chiark / gitweb /
automount: convert failure boolean to enum
[elogind.git] / src / mount.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <errno.h>
23 #include <stdio.h>
24 #include <mntent.h>
25 #include <sys/epoll.h>
26 #include <signal.h>
27
28 #include "unit.h"
29 #include "mount.h"
30 #include "load-fragment.h"
31 #include "load-dropin.h"
32 #include "log.h"
33 #include "strv.h"
34 #include "mount-setup.h"
35 #include "unit-name.h"
36 #include "dbus-mount.h"
37 #include "special.h"
38 #include "bus-errors.h"
39 #include "exit-status.h"
40 #include "def.h"
41
42 static const UnitActiveState state_translation_table[_MOUNT_STATE_MAX] = {
43         [MOUNT_DEAD] = UNIT_INACTIVE,
44         [MOUNT_MOUNTING] = UNIT_ACTIVATING,
45         [MOUNT_MOUNTING_DONE] = UNIT_ACTIVE,
46         [MOUNT_MOUNTED] = UNIT_ACTIVE,
47         [MOUNT_REMOUNTING] = UNIT_RELOADING,
48         [MOUNT_UNMOUNTING] = UNIT_DEACTIVATING,
49         [MOUNT_MOUNTING_SIGTERM] = UNIT_DEACTIVATING,
50         [MOUNT_MOUNTING_SIGKILL] = UNIT_DEACTIVATING,
51         [MOUNT_REMOUNTING_SIGTERM] = UNIT_RELOADING,
52         [MOUNT_REMOUNTING_SIGKILL] = UNIT_RELOADING,
53         [MOUNT_UNMOUNTING_SIGTERM] = UNIT_DEACTIVATING,
54         [MOUNT_UNMOUNTING_SIGKILL] = UNIT_DEACTIVATING,
55         [MOUNT_FAILED] = UNIT_FAILED
56 };
57
58 static void mount_init(Unit *u) {
59         Mount *m = MOUNT(u);
60
61         assert(u);
62         assert(u->load_state == UNIT_STUB);
63
64         m->timeout_usec = DEFAULT_TIMEOUT_USEC;
65         m->directory_mode = 0755;
66
67         exec_context_init(&m->exec_context);
68
69         /* The stdio/kmsg bridge socket is on /, in order to avoid a
70          * dep loop, don't use kmsg logging for -.mount */
71         if (!unit_has_name(u, "-.mount")) {
72                 m->exec_context.std_output = u->manager->default_std_output;
73                 m->exec_context.std_error = u->manager->default_std_error;
74         }
75
76         /* We need to make sure that /bin/mount is always called in
77          * the same process group as us, so that the autofs kernel
78          * side doesn't send us another mount request while we are
79          * already trying to comply its last one. */
80         m->exec_context.same_pgrp = true;
81
82         m->timer_watch.type = WATCH_INVALID;
83
84         m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
85
86         UNIT(m)->ignore_on_isolate = true;
87 }
88
89 static void mount_unwatch_control_pid(Mount *m) {
90         assert(m);
91
92         if (m->control_pid <= 0)
93                 return;
94
95         unit_unwatch_pid(UNIT(m), m->control_pid);
96         m->control_pid = 0;
97 }
98
99 static void mount_parameters_done(MountParameters *p) {
100         assert(p);
101
102         free(p->what);
103         free(p->options);
104         free(p->fstype);
105
106         p->what = p->options = p->fstype = NULL;
107 }
108
109 static void mount_done(Unit *u) {
110         Mount *m = MOUNT(u);
111
112         assert(m);
113
114         free(m->where);
115         m->where = NULL;
116
117         mount_parameters_done(&m->parameters_etc_fstab);
118         mount_parameters_done(&m->parameters_proc_self_mountinfo);
119         mount_parameters_done(&m->parameters_fragment);
120
121         exec_context_done(&m->exec_context);
122         exec_command_done_array(m->exec_command, _MOUNT_EXEC_COMMAND_MAX);
123         m->control_command = NULL;
124
125         mount_unwatch_control_pid(m);
126
127         unit_unwatch_timer(u, &m->timer_watch);
128 }
129
130 static MountParameters* get_mount_parameters_configured(Mount *m) {
131         assert(m);
132
133         if (m->from_fragment)
134                 return &m->parameters_fragment;
135         else if (m->from_etc_fstab)
136                 return &m->parameters_etc_fstab;
137
138         return NULL;
139 }
140
141 static MountParameters* get_mount_parameters(Mount *m) {
142         assert(m);
143
144         if (m->from_proc_self_mountinfo)
145                 return &m->parameters_proc_self_mountinfo;
146
147         return get_mount_parameters_configured(m);
148 }
149
150 static int mount_add_mount_links(Mount *m) {
151         Unit *other;
152         int r;
153         MountParameters *pm;
154
155         assert(m);
156
157         pm = get_mount_parameters_configured(m);
158
159         /* Adds in links to other mount points that might lie below or
160          * above us in the hierarchy */
161
162         LIST_FOREACH(units_by_type, other, UNIT(m)->manager->units_by_type[UNIT_MOUNT]) {
163                 Mount *n = MOUNT(other);
164                 MountParameters *pn;
165
166                 if (n == m)
167                         continue;
168
169                 if (UNIT(n)->load_state != UNIT_LOADED)
170                         continue;
171
172                 pn = get_mount_parameters_configured(n);
173
174                 if (path_startswith(m->where, n->where)) {
175
176                         if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
177                                 return r;
178
179                         if (pn)
180                                 if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
181                                         return r;
182
183                 } else if (path_startswith(n->where, m->where)) {
184
185                         if ((r = unit_add_dependency(UNIT(n), UNIT_AFTER, UNIT(m), true)) < 0)
186                                 return r;
187
188                         if (pm)
189                                 if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
190                                         return r;
191
192                 } else if (pm && path_startswith(pm->what, n->where)) {
193
194                         if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
195                                 return r;
196
197                         if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
198                                 return r;
199
200                 } else if (pn && path_startswith(pn->what, m->where)) {
201
202                         if ((r = unit_add_dependency(UNIT(n), UNIT_AFTER, UNIT(m), true)) < 0)
203                                 return r;
204
205                         if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
206                                 return r;
207                 }
208         }
209
210         return 0;
211 }
212
213 static int mount_add_swap_links(Mount *m) {
214         Unit *other;
215         int r;
216
217         assert(m);
218
219         LIST_FOREACH(units_by_type, other, UNIT(m)->manager->units_by_type[UNIT_SWAP])
220                 if ((r = swap_add_one_mount_link(SWAP(other), m)) < 0)
221                         return r;
222
223         return 0;
224 }
225
226 static int mount_add_path_links(Mount *m) {
227         Unit *other;
228         int r;
229
230         assert(m);
231
232         LIST_FOREACH(units_by_type, other, UNIT(m)->manager->units_by_type[UNIT_PATH])
233                 if ((r = path_add_one_mount_link(PATH(other), m)) < 0)
234                         return r;
235
236         return 0;
237 }
238
239 static int mount_add_automount_links(Mount *m) {
240         Unit *other;
241         int r;
242
243         assert(m);
244
245         LIST_FOREACH(units_by_type, other, UNIT(m)->manager->units_by_type[UNIT_AUTOMOUNT])
246                 if ((r = automount_add_one_mount_link(AUTOMOUNT(other), m)) < 0)
247                         return r;
248
249         return 0;
250 }
251
252 static int mount_add_socket_links(Mount *m) {
253         Unit *other;
254         int r;
255
256         assert(m);
257
258         LIST_FOREACH(units_by_type, other, UNIT(m)->manager->units_by_type[UNIT_SOCKET])
259                 if ((r = socket_add_one_mount_link(SOCKET(other), m)) < 0)
260                         return r;
261
262         return 0;
263 }
264
265 static char* mount_test_option(const char *haystack, const char *needle) {
266         struct mntent me;
267
268         assert(needle);
269
270         /* Like glibc's hasmntopt(), but works on a string, not a
271          * struct mntent */
272
273         if (!haystack)
274                 return false;
275
276         zero(me);
277         me.mnt_opts = (char*) haystack;
278
279         return hasmntopt(&me, needle);
280 }
281
282 static bool mount_is_network(MountParameters *p) {
283         assert(p);
284
