chiark / gitweb /
fc64ddd5a0f0b5bc49c2d0a4ec959c076fc64adb
[elogind.git] / src / load-fragment.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <linux/oom.h>
23 #include <assert.h>
24 #include <errno.h>
25 #include <string.h>
26 #include <unistd.h>
27 #include <fcntl.h>
28 #include <sched.h>
29 #include <sys/prctl.h>
30 #include <sys/mount.h>
31 #include <linux/fs.h>
32 #include <sys/stat.h>
33
34 #include "unit.h"
35 #include "strv.h"
36 #include "conf-parser.h"
37 #include "load-fragment.h"
38 #include "log.h"
39 #include "ioprio.h"
40 #include "securebits.h"
41 #include "missing.h"
42 #include "unit-name.h"
43 #include "bus-errors.h"
44
45 #ifndef HAVE_SYSV_COMPAT
46 static int config_parse_warn_compat(
47                 const char *filename,
48                 unsigned line,
49                 const char *section,
50                 const char *lvalue,
51                 const char *rvalue,
52                 void *data,
53                 void *userdata) {
54
55         log_debug("[%s:%u] Support for option %s= has been disabled at compile time and is ignored", filename, line, lvalue);
56         return 0;
57 }
58 #endif
59
60 static int config_parse_deps(
61                 const char *filename,
62                 unsigned line,
63                 const char *section,
64                 const char *lvalue,
65                 const char *rvalue,
66                 void *data,
67                 void *userdata) {
68
69         UnitDependency d = PTR_TO_UINT(data);
70         Unit *u = userdata;
71         char *w;
72         size_t l;
73         char *state;
74
75         assert(filename);
76         assert(lvalue);
77         assert(rvalue);
78
79         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
80                 char *t, *k;
81                 int r;
82
83                 if (!(t = strndup(w, l)))
84                         return -ENOMEM;
85
86                 k = unit_name_printf(u, t);
87                 free(t);
88
89                 if (!k)
90                         return -ENOMEM;
91
92                 r = unit_add_dependency_by_name(u, d, k, NULL, true);
93
94                 if (r < 0) {
95                         log_error("Failed to add dependency on %s, ignoring: %s", k, strerror(-r));
96                         free(k);
97                         return 0;
98                 }
99
100                 free(k);
101         }
102
103         return 0;
104 }
105
106 static int config_parse_names(
107                 const char *filename,
108                 unsigned line,
109                 const char *section,
110                 const char *lvalue,
111                 const char *rvalue,
112                 void *data,
113                 void *userdata) {
114
115         Unit *u = userdata;
116         char *w;
117         size_t l;
118         char *state;
119
120         assert(filename);
121         assert(lvalue);
122         assert(rvalue);
123         assert(data);
124
125         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
126                 char *t, *k;
127                 int r;
128
129                 if (!(t = strndup(w, l)))
130                         return -ENOMEM;
131
132                 k = unit_name_printf(u, t);
133                 free(t);
134
135                 if (!k)
136                         return -ENOMEM;
137
138                 r = unit_merge_by_name(u, k);
139
140                 if (r < 0) {
141                         log_error("Failed to add name %s, ignoring: %s", k, strerror(-r));
142                         free(k);
143                         return 0;
144                 }
145
146                 free(k);
147         }
148
149         return 0;
150 }
151
152 static int config_parse_string_printf(
153                 const char *filename,
154                 unsigned line,
155                 const char *section,
156                 const char *lvalue,
157                 const char *rvalue,
158                 void *data,
159                 void *userdata) {
160
161         Unit *u = userdata;
162         char **s = data;
163         char *k;
164
165         assert(filename);
166         assert(lvalue);
167         assert(rvalue);
168         assert(s);
169         assert(u);
170
171         if (!(k = unit_full_printf(u, rvalue)))
172                 return -ENOMEM;
173
174         free(*s);
175         if (*k)
176                 *s = k;
177         else {
178                 free(k);
179                 *s = NULL;
180         }
181
182         return 0;
183 }
184
185 static int config_parse_listen(
186                 const char *filename,
187                 unsigned line,
188                 const char *section,
189                 const char *lvalue,
190                 const char *rvalue,
191                 void *data,
192                 void *userdata) {
193
194         SocketPort *p;
195         Socket *s;
196
197         assert(filename);
198         assert(lvalue);
199         assert(rvalue);
200         assert(data);
201
202         s = (Socket*) data;
203
204         if (!(p = new0(SocketPort, 1)))
205                 return -ENOMEM;
206
207         if (streq(lvalue, "ListenFIFO")) {
208                 p->type = SOCKET_FIFO;
209
210                 if (!(p->path = strdup(rvalue))) {
211                         free(p);
212                         return -ENOMEM;
213                 }
214
215                 path_kill_slashes(p->path);
216         } else {
217                 p->type = SOCKET_SOCKET;
218
219                 if (socket_address_parse(&p->address, rvalue) < 0) {
220                         log_error("[%s:%u] Failed to parse address value, ignoring: %s", filename, line, rvalue);
221                         free(p);
222                         return 0;
223                 }
224
225                 if (streq(lvalue, "ListenStream"))
226                         p->address.type = SOCK_STREAM;
227                 else if (streq(lvalue, "ListenDatagram"))
228                         p->address.type = SOCK_DGRAM;
229                 else {
230                         assert(streq(lvalue, "ListenSequentialPacket"));
231                         p->address.type = SOCK_SEQPACKET;
232                 }
233
234                 if (socket_address_family(&p->address) != AF_LOCAL && p->address.type == SOCK_SEQPACKET) {
235                         log_error("[%s:%u] Address family not supported, ignoring: %s", filename, line, rvalue);
236                         free(p);
237                         return 0;
238                 }
239         }
240
241         p->fd = -1;
242         LIST_PREPEND(SocketPort, port, s->ports, p);
243
244         return 0;
245 }
246
247 static int config_parse_socket_bind(
248                 const char *filename,
249                 unsigned line,
250                 const char *section,
251                 const char *lvalue,
252                 const char *rvalue,
253                 void *data,
254                 void *userdata) {
255
256         Socket *s;
257         SocketAddressBindIPv6Only b;
258
259         assert(filename);
260         assert(lvalue);
261         assert(rvalue);
262         assert(data);
263
264         s = (Socket*) data;
265
266         if ((b = socket_address_bind_ipv6_only_from_string(rvalue)) < 0) {
267                 int r;
268
269                 if ((r = parse_boolean(rvalue)) < 0) {
270                         log_error("[%s:%u] Failed to parse bind IPv6 only value, ignoring: %s", filename, line, rvalue);
271                         return 0;
272                 }
273
274                 s->bind_ipv6_only = r ? SOCKET_ADDRESS_IPV6_ONLY : SOCKET_ADDRESS_BOTH;
275         } else
276                 s->bind_ipv6_only = b;
277
278         return 0;
279 }
280
281 static int config_parse_nice(
282                 const char *filename,
283                 unsigned line,
284                 const char *section,
285                 const char *lvalue,
286                 const char *rvalue,
287                 void *data,
288                 void *userdata) {
289
290         ExecContext *c = data;
291         int priority;
292
293         assert(filename);
294         assert(lvalue);
295         assert(rvalue);
296         assert(data);
297
298         if (safe_atoi(rvalue, &priority) < 0) {
299                 log_error("[%s:%u] Failed to parse nice priority, ignoring: %s. ", filename, line, rvalue);
300                 return 0;
301         }
302
303         if (priority < PRIO_MIN || priority >= PRIO_MAX) {
304                 log_error("[%s:%u] Nice priority out of range, ignoring: %s", filename, line, rvalue);
305                 return 0;
306         }
307
308         c->nice = priority;
309         c->nice_set = true;
310
311         return 0;
312 }
313
314 static int config_parse_oom_score_adjust(
315                 const char *filename,
316                 unsigned line,
317                 const char *section,
318                 const char *lvalue,
319                 const char *rvalue,
320                 void *data,
321                 void *userdata) {
322
323         ExecContext *c = data;
324         int oa;
325
326         assert(filename);
327         assert(lvalue);
328         assert(rvalue);
329         assert(data);
330
331         if (safe_atoi(rvalue, &oa) < 0) {
332                 log_error("[%s:%u] Failed to parse the OOM score adjust value, ignoring: %s", filename, line, rvalue);
333                 return 0;
334         }
335
336         if (oa < OOM_SCORE_ADJ_MIN || oa > OOM_SCORE_ADJ_MAX) {
337                 log_error("[%s:%u] OOM score adjust value out of range, ignoring: %s", filename, line, rvalue);
338                 return 0;
339         }
340
341         c->oom_score_adjust = oa;
342         c->oom_score_adjust_set = true;
343
344         return 0;
345 }
346
347 static int config_parse_mode(
348                 const char *filename,
349                 unsigned line,
350                 const char *section,
351                 const char *lvalue,
352                 const char *rvalue,
353                 void *data,
354                 void *userdata) {
355
356         mode_t *m = data;
357         long l;
358         char *x = NULL;
359
360         assert(filename);
361         assert(lvalue);
362         assert(rvalue);
363         assert(data);
364
365         errno = 0;
366         l = strtol(rvalue, &x, 8);
367         if (!x || *x || errno) {
368                 log_error("[%s:%u] Failed to parse mode value, ignoring: %s", filename, line, rvalue);
369                 return 0;
370         }
371
372         if (l < 0000 || l > 07777) {
373                 log_error("[%s:%u] mode value out of range, ignoring: %s", filename, line, rvalue);
374                 return 0;
375         }
376
377         *m = (mode_t) l;
378         return 0;
379 }
380
381 static int config_parse_exec(
382                 const char *filename,
383                 unsigned line,
384                 const char *section,
385                 const char *lvalue,
386                 const char *rvalue,
387                 void *data,
388                 void *userdata) {
389
390         ExecCommand **e = data, *nce;
391         char *path, **n;
392         unsigned k;
