]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/core/device.c
Merge pull request #33154 from yuwata/test-async
[thirdparty/systemd.git] / src / core / device.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
a7334b09 2
25ac040b 3#include <errno.h>
f94ea366 4#include <sys/epoll.h>
25ac040b 5
ad172d19
LP
6#include "sd-messages.h"
7
b5efdb8a 8#include "alloc-util.h"
b4e2fcb6 9#include "bus-common-errors.h"
4139c1b2 10#include "dbus-device.h"
6fcbec6f 11#include "dbus-unit.h"
4212fa83 12#include "device-private.h"
4366e598 13#include "device-util.h"
6bedfcbb 14#include "device.h"
07630cea 15#include "log.h"
6bedfcbb 16#include "parse-util.h"
9eb977db 17#include "path-util.h"
ad172d19 18#include "ratelimit.h"
d68c645b 19#include "serialize.h"
8fcde012 20#include "stat-util.h"
07630cea
LP
21#include "string-util.h"
22#include "swap.h"
2efa43dc 23#include "udev-util.h"
07630cea 24#include "unit-name.h"
9670d583 25#include "unit.h"
5cb5a6ff 26
f50e0a01 27static const UnitActiveState state_translation_table[_DEVICE_STATE_MAX] = {
1363eeca 28 [DEVICE_DEAD] = UNIT_INACTIVE,
628c89cc 29 [DEVICE_TENTATIVE] = UNIT_ACTIVATING,
1363eeca 30 [DEVICE_PLUGGED] = UNIT_ACTIVE,
f50e0a01
LP
31};
32
d0955f00 33static int device_dispatch_io(sd_device_monitor *monitor, sd_device *dev, void *userdata);
718db961 34
c072b84c
YW
35static int device_by_path(Manager *m, const char *path, Unit **ret) {
36 _cleanup_free_ char *e = NULL;
37 Unit *u;
38 int r;
39
40 assert(m);
41 assert(path);
42
43 r = unit_name_from_path(path, ".device", &e);
44 if (r < 0)
45 return r;
46
47 u = manager_get_unit(m, e);
48 if (!u)
49 return -ENOENT;
50
51 if (ret)
52 *ret = u;
53 return 0;
54}
55
8fe914ec 56static void device_unset_sysfs(Device *d) {
f1421cc6 57 Hashmap *devices;
8fe914ec
LP
58
59 assert(d);
60
a7f241db
LP
61 if (!d->sysfs)
62 return;
63
114e85d2
YW
64 /* Remove this unit from the chain of devices which share the same sysfs path. */
65
f1421cc6 66 devices = UNIT(d)->manager->devices_by_sysfs;
8fe914ec 67
114e85d2
YW
68 if (d->same_sysfs_prev)
69 /* If this is not the first unit, then simply remove this unit. */
70 d->same_sysfs_prev->same_sysfs_next = d->same_sysfs_next;
71 else if (d->same_sysfs_next)
72 /* If this is the first unit, replace with the next unit. */
73 assert_se(hashmap_replace(devices, d->same_sysfs_next->sysfs, d->same_sysfs_next) >= 0);
a7f241db 74 else
114e85d2 75 /* Otherwise, remove the entry. */
f1421cc6 76 hashmap_remove(devices, d->sysfs);
a7f241db 77
114e85d2
YW
78 if (d->same_sysfs_next)
79 d->same_sysfs_next->same_sysfs_prev = d->same_sysfs_prev;
80
81 d->same_sysfs_prev = d->same_sysfs_next = NULL;
82
a1e58e8e 83 d->sysfs = mfree(d->sysfs);
8fe914ec
LP
84}
85
628c89cc 86static int device_set_sysfs(Device *d, const char *sysfs) {
ccd419f0 87 _cleanup_free_ char *copy = NULL;
628c89cc 88 Device *first;
628c89cc
LP
89 int r;
90
91 assert(d);
92
93 if (streq_ptr(d->sysfs, sysfs))
94 return 0;
95
548f6937 96 r = hashmap_ensure_allocated(&UNIT(d)->manager->devices_by_sysfs, &path_hash_ops);
628c89cc
LP
97 if (r < 0)
98 return r;
99
100 copy = strdup(sysfs);
101 if (!copy)
102 return -ENOMEM;
103
104 device_unset_sysfs(d);
105
106 first = hashmap_get(UNIT(d)->manager->devices_by_sysfs, sysfs);
107 LIST_PREPEND(same_sysfs, first, d);
108
109 r = hashmap_replace(UNIT(d)->manager->devices_by_sysfs, copy, first);
110 if (r < 0) {
111 LIST_REMOVE(same_sysfs, first, d);
628c89cc
LP
112 return r;
113 }
114
ccd419f0 115 d->sysfs = TAKE_PTR(copy);
7c4d1394
MS
116 unit_add_to_dbus_queue(UNIT(d));
117
628c89cc
LP
118 return 0;
119}
120
faf919f1 121static void device_init(Unit *u) {
e9fa1bf7 122 Device *d = ASSERT_PTR(DEVICE(u));
faf919f1 123
e9fa1bf7 124 assert(u->load_state == UNIT_STUB);
faf919f1 125
8fe914ec
LP
126 /* In contrast to all other unit types we timeout jobs waiting
127 * for devices by default. This is because they otherwise wait
35b8ca3a 128 * indefinitely for plugged in devices, something which cannot
8fe914ec
LP
129 * happen for the other units since their operations time out
130 * anyway. */
c9e120e0 131 u->job_running_timeout = u->manager->defaults.device_timeout_usec;
c8f4d764 132
f1421cc6 133 u->ignore_on_isolate = true;
66f3fdbb
LP
134
135 d->deserialized_state = _DEVICE_STATE_INVALID;
faf919f1
LP
136}
137
87f0e418 138static void device_done(Unit *u) {
e9fa1bf7 139 Device *d = ASSERT_PTR(DEVICE(u));
e537352b 140
8fe914ec 141 device_unset_sysfs(d);
1ea74fca 142 d->deserialized_sysfs = mfree(d->deserialized_sysfs);
88116909 143 d->wants_property = strv_free(d->wants_property);
367a2597 144 d->path = mfree(d->path);
e537352b
LP
145}
146
1d4c6f5b
ZJS
147static int device_load(Unit *u) {
148 int r;
149
c3620770 150 r = unit_load_fragment_and_dropin(u, false);
1d4c6f5b
ZJS
151 if (r < 0)
152 return r;
153
154 if (!u->description) {
e41db484
LP
155 /* Generate a description based on the path, to be used until the device is initialized
156 properly */
1d4c6f5b
ZJS
157 r = unit_name_to_path(u->id, &u->description);
158 if (r < 0)
159 log_unit_debug_errno(u, r, "Failed to unescape name: %m");
160 }
161
162 return 0;
163}
164
f50e0a01
LP
165static void device_set_state(Device *d, DeviceState state) {
166 DeviceState old_state;
1363eeca 167
f50e0a01 168 assert(d);
5cb5a6ff 169
6fcbec6f
LP
170 if (d->state != state)
171 bus_unit_send_pending_change_signal(UNIT(d), false);
172
f50e0a01
LP
173 old_state = d->state;
174 d->state = state;
5cb5a6ff 175
244f8055
LP
176 if (state == DEVICE_DEAD)
177 device_unset_sysfs(d);
178
e537352b 179 if (state != old_state)
f2341e0a 180 log_unit_debug(UNIT(d), "Changed %s -> %s", device_state_to_string(old_state), device_state_to_string(state));
f50e0a01 181
96b09de5 182 unit_notify(UNIT(d), state_translation_table[old_state], state_translation_table[state], /* reload_success = */ true);
f50e0a01
LP
183}
184
dce2d35c
YW
185static void device_found_changed(Device *d, DeviceFound previous, DeviceFound now) {
186 assert(d);
187
188 /* Didn't exist before, but does now? if so, generate a new invocation ID for it */
189 if (previous == DEVICE_NOT_FOUND && now != DEVICE_NOT_FOUND)
190 (void) unit_acquire_invocation_id(UNIT(d));
191
192 if (FLAGS_SET(now, DEVICE_FOUND_UDEV))
193 /* When the device is known to udev we consider it plugged. */
194 device_set_state(d, DEVICE_PLUGGED);
