]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/core/path.c
tree-wide: use IN_SET where possible
[thirdparty/systemd.git] / src / core / path.c
CommitLineData
01f78473
LP
1/***
2 This file is part of systemd.
3
4 Copyright 2010 Lennart Poettering
5
6 systemd is free software; you can redistribute it and/or modify it
5430f7f2
LP
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
01f78473
LP
9 (at your option) any later version.
10
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
5430f7f2 14 Lesser General Public License for more details.
01f78473 15
5430f7f2 16 You should have received a copy of the GNU Lesser General Public License
01f78473
LP
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
18***/
19
01f78473 20#include <errno.h>
07630cea
LP
21#include <sys/epoll.h>
22#include <sys/inotify.h>
01f78473
LP
23#include <unistd.h>
24
07630cea
LP
25#include "bus-error.h"
26#include "bus-util.h"
01f78473 27#include "dbus-path.h"
3ffd4af2 28#include "fd-util.h"
77601719 29#include "fs-util.h"
7d50b32a 30#include "glob-util.h"
f8c16f42 31#include "macro.h"
07630cea 32#include "mkdir.h"
3ffd4af2 33#include "path.h"
07630cea 34#include "special.h"
8fcde012 35#include "stat-util.h"
8b43440b 36#include "string-table.h"
07630cea
LP
37#include "string-util.h"
38#include "unit-name.h"
39#include "unit.h"
01f78473
LP
40
41static const UnitActiveState state_translation_table[_PATH_STATE_MAX] = {
42 [PATH_DEAD] = UNIT_INACTIVE,
43 [PATH_WAITING] = UNIT_ACTIVE,
44 [PATH_RUNNING] = UNIT_ACTIVE,
fdf20a31 45 [PATH_FAILED] = UNIT_FAILED
01f78473
LP
46};
47
718db961
LP
48static int path_dispatch_io(sd_event_source *source, int fd, uint32_t revents, void *userdata);
49
50int path_spec_watch(PathSpec *s, sd_event_io_handler_t handler) {
57020a3a 51
4b562198
MS
52 static const int flags_table[_PATH_TYPE_MAX] = {
53 [PATH_EXISTS] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB,
54 [PATH_EXISTS_GLOB] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB,
55 [PATH_CHANGED] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB|IN_CLOSE_WRITE|IN_CREATE|IN_DELETE|IN_MOVED_FROM|IN_MOVED_TO,
e9223856 56 [PATH_MODIFIED] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB|IN_CLOSE_WRITE|IN_CREATE|IN_DELETE|IN_MOVED_FROM|IN_MOVED_TO|IN_MODIFY,
4b562198
MS
57 [PATH_DIRECTORY_NOT_EMPTY] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB|IN_CREATE|IN_MOVED_TO
58 };
59
60 bool exists = false;
bc41f93e 61 char *slash, *oldslash = NULL;
4b562198 62 int r;
0e456f97 63
4b562198 64 assert(s);
718db961
LP
65 assert(s->unit);
66 assert(handler);
0e456f97 67
718db961 68 path_spec_unwatch(s);
4b562198 69
f8c16f42
ZJS
70 s->inotify_fd = inotify_init1(IN_NONBLOCK|IN_CLOEXEC);
71 if (s->inotify_fd < 0) {
4b562198
MS
72 r = -errno;
73 goto fail;
74 }
75
151b9b96 76 r = sd_event_add_io(s->unit->manager->event, &s->event_source, s->inotify_fd, EPOLLIN, handler, s);
f8c16f42 77 if (r < 0)
4b562198 78 goto fail;
4b562198 79
7dfbe2e3
TG
80 (void) sd_event_source_set_description(s->event_source, "path");
81
bc41f93e 82 /* This assumes the path was passed through path_kill_slashes()! */
4b562198 83
180d6802
MS
84 for (slash = strchr(s->path, '/'); ; slash = strchr(slash+1, '/')) {
