chiark / gitweb /
unit: disallow configuration of more than one on_failure dependencies if OnFailureIso...
[elogind.git] / src / load-fragment.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <linux/oom.h>
23 #include <assert.h>
24 #include <errno.h>
25 #include <string.h>
26 #include <unistd.h>
27 #include <fcntl.h>
28 #include <sched.h>
29 #include <sys/prctl.h>
30 #include <sys/mount.h>
31 #include <linux/fs.h>
32 #include <sys/stat.h>
33 #include <sys/time.h>
34 #include <sys/resource.h>
35
36 #include "unit.h"
37 #include "strv.h"
38 #include "conf-parser.h"
39 #include "load-fragment.h"
40 #include "log.h"
41 #include "ioprio.h"
42 #include "securebits.h"
43 #include "missing.h"
44 #include "unit-name.h"
45 #include "bus-errors.h"
46
47 #ifndef HAVE_SYSV_COMPAT
48 static int config_parse_warn_compat(
49                 const char *filename,
50                 unsigned line,
51                 const char *section,
52                 const char *lvalue,
53                 int ltype,
54                 const char *rvalue,
55                 void *data,
56                 void *userdata) {
57
58         log_debug("[%s:%u] Support for option %s= has been disabled at compile time and is ignored", filename, line, lvalue);
59         return 0;
60 }
61 #endif
62
63 static int config_parse_deps(
64                 const char *filename,
65                 unsigned line,
66                 const char *section,
67                 const char *lvalue,
68                 int ltype,
69                 const char *rvalue,
70                 void *data,
71                 void *userdata) {
72
73         UnitDependency d = PTR_TO_UINT(data);
74         Unit *u = userdata;
75         char *w;
76         size_t l;
77         char *state;
78
79         assert(filename);
80         assert(lvalue);
81         assert(rvalue);
82
83         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
84                 char *t, *k;
85                 int r;
86
87                 if (!(t = strndup(w, l)))
88                         return -ENOMEM;
89
90                 k = unit_name_printf(u, t);
91                 free(t);
92
93                 if (!k)
94                         return -ENOMEM;
95
96                 r = unit_add_dependency_by_name(u, d, k, NULL, true);
97
98                 if (r < 0) {
99                         log_error("Failed to add dependency on %s, ignoring: %s", k, strerror(-r));
100                         free(k);
101                         return 0;
102                 }
103
104                 free(k);
105         }
106
107         return 0;
108 }
109
110 static int config_parse_names(
111                 const char *filename,
112                 unsigned line,
113                 const char *section,
114                 const char *lvalue,
115                 int ltype,
116                 const char *rvalue,
117                 void *data,
118                 void *userdata) {
119
120         Unit *u = userdata;
121         char *w;
122         size_t l;
123         char *state;
124
125         assert(filename);
126         assert(lvalue);
127         assert(rvalue);
128         assert(data);
129
130         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
131                 char *t, *k;
132                 int r;
133
134                 if (!(t = strndup(w, l)))
135                         return -ENOMEM;
136
137                 k = unit_name_printf(u, t);
138                 free(t);
139
140                 if (!k)
141                         return -ENOMEM;
142
143                 r = unit_merge_by_name(u, k);
144
145                 if (r < 0) {
146                         log_error("Failed to add name %s, ignoring: %s", k, strerror(-r));
147                         free(k);
148                         return 0;
149                 }
150
151                 free(k);
152         }
153
154         return 0;
155 }
156
157 static int config_parse_string_printf(
158                 const char *filename,
159                 unsigned line,
160                 const char *section,
161                 const char *lvalue,
162                 int ltype,
163                 const char *rvalue,
164                 void *data,
165                 void *userdata) {
166
167         Unit *u = userdata;
168         char **s = data;
169         char *k;
170
171         assert(filename);
172         assert(lvalue);
173         assert(rvalue);
174         assert(s);
175         assert(u);
176
177         if (!(k = unit_full_printf(u, rvalue)))
178                 return -ENOMEM;
179
180         free(*s);
181         if (*k)
182                 *s = k;
183         else {
184                 free(k);
185                 *s = NULL;
186         }
187
188         return 0;
189 }
190
191 static int config_parse_listen(
192                 const char *filename,
193                 unsigned line,
194                 const char *section,
195                 const char *lvalue,
196                 int ltype,
197                 const char *rvalue,
198                 void *data,
199                 void *userdata) {
200
201         SocketPort *p;
202         Socket *s;
203
204         assert(filename);
205         assert(lvalue);
206         assert(rvalue);
207         assert(data);
208
209         s = (Socket*) data;
210
211         if (!(p = new0(SocketPort, 1)))
212                 return -ENOMEM;
213
214         if (streq(lvalue, "ListenFIFO")) {
215                 p->type = SOCKET_FIFO;
216
217                 if (!(p->path = strdup(rvalue))) {
218                         free(p);
219                         return -ENOMEM;
220                 }
221
222                 path_kill_slashes(p->path);
223         } else {
224                 p->type = SOCKET_SOCKET;
225
226                 if (socket_address_parse(&p->address, rvalue) < 0) {
227                         log_error("[%s:%u] Failed to parse address value, ignoring: %s", filename, line, rvalue);
228                         free(p);
229                         return 0;
230                 }
231
232                 if (streq(lvalue, "ListenStream"))
233                         p->address.type = SOCK_STREAM;
234                 else if (streq(lvalue, "ListenDatagram"))
235                         p->address.type = SOCK_DGRAM;
236                 else {
237                         assert(streq(lvalue, "ListenSequentialPacket"));
238                         p->address.type = SOCK_SEQPACKET;
239                 }
240
241                 if (socket_address_family(&p->address) != AF_LOCAL && p->address.type == SOCK_SEQPACKET) {
242                         log_error("[%s:%u] Address family not supported, ignoring: %s", filename, line, rvalue);
243                         free(p);
244                         return 0;
245                 }
246         }
247
248         p->fd = -1;
249         LIST_PREPEND(SocketPort, port, s->ports, p);
250
251         return 0;
252 }
253
254 static int config_parse_socket_bind(
255                 const char *filename,
256                 unsigned line,
257                 const char *section,
258                 const char *lvalue,
259                 int ltype,
260                 const char *rvalue,
261                 void *data,
262                 void *userdata) {
263
264         Socket *s;
265         SocketAddressBindIPv6Only b;
266
267         assert(filename);
268         assert(lvalue);
269         assert(rvalue);
270         assert(data);
271
272         s = (Socket*) data;
273
274         if ((b = socket_address_bind_ipv6_only_from_string(rvalue)) < 0) {
275                 int r;
276
277                 if ((r = parse_boolean(rvalue)) < 0) {
278                         log_error("[%s:%u] Failed to parse bind IPv6 only value, ignoring: %s", filename, line, rvalue);
279                         return 0;
280                 }
281
282                 s->bind_ipv6_only = r ? SOCKET_ADDRESS_IPV6_ONLY : SOCKET_ADDRESS_BOTH;
283         } else
284                 s->bind_ipv6_only = b;
285
286         return 0;
287 }
288
289 static int config_parse_nice(
290                 const char *filename,
291                 unsigned line,
292                 const char *section,
293                 const char *lvalue,
294                 int ltype,
295                 const char *rvalue,
296                 void *data,
297                 void *userdata) {
298
299         ExecContext *c = data;
300         int priority;
301
302         assert(filename);
303         assert(lvalue);
304         assert(rvalue);
305         assert(data);
306
307         if (safe_atoi(rvalue, &priority) < 0) {
308                 log_error("[%s:%u] Failed to parse nice priority, ignoring: %s. ", filename, line, rvalue);
309                 return 0;
310         }
311
312         if (priority < PRIO_MIN || priority >= PRIO_MAX) {
313                 log_error("[%s:%u] Nice priority out of range, ignoring: %s", filename, line, rvalue);
314                 return 0;
315         }
316
317         c->nice = priority;
318         c->nice_set = true;
319
320         return 0;
321 }
322
323 static int config_parse_oom_score_adjust(
324                 const char *filename,
325                 unsigned line,
326                 const char *section,
327                 const char *lvalue,
328                 int ltype,
329                 const char *rvalue,
330                 void *data,
331                 void *userdata) {
332
333         ExecContext *c = data;
334         int oa;
335
336         assert(filename);
337         assert(lvalue);
338         assert(rvalue);
339         assert(data);
340
341         if (safe_atoi(rvalue, &oa) < 0) {
342                 log_error("[%s:%u] Failed to parse the OOM score adjust value, ignoring: %s", filename, line, rvalue);
343                 return 0;
344         }
345
346         if (oa < OOM_SCORE_ADJ_MIN || oa > OOM_SCORE_ADJ_MAX) {
347                 log_error("[%s:%u] OOM score adjust value out of range, ignoring: %s", filename, line, rvalue);
348                 return 0;
349         }
350
351         c->oom_score_adjust = oa;
352         c->oom_score_adjust_set = true;
353
354         return 0;
355 }
356
357 static int config_parse_mode(
358                 const char *filename,
359                 unsigned line,
360                 const char *section,
361                 const char *lvalue,
362                 int ltype,
363                 const char *rvalue,
364                 void *data,
365                 void *userdata) {
366
367         mode_t *m = data;
368         long l;
369         char *x = NULL;
370
371         assert(filename);
372         assert(lvalue);
373         assert(rvalue);
374         assert(data);
375
376         errno = 0;
377         l = strtol(rvalue, &x, 8);
378         if (!x || *x || errno) {
379                 log_error("[%s:%u] Failed to parse mode value, ignoring: %s", filename, line, rvalue);
380                 return 0;
381         }
382
383         if (l < 0000 || l > 07777) {
384                 log_error("[%s:%u] mode value out of range, ignoring: %s", filename, line, rvalue);
385                 return 0;
386         }
387
388         *m = (mode_t) l;
389         return 0;
390 }
391
392 static int config_parse_exec(
393                 const char *filename,
394                 unsigned line,
