chiark / gitweb /
journal: automaticall reset location when the set of matches changes
[elogind.git] / src / mount.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <errno.h>
23 #include <stdio.h>
24 #include <mntent.h>
25 #include <sys/epoll.h>
26 #include <signal.h>
27
28 #include "unit.h"
29 #include "mount.h"
30 #include "load-fragment.h"
31 #include "load-dropin.h"
32 #include "log.h"
33 #include "strv.h"
34 #include "mount-setup.h"
35 #include "unit-name.h"
36 #include "dbus-mount.h"
37 #include "special.h"
38 #include "bus-errors.h"
39 #include "exit-status.h"
40 #include "def.h"
41
42 static const UnitActiveState state_translation_table[_MOUNT_STATE_MAX] = {
43         [MOUNT_DEAD] = UNIT_INACTIVE,
44         [MOUNT_MOUNTING] = UNIT_ACTIVATING,
45         [MOUNT_MOUNTING_DONE] = UNIT_ACTIVE,
46         [MOUNT_MOUNTED] = UNIT_ACTIVE,
47         [MOUNT_REMOUNTING] = UNIT_RELOADING,
48         [MOUNT_UNMOUNTING] = UNIT_DEACTIVATING,
49         [MOUNT_MOUNTING_SIGTERM] = UNIT_DEACTIVATING,
50         [MOUNT_MOUNTING_SIGKILL] = UNIT_DEACTIVATING,
51         [MOUNT_REMOUNTING_SIGTERM] = UNIT_RELOADING,
52         [MOUNT_REMOUNTING_SIGKILL] = UNIT_RELOADING,
53         [MOUNT_UNMOUNTING_SIGTERM] = UNIT_DEACTIVATING,
54         [MOUNT_UNMOUNTING_SIGKILL] = UNIT_DEACTIVATING,
55         [MOUNT_FAILED] = UNIT_FAILED
56 };
57
58 static void mount_init(Unit *u) {
59         Mount *m = MOUNT(u);
60
61         assert(u);
62         assert(u->meta.load_state == UNIT_STUB);
63
64         m->timeout_usec = DEFAULT_TIMEOUT_USEC;
65         m->directory_mode = 0755;
66
67         exec_context_init(&m->exec_context);
68
69         /* The stdio/kmsg bridge socket is on /, in order to avoid a
70          * dep loop, don't use kmsg logging for -.mount */
71         if (!unit_has_name(u, "-.mount"))
72                 m->exec_context.std_output = EXEC_OUTPUT_KMSG;
73
74         /* We need to make sure that /bin/mount is always called in
75          * the same process group as us, so that the autofs kernel
76          * side doesn't send us another mount request while we are
77          * already trying to comply its last one. */
78         m->exec_context.same_pgrp = true;
79
80         m->timer_watch.type = WATCH_INVALID;
81
82         m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
83
84         m->meta.ignore_on_isolate = true;
85 }
86
87 static void mount_unwatch_control_pid(Mount *m) {
88         assert(m);
89
90         if (m->control_pid <= 0)
91                 return;
92
93         unit_unwatch_pid(UNIT(m), m->control_pid);
94         m->control_pid = 0;
95 }
96
97 static void mount_parameters_done(MountParameters *p) {
98         assert(p);
99
100         free(p->what);
101         free(p->options);
102         free(p->fstype);
103
104         p->what = p->options = p->fstype = NULL;
105 }
106
107 static void mount_done(Unit *u) {
108         Mount *m = MOUNT(u);
109         Meta *other;
110
111         assert(m);
112
113         free(m->where);
114         m->where = NULL;
115
116         /* Try to detach us from the automount unit if there is any */
117         LIST_FOREACH(units_by_type, other, m->meta.manager->units_by_type[UNIT_AUTOMOUNT]) {
118                 Automount *a = (Automount*) other;
119
120                 if (a->mount == m)
121                         a->mount = NULL;
122         }
123
124         mount_parameters_done(&m->parameters_etc_fstab);
125         mount_parameters_done(&m->parameters_proc_self_mountinfo);
126         mount_parameters_done(&m->parameters_fragment);
127
128         exec_context_done(&m->exec_context);
129         exec_command_done_array(m->exec_command, _MOUNT_EXEC_COMMAND_MAX);
130         m->control_command = NULL;
131
132         mount_unwatch_control_pid(m);
133
134         unit_unwatch_timer(u, &m->timer_watch);
135 }
136
137 static MountParameters* get_mount_parameters_configured(Mount *m) {
138         assert(m);
139
140         if (m->from_fragment)
141                 return &m->parameters_fragment;
142         else if (m->from_etc_fstab)
143                 return &m->parameters_etc_fstab;
144
145         return NULL;
146 }
147
148 static MountParameters* get_mount_parameters(Mount *m) {
149         assert(m);
150
151         if (m->from_proc_self_mountinfo)
152                 return &m->parameters_proc_self_mountinfo;
153
154         return get_mount_parameters_configured(m);
155 }
156
157 static int mount_add_mount_links(Mount *m) {
158         Meta *other;
159         int r;
160         MountParameters *pm;
161
162         assert(m);
163
164         pm = get_mount_parameters_configured(m);
165
166         /* Adds in links to other mount points that might lie below or
167          * above us in the hierarchy */
168
169         LIST_FOREACH(units_by_type, other, m->meta.manager->units_by_type[UNIT_MOUNT]) {
170                 Mount *n = (Mount*) other;
171                 MountParameters *pn;
172
173                 if (n == m)
174                         continue;
175
176                 if (n->meta.load_state != UNIT_LOADED)
177                         continue;
178
179                 pn = get_mount_parameters_configured(n);
180
181                 if (path_startswith(m->where, n->where)) {
182
183                         if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
184                                 return r;
185
186                         if (pn)
187                                 if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
188                                         return r;
189
190                 } else if (path_startswith(n->where, m->where)) {
191
192                         if ((r = unit_add_dependency(UNIT(n), UNIT_AFTER, UNIT(m), true)) < 0)
193                                 return r;
194
195                         if (pm)
196                                 if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
197                                         return r;
198
199                 } else if (pm && path_startswith(pm->what, n->where)) {
200
201                         if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
202                                 return r;
203
204                         if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
205                                 return r;
206
207                 } else if (pn && path_startswith(pn->what, m->where)) {
208
209                         if ((r = unit_add_dependency(UNIT(n), UNIT_AFTER, UNIT(m), true)) < 0)
210                                 return r;
211
212                         if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
213                                 return r;
214                 }
215         }
216
217         return 0;
218 }
219
220 static int mount_add_swap_links(Mount *m) {
221         Meta *other;
222         int r;
223
224         assert(m);
225
226         LIST_FOREACH(units_by_type, other, m->meta.manager->units_by_type[UNIT_SWAP])
227                 if ((r = swap_add_one_mount_link((Swap*) other, m)) < 0)
228                         return r;
229
230         return 0;
231 }
232
233 static int mount_add_path_links(Mount *m) {
234         Meta *other;
235         int r;
236
237         assert(m);
238
239         LIST_FOREACH(units_by_type, other, m->meta.manager->units_by_type[UNIT_PATH])
240                 if ((r = path_add_one_mount_link((Path*) other, m)) < 0)
241                         return r;
242
243         return 0;
244 }
245
246 static int mount_add_automount_links(Mount *m) {
247         Meta *other;
248         int r;
249
250         assert(m);
251
252         LIST_FOREACH(units_by_type, other, m->meta.manager->units_by_type[UNIT_AUTOMOUNT])
253                 if ((r = automount_add_one_mount_link((Automount*) other, m)) < 0)
254                         return r;
255
256         return 0;
257 }
258
259 static int mount_add_socket_links(Mount *m) {
260         Meta *other;
261         int r;
262
263         assert(m);
264
265         LIST_FOREACH(units_by_type, other, m->meta.manager->units_by_type[UNIT_SOCKET])
266                 if ((r = socket_add_one_mount_link((Socket*) other, m)) < 0)
267                         return r;
268
269         return 0;
