chiark / gitweb /
execute: make setup_pam() return -errno when possible
[elogind.git] / src / mount.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <errno.h>
23 #include <stdio.h>
24 #include <mntent.h>
25 #include <sys/epoll.h>
26 #include <signal.h>
27
28 #include "unit.h"
29 #include "mount.h"
30 #include "load-fragment.h"
31 #include "load-dropin.h"
32 #include "log.h"
33 #include "strv.h"
34 #include "mount-setup.h"
35 #include "unit-name.h"
36 #include "dbus-mount.h"
37 #include "special.h"
38 #include "bus-errors.h"
39 #include "exit-status.h"
40 #include "def.h"
41
42 static const UnitActiveState state_translation_table[_MOUNT_STATE_MAX] = {
43         [MOUNT_DEAD] = UNIT_INACTIVE,
44         [MOUNT_MOUNTING] = UNIT_ACTIVATING,
45         [MOUNT_MOUNTING_DONE] = UNIT_ACTIVE,
46         [MOUNT_MOUNTED] = UNIT_ACTIVE,
47         [MOUNT_REMOUNTING] = UNIT_RELOADING,
48         [MOUNT_UNMOUNTING] = UNIT_DEACTIVATING,
49         [MOUNT_MOUNTING_SIGTERM] = UNIT_DEACTIVATING,
50         [MOUNT_MOUNTING_SIGKILL] = UNIT_DEACTIVATING,
51         [MOUNT_REMOUNTING_SIGTERM] = UNIT_RELOADING,
52         [MOUNT_REMOUNTING_SIGKILL] = UNIT_RELOADING,
53         [MOUNT_UNMOUNTING_SIGTERM] = UNIT_DEACTIVATING,
54         [MOUNT_UNMOUNTING_SIGKILL] = UNIT_DEACTIVATING,
55         [MOUNT_FAILED] = UNIT_FAILED
56 };
57
58 static void mount_init(Unit *u) {
59         Mount *m = MOUNT(u);
60
61         assert(u);
62         assert(u->meta.load_state == UNIT_STUB);
63
64         m->timeout_usec = DEFAULT_TIMEOUT_USEC;
65         m->directory_mode = 0755;
66
67         exec_context_init(&m->exec_context);
68
69         /* The stdio/kmsg bridge socket is on /, in order to avoid a
70          * dep loop, don't use kmsg logging for -.mount */
71         if (!unit_has_name(u, "-.mount"))
72                 m->exec_context.std_output = EXEC_OUTPUT_KMSG;
73
74         /* We need to make sure that /bin/mount is always called in
75          * the same process group as us, so that the autofs kernel
76          * side doesn't send us another mount request while we are
77          * already trying to comply its last one. */
78         m->exec_context.same_pgrp = true;
79
80         m->timer_watch.type = WATCH_INVALID;
81
82         m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
83
84         m->meta.ignore_on_isolate = true;
85 }
86
87 static void mount_unwatch_control_pid(Mount *m) {
88         assert(m);
89
90         if (m->control_pid <= 0)
91                 return;
92
93         unit_unwatch_pid(UNIT(m), m->control_pid);
94         m->control_pid = 0;
95 }
96
97 static void mount_parameters_done(MountParameters *p) {
98         assert(p);
99
100         free(p->what);
101         free(p->options);
102         free(p->fstype);
103
104         p->what = p->options = p->fstype = NULL;
105 }
106
107 static void mount_done(Unit *u) {
108         Mount *m = MOUNT(u);
109         Meta *other;
110
111         assert(m);
112
113         free(m->where);
114         m->where = NULL;
115
116         /* Try to detach us from the automount unit if there is any */
117         LIST_FOREACH(units_by_type, other, m->meta.manager->units_by_type[UNIT_AUTOMOUNT]) {
118                 Automount *a = (Automount*) other;
119
120                 if (a->mount == m)
121                         a->mount = NULL;
122         }
123
124         mount_parameters_done(&m->parameters_etc_fstab);
125         mount_parameters_done(&m->parameters_proc_self_mountinfo);
126         mount_parameters_done(&m->parameters_fragment);
127
128         exec_context_done(&m->exec_context);
129         exec_command_done_array(m->exec_command, _MOUNT_EXEC_COMMAND_MAX);
130         m->control_command = NULL;
131
132         mount_unwatch_control_pid(m);
133
134         unit_unwatch_timer(u, &m->timer_watch);
135 }
136
137 static MountParameters* get_mount_parameters_configured(Mount *m) {
138         assert(m);
139
140         if (m->from_fragment)
141                 return &m->parameters_fragment;
142         else if (m->from_etc_fstab)
143                 return &m->parameters_etc_fstab;
144
145         return NULL;
146 }
147
148 static MountParameters* get_mount_parameters(Mount *m) {
149         assert(m);
150
151         if (m->from_proc_self_mountinfo)
152                 return &m->parameters_proc_self_mountinfo;
153
154         return get_mount_parameters_configured(m);
155 }
156
157 static int mount_add_mount_links(Mount *m) {
158         Meta *other;
159         int r;
160         MountParameters *pm;
161
162         assert(m);
163
164         pm = get_mount_parameters_configured(m);
165
166         /* Adds in links to other mount points that might lie below or
167          * above us in the hierarchy */
168
169         LIST_FOREACH(units_by_type, other, m->meta.manager->units_by_type[UNIT_MOUNT]) {
170                 Mount *n = (Mount*) other;
171                 MountParameters *pn;
172
173                 if (n == m)
174                         continue;
175
176                 if (n->meta.load_state != UNIT_LOADED)
177                         continue;
178
179                 pn = get_mount_parameters_configured(n);
180
181                 if (path_startswith(m->where, n->where)) {
182
183                         if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
184                                 return r;
185
186                         if (pn)
187                                 if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
188                                         return r;
189
190                 } else if (path_startswith(n->where, m->where)) {
191
192                         if ((r = unit_add_dependency(UNIT(n), UNIT_AFTER, UNIT(m), true)) < 0)
193                                 return r;
194
195                         if (pm)
196                                 if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
197                                         return r;
198
199                 } else if (pm && path_startswith(pm->what, n->where)) {
200
201                         if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
202                                 return r;
203
204                         if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
205                                 return r;
206
207                 } else if (pn && path_startswith(pn->what, m->where)) {
208
209                         if ((r = unit_add_dependency(UNIT(n), UNIT_AFTER, UNIT(m), true)) < 0)
210                                 return r;
211
212                         if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
213                                 return r;
214                 }
215         }
216
217         return 0;
218 }
219
220 static int mount_add_swap_links(Mount *m) {
221         Meta *other;
222         int r;
223
224         assert(m);
225
226         LIST_FOREACH(units_by_type, other, m->meta.manager->units_by_type[UNIT_SWAP])
227                 if ((r = swap_add_one_mount_link((Swap*) other, m)) < 0)
228                         return r;
229
230         return 0;
231 }
232
233 static int mount_add_path_links(Mount *m) {
234         Meta *other;
235         int r;
236
237         assert(m);
238
239         LIST_FOREACH(units_by_type, other, m->meta.manager->units_by_type[UNIT_PATH])
240                 if ((r = path_add_one_mount_link((Path*) other, m)) < 0)
241                         return r;
242
243         return 0;
244 }
245
246 static int mount_add_automount_links(Mount *m) {
247         Meta *other;
248         int r;
249
250         assert(m);
251
252         LIST_FOREACH(units_by_type, other, m->meta.manager->units_by_type[UNIT_AUTOMOUNT])
253                 if ((r = automount_add_one_mount_link((Automount*) other, m)) < 0)
254                         return r;
255
256         return 0;
257 }
258
259 static int mount_add_socket_links(Mount *m) {
260         Meta *other;
261         int r;
262
263         assert(m);
264
265         LIST_FOREACH(units_by_type, other, m->meta.manager->units_by_type[UNIT_SOCKET])
266                 if ((r = socket_add_one_mount_link((Socket*) other, m)) < 0)
267                         return r;
268
269         return 0;
270 }
271
