]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/udev/udev-rules.c
systemctl: fix typo
[thirdparty/systemd.git] / src / udev / udev-rules.c
CommitLineData
2232cac8 1/*
5539f624 2 * Copyright (C) 2003-2010 Kay Sievers <kay.sievers@vrfy.org>
023ed7b0 3 * Copyright (C) 2008 Alan Jenkins <alan-jenkins@tuffmail.co.uk>
2232cac8 4 *
55e9959b
KS
5 * This program is free software: you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation, either version 2 of the License, or
8 * (at your option) any later version.
3d6d12c6 9 *
55e9959b
KS
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
2232cac8 14 *
55e9959b
KS
15 * You should have received a copy of the GNU General Public License
16 * along with this program. If not, see <http://www.gnu.org/licenses/>.
2232cac8
GKH
17 */
18
19#include <stddef.h>
1449a55d 20#include <limits.h>
2232cac8 21#include <stdlib.h>
6d87ee2e 22#include <stdbool.h>
2232cac8
GKH
23#include <string.h>
24#include <stdio.h>
25#include <fcntl.h>
26#include <ctype.h>
27#include <unistd.h>
28#include <errno.h>
5ee7ecfb 29#include <dirent.h>
cea61f5c 30#include <fnmatch.h>
959e8b5d 31#include <time.h>
2232cac8 32
2232cac8 33#include "udev.h"
2232cac8 34
a1525d17
KS
35#define PREALLOC_TOKEN 2048
36#define PREALLOC_STRBUF 32 * 1024
37#define PREALLOC_TRIE 256
c7521974 38
6ada823a
KS
39/* configuration directories with last modification timestamp */
40static const char *rules_dirs[] = {
41 TEST_PREFIX UDEVLIBEXECDIR "/rules.d",
42 TEST_PREFIX "/run/udev/rules.d",
43 TEST_PREFIX SYSCONFDIR "/udev/rules.d",
44};
45
4052400f 46struct uid_gid {
912541b0
KS
47 unsigned int name_off;
48 union {
a1525d17
KS
49 uid_t uid;
50 gid_t gid;
912541b0 51 };
4052400f
KS
52};
53
1449a55d 54struct trie_node {
912541b0
KS
55 /* this node's first child */
56 unsigned int child_idx;
57 /* the next child of our parent node's child list */
58 unsigned int next_child_idx;
59 /* this node's last child (shortcut for append) */
60 unsigned int last_child_idx;
61 unsigned int value_off;
62 unsigned short value_len;
63 unsigned char key;
1449a55d
AJ
64};
65
4052400f 66struct udev_rules {
912541b0 67 struct udev *udev;
6ada823a 68 unsigned long long dirs_ts_usec[ELEMENTSOF(rules_dirs)];
912541b0
KS
69 int resolve_names;
70
71 /* every key in the rules file becomes a token */
72 struct token *tokens;
73 unsigned int token_cur;
74 unsigned int token_max;
75
76 /* all key strings are copied to a single string buffer */
77 char *buf;
78 size_t buf_cur;
79 size_t buf_max;
80 unsigned int buf_count;
81
82 /* during rule parsing, strings are indexed to find duplicates */
83 struct trie_node *trie_nodes;
84 unsigned int trie_nodes_cur;
85 unsigned int trie_nodes_max;
86
87 /* during rule parsing, uid/gid lookup results are cached */
88 struct uid_gid *uids;
89 unsigned int uids_cur;
90 unsigned int uids_max;
91 struct uid_gid *gids;
92 unsigned int gids_cur;
93 unsigned int gids_max;
4052400f
KS
94};
95
1449a55d 96/* KEY=="", KEY!="", KEY+="", KEY="", KEY:="" */
b0f7409f 97enum operation_type {
912541b0 98 OP_UNSET,
b0f7409f 99
912541b0
KS
100 OP_MATCH,
101 OP_NOMATCH,
102 OP_MATCH_MAX,
b0f7409f 103
912541b0
KS
104 OP_ADD,
105 OP_ASSIGN,
106 OP_ASSIGN_FINAL,
c7521974
KS
107};
108
ac218d9c 109enum string_glob_type {
912541b0 110 GL_UNSET,
a1525d17 111 GL_PLAIN, /* no special chars */
912541b0 112 GL_GLOB, /* shell globs ?,*,[] */
a1525d17
KS
113 GL_SPLIT, /* multi-value A|B */
114 GL_SPLIT_GLOB, /* multi-value with glob A*|B* */
115 GL_SOMETHING, /* commonly used "?*" */
ac218d9c
KS
116};
117
32028733 118enum string_subst_type {
912541b0
KS
119 SB_UNSET,
120 SB_NONE,
121 SB_FORMAT,
122 SB_SUBSYS,
32028733
KS
123};
124
154a7b84 125/* tokens of a rule are sorted/handled in this order */
6880b25d 126enum token_type {
912541b0
KS
127 TK_UNSET,
128 TK_RULE,
129
a1525d17
KS
130 TK_M_ACTION, /* val */
131 TK_M_DEVPATH, /* val */
132 TK_M_KERNEL, /* val */
133 TK_M_DEVLINK, /* val */
134 TK_M_NAME, /* val */
135 TK_M_ENV, /* val, attr */
136 TK_M_TAG, /* val */
137 TK_M_SUBSYSTEM, /* val */
138 TK_M_DRIVER, /* val */
139 TK_M_WAITFOR, /* val */
140 TK_M_ATTR, /* val, attr */
912541b0
KS
141
142 TK_M_PARENTS_MIN,
a1525d17 143 TK_M_KERNELS, /* val */
912541b0 144 TK_M_SUBSYSTEMS, /* val */
a1525d17
KS
145 TK_M_DRIVERS, /* val */
146 TK_M_ATTRS, /* val, attr */
147 TK_M_TAGS, /* val */
912541b0
KS
148 TK_M_PARENTS_MAX,
149
a1525d17
KS
150 TK_M_TEST, /* val, mode_t */
151 TK_M_EVENT_TIMEOUT, /* int */
152 TK_M_PROGRAM, /* val */
153 TK_M_IMPORT_FILE, /* val */
154 TK_M_IMPORT_PROG, /* val */
155 TK_M_IMPORT_BUILTIN, /* val */
156 TK_M_IMPORT_DB, /* val */
157 TK_M_IMPORT_CMDLINE, /* val */
158 TK_M_IMPORT_PARENT, /* val */
159 TK_M_RESULT, /* val */
912541b0
KS
160 TK_M_MAX,
161
162 TK_A_STRING_ESCAPE_NONE,
163 TK_A_STRING_ESCAPE_REPLACE,
164 TK_A_DB_PERSIST,
a1525d17
KS
165 TK_A_INOTIFY_WATCH, /* int */
166 TK_A_DEVLINK_PRIO, /* int */
167 TK_A_OWNER, /* val */
168 TK_A_GROUP, /* val */
169 TK_A_MODE, /* val */
170 TK_A_OWNER_ID, /* uid_t */
171 TK_A_GROUP_ID, /* gid_t */
172 TK_A_MODE_ID, /* mode_t */
173 TK_A_STATIC_NODE, /* val */
174 TK_A_ENV, /* val, attr */
175 TK_A_TAG, /* val */
176 TK_A_NAME, /* val */
177 TK_A_DEVLINK, /* val */
178 TK_A_ATTR, /* val, attr */
83cd6b75
KS
179 TK_A_RUN_BUILTIN, /* val, bool */
180 TK_A_RUN_PROGRAM, /* val, bool */
a1525d17 181 TK_A_GOTO, /* size_t */
912541b0
KS
182
183 TK_END,
c7521974
KS
184};
185
3f3aa9f5 186/* we try to pack stuff in a way that we take only 12 bytes per token */
4052400f 187struct token {
912541b0
KS
188 union {
189 unsigned char type; /* same in rule and key */
190 struct {
191 enum token_type type:8;
192 bool can_set_name:1;
193 bool has_static_node:1;
194 unsigned int unused:6;
195 unsigned short token_count;
196 unsigned int label_off;
197 unsigned short filename_off;
198 unsigned short filename_line;
199 } rule;
200 struct {
201 enum token_type type:8;
202 enum operation_type op:8;
203 enum string_glob_type glob:8;
204 enum string_subst_type subst:4;
205 enum string_subst_type attrsubst:4;
206 unsigned int value_off;
207 union {
208 unsigned int attr_off;
209 int devlink_unique;
210 unsigned int rule_goto;
211 mode_t mode;
212 uid_t uid;
213 gid_t gid;
214 int devlink_prio;
215 int event_timeout;
216 int watch;
217 enum udev_builtin_cmd builtin_cmd;
218 };
219 } key;
220 };
4052400f
KS
221};
222
912541b0 223#define MAX_TK 64
4052400f 224struct rule_tmp {
912541b0
KS
225 struct udev_rules *rules;
226 struct token rule;
227 struct token token[MAX_TK];
228 unsigned int token_cur;
4052400f
KS
229};
230
baa30fbc 231#ifdef DEBUG
5d6a1fa6
KS
232static const char *operation_str(enum operation_type type)
233{
912541b0 234 static const char *operation_strs[] = {
a1525d17
KS
235 [OP_UNSET] = "UNSET",
236 [OP_MATCH] = "match",
237 [OP_NOMATCH] = "nomatch",
912541b0
KS
238 [OP_MATCH_MAX] = "MATCH_MAX",
239
a1525d17
KS
240 [OP_ADD] = "add",
241 [OP_ASSIGN] = "assign",
242 [OP_ASSIGN_FINAL] = "assign-final",
912541b0
KS
243} ;
244
245 return operation_strs[type];
5d6a1fa6 246}
4052400f 247
5d6a1fa6
KS
248static const char *string_glob_str(enum string_glob_type type)
249{
912541b0 250 static const char *string_glob_strs[] = {
a1525d17
KS
251 [GL_UNSET] = "UNSET",
252 [GL_PLAIN] = "plain",
253 [GL_GLOB] = "glob",
254 [GL_SPLIT] = "split",
255 [GL_SPLIT_GLOB] = "split-glob",
256 [GL_SOMETHING] = "split-glob",
912541b0
KS
257 };
258
259 return string_glob_strs[type];
5d6a1fa6
KS
260}
261
262static const char *token_str(enum token_type type)
263{
912541b0 264 static const char *token_strs[] = {
a1525d17
KS
265 [TK_UNSET] = "UNSET",
266 [TK_RULE] = "RULE",
912541b0 267
a1525d17 268 [TK_M_ACTION] = "M ACTION",
912541b0 269 [TK_M_DEVPATH] = "M DEVPATH",
a1525d17 270 [TK_M_KERNEL] = "M KERNEL",
912541b0 271 [TK_M_DEVLINK] = "M DEVLINK",
a1525d17
KS
272 [TK_M_NAME] = "M NAME",
273 [TK_M_ENV] = "M ENV",
274 [TK_M_TAG] = "M TAG",
275 [TK_M_SUBSYSTEM] = "M SUBSYSTEM",
276 [TK_M_DRIVER] = "M DRIVER",
912541b0 277 [TK_M_WAITFOR] = "M WAITFOR",
a1525d17 278 [TK_M_ATTR] = "M ATTR",
912541b0 279
a1525d17 280 [TK_M_PARENTS_MIN] = "M PARENTS_MIN",
912541b0 281 [TK_M_KERNELS] = "M KERNELS",
a1525d17 282 [TK_M_SUBSYSTEMS] = "M SUBSYSTEMS",
912541b0 283 [TK_M_DRIVERS] = "M DRIVERS",
a1525d17
KS
284 [TK_M_ATTRS] = "M ATTRS",
285 [TK_M_TAGS] = "M TAGS",
286 [TK_M_PARENTS_MAX] = "M PARENTS_MAX",
912541b0 287
a1525d17
KS
288 [TK_M_TEST] = "M TEST",
289 [TK_M_EVENT_TIMEOUT] = "M EVENT_TIMEOUT",
912541b0 290 [TK_M_PROGRAM] = "M PROGRAM",
a1525d17
KS
291 [TK_M_IMPORT_FILE] = "M IMPORT_FILE",
292 [TK_M_IMPORT_PROG] = "M IMPORT_PROG",
293 [TK_M_IMPORT_BUILTIN] = "M IMPORT_BUILTIN",
294 [TK_M_IMPORT_DB] = "M IMPORT_DB",
295 [TK_M_IMPORT_CMDLINE] = "M IMPORT_CMDLINE",
296 [TK_M_IMPORT_PARENT] = "M IMPORT_PARENT",
297 [TK_M_RESULT] = "M RESULT",
298 [TK_M_MAX] = "M MAX",
299
300 [TK_A_STRING_ESCAPE_NONE] = "A STRING_ESCAPE_NONE",
301 [TK_A_STRING_ESCAPE_REPLACE] = "A STRING_ESCAPE_REPLACE",
302 [TK_A_DB_PERSIST] = "A DB_PERSIST",
303 [TK_A_INOTIFY_WATCH] = "A INOTIFY_WATCH",
304 [TK_A_DEVLINK_PRIO] = "A DEVLINK_PRIO",
305 [TK_A_OWNER] = "A OWNER",
306 [TK_A_GROUP] = "A GROUP",
307 [TK_A_MODE] = "A MODE",
308 [TK_A_OWNER_ID] = "A OWNER_ID",
309 [TK_A_GROUP_ID] = "A GROUP_ID",
310 [TK_A_STATIC_NODE] = "A STATIC_NODE",
912541b0 311 [TK_A_MODE_ID] = "A MODE_ID",
a1525d17
KS
312 [TK_A_ENV] = "A ENV",
313 [TK_A_TAG] = "A ENV",
314 [TK_A_NAME] = "A NAME",
912541b0 315 [TK_A_DEVLINK] = "A DEVLINK",
a1525d17 316 [TK_A_ATTR] = "A ATTR",
83cd6b75
KS
317 [TK_A_RUN_BUILTIN] = "A RUN_BUILTIN",
318 [TK_A_RUN_PROGRAM] = "A RUN_PROGRAM",
a1525d17 319 [TK_A_GOTO] = "A GOTO",
912541b0 320
a1525d17 321 [TK_END] = "END",
912541b0
KS
322 };
323
324 return token_strs[type];
5d6a1fa6 325}
c7521974 326
4052400f
KS
327static void dump_token(struct udev_rules *rules, struct token *token)
328{
912541b0
KS
329 enum token_type type = token->type;
330 enum operation_type op = token->key.op;
331 enum string_glob_type glob = token->key.glob;
332 const char *value = &rules->buf[token->key.value_off];
333 const char *attr = &rules->buf[token->key.attr_off];
334
335 switch (type) {
336 case TK_RULE:
337 {
338 const char *tks_ptr = (char *)rules->tokens;
339 const char *tk_ptr = (char *)token;
340 unsigned int idx = (tk_ptr - tks_ptr) / sizeof(struct token);
341
baa30fbc
KS
342 log_debug("* RULE %s:%u, token: %u, count: %u, label: '%s'\n",
343 &rules->buf[token->rule.filename_off], token->rule.filename_line,
344 idx, token->rule.token_count,
345 &rules->buf[token->rule.label_off]);
912541b0
KS
346 break;
347 }
348 case TK_M_ACTION:
349 case TK_M_DEVPATH:
350 case TK_M_KERNEL:
351 case TK_M_SUBSYSTEM:
352 case TK_M_DRIVER:
353 case TK_M_WAITFOR:
354 case TK_M_DEVLINK:
355 case TK_M_NAME:
356 case TK_M_KERNELS:
357 case TK_M_SUBSYSTEMS:
358 case TK_M_DRIVERS:
359 case TK_M_TAGS:
360 case TK_M_PROGRAM:
361 case TK_M_IMPORT_FILE:
362 case TK_M_IMPORT_PROG:
363 case TK_M_IMPORT_DB:
364 case TK_M_IMPORT_CMDLINE:
