2 * Copyright (C) 2003-2012 Kay Sievers <kay@vrfy.org>
4 * This program is free software: you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation, either version 2 of the License, or
7 * (at your option) any later version.
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
14 * You should have received a copy of the GNU General Public License
15 * along with this program. If not, see <http://www.gnu.org/licenses/>.
33 #include "path-util.h"
34 #include "conf-files.h"
37 #define PREALLOC_TOKEN 2048
40 unsigned int name_off
;
53 /* every key in the rules file becomes a token */
55 unsigned int token_cur
;
56 unsigned int token_max
;
58 /* all key strings are copied and de-duplicated in a single continous string buffer */
59 struct strbuf
*strbuf
;
61 /* during rule parsing, uid/gid lookup results are cached */
63 unsigned int uids_cur
;
64 unsigned int uids_max
;
66 unsigned int gids_cur
;
67 unsigned int gids_max
;
70 static char *rules_str(struct udev_rules
*rules
, unsigned int off
) {
71 return rules
->strbuf
->buf
+ off
;
74 static unsigned int rules_add_string(struct udev_rules
*rules
, const char *s
) {
75 return strbuf_add_string(rules
->strbuf
, s
, strlen(s
));
78 /* KEY=="", KEY!="", KEY+="", KEY="", KEY:="" */
91 enum string_glob_type
{
93 GL_PLAIN
, /* no special chars */
94 GL_GLOB
, /* shell globs ?,*,[] */
95 GL_SPLIT
, /* multi-value A|B */
96 GL_SPLIT_GLOB
, /* multi-value with glob A*|B* */
97 GL_SOMETHING
, /* commonly used "?*" */
100 enum string_subst_type
{
107 /* tokens of a rule are sorted/handled in this order */
112 TK_M_ACTION
, /* val */
113 TK_M_DEVPATH
, /* val */
114 TK_M_KERNEL
, /* val */
115 TK_M_DEVLINK
, /* val */
117 TK_M_ENV
, /* val, attr */
119 TK_M_SUBSYSTEM
, /* val */
120 TK_M_DRIVER
, /* val */
121 TK_M_WAITFOR
, /* val */
122 TK_M_ATTR
, /* val, attr */
125 TK_M_KERNELS
, /* val */
126 TK_M_SUBSYSTEMS
, /* val */
127 TK_M_DRIVERS
, /* val */
128 TK_M_ATTRS
, /* val, attr */
132 TK_M_TEST
, /* val, mode_t */
133 TK_M_EVENT_TIMEOUT
, /* int */
134 TK_M_PROGRAM
, /* val */
135 TK_M_IMPORT_FILE
, /* val */
136 TK_M_IMPORT_PROG
, /* val */
137 TK_M_IMPORT_BUILTIN
, /* val */
138 TK_M_IMPORT_DB
, /* val */
139 TK_M_IMPORT_CMDLINE
, /* val */
140 TK_M_IMPORT_PARENT
, /* val */
141 TK_M_RESULT
, /* val */
144 TK_A_STRING_ESCAPE_NONE
,
145 TK_A_STRING_ESCAPE_REPLACE
,
147 TK_A_INOTIFY_WATCH
, /* int */
148 TK_A_DEVLINK_PRIO
, /* int */
149 TK_A_OWNER
, /* val */
150 TK_A_GROUP
, /* val */
152 TK_A_OWNER_ID
, /* uid_t */
153 TK_A_GROUP_ID
, /* gid_t */
154 TK_A_MODE_ID
, /* mode_t */
155 TK_A_STATIC_NODE
, /* val */
156 TK_A_ENV
, /* val, attr */
159 TK_A_DEVLINK
, /* val */
160 TK_A_ATTR
, /* val, attr */
161 TK_A_RUN_BUILTIN
, /* val, bool */
162 TK_A_RUN_PROGRAM
, /* val, bool */
163 TK_A_GOTO
, /* size_t */
168 /* we try to pack stuff in a way that we take only 12 bytes per token */
171 unsigned char type
; /* same in rule and key */
173 enum token_type type
:8;
175 bool has_static_node
:1;
176 unsigned int unused
:6;
177 unsigned short token_count
;
178 unsigned int label_off
;
179 unsigned short filename_off
;
180 unsigned short filename_line
;
183 enum token_type type
:8;
184 enum operation_type op
:8;
185 enum string_glob_type glob
:8;
186 enum string_subst_type subst
:4;
187 enum string_subst_type attrsubst
:4;
188 unsigned int value_off
;
190 unsigned int attr_off
;
191 unsigned int rule_goto
;
198 enum udev_builtin_cmd builtin_cmd
;
206 struct udev_rules
*rules
;
208 struct token token
[MAX_TK
];
209 unsigned int token_cur
;
213 static const char *operation_str(enum operation_type type
)
215 static const char *operation_strs
[] = {
216 [OP_UNSET
] = "UNSET",
217 [OP_MATCH
] = "match",
218 [OP_NOMATCH
] = "nomatch",
219 [OP_MATCH_MAX
] = "MATCH_MAX",
222 [OP_ASSIGN
] = "assign",
223 [OP_ASSIGN_FINAL
] = "assign-final",
226 return operation_strs
[type
];
229 static const char *string_glob_str(enum string_glob_type type
)
231 static const char *string_glob_strs
[] = {
232 [GL_UNSET
] = "UNSET",
233 [GL_PLAIN
] = "plain",
235 [GL_SPLIT
] = "split",
236 [GL_SPLIT_GLOB
] = "split-glob",
237 [GL_SOMETHING
] = "split-glob",
240 return string_glob_strs
[type
];
243 static const char *token_str(enum token_type type
)
245 static const char *token_strs
[] = {
246 [TK_UNSET
] = "UNSET",
249 [TK_M_ACTION
] = "M ACTION",
250 [TK_M_DEVPATH
] = "M DEVPATH",
251 [TK_M_KERNEL
] = "M KERNEL",
252 [TK_M_DEVLINK
] = "M DEVLINK",
253 [TK_M_NAME
] = "M NAME",
254 [TK_M_ENV
] = "M ENV",
255 [TK_M_TAG
] = "M TAG",
256 [TK_M_SUBSYSTEM
] = "M SUBSYSTEM",
257 [TK_M_DRIVER
] = "M DRIVER",
258 [TK_M_WAITFOR
] = "M WAITFOR",
259 [TK_M_ATTR
] = "M ATTR",
261 [TK_M_PARENTS_MIN
] = "M PARENTS_MIN",
262 [TK_M_KERNELS
] = "M KERNELS",
263 [TK_M_SUBSYSTEMS
] = "M SUBSYSTEMS",
264 [TK_M_DRIVERS
] = "M DRIVERS",
265 [TK_M_ATTRS
] = "M ATTRS",
266 [TK_M_TAGS
] = "M TAGS",
267 [TK_M_PARENTS_MAX
] = "M PARENTS_MAX",
269 [TK_M_TEST
] = "M TEST",
270 [TK_M_EVENT_TIMEOUT
] = "M EVENT_TIMEOUT",
271 [TK_M_PROGRAM
] = "M PROGRAM",
272 [TK_M_IMPORT_FILE
] = "M IMPORT_FILE",
273 [TK_M_IMPORT_PROG
] = "M IMPORT_PROG",
274 [TK_M_IMPORT_BUILTIN
] = "M IMPORT_BUILTIN",
275 [TK_M_IMPORT_DB
] = "M IMPORT_DB",
276 [TK_M_IMPORT_CMDLINE
] = "M IMPORT_CMDLINE",
277 [TK_M_IMPORT_PARENT
] = "M IMPORT_PARENT",
278 [TK_M_RESULT
] = "M RESULT",
279 [TK_M_MAX
] = "M MAX",
281 [TK_A_STRING_ESCAPE_NONE
] = "A STRING_ESCAPE_NONE",
282 [TK_A_STRING_ESCAPE_REPLACE
] = "A STRING_ESCAPE_REPLACE",
283 [TK_A_DB_PERSIST
] = "A DB_PERSIST",
284 [TK_A_INOTIFY_WATCH
] = "A INOTIFY_WATCH",
285 [TK_A_DEVLINK_PRIO
] = "A DEVLINK_PRIO",
286 [TK_A_OWNER
] = "A OWNER",
287 [TK_A_GROUP
] = "A GROUP",
288 [TK_A_MODE
] = "A MODE",
289 [TK_A_OWNER_ID
] = "A OWNER_ID",
290 [TK_A_GROUP_ID
] = "A GROUP_ID",
291 [TK_A_STATIC_NODE
] = "A STATIC_NODE",
292 [TK_A_MODE_ID
] = "A MODE_ID",
293 [TK_A_ENV
] = "A ENV",
294 [TK_A_TAG
] = "A ENV",
295 [TK_A_NAME
] = "A NAME",
296 [TK_A_DEVLINK
] = "A DEVLINK",
297 [TK_A_ATTR
] = "A ATTR",
298 [TK_A_RUN_BUILTIN
] = "A RUN_BUILTIN",
299 [TK_A_RUN_PROGRAM
] = "A RUN_PROGRAM",
300 [TK_A_GOTO
] = "A GOTO",
305 return token_strs
[type
];
308 static void dump_token(struct udev_rules
*rules
, struct token
*token
)
310 enum token_type type
= token
->type
;
311 enum operation_type op
= token
->key
.op
;
312 enum string_glob_type glob
= token
->key
.glob
;
313 const char *value
= str(rules
, token
->key
.value_off
);
314 const char *attr
= &rules
->buf
[token
->key
.attr_off
];
319 const char *tks_ptr
= (char *)rules
->tokens
;
320 const char *tk_ptr
= (char *)token
;
321 unsigned int idx
= (tk_ptr
- tks_ptr
) / sizeof(struct token
);
323 log_debug("* RULE %s:%u, token: %u, count: %u, label: '%s'\n",
324 &rules
->buf
[token
->rule
.filename_off
], token
->rule
.filename_line
,
325 idx
, token
->rule
.token_count
,
326 &rules
->buf
[token
->rule
.label_off
]);
338 case TK_M_SUBSYSTEMS
:
342 case TK_M_IMPORT_FILE
:
343 case TK_M_IMPORT_PROG
:
345 case TK_M_IMPORT_CMDLINE
:
346 case TK_M_IMPORT_PARENT
:
353 case TK_A_RUN_BUILTIN
:
354 case TK_A_RUN_PROGRAM
:
355 log_debug("%s %s '%s'(%s)\n",
356 token_str(type
), operation_str(op
), value
, string_glob_str(glob
));
358 case TK_M_IMPORT_BUILTIN
:
359 log_debug("%s %i '%s'\n", token_str(type
), token
->key
.builtin_cmd
, value
);
366 log_debug("%s %s '%s' '%s'(%s)\n",
367 token_str(type
), operation_str(op
), attr
, value
, string_glob_str(glob
));
371 log_debug("%s %s '%s'\n", token_str(type
), operation_str(op
), value
);
373 case TK_A_STRING_ESCAPE_NONE
:
374 case TK_A_STRING_ESCAPE_REPLACE