395                 const char *section,
396                 const char *lvalue,
397                 int ltype,
398                 const char *rvalue,
399                 void *data,
400                 void *userdata) {
401
402         ExecCommand **e = data, *nce;
403         char *path, **n;
404         unsigned k;
405
406         assert(filename);
407         assert(lvalue);
408         assert(rvalue);
409         assert(e);
410
411         /* We accept an absolute path as first argument, or
412          * alternatively an absolute prefixed with @ to allow
413          * overriding of argv[0]. */
414
415         for (;;) {
416                 char *w;
417                 size_t l;
418                 char *state;
419                 bool honour_argv0 = false, ignore = false;
420
421                 path = NULL;
422                 nce = NULL;
423                 n = NULL;
424
425                 rvalue += strspn(rvalue, WHITESPACE);
426
427                 if (rvalue[0] == 0)
428                         break;
429
430                 if (rvalue[0] == '-') {
431                         ignore = true;
432                         rvalue ++;
433                 }
434
435                 if (rvalue[0] == '@') {
436                         honour_argv0 = true;
437                         rvalue ++;
438                 }
439
440                 if (*rvalue != '/') {
441                         log_error("[%s:%u] Invalid executable path in command line, ignoring: %s", filename, line, rvalue);
442                         return 0;
443                 }
444
445                 k = 0;
446                 FOREACH_WORD_QUOTED(w, l, rvalue, state) {
447                         if (strncmp(w, ";", MAX(l, 1U)) == 0)
448                                 break;
449
450                         k++;
451                 }
452
453                 if (!(n = new(char*, k + !honour_argv0)))
454                         return -ENOMEM;
455
456                 k = 0;
457                 FOREACH_WORD_QUOTED(w, l, rvalue, state) {
458                         if (strncmp(w, ";", MAX(l, 1U)) == 0)
459                                 break;
460
461                         if (honour_argv0 && w == rvalue) {
462                                 assert(!path);
463                                 if (!(path = cunescape_length(w, l)))
464                                         goto fail;
465                         } else {
466                                 if (!(n[k++] = cunescape_length(w, l)))
467                                         goto fail;
468                         }
469                 }
470
471                 n[k] = NULL;
472
473                 if (!n[0]) {
474                         log_error("[%s:%u] Invalid command line, ignoring: %s", filename, line, rvalue);
475                         strv_free(n);
476                         return 0;
477                 }
478
479                 if (!path)
480                         if (!(path = strdup(n[0])))
481                                 goto fail;
482
483                 assert(path_is_absolute(path));
484
485                 if (!(nce = new0(ExecCommand, 1)))
486                         goto fail;
487
488                 nce->argv = n;
489                 nce->path = path;
490                 nce->ignore = ignore;
491
492                 path_kill_slashes(nce->path);
493
494                 exec_command_append_list(e, nce);
495
496                 rvalue = state;
497         }
498
499         return 0;
500
501 fail:
502         n[k] = NULL;
503         strv_free(n);
504         free(path);
505         free(nce);
506
507         return -ENOMEM;
508 }
509
510 static int config_parse_usec(
511                 const char *filename,
512                 unsigned line,
513                 const char *section,
514                 const char *lvalue,
515                 int ltype,
516                 const char *rvalue,
517                 void *data,
518                 void *userdata) {
519
520         usec_t *usec = data;
521
522         assert(filename);
523         assert(lvalue);
524         assert(rvalue);
525         assert(data);
526
527         if (parse_usec(rvalue, usec) < 0) {
528                 log_error("[%s:%u] Failed to parse time value, ignoring: %s", filename, line, rvalue);
529                 return 0;
530         }
531
532         return 0;
533 }
534
535 static DEFINE_CONFIG_PARSE_ENUM(config_parse_service_type, service_type, ServiceType, "Failed to parse service type");
536 static DEFINE_CONFIG_PARSE_ENUM(config_parse_service_restart, service_restart, ServiceRestart, "Failed to parse service restart specifier");
537
538 static int config_parse_bindtodevice(
539                 const char *filename,
540                 unsigned line,
541                 const char *section,
542                 const char *lvalue,
543                 int ltype,
544                 const char *rvalue,
545                 void *data,
546                 void *userdata) {
547
548         Socket *s = data;
549         char *n;
550
551         assert(filename);
552         assert(lvalue);
553         assert(rvalue);
554         assert(data);
555
556         if (rvalue[0] && !streq(rvalue, "*")) {
557                 if (!(n = strdup(rvalue)))
558                         return -ENOMEM;
559         } else
560                 n = NULL;
561
562         free(s->bind_to_device);
563         s->bind_to_device = n;
564
565         return 0;
566 }
567
568 static DEFINE_CONFIG_PARSE_ENUM(config_parse_output, exec_output, ExecOutput, "Failed to parse output specifier");
569 static DEFINE_CONFIG_PARSE_ENUM(config_parse_input, exec_input, ExecInput, "Failed to parse input specifier");
570
571 static int config_parse_facility(
572                 const char *filename,
573                 unsigned line,
574                 const char *section,
575                 const char *lvalue,
576                 int ltype,
577                 const char *rvalue,
578                 void *data,
579                 void *userdata) {
580
581
582         int *o = data, x;
583
584         assert(filename);
585         assert(lvalue);
586         assert(rvalue);
587         assert(data);
588
589         if ((x = log_facility_unshifted_from_string(rvalue)) < 0) {
590                 log_error("[%s:%u] Failed to parse log facility, ignoring: %s", filename, line, rvalue);
591                 return 0;
592         }
593
594         *o = (x << 3) | LOG_PRI(*o);
595
596         return 0;
597 }
598
599 static int config_parse_level(
600                 const char *filename,
601                 unsigned line,
602                 const char *section,
603                 const char *lvalue,
604                 int ltype,
605                 const char *rvalue,
606                 void *data,
607                 void *userdata) {
608
609
610         int *o = data, x;
611
612         assert(filename);
613         assert(lvalue);
614         assert(rvalue);
615         assert(data);
616
617         if ((x = log_level_from_string(rvalue)) < 0) {
618                 log_error("[%s:%u] Failed to parse log level, ignoring: %s", filename, line, rvalue);
619                 return 0;
620         }
621
622         *o = (*o & LOG_FACMASK) | x;
623         return 0;
624 }
625
626 static int config_parse_io_class(
627                 const char *filename,
628                 unsigned line,
629                 const char *section,
630                 const char *lvalue,
631                 int ltype,
632                 const char *rvalue,
633                 void *data,
634                 void *userdata) {
635
636         ExecContext *c = data;
637         int x;
638
639         assert(filename);
640         assert(lvalue);
641         assert(rvalue);
642         assert(data);
643
644         if ((x = ioprio_class_from_string(rvalue)) < 0) {
645                 log_error("[%s:%u] Failed to parse IO scheduling class, ignoring: %s", filename, line, rvalue);
646                 return 0;
647         }
648
649         c->ioprio = IOPRIO_PRIO_VALUE(x, IOPRIO_PRIO_DATA(c->ioprio));
650         c->ioprio_set = true;
651
652         return 0;
653 }
654
655 static int config_parse_io_priority(
656                 const char *filename,
657                 unsigned line,
658                 const char *section,
659                 const char *lvalue,
660                 int ltype,
661                 const char *rvalue,
662                 void *data,
663                 void *userdata) {
664
665         ExecContext *c = data;
666         int i;
667
668         assert(filename);
669         assert(lvalue);
670         assert(rvalue);
671         assert(data);
672
673         if (safe_atoi(rvalue, &i) < 0 || i < 0 || i >= IOPRIO_BE_NR) {
674                 log_error("[%s:%u] Failed to parse io priority, ignoring: %s", filename, line, rvalue);
675                 return 0;
676         }
677
678         c->ioprio = IOPRIO_PRIO_VALUE(IOPRIO_PRIO_CLASS(c->ioprio), i);
679         c->ioprio_set = true;
680
681         return 0;
682 }
683
684 static int config_parse_cpu_sched_policy(
685                 const char *filename,
686                 unsigned line,
687                 const char *section,
688                 const char *lvalue,
689                 int ltype,
690                 const char *rvalue,
691                 void *data,
692                 void *userdata) {
693
694
695         ExecContext *c = data;
696         int x;
697
698         assert(filename);
699         assert(lvalue);
700         assert(rvalue);
701         assert(data);
702
703         if ((x = sched_policy_from_string(rvalue)) < 0) {
704                 log_error("[%s:%u] Failed to parse CPU scheduling policy, ignoring: %s", filename, line, rvalue);
705                 return 0;
706         }
707
708         c->cpu_sched_policy = x;
709         c->cpu_sched_set = true;
710
711         return 0;
712 }
713
714 static int config_parse_cpu_sched_prio(
715                 const char *filename,
716                 unsigned line,
717                 const char *section,
718                 const char *lvalue,
719                 int ltype,
720                 const char *rvalue,
721                 void *data,
722                 void *userdata) {
723
724         ExecContext *c = data;
725         int i;
726
727         assert(filename);
728         assert(lvalue);
729         assert(rvalue);
730         assert(data);
731
732         /* On Linux RR/FIFO have the same range */
733         if (safe_atoi(rvalue, &i) < 0 || i < sched_get_priority_min(SCHED_RR) || i > sched_get_priority_max(SCHED_RR)) {
734                 log_error("[%s:%u] Failed to parse CPU scheduling priority, ignoring: %s", filename, line, rvalue);
735                 return 0;
736         }
737
738         c->cpu_sched_priority = i;
739         c->cpu_sched_set = true;
740
741         return 0;
742 }
743
744 static int config_parse_cpu_affinity(
745                 const char *filename,
746                 unsigned line,
747                 const char *section,
748                 const char *lvalue,
749                 int ltype,
750                 const char *rvalue,
751                 void *data,
752                 void *userdata) {
753
754         ExecContext *c = data;
755         char *w;
756         size_t l;
757         char *state;
758
