chiark / gitweb /
execute: drop empty assignments from env blocks on execution but keep them around...
[elogind.git] / src / load-fragment.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <linux/oom.h>
23 #include <assert.h>
24 #include <errno.h>
25 #include <string.h>
26 #include <unistd.h>
27 #include <fcntl.h>
28 #include <sched.h>
29 #include <sys/prctl.h>
30 #include <sys/mount.h>
31 #include <linux/fs.h>
32 #include <sys/stat.h>
33
34 #include "unit.h"
35 #include "strv.h"
36 #include "conf-parser.h"
37 #include "load-fragment.h"
38 #include "log.h"
39 #include "ioprio.h"
40 #include "securebits.h"
41 #include "missing.h"
42 #include "unit-name.h"
43 #include "bus-errors.h"
44
45 #ifndef HAVE_SYSV_COMPAT
46 static int config_parse_warn_compat(
47                 const char *filename,
48                 unsigned line,
49                 const char *section,
50                 const char *lvalue,
51                 const char *rvalue,
52                 void *data,
53                 void *userdata) {
54
55         log_debug("[%s:%u] Support for option %s= has been disabled at compile time and is ignored", filename, line, lvalue);
56         return 0;
57 }
58 #endif
59
60 static int config_parse_deps(
61                 const char *filename,
62                 unsigned line,
63                 const char *section,
64                 const char *lvalue,
65                 const char *rvalue,
66                 void *data,
67                 void *userdata) {
68
69         UnitDependency d = PTR_TO_UINT(data);
70         Unit *u = userdata;
71         char *w;
72         size_t l;
73         char *state;
74
75         assert(filename);
76         assert(lvalue);
77         assert(rvalue);
78
79         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
80                 char *t, *k;
81                 int r;
82
83                 if (!(t = strndup(w, l)))
84                         return -ENOMEM;
85
86                 k = unit_name_printf(u, t);
87                 free(t);
88
89                 if (!k)
90                         return -ENOMEM;
91
92                 r = unit_add_dependency_by_name(u, d, k, NULL, true);
93
94                 if (r < 0) {
95                         log_error("Failed to add dependency on %s, ignoring: %s", k, strerror(-r));
96                         free(k);
97                         return 0;
98                 }
99
100                 free(k);
101         }
102
103         return 0;
104 }
105
106 static int config_parse_names(
107                 const char *filename,
108                 unsigned line,
109                 const char *section,
110                 const char *lvalue,
111                 const char *rvalue,
112                 void *data,
113                 void *userdata) {
114
115         Unit *u = userdata;
116         char *w;
117         size_t l;
118         char *state;
119
120         assert(filename);
121         assert(lvalue);
122         assert(rvalue);
123         assert(data);
124
125         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
126                 char *t, *k;
127                 int r;
128
129                 if (!(t = strndup(w, l)))
130                         return -ENOMEM;
131
132                 k = unit_name_printf(u, t);
133                 free(t);
134
135                 if (!k)
136                         return -ENOMEM;
137
138                 r = unit_merge_by_name(u, k);
139
140                 if (r < 0) {
141                         log_error("Failed to add name %s, ignoring: %s", k, strerror(-r));
142                         free(k);
143                         return 0;
144                 }
145
146                 free(k);
147         }
148
149         return 0;
150 }
151
152 static int config_parse_string_printf(
153                 const char *filename,
154                 unsigned line,
155                 const char *section,
156                 const char *lvalue,
157                 const char *rvalue,
158                 void *data,
159                 void *userdata) {
160
161         Unit *u = userdata;
162         char **s = data;
163         char *k;
164
165         assert(filename);
166         assert(lvalue);
167         assert(rvalue);
168         assert(s);
169         assert(u);
170
171         if (!(k = unit_full_printf(u, rvalue)))
172                 return -ENOMEM;
173
174         free(*s);
175         if (*k)
176                 *s = k;
177         else {
178                 free(k);
179                 *s = NULL;
180         }
181
182         return 0;
183 }
184
185 static int config_parse_listen(
186                 const char *filename,
187                 unsigned line,
188                 const char *section,
189                 const char *lvalue,
190                 const char *rvalue,
191                 void *data,
192                 void *userdata) {
193
194         int r;
195         SocketPort *p;
196         Socket *s;
197
198         assert(filename);
199         assert(lvalue);
200         assert(rvalue);
201         assert(data);
202
203         s = (Socket*) data;
204
205         if (!(p = new0(SocketPort, 1)))
206                 return -ENOMEM;
207
208         if (streq(lvalue, "ListenFIFO")) {
209                 p->type = SOCKET_FIFO;
210
211                 if (!(p->path = strdup(rvalue))) {
212                         free(p);
213                         return -ENOMEM;
214                 }
215
216                 path_kill_slashes(p->path);
217         } else {
218                 p->type = SOCKET_SOCKET;
219
220                 if ((r = socket_address_parse(&p->address, rvalue)) < 0) {
221                         log_error("[%s:%u] Failed to parse address value, ignoring: %s", filename, line, rvalue);
222                         free(p);
223                         return 0;
224                 }
225
226                 if (streq(lvalue, "ListenStream"))
227                         p->address.type = SOCK_STREAM;
228                 else if (streq(lvalue, "ListenDatagram"))
229                         p->address.type = SOCK_DGRAM;
230                 else {
231                         assert(streq(lvalue, "ListenSequentialPacket"));
232                         p->address.type = SOCK_SEQPACKET;
233                 }
234
235                 if (socket_address_family(&p->address) != AF_LOCAL && p->address.type == SOCK_SEQPACKET) {
236                         log_error("[%s:%u] Address family not supported, ignoring: %s", filename, line, rvalue);
237                         free(p);
238                         return 0;
239                 }
240         }
241
242         p->fd = -1;
243         LIST_PREPEND(SocketPort, port, s->ports, p);
244
245         return 0;
246 }
247
248 static int config_parse_socket_bind(
249                 const char *filename,
250                 unsigned line,
251                 const char *section,
252                 const char *lvalue,
253                 const char *rvalue,
254                 void *data,
255                 void *userdata) {
256
257         Socket *s;
258         SocketAddressBindIPv6Only b;
259
260         assert(filename);
261         assert(lvalue);
262         assert(rvalue);
263         assert(data);
264
265         s = (Socket*) data;
266
267         if ((b = socket_address_bind_ipv6_only_from_string(rvalue)) < 0) {
268                 int r;
269
270                 if ((r = parse_boolean(rvalue)) < 0) {
271                         log_error("[%s:%u] Failed to parse bind IPv6 only value, ignoring: %s", filename, line, rvalue);
272                         return 0;
273                 }
274
275                 s->bind_ipv6_only = r ? SOCKET_ADDRESS_IPV6_ONLY : SOCKET_ADDRESS_BOTH;
276         } else
277                 s->bind_ipv6_only = b;
278
279         return 0;
280 }
281
282 static int config_parse_nice(
283                 const char *filename,
284                 unsigned line,
285                 const char *section,
286                 const char *lvalue,
287                 const char *rvalue,
288                 void *data,
289                 void *userdata) {
290
291         ExecContext *c = data;
292         int priority, r;
293
294         assert(filename);
295         assert(lvalue);
296         assert(rvalue);
297         assert(data);
298
299         if ((r = safe_atoi(rvalue, &priority)) < 0) {
300                 log_error("[%s:%u] Failed to parse nice priority, ignoring: %s. ", filename, line, rvalue);
301                 return 0;
302         }
303
304         if (priority < PRIO_MIN || priority >= PRIO_MAX) {
305                 log_error("[%s:%u] Nice priority out of range, ignoring: %s", filename, line, rvalue);
306                 return 0;
307         }
308
309         c->nice = priority;
310         c->nice_set = false;
311
312         return 0;
313 }
314
315 static int config_parse_oom_score_adjust(
316                 const char *filename,
317                 unsigned line,
318                 const char *section,
319                 const char *lvalue,
320                 const char *rvalue,
321                 void *data,
322                 void *userdata) {
323
324         ExecContext *c = data;
325         int oa, r;
326
327         assert(filename);
328         assert(lvalue);
329         assert(rvalue);
330         assert(data);
331
332         if ((r = safe_atoi(rvalue, &oa)) < 0) {
333                 log_error("[%s:%u] Failed to parse the OOM score adjust value, ignoring: %s", filename, line, rvalue);
334                 return 0;
335         }
336
337         if (oa < OOM_SCORE_ADJ_MIN || oa > OOM_SCORE_ADJ_MAX) {
338                 log_error("[%s:%u] OOM score adjust value out of range, ignoring: %s", filename, line, rvalue);
339                 return 0;
340         }
341
342         c->oom_score_adjust = oa;
343         c->oom_score_adjust_set = true;
344
345         return 0;
346 }
347
348 static int config_parse_mode(
349                 const char *filename,
350                 unsigned line,
351                 const char *section,
352                 const char *lvalue,
353                 const char *rvalue,
354                 void *data,
355                 void *userdata) {
356
357         mode_t *m = data;
358         long l;
359         char *x = NULL;
360
361         assert(filename);
362         assert(lvalue);
363         assert(rvalue);
364         assert(data);
365
366         errno = 0;
367         l = strtol(rvalue, &x, 8);
368         if (!x || *x || errno) {
369                 log_error("[%s:%u] Failed to parse mode value, ignoring: %s", filename, line, rvalue);
370                 return 0;
371         }
372
373         if (l < 0000 || l > 07777) {
374                 log_error("[%s:%u] mode value out of range, ignoring: %s", filename, line, rvalue);
375                 return 0;
376         }
377
378         *m = (mode_t) l;
379         return 0;
380 }
381
382 static int config_parse_exec(
383                 const char *filename,
384                 unsigned line,
385                 const char *section,
386                 const char *lvalue,
387                 const char *rvalue,
388                 void *data,
389                 void *userdata) {
390
391         ExecCommand **e = data, *nce;
392         char *path, **n;