365 case TK_M_IMPORT_PARENT:
366 case TK_M_RESULT:
367 case TK_A_NAME:
368 case TK_A_DEVLINK:
369 case TK_A_OWNER:
370 case TK_A_GROUP:
371 case TK_A_MODE:
83cd6b75
KS
372 case TK_A_RUN_BUILTIN:
373 case TK_A_RUN_PROGRAM:
baa30fbc
KS
374 log_debug("%s %s '%s'(%s)\n",
375 token_str(type), operation_str(op), value, string_glob_str(glob));
912541b0
KS
376 break;
377 case TK_M_IMPORT_BUILTIN:
baa30fbc 378 log_debug("%s %i '%s'\n", token_str(type), token->key.builtin_cmd, value);
912541b0
KS
379 break;
380 case TK_M_ATTR:
381 case TK_M_ATTRS:
382 case TK_M_ENV:
383 case TK_A_ATTR:
384 case TK_A_ENV:
baa30fbc
KS
385 log_debug("%s %s '%s' '%s'(%s)\n",
386 token_str(type), operation_str(op), attr, value, string_glob_str(glob));
912541b0
KS
387 break;
388 case TK_M_TAG:
389 case TK_A_TAG:
baa30fbc 390 log_debug("%s %s '%s'\n", token_str(type), operation_str(op), value);
912541b0
KS
391 break;
392 case TK_A_STRING_ESCAPE_NONE:
393 case TK_A_STRING_ESCAPE_REPLACE:
394 case TK_A_DB_PERSIST:
baa30fbc 395 log_debug("%s\n", token_str(type));
912541b0
KS
396 break;
397 case TK_M_TEST:
baa30fbc
KS
398 log_debug("%s %s '%s'(%s) %#o\n",
399 token_str(type), operation_str(op), value, string_glob_str(glob), token->key.mode);
912541b0
KS
400 break;
401 case TK_A_INOTIFY_WATCH:
baa30fbc 402 log_debug("%s %u\n", token_str(type), token->key.watch);
912541b0
KS
403 break;
404 case TK_A_DEVLINK_PRIO:
baa30fbc 405 log_debug("%s %u\n", token_str(type), token->key.devlink_prio);
912541b0
KS
406 break;
407 case TK_A_OWNER_ID:
baa30fbc 408 log_debug("%s %s %u\n", token_str(type), operation_str(op), token->key.uid);
912541b0
KS
409 break;
410 case TK_A_GROUP_ID:
baa30fbc 411 log_debug("%s %s %u\n", token_str(type), operation_str(op), token->key.gid);
912541b0
KS
412 break;
413 case TK_A_MODE_ID:
baa30fbc 414 log_debug("%s %s %#o\n", token_str(type), operation_str(op), token->key.mode);
912541b0
KS
415 break;
416 case TK_A_STATIC_NODE:
baa30fbc 417 log_debug("%s '%s'\n", token_str(type), value);
912541b0
KS
418 break;
419 case TK_M_EVENT_TIMEOUT:
baa30fbc 420 log_debug("%s %u\n", token_str(type), token->key.event_timeout);
912541b0
KS
421 break;
422 case TK_A_GOTO:
baa30fbc 423 log_debug("%s '%s' %u\n", token_str(type), value, token->key.rule_goto);
912541b0
KS
424 break;
425 case TK_END:
baa30fbc 426 log_debug("* %s\n", token_str(type));
912541b0
KS
427 break;
428 case TK_M_PARENTS_MIN:
429 case TK_M_PARENTS_MAX:
430 case TK_M_MAX:
431 case TK_UNSET:
baa30fbc 432 log_debug("unknown type %u\n", type);
912541b0
KS
433 break;
434 }
4052400f 435}
154a7b84 436
4052400f
KS
437static void dump_rules(struct udev_rules *rules)
438{
912541b0
KS
439 unsigned int i;
440
baa30fbc
KS
441 log_debug("dumping %u (%zu bytes) tokens, %u (%zu bytes) strings\n",
442 rules->token_cur,
443 rules->token_cur * sizeof(struct token),
444 rules->buf_count,
445 rules->buf_cur);
912541b0
KS
446 for(i = 0; i < rules->token_cur; i++)
447 dump_token(rules, &rules->tokens[i]);
4052400f
KS
448}
449#else
5d6a1fa6
KS
450static inline const char *operation_str(enum operation_type type) { return NULL; }
451static inline const char *token_str(enum token_type type) { return NULL; }
4052400f
KS
452static inline void dump_token(struct udev_rules *rules, struct token *token) {}
453static inline void dump_rules(struct udev_rules *rules) {}
baa30fbc 454#endif /* DEBUG */
c7521974 455
1449a55d 456static int add_new_string(struct udev_rules *rules, const char *str, size_t bytes)
c7521974 457{
912541b0
KS
458 int off;
459
460 /* grow buffer if needed */
461 if (rules->buf_cur + bytes+1 >= rules->buf_max) {
462 char *buf;
463 unsigned int add;
464
465 /* double the buffer size */
466 add = rules->buf_max;
467 if (add < bytes * 8)
468 add = bytes * 8;
469
470 buf = realloc(rules->buf, rules->buf_max + add);
471 if (buf == NULL)
472 return -1;
912541b0
KS
473 rules->buf = buf;
474 rules->buf_max += add;
475 }
476 off = rules->buf_cur;
477 memcpy(&rules->buf[rules->buf_cur], str, bytes);
478 rules->buf_cur += bytes;
479 rules->buf_count++;
480 return off;
c7521974
KS
481}
482
1449a55d 483static int add_string(struct udev_rules *rules, const char *str)
c7521974 484{
912541b0
KS
485 unsigned int node_idx;
486 struct trie_node *new_node;
487 unsigned int new_node_idx;
488 unsigned char key;
489 unsigned short len;
490 unsigned int depth;
491 unsigned int off;
492 struct trie_node *parent;
493
494 /* walk trie, start from last character of str to find matching tails */
495 len = strlen(str);
496 key = str[len-1];
497 node_idx = 0;
498 for (depth = 0; depth <= len; depth++) {
499 struct trie_node *node;
500 unsigned int child_idx;
501
502 node = &rules->trie_nodes[node_idx];
503 off = node->value_off + node->value_len - len;
504
505 /* match against current node */
506 if (depth == len || (node->value_len >= len && memcmp(&rules->buf[off], str, len) == 0))
507 return off;
508
509 /* lookup child node */
510 key = str[len - 1 - depth];
511 child_idx = node->child_idx;
512 while (child_idx > 0) {
513 struct trie_node *child;
514
515 child = &rules->trie_nodes[child_idx];
516 if (child->key == key)
517 break;
518 child_idx = child->next_child_idx;
519 }
520 if (child_idx == 0)
521 break;
522 node_idx = child_idx;
523 }
524
525 /* string not found, add it */
526 off = add_new_string(rules, str, len + 1);
527
528 /* grow trie nodes if needed */
529 if (rules->trie_nodes_cur >= rules->trie_nodes_max) {
530 struct trie_node *nodes;
531 unsigned int add;
532
533 /* double the buffer size */
534 add = rules->trie_nodes_max;
535 if (add < 8)
536 add = 8;
537
538 nodes = realloc(rules->trie_nodes, (rules->trie_nodes_max + add) * sizeof(struct trie_node));
539 if (nodes == NULL)
540 return -1;
912541b0
KS
541 rules->trie_nodes = nodes;
542 rules->trie_nodes_max += add;
543 }
544
545 /* get a new node */
546 new_node_idx = rules->trie_nodes_cur;
547 rules->trie_nodes_cur++;
548 new_node = &rules->trie_nodes[new_node_idx];
549 memset(new_node, 0x00, sizeof(struct trie_node));
550 new_node->value_off = off;
551 new_node->value_len = len;
552 new_node->key = key;
553
554 /* join the parent's child list */
555 parent = &rules->trie_nodes[node_idx];
556 if (parent->child_idx == 0) {
557 parent->child_idx = new_node_idx;
558 } else {
559 struct trie_node *last_child;
560
561 last_child = &rules->trie_nodes[parent->last_child_idx];
562 last_child->next_child_idx = new_node_idx;
563 }
564 parent->last_child_idx = new_node_idx;
565 return off;
1449a55d
AJ
566}
567
568static int add_token(struct udev_rules *rules, struct token *token)
569{
912541b0
KS
570 /* grow buffer if needed */
571 if (rules->token_cur+1 >= rules->token_max) {
572 struct token *tokens;
573 unsigned int add;
574
575 /* double the buffer size */
576 add = rules->token_max;
577 if (add < 8)
578 add = 8;
579
580 tokens = realloc(rules->tokens, (rules->token_max + add ) * sizeof(struct token));
581 if (tokens == NULL)
582 return -1;
912541b0
KS
583 rules->tokens = tokens;
584 rules->token_max += add;
585 }
586 memcpy(&rules->tokens[rules->token_cur], token, sizeof(struct token));
587 rules->token_cur++;
588 return 0;
c7521974 589}
a27cd06c 590
154a7b84
KS
591static uid_t add_uid(struct udev_rules *rules, const char *owner)
592{
912541b0
KS
593 unsigned int i;
594 uid_t uid;
595 unsigned int off;
596
597 /* lookup, if we know it already */
598 for (i = 0; i < rules->uids_cur; i++) {
599 off = rules->uids[i].name_off;
33502ffe 600 if (streq(&rules->buf[off], owner)) {
912541b0 601 uid = rules->uids[i].uid;
912541b0
KS
602 return uid;
603 }
604 }
605 uid = util_lookup_user(rules->udev, owner);
606
607 /* grow buffer if needed */
608 if (rules->uids_cur+1 >= rules->uids_max) {
609 struct uid_gid *uids;
610 unsigned int add;
611
612 /* double the buffer size */
613 add = rules->uids_max;
614 if (add < 1)
615 add = 8;
616
617 uids = realloc(rules->uids, (rules->uids_max + add ) * sizeof(struct uid_gid));
618 if (uids == NULL)
619 return uid;
912541b0
KS
620 rules->uids = uids;
621 rules->uids_max += add;
622 }
623 rules->uids[rules->uids_cur].uid = uid;
624 off = add_string(rules, owner);
625 if (off <= 0)
626 return uid;
627 rules->uids[rules->uids_cur].name_off = off;
628 rules->uids_cur++;
629 return uid;
154a7b84
KS
630}
631
632static gid_t add_gid(struct udev_rules *rules, const char *group)
633{
912541b0
KS
634 unsigned int i;
635 gid_t gid;
636 unsigned int off;
637
638 /* lookup, if we know it already */
639 for (i = 0; i < rules->gids_cur; i++) {
640 off = rules->gids[i].name_off;
33502ffe 641 if (streq(&rules->buf[off], group)) {
912541b0 642 gid = rules->gids[i].gid;
912541b0
KS
643 return gid;
644 }
645 }
646 gid = util_lookup_group(rules->udev, group);
647
648 /* grow buffer if needed */
649 if (rules->gids_cur+1 >= rules->gids_max) {
650 struct uid_gid *gids;
651 unsigned int add;
652
653 /* double the buffer size */
654 add = rules->gids_max;
655 if (add < 1)
656 add = 8;
657
658 gids = realloc(rules->gids, (rules->gids_max + add ) * sizeof(struct uid_gid));
659 if (gids == NULL)
660 return gid;
912541b0
KS
661 rules->gids = gids;
662 rules->gids_max += add;
663 }
664 rules->gids[rules->gids_cur].gid = gid;
665 off = add_string(rules, group);
666 if (off <= 0)
667 return gid;
668 rules->gids[rules->gids_cur].name_off = off;
669 rules->gids_cur++;
670 return gid;
154a7b84
KS
671}
672
bb144ed1 673static int import_property_from_string(struct udev_device *dev, char *line)
bd0ed2ff 674{
912541b0
KS
675 char *key;
676 char *val;
677 size_t len;
678
679 /* find key */
680 key = line;
681 while (isspace(key[0]))
682 key++;
683
684 /* comment or empty line */
685 if (key[0] == '#' || key[0] == '\0')
686 return -1;
687
688 /* split key/value */
689 val = strchr(key, '=');
690 if (val == NULL)
691 return -1;
692 val[0] = '\0';
693 val++;
694
695 /* find value */
696 while (isspace(val[0]))
697 val++;
698
699 /* terminate key */
700 len = strlen(key);
701 if (len == 0)
702 return -1;
703 while (isspace(key[len-1]))
704 len--;
705 key[len] = '\0';
706
707 /* terminate value */
708 len = strlen(val);
709 if (len == 0)
710 return -1;
711 while (isspace(val[len-1]))
712 len--;
713 val[len] = '\0';
714
715 if (len == 0)
716 return -1;
717
718 /* unquote */
719 if (val[0] == '"' || val[0] == '\'') {
720 if (val[len-1] != val[0]) {
baa30fbc 721 log_debug("inconsistent quoting: '%s', skip\n", line);
912541b0
KS
722 return -1;
723 }
724 val[len-1] = '\0';
725 val++;
726 }
727
912541b0 728 /* handle device, renamed by external tool, returning new path */
33502ffe 729 if (streq(key, "DEVPATH")) {
912541b0
KS
730 char syspath[UTIL_PATH_SIZE];
731
baa30fbc
KS
732 log_debug("updating devpath from '%s' to '%s'\n",
733 udev_device_get_devpath(dev), val);
6ada823a 734 util_strscpyl(syspath, sizeof(syspath), "/sys", val, NULL);
912541b0
KS
735 udev_device_set_syspath(dev, syspath);
736 } else {
737 struct udev_list_entry *entry;
738
739 entry = udev_device_add_property(dev, key, val);
740 /* store in db, skip private keys */
741 if (key[0] != '.')
