chiark / gitweb /
ac22b94509babea9412610f024a7c33e90025f35
[elogind.git] / src / load-fragment.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <linux/oom.h>
23 #include <assert.h>
24 #include <errno.h>
25 #include <string.h>
26 #include <unistd.h>
27 #include <fcntl.h>
28 #include <sched.h>
29 #include <sys/prctl.h>
30 #include <sys/mount.h>
31 #include <linux/fs.h>
32 #include <sys/stat.h>
33
34 #include "unit.h"
35 #include "strv.h"
36 #include "conf-parser.h"
37 #include "load-fragment.h"
38 #include "log.h"
39 #include "ioprio.h"
40 #include "securebits.h"
41 #include "missing.h"
42 #include "unit-name.h"
43 #include "bus-errors.h"
44
45 #ifndef HAVE_SYSV_COMPAT
46 static int config_parse_warn_compat(
47                 const char *filename,
48                 unsigned line,
49                 const char *section,
50                 const char *lvalue,
51                 const char *rvalue,
52                 void *data,
53                 void *userdata) {
54
55         log_debug("[%s:%u] Support for option %s= has been disabled at compile time and is ignored", filename, line, lvalue);
56         return 0;
57 }
58 #endif
59
60 static int config_parse_deps(
61                 const char *filename,
62                 unsigned line,
63                 const char *section,
64                 const char *lvalue,
65                 const char *rvalue,
66                 void *data,
67                 void *userdata) {
68
69         UnitDependency d = PTR_TO_UINT(data);
70         Unit *u = userdata;
71         char *w;
72         size_t l;
73         char *state;
74
75         assert(filename);
76         assert(lvalue);
77         assert(rvalue);
78
79         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
80                 char *t, *k;
81                 int r;
82
83                 if (!(t = strndup(w, l)))
84                         return -ENOMEM;
85
86                 k = unit_name_printf(u, t);
87                 free(t);
88
89                 if (!k)
90                         return -ENOMEM;
91
92                 r = unit_add_dependency_by_name(u, d, k, NULL, true);
93
94                 if (r < 0) {
95                         log_error("Failed to add dependency on %s, ignoring: %s", k, strerror(-r));
96                         free(k);
97                         return 0;
98                 }
99
100                 free(k);
101         }
102
103         return 0;
104 }
105
106 static int config_parse_names(
107                 const char *filename,
108                 unsigned line,
109                 const char *section,
110                 const char *lvalue,
111                 const char *rvalue,
112                 void *data,
113                 void *userdata) {
114
115         Unit *u = userdata;
116         char *w;
117         size_t l;
118         char *state;
119
120         assert(filename);
121         assert(lvalue);
122         assert(rvalue);
123         assert(data);
124
125         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
126                 char *t, *k;
127                 int r;
128
129                 if (!(t = strndup(w, l)))
130                         return -ENOMEM;
131
132                 k = unit_name_printf(u, t);
133                 free(t);
134
135                 if (!k)
136                         return -ENOMEM;
137
138                 r = unit_merge_by_name(u, k);
139
140                 if (r < 0) {
141                         log_error("Failed to add name %s, ignoring: %s", k, strerror(-r));
142                         free(k);
143                         return 0;
144                 }
145
146                 free(k);
147         }
148
149         return 0;
150 }
151
152 static int config_parse_string_printf(
153                 const char *filename,
154                 unsigned line,
155                 const char *section,
156                 const char *lvalue,
157                 const char *rvalue,
158                 void *data,
159                 void *userdata) {
160
161         Unit *u = userdata;
162         char **s = data;
163         char *k;
164
165         assert(filename);
166         assert(lvalue);
167         assert(rvalue);
168         assert(s);
169         assert(u);
170
171         if (!(k = unit_full_printf(u, rvalue)))
172                 return -ENOMEM;
173
174         free(*s);
175         if (*k)
176                 *s = k;
177         else {
178                 free(k);
179                 *s = NULL;
180         }
181
182         return 0;
183 }
184
185 static int config_parse_listen(
186                 const char *filename,
187                 unsigned line,
188                 const char *section,
189                 const char *lvalue,
190                 const char *rvalue,
191                 void *data,
192                 void *userdata) {
193
194         SocketPort *p;
195         Socket *s;
196
197         assert(filename);
198         assert(lvalue);
199         assert(rvalue);
200         assert(data);
201
202         s = (Socket*) data;
203
204         if (!(p = new0(SocketPort, 1)))
205                 return -ENOMEM;
206
207         if (streq(lvalue, "ListenFIFO")) {
208                 p->type = SOCKET_FIFO;
209
210                 if (!(p->path = strdup(rvalue))) {
211                         free(p);
212                         return -ENOMEM;
213                 }
214
215                 path_kill_slashes(p->path);
216         } else {
217                 p->type = SOCKET_SOCKET;
218
219                 if (socket_address_parse(&p->address, rvalue) < 0) {
220                         log_error("[%s:%u] Failed to parse address value, ignoring: %s", filename, line, rvalue);
221                         free(p);
222                         return 0;
223                 }
224
225                 if (streq(lvalue, "ListenStream"))
226                         p->address.type = SOCK_STREAM;
227                 else if (streq(lvalue, "ListenDatagram"))
228                         p->address.type = SOCK_DGRAM;
229                 else {
230                         assert(streq(lvalue, "ListenSequentialPacket"));
231                         p->address.type = SOCK_SEQPACKET;
232                 }
233
234                 if (socket_address_family(&p->address) != AF_LOCAL && p->address.type == SOCK_SEQPACKET) {
235                         log_error("[%s:%u] Address family not supported, ignoring: %s", filename, line, rvalue);
236                         free(p);
237                         return 0;
238                 }
239         }
240
241         p->fd = -1;
242         LIST_PREPEND(SocketPort, port, s->ports, p);
243
244         return 0;
245 }
246
247 static int config_parse_socket_bind(
248                 const char *filename,
249                 unsigned line,
250                 const char *section,
251                 const char *lvalue,
252                 const char *rvalue,
253                 void *data,
254                 void *userdata) {
255
256         Socket *s;
257         SocketAddressBindIPv6Only b;
258
259         assert(filename);
260         assert(lvalue);
261         assert(rvalue);
262         assert(data);
263
264         s = (Socket*) data;
265
266         if ((b = socket_address_bind_ipv6_only_from_string(rvalue)) < 0) {
267                 int r;
268
269                 if ((r = parse_boolean(rvalue)) < 0) {
270                         log_error("[%s:%u] Failed to parse bind IPv6 only value, ignoring: %s", filename, line, rvalue);
271                         return 0;
272                 }
273
274                 s->bind_ipv6_only = r ? SOCKET_ADDRESS_IPV6_ONLY : SOCKET_ADDRESS_BOTH;
275         } else
276                 s->bind_ipv6_only = b;
277
278         return 0;
279 }
280
281 static int config_parse_nice(
282                 const char *filename,
283                 unsigned line,
284                 const char *section,
285                 const char *lvalue,
286                 const char *rvalue,
287                 void *data,
288                 void *userdata) {
289
290         ExecContext *c = data;
291         int priority;
292
293         assert(filename);
294         assert(lvalue);
295         assert(rvalue);
296         assert(data);
297
298         if (safe_atoi(rvalue, &priority) < 0) {
299                 log_error("[%s:%u] Failed to parse nice priority, ignoring: %s. ", filename, line, rvalue);
300                 return 0;
301         }
302
303         if (priority < PRIO_MIN || priority >= PRIO_MAX) {
304                 log_error("[%s:%u] Nice priority out of range, ignoring: %s", filename, line, rvalue);
305                 return 0;
306         }
307
308         c->nice = priority;
309         c->nice_set = true;
310
311         return 0;
312 }
313
314 static int config_parse_oom_score_adjust(
315                 const char *filename,
316                 unsigned line,
317                 const char *section,
318                 const char *lvalue,
319                 const char *rvalue,
320                 void *data,
321                 void *userdata) {
322
323         ExecContext *c = data;
324         int oa;
325
326         assert(filename);
327         assert(lvalue);
328         assert(rvalue);
329         assert(data);
330
331         if (safe_atoi(rvalue, &oa) < 0) {
332                 log_error("[%s:%u] Failed to parse the OOM score adjust value, ignoring: %s", filename, line, rvalue);
333                 return 0;
334         }
335
336         if (oa < OOM_SCORE_ADJ_MIN || oa > OOM_SCORE_ADJ_MAX) {
337                 log_error("[%s:%u] OOM score adjust value out of range, ignoring: %s", filename, line, rvalue);
338                 return 0;
339         }
340
341         c->oom_score_adjust = oa;
342         c->oom_score_adjust_set = true;
343
344         return 0;
345 }
346
347 static int config_parse_mode(
348                 const char *filename,
349                 unsigned line,
350                 const char *section,
351                 const char *lvalue,
352                 const char *rvalue,
353                 void *data,
354                 void *userdata) {
355
356         mode_t *m = data;
357         long l;
358         char *x = NULL;
359
360         assert(filename);
361         assert(lvalue);
362         assert(rvalue);
363         assert(data);
364
365         errno = 0;
366         l = strtol(rvalue, &x, 8);
367         if (!x || *x || errno) {
368                 log_error("[%s:%u] Failed to parse mode value, ignoring: %s", filename, line, rvalue);
369                 return 0;
370         }
371
372         if (l < 0000 || l > 07777) {
373                 log_error("[%s:%u] mode value out of range, ignoring: %s", filename, line, rvalue);
374                 return 0;
375         }
376
377         *m = (mode_t) l;
378         return 0;
379 }
380
381 static int config_parse_exec(
382                 const char *filename,
383                 unsigned line,
384                 const char *section,