:
375 case TK_A_DB_PERSIST
:
376 log_debug("%s\n", token_str(type
));
379 log_debug("%s %s '%s'(%s) %#o\n",
380 token_str(type
), operation_str(op
), value
, string_glob_str(glob
), token
->key
.mode
);
382 case TK_A_INOTIFY_WATCH
:
383 log_debug("%s %u\n", token_str(type
), token
->key
.watch
);
385 case TK_A_DEVLINK_PRIO
:
386 log_debug("%s %u\n", token_str(type
), token
->key
.devlink_prio
);
389 log_debug("%s %s %u\n", token_str(type
), operation_str(op
), token
->key
.uid
);
392 log_debug("%s %s %u\n", token_str(type
), operation_str(op
), token
->key
.gid
);
395 log_debug("%s %s %#o\n", token_str(type
), operation_str(op
), token
->key
.mode
);
397 case TK_A_STATIC_NODE
:
398 log_debug("%s '%s'\n", token_str(type
), value
);
400 case TK_M_EVENT_TIMEOUT
:
401 log_debug("%s %u\n", token_str(type
), token
->key
.event_timeout
);
404 log_debug("%s '%s' %u\n", token_str(type
), value
, token
->key
.rule_goto
);
407 log_debug("* %s\n", token_str(type
));
409 case TK_M_PARENTS_MIN
:
410 case TK_M_PARENTS_MAX
:
413 log_debug("unknown type %u\n", type
);
418 static void dump_rules(struct udev_rules
*rules
)
422 log_debug("dumping %u (%zu bytes) tokens, %u (%zu bytes) strings\n",
424 rules
->token_cur
* sizeof(struct token
),
427 for(i
= 0; i
< rules
->token_cur
; i
++)
428 dump_token(rules
, &rules
->tokens
[i
]);
431 static inline const char *operation_str(enum operation_type type
) { return NULL
; }
432 static inline const char *token_str(enum token_type type
) { return NULL
; }
433 static inline void dump_token(struct udev_rules
*rules
, struct token
*token
) {}
434 static inline void dump_rules(struct udev_rules
*rules
) {}
437 static int add_token(struct udev_rules
*rules
, struct token
*token
)
439 /* grow buffer if needed */
440 if (rules
->token_cur
+1 >= rules
->token_max
) {
441 struct token
*tokens
;
444 /* double the buffer size */
445 add
= rules
->token_max
;
449 tokens
= realloc(rules
->tokens
, (rules
->token_max
+ add
) * sizeof(struct token
));
452 rules
->tokens
= tokens
;
453 rules
->token_max
+= add
;
455 memcpy(&rules
->tokens
[rules
->token_cur
], token
, sizeof(struct token
));
460 static uid_t
add_uid(struct udev_rules
*rules
, const char *owner
)
466 /* lookup, if we know it already */
467 for (i
= 0; i
< rules
->uids_cur
; i
++) {
468 off
= rules
->uids
[i
].name_off
;
469 if (streq(rules_str(rules
, off
), owner
)) {
470 uid
= rules
->uids
[i
].uid
;
474 uid
= util_lookup_user(rules
->udev
, owner
);
476 /* grow buffer if needed */
477 if (rules
->uids_cur
+1 >= rules
->uids_max
) {
478 struct uid_gid
*uids
;
481 /* double the buffer size */
482 add
= rules
->uids_max
;
486 uids
= realloc(rules
->uids
, (rules
->uids_max
+ add
) * sizeof(struct uid_gid
));
490 rules
->uids_max
+= add
;
492 rules
->uids
[rules
->uids_cur
].uid
= uid
;
493 off
= rules_add_string(rules
, owner
);
496 rules
->uids
[rules
->uids_cur
].name_off
= off
;
501 static gid_t
add_gid(struct udev_rules
*rules
, const char *group
)
507 /* lookup, if we know it already */
508 for (i
= 0; i
< rules
->gids_cur
; i
++) {
509 off
= rules
->gids
[i
].name_off
;
510 if (streq(rules_str(rules
, off
), group
)) {
511 gid
= rules
->gids
[i
].gid
;
515 gid
= util_lookup_group(rules
->udev
, group
);
517 /* grow buffer if needed */
518 if (rules
->gids_cur
+1 >= rules
->gids_max
) {
519 struct uid_gid
*gids
;
522 /* double the buffer size */
523 add
= rules
->gids_max
;
527 gids
= realloc(rules
->gids
, (rules
->gids_max
+ add
) * sizeof(struct uid_gid
));
531 rules
->gids_max
+= add
;
533 rules
->gids
[rules
->gids_cur
].gid
= gid
;
534 off
= rules_add_string(rules
, group
);
537 rules
->gids
[rules
->gids_cur
].name_off
= off
;
542 static int import_property_from_string(struct udev_device
*dev
, char *line
)
550 while (isspace(key
[0]))
553 /* comment or empty line */
554 if (key
[0] == '#' || key
[0] == '\0')
557 /* split key/value */
558 val
= strchr(key
, '=');
565 while (isspace(val
[0]))
572 while (isspace(key
[len
-1]))
576 /* terminate value */
580 while (isspace(val
[len
-1]))
588 if (val
[0] == '"' || val
[0] == '\'') {
589 if (val
[len
-1] != val
[0]) {
590 log_debug("inconsistent quoting: '%s', skip\n", line
);
597 /* handle device, renamed by external tool, returning new path */
598 if (streq(key
, "DEVPATH")) {
599 char syspath
[UTIL_PATH_SIZE
];
601 log_debug("updating devpath from '%s' to '%s'\n",
602 udev_device_get_devpath(dev
), val
);
603 strscpyl(syspath
, sizeof(syspath
), "/sys", val
, NULL
);
604 udev_device_set_syspath(dev
, syspath
);
606 struct udev_list_entry
*entry
;
608 entry
= udev_device_add_property(dev
, key
, val
);
609 /* store in db, skip private keys */
611 udev_list_entry_set_num(entry
, true);
616 static int import_file_into_properties(struct udev_device
*dev
, const char *filename
)
619 char line
[UTIL_LINE_SIZE
];
621 f
= fopen(filename
, "re");
624 while (fgets(line
, sizeof(line
), f
) != NULL
)
625 import_property_from_string(dev
, line
);
630 static int import_program_into_properties(struct udev_event
*event
, const char *program
, const sigset_t
*sigmask
)
632 struct udev_device
*dev
= event
->dev
;
634 char result
[UTIL_LINE_SIZE
];
638 envp
= udev_device_get_properties_envp(dev
);
639 err
= udev_event_spawn(event
, program
, envp
, sigmask
, result
, sizeof(result
));
644 while (line
!= NULL
) {
647 pos
= strchr(line
, '\n');
652 import_property_from_string(dev
, line
);
658 static int import_parent_into_properties(struct udev_device
*dev
, const char *filter
)
660 struct udev_device
*dev_parent
;
661 struct udev_list_entry
*list_entry
;
663 dev_parent
= udev_device_get_parent(dev
);
664 if (dev_parent
== NULL
)
667 udev_list_entry_foreach(list_entry
, udev_device_get_properties_list_entry(dev_parent
)) {
668 const char *key
= udev_list_entry_get_name(list_entry
);
669 const char *val
= udev_list_entry_get_value(list_entry
);
671 if (fnmatch(filter
, key
, 0) == 0) {
672 struct udev_list_entry
*entry
;
674 entry
= udev_device_add_property(dev
, key
, val
);
675 /* store in db, skip private keys */
677 udev_list_entry_set_num(entry
, true);
683 #define WAIT_LOOP_PER_SECOND 50
684 static int wait_for_file(struct udev_device
*dev
, const char *file
, int timeout
)
686 char filepath
[UTIL_PATH_SIZE
];
687 char devicepath
[UTIL_PATH_SIZE
];
689 int loop
= timeout
* WAIT_LOOP_PER_SECOND
;
691 /* a relative path is a device attribute */
692 devicepath
[0] = '\0';
693 if (file
[0] != '/') {
694 strscpyl(devicepath
, sizeof(devicepath
), udev_device_get_syspath(dev
), NULL
);
695 strscpyl(filepath
, sizeof(filepath
), devicepath
, "/", file
, NULL
);
700 const struct timespec duration
= { 0, 1000 * 1000 * 1000 / WAIT_LOOP_PER_SECOND
};
703 if (stat(file
, &stats
) == 0) {
704 log_debug("file '%s' appeared after %i loops\n", file
, (timeout
* WAIT_LOOP_PER_SECOND
) - loop
-1);
707 /* make sure, the device did not disappear in the meantime */
708 if (devicepath
[0] != '\0' && stat(devicepath
, &stats
) != 0) {
709 log_debug("device disappeared while waiting for '%s'\n", file
);
712 log_debug("wait for '%s' for %i mseconds\n", file
, 1000 / WAIT_LOOP_PER_SECOND
);
713 nanosleep(&duration
, NULL
);
715 log_debug("waiting for '%s' failed\n", file
);
719 static int attr_subst_subdir(char *attr
, size_t len
)
723 if (strstr(attr
, "/*/")) {
725 char dirname
[UTIL_PATH_SIZE
];
729 strscpy(dirname
, sizeof(dirname
), attr
);
730 pos
= strstr(dirname
, "/*/");
735 dir
= opendir(dirname
);
739 for (dent
= readdir(dir
); dent
!= NULL
; dent
= readdir(dir
)) {
742 if (dent
->d_name
[0] == '.')