285         if (mount_test_option(p->options, "_netdev"))
286                 return true;
287
288         if (p->fstype && fstype_is_network(p->fstype))
289                 return true;
290
291         return false;
292 }
293
294 static bool mount_is_bind(MountParameters *p) {
295         assert(p);
296
297         if (mount_test_option(p->options, "bind"))
298                 return true;
299
300         if (p->fstype && streq(p->fstype, "bind"))
301                 return true;
302
303         return false;
304 }
305
306 static bool needs_quota(MountParameters *p) {
307         assert(p);
308
309         if (mount_is_network(p))
310                 return false;
311
312         if (mount_is_bind(p))
313                 return false;
314
315         return mount_test_option(p->options, "usrquota") ||
316                 mount_test_option(p->options, "grpquota") ||
317                 mount_test_option(p->options, "quota") ||
318                 mount_test_option(p->options, "usrjquota") ||
319                 mount_test_option(p->options, "grpjquota");
320 }
321
322 static int mount_add_fstab_links(Mount *m) {
323         const char *target, *after = NULL, *after2 = NULL;
324         MountParameters *p;
325         Unit *tu;
326         int r;
327         bool noauto, nofail, handle, automount;
328
329         assert(m);
330
331         if (UNIT(m)->manager->running_as != MANAGER_SYSTEM)
332                 return 0;
333
334         if (!(p = get_mount_parameters_configured(m)))
335                 return 0;
336
337         if (p != &m->parameters_etc_fstab)
338                 return 0;
339
340         noauto = !!mount_test_option(p->options, "noauto");
341         nofail = !!mount_test_option(p->options, "nofail");
342         automount =
343                 mount_test_option(p->options, "comment=systemd.automount") ||
344                 mount_test_option(p->options, "x-systemd-automount");
345         handle =
346                 automount ||
347                 mount_test_option(p->options, "comment=systemd.mount") ||
348                 mount_test_option(p->options, "x-systemd-mount") ||
349                 UNIT(m)->manager->mount_auto;
350
351         if (mount_is_network(p)) {
352                 target = SPECIAL_REMOTE_FS_TARGET;
353                 after = SPECIAL_REMOTE_FS_PRE_TARGET;
354                 after2 = SPECIAL_NETWORK_TARGET;
355         } else {
356                 target = SPECIAL_LOCAL_FS_TARGET;
357                 after = SPECIAL_LOCAL_FS_PRE_TARGET;
358         }
359
360         if ((r = manager_load_unit(UNIT(m)->manager, target, NULL, NULL, &tu)) < 0)
361                 return r;
362
363         if (after)
364                 if ((r = unit_add_dependency_by_name(UNIT(m), UNIT_AFTER, after, NULL, true)) < 0)
365                         return r;
366
367         if (after2)
368                 if ((r = unit_add_dependency_by_name(UNIT(m), UNIT_AFTER, after2, NULL, true)) < 0)
369                         return r;
370
371         if (automount) {
372                 Unit *am;
373
374                 if ((r = unit_load_related_unit(UNIT(m), ".automount", &am)) < 0)
375                         return r;
376
377                 /* If auto is configured as well also pull in the
378                  * mount right-away, but don't rely on it. */
379                 if (!noauto) /* automount + auto */
380                         if ((r = unit_add_dependency(tu, UNIT_WANTS, UNIT(m), true)) < 0)
381                                 return r;
382
383                 /* Install automount unit */
384                 if (!nofail) /* automount + fail */
385                         return unit_add_two_dependencies(tu, UNIT_AFTER, UNIT_REQUIRES, am, true);
386                 else /* automount + nofail */
387                         return unit_add_two_dependencies(tu, UNIT_AFTER, UNIT_WANTS, am, true);
388
389         } else if (handle && !noauto) {
390
391                 /* Automatically add mount points that aren't natively
392                  * configured to local-fs.target */
393
394                 if (!nofail) /* auto + fail */
395                         return unit_add_two_dependencies(tu, UNIT_AFTER, UNIT_REQUIRES, UNIT(m), true);
396                 else /* auto + nofail */
397                         return unit_add_dependency(tu, UNIT_WANTS, UNIT(m), true);
398         }
399
400         return 0;
401 }
402
403 static int mount_add_device_links(Mount *m) {
404         MountParameters *p;
405         int r;
406
407         assert(m);
408
409         if (!(p = get_mount_parameters_configured(m)))
410                 return 0;
411
412         if (!p->what)
413                 return 0;
414
415         if (!mount_is_bind(p) &&
416             !path_equal(m->where, "/") &&
417             p == &m->parameters_etc_fstab) {
418                 bool nofail, noauto;
419
420                 noauto = !!mount_test_option(p->options, "noauto");
421                 nofail = !!mount_test_option(p->options, "nofail");
422
423                 if ((r = unit_add_node_link(UNIT(m), p->what,
424                                             !noauto && nofail &&
425                                             UNIT(m)->manager->running_as == MANAGER_SYSTEM)) < 0)
426                         return r;
427         }
428
429         if (p->passno > 0 &&
430             !mount_is_bind(p) &&
431             UNIT(m)->manager->running_as == MANAGER_SYSTEM &&
432             !path_equal(m->where, "/")) {
433                 char *name;
434                 Unit *fsck;
435                 /* Let's add in the fsck service */
436
437                 /* aka SPECIAL_FSCK_SERVICE */
438                 if (!(name = unit_name_from_path_instance("fsck", p->what, ".service")))
439                         return -ENOMEM;
440
441                 if ((r = manager_load_unit_prepare(UNIT(m)->manager, name, NULL, NULL, &fsck)) < 0) {
442                         log_warning("Failed to prepare unit %s: %s", name, strerror(-r));
443                         free(name);
444                         return r;
445                 }
446
447                 free(name);
448
449                 SERVICE(fsck)->fsck_passno = p->passno;
450
451                 if ((r = unit_add_two_dependencies(UNIT(m), UNIT_AFTER, UNIT_REQUIRES, fsck, true)) < 0)
452                         return r;
453         }
454
455         return 0;
456 }
457
458 static int mount_add_default_dependencies(Mount *m) {
459         int r;
460         MountParameters *p;
461
462         assert(m);
463
464         if (UNIT(m)->manager->running_as != MANAGER_SYSTEM)
465                 return 0;
466
467         p = get_mount_parameters_configured(m);
468         if (p && needs_quota(p)) {
469                 if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_WANTS, SPECIAL_QUOTACHECK_SERVICE, NULL, true)) < 0 ||
470                     (r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_WANTS, SPECIAL_QUOTAON_SERVICE, NULL, true)) < 0)
471                         return r;
472         }
473
474         if (!path_equal(m->where, "/"))
475                 if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_UMOUNT_TARGET, NULL, true)) < 0)
476                         return r;
477
478         return 0;
479 }
480
481 static int mount_fix_timeouts(Mount *m) {
482         MountParameters *p;
483         const char *timeout = NULL;
484         Unit *other;
485         Iterator i;
486         usec_t u;
487         char *t;
488         int r;
489
490         assert(m);
491
492         if (!(p = get_mount_parameters_configured(m)))
493                 return 0;
494
495         /* Allow configuration how long we wait for a device that
496          * backs a mount point to show up. This is useful to support
497          * endless device timeouts for devices that show up only after
498          * user input, like crypto devices. */
499
500         if ((timeout = mount_test_option(p->options, "comment=systemd.device-timeout")))
501                 timeout += 31;
502         else if ((timeout = mount_test_option(p->options, "x-systemd-device-timeout")))
503                 timeout += 25;
504         else
505                 return 0;
506
507         t = strndup(timeout, strcspn(timeout, ",;" WHITESPACE));
508         if (!t)
509                 return -ENOMEM;
510
511         r = parse_usec(t, &u);
512         free(t);
513
514         if (r < 0) {
515                 log_warning("Failed to parse timeout for %s, ignoring: %s", m->where, timeout);
