]> git.ipfire.org Git - people/ms/systemd.git/blame - mount.c
reload: implement reload/reexec logic
[people/ms/systemd.git] / mount.c
CommitLineData
5cb5a6ff
LP
1/*-*- Mode: C; c-basic-offset: 8 -*-*/
2
a7334b09
LP
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
5cb5a6ff 22#include <errno.h>
b08d03ff
LP
23#include <stdio.h>
24#include <mntent.h>
ef734fd6 25#include <sys/epoll.h>
e537352b 26#include <signal.h>
5cb5a6ff 27
87f0e418 28#include "unit.h"
5cb5a6ff
LP
29#include "mount.h"
30#include "load-fragment.h"
5cb5a6ff 31#include "load-dropin.h"
b08d03ff 32#include "log.h"
e537352b
LP
33#include "strv.h"
34#include "mount-setup.h"
9e2f7c11 35#include "unit-name.h"
4139c1b2
LP
36#include "mount.h"
37#include "dbus-mount.h"
5cb5a6ff 38
f50e0a01
LP
39static const UnitActiveState state_translation_table[_MOUNT_STATE_MAX] = {
40 [MOUNT_DEAD] = UNIT_INACTIVE,
41 [MOUNT_MOUNTING] = UNIT_ACTIVATING,
e537352b 42 [MOUNT_MOUNTING_DONE] = UNIT_ACTIVE,
f50e0a01 43 [MOUNT_MOUNTED] = UNIT_ACTIVE,
e537352b 44 [MOUNT_REMOUNTING] = UNIT_ACTIVE_RELOADING,
f50e0a01 45 [MOUNT_UNMOUNTING] = UNIT_DEACTIVATING,
e537352b
LP
46 [MOUNT_MOUNTING_SIGTERM] = UNIT_DEACTIVATING,
47 [MOUNT_MOUNTING_SIGKILL] = UNIT_DEACTIVATING,
48 [MOUNT_REMOUNTING_SIGTERM] = UNIT_ACTIVE_RELOADING,
49 [MOUNT_REMOUNTING_SIGKILL] = UNIT_ACTIVE_RELOADING,
50 [MOUNT_UNMOUNTING_SIGTERM] = UNIT_DEACTIVATING,
51 [MOUNT_UNMOUNTING_SIGKILL] = UNIT_DEACTIVATING,
f50e0a01
LP
52 [MOUNT_MAINTAINANCE] = UNIT_INACTIVE,
53};
5cb5a6ff 54
a16e1123
LP
55static void mount_init(Unit *u) {
56 Mount *m = MOUNT(u);
5cb5a6ff 57
a16e1123
LP
58 assert(u);
59 assert(u->meta.load_state == UNIT_STUB);
60
61 m->timeout_usec = DEFAULT_TIMEOUT_USEC;
62 exec_context_init(&m->exec_context);
8d567588 63
a16e1123
LP
64 /* We need to make sure that /bin/mount is always called in
65 * the same process group as us, so that the autofs kernel
66 * side doesn't send us another mount request while we are
67 * already trying to comply its last one. */
68 m->exec_context.no_setsid = true;
8d567588 69
a16e1123
LP
70 m->timer_watch.type = WATCH_INVALID;
71
72 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
8d567588
LP
73}
74
a16e1123 75static void mount_unwatch_control_pid(Mount *m) {
5e94833f
LP
76 assert(m);
77
78 if (m->control_pid <= 0)
79 return;
80
81 unit_unwatch_pid(UNIT(m), m->control_pid);
82 m->control_pid = 0;
83}
84
e537352b
LP
85static void mount_parameters_done(MountParameters *p) {
86 assert(p);
87
88 free(p->what);
89 free(p->options);
90 free(p->fstype);
91
92 p->what = p->options = p->fstype = NULL;
93}
94
87f0e418 95static void mount_done(Unit *u) {
ef734fd6 96 Mount *m = MOUNT(u);
034c6ed7 97
ef734fd6 98 assert(m);
034c6ed7 99
e537352b
LP
100 free(m->where);
101 m->where = NULL;
f50e0a01 102
e537352b
LP
103 mount_parameters_done(&m->parameters_etc_fstab);
104 mount_parameters_done(&m->parameters_proc_self_mountinfo);
105 mount_parameters_done(&m->parameters_fragment);
ef734fd6 106
e537352b
LP
107 exec_context_done(&m->exec_context);
108 exec_command_done_array(m->exec_command, _MOUNT_EXEC_COMMAND_MAX);
109 m->control_command = NULL;
f50e0a01 110
a16e1123 111 mount_unwatch_control_pid(m);
f50e0a01 112
e537352b 113 unit_unwatch_timer(u, &m->timer_watch);
f50e0a01
LP
114}
115
b08d03ff
LP
116static int mount_add_node_links(Mount *m) {
117 Unit *device;
118 char *e;
119 int r;
e537352b 120 const char *what;
b08d03ff
LP
121
122 assert(m);
123
124 /* Adds in links to the device that this node is based on */
125
e537352b
LP
126 if (m->parameters_fragment.what)
127 what = m->parameters_fragment.what;
128 else if (m->parameters_etc_fstab.what)
129 what = m->parameters_etc_fstab.what;
130 else
131 /* We observe kernel mounts only while they are live,
132 * hence don't create any links for them */
133 return 0;
134
135 if (!path_startswith(what, "/dev/"))
b08d03ff
LP
136 return 0;
137
9e2f7c11 138 if (!(e = unit_name_build_escape(what+1, NULL, ".device")))
b08d03ff
LP
139 return -ENOMEM;
140
9e2f7c11 141 r = manager_load_unit(UNIT(m)->meta.manager, e, NULL, &device);
b08d03ff
LP
142 free(e);
143
144 if (r < 0)
145 return r;
146
147 if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, device)) < 0)
148 return r;
149
150 if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, device)) < 0)
151 return r;
152
e537352b
LP
153 if (UNIT(m)->meta.manager->running_as == MANAGER_INIT ||
154 UNIT(m)->meta.manager->running_as == MANAGER_SYSTEM)
155 if ((r = unit_add_dependency(device, UNIT_WANTS, UNIT(m))) < 0)
156 return r;
b08d03ff
LP
157
158 return 0;
159}
160
161static int mount_add_path_links(Mount *m) {
ef734fd6 162 Meta *other;
b08d03ff
LP
163 int r;
164
e537352b
LP
165 assert(m);
166
b08d03ff
LP
167 /* Adds in link to other mount points, that might lie below or
168 * above us in the hierarchy */
169
ef734fd6 170 LIST_FOREACH(units_per_type, other, UNIT(m)->meta.manager->units_per_type[UNIT_MOUNT]) {