385                 const char *lvalue,
386                 const char *rvalue,
387                 void *data,
388                 void *userdata) {
389
390         ExecCommand **e = data, *nce;
391         char *path, **n;
392         unsigned k;
393
394         assert(filename);
395         assert(lvalue);
396         assert(rvalue);
397         assert(e);
398
399         /* We accept an absolute path as first argument, or
400          * alternatively an absolute prefixed with @ to allow
401          * overriding of argv[0]. */
402
403         for (;;) {
404                 char *w;
405                 size_t l;
406                 char *state;
407                 bool honour_argv0 = false, ignore = false;
408
409                 path = NULL;
410                 nce = NULL;
411                 n = NULL;
412
413                 rvalue += strspn(rvalue, WHITESPACE);
414
415                 if (rvalue[0] == 0)
416                         break;
417
418                 if (rvalue[0] == '-') {
419                         ignore = true;
420                         rvalue ++;
421                 }
422
423                 if (rvalue[0] == '@') {
424                         honour_argv0 = true;
425                         rvalue ++;
426                 }
427
428                 if (*rvalue != '/') {
429                         log_error("[%s:%u] Invalid executable path in command line, ignoring: %s", filename, line, rvalue);
430                         return 0;
431                 }
432
433                 k = 0;
434                 FOREACH_WORD_QUOTED(w, l, rvalue, state) {
435                         if (strncmp(w, ";", MAX(l, 1U)) == 0)
436                                 break;
437
438                         k++;
439                 }
440
441                 if (!(n = new(char*, k + !honour_argv0)))
442                         return -ENOMEM;
443
444                 k = 0;
445                 FOREACH_WORD_QUOTED(w, l, rvalue, state) {
446                         if (strncmp(w, ";", MAX(l, 1U)) == 0)
447                                 break;
448
449                         if (honour_argv0 && w == rvalue) {
450                                 assert(!path);
451                                 if (!(path = cunescape_length(w, l)))
452                                         goto fail;
453                         } else {
454                                 if (!(n[k++] = cunescape_length(w, l)))
455                                         goto fail;
456                         }
457                 }
458
459                 n[k] = NULL;
460
461                 if (!n[0]) {
462                         log_error("[%s:%u] Invalid command line, ignoring: %s", filename, line, rvalue);
463                         strv_free(n);
464                         return 0;
465                 }
466
467                 if (!path)
468                         if (!(path = strdup(n[0])))
469                                 goto fail;
470
471                 assert(path_is_absolute(path));
472
473                 if (!(nce = new0(ExecCommand, 1)))
474                         goto fail;
475
476                 nce->argv = n;
477                 nce->path = path;
478                 nce->ignore = ignore;
479
480                 path_kill_slashes(nce->path);
481
482                 exec_command_append_list(e, nce);
483
484                 rvalue = state;
485         }
486
487         return 0;
488
489 fail:
490         n[k] = NULL;
491         strv_free(n);
492         free(path);
493         free(nce);
494
495         return -ENOMEM;
496 }
497
498 static int config_parse_usec(
499                 const char *filename,
500                 unsigned line,
501                 const char *section,
502                 const char *lvalue,
503                 const char *rvalue,
504                 void *data,
505                 void *userdata) {
506
507         usec_t *usec = data;
508
509         assert(filename);
510         assert(lvalue);
511         assert(rvalue);
512         assert(data);
513
514         if (parse_usec(rvalue, usec) < 0) {
515                 log_error("[%s:%u] Failed to parse time value, ignoring: %s", filename, line, rvalue);
516                 return 0;
517         }
518
519         return 0;
520 }
521
522 static DEFINE_CONFIG_PARSE_ENUM(config_parse_service_type, service_type, ServiceType, "Failed to parse service type");
523 static DEFINE_CONFIG_PARSE_ENUM(config_parse_service_restart, service_restart, ServiceRestart, "Failed to parse service restart specifier");
524
525 static int config_parse_bindtodevice(
526                 const char *filename,
527                 unsigned line,
528                 const char *section,
529                 const char *lvalue,
530                 const char *rvalue,
531                 void *data,
532                 void *userdata) {
533
534         Socket *s = data;
535         char *n;
536
537         assert(filename);
538         assert(lvalue);
539         assert(rvalue);
540         assert(data);
541
542         if (rvalue[0] && !streq(rvalue, "*")) {
543                 if (!(n = strdup(rvalue)))
544                         return -ENOMEM;
545         } else
546                 n = NULL;
547
548         free(s->bind_to_device);
549         s->bind_to_device = n;
550
551         return 0;
552 }
553
554 static DEFINE_CONFIG_PARSE_ENUM(config_parse_output, exec_output, ExecOutput, "Failed to parse output specifier");
555 static DEFINE_CONFIG_PARSE_ENUM(config_parse_input, exec_input, ExecInput, "Failed to parse input specifier");
556
557 static int config_parse_facility(
558                 const char *filename,
559                 unsigned line,
560                 const char *section,
561                 const char *lvalue,
562                 const char *rvalue,
563                 void *data,
564                 void *userdata) {
565
566
567         int *o = data, x;
568
569         assert(filename);
570         assert(lvalue);
571         assert(rvalue);
572         assert(data);
573
574         if ((x = log_facility_from_string(rvalue)) < 0) {
575                 log_error("[%s:%u] Failed to parse log facility, ignoring: %s", filename, line, rvalue);
576                 return 0;
577         }
578
579         *o = LOG_MAKEPRI(x, LOG_PRI(*o));
580
581         return 0;
582 }
583
584 static int config_parse_level(
585                 const char *filename,
586                 unsigned line,
587                 const char *section,
588                 const char *lvalue,
589                 const char *rvalue,
590                 void *data,
591                 void *userdata) {
592
593
594         int *o = data, x;
595
596         assert(filename);
597         assert(lvalue);
598         assert(rvalue);
599         assert(data);
600
601         if ((x = log_level_from_string(rvalue)) < 0) {
602                 log_error("[%s:%u] Failed to parse log level, ignoring: %s", filename, line, rvalue);
603                 return 0;
604         }
605
606         *o = LOG_MAKEPRI(LOG_FAC(*o), x);
607         return 0;
608 }
609
610 static int config_parse_io_class(
611                 const char *filename,
612                 unsigned line,
613                 const char *section,
614                 const char *lvalue,
615                 const char *rvalue,
616                 void *data,
617                 void *userdata) {
618
619         ExecContext *c = data;
620         int x;
621
622         assert(filename);
623         assert(lvalue);
624         assert(rvalue);
625         assert(data);
626
627         if ((x = ioprio_class_from_string(rvalue)) < 0) {
628                 log_error("[%s:%u] Failed to parse IO scheduling class, ignoring: %s", filename, line, rvalue);
629                 return 0;
630         }
631
632         c->ioprio = IOPRIO_PRIO_VALUE(x, IOPRIO_PRIO_DATA(c->ioprio));
633         c->ioprio_set = true;
634
635         return 0;
636 }
637
638 static int config_parse_io_priority(
639                 const char *filename,
640                 unsigned line,
641                 const char *section,
642                 const char *lvalue,
643                 const char *rvalue,
644                 void *data,
645                 void *userdata) {
646
647         ExecContext *c = data;
648         int i;
649
650         assert(filename);
651         assert(lvalue);
652         assert(rvalue);
653         assert(data);
654
655         if (safe_atoi(rvalue, &i) < 0 || i < 0 || i >= IOPRIO_BE_NR) {
656                 log_error("[%s:%u] Failed to parse io priority, ignoring: %s", filename, line, rvalue);
657                 return 0;
658         }
659
660         c->ioprio = IOPRIO_PRIO_VALUE(IOPRIO_PRIO_CLASS(c->ioprio), i);
661         c->ioprio_set = true;
662
663         return 0;
664 }
665
666 static int config_parse_cpu_sched_policy(
667                 const char *filename,
668                 unsigned line,
669                 const char *section,
670                 const char *lvalue,
671                 const char *rvalue,
672                 void *data,
673                 void *userdata) {
674
675
676         ExecContext *c = data;
677         int x;
678
679         assert(filename);
680         assert(lvalue);
681         assert(rvalue);
682         assert(data);
683
684         if ((x = sched_policy_from_string(rvalue)) < 0) {
685                 log_error("[%s:%u] Failed to parse CPU scheduling policy, ignoring: %s", filename, line, rvalue);
686                 return 0;
687         }
688
689         c->cpu_sched_policy = x;
690         c->cpu_sched_set = true;
691
692         return 0;
693 }
694
695 static int config_parse_cpu_sched_prio(
696                 const char *filename,
697                 unsigned line,
698                 const char *section,
699                 const char *lvalue,
700                 const char *rvalue,
701                 void *data,
702                 void *userdata) {
703
704         ExecContext *c = data;
705         int i;
706
707         assert(filename);
708         assert(lvalue);
709         assert(rvalue);
710         assert(data);
711
712         /* On Linux RR/FIFO have the same range */
713         if (safe_atoi(rvalue, &i) < 0 || i < sched_get_priority_min(SCHED_RR) || i > sched_get_priority_max(SCHED_RR)) {
714                 log_error("[%s:%u] Failed to parse CPU scheduling priority, ignoring: %s", filename, line, rvalue);
715                 return 0;
716         }
717
718         c->cpu_sched_priority = i;
719         c->cpu_sched_set = true;
720
721         return 0;
722 }
723
724 static int config_parse_cpu_affinity(
725                 const char *filename,
726                 unsigned line,
727                 const char *section,
728                 const char *lvalue,
729                 const char *rvalue,
730                 void *data,
731                 void *userdata) {
732
733         ExecContext *c = data;
734         char *w;
735         size_t l;