744 strscpyl(attr
, len
, dirname
, "/", dent
->d_name
, tail
, NULL
);
745 if (stat(attr
, &stats
) == 0) {
757 static int get_key(struct udev
*udev
, char **line
, char **key
, enum operation_type
*op
, char **value
)
763 if (linepos
== NULL
|| linepos
[0] == '\0')
766 /* skip whitespace */
767 while (isspace(linepos
[0]) || linepos
[0] == ',')
771 if (linepos
[0] == '\0')
777 if (linepos
[0] == '\0')
779 if (isspace(linepos
[0]))
781 if (linepos
[0] == '=')
783 if ((linepos
[0] == '+') || (linepos
[0] == '!') || (linepos
[0] == ':'))
784 if (linepos
[1] == '=')
788 /* remember end of key */
791 /* skip whitespace after key */
792 while (isspace(linepos
[0]))
794 if (linepos
[0] == '\0')
797 /* get operation type */
798 if (linepos
[0] == '=' && linepos
[1] == '=') {
801 } else if (linepos
[0] == '!' && linepos
[1] == '=') {
804 } else if (linepos
[0] == '+' && linepos
[1] == '=') {
807 } else if (linepos
[0] == '=') {
810 } else if (linepos
[0] == ':' && linepos
[1] == '=') {
811 *op
= OP_ASSIGN_FINAL
;
819 /* skip whitespace after operator */
820 while (isspace(linepos
[0]))
822 if (linepos
[0] == '\0')
826 if (linepos
[0] == '"')
833 temp
= strchr(linepos
, '"');
839 /* move line to next key */
844 /* extract possible KEY{attr} */
845 static const char *get_key_attribute(struct udev
*udev
, char *str
)
850 attr
= strchr(str
, '{');
853 pos
= strchr(attr
, '}');
855 log_error("missing closing brace for format\n");
864 static int rule_add_key(struct rule_tmp
*rule_tmp
, enum token_type type
,
865 enum operation_type op
,
866 const char *value
, const void *data
)
868 struct token
*token
= &rule_tmp
->token
[rule_tmp
->token_cur
];
869 const char *attr
= NULL
;
871 memset(token
, 0x00, sizeof(struct token
));
883 case TK_M_SUBSYSTEMS
:
887 case TK_M_IMPORT_FILE
:
888 case TK_M_IMPORT_PROG
:
890 case TK_M_IMPORT_CMDLINE
:
891 case TK_M_IMPORT_PARENT
:
901 token
->key
.value_off
= rules_add_string(rule_tmp
->rules
, value
);
903 case TK_M_IMPORT_BUILTIN
:
904 token
->key
.value_off
= rules_add_string(rule_tmp
->rules
, value
);
905 token
->key
.builtin_cmd
= *(enum udev_builtin_cmd
*)data
;
913 token
->key
.value_off
= rules_add_string(rule_tmp
->rules
, value
);
914 token
->key
.attr_off
= rules_add_string(rule_tmp
->rules
, attr
);
917 token
->key
.value_off
= rules_add_string(rule_tmp
->rules
, value
);
919 token
->key
.mode
= *(mode_t
*)data
;
921 case TK_A_STRING_ESCAPE_NONE
:
922 case TK_A_STRING_ESCAPE_REPLACE
:
923 case TK_A_DB_PERSIST
:
925 case TK_A_RUN_BUILTIN
:
926 case TK_A_RUN_PROGRAM
:
927 token
->key
.builtin_cmd
= *(enum udev_builtin_cmd
*)data
;
928 token
->key
.value_off
= rules_add_string(rule_tmp
->rules
, value
);
930 case TK_A_INOTIFY_WATCH
:
931 case TK_A_DEVLINK_PRIO
:
932 token
->key
.devlink_prio
= *(int *)data
;
935 token
->key
.uid
= *(uid_t
*)data
;
938 token
->key
.gid
= *(gid_t
*)data
;
941 token
->key
.mode
= *(mode_t
*)data
;
943 case TK_A_STATIC_NODE
:
944 token
->key
.value_off
= rules_add_string(rule_tmp
->rules
, value
);
946 case TK_M_EVENT_TIMEOUT
:
947 token
->key
.event_timeout
= *(int *)data
;
950 case TK_M_PARENTS_MIN
:
951 case TK_M_PARENTS_MAX
:
955 log_error("wrong type %u\n", type
);
959 if (value
!= NULL
&& type
< TK_M_MAX
) {
960 /* check if we need to split or call fnmatch() while matching rules */
961 enum string_glob_type glob
;
965 has_split
= (strchr(value
, '|') != NULL
);
966 has_glob
= (strchr(value
, '*') != NULL
|| strchr(value
, '?') != NULL
|| strchr(value
, '[') != NULL
);
967 if (has_split
&& has_glob
) {
968 glob
= GL_SPLIT_GLOB
;
969 } else if (has_split
) {
971 } else if (has_glob
) {
972 if (streq(value
, "?*"))
979 token
->key
.glob
= glob
;
982 if (value
!= NULL
&& type
> TK_M_MAX
) {
983 /* check if assigned value has substitution chars */
985 token
->key
.subst
= SB_SUBSYS
;
986 else if (strchr(value
, '%') != NULL
|| strchr(value
, '$') != NULL
)
987 token
->key
.subst
= SB_FORMAT
;
989 token
->key
.subst
= SB_NONE
;
993 /* check if property/attribut name has substitution chars */
995 token
->key
.attrsubst
= SB_SUBSYS
;
996 else if (strchr(attr
, '%') != NULL
|| strchr(attr
, '$') != NULL
)
997 token
->key
.attrsubst
= SB_FORMAT
;
999 token
->key
.attrsubst
= SB_NONE
;
1002 token
->key
.type
= type
;
1004 rule_tmp
->token_cur
++;
1005 if (rule_tmp
->token_cur
>= ELEMENTSOF(rule_tmp
->token
)) {
1006 log_error("temporary rule array too small\n");
1012 static int sort_token(struct udev_rules
*rules
, struct rule_tmp
*rule_tmp
)
1015 unsigned int start
= 0;
1016 unsigned int end
= rule_tmp
->token_cur
;
1018 for (i
= 0; i
< rule_tmp
->token_cur
; i
++) {
1019 enum token_type next_val
= TK_UNSET
;
1020 unsigned int next_idx
= 0;
1023 /* find smallest value */
1024 for (j
= start
; j
< end
; j
++) {
1025 if (rule_tmp
->token
[j
].type
== TK_UNSET
)
1027 if (next_val
== TK_UNSET
|| rule_tmp
->token
[j
].type
< next_val
) {
1028 next_val
= rule_tmp
->token
[j
].type
;
1033 /* add token and mark done */
1034 if (add_token(rules
, &rule_tmp
->token
[next_idx
]) != 0)
1036 rule_tmp
->token
[next_idx
].type
= TK_UNSET
;
1039 if (next_idx
== start
)
1041 if (next_idx
+1 == end
)
1047 static int add_rule(struct udev_rules
*rules
, char *line
,
1048 const char *filename
, unsigned int filename_off
, unsigned int lineno
)
1052 struct rule_tmp rule_tmp
;
1054 memset(&rule_tmp
, 0x00, sizeof(struct rule_tmp
));
1055 rule_tmp
.rules
= rules
;
1056 rule_tmp
.rule
.type
= TK_RULE
;
1057 /* the offset in the rule is limited to unsigned short */
1058 if (filename_off
< USHRT_MAX
)
1059 rule_tmp
.rule
.rule
.filename_off
= filename_off
;
1060 rule_tmp
.rule
.rule
.filename_line
= lineno
;
1066 enum operation_type op
;
1068 if (get_key(rules
->udev
, &linepos
, &key
, &op
, &value
) != 0)
1071 if (streq(key
, "ACTION")) {
1072 if (op
> OP_MATCH_MAX
) {
1073 log_error("invalid ACTION operation\n");
1076 rule_add_key(&rule_tmp
, TK_M_ACTION
, op
, value
, NULL
);
1080 if (streq(key
, "DEVPATH")) {
1081 if (op
> OP_MATCH_MAX
) {
1082 log_error("invalid DEVPATH operation\n");
1085 rule_add_key(&rule_tmp
, TK_M_DEVPATH
, op
, value
, NULL
);
1089 if (streq(key
, "KERNEL")) {
1090 if (op
> OP_MATCH_MAX
) {
1091 log_error("invalid KERNEL operation\n");
1094 rule_add_key(&rule_tmp
, TK_M_KERNEL
, op
, value
, NULL
);
1098 if (streq(key
, "SUBSYSTEM")) {
1099 if (op
> OP_MATCH_MAX
) {
1100 log_error("invalid SUBSYSTEM operation\n");
1103 /* bus, class, subsystem events should all be the same */
1104 if (streq(value
