]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/core/path.c
treewide: use log_*_errno whenever %m is in the format string
[thirdparty/systemd.git] / src / core / path.c
CommitLineData
d6c9574f 1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
01f78473
LP
2
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
5430f7f2
LP
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
01f78473
LP
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
5430f7f2 16 Lesser General Public License for more details.
01f78473 17
5430f7f2 18 You should have received a copy of the GNU Lesser General Public License
01f78473
LP
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
22#include <sys/inotify.h>
23#include <sys/epoll.h>
24#include <sys/ioctl.h>
25#include <errno.h>
26#include <unistd.h>
27
28#include "unit.h"
29#include "unit-name.h"
30#include "path.h"
49e942b2 31#include "mkdir.h"
01f78473 32#include "dbus-path.h"
a40eb732 33#include "special.h"
9eb977db 34#include "path-util.h"
f8c16f42 35#include "macro.h"
718db961
LP
36#include "bus-util.h"
37#include "bus-error.h"
01f78473
LP
38
39static const UnitActiveState state_translation_table[_PATH_STATE_MAX] = {
40 [PATH_DEAD] = UNIT_INACTIVE,
41 [PATH_WAITING] = UNIT_ACTIVE,
42 [PATH_RUNNING] = UNIT_ACTIVE,
fdf20a31 43 [PATH_FAILED] = UNIT_FAILED
01f78473
LP
44};
45
718db961
LP
46static int path_dispatch_io(sd_event_source *source, int fd, uint32_t revents, void *userdata);
47
48int path_spec_watch(PathSpec *s, sd_event_io_handler_t handler) {
57020a3a 49
4b562198
MS
50 static const int flags_table[_PATH_TYPE_MAX] = {
51 [PATH_EXISTS] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB,
52 [PATH_EXISTS_GLOB] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB,
53 [PATH_CHANGED] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB|IN_CLOSE_WRITE|IN_CREATE|IN_DELETE|IN_MOVED_FROM|IN_MOVED_TO,
e9223856 54 [PATH_MODIFIED] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB|IN_CLOSE_WRITE|IN_CREATE|IN_DELETE|IN_MOVED_FROM|IN_MOVED_TO|IN_MODIFY,
4b562198
MS
55 [PATH_DIRECTORY_NOT_EMPTY] = IN_DELETE_SELF|IN_MOVE_SELF|IN_ATTRIB|IN_CREATE|IN_MOVED_TO
56 };
57
58 bool exists = false;
bc41f93e 59 char *slash, *oldslash = NULL;
4b562198 60 int r;
0e456f97 61
4b562198 62 assert(s);
718db961
LP
63 assert(s->unit);
64 assert(handler);
0e456f97 65
718db961 66 path_spec_unwatch(s);
4b562198 67
f8c16f42
ZJS
68 s->inotify_fd = inotify_init1(IN_NONBLOCK|IN_CLOEXEC);
69 if (s->inotify_fd < 0) {
4b562198
MS
70 r = -errno;
71 goto fail;
72 }
73
151b9b96 74 r = sd_event_add_io(s->unit->manager->event, &s->event_source, s->inotify_fd, EPOLLIN, handler, s);
f8c16f42 75 if (r < 0)
4b562198 76 goto fail;
4b562198 77
bc41f93e 78 /* This assumes the path was passed through path_kill_slashes()! */
4b562198 79
180d6802
MS
80 for (slash = strchr(s->path, '/'); ; slash = strchr(slash+1, '/')) {
81 char *cut = NULL;
4b562198 82 int flags;
bc41f93e
ZJS
83 char tmp;
84
85 if (slash) {
180d6802
MS
86 cut = slash + (slash == s->path);
87 tmp = *cut;
88 *cut = '\0';
89
bc41f93e 90 flags = IN_MOVE_SELF | IN_DELETE_SELF | IN_ATTRIB | IN_CREATE | IN_MOVED_TO;
