]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/mount.c
mount: add automatic start ordering dependencies for mounts
[thirdparty/systemd.git] / src / mount.c
1 /*-*- Mode: C; c-basic-offset: 8 -*-*/
2
3 /***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <errno.h>
23 #include <stdio.h>
24 #include <mntent.h>
25 #include <sys/epoll.h>
26 #include <signal.h>
27
28 #include "unit.h"
29 #include "mount.h"
30 #include "load-fragment.h"
31 #include "load-dropin.h"
32 #include "log.h"
33 #include "strv.h"
34 #include "mount-setup.h"
35 #include "unit-name.h"
36 #include "mount.h"
37 #include "dbus-mount.h"
38 #include "special.h"
39
40 static const UnitActiveState state_translation_table[_MOUNT_STATE_MAX] = {
41 [MOUNT_DEAD] = UNIT_INACTIVE,
42 [MOUNT_MOUNTING] = UNIT_ACTIVATING,
43 [MOUNT_MOUNTING_DONE] = UNIT_ACTIVE,
44 [MOUNT_MOUNTED] = UNIT_ACTIVE,
45 [MOUNT_REMOUNTING] = UNIT_RELOADING,
46 [MOUNT_UNMOUNTING] = UNIT_DEACTIVATING,
47 [MOUNT_MOUNTING_SIGTERM] = UNIT_DEACTIVATING,
48 [MOUNT_MOUNTING_SIGKILL] = UNIT_DEACTIVATING,
49 [MOUNT_REMOUNTING_SIGTERM] = UNIT_RELOADING,
50 [MOUNT_REMOUNTING_SIGKILL] = UNIT_RELOADING,
51 [MOUNT_UNMOUNTING_SIGTERM] = UNIT_DEACTIVATING,
52 [MOUNT_UNMOUNTING_SIGKILL] = UNIT_DEACTIVATING,
53 [MOUNT_MAINTENANCE] = UNIT_MAINTENANCE
54 };
55
56 static void mount_init(Unit *u) {
57 Mount *m = MOUNT(u);
58
59 assert(u);
60 assert(u->meta.load_state == UNIT_STUB);
61
62 m->timeout_usec = DEFAULT_TIMEOUT_USEC;
63 m->directory_mode = 0755;
64
65 exec_context_init(&m->exec_context);
66
67 /* We need to make sure that /bin/mount is always called in
68 * the same process group as us, so that the autofs kernel
69 * side doesn't send us another mount request while we are
70 * already trying to comply its last one. */
71 m->exec_context.same_pgrp = true;
72
73 m->timer_watch.type = WATCH_INVALID;
74
75 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
76 }
77
78 static void mount_unwatch_control_pid(Mount *m) {
79 assert(m);
80
81 if (m->control_pid <= 0)
82 return;
83
84 unit_unwatch_pid(UNIT(m), m->control_pid);
85 m->control_pid = 0;
86 }
87
88 static void mount_parameters_done(MountParameters *p) {
89 assert(p);
90
91 free(p->what);
92 free(p->options);
93 free(p->fstype);
94
95 p->what = p->options = p->fstype = NULL;
96 }
97
98 static void mount_done(Unit *u) {
99 Mount *m = MOUNT(u);
100
101 assert(m);
102
103 free(m->where);
104 m->where = NULL;
105
106 mount_parameters_done(&m->parameters_etc_fstab);
107 mount_parameters_done(&m->parameters_proc_self_mountinfo);
108 mount_parameters_done(&m->parameters_fragment);
109
110 exec_context_done(&m->exec_context);
111 exec_command_done_array(m->exec_command, _MOUNT_EXEC_COMMAND_MAX);
112 m->control_command = NULL;
113
114 mount_unwatch_control_pid(m);
115
116 unit_unwatch_timer(u, &m->timer_watch);
117 }
118
119 static int mount_add_mount_links(Mount *m) {
120 Meta *other;
121 int r;
122
123 assert(m);
124
125 /* Adds in links to other mount points that might lie below or
126 * above us in the hierarchy */
127
128 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_MOUNT]) {
129 Mount *n = (Mount*) other;
130
131 if (n == m)
132 continue;
133
134 if (n->meta.load_state != UNIT_LOADED)
135 continue;
136
137 if (path_startswith(m->where, n->where)) {
138
139 if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(n), true)) < 0)
140 return r;
141
142 if (n->from_etc_fstab || n->from_fragment)
143 if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(n), true)) < 0)
144 return r;
145
146 } else if (path_startswith(n->where, m->where)) {
147
148 if ((r = unit_add_dependency(UNIT(m), UNIT_BEFORE, UNIT(n), true)) < 0)
149 return r;
150
151 if (m->from_etc_fstab || m->from_fragment)
152 if ((r = unit_add_dependency(UNIT(n), UNIT_REQUIRES, UNIT(m), true)) < 0)
153 return r;
154 }
155 }
156
157 return 0;
158 }
159
160 static int mount_add_swap_links(Mount *m) {
161 Meta *other;
162 int r;
163
164 assert(m);
165
166 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_SWAP])
167 if ((r = swap_add_one_mount_link((Swap*) other, m)) < 0)
168 return r;
169
170 return 0;
171 }
172
173 static int mount_add_path_links(Mount *m) {
174 Meta *other;
175 int r;
176
177 assert(m);
178
179 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_PATH])
180 if ((r = path_add_one_mount_link((Path*) other, m)) < 0)
181 return r;
182
183 return 0;
184 }
185
186 static int mount_add_automount_links(Mount *m) {
187 Meta *other;
188 int r;
189
190 assert(m);
191
192 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_AUTOMOUNT])
193 if ((r = automount_add_one_mount_link((Automount*) other, m)) < 0)
194 return r;
195
196 return 0;
197 }
198
199 static int mount_add_socket_links(Mount *m) {
200 Meta *other;
201 int r;
202
203 assert(m);
204
205 LIST_FOREACH(units_per_type, other, m->meta.manager->units_per_type[UNIT_SOCKET])
206 if ((r = socket_add_one_mount_link((Socket*) other, m)) < 0)
207 return r;
208
209 return 0;
210 }
211
212 static char* mount_test_option(const char *haystack, const char *needle) {
213 struct mntent me;
214
215 assert(needle);
216
217 /* Like glibc's hasmntopt(), but works on a string, not a
218 * struct mntent */
219
220 if (!haystack)