b08d03ff
LP
171 Mount *n;
172
ef734fd6 173 n = (Mount*) other;
b08d03ff 174
ef734fd6 175 if (n == m)
79ef004b 176 continue;
b08d03ff 177
e537352b
LP
178 if (m->meta.load_state != UNIT_LOADED)
179 continue;
180
b08d03ff
LP
181 if (path_startswith(m->where, n->where)) {
182
e537352b 183 if ((r = unit_add_dependency(UNIT(m), UNIT_AFTER, UNIT(other))) < 0)
b08d03ff
LP
184 return r;
185
e537352b
LP
186 if (n->from_etc_fstab || n->from_fragment)
187 if ((r = unit_add_dependency(UNIT(m), UNIT_REQUIRES, UNIT(other))) < 0)
188 return r;
b08d03ff 189
e537352b 190 } else if (path_startswith(n->where, m->where)) {
b08d03ff 191
e537352b 192 if ((r = unit_add_dependency(UNIT(m), UNIT_BEFORE, UNIT(other))) < 0)
b08d03ff
LP
193 return r;
194
e537352b
LP
195 if (m->from_etc_fstab || m->from_fragment)
196 if ((r = unit_add_dependency(UNIT(other), UNIT_REQUIRES, UNIT(m))) < 0)
197 return r;
b08d03ff
LP
198 }
199 }
200
201 return 0;
202}
203
e537352b
LP
204static bool mount_test_option(const char *haystack, const char *needle) {
205 struct mntent me;
206
207 assert(needle);
208
209 /* Like glibc's hasmntopt(), but works on a string, not a
210 * struct mntent */
211
212 if (!haystack)
213 return false;
214
215 zero(me);
216 me.mnt_opts = (char*) haystack;
217
218 return !!hasmntopt(&me, needle);
219}
220
221static int mount_add_target_links(Mount *m) {
222 const char *target;
223 MountParameters *p;
a16e1123 224 Unit *tu;
e537352b 225 int r;
a16e1123 226 bool noauto, handle, automount;
e537352b
LP
227
228 assert(m);
229
230 if (m->from_fragment)
231 p = &m->parameters_fragment;
232 else if (m->from_etc_fstab)
233 p = &m->parameters_etc_fstab;
234 else
235 return 0;
236
9fcc065a
LP
237 noauto = mount_test_option(p->options, MNTOPT_NOAUTO);
238 handle = mount_test_option(p->options, "comment=systemd.mount");
a16e1123 239 automount = mount_test_option(p->options, "comment=systemd.automount");
e537352b 240
a16e1123 241 if (noauto && !handle && !automount)
e537352b
LP
242 return 0;
243
244 if (mount_test_option(p->options, "_netdev") ||
245 fstype_is_network(p->fstype))
246 target = SPECIAL_REMOTE_FS_TARGET;
247 else
248 target = SPECIAL_LOCAL_FS_TARGET;
249
a16e1123 250 if ((r = manager_load_unit(UNIT(m)->meta.manager, target, NULL, &tu)) < 0)
e537352b
LP
251 return r;
252
a16e1123
LP
253 if (automount) {
254 Unit *am;
255
256 if ((r = unit_load_related_unit(UNIT(m), ".automount", &am)) < 0)
9fcc065a 257 return r;
e537352b 258
a16e1123
LP
259 if ((r = unit_add_dependency(tu, UNIT_WANTS, UNIT(am))) < 0)
260 return r;
261
262 return unit_add_dependency(UNIT(am), UNIT_BEFORE, tu);
263
264 } else {
265
266 if (handle)
267 if ((r = unit_add_dependency(tu, UNIT_WANTS, UNIT(m))) < 0)
268 return r;
269
270 return unit_add_dependency(UNIT(m), UNIT_BEFORE, tu);
271 }
e537352b
LP
272}
273
8d567588
LP
274static int mount_verify(Mount *m) {
275 bool b;
276 char *e;
277 assert(m);
278
279 if (UNIT(m)->meta.load_state != UNIT_LOADED)
280 return 0;
281
a16e1123 282 if (!(e = unit_name_from_path(m->where, ".mount")))
8d567588
LP
283 return -ENOMEM;
284
285 b = unit_has_name(UNIT(m), e);
286 free(e);
287
288 if (!b) {
289 log_error("%s's Where setting doesn't match unit name. Refusing.", UNIT(m)->meta.id);
290 return -EINVAL;
291 }
292
293 return 0;
294}
295
e537352b
LP
296static int mount_load(Unit *u) {
297 Mount *m = MOUNT(u);
298 int r;
299
300 assert(u);
301 assert(u->meta.load_state == UNIT_STUB);
302
303 if ((r = unit_load_fragment_and_dropin_optional(u)) < 0)
304 return r;
305
306 /* This is a new unit? Then let's add in some extras */
307 if (u->meta.load_state == UNIT_LOADED) {
308
a16e1123
LP
309 if (!m->where)
310 if (!(m->where = unit_name_to_path(u->meta.id)))
311 return -ENOMEM;
312
313 path_kill_slashes(m->where);
314
e537352b
LP
315 /* Minor validity checking */
316 if ((m->parameters_fragment.options || m->parameters_fragment.fstype) && !m->parameters_fragment.what)
317 return -EBADMSG;
318
319 if (m->parameters_fragment.what)
320 m->from_fragment = true;
321
322 if ((r = mount_add_node_links(MOUNT(u))) < 0)
323 return r;
324
325 if ((r = mount_add_path_links(MOUNT(u))) < 0)
326 return r;
327
328 if ((r = mount_add_target_links(MOUNT(u))) < 0)
329 return r;
330
331 if ((r = unit_add_default_cgroup(u)) < 0)
332 return r;
333 }
334
8d567588 335 return mount_verify(m);
e537352b
LP
336}
337
a16e1123
LP
338static int mount_notify_automount(Mount *m, int status) {
339 Unit *p;
340 int r;
341
342 assert(m);
343
344 if ((r = unit_get_related_unit(UNIT(m), ".automount", &p)) < 0)
345 return r == -ENOENT ? 0 : r;
346
347 return automount_send_ready(AUTOMOUNT(p), status);
348}
349
e537352b
LP
350static void mount_set_state(Mount *m, MountState state) {
351 MountState old_state;
352 assert(m);
353
354 old_state = m->state;
355 m->state = state;
356
357 if (state != MOUNT_MOUNTING &&
358 state != MOUNT_MOUNTING_DONE &&