759         assert(filename);
760         assert(lvalue);
761         assert(rvalue);
762         assert(data);
763
764         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
765                 char *t;
766                 int r;
767                 unsigned cpu;
768
769                 if (!(t = strndup(w, l)))
770                         return -ENOMEM;
771
772                 r = safe_atou(t, &cpu);
773                 free(t);
774
775                 if (!(c->cpuset))
776                         if (!(c->cpuset = cpu_set_malloc(&c->cpuset_ncpus)))
777                                 return -ENOMEM;
778
779                 if (r < 0 || cpu >= c->cpuset_ncpus) {
780                         log_error("[%s:%u] Failed to parse CPU affinity, ignoring: %s", filename, line, rvalue);
781                         return 0;
782                 }
783
784                 CPU_SET_S(cpu, CPU_ALLOC_SIZE(c->cpuset_ncpus), c->cpuset);
785         }
786
787         return 0;
788 }
789
790 static int config_parse_capabilities(
791                 const char *filename,
792                 unsigned line,
793                 const char *section,
794                 const char *lvalue,
795                 int ltype,
796                 const char *rvalue,
797                 void *data,
798                 void *userdata) {
799
800         ExecContext *c = data;
801         cap_t cap;
802
803         assert(filename);
804         assert(lvalue);
805         assert(rvalue);
806         assert(data);
807
808         if (!(cap = cap_from_text(rvalue))) {
809                 if (errno == ENOMEM)
810                         return -ENOMEM;
811
812                 log_error("[%s:%u] Failed to parse capabilities, ignoring: %s", filename, line, rvalue);
813                 return 0;
814         }
815
816         if (c->capabilities)
817                 cap_free(c->capabilities);
818         c->capabilities = cap;
819
820         return 0;
821 }
822
823 static int config_parse_secure_bits(
824                 const char *filename,
825                 unsigned line,
826                 const char *section,
827                 const char *lvalue,
828                 int ltype,
829                 const char *rvalue,
830                 void *data,
831                 void *userdata) {
832
833         ExecContext *c = data;
834         char *w;
835         size_t l;
836         char *state;
837
838         assert(filename);
839         assert(lvalue);
840         assert(rvalue);
841         assert(data);
842
843         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
844                 if (first_word(w, "keep-caps"))
845                         c->secure_bits |= SECURE_KEEP_CAPS;
846                 else if (first_word(w, "keep-caps-locked"))
847                         c->secure_bits |= SECURE_KEEP_CAPS_LOCKED;
848                 else if (first_word(w, "no-setuid-fixup"))
849                         c->secure_bits |= SECURE_NO_SETUID_FIXUP;
850                 else if (first_word(w, "no-setuid-fixup-locked"))
851                         c->secure_bits |= SECURE_NO_SETUID_FIXUP_LOCKED;
852                 else if (first_word(w, "noroot"))
853                         c->secure_bits |= SECURE_NOROOT;
854                 else if (first_word(w, "noroot-locked"))
855                         c->secure_bits |= SECURE_NOROOT_LOCKED;
856                 else {
857                         log_error("[%s:%u] Failed to parse secure bits, ignoring: %s", filename, line, rvalue);
858                         return 0;
859                 }
860         }
861
862         return 0;
863 }
864
865 static int config_parse_bounding_set(
866                 const char *filename,
867                 unsigned line,
868                 const char *section,
869                 const char *lvalue,
870                 int ltype,
871                 const char *rvalue,
872                 void *data,
873                 void *userdata) {
874
875         ExecContext *c = data;
876         char *w;
877         size_t l;
878         char *state;
879         bool invert = false;
880         uint64_t sum = 0;
881
882         assert(filename);
883         assert(lvalue);
884         assert(rvalue);
885         assert(data);
886
887         if (rvalue[0] == '~') {
888                 invert = true;
889                 rvalue++;
890         }
891
892         /* Note that we store this inverted internally, since the
893          * kernel wants it like this. But we actually expose it
894          * non-inverted everywhere to have a fully normalized
895          * interface. */
896
897         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
898                 char *t;
899                 int r;
900                 cap_value_t cap;
901
902                 if (!(t = strndup(w, l)))
903                         return -ENOMEM;
904
905                 r = cap_from_name(t, &cap);
906                 free(t);
907
908                 if (r < 0) {
909                         log_error("[%s:%u] Failed to parse capability bounding set, ignoring: %s", filename, line, rvalue);
910                         return 0;
911                 }
912
913                 sum |= ((uint64_t) 1ULL) << (uint64_t) cap;
914         }
915
916         if (invert)
917                 c->capability_bounding_set_drop |= sum;
918         else
919                 c->capability_bounding_set_drop |= ~sum;
920
921         return 0;
922 }
923
924 static int config_parse_timer_slack_nsec(
925                 const char *filename,
926                 unsigned line,
927                 const char *section,
928                 const char *lvalue,
929                 int ltype,
930                 const char *rvalue,
931                 void *data,
932                 void *userdata) {
933
934         ExecContext *c = data;
935         unsigned long u;
936
937         assert(filename);
938         assert(lvalue);
939         assert(rvalue);
940         assert(data);
941
942         if (safe_atolu(rvalue, &u) < 0) {
943                 log_error("[%s:%u] Failed to parse time slack value, ignoring: %s", filename, line, rvalue);
944                 return 0;
945         }
946
947         c->timer_slack_nsec = u;
948
949         return 0;
950 }
951
952 static int config_parse_limit(
953                 const char *filename,
954                 unsigned line,
955                 const char *section,
956                 const char *lvalue,
957                 int ltype,
958                 const char *rvalue,
959                 void *data,
960                 void *userdata) {
961
962         struct rlimit **rl = data;
963         unsigned long long u;
964
965         assert(filename);
966         assert(lvalue);
967         assert(rvalue);
968         assert(data);
969
970         if (streq(rvalue, "infinity"))
971                 u = (unsigned long long) RLIM_INFINITY;
972         else if (safe_atollu(rvalue, &u) < 0) {
973                 log_error("[%s:%u] Failed to parse resource value, ignoring: %s", filename, line, rvalue);
974                 return 0;
975         }
976
977         if (!*rl)
978                 if (!(*rl = new(struct rlimit, 1)))
979                         return -ENOMEM;
980
981         (*rl)->rlim_cur = (*rl)->rlim_max = (rlim_t) u;
982         return 0;
983 }
984
985 static int config_parse_cgroup(
986                 const char *filename,
987                 unsigned line,
988                 const char *section,
989                 const char *lvalue,
990                 int ltype,
991                 const char *rvalue,
992                 void *data,
993                 void *userdata) {
994
995         Unit *u = userdata;
996         char *w;
997         size_t l;
998         char *state;
999
1000         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
1001                 char *t;
1002                 int r;
1003
1004                 if (!(t = cunescape_length(w, l)))
1005                         return -ENOMEM;
1006
1007                 r = unit_add_cgroup_from_text(u, t);
1008                 free(t);
1009
1010                 if (r < 0) {
1011                         log_error("[%s:%u] Failed to parse cgroup value, ignoring: %s", filename, line, rvalue);
1012                         return 0;
1013                 }
1014         }
1015
1016         return 0;
1017 }
1018
1019 #ifdef HAVE_SYSV_COMPAT
1020 static int config_parse_sysv_priority(
1021                 const char *filename,
1022                 unsigned line,
1023                 const char *section,
1024                 const char *lvalue,
1025                 int ltype,
1026                 const char *rvalue,
1027                 void *data,
1028                 void *userdata) {
1029
1030         int *priority = data;
1031         int i;
1032
1033         assert(filename);
1034         assert(lvalue);
1035         assert(rvalue);
1036         assert(data);
1037
1038         if (safe_atoi(rvalue, &i) < 0 || i < 0) {
1039                 log_error("[%s:%u] Failed to parse SysV start priority, ignoring: %s", filename, line, rvalue);
1040                 return 0;
1041         }
1042
1043         *priority = (int) i;
1044         return 0;
1045 }
1046 #endif
1047
1048 static int config_parse_fsck_passno(
1049                 const char *filename,
1050                 unsigned line,
1051                 const char *section,
1052                 const char *lvalue,
1053                 int ltype,
1054                 const char *rvalue,
1055                 void *data,
1056                 void *userdata) {
1057
1058         int *passno = data;
1059         int i;
1060
1061         assert(filename);
1062         assert(lvalue);
1063         assert(rvalue);
1064         assert(data);
1065
1066         if (safe_atoi(rvalue, &i) || i < 0) {
1067                 log_error("[%s:%u] Failed to parse fsck pass number, ignoring: %s", filename, line, rvalue);
1068                 return 0;
1069         }
1070
1071         *passno = (int) i;
1072         return 0;
1073 }
1074
1075 static DEFINE_CONFIG_PARSE_ENUM(config_parse_kill_mode, kill_mode, KillMode, "Failed to parse kill mode");
1076
1077 static int config_parse_kill_signal(
1078                 const char *filename,
1079                 unsigned line,
1080                 const char *section,
1081                 const char *lvalue,
1082                 int ltype,
1083                 const char *rvalue,
1084                 void *data,
1085                 void *userdata) {
1086
1087         int *sig = data;
1088         int r;
1089
1090         assert(filename);
1091         assert(lvalue);
1092         assert(rvalue);
1093         assert(sig);
1094
1095         if ((r = signal_from_string_try_harder(rvalue)) <= 0) {
1096                 log_error("[%s:%u] Failed to parse kill signal, ignoring: %s", filename, line, rvalue);
1097                 return 0;
1098         }
1099
1100         *sig = r;
1101         return 0;
1102 }
1103
1104 static int config_parse_mount_flags(
1105                 const char *filename,
1106                 unsigned line,
1107                 const char *section,
1108                 const char *lvalue,
1109                 int ltype,
1110                 const char *rvalue,
1111                 void *data,
1112                 void *userdata) {
1113
1114         ExecContext *c = data;