221 return false;
222
223 zero(me);
224 me.mnt_opts = (char*) haystack;
225
226 return hasmntopt(&me, needle);
227 }
228
229 static int mount_add_target_links(Mount *m) {
230 const char *target;
231 MountParameters *p;
232 Unit *tu;
233 int r;
234 bool noauto, handle, automount, user;
235
236 assert(m);
237
238 if (m->from_fragment)
239 p = &m->parameters_fragment;
240 else if (m->from_etc_fstab)
241 p = &m->parameters_etc_fstab;
242 else
243 return 0;
244
245 noauto = !!mount_test_option(p->options, MNTOPT_NOAUTO);
246 user = mount_test_option(p->options, "user") || mount_test_option(p->options, "users");
247 handle = !!mount_test_option(p->options, "comment=systemd.mount");
248 automount = !!mount_test_option(p->options, "comment=systemd.automount");
249
250 if (mount_test_option(p->options, "_netdev") ||
251 fstype_is_network(p->fstype))
252 target = SPECIAL_REMOTE_FS_TARGET;
253 else
254 target = SPECIAL_LOCAL_FS_TARGET;
255
256 if ((r = manager_load_unit(m->meta.manager, target, NULL, NULL, &tu)) < 0)
257 return r;
258
259 if (automount && m->meta.manager->running_as == MANAGER_SYSTEM) {
260 Unit *am;
261
262 if ((r = unit_load_related_unit(UNIT(m), ".automount", &am)) < 0)
263 return r;
264
265 return unit_add_two_dependencies(tu, UNIT_AFTER, UNIT_WANTS, UNIT(am), true);
266 } else {
267
268 if (!noauto && handle)
269 if (user || m->meta.manager->running_as == MANAGER_SYSTEM)
270 if ((r = unit_add_dependency(tu, UNIT_WANTS, UNIT(m), true)) < 0)
271 return r;
272
273 return unit_add_dependency(UNIT(m), UNIT_BEFORE, tu, true);
274 }
275 }
276
277 static int mount_add_default_dependencies(Mount *m) {
278 int r;
279
280 assert(m);
281
282 if (m->meta.manager->running_as == MANAGER_SYSTEM) {
283
284 if ((r = unit_add_dependency_by_name(UNIT(m), UNIT_AFTER, SPECIAL_SYSINIT_TARGET, NULL, true)) < 0)
285 return r;
286
287 if (!path_equal(m->where, "/"))
288 if ((r = unit_add_two_dependencies_by_name(UNIT(m), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_UMOUNT_TARGET, NULL, true)) < 0)
289 return r;
290 }
291
292 return 0;
293 }
294
295 static int mount_verify(Mount *m) {
296 bool b;
297 char *e;
298 assert(m);
299
300 if (m->meta.load_state != UNIT_LOADED)
301 return 0;
302
303 if (!m->from_etc_fstab && !m->from_fragment && !m->from_proc_self_mountinfo)
304 return -ENOENT;
305
306 if (!(e = unit_name_from_path(m->where, ".mount")))
307 return -ENOMEM;
308
309 b = unit_has_name(UNIT(m), e);
310 free(e);
311
312 if (!b) {
313 log_error("%s's Where setting doesn't match unit name. Refusing.", m->meta.id);
314 return -EINVAL;
315 }
316
317 if (m->meta.fragment_path && !m->parameters_fragment.what) {
318 log_error("%s's What setting is missing. Refusing.", m->meta.id);
319 return -EBADMSG;
320 }
321
322 if (m->exec_context.pam_name && m->exec_context.kill_mode != KILL_CONTROL_GROUP) {
323 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", m->meta.id);
324 return -EINVAL;
325 }
326
327 return 0;
328 }
329
330 static int mount_load(Unit *u) {
331 Mount *m = MOUNT(u);
332 int r;
333
334 assert(u);
335 assert(u->meta.load_state == UNIT_STUB);
336
337 if ((r = unit_load_fragment_and_dropin_optional(u)) < 0)
338 return r;
339
340 /* This is a new unit? Then let's add in some extras */
341 if (u->meta.load_state == UNIT_LOADED) {
342 const char *what = NULL;
343
344 if (m->meta.fragment_path)
345 m->from_fragment = true;
346
347 if (!m->where)
348 if (!(m->where = unit_name_to_path(u->meta.id)))
349 return -ENOMEM;
350
351 path_kill_slashes(m->where);
352
353 if (!m->meta.description)
354 if ((r = unit_set_description(u, m->where)) < 0)
355 return r;
356
357 if (m->from_fragment && m->parameters_fragment.what)
358 what = m->parameters_fragment.what;
359 else if (m->from_etc_fstab && m->parameters_etc_fstab.what)
360 what = m->parameters_etc_fstab.what;
361 else if (m->from_proc_self_mountinfo && m->parameters_proc_self_mountinfo.what)
362 what = m->parameters_proc_self_mountinfo.what;
363
364 if (what)
365 if ((r = unit_add_node_link(u, what, u->meta.manager->running_as == MANAGER_SYSTEM)) < 0)
366 return r;
367
368 if ((r = mount_add_mount_links(m)) < 0)
369 return r;
370
371 if ((r = mount_add_socket_links(m)) < 0)
372 return r;
373
374 if ((r = mount_add_swap_links(m)) < 0)
375 return r;
376
377 if ((r = mount_add_path_links(m)) < 0)
378 return r;
379
380 if ((r = mount_add_automount_links(m)) < 0)
381 return r;
382
383 if ((r = mount_add_target_links(m)) < 0)
384 return r;
385
386 if ((r = unit_add_default_cgroup(u)) < 0)
387 return r;
388
389 if (m->meta.default_dependencies)
390 if ((r = mount_add_default_dependencies(m)) < 0)
391 return r;
392 }
393
394 return mount_verify(m);
395 }
396
397 static int mount_notify_automount(Mount *m, int status) {
398 Unit *p;
399 int r;
400
401 assert(m);
402
403 if ((r = unit_get_related_unit(UNIT(m), ".automount", &p)) < 0)
404 return r == -ENOENT ? 0 : r;
405
406 return automount_send_ready(AUTOMOUNT(p), status);
407 }
408
409 static void mount_set_state(Mount *m, MountState state) {
410 MountState old_state;
411 assert(m);
412
413 old_state = m->state;
414 m->state = state;
415
416 if (state != MOUNT_MOUNTING &&
417 state != MOUNT_MOUNTING_DONE &&
418 state != MOUNT_REMOUNTING &&
