]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/udev/udev-event.c
tree-wide: use FORK_REARRANGE_STDIO and FORK_CLOSE_ALL_FDS
[thirdparty/systemd.git] / src / udev / udev-event.c
CommitLineData
f13467ec 1/* SPDX-License-Identifier: GPL-2.0-or-later */
d46f37fd 2
d46f37fd 3#include <ctype.h>
07630cea
LP
4#include <errno.h>
5#include <fcntl.h>
959e8b5d 6#include <net/if.h>
07630cea 7#include <stddef.h>
07630cea 8#include <stdlib.h>
010f917c 9#include <sys/wait.h>
07630cea 10#include <unistd.h>
d46f37fd 11
e81c3a4c
YW
12#include "sd-event.h"
13
b5efdb8a 14#include "alloc-util.h"
ff88b949 15#include "device-internal.h"
947ce772 16#include "device-private.h"
e9343893 17#include "device-util.h"
3ffd4af2 18#include "fd-util.h"
25de7aa7 19#include "fs-util.h"
f97b34a6 20#include "format-util.h"
068b0f77 21#include "netif-naming-scheme.h"
07630cea 22#include "netlink-util.h"
ce4f94b8 23#include "parse-util.h"
feaa6db7 24#include "path-util.h"
8128f229 25#include "process-util.h"
24882e06 26#include "signal-util.h"
4cade7a1 27#include "stdio-util.h"
07630cea 28#include "string-util.h"
5ea78a39
YW
29#include "strv.h"
30#include "strxcpyx.h"
07a26e42 31#include "udev-builtin.h"
25de7aa7 32#include "udev-event.h"
a2554ace 33#include "udev-node.h"
d4d690fa 34#include "udev-util.h"
70068602 35#include "udev-watch.h"
25de7aa7 36#include "user-util.h"
8128f229
TG
37
38typedef struct Spawn {
88d566aa 39 sd_device *device;
8128f229
TG
40 const char *cmd;
41 pid_t pid;
e81c3a4c
YW
42 usec_t timeout_warn_usec;
43 usec_t timeout_usec;
e2099267 44 int timeout_signal;
e81c3a4c 45 usec_t event_birth_usec;
53318514 46 bool accept_failure;
e81c3a4c
YW
47 int fd_stdout;
48 int fd_stderr;
49 char *result;
50 size_t result_size;
51 size_t result_len;
6b6e471a 52 bool truncated;
8128f229 53} Spawn;
d46f37fd 54
1a0bd015 55UdevEvent *udev_event_new(sd_device *dev, usec_t exec_delay_usec, sd_netlink *rtnl, int log_level) {
2e088715 56 UdevEvent *event;
912541b0 57
89665d09
YW
58 assert(dev);
59
2e088715 60 event = new(UdevEvent, 1);
89665d09 61 if (!event)
912541b0 62 return NULL;
89665d09 63
2e088715 64 *event = (UdevEvent) {
cf28ad46 65 .dev = sd_device_ref(dev),
89665d09 66 .birth_usec = now(CLOCK_MONOTONIC),
6b92f429 67 .exec_delay_usec = exec_delay_usec,
e0bb2ff9 68 .rtnl = sd_netlink_ref(rtnl),
25de7aa7
YW
69 .uid = UID_INVALID,
70 .gid = GID_INVALID,
71 .mode = MODE_INVALID,
1a0bd015
YW
72 .log_level_was_debug = log_level == LOG_DEBUG,
73 .default_log_level = log_level,
89665d09
YW
74 };
75
912541b0 76 return event;
aa8734ff
KS
77}
78
2e088715 79UdevEvent *udev_event_free(UdevEvent *event) {
c1118ceb
YW
80 if (!event)
81 return NULL;
82
cf28ad46 83 sd_device_unref(event->dev);
480ecb7d 84 sd_device_unref(event->dev_db_clone);
1c4baffc 85 sd_netlink_unref(event->rtnl);
39a15c8a
YW
86 ordered_hashmap_free_free_key(event->run_list);
87 ordered_hashmap_free_free_free(event->seclabel_list);
912541b0
KS
88 free(event->program_result);
89 free(event->name);
c1118ceb
YW
90
91 return mfree(event);
aa8734ff
KS
92}
93
7e9c23dd
YW
94typedef enum {
95 FORMAT_SUBST_DEVNODE,
96 FORMAT_SUBST_ATTR,
97 FORMAT_SUBST_ENV,
98 FORMAT_SUBST_KERNEL,
99 FORMAT_SUBST_KERNEL_NUMBER,
100 FORMAT_SUBST_DRIVER,
101 FORMAT_SUBST_DEVPATH,
102 FORMAT_SUBST_ID,
103 FORMAT_SUBST_MAJOR,
104 FORMAT_SUBST_MINOR,
105 FORMAT_SUBST_RESULT,
106 FORMAT_SUBST_PARENT,
107 FORMAT_SUBST_NAME,
108 FORMAT_SUBST_LINKS,
109 FORMAT_SUBST_ROOT,
110 FORMAT_SUBST_SYS,
111 _FORMAT_SUBST_TYPE_MAX,
2d93c20e 112 _FORMAT_SUBST_TYPE_INVALID = -EINVAL,
7e9c23dd 113} FormatSubstitutionType;
0d53705b 114
9204d802
YW
115struct subst_map_entry {
116 const char *name;
117 const char fmt;
7e9c23dd 118 FormatSubstitutionType type;
9204d802
YW
119};
120
121static const struct subst_map_entry map[] = {
bb1234d1
YW
122 { .name = "devnode", .fmt = 'N', .type = FORMAT_SUBST_DEVNODE },
123 { .name = "tempnode", .fmt = 'N', .type = FORMAT_SUBST_DEVNODE }, /* deprecated */
124 { .name = "attr", .fmt = 's', .type = FORMAT_SUBST_ATTR },
125 { .name = "sysfs", .fmt = 's', .type = FORMAT_SUBST_ATTR }, /* deprecated */
126 { .name = "env", .fmt = 'E', .type = FORMAT_SUBST_ENV },
127 { .name = "kernel", .fmt = 'k', .type = FORMAT_SUBST_KERNEL },
7e9c23dd 128 { .name = "number", .fmt = 'n', .type = FORMAT_SUBST_KERNEL_NUMBER },
bb1234d1
YW
129 { .name = "driver", .fmt = 'd', .type = FORMAT_SUBST_DRIVER },
130 { .name = "devpath", .fmt = 'p', .type = FORMAT_SUBST_DEVPATH },
131 { .name = "id", .fmt = 'b', .type = FORMAT_SUBST_ID },
132 { .name = "major", .fmt = 'M', .type = FORMAT_SUBST_MAJOR },
133 { .name = "minor", .fmt = 'm', .type = FORMAT_SUBST_MINOR },
134 { .name = "result", .fmt = 'c', .type = FORMAT_SUBST_RESULT },
135 { .name = "parent", .fmt = 'P', .type = FORMAT_SUBST_PARENT },
136 { .name = "name", .fmt = 'D', .type = FORMAT_SUBST_NAME },
137 { .name = "links", .fmt = 'L', .type = FORMAT_SUBST_LINKS },
138 { .name = "root", .fmt = 'r', .type = FORMAT_SUBST_ROOT },
139 { .name = "sys", .fmt = 'S', .type = FORMAT_SUBST_SYS },
9204d802
YW
140};
141
13cd553f
YW
142static const char *format_type_to_string(FormatSubstitutionType t) {
143 for (size_t i = 0; i < ELEMENTSOF(map); i++)
144 if (map[i].type == t)
145 return map[i].name;
146 return NULL;
147}
148
149static char format_type_to_char(FormatSubstitutionType t) {