393
394         assert(filename);
395         assert(lvalue);
396         assert(rvalue);
397         assert(e);
398
399         /* We accept an absolute path as first argument, or
400          * alternatively an absolute prefixed with @ to allow
401          * overriding of argv[0]. */
402
403         for (;;) {
404                 char *w;
405                 size_t l;
406                 char *state;
407                 bool honour_argv0 = false, ignore = false;
408
409                 path = NULL;
410                 nce = NULL;
411                 n = NULL;
412
413                 rvalue += strspn(rvalue, WHITESPACE);
414
415                 if (rvalue[0] == 0)
416                         break;
417
418                 if (rvalue[0] == '-') {
419                         ignore = true;
420                         rvalue ++;
421                 }
422
423                 if (rvalue[0] == '@') {
424                         honour_argv0 = true;
425                         rvalue ++;
426                 }
427
428                 if (*rvalue != '/') {
429                         log_error("[%s:%u] Invalid executable path in command line, ignoring: %s", filename, line, rvalue);
430                         return 0;
431                 }
432
433                 k = 0;
434                 FOREACH_WORD_QUOTED(w, l, rvalue, state) {
435                         if (strncmp(w, ";", MAX(l, 1U)) == 0)
436                                 break;
437
438                         k++;
439                 }
440
441                 if (!(n = new(char*, k + !honour_argv0)))
442                         return -ENOMEM;
443
444                 k = 0;
445                 FOREACH_WORD_QUOTED(w, l, rvalue, state) {
446                         if (strncmp(w, ";", MAX(l, 1U)) == 0)
447                                 break;
448
449                         if (honour_argv0 && w == rvalue) {
450                                 assert(!path);
451                                 if (!(path = cunescape_length(w, l)))
452                                         goto fail;
453                         } else {
454                                 if (!(n[k++] = cunescape_length(w, l)))
455                                         goto fail;
456                         }
457                 }
458
459                 n[k] = NULL;
460
461                 if (!n[0]) {
462                         log_error("[%s:%u] Invalid command line, ignoring: %s", filename, line, rvalue);
463                         strv_free(n);
464                         return 0;
465                 }
466
467                 if (!path)
468                         if (!(path = strdup(n[0])))
469                                 goto fail;
470
471                 assert(path_is_absolute(path));
472
473                 if (!(nce = new0(ExecCommand, 1)))
474                         goto fail;
475
476                 nce->argv = n;
477                 nce->path = path;
478                 nce->ignore = ignore;
479
480                 path_kill_slashes(nce->path);
481
482                 exec_command_append_list(e, nce);
483
484                 rvalue = state;
485         }
486
487         return 0;
488
489 fail:
490         n[k] = NULL;
491         strv_free(n);
492         free(path);
493         free(nce);
494
495         return -ENOMEM;
496 }
497
498 static int config_parse_usec(
499                 const char *filename,
500                 unsigned line,
501                 const char *section,
502                 const char *lvalue,
503                 const char *rvalue,
504                 void *data,
505                 void *userdata) {
506
507         usec_t *usec = data;
508
509         assert(filename);
510         assert(lvalue);
511         assert(rvalue);
512         assert(data);
513
514         if (parse_usec(rvalue, usec) < 0) {
515                 log_error("[%s:%u] Failed to parse time value, ignoring: %s", filename, line, rvalue);
516                 return 0;
517         }
518
519         return 0;
520 }
521
522 static DEFINE_CONFIG_PARSE_ENUM(config_parse_service_type, service_type, ServiceType, "Failed to parse service type");
523 static DEFINE_CONFIG_PARSE_ENUM(config_parse_service_restart, service_restart, ServiceRestart, "Failed to parse service restart specifier");
524
525 static int config_parse_bindtodevice(
526                 const char *filename,
527                 unsigned line,
528                 const char *section,
529                 const char *lvalue,
530                 const char *rvalue,
531                 void *data,
532                 void *userdata) {
533
534         Socket *s = data;
535         char *n;
536
537         assert(filename);
538         assert(lvalue);
539         assert(rvalue);
540         assert(data);
541
542         if (rvalue[0] && !streq(rvalue, "*")) {
543                 if (!(n = strdup(rvalue)))
544                         return -ENOMEM;
545         } else
546                 n = NULL;
547
548         free(s->bind_to_device);
549         s->bind_to_device = n;
550
551         return 0;
552 }
553
554 static DEFINE_CONFIG_PARSE_ENUM(config_parse_output, exec_output, ExecOutput, "Failed to parse output specifier");
555 static DEFINE_CONFIG_PARSE_ENUM(config_parse_input, exec_input, ExecInput, "Failed to parse input specifier");
556
557 static int config_parse_facility(
558                 const char *filename,
559                 unsigned line,
560                 const char *section,
561                 const char *lvalue,
562                 const char *rvalue,
563                 void *data,
564                 void *userdata) {
565
566
567         int *o = data, x;
568
569         assert(filename);
570         assert(lvalue);
571         assert(rvalue);
572         assert(data);
573
574         if ((x = log_facility_from_string(rvalue)) < 0) {
575                 log_error("[%s:%u] Failed to parse log facility, ignoring: %s", filename, line, rvalue);
576                 return 0;
577         }
578
579         *o = LOG_MAKEPRI(x, LOG_PRI(*o));
580
581         return 0;
582 }
583
584 static int config_parse_level(
585                 const char *filename,
586                 unsigned line,
587                 const char *section,
588                 const char *lvalue,
589                 const char *rvalue,
590                 void *data,
591                 void *userdata) {
592
593
594         int *o = data, x;
595
596         assert(filename);
597         assert(lvalue);
598         assert(rvalue);
599         assert(data);
600
601         if ((x = log_level_from_string(rvalue)) < 0) {
602                 log_error("[%s:%u] Failed to parse log level, ignoring: %s", filename, line, rvalue);
603                 return 0;
604         }
605
606         *o = LOG_MAKEPRI(LOG_FAC(*o), x);
607         return 0;
608 }
609
610 static int config_parse_io_class(
611                 const char *filename,
612                 unsigned line,
613                 const char *section,
614                 const char *lvalue,
615                 const char *rvalue,
616                 void *data,
617                 void *userdata) {
618
619         ExecContext *c = data;
620         int x;
621
622         assert(filename);
623         assert(lvalue);
624         assert(rvalue);
625         assert(data);
626
627         if ((x = ioprio_class_from_string(rvalue)) < 0) {
628                 log_error("[%s:%u] Failed to parse IO scheduling class, ignoring: %s", filename, line, rvalue);
629                 return 0;
630         }
631
632         c->ioprio = IOPRIO_PRIO_VALUE(x, IOPRIO_PRIO_DATA(c->ioprio));
633         c->ioprio_set = true;
634
635         return 0;
636 }
637
638 static int config_parse_io_priority(
639                 const char *filename,
640                 unsigned line,
641                 const char *section,
642                 const char *lvalue,
643                 const char *rvalue,
644                 void *data,
645                 void *userdata) {
646
647         ExecContext *c = data;
648         int i;
649
650         assert(filename);
651         assert(lvalue);
652         assert(rvalue);
653         assert(data);
654
655         if (safe_atoi(rvalue, &i) < 0 || i < 0 || i >= IOPRIO_BE_NR) {
656                 log_error("[%s:%u] Failed to parse io priority, ignoring: %s", filename, line, rvalue);
657                 return 0;
658         }
659
660         c->ioprio = IOPRIO_PRIO_VALUE(IOPRIO_PRIO_CLASS(c->ioprio), i);
661         c->ioprio_set = true;
662
663         return 0;
664 }
665
666 static int config_parse_cpu_sched_policy(
667                 const char *filename,
668                 unsigned line,
669                 const char *section,
670                 const char *lvalue,
671                 const char *rvalue,
672                 void *data,
673                 void *userdata) {
674
675
676         ExecContext *c = data;
677         int x;
678
679         assert(filename);
680         assert(lvalue);
681         assert(rvalue);
682         assert(data);
683
684         if ((x = sched_policy_from_string(rvalue)) < 0) {
685                 log_error("[%s:%u] Failed to parse CPU scheduling policy, ignoring: %s", filename, line, rvalue);
686                 return 0;
687         }
688
689         c->cpu_sched_policy = x;
690         c->cpu_sched_set = true;
691
692         return 0;
693 }
694
695 static int config_parse_cpu_sched_prio(
696                 const char *filename,
697                 unsigned line,
698                 const char *section,
699                 const char *lvalue,
700                 const char *rvalue,
701                 void *data,
702                 void *userdata) {
703
704         ExecContext *c = data;
705         int i;
706
707         assert(filename);
708         assert(lvalue);
709         assert(rvalue);
710         assert(data);
711
712         /* On Linux RR/FIFO have the same range */
713         if (safe_atoi(rvalue, &i) < 0 || i < sched_get_priority_min(SCHED_RR) || i > sched_get_priority_max(SCHED_RR)) {
714                 log_error("[%s:%u] Failed to parse CPU scheduling priority, ignoring: %s", filename, line, rvalue);
715                 return 0;
716         }
717
718         c->cpu_sched_priority = i;
719         c->cpu_sched_set = true;
720
721         return 0;
722 }
723
724 static int config_parse_cpu_affinity(
725                 const char *filename,
726                 unsigned line,
727                 const char *section,
728                 const char *lvalue,
729                 const char *rvalue,
730                 void *data,
731                 void *userdata) {
732
733         ExecContext *c = data;
734         char *w;
735         size_t l;
736         char *state;
737
738         assert(filename);
739         assert(lvalue);
740         assert(rvalue);
741         assert(data);
742
743         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
744                 char *t;
745                 int r;
746                 unsigned cpu;
747
748                 if (!(t = strndup(w, l)))
749                         return -ENOMEM;
750
751                 r = safe_atou(t, &cpu);
752                 free(t);
753
754                 if (!(c->cpuset))