742 udev_list_entry_set_num(entry, true);
743 }
744 return 0;
be4bedd1
KS
745}
746
6880b25d 747static int import_file_into_properties(struct udev_device *dev, const char *filename)
be4bedd1 748{
912541b0
KS
749 FILE *f;
750 char line[UTIL_LINE_SIZE];
751
752 f = fopen(filename, "r");
753 if (f == NULL)
754 return -1;
755 while (fgets(line, sizeof(line), f) != NULL)
756 import_property_from_string(dev, line);
757 fclose(f);
758 return 0;
bd0ed2ff
KS
759}
760
2181d30a 761static int import_program_into_properties(struct udev_event *event, const char *program, const sigset_t *sigmask)
319c6700 762{
912541b0
KS
763 struct udev_device *dev = event->dev;
764 char **envp;
765 char result[UTIL_LINE_SIZE];
766 char *line;
767 int err;
768
769 envp = udev_device_get_properties_envp(dev);
770 err = udev_event_spawn(event, program, envp, sigmask, result, sizeof(result));
771 if (err < 0)
772 return err;
773
774 line = result;
775 while (line != NULL) {
776 char *pos;
777
778 pos = strchr(line, '\n');
779 if (pos != NULL) {
780 pos[0] = '\0';
781 pos = &pos[1];
782 }
783 import_property_from_string(dev, line);
784 line = pos;
785 }
786 return 0;
319c6700
KS
787}
788
6880b25d 789static int import_parent_into_properties(struct udev_device *dev, const char *filter)
0bfb84e1 790{
912541b0
KS
791 struct udev_device *dev_parent;
792 struct udev_list_entry *list_entry;
793
794 dev_parent = udev_device_get_parent(dev);
795 if (dev_parent == NULL)
796 return -1;
797
912541b0
KS
798 udev_list_entry_foreach(list_entry, udev_device_get_properties_list_entry(dev_parent)) {
799 const char *key = udev_list_entry_get_name(list_entry);
800 const char *val = udev_list_entry_get_value(list_entry);
801
802 if (fnmatch(filter, key, 0) == 0) {
803 struct udev_list_entry *entry;
804
912541b0
KS
805 entry = udev_device_add_property(dev, key, val);
806 /* store in db, skip private keys */
807 if (key[0] != '.')
808 udev_list_entry_set_num(entry, true);
809 }
810 }
811 return 0;
e2ecb34f
KS
812}
813
912541b0 814#define WAIT_LOOP_PER_SECOND 50
6880b25d 815static int wait_for_file(struct udev_device *dev, const char *file, int timeout)
b2fe4b9a 816{
912541b0
KS
817 char filepath[UTIL_PATH_SIZE];
818 char devicepath[UTIL_PATH_SIZE];
819 struct stat stats;
820 int loop = timeout * WAIT_LOOP_PER_SECOND;
821
822 /* a relative path is a device attribute */
823 devicepath[0] = '\0';
824 if (file[0] != '/') {
6ada823a 825 util_strscpyl(devicepath, sizeof(devicepath), udev_device_get_syspath(dev), NULL);
912541b0
KS
826 util_strscpyl(filepath, sizeof(filepath), devicepath, "/", file, NULL);
827 file = filepath;
828 }
829
912541b0
KS
830 while (--loop) {
831 const struct timespec duration = { 0, 1000 * 1000 * 1000 / WAIT_LOOP_PER_SECOND };
832
833 /* lookup file */
834 if (stat(file, &stats) == 0) {
baa30fbc 835 log_debug("file '%s' appeared after %i loops\n", file, (timeout * WAIT_LOOP_PER_SECOND) - loop-1);
912541b0
KS
836 return 0;
837 }
838 /* make sure, the device did not disappear in the meantime */
839 if (devicepath[0] != '\0' && stat(devicepath, &stats) != 0) {
baa30fbc 840 log_debug("device disappeared while waiting for '%s'\n", file);
912541b0
KS
841 return -2;
842 }
baa30fbc 843 log_debug("wait for '%s' for %i mseconds\n", file, 1000 / WAIT_LOOP_PER_SECOND);
912541b0
KS
844 nanosleep(&duration, NULL);
845 }
baa30fbc 846 log_debug("waiting for '%s' failed\n", file);
912541b0 847 return -1;
b2fe4b9a
KS
848}
849
0ea5e96e
KS
850static int attr_subst_subdir(char *attr, size_t len)
851{
912541b0
KS
852 bool found = false;
853
854 if (strstr(attr, "/*/")) {
855 char *pos;
856 char dirname[UTIL_PATH_SIZE];
857 const char *tail;
858 DIR *dir;
859
860 util_strscpy(dirname, sizeof(dirname), attr);
861 pos = strstr(dirname, "/*/");
862 if (pos == NULL)
863 return -1;
864 pos[0] = '\0';
865 tail = &pos[2];
866 dir = opendir(dirname);
867 if (dir != NULL) {
868 struct dirent *dent;
869
870 for (dent = readdir(dir); dent != NULL; dent = readdir(dir)) {
871 struct stat stats;
872
873 if (dent->d_name[0] == '.')
874 continue;
875 util_strscpyl(attr, len, dirname, "/", dent->d_name, tail, NULL);
876 if (stat(attr, &stats) == 0) {
877 found = true;
878 break;
879 }
880 }
881 closedir(dir);
882 }
883 }
884
885 return found;
0ea5e96e
KS
886}
887
b0f7409f 888static int get_key(struct udev *udev, char **line, char **key, enum operation_type *op, char **value)
a0e5382d 889{
912541b0
KS
890 char *linepos;
891 char *temp;
892
893 linepos = *line;
894 if (linepos == NULL || linepos[0] == '\0')
895 return -1;
896
897 /* skip whitespace */
898 while (isspace(linepos[0]) || linepos[0] == ',')
899 linepos++;
900
901 /* get the key */
902 if (linepos[0] == '\0')
903 return -1;
904 *key = linepos;
905
906 for (;;) {
907 linepos++;
908 if (linepos[0] == '\0')
909 return -1;
910 if (isspace(linepos[0]))
911 break;
912 if (linepos[0] == '=')
913 break;
914 if ((linepos[0] == '+') || (linepos[0] == '!') || (linepos[0] == ':'))
915 if (linepos[1] == '=')
916 break;
917 }
918
919 /* remember end of key */
920 temp = linepos;
921
922 /* skip whitespace after key */
923 while (isspace(linepos[0]))
924 linepos++;
925 if (linepos[0] == '\0')
926 return -1;
927
928 /* get operation type */
929 if (linepos[0] == '=' && linepos[1] == '=') {
930 *op = OP_MATCH;
931 linepos += 2;
932 } else if (linepos[0] == '!' && linepos[1] == '=') {
933 *op = OP_NOMATCH;
934 linepos += 2;
935 } else if (linepos[0] == '+' && linepos[1] == '=') {
936 *op = OP_ADD;
937 linepos += 2;
938 } else if (linepos[0] == '=') {
939 *op = OP_ASSIGN;
940 linepos++;
941 } else if (linepos[0] == ':' && linepos[1] == '=') {
942 *op = OP_ASSIGN_FINAL;
943 linepos += 2;
944 } else
945 return -1;
946
947 /* terminate key */
948 temp[0] = '\0';
949
950 /* skip whitespace after operator */
951 while (isspace(linepos[0]))
952 linepos++;
953 if (linepos[0] == '\0')
954 return -1;
955
956 /* get the value */
957 if (linepos[0] == '"')
958 linepos++;
959 else
960 return -1;
961 *value = linepos;
962
963 /* terminate */
964 temp = strchr(linepos, '"');
965 if (!temp)
966 return -1;
967 temp[0] = '\0';
968 temp++;
912541b0
KS
969
970 /* move line to next key */
971 *line = temp;
972 return 0;
6880b25d 973}
95776dc6 974
6880b25d 975/* extract possible KEY{attr} */
04a9d3a0 976static const char *get_key_attribute(struct udev *udev, char *str)
6880b25d 977{
912541b0
KS
978 char *pos;
979 char *attr;
980
981 attr = strchr(str, '{');
982 if (attr != NULL) {
983 attr++;
984 pos = strchr(attr, '}');
985 if (pos == NULL) {
baa30fbc 986 log_error("missing closing brace for format\n");
912541b0
KS
987 return NULL;
988 }
989 pos[0] = '\0';
912541b0
KS
990 return attr;
991 }
992 return NULL;
6880b25d 993}
95776dc6 994
0ef254d5 995static int rule_add_key(struct rule_tmp *rule_tmp, enum token_type type,
912541b0
KS
996 enum operation_type op,
997 const char *value, const void *data)
6880b25d 998{
912541b0
KS
999 struct token *token = &rule_tmp->token[rule_tmp->token_cur];
1000 const char *attr = NULL;
1001
1002 memset(token, 0x00, sizeof(struct token));
1003
1004 switch (type) {
1005 case TK_M_ACTION:
1006 case TK_M_DEVPATH:
1007 case TK_M_KERNEL:
1008 case TK_M_SUBSYSTEM:
1009 case TK_M_DRIVER:
1010 case TK_M_WAITFOR:
1011 case TK_M_DEVLINK:
1012 case TK_M_NAME:
1013 case TK_M_KERNELS:
1014 case TK_M_SUBSYSTEMS:
1015 case TK_M_DRIVERS:
1016 case TK_M_TAGS:
1017 case TK_M_PROGRAM:
1018 case TK_M_IMPORT_FILE:
1019 case TK_M_IMPORT_PROG:
1020 case TK_M_IMPORT_DB:
1021 case TK_M_IMPORT_CMDLINE:
1022 case TK_M_IMPORT_PARENT:
1023 case TK_M_RESULT:
1024 case TK_A_OWNER:
1025 case TK_A_GROUP:
1026 case TK_A_MODE:
1027 case TK_A_NAME:
1028 case TK_A_GOTO:
1029 case TK_M_TAG:
1030 case TK_A_TAG:
1031 token->key.value_off = add_string(rule_tmp->rules, value);
1032 break;
1033 case TK_M_IMPORT_BUILTIN:
1034 token->key.value_off = add_string(rule_tmp->rules, value);
1035 token->key.builtin_cmd = *(enum udev_builtin_cmd *)data;
1036 break;
1037 case TK_M_ENV:
1038 case TK_M_ATTR:
1039 case TK_M_ATTRS:
1040 case TK_A_ATTR:
1041 case TK_A_ENV:
1042 attr = data;
1043 token->key.value_off = add_string(rule_tmp->rules, value);
1044 token->key.attr_off = add_string(rule_tmp->rules, attr);
1045 break;
1046 case TK_A_DEVLINK:
1047 token->key.value_off = add_string(rule_tmp->rules, value);
1048 token->key.devlink_unique = *(int *)data;
1049 break;
1050 case TK_M_TEST:
1051 token->key.value_off = add_string(rule_tmp->rules, value);
1052 if (data != NULL)
1053 token->key.mode = *(mode_t *)data;
1054 break;
1055 case TK_A_STRING_ESCAPE_NONE:
1056 case TK_A_STRING_ESCAPE_REPLACE:
1057 case TK_A_DB_PERSIST:
1058 break;
83cd6b75 1059 case TK_A_RUN_BUILTIN:
83cd6b75 1060 case TK_A_RUN_PROGRAM:
4590cfe4 1061 token->key.builtin_cmd = *(enum udev_builtin_cmd *)data;
912541b0
KS
1062 token->key.value_off = add_string(rule_tmp->rules, value);
1063 break;
1064 case TK_A_INOTIFY_WATCH:
1065 case TK_A_DEVLINK_PRIO:
1066 token->key.devlink_prio = *(int *)data;
1067 break;
1068 case TK_A_OWNER_ID:
1069 token->key.uid = *(uid_t *)data;
1070 break;
1071 case TK_A_GROUP_ID:
1072 token->key.gid = *(gid_t *)data;
1073 break;
1074 case TK_A_MODE_ID:
1075 token->key.mode = *(mode_t *)data;
1076 break;
1077 case TK_A_STATIC_NODE:
1078 token->key.value_off = add_string(rule_tmp->rules, value);
1079 break;
1080 case TK_M_EVENT_TIMEOUT:
1081 token->key.event_timeout = *(int *)data;
1082 break;
1083 case TK_RULE:
1084 case TK_M_PARENTS_MIN:
1085 case TK_M_PARENTS_MAX:
1086 case TK_M_MAX:
1087 case TK_END:
1088 case TK_UNSET:
baa30fbc 1089 log_error("wrong type %u\n", type);
912541b0
KS
1090 return -1;
1091 }
1092
1093 if (value != NULL && type < TK_M_MAX) {
1094 /* check if we need to split or call fnmatch() while matching rules */
1095 enum string_glob_type glob;
1096 int has_split;
1097 int has_glob;
1098
1099 has_split = (strchr(value, '|') != NULL);
1100 has_glob = (strchr(value, '*') != NULL || strchr(value, '?') != NULL || strchr(value, '[') != NULL);