272 static char* mount_test_option(const char *haystack, const char *needle) {
273         struct mntent me;
274
275         assert(needle);
276
277         /* Like glibc's hasmntopt(), but works on a string, not a
278          * struct mntent */
279
280         if (!haystack)
281                 return false;
282
283         zero(me);
284         me.mnt_opts = (char*) haystack;
285
286         return hasmntopt(&me, needle);
287 }
288
289 static bool mount_is_network(MountParameters *p) {
290         assert(p);
291
292         if (mount_test_option(p->options, "_netdev"))
293                 return true;
294
295         if (p->fstype && fstype_is_network(p->fstype))
296                 return true;
297
298         return false;
299 }
300
301 static bool mount_is_bind(MountParameters *p) {
302         assert(p);
303
304         if (mount_test_option(p->options, "bind"))
305                 return true;
306
307         if (p->fstype && streq(p->fstype, "bind"))
308                 return true;
309
310         return false;
311 }
312
313 static bool needs_quota(MountParameters *p) {
314         assert(p);
315
316         if (mount_is_network(p))
317                 return false;
318
319         if (mount_is_bind(p))
320                 return false;
321
322         return mount_test_option(p->options, "usrquota") ||
323                 mount_test_option(p->options, "grpquota") ||
324                 mount_test_option(p->options, "quota") ||
325                 mount_test_option(p->options, "usrjquota") ||
326                 mount_test_option(p->options, "grpjquota");
327 }
328
329 static int mount_add_fstab_links(Mount *m) {
330         const char *target, *after = NULL, *after2 = NULL;
331         MountParameters *p;
332         Unit *tu;
333         int r;
334         bool noauto, nofail, handle, automount;
335
336         assert(m);
337
338         if (m->meta.manager->running_as != MANAGER_SYSTEM)
339                 return 0;
340
341         if (!(p = get_mount_parameters_configured(m)))
342                 return 0;
343
344         if (p != &m->parameters_etc_fstab)
345                 return 0;
346
347         noauto = !!mount_test_option(p->options, "noauto");
348         nofail = !!mount_test_option(p->options, "nofail");
349         automount =
350                 mount_test_option(p->options, "comment=systemd.automount") ||
351                 mount_test_option(p->options, "x-systemd-automount");
352         handle =
353                 automount ||
354                 mount_test_option(p->options, "comment=systemd.mount") ||
355                 mount_test_option(p->options, "x-systemd-mount") ||
356                 m->meta.manager->mount_auto;
357
358         if (mount_is_network(p)) {
359                 target = SPECIAL_REMOTE_FS_TARGET;
360                 after = SPECIAL_REMOTE_FS_PRE_TARGET;
361                 after2 = SPECIAL_NETWORK_TARGET;
362         } else {
363                 target = SPECIAL_LOCAL_FS_TARGET;
364                 after = SPECIAL_LOCAL_FS_PRE_TARGET;
365         }
366
367         if (!path_equal(m->where, "/"))
368                 if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_UMOUNT_TARGET, NULL, true)) < 0)
369                         return r;
370
371         if ((r = manager_load_unit(m->meta.manager, target, NULL, NULL, &tu)) < 0)
372                 return r;
373
374         if (after)
375                 if ((r = unit_add_dependency_by_name(UNIT(m), UNIT_AFTER, after, NULL, true)) < 0)
376                         return r;
377
378         if (after2)
379                 if ((r = unit_add_dependency_by_name(UNIT(m), UNIT_AFTER, after2, NULL, true)) < 0)
380                         return r;
381
382         if (automount) {
383                 Unit *am;
384
385                 if ((r = unit_load_related_unit(UNIT(m), ".automount", &am)) < 0)
386                         return r;
387
388                 /* If auto is configured as well also pull in the
389                  * mount right-away, but don't rely on it. */
390                 if (!noauto) /* automount + auto */
391                         if ((r = unit_add_dependency(tu, UNIT_WANTS, UNIT(m), true)) < 0)
392                                 return r;
393
394                 /* Install automount unit */
395                 if (!nofail) /* automount + fail */
396                         return unit_add_two_dependencies(tu, UNIT_AFTER, UNIT_REQUIRES, UNIT(am), true);
397                 else /* automount + nofail */
398                         return unit_add_two_dependencies(tu, UNIT_AFTER, UNIT_WANTS, UNIT(am), true);
399
400         } else if (handle && !noauto) {
401
402                 /* Automatically add mount points that aren't natively
403                  * configured to local-fs.target */
404
405                 if (!nofail) /* auto + fail */
406                         return unit_add_two_dependencies(tu, UNIT_AFTER, UNIT_REQUIRES, UNIT(m), true);
407                 else /* auto + nofail */
408                         return unit_add_dependency(tu, UNIT_WANTS, UNIT(m), true);
409         }
410
411         return 0;
412 }
413
414 static int mount_add_device_links(Mount *m) {
415         MountParameters *p;
416         int r;
417
418         assert(m);
419
420         if (!(p = get_mount_parameters_configured(m)))
421                 return 0;
422
423         if (!p->what)
424                 return 0;
425
426         if (!mount_is_bind(p) &&
427             !path_equal(m->where, "/") &&
428             p == &m->parameters_etc_fstab) {
429                 bool nofail, noauto;
430
431                 noauto = !!mount_test_option(p->options, "noauto");
432                 nofail = !!mount_test_option(p->options, "nofail");
433
434                 if ((r = unit_add_node_link(UNIT(m), p->what,
435                                             !noauto && nofail &&
436                                             UNIT(m)->meta.manager->running_as == MANAGER_SYSTEM)) < 0)
437                         return r;
438         }
439
440         if (p->passno > 0 &&
441             !mount_is_bind(p) &&
442             UNIT(m)->meta.manager->running_as == MANAGER_SYSTEM &&
443             !path_equal(m->where, "/")) {
444                 char *name;
445                 Unit *fsck;
446                 /* Let's add in the fsck service */
447
448                 /* aka SPECIAL_FSCK_SERVICE */
449                 if (!(name = unit_name_from_path_instance("fsck", p->what, ".service")))
450                         return -ENOMEM;
451
452                 if ((r = manager_load_unit_prepare(m->meta.manager, name, NULL, NULL, &fsck)) < 0) {
453                         log_warning("Failed to prepare unit %s: %s", name, strerror(-r));
454                         free(name);
455                         return r;
456                 }
457
458                 free(name);
459
460                 SERVICE(fsck)->fsck_passno = p->passno;
461
462                 if ((r = unit_add_two_dependencies(UNIT(m), UNIT_AFTER, UNIT_REQUIRES, fsck, true)) < 0)
463                         return r;
464         }
465
466         return 0;
467 }
468
469 static int mount_add_default_dependencies(Mount *m) {
470         int r;
471
472         assert(m);
473
474         if (m->meta.manager->running_as == MANAGER_SYSTEM &&
475             !path_equal(m->where, "/")) {
476                 MountParameters *p;
477
478                 p = get_mount_parameters_configured(m);
479
480                 if (p && needs_quota(p)) {
481                         if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_WANTS, SPECIAL_QUOTACHECK_SERVICE, NULL, true)) < 0 ||
482                             (r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_WANTS, SPECIAL_QUOTAON_SERVICE, NULL, true)) < 0)
483                                 return r;
484                 }
485
486                 if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_UMOUNT_TARGET, NULL, true)) < 0)
487                         return r;
488         }
489
490         return 0;
491 }
492
493 static int mount_fix_timeouts(Mount *m) {
494         MountParameters *p;
495         const char *timeout = NULL;
496         Unit *other;
497         Iterator i;
498         usec_t u;
499         char *t;
500         int r;