393         unsigned k;
394
395         assert(filename);
396         assert(lvalue);
397         assert(rvalue);
398         assert(e);
399
400         /* We accept an absolute path as first argument, or
401          * alternatively an absolute prefixed with @ to allow
402          * overriding of argv[0]. */
403
404         for (;;) {
405                 char *w;
406                 size_t l;
407                 char *state;
408                 bool honour_argv0 = false, ignore = false;
409
410                 path = NULL;
411                 nce = NULL;
412                 n = NULL;
413
414                 rvalue += strspn(rvalue, WHITESPACE);
415
416                 if (rvalue[0] == 0)
417                         break;
418
419                 if (rvalue[0] == '-') {
420                         ignore = true;
421                         rvalue ++;
422                 }
423
424                 if (rvalue[0] == '@') {
425                         honour_argv0 = true;
426                         rvalue ++;
427                 }
428
429                 if (*rvalue != '/') {
430                         log_error("[%s:%u] Invalid executable path in command line, ignoring: %s", filename, line, rvalue);
431                         return 0;
432                 }
433
434                 k = 0;
435                 FOREACH_WORD_QUOTED(w, l, rvalue, state) {
436                         if (strncmp(w, ";", MAX(l, 1U)) == 0)
437                                 break;
438
439                         k++;
440                 }
441
442                 if (!(n = new(char*, k + !honour_argv0)))
443                         return -ENOMEM;
444
445                 k = 0;
446                 FOREACH_WORD_QUOTED(w, l, rvalue, state) {
447                         if (strncmp(w, ";", MAX(l, 1U)) == 0)
448                                 break;
449
450                         if (honour_argv0 && w == rvalue) {
451                                 assert(!path);
452                                 if (!(path = cunescape_length(w, l)))
453                                         goto fail;
454                         } else {
455                                 if (!(n[k++] = cunescape_length(w, l)))
456                                         goto fail;
457                         }
458                 }
459
460                 n[k] = NULL;
461
462                 if (!n[0]) {
463                         log_error("[%s:%u] Invalid command line, ignoring: %s", filename, line, rvalue);
464                         strv_free(n);
465                         return 0;
466                 }
467
468                 if (!path)
469                         if (!(path = strdup(n[0])))
470                                 goto fail;
471
472                 assert(path_is_absolute(path));
473
474                 if (!(nce = new0(ExecCommand, 1)))
475                         goto fail;
476
477                 nce->argv = n;
478                 nce->path = path;
479                 nce->ignore = ignore;
480
481                 path_kill_slashes(nce->path);
482
483                 exec_command_append_list(e, nce);
484
485                 rvalue = state;
486         }
487
488         return 0;
489
490 fail:
491         n[k] = NULL;
492         strv_free(n);
493         free(path);
494         free(nce);
495
496         return -ENOMEM;
497 }
498
499 static int config_parse_usec(
500                 const char *filename,
501                 unsigned line,
502                 const char *section,
503                 const char *lvalue,
504                 const char *rvalue,
505                 void *data,
506                 void *userdata) {
507
508         usec_t *usec = data;
509         int r;
510
511         assert(filename);
512         assert(lvalue);
513         assert(rvalue);
514         assert(data);
515
516         if ((r = parse_usec(rvalue, usec)) < 0) {
517                 log_error("[%s:%u] Failed to parse time value, ignoring: %s", filename, line, rvalue);
518                 return 0;
519         }
520
521         return 0;
522 }
523
524 static DEFINE_CONFIG_PARSE_ENUM(config_parse_service_type, service_type, ServiceType, "Failed to parse service type");
525 static DEFINE_CONFIG_PARSE_ENUM(config_parse_service_restart, service_restart, ServiceRestart, "Failed to parse service restart specifier");
526
527 static int config_parse_bindtodevice(
528                 const char *filename,
529                 unsigned line,
530                 const char *section,
531                 const char *lvalue,
532                 const char *rvalue,
533                 void *data,
534                 void *userdata) {
535
536         Socket *s = data;
537         char *n;
538
539         assert(filename);
540         assert(lvalue);
541         assert(rvalue);
542         assert(data);
543
544         if (rvalue[0] && !streq(rvalue, "*")) {
545                 if (!(n = strdup(rvalue)))
546                         return -ENOMEM;
547         } else
548                 n = NULL;
549
550         free(s->bind_to_device);
551         s->bind_to_device = n;
552
553         return 0;
554 }
555
556 static DEFINE_CONFIG_PARSE_ENUM(config_parse_output, exec_output, ExecOutput, "Failed to parse output specifier");
557 static DEFINE_CONFIG_PARSE_ENUM(config_parse_input, exec_input, ExecInput, "Failed to parse input specifier");
558
559 static int config_parse_facility(
560                 const char *filename,
561                 unsigned line,
562                 const char *section,
563                 const char *lvalue,
564                 const char *rvalue,
565                 void *data,
566                 void *userdata) {
567
568
569         int *o = data, x;
570
571         assert(filename);
572         assert(lvalue);
573         assert(rvalue);
574         assert(data);
575
576         if ((x = log_facility_from_string(rvalue)) < 0) {
577                 log_error("[%s:%u] Failed to parse log facility, ignoring: %s", filename, line, rvalue);
578                 return 0;
579         }
580
581         *o = LOG_MAKEPRI(x, LOG_PRI(*o));
582
583         return 0;
584 }
585
586 static int config_parse_level(
587                 const char *filename,
588                 unsigned line,
589                 const char *section,
590                 const char *lvalue,
591                 const char *rvalue,
592                 void *data,
593                 void *userdata) {
594
595
596         int *o = data, x;
597
598         assert(filename);
599         assert(lvalue);
600         assert(rvalue);
601         assert(data);
602
603         if ((x = log_level_from_string(rvalue)) < 0) {
604                 log_error("[%s:%u] Failed to parse log level, ignoring: %s", filename, line, rvalue);
605                 return 0;
606         }
607
608         *o = LOG_MAKEPRI(LOG_FAC(*o), x);
609         return 0;
610 }
611
612 static int config_parse_io_class(
613                 const char *filename,
614                 unsigned line,
615                 const char *section,
616                 const char *lvalue,
617                 const char *rvalue,
618                 void *data,
619                 void *userdata) {
620
621         ExecContext *c = data;
622         int x;
623
624         assert(filename);
625         assert(lvalue);
626         assert(rvalue);
627         assert(data);
628
629         if ((x = ioprio_class_from_string(rvalue)) < 0) {
630                 log_error("[%s:%u] Failed to parse IO scheduling class, ignoring: %s", filename, line, rvalue);
631                 return 0;
632         }
633
634         c->ioprio = IOPRIO_PRIO_VALUE(x, IOPRIO_PRIO_DATA(c->ioprio));
635         c->ioprio_set = true;
636
637         return 0;
638 }
639
640 static int config_parse_io_priority(
641                 const char *filename,
642                 unsigned line,
643                 const char *section,
644                 const char *lvalue,
645                 const char *rvalue,
646                 void *data,
647                 void *userdata) {
648
649         ExecContext *c = data;
650         int i;
651
652         assert(filename);
653         assert(lvalue);
654         assert(rvalue);
655         assert(data);
656
657         if (safe_atoi(rvalue, &i) < 0 || i < 0 || i >= IOPRIO_BE_NR) {
658                 log_error("[%s:%u] Failed to parse io priority, ignoring: %s", filename, line, rvalue);
659                 return 0;
660         }
661
662         c->ioprio = IOPRIO_PRIO_VALUE(IOPRIO_PRIO_CLASS(c->ioprio), i);
663         c->ioprio_set = true;
664
665         return 0;
666 }
667
668 static int config_parse_cpu_sched_policy(
669                 const char *filename,
670                 unsigned line,
671                 const char *section,
672                 const char *lvalue,
673                 const char *rvalue,
674                 void *data,
675                 void *userdata) {
676
677
678         ExecContext *c = data;
679         int x;
680
681         assert(filename);
682         assert(lvalue);
683         assert(rvalue);
684         assert(data);
685
686         if ((x = sched_policy_from_string(rvalue)) < 0) {
687                 log_error("[%s:%u] Failed to parse CPU scheduling policy, ignoring: %s", filename, line, rvalue);
688                 return 0;
689         }
690
691         c->cpu_sched_policy = x;
692         c->cpu_sched_set = true;
693
694         return 0;
695 }
696
697 static int config_parse_cpu_sched_prio(
698                 const char *filename,
699                 unsigned line,
700                 const char *section,
701                 const char *lvalue,
702                 const char *rvalue,
703                 void *data,
704                 void *userdata) {
705
706         ExecContext *c = data;
707         int i;
708
709         assert(filename);
710         assert(lvalue);
711         assert(rvalue);
712         assert(data);
713
714         /* On Linux RR/FIFO have the same range */
715         if (safe_atoi(rvalue, &i) < 0 || i < sched_get_priority_min(SCHED_RR) || i > sched_get_priority_max(SCHED_RR)) {
716                 log_error("[%s:%u] Failed to parse CPU scheduling priority, ignoring: %s", filename, line, rvalue);
717                 return 0;
718         }
719
720         c->cpu_sched_priority = i;
721         c->cpu_sched_set = true;
722
723         return 0;
724 }
725
726 static int config_parse_cpu_affinity(
727                 const char *filename,
728                 unsigned line,
729                 const char *section,
730                 const char *lvalue,
731                 const char *rvalue,
732                 void *data,
733                 void *userdata) {
734
735         ExecContext *c = data;
736         char *w;
737         size_t l;
738         char *state;
739
740         assert(filename);
741         assert(lvalue);
742         assert(rvalue);
743         assert(data);
744
745         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
746                 char *t;
747                 int r;
748                 unsigned cpu;
749
750                 if (!(t = strndup(w, l)))
751                         return -ENOMEM;
752
753                 r = safe_atou(t, &cpu);
754                 free(t);
755
756                 if (!(c->cpuset))