516                 return r;
517         }
518
519         SET_FOREACH(other, UNIT(m)->dependencies[UNIT_AFTER], i) {
520                 if (other->type != UNIT_DEVICE)
521                         continue;
522
523                 other->job_timeout = u;
524         }
525
526         return 0;
527 }
528
529 static int mount_verify(Mount *m) {
530         bool b;
531         char *e;
532         assert(m);
533
534         if (UNIT(m)->load_state != UNIT_LOADED)
535                 return 0;
536
537         if (!m->from_etc_fstab && !m->from_fragment && !m->from_proc_self_mountinfo)
538                 return -ENOENT;
539
540         if (!(e = unit_name_from_path(m->where, ".mount")))
541                 return -ENOMEM;
542
543         b = unit_has_name(UNIT(m), e);
544         free(e);
545
546         if (!b) {
547                 log_error("%s's Where setting doesn't match unit name. Refusing.", UNIT(m)->id);
548                 return -EINVAL;
549         }
550
551         if (mount_point_is_api(m->where) || mount_point_ignore(m->where)) {
552                 log_error("Cannot create mount unit for API file system %s. Refusing.", m->where);
553                 return -EINVAL;
554         }
555
556         if (UNIT(m)->fragment_path && !m->parameters_fragment.what) {
557                 log_error("%s's What setting is missing. Refusing.", UNIT(m)->id);
558                 return -EBADMSG;
559         }
560
561         if (m->exec_context.pam_name && m->exec_context.kill_mode != KILL_CONTROL_GROUP) {
562                 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", UNIT(m)->id);
563                 return -EINVAL;
564         }
565
566         return 0;
567 }
568
569 static int mount_load(Unit *u) {
570         Mount *m = MOUNT(u);
571         int r;
572
573         assert(u);
574         assert(u->load_state == UNIT_STUB);
575
576         if ((r = unit_load_fragment_and_dropin_optional(u)) < 0)
577                 return r;
578
579         /* This is a new unit? Then let's add in some extras */
580         if (u->load_state == UNIT_LOADED) {
581                 if ((r = unit_add_exec_dependencies(u, &m->exec_context)) < 0)
582                         return r;
583
584                 if (UNIT(m)->fragment_path)
585                         m->from_fragment = true;
586                 else if (m->from_etc_fstab)
587                         /* We always add several default dependencies to fstab mounts,
588                          * but we do not want the implicit complementing of Wants= with After=
589                          * in the target unit that this mount unit will be hooked into. */
590                         UNIT(m)->default_dependencies = false;
591
592                 if (!m->where)
593                         if (!(m->where = unit_name_to_path(u->id)))
594                                 return -ENOMEM;
595
596                 path_kill_slashes(m->where);
597
598                 if (!UNIT(m)->description)
599                         if ((r = unit_set_description(u, m->where)) < 0)
600                                 return r;
601
602                 if ((r = mount_add_device_links(m)) < 0)
603                         return r;
604
605                 if ((r = mount_add_mount_links(m)) < 0)
606                         return r;
607
608                 if ((r = mount_add_socket_links(m)) < 0)
609                         return r;
610
611                 if ((r = mount_add_swap_links(m)) < 0)
612                         return r;
613
614                 if ((r = mount_add_path_links(m)) < 0)
615                         return r;
616
617                 if ((r = mount_add_automount_links(m)) < 0)
618                         return r;
619
620                 if ((r = mount_add_fstab_links(m)) < 0)
621                         return r;
622
623                 if (UNIT(m)->default_dependencies || m->from_etc_fstab)
624                         if ((r = mount_add_default_dependencies(m)) < 0)
625                                 return r;
626
627                 if ((r = unit_add_default_cgroups(u)) < 0)
628                         return r;
629
630                 mount_fix_timeouts(m);
631         }
632
633         return mount_verify(m);
634 }
635
636 static int mount_notify_automount(Mount *m, int status) {
637         Unit *p;
638         int r;
639         Iterator i;
640
641         assert(m);
642
643         SET_FOREACH(p, UNIT(m)->dependencies[UNIT_TRIGGERED_BY], i)
644                 if (p->type == UNIT_AUTOMOUNT) {
645                          r = automount_send_ready(AUTOMOUNT(p), status);
646                          if (r < 0)
647                                  return r;
648                 }
649
650         return 0;
651 }
652
653 static void mount_set_state(Mount *m, MountState state) {
654         MountState old_state;
655         assert(m);
656
657         old_state = m->state;
658         m->state = state;
659
660         if (state != MOUNT_MOUNTING &&
661             state != MOUNT_MOUNTING_DONE &&
662             state != MOUNT_REMOUNTING &&
663             state != MOUNT_UNMOUNTING &&
664             state != MOUNT_MOUNTING_SIGTERM &&
665             state != MOUNT_MOUNTING_SIGKILL &&
666             state != MOUNT_UNMOUNTING_SIGTERM &&
667             state != MOUNT_UNMOUNTING_SIGKILL &&
668             state != MOUNT_REMOUNTING_SIGTERM &&
669             state != MOUNT_REMOUNTING_SIGKILL) {
670                 unit_unwatch_timer(UNIT(m), &m->timer_watch);
671                 mount_unwatch_control_pid(m);
672                 m->control_command = NULL;
673                 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
674         }
675
676         if (state == MOUNT_MOUNTED ||
677             state == MOUNT_REMOUNTING)
678                 mount_notify_automount(m, 0);
679         else if (state == MOUNT_DEAD ||
680                  state == MOUNT_UNMOUNTING ||
681                  state == MOUNT_MOUNTING_SIGTERM ||
682                  state == MOUNT_MOUNTING_SIGKILL ||
683                  state == MOUNT_REMOUNTING_SIGTERM ||
684                  state == MOUNT_REMOUNTING_SIGKILL ||
685                  state == MOUNT_UNMOUNTING_SIGTERM ||
686                  state == MOUNT_UNMOUNTING_SIGKILL ||
687                  state == MOUNT_FAILED)
688                 mount_notify_automount(m, -ENODEV);
689
690         if (state != old_state)
691                 log_debug("%s changed %s -> %s",
692                           UNIT(m)->id,
693                           mount_state_to_string(old_state),
694                           mount_state_to_string(state));
695
696         unit_notify(UNIT(m), state_translation_table[old_state], state_translation_table[state], m->reload_result == MOUNT_SUCCESS);
697         m->reload_result = MOUNT_SUCCESS;
698 }
699
700 static int mount_coldplug(Unit *u) {
701         Mount *m = MOUNT(u);
702         MountState new_state = MOUNT_DEAD;
703         int r;
704
705         assert(m);
706         assert(m->state == MOUNT_DEAD);
707
708         if (m->deserialized_state != m->state)
709                 new_state = m->deserialized_state;
710         else if (m->from_proc_self_mountinfo)
711                 new_state = MOUNT_MOUNTED;
712
713         if (new_state != m->state) {
714
715                 if (new_state == MOUNT_MOUNTING ||
716                     new_state == MOUNT_MOUNTING_DONE ||
717                     new_state == MOUNT_REMOUNTING ||
718                     new_state == MOUNT_UNMOUNTING ||
719                     new_state == MOUNT_MOUNTING_SIGTERM ||
720                     new_state == MOUNT_MOUNTING_SIGKILL ||
721                     new_state == MOUNT_UNMOUNTING_SIGTERM ||
722                     new_state == MOUNT_UNMOUNTING_SIGKILL ||
723                     new_state == MOUNT_REMOUNTING_SIGTERM ||
724                     new_state == MOUNT_REMOUNTING_SIGKILL) {
725
726                         if (m->control_pid <= 0)
727                                 return -EBADMSG;
728
729                         if ((r = unit_watch_pid(UNIT(m), m->control_pid)) < 0)
730                                 return r;
731
732                         if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
733                                 return r;
734                 }
735
736                 mount_set_state(m, new_state);
737         }
738
739         return 0;
740 }
741
742 static void mount_dump(Unit *u, FILE *f, const char *prefix) {
743         Mount *m = MOUNT(u);