195 else if (now != DEVICE_NOT_FOUND && !FLAGS_SET(previous, DEVICE_FOUND_UDEV))
196 /* If the device has not been seen by udev yet, but is now referenced by the kernel, then we assume the
197 * kernel knows it now, and udev might soon too. */
198 device_set_state(d, DEVICE_TENTATIVE);
199 else
200 /* If nobody sees the device, or if the device was previously seen by udev and now is only referenced
201 * from the kernel, then we consider the device is gone, the kernel just hasn't noticed it yet. */
202 device_set_state(d, DEVICE_DEAD);
203}
204
205static void device_update_found_one(Device *d, DeviceFound found, DeviceFound mask) {
206 assert(d);
207
208 if (MANAGER_IS_RUNNING(UNIT(d)->manager)) {
209 DeviceFound n, previous;
210
211 /* When we are already running, then apply the new mask right-away, and trigger state changes
212 * right-away */
213
214 n = (d->found & ~mask) | (found & mask);
215 if (n == d->found)
216 return;
217
218 previous = d->found;
219 d->found = n;
220
221 device_found_changed(d, previous, n);
222 } else
223 /* We aren't running yet, let's apply the new mask to the shadow variable instead, which we'll apply as
224 * soon as we catch-up with the state. */
225 d->enumerated_found = (d->enumerated_found & ~mask) | (found & mask);
226}
227
228static void device_update_found_by_sysfs(Manager *m, const char *sysfs, DeviceFound found, DeviceFound mask) {
229 Device *l;
230
231 assert(m);
232 assert(sysfs);
233
234 if (mask == 0)
235 return;
236
237 l = hashmap_get(m->devices_by_sysfs, sysfs);
238 LIST_FOREACH(same_sysfs, d, l)
239 device_update_found_one(d, found, mask);
240}
241
242static void device_update_found_by_name(Manager *m, const char *path, DeviceFound found, DeviceFound mask) {
dce2d35c 243 Unit *u;
dce2d35c
YW
244
245 assert(m);
246 assert(path);
247
248 if (mask == 0)
249 return;
250
c072b84c 251 if (device_by_path(m, path, &u) < 0)
dce2d35c
YW
252 return;
253
254 device_update_found_one(DEVICE(u), found, mask);
255}
256
be847e82 257static int device_coldplug(Unit *u) {
e9fa1bf7 258 Device *d = ASSERT_PTR(DEVICE(u));
f50e0a01 259
f50e0a01
LP
260 assert(d->state == DEVICE_DEAD);
261
66f3fdbb 262 /* First, let's put the deserialized state and found mask into effect, if we have it. */
75d7b598
YW
263 if (d->deserialized_state < 0)
264 return 0;
265
266 Manager *m = u->manager;
267 DeviceFound found = d->deserialized_found;
268 DeviceState state = d->deserialized_state;
269
270 /* On initial boot, switch-root, reload, reexecute, the following happen:
271 * 1. MANAGER_IS_RUNNING() == false
272 * 2. enumerate devices: manager_enumerate() -> device_enumerate()
273 * Device.enumerated_found is set.
54a4d715 274 * 3. deserialize devices: manager_deserialize() -> device_deserialize_item()
75d7b598
YW
275 * Device.deserialize_state and Device.deserialized_found are set.
276 * 4. coldplug devices: manager_coldplug() -> device_coldplug()
277 * deserialized properties are copied to the main properties.
278 * 5. MANAGER_IS_RUNNING() == true: manager_ready()
279 * 6. catchup devices: manager_catchup() -> device_catchup()
280 * Device.enumerated_found is applied to Device.found, and state is updated based on that.
281 *
282 * Notes:
283 * - On initial boot, no udev database exists. Hence, no devices are enumerated in the step 2.
284 * Also, there is no deserialized device. Device units are (a) generated based on dependencies of
285 * other units, or (b) generated when uevents are received.
286 *
3881fd40 287 * - On switch-root, the udev database may be cleared, except for devices with sticky bit, i.e.
32e27670 288 * OPTIONS="db_persist". Hence, almost no devices are enumerated in the step 2. However, in
54a4d715
YW
289 * general, we have several serialized devices. So, DEVICE_FOUND_UDEV bit in the
290 * Device.deserialized_found must be ignored, as udev rules in initrd and the main system are often
291 * different. If the deserialized state is DEVICE_PLUGGED, we need to downgrade it to
292 * DEVICE_TENTATIVE. Unlike the other starting mode, MANAGER_IS_SWITCHING_ROOT() is true when
293 * device_coldplug() and device_catchup() are called. Hence, let's conditionalize the operations by
294 * using the flag. After switch-root, systemd-udevd will (re-)process all devices, and the
295 * Device.found and Device.state will be adjusted.
75d7b598 296 *
54a4d715
YW
297 * - On reload or reexecute, we can trust Device.enumerated_found, Device.deserialized_found, and
298 * Device.deserialized_state. Of course, deserialized parameters may be outdated, but the unit
299 * state can be adjusted later by device_catchup() or uevents. */
75d7b598 300
7870de03 301 if (MANAGER_IS_SWITCHING_ROOT(m) &&
4fc69e8a 302 !FLAGS_SET(d->enumerated_found, DEVICE_FOUND_UDEV)) {
54a4d715
YW
303
304 /* The device has not been enumerated. On switching-root, such situation is natural. See the
305 * above comment. To prevent problematic state transition active → dead → active, let's
306 * drop the DEVICE_FOUND_UDEV flag and downgrade state to DEVICE_TENTATIVE(activating). See
307 * issue #12953 and #23208. */
308 found &= ~DEVICE_FOUND_UDEV;
75d7b598 309 if (state == DEVICE_PLUGGED)
54a4d715 310 state = DEVICE_TENTATIVE;
b6c86ae2
YW
311
312 /* Also check the validity of the device syspath. Without this check, if the device was
313 * removed while switching root, it would never go to inactive state, as both Device.found
314 * and Device.enumerated_found do not have the DEVICE_FOUND_UDEV flag, so device_catchup() in
315 * device_update_found_one() does nothing in most cases. See issue #25106. Note that the
316 * syspath field is only serialized when systemd is sufficiently new and the device has been
317 * already processed by udevd. */
318 if (d->deserialized_sysfs) {
319 _cleanup_(sd_device_unrefp) sd_device *dev = NULL;
320
321 if (sd_device_new_from_syspath(&dev, d->deserialized_sysfs) < 0)
322 state = DEVICE_DEAD;
323 }
75d7b598 324 }
918e6f1c 325
75d7b598 326 if (d->found == found && d->state == state)
66f3fdbb 327 return 0;
f50e0a01 328
75d7b598
YW
329 d->found = found;
330 device_set_state(d, state);
f50e0a01
LP
331 return 0;
332}
333
66f3fdbb 334static void device_catchup(Unit *u) {
e9fa1bf7 335 Device *d = ASSERT_PTR(DEVICE(u));
66f3fdbb 336
f33bc879 337 /* Second, let's update the state with the enumerated state */
