]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/core/path.c
hashmap: be a bit more conservative with pre-allocating hash tables and items
[thirdparty/systemd.git] / src / core / path.c
CommitLineData
d6c9574f 1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
01f78473
LP
2
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
5430f7f2
LP
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
01f78473
LP
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
5430f7f2 16 Lesser General Public License for more details.
01f78473 17
5430f7f2 18 You should have received a copy of the GNU Lesser General Public License
01f78473
LP
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
22#include <sys/inotify.h>
23#include <sys/epoll.h>
24#include <sys/ioctl.h>
25#include <errno.h>
26#include <unistd.h>
27
28#include "unit.h"
29#include "unit-name.h"
30#include "path.h"
49e942b2 31#include "mkdir.h"
01f78473 32#include "dbus-path.h"
a40eb732 33#include "special.h"
449101fc 34#include "dbus-common.h"
9eb977db 35#include "path-util.h"
f8c16f42 36#include "macro.h"
01f78473
LP
37
38static const UnitActiveState state_translation_table[_PATH_STATE_MAX] = {
39 [PATH_DEAD] = UNIT_INACTIVE,
40 [PATH_WAITING] = UNIT_ACTIVE,
41 [PATH_RUNNING] = UNIT_ACTIVE,
fdf20a31 42 [PATH_FAILED] = UNIT_FAILED
01f78473
LP
43};
44
57020a3a
LP
45int path_spec_watch(PathSpec *s, Unit *u) {
46
4b562198
MS
47 static const int flags_table[_PATH_TYPE_MAX] = {
48 [PATH_EXISTS] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB,
49 [PATH_EXISTS_GLOB] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB,
50 [PATH_CHANGED] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB|IN_CLOSE_WRITE|IN_CREATE|IN_DELETE|IN_MOVED_FROM|IN_MOVED_TO,
e9223856 51 [PATH_MODIFIED] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB|IN_CLOSE_WRITE|IN_CREATE|IN_DELETE|IN_MOVED_FROM|IN_MOVED_TO|IN_MODIFY,
4b562198
MS
52 [PATH_DIRECTORY_NOT_EMPTY] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB|IN_CREATE|IN_MOVED_TO
53 };
54
55 bool exists = false;
bc41f93e 56 char *slash, *oldslash = NULL;
4b562198 57 int r;
0e456f97
LP
58
59 assert(u);
4b562198 60 assert(s);
0e456f97 61
57020a3a 62 path_spec_unwatch(s, u);
4b562198 63
f8c16f42
ZJS
64 s->inotify_fd = inotify_init1(IN_NONBLOCK|IN_CLOEXEC);
65 if (s->inotify_fd < 0) {
4b562198
MS
66 r = -errno;
67 goto fail;
68 }
69
f8c16f42
ZJS
70 r = unit_watch_fd(u, s->inotify_fd, EPOLLIN, &s->watch);
71 if (r < 0)
4b562198 72 goto fail;
4b562198 73
bc41f93e 74 /* This assumes the path was passed through path_kill_slashes()! */
4b562198 75
180d6802
MS
76 for (slash = strchr(s->path, '/'); ; slash = strchr(slash+1, '/')) {
77 char *cut = NULL;
4b562198 78 int flags;
bc41f93e
ZJS
79 char tmp;
80
81 if (slash) {
180d6802
MS
82 cut = slash + (slash == s->path);
83 tmp = *cut;
84 *cut = '\0';
85
bc41f93e 86 flags = IN_MOVE_SELF | IN_DELETE_SELF | IN_ATTRIB | IN_CREATE | IN_MOVED_TO;
180d6802 87 } else
bc41f93e 88 flags = flags_table[s->type];
4b562198 89
180d6802 90 r = inotify_add_watch(s->inotify_fd, s->path, flags);