85 char *cut = NULL;
4b562198 86 int flags;
bc41f93e
ZJS
87 char tmp;
88
89 if (slash) {
180d6802
MS
90 cut = slash + (slash == s->path);
91 tmp = *cut;
92 *cut = '\0';
93
bc41f93e 94 flags = IN_MOVE_SELF | IN_DELETE_SELF | IN_ATTRIB | IN_CREATE | IN_MOVED_TO;
180d6802 95 } else
bc41f93e 96 flags = flags_table[s->type];
4b562198 97
180d6802 98 r = inotify_add_watch(s->inotify_fd, s->path, flags);
bc41f93e 99 if (r < 0) {
3742095b 100 if (IN_SET(errno, EACCES, ENOENT)) {
180d6802
MS
101 if (cut)
102 *cut = tmp;
bc41f93e 103 break;
180d6802 104 }
4b562198 105
f2341e0a 106 r = log_warning_errno(errno, "Failed to add watch on %s: %s", s->path, errno == ENOSPC ? "too many watches" : strerror(-r));
180d6802
MS
107 if (cut)
108 *cut = tmp;
28a79bd2 109 goto fail;
bc41f93e
ZJS
110 } else {
111 exists = true;
112
edfd706d 113 /* Path exists, we don't need to watch parent too closely. */
bc41f93e 114 if (oldslash) {
180d6802
MS
115 char *cut2 = oldslash + (oldslash == s->path);
116 char tmp2 = *cut2;
117 *cut2 = '\0';
bc41f93e 118
edfd706d
ZJS
119 (void) inotify_add_watch(s->inotify_fd, s->path, IN_MOVE_SELF);
120 /* Error is ignored, the worst can happen is we get spurious events. */
bc41f93e 121
180d6802 122 *cut2 = tmp2;
bc41f93e 123 }
28a79bd2 124 }
bc41f93e 125
180d6802
MS
126 if (cut)
127 *cut = tmp;
128
129 if (slash)
bc41f93e 130 oldslash = slash;
180d6802 131 else {
bc41f93e
ZJS
132 /* whole path has been iterated over */
133 s->primary_wd = r;
134 break;
135 }
136 }
137
28a79bd2 138 if (!exists) {
f2341e0a
LP
139 r = log_error_errno(errno, "Failed to add watch on any of the components of %s: %m", s->path);
140 /* either EACCESS or ENOENT */
28a79bd2
ZJS
141 goto fail;
142 }
143
4b562198
MS
144 return 0;
145
146fail:
718db961 147 path_spec_unwatch(s);
4b562198 148 return r;
0e456f97
LP
149}
150
718db961
LP
151void path_spec_unwatch(PathSpec *s) {
152 assert(s);
62347bc2 153
718db961 154 s->event_source = sd_event_source_unref(s->event_source);
03e334a1 155 s->inotify_fd = safe_close(s->inotify_fd);
62347bc2
LP
156}
157
718db961 158int path_spec_fd_event(PathSpec *s, uint32_t revents) {
0254e944 159 union inotify_event_buffer buffer;
4b562198 160 struct inotify_event *e;
f7c1ad4f 161 ssize_t l;
4b562198
MS
162 int r = 0;
163
718db961 164 if (revents != EPOLLIN) {
15f55e80 165 log_error("Got invalid poll event on inotify.");
a163db44 166 return -EINVAL;
4b562198
MS
167 }
168
0254e944 169 l = read(s->inotify_fd, &buffer, sizeof(buffer));
f7c1ad4f 170 if (l < 0) {
3742095b 171 if (IN_SET(errno, EAGAIN, EINTR))
f7c1ad4f 172 return 0;
4b562198 173
4a62c710 174 return log_error_errno(errno, "Failed to read inotify event: %m");
f7c1ad4f 175 }
4b562198 176
f7c1ad4f 177 FOREACH_INOTIFY_EVENT(e, buffer, l) {
3742095b 178 if (IN_SET(s->type, PATH_CHANGED, PATH_MODIFIED) &&
714d943f 179 s->primary_wd == e->wd)
4b562198 180 r = 1;
4b562198 181 }
a163db44 182
4b562198
MS
183 return r;
184}
185
57020a3a 186static bool path_spec_check_good(PathSpec *s, bool initial) {
4b562198
MS
187 bool good = false;
188
189 switch (s->type) {
190
191 case PATH_EXISTS:
192 good = access(s->path, F_OK) >= 0;
193 break;
194