501
502         assert(m);
503
504         if (!(p = get_mount_parameters_configured(m)))
505                 return 0;
506
507         /* Allow configuration how long we wait for a device that
508          * backs a mount point to show up. This is useful to support
509          * endless device timeouts for devices that show up only after
510          * user input, like crypto devices. */
511
512         if ((timeout = mount_test_option(p->options, "comment=systemd.device-timeout")))
513                 timeout += 31;
514         else if ((timeout = mount_test_option(p->options, "x-systemd-device-timeout")))
515                 timeout += 25;
516         else
517                 return 0;
518
519         t = strndup(timeout, strcspn(timeout, ",;" WHITESPACE));
520         if (!t)
521                 return -ENOMEM;
522
523         r = parse_usec(t, &u);
524         free(t);
525
526         if (r < 0) {
527                 log_warning("Failed to parse timeout for %s, ignoring: %s", m->where, timeout);
528                 return r;
529         }
530
531         SET_FOREACH(other, m->meta.dependencies[UNIT_AFTER], i) {
532                 if (other->meta.type != UNIT_DEVICE)
533                         continue;
534
535                 other->meta.job_timeout = u;
536         }
537
538         return 0;
539 }
540
541 static int mount_verify(Mount *m) {
542         bool b;
543         char *e;
544         assert(m);
545
546         if (m->meta.load_state != UNIT_LOADED)
547                 return 0;
548
549         if (!m->from_etc_fstab && !m->from_fragment && !m->from_proc_self_mountinfo)
550                 return -ENOENT;
551
552         if (!(e = unit_name_from_path(m->where, ".mount")))
553                 return -ENOMEM;
554
555         b = unit_has_name(UNIT(m), e);
556         free(e);
557
558         if (!b) {
559                 log_error("%s's Where setting doesn't match unit name. Refusing.", m->meta.id);
560                 return -EINVAL;
561         }
562
563         if (mount_point_is_api(m->where) || mount_point_ignore(m->where)) {
564                 log_error("Cannot create mount unit for API file system %s. Refusing.", m->where);
565                 return -EINVAL;
566         }
567
568         if (m->meta.fragment_path && !m->parameters_fragment.what) {
569                 log_error("%s's What setting is missing. Refusing.", m->meta.id);
570                 return -EBADMSG;
571         }
572
573         if (m->exec_context.pam_name && m->exec_context.kill_mode != KILL_CONTROL_GROUP) {
574                 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", m->meta.id);
575                 return -EINVAL;
576         }
577
578         return 0;
579 }
580
581 static int mount_load(Unit *u) {
582         Mount *m = MOUNT(u);
583         int r;
584
585         assert(u);
586         assert(u->meta.load_state == UNIT_STUB);
587
588         if ((r = unit_load_fragment_and_dropin_optional(u)) < 0)
589                 return r;
590
591         /* This is a new unit? Then let's add in some extras */
592         if (u->meta.load_state == UNIT_LOADED) {
593                 if ((r = unit_add_exec_dependencies(u, &m->exec_context)) < 0)
594                         return r;
595
596                 if (m->meta.fragment_path)
597                         m->from_fragment = true;
598                 else if (m->from_etc_fstab)
599                         m->meta.default_dependencies = false;
600
601                 if (!m->where)
602                         if (!(m->where = unit_name_to_path(u->meta.id)))
603                                 return -ENOMEM;
604
605                 path_kill_slashes(m->where);
606
607                 if (!m->meta.description)
608                         if ((r = unit_set_description(u, m->where)) < 0)
609                                 return r;
610
611                 if ((r = mount_add_device_links(m)) < 0)
612                         return r;
613
614                 if ((r = mount_add_mount_links(m)) < 0)
615                         return r;
616
617                 if ((r = mount_add_socket_links(m)) < 0)
618                         return r;
619
620                 if ((r = mount_add_swap_links(m)) < 0)
621                         return r;
622
623                 if ((r = mount_add_path_links(m)) < 0)
624                         return r;
625
626                 if ((r = mount_add_automount_links(m)) < 0)
627                         return r;
628
629                 if ((r = mount_add_fstab_links(m)) < 0)
630                         return r;
631
632                 if (m->meta.default_dependencies)
633                         if ((r = mount_add_default_dependencies(m)) < 0)
634                                 return r;
635
636                 if ((r = unit_add_default_cgroups(u)) < 0)
637                         return r;
638
639                 mount_fix_timeouts(m);
640         }
641
642         return mount_verify(m);
643 }
644
645 static int mount_notify_automount(Mount *m, int status) {
646         Unit *p;
647         int r;
648
649         assert(m);
650
651         if ((r = unit_get_related_unit(UNIT(m), ".automount", &p)) < 0)
652                 return r == -ENOENT ? 0 : r;
653
654         return automount_send_ready(AUTOMOUNT(p), status);
655 }
656
657 static void mount_set_state(Mount *m, MountState state) {
658         MountState old_state;
659         assert(m);
660
661         old_state = m->state;
662         m->state = state;
663
664         if (state != MOUNT_MOUNTING &&
665             state != MOUNT_MOUNTING_DONE &&
666             state != MOUNT_REMOUNTING &&
667             state != MOUNT_UNMOUNTING &&
668             state != MOUNT_MOUNTING_SIGTERM &&
669             state != MOUNT_MOUNTING_SIGKILL &&
670             state != MOUNT_UNMOUNTING_SIGTERM &&
671             state != MOUNT_UNMOUNTING_SIGKILL &&
672             state != MOUNT_REMOUNTING_SIGTERM &&
673             state != MOUNT_REMOUNTING_SIGKILL) {
674                 unit_unwatch_timer(UNIT(m), &m->timer_watch);
675                 mount_unwatch_control_pid(m);
676                 m->control_command = NULL;
677                 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
678         }
679
680         if (state == MOUNT_MOUNTED ||
681             state == MOUNT_REMOUNTING)
682                 mount_notify_automount(m, 0);
683         else if (state == MOUNT_DEAD ||
684                  state == MOUNT_UNMOUNTING ||
685                  state == MOUNT_MOUNTING_SIGTERM ||
686                  state == MOUNT_MOUNTING_SIGKILL ||
687                  state == MOUNT_REMOUNTING_SIGTERM ||
688                  state == MOUNT_REMOUNTING_SIGKILL ||
689                  state == MOUNT_UNMOUNTING_SIGTERM ||
690                  state == MOUNT_UNMOUNTING_SIGKILL ||
691                  state == MOUNT_FAILED)
692                 mount_notify_automount(m, -ENODEV);
693
694         if (state != old_state)
695                 log_debug("%s changed %s -> %s",
696                           m->meta.id,
697                           mount_state_to_string(old_state),
698                           mount_state_to_string(state));
699
700         unit_notify(UNIT(m), state_translation_table[old_state], state_translation_table[state], !m->reload_failure);
701         m->reload_failure = false;
702 }
703
704 static int mount_coldplug(Unit *u) {
705         Mount *m = MOUNT(u);
706         MountState new_state = MOUNT_DEAD;
707         int r;
708
709         assert(m);
710         assert(m->state == MOUNT_DEAD);
711
712         if (m->deserialized_state != m->state)
713                 new_state = m->deserialized_state;
714         else if (m->from_proc_self_mountinfo)
715                 new_state = MOUNT_MOUNTED;
716
717         if (new_state != m->state) {
718
719                 if (new_state == MOUNT_MOUNTING ||
720                     new_state == MOUNT_MOUNTING_DONE ||
721                     new_state == MOUNT_REMOUNTING ||
722                     new_state == MOUNT_UNMOUNTING ||
723                     new_state == MOUNT_MOUNTING_SIGTERM ||
724                     new_state == MOUNT_MOUNTING_SIGKILL ||
725                     new_state == MOUNT_UNMOUNTING_SIGTERM ||
