]> git.ipfire.org Git - thirdparty/systemd.git/blame - udev/udev-rules.c
builtin: rename load()/unload() to init()/exit()
[thirdparty/systemd.git] / udev / udev-rules.c
CommitLineData
2232cac8 1/*
5539f624 2 * Copyright (C) 2003-2010 Kay Sievers <kay.sievers@vrfy.org>
023ed7b0 3 * Copyright (C) 2008 Alan Jenkins <alan-jenkins@tuffmail.co.uk>
2232cac8 4 *
55e9959b
KS
5 * This program is free software: you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation, either version 2 of the License, or
8 * (at your option) any later version.
3d6d12c6 9 *
55e9959b
KS
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
2232cac8 14 *
55e9959b
KS
15 * You should have received a copy of the GNU General Public License
16 * along with this program. If not, see <http://www.gnu.org/licenses/>.
2232cac8
GKH
17 */
18
19#include <stddef.h>
1449a55d 20#include <limits.h>
2232cac8 21#include <stdlib.h>
6d87ee2e 22#include <stdbool.h>
2232cac8
GKH
23#include <string.h>
24#include <stdio.h>
25#include <fcntl.h>
26#include <ctype.h>
27#include <unistd.h>
28#include <errno.h>
5ee7ecfb 29#include <dirent.h>
cea61f5c 30#include <fnmatch.h>
959e8b5d 31#include <time.h>
2232cac8 32
2232cac8 33#include "udev.h"
2232cac8 34
6880b25d
KS
35#define PREALLOC_TOKEN 2048
36#define PREALLOC_STRBUF 32 * 1024
1449a55d 37#define PREALLOC_TRIE 256
c7521974 38
4052400f
KS
39struct uid_gid {
40 unsigned int name_off;
41 union {
42 uid_t uid;
43 gid_t gid;
44 };
45};
46
1449a55d 47struct trie_node {
023ed7b0 48 /* this node's first child */
bcf44d55 49 unsigned int child_idx;
023ed7b0
KS
50 /* the next child of our parent node's child list */
51 unsigned int next_child_idx;
52 /* this node's last child (shortcut for append) */
bcf44d55 53 unsigned int last_child_idx;
1449a55d 54 unsigned int value_off;
bcf44d55 55 unsigned short value_len;
023ed7b0 56 unsigned char key;
1449a55d
AJ
57};
58
4052400f
KS
59struct udev_rules {
60 struct udev *udev;
61 int resolve_names;
62
63 /* every key in the rules file becomes a token */
64 struct token *tokens;
65 unsigned int token_cur;
66 unsigned int token_max;
67
68 /* all key strings are copied to a single string buffer */
69 char *buf;
70 size_t buf_cur;
71 size_t buf_max;
72 unsigned int buf_count;
73
bcf44d55 74 /* during rule parsing, strings are indexed to find duplicates */
bcf44d55
KS
75 struct trie_node *trie_nodes;
76 unsigned int trie_nodes_cur;
77 unsigned int trie_nodes_max;
1449a55d 78
bcf44d55 79 /* during rule parsing, uid/gid lookup results are cached */
4052400f
KS
80 struct uid_gid *uids;
81 unsigned int uids_cur;
82 unsigned int uids_max;
83 struct uid_gid *gids;
84 unsigned int gids_cur;
85 unsigned int gids_max;
86};
87
1449a55d 88/* KEY=="", KEY!="", KEY+="", KEY="", KEY:="" */
b0f7409f
KS
89enum operation_type {
90 OP_UNSET,
91
92 OP_MATCH,
93 OP_NOMATCH,
94 OP_MATCH_MAX,
