]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/device.c
unit: remove union Unit
[thirdparty/systemd.git] / src / device.c
CommitLineData
d6c9574f 1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
5cb5a6ff 2
a7334b09
LP
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
25ac040b 22#include <errno.h>
f94ea366 23#include <sys/epoll.h>
25ac040b
LP
24#include <libudev.h>
25
87f0e418 26#include "unit.h"
5cb5a6ff
LP
27#include "device.h"
28#include "strv.h"
25ac040b 29#include "log.h"
9e2f7c11 30#include "unit-name.h"
4139c1b2 31#include "dbus-device.h"
f6a6225e 32#include "def.h"
5cb5a6ff 33
f50e0a01
LP
34static const UnitActiveState state_translation_table[_DEVICE_STATE_MAX] = {
35 [DEVICE_DEAD] = UNIT_INACTIVE,
73608ed9 36 [DEVICE_PLUGGED] = UNIT_ACTIVE
f50e0a01
LP
37};
38
8fe914ec
LP
39static void device_unset_sysfs(Device *d) {
40 Device *first;
41
42 assert(d);
43
a7f241db
LP
44 if (!d->sysfs)
45 return;
46
47 /* Remove this unit from the chain of devices which share the
48 * same sysfs path. */
49 first = hashmap_get(d->meta.manager->devices_by_sysfs, d->sysfs);
50 LIST_REMOVE(Device, same_sysfs, first, d);
8fe914ec 51
a7f241db
LP
52 if (first)
53 hashmap_remove_and_replace(d->meta.manager->devices_by_sysfs, d->sysfs, first->sysfs, first);
54 else
55 hashmap_remove(d->meta.manager->devices_by_sysfs, d->sysfs);
56
57 free(d->sysfs);
58 d->sysfs = NULL;
8fe914ec
LP
59}
60
faf919f1
LP
61static void device_init(Unit *u) {
62 Device *d = DEVICE(u);
63
64 assert(d);
65 assert(d->meta.load_state == UNIT_STUB);
66
8fe914ec
LP
67 /* In contrast to all other unit types we timeout jobs waiting
68 * for devices by default. This is because they otherwise wait
35b8ca3a 69 * indefinitely for plugged in devices, something which cannot
8fe914ec
LP
70 * happen for the other units since their operations time out
71 * anyway. */
faf919f1 72 d->meta.job_timeout = DEFAULT_TIMEOUT_USEC;
c8f4d764
LP
73
74 d->meta.ignore_on_isolate = true;
7a6000a6 75 d->meta.ignore_on_snapshot = true;
faf919f1
LP
76}
77
87f0e418
LP
78static void device_done(Unit *u) {
79 Device *d = DEVICE(u);
034c6ed7
LP
80
81 assert(d);
e537352b 82
8fe914ec 83 device_unset_sysfs(d);
e537352b
LP
84}
85
f50e0a01
LP
86static void device_set_state(Device *d, DeviceState state) {
87 DeviceState old_state;
88 assert(d);
5cb5a6ff 89
f50e0a01
LP
90 old_state = d->state;
91 d->state = state;
5cb5a6ff 92
e537352b 93 if (state != old_state)
40d50879 94 log_debug("%s changed %s -> %s",
4cd1fbcc 95 d->meta.id,
a16e1123
LP
96 device_state_to_string(old_state),
97 device_state_to_string(state));
f50e0a01 98
e2f3b44c 99 unit_notify(UNIT(d), state_translation_table[old_state], state_translation_table[state], true);
f50e0a01
LP
100}
101
102static int device_coldplug(Unit *u) {
103 Device *d = DEVICE(u);
104
105 assert(d);
106 assert(d->state == DEVICE_DEAD);
107
108 if (d->sysfs)
73608ed9 109 device_set_state(d, DEVICE_PLUGGED);
f50e0a01
LP
110
111 return 0;
112}
113
114static void device_dump(Unit *u, FILE *f, const char *prefix) {
25ac040b 115 Device *d = DEVICE(u);
5cb5a6ff 116
25ac040b 117 assert(d);
5cb5a6ff
LP
118
119 fprintf(f,
25ac040b
LP
120 "%sDevice State: %s\n"
121 "%sSysfs Path: %s\n",
a16e1123 122 prefix, device_state_to_string(d->state),
f50e0a01
LP
123 prefix, strna(d->sysfs));
124}
125
126static UnitActiveState device_active_state(Unit *u) {
