2019-11-17 17:24:34 +00:00
|
|
|
=====================
|
2014-10-13 22:52:24 +00:00
|
|
|
autofs - how it works
|
|
|
|
=====================
|
|
|
|
|
|
|
|
Purpose
|
2019-11-17 17:24:34 +00:00
|
|
|
=======
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
The goal of autofs is to provide on-demand mounting and race free
|
|
|
|
automatic unmounting of various other filesystems. This provides two
|
|
|
|
key advantages:
|
|
|
|
|
|
|
|
1. There is no need to delay boot until all filesystems that
|
|
|
|
might be needed are mounted. Processes that try to access those
|
|
|
|
slow filesystems might be delayed but other processes can
|
|
|
|
continue freely. This is particularly important for
|
|
|
|
network filesystems (e.g. NFS) or filesystems stored on
|
|
|
|
media with a media-changing robot.
|
|
|
|
|
|
|
|
2. The names and locations of filesystems can be stored in
|
|
|
|
a remote database and can change at any time. The content
|
2024-09-08 18:37:42 +00:00
|
|
|
in that database at the time of access will be used to provide
|
2014-10-13 22:52:24 +00:00
|
|
|
a target for the access. The interpretation of names in the
|
|
|
|
filesystem can even be programmatic rather than database-backed,
|
|
|
|
allowing wildcards for example, and can vary based on the user who
|
|
|
|
first accessed a name.
|
|
|
|
|
|
|
|
Context
|
2019-11-17 17:24:34 +00:00
|
|
|
=======
|
2014-10-13 22:52:24 +00:00
|
|
|
|
2018-06-08 00:11:38 +00:00
|
|
|
The "autofs" filesystem module is only one part of an autofs system.
|
2014-10-13 22:52:24 +00:00
|
|
|
There also needs to be a user-space program which looks up names
|
|
|
|
and mounts filesystems. This will often be the "automount" program,
|
2018-06-08 00:11:38 +00:00
|
|
|
though other tools including "systemd" can make use of "autofs".
|
2014-10-13 22:52:24 +00:00
|
|
|
This document describes only the kernel module and the interactions
|
|
|
|
required with any user-space program. Subsequent text refers to this
|
|
|
|
as the "automount daemon" or simply "the daemon".
|
|
|
|
|
2021-11-03 19:35:04 +00:00
|
|
|
"autofs" is a Linux kernel module which provides the "autofs"
|
2014-10-13 22:52:24 +00:00
|
|
|
filesystem type. Several "autofs" filesystems can be mounted and they
|
|
|
|
can each be managed separately, or all managed by the same daemon.
|
|
|
|
|
|
|
|
Content
|
2019-11-17 17:24:34 +00:00
|
|
|
=======
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
An autofs filesystem can contain 3 sorts of objects: directories,
|
|
|
|
symbolic links and mount traps. Mount traps are directories with
|
|
|
|
extra properties as described in the next section.
|
|
|
|
|
|
|
|
Objects can only be created by the automount daemon: symlinks are
|
|
|
|
created with a regular `symlink` system call, while directories and
|
|
|
|
mount traps are created with `mkdir`. The determination of whether a
|
2019-11-17 17:24:36 +00:00
|
|
|
directory should be a mount trap is based on a master map. This master
|
|
|
|
map is consulted by autofs to determine which directories are mount
|
|
|
|
points. Mount points can be *direct*/*indirect*/*offset*.
|
|
|
|
On most systems, the default master map is located at */etc/auto.master*.
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
If neither the *direct* or *offset* mount options are given (so the
|
|
|
|
mount is considered to be *indirect*), then the root directory is
|
|
|
|
always a regular directory, otherwise it is a mount trap when it is
|
|
|
|
empty and a regular directory when not empty. Note that *direct* and
|
|
|
|
*offset* are treated identically so a concise summary is that the root
|
|
|
|
directory is a mount trap only if the filesystem is mounted *direct*
|
|
|
|
and the root is empty.
|
|
|
|
|
|
|
|
Directories created in the root directory are mount traps only if the
|
2017-02-27 22:27:02 +00:00
|
|
|
filesystem is mounted *indirect* and they are empty.