180d6802 91 } else
bc41f93e 92 flags = flags_table[s->type];
4b562198 93
180d6802 94 r = inotify_add_watch(s->inotify_fd, s->path, flags);
bc41f93e 95 if (r < 0) {
180d6802
MS
96 if (errno == EACCES || errno == ENOENT) {
97 if (cut)
98 *cut = tmp;
bc41f93e 99 break;
180d6802 100 }
4b562198 101
18abe7bd
ZJS
102 log_warning("Failed to add watch on %s: %s", s->path,
103 errno == ENOSPC ? "too many watches" : strerror(-r));
28a79bd2 104 r = -errno;
180d6802
MS
105 if (cut)
106 *cut = tmp;
28a79bd2 107 goto fail;
bc41f93e
ZJS
108 } else {
109 exists = true;
110
111 /* Path exists, we don't need to watch parent
112 too closely. */
113 if (oldslash) {
180d6802
MS
114 char *cut2 = oldslash + (oldslash == s->path);
115 char tmp2 = *cut2;
116 *cut2 = '\0';
bc41f93e 117
180d6802 118 inotify_add_watch(s->inotify_fd, s->path, IN_MOVE_SELF);
bc41f93e
ZJS
119 /* Error is ignored, the worst can happen is
120 we get spurious events. */
121
180d6802 122 *cut2 = tmp2;
bc41f93e 123 }
28a79bd2 124 }
bc41f93e 125
180d6802
MS
126 if (cut)
127 *cut = tmp;
128
129 if (slash)
bc41f93e 130 oldslash = slash;
180d6802 131 else {
bc41f93e
ZJS
132 /* whole path has been iterated over */
133 s->primary_wd = r;
134 break;
135 }
136 }
137
28a79bd2 138 if (!exists) {
56f64d95 139 log_error_errno(errno, "Failed to add watch on any of the components of %s: %m",
28a79bd2 140 s->path);
bc41f93e 141 r = -errno; /* either EACCESS or ENOENT */
28a79bd2
ZJS
142 goto fail;
143 }
144
4b562198
MS
145 return 0;
146
147fail:
718db961 148 path_spec_unwatch(s);
4b562198 149 return r;
0e456f97
LP
150}
151
718db961
LP
152void path_spec_unwatch(PathSpec *s) {
153 assert(s);
62347bc2 154
718db961 155 s->event_source = sd_event_source_unref(s->event_source);
03e334a1 156 s->inotify_fd = safe_close(s->inotify_fd);
62347bc2
LP
157}
158
718db961 159int path_spec_fd_event(PathSpec *s, uint32_t revents) {
7fd1b19b 160 _cleanup_free_ uint8_t *buf = NULL;
4b562198
MS
161 struct inotify_event *e;
162 ssize_t k;
163 int l;
164 int r = 0;
165
718db961 166 if (revents != EPOLLIN) {
15f55e80 167 log_error("Got invalid poll event on inotify.");
a163db44 168 return -EINVAL;
4b562198
MS
169 }
170
171 if (ioctl(s->inotify_fd, FIONREAD, &l) < 0) {
56f64d95 172 log_error_errno(errno, "FIONREAD failed: %m");
a163db44 173 return -errno;
4b562198
MS
174 }
175
176 assert(l > 0);
177
15f55e80 178 buf = malloc(l);
a163db44
ZJS
179 if (!buf)
180 return log_oom();
4b562198 181
15f55e80
ZJS
182 k = read(s->inotify_fd, buf, l);
183 if (k < 0) {
56f64d95 184 log_error_errno(errno, "Failed to read inotify event: %m");
a163db44 185 return -errno;
4b562198
MS
186 }
187
188 e = (struct inotify_event*) buf;
189
190 while (k > 0) {
191 size_t step;
192
714d943f
MS
193 if ((s->type == PATH_CHANGED || s->type == PATH_MODIFIED) &&
194 s->primary_wd == e->wd)
4b562198
MS
195 r = 1;
196
197 step = sizeof(struct inotify_event) + e->len;
198 assert(step <= (size_t) k);
199
200 e = (struct inotify_event*) ((uint8_t*) e + step);
201 k -= step;
202 }
a163db44 203
4b562198
MS
204 return r;
205}
206
57020a3a 207static bool path_spec_check_good(PathSpec *s, bool initial) {
