chiark / gitweb /
tmpfiles: take names of tmpfiles configuration files on the command line
[elogind.git] / src / load-fragment.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <linux/oom.h>
23 #include <assert.h>
24 #include <errno.h>
25 #include <string.h>
26 #include <unistd.h>
27 #include <fcntl.h>
28 #include <sched.h>
29 #include <sys/prctl.h>
30 #include <sys/mount.h>
31 #include <linux/fs.h>
32 #include <sys/stat.h>
33
34 #include "unit.h"
35 #include "strv.h"
36 #include "conf-parser.h"
37 #include "load-fragment.h"
38 #include "log.h"
39 #include "ioprio.h"
40 #include "securebits.h"
41 #include "missing.h"
42 #include "unit-name.h"
43 #include "bus-errors.h"
44
45 #ifndef HAVE_SYSV_COMPAT
46 static int config_parse_warn_compat(
47                 const char *filename,
48                 unsigned line,
49                 const char *section,
50                 const char *lvalue,
51                 const char *rvalue,
52                 void *data,
53                 void *userdata) {
54
55         log_debug("[%s:%u] Support for option %s= has been disabled at compile time and is ignored", filename, line, lvalue);
56         return 0;
57 }
58 #endif
59
60 static int config_parse_deps(
61                 const char *filename,
62                 unsigned line,
63                 const char *section,
64                 const char *lvalue,
65                 const char *rvalue,
66                 void *data,
67                 void *userdata) {
68
69         UnitDependency d = PTR_TO_UINT(data);
70         Unit *u = userdata;
71         char *w;
72         size_t l;
73         char *state;
74
75         assert(filename);
76         assert(lvalue);
77         assert(rvalue);
78
79         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
80                 char *t, *k;
81                 int r;
82
83                 if (!(t = strndup(w, l)))
84                         return -ENOMEM;
85
86                 k = unit_name_printf(u, t);
87                 free(t);
88
89                 if (!k)
90                         return -ENOMEM;
91
92                 r = unit_add_dependency_by_name(u, d, k, NULL, true);
93
94                 if (r < 0) {
95                         log_error("Failed to add dependency on %s, ignoring: %s", k, strerror(-r));
96                         free(k);
97                         return 0;
98                 }
99
100                 free(k);
101         }
102
103         return 0;
104 }
105
106 static int config_parse_names(
107                 const char *filename,
108                 unsigned line,
109                 const char *section,
110                 const char *lvalue,
111                 const char *rvalue,
112                 void *data,
113                 void *userdata) {
114
115         Unit *u = userdata;
116         char *w;
117         size_t l;
118         char *state;
119
120         assert(filename);
121         assert(lvalue);
122         assert(rvalue);
123         assert(data);
124
125         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
126                 char *t, *k;
127                 int r;
128
129                 if (!(t = strndup(w, l)))
130                         return -ENOMEM;
131
132                 k = unit_name_printf(u, t);
133                 free(t);
134
135                 if (!k)
136                         return -ENOMEM;
137
138                 r = unit_merge_by_name(u, k);
139
140                 if (r < 0) {
141                         log_error("Failed to add name %s, ignoring: %s", k, strerror(-r));
142                         free(k);
143                         return 0;
144                 }
145
146                 free(k);
147         }
148
149         return 0;
150 }
151
152 static int config_parse_string_printf(
153                 const char *filename,
154                 unsigned line,
155                 const char *section,
156                 const char *lvalue,
157                 const char *rvalue,
158                 void *data,
159                 void *userdata) {
160
161         Unit *u = userdata;
162         char **s = data;
163         char *k;
164
165         assert(filename);
166         assert(lvalue);
167         assert(rvalue);
168         assert(s);
169         assert(u);
170
171         if (!(k = unit_full_printf(u, rvalue)))
172                 return -ENOMEM;
173
174         free(*s);
175         if (*k)
176                 *s = k;
177         else {
178                 free(k);
179                 *s = NULL;
180         }
181
182         return 0;
183 }
184
185 static int config_parse_listen(
186                 const char *filename,
187                 unsigned line,
188                 const char *section,
189                 const char *lvalue,
190                 const char *rvalue,
191                 void *data,
192                 void *userdata) {
193
194         SocketPort *p;
195         Socket *s;
196
197         assert(filename);
198         assert(lvalue);
199         assert(rvalue);
200         assert(data);
201
202         s = (Socket*) data;
203
204         if (!(p = new0(SocketPort, 1)))
205                 return -ENOMEM;
206
207         if (streq(lvalue, "ListenFIFO")) {
208                 p->type = SOCKET_FIFO;
209
210                 if (!(p->path = strdup(rvalue))) {
211                         free(p);
212                         return -ENOMEM;
213                 }
214
215                 path_kill_slashes(p->path);
216         } else {
217                 p->type = SOCKET_SOCKET;
218
219                 if (socket_address_parse(&p->address, rvalue) < 0) {
220                         log_error("[%s:%u] Failed to parse address value, ignoring: %s", filename, line, rvalue);
221                         free(p);
222                         return 0;
223                 }
224
225                 if (streq(lvalue, "ListenStream"))
226                         p->address.type = SOCK_STREAM;
227                 else if (streq(lvalue, "ListenDatagram"))
228                         p->address.type = SOCK_DGRAM;
229                 else {
230                         assert(streq(lvalue, "ListenSequentialPacket"));
231                         p->address.type = SOCK_SEQPACKET;
232                 }
233
234                 if (socket_address_family(&p->address) != AF_LOCAL && p->address.type == SOCK_SEQPACKET) {
235                         log_error("[%s:%u] Address family not supported, ignoring: %s", filename, line, rvalue);
236                         free(p);
237                         return 0;
238                 }
239         }
240
241         p->fd = -1;
242         LIST_PREPEND(SocketPort, port, s->ports, p);
243
244         return 0;
245 }
246
247 static int config_parse_socket_bind(
248                 const char *filename,
249                 unsigned line,
250                 const char *section,
251                 const char *lvalue,
252                 const char *rvalue,
253                 void *data,
254                 void *userdata) {
255
256         Socket *s;
257         SocketAddressBindIPv6Only b;
258
259         assert(filename);
260         assert(lvalue);
261         assert(rvalue);
262         assert(data);
263
264         s = (Socket*) data;
265
266         if ((b = socket_address_bind_ipv6_only_from_string(rvalue)) < 0) {
267                 int r;
268
269                 if ((r = parse_boolean(rvalue)) < 0) {
270                         log_error("[%s:%u] Failed to parse bind IPv6 only value, ignoring: %s", filename, line, rvalue);
271                         return 0;
272                 }
273
274                 s->bind_ipv6_only = r ? SOCKET_ADDRESS_IPV6_ONLY : SOCKET_ADDRESS_BOTH;
275         } else
276                 s->bind_ipv6_only = b;
277
278         return 0;
279 }
280
281 static int config_parse_nice(
282                 const char *filename,
283                 unsigned line,
284                 const char *section,
285                 const char *lvalue,
286                 const char *rvalue,
287                 void *data,
288                 void *userdata) {
289
290         ExecContext *c = data;
291         int priority;
292
293         assert(filename);
294         assert(lvalue);
295         assert(rvalue);
296         assert(data);
297
298         if (safe_atoi(rvalue, &priority) < 0) {
299                 log_error("[%s:%u] Failed to parse nice priority, ignoring: %s. ", filename, line, rvalue);
300                 return 0;
301         }
302
303         if (priority < PRIO_MIN || priority >= PRIO_MAX) {
304                 log_error("[%s:%u] Nice priority out of range, ignoring: %s", filename, line, rvalue);
305                 return 0;
306         }
307
308         c->nice = priority;
309         c->nice_set = true;
310
311         return 0;
312 }
313
314 static int config_parse_oom_score_adjust(
315                 const char *filename,
316                 unsigned line,
317                 const char *section,
318                 const char *lvalue,
319                 const char *rvalue,
320                 void *data,
321                 void *userdata) {
322
323         ExecContext *c = data;
324         int oa;
325
326         assert(filename);
327         assert(lvalue);
328         assert(rvalue);
329         assert(data);
330
331         if (safe_atoi(rvalue, &oa) < 0) {
332                 log_error("[%s:%u] Failed to parse the OOM score adjust value, ignoring: %s", filename, line, rvalue);
333                 return 0;
334         }
335
336         if (oa < OOM_SCORE_ADJ_MIN || oa > OOM_SCORE_ADJ_MAX) {
337                 log_error("[%s:%u] OOM score adjust value out of range, ignoring: %s", filename, line, rvalue);
338                 return 0;
339         }
340
341         c->oom_score_adjust = oa;
342         c->oom_score_adjust_set = true;
343
344         return 0;
345 }
346
347 static int config_parse_mode(
348                 const char *filename,
349                 unsigned line,
350                 const char *section,
351                 const char *lvalue,
352                 const char *rvalue,
353                 void *data,
354                 void *userdata) {
355
356         mode_t *m = data;
357         long l;
358         char *x = NULL;
359
360         assert(filename);
361         assert(lvalue);
362         assert(rvalue);
363         assert(data);
364
365         errno = 0;
366         l = strtol(rvalue, &x, 8);
367         if (!x || *x || errno) {
368                 log_error("[%s:%u] Failed to parse mode value, ignoring: %s", filename, line, rvalue);
369                 return 0;
370         }
371
372         if (l < 0000 || l > 07777) {
373                 log_error("[%s:%u] mode value out of range, ignoring: %s", filename, line, rvalue);
374                 return 0;
375         }
376
377         *m = (mode_t) l;
378         return 0;
379 }
380
381 static int config_parse_exec(
382                 const char *filename,
383                 unsigned line,
384                 const char *section,
385                 const char *lvalue,
386                 const char *rvalue,
387                 void *data,
388                 void *userdata) {
389
390         ExecCommand **e = data, *nce;