736         char *state;
737
738         assert(filename);
739         assert(lvalue);
740         assert(rvalue);
741         assert(data);
742
743         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
744                 char *t;
745                 int r;
746                 unsigned cpu;
747
748                 if (!(t = strndup(w, l)))
749                         return -ENOMEM;
750
751                 r = safe_atou(t, &cpu);
752                 free(t);
753
754                 if (!(c->cpuset))
755                         if (!(c->cpuset = cpu_set_malloc(&c->cpuset_ncpus)))
756                                 return -ENOMEM;
757
758                 if (r < 0 || cpu >= c->cpuset_ncpus) {
759                         log_error("[%s:%u] Failed to parse CPU affinity, ignoring: %s", filename, line, rvalue);
760                         return 0;
761                 }
762
763                 CPU_SET_S(cpu, CPU_ALLOC_SIZE(c->cpuset_ncpus), c->cpuset);
764         }
765
766         return 0;
767 }
768
769 static int config_parse_capabilities(
770                 const char *filename,
771                 unsigned line,
772                 const char *section,
773                 const char *lvalue,
774                 const char *rvalue,
775                 void *data,
776                 void *userdata) {
777
778         ExecContext *c = data;
779         cap_t cap;
780
781         assert(filename);
782         assert(lvalue);
783         assert(rvalue);
784         assert(data);
785
786         if (!(cap = cap_from_text(rvalue))) {
787                 if (errno == ENOMEM)
788                         return -ENOMEM;
789
790                 log_error("[%s:%u] Failed to parse capabilities, ignoring: %s", filename, line, rvalue);
791                 return 0;
792         }
793
794         if (c->capabilities)
795                 cap_free(c->capabilities);
796         c->capabilities = cap;
797
798         return 0;
799 }
800
801 static int config_parse_secure_bits(
802                 const char *filename,
803                 unsigned line,
804                 const char *section,
805                 const char *lvalue,
806                 const char *rvalue,
807                 void *data,
808                 void *userdata) {
809
810         ExecContext *c = data;
811         char *w;
812         size_t l;
813         char *state;
814
815         assert(filename);
816         assert(lvalue);
817         assert(rvalue);
818         assert(data);
819
820         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
821                 if (first_word(w, "keep-caps"))
822                         c->secure_bits |= SECURE_KEEP_CAPS;
823                 else if (first_word(w, "keep-caps-locked"))
824                         c->secure_bits |= SECURE_KEEP_CAPS_LOCKED;
825                 else if (first_word(w, "no-setuid-fixup"))
826                         c->secure_bits |= SECURE_NO_SETUID_FIXUP;
827                 else if (first_word(w, "no-setuid-fixup-locked"))
828                         c->secure_bits |= SECURE_NO_SETUID_FIXUP_LOCKED;
829                 else if (first_word(w, "noroot"))
830                         c->secure_bits |= SECURE_NOROOT;
831                 else if (first_word(w, "noroot-locked"))
832                         c->secure_bits |= SECURE_NOROOT_LOCKED;
833                 else {
834                         log_error("[%s:%u] Failed to parse secure bits, ignoring: %s", filename, line, rvalue);
835                         return 0;
836                 }
837         }
838
839         return 0;
840 }
841
842 static int config_parse_bounding_set(
843                 const char *filename,
844                 unsigned line,
845                 const char *section,
846                 const char *lvalue,
847                 const char *rvalue,
848                 void *data,
849                 void *userdata) {
850
851         ExecContext *c = data;
852         char *w;
853         size_t l;
854         char *state;
855         bool invert = false;
856         uint64_t sum = 0;
857
858         assert(filename);
859         assert(lvalue);
860         assert(rvalue);
861         assert(data);
862
863         if (rvalue[0] == '~') {
864                 invert = true;
865                 rvalue++;
866         }
867
868         /* Note that we store this inverted internally, since the
869          * kernel wants it like this. But we actually expose it
870          * non-inverted everywhere to have a fully normalized
871          * interface. */
872
873         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
874                 char *t;
875                 int r;
876                 cap_value_t cap;
877
878                 if (!(t = strndup(w, l)))
879                         return -ENOMEM;
880
881                 r = cap_from_name(t, &cap);
882                 free(t);
883
884                 if (r < 0) {
885                         log_error("[%s:%u] Failed to parse capability bounding set, ignoring: %s", filename, line, rvalue);
886                         return 0;
887                 }
888
889                 sum |= ((uint64_t) 1ULL) << (uint64_t) cap;
890         }
891
892         if (invert)
893                 c->capability_bounding_set_drop |= sum;
894         else
895                 c->capability_bounding_set_drop |= ~sum;
896
897         return 0;
898 }
899
900 static int config_parse_timer_slack_nsec(
901                 const char *filename,
902                 unsigned line,
903                 const char *section,
904                 const char *lvalue,
905                 const char *rvalue,
906                 void *data,
907                 void *userdata) {
908
909         ExecContext *c = data;
910         unsigned long u;
911
912         assert(filename);
913         assert(lvalue);
914         assert(rvalue);
915         assert(data);
916
917         if (safe_atolu(rvalue, &u) < 0) {
918                 log_error("[%s:%u] Failed to parse time slack value, ignoring: %s", filename, line, rvalue);
919                 return 0;
920         }
921
922         c->timer_slack_nsec = u;
923
924         return 0;
925 }
926
927 static int config_parse_limit(
928                 const char *filename,
929                 unsigned line,
930                 const char *section,
931                 const char *lvalue,
932                 const char *rvalue,
933                 void *data,
934                 void *userdata) {
935
936         struct rlimit **rl = data;
937         unsigned long long u;
938
939         assert(filename);
940         assert(lvalue);
941         assert(rvalue);
942         assert(data);
943
944         if (safe_atollu(rvalue, &u) < 0) {
945                 log_error("[%s:%u] Failed to parse resource value, ignoring: %s", filename, line, rvalue);
946                 return 0;
947         }
948
949         if (!*rl)
950                 if (!(*rl = new(struct rlimit, 1)))
951                         return -ENOMEM;
952
953         (*rl)->rlim_cur = (*rl)->rlim_max = (rlim_t) u;
954         return 0;
955 }
956
957 static int config_parse_cgroup(
958                 const char *filename,
959                 unsigned line,
960                 const char *section,
961                 const char *lvalue,
962                 const char *rvalue,
963                 void *data,
964                 void *userdata) {
965
966         Unit *u = userdata;
967         char *w;
968         size_t l;
969         char *state;
970
971         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
972                 char *t;
973                 int r;
974
975                 if (!(t = cunescape_length(w, l)))
976                         return -ENOMEM;
977
978                 r = unit_add_cgroup_from_text(u, t);
979                 free(t);
980
981                 if (r < 0) {
982                         log_error("[%s:%u] Failed to parse cgroup value, ignoring: %s", filename, line, rvalue);
983                         return 0;
984                 }
985         }
986
987         return 0;
988 }
989
990 #ifdef HAVE_SYSV_COMPAT
991 static int config_parse_sysv_priority(
992                 const char *filename,
993                 unsigned line,
994                 const char *section,
995                 const char *lvalue,
996                 const char *rvalue,
997                 void *data,
998                 void *userdata) {
999
1000         int *priority = data;
1001         int i;
1002
1003         assert(filename);
1004         assert(lvalue);
1005         assert(rvalue);
1006         assert(data);
1007
1008         if (safe_atoi(rvalue, &i) < 0 || i < 0) {
1009                 log_error("[%s:%u] Failed to parse SysV start priority, ignoring: %s", filename, line, rvalue);
1010                 return 0;
1011         }
1012
1013         *priority = (int) i;
1014         return 0;
1015 }
1016 #endif
1017
1018 static int config_parse_fsck_passno(
1019                 const char *filename,
1020                 unsigned line,
1021                 const char *section,
1022                 const char *lvalue,
1023                 const char *rvalue,
1024                 void *data,
1025                 void *userdata) {
1026
1027         int *passno = data;
1028         int i;
1029
1030         assert(filename);
1031         assert(lvalue);
1032         assert(rvalue);
1033         assert(data);
1034
1035         if (safe_atoi(rvalue, &i) || i < 0) {
1036                 log_error("[%s:%u] Failed to parse fsck pass number, ignoring: %s", filename, line, rvalue);
1037                 return 0;
1038         }
1039
1040         *passno = (int) i;
1041         return 0;
1042 }
1043
1044 static DEFINE_CONFIG_PARSE_ENUM(config_parse_kill_mode, kill_mode, KillMode, "Failed to parse kill mode");
1045
1046 static int config_parse_kill_signal(
1047                 const char *filename,
1048                 unsigned line,
1049                 const char *section,
1050                 const char *lvalue,
1051                 const char *rvalue,
1052                 void *data,
1053                 void *userdata) {
1054
1055         int *sig = data;
1056         int r;
1057
1058         assert(filename);
1059         assert(lvalue);
1060         assert(rvalue);
1061         assert(sig);
1062
1063         if ((r = signal_from_string_try_harder(rvalue)) <= 0) {
1064                 log_error("[%s:%u] Failed to parse kill signal, ignoring: %s", filename, line, rvalue);
1065                 return 0;
1066         }
1067
1068         *sig = r;
1069         return 0;
1070 }
1071
1072 static int config_parse_mount_flags(
1073                 const char *filename,
1074                 unsigned line,
1075                 const char *section,
1076                 const char *lvalue,
1077                 const char *rvalue,
1078                 void *data,
1079                 void *userdata) {
1080
1081         ExecContext *c = data;
1082         char *w;