66f3fdbb
LP
338 device_update_found_one(d, d->enumerated_found, DEVICE_FOUND_MASK);
339}
340
75d0aba4
YW
341static const struct {
342 DeviceFound flag;
343 const char *name;
344} device_found_map[] = {
66f3fdbb
LP
345 { DEVICE_FOUND_UDEV, "found-udev" },
346 { DEVICE_FOUND_MOUNT, "found-mount" },
347 { DEVICE_FOUND_SWAP, "found-swap" },
75d0aba4
YW
348};
349
350static int device_found_to_string_many(DeviceFound flags, char **ret) {
351 _cleanup_free_ char *s = NULL;
75d0aba4
YW
352
353 assert(ret);
354
fe96c0f8 355 for (size_t i = 0; i < ELEMENTSOF(device_found_map); i++) {
6e0f878e 356 if (!FLAGS_SET(flags, device_found_map[i].flag))
75d0aba4
YW
357 continue;
358
c2bc710b 359 if (!strextend_with_separator(&s, ",", device_found_map[i].name))
75d0aba4
YW
360 return -ENOMEM;
361 }
362
363 *ret = TAKE_PTR(s);
364
365 return 0;
366}
367
368static int device_found_from_string_many(const char *name, DeviceFound *ret) {
369 DeviceFound flags = 0;
370 int r;
371
372 assert(ret);
373
374 for (;;) {
375 _cleanup_free_ char *word = NULL;
376 DeviceFound f = 0;
377 unsigned i;
378
379 r = extract_first_word(&name, &word, ",", 0);
380 if (r < 0)
381 return r;
382 if (r == 0)
383 break;
384
69ce73d1 385 for (i = 0; i < ELEMENTSOF(device_found_map); i++)
75d0aba4
YW
386 if (streq(word, device_found_map[i].name)) {
387 f = device_found_map[i].flag;
388 break;
389 }
390
391 if (f == 0)
392 return -EINVAL;
393
394 flags |= f;
395 }
396
397 *ret = flags;
398 return 0;
399}
400
f6200941 401static int device_serialize(Unit *u, FILE *f, FDSet *fds) {
e9fa1bf7 402 Device *d = ASSERT_PTR(DEVICE(u));
75d0aba4 403 _cleanup_free_ char *s = NULL;
f6200941 404
f6200941
LP
405 assert(f);
406 assert(fds);
407
1ea74fca
YW
408 if (d->sysfs)
409 (void) serialize_item(f, "sysfs", d->sysfs);
410
367a2597
YW
411 if (d->path)
412 (void) serialize_item(f, "path", d->path);
413
d68c645b 414 (void) serialize_item(f, "state", device_state_to_string(d->state));
75d0aba4 415
43ba7d71 416 if (device_found_to_string_many(d->found, &s) >= 0)
d68c645b 417 (void) serialize_item(f, "found", s);
0108f6ec
DM
418
419 return 0;
f6200941
LP
420}
421
422static int device_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
e9fa1bf7 423 Device *d = ASSERT_PTR(DEVICE(u));
75d0aba4 424 int r;
f6200941 425
f6200941
LP
426 assert(key);
427 assert(value);
428 assert(fds);
429
1ea74fca
YW
430 if (streq(key, "sysfs")) {
431 if (!d->deserialized_sysfs) {
432 d->deserialized_sysfs = strdup(value);
433 if (!d->deserialized_sysfs)
434 log_oom_debug();
435 }
436
437 } else if (streq(key, "path")) {
367a2597
YW
438 if (!d->path) {
439 d->path = strdup(value);
440 if (!d->path)
441 log_oom_debug();
442 }
443
444 } else if (streq(key, "state")) {
f6200941
LP
445 DeviceState state;
446
447 state = device_state_from_string(value);
448 if (state < 0)
8bb2c8c9 449 log_unit_debug(u, "Failed to parse state value, ignoring: %s", value);
f6200941
LP
450 else
451 d->deserialized_state = state;
918e6f1c
FB
452
453 } else if (streq(key, "found")) {
66f3fdbb 454 r = device_found_from_string_many(value, &d->deserialized_found);
75d0aba4 455 if (r < 0)
5e1ee764 456 log_unit_debug_errno(u, r, "Failed to parse found value '%s', ignoring: %m", value);
918e6f1c 457
f6200941 458 } else
f2341e0a 459 log_unit_debug(u, "Unknown serialization key: %s", key);
f6200941
LP
460
461 return 0;
462}
463
f50e0a01 464static void device_dump(Unit *u, FILE *f, const char *prefix) {
e9fa1bf7 465 Device *d = ASSERT_PTR(DEVICE(u));
4d86c235 466 _cleanup_free_ char *s = NULL;
5cb5a6ff 467
e9fa1bf7
MY
468 assert(f);
469 assert(prefix);
5cb5a6ff 470
4d86c235
ZJS
471 (void) device_found_to_string_many(d->found, &s);
472
5cb5a6ff 473 fprintf(f,
25ac040b 474 "%sDevice State: %s\n"
367a2597 475 "%sDevice Path: %s\n"
4d86c235
ZJS
476 "%sSysfs Path: %s\n"
477 "%sFound: %s\n",
a16e1123 478 prefix, device_state_to_string(d->state),
367a2597 479 prefix, strna(d->path),
4d86c235
ZJS
480 prefix, strna(d->sysfs),
481 prefix, strna(s));
88116909 482
de010b0b
YW
483 STRV_FOREACH(i, d->wants_property)
484 fprintf(f, "%sudev SYSTEMD_WANTS: %s\n",
485 prefix, *i);
f50e0a01
LP
486}
487
d1e8e8b5 488static UnitActiveState device_active_state(Unit *u) {
e9fa1bf7 489 Device *d = ASSERT_PTR(DEVICE(u));
f50e0a01 490
e9fa1bf7 491 return state_translation_table[d->state];
25ac040b
LP
492}
493
d1e8e8b5 494static const char *device_sub_state_to_string(Unit *u) {
e9fa1bf7 495 Device *d = ASSERT_PTR(DEVICE(u));
10a94420 496
e9fa1bf7 497 return device_state_to_string(d->state);
10a94420
LP
498}
499
4366e598 500static int device_update_description(Unit *u, sd_device *dev, const char *path) {
1d4c6f5b
ZJS
501 _cleanup_free_ char *j = NULL;
502 const char *model, *label, *desc;
628c89cc 503 int r;
965e5c5d
LP
504
505 assert(u);
965e5c5d
LP
506 assert(path);
507
1d4c6f5b
ZJS
508 desc = path;
509
3cc7a9fd 510 if (dev && device_get_model_string(dev, &model) >= 0) {
1d4c6f5b 511 desc = model;
965e5c5d
LP
512
513 /* Try to concatenate the device model string with a label, if there is one */
4366e598
YW
514 if (sd_device_get_property_value(dev, "ID_FS_LABEL", &label) >= 0 ||
515 sd_device_get_property_value(dev, "ID_PART_ENTRY_NAME", &label) >= 0 ||
516 sd_device_get_property_value(dev, "ID_PART_ENTRY_NUMBER", &label) >= 0) {
965e5c5d 517
1d4c6f5b 518 desc = j = strjoin(model, " ", label);
ea8ec43b
LP
519 if (!j)
520 return log_oom();
1d4c6f5b
ZJS
521 }
522 }
ea8ec43b 523
1d4c6f5b 524 r = unit_set_description(u, desc);
628c89cc 525 if (r < 0)
ea8ec43b 526 return log_unit_error_errno(u, r, "Failed to set device description: %m");
965e5c5d 527
ea8ec43b 528 return 0;
965e5c5d
LP
529}
530
4366e598 531static int device_add_udev_wants(Unit *u, sd_device *dev) {
e9fa1bf7 532 Device *d = ASSERT_PTR(DEVICE(u));
88116909 533 _cleanup_strv_free_ char **added = NULL;
de040543 534 const char *wants, *property;
965e5c5d
LP
535 int r;
536
965e5c5d
LP
537 assert(dev);
538
463d0d15 539 property = MANAGER_IS_USER(u->manager) ? "SYSTEMD_USER_WANTS" : "SYSTEMD_WANTS";
de040543 540
4366e598
YW
541 r = sd_device_get_property_value(dev, property, &wants);
542 if (r < 0)
de040543
LP
543 return 0;
544
545 for (;;) {
ceed8f0c 546 _cleanup_free_ char *word = NULL, *k = NULL;
965e5c5d 547