4b562198
MS
208 bool good = false;
209
210 switch (s->type) {
211
212 case PATH_EXISTS:
213 good = access(s->path, F_OK) >= 0;
214 break;
215
216 case PATH_EXISTS_GLOB:
217 good = glob_exists(s->path) > 0;
218 break;
219
220 case PATH_DIRECTORY_NOT_EMPTY: {
221 int k;
222
223 k = dir_is_empty(s->path);
224 good = !(k == -ENOENT || k > 0);
225 break;
226 }
227
714d943f
MS
228 case PATH_CHANGED:
229 case PATH_MODIFIED: {
4b562198
MS
230 bool b;
231
232 b = access(s->path, F_OK) >= 0;
233 good = !initial && b != s->previous_exists;
234 s->previous_exists = b;
235 break;
236 }
237
238 default:
239 ;
240 }
241
242 return good;
243}
244
57020a3a 245static void path_spec_mkdir(PathSpec *s, mode_t mode) {
4b562198
MS
246 int r;
247
248 if (s->type == PATH_EXISTS || s->type == PATH_EXISTS_GLOB)
249 return;
250
15f55e80
ZJS
251 r = mkdir_p_label(s->path, mode);
252 if (r < 0)
da927ba9 253 log_warning_errno(r, "mkdir(%s) failed: %m", s->path);
4b562198
MS
254}
255
57020a3a 256static void path_spec_dump(PathSpec *s, FILE *f, const char *prefix) {
4b562198
MS
257 fprintf(f,
258 "%s%s: %s\n",
259 prefix,
260 path_type_to_string(s->type),
261 s->path);
262}
263
57020a3a
LP
264void path_spec_done(PathSpec *s) {
265 assert(s);
4b562198 266 assert(s->inotify_fd == -1);
57020a3a 267
4b562198
MS
268 free(s->path);
269}
270
271static void path_init(Unit *u) {
272 Path *p = PATH(u);
273
274 assert(u);
ac155bb8 275 assert(u->load_state == UNIT_STUB);
4b562198
MS
276
277 p->directory_mode = 0755;
278}
279
74051b9b 280void path_free_specs(Path *p) {
01f78473
LP
281 PathSpec *s;
282
283 assert(p);
284
285 while ((s = p->specs)) {
718db961 286 path_spec_unwatch(s);
71fda00f 287 LIST_REMOVE(spec, p->specs, s);
57020a3a 288 path_spec_done(s);
01f78473
LP
289 free(s);
290 }
291}
292
74051b9b
LP
293static void path_done(Unit *u) {
294 Path *p = PATH(u);
295
296 assert(p);
297
74051b9b
LP
298 path_free_specs(p);
299}
300
a57f7e2c 301static int path_add_mount_links(Path *p) {
01f78473
LP
302 PathSpec *s;
303 int r;
304
305 assert(p);
01f78473
LP
306
307 LIST_FOREACH(spec, s, p->specs) {
a57f7e2c 308 r = unit_require_mounts_for(UNIT(p), s->path);
e0207c8d 309 if (r < 0)
01f78473 310 return r;
e0207c8d 311 }
01f78473
LP
312
313 return 0;
314}
315
316static int path_verify(Path *p) {
317 assert(p);
318
1124fe6f 319 if (UNIT(p)->load_state != UNIT_LOADED)
01f78473
LP
320 return 0;
321
322 if (!p->specs) {
79008bdd 323 log_unit_error(UNIT(p)->id,
66870f90 324 "%s lacks path setting. Refusing.", UNIT(p)->id);
01f78473
LP
325 return -EINVAL;
326 }
327
328 return 0;
329}
330
6c155fe3
LP
331static int path_add_default_dependencies(Path *p) {
332 int r;
333
334 assert(p);
335
e3d84721
LP
336 r = unit_add_dependency_by_name(UNIT(p), UNIT_BEFORE,
337 SPECIAL_PATHS_TARGET, NULL, true);
338 if (r < 0)
339 return r;
2a77d31d 340
e3d84721 341 if (UNIT(p)->manager->running_as == SYSTEMD_SYSTEM) {
e0207c8d
ZJS
342 r = unit_add_two_dependencies_by_name(UNIT(p), UNIT_AFTER, UNIT_REQUIRES,
343 SPECIAL_SYSINIT_TARGET, NULL, true);
344 if (r < 0)
6c155fe3 345 return r;
2a77d31d 346 }