755                         if (!(c->cpuset = cpu_set_malloc(&c->cpuset_ncpus)))
756                                 return -ENOMEM;
757
758                 if (r < 0 || cpu >= c->cpuset_ncpus) {
759                         log_error("[%s:%u] Failed to parse CPU affinity, ignoring: %s", filename, line, rvalue);
760                         return 0;
761                 }
762
763                 CPU_SET_S(cpu, CPU_ALLOC_SIZE(c->cpuset_ncpus), c->cpuset);
764         }
765
766         return 0;
767 }
768
769 static int config_parse_capabilities(
770                 const char *filename,
771                 unsigned line,
772                 const char *section,
773                 const char *lvalue,
774                 const char *rvalue,
775                 void *data,
776                 void *userdata) {
777
778         ExecContext *c = data;
779         cap_t cap;
780
781         assert(filename);
782         assert(lvalue);
783         assert(rvalue);
784         assert(data);
785
786         if (!(cap = cap_from_text(rvalue))) {
787                 if (errno == ENOMEM)
788                         return -ENOMEM;
789
790                 log_error("[%s:%u] Failed to parse capabilities, ignoring: %s", filename, line, rvalue);
791                 return 0;
792         }
793
794         if (c->capabilities)
795                 cap_free(c->capabilities);
796         c->capabilities = cap;
797
798         return 0;
799 }
800
801 static int config_parse_secure_bits(
802                 const char *filename,
803                 unsigned line,
804                 const char *section,
805                 const char *lvalue,
806                 const char *rvalue,
807                 void *data,
808                 void *userdata) {
809
810         ExecContext *c = data;
811         char *w;
812         size_t l;
813         char *state;
814
815         assert(filename);
816         assert(lvalue);
817         assert(rvalue);
818         assert(data);
819
820         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
821                 if (first_word(w, "keep-caps"))
822                         c->secure_bits |= SECURE_KEEP_CAPS;
823                 else if (first_word(w, "keep-caps-locked"))
824                         c->secure_bits |= SECURE_KEEP_CAPS_LOCKED;
825                 else if (first_word(w, "no-setuid-fixup"))
826                         c->secure_bits |= SECURE_NO_SETUID_FIXUP;
827                 else if (first_word(w, "no-setuid-fixup-locked"))
828                         c->secure_bits |= SECURE_NO_SETUID_FIXUP_LOCKED;
829                 else if (first_word(w, "noroot"))
830                         c->secure_bits |= SECURE_NOROOT;
831                 else if (first_word(w, "noroot-locked"))
832                         c->secure_bits |= SECURE_NOROOT_LOCKED;
833                 else {
834                         log_error("[%s:%u] Failed to parse secure bits, ignoring: %s", filename, line, rvalue);
835                         return 0;
836                 }
837         }
838
839         return 0;
840 }
841
842 static int config_parse_bounding_set(
843                 const char *filename,
844                 unsigned line,
845                 const char *section,
846                 const char *lvalue,
847                 const char *rvalue,
848                 void *data,
849                 void *userdata) {
850
851         ExecContext *c = data;
852         char *w;
853         size_t l;
854         char *state;
855
856         assert(filename);
857         assert(lvalue);
858         assert(rvalue);
859         assert(data);
860
861         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
862                 char *t;
863                 int r;
864                 cap_value_t cap;
865
866                 if (!(t = strndup(w, l)))
867                         return -ENOMEM;
868
869                 r = cap_from_name(t, &cap);
870                 free(t);
871
872                 if (r < 0) {
873                         log_error("[%s:%u] Failed to parse capability bounding set, ignoring: %s", filename, line, rvalue);
874                         return 0;
875                 }
876
877                 c->capability_bounding_set_drop |= 1 << cap;
878         }
879
880         return 0;
881 }
882
883 static int config_parse_timer_slack_nsec(
884                 const char *filename,
885                 unsigned line,
886                 const char *section,
887                 const char *lvalue,
888                 const char *rvalue,
889                 void *data,
890                 void *userdata) {
891
892         ExecContext *c = data;
893         unsigned long u;
894
895         assert(filename);
896         assert(lvalue);
897         assert(rvalue);
898         assert(data);
899
900         if (safe_atolu(rvalue, &u) < 0) {
901                 log_error("[%s:%u] Failed to parse time slack value, ignoring: %s", filename, line, rvalue);
902                 return 0;
903         }
904
905         c->timer_slack_nsec = u;
906
907         return 0;
908 }
909
910 static int config_parse_limit(
911                 const char *filename,
912                 unsigned line,
913                 const char *section,
914                 const char *lvalue,
915                 const char *rvalue,
916                 void *data,
917                 void *userdata) {
918
919         struct rlimit **rl = data;
920         unsigned long long u;
921         int r;
922
923         assert(filename);
924         assert(lvalue);
925         assert(rvalue);
926         assert(data);
927
928         if (safe_atollu(rvalue, &u) < 0) {
929                 log_error("[%s:%u] Failed to parse resource value, ignoring: %s", filename, line, rvalue);
930                 return 0;
931         }
932
933         if (!*rl)
934                 if (!(*rl = new(struct rlimit, 1)))
935                         return -ENOMEM;
936
937         (*rl)->rlim_cur = (*rl)->rlim_max = (rlim_t) u;
938         return 0;
939 }
940
941 static int config_parse_cgroup(
942                 const char *filename,
943                 unsigned line,
944                 const char *section,
945                 const char *lvalue,
946                 const char *rvalue,
947                 void *data,
948                 void *userdata) {
949
950         Unit *u = userdata;
951         char *w;
952         size_t l;
953         char *state;
954
955         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
956                 char *t;
957                 int r;
958
959                 if (!(t = cunescape_length(w, l)))
960                         return -ENOMEM;
961
962                 r = unit_add_cgroup_from_text(u, t);
963                 free(t);
964
965                 if (r < 0) {
966                         log_error("[%s:%u] Failed to parse cgroup value, ignoring: %s", filename, line, rvalue);
967                         return 0;
968                 }
969         }
970
971         return 0;
972 }
973
974 #ifdef HAVE_SYSV_COMPAT
975 static int config_parse_sysv_priority(
976                 const char *filename,
977                 unsigned line,
978                 const char *section,
979                 const char *lvalue,
980                 const char *rvalue,
981                 void *data,
982                 void *userdata) {
983
984         int *priority = data;
985         int i;
986
987         assert(filename);
988         assert(lvalue);
989         assert(rvalue);
990         assert(data);
991
992         if (safe_atoi(rvalue, &i) < 0 || i < 0) {
993                 log_error("[%s:%u] Failed to parse SysV start priority, ignoring: %s", filename, line, rvalue);
994                 return 0;
995         }
996
997         *priority = (int) i;
998         return 0;
999 }
1000 #endif
1001
1002 static int config_parse_fsck_passno(
1003                 const char *filename,
1004                 unsigned line,
1005                 const char *section,
1006                 const char *lvalue,
1007                 const char *rvalue,
1008                 void *data,
1009                 void *userdata) {
1010
1011         int *passno = data;
1012         int i;
1013
1014         assert(filename);
1015         assert(lvalue);
1016         assert(rvalue);
1017         assert(data);
1018
1019         if (safe_atoi(rvalue, &i) || i < 0) {
1020                 log_error("[%s:%u] Failed to parse fsck pass number, ignoring: %s", filename, line, rvalue);
1021                 return 0;
1022         }
1023
1024         *passno = (int) i;
1025         return 0;
1026 }
1027
1028 static DEFINE_CONFIG_PARSE_ENUM(config_parse_kill_mode, kill_mode, KillMode, "Failed to parse kill mode");
1029
1030 static int config_parse_kill_signal(
1031                 const char *filename,
1032                 unsigned line,
1033                 const char *section,
1034                 const char *lvalue,
1035                 const char *rvalue,
1036                 void *data,
1037                 void *userdata) {
1038
1039         int *sig = data;
1040         int r;
1041
1042         assert(filename);
1043         assert(lvalue);
1044         assert(rvalue);
1045         assert(sig);
1046
1047         if ((r = signal_from_string_try_harder(rvalue)) <= 0) {
1048                 log_error("[%s:%u] Failed to parse kill signal, ignoring: %s", filename, line, rvalue);
1049                 return 0;
1050         }
1051
1052         *sig = r;
1053         return 0;
1054 }
1055
1056 static int config_parse_mount_flags(
1057                 const char *filename,
1058                 unsigned line,
1059                 const char *section,
1060                 const char *lvalue,
1061                 const char *rvalue,
1062                 void *data,
1063                 void *userdata) {
1064
1065         ExecContext *c = data;
1066         char *w;
1067         size_t l;
1068         char *state;
1069         unsigned long flags = 0;
1070
1071         assert(filename);
1072         assert(lvalue);
1073         assert(rvalue);
1074         assert(data);
1075
1076         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
1077                 if (strncmp(w, "shared", MAX(l, 6U)) == 0)
1078                         flags |= MS_SHARED;
1079                 else if (strncmp(w, "slave", MAX(l, 5U)) == 0)
1080                         flags |= MS_SLAVE;
1081                 else if (strncmp(w, "private", MAX(l, 7U)) == 0)
1082                         flags |= MS_PRIVATE;
1083                 else {
1084                         log_error("[%s:%u] Failed to parse mount flags, ignoring: %s", filename, line, rvalue);
1085                         return 0;
1086                 }
1087         }
1088
1089         c->mount_flags = flags;
1090         return 0;
1091 }
1092
1093 static int config_parse_timer(
1094                 const char *filename,
1095                 unsigned line,
1096                 const char *section,
1097                 const char *lvalue,
1098                 const char *rvalue,
1099                 void *data,
1100                 void *userdata) {
1101
1102         Timer *t = data;
1103         usec_t u;
1104         TimerValue *v;
1105         TimerBase b;
1106