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
Directories further down the tree depend on the *maxproto* mount
|
|
|
|
option and particularly whether it is less than five or not.
|
|
|
|
When *maxproto* is five, no directories further down the
|
|
|
|
tree are ever mount traps, they are always regular directories. When
|
|
|
|
the *maxproto* is four (or three), these directories are mount traps
|
|
|
|
precisely when they are empty.
|
|
|
|
|
|
|
|
So: non-empty (i.e. non-leaf) directories are never mount traps. Empty
|
|
|
|
directories are sometimes mount traps, and sometimes not depending on
|
|
|
|
where in the tree they are (root, top level, or lower), the *maxproto*,
|
|
|
|
and whether the mount was *indirect* or not.
|
|
|
|
|
|
|
|
Mount Traps
|
2019-11-17 17:24:34 +00:00
|
|
|
===========
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
A core element of the implementation of autofs is the Mount Traps
|
|
|
|
which are provided by the Linux VFS. Any directory provided by a
|
|
|
|
filesystem can be designated as a trap. This involves two separate
|
|
|
|
features that work together to allow autofs to do its job.
|
|
|
|
|
|
|
|
**DCACHE_NEED_AUTOMOUNT**
|
|
|
|
|
|
|
|
If a dentry has the DCACHE_NEED_AUTOMOUNT flag set (which gets set if
|
|
|
|
the inode has S_AUTOMOUNT set, or can be set directly) then it is
|
|
|
|
(potentially) a mount trap. Any access to this directory beyond a
|
|
|
|
"`stat`" will (normally) cause the `d_op->d_automount()` dentry operation
|
|
|
|
to be called. The task of this method is to find the filesystem that
|
|
|
|
should be mounted on the directory and to return it. The VFS is
|
|
|
|
responsible for actually mounting the root of this filesystem on the
|
|
|
|
directory.
|
|
|
|
|
|
|
|
autofs doesn't find the filesystem itself but sends a message to the
|
|
|
|
automount daemon asking it to find and mount the filesystem. The
|
|
|
|
autofs `d_automount` method then waits for the daemon to report that
|
|
|
|
everything is ready. It will then return "`NULL`" indicating that the
|
|
|
|
mount has already happened. The VFS doesn't try to mount anything but
|
|
|
|
follows down the mount that is already there.
|
|
|
|
|
|
|
|
This functionality is sufficient for some users of mount traps such
|
|
|
|
as NFS which creates traps so that mountpoints on the server can be
|
|
|
|
reflected on the client. However it is not sufficient for autofs. As
|
|
|
|
mounting onto a directory is considered to be "beyond a `stat`", the
|
|
|
|
automount daemon would not be able to mount a filesystem on the 'trap'
|
|
|
|
directory without some way to avoid getting caught in the trap. For
|
|
|
|
that purpose there is another flag.
|
|
|
|
|
|
|
|
**DCACHE_MANAGE_TRANSIT**
|
|
|
|
|
|
|
|
If a dentry has DCACHE_MANAGE_TRANSIT set then two very different but
|
2019-05-14 22:44:14 +00:00
|
|
|
related behaviours are invoked, both using the `d_op->d_manage()`
|
2014-10-13 22:52:24 +00:00
|
|
|
dentry operation.
|
|
|
|
|
|
|
|
Firstly, before checking to see if any filesystem is mounted on the
|
|
|
|
directory, d_manage() will be called with the `rcu_walk` parameter set
|
|
|
|
to `false`. It may return one of three things:
|
|
|
|
|
|
|
|
- A return value of zero indicates that there is nothing special
|
|
|
|
about this dentry and normal checks for mounts and automounts
|
|
|
|
should proceed.
|
|
|
|
|
|
|
|
autofs normally returns zero, but first waits for any
|
|
|
|
expiry (automatic unmounting of the mounted filesystem) to
|
|
|
|
complete. This avoids races.
|
|
|
|
|
|
|
|
- A return value of `-EISDIR` tells the VFS to ignore any mounts
|
|
|
|
on the directory and to not consider calling `->d_automount()`.
|
|
|
|
This effectively disables the **DCACHE_NEED_AUTOMOUNT** flag
|
|
|
|
causing the directory not be a mount trap after all.
|
|
|
|
|
|
|
|
autofs returns this if it detects that the process performing the
|
|
|
|
lookup is the automount daemon and that the mount has been
|
|
|
|
requested but has not yet completed. How it determines this is
|
|
|
|
discussed later. This allows the automount daemon not to get
|
|
|
|
caught in the mount trap.
|
|
|
|
|
|
|
|
There is a subtlety here. It is possible that a second autofs
|
|
|
|
filesystem can be mounted below the first and for both of them to
|
|
|
|
be managed by the same daemon. For the daemon to be able to mount
|
|
|
|
something on the second it must be able to "walk" down past the
|
|
|
|
first. This means that d_manage cannot *always* return -EISDIR for
|
|
|
|
the automount daemon. It must only return it when a mount has
|
|
|
|
been requested, but has not yet completed.
|
|
|
|
|
|
|
|
`d_manage` also returns `-EISDIR` if the dentry shouldn't be a
|
|
|
|
mount trap, either because it is a symbolic link or because it is
|
|
|
|
not empty.