391         char *path, **n;
392         unsigned k;
393
394         assert(filename);
395         assert(lvalue);
396         assert(rvalue);
397         assert(e);
398
399         /* We accept an absolute path as first argument, or
400          * alternatively an absolute prefixed with @ to allow
401          * overriding of argv[0]. */
402
403         for (;;) {
404                 char *w;
405                 size_t l;
406                 char *state;
407                 bool honour_argv0 = false, ignore = false;
408
409                 path = NULL;
410                 nce = NULL;
411                 n = NULL;
412
413                 rvalue += strspn(rvalue, WHITESPACE);
414
415                 if (rvalue[0] == 0)
416                         break;
417
418                 if (rvalue[0] == '-') {
419                         ignore = true;
420                         rvalue ++;
421                 }
422
423                 if (rvalue[0] == '@') {
424                         honour_argv0 = true;
425                         rvalue ++;
426                 }
427
428                 if (*rvalue != '/') {
429                         log_error("[%s:%u] Invalid executable path in command line, ignoring: %s", filename, line, rvalue);
430                         return 0;
431                 }
432
433                 k = 0;
434                 FOREACH_WORD_QUOTED(w, l, rvalue, state) {
435                         if (strncmp(w, ";", MAX(l, 1U)) == 0)
436                                 break;
437
438                         k++;
439                 }
440
441                 if (!(n = new(char*, k + !honour_argv0)))
442                         return -ENOMEM;
443
444                 k = 0;
445                 FOREACH_WORD_QUOTED(w, l, rvalue, state) {
446                         if (strncmp(w, ";", MAX(l, 1U)) == 0)
447                                 break;
448
449                         if (honour_argv0 && w == rvalue) {
450                                 assert(!path);
451                                 if (!(path = cunescape_length(w, l)))
452                                         goto fail;
453                         } else {
454                                 if (!(n[k++] = cunescape_length(w, l)))
455                                         goto fail;
456                         }
457                 }
458
459                 n[k] = NULL;
460
461                 if (!n[0]) {
462                         log_error("[%s:%u] Invalid command line, ignoring: %s", filename, line, rvalue);
463                         strv_free(n);
464                         return 0;
465                 }
466
467                 if (!path)
468                         if (!(path = strdup(n[0])))
469                                 goto fail;
470
471                 assert(path_is_absolute(path));
472
473                 if (!(nce = new0(ExecCommand, 1)))
474                         goto fail;
475
476                 nce->argv = n;
477                 nce->path = path;
478                 nce->ignore = ignore;
479
480                 path_kill_slashes(nce->path);
481
482                 exec_command_append_list(e, nce);
483
484                 rvalue = state;
485         }
486
487         return 0;
488
489 fail:
490         n[k] = NULL;
491         strv_free(n);
492         free(path);
493         free(nce);
494
495         return -ENOMEM;
496 }
497
498 static int config_parse_usec(
499                 const char *filename,
500                 unsigned line,
501                 const char *section,
502                 const char *lvalue,
503                 const char *rvalue,
504                 void *data,
505                 void *userdata) {
506
507         usec_t *usec = data;
508
509         assert(filename);
510         assert(lvalue);
511         assert(rvalue);
512         assert(data);
513
514         if (parse_usec(rvalue, usec) < 0) {
515                 log_error("[%s:%u] Failed to parse time value, ignoring: %s", filename, line, rvalue);
516                 return 0;
517         }
518
519         return 0;
520 }
521
522 static DEFINE_CONFIG_PARSE_ENUM(config_parse_service_type, service_type, ServiceType, "Failed to parse service type");
523 static DEFINE_CONFIG_PARSE_ENUM(config_parse_service_restart, service_restart, ServiceRestart, "Failed to parse service restart specifier");
524
525 static int config_parse_bindtodevice(
526                 const char *filename,
527                 unsigned line,
528                 const char *section,
529                 const char *lvalue,
530                 const char *rvalue,
531                 void *data,
532                 void *userdata) {
533
534         Socket *s = data;
535         char *n;
536
537         assert(filename);
538         assert(lvalue);
539         assert(rvalue);
540         assert(data);
541
542         if (rvalue[0] && !streq(rvalue, "*")) {
543                 if (!(n = strdup(rvalue)))
544                         return -ENOMEM;
545         } else
546                 n = NULL;
547
548         free(s->bind_to_device);
549         s->bind_to_device = n;
550
551         return 0;
552 }
553
554 static DEFINE_CONFIG_PARSE_ENUM(config_parse_output, exec_output, ExecOutput, "Failed to parse output specifier");
555 static DEFINE_CONFIG_PARSE_ENUM(config_parse_input, exec_input, ExecInput, "Failed to parse input specifier");
556
557 static int config_parse_facility(
558                 const char *filename,
559                 unsigned line,
560                 const char *section,
561                 const char *lvalue,
562                 const char *rvalue,
563                 void *data,
564                 void *userdata) {
565
566
567         int *o = data, x;
568
569         assert(filename);
570         assert(lvalue);
571         assert(rvalue);
572         assert(data);
573
574         if ((x = log_facility_from_string(rvalue)) < 0) {
575                 log_error("[%s:%u] Failed to parse log facility, ignoring: %s", filename, line, rvalue);
576                 return 0;
577         }
578
579         *o = LOG_MAKEPRI(x, LOG_PRI(*o));
580
581         return 0;
582 }
583
584 static int config_parse_level(
585                 const char *filename,
586                 unsigned line,
587                 const char *section,
588                 const char *lvalue,
589                 const char *rvalue,
590                 void *data,
591                 void *userdata) {
592
593
594         int *o = data, x;
595
596         assert(filename);
597         assert(lvalue);
598         assert(rvalue);
599         assert(data);
600
601         if ((x = log_level_from_string(rvalue)) < 0) {
602                 log_error("[%s:%u] Failed to parse log level, ignoring: %s", filename, line, rvalue);
603                 return 0;
604         }
605
606         *o = LOG_MAKEPRI(LOG_FAC(*o), x);
607         return 0;
608 }
609
610 static int config_parse_io_class(
611                 const char *filename,
612                 unsigned line,
613                 const char *section,
614                 const char *lvalue,
615                 const char *rvalue,
616                 void *data,
617                 void *userdata) {
618
619         ExecContext *c = data;
620         int x;
621
622         assert(filename);
623         assert(lvalue);
624         assert(rvalue);
625         assert(data);
626
627         if ((x = ioprio_class_from_string(rvalue)) < 0) {
628                 log_error("[%s:%u] Failed to parse IO scheduling class, ignoring: %s", filename, line, rvalue);
629                 return 0;
630         }
631
632         c->ioprio = IOPRIO_PRIO_VALUE(x, IOPRIO_PRIO_DATA(c->ioprio));
633         c->ioprio_set = true;
634
635         return 0;
636 }
637
638 static int config_parse_io_priority(
639                 const char *filename,
640                 unsigned line,
641                 const char *section,
642                 const char *lvalue,
643                 const char *rvalue,
644                 void *data,
645                 void *userdata) {
646
647         ExecContext *c = data;
648         int i;
649
650         assert(filename);
651         assert(lvalue);
652         assert(rvalue);
653         assert(data);
654
655         if (safe_atoi(rvalue, &i) < 0 || i < 0 || i >= IOPRIO_BE_NR) {
656                 log_error("[%s:%u] Failed to parse io priority, ignoring: %s", filename, line, rvalue);
657                 return 0;
658         }
659
660         c->ioprio = IOPRIO_PRIO_VALUE(IOPRIO_PRIO_CLASS(c->ioprio), i);
661         c->ioprio_set = true;
662
663         return 0;
664 }
665
666 static int config_parse_cpu_sched_policy(
667                 const char *filename,
668                 unsigned line,
669                 const char *section,
670                 const char *lvalue,
671                 const char *rvalue,
672                 void *data,
673                 void *userdata) {
674
675
676         ExecContext *c = data;
677         int x;
678
679         assert(filename);
680         assert(lvalue);
681         assert(rvalue);
682         assert(data);
683
684         if ((x = sched_policy_from_string(rvalue)) < 0) {
685                 log_error("[%s:%u] Failed to parse CPU scheduling policy, ignoring: %s", filename, line, rvalue);
686                 return 0;
687         }
688
689         c->cpu_sched_policy = x;
690         c->cpu_sched_set = true;
691
692         return 0;
693 }
694
695 static int config_parse_cpu_sched_prio(
696                 const char *filename,
697                 unsigned line,
698                 const char *section,
699                 const char *lvalue,
700                 const char *rvalue,
701                 void *data,
702                 void *userdata) {
703
704         ExecContext *c = data;
705         int i;
706
707         assert(filename);
708         assert(lvalue);
709         assert(rvalue);
710         assert(data);
711
712         /* On Linux RR/FIFO have the same range */
713         if (safe_atoi(rvalue, &i) < 0 || i < sched_get_priority_min(SCHED_RR) || i > sched_get_priority_max(SCHED_RR)) {
714                 log_error("[%s:%u] Failed to parse CPU scheduling priority, ignoring: %s", filename, line, rvalue);
715                 return 0;
716         }
717
718         c->cpu_sched_priority = i;
719         c->cpu_sched_set = true;
720
721         return 0;
722 }
723
724 static int config_parse_cpu_affinity(
725                 const char *filename,
726                 unsigned line,
727                 const char *section,
728                 const char *lvalue,
729                 const char *rvalue,
730                 void *data,
731                 void *userdata) {
732
733         ExecContext *c = data;
734         char *w;
735         size_t l;
736         char *state;
737
738         assert(filename);
739         assert(lvalue);
740         assert(rvalue);
741         assert(data);
742
743         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
744                 char *t;
745                 int r;
746                 unsigned cpu;
747
748                 if (!(t = strndup(w, l)))
749                         return -ENOMEM;
750
751                 r = safe_atou(t, &cpu);
752                 free(t);