359 state != MOUNT_REMOUNTING &&
360 state != MOUNT_UNMOUNTING &&
361 state != MOUNT_MOUNTING_SIGTERM &&
362 state != MOUNT_MOUNTING_SIGKILL &&
363 state != MOUNT_UNMOUNTING_SIGTERM &&
364 state != MOUNT_UNMOUNTING_SIGKILL &&
365 state != MOUNT_REMOUNTING_SIGTERM &&
366 state != MOUNT_REMOUNTING_SIGKILL) {
367 unit_unwatch_timer(UNIT(m), &m->timer_watch);
a16e1123 368 mount_unwatch_control_pid(m);
e537352b 369 m->control_command = NULL;
a16e1123 370 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
e537352b
LP
371 }
372
8d567588
LP
373 if (state == MOUNT_MOUNTED ||
374 state == MOUNT_REMOUNTING)
375 mount_notify_automount(m, 0);
376 else if (state == MOUNT_DEAD ||
377 state == MOUNT_UNMOUNTING ||
378 state == MOUNT_MOUNTING_SIGTERM ||
379 state == MOUNT_MOUNTING_SIGKILL ||
380 state == MOUNT_REMOUNTING_SIGTERM ||
381 state == MOUNT_REMOUNTING_SIGKILL ||
382 state == MOUNT_UNMOUNTING_SIGTERM ||
383 state == MOUNT_UNMOUNTING_SIGKILL ||
384 state == MOUNT_MAINTAINANCE)
385 mount_notify_automount(m, -ENODEV);
386
e537352b 387 if (state != old_state)
a16e1123
LP
388 log_debug("%s changed %s → %s",
389 UNIT(m)->meta.id,
390 mount_state_to_string(old_state),
391 mount_state_to_string(state));
e537352b
LP
392
393 unit_notify(UNIT(m), state_translation_table[old_state], state_translation_table[state]);
394}
395
396static int mount_coldplug(Unit *u) {
397 Mount *m = MOUNT(u);
a16e1123
LP
398 MountState new_state = MOUNT_DEAD;
399 int r;
e537352b
LP
400
401 assert(m);
402 assert(m->state == MOUNT_DEAD);
403
a16e1123
LP
404 if (m->deserialized_state != m->state)
405 new_state = m->deserialized_state;
406 else if (m->from_proc_self_mountinfo)
407 new_state = MOUNT_MOUNTED;
e537352b 408
a16e1123 409 if (new_state != m->state) {
e537352b 410
a16e1123
LP
411 if (new_state == MOUNT_MOUNTING ||
412 new_state == MOUNT_MOUNTING_DONE ||
413 new_state == MOUNT_REMOUNTING ||
414 new_state == MOUNT_UNMOUNTING ||
415 new_state == MOUNT_MOUNTING_SIGTERM ||
416 new_state == MOUNT_MOUNTING_SIGKILL ||
417 new_state == MOUNT_UNMOUNTING_SIGTERM ||
418 new_state == MOUNT_UNMOUNTING_SIGKILL ||
419 new_state == MOUNT_REMOUNTING_SIGTERM ||
420 new_state == MOUNT_REMOUNTING_SIGKILL) {
e537352b 421
a16e1123
LP
422 if (m->control_pid <= 0)
423 return -EBADMSG;
e537352b 424
a16e1123
LP
425 if ((r = unit_watch_pid(UNIT(m), m->control_pid)) < 0)
426 return r;
e537352b 427
a16e1123
LP
428 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
429 return r;
430 }
e537352b 431
a16e1123
LP
432 mount_set_state(m, new_state);
433 }
e537352b
LP
434
435 return 0;
e537352b
LP
436}
437
438static void mount_dump(Unit *u, FILE *f, const char *prefix) {
439 Mount *m = MOUNT(u);
440 MountParameters *p;
441
442 assert(m);
443 assert(f);
444
445 if (m->from_proc_self_mountinfo)
446 p = &m->parameters_proc_self_mountinfo;
447 else if (m->from_fragment)
448 p = &m->parameters_fragment;
449 else
450 p = &m->parameters_etc_fstab;
451
452 fprintf(f,
453 "%sMount State: %s\n"
454 "%sWhere: %s\n"
455 "%sWhat: %s\n"
456 "%sFile System Type: %s\n"
457 "%sOptions: %s\n"
458 "%sFrom /etc/fstab: %s\n"
459 "%sFrom /proc/self/mountinfo: %s\n"
460 "%sFrom fragment: %s\n"
461 "%sKillMode: %s\n",
a16e1123 462 prefix, mount_state_to_string(m->state),
e537352b
LP
463 prefix, m->where,
464 prefix, strna(p->what),
465 prefix, strna(p->fstype),
466 prefix, strna(p->options),
467 prefix, yes_no(m->from_etc_fstab),
468 prefix, yes_no(m->from_proc_self_mountinfo),
469 prefix, yes_no(m->from_fragment),
470 prefix, kill_mode_to_string(m->kill_mode));
471
472 if (m->control_pid > 0)
473 fprintf(f,
474 "%sControl PID: %llu\n",
475 prefix, (unsigned long long) m->control_pid);
476
477 exec_context_dump(&m->exec_context, f, prefix);
478}
479
a16e1123
LP
480static int mount_spawn(Mount *m, ExecCommand *c, pid_t *_pid) {
481 pid_t pid;
482 int r;
483
484 assert(m);
485 assert(c);
486 assert(_pid);
487
488 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
489 goto fail;
490
491 if ((r = exec_spawn(c,
492 NULL,
493 &m->exec_context,
494 NULL, 0,
495 true,
496 true,
497 UNIT(m)->meta.manager->confirm_spawn,
498 UNIT(m)->meta.cgroup_bondings,
499 &pid)) < 0)
500 goto fail;
501
502 if ((r = unit_watch_pid(UNIT(m), pid)) < 0)
503 /* FIXME: we need to do something here */
504 goto fail;
505
506 *_pid = pid;
507
508 return 0;
509
510fail:
511 unit_unwatch_timer(UNIT(m), &m->timer_watch);
512
513 return r;
514}
515
e537352b
LP
516static void mount_enter_dead(Mount *m, bool success) {
517 assert(m);
518
519 if (!success)
520 m->failure = true;
521
522 mount_set_state(m, m->failure ? MOUNT_MAINTAINANCE : MOUNT_DEAD);
523}
524
80876c20
LP
525static void mount_enter_mounted(Mount *m, bool success) {
526 assert(m);
527
528 if (!success)
529 m->failure = true;
530
531 mount_set_state(m, MOUNT_MOUNTED);
532}
533
e537352b
LP
534static void mount_enter_signal(Mount *m, MountState state, bool success) {
535 int r;