1101 if (has_split && has_glob) {
1102 glob = GL_SPLIT_GLOB;
1103 } else if (has_split) {
1104 glob = GL_SPLIT;
1105 } else if (has_glob) {
33502ffe 1106 if (streq(value, "?*"))
912541b0
KS
1107 glob = GL_SOMETHING;
1108 else
1109 glob = GL_GLOB;
1110 } else {
1111 glob = GL_PLAIN;
1112 }
1113 token->key.glob = glob;
1114 }
1115
1116 if (value != NULL && type > TK_M_MAX) {
1117 /* check if assigned value has substitution chars */
1118 if (value[0] == '[')
1119 token->key.subst = SB_SUBSYS;
1120 else if (strchr(value, '%') != NULL || strchr(value, '$') != NULL)
1121 token->key.subst = SB_FORMAT;
1122 else
1123 token->key.subst = SB_NONE;
1124 }
1125
1126 if (attr != NULL) {
1127 /* check if property/attribut name has substitution chars */
1128 if (attr[0] == '[')
1129 token->key.attrsubst = SB_SUBSYS;
1130 else if (strchr(attr, '%') != NULL || strchr(attr, '$') != NULL)
1131 token->key.attrsubst = SB_FORMAT;
1132 else
1133 token->key.attrsubst = SB_NONE;
1134 }
1135
1136 token->key.type = type;
1137 token->key.op = op;
1138 rule_tmp->token_cur++;
8fef0ff2 1139 if (rule_tmp->token_cur >= ELEMENTSOF(rule_tmp->token)) {
baa30fbc 1140 log_error("temporary rule array too small\n");
912541b0
KS
1141 return -1;
1142 }
1143 return 0;
6880b25d 1144}
e57e7bc1 1145
6880b25d
KS
1146static int sort_token(struct udev_rules *rules, struct rule_tmp *rule_tmp)
1147{
912541b0
KS
1148 unsigned int i;
1149 unsigned int start = 0;
1150 unsigned int end = rule_tmp->token_cur;
1151
1152 for (i = 0; i < rule_tmp->token_cur; i++) {
1153 enum token_type next_val = TK_UNSET;
1154 unsigned int next_idx = 0;
1155 unsigned int j;
1156
1157 /* find smallest value */
1158 for (j = start; j < end; j++) {
1159 if (rule_tmp->token[j].type == TK_UNSET)
1160 continue;
1161 if (next_val == TK_UNSET || rule_tmp->token[j].type < next_val) {
1162 next_val = rule_tmp->token[j].type;
1163 next_idx = j;
1164 }
1165 }
1166
1167 /* add token and mark done */
1168 if (add_token(rules, &rule_tmp->token[next_idx]) != 0)
1169 return -1;
1170 rule_tmp->token[next_idx].type = TK_UNSET;
1171
1172 /* shrink range */
1173 if (next_idx == start)
1174 start++;
1175 if (next_idx+1 == end)
1176 end--;
1177 }
1178 return 0;
724257d9
GKH
1179}
1180
6880b25d 1181static int add_rule(struct udev_rules *rules, char *line,
912541b0 1182 const char *filename, unsigned int filename_off, unsigned int lineno)
724257d9 1183{
912541b0 1184 char *linepos;
04a9d3a0 1185 const char *attr;
912541b0
KS
1186 struct rule_tmp rule_tmp;
1187
1188 memset(&rule_tmp, 0x00, sizeof(struct rule_tmp));
1189 rule_tmp.rules = rules;
1190 rule_tmp.rule.type = TK_RULE;
1191 rule_tmp.rule.rule.filename_off = filename_off;
1192 rule_tmp.rule.rule.filename_line = lineno;
1193
1194 linepos = line;
1195 for (;;) {
1196 char *key;
1197 char *value;
1198 enum operation_type op;
1199
1200 if (get_key(rules->udev, &linepos, &key, &op, &value) != 0)
1201 break;
1202
33502ffe 1203 if (streq(key, "ACTION")) {
912541b0 1204 if (op > OP_MATCH_MAX) {
baa30fbc 1205 log_error("invalid ACTION operation\n");
912541b0
KS
1206 goto invalid;
1207 }
1208 rule_add_key(&rule_tmp, TK_M_ACTION, op, value, NULL);
1209 continue;
1210 }
1211
33502ffe 1212 if (streq(key, "DEVPATH")) {
912541b0 1213 if (op > OP_MATCH_MAX) {
baa30fbc 1214 log_error("invalid DEVPATH operation\n");
912541b0
KS
1215 goto invalid;
1216 }
1217 rule_add_key(&rule_tmp, TK_M_DEVPATH, op, value, NULL);
1218 continue;
1219 }
1220
33502ffe 1221 if (streq(key, "KERNEL")) {
912541b0 1222 if (op > OP_MATCH_MAX) {
baa30fbc 1223 log_error("invalid KERNEL operation\n");
912541b0
KS
1224 goto invalid;
1225 }
1226 rule_add_key(&rule_tmp, TK_M_KERNEL, op, value, NULL);
1227 continue;
1228 }
1229
33502ffe 1230 if (streq(key, "SUBSYSTEM")) {
912541b0 1231 if (op > OP_MATCH_MAX) {
baa30fbc 1232 log_error("invalid SUBSYSTEM operation\n");
912541b0
KS
1233 goto invalid;
1234 }
1235 /* bus, class, subsystem events should all be the same */
33502ffe
KS
1236 if (streq(value, "subsystem") ||
1237 streq(value, "bus") ||
1238 streq(value, "class")) {
1239 if (streq(value, "bus") || streq(value, "class"))
baa30fbc 1240 log_error("'%s' must be specified as 'subsystem' \n"
912541b0
KS
1241 "please fix it in %s:%u", value, filename, lineno);
1242 rule_add_key(&rule_tmp, TK_M_SUBSYSTEM, op, "subsystem|class|bus", NULL);
1243 } else
1244 rule_add_key(&rule_tmp, TK_M_SUBSYSTEM, op, value, NULL);
1245 continue;
1246 }
1247
33502ffe 1248 if (streq(key, "DRIVER")) {
912541b0 1249 if (op > OP_MATCH_MAX) {
baa30fbc 1250 log_error("invalid DRIVER operation\n");
912541b0
KS
1251 goto invalid;
1252 }
1253 rule_add_key(&rule_tmp, TK_M_DRIVER, op, value, NULL);
1254 continue;
1255 }
1256
33502ffe 1257 if (startswith(key, "ATTR{")) {
912541b0
KS
1258 attr = get_key_attribute(rules->udev, key + sizeof("ATTR")-1);
1259 if (attr == NULL) {
baa30fbc 1260 log_error("error parsing ATTR attribute\n");
912541b0
KS
1261 goto invalid;
1262 }
1263 if (op < OP_MATCH_MAX) {
1264 rule_add_key(&rule_tmp, TK_M_ATTR, op, value, attr);
1265 } else {
1266 rule_add_key(&rule_tmp, TK_A_ATTR, op, value, attr);
1267 }
1268 continue;
1269 }
1270
33502ffe 1271 if (streq(key, "KERNELS")) {
912541b0 1272 if (op > OP_MATCH_MAX) {
baa30fbc 1273 log_error("invalid KERNELS operation\n");
912541b0
KS
1274 goto invalid;
1275 }
1276 rule_add_key(&rule_tmp, TK_M_KERNELS, op, value, NULL);
1277 continue;
1278 }
1279
33502ffe 1280 if (streq(key, "SUBSYSTEMS")) {
912541b0 1281 if (op > OP_MATCH_MAX) {
baa30fbc 1282 log_error("invalid SUBSYSTEMS operation\n");
912541b0
KS
1283 goto invalid;
1284 }
1285 rule_add_key(&rule_tmp, TK_M_SUBSYSTEMS, op, value, NULL);
1286 continue;
1287 }
1288
33502ffe 1289 if (streq(key, "DRIVERS")) {
912541b0 1290 if (op > OP_MATCH_MAX) {
baa30fbc 1291 log_error("invalid DRIVERS operation\n");
912541b0
KS
1292 goto invalid;
1293 }
1294 rule_add_key(&rule_tmp, TK_M_DRIVERS, op, value, NULL);
1295 continue;
1296 }
1297
33502ffe 1298 if (startswith(key, "ATTRS{")) {
912541b0 1299 if (op > OP_MATCH_MAX) {
baa30fbc 1300 log_error("invalid ATTRS operation\n");
912541b0
KS
1301 goto invalid;
1302 }
1303 attr = get_key_attribute(rules->udev, key + sizeof("ATTRS")-1);
1304 if (attr == NULL) {
baa30fbc 1305 log_error("error parsing ATTRS attribute\n");
912541b0
KS
1306 goto invalid;
1307 }
33502ffe 1308 if (startswith(attr, "device/"))
baa30fbc 1309 log_error("the 'device' link may not be available in a future kernel, "
912541b0
KS
1310 "please fix it in %s:%u", filename, lineno);
1311 else if (strstr(attr, "../") != NULL)
baa30fbc 1312 log_error("do not reference parent sysfs directories directly, "
912541b0
KS
1313 "it may break with a future kernel, please fix it in %s:%u", filename, lineno);
1314 rule_add_key(&rule_tmp, TK_M_ATTRS, op, value, attr);
1315 continue;
1316 }
1317
33502ffe 1318 if (streq(key, "TAGS")) {
912541b0 1319 if (op > OP_MATCH_MAX) {
baa30fbc 1320 log_error("invalid TAGS operation\n");
912541b0
KS
1321 goto invalid;
1322 }
1323 rule_add_key(&rule_tmp, TK_M_TAGS, op, value, NULL);
1324 continue;
1325 }
1326
33502ffe 1327 if (startswith(key, "ENV{")) {
912541b0
KS
1328 attr = get_key_attribute(rules->udev, key + sizeof("ENV")-1);
1329 if (attr == NULL) {
baa30fbc 1330 log_error("error parsing ENV attribute\n");
912541b0
KS
1331 goto invalid;
1332 }
1333 if (op < OP_MATCH_MAX) {
1334 if (rule_add_key(&rule_tmp, TK_M_ENV, op, value, attr) != 0)
1335 goto invalid;
1336 } else {
1337 static const char *blacklist[] = {
1338 "ACTION",
1339 "SUBSYSTEM",
1340 "DEVTYPE",
1341 "MAJOR",
1342 "MINOR",
1343 "DRIVER",
1344 "IFINDEX",
1345 "DEVNAME",
1346 "DEVLINKS",
1347 "DEVPATH",
1348 "TAGS",
1349 };
1350 unsigned int i;
1351
8fef0ff2 1352 for (i = 0; i < ELEMENTSOF(blacklist); i++)
33502ffe 1353 if (streq(attr, blacklist[i])) {
baa30fbc 1354 log_error("invalid ENV attribute, '%s' can not be set %s:%u\n", attr, filename, lineno);
912541b0
KS
1355 continue;
1356 }
1357 if (rule_add_key(&rule_tmp, TK_A_ENV, op, value, attr) != 0)
1358 goto invalid;
1359 }
1360 continue;
1361 }
1362
33502ffe 1363 if (streq(key, "TAG")) {
912541b0
KS
1364 if (op < OP_MATCH_MAX)
1365 rule_add_key(&rule_tmp, TK_M_TAG, op, value, NULL);
1366 else
1367 rule_add_key(&rule_tmp, TK_A_TAG, op, value, NULL);
1368 continue;
1369 }
1370
33502ffe 1371 if (streq(key, "PROGRAM")) {
912541b0
KS
1372 rule_add_key(&rule_tmp, TK_M_PROGRAM, op, value, NULL);
1373 continue;
1374 }
1375
33502ffe 1376 if (streq(key, "RESULT")) {
912541b0 1377 if (op > OP_MATCH_MAX) {
baa30fbc 1378 log_error("invalid RESULT operation\n");
912541b0
KS
1379 goto invalid;
1380 }
1381 rule_add_key(&rule_tmp, TK_M_RESULT, op, value, NULL);
1382 continue;
1383 }
1384
33502ffe 1385 if (startswith(key, "IMPORT")) {
912541b0
KS
1386 attr = get_key_attribute(rules->udev, key + sizeof("IMPORT")-1);
1387 if (attr == NULL) {
baa30fbc 1388 log_error("IMPORT{} type missing, ignoring IMPORT %s:%u\n", filename, lineno);
912541b0
KS
1389 continue;
1390 }
33502ffe 1391 if (streq(attr, "program")) {
912541b0
KS
1392 /* find known built-in command */
1393 if (value[0] != '/') {
1394 enum udev_builtin_cmd cmd;
1395
1396 cmd = udev_builtin_lookup(value);
1397 if (cmd < UDEV_BUILTIN_MAX) {
baa30fbc
KS
1398 log_debug("IMPORT found builtin '%s', replacing %s:%u\n",
1399 value, filename, lineno);
912541b0
KS
1400 rule_add_key(&rule_tmp, TK_M_IMPORT_BUILTIN, op, value, &cmd);
1401 continue;
1402 }
1403 }
912541b0 1404 rule_add_key(&rule_tmp, TK_M_IMPORT_PROG, op, value, NULL);
33502ffe 1405 } else if (streq(attr, "builtin")) {
912541b0
KS
1406 enum udev_builtin_cmd cmd = udev_builtin_lookup(value);
1407
912541b0
KS
1408 if (cmd < UDEV_BUILTIN_MAX)
1409 rule_add_key(&rule_tmp, TK_M_IMPORT_BUILTIN, op, value, &cmd);
1410 else
baa30fbc 1411 log_error("IMPORT{builtin}: '%s' unknown %s:%u\n", value, filename, lineno);
33502ffe 1412 } else if (streq(attr, "file")) {