4ec85141 548 r = extract_first_word(&wants, &word, NULL, EXTRACT_UNQUOTE);
ceed8f0c 549 if (r == 0)
88116909 550 break;
ceed8f0c
ZJS
551 if (r == -ENOMEM)
552 return log_oom();
553 if (r < 0)
dcebc9ba 554 return log_unit_error_errno(u, r, "Failed to parse property %s with value %s: %m", property, wants);
965e5c5d 555
88116909 556 if (unit_name_is_valid(word, UNIT_NAME_TEMPLATE) && d->sysfs) {
dcebc9ba
LP
557 _cleanup_free_ char *escaped = NULL;
558
559 /* If the unit name is specified as template, then automatically fill in the sysfs path of the
560 * device as instance name, properly escaped. */
561
88116909 562 r = unit_name_path_escape(d->sysfs, &escaped);
dcebc9ba 563 if (r < 0)
88116909 564 return log_unit_error_errno(u, r, "Failed to escape %s: %m", d->sysfs);
dcebc9ba
LP
565
566 r = unit_name_replace_instance(word, escaped, &k);
567 if (r < 0)
568 return log_unit_error_errno(u, r, "Failed to build %s instance of template %s: %m", escaped, word);
569 } else {
570 /* If this is not a template, then let's mangle it so, that it becomes a valid unit name. */
571
37cbc1d5 572 r = unit_name_mangle(word, UNIT_NAME_MANGLE_WARN, &k);
dcebc9ba
LP
573 if (r < 0)
574 return log_unit_error_errno(u, r, "Failed to mangle unit name \"%s\": %m", word);
575 }
965e5c5d 576
35d8c19a 577 r = unit_add_dependency_by_name(u, UNIT_WANTS, k, true, UNIT_DEPENDENCY_UDEV);
965e5c5d 578 if (r < 0)
de040543 579 return log_unit_error_errno(u, r, "Failed to add Wants= dependency: %m");
88116909 580
47e72170 581 r = strv_consume(&added, TAKE_PTR(k));
88116909
LP
582 if (r < 0)
583 return log_oom();
965e5c5d 584 }
88116909 585
de010b0b 586 if (d->state != DEVICE_DEAD)
88116909
LP
587 /* So here's a special hack, to compensate for the fact that the udev database's reload cycles are not
588 * synchronized with our own reload cycles: when we detect that the SYSTEMD_WANTS property of a device
033fe650
YW
589 * changes while the device unit is already up, let's skip to trigger units that were already listed
590 * and are active, and start units otherwise. This typically happens during the boot-time switch root
591 * transition, as udev devices will generally already be up in the initrd, but SYSTEMD_WANTS properties
592 * get then added through udev rules only available on the host system, and thus only when the initial
593 * udev coldplug trigger runs.
88116909
LP
594 *
595 * We do this only if the device has been up already when we parse this, as otherwise the usual
596 * dependency logic that is run from the dead → plugged transition will trigger these deps. */
88116909
LP
597 STRV_FOREACH(i, added) {
598 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
599
033fe650
YW
600 if (strv_contains(d->wants_property, *i)) {
601 Unit *v;
602
603 v = manager_get_unit(u->manager, *i);
604 if (v && UNIT_IS_ACTIVE_OR_RELOADING(unit_active_state(v)))
605 continue; /* The unit was already listed and is running. */
606 }
88116909 607
50cbaba4 608 r = manager_add_job_by_name(u->manager, JOB_START, *i, JOB_FAIL, NULL, &error, NULL);
88116909 609 if (r < 0)
b4e2fcb6
YW
610 log_unit_full_errno(u, sd_bus_error_has_name(&error, BUS_ERROR_NO_SUCH_UNIT) ? LOG_DEBUG : LOG_WARNING, r,
611 "Failed to enqueue %s job, ignoring: %s", property, bus_error_message(&error, r));
88116909 612 }
88116909 613
8cc53fae 614 return strv_free_and_replace(d->wants_property, added);
965e5c5d
LP
615}
616
4366e598 617static bool device_is_bound_by_mounts(Device *d, sd_device *dev) {
40b1a32c 618 int r;
ebc8968b
FB
619
620 assert(d);
621 assert(dev);
622
4212fa83
YW
623 r = device_get_property_bool(dev, "SYSTEMD_MOUNT_DEVICE_BOUND");
624 if (r < 0 && r != -ENOENT)
625 log_device_warning_errno(dev, r, "Failed to parse SYSTEMD_MOUNT_DEVICE_BOUND= udev property, ignoring: %m");
ebc8968b 626
4212fa83 627 d->bind_mounts = r > 0;
40b1a32c
LP
628
629 return d->bind_mounts;
ebc8968b
FB
630}
631
86cdffd1 632static void device_upgrade_mount_deps(Unit *u) {
ebc8968b 633 Unit *other;
eef85c4a 634 void *v;
ebc8968b
FB
635 int r;
636
eef85c4a
LP
637 /* Let's upgrade Requires= to BindsTo= on us. (Used when SYSTEMD_MOUNT_DEVICE_BOUND is set) */
638
e9fa1bf7
MY
639 assert(u);
640
15ed3c3a 641 HASHMAP_FOREACH_KEY(v, other, unit_get_dependencies(u, UNIT_REQUIRED_BY)) {
ebc8968b
FB
642 if (other->type != UNIT_MOUNT)
643 continue;
644
eef85c4a 645 r = unit_add_dependency(other, UNIT_BINDS_TO, u, true, UNIT_DEPENDENCY_UDEV);
ebc8968b 646 if (r < 0)
86cdffd1 647 log_unit_warning_errno(u, r, "Failed to add BindsTo= dependency between device and mount unit, ignoring: %m");
ebc8968b 648 }
ebc8968b
FB
649}
650
4228306b 651static int device_setup_unit(Manager *m, sd_device *dev, const char *path, bool main, Set **units) {
dd309fcd 652 _cleanup_(unit_freep) Unit *new_unit = NULL;
628c89cc 653 _cleanup_free_ char *e = NULL;
2005219f 654 const char *sysfs = NULL;
dd309fcd 655 Unit *u;
965e5c5d 656 int r;
25ac040b
LP
657
658 assert(m);
965e5c5d 659 assert(path);
25ac040b 660
2005219f 661 if (dev) {
4366e598 662 r = sd_device_get_syspath(dev, &sysfs);
9951c8df
LP
663 if (r < 0)
664 return log_device_debug_errno(dev, r, "Couldn't get syspath from device, ignoring: %m");
2005219f 665 }
7f275a9f 666
7410616c 667 r = unit_name_from_path(path, ".device", &e);
a7fb1f2e 668 if (r < 0)
ad172d19 669 return log_struct_errno(
a7fb1f2e 670 LOG_WARNING, r,
ad172d19
LP
671 "MESSAGE_ID=" SD_MESSAGE_DEVICE_PATH_NOT_SUITABLE_STR,
672 "DEVICE=%s", path,
92663a5e
ZJS
673 LOG_MESSAGE("Failed to generate valid unit name from device path '%s', ignoring device: %m",
674 path));
628c89cc
LP
675
676 u = manager_get_unit(m, e);
38b9b72e 677 if (u) {
66f3fdbb
LP
678 /* The device unit can still be present even if the device was unplugged: a mount unit can reference it
679 * hence preventing the GC to have garbaged it. That's desired since the device unit may have a
680 * dependency on the mount unit which was added during the loading of the later. When the device is
681 * plugged the sysfs might not be initialized yet, as we serialize the device's state but do not
682 * serialize the sysfs path across reloads/reexecs. Hence, when coming back from a reload/restart we
4a1a1caf
YW
683 * might have the state valid, but not the sysfs path. Also, there is another possibility; when multiple
684 * devices have the same devlink (e.g. /dev/disk/by-uuid/xxxx), adding/updating/removing one of the