1115         char *w;
1116         size_t l;
1117         char *state;
1118         unsigned long flags = 0;
1119
1120         assert(filename);
1121         assert(lvalue);
1122         assert(rvalue);
1123         assert(data);
1124
1125         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
1126                 if (strncmp(w, "shared", MAX(l, 6U)) == 0)
1127                         flags |= MS_SHARED;
1128                 else if (strncmp(w, "slave", MAX(l, 5U)) == 0)
1129                         flags |= MS_SLAVE;
1130                 else if (strncmp(w, "private", MAX(l, 7U)) == 0)
1131                         flags |= MS_PRIVATE;
1132                 else {
1133                         log_error("[%s:%u] Failed to parse mount flags, ignoring: %s", filename, line, rvalue);
1134                         return 0;
1135                 }
1136         }
1137
1138         c->mount_flags = flags;
1139         return 0;
1140 }
1141
1142 static int config_parse_timer(
1143                 const char *filename,
1144                 unsigned line,
1145                 const char *section,
1146                 const char *lvalue,
1147                 int ltype,
1148                 const char *rvalue,
1149                 void *data,
1150                 void *userdata) {
1151
1152         Timer *t = data;
1153         usec_t u;
1154         TimerValue *v;
1155         TimerBase b;
1156
1157         assert(filename);
1158         assert(lvalue);
1159         assert(rvalue);
1160         assert(data);
1161
1162         if ((b = timer_base_from_string(lvalue)) < 0) {
1163                 log_error("[%s:%u] Failed to parse timer base, ignoring: %s", filename, line, lvalue);
1164                 return 0;
1165         }
1166
1167         if (parse_usec(rvalue, &u) < 0) {
1168                 log_error("[%s:%u] Failed to parse timer value, ignoring: %s", filename, line, rvalue);
1169                 return 0;
1170         }
1171
1172         if (!(v = new0(TimerValue, 1)))
1173                 return -ENOMEM;
1174
1175         v->base = b;
1176         v->value = u;
1177
1178         LIST_PREPEND(TimerValue, value, t->values, v);
1179
1180         return 0;
1181 }
1182
1183 static int config_parse_timer_unit(
1184                 const char *filename,
1185                 unsigned line,
1186                 const char *section,
1187                 const char *lvalue,
1188                 int ltype,
1189                 const char *rvalue,
1190                 void *data,
1191                 void *userdata) {
1192
1193         Timer *t = data;
1194         int r;
1195         DBusError error;
1196
1197         assert(filename);
1198         assert(lvalue);
1199         assert(rvalue);
1200         assert(data);
1201
1202         dbus_error_init(&error);
1203
1204         if (endswith(rvalue, ".timer")) {
1205                 log_error("[%s:%u] Unit cannot be of type timer, ignoring: %s", filename, line, rvalue);
1206                 return 0;
1207         }
1208
1209         if ((r = manager_load_unit(t->meta.manager, rvalue, NULL, NULL, &t->unit)) < 0) {
1210                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1211                 dbus_error_free(&error);
1212                 return 0;
1213         }
1214
1215         return 0;
1216 }
1217
1218 static int config_parse_path_spec(
1219                 const char *filename,
1220                 unsigned line,
1221                 const char *section,
1222                 const char *lvalue,
1223                 int ltype,
1224                 const char *rvalue,
1225                 void *data,
1226                 void *userdata) {
1227
1228         Path *p = data;
1229         PathSpec *s;
1230         PathType b;
1231
1232         assert(filename);
1233         assert(lvalue);
1234         assert(rvalue);
1235         assert(data);
1236
1237         if ((b = path_type_from_string(lvalue)) < 0) {
1238                 log_error("[%s:%u] Failed to parse path type, ignoring: %s", filename, line, lvalue);
1239                 return 0;
1240         }
1241
1242         if (!path_is_absolute(rvalue)) {
1243                 log_error("[%s:%u] Path is not absolute, ignoring: %s", filename, line, rvalue);
1244                 return 0;
1245         }
1246
1247         if (!(s = new0(PathSpec, 1)))
1248                 return -ENOMEM;
1249
1250         if (!(s->path = strdup(rvalue))) {
1251                 free(s);
1252                 return -ENOMEM;
1253         }
1254
1255         path_kill_slashes(s->path);
1256
1257         s->type = b;
1258         s->inotify_fd = -1;
1259
1260         LIST_PREPEND(PathSpec, spec, p->specs, s);
1261
1262         return 0;
1263 }
1264
1265 static int config_parse_path_unit(
1266                 const char *filename,
1267                 unsigned line,
1268                 const char *section,
1269                 const char *lvalue,
1270                 int ltype,
1271                 const char *rvalue,
1272                 void *data,
1273                 void *userdata) {
1274
1275         Path *t = data;
1276         int r;
1277         DBusError error;
1278
1279         assert(filename);
1280         assert(lvalue);
1281         assert(rvalue);
1282         assert(data);
1283
1284         dbus_error_init(&error);
1285
1286         if (endswith(rvalue, ".path")) {
1287                 log_error("[%s:%u] Unit cannot be of type path, ignoring: %s", filename, line, rvalue);
1288                 return 0;
1289         }
1290
1291         if ((r = manager_load_unit(t->meta.manager, rvalue, NULL, &error, &t->unit)) < 0) {
1292                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1293                 dbus_error_free(&error);
1294                 return 0;
1295         }
1296
1297         return 0;
1298 }
1299
1300 static int config_parse_socket_service(
1301                 const char *filename,
1302                 unsigned line,
1303                 const char *section,
1304                 const char *lvalue,
1305                 int ltype,
1306                 const char *rvalue,
1307                 void *data,
1308                 void *userdata) {
1309
1310         Socket *s = data;
1311         int r;
1312         DBusError error;
1313
1314         assert(filename);
1315         assert(lvalue);
1316         assert(rvalue);
1317         assert(data);
1318
1319         dbus_error_init(&error);
1320
1321         if (!endswith(rvalue, ".service")) {
1322                 log_error("[%s:%u] Unit must be of type service, ignoring: %s", filename, line, rvalue);
1323                 return 0;
1324         }
1325
1326         if ((r = manager_load_unit(s->meta.manager, rvalue, NULL, &error, (Unit**) &s->service)) < 0) {
1327                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1328                 dbus_error_free(&error);
1329                 return 0;
1330         }
1331
1332         return 0;
1333 }
1334
1335 static int config_parse_service_sockets(
1336                 const char *filename,
1337                 unsigned line,
1338                 const char *section,
1339                 const char *lvalue,
1340                 int ltype,
1341                 const char *rvalue,
1342                 void *data,
1343                 void *userdata) {
1344
1345         Service *s = data;
1346         int r;
1347         DBusError error;
1348         char *state, *w;
1349         size_t l;
1350
1351         assert(filename);
1352         assert(lvalue);
1353         assert(rvalue);
1354         assert(data);
1355
1356         dbus_error_init(&error);
1357
1358         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
1359                 char *t;
1360                 Unit *sock;
1361
1362                 if (!(t = strndup(w, l)))
1363                         return -ENOMEM;
1364
1365                 if (!endswith(t, ".socket")) {
1366                         log_error("[%s:%u] Unit must be of type socket, ignoring: %s", filename, line, rvalue);
1367                         free(t);
1368                         continue;
1369                 }
1370
1371                 r = manager_load_unit(s->meta.manager, t, NULL, &error, &sock);
1372                 free(t);
1373
1374                 if (r < 0) {
1375                         log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1376                         dbus_error_free(&error);
1377                         continue;
1378                 }
1379
1380                 if ((r = set_ensure_allocated(&s->configured_sockets, trivial_hash_func, trivial_compare_func)) < 0)
1381                         return r;
1382
1383                 if ((r = set_put(s->configured_sockets, sock)) < 0)
1384                         return r;
1385         }
1386
1387         return 0;
1388 }
1389
1390 static int config_parse_env_file(
1391                 const char *filename,
1392                 unsigned line,
1393                 const char *section,
1394                 const char *lvalue,
1395                 int ltype,
1396                 const char *rvalue,
1397                 void *data,
1398                 void *userdata) {
1399
1400         char ***env = data, **k;
1401
1402         assert(filename);
1403         assert(lvalue);
1404         assert(rvalue);
1405         assert(data);
1406
1407         if (!path_is_absolute(rvalue[0] == '-' ? rvalue + 1 : rvalue)) {
1408                 log_error("[%s:%u] Path '%s' is not absolute, ignoring.", filename, line, rvalue);
1409                 return 0;
1410         }
1411
1412         if (!(k = strv_append(*env, rvalue)))
1413                 return -ENOMEM;
1414
1415         strv_free(*env);
1416         *env = k;
1417
1418         return 0;
1419 }
1420
1421 static int config_parse_ip_tos(
1422                 const char *filename,
1423                 unsigned line,
1424                 const char *section,
1425                 const char *lvalue,
1426                 int ltype,
1427                 const char *rvalue,
1428                 void *data,
1429                 void *userdata) {
1430
1431         int *ip_tos = data, x;
1432
1433         assert(filename);
1434         assert(lvalue);
1435         assert(rvalue);
1436         assert(data);
1437
1438         if ((x = ip_tos_from_string(rvalue)) < 0)
1439                 if (safe_atoi(rvalue, &x) < 0) {
1440                         log_error("[%s:%u] Failed to parse IP TOS value, ignoring: %s", filename, line, rvalue);
1441                         return 0;
1442                 }
1443
1444         *ip_tos = x;
1445         return 0;
1446 }
1447
1448 static int config_parse_condition_path(
1449                 const char *filename,
1450                 unsigned line,
1451                 const char *section,
1452                 const char *lvalue,
1453                 int ltype,
1454                 const char *rvalue,
1455                 void *data,
1456                 void *userdata) {
1457
1458         ConditionType cond = ltype;
1459         Unit *u = data;
1460         bool trigger, negate;
1461         Condition *c;
1462
1463         assert(filename);
1464         assert(lvalue);
1465         assert(rvalue);
1466         assert(data);
1467
1468         if ((trigger = rvalue[0] == '|'))
1469                 rvalue++;
1470
1471         if ((negate = rvalue[0] == '!'))