744         MountParameters *p;
745
746         assert(m);
747         assert(f);
748
749         p = get_mount_parameters(m);
750
751         fprintf(f,
752                 "%sMount State: %s\n"
753                 "%sResult: %s\n"
754                 "%sWhere: %s\n"
755                 "%sWhat: %s\n"
756                 "%sFile System Type: %s\n"
757                 "%sOptions: %s\n"
758                 "%sFrom /etc/fstab: %s\n"
759                 "%sFrom /proc/self/mountinfo: %s\n"
760                 "%sFrom fragment: %s\n"
761                 "%sDirectoryMode: %04o\n",
762                 prefix, mount_state_to_string(m->state),
763                 prefix, mount_result_to_string(m->result),
764                 prefix, m->where,
765                 prefix, strna(p->what),
766                 prefix, strna(p->fstype),
767                 prefix, strna(p->options),
768                 prefix, yes_no(m->from_etc_fstab),
769                 prefix, yes_no(m->from_proc_self_mountinfo),
770                 prefix, yes_no(m->from_fragment),
771                 prefix, m->directory_mode);
772
773         if (m->control_pid > 0)
774                 fprintf(f,
775                         "%sControl PID: %lu\n",
776                         prefix, (unsigned long) m->control_pid);
777
778         exec_context_dump(&m->exec_context, f, prefix);
779 }
780
781 static int mount_spawn(Mount *m, ExecCommand *c, pid_t *_pid) {
782         pid_t pid;
783         int r;
784
785         assert(m);
786         assert(c);
787         assert(_pid);
788
789         if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
790                 goto fail;
791
792         if ((r = exec_spawn(c,
793                             NULL,
794                             &m->exec_context,
795                             NULL, 0,
796                             UNIT(m)->manager->environment,
797                             true,
798                             true,
799                             true,
800                             UNIT(m)->manager->confirm_spawn,
801                             UNIT(m)->cgroup_bondings,
802                             UNIT(m)->cgroup_attributes,
803                             &pid)) < 0)
804                 goto fail;
805
806         if ((r = unit_watch_pid(UNIT(m), pid)) < 0)
807                 /* FIXME: we need to do something here */
808                 goto fail;
809
810         *_pid = pid;
811
812         return 0;
813
814 fail:
815         unit_unwatch_timer(UNIT(m), &m->timer_watch);
816
817         return r;
818 }
819
820 static void mount_enter_dead(Mount *m, MountResult f) {
821         assert(m);
822
823         if (f != MOUNT_SUCCESS)
824                 m->result = f;
825
826         mount_set_state(m, m->result != MOUNT_SUCCESS ? MOUNT_FAILED : MOUNT_DEAD);
827 }
828
829 static void mount_enter_mounted(Mount *m, MountResult f) {
830         assert(m);
831
832         if (f != MOUNT_SUCCESS)
833                 m->result = f;
834
835         mount_set_state(m, MOUNT_MOUNTED);
836 }
837
838 static void mount_enter_signal(Mount *m, MountState state, MountResult f) {
839         int r;
840         Set *pid_set = NULL;
841         bool wait_for_exit = false;
842
843         assert(m);
844
845         if (f != MOUNT_SUCCESS)
846                 m->result = f;
847
848         if (m->exec_context.kill_mode != KILL_NONE) {
849                 int sig = (state == MOUNT_MOUNTING_SIGTERM ||
850                            state == MOUNT_UNMOUNTING_SIGTERM ||
851                            state == MOUNT_REMOUNTING_SIGTERM) ? m->exec_context.kill_signal : SIGKILL;
852
853                 if (m->control_pid > 0) {
854                         if (kill_and_sigcont(m->control_pid, sig) < 0 && errno != ESRCH)
855
856                                 log_warning("Failed to kill control process %li: %m", (long) m->control_pid);
857                         else
858                                 wait_for_exit = true;
859                 }
860
861                 if (m->exec_context.kill_mode == KILL_CONTROL_GROUP) {
862
863                         if (!(pid_set = set_new(trivial_hash_func, trivial_compare_func))) {
864                                 r = -ENOMEM;
865                                 goto fail;
866                         }
867
868                         /* Exclude the control pid from being killed via the cgroup */
869                         if (m->control_pid > 0)
870                                 if ((r = set_put(pid_set, LONG_TO_PTR(m->control_pid))) < 0)
871                                         goto fail;
872
873                         if ((r = cgroup_bonding_kill_list(UNIT(m)->cgroup_bondings, sig, true, pid_set)) < 0) {
874                                 if (r != -EAGAIN && r != -ESRCH && r != -ENOENT)
875                                         log_warning("Failed to kill control group: %s", strerror(-r));
876                         } else if (r > 0)
877                                 wait_for_exit = true;
878
879                         set_free(pid_set);
880                         pid_set = NULL;
881                 }
882         }
883
884         if (wait_for_exit) {
885                 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
886                         goto fail;
887
888                 mount_set_state(m, state);
889         } else if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
890                 mount_enter_mounted(m, MOUNT_SUCCESS);
891         else
892                 mount_enter_dead(m, MOUNT_SUCCESS);
893
894         return;
895
896 fail:
897         log_warning("%s failed to kill processes: %s", UNIT(m)->id, strerror(-r));
898
899         if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
900                 mount_enter_mounted(m, MOUNT_FAILURE_RESOURCES);
901         else
902                 mount_enter_dead(m, MOUNT_FAILURE_RESOURCES);
903
904         if (pid_set)
905                 set_free(pid_set);
906 }
907
908 static void mount_enter_unmounting(Mount *m) {
909         int r;
910
911         assert(m);
912
913         m->control_command_id = MOUNT_EXEC_UNMOUNT;
914         m->control_command = m->exec_command + MOUNT_EXEC_UNMOUNT;
915
916         if ((r = exec_command_set(
917                              m->control_command,
918                              "/bin/umount",
919                              m->where,
920                              NULL)) < 0)
921                 goto fail;
922
923         mount_unwatch_control_pid(m);
924
925         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
926                 goto fail;
927
928         mount_set_state(m, MOUNT_UNMOUNTING);
929
930         return;
931
932 fail:
933         log_warning("%s failed to run 'umount' task: %s", UNIT(m)->id, strerror(-r));
934         mount_enter_mounted(m, MOUNT_FAILURE_RESOURCES);
935 }
936
937 static void mount_enter_mounting(Mount *m) {
938         int r;
939         MountParameters *p;
940
941         assert(m);
942
943         m->control_command_id = MOUNT_EXEC_MOUNT;
944         m->control_command = m->exec_command + MOUNT_EXEC_MOUNT;
945
946         mkdir_p(m->where, m->directory_mode);
947
948         /* Create the source directory for bind-mounts if needed */
949         p = get_mount_parameters_configured(m);
950         if (p && mount_is_bind(p))
951                 mkdir_p(p->what, m->directory_mode);
952
953         if (m->from_fragment)
954                 r = exec_command_set(
955                                 m->control_command,
956                                 "/bin/mount",
957                                 m->parameters_fragment.what,
958                                 m->where,
959                                 "-t", m->parameters_fragment.fstype ? m->parameters_fragment.fstype : "auto",
960                                 m->parameters_fragment.options ? "-o" : NULL, m->parameters_fragment.options,
961                                 NULL);
962         else if (m->from_etc_fstab)
963                 r = exec_command_set(
964                                 m->control_command,
965                                 "/bin/mount",
966                                 m->where,
967                                 NULL);
968         else
969                 r = -ENOENT;
970
971         if (r < 0)
972                 goto fail;
973
974         mount_unwatch_control_pid(m);
975
976         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
977                 goto fail;