1083         size_t l;
1084         char *state;
1085         unsigned long flags = 0;
1086
1087         assert(filename);
1088         assert(lvalue);
1089         assert(rvalue);
1090         assert(data);
1091
1092         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
1093                 if (strncmp(w, "shared", MAX(l, 6U)) == 0)
1094                         flags |= MS_SHARED;
1095                 else if (strncmp(w, "slave", MAX(l, 5U)) == 0)
1096                         flags |= MS_SLAVE;
1097                 else if (strncmp(w, "private", MAX(l, 7U)) == 0)
1098                         flags |= MS_PRIVATE;
1099                 else {
1100                         log_error("[%s:%u] Failed to parse mount flags, ignoring: %s", filename, line, rvalue);
1101                         return 0;
1102                 }
1103         }
1104
1105         c->mount_flags = flags;
1106         return 0;
1107 }
1108
1109 static int config_parse_timer(
1110                 const char *filename,
1111                 unsigned line,
1112                 const char *section,
1113                 const char *lvalue,
1114                 const char *rvalue,
1115                 void *data,
1116                 void *userdata) {
1117
1118         Timer *t = data;
1119         usec_t u;
1120         TimerValue *v;
1121         TimerBase b;
1122
1123         assert(filename);
1124         assert(lvalue);
1125         assert(rvalue);
1126         assert(data);
1127
1128         if ((b = timer_base_from_string(lvalue)) < 0) {
1129                 log_error("[%s:%u] Failed to parse timer base, ignoring: %s", filename, line, lvalue);
1130                 return 0;
1131         }
1132
1133         if (parse_usec(rvalue, &u) < 0) {
1134                 log_error("[%s:%u] Failed to parse timer value, ignoring: %s", filename, line, rvalue);
1135                 return 0;
1136         }
1137
1138         if (!(v = new0(TimerValue, 1)))
1139                 return -ENOMEM;
1140
1141         v->base = b;
1142         v->value = u;
1143
1144         LIST_PREPEND(TimerValue, value, t->values, v);
1145
1146         return 0;
1147 }
1148
1149 static int config_parse_timer_unit(
1150                 const char *filename,
1151                 unsigned line,
1152                 const char *section,
1153                 const char *lvalue,
1154                 const char *rvalue,
1155                 void *data,
1156                 void *userdata) {
1157
1158         Timer *t = data;
1159         int r;
1160         DBusError error;
1161
1162         assert(filename);
1163         assert(lvalue);
1164         assert(rvalue);
1165         assert(data);
1166
1167         dbus_error_init(&error);
1168
1169         if (endswith(rvalue, ".timer")) {
1170                 log_error("[%s:%u] Unit cannot be of type timer, ignoring: %s", filename, line, rvalue);
1171                 return 0;
1172         }
1173
1174         if ((r = manager_load_unit(t->meta.manager, rvalue, NULL, NULL, &t->unit)) < 0) {
1175                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1176                 dbus_error_free(&error);
1177                 return 0;
1178         }
1179
1180         return 0;
1181 }
1182
1183 static int config_parse_path_spec(
1184                 const char *filename,
1185                 unsigned line,
1186                 const char *section,
1187                 const char *lvalue,
1188                 const char *rvalue,
1189                 void *data,
1190                 void *userdata) {
1191
1192         Path *p = data;
1193         PathSpec *s;
1194         PathType b;
1195
1196         assert(filename);
1197         assert(lvalue);
1198         assert(rvalue);
1199         assert(data);
1200
1201         if ((b = path_type_from_string(lvalue)) < 0) {
1202                 log_error("[%s:%u] Failed to parse path type, ignoring: %s", filename, line, lvalue);
1203                 return 0;
1204         }
1205
1206         if (!path_is_absolute(rvalue)) {
1207                 log_error("[%s:%u] Path is not absolute, ignoring: %s", filename, line, rvalue);
1208                 return 0;
1209         }
1210
1211         if (!(s = new0(PathSpec, 1)))
1212                 return -ENOMEM;
1213
1214         if (!(s->path = strdup(rvalue))) {
1215                 free(s);
1216                 return -ENOMEM;
1217         }
1218
1219         path_kill_slashes(s->path);
1220
1221         s->type = b;
1222         s->inotify_fd = -1;
1223
1224         LIST_PREPEND(PathSpec, spec, p->specs, s);
1225
1226         return 0;
1227 }
1228
1229 static int config_parse_path_unit(
1230                 const char *filename,
1231                 unsigned line,
1232                 const char *section,
1233                 const char *lvalue,
1234                 const char *rvalue,
1235                 void *data,
1236                 void *userdata) {
1237
1238         Path *t = data;
1239         int r;
1240         DBusError error;
1241
1242         assert(filename);
1243         assert(lvalue);
1244         assert(rvalue);
1245         assert(data);
1246
1247         dbus_error_init(&error);
1248
1249         if (endswith(rvalue, ".path")) {
1250                 log_error("[%s:%u] Unit cannot be of type path, ignoring: %s", filename, line, rvalue);
1251                 return 0;
1252         }
1253
1254         if ((r = manager_load_unit(t->meta.manager, rvalue, NULL, &error, &t->unit)) < 0) {
1255                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1256                 dbus_error_free(&error);
1257                 return 0;
1258         }
1259
1260         return 0;
1261 }
1262
1263 static int config_parse_socket_service(
1264                 const char *filename,
1265                 unsigned line,
1266                 const char *section,
1267                 const char *lvalue,
1268                 const char *rvalue,
1269                 void *data,
1270                 void *userdata) {
1271
1272         Socket *s = data;
1273         int r;
1274         DBusError error;
1275
1276         assert(filename);
1277         assert(lvalue);
1278         assert(rvalue);
1279         assert(data);
1280
1281         dbus_error_init(&error);
1282
1283         if (!endswith(rvalue, ".service")) {
1284                 log_error("[%s:%u] Unit must be of type service, ignoring: %s", filename, line, rvalue);
1285                 return 0;
1286         }
1287
1288         if ((r = manager_load_unit(s->meta.manager, rvalue, NULL, &error, (Unit**) &s->service)) < 0) {
1289                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1290                 dbus_error_free(&error);
1291                 return 0;
1292         }
1293
1294         return 0;
1295 }
1296
1297 static int config_parse_service_sockets(
1298                 const char *filename,
1299                 unsigned line,
1300                 const char *section,
1301                 const char *lvalue,
1302                 const char *rvalue,
1303                 void *data,
1304                 void *userdata) {
1305
1306         Service *s = data;
1307         int r;
1308         DBusError error;
1309         char *state, *w;
1310         size_t l;
1311
1312         assert(filename);
1313         assert(lvalue);
1314         assert(rvalue);
1315         assert(data);
1316
1317         dbus_error_init(&error);
1318
1319         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
1320                 char *t;
1321                 Unit *sock;
1322
1323                 if (!(t = strndup(w, l)))
1324                         return -ENOMEM;
1325
1326                 if (!endswith(t, ".socket")) {
1327                         log_error("[%s:%u] Unit must be of type socket, ignoring: %s", filename, line, rvalue);
1328                         free(t);
1329                         continue;
1330                 }
1331
1332                 r = manager_load_unit(s->meta.manager, t, NULL, &error, &sock);
1333                 free(t);
1334
1335                 if (r < 0) {
1336                         log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1337                         dbus_error_free(&error);
1338                         continue;
1339                 }
1340
1341                 if ((r = set_ensure_allocated(&s->configured_sockets, trivial_hash_func, trivial_compare_func)) < 0)
1342                         return r;
1343
1344                 if ((r = set_put(s->configured_sockets, sock)) < 0)
1345                         return r;
1346         }
1347
1348         return 0;
1349 }
1350
1351 static int config_parse_env_file(
1352                 const char *filename,
1353                 unsigned line,
1354                 const char *section,
1355                 const char *lvalue,
1356                 const char *rvalue,
1357                 void *data,
1358                 void *userdata) {
1359
1360         char ***env = data, **k;
1361
1362         assert(filename);
1363         assert(lvalue);
1364         assert(rvalue);
1365         assert(data);
1366
1367         if (!path_is_absolute(rvalue[0] == '-' ? rvalue + 1 : rvalue)) {
1368                 log_error("[%s:%u] Path '%s' is not absolute, ignoring.", filename, line, rvalue);
1369                 return 0;
1370         }
1371
1372         if (!(k = strv_append(*env, rvalue)))
1373                 return -ENOMEM;
1374
1375         strv_free(*env);
1376         *env = k;
1377
1378         return 0;
1379 }
1380
1381 static int config_parse_ip_tos(
1382                 const char *filename,
1383                 unsigned line,
1384                 const char *section,
1385                 const char *lvalue,
1386                 const char *rvalue,
1387                 void *data,
1388                 void *userdata) {
1389
1390         int *ip_tos = data, x;
1391
1392         assert(filename);
1393         assert(lvalue);
1394         assert(rvalue);
1395         assert(data);
1396
1397         if ((x = ip_tos_from_string(rvalue)) < 0)
1398                 if (safe_atoi(rvalue, &x) < 0) {
1399                         log_error("[%s:%u] Failed to parse IP TOS value, ignoring: %s", filename, line, rvalue);
1400                         return 0;
1401                 }
1402
1403         *ip_tos = x;
1404         return 0;
1405 }
1406
1407 static int config_parse_condition_path(
1408                 const char *filename,
1409                 unsigned line,
1410                 const char *section,
1411                 const char *lvalue,
1412                 const char *rvalue,
1413                 void *data,
1414                 void *userdata) {
1415
1416         Unit *u = data;
1417         bool trigger, negate;
1418         Condition *c;
1419
1420         assert(filename);
1421         assert(lvalue);
1422         assert(rvalue);
1423         assert(data);
1424
1425         if ((trigger = rvalue[0] == '|'))
1426                 rvalue++;
1427
1428         if ((negate = rvalue[0] == '!'))
