/* SPDX-License-Identifier: LGPL-2.1+ */ /*** This file is part of systemd. Copyright 2016 Lennart Poettering systemd is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. systemd is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with systemd; If not, see . ***/ #include #include "libudev.h" #include "sd-bus.h" #include "bus-error.h" #include "bus-unit-util.h" #include "bus-util.h" #include "dirent-util.h" #include "escape.h" #include "fd-util.h" #include "fileio.h" #include "fs-util.h" #include "fstab-util.h" #include "mount-util.h" #include "pager.h" #include "parse-util.h" #include "path-util.h" #include "spawn-polkit-agent.h" #include "stat-util.h" #include "strv.h" #include "udev-util.h" #include "unit-def.h" #include "unit-name.h" #include "user-util.h" #include "terminal-util.h" enum { ACTION_DEFAULT, ACTION_MOUNT, ACTION_AUTOMOUNT, ACTION_UMOUNT, ACTION_LIST, } arg_action = ACTION_DEFAULT; static bool arg_no_block = false; static bool arg_no_pager = false; static bool arg_ask_password = true; static bool arg_quiet = false; static BusTransport arg_transport = BUS_TRANSPORT_LOCAL; static bool arg_user = false; static const char *arg_host = NULL; static bool arg_discover = false; static char *arg_mount_what = NULL; static char *arg_mount_where = NULL; static char *arg_mount_type = NULL; static char *arg_mount_options = NULL; static char *arg_description = NULL; static char **arg_property = NULL; static usec_t arg_timeout_idle = USEC_INFINITY; static bool arg_timeout_idle_set = false; static char **arg_automount_property = NULL; static int arg_bind_device = -1; static uid_t arg_uid = UID_INVALID; static gid_t arg_gid = GID_INVALID; static bool arg_fsck = true; static bool arg_aggressive_gc = false; static void help(void) { printf("systemd-mount [OPTIONS...] WHAT [WHERE]\n" "systemd-mount [OPTIONS...] --list\n" "%s [OPTIONS...] %sWHAT|WHERE...\n\n" "Establish a mount or auto-mount point transiently.\n\n" " -h --help Show this help\n" " --version Show package version\n" " --no-block Do not wait until operation finished\n" " --no-pager Do not pipe output into a pager\n" " --no-ask-password Do not prompt for password\n" " -q --quiet Suppress information messages during runtime\n" " --user Run as user unit\n" " -H --host=[USER@]HOST Operate on remote host\n" " -M --machine=CONTAINER Operate on local container\n" " --discover Discover mount device metadata\n" " -t --type=TYPE File system type\n" " -o --options=OPTIONS Mount options\n" " --owner=USER Add uid= and gid= options for USER\n" " --fsck=no Don't run file system check before mount\n" " --description=TEXT Description for unit\n" " -p --property=NAME=VALUE Set mount unit property\n" " -A --automount=BOOL Create an auto-mount point\n" " --timeout-idle-sec=SEC Specify automount idle timeout\n" " --automount-property=NAME=VALUE\n" " Set automount unit property\n" " --bind-device Bind automount unit to device\n" " --list List mountable block devices\n" " -u --umount Unmount mount points\n" " -G --collect Unload unit after it stopped, even when failed\n", program_invocation_short_name, streq(program_invocation_short_name, "systemd-umount") ? "" : "--umount "); } static int parse_argv(int argc, char *argv[]) { enum { ARG_VERSION = 0x100, ARG_NO_BLOCK, ARG_NO_PAGER, ARG_NO_ASK_PASSWORD, ARG_USER, ARG_SYSTEM, ARG_DISCOVER, ARG_MOUNT_TYPE, ARG_MOUNT_OPTIONS, ARG_OWNER, ARG_FSCK, ARG_DESCRIPTION, ARG_TIMEOUT_IDLE, ARG_AUTOMOUNT, ARG_AUTOMOUNT_PROPERTY, ARG_BIND_DEVICE, ARG_LIST, }; static const struct option options[] = { { "help", no_argument, NULL, 'h' }, { "version", no_argument, NULL, ARG_VERSION }, { "no-block", no_argument, NULL, ARG_NO_BLOCK }, { "no-pager", no_argument, NULL, ARG_NO_PAGER }, { "no-ask-password", no_argument, NULL, ARG_NO_ASK_PASSWORD }, { "quiet", no_argument, NULL, 'q' }, { "user", no_argument, NULL, ARG_USER }, { "system", no_argument, NULL, ARG_SYSTEM }, { "host", required_argument, NULL, 'H' }, { "machine", required_argument, NULL, 'M' }, { "discover", no_argument, NULL, ARG_DISCOVER }, { "type", required_argument, NULL, 't' }, { "options", required_argument, NULL, 'o' }, { "owner", required_argument, NULL, ARG_OWNER }, { "fsck", required_argument, NULL, ARG_FSCK }, { "description", required_argument, NULL, ARG_DESCRIPTION }, { "property", required_argument, NULL, 'p' }, { "automount", required_argument, NULL, ARG_AUTOMOUNT }, { "timeout-idle-sec", required_argument, NULL, ARG_TIMEOUT_IDLE }, { "automount-property", required_argument, NULL, ARG_AUTOMOUNT_PROPERTY }, { "bind-device", no_argument, NULL, ARG_BIND_DEVICE }, { "list", no_argument, NULL, ARG_LIST }, { "umount", no_argument, NULL, 'u' }, { "unmount", no_argument, NULL, 'u' }, { "collect", no_argument, NULL, 'G' }, {}, }; int r, c; assert(argc >= 0); assert(argv); if (strstr(program_invocation_short_name, "systemd-umount")) arg_action = ACTION_UMOUNT; while ((c = getopt_long(argc, argv, "hqH:M:t:o:p:AuG", options, NULL)) >= 0) switch (c) { case 'h': help(); return 0; case ARG_VERSION: return version(); case ARG_NO_BLOCK: arg_no_block = true; break; case ARG_NO_PAGER: arg_no_pager = true; break; case ARG_NO_ASK_PASSWORD: arg_ask_password = false; break; case 'q': arg_quiet = true; break; case ARG_USER: arg_user = true; break; case ARG_SYSTEM: arg_user = false; break; case 'H': arg_transport = BUS_TRANSPORT_REMOTE; arg_host = optarg; break; case 'M': arg_transport = BUS_TRANSPORT_MACHINE; arg_host = optarg; break; case ARG_DISCOVER: arg_discover = true; break; case 't': if (free_and_strdup(&arg_mount_type, optarg) < 0) return log_oom(); break; case 'o': if (free_and_strdup(&arg_mount_options, optarg) < 0) return log_oom(); break; case ARG_OWNER: { const char *user = optarg; r = get_user_creds(&user, &arg_uid, &arg_gid, NULL, NULL); if (r < 0) return log_error_errno(r, r == -EBADMSG ? "UID or GID of user %s are invalid." : "Cannot use \"%s\" as owner: %m", optarg); break; } case ARG_FSCK: r = parse_boolean(optarg); if (r < 0) return log_error_errno(r, "Failed to parse --fsck= argument: %s", optarg); arg_fsck = r; break; case ARG_DESCRIPTION: if (free_and_strdup(&arg_description, optarg) < 0) return log_oom(); break; case 'p': if (strv_extend(&arg_property, optarg) < 0) return log_oom(); break; case 'A': arg_action = ACTION_AUTOMOUNT; break; case ARG_AUTOMOUNT: r = parse_boolean(optarg); if (r < 0) return log_error_errno(r, "--automount= expects a valid boolean parameter: %s", optarg); arg_action = r ? ACTION_AUTOMOUNT : ACTION_MOUNT; break; case ARG_TIMEOUT_IDLE: r = parse_sec(optarg, &arg_timeout_idle); if (r < 0) return log_error_errno(r, "Failed to parse timeout: %s", optarg); break; case ARG_AUTOMOUNT_PROPERTY: if (strv_extend(&arg_automount_property, optarg) < 0) return log_oom(); break; case ARG_BIND_DEVICE: arg_bind_device = true; break; case ARG_LIST: arg_action = ACTION_LIST; break; case 'u': arg_action = ACTION_UMOUNT; break; case 'G': arg_aggressive_gc = true; break; case '?': return -EINVAL; default: assert_not_reached("Unhandled option"); } if (arg_user && arg_transport != BUS_TRANSPORT_LOCAL) { log_error("Execution in user context is not supported on non-local systems."); return -EINVAL; } if (arg_action == ACTION_LIST) { if (optind < argc) { log_error("Too many arguments."); return -EINVAL; } if (arg_transport != BUS_TRANSPORT_LOCAL) { log_error("Listing devices only supported locally."); return -EOPNOTSUPP; } } else if (arg_action == ACTION_UMOUNT) { if (optind >= argc) { log_error("At least one argument required."); return -EINVAL; } if (arg_transport != BUS_TRANSPORT_LOCAL) { int i; for (i = optind; i < argc; i++) if (!path_is_absolute(argv[i]) ) { log_error("Only absolute path is supported: %s", argv[i]); return -EINVAL; } } } else { if (optind >= argc) { log_error("At least one argument required."); return -EINVAL; } if (argc > optind+2) { log_error("At most two arguments required."); return -EINVAL; } if (arg_mount_type && (fstype_is_api_vfs(arg_mount_type) || fstype_is_network(arg_mount_type))) { arg_mount_what = strdup(argv[optind]); if (!arg_mount_what) return log_oom(); } else if (arg_transport == BUS_TRANSPORT_LOCAL) { _cleanup_free_ char *u = NULL; u = fstab_node_to_udev_node(argv[optind]); if (!u) return log_oom(); r = chase_symlinks(u, NULL, 0, &arg_mount_what); if (r < 0) return log_error_errno(r, "Failed to make path %s absolute: %m", u); } else { arg_mount_what = strdup(argv[optind]); if (!arg_mount_what) return log_oom(); path_kill_slashes(arg_mount_what); if (!path_is_absolute(arg_mount_what)) { log_error("Only absolute path is supported: %s", arg_mount_what); return -EINVAL; } } if (argc > optind+1) { if (arg_transport == BUS_TRANSPORT_LOCAL) { r = chase_symlinks(argv[optind+1], NULL, CHASE_NONEXISTENT, &arg_mount_where); if (r < 0) return log_error_errno(r, "Failed to make path %s absolute: %m", argv[optind+1]); } else { arg_mount_where = strdup(argv[optind+1]); if (!arg_mount_where) return log_oom(); path_kill_slashes(arg_mount_where); if (!path_is_absolute(arg_mount_where)) { log_error("Only absolute path is supported: %s", arg_mount_where); return -EINVAL; } } } else arg_discover = true; if (arg_discover && arg_transport != BUS_TRANSPORT_LOCAL) { log_error("Automatic mount location discovery is only supported locally."); return -EOPNOTSUPP; } } return 1; } static int transient_unit_set_properties(sd_bus_message *m, UnitType t, char **properties) { int r; if (!isempty(arg_description)) { r = sd_bus_message_append(m, "(sv)", "Description", "s", arg_description); if (r < 0) return r; } if (arg_bind_device && is_device_path(arg_mount_what)) { _cleanup_free_ char *device_unit = NULL; r = unit_name_from_path(arg_mount_what, ".device", &device_unit); if (r < 0) return r; r = sd_bus_message_append(m, "(sv)(sv)", "After", "as", 1, device_unit, "BindsTo", "as", 1, device_unit); if (r < 0) return r; } if (arg_aggressive_gc) { r = sd_bus_message_append(m, "(sv)", "CollectMode", "s", "inactive-or-failed"); if (r < 0) return r; } r = bus_append_unit_property_assignment_many(m, t, properties); if (r < 0) return r; return 0; } static int transient_mount_set_properties(sd_bus_message *m) { _cleanup_free_ char *options = NULL; int r; assert(m); r = transient_unit_set_properties(m, UNIT_MOUNT, arg_property); if (r < 0) return r; if (arg_mount_what) { r = sd_bus_message_append(m, "(sv)", "What", "s", arg_mount_what); if (r < 0) return r; } if (arg_mount_type) { r = sd_bus_message_append(m, "(sv)", "Type", "s", arg_mount_type); if (r < 0) return r; } /* Prepend uid=…,gid=… if arg_uid is set */ if (arg_uid != UID_INVALID) { r = asprintf(&options, "uid=" UID_FMT ",gid=" GID_FMT "%s%s", arg_uid, arg_gid, arg_mount_options ? "," : "", arg_mount_options); if (r < 0) return -ENOMEM; } if (options || arg_mount_options) { log_debug("Using mount options: %s", options ?: arg_mount_options); r = sd_bus_message_append(m, "(sv)", "Options", "s", options ?: arg_mount_options); if (r < 0) return r; } else log_debug("Not using any mount options"); if (arg_fsck) { _cleanup_free_ char *fsck = NULL; r = unit_name_from_path_instance("systemd-fsck", arg_mount_what, ".service", &fsck); if (r < 0) return r; r = sd_bus_message_append(m, "(sv)(sv)", "Requires", "as", 1, fsck, "After", "as", 1, fsck); if (r < 0) return r; } return 0; } static int transient_automount_set_properties(sd_bus_message *m) { int r; assert(m); r = transient_unit_set_properties(m, UNIT_AUTOMOUNT, arg_automount_property); if (r < 0) return r; if (arg_timeout_idle != USEC_INFINITY) { r = sd_bus_message_append(m, "(sv)", "TimeoutIdleUSec", "t", arg_timeout_idle); if (r < 0) return r; } return 0; } static int start_transient_mount( sd_bus *bus, char **argv) { _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL, *reply = NULL; _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; _cleanup_(bus_wait_for_jobs_freep) BusWaitForJobs *w = NULL; _cleanup_free_ char *mount_unit = NULL; int r; if (!arg_no_block) { r = bus_wait_for_jobs_new(bus, &w); if (r < 0) return log_error_errno(r, "Could not watch jobs: %m"); } r = unit_name_from_path(arg_mount_where, ".mount", &mount_unit); if (r < 0) return log_error_errno(r, "Failed to make mount unit name: %m"); r = sd_bus_message_new_method_call( bus, &m, "org.freedesktop.systemd1", "/org/freedesktop/systemd1", "org.freedesktop.systemd1.Manager", "StartTransientUnit"); if (r < 0) return bus_log_create_error(r); r = sd_bus_message_set_allow_interactive_authorization(m, arg_ask_password); if (r < 0) return bus_log_create_error(r); /* Name and mode */ r = sd_bus_message_append(m, "ss", mount_unit, "fail"); if (r < 0) return bus_log_create_error(r); /* Properties */ r = sd_bus_message_open_container(m, 'a', "(sv)"); if (r < 0) return bus_log_create_error(r); r = transient_mount_set_properties(m); if (r < 0) return bus_log_create_error(r); r = sd_bus_message_close_container(m); if (r < 0) return bus_log_create_error(r); /* Auxiliary units */ r = sd_bus_message_append(m, "a(sa(sv))", 0); if (r < 0) return bus_log_create_error(r); polkit_agent_open_if_enabled(arg_transport, arg_ask_password); r = sd_bus_call(bus, m, 0, &error, &reply); if (r < 0) return log_error_errno(r, "Failed to start transient mount unit: %s", bus_error_message(&error, r)); if (w) { const char *object; r = sd_bus_message_read(reply, "o", &object); if (r < 0) return bus_log_parse_error(r); r = bus_wait_for_jobs_one(w, object, arg_quiet); if (r < 0) return r; } if (!arg_quiet) log_info("Started