, "subsystem") ||
1105 streq(value
, "bus") ||
1106 streq(value
, "class")) {
1107 if (streq(value
, "bus") || streq(value
, "class"))
1108 log_error("'%s' must be specified as 'subsystem' \n"
1109 "please fix it in %s:%u", value
, filename
, lineno
);
1110 rule_add_key(&rule_tmp
, TK_M_SUBSYSTEM
, op
, "subsystem|class|bus", NULL
);
1112 rule_add_key(&rule_tmp
, TK_M_SUBSYSTEM
, op
, value
, NULL
);
1116 if (streq(key
, "DRIVER")) {
1117 if (op
> OP_MATCH_MAX
) {
1118 log_error("invalid DRIVER operation\n");
1121 rule_add_key(&rule_tmp
, TK_M_DRIVER
, op
, value
, NULL
);
1125 if (startswith(key
, "ATTR{")) {
1126 attr
= get_key_attribute(rules
->udev
, key
+ sizeof("ATTR")-1);
1128 log_error("error parsing ATTR attribute\n");
1131 if (op
< OP_MATCH_MAX
) {
1132 rule_add_key(&rule_tmp
, TK_M_ATTR
, op
, value
, attr
);
1134 rule_add_key(&rule_tmp
, TK_A_ATTR
, op
, value
, attr
);
1139 if (streq(key
, "KERNELS")) {
1140 if (op
> OP_MATCH_MAX
) {
1141 log_error("invalid KERNELS operation\n");
1144 rule_add_key(&rule_tmp
, TK_M_KERNELS
, op
, value
, NULL
);
1148 if (streq(key
, "SUBSYSTEMS")) {
1149 if (op
> OP_MATCH_MAX
) {
1150 log_error("invalid SUBSYSTEMS operation\n");
1153 rule_add_key(&rule_tmp
, TK_M_SUBSYSTEMS
, op
, value
, NULL
);
1157 if (streq(key
, "DRIVERS")) {
1158 if (op
> OP_MATCH_MAX
) {
1159 log_error("invalid DRIVERS operation\n");
1162 rule_add_key(&rule_tmp
, TK_M_DRIVERS
, op
, value
, NULL
);
1166 if (startswith(key
, "ATTRS{")) {
1167 if (op
> OP_MATCH_MAX
) {
1168 log_error("invalid ATTRS operation\n");
1171 attr
= get_key_attribute(rules
->udev
, key
+ sizeof("ATTRS")-1);
1173 log_error("error parsing ATTRS attribute\n");
1176 if (startswith(attr
, "device/"))
1177 log_error("the 'device' link may not be available in a future kernel, "
1178 "please fix it in %s:%u", filename
, lineno
);
1179 else if (strstr(attr
, "../") != NULL
)
1180 log_error("do not reference parent sysfs directories directly, "
1181 "it may break with a future kernel, please fix it in %s:%u", filename
, lineno
);
1182 rule_add_key(&rule_tmp
, TK_M_ATTRS
, op
, value
, attr
);
1186 if (streq(key
, "TAGS")) {
1187 if (op
> OP_MATCH_MAX
) {
1188 log_error("invalid TAGS operation\n");
1191 rule_add_key(&rule_tmp
, TK_M_TAGS
, op
, value
, NULL
);
1195 if (startswith(key
, "ENV{")) {
1196 attr
= get_key_attribute(rules
->udev
, key
+ sizeof("ENV")-1);
1198 log_error("error parsing ENV attribute\n");
1201 if (op
< OP_MATCH_MAX
) {
1202 if (rule_add_key(&rule_tmp
, TK_M_ENV
, op
, value
, attr
) != 0)
1205 static const char *blacklist
[] = {
1220 for (i
= 0; i
< ELEMENTSOF(blacklist
); i
++) {
1221 if (!streq(attr
, blacklist
[i
]))
1223 log_error("invalid ENV attribute, '%s' can not be set %s:%u\n", attr
, filename
, lineno
);
1226 if (rule_add_key(&rule_tmp
, TK_A_ENV
, op
, value
, attr
) != 0)
1232 if (streq(key
, "TAG")) {
1233 if (op
< OP_MATCH_MAX
)
1234 rule_add_key(&rule_tmp
, TK_M_TAG
, op
, value
, NULL
);
1236 rule_add_key(&rule_tmp
, TK_A_TAG
, op
, value
, NULL
);
1240 if (streq(key
, "PROGRAM")) {
1241 rule_add_key(&rule_tmp
, TK_M_PROGRAM
, op
, value
, NULL
);
1245 if (streq(key
, "RESULT")) {
1246 if (op
> OP_MATCH_MAX
) {
1247 log_error("invalid RESULT operation\n");
1250 rule_add_key(&rule_tmp
, TK_M_RESULT
, op
, value
, NULL
);
1254 if (startswith(key
, "IMPORT")) {
1255 attr
= get_key_attribute(rules
->udev
, key
+ sizeof("IMPORT")-1);
1257 log_error("IMPORT{} type missing, ignoring IMPORT %s:%u\n", filename
, lineno
);
1260 if (streq(attr
, "program")) {
1261 /* find known built-in command */
1262 if (value
[0] != '/') {
1263 enum udev_builtin_cmd cmd
;
1265 cmd
= udev_builtin_lookup(value
);
1266 if (cmd
< UDEV_BUILTIN_MAX
) {
1267 log_debug("IMPORT found builtin '%s', replacing %s:%u\n",
1268 value
, filename
, lineno
);
1269 rule_add_key(&rule_tmp
, TK_M_IMPORT_BUILTIN
, op
, value
, &cmd
);
1273 rule_add_key(&rule_tmp
, TK_M_IMPORT_PROG
, op
, value
, NULL
);
1274 } else if (streq(attr
, "builtin")) {
1275 enum udev_builtin_cmd cmd
= udev_builtin_lookup(value
);
1277 if (cmd
< UDEV_BUILTIN_MAX
)
1278 rule_add_key(&rule_tmp
, TK_M_IMPORT_BUILTIN
, op
, value
, &cmd
);
1280 log_error("IMPORT{builtin}: '%s' unknown %s:%u\n", value
, filename
, lineno
);
1281 } else if (streq(attr
, "file")) {
1282 rule_add_key(&rule_tmp
, TK_M_IMPORT_FILE
, op
, value
, NULL
);
1283 } else if (streq(attr
, "db")) {
1284 rule_add_key(&rule_tmp
, TK_M_IMPORT_DB
, op
, value
, NULL
);
1285 } else if (streq(attr
, "cmdline")) {
1286 rule_add_key(&rule_tmp
, TK_M_IMPORT_CMDLINE
, op
, value
, NULL
);
1287 } else if (streq(attr
, "parent")) {
1288 rule_add_key(&rule_tmp
, TK_M_IMPORT_PARENT
, op
, value
, NULL
);
1290 log_error("IMPORT{} unknown type, ignoring IMPORT %s:%u\n", filename
, lineno
);
1294 if (startswith(key
, "TEST")) {
1297 if (op
> OP_MATCH_MAX
) {
1298 log_error("invalid TEST operation\n");
1301 attr
= get_key_attribute(rules
->udev
, key
+ sizeof("TEST")-1);
1303 mode
= strtol(attr
, NULL
, 8);
1304 rule_add_key(&rule_tmp
, TK_M_TEST
, op
, value
, &mode
);
1306 rule_add_key(&rule_tmp
, TK_M_TEST
, op
, value
, NULL
);
1311 if (startswith(key
, "RUN")) {
1312 attr
= get_key_attribute(rules
->udev
, key
+ sizeof("RUN")-1);
1316 if (streq(attr
, "builtin")) {
1317 enum udev_builtin_cmd cmd
= udev_builtin_lookup(value
);
1319 if (cmd
< UDEV_BUILTIN_MAX
)
1320 rule_add_key(&rule_tmp
, TK_A_RUN_BUILTIN
, op
, value
, &cmd
);
1322 log_error("IMPORT{builtin}: '%s' unknown %s:%u\n", value
, filename
, lineno
);
1323 } else if (streq(attr
, "program")) {
1324 enum udev_builtin_cmd cmd
= UDEV_BUILTIN_MAX
;
1326 rule_add_key(&rule_tmp
, TK_A_RUN_PROGRAM
, op
, value
, &cmd
);
1328 log_error("RUN{} unknown type, ignoring RUN %s:%u\n", filename
, lineno
);
1334 if (streq(key
, "WAIT_FOR") || streq(key
, "WAIT_FOR_SYSFS")) {
1335 rule_add_key(&rule_tmp
, TK_M_WAITFOR
, 0, value
, NULL
);
1339 if (streq(key
, "LABEL")) {
1340 rule_tmp
.rule
.rule
.label_off
= rules_add_string(rules
, value
);
1344 if (streq(key
, "GOTO")) {
1345 rule_add_key(&rule_tmp
, TK_A_GOTO
, 0, value
, NULL
);
1349 if (startswith(key
, "NAME")) {
1350 if (op
< OP_MATCH_MAX
) {
1351 rule_add_key(&rule_tmp
, TK_M_NAME
, op
, value
, NULL
);
1353 if (streq(value
, "%k")) {
1354 log_error("NAME=\"%%k\" is ignored, because it breaks kernel supplied names, "
1355 "please remove it from %s:%u\n", filename
, lineno
);
1358 if (value
[0] == '\0') {
1359 log_debug("NAME=\"\" is ignored, because udev will not delete any device nodes, "