726                     new_state == MOUNT_UNMOUNTING_SIGKILL ||
727                     new_state == MOUNT_REMOUNTING_SIGTERM ||
728                     new_state == MOUNT_REMOUNTING_SIGKILL) {
729
730                         if (m->control_pid <= 0)
731                                 return -EBADMSG;
732
733                         if ((r = unit_watch_pid(UNIT(m), m->control_pid)) < 0)
734                                 return r;
735
736                         if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
737                                 return r;
738                 }
739
740                 mount_set_state(m, new_state);
741         }
742
743         return 0;
744 }
745
746 static void mount_dump(Unit *u, FILE *f, const char *prefix) {
747         Mount *m = MOUNT(u);
748         MountParameters *p;
749
750         assert(m);
751         assert(f);
752
753         p = get_mount_parameters(m);
754
755         fprintf(f,
756                 "%sMount State: %s\n"
757                 "%sWhere: %s\n"
758                 "%sWhat: %s\n"
759                 "%sFile System Type: %s\n"
760                 "%sOptions: %s\n"
761                 "%sFrom /etc/fstab: %s\n"
762                 "%sFrom /proc/self/mountinfo: %s\n"
763                 "%sFrom fragment: %s\n"
764                 "%sDirectoryMode: %04o\n",
765                 prefix, mount_state_to_string(m->state),
766                 prefix, m->where,
767                 prefix, strna(p->what),
768                 prefix, strna(p->fstype),
769                 prefix, strna(p->options),
770                 prefix, yes_no(m->from_etc_fstab),
771                 prefix, yes_no(m->from_proc_self_mountinfo),
772                 prefix, yes_no(m->from_fragment),
773                 prefix, m->directory_mode);
774
775         if (m->control_pid > 0)
776                 fprintf(f,
777                         "%sControl PID: %lu\n",
778                         prefix, (unsigned long) m->control_pid);
779
780         exec_context_dump(&m->exec_context, f, prefix);
781 }
782
783 static int mount_spawn(Mount *m, ExecCommand *c, pid_t *_pid) {
784         pid_t pid;
785         int r;
786
787         assert(m);
788         assert(c);
789         assert(_pid);
790
791         if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
792                 goto fail;
793
794         if ((r = exec_spawn(c,
795                             NULL,
796                             &m->exec_context,
797                             NULL, 0,
798                             m->meta.manager->environment,
799                             true,
800                             true,
801                             true,
802                             m->meta.manager->confirm_spawn,
803                             m->meta.cgroup_bondings,
804                             m->meta.cgroup_attributes,
805                             &pid)) < 0)
806                 goto fail;
807
808         if ((r = unit_watch_pid(UNIT(m), pid)) < 0)
809                 /* FIXME: we need to do something here */
810                 goto fail;
811
812         *_pid = pid;
813
814         return 0;
815
816 fail:
817         unit_unwatch_timer(UNIT(m), &m->timer_watch);
818
819         return r;
820 }
821
822 static void mount_enter_dead(Mount *m, bool success) {
823         assert(m);
824
825         if (!success)
826                 m->failure = true;
827
828         mount_set_state(m, m->failure ? MOUNT_FAILED : MOUNT_DEAD);
829 }
830
831 static void mount_enter_mounted(Mount *m, bool success) {
832         assert(m);
833
834         if (!success)
835                 m->failure = true;
836
837         mount_set_state(m, MOUNT_MOUNTED);
838 }
839
840 static void mount_enter_signal(Mount *m, MountState state, bool success) {
841         int r;
842         Set *pid_set = NULL;
843         bool wait_for_exit = false;
844
845         assert(m);
846
847         if (!success)
848                 m->failure = true;
849
850         if (m->exec_context.kill_mode != KILL_NONE) {
851                 int sig = (state == MOUNT_MOUNTING_SIGTERM ||
852                            state == MOUNT_UNMOUNTING_SIGTERM ||
853                            state == MOUNT_REMOUNTING_SIGTERM) ? m->exec_context.kill_signal : SIGKILL;
854
855                 if (m->control_pid > 0) {
856                         if (kill_and_sigcont(m->control_pid, sig) < 0 && errno != ESRCH)
857
858                                 log_warning("Failed to kill control process %li: %m", (long) m->control_pid);
859                         else
860                                 wait_for_exit = true;
861                 }
862
863                 if (m->exec_context.kill_mode == KILL_CONTROL_GROUP) {
864
865                         if (!(pid_set = set_new(trivial_hash_func, trivial_compare_func))) {
866                                 r = -ENOMEM;
867                                 goto fail;
868                         }
869
870                         /* Exclude the control pid from being killed via the cgroup */
871                         if (m->control_pid > 0)
872                                 if ((r = set_put(pid_set, LONG_TO_PTR(m->control_pid))) < 0)
873                                         goto fail;
874
875                         if ((r = cgroup_bonding_kill_list(m->meta.cgroup_bondings, sig, true, pid_set)) < 0) {
876                                 if (r != -EAGAIN && r != -ESRCH && r != -ENOENT)
877                                         log_warning("Failed to kill control group: %s", strerror(-r));
878                         } else if (r > 0)
879                                 wait_for_exit = true;
880
881                         set_free(pid_set);
882                         pid_set = NULL;
883                 }
884         }
885
886         if (wait_for_exit) {
887                 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
888                         goto fail;
889
890                 mount_set_state(m, state);
891         } else if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
892                 mount_enter_mounted(m, true);
893         else
894                 mount_enter_dead(m, true);
895
896         return;
897
898 fail:
899         log_warning("%s failed to kill processes: %s", m->meta.id, strerror(-r));
900
901         if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
902                 mount_enter_mounted(m, false);
903         else
904                 mount_enter_dead(m, false);
905
906         if (pid_set)
907                 set_free(pid_set);
908 }
909
910 static void mount_enter_unmounting(Mount *m, bool success) {
911         int r;
912
913         assert(m);
914
915         if (!success)
916                 m->failure = true;
917
918         m->control_command_id = MOUNT_EXEC_UNMOUNT;
919         m->control_command = m->exec_command + MOUNT_EXEC_UNMOUNT;
920
921         if ((r = exec_command_set(
922                              m->control_command,
923                              "/bin/umount",
924                              m->where,
925                              NULL)) < 0)
926                 goto fail;
927
928         mount_unwatch_control_pid(m);
929
930         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
931                 goto fail;
932
933         mount_set_state(m, MOUNT_UNMOUNTING);
934
935         return;
936
937 fail:
938         log_warning("%s failed to run 'umount' task: %s", m->meta.id, strerror(-r));
939         mount_enter_mounted(m, false);
940 }
941
942 static void mount_enter_mounting(Mount *m) {
943         int r;
944         MountParameters *p;
945
946         assert(m);
947
948         m->control_command_id = MOUNT_EXEC_MOUNT;
949         m->control_command = m->exec_command + MOUNT_EXEC_MOUNT;
950
951         mkdir_p(m->where, m->directory_mode);
952
953         /* Create the source directory for bind-mounts if needed */
954         p = get_mount_parameters_configured(m);
955         if (p && mount_is_bind(p))
956                 mkdir_p(p->what, m->directory_mode);
957
958         if (m->from_fragment)
959                 r = exec_command_set(
960                                 m->control_command,
961                                 "/bin/mount",
