load-fragment.c revision e862b60f1c77bc12bf49475930f79ce68489828a
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
/***
This file is part of systemd.
Copyright 2010 Lennart Poettering
Copyright 2012 Holger Hans Peter Freyther
under the terms of the GNU Lesser General Public License as published by
the Free Software Foundation; either version 2.1 of the License, or
(at your option) any later version.
systemd is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with systemd; If not, see <http://www.gnu.org/licenses/>.
***/
#include <assert.h>
#include <errno.h>
#include <string.h>
#include <unistd.h>
#include <fcntl.h>
#include <sched.h>
#include <sys/resource.h>
#include <systemd/sd-messages.h>
#include "unit.h"
#include "strv.h"
#include "conf-parser.h"
#include "load-fragment.h"
#include "log.h"
#include "ioprio.h"
#include "securebits.h"
#include "missing.h"
#include "unit-name.h"
#include "unit-printf.h"
#include "dbus-common.h"
#include "utf8.h"
#include "path-util.h"
#include "syscall-list.h"
#include "env-util.h"
#include "cgroup.h"
#ifndef HAVE_SYSV_COMPAT
int config_parse_warn_compat(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
"Support for option %s= has been disabled at compile time and is ignored",
lvalue);
return 0;
}
#endif
int config_parse_unit_deps(const char* unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
UnitDependency d = ltype;
char *w;
size_t l;
char *state;
int r;
t = strndup(w, l);
if (!t)
return log_oom();
k = unit_name_printf(u, t);
if (!k)
return log_oom();
r = unit_add_dependency_by_name(u, d, k, NULL, true);
if (r < 0)
"Failed to add dependency on %s, ignoring: %s", k, strerror(-r));
}
return 0;
}
int config_parse_unit_string_printf(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
_cleanup_free_ char *k = NULL;
assert(u);
k = unit_full_printf(u, rvalue);
if (!k)
"Failed to resolve unit specifiers on %s. Ignoring.", rvalue);
}
int config_parse_unit_strv_printf(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
_cleanup_free_ char *k = NULL;
assert(u);
k = unit_full_printf(u, rvalue);
if (!k)
"Failed to resolve unit specifiers on %s. Ignoring.", rvalue);
}
int config_parse_unit_path_printf(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
_cleanup_free_ char *k = NULL;
assert(u);
k = unit_full_printf(u, rvalue);
if (!k)
"Failed to resolve unit specifiers on %s. Ignoring.", rvalue);
}
int config_parse_socket_listen(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
SocketPort *p, *tail;
Socket *s;
/* An empty assignment removes all ports */
return 0;
}
if (!p)
return log_oom();
if (ltype != SOCKET_SOCKET) {
if (!p->path) {
if (!p->path) {
free(p);
return log_oom();
} else
"Failed to resolve unit specifiers on %s. Ignoring.", rvalue);
}
path_kill_slashes(p->path);
_cleanup_free_ char *k = NULL;
int r;
p->type = SOCKET_SOCKET;
if (!k)
"Failed to resolve unit specifiers on %s. Ignoring.", rvalue);
if (r < 0) {
"Failed to parse address value, ignoring: %s", rvalue);
free(p);
return 0;
}
} else {
_cleanup_free_ char *k = NULL;
int r;
p->type = SOCKET_SOCKET;
if (!k)
"Failed to resolve unit specifiers on %s. Ignoring.", rvalue);
if (r < 0) {
"Failed to parse address value, ignoring: %s", rvalue);
free(p);
return 0;
}
else {
}
"Address family not supported, ignoring: %s", rvalue);
free(p);
return 0;
}
}
p->fd = -1;
if (s->ports) {
} else
return 0;
}
int config_parse_socket_bind(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