270 }
271
272 static char* mount_test_option(const char *haystack, const char *needle) {
273         struct mntent me;
274
275         assert(needle);
276
277         /* Like glibc's hasmntopt(), but works on a string, not a
278          * struct mntent */
279
280         if (!haystack)
281                 return false;
282
283         zero(me);
284         me.mnt_opts = (char*) haystack;
285
286         return hasmntopt(&me, needle);
287 }
288
289 static bool mount_is_network(MountParameters *p) {
290         assert(p);
291
292         if (mount_test_option(p->options, "_netdev"))
293                 return true;
294
295         if (p->fstype && fstype_is_network(p->fstype))
296                 return true;
297
298         return false;
299 }
300
301 static bool mount_is_bind(MountParameters *p) {
302         assert(p);
303
304         if (mount_test_option(p->options, "bind"))
305                 return true;
306
307         if (p->fstype && streq(p->fstype, "bind"))
308                 return true;
309
310         return false;
311 }
312
313 static bool needs_quota(MountParameters *p) {
314         assert(p);
315
316         if (mount_is_network(p))
317                 return false;
318
319         if (mount_is_bind(p))
320                 return false;
321
322         return mount_test_option(p->options, "usrquota") ||
323                 mount_test_option(p->options, "grpquota") ||
324                 mount_test_option(p->options, "quota") ||
325                 mount_test_option(p->options, "usrjquota") ||
326                 mount_test_option(p->options, "grpjquota");
327 }
328
329 static int mount_add_fstab_links(Mount *m) {
330         const char *target, *after = NULL;
331         MountParameters *p;
332         Unit *tu;
333         int r;
334         bool noauto, nofail, handle, automount;
335
336         assert(m);
337
338         if (m->meta.manager->running_as != MANAGER_SYSTEM)
339                 return 0;
340
341         if (!(p = get_mount_parameters_configured(m)))
342                 return 0;
343
344         if (p != &m->parameters_etc_fstab)
345                 return 0;
346
347         noauto = !!mount_test_option(p->options, "noauto");
348         nofail = !!mount_test_option(p->options, "nofail");
349         automount =
350                 mount_test_option(p->options, "comment=systemd.automount") ||
351                 mount_test_option(p->options, "x-systemd-automount");
352         handle =
353                 automount ||
354                 mount_test_option(p->options, "comment=systemd.mount") ||
355                 mount_test_option(p->options, "x-systemd-mount") ||
356                 m->meta.manager->mount_auto;
357
358         if (mount_is_network(p)) {
359                 target = SPECIAL_REMOTE_FS_TARGET;
360                 after = SPECIAL_REMOTE_FS_PRE_TARGET;
361         } else {
362                 target = SPECIAL_LOCAL_FS_TARGET;
363                 after = SPECIAL_LOCAL_FS_PRE_TARGET;
364         }
365
366         if (!path_equal(m->where, "/"))
367                 if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_UMOUNT_TARGET, NULL, true)) < 0)
368                         return r;
369
370         if ((r = manager_load_unit(m->meta.manager, target, NULL, NULL, &tu)) < 0)
371                 return r;
372
373         if (after)
374                 if ((r = unit_add_dependency_by_name(UNIT(m), UNIT_AFTER, after, NULL, true)) < 0)
375                         return r;
376
377         if (automount) {
378                 Unit *am;
379
380                 if ((r = unit_load_related_unit(UNIT(m), ".automount", &am)) < 0)
381                         return r;
382
383                 /* If auto is configured as well also pull in the
384                  * mount right-away, but don't rely on it. */
385                 if (!noauto) /* automount + auto */
386                         if ((r = unit_add_dependency(tu, UNIT_WANTS, UNIT(m), true)) < 0)
387                                 return r;
388
389                 /* Install automount unit */
390                 if (!nofail) /* automount + fail */
391                         return unit_add_two_dependencies(tu, UNIT_AFTER, UNIT_REQUIRES, UNIT(am), true);
392                 else /* automount + nofail */
393                         return unit_add_two_dependencies(tu, UNIT_AFTER, UNIT_WANTS, UNIT(am), true);
394
395         } else if (handle && !noauto) {
396
397                 /* Automatically add mount points that aren't natively
398                  * configured to local-fs.target */
399
400                 if (!nofail) /* auto + fail */
401                         return unit_add_two_dependencies(tu, UNIT_AFTER, UNIT_REQUIRES, UNIT(m), true);
402                 else /* auto + nofail */
403                         return unit_add_dependency(tu, UNIT_WANTS, UNIT(m), true);
404         }
405
406         return 0;
407 }
408
409 static int mount_add_device_links(Mount *m) {
410         MountParameters *p;
411         int r;
412
413         assert(m);
414
415         if (!(p = get_mount_parameters_configured(m)))
416                 return 0;
417
418         if (!p->what)
419                 return 0;
420
421         if (!mount_is_bind(p) &&
422             !path_equal(m->where, "/") &&
423             p == &m->parameters_etc_fstab) {
424                 bool nofail, noauto;
425
426                 noauto = !!mount_test_option(p->options, "noauto");
427                 nofail = !!mount_test_option(p->options, "nofail");
428
429                 if ((r = unit_add_node_link(UNIT(m), p->what,
430                                             !noauto && nofail &&
431                                             UNIT(m)->meta.manager->running_as == MANAGER_SYSTEM)) < 0)
432                         return r;
433         }
434
435         if (p->passno > 0 &&
436             !mount_is_bind(p) &&
437             UNIT(m)->meta.manager->running_as == MANAGER_SYSTEM &&
438             !path_equal(m->where, "/")) {
439                 char *name;
440                 Unit *fsck;
441                 /* Let's add in the fsck service */
442
443                 /* aka SPECIAL_FSCK_SERVICE */
444                 if (!(name = unit_name_from_path_instance("fsck", p->what, ".service")))
445                         return -ENOMEM;
446
447                 if ((r = manager_load_unit_prepare(m->meta.manager, name, NULL, NULL, &fsck)) < 0) {
448                         log_warning("Failed to prepare unit %s: %s", name, strerror(-r));
449                         free(name);
450                         return r;
451                 }
452
453                 free(name);
454
455                 SERVICE(fsck)->fsck_passno = p->passno;
456
457                 if ((r = unit_add_two_dependencies(UNIT(m), UNIT_AFTER, UNIT_REQUIRES, fsck, true)) < 0)
458                         return r;
459         }
460
461         return 0;
462 }
463
464 static int mount_add_default_dependencies(Mount *m) {
465         int r;
466
467         assert(m);
468
469         if (m->meta.manager->running_as == MANAGER_SYSTEM &&
470             !path_equal(m->where, "/")) {
471                 MountParameters *p;
472
473                 p = get_mount_parameters_configured(m);
474
475                 if (p && needs_quota(p)) {
476                         if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_WANTS, SPECIAL_QUOTACHECK_SERVICE, NULL, true)) < 0 ||
477                             (r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_WANTS, SPECIAL_QUOTAON_SERVICE, NULL, true)) < 0)
478                                 return r;
479                 }
480
481                 if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_UMOUNT_TARGET, NULL, true)) < 0)
482                         return r;
483         }
484
485         return 0;
486 }
487
488 static int mount_fix_timeouts(Mount *m) {
489         MountParameters *p;
490         const char *timeout = NULL;
491         Unit *other;
492         Iterator i;
493         usec_t u;
494         char *t;
495         int r;
496
497         assert(m);
498
499         if (!(p = get_mount_parameters_configured(m)))
500                 return 0;
501
502         /* Allow configuration how long we wait for a device that