962                                 m->parameters_fragment.what,
963                                 m->where,
964                                 "-t", m->parameters_fragment.fstype ? m->parameters_fragment.fstype : "auto",
965                                 m->parameters_fragment.options ? "-o" : NULL, m->parameters_fragment.options,
966                                 NULL);
967         else if (m->from_etc_fstab)
968                 r = exec_command_set(
969                                 m->control_command,
970                                 "/bin/mount",
971                                 m->where,
972                                 NULL);
973         else
974                 r = -ENOENT;
975
976         if (r < 0)
977                 goto fail;
978
979         mount_unwatch_control_pid(m);
980
981         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
982                 goto fail;
983
984         mount_set_state(m, MOUNT_MOUNTING);
985
986         return;
987
988 fail:
989         log_warning("%s failed to run 'mount' task: %s", m->meta.id, strerror(-r));
990         mount_enter_dead(m, false);
991 }
992
993 static void mount_enter_mounting_done(Mount *m) {
994         assert(m);
995
996         mount_set_state(m, MOUNT_MOUNTING_DONE);
997 }
998
999 static void mount_enter_remounting(Mount *m, bool success) {
1000         int r;
1001
1002         assert(m);
1003
1004         if (!success)
1005                 m->failure = true;
1006
1007         m->control_command_id = MOUNT_EXEC_REMOUNT;
1008         m->control_command = m->exec_command + MOUNT_EXEC_REMOUNT;
1009
1010         if (m->from_fragment) {
1011                 char *buf = NULL;
1012                 const char *o;
1013
1014                 if (m->parameters_fragment.options) {
1015                         if (!(buf = strappend("remount,", m->parameters_fragment.options))) {
1016                                 r = -ENOMEM;
1017                                 goto fail;
1018                         }
1019
1020                         o = buf;
1021                 } else
1022                         o = "remount";
1023
1024                 r = exec_command_set(
1025                                 m->control_command,
1026                                 "/bin/mount",
1027                                 m->parameters_fragment.what,
1028                                 m->where,
1029                                 "-t", m->parameters_fragment.fstype ? m->parameters_fragment.fstype : "auto",
1030                                 "-o", o,
1031                                 NULL);
1032
1033                 free(buf);
1034         } else if (m->from_etc_fstab)
1035                 r = exec_command_set(
1036                                 m->control_command,
1037                                 "/bin/mount",
1038                                 m->where,
1039                                 "-o", "remount",
1040                                 NULL);
1041         else
1042                 r = -ENOENT;
1043
1044         if (r < 0)
1045                 goto fail;
1046
1047         mount_unwatch_control_pid(m);
1048
1049         if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
1050                 goto fail;
1051
1052         mount_set_state(m, MOUNT_REMOUNTING);
1053
1054         return;
1055
1056 fail:
1057         log_warning("%s failed to run 'remount' task: %s", m->meta.id, strerror(-r));
1058         m->reload_failure = true;
1059         mount_enter_mounted(m, true);
1060 }
1061
1062 static int mount_start(Unit *u) {
1063         Mount *m = MOUNT(u);
1064
1065         assert(m);
1066
1067         /* We cannot fulfill this request right now, try again later
1068          * please! */
1069         if (m->state == MOUNT_UNMOUNTING ||
1070             m->state == MOUNT_UNMOUNTING_SIGTERM ||
1071             m->state == MOUNT_UNMOUNTING_SIGKILL ||
1072             m->state == MOUNT_MOUNTING_SIGTERM ||
1073             m->state == MOUNT_MOUNTING_SIGKILL)
1074                 return -EAGAIN;
1075
1076         /* Already on it! */
1077         if (m->state == MOUNT_MOUNTING)
1078                 return 0;
1079
1080         assert(m->state == MOUNT_DEAD || m->state == MOUNT_FAILED);
1081
1082         m->failure = false;
1083         mount_enter_mounting(m);
1084         return 0;
1085 }
1086
1087 static int mount_stop(Unit *u) {
1088         Mount *m = MOUNT(u);
1089
1090         assert(m);
1091
1092         /* Already on it */
1093         if (m->state == MOUNT_UNMOUNTING ||
1094             m->state == MOUNT_UNMOUNTING_SIGKILL ||
1095             m->state == MOUNT_UNMOUNTING_SIGTERM ||
1096             m->state == MOUNT_MOUNTING_SIGTERM ||
1097             m->state == MOUNT_MOUNTING_SIGKILL)
1098                 return 0;
1099
1100         assert(m->state == MOUNT_MOUNTING ||
1101                m->state == MOUNT_MOUNTING_DONE ||
1102                m->state == MOUNT_MOUNTED ||
1103                m->state == MOUNT_REMOUNTING ||
1104                m->state == MOUNT_REMOUNTING_SIGTERM ||
1105                m->state == MOUNT_REMOUNTING_SIGKILL);
1106
1107         mount_enter_unmounting(m, true);
1108         return 0;
1109 }
1110
1111 static int mount_reload(Unit *u) {
1112         Mount *m = MOUNT(u);
1113
1114         assert(m);
1115
1116         if (m->state == MOUNT_MOUNTING_DONE)
1117                 return -EAGAIN;
1118
1119         assert(m->state == MOUNT_MOUNTED);
1120
1121         mount_enter_remounting(m, true);
1122         return 0;
1123 }
1124
1125 static int mount_serialize(Unit *u, FILE *f, FDSet *fds) {
1126         Mount *m = MOUNT(u);
1127
1128         assert(m);
1129         assert(f);
1130         assert(fds);
1131
1132         unit_serialize_item(u, f, "state", mount_state_to_string(m->state));
1133         unit_serialize_item(u, f, "failure", yes_no(m->failure));
1134
1135         if (m->control_pid > 0)
1136                 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) m->control_pid);
1137
1138         if (m->control_command_id >= 0)
1139                 unit_serialize_item(u, f, "control-command", mount_exec_command_to_string(m->control_command_id));
1140
1141         return 0;
1142 }
1143
1144 static int mount_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1145         Mount *m = MOUNT(u);
1146
1147         assert(u);
1148         assert(key);
1149         assert(value);
1150         assert(fds);
1151
1152         if (streq(key, "state")) {
1153                 MountState state;
1154
1155                 if ((state = mount_state_from_string(value)) < 0)
1156                         log_debug("Failed to parse state value %s", value);
1157                 else
1158                         m->deserialized_state = state;
1159         } else if (streq(key, "failure")) {
1160                 int b;
1161
1162                 if ((b = parse_boolean(value)) < 0)
1163                         log_debug("Failed to parse failure value %s", value);
1164                 else
1165                         m->failure = b || m->failure;
1166
1167         } else if (streq(key, "control-pid")) {
1168                 pid_t pid;
1169
1170                 if (parse_pid(value, &pid) < 0)
1171                         log_debug("Failed to parse control-pid value %s", value);
1172                 else
1173                         m->control_pid = pid;
1174         } else if (streq(key, "control-command")) {
1175                 MountExecCommand id;
1176
1177                 if ((id = mount_exec_command_from_string(value)) < 0)
1178                         log_debug("Failed to parse exec-command value %s", value);
1179                 else {
1180                         m->control_command_id = id;
1181                         m->control_command = m->exec_command + id;
1182                 }
1183
1184         } else
1185                 log_debug("Unknown serialization key '%s'", key);
1186
1187         return 0;
1188 }
1189
1190 static UnitActiveState mount_active_state(Unit *u) {
1191         assert(u);
1192
1193         return state_translation_table[MOUNT(u)->state];
1194 }
1195
1196 static const char *mount_sub_state_to_string(Unit *u) {
1197         assert(u);
1198
1199         return mount_state_to_string(MOUNT(u)->state);
1200 }
1201