80876c20 536 bool sent = false;
e537352b
LP
537
538 assert(m);
539
540 if (!success)
541 m->failure = true;
542
80876c20
LP
543 if (m->kill_mode != KILL_NONE) {
544 int sig = (state == MOUNT_MOUNTING_SIGTERM ||
545 state == MOUNT_UNMOUNTING_SIGTERM ||
546 state == MOUNT_REMOUNTING_SIGTERM) ? SIGTERM : SIGKILL;
e537352b
LP
547
548 if (m->kill_mode == KILL_CONTROL_GROUP) {
549
550 if ((r = cgroup_bonding_kill_list(UNIT(m)->meta.cgroup_bondings, sig)) < 0) {
551 if (r != -EAGAIN && r != -ESRCH)
552 goto fail;
553 } else
554 sent = true;
555 }
556
80876c20 557 if (!sent && m->control_pid > 0)
e537352b
LP
558 if (kill(m->kill_mode == KILL_PROCESS ? m->control_pid : -m->control_pid, sig) < 0 && errno != ESRCH) {
559 r = -errno;
560 goto fail;
561 }
562 }
563
80876c20
LP
564 if (sent) {
565 if ((r = unit_watch_timer(UNIT(m), m->timeout_usec, &m->timer_watch)) < 0)
566 goto fail;
e537352b 567
80876c20
LP
568 mount_set_state(m, state);
569 } else if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
570 mount_enter_mounted(m, true);
571 else
e537352b
LP
572 mount_enter_dead(m, true);
573
574 return;
575
576fail:
9e2f7c11 577 log_warning("%s failed to kill processes: %s", UNIT(m)->meta.id, strerror(-r));
e537352b 578
80876c20
LP
579 if (state == MOUNT_REMOUNTING_SIGTERM || state == MOUNT_REMOUNTING_SIGKILL)
580 mount_enter_mounted(m, false);
581 else
582 mount_enter_dead(m, false);
e537352b
LP
583}
584
585static void mount_enter_unmounting(Mount *m, bool success) {
e537352b
LP
586 int r;
587
588 assert(m);
589
590 if (!success)
591 m->failure = true;
592
a16e1123
LP
593 m->control_command_id = MOUNT_EXEC_UNMOUNT;
594 m->control_command = m->exec_command + MOUNT_EXEC_UNMOUNT;
e537352b
LP
595
596 if ((r = exec_command_set(
a16e1123 597 m->control_command,
e537352b
LP
598 "/bin/umount",
599 m->where,
600 NULL)) < 0)
601 goto fail;
602
a16e1123 603 mount_unwatch_control_pid(m);
5e94833f 604
a16e1123 605 if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
e537352b
LP
606 goto fail;
607
608 mount_set_state(m, MOUNT_UNMOUNTING);
609
610 return;
611
612fail:
9e2f7c11 613 log_warning("%s failed to run umount exectuable: %s", UNIT(m)->meta.id, strerror(-r));
e537352b
LP
614 mount_enter_mounted(m, false);
615}
616
8d567588 617static void mount_enter_mounting(Mount *m) {
e537352b
LP
618 int r;
619
620 assert(m);
621
a16e1123
LP
622 m->control_command_id = MOUNT_EXEC_MOUNT;
623 m->control_command = m->exec_command + MOUNT_EXEC_MOUNT;
e537352b
LP
624
625 if (m->from_fragment)
626 r = exec_command_set(
a16e1123 627 m->control_command,
e537352b
LP
628 "/bin/mount",
629 m->parameters_fragment.what,
630 m->where,
631 "-t", m->parameters_fragment.fstype,
8d567588 632 m->parameters_fragment.options ? "-o" : NULL, m->parameters_fragment.options,
e537352b
LP
633 NULL);
634 else if (m->from_etc_fstab)
635 r = exec_command_set(
a16e1123 636 m->control_command,
e537352b
LP
637 "/bin/mount",
638 m->where,
639 NULL);
640 else
641 r = -ENOENT;
642
643 if (r < 0)
644 goto fail;
645
a16e1123 646 mount_unwatch_control_pid(m);
5e94833f 647
a16e1123 648 if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
e537352b
LP
649 goto fail;
650
651 mount_set_state(m, MOUNT_MOUNTING);
652
653 return;
654
655fail:
9e2f7c11 656 log_warning("%s failed to run mount exectuable: %s", UNIT(m)->meta.id, strerror(-r));
e537352b
LP
657 mount_enter_dead(m, false);
658}
659
8d567588 660static void mount_enter_mounting_done(Mount *m) {
e537352b
LP
661 assert(m);
662
e537352b
LP
663 mount_set_state(m, MOUNT_MOUNTING_DONE);
664}
665
666static void mount_enter_remounting(Mount *m, bool success) {
e537352b
LP
667 int r;
668
669 assert(m);
670
671 if (!success)
672 m->failure = true;
673
a16e1123
LP
674 m->control_command_id = MOUNT_EXEC_REMOUNT;
675 m->control_command = m->exec_command + MOUNT_EXEC_REMOUNT;
e537352b
LP
676
677 if (m->from_fragment) {
678 char *buf = NULL;
679 const char *o;
680
681 if (m->parameters_fragment.options) {
682 if (!(buf = strappend("remount,", m->parameters_fragment.options))) {
683 r = -ENOMEM;
684 goto fail;
685 }
686
687 o = buf;
688 } else
689 o = "remount";
690
691 r = exec_command_set(
a16e1123 692 m->control_command,
e537352b
LP
693 "/bin/mount",
694 m->parameters_fragment.what,
695 m->where,
696 "-t", m->parameters_fragment.fstype,
697 "-o", o,
698 NULL);
699
700 free(buf);
701 } else if (m->from_etc_fstab)
702 r = exec_command_set(
a16e1123 703 m->control_command,
e537352b
LP
704 "/bin/mount",
705 m->where,
706 "-o", "remount",
707 NULL);
708 else
709 r = -ENOENT;
710
711 if (r < 0) {
712 r = -ENOMEM;
713 goto fail;
714 }
715
a16e1123 716 mount_unwatch_control_pid(m);
5e94833f 717
a16e1123 718 if ((r = mount_spawn(m, m->control_command, &m->control_pid)) < 0)
e537352b
LP
719 goto fail;
720
721 mount_set_state(m, MOUNT_REMOUNTING);
722
723 return;
724
725fail:
726 mount_enter_mounted(m, false);
727}
728
729static int mount_start(Unit *u) {