150 for (size_t i = 0; i < ELEMENTSOF(map); i++)
151 if (map[i].type == t)
152 return map[i].fmt;
153 return '\0';
154}
155
c8eaaf69 156static int get_subst_type(const char **str, bool strict, FormatSubstitutionType *ret_type, char ret_attr[static UDEV_PATH_SIZE]) {
13cd553f
YW
157 const char *p = *str, *q = NULL;
158 size_t i;
159
160 assert(str);
161 assert(*str);
162 assert(ret_type);
2caa38e9 163 assert(ret_attr);
13cd553f 164
1824300a 165 if (*p == '$') {
13cd553f 166 p++;
1824300a 167 if (*p == '$') {
13cd553f
YW
168 *str = p;
169 return 0;
170 }
171 for (i = 0; i < ELEMENTSOF(map); i++)
172 if ((q = startswith(p, map[i].name)))
173 break;
1824300a 174 } else if (*p == '%') {
13cd553f 175 p++;
1824300a 176 if (*p == '%') {
13cd553f
YW
177 *str = p;
178 return 0;
179 }
180
181 for (i = 0; i < ELEMENTSOF(map); i++)
1824300a 182 if (*p == map[i].fmt) {
13cd553f
YW
183 q = p + 1;
184 break;
185 }
d7aee41d 186 } else
13cd553f 187 return 0;
d7aee41d
YW
188 if (!q)
189 /* When 'strict' flag is set, then '$' and '%' must be escaped. */
190 return strict ? -EINVAL : 0;
13cd553f 191
1824300a 192 if (*q == '{') {
13cd553f
YW
193 const char *start, *end;
194 size_t len;
195
196 start = q + 1;
197 end = strchr(start, '}');
198 if (!end)
199 return -EINVAL;
200
201 len = end - start;
c8eaaf69 202 if (len == 0 || len >= UDEV_PATH_SIZE)
13cd553f
YW
203 return -EINVAL;
204
c8eaaf69 205 strnscpy(ret_attr, UDEV_PATH_SIZE, start, len);
13cd553f
YW
206 q = end + 1;
207 } else
1824300a 208 *ret_attr = '\0';
13cd553f
YW
209
210 *str = q;
211 *ret_type = map[i].type;
212 return 1;
213}
214
ce4f94b8
YW
215static int safe_atou_optional_plus(const char *s, unsigned *ret) {
216 const char *p;
217 int r;
218
219 assert(s);
220 assert(ret);
221
222 /* Returns 1 if plus, 0 if no plus, negative on error */
223
224 p = endswith(s, "+");
225 if (p)
2f82562b 226 s = strndupa_safe(s, p - s);
ce4f94b8
YW
227
228 r = safe_atou(s, ret);
229 if (r < 0)
230 return r;
231
232 return !!p;
233}
234
ef315ada
YW
235static ssize_t udev_event_subst_format(
236 UdevEvent *event,
237 FormatSubstitutionType type,
238 const char *attr,
239 char *dest,
f6caab89
YW
240 size_t l,
241 bool *ret_truncated) {
242
fbd747a4 243 sd_device *parent, *dev = ASSERT_PTR(ASSERT_PTR(event)->dev);
4cade7a1 244 const char *val = NULL;
f6caab89 245 bool truncated = false;
be452683 246 char *s = dest;
4cade7a1 247 int r;
0d53705b 248
ef315ada 249 switch (type) {
7e9c23dd 250 case FORMAT_SUBST_DEVPATH:
4cade7a1
YW
251 r = sd_device_get_devpath(dev, &val);
252 if (r < 0)
253 return r;
f6caab89 254 strpcpy_full(&s, l, val, &truncated);
0d53705b 255 break;
7e9c23dd 256 case FORMAT_SUBST_KERNEL:
4cade7a1
YW
257 r = sd_device_get_sysname(dev, &val);
258 if (r < 0)
259 return r;
f6caab89 260 strpcpy_full(&s, l, val, &truncated);
0d53705b 261 break;
7e9c23dd 262 case FORMAT_SUBST_KERNEL_NUMBER:
4cade7a1 263 r = sd_device_get_sysnum(dev, &val);
380d1901
YW
264 if (r == -ENOENT)
265 goto null_terminate;
4cade7a1 266 if (r < 0)
380d1901 267 return r;
f6caab89 268 strpcpy_full(&s, l, val, &truncated);
0d53705b 269 break;
7e9c23dd 270 case FORMAT_SUBST_ID:
4cade7a1 271 if (!event->dev_parent)
380d1901 272 goto null_terminate;
f3d241fe 273 r = sd_device_get_sysname(event->dev_parent, &val);
4cade7a1
YW
274 if (r < 0)
275 return r;
f6caab89 276 strpcpy_full(&s, l, val, &truncated);
0d53705b 277 break;
7e9c23dd 278 case FORMAT_SUBST_DRIVER:
4cade7a1 279 if (!event->dev_parent)
380d1901 280 goto null_terminate;
f3d241fe 281 r = sd_device_get_driver(event->dev_parent, &val);
380d1901
YW
282 if (r == -ENOENT)
283 goto null_terminate;
4cade7a1 284 if (r < 0)
380d1901 285 return r;
f6caab89 286 strpcpy_full(&s, l, val, &truncated);
0d53705b 287 break;
7e9c23dd
YW
288 case FORMAT_SUBST_MAJOR:
289 case FORMAT_SUBST_MINOR: {
1b65f1eb 290 dev_t devnum;
0d53705b 291
4cade7a1
YW
292 r = sd_device_get_devnum(dev, &devnum);
293 if (r < 0 && r != -ENOENT)
294 return r;
f6caab89 295 strpcpyf_full(&s, l, &truncated, "%u", r < 0 ? 0 : type == FORMAT_SUBST_MAJOR ? major(devnum) : minor(devnum));
0d53705b
DS
296 break;
297 }
7e9c23dd 298 case FORMAT_SUBST_RESULT: {
ce4f94b8
YW
299 unsigned index = 0; /* 0 means whole string */
300 bool has_plus;
0d53705b 301
4cade7a1 302 if (!event->program_result)
380d1901 303 goto null_terminate;
4cade7a1 304
ce4f94b8
YW
305 if (!isempty(attr)) {
306 r = safe_atou_optional_plus(attr, &index);
307 if (r < 0)
308 return r;
309
310 has_plus = r;
311 }
312
313 if (index == 0)
f6caab89 314 strpcpy_full(&s, l, event->program_result, &truncated);
ce4f94b8
YW
315 else {
316 const char *start, *p;
317 unsigned i;
318
319 p = skip_leading_chars(event->program_result, NULL);
320
321 for (i = 1; i < index; i++) {
1824300a 322 while (*p && !strchr(WHITESPACE, *p))
ce4f94b8
YW
323 p++;
324 p = skip_leading_chars(p, NULL);
325 if (*p == '\0')
0d53705b
DS
326 break;
327 }
ce4f94b8
YW
328 if (i != index) {
329 log_device_debug(dev, "requested part of result string not found");
330 goto null_terminate;
0d53705b 331 }
ce4f94b8
YW
332
333 start = p;
334 /* %c{2+} copies the whole string from the second part on */
335 if (has_plus)
f6caab89 336 strpcpy_full(&s, l, start, &truncated);
ce4f94b8 337 else {
1824300a 338 while (*p && !strchr(WHITESPACE, *p))
ce4f94b8 339 p++;