503          * backs a mount point to show up. This is useful to support
504          * endless device timeouts for devices that show up only after
505          * user input, like crypto devices. */
506
507         if ((timeout = mount_test_option(p->options, "comment=systemd.device-timeout")))
508                 timeout += 31;
509         else if ((timeout = mount_test_option(p->options, "x-systemd-device-timeout")))
510                 timeout += 25;
511         else
512                 return 0;
513
514         t = strndup(timeout, strcspn(timeout, ",;" WHITESPACE));
515         if (!t)
516                 return -ENOMEM;
517
518         r = parse_usec(t, &u);
519         free(t);
520
521         if (r < 0) {
522                 log_warning("Failed to parse timeout for %s, ignoring: %s", m->where, timeout);
523                 return r;
524         }
525
526         SET_FOREACH(other, m->meta.dependencies[UNIT_AFTER], i) {
527                 if (other->meta.type != UNIT_DEVICE)
528                         continue;
529
530                 other->meta.job_timeout = u;
531         }
532
533         return 0;
534 }
535
536 static int mount_verify(Mount *m) {
537         bool b;
538         char *e;
539         assert(m);
540
541         if (m->meta.load_state != UNIT_LOADED)
542                 return 0;
543
544         if (!m->from_etc_fstab && !m->from_fragment && !m->from_proc_self_mountinfo)
545                 return -ENOENT;
546
547         if (!(e = unit_name_from_path(m->where, ".mount")))
548                 return -ENOMEM;
549
550         b = unit_has_name(UNIT(m), e);
551         free(e);
552
553         if (!b) {
554                 log_error("%s's Where setting doesn't match unit name. Refusing.", m->meta.id);
555                 return -EINVAL;
556         }
557
558         if (mount_point_is_api(m->where) || mount_point_ignore(m->where)) {
559                 log_error("Cannot create mount unit for API file system %s. Refusing.", m->where);
560                 return -EINVAL;
561         }
562
563         if (m->meta.fragment_path && !m->parameters_fragment.what) {
564                 log_error("%s's What setting is missing. Refusing.", m->meta.id);
565                 return -EBADMSG;
566         }
567
568         if (m->exec_context.pam_name && m->exec_context.kill_mode != KILL_CONTROL_GROUP) {
569                 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", m->meta.id);
570                 return -EINVAL;
571         }
572
573         return 0;
574 }
575
576 static int mount_load(Unit *u) {
577         Mount *m = MOUNT(u);
578         int r;
579
580         assert(u);
581         assert(u->meta.load_state == UNIT_STUB);
582
583         if ((r = unit_load_fragment_and_dropin_optional(u)) < 0)
584                 return r;
585
586         /* This is a new unit? Then let's add in some extras */
587         if (u->meta.load_state == UNIT_LOADED) {
588                 if ((r = unit_add_exec_dependencies(u, &m->exec_context)) < 0)
589                         return r;
590
591                 if (m->meta.fragment_path)
592                         m->from_fragment = true;
593                 else if (m->from_etc_fstab)
594                         m->meta.default_dependencies = false;
595
596                 if (!m->where)
597                         if (!(m->where = unit_name_to_path(u->meta.id)))
598                                 return -ENOMEM;
599
600                 path_kill_slashes(m->where);
601
602                 if (!m->meta.description)
603                         if ((r = unit_set_description(u, m->where)) < 0)
604                                 return r;
605
606                 if ((r = mount_add_device_links(m)) < 0)
607                         return r;
608
609                 if ((r = mount_add_mount_links(m)) < 0)
610                         return r;
611
612                 if ((r = mount_add_socket_links(m)) < 0)
613                         return r;
614
615                 if ((r = mount_add_swap_links(m)) < 0)
616                         return r;
617
618                 if ((r = mount_add_path_links(m)) < 0)
619                         return r;
620
621                 if ((r = mount_add_automount_links(m)) < 0)
622                         return r;
623
624                 if ((r = mount_add_fstab_links(m)) < 0)
625                         return r;
626
627                 if (m->meta.default_dependencies)
628                         if ((r = mount_add_default_dependencies(m)) < 0)
629                                 return r;
630
631                 if ((r = unit_add_default_cgroups(u)) < 0)
632                         return r;
633
634                 mount_fix_timeouts(m);
635         }
636
637         return mount_verify(m);
638 }
639
640 static int mount_notify_automount(Mount *m, int status) {
641         Unit *p;
642         int r;
643
644         assert(m);
645
646         if ((r = unit_get_related_unit(UNIT(m), ".automount", &p)) < 0)
647                 return r == -ENOENT ? 0 : r;
648
649         return automount_send_ready(AUTOMOUNT(p), status);
650 }
651
652 static void mount_set_state(Mount *m, MountState state) {
653         MountState old_state;
654         assert(m);
655
656         old_state = m->state;
657         m->state = state;
658
659         if (state != MOUNT_MOUNTING &&
660             state != MOUNT_MOUNTING_DONE &&
661             state != MOUNT_REMOUNTING &&
662             state != MOUNT_UNMOUNTING &&
663             state != MOUNT_MOUNTING_SIGTERM &&
664             state != MOUNT_MOUNTING_SIGKILL &&
665             state != MOUNT_UNMOUNTING_SIGTERM &&
666             state != MOUNT_UNMOUNTING_SIGKILL &&
667             state != MOUNT_REMOUNTING_SIGTERM &&
668             state != MOUNT_REMOUNTING_SIGKILL) {
669                 unit_unwatch_timer(UNIT(m), &m->timer_watch);
670                 mount_unwatch_control_pid(m);
671                 m->control_command = NULL;
672                 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
673         }
674
675         if (state == MOUNT_MOUNTED ||
676             state == MOUNT_REMOUNTING)
677                 mount_notify_automount(m, 0);
678         else if (state == MOUNT_DEAD ||
679                  state == MOUNT_UNMOUNTING ||
680                  state == MOUNT_MOUNTING_SIGTERM ||
681                  state == MOUNT_MOUNTING_SIGKILL ||
682                  state == MOUNT_REMOUNTING_SIGTERM ||
683                  state == MOUNT_REMOUNTING_SIGKILL ||
684                  state == MOUNT_UNMOUNTING_SIGTERM ||
685                  state == MOUNT_UNMOUNTING_SIGKILL ||
686                  state == MOUNT_FAILED)
687                 mount_notify_automount(m, -ENODEV);
688
689         if (state != old_state)
690                 log_debug("%s changed %s -> %s",
691                           m->meta.id,
692                           mount_state_to_string(old_state),
693                           mount_state_to_string(state));
694
695         unit_notify(UNIT(m), state_translation_table[old_state], state_translation_table[state], !m->reload_failure);
696         m->reload_failure = false;
697 }
698
699 static int mount_coldplug(Unit *u) {
700         Mount *m = MOUNT(u);
701         MountState new_state = MOUNT_DEAD;
702         int r;
703
704         assert(m);
705         assert(m->state == MOUNT_DEAD);
706
707         if (m->deserialized_state != m->state)
708                 new_state = m->deserialized_state;
709         else if (m->from_proc_self_mountinfo)
710                 new_state = MOUNT_MOUNTED;
711
712         if (new_state != m->state) {
713
714                 if (new_state == MOUNT_MOUNTING ||
715                     new_state == MOUNT_MOUNTING_DONE ||
716                     new_state == MOUNT_REMOUNTING ||
717                     new_state == MOUNT_UNMOUNTING ||
718                     new_state == MOUNT_MOUNTING_SIGTERM ||
719                     new_state == MOUNT_MOUNTING_SIGKILL ||
720                     new_state == MOUNT_UNMOUNTING_SIGTERM ||
721                     new_state == MOUNT_UNMOUNTING_SIGKILL ||
722                     new_state == MOUNT_REMOUNTING_SIGTERM ||
723                     new_state == MOUNT_REMOUNTING_SIGKILL) {