Socket *s;
if (b < 0) {
int r;
r = parse_boolean(rvalue);
if (r < 0) {
"Failed to parse bind IPv6 only value, ignoring: %s", rvalue);
return 0;
}
} else
s->bind_ipv6_only = b;
return 0;
}
int config_parse_exec_nice(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
ExecContext *c = data;
int priority, r;
if (r < 0) {
"Failed to parse nice priority, ignoring: %s. ", rvalue);
return 0;
}
"Nice priority out of range, ignoring: %s", rvalue);
return 0;
}
c->nice_set = true;
return 0;
}
int config_parse_exec_oom_score_adjust(const char* unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
ExecContext *c = data;
int oa, r;
if (r < 0) {
"Failed to parse the OOM score adjust value, ignoring: %s", rvalue);
return 0;
}
"OOM score adjust value out of range, ignoring: %s", rvalue);
return 0;
}
c->oom_score_adjust = oa;
c->oom_score_adjust_set = true;
return 0;
}
int config_parse_exec(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
char *path, **n;
unsigned k;
int r;
assert(e);
e += ltype;
/* An empty assignment resets the list */
*e = NULL;
return 0;
}
/* We accept an absolute path as first argument, or
* alternatively an absolute prefixed with @ to allow
* overriding of argv[0]. */
for (;;) {
int i;
char *w;
size_t l;
char *state;
bool honour_argv0 = false, ignore = false;
n = NULL;
if (rvalue[0] == 0)
break;
for (i = 0; i < 2; i++) {
ignore = true;
rvalue ++;
}
honour_argv0 = true;
rvalue ++;
}
}
if (*rvalue != '/') {
"Executable path is not absolute, ignoring: %s", rvalue);
return 0;
}
k = 0;
break;
k++;
}
n = new(char*, k + !honour_argv0);
if (!n)
return log_oom();
k = 0;
break;
w ++;
if (honour_argv0 && w == rvalue) {
if (!path) {
r = log_oom();
goto fail;
}
if (!utf8_is_valid(path)) {
"Path is not UTF-8 clean, ignoring assignment: %s",
rvalue);
r = 0;
goto fail;
}
} else {
char *c;
c = n[k++] = cunescape_length(w, l);
if (!c) {
r = log_oom();
goto fail;
}
if (!utf8_is_valid(c)) {
"Path is not UTF-8 clean, ignoring assignment: %s",
rvalue);
r = 0;
goto fail;
}
}
}
n[k] = NULL;
if (!n[0]) {
"Invalid command line, ignoring: %s", rvalue);
r = 0;
goto fail;
}
if (!path) {
if (!path) {
r = log_oom();
goto fail;
}
}
if (!nce) {
r = log_oom();
goto fail;
}
}
return 0;
fail:
n[k] = NULL;
strv_free(n);
return r;
}
DEFINE_CONFIG_PARSE_ENUM(config_parse_service_type, service_type, ServiceType, "Failed to parse service type");
DEFINE_CONFIG_PARSE_ENUM(config_parse_service_restart, service_restart, ServiceRestart, "Failed to parse service restart specifier");
int config_parse_socket_bindtodevice(const char* unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
char *n;
if (!n)
return log_oom();
} else
n = NULL;
free(s->bind_to_device);
s->bind_to_device = n;
return 0;
}
DEFINE_CONFIG_PARSE_ENUM(config_parse_output, exec_output, ExecOutput, "Failed to parse output specifier");
DEFINE_CONFIG_PARSE_ENUM(config_parse_input, exec_input, ExecInput, "Failed to parse input specifier");
int config_parse_exec_io_class(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
ExecContext *c = data;
int x;
if (x < 0) {
"Failed to parse IO scheduling class, ignoring: %s", rvalue);
return 0;
}
c->ioprio_set = true;
return 0;
}
int config_parse_exec_io_priority(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
ExecContext *c = data;
int i, r;
if (r < 0 || i < 0 || i >= IOPRIO_BE_NR) {
"Failed to parse IO priority, ignoring: %s", rvalue);
return 0;