f6caab89 340 strnpcpy_full(&s, l, start, p - start, &truncated);
0d53705b 341 }
ce4f94b8 342 }
0d53705b
DS
343 break;
344 }
7e9c23dd 345 case FORMAT_SUBST_ATTR: {
c8eaaf69 346 char vbuf[UDEV_NAME_SIZE];
0d53705b 347 int count;
f6caab89 348 bool t;
0d53705b 349
13cd553f 350 if (isempty(attr))
4cade7a1 351 return -EINVAL;
0d53705b
DS
352
353 /* try to read the value specified by "[dmi/id]product_name" */
1223227f 354 if (udev_resolve_subsys_kernel(attr, vbuf, sizeof(vbuf), true) == 0)
4cade7a1 355 val = vbuf;
0d53705b
DS
356
357 /* try to read the attribute the device */
4cade7a1 358 if (!val)
5bbcfbaa 359 (void) sd_device_get_sysattr_value(dev, attr, &val);
0d53705b
DS
360
361 /* try to read the attribute of the parent device, other matches have selected */
f3d241fe 362 if (!val && event->dev_parent && event->dev_parent != dev)
5bbcfbaa 363 (void) sd_device_get_sysattr_value(event->dev_parent, attr, &val);
0d53705b 364
4cade7a1 365 if (!val)
380d1901 366 goto null_terminate;
0d53705b
DS
367
368 /* strip trailing whitespace, and replace unwanted characters */
4cade7a1 369 if (val != vbuf)
f6caab89 370 strscpy_full(vbuf, sizeof(vbuf), val, &truncated);
72801533 371 delete_trailing_chars(vbuf, NULL);
393fcaf7 372 count = udev_replace_chars(vbuf, UDEV_ALLOWED_CHARS_INPUT);
0d53705b 373 if (count > 0)
4cade7a1 374 log_device_debug(dev, "%i character(s) replaced", count);
f6caab89
YW
375 strpcpy_full(&s, l, vbuf, &t);
376 truncated = truncated || t;
0d53705b
DS
377 break;
378 }
7e9c23dd 379 case FORMAT_SUBST_PARENT:
4cade7a1 380 r = sd_device_get_parent(dev, &parent);
bc568a7a 381 if (r == -ENOENT)
380d1901 382 goto null_terminate;
4cade7a1 383 if (r < 0)
380d1901 384 return r;
4cade7a1 385 r = sd_device_get_devname(parent, &val);
380d1901
YW
386 if (r == -ENOENT)
387 goto null_terminate;
4cade7a1 388 if (r < 0)
380d1901 389 return r;
f6caab89 390 strpcpy_full(&s, l, val + STRLEN("/dev/"), &truncated);
0d53705b 391 break;
7e9c23dd 392 case FORMAT_SUBST_DEVNODE:
4cade7a1 393 r = sd_device_get_devname(dev, &val);
380d1901
YW
394 if (r == -ENOENT)
395 goto null_terminate;
4cade7a1 396 if (r < 0)
380d1901 397 return r;
f6caab89 398 strpcpy_full(&s, l, val, &truncated);
0d53705b 399 break;
7e9c23dd 400 case FORMAT_SUBST_NAME:
4cade7a1 401 if (event->name)
f6caab89 402 strpcpy_full(&s, l, event->name, &truncated);
4cade7a1 403 else if (sd_device_get_devname(dev, &val) >= 0)
f6caab89 404 strpcpy_full(&s, l, val + STRLEN("/dev/"), &truncated);
4cade7a1
YW
405 else {
406 r = sd_device_get_sysname(dev, &val);
407 if (r < 0)
408 return r;
f6caab89 409 strpcpy_full(&s, l, val, &truncated);
4cade7a1 410 }
0d53705b 411 break;
7e9c23dd 412 case FORMAT_SUBST_LINKS:
f6caab89 413 FOREACH_DEVICE_DEVLINK(dev, val) {
4cade7a1 414 if (s == dest)
f6caab89 415 strpcpy_full(&s, l, val + STRLEN("/dev/"), &truncated);
4cade7a1 416 else
f6caab89
YW
417 strpcpyl_full(&s, l, &truncated, " ", val + STRLEN("/dev/"), NULL);
418 if (truncated)
419 break;
420 }
380d1901
YW
421 if (s == dest)
422 goto null_terminate;
0d53705b 423 break;
7e9c23dd 424 case FORMAT_SUBST_ROOT:
f6caab89 425 strpcpy_full(&s, l, "/dev", &truncated);
0d53705b 426 break;
7e9c23dd 427 case FORMAT_SUBST_SYS:
f6caab89 428 strpcpy_full(&s, l, "/sys", &truncated);
0d53705b 429 break;
7e9c23dd 430 case FORMAT_SUBST_ENV:
13cd553f
YW
431 if (isempty(attr))
432 return -EINVAL;
4cade7a1 433 r = sd_device_get_property_value(dev, attr, &val);
380d1901
YW
434 if (r == -ENOENT)
435 goto null_terminate;
4cade7a1 436 if (r < 0)
380d1901 437 return r;
f6caab89 438 strpcpy_full(&s, l, val, &truncated);
4cade7a1 439 break;
0d53705b 440 default:
04499a70 441 assert_not_reached();
0d53705b
DS
442 }
443
f6caab89
YW
444 if (ret_truncated)
445 *ret_truncated = truncated;
446
be452683 447 return s - dest;
380d1901
YW
448
449null_terminate:
f6caab89
YW
450 if (ret_truncated)
451 *ret_truncated = truncated;
452
380d1901
YW
453 *s = '\0';
454 return 0;
0d53705b
DS
455}
456
f6caab89
YW
457size_t udev_event_apply_format(
458 UdevEvent *event,
459 const char *src,
460 char *dest,
461 size_t size,
462 bool replace_whitespace,
463 bool *ret_truncated) {
464
465 bool truncated = false;
99534007 466 const char *s = ASSERT_PTR(src);
13cd553f 467 int r;
912541b0 468
a368732b
YW
469 assert(event);
470 assert(event->dev);
a368732b
YW
471 assert(dest);
472 assert(size > 0);
3b64e4d4 473
1824300a 474 while (*s) {
13cd553f 475 FormatSubstitutionType type;
c8eaaf69 476 char attr[UDEV_PATH_SIZE];
4cade7a1 477 ssize_t subst_len;
f6caab89 478 bool t;
912541b0 479
d7aee41d 480 r = get_subst_type(&s, false, &type, attr);
5eb6ef8b
YW
481 if (r < 0) {
482 log_device_warning_errno(event->dev, r, "Invalid format string, ignoring: %s", src);
483 break;
484 } else if (r == 0) {
f6caab89
YW
485 if (size < 2) {
486 /* need space for this char and the terminating NUL */
487 truncated = true;
13cd553f 488 break;
f6caab89 489 }
13cd553f
YW
490 *dest++ = *s++;
491 size--;
4cade7a1
YW
492 continue;
493 }
e20a9171 494
f6caab89 495 subst_len = udev_event_subst_format(event, type, attr, dest, size, &t);
5eb6ef8b
YW
496 if (subst_len < 0) {
497 log_device_warning_errno(event->dev, subst_len,
498 "Failed to substitute variable '$%s' or apply format '%%%c', ignoring: %m",
499 format_type_to_string(type), format_type_to_char(type));
500 break;
501 }
13cd553f 502
f6caab89
YW