1429                 rvalue++;
1430
1431         if (!path_is_absolute(rvalue)) {
1432                 log_error("[%s:%u] Path in condition not absolute, ignoring: %s", filename, line, rvalue);
1433                 return 0;
1434         }
1435
1436         if (!(c = condition_new(streq(lvalue, "ConditionPathExists") ? CONDITION_PATH_EXISTS : CONDITION_DIRECTORY_NOT_EMPTY,
1437                                 rvalue, trigger, negate)))
1438                 return -ENOMEM;
1439
1440         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1441         return 0;
1442 }
1443
1444 static int config_parse_condition_kernel(
1445                 const char *filename,
1446                 unsigned line,
1447                 const char *section,
1448                 const char *lvalue,
1449                 const char *rvalue,
1450                 void *data,
1451                 void *userdata) {
1452
1453         Unit *u = data;
1454         bool trigger, negate;
1455         Condition *c;
1456
1457         assert(filename);
1458         assert(lvalue);
1459         assert(rvalue);
1460         assert(data);
1461
1462         if ((trigger = rvalue[0] == '|'))
1463                 rvalue++;
1464
1465         if ((negate = rvalue[0] == '!'))
1466                 rvalue++;
1467
1468         if (!(c = condition_new(CONDITION_KERNEL_COMMAND_LINE, rvalue, trigger, negate)))
1469                 return -ENOMEM;
1470
1471         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1472         return 0;
1473 }
1474
1475 static int config_parse_condition_virt(
1476                 const char *filename,
1477                 unsigned line,
1478                 const char *section,
1479                 const char *lvalue,
1480                 const char *rvalue,
1481                 void *data,
1482                 void *userdata) {
1483
1484         Unit *u = data;
1485         bool trigger, negate;
1486         Condition *c;
1487
1488         assert(filename);
1489         assert(lvalue);
1490         assert(rvalue);
1491         assert(data);
1492
1493         if ((trigger = rvalue[0] == '|'))
1494                 rvalue++;
1495
1496         if ((negate = rvalue[0] == '!'))
1497                 rvalue++;
1498
1499         if (!(c = condition_new(CONDITION_VIRTUALIZATION, rvalue, trigger, negate)))
1500                 return -ENOMEM;
1501
1502         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1503         return 0;
1504 }
1505
1506 static int config_parse_condition_null(
1507                 const char *filename,
1508                 unsigned line,
1509                 const char *section,
1510                 const char *lvalue,
1511                 const char *rvalue,
1512                 void *data,
1513                 void *userdata) {
1514
1515         Unit *u = data;
1516         Condition *c;
1517         bool trigger, negate;
1518         int b;
1519
1520         assert(filename);
1521         assert(lvalue);
1522         assert(rvalue);
1523         assert(data);
1524
1525         if ((trigger = rvalue[0] == '|'))
1526                 rvalue++;
1527
1528         if ((negate = rvalue[0] == '!'))
1529                 rvalue++;
1530
1531         if ((b = parse_boolean(rvalue)) < 0) {
1532                 log_error("[%s:%u] Failed to parse boolean value in condition, ignoring: %s", filename, line, rvalue);
1533                 return 0;
1534         }
1535
1536         if (!b)
1537                 negate = !negate;
1538
1539         if (!(c = condition_new(CONDITION_NULL, NULL, trigger, negate)))
1540                 return -ENOMEM;
1541
1542         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1543         return 0;
1544 }
1545
1546 static DEFINE_CONFIG_PARSE_ENUM(config_parse_notify_access, notify_access, NotifyAccess, "Failed to parse notify access specifier");
1547
1548 #define FOLLOW_MAX 8
1549
1550 static int open_follow(char **filename, FILE **_f, Set *names, char **_final) {
1551         unsigned c = 0;
1552         int fd, r;
1553         FILE *f;
1554         char *id = NULL;
1555
1556         assert(filename);
1557         assert(*filename);
1558         assert(_f);
1559         assert(names);
1560
1561         /* This will update the filename pointer if the loaded file is
1562          * reached by a symlink. The old string will be freed. */
1563
1564         for (;;) {
1565                 char *target, *name;
1566
1567                 if (c++ >= FOLLOW_MAX)
1568                         return -ELOOP;
1569
1570                 path_kill_slashes(*filename);
1571
1572                 /* Add the file name we are currently looking at to
1573                  * the names of this unit, but only if it is a valid
1574                  * unit name. */
1575                 name = file_name_from_path(*filename);
1576
1577                 if (unit_name_is_valid(name, false)) {
1578                         if (!(id = set_get(names, name))) {
1579
1580                                 if (!(id = strdup(name)))
1581                                         return -ENOMEM;
1582
1583                                 if ((r = set_put(names, id)) < 0) {
1584                                         free(id);
1585                                         return r;
1586                                 }
1587                         }
1588                 }
1589
1590                 /* Try to open the file name, but don't if its a symlink */
1591                 if ((fd = open(*filename, O_RDONLY|O_CLOEXEC|O_NOCTTY|O_NOFOLLOW)) >= 0)
1592                         break;
1593
1594                 if (errno != ELOOP)
1595                         return -errno;
1596
1597                 /* Hmm, so this is a symlink. Let's read the name, and follow it manually */
1598                 if ((r = readlink_and_make_absolute(*filename, &target)) < 0)
1599                         return r;
1600
1601                 free(*filename);
1602                 *filename = target;
1603         }
1604
1605         if (!(f = fdopen(fd, "re"))) {
1606                 r = -errno;
1607                 close_nointr_nofail(fd);
1608                 return r;
1609         }
1610
1611         *_f = f;
1612         *_final = id;
1613         return 0;
1614 }
1615
1616 static int merge_by_names(Unit **u, Set *names, const char *id) {
1617         char *k;
1618         int r;
1619
1620         assert(u);
1621         assert(*u);
1622         assert(names);
1623
1624         /* Let's try to add in all symlink names we found */
1625         while ((k = set_steal_first(names))) {
1626
1627                 /* First try to merge in the other name into our
1628                  * unit */
1629                 if ((r = unit_merge_by_name(*u, k)) < 0) {
1630                         Unit *other;
1631
1632                         /* Hmm, we couldn't merge the other unit into
1633                          * ours? Then let's try it the other way
1634                          * round */
1635
1636                         other = manager_get_unit((*u)->meta.manager, k);
1637                         free(k);
1638
1639                         if (other)
1640                                 if ((r = unit_merge(other, *u)) >= 0) {
1641                                         *u = other;
1642                                         return merge_by_names(u, names, NULL);
1643                                 }
1644
1645                         return r;
1646                 }
1647
1648                 if (id == k)
1649                         unit_choose_id(*u, id);
1650
1651                 free(k);
1652         }
1653
1654         return 0;
1655 }
1656
1657 static void dump_items(FILE *f, const ConfigItem *items) {
1658         const ConfigItem *i;
1659         const char *prev_section = NULL;
1660         bool not_first = false;
1661
1662         struct {
1663                 ConfigParserCallback callback;
1664                 const char *rvalue;
1665         } table[] = {
1666                 { config_parse_int,              "INTEGER" },
1667                 { config_parse_unsigned,         "UNSIGNED" },
1668                 { config_parse_size,             "SIZE" },
1669                 { config_parse_bool,             "BOOLEAN" },
1670                 { config_parse_string,           "STRING" },
1671                 { config_parse_path,             "PATH" },
1672                 { config_parse_strv,             "STRING [...]" },
1673                 { config_parse_nice,             "NICE" },
1674                 { config_parse_oom_score_adjust, "OOMSCOREADJUST" },
1675                 { config_parse_io_class,         "IOCLASS" },
1676                 { config_parse_io_priority,      "IOPRIORITY" },
1677                 { config_parse_cpu_sched_policy, "CPUSCHEDPOLICY" },
1678                 { config_parse_cpu_sched_prio,   "CPUSCHEDPRIO" },
1679                 { config_parse_cpu_affinity,     "CPUAFFINITY" },
1680                 { config_parse_mode,             "MODE" },
1681                 { config_parse_env_file,         "FILE" },
1682                 { config_parse_output,           "OUTPUT" },
1683                 { config_parse_input,            "INPUT" },
1684                 { config_parse_facility,         "FACILITY" },
1685                 { config_parse_level,            "LEVEL" },
1686                 { config_parse_capabilities,     "CAPABILITIES" },
1687                 { config_parse_secure_bits,      "SECUREBITS" },
1688                 { config_parse_bounding_set,     "BOUNDINGSET" },
1689                 { config_parse_timer_slack_nsec, "TIMERSLACK" },
1690                 { config_parse_limit,            "LIMIT" },
1691                 { config_parse_cgroup,           "CGROUP [...]" },
1692                 { config_parse_deps,             "UNIT [...]" },
1693                 { config_parse_names,            "UNIT [...]" },
1694                 { config_parse_exec,             "PATH [ARGUMENT [...]]" },
1695                 { config_parse_service_type,     "SERVICETYPE" },
1696                 { config_parse_service_restart,  "SERVICERESTART" },
1697 #ifdef HAVE_SYSV_COMPAT
1698                 { config_parse_sysv_priority,    "SYSVPRIORITY" },
1699 #else
1700                 { config_parse_warn_compat,      "NOTSUPPORTED" },
1701 #endif
1702                 { config_parse_kill_mode,        "KILLMODE" },
1703                 { config_parse_kill_signal,      "SIGNAL" },
1704                 { config_parse_listen,           "SOCKET [...]" },
1705                 { config_parse_socket_bind,      "SOCKETBIND" },
1706                 { config_parse_bindtodevice,     "NETWORKINTERFACE" },
1707                 { config_parse_usec,             "SECONDS" },