724
725                         if (m->control_pid <= 0)
726                                 return -EBADMSG;
727
728                         if ((r = unit_watch_pid(UNIT(m), m->control_pid)) < 0)
729                                 return r;
730
731                         if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
732                                 return r;
733                 }
734
735                 mount_set_state(m, new_state);
736         }
737
738         return 0;
739 }
740
741 static void mount_dump(Unit *u, FILE *f, const char *prefix) {
742         Mount *m = MOUNT(u);
743         MountParameters *p;
744
745         assert(m);
746         assert(f);
747
748         p = get_mount_parameters(m);
749
750         fprintf(f,
751                 "%sMount State: %s\n"
752                 "%sWhere: %s\n"
753                 "%sWhat: %s\n"
754                 "%sFile System Type: %s\n"
755                 "%sOptions: %s\n"
756                 "%sFrom /etc/fstab: %s\n"
757                 "%sFrom /proc/self/mountinfo: %s\n"
758                 "%sFrom fragment: %s\n"
759                 "%sDirectoryMode: %04o\n",
760                 prefix, mount_state_to_string(m->state),
761                 prefix, m->where,
762                 prefix, strna(p->what),
763                 prefix, strna(p->fstype),
764                 prefix, strna(p->options),
765                 prefix, yes_no(m->from_etc_fstab),
766                 prefix, yes_no(m->from_proc_self_mountinfo),
767                 prefix, yes_no(m->from_fragment),
768                 prefix, m->directory_mode);
769
770         if (m->control_pid > 0)
771                 fprintf(f,
772                         "%sControl PID: %lu\n",
773                         prefix, (unsigned long) m->control_pid);
774
775         exec_context_dump(&m->exec_context, f, prefix);
776 }
777
778 static int mount_spawn(Mount *m, ExecCommand *c, pid_t *_pid) {
779         pid_t pid;
780         int r;
781
782         assert(m);
783         assert(c);
784         assert(_pid);
785
786         if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
787                 goto fail;
788
789         if ((r = exec_spawn(c,
790                             NULL,
791                             &m->exec_context,
792                             NULL, 0,
793                             m->meta.manager->environment,
794                             true,
795                             true,
796                             true,
797                             m->meta.manager->confirm_spawn,
798                             m->meta.cgroup_bondings,
799                             m->meta.cgroup_attributes,
800                             &pid)) < 0)
801                 goto fail;
802
803         if ((r = unit_watch_pid(UNIT(m), pid)) < 0)
804                 /* FIXME: we need to do something here */
805                 goto fail;
806
807         *_pid = pid;
808
809         return 0;
810
811 fail:
812         unit_unwatch_timer(UNIT(m), &m->timer_watch);
813
814         return r;
815 }
816
817 static void mount_enter_dead(Mount *m, bool success) {
818         assert(m);
819
820         if (!success)
821                 m->failure = true;
822
823         mount_set_state(m, m->failure ? MOUNT_FAILED : MOUNT_DEAD);
824 }
825
826 static void mount_enter_mounted(Mount *m, bool success) {
827         assert(m);
828
829         if (!success)
830                 m->failure = true;
831
832         mount_set_state(m, MOUNT_MOUNTED);
833 }
834
835 static void mount_enter_signal(Mount *m, MountState state, bool success) {
836         int r;
837         Set *pid_set = NULL;
838         bool wait_for_exit = false;
839
840         assert(m);
841
842         if (!success)
843                 m->failure = true;
844
845         if (m->exec_context.kill_mode != KILL_NONE) {
846                 int sig = (state == MOUNT_MOUNTING_SIGTERM ||
847                            state == MOUNT_UNMOUNTING_SIGTERM ||
848                            state == MOUNT_REMOUNTING_SIGTERM) ? m->exec_context.kill_signal : SIGKILL;
849
850                 if (m->control_pid > 0) {
851                         if (kill_and_sigcont(m->control_pid, sig) < 0 && errno != ESRCH)
852
853                                 log_warning("Failed to kill control process %li: %m", (long) m->control_pid);
854                         else
855                                 wait_for_exit = true;
856                 }
857
858                 if (m->exec_context.kill_mode == KILL_CONTROL_GROUP) {
859
860                         if (!(pid_set = set_new(trivial_hash_func, trivial_compare_func))) {
861                                 r = -ENOMEM;
862                                 goto fail;
863                         }
864
865                         /* Exclude the control pid from being killed via the cgroup */
866                         if (m->control_pid > 0)
867                                 if ((r = set_put(pid_set, LONG_TO_PTR(m->control_pid))) < 0)
868                                         goto fail;
869
870                         if ((r = cgroup_bonding_kill_list(m->meta.cgroup_bondings, sig, true, pid_set)) < 0) {
871                                 if (r != -EAGAIN && r != -ESRCH && r != -ENOENT)
872                                         log_warning("Failed to kill control group: %s", strerror(-r));
873                         } else if (r > 0)
874                                 wait_for_exit = true;
875
876                         set_free(pid_set);
877                         pid_set = NULL;
878                 }
879         }
880
881         if (wait_for_exit) {
882                 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
883                         goto fail;
884
885                 mount_set_state(m, state);
886         } else if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
887                 mount_enter_mounted(m, true);
888         else
889                 mount_enter_dead(m, true);
890
891         return;
892
893 fail:
894         log_warning("%s failed to kill processes: %s", m->meta.id, strerror(-r));
895
896         if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
897                 mount_enter_mounted(m, false);
898         else
899                 mount_enter_dead(m, false);
900
901         if (pid_set)
902                 set_free(pid_set);
903 }
904
905 static void mount_enter_unmounting(Mount *m, bool success) {
906         int r;
907
908         assert(m);
909
910         if (!success)
911                 m->failure = true;
912
913         m->control_command_id = MOUNT_EXEC_UNMOUNT;
914         m->control_command = m->exec_command + MOUNT_EXEC_UNMOUNT;
915
916         if ((r = exec_command_set(
917                              m->control_command,
918                              "/bin/umount",
919                              m->where,
920                              NULL)) < 0)
921                 goto fail;
922
923         mount_unwatch_control_pid(m);
924
925         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
926                 goto fail;
927
928         mount_set_state(m, MOUNT_UNMOUNTING);
929
930         return;
931
932 fail:
933         log_warning("%s failed to run 'umount' task: %s", m->meta.id, strerror(-r));
934         mount_enter_mounted(m, false);
935 }
936
937 static void mount_enter_mounting(Mount *m) {
938         int r;
939         MountParameters *p;
940
941         assert(m);
942
943         m->control_command_id = MOUNT_EXEC_MOUNT;
944         m->control_command = m->exec_command + MOUNT_EXEC_MOUNT;
945
946         mkdir_p(m->where, m->directory_mode);
947
948         /* Create the source directory for bind-mounts if needed */
949         p = get_mount_parameters_configured(m);
950         if (p && mount_is_bind(p))
951                 mkdir_p(p->what, m->directory_mode);
952
953         if (m->from_fragment)
954                 r = exec_command_set(
955                                 m->control_command,
956                                 "/bin/mount",
957                                 m->parameters_fragment.what,
958                                 m->where,