503 truncated = truncated || t;
504
7e9c23dd 505 /* FORMAT_SUBST_RESULT handles spaces itself */
13cd553f 506 if (replace_whitespace && type != FORMAT_SUBST_RESULT)
5953d8b9 507 /* udev_replace_whitespace can replace in-place,
13cd553f 508 * and does nothing if subst_len == 0 */
5953d8b9 509 subst_len = udev_replace_whitespace(dest, dest, subst_len);
e20a9171 510
13cd553f
YW
511 dest += subst_len;
512 size -= subst_len;
912541b0 513 }
065db052 514
13cd553f 515 assert(size >= 1);
f6caab89
YW
516
517 if (ret_truncated)
518 *ret_truncated = truncated;
519
1824300a 520 *dest = '\0';
13cd553f 521 return size;
f1128767
KS
522}
523
f85cc54c 524int udev_check_format(const char *value, size_t *offset, const char **hint) {
d7aee41d 525 FormatSubstitutionType type;
f85cc54c 526 const char *s = value;
c8eaaf69 527 char attr[UDEV_PATH_SIZE];
d7aee41d
YW
528 int r;
529
1824300a 530 while (*s) {
d7aee41d 531 r = get_subst_type(&s, true, &type, attr);
f85cc54c
ZJS
532 if (r < 0) {
533 if (offset)
534 *offset = s - value;
535 if (hint)
536 *hint = "invalid substitution type";
d7aee41d 537 return r;
f85cc54c 538 } else if (r == 0) {
d7aee41d
YW
539 s++;
540 continue;
541 }
542
f85cc54c
ZJS
543 if (IN_SET(type, FORMAT_SUBST_ATTR, FORMAT_SUBST_ENV) && isempty(attr)) {
544 if (offset)
545 *offset = s - value;
546 if (hint)
547 *hint = "attribute value missing";
d7aee41d 548 return -EINVAL;
f85cc54c 549 }
d7aee41d
YW
550
551 if (type == FORMAT_SUBST_RESULT && !isempty(attr)) {
552 unsigned i;
553
554 r = safe_atou_optional_plus(attr, &i);
f85cc54c
ZJS
555 if (r < 0) {
556 if (offset)
557 *offset = s - value;
558 if (hint)
559 *hint = "attribute value not a valid number";
d7aee41d 560 return r;
f85cc54c 561 }
d7aee41d
YW
562 }
563 }
564
565 return 0;
566}
567
e81c3a4c 568static int on_spawn_io(sd_event_source *s, int fd, uint32_t revents, void *userdata) {
99534007 569 Spawn *spawn = ASSERT_PTR(userdata);
e81c3a4c
YW
570 char buf[4096], *p;
571 size_t size;
572 ssize_t l;
9f537ae3 573 int r;
912541b0 574
e81c3a4c
YW
575 assert(fd == spawn->fd_stdout || fd == spawn->fd_stderr);
576 assert(!spawn->result || spawn->result_len < spawn->result_size);
577
578 if (fd == spawn->fd_stdout && spawn->result) {
579 p = spawn->result + spawn->result_len;
580 size = spawn->result_size - spawn->result_len;
581 } else {
582 p = buf;
583 size = sizeof(buf);
912541b0
KS
584 }
585
7056adbf 586 l = read(fd, p, size - (p == buf));
e81c3a4c 587 if (l < 0) {
9f537ae3
PD
588 if (errno == EAGAIN)
589 goto reenable;
590
591 log_device_error_errno(spawn->device, errno,
592 "Failed to read stdout of '%s': %m", spawn->cmd);
912541b0 593
e81c3a4c 594 return 0;
912541b0
KS
595 }
596
7056adbf
YW
597 if ((size_t) l == size) {
598 log_device_warning(spawn->device, "Truncating stdout of '%s' up to %zu byte.",
599 spawn->cmd, spawn->result_size);
600 l--;
6b6e471a 601 spawn->truncated = true;
7056adbf
YW
602 }
603
e81c3a4c
YW
604 p[l] = '\0';
605 if (fd == spawn->fd_stdout && spawn->result)
606 spawn->result_len += l;
912541b0 607
e81c3a4c
YW
608 /* Log output only if we watch stderr. */
609 if (l > 0 && spawn->fd_stderr >= 0) {
610 _cleanup_strv_free_ char **v = NULL;
912541b0 611
daceb818
YW
612 r = strv_split_newlines_full(&v, p, EXTRACT_RETAIN_ESCAPE);
613 if (r < 0)
614 log_device_debug(spawn->device,
615 "Failed to split output from '%s'(%s), ignoring: %m",
616 spawn->cmd, fd == spawn->fd_stdout ? "out" : "err");
912541b0 617
e81c3a4c 618 STRV_FOREACH(q, v)
88d566aa
YW
619 log_device_debug(spawn->device, "'%s'(%s) '%s'", spawn->cmd,
620 fd == spawn->fd_stdout ? "out" : "err", *q);
912541b0
KS
621 }
622
6b6e471a 623 if (l == 0 || spawn->truncated)
9f537ae3
PD
624 return 0;
625
9f537ae3 626reenable:
2be0218a
YW
627 /* Re-enable the event source if we did not encounter EOF */
628
9f537ae3
PD
629 r = sd_event_source_set_enabled(s, SD_EVENT_ONESHOT);
630 if (r < 0)
631 log_device_error_errno(spawn->device, r,
632 "Failed to reactivate IO source of '%s'", spawn->cmd);
e81c3a4c 633 return 0;
2181d30a
KS
634}
635
8128f229 636static int on_spawn_timeout(sd_event_source *s, uint64_t usec, void *userdata) {
99534007 637 Spawn *spawn = ASSERT_PTR(userdata);
912541b0 638
b428efa5
MS
639 DEVICE_TRACE_POINT(spawn_timeout, spawn->device, spawn->cmd);
640
e2099267 641 kill_and_sigcont(spawn->pid, spawn->timeout_signal);
912541b0 642
88d566aa
YW
643 log_device_error(spawn->device, "Spawned process '%s' ["PID_FMT"] timed out after %s, killing",
644 spawn->cmd, spawn->pid,
5291f26d 645 FORMAT_TIMESPAN(spawn->timeout_usec, USEC_PER_SEC));
912541b0 646
8128f229
TG
647 return 1;
648}
67117413 649
8128f229 650static int on_spawn_timeout_warning(sd_event_source *s, uint64_t usec, void *userdata) {
99534007 651 Spawn *spawn = ASSERT_PTR(userdata);
67117413 652
88d566aa
YW
653 log_device_warning(spawn->device, "Spawned process '%s' ["PID_FMT"] is taking longer than %s to complete",
654 spawn->cmd, spawn->pid,
5291f26d 655 FORMAT_TIMESPAN(spawn->timeout_warn_usec, USEC_PER_SEC));
8128f229
TG
656
657 return 1;
658}
659
660static int on_spawn_sigchld(sd_event_source *s, const siginfo_t *si, void *userdata) {
99534007 661 Spawn *spawn = ASSERT_PTR(userdata);
a7521142 662 int ret = -EIO;
8128f229 663
8128f229
TG
664 switch (si->si_code) {
665 case CLD_EXITED:
a7521142 666 if (si->si_status == 0)
