2017-02-01 00:45:59 +00:00
|
|
|
// +build linux
|
|
|
|
|
|
|
|
/*
|
|
|
|
Copyright 2014 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package mount
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
|
|
|
"fmt"
|
2017-06-06 07:19:04 +00:00
|
|
|
"hash/fnv"
|
2017-02-01 00:45:59 +00:00
|
|
|
"io"
|
|
|
|
"os"
|
|
|
|
"os/exec"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"syscall"
|
|
|
|
|
|
|
|
"github.com/golang/glog"
|
|
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
|
|
|
utilexec "k8s.io/kubernetes/pkg/util/exec"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
// How many times to retry for a consistent read of /proc/mounts.
|
|
|
|
maxListTries = 3
|
|
|
|
// Number of fields per line in /proc/mounts as per the fstab man page.
|
|
|
|
expectedNumFieldsPerLine = 6
|
|
|
|
// Location of the mount file to use
|
|
|
|
procMountsPath = "/proc/mounts"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
// 'fsck' found errors and corrected them
|
|
|
|
fsckErrorsCorrected = 1
|
|
|
|
// 'fsck' found errors but exited without correcting them
|
|
|
|
fsckErrorsUncorrected = 4
|
|
|
|
)
|
|
|
|
|
|
|
|
// Mounter provides the default implementation of mount.Interface
|
|
|
|
// for the linux platform. This implementation assumes that the
|
|
|
|
// kubelet is running in the host's root mount namespace.
|
|
|
|
type Mounter struct {
|
|
|
|
mounterPath string
|
|
|
|
}
|
|
|
|
|
|
|
|
// Mount mounts source to target as fstype with given options. 'source' and 'fstype' must
|
|
|
|
// be an emtpy string in case it's not required, e.g. for remount, or for auto filesystem
|
|
|
|
// type, where kernel handles fs type for you. The mount 'options' is a list of options,
|
|
|
|
// currently come from mount(8), e.g. "ro", "remount", "bind", etc. If no more option is
|
|
|
|
// required, call Mount with an empty string list or nil.
|
|
|
|
func (mounter *Mounter) Mount(source string, target string, fstype string, options []string) error {
|
2017-06-06 07:19:04 +00:00
|
|
|
// Path to mounter binary if containerized mounter is needed. Otherwise, it is set to empty.
|
2017-02-01 00:45:59 +00:00
|
|
|
// All Linux distros are expected to be shipped with a mount utility that an support bind mounts.
|
2017-06-06 07:19:04 +00:00
|
|
|
mounterPath := ""
|
2017-02-01 00:45:59 +00:00
|
|
|
bind, bindRemountOpts := isBind(options)
|
|
|
|
if bind {
|
2017-06-06 07:19:04 +00:00
|
|
|
err := doMount(mounterPath, defaultMountCommand, source, target, fstype, []string{"bind"})
|
2017-02-01 00:45:59 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-06-06 07:19:04 +00:00
|
|
|
return doMount(mounterPath, defaultMountCommand, source, target, fstype, bindRemountOpts)
|
2017-02-01 00:45:59 +00:00
|
|
|
}
|
|
|
|
// The list of filesystems that require containerized mounter on GCI image cluster
|
2017-06-06 07:19:04 +00:00
|
|
|
fsTypesNeedMounter := sets.NewString("nfs", "glusterfs", "ceph", "cifs")
|
2017-02-01 00:45:59 +00:00
|
|
|
if fsTypesNeedMounter.Has(fstype) {
|
|
|
|
mounterPath = mounter.mounterPath
|
|
|
|
}
|
2017-06-06 07:19:04 +00:00
|
|
|
return doMount(mounterPath, defaultMountCommand, source, target, fstype, options)
|
2017-02-01 00:45:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// isBind detects whether a bind mount is being requested and makes the remount options to
|
|
|
|
// use in case of bind mount, due to the fact that bind mount doesn't respect mount options.