419 state != MOUNT_UNMOUNTING &&
420 state != MOUNT_MOUNTING_SIGTERM &&
421 state != MOUNT_MOUNTING_SIGKILL &&
422 state != MOUNT_UNMOUNTING_SIGTERM &&
423 state != MOUNT_UNMOUNTING_SIGKILL &&
424 state != MOUNT_REMOUNTING_SIGTERM &&
425 state != MOUNT_REMOUNTING_SIGKILL) {
426 unit_unwatch_timer(UNIT(m), &m->timer_watch);
427 mount_unwatch_control_pid(m);
428 m->control_command = NULL;
429 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
430 }
431
432 if (state == MOUNT_MOUNTED ||
433 state == MOUNT_REMOUNTING)
434 mount_notify_automount(m, 0);
435 else if (state == MOUNT_DEAD ||
436 state == MOUNT_UNMOUNTING ||
437 state == MOUNT_MOUNTING_SIGTERM ||
438 state == MOUNT_MOUNTING_SIGKILL ||
439 state == MOUNT_REMOUNTING_SIGTERM ||
440 state == MOUNT_REMOUNTING_SIGKILL ||
441 state == MOUNT_UNMOUNTING_SIGTERM ||
442 state == MOUNT_UNMOUNTING_SIGKILL ||
443 state == MOUNT_MAINTENANCE)
444 mount_notify_automount(m, -ENODEV);
445
446 if (state != old_state)
447 log_debug("%s changed %s -> %s",
448 m->meta.id,
449 mount_state_to_string(old_state),
450 mount_state_to_string(state));
451
452 unit_notify(UNIT(m), state_translation_table[old_state], state_translation_table[state]);
453 }
454
455 static int mount_coldplug(Unit *u) {
456 Mount *m = MOUNT(u);
457 MountState new_state = MOUNT_DEAD;
458 int r;
459
460 assert(m);
461 assert(m->state == MOUNT_DEAD);
462
463 if (m->deserialized_state != m->state)
464 new_state = m->deserialized_state;
465 else if (m->from_proc_self_mountinfo)
466 new_state = MOUNT_MOUNTED;
467
468 if (new_state != m->state) {
469
470 if (new_state == MOUNT_MOUNTING ||
471 new_state == MOUNT_MOUNTING_DONE ||
472 new_state == MOUNT_REMOUNTING ||
473 new_state == MOUNT_UNMOUNTING ||
474 new_state == MOUNT_MOUNTING_SIGTERM ||
475 new_state == MOUNT_MOUNTING_SIGKILL ||
476 new_state == MOUNT_UNMOUNTING_SIGTERM ||
477 new_state == MOUNT_UNMOUNTING_SIGKILL ||
478 new_state == MOUNT_REMOUNTING_SIGTERM ||
479 new_state == MOUNT_REMOUNTING_SIGKILL) {
480
481 if (m->control_pid <= 0)
482 return -EBADMSG;
483
484 if ((r = unit_watch_pid(UNIT(m), m->control_pid)) < 0)
485 return r;
486
487 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
488 return r;
489 }
490
491 mount_set_state(m, new_state);
492 }
493
494 return 0;
495 }
496
497 static void mount_dump(Unit *u, FILE *f, const char *prefix) {
498 Mount *m = MOUNT(u);
499 MountParameters *p;
500
501 assert(m);
502 assert(f);
503
504 if (m->from_proc_self_mountinfo)
505 p = &m->parameters_proc_self_mountinfo;
506 else if (m->from_fragment)
507 p = &m->parameters_fragment;
508 else
509 p = &m->parameters_etc_fstab;
510
511 fprintf(f,
512 "%sMount State: %s\n"
513 "%sWhere: %s\n"
514 "%sWhat: %s\n"
515 "%sFile System Type: %s\n"
516 "%sOptions: %s\n"
517 "%sFrom /etc/fstab: %s\n"
518 "%sFrom /proc/self/mountinfo: %s\n"
519 "%sFrom fragment: %s\n"
520 "%sDirectoryMode: %04o\n",
521 prefix, mount_state_to_string(m->state),
522 prefix, m->where,
523 prefix, strna(p->what),
524 prefix, strna(p->fstype),
525 prefix, strna(p->options),
526 prefix, yes_no(m->from_etc_fstab),
527 prefix, yes_no(m->from_proc_self_mountinfo),
528 prefix, yes_no(m->from_fragment),
529 prefix, m->directory_mode);
530
531 if (m->control_pid > 0)
532 fprintf(f,
533 "%sControl PID: %lu\n",
534 prefix, (unsigned long) m->control_pid);
535
536 exec_context_dump(&m->exec_context, f, prefix);
537 }
538
539 static int mount_spawn(Mount *m, ExecCommand *c, pid_t *_pid) {
540 pid_t pid;
541 int r;
542
543 assert(m);
544 assert(c);
545 assert(_pid);
546
547 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
548 goto fail;
549
550 if ((r = exec_spawn(c,
551 NULL,
552 &m->exec_context,
553 NULL, 0,
554 m->meta.manager->environment,
555 true,
556 true,
557 true,
558 m->meta.manager->confirm_spawn,
559 m->meta.cgroup_bondings,
560 &pid)) < 0)
561 goto fail;
562
563 if ((r = unit_watch_pid(UNIT(m), pid)) < 0)
564 /* FIXME: we need to do something here */
565 goto fail;
566
567 *_pid = pid;
568
569 return 0;
570
571 fail:
572 unit_unwatch_timer(UNIT(m), &m->timer_watch);
573
574 return r;
575 }
576
577 static void mount_enter_dead(Mount *m, bool success) {
578 assert(m);
579
580 if (!success)
581 m->failure = true;
582
583 mount_set_state(m, m->failure ? MOUNT_MAINTENANCE : MOUNT_DEAD);
584 }
585
586 static void mount_enter_mounted(Mount *m, bool success) {
587 assert(m);
588
589 if (!success)
590 m->failure = true;
591
592 mount_set_state(m, MOUNT_MOUNTED);
593 }
594
595 static void mount_enter_signal(Mount *m, MountState state, bool success) {
596 int r;
597 bool sent = false;
598
599 assert(m);
600
601 if (!success)
602 m->failure = true;
603
604 if (m->exec_context.kill_mode != KILL_NONE) {
605 int sig = (state == MOUNT_MOUNTING_SIGTERM ||
606 state == MOUNT_UNMOUNTING_SIGTERM ||
607 state == MOUNT_REMOUNTING_SIGTERM) ? m->exec_context.kill_signal : SIGKILL;
608
609 if (m->exec_context.kill_mode == KILL_CONTROL_GROUP) {
610
611 if ((r = cgroup_bonding_kill_list(m->meta.cgroup_bondings, sig)) < 0) {
612 if (r != -EAGAIN && r != -ESRCH)
613 goto fail;
614 } else
615 sent = true;
616 }
617
618 if (!sent && m->control_pid > 0)
619 if (kill(m->exec_context.kill_mode == KILL_PROCESS ?