bc41f93e 91 if (r < 0) {
180d6802
MS
92 if (errno == EACCES || errno == ENOENT) {
93 if (cut)
94 *cut = tmp;
bc41f93e 95 break;
180d6802 96 }
4b562198 97
180d6802 98 log_warning("Failed to add watch on %s: %m", s->path);
28a79bd2 99 r = -errno;
180d6802
MS
100 if (cut)
101 *cut = tmp;
28a79bd2 102 goto fail;
bc41f93e
ZJS
103 } else {
104 exists = true;
105
106 /* Path exists, we don't need to watch parent
107 too closely. */
108 if (oldslash) {
180d6802
MS
109 char *cut2 = oldslash + (oldslash == s->path);
110 char tmp2 = *cut2;
111 *cut2 = '\0';
bc41f93e 112
180d6802 113 inotify_add_watch(s->inotify_fd, s->path, IN_MOVE_SELF);
bc41f93e
ZJS
114 /* Error is ignored, the worst can happen is
115 we get spurious events. */
116
180d6802 117 *cut2 = tmp2;
bc41f93e 118 }
28a79bd2 119 }
bc41f93e 120
180d6802
MS
121 if (cut)
122 *cut = tmp;
123
124 if (slash)
bc41f93e 125 oldslash = slash;
180d6802 126 else {
bc41f93e
ZJS
127 /* whole path has been iterated over */
128 s->primary_wd = r;
129 break;
130 }
131 }
132
28a79bd2
ZJS
133 if (!exists) {
134 log_error("Failed to add watch on any of the components of %s: %m",
135 s->path);
bc41f93e 136 r = -errno; /* either EACCESS or ENOENT */
28a79bd2
ZJS
137 goto fail;
138 }
139
4b562198
MS
140 return 0;
141
142fail:
57020a3a 143 path_spec_unwatch(s, u);
4b562198 144 return r;
0e456f97
LP
145}
146
57020a3a 147void path_spec_unwatch(PathSpec *s, Unit *u) {
62347bc2
LP
148
149 if (s->inotify_fd < 0)
150 return;
151
4b562198 152 unit_unwatch_fd(u, &s->watch);
62347bc2
LP
153
154 close_nointr_nofail(s->inotify_fd);
155 s->inotify_fd = -1;
156}
157
57020a3a 158int path_spec_fd_event(PathSpec *s, uint32_t events) {
7fd1b19b 159 _cleanup_free_ uint8_t *buf = NULL;
4b562198
MS
160 struct inotify_event *e;
161 ssize_t k;
162 int l;
163 int r = 0;
164
165 if (events != EPOLLIN) {
15f55e80 166 log_error("Got invalid poll event on inotify.");
a163db44 167 return -EINVAL;
4b562198
MS
168 }
169
170 if (ioctl(s->inotify_fd, FIONREAD, &l) < 0) {
171 log_error("FIONREAD failed: %m");
a163db44 172 return -errno;
4b562198
MS
173 }
174
175 assert(l > 0);
176
15f55e80 177 buf = malloc(l);
a163db44
ZJS
178 if (!buf)
179 return log_oom();
4b562198 180
15f55e80
ZJS
181 k = read(s->inotify_fd, buf, l);
182 if (k < 0) {
4b562198 183 log_error("Failed to read inotify event: %m");
a163db44 184 return -errno;
4b562198
MS
185 }
186
187 e = (struct inotify_event*) buf;
188
189 while (k > 0) {
190 size_t step;
191
714d943f
MS
192 if ((s->type == PATH_CHANGED || s->type == PATH_MODIFIED) &&
193 s->primary_wd == e->wd)
4b562198
MS
194 r = 1;
195
196 step = sizeof(struct inotify_event) + e->len;
197 assert(step <= (size_t) k);
198
199 e = (struct inotify_event*) ((uint8_t*) e + step);
200 k -= step;
201 }
a163db44 202
4b562198
MS
203 return r;
204}
205
57020a3a 206static bool path_spec_check_good(PathSpec *s, bool initial) {
4b562198
MS
207 bool good = false;
208
209 switch (s->type) {
210
211 case PATH_EXISTS:
212 good = access(s->path, F_OK) >= 0;
213 break;
214
215 case PATH_EXISTS_GLOB:
216 good = glob_exists(s->path) > 0;
217 break;
218
219 case PATH_DIRECTORY_NOT_EMPTY: {
220 int k;
221
222 k = dir_is_empty(s->path);
223 good = !(k == -ENOENT || k > 0);
224 break;
225 }
226
714d943f
MS
227 case PATH_CHANGED:
228 case PATH_MODIFIED: {
4b562198
MS
229 bool b;
230
231 b = access(s->path, F_OK) >= 0;
232 good = !initial && b != s->previous_exists;
233 s->previous_exists = b;
234 break;
235 }
236
237 default:
238 ;
239 }
240
241 return good;
242}
243
57020a3a 244static void path_spec_mkdir(PathSpec *s, mode_t mode) {
4b562198
MS
245 int r;
246
247 if (s->type == PATH_EXISTS || s->type == PATH_EXISTS_GLOB)
248 return;
249
15f55e80
ZJS
250 r = mkdir_p_label(s->path, mode);
251 if (r < 0)
4b562198
MS
252 log_warning("mkdir(%s) failed: %s", s->path, strerror(-r));
253}
254
57020a3a 255static void path_spec_dump(PathSpec *s, FILE *f, const char *prefix) {
4b562198
MS
256 fprintf(f,
257 "%s%s: %s\n",
258 prefix,
259 path_type_to_string(s->type),
260 s->path);
261}
262
57020a3a
LP
263void path_spec_done(PathSpec *s) {
264 assert(s);
4b562198 265 assert(s->inotify_fd == -1);
57020a3a 266
4b562198
MS
267 free(s->path);
268}
269
270static void path_init(Unit *u) {
271 Path *p = PATH(u);
272
273 assert(u);
ac155bb8 274 assert(u->load_state == UNIT_STUB);
4b562198
MS
275
276 p->directory_mode = 0755;
277}
278
74051b9b 279void path_free_specs(Path *p) {
01f78473
LP
280 PathSpec *s;
281
282 assert(p);
283
284 while ((s = p->specs)) {
74051b9b 285 path_spec_unwatch(s, UNIT(p));
71fda00f 286 LIST_REMOVE(spec, p->specs, s);
57020a3a 287 path_spec_done(s);
01f78473
LP
288 free(s);
289 }
290}
291
74051b9b
LP
292static void path_done(Unit *u) {
293 Path *p = PATH(u);
294
295 assert(p);
296
74051b9b
LP
297 path_free_specs(p);
298}
299
a57f7e2c 300static int path_add_mount_links(Path *p) {
01f78473
LP
301 PathSpec *s;
302 int r;
303
304 assert(p);
01f78473
LP
305
306 LIST_FOREACH(spec, s, p->specs) {
a57f7e2c 307 r = unit_require_mounts_for(UNIT(p), s->path);
e0207c8d 308 if (r < 0)
01f78473 309 return r;
e0207c8d 310 }
01f78473
LP
311
312 return 0;
313}
314
315static int path_verify(Path *p) {
316 assert(p);
317
1124fe6f 318 if (UNIT(p)->load_state != UNIT_LOADED)
01f78473
LP
319 return 0;
320
321 if (!p->specs) {
66870f90
ZJS
322 log_error_unit(UNIT(p)->id,
323 "%s lacks path setting. Refusing.", UNIT(p)->id);
01f78473
LP
324 return -EINVAL;
325 }
326
327 return 0;
328}
329
6c155fe3
LP
330static int path_add_default_dependencies(Path *p) {
331 int r;
332
333 assert(p);
334
e3d84721
LP
335 r = unit_add_dependency_by_name(UNIT(p), UNIT_BEFORE,
336 SPECIAL_PATHS_TARGET, NULL, true);
337 if (r < 0)
338 return r;
2a77d31d 339
e3d84721 340 if (UNIT(p)->manager->running_as == SYSTEMD_SYSTEM) {
e0207c8d
ZJS
341 r = unit_add_two_dependencies_by_name(UNIT(p), UNIT_AFTER, UNIT_REQUIRES,
342 SPECIAL_SYSINIT_TARGET, NULL, true);
343 if (r < 0)
6c155fe3 344 return r;
2a77d31d 345 }
6c155fe3 346
e0207c8d
ZJS
347 return unit_add_two_dependencies_by_name(UNIT(p), UNIT_BEFORE, UNIT_CONFLICTS,
348 SPECIAL_SHUTDOWN_TARGET, NULL, true);