95
96 OP_ADD,
97 OP_ASSIGN,
98 OP_ASSIGN_FINAL,
c7521974
KS
99};
100
ac218d9c
KS
101enum string_glob_type {
102 GL_UNSET,
db463fd3
KS
103 GL_PLAIN, /* no special chars */
104 GL_GLOB, /* shell globs ?,*,[] */
105 GL_SPLIT, /* multi-value A|B */
106 GL_SPLIT_GLOB, /* multi-value with glob A*|B* */
107 GL_SOMETHING, /* commonly used "?*" */
ac218d9c
KS
108};
109
32028733
KS
110enum string_subst_type {
111 SB_UNSET,
112 SB_NONE,
113 SB_FORMAT,
114 SB_SUBSYS,
115};
116
154a7b84 117/* tokens of a rule are sorted/handled in this order */
6880b25d 118enum token_type {
ac218d9c 119 TK_UNSET,
6880b25d
KS
120 TK_RULE,
121
6880b25d
KS
122 TK_M_ACTION, /* val */
123 TK_M_DEVPATH, /* val */
124 TK_M_KERNEL, /* val */
125 TK_M_DEVLINK, /* val */
126 TK_M_NAME, /* val */
127 TK_M_ENV, /* val, attr */
3f896a2a 128 TK_M_TAG, /* val */
6880b25d
KS
129 TK_M_SUBSYSTEM, /* val */
130 TK_M_DRIVER, /* val */
7aeeaedc 131 TK_M_WAITFOR, /* val */
6880b25d
KS
132 TK_M_ATTR, /* val, attr */
133
d15fcce4 134 TK_M_PARENTS_MIN,
6880b25d
KS
135 TK_M_KERNELS, /* val */
136 TK_M_SUBSYSTEMS, /* val */
137 TK_M_DRIVERS, /* val */
138 TK_M_ATTRS, /* val, attr */
7df0ed83 139 TK_M_TAGS, /* val */
b0f7409f 140 TK_M_PARENTS_MAX,
6880b25d
KS
141
142 TK_M_TEST, /* val, mode_t */
2181d30a 143 TK_M_EVENT_TIMEOUT, /* int */
6880b25d
KS
144 TK_M_PROGRAM, /* val */
145 TK_M_IMPORT_FILE, /* val */
146 TK_M_IMPORT_PROG, /* val */
d7867b31 147 TK_M_IMPORT_BUILTIN, /* val */
5539f624 148 TK_M_IMPORT_DB, /* val */
c4f6dcc4 149 TK_M_IMPORT_CMDLINE, /* val */
6880b25d
KS
150 TK_M_IMPORT_PARENT, /* val */
151 TK_M_RESULT, /* val */
ac218d9c 152 TK_M_MAX,
6880b25d 153
6880b25d
KS
154 TK_A_STRING_ESCAPE_NONE,
155 TK_A_STRING_ESCAPE_REPLACE,
9ead6627 156 TK_A_DB_PERSIST,
46f194cb 157 TK_A_INOTIFY_WATCH, /* int */
6880b25d
KS
158 TK_A_DEVLINK_PRIO, /* int */
159 TK_A_OWNER, /* val */
160 TK_A_GROUP, /* val */
161 TK_A_MODE, /* val */
162 TK_A_OWNER_ID, /* uid_t */
163 TK_A_GROUP_ID, /* gid_t */
164 TK_A_MODE_ID, /* mode_t */
761dfddc 165 TK_A_STATIC_NODE, /* val */
6880b25d 166 TK_A_ENV, /* val, attr */
28460195 167 TK_A_TAG, /* val */
6880b25d
KS
168 TK_A_NAME, /* val */
169 TK_A_DEVLINK, /* val */
6880b25d
KS
170 TK_A_ATTR, /* val, attr */
171 TK_A_RUN, /* val, bool */
172 TK_A_GOTO, /* size_t */
6880b25d
KS
173
174 TK_END,
c7521974
KS
175};
176
3f3aa9f5 177/* we try to pack stuff in a way that we take only 12 bytes per token */
4052400f
KS
178struct token {
179 union {
761dfddc 180 unsigned char type; /* same in rule and key */
4052400f 181 struct {
a25d547d 182 enum token_type type:8;
761dfddc
KS
183 bool can_set_name:1;
184 bool has_static_node:1;
185 unsigned int unused:6;
3f3aa9f5 186 unsigned short token_count;
4052400f
KS
187 unsigned int label_off;
188 unsigned short filename_off;
189 unsigned short filename_line;
190 } rule;
191 struct {