1472                 rvalue++;
1473
1474         if (!path_is_absolute(rvalue)) {
1475                 log_error("[%s:%u] Path in condition not absolute, ignoring: %s", filename, line, rvalue);
1476                 return 0;
1477         }
1478
1479         if (!(c = condition_new(cond, rvalue, trigger, negate)))
1480                 return -ENOMEM;
1481
1482         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1483         return 0;
1484 }
1485
1486 static int config_parse_condition_string(
1487                 const char *filename,
1488                 unsigned line,
1489                 const char *section,
1490                 const char *lvalue,
1491                 int ltype,
1492                 const char *rvalue,
1493                 void *data,
1494                 void *userdata) {
1495
1496         ConditionType cond = ltype;
1497         Unit *u = data;
1498         bool trigger, negate;
1499         Condition *c;
1500
1501         assert(filename);
1502         assert(lvalue);
1503         assert(rvalue);
1504         assert(data);
1505
1506         if ((trigger = rvalue[0] == '|'))
1507                 rvalue++;
1508
1509         if ((negate = rvalue[0] == '!'))
1510                 rvalue++;
1511
1512         if (!(c = condition_new(cond, rvalue, trigger, negate)))
1513                 return -ENOMEM;
1514
1515         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1516         return 0;
1517 }
1518
1519 static int config_parse_condition_null(
1520                 const char *filename,
1521                 unsigned line,
1522                 const char *section,
1523                 const char *lvalue,
1524                 int ltype,
1525                 const char *rvalue,
1526                 void *data,
1527                 void *userdata) {
1528
1529         Unit *u = data;
1530         Condition *c;
1531         bool trigger, negate;
1532         int b;
1533
1534         assert(filename);
1535         assert(lvalue);
1536         assert(rvalue);
1537         assert(data);
1538
1539         if ((trigger = rvalue[0] == '|'))
1540                 rvalue++;
1541
1542         if ((negate = rvalue[0] == '!'))
1543                 rvalue++;
1544
1545         if ((b = parse_boolean(rvalue)) < 0) {
1546                 log_error("[%s:%u] Failed to parse boolean value in condition, ignoring: %s", filename, line, rvalue);
1547                 return 0;
1548         }
1549
1550         if (!b)
1551                 negate = !negate;
1552
1553         if (!(c = condition_new(CONDITION_NULL, NULL, trigger, negate)))
1554                 return -ENOMEM;
1555
1556         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1557         return 0;
1558 }
1559
1560 static DEFINE_CONFIG_PARSE_ENUM(config_parse_notify_access, notify_access, NotifyAccess, "Failed to parse notify access specifier");
1561
1562 #define FOLLOW_MAX 8
1563
1564 static int open_follow(char **filename, FILE **_f, Set *names, char **_final) {
1565         unsigned c = 0;
1566         int fd, r;
1567         FILE *f;
1568         char *id = NULL;
1569
1570         assert(filename);
1571         assert(*filename);
1572         assert(_f);
1573         assert(names);
1574
1575         /* This will update the filename pointer if the loaded file is
1576          * reached by a symlink. The old string will be freed. */
1577
1578         for (;;) {
1579                 char *target, *name;
1580
1581                 if (c++ >= FOLLOW_MAX)
1582                         return -ELOOP;
1583
1584                 path_kill_slashes(*filename);
1585
1586                 /* Add the file name we are currently looking at to
1587                  * the names of this unit, but only if it is a valid
1588                  * unit name. */
1589                 name = file_name_from_path(*filename);
1590
1591                 if (unit_name_is_valid(name, false)) {
1592                         if (!(id = set_get(names, name))) {
1593
1594                                 if (!(id = strdup(name)))
1595                                         return -ENOMEM;
1596
1597                                 if ((r = set_put(names, id)) < 0) {
1598                                         free(id);
1599                                         return r;
1600                                 }
1601                         }
1602                 }
1603
1604                 /* Try to open the file name, but don't if its a symlink */
1605                 if ((fd = open(*filename, O_RDONLY|O_CLOEXEC|O_NOCTTY|O_NOFOLLOW)) >= 0)
1606                         break;
1607
1608                 if (errno != ELOOP)
1609                         return -errno;
1610
1611                 /* Hmm, so this is a symlink. Let's read the name, and follow it manually */
1612                 if ((r = readlink_and_make_absolute(*filename, &target)) < 0)
1613                         return r;
1614
1615                 free(*filename);
1616                 *filename = target;
1617         }
1618
1619         if (!(f = fdopen(fd, "re"))) {
1620                 r = -errno;
1621                 close_nointr_nofail(fd);
1622                 return r;
1623         }
1624
1625         *_f = f;
1626         *_final = id;
1627         return 0;
1628 }
1629
1630 static int merge_by_names(Unit **u, Set *names, const char *id) {
1631         char *k;
1632         int r;
1633
1634         assert(u);
1635         assert(*u);
1636         assert(names);
1637
1638         /* Let's try to add in all symlink names we found */
1639         while ((k = set_steal_first(names))) {
1640
1641                 /* First try to merge in the other name into our
1642                  * unit */
1643                 if ((r = unit_merge_by_name(*u, k)) < 0) {
1644                         Unit *other;
1645
1646                         /* Hmm, we couldn't merge the other unit into
1647                          * ours? Then let's try it the other way
1648                          * round */
1649
1650                         other = manager_get_unit((*u)->meta.manager, k);
1651                         free(k);
1652
1653                         if (other)
1654                                 if ((r = unit_merge(other, *u)) >= 0) {
1655                                         *u = other;
1656                                         return merge_by_names(u, names, NULL);
1657                                 }
1658
1659                         return r;
1660                 }
1661
1662                 if (id == k)
1663                         unit_choose_id(*u, id);
1664
1665                 free(k);
1666         }
1667
1668         return 0;
1669 }
1670
1671 static void dump_items(FILE *f, const ConfigItem *items) {
1672         const ConfigItem *i;
1673         const char *prev_section = NULL;
1674         bool not_first = false;
1675
1676         struct {
1677                 ConfigParserCallback callback;
1678                 const char *rvalue;
1679         } table[] = {
1680                 { config_parse_int,              "INTEGER" },
1681                 { config_parse_unsigned,         "UNSIGNED" },
1682                 { config_parse_size,             "SIZE" },
1683                 { config_parse_bool,             "BOOLEAN" },
1684                 { config_parse_string,           "STRING" },
1685                 { config_parse_path,             "PATH" },
1686                 { config_parse_strv,             "STRING [...]" },
1687                 { config_parse_nice,             "NICE" },
1688                 { config_parse_oom_score_adjust, "OOMSCOREADJUST" },
1689                 { config_parse_io_class,         "IOCLASS" },
1690                 { config_parse_io_priority,      "IOPRIORITY" },
1691                 { config_parse_cpu_sched_policy, "CPUSCHEDPOLICY" },
1692                 { config_parse_cpu_sched_prio,   "CPUSCHEDPRIO" },
1693                 { config_parse_cpu_affinity,     "CPUAFFINITY" },
1694                 { config_parse_mode,             "MODE" },
1695                 { config_parse_env_file,         "FILE" },
1696                 { config_parse_output,           "OUTPUT" },
1697                 { config_parse_input,            "INPUT" },
1698                 { config_parse_facility,         "FACILITY" },
1699                 { config_parse_level,            "LEVEL" },
1700                 { config_parse_capabilities,     "CAPABILITIES" },
1701                 { config_parse_secure_bits,      "SECUREBITS" },
1702                 { config_parse_bounding_set,     "BOUNDINGSET" },
1703                 { config_parse_timer_slack_nsec, "TIMERSLACK" },
1704                 { config_parse_limit,            "LIMIT" },
1705                 { config_parse_cgroup,           "CGROUP [...]" },
1706                 { config_parse_deps,             "UNIT [...]" },
1707                 { config_parse_names,            "UNIT [...]" },
1708                 { config_parse_exec,             "PATH [ARGUMENT [...]]" },
1709                 { config_parse_service_type,     "SERVICETYPE" },
1710                 { config_parse_service_restart,  "SERVICERESTART" },
1711 #ifdef HAVE_SYSV_COMPAT
1712                 { config_parse_sysv_priority,    "SYSVPRIORITY" },
1713 #else
1714                 { config_parse_warn_compat,      "NOTSUPPORTED" },
1715 #endif
1716                 { config_parse_kill_mode,        "KILLMODE" },
1717                 { config_parse_kill_signal,      "SIGNAL" },
1718                 { config_parse_listen,           "SOCKET [...]" },
1719                 { config_parse_socket_bind,      "SOCKETBIND" },
1720                 { config_parse_bindtodevice,     "NETWORKINTERFACE" },
1721                 { config_parse_usec,             "SECONDS" },
1722                 { config_parse_path_strv,        "PATH [...]" },
1723                 { config_parse_mount_flags,      "MOUNTFLAG [...]" },
1724                 { config_parse_string_printf,    "STRING" },
1725                 { config_parse_timer,            "TIMER" },
1726                 { config_parse_timer_unit,       "NAME" },
1727                 { config_parse_path_spec,        "PATH" },
1728                 { config_parse_path_unit,        "UNIT" },
1729                 { config_parse_notify_access,    "ACCESS" },
1730                 { config_parse_ip_tos,           "TOS" },
1731                 { config_parse_condition_path,   "CONDITION" },
1732                 { config_parse_condition_string, "CONDITION" },
1733                 { config_parse_condition_null,   "CONDITION" },
1734         };
1735
1736         assert(f);
1737         assert(items);
1738
1739         for (i = items; i->lvalue; i++) {
1740                 unsigned j;
