]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/core/path.c
util: don't dump /proc/cpuinfo contents in debug info
[thirdparty/systemd.git] / src / core / path.c
CommitLineData
01f78473
LP
1/***
2 This file is part of systemd.
3
4 Copyright 2010 Lennart Poettering
5
6 systemd is free software; you can redistribute it and/or modify it
5430f7f2
LP
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
01f78473
LP
9 (at your option) any later version.
10
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
5430f7f2 14 Lesser General Public License for more details.
01f78473 15
5430f7f2 16 You should have received a copy of the GNU Lesser General Public License
01f78473
LP
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
18***/
19
01f78473 20#include <errno.h>
07630cea
LP
21#include <sys/epoll.h>
22#include <sys/inotify.h>
01f78473
LP
23#include <unistd.h>
24
07630cea
LP
25#include "bus-error.h"
26#include "bus-util.h"
01f78473 27#include "dbus-path.h"
3ffd4af2 28#include "fd-util.h"
77601719 29#include "fs-util.h"
7d50b32a 30#include "glob-util.h"
f8c16f42 31#include "macro.h"
07630cea 32#include "mkdir.h"
3ffd4af2 33#include "path.h"
07630cea 34#include "special.h"
8fcde012 35#include "stat-util.h"
8b43440b 36#include "string-table.h"
07630cea
LP
37#include "string-util.h"
38#include "unit-name.h"
39#include "unit.h"
01f78473
LP
40
41static const UnitActiveState state_translation_table[_PATH_STATE_MAX] = {
42 [PATH_DEAD] = UNIT_INACTIVE,
43 [PATH_WAITING] = UNIT_ACTIVE,
44 [PATH_RUNNING] = UNIT_ACTIVE,
fdf20a31 45 [PATH_FAILED] = UNIT_FAILED
01f78473
LP
46};
47
718db961
LP
48static int path_dispatch_io(sd_event_source *source, int fd, uint32_t revents, void *userdata);
49
50int path_spec_watch(PathSpec *s, sd_event_io_handler_t handler) {
57020a3a 51
4b562198
MS
52 static const int flags_table[_PATH_TYPE_MAX] = {
53 [PATH_EXISTS] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB,
54 [PATH_EXISTS_GLOB] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB,
55 [PATH_CHANGED] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB|IN_CLOSE_WRITE|IN_CREATE|IN_DELETE|IN_MOVED_FROM|IN_MOVED_TO,
e9223856 56 [PATH_MODIFIED] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB|IN_CLOSE_WRITE|IN_CREATE|IN_DELETE|IN_MOVED_FROM|IN_MOVED_TO|IN_MODIFY,
4b562198
MS
57 [PATH_DIRECTORY_NOT_EMPTY] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB|IN_CREATE|IN_MOVED_TO
58 };
59
60 bool exists = false;
bc41f93e 61 char *slash, *oldslash = NULL;
4b562198 62 int r;
0e456f97 63
4b562198 64 assert(s);
718db961
LP
65 assert(s->unit);
66 assert(handler);
0e456f97 67
718db961 68 path_spec_unwatch(s);
4b562198 69
f8c16f42
ZJS
70 s->inotify_fd = inotify_init1(IN_NONBLOCK|IN_CLOEXEC);
71 if (s->inotify_fd < 0) {
4b562198
MS
72 r = -errno;
73 goto fail;
74 }
75
151b9b96 76 r = sd_event_add_io(s->unit->manager->event, &s->event_source, s->inotify_fd, EPOLLIN, handler, s);
f8c16f42 77 if (r < 0)
4b562198 78 goto fail;
4b562198 79
7dfbe2e3
TG
80 (void) sd_event_source_set_description(s->event_source, "path");
81
bc41f93e 82 /* This assumes the path was passed through path_kill_slashes()! */