0b75493d 685 * device causes syspath change. Hence, let's always update sysfs path. */
25ac040b 686
5238e957 687 /* Let's remove all dependencies generated due to udev properties. We'll re-add whatever is configured
38b9b72e
LP
688 * now below. */
689 unit_remove_dependencies(u, UNIT_DEPENDENCY_UDEV);
dd309fcd 690
38b9b72e 691 } else {
dd309fcd
YW
692 r = unit_new_for_name(m, sizeof(Device), e, &new_unit);
693 if (r < 0)
694 return log_device_error_errno(dev, r, "Failed to allocate device unit %s: %m", e);
aab14b13 695
dd309fcd 696 u = new_unit;
25ac040b 697
ee6cb288 698 unit_add_to_load_queue(u);
38b9b72e 699 }
ee6cb288 700
e9fa1bf7
MY
701 Device *d = ASSERT_PTR(DEVICE(u));
702
703 if (!d->path) {
704 d->path = strdup(path);
705 if (!d->path)
367a2597
YW
706 return log_oom();
707 }
708
66f3fdbb 709 /* If this was created via some dependency and has not actually been seen yet ->sysfs will not be
ee6cb288 710 * initialized. Hence initialize it if necessary. */
2005219f 711 if (sysfs) {
e9fa1bf7 712 r = device_set_sysfs(d, sysfs);
dd309fcd
YW
713 if (r < 0)
714 return log_unit_error_errno(u, r, "Failed to set sysfs path %s: %m", sysfs);
ee6cb288 715
66f3fdbb 716 /* The additional systemd udev properties we only interpret for the main object */
2005219f
MP
717 if (main)
718 (void) device_add_udev_wants(u, dev);
719 }
25ac040b 720
1d4c6f5b
ZJS
721 (void) device_update_description(u, dev, path);
722
75a50eb0
LP
723 /* So the user wants the mount units to be bound to the device but a mount unit might has been seen
724 * by systemd before the device appears on its radar. In this case the device unit is partially
725 * initialized and includes the deps on the mount unit but at that time the "bind mounts" flag wasn't
726 * present. Fix this up now. */
e9fa1bf7 727 if (dev && device_is_bound_by_mounts(d, dev))
ebc8968b 728 device_upgrade_mount_deps(u);
f94ea366 729
4228306b 730 if (units) {
e9fa1bf7 731 r = set_ensure_put(units, NULL, d);
4228306b
YW
732 if (r < 0)
733 return log_unit_error_errno(u, r, "Failed to store unit: %m");
734 }
735
dd309fcd 736 TAKE_PTR(new_unit);
25ac040b 737 return 0;
25ac040b
LP
738}
739
dce2d35c
YW
740static bool device_is_ready(sd_device *dev) {
741 int r;
742
743 assert(dev);
744
1cb89339
YW
745 if (device_for_action(dev, SD_DEVICE_REMOVE))
746 return false;
747
dce2d35c
YW
748 r = device_is_renaming(dev);
749 if (r < 0)
750 log_device_warning_errno(dev, r, "Failed to check if device is renaming, assuming device is not renaming: %m");
751 if (r > 0) {
752 log_device_debug(dev, "Device busy: device is renaming");
753 return false;
754 }
755
756 /* Is it really tagged as 'systemd' right now? */
757 r = sd_device_has_current_tag(dev, "systemd");
758 if (r < 0)
759 log_device_warning_errno(dev, r, "Failed to check if device has \"systemd\" tag, assuming device is not tagged with \"systemd\": %m");
760 if (r == 0)
761 log_device_debug(dev, "Device busy: device is not tagged with \"systemd\"");
762 if (r <= 0)
763 return false;
764
765 r = device_get_property_bool(dev, "SYSTEMD_READY");
766 if (r < 0 && r != -ENOENT)
767 log_device_warning_errno(dev, r, "Failed to get device SYSTEMD_READY property, assuming device does not have \"SYSTEMD_READY\" property: %m");
768 if (r == 0)
769 log_device_debug(dev, "Device busy: SYSTEMD_READY property from device is false");
770
771 return r != 0;
772}
773
4228306b 774static int device_setup_devlink_unit_one(Manager *m, const char *devlink, Set **ready_units, Set **not_ready_units) {
4a1a1caf 775 _cleanup_(sd_device_unrefp) sd_device *dev = NULL;
4228306b 776 Unit *u;
4a1a1caf
YW
777
778 assert(m);
779 assert(devlink);
4228306b
YW
780 assert(ready_units);
781 assert(not_ready_units);
4a1a1caf 782
4228306b
YW
783 if (sd_device_new_from_devname(&dev, devlink) >= 0 && device_is_ready(dev))
784 return device_setup_unit(m, dev, devlink, /* main = */ false, ready_units);
4a1a1caf 785
4228306b
YW
786 /* the devlink is already removed or not ready */
787 if (device_by_path(m, devlink, &u) < 0)
788 return 0; /* The corresponding .device unit not found. That's fine. */
4a1a1caf 789
4228306b 790 return set_ensure_put(not_ready_units, NULL, DEVICE(u));
4a1a1caf
YW
791}
792
4228306b
YW
793static int device_setup_extra_units(Manager *m, sd_device *dev, Set **ready_units, Set **not_ready_units) {
794 _cleanup_strv_free_ char **aliases = NULL;
a1af8372 795 const char *syspath, *devname = NULL;
4228306b 796 Device *l;
4a1a1caf
YW
797 int r;
798
799 assert(m);
800 assert(dev);
4228306b
YW
801 assert(ready_units);
802 assert(not_ready_units);
4a1a1caf
YW
803
804 r = sd_device_get_syspath(dev, &syspath);
805 if (r < 0)
806 return r;
807
4228306b 808 (void) sd_device_get_devname(dev, &devname);
4a1a1caf 809
4228306b
YW
810 /* devlink units */
811 FOREACH_DEVICE_DEVLINK(dev, devlink) {
812 /* These are a kind of special devlink. They should be always unique, but neither persistent
813 * nor predictable. Hence, let's refuse them. See also the comments for alias units below. */
4a1a1caf
YW
814 if (PATH_STARTSWITH_SET(devlink, "/dev/block/", "/dev/char/"))
815 continue;
816
4228306b
YW
817 (void) device_setup_devlink_unit_one(m, devlink, ready_units, not_ready_units);
818 }
4a1a1caf 819
4228306b
YW
820 if (device_is_ready(dev)) {
821 const char *s;
4a1a1caf 822
4228306b
YW
823 r = sd_device_get_property_value(dev, "SYSTEMD_ALIAS", &s);
824 if (r < 0 && r != -ENOENT)
825 log_device_warning_errno(dev, r, "Failed to get SYSTEMD_ALIAS property, ignoring: %m");
826 if (r >= 0) {
827 r = strv_split_full(&aliases, s, NULL, EXTRACT_UNQUOTE);
828 if (r < 0)
829 log_device_warning_errno(dev, r, "Failed to parse SYSTEMD_ALIAS property, ignoring: %m");
830 }
4a1a1caf
YW
831 }
832
4228306b
YW
833 /* alias units */
834 STRV_FOREACH(alias, aliases) {
835 if (!path_is_absolute(*alias)) {
836 log_device_warning(dev, "The alias \"%s\" specified in SYSTEMD_ALIAS is not an absolute path, ignoring.", *alias);
837 continue;
838 }
4a1a1caf 839
c352110a
YW
840 if (!path_is_safe(*alias)) {
841 log_device_warning(dev, "The alias \"%s\" specified in SYSTEMD_ALIAS is not safe, ignoring.", *alias);
4228306b
YW
842 continue;
843 }
4a1a1caf 844
4228306b
YW
845 /* Note, even if the devlink is not persistent, LVM expects /dev/block/ symlink units exist.