127 assert(u);
128
129 return state_translation_table[DEVICE(u)->state];
25ac040b
LP
130}
131
10a94420
LP
132static const char *device_sub_state_to_string(Unit *u) {
133 assert(u);
134
a16e1123 135 return device_state_to_string(DEVICE(u)->state);
10a94420
LP
136}
137
8fe914ec 138static int device_add_escaped_name(Unit *u, const char *dn) {
25ac040b
LP
139 char *e;
140 int r;
141
142 assert(u);
143 assert(dn);
144 assert(dn[0] == '/');
145
a16e1123 146 if (!(e = unit_name_from_path(dn, ".device")))
25ac040b
LP
147 return -ENOMEM;
148
149 r = unit_add_name(u, e);
150 free(e);
151
152 if (r < 0 && r != -EEXIST)
153 return r;
154
155 return 0;
156}
157
aab14b13
LP
158static int device_find_escape_name(Manager *m, const char *dn, Unit **_u) {
159 char *e;
160 Unit *u;
161
162 assert(m);
163 assert(dn);
164 assert(dn[0] == '/');
165 assert(_u);
166
a16e1123 167 if (!(e = unit_name_from_path(dn, ".device")))
aab14b13
LP
168 return -ENOMEM;
169
170 u = manager_get_unit(m, e);
171 free(e);
172
173 if (u) {
174 *_u = u;
175 return 1;
176 }
177
178 return 0;
179}
180
8fe914ec
LP
181static int device_update_unit(Manager *m, struct udev_device *dev, const char *path, bool main) {
182 const char *sysfs, *model;
25ac040b
LP
183 Unit *u = NULL;
184 int r;
25ac040b 185 bool delete;
25ac040b
LP
186
187 assert(m);
188
7f275a9f
LP
189 if (!(sysfs = udev_device_get_syspath(dev)))
190 return -ENOMEM;
191
8fe914ec 192 if ((r = device_find_escape_name(m, path, &u)) < 0)
aab14b13 193 return r;
25ac040b 194
5845b46b 195 if (u && DEVICE(u)->sysfs && !path_equal(DEVICE(u)->sysfs, sysfs))
8fe914ec 196 return -EEXIST;
25ac040b 197
aab14b13
LP
198 if (!u) {
199 delete = true;
200
7d17cfbc
MS
201 u = unit_new(m, sizeof(Device));
202 if (!u)
aab14b13 203 return -ENOMEM;
25ac040b 204
7d17cfbc
MS
205 r = device_add_escaped_name(u, path);
206 if (r < 0)
25ac040b
LP
207 goto fail;
208
ee6cb288
LP
209 unit_add_to_load_queue(u);
210 } else
211 delete = false;
212
213 /* If this was created via some dependency and has not
214 * actually been seen yet ->sysfs will not be
215 * initialized. Hence initialize it if necessary. */
216
217 if (!DEVICE(u)->sysfs) {
218 Device *first;
219
25ac040b
LP
220 if (!(DEVICE(u)->sysfs = strdup(sysfs))) {
221 r = -ENOMEM;
222 goto fail;
223 }
224
8fe914ec
LP
225 if (!m->devices_by_sysfs)
226 if (!(m->devices_by_sysfs = hashmap_new(string_hash_func, string_compare_func))) {
227 r = -ENOMEM;
228 goto fail;
229 }
25ac040b 230
8fe914ec
LP
231 first = hashmap_get(m->devices_by_sysfs, sysfs);
232 LIST_PREPEND(Device, same_sysfs, first, DEVICE(u));
233
234 if ((r = hashmap_replace(m->devices_by_sysfs, DEVICE(u)->sysfs, first)) < 0)
25ac040b 235 goto fail;
ee6cb288 236 }
8fe914ec 237
aab14b13
LP
238 if ((model = udev_device_get_property_value(dev, "ID_MODEL_FROM_DATABASE")) ||
239 (model = udev_device_get_property_value(dev, "ID_MODEL"))) {
240 if ((r = unit_set_description(u, model)) < 0)
241 goto fail;
4e85aff4 242 } else
8fe914ec 243 if ((r = unit_set_description(u, path)) < 0)
4e85aff4 244 goto fail;
aab14b13 245
8fe914ec
LP
246 if (main) {
247 /* The additional systemd udev properties we only
248 * interpret for the main object */
249 const char *wants, *alias;
250
251 if ((alias = udev_device_get_property_value(dev, "SYSTEMD_ALIAS"))) {
252 if (!is_path(alias))