757                         if (!(c->cpuset = cpu_set_malloc(&c->cpuset_ncpus)))
758                                 return -ENOMEM;
759
760                 if (r < 0 || cpu >= c->cpuset_ncpus) {
761                         log_error("[%s:%u] Failed to parse CPU affinity, ignoring: %s", filename, line, rvalue);
762                         return 0;
763                 }
764
765                 CPU_SET_S(cpu, CPU_ALLOC_SIZE(c->cpuset_ncpus), c->cpuset);
766         }
767
768         return 0;
769 }
770
771 static int config_parse_capabilities(
772                 const char *filename,
773                 unsigned line,
774                 const char *section,
775                 const char *lvalue,
776                 const char *rvalue,
777                 void *data,
778                 void *userdata) {
779
780         ExecContext *c = data;
781         cap_t cap;
782
783         assert(filename);
784         assert(lvalue);
785         assert(rvalue);
786         assert(data);
787
788         if (!(cap = cap_from_text(rvalue))) {
789                 if (errno == ENOMEM)
790                         return -ENOMEM;
791
792                 log_error("[%s:%u] Failed to parse capabilities, ignoring: %s", filename, line, rvalue);
793                 return 0;
794         }
795
796         if (c->capabilities)
797                 cap_free(c->capabilities);
798         c->capabilities = cap;
799
800         return 0;
801 }
802
803 static int config_parse_secure_bits(
804                 const char *filename,
805                 unsigned line,
806                 const char *section,
807                 const char *lvalue,
808                 const char *rvalue,
809                 void *data,
810                 void *userdata) {
811
812         ExecContext *c = data;
813         char *w;
814         size_t l;
815         char *state;
816
817         assert(filename);
818         assert(lvalue);
819         assert(rvalue);
820         assert(data);
821
822         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
823                 if (first_word(w, "keep-caps"))
824                         c->secure_bits |= SECURE_KEEP_CAPS;
825                 else if (first_word(w, "keep-caps-locked"))
826                         c->secure_bits |= SECURE_KEEP_CAPS_LOCKED;
827                 else if (first_word(w, "no-setuid-fixup"))
828                         c->secure_bits |= SECURE_NO_SETUID_FIXUP;
829                 else if (first_word(w, "no-setuid-fixup-locked"))
830                         c->secure_bits |= SECURE_NO_SETUID_FIXUP_LOCKED;
831                 else if (first_word(w, "noroot"))
832                         c->secure_bits |= SECURE_NOROOT;
833                 else if (first_word(w, "noroot-locked"))
834                         c->secure_bits |= SECURE_NOROOT_LOCKED;
835                 else {
836                         log_error("[%s:%u] Failed to parse secure bits, ignoring: %s", filename, line, rvalue);
837                         return 0;
838                 }
839         }
840
841         return 0;
842 }
843
844 static int config_parse_bounding_set(
845                 const char *filename,
846                 unsigned line,
847                 const char *section,
848                 const char *lvalue,
849                 const char *rvalue,
850                 void *data,
851                 void *userdata) {
852
853         ExecContext *c = data;
854         char *w;
855         size_t l;
856         char *state;
857
858         assert(filename);
859         assert(lvalue);
860         assert(rvalue);
861         assert(data);
862
863         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
864                 char *t;
865                 int r;
866                 cap_value_t cap;
867
868                 if (!(t = strndup(w, l)))
869                         return -ENOMEM;
870
871                 r = cap_from_name(t, &cap);
872                 free(t);
873
874                 if (r < 0) {
875                         log_error("[%s:%u] Failed to parse capability bounding set, ignoring: %s", filename, line, rvalue);
876                         return 0;
877                 }
878
879                 c->capability_bounding_set_drop |= 1 << cap;
880         }
881
882         return 0;
883 }
884
885 static int config_parse_timer_slack_nsec(
886                 const char *filename,
887                 unsigned line,
888                 const char *section,
889                 const char *lvalue,
890                 const char *rvalue,
891                 void *data,
892                 void *userdata) {
893
894         ExecContext *c = data;
895         unsigned long u;
896         int r;
897
898         assert(filename);
899         assert(lvalue);
900         assert(rvalue);
901         assert(data);
902
903         if ((r = safe_atolu(rvalue, &u)) < 0) {
904                 log_error("[%s:%u] Failed to parse time slack value, ignoring: %s", filename, line, rvalue);
905                 return 0;
906         }
907
908         c->timer_slack_nsec = u;
909
910         return 0;
911 }
912
913 static int config_parse_limit(
914                 const char *filename,
915                 unsigned line,
916                 const char *section,
917                 const char *lvalue,
918                 const char *rvalue,
919                 void *data,
920                 void *userdata) {
921
922         struct rlimit **rl = data;
923         unsigned long long u;
924         int r;
925
926         assert(filename);
927         assert(lvalue);
928         assert(rvalue);
929         assert(data);
930
931         if ((r = safe_atollu(rvalue, &u)) < 0) {
932                 log_error("[%s:%u] Failed to parse resource value, ignoring: %s", filename, line, rvalue);
933                 return 0;
934         }
935
936         if (!*rl)
937                 if (!(*rl = new(struct rlimit, 1)))
938                         return -ENOMEM;
939
940         (*rl)->rlim_cur = (*rl)->rlim_max = (rlim_t) u;
941         return 0;
942 }
943
944 static int config_parse_cgroup(
945                 const char *filename,
946                 unsigned line,
947                 const char *section,
948                 const char *lvalue,
949                 const char *rvalue,
950                 void *data,
951                 void *userdata) {
952
953         Unit *u = userdata;
954         char *w;
955         size_t l;
956         char *state;
957
958         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
959                 char *t;
960                 int r;
961
962                 if (!(t = cunescape_length(w, l)))
963                         return -ENOMEM;
964
965                 r = unit_add_cgroup_from_text(u, t);
966                 free(t);
967
968                 if (r < 0) {
969                         log_error("[%s:%u] Failed to parse cgroup value, ignoring: %s", filename, line, rvalue);
970                         return 0;
971                 }
972         }
973
974         return 0;
975 }
976
977 #ifdef HAVE_SYSV_COMPAT
978 static int config_parse_sysv_priority(
979                 const char *filename,
980                 unsigned line,
981                 const char *section,
982                 const char *lvalue,
983                 const char *rvalue,
984                 void *data,
985                 void *userdata) {
986
987         int *priority = data;
988         int r, i;
989
990         assert(filename);
991         assert(lvalue);
992         assert(rvalue);
993         assert(data);
994
995         if ((r = safe_atoi(rvalue, &i)) < 0 || i < 0) {
996                 log_error("[%s:%u] Failed to parse SysV start priority, ignoring: %s", filename, line, rvalue);
997                 return 0;
998         }
999
1000         *priority = (int) i;
1001         return 0;
1002 }
1003 #endif
1004
1005 static int config_parse_fsck_passno(
1006                 const char *filename,
1007                 unsigned line,
1008                 const char *section,
1009                 const char *lvalue,
1010                 const char *rvalue,
1011                 void *data,
1012                 void *userdata) {
1013
1014         int *passno = data;
1015         int r, i;
1016
1017         assert(filename);
1018         assert(lvalue);
1019         assert(rvalue);
1020         assert(data);
1021
1022         if ((r = safe_atoi(rvalue, &i)) < 0 || i < 0) {
1023                 log_error("[%s:%u] Failed to parse fsck pass number, ignoring: %s", filename, line, rvalue);
1024                 return 0;
1025         }
1026
1027         *passno = (int) i;
1028         return 0;
1029 }
1030
1031 static DEFINE_CONFIG_PARSE_ENUM(config_parse_kill_mode, kill_mode, KillMode, "Failed to parse kill mode");
1032
1033 static int config_parse_kill_signal(
1034                 const char *filename,
1035                 unsigned line,
1036                 const char *section,
1037                 const char *lvalue,
1038                 const char *rvalue,
1039                 void *data,
1040                 void *userdata) {
1041
1042         int *sig = data;
1043         int r;
1044
1045         assert(filename);
1046         assert(lvalue);
1047         assert(rvalue);
1048         assert(sig);
1049
1050         if ((r = signal_from_string_try_harder(rvalue)) <= 0) {
1051                 log_error("[%s:%u] Failed to parse kill signal, ignoring: %s", filename, line, rvalue);
1052                 return 0;
1053         }
1054
1055         *sig = r;
1056         return 0;
1057 }
1058
1059 static int config_parse_mount_flags(
1060                 const char *filename,
1061                 unsigned line,
1062                 const char *section,
1063                 const char *lvalue,
1064                 const char *rvalue,
1065                 void *data,
1066                 void *userdata) {
1067
1068         ExecContext *c = data;
1069         char *w;
1070         size_t l;
1071         char *state;
1072         unsigned long flags = 0;
1073
1074         assert(filename);
1075         assert(lvalue);
1076         assert(rvalue);
1077         assert(data);
1078
1079         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
1080                 if (strncmp(w, "shared", MAX(l, 6U)) == 0)
1081                         flags |= MS_SHARED;
1082                 else if (strncmp(w, "slave", MAX(l, 5U)) == 0)
1083                         flags |= MS_SLAVE;
1084                 else if (strncmp(w, "private", MAX(l, 7U)) == 0)
1085                         flags |= MS_PRIVATE;
1086                 else {
1087                         log_error("[%s:%u] Failed to parse mount flags, ignoring: %s", filename, line, rvalue);
1088                         return 0;
1089                 }
1090         }
1091
1092         c->mount_flags = flags;
1093         return 0;
1094 }
1095
1096 static int config_parse_timer(
1097                 const char *filename,
1098                 unsigned line,
1099                 const char *section,
1100                 const char *lvalue,
1101                 const char *rvalue,
1102                 void *data,
1103                 void *userdata) {
1104
1105         Timer *t = data;
1106         usec_t u;
1107         int r;
1108         TimerValue *v;
1109         TimerBase b;