88d566aa 667 log_device_debug(spawn->device, "Process '%s' succeeded.", spawn->cmd);
a7521142 668 else
ab54f12b 669 log_device_full(spawn->device, spawn->accept_failure ? LOG_DEBUG : LOG_WARNING,
88d566aa 670 "Process '%s' failed with exit code %i.", spawn->cmd, si->si_status);
a7521142 671 ret = si->si_status;
8128f229
TG
672 break;
673 case CLD_KILLED:
674 case CLD_DUMPED:
88d566aa 675 log_device_error(spawn->device, "Process '%s' terminated by signal %s.", spawn->cmd, signal_to_string(si->si_status));
8128f229
TG
676 break;
677 default:
88d566aa 678 log_device_error(spawn->device, "Process '%s' failed due to unknown reason.", spawn->cmd);
8128f229 679 }
912541b0 680
b428efa5
MS
681 DEVICE_TRACE_POINT(spawn_exit, spawn->device, spawn->cmd);
682
a7521142 683 sd_event_exit(sd_event_source_get_event(s), ret);
8128f229
TG
684 return 1;
685}
686
e81c3a4c 687static int spawn_wait(Spawn *spawn) {
4afd3348 688 _cleanup_(sd_event_unrefp) sd_event *e = NULL;
9612da36
YW
689 _cleanup_(sd_event_source_disable_unrefp) sd_event_source *sigchld_source = NULL;
690 _cleanup_(sd_event_source_disable_unrefp) sd_event_source *stdout_source = NULL;
691 _cleanup_(sd_event_source_disable_unrefp) sd_event_source *stderr_source = NULL;
a7521142 692 int r;
8128f229 693
e81c3a4c
YW
694 assert(spawn);
695
8128f229
TG
696 r = sd_event_new(&e);
697 if (r < 0)
90d260d8 698 return log_device_debug_errno(spawn->device, r, "Failed to allocate sd-event object: %m");
8128f229 699
e81c3a4c 700 if (spawn->timeout_usec > 0) {
8128f229
TG
701 usec_t usec, age_usec;
702
3285baa8 703 usec = now(CLOCK_MONOTONIC);
e81c3a4c
YW
704 age_usec = usec - spawn->event_birth_usec;
705 if (age_usec < spawn->timeout_usec) {
706 if (spawn->timeout_warn_usec > 0 &&
707 spawn->timeout_warn_usec < spawn->timeout_usec &&
708 spawn->timeout_warn_usec > age_usec) {
709 spawn->timeout_warn_usec -= age_usec;
8128f229 710
3285baa8 711 r = sd_event_add_time(e, NULL, CLOCK_MONOTONIC,
e81c3a4c
YW
712 usec + spawn->timeout_warn_usec, USEC_PER_SEC,
713 on_spawn_timeout_warning, spawn);
8128f229 714 if (r < 0)
90d260d8 715 return log_device_debug_errno(spawn->device, r, "Failed to create timeout warning event source: %m");
912541b0 716 }
8128f229 717
e81c3a4c 718 spawn->timeout_usec -= age_usec;
8128f229 719
3285baa8 720 r = sd_event_add_time(e, NULL, CLOCK_MONOTONIC,
e81c3a4c 721 usec + spawn->timeout_usec, USEC_PER_SEC, on_spawn_timeout, spawn);
8128f229 722 if (r < 0)
90d260d8 723 return log_device_debug_errno(spawn->device, r, "Failed to create timeout event source: %m");
912541b0
KS
724 }
725 }
8128f229 726
adeb26c1 727 if (spawn->fd_stdout >= 0) {
9f537ae3
PD
728 r = sd_event_add_io(e, &stdout_source, spawn->fd_stdout, EPOLLIN, on_spawn_io, spawn);
729 if (r < 0)
90d260d8 730 return log_device_debug_errno(spawn->device, r, "Failed to create stdio event source: %m");
9f537ae3 731 r = sd_event_source_set_enabled(stdout_source, SD_EVENT_ONESHOT);
adeb26c1 732 if (r < 0)
90d260d8 733 return log_device_debug_errno(spawn->device, r, "Failed to enable stdio event source: %m");
adeb26c1 734 }
e81c3a4c 735
adeb26c1 736 if (spawn->fd_stderr >= 0) {
9f537ae3
PD
737 r = sd_event_add_io(e, &stderr_source, spawn->fd_stderr, EPOLLIN, on_spawn_io, spawn);
738 if (r < 0)
90d260d8 739 return log_device_debug_errno(spawn->device, r, "Failed to create stderr event source: %m");
9f537ae3 740 r = sd_event_source_set_enabled(stderr_source, SD_EVENT_ONESHOT);
adeb26c1 741 if (r < 0)
90d260d8 742 return log_device_debug_errno(spawn->device, r, "Failed to enable stderr event source: %m");
adeb26c1 743 }
e81c3a4c 744
9f537ae3 745 r = sd_event_add_child(e, &sigchld_source, spawn->pid, WEXITED, on_spawn_sigchld, spawn);
8128f229 746 if (r < 0)
90d260d8 747 return log_device_debug_errno(spawn->device, r, "Failed to create sigchild event source: %m");
9f537ae3
PD
748 /* SIGCHLD should be processed after IO is complete */
749 r = sd_event_source_set_priority(sigchld_source, SD_EVENT_PRIORITY_NORMAL + 1);
750 if (r < 0)
90d260d8 751 return log_device_debug_errno(spawn->device, r, "Failed to set priority to sigchild event source: %m");
9f537ae3 752
a7521142 753 return sd_event_loop(e);
2181d30a
KS
754}
755
6b6e471a
YW
756int udev_event_spawn(
757 UdevEvent *event,
758 usec_t timeout_usec,
759 int timeout_signal,
760 bool accept_failure,
761 const char *cmd,
762 char *result,
763 size_t ressize,
764 bool *ret_truncated) {
765
19ee48a6 766 _cleanup_close_pair_ int outpipe[2] = PIPE_EBADF, errpipe[2] = PIPE_EBADF;
feaa6db7 767 _cleanup_strv_free_ char **argv = NULL;
947ce772 768 char **envp = NULL;
e81c3a4c 769 Spawn spawn;
912541b0 770 pid_t pid;
feaa6db7 771 int r;
912541b0 772
dc8aec36
YW
773 assert(event);
774 assert(event->dev);
e81c3a4c
YW
775 assert(result || ressize == 0);
776
912541b0 777 /* pipes from child to parent */
2e48548f 778 if (result || log_get_max_level() >= LOG_INFO)
f71e8ec1 779 if (pipe2(outpipe, O_NONBLOCK|O_CLOEXEC) != 0)
88d566aa
YW
780 return log_device_error_errno(event->dev, errno,
781 "Failed to create pipe for command '%s': %m", cmd);
912541b0 782
feaa6db7 783 if (log_get_max_level() >= LOG_INFO)
f71e8ec1 784 if (pipe2(errpipe, O_NONBLOCK|O_CLOEXEC) != 0)
88d566aa
YW
785 return log_device_error_errno(event->dev, errno,
786 "Failed to create pipe for command '%s': %m", cmd);
feaa6db7 787