959                                 "-t", m->parameters_fragment.fstype ? m->parameters_fragment.fstype : "auto",
960                                 m->parameters_fragment.options ? "-o" : NULL, m->parameters_fragment.options,
961                                 NULL);
962         else if (m->from_etc_fstab)
963                 r = exec_command_set(
964                                 m->control_command,
965                                 "/bin/mount",
966                                 m->where,
967                                 NULL);
968         else
969                 r = -ENOENT;
970
971         if (r < 0)
972                 goto fail;
973
974         mount_unwatch_control_pid(m);
975
976         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
977                 goto fail;
978
979         mount_set_state(m, MOUNT_MOUNTING);
980
981         return;
982
983 fail:
984         log_warning("%s failed to run 'mount' task: %s", m->meta.id, strerror(-r));
985         mount_enter_dead(m, false);
986 }
987
988 static void mount_enter_mounting_done(Mount *m) {
989         assert(m);
990
991         mount_set_state(m, MOUNT_MOUNTING_DONE);
992 }
993
994 static void mount_enter_remounting(Mount *m, bool success) {
995         int r;
996
997         assert(m);
998
999         if (!success)
1000                 m->failure = true;
1001
1002         m->control_command_id = MOUNT_EXEC_REMOUNT;
1003         m->control_command = m->exec_command + MOUNT_EXEC_REMOUNT;
1004
1005         if (m->from_fragment) {
1006                 char *buf = NULL;
1007                 const char *o;
1008
1009                 if (m->parameters_fragment.options) {
1010                         if (!(buf = strappend("remount,", m->parameters_fragment.options))) {
1011                                 r = -ENOMEM;
1012                                 goto fail;
1013                         }
1014
1015                         o = buf;
1016                 } else
1017                         o = "remount";
1018
1019                 r = exec_command_set(
1020                                 m->control_command,
1021                                 "/bin/mount",
1022                                 m->parameters_fragment.what,
1023                                 m->where,
1024                                 "-t", m->parameters_fragment.fstype ? m->parameters_fragment.fstype : "auto",
1025                                 "-o", o,
1026                                 NULL);
1027
1028                 free(buf);
1029         } else if (m->from_etc_fstab)
1030                 r = exec_command_set(
1031                                 m->control_command,
1032                                 "/bin/mount",
1033                                 m->where,
1034                                 "-o", "remount",
1035                                 NULL);
1036         else
1037                 r = -ENOENT;
1038
1039         if (r < 0)
1040                 goto fail;
1041
1042         mount_unwatch_control_pid(m);
1043
1044         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
1045                 goto fail;
1046
1047         mount_set_state(m, MOUNT_REMOUNTING);
1048
1049         return;
1050
1051 fail:
1052         log_warning("%s failed to run 'remount' task: %s", m->meta.id, strerror(-r));
1053         m->reload_failure = true;
1054         mount_enter_mounted(m, true);
1055 }
1056
1057 static int mount_start(Unit *u) {
1058         Mount *m = MOUNT(u);
1059
1060         assert(m);
1061
1062         /* We cannot fulfill this request right now, try again later
1063          * please! */
1064         if (m->state == MOUNT_UNMOUNTING ||
1065             m->state == MOUNT_UNMOUNTING_SIGTERM ||
1066             m->state == MOUNT_UNMOUNTING_SIGKILL ||
1067             m->state == MOUNT_MOUNTING_SIGTERM ||
1068             m->state == MOUNT_MOUNTING_SIGKILL)
1069                 return -EAGAIN;
1070
1071         /* Already on it! */
1072         if (m->state == MOUNT_MOUNTING)
1073                 return 0;
1074
1075         assert(m->state == MOUNT_DEAD || m->state == MOUNT_FAILED);
1076
1077         m->failure = false;
1078         mount_enter_mounting(m);
1079         return 0;
1080 }
1081
1082 static int mount_stop(Unit *u) {
1083         Mount *m = MOUNT(u);
1084
1085         assert(m);
1086
1087         /* Already on it */
1088         if (m->state == MOUNT_UNMOUNTING ||
1089             m->state == MOUNT_UNMOUNTING_SIGKILL ||
1090             m->state == MOUNT_UNMOUNTING_SIGTERM ||
1091             m->state == MOUNT_MOUNTING_SIGTERM ||
1092             m->state == MOUNT_MOUNTING_SIGKILL)
1093                 return 0;
1094
1095         assert(m->state == MOUNT_MOUNTING ||
1096                m->state == MOUNT_MOUNTING_DONE ||
1097                m->state == MOUNT_MOUNTED ||
1098                m->state == MOUNT_REMOUNTING ||
1099                m->state == MOUNT_REMOUNTING_SIGTERM ||
1100                m->state == MOUNT_REMOUNTING_SIGKILL);
1101
1102         mount_enter_unmounting(m, true);
1103         return 0;
1104 }
1105
1106 static int mount_reload(Unit *u) {
1107         Mount *m = MOUNT(u);
1108
1109         assert(m);
1110
1111         if (m->state == MOUNT_MOUNTING_DONE)
1112                 return -EAGAIN;
1113
1114         assert(m->state == MOUNT_MOUNTED);
1115
1116         mount_enter_remounting(m, true);
1117         return 0;
1118 }
1119
1120 static int mount_serialize(Unit *u, FILE *f, FDSet *fds) {
1121         Mount *m = MOUNT(u);
1122
1123         assert(m);
1124         assert(f);
1125         assert(fds);
1126
1127         unit_serialize_item(u, f, "state", mount_state_to_string(m->state));
1128         unit_serialize_item(u, f, "failure", yes_no(m->failure));
1129
1130         if (m->control_pid > 0)
1131                 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) m->control_pid);
1132
1133         if (m->control_command_id >= 0)
1134                 unit_serialize_item(u, f, "control-command", mount_exec_command_to_string(m->control_command_id));
1135
1136         return 0;
1137 }
1138
1139 static int mount_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1140         Mount *m = MOUNT(u);
1141
1142         assert(u);
1143         assert(key);
1144         assert(value);
1145         assert(fds);
1146
1147         if (streq(key, "state")) {
1148                 MountState state;
1149
1150                 if ((state = mount_state_from_string(value)) < 0)
1151                         log_debug("Failed to parse state value %s", value);
1152                 else
1153                         m->deserialized_state = state;
1154         } else if (streq(key, "failure")) {
1155                 int b;
1156
1157                 if ((b = parse_boolean(value)) < 0)
1158                         log_debug("Failed to parse failure value %s", value);
1159                 else
1160                         m->failure = b || m->failure;
1161
1162         } else if (streq(key, "control-pid")) {
1163                 pid_t pid;
1164
1165                 if (parse_pid(value, &pid) < 0)
1166                         log_debug("Failed to parse control-pid value %s", value);
1167                 else
1168                         m->control_pid = pid;
1169         } else if (streq(key, "control-command")) {
1170                 MountExecCommand id;
1171
1172                 if ((id = mount_exec_command_from_string(value)) < 0)
1173                         log_debug("Failed to parse exec-command value %s", value);
1174                 else {
1175                         m->control_command_id = id;
1176                         m->control_command = m->exec_command + id;
1177                 }
1178
1179         } else
1180                 log_debug("Unknown serialization key '%s'", key);
1181
1182         return 0;
1183 }
1184
1185 static UnitActiveState mount_active_state(Unit *u) {
1186         assert(u);
1187
1188         return state_translation_table[MOUNT(u)->state];
1189 }
1190
1191 static const char *mount_sub_state_to_string(Unit *u) {
1192         assert(u);
1193
1194         return mount_state_to_string(MOUNT(u)->state);
1195 }
1196
1197 static bool mount_check_gc(Unit *u) {
1198         Mount *m = MOUNT(u);
1199