912541b0 1413 rule_add_key(&rule_tmp, TK_M_IMPORT_FILE, op, value, NULL);
33502ffe 1414 } else if (streq(attr, "db")) {
912541b0 1415 rule_add_key(&rule_tmp, TK_M_IMPORT_DB, op, value, NULL);
33502ffe 1416 } else if (streq(attr, "cmdline")) {
912541b0 1417 rule_add_key(&rule_tmp, TK_M_IMPORT_CMDLINE, op, value, NULL);
33502ffe 1418 } else if (streq(attr, "parent")) {
912541b0 1419 rule_add_key(&rule_tmp, TK_M_IMPORT_PARENT, op, value, NULL);
83cd6b75
KS
1420 } else
1421 log_error("IMPORT{} unknown type, ignoring IMPORT %s:%u\n", filename, lineno);
912541b0
KS
1422 continue;
1423 }
1424
33502ffe 1425 if (startswith(key, "TEST")) {
912541b0
KS
1426 mode_t mode = 0;
1427
1428 if (op > OP_MATCH_MAX) {
baa30fbc 1429 log_error("invalid TEST operation\n");
912541b0
KS
1430 goto invalid;
1431 }
1432 attr = get_key_attribute(rules->udev, key + sizeof("TEST")-1);
1433 if (attr != NULL) {
1434 mode = strtol(attr, NULL, 8);
1435 rule_add_key(&rule_tmp, TK_M_TEST, op, value, &mode);
1436 } else {
1437 rule_add_key(&rule_tmp, TK_M_TEST, op, value, NULL);
1438 }
1439 continue;
1440 }
1441
33502ffe 1442 if (startswith(key, "RUN")) {
83cd6b75
KS
1443 attr = get_key_attribute(rules->udev, key + sizeof("RUN")-1);
1444 if (attr == NULL)
1445 attr = "program";
1446
33502ffe 1447 if (streq(attr, "builtin")) {
83cd6b75
KS
1448 enum udev_builtin_cmd cmd = udev_builtin_lookup(value);
1449
1450 if (cmd < UDEV_BUILTIN_MAX)
1451 rule_add_key(&rule_tmp, TK_A_RUN_BUILTIN, op, value, &cmd);
1452 else
1453 log_error("IMPORT{builtin}: '%s' unknown %s:%u\n", value, filename, lineno);
33502ffe 1454 } else if (streq(attr, "program")) {
83cd6b75
KS
1455 enum udev_builtin_cmd cmd = UDEV_BUILTIN_MAX;
1456
83cd6b75
KS
1457 rule_add_key(&rule_tmp, TK_A_RUN_PROGRAM, op, value, &cmd);
1458 } else {
1459 log_error("RUN{} unknown type, ignoring RUN %s:%u\n", filename, lineno);
1460 }
1461
912541b0
KS
1462 continue;
1463 }
1464
33502ffe 1465 if (streq(key, "WAIT_FOR") || streq(key, "WAIT_FOR_SYSFS")) {
912541b0
KS
1466 rule_add_key(&rule_tmp, TK_M_WAITFOR, 0, value, NULL);
1467 continue;
1468 }
1469
33502ffe 1470 if (streq(key, "LABEL")) {
912541b0
KS
1471 rule_tmp.rule.rule.label_off = add_string(rules, value);
1472 continue;
1473 }
1474
33502ffe 1475 if (streq(key, "GOTO")) {
912541b0
KS
1476 rule_add_key(&rule_tmp, TK_A_GOTO, 0, value, NULL);
1477 continue;
1478 }
1479
33502ffe 1480 if (startswith(key, "NAME")) {
912541b0
KS
1481 if (op < OP_MATCH_MAX) {
1482 rule_add_key(&rule_tmp, TK_M_NAME, op, value, NULL);
1483 } else {
33502ffe 1484 if (streq(value, "%k")) {
baa30fbc 1485 log_error("NAME=\"%%k\" is ignored, because it breaks kernel supplied names, "
912541b0
KS
1486 "please remove it from %s:%u\n", filename, lineno);
1487 continue;
1488 }
1489 if (value[0] == '\0') {
baa30fbc
KS
1490 log_debug("NAME=\"\" is ignored, because udev will not delete any device nodes, "
1491 "please remove it from %s:%u\n", filename, lineno);
912541b0
KS
1492 continue;
1493 }
1494 rule_add_key(&rule_tmp, TK_A_NAME, op, value, NULL);
1495 }
1496 rule_tmp.rule.rule.can_set_name = true;
1497 continue;
1498 }
1499
33502ffe 1500 if (startswith(key, "SYMLINK")) {
912541b0
KS
1501 if (op < OP_MATCH_MAX) {
1502 rule_add_key(&rule_tmp, TK_M_DEVLINK, op, value, NULL);
1503 } else {
1504 int flag = 0;
1505
1506 attr = get_key_attribute(rules->udev, key + sizeof("SYMLINK")-1);
1507 if (attr != NULL && strstr(attr, "unique") != NULL)
1508 flag = 1;
1509 rule_add_key(&rule_tmp, TK_A_DEVLINK, op, value, &flag);
1510 }
1511 rule_tmp.rule.rule.can_set_name = true;
1512 continue;
1513 }
1514
33502ffe 1515 if (streq(key, "OWNER")) {
912541b0
KS
1516 uid_t uid;
1517 char *endptr;
1518
1519 uid = strtoul(value, &endptr, 10);
1520 if (endptr[0] == '\0') {
1521 rule_add_key(&rule_tmp, TK_A_OWNER_ID, op, NULL, &uid);
1522 } else if ((rules->resolve_names > 0) && strchr("$%", value[0]) == NULL) {
1523 uid = add_uid(rules, value);
1524 rule_add_key(&rule_tmp, TK_A_OWNER_ID, op, NULL, &uid);
1525 } else if (rules->resolve_names >= 0) {
1526 rule_add_key(&rule_tmp, TK_A_OWNER, op, value, NULL);
1527 }
1528 rule_tmp.rule.rule.can_set_name = true;
1529 continue;
1530 }
1531
33502ffe 1532 if (streq(key, "GROUP")) {
912541b0
KS
1533 gid_t gid;
1534 char *endptr;
1535
1536 gid = strtoul(value, &endptr, 10);
1537 if (endptr[0] == '\0') {
1538 rule_add_key(&rule_tmp, TK_A_GROUP_ID, op, NULL, &gid);
1539 } else if ((rules->resolve_names > 0) && strchr("$%", value[0]) == NULL) {
1540 gid = add_gid(rules, value);
1541 rule_add_key(&rule_tmp, TK_A_GROUP_ID, op, NULL, &gid);
1542 } else if (rules->resolve_names >= 0) {
1543 rule_add_key(&rule_tmp, TK_A_GROUP, op, value, NULL);
1544 }
1545 rule_tmp.rule.rule.can_set_name = true;
1546 continue;
1547 }
1548
33502ffe 1549 if (streq(key, "MODE")) {
912541b0
KS
1550 mode_t mode;
1551 char *endptr;
1552
1553 mode = strtol(value, &endptr, 8);
1554 if (endptr[0] == '\0')
1555 rule_add_key(&rule_tmp, TK_A_MODE_ID, op, NULL, &mode);
1556 else
1557 rule_add_key(&rule_tmp, TK_A_MODE, op, value, NULL);
1558 rule_tmp.rule.rule.can_set_name = true;
1559 continue;
1560 }
1561
33502ffe 1562 if (streq(key, "OPTIONS")) {
912541b0
KS
1563 const char *pos;
1564
1565 pos = strstr(value, "link_priority=");
1566 if (pos != NULL) {
1567 int prio = atoi(&pos[strlen("link_priority=")]);
1568
1569 rule_add_key(&rule_tmp, TK_A_DEVLINK_PRIO, op, NULL, &prio);
912541b0
KS
1570 }
1571
1572 pos = strstr(value, "event_timeout=");
1573 if (pos != NULL) {
1574 int tout = atoi(&pos[strlen("event_timeout=")]);
1575
1576 rule_add_key(&rule_tmp, TK_M_EVENT_TIMEOUT, op, NULL, &tout);
912541b0
KS
1577 }
1578
1579 pos = strstr(value, "string_escape=");
1580 if (pos != NULL) {
1581 pos = &pos[strlen("string_escape=")];
33502ffe 1582 if (startswith(pos, "none"))
912541b0 1583 rule_add_key(&rule_tmp, TK_A_STRING_ESCAPE_NONE, op, NULL, NULL);
33502ffe 1584 else if (startswith(pos, "replace"))
912541b0
KS
1585 rule_add_key(&rule_tmp, TK_A_STRING_ESCAPE_REPLACE, op, NULL, NULL);
1586 }
1587
1588 pos = strstr(value, "db_persist");
1589 if (pos != NULL)
1590 rule_add_key(&rule_tmp, TK_A_DB_PERSIST, op, NULL, NULL);
1591
1592 pos = strstr(value, "nowatch");
1593 if (pos != NULL) {
1594 const int off = 0;
1595
1596 rule_add_key(&rule_tmp, TK_A_INOTIFY_WATCH, op, NULL, &off);
912541b0
KS
1597 } else {
1598 pos = strstr(value, "watch");
1599 if (pos != NULL) {
1600 const int on = 1;
1601
1602 rule_add_key(&rule_tmp, TK_A_INOTIFY_WATCH, op, NULL, &on);
912541b0
KS
1603 }
1604 }
1605
1606 pos = strstr(value, "static_node=");
1607 if (pos != NULL) {
1608 rule_add_key(&rule_tmp, TK_A_STATIC_NODE, op, &pos[strlen("static_node=")], NULL);
1609 rule_tmp.rule.rule.has_static_node = true;
1610 }
1611
1612 continue;
1613 }
1614
baa30fbc 1615 log_error("unknown key '%s' in %s:%u\n", key, filename, lineno);
912541b0
KS
1616 goto invalid;
1617 }
1618
1619 /* add rule token */
1620 rule_tmp.rule.rule.token_count = 1 + rule_tmp.token_cur;
1621 if (add_token(rules, &rule_tmp.rule) != 0)
1622 goto invalid;
1623
1624 /* add tokens to list, sorted by type */
1625 if (sort_token(rules, &rule_tmp) != 0)
1626 goto invalid;
1627
1628 return 0;
c7521974 1629invalid:
baa30fbc 1630 log_error("invalid rule '%s:%u'\n", filename, lineno);
912541b0 1631 return -1;
c7521974
KS
1632}
1633
0ef254d5 1634static int parse_file(struct udev_rules *rules, const char *filename, unsigned short filename_off)
c7521974 1635{
912541b0
KS
1636 FILE *f;
1637 unsigned int first_token;
1638 char line[UTIL_LINE_SIZE];
1639 int line_nr = 0;
1640 unsigned int i;
1641
baa30fbc 1642 log_debug("reading '%s' as rules file\n", filename);
912541b0
KS
1643
1644 f = fopen(filename, "r");
1645 if (f == NULL)
1646 return -1;
1647
1648 first_token = rules->token_cur;
1649
1650 while (fgets(line, sizeof(line), f) != NULL) {
1651 char *key;
1652 size_t len;
1653
1654 /* skip whitespace */
1655 line_nr++;
1656 key = line;
1657 while (isspace(key[0]))
1658 key++;
1659
1660 /* comment */
1661 if (key[0] == '#')
1662 continue;
1663
1664 len = strlen(line);
1665 if (len < 3)
1666 continue;
1667
1668 /* continue reading if backslash+newline is found */
1669 while (line[len-2] == '\\') {
1670 if (fgets(&line[len-2], (sizeof(line)-len)+2, f) == NULL)
1671 break;
1672 if (strlen(&line[len-2]) < 2)
1673 break;
1674 line_nr++;
1675 len = strlen(line);
1676 }
1677
1678 if (len+1 >= sizeof(line)) {
baa30fbc 1679 log_error("line too long '%s':%u, ignored\n", filename, line_nr);
912541b0
KS
1680 continue;
1681 }
1682 add_rule(rules, key, filename, filename_off, line_nr);
1683 }
1684 fclose(f);
1685
1686 /* link GOTOs to LABEL rules in this file to be able to fast-forward */
1687 for (i = first_token+1; i < rules->token_cur; i++) {
1688 if (rules->tokens[i].type == TK_A_GOTO) {
1689 char *label = &rules->buf[rules->tokens[i].key.value_off];
1690 unsigned int j;
1691
1692 for (j = i+1; j < rules->token_cur; j++) {
1693 if (rules->tokens[j].type != TK_RULE)
1694 continue;
1695 if (rules->tokens[j].rule.label_off == 0)
1696 continue;
33502ffe 1697 if (!streq(label, &rules->buf[rules->tokens[j].rule.label_off]))
912541b0
KS
1698 continue;
1699 rules->tokens[i].key.rule_goto = j;
1700 break;
1701 }
1702 if (rules->tokens[i].key.rule_goto == 0)
baa30fbc 1703 log_error("GOTO '%s' has no matching label in: '%s'\n", label, filename);
912541b0
KS
1704 }
1705 }
1706 return 0;
c7521974
KS
1707}
1708
869c9031 1709static int add_matching_files(struct udev *udev, struct udev_list *file_list, const char *dirname, const char *suffix)
c7521974 1710{
912541b0
KS
1711 DIR *dir;
1712 struct dirent *dent;
1713 char filename[UTIL_PATH_SIZE];
1714
912541b0
KS
1715 dir = opendir(dirname);
1716 if (dir == NULL) {
baa30fbc 1717 log_debug("unable to open '%s': %m\n", dirname);
912541b0
KS
1718 return -1;
1719 }
1720
1721 for (dent = readdir(dir); dent != NULL; dent = readdir(dir)) {
1722 if (dent->d_name[0] == '.')