195 case PATH_EXISTS_GLOB:
196 good = glob_exists(s->path) > 0;
197 break;
198
199 case PATH_DIRECTORY_NOT_EMPTY: {
200 int k;
201
202 k = dir_is_empty(s->path);
203 good = !(k == -ENOENT || k > 0);
204 break;
205 }
206
714d943f
MS
207 case PATH_CHANGED:
208 case PATH_MODIFIED: {
4b562198
MS
209 bool b;
210
211 b = access(s->path, F_OK) >= 0;
212 good = !initial && b != s->previous_exists;
213 s->previous_exists = b;
214 break;
215 }
216
217 default:
218 ;
219 }
220
221 return good;
222}
223
57020a3a 224static void path_spec_mkdir(PathSpec *s, mode_t mode) {
4b562198
MS
225 int r;
226
3742095b 227 if (IN_SET(s->type, PATH_EXISTS, PATH_EXISTS_GLOB))
4b562198
MS
228 return;
229
15f55e80
ZJS
230 r = mkdir_p_label(s->path, mode);
231 if (r < 0)
da927ba9 232 log_warning_errno(r, "mkdir(%s) failed: %m", s->path);
4b562198
MS
233}
234
57020a3a 235static void path_spec_dump(PathSpec *s, FILE *f, const char *prefix) {
4b562198
MS
236 fprintf(f,
237 "%s%s: %s\n",
238 prefix,
239 path_type_to_string(s->type),
240 s->path);
241}
242
57020a3a
LP
243void path_spec_done(PathSpec *s) {
244 assert(s);
4b562198 245 assert(s->inotify_fd == -1);
57020a3a 246
4b562198
MS
247 free(s->path);
248}
249
250static void path_init(Unit *u) {
251 Path *p = PATH(u);
252
253 assert(u);
ac155bb8 254 assert(u->load_state == UNIT_STUB);
4b562198
MS
255
256 p->directory_mode = 0755;
257}
258
74051b9b 259void path_free_specs(Path *p) {
01f78473
LP
260 PathSpec *s;
261
262 assert(p);
263
264 while ((s = p->specs)) {
718db961 265 path_spec_unwatch(s);
71fda00f 266 LIST_REMOVE(spec, p->specs, s);
57020a3a 267 path_spec_done(s);
01f78473
LP
268 free(s);
269 }
270}
271
74051b9b
LP
272static void path_done(Unit *u) {
273 Path *p = PATH(u);
274
275 assert(p);
276
74051b9b
LP
277 path_free_specs(p);
278}
279
a57f7e2c 280static int path_add_mount_links(Path *p) {
01f78473
LP
281 PathSpec *s;
282 int r;
283
284 assert(p);
01f78473
LP
285
286 LIST_FOREACH(spec, s, p->specs) {
a57f7e2c 287 r = unit_require_mounts_for(UNIT(p), s->path);
e0207c8d 288 if (r < 0)
01f78473 289 return r;
e0207c8d 290 }
01f78473
LP
291
292 return 0;
293}
294
295static int path_verify(Path *p) {
296 assert(p);
297
1124fe6f 298 if (UNIT(p)->load_state != UNIT_LOADED)
01f78473
LP
299 return 0;
300
301 if (!p->specs) {
f2341e0a 302 log_unit_error(UNIT(p), "Path unit lacks path setting. Refusing.");
01f78473
LP
303 return -EINVAL;
304 }
305
306 return 0;
307}
308
6c155fe3
LP
309static int path_add_default_dependencies(Path *p) {
310 int r;
311
312 assert(p);
313
4c9ea260
LP
314 if (!UNIT(p)->default_dependencies)
315 return 0;
316
317 r = unit_add_dependency_by_name(UNIT(p), UNIT_BEFORE, SPECIAL_PATHS_TARGET, NULL, true);
e3d84721
LP
318 if (r < 0)
319 return r;
2a77d31d 320
463d0d15 321 if (MANAGER_IS_SYSTEM(UNIT(p)->manager)) {
4c9ea260 322 r = unit_add_two_dependencies_by_name(UNIT(p), UNIT_AFTER, UNIT_REQUIRES, SPECIAL_SYSINIT_TARGET, NULL, true);
e0207c8d 323 if (r < 0)
6c155fe3 324 return r;
2a77d31d 325 }
6c155fe3 326
4c9ea260 327 return unit_add_two_dependencies_by_name(UNIT(p), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, NULL, true);
6c155fe3
LP
328}
329
01f78473
LP