a25d547d
KS
192 enum token_type type:8;
193 enum operation_type op:8;
194 enum string_glob_type glob:8;
32028733
KS
195 enum string_subst_type subst:4;
196 enum string_subst_type attrsubst:4;
4052400f
KS
197 unsigned int value_off;
198 union {
199 unsigned int attr_off;
6c29f2b9 200 int devlink_unique;
4052400f
KS
201 unsigned int rule_goto;
202 mode_t mode;
203 uid_t uid;
204 gid_t gid;
4052400f
KS
205 int devlink_prio;
206 int event_timeout;
46f194cb 207 int watch;
d7867b31 208 enum udev_builtin_cmd builtin_cmd;
4052400f
KS
209 };
210 } key;
211 };
212};
213
214#define MAX_TK 64
215struct rule_tmp {
216 struct udev_rules *rules;
217 struct token rule;
218 struct token token[MAX_TK];
219 unsigned int token_cur;
220};
221
045a3bc8 222#ifdef ENABLE_DEBUG
5d6a1fa6
KS
223static const char *operation_str(enum operation_type type)
224{
225 static const char *operation_strs[] = {
226 [OP_UNSET] = "UNSET",
227 [OP_MATCH] = "match",
228 [OP_NOMATCH] = "nomatch",
229 [OP_MATCH_MAX] = "MATCH_MAX",
230
231 [OP_ADD] = "add",
232 [OP_ASSIGN] = "assign",
233 [OP_ASSIGN_FINAL] = "assign-final",
234} ;
235
236 return operation_strs[type];
237}
4052400f 238
5d6a1fa6
KS
239static const char *string_glob_str(enum string_glob_type type)
240{
241 static const char *string_glob_strs[] = {
242 [GL_UNSET] = "UNSET",
243 [GL_PLAIN] = "plain",
244 [GL_GLOB] = "glob",
245 [GL_SPLIT] = "split",
246 [GL_SPLIT_GLOB] = "split-glob",
247 [GL_SOMETHING] = "split-glob",
5d6a1fa6 248 };
4052400f 249
5d6a1fa6
KS
250 return string_glob_strs[type];
251}
252
253static const char *token_str(enum token_type type)
254{
255 static const char *token_strs[] = {
256 [TK_UNSET] = "UNSET",
257 [TK_RULE] = "RULE",
258
259 [TK_M_ACTION] = "M ACTION",
260 [TK_M_DEVPATH] = "M DEVPATH",
261 [TK_M_KERNEL] = "M KERNEL",
262 [TK_M_DEVLINK] = "M DEVLINK",
263 [TK_M_NAME] = "M NAME",
264 [TK_M_ENV] = "M ENV",
3f896a2a 265 [TK_M_TAG] = "M TAG",
5d6a1fa6
KS
266 [TK_M_SUBSYSTEM] = "M SUBSYSTEM",
267 [TK_M_DRIVER] = "M DRIVER",
268 [TK_M_WAITFOR] = "M WAITFOR",
269 [TK_M_ATTR] = "M ATTR",
270
271 [TK_M_PARENTS_MIN] = "M PARENTS_MIN",
272 [TK_M_KERNELS] = "M KERNELS",
273 [TK_M_SUBSYSTEMS] = "M SUBSYSTEMS",
274 [TK_M_DRIVERS] = "M DRIVERS",
275 [TK_M_ATTRS] = "M ATTRS",
7df0ed83 276 [TK_M_TAGS] = "M TAGS",
5d6a1fa6
KS
277 [TK_M_PARENTS_MAX] = "M PARENTS_MAX",
278
279 [TK_M_TEST] = "M TEST",
2181d30a 280 [TK_M_EVENT_TIMEOUT] = "M EVENT_TIMEOUT",
5d6a1fa6
KS
281 [TK_M_PROGRAM] = "M PROGRAM",
282 [TK_M_IMPORT_FILE] = "M IMPORT_FILE",
283 [TK_M_IMPORT_PROG] = "M IMPORT_PROG",
d7867b31 284 [TK_M_IMPORT_BUILTIN] = "M IMPORT_BUILTIN",
5539f624 285 [TK_M_IMPORT_DB] = "M IMPORT_DB",
c4f6dcc4 286 [TK_M_IMPORT_CMDLINE] = "M IMPORT_CMDLINE",
214a6c79 287 [TK_M_IMPORT_PARENT] = "M IMPORT_PARENT",
5d6a1fa6
KS
288 [TK_M_RESULT] = "M RESULT",
289 [TK_M_MAX] = "M MAX",