|
|
|
|
// The list equals:
|
|
|
|
// options - 'bind' + 'remount' (no duplicate)
|
|
|
|
func isBind(options []string) (bool, []string) {
|
|
|
|
bindRemountOpts := []string{"remount"}
|
|
|
|
bind := false
|
|
|
|
|
|
|
|
if len(options) != 0 {
|
|
|
|
for _, option := range options {
|
|
|
|
switch option {
|
|
|
|
case "bind":
|
|
|
|
bind = true
|
|
|
|
break
|
|
|
|
case "remount":
|
|
|
|
break
|
|
|
|
default:
|
|
|
|
bindRemountOpts = append(bindRemountOpts, option)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return bind, bindRemountOpts
|
|
|
|
}
|
|
|
|
|
2017-06-06 07:19:04 +00:00
|
|
|
// doMount runs the mount command. mounterPath is the path to mounter binary if containerized mounter is used.
|
|
|
|
func doMount(mounterPath string, mountCmd string, source string, target string, fstype string, options []string) error {
|
2017-02-01 00:45:59 +00:00
|
|
|
mountArgs := makeMountArgs(source, target, fstype, options)
|
2017-06-06 07:19:04 +00:00
|
|
|
if len(mounterPath) > 0 {
|
|
|
|
mountArgs = append([]string{mountCmd}, mountArgs...)
|
|
|
|
mountCmd = mounterPath
|
|
|
|
}
|
2017-02-01 00:45:59 +00:00
|
|
|
|
|
|
|
glog.V(4).Infof("Mounting cmd (%s) with arguments (%s)", mountCmd, mountArgs)
|
|
|
|
command := exec.Command(mountCmd, mountArgs...)
|
|
|
|
output, err := command.CombinedOutput()
|
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("Mount failed: %v\nMounting command: %s\nMounting arguments: %s %s %s %v\nOutput: %s\n", err, mountCmd, source, target, fstype, options, string(output))
|
|
|
|
return fmt.Errorf("mount failed: %v\nMounting command: %s\nMounting arguments: %s %s %s %v\nOutput: %s\n",
|
|
|
|
err, mountCmd, source, target, fstype, options, string(output))
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// makeMountArgs makes the arguments to the mount(8) command.
|
|
|
|
func makeMountArgs(source, target, fstype string, options []string) []string {
|
|
|
|
// Build mount command as follows:
|
|
|
|
// mount [-t $fstype] [-o $options] [$source] $target
|
|
|
|
mountArgs := []string{}
|
|
|
|
if len(fstype) > 0 {
|
|
|
|
mountArgs = append(mountArgs, "-t", fstype)
|
|
|
|
}
|
|
|
|
if len(options) > 0 {
|
|
|
|
mountArgs = append(mountArgs, "-o", strings.Join(options, ","))
|
|
|
|
}
|
|
|
|
if len(source) > 0 {
|
|
|
|
mountArgs = append(mountArgs, source)
|
|
|
|
}
|
|
|
|
mountArgs = append(mountArgs, target)
|
|
|
|
|
|
|
|
return mountArgs
|
|
|
|
}
|
|
|
|
|
|
|
|
// Unmount unmounts the target.
|
|
|
|
func (mounter *Mounter) Unmount(target string) error {
|
|
|
|
glog.V(4).Infof("Unmounting %s", target)
|
|
|
|
command := exec.Command("umount", target)
|
|
|
|
output, err := command.CombinedOutput()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Unmount failed: %v\nUnmounting arguments: %s\nOutput: %s\n", err, target, string(output))
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// List returns a list of all mounted filesystems.
|
|
|
|
func (*Mounter) List() ([]MountPoint, error) {
|
|
|
|
return listProcMounts(procMountsPath)
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsLikelyNotMountPoint determines if a directory is not a mountpoint.
|
|
|
|
// It is fast but not necessarily ALWAYS correct. If the path is in fact
|
|
|
|
// a bind mount from one part of a mount to another it will not be detected.
|
|
|
|
// mkdir /tmp/a /tmp/b; mount --bin /tmp/a /tmp/b; IsLikelyNotMountPoint("/tmp/b")
|
|
|
|
// will return true. When in fact /tmp/b is a mount point. If this situation
|
|
|
|
// if of interest to you, don't use this function...