1200         assert(m);
1201
1202         return m->from_etc_fstab || m->from_proc_self_mountinfo;
1203 }
1204
1205 static void mount_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1206         Mount *m = MOUNT(u);
1207         bool success;
1208
1209         assert(m);
1210         assert(pid >= 0);
1211
1212         if (pid != m->control_pid)
1213                 return;
1214
1215         m->control_pid = 0;
1216
1217         success = is_clean_exit(code, status);
1218         m->failure = m->failure || !success;
1219
1220         if (m->control_command) {
1221                 exec_status_exit(&m->control_command->exec_status, &m->exec_context, pid, code, status);
1222                 m->control_command = NULL;
1223                 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
1224         }
1225
1226         log_full(success ? LOG_DEBUG : LOG_NOTICE,
1227                  "%s mount process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
1228
1229         /* Note that mount(8) returning and the kernel sending us a
1230          * mount table change event might happen out-of-order. If an
1231          * operation succeed we assume the kernel will follow soon too
1232          * and already change into the resulting state.  If it fails
1233          * we check if the kernel still knows about the mount. and
1234          * change state accordingly. */
1235
1236         switch (m->state) {
1237
1238         case MOUNT_MOUNTING:
1239         case MOUNT_MOUNTING_DONE:
1240         case MOUNT_MOUNTING_SIGKILL:
1241         case MOUNT_MOUNTING_SIGTERM:
1242
1243                 if (success)
1244                         mount_enter_mounted(m, true);
1245                 else if (m->from_proc_self_mountinfo)
1246                         mount_enter_mounted(m, false);
1247                 else
1248                         mount_enter_dead(m, false);
1249                 break;
1250
1251         case MOUNT_REMOUNTING:
1252         case MOUNT_REMOUNTING_SIGKILL:
1253         case MOUNT_REMOUNTING_SIGTERM:
1254
1255                 m->reload_failure = !success;
1256                 if (m->from_proc_self_mountinfo)
1257                         mount_enter_mounted(m, true);
1258                 else
1259                         mount_enter_dead(m, true);
1260
1261                 break;
1262
1263         case MOUNT_UNMOUNTING:
1264         case MOUNT_UNMOUNTING_SIGKILL:
1265         case MOUNT_UNMOUNTING_SIGTERM:
1266
1267                 if (success)
1268                         mount_enter_dead(m, true);
1269                 else if (m->from_proc_self_mountinfo)
1270                         mount_enter_mounted(m, false);
1271                 else
1272                         mount_enter_dead(m, false);
1273                 break;
1274
1275         default:
1276                 assert_not_reached("Uh, control process died at wrong time.");
1277         }
1278
1279         /* Notify clients about changed exit status */
1280         unit_add_to_dbus_queue(u);
1281 }
1282
1283 static void mount_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
1284         Mount *m = MOUNT(u);
1285
1286         assert(m);
1287         assert(elapsed == 1);
1288         assert(w == &m->timer_watch);
1289
1290         switch (m->state) {
1291
1292         case MOUNT_MOUNTING:
1293         case MOUNT_MOUNTING_DONE:
1294                 log_warning("%s mounting timed out. Stopping.", u->meta.id);
1295                 mount_enter_signal(m, MOUNT_MOUNTING_SIGTERM, false);
1296                 break;
1297
1298         case MOUNT_REMOUNTING:
1299                 log_warning("%s remounting timed out. Stopping.", u->meta.id);
1300                 m->reload_failure = true;
1301                 mount_enter_mounted(m, true);
1302                 break;
1303
1304         case MOUNT_UNMOUNTING:
1305                 log_warning("%s unmounting timed out. Stopping.", u->meta.id);
1306                 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGTERM, false);
1307                 break;
1308
1309         case MOUNT_MOUNTING_SIGTERM:
1310                 if (m->exec_context.send_sigkill) {
1311                         log_warning("%s mounting timed out. Killing.", u->meta.id);
1312                         mount_enter_signal(m, MOUNT_MOUNTING_SIGKILL, false);
1313                 } else {
1314                         log_warning("%s mounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1315
1316                         if (m->from_proc_self_mountinfo)
1317                                 mount_enter_mounted(m, false);
1318                         else
1319                                 mount_enter_dead(m, false);
1320                 }
1321                 break;
1322
1323         case MOUNT_REMOUNTING_SIGTERM:
1324                 if (m->exec_context.send_sigkill) {
1325                         log_warning("%s remounting timed out. Killing.", u->meta.id);
1326                         mount_enter_signal(m, MOUNT_REMOUNTING_SIGKILL, false);
1327                 } else {
1328                         log_warning("%s remounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1329
1330                         if (m->from_proc_self_mountinfo)
1331                                 mount_enter_mounted(m, false);
1332                         else
1333                                 mount_enter_dead(m, false);
1334                 }
1335                 break;
1336
1337         case MOUNT_UNMOUNTING_SIGTERM:
1338                 if (m->exec_context.send_sigkill) {
1339                         log_warning("%s unmounting timed out. Killing.", u->meta.id);
1340                         mount_enter_signal(m, MOUNT_UNMOUNTING_SIGKILL, false);
1341                 } else {
1342                         log_warning("%s unmounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1343
1344                         if (m->from_proc_self_mountinfo)
1345                                 mount_enter_mounted(m, false);
1346                         else
1347                                 mount_enter_dead(m, false);
1348                 }
1349                 break;
1350
1351         case MOUNT_MOUNTING_SIGKILL:
1352         case MOUNT_REMOUNTING_SIGKILL:
1353         case MOUNT_UNMOUNTING_SIGKILL:
1354                 log_warning("%s mount process still around after SIGKILL. Ignoring.", u->meta.id);
1355
1356                 if (m->from_proc_self_mountinfo)
1357                         mount_enter_mounted(m, false);
1358                 else
1359                         mount_enter_dead(m, false);
1360                 break;
1361
1362         default:
1363                 assert_not_reached("Timeout at wrong time.");
1364         }
1365 }
1366
1367 static int mount_add_one(
1368                 Manager *m,
1369                 const char *what,
1370                 const char *where,
1371                 const char *options,
1372                 const char *fstype,
1373                 int passno,
1374                 bool from_proc_self_mountinfo,
1375                 bool set_flags) {
1376         int r;
1377         Unit *u;
1378         bool delete;
1379         char *e, *w = NULL, *o = NULL, *f = NULL;
1380         MountParameters *p;
1381
1382         assert(m);
1383         assert(what);
1384         assert(where);
1385         assert(options);
1386         assert(fstype);
1387
1388         assert(!set_flags || from_proc_self_mountinfo);
1389
1390         /* Ignore API mount points. They should never be referenced in
1391          * dependencies ever. */
1392         if (mount_point_is_api(where) || mount_point_ignore(where))
1393                 return 0;
1394
1395         if (streq(fstype, "autofs"))
1396                 return 0;
1397
1398         /* probably some kind of swap, ignore */
1399         if (!is_path(where))
1400                 return 0;
1401
1402         if (!(e = unit_name_from_path(where, ".mount")))
1403                 return -ENOMEM;
1404
1405         if (!(u = manager_get_unit(m, e))) {
1406                 delete = true;
1407
1408                 if (!(u = unit_new(m))) {
1409                         free(e);
1410                         return -ENOMEM;
1411                 }
1412
