NULL;
1184                 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
1185         }
1186
1187         log_full(success ? LOG_DEBUG : LOG_NOTICE,
1188                  "%s mount process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
1189
1190         /* Note that mount(8) returning and the kernel sending us a
1191          * mount table change event might happen out-of-order. If an
1192          * operation succeed we assume the kernel will follow soon too
1193          * and already change into the resulting state.  If it fails
1194          * we check if the kernel still knows about the mount. and
1195          * change state accordingly. */
1196
1197         switch (m->state) {
1198
1199         case MOUNT_MOUNTING:
1200         case MOUNT_MOUNTING_DONE:
1201         case MOUNT_MOUNTING_SIGKILL:
1202         case MOUNT_MOUNTING_SIGTERM:
1203
1204                 if (success)
1205                         mount_enter_mounted(m, true);
1206                 else if (m->from_proc_self_mountinfo)
1207                         mount_enter_mounted(m, false);
1208                 else
1209                         mount_enter_dead(m, false);
1210                 break;
1211
1212         case MOUNT_REMOUNTING:
1213         case MOUNT_REMOUNTING_SIGKILL:
1214         case MOUNT_REMOUNTING_SIGTERM:
1215
1216                 m->reload_failure = !success;
1217                 if (m->from_proc_self_mountinfo)
1218                         mount_enter_mounted(m, true);
1219                 else
1220                         mount_enter_dead(m, true);
1221
1222                 break;
1223
1224         case MOUNT_UNMOUNTING:
1225         case MOUNT_UNMOUNTING_SIGKILL:
1226         case MOUNT_UNMOUNTING_SIGTERM:
1227
1228                 if (success)
1229                         mount_enter_dead(m, true);
1230                 else if (m->from_proc_self_mountinfo)
1231                         mount_enter_mounted(m, false);
1232                 else
1233                         mount_enter_dead(m, false);
1234                 break;
1235
1236         default:
1237                 assert_not_reached("Uh, control process died at wrong time.");
1238         }
1239
1240         /* Notify clients about changed exit status */
1241         unit_add_to_dbus_queue(u);
1242 }
1243
1244 static void mount_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
1245         Mount *m = MOUNT(u);
1246
1247         assert(m);
1248         assert(elapsed == 1);
1249         assert(w == &m->timer_watch);
1250
1251         switch (m->state) {
1252
1253         case MOUNT_MOUNTING:
1254         case MOUNT_MOUNTING_DONE:
1255                 log_warning("%s mounting timed out. Stopping.", u->meta.id);
1256                 mount_enter_signal(m, MOUNT_MOUNTING_SIGTERM, false);
1257                 break;
1258
1259         case MOUNT_REMOUNTING:
1260                 log_warning("%s remounting timed out. Stopping.", u->meta.id);
1261                 m->reload_failure = true;
1262                 mount_enter_mounted(m, true);
1263                 break;
1264
1265         case MOUNT_UNMOUNTING:
1266                 log_warning("%s unmounting timed out. Stopping.", u->meta.id);
1267                 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGTERM, false);
1268                 break;
1269
1270         case MOUNT_MOUNTING_SIGTERM:
1271                 if (m->exec_context.send_sigkill) {
1272                         log_warning("%s mounting timed out. Killing.", u->meta.id);
1273                         mount_enter_signal(m, MOUNT_MOUNTING_SIGKILL, false);
1274                 } else {
1275                         log_warning("%s mounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1276
1277                         if (m->from_proc_self_mountinfo)
1278                                 mount_enter_mounted(m, false);
1279                         else
1280                                 mount_enter_dead(m, false);
1281                 }
1282                 break;
1283
1284         case MOUNT_REMOUNTING_SIGTERM:
1285                 if (m->exec_context.send_sigkill) {
1286                         log_warning("%s remounting timed out. Killing.", u->meta.id);
1287                         mount_enter_signal(m, MOUNT_REMOUNTING_SIGKILL, false);
1288                 } else {
1289                         log_warning("%s remounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1290
1291                         if (m->from_proc_self_mountinfo)
1292                                 mount_enter_mounted(m, false);
1293                         else
1294                                 mount_enter_dead(m, false);
1295                 }
1296                 break;
1297
1298         case MOUNT_UNMOUNTING_SIGTERM:
1299                 if (m->exec_context.send_sigkill) {
1300                         log_warning("%s unmounting timed out. Killing.", u->meta.id);
1301                         mount_enter_signal(m, MOUNT_UNMOUNTING_SIGKILL, false);
1302                 } else {
1303                         log_warning("%s unmounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1304
1305                         if (m->from_proc_self_mountinfo)
1306                                 mount_enter_mounted(m, false);
1307                         else
1308                                 mount_enter_dead(m, false);
1309                 }
1310                 break;
1311
1312         case MOUNT_MOUNTING_SIGKILL:
1313         case MOUNT_REMOUNTING_SIGKILL:
1314         case MOUNT_UNMOUNTING_SIGKILL:
1315                 log_warning("%s mount process still around after SIGKILL. Ignoring.", u->meta.id);
1316
1317                 if (m->from_proc_self_mountinfo)
1318                         mount_enter_mounted(m, false);
1319                 else
1320                         mount_enter_dead(m, false);
1321                 break;
1322
1323         default:
1324                 assert_not_reached("Timeout at wrong time.");
1325         }
1326 }
1327
1328 static int mount_add_one(
1329                 Manager *m,
1330                 const char *what,
1331                 const char *where,
1332                 const char *options,
1333                 const char *fstype,
1334                 int passno,
1335                 bool from_proc_self_mountinfo,
1336                 bool set_flags) {
1337         int r;
1338         Unit *u;
1339         bool delete;
1340         char *e, *w = NULL, *o = NULL, *f = NULL;
1341         MountParameters *p;
1342
1343         assert(m);
1344         assert(what);
1345         assert(where);
1346         assert(options);
1347         assert(fstype);
1348
1349         assert(!set_flags || from_proc_self_mountinfo);
1350
1351         /* Ignore API mount points. They should never be referenced in
1352          * dependencies ever. */
1353         if (mount_point_is_api(where) || mount_point_ignore(where))
1354                 return 0;
1355
1356         if (streq(fstype, "autofs"))
1357                 return 0;
1358
1359         /* probably some kind of swap, ignore */
1360         if (!is_path(where))
1361                 return 0;
1362
1363         if (!(e = unit_name_from_path(where, ".mount")))
1364                 return -ENOMEM;
1365
1366         if (!(u = manager_get_unit(m, e))) {
1367                 delete = true;
1368
1369                 if (!(u = unit_new(m))) {
1370                         free(e);
1371                         return -ENOMEM;
1372                 }
1373
1374                 r = unit_add_name(u, e);
1375                 free(e);
1376
1377                 if (r < 0)
1378                         goto fail;
1379
1380                 if (!(MOUNT(u)->where = strdup(where))) {
1381                         r = -ENOMEM;
1382                         goto fail;
1383                 }
1384
1385                 unit_add_to_load_queue(u);
1386         } else {
1387                 delete = false;
1388                 free(e);
1389         }
1390
1391         if (!(w = strdup(what)) ||
1392             !(o = strdup(options)) ||
1393             !(f = strdup(fstype))) {
1394                 r = -ENOMEM;
1395                 goto fail;
1396         }
1397
1398         if (from_proc_self_mountinfo) {
1399                 p = &MOUNT(u)->parameters_proc_self_mountinfo;
1400
1401                 if (set_flags) {
1402                         MOUNT(u)->is_mounted = true;
1403                         MOUNT(u)->just_mounted = !MOUNT(u)->from_proc_self_mountinfo;
1404                         MOUNT(u)->just_changed = !streq_ptr(p->options, o);
1405                 }
1406
1407                 MOUNT(u)->from_proc_self_mountinfo = true;
1408         } else {
1409                 p = &MOUNT(u)->parameters_etc_fstab;
1410                 MOUNT(u)->from_etc_fstab = true;
1411         }
1412
1413         free(p->what);
1414         p->what = w;
1415
1416         free(p->options);
1417         p->options = o;
1418
1419         free(p->fstype);
1420         p->fstype = f;
1421
1422         p->passno = passno;
1423
1424         unit_add_to_dbus_queue(u);
1425
1426         return 0;
1427
1428 fail:
1429         free(w);
1430         free(o);
1431         free(f);
1432
1433         if (delete && u)
1434                 unit_free(u);
1435
1436         return r;
1437 }
1438
1439 static int mount_find_pri(char *options) {
1440         char *end, *pri;
1441         unsigned long r;
1442
1443         if (!(pri = mount_test_option(options, "pri=")))
1444                 return 0;