}
c->ioprio_set = true;
return 0;
}
int config_parse_exec_cpu_sched_policy(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
ExecContext *c = data;
int x;
if (x < 0) {
"Failed to parse CPU scheduling policy, ignoring: %s", rvalue);
return 0;
}
c->cpu_sched_policy = x;
/* Moving to or from real-time policy? We need to adjust the priority */
c->cpu_sched_priority = CLAMP(c->cpu_sched_priority, sched_get_priority_min(x), sched_get_priority_max(x));
c->cpu_sched_set = true;
return 0;
}
int config_parse_exec_cpu_sched_prio(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
ExecContext *c = data;
if (r < 0) {
"Failed to parse CPU scheduling policy, ignoring: %s", rvalue);
return 0;
}
"CPU scheduling priority is out of range, ignoring: %s", rvalue);
return 0;
}
c->cpu_sched_priority = i;
c->cpu_sched_set = true;
return 0;
}
int config_parse_exec_cpu_affinity(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
ExecContext *c = data;
char *w;
size_t l;
char *state;
/* An empty assignment resets the CPU list */
if (c->cpuset)
return 0;
}
_cleanup_free_ char *t = NULL;
int r;
unsigned cpu;
t = strndup(w, l);
if (!t)
return log_oom();
if (!c->cpuset) {
if (!c->cpuset)
return log_oom();
}
if (r < 0 || cpu >= c->cpuset_ncpus) {
"Failed to parse CPU affinity '%s', ignoring: %s", t, rvalue);
return 0;
}
}
return 0;
}
int config_parse_exec_capabilities(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
ExecContext *c = data;
if (!cap) {
"Failed to parse capabilities, ignoring: %s", rvalue);
return 0;
}
if (c->capabilities)
cap_free(c->capabilities);
c->capabilities = cap;
return 0;
}
int config_parse_exec_secure_bits(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
ExecContext *c = data;
char *w;
size_t l;
char *state;
/* An empty assignment resets the field */
c->secure_bits = 0;
return 0;
}
if (first_word(w, "keep-caps"))
else if (first_word(w, "keep-caps-locked"))
else if (first_word(w, "no-setuid-fixup"))
else if (first_word(w, "no-setuid-fixup-locked"))
else if (first_word(w, "noroot"))
else if (first_word(w, "noroot-locked"))
else {
"Failed to parse secure bits, ignoring: %s", rvalue);
return 0;
}
}
return 0;
}
int config_parse_bounding_set(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
char *w;
size_t l;
char *state;
bool invert = false;
if (rvalue[0] == '~') {
invert = true;
rvalue++;
}
/* Note that we store this inverted internally, since the
* kernel wants it like this. But we actually expose it
* non-inverted everywhere to have a fully normalized
* interface. */
_cleanup_free_ char *t = NULL;
int r;
t = strndup(w, l);
if (!t)
return log_oom();
r = cap_from_name(t, &cap);
if (r < 0) {
"Failed to parse capability in bounding set, ignoring: %s", t);
continue;
}
}
if (invert)
else
return 0;
}
int config_parse_limit(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
unsigned long long u;
u = (unsigned long long) RLIM_INFINITY;
else {
int r;
r = safe_atollu(rvalue, &u);
if (r < 0) {
"Failed to parse resource value, ignoring: %s", rvalue);
return 0;
}
}
if (!*rl) {
if (!*rl)
return log_oom();
}
return 0;
}
#ifdef HAVE_SYSV_COMPAT
int config_parse_sysv_priority(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
int i, r;
if (r < 0 || i < 0) {
"Failed to parse SysV start priority, ignoring: %s", rvalue);
return 0;
}
*priority = (int) i;
return 0;
}
#endif
int config_parse_fsck_passno(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
