I've already taken a look at both of these:
But, my problem appears to be different.
I have built an extensive library that's used to call Linux CLI tools. It's built around proc_open
, it's family and POSIX
.
I'm using it to successfully execute all (until I hit this mount
/umount
bug) CLI tools.
Now, I'm building a RAID setup routine, that involves partprobe
, parted
- rm, mklabel, mkpart, mdadm
- stop, zero-superblock, create, dd
, mkfs
and ultimately mount
/umount
.
There are actually two graceful routines, one for assembling the RAID, the other one for disassembly.
As the title says, the problem relies in mount
and umount
. The other tools and their commands listed above execute successfully.
Environment
Arch Linux - Linux stone 3.11.6-1-ARCH #1 SMP PREEMPT Fri Oct 18 23:22:36 CEST 2013 x86_64 GNU/Linux.
The Arch is running with systemd
- might be that is somehow affecting the mounting.
An Apache web server (latest), that runs mod_php (latest). Apache is run as http:http
.
http
is in wheel
group, and wheels
are sudoers - %wheel ALL=(ALL) NOPASSWD: ALL
.
Please, don't start the webserver
being given a full root capabilities discussion - the unit is a NAS, it's running a custom WebOS, and it's meant for intranet only. Even if there are hacking attempts - those will, most probably, break the whole system and that's not healthy for the customer. The NAS is a storage for Mobotix IP cameras, it runs a load of dependent services and the units are already deployed in over 30 objects with no issues. In short, the webserver
is not serving a web, but an OS.
Before writing, I added, for a quick test, http
explicitly to sudoers - http ALL=(ALL) NOPASSWD: ALL
- didn't work.
Problem
The last command run in the RAID assembly process is mount /dev/md/stone\:supershare /mnt/supershare
, which returns with an exit code of 0
.
Performing a subsequent mount results in:
mount: /dev/md127 is already mounted or /mnt/supershare busy
/dev/md127 is already mounted on /mnt/supershare
with an exit code of 32
. So, the array is mounted somewhere.
Performing an umount /dev/md/stone\:supershare
afterwards the above mount
, returns with an exit code of 0
. Performing an subsequent umount
results in:
umount: /dev/md/stone:supershare: not mounted
The commands above are auto-run with sudo.
So, it's mounted successfully and unmounted sucessfully, but... I'm logged in as root
on TTY0, running lsblk
after having performed the mount
operation, yet, I do not see the mountpoint
:
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
sda 8:0 0 55.9G 0 disk
├─sda1 8:1 0 1M 0 part
├─sda2 8:2 0 1G 0 part [SWAP]
├─sda3 8:3 0 12G 0 part /
└─sda4 8:4 0 16.6G 0 part /home
sdb 8:16 0 931.5G 0 disk
└─sdb1 8:17 0 899M 0 part
└─md127 9:127 0 1.8G 0 raid0
sdc 8:32 0 931.5G 0 disk
└─sdc1 8:33 0 899M 0 part
└─md127 9:127 0 1.8G 0 raid0
Attempting the same mount
command from TTY0 mounts it successfully (lsblk displays after).
If I mount
it with my CLI tool, then run mount -l
and lsblk
also with the CLI tool, the mountpoint is visible.
Running immediately both commands from TTY0 as root, do not display the mountpoint.
Rebooting, to reset all mounts (not automounted), then, mounting from TTY0 and running lsblk
from TTY0 displays the mountpoint.
Then, running lsblk
with CLI tool, displays the mountpoint.
Then, running umount
with CLI tool, exit code 0
- unmounted.
Running lsblk
with CLI tool again, does not display the mountpoint.
Running lsblk
from TTY0, still does display the mountpoint.
It appears that when the mount
/umount
is run with my CLI tool, it executes the commands privately for the sudo
session runner.
umount
ing after TTY0 has mounted, does unmount it, but again - privately.
Logging in from TTY0 as http
and running lsblk
after having mounted the RAID from CLI tool, the mountpoint is not displayed. This kind of negates the "executes privately for the sudo
session runner".
I've also found a material in IBM's:
The mount command uses the real user ID, not the effective user ID, to determine if the user has appropriate access. System group members can issue device mounts, provided they have write access to the mount point and those mounts specified in the /etc/file systems file. Users with root user authority can issue any mount command.
I hope I've explained good enough and not too confusing, I also hope that you guys will be able to help me catch the issue here.
Update (2013-10-28)
I attempted a test with the CLI tool outside web context, a simple PHP file, that'd I exec with root
and a custom user.
In both scenarios, the mounting and unmounting was successful. So, it must be something with Apache executing the commands, though, I don't understand why do other commands work.
Question
What is causing the issue, and how do I overcome it?