6c155fe3 347
e0207c8d
ZJS
348 return unit_add_two_dependencies_by_name(UNIT(p), UNIT_BEFORE, UNIT_CONFLICTS,
349 SPECIAL_SHUTDOWN_TARGET, NULL, true);
6c155fe3
LP
350}
351
01f78473
LP
352static int path_load(Unit *u) {
353 Path *p = PATH(u);
354 int r;
355
356 assert(u);
ac155bb8 357 assert(u->load_state == UNIT_STUB);
01f78473 358
e0207c8d
ZJS
359 r = unit_load_fragment_and_dropin(u);
360 if (r < 0)
01f78473
LP
361 return r;
362
ac155bb8 363 if (u->load_state == UNIT_LOADED) {
01f78473 364
3ecaa09b 365 if (set_isempty(u->dependencies[UNIT_TRIGGERS])) {
57020a3a
LP
366 Unit *x;
367
368 r = unit_load_related_unit(u, ".service", &x);
369 if (r < 0)
01f78473
LP
370 return r;
371
3ecaa09b
LP
372 r = unit_add_two_dependencies(u, UNIT_BEFORE, UNIT_TRIGGERS, x, true);
373 if (r < 0)
374 return r;
57020a3a
LP
375 }
376
e0207c8d
ZJS
377 r = path_add_mount_links(p);
378 if (r < 0)
01f78473 379 return r;
a40eb732 380
e0207c8d
ZJS
381 if (UNIT(p)->default_dependencies) {
382 r = path_add_default_dependencies(p);
383 if (r < 0)
a40eb732 384 return r;
e0207c8d 385 }
01f78473
LP
386 }
387
388 return path_verify(p);
389}
390
391static void path_dump(Unit *u, FILE *f, const char *prefix) {
392 Path *p = PATH(u);
3ecaa09b 393 Unit *trigger;
01f78473
LP
394 PathSpec *s;
395
e364ad06
LP
396 assert(p);
397 assert(f);
01f78473 398
3ecaa09b
LP
399 trigger = UNIT_TRIGGER(u);
400
01f78473
LP
401 fprintf(f,
402 "%sPath State: %s\n"
cd43ca73 403 "%sResult: %s\n"
0e456f97
LP
404 "%sUnit: %s\n"
405 "%sMakeDirectory: %s\n"
406 "%sDirectoryMode: %04o\n",
01f78473 407 prefix, path_state_to_string(p->state),
cd43ca73 408 prefix, path_result_to_string(p->result),
3ecaa09b 409 prefix, trigger ? trigger->id : "n/a",
0e456f97
LP
410 prefix, yes_no(p->make_directory),
411 prefix, p->directory_mode);
01f78473
LP
412
413 LIST_FOREACH(spec, s, p->specs)
57020a3a 414 path_spec_dump(s, f, prefix);
01f78473
LP
415}
416
417static void path_unwatch(Path *p) {
418 PathSpec *s;
419
420 assert(p);
421
422 LIST_FOREACH(spec, s, p->specs)
718db961 423 path_spec_unwatch(s);
01f78473
LP
424}
425
426static int path_watch(Path *p) {
427 int r;
428 PathSpec *s;
429
430 assert(p);
431
e0207c8d 432 LIST_FOREACH(spec, s, p->specs) {
718db961 433 r = path_spec_watch(s, path_dispatch_io);
e0207c8d 434 if (r < 0)
01f78473 435 return r;
e0207c8d 436 }
01f78473
LP
437
438 return 0;
439}
440
441static void path_set_state(Path *p, PathState state) {
442 PathState old_state;
443 assert(p);
444
445 old_state = p->state;
446 p->state = state;
447
672028dc
LP
448 if (state != PATH_WAITING &&
449 (state != PATH_RUNNING || p->inotify_triggered))
01f78473
LP
450 path_unwatch(p);
451
452 if (state != old_state)
453 log_debug("%s changed %s -> %s",
1124fe6f 454 UNIT(p)->id,
01f78473
LP
455 path_state_to_string(old_state),
456 path_state_to_string(state));
457
e2f3b44c 458 unit_notify(UNIT(p), state_translation_table[old_state], state_translation_table[state], true);
01f78473
LP
459}
460
ac3f50ca 461static void path_enter_waiting(Path *p, bool initial, bool recheck);
01f78473
LP
462
463static int path_coldplug(Unit *u) {