753
754                 if (!(c->cpuset))
755                         if (!(c->cpuset = cpu_set_malloc(&c->cpuset_ncpus)))
756                                 return -ENOMEM;
757
758                 if (r < 0 || cpu >= c->cpuset_ncpus) {
759                         log_error("[%s:%u] Failed to parse CPU affinity, ignoring: %s", filename, line, rvalue);
760                         return 0;
761                 }
762
763                 CPU_SET_S(cpu, CPU_ALLOC_SIZE(c->cpuset_ncpus), c->cpuset);
764         }
765
766         return 0;
767 }
768
769 static int config_parse_capabilities(
770                 const char *filename,
771                 unsigned line,
772                 const char *section,
773                 const char *lvalue,
774                 const char *rvalue,
775                 void *data,
776                 void *userdata) {
777
778         ExecContext *c = data;
779         cap_t cap;
780
781         assert(filename);
782         assert(lvalue);
783         assert(rvalue);
784         assert(data);
785
786         if (!(cap = cap_from_text(rvalue))) {
787                 if (errno == ENOMEM)
788                         return -ENOMEM;
789
790                 log_error("[%s:%u] Failed to parse capabilities, ignoring: %s", filename, line, rvalue);
791                 return 0;
792         }
793
794         if (c->capabilities)
795                 cap_free(c->capabilities);
796         c->capabilities = cap;
797
798         return 0;
799 }
800
801 static int config_parse_secure_bits(
802                 const char *filename,
803                 unsigned line,
804                 const char *section,
805                 const char *lvalue,
806                 const char *rvalue,
807                 void *data,
808                 void *userdata) {
809
810         ExecContext *c = data;
811         char *w;
812         size_t l;
813         char *state;
814
815         assert(filename);
816         assert(lvalue);
817         assert(rvalue);
818         assert(data);
819
820         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
821                 if (first_word(w, "keep-caps"))
822                         c->secure_bits |= SECURE_KEEP_CAPS;
823                 else if (first_word(w, "keep-caps-locked"))
824                         c->secure_bits |= SECURE_KEEP_CAPS_LOCKED;
825                 else if (first_word(w, "no-setuid-fixup"))
826                         c->secure_bits |= SECURE_NO_SETUID_FIXUP;
827                 else if (first_word(w, "no-setuid-fixup-locked"))
828                         c->secure_bits |= SECURE_NO_SETUID_FIXUP_LOCKED;
829                 else if (first_word(w, "noroot"))
830                         c->secure_bits |= SECURE_NOROOT;
831                 else if (first_word(w, "noroot-locked"))
832                         c->secure_bits |= SECURE_NOROOT_LOCKED;
833                 else {
834                         log_error("[%s:%u] Failed to parse secure bits, ignoring: %s", filename, line, rvalue);
835                         return 0;
836                 }
837         }
838
839         return 0;
840 }
841
842 static int config_parse_bounding_set(
843                 const char *filename,
844                 unsigned line,
845                 const char *section,
846                 const char *lvalue,
847                 const char *rvalue,
848                 void *data,
849                 void *userdata) {
850
851         ExecContext *c = data;
852         char *w;
853         size_t l;
854         char *state;
855
856         assert(filename);
857         assert(lvalue);
858         assert(rvalue);
859         assert(data);
860
861         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
862                 char *t;
863                 int r;
864                 cap_value_t cap;
865
866                 if (!(t = strndup(w, l)))
867                         return -ENOMEM;
868
869                 r = cap_from_name(t, &cap);
870                 free(t);
871
872                 if (r < 0) {
873                         log_error("[%s:%u] Failed to parse capability bounding set, ignoring: %s", filename, line, rvalue);
874                         return 0;
875                 }
876
877                 c->capability_bounding_set_drop |= 1 << cap;
878         }
879
880         return 0;
881 }
882
883 static int config_parse_timer_slack_nsec(
884                 const char *filename,
885                 unsigned line,
886                 const char *section,
887                 const char *lvalue,
888                 const char *rvalue,
889                 void *data,
890                 void *userdata) {
891
892         ExecContext *c = data;
893         unsigned long u;
894
895         assert(filename);
896         assert(lvalue);
897         assert(rvalue);
898         assert(data);
899
900         if (safe_atolu(rvalue, &u) < 0) {
901                 log_error("[%s:%u] Failed to parse time slack value, ignoring: %s", filename, line, rvalue);
902                 return 0;
903         }
904
905         c->timer_slack_nsec = u;
906
907         return 0;
908 }
909
910 static int config_parse_limit(
911                 const char *filename,
912                 unsigned line,
913                 const char *section,
914                 const char *lvalue,
915                 const char *rvalue,
916                 void *data,
917                 void *userdata) {
918
919         struct rlimit **rl = data;
920         unsigned long long u;
921
922         assert(filename);
923         assert(lvalue);
924         assert(rvalue);
925         assert(data);
926
927         if (safe_atollu(rvalue, &u) < 0) {
928                 log_error("[%s:%u] Failed to parse resource value, ignoring: %s", filename, line, rvalue);
929                 return 0;
930         }
931
932         if (!*rl)
933                 if (!(*rl = new(struct rlimit, 1)))
934                         return -ENOMEM;
935
936         (*rl)->rlim_cur = (*rl)->rlim_max = (rlim_t) u;
937         return 0;
938 }
939
940 static int config_parse_cgroup(
941                 const char *filename,
942                 unsigned line,
943                 const char *section,
944                 const char *lvalue,
945                 const char *rvalue,
946                 void *data,
947                 void *userdata) {
948
949         Unit *u = userdata;
950         char *w;
951         size_t l;
952         char *state;
953
954         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
955                 char *t;
956                 int r;
957
958                 if (!(t = cunescape_length(w, l)))
959                         return -ENOMEM;
960
961                 r = unit_add_cgroup_from_text(u, t);
962                 free(t);
963
964                 if (r < 0) {
965                         log_error("[%s:%u] Failed to parse cgroup value, ignoring: %s", filename, line, rvalue);
966                         return 0;
967                 }
968         }
969
970         return 0;
971 }
972
973 #ifdef HAVE_SYSV_COMPAT
974 static int config_parse_sysv_priority(
975                 const char *filename,
976                 unsigned line,
977                 const char *section,
978                 const char *lvalue,
979                 const char *rvalue,
980                 void *data,
981                 void *userdata) {
982
983         int *priority = data;
984         int i;
985
986         assert(filename);
987         assert(lvalue);
988         assert(rvalue);
989         assert(data);
990
991         if (safe_atoi(rvalue, &i) < 0 || i < 0) {
992                 log_error("[%s:%u] Failed to parse SysV start priority, ignoring: %s", filename, line, rvalue);
993                 return 0;
994         }
995
996         *priority = (int) i;
997         return 0;
998 }
999 #endif
1000
1001 static int config_parse_fsck_passno(
1002                 const char *filename,
1003                 unsigned line,
1004                 const char *section,
1005                 const char *lvalue,
1006                 const char *rvalue,
1007                 void *data,
1008                 void *userdata) {
1009
1010         int *passno = data;
1011         int i;
1012
1013         assert(filename);
1014         assert(lvalue);
1015         assert(rvalue);
1016         assert(data);
1017
1018         if (safe_atoi(rvalue, &i) || i < 0) {
1019                 log_error("[%s:%u] Failed to parse fsck pass number, ignoring: %s", filename, line, rvalue);
1020                 return 0;
1021         }
1022
1023         *passno = (int) i;
1024         return 0;
1025 }
1026
1027 static DEFINE_CONFIG_PARSE_ENUM(config_parse_kill_mode, kill_mode, KillMode, "Failed to parse kill mode");
1028
1029 static int config_parse_kill_signal(
1030                 const char *filename,
1031                 unsigned line,
1032                 const char *section,
1033                 const char *lvalue,
1034                 const char *rvalue,
1035                 void *data,
1036                 void *userdata) {
1037
1038         int *sig = data;
1039         int r;
1040
1041         assert(filename);
1042         assert(lvalue);
1043         assert(rvalue);
1044         assert(sig);
1045
1046         if ((r = signal_from_string_try_harder(rvalue)) <= 0) {
1047                 log_error("[%s:%u] Failed to parse kill signal, ignoring: %s", filename, line, rvalue);
1048                 return 0;
1049         }
1050
1051         *sig = r;
1052         return 0;
1053 }
1054
1055 static int config_parse_mount_flags(
1056                 const char *filename,
1057                 unsigned line,
1058                 const char *section,
1059                 const char *lvalue,
1060                 const char *rvalue,
1061                 void *data,
1062                 void *userdata) {
1063
1064         ExecContext *c = data;
1065         char *w;
1066         size_t l;
1067         char *state;
1068         unsigned long flags = 0;
1069
1070         assert(filename);
1071         assert(lvalue);
1072         assert(rvalue);
1073         assert(data);
1074
1075         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
1076                 if (strncmp(w, "shared", MAX(l, 6U)) == 0)
1077                         flags |= MS_SHARED;
1078                 else if (strncmp(w, "slave", MAX(l, 5U)) == 0)
1079                         flags |= MS_SLAVE;
1080                 else if (strncmp(w, "private", MAX(l, 7U)) == 0)
1081                         flags |= MS_PRIVATE;
1082                 else {
1083                         log_error("[%s:%u] Failed to parse mount flags, ignoring: %s", filename, line, rvalue);
1084                         return 0;
1085                 }
1086         }
1087
1088         c->mount_flags = flags;
1089         return 0;
1090 }
1091
1092 static int config_parse_timer(
1093                 const char *filename,
1094                 unsigned line,
1095                 const char *section,
1096                 const char *lvalue,
1097                 const char *rvalue,
1098                 void *data,
1099                 void *userdata) {
1100
1101         Timer *t = data;
1102         usec_t u;
1103         TimerValue *v;