int i, r;
if (r || i < 0) {
"Failed to parse fsck pass number, ignoring: %s", rvalue);
return 0;
}
*passno = (int) i;
return 0;
}
int config_parse_kill_signal(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
int r;
if (r <= 0) {
"Failed to parse kill signal, ignoring: %s", rvalue);
return 0;
}
*sig = r;
return 0;
}
int config_parse_exec_mount_flags(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
ExecContext *c = data;
char *w;
size_t l;
char *state;
unsigned long flags = 0;
_cleanup_free_ char *t;
t = strndup(w, l);
if (!t)
return log_oom();
if (streq(t, "shared"))
else if (streq(t, "slave"))
else if (streq(w, "private"))
flags |= MS_PRIVATE;
else {
"Failed to parse mount flag %s, ignoring: %s",
t, rvalue);
return 0;
}
}
c->mount_flags = flags;
return 0;
}
int config_parse_timer(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
usec_t u = 0;
TimerValue *v;
TimerBase b;
CalendarSpec *c = NULL;
/* Empty assignment resets list */
return 0;
}
b = timer_base_from_string(lvalue);
if (b < 0) {
"Failed to parse timer base, ignoring: %s", lvalue);
return 0;
}
if (b == TIMER_CALENDAR) {
if (calendar_spec_from_string(rvalue, &c) < 0) {
"Failed to parse calendar specification, ignoring: %s",
rvalue);
return 0;
}
id = CLOCK_REALTIME;
} else {
"Failed to parse timer value, ignoring: %s",
rvalue);
return 0;
}
}
if (!v)
return log_oom();
v->base = b;
v->value = u;
v->calendar_spec = c;
return 0;
}
const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
_cleanup_free_ char *p = NULL;
int r;
"Multiple units to trigger specified, ignoring: %s", rvalue);
return 0;
}
p = unit_name_printf(u, rvalue);
if (!p)
return log_oom();
type = unit_name_to_type(p);
if (type < 0) {
"Unit type not valid, ignoring: %s", rvalue);
return 0;
}
"Trigger cannot be of same type, ignoring: %s", rvalue);
return 0;
}
if (r < 0) {
"Failed to add trigger on %s, ignoring: %s", p, strerror(-r));
return 0;
}
return 0;
}
int config_parse_path_spec(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
PathSpec *s;
PathType b;
_cleanup_free_ char *k = NULL;
/* Empty assignment clears list */
path_free_specs(p);
return 0;
}
b = path_type_from_string(lvalue);
if (b < 0) {
"Failed to parse path type, ignoring: %s", lvalue);
return 0;
}
if (!k) {
if (!k)
return log_oom();
else
"Failed to resolve unit specifiers on %s. Ignoring.",
rvalue);
}
if (!path_is_absolute(k)) {
"Path is not absolute, ignoring: %s", k);
return 0;
}
if (!s)
return log_oom();
s->path = path_kill_slashes(k);
k = NULL;
s->type = b;
s->inotify_fd = -1;
return 0;
}
int config_parse_socket_service(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
int r;
Unit *x;
_cleanup_free_ char *p = NULL;
if (!p)
return log_oom();
if (!endswith(p, ".service")) {
"Unit must be of type service, ignoring: %s", rvalue);
return 0;
}
if (r < 0) {
"Failed to load unit %s, ignoring: %s",
return 0;
}
unit_ref_set(&s->service, x);
return 0;
}
int config_parse_service_sockets(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
int r;
char *state, *w;
size_t l;
t = strndup(w, l);
if (!t)
return log_oom();
k = unit_name_printf(UNIT(s), t);
if (!k)
return log_oom();
if (!endswith(k, ".socket")) {
"Unit must be of type socket, ignoring: %s", k);
continue;
}
if (r < 0)
"Failed to add dependency on %s, ignoring: %s",
k, strerror(-r));
if (r < 0)
return r;
}
return 0;
}
int config_parse_service_timeout(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