620 m->control_pid :
621 -m->control_pid, sig) < 0 && errno != ESRCH) {
622
623 r = -errno;
624 goto fail;
625 }
626 }
627
628 if (sent) {
629 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
630 goto fail;
631
632 mount_set_state(m, state);
633 } else if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
634 mount_enter_mounted(m, true);
635 else
636 mount_enter_dead(m, true);
637
638 return;
639
640 fail:
641 log_warning("%s failed to kill processes: %s", m->meta.id, strerror(-r));
642
643 if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
644 mount_enter_mounted(m, false);
645 else
646 mount_enter_dead(m, false);
647 }
648
649 static void mount_enter_unmounting(Mount *m, bool success) {
650 int r;
651
652 assert(m);
653
654 if (!success)
655 m->failure = true;
656
657 m->control_command_id = MOUNT_EXEC_UNMOUNT;
658 m->control_command = m->exec_command + MOUNT_EXEC_UNMOUNT;
659
660 if ((r = exec_command_set(
661 m->control_command,
662 "/bin/umount",
663 m->where,
664 NULL)) < 0)
665 goto fail;
666
667 mount_unwatch_control_pid(m);
668
669 if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
670 goto fail;
671
672 mount_set_state(m, MOUNT_UNMOUNTING);
673
674 return;
675
676 fail:
677 log_warning("%s failed to run 'umount' task: %s", m->meta.id, strerror(-r));
678 mount_enter_mounted(m, false);
679 }
680
681 static void mount_enter_mounting(Mount *m) {
682 int r;
683
684 assert(m);
685
686 m->control_command_id = MOUNT_EXEC_MOUNT;
687 m->control_command = m->exec_command + MOUNT_EXEC_MOUNT;
688
689 mkdir_p(m->where, m->directory_mode);
690
691 if (m->from_fragment)
692 r = exec_command_set(
693 m->control_command,
694 "/bin/mount",
695 m->parameters_fragment.what,
696 m->where,
697 "-t", m->parameters_fragment.fstype,
698 m->parameters_fragment.options ? "-o" : NULL, m->parameters_fragment.options,
699 NULL);
700 else if (m->from_etc_fstab)
701 r = exec_command_set(
702 m->control_command,
703 "/bin/mount",
704 m->where,
705 NULL);
706 else
707 r = -ENOENT;
708
709 if (r < 0)
710 goto fail;
711
712 mount_unwatch_control_pid(m);
713
714 if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
715 goto fail;
716
717 mount_set_state(m, MOUNT_MOUNTING);
718
719 return;
720
721 fail:
722 log_warning("%s failed to run 'mount' task: %s", m->meta.id, strerror(-r));
723 mount_enter_dead(m, false);
724 }
725
726 static void mount_enter_mounting_done(Mount *m) {
727 assert(m);
728
729 mount_set_state(m, MOUNT_MOUNTING_DONE);
730 }
731
732 static void mount_enter_remounting(Mount *m, bool success) {
733 int r;
734
735 assert(m);
736
737 if (!success)
738 m->failure = true;
739
740 m->control_command_id = MOUNT_EXEC_REMOUNT;
741 m->control_command = m->exec_command + MOUNT_EXEC_REMOUNT;
742
743 if (m->from_fragment) {
744 char *buf = NULL;
745 const char *o;
746
747 if (m->parameters_fragment.options) {
748 if (!(buf = strappend("remount,", m->parameters_fragment.options))) {
749 r = -ENOMEM;
750 goto fail;
751 }
752
753 o = buf;
754 } else
755 o = "remount";
756
757 r = exec_command_set(
758 m->control_command,
759 "/bin/mount",
760 m->parameters_fragment.what,
761 m->where,
762 "-t", m->parameters_fragment.fstype,
763 "-o", o,
764 NULL);
765
766 free(buf);
767 } else if (m->from_etc_fstab)
768 r = exec_command_set(
769 m->control_command,
770 "/bin/mount",
771 m->where,
772 "-o", "remount",
773 NULL);
774 else
775 r = -ENOENT;
776
777 if (r < 0) {
778 r = -ENOMEM;
779 goto fail;
780 }
781
782 mount_unwatch_control_pid(m);
783
784 if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
785 goto fail;
786
787 mount_set_state(m, MOUNT_REMOUNTING);
788
789 return;
790
791 fail:
792 mount_enter_mounted(m, false);
793 }
794
795 static int mount_start(Unit *u) {
796 Mount *m = MOUNT(u);
797
798 assert(m);
799
800 /* We cannot fulfill this request right now, try again later
801 * please! */
802 if (m->state == MOUNT_UNMOUNTING ||
803 m->state == MOUNT_UNMOUNTING_SIGTERM ||
804 m->state == MOUNT_UNMOUNTING_SIGKILL)
805 return -EAGAIN;
806
807 /* Already on it! */
808 if (m->state == MOUNT_MOUNTING ||
809 m->state == MOUNT_MOUNTING_SIGTERM ||
810 m->state == MOUNT_MOUNTING_SIGKILL)
811 return 0;
812
813 assert(m->state == MOUNT_DEAD || m->state == MOUNT_MAINTENANCE);
814
815 m->failure = false;
816 mount_enter_mounting(m);
817 return 0;
818 }
819
820 static int mount_stop(Unit *u) {
821 Mount *m = MOUNT(u);
822
823 assert(m);
824
825 /* Already on it */
826 if (m->state == MOUNT_UNMOUNTING ||
827 m->state == MOUNT_UNMOUNTING_SIGKILL ||
828 m->state == MOUNT_UNMOUNTING_SIGTERM)