1107         assert(filename);
1108         assert(lvalue);
1109         assert(rvalue);
1110         assert(data);
1111
1112         if ((b = timer_base_from_string(lvalue)) < 0) {
1113                 log_error("[%s:%u] Failed to parse timer base, ignoring: %s", filename, line, lvalue);
1114                 return 0;
1115         }
1116
1117         if (parse_usec(rvalue, &u) < 0) {
1118                 log_error("[%s:%u] Failed to parse timer value, ignoring: %s", filename, line, rvalue);
1119                 return 0;
1120         }
1121
1122         if (!(v = new0(TimerValue, 1)))
1123                 return -ENOMEM;
1124
1125         v->base = b;
1126         v->value = u;
1127
1128         LIST_PREPEND(TimerValue, value, t->values, v);
1129
1130         return 0;
1131 }
1132
1133 static int config_parse_timer_unit(
1134                 const char *filename,
1135                 unsigned line,
1136                 const char *section,
1137                 const char *lvalue,
1138                 const char *rvalue,
1139                 void *data,
1140                 void *userdata) {
1141
1142         Timer *t = data;
1143         int r;
1144         DBusError error;
1145
1146         assert(filename);
1147         assert(lvalue);
1148         assert(rvalue);
1149         assert(data);
1150
1151         dbus_error_init(&error);
1152
1153         if (endswith(rvalue, ".timer")) {
1154                 log_error("[%s:%u] Unit cannot be of type timer, ignoring: %s", filename, line, rvalue);
1155                 return 0;
1156         }
1157
1158         if ((r = manager_load_unit(t->meta.manager, rvalue, NULL, NULL, &t->unit)) < 0) {
1159                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1160                 dbus_error_free(&error);
1161                 return 0;
1162         }
1163
1164         return 0;
1165 }
1166
1167 static int config_parse_path_spec(
1168                 const char *filename,
1169                 unsigned line,
1170                 const char *section,
1171                 const char *lvalue,
1172                 const char *rvalue,
1173                 void *data,
1174                 void *userdata) {
1175
1176         Path *p = data;
1177         PathSpec *s;
1178         PathType b;
1179
1180         assert(filename);
1181         assert(lvalue);
1182         assert(rvalue);
1183         assert(data);
1184
1185         if ((b = path_type_from_string(lvalue)) < 0) {
1186                 log_error("[%s:%u] Failed to parse path type, ignoring: %s", filename, line, lvalue);
1187                 return 0;
1188         }
1189
1190         if (!path_is_absolute(rvalue)) {
1191                 log_error("[%s:%u] Path is not absolute, ignoring: %s", filename, line, rvalue);
1192                 return 0;
1193         }
1194
1195         if (!(s = new0(PathSpec, 1)))
1196                 return -ENOMEM;
1197
1198         if (!(s->path = strdup(rvalue))) {
1199                 free(s);
1200                 return -ENOMEM;
1201         }
1202
1203         path_kill_slashes(s->path);
1204
1205         s->type = b;
1206         s->inotify_fd = -1;
1207
1208         LIST_PREPEND(PathSpec, spec, p->specs, s);
1209
1210         return 0;
1211 }
1212
1213 static int config_parse_path_unit(
1214                 const char *filename,
1215                 unsigned line,
1216                 const char *section,
1217                 const char *lvalue,
1218                 const char *rvalue,
1219                 void *data,
1220                 void *userdata) {
1221
1222         Path *t = data;
1223         int r;
1224         DBusError error;
1225
1226         assert(filename);
1227         assert(lvalue);
1228         assert(rvalue);
1229         assert(data);
1230
1231         dbus_error_init(&error);
1232
1233         if (endswith(rvalue, ".path")) {
1234                 log_error("[%s:%u] Unit cannot be of type path, ignoring: %s", filename, line, rvalue);
1235                 return 0;
1236         }
1237
1238         if ((r = manager_load_unit(t->meta.manager, rvalue, NULL, &error, &t->unit)) < 0) {
1239                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1240                 dbus_error_free(&error);
1241                 return 0;
1242         }
1243
1244         return 0;
1245 }
1246
1247 static int config_parse_socket_service(
1248                 const char *filename,
1249                 unsigned line,
1250                 const char *section,
1251                 const char *lvalue,
1252                 const char *rvalue,
1253                 void *data,
1254                 void *userdata) {
1255
1256         Socket *s = data;
1257         int r;
1258         DBusError error;
1259
1260         assert(filename);
1261         assert(lvalue);
1262         assert(rvalue);
1263         assert(data);
1264
1265         dbus_error_init(&error);
1266
1267         if (!endswith(rvalue, ".service")) {
1268                 log_error("[%s:%u] Unit must be of type service, ignoring: %s", filename, line, rvalue);
1269                 return 0;
1270         }
1271
1272         if ((r = manager_load_unit(s->meta.manager, rvalue, NULL, &error, (Unit**) &s->service)) < 0) {
1273                 log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1274                 dbus_error_free(&error);
1275                 return 0;
1276         }
1277
1278         return 0;
1279 }
1280
1281 static int config_parse_service_sockets(
1282                 const char *filename,
1283                 unsigned line,
1284                 const char *section,
1285                 const char *lvalue,
1286                 const char *rvalue,
1287                 void *data,
1288                 void *userdata) {
1289
1290         Service *s = data;
1291         int r;
1292         DBusError error;
1293         char *state, *w;
1294         size_t l;
1295
1296         assert(filename);
1297         assert(lvalue);
1298         assert(rvalue);
1299         assert(data);
1300
1301         dbus_error_init(&error);
1302
1303         FOREACH_WORD_QUOTED(w, l, rvalue, state) {
1304                 char *t;
1305                 Unit *sock;
1306
1307                 if (!(t = strndup(w, l)))
1308                         return -ENOMEM;
1309
1310                 if (!endswith(t, ".socket")) {
1311                         log_error("[%s:%u] Unit must be of type socket, ignoring: %s", filename, line, rvalue);
1312                         free(t);
1313                         continue;
1314                 }
1315
1316                 r = manager_load_unit(s->meta.manager, t, NULL, &error, &sock);
1317                 free(t);
1318
1319                 if (r < 0) {
1320                         log_error("[%s:%u] Failed to load unit %s, ignoring: %s", filename, line, rvalue, bus_error(&error, r));
1321                         dbus_error_free(&error);
1322                         continue;
1323                 }
1324
1325                 if ((r = set_ensure_allocated(&s->configured_sockets, trivial_hash_func, trivial_compare_func)) < 0)
1326                         return r;
1327
1328                 if ((r = set_put(s->configured_sockets, sock)) < 0)
1329                         return r;
1330         }
1331
1332         return 0;
1333 }
1334
1335 static int config_parse_env_file(
1336                 const char *filename,
1337                 unsigned line,
1338                 const char *section,
1339                 const char *lvalue,
1340                 const char *rvalue,
1341                 void *data,
1342                 void *userdata) {
1343
1344         FILE *f;
1345         int r;
1346         char ***env = data;
1347         bool ignore = false;
1348
1349         assert(filename);
1350         assert(lvalue);
1351         assert(rvalue);
1352         assert(data);
1353
1354         if (rvalue[0] == '-') {
1355                 ignore = true;
1356                 rvalue++;
1357         }
1358
1359         if (!path_is_absolute(rvalue)) {
1360                 log_error("[%s:%u] Path '%s' is not absolute, ignoring.", filename, line, rvalue);
1361                 return 0;
1362         }
1363
1364         if (!(f = fopen(rvalue, "re"))) {
1365                 if (!ignore)
1366                         log_error("[%s:%u] Failed to open environment file '%s', ignoring: %m", filename, line, rvalue);
1367                 return 0;
1368         }
1369
1370         while (!feof(f)) {
1371                 char l[LINE_MAX], *p, *u;
1372                 char **t;
1373
1374                 if (!fgets(l, sizeof(l), f)) {
1375                         if (feof(f))
1376                                 break;
1377
1378                         log_error("[%s:%u] Failed to read environment file '%s', ignoring: %m", filename, line, rvalue);
1379                         r = 0;
1380                         goto finish;
1381                 }
1382
1383                 p = strstrip(l);
1384
1385                 if (!*p)
1386                         continue;
1387
1388                 if (strchr(COMMENTS, *p))
1389                         continue;
1390
1391                 if (!(u = normalize_env_assignment(p))) {
1392                         log_error("Out of memory");
1393                         r = -ENOMEM;
1394                         goto finish;
1395                 }
1396
1397                 t = strv_append(*env, u);
1398                 free(u);
1399
1400                 if (!t) {
1401                         log_error("Out of memory");
1402                         r = -ENOMEM;
1403                         goto finish;
1404                 }
1405
1406                 strv_free(*env);
1407                 *env = t;
1408         }
1409
1410         r = 0;
1411
1412 finish:
1413         if (f)
1414                 fclose(f);
1415
1416         return r;
1417 }
1418
1419 static int config_parse_ip_tos(
1420                 const char *filename,
1421                 unsigned line,
1422                 const char *section,
1423                 const char *lvalue,
1424                 const char *rvalue,
1425                 void *data,
1426                 void *userdata) {
1427
1428         int *ip_tos = data, x;
1429
1430         assert(filename);
1431         assert(lvalue);
1432         assert(rvalue);
1433         assert(data);
1434
1435         if ((x = ip_tos_from_string(rvalue)) < 0)
1436                 if (safe_atoi(rvalue, &x) < 0) {
1437                         log_error("[%s:%u] Failed to parse IP TOS value, ignoring: %s", filename, line, rvalue);
1438                         return 0;
1439                 }
1440
1441         *ip_tos = x;
1442         return 0;
1443 }
1444
1445 static int config_parse_condition_path(
1446                 const char *filename,
1447                 unsigned line,
1448                 const char *section,
1449                 const char *lvalue,
1450                 const char *rvalue,
1451                 void *data,
1452                 void *userdata) {
1453
1454         Unit *u = data;
1455         bool negate;
1456         Condition *c;
1457
1458         assert(filename);
1459         assert(lvalue);
1460         assert(rvalue);
1461         assert(data);
1462
1463         if ((negate = rvalue[0] == '!'))