1445
1446         pri += 4;
1447
1448         errno = 0;
1449         r = strtoul(pri, &end, 10);
1450
1451         if (errno != 0)
1452                 return -errno;
1453
1454         if (end == pri || (*end != ',' && *end != 0))
1455                 return -EINVAL;
1456
1457         return (int) r;
1458 }
1459
1460 static int mount_load_etc_fstab(Manager *m) {
1461         FILE *f;
1462         int r = 0;
1463         struct mntent* me;
1464
1465         assert(m);
1466
1467         errno = 0;
1468         if (!(f = setmntent("/etc/fstab", "r")))
1469                 return -errno;
1470
1471         while ((me = getmntent(f))) {
1472                 char *where, *what;
1473                 int k;
1474
1475                 if (!(what = fstab_node_to_udev_node(me->mnt_fsname))) {
1476                         r = -ENOMEM;
1477                         goto finish;
1478                 }
1479
1480                 if (!(where = strdup(me->mnt_dir))) {
1481                         free(what);
1482                         r = -ENOMEM;
1483                         goto finish;
1484                 }
1485
1486                 if (what[0] == '/')
1487                         path_kill_slashes(what);
1488
1489                 if (where[0] == '/')
1490                         path_kill_slashes(where);
1491
1492                 if (streq(me->mnt_type, "swap")) {
1493                         int pri;
1494
1495                         if ((pri = mount_find_pri(me->mnt_opts)) < 0)
1496                                 k = pri;
1497                         else
1498                                 k = swap_add_one(m,
1499                                                  what,
1500                                                  NULL,
1501                                                  pri,
1502                                                  !!mount_test_option(me->mnt_opts, MNTOPT_NOAUTO),
1503                                                  !!mount_test_option(me->mnt_opts, "nofail"),
1504                                                  !!mount_test_option(me->mnt_opts, "comment=systemd.swapon"),
1505                                                  false);
1506                 } else
1507                         k = mount_add_one(m, what, where, me->mnt_opts, me->mnt_type, me->mnt_passno, false, false);
1508
1509                 free(what);
1510                 free(where);
1511
1512                 if (r < 0)
1513                         r = k;
1514         }
1515
1516 finish:
1517
1518         endmntent(f);
1519         return r;
1520 }
1521
1522 static int mount_load_proc_self_mountinfo(Manager *m, bool set_flags) {
1523         int r = 0;
1524         unsigned i;
1525         char *device, *path, *options, *options2, *fstype, *d, *p, *o;
1526
1527         assert(m);
1528
1529         rewind(m->proc_self_mountinfo);
1530
1531         for (i = 1;; i++) {
1532                 int k;
1533
1534                 device = path = options = options2 = fstype = d = p = o = NULL;
1535
1536                 if ((k = fscanf(m->proc_self_mountinfo,
1537                                 "%*s "       /* (1) mount id */
1538                                 "%*s "       /* (2) parent id */
1539                                 "%*s "       /* (3) major:minor */
1540                                 "%*s "       /* (4) root */
1541                                 "%ms "       /* (5) mount point */
1542                                 "%ms"        /* (6) mount options */
1543                                 "%*[^-]"     /* (7) optional fields */
1544                                 "- "         /* (8) separator */
1545                                 "%ms "       /* (9) file system type */
1546                                 "%ms"        /* (10) mount source */
1547                                 "%ms"        /* (11) mount options 2 */
1548                                 "%*[^\n]",   /* some rubbish at the end */
1549                                 &path,
1550                                 &options,
1551                                 &fstype,
1552                                 &device,
1553                                 &options2)) != 5) {
1554
1555                         if (k == EOF)
1556                                 break;
1557
1558                         log_warning("Failed to parse /proc/self/mountinfo:%u.", i);
1559                         goto clean_up;
1560                 }
1561
1562                 if (asprintf(&o, "%s,%s", options, options2) < 0) {
1563                         r = -ENOMEM;
1564                         goto finish;
1565                 }
1566
1567                 if (!(d = cunescape(device)) ||
1568                     !(p = cunescape(path))) {