829 return 0;
830
831 assert(m->state == MOUNT_MOUNTING ||
832 m->state == MOUNT_MOUNTING_DONE ||
833 m->state == MOUNT_MOUNTED ||
834 m->state == MOUNT_MOUNTING_SIGTERM ||
835 m->state == MOUNT_MOUNTING_SIGKILL ||
836 m->state == MOUNT_REMOUNTING ||
837 m->state == MOUNT_REMOUNTING_SIGTERM ||
838 m->state == MOUNT_REMOUNTING_SIGKILL);
839
840 mount_enter_unmounting(m, true);
841 return 0;
842 }
843
844 static int mount_reload(Unit *u) {
845 Mount *m = MOUNT(u);
846
847 assert(m);
848
849 if (m->state == MOUNT_MOUNTING_DONE)
850 return -EAGAIN;
851
852 assert(m->state == MOUNT_MOUNTED);
853
854 mount_enter_remounting(m, true);
855 return 0;
856 }
857
858 static int mount_serialize(Unit *u, FILE *f, FDSet *fds) {
859 Mount *m = MOUNT(u);
860
861 assert(m);
862 assert(f);
863 assert(fds);
864
865 unit_serialize_item(u, f, "state", mount_state_to_string(m->state));
866 unit_serialize_item(u, f, "failure", yes_no(m->failure));
867
868 if (m->control_pid > 0)
869 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) m->control_pid);
870
871 if (m->control_command_id >= 0)
872 unit_serialize_item(u, f, "control-command", mount_exec_command_to_string(m->control_command_id));
873
874 return 0;
875 }
876
877 static int mount_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
878 Mount *m = MOUNT(u);
879 int r;
880
881 assert(u);
882 assert(key);
883 assert(value);
884 assert(fds);
885
886 if (streq(key, "state")) {
887 MountState state;
888
889 if ((state = mount_state_from_string(value)) < 0)
890 log_debug("Failed to parse state value %s", value);
891 else
892 m->deserialized_state = state;
893 } else if (streq(key, "failure")) {
894 int b;
895
896 if ((b = parse_boolean(value)) < 0)
897 log_debug("Failed to parse failure value %s", value);
898 else
899 m->failure = b || m->failure;
900
901 } else if (streq(key, "control-pid")) {
902 pid_t pid;
903
904 if ((r = parse_pid(value, &pid)) < 0)
905 log_debug("Failed to parse control-pid value %s", value);
906 else
907 m->control_pid = pid;
908 } else if (streq(key, "control-command")) {
909 MountExecCommand id;
910
911 if ((id = mount_exec_command_from_string(value)) < 0)
912 log_debug("Failed to parse exec-command value %s", value);
913 else {
914 m->control_command_id = id;
915 m->control_command = m->exec_command + id;
916 }
917
918 } else
919 log_debug("Unknown serialization key '%s'", key);
920
921 return 0;
922 }
923
924 static UnitActiveState mount_active_state(Unit *u) {
925 assert(u);
926
927 return state_translation_table[MOUNT(u)->state];
928 }
929
930 static const char *mount_sub_state_to_string(Unit *u) {
931 assert(u);
932
933 return mount_state_to_string(MOUNT(u)->state);
934 }
935
936 static bool mount_check_gc(Unit *u) {
937 Mount *m = MOUNT(u);
938
939 assert(m);
940
941 return m->from_etc_fstab || m->from_proc_self_mountinfo;
942 }
943
944 static void mount_sigchld_event(Unit *u, pid_t pid, int code, int status) {
945 Mount *m = MOUNT(u);
946 bool success;
947
948 assert(m);
949 assert(pid >= 0);
950
951 if (pid != m->control_pid)
952 return;
953
954 m->control_pid = 0;
955
956 success = is_clean_exit(code, status);
957 m->failure = m->failure || !success;
958
959 if (m->control_command) {
960 exec_status_exit(&m->control_command->exec_status, pid, code, status);
961 m->control_command = NULL;
962 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
963 }
964
965 log_debug("%s control process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
966
967 /* Note that mount(8) returning and the kernel sending us a
968 * mount table change event might happen out-of-order. If an
969 * operation succeed we assume the kernel will follow soon too
970 * and already change into the resulting state. If it fails
971 * we check if the kernel still knows about the mount. and
972 * change state accordingly. */
973
974 switch (m->state) {
975
976 case MOUNT_MOUNTING:
977 case MOUNT_MOUNTING_DONE:
978 case MOUNT_MOUNTING_SIGKILL:
979 case MOUNT_MOUNTING_SIGTERM:
980 case MOUNT_REMOUNTING:
981 case MOUNT_REMOUNTING_SIGKILL:
982 case MOUNT_REMOUNTING_SIGTERM:
983
984 if (success)
985 mount_enter_mounted(m, true);
986 else if (m->from_proc_self_mountinfo)
987 mount_enter_mounted(m, false);
988 else
989 mount_enter_dead(m, false);
990 break;
991
992 case MOUNT_UNMOUNTING:
993 case MOUNT_UNMOUNTING_SIGKILL:
994 case MOUNT_UNMOUNTING_SIGTERM:
995
996 if (success)
997 mount_enter_dead(m, true);
998 else if (m->from_proc_self_mountinfo)
999 mount_enter_mounted(m, false);
1000 else
1001 mount_enter_dead(m, false);