6c155fe3
LP
349}
350
01f78473
LP
351static int path_load(Unit *u) {
352 Path *p = PATH(u);
353 int r;
354
355 assert(u);
ac155bb8 356 assert(u->load_state == UNIT_STUB);
01f78473 357
e0207c8d
ZJS
358 r = unit_load_fragment_and_dropin(u);
359 if (r < 0)
01f78473
LP
360 return r;
361
ac155bb8 362 if (u->load_state == UNIT_LOADED) {
01f78473 363
3ecaa09b 364 if (set_isempty(u->dependencies[UNIT_TRIGGERS])) {
57020a3a
LP
365 Unit *x;
366
367 r = unit_load_related_unit(u, ".service", &x);
368 if (r < 0)
01f78473
LP
369 return r;
370
3ecaa09b
LP
371 r = unit_add_two_dependencies(u, UNIT_BEFORE, UNIT_TRIGGERS, x, true);
372 if (r < 0)
373 return r;
57020a3a
LP
374 }
375
e0207c8d
ZJS
376 r = path_add_mount_links(p);
377 if (r < 0)
01f78473 378 return r;
a40eb732 379
e0207c8d
ZJS
380 if (UNIT(p)->default_dependencies) {
381 r = path_add_default_dependencies(p);
382 if (r < 0)
a40eb732 383 return r;
e0207c8d 384 }
01f78473
LP
385 }
386
387 return path_verify(p);
388}
389
390static void path_dump(Unit *u, FILE *f, const char *prefix) {
391 Path *p = PATH(u);
3ecaa09b 392 Unit *trigger;
01f78473
LP
393 PathSpec *s;
394
e364ad06
LP
395 assert(p);
396 assert(f);
01f78473 397
3ecaa09b
LP
398 trigger = UNIT_TRIGGER(u);
399
01f78473
LP
400 fprintf(f,
401 "%sPath State: %s\n"
cd43ca73 402 "%sResult: %s\n"
0e456f97
LP
403 "%sUnit: %s\n"
404 "%sMakeDirectory: %s\n"
405 "%sDirectoryMode: %04o\n",
01f78473 406 prefix, path_state_to_string(p->state),
cd43ca73 407 prefix, path_result_to_string(p->result),
3ecaa09b 408 prefix, trigger ? trigger->id : "n/a",
0e456f97
LP
409 prefix, yes_no(p->make_directory),
410 prefix, p->directory_mode);
01f78473
LP
411
412 LIST_FOREACH(spec, s, p->specs)
57020a3a 413 path_spec_dump(s, f, prefix);
01f78473
LP
414}
415
416static void path_unwatch(Path *p) {
417 PathSpec *s;
418
419 assert(p);
420
421 LIST_FOREACH(spec, s, p->specs)
57020a3a 422 path_spec_unwatch(s, UNIT(p));
01f78473
LP
423}
424
425static int path_watch(Path *p) {
426 int r;
427 PathSpec *s;
428
429 assert(p);
430
e0207c8d
ZJS
431 LIST_FOREACH(spec, s, p->specs) {
432 r = path_spec_watch(s, UNIT(p));
433 if (r < 0)
01f78473 434 return r;
e0207c8d 435 }
01f78473
LP
436
437 return 0;
438}
439
440static void path_set_state(Path *p, PathState state) {
441 PathState old_state;
442 assert(p);
443
444 old_state = p->state;
445 p->state = state;
446
672028dc
LP
447 if (state != PATH_WAITING &&
448 (state != PATH_RUNNING || p->inotify_triggered))
01f78473
LP
449 path_unwatch(p);
450
451 if (state != old_state)
452 log_debug("%s changed %s -> %s",
1124fe6f 453 UNIT(p)->id,
01f78473
LP
454 path_state_to_string(old_state),
455 path_state_to_string(state));
456
e2f3b44c 457 unit_notify(UNIT(p), state_translation_table[old_state], state_translation_table[state], true);
01f78473
LP
458}
459
ac3f50ca 460static void path_enter_waiting(Path *p, bool initial, bool recheck);
01f78473
LP
461
462static int path_coldplug(Unit *u) {
463 Path *p = PATH(u);
464
465 assert(p);
466 assert(p->state == PATH_DEAD);
467
468 if (p->deserialized_state != p->state) {