1360 "please remove it from %s:%u\n", filename
, lineno
);
1363 rule_add_key(&rule_tmp
, TK_A_NAME
, op
, value
, NULL
);
1365 rule_tmp
.rule
.rule
.can_set_name
= true;
1369 if (streq(key
, "SYMLINK")) {
1370 if (op
< OP_MATCH_MAX
)
1371 rule_add_key(&rule_tmp
, TK_M_DEVLINK
, op
, value
, NULL
);
1373 rule_add_key(&rule_tmp
, TK_A_DEVLINK
, op
, value
, NULL
);
1374 rule_tmp
.rule
.rule
.can_set_name
= true;
1378 if (streq(key
, "OWNER")) {
1382 uid
= strtoul(value
, &endptr
, 10);
1383 if (endptr
[0] == '\0') {
1384 rule_add_key(&rule_tmp
, TK_A_OWNER_ID
, op
, NULL
, &uid
);
1385 } else if ((rules
->resolve_names
> 0) && strchr("$%", value
[0]) == NULL
) {
1386 uid
= add_uid(rules
, value
);
1387 rule_add_key(&rule_tmp
, TK_A_OWNER_ID
, op
, NULL
, &uid
);
1388 } else if (rules
->resolve_names
>= 0) {
1389 rule_add_key(&rule_tmp
, TK_A_OWNER
, op
, value
, NULL
);
1391 rule_tmp
.rule
.rule
.can_set_name
= true;
1395 if (streq(key
, "GROUP")) {
1399 gid
= strtoul(value
, &endptr
, 10);
1400 if (endptr
[0] == '\0') {
1401 rule_add_key(&rule_tmp
, TK_A_GROUP_ID
, op
, NULL
, &gid
);
1402 } else if ((rules
->resolve_names
> 0) && strchr("$%", value
[0]) == NULL
) {
1403 gid
= add_gid(rules
, value
);
1404 rule_add_key(&rule_tmp
, TK_A_GROUP_ID
, op
, NULL
, &gid
);
1405 } else if (rules
->resolve_names
>= 0) {
1406 rule_add_key(&rule_tmp
, TK_A_GROUP
, op
, value
, NULL
);
1408 rule_tmp
.rule
.rule
.can_set_name
= true;
1412 if (streq(key
, "MODE")) {
1416 mode
= strtol(value
, &endptr
, 8);
1417 if (endptr
[0] == '\0')
1418 rule_add_key(&rule_tmp
, TK_A_MODE_ID
, op
, NULL
, &mode
);
1420 rule_add_key(&rule_tmp
, TK_A_MODE
, op
, value
, NULL
);
1421 rule_tmp
.rule
.rule
.can_set_name
= true;
1425 if (streq(key
, "OPTIONS")) {
1428 pos
= strstr(value
, "link_priority=");
1430 int prio
= atoi(&pos
[strlen("link_priority=")]);
1432 rule_add_key(&rule_tmp
, TK_A_DEVLINK_PRIO
, op
, NULL
, &prio
);
1435 pos
= strstr(value
, "event_timeout=");
1437 int tout
= atoi(&pos
[strlen("event_timeout=")]);
1439 rule_add_key(&rule_tmp
, TK_M_EVENT_TIMEOUT
, op
, NULL
, &tout
);
1442 pos
= strstr(value
, "string_escape=");
1444 pos
= &pos
[strlen("string_escape=")];
1445 if (startswith(pos
, "none"))
1446 rule_add_key(&rule_tmp
, TK_A_STRING_ESCAPE_NONE
, op
, NULL
, NULL
);
1447 else if (startswith(pos
, "replace"))
1448 rule_add_key(&rule_tmp
, TK_A_STRING_ESCAPE_REPLACE
, op
, NULL
, NULL
);
1451 pos
= strstr(value
, "db_persist");
1453 rule_add_key(&rule_tmp
, TK_A_DB_PERSIST
, op
, NULL
, NULL
);
1455 pos
= strstr(value
, "nowatch");
1459 rule_add_key(&rule_tmp
, TK_A_INOTIFY_WATCH
, op
, NULL
, &off
);
1461 pos
= strstr(value
, "watch");
1465 rule_add_key(&rule_tmp
, TK_A_INOTIFY_WATCH
, op
, NULL
, &on
);
1469 pos
= strstr(value
, "static_node=");
1471 rule_add_key(&rule_tmp
, TK_A_STATIC_NODE
, op
, &pos
[strlen("static_node=")], NULL
);
1472 rule_tmp
.rule
.rule
.has_static_node
= true;
1478 log_error("unknown key '%s' in %s:%u\n", key
, filename
, lineno
);
1482 /* add rule token */
1483 rule_tmp
.rule
.rule
.token_count
= 1 + rule_tmp
.token_cur
;
1484 if (add_token(rules
, &rule_tmp
.rule
) != 0)
1487 /* add tokens to list, sorted by type */
1488 if (sort_token(rules
, &rule_tmp
) != 0)
1493 log_error("invalid rule '%s:%u'\n", filename
, lineno
);
1497 static int parse_file(struct udev_rules
*rules
, const char *filename
)
1500 unsigned int first_token
;
1501 unsigned int filename_off
;
1502 char line
[UTIL_LINE_SIZE
];
1506 if (null_or_empty_path(filename
)) {
1507 log_debug("skip empty file: %s\n", filename
);
1510 log_debug("read rules file: %s\n", filename
);
1512 f
= fopen(filename
, "re");
1516 first_token
= rules
->token_cur
;
1517 filename_off
= rules_add_string(rules
, filename
);
1519 while (fgets(line
, sizeof(line
), f
) != NULL
) {
1523 /* skip whitespace */
1526 while (isspace(key
[0]))
1537 /* continue reading if backslash+newline is found */
1538 while (line
[len
-2] == '\\') {
1539 if (fgets(&line
[len
-2], (sizeof(line
)-len
)+2, f
) == NULL
)
1541 if (strlen(&line
[len
-2]) < 2)
1547 if (len
+1 >= sizeof(line
)) {
1548 log_error("line too long '%s':%u, ignored\n", filename
, line_nr
);
1551 add_rule(rules
, key
, filename
, filename_off
, line_nr
);
1555 /* link GOTOs to LABEL rules in this file to be able to fast-forward */
1556 for (i
= first_token
+1; i
< rules
->token_cur
; i
++) {
1557 if (rules
->tokens
[i
].type
== TK_A_GOTO
) {
1558 char *label
= rules_str(rules
, rules
->tokens
[i
].key
.value_off
);
1561 for (j
= i
+1; j
< rules
->token_cur
; j
++) {
1562 if (rules
->tokens
[j
].type
!= TK_RULE
)
1564 if (rules
->tokens
[j
].rule
.label_off
== 0)
1566 if (!streq(label
, rules_str(rules
, rules
->tokens
[j
].rule
.label_off
)))
1568 rules
->tokens
[i
].key
.rule_goto
= j
;
1571 if (rules
->tokens
[i
].key
.rule_goto
== 0)
1572 log_error("GOTO '%s' has no matching label in: '%s'\n", label
, filename
);
1578 struct udev_rules
*udev_rules_new(struct udev
*udev
, int resolve_names
)
1580 struct udev_rules
*rules
;
1581 struct udev_list file_list
;
1582 struct token end_token
;
1586 rules
= calloc(1, sizeof(struct udev_rules
));
1590 rules
->resolve_names
= resolve_names
;
1591 udev_list_init(udev
, &file_list
, true);
1593 /* init token array and string buffer */
1594 rules
->tokens
= malloc(PREALLOC_TOKEN
* sizeof(struct token
));
1595 if (rules
->tokens
== NULL
)
1596 return udev_rules_unref(rules
);
1597 rules
->token_max
= PREALLOC_TOKEN
;
1599 rules
->strbuf
= strbuf_new();
1601 return udev_rules_unref(rules
);
1603 rules
->dirs
= strv_new("/etc/udev/rules.d",
1604 "/run/udev/rules.d",
1605 UDEVLIBEXECDIR
"/rules.d",
1608 log_error("failed to build config directory array");
1609 return udev_rules_unref(rules
);
1611 if (!path_strv_canonicalize(rules
->dirs
)) {
1612 log_error("failed to canonicalize config directories\n");
1613 return udev_rules_unref(rules
);
1615 strv_uniq(rules
->dirs
);
1617 rules
->dirs_ts_usec
= calloc(strv_length(rules
->dirs
), sizeof(long long));
1618 if(!rules
->dirs_ts_usec
)
1619 return udev_rules_unref(rules
);
1620 udev_rules_check_timestamp(rules
);
1622 r
= conf_files_list_strv(&files
, ".rules", NULL
, (const char **)rules
->dirs
);
1624 log_error("failed to enumerate rules files: %s\n", strerror(-r
));
1625 return udev_rules_unref(rules
);
1629 * The offset value in the rules strct is limited; add all
1630 * rules file names to the beginning of the string buffer.