846 * To achieve that, they set the path to SYSTEMD_ALIAS. Hence, we cannot refuse aliases start
847 * with /dev/, unfortunately. */
4a1a1caf 848
4228306b
YW
849 (void) device_setup_unit(m, dev, *alias, /* main = */ false, ready_units);
850 }
4a1a1caf
YW
851
852 l = hashmap_get(m->devices_by_sysfs, syspath);
853 LIST_FOREACH(same_sysfs, d, l) {
4a1a1caf
YW
854 if (!d->path)
855 continue;
856
4228306b
YW
857 if (path_equal(d->path, syspath))
858 continue; /* This is the main unit. */
4a1a1caf 859
4228306b
YW
860 if (devname && path_equal(d->path, devname))
861 continue; /* This is the real device node. */
4a1a1caf 862
4228306b
YW
863 if (device_has_devlink(dev, d->path))
864 continue; /* The devlink was already processed in the above loop. */
4a1a1caf 865
4228306b
YW
866 if (strv_contains(aliases, d->path))
867 continue; /* This is already processed in the above, and ready. */
4a1a1caf 868
4228306b
YW
869 if (path_startswith(d->path, "/dev/"))
870 /* This is a devlink unit. Check existence and update syspath. */
871 (void) device_setup_devlink_unit_one(m, d->path, ready_units, not_ready_units);
872 else
873 /* This is an alias unit of dropped or not ready device. */
874 (void) set_ensure_put(not_ready_units, NULL, d);
4a1a1caf
YW
875 }
876
4a1a1caf
YW
877 return 0;
878}
879
4228306b
YW
880static int device_setup_units(Manager *m, sd_device *dev, Set **ready_units, Set **not_ready_units) {
881 const char *syspath, *devname = NULL;
003ac9d0 882 int r;
8fe914ec
LP
883
884 assert(m);
1363eeca 885 assert(dev);
4228306b
YW
886 assert(ready_units);
887 assert(not_ready_units);
8fe914ec 888
4228306b
YW
889 r = sd_device_get_syspath(dev, &syspath);
890 if (r < 0)
891 return log_device_debug_errno(dev, r, "Couldn't get syspath from device, ignoring: %m");
8fe914ec 892
4228306b
YW
893 /* First, process the main (that is, points to the syspath) and (real, not symlink) devnode units. */
894 if (device_for_action(dev, SD_DEVICE_REMOVE))
30fd9a2d 895 /* If the device is removed, the main and devnode units will be removed by
4228306b
YW
896 * device_update_found_by_sysfs() in device_dispatch_io(). Hence, it is not necessary to
897 * store them to not_ready_units, and we have nothing to do here.
898 *
899 * Note, still we need to process devlink units below, as a devlink previously points to this
900 * device may still exist and now point to another device node. That is, do not forget to
901 * call device_setup_extra_units(). */
902 ;
903 else if (device_is_ready(dev)) {
904 /* Add the main unit named after the syspath. If this one fails, don't bother with the rest,
905 * as this one shall be the main device unit the others just follow. (Compare with how
906 * device_following() is implemented, see below, which looks for the sysfs device.) */
907 r = device_setup_unit(m, dev, syspath, /* main = */ true, ready_units);
908 if (r < 0)
909 return r;
8fe914ec 910
4228306b
YW
911 /* Add an additional unit for the device node */
912 if (sd_device_get_devname(dev, &devname) >= 0)
913 (void) device_setup_unit(m, dev, devname, /* main = */ false, ready_units);
4366e598 914
4228306b
YW
915 } else {
916 Unit *u;
8fe914ec 917
4228306b 918 /* If the device exists but not ready, then save the units and unset udev bits later. */
f1421cc6 919
4228306b
YW
920 if (device_by_path(m, syspath, &u) >= 0) {
921 r = set_ensure_put(not_ready_units, NULL, DEVICE(u));
922 if (r < 0)
923 log_unit_debug_errno(u, r, "Failed to store unit, ignoring: %m");
924 }
925
926 if (sd_device_get_devname(dev, &devname) >= 0 &&
927 device_by_path(m, devname, &u) >= 0) {
928 r = set_ensure_put(not_ready_units, NULL, DEVICE(u));
929 if (r < 0)
930 log_unit_debug_errno(u, r, "Failed to store unit, ignoring: %m");
931 }
8fe914ec 932 }
4228306b
YW
933
934 /* Next, add/update additional .device units point to aliases and symlinks. */
935 (void) device_setup_extra_units(m, dev, ready_units, not_ready_units);
a4cb8afb
YW
936
937 /* Safety check: no unit should be in ready_units and not_ready_units simultaneously. */
938 Unit *u;
939 SET_FOREACH(u, *not_ready_units)
940 if (set_remove(*ready_units, u))
3b51a183 941 log_unit_error(u, "Cannot activate and deactivate the unit simultaneously. Deactivating.");
a4cb8afb 942
4228306b 943 return 0;
8fe914ec
LP
944}
945
a7f241db 946static Unit *device_following(Unit *u) {
e9fa1bf7 947 Device *d = ASSERT_PTR(DEVICE(u)), *first = NULL;
a7f241db 948
ac155bb8 949 if (startswith(u->id, "sys-"))
a7f241db
LP
950 return NULL;
951
952 /* Make everybody follow the unit that's named after the sysfs path */
bd335c96 953 LIST_FOREACH(same_sysfs, other, d->same_sysfs_next)
1124fe6f 954 if (startswith(UNIT(other)->id, "sys-"))
a7f241db
LP
955 return UNIT(other);
956
bd335c96 957 LIST_FOREACH_BACKWARDS(same_sysfs, other, d->same_sysfs_prev) {
1124fe6f 958 if (startswith(UNIT(other)->id, "sys-"))
a7f241db
LP
959 return UNIT(other);
960
961 first = other;
962 }
963
964 return UNIT(first);
965}
966
e9fa1bf7
MY
967static int device_following_set(Unit *u, Set **ret) {
968 Device *d = ASSERT_PTR(DEVICE(u));
af4fa99d 969 _cleanup_set_free_ Set *set = NULL;
6210e7fc
LP
970 int r;
971
e9fa1bf7 972 assert(ret);
6210e7fc 973
f1421cc6 974 if (LIST_JUST_US(same_sysfs, d)) {
e9fa1bf7 975 *ret = NULL;
6210e7fc
LP
976 return 0;
977 }
978
d5099efc 979 set = set_new(NULL);
f1421cc6 980 if (!set)
6210e7fc
LP
981 return -ENOMEM;
982
bd335c96 983 LIST_FOREACH(same_sysfs, other, d->same_sysfs_next) {
f1421cc6
LP
984 r = set_put(set, other);
985 if (r < 0)
95f14a3e 986 return r;
f1421cc6 987 }
6210e7fc 988
bd335c96 989 LIST_FOREACH_BACKWARDS(same_sysfs, other, d->same_sysfs_prev) {
f1421cc6
LP
990 r = set_put(set, other);
991 if (r < 0)
95f14a3e 992 return r;
f1421cc6 993 }
6210e7fc 994
e9fa1bf7 995 *ret = TAKE_PTR(set);
6210e7fc 996 return 1;
6210e7fc
LP
997}
998
25ac040b
LP
999static void device_shutdown(Manager *m) {
1000 assert(m);