464 Path *p = PATH(u);
465
466 assert(p);
467 assert(p->state == PATH_DEAD);
468
469 if (p->deserialized_state != p->state) {
470
471 if (p->deserialized_state == PATH_WAITING ||
472 p->deserialized_state == PATH_RUNNING)
ac3f50ca 473 path_enter_waiting(p, true, true);
01f78473
LP
474 else
475 path_set_state(p, p->deserialized_state);
476 }
477
478 return 0;
479}
480
cd43ca73 481static void path_enter_dead(Path *p, PathResult f) {
01f78473
LP
482 assert(p);
483
cd43ca73
LP
484 if (f != PATH_SUCCESS)
485 p->result = f;
01f78473 486
cd43ca73 487 path_set_state(p, p->result != PATH_SUCCESS ? PATH_FAILED : PATH_DEAD);
01f78473
LP
488}
489
490static void path_enter_running(Path *p) {
718db961 491 _cleanup_bus_error_free_ sd_bus_error error = SD_BUS_ERROR_NULL;
01f78473 492 int r;
398ef8ba 493
01f78473 494 assert(p);
3ecaa09b 495
ba3e67a7 496 /* Don't start job if we are supposed to go down */
31afa0a4 497 if (unit_stop_pending(UNIT(p)))
ba3e67a7
LP
498 return;
499
3ecaa09b 500 r = manager_add_job(UNIT(p)->manager, JOB_START, UNIT_TRIGGER(UNIT(p)),
e0207c8d
ZJS
501 JOB_REPLACE, true, &error, NULL);
502 if (r < 0)
01f78473
LP
503 goto fail;
504
672028dc
LP
505 p->inotify_triggered = false;
506
e0207c8d
ZJS
507 r = path_watch(p);
508 if (r < 0)
672028dc
LP
509 goto fail;
510
01f78473
LP
511 path_set_state(p, PATH_RUNNING);
512 return;
513
514fail:
e0207c8d 515 log_warning("%s failed to queue unit startup job: %s",
718db961 516 UNIT(p)->id, bus_error_message(&error, r));
cd43ca73 517 path_enter_dead(p, PATH_FAILURE_RESOURCES);
01f78473
LP
518}
519
ac3f50ca 520static bool path_check_good(Path *p, bool initial) {
01f78473 521 PathSpec *s;
01f78473
LP
522 bool good = false;
523
ac3f50ca 524 assert(p);
672028dc 525
01f78473 526 LIST_FOREACH(spec, s, p->specs) {
57020a3a 527 good = path_spec_check_good(s, initial);
01f78473
LP
528
529 if (good)
530 break;
531 }
532
ac3f50ca
LP
533 return good;
534}
01f78473 535
ac3f50ca
LP
536static void path_enter_waiting(Path *p, bool initial, bool recheck) {
537 int r;
0595f9a1 538
ac3f50ca
LP
539 if (recheck)
540 if (path_check_good(p, initial)) {
1124fe6f 541 log_debug("%s got triggered.", UNIT(p)->id);
ac3f50ca
LP
542 path_enter_running(p);
543 return;
544 }
545
e0207c8d
ZJS
546 r = path_watch(p);
547 if (r < 0)
ac3f50ca
LP
548 goto fail;
549
550 /* Hmm, so now we have created inotify watches, but the file
551 * might have appeared/been removed by now, so we must
552 * recheck */
553
554 if (recheck)
555 if (path_check_good(p, false)) {
1124fe6f 556 log_debug("%s got triggered.", UNIT(p)->id);
ac3f50ca
LP
557 path_enter_running(p);
558 return;
559 }
01f78473
LP
560
561 path_set_state(p, PATH_WAITING);
562 return;
563
564fail:
c33b3297 565 log_warning_errno(r, "%s failed to enter waiting state: %m", UNIT(p)->id);
cd43ca73 566 path_enter_dead(p, PATH_FAILURE_RESOURCES);
01f78473
LP
567}
568
0e456f97
LP
569static void path_mkdir(Path *p) {
570 PathSpec *s;
571
572 assert(p);
573
574 if (!p->make_directory)
575 return;
576
4b562198 577 LIST_FOREACH(spec, s, p->specs)
57020a3a 578 path_spec_mkdir(s, p->directory_mode);
0e456f97
LP
579}
580