469
470 if (p->deserialized_state == PATH_WAITING ||
471 p->deserialized_state == PATH_RUNNING)
ac3f50ca 472 path_enter_waiting(p, true, true);
01f78473
LP
473 else
474 path_set_state(p, p->deserialized_state);
475 }
476
477 return 0;
478}
479
cd43ca73 480static void path_enter_dead(Path *p, PathResult f) {
01f78473
LP
481 assert(p);
482
cd43ca73
LP
483 if (f != PATH_SUCCESS)
484 p->result = f;
01f78473 485
cd43ca73 486 path_set_state(p, p->result != PATH_SUCCESS ? PATH_FAILED : PATH_DEAD);
01f78473
LP
487}
488
489static void path_enter_running(Path *p) {
3ecaa09b 490 _cleanup_dbus_error_free_ DBusError error;
01f78473 491 int r;
398ef8ba 492
01f78473 493 assert(p);
3ecaa09b 494
398ef8ba 495 dbus_error_init(&error);
01f78473 496
ba3e67a7 497 /* Don't start job if we are supposed to go down */
31afa0a4 498 if (unit_stop_pending(UNIT(p)))
ba3e67a7
LP
499 return;
500
3ecaa09b 501 r = manager_add_job(UNIT(p)->manager, JOB_START, UNIT_TRIGGER(UNIT(p)),
e0207c8d
ZJS
502 JOB_REPLACE, true, &error, NULL);
503 if (r < 0)
01f78473
LP
504 goto fail;
505
672028dc
LP
506 p->inotify_triggered = false;
507
e0207c8d
ZJS
508 r = path_watch(p);
509 if (r < 0)
672028dc
LP
510 goto fail;
511
01f78473
LP
512 path_set_state(p, PATH_RUNNING);
513 return;
514
515fail:
e0207c8d
ZJS
516 log_warning("%s failed to queue unit startup job: %s",
517 UNIT(p)->id, bus_error(&error, r));
cd43ca73 518 path_enter_dead(p, PATH_FAILURE_RESOURCES);
01f78473
LP
519}
520
ac3f50ca 521static bool path_check_good(Path *p, bool initial) {
01f78473 522 PathSpec *s;
01f78473
LP
523 bool good = false;
524
ac3f50ca 525 assert(p);
672028dc 526
01f78473 527 LIST_FOREACH(spec, s, p->specs) {
57020a3a 528 good = path_spec_check_good(s, initial);
01f78473
LP
529
530 if (good)
531 break;
532 }
533
ac3f50ca
LP
534 return good;
535}
01f78473 536
ac3f50ca
LP
537static void path_enter_waiting(Path *p, bool initial, bool recheck) {
538 int r;
0595f9a1 539
ac3f50ca
LP
540 if (recheck)
541 if (path_check_good(p, initial)) {
1124fe6f 542 log_debug("%s got triggered.", UNIT(p)->id);
ac3f50ca
LP
543 path_enter_running(p);
544 return;
545 }
546
e0207c8d
ZJS
547 r = path_watch(p);
548 if (r < 0)
ac3f50ca
LP
549 goto fail;
550
551 /* Hmm, so now we have created inotify watches, but the file
552 * might have appeared/been removed by now, so we must
553 * recheck */
554
555 if (recheck)
556 if (path_check_good(p, false)) {
1124fe6f 557 log_debug("%s got triggered.", UNIT(p)->id);
ac3f50ca
LP
558 path_enter_running(p);
559 return;
560 }
01f78473
LP
561
562 path_set_state(p, PATH_WAITING);
563 return;
564
565fail:
e0207c8d
ZJS
566 log_warning("%s failed to enter waiting state: %s",
567 UNIT(p)->id, strerror(-r));
cd43ca73 568 path_enter_dead(p, PATH_FAILURE_RESOURCES);
01f78473
LP
569}
570
0e456f97
LP
571static void path_mkdir(Path *p) {
572 PathSpec *s;
573
574 assert(p);
575
576 if (!p->make_directory)
577 return;
578
4b562198 579 LIST_FOREACH(spec, s, p->specs)
57020a3a 580 path_spec_mkdir(s, p->directory_mode);
0e456f97
LP
581}
582
01f78473
LP
583static int path_start(Unit *u) {