290
5d6a1fa6
KS
291 [TK_A_STRING_ESCAPE_NONE] = "A STRING_ESCAPE_NONE",
292 [TK_A_STRING_ESCAPE_REPLACE] = "A STRING_ESCAPE_REPLACE",
9ead6627 293 [TK_A_DB_PERSIST] = "A DB_PERSIST",
bd284db1 294 [TK_A_INOTIFY_WATCH] = "A INOTIFY_WATCH",
5d6a1fa6
KS
295 [TK_A_DEVLINK_PRIO] = "A DEVLINK_PRIO",
296 [TK_A_OWNER] = "A OWNER",
297 [TK_A_GROUP] = "A GROUP",
298 [TK_A_MODE] = "A MODE",
299 [TK_A_OWNER_ID] = "A OWNER_ID",
300 [TK_A_GROUP_ID] = "A GROUP_ID",
761dfddc 301 [TK_A_STATIC_NODE] = "A STATIC_NODE",
5d6a1fa6
KS
302 [TK_A_MODE_ID] = "A MODE_ID",
303 [TK_A_ENV] = "A ENV",
28460195 304 [TK_A_TAG] = "A ENV",
5d6a1fa6
KS
305 [TK_A_NAME] = "A NAME",
306 [TK_A_DEVLINK] = "A DEVLINK",
5d6a1fa6
KS
307 [TK_A_ATTR] = "A ATTR",
308 [TK_A_RUN] = "A RUN",
309 [TK_A_GOTO] = "A GOTO",
5d6a1fa6
KS
310
311 [TK_END] = "END",
312 };
313
314 return token_strs[type];
315}
c7521974 316
4052400f
KS
317static void dump_token(struct udev_rules *rules, struct token *token)
318{
319 enum token_type type = token->type;
320 enum operation_type op = token->key.op;
321 enum string_glob_type glob = token->key.glob;
322 const char *value = &rules->buf[token->key.value_off];
323 const char *attr = &rules->buf[token->key.attr_off];
154a7b84 324
4052400f
KS
325 switch (type) {
326 case TK_RULE:
327 {
328 const char *tks_ptr = (char *)rules->tokens;
329 const char *tk_ptr = (char *)token;
5d6a1fa6 330 unsigned int idx = (tk_ptr - tks_ptr) / sizeof(struct token);
154a7b84 331
d80f8ffd 332 dbg(rules->udev, "* RULE %s:%u, token: %u, count: %u, label: '%s'\n",
4052400f 333 &rules->buf[token->rule.filename_off], token->rule.filename_line,
5d6a1fa6 334 idx, token->rule.token_count,
d80f8ffd 335 &rules->buf[token->rule.label_off]);
4052400f
KS
336 break;
337 }
338 case TK_M_ACTION:
339 case TK_M_DEVPATH:
340 case TK_M_KERNEL:
341 case TK_M_SUBSYSTEM:
342 case TK_M_DRIVER:
343 case TK_M_WAITFOR:
344 case TK_M_DEVLINK:
345 case TK_M_NAME:
346 case TK_M_KERNELS:
347 case TK_M_SUBSYSTEMS:
348 case TK_M_DRIVERS:
7df0ed83 349 case TK_M_TAGS:
4052400f
KS
350 case TK_M_PROGRAM:
351 case TK_M_IMPORT_FILE:
352 case TK_M_IMPORT_PROG:
5539f624 353 case TK_M_IMPORT_DB:
c4f6dcc4 354 case TK_M_IMPORT_CMDLINE:
4052400f
KS
355 case TK_M_IMPORT_PARENT:
356 case TK_M_RESULT:
357 case TK_A_NAME:
358 case TK_A_DEVLINK:
359 case TK_A_OWNER:
360 case TK_A_GROUP:
361 case TK_A_MODE:
362 case TK_A_RUN:
363 dbg(rules->udev, "%s %s '%s'(%s)\n",
5d6a1fa6 364 token_str(type), operation_str(op), value, string_glob_str(glob));
4052400f 365 break;
d7867b31 366 case TK_M_IMPORT_BUILTIN:
81dadce5 367 dbg(rules->udev, "%s %i '%s'\n", token_str(type), token->key.builtin_cmd, value);
d7867b31 368 break;
4052400f
KS
369 case TK_M_ATTR:
370 case TK_M_ATTRS:
371 case TK_M_ENV:
372 case TK_A_ATTR:
373 case TK_A_ENV:
374 dbg(rules->udev, "%s %s '%s' '%s'(%s)\n",