1723 continue;
1724
1725 /* look for file matching with specified suffix */
1726 if (suffix != NULL) {
1727 const char *ext;
1728
1729 ext = strrchr(dent->d_name, '.');
1730 if (ext == NULL)
1731 continue;
33502ffe 1732 if (!streq(ext, suffix))
912541b0
KS
1733 continue;
1734 }
1735 util_strscpyl(filename, sizeof(filename), dirname, "/", dent->d_name, NULL);
912541b0
KS
1736 /*
1737 * the basename is the key, the filename the value
91418155 1738 * identical basenames from different directories override each other
912541b0
KS
1739 * entries are sorted after basename
1740 */
1741 udev_list_entry_add(file_list, dent->d_name, filename);
1742 }
1743
1744 closedir(dir);
1745 return 0;
c7521974
KS
1746}
1747
d7ddce18 1748struct udev_rules *udev_rules_new(struct udev *udev, int resolve_names)
c7521974 1749{
912541b0
KS
1750 struct udev_rules *rules;
1751 struct udev_list file_list;
1752 struct udev_list_entry *file_loop;
1753 struct token end_token;
6ada823a 1754 unsigned int i;
912541b0
KS
1755
1756 rules = calloc(1, sizeof(struct udev_rules));
1757 if (rules == NULL)
1758 return NULL;
1759 rules->udev = udev;
1760 rules->resolve_names = resolve_names;
1761 udev_list_init(udev, &file_list, true);
1762
1763 /* init token array and string buffer */
1764 rules->tokens = malloc(PREALLOC_TOKEN * sizeof(struct token));
1765 if (rules->tokens == NULL) {
1766 free(rules);
1767 return NULL;
1768 }
1769 rules->token_max = PREALLOC_TOKEN;
1770
1771 rules->buf = malloc(PREALLOC_STRBUF);
1772 if (rules->buf == NULL) {
1773 free(rules->tokens);
1774 free(rules);
1775 return NULL;
1776 }
1777 rules->buf_max = PREALLOC_STRBUF;
1778 /* offset 0 is always '\0' */
1779 rules->buf[0] = '\0';
1780 rules->buf_cur = 1;
912541b0
KS
1781
1782 rules->trie_nodes = malloc(PREALLOC_TRIE * sizeof(struct trie_node));
1783 if (rules->trie_nodes == NULL) {
1784 free(rules->buf);
1785 free(rules->tokens);
1786 free(rules);
1787 return NULL;
1788 }
1789 rules->trie_nodes_max = PREALLOC_TRIE;
1790 /* offset 0 is the trie root, with an empty string */
1791 memset(rules->trie_nodes, 0x00, sizeof(struct trie_node));
1792 rules->trie_nodes_cur = 1;
1793
6ada823a
KS
1794 for (i = 0; i < ELEMENTSOF(rules_dirs); i++)
1795 add_matching_files(udev, &file_list, rules_dirs[i], ".rules");
912541b0
KS
1796
1797 /* add all filenames to the string buffer */
1798 udev_list_entry_foreach(file_loop, udev_list_get_entry(&file_list)) {
1799 const char *filename = udev_list_entry_get_value(file_loop);
1800 unsigned int filename_off;
1801
1802 filename_off = add_string(rules, filename);
1803 /* the offset in the rule is limited to unsigned short */
1804 if (filename_off < USHRT_MAX)
1805 udev_list_entry_set_num(file_loop, filename_off);
1806 }
1807
1808 /* parse all rules files */
1809 udev_list_entry_foreach(file_loop, udev_list_get_entry(&file_list)) {
1810 const char *filename = udev_list_entry_get_value(file_loop);
1811 unsigned int filename_off = udev_list_entry_get_num(file_loop);
1812 struct stat st;
1813
1814 if (stat(filename, &st) != 0) {
baa30fbc 1815 log_error("can not find '%s': %m\n", filename);
912541b0
KS
1816 continue;
1817 }
1818 if (S_ISREG(st.st_mode) && st.st_size <= 0) {
baa30fbc 1819 log_debug("ignore empty '%s'\n", filename);
912541b0
KS
1820 continue;
1821 }
1822 if (S_ISCHR(st.st_mode)) {
baa30fbc 1823 log_debug("ignore masked '%s'\n", filename);
912541b0
KS
1824 continue;
1825 }
1826 parse_file(rules, filename, filename_off);
1827 }
1828 udev_list_cleanup(&file_list);
1829
1830 memset(&end_token, 0x00, sizeof(struct token));
1831 end_token.type = TK_END;
1832 add_token(rules, &end_token);
1833
1834 /* shrink allocated token and string buffer */
1835 if (rules->token_cur < rules->token_max) {
1836 struct token *tokens;
1837
1838 tokens = realloc(rules->tokens, rules->token_cur * sizeof(struct token));
1839 if (tokens != NULL || rules->token_cur == 0) {
1840 rules->tokens = tokens;
1841 rules->token_max = rules->token_cur;
1842 }
1843 }
1844 if (rules->buf_cur < rules->buf_max) {
1845 char *buf;
1846
1847 buf = realloc(rules->buf, rules->buf_cur);
1848 if (buf != NULL || rules->buf_cur == 0) {
1849 rules->buf = buf;
1850 rules->buf_max = rules->buf_cur;
1851 }
1852 }
baa30fbc
KS
1853 log_debug("rules use %zu bytes tokens (%u * %zu bytes), %zu bytes buffer\n",
1854 rules->token_max * sizeof(struct token), rules->token_max, sizeof(struct token), rules->buf_max);
1855 log_debug("temporary index used %zu bytes (%u * %zu bytes)\n",
1856 rules->trie_nodes_cur * sizeof(struct trie_node),
1857 rules->trie_nodes_cur, sizeof(struct trie_node));
912541b0
KS
1858
1859 /* cleanup trie */
1860 free(rules->trie_nodes);
1861 rules->trie_nodes = NULL;
1862 rules->trie_nodes_cur = 0;
1863 rules->trie_nodes_max = 0;
1864
1865 /* cleanup uid/gid cache */
1866 free(rules->uids);
1867 rules->uids = NULL;
1868 rules->uids_cur = 0;
1869 rules->uids_max = 0;
1870 free(rules->gids);
1871 rules->gids = NULL;
1872 rules->gids_cur = 0;
1873 rules->gids_max = 0;
1874
1875 dump_rules(rules);
1876 return rules;
c7521974
KS
1877}
1878
7c85d636 1879struct udev_rules *udev_rules_unref(struct udev_rules *rules)
c7521974 1880{
912541b0
KS
1881 if (rules == NULL)
1882 return NULL;
1883 free(rules->tokens);
1884 free(rules->buf);
1885 free(rules->trie_nodes);
1886 free(rules->uids);
1887 free(rules->gids);
1888 free(rules);
1889 return NULL;
c7521974 1890}
6880b25d 1891
6ada823a
KS
1892bool udev_rules_check_timestamp(struct udev_rules *rules)
1893{
1894 unsigned int i;
1895 bool changed = false;
1896
1897 for (i = 0; i < ELEMENTSOF(rules_dirs); i++) {
1898 struct stat stats;
1899
1900 if (stat(rules_dirs[i], &stats) < 0)
1901 continue;
1902
1903 if (rules->dirs_ts_usec[i] == ts_usec(&stats.st_mtim))
1904 continue;
1905
1906 /* first check */
1907 if (rules->dirs_ts_usec[i] != 0) {
1908 log_debug("reload - timestamp of '%s' changed\n", rules_dirs[i]);
1909 changed = true;
1910 }
1911
1912 /* update timestamp */
1913 rules->dirs_ts_usec[i] = ts_usec(&stats.st_mtim);
1914 }
1915
1916 return changed;
1917}
1918
6880b25d
KS
1919static int match_key(struct udev_rules *rules, struct token *token, const char *val)
1920{
912541b0
KS
1921 char *key_value = &rules->buf[token->key.value_off];
1922 char *pos;
1923 bool match = false;
1924
1925 if (val == NULL)
1926 val = "";
1927
1928 switch (token->key.glob) {
1929 case GL_PLAIN:
33502ffe 1930 match = (streq(key_value, val));
912541b0
KS
1931 break;
1932 case GL_GLOB:
1933 match = (fnmatch(key_value, val, 0) == 0);
1934 break;
1935 case GL_SPLIT:
1936 {
33502ffe 1937 const char *s;
912541b0
KS
1938 size_t len;
1939
33502ffe 1940 s = &rules->buf[token->key.value_off];
912541b0
KS
1941 len = strlen(val);
1942 for (;;) {
1943 const char *next;
1944
33502ffe 1945 next = strchr(s, '|');
912541b0 1946 if (next != NULL) {
33502ffe 1947 size_t matchlen = (size_t)(next - s);
912541b0 1948
33502ffe 1949 match = (matchlen == len && strncmp(s, val, matchlen) == 0);
912541b0
KS
1950 if (match)
1951 break;
1952 } else {
33502ffe 1953 match = (streq(s, val));
912541b0
KS
1954 break;
1955 }
33502ffe 1956 s = &next[1];
912541b0
KS
1957 }
1958 break;
1959 }
1960 case GL_SPLIT_GLOB:
1961 {
1962 char value[UTIL_PATH_SIZE];
1963
1964 util_strscpy(value, sizeof(value), &rules->buf[token->key.value_off]);
1965 key_value = value;
1966 while (key_value != NULL) {
1967 pos = strchr(key_value, '|');
1968 if (pos != NULL) {
1969 pos[0] = '\0';
1970 pos = &pos[1];
1971 }
912541b0
KS
1972 match = (fnmatch(key_value, val, 0) == 0);
1973 if (match)
1974 break;
1975 key_value = pos;
1976 }
1977 break;
1978 }
1979 case GL_SOMETHING:
1980 match = (val[0] != '\0');
1981 break;
1982 case GL_UNSET:
1983 return -1;
1984 }
1985
baa30fbc 1986 if (match && (token->key.op == OP_MATCH))
912541b0 1987 return 0;
baa30fbc 1988 if (!match && (token->key.op == OP_NOMATCH))
912541b0 1989 return 0;
912541b0 1990 return -1;
6880b25d
KS
1991}
1992
1993static int match_attr(struct udev_rules *rules, struct udev_device *dev, struct udev_event *event, struct token *cur)
1994{
912541b0
KS
1995 const char *name;
1996 char nbuf[UTIL_NAME_SIZE];
1997 const char *value;
1998 char vbuf[UTIL_NAME_SIZE];
1999 size_t len;
2000
2001 name = &rules->buf[cur->key.attr_off];
2002 switch (cur->key.attrsubst) {
2003 case SB_FORMAT:
2004 udev_event_apply_format(event, name, nbuf, sizeof(nbuf));
2005 name = nbuf;
2006 /* fall through */
2007 case SB_NONE:
2008 value = udev_device_get_sysattr_value(dev, name);
2009 if (value == NULL)
2010 return -1;
2011 break;
2012 case SB_SUBSYS:
2013 if (util_resolve_subsys_kernel(event->udev, name, vbuf, sizeof(vbuf), 1) != 0)
2014 return -1;
2015 value = vbuf;
2016 break;
2017 default:
2018 return -1;
2019 }
2020
2021 /* remove trailing whitespace, if not asked to match for it */
2022 len = strlen(value);
2023 if (len > 0 && isspace(value[len-1])) {
2024 const char *key_value;
2025 size_t klen;
2026
2027 key_value = &rules->buf[cur->key.value_off];
2028 klen = strlen(key_value);
2029 if (klen > 0 && !isspace(key_value[klen-1])) {
2030 if (value != vbuf) {
2031 util_strscpy(vbuf, sizeof(vbuf), value);
2032 value = vbuf;
2033 }
2034 while (len > 0 && isspace(vbuf[--len]))
2035 vbuf[len] = '\0';
912541b0
KS
2036 }
2037 }
2038
2039 return match_key(rules, cur, value);
6880b25d
KS
2040}
2041
2042enum escape_type {
912541b0
KS
2043 ESCAPE_UNSET,
2044 ESCAPE_NONE,
2045 ESCAPE_REPLACE,
6880b25d
KS
2046};
2047
2181d30a 2048int udev_rules_apply_to_event(struct udev_rules *rules, struct udev_event *event, const sigset_t *sigmask)
6880b25d 2049{
912541b0
KS
2050 struct token *cur;
2051 struct token *rule;
2052 enum escape_type esc = ESCAPE_UNSET;
2053 bool can_set_name;
2054
2055 if (rules->tokens == NULL)
2056 return -1;
2057
33502ffe 2058 can_set_name = ((!streq(udev_device_get_action(event->dev), "remove")) &&
912541b0
KS
2059 (major(udev_device_get_devnum(event->dev)) > 0 ||
2060 udev_device_get_ifindex(event->dev) > 0));
2061
2062 /* loop through token list, match, run actions or forward to next rule */
2063 cur = &rules->tokens[0];
2064 rule = cur;
2065 for (;;) {
2066 dump_token(rules, cur);
2067 switch (cur->type) {
2068 case TK_RULE:
2069 /* current rule */
2070 rule = cur;
2071 /* possibly skip rules which want to set NAME, SYMLINK, OWNER, GROUP, MODE */
2072 if (!can_set_name && rule->rule.can_set_name)
2073 goto nomatch;
2074 esc = ESCAPE_UNSET;
2075 break;
2076 case TK_M_ACTION:
2077 if (match_key(rules, cur, udev_device_get_action(event->dev)) != 0)
2078 goto nomatch;
2079 break;
2080 case TK_M_DEVPATH:
2081 if (match_key(rules, cur, udev_device_get_devpath(event->dev)) != 0)
2082 goto nomatch;
2083 break;
2084 case TK_M_KERNEL:
2085 if (match_key(rules, cur, udev_device_get_sysname(event->dev)) != 0)
2086 goto nomatch;
2087 break;
2088 case TK_M_DEVLINK: {
912541b0
KS
2089 struct udev_list_entry *list_entry;
2090 bool match = false;
2091
2092 udev_list_entry_foreach(list_entry, udev_device_get_devlinks_list_entry(event->dev)) {
2093 const char *devlink;
2094
6ada823a 2095 devlink = udev_list_entry_get_name(list_entry) + strlen(TEST_PREFIX "/dev/");
912541b0
KS
2096 if (match_key(rules, cur, devlink) == 0) {
2097 match = true;
2098 break;
2099 }
2100 }
2101 if (!match)
2102 goto nomatch;
2103 break;
2104 }
2105 case TK_M_NAME:
2106 if (match_key(rules, cur, event->name) != 0)
2107 goto nomatch;
2108 break;
2109 case TK_M_ENV: {
2110 const char *key_name = &rules->buf[cur->key.attr_off];
2111 const char *value;
2112
2113 value = udev_device_get_property_value(event->dev, key_name);
baa30fbc 2114 if (value == NULL)
912541b0 2115 value = "";
912541b0
KS
2116 if (match_key(rules, cur, value))
2117 goto nomatch;
2118 break;
2119 }
2120 case TK_M_TAG: {
2121 struct udev_list_entry *list_entry;
2122 bool match = false;
2123
2124 udev_list_entry_foreach(list_entry, udev_device_get_tags_list_entry(event->dev)) {
33502ffe 2125 if (streq(&rules->buf[cur->key.value_off], udev_list_entry_get_name(list_entry))) {
912541b0
KS
2126 match = true;
2127 break;
2128 }
2129 }
2130 if (!match && (cur->key.op != OP_NOMATCH))
2131 goto nomatch;
2132 break;
2133 }
2134 case TK_M_SUBSYSTEM:
2135 if (match_key(rules, cur, udev_device_get_subsystem(event->dev)) != 0)
2136 goto nomatch;
2137 break;
2138 case TK_M_DRIVER:
2139 if (match_key(rules, cur, udev_device_get_driver(event->dev)) != 0)
2140 goto nomatch;
2141 break;
2142 case TK_M_WAITFOR: {
2143 char filename[UTIL_PATH_SIZE];
2144 int found;
2145
2146 udev_event_apply_format(event, &rules->buf[cur->key.value_off], filename, sizeof(filename));
2147 found = (wait_for_file(event->dev, filename, 10) == 0);
2148 if (!found && (cur->key.op != OP_NOMATCH))
2149 goto nomatch;
2150 break;
2151 }
2152 case TK_M_ATTR:
2153 if (match_attr(rules, event->dev, event, cur) != 0)
2154 goto nomatch;
2155 break;
2156 case TK_M_KERNELS:
2157 case TK_M_SUBSYSTEMS:
2158 case TK_M_DRIVERS:
2159 case TK_M_ATTRS:
2160 case TK_M_TAGS: {
2161 struct token *next;
2162
2163 /* get whole sequence of parent matches */
2164 next = cur;
2165 while (next->type > TK_M_PARENTS_MIN && next->type < TK_M_PARENTS_MAX)
2166 next++;
2167
2168 /* loop over parents */
2169 event->dev_parent = event->dev;
2170 for (;;) {
2171 struct token *key;
2172
912541b0
KS
2173 /* loop over sequence of parent match keys */
2174 for (key = cur; key < next; key++ ) {
2175 dump_token(rules, key);
2176 switch(key->type) {
2177 case TK_M_KERNELS:
2178 if (match_key(rules, key, udev_device_get_sysname(event->dev_parent)) != 0)
2179 goto try_parent;
2180 break;
2181 case TK_M_SUBSYSTEMS:
2182 if (match_key(rules, key, udev_device_get_subsystem(event->dev_parent)) != 0)
2183 goto try_parent;
2184 break;
2185 case TK_M_DRIVERS:
2186 if (match_key(rules, key, udev_device_get_driver(event->dev_parent)) != 0)
2187 goto try_parent;
2188 break;
2189 case TK_M_ATTRS:
2190 if (match_attr(rules, event->dev_parent, event, key) != 0)
2191 goto try_parent;
2192 break;
2193 case TK_M_TAGS: {
2194 bool match = udev_device_has_tag(event->dev_parent, &rules->buf[cur->key.value_off]);
2195
2196 if (match && key->key.op == OP_NOMATCH)
2197 goto try_parent;
2198 if (!match && key->key.op == OP_MATCH)
2199 goto try_parent;
2200 break;
2201 }
2202 default:
2203 goto nomatch;
2204 }
912541b0 2205 }
912541b0
KS
2206 break;
2207
2208 try_parent:
2209 event->dev_parent = udev_device_get_parent(event->dev_parent);
2210 if (event->dev_parent == NULL)
2211 goto nomatch;
2212 }
2213 /* move behind our sequence of parent match keys */
2214 cur = next;
2215 continue;
2216 }
2217 case TK_M_TEST: {
2218 char filename[UTIL_PATH_SIZE];
2219 struct stat statbuf;
2220 int match;
2221
2222 udev_event_apply_format(event, &rules->buf[cur->key.value_off], filename, sizeof(filename));
2223 if (util_resolve_subsys_kernel(event->udev, filename, filename, sizeof(filename), 0) != 0) {
2224 if (filename[0] != '/') {
2225 char tmp[UTIL_PATH_SIZE];
2226
2227 util_strscpy(tmp, sizeof(tmp), filename);
2228 util_strscpyl(filename, sizeof(filename),
2229 udev_device_get_syspath(event->dev), "/", tmp, NULL);
2230 }
2231 }
2232 attr_subst_subdir(filename, sizeof(filename));
2233
2234 match = (stat(filename, &statbuf) == 0);
baa30fbc 2235 if (match && cur->key.mode > 0)
912541b0 2236 match = ((statbuf.st_mode & cur->key.mode) > 0);
912541b0
KS
2237 if (match && cur->key.op == OP_NOMATCH)
2238 goto nomatch;
2239 if (!match && cur->key.op == OP_MATCH)
2240 goto nomatch;
2241 break;
2242 }
2243 case TK_M_EVENT_TIMEOUT:
baa30fbc 2244 log_debug("OPTIONS event_timeout=%u\n", cur->key.event_timeout);
912541b0
KS
2245 event->timeout_usec = cur->key.event_timeout * 1000 * 1000;
2246 break;
2247 case TK_M_PROGRAM: {
2248 char program[UTIL_PATH_SIZE];
2249 char **envp;
2250 char result[UTIL_PATH_SIZE];
2251
2252 free(event->program_result);
2253 event->program_result = NULL;
2254 udev_event_apply_format(event, &rules->buf[cur->key.value_off], program, sizeof(program));
2255 envp = udev_device_get_properties_envp(event->dev);
baa30fbc
KS
2256 log_debug("PROGRAM '%s' %s:%u\n",
2257 program,
2258 &rules->buf[rule->rule.filename_off],
2259 rule->rule.filename_line);
912541b0
KS
2260
2261 if (udev_event_spawn(event, program, envp, sigmask, result, sizeof(result)) < 0) {
2262 if (cur->key.op != OP_NOMATCH)
2263 goto nomatch;
2264 } else {
2265 int count;
2266
2267 util_remove_trailing_chars(result, '\n');
2268 if (esc == ESCAPE_UNSET || esc == ESCAPE_REPLACE) {
2269 count = util_replace_chars(result, UDEV_ALLOWED_CHARS_INPUT);
2270 if (count > 0)
baa30fbc 2271 log_debug("%i character(s) replaced\n" , count);
912541b0
KS
2272 }
2273 event->program_result = strdup(result);
912541b0
KS
2274 if (cur->key.op == OP_NOMATCH)
2275 goto nomatch;
2276 }
2277 break;
2278 }
2279 case TK_M_IMPORT_FILE: {
2280 char import[UTIL_PATH_SIZE];
2281
2282 udev_event_apply_format(event, &rules->buf[cur->key.value_off], import, sizeof(import));
2283 if (import_file_into_properties(event->dev, import) != 0)
2284 if (cur->key.op != OP_NOMATCH)
2285 goto nomatch;
2286 break;
2287 }
2288 case TK_M_IMPORT_PROG: {
2289 char import[UTIL_PATH_SIZE];
2290
2291 udev_event_apply_format(event, &rules->buf[cur->key.value_off], import, sizeof(import));
baa30fbc
KS
2292 log_debug("IMPORT '%s' %s:%u\n",
2293 import,
2294 &rules->buf[rule->rule.filename_off],
2295 rule->rule.filename_line);
912541b0
KS
2296
2297 if (import_program_into_properties(event, import, sigmask) != 0)
2298 if (cur->key.op != OP_NOMATCH)
2299 goto nomatch;
2300 break;
2301 }
2302 case TK_M_IMPORT_BUILTIN: {
2303 char command[UTIL_PATH_SIZE];
2304
2305 if (udev_builtin_run_once(cur->key.builtin_cmd)) {
2306 /* check if we ran already */
2307 if (event->builtin_run & (1 << cur->key.builtin_cmd)) {
baa30fbc
KS
2308 log_debug("IMPORT builtin skip '%s' %s:%u\n",
2309 udev_builtin_name(cur->key.builtin_cmd),
2310 &rules->buf[rule->rule.filename_off],
2311 rule->rule.filename_line);
912541b0
KS
2312 /* return the result from earlier run */
2313 if (event->builtin_ret & (1 << cur->key.builtin_cmd))
2314 if (cur->key.op != OP_NOMATCH)
2315 goto nomatch;
2316 break;
2317 }
2318 /* mark as ran */
2319 event->builtin_run |= (1 << cur->key.builtin_cmd);
2320 }
2321
2322 udev_event_apply_format(event, &rules->buf[cur->key.value_off], command, sizeof(command));
baa30fbc
KS
2323 log_debug("IMPORT builtin '%s' %s:%u\n",
2324 udev_builtin_name(cur->key.builtin_cmd),
2325 &rules->buf[rule->rule.filename_off],
2326 rule->rule.filename_line);
912541b0
KS
2327
2328 if (udev_builtin_run(event->dev, cur->key.builtin_cmd, command, false) != 0) {
2329 /* remember failure */
baa30fbc
KS
2330 log_debug("IMPORT builtin '%s' returned non-zero\n",
2331 udev_builtin_name(cur->key.builtin_cmd));
912541b0
KS
2332 event->builtin_ret |= (1 << cur->key.builtin_cmd);
2333 if (cur->key.op != OP_NOMATCH)
2334 goto nomatch;
2335 }
2336 break;
2337 }
2338 case TK_M_IMPORT_DB: {
2339 const char *key = &rules->buf[cur->key.value_off];
2340 const char *value;
2341
2342 value = udev_device_get_property_value(event->dev_db, key);
2343 if (value != NULL) {
2344 struct udev_list_entry *entry;
2345
2346 entry = udev_device_add_property(event->dev, key, value);
2347 udev_list_entry_set_num(entry, true);
2348 } else {
2349 if (cur->key.op != OP_NOMATCH)
2350 goto nomatch;
2351 }
2352 break;
2353 }
2354 case TK_M_IMPORT_CMDLINE: {
2355 FILE *f;
2356 bool imported = false;
2357
2358 f = fopen("/proc/cmdline", "r");
2359 if (f != NULL) {
2360 char cmdline[4096];
2361
2362 if (fgets(cmdline, sizeof(cmdline), f) != NULL) {
2363 const char *key = &rules->buf[cur->key.value_off];
2364 char *pos;
2365
2366 pos = strstr(cmdline, key);
2367 if (pos != NULL) {
2368 struct udev_list_entry *entry;
2369
2370 pos += strlen(key);
2371 if (pos[0] == '\0' || isspace(pos[0])) {
2372 /* we import simple flags as 'FLAG=1' */
2373 entry = udev_device_add_property(event->dev, key, "1");
2374 udev_list_entry_set_num(entry, true);
2375 imported = true;
2376 } else if (pos[0] == '=') {
2377 const char *value;
2378
2379 pos++;
2380 value = pos;
2381 while (pos[0] != '\0' && !isspace(pos[0]))
2382 pos++;
2383 pos[0] = '\0';
2384 entry = udev_device_add_property(event->dev, key, value);
2385 udev_list_entry_set_num(entry, true);
2386 imported = true;
2387 }
2388 }
2389 }
2390 fclose(f);
2391 }
2392 if (!imported && cur->key.op != OP_NOMATCH)
2393 goto nomatch;
2394 break;
2395 }
2396 case TK_M_IMPORT_PARENT: {
2397 char import[UTIL_PATH_SIZE];
2398
2399 udev_event_apply_format(event, &rules->buf[cur->key.value_off], import, sizeof(import));
2400 if (import_parent_into_properties(event->dev, import) != 0)
2401 if (cur->key.op != OP_NOMATCH)
2402 goto nomatch;
2403 break;
2404 }
2405 case TK_M_RESULT:
2406 if (match_key(rules, cur, event->program_result) != 0)
2407 goto nomatch;
2408 break;
2409 case TK_A_STRING_ESCAPE_NONE:
2410 esc = ESCAPE_NONE;
2411 break;
2412 case TK_A_STRING_ESCAPE_REPLACE:
2413 esc = ESCAPE_REPLACE;
2414 break;
2415 case TK_A_DB_PERSIST:
2416 udev_device_set_db_persist(event->dev);
2417 break;
2418 case TK_A_INOTIFY_WATCH:
2419 if (event->inotify_watch_final)
2420 break;
2421 if (cur->key.op == OP_ASSIGN_FINAL)
2422 event->inotify_watch_final = true;
2423 event->inotify_watch = cur->key.watch;
2424 break;
2425 case TK_A_DEVLINK_PRIO:
2426 udev_device_set_devlink_priority(event->dev, cur->key.devlink_prio);
2427 break;
2428 case TK_A_OWNER: {
2429 char owner[UTIL_NAME_SIZE];
2430
2431 if (event->owner_final)
2432 break;
2433 if (cur->key.op == OP_ASSIGN_FINAL)
2434 event->owner_final = true;
2435 udev_event_apply_format(event, &rules->buf[cur->key.value_off], owner, sizeof(owner));
2436 event->uid = util_lookup_user(event->udev, owner);
baa30fbc
KS
2437 log_debug("OWNER %u %s:%u\n",
2438 event->uid,
2439 &rules->buf[rule->rule.filename_off],
2440 rule->rule.filename_line);
912541b0
KS
2441 break;
2442 }
2443 case TK_A_GROUP: {
2444 char group[UTIL_NAME_SIZE];
2445
2446 if (event->group_final)
2447 break;
2448 if (cur->key.op == OP_ASSIGN_FINAL)
2449 event->group_final = true;
2450 udev_event_apply_format(event, &rules->buf[cur->key.value_off], group, sizeof(group));
2451 event->gid = util_lookup_group(event->udev, group);
baa30fbc
KS
2452 log_debug("GROUP %u %s:%u\n",
2453 event->gid,
2454 &rules->buf[rule->rule.filename_off],
2455 rule->rule.filename_line);
912541b0
KS
2456 break;
2457 }
2458 case TK_A_MODE: {
2459 char mode_str[UTIL_NAME_SIZE];
2460 mode_t mode;
2461 char *endptr;
2462
2463 if (event->mode_final)
2464 break;
2465 udev_event_apply_format(event, &rules->buf[cur->key.value_off], mode_str, sizeof(mode_str));
2466 mode = strtol(mode_str, &endptr, 8);
2467 if (endptr[0] != '\0') {
baa30fbc 2468 log_error("ignoring invalid mode '%s'\n", mode_str);
912541b0
KS
2469 break;
2470 }
2471 if (cur->key.op == OP_ASSIGN_FINAL)
2472 event->mode_final = true;
2473 event->mode_set = true;
2474 event->mode = mode;
baa30fbc
KS
2475 log_debug("MODE %#o %s:%u\n",
2476 event->mode,
2477 &rules->buf[rule->rule.filename_off],
2478 rule->rule.filename_line);
912541b0
KS
2479 break;
2480 }
2481 case TK_A_OWNER_ID:
2482 if (event->owner_final)
2483 break;
2484 if (cur->key.op == OP_ASSIGN_FINAL)
2485 event->owner_final = true;
2486 event->uid = cur->key.uid;
baa30fbc
KS
2487 log_debug("OWNER %u %s:%u\n",
2488 event->uid,
2489 &rules->buf[rule->rule.filename_off],
2490 rule->rule.filename_line);
912541b0
KS
2491 break;
2492 case TK_A_GROUP_ID:
2493 if (event->group_final)
2494 break;
2495 if (cur->key.op == OP_ASSIGN_FINAL)
2496 event->group_final = true;
2497 event->gid = cur->key.gid;
baa30fbc
KS
2498 log_debug("GROUP %u %s:%u\n",
2499 event->gid,
2500 &rules->buf[rule->rule.filename_off],
2501 rule->rule.filename_line);
912541b0
KS
2502 break;
2503 case TK_A_MODE_ID:
2504 if (event->mode_final)
2505 break;
2506 if (cur->key.op == OP_ASSIGN_FINAL)
2507 event->mode_final = true;
2508 event->mode_set = true;
2509 event->mode = cur->key.mode;
baa30fbc
KS
2510 log_debug("MODE %#o %s:%u\n",
2511 event->mode,
2512 &rules->buf[rule->rule.filename_off],
2513 rule->rule.filename_line);
912541b0
KS
2514 break;
2515 case TK_A_ENV: {
2516 const char *name = &rules->buf[cur->key.attr_off];
2517 char *value = &rules->buf[cur->key.value_off];
2518
2519 if (value[0] != '\0') {
2520 char temp_value[UTIL_NAME_SIZE];
2521 struct udev_list_entry *entry;
2522
2523 udev_event_apply_format(event, value, temp_value, sizeof(temp_value));
2524 entry = udev_device_add_property(event->dev, name, temp_value);
2525 /* store in db, skip private keys */
2526 if (name[0] != '.')