1741                 const char *rvalue = "OTHER";
1742
1743                 if (!streq_ptr(i->section, prev_section)) {
1744                         if (!not_first)
1745                                 not_first = true;
1746                         else
1747                                 fputc('\n', f);
1748
1749                         fprintf(f, "[%s]\n", i->section);
1750                         prev_section = i->section;
1751                 }
1752
1753                 for (j = 0; j < ELEMENTSOF(table); j++)
1754                         if (i->parse == table[j].callback) {
1755                                 rvalue = table[j].rvalue;
1756                                 break;
1757                         }
1758
1759                 fprintf(f, "%s=%s\n", i->lvalue, rvalue);
1760         }
1761 }
1762
1763 static int load_from_path(Unit *u, const char *path) {
1764
1765         static const char* const section_table[_UNIT_TYPE_MAX] = {
1766                 [UNIT_SERVICE]   = "Service",
1767                 [UNIT_TIMER]     = "Timer",
1768                 [UNIT_SOCKET]    = "Socket",
1769                 [UNIT_TARGET]    = "Target",
1770                 [UNIT_DEVICE]    = "Device",
1771                 [UNIT_MOUNT]     = "Mount",
1772                 [UNIT_AUTOMOUNT] = "Automount",
1773                 [UNIT_SNAPSHOT]  = "Snapshot",
1774                 [UNIT_SWAP]      = "Swap",
1775                 [UNIT_PATH]      = "Path"
1776         };
1777
1778 #define EXEC_CONTEXT_CONFIG_ITEMS(context, section) \
1779                 { "WorkingDirectory",       config_parse_path,            0, &(context).working_directory,                    section   }, \
1780                 { "RootDirectory",          config_parse_path,            0, &(context).root_directory,                       section   }, \
1781                 { "User",                   config_parse_string_printf,   0, &(context).user,                                 section   }, \
1782                 { "Group",                  config_parse_string_printf,   0, &(context).group,                                section   }, \
1783                 { "SupplementaryGroups",    config_parse_strv,            0, &(context).supplementary_groups,                 section   }, \
1784                 { "Nice",                   config_parse_nice,            0, &(context),                                      section   }, \
1785                 { "OOMScoreAdjust",         config_parse_oom_score_adjust,0, &(context),                                      section   }, \
1786                 { "IOSchedulingClass",      config_parse_io_class,        0, &(context),                                      section   }, \
1787                 { "IOSchedulingPriority",   config_parse_io_priority,     0, &(context),                                      section   }, \
1788                 { "CPUSchedulingPolicy",    config_parse_cpu_sched_policy,0, &(context),                                      section   }, \
1789                 { "CPUSchedulingPriority",  config_parse_cpu_sched_prio,  0, &(context),                                      section   }, \
1790                 { "CPUSchedulingResetOnFork", config_parse_bool,          0, &(context).cpu_sched_reset_on_fork,              section   }, \
1791                 { "CPUAffinity",            config_parse_cpu_affinity,    0, &(context),                                      section   }, \
1792                 { "UMask",                  config_parse_mode,            0, &(context).umask,                                section   }, \
1793                 { "Environment",            config_parse_strv,            0, &(context).environment,                          section   }, \
1794                 { "EnvironmentFile",        config_parse_env_file,        0, &(context).environment_files,                    section   }, \
1795                 { "StandardInput",          config_parse_input,           0, &(context).std_input,                            section   }, \
1796                 { "StandardOutput",         config_parse_output,          0, &(context).std_output,                           section   }, \
1797                 { "StandardError",          config_parse_output,          0, &(context).std_error,                            section   }, \
1798                 { "TTYPath",                config_parse_path,            0, &(context).tty_path,                             section   }, \
1799                 { "SyslogIdentifier",       config_parse_string_printf,   0, &(context).syslog_identifier,                    section   }, \
1800                 { "SyslogFacility",         config_parse_facility,        0, &(context).syslog_priority,                      section   }, \
1801                 { "SyslogLevel",            config_parse_level,           0, &(context).syslog_priority,                      section   }, \
1802                 { "SyslogLevelPrefix",      config_parse_bool,            0, &(context).syslog_level_prefix,                  section   }, \
1803                 { "Capabilities",           config_parse_capabilities,    0, &(context),                                      section   }, \
1804                 { "SecureBits",             config_parse_secure_bits,     0, &(context),                                      section   }, \
1805                 { "CapabilityBoundingSet",  config_parse_bounding_set,    0, &(context),                                      section   }, \
1806                 { "TimerSlackNSec",         config_parse_timer_slack_nsec,0, &(context),                                      section   }, \
1807                 { "LimitCPU",               config_parse_limit,           0, &(context).rlimit[RLIMIT_CPU],                   section   }, \
1808                 { "LimitFSIZE",             config_parse_limit,           0, &(context).rlimit[RLIMIT_FSIZE],                 section   }, \
1809                 { "LimitDATA",              config_parse_limit,           0, &(context).rlimit[RLIMIT_DATA],                  section   }, \
1810                 { "LimitSTACK",             config_parse_limit,           0, &(context).rlimit[RLIMIT_STACK],                 section   }, \
1811                 { "LimitCORE",              config_parse_limit,           0, &(context).rlimit[RLIMIT_CORE],                  section   }, \
1812                 { "LimitRSS",               config_parse_limit,           0, &(context).rlimit[RLIMIT_RSS],                   section   }, \
1813                 { "LimitNOFILE",            config_parse_limit,           0, &(context).rlimit[RLIMIT_NOFILE],                section   }, \
1814                 { "LimitAS",                config_parse_limit,           0, &(context).rlimit[RLIMIT_AS],                    section   }, \
1815                 { "LimitNPROC",             config_parse_limit,           0, &(context).rlimit[RLIMIT_NPROC],                 section   }, \
1816                 { "LimitMEMLOCK",           config_parse_limit,           0, &(context).rlimit[RLIMIT_MEMLOCK],               section   }, \
1817                 { "LimitLOCKS",             config_parse_limit,           0, &(context).rlimit[RLIMIT_LOCKS],                 section   }, \
1818                 { "LimitSIGPENDING",        config_parse_limit,           0, &(context).rlimit[RLIMIT_SIGPENDING],            section   }, \
1819                 { "LimitMSGQUEUE",          config_parse_limit,           0, &(context).rlimit[RLIMIT_MSGQUEUE],              section   }, \
1820                 { "LimitNICE",              config_parse_limit,           0, &(context).rlimit[RLIMIT_NICE],                  section   }, \
1821                 { "LimitRTPRIO",            config_parse_limit,           0, &(context).rlimit[RLIMIT_RTPRIO],                section   }, \
1822                 { "LimitRTTIME",            config_parse_limit,           0, &(context).rlimit[RLIMIT_RTTIME],                section   }, \
1823                 { "ControlGroup",           config_parse_cgroup,          0, u,                                               section   }, \
1824                 { "ReadWriteDirectories",   config_parse_path_strv,       0, &(context).read_write_dirs,                      section   }, \
1825                 { "ReadOnlyDirectories",    config_parse_path_strv,       0, &(context).read_only_dirs,                       section   }, \
1826                 { "InaccessibleDirectories",config_parse_path_strv,       0, &(context).inaccessible_dirs,                    section   }, \
1827                 { "PrivateTmp",             config_parse_bool,            0, &(context).private_tmp,                          section   }, \
1828                 { "MountFlags",             config_parse_mount_flags,     0, &(context),                                      section   }, \
1829                 { "TCPWrapName",            config_parse_string_printf,   0, &(context).tcpwrap_name,                         section   }, \
1830                 { "PAMName",                config_parse_string_printf,   0, &(context).pam_name,                             section   }, \
1831                 { "KillMode",               config_parse_kill_mode,       0, &(context).kill_mode,                            section   }, \
1832                 { "KillSignal",             config_parse_kill_signal,     0, &(context).kill_signal,                          section   }, \
1833                 { "SendSIGKILL",            config_parse_bool,            0, &(context).send_sigkill,                         section   }, \
1834                 { "UtmpIdentifier",         config_parse_string_printf,   0, &(context).utmp_id,                              section   }
1835
1836         const ConfigItem items[] = {
1837                 { "Names",                  config_parse_names,           0, u,                                               "Unit"    },
1838                 { "Description",            config_parse_string_printf,   0, &u->meta.description,                            "Unit"    },
1839                 { "Requires",               config_parse_deps,            0, UINT_TO_PTR(UNIT_REQUIRES),                      "Unit"    },
1840                 { "RequiresOverridable",    config_parse_deps,            0, UINT_TO_PTR(UNIT_REQUIRES_OVERRIDABLE),          "Unit"    },
1841                 { "Requisite",              config_parse_deps,            0, UINT_TO_PTR(UNIT_REQUISITE),                     "Unit"    },
1842                 { "RequisiteOverridable",   config_parse_deps,            0, UINT_TO_PTR(UNIT_REQUISITE_OVERRIDABLE),         "Unit"    },
1843                 { "Wants",                  config_parse_deps,            0, UINT_TO_PTR(UNIT_WANTS),                         "Unit"    },