978
979         mount_set_state(m, MOUNT_MOUNTING);
980
981         return;
982
983 fail:
984         log_warning("%s failed to run 'mount' task: %s", UNIT(m)->id, strerror(-r));
985         mount_enter_dead(m, MOUNT_FAILURE_RESOURCES);
986 }
987
988 static void mount_enter_mounting_done(Mount *m) {
989         assert(m);
990
991         mount_set_state(m, MOUNT_MOUNTING_DONE);
992 }
993
994 static void mount_enter_remounting(Mount *m) {
995         int r;
996
997         assert(m);
998
999         m->control_command_id = MOUNT_EXEC_REMOUNT;
1000         m->control_command = m->exec_command + MOUNT_EXEC_REMOUNT;
1001
1002         if (m->from_fragment) {
1003                 char *buf = NULL;
1004                 const char *o;
1005
1006                 if (m->parameters_fragment.options) {
1007                         if (!(buf = strappend("remount,", m->parameters_fragment.options))) {
1008                                 r = -ENOMEM;
1009                                 goto fail;
1010                         }
1011
1012                         o = buf;
1013                 } else
1014                         o = "remount";
1015
1016                 r = exec_command_set(
1017                                 m->control_command,
1018                                 "/bin/mount",
1019                                 m->parameters_fragment.what,
1020                                 m->where,
1021                                 "-t", m->parameters_fragment.fstype ? m->parameters_fragment.fstype : "auto",
1022                                 "-o", o,
1023                                 NULL);
1024
1025                 free(buf);
1026         } else if (m->from_etc_fstab)
1027                 r = exec_command_set(
1028                                 m->control_command,
1029                                 "/bin/mount",
1030                                 m->where,
1031                                 "-o", "remount",
1032                                 NULL);
1033         else
1034                 r = -ENOENT;
1035
1036         if (r < 0)
1037                 goto fail;
1038
1039         mount_unwatch_control_pid(m);
1040
1041         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
1042                 goto fail;
1043
1044         mount_set_state(m, MOUNT_REMOUNTING);
1045
1046         return;
1047
1048 fail:
1049         log_warning("%s failed to run 'remount' task: %s", UNIT(m)->id, strerror(-r));
1050         m->reload_result = MOUNT_FAILURE_RESOURCES;
1051         mount_enter_mounted(m, MOUNT_SUCCESS);
1052 }
1053
1054 static int mount_start(Unit *u) {
1055         Mount *m = MOUNT(u);
1056
1057         assert(m);
1058
1059         /* We cannot fulfill this request right now, try again later
1060          * please! */
1061         if (m->state == MOUNT_UNMOUNTING ||
1062             m->state == MOUNT_UNMOUNTING_SIGTERM ||
1063             m->state == MOUNT_UNMOUNTING_SIGKILL ||
1064             m->state == MOUNT_MOUNTING_SIGTERM ||
1065             m->state == MOUNT_MOUNTING_SIGKILL)
1066                 return -EAGAIN;
1067
1068         /* Already on it! */
1069         if (m->state == MOUNT_MOUNTING)
1070                 return 0;
1071
1072         assert(m->state == MOUNT_DEAD || m->state == MOUNT_FAILED);
1073
1074         m->result = MOUNT_SUCCESS;
1075         m->reload_result = MOUNT_SUCCESS;
1076
1077         mount_enter_mounting(m);
1078         return 0;
1079 }
1080
1081 static int mount_stop(Unit *u) {
1082         Mount *m = MOUNT(u);
1083
1084         assert(m);
1085
1086         /* Already on it */
1087         if (m->state == MOUNT_UNMOUNTING ||
1088             m->state == MOUNT_UNMOUNTING_SIGKILL ||
1089             m->state == MOUNT_UNMOUNTING_SIGTERM ||
1090             m->state == MOUNT_MOUNTING_SIGTERM ||
1091             m->state == MOUNT_MOUNTING_SIGKILL)
1092                 return 0;
1093
1094         assert(m->state == MOUNT_MOUNTING ||
1095                m->state == MOUNT_MOUNTING_DONE ||
1096                m->state == MOUNT_MOUNTED ||
1097                m->state == MOUNT_REMOUNTING ||
1098                m->state == MOUNT_REMOUNTING_SIGTERM ||
1099                m->state == MOUNT_REMOUNTING_SIGKILL);
1100
1101         mount_enter_unmounting(m);
1102         return 0;
1103 }
1104
1105 static int mount_reload(Unit *u) {
1106         Mount *m = MOUNT(u);
1107
1108         assert(m);
1109
1110         if (m->state == MOUNT_MOUNTING_DONE)
1111                 return -EAGAIN;
1112
1113         assert(m->state == MOUNT_MOUNTED);
1114
1115         mount_enter_remounting(m);
1116         return 0;
1117 }
1118
1119 static int mount_serialize(Unit *u, FILE *f, FDSet *fds) {
1120         Mount *m = MOUNT(u);
1121
1122         assert(m);
1123         assert(f);
1124         assert(fds);
1125
1126         unit_serialize_item(u, f, "state", mount_state_to_string(m->state));
1127         unit_serialize_item(u, f, "result", mount_result_to_string(m->result));
1128         unit_serialize_item(u, f, "reload-result", mount_result_to_string(m->reload_result));
1129
1130         if (m->control_pid > 0)
1131                 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) m->control_pid);
1132
1133         if (m->control_command_id >= 0)
1134                 unit_serialize_item(u, f, "control-command", mount_exec_command_to_string(m->control_command_id));
1135
1136         return 0;
1137 }
1138
1139 static int mount_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1140         Mount *m = MOUNT(u);
1141
1142         assert(u);
1143         assert(key);
1144         assert(value);
1145         assert(fds);
1146
1147         if (streq(key, "state")) {
1148                 MountState state;
1149
1150                 if ((state = mount_state_from_string(value)) < 0)
1151                         log_debug("Failed to parse state value %s", value);
1152                 else
1153                         m->deserialized_state = state;
1154         } else if (streq(key, "result")) {
1155                 MountResult f;
1156
1157                 f = mount_result_from_string(value);
1158                 if (f < 0)
1159                         log_debug("Failed to parse result value %s", value);
1160                 else if (f != MOUNT_SUCCESS)
1161                         m->result = f;
1162
1163         } else if (streq(key, "reload-result")) {
1164                 MountResult f;
1165
1166                 f = mount_result_from_string(value);
1167                 if (f < 0)
1168                         log_debug("Failed to parse reload result value %s", value);
1169                 else if (f != MOUNT_SUCCESS)
1170                         m->reload_result = f;
1171
1172         } else if (streq(key, "control-pid")) {
1173                 pid_t pid;
1174
1175                 if (parse_pid(value, &pid) < 0)
1176                         log_debug("Failed to parse control-pid value %s", value);
1177                 else
1178                         m->control_pid = pid;
1179         } else if (streq(key, "control-command")) {
1180                 MountExecCommand id;
1181
1182                 if ((id = mount_exec_command_from_string(value)) < 0)
1183                         log_debug("Failed to parse exec-command value %s", value);
1184                 else {
1185                         m->control_command_id = id;
1186                         m->control_command = m->exec_command + id;
1187                 }
1188
1189         } else
1190                 log_debug("Unknown serialization key '%s'", key);
1191
1192         return 0;
1193 }
1194
1195 static UnitActiveState mount_active_state(Unit *u) {
1196         assert(u);
1197
1198         return state_translation_table[MOUNT(u)->state];
1199 }
1200
1201 static const char *mount_sub_state_to_string(Unit *u) {
1202         assert(u);
1203
1204         return mount_state_to_string(MOUNT(u)->state);
1205 }
1206
1207 static bool mount_check_gc(Unit *u) {
1208         Mount *m = MOUNT(u);
1209
1210         assert(m);
1211
1212         return m->from_etc_fstab || m->from_proc_self_mountinfo;
1213 }
1214
1215 static void mount_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1216         Mount *m = MOUNT(u);
1217         MountResult f;
1218
1219         assert(m);
1220         assert(pid >= 0);
1221
1222         if (pid != m->control_pid)
1223                 return;
1224
1225         m->control_pid = 0;
1226
1227         if (is_clean_exit(code, status))
1228                 f = MOUNT_SUCCESS;