2527 udev_list_entry_set_num(entry, true);
2528 } else {
2529 udev_device_add_property(event->dev, name, NULL);
2530 }
2531 break;
2532 }
2533 case TK_A_TAG: {
2534 char tag[UTIL_PATH_SIZE];
2535 const char *p;
2536
2537 udev_event_apply_format(event, &rules->buf[cur->key.value_off], tag, sizeof(tag));
2538 if (cur->key.op == OP_ASSIGN || cur->key.op == OP_ASSIGN_FINAL)
2539 udev_device_cleanup_tags_list(event->dev);
2540 for (p = tag; *p != '\0'; p++) {
2541 if ((*p >= 'a' && *p <= 'z') ||
2542 (*p >= 'A' && *p <= 'Z') ||
2543 (*p >= '0' && *p <= '9') ||
2544 *p == '-' || *p == '_')
2545 continue;
baa30fbc 2546 log_error("ignoring invalid tag name '%s'\n", tag);
912541b0
KS
2547 break;
2548 }
2549 udev_device_add_tag(event->dev, tag);
2550 break;
2551 }
2552 case TK_A_NAME: {
2553 const char *name = &rules->buf[cur->key.value_off];
0ecfcbd4 2554
912541b0
KS
2555 char name_str[UTIL_PATH_SIZE];
2556 int count;
2557
2558 if (event->name_final)
2559 break;
2560 if (cur->key.op == OP_ASSIGN_FINAL)
2561 event->name_final = true;
2562 udev_event_apply_format(event, name, name_str, sizeof(name_str));
2563 if (esc == ESCAPE_UNSET || esc == ESCAPE_REPLACE) {
2564 count = util_replace_chars(name_str, "/");
2565 if (count > 0)
baa30fbc 2566 log_debug("%i character(s) replaced\n", count);
912541b0 2567 }
6ada823a 2568 if (major(udev_device_get_devnum(event->dev)) &&
33502ffe 2569 (!streq(name_str, udev_device_get_devnode(event->dev) + strlen(TEST_PREFIX "/dev/")))) {
6ada823a
KS
2570 log_error("NAME=\"%s\" ignored, kernel device nodes "
2571 "can not be renamed; please fix it in %s:%u\n", name,
2572 &rules->buf[rule->rule.filename_off], rule->rule.filename_line);
2573 break;
0ecfcbd4 2574 }
912541b0
KS
2575 free(event->name);
2576 event->name = strdup(name_str);
baa30fbc
KS
2577 log_debug("NAME '%s' %s:%u\n",
2578 event->name,
2579 &rules->buf[rule->rule.filename_off],
2580 rule->rule.filename_line);
912541b0
KS
2581 break;
2582 }
2583 case TK_A_DEVLINK: {
2584 char temp[UTIL_PATH_SIZE];
2585 char filename[UTIL_PATH_SIZE];
2586 char *pos, *next;
2587 int count = 0;
2588
2589 if (event->devlink_final)
2590 break;
2591 if (major(udev_device_get_devnum(event->dev)) == 0)
2592 break;
2593 if (cur->key.op == OP_ASSIGN_FINAL)
2594 event->devlink_final = true;
2595 if (cur->key.op == OP_ASSIGN || cur->key.op == OP_ASSIGN_FINAL)
2596 udev_device_cleanup_devlinks_list(event->dev);
2597
2598 /* allow multiple symlinks separated by spaces */
2599 udev_event_apply_format(event, &rules->buf[cur->key.value_off], temp, sizeof(temp));
2600 if (esc == ESCAPE_UNSET)
2601 count = util_replace_chars(temp, "/ ");
2602 else if (esc == ESCAPE_REPLACE)
2603 count = util_replace_chars(temp, "/");
2604 if (count > 0)
baa30fbc 2605 log_debug("%i character(s) replaced\n" , count);
912541b0
KS
2606 pos = temp;
2607 while (isspace(pos[0]))
2608 pos++;
2609 next = strchr(pos, ' ');
2610 while (next != NULL) {
2611 next[0] = '\0';
baa30fbc
KS
2612 log_debug("LINK '%s' %s:%u\n", pos,
2613 &rules->buf[rule->rule.filename_off], rule->rule.filename_line);
6ada823a 2614 util_strscpyl(filename, sizeof(filename), TEST_PREFIX "/dev/", pos, NULL);
912541b0
KS
2615 udev_device_add_devlink(event->dev, filename, cur->key.devlink_unique);
2616 while (isspace(next[1]))
2617 next++;
2618 pos = &next[1];
2619 next = strchr(pos, ' ');
2620 }
2621 if (pos[0] != '\0') {
baa30fbc
KS
2622 log_debug("LINK '%s' %s:%u\n", pos,
2623 &rules->buf[rule->rule.filename_off], rule->rule.filename_line);
6ada823a 2624 util_strscpyl(filename, sizeof(filename), TEST_PREFIX "/dev/", pos, NULL);
912541b0
KS
2625 udev_device_add_devlink(event->dev, filename, cur->key.devlink_unique);
2626 }
2627 break;
2628 }
2629 case TK_A_ATTR: {
2630 const char *key_name = &rules->buf[cur->key.attr_off];
2631 char attr[UTIL_PATH_SIZE];
2632 char value[UTIL_NAME_SIZE];
2633 FILE *f;
2634
2635 if (util_resolve_subsys_kernel(event->udev, key_name, attr, sizeof(attr), 0) != 0)
2636 util_strscpyl(attr, sizeof(attr), udev_device_get_syspath(event->dev), "/", key_name, NULL);
2637 attr_subst_subdir(attr, sizeof(attr));
2638
2639 udev_event_apply_format(event, &rules->buf[cur->key.value_off], value, sizeof(value));
baa30fbc
KS
2640 log_debug("ATTR '%s' writing '%s' %s:%u\n", attr, value,
2641 &rules->buf[rule->rule.filename_off],
2642 rule->rule.filename_line);
912541b0
KS
2643 f = fopen(attr, "w");
2644 if (f != NULL) {
2645 if (fprintf(f, "%s", value) <= 0)
baa30fbc 2646 log_error("error writing ATTR{%s}: %m\n", attr);
912541b0
KS
2647 fclose(f);
2648 } else {
baa30fbc 2649 log_error("error opening ATTR{%s} for writing: %m\n", attr);
912541b0
KS
2650 }
2651 break;
2652 }
83cd6b75
KS
2653 case TK_A_RUN_BUILTIN:
2654 case TK_A_RUN_PROGRAM: {
2655 struct udev_list_entry *entry;
2656
912541b0
KS
2657 if (cur->key.op == OP_ASSIGN || cur->key.op == OP_ASSIGN_FINAL)
2658 udev_list_cleanup(&event->run_list);
baa30fbc
KS
2659 log_debug("RUN '%s' %s:%u\n",
2660 &rules->buf[cur->key.value_off],
2661 &rules->buf[rule->rule.filename_off],
2662 rule->rule.filename_line);
83cd6b75
KS
2663 entry = udev_list_entry_add(&event->run_list, &rules->buf[cur->key.value_off], NULL);
2664 udev_list_entry_set_num(entry, cur->key.builtin_cmd);
912541b0
KS
2665 break;
2666 }
2667 case TK_A_GOTO:
2668 if (cur->key.rule_goto == 0)
2669 break;
2670 cur = &rules->tokens[cur->key.rule_goto];
2671 continue;
2672 case TK_END:
2673 return 0;
2674
2675 case TK_M_PARENTS_MIN:
2676 case TK_M_PARENTS_MAX:
2677 case TK_M_MAX:
2678 case TK_UNSET:
baa30fbc 2679 log_error("wrong type %u\n", cur->type);
912541b0
KS
2680 goto nomatch;
2681 }
2682
2683 cur++;
2684 continue;
2685 nomatch:
2686 /* fast-forward to next rule */
2687 cur = rule + rule->rule.token_count;
912541b0 2688 }
6880b25d 2689}
761dfddc
KS
2690
2691void udev_rules_apply_static_dev_perms(struct udev_rules *rules)
2692{
912541b0
KS
2693 struct token *cur;
2694 struct token *rule;
2695 uid_t uid = 0;
2696 gid_t gid = 0;
2697 mode_t mode = 0;
2698
2699 if (rules->tokens == NULL)
2700 return;
2701
2702 cur = &rules->tokens[0];
2703 rule = cur;
2704 for (;;) {
2705 switch (cur->type) {
2706 case TK_RULE:
2707 /* current rule */
2708 rule = cur;
2709
2710 /* skip rules without a static_node tag */
2711 if (!rule->rule.has_static_node)
2712 goto next;
2713
2714 uid = 0;
2715 gid = 0;
2716 mode = 0;
2717 break;
2718 case TK_A_OWNER_ID:
2719 uid = cur->key.uid;
2720 break;
2721 case TK_A_GROUP_ID:
2722 gid = cur->key.gid;
2723 break;
2724 case TK_A_MODE_ID:
2725 mode = cur->key.mode;
2726 break;
2727 case TK_A_STATIC_NODE: {
2728 char filename[UTIL_PATH_SIZE];
2729 struct stat stats;
2730
2731 /* we assure, that the permissions tokens are sorted before the static token */
2732 if (mode == 0 && uid == 0 && gid == 0)
2733 goto next;
6ada823a 2734 util_strscpyl(filename, sizeof(filename), TEST_PREFIX "/dev/",
912541b0
KS
2735 &rules->buf[cur->key.value_off], NULL);
2736 if (stat(filename, &stats) != 0)
2737 goto next;
2738 if (!S_ISBLK(stats.st_mode) && !S_ISCHR(stats.st_mode))
2739 goto next;
2740 if (mode == 0) {
2741 if (gid > 0)
2742 mode = 0660;
2743 else
2744 mode = 0600;
2745 }
2746 if (mode != (stats.st_mode & 01777)) {
2747 chmod(filename, mode);
baa30fbc 2748 log_debug("chmod '%s' %#o\n", filename, mode);
912541b0
KS
2749 }
2750
2751 if ((uid != 0 && uid != stats.st_uid) || (gid != 0 && gid != stats.st_gid)) {
2752 chown(filename, uid, gid);
baa30fbc 2753 log_debug("chown '%s' %u %u\n", filename, uid, gid);
912541b0
KS
2754 }
2755
2756 utimensat(AT_FDCWD, filename, NULL, 0);
2757 break;
2758 }
2759 case TK_END:
2760 return;
2761 }
2762
2763 cur++;
2764 continue;
761dfddc 2765next:
912541b0
KS
2766 /* fast-forward to next rule */
2767 cur = rule + rule->rule.token_count;
2768 continue;
2769 }
761dfddc 2770}