|
|
|
|
|
|
|
|
- Any other negative value is treated as an error and returned
|
|
|
|
to the caller.
|
|
|
|
|
|
|
|
autofs can return
|
|
|
|
|
|
|
|
- -ENOENT if the automount daemon failed to mount anything,
|
|
|
|
- -ENOMEM if it ran out of memory,
|
|
|
|
- -EINTR if a signal arrived while waiting for expiry to
|
|
|
|
complete
|
|
|
|
- or any other error sent down by the automount daemon.
|
|
|
|
|
|
|
|
|
|
|
|
The second use case only occurs during an "RCU-walk" and so `rcu_walk`
|
|
|
|
will be set.
|
|
|
|
|
|
|
|
An RCU-walk is a fast and lightweight process for walking down a
|
|
|
|
filename path (i.e. it is like running on tip-toes). RCU-walk cannot
|
|
|
|
cope with all situations so when it finds a difficulty it falls back
|
|
|
|
to "REF-walk", which is slower but more robust.
|
|
|
|
|
|
|
|
RCU-walk will never call `->d_automount`; the filesystems must already
|
|
|
|
be mounted or RCU-walk cannot handle the path.
|
|
|
|
To determine if a mount-trap is safe for RCU-walk mode it calls
|
|
|
|
`->d_manage()` with `rcu_walk` set to `true`.
|
|
|
|
|
|
|
|
In this case `d_manage()` must avoid blocking and should avoid taking
|
|
|
|
spinlocks if at all possible. Its sole purpose is to determine if it
|
|
|
|
would be safe to follow down into any mounted directory and the only
|
|
|
|
reason that it might not be is if an expiry of the mount is
|
|
|
|
underway.
|
|
|
|
|
|
|
|
In the `rcu_walk` case, `d_manage()` cannot return -EISDIR to tell the
|
|
|
|
VFS that this is a directory that doesn't require d_automount. If
|
|
|
|
`rcu_walk` sees a dentry with DCACHE_NEED_AUTOMOUNT set but nothing
|
|
|
|
mounted, it *will* fall back to REF-walk. `d_manage()` cannot make the
|
|
|
|
VFS remain in RCU-walk mode, but can only tell it to get out of
|
|
|
|
RCU-walk mode by returning `-ECHILD`.
|
|
|
|
|
|
|
|
So `d_manage()`, when called with `rcu_walk` set, should either return
|
2019-05-14 22:44:14 +00:00
|
|
|
-ECHILD if there is any reason to believe it is unsafe to enter the
|
|
|
|
mounted filesystem, otherwise it should return 0.
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
autofs will return `-ECHILD` if an expiry of the filesystem has been
|
|
|
|
initiated or is being considered, otherwise it returns 0.
|
|
|
|
|
|
|
|
|
|
|
|
Mountpoint expiry
|
2019-11-17 17:24:34 +00:00
|
|
|
=================
|
2014-10-13 22:52:24 +00:00
|
|
|
|
2016-10-11 20:52:25 +00:00
|
|
|
The VFS has a mechanism for automatically expiring unused mounts,
|
2014-10-13 22:52:24 +00:00
|
|
|
much as it can expire any unused dentry information from the dcache.
|
2016-10-11 20:52:25 +00:00
|
|
|
This is guided by the MNT_SHRINKABLE flag. This only applies to
|
2014-10-13 22:52:24 +00:00
|
|
|
mounts that were created by `d_automount()` returning a filesystem to be
|
|
|
|
mounted. As autofs doesn't return such a filesystem but leaves the
|
|
|
|
mounting to the automount daemon, it must involve the automount daemon
|
|
|
|
in unmounting as well. This also means that autofs has more control
|
2019-05-14 22:44:14 +00:00
|
|
|
over expiry.
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
The VFS also supports "expiry" of mounts using the MNT_EXPIRE flag to
|
|
|
|
the `umount` system call. Unmounting with MNT_EXPIRE will fail unless
|
|
|
|
a previous attempt had been made, and the filesystem has been inactive
|
2018-06-08 00:11:38 +00:00
|
|
|
and untouched since that previous attempt. autofs does not depend on
|
2014-10-13 22:52:24 +00:00
|
|
|
this but has its own internal tracking of whether filesystems were
|
|
|
|
recently used. This allows individual names in the autofs directory
|
|
|
|
to expire separately.