1104         TimerBase b;
1105
1106         assert(filename);
1107         assert(lvalue);
1108         assert(rvalue);
1109         assert(data);
1110
1111         if ((b = timer_base_from_string(lvalue)) < 0) {
1112                 log_error("[%s:%u] Failed to parse timer base, ignoring: %s", filename, line, lvalue);
1113                 return 0;
1114         }
1115
1116         if (parse_usec(rvalue, &u) < 0) {
1117                 log_error("[%s:%u] Failed to parse timer value, ignoring: %s", filename, line, rvalue);
1118                 return 0;
1119         }
1120
1121         if (!(v = new0(TimerValue, 1)))
1122                 return -ENOMEM;
1123
1124         v->base = b;
1125         v->value = u;
1126
1127         LIST_PREPEND(TimerValue, value, t->values, v);
1128
1129         return 0;
1130 }
1131
1132 static int config_parse_timer_unit(
1133                 const char *filename,
1134                 unsigned line,
1135                 const char *section,
1136                 const char *lvalue,
1137                 const char *rvalue,
1138                 void *data,
1139                 void *userdata) {
1140
1141         Timer *t = data;
1142         int r;
1143         DBusError error;
1144
1145         assert(filename);
1146         assert(lvalue);
1147         assert(rvalue);
1148         assert(data);
1149
1150         dbus_error_init(&error);
1151
1152         if (endswith(rvalue, ".timer")) {
1153                 log_error("[%s:%u] Unit cannot be of type timer, ignoring: %s", filename, line, rvalue);
1154                 return 0;
1155         }
1156
1157         if ((r = manager_load_unit(t->meta.manager, rvalue, NULL, NULL, &t->unit)) < 0) {
1158                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1159                 dbus_error_free(&error);
1160                 return 0;
1161         }
1162
1163         return 0;
1164 }
1165
1166 static int config_parse_path_spec(
1167                 const char *filename,
1168                 unsigned line,
1169                 const char *section,
1170                 const char *lvalue,
1171                 const char *rvalue,
1172                 void *data,
1173                 void *userdata) {
1174
1175         Path *p = data;
1176         PathSpec *s;
1177         PathType b;
1178
1179         assert(filename);
1180         assert(lvalue);
1181         assert(rvalue);
1182         assert(data);
1183
1184         if ((b = path_type_from_string(lvalue)) < 0) {
1185                 log_error("[%s:%u] Failed to parse path type, ignoring: %s", filename, line, lvalue);
1186                 return 0;
1187         }
1188
1189         if (!path_is_absolute(rvalue)) {
1190                 log_error("[%s:%u] Path is not absolute, ignoring: %s", filename, line, rvalue);
1191                 return 0;
1192         }
1193
1194         if (!(s = new0(PathSpec, 1)))
1195                 return -ENOMEM;
1196
1197         if (!(s->path = strdup(rvalue))) {
1198                 free(s);
1199                 return -ENOMEM;
1200         }
1201
1202         path_kill_slashes(s->path);
1203
1204         s->type = b;
1205         s->inotify_fd = -1;
1206
1207         LIST_PREPEND(PathSpec, spec, p->specs, s);
1208
1209         return 0;
1210 }
1211
1212 static int config_parse_path_unit(
1213                 const char *filename,
1214                 unsigned line,
1215                 const char *section,
1216                 const char *lvalue,
1217                 const char *rvalue,
1218                 void *data,
1219                 void *userdata) {
1220
1221         Path *t = data;
1222         int r;
1223         DBusError error;
1224
1225         assert(filename);
1226         assert(lvalue);
1227         assert(rvalue);
1228         assert(data);
1229
1230         dbus_error_init(&error);
1231
1232         if (endswith(rvalue, ".path")) {
1233                 log_error("[%s:%u] Unit cannot be of type path, ignoring: %s", filename, line, rvalue);
1234                 return 0;
1235         }
1236
1237         if ((r = manager_load_unit(t->meta.manager, rvalue, NULL, &error, &t->unit)) < 0) {
1238                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1239                 dbus_error_free(&error);
1240                 return 0;
1241         }
1242
1243         return 0;
1244 }
1245
1246 static int config_parse_socket_service(
1247                 const char *filename,
1248                 unsigned line,
1249                 const char *section,
1250                 const char *lvalue,
1251                 const char *rvalue,
1252                 void *data,
1253                 void *userdata) {
1254
1255         Socket *s = data;
1256         int r;
1257         DBusError error;
1258
1259         assert(filename);
1260         assert(lvalue);
1261         assert(rvalue);
1262         assert(data);
1263
1264         dbus_error_init(&error);
1265
1266         if (!endswith(rvalue, ".service")) {
1267                 log_error("[%s:%u] Unit must be of type service, ignoring: %s", filename, line, rvalue);
1268                 return 0;
1269         }
1270
1271         if ((r = manager_load_unit(s->meta.manager, rvalue, NULL, &error, (Unit**) &s->service)) < 0) {
1272                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1273                 dbus_error_free(&error);
1274                 return 0;
1275         }
1276
1277         return 0;
1278 }
1279
1280 static int config_parse_service_sockets(
1281                 const char *filename,
1282                 unsigned line,
1283                 const char *section,
1284                 const char *lvalue,
1285                 const char *rvalue,
1286                 void *data,
1287                 void *userdata) {
1288
1289         Service *s = data;
1290         int r;
1291         DBusError error;
1292         char *state, *w;
1293         size_t l;
1294
1295         assert(filename);
1296         assert(lvalue);
1297         assert(rvalue);
1298         assert(data);
1299
1300         dbus_error_init(&error);
1301
1302         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
1303                 char *t;
1304                 Unit *sock;
1305
1306                 if (!(t = strndup(w, l)))
1307                         return -ENOMEM;
1308
1309                 if (!endswith(t, ".socket")) {
1310                         log_error("[%s:%u] Unit must be of type socket, ignoring: %s", filename, line, rvalue);
1311                         free(t);
1312                         continue;
1313                 }
1314
1315                 r = manager_load_unit(s->meta.manager, t, NULL, &error, &sock);
1316                 free(t);
1317
1318                 if (r < 0) {
1319                         log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1320                         dbus_error_free(&error);
1321                         continue;
1322                 }
1323
1324                 if ((r = set_ensure_allocated(&s->configured_sockets, trivial_hash_func, trivial_compare_func)) < 0)
1325                         return r;
1326
1327                 if ((r = set_put(s->configured_sockets, sock)) < 0)
1328                         return r;
1329         }
1330
1331         return 0;
1332 }
1333
1334 static int config_parse_env_file(
1335                 const char *filename,
1336                 unsigned line,
1337                 const char *section,
1338                 const char *lvalue,
1339                 const char *rvalue,
1340                 void *data,
1341                 void *userdata) {
1342
1343         FILE *f;
1344         int r;
1345         char ***env = data;
1346         bool ignore = false;
1347
1348         assert(filename);
1349         assert(lvalue);
1350         assert(rvalue);
1351         assert(data);
1352
1353         if (rvalue[0] == '-') {
1354                 ignore = true;
1355                 rvalue++;
1356         }
1357
1358         if (!path_is_absolute(rvalue)) {
1359                 log_error("[%s:%u] Path '%s' is not absolute, ignoring.", filename, line, rvalue);
1360                 return 0;
1361         }
1362
1363         if (!(f = fopen(rvalue, "re"))) {
1364                 if (!ignore)
1365                         log_error("[%s:%u] Failed to open environment file '%s', ignoring: %m", filename, line, rvalue);
1366                 return 0;
1367         }
1368
1369         while (!feof(f)) {
1370                 char l[LINE_MAX], *p, *u;
1371                 char **t;
1372
1373                 if (!fgets(l, sizeof(l), f)) {
1374                         if (feof(f))
1375                                 break;
1376
1377                         log_error("[%s:%u] Failed to read environment file '%s', ignoring: %m", filename, line, rvalue);
1378                         r = 0;
1379                         goto finish;
1380                 }
1381
1382                 p = strstrip(l);
1383
1384                 if (!*p)
1385                         continue;
1386
1387                 if (strchr(COMMENTS, *p))
1388                         continue;
1389
1390                 if (!(u = normalize_env_assignment(p))) {
1391                         log_error("Out of memory");
1392                         r = -ENOMEM;
1393                         goto finish;
1394                 }
1395
1396                 t = strv_append(*env, u);
1397                 free(u);
1398
1399                 if (!t) {
1400                         log_error("Out of memory");
1401                         r = -ENOMEM;
1402                         goto finish;
1403                 }
1404
1405                 strv_free(*env);
1406                 *env = t;
1407         }
1408
1409         r = 0;
1410
1411 finish:
1412         if (f)
1413                 fclose(f);
1414
1415         return r;
1416 }
1417
1418 static int config_parse_ip_tos(
1419                 const char *filename,
1420                 unsigned line,
1421                 const char *section,
1422                 const char *lvalue,
1423                 const char *rvalue,
1424                 void *data,
1425                 void *userdata) {
1426
1427         int *ip_tos = data, x;
1428
1429         assert(filename);
1430         assert(lvalue);
1431         assert(rvalue);
1432         assert(data);
1433
1434         if ((x = ip_tos_from_string(rvalue)) < 0)
1435                 if (safe_atoi(rvalue, &x) < 0) {
1436                         log_error("[%s:%u] Failed to parse IP TOS value, ignoring: %s", filename, line, rvalue);
1437                         return 0;
1438                 }
1439
1440         *ip_tos = x;
1441         return 0;
1442 }
1443
1444 static int config_parse_condition_path(
1445                 const char *filename,
1446                 unsigned line,
1447                 const char *section,
1448                 const char *lvalue,
1449                 const char *rvalue,
1450                 void *data,
1451                 void *userdata) {
1452
1453         Unit *u = data;
1454         bool negate;
1455         Condition *c;
1456
1457         assert(filename);
1458         assert(lvalue);
1459         assert(rvalue);
1460         assert(data);
1461
1462         if ((negate = rvalue[0] == '!'))