1110
1111         assert(filename);
1112         assert(lvalue);
1113         assert(rvalue);
1114         assert(data);
1115
1116         if ((b = timer_base_from_string(lvalue)) < 0) {
1117                 log_error("[%s:%u] Failed to parse timer base, ignoring: %s", filename, line, lvalue);
1118                 return 0;
1119         }
1120
1121         if ((r = parse_usec(rvalue, &u)) < 0) {
1122                 log_error("[%s:%u] Failed to parse timer value, ignoring: %s", filename, line, rvalue);
1123                 return 0;
1124         }
1125
1126         if (!(v = new0(TimerValue, 1)))
1127                 return -ENOMEM;
1128
1129         v->base = b;
1130         v->value = u;
1131
1132         LIST_PREPEND(TimerValue, value, t->values, v);
1133
1134         return 0;
1135 }
1136
1137 static int config_parse_timer_unit(
1138                 const char *filename,
1139                 unsigned line,
1140                 const char *section,
1141                 const char *lvalue,
1142                 const char *rvalue,
1143                 void *data,
1144                 void *userdata) {
1145
1146         Timer *t = data;
1147         int r;
1148         DBusError error;
1149
1150         assert(filename);
1151         assert(lvalue);
1152         assert(rvalue);
1153         assert(data);
1154
1155         dbus_error_init(&error);
1156
1157         if (endswith(rvalue, ".timer")) {
1158                 log_error("[%s:%u] Unit cannot be of type timer, ignoring: %s", filename, line, rvalue);
1159                 return 0;
1160         }
1161
1162         if ((r = manager_load_unit(t->meta.manager, rvalue, NULL, NULL, &t->unit)) < 0) {
1163                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1164                 dbus_error_free(&error);
1165                 return 0;
1166         }
1167
1168         return 0;
1169 }
1170
1171 static int config_parse_path_spec(
1172                 const char *filename,
1173                 unsigned line,
1174                 const char *section,
1175                 const char *lvalue,
1176                 const char *rvalue,
1177                 void *data,
1178                 void *userdata) {
1179
1180         Path *p = data;
1181         PathSpec *s;
1182         PathType b;
1183
1184         assert(filename);
1185         assert(lvalue);
1186         assert(rvalue);
1187         assert(data);
1188
1189         if ((b = path_type_from_string(lvalue)) < 0) {
1190                 log_error("[%s:%u] Failed to parse path type, ignoring: %s", filename, line, lvalue);
1191                 return 0;
1192         }
1193
1194         if (!path_is_absolute(rvalue)) {
1195                 log_error("[%s:%u] Path is not absolute, ignoring: %s", filename, line, rvalue);
1196                 return 0;
1197         }
1198
1199         if (!(s = new0(PathSpec, 1)))
1200                 return -ENOMEM;
1201
1202         if (!(s->path = strdup(rvalue))) {
1203                 free(s);
1204                 return -ENOMEM;
1205         }
1206
1207         path_kill_slashes(s->path);
1208
1209         s->type = b;
1210         s->inotify_fd = -1;
1211
1212         LIST_PREPEND(PathSpec, spec, p->specs, s);
1213
1214         return 0;
1215 }
1216
1217 static int config_parse_path_unit(
1218                 const char *filename,
1219                 unsigned line,
1220                 const char *section,
1221                 const char *lvalue,
1222                 const char *rvalue,
1223                 void *data,
1224                 void *userdata) {
1225
1226         Path *t = data;
1227         int r;
1228         DBusError error;
1229
1230         assert(filename);
1231         assert(lvalue);
1232         assert(rvalue);
1233         assert(data);
1234
1235         dbus_error_init(&error);
1236
1237         if (endswith(rvalue, ".path")) {
1238                 log_error("[%s:%u] Unit cannot be of type path, ignoring: %s", filename, line, rvalue);
1239                 return 0;
1240         }
1241
1242         if ((r = manager_load_unit(t->meta.manager, rvalue, NULL, &error, &t->unit)) < 0) {
1243                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1244                 dbus_error_free(&error);
1245                 return 0;
1246         }
1247
1248         return 0;
1249 }
1250
1251 static int config_parse_socket_service(
1252                 const char *filename,
1253                 unsigned line,
1254                 const char *section,
1255                 const char *lvalue,
1256                 const char *rvalue,
1257                 void *data,
1258                 void *userdata) {
1259
1260         Socket *s = data;
1261         int r;
1262         DBusError error;
1263
1264         assert(filename);
1265         assert(lvalue);
1266         assert(rvalue);
1267         assert(data);
1268
1269         dbus_error_init(&error);
1270
1271         if (!endswith(rvalue, ".service")) {
1272                 log_error("[%s:%u] Unit must be of type service, ignoring: %s", filename, line, rvalue);
1273                 return 0;
1274         }
1275
1276         if ((r = manager_load_unit(s->meta.manager, rvalue, NULL, &error, (Unit**) &s->service)) < 0) {
1277                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1278                 dbus_error_free(&error);
1279                 return 0;
1280         }
1281
1282         return 0;
1283 }
1284
1285 static int config_parse_service_sockets(
1286                 const char *filename,
1287                 unsigned line,
1288                 const char *section,
1289                 const char *lvalue,
1290                 const char *rvalue,
1291                 void *data,
1292                 void *userdata) {
1293
1294         Service *s = data;
1295         int r;
1296         DBusError error;
1297         char *state, *w;
1298         size_t l;
1299
1300         assert(filename);
1301         assert(lvalue);
1302         assert(rvalue);
1303         assert(data);
1304
1305         dbus_error_init(&error);
1306
1307         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
1308                 char *t;
1309                 Unit *sock;
1310
1311                 if (!(t = strndup(w, l)))
1312                         return -ENOMEM;
1313
1314                 if (!endswith(t, ".socket")) {
1315                         log_error("[%s:%u] Unit must be of type socket, ignoring: %s", filename, line, rvalue);
1316                         free(t);
1317                         continue;
1318                 }
1319
1320                 r = manager_load_unit(s->meta.manager, t, NULL, &error, &sock);
1321                 free(t);
1322
1323                 if (r < 0) {
1324                         log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1325                         dbus_error_free(&error);
1326                         continue;
1327                 }
1328
1329                 if ((r = set_ensure_allocated(&s->configured_sockets, trivial_hash_func, trivial_compare_func)) < 0)
1330                         return r;
1331
1332                 if ((r = set_put(s->configured_sockets, sock)) < 0)
1333                         return r;
1334         }
1335
1336         return 0;
1337 }
1338
1339 static int config_parse_env_file(
1340                 const char *filename,
1341                 unsigned line,
1342                 const char *section,
1343                 const char *lvalue,
1344                 const char *rvalue,
1345                 void *data,
1346                 void *userdata) {
1347
1348         FILE *f;
1349         int r;
1350         char ***env = data;
1351         bool ignore = false;
1352
1353         assert(filename);
1354         assert(lvalue);
1355         assert(rvalue);
1356         assert(data);
1357
1358         if (rvalue[0] == '-') {
1359                 ignore = true;
1360                 rvalue++;
1361         }
1362
1363         if (!path_is_absolute(rvalue)) {
1364                 log_error("[%s:%u] Path '%s' is not absolute, ignoring.", filename, line, rvalue);
1365                 return 0;
1366         }
1367
1368         if (!(f = fopen(rvalue, "re"))) {
1369                 if (!ignore)
1370                         log_error("[%s:%u] Failed to open environment file '%s', ignoring: %m", filename, line, rvalue);
1371                 return 0;
1372         }
1373
1374         while (!feof(f)) {
1375                 char l[LINE_MAX], *p, *u;
1376                 char **t;
1377
1378                 if (!fgets(l, sizeof(l), f)) {
1379                         if (feof(f))
1380                                 break;
1381
1382                         r = -errno;
1383                         log_error("[%s:%u] Failed to read environment file '%s', ignoring: %m", filename, line, rvalue);
1384                         r = 0;
1385                         goto finish;
1386                 }
1387
1388                 p = strstrip(l);
1389
1390                 if (!*p)
1391                         continue;
1392
1393                 if (strchr(COMMENTS, *p))
1394                         continue;
1395
1396                 if (!(u = normalize_env_assignment(p))) {
1397                         log_error("Out of memory");
1398                         r = -ENOMEM;
1399                         goto finish;
1400                 }
1401
1402                 t = strv_append(*env, u);
1403                 free(u);
1404
1405                 if (!t) {
1406                         log_error("Out of memory");
1407                         r = -ENOMEM;
1408                         goto finish;
1409                 }
1410
1411                 strv_free(*env);
1412                 *env = t;
1413         }
1414
1415         r = 0;
1416
1417 finish:
1418         if (f)
1419                 fclose(f);
1420
1421         return r;
1422 }
1423
1424 static int config_parse_ip_tos(
1425                 const char *filename,
1426                 unsigned line,
1427                 const char *section,
1428                 const char *lvalue,
1429                 const char *rvalue,
1430                 void *data,
1431                 void *userdata) {
1432
1433         int *ip_tos = data, x;
1434         int r;
1435
1436         assert(filename);
1437         assert(lvalue);
1438         assert(rvalue);
1439         assert(data);
1440
1441         if ((x = ip_tos_from_string(rvalue)) < 0)
1442                 if ((r = safe_atoi(rvalue, &x)) < 0) {
1443                         log_error("[%s:%u] Failed to parse IP TOS value, ignoring: %s", filename, line, rvalue);
1444                         return 0;
1445                 }
1446
1447         *ip_tos = x;
1448         return 0;
1449 }
1450
1451 static int config_parse_condition_path(
1452                 const char *filename,
1453                 unsigned line,
1454                 const char *section,
1455                 const char *lvalue,
1456                 const char *rvalue,
1457                 void *data,
1458                 void *userdata) {
1459
1460         Unit *u = data;
1461         bool negate;
1462         Condition *c;
1463
1464         assert(filename);
1465         assert(lvalue);
1466         assert(rvalue);
1467         assert(data);
1468
1469         if ((negate = rvalue[0] == '!'))