|
|
|
|
|
|
|
|
With version 4 of the protocol, the automount daemon can try to
|
|
|
|
unmount any filesystems mounted on the autofs filesystem or remove any
|
|
|
|
symbolic links or empty directories any time it likes. If the unmount
|
|
|
|
or removal is successful the filesystem will be returned to the state
|
|
|
|
it was before the mount or creation, so that any access of the name
|
2019-05-14 22:44:14 +00:00
|
|
|
will trigger normal auto-mount processing. In particular, `rmdir` and
|
2014-10-13 22:52:24 +00:00
|
|
|
`unlink` do not leave negative entries in the dcache as a normal
|
|
|
|
filesystem would, so an attempt to access a recently-removed object is
|
|
|
|
passed to autofs for handling.
|
|
|
|
|
|
|
|
With version 5, this is not safe except for unmounting from top-level
|
|
|
|
directories. As lower-level directories are never mount traps, other
|
|
|
|
processes will see an empty directory as soon as the filesystem is
|
|
|
|
unmounted. So it is generally safest to use the autofs expiry
|
|
|
|
protocol described below.
|
|
|
|
|
|
|
|
Normally the daemon only wants to remove entries which haven't been
|
|
|
|
used for a while. For this purpose autofs maintains a "`last_used`"
|
|
|
|
time stamp on each directory or symlink. For symlinks it genuinely
|
|
|
|
does record the last time the symlink was "used" or followed to find
|
2019-05-14 22:44:17 +00:00
|
|
|
out where it points to. For directories the field is used slightly
|
|
|
|
differently. The field is updated at mount time and during expire
|
|
|
|
checks if it is found to be in use (ie. open file descriptor or
|
|
|
|
process working directory) and during path walks. The update done
|
|
|
|
during path walks prevents frequent expire and immediate mount of
|
|
|
|
frequently accessed automounts. But in the case where a GUI continually
|
|
|
|
access or an application frequently scans an autofs directory tree
|
|
|
|
there can be an accumulation of mounts that aren't actually being
|
|
|
|
used. To cater for this case the "`strictexpire`" autofs mount option
|
|
|
|
can be used to avoid the "`last_used`" update on path walk thereby
|
|
|
|
preventing this apparent inability to expire mounts that aren't
|
|
|
|
really in use.
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
The daemon is able to ask autofs if anything is due to be expired,
|
|
|
|
using an `ioctl` as discussed later. For a *direct* mount, autofs
|
|
|
|
considers if the entire mount-tree can be unmounted or not. For an
|
|
|
|
*indirect* mount, autofs considers each of the names in the top level
|
|
|
|
directory to determine if any of those can be unmounted and cleaned
|
|
|
|
up.
|
|
|
|
|
|
|
|
There is an option with indirect mounts to consider each of the leaves
|
|
|
|
that has been mounted on instead of considering the top-level names.
|
2019-05-14 22:44:20 +00:00
|
|
|
This was originally intended for compatibility with version 4 of autofs
|
|
|
|
and should be considered as deprecated for Sun Format automount maps.
|
|
|
|
However, it may be used again for amd format mount maps (which are
|
|
|
|
generally indirect maps) because the amd automounter allows for the
|
|
|
|
setting of an expire timeout for individual mounts. But there are
|
|
|
|
some difficulties in making the needed changes for this.
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
When autofs considers a directory it checks the `last_used` time and
|
|
|
|
compares it with the "timeout" value set when the filesystem was
|
|
|
|
mounted, though this check is ignored in some cases. It also checks if
|
|
|
|
the directory or anything below it is in use. For symbolic links,
|
|
|
|
only the `last_used` time is ever considered.
|
|
|
|
|
|
|
|
If both appear to support expiring the directory or symlink, an action
|
|
|
|
is taken.
|
|
|
|
|
|
|
|
There are two ways to ask autofs to consider expiry. The first is to
|
|
|
|
use the **AUTOFS_IOC_EXPIRE** ioctl. This only works for indirect
|
|
|
|
mounts. If it finds something in the root directory to expire it will
|
|
|
|
return the name of that thing. Once a name has been returned the
|
|
|
|
automount daemon needs to unmount any filesystems mounted below the
|
|
|
|
name normally. As described above, this is unsafe for non-toplevel
|
2019-05-14 22:44:14 +00:00
|
|
|
mounts in a version-5 autofs. For this reason the current `automount(8)`
|
2014-10-13 22:52:24 +00:00
|
|
|
does not use this ioctl.
|
|
|
|
|
|
|
|
The second mechanism uses either the **AUTOFS_DEV_IOCTL_EXPIRE_CMD** or
|
|
|
|
the **AUTOFS_IOC_EXPIRE_MULTI** ioctl. This will work for both direct and
|
|
|
|
indirect mounts. If it selects an object to expire, it will notify
|
|
|
|
the daemon using the notification mechanism described below. This
|
|
|
|
will block until the daemon acknowledges the expiry notification.