1463                 rvalue++;
1464
1465         if (!path_is_absolute(rvalue)) {
1466                 log_error("[%s:%u] Path in condition not absolute, ignoring: %s", filename, line, rvalue);
1467                 return 0;
1468         }
1469
1470         if (!(c = condition_new(streq(lvalue, "ConditionPathExists") ? CONDITION_PATH_EXISTS : CONDITION_DIRECTORY_NOT_EMPTY,
1471                                 rvalue, negate)))
1472                 return -ENOMEM;
1473
1474         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1475         return 0;
1476 }
1477
1478 static int config_parse_condition_kernel(
1479                 const char *filename,
1480                 unsigned line,
1481                 const char *section,
1482                 const char *lvalue,
1483                 const char *rvalue,
1484                 void *data,
1485                 void *userdata) {
1486
1487         Unit *u = data;
1488         bool negate;
1489         Condition *c;
1490
1491         assert(filename);
1492         assert(lvalue);
1493         assert(rvalue);
1494         assert(data);
1495
1496         if ((negate = rvalue[0] == '!'))
1497                 rvalue++;
1498
1499         if (!(c = condition_new(CONDITION_KERNEL_COMMAND_LINE, rvalue, negate)))
1500                 return -ENOMEM;
1501
1502         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1503         return 0;
1504 }
1505
1506 static int config_parse_condition_null(
1507                 const char *filename,
1508                 unsigned line,
1509                 const char *section,
1510                 const char *lvalue,
1511                 const char *rvalue,
1512                 void *data,
1513                 void *userdata) {
1514
1515         Unit *u = data;
1516         Condition *c;
1517         bool negate;
1518         int b;
1519
1520         assert(filename);
1521         assert(lvalue);
1522         assert(rvalue);
1523         assert(data);
1524
1525         if ((negate = rvalue[0] == '!'))
1526                 rvalue++;
1527
1528         if ((b = parse_boolean(rvalue)) < 0) {
1529                 log_error("[%s:%u] Failed to parse boolean value in condition, ignoring: %s", filename, line, rvalue);
1530                 return 0;
1531         }
1532
1533         if (!b)
1534                 negate = !negate;
1535
1536         if (!(c = condition_new(CONDITION_NULL, NULL, negate)))
1537                 return -ENOMEM;
1538
1539         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1540         return 0;
1541 }
1542
1543 static DEFINE_CONFIG_PARSE_ENUM(config_parse_notify_access, notify_access, NotifyAccess, "Failed to parse notify access specifier");
1544
1545 #define FOLLOW_MAX 8
1546
1547 static int open_follow(char **filename, FILE **_f, Set *names, char **_final) {
1548         unsigned c = 0;
1549         int fd, r;
1550         FILE *f;
1551         char *id = NULL;
1552
1553         assert(filename);
1554         assert(*filename);
1555         assert(_f);
1556         assert(names);
1557
1558         /* This will update the filename pointer if the loaded file is
1559          * reached by a symlink. The old string will be freed. */
1560
1561         for (;;) {
1562                 char *target, *name;
1563
1564                 if (c++ >= FOLLOW_MAX)
1565                         return -ELOOP;
1566
1567                 path_kill_slashes(*filename);
1568
1569                 /* Add the file name we are currently looking at to
1570                  * the names of this unit, but only if it is a valid
1571                  * unit name. */
1572                 name = file_name_from_path(*filename);
1573
1574                 if (unit_name_is_valid(name, false)) {
1575                         if (!(id = set_get(names, name))) {
1576
1577                                 if (!(id = strdup(name)))
1578                                         return -ENOMEM;
1579
1580                                 if ((r = set_put(names, id)) < 0) {
1581                                         free(id);
1582                                         return r;
1583                                 }
1584                         }
1585                 }
1586
1587                 /* Try to open the file name, but don't if its a symlink */
1588                 if ((fd = open(*filename, O_RDONLY|O_CLOEXEC|O_NOCTTY|O_NOFOLLOW)) >= 0)
1589                         break;
1590
1591                 if (errno != ELOOP)
1592                         return -errno;
1593
1594                 /* Hmm, so this is a symlink. Let's read the name, and follow it manually */
1595                 if ((r = readlink_and_make_absolute(*filename, &target)) < 0)
1596                         return r;
1597
1598                 free(*filename);
1599                 *filename = target;
1600         }
1601
1602         if (!(f = fdopen(fd, "re"))) {
1603                 r = -errno;
1604                 close_nointr_nofail(fd);
1605                 return r;
1606         }
1607
1608         *_f = f;
1609         *_final = id;
1610         return 0;
1611 }
1612
1613 static int merge_by_names(Unit **u, Set *names, const char *id) {
1614         char *k;
1615         int r;
1616
1617         assert(u);
1618         assert(*u);
1619         assert(names);
1620
1621         /* Let's try to add in all symlink names we found */
1622         while ((k = set_steal_first(names))) {
1623
1624                 /* First try to merge in the other name into our
1625                  * unit */
1626                 if ((r = unit_merge_by_name(*u, k)) < 0) {
1627                         Unit *other;
1628
1629                         /* Hmm, we couldn't merge the other unit into
1630                          * ours? Then let's try it the other way
1631                          * round */
1632
1633                         other = manager_get_unit((*u)->meta.manager, k);
1634                         free(k);
1635
1636                         if (other)
1637                                 if ((r = unit_merge(other, *u)) >= 0) {
1638                                         *u = other;
1639                                         return merge_by_names(u, names, NULL);
1640                                 }
1641
1642                         return r;
1643                 }
1644
1645                 if (id == k)
1646                         unit_choose_id(*u, id);
1647
1648                 free(k);
1649         }
1650
1651         return 0;
1652 }
1653
1654 static void dump_items(FILE *f, const ConfigItem *items) {
1655         const ConfigItem *i;
1656         const char *prev_section = NULL;
1657         bool not_first = false;
1658
1659         struct {
1660                 ConfigParserCallback callback;
1661                 const char *rvalue;
1662         } table[] = {
1663                 { config_parse_int,              "INTEGER" },
1664                 { config_parse_unsigned,         "UNSIGNED" },
1665                 { config_parse_size,             "SIZE" },
1666                 { config_parse_bool,             "BOOLEAN" },
1667                 { config_parse_string,           "STRING" },
1668                 { config_parse_path,             "PATH" },
1669                 { config_parse_strv,             "STRING [...]" },
1670                 { config_parse_nice,             "NICE" },
1671                 { config_parse_oom_score_adjust, "OOMSCOREADJUST" },
1672                 { config_parse_io_class,         "IOCLASS" },
1673                 { config_parse_io_priority,      "IOPRIORITY" },
1674                 { config_parse_cpu_sched_policy, "CPUSCHEDPOLICY" },
1675                 { config_parse_cpu_sched_prio,   "CPUSCHEDPRIO" },
1676                 { config_parse_cpu_affinity,     "CPUAFFINITY" },
1677                 { config_parse_mode,             "MODE" },
1678                 { config_parse_env_file,         "FILE" },
1679                 { config_parse_output,           "OUTPUT" },
1680                 { config_parse_input,            "INPUT" },
1681                 { config_parse_facility,         "FACILITY" },
1682                 { config_parse_level,            "LEVEL" },
1683                 { config_parse_capabilities,     "CAPABILITIES" },
1684                 { config_parse_secure_bits,      "SECUREBITS" },
1685                 { config_parse_bounding_set,     "BOUNDINGSET" },
1686                 { config_parse_timer_slack_nsec, "TIMERSLACK" },
1687                 { config_parse_limit,            "LIMIT" },
1688                 { config_parse_cgroup,           "CGROUP [...]" },
1689                 { config_parse_deps,             "UNIT [...]" },
1690                 { config_parse_names,            "UNIT [...]" },
1691                 { config_parse_exec,             "PATH [ARGUMENT [...]]" },
1692                 { config_parse_service_type,     "SERVICETYPE" },
1693                 { config_parse_service_restart,  "SERVICERESTART" },
1694 #ifdef HAVE_SYSV_COMPAT
1695                 { config_parse_sysv_priority,    "SYSVPRIORITY" },
1696 #else
1697                 { config_parse_warn_compat,      "NOTSUPPORTED" },
1698 #endif
1699                 { config_parse_kill_mode,        "KILLMODE" },
1700                 { config_parse_kill_signal,      "SIGNAL" },
1701                 { config_parse_listen,           "SOCKET [...]" },
1702                 { config_parse_socket_bind,      "SOCKETBIND" },
1703                 { config_parse_bindtodevice,     "NETWORKINTERFACE" },
1704                 { config_parse_usec,             "SECONDS" },
1705                 { config_parse_path_strv,        "PATH [...]" },
1706                 { config_parse_mount_flags,      "MOUNTFLAG [...]" },
1707                 { config_parse_string_printf,    "STRING" },
1708                 { config_parse_timer,            "TIMER" },
1709                 { config_parse_timer_unit,       "NAME" },
1710                 { config_parse_path_spec,        "PATH" },
1711                 { config_parse_path_unit,        "UNIT" },
1712                 { config_parse_notify_access,    "ACCESS" },
1713                 { config_parse_ip_tos,           "TOS" },
1714                 { config_parse_condition_path,   "CONDITION" },
1715                 { config_parse_condition_kernel, "CONDITION" },
1716                 { config_parse_condition_null,   "CONDITION" },