int r;
assert(s);
if (r < 0)
return r;
s->start_timeout_defined = true;
s->timeout_stop_usec = s->timeout_start_usec;
s->start_timeout_defined = true;
return 0;
}
int config_parse_unit_env_file(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
_cleanup_free_ char *s = NULL;
int r;
/* Empty assignment frees the list */
return 0;
}
s = unit_full_printf(u, rvalue);
if (!s)
return log_oom();
"Path '%s' is not absolute, ignoring.", s);
return 0;
}
r = strv_extend(env, s);
if (r < 0)
return log_oom();
return 0;
}
int config_parse_environ(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
size_t l;
_cleanup_free_ char *k = NULL;
/* Empty assignment resets the list */
return 0;
}
if (u)
k = unit_full_printf(u, rvalue);
else
if (!k)
return log_oom();
FOREACH_WORD_QUOTED(w, l, k, state) {
_cleanup_free_ char *n;
char **x;
n = cunescape_length(w, l);
if (!n)
return log_oom();
if (!env_assignment_is_valid(n)) {
"Invalid environment assignment, ignoring: %s", rvalue);
continue;
}
x = strv_env_set(*env, n);
if (!x)
return log_oom();
*env = x;
}
return 0;
}
int config_parse_ip_tos(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
x = ip_tos_from_string(rvalue);
if (x < 0) {
"Failed to parse IP TOS value, ignoring: %s", rvalue);
return 0;
}
*ip_tos = x;
return 0;
}
int config_parse_unit_condition_path(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
Condition *c;
_cleanup_free_ char *p = NULL;
/* Empty assignment resets the list */
u->conditions = NULL;
return 0;
}
if (trigger)
rvalue++;
if (negate)
rvalue++;
p = unit_full_printf(u, rvalue);
if (!p)
return log_oom();
if (!path_is_absolute(p)) {
"Path in condition not absolute, ignoring: %s", p);
return 0;
}
if (!c)
return log_oom();
return 0;
}
int config_parse_unit_condition_string(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
Condition *c;
_cleanup_free_ char *s = NULL;
/* Empty assignment resets the list */
u->conditions = NULL;
return 0;
}
if (trigger)
rvalue++;
if (negate)
rvalue++;
s = unit_full_printf(u, rvalue);
if (!s)
return log_oom();
if (!c)
return log_oom();
return 0;
}
int config_parse_unit_condition_null(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
Condition *c;
int b;
/* Empty assignment resets the list */
u->conditions = NULL;
return 0;
}
if (trigger)
rvalue++;
if (negate)
rvalue++;
b = parse_boolean(rvalue);
if (b < 0) {
"Failed to parse boolean value in condition, ignoring: %s",
rvalue);
return 0;
}
if (!b)
if (!c)
return log_oom();
return 0;
}
DEFINE_CONFIG_PARSE_ENUM(config_parse_notify_access, notify_access, NotifyAccess, "Failed to parse notify access specifier");
DEFINE_CONFIG_PARSE_ENUM(config_parse_start_limit_action, start_limit_action, StartLimitAction, "Failed to parse start limit action specifier");
int config_parse_unit_requires_mounts_for(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
int r;
bool empty_before;
empty_before = !u->requires_mounts_for;
/* Make it easy to find units with requires_mounts set */
if (empty_before && u->requires_mounts_for)
return r;
}
int config_parse_documentation(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
int r;
char **a, **b;
assert(u);
/* Empty assignment resets the list */
strv_free(u->documentation);
u->documentation = NULL;
return 0;
}
if (r < 0)
return r;
for (a = b = u->documentation; a && *a; a++) {
if (is_valid_documentation_url(*a))
*(b++) = *a;
else {
"Invalid URL, ignoring: %s", *a);
free(*a);
}