90e30d76 788 r = strv_split_full(&argv, cmd, NULL, EXTRACT_UNQUOTE | EXTRACT_RELAX | EXTRACT_RETAIN_ESCAPE);
0645b83a
ZJS
789 if (r < 0)
790 return log_device_error_errno(event->dev, r, "Failed to split command: %m");
feaa6db7 791
baaa35ad 792 if (isempty(argv[0]))
88d566aa
YW
793 return log_device_error_errno(event->dev, SYNTHETIC_ERRNO(EINVAL),
794 "Invalid command '%s'", cmd);
dc8aec36 795
feaa6db7
YW
796 /* allow programs in /usr/lib/udev/ to be called without the path */
797 if (!path_is_absolute(argv[0])) {
798 char *program;
799
62a85ee0 800 program = path_join(UDEVLIBEXECDIR, argv[0]);
feaa6db7
YW
801 if (!program)
802 return log_oom();
bbf35206 803
feaa6db7
YW
804 free_and_replace(argv[0], program);
805 }
806
cf28ad46 807 r = device_get_properties_strv(event->dev, &envp);
947ce772 808 if (r < 0)
cf28ad46 809 return log_device_error_errno(event->dev, r, "Failed to get device properties");
947ce772 810
88d566aa 811 log_device_debug(event->dev, "Starting '%s'", cmd);
3ad4d482 812
0c2aedb4
YW
813 r = safe_fork_full("(spawn)",
814 (int[]) { -EBADF, outpipe[WRITE_END], errpipe[WRITE_END] },
815 NULL, 0,
816 FORK_RESET_SIGNALS|FORK_CLOSE_ALL_FDS|FORK_DEATHSIG|FORK_REARRANGE_STDIO|FORK_LOG|FORK_RLIMIT_NOFILE_SAFE,
817 &pid);
feaa6db7 818 if (r < 0)
88d566aa
YW
819 return log_device_error_errno(event->dev, r,
820 "Failed to fork() to execute command '%s': %m", cmd);
feaa6db7 821 if (r == 0) {
b428efa5 822 DEVICE_TRACE_POINT(spawn_exec, event->dev, cmd);
947ce772 823 execve(argv[0], argv, envp);
84b1ccb9 824 _exit(EXIT_FAILURE);
bbf35206 825 }
912541b0 826
4c253ed1
LP
827 /* parent closed child's ends of pipes */
828 outpipe[WRITE_END] = safe_close(outpipe[WRITE_END]);
829 errpipe[WRITE_END] = safe_close(errpipe[WRITE_END]);
912541b0 830
e81c3a4c 831 spawn = (Spawn) {
88d566aa 832 .device = event->dev,
e81c3a4c
YW
833 .cmd = cmd,
834 .pid = pid,
835 .accept_failure = accept_failure,
66f737b4 836 .timeout_warn_usec = udev_warn_timeout(timeout_usec),
e81c3a4c 837 .timeout_usec = timeout_usec,
e2099267 838 .timeout_signal = timeout_signal,
e81c3a4c
YW
839 .event_birth_usec = event->birth_usec,
840 .fd_stdout = outpipe[READ_END],
841 .fd_stderr = errpipe[READ_END],
842 .result = result,
843 .result_size = ressize,
844 };
845 r = spawn_wait(&spawn);
feaa6db7 846 if (r < 0)
88d566aa
YW
847 return log_device_error_errno(event->dev, r,
848 "Failed to wait for spawned command '%s': %m", cmd);
2181d30a 849
e81c3a4c
YW
850 if (result)
851 result[spawn.result_len] = '\0';
852
6b6e471a
YW
853 if (ret_truncated)
854 *ret_truncated = spawn.truncated;
855
a7521142 856 return r; /* 0 for success, and positive if the program failed */
2181d30a
KS
857}
858
ff88b949
YW
859static int device_rename(sd_device *device, const char *name) {
860 _cleanup_free_ char *new_syspath = NULL;
861 const char *s;
862 int r;
863
864 assert(device);
865 assert(name);
866
867 if (!filename_is_valid(name))
868 return -EINVAL;
869
870 r = sd_device_get_syspath(device, &s);
871 if (r < 0)
872 return r;
873
874 r = path_extract_directory(s, &new_syspath);
875 if (r < 0)
876 return r;
877
878 if (!path_extend(&new_syspath, name))
879 return -ENOMEM;
880
881 if (!path_is_safe(new_syspath))
882 return -EINVAL;
883
884 /* At the time this is called, the renamed device may not exist yet. Hence, we cannot validate
885 * the new syspath. */
886 r = device_set_syspath(device, new_syspath, /* verify = */ false);
887 if (r < 0)
888 return r;
889
890 r = sd_device_get_property_value(device, "INTERFACE", &s);
891 if (r == -ENOENT)
892 return 0;
893 if (r < 0)
894 return r;
895
896 /* like DEVPATH_OLD, INTERFACE_OLD is not saved to the db, but only stays around for the current event */
897 r = device_add_property_internal(device, "INTERFACE_OLD", s);
898 if (r < 0)
899 return r;
900
901 return device_add_property_internal(device, "INTERFACE", name);
902}
903
2e088715 904static int rename_netif(UdevEvent *event) {
21003384
YW
905 _cleanup_free_ char *old_syspath = NULL, *old_sysname = NULL;
906 const char *s;
60e50fb2 907 sd_device *dev;
2740750d
YW
908 int ifindex, r;
909
60e50fb2
YW
910 assert(event);
911
2740750d
YW
912 if (!event->name)
913 return 0; /* No new name is requested. */
914
60e50fb2
YW
915 dev = ASSERT_PTR(event->dev);
916
a1130022 917 if (!device_for_action(dev, SD_DEVICE_ADD))
2740750d 918 return 0; /* Rename the interface only when it is added. */
16d26d55 919
2740750d
YW
920 r = sd_device_get_ifindex(dev, &ifindex);
921 if (r == -ENOENT)
922 return 0; /* Device is not a network interface. */
923 if (r < 0)
21003384 924 return log_device_warning_errno(dev, r, "Failed to get ifindex: %m");
912541b0 925
068b0f77
YW
926 if (naming_scheme_has(NAMING_REPLACE_STRICTLY) &&
927 !ifname_valid(event->name)) {
928 log_device_warning(dev, "Invalid network interface name, ignoring: %s", event->name);
929 return 0;
930 }
931
21003384 932 r = sd_device_get_sysname(dev, &s);
a4055a60 933 if (r < 0)
21003384 934 return log_device_warning_errno(dev, r, "Failed to get sysname: %m");
912541b0 935
21003384
YW
936 if (streq(event->name, s))
937 return 0; /* The interface name is already requested name. */
938
939 old_sysname = strdup(s);
940 if (!old_sysname)
941 return -ENOMEM;
942
943 r = sd_device_get_syspath(dev, &s);
f647962d 944 if (r < 0)
21003384
YW