730 Mount *m = MOUNT(u);
731
732 assert(m);
733
734 /* We cannot fulfill this request right now, try again later
735 * please! */
736 if (m->state == MOUNT_UNMOUNTING ||
737 m->state == MOUNT_UNMOUNTING_SIGTERM ||
738 m->state == MOUNT_UNMOUNTING_SIGKILL)
739 return -EAGAIN;
740
741 /* Already on it! */
742 if (m->state == MOUNT_MOUNTING ||
743 m->state == MOUNT_MOUNTING_SIGTERM ||
744 m->state == MOUNT_MOUNTING_SIGKILL)
745 return 0;
746
747 assert(m->state == MOUNT_DEAD || m->state == MOUNT_MAINTAINANCE);
748
749 m->failure = false;
8d567588 750 mount_enter_mounting(m);
e537352b
LP
751 return 0;
752}
753
754static int mount_stop(Unit *u) {
755 Mount *m = MOUNT(u);
756
757 assert(m);
758
759 /* Cann't do this right now. */
760 if (m->state == MOUNT_MOUNTING ||
761 m->state == MOUNT_MOUNTING_DONE ||
762 m->state == MOUNT_MOUNTING_SIGTERM ||
763 m->state == MOUNT_MOUNTING_SIGKILL ||
764 m->state == MOUNT_REMOUNTING ||
765 m->state == MOUNT_REMOUNTING_SIGTERM ||
766 m->state == MOUNT_REMOUNTING_SIGKILL)
767 return -EAGAIN;
768
769 /* Already on it */
770 if (m->state == MOUNT_UNMOUNTING ||
771 m->state == MOUNT_UNMOUNTING_SIGKILL ||
772 m->state == MOUNT_UNMOUNTING_SIGTERM)
773 return 0;
774
775 assert(m->state == MOUNT_MOUNTED);
776
777 mount_enter_unmounting(m, true);
778 return 0;
779}
780
781static int mount_reload(Unit *u) {
782 Mount *m = MOUNT(u);
783
784 assert(m);
785
786 if (m->state == MOUNT_MOUNTING_DONE)
787 return -EAGAIN;
788
789 assert(m->state == MOUNT_MOUNTED);
790
791 mount_enter_remounting(m, true);
792 return 0;
793}
794
a16e1123
LP
795static int mount_serialize(Unit *u, FILE *f, FDSet *fds) {
796 Mount *m = MOUNT(u);
797
798 assert(m);
799 assert(f);
800 assert(fds);
801
802 unit_serialize_item(u, f, "state", mount_state_to_string(m->state));
803 unit_serialize_item(u, f, "failure", yes_no(m->failure));
804
805 if (m->control_pid > 0)
806 unit_serialize_item_format(u, f, "control-pid", "%u", (unsigned) m->control_pid);
807
808 if (m->control_command_id >= 0)
809 unit_serialize_item(u, f, "control-command", mount_exec_command_to_string(m->control_command_id));
810
811 return 0;
812}
813
814static int mount_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
815 Mount *m = MOUNT(u);
816 int r;
817
818 assert(u);
819 assert(key);
820 assert(value);
821 assert(fds);
822
823 if (streq(key, "state")) {
824 MountState state;
825
826 if ((state = mount_state_from_string(value)) < 0)
827 log_debug("Failed to parse state value %s", value);
828 else
829 m->deserialized_state = state;
830 } else if (streq(key, "failure")) {
831 int b;
832
833 if ((b = parse_boolean(value)) < 0)
834 log_debug("Failed to parse failure value %s", value);
835 else
836 m->failure = b || m->failure;
837
838 } else if (streq(key, "control-pid")) {
839 unsigned pid;
840
841 if ((r = safe_atou(value, &pid)) < 0 || pid <= 0)
842 log_debug("Failed to parse control-pid value %s", value);
843 else
844 m->control_pid = (pid_t) pid;
845 } else if (streq(key, "control-command")) {
846 MountExecCommand id;
847
848 if ((id = mount_exec_command_from_string(value)) < 0)
849 log_debug("Failed to parse exec-command value %s", value);
850 else {
851 m->control_command_id = id;
852 m->control_command = m->exec_command + id;
853 }
854
855 } else
856 log_debug("Unknown serialization key '%s'", key);
857
858 return 0;
859}
860
e537352b
LP
861static UnitActiveState mount_active_state(Unit *u) {
862 assert(u);
863
864 return state_translation_table[MOUNT(u)->state];
865}
866
10a94420
LP
867static const char *mount_sub_state_to_string(Unit *u) {
868 assert(u);
869
a16e1123 870 return mount_state_to_string(MOUNT(u)->state);
10a94420
LP
871}
872
e537352b
LP
873static void mount_sigchld_event(Unit *u, pid_t pid, int code, int status) {
874 Mount *m = MOUNT(u);
875 bool success;
876
877 assert(m);
878 assert(pid >= 0);
879
880 success = code == CLD_EXITED && status == 0;
881 m->failure = m->failure || !success;
882
883 assert(m->control_pid == pid);
e537352b
LP
884 m->control_pid = 0;
885
a16e1123
LP
886 if (m->control_command) {
887 exec_status_fill(&m->control_command->exec_status, pid, code, status);
888 m->control_command = NULL;
889 m->control_command_id = _MOUNT_EXEC_COMMAND_INVALID;
890 }
891
9e2f7c11 892 log_debug("%s control process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
e537352b
LP
893
894 /* Note that mount(8) returning and the kernel sending us a
895 * mount table change event might happen out-of-order. If an
896 * operation succeed we assume the kernel will follow soon too
897 * and already change into the resulting state. If it fails
898 * we check if the kernel still knows about the mount. and
899 * change state accordingly. */
900
901 switch (m->state) {
902
903 case MOUNT_MOUNTING:
904 case MOUNT_MOUNTING_DONE:
905 case MOUNT_MOUNTING_SIGKILL:
906 case MOUNT_MOUNTING_SIGTERM:
907 case MOUNT_REMOUNTING:
908 case MOUNT_REMOUNTING_SIGKILL:
909 case MOUNT_REMOUNTING_SIGTERM:
910
911 if (success && m->from_proc_self_mountinfo)
912 mount_enter_mounted(m, true);
913 else if (m->from_proc_self_mountinfo)
914 mount_enter_mounted(m, false);
915 else
916 mount_enter_dead(m, false);
917 break;
918
919 case MOUNT_UNMOUNTING:
920 case MOUNT_UNMOUNTING_SIGKILL:
921 case MOUNT_UNMOUNTING_SIGTERM:
922
923 if (success)
924 mount_enter_dead(m, true);
925 else if (m->from_proc_self_mountinfo)
926 mount_enter_mounted(m, false);
927 else
928 mount_enter_dead(m, false);
929 break;
930
931 default:
932 assert_not_reached("Uh, control process died at wrong time.");
933 }
934}
935
936static void mount_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
937 Mount *m = MOUNT(u);
938
939 assert(m);
940 assert(elapsed == 1);
941 assert(w == &m->timer_watch);
942
943 switch (m->state) {
944
945 case MOUNT_MOUNTING:
946 case MOUNT_MOUNTING_DONE:
9e2f7c11 947 log_warning("%s mounting timed out. Stopping.", u->meta.id);
e537352b
LP
948 mount_enter_signal(m, MOUNT_MOUNTING_SIGTERM, false);
949 break;
950
951 case MOUNT_REMOUNTING:
9e2f7c11 952 log_warning("%s remounting timed out. Stopping.", u->meta.id);
e537352b
LP
953 mount_enter_signal(m, MOUNT_REMOUNTING_SIGTERM, false);
954 break;
955
956 case MOUNT_UNMOUNTING:
9e2f7c11 957 log_warning("%s unmounting timed out. Stopping.", u->meta.id);
e537352b
LP
958 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGTERM, false);
959 break;
960
961 case MOUNT_MOUNTING_SIGTERM:
9e2f7c11 962 log_warning("%s mounting timed out. Killing.", u->meta.id);
e537352b
LP
963 mount_enter_signal(m, MOUNT_MOUNTING_SIGKILL, false);
964 break;
965
966 case MOUNT_REMOUNTING_SIGTERM:
9e2f7c11 967 log_warning("%s remounting timed out. Killing.", u->meta.id);
e537352b
LP
968 mount_enter_signal(m, MOUNT_REMOUNTING_SIGKILL, false);
969 break;
970
971 case MOUNT_UNMOUNTING_SIGTERM:
9e2f7c11 972 log_warning("%s unmounting timed out. Killing.", u->meta.id);
e537352b
LP
973 mount_enter_signal(m, MOUNT_UNMOUNTING_SIGKILL, false);
974 break;
975
976 case MOUNT_MOUNTING_SIGKILL:
977 case MOUNT_REMOUNTING_SIGKILL:
978 case MOUNT_UNMOUNTING_SIGKILL:
9e2f7c11 979 log_warning("%s mount process still around after SIGKILL. Ignoring.", u->meta.id);
e537352b
LP
980
981 if (m->from_proc_self_mountinfo)
982 mount_enter_mounted(m, false);
983 else
984 mount_enter_dead(m, false);
985 break;
986
987 default:
988 assert_not_reached("Timeout at wrong time.");
989 }
990}
991
992static int mount_add_one(
993 Manager *m,
994 const char *what,
995 const char *where,
996 const char *options,
997 const char *fstype,
998 bool from_proc_self_mountinfo,
999 bool set_flags) {
b08d03ff
LP
1000 int r;
1001 Unit *u;
1002 bool delete;
e537352b
LP
1003 char *e, *w = NULL, *o = NULL, *f = NULL;
1004 MountParameters *mp;
b08d03ff 1005
f50e0a01 1006 assert(m);
b08d03ff
LP
1007 assert(what);
1008 assert(where);
e537352b
LP
1009 assert(options);
1010 assert(fstype);
1011
1012 assert(!set_flags || from_proc_self_mountinfo);
1013
1014 /* Ignore API mount points. They should never be referenced in
1015 * dependencies ever. */
1016 if (mount_point_is_api(where))
1017 return 0;
b08d03ff 1018
8d567588
LP
1019 if (streq(fstype, "autofs"))
1020 return 0;
1021
b08d03ff
LP
1022 /* probably some kind of swap, which we don't cover for now */
1023 if (where[0] != '/')
1024 return 0;
1025
a16e1123 1026 if (!(e = unit_name_from_path(where, ".mount")))
b08d03ff
LP
1027 return -ENOMEM;
1028
1029 if (!(u = manager_get_unit(m, e))) {
1030 delete = true;
1031
1032 if (!(u = unit_new(m))) {
1033 free(e);
1034 return -ENOMEM;
1035 }
1036
1037 r = unit_add_name(u, e);
1038 free(e);
1039
1040 if (r < 0)
1041 goto fail;
1042
e537352b 1043 if (!(MOUNT(u)->where = strdup(where))) {
f50e0a01
LP
1044 r = -ENOMEM;
1045 goto fail;
1046 }
1047
1048 if ((r = unit_set_description(u, where)) < 0)
b08d03ff 1049 goto fail;
ef734fd6 1050
f94ea366 1051 unit_add_to_load_queue(u);
b08d03ff
LP
1052 } else {
1053 delete = false;
1054 free(e);
1055 }
1056
e537352b
LP
1057 if (!(w = strdup(what)) ||
1058 !(o = strdup(options)) ||
1059 !(f = strdup(fstype))) {
1060 r = -ENOMEM;
1061 goto fail;
1062 }
1063
1064 if (from_proc_self_mountinfo) {
1065 mp = &MOUNT(u)->parameters_proc_self_mountinfo;
1066
1067 if (set_flags) {
1068 MOUNT(u)->is_mounted = true;
1069 MOUNT(u)->just_mounted = !MOUNT(u)->from_proc_self_mountinfo;
1070 MOUNT(u)->just_changed = !streq_ptr(MOUNT(u)->parameters_proc_self_mountinfo.options, o);
1071 }
ef734fd6 1072
f50e0a01 1073 MOUNT(u)->from_proc_self_mountinfo = true;
e537352b 1074
ef734fd6 1075 } else {
e537352b
LP
1076 mp = &MOUNT(u)->parameters_etc_fstab;
1077
f50e0a01 1078 MOUNT(u)->from_etc_fstab = true;
ef734fd6 1079 }
f50e0a01 1080
e537352b
LP
1081 free(mp->what);
1082 mp->what = w;
b08d03ff 1083
e537352b
LP
1084 free(mp->options);
1085 mp->options = o;
1086
1087 free(mp->fstype);