1464                 rvalue++;
1465
1466         if (!path_is_absolute(rvalue)) {
1467                 log_error("[%s:%u] Path in condition not absolute, ignoring: %s", filename, line, rvalue);
1468                 return 0;
1469         }
1470
1471         if (!(c = condition_new(streq(lvalue, "ConditionPathExists") ? CONDITION_PATH_EXISTS : CONDITION_DIRECTORY_NOT_EMPTY,
1472                                 rvalue, negate)))
1473                 return -ENOMEM;
1474
1475         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1476         return 0;
1477 }
1478
1479 static int config_parse_condition_kernel(
1480                 const char *filename,
1481                 unsigned line,
1482                 const char *section,
1483                 const char *lvalue,
1484                 const char *rvalue,
1485                 void *data,
1486                 void *userdata) {
1487
1488         Unit *u = data;
1489         bool negate;
1490         Condition *c;
1491
1492         assert(filename);
1493         assert(lvalue);
1494         assert(rvalue);
1495         assert(data);
1496
1497         if ((negate = rvalue[0] == '!'))
1498                 rvalue++;
1499
1500         if (!(c = condition_new(CONDITION_KERNEL_COMMAND_LINE, rvalue, negate)))
1501                 return -ENOMEM;
1502
1503         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1504         return 0;
1505 }
1506
1507 static int config_parse_condition_null(
1508                 const char *filename,
1509                 unsigned line,
1510                 const char *section,
1511                 const char *lvalue,
1512                 const char *rvalue,
1513                 void *data,
1514                 void *userdata) {
1515
1516         Unit *u = data;
1517         Condition *c;
1518         bool negate;
1519         int b;
1520
1521         assert(filename);
1522         assert(lvalue);
1523         assert(rvalue);
1524         assert(data);
1525
1526         if ((negate = rvalue[0] == '!'))
1527                 rvalue++;
1528
1529         if ((b = parse_boolean(rvalue)) < 0) {
1530                 log_error("[%s:%u] Failed to parse boolean value in condition, ignoring: %s", filename, line, rvalue);
1531                 return 0;
1532         }
1533
1534         if (!b)
1535                 negate = !negate;
1536
1537         if (!(c = condition_new(CONDITION_NULL, NULL, negate)))
1538                 return -ENOMEM;
1539
1540         LIST_PREPEND(Condition, conditions, u->meta.conditions, c);
1541         return 0;
1542 }
1543
1544 static DEFINE_CONFIG_PARSE_ENUM(config_parse_notify_access, notify_access, NotifyAccess, "Failed to parse notify access specifier");
1545
1546 #define FOLLOW_MAX 8
1547
1548 static int open_follow(char **filename, FILE **_f, Set *names, char **_final) {
1549         unsigned c = 0;
1550         int fd, r;
1551         FILE *f;
1552         char *id = NULL;
1553
1554         assert(filename);
1555         assert(*filename);
1556         assert(_f);
1557         assert(names);
1558
1559         /* This will update the filename pointer if the loaded file is
1560          * reached by a symlink. The old string will be freed. */
1561
1562         for (;;) {
1563                 char *target, *name;
1564
1565                 if (c++ >= FOLLOW_MAX)
1566                         return -ELOOP;
1567
1568                 path_kill_slashes(*filename);
1569
1570                 /* Add the file name we are currently looking at to
1571                  * the names of this unit, but only if it is a valid
1572                  * unit name. */
1573                 name = file_name_from_path(*filename);
1574
1575                 if (unit_name_is_valid(name, false)) {
1576                         if (!(id = set_get(names, name))) {
1577
1578                                 if (!(id = strdup(name)))
1579                                         return -ENOMEM;
1580
1581                                 if ((r = set_put(names, id)) < 0) {
1582                                         free(id);
1583                                         return r;
1584                                 }
1585                         }
1586                 }
1587
1588                 /* Try to open the file name, but don't if its a symlink */
1589                 if ((fd = open(*filename, O_RDONLY|O_CLOEXEC|O_NOCTTY|O_NOFOLLOW)) >= 0)
1590                         break;
1591
1592                 if (errno != ELOOP)
1593                         return -errno;
1594
1595                 /* Hmm, so this is a symlink. Let's read the name, and follow it manually */
1596                 if ((r = readlink_and_make_absolute(*filename, &target)) < 0)
1597                         return r;
1598
1599                 free(*filename);
1600                 *filename = target;
1601         }
1602
1603         if (!(f = fdopen(fd, "re"))) {
1604                 r = -errno;
1605                 close_nointr_nofail(fd);
1606                 return r;
1607         }
1608
1609         *_f = f;
1610         *_final = id;
1611         return 0;
1612 }
1613
1614 static int merge_by_names(Unit **u, Set *names, const char *id) {
1615         char *k;
1616         int r;
1617
1618         assert(u);
1619         assert(*u);
1620         assert(names);
1621
1622         /* Let's try to add in all symlink names we found */
1623         while ((k = set_steal_first(names))) {
1624
1625                 /* First try to merge in the other name into our
1626                  * unit */
1627                 if ((r = unit_merge_by_name(*u, k)) < 0) {
1628                         Unit *other;
1629
1630                         /* Hmm, we couldn't merge the other unit into
1631                          * ours? Then let's try it the other way
1632                          * round */
1633
1634                         other = manager_get_unit((*u)->meta.manager, k);
1635                         free(k);
1636
1637                         if (other)
1638                                 if ((r = unit_merge(other, *u)) >= 0) {
1639                                         *u = other;
1640                                         return merge_by_names(u, names, NULL);
1641                                 }
1642
1643                         return r;
1644                 }
1645
1646                 if (id == k)
1647                         unit_choose_id(*u, id);
1648
1649                 free(k);
1650         }
1651
1652         return 0;
1653 }
1654
1655 static void dump_items(FILE *f, const ConfigItem *items) {
1656         const ConfigItem *i;
1657         const char *prev_section = NULL;
1658         bool not_first = false;
1659
1660         struct {
1661                 ConfigParserCallback callback;
1662                 const char *rvalue;
1663         } table[] = {
1664                 { config_parse_int,              "INTEGER" },
1665                 { config_parse_unsigned,         "UNSIGNED" },
1666                 { config_parse_size,             "SIZE" },
1667                 { config_parse_bool,             "BOOLEAN" },
1668                 { config_parse_string,           "STRING" },
1669                 { config_parse_path,             "PATH" },
1670                 { config_parse_strv,             "STRING [...]" },
1671                 { config_parse_nice,             "NICE" },
1672                 { config_parse_oom_score_adjust, "OOMSCOREADJUST" },
1673                 { config_parse_io_class,         "IOCLASS" },
1674                 { config_parse_io_priority,      "IOPRIORITY" },
1675                 { config_parse_cpu_sched_policy, "CPUSCHEDPOLICY" },
1676                 { config_parse_cpu_sched_prio,   "CPUSCHEDPRIO" },
1677                 { config_parse_cpu_affinity,     "CPUAFFINITY" },
1678                 { config_parse_mode,             "MODE" },
1679                 { config_parse_env_file,         "FILE" },
1680                 { config_parse_output,           "OUTPUT" },
1681                 { config_parse_input,            "INPUT" },
1682                 { config_parse_facility,         "FACILITY" },
1683                 { config_parse_level,            "LEVEL" },
1684                 { config_parse_capabilities,     "CAPABILITIES" },
1685                 { config_parse_secure_bits,      "SECUREBITS" },
1686                 { config_parse_bounding_set,     "BOUNDINGSET" },
1687                 { config_parse_timer_slack_nsec, "TIMERSLACK" },
1688                 { config_parse_limit,            "LIMIT" },
1689                 { config_parse_cgroup,           "CGROUP [...]" },
1690                 { config_parse_deps,             "UNIT [...]" },
1691                 { config_parse_names,            "UNIT [...]" },
1692                 { config_parse_exec,             "PATH [ARGUMENT [...]]" },
1693                 { config_parse_service_type,     "SERVICETYPE" },
1694                 { config_parse_service_restart,  "SERVICERESTART" },
1695 #ifdef HAVE_SYSV_COMPAT
1696                 { config_parse_sysv_priority,    "SYSVPRIORITY" },
1697 #else
1698                 { config_parse_warn_compat,      "NOTSUPPORTED" },
1699 #endif
1700                 { config_parse_kill_mode,        "KILLMODE" },
1701                 { config_parse_kill_signal,      "SIGNAL" },
1702                 { config_parse_listen,           "SOCKET [...]" },
1703                 { config_parse_socket_bind,      "SOCKETBIND" },
1704                 { config_parse_bindtodevice,     "NETWORKINTERFACE" },
1705                 { config_parse_usec,             "SECONDS" },
1706                 { config_parse_path_strv,        "PATH [...]" },
1707                 { config_parse_mount_flags,      "MOUNTFLAG [...]" },
1708                 { config_parse_string_printf,    "STRING" },
1709                 { config_parse_timer,            "TIMER" },
1710                 { config_parse_timer_unit,       "NAME" },
1711                 { config_parse_path_spec,        "PATH" },
1712                 { config_parse_path_unit,        "UNIT" },
1713                 { config_parse_notify_access,    "ACCESS" },
1714                 { config_parse_ip_tos,           "TOS" },
1715                 { config_parse_condition_path,   "CONDITION" },
1716                 { config_parse_condition_kernel, "CONDITION" },
1717                 { config_parse_condition_null,   "CONDITION" },