1413                 r = unit_add_name(u, e);
1414                 free(e);
1415
1416                 if (r < 0)
1417                         goto fail;
1418
1419                 if (!(MOUNT(u)->where = strdup(where))) {
1420                         r = -ENOMEM;
1421                         goto fail;
1422                 }
1423
1424                 unit_add_to_load_queue(u);
1425         } else {
1426                 delete = false;
1427                 free(e);
1428         }
1429
1430         if (!(w = strdup(what)) ||
1431             !(o = strdup(options)) ||
1432             !(f = strdup(fstype))) {
1433                 r = -ENOMEM;
1434                 goto fail;
1435         }
1436
1437         if (from_proc_self_mountinfo) {
1438                 p = &MOUNT(u)->parameters_proc_self_mountinfo;
1439
1440                 if (set_flags) {
1441                         MOUNT(u)->is_mounted = true;
1442                         MOUNT(u)->just_mounted = !MOUNT(u)->from_proc_self_mountinfo;
1443                         MOUNT(u)->just_changed = !streq_ptr(p->options, o);
1444                 }
1445
1446                 MOUNT(u)->from_proc_self_mountinfo = true;
1447         } else {
1448                 p = &MOUNT(u)->parameters_etc_fstab;
1449                 MOUNT(u)->from_etc_fstab = true;
1450         }
1451
1452         free(p->what);
1453         p->what = w;
1454
1455         free(p->options);
1456         p->options = o;
1457
1458         free(p->fstype);
1459         p->fstype = f;
1460
1461         p->passno = passno;
1462
1463         unit_add_to_dbus_queue(u);
1464
1465         return 0;
1466
1467 fail:
1468         free(w);
1469         free(o);
1470         free(f);
1471
1472         if (delete && u)
1473                 unit_free(u);
1474
1475         return r;
1476 }
1477
1478 static int mount_find_pri(char *options) {
1479         char *end, *pri;
1480         unsigned long r;
1481
1482         if (!(pri = mount_test_option(options, "pri")))
1483                 return 0;
1484
1485         pri += 4;
1486
1487         errno = 0;
1488         r = strtoul(pri, &end, 10);
1489
1490         if (errno != 0)
1491                 return -errno;
1492
1493         if (end == pri || (*end != ',' && *end != 0))
1494                 return -EINVAL;
1495
1496         return (int) r;
1497 }
1498
1499 static int mount_load_etc_fstab(Manager *m) {
1500         FILE *f;
1501         int r = 0;
1502         struct mntent* me;
1503
1504         assert(m);
1505
1506         errno = 0;
1507         if (!(f = setmntent("/etc/fstab", "r")))
1508                 return -errno;
1509
1510         while ((me = getmntent(f))) {
1511                 char *where, *what;
1512                 int k;
1513
1514                 if (!(what = fstab_node_to_udev_node(me->mnt_fsname))) {
1515                         r = -ENOMEM;
1516                         goto finish;
1517                 }
1518
1519                 if (!(where = strdup(me->mnt_dir))) {
1520                         free(what);
1521                         r = -ENOMEM;
1522                         goto finish;
1523                 }
1524
1525                 if (what[0] == '/')
1526                         path_kill_slashes(what);
1527
1528                 if (where[0] == '/')
1529                         path_kill_slashes(where);
1530
1531                 if (streq(me->mnt_type, "swap")) {
1532                         int pri;
1533
1534                         if ((pri = mount_find_pri(me->mnt_opts)) < 0)
1535                                 k = pri;
1536                         else
1537                                 k = swap_add_one(m,
1538                                                  what,
1539                                                  NULL,
1540                                                  pri,
1541                                                  !!mount_test_option(me->mnt_opts, "noauto"),
1542                                                  !!mount_test_option(me->mnt_opts, "nofail"),
1543                                                  !!mount_test_option(me->mnt_opts, "comment=systemd.swapon"),
1544                                                  false);
1545                 } else
1546                         k = mount_add_one(m, what, where, me->mnt_opts, me->mnt_type, me->mnt_passno, false, false);
1547
1548                 free(what);
1549                 free(where);
1550
1551                 if (r < 0)
1552                         r = k;
1553         }
1554
1555 finish:
1556
1557         endmntent(f);
1558         return r;
1559 }
1560
1561 static int mount_load_proc_self_mountinfo(Manager *m, bool set_flags) {
1562         int r = 0;
1563         unsigned i;
1564         char *device, *path, *options, *options2, *fstype, *d, *p, *o;
1565
1566         assert(m);
1567
1568         rewind(m->proc_self_mountinfo);
1569
1570         for (i = 1;; i++) {
1571                 int k;
1572
1573                 device = path = options = options2 = fstype = d = p = o = NULL;
1574
1575                 if ((k = fscanf(m->proc_self_mountinfo,
1576                                 "%*s "       /* (1) mount id */
1577                                 "%*s "       /* (2) parent id */
1578                                 "%*s "       /* (3) major:minor */
1579                                 "%*s "       /* (4) root */
1580                                 "%ms "       /* (5) mount point */
1581                                 "%ms"        /* (6) mount options */
1582                                 "%*[^-]"     /* (7) optional fields */
1583                                 "- "         /* (8) separator */
1584                                 "%ms "       /* (9) file system type */
1585                                 "%ms"        /* (10) mount source */
1586                                 "%ms"        /* (11) mount options 2 */
1587                                 "%*[^\n]",   /* some rubbish at the end */
1588                                 &path,
1589                                 &options,
1590                                 &fstype,
1591                                 &device,
1592                                 &options2)) != 5) {
1593
1594                         if (k == EOF)
1595                                 break;
1596
1597                         log_warning("Failed to parse /proc/self/mountinfo:%u.", i);
1598                         goto clean_up;
1599                 }
1600
1601                 if (asprintf(&o, "%s,%s", options, options2) < 0) {
1602                         r = -ENOMEM;
1603                         goto finish;
1604                 }
1605
1606                 if (!(d = cunescape(device)) ||
1607                     !(p = cunescape(path))) {
1608                         r = -ENOMEM;
1609                         goto finish;
1610                 }
1611
1612                 if ((k = mount_add_one(m, d, p, o, fstype, 0, true, set_flags)) < 0)
1613                         r = k;
1614
1615 clean_up:
1616                 free(device);
1617                 free(path);
1618                 free(options);
1619                 free(options2);
1620                 free(fstype);
1621                 free(d);
1622                 free(p);
1623                 free(o);
1624         }
1625
1626 finish:
1627         free(device);
1628         free(path);
1629         free(options);
1630         free(options2);
1631         free(fstype);
1632         free(d);
1633         free(p);
1634         free(o);
1635
1636         return r;
1637 }
1638
1639 static void mount_shutdown(Manager *m) {
1640         assert(m);
1641
1642         if (m->proc_self_mountinfo) {
1643                 fclose(m->proc_self_mountinfo);
1644                 m->proc_self_mountinfo = NULL;
1645         }
1646 }
1647
1648 static int mount_enumerate(Manager *m) {
1649         int r;
1650         struct epoll_event ev;
1651         assert(m);
1652
1653         if (!m->proc_self_mountinfo) {
1654                 if (!(m->proc_self_mountinfo = fopen("/proc/self/mountinfo", "re")))
1655                         return -errno;
1656
1657                 m->mount_watch.type = WATCH_MOUNT;
1658                 m->mount_watch.fd = fileno(m->proc_self_mountinfo);