1632 STRV_FOREACH(f
, files
)
1633 rules_add_string(rules
, *f
);
1635 STRV_FOREACH(f
, files
)
1636 parse_file(rules
, *f
);
1640 memset(&end_token
, 0x00, sizeof(struct token
));
1641 end_token
.type
= TK_END
;
1642 add_token(rules
, &end_token
);
1643 log_debug("rules contain %zu bytes tokens (%u * %zu bytes), %zu bytes strings\n",
1644 rules
->token_max
* sizeof(struct token
), rules
->token_max
, sizeof(struct token
), rules
->strbuf
->len
);
1646 /* cleanup temporary strbuf data */
1647 log_debug("%zu strings (%zu bytes), %zu de-duplicated (%zu bytes), %zu trie nodes used\n",
1648 rules
->strbuf
->in_count
, rules
->strbuf
->in_len
,
1649 rules
->strbuf
->dedup_count
, rules
->strbuf
->dedup_len
, rules
->strbuf
->nodes_count
);
1650 strbuf_complete(rules
->strbuf
);
1652 /* cleanup uid/gid cache */
1655 rules
->uids_cur
= 0;
1656 rules
->uids_max
= 0;
1659 rules
->gids_cur
= 0;
1660 rules
->gids_max
= 0;
1666 struct udev_rules
*udev_rules_unref(struct udev_rules
*rules
)
1670 free(rules
->tokens
);
1671 strbuf_cleanup(rules
->strbuf
);
1674 strv_free(rules
->dirs
);
1675 free(rules
->dirs_ts_usec
);
1680 bool udev_rules_check_timestamp(struct udev_rules
*rules
)
1683 bool changed
= false;
1688 for (i
= 0; rules
->dirs
[i
]; i
++) {
1691 if (stat(rules
->dirs
[i
], &stats
) < 0)
1694 if (rules
->dirs_ts_usec
[i
] == timespec_load(&stats
.st_mtim
))
1698 if (rules
->dirs_ts_usec
[i
] != 0) {
1699 log_debug("reload - timestamp of '%s' changed\n", rules
->dirs
[i
]);
1703 /* update timestamp */
1704 rules
->dirs_ts_usec
[i
] = timespec_load(&stats
.st_mtim
);
1710 static int match_key(struct udev_rules
*rules
, struct token
*token
, const char *val
)
1712 char *key_value
= rules_str(rules
, token
->key
.value_off
);
1719 switch (token
->key
.glob
) {
1721 match
= (streq(key_value
, val
));
1724 match
= (fnmatch(key_value
, val
, 0) == 0);
1731 s
= rules_str(rules
, token
->key
.value_off
);
1736 next
= strchr(s
, '|');
1738 size_t matchlen
= (size_t)(next
- s
);
1740 match
= (matchlen
== len
&& strncmp(s
, val
, matchlen
) == 0);
1744 match
= (streq(s
, val
));
1753 char value
[UTIL_PATH_SIZE
];
1755 strscpy(value
, sizeof(value
), rules_str(rules
, token
->key
.value_off
));
1757 while (key_value
!= NULL
) {
1758 pos
= strchr(key_value
, '|');
1763 match
= (fnmatch(key_value
, val
, 0) == 0);
1771 match
= (val
[0] != '\0');
1777 if (match
&& (token
->key
.op
== OP_MATCH
))
1779 if (!match
&& (token
->key
.op
== OP_NOMATCH
))
1784 static int match_attr(struct udev_rules
*rules
, struct udev_device
*dev
, struct udev_event
*event
, struct token
*cur
)
1787 char nbuf
[UTIL_NAME_SIZE
];
1789 char vbuf
[UTIL_NAME_SIZE
];
1792 name
= rules_str(rules
, cur
->key
.attr_off
);
1793 switch (cur
->key
.attrsubst
) {
1795 udev_event_apply_format(event
, name
, nbuf
, sizeof(nbuf
));
1799 value
= udev_device_get_sysattr_value(dev
, name
);
1804 if (util_resolve_subsys_kernel(event
->udev
, name
, vbuf
, sizeof(vbuf
), 1) != 0)
1812 /* remove trailing whitespace, if not asked to match for it */
1813 len
= strlen(value
);
1814 if (len
> 0 && isspace(value
[len
-1])) {
1815 const char *key_value
;
1818 key_value
= rules_str(rules
, cur
->key
.value_off
);
1819 klen
= strlen(key_value
);
1820 if (klen
> 0 && !isspace(key_value
[klen
-1])) {
1821 if (value
!= vbuf
) {
1822 strscpy(vbuf
, sizeof(vbuf
), value
);
1825 while (len
> 0 && isspace(vbuf
[--len
]))
1830 return match_key(rules
, cur
, value
);
1839 int udev_rules_apply_to_event(struct udev_rules
*rules
, struct udev_event
*event
, const sigset_t
*sigmask
)
1843 enum escape_type esc
= ESCAPE_UNSET
;
1846 if (rules
->tokens
== NULL
)
1849 can_set_name
= ((!streq(udev_device_get_action(event
->dev
), "remove")) &&
1850 (major(udev_device_get_devnum(event
->dev
)) > 0 ||
1851 udev_device_get_ifindex(event
->dev
) > 0));
1853 /* loop through token list, match, run actions or forward to next rule */
1854 cur
= &rules
->tokens
[0];
1857 dump_token(rules
, cur
);
1858 switch (cur
->type
) {
1862 /* possibly skip rules which want to set NAME, SYMLINK, OWNER, GROUP, MODE */
1863 if (!can_set_name
&& rule
->rule
.can_set_name
)
1868 if (match_key(rules
, cur
, udev_device_get_action(event
->dev
)) != 0)
1872 if (match_key(rules
, cur
, udev_device_get_devpath(event
->dev
)) != 0)
1876 if (match_key(rules
, cur
, udev_device_get_sysname(event
->dev
)) != 0)
1879 case TK_M_DEVLINK
: {
1880 struct udev_list_entry
*list_entry
;
1883 udev_list_entry_foreach(list_entry
, udev_device_get_devlinks_list_entry(event
->dev
)) {
1884 const char *devlink
;
1886 devlink
= udev_list_entry_get_name(list_entry
) + strlen("/dev/");
1887 if (match_key(rules
, cur
, devlink
) == 0) {
1897 if (match_key(rules
, cur
, event
->name
) != 0)
1901 const char *key_name
= rules_str(rules
, cur
->key
.attr_off
);
1904 value
= udev_device_get_property_value(event
->dev
, key_name
);
1907 if (match_key(rules
, cur
, value
))
1912 struct udev_list_entry
*list_entry
;
1915 udev_list_entry_foreach(list_entry
, udev_device_get_tags_list_entry(event
->dev
)) {
1916 if (streq(rules_str(rules
, cur
->key
.value_off
), udev_list_entry_get_name(list_entry
))) {
1921 if (!match
&& (cur
->key
.op
!= OP_NOMATCH
))
1925 case TK_M_SUBSYSTEM
:
1926 if (match_key(rules
, cur
, udev_device_get_subsystem(event
->dev
)) != 0)
1930 if (match_key(rules
, cur
, udev_device_get_driver(event
->dev
)) != 0)
1933 case TK_M_WAITFOR
: {
1934 char filename
[UTIL_PATH_SIZE
];
1937 udev_event_apply_format(event
, rules_str(rules
, cur
->key
.value_off
), filename
, sizeof(filename
));
1938 found
= (wait_for_file(event
->dev
, filename
, 10) == 0);
1939 if (!found
&& (cur
->key
.op
!= OP_NOMATCH
))
1944 if (match_attr(rules
, event
->dev
, event
, cur
) != 0)
1948 case TK_M_SUBSYSTEMS
:
1954 /* get whole sequence of parent matches */
1956 while (next
->type
> TK_M_PARENTS_MIN
&& next
->type
< TK_M_PARENTS_MAX
)
1959 /* loop over parents */
1960 event
->dev_parent
= event
->dev
;
1964 /* loop over sequence of parent match keys */
1965 for (key
= cur
; key
< next
; key
++ ) {
1966 dump_token(rules
, key
);
1969 if (match_key(rules
, key
, udev_device_get_sysname(event
->dev_parent
)) != 0)
1972 case TK_M_SUBSYSTEMS
:
1973 if (match_key(rules
, key
, udev_device_get_subsystem(event
->dev_parent
)) != 0)
1977 if (match_key(rules
, key
, udev_device_get_driver(event
->dev_parent
)) != 0)
1981 if (match_attr(rules
, event
->dev_parent
, event
, key
) != 0)
1985 bool match
= udev_device_has_tag(event
->dev_parent
, rules_str(rules
, cur
->key
.value_off
));
1987 if (match
&& key
->key
.op
== OP_NOMATCH
)
1989 if (!match
&& key
->key
.op
== OP_MATCH
)
2000 event
->dev_parent
= udev_device_get_parent(event
->dev_parent
);
2001 if (event
->dev_parent
== NULL
)
2004 /* move behind our sequence of parent match keys */
2009 char filename
[UTIL_PATH_SIZE
];
2010 struct stat statbuf
;
2013 udev_event_apply_format(event
, rules_str(rules
, cur
->key
.value_off
), filename
, sizeof(filename
));
2014 if (util_resolve_subsys_kernel(event
->udev
, filename
, filename
, sizeof(filename
), 0) != 0) {
2015 if (filename
[0] != '/') {
2016 char tmp
[UTIL_PATH_SIZE
];
2018 strscpy(tmp
, sizeof(tmp