1717         };
1718
1719         assert(f);
1720         assert(items);
1721
1722         for (i = items; i->lvalue; i++) {
1723                 unsigned j;
1724                 const char *rvalue = "OTHER";
1725
1726                 if (!streq_ptr(i->section, prev_section)) {
1727                         if (!not_first)
1728                                 not_first = true;
1729                         else
1730                                 fputc('\n', f);
1731
1732                         fprintf(f, "[%s]\n", i->section);
1733                         prev_section = i->section;
1734                 }
1735
1736                 for (j = 0; j < ELEMENTSOF(table); j++)
1737                         if (i->parse == table[j].callback) {
1738                                 rvalue = table[j].rvalue;
1739                                 break;
1740                         }
1741
1742                 fprintf(f, "%s=%s\n", i->lvalue, rvalue);
1743         }
1744 }
1745
1746 static int load_from_path(Unit *u, const char *path) {
1747
1748         static const char* const section_table[_UNIT_TYPE_MAX] = {
1749                 [UNIT_SERVICE]   = "Service",
1750                 [UNIT_TIMER]     = "Timer",
1751                 [UNIT_SOCKET]    = "Socket",
1752                 [UNIT_TARGET]    = "Target",
1753                 [UNIT_DEVICE]    = "Device",
1754                 [UNIT_MOUNT]     = "Mount",
1755                 [UNIT_AUTOMOUNT] = "Automount",
1756                 [UNIT_SNAPSHOT]  = "Snapshot",
1757                 [UNIT_SWAP]      = "Swap",
1758                 [UNIT_PATH]      = "Path"
1759         };
1760
1761 #define EXEC_CONTEXT_CONFIG_ITEMS(context, section) \
1762                 { "WorkingDirectory",       config_parse_path,            &(context).working_directory,                    section   }, \
1763                 { "RootDirectory",          config_parse_path,            &(context).root_directory,                       section   }, \
1764                 { "User",                   config_parse_string_printf,   &(context).user,                                 section   }, \
1765                 { "Group",                  config_parse_string_printf,   &(context).group,                                section   }, \
1766                 { "SupplementaryGroups",    config_parse_strv,            &(context).supplementary_groups,                 section   }, \
1767                 { "Nice",                   config_parse_nice,            &(context),                                      section   }, \
1768                 { "OOMScoreAdjust",         config_parse_oom_score_adjust,&(context),                                      section   }, \
1769                 { "IOSchedulingClass",      config_parse_io_class,        &(context),                                      section   }, \
1770                 { "IOSchedulingPriority",   config_parse_io_priority,     &(context),                                      section   }, \
1771                 { "CPUSchedulingPolicy",    config_parse_cpu_sched_policy,&(context),                                      section   }, \
1772                 { "CPUSchedulingPriority",  config_parse_cpu_sched_prio,  &(context),                                      section   }, \
1773                 { "CPUSchedulingResetOnFork", config_parse_bool,          &(context).cpu_sched_reset_on_fork,              section   }, \
1774                 { "CPUAffinity",            config_parse_cpu_affinity,    &(context),                                      section   }, \
1775                 { "UMask",                  config_parse_mode,            &(context).umask,                                section   }, \
1776                 { "Environment",            config_parse_strv,            &(context).environment,                          section   }, \
1777                 { "EnvironmentFile",        config_parse_env_file,        &(context).environment,                          section   }, \
1778                 { "StandardInput",          config_parse_input,           &(context).std_input,                            section   }, \
1779                 { "StandardOutput",         config_parse_output,          &(context).std_output,                           section   }, \
1780                 { "StandardError",          config_parse_output,          &(context).std_error,                            section   }, \
1781                 { "TTYPath",                config_parse_path,            &(context).tty_path,                             section   }, \
1782                 { "SyslogIdentifier",       config_parse_string_printf,   &(context).syslog_identifier,                    section   }, \
1783                 { "SyslogFacility",         config_parse_facility,        &(context).syslog_priority,                      section   }, \
1784                 { "SyslogLevel",            config_parse_level,           &(context).syslog_priority,                      section   }, \
1785                 { "SyslogLevelPrefix",      config_parse_bool,            &(context).syslog_level_prefix,                  section   }, \
1786                 { "Capabilities",           config_parse_capabilities,    &(context),                                      section   }, \
1787                 { "SecureBits",             config_parse_secure_bits,     &(context),                                      section   }, \
1788                 { "CapabilityBoundingSetDrop", config_parse_bounding_set, &(context),                                      section   }, \
1789                 { "TimerSlackNSec",         config_parse_timer_slack_nsec,&(context),                                      section   }, \
1790                 { "LimitCPU",               config_parse_limit,           &(context).rlimit[RLIMIT_CPU],                   section   }, \
1791                 { "LimitFSIZE",             config_parse_limit,           &(context).rlimit[RLIMIT_FSIZE],                 section   }, \
1792                 { "LimitDATA",              config_parse_limit,           &(context).rlimit[RLIMIT_DATA],                  section   }, \
1793                 { "LimitSTACK",             config_parse_limit,           &(context).rlimit[RLIMIT_STACK],                 section   }, \
1794                 { "LimitCORE",              config_parse_limit,           &(context).rlimit[RLIMIT_CORE],                  section   }, \
1795                 { "LimitRSS",               config_parse_limit,           &(context).rlimit[RLIMIT_RSS],                   section   }, \
1796                 { "LimitNOFILE",            config_parse_limit,           &(context).rlimit[RLIMIT_NOFILE],                section   }, \
1797                 { "LimitAS",                config_parse_limit,           &(context).rlimit[RLIMIT_AS],                    section   }, \
1798                 { "LimitNPROC",             config_parse_limit,           &(context).rlimit[RLIMIT_NPROC],                 section   }, \
1799                 { "LimitMEMLOCK",           config_parse_limit,           &(context).rlimit[RLIMIT_MEMLOCK],               section   }, \
1800                 { "LimitLOCKS",             config_parse_limit,           &(context).rlimit[RLIMIT_LOCKS],                 section   }, \
1801                 { "LimitSIGPENDING",        config_parse_limit,           &(context).rlimit[RLIMIT_SIGPENDING],            section   }, \
1802                 { "LimitMSGQUEUE",          config_parse_limit,           &(context).rlimit[RLIMIT_MSGQUEUE],              section   }, \
1803                 { "LimitNICE",              config_parse_limit,           &(context).rlimit[RLIMIT_NICE],                  section   }, \
1804                 { "LimitRTPRIO",            config_parse_limit,           &(context).rlimit[RLIMIT_RTPRIO],                section   }, \
1805                 { "LimitRTTIME",            config_parse_limit,           &(context).rlimit[RLIMIT_RTTIME],                section   }, \
1806                 { "ControlGroup",           config_parse_cgroup,          u,                                               section   }, \
1807                 { "ReadWriteDirectories",   config_parse_path_strv,       &(context).read_write_dirs,                      section   }, \
1808                 { "ReadOnlyDirectories",    config_parse_path_strv,       &(context).read_only_dirs,                       section   }, \
1809                 { "InaccessibleDirectories",config_parse_path_strv,       &(context).inaccessible_dirs,                    section   }, \
1810                 { "PrivateTmp",             config_parse_bool,            &(context).private_tmp,                          section   }, \
1811                 { "MountFlags",             config_parse_mount_flags,     &(context),                                      section   }, \
1812                 { "TCPWrapName",            config_parse_string_printf,   &(context).tcpwrap_name,                         section   }, \
1813                 { "PAMName",                config_parse_string_printf,   &(context).pam_name,                             section   }, \
1814                 { "KillMode",               config_parse_kill_mode,       &(context).kill_mode,                            section   }, \
1815                 { "KillSignal",             config_parse_kill_signal,     &(context).kill_signal,                          section   }, \
1816                 { "SendSIGKILL",            config_parse_bool,            &(context).send_sigkill,                         section   }, \
1817                 { "UtmpIdentifier",         config_parse_string_printf,   &(context).utmp_id,                              section   }
1818
1819         const ConfigItem items[] = {
1820                 { "Names",                  config_parse_names,           u,                                               "Unit"    },
1821                 { "Description",            config_parse_string_printf,   &u->meta.description,                            "Unit"    },
1822                 { "Requires",               config_parse_deps,            UINT_TO_PTR(UNIT_REQUIRES),                      "Unit"    },
1823                 { "RequiresOverridable",    config_parse_deps,            UINT_TO_PTR(UNIT_REQUIRES_OVERRIDABLE),          "Unit"    },