1718         };
1719
1720         assert(f);
1721         assert(items);
1722
1723         for (i = items; i->lvalue; i++) {
1724                 unsigned j;
1725                 const char *rvalue = "OTHER";
1726
1727                 if (!streq_ptr(i->section, prev_section)) {
1728                         if (!not_first)
1729                                 not_first = true;
1730                         else
1731                                 fputc('\n', f);
1732
1733                         fprintf(f, "[%s]\n", i->section);
1734                         prev_section = i->section;
1735                 }
1736
1737                 for (j = 0; j < ELEMENTSOF(table); j++)
1738                         if (i->parse == table[j].callback) {
1739                                 rvalue = table[j].rvalue;
1740                                 break;
1741                         }
1742
1743                 fprintf(f, "%s=%s\n", i->lvalue, rvalue);
1744         }
1745 }
1746
1747 static int load_from_path(Unit *u, const char *path) {
1748
1749         static const char* const section_table[_UNIT_TYPE_MAX] = {
1750                 [UNIT_SERVICE]   = "Service",
1751                 [UNIT_TIMER]     = "Timer",
1752                 [UNIT_SOCKET]    = "Socket",
1753                 [UNIT_TARGET]    = "Target",
1754                 [UNIT_DEVICE]    = "Device",
1755                 [UNIT_MOUNT]     = "Mount",
1756                 [UNIT_AUTOMOUNT] = "Automount",
1757                 [UNIT_SNAPSHOT]  = "Snapshot",
1758                 [UNIT_SWAP]      = "Swap",
1759                 [UNIT_PATH]      = "Path"
1760         };
1761
1762 #define EXEC_CONTEXT_CONFIG_ITEMS(context, section) \
1763                 { "WorkingDirectory",       config_parse_path,            &(context).working_directory,                    section   }, \
1764                 { "RootDirectory",          config_parse_path,            &(context).root_directory,                       section   }, \
1765                 { "User",                   config_parse_string_printf,   &(context).user,                                 section   }, \
1766                 { "Group",                  config_parse_string_printf,   &(context).group,                                section   }, \
1767                 { "SupplementaryGroups",    config_parse_strv,            &(context).supplementary_groups,                 section   }, \
1768                 { "Nice",                   config_parse_nice,            &(context),                                      section   }, \
1769                 { "OOMScoreAdjust",         config_parse_oom_score_adjust,&(context),                                      section   }, \
1770                 { "IOSchedulingClass",      config_parse_io_class,        &(context),                                      section   }, \
1771                 { "IOSchedulingPriority",   config_parse_io_priority,     &(context),                                      section   }, \
1772                 { "CPUSchedulingPolicy",    config_parse_cpu_sched_policy,&(context),                                      section   }, \
1773                 { "CPUSchedulingPriority",  config_parse_cpu_sched_prio,  &(context),                                      section   }, \
1774                 { "CPUSchedulingResetOnFork", config_parse_bool,          &(context).cpu_sched_reset_on_fork,              section   }, \
1775                 { "CPUAffinity",            config_parse_cpu_affinity,    &(context),                                      section   }, \
1776                 { "UMask",                  config_parse_mode,            &(context).umask,                                section   }, \
1777                 { "Environment",            config_parse_strv,            &(context).environment,                          section   }, \
1778                 { "EnvironmentFile",        config_parse_env_file,        &(context).environment,                          section   }, \
1779                 { "StandardInput",          config_parse_input,           &(context).std_input,                            section   }, \
1780                 { "StandardOutput",         config_parse_output,          &(context).std_output,                           section   }, \
1781                 { "StandardError",          config_parse_output,          &(context).std_error,                            section   }, \
1782                 { "TTYPath",                config_parse_path,            &(context).tty_path,                             section   }, \
1783                 { "SyslogIdentifier",       config_parse_string_printf,   &(context).syslog_identifier,                    section   }, \
1784                 { "SyslogFacility",         config_parse_facility,        &(context).syslog_priority,                      section   }, \
1785                 { "SyslogLevel",            config_parse_level,           &(context).syslog_priority,                      section   }, \
1786                 { "SyslogLevelPrefix",      config_parse_bool,            &(context).syslog_level_prefix,                  section   }, \
1787                 { "Capabilities",           config_parse_capabilities,    &(context),                                      section   }, \
1788                 { "SecureBits",             config_parse_secure_bits,     &(context),                                      section   }, \
1789                 { "CapabilityBoundingSetDrop", config_parse_bounding_set, &(context),                                      section   }, \
1790                 { "TimerSlackNSec",         config_parse_timer_slack_nsec,&(context),                                      section   }, \
1791                 { "LimitCPU",               config_parse_limit,           &(context).rlimit[RLIMIT_CPU],                   section   }, \
1792                 { "LimitFSIZE",             config_parse_limit,           &(context).rlimit[RLIMIT_FSIZE],                 section   }, \
1793                 { "LimitDATA",              config_parse_limit,           &(context).rlimit[RLIMIT_DATA],                  section   }, \
1794                 { "LimitSTACK",             config_parse_limit,           &(context).rlimit[RLIMIT_STACK],                 section   }, \
1795                 { "LimitCORE",              config_parse_limit,           &(context).rlimit[RLIMIT_CORE],                  section   }, \
1796                 { "LimitRSS",               config_parse_limit,           &(context).rlimit[RLIMIT_RSS],                   section   }, \
1797                 { "LimitNOFILE",            config_parse_limit,           &(context).rlimit[RLIMIT_NOFILE],                section   }, \
1798                 { "LimitAS",                config_parse_limit,           &(context).rlimit[RLIMIT_AS],                    section   }, \
1799                 { "LimitNPROC",             config_parse_limit,           &(context).rlimit[RLIMIT_NPROC],                 section   }, \
1800                 { "LimitMEMLOCK",           config_parse_limit,           &(context).rlimit[RLIMIT_MEMLOCK],               section   }, \
1801                 { "LimitLOCKS",             config_parse_limit,           &(context).rlimit[RLIMIT_LOCKS],                 section   }, \
1802                 { "LimitSIGPENDING",        config_parse_limit,           &(context).rlimit[RLIMIT_SIGPENDING],            section   }, \
1803                 { "LimitMSGQUEUE",          config_parse_limit,           &(context).rlimit[RLIMIT_MSGQUEUE],              section   }, \
1804                 { "LimitNICE",              config_parse_limit,           &(context).rlimit[RLIMIT_NICE],                  section   }, \
1805                 { "LimitRTPRIO",            config_parse_limit,           &(context).rlimit[RLIMIT_RTPRIO],                section   }, \
1806                 { "LimitRTTIME",            config_parse_limit,           &(context).rlimit[RLIMIT_RTTIME],                section   }, \
1807                 { "ControlGroup",           config_parse_cgroup,          u,                                               section   }, \
1808                 { "ReadWriteDirectories",   config_parse_path_strv,       &(context).read_write_dirs,                      section   }, \
1809                 { "ReadOnlyDirectories",    config_parse_path_strv,       &(context).read_only_dirs,                       section   }, \
1810                 { "InaccessibleDirectories",config_parse_path_strv,       &(context).inaccessible_dirs,                    section   }, \
1811                 { "PrivateTmp",             config_parse_bool,            &(context).private_tmp,                          section   }, \
1812                 { "MountFlags",             config_parse_mount_flags,     &(context),                                      section   }, \
1813                 { "TCPWrapName",            config_parse_string_printf,   &(context).tcpwrap_name,                         section   }, \
1814                 { "PAMName",                config_parse_string_printf,   &(context).pam_name,                             section   }, \
1815                 { "KillMode",               config_parse_kill_mode,       &(context).kill_mode,                            section   }, \
1816                 { "KillSignal",             config_parse_kill_signal,     &(context).kill_signal,                          section   }, \
1817                 { "SendSIGKILL",            config_parse_bool,            &(context).send_sigkill,                         section   }, \
1818                 { "UtmpIdentifier",         config_parse_string_printf,   &(context).utmp_id,                              section   }
1819
1820         const ConfigItem items[] = {
1821                 { "Names",                  config_parse_names,           u,                                               "Unit"    },
1822                 { "Description",            config_parse_string_printf,   &u->meta.description,                            "Unit"    },
1823                 { "Requires",               config_parse_deps,            UINT_TO_PTR(UNIT_REQUIRES),                      "Unit"    },
1824                 { "RequiresOverridable",    config_parse_deps,            UINT_TO_PTR(UNIT_REQUIRES_OVERRIDABLE),          "Unit"    },