1470                 rvalue++;
1471
1472         if (!path_is_absolute(rvalue)) {
1473                 log_error("[%s:%u] Path in condition not absolute, ignoring: %s", filename, line, rvalue);
1474                 return 0;
1475         }
1476
1477         if (!(c = condition_new(streq(lvalue, "ConditionPathExists") ? CONDITION_PATH_EXISTS : CONDITION_DIRECTORY_NOT_EMPTY,
1478                                 rvalue, negate)))
1479                 return -ENOMEM;
1480
1481         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1482         return 0;
1483 }
1484
1485 static int config_parse_condition_kernel(
1486                 const char *filename,
1487                 unsigned line,
1488                 const char *section,
1489                 const char *lvalue,
1490                 const char *rvalue,
1491                 void *data,
1492                 void *userdata) {
1493
1494         Unit *u = data;
1495         bool negate;
1496         Condition *c;
1497
1498         assert(filename);
1499         assert(lvalue);
1500         assert(rvalue);
1501         assert(data);
1502
1503         if ((negate = rvalue[0] == '!'))
1504                 rvalue++;
1505
1506         if (!(c = condition_new(CONDITION_KERNEL_COMMAND_LINE, rvalue, negate)))
1507                 return -ENOMEM;
1508
1509         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1510         return 0;
1511 }
1512
1513 static int config_parse_condition_null(
1514                 const char *filename,
1515                 unsigned line,
1516                 const char *section,
1517                 const char *lvalue,
1518                 const char *rvalue,
1519                 void *data,
1520                 void *userdata) {
1521
1522         Unit *u = data;
1523         Condition *c;
1524         bool negate;
1525         int b;
1526
1527         assert(filename);
1528         assert(lvalue);
1529         assert(rvalue);
1530         assert(data);
1531
1532         if ((negate = rvalue[0] == '!'))
1533                 rvalue++;
1534
1535         if ((b = parse_boolean(rvalue)) < 0) {
1536                 log_error("[%s:%u] Failed to parse boolean value in condition, ignoring: %s", filename, line, rvalue);
1537                 return 0;
1538         }
1539
1540         if (!b)
1541                 negate = !negate;
1542
1543         if (!(c = condition_new(CONDITION_NULL, NULL, negate)))
1544                 return -ENOMEM;
1545
1546         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1547         return 0;
1548 }
1549
1550 static DEFINE_CONFIG_PARSE_ENUM(config_parse_notify_access, notify_access, NotifyAccess, "Failed to parse notify access specifier");
1551
1552 #define FOLLOW_MAX 8
1553
1554 static int open_follow(char **filename, FILE **_f, Set *names, char **_final) {
1555         unsigned c = 0;
1556         int fd, r;
1557         FILE *f;
1558         char *id = NULL;
1559
1560         assert(filename);
1561         assert(*filename);
1562         assert(_f);
1563         assert(names);
1564
1565         /* This will update the filename pointer if the loaded file is
1566          * reached by a symlink. The old string will be freed. */
1567
1568         for (;;) {
1569                 char *target, *name;
1570
1571                 if (c++ >= FOLLOW_MAX)
1572                         return -ELOOP;
1573
1574                 path_kill_slashes(*filename);
1575
1576                 /* Add the file name we are currently looking at to
1577                  * the names of this unit, but only if it is a valid
1578                  * unit name. */
1579                 name = file_name_from_path(*filename);
1580
1581                 if (unit_name_is_valid(name, false)) {
1582                         if (!(id = set_get(names, name))) {
1583
1584                                 if (!(id = strdup(name)))
1585                                         return -ENOMEM;
1586
1587                                 if ((r = set_put(names, id)) < 0) {
1588                                         free(id);
1589                                         return r;
1590                                 }
1591                         }
1592                 }
1593
1594                 /* Try to open the file name, but don't if its a symlink */
1595                 if ((fd = open(*filename, O_RDONLY|O_CLOEXEC|O_NOCTTY|O_NOFOLLOW)) >= 0)
1596                         break;
1597
1598                 if (errno != ELOOP)
1599                         return -errno;
1600
1601                 /* Hmm, so this is a symlink. Let's read the name, and follow it manually */
1602                 if ((r = readlink_and_make_absolute(*filename, &target)) < 0)
1603                         return r;
1604
1605                 free(*filename);
1606                 *filename = target;
1607         }
1608
1609         if (!(f = fdopen(fd, "re"))) {
1610                 r = -errno;
1611                 close_nointr_nofail(fd);
1612                 return r;
1613         }
1614
1615         *_f = f;
1616         *_final = id;
1617         return 0;
1618 }
1619
1620 static int merge_by_names(Unit **u, Set *names, const char *id) {
1621         char *k;
1622         int r;
1623
1624         assert(u);
1625         assert(*u);
1626         assert(names);
1627
1628         /* Let's try to add in all symlink names we found */
1629         while ((k = set_steal_first(names))) {
1630
1631                 /* First try to merge in the other name into our
1632                  * unit */
1633                 if ((r = unit_merge_by_name(*u, k)) < 0) {
1634                         Unit *other;
1635
1636                         /* Hmm, we couldn't merge the other unit into
1637                          * ours? Then let's try it the other way
1638                          * round */
1639
1640                         other = manager_get_unit((*u)->meta.manager, k);
1641                         free(k);
1642
1643                         if (other)
1644                                 if ((r = unit_merge(other, *u)) >= 0) {
1645                                         *u = other;
1646                                         return merge_by_names(u, names, NULL);
1647                                 }
1648
1649                         return r;
1650                 }
1651
1652                 if (id == k)
1653                         unit_choose_id(*u, id);
1654
1655                 free(k);
1656         }
1657
1658         return 0;
1659 }
1660
1661 static void dump_items(FILE *f, const ConfigItem *items) {
1662         const ConfigItem *i;
1663         const char *prev_section = NULL;
1664         bool not_first = false;
1665
1666         struct {
1667                 ConfigParserCallback callback;
1668                 const char *rvalue;
1669         } table[] = {
1670                 { config_parse_int,              "INTEGER" },
1671                 { config_parse_unsigned,         "UNSIGNED" },
1672                 { config_parse_size,             "SIZE" },
1673                 { config_parse_bool,             "BOOLEAN" },
1674                 { config_parse_string,           "STRING" },
1675                 { config_parse_path,             "PATH" },
1676                 { config_parse_strv,             "STRING [...]" },
1677                 { config_parse_nice,             "NICE" },
1678                 { config_parse_oom_score_adjust, "OOMSCOREADJUST" },
1679                 { config_parse_io_class,         "IOCLASS" },
1680                 { config_parse_io_priority,      "IOPRIORITY" },
1681                 { config_parse_cpu_sched_policy, "CPUSCHEDPOLICY" },
1682                 { config_parse_cpu_sched_prio,   "CPUSCHEDPRIO" },
1683                 { config_parse_cpu_affinity,     "CPUAFFINITY" },
1684                 { config_parse_mode,             "MODE" },
1685                 { config_parse_env_file,         "FILE" },
1686                 { config_parse_output,           "OUTPUT" },
1687                 { config_parse_input,            "INPUT" },
1688                 { config_parse_facility,         "FACILITY" },
1689                 { config_parse_level,            "LEVEL" },
1690                 { config_parse_capabilities,     "CAPABILITIES" },
1691                 { config_parse_secure_bits,      "SECUREBITS" },
1692                 { config_parse_bounding_set,     "BOUNDINGSET" },
1693                 { config_parse_timer_slack_nsec, "TIMERSLACK" },
1694                 { config_parse_limit,            "LIMIT" },
1695                 { config_parse_cgroup,           "CGROUP [...]" },
1696                 { config_parse_deps,             "UNIT [...]" },
1697                 { config_parse_names,            "UNIT [...]" },
1698                 { config_parse_exec,             "PATH [ARGUMENT [...]]" },
1699                 { config_parse_service_type,     "SERVICETYPE" },
1700                 { config_parse_service_restart,  "SERVICERESTART" },
1701 #ifdef HAVE_SYSV_COMPAT
1702                 { config_parse_sysv_priority,    "SYSVPRIORITY" },
1703 #else
1704                 { config_parse_warn_compat,      "NOTSUPPORTED" },
1705 #endif
1706                 { config_parse_kill_mode,        "KILLMODE" },
1707                 { config_parse_kill_signal,      "SIGNAL" },
1708                 { config_parse_listen,           "SOCKET [...]" },
1709                 { config_parse_socket_bind,      "SOCKETBIND" },
1710                 { config_parse_bindtodevice,     "NETWORKINTERFACE" },
1711                 { config_parse_usec,             "SECONDS" },
1712                 { config_parse_path_strv,        "PATH [...]" },
1713                 { config_parse_mount_flags,      "MOUNTFLAG [...]" },
1714                 { config_parse_string_printf,    "STRING" },
1715                 { config_parse_timer,            "TIMER" },
1716                 { config_parse_timer_unit,       "NAME" },
1717                 { config_parse_path_spec,        "PATH" },
1718                 { config_parse_path_unit,        "UNIT" },
1719                 { config_parse_notify_access,    "ACCESS" },
1720                 { config_parse_ip_tos,           "TOS" },
1721                 { config_parse_condition_path,   "CONDITION" },
1722                 { config_parse_condition_kernel, "CONDITION" },