|
|
|
|
func (mounter *Mounter) IsLikelyNotMountPoint(file string) (bool, error) {
|
|
|
|
return IsNotMountPoint(file)
|
|
|
|
}
|
|
|
|
|
|
|
|
func IsNotMountPoint(file string) (bool, error) {
|
|
|
|
stat, err := os.Stat(file)
|
|
|
|
if err != nil {
|
|
|
|
return true, err
|
|
|
|
}
|
|
|
|
rootStat, err := os.Lstat(file + "/..")
|
|
|
|
if err != nil {
|
|
|
|
return true, err
|
|
|
|
}
|
|
|
|
// If the directory has a different device as parent, then it is a mountpoint.
|
|
|
|
if stat.Sys().(*syscall.Stat_t).Dev != rootStat.Sys().(*syscall.Stat_t).Dev {
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// DeviceOpened checks if block device in use by calling Open with O_EXCL flag.
|
|
|
|
// If pathname is not a device, log and return false with nil error.
|
|
|
|
// If open returns errno EBUSY, return true with nil error.
|
|
|
|
// If open returns nil, return false with nil error.
|
|
|
|
// Otherwise, return false with error
|
|
|
|
func (mounter *Mounter) DeviceOpened(pathname string) (bool, error) {
|
|
|
|
return exclusiveOpenFailsOnDevice(pathname)
|
|
|
|
}
|
|
|
|
|
|
|
|
// PathIsDevice uses FileInfo returned from os.Stat to check if path refers
|
|
|
|
// to a device.
|
|
|
|
func (mounter *Mounter) PathIsDevice(pathname string) (bool, error) {
|
|
|
|
return pathIsDevice(pathname)
|
|
|
|
}
|
|
|
|
|
|
|
|
func exclusiveOpenFailsOnDevice(pathname string) (bool, error) {
|
|
|
|
isDevice, err := pathIsDevice(pathname)
|
|
|
|
if err != nil {
|
|
|
|
return false, fmt.Errorf(
|
|
|
|
"PathIsDevice failed for path %q: %v",
|
|
|
|
pathname,
|
|
|
|
err)
|
|
|
|
}
|
|
|
|
if !isDevice {
|
|
|
|
glog.Errorf("Path %q is not refering to a device.", pathname)
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
fd, errno := syscall.Open(pathname, syscall.O_RDONLY|syscall.O_EXCL, 0)
|
|
|
|
// If the device is in use, open will return an invalid fd.
|
|
|
|
// When this happens, it is expected that Close will fail and throw an error.
|
|
|
|
defer syscall.Close(fd)
|
|
|
|
if errno == nil {
|
|
|
|
// device not in use
|
|
|
|
return false, nil
|
|
|
|
} else if errno == syscall.EBUSY {
|
|
|
|
// device is in use
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
// error during call to Open
|
|
|
|
return false, errno
|
|
|
|
}
|
|
|
|
|
|
|
|
func pathIsDevice(pathname string) (bool, error) {
|
|
|
|
finfo, err := os.Stat(pathname)
|
|
|
|
if os.IsNotExist(err) {
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
// err in call to os.Stat
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
// path refers to a device
|
|
|
|
if finfo.Mode()&os.ModeDevice != 0 {
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
// path does not refer to device
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
//GetDeviceNameFromMount: given a mount point, find the device name from its global mount point
|
|
|
|
func (mounter *Mounter) GetDeviceNameFromMount(mountPath, pluginDir string) (string, error) {
|
|
|
|
return getDeviceNameFromMount(mounter, mountPath, pluginDir)
|
|
|
|
}
|
|
|
|
|
|
|
|
func listProcMounts(mountFilePath string) ([]MountPoint, error) {
|
|
|
|
hash1, err := readProcMounts(mountFilePath, nil)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := 0; i < maxListTries; i++ {
|
|
|
|
mps := []MountPoint{}
|
|
|
|
hash2, err := readProcMounts(mountFilePath, &mps)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if hash1 == hash2 {
|
|
|
|
// Success
|
|
|
|
return mps, nil
|
|
|
|
}
|
|
|
|
hash1 = hash2
|
|
|
|
}
|
|
|
|
return nil, fmt.Errorf("failed to get a consistent snapshot of %v after %d tries", mountFilePath, maxListTries)
|
|
|
|
}
|
|
|
|
|
|
|
|
// readProcMounts reads the given mountFilePath (normally /proc/mounts) and produces a hash
|
|
|
|
// of the contents. If the out argument is not nil, this fills it with MountPoint structs.