330static int path_load(Unit *u) {
331 Path *p = PATH(u);
332 int r;
333
334 assert(u);
ac155bb8 335 assert(u->load_state == UNIT_STUB);
01f78473 336
e0207c8d
ZJS
337 r = unit_load_fragment_and_dropin(u);
338 if (r < 0)
01f78473
LP
339 return r;
340
ac155bb8 341 if (u->load_state == UNIT_LOADED) {
01f78473 342
3ecaa09b 343 if (set_isempty(u->dependencies[UNIT_TRIGGERS])) {
57020a3a
LP
344 Unit *x;
345
346 r = unit_load_related_unit(u, ".service", &x);
347 if (r < 0)
01f78473
LP
348 return r;
349
3ecaa09b
LP
350 r = unit_add_two_dependencies(u, UNIT_BEFORE, UNIT_TRIGGERS, x, true);
351 if (r < 0)
352 return r;
57020a3a
LP
353 }
354
e0207c8d
ZJS
355 r = path_add_mount_links(p);
356 if (r < 0)
01f78473 357 return r;
a40eb732 358
4c9ea260
LP
359 r = path_add_default_dependencies(p);
360 if (r < 0)
361 return r;
01f78473
LP
362 }
363
364 return path_verify(p);
365}
366
367static void path_dump(Unit *u, FILE *f, const char *prefix) {
368 Path *p = PATH(u);
3ecaa09b 369 Unit *trigger;
01f78473
LP
370 PathSpec *s;
371
e364ad06
LP
372 assert(p);
373 assert(f);
01f78473 374
3ecaa09b
LP
375 trigger = UNIT_TRIGGER(u);
376
01f78473
LP
377 fprintf(f,
378 "%sPath State: %s\n"
cd43ca73 379 "%sResult: %s\n"
0e456f97
LP
380 "%sUnit: %s\n"
381 "%sMakeDirectory: %s\n"
382 "%sDirectoryMode: %04o\n",
01f78473 383 prefix, path_state_to_string(p->state),
cd43ca73 384 prefix, path_result_to_string(p->result),
3ecaa09b 385 prefix, trigger ? trigger->id : "n/a",
0e456f97
LP
386 prefix, yes_no(p->make_directory),
387 prefix, p->directory_mode);
01f78473
LP
388
389 LIST_FOREACH(spec, s, p->specs)
57020a3a 390 path_spec_dump(s, f, prefix);
01f78473
LP
391}
392
393static void path_unwatch(Path *p) {
394 PathSpec *s;
395
396 assert(p);
397
398 LIST_FOREACH(spec, s, p->specs)
718db961 399 path_spec_unwatch(s);
01f78473
LP
400}
401
402static int path_watch(Path *p) {
403 int r;
404 PathSpec *s;
405
406 assert(p);
407
e0207c8d 408 LIST_FOREACH(spec, s, p->specs) {
718db961 409 r = path_spec_watch(s, path_dispatch_io);
e0207c8d 410 if (r < 0)
01f78473 411 return r;
e0207c8d 412 }
01f78473
LP
413
414 return 0;
415}
416
417static void path_set_state(Path *p, PathState state) {
418 PathState old_state;
419 assert(p);
420
421 old_state = p->state;
422 p->state = state;
423
672028dc
LP
424 if (state != PATH_WAITING &&
425 (state != PATH_RUNNING || p->inotify_triggered))
01f78473
LP
426 path_unwatch(p);
427
428 if (state != old_state)
3541bf1f 429 log_unit_debug(UNIT(p), "Changed %s -> %s", path_state_to_string(old_state), path_state_to_string(state));
01f78473 430
e2f3b44c 431 unit_notify(UNIT(p), state_translation_table[old_state], state_translation_table[state], true);
01f78473
LP
432}
433
ac3f50ca 434static void path_enter_waiting(Path *p, bool initial, bool recheck);
01f78473 435
be847e82 436static int path_coldplug(Unit *u) {
01f78473
LP
437 Path *p = PATH(u);
438
439 assert(p);
440 assert(p->state == PATH_DEAD);
441
442 if (p->deserialized_state != p->state) {
443
3742095b 444 if (IN_SET(p->deserialized_state, PATH_WAITING, PATH_RUNNING))
be847e82
LP
445 path_enter_waiting(p, true, true);
446 else
01f78473
LP
447 path_set_state(p, p->deserialized_state);
448 }
449