1088 mp->fstype = f;
b08d03ff 1089
c1e1601e
LP
1090 unit_add_to_dbus_queue(u);
1091
b08d03ff
LP
1092 return 0;
1093
1094fail:
e537352b
LP
1095 free(w);
1096 free(o);
1097 free(f);
1098
b08d03ff
LP
1099 if (delete && u)
1100 unit_free(u);
1101
1102 return 0;
1103}
1104
1105static char *fstab_node_to_udev_node(char *p) {
1106 char *dn, *t;
1107 int r;
1108
1109 /* FIXME: to follow udev's logic 100% we need to leave valid
1110 * UTF8 chars unescaped */
1111
1112 if (startswith(p, "LABEL=")) {
1113
f50e0a01 1114 if (!(t = xescape(p+6, "/ ")))
b08d03ff
LP
1115 return NULL;
1116
f50e0a01 1117 r = asprintf(&dn, "/dev/disk/by-label/%s", t);
b08d03ff
LP
1118 free(t);
1119
1120 if (r < 0)
1121 return NULL;
1122
1123 return dn;
1124 }
1125
1126 if (startswith(p, "UUID=")) {
1127
f50e0a01 1128 if (!(t = xescape(p+5, "/ ")))
b08d03ff
LP
1129 return NULL;
1130
f50e0a01 1131 r = asprintf(&dn, "/dev/disk/by-uuid/%s", ascii_strlower(t));
b08d03ff
LP
1132 free(t);
1133
1134 if (r < 0)
1135 return NULL;
1136
1137 return dn;
1138 }
1139
1140 return strdup(p);
1141}
1142
e537352b 1143static int mount_load_etc_fstab(Manager *m) {
b08d03ff
LP
1144 FILE *f;
1145 int r;
1146 struct mntent* me;
1147
1148 assert(m);
1149
1150 errno = 0;
1151 if (!(f = setmntent("/etc/fstab", "r")))
1152 return -errno;
1153
1154 while ((me = getmntent(f))) {
1155 char *where, *what;
1156
1157 if (!(what = fstab_node_to_udev_node(me->mnt_fsname))) {
1158 r = -ENOMEM;
1159 goto finish;
1160 }
1161
1162 if (!(where = strdup(me->mnt_dir))) {
1163 free(what);
1164 r = -ENOMEM;
1165 goto finish;
1166 }
1167
1168 if (what[0] == '/')
1169 path_kill_slashes(what);
1170
1171 if (where[0] == '/')
1172 path_kill_slashes(where);
1173
e537352b 1174 r = mount_add_one(m, what, where, me->mnt_opts, me->mnt_type, false, false);
b08d03ff
LP
1175 free(what);
1176 free(where);
1177
1178 if (r < 0)
1179 goto finish;
1180 }
1181
1182 r = 0;
1183finish:
1184
1185 endmntent(f);
1186 return r;
1187}
1188
ef734fd6 1189static int mount_load_proc_self_mountinfo(Manager *m, bool set_flags) {
b08d03ff 1190 int r;
e537352b 1191 char *device, *path, *options, *fstype, *d, *p;
b08d03ff
LP
1192
1193 assert(m);
1194
ef734fd6 1195 rewind(m->proc_self_mountinfo);
b08d03ff
LP
1196
1197 for (;;) {
1198 int k;
e537352b
LP
1199
1200 device = path = options = fstype = d = p = NULL;
b08d03ff 1201
ef734fd6 1202 if ((k = fscanf(m->proc_self_mountinfo,
b08d03ff
LP
1203 "%*s " /* (1) mount id */
1204 "%*s " /* (2) parent id */
1205 "%*s " /* (3) major:minor */
1206 "%*s " /* (4) root */
1207 "%ms " /* (5) mount point */
e537352b 1208 "%ms" /* (6) mount options */
b08d03ff
LP
1209 "%*[^-]" /* (7) optional fields */
1210 "- " /* (8) seperator */
e537352b 1211 "%ms " /* (9) file system type */
ef734fd6
LP
1212 "%ms" /* (10) mount source */
1213 "%*[^\n]", /* some rubbish at the end */
b08d03ff 1214 &path,
e537352b
LP
1215 &options,
1216 &fstype,
1217 &device)) != 4) {
b08d03ff 1218
ef734fd6
LP
1219 if (k == EOF)
1220 break;
b08d03ff 1221
e537352b
LP
1222 r = -EBADMSG;
1223 goto finish;
b08d03ff
LP
1224 }
1225
e537352b
LP
1226 if (!(d = cunescape(device)) ||
1227 !(p = cunescape(path))) {
1228 r = -ENOMEM;
1229 goto finish;
b08d03ff 1230 }
b08d03ff 1231
e537352b
LP
1232 if ((r = mount_add_one(m, d, p, options, fstype, true, set_flags)) < 0)
1233 goto finish;
b08d03ff 1234
e537352b
LP
1235 free(device);
1236 free(path);
1237 free(options);
1238 free(fstype);
b08d03ff
LP
1239 free(d);
1240 free(p);
b08d03ff
LP
1241 }
1242
e537352b
LP
1243 r = 0;
1244
1245finish:
1246 free(device);
1247 free(path);
1248 free(options);
1249 free(fstype);
1250 free(d);
1251 free(p);
1252
1253 return r;
1254}
1255
1256static void mount_shutdown(Manager *m) {
1257 assert(m);
1258
a16e1123 1259 if (m->proc_self_mountinfo) {
e537352b 1260 fclose(m->proc_self_mountinfo);
a16e1123
LP
1261 m->proc_self_mountinfo = NULL;
1262 }
b08d03ff
LP
1263}
1264
1265static int mount_enumerate(Manager *m) {
1266 int r;
ef734fd6 1267 struct epoll_event ev;
b08d03ff
LP
1268 assert(m);
1269
a16e1123
LP
1270 if (!m->proc_self_mountinfo) {
1271 if (!(m->proc_self_mountinfo = fopen("/proc/self/mountinfo", "re")))
1272 return -errno;
ef734fd6 1273
a16e1123
LP
1274 m->mount_watch.type = WATCH_MOUNT;
1275 m->mount_watch.fd = fileno(m->proc_self_mountinfo);
ef734fd6 1276
a16e1123
LP
1277 zero(ev);
1278 ev.events = EPOLLERR;
1279 ev.data.ptr = &m->mount_watch;
ef734fd6 1280
a16e1123
LP
1281 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->mount_watch.fd, &ev) < 0)
1282 return -errno;
1283 }
ef734fd6 1284
e537352b 1285 if ((r = mount_load_etc_fstab(m)) < 0)
b08d03ff
LP
1286 goto fail;
1287
ef734fd6 1288 if ((r = mount_load_proc_self_mountinfo(m, false)) < 0)
b08d03ff
LP
1289 goto fail;
1290
1291 return 0;
1292
1293fail:
1294 mount_shutdown(m);
1295 return r;
5cb5a6ff
LP
1296}
1297
ef734fd6
LP
1298void mount_fd_event(Manager *m, int events) {
1299 Meta *meta;