4b562198 83
180d6802
MS
84 for (slash = strchr(s->path, '/'); ; slash = strchr(slash+1, '/')) {
85 char *cut = NULL;
4b562198 86 int flags;
bc41f93e
ZJS
87 char tmp;
88
89 if (slash) {
180d6802
MS
90 cut = slash + (slash == s->path);
91 tmp = *cut;
92 *cut = '\0';
93
bc41f93e 94 flags = IN_MOVE_SELF | IN_DELETE_SELF | IN_ATTRIB | IN_CREATE | IN_MOVED_TO;
180d6802 95 } else
bc41f93e 96 flags = flags_table[s->type];
4b562198 97
180d6802 98 r = inotify_add_watch(s->inotify_fd, s->path, flags);
bc41f93e 99 if (r < 0) {
180d6802
MS
100 if (errno == EACCES || errno == ENOENT) {
101 if (cut)
102 *cut = tmp;
bc41f93e 103 break;
180d6802 104 }
4b562198 105
f2341e0a 106 r = log_warning_errno(errno, "Failed to add watch on %s: %s", s->path, errno == ENOSPC ? "too many watches" : strerror(-r));
180d6802
MS
107 if (cut)
108 *cut = tmp;
28a79bd2 109 goto fail;
bc41f93e
ZJS
110 } else {
111 exists = true;
112
edfd706d 113 /* Path exists, we don't need to watch parent too closely. */
bc41f93e 114 if (oldslash) {
180d6802
MS
115 char *cut2 = oldslash + (oldslash == s->path);
116 char tmp2 = *cut2;
117 *cut2 = '\0';
bc41f93e 118
edfd706d
ZJS
119 (void) inotify_add_watch(s->inotify_fd, s->path, IN_MOVE_SELF);
120 /* Error is ignored, the worst can happen is we get spurious events. */
bc41f93e 121
180d6802 122 *cut2 = tmp2;
bc41f93e 123 }
28a79bd2 124 }
bc41f93e 125
180d6802
MS
126 if (cut)
127 *cut = tmp;
128
129 if (slash)
bc41f93e 130 oldslash = slash;
180d6802 131 else {
bc41f93e
ZJS
132 /* whole path has been iterated over */
133 s->primary_wd = r;
134 break;
135 }
136 }
137
28a79bd2 138 if (!exists) {
f2341e0a
LP
139 r = log_error_errno(errno, "Failed to add watch on any of the components of %s: %m", s->path);
140 /* either EACCESS or ENOENT */
28a79bd2
ZJS
141 goto fail;
142 }
143
4b562198
MS
144 return 0;
145
146fail:
718db961 147 path_spec_unwatch(s);
4b562198 148 return r;
0e456f97
LP
149}
150
718db961
LP
151void path_spec_unwatch(PathSpec *s) {
152 assert(s);
62347bc2 153
718db961 154 s->event_source = sd_event_source_unref(s->event_source);
03e334a1 155 s->inotify_fd = safe_close(s->inotify_fd);
62347bc2
LP
156}
157
718db961 158int path_spec_fd_event(PathSpec *s, uint32_t revents) {
0254e944 159 union inotify_event_buffer buffer;
4b562198 160 struct inotify_event *e;
f7c1ad4f 161 ssize_t l;
4b562198
MS
162 int r = 0;
163
718db961 164 if (revents != EPOLLIN) {
15f55e80 165 log_error("Got invalid poll event on inotify.");
a163db44 166 return -EINVAL;
4b562198
MS
167 }
168
0254e944 169 l = read(s->inotify_fd, &buffer, sizeof(buffer));
f7c1ad4f
LP
170 if (l < 0) {
171 if (errno == EAGAIN || errno == EINTR)
172 return 0;
4b562198 173
4a62c710 174 return log_error_errno(errno, "Failed to read inotify event: %m");
f7c1ad4f 175 }
4b562198 176
f7c1ad4f 177 FOREACH_INOTIFY_EVENT(e, buffer, l) {
714d943f
MS
178 if ((s->type == PATH_CHANGED || s->type == PATH_MODIFIED) &&
179 s->primary_wd == e->wd)
4b562198 180 r = 1;
4b562198 181 }
a163db44 182
4b562198
MS
183 return r;
184}
185
57020a3a 186static bool path_spec_check_good(PathSpec *s, bool initial) {
4b562198