1825                 { "Requisite",              config_parse_deps,            UINT_TO_PTR(UNIT_REQUISITE),                     "Unit"    },
1826                 { "RequisiteOverridable",   config_parse_deps,            UINT_TO_PTR(UNIT_REQUISITE_OVERRIDABLE),         "Unit"    },
1827                 { "Wants",                  config_parse_deps,            UINT_TO_PTR(UNIT_WANTS),                         "Unit"    },
1828                 { "BindTo",                 config_parse_deps,            UINT_TO_PTR(UNIT_BIND_TO),                       "Unit"    },
1829                 { "Conflicts",              config_parse_deps,            UINT_TO_PTR(UNIT_CONFLICTS),                     "Unit"    },
1830                 { "Before",                 config_parse_deps,            UINT_TO_PTR(UNIT_BEFORE),                        "Unit"    },
1831                 { "After",                  config_parse_deps,            UINT_TO_PTR(UNIT_AFTER),                         "Unit"    },
1832                 { "OnFailure",              config_parse_deps,            UINT_TO_PTR(UNIT_ON_FAILURE),                    "Unit"    },
1833                 { "StopWhenUnneeded",       config_parse_bool,            &u->meta.stop_when_unneeded,                     "Unit"    },
1834                 { "RefuseManualStart",      config_parse_bool,            &u->meta.refuse_manual_start,                    "Unit"    },
1835                 { "RefuseManualStop",       config_parse_bool,            &u->meta.refuse_manual_stop,                     "Unit"    },
1836                 { "AllowIsolate",           config_parse_bool,            &u->meta.allow_isolate,                          "Unit"    },
1837                 { "DefaultDependencies",    config_parse_bool,            &u->meta.default_dependencies,                   "Unit"    },
1838                 { "JobTimeoutSec",          config_parse_usec,            &u->meta.job_timeout,                            "Unit"    },
1839                 { "ConditionPathExists",    config_parse_condition_path,  u,                                               "Unit"    },
1840                 { "ConditionDirectoryNotEmpty", config_parse_condition_path,  u,                                           "Unit"    },
1841                 { "ConditionKernelCommandLine", config_parse_condition_kernel, u,                                          "Unit"    },
1842                 { "ConditionNull",          config_parse_condition_null,  u,                                               "Unit"    },
1843
1844                 { "PIDFile",                config_parse_path,            &u->service.pid_file,                            "Service" },
1845                 { "ExecStartPre",           config_parse_exec,            u->service.exec_command+SERVICE_EXEC_START_PRE,  "Service" },
1846                 { "ExecStart",              config_parse_exec,            u->service.exec_command+SERVICE_EXEC_START,      "Service" },
1847                 { "ExecStartPost",          config_parse_exec,            u->service.exec_command+SERVICE_EXEC_START_POST, "Service" },
1848                 { "ExecReload",             config_parse_exec,            u->service.exec_command+SERVICE_EXEC_RELOAD,     "Service" },
1849                 { "ExecStop",               config_parse_exec,            u->service.exec_command+SERVICE_EXEC_STOP,       "Service" },
1850                 { "ExecStopPost",           config_parse_exec,            u->service.exec_command+SERVICE_EXEC_STOP_POST,  "Service" },
1851                 { "RestartSec",             config_parse_usec,            &u->service.restart_usec,                        "Service" },
1852                 { "TimeoutSec",             config_parse_usec,            &u->service.timeout_usec,                        "Service" },
1853                 { "Type",                   config_parse_service_type,    &u->service.type,                                "Service" },
1854                 { "Restart",                config_parse_service_restart, &u->service.restart,                             "Service" },
1855                 { "PermissionsStartOnly",   config_parse_bool,            &u->service.permissions_start_only,              "Service" },
1856                 { "RootDirectoryStartOnly", config_parse_bool,            &u->service.root_directory_start_only,           "Service" },
1857                 { "RemainAfterExit",        config_parse_bool,            &u->service.remain_after_exit,                   "Service" },
1858 #ifdef HAVE_SYSV_COMPAT
1859                 { "SysVStartPriority",      config_parse_sysv_priority,   &u->service.sysv_start_priority,                 "Service" },
1860 #else
1861                 { "SysVStartPriority",      config_parse_warn_compat,     NULL,                                            "Service" },
1862 #endif
1863                 { "NonBlocking",            config_parse_bool,            &u->service.exec_context.non_blocking,           "Service" },
1864                 { "BusName",                config_parse_string_printf,   &u->service.bus_name,                            "Service" },
1865                 { "NotifyAccess",           config_parse_notify_access,   &u->service.notify_access,                       "Service" },
1866                 { "Sockets",                config_parse_service_sockets, &u->service,                                     "Service" },
1867                 { "FsckPassNo",             config_parse_fsck_passno,     &u->service.fsck_passno,                         "Service" },
1868                 EXEC_CONTEXT_CONFIG_ITEMS(u->service.exec_context, "Service"),
1869
1870                 { "ListenStream",           config_parse_listen,          &u->socket,                                      "Socket"  },
1871                 { "ListenDatagram",         config_parse_listen,          &u->socket,                                      "Socket"  },
1872                 { "ListenSequentialPacket", config_parse_listen,          &u->socket,                                      "Socket"  },
1873                 { "ListenFIFO",             config_parse_listen,          &u->socket,                                      "Socket"  },
1874                 { "BindIPv6Only",           config_parse_socket_bind,     &u->socket,                                      "Socket"  },
1875                 { "Backlog",                config_parse_unsigned,        &u->socket.backlog,                              "Socket"  },
1876                 { "BindToDevice",           config_parse_bindtodevice,    &u->socket,                                      "Socket"  },
1877                 { "ExecStartPre",           config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_START_PRE,    "Socket"  },
1878                 { "ExecStartPost",          config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_START_POST,   "Socket"  },
1879                 { "ExecStopPre",            config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_STOP_PRE,     "Socket"  },
1880                 { "ExecStopPost",           config_parse_exec,            u->socket.exec_command+SOCKET_EXEC_STOP_POST,    "Socket"  },
1881                 { "TimeoutSec",             config_parse_usec,            &u->socket.timeout_usec,                         "Socket"  },
1882                 { "DirectoryMode",          config_parse_mode,            &u->socket.directory_mode,                       "Socket"  },
1883                 { "SocketMode",             config_parse_mode,            &u->socket.socket_mode,                          "Socket"  },
1884                 { "Accept",                 config_parse_bool,            &u->socket.accept,                               "Socket"  },
1885                 { "MaxConnections",         config_parse_unsigned,        &u->socket.max_connections,                      "Socket"  },
1886                 { "KeepAlive",              config_parse_bool,            &u->socket.keep_alive,                           "Socket"  },
1887                 { "Priority",               config_parse_int,             &u->socket.priority,                             "Socket"  },
1888                 { "ReceiveBuffer",          config_parse_size,            &u->socket.receive_buffer,                       "Socket"  },
1889                 { "SendBuffer",             config_parse_size,            &u->socket.send_buffer,                          "Socket"  },
1890                 { "IPTOS",                  config_parse_ip_tos,          &u->socket.ip_tos,                               "Socket"  },
1891                 { "IPTTL",                  config_parse_int,             &u->socket.ip_ttl,                               "Socket"  },
1892                 { "Mark",                   config_parse_int,             &u->socket.mark,                                 "Socket"  },
1893                 { "PipeSize",               config_parse_size,            &u->socket.pipe_size,                            "Socket"  },
1894                 { "FreeBind",               config_parse_bool,            &u->socket.free_bind,                            "Socket"  },
1895                 { "TCPCongestion",          config_parse_string,          &u->socket.tcp_congestion,                       "Socket"  },
1896                 { "Service",                config_parse_socket_service,  &u->socket,                                      "Socket"  },
1897                 EXEC_CONTEXT_CONFIG_ITEMS(u->socket.exec_context, "Socket"),
1898
1899                 { "What",                   config_parse_string,          &u->mount.parameters_fragment.what,              "Mount"   },
1900                 { "Where",                  config_parse_path,            &u->mount.where,                                 "Mount"   },
1901                 { "Options",                config_parse_string,          &u->mount.parameters_fragment.options,           "Mount"   },
1902                 { "Type",                   config_parse_string,          &u->mount.parameters_fragment.fstype,            "Mount"   },
1903                 { "TimeoutSec",             config_parse_usec,            &u->mount.timeout_usec,                          "Mount"   },
1904                 { "DirectoryMode",          config_parse_mode,            &u->mount.directory_mode,                        "Mount"   },
1905                 EXEC_CONTEXT_CONFIG_ITEMS(u->mount.exec_context, "Mount"),