1824                 { "Requisite",              config_parse_deps,            UINT_TO_PTR(UNIT_REQUISITE),                     "Unit"    },
1825                 { "RequisiteOverridable",   config_parse_deps,            UINT_TO_PTR(UNIT_REQUISITE_OVERRIDABLE),         "Unit"    },
1826                 { "Wants",                  config_parse_deps,            UINT_TO_PTR(UNIT_WANTS),                         "Unit"    },
1827                 { "BindTo",                 config_parse_deps,            UINT_TO_PTR(UNIT_BIND_TO),                       "Unit"    },
1828                 { "Conflicts",              config_parse_deps,            UINT_TO_PTR(UNIT_CONFLICTS),                     "Unit"    },
1829                 { "Before",                 config_parse_deps,            UINT_TO_PTR(UNIT_BEFORE),                        "Unit"    },
1830                 { "After",                  config_parse_deps,            UINT_TO_PTR(UNIT_AFTER),                         "Unit"    },
1831                 { "OnFailure",              config_parse_deps,            UINT_TO_PTR(UNIT_ON_FAILURE),                    "Unit"    },
1832                 { "StopWhenUnneeded",       config_parse_bool,            &u->meta.stop_when_unneeded,                     "Unit"    },
1833                 { "RefuseManualStart",      config_parse_bool,            &u->meta.refuse_manual_start,                    "Unit"    },
1834                 { "RefuseManualStop",       config_parse_bool,            &u->meta.refuse_manual_stop,                     "Unit"    },
1835                 { "AllowIsolate",           config_parse_bool,            &u->meta.allow_isolate,                          "Unit"    },
1836                 { "DefaultDependencies",    config_parse_bool,            &u->meta.default_dependencies,                   "Unit"    },
1837                 { "JobTimeoutSec",          config_parse_usec,            &u->meta.job_timeout,                            "Unit"    },
1838                 { "ConditionPathExists",    config_parse_condition_path,  u,                                               "Unit"    },
1839                 { "ConditionDirectoryNotEmpty", config_parse_condition_path,  u,                                           "Unit"    },
1840                 { "ConditionKernelCommandLine", config_parse_condition_kernel, u,                                          "Unit"    },
1841                 { "ConditionNull",          config_parse_condition_null,  u,                                               "Unit"    },
1842
1843                 { "PIDFile",                config_parse_path,            &u->service.pid_file,                            "Service" },
1844                 { "ExecStartPre",           config_parse_exec,            u->service.exec_command+SERVICE_EXEC_START_PRE,  "Service" },
1845                 { "ExecStart",              config_parse_exec,            u->service.exec_command+SERVICE_EXEC_START,      "Service" },
1846                 { "ExecStartPost",          config_parse_exec,            u->service.exec_command+SERVICE_EXEC_START_POST, "Service" },
1847                 { "ExecReload",             config_parse_exec,            u->service.exec_command+SERVICE_EXEC_RELOAD,     "Service" },
1848                 { "ExecStop",               config_parse_exec,            u->service.exec_command+SERVICE_EXEC_STOP,       "Service" },
1849                 { "ExecStopPost",           config_parse_exec,            u->service.exec_command+SERVICE_EXEC_STOP_POST,  "Service" },
1850                 { "RestartSec",             config_parse_usec,            &u->service.restart_usec,                        "Service" },
1851                 { "TimeoutSec",             config_parse_usec,            &u->service.timeout_usec,                        "Service" },
1852                 { "Type",                   config_parse_service_type,    &u->service.type,                                "Service" },
1853                 { "Restart",                config_parse_service_restart, &u->service.restart,                             "Service" },
1854                 { "PermissionsStartOnly",   config_parse_bool,            &u->service.permissions_start_only,              "Service" },
1855                 { "RootDirectoryStartOnly", config_parse_bool,            &u->service.root_directory_start_only,           "Service" },
1856                 { "RemainAfterExit",        config_parse_bool,            &u->service.remain_after_exit,                   "Service" },
1857 #ifdef HAVE_SYSV_COMPAT
1858                 { "SysVStartPriority",      config_parse_sysv_priority,   &u->service.sysv_start_priority,                 "Service" },
1859 #else
1860                 { "SysVStartPriority",      config_parse_warn_compat,     NULL,                                            "Service" },
1861 #endif
1862                 { "NonBlocking",            config_parse_bool,            &u->service.exec_context.non_blocking,           "Service" },
1863                 { "BusName",                config_parse_string_printf,   &u->service.bus_name,                            "Service" },
1864                 { "NotifyAccess",           config_parse_notify_access,   &u->service.notify_access,                       "Service" },
1865                 { "Sockets",                config_parse_service_sockets, &u->service,                                     "Service" },
1866                 { "FsckPassNo",             config_parse_fsck_passno,     &u->service.fsck_passno,                         "Service" },
1867                 EXEC_CONTEXT_CONFIG_ITEMS(u->service.exec_context, "Service"),
1868
1869                 { "ListenStream",           config_parse_listen,          &u->socket,                                      "Socket"  },
1870                 { "ListenDatagram",         config_parse_listen,          &u->socket,                                      "Socket"  },
1871                 { "ListenSequentialPacket", config_parse_listen,          &u->socket,                                      "Socket"  },
1872                 { "ListenFIFO",             config_parse_listen,          &u->socket,                                      "Socket"  },
1873                 { "BindIPv6Only",           config_parse_socket_bind,     &u->socket,                                      "Socket"  },
1874                 { "Backlog",                config_parse_unsigned,        &u->socket.backlog,                              "Socket"  },
1875                 { "BindToDevice",           config_parse_bindtodevice,    &u->socket,                                      "Socket"  },
1876                 { "ExecStartPre",           config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_START_PRE,    "Socket"  },
1877                 { "ExecStartPost",          config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_START_POST,   "Socket"  },
1878                 { "ExecStopPre",            config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_STOP_PRE,     "Socket"  },
1879                 { "ExecStopPost",           config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_STOP_POST,    "Socket"  },
1880                 { "TimeoutSec",             config_parse_usec,            &u->socket.timeout_usec,                         "Socket"  },
1881                 { "DirectoryMode",          config_parse_mode,            &u->socket.directory_mode,                       "Socket"  },
1882                 { "SocketMode",             config_parse_mode,            &u->socket.socket_mode,                          "Socket"  },
1883                 { "Accept",                 config_parse_bool,            &u->socket.accept,                               "Socket"  },
1884                 { "MaxConnections",         config_parse_unsigned,        &u->socket.max_connections,                      "Socket"  },
1885                 { "KeepAlive",              config_parse_bool,            &u->socket.keep_alive,                           "Socket"  },
1886                 { "Priority",               config_parse_int,             &u->socket.priority,                             "Socket"  },
1887                 { "ReceiveBuffer",          config_parse_size,            &u->socket.receive_buffer,                       "Socket"  },
1888                 { "SendBuffer",             config_parse_size,            &u->socket.send_buffer,                          "Socket"  },
1889                 { "IPTOS",                  config_parse_ip_tos,          &u->socket.ip_tos,                               "Socket"  },
1890                 { "IPTTL",                  config_parse_int,             &u->socket.ip_ttl,                               "Socket"  },
1891                 { "Mark",                   config_parse_int,             &u->socket.mark,                                 "Socket"  },
1892                 { "PipeSize",               config_parse_size,            &u->socket.pipe_size,                            "Socket"  },
1893                 { "FreeBind",               config_parse_bool,            &u->socket.free_bind,                            "Socket"  },
1894                 { "TCPCongestion",          config_parse_string,          &u->socket.tcp_congestion,                       "Socket"  },
1895                 { "Service",                config_parse_socket_service,  &u->socket,                                      "Socket"  },
1896                 EXEC_CONTEXT_CONFIG_ITEMS(u->socket.exec_context, "Socket"),
1897
1898                 { "What",                   config_parse_string,          &u->mount.parameters_fragment.what,              "Mount"   },
1899                 { "Where",                  config_parse_path,            &u->mount.where,                                 "Mount"   },
1900                 { "Options",                config_parse_string,          &u->mount.parameters_fragment.options,           "Mount"   },
1901                 { "Type",                   config_parse_string,          &u->mount.parameters_fragment.fstype,            "Mount"   },
1902                 { "TimeoutSec",             config_parse_usec,            &u->mount.timeout_usec,                          "Mount"   },
1903                 { "DirectoryMode",          config_parse_mode,            &u->mount.directory_mode,                        "Mount"   },
1904                 EXEC_CONTEXT_CONFIG_ITEMS(u->mount.exec_context, "Mount"),