1708                 { config_parse_path_strv,        "PATH [...]" },
1709                 { config_parse_mount_flags,      "MOUNTFLAG [...]" },
1710                 { config_parse_string_printf,    "STRING" },
1711                 { config_parse_timer,            "TIMER" },
1712                 { config_parse_timer_unit,       "NAME" },
1713                 { config_parse_path_spec,        "PATH" },
1714                 { config_parse_path_unit,        "UNIT" },
1715                 { config_parse_notify_access,    "ACCESS" },
1716                 { config_parse_ip_tos,           "TOS" },
1717                 { config_parse_condition_path,   "CONDITION" },
1718                 { config_parse_condition_kernel, "CONDITION" },
1719                 { config_parse_condition_null,   "CONDITION" },
1720                 { config_parse_condition_virt,   "CONDITION" },
1721         };
1722
1723         assert(f);
1724         assert(items);
1725
1726         for (i = items; i->lvalue; i++) {
1727                 unsigned j;
1728                 const char *rvalue = "OTHER";
1729
1730                 if (!streq_ptr(i->section, prev_section)) {
1731                         if (!not_first)
1732                                 not_first = true;
1733                         else
1734                                 fputc('\n', f);
1735
1736                         fprintf(f, "[%s]\n", i->section);
1737                         prev_section = i->section;
1738                 }
1739
1740                 for (j = 0; j < ELEMENTSOF(table); j++)
1741                         if (i->parse == table[j].callback) {
1742                                 rvalue = table[j].rvalue;
1743                                 break;
1744                         }
1745
1746                 fprintf(f, "%s=%s\n", i->lvalue, rvalue);
1747         }
1748 }
1749
1750 static int load_from_path(Unit *u, const char *path) {
1751
1752         static const char* const section_table[_UNIT_TYPE_MAX] = {
1753                 [UNIT_SERVICE]   = "Service",
1754                 [UNIT_TIMER]     = "Timer",
1755                 [UNIT_SOCKET]    = "Socket",
1756                 [UNIT_TARGET]    = "Target",
1757                 [UNIT_DEVICE]    = "Device",
1758                 [UNIT_MOUNT]     = "Mount",
1759                 [UNIT_AUTOMOUNT] = "Automount",
1760                 [UNIT_SNAPSHOT]  = "Snapshot",
1761                 [UNIT_SWAP]      = "Swap",
1762                 [UNIT_PATH]      = "Path"
1763         };
1764
1765 #define EXEC_CONTEXT_CONFIG_ITEMS(context, section) \
1766                 { "WorkingDirectory",       config_parse_path,            &(context).working_directory,                    section   }, \
1767                 { "RootDirectory",          config_parse_path,            &(context).root_directory,                       section   }, \
1768                 { "User",                   config_parse_string_printf,   &(context).user,                                 section   }, \
1769                 { "Group",                  config_parse_string_printf,   &(context).group,                                section   }, \
1770                 { "SupplementaryGroups",    config_parse_strv,            &(context).supplementary_groups,                 section   }, \
1771                 { "Nice",                   config_parse_nice,            &(context),                                      section   }, \
1772                 { "OOMScoreAdjust",         config_parse_oom_score_adjust,&(context),                                      section   }, \
1773                 { "IOSchedulingClass",      config_parse_io_class,        &(context),                                      section   }, \
1774                 { "IOSchedulingPriority",   config_parse_io_priority,     &(context),                                      section   }, \
1775                 { "CPUSchedulingPolicy",    config_parse_cpu_sched_policy,&(context),                                      section   }, \
1776                 { "CPUSchedulingPriority",  config_parse_cpu_sched_prio,  &(context),                                      section   }, \
1777                 { "CPUSchedulingResetOnFork", config_parse_bool,          &(context).cpu_sched_reset_on_fork,              section   }, \
1778                 { "CPUAffinity",            config_parse_cpu_affinity,    &(context),                                      section   }, \
1779                 { "UMask",                  config_parse_mode,            &(context).umask,                                section   }, \
1780                 { "Environment",            config_parse_strv,            &(context).environment,                          section   }, \
1781                 { "EnvironmentFile",        config_parse_env_file,        &(context).environment_files,                    section   }, \
1782                 { "StandardInput",          config_parse_input,           &(context).std_input,                            section   }, \
1783                 { "StandardOutput",         config_parse_output,          &(context).std_output,                           section   }, \
1784                 { "StandardError",          config_parse_output,          &(context).std_error,                            section   }, \
1785                 { "TTYPath",                config_parse_path,            &(context).tty_path,                             section   }, \
1786                 { "SyslogIdentifier",       config_parse_string_printf,   &(context).syslog_identifier,                    section   }, \
1787                 { "SyslogFacility",         config_parse_facility,        &(context).syslog_priority,                      section   }, \
1788                 { "SyslogLevel",            config_parse_level,           &(context).syslog_priority,                      section   }, \
1789                 { "SyslogLevelPrefix",      config_parse_bool,            &(context).syslog_level_prefix,                  section   }, \
1790                 { "Capabilities",           config_parse_capabilities,    &(context),                                      section   }, \
1791                 { "SecureBits",             config_parse_secure_bits,     &(context),                                      section   }, \
1792                 { "CapabilityBoundingSet",  config_parse_bounding_set,    &(context),                                      section   }, \
1793                 { "TimerSlackNSec",         config_parse_timer_slack_nsec,&(context),                                      section   }, \
1794                 { "LimitCPU",               config_parse_limit,           &(context).rlimit[RLIMIT_CPU],                   section   }, \
1795                 { "LimitFSIZE",             config_parse_limit,           &(context).rlimit[RLIMIT_FSIZE],                 section   }, \
1796                 { "LimitDATA",              config_parse_limit,           &(context).rlimit[RLIMIT_DATA],                  section   }, \
1797                 { "LimitSTACK",             config_parse_limit,           &(context).rlimit[RLIMIT_STACK],                 section   }, \
1798                 { "LimitCORE",              config_parse_limit,           &(context).rlimit[RLIMIT_CORE],                  section   }, \
1799                 { "LimitRSS",               config_parse_limit,           &(context).rlimit[RLIMIT_RSS],                   section   }, \
1800                 { "LimitNOFILE",            config_parse_limit,           &(context).rlimit[RLIMIT_NOFILE],                section   }, \
1801                 { "LimitAS",                config_parse_limit,           &(context).rlimit[RLIMIT_AS],                    section   }, \
1802                 { "LimitNPROC",             config_parse_limit,           &(context).rlimit[RLIMIT_NPROC],                 section   }, \
1803                 { "LimitMEMLOCK",           config_parse_limit,           &(context).rlimit[RLIMIT_MEMLOCK],               section   }, \
1804                 { "LimitLOCKS",             config_parse_limit,           &(context).rlimit[RLIMIT_LOCKS],                 section   }, \
1805                 { "LimitSIGPENDING",        config_parse_limit,           &(context).rlimit[RLIMIT_SIGPENDING],            section   }, \
1806                 { "LimitMSGQUEUE",          config_parse_limit,           &(context).rlimit[RLIMIT_MSGQUEUE],              section   }, \
1807                 { "LimitNICE",              config_parse_limit,           &(context).rlimit[RLIMIT_NICE],                  section   }, \
1808                 { "LimitRTPRIO",            config_parse_limit,           &(context).rlimit[RLIMIT_RTPRIO],                section   }, \
1809                 { "LimitRTTIME",            config_parse_limit,           &(context).rlimit[RLIMIT_RTTIME],                section   }, \
1810                 { "ControlGroup",           config_parse_cgroup,          u,                                               section   }, \
1811                 { "ReadWriteDirectories",   config_parse_path_strv,       &(context).read_write_dirs,                      section   }, \
1812                 { "ReadOnlyDirectories",    config_parse_path_strv,       &(context).read_only_dirs,                       section   }, \
1813                 { "InaccessibleDirectories",config_parse_path_strv,       &(context).inaccessible_dirs,                    section   }, \
1814                 { "PrivateTmp",             config_parse_bool,            &(context).private_tmp,                          section   }, \
1815                 { "MountFlags",             config_parse_mount_flags,     &(context),                                      section   }, \
1816                 { "TCPWrapName",            config_parse_string_printf,   &(context).tcpwrap_name,                         section   }, \
1817                 { "PAMName",                config_parse_string_printf,   &(context).pam_name,                             section   }, \
1818                 { "KillMode",               config_parse_kill_mode,       &(context).kill_mode,                            section   }, \
1819                 { "KillSignal",             config_parse_kill_signal,     &(context).kill_signal,                          section   }, \
1820                 { "SendSIGKILL",            config_parse_bool,            &(context).send_sigkill,                         section   }, \
1821                 { "UtmpIdentifier",         config_parse_string_printf,   &(context).utmp_id,                              section   }
1822
1823         const ConfigItem items[] = {
1824                 { "Names",                  config_parse_names,           u,                                               "Unit"    },