253 log_warning("SYSTEMD_ALIAS for %s is not a path, ignoring: %s", sysfs, alias);
254 else {
255 if ((r = device_add_escaped_name(u, alias)) < 0)
256 goto fail;
b866264a 257 }
8fe914ec 258 }
25ac040b 259
8fe914ec
LP
260 if ((wants = udev_device_get_property_value(dev, "SYSTEMD_WANTS"))) {
261 char *state, *w;
262 size_t l;
25ac040b 263
8fe914ec
LP
264 FOREACH_WORD_QUOTED(w, l, wants, state) {
265 char *e;
266
267 if (!(e = strndup(w, l))) {
268 r = -ENOMEM;
269 goto fail;
270 }
271
272 r = unit_add_dependency_by_name(u, UNIT_WANTS, e, NULL, true);
273 free(e);
274
275 if (r < 0)
276 goto fail;
277 }
25ac040b 278 }
a7f241db 279 }
f94ea366 280
c1e1601e 281 unit_add_to_dbus_queue(u);
25ac040b
LP
282 return 0;
283
284fail:
ee5f3479
LP
285 log_warning("Failed to load device unit: %s", strerror(-r));
286
25ac040b
LP
287 if (delete && u)
288 unit_free(u);
ee5f3479 289
25ac040b
LP
290 return r;
291}
292
8fe914ec
LP
293static int device_process_new_device(Manager *m, struct udev_device *dev, bool update_state) {
294 const char *sysfs, *dn;
295 struct udev_list_entry *item = NULL, *first = NULL;
296
297 assert(m);
298
299 if (!(sysfs = udev_device_get_syspath(dev)))
300 return -ENOMEM;
301
302 /* Add the main unit named after the sysfs path */
303 device_update_unit(m, dev, sysfs, true);
304
305 /* Add an additional unit for the device node */
306 if ((dn = udev_device_get_devnode(dev)))
307 device_update_unit(m, dev, dn, false);
308
309 /* Add additional units for all symlinks */
310 first = udev_device_get_devlinks_list_entry(dev);
311 udev_list_entry_foreach(item, first) {
312 const char *p;
5845b46b 313 struct stat st;
8fe914ec
LP
314
315 /* Don't bother with the /dev/block links */
316 p = udev_list_entry_get_name(item);
317
318 if (path_startswith(p, "/dev/block/") ||
319 path_startswith(p, "/dev/char/"))
320 continue;
321
5845b46b
LP
322 /* Verify that the symlink in the FS actually belongs
323 * to this device. This is useful to deal with
324 * conflicting devices, e.g. when two disks want the
325 * same /dev/disk/by-label/xxx link because they have
326 * the same label. We want to make sure that the same
327 * device that won the symlink wins in systemd, so we
328 * check the device node major/minor*/
329 if (stat(p, &st) >= 0)
330 if ((!S_ISBLK(st.st_mode) && !S_ISCHR(st.st_mode)) ||
331 st.st_rdev != udev_device_get_devnum(dev))
332 continue;
333
8fe914ec
LP
334 device_update_unit(m, dev, p, false);
335 }
336
337 if (update_state) {
338 Device *d, *l;
339
340 manager_dispatch_load_queue(m);
341
342 l = hashmap_get(m->devices_by_sysfs, sysfs);
343 LIST_FOREACH(same_sysfs, d, l)
344 device_set_state(d, DEVICE_PLUGGED);
345 }
346
347 return 0;
348}
349
f94ea366 350static int device_process_path(Manager *m, const char *path, bool update_state) {
25ac040b
LP
351 int r;
352 struct udev_device *dev;
353
354 assert(m);
355 assert(path);
356
357 if (!(dev = udev_device_new_from_syspath(m->udev, path))) {
358 log_warning("Failed to get udev device object from udev for path %s.", path);
359 return -ENOMEM;
360 }
361
f94ea366 362 r = device_process_new_device(m, dev, update_state);
25ac040b
LP
363 udev_device_unref(dev);
364 return r;
365}
366
f94ea366
LP
367static int device_process_removed_device(Manager *m, struct udev_device *dev) {
368 const char *sysfs;
f94ea366
LP
369 Device *d;
370
371 assert(m);
372 assert(dev);