|
|
|
|
func readProcMounts(mountFilePath string, out *[]MountPoint) (uint32, error) {
|
|
|
|
file, err := os.Open(mountFilePath)
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
defer file.Close()
|
|
|
|
return readProcMountsFrom(file, out)
|
|
|
|
}
|
|
|
|
|
|
|
|
func readProcMountsFrom(file io.Reader, out *[]MountPoint) (uint32, error) {
|
2017-06-06 07:19:04 +00:00
|
|
|
hash := fnv.New32a()
|
2017-02-01 00:45:59 +00:00
|
|
|
scanner := bufio.NewReader(file)
|
|
|
|
for {
|
|
|
|
line, err := scanner.ReadString('\n')
|
|
|
|
if err == io.EOF {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
fields := strings.Fields(line)
|
|
|
|
if len(fields) != expectedNumFieldsPerLine {
|
|
|
|
return 0, fmt.Errorf("wrong number of fields (expected %d, got %d): %s", expectedNumFieldsPerLine, len(fields), line)
|
|
|
|
}
|
|
|
|
|
|
|
|
fmt.Fprintf(hash, "%s", line)
|
|
|
|
|
|
|
|
if out != nil {
|
|
|
|
mp := MountPoint{
|
|
|
|
Device: fields[0],
|
|
|
|
Path: fields[1],
|
|
|
|
Type: fields[2],
|
|
|
|
Opts: strings.Split(fields[3], ","),
|
|
|
|
}
|
|
|
|
|
|
|
|
freq, err := strconv.Atoi(fields[4])
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
mp.Freq = freq
|
|
|
|
|
|
|
|
pass, err := strconv.Atoi(fields[5])
|
|
|
|
if err != nil {
|
|
|
|
return 0, err
|
|
|
|
}
|
|
|
|
mp.Pass = pass
|
|
|
|
|
|
|
|
*out = append(*out, mp)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return hash.Sum32(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// formatAndMount uses unix utils to format and mount the given disk
|
|
|
|
func (mounter *SafeFormatAndMount) formatAndMount(source string, target string, fstype string, options []string) error {
|
|
|
|
options = append(options, "defaults")
|
|
|
|
|
|
|
|
// Run fsck on the disk to fix repairable issues
|
|
|
|
glog.V(4).Infof("Checking for issues with fsck on disk: %s", source)
|
|
|
|
args := []string{"-a", source}
|
|
|
|
cmd := mounter.Runner.Command("fsck", args...)
|
|
|
|
out, err := cmd.CombinedOutput()
|
|
|
|
if err != nil {
|
|
|
|
ee, isExitError := err.(utilexec.ExitError)
|
|
|
|
switch {
|
|
|
|
case err == utilexec.ErrExecutableNotFound:
|
|
|
|
glog.Warningf("'fsck' not found on system; continuing mount without running 'fsck'.")
|
|
|
|
case isExitError && ee.ExitStatus() == fsckErrorsCorrected:
|
|
|
|
glog.Infof("Device %s has errors which were corrected by fsck.", source)
|
|
|
|
case isExitError && ee.ExitStatus() == fsckErrorsUncorrected:
|
|
|
|
return fmt.Errorf("'fsck' found errors on device %s but could not correct them: %s.", source, string(out))
|
|
|
|
case isExitError && ee.ExitStatus() > fsckErrorsUncorrected:
|
|
|
|
glog.Infof("`fsck` error %s", string(out))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try to mount the disk
|
|
|
|
glog.V(4).Infof("Attempting to mount disk: %s %s %s", fstype, source, target)
|
2017-06-06 07:19:04 +00:00
|
|
|
mountErr := mounter.Interface.Mount(source, target, fstype, options)
|
|
|
|
if mountErr != nil {
|
|
|
|
// Mount failed. This indicates either that the disk is unformatted or
|
|
|
|
// it contains an unexpected filesystem.