), filename
);
2019 strscpyl(filename
, sizeof(filename
),
2020 udev_device_get_syspath(event
->dev
), "/", tmp
, NULL
);
2023 attr_subst_subdir(filename
, sizeof(filename
));
2025 match
= (stat(filename
, &statbuf
) == 0);
2026 if (match
&& cur
->key
.mode
> 0)
2027 match
= ((statbuf
.st_mode
& cur
->key
.mode
) > 0);
2028 if (match
&& cur
->key
.op
== OP_NOMATCH
)
2030 if (!match
&& cur
->key
.op
== OP_MATCH
)
2034 case TK_M_EVENT_TIMEOUT
:
2035 log_debug("OPTIONS event_timeout=%u\n", cur
->key
.event_timeout
);
2036 event
->timeout_usec
= cur
->key
.event_timeout
* 1000 * 1000;
2038 case TK_M_PROGRAM
: {
2039 char program
[UTIL_PATH_SIZE
];
2041 char result
[UTIL_PATH_SIZE
];
2043 free(event
->program_result
);
2044 event
->program_result
= NULL
;
2045 udev_event_apply_format(event
, rules_str(rules
, cur
->key
.value_off
), program
, sizeof(program
));
2046 envp
= udev_device_get_properties_envp(event
->dev
);
2047 log_debug("PROGRAM '%s' %s:%u\n",
2049 rules_str(rules
, rule
->rule
.filename_off
),
2050 rule
->rule
.filename_line
);
2052 if (udev_event_spawn(event
, program
, envp
, sigmask
, result
, sizeof(result
)) < 0) {
2053 if (cur
->key
.op
!= OP_NOMATCH
)
2058 util_remove_trailing_chars(result
, '\n');
2059 if (esc
== ESCAPE_UNSET
|| esc
== ESCAPE_REPLACE
) {
2060 count
= util_replace_chars(result
, UDEV_ALLOWED_CHARS_INPUT
);
2062 log_debug("%i character(s) replaced\n" , count
);
2064 event
->program_result
= strdup(result
);
2065 if (cur
->key
.op
== OP_NOMATCH
)
2070 case TK_M_IMPORT_FILE
: {
2071 char import
[UTIL_PATH_SIZE
];
2073 udev_event_apply_format(event
, rules_str(rules
, cur
->key
.value_off
), import
, sizeof(import
));
2074 if (import_file_into_properties(event
->dev
, import
) != 0)
2075 if (cur
->key
.op
!= OP_NOMATCH
)
2079 case TK_M_IMPORT_PROG
: {
2080 char import
[UTIL_PATH_SIZE
];
2082 udev_event_apply_format(event
, rules_str(rules
, cur
->key
.value_off
), import
, sizeof(import
));
2083 log_debug("IMPORT '%s' %s:%u\n",
2085 rules_str(rules
, rule
->rule
.filename_off
),
2086 rule
->rule
.filename_line
);
2088 if (import_program_into_properties(event
, import
, sigmask
) != 0)
2089 if (cur
->key
.op
!= OP_NOMATCH
)
2093 case TK_M_IMPORT_BUILTIN
: {
2094 char command
[UTIL_PATH_SIZE
];
2096 if (udev_builtin_run_once(cur
->key
.builtin_cmd
)) {
2097 /* check if we ran already */
2098 if (event
->builtin_run
& (1 << cur
->key
.builtin_cmd
)) {
2099 log_debug("IMPORT builtin skip '%s' %s:%u\n",
2100 udev_builtin_name(cur
->key
.builtin_cmd
),
2101 rules_str(rules
, rule
->rule
.filename_off
),
2102 rule
->rule
.filename_line
);
2103 /* return the result from earlier run */
2104 if (event
->builtin_ret
& (1 << cur
->key
.builtin_cmd
))
2105 if (cur
->key
.op
!= OP_NOMATCH
)
2110 event
->builtin_run
|= (1 << cur
->key
.builtin_cmd
);
2113 udev_event_apply_format(event
, rules_str(rules
, cur
->key
.value_off
), command
, sizeof(command
));
2114 log_debug("IMPORT builtin '%s' %s:%u\n",
2115 udev_builtin_name(cur
->key
.builtin_cmd
),
2116 rules_str(rules
, rule
->rule
.filename_off
),
2117 rule
->rule
.filename_line
);
2119 if (udev_builtin_run(event
->dev
, cur
->key
.builtin_cmd
, command
, false) != 0) {
2120 /* remember failure */
2121 log_debug("IMPORT builtin '%s' returned non-zero\n",
2122 udev_builtin_name(cur
->key
.builtin_cmd
));
2123 event
->builtin_ret
|= (1 << cur
->key
.builtin_cmd
);
2124 if (cur
->key
.op
!= OP_NOMATCH
)
2129 case TK_M_IMPORT_DB
: {
2130 const char *key
= rules_str(rules
, cur
->key
.value_off
);
2133 value
= udev_device_get_property_value(event
->dev_db
, key
);
2134 if (value
!= NULL
) {
2135 struct udev_list_entry
*entry
;
2137 entry
= udev_device_add_property(event
->dev
, key
, value
);
2138 udev_list_entry_set_num(entry
, true);
2140 if (cur
->key
.op
!= OP_NOMATCH
)
2145 case TK_M_IMPORT_CMDLINE
: {
2147 bool imported
= false;
2149 f
= fopen("/proc/cmdline", "re");
2153 if (fgets(cmdline
, sizeof(cmdline
), f
) != NULL
) {
2154 const char *key
= rules_str(rules
, cur
->key
.value_off
);
2157 pos
= strstr(cmdline
, key
);
2159 struct udev_list_entry
*entry
;
2162 if (pos
[0] == '\0' || isspace(pos
[0])) {
2163 /* we import simple flags as 'FLAG=1' */
2164 entry
= udev_device_add_property(event
->dev
, key
, "1");
2165 udev_list_entry_set_num(entry
, true);
2167 } else if (pos
[0] == '=') {
2172 while (pos
[0] != '\0' && !isspace(pos
[0]))
2175 entry
= udev_device_add_property(event
->dev
, key
, value
);
2176 udev_list_entry_set_num(entry
, true);
2183 if (!imported
&& cur
->key
.op
!= OP_NOMATCH
)
2187 case TK_M_IMPORT_PARENT
: {
2188 char import
[UTIL_PATH_SIZE
];
2190 udev_event_apply_format(event
, rules_str(rules
, cur
->key
.value_off
), import
, sizeof(import
));
2191 if (import_parent_into_properties(event
->dev
, import
) != 0)
2192 if (cur
->key
.op
!= OP_NOMATCH
)
2197 if (match_key(rules
, cur
, event
->program_result
) != 0)
2200 case TK_A_STRING_ESCAPE_NONE
:
2203 case TK_A_STRING_ESCAPE_REPLACE
:
2204 esc
= ESCAPE_REPLACE
;
2206 case TK_A_DB_PERSIST
:
2207 udev_device_set_db_persist(event
->dev
);
2209 case TK_A_INOTIFY_WATCH
:
2210 if (event
->inotify_watch_final
)
2212 if (cur
->key
.op
== OP_ASSIGN_FINAL
)
2213 event
->inotify_watch_final
= true;
2214 event
->inotify_watch
= cur
->key
.watch
;
2216 case TK_A_DEVLINK_PRIO
:
2217 udev_device_set_devlink_priority(event
->dev
, cur
->key
.devlink_prio
);
2220 char owner
[UTIL_NAME_SIZE
];
2222 if (event
->owner_final
)
2224 if (cur
->key
.op
== OP_ASSIGN_FINAL
)
2225 event
->owner_final
= true;
2226 udev_event_apply_format(event
, rules_str(rules
, cur
->key
.value_off
), owner
, sizeof(owner
));
2227 event
->owner_set
= true;
2228 event
->uid
= util_lookup_user(event
->udev
, owner
);
2229 log_debug("OWNER %u %s:%u\n",
2231 rules_str(rules
, rule
->rule
.filename_off
),
2232 rule
->rule
.filename_line
);
2236 char group
[UTIL_NAME_SIZE
];
2238 if (event
->group_final
)
2240 if (cur
->key
.op
== OP_ASSIGN_FINAL
)
2241 event
->group_final
= true;
2242 udev_event_apply_format(event
, rules_str(rules
, cur
->key
.value_off
), group
, sizeof(group
));
2243 event
->group_set
= true;
2244 event
->gid
= util_lookup_group(event
->udev
, group
);
2245 log_debug("GROUP %u %s:%u\n",
2247 rules_str(rules
, rule
->rule
.filename_off
),
2248 rule
->rule
.filename_line
);
2252 char mode_str
[UTIL_NAME_SIZE
];
2256 if (event
->mode_final
)
2258 udev_event_apply_format(event
, rules_str(rules
, cur
->key
.value_off
), mode_str
, sizeof(mode_str
));
2259 mode
= strtol(mode_str
, &endptr
, 8);
2260 if (endptr
[0] != '\0') {
2261 log_error("ignoring invalid mode '%s'\n", mode_str
);
2264 if (cur
->key
.op
== OP_ASSIGN_FINAL
)
2265 event
->mode_final
= true;
2266 event
->mode_set
= true;
2268 log_debug("MODE %#o %s:%u\n",
2270 rules_str(rules
, rule
->rule
.filename_off
),
2271 rule
->rule
.filename_line
);
2275 if (event
->owner_final
)
2277 if (cur
->key
.op
== OP_ASSIGN_FINAL
)
2278 event
->owner_final
= true;
2279 event
->owner_set
= true;
2280 event
->uid
= cur
->key
.uid
;
2281 log_debug("OWNER %u %s:%u\n",
2283 rules_str(rules
, rule
->rule
.filename_off
),
2284 rule
->rule
.filename_line
);
2287 if (event
->group_final
)
2289 if (cur