|
|
|
|
This implies that the "`EXPIRE`" ioctl must be sent from a different
|
|
|
|
thread than the one which handles notification.
|
|
|
|
|
|
|
|
While the ioctl is blocking, the entry is marked as "expiring" and
|
|
|
|
`d_manage` will block until the daemon affirms that the unmount has
|
|
|
|
completed (together with removing any directories that might have been
|
|
|
|
necessary), or has been aborted.
|
|
|
|
|
|
|
|
Communicating with autofs: detecting the daemon
|
2019-11-17 17:24:34 +00:00
|
|
|
===============================================
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
There are several forms of communication between the automount daemon
|
|
|
|
and the filesystem. As we have already seen, the daemon can create and
|
|
|
|
remove directories and symlinks using normal filesystem operations.
|
|
|
|
autofs knows whether a process requesting some operation is the daemon
|
|
|
|
or not based on its process-group id number (see getpgid(1)).
|
|
|
|
|
2016-10-11 20:52:25 +00:00
|
|
|
When an autofs filesystem is mounted the pgid of the mounting
|
2014-10-13 22:52:24 +00:00
|
|
|
processes is recorded unless the "pgrp=" option is given, in which
|
|
|
|
case that number is recorded instead. Any request arriving from a
|
|
|
|
process in that process group is considered to come from the daemon.
|
|
|
|
If the daemon ever has to be stopped and restarted a new pgid can be
|
|
|
|
provided through an ioctl as will be described below.
|
|
|
|
|
|
|
|
Communicating with autofs: the event pipe
|
2019-11-17 17:24:34 +00:00
|
|
|
=========================================
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
When an autofs filesystem is mounted, the 'write' end of a pipe must
|
|
|
|
be passed using the 'fd=' mount option. autofs will write
|
|
|
|
notification messages to this pipe for the daemon to respond to.
|
2019-11-17 17:24:34 +00:00
|
|
|
For version 5, the format of the message is::
|
|
|
|
|
|
|
|
struct autofs_v5_packet {
|
2019-11-17 17:24:35 +00:00
|
|
|
struct autofs_packet_hdr hdr;
|
2019-11-17 17:24:34 +00:00
|
|
|
autofs_wqt_t wait_queue_token;
|
|
|
|
__u32 dev;
|
|
|
|
__u64 ino;
|
|
|
|
__u32 uid;
|
|
|
|
__u32 gid;
|
|
|
|
__u32 pid;
|
|
|
|
__u32 tgid;
|
|
|
|
__u32 len;
|
|
|
|
char name[NAME_MAX+1];
|
2014-10-13 22:52:24 +00:00
|
|
|
};
|
|
|
|
|
2019-11-17 17:24:35 +00:00
|
|
|
And the format of the header is::
|
|
|
|
|
|
|
|
struct autofs_packet_hdr {
|
|
|
|
int proto_version; /* Protocol version */
|
|
|
|
int type; /* Type of packet */
|
|
|
|
};
|
|
|
|
|
2019-11-17 17:24:34 +00:00
|
|
|
where the type is one of ::
|
2014-10-13 22:52:24 +00:00
|
|
|
|
2019-11-17 17:24:34 +00:00
|
|
|
autofs_ptype_missing_indirect
|
|
|
|
autofs_ptype_expire_indirect
|
|
|
|
autofs_ptype_missing_direct
|
|
|
|
autofs_ptype_expire_direct
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
so messages can indicate that a name is missing (something tried to
|
|
|
|
access it but it isn't there) or that it has been selected for expiry.
|
|
|
|
|
|
|
|
The pipe will be set to "packet mode" (equivalent to passing
|
|
|
|
`O_DIRECT`) to _pipe2(2)_ so that a read from the pipe will return at
|
|
|
|
most one packet, and any unread portion of a packet will be discarded.
|
|
|
|
|
2017-07-10 18:40:19 +00:00
|
|
|
The `wait_queue_token` is a unique number which can identify a
|
2014-10-13 22:52:24 +00:00
|
|
|
particular request to be acknowledged. When a message is sent over
|
|
|
|
the pipe the affected dentry is marked as either "active" or
|
|
|
|
"expiring" and other accesses to it block until the message is
|
2019-05-14 22:44:14 +00:00
|
|
|
acknowledged using one of the ioctls below with the relevant
|
2017-07-10 18:40:19 +00:00
|
|
|
`wait_queue_token`.