1002 break;
1003
1004 default:
1005 assert_not_reached("Uh, control process died at wrong time.");
1006 }
1007 }
1008
1009 static void mount_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
1010 Mount *m = MOUNT(u);
1011
1012 assert(m);
1013 assert(elapsed == 1);
1014 assert(w == &m->timer_watch);
1015
1016 switch (m->state) {
1017
1018 case MOUNT_MOUNTING:
1019 case MOUNT_MOUNTING_DONE:
1020 log_warning("%s mounting timed out. Stopping.", u->meta.id);
1021 mount_enter_signal(m, MOUNT_MOUNTING_SIGTERM, false);
1022 break;
1023
1024 case MOUNT_REMOUNTING:
1025 log_warning("%s remounting timed out. Stopping.", u->meta.id);
1026 mount_enter_signal(m, MOUNT_REMOUNTING_SIGTERM, false);
1027 break;
1028
1029 case MOUNT_UNMOUNTING:
1030 log_warning("%s unmounting timed out. Stopping.", u->meta.id);
1031 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGTERM, false);
1032 break;
1033
1034 case MOUNT_MOUNTING_SIGTERM:
1035 log_warning("%s mounting timed out. Killing.", u->meta.id);
1036 mount_enter_signal(m, MOUNT_MOUNTING_SIGKILL, false);
1037 break;
1038
1039 case MOUNT_REMOUNTING_SIGTERM:
1040 log_warning("%s remounting timed out. Killing.", u->meta.id);
1041 mount_enter_signal(m, MOUNT_REMOUNTING_SIGKILL, false);
1042 break;
1043
1044 case MOUNT_UNMOUNTING_SIGTERM:
1045 log_warning("%s unmounting timed out. Killing.", u->meta.id);
1046 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGKILL, false);
1047 break;
1048
1049 case MOUNT_MOUNTING_SIGKILL:
1050 case MOUNT_REMOUNTING_SIGKILL:
1051 case MOUNT_UNMOUNTING_SIGKILL:
1052 log_warning("%s mount process still around after SIGKILL. Ignoring.", u->meta.id);
1053
1054 if (m->from_proc_self_mountinfo)
1055 mount_enter_mounted(m, false);
1056 else
1057 mount_enter_dead(m, false);
1058 break;
1059
1060 default:
1061 assert_not_reached("Timeout at wrong time.");
1062 }
1063 }
1064
1065 static int mount_add_one(
1066 Manager *m,
1067 const char *what,
1068 const char *where,
1069 const char *options,
1070 const char *fstype,
1071 bool from_proc_self_mountinfo,
1072 bool set_flags) {
1073 int r;
1074 Unit *u;
1075 bool delete;
1076 char *e, *w = NULL, *o = NULL, *f = NULL;
1077 MountParameters *p;
1078
1079 assert(m);
1080 assert(what);
1081 assert(where);
1082 assert(options);
1083 assert(fstype);
1084
1085 assert(!set_flags || from_proc_self_mountinfo);
1086
1087 /* Ignore API mount points. They should never be referenced in
1088 * dependencies ever. */
1089 if (mount_point_is_api(where))
1090 return 0;
1091
1092 if (streq(fstype, "autofs"))
1093 return 0;
1094
1095 /* probably some kind of swap, ignore */
1096 if (!is_path(where))
1097 return 0;
1098
1099 if (!(e = unit_name_from_path(where, ".mount")))
1100 return -ENOMEM;
1101
1102 if (!(u = manager_get_unit(m, e))) {
1103 delete = true;
1104
1105 if (!(u = unit_new(m))) {
1106 free(e);
1107 return -ENOMEM;
1108 }
1109
1110 r = unit_add_name(u, e);
1111 free(e);
1112
1113 if (r < 0)
1114 goto fail;
1115
1116 if (!(MOUNT(u)->where = strdup(where))) {
1117 r = -ENOMEM;
1118 goto fail;
1119 }
1120
1121 unit_add_to_load_queue(u);
1122 } else {
1123 delete = false;
1124 free(e);
1125 }
1126
1127 if (!(w = strdup(what)) ||
1128 !(o = strdup(options)) ||
1129 !(f = strdup(fstype))) {
1130 r = -ENOMEM;
1131 goto fail;
1132 }
1133
1134 if (from_proc_self_mountinfo) {
1135 p = &MOUNT(u)->parameters_proc_self_mountinfo;
1136
1137 if (set_flags) {
1138 MOUNT(u)->is_mounted = true;
1139 MOUNT(u)->just_mounted = !MOUNT(u)->from_proc_self_mountinfo;
1140 MOUNT(u)->just_changed = !streq_ptr(p->options, o);
1141 }
1142
1143 MOUNT(u)->from_proc_self_mountinfo = true;
1144 } else {
1145 p = &MOUNT(u)->parameters_etc_fstab;
1146 MOUNT(u)->from_etc_fstab = true;
1147 }
1148
1149 free(p->what);
1150 p->what = w;
1151
1152 free(p->options);
1153 p->options = o;
1154
1155 free(p->fstype);
1156 p->fstype = f;
1157
1158 unit_add_to_dbus_queue(u);
1159
1160 return 0;
1161
1162 fail:
1163 free(w);
1164 free(o);
1165 free(f);
1166
1167 if (delete && u)
1168 unit_free(u);
1169
1170 return r;
1171 }
1172
1173 static char *fstab_node_to_udev_node(char *p) {
1174 char *dn, *t;
1175 int r;
1176
1177 /* FIXME: to follow udev's logic 100% we need to leave valid
1178 * UTF8 chars unescaped */
1179
1180 if (startswith(p, "LABEL=")) {
1181
1182 if (!(t = xescape(p+6, "/ ")))
1183 return NULL;
1184
1185 r = asprintf(&dn, "/dev/disk/by-label/%s", t);
1186 free(t);
1187
1188 if (r < 0)
1189 return NULL;
1190
1191 return dn;
1192 }
1193
1194 if (startswith(p, "UUID=")) {
1195