MS
187 bool good = false;
188
189 switch (s->type) {
190
191 case PATH_EXISTS:
192 good = access(s->path, F_OK) >= 0;
193 break;
194
195 case PATH_EXISTS_GLOB:
196 good = glob_exists(s->path) > 0;
197 break;
198
199 case PATH_DIRECTORY_NOT_EMPTY: {
200 int k;
201
202 k = dir_is_empty(s->path);
203 good = !(k == -ENOENT || k > 0);
204 break;
205 }
206
714d943f
MS
207 case PATH_CHANGED:
208 case PATH_MODIFIED: {
4b562198
MS
209 bool b;
210
211 b = access(s->path, F_OK) >= 0;
212 good = !initial && b != s->previous_exists;
213 s->previous_exists = b;
214 break;
215 }
216
217 default:
218 ;
219 }
220
221 return good;
222}
223
57020a3a 224static void path_spec_mkdir(PathSpec *s, mode_t mode) {
4b562198
MS
225 int r;
226
227 if (s->type == PATH_EXISTS || s->type == PATH_EXISTS_GLOB)
228 return;
229
15f55e80
ZJS
230 r = mkdir_p_label(s->path, mode);
231 if (r < 0)
da927ba9 232 log_warning_errno(r, "mkdir(%s) failed: %m", s->path);
4b562198
MS
233}
234
57020a3a 235static void path_spec_dump(PathSpec *s, FILE *f, const char *prefix) {
4b562198
MS
236 fprintf(f,
237 "%s%s: %s\n",
238 prefix,
239 path_type_to_string(s->type),
240 s->path);
241}
242
57020a3a
LP
243void path_spec_done(PathSpec *s) {
244 assert(s);
4b562198 245 assert(s->inotify_fd == -1);
57020a3a 246
4b562198
MS
247 free(s->path);
248}
249
250static void path_init(Unit *u) {
251 Path *p = PATH(u);
252
253 assert(u);
ac155bb8 254 assert(u->load_state == UNIT_STUB);
4b562198
MS
255
256 p->directory_mode = 0755;
257}
258
74051b9b 259void path_free_specs(Path *p) {
01f78473
LP
260 PathSpec *s;
261
262 assert(p);
263
264 while ((s = p->specs)) {
718db961 265 path_spec_unwatch(s);
71fda00f 266 LIST_REMOVE(spec, p->specs, s);
57020a3a 267 path_spec_done(s);
01f78473
LP
268 free(s);
269 }
270}
271
74051b9b
LP
272static void path_done(Unit *u) {
273 Path *p = PATH(u);
274
275 assert(p);
276
74051b9b
LP
277 path_free_specs(p);
278}
279
a57f7e2c 280static int path_add_mount_links(Path *p) {
01f78473
LP
281 PathSpec *s;
282 int r;
283
284 assert(p);
01f78473
LP
285
286 LIST_FOREACH(spec, s, p->specs) {
a57f7e2c 287 r = unit_require_mounts_for(UNIT(p), s->path);
e0207c8d 288 if (r < 0)
01f78473 289 return r;
e0207c8d 290 }
01f78473
LP
291
292 return 0;
293}
294
295static int path_verify(Path *p) {
296 assert(p);
297
1124fe6f 298 if (UNIT(p)->load_state != UNIT_LOADED)
01f78473
LP
299 return 0;
300
301 if (!p->specs) {
f2341e0a 302 log_unit_error(UNIT(p), "Path unit lacks path setting. Refusing.");
01f78473
LP
303 return -EINVAL;
304 }
305
306 return 0;
307}
308
6c155fe3
LP
309static int path_add_default_dependencies(Path *p) {
310 int r;
311
312 assert(p);
313
4c9ea260
LP
314 if (!UNIT(p)->default_dependencies)
315 return 0;
316
317 r = unit_add_dependency_by_name(UNIT(p), UNIT_BEFORE, SPECIAL_PATHS_TARGET, NULL, true);
e3d84721
LP
318 if (r < 0)
319 return r;
2a77d31d 320
463d0d15 321 if (MANAGER_IS_SYSTEM(UNIT(p)->manager)) {
4c9ea260 322 r = unit_add_two_dependencies_by_name(UNIT(p), UNIT_AFTER, UNIT_REQUIRES, SPECIAL_SYSINIT_TARGET, NULL, true);
e0207c8d 323 if (r < 0)
6c155fe3 324 return r;
2a77d31d 325 }