1001
d0955f00 1002 m->device_monitor = sd_device_monitor_unref(m->device_monitor);
525d3cc7 1003 m->devices_by_sysfs = hashmap_free(m->devices_by_sysfs);
25ac040b
LP
1004}
1005
ba64af90 1006static void device_enumerate(Manager *m) {
4366e598 1007 _cleanup_(sd_device_enumerator_unrefp) sd_device_enumerator *e = NULL;
718db961 1008 int r;
25ac040b
LP
1009
1010 assert(m);
1011
d0955f00
YW
1012 if (!m->device_monitor) {
1013 r = sd_device_monitor_new(&m->device_monitor);
1014 if (r < 0) {
1015 log_error_errno(r, "Failed to allocate device monitor: %m");
a16e1123
LP
1016 goto fail;
1017 }
f94ea366 1018
d0955f00 1019 r = sd_device_monitor_filter_add_match_tag(m->device_monitor, "systemd");
ba64af90
LP
1020 if (r < 0) {
1021 log_error_errno(r, "Failed to add udev tag match: %m");
e1ce2c27 1022 goto fail;
ba64af90 1023 }
e1ce2c27 1024
deb2b734 1025 r = sd_device_monitor_attach_event(m->device_monitor, m->event);
ba64af90 1026 if (r < 0) {
d0955f00 1027 log_error_errno(r, "Failed to attach event to device monitor: %m");
a16e1123 1028 goto fail;
ba64af90 1029 }
f94ea366 1030
deb2b734 1031 r = sd_device_monitor_start(m->device_monitor, device_dispatch_io, m);
ba64af90 1032 if (r < 0) {
d0955f00 1033 log_error_errno(r, "Failed to start device monitor: %m");
718db961 1034 goto fail;
ba64af90 1035 }
a16e1123 1036 }
f94ea366 1037
4366e598 1038 r = sd_device_enumerator_new(&e);
ba64af90 1039 if (r < 0) {
9b674e25 1040 log_error_errno(r, "Failed to allocate device enumerator: %m");
e1ce2c27 1041 goto fail;
ba64af90 1042 }
25ac040b 1043
4366e598 1044 r = sd_device_enumerator_add_match_tag(e, "systemd");
ba64af90 1045 if (r < 0) {
4366e598 1046 log_error_errno(r, "Failed to set tag for device enumeration: %m");
e1202047 1047 goto fail;
ba64af90 1048 }
e1202047 1049
8437c059 1050 FOREACH_DEVICE(e, dev) {
4228306b
YW
1051 _cleanup_set_free_ Set *ready_units = NULL, *not_ready_units = NULL;
1052 Device *d;
628c89cc 1053
405be62f
YW
1054 if (device_is_processed(dev) <= 0)
1055 continue;
1056
4228306b 1057 if (device_setup_units(m, dev, &ready_units, &not_ready_units) < 0)
4366e598 1058 continue;
4a1a1caf 1059
4228306b
YW
1060 SET_FOREACH(d, ready_units)
1061 device_update_found_one(d, DEVICE_FOUND_UDEV, DEVICE_FOUND_UDEV);
1062 SET_FOREACH(d, not_ready_units)
1063 device_update_found_one(d, DEVICE_NOT_FOUND, DEVICE_FOUND_UDEV);
628c89cc 1064 }
25ac040b 1065
ba64af90 1066 return;
25ac040b
LP
1067
1068fail:
25ac040b 1069 device_shutdown(m);
5cb5a6ff
LP
1070}
1071
9616f550
YW
1072static void device_propagate_reload(Manager *m, Device *d) {
1073 int r;
1074
1075 assert(m);
1076 assert(d);
1077
1078 if (d->state == DEVICE_DEAD)
1079 return;
1080
1081 r = manager_propagate_reload(m, UNIT(d), JOB_REPLACE, NULL);
1082 if (r < 0)
1083 log_unit_warning_errno(UNIT(d), r, "Failed to propagate reload, ignoring: %m");
1084}
1085
c8ad151a 1086static void device_remove_old_on_move(Manager *m, sd_device *dev) {
42ebcebf 1087 _cleanup_free_ char *syspath_old = NULL;
87bc687a
YW
1088 const char *devpath_old;
1089 int r;
1090
42ebcebf
YW
1091 assert(m);
1092 assert(dev);
1093
87bc687a 1094 r = sd_device_get_property_value(dev, "DEVPATH_OLD", &devpath_old);
c8ad151a
LP
1095 if (r < 0)
1096 return (void) log_device_debug_errno(dev, r, "Failed to get DEVPATH_OLD= property on 'move' uevent, ignoring: %m");
87bc687a
YW
1097
1098 syspath_old = path_join("/sys", devpath_old);
1099 if (!syspath_old)
c8ad151a 1100 return (void) log_oom();
87bc687a 1101
b1ba0ce8 1102 device_update_found_by_sysfs(m, syspath_old, DEVICE_NOT_FOUND, DEVICE_FOUND_MASK);
87bc687a
YW
1103}
1104
d0955f00 1105static int device_dispatch_io(sd_device_monitor *monitor, sd_device *dev, void *userdata) {
4228306b 1106 _cleanup_set_free_ Set *ready_units = NULL, *not_ready_units = NULL;
1363eeca 1107 Manager *m = ASSERT_PTR(userdata);
a1130022 1108 sd_device_action_t action;
a7395c86 1109 const char *sysfs;
4a1a1caf 1110 bool ready;
4228306b 1111 Device *d;
718db961 1112 int r;
f94ea366 1113
d0955f00 1114 assert(dev);
f94ea366 1115
6cc4da5e
DDM
1116 log_device_uevent(dev, "Processing udev action");
1117
4366e598
YW
1118 r = sd_device_get_syspath(dev, &sysfs);
1119 if (r < 0) {
58b0a3e5 1120 log_device_warning_errno(dev, r, "Failed to get device syspath, ignoring: %m");
628c89cc
LP
1121 return 0;
1122 }
1123
a1130022 1124 r = sd_device_get_action(dev, &action);
4366e598 1125 if (r < 0) {
58b0a3e5 1126 log_device_warning_errno(dev, r, "Failed to get udev action, ignoring: %m");
718db961 1127 return 0;
f94ea366
LP
1128 }
1129
dc53421d
LP
1130 log_device_debug(dev, "Got '%s' action on syspath '%s'.", device_action_to_string(action), sysfs);
1131
a1130022 1132 if (action == SD_DEVICE_MOVE)
c8ad151a 1133 device_remove_old_on_move(m, dev);
87bc687a 1134
e9336d6a
YW
1135 /* When udevd failed to process the device, SYSTEMD_ALIAS or any other properties may contain invalid
1136 * values. Let's refuse to handle the uevent. */
1137 if (sd_device_get_property_value(dev, "UDEV_WORKER_FAILED", NULL) >= 0) {
1138 int v;
1139
1140 if (device_get_property_int(dev, "UDEV_WORKER_ERRNO", &v) >= 0)
1141 log_device_warning_errno(dev, v, "systemd-udevd failed to process the device, ignoring: %m");
1142 else if (device_get_property_int(dev, "UDEV_WORKER_EXIT_STATUS", &v) >= 0)
1143 log_device_warning(dev, "systemd-udevd failed to process the device with exit status %i, ignoring.", v);
1144 else if (device_get_property_int(dev, "UDEV_WORKER_SIGNAL", &v) >= 0) {
1145 const char *s;
1146 (void) sd_device_get_property_value(dev, "UDEV_WORKER_SIGNAL_NAME", &s);
1147 log_device_warning(dev, "systemd-udevd failed to process the device with signal %i(%s), ignoring.", v, strna(s));
1148 } else
1149 log_device_warning(dev, "systemd-udevd failed to process the device with unknown result, ignoring.");
1150
1151 return 0;
1152 }
1153
ae6ad21e
LP