1196 if (!(t = xescape(p+5, "/ ")))
1197 return NULL;
1198
1199 r = asprintf(&dn, "/dev/disk/by-uuid/%s", ascii_strlower(t));
1200 free(t);
1201
1202 if (r < 0)
1203 return NULL;
1204
1205 return dn;
1206 }
1207
1208 return strdup(p);
1209 }
1210
1211 static int mount_find_pri(char *options) {
1212 char *end, *pri;
1213 unsigned long r;
1214
1215 if (!(pri = mount_test_option(options, "pri=")))
1216 return 0;
1217
1218 pri += 4;
1219
1220 errno = 0;
1221 r = strtoul(pri, &end, 10);
1222
1223 if (errno != 0)
1224 return -errno;
1225
1226 if (end == pri || (*end != ',' && *end != 0))
1227 return -EINVAL;
1228
1229 return (int) r;
1230 }
1231
1232 static int mount_load_etc_fstab(Manager *m) {
1233 FILE *f;
1234 int r;
1235 struct mntent* me;
1236
1237 assert(m);
1238
1239 errno = 0;
1240 if (!(f = setmntent("/etc/fstab", "r")))
1241 return -errno;
1242
1243 while ((me = getmntent(f))) {
1244 char *where, *what;
1245
1246 if (!(what = fstab_node_to_udev_node(me->mnt_fsname))) {
1247 r = -ENOMEM;
1248 goto finish;
1249 }
1250
1251 if (!(where = strdup(me->mnt_dir))) {
1252 free(what);
1253 r = -ENOMEM;
1254 goto finish;
1255 }
1256
1257 if (what[0] == '/')
1258 path_kill_slashes(what);
1259
1260 if (where[0] == '/')
1261 path_kill_slashes(where);
1262
1263 if (streq(me->mnt_type, "swap")) {
1264 int pri;
1265
1266 if ((pri = mount_find_pri(me->mnt_opts)) < 0)
1267 r = pri;
1268 else
1269 r = swap_add_one(m,
1270 what,
1271 pri,
1272 !!mount_test_option(me->mnt_opts, MNTOPT_NOAUTO),
1273 !!mount_test_option(me->mnt_opts, "comment=systemd.swapon"),
1274 false);
1275 } else
1276 r = mount_add_one(m, what, where, me->mnt_opts, me->mnt_type, false, false);
1277
1278 free(what);
1279 free(where);
1280
1281 if (r < 0)
1282 goto finish;
1283 }
1284
1285 r = 0;
1286 finish:
1287
1288 endmntent(f);
1289 return r;
1290 }
1291
1292 static int mount_load_proc_self_mountinfo(Manager *m, bool set_flags) {
1293 int r;
1294 char *device, *path, *options, *options2, *fstype, *d, *p, *o;
1295
1296 assert(m);
1297
1298 rewind(m->proc_self_mountinfo);
1299
1300 for (;;) {
1301 int k;
1302
1303 device = path = options = options2 = fstype = d = p = o = NULL;
1304
1305 if ((k = fscanf(m->proc_self_mountinfo,
1306 "%*s " /* (1) mount id */
1307 "%*s " /* (2) parent id */
1308 "%*s " /* (3) major:minor */
1309 "%*s " /* (4) root */
1310 "%ms " /* (5) mount point */
1311 "%ms" /* (6) mount options */
1312 "%*[^-]" /* (7) optional fields */
1313 "- " /* (8) seperator */
1314 "%ms " /* (9) file system type */
1315 "%ms" /* (10) mount source */
1316 "%ms" /* (11) mount options 2 */
1317 "%*[^\n]", /* some rubbish at the end */
1318 &path,
1319 &options,
1320 &fstype,
1321 &device,
1322 &options2)) != 5) {
1323
1324 if (k == EOF)
1325 break;
1326
1327 r = -EBADMSG;
1328 goto finish;
1329 }
1330
1331 if (asprintf(&o, "%s,%s", options, options2) < 0) {
1332 r = -ENOMEM;
1333 goto finish;
1334 }
1335
1336 if (!(d = cunescape(device)) ||
1337 !(p = cunescape(path))) {
1338 r = -ENOMEM;
1339 goto finish;
1340 }
1341
1342 if ((r = mount_add_one(m, d, p, o, fstype, true, set_flags)) < 0)
1343 goto finish;
1344
1345 free(device);
1346 free(path);
1347 free(options);
1348 free(options2);
1349 free(fstype);
1350 free(d);
1351 free(p);
1352 free(o);
1353 }
1354
1355 r = 0;
1356
1357 finish:
1358 free(device);
1359 free(path);
1360 free(options);
1361 free(options2);
1362 free(fstype);
1363 free(d);
1364 free(p);
1365 free(o);
1366
1367 return r;
1368 }
1369
1370 static void mount_shutdown(Manager *m) {
1371 assert(m);
1372
1373 if (m->proc_self_mountinfo) {
1374 fclose(m->proc_self_mountinfo);
1375 m->proc_self_mountinfo = NULL;
1376 }
1377 }
1378
1379 static int mount_enumerate(Manager *m) {
1380 int r;
1381 struct epoll_event ev;
1382 assert(m);
1383
1384 if (!m->proc_self_mountinfo) {
1385 if (!(m->proc_self_mountinfo = fopen("/proc/self/mountinfo", "re")))
1386 return -errno;
1387
1388 m->mount_watch.type = WATCH_MOUNT;
1389 m->mount_watch.fd = fileno(m->proc_self_mountinfo);
1390
1391 zero(ev);
1392 ev.events = EPOLLERR;
1393 ev.data.ptr = &m->mount_watch;
1394
1395 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->mount_watch.fd, &ev) < 0)
1396 return -errno;
1397 }
1398
1399 if ((r = mount_load_etc_fstab(m)) < 0)
1400 goto fail;
1401
1402 if ((r = mount_load_proc_self_mountinfo(m, false)) < 0)
1403 goto fail;
1404
1405 return 0;
1406
1407 fail:
1408 mount_shutdown(m);
1409 return r;
1410 }
1411
1412 void mount_fd_event(Manager *m, int events) {
1413 Meta *meta;
1414 int r;
1415
1416 assert(m);