5d6a1fa6 375 token_str(type), operation_str(op), attr, value, string_glob_str(glob));
4052400f 376 break;
3f896a2a 377 case TK_M_TAG:
28460195
KS
378 case TK_A_TAG:
379 dbg(rules->udev, "%s %s '%s'\n", token_str(type), operation_str(op), value);
380 break;
4052400f
KS
381 case TK_A_STRING_ESCAPE_NONE:
382 case TK_A_STRING_ESCAPE_REPLACE:
9ead6627 383 case TK_A_DB_PERSIST:
5d69a34c
KS
384 dbg(rules->udev, "%s\n", token_str(type));
385 break;
4052400f
KS
386 case TK_M_TEST:
387 dbg(rules->udev, "%s %s '%s'(%s) %#o\n",
5d6a1fa6 388 token_str(type), operation_str(op), value, string_glob_str(glob), token->key.mode);
4052400f 389 break;
46f194cb 390 case TK_A_INOTIFY_WATCH:
2236ddae 391 dbg(rules->udev, "%s %u\n", token_str(type), token->key.watch);
46f194cb 392 break;
4052400f 393 case TK_A_DEVLINK_PRIO:
761dfddc 394 dbg(rules->udev, "%s %u\n", token_str(type), token->key.devlink_prio);
4052400f
KS
395 break;
396 case TK_A_OWNER_ID:
5d6a1fa6 397 dbg(rules->udev, "%s %s %u\n", token_str(type), operation_str(op), token->key.uid);
4052400f
KS
398 break;
399 case TK_A_GROUP_ID:
5d6a1fa6 400 dbg(rules->udev, "%s %s %u\n", token_str(type), operation_str(op), token->key.gid);
4052400f
KS
401 break;
402 case TK_A_MODE_ID:
5d6a1fa6 403 dbg(rules->udev, "%s %s %#o\n", token_str(type), operation_str(op), token->key.mode);
4052400f 404 break;
761dfddc
KS
405 case TK_A_STATIC_NODE:
406 dbg(rules->udev, "%s '%s'\n", token_str(type), value);
407 break;
2181d30a 408 case TK_M_EVENT_TIMEOUT:
761dfddc 409 dbg(rules->udev, "%s %u\n", token_str(type), token->key.event_timeout);
4052400f
KS
410 break;
411 case TK_A_GOTO:
5d6a1fa6 412 dbg(rules->udev, "%s '%s' %u\n", token_str(type), value, token->key.rule_goto);
4052400f
KS
413 break;
414 case TK_END:
5d6a1fa6 415 dbg(rules->udev, "* %s\n", token_str(type));
4052400f
KS
416 break;
417 case TK_M_PARENTS_MIN:
418 case TK_M_PARENTS_MAX:
419 case TK_M_MAX:
420 case TK_UNSET:
421 dbg(rules->udev, "unknown type %u\n", type);
422 break;
423 }
424}
154a7b84 425
4052400f
KS
426static void dump_rules(struct udev_rules *rules)
427{
428 unsigned int i;
154a7b84 429
4052400f
KS
430 dbg(rules->udev, "dumping %u (%zu bytes) tokens, %u (%zu bytes) strings\n",
431 rules->token_cur,
432 rules->token_cur * sizeof(struct token),
433 rules->buf_count,
434 rules->buf_cur);
435 for(i = 0; i < rules->token_cur; i++)
436 dump_token(rules, &rules->tokens[i]);
437}
438#else
5d6a1fa6
KS
439static inline const char *operation_str(enum operation_type type) { return NULL; }
440static inline const char *token_str(enum token_type type) { return NULL; }
4052400f
KS
441static inline void dump_token(struct udev_rules *rules, struct token *token) {}
442static inline void dump_rules(struct udev_rules *rules) {}
045a3bc8 443#endif /* ENABLE_DEBUG */
c7521974 444
1449a55d 445static int add_new_string(struct udev_rules *rules, const char *str, size_t bytes)