unit %s%s%s for mount point: %s%s%s", ansi_highlight(), mount_unit, ansi_normal(), ansi_highlight(), arg_mount_where, ansi_normal()); return 0; } static int start_transient_automount( sd_bus *bus, char **argv) { _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL, *reply = NULL; _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; _cleanup_(bus_wait_for_jobs_freep) BusWaitForJobs *w = NULL; _cleanup_free_ char *automount_unit = NULL, *mount_unit = NULL; int r; if (!arg_no_block) { r = bus_wait_for_jobs_new(bus, &w); if (r < 0) return log_error_errno(r, "Could not watch jobs: %m"); } r = unit_name_from_path(arg_mount_where, ".automount", &automount_unit); if (r < 0) return log_error_errno(r, "Failed to make automount unit name: %m"); r = unit_name_from_path(arg_mount_where, ".mount", &mount_unit); if (r < 0) return log_error_errno(r, "Failed to make mount unit name: %m"); r = sd_bus_message_new_method_call( bus, &m, "org.freedesktop.systemd1", "/org/freedesktop/systemd1", "org.freedesktop.systemd1.Manager", "StartTransientUnit"); if (r < 0) return bus_log_create_error(r); r = sd_bus_message_set_allow_interactive_authorization(m, arg_ask_password); if (r < 0) return bus_log_create_error(r); /* Name and mode */ r = sd_bus_message_append(m, "ss", automount_unit, "fail"); if (r < 0) return bus_log_create_error(r); /* Properties */ r = sd_bus_message_open_container(m, 'a', "(sv)"); if (r < 0) return bus_log_create_error(r); r = transient_automount_set_properties(m); if (r < 0) return bus_log_create_error(r); r = sd_bus_message_close_container(m); if (r < 0) return bus_log_create_error(r); /* Auxiliary units */ r = sd_bus_message_open_container(m, 'a', "(sa(sv))"); if (r < 0) return bus_log_create_error(r); r = sd_bus_message_open_container(m, 'r', "sa(sv)"); if (r < 0) return bus_log_create_error(r); r = sd_bus_message_append(m, "s", mount_unit); if (r < 0) return bus_log_create_error(r); r = sd_bus_message_open_container(m, 'a', "(sv)"); if (r < 0) return bus_log_create_error(r); r = transient_mount_set_properties(m); if (r < 0) return bus_log_create_error(r); r = sd_bus_message_close_container(m); if (r < 0) return bus_log_create_error(r); r = sd_bus_message_close_container(m); if (r < 0) return bus_log_create_error(r); r = sd_bus_message_close_container(m); if (r < 0) return bus_log_create_error(r); polkit_agent_open_if_enabled(arg_transport, arg_ask_password); r = sd_bus_call(bus, m, 0, &error, &reply); if (r < 0) return log_error_errno(r, "Failed to start transient automount unit: %s", bus_error_message(&error, r)); if (w) { const char *object; r = sd_bus_message_read(reply, "o", &object); if (r < 0) return bus_log_parse_error(r); r = bus_wait_for_jobs_one(w, object, arg_quiet); if (r < 0) return r; } if (!arg_quiet) log_info("Started unit %s%s%s for mount point: %s%s%s", ansi_highlight(), automount_unit, ansi_normal(), ansi_highlight(), arg_mount_where, ansi_normal()); return 0; } static int find_mount_points(const char *what, char ***list) { _cleanup_fclose_ FILE *proc_self_mountinfo = NULL; _cleanup_strv_free_ char **l = NULL; size_t bufsize = 0, n = 0; assert(what); assert(list); /* Returns all mount points obtained from /proc/self/mountinfo in *list, * and the number of mount points as return value. */ proc_self_mountinfo = fopen("/proc/self/mountinfo", "re"); if (!proc_self_mountinfo) return log_error_errno(errno, "Can't open /proc/self/mountinfo: %m"); for (;;) { _cleanup_free_ char *path = NULL, *where = NULL, *dev = NULL; int r; r = fscanf(proc_self_mountinfo, "%*s " /* (1) mount id */ "%*s " /* (2) parent id */ "%*s " /* (3) major:minor */ "%*s " /* (4) root */ "%ms " /* (5) mount point */ "%*s" /* (6) mount options */ "%*[^-]" /* (7) optional fields */ "- " /* (8) separator */ "%*s " /* (9) file system type */ "%ms" /* (10) mount source */ "%*s" /* (11) mount options 2 */ "%*[^\n]", /* some rubbish at the end */ &path, &dev); if (r != 2) { if (r == EOF) break; continue; } if (!streq(what, dev)) continue; r = cunescape(path, UNESCAPE_RELAX, &where); if (r < 0) continue; /* one extra slot is needed for the terminating NULL */ if (!GREEDY_REALLOC(l, bufsize, n + 2)) return log_oom(); l[n++] = TAKE_PTR(where); } if (!GREEDY_REALLOC(l, bufsize, n + 1)) return log_oom(); l[n] = NULL; *list = TAKE_PTR(l); return n; } static int find_loop_device(const char *backing_file, char **loop_dev) { _cleanup_closedir_ DIR *d = NULL; struct dirent *de; _cleanup_free_ char *l = NULL; assert(backing_file); assert(loop_dev); d = opendir("/sys/devices/virtual/block"); if (!d) return -errno; FOREACH_DIRENT(de, d, return -errno) { _cleanup_free_ char *sys = NULL, *fname = NULL; int r; dirent_ensure_type(d, de); if (de->d_type != DT_DIR) continue; if (!startswith(de->d_name, "loop")) continue; sys = strjoin("/sys/devices/virtual/block/", de->d_name, "/loop/backing_file"); if (!sys) return -ENOMEM; r = read_one_line_file(sys, &fname); if (r < 0) { log_debug_errno(r, "Failed to read %s, ignoring: %m", sys); continue; } if (files_same(fname, backing_file, 0) <= 0) continue; l = strjoin("/dev/", de->d_name); if (!l) return -ENOMEM; break; } if (!l) return -ENXIO; *loop_dev = TAKE_PTR(l); return 0; } static int stop_mount( sd_bus *bus, const char *where, const char *suffix) { _cleanup_(sd_bus_message_unrefp) sd_bus_message *m = NULL, *reply = NULL; _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL; _cleanup_(bus_wait_for_jobs_freep) BusWaitForJobs *w = NULL; _cleanup_free_ char *mount_unit = NULL; int r; if (!arg_no_block) { r = bus_wait_for_jobs_new(bus, &w); if (r < 0) return log_error_errno(r, "Could not watch jobs: %m"); } r = unit_name_from_path(where, suffix, &mount_unit); if (r < 0) return log_error_errno(r, "Failed to make %s unit name from path %s: %m", suffix + 1, where); r = sd_bus_message_new_method_call( bus, &m, "org.freedesktop.systemd1", "/org/freedesktop/systemd1", "org.freedesktop.systemd1.Manager", "StopUnit"); if (r < 0) return bus_log_create_error(r); r = sd_bus_message_set_allow_interactive_authorization(m, arg_ask_password); if (r < 0) return bus_log_create_error(r); /* Name and mode */ r = sd_bus_message_append(m, "ss", mount_unit, "fail"); if (r < 0) return bus_log_create_error(r); polkit_agent_open_if_enabled(arg_transport, arg_ask_password); r = sd_bus_call(bus, m, 0, &error, &reply); if (r < 0) { if (streq(suffix, ".automount") && sd_bus_error_has_name(&error, "org.freedesktop.systemd1.NoSuchUnit")) return 0; return log_error_errno(r, "Failed to stop %s unit: %s", suffix + 1, bus_error_message(&error, r)); } if (w) { const char *object; r = sd_bus_message_read(reply, "o", &object); if (r < 0) return bus_log_parse_error(r); r = bus_wait_for_jobs_one(w, object, arg_quiet); if (r < 0) return r; } if (!arg_quiet) log_info("Stopped unit %s%s%s for mount point: %s%s%s", ansi_highlight(), mount_unit, ansi_normal(), ansi_highlight(), where, ansi_normal()); return 0; } static int stop_mounts( sd_bus *bus, const char *where) { int r; if (path_equal(where, "/")) { log_error("Refusing to operate on root directory: %s", where); return -EINVAL; } if (!path_is_normalized(where)) { log_error("Path contains non-normalized components: %s", where); return -EINVAL; } r = stop_mount(bus, where, ".mount"); if (r < 0) return r; r = stop_mount(bus, where, ".automount"); if (r < 0) return r; return 0; } static int umount_by_device(sd_bus *bus, const char *what) { _cleanup_udev_device_unref_ struct udev_device *d = NULL; _cleanup_udev_unref_ struct udev *udev = NULL; _cleanup_strv_free_ char **list = NULL; struct stat st; const char *v; char **l; int r, r2 = 0; assert(what); if (stat(what, &st) < 0) return log_error_errno(errno, "Can't stat %s: %m", what); if (!S_ISBLK(st.st_mode)) { log_error("Not a block device: %s", what); return -ENOTBLK; } udev = udev_new(); if (!udev) return log_oom(); d = udev_device_new_from_devnum(udev, 'b', st.st_rdev); if (!d) return log_oom(); v = udev_device_get_property_value(d, "ID_FS_USAGE"); if (!streq_ptr(v, "filesystem")) { log_error("%s does not contain a known file system.", what); return -EINVAL; } v = udev_device_get_property_value(d, "SYSTEMD_MOUNT_WHERE"); if (!isempty(v)) r2 = stop_mounts(bus, v); r = find_mount_points(what, &list); if (r < 0) return r; for (l = list; *l; l++) { r = stop_mounts(bus, *l); if (r < 0) r2 = r; } return r2; } static int umount_loop(sd_bus *bus, const char *backing_file) { _cleanup_free_ char *loop_dev = NULL; int r; assert(backing_file); r = find_loop_device(backing_file, &loop_dev); if (r < 0) return log_error_errno(r, r == -ENXIO ? "File %s is not mounted." : "Can't get loop device for %s: %m", backing_file); return umount_by_device(bus, loop_dev); } static int action_umount( sd_bus *bus, int argc, char **argv) { int i, r, r2 = 0; if (arg_transport != BUS_TRANSPORT_LOCAL) { for (i = optind; i < argc; i++) { _cleanup_free_ char *p = NULL; p = strdup(argv[i]); if (!p) return log_oom(); path_kill_slashes(p); r = stop_mounts(bus, p); if (r < 0) r2 = r; } return r2; } for (i = optind; i < argc; i++) { _cleanup_free_ char *u = NULL, *p = NULL; struct stat st; u = fstab_node_to_udev_node(argv[i]); if (!u) return log_oom(); r = chase_symlinks(u, NULL, 0, &p); if (r < 0) { r2 = log_error_errno(r, "Failed to make path %s absolute: %m", argv[i]); continue; } if (stat(p, &st) < 0) return log_error_errno(errno, "Can't stat %s (from %s): %m", p, argv[i]); if (S_ISBLK(st.st_mode)) r = umount_by_device(bus, p); else if (S_ISREG(st.st_mode)) r = umount_loop(bus, p); else if (S_ISDIR(st.st_mode)) r = stop_mounts(bus, p); else { log_error("Invalid file type: %s (from %s)", p, argv[i]); r = -EINVAL; } if (r < 0) r2 = r; } return r2; } static int acquire_mount_type(struct udev_device *d) { const char *v; assert(d); if (arg_mount_type) return 0; v = udev_device_get_property_value(d, "ID_FS_TYPE"); if (isempty(v)) return 0; arg_mount_type = strdup(v); if (!arg_mount_type) return log_oom(); log_debug("Discovered type=%s", arg_mount_type); return 1; } static int acquire_mount_options(struct udev_device *d) { const char *v; if (arg_mount_options) return 0; v = udev_device_get_property_value(d, "SYSTEMD_MOUNT_OPTIONS"); if (isempty(v)) return 0; arg_mount_options = strdup(v); if (!arg_mount_options) return log_oom(); log_debug("Discovered options=%s", arg_mount_options); return 1; } static const char *get_model(struct udev_device *d) { const char *model; assert(d); model = udev_device_get_property_value(d, "ID_MODEL_FROM_DATABASE"); if (model) return model; return udev_device_get_property_value(d, "ID_MODEL"); } static const char* get_label(struct udev_device *d) { const char *label; assert(d); label = udev_device_get_property_value(d, "ID_FS_LABEL"); if (label) return label; return udev_device_get_property_value(d, "ID_PART_ENTRY_NAME"); } static int acquire_mount_where(struct udev_device *d) { const char *v; if (arg_mount_where) return 0; v = udev_device_get_property_value(d, "SYSTEMD_MOUNT_WHERE"); if (isempty(v)) { _cleanup_free_ char *escaped = NULL; const char *name; name = get_label(d); if (!name) name = get_model(d); if (!name) { const char *dn; dn = udev_device_get_devnode(d); if (!dn) return 0; name = basename(dn); } escaped = xescape(name, "\\"); if (!escaped) return log_oom(); if (!filename_is_valid(escaped)) return 0; arg_mount_where = strjoin("/run/media/system/", escaped); } else arg_mount_where = strdup(v); if (!arg_mount_where) return log_oom(); log_debug("Discovered where=%s", arg_mount_where); return 1; } static int acquire_mount_where_for_loop_dev(const char *loop_dev) { _cleanup_strv_free_ char **list = NULL; int r; if (arg_mount_where) return 0; r = find_mount_points(loop_dev, &list); if (r < 0) return r; else if (r == 0) { log_error("Can't find mount point of %s. It is expected that %s is already mounted on a place.", loop_dev, loop_dev); return -EINVAL; } else if (r >= 2) { log_error("%s is mounted on %d places. It is expected that %s is mounted on a place.", loop_dev, r, loop_dev); return -EINVAL; } arg_mount_where = strdup(list[0]); if (!arg_mount_where) return log_oom(); log_debug("Discovered where=%s", arg_mount_where); return 1; } static int acquire_description(struct udev_device *d) { const char *model, *label; if (arg_description) return 0; model = get_model(d); label = get_label(d); if (!label) label = udev_device_get_property_value(d, "ID_PART_ENTRY_NUMBER"); if (model && label) arg_description = strjoin(model, " ", label); else if (label) arg_description = strdup(label); else if (model) arg_description = strdup(model); else return 0; if (!arg_description) return log_oom(); log_debug("Discovered description=%s", arg_description); return 1; } static int acquire_removable(struct udev_device *d) { const char *v; /* Shortcut this if there's no reason to check it */ if (arg_action != ACTION_DEFAULT && arg_timeout_idle_set && arg_bind_device >= 0) return 0; for (;;) { v = udev_device_get_sysattr_value(d, "removable"); if (v) break; d = udev_device_get_parent(d); if (!d) return 0; if (!streq_ptr(udev_device_get_subsystem(d), "block")) return 0; } if (parse_boolean(v) <= 0) return 0; log_debug("Discovered removable device."); if (arg_action == ACTION_DEFAULT) { log_debug("Automatically turning on automount."); arg_action = ACTION_AUTOMOUNT; } if (!arg_timeout_idle_set) { log_debug("Setting idle timeout to 1s."); arg_timeout_idle = USEC_PER_SEC; } if (arg_bind_device < 0) { log_debug("Binding automount unit to device."); arg_bind_device = true; } return 1; } static int discover_loop_backing_file(void) { _cleanup_udev_device_unref_ struct udev_device *d = NULL; _cleanup_udev_unref_ struct udev *udev = NULL; _cleanup_free_ char *loop_dev = NULL; struct stat st; const char *v; int r; r = find_loop_device(arg_mount_what, &loop_dev); if (r < 0 && r != -ENXIO) return log_error_errno(errno, "Can't get loop device for %s: %m", arg_mount_what); if (r == -ENXIO) { _cleanup_free_ char *escaped = NULL; if (arg_mount_where) return 0; escaped = xescape(basename(arg_mount_what), "\\"); if (!escaped) return log_oom(); if (!filename_is_valid(escaped)) { log_error("Escaped name %s is not a valid filename.", escaped); return -EINVAL; } arg_mount_where = strjoin("/run/media/system/", escaped); if (!arg_mount_where) return log_oom(); log_debug("Discovered where=%s", arg_mount_where); return 0; } if (stat(loop_dev, &st) < 0) return log_error_errno(errno, "Can't stat %s: %m", loop_dev); if (!S_ISBLK(st.st_mode)) { log_error("Invalid file type: %s", loop_dev); return -EINVAL; } udev = udev_new(); if (!udev) return log_oom(); d = udev_device_new_from_devnum(udev, 'b', st.st_rdev); if (!d) return log_oom(); v = udev_device_get_property_value(d, "ID_FS_USAGE"); if (!streq_ptr(v, "filesystem")) { log_error("%s does not contain a known file system.", arg_mount_what); return -EINVAL; } r = acquire_mount_type(d); if (r < 0) return r; r = acquire_mount_options(d); if (r < 0) return r; r = acquire_mount_where_for_loop_dev(loop_dev); if (r < 0) return r; r = acquire_description(d); if (r < 0) return r; return 0; } static int discover_device(void) { _cleanup_udev_device_unref_ struct udev_device *d = NULL; _cleanup_udev_unref_ struct udev *udev = NULL; struct stat st; const char *v; int r; if (stat(arg_mount_what, &st) < 0) return log_error_errno(errno, "Can't stat %s: %m", arg_mount_what); if (S_ISREG(st.st_mode)) return discover_loop_backing_file(); if (!S_ISBLK(st.st_mode)) { log_error("Invalid file type: %s", arg_mount_what); return -EINVAL; } udev = udev_new(); if (!udev) return log_oom(); d = udev_device_new_from_devnum(udev, 'b', st.st_rdev); if (!d) return log_oom(); v = udev_device_get_property_value(d, "ID_FS_USAGE"); if (!streq_ptr(v, "filesystem")) { log_error("%s does not contain a known file system.", arg_mount_what); return -EINVAL; } r = acquire_mount_type(d); if (r < 0) return r; r = acquire_mount_options(d); if (r < 0) return r; r = acquire_mount_where(d); if (r < 0) return r; r = acquire_description(d); if (r < 0) return r; r = acquire_removable(d); if (r < 0) return r; return 0; } enum { COLUMN_NODE, COLUMN_PATH, COLUMN_MODEL, COLUMN_WWN, COLUMN_FSTYPE, COLUMN_LABEL, COLUMN_UUID, _COLUMN_MAX, }; struct item { char* columns[_COLUMN_MAX]; }; static int compare_item(const void *a, const void *b) { const struct item *x = a, *y = b; if (x->columns[COLUMN_NODE] == y->columns[COLUMN_NODE]) return 0; if (!x->columns[COLUMN_NODE]) return 1; if (!y->columns[COLUMN_NODE]) return -1; return path_compare(x->columns[COLUMN_NODE], y->columns[COLUMN_NODE]); } static int list_devices(void) { static const char * const titles[_COLUMN_MAX] = { [COLUMN_NODE] = "NODE", [COLUMN_PATH] = "PATH", [COLUMN_MODEL] = "MODEL", [COLUMN_WWN] = "WWN", [COLUMN_FSTYPE] = "TYPE", [COLUMN_LABEL] = "LABEL", [COLUMN_UUID] = "UUID" }; _cleanup_udev_enumerate_unref_ struct udev_enumerate *e = NULL; _cleanup_udev_unref_ struct udev *udev = NULL; struct udev_list_entry *item = NULL, *first = NULL; size_t n_allocated = 0, n = 0, i; size_t column_width[_COLUMN_MAX]; struct item *items = NULL; unsigned c; int r; for (c = 0; c < _COLUMN_MAX; c++) column_width[c] = strlen(titles[c]); udev = udev_new(); if (!udev) return log_oom(); e = udev_enumerate_new(udev); if (!e) return log_oom(); r = udev_enumerate_add_match_subsystem(e, "block"); if (r < 0) return log_error_errno(r, "Failed to add block match: %m"); r = udev_enumerate_add_match_property(e, "ID_FS_USAGE", "filesystem"); if (r < 0) return log_error_errno(r, "Failed to add property match: %m"); r = udev_enumerate_scan_devices(e); if (r < 0) return log_error_errno(r, "Failed to scan devices: %m"); first = udev_enumerate_get_list_entry(e); udev_list_entry_foreach(item, first) { _cleanup_udev_device_unref_ struct udev_device *d; struct item *j; d = udev_device_new_from_syspath(udev, udev_list_entry_get_name(item)); if (!d) { r = log_oom(); goto finish; } if (!GREEDY_REALLOC0(items, n_allocated, n+1)) { r = log_oom(); goto finish; } j = items + n++; for (c = 0; c < _COLUMN_MAX; c++) { const char *x = NULL; size_t k; switch (c) { case COLUMN_NODE: x = udev_device_get_devnode(d); break; case COLUMN_PATH: x = udev_device_get_property_value(d, "ID_PATH"); break; case COLUMN_MODEL: x = get_model(d); break; case COLUMN_WWN: x = udev_device_get_property_value(d, "ID_WWN"); break; case COLUMN_FSTYPE: x = udev_device_get_property_value(d, "ID_FS_TYPE"); break; case COLUMN_LABEL: x = get_label(d); break; case COLUMN_UUID: x = udev_device_get_property_value(d, "ID_FS_UUID"); break; } if (isempty(x)) continue; j->columns[c] = strdup(x); if (!j->columns[c]) { r = log_oom(); goto finish; } k = strlen(x); if (k > column_width[c]) column_width[c] = k; } } if (n == 0) { log_info("No devices found."); goto finish; } qsort_safe(items, n, sizeof(struct item), compare_item); (void) pager_open(arg_no_pager, false); fputs(ansi_underline(), stdout); for (c = 0; c < _COLUMN_MAX; c++) { if (c > 0) fputc(' ', stdout); printf("%-*s", (int) column_width[c], titles[c]); } fputs(ansi_normal(), stdout); fputc('\n', stdout); for (i = 0; i < n; i++) { for (c = 0; c < _COLUMN_MAX; c++) { if (c > 0) fputc(' ', stdout); printf("%-*s", (int) column_width[c], strna(items[i].columns[c])); } fputc('\n', stdout); } r = 0; finish: for (i = 0; i < n; i++) for (c = 0; c < _COLUMN_MAX; c++) free(items[i].columns[c]); free(items); return r; } int main(int argc, char* argv[]) { sd_bus *bus = NULL; int r; log_parse_environment(); log_open(); r = parse_argv(argc, argv); if (r <= 0) goto finish; if (arg_action == ACTION_LIST) { r = list_devices(); goto finish; } r = bus_connect_transport_systemd(arg_transport, arg_host, arg_user, &bus); if (r < 0) { log_error_errno(r, "Failed to create bus connection: %m"); goto finish; } if (arg_action == ACTION_UMOUNT) { r = action_umount(bus, argc, argv); goto finish; } if (!path_is_normalized(arg_mount_what)) { log_error("Path contains non-normalized components: %s", arg_mount_what); r = -EINVAL; goto finish; } if (arg_discover) { r = discover_device(); if (r < 0) goto finish; } if (!arg_mount_where) { log_error("Can't figure out where to mount %s.", arg_mount_what); r = -EINVAL; goto finish; } if (path_equal(arg_mount_where, "/")) { log_error("Refusing to operate on root directory."); r = -EINVAL; goto finish; } if (!path_is_normalized(arg_mount_where)) { log_error("Path contains non-normalized components: %s", arg_mount_where); r = -EINVAL; goto finish; } if (streq_ptr(arg_mount_type, "auto")) arg_mount_type = mfree(arg_mount_type); if (streq_ptr(arg_mount_options, "defaults")) arg_mount_options = mfree(arg_mount_options); if (!is_device_path(arg_mount_what)) arg_fsck = false; if (arg_fsck && arg_mount_type && arg_transport == BUS_TRANSPORT_LOCAL) { r = fsck_exists(arg_mount_type); if (r < 0) log_warning_errno(r, "Couldn't determine whether fsck for %s exists, proceeding anyway.", arg_mount_type); else if (r == 0) { log_debug("Disabling file system check as fsck for %s doesn't exist.", arg_mount_type); arg_fsck = false; /* fsck doesn't exist, let's not attempt it */ } } /* The kernel (properly) refuses mounting file systems with unknown uid=,gid= options, * but not for all filesystem types. Let's try to catch the cases where the option * would be used if the file system does not support it. It is also possible to * autodetect the file system, but that's only possible with disk-based file systems * which incidentally seem to be implemented more carefully and reject unknown options, * so it's probably OK that we do the check only when the type is specified. */ if (arg_mount_type && !streq(arg_mount_type, "auto") && arg_uid != UID_INVALID && !fstype_can_uid_gid(arg_mount_type)) { log_error("File system type %s is not known to support uid=/gid=, refusing.", arg_mount_type); r = -EOPNOTSUPP; goto finish; } switch (arg_action) { case ACTION_MOUNT: case ACTION_DEFAULT: r = start_transient_mount(bus, argv + optind); break; case ACTION_AUTOMOUNT: r = start_transient_automount(bus, argv + optind); break; default: assert_not_reached("Unexpected action."); } finish: /* make sure we terminate the bus connection first, and then close the * pager, see issue #3543 for the details. */ bus = sd_bus_flush_close_unref(bus); pager_close(); free(arg_mount_what); free(arg_mount_where); free(arg_mount_type); free(arg_mount_options); free(arg_description); strv_free(arg_property); strv_free(arg_automount_property); return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS; }