1229         else if (code == CLD_EXITED)
1230                 f = MOUNT_FAILURE_EXIT_CODE;
1231         else if (code == CLD_KILLED)
1232                 f = MOUNT_FAILURE_SIGNAL;
1233         else if (code == CLD_DUMPED)
1234                 f = MOUNT_FAILURE_CORE_DUMP;
1235         else
1236                 assert_not_reached("Unknown code");
1237
1238         if (f != MOUNT_SUCCESS)
1239                 m->result = f;
1240
1241         if (m->control_command) {
1242                 exec_status_exit(&m->control_command->exec_status, &m->exec_context, pid, code, status);
1243
1244                 m->control_command = NULL;
1245                 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
1246         }
1247
1248         log_full(f == MOUNT_SUCCESS ? LOG_DEBUG : LOG_NOTICE,
1249                  "%s mount process exited, code=%s status=%i", u->id, sigchld_code_to_string(code), status);
1250
1251         /* Note that mount(8) returning and the kernel sending us a
1252          * mount table change event might happen out-of-order. If an
1253          * operation succeed we assume the kernel will follow soon too
1254          * and already change into the resulting state.  If it fails
1255          * we check if the kernel still knows about the mount. and
1256          * change state accordingly. */
1257
1258         switch (m->state) {
1259
1260         case MOUNT_MOUNTING:
1261         case MOUNT_MOUNTING_DONE:
1262         case MOUNT_MOUNTING_SIGKILL:
1263         case MOUNT_MOUNTING_SIGTERM:
1264
1265                 if (f == MOUNT_SUCCESS)
1266                         mount_enter_mounted(m, f);
1267                 else if (m->from_proc_self_mountinfo)
1268                         mount_enter_mounted(m, f);
1269                 else
1270                         mount_enter_dead(m, f);
1271                 break;
1272
1273         case MOUNT_REMOUNTING:
1274         case MOUNT_REMOUNTING_SIGKILL:
1275         case MOUNT_REMOUNTING_SIGTERM:
1276
1277                 m->reload_result = f;
1278                 if (m->from_proc_self_mountinfo)
1279                         mount_enter_mounted(m, MOUNT_SUCCESS);
1280                 else
1281                         mount_enter_dead(m, MOUNT_SUCCESS);
1282
1283                 break;
1284
1285         case MOUNT_UNMOUNTING:
1286         case MOUNT_UNMOUNTING_SIGKILL:
1287         case MOUNT_UNMOUNTING_SIGTERM:
1288
1289                 if (f == MOUNT_SUCCESS)
1290                         mount_enter_dead(m, f);
1291                 else if (m->from_proc_self_mountinfo)
1292                         mount_enter_mounted(m, f);
1293                 else
1294                         mount_enter_dead(m, f);
1295                 break;
1296
1297         default:
1298                 assert_not_reached("Uh, control process died at wrong time.");
1299         }
1300
1301         /* Notify clients about changed exit status */
1302         unit_add_to_dbus_queue(u);
1303 }
1304
1305 static void mount_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
1306         Mount *m = MOUNT(u);
1307
1308         assert(m);
1309         assert(elapsed == 1);
1310         assert(w == &m->timer_watch);
1311
1312         switch (m->state) {
1313
1314         case MOUNT_MOUNTING:
1315         case MOUNT_MOUNTING_DONE:
1316                 log_warning("%s mounting timed out. Stopping.", u->id);
1317                 mount_enter_signal(m, MOUNT_MOUNTING_SIGTERM, MOUNT_FAILURE_TIMEOUT);
1318                 break;
1319
1320         case MOUNT_REMOUNTING:
1321                 log_warning("%s remounting timed out. Stopping.", u->id);
1322                 m->reload_result = MOUNT_FAILURE_TIMEOUT;
1323                 mount_enter_mounted(m, MOUNT_SUCCESS);
1324                 break;
1325
1326         case MOUNT_UNMOUNTING:
1327                 log_warning("%s unmounting timed out. Stopping.", u->id);
1328                 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGTERM, MOUNT_FAILURE_TIMEOUT);
1329                 break;
1330
1331         case MOUNT_MOUNTING_SIGTERM:
1332                 if (m->exec_context.send_sigkill) {
1333                         log_warning("%s mounting timed out. Killing.", u->id);
1334                         mount_enter_signal(m, MOUNT_MOUNTING_SIGKILL, MOUNT_FAILURE_TIMEOUT);
1335                 } else {
1336                         log_warning("%s mounting timed out. Skipping SIGKILL. Ignoring.", u->id);
1337
1338                         if (m->from_proc_self_mountinfo)
1339                                 mount_enter_mounted(m, MOUNT_FAILURE_TIMEOUT);
1340                         else
1341                                 mount_enter_dead(m, MOUNT_FAILURE_TIMEOUT);
1342                 }
1343                 break;
1344
1345         case MOUNT_REMOUNTING_SIGTERM:
1346                 if (m->exec_context.send_sigkill) {
1347                         log_warning("%s remounting timed out. Killing.", u->id);
1348                         mount_enter_signal(m, MOUNT_REMOUNTING_SIGKILL, MOUNT_FAILURE_TIMEOUT);
1349                 } else {
1350                         log_warning("%s remounting timed out. Skipping SIGKILL. Ignoring.", u->id);
1351
1352                         if (m->from_proc_self_mountinfo)
1353                                 mount_enter_mounted(m, MOUNT_FAILURE_TIMEOUT);
1354                         else
1355                                 mount_enter_dead(m, MOUNT_FAILURE_TIMEOUT);
1356                 }
1357                 break;
1358
1359         case MOUNT_UNMOUNTING_SIGTERM:
1360                 if (m->exec_context.send_sigkill) {
1361                         log_warning("%s unmounting timed out. Killing.", u->id);
1362                         mount_enter_signal(m, MOUNT_UNMOUNTING_SIGKILL, MOUNT_FAILURE_TIMEOUT);
1363                 } else {
1364                         log_warning("%s unmounting timed out. Skipping SIGKILL. Ignoring.", u->id);
1365
1366                         if (m->from_proc_self_mountinfo)
1367                                 mount_enter_mounted(m, MOUNT_FAILURE_TIMEOUT);
1368                         else
1369                                 mount_enter_dead(m, MOUNT_FAILURE_TIMEOUT);
1370                 }
1371                 break;
1372
1373         case MOUNT_MOUNTING_SIGKILL:
1374         case MOUNT_REMOUNTING_SIGKILL:
1375         case MOUNT_UNMOUNTING_SIGKILL:
1376                 log_warning("%s mount process still around after SIGKILL. Ignoring.", u->id);
1377
1378                 if (m->from_proc_self_mountinfo)
1379                         mount_enter_mounted(m, MOUNT_FAILURE_TIMEOUT);
1380                 else
1381                         mount_enter_dead(m, MOUNT_FAILURE_TIMEOUT);
1382                 break;
1383
1384         default:
1385                 assert_not_reached("Timeout at wrong time.");
1386         }
1387 }
1388
1389 static int mount_add_one(
1390                 Manager *m,
1391                 const char *what,
1392                 const char *where,
1393                 const char *options,
1394                 const char *fstype,
1395                 int passno,
1396                 bool from_proc_self_mountinfo,
1397                 bool set_flags) {
1398         int r;
1399         Unit *u;
1400         bool delete;
1401         char *e, *w = NULL, *o = NULL, *f = NULL;
1402         MountParameters *p;
1403
1404         assert(m);
1405         assert(what);
1406         assert(where);
1407         assert(options);
1408         assert(fstype);
1409
1410         assert(!set_flags || from_proc_self_mountinfo);
1411
1412         /* Ignore API mount points. They should never be referenced in
1413          * dependencies ever. */
1414         if (mount_point_is_api(where) || mount_point_ignore(where))
1415                 return 0;
1416
1417         if (streq(fstype, "autofs"))
1418                 return 0;
1419
1420         /* probably some kind of swap, ignore */
1421         if (!is_path(where))
1422                 return 0;
1423
1424         e = unit_name_from_path(where, ".mount");
1425         if (!e)
1426                 return -ENOMEM;
1427
1428         u = manager_get_unit(m, e);
1429         if (!u) {
1430                 delete = true;
1431
1432                 u = unit_new(m, sizeof(Mount));
1433                 if (!u) {
1434                         free(e);
1435                         return -ENOMEM;
1436                 }
1437
1438                 r = unit_add_name(u, e);