584 Path *p = PATH(u);
585
586 assert(p);
fdf20a31 587 assert(p->state == PATH_DEAD || p->state == PATH_FAILED);
01f78473 588
3ecaa09b 589 if (UNIT_TRIGGER(u)->load_state != UNIT_LOADED)
01f78473
LP
590 return -ENOENT;
591
0e456f97
LP
592 path_mkdir(p);
593
cd43ca73 594 p->result = PATH_SUCCESS;
ac3f50ca 595 path_enter_waiting(p, true, true);
00dc5d76 596
01f78473
LP
597 return 0;
598}
599
600static int path_stop(Unit *u) {
601 Path *p = PATH(u);
602
603 assert(p);
604 assert(p->state == PATH_WAITING || p->state == PATH_RUNNING);
605
cd43ca73 606 path_enter_dead(p, PATH_SUCCESS);
01f78473
LP
607 return 0;
608}
609
610static int path_serialize(Unit *u, FILE *f, FDSet *fds) {
611 Path *p = PATH(u);
612
613 assert(u);
614 assert(f);
615 assert(fds);
616
617 unit_serialize_item(u, f, "state", path_state_to_string(p->state));
cd43ca73 618 unit_serialize_item(u, f, "result", path_result_to_string(p->result));
01f78473
LP
619
620 return 0;
621}
622
623static int path_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
624 Path *p = PATH(u);
625
626 assert(u);
627 assert(key);
628 assert(value);
629 assert(fds);
630
631 if (streq(key, "state")) {
632 PathState state;
633
e0207c8d
ZJS
634 state = path_state_from_string(value);
635 if (state < 0)
01f78473
LP
636 log_debug("Failed to parse state value %s", value);
637 else
638 p->deserialized_state = state;
cd43ca73
LP
639
640 } else if (streq(key, "result")) {
641 PathResult f;
642
643 f = path_result_from_string(value);
644 if (f < 0)
645 log_debug("Failed to parse result value %s", value);
646 else if (f != PATH_SUCCESS)
647 p->result = f;
648
01f78473
LP
649 } else
650 log_debug("Unknown serialization key '%s'", key);
651
652 return 0;
653}
654
44a6b1b6 655_pure_ static UnitActiveState path_active_state(Unit *u) {
01f78473
LP
656 assert(u);
657
658 return state_translation_table[PATH(u)->state];
659}
660
44a6b1b6 661_pure_ static const char *path_sub_state_to_string(Unit *u) {
01f78473
LP
662 assert(u);
663
664 return path_state_to_string(PATH(u)->state);
665}
666
667static void path_fd_event(Unit *u, int fd, uint32_t events, Watch *w) {
668 Path *p = PATH(u);
01f78473 669 PathSpec *s;
4b562198 670 int changed;
01f78473
LP
671
672 assert(p);
673 assert(fd >= 0);
674
672028dc
LP
675 if (p->state != PATH_WAITING &&
676 p->state != PATH_RUNNING)
01f78473
LP
677 return;
678
ac155bb8 679 /* log_debug("inotify wakeup on %s.", u->id); */
01f78473 680
01f78473 681 LIST_FOREACH(spec, s, p->specs)
57020a3a 682 if (path_spec_owns_inotify_fd(s, fd))
01f78473
LP
683 break;
684
685 if (!s) {
686 log_error("Got event on unknown fd.");
687 goto fail;
688 }
689
57020a3a 690 changed = path_spec_fd_event(s, events);
4b562198 691 if (changed < 0)
01f78473 692 goto fail;
01f78473 693
672028dc
LP
694 /* If we are already running, then remember that one event was
695 * dispatched so that we restart the service only if something
696 * actually changed on disk */
697 p->inotify_triggered = true;
698
672028dc
LP
699 if (changed)
700 path_enter_running(p);
701 else