->key
.op
== OP_ASSIGN_FINAL
)
2290 event
->group_final
= true;
2291 event
->group_set
= true;
2292 event
->gid
= cur
->key
.gid
;
2293 log_debug("GROUP %u %s:%u\n",
2295 rules_str(rules
, rule
->rule
.filename_off
),
2296 rule
->rule
.filename_line
);
2299 if (event
->mode_final
)
2301 if (cur
->key
.op
== OP_ASSIGN_FINAL
)
2302 event
->mode_final
= true;
2303 event
->mode_set
= true;
2304 event
->mode
= cur
->key
.mode
;
2305 log_debug("MODE %#o %s:%u\n",
2307 rules_str(rules
, rule
->rule
.filename_off
),
2308 rule
->rule
.filename_line
);
2311 const char *name
= rules_str(rules
, cur
->key
.attr_off
);
2312 char *value
= rules_str(rules
, cur
->key
.value_off
);
2313 char value_new
[UTIL_NAME_SIZE
];
2314 const char *value_old
= NULL
;
2315 struct udev_list_entry
*entry
;
2317 if (value
[0] == '\0') {
2318 if (cur
->key
.op
== OP_ADD
)
2320 udev_device_add_property(event
->dev
, name
, NULL
);
2324 if (cur
->key
.op
== OP_ADD
)
2325 value_old
= udev_device_get_property_value(event
->dev
, name
);
2327 char temp
[UTIL_NAME_SIZE
];
2329 /* append value separated by space */
2330 udev_event_apply_format(event
, value
, temp
, sizeof(temp
));
2331 strscpyl(value_new
, sizeof(value_new
), value_old
, " ", temp
, NULL
);
2333 udev_event_apply_format(event
, value
, value_new
, sizeof(value_new
));
2335 entry
= udev_device_add_property(event
->dev
, name
, value_new
);
2336 /* store in db, skip private keys */
2338 udev_list_entry_set_num(entry
, true);
2342 char tag
[UTIL_PATH_SIZE
];
2345 udev_event_apply_format(event
, rules_str(rules
, cur
->key
.value_off
), tag
, sizeof(tag
));
2346 if (cur
->key
.op
== OP_ASSIGN
|| cur
->key
.op
== OP_ASSIGN_FINAL
)
2347 udev_device_cleanup_tags_list(event
->dev
);
2348 for (p
= tag
; *p
!= '\0'; p
++) {
2349 if ((*p
>= 'a' && *p
<= 'z') ||
2350 (*p
>= 'A' && *p
<= 'Z') ||
2351 (*p
>= '0' && *p
<= '9') ||
2352 *p
== '-' || *p
== '_')
2354 log_error("ignoring invalid tag name '%s'\n", tag
);
2357 udev_device_add_tag(event
->dev
, tag
);
2361 const char *name
= rules_str(rules
, cur
->key
.value_off
);
2363 char name_str
[UTIL_PATH_SIZE
];
2366 if (event
->name_final
)
2368 if (cur
->key
.op
== OP_ASSIGN_FINAL
)
2369 event
->name_final
= true;
2370 udev_event_apply_format(event
, name
, name_str
, sizeof(name_str
));
2371 if (esc
== ESCAPE_UNSET
|| esc
== ESCAPE_REPLACE
) {
2372 count
= util_replace_chars(name_str
, "/");
2374 log_debug("%i character(s) replaced\n", count
);
2376 if (major(udev_device_get_devnum(event
->dev
)) &&
2377 (!streq(name_str
, udev_device_get_devnode(event
->dev
) + strlen("/dev/")))) {
2378 log_error("NAME=\"%s\" ignored, kernel device nodes "
2379 "can not be renamed; please fix it in %s:%u\n", name
,
2380 rules_str(rules
, rule
->rule
.filename_off
), rule
->rule
.filename_line
);
2384 event
->name
= strdup(name_str
);
2385 log_debug("NAME '%s' %s:%u\n",
2387 rules_str(rules
, rule
->rule
.filename_off
),
2388 rule
->rule
.filename_line
);
2391 case TK_A_DEVLINK
: {
2392 char temp
[UTIL_PATH_SIZE
];
2393 char filename
[UTIL_PATH_SIZE
];
2397 if (event
->devlink_final
)
2399 if (major(udev_device_get_devnum(event
->dev
)) == 0)
2401 if (cur
->key
.op
== OP_ASSIGN_FINAL
)
2402 event
->devlink_final
= true;
2403 if (cur
->key
.op
== OP_ASSIGN
|| cur
->key
.op
== OP_ASSIGN_FINAL
)
2404 udev_device_cleanup_devlinks_list(event
->dev
);
2406 /* allow multiple symlinks separated by spaces */
2407 udev_event_apply_format(event
, rules_str(rules
, cur
->key
.value_off
), temp
, sizeof(temp
));
2408 if (esc
== ESCAPE_UNSET
)
2409 count
= util_replace_chars(temp
, "/ ");
2410 else if (esc
== ESCAPE_REPLACE
)
2411 count
= util_replace_chars(temp
, "/");
2413 log_debug("%i character(s) replaced\n" , count
);
2415 while (isspace(pos
[0]))
2417 next
= strchr(pos
, ' ');
2418 while (next
!= NULL
) {
2420 log_debug("LINK '%s' %s:%u\n", pos
,
2421 rules_str(rules
, rule
->rule
.filename_off
), rule
->rule
.filename_line
);
2422 strscpyl(filename
, sizeof(filename
), "/dev/", pos
, NULL
);
2423 udev_device_add_devlink(event
->dev
, filename
);
2424 while (isspace(next
[1]))
2427 next
= strchr(pos
, ' ');
2429 if (pos
[0] != '\0') {
2430 log_debug("LINK '%s' %s:%u\n", pos
,
2431 rules_str(rules
, rule
->rule
.filename_off
), rule
->rule
.filename_line
);
2432 strscpyl(filename
, sizeof(filename
), "/dev/", pos
, NULL
);
2433 udev_device_add_devlink(event
->dev
, filename
);
2438 const char *key_name
= rules_str(rules
, cur
->key
.attr_off
);
2439 char attr
[UTIL_PATH_SIZE
];
2440 char value
[UTIL_NAME_SIZE
];
2443 if (util_resolve_subsys_kernel(event
->udev
, key_name
, attr
, sizeof(attr
), 0) != 0)
2444 strscpyl(attr
, sizeof(attr
), udev_device_get_syspath(event
->dev
), "/", key_name
, NULL
);
2445 attr_subst_subdir(attr
, sizeof(attr
));
2447 udev_event_apply_format(event
, rules_str(rules
, cur
->key
.value_off
), value
, sizeof(value
));
2448 log_debug("ATTR '%s' writing '%s' %s:%u\n", attr
, value
,
2449 rules_str(rules
, rule
->rule
.filename_off
),
2450 rule
->rule
.filename_line
);
2451 f
= fopen(attr
, "we");
2453 if (fprintf(f
, "%s", value
) <= 0)
2454 log_error("error writing ATTR{%s}: %m\n", attr
);
2457 log_error("error opening ATTR{%s} for writing: %m\n", attr
);
2461 case TK_A_RUN_BUILTIN
:
2462 case TK_A_RUN_PROGRAM
: {
2463 struct udev_list_entry
*entry
;
2465 if (cur
->key
.op
== OP_ASSIGN
|| cur
->key
.op
== OP_ASSIGN_FINAL
)
2466 udev_list_cleanup(&event
->run_list
);
2467 log_debug("RUN '%s' %s:%u\n",
2468 rules_str(rules
, cur
->key
.value_off
),
2469 rules_str(rules
, rule
->rule
.filename_off
),
2470 rule
->rule
.filename_line
);
2471 entry
= udev_list_entry_add(&event
->run_list
, rules_str(rules
, cur
->key
.value_off
), NULL
);
2472 udev_list_entry_set_num(entry
, cur
->key
.builtin_cmd
);
2476 if (cur
->key
.rule_goto
== 0)
2478 cur
= &rules
->tokens
[cur
->key
.rule_goto
];
2483 case TK_M_PARENTS_MIN
:
2484 case TK_M_PARENTS_MAX
:
2487 log_error("wrong type %u\n", cur
->type
);
2494 /* fast-forward to next rule */
2495 cur
= rule
+ rule
->rule
.token_count
;
2499 void udev_rules_apply_static_dev_perms(struct udev_rules
*rules
)
2507 if (rules
->tokens
== NULL
)
2510 cur
= &rules
->tokens
[0];
2513 switch (cur
->type
) {
2518 /* skip rules without a static_node tag */
2519 if (!rule
->rule
.has_static_node
)
2533 mode
= cur
->key
.mode
;
2535 case TK_A_STATIC_NODE
: {
2536 char filename
[UTIL_PATH_SIZE
];
2539 /* we assure, that the permissions tokens are sorted before the static token */
2540 if (mode
== 0 && uid
== 0 && gid
== 0)
2542 strscpyl(filename
, sizeof(filename
), "/dev/", rules_str(rules
, cur
->key
.value_off
), NULL
);
2543 if (stat(filename
, &stats
) != 0)
2545 if (!S_ISBLK(stats
.st_mode
) && !S_ISCHR(stats
.st_mode
))
2553 if (mode
!= (stats
.st_mode
& 01777)) {
2554 chmod(filename
, mode
);
2555 log_debug("chmod '%s' %#o\n", filename
, mode
);
2558 if ((uid
!= 0 && uid
!= stats
.st_uid
) || (gid
!= 0 && gid
!= stats
.st_gid
)) {
2559 chown(filename
, uid
, gid
);
2560 log_debug("chown '%s' %u %u\n", filename
, uid
, gid
);
2563 utimensat(AT_FDCWD
, filename
, NULL
, 0);
2573 /* fast-forward to next rule */
2574 cur
= rule
+ rule
->rule
.token_count
;