1439                 free(e);
1440
1441                 if (r < 0)
1442                         goto fail;
1443
1444                 MOUNT(u)->where = strdup(where);
1445                 if (!MOUNT(u)->where) {
1446                         r = -ENOMEM;
1447                         goto fail;
1448                 }
1449
1450                 unit_add_to_load_queue(u);
1451         } else {
1452                 delete = false;
1453                 free(e);
1454         }
1455
1456         if (!(w = strdup(what)) ||
1457             !(o = strdup(options)) ||
1458             !(f = strdup(fstype))) {
1459                 r = -ENOMEM;
1460                 goto fail;
1461         }
1462
1463         if (from_proc_self_mountinfo) {
1464                 p = &MOUNT(u)->parameters_proc_self_mountinfo;
1465
1466                 if (set_flags) {
1467                         MOUNT(u)->is_mounted = true;
1468                         MOUNT(u)->just_mounted = !MOUNT(u)->from_proc_self_mountinfo;
1469                         MOUNT(u)->just_changed = !streq_ptr(p->options, o);
1470                 }
1471
1472                 MOUNT(u)->from_proc_self_mountinfo = true;
1473         } else {
1474                 p = &MOUNT(u)->parameters_etc_fstab;
1475                 MOUNT(u)->from_etc_fstab = true;
1476         }
1477
1478         free(p->what);
1479         p->what = w;
1480
1481         free(p->options);
1482         p->options = o;
1483
1484         free(p->fstype);
1485         p->fstype = f;
1486
1487         p->passno = passno;
1488
1489         unit_add_to_dbus_queue(u);
1490
1491         return 0;
1492
1493 fail:
1494         free(w);
1495         free(o);
1496         free(f);
1497
1498         if (delete && u)
1499                 unit_free(u);
1500
1501         return r;
1502 }
1503
1504 static int mount_find_pri(char *options) {
1505         char *end, *pri;
1506         unsigned long r;
1507
1508         if (!(pri = mount_test_option(options, "pri")))
1509                 return 0;
1510
1511         pri += 4;
1512
1513         errno = 0;
1514         r = strtoul(pri, &end, 10);
1515
1516         if (errno != 0)
1517                 return -errno;
1518
1519         if (end == pri || (*end != ',' && *end != 0))
1520                 return -EINVAL;
1521
1522         return (int) r;
1523 }
1524
1525 static int mount_load_etc_fstab(Manager *m) {
1526         FILE *f;
1527         int r = 0;
1528         struct mntent* me;
1529
1530         assert(m);
1531
1532         errno = 0;
1533         if (!(f = setmntent("/etc/fstab", "r")))
1534                 return -errno;
1535
1536         while ((me = getmntent(f))) {
1537                 char *where, *what;
1538                 int k;
1539
1540                 if (!(what = fstab_node_to_udev_node(me->mnt_fsname))) {
1541                         r = -ENOMEM;
1542                         goto finish;
1543                 }
1544
1545                 if (!(where = strdup(me->mnt_dir))) {
1546                         free(what);
1547                         r = -ENOMEM;
1548                         goto finish;
1549                 }
1550
1551                 if (what[0] == '/')
1552                         path_kill_slashes(what);
1553
1554                 if (where[0] == '/')
1555                         path_kill_slashes(where);
1556
1557                 if (streq(me->mnt_type, "swap")) {
1558                         int pri;
1559
1560                         if ((pri = mount_find_pri(me->mnt_opts)) < 0)
1561                                 k = pri;
1562                         else
1563                                 k = swap_add_one(m,
1564                                                  what,
1565                                                  NULL,
1566                                                  pri,
1567                                                  !!mount_test_option(me->mnt_opts, "noauto"),
1568                                                  !!mount_test_option(me->mnt_opts, "nofail"),
1569                                                  !!mount_test_option(me->mnt_opts, "comment=systemd.swapon"),
1570                                                  false);
1571                 } else
1572                         k = mount_add_one(m, what, where, me->mnt_opts, me->mnt_type, me->mnt_passno, false, false);
1573
1574                 free(what);
1575                 free(where);
1576
1577                 if (r < 0)
1578                         r = k;
1579         }
1580
1581 finish:
1582
1583         endmntent(f);
1584         return r;
1585 }
1586
1587 static int mount_load_proc_self_mountinfo(Manager *m, bool set_flags) {
1588         int r = 0;
1589         unsigned i;
1590         char *device, *path, *options, *options2, *fstype, *d, *p, *o;
1591
1592         assert(m);
1593
1594         rewind(m->proc_self_mountinfo);
1595
1596         for (i = 1;; i++) {
1597                 int k;
1598
1599                 device = path = options = options2 = fstype = d = p = o = NULL;
1600
1601                 if ((k = fscanf(m->proc_self_mountinfo,
1602                                 "%*s "       /* (1) mount id */
1603                                 "%*s "       /* (2) parent id */
1604                                 "%*s "       /* (3) major:minor */
1605                                 "%*s "       /* (4) root */
1606                                 "%ms "       /* (5) mount point */
1607                                 "%ms"        /* (6) mount options */
1608                                 "%*[^-]"     /* (7) optional fields */
1609                                 "- "         /* (8) separator */
1610                                 "%ms "       /* (9) file system type */
1611                                 "%ms"        /* (10) mount source */
1612                                 "%ms"        /* (11) mount options 2 */
1613                                 "%*[^\n]",   /* some rubbish at the end */
1614                                 &path,
1615                                 &options,
1616                                 &fstype,
1617                                 &device,
1618                                 &options2)) != 5) {
1619
1620                         if (k == EOF)
1621                                 break;
1622
1623                         log_warning("Failed to parse /proc/self/mountinfo:%u.", i);
1624                         goto clean_up;
1625                 }
1626
1627                 if (asprintf(&o, "%s,%s", options, options2) < 0) {
1628                         r = -ENOMEM;
1629                         goto finish;
1630                 }
1631
1632                 if (!(d = cunescape(device)) ||
1633                     !(p = cunescape(path))) {
1634                         r = -ENOMEM;
1635                         goto finish;
1636                 }
1637
1638                 if ((k = mount_add_one(m, d, p, o, fstype, 0, true, set_flags)) < 0)
1639                         r = k;
1640
1641 clean_up:
1642                 free(device);
1643                 free(path);
1644                 free(options);
1645                 free(options2);
1646                 free(fstype);
1647                 free(d);
1648                 free(p);
1649                 free(o);
1650         }
1651
1652 finish:
1653         free(device);
1654         free(path);
1655         free(options);
1656         free(options2);
1657         free(fstype);
1658         free(d);
1659         free(p);
1660         free(o);
1661
1662         return r;
1663 }
1664
1665 static void mount_shutdown(Manager *m) {
1666         assert(m);
1667
1668         if (m->proc_self_mountinfo) {
1669                 fclose(m->proc_self_mountinfo);
1670                 m->proc_self_mountinfo = NULL;
1671         }
1672 }
1673
1674 static int mount_enumerate(Manager *m) {
1675         int r;
1676         struct epoll_event ev;
1677         assert(m);
1678
1679         if (!m->proc_self_mountinfo) {
1680                 if (!(m->proc_self_mountinfo = fopen("/proc/self/mountinfo", "re")))
1681                         return -errno;
1682
1683                 m->mount_watch.type = WATCH_MOUNT;
1684                 m->mount_watch.fd = fileno(m->proc_self_mountinfo);
1685
1686                 zero(ev);
1687                 ev.events = EPOLLPRI;
1688                 ev.data.ptr = &m->mount_watch;
1689
1690                 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->mount_watch.fd, &ev) < 0)
1691                         return -errno;