01f78473
LP
581static int path_start(Unit *u) {
582 Path *p = PATH(u);
583
584 assert(p);
fdf20a31 585 assert(p->state == PATH_DEAD || p->state == PATH_FAILED);
01f78473 586
3ecaa09b 587 if (UNIT_TRIGGER(u)->load_state != UNIT_LOADED)
01f78473
LP
588 return -ENOENT;
589
0e456f97
LP
590 path_mkdir(p);
591
cd43ca73 592 p->result = PATH_SUCCESS;
ac3f50ca 593 path_enter_waiting(p, true, true);
00dc5d76 594
01f78473
LP
595 return 0;
596}
597
598static int path_stop(Unit *u) {
599 Path *p = PATH(u);
600
601 assert(p);
602 assert(p->state == PATH_WAITING || p->state == PATH_RUNNING);
603
cd43ca73 604 path_enter_dead(p, PATH_SUCCESS);
01f78473
LP
605 return 0;
606}
607
608static int path_serialize(Unit *u, FILE *f, FDSet *fds) {
609 Path *p = PATH(u);
610
611 assert(u);
612 assert(f);
613 assert(fds);
614
615 unit_serialize_item(u, f, "state", path_state_to_string(p->state));
cd43ca73 616 unit_serialize_item(u, f, "result", path_result_to_string(p->result));
01f78473
LP
617
618 return 0;
619}
620
621static int path_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
622 Path *p = PATH(u);
623
624 assert(u);
625 assert(key);
626 assert(value);
627 assert(fds);
628
629 if (streq(key, "state")) {
630 PathState state;
631
e0207c8d
ZJS
632 state = path_state_from_string(value);
633 if (state < 0)
01f78473
LP
634 log_debug("Failed to parse state value %s", value);
635 else
636 p->deserialized_state = state;
cd43ca73
LP
637
638 } else if (streq(key, "result")) {
639 PathResult f;
640
641 f = path_result_from_string(value);
642 if (f < 0)
643 log_debug("Failed to parse result value %s", value);
644 else if (f != PATH_SUCCESS)
645 p->result = f;
646
01f78473
LP
647 } else
648 log_debug("Unknown serialization key '%s'", key);
649
650 return 0;
651}
652
44a6b1b6 653_pure_ static UnitActiveState path_active_state(Unit *u) {
01f78473
LP
654 assert(u);
655
656 return state_translation_table[PATH(u)->state];
657}
658
44a6b1b6 659_pure_ static const char *path_sub_state_to_string(Unit *u) {
01f78473
LP
660 assert(u);
661
662 return path_state_to_string(PATH(u)->state);
663}
664
718db961
LP
665static int path_dispatch_io(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
666 PathSpec *s = userdata;
667 Path *p;
4b562198 668 int changed;
01f78473 669
718db961
LP
670 assert(s);
671 assert(s->unit);
01f78473
LP
672 assert(fd >= 0);
673
718db961
LP
674 p = PATH(s->unit);
675
672028dc
LP
676 if (p->state != PATH_WAITING &&
677 p->state != PATH_RUNNING)
718db961 678 return 0;
01f78473 679
ac155bb8 680 /* log_debug("inotify wakeup on %s.", u->id); */
01f78473 681
01f78473 682 LIST_FOREACH(spec, s, p->specs)
57020a3a 683 if (path_spec_owns_inotify_fd(s, fd))
01f78473
LP
684 break;
685
686 if (!s) {
687 log_error("Got event on unknown fd.");
688 goto fail;
689 }
690
718db961 691 changed = path_spec_fd_event(s, revents);
4b562198 692 if (changed < 0)
01f78473 693 goto fail;
01f78473 694
672028dc
LP
695 /* If we are already running, then remember that one event was
696 * dispatched so that we restart the service only if something
697 * actually changed on disk */
698 p->inotify_triggered = true;