|
|
|
|
existingFormat, err := mounter.getDiskFormat(source)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if existingFormat == "" {
|
2017-02-01 00:45:59 +00:00
|
|
|
// Disk is unformatted so format it.
|
2017-06-06 07:19:04 +00:00
|
|
|
args = []string{source}
|
2017-02-01 00:45:59 +00:00
|
|
|
// Use 'ext4' as the default
|
|
|
|
if len(fstype) == 0 {
|
|
|
|
fstype = "ext4"
|
|
|
|
}
|
2017-06-06 07:19:04 +00:00
|
|
|
|
2017-02-01 00:45:59 +00:00
|
|
|
if fstype == "ext4" || fstype == "ext3" {
|
2017-02-03 13:41:32 +00:00
|
|
|
args = []string{"-F", source}
|
2017-02-01 00:45:59 +00:00
|
|
|
}
|
|
|
|
glog.Infof("Disk %q appears to be unformatted, attempting to format as type: %q with options: %v", source, fstype, args)
|
|
|
|
cmd := mounter.Runner.Command("mkfs."+fstype, args...)
|
|
|
|
_, err := cmd.CombinedOutput()
|
|
|
|
if err == nil {
|
|
|
|
// the disk has been formatted successfully try to mount it again.
|
|
|
|
glog.Infof("Disk successfully formatted (mkfs): %s - %s %s", fstype, source, target)
|
|
|
|
return mounter.Interface.Mount(source, target, fstype, options)
|
|
|
|
}
|
|
|
|
glog.Errorf("format of disk %q failed: type:(%q) target:(%q) options:(%q)error:(%v)", source, fstype, target, options, err)
|
|
|
|
return err
|
2017-06-06 07:19:04 +00:00
|
|
|
} else {
|
|
|
|
// Disk is already formatted and failed to mount
|
|
|
|
if len(fstype) == 0 || fstype == existingFormat {
|
|
|
|
// This is mount error
|
|
|
|
return mountErr
|
|
|
|
} else {
|
|
|
|
// Block device is formatted with unexpected filesystem, let the user know
|
|
|
|
return fmt.Errorf("failed to mount the volume as %q, it's already formatted with %q. Mount error: %v", fstype, existingFormat, mountErr)
|
|
|
|
}
|
2017-02-01 00:45:59 +00:00
|
|
|
}
|
|
|
|
}
|
2017-06-06 07:19:04 +00:00
|
|
|
return mountErr
|
2017-02-01 00:45:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// diskLooksUnformatted uses 'lsblk' to see if the given disk is unformated
|
2017-06-06 07:19:04 +00:00
|
|
|
func (mounter *SafeFormatAndMount) getDiskFormat(disk string) (string, error) {
|
2017-02-01 00:45:59 +00:00
|
|
|
args := []string{"-nd", "-o", "FSTYPE", disk}
|
|
|
|
cmd := mounter.Runner.Command("lsblk", args...)
|
|
|
|
glog.V(4).Infof("Attempting to determine if disk %q is formatted using lsblk with args: (%v)", disk, args)
|
|
|
|
dataOut, err := cmd.CombinedOutput()
|
|
|
|
output := strings.TrimSpace(string(dataOut))
|
|
|
|
|
|
|
|
// TODO (#13212): check if this disk has partitions and return false, and
|
|
|
|
// an error if so.
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
glog.Errorf("Could not determine if disk %q is formatted (%v)", disk, err)
|
2017-06-06 07:19:04 +00:00
|
|
|
return "", err
|
2017-02-01 00:45:59 +00:00
|
|
|
}
|
|
|
|
|
2017-06-06 07:19:04 +00:00
|
|
|
return strings.TrimSpace(output), nil
|
2017-02-01 00:45:59 +00:00
|
|
|
}
|