1692         }
1693
1694         if ((r = mount_load_etc_fstab(m)) < 0)
1695                 goto fail;
1696
1697         if ((r = mount_load_proc_self_mountinfo(m, false)) < 0)
1698                 goto fail;
1699
1700         return 0;
1701
1702 fail:
1703         mount_shutdown(m);
1704         return r;
1705 }
1706
1707 void mount_fd_event(Manager *m, int events) {
1708         Unit *u;
1709         int r;
1710
1711         assert(m);
1712         assert(events & EPOLLPRI);
1713
1714         /* The manager calls this for every fd event happening on the
1715          * /proc/self/mountinfo file, which informs us about mounting
1716          * table changes */
1717
1718         if ((r = mount_load_proc_self_mountinfo(m, true)) < 0) {
1719                 log_error("Failed to reread /proc/self/mountinfo: %s", strerror(-r));
1720
1721                 /* Reset flags, just in case, for later calls */
1722                 LIST_FOREACH(units_by_type, u, m->units_by_type[UNIT_MOUNT]) {
1723                         Mount *mount = MOUNT(u);
1724
1725                         mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1726                 }
1727
1728                 return;
1729         }
1730
1731         manager_dispatch_load_queue(m);
1732
1733         LIST_FOREACH(units_by_type, u, m->units_by_type[UNIT_MOUNT]) {
1734                 Mount *mount = MOUNT(u);
1735
1736                 if (!mount->is_mounted) {
1737                         /* This has just been unmounted. */
1738
1739                         mount->from_proc_self_mountinfo = false;
1740
1741                         switch (mount->state) {
1742
1743                         case MOUNT_MOUNTED:
1744                                 mount_enter_dead(mount, MOUNT_SUCCESS);
1745                                 break;
1746
1747                         default:
1748                                 mount_set_state(mount, mount->state);
1749                                 break;
1750
1751                         }
1752
1753                 } else if (mount->just_mounted || mount->just_changed) {
1754
1755                         /* New or changed mount entry */
1756
1757                         switch (mount->state) {
1758
1759                         case MOUNT_DEAD:
1760                         case MOUNT_FAILED:
1761                                 mount_enter_mounted(mount, MOUNT_SUCCESS);
1762                                 break;
1763
1764                         case MOUNT_MOUNTING:
1765                                 mount_enter_mounting_done(mount);
1766                                 break;
1767
1768                         default:
1769                                 /* Nothing really changed, but let's
1770                                  * issue an notification call
1771                                  * nonetheless, in case somebody is
1772                                  * waiting for this. (e.g. file system
1773                                  * ro/rw remounts.) */
1774                                 mount_set_state(mount, mount->state);
1775                                 break;
1776                         }
1777                 }
1778
1779                 /* Reset the flags for later calls */
1780                 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1781         }
1782 }
1783
1784 static void mount_reset_failed(Unit *u) {
1785         Mount *m = MOUNT(u);
1786
1787         assert(m);
1788
1789         if (m->state == MOUNT_FAILED)
1790                 mount_set_state(m, MOUNT_DEAD);
1791
1792         m->result = MOUNT_SUCCESS;
1793         m->reload_result = MOUNT_SUCCESS;
1794 }
1795
1796 static int mount_kill(Unit *u, KillWho who, KillMode mode, int signo, DBusError *error) {
1797         Mount *m = MOUNT(u);
1798         int r = 0;
1799         Set *pid_set = NULL;
1800
1801         assert(m);
1802
1803         if (who == KILL_MAIN) {
1804                 dbus_set_error(error, BUS_ERROR_NO_SUCH_PROCESS, "Mount units have no main processes");
1805                 return -ESRCH;
1806         }
1807
1808         if (m->control_pid <= 0 && who == KILL_CONTROL) {
1809                 dbus_set_error(error, BUS_ERROR_NO_SUCH_PROCESS, "No control process to kill");
1810                 return -ESRCH;
1811         }
1812
1813         if (who == KILL_CONTROL || who == KILL_ALL)
1814                 if (m->control_pid > 0)
1815                         if (kill(m->control_pid, signo) < 0)
1816                                 r = -errno;
1817
1818         if (who == KILL_ALL && mode == KILL_CONTROL_GROUP) {
1819                 int q;
1820
1821                 if (!(pid_set = set_new(trivial_hash_func, trivial_compare_func)))
1822                         return -ENOMEM;
1823
1824                 /* Exclude the control pid from being killed via the cgroup */
1825                 if (m->control_pid > 0)
1826                         if ((q = set_put(pid_set, LONG_TO_PTR(m->control_pid))) < 0) {
1827                                 r = q;
1828                                 goto finish;
1829                         }
1830
1831                 if ((q = cgroup_bonding_kill_list(UNIT(m)->cgroup_bondings, signo, false, pid_set)) < 0)
1832                         if (q != -EAGAIN && q != -ESRCH && q != -ENOENT)
1833                                 r = q;
1834         }
1835
1836 finish:
1837         if (pid_set)
1838                 set_free(pid_set);
1839
1840         return r;
1841 }
1842
1843 static const char* const mount_state_table[_MOUNT_STATE_MAX] = {
1844         [MOUNT_DEAD] = "dead",
1845         [MOUNT_MOUNTING] = "mounting",
1846         [MOUNT_MOUNTING_DONE] = "mounting-done",
1847         [MOUNT_MOUNTED] = "mounted",
1848         [MOUNT_REMOUNTING] = "remounting",
1849         [MOUNT_UNMOUNTING] = "unmounting",
1850         [MOUNT_MOUNTING_SIGTERM] = "mounting-sigterm",
1851         [MOUNT_MOUNTING_SIGKILL] = "mounting-sigkill",
1852         [MOUNT_REMOUNTING_SIGTERM] = "remounting-sigterm",
1853         [MOUNT_REMOUNTING_SIGKILL] = "remounting-sigkill",
1854         [MOUNT_UNMOUNTING_SIGTERM] = "unmounting-sigterm",
1855         [MOUNT_UNMOUNTING_SIGKILL] = "unmounting-sigkill",
1856         [MOUNT_FAILED] = "failed"
1857 };
1858
1859 DEFINE_STRING_TABLE_LOOKUP(mount_state, MountState);
1860
1861 static const char* const mount_exec_command_table[_MOUNT_EXEC_COMMAND_MAX] = {
1862         [MOUNT_EXEC_MOUNT] = "ExecMount",
1863         [MOUNT_EXEC_UNMOUNT] = "ExecUnmount",
1864         [MOUNT_EXEC_REMOUNT] = "ExecRemount",
1865 };
1866
1867 DEFINE_STRING_TABLE_LOOKUP(mount_exec_command, MountExecCommand);
1868
1869 static const char* const mount_result_table[_MOUNT_RESULT_MAX] = {
1870         [MOUNT_SUCCESS] = "success",
1871         [MOUNT_FAILURE_RESOURCES] = "resources",
1872         [MOUNT_FAILURE_TIMEOUT] = "timeout",
1873         [MOUNT_FAILURE_EXIT_CODE] = "exit-code",
1874         [MOUNT_FAILURE_SIGNAL] = "signal",
1875         [MOUNT_FAILURE_CORE_DUMP] = "core-dump"
1876 };
1877
1878 DEFINE_STRING_TABLE_LOOKUP(mount_result, MountResult);
1879
1880 const UnitVTable mount_vtable = {
1881         .suffix = ".mount",
1882         .object_size = sizeof(Mount),
1883         .sections =
1884                 "Unit\0"
1885                 "Mount\0"
1886                 "Install\0",
1887
1888         .no_alias = true,
1889         .no_instances = true,
1890         .show_status = true,
1891
1892         .init = mount_init,
1893         .load = mount_load,
1894         .done = mount_done,
1895
1896         .coldplug = mount_coldplug,
1897
1898         .dump = mount_dump,
1899
1900         .start = mount_start,
1901         .stop = mount_stop,
1902         .reload = mount_reload,
1903
1904         .kill = mount_kill,
1905
1906         .serialize = mount_serialize,
1907         .deserialize_item = mount_deserialize_item,
1908
1909         .active_state = mount_active_state,
1910         .sub_state_to_string = mount_sub_state_to_string,
1911
1912         .check_gc = mount_check_gc,
1913
1914         .sigchld_event = mount_sigchld_event,
1915         .timer_event = mount_timer_event,
1916
1917         .reset_failed = mount_reset_failed,
1918
1919         .bus_interface = "org.freedesktop.systemd1.Mount",
1920         .bus_message_handler = bus_mount_message_handler,
1921         .bus_invalidating_properties =  bus_mount_invalidating_properties,
1922
1923         .enumerate = mount_enumerate,
1924         .shutdown = mount_shutdown
1925 };