1300 int r;
1301
1302 assert(m);
f94ea366 1303 assert(events == EPOLLERR);
ef734fd6
LP
1304
1305 /* The manager calls this for every fd event happening on the
1306 * /proc/self/mountinfo file, which informs us about mounting
1307 * table changes */
1308
1309 if ((r = mount_load_proc_self_mountinfo(m, true)) < 0) {
1310 log_error("Failed to reread /proc/self/mountinfo: %s", strerror(-errno));
e537352b
LP
1311
1312 /* Reset flags, just in case, for later calls */
1313 LIST_FOREACH(units_per_type, meta, m->units_per_type[UNIT_MOUNT]) {
1314 Mount *mount = (Mount*) meta;
1315
1316 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1317 }
1318
ef734fd6
LP
1319 return;
1320 }
1321
1322 manager_dispatch_load_queue(m);
1323
1324 LIST_FOREACH(units_per_type, meta, m->units_per_type[UNIT_MOUNT]) {
1325 Mount *mount = (Mount*) meta;
1326
e537352b
LP
1327 if (!mount->is_mounted) {
1328 /* This has just been unmounted. */
1329
ef734fd6 1330 mount->from_proc_self_mountinfo = false;
e537352b
LP
1331
1332 switch (mount->state) {
1333
1334 case MOUNT_MOUNTED:
1335 mount_enter_dead(mount, true);
1336 break;
1337
1338 default:
1339 mount_set_state(mount, mount->state);
1340 break;
1341
1342 }
1343
1344 } else if (mount->just_mounted || mount->just_changed) {
1345
1346 /* New or changed entrymount */
1347
1348 switch (mount->state) {
1349
1350 case MOUNT_DEAD:
1351 case MOUNT_MAINTAINANCE:
1352 mount_enter_mounted(mount, true);
1353 break;
1354
1355 case MOUNT_MOUNTING:
8d567588 1356 mount_enter_mounting_done(mount);
e537352b
LP
1357 break;
1358
1359 default:
1360 /* Nothing really changed, but let's
1361 * issue an notification call
1362 * nonetheless, in case somebody is
1363 * waiting for this. (e.g. file system
1364 * ro/rw remounts.) */
1365 mount_set_state(mount, mount->state);
1366 break;
1367 }
1368 }
1369
1370 /* Reset the flags for later calls */
1371 mount->is_mounted = mount->just_mounted = mount->just_changed = false;
1372 }
1373}
1374
1375int mount_path_is_mounted(Manager *m, const char* path) {
1376 char *t;
1377 int r;
1378
1379 assert(m);
1380 assert(path);
1381
1382 if (path[0] != '/')
1383 return 1;
1384
1385 if (!(t = strdup(path)))
1386 return -ENOMEM;
1387
1388 path_kill_slashes(t);
1389
1390 for (;;) {
1391 char *e, *slash;
1392 Unit *u;
1393
a16e1123 1394 if (!(e = unit_name_from_path(t, ".mount"))) {
e537352b
LP
1395 r = -ENOMEM;
1396 goto finish;
1397 }
1398
1399 u = manager_get_unit(m, e);
1400 free(e);
1401
1402 if (u &&
1403 (MOUNT(u)->from_etc_fstab || MOUNT(u)->from_fragment) &&
1404 MOUNT(u)->state != MOUNT_MOUNTED) {
1405 r = 0;
1406 goto finish;
ef734fd6
LP
1407 }
1408
e537352b
LP
1409 assert_se(slash = strrchr(t, '/'));
1410
1411 if (slash == t) {
1412 r = 1;
1413 goto finish;
1414 }
1415
1416 *slash = 0;
ef734fd6 1417 }
e537352b
LP
1418
1419 r = 1;
1420
1421finish:
1422 free(t);
1423 return r;
ef734fd6
LP
1424}
1425
a16e1123
LP
1426static const char* const mount_state_table[_MOUNT_STATE_MAX] = {
1427 [MOUNT_DEAD] = "dead",
1428 [MOUNT_MOUNTING] = "mounting",
1429 [MOUNT_MOUNTING_DONE] = "mounting-done",
1430 [MOUNT_MOUNTED] = "mounted",
1431 [MOUNT_REMOUNTING] = "remounting",
1432 [MOUNT_UNMOUNTING] = "unmounting",
1433 [MOUNT_MOUNTING_SIGTERM] = "mounting-sigterm",
1434 [MOUNT_MOUNTING_SIGKILL] = "mounting-sigkill",
1435 [MOUNT_REMOUNTING_SIGTERM] = "remounting-sigterm",
1436 [MOUNT_REMOUNTING_SIGKILL] = "remounting-sigkill",
1437 [MOUNT_UNMOUNTING_SIGTERM] = "unmounting-sigterm",
1438 [MOUNT_UNMOUNTING_SIGKILL] = "unmounting-sigkill",
1439 [MOUNT_MAINTAINANCE] = "maintainance"
1440};
1441
1442DEFINE_STRING_TABLE_LOOKUP(mount_state, MountState);
1443
1444static const char* const mount_exec_command_table[_MOUNT_EXEC_COMMAND_MAX] = {
1445 [MOUNT_EXEC_MOUNT] = "ExecMount",
1446 [MOUNT_EXEC_UNMOUNT] = "ExecUnmount",
1447 [MOUNT_EXEC_REMOUNT] = "ExecRemount",
1448};
1449
1450DEFINE_STRING_TABLE_LOOKUP(mount_exec_command, MountExecCommand);
1451
87f0e418 1452const UnitVTable mount_vtable = {
5cb5a6ff
LP
1453 .suffix = ".mount",
1454
e537352b 1455 .no_alias = true,
9e2f7c11 1456 .no_instances = true,
e537352b
LP
1457
1458 .init = mount_init,
1459 .load = mount_load,
034c6ed7 1460 .done = mount_done,
e537352b 1461
f50e0a01
LP
1462 .coldplug = mount_coldplug,
1463
034c6ed7 1464 .dump = mount_dump,
5cb5a6ff 1465
e537352b
LP
1466 .start = mount_start,
1467 .stop = mount_stop,
1468 .reload = mount_reload,
1469
a16e1123
LP
1470 .serialize = mount_serialize,
1471 .deserialize_item = mount_deserialize_item,
1472
f50e0a01 1473 .active_state = mount_active_state,
10a94420 1474 .sub_state_to_string = mount_sub_state_to_string,
b08d03ff 1475
e537352b
LP
1476 .sigchld_event = mount_sigchld_event,
1477 .timer_event = mount_timer_event,
1478
4139c1b2
LP
1479 .bus_message_handler = bus_mount_message_handler,
1480
f50e0a01
LP
1481 .enumerate = mount_enumerate,
1482 .shutdown = mount_shutdown
5cb5a6ff 1483};