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
Communicating with autofs: root directory ioctls
|
2019-11-17 17:24:34 +00:00
|
|
|
================================================
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
The root directory of an autofs filesystem will respond to a number of
|
2017-02-27 22:27:02 +00:00
|
|
|
ioctls. The process issuing the ioctl must have the CAP_SYS_ADMIN
|
2014-10-13 22:52:24 +00:00
|
|
|
capability, or must be the automount daemon.
|
|
|
|
|
|
|
|
The available ioctl commands are:
|
|
|
|
|
2019-11-17 17:24:34 +00:00
|
|
|
- **AUTOFS_IOC_READY**:
|
|
|
|
a notification has been handled. The argument
|
|
|
|
to the ioctl command is the "wait_queue_token" number
|
|
|
|
corresponding to the notification being acknowledged.
|
|
|
|
- **AUTOFS_IOC_FAIL**:
|
|
|
|
similar to above, but indicates failure with
|
|
|
|
the error code `ENOENT`.
|
|
|
|
- **AUTOFS_IOC_CATATONIC**:
|
|
|
|
Causes the autofs to enter "catatonic"
|
|
|
|
mode meaning that it stops sending notifications to the daemon.
|
|
|
|
This mode is also entered if a write to the pipe fails.
|
|
|
|
- **AUTOFS_IOC_PROTOVER**:
|
|
|
|
This returns the protocol version in use.
|
|
|
|
- **AUTOFS_IOC_PROTOSUBVER**:
|
|
|
|
Returns the protocol sub-version which
|
|
|
|
is really a version number for the implementation.
|
|
|
|
- **AUTOFS_IOC_SETTIMEOUT**:
|
|
|
|
This passes a pointer to an unsigned
|
|
|
|
long. The value is used to set the timeout for expiry, and
|
|
|
|
the current timeout value is stored back through the pointer.
|
|
|
|
- **AUTOFS_IOC_ASKUMOUNT**:
|
|
|
|
Returns, in the pointed-to `int`, 1 if
|
|
|
|
the filesystem could be unmounted. This is only a hint as
|
|
|
|
the situation could change at any instant. This call can be
|
|
|
|
used to avoid a more expensive full unmount attempt.
|
|
|
|
- **AUTOFS_IOC_EXPIRE**:
|
|
|
|
as described above, this asks if there is
|
|
|
|
anything suitable to expire. A pointer to a packet::
|
|
|
|
|
|
|
|
struct autofs_packet_expire_multi {
|
2019-11-17 17:24:35 +00:00
|
|
|
struct autofs_packet_hdr hdr;
|
2019-11-17 17:24:34 +00:00
|
|
|
autofs_wqt_t wait_queue_token;
|
|
|
|
int len;
|
|
|
|
char name[NAME_MAX+1];
|
|
|
|
};
|
2014-10-13 22:52:24 +00:00
|
|
|
|
2019-11-17 17:24:34 +00:00
|
|
|
is required. This is filled in with the name of something
|
|
|
|
that can be unmounted or removed. If nothing can be expired,
|
|
|
|
`errno` is set to `EAGAIN`. Even though a `wait_queue_token`
|
|
|
|
is present in the structure, no "wait queue" is established
|
|
|
|
and no acknowledgment is needed.
|
|
|
|
- **AUTOFS_IOC_EXPIRE_MULTI**:
|
|
|
|
This is similar to
|
|
|
|
**AUTOFS_IOC_EXPIRE** except that it causes notification to be
|
|
|
|
sent to the daemon, and it blocks until the daemon acknowledges.
|
|
|
|
The argument is an integer which can contain two different flags.
|
2014-10-13 22:52:24 +00:00
|
|
|
|
2019-11-17 17:24:34 +00:00
|
|
|
**AUTOFS_EXP_IMMEDIATE** causes `last_used` time to be ignored
|
|
|
|
and objects are expired if the are not in use.
|
2014-10-13 22:52:24 +00:00
|
|
|
|
2019-11-17 17:24:34 +00:00
|
|
|
**AUTOFS_EXP_FORCED** causes the in use status to be ignored
|
2024-09-08 18:37:42 +00:00
|
|
|
and objects are expired even if they are in use. This assumes
|
2019-11-17 17:24:34 +00:00
|
|
|
that the daemon has requested this because it is capable of
|
|
|
|
performing the umount.
|
2019-05-14 22:44:23 +00:00
|
|
|
|
2019-11-17 17:24:34 +00:00
|
|
|
**AUTOFS_EXP_LEAVES** will select a leaf rather than a top-level
|
|
|
|
name to expire. This is only safe when *maxproto* is 4.