}
*b = NULL;
return r;
}
}
}
int config_parse_syscall_filter(const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
ExecContext *c = data;
bool invert = false;
char *w;
size_t l;
char *state;
assert(u);
/* Empty assignment resets the list */
free(c->syscall_filter);
c->syscall_filter = NULL;
return 0;
}
if (rvalue[0] == '~') {
invert = true;
rvalue++;
}
if (!c->syscall_filter) {
size_t n;
if (!c->syscall_filter)
return log_oom();
/* Add these by default */
#ifdef __NR_sigreturn
#endif
}
int id;
_cleanup_free_ char *t = NULL;
t = strndup(w, l);
if (!t)
return log_oom();
id = syscall_from_name(t);
if (id < 0) {
"Failed to parse syscall, ignoring: %s", t);
continue;
}
if (invert)
else
}
c->no_new_privileges = true;
return 0;
}
const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
_cleanup_free_ char *k = NULL;
int r;
assert(u);
k = unit_name_printf(u, rvalue);
if (!k)
"Failed to resolve unit specifiers on %s. Ignoring.", rvalue);
if (r < 0) {
"Failed to load slice unit %s. Ignoring.", k ? k : rvalue);
return 0;
}
"Slice unit %s is not a slice. Ignoring.", k ? k : rvalue);
return 0;
}
return 0;
}
DEFINE_CONFIG_PARSE_ENUM(config_parse_device_policy, cgroup_device_policy, CGroupDevicePolicy, "Failed to parse device policy");
const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
CGroupContext *c = data;
unsigned long lu;
int r;
c->cpu_shares = 1024;
return 0;
}
if (r < 0 || lu <= 0) {
"CPU shares '%s' invalid. Ignoring.", rvalue);
return 0;
}
c->cpu_shares = lu;
return 0;
}
const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
CGroupContext *c = data;
int r;
return 0;
}
if (r < 0) {
"Memory limit '%s' invalid. Ignoring.", rvalue);
return 0;
}
return 0;
}
const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
CGroupContext *c = data;
const char *m;
size_t n;
while (c->device_allow)
return 0;
}
if (!path)
return log_oom();
"Invalid device node path '%s'. Ignoring.", path);
return 0;
}
if (isempty(m))
m = "rwm";
if (!in_charset(m, "rwm")) {
"Invalid device rights '%s'. Ignoring.", m);
return 0;
}
if (!a)
return log_oom();
a->r = !!strchr(m, 'r');
a->w = !!strchr(m, 'w');
a->m = !!strchr(m, 'm');
return 0;
}
const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
CGroupContext *c = data;
unsigned long lu;
int r;
c->blockio_weight = 1000;
return 0;
}
"Block IO weight '%s' invalid. Ignoring.", rvalue);
return 0;
}
c->blockio_weight = lu;
return 0;
}
const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
CGroupContext *c = data;
unsigned long lu;
const char *weight;
size_t n;
int r;
while (c->blockio_device_weights)
return 0;
}
if (!*weight) {
"Expected block device and device weight. Ignoring.");
return 0;
}
if (!path)
return log_oom();
"Invalid device node path '%s'. Ignoring.", path);
return 0;
}
"Block IO weight '%s' invalid. Ignoring.", rvalue);
return 0;
}
if (!w)
return log_oom();
return 0;
}
const char *unit,
const char *filename,
unsigned line,
const char *section,
const char *lvalue,
int ltype,
const char *rvalue,
void *data,
void *userdata) {
CGroupContext *c = data;
const char *bandwidth;
size_t n;
int r;
while (c->blockio_device_bandwidths)
return 0;
}
if (!*bandwidth) {
"Expected space separated pair of device node and bandwidth. Ignoring.");
return 0;
}
if (!path)
return log_oom();
"Invalid device node path '%s'. Ignoring.", path);
return 0;
}
if (r < 0 || bytes <= 0) {
"Block IO Bandwidth '%s' invalid. Ignoring.", rvalue);