699
672028dc
LP
700 if (changed)
701 path_enter_running(p);
702 else
ac3f50ca 703 path_enter_waiting(p, false, true);
672028dc 704
718db961 705 return 0;
01f78473
LP
706
707fail:
cd43ca73 708 path_enter_dead(p, PATH_FAILURE_RESOURCES);
718db961 709 return 0;
01f78473
LP
710}
711
3ecaa09b
LP
712static void path_trigger_notify(Unit *u, Unit *other) {
713 Path *p = PATH(u);
01f78473 714
3ecaa09b
LP
715 assert(u);
716 assert(other);
01f78473 717
3ecaa09b
LP
718 /* Invoked whenever the unit we trigger changes state or gains
719 * or loses a job */
01f78473 720
3ecaa09b
LP
721 if (other->load_state != UNIT_LOADED)
722 return;
01f78473 723
3ecaa09b
LP
724 if (p->state == PATH_RUNNING &&
725 UNIT_IS_INACTIVE_OR_FAILED(unit_active_state(other))) {
79008bdd 726 log_unit_debug(UNIT(p)->id,
3ecaa09b
LP
727 "%s got notified about unit deactivation.",
728 UNIT(p)->id);
672028dc 729
3ecaa09b
LP
730 /* Hmm, so inotify was triggered since the
731 * last activation, so I guess we need to
732 * recheck what is going on. */
733 path_enter_waiting(p, false, p->inotify_triggered);
01f78473 734 }
01f78473
LP
735}
736
fdf20a31 737static void path_reset_failed(Unit *u) {
5632e374
LP
738 Path *p = PATH(u);
739
740 assert(p);
741
fdf20a31 742 if (p->state == PATH_FAILED)
5632e374
LP
743 path_set_state(p, PATH_DEAD);
744
cd43ca73 745 p->result = PATH_SUCCESS;
5632e374
LP
746}
747
01f78473
LP
748static const char* const path_state_table[_PATH_STATE_MAX] = {
749 [PATH_DEAD] = "dead",
750 [PATH_WAITING] = "waiting",
751 [PATH_RUNNING] = "running",
fdf20a31 752 [PATH_FAILED] = "failed"
01f78473
LP
753};
754
755DEFINE_STRING_TABLE_LOOKUP(path_state, PathState);
756
757static const char* const path_type_table[_PATH_TYPE_MAX] = {
758 [PATH_EXISTS] = "PathExists",
8092a428 759 [PATH_EXISTS_GLOB] = "PathExistsGlob",
2c5859af 760 [PATH_DIRECTORY_NOT_EMPTY] = "DirectoryNotEmpty",
01f78473 761 [PATH_CHANGED] = "PathChanged",
e9223856 762 [PATH_MODIFIED] = "PathModified",
01f78473
LP
763};
764
765DEFINE_STRING_TABLE_LOOKUP(path_type, PathType);
766
cd43ca73
LP
767static const char* const path_result_table[_PATH_RESULT_MAX] = {
768 [PATH_SUCCESS] = "success",
2c5859af 769 [PATH_FAILURE_RESOURCES] = "resources",
cd43ca73
LP
770};
771
772DEFINE_STRING_TABLE_LOOKUP(path_result, PathResult);
773
01f78473 774const UnitVTable path_vtable = {
7d17cfbc 775 .object_size = sizeof(Path),
718db961 776
f975e971
LP
777 .sections =
778 "Unit\0"
779 "Path\0"
780 "Install\0",
01f78473 781
0e456f97 782 .init = path_init,
01f78473
LP
783 .done = path_done,
784 .load = path_load,
785
786 .coldplug = path_coldplug,
787
788 .dump = path_dump,
789
790 .start = path_start,
791 .stop = path_stop,
792
793 .serialize = path_serialize,
794 .deserialize_item = path_deserialize_item,
795
796 .active_state = path_active_state,
797 .sub_state_to_string = path_sub_state_to_string,
798
3ecaa09b
LP
799 .trigger_notify = path_trigger_notify,
800
fdf20a31 801 .reset_failed = path_reset_failed,
5632e374 802
c4e2ceae 803 .bus_interface = "org.freedesktop.systemd1.Path",
aec8de63 804 .bus_vtable = bus_path_vtable
01f78473 805};