373
374 if (!(sysfs = udev_device_get_syspath(dev)))
375 return -ENOMEM;
376
8fe914ec
LP
377 /* Remove all units of this sysfs path */
378 while ((d = hashmap_get(m->devices_by_sysfs, sysfs))) {
379 device_unset_sysfs(d);
380 device_set_state(d, DEVICE_DEAD);
381 }
f94ea366 382
f94ea366
LP
383 return 0;
384}
385
a7f241db
LP
386static Unit *device_following(Unit *u) {
387 Device *d = DEVICE(u);
388 Device *other, *first = NULL;
389
390 assert(d);
391
ac155bb8 392 if (startswith(u->id, "sys-"))
a7f241db
LP
393 return NULL;
394
395 /* Make everybody follow the unit that's named after the sysfs path */
396 for (other = d->same_sysfs_next; other; other = other->same_sysfs_next)
397 if (startswith(other->meta.id, "sys-"))
398 return UNIT(other);
399
400 for (other = d->same_sysfs_prev; other; other = other->same_sysfs_prev) {
401 if (startswith(other->meta.id, "sys-"))
402 return UNIT(other);
403
404 first = other;
405 }
406
407 return UNIT(first);
408}
409
6210e7fc
LP
410static int device_following_set(Unit *u, Set **_s) {
411 Device *d = DEVICE(u);
412 Device *other;
413 Set *s;
414 int r;
415
416 assert(d);
417 assert(_s);
418
419 if (!d->same_sysfs_prev && !d->same_sysfs_next) {
420 *_s = NULL;
421 return 0;
422 }
423
424 if (!(s = set_new(NULL, NULL)))
425 return -ENOMEM;
426
427 for (other = d->same_sysfs_next; other; other = other->same_sysfs_next)
428 if ((r = set_put(s, other)) < 0)
429 goto fail;
430
431 for (other = d->same_sysfs_prev; other; other = other->same_sysfs_prev)
432 if ((r = set_put(s, other)) < 0)
433 goto fail;
434
435 *_s = s;
436 return 1;
437
438fail:
439 set_free(s);
440 return r;
441}
442
25ac040b
LP
443static void device_shutdown(Manager *m) {
444 assert(m);
445
a16e1123 446 if (m->udev_monitor) {
f94ea366 447 udev_monitor_unref(m->udev_monitor);
a16e1123
LP
448 m->udev_monitor = NULL;
449 }
f94ea366 450
a16e1123 451 if (m->udev) {
25ac040b 452 udev_unref(m->udev);
a16e1123
LP
453 m->udev = NULL;
454 }
8fe914ec
LP
455
456 hashmap_free(m->devices_by_sysfs);
457 m->devices_by_sysfs = NULL;
25ac040b
LP
458}
459
460static int device_enumerate(Manager *m) {
f94ea366 461 struct epoll_event ev;
25ac040b
LP
462 int r;
463 struct udev_enumerate *e = NULL;
464 struct udev_list_entry *item = NULL, *first = NULL;
465
466 assert(m);
467
a16e1123
LP
468 if (!m->udev) {
469 if (!(m->udev = udev_new()))
470 return -ENOMEM;
25ac040b 471
a16e1123
LP
472 if (!(m->udev_monitor = udev_monitor_new_from_netlink(m->udev, "udev"))) {
473 r = -ENOMEM;
474 goto fail;
475 }
f94ea366 476
47ae6e67
LP
477 /* This will fail if we are unprivileged, but that
478 * should not matter much, as user instances won't run
479 * during boot. */
480 udev_monitor_set_receive_buffer_size(m->udev_monitor, 128*1024*1024);
99448c1f 481
e1ce2c27
LP
482 if (udev_monitor_filter_add_match_tag(m->udev_monitor, "systemd") < 0) {
483 r = -ENOMEM;
484 goto fail;
485 }
486
a16e1123
LP
487 if (udev_monitor_enable_receiving(m->udev_monitor) < 0) {
488 r = -EIO;
489 goto fail;
490 }
f94ea366 491
a16e1123
LP
492 m->udev_watch.type = WATCH_UDEV;
493 m->udev_watch.fd = udev_monitor_get_fd(m->udev_monitor);
f94ea366 494
a16e1123
LP
495 zero(ev);
496 ev.events = EPOLLIN;
497 ev.data.ptr = &m->udev_watch;
f94ea366 498
a16e1123
LP
499 if (epoll_ctl(m->epoll_fd, EPOLL_CTL_ADD, m->udev_watch.fd, &ev) < 0)
500 return -errno;