1844                 { "BindTo",                 config_parse_deps,            0, UINT_TO_PTR(UNIT_BIND_TO),                       "Unit"    },
1845                 { "Conflicts",              config_parse_deps,            0, UINT_TO_PTR(UNIT_CONFLICTS),                     "Unit"    },
1846                 { "Before",                 config_parse_deps,            0, UINT_TO_PTR(UNIT_BEFORE),                        "Unit"    },
1847                 { "After",                  config_parse_deps,            0, UINT_TO_PTR(UNIT_AFTER),                         "Unit"    },
1848                 { "OnFailure",              config_parse_deps,            0, UINT_TO_PTR(UNIT_ON_FAILURE),                    "Unit"    },
1849                 { "StopWhenUnneeded",       config_parse_bool,            0, &u->meta.stop_when_unneeded,                     "Unit"    },
1850                 { "RefuseManualStart",      config_parse_bool,            0, &u->meta.refuse_manual_start,                    "Unit"    },
1851                 { "RefuseManualStop",       config_parse_bool,            0, &u->meta.refuse_manual_stop,                     "Unit"    },
1852                 { "AllowIsolate",           config_parse_bool,            0, &u->meta.allow_isolate,                          "Unit"    },
1853                 { "DefaultDependencies",    config_parse_bool,            0, &u->meta.default_dependencies,                   "Unit"    },
1854                 { "OnFailureIsolate",       config_parse_bool,            0, &u->meta.on_failure_isolate,                     "Unit"    },
1855                 { "JobTimeoutSec",          config_parse_usec,            0, &u->meta.job_timeout,                            "Unit"    },
1856                 { "ConditionPathExists",        config_parse_condition_path, CONDITION_PATH_EXISTS, u,                        "Unit"    },
1857                 { "ConditionPathIsDirectory",   config_parse_condition_path, CONDITION_PATH_IS_DIRECTORY, u,                  "Unit"    },
1858                 { "ConditionDirectoryNotEmpty", config_parse_condition_path, CONDITION_DIRECTORY_NOT_EMPTY, u,                "Unit"    },
1859                 { "ConditionKernelCommandLine", config_parse_condition_string, CONDITION_KERNEL_COMMAND_LINE, u,              "Unit"    },
1860                 { "ConditionVirtualization",    config_parse_condition_string, CONDITION_VIRTUALIZATION, u,                   "Unit"    },
1861                 { "ConditionSecurity",          config_parse_condition_string, CONDITION_SECURITY, u,                         "Unit"    },
1862                 { "ConditionNull",          config_parse_condition_null,  0, u,                                               "Unit"    },
1863
1864                 { "PIDFile",                config_parse_path,            0, &u->service.pid_file,                            "Service" },
1865                 { "ExecStartPre",           config_parse_exec,            0, u->service.exec_command+SERVICE_EXEC_START_PRE,  "Service" },
1866                 { "ExecStart",              config_parse_exec,            0, u->service.exec_command+SERVICE_EXEC_START,      "Service" },
1867                 { "ExecStartPost",          config_parse_exec,            0, u->service.exec_command+SERVICE_EXEC_START_POST, "Service" },
1868                 { "ExecReload",             config_parse_exec,            0, u->service.exec_command+SERVICE_EXEC_RELOAD,     "Service" },
1869                 { "ExecStop",               config_parse_exec,            0, u->service.exec_command+SERVICE_EXEC_STOP,       "Service" },
1870                 { "ExecStopPost",           config_parse_exec,            0, u->service.exec_command+SERVICE_EXEC_STOP_POST,  "Service" },
1871                 { "RestartSec",             config_parse_usec,            0, &u->service.restart_usec,                        "Service" },
1872                 { "TimeoutSec",             config_parse_usec,            0, &u->service.timeout_usec,                        "Service" },
1873                 { "Type",                   config_parse_service_type,    0, &u->service.type,                                "Service" },
1874                 { "Restart",                config_parse_service_restart, 0, &u->service.restart,                             "Service" },
1875                 { "PermissionsStartOnly",   config_parse_bool,            0, &u->service.permissions_start_only,              "Service" },
1876                 { "RootDirectoryStartOnly", config_parse_bool,            0, &u->service.root_directory_start_only,           "Service" },
1877                 { "RemainAfterExit",        config_parse_bool,            0, &u->service.remain_after_exit,                   "Service" },
1878                 { "GuessMainPID",           config_parse_bool,            0, &u->service.guess_main_pid,                      "Service" },
1879 #ifdef HAVE_SYSV_COMPAT
1880                 { "SysVStartPriority",      config_parse_sysv_priority,   0, &u->service.sysv_start_priority,                 "Service" },
1881 #else
1882                 { "SysVStartPriority",      config_parse_warn_compat,     0, NULL,                                            "Service" },
1883 #endif
1884                 { "NonBlocking",            config_parse_bool,            0, &u->service.exec_context.non_blocking,           "Service" },
1885                 { "BusName",                config_parse_string_printf,   0, &u->service.bus_name,                            "Service" },
1886                 { "NotifyAccess",           config_parse_notify_access,   0, &u->service.notify_access,                       "Service" },
1887                 { "Sockets",                config_parse_service_sockets, 0, &u->service,                                     "Service" },
1888                 { "FsckPassNo",             config_parse_fsck_passno,     0, &u->service.fsck_passno,                         "Service" },
1889                 EXEC_CONTEXT_CONFIG_ITEMS(u->service.exec_context, "Service"),
1890
1891                 { "ListenStream",           config_parse_listen,          0, &u->socket,                                      "Socket"  },
1892                 { "ListenDatagram",         config_parse_listen,          0, &u->socket,                                      "Socket"  },
1893                 { "ListenSequentialPacket", config_parse_listen,          0, &u->socket,                                      "Socket"  },
1894                 { "ListenFIFO",             config_parse_listen,          0, &u->socket,                                      "Socket"  },
1895                 { "BindIPv6Only",           config_parse_socket_bind,     0, &u->socket,                                      "Socket"  },
1896                 { "Backlog",                config_parse_unsigned,        0, &u->socket.backlog,                              "Socket"  },
1897                 { "BindToDevice",           config_parse_bindtodevice,    0, &u->socket,                                      "Socket"  },
1898                 { "ExecStartPre",           config_parse_exec,            0, u->socket.exec_command+SOCKET_EXEC_START_PRE,    "Socket"  },
1899                 { "ExecStartPost",          config_parse_exec,            0, u->socket.exec_command+SOCKET_EXEC_START_POST,   "Socket"  },
1900                 { "ExecStopPre",            config_parse_exec,            0, u->socket.exec_command+SOCKET_EXEC_STOP_PRE,     "Socket"  },
1901                 { "ExecStopPost",           config_parse_exec,            0, u->socket.exec_command+SOCKET_EXEC_STOP_POST,    "Socket"  },
1902                 { "TimeoutSec",             config_parse_usec,            0, &u->socket.timeout_usec,                         "Socket"  },
1903                 { "DirectoryMode",          config_parse_mode,            0, &u->socket.directory_mode,                       "Socket"  },
1904                 { "SocketMode",             config_parse_mode,            0, &u->socket.socket_mode,                          "Socket"  },
1905                 { "Accept",                 config_parse_bool,            0, &u->socket.accept,                               "Socket"  },
1906                 { "MaxConnections",         config_parse_unsigned,        0, &u->socket.max_connections,                      "Socket"  },
1907                 { "KeepAlive",              config_parse_bool,            0, &u->socket.keep_alive,                           "Socket"  },
1908                 { "Priority",               config_parse_int,             0, &u->socket.priority,                             "Socket"  },
1909                 { "ReceiveBuffer",          config_parse_size,            0, &u->socket.receive_buffer,                       "Socket"  },
1910                 { "SendBuffer",             config_parse_size,            0, &u->socket.send_buffer,                          "Socket"  },
1911                 { "IPTOS",                  config_parse_ip_tos,          0, &u->socket.ip_tos,                               "Socket"  },
1912                 { "IPTTL",                  config_parse_int,             0, &u->socket.ip_ttl,                               "Socket"  },
1913                 { "Mark",                   config_parse_int,             0, &u->socket.mark,                                 "Socket"  },
1914                 { "PipeSize",               config_parse_size,            0, &u->socket.pipe_size,                            "Socket"  },
1915                 { "FreeBind",               config_parse_bool,            0, &u->socket.free_bind,                            "Socket"  },
1916                 { "TCPCongestion",          config_parse_string,          0, &u->socket.tcp_congestion,                       "Socket"  },
1917                 { "Service",                config_parse_socket_service,  0, &u->socket,                                      "Socket"  },
1918                 EXEC_CONTEXT_CONFIG_ITEMS(u->socket.exec_context, "Socket"),
1919
1920                 { "What",                   config_parse_string,          0, &u->mount.parameters_fragment.what,              "Mount"   },
1921                 { "Where",                  config_parse_path,            0, &u->mount.where,                                 "Mount"   },
1922                 { "Options",                config_parse_string,          0, &u->mount.parameters_fragment.options,           "Mount"   },
1923                 { "Type",                   config_parse_string,          0, &u->mount.parameters_fragment.fstype,            "Mount"   },
1924                 { "TimeoutSec",             config_parse_usec,            0, &u->mount.timeout_usec,                          "Mount"   },