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
Communicating with autofs: char-device ioctls
|
2019-11-17 17:24:34 +00:00
|
|
|
=============================================
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
It is not always possible to open the root of an autofs filesystem,
|
|
|
|
particularly a *direct* mounted filesystem. If the automount daemon
|
|
|
|
is restarted there is no way for it to regain control of existing
|
|
|
|
mounts using any of the above communication channels. To address this
|
|
|
|
need there is a "miscellaneous" character device (major 10, minor 235)
|
|
|
|
which can be used to communicate directly with the autofs filesystem.
|
|
|
|
It requires CAP_SYS_ADMIN for access.
|
|
|
|
|
2019-11-17 17:24:34 +00:00
|
|
|
The 'ioctl's that can be used on this device are described in a separate
|
2024-11-20 05:52:46 +00:00
|
|
|
document `autofs-mount-control.rst`, and are summarised briefly here.
|
2019-11-17 17:24:34 +00:00
|
|
|
Each ioctl is passed a pointer to an `autofs_dev_ioctl` structure::
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
struct autofs_dev_ioctl {
|
|
|
|
__u32 ver_major;
|
|
|
|
__u32 ver_minor;
|
|
|
|
__u32 size; /* total size of data passed in
|
|
|
|
* including this struct */
|
|
|
|
__s32 ioctlfd; /* automount command fd */
|
|
|
|
|
2017-02-27 22:27:08 +00:00
|
|
|
/* Command parameters */
|
|
|
|
union {
|
|
|
|
struct args_protover protover;
|
|
|
|
struct args_protosubver protosubver;
|
|
|
|
struct args_openmount openmount;
|
|
|
|
struct args_ready ready;
|
|
|
|
struct args_fail fail;
|
|
|
|
struct args_setpipefd setpipefd;
|
|
|
|
struct args_timeout timeout;
|
|
|
|
struct args_requester requester;
|
|
|
|
struct args_expire expire;
|
|
|
|
struct args_askumount askumount;
|
|
|
|
struct args_ismountpoint ismountpoint;
|
|
|
|
};
|
2014-10-13 22:52:24 +00:00
|
|
|
|
2023-05-23 08:19:35 +00:00
|
|
|
char path[];
|
2014-10-13 22:52:24 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
For the **OPEN_MOUNT** and **IS_MOUNTPOINT** commands, the target
|
|
|
|
filesystem is identified by the `path`. All other commands identify
|
|
|
|
the filesystem by the `ioctlfd` which is a file descriptor open on the
|
|
|
|
root, and which can be returned by **OPEN_MOUNT**.
|
|
|
|
|
|
|
|
The `ver_major` and `ver_minor` are in/out parameters which check that
|
|
|
|
the requested version is supported, and report the maximum version
|
|
|
|
that the kernel module can support.
|
|
|
|
|
|
|
|
Commands are:
|
|
|
|
|
2019-11-17 17:24:34 +00:00
|
|
|
- **AUTOFS_DEV_IOCTL_VERSION_CMD**:
|
|
|
|
does nothing, except validate and
|
|
|
|
set version numbers.
|
|
|
|
- **AUTOFS_DEV_IOCTL_OPENMOUNT_CMD**:
|
|
|
|
return an open file descriptor
|
|
|
|
on the root of an autofs filesystem. The filesystem is identified
|
|
|
|
by name and device number, which is stored in `openmount.devid`.
|
|
|
|
Device numbers for existing filesystems can be found in
|
|
|
|
`/proc/self/mountinfo`.
|
|
|
|
- **AUTOFS_DEV_IOCTL_CLOSEMOUNT_CMD**:
|
|
|
|
same as `close(ioctlfd)`.
|
|
|
|
- **AUTOFS_DEV_IOCTL_SETPIPEFD_CMD**:
|
|
|
|
if the filesystem is in
|
|
|
|
catatonic mode, this can provide the write end of a new pipe
|
|
|
|
in `setpipefd.pipefd` to re-establish communication with a daemon.
|
|
|
|
The process group of the calling process is used to identify the
|
|
|
|
daemon.
|
|
|
|
- **AUTOFS_DEV_IOCTL_REQUESTER_CMD**:
|
|
|
|
`path` should be a
|
|
|
|
name within the filesystem that has been auto-mounted on.
|
|
|
|
On successful return, `requester.uid` and `requester.gid` will be
|
|
|
|
the UID and GID of the process which triggered that mount.
|
|
|
|
- **AUTOFS_DEV_IOCTL_ISMOUNTPOINT_CMD**:
|
|
|
|
Check if path is a
|
|
|
|
mountpoint of a particular type - see separate documentation for
|
|
|
|
details.