1825                 { "Description",            config_parse_string_printf,   &u->meta.description,                            "Unit"    },
1826                 { "Requires",               config_parse_deps,            UINT_TO_PTR(UNIT_REQUIRES),                      "Unit"    },
1827                 { "RequiresOverridable",    config_parse_deps,            UINT_TO_PTR(UNIT_REQUIRES_OVERRIDABLE),          "Unit"    },
1828                 { "Requisite",              config_parse_deps,            UINT_TO_PTR(UNIT_REQUISITE),                     "Unit"    },
1829                 { "RequisiteOverridable",   config_parse_deps,            UINT_TO_PTR(UNIT_REQUISITE_OVERRIDABLE),         "Unit"    },
1830                 { "Wants",                  config_parse_deps,            UINT_TO_PTR(UNIT_WANTS),                         "Unit"    },
1831                 { "BindTo",                 config_parse_deps,            UINT_TO_PTR(UNIT_BIND_TO),                       "Unit"    },
1832                 { "Conflicts",              config_parse_deps,            UINT_TO_PTR(UNIT_CONFLICTS),                     "Unit"    },
1833                 { "Before",                 config_parse_deps,            UINT_TO_PTR(UNIT_BEFORE),                        "Unit"    },
1834                 { "After",                  config_parse_deps,            UINT_TO_PTR(UNIT_AFTER),                         "Unit"    },
1835                 { "OnFailure",              config_parse_deps,            UINT_TO_PTR(UNIT_ON_FAILURE),                    "Unit"    },
1836                 { "StopWhenUnneeded",       config_parse_bool,            &u->meta.stop_when_unneeded,                     "Unit"    },
1837                 { "RefuseManualStart",      config_parse_bool,            &u->meta.refuse_manual_start,                    "Unit"    },
1838                 { "RefuseManualStop",       config_parse_bool,            &u->meta.refuse_manual_stop,                     "Unit"    },
1839                 { "AllowIsolate",           config_parse_bool,            &u->meta.allow_isolate,                          "Unit"    },
1840                 { "DefaultDependencies",    config_parse_bool,            &u->meta.default_dependencies,                   "Unit"    },
1841                 { "JobTimeoutSec",          config_parse_usec,            &u->meta.job_timeout,                            "Unit"    },
1842                 { "ConditionPathExists",    config_parse_condition_path,  u,                                               "Unit"    },
1843                 { "ConditionDirectoryNotEmpty", config_parse_condition_path,  u,                                           "Unit"    },
1844                 { "ConditionKernelCommandLine", config_parse_condition_kernel, u,                                          "Unit"    },
1845                 { "ConditionVirtualization",config_parse_condition_virt,  u,                                               "Unit"    },
1846                 { "ConditionNull",          config_parse_condition_null,  u,                                               "Unit"    },
1847
1848                 { "PIDFile",                config_parse_path,            &u->service.pid_file,                            "Service" },
1849                 { "ExecStartPre",           config_parse_exec,            u->service.exec_command+SERVICE_EXEC_START_PRE,  "Service" },
1850                 { "ExecStart",              config_parse_exec,            u->service.exec_command+SERVICE_EXEC_START,      "Service" },
1851                 { "ExecStartPost",          config_parse_exec,            u->service.exec_command+SERVICE_EXEC_START_POST, "Service" },
1852                 { "ExecReload",             config_parse_exec,            u->service.exec_command+SERVICE_EXEC_RELOAD,     "Service" },
1853                 { "ExecStop",               config_parse_exec,            u->service.exec_command+SERVICE_EXEC_STOP,       "Service" },
1854                 { "ExecStopPost",           config_parse_exec,            u->service.exec_command+SERVICE_EXEC_STOP_POST,  "Service" },
1855                 { "RestartSec",             config_parse_usec,            &u->service.restart_usec,                        "Service" },
1856                 { "TimeoutSec",             config_parse_usec,            &u->service.timeout_usec,                        "Service" },
1857                 { "Type",                   config_parse_service_type,    &u->service.type,                                "Service" },
1858                 { "Restart",                config_parse_service_restart, &u->service.restart,                             "Service" },
1859                 { "PermissionsStartOnly",   config_parse_bool,            &u->service.permissions_start_only,              "Service" },
1860                 { "RootDirectoryStartOnly", config_parse_bool,            &u->service.root_directory_start_only,           "Service" },
1861                 { "RemainAfterExit",        config_parse_bool,            &u->service.remain_after_exit,                   "Service" },
1862                 { "GuessMainPID",           config_parse_bool,            &u->service.guess_main_pid,                      "Service" },
1863 #ifdef HAVE_SYSV_COMPAT
1864                 { "SysVStartPriority",      config_parse_sysv_priority,   &u->service.sysv_start_priority,                 "Service" },
1865 #else
1866                 { "SysVStartPriority",      config_parse_warn_compat,     NULL,                                            "Service" },
1867 #endif
1868                 { "NonBlocking",            config_parse_bool,            &u->service.exec_context.non_blocking,           "Service" },
1869                 { "BusName",                config_parse_string_printf,   &u->service.bus_name,                            "Service" },
1870                 { "NotifyAccess",           config_parse_notify_access,   &u->service.notify_access,                       "Service" },
1871                 { "Sockets",                config_parse_service_sockets, &u->service,                                     "Service" },
1872                 { "FsckPassNo",             config_parse_fsck_passno,     &u->service.fsck_passno,                         "Service" },
1873                 EXEC_CONTEXT_CONFIG_ITEMS(u->service.exec_context, "Service"),
1874
1875                 { "ListenStream",           config_parse_listen,          &u->socket,                                      "Socket"  },
1876                 { "ListenDatagram",         config_parse_listen,          &u->socket,                                      "Socket"  },
1877                 { "ListenSequentialPacket", config_parse_listen,          &u->socket,                                      "Socket"  },
1878                 { "ListenFIFO",             config_parse_listen,          &u->socket,                                      "Socket"  },
1879                 { "BindIPv6Only",           config_parse_socket_bind,     &u->socket,                                      "Socket"  },
1880                 { "Backlog",                config_parse_unsigned,        &u->socket.backlog,                              "Socket"  },
1881                 { "BindToDevice",           config_parse_bindtodevice,    &u->socket,                                      "Socket"  },
1882                 { "ExecStartPre",           config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_START_PRE,    "Socket"  },
1883                 { "ExecStartPost",          config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_START_POST,   "Socket"  },
1884                 { "ExecStopPre",            config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_STOP_PRE,     "Socket"  },
1885                 { "ExecStopPost",           config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_STOP_POST,    "Socket"  },
1886                 { "TimeoutSec",             config_parse_usec,            &u->socket.timeout_usec,                         "Socket"  },
1887                 { "DirectoryMode",          config_parse_mode,            &u->socket.directory_mode,                       "Socket"  },
1888                 { "SocketMode",             config_parse_mode,            &u->socket.socket_mode,                          "Socket"  },
1889                 { "Accept",                 config_parse_bool,            &u->socket.accept,                               "Socket"  },
1890                 { "MaxConnections",         config_parse_unsigned,        &u->socket.max_connections,                      "Socket"  },
1891                 { "KeepAlive",              config_parse_bool,            &u->socket.keep_alive,                           "Socket"  },
1892                 { "Priority",               config_parse_int,             &u->socket.priority,                             "Socket"  },
1893                 { "ReceiveBuffer",          config_parse_size,            &u->socket.receive_buffer,                       "Socket"  },
1894                 { "SendBuffer",             config_parse_size,            &u->socket.send_buffer,                          "Socket"  },
1895                 { "IPTOS",                  config_parse_ip_tos,          &u->socket.ip_tos,                               "Socket"  },
1896                 { "IPTTL",                  config_parse_int,             &u->socket.ip_ttl,                               "Socket"  },
1897                 { "Mark",                   config_parse_int,             &u->socket.mark,                                 "Socket"  },
1898                 { "PipeSize",               config_parse_size,            &u->socket.pipe_size,                            "Socket"  },
1899                 { "FreeBind",               config_parse_bool,            &u->socket.free_bind,                            "Socket"  },
1900                 { "TCPCongestion",          config_parse_string,          &u->socket.tcp_congestion,                       "Socket"  },
1901                 { "Service",                config_parse_socket_service,  &u->socket,                                      "Socket"  },
1902                 EXEC_CONTEXT_CONFIG_ITEMS(u->socket.exec_context, "Socket"),
1903
1904                 { "What",                   config_parse_string,          &u->mount.parameters_fragment.what,              "Mount"   },
1905                 { "Where",                  config_parse_path,            &u->mount.where,                                 "Mount"   },
1906                 { "Options",                config_parse_string,          &u->mount.parameters_fragment.options,           "Mount"   },
1907                 { "Type",                   config_parse_string,          &u->mount.parameters_fragment.fstype,            "Mount"   },