1417 assert(events == EPOLLERR);
1418
1419 /* The manager calls this for every fd event happening on the
1420 * /proc/self/mountinfo file, which informs us about mounting
1421 * table changes */
1422
1423 if ((r = mount_load_proc_self_mountinfo(m, true)) < 0) {
1424 log_error("Failed to reread /proc/self/mountinfo: %s", strerror(errno));
1425
1426 /* Reset flags, just in case, for later calls */
1427 LIST_FOREACH(units_per_type, meta, m->units_per_type[UNIT_MOUNT]) {
1428 Mount *mount = (Mount*) meta;
1429
1430 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1431 }
1432
1433 return;
1434 }
1435
1436 manager_dispatch_load_queue(m);
1437
1438 LIST_FOREACH(units_per_type, meta, m->units_per_type[UNIT_MOUNT]) {
1439 Mount *mount = (Mount*) meta;
1440
1441 if (!mount->is_mounted) {
1442 /* This has just been unmounted. */
1443
1444 mount->from_proc_self_mountinfo = false;
1445
1446 switch (mount->state) {
1447
1448 case MOUNT_MOUNTED:
1449 mount_enter_dead(mount, true);
1450 break;
1451
1452 default:
1453 mount_set_state(mount, mount->state);
1454 break;
1455
1456 }
1457
1458 } else if (mount->just_mounted || mount->just_changed) {
1459
1460 /* New or changed entrymount */
1461
1462 switch (mount->state) {
1463
1464 case MOUNT_DEAD:
1465 case MOUNT_MAINTENANCE:
1466 mount_enter_mounted(mount, true);
1467 break;
1468
1469 case MOUNT_MOUNTING:
1470 mount_enter_mounting_done(mount);
1471 break;
1472
1473 default:
1474 /* Nothing really changed, but let's
1475 * issue an notification call
1476 * nonetheless, in case somebody is
1477 * waiting for this. (e.g. file system
1478 * ro/rw remounts.) */
1479 mount_set_state(mount, mount->state);
1480 break;
1481 }
1482 }
1483
1484 /* Reset the flags for later calls */
1485 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1486 }
1487 }
1488
1489 int mount_path_is_mounted(Manager *m, const char* path) {
1490 char *t;
1491 int r;
1492
1493 assert(m);
1494 assert(path);
1495
1496 if (path[0] != '/')
1497 return 1;
1498
1499 if (!(t = strdup(path)))
1500 return -ENOMEM;
1501
1502 path_kill_slashes(t);
1503
1504 for (;;) {
1505 char *e, *slash;
1506 Unit *u;
1507
1508 if (!(e = unit_name_from_path(t, ".mount"))) {
1509 r = -ENOMEM;
1510 goto finish;
1511 }
1512
1513 u = manager_get_unit(m, e);
1514 free(e);
1515
1516 if (u &&
1517 (MOUNT(u)->from_etc_fstab || MOUNT(u)->from_fragment) &&
1518 MOUNT(u)->state != MOUNT_MOUNTED) {
1519 r = 0;
1520 goto finish;
1521 }
1522
1523 assert_se(slash = strrchr(t, '/'));
1524
1525 if (slash == t) {
1526 r = 1;
1527 goto finish;
1528 }
1529
1530 *slash = 0;
1531 }
1532
1533 r = 1;
1534
1535 finish:
1536 free(t);
1537 return r;
1538 }
1539
1540 static const char* const mount_state_table[_MOUNT_STATE_MAX] = {
1541 [MOUNT_DEAD] = "dead",
1542 [MOUNT_MOUNTING] = "mounting",
1543 [MOUNT_MOUNTING_DONE] = "mounting-done",
1544 [MOUNT_MOUNTED] = "mounted",
1545 [MOUNT_REMOUNTING] = "remounting",
1546 [MOUNT_UNMOUNTING] = "unmounting",
1547 [MOUNT_MOUNTING_SIGTERM] = "mounting-sigterm",
1548 [MOUNT_MOUNTING_SIGKILL] = "mounting-sigkill",
1549 [MOUNT_REMOUNTING_SIGTERM] = "remounting-sigterm",
1550 [MOUNT_REMOUNTING_SIGKILL] = "remounting-sigkill",
1551 [MOUNT_UNMOUNTING_SIGTERM] = "unmounting-sigterm",
1552 [MOUNT_UNMOUNTING_SIGKILL] = "unmounting-sigkill",
1553 [MOUNT_MAINTENANCE] = "maintenance"
1554 };
1555
1556 DEFINE_STRING_TABLE_LOOKUP(mount_state, MountState);
1557
1558 static const char* const mount_exec_command_table[_MOUNT_EXEC_COMMAND_MAX] = {
1559 [MOUNT_EXEC_MOUNT] = "ExecMount",
1560 [MOUNT_EXEC_UNMOUNT] = "ExecUnmount",
1561 [MOUNT_EXEC_REMOUNT] = "ExecRemount",
1562 };
1563
1564 DEFINE_STRING_TABLE_LOOKUP(mount_exec_command, MountExecCommand);
1565
1566 const UnitVTable mount_vtable = {
1567 .suffix = ".mount",
1568
1569 .no_alias = true,
1570 .no_instances = true,
1571 .no_isolate = true,
1572 .show_status = true,
1573
1574 .init = mount_init,
1575 .load = mount_load,
1576 .done = mount_done,
1577
1578 .coldplug = mount_coldplug,
1579
1580 .dump = mount_dump,
1581
1582 .start = mount_start,
1583 .stop = mount_stop,
1584 .reload = mount_reload,
1585
1586 .serialize = mount_serialize,
1587 .deserialize_item = mount_deserialize_item,
1588
1589 .active_state = mount_active_state,
1590 .sub_state_to_string = mount_sub_state_to_string,
1591
1592 .check_gc = mount_check_gc,
1593
1594 .sigchld_event = mount_sigchld_event,
1595 .timer_event = mount_timer_event,
1596
1597 .bus_message_handler = bus_mount_message_handler,
1598
1599 .enumerate = mount_enumerate,
1600 .shutdown = mount_shutdown
1601 };