945 return log_device_warning_errno(dev, r, "Failed to get syspath: %m");
946
947 old_syspath = strdup(s);
948 if (!old_syspath)
949 return -ENOMEM;
950
951 r = device_rename(dev, event->name);
952 if (r < 0) {
953 log_device_warning_errno(dev, r, "Failed to update properties with new name '%s': %m", event->name);
954 goto revert;
955 }
956
957 /* Set ID_RENAMING boolean property here. It will be dropped when the corresponding move uevent is processed. */
958 r = device_add_property(dev, "ID_RENAMING", "1");
959 if (r < 0) {
960 log_device_warning_errno(dev, r, "Failed to add 'ID_RENAMING' property: %m");
961 goto revert;
962 }
16d26d55 963
ae353ec2
YW
964 /* Also set ID_RENAMING boolean property to cloned sd_device object and save it to database
965 * before calling rtnl_set_link_name(). Otherwise, clients (e.g., systemd-networkd) may receive
966 * RTM_NEWLINK netlink message before the database is updated. */
967 r = device_add_property(event->dev_db_clone, "ID_RENAMING", "1");
21003384
YW
968 if (r < 0) {
969 log_device_warning_errno(event->dev_db_clone, r, "Failed to add 'ID_RENAMING' property: %m");
970 goto revert;
971 }
ae353ec2
YW
972
973 r = device_update_db(event->dev_db_clone);
21003384
YW
974 if (r < 0) {
975 log_device_debug_errno(event->dev_db_clone, r, "Failed to update database under /run/udev/data/: %m");
976 goto revert;
977 }
ae353ec2
YW
978
979 r = rtnl_set_link_name(&event->rtnl, ifindex, event->name);
21003384
YW
980 if (r < 0) {
981 if (r == -EBUSY) {
982 log_device_info(dev, "Network interface '%s' is already up, cannot rename to '%s'.",
983 old_sysname, event->name);
984 r = 0;
985 } else
986 log_device_error_errno(dev, r, "Failed to rename network interface %i from '%s' to '%s': %m",
987 ifindex, old_sysname, event->name);
988 goto revert;
53584e7b 989 }
16d26d55 990
21003384 991 log_device_debug(dev, "Network interface %i is renamed from '%s' to '%s'", ifindex, old_sysname, event->name);
2740750d 992 return 1;
21003384
YW
993
994revert:
995 /* Restore 'dev_db_clone' */
996 (void) device_add_property(event->dev_db_clone, "ID_RENAMING", NULL);
997 (void) device_update_db(event->dev_db_clone);
998
999 /* Restore 'dev' */
1000 (void) device_set_syspath(dev, old_syspath, /* verify = */ false);
1001 if (sd_device_get_property_value(dev, "INTERFACE_OLD", &s) >= 0) {
1002 (void) device_add_property_internal(dev, "INTERFACE", s);
1003 (void) device_add_property_internal(dev, "INTERFACE_OLD", NULL);
1004 }
1005 (void) device_add_property(dev, "ID_RENAMING", NULL);
1006
1007 return r;
d46f37fd
KS
1008}
1009
2e088715 1010static int update_devnode(UdevEvent *event) {
fbd747a4 1011 sd_device *dev = ASSERT_PTR(ASSERT_PTR(event)->dev);
e52eaf56
YW
1012 int r;
1013
7af1c780 1014 r = sd_device_get_devnum(dev, NULL);
e52eaf56
YW
1015 if (r == -ENOENT)
1016 return 0;
1017 if (r < 0)
1018 return log_device_error_errno(dev, r, "Failed to get devnum: %m");
1019
25de7aa7 1020 if (!uid_is_valid(event->uid)) {
e52eaf56 1021 r = device_get_devnode_uid(dev, &event->uid);
3708c0f4 1022 if (r < 0 && r != -ENOENT)
e52eaf56
YW
1023 return log_device_error_errno(dev, r, "Failed to get devnode UID: %m");
1024 }
1025
25de7aa7 1026 if (!gid_is_valid(event->gid)) {
e52eaf56 1027 r = device_get_devnode_gid(dev, &event->gid);
3708c0f4 1028 if (r < 0 && r != -ENOENT)
e52eaf56
YW
1029 return log_device_error_errno(dev, r, "Failed to get devnode GID: %m");
1030 }
1031
25de7aa7 1032 if (event->mode == MODE_INVALID) {
e52eaf56
YW
1033 r = device_get_devnode_mode(dev, &event->mode);
1034 if (r < 0 && r != -ENOENT)
1035 return log_device_error_errno(dev, r, "Failed to get devnode mode: %m");
e52eaf56 1036 }
3708c0f4 1037
a1130022 1038 bool apply_mac = device_for_action(dev, SD_DEVICE_ADD);
e52eaf56 1039
2f48561e
YW
1040 r = udev_node_apply_permissions(dev, apply_mac, event->mode, event->uid, event->gid, event->seclabel_list);
1041 if (r < 0)
1042 return log_device_error_errno(dev, r, "Failed to apply devnode permissions: %m");
1043
1044 return udev_node_update(dev, event->dev_db_clone);
e52eaf56
YW
1045}
1046
4cac2260 1047static int event_execute_rules_on_remove(
2e088715 1048 UdevEvent *event,
df7ee959 1049 int inotify_fd,
66f737b4 1050 usec_t timeout_usec,
e2099267 1051 int timeout_signal,
eb1f9e30 1052 Hashmap *properties_list,
9a07157d 1053 UdevRules *rules) {
912541b0 1054
fbd747a4 1055 sd_device *dev = ASSERT_PTR(ASSERT_PTR(event)->dev);
eb1f9e30 1056 int r;
912541b0 1057
ebcc52fa 1058 r = device_read_db_internal(dev, true);
eb1f9e30
YW
1059 if (r < 0)
1060 log_device_debug_errno(dev, r, "Failed to read database under /run/udev/data/: %m");
107f2e25 1061
eb1f9e30
YW
1062 r = device_tag_index(dev, NULL, false);
1063 if (r < 0)
1064 log_device_debug_errno(dev, r, "Failed to remove corresponding tag files under /run/udev/tag/, ignoring: %m");
912541b0 1065
eb1f9e30
YW
1066 r = device_delete_db(dev);
1067 if (r < 0)
1068 log_device_debug_errno(dev, r, "Failed to delete database under /run/udev/data/, ignoring: %m");
912541b0 1069
790da548
YW
1070 r = udev_watch_end(inotify_fd, dev);
1071 if (r < 0)
1072 log_device_warning_errno(dev, r, "Failed to remove inotify watch, ignoring: %m");
eb1f9e30 1073
4cac2260 1074 r = udev_rules_apply_to_event(rules, event, timeout_usec, timeout_signal, properties_list);
eb1f9e30 1075
d4a95a95 1076 if (sd_device_get_devnum(dev, NULL) >= 0)