501 }
f94ea366 502
4f2d528d
LP
503 if (!(e = udev_enumerate_new(m->udev))) {
504 r = -ENOMEM;
505 goto fail;
506 }
e1ce2c27
LP
507 if (udev_enumerate_add_match_tag(e, "systemd") < 0) {
508 r = -EIO;
509 goto fail;
510 }
25ac040b 511
4f2d528d
LP
512 if (udev_enumerate_scan_devices(e) < 0) {
513 r = -EIO;
514 goto fail;
515 }
25ac040b 516
4f2d528d
LP
517 first = udev_enumerate_get_list_entry(e);
518 udev_list_entry_foreach(item, first)
519 device_process_path(m, udev_list_entry_get_name(item), false);
25ac040b 520
4f2d528d 521 udev_enumerate_unref(e);
25ac040b
LP
522 return 0;
523
524fail:
525 if (e)
526 udev_enumerate_unref(e);
527
528 device_shutdown(m);
529 return r;
5cb5a6ff
LP
530}
531
f94ea366
LP
532void device_fd_event(Manager *m, int events) {
533 struct udev_device *dev;
534 int r;
2958c886 535 const char *action, *ready;
f94ea366
LP
536
537 assert(m);
99448c1f
KS
538
539 if (events != EPOLLIN) {
540 static RATELIMIT_DEFINE(limit, 10*USEC_PER_SEC, 5);
541
542 if (!ratelimit_test(&limit))
543 log_error("Failed to get udev event: %m");
2e6081f2
KS
544 if (!(events & EPOLLIN))
545 return;
99448c1f 546 }
f94ea366 547
f94ea366 548 if (!(dev = udev_monitor_receive_device(m->udev_monitor))) {
99448c1f
KS
549 /*
550 * libudev might filter-out devices which pass the bloom filter,
35b8ca3a 551 * so getting NULL here is not necessarily an error
99448c1f 552 */
f94ea366
LP
553 return;
554 }
555
556 if (!(action = udev_device_get_action(dev))) {
557 log_error("Failed to get udev action string.");
558 goto fail;
559 }
560
2958c886
LP
561 ready = udev_device_get_property_value(dev, "SYSTEMD_READY");
562
563 if (streq(action, "remove") || (ready && parse_boolean(ready) == 0)) {
f94ea366
LP
564 if ((r = device_process_removed_device(m, dev)) < 0) {
565 log_error("Failed to process udev device event: %s", strerror(-r));
566 goto fail;
567 }
568 } else {
569 if ((r = device_process_new_device(m, dev, true)) < 0) {
570 log_error("Failed to process udev device event: %s", strerror(-r));
571 goto fail;
572 }
573 }
574
575fail:
576 udev_device_unref(dev);
577}
578
a16e1123
LP
579static const char* const device_state_table[_DEVICE_STATE_MAX] = {
580 [DEVICE_DEAD] = "dead",
73608ed9 581 [DEVICE_PLUGGED] = "plugged"
a16e1123
LP
582};
583
584DEFINE_STRING_TABLE_LOOKUP(device_state, DeviceState);
585
87f0e418 586const UnitVTable device_vtable = {
5cb5a6ff 587 .suffix = ".device",
7d17cfbc 588 .object_size = sizeof(Device),
f975e971
LP
589 .sections =
590 "Unit\0"
591 "Device\0"
592 "Install\0",
5cb5a6ff 593
9e2f7c11
LP
594 .no_instances = true,
595
faf919f1
LP
596 .init = device_init,
597
e537352b 598 .load = unit_load_fragment_and_dropin_optional,
034c6ed7 599 .done = device_done,
f50e0a01
LP
600 .coldplug = device_coldplug,
601
5cb5a6ff
LP
602 .dump = device_dump,
603
f50e0a01 604 .active_state = device_active_state,
10a94420 605 .sub_state_to_string = device_sub_state_to_string,
25ac040b 606
c4e2ceae 607 .bus_interface = "org.freedesktop.systemd1.Device",
4139c1b2 608 .bus_message_handler = bus_device_message_handler,
c4e2ceae 609 .bus_invalidating_properties = bus_device_invalidating_properties,
4139c1b2 610
a7f241db 611 .following = device_following,
6210e7fc 612 .following_set = device_following_set,
a7f241db 613
f50e0a01
LP
614 .enumerate = device_enumerate,
615 .shutdown = device_shutdown
5cb5a6ff 616};