450 return 0;
451}
452
cd43ca73 453static void path_enter_dead(Path *p, PathResult f) {
01f78473
LP
454 assert(p);
455
a0fef983 456 if (p->result == PATH_SUCCESS)
cd43ca73 457 p->result = f;
01f78473 458
ed77d407
LP
459 if (p->result != PATH_SUCCESS)
460 log_unit_warning(UNIT(p), "Failed with result '%s'.", path_result_to_string(p->result));
461
cd43ca73 462 path_set_state(p, p->result != PATH_SUCCESS ? PATH_FAILED : PATH_DEAD);
01f78473
LP
463}
464
465static void path_enter_running(Path *p) {
4afd3348 466 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
e903182e 467 Unit *trigger;
01f78473 468 int r;
398ef8ba 469
01f78473 470 assert(p);
3ecaa09b 471
ba3e67a7 472 /* Don't start job if we are supposed to go down */
31afa0a4 473 if (unit_stop_pending(UNIT(p)))
ba3e67a7
LP
474 return;
475
e903182e
LP
476 trigger = UNIT_TRIGGER(UNIT(p));
477 if (!trigger) {
478 log_unit_error(UNIT(p), "Unit to trigger vanished.");
9e4942ed 479 path_enter_dead(p, PATH_FAILURE_RESOURCES);
e903182e
LP
480 return;
481 }
482
483 r = manager_add_job(UNIT(p)->manager, JOB_START, trigger, JOB_REPLACE, &error, NULL);
e0207c8d 484 if (r < 0)
01f78473
LP
485 goto fail;
486
672028dc
LP
487 p->inotify_triggered = false;
488
e0207c8d
ZJS
489 r = path_watch(p);
490 if (r < 0)
672028dc
LP
491 goto fail;
492
01f78473
LP
493 path_set_state(p, PATH_RUNNING);
494 return;
495
496fail:
f2341e0a 497 log_unit_warning(UNIT(p), "Failed to queue unit startup job: %s", bus_error_message(&error, r));
cd43ca73 498 path_enter_dead(p, PATH_FAILURE_RESOURCES);
01f78473
LP
499}
500
ac3f50ca 501static bool path_check_good(Path *p, bool initial) {
01f78473 502 PathSpec *s;
01f78473
LP
503 bool good = false;
504
ac3f50ca 505 assert(p);
672028dc 506
01f78473 507 LIST_FOREACH(spec, s, p->specs) {
57020a3a 508 good = path_spec_check_good(s, initial);
01f78473
LP
509
510 if (good)
511 break;
512 }
513
ac3f50ca
LP
514 return good;
515}
01f78473 516
ac3f50ca
LP
517static void path_enter_waiting(Path *p, bool initial, bool recheck) {
518 int r;
0595f9a1 519
ac3f50ca
LP
520 if (recheck)
521 if (path_check_good(p, initial)) {
f2341e0a 522 log_unit_debug(UNIT(p), "Got triggered.");
ac3f50ca
LP
523 path_enter_running(p);
524 return;
525 }
526
e0207c8d
ZJS
527 r = path_watch(p);
528 if (r < 0)
ac3f50ca
LP
529 goto fail;
530
531 /* Hmm, so now we have created inotify watches, but the file
532 * might have appeared/been removed by now, so we must
533 * recheck */
534
535 if (recheck)
536 if (path_check_good(p, false)) {
f2341e0a 537 log_unit_debug(UNIT(p), "Got triggered.");
ac3f50ca
LP
538 path_enter_running(p);
539 return;
540 }
01f78473
LP
541
542 path_set_state(p, PATH_WAITING);
543 return;
544
545fail:
f2341e0a 546 log_unit_warning_errno(UNIT(p), r, "Failed to enter waiting state: %m");
cd43ca73 547 path_enter_dead(p, PATH_FAILURE_RESOURCES);
01f78473
LP
548}
549
0e456f97
LP
550static void path_mkdir(Path *p) {
551 PathSpec *s;
552
553 assert(p);
554
555 if (!p->make_directory)
556 return;
557
4b562198 558 LIST_FOREACH(spec, s, p->specs)
57020a3a 559 path_spec_mkdir(s, p->directory_mode);
0e456f97
LP
560}
561
01f78473
LP
562static int path_start(Unit *u) {
563 Path *p = PATH(u);