6c155fe3 326
4c9ea260 327 return unit_add_two_dependencies_by_name(UNIT(p), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, NULL, true);
6c155fe3
LP
328}
329
01f78473
LP
330static int path_load(Unit *u) {
331 Path *p = PATH(u);
332 int r;
333
334 assert(u);
ac155bb8 335 assert(u->load_state == UNIT_STUB);
01f78473 336
e0207c8d
ZJS
337 r = unit_load_fragment_and_dropin(u);
338 if (r < 0)
01f78473
LP
339 return r;
340
ac155bb8 341 if (u->load_state == UNIT_LOADED) {
01f78473 342
3ecaa09b 343 if (set_isempty(u->dependencies[UNIT_TRIGGERS])) {
57020a3a
LP
344 Unit *x;
345
346 r = unit_load_related_unit(u, ".service", &x);
347 if (r < 0)
01f78473
LP
348 return r;
349
3ecaa09b
LP
350 r = unit_add_two_dependencies(u, UNIT_BEFORE, UNIT_TRIGGERS, x, true);
351 if (r < 0)
352 return r;
57020a3a
LP
353 }
354
e0207c8d
ZJS
355 r = path_add_mount_links(p);
356 if (r < 0)
01f78473 357 return r;
a40eb732 358
4c9ea260
LP
359 r = path_add_default_dependencies(p);
360 if (r < 0)
361 return r;
01f78473
LP
362 }
363
364 return path_verify(p);
365}
366
367static void path_dump(Unit *u, FILE *f, const char *prefix) {
368 Path *p = PATH(u);
3ecaa09b 369 Unit *trigger;
01f78473
LP
370 PathSpec *s;
371
e364ad06
LP
372 assert(p);
373 assert(f);
01f78473 374
3ecaa09b
LP
375 trigger = UNIT_TRIGGER(u);
376
01f78473
LP
377 fprintf(f,
378 "%sPath State: %s\n"
cd43ca73 379 "%sResult: %s\n"
0e456f97
LP
380 "%sUnit: %s\n"
381 "%sMakeDirectory: %s\n"
382 "%sDirectoryMode: %04o\n",
01f78473 383 prefix, path_state_to_string(p->state),
cd43ca73 384 prefix, path_result_to_string(p->result),
3ecaa09b 385 prefix, trigger ? trigger->id : "n/a",
0e456f97
LP
386 prefix, yes_no(p->make_directory),
387 prefix, p->directory_mode);
01f78473
LP
388
389 LIST_FOREACH(spec, s, p->specs)
57020a3a 390 path_spec_dump(s, f, prefix);
01f78473
LP
391}
392
393static void path_unwatch(Path *p) {
394 PathSpec *s;
395
396 assert(p);
397
398 LIST_FOREACH(spec, s, p->specs)
718db961 399 path_spec_unwatch(s);
01f78473
LP
400}
401
402static int path_watch(Path *p) {
403 int r;
404 PathSpec *s;
405
406 assert(p);
407
e0207c8d 408 LIST_FOREACH(spec, s, p->specs) {
718db961 409 r = path_spec_watch(s, path_dispatch_io);
e0207c8d 410 if (r < 0)
01f78473 411 return r;
e0207c8d 412 }
01f78473
LP
413
414 return 0;
415}
416
417static void path_set_state(Path *p, PathState state) {
418 PathState old_state;
419 assert(p);
420
421 old_state = p->state;
422 p->state = state;
423
672028dc
LP
424 if (state != PATH_WAITING &&
425 (state != PATH_RUNNING || p->inotify_triggered))
01f78473
LP
426 path_unwatch(p);
427
428 if (state != old_state)
3541bf1f 429 log_unit_debug(UNIT(p), "Changed %s -> %s", path_state_to_string(old_state), path_state_to_string(state));
01f78473 430
e2f3b44c 431 unit_notify(UNIT(p), state_translation_table[old_state], state_translation_table[state], true);
01f78473
LP
432}
433
ac3f50ca 434static void path_enter_waiting(Path *p, bool initial, bool recheck);
01f78473 435
be847e82 436static int path_coldplug(Unit *u) {
01f78473
LP
437 Path *p = PATH(u);
438
439 assert(p);
440 assert(p->state == PATH_DEAD);
441