c7521974 446{
6880b25d 447 int off;
c7521974 448
34d6a259 449 /* grow buffer if needed */
1449a55d 450 if (rules->buf_cur + bytes+1 >= rules->buf_max) {
6880b25d
KS
451 char *buf;
452 unsigned int add;
c7521974 453
6880b25d
KS
454 /* double the buffer size */
455 add = rules->buf_max;
1449a55d
AJ
456 if (add < bytes * 8)
457 add = bytes * 8;
c7521974 458
6880b25d
KS
459 buf = realloc(rules->buf, rules->buf_max + add);
460 if (buf == NULL)
461 return -1;
86b57788 462 dbg(rules->udev, "extend buffer from %zu to %zu\n", rules->buf_max, rules->buf_max + add);
6880b25d
KS
463 rules->buf = buf;
464 rules->buf_max += add;
c7521974 465 }
6880b25d 466 off = rules->buf_cur;
1449a55d
AJ
467 memcpy(&rules->buf[rules->buf_cur], str, bytes);
468 rules->buf_cur += bytes;
6880b25d
KS
469 rules->buf_count++;
470 return off;
c7521974
KS
471}
472
1449a55d 473static int add_string(struct udev_rules *rules, const char *str)
c7521974 474{
bcf44d55
KS
475 unsigned int node_idx;
476 struct trie_node *new_node;
477 unsigned int new_node_idx;
1449a55d 478 unsigned char key;
bcf44d55 479 unsigned short len;
1c8af93a 480 unsigned int depth;
1449a55d 481 unsigned int off;
023ed7b0 482 struct trie_node *parent;
1449a55d 483
023ed7b0 484 /* walk trie, start from last character of str to find matching tails */
949075db 485 len = strlen(str);
023ed7b0 486 key = str[len-1];
949075db 487 node_idx = 0;
023ed7b0
KS
488 for (depth = 0; depth <= len; depth++) {
489 struct trie_node *node;
490 unsigned int child_idx;
491
492 node = &rules->trie_nodes[node_idx];
493 off = node->value_off + node->value_len - len;
494
495 /* match against current node */
496 if (depth == len || (node->value_len >= len && memcmp(&rules->buf[off], str, len) == 0))
497 return off;
498
499 /* lookup child node */
500 key = str[len - 1 - depth];
501 child_idx = node->child_idx;
502 while (child_idx > 0) {
503 struct trie_node *child;
504
505 child = &rules->trie_nodes[child_idx];
506 if (child->key == key)
1449a55d 507 break;
023ed7b0 508 child_idx = child->next_child_idx;
1449a55d 509 }
023ed7b0
KS
510 if (child_idx == 0)
511 break;
512 node_idx = child_idx;
1449a55d
AJ
513 }
514
515 /* string not found, add it */
516 off = add_new_string(rules, str, len + 1);
517
bcf44d55
KS
518 /* grow trie nodes if needed */
519 if (rules->trie_nodes_cur >= rules->trie_nodes_max) {
520 struct trie_node *nodes;
521 unsigned int add;
1449a55d
AJ
522
523 /* double the buffer size */
bcf44d55 524 add = rules->trie_nodes_max;
1449a55d
AJ
525 if (add < 8)
526 add = 8;
527
bcf44d55
KS
528 nodes = realloc(rules->trie_nodes, (rules->trie_nodes_max + add) * sizeof(struct trie_node));
529 if (nodes == NULL)
1449a55d 530 return -1;
bcf44d55
KS
531 dbg(rules->udev, "extend trie nodes from %u to %u\n",
532 rules->trie_nodes_max, rules->trie_nodes_max + add);