1908                 { "TimeoutSec",             config_parse_usec,            &u->mount.timeout_usec,                          "Mount"   },
1909                 { "DirectoryMode",          config_parse_mode,            &u->mount.directory_mode,                        "Mount"   },
1910                 EXEC_CONTEXT_CONFIG_ITEMS(u->mount.exec_context, "Mount"),
1911
1912                 { "Where",                  config_parse_path,            &u->automount.where,                             "Automount" },
1913                 { "DirectoryMode",          config_parse_mode,            &u->automount.directory_mode,                    "Automount" },
1914
1915                 { "What",                   config_parse_path,            &u->swap.parameters_fragment.what,               "Swap"    },
1916                 { "Priority",               config_parse_int,             &u->swap.parameters_fragment.priority,           "Swap"    },
1917                 { "TimeoutSec",             config_parse_usec,            &u->swap.timeout_usec,                           "Swap"    },
1918                 EXEC_CONTEXT_CONFIG_ITEMS(u->swap.exec_context, "Swap"),
1919
1920                 { "OnActiveSec",            config_parse_timer,           &u->timer,                                       "Timer"   },
1921                 { "OnBootSec",              config_parse_timer,           &u->timer,                                       "Timer"   },
1922                 { "OnStartupSec",           config_parse_timer,           &u->timer,                                       "Timer"   },
1923                 { "OnUnitActiveSec",        config_parse_timer,           &u->timer,                                       "Timer"   },
1924                 { "OnUnitInactiveSec",      config_parse_timer,           &u->timer,                                       "Timer"   },
1925                 { "Unit",                   config_parse_timer_unit,      &u->timer,                                       "Timer"   },
1926
1927                 { "PathExists",             config_parse_path_spec,       &u->path,                                        "Path"    },
1928                 { "PathChanged",            config_parse_path_spec,       &u->path,                                        "Path"    },
1929                 { "DirectoryNotEmpty",      config_parse_path_spec,       &u->path,                                        "Path"    },
1930                 { "Unit",                   config_parse_path_unit,       &u->path,                                        "Path"    },
1931
1932                 /* The [Install] section is ignored here. */
1933                 { "Alias",                  NULL,                         NULL,                                            "Install" },
1934                 { "WantedBy",               NULL,                         NULL,                                            "Install" },
1935                 { "Also",                   NULL,                         NULL,                                            "Install" },
1936
1937                 { NULL, NULL, NULL, NULL }
1938         };
1939
1940 #undef EXEC_CONTEXT_CONFIG_ITEMS
1941
1942         const char *sections[4];
1943         int r;
1944         Set *symlink_names;
1945         FILE *f = NULL;
1946         char *filename = NULL, *id = NULL;
1947         Unit *merged;
1948         struct stat st;
1949
1950         if (!u) {
1951                 /* Dirty dirty hack. */
1952                 dump_items((FILE*) path, items);
1953                 return 0;
1954         }
1955
1956         assert(u);
1957         assert(path);
1958
1959         sections[0] = "Unit";
1960         sections[1] = section_table[u->meta.type];
1961         sections[2] = "Install";
1962         sections[3] = NULL;
1963
1964         if (!(symlink_names = set_new(string_hash_func, string_compare_func)))
1965                 return -ENOMEM;
1966
1967         if (path_is_absolute(path)) {
1968
1969                 if (!(filename = strdup(path))) {
1970                         r = -ENOMEM;
1971                         goto finish;
1972                 }
1973
1974                 if ((r = open_follow(&filename, &f, symlink_names, &id)) < 0) {
1975                         free(filename);
1976                         filename = NULL;
1977
1978                         if (r != -ENOENT)
1979                                 goto finish;
1980                 }
1981
1982         } else  {
1983                 char **p;
1984
1985                 STRV_FOREACH(p, u->meta.manager->lookup_paths.unit_path) {
1986
1987                         /* Instead of opening the path right away, we manually
1988                          * follow all symlinks and add their name to our unit
1989                          * name set while doing so */
1990                         if (!(filename = path_make_absolute(path, *p))) {
1991                                 r = -ENOMEM;
1992                                 goto finish;
1993                         }
1994
1995                         if (u->meta.manager->unit_path_cache &&
1996                             !set_get(u->meta.manager->unit_path_cache, filename))
1997                                 r = -ENOENT;
1998                         else
1999                                 r = open_follow(&filename, &f, symlink_names, &id);
2000
2001                         if (r < 0) {
2002                                 char *sn;
2003
2004                                 free(filename);
2005                                 filename = NULL;
2006
2007                                 if (r != -ENOENT)
2008                                         goto finish;
2009
2010                                 /* Empty the symlink names for the next run */
2011                                 while ((sn = set_steal_first(symlink_names)))
2012                                         free(sn);
2013
2014                                 continue;
2015                         }
2016
2017                         break;
2018                 }
2019         }
2020
2021         if (!filename) {
2022                 /* Hmm, no suitable file found? */
2023                 r = 0;
2024                 goto finish;
2025         }
2026
2027         merged = u;
2028         if ((r = merge_by_names(&merged, symlink_names, id)) < 0)
2029                 goto finish;
2030
2031         if (merged != u) {
2032                 u->meta.load_state = UNIT_MERGED;
2033                 r = 0;
2034                 goto finish;
2035         }
2036
2037         zero(st);
2038         if (fstat(fileno(f), &st) < 0) {
2039                 r = -errno;
2040                 goto finish;
2041         }
2042
2043         if (null_or_empty(&st))
2044                 u->meta.load_state = UNIT_MASKED;
2045         else {
2046                 /* Now, parse the file contents */
2047                 if ((r = config_parse(filename, f, sections, items, false, u)) < 0)
2048                         goto finish;
2049
2050                 u->meta.load_state = UNIT_LOADED;
2051         }
2052
2053         free(u->meta.fragment_path);
2054         u->meta.fragment_path = filename;
2055         filename = NULL;
2056
2057         u->meta.fragment_mtime = timespec_load(&st.st_mtim);
2058
2059         r = 0;
2060
2061 finish:
2062         set_free_free(symlink_names);
2063         free(filename);
2064
2065         if (f)
2066                 fclose(f);
2067
2068         return r;
2069 }
2070
2071 int unit_load_fragment(Unit *u) {
2072         int r;
2073         Iterator i;
2074         const char *t;
2075
2076         assert(u);
2077         assert(u->meta.load_state == UNIT_STUB);
2078         assert(u->meta.id);
2079
2080         /* First, try to find the unit under its id. We always look
2081          * for unit files in the default directories, to make it easy
2082          * to override things by placing things in /etc/systemd/system */
2083         if ((r = load_from_path(u, u->meta.id)) < 0)
2084                 return r;
2085
2086         /* Try to find an alias we can load this with */
2087         if (u->meta.load_state == UNIT_STUB)
2088                 SET_FOREACH(t, u->meta.names, i) {
2089
2090                         if (t == u->meta.id)
2091                                 continue;
2092
2093                         if ((r = load_from_path(u, t)) < 0)
2094                                 return r;
2095
2096                         if (u->meta.load_state != UNIT_STUB)
2097                                 break;
2098                 }
2099
2100         /* And now, try looking for it under the suggested (originally linked) path */
2101         if (u->meta.load_state == UNIT_STUB && u->meta.fragment_path) {
2102
2103                 if ((r = load_from_path(u, u->meta.fragment_path)) < 0)
2104                         return r;
2105
2106                 if (u->meta.load_state == UNIT_STUB) {
2107                         /* Hmm, this didn't work? Then let's get rid
2108                          * of the fragment path stored for us, so that
2109                          * we don't point to an invalid location. */
2110                         free(u->meta.fragment_path);
2111                         u->meta.fragment_path = NULL;
2112                 }
2113         }
2114
2115         /* Look for a template */
2116         if (u->meta.load_state == UNIT_STUB && u->meta.instance) {
2117                 char *k;
2118
2119                 if (!(k = unit_name_template(u->meta.id)))
2120                         return -ENOMEM;
2121
2122                 r = load_from_path(u, k);
2123                 free(k);
2124
2125                 if (r < 0)
2126                         return r;
2127
2128                 if (u->meta.load_state == UNIT_STUB)
2129                         SET_FOREACH(t, u->meta.names, i) {
2130
2131                                 if (t == u->meta.id)
2132                                         continue;
2133
2134                                 if (!(k = unit_name_template(t)))
2135                                         return -ENOMEM;
2136
2137                                 r = load_from_path(u, k);
2138                                 free(k);
2139
2140                                 if (r < 0)
2141                                         return r;
2142
2143                                 if (u->meta.load_state != UNIT_STUB)
2144                                         break;
2145                         }
2146         }
2147
2148         return 0;
2149 }
2150
2151 void unit_dump_config_items(FILE *f) {
2152         /* OK, this wins a prize for extreme ugliness. */
2153
2154         load_from_path(NULL, (const void*) f);
2155 }