1202 static bool mount_check_gc(Unit *u) {
1203         Mount *m = MOUNT(u);
1204
1205         assert(m);
1206
1207         return m->from_etc_fstab || m->from_proc_self_mountinfo;
1208 }
1209
1210 static void mount_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1211         Mount *m = MOUNT(u);
1212         bool success;
1213
1214         assert(m);
1215         assert(pid >= 0);
1216
1217         if (pid != m->control_pid)
1218                 return;
1219
1220         m->control_pid = 0;
1221
1222         success = is_clean_exit(code, status);
1223         m->failure = m->failure || !success;
1224
1225         if (m->control_command) {
1226                 exec_status_exit(&m->control_command->exec_status, &m->exec_context, pid, code, status);
1227                 m->control_command = NULL;
1228                 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
1229         }
1230
1231         log_full(success ? LOG_DEBUG : LOG_NOTICE,
1232                  "%s mount process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
1233
1234         /* Note that mount(8) returning and the kernel sending us a
1235          * mount table change event might happen out-of-order. If an
1236          * operation succeed we assume the kernel will follow soon too
1237          * and already change into the resulting state.  If it fails
1238          * we check if the kernel still knows about the mount. and
1239          * change state accordingly. */
1240
1241         switch (m->state) {
1242
1243         case MOUNT_MOUNTING:
1244         case MOUNT_MOUNTING_DONE:
1245         case MOUNT_MOUNTING_SIGKILL:
1246         case MOUNT_MOUNTING_SIGTERM:
1247
1248                 if (success)
1249                         mount_enter_mounted(m, true);
1250                 else if (m->from_proc_self_mountinfo)
1251                         mount_enter_mounted(m, false);
1252                 else
1253                         mount_enter_dead(m, false);
1254                 break;
1255
1256         case MOUNT_REMOUNTING:
1257         case MOUNT_REMOUNTING_SIGKILL:
1258         case MOUNT_REMOUNTING_SIGTERM:
1259
1260                 m->reload_failure = !success;
1261                 if (m->from_proc_self_mountinfo)
1262                         mount_enter_mounted(m, true);
1263                 else
1264                         mount_enter_dead(m, true);
1265
1266                 break;
1267
1268         case MOUNT_UNMOUNTING:
1269         case MOUNT_UNMOUNTING_SIGKILL:
1270         case MOUNT_UNMOUNTING_SIGTERM:
1271
1272                 if (success)
1273                         mount_enter_dead(m, true);
1274                 else if (m->from_proc_self_mountinfo)
1275                         mount_enter_mounted(m, false);
1276                 else
1277                         mount_enter_dead(m, false);
1278                 break;
1279
1280         default:
1281                 assert_not_reached("Uh, control process died at wrong time.");
1282         }
1283
1284         /* Notify clients about changed exit status */
1285         unit_add_to_dbus_queue(u);
1286 }
1287
1288 static void mount_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
1289         Mount *m = MOUNT(u);
1290
1291         assert(m);
1292         assert(elapsed == 1);
1293         assert(w == &m->timer_watch);
1294
1295         switch (m->state) {
1296
1297         case MOUNT_MOUNTING:
1298         case MOUNT_MOUNTING_DONE:
1299                 log_warning("%s mounting timed out. Stopping.", u->meta.id);
1300                 mount_enter_signal(m, MOUNT_MOUNTING_SIGTERM, false);
1301                 break;
1302
1303         case MOUNT_REMOUNTING:
1304                 log_warning("%s remounting timed out. Stopping.", u->meta.id);
1305                 m->reload_failure = true;
1306                 mount_enter_mounted(m, true);
1307                 break;
1308
1309         case MOUNT_UNMOUNTING:
1310                 log_warning("%s unmounting timed out. Stopping.", u->meta.id);
1311                 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGTERM, false);
1312                 break;
1313
1314         case MOUNT_MOUNTING_SIGTERM:
1315                 if (m->exec_context.send_sigkill) {
1316                         log_warning("%s mounting timed out. Killing.", u->meta.id);
1317                         mount_enter_signal(m, MOUNT_MOUNTING_SIGKILL, false);
1318                 } else {
1319                         log_warning("%s mounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1320
1321                         if (m->from_proc_self_mountinfo)
1322                                 mount_enter_mounted(m, false);
1323                         else
1324                                 mount_enter_dead(m, false);
1325                 }
1326                 break;
1327
1328         case MOUNT_REMOUNTING_SIGTERM:
1329                 if (m->exec_context.send_sigkill) {
1330                         log_warning("%s remounting timed out. Killing.", u->meta.id);
1331                         mount_enter_signal(m, MOUNT_REMOUNTING_SIGKILL, false);
1332                 } else {
1333                         log_warning("%s remounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1334
1335                         if (m->from_proc_self_mountinfo)
1336                                 mount_enter_mounted(m, false);
1337                         else
1338                                 mount_enter_dead(m, false);
1339                 }
1340                 break;
1341
1342         case MOUNT_UNMOUNTING_SIGTERM:
1343                 if (m->exec_context.send_sigkill) {
1344                         log_warning("%s unmounting timed out. Killing.", u->meta.id);
1345                         mount_enter_signal(m, MOUNT_UNMOUNTING_SIGKILL, false);
1346                 } else {
1347                         log_warning("%s unmounting timed out. Skipping SIGKILL. Ignoring.", u->meta.id);
1348
1349                         if (m->from_proc_self_mountinfo)
1350                                 mount_enter_mounted(m, false);
1351                         else
1352                                 mount_enter_dead(m, false);
1353                 }
1354                 break;
1355
1356         case MOUNT_MOUNTING_SIGKILL:
1357         case MOUNT_REMOUNTING_SIGKILL:
1358         case MOUNT_UNMOUNTING_SIGKILL:
1359                 log_warning("%s mount process still around after SIGKILL. Ignoring.", u->meta.id);
1360
1361                 if (m->from_proc_self_mountinfo)
1362                         mount_enter_mounted(m, false);
1363                 else
1364                         mount_enter_dead(m, false);
1365                 break;
1366
1367         default:
1368                 assert_not_reached("Timeout at wrong time.");
1369         }
1370 }
1371
1372 static int mount_add_one(
1373                 Manager *m,
1374                 const char *what,
1375                 const char *where,
1376                 const char *options,
1377                 const char *fstype,
1378                 int passno,
1379                 bool from_proc_self_mountinfo,
1380                 bool set_flags) {
1381         int r;
1382         Unit *u;
1383         bool delete;
1384         char *e, *w = NULL, *o = NULL, *f = NULL;
1385         MountParameters *p;
1386
1387         assert(m);
1388         assert(what);
1389         assert(where);
1390         assert(options);
1391         assert(fstype);
1392
1393         assert(!set_flags || from_proc_self_mountinfo);
1394
1395         /* Ignore API mount points. They should never be referenced in
1396          * dependencies ever. */
1397         if (mount_point_is_api(where) || mount_point_ignore(where))
1398                 return 0;
1399
1400         if (streq(fstype, "autofs"))
1401                 return 0;
1402
1403         /* probably some kind of swap, ignore */
1404         if (!is_path(where))
1405                 return 0;
1406
1407         if (!(e = unit_name_from_path(where, ".mount")))
1408                 return -ENOMEM;
1409
1410         if (!(u = manager_get_unit(m, e))) {
1411                 delete = true;
1412
1413                 if (!(u = unit_new(m))) {
1414                         free(e);
1415                         return -ENOMEM;