1723                 { config_parse_condition_null,   "CONDITION" },
1724         };
1725
1726         assert(f);
1727         assert(items);
1728
1729         for (i = items; i->lvalue; i++) {
1730                 unsigned j;
1731                 const char *rvalue = "OTHER";
1732
1733                 if (!streq_ptr(i->section, prev_section)) {
1734                         if (!not_first)
1735                                 not_first = true;
1736                         else
1737                                 fputc('\n', f);
1738
1739                         fprintf(f, "[%s]\n", i->section);
1740                         prev_section = i->section;
1741                 }
1742
1743                 for (j = 0; j < ELEMENTSOF(table); j++)
1744                         if (i->parse == table[j].callback) {
1745                                 rvalue = table[j].rvalue;
1746                                 break;
1747                         }
1748
1749                 fprintf(f, "%s=%s\n", i->lvalue, rvalue);
1750         }
1751 }
1752
1753 static int load_from_path(Unit *u, const char *path) {
1754
1755         static const char* const section_table[_UNIT_TYPE_MAX] = {
1756                 [UNIT_SERVICE]   = "Service",
1757                 [UNIT_TIMER]     = "Timer",
1758                 [UNIT_SOCKET]    = "Socket",
1759                 [UNIT_TARGET]    = "Target",
1760                 [UNIT_DEVICE]    = "Device",
1761                 [UNIT_MOUNT]     = "Mount",
1762                 [UNIT_AUTOMOUNT] = "Automount",
1763                 [UNIT_SNAPSHOT]  = "Snapshot",
1764                 [UNIT_SWAP]      = "Swap",
1765                 [UNIT_PATH]      = "Path"
1766         };
1767
1768 #define EXEC_CONTEXT_CONFIG_ITEMS(context, section) \
1769                 { "WorkingDirectory",       config_parse_path,            &(context).working_directory,                    section   }, \
1770                 { "RootDirectory",          config_parse_path,            &(context).root_directory,                       section   }, \
1771                 { "User",                   config_parse_string_printf,   &(context).user,                                 section   }, \
1772                 { "Group",                  config_parse_string_printf,   &(context).group,                                section   }, \
1773                 { "SupplementaryGroups",    config_parse_strv,            &(context).supplementary_groups,                 section   }, \
1774                 { "Nice",                   config_parse_nice,            &(context),                                      section   }, \
1775                 { "OOMScoreAdjust",         config_parse_oom_score_adjust,&(context),                                      section   }, \
1776                 { "IOSchedulingClass",      config_parse_io_class,        &(context),                                      section   }, \
1777                 { "IOSchedulingPriority",   config_parse_io_priority,     &(context),                                      section   }, \
1778                 { "CPUSchedulingPolicy",    config_parse_cpu_sched_policy,&(context),                                      section   }, \
1779                 { "CPUSchedulingPriority",  config_parse_cpu_sched_prio,  &(context),                                      section   }, \
1780                 { "CPUSchedulingResetOnFork", config_parse_bool,          &(context).cpu_sched_reset_on_fork,              section   }, \
1781                 { "CPUAffinity",            config_parse_cpu_affinity,    &(context),                                      section   }, \
1782                 { "UMask",                  config_parse_mode,            &(context).umask,                                section   }, \
1783                 { "Environment",            config_parse_strv,            &(context).environment,                          section   }, \
1784                 { "EnvironmentFile",        config_parse_env_file,        &(context).environment,                          section   }, \
1785                 { "StandardInput",          config_parse_input,           &(context).std_input,                            section   }, \
1786                 { "StandardOutput",         config_parse_output,          &(context).std_output,                           section   }, \
1787                 { "StandardError",          config_parse_output,          &(context).std_error,                            section   }, \
1788                 { "TTYPath",                config_parse_path,            &(context).tty_path,                             section   }, \
1789                 { "SyslogIdentifier",       config_parse_string_printf,   &(context).syslog_identifier,                    section   }, \
1790                 { "SyslogFacility",         config_parse_facility,        &(context).syslog_priority,                      section   }, \
1791                 { "SyslogLevel",            config_parse_level,           &(context).syslog_priority,                      section   }, \
1792                 { "SyslogLevelPrefix",      config_parse_bool,            &(context).syslog_level_prefix,                  section   }, \
1793                 { "Capabilities",           config_parse_capabilities,    &(context),                                      section   }, \
1794                 { "SecureBits",             config_parse_secure_bits,     &(context),                                      section   }, \
1795                 { "CapabilityBoundingSetDrop", config_parse_bounding_set, &(context),                                      section   }, \
1796                 { "TimerSlackNSec",         config_parse_timer_slack_nsec,&(context),                                      section   }, \
1797                 { "LimitCPU",               config_parse_limit,           &(context).rlimit[RLIMIT_CPU],                   section   }, \
1798                 { "LimitFSIZE",             config_parse_limit,           &(context).rlimit[RLIMIT_FSIZE],                 section   }, \
1799                 { "LimitDATA",              config_parse_limit,           &(context).rlimit[RLIMIT_DATA],                  section   }, \
1800                 { "LimitSTACK",             config_parse_limit,           &(context).rlimit[RLIMIT_STACK],                 section   }, \
1801                 { "LimitCORE",              config_parse_limit,           &(context).rlimit[RLIMIT_CORE],                  section   }, \
1802                 { "LimitRSS",               config_parse_limit,           &(context).rlimit[RLIMIT_RSS],                   section   }, \
1803                 { "LimitNOFILE",            config_parse_limit,           &(context).rlimit[RLIMIT_NOFILE],                section   }, \
1804                 { "LimitAS",                config_parse_limit,           &(context).rlimit[RLIMIT_AS],                    section   }, \
1805                 { "LimitNPROC",             config_parse_limit,           &(context).rlimit[RLIMIT_NPROC],                 section   }, \
1806                 { "LimitMEMLOCK",           config_parse_limit,           &(context).rlimit[RLIMIT_MEMLOCK],               section   }, \
1807                 { "LimitLOCKS",             config_parse_limit,           &(context).rlimit[RLIMIT_LOCKS],                 section   }, \
1808                 { "LimitSIGPENDING",        config_parse_limit,           &(context).rlimit[RLIMIT_SIGPENDING],            section   }, \
1809                 { "LimitMSGQUEUE",          config_parse_limit,           &(context).rlimit[RLIMIT_MSGQUEUE],              section   }, \
1810                 { "LimitNICE",              config_parse_limit,           &(context).rlimit[RLIMIT_NICE],                  section   }, \
1811                 { "LimitRTPRIO",            config_parse_limit,           &(context).rlimit[RLIMIT_RTPRIO],                section   }, \
1812                 { "LimitRTTIME",            config_parse_limit,           &(context).rlimit[RLIMIT_RTTIME],                section   }, \
1813                 { "ControlGroup",           config_parse_cgroup,          u,                                               section   }, \
1814                 { "ReadWriteDirectories",   config_parse_path_strv,       &(context).read_write_dirs,                      section   }, \
1815                 { "ReadOnlyDirectories",    config_parse_path_strv,       &(context).read_only_dirs,                       section   }, \
1816                 { "InaccessibleDirectories",config_parse_path_strv,       &(context).inaccessible_dirs,                    section   }, \
1817                 { "PrivateTmp",             config_parse_bool,            &(context).private_tmp,                          section   }, \
1818                 { "MountFlags",             config_parse_mount_flags,     &(context),                                      section   }, \
1819                 { "TCPWrapName",            config_parse_string_printf,   &(context).tcpwrap_name,                         section   }, \
1820                 { "PAMName",                config_parse_string_printf,   &(context).pam_name,                             section   }, \
1821                 { "KillMode",               config_parse_kill_mode,       &(context).kill_mode,                            section   }, \
1822                 { "KillSignal",             config_parse_kill_signal,     &(context).kill_signal,                          section   }, \
1823                 { "UtmpIdentifier",         config_parse_string_printf,   &(context).utmp_id,                              section   }
1824
1825         const ConfigItem items[] = {
1826                 { "Names",                  config_parse_names,           u,                                               "Unit"    },
1827                 { "Description",            config_parse_string_printf,   &u->meta.description,                            "Unit"    },
1828                 { "Requires",               config_parse_deps,            UINT_TO_PTR(UNIT_REQUIRES),                      "Unit"    },
1829                 { "RequiresOverridable",    config_parse_deps,            UINT_TO_PTR(UNIT_REQUIRES_OVERRIDABLE),          "Unit"    },