442 if (p->deserialized_state != p->state) {
443
444 if (p->deserialized_state == PATH_WAITING ||
be847e82
LP
445 p->deserialized_state == PATH_RUNNING)
446 path_enter_waiting(p, true, true);
447 else
01f78473
LP
448 path_set_state(p, p->deserialized_state);
449 }
450
451 return 0;
452}
453
cd43ca73 454static void path_enter_dead(Path *p, PathResult f) {
01f78473
LP
455 assert(p);
456
cd43ca73
LP
457 if (f != PATH_SUCCESS)
458 p->result = f;
01f78473 459
cd43ca73 460 path_set_state(p, p->result != PATH_SUCCESS ? PATH_FAILED : PATH_DEAD);
01f78473
LP
461}
462
463static void path_enter_running(Path *p) {
4afd3348 464 _cleanup_(sd_bus_error_free) sd_bus_error error = SD_BUS_ERROR_NULL;
e903182e 465 Unit *trigger;
01f78473 466 int r;
398ef8ba 467
01f78473 468 assert(p);
3ecaa09b 469
ba3e67a7 470 /* Don't start job if we are supposed to go down */
31afa0a4 471 if (unit_stop_pending(UNIT(p)))
ba3e67a7
LP
472 return;
473
e903182e
LP
474 trigger = UNIT_TRIGGER(UNIT(p));
475 if (!trigger) {
476 log_unit_error(UNIT(p), "Unit to trigger vanished.");
9e4942ed 477 path_enter_dead(p, PATH_FAILURE_RESOURCES);
e903182e
LP
478 return;
479 }
480
481 r = manager_add_job(UNIT(p)->manager, JOB_START, trigger, JOB_REPLACE, &error, NULL);
e0207c8d 482 if (r < 0)
01f78473
LP
483 goto fail;
484
672028dc
LP
485 p->inotify_triggered = false;
486
e0207c8d
ZJS
487 r = path_watch(p);
488 if (r < 0)
672028dc
LP
489 goto fail;
490
01f78473
LP
491 path_set_state(p, PATH_RUNNING);
492 return;
493
494fail:
f2341e0a 495 log_unit_warning(UNIT(p), "Failed to queue unit startup job: %s", bus_error_message(&error, r));
cd43ca73 496 path_enter_dead(p, PATH_FAILURE_RESOURCES);
01f78473
LP
497}
498
ac3f50ca 499static bool path_check_good(Path *p, bool initial) {
01f78473 500 PathSpec *s;
01f78473
LP
501 bool good = false;
502
ac3f50ca 503 assert(p);
672028dc 504
01f78473 505 LIST_FOREACH(spec, s, p->specs) {
57020a3a 506 good = path_spec_check_good(s, initial);
01f78473
LP
507
508 if (good)
509 break;
510 }
511
ac3f50ca
LP
512 return good;
513}
01f78473 514
ac3f50ca
LP
515static void path_enter_waiting(Path *p, bool initial, bool recheck) {
516 int r;
0595f9a1 517
ac3f50ca
LP
518 if (recheck)
519 if (path_check_good(p, initial)) {
f2341e0a 520 log_unit_debug(UNIT(p), "Got triggered.");
ac3f50ca
LP
521 path_enter_running(p);
522 return;
523 }
524
e0207c8d
ZJS
525 r = path_watch(p);
526 if (r < 0)
ac3f50ca
LP
527 goto fail;
528
529 /* Hmm, so now we have created inotify watches, but the file
530 * might have appeared/been removed by now, so we must
531 * recheck */
532
533 if (recheck)
534 if (path_check_good(p, false)) {
f2341e0a 535 log_unit_debug(UNIT(p), "Got triggered.");
ac3f50ca
LP
536 path_enter_running(p);
537 return;
538 }
01f78473
LP
539
540 path_set_state(p, PATH_WAITING);
541 return;
542
543fail:
f2341e0a 544 log_unit_warning_errno(UNIT(p), r, "Failed to enter waiting state: %m");
cd43ca73 545 path_enter_dead(p, PATH_FAILURE_RESOURCES);
01f78473
LP
546}
547
0e456f97
LP
548static void path_mkdir(Path *p) {
549 PathSpec *s;
550
551 assert(p);
552
553 if (!p->make_directory)
554 return;
555