return 0;
}
if (!b)
return log_oom();
return 0;
}
#define FOLLOW_MAX 8
unsigned c = 0;
int fd, r;
FILE *f;
/* This will update the filename pointer if the loaded file is
* reached by a symlink. The old string will be freed. */
for (;;) {
if (c++ >= FOLLOW_MAX)
return -ELOOP;
/* Add the file name we are currently looking at to
* the names of this unit, but only if it is a valid
* unit name. */
if (unit_name_is_valid(name, true)) {
if (!id) {
if (!id)
return -ENOMEM;
if (r < 0)
return r;
}
}
/* Try to open the file name, but don't if its a symlink */
if (fd >= 0)
break;
return -errno;
/* Hmm, so this is a symlink. Let's read the name, and follow it manually */
if (r < 0)
return r;
}
if (!f) {
r = -errno;
return r;
}
*_f = f;
return 0;
}
char *k;
int r;
assert(u);
assert(*u);
/* Let's try to add in all symlink names we found */
while ((k = set_steal_first(names))) {
/* First try to merge in the other name into our
* unit */
r = unit_merge_by_name(*u, k);
if (r < 0) {
/* Hmm, we couldn't merge the other unit into
* ours? Then let's try it the other way
* round */
free(k);
if (other) {
r = unit_merge(other, *u);
if (r >= 0) {
*u = other;
}
}
return r;
}
if (id == k)
unit_choose_id(*u, id);
free(k);
}
return 0;
}
int r;
assert(u);
if (!symlink_names)
return -ENOMEM;
if (path_is_absolute(path)) {
if (!filename) {
r = -ENOMEM;
goto finish;
}
if (r < 0) {
if (r != -ENOENT)
goto finish;
}
} else {
char **p;
/* Instead of opening the path right away, we manually
* follow all symlinks and add their name to our unit
* name set while doing so */
if (!filename) {
r = -ENOMEM;
goto finish;
}
if (u->manager->unit_path_cache &&
r = -ENOENT;
else
if (r < 0) {
if (r != -ENOENT)
goto finish;
/* Empty the symlink names for the next run */
continue;
}
break;
}
}
if (!filename) {
/* Hmm, no suitable file found? */
r = 0;
goto finish;
}
merged = u;
if (r < 0)
goto finish;
if (merged != u) {
u->load_state = UNIT_MERGED;
r = 0;
goto finish;
}
r = -errno;
goto finish;
}
if (null_or_empty(&st))
u->load_state = UNIT_MASKED;
else {
u->load_state = UNIT_LOADED;
/* Now, parse the file contents */
(void*) load_fragment_gperf_lookup, false, true, u);
if (r < 0)
goto finish;
}
free(u->fragment_path);
u->fragment_path = filename;
if (u->source_path) {
else
u->source_mtime = 0;
}
r = 0;
if (f)
fclose(f);
return r;
}
int unit_load_fragment(Unit *u) {
int r;
Iterator i;
const char *t;
assert(u);
/* First, try to find the unit under its id. We always look
* for unit files in the default directories, to make it easy
r = load_from_path(u, u->id);
if (r < 0)
return r;
/* Try to find an alias we can load this with */
if (u->load_state == UNIT_STUB)
SET_FOREACH(t, u->names, i) {
if (t == u->id)
continue;
r = load_from_path(u, t);
if (r < 0)
return r;
if (u->load_state != UNIT_STUB)
break;
}
/* And now, try looking for it under the suggested (originally linked) path */
r = load_from_path(u, u->fragment_path);
if (r < 0)
return r;
if (u->load_state == UNIT_STUB) {
/* Hmm, this didn't work? Then let's get rid
* of the fragment path stored for us, so that
* we don't point to an invalid location. */
free(u->fragment_path);
u->fragment_path = NULL;
}
}
/* Look for a template */
char *k;
k = unit_name_template(u->id);
if (!k)
return -ENOMEM;
r = load_from_path(u, k);
free(k);
if (r < 0)
return r;
if (u->load_state == UNIT_STUB)
SET_FOREACH(t, u->names, i) {
if (t == u->id)
continue;
k = unit_name_template(t);