1569                         r = -ENOMEM;
1570                         goto finish;
1571                 }
1572
1573                 if ((k = mount_add_one(m, d, p, o, fstype, 0, true, set_flags)) < 0)
1574                         r = k;
1575
1576 clean_up:
1577                 free(device);
1578                 free(path);
1579                 free(options);
1580                 free(options2);
1581                 free(fstype);
1582                 free(d);
1583                 free(p);
1584                 free(o);
1585         }
1586
1587 finish:
1588         free(device);
1589         free(path);
1590         free(options);
1591         free(options2);
1592         free(fstype);
1593         free(d);
1594         free(p);
1595         free(o);
1596
1597         return r;
1598 }
1599
1600 static void mount_shutdown(Manager *m) {
1601         assert(m);
1602
1603         if (m->proc_self_mountinfo) {
1604                 fclose(m->proc_self_mountinfo);
1605                 m->proc_self_mountinfo = NULL;
1606         }
1607 }
1608
1609 static int mount_enumerate(Manager *m) {
1610         int r;
1611         struct epoll_event ev;
1612         assert(m);
1613
1614         if (!m->proc_self_mountinfo) {
1615                 if (!(m->proc_self_mountinfo = fopen("/proc/self/mountinfo", "re")))
1616                         return -errno;
1617
1618                 m->mount_watch.type = WATCH_MOUNT;
1619                 m->mount_watch.fd = fileno(m->proc_self_mountinfo);
1620
1621                 zero(ev);
1622                 ev.events = EPOLLPRI;
1623                 ev.data.ptr = &m->mount_watch;
1624
1625                 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->mount_watch.fd, &ev) < 0)
1626                         return -errno;
1627         }
1628
1629         if ((r = mount_load_etc_fstab(m)) < 0)
1630                 goto fail;
1631
1632         if ((r = mount_load_proc_self_mountinfo(m, false)) < 0)
1633                 goto fail;
1634
1635         return 0;
1636
1637 fail:
1638         mount_shutdown(m);
1639         return r;
1640 }
1641
1642 void mount_fd_event(Manager *m, int events) {
1643         Meta *meta;
1644         int r;
1645
1646         assert(m);
1647         assert(events & EPOLLPRI);
1648
1649         /* The manager calls this for every fd event happening on the
1650          * /proc/self/mountinfo file, which informs us about mounting
1651          * table changes */
1652
1653         if ((r = mount_load_proc_self_mountinfo(m, true)) < 0) {
1654                 log_error("Failed to reread /proc/self/mountinfo: %s", strerror(-r));
1655
1656                 /* Reset flags, just in case, for later calls */
1657                 LIST_FOREACH(units_per_type, meta, m->units_per_type[UNIT_MOUNT]) {
1658                         Mount *mount = (Mount*) meta;
1659
1660                         mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1661                 }
1662
1663                 return;
1664         }
1665
1666         manager_dispatch_load_queue(m);
1667
1668         LIST_FOREACH(units_per_type, meta, m->units_per_type[UNIT_MOUNT]) {
1669                 Mount *mount = (Mount*) meta;
1670
1671                 if (!mount->is_mounted) {
1672                         /* This has just been unmounted. */
1673
1674                         mount->from_proc_self_mountinfo = false;
1675
1676                         switch (mount->state) {
1677
1678                         case MOUNT_MOUNTED:
1679                                 mount_enter_dead(mount, true);
1680                                 break;
1681
1682                         default:
1683                                 mount_set_state(mount, mount->state);
1684                                 break;
1685
1686                         }
1687
1688                 } else if (mount->just_mounted || mount->just_changed) {
1689
1690                         /* New or changed mount entry */
1691
1692                         switch (mount->state) {
1693
1694                         case MOUNT_DEAD:
1695                         case MOUNT_FAILED:
1696                                 mount_enter_mounted(mount, true);
1697                                 break;
1698
1699                         case MOUNT_MOUNTING:
1700                                 mount_enter_mounting_done(mount);
1701                                 break;
1702
1703                         default:
1704                                 /* Nothing really changed, but let's
1705                                  * issue an notification call
1706                                  * nonetheless, in case somebody is
1707                                  * waiting for this. (e.g. file system