533 rules->trie_nodes = nodes;
534 rules->trie_nodes_max += add;
1449a55d
AJ
535 }
536
023ed7b0 537 /* get a new node */
bcf44d55
KS
538 new_node_idx = rules->trie_nodes_cur;
539 rules->trie_nodes_cur++;
540 new_node = &rules->trie_nodes[new_node_idx];
023ed7b0 541 memset(new_node, 0x00, sizeof(struct trie_node));
bcf44d55
KS
542 new_node->value_off = off;
543 new_node->value_len = len;
023ed7b0 544 new_node->key = key;
bcf44d55 545
023ed7b0
KS
546 /* join the parent's child list */
547 parent = &rules->trie_nodes[node_idx];
548 if (parent->child_idx == 0) {
549 parent->child_idx = new_node_idx;
bcf44d55 550 } else {
023ed7b0 551 struct trie_node *last_child;
1449a55d 552
023ed7b0
KS
553 last_child = &rules->trie_nodes[parent->last_child_idx];
554 last_child->next_child_idx = new_node_idx;
bcf44d55 555 }
023ed7b0 556 parent->last_child_idx = new_node_idx;
1449a55d
AJ
557 return off;
558}
559
560static int add_token(struct udev_rules *rules, struct token *token)
561{
34d6a259 562 /* grow buffer if needed */
6880b25d
KS
563 if (rules->token_cur+1 >= rules->token_max) {
564 struct token *tokens;
565 unsigned int add;
c7521974 566
6880b25d
KS
567 /* double the buffer size */
568 add = rules->token_max;
154a7b84
KS
569 if (add < 8)
570 add = 8;
c7521974 571
6880b25d
KS
572 tokens = realloc(rules->tokens, (rules->token_max + add ) * sizeof(struct token));
573 if (tokens == NULL)
574 return -1;
86b57788 575 dbg(rules->udev, "extend tokens from %u to %u\n", rules->token_max, rules->token_max + add);
6880b25d
KS
576 rules->tokens = tokens;
577 rules->token_max += add;
c7521974 578 }
6880b25d
KS
579 memcpy(&rules->tokens[rules->token_cur], token, sizeof(struct token));
580 rules->token_cur++;
581 return 0;
c7521974 582}
a27cd06c 583
154a7b84
KS
584static uid_t add_uid(struct udev_rules *rules, const char *owner)
585{
586 unsigned int i;
587 uid_t uid;
588 unsigned int off;
589
590 /* lookup, if we know it already */
591 for (i = 0; i < rules->uids_cur; i++) {
592 off = rules->uids[i].name_off;
593 if (strcmp(&rules->buf[off], owner) == 0) {
594 uid = rules->uids[i].uid;
595 dbg(rules->udev, "return existing %u for '%s'\n", uid, owner);
596 return uid;
597 }
598 }
599 uid = util_lookup_user(rules->udev, owner);
600
601 /* grow buffer if needed */
602 if (rules->uids_cur+1 >= rules->uids_max) {
603 struct uid_gid *uids;
604 unsigned int add;
605
606 /* double the buffer size */
607 add = rules->uids_max;
608 if (add < 1)
609 add = 8;
610
611 uids = realloc(rules->uids, (rules->uids_max + add ) * sizeof(struct uid_gid));
612 if (uids == NULL)
613 return uid;
86b57788 614 dbg(rules->udev, "extend uids from %u to %u\n", rules->uids_max, rules->uids_max + add);
154a7b84
KS
615 rules->uids = uids;
616 rules->uids_max += add;
617 }
618 rules->uids[rules->uids_cur].uid = uid;