e903182e 564 Unit *trigger;
07299350 565 int r;
01f78473
LP
566
567 assert(p);
3742095b 568 assert(IN_SET(p->state, PATH_DEAD, PATH_FAILED));
01f78473 569
e903182e
LP
570 trigger = UNIT_TRIGGER(u);
571 if (!trigger || trigger->load_state != UNIT_LOADED) {
572 log_unit_error(u, "Refusing to start, unit to trigger not loaded.");
01f78473 573 return -ENOENT;
e903182e 574 }
01f78473 575
07299350
LP
576 r = unit_start_limit_test(u);
577 if (r < 0) {
578 path_enter_dead(p, PATH_FAILURE_START_LIMIT_HIT);
579 return r;
580 }
581
4b58153d
LP
582 r = unit_acquire_invocation_id(u);
583 if (r < 0)
584 return r;
585
0e456f97
LP
586 path_mkdir(p);
587
cd43ca73 588 p->result = PATH_SUCCESS;
ac3f50ca 589 path_enter_waiting(p, true, true);
00dc5d76 590
82a2b6bb 591 return 1;
01f78473
LP
592}
593
594static int path_stop(Unit *u) {
595 Path *p = PATH(u);
596
597 assert(p);
3742095b 598 assert(IN_SET(p->state, PATH_WAITING, PATH_RUNNING));
01f78473 599
cd43ca73 600 path_enter_dead(p, PATH_SUCCESS);
82a2b6bb 601 return 1;
01f78473
LP
602}
603
604static int path_serialize(Unit *u, FILE *f, FDSet *fds) {
605 Path *p = PATH(u);
606
607 assert(u);
608 assert(f);
609 assert(fds);
610
611 unit_serialize_item(u, f, "state", path_state_to_string(p->state));
cd43ca73 612 unit_serialize_item(u, f, "result", path_result_to_string(p->result));
01f78473
LP
613
614 return 0;
615}
616
617static int path_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
618 Path *p = PATH(u);
619
620 assert(u);
621 assert(key);
622 assert(value);
623 assert(fds);
624
625 if (streq(key, "state")) {
626 PathState state;
627
e0207c8d
ZJS
628 state = path_state_from_string(value);
629 if (state < 0)
f2341e0a 630 log_unit_debug(u, "Failed to parse state value: %s", value);
01f78473
LP
631 else
632 p->deserialized_state = state;
cd43ca73
LP
633
634 } else if (streq(key, "result")) {
635 PathResult f;
636
637 f = path_result_from_string(value);
638 if (f < 0)
f2341e0a 639 log_unit_debug(u, "Failed to parse result value: %s", value);
cd43ca73
LP
640 else if (f != PATH_SUCCESS)
641 p->result = f;
642
01f78473 643 } else
f2341e0a 644 log_unit_debug(u, "Unknown serialization key: %s", key);
01f78473
LP
645
646 return 0;
647}
648
44a6b1b6 649_pure_ static UnitActiveState path_active_state(Unit *u) {
01f78473
LP
650 assert(u);
651
652 return state_translation_table[PATH(u)->state];
653}
654
44a6b1b6 655_pure_ static const char *path_sub_state_to_string(Unit *u) {
01f78473
LP
656 assert(u);
657
658 return path_state_to_string(PATH(u)->state);
659}
660
718db961
LP
661static int path_dispatch_io(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
662 PathSpec *s = userdata;
663 Path *p;
4b562198 664 int changed;
01f78473 665
718db961
LP
666 assert(s);
667 assert(s->unit);
01f78473
LP
668 assert(fd >= 0);
669
718db961
LP
670 p = PATH(s->unit);
671
672028dc
LP
672 if (p->state != PATH_WAITING &&
673 p->state != PATH_RUNNING)
718db961 674 return 0;
01f78473 675
ac155bb8 676 /* log_debug("inotify wakeup on %s.", u->id); */
01f78473 677
01f78473 678 LIST_FOREACH(spec, s, p->specs)
57020a3a 679 if (path_spec_owns_inotify_fd(s, fd))
01f78473
LP
680 break;
681
682 if (!s) {