eb1f9e30 1077 (void) udev_node_remove(dev);
4cac2260
YW
1078
1079 return r;
eb1f9e30
YW
1080}
1081
e77b146f
LP
1082static int copy_all_tags(sd_device *d, sd_device *s) {
1083 const char *tag;
1084 int r;
1085
1086 assert(d);
1087
1088 if (!s)
1089 return 0;
1090
5b90b906 1091 FOREACH_DEVICE_TAG(s, tag) {
e77b146f
LP
1092 r = device_add_tag(d, tag, false);
1093 if (r < 0)
1094 return r;
1095 }
1096
1097 return 0;
1098}
1099
df7ee959
YW
1100int udev_event_execute_rules(
1101 UdevEvent *event,
1102 int inotify_fd, /* This may be negative */
1103 usec_t timeout_usec,
1104 int timeout_signal,
1105 Hashmap *properties_list,
1106 UdevRules *rules) {
1107
a1130022 1108 sd_device_action_t action;
6d0fdf45 1109 sd_device *dev;
eb1f9e30
YW
1110 int r;
1111
28235d10 1112 dev = ASSERT_PTR(ASSERT_PTR(event)->dev);
eb1f9e30
YW
1113 assert(rules);
1114
a1130022 1115 r = sd_device_get_action(dev, &action);
eb1f9e30 1116 if (r < 0)
d4d690fa 1117 return log_device_error_errno(dev, r, "Failed to get ACTION: %m");
b081b27e 1118
4cac2260
YW
1119 if (action == SD_DEVICE_REMOVE)
1120 return event_execute_rules_on_remove(event, inotify_fd, timeout_usec, timeout_signal, properties_list, rules);
912541b0 1121
e7f781e4 1122 /* Disable watch during event processing. */
28235d10 1123 r = udev_watch_end(inotify_fd, dev);
790da548
YW
1124 if (r < 0)
1125 log_device_warning_errno(dev, r, "Failed to remove inotify watch, ignoring: %m");
e7f781e4 1126
480ecb7d 1127 r = device_clone_with_db(dev, &event->dev_db_clone);
eb1f9e30 1128 if (r < 0)
99058cd6 1129 return log_device_debug_errno(dev, r, "Failed to clone sd_device object: %m");
912541b0 1130
e77b146f
LP
1131 r = copy_all_tags(dev, event->dev_db_clone);
1132 if (r < 0)
1133 log_device_warning_errno(dev, r, "Failed to copy all tags from old database entry, ignoring: %m");
1134
7137f2f3
YW
1135 /* Drop previously added property for safety to make IMPORT{db}="ID_RENAMING" not work. This is
1136 * mostly for 'move' uevent, but let's do unconditionally. Why? If a network interface is renamed in
1137 * initrd, then udevd may lose the 'move' uevent during switching root. Usually, we do not set the
1138 * persistent flag for network interfaces, but user may set it. Just for safety. */
1139 r = device_add_property(event->dev_db_clone, "ID_RENAMING", NULL);
1140 if (r < 0)
1141 return log_device_debug_errno(dev, r, "Failed to remove 'ID_RENAMING' property: %m");
eb1f9e30 1142
b428efa5
MS
1143 DEVICE_TRACE_POINT(rules_start, dev);
1144
e2099267 1145 r = udev_rules_apply_to_event(rules, event, timeout_usec, timeout_signal, properties_list);
99058cd6
YW
1146 if (r < 0)
1147 return log_device_debug_errno(dev, r, "Failed to apply udev rules: %m");
eb1f9e30 1148
b428efa5
MS
1149 DEVICE_TRACE_POINT(rules_finished, dev);
1150
99058cd6
YW
1151 r = rename_netif(event);
1152 if (r < 0)
1153 return r;
1154
1155 r = update_devnode(event);
1156 if (r < 0)
1157 return r;
eb1f9e30
YW
1158
1159 /* preserve old, or get new initialization timestamp */
480ecb7d 1160 r = device_ensure_usec_initialized(dev, event->dev_db_clone);
eb1f9e30 1161 if (r < 0)
99058cd6 1162 return log_device_debug_errno(dev, r, "Failed to set initialization timestamp: %m");
eb1f9e30
YW
1163
1164 /* (re)write database file */
480ecb7d 1165 r = device_tag_index(dev, event->dev_db_clone, true);
eb1f9e30 1166 if (r < 0)
99058cd6 1167 return log_device_debug_errno(dev, r, "Failed to update tags under /run/udev/tag/: %m");
eb1f9e30
YW
1168
1169 r = device_update_db(dev);
1170 if (r < 0)
99058cd6 1171 return log_device_debug_errno(dev, r, "Failed to update database under /run/udev/data/: %m");
eb1f9e30 1172
996c8390
MS
1173 device_set_is_initialized(dev);
1174
7920d0a1 1175 return 0;
d46f37fd 1176}
2d73813e 1177
e2099267 1178void udev_event_execute_run(UdevEvent *event, usec_t timeout_usec, int timeout_signal) {
1448820a 1179 const char *command;
29448498 1180 void *val;
25de7aa7 1181 int r;
912541b0 1182
90e74a66 1183 ORDERED_HASHMAP_FOREACH_KEY(val, command, event->run_list) {
25de7aa7 1184 UdevBuiltinCommand builtin_cmd = PTR_TO_UDEV_BUILTIN_CMD(val);
912541b0 1185
25de7aa7
YW
1186 if (builtin_cmd != _UDEV_BUILTIN_INVALID) {
1187 log_device_debug(event->dev, "Running built-in command \"%s\"", command);
92232230 1188 r = udev_builtin_run(event->dev, &event->rtnl, builtin_cmd, command, false);
25de7aa7
YW
1189 if (r < 0)
1190 log_device_debug_errno(event->dev, r, "Failed to run built-in command \"%s\", ignoring: %m", command);
1191 } else {
6b92f429 1192 if (event->exec_delay_usec > 0) {
25de7aa7 1193 log_device_debug(event->dev, "Delaying execution of \"%s\" for %s.",
5291f26d 1194 command, FORMAT_TIMESPAN(event->exec_delay_usec, USEC_PER_SEC));
6b92f429 1195 (void) usleep(event->exec_delay_usec);
912541b0
KS
1196 }
1197
25de7aa7 1198 log_device_debug(event->dev, "Running command \"%s\"", command);
e2099267 1199
6b6e471a 1200 r = udev_event_spawn(event, timeout_usec, timeout_signal, false, command, NULL, 0, NULL);
08de1958
YW
1201 if (r < 0)
1202 log_device_warning_errno(event->dev, r, "Failed to execute '%s', ignoring: %m", command);
1203 else if (r > 0) /* returned value is positive when program fails */
25de7aa7 1204 log_device_debug(event->dev, "Command \"%s\" returned %d (error), ignoring.", command, r);
912541b0
KS
1205 }
1206 }
2d73813e 1207}