1830                 { "Requisite",              config_parse_deps,            UINT_TO_PTR(UNIT_REQUISITE),                     "Unit"    },
1831                 { "RequisiteOverridable",   config_parse_deps,            UINT_TO_PTR(UNIT_REQUISITE_OVERRIDABLE),         "Unit"    },
1832                 { "Wants",                  config_parse_deps,            UINT_TO_PTR(UNIT_WANTS),                         "Unit"    },
1833                 { "BindTo",                 config_parse_deps,            UINT_TO_PTR(UNIT_BIND_TO),                       "Unit"    },
1834                 { "Conflicts",              config_parse_deps,            UINT_TO_PTR(UNIT_CONFLICTS),                     "Unit"    },
1835                 { "Before",                 config_parse_deps,            UINT_TO_PTR(UNIT_BEFORE),                        "Unit"    },
1836                 { "After",                  config_parse_deps,            UINT_TO_PTR(UNIT_AFTER),                         "Unit"    },
1837                 { "OnFailure",              config_parse_deps,            UINT_TO_PTR(UNIT_ON_FAILURE),                    "Unit"    },
1838                 { "StopWhenUnneeded",       config_parse_bool,            &u->meta.stop_when_unneeded,                     "Unit"    },
1839                 { "RefuseManualStart",      config_parse_bool,            &u->meta.refuse_manual_start,                    "Unit"    },
1840                 { "RefuseManualStop",       config_parse_bool,            &u->meta.refuse_manual_stop,                     "Unit"    },
1841                 { "AllowIsolate",           config_parse_bool,            &u->meta.allow_isolate,                          "Unit"    },
1842                 { "DefaultDependencies",    config_parse_bool,            &u->meta.default_dependencies,                   "Unit"    },
1843                 { "JobTimeoutSec",          config_parse_usec,            &u->meta.job_timeout,                            "Unit"    },
1844                 { "ConditionPathExists",    config_parse_condition_path,  u,                                               "Unit"    },
1845                 { "ConditionDirectoryNotEmpty", config_parse_condition_path,  u,                                           "Unit"    },
1846                 { "ConditionKernelCommandLine", config_parse_condition_kernel, u,                                          "Unit"    },
1847                 { "ConditionNull",          config_parse_condition_null,  u,                                               "Unit"    },
1848
1849                 { "PIDFile",                config_parse_path,            &u->service.pid_file,                            "Service" },
1850                 { "ExecStartPre",           config_parse_exec,            u->service.exec_command+SERVICE_EXEC_START_PRE,  "Service" },
1851                 { "ExecStart",              config_parse_exec,            u->service.exec_command+SERVICE_EXEC_START,      "Service" },
1852                 { "ExecStartPost",          config_parse_exec,            u->service.exec_command+SERVICE_EXEC_START_POST, "Service" },
1853                 { "ExecReload",             config_parse_exec,            u->service.exec_command+SERVICE_EXEC_RELOAD,     "Service" },
1854                 { "ExecStop",               config_parse_exec,            u->service.exec_command+SERVICE_EXEC_STOP,       "Service" },
1855                 { "ExecStopPost",           config_parse_exec,            u->service.exec_command+SERVICE_EXEC_STOP_POST,  "Service" },
1856                 { "RestartSec",             config_parse_usec,            &u->service.restart_usec,                        "Service" },
1857                 { "TimeoutSec",             config_parse_usec,            &u->service.timeout_usec,                        "Service" },
1858                 { "Type",                   config_parse_service_type,    &u->service.type,                                "Service" },
1859                 { "Restart",                config_parse_service_restart, &u->service.restart,                             "Service" },
1860                 { "PermissionsStartOnly",   config_parse_bool,            &u->service.permissions_start_only,              "Service" },
1861                 { "RootDirectoryStartOnly", config_parse_bool,            &u->service.root_directory_start_only,           "Service" },
1862                 { "RemainAfterExit",        config_parse_bool,            &u->service.remain_after_exit,                   "Service" },
1863 #ifdef HAVE_SYSV_COMPAT
1864                 { "SysVStartPriority",      config_parse_sysv_priority,   &u->service.sysv_start_priority,                 "Service" },
1865 #else
1866                 { "SysVStartPriority",      config_parse_warn_compat,     NULL,                                            "Service" },
1867 #endif
1868                 { "NonBlocking",            config_parse_bool,            &u->service.exec_context.non_blocking,           "Service" },
1869                 { "BusName",                config_parse_string_printf,   &u->service.bus_name,                            "Service" },
1870                 { "NotifyAccess",           config_parse_notify_access,   &u->service.notify_access,                       "Service" },
1871                 { "Sockets",                config_parse_service_sockets, &u->service,                                     "Service" },
1872                 { "FsckPassNo",             config_parse_fsck_passno,     &u->service.fsck_passno,                         "Service" },
1873                 EXEC_CONTEXT_CONFIG_ITEMS(u->service.exec_context, "Service"),
1874
1875                 { "ListenStream",           config_parse_listen,          &u->socket,                                      "Socket"  },
1876                 { "ListenDatagram",         config_parse_listen,          &u->socket,                                      "Socket"  },
1877                 { "ListenSequentialPacket", config_parse_listen,          &u->socket,                                      "Socket"  },
1878                 { "ListenFIFO",             config_parse_listen,          &u->socket,                                      "Socket"  },
1879                 { "BindIPv6Only",           config_parse_socket_bind,     &u->socket,                                      "Socket"  },
1880                 { "Backlog",                config_parse_unsigned,        &u->socket.backlog,                              "Socket"  },
1881                 { "BindToDevice",           config_parse_bindtodevice,    &u->socket,                                      "Socket"  },
1882                 { "ExecStartPre",           config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_START_PRE,    "Socket"  },
1883                 { "ExecStartPost",          config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_START_POST,   "Socket"  },
1884                 { "ExecStopPre",            config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_STOP_PRE,     "Socket"  },
1885                 { "ExecStopPost",           config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_STOP_POST,    "Socket"  },
1886                 { "TimeoutSec",             config_parse_usec,            &u->socket.timeout_usec,                         "Socket"  },
1887                 { "DirectoryMode",          config_parse_mode,            &u->socket.directory_mode,                       "Socket"  },
1888                 { "SocketMode",             config_parse_mode,            &u->socket.socket_mode,                          "Socket"  },
1889                 { "Accept",                 config_parse_bool,            &u->socket.accept,                               "Socket"  },
1890                 { "MaxConnections",         config_parse_unsigned,        &u->socket.max_connections,                      "Socket"  },
1891                 { "KeepAlive",              config_parse_bool,            &u->socket.keep_alive,                           "Socket"  },
1892                 { "Priority",               config_parse_int,             &u->socket.priority,                             "Socket"  },
1893                 { "ReceiveBuffer",          config_parse_size,            &u->socket.receive_buffer,                       "Socket"  },
1894                 { "SendBuffer",             config_parse_size,            &u->socket.send_buffer,                          "Socket"  },
1895                 { "IPTOS",                  config_parse_ip_tos,          &u->socket.ip_tos,                               "Socket"  },
1896                 { "IPTTL",                  config_parse_int,             &u->socket.ip_ttl,                               "Socket"  },
1897                 { "Mark",                   config_parse_int,             &u->socket.mark,                                 "Socket"  },
1898                 { "PipeSize",               config_parse_size,            &u->socket.pipe_size,                            "Socket"  },
1899                 { "FreeBind",               config_parse_bool,            &u->socket.free_bind,                            "Socket"  },
1900                 { "TCPCongestion",          config_parse_string,          &u->socket.tcp_congestion,                       "Socket"  },
1901                 { "Service",                config_parse_socket_service,  &u->socket,                                      "Socket"  },
1902                 EXEC_CONTEXT_CONFIG_ITEMS(u->socket.exec_context, "Socket"),
1903
1904                 { "What",                   config_parse_string,          &u->mount.parameters_fragment.what,              "Mount"   },
1905                 { "Where",                  config_parse_path,            &u->mount.where,                                 "Mount"   },
1906                 { "Options",                config_parse_string,          &u->mount.parameters_fragment.options,           "Mount"   },
1907                 { "Type",                   config_parse_string,          &u->mount.parameters_fragment.fstype,            "Mount"   },
1908                 { "TimeoutSec",             config_parse_usec,            &u->mount.timeout_usec,                          "Mount"   },
1909                 { "DirectoryMode",          config_parse_mode,            &u->mount.directory_mode,                        "Mount"   },