if (!k)
return -ENOMEM;
r = load_from_path(u, k);
free(k);
if (r < 0)
return r;
if (u->load_state != UNIT_STUB)
break;
}
}
return 0;
}
void unit_dump_config_items(FILE *f) {
static const struct {
const ConfigParserCallback callback;
const char *rvalue;
} table[] = {
{ config_parse_int, "INTEGER" },
{ config_parse_unsigned, "UNSIGNED" },
{ config_parse_bytes_size, "SIZE" },
{ config_parse_bool, "BOOLEAN" },
{ config_parse_string, "STRING" },
{ config_parse_path, "PATH" },
{ config_parse_unit_path_printf, "PATH" },
{ config_parse_strv, "STRING [...]" },
{ config_parse_exec_nice, "NICE" },
{ config_parse_exec_oom_score_adjust, "OOMSCOREADJUST" },
{ config_parse_exec_io_class, "IOCLASS" },
{ config_parse_exec_io_priority, "IOPRIORITY" },
{ config_parse_exec_cpu_sched_policy, "CPUSCHEDPOLICY" },
{ config_parse_exec_cpu_sched_prio, "CPUSCHEDPRIO" },
{ config_parse_exec_cpu_affinity, "CPUAFFINITY" },
{ config_parse_mode, "MODE" },
{ config_parse_unit_env_file, "FILE" },
{ config_parse_output, "OUTPUT" },
{ config_parse_input, "INPUT" },
{ config_parse_facility, "FACILITY" },
{ config_parse_level, "LEVEL" },
{ config_parse_exec_capabilities, "CAPABILITIES" },
{ config_parse_exec_secure_bits, "SECUREBITS" },
{ config_parse_bounding_set, "BOUNDINGSET" },
{ config_parse_limit, "LIMIT" },
{ config_parse_unit_deps, "UNIT [...]" },
{ config_parse_exec, "PATH [ARGUMENT [...]]" },
{ config_parse_service_type, "SERVICETYPE" },
{ config_parse_service_restart, "SERVICERESTART" },
#ifdef HAVE_SYSV_COMPAT
{ config_parse_sysv_priority, "SYSVPRIORITY" },
#else
{ config_parse_warn_compat, "NOTSUPPORTED" },
#endif
{ config_parse_kill_mode, "KILLMODE" },
{ config_parse_kill_signal, "SIGNAL" },
{ config_parse_socket_listen, "SOCKET [...]" },
{ config_parse_socket_bind, "SOCKETBIND" },
{ config_parse_socket_bindtodevice, "NETWORKINTERFACE" },
{ config_parse_sec, "SECONDS" },
{ config_parse_nsec, "NANOSECONDS" },
{ config_parse_path_strv, "PATH [...]" },
{ config_parse_unit_requires_mounts_for, "PATH [...]" },
{ config_parse_exec_mount_flags, "MOUNTFLAG [...]" },
{ config_parse_unit_string_printf, "STRING" },
{ config_parse_trigger_unit, "UNIT" },
{ config_parse_timer, "TIMER" },
{ config_parse_path_spec, "PATH" },
{ config_parse_notify_access, "ACCESS" },
{ config_parse_ip_tos, "TOS" },
{ config_parse_unit_condition_path, "CONDITION" },
{ config_parse_unit_condition_string, "CONDITION" },
{ config_parse_unit_condition_null, "CONDITION" },
{ config_parse_unit_slice, "SLICE" },
{ config_parse_documentation, "URL" },
{ config_parse_service_timeout, "SECONDS" },
{ config_parse_start_limit_action, "ACTION" },
{ config_parse_set_status, "STATUS" },
{ config_parse_service_sockets, "SOCKETS" },
{ config_parse_fsck_passno, "PASSNO" },
{ config_parse_environ, "ENVIRON" },
{ config_parse_syscall_filter, "SYSCALL" },
{ config_parse_cpu_shares, "SHARES" },
{ config_parse_memory_limit, "LIMIT" },
{ config_parse_device_allow, "DEVICE" },
{ config_parse_device_policy, "POLICY" },
{ config_parse_blockio_bandwidth, "BANDWIDTH" },
{ config_parse_blockio_weight, "WEIGHT" },
{ config_parse_blockio_device_weight, "DEVICEWEIGHT" },
{ config_parse_long, "LONG" },
{ config_parse_socket_service, "SERVICE" },
};
const char *i;
assert(f);
unsigned j;
const char *dot;
const ConfigPerfItem *p;
prefix_len = dot-i;
if (dot)
if (prev)
fputc('\n', f);
}
for (j = 0; j < ELEMENTSOF(table); j++)
break;
}
prev = i;
}
}