4b562198 556 LIST_FOREACH(spec, s, p->specs)
57020a3a 557 path_spec_mkdir(s, p->directory_mode);
0e456f97
LP
558}
559
01f78473
LP
560static int path_start(Unit *u) {
561 Path *p = PATH(u);
e903182e 562 Unit *trigger;
01f78473
LP
563
564 assert(p);
fdf20a31 565 assert(p->state == PATH_DEAD || p->state == PATH_FAILED);
01f78473 566
e903182e
LP
567 trigger = UNIT_TRIGGER(u);
568 if (!trigger || trigger->load_state != UNIT_LOADED) {
569 log_unit_error(u, "Refusing to start, unit to trigger not loaded.");
01f78473 570 return -ENOENT;
e903182e 571 }
01f78473 572
0e456f97
LP
573 path_mkdir(p);
574
cd43ca73 575 p->result = PATH_SUCCESS;
ac3f50ca 576 path_enter_waiting(p, true, true);
00dc5d76 577
82a2b6bb 578 return 1;
01f78473
LP
579}
580
581static int path_stop(Unit *u) {
582 Path *p = PATH(u);
583
584 assert(p);
585 assert(p->state == PATH_WAITING || p->state == PATH_RUNNING);
586
cd43ca73 587 path_enter_dead(p, PATH_SUCCESS);
82a2b6bb 588 return 1;
01f78473
LP
589}
590
591static int path_serialize(Unit *u, FILE *f, FDSet *fds) {
592 Path *p = PATH(u);
593
594 assert(u);
595 assert(f);
596 assert(fds);
597
598 unit_serialize_item(u, f, "state", path_state_to_string(p->state));
cd43ca73 599 unit_serialize_item(u, f, "result", path_result_to_string(p->result));
01f78473
LP
600
601 return 0;
602}
603
604static int path_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
605 Path *p = PATH(u);
606
607 assert(u);
608 assert(key);
609 assert(value);
610 assert(fds);
611
612 if (streq(key, "state")) {
613 PathState state;
614
e0207c8d
ZJS
615 state = path_state_from_string(value);
616 if (state < 0)
f2341e0a 617 log_unit_debug(u, "Failed to parse state value: %s", value);
01f78473
LP
618 else
619 p->deserialized_state = state;
cd43ca73
LP
620
621 } else if (streq(key, "result")) {
622 PathResult f;
623
624 f = path_result_from_string(value);
625 if (f < 0)
f2341e0a 626 log_unit_debug(u, "Failed to parse result value: %s", value);
cd43ca73
LP
627 else if (f != PATH_SUCCESS)
628 p->result = f;
629
01f78473 630 } else
f2341e0a 631 log_unit_debug(u, "Unknown serialization key: %s", key);
01f78473
LP
632
633 return 0;
634}
635
44a6b1b6 636_pure_ static UnitActiveState path_active_state(Unit *u) {
01f78473
LP
637 assert(u);
638
639 return state_translation_table[PATH(u)->state];
640}
641
44a6b1b6 642_pure_ static const char *path_sub_state_to_string(Unit *u) {
01f78473
LP
643 assert(u);
644
645 return path_state_to_string(PATH(u)->state);
646}
647
718db961
LP
648static int path_dispatch_io(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
649 PathSpec *s = userdata;
650 Path *p;
4b562198 651 int changed;
01f78473 652
718db961
LP
653 assert(s);
654 assert(s->unit);
01f78473
LP
655 assert(fd >= 0);
656
718db961
LP
657 p = PATH(s->unit);
658
672028dc
LP
659 if (p->state != PATH_WAITING &&
660 p->state != PATH_RUNNING)
718db961 661 return 0;
01f78473 662
ac155bb8 663 /* log_debug("inotify wakeup on %s.", u->id); */
01f78473 664
01f78473 665 LIST_FOREACH(spec, s, p->specs)
57020a3a 666 if (path_spec_owns_inotify_fd(s, fd))
01f78473
LP
667 break;
668
669 if (!s) {