1905
1906                 { "Where",                  config_parse_path,            &u->automount.where,                             "Automount" },
1907                 { "DirectoryMode",          config_parse_mode,            &u->automount.directory_mode,                    "Automount" },
1908
1909                 { "What",                   config_parse_path,            &u->swap.parameters_fragment.what,               "Swap"    },
1910                 { "Priority",               config_parse_int,             &u->swap.parameters_fragment.priority,           "Swap"    },
1911                 { "TimeoutSec",             config_parse_usec,            &u->swap.timeout_usec,                           "Swap"    },
1912                 EXEC_CONTEXT_CONFIG_ITEMS(u->swap.exec_context, "Swap"),
1913
1914                 { "OnActiveSec",            config_parse_timer,           &u->timer,                                       "Timer"   },
1915                 { "OnBootSec",              config_parse_timer,           &u->timer,                                       "Timer"   },
1916                 { "OnStartupSec",           config_parse_timer,           &u->timer,                                       "Timer"   },
1917                 { "OnUnitActiveSec",        config_parse_timer,           &u->timer,                                       "Timer"   },
1918                 { "OnUnitInactiveSec",      config_parse_timer,           &u->timer,                                       "Timer"   },
1919                 { "Unit",                   config_parse_timer_unit,      &u->timer,                                       "Timer"   },
1920
1921                 { "PathExists",             config_parse_path_spec,       &u->path,                                        "Path"    },
1922                 { "PathChanged",            config_parse_path_spec,       &u->path,                                        "Path"    },
1923                 { "DirectoryNotEmpty",      config_parse_path_spec,       &u->path,                                        "Path"    },
1924                 { "Unit",                   config_parse_path_unit,       &u->path,                                        "Path"    },
1925
1926                 /* The [Install] section is ignored here. */
1927                 { "Alias",                  NULL,                         NULL,                                            "Install" },
1928                 { "WantedBy",               NULL,                         NULL,                                            "Install" },
1929                 { "Also",                   NULL,                         NULL,                                            "Install" },
1930
1931                 { NULL, NULL, NULL, NULL }
1932         };
1933
1934 #undef EXEC_CONTEXT_CONFIG_ITEMS
1935
1936         const char *sections[4];
1937         int r;
1938         Set *symlink_names;
1939         FILE *f = NULL;
1940         char *filename = NULL, *id = NULL;
1941         Unit *merged;
1942         struct stat st;
1943
1944         if (!u) {
1945                 /* Dirty dirty hack. */
1946                 dump_items((FILE*) path, items);
1947                 return 0;
1948         }
1949
1950         assert(u);
1951         assert(path);
1952
1953         sections[0] = "Unit";
1954         sections[1] = section_table[u->meta.type];
1955         sections[2] = "Install";
1956         sections[3] = NULL;
1957
1958         if (!(symlink_names = set_new(string_hash_func, string_compare_func)))
1959                 return -ENOMEM;
1960
1961         if (path_is_absolute(path)) {
1962
1963                 if (!(filename = strdup(path))) {
1964                         r = -ENOMEM;
1965                         goto finish;
1966                 }
1967
1968                 if ((r = open_follow(&filename, &f, symlink_names, &id)) < 0) {
1969                         free(filename);
1970                         filename = NULL;
1971
1972                         if (r != -ENOENT)
1973                                 goto finish;
1974                 }
1975
1976         } else  {
1977                 char **p;
1978
1979                 STRV_FOREACH(p, u->meta.manager->lookup_paths.unit_path) {
1980
1981                         /* Instead of opening the path right away, we manually
1982                          * follow all symlinks and add their name to our unit
1983                          * name set while doing so */
1984                         if (!(filename = path_make_absolute(path, *p))) {
1985                                 r = -ENOMEM;
1986                                 goto finish;
1987                         }
1988
1989                         if (u->meta.manager->unit_path_cache &&
1990                             !set_get(u->meta.manager->unit_path_cache, filename))
1991                                 r = -ENOENT;
1992                         else
1993                                 r = open_follow(&filename, &f, symlink_names, &id);
1994
1995                         if (r < 0) {
1996                                 char *sn;
1997
1998                                 free(filename);
1999                                 filename = NULL;
2000
2001                                 if (r != -ENOENT)
2002                                         goto finish;
2003
2004                                 /* Empty the symlink names for the next run */
2005                                 while ((sn = set_steal_first(symlink_names)))
2006                                         free(sn);
2007
2008                                 continue;
2009                         }
2010
2011                         break;
2012                 }
2013         }
2014
2015         if (!filename) {
2016                 /* Hmm, no suitable file found? */
2017                 r = 0;
2018                 goto finish;
2019         }
2020
2021         merged = u;
2022         if ((r = merge_by_names(&merged, symlink_names, id)) < 0)
2023                 goto finish;
2024
2025         if (merged != u) {
2026                 u->meta.load_state = UNIT_MERGED;
2027                 r = 0;
2028                 goto finish;
2029         }
2030
2031         zero(st);
2032         if (fstat(fileno(f), &st) < 0) {
2033                 r = -errno;
2034                 goto finish;
2035         }
2036
2037         if (null_or_empty(&st))
2038                 u->meta.load_state = UNIT_MASKED;
2039         else {
2040                 /* Now, parse the file contents */
2041                 if ((r = config_parse(filename, f, sections, items, false, u)) < 0)
2042                         goto finish;
2043
2044                 u->meta.load_state = UNIT_LOADED;
2045         }
2046
2047         free(u->meta.fragment_path);
2048         u->meta.fragment_path = filename;
2049         filename = NULL;
2050
2051         u->meta.fragment_mtime = timespec_load(&st.st_mtim);
2052
2053         r = 0;
2054
2055 finish:
2056         set_free_free(symlink_names);
2057         free(filename);
2058
2059         if (f)
2060                 fclose(f);
2061
2062         return r;
2063 }
2064
2065 int unit_load_fragment(Unit *u) {
2066         int r;
2067         Iterator i;
2068         const char *t;
2069
2070         assert(u);
2071         assert(u->meta.load_state == UNIT_STUB);
2072         assert(u->meta.id);
2073
2074         /* First, try to find the unit under its id. We always look
2075          * for unit files in the default directories, to make it easy
2076          * to override things by placing things in /etc/systemd/system */
2077         if ((r = load_from_path(u, u->meta.id)) < 0)
2078                 return r;
2079
2080         /* Try to find an alias we can load this with */
2081         if (u->meta.load_state == UNIT_STUB)
2082                 SET_FOREACH(t, u->meta.names, i) {
2083
2084                         if (t == u->meta.id)
2085                                 continue;
2086
2087                         if ((r = load_from_path(u, t)) < 0)
2088                                 return r;
2089
2090                         if (u->meta.load_state != UNIT_STUB)
2091                                 break;
2092                 }
2093
2094         /* And now, try looking for it under the suggested (originally linked) path */
2095         if (u->meta.load_state == UNIT_STUB && u->meta.fragment_path) {
2096
2097                 if ((r = load_from_path(u, u->meta.fragment_path)) < 0)
2098                         return r;
2099
2100                 if (u->meta.load_state == UNIT_STUB) {
2101                         /* Hmm, this didn't work? Then let's get rid
2102                          * of the fragment path stored for us, so that
2103                          * we don't point to an invalid location. */
2104                         free(u->meta.fragment_path);
2105                         u->meta.fragment_path = NULL;
2106                 }
2107         }
2108
2109         /* Look for a template */
2110         if (u->meta.load_state == UNIT_STUB && u->meta.instance) {
2111                 char *k;
2112
2113                 if (!(k = unit_name_template(u->meta.id)))
2114                         return -ENOMEM;
2115
2116                 r = load_from_path(u, k);
2117                 free(k);
2118
2119                 if (r < 0)
2120                         return r;
2121
2122                 if (u->meta.load_state == UNIT_STUB)
2123                         SET_FOREACH(t, u->meta.names, i) {
2124
2125                                 if (t == u->meta.id)
2126                                         continue;
2127
2128                                 if (!(k = unit_name_template(t)))
2129                                         return -ENOMEM;
2130
2131                                 r = load_from_path(u, k);
2132                                 free(k);
2133
2134                                 if (r < 0)
2135                                         return r;
2136
2137                                 if (u->meta.load_state != UNIT_STUB)
2138                                         break;
2139                         }
2140         }
2141
2142         return 0;
2143 }
2144
2145 void unit_dump_config_items(FILE *f) {
2146         /* OK, this wins a prize for extreme ugliness. */
2147
2148         load_from_path(NULL, (const void*) f);
2149 }