1659
1660                 zero(ev);
1661                 ev.events = EPOLLPRI;
1662                 ev.data.ptr = &m->mount_watch;
1663
1664                 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->mount_watch.fd, &ev) < 0)
1665                         return -errno;
1666         }
1667
1668         if ((r = mount_load_etc_fstab(m)) < 0)
1669                 goto fail;
1670
1671         if ((r = mount_load_proc_self_mountinfo(m, false)) < 0)
1672                 goto fail;
1673
1674         return 0;
1675
1676 fail:
1677         mount_shutdown(m);
1678         return r;
1679 }
1680
1681 void mount_fd_event(Manager *m, int events) {
1682         Meta *meta;
1683         int r;
1684
1685         assert(m);
1686         assert(events & EPOLLPRI);
1687
1688         /* The manager calls this for every fd event happening on the
1689          * /proc/self/mountinfo file, which informs us about mounting
1690          * table changes */
1691
1692         if ((r = mount_load_proc_self_mountinfo(m, true)) < 0) {
1693                 log_error("Failed to reread /proc/self/mountinfo: %s", strerror(-r));
1694
1695                 /* Reset flags, just in case, for later calls */
1696                 LIST_FOREACH(units_by_type, meta, m->units_by_type[UNIT_MOUNT]) {
1697                         Mount *mount = (Mount*) meta;
1698
1699                         mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1700                 }
1701
1702                 return;
1703         }
1704
1705         manager_dispatch_load_queue(m);
1706
1707         LIST_FOREACH(units_by_type, meta, m->units_by_type[UNIT_MOUNT]) {
1708                 Mount *mount = (Mount*) meta;
1709
1710                 if (!mount->is_mounted) {
1711                         /* This has just been unmounted. */
1712
1713                         mount->from_proc_self_mountinfo = false;
1714
1715                         switch (mount->state) {
1716
1717                         case MOUNT_MOUNTED:
1718                                 mount_enter_dead(mount, true);
1719                                 break;
1720
1721                         default:
1722                                 mount_set_state(mount, mount->state);
1723                                 break;
1724
1725                         }
1726
1727                 } else if (mount->just_mounted || mount->just_changed) {
1728
1729                         /* New or changed mount entry */
1730
1731                         switch (mount->state) {
1732
1733                         case MOUNT_DEAD:
1734                         case MOUNT_FAILED:
1735                                 mount_enter_mounted(mount, true);
1736                                 break;
1737
1738                         case MOUNT_MOUNTING:
1739                                 mount_enter_mounting_done(mount);
1740                                 break;
1741
1742                         default:
1743                                 /* Nothing really changed, but let's
1744                                  * issue an notification call
1745                                  * nonetheless, in case somebody is
1746                                  * waiting for this. (e.g. file system
1747                                  * ro/rw remounts.) */
1748                                 mount_set_state(mount, mount->state);
1749                                 break;
1750                         }
1751                 }
1752
1753                 /* Reset the flags for later calls */
1754                 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1755         }
1756 }
1757
1758 static void mount_reset_failed(Unit *u) {
1759         Mount *m = MOUNT(u);
1760
1761         assert(m);
1762
1763         if (m->state == MOUNT_FAILED)
1764                 mount_set_state(m, MOUNT_DEAD);
1765
1766         m->failure = false;
1767 }
1768
1769 static int mount_kill(Unit *u, KillWho who, KillMode mode, int signo, DBusError *error) {
1770         Mount *m = MOUNT(u);
1771         int r = 0;
1772         Set *pid_set = NULL;
1773
1774         assert(m);
1775
1776         if (who == KILL_MAIN) {
1777                 dbus_set_error(error, BUS_ERROR_NO_SUCH_PROCESS, "Mount units have no main processes");
1778                 return -ESRCH;
1779         }
1780
1781         if (m->control_pid <= 0 && who == KILL_CONTROL) {
1782                 dbus_set_error(error, BUS_ERROR_NO_SUCH_PROCESS, "No control process to kill");
1783                 return -ESRCH;
1784         }
1785
1786         if (who == KILL_CONTROL || who == KILL_ALL)
1787                 if (m->control_pid > 0)
1788                         if (kill(m->control_pid, signo) < 0)
1789                                 r = -errno;
1790
1791         if (who == KILL_ALL && mode == KILL_CONTROL_GROUP) {
1792                 int q;
1793
1794                 if (!(pid_set = set_new(trivial_hash_func, trivial_compare_func)))
1795                         return -ENOMEM;
1796
1797                 /* Exclude the control pid from being killed via the cgroup */
1798                 if (m->control_pid > 0)
1799                         if ((q = set_put(pid_set, LONG_TO_PTR(m->control_pid))) < 0) {
1800                                 r = q;
1801                                 goto finish;
1802                         }
1803
1804                 if ((q = cgroup_bonding_kill_list(m->meta.cgroup_bondings, signo, false, pid_set)) < 0)
1805                         if (q != -EAGAIN && q != -ESRCH && q != -ENOENT)
1806                                 r = q;
1807         }
1808
1809 finish:
1810         if (pid_set)
1811                 set_free(pid_set);
1812
1813         return r;
1814 }
1815
1816 static const char* const mount_state_table[_MOUNT_STATE_MAX] = {
1817         [MOUNT_DEAD] = "dead",
1818         [MOUNT_MOUNTING] = "mounting",
1819         [MOUNT_MOUNTING_DONE] = "mounting-done",
1820         [MOUNT_MOUNTED] = "mounted",
1821         [MOUNT_REMOUNTING] = "remounting",
1822         [MOUNT_UNMOUNTING] = "unmounting",
1823         [MOUNT_MOUNTING_SIGTERM] = "mounting-sigterm",
1824         [MOUNT_MOUNTING_SIGKILL] = "mounting-sigkill",
1825         [MOUNT_REMOUNTING_SIGTERM] = "remounting-sigterm",
1826         [MOUNT_REMOUNTING_SIGKILL] = "remounting-sigkill",
1827         [MOUNT_UNMOUNTING_SIGTERM] = "unmounting-sigterm",
1828         [MOUNT_UNMOUNTING_SIGKILL] = "unmounting-sigkill",
1829         [MOUNT_FAILED] = "failed"
1830 };
1831
1832 DEFINE_STRING_TABLE_LOOKUP(mount_state, MountState);
1833
1834 static const char* const mount_exec_command_table[_MOUNT_EXEC_COMMAND_MAX] = {
1835         [MOUNT_EXEC_MOUNT] = "ExecMount",
1836         [MOUNT_EXEC_UNMOUNT] = "ExecUnmount",
1837         [MOUNT_EXEC_REMOUNT] = "ExecRemount",
1838 };
1839
1840 DEFINE_STRING_TABLE_LOOKUP(mount_exec_command, MountExecCommand);
1841
1842 const UnitVTable mount_vtable = {
1843         .suffix = ".mount",
1844         .sections =
1845                 "Unit\0"
1846                 "Mount\0"
1847                 "Install\0",
1848
1849         .no_alias = true,
1850         .no_instances = true,
1851         .show_status = true,
1852
1853         .init = mount_init,
1854         .load = mount_load,
1855         .done = mount_done,
1856
1857         .coldplug = mount_coldplug,
1858
1859         .dump = mount_dump,
1860
1861         .start = mount_start,
1862         .stop = mount_stop,
1863         .reload = mount_reload,
1864
1865         .kill = mount_kill,
1866
1867         .serialize = mount_serialize,
1868         .deserialize_item = mount_deserialize_item,
1869
1870         .active_state = mount_active_state,
1871         .sub_state_to_string = mount_sub_state_to_string,
1872
1873         .check_gc = mount_check_gc,
1874
1875         .sigchld_event = mount_sigchld_event,
1876         .timer_event = mount_timer_event,
1877
1878         .reset_failed = mount_reset_failed,
1879
1880         .bus_interface = "org.freedesktop.systemd1.Mount",
1881         .bus_message_handler = bus_mount_message_handler,
1882         .bus_invalidating_properties =  bus_mount_invalidating_properties,
1883
1884         .enumerate = mount_enumerate,
1885         .shutdown = mount_shutdown
1886 };