1708                                  * ro/rw remounts.) */
1709                                 mount_set_state(mount, mount->state);
1710                                 break;
1711                         }
1712                 }
1713
1714                 /* Reset the flags for later calls */
1715                 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1716         }
1717 }
1718
1719 static void mount_reset_failed(Unit *u) {
1720         Mount *m = MOUNT(u);
1721
1722         assert(m);
1723
1724         if (m->state == MOUNT_FAILED)
1725                 mount_set_state(m, MOUNT_DEAD);
1726
1727         m->failure = false;
1728 }
1729
1730 static int mount_kill(Unit *u, KillWho who, KillMode mode, int signo, DBusError *error) {
1731         Mount *m = MOUNT(u);
1732         int r = 0;
1733         Set *pid_set = NULL;
1734
1735         assert(m);
1736
1737         if (who == KILL_MAIN) {
1738                 dbus_set_error(error, BUS_ERROR_NO_SUCH_PROCESS, "Mount units have no main processes");
1739                 return -EINVAL;
1740         }
1741
1742         if (m->control_pid <= 0 && who == KILL_CONTROL) {
1743                 dbus_set_error(error, BUS_ERROR_NO_SUCH_PROCESS, "No control process to kill");
1744                 return -ENOENT;
1745         }
1746
1747         if (m->control_pid > 0)
1748                 if (kill(m->control_pid, signo) < 0)
1749                         r = -errno;
1750
1751         if (mode == KILL_CONTROL_GROUP) {
1752                 int q;
1753
1754                 if (!(pid_set = set_new(trivial_hash_func, trivial_compare_func)))
1755                         return -ENOMEM;
1756
1757                 /* Exclude the control pid from being killed via the cgroup */
1758                 if (m->control_pid > 0)
1759                         if ((q = set_put(pid_set, LONG_TO_PTR(m->control_pid))) < 0) {
1760                                 r = q;
1761                                 goto finish;
1762                         }
1763
1764                 if ((q = cgroup_bonding_kill_list(m->meta.cgroup_bondings, signo, false, pid_set)) < 0)
1765                         if (r != -EAGAIN && r != -ESRCH && r != -ENOENT)
1766                                 r = q;
1767         }
1768
1769 finish:
1770         if (pid_set)
1771                 set_free(pid_set);
1772
1773         return r;
1774 }
1775
1776 static const char* const mount_state_table[_MOUNT_STATE_MAX] = {
1777         [MOUNT_DEAD] = "dead",
1778         [MOUNT_MOUNTING] = "mounting",
1779         [MOUNT_MOUNTING_DONE] = "mounting-done",
1780         [MOUNT_MOUNTED] = "mounted",
1781         [MOUNT_REMOUNTING] = "remounting",
1782         [MOUNT_UNMOUNTING] = "unmounting",
1783         [MOUNT_MOUNTING_SIGTERM] = "mounting-sigterm",
1784         [MOUNT_MOUNTING_SIGKILL] = "mounting-sigkill",
1785         [MOUNT_REMOUNTING_SIGTERM] = "remounting-sigterm",
1786         [MOUNT_REMOUNTING_SIGKILL] = "remounting-sigkill",
1787         [MOUNT_UNMOUNTING_SIGTERM] = "unmounting-sigterm",
1788         [MOUNT_UNMOUNTING_SIGKILL] = "unmounting-sigkill",
1789         [MOUNT_FAILED] = "failed"
1790 };
1791
1792 DEFINE_STRING_TABLE_LOOKUP(mount_state, MountState);
1793
1794 static const char* const mount_exec_command_table[_MOUNT_EXEC_COMMAND_MAX] = {
1795         [MOUNT_EXEC_MOUNT] = "ExecMount",
1796         [MOUNT_EXEC_UNMOUNT] = "ExecUnmount",
1797         [MOUNT_EXEC_REMOUNT] = "ExecRemount",
1798 };
1799
1800 DEFINE_STRING_TABLE_LOOKUP(mount_exec_command, MountExecCommand);
1801
1802 const UnitVTable mount_vtable = {
1803         .suffix = ".mount",
1804
1805         .no_alias = true,
1806         .no_instances = true,
1807         .show_status = true,
1808
1809         .init = mount_init,
1810         .load = mount_load,
1811         .done = mount_done,
1812
1813         .coldplug = mount_coldplug,
1814
1815         .dump = mount_dump,
1816
1817         .start = mount_start,
1818         .stop = mount_stop,
1819         .reload = mount_reload,
1820
1821         .kill = mount_kill,
1822
1823         .serialize = mount_serialize,
1824         .deserialize_item = mount_deserialize_item,
1825
1826         .active_state = mount_active_state,
1827         .sub_state_to_string = mount_sub_state_to_string,
1828
1829         .check_gc = mount_check_gc,
1830
1831         .sigchld_event = mount_sigchld_event,
1832         .timer_event = mount_timer_event,
1833
1834         .reset_failed = mount_reset_failed,
1835
1836         .bus_interface = "org.freedesktop.systemd1.Mount",
1837         .bus_message_handler = bus_mount_message_handler,
1838         .bus_invalidating_properties =  bus_mount_invalidating_properties,
1839
1840         .enumerate = mount_enumerate,
1841         .shutdown = mount_shutdown
1842 };