1906
1907                 { "Where",                  config_parse_path,            &u->automount.where,                             "Automount" },
1908                 { "DirectoryMode",          config_parse_mode,            &u->automount.directory_mode,                    "Automount" },
1909
1910                 { "What",                   config_parse_path,            &u->swap.parameters_fragment.what,               "Swap"    },
1911                 { "Priority",               config_parse_int,             &u->swap.parameters_fragment.priority,           "Swap"    },
1912                 { "TimeoutSec",             config_parse_usec,            &u->swap.timeout_usec,                           "Swap"    },
1913                 EXEC_CONTEXT_CONFIG_ITEMS(u->swap.exec_context, "Swap"),
1914
1915                 { "OnActiveSec",            config_parse_timer,           &u->timer,                                       "Timer"   },
1916                 { "OnBootSec",              config_parse_timer,           &u->timer,                                       "Timer"   },
1917                 { "OnStartupSec",           config_parse_timer,           &u->timer,                                       "Timer"   },
1918                 { "OnUnitActiveSec",        config_parse_timer,           &u->timer,                                       "Timer"   },
1919                 { "OnUnitInactiveSec",      config_parse_timer,           &u->timer,                                       "Timer"   },
1920                 { "Unit",                   config_parse_timer_unit,      &u->timer,                                       "Timer"   },
1921
1922                 { "PathExists",             config_parse_path_spec,       &u->path,                                        "Path"    },
1923                 { "PathChanged",            config_parse_path_spec,       &u->path,                                        "Path"    },
1924                 { "DirectoryNotEmpty",      config_parse_path_spec,       &u->path,                                        "Path"    },
1925                 { "Unit",                   config_parse_path_unit,       &u->path,                                        "Path"    },
1926
1927                 /* The [Install] section is ignored here. */
1928                 { "Alias",                  NULL,                         NULL,                                            "Install" },
1929                 { "WantedBy",               NULL,                         NULL,                                            "Install" },
1930                 { "Also",                   NULL,                         NULL,                                            "Install" },
1931
1932                 { NULL, NULL, NULL, NULL }
1933         };
1934
1935 #undef EXEC_CONTEXT_CONFIG_ITEMS
1936
1937         const char *sections[4];
1938         int r;
1939         Set *symlink_names;
1940         FILE *f = NULL;
1941         char *filename = NULL, *id = NULL;
1942         Unit *merged;
1943         struct stat st;
1944
1945         if (!u) {
1946                 /* Dirty dirty hack. */
1947                 dump_items((FILE*) path, items);
1948                 return 0;
1949         }
1950
1951         assert(u);
1952         assert(path);
1953
1954         sections[0] = "Unit";
1955         sections[1] = section_table[u->meta.type];
1956         sections[2] = "Install";
1957         sections[3] = NULL;
1958
1959         if (!(symlink_names = set_new(string_hash_func, string_compare_func)))
1960                 return -ENOMEM;
1961
1962         if (path_is_absolute(path)) {
1963
1964                 if (!(filename = strdup(path))) {
1965                         r = -ENOMEM;
1966                         goto finish;
1967                 }
1968
1969                 if ((r = open_follow(&filename, &f, symlink_names, &id)) < 0) {
1970                         free(filename);
1971                         filename = NULL;
1972
1973                         if (r != -ENOENT)
1974                                 goto finish;
1975                 }
1976
1977         } else  {
1978                 char **p;
1979
1980                 STRV_FOREACH(p, u->meta.manager->lookup_paths.unit_path) {
1981
1982                         /* Instead of opening the path right away, we manually
1983                          * follow all symlinks and add their name to our unit
1984                          * name set while doing so */
1985                         if (!(filename = path_make_absolute(path, *p))) {
1986                                 r = -ENOMEM;
1987                                 goto finish;
1988                         }
1989
1990                         if (u->meta.manager->unit_path_cache &&
1991                             !set_get(u->meta.manager->unit_path_cache, filename))
1992                                 r = -ENOENT;
1993                         else
1994                                 r = open_follow(&filename, &f, symlink_names, &id);
1995
1996                         if (r < 0) {
1997                                 char *sn;
1998
1999                                 free(filename);
2000                                 filename = NULL;
2001
2002                                 if (r != -ENOENT)
2003                                         goto finish;
2004
2005                                 /* Empty the symlink names for the next run */
2006                                 while ((sn = set_steal_first(symlink_names)))
2007                                         free(sn);
2008
2009                                 continue;
2010                         }
2011
2012                         break;
2013                 }
2014         }
2015
2016         if (!filename) {
2017                 /* Hmm, no suitable file found? */
2018                 r = 0;
2019                 goto finish;
2020         }
2021
2022         merged = u;
2023         if ((r = merge_by_names(&merged, symlink_names, id)) < 0)
2024                 goto finish;
2025
2026         if (merged != u) {
2027                 u->meta.load_state = UNIT_MERGED;
2028                 r = 0;
2029                 goto finish;
2030         }
2031
2032         zero(st);
2033         if (fstat(fileno(f), &st) < 0) {
2034                 r = -errno;
2035                 goto finish;
2036         }
2037
2038         if (null_or_empty(&st))
2039                 u->meta.load_state = UNIT_MASKED;
2040         else {
2041                 /* Now, parse the file contents */
2042                 if ((r = config_parse(filename, f, sections, items, false, u)) < 0)
2043                         goto finish;
2044
2045                 u->meta.load_state = UNIT_LOADED;
2046         }
2047
2048         free(u->meta.fragment_path);
2049         u->meta.fragment_path = filename;
2050         filename = NULL;
2051
2052         u->meta.fragment_mtime = timespec_load(&st.st_mtim);
2053
2054         r = 0;
2055
2056 finish:
2057         set_free_free(symlink_names);
2058         free(filename);
2059
2060         if (f)
2061                 fclose(f);
2062
2063         return r;
2064 }
2065
2066 int unit_load_fragment(Unit *u) {
2067         int r;
2068         Iterator i;
2069         const char *t;
2070
2071         assert(u);
2072         assert(u->meta.load_state == UNIT_STUB);
2073         assert(u->meta.id);
2074
2075         /* First, try to find the unit under its id. We always look
2076          * for unit files in the default directories, to make it easy
2077          * to override things by placing things in /etc/systemd/system */
2078         if ((r = load_from_path(u, u->meta.id)) < 0)
2079                 return r;
2080
2081         /* Try to find an alias we can load this with */
2082         if (u->meta.load_state == UNIT_STUB)
2083                 SET_FOREACH(t, u->meta.names, i) {
2084
2085                         if (t == u->meta.id)
2086                                 continue;
2087
2088                         if ((r = load_from_path(u, t)) < 0)
2089                                 return r;
2090
2091                         if (u->meta.load_state != UNIT_STUB)
2092                                 break;
2093                 }
2094
2095         /* And now, try looking for it under the suggested (originally linked) path */
2096         if (u->meta.load_state == UNIT_STUB && u->meta.fragment_path) {
2097
2098                 if ((r = load_from_path(u, u->meta.fragment_path)) < 0)
2099                         return r;
2100
2101                 if (u->meta.load_state == UNIT_STUB) {
2102                         /* Hmm, this didn't work? Then let's get rid
2103                          * of the fragment path stored for us, so that
2104                          * we don't point to an invalid location. */
2105                         free(u->meta.fragment_path);
2106                         u->meta.fragment_path = NULL;
2107                 }
2108         }
2109
2110         /* Look for a template */
2111         if (u->meta.load_state == UNIT_STUB && u->meta.instance) {
2112                 char *k;
2113
2114                 if (!(k = unit_name_template(u->meta.id)))
2115                         return -ENOMEM;
2116
2117                 r = load_from_path(u, k);
2118                 free(k);
2119
2120                 if (r < 0)
2121                         return r;
2122
2123                 if (u->meta.load_state == UNIT_STUB)
2124                         SET_FOREACH(t, u->meta.names, i) {
2125
2126                                 if (t == u->meta.id)
2127                                         continue;
2128
2129                                 if (!(k = unit_name_template(t)))
2130                                         return -ENOMEM;
2131
2132                                 r = load_from_path(u, k);
2133                                 free(k);
2134
2135                                 if (r < 0)
2136                                         return r;
2137
2138                                 if (u->meta.load_state != UNIT_STUB)
2139                                         break;
2140                         }
2141         }
2142
2143         return 0;
2144 }
2145
2146 void unit_dump_config_items(FILE *f) {
2147         /* OK, this wins a prize for extreme ugliness. */
2148
2149         load_from_path(NULL, (const void*) f);
2150 }