1416                 }
1417
1418                 r = unit_add_name(u, e);
1419                 free(e);
1420
1421                 if (r < 0)
1422                         goto fail;
1423
1424                 if (!(MOUNT(u)->where = strdup(where))) {
1425                         r = -ENOMEM;
1426                         goto fail;
1427                 }
1428
1429                 unit_add_to_load_queue(u);
1430         } else {
1431                 delete = false;
1432                 free(e);
1433         }
1434
1435         if (!(w = strdup(what)) ||
1436             !(o = strdup(options)) ||
1437             !(f = strdup(fstype))) {
1438                 r = -ENOMEM;
1439                 goto fail;
1440         }
1441
1442         if (from_proc_self_mountinfo) {
1443                 p = &MOUNT(u)->parameters_proc_self_mountinfo;
1444
1445                 if (set_flags) {
1446                         MOUNT(u)->is_mounted = true;
1447                         MOUNT(u)->just_mounted = !MOUNT(u)->from_proc_self_mountinfo;
1448                         MOUNT(u)->just_changed = !streq_ptr(p->options, o);
1449                 }
1450
1451                 MOUNT(u)->from_proc_self_mountinfo = true;
1452         } else {
1453                 p = &MOUNT(u)->parameters_etc_fstab;
1454                 MOUNT(u)->from_etc_fstab = true;
1455         }
1456
1457         free(p->what);
1458         p->what = w;
1459
1460         free(p->options);
1461         p->options = o;
1462
1463         free(p->fstype);
1464         p->fstype = f;
1465
1466         p->passno = passno;
1467
1468         unit_add_to_dbus_queue(u);
1469
1470         return 0;
1471
1472 fail:
1473         free(w);
1474         free(o);
1475         free(f);
1476
1477         if (delete && u)
1478                 unit_free(u);
1479
1480         return r;
1481 }
1482
1483 static int mount_find_pri(char *options) {
1484         char *end, *pri;
1485         unsigned long r;
1486
1487         if (!(pri = mount_test_option(options, "pri")))
1488                 return 0;
1489
1490         pri += 4;
1491
1492         errno = 0;
1493         r = strtoul(pri, &end, 10);
1494
1495         if (errno != 0)
1496                 return -errno;
1497
1498         if (end == pri || (*end != ',' && *end != 0))
1499                 return -EINVAL;
1500
1501         return (int) r;
1502 }
1503
1504 static int mount_load_etc_fstab(Manager *m) {
1505         FILE *f;
1506         int r = 0;
1507         struct mntent* me;
1508
1509         assert(m);
1510
1511         errno = 0;
1512         if (!(f = setmntent("/etc/fstab", "r")))
1513                 return -errno;
1514
1515         while ((me = getmntent(f))) {
1516                 char *where, *what;
1517                 int k;
1518
1519                 if (!(what = fstab_node_to_udev_node(me->mnt_fsname))) {
1520                         r = -ENOMEM;
1521                         goto finish;
1522                 }
1523
1524                 if (!(where = strdup(me->mnt_dir))) {
1525                         free(what);
1526                         r = -ENOMEM;
1527                         goto finish;
1528                 }
1529
1530                 if (what[0] == '/')
1531                         path_kill_slashes(what);
1532
1533                 if (where[0] == '/')
1534                         path_kill_slashes(where);
1535
1536                 if (streq(me->mnt_type, "swap")) {
1537                         int pri;
1538
1539                         if ((pri = mount_find_pri(me->mnt_opts)) < 0)
1540                                 k = pri;
1541                         else
1542                                 k = swap_add_one(m,
1543                                                  what,
1544                                                  NULL,
1545                                                  pri,
1546                                                  !!mount_test_option(me->mnt_opts, "noauto"),
1547                                                  !!mount_test_option(me->mnt_opts, "nofail"),
1548                                                  !!mount_test_option(me->mnt_opts, "comment=systemd.swapon"),
1549                                                  false);
1550                 } else
1551                         k = mount_add_one(m, what, where, me->mnt_opts, me->mnt_type, me->mnt_passno, false, false);
1552
1553                 free(what);
1554                 free(where);
1555
1556                 if (r < 0)
1557                         r = k;
1558         }
1559
1560 finish:
1561
1562         endmntent(f);
1563         return r;
1564 }
1565
1566 static int mount_load_proc_self_mountinfo(Manager *m, bool set_flags) {
1567         int r = 0;
1568         unsigned i;
1569         char *device, *path, *options, *options2, *fstype, *d, *p, *o;
1570
1571         assert(m);
1572
1573         rewind(m->proc_self_mountinfo);
1574
1575         for (i = 1;; i++) {
1576                 int k;
1577
1578                 device = path = options = options2 = fstype = d = p = o = NULL;
1579
1580                 if ((k = fscanf(m->proc_self_mountinfo,
1581                                 "%*s "       /* (1) mount id */
1582                                 "%*s "       /* (2) parent id */
1583                                 "%*s "       /* (3) major:minor */
1584                                 "%*s "       /* (4) root */
1585                                 "%ms "       /* (5) mount point */
1586                                 "%ms"        /* (6) mount options */
1587                                 "%*[^-]"     /* (7) optional fields */
1588                                 "- "         /* (8) separator */
1589                                 "%ms "       /* (9) file system type */
1590                                 "%ms"        /* (10) mount source */
1591                                 "%ms"        /* (11) mount options 2 */
1592                                 "%*[^\n]",   /* some rubbish at the end */
1593                                 &path,
1594                                 &options,
1595                                 &fstype,
1596                                 &device,
1597                                 &options2)) != 5) {
1598
1599                         if (k == EOF)
1600                                 break;
1601
1602                         log_warning("Failed to parse /proc/self/mountinfo:%u.", i);
1603                         goto clean_up;
1604                 }
1605
1606                 if (asprintf(&o, "%s,%s", options, options2) < 0) {
1607                         r = -ENOMEM;
1608                         goto finish;
1609                 }
1610
1611                 if (!(d = cunescape(device)) ||
1612                     !(p = cunescape(path))) {
1613                         r = -ENOMEM;
1614                         goto finish;
1615                 }
1616
1617                 if ((k = mount_add_one(m, d, p, o, fstype, 0, true, set_flags)) < 0)
1618                         r = k;
1619
1620 clean_up:
1621                 free(device);
1622                 free(path);
1623                 free(options);
1624                 free(options2);
1625                 free(fstype);
1626                 free(d);
1627                 free(p);
1628                 free(o);
1629         }
1630
1631 finish:
1632         free(device);
1633         free(path);
1634         free(options);
1635         free(options2);
1636         free(fstype);
1637         free(d);
1638         free(p);
1639         free(o);
1640
1641         return r;
1642 }
1643
1644 static void mount_shutdown(Manager *m) {
1645         assert(m);
1646
1647         if (m->proc_self_mountinfo) {
1648                 fclose(m->proc_self_mountinfo);
1649                 m->proc_self_mountinfo = NULL;
1650         }
1651 }
1652
1653 static int mount_enumerate(Manager *m) {
1654         int r;
1655         struct epoll_event ev;
1656         assert(m);
1657
1658         if (!m->proc_self_mountinfo) {
1659                 if (!(m->proc_self_mountinfo = fopen("/proc/self/mountinfo", "re")))
1660                         return -errno;
1661
1662                 m->mount_watch.type = WATCH_MOUNT;