1910                 EXEC_CONTEXT_CONFIG_ITEMS(u->mount.exec_context, "Mount"),
1911
1912                 { "Where",                  config_parse_path,            &u->automount.where,                             "Automount" },
1913                 { "DirectoryMode",          config_parse_mode,            &u->automount.directory_mode,                    "Automount" },
1914
1915                 { "What",                   config_parse_path,            &u->swap.parameters_fragment.what,               "Swap"    },
1916                 { "Priority",               config_parse_int,             &u->swap.parameters_fragment.priority,           "Swap"    },
1917
1918                 { "OnActiveSec",            config_parse_timer,           &u->timer,                                       "Timer"   },
1919                 { "OnBootSec",              config_parse_timer,           &u->timer,                                       "Timer"   },
1920                 { "OnStartupSec",           config_parse_timer,           &u->timer,                                       "Timer"   },
1921                 { "OnUnitActiveSec",        config_parse_timer,           &u->timer,                                       "Timer"   },
1922                 { "OnUnitInactiveSec",      config_parse_timer,           &u->timer,                                       "Timer"   },
1923                 { "Unit",                   config_parse_timer_unit,      &u->timer,                                       "Timer"   },
1924
1925                 { "PathExists",             config_parse_path_spec,       &u->path,                                        "Path"    },
1926                 { "PathChanged",            config_parse_path_spec,       &u->path,                                        "Path"    },
1927                 { "DirectoryNotEmpty",      config_parse_path_spec,       &u->path,                                        "Path"    },
1928                 { "Unit",                   config_parse_path_unit,       &u->path,                                        "Path"    },
1929
1930                 /* The [Install] section is ignored here. */
1931                 { "Alias",                  NULL,                         NULL,                                            "Install" },
1932                 { "WantedBy",               NULL,                         NULL,                                            "Install" },
1933                 { "Also",                   NULL,                         NULL,                                            "Install" },
1934
1935                 { NULL, NULL, NULL, NULL }
1936         };
1937
1938 #undef EXEC_CONTEXT_CONFIG_ITEMS
1939
1940         const char *sections[4];
1941         int r;
1942         Set *symlink_names;
1943         FILE *f = NULL;
1944         char *filename = NULL, *id = NULL;
1945         Unit *merged;
1946         struct stat st;
1947
1948         if (!u) {
1949                 /* Dirty dirty hack. */
1950                 dump_items((FILE*) path, items);
1951                 return 0;
1952         }
1953
1954         assert(u);
1955         assert(path);
1956
1957         sections[0] = "Unit";
1958         sections[1] = section_table[u->meta.type];
1959         sections[2] = "Install";
1960         sections[3] = NULL;
1961
1962         if (!(symlink_names = set_new(string_hash_func, string_compare_func)))
1963                 return -ENOMEM;
1964
1965         if (path_is_absolute(path)) {
1966
1967                 if (!(filename = strdup(path))) {
1968                         r = -ENOMEM;
1969                         goto finish;
1970                 }
1971
1972                 if ((r = open_follow(&filename, &f, symlink_names, &id)) < 0) {
1973                         free(filename);
1974                         filename = NULL;
1975
1976                         if (r != -ENOENT)
1977                                 goto finish;
1978                 }
1979
1980         } else  {
1981                 char **p;
1982
1983                 STRV_FOREACH(p, u->meta.manager->lookup_paths.unit_path) {
1984
1985                         /* Instead of opening the path right away, we manually
1986                          * follow all symlinks and add their name to our unit
1987                          * name set while doing so */
1988                         if (!(filename = path_make_absolute(path, *p))) {
1989                                 r = -ENOMEM;
1990                                 goto finish;
1991                         }
1992
1993                         if (u->meta.manager->unit_path_cache &&
1994                             !set_get(u->meta.manager->unit_path_cache, filename))
1995                                 r = -ENOENT;
1996                         else
1997                                 r = open_follow(&filename, &f, symlink_names, &id);
1998
1999                         if (r < 0) {
2000                                 char *sn;
2001
2002                                 free(filename);
2003                                 filename = NULL;
2004
2005                                 if (r != -ENOENT)
2006                                         goto finish;
2007
2008                                 /* Empty the symlink names for the next run */
2009                                 while ((sn = set_steal_first(symlink_names)))
2010                                         free(sn);
2011
2012                                 continue;
2013                         }
2014
2015                         break;
2016                 }
2017         }
2018
2019         if (!filename) {
2020                 /* Hmm, no suitable file found? */
2021                 r = 0;
2022                 goto finish;
2023         }
2024
2025         merged = u;
2026         if ((r = merge_by_names(&merged, symlink_names, id)) < 0)
2027                 goto finish;
2028
2029         if (merged != u) {
2030                 u->meta.load_state = UNIT_MERGED;
2031                 r = 0;
2032                 goto finish;
2033         }
2034
2035         zero(st);
2036         if (fstat(fileno(f), &st) < 0) {
2037                 r = -errno;
2038                 goto finish;
2039         }
2040
2041         if (null_or_empty(&st))
2042                 u->meta.load_state = UNIT_MASKED;
2043         else {
2044                 /* Now, parse the file contents */
2045                 if ((r = config_parse(filename, f, sections, items, false, u)) < 0)
2046                         goto finish;
2047
2048                 u->meta.load_state = UNIT_LOADED;
2049         }
2050
2051         free(u->meta.fragment_path);
2052         u->meta.fragment_path = filename;
2053         filename = NULL;
2054
2055         u->meta.fragment_mtime = timespec_load(&st.st_mtim);
2056
2057         r = 0;
2058
2059 finish:
2060         set_free_free(symlink_names);
2061         free(filename);
2062
2063         if (f)
2064                 fclose(f);
2065
2066         return r;
2067 }
2068
2069 int unit_load_fragment(Unit *u) {
2070         int r;
2071         Iterator i;
2072         const char *t;
2073
2074         assert(u);
2075         assert(u->meta.load_state == UNIT_STUB);
2076         assert(u->meta.id);
2077
2078         /* First, try to find the unit under its id. We always look
2079          * for unit files in the default directories, to make it easy
2080          * to override things by placing things in /etc/systemd/system */
2081         if ((r = load_from_path(u, u->meta.id)) < 0)
2082                 return r;
2083
2084         /* Try to find an alias we can load this with */
2085         if (u->meta.load_state == UNIT_STUB)
2086                 SET_FOREACH(t, u->meta.names, i) {
2087
2088                         if (t == u->meta.id)
2089                                 continue;
2090
2091                         if ((r = load_from_path(u, t)) < 0)
2092                                 return r;
2093
2094                         if (u->meta.load_state != UNIT_STUB)
2095                                 break;
2096                 }
2097
2098         /* And now, try looking for it under the suggested (originally linked) path */
2099         if (u->meta.load_state == UNIT_STUB && u->meta.fragment_path) {
2100
2101                 if ((r = load_from_path(u, u->meta.fragment_path)) < 0)
2102                         return r;
2103
2104                 if (u->meta.load_state == UNIT_STUB) {
2105                         /* Hmm, this didn't work? Then let's get rid
2106                          * of the fragment path stored for us, so that
2107                          * we don't point to an invalid location. */
2108                         free(u->meta.fragment_path);
2109                         u->meta.fragment_path = NULL;
2110                 }
2111         }
2112
2113         /* Look for a template */
2114         if (u->meta.load_state == UNIT_STUB && u->meta.instance) {
2115                 char *k;
2116
2117                 if (!(k = unit_name_template(u->meta.id)))
2118                         return -ENOMEM;
2119
2120                 r = load_from_path(u, k);
2121                 free(k);
2122
2123                 if (r < 0)
2124                         return r;
2125
2126                 if (u->meta.load_state == UNIT_STUB)
2127                         SET_FOREACH(t, u->meta.names, i) {
2128
2129                                 if (t == u->meta.id)
2130                                         continue;
2131
2132                                 if (!(k = unit_name_template(t)))
2133                                         return -ENOMEM;
2134
2135                                 r = load_from_path(u, k);
2136                                 free(k);
2137
2138                                 if (r < 0)
2139                                         return r;
2140
2141                                 if (u->meta.load_state != UNIT_STUB)
2142                                         break;
2143                         }
2144         }
2145
2146         return 0;
2147 }
2148
2149 void unit_dump_config_items(FILE *f) {
2150         /* OK, this wins a prize for extreme ugliness. */
2151
2152         load_from_path(NULL, (const void*) f);
2153 }