1154 /* A change event can signal that a device is becoming ready, in particular if the device is using
1155 * the SYSTEMD_READY logic in udev so we need to reach the else block of the following if, even for
1156 * change events */
1cb89339
YW
1157 ready = device_is_ready(dev);
1158
4228306b
YW
1159 (void) device_setup_units(m, dev, &ready_units, &not_ready_units);
1160
a1130022 1161 if (action == SD_DEVICE_REMOVE) {
628c89cc 1162 r = swap_process_device_remove(m, dev);
9670d583 1163 if (r < 0)
71f79b56 1164 log_device_warning_errno(dev, r, "Failed to process swap device remove event, ignoring: %m");
4228306b
YW
1165 } else if (ready) {
1166 r = swap_process_device_new(m, dev);
1167 if (r < 0)
1168 log_device_warning_errno(dev, r, "Failed to process swap device new event, ignoring: %m");
4a1a1caf
YW
1169 }
1170
4228306b
YW
1171 if (!IN_SET(action, SD_DEVICE_ADD, SD_DEVICE_REMOVE, SD_DEVICE_MOVE))
1172 SET_FOREACH(d, ready_units)
1173 device_propagate_reload(m, d);
4a1a1caf 1174
4228306b 1175 if (!set_isempty(ready_units))
f1421cc6
LP
1176 manager_dispatch_load_queue(m);
1177
4a1a1caf
YW
1178 if (action == SD_DEVICE_REMOVE)
1179 /* If we get notified that a device was removed by udev, then it's completely gone, hence
4228306b
YW
1180 * unset all found bits. Note this affects all .device units still point to the removed
1181 * device. */
ef9ca572 1182 device_update_found_by_sysfs(m, sysfs, DEVICE_NOT_FOUND, DEVICE_FOUND_MASK);
f94ea366 1183
4228306b
YW
1184 /* These devices are found and ready now, set the udev found bit. Note, this is also necessary to do
1185 * on remove uevent, as some devlinks may be updated and now point to other device nodes. */
1186 SET_FOREACH(d, ready_units)
1187 device_update_found_one(d, DEVICE_FOUND_UDEV, DEVICE_FOUND_UDEV);
1188
1189 /* These devices may be nominally around, but not ready for us. Hence unset the udev bit, but leave
1190 * the rest around. This may be redundant for remove uevent, but should be harmless. */
1191 SET_FOREACH(d, not_ready_units)
1192 device_update_found_one(d, DEVICE_NOT_FOUND, DEVICE_FOUND_UDEV);
4a1a1caf 1193
718db961 1194 return 0;
f94ea366
LP
1195}
1196
e9222bfc 1197void device_found_node(Manager *m, const char *node, DeviceFound found, DeviceFound mask) {
e5ca27b7 1198 int r;
628c89cc
LP
1199
1200 assert(m);
1201 assert(node);
03a94b73 1202 assert(!FLAGS_SET(mask, DEVICE_FOUND_UDEV));
628c89cc 1203
f374631a 1204 if (!udev_available())
485ae697 1205 return;
4c6d20de 1206
34c20ee0
LP
1207 if (mask == 0)
1208 return;
1209
1210 /* This is called whenever we find a device referenced in /proc/swaps or /proc/self/mounts. Such a device might
1211 * be mounted/enabled at a time where udev has not finished probing it yet, and we thus haven't learned about
66f3fdbb
LP
1212 * it yet. In this case we will set the device unit to "tentative" state.
1213 *
1214 * This takes a pair of DeviceFound flags parameters. The 'mask' parameter is a bit mask that indicates which
1215 * bits of 'found' to copy into the per-device DeviceFound flags field. Thus, this function may be used to set
1216 * and unset individual bits in a single call, while merging partially with previous state. */
628c89cc 1217
485ae697 1218 if ((found & mask) != 0) {
4366e598 1219 _cleanup_(sd_device_unrefp) sd_device *dev = NULL;
628c89cc 1220
34c20ee0
LP
1221 /* If the device is known in the kernel and newly appeared, then we'll create a device unit for it,
1222 * under the name referenced in /proc/swaps or /proc/self/mountinfo. But first, let's validate if
e9222bfc
DDM
1223 * everything is alright with the device node. Note that we're fine with missing device nodes,
1224 * but not with badly set up ones. */
1225
1226 r = sd_device_new_from_devname(&dev, node);
1227 if (r == -ENODEV)
1228 log_debug("Could not find device for %s, continuing without device node", node);
1229 else if (r < 0) {
1230 /* Reduce log noise from nodes which are not device nodes by skipping EINVAL. */
1231 if (r != -EINVAL)
1232 log_error_errno(r, "Failed to open %s device, ignoring: %m", node);
1233 return;
1234 }
628c89cc 1235
4228306b 1236 (void) device_setup_unit(m, dev, node, /* main = */ false, NULL); /* 'dev' may be NULL. */
628c89cc
LP
1237 }
1238
1239 /* Update the device unit's state, should it exist */
485ae697 1240 (void) device_update_found_by_name(m, node, found, mask);
628c89cc
LP
1241}
1242
ebc8968b 1243bool device_shall_be_bound_by(Unit *device, Unit *u) {
8bb2c8c9
LP
1244 assert(device);
1245 assert(u);
ebc8968b
FB
1246
1247 if (u->type != UNIT_MOUNT)
1248 return false;
1249
1250 return DEVICE(device)->bind_mounts;
1251}
1252
87f0e418 1253const UnitVTable device_vtable = {
7d17cfbc 1254 .object_size = sizeof(Device),
f975e971
LP
1255 .sections =
1256 "Unit\0"
1257 "Device\0"
1258 "Install\0",
5cb5a6ff 1259
c5a97ed1
LP
1260 .gc_jobs = true,
1261
faf919f1 1262 .init = device_init,
034c6ed7 1263 .done = device_done,
1d4c6f5b 1264 .load = device_load,
718db961 1265
f50e0a01 1266 .coldplug = device_coldplug,
66f3fdbb 1267 .catchup = device_catchup,
f50e0a01 1268
f6200941
LP
1269 .serialize = device_serialize,
1270 .deserialize_item = device_deserialize_item,
1271
5cb5a6ff
LP
1272 .dump = device_dump,
1273
f50e0a01 1274 .active_state = device_active_state,
10a94420 1275 .sub_state_to_string = device_sub_state_to_string,
25ac040b 1276
a7f241db 1277 .following = device_following,
6210e7fc 1278 .following_set = device_following_set,
a7f241db 1279
f50e0a01 1280 .enumerate = device_enumerate,
c6918296 1281 .shutdown = device_shutdown,
f374631a 1282 .supported = udev_available,
c6918296
MS
1283
1284 .status_message_formats = {
1285 .starting_stopping = {
1286 [0] = "Expecting device %s...",
3f4a7a47 1287 [1] = "Waiting for device %s to disappear...",
c6918296
MS
1288 },
1289 .finished_start_job = {
1290 [JOB_DONE] = "Found device %s.",
1291 [JOB_TIMEOUT] = "Timed out waiting for device %s.",
1292 },
1293 },
5cb5a6ff 1294};