1663                 m->mount_watch.fd = fileno(m->proc_self_mountinfo);
1664
1665                 zero(ev);
1666                 ev.events = EPOLLPRI;
1667                 ev.data.ptr = &m->mount_watch;
1668
1669                 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->mount_watch.fd, &ev) < 0)
1670                         return -errno;
1671         }
1672
1673         if ((r = mount_load_etc_fstab(m)) < 0)
1674                 goto fail;
1675
1676         if ((r = mount_load_proc_self_mountinfo(m, false)) < 0)
1677                 goto fail;
1678
1679         return 0;
1680
1681 fail:
1682         mount_shutdown(m);
1683         return r;
1684 }
1685
1686 void mount_fd_event(Manager *m, int events) {
1687         Meta *meta;
1688         int r;
1689
1690         assert(m);
1691         assert(events & EPOLLPRI);
1692
1693         /* The manager calls this for every fd event happening on the
1694          * /proc/self/mountinfo file, which informs us about mounting
1695          * table changes */
1696
1697         if ((r = mount_load_proc_self_mountinfo(m, true)) < 0) {
1698                 log_error("Failed to reread /proc/self/mountinfo: %s", strerror(-r));
1699
1700                 /* Reset flags, just in case, for later calls */
1701                 LIST_FOREACH(units_by_type, meta, m->units_by_type[UNIT_MOUNT]) {
1702                         Mount *mount = (Mount*) meta;
1703
1704                         mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1705                 }
1706
1707                 return;
1708         }
1709
1710         manager_dispatch_load_queue(m);
1711
1712         LIST_FOREACH(units_by_type, meta, m->units_by_type[UNIT_MOUNT]) {
1713                 Mount *mount = (Mount*) meta;
1714
1715                 if (!mount->is_mounted) {
1716                         /* This has just been unmounted. */
1717
1718                         mount->from_proc_self_mountinfo = false;
1719
1720                         switch (mount->state) {
1721
1722                         case MOUNT_MOUNTED:
1723                                 mount_enter_dead(mount, true);
1724                                 break;
1725
1726                         default:
1727                                 mount_set_state(mount, mount->state);
1728                                 break;
1729
1730                         }
1731
1732                 } else if (mount->just_mounted || mount->just_changed) {
1733
1734                         /* New or changed mount entry */
1735
1736                         switch (mount->state) {
1737
1738                         case MOUNT_DEAD:
1739                         case MOUNT_FAILED:
1740                                 mount_enter_mounted(mount, true);
1741                                 break;
1742
1743                         case MOUNT_MOUNTING:
1744                                 mount_enter_mounting_done(mount);
1745                                 break;
1746
1747                         default:
1748                                 /* Nothing really changed, but let's
1749                                  * issue an notification call
1750                                  * nonetheless, in case somebody is
1751                                  * waiting for this. (e.g. file system
1752                                  * ro/rw remounts.) */
1753                                 mount_set_state(mount, mount->state);
1754                                 break;
1755                         }
1756                 }
1757
1758                 /* Reset the flags for later calls */
1759                 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1760         }
1761 }
1762
1763 static void mount_reset_failed(Unit *u) {
1764         Mount *m = MOUNT(u);
1765
1766         assert(m);
1767
1768         if (m->state == MOUNT_FAILED)
1769                 mount_set_state(m, MOUNT_DEAD);
1770
1771         m->failure = false;
1772 }
1773
1774 static int mount_kill(Unit *u, KillWho who, KillMode mode, int signo, DBusError *error) {
1775         Mount *m = MOUNT(u);
1776         int r = 0;
1777         Set *pid_set = NULL;
1778
1779         assert(m);
1780
1781         if (who == KILL_MAIN) {
1782                 dbus_set_error(error, BUS_ERROR_NO_SUCH_PROCESS, "Mount units have no main processes");
1783                 return -ESRCH;
1784         }
1785
1786         if (m->control_pid <= 0 && who == KILL_CONTROL) {
1787                 dbus_set_error(error, BUS_ERROR_NO_SUCH_PROCESS, "No control process to kill");
1788                 return -ESRCH;
1789         }
1790
1791         if (who == KILL_CONTROL || who == KILL_ALL)
1792                 if (m->control_pid > 0)
1793                         if (kill(m->control_pid, signo) < 0)
1794                                 r = -errno;
1795
1796         if (who == KILL_ALL && mode == KILL_CONTROL_GROUP) {
1797                 int q;
1798
1799                 if (!(pid_set = set_new(trivial_hash_func, trivial_compare_func)))
1800                         return -ENOMEM;
1801
1802                 /* Exclude the control pid from being killed via the cgroup */
1803                 if (m->control_pid > 0)
1804                         if ((q = set_put(pid_set, LONG_TO_PTR(m->control_pid))) < 0) {
1805                                 r = q;
1806                                 goto finish;
1807                         }
1808
1809                 if ((q = cgroup_bonding_kill_list(m->meta.cgroup_bondings, signo, false, pid_set)) < 0)
1810                         if (q != -EAGAIN && q != -ESRCH && q != -ENOENT)
1811                                 r = q;
1812         }
1813
1814 finish:
1815         if (pid_set)
1816                 set_free(pid_set);
1817
1818         return r;
1819 }
1820
1821 static const char* const mount_state_table[_MOUNT_STATE_MAX] = {
1822         [MOUNT_DEAD] = "dead",
1823         [MOUNT_MOUNTING] = "mounting",
1824         [MOUNT_MOUNTING_DONE] = "mounting-done",
1825         [MOUNT_MOUNTED] = "mounted",
1826         [MOUNT_REMOUNTING] = "remounting",
1827         [MOUNT_UNMOUNTING] = "unmounting",
1828         [MOUNT_MOUNTING_SIGTERM] = "mounting-sigterm",
1829         [MOUNT_MOUNTING_SIGKILL] = "mounting-sigkill",
1830         [MOUNT_REMOUNTING_SIGTERM] = "remounting-sigterm",
1831         [MOUNT_REMOUNTING_SIGKILL] = "remounting-sigkill",
1832         [MOUNT_UNMOUNTING_SIGTERM] = "unmounting-sigterm",
1833         [MOUNT_UNMOUNTING_SIGKILL] = "unmounting-sigkill",
1834         [MOUNT_FAILED] = "failed"
1835 };
1836
1837 DEFINE_STRING_TABLE_LOOKUP(mount_state, MountState);
1838
1839 static const char* const mount_exec_command_table[_MOUNT_EXEC_COMMAND_MAX] = {
1840         [MOUNT_EXEC_MOUNT] = "ExecMount",
1841         [MOUNT_EXEC_UNMOUNT] = "ExecUnmount",
1842         [MOUNT_EXEC_REMOUNT] = "ExecRemount",
1843 };
1844
1845 DEFINE_STRING_TABLE_LOOKUP(mount_exec_command, MountExecCommand);
1846
1847 const UnitVTable mount_vtable = {
1848         .suffix = ".mount",
1849         .sections =
1850                 "Unit\0"
1851                 "Mount\0"
1852                 "Install\0",
1853
1854         .no_alias = true,
1855         .no_instances = true,
1856         .show_status = true,
1857
1858         .init = mount_init,
1859         .load = mount_load,
1860         .done = mount_done,
1861
1862         .coldplug = mount_coldplug,
1863
1864         .dump = mount_dump,
1865
1866         .start = mount_start,
1867         .stop = mount_stop,
1868         .reload = mount_reload,
1869
1870         .kill = mount_kill,
1871
1872         .serialize = mount_serialize,
1873         .deserialize_item = mount_deserialize_item,
1874
1875         .active_state = mount_active_state,
1876         .sub_state_to_string = mount_sub_state_to_string,
1877
1878         .check_gc = mount_check_gc,
1879
1880         .sigchld_event = mount_sigchld_event,
1881         .timer_event = mount_timer_event,
1882
1883         .reset_failed = mount_reset_failed,
1884
1885         .bus_interface = "org.freedesktop.systemd1.Mount",
1886         .bus_message_handler = bus_mount_message_handler,
1887         .bus_invalidating_properties =  bus_mount_invalidating_properties,
1888
1889         .enumerate = mount_enumerate,
1890         .shutdown = mount_shutdown
1891 };