|
|
|
|
|
|
|
|
- **AUTOFS_DEV_IOCTL_PROTOVER_CMD**
|
|
|
|
- **AUTOFS_DEV_IOCTL_PROTOSUBVER_CMD**
|
|
|
|
- **AUTOFS_DEV_IOCTL_READY_CMD**
|
|
|
|
- **AUTOFS_DEV_IOCTL_FAIL_CMD**
|
|
|
|
- **AUTOFS_DEV_IOCTL_CATATONIC_CMD**
|
|
|
|
- **AUTOFS_DEV_IOCTL_TIMEOUT_CMD**
|
|
|
|
- **AUTOFS_DEV_IOCTL_EXPIRE_CMD**
|
|
|
|
- **AUTOFS_DEV_IOCTL_ASKUMOUNT_CMD**
|
|
|
|
|
|
|
|
These all have the same
|
|
|
|
function as the similarly named **AUTOFS_IOC** ioctls, except
|
|
|
|
that **FAIL** can be given an explicit error number in `fail.status`
|
|
|
|
instead of assuming `ENOENT`, and this **EXPIRE** command
|
|
|
|
corresponds to **AUTOFS_IOC_EXPIRE_MULTI**.
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
Catatonic mode
|
2019-11-17 17:24:34 +00:00
|
|
|
==============
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
As mentioned, an autofs mount can enter "catatonic" mode. This
|
|
|
|
happens if a write to the notification pipe fails, or if it is
|
|
|
|
explicitly requested by an `ioctl`.
|
|
|
|
|
|
|
|
When entering catatonic mode, the pipe is closed and any pending
|
|
|
|
notifications are acknowledged with the error `ENOENT`.
|
|
|
|
|
|
|
|
Once in catatonic mode attempts to access non-existing names will
|
|
|
|
result in `ENOENT` while attempts to access existing directories will
|
|
|
|
be treated in the same way as if they came from the daemon, so mount
|
|
|
|
traps will not fire.
|
|
|
|
|
|
|
|
When the filesystem is mounted a _uid_ and _gid_ can be given which
|
|
|
|
set the ownership of directories and symbolic links. When the
|
|
|
|
filesystem is in catatonic mode, any process with a matching UID can
|
|
|
|
create directories or symlinks in the root directory, but not in other
|
|
|
|
directories.
|
|
|
|
|
|
|
|
Catatonic mode can only be left via the
|
|
|
|
**AUTOFS_DEV_IOCTL_OPENMOUNT_CMD** ioctl on the `/dev/autofs`.
|
|
|
|
|
2019-05-14 22:44:26 +00:00
|
|
|
The "ignore" mount option
|
2019-11-17 17:24:34 +00:00
|
|
|
=========================
|
2019-05-14 22:44:26 +00:00
|
|
|
|
|
|
|
The "ignore" mount option can be used to provide a generic indicator
|
|
|
|
to applications that the mount entry should be ignored when displaying
|
|
|
|
mount information.
|
|
|
|
|
|
|
|
In other OSes that provide autofs and that provide a mount list to user
|
|
|
|
space based on the kernel mount list a no-op mount option ("ignore" is
|
|
|
|
the one use on the most common OSes) is allowed so that autofs file
|
|
|
|
system users can optionally use it.
|
|
|
|
|
|
|
|
This is intended to be used by user space programs to exclude autofs
|
|
|
|
mounts from consideration when reading the mounts list.
|
|
|
|
|
2014-10-13 22:52:24 +00:00
|
|
|
autofs, name spaces, and shared mounts
|
2019-11-17 17:24:34 +00:00
|
|
|
======================================
|
2014-10-13 22:52:24 +00:00
|
|
|
|
|
|
|
With bind mounts and name spaces it is possible for an autofs
|
|
|
|
filesystem to appear at multiple places in one or more filesystem
|
|
|
|
name spaces. For this to work sensibly, the autofs filesystem should
|
2019-11-17 17:24:34 +00:00
|
|
|
always be mounted "shared". e.g. ::
|
2014-10-13 22:52:24 +00:00
|
|
|
|
2019-11-17 17:24:34 +00:00
|
|
|
mount --make-shared /autofs/mount/point
|
2014-10-13 22:52:24 +00:00
|
|
|
|
2017-02-27 22:27:02 +00:00
|
|
|
The automount daemon is only able to manage a single mount location for
|
2014-10-13 22:52:24 +00:00
|
|
|
an autofs filesystem and if mounts on that are not 'shared', other
|
|
|
|
locations will not behave as expected. In particular access to those
|
2019-11-17 17:24:34 +00:00
|
|
|
other locations will likely result in the `ELOOP` error ::
|
2014-10-13 22:52:24 +00:00
|
|
|
|
2019-11-17 17:24:34 +00:00
|
|
|
Too many levels of symbolic links
|