683 log_error("Got event on unknown fd.");
684 goto fail;
685 }
686
718db961 687 changed = path_spec_fd_event(s, revents);
4b562198 688 if (changed < 0)
01f78473 689 goto fail;
01f78473 690
672028dc
LP
691 /* If we are already running, then remember that one event was
692 * dispatched so that we restart the service only if something
693 * actually changed on disk */
694 p->inotify_triggered = true;
695
672028dc
LP
696 if (changed)
697 path_enter_running(p);
698 else
ac3f50ca 699 path_enter_waiting(p, false, true);
672028dc 700
718db961 701 return 0;
01f78473
LP
702
703fail:
cd43ca73 704 path_enter_dead(p, PATH_FAILURE_RESOURCES);
718db961 705 return 0;
01f78473
LP
706}
707
3ecaa09b
LP
708static void path_trigger_notify(Unit *u, Unit *other) {
709 Path *p = PATH(u);
01f78473 710
3ecaa09b
LP
711 assert(u);
712 assert(other);
01f78473 713
3ecaa09b
LP
714 /* Invoked whenever the unit we trigger changes state or gains
715 * or loses a job */
01f78473 716
3ecaa09b
LP
717 if (other->load_state != UNIT_LOADED)
718 return;
01f78473 719
3ecaa09b
LP
720 if (p->state == PATH_RUNNING &&
721 UNIT_IS_INACTIVE_OR_FAILED(unit_active_state(other))) {
f2341e0a 722 log_unit_debug(UNIT(p), "Got notified about unit deactivation.");
672028dc 723
3ecaa09b
LP
724 /* Hmm, so inotify was triggered since the
725 * last activation, so I guess we need to
726 * recheck what is going on. */
727 path_enter_waiting(p, false, p->inotify_triggered);
01f78473 728 }
01f78473
LP
729}
730
fdf20a31 731static void path_reset_failed(Unit *u) {
5632e374
LP
732 Path *p = PATH(u);
733
734 assert(p);
735
fdf20a31 736 if (p->state == PATH_FAILED)
5632e374
LP
737 path_set_state(p, PATH_DEAD);
738
cd43ca73 739 p->result = PATH_SUCCESS;
5632e374
LP
740}
741
01f78473
LP
742static const char* const path_type_table[_PATH_TYPE_MAX] = {
743 [PATH_EXISTS] = "PathExists",
8092a428 744 [PATH_EXISTS_GLOB] = "PathExistsGlob",
2c5859af 745 [PATH_DIRECTORY_NOT_EMPTY] = "DirectoryNotEmpty",
01f78473 746 [PATH_CHANGED] = "PathChanged",
e9223856 747 [PATH_MODIFIED] = "PathModified",
01f78473
LP
748};
749
750DEFINE_STRING_TABLE_LOOKUP(path_type, PathType);
751
cd43ca73
LP
752static const char* const path_result_table[_PATH_RESULT_MAX] = {
753 [PATH_SUCCESS] = "success",
2c5859af 754 [PATH_FAILURE_RESOURCES] = "resources",
07299350 755 [PATH_FAILURE_START_LIMIT_HIT] = "start-limit-hit",
cd43ca73
LP
756};
757
758DEFINE_STRING_TABLE_LOOKUP(path_result, PathResult);
759
01f78473 760const UnitVTable path_vtable = {
7d17cfbc 761 .object_size = sizeof(Path),
718db961 762
f975e971
LP
763 .sections =
764 "Unit\0"
765 "Path\0"
766 "Install\0",
01f78473 767
0e456f97 768 .init = path_init,
01f78473
LP
769 .done = path_done,
770 .load = path_load,
771
772 .coldplug = path_coldplug,
773
774 .dump = path_dump,
775
776 .start = path_start,
777 .stop = path_stop,
778
779 .serialize = path_serialize,
780 .deserialize_item = path_deserialize_item,
781
782 .active_state = path_active_state,
783 .sub_state_to_string = path_sub_state_to_string,
784
3ecaa09b
LP
785 .trigger_notify = path_trigger_notify,
786
fdf20a31 787 .reset_failed = path_reset_failed,
5632e374 788
aec8de63 789 .bus_vtable = bus_path_vtable
01f78473 790};