ac3f50ca 702 path_enter_waiting(p, false, true);
672028dc 703
01f78473
LP
704 return;
705
706fail:
cd43ca73 707 path_enter_dead(p, PATH_FAILURE_RESOURCES);
01f78473
LP
708}
709
3ecaa09b
LP
710static void path_trigger_notify(Unit *u, Unit *other) {
711 Path *p = PATH(u);
01f78473 712
3ecaa09b
LP
713 assert(u);
714 assert(other);
01f78473 715
3ecaa09b
LP
716 /* Invoked whenever the unit we trigger changes state or gains
717 * or loses a job */
01f78473 718
3ecaa09b
LP
719 if (other->load_state != UNIT_LOADED)
720 return;
01f78473 721
3ecaa09b
LP
722 if (p->state == PATH_RUNNING &&
723 UNIT_IS_INACTIVE_OR_FAILED(unit_active_state(other))) {
724 log_debug_unit(UNIT(p)->id,
725 "%s got notified about unit deactivation.",
726 UNIT(p)->id);
672028dc 727
3ecaa09b
LP
728 /* Hmm, so inotify was triggered since the
729 * last activation, so I guess we need to
730 * recheck what is going on. */
731 path_enter_waiting(p, false, p->inotify_triggered);
01f78473 732 }
01f78473
LP
733}
734
fdf20a31 735static void path_reset_failed(Unit *u) {
5632e374
LP
736 Path *p = PATH(u);
737
738 assert(p);
739
fdf20a31 740 if (p->state == PATH_FAILED)
5632e374
LP
741 path_set_state(p, PATH_DEAD);
742
cd43ca73 743 p->result = PATH_SUCCESS;
5632e374
LP
744}
745
01f78473
LP
746static const char* const path_state_table[_PATH_STATE_MAX] = {
747 [PATH_DEAD] = "dead",
748 [PATH_WAITING] = "waiting",
749 [PATH_RUNNING] = "running",
fdf20a31 750 [PATH_FAILED] = "failed"
01f78473
LP
751};
752
753DEFINE_STRING_TABLE_LOOKUP(path_state, PathState);
754
755static const char* const path_type_table[_PATH_TYPE_MAX] = {
756 [PATH_EXISTS] = "PathExists",
8092a428 757 [PATH_EXISTS_GLOB] = "PathExistsGlob",
01f78473 758 [PATH_CHANGED] = "PathChanged",
e9223856 759 [PATH_MODIFIED] = "PathModified",
01f78473
LP
760 [PATH_DIRECTORY_NOT_EMPTY] = "DirectoryNotEmpty"
761};
762
763DEFINE_STRING_TABLE_LOOKUP(path_type, PathType);
764
cd43ca73
LP
765static const char* const path_result_table[_PATH_RESULT_MAX] = {
766 [PATH_SUCCESS] = "success",
767 [PATH_FAILURE_RESOURCES] = "resources"
768};
769
770DEFINE_STRING_TABLE_LOOKUP(path_result, PathResult);
771
01f78473 772const UnitVTable path_vtable = {
7d17cfbc 773 .object_size = sizeof(Path),
f975e971
LP
774 .sections =
775 "Unit\0"
776 "Path\0"
777 "Install\0",
01f78473 778
0e456f97 779 .init = path_init,
01f78473
LP
780 .done = path_done,
781 .load = path_load,
782
783 .coldplug = path_coldplug,
784
785 .dump = path_dump,
786
787 .start = path_start,
788 .stop = path_stop,
789
790 .serialize = path_serialize,
791 .deserialize_item = path_deserialize_item,
792
793 .active_state = path_active_state,
794 .sub_state_to_string = path_sub_state_to_string,
795
796 .fd_event = path_fd_event,
797
3ecaa09b
LP
798 .trigger_notify = path_trigger_notify,
799
fdf20a31 800 .reset_failed = path_reset_failed,
5632e374 801
c4e2ceae 802 .bus_interface = "org.freedesktop.systemd1.Path",
cd43ca73
LP
803 .bus_message_handler = bus_path_message_handler,
804 .bus_invalidating_properties = bus_path_invalidating_properties
01f78473 805};