670 log_error("Got event on unknown fd.");
671 goto fail;
672 }
673
718db961 674 changed = path_spec_fd_event(s, revents);
4b562198 675 if (changed < 0)
01f78473 676 goto fail;
01f78473 677
672028dc
LP
678 /* If we are already running, then remember that one event was
679 * dispatched so that we restart the service only if something
680 * actually changed on disk */
681 p->inotify_triggered = true;
682
672028dc
LP
683 if (changed)
684 path_enter_running(p);
685 else
ac3f50ca 686 path_enter_waiting(p, false, true);
672028dc 687
718db961 688 return 0;
01f78473
LP
689
690fail:
cd43ca73 691 path_enter_dead(p, PATH_FAILURE_RESOURCES);
718db961 692 return 0;
01f78473
LP
693}
694
3ecaa09b
LP
695static void path_trigger_notify(Unit *u, Unit *other) {
696 Path *p = PATH(u);
01f78473 697
3ecaa09b
LP
698 assert(u);
699 assert(other);
01f78473 700
3ecaa09b
LP
701 /* Invoked whenever the unit we trigger changes state or gains
702 * or loses a job */
01f78473 703
3ecaa09b
LP
704 if (other->load_state != UNIT_LOADED)
705 return;
01f78473 706
3ecaa09b
LP
707 if (p->state == PATH_RUNNING &&
708 UNIT_IS_INACTIVE_OR_FAILED(unit_active_state(other))) {
f2341e0a 709 log_unit_debug(UNIT(p), "Got notified about unit deactivation.");
672028dc 710
3ecaa09b
LP
711 /* Hmm, so inotify was triggered since the
712 * last activation, so I guess we need to
713 * recheck what is going on. */
714 path_enter_waiting(p, false, p->inotify_triggered);
01f78473 715 }
01f78473
LP
716}
717
fdf20a31 718static void path_reset_failed(Unit *u) {
5632e374
LP
719 Path *p = PATH(u);
720
721 assert(p);
722
fdf20a31 723 if (p->state == PATH_FAILED)
5632e374
LP
724 path_set_state(p, PATH_DEAD);
725
cd43ca73 726 p->result = PATH_SUCCESS;
5632e374
LP
727}
728
01f78473
LP
729static const char* const path_type_table[_PATH_TYPE_MAX] = {
730 [PATH_EXISTS] = "PathExists",
8092a428 731 [PATH_EXISTS_GLOB] = "PathExistsGlob",
2c5859af 732 [PATH_DIRECTORY_NOT_EMPTY] = "DirectoryNotEmpty",
01f78473 733 [PATH_CHANGED] = "PathChanged",
e9223856 734 [PATH_MODIFIED] = "PathModified",
01f78473
LP
735};
736
737DEFINE_STRING_TABLE_LOOKUP(path_type, PathType);
738
cd43ca73
LP
739static const char* const path_result_table[_PATH_RESULT_MAX] = {
740 [PATH_SUCCESS] = "success",
2c5859af 741 [PATH_FAILURE_RESOURCES] = "resources",
cd43ca73
LP
742};
743
744DEFINE_STRING_TABLE_LOOKUP(path_result, PathResult);
745
01f78473 746const UnitVTable path_vtable = {
7d17cfbc 747 .object_size = sizeof(Path),
718db961 748
f975e971
LP
749 .sections =
750 "Unit\0"
751 "Path\0"
752 "Install\0",
01f78473 753
0e456f97 754 .init = path_init,
01f78473
LP
755 .done = path_done,
756 .load = path_load,
757
758 .coldplug = path_coldplug,
759
760 .dump = path_dump,
761
762 .start = path_start,
763 .stop = path_stop,
764
765 .serialize = path_serialize,
766 .deserialize_item = path_deserialize_item,
767
768 .active_state = path_active_state,
769 .sub_state_to_string = path_sub_state_to_string,
770
3ecaa09b
LP
771 .trigger_notify = path_trigger_notify,
772
fdf20a31 773 .reset_failed = path_reset_failed,
5632e374 774
aec8de63 775 .bus_vtable = bus_path_vtable
01f78473 776};