1925                 { "DirectoryMode",          config_parse_mode,            0, &u->mount.directory_mode,                        "Mount"   },
1926                 EXEC_CONTEXT_CONFIG_ITEMS(u->mount.exec_context, "Mount"),
1927
1928                 { "Where",                  config_parse_path,            0, &u->automount.where,                             "Automount" },
1929                 { "DirectoryMode",          config_parse_mode,            0, &u->automount.directory_mode,                    "Automount" },
1930
1931                 { "What",                   config_parse_path,            0, &u->swap.parameters_fragment.what,               "Swap"    },
1932                 { "Priority",               config_parse_int,             0, &u->swap.parameters_fragment.priority,           "Swap"    },
1933                 { "TimeoutSec",             config_parse_usec,            0, &u->swap.timeout_usec,                           "Swap"    },
1934                 EXEC_CONTEXT_CONFIG_ITEMS(u->swap.exec_context, "Swap"),
1935
1936                 { "OnActiveSec",            config_parse_timer,           0, &u->timer,                                       "Timer"   },
1937                 { "OnBootSec",              config_parse_timer,           0, &u->timer,                                       "Timer"   },
1938                 { "OnStartupSec",           config_parse_timer,           0, &u->timer,                                       "Timer"   },
1939                 { "OnUnitActiveSec",        config_parse_timer,           0, &u->timer,                                       "Timer"   },
1940                 { "OnUnitInactiveSec",      config_parse_timer,           0, &u->timer,                                       "Timer"   },
1941                 { "Unit",                   config_parse_timer_unit,      0, &u->timer,                                       "Timer"   },
1942
1943                 { "PathExists",             config_parse_path_spec,       0, &u->path,                                        "Path"    },
1944                 { "PathChanged",            config_parse_path_spec,       0, &u->path,                                        "Path"    },
1945                 { "DirectoryNotEmpty",      config_parse_path_spec,       0, &u->path,                                        "Path"    },
1946                 { "Unit",                   config_parse_path_unit,       0, &u->path,                                        "Path"    },
1947
1948                 /* The [Install] section is ignored here. */
1949                 { "Alias",                  NULL,                         0, NULL,                                            "Install" },
1950                 { "WantedBy",               NULL,                         0, NULL,                                            "Install" },
1951                 { "Also",                   NULL,                         0, NULL,                                            "Install" },
1952
1953                 { NULL, NULL, 0, NULL, NULL }
1954         };
1955
1956 #undef EXEC_CONTEXT_CONFIG_ITEMS
1957
1958         const char *sections[4];
1959         int r;
1960         Set *symlink_names;
1961         FILE *f = NULL;
1962         char *filename = NULL, *id = NULL;
1963         Unit *merged;
1964         struct stat st;
1965
1966         if (!u) {
1967                 /* Dirty dirty hack. */
1968                 dump_items((FILE*) path, items);
1969                 return 0;
1970         }
1971
1972         assert(u);
1973         assert(path);
1974
1975         sections[0] = "Unit";
1976         sections[1] = section_table[u->meta.type];
1977         sections[2] = "Install";
1978         sections[3] = NULL;
1979
1980         if (!(symlink_names = set_new(string_hash_func, string_compare_func)))
1981                 return -ENOMEM;
1982
1983         if (path_is_absolute(path)) {
1984
1985                 if (!(filename = strdup(path))) {
1986                         r = -ENOMEM;
1987                         goto finish;
1988                 }
1989
1990                 if ((r = open_follow(&filename, &f, symlink_names, &id)) < 0) {
1991                         free(filename);
1992                         filename = NULL;
1993
1994                         if (r != -ENOENT)
1995                                 goto finish;
1996                 }
1997
1998         } else  {
1999                 char **p;
2000
2001                 STRV_FOREACH(p, u->meta.manager->lookup_paths.unit_path) {
2002
2003                         /* Instead of opening the path right away, we manually
2004                          * follow all symlinks and add their name to our unit
2005                          * name set while doing so */
2006                         if (!(filename = path_make_absolute(path, *p))) {
2007                                 r = -ENOMEM;
2008                                 goto finish;
2009                         }
2010
2011                         if (u->meta.manager->unit_path_cache &&
2012                             !set_get(u->meta.manager->unit_path_cache, filename))
2013                                 r = -ENOENT;
2014                         else
2015                                 r = open_follow(&filename, &f, symlink_names, &id);
2016
2017                         if (r < 0) {
2018                                 char *sn;
2019
2020                                 free(filename);
2021                                 filename = NULL;
2022
2023                                 if (r != -ENOENT)
2024                                         goto finish;
2025
2026                                 /* Empty the symlink names for the next run */
2027                                 while ((sn = set_steal_first(symlink_names)))
2028                                         free(sn);
2029
2030                                 continue;
2031                         }
2032
2033                         break;
2034                 }
2035         }
2036
2037         if (!filename) {
2038                 /* Hmm, no suitable file found? */
2039                 r = 0;
2040                 goto finish;
2041         }
2042
2043         merged = u;
2044         if ((r = merge_by_names(&merged, symlink_names, id)) < 0)
2045                 goto finish;
2046
2047         if (merged != u) {
2048                 u->meta.load_state = UNIT_MERGED;
2049                 r = 0;
2050                 goto finish;
2051         }
2052
2053         zero(st);
2054         if (fstat(fileno(f), &st) < 0) {
2055                 r = -errno;
2056                 goto finish;
2057         }
2058
2059         if (null_or_empty(&st))
2060                 u->meta.load_state = UNIT_MASKED;
2061         else {
2062                 /* Now, parse the file contents */
2063                 if ((r = config_parse(filename, f, sections, items, false, u)) < 0)
2064                         goto finish;
2065
2066                 u->meta.load_state = UNIT_LOADED;
2067         }
2068
2069         free(u->meta.fragment_path);
2070         u->meta.fragment_path = filename;
2071         filename = NULL;
2072
2073         u->meta.fragment_mtime = timespec_load(&st.st_mtim);
2074
2075         r = 0;
2076
2077 finish:
2078         set_free_free(symlink_names);
2079         free(filename);
2080
2081         if (f)
2082                 fclose(f);
2083
2084         return r;
2085 }
2086
2087 int unit_load_fragment(Unit *u) {
2088         int r;
2089         Iterator i;
2090         const char *t;
2091
2092         assert(u);
2093         assert(u->meta.load_state == UNIT_STUB);
2094         assert(u->meta.id);
2095
2096         /* First, try to find the unit under its id. We always look
2097          * for unit files in the default directories, to make it easy
2098          * to override things by placing things in /etc/systemd/system */
2099         if ((r = load_from_path(u, u->meta.id)) < 0)
2100                 return r;
2101
2102         /* Try to find an alias we can load this with */
2103         if (u->meta.load_state == UNIT_STUB)
2104                 SET_FOREACH(t, u->meta.names, i) {
2105
2106                         if (t == u->meta.id)
2107                                 continue;
2108
2109                         if ((r = load_from_path(u, t)) < 0)
2110                                 return r;
2111
2112                         if (u->meta.load_state != UNIT_STUB)
2113                                 break;
2114                 }
2115
2116         /* And now, try looking for it under the suggested (originally linked) path */
2117         if (u->meta.load_state == UNIT_STUB && u->meta.fragment_path) {
2118
2119                 if ((r = load_from_path(u, u->meta.fragment_path)) < 0)
2120                         return r;
2121
2122                 if (u->meta.load_state == UNIT_STUB) {
2123                         /* Hmm, this didn't work? Then let's get rid
2124                          * of the fragment path stored for us, so that
2125                          * we don't point to an invalid location. */
2126                         free(u->meta.fragment_path);
2127                         u->meta.fragment_path = NULL;
2128                 }
2129         }
2130
2131         /* Look for a template */
2132         if (u->meta.load_state == UNIT_STUB && u->meta.instance) {
2133                 char *k;
2134
2135                 if (!(k = unit_name_template(u->meta.id)))
2136                         return -ENOMEM;
2137
2138                 r = load_from_path(u, k);
2139                 free(k);
2140
2141                 if (r < 0)
2142                         return r;
2143
2144                 if (u->meta.load_state == UNIT_STUB)
2145                         SET_FOREACH(t, u->meta.names, i) {
2146
2147                                 if (t == u->meta.id)
2148                                         continue;
2149
2150                                 if (!(k = unit_name_template(t)))
2151                                         return -ENOMEM;
2152
2153                                 r = load_from_path(u, k);
2154                                 free(k);
2155
2156                                 if (r < 0)
2157                                         return r;
2158
2159                                 if (u->meta.load_state != UNIT_STUB)
2160                                         break;
2161                         }
2162         }
2163
2164         return 0;
2165 }
2166
2167 void unit_dump_config_items(FILE *f) {
2168         /* OK, this wins a prize for extreme ugliness. */
2169
2170         load_from_path(NULL, (const void*) f);
2171 }