619 off = add_string(rules, owner);
620 if (off <= 0)
621 return uid;
622 rules->uids[rules->uids_cur].name_off = off;
623 rules->uids_cur++;
624 return uid;
625}
626
627static gid_t add_gid(struct udev_rules *rules, const char *group)
628{
629 unsigned int i;
630 gid_t gid;
631 unsigned int off;
632
633 /* lookup, if we know it already */
634 for (i = 0; i < rules->gids_cur; i++) {
635 off = rules->gids[i].name_off;
636 if (strcmp(&rules->buf[off], group) == 0) {
637 gid = rules->gids[i].gid;
ac218d9c 638 dbg(rules->udev, "return existing %u for '%s'\n", gid, group);
154a7b84
KS
639 return gid;
640 }
641 }
642 gid = util_lookup_group(rules->udev, group);
643
644 /* grow buffer if needed */
645 if (rules->gids_cur+1 >= rules->gids_max) {
646 struct uid_gid *gids;
647 unsigned int add;
648
649 /* double the buffer size */
650 add = rules->gids_max;
651 if (add < 1)
652 add = 8;
653
654 gids = realloc(rules->gids, (rules->gids_max + add ) * sizeof(struct uid_gid));
655 if (gids == NULL)
656 return gid;
86b57788 657 dbg(rules->udev, "extend gids from %u to %u\n", rules->gids_max, rules->gids_max + add);
154a7b84
KS
658 rules->gids = gids;
659 rules->gids_max += add;
660 }
661 rules->gids[rules->gids_cur].gid = gid;
662 off = add_string(rules, group);
663 if (off <= 0)
664 return gid;
665 rules->gids[rules->gids_cur].name_off = off;
666 rules->gids_cur++;
667 return gid;
668}
669
bb144ed1 670static int import_property_from_string(struct udev_device *dev, char *line)
bd0ed2ff 671{
bb144ed1
KS
672 struct udev *udev = udev_device_get_udev(dev);
673 char *key;
674 char *val;
675 size_t len;
bd0ed2ff 676
bb144ed1
KS
677 /* find key */
678 key = line;
679 while (isspace(key[0]))
680 key++;
bd0ed2ff 681
bb144ed1
KS
682 /* comment or empty line */
683 if (key[0] == '#' || key[0] == '\0')
684 return -1;
16511863 685
bb144ed1
KS
686 /* split key/value */
687 val = strchr(key, '=');
688 if (val == NULL)
689 return -1;
690 val[0] = '\0';
691 val++;
aa8734ff 692
bb144ed1
KS
693 /* find value */
694 while (isspace(val[0]))
695 val++;
696
697 /* terminate key */
698 len = strlen(key);
699 if (len == 0)
700 return -1;
701 while (isspace(key[len-1]))
702 len--;
703 key[len] = '\0';
704
705 /* terminate value */
706 len = strlen(val);
707 if (len == 0)
708 return -1;
709 while (isspace(val[len-1]))
710 len--;
711 val[len] = '\0';
712
713 if (len == 0)
714 return -1;
715
716 /* unquote */
717 if (val[0] == '"' || val[0] == '\'') {
718 if (val[len-1] != val[0]) {
719 info(udev, "inconsistent quoting: '%s', skip\n", line);
720 return -1;
bd0ed2ff 721 }
bb144ed1
KS
722 val[len-1] = '\0';
723 val++;
724 }
725
86b57788 726 dbg(udev, "adding '%s'='%s'\n", key, val);
bb144ed1
KS
727
728 /* handle device, renamed by external tool, returning new path */
729 if (strcmp(key, "DEVPATH") == 0) {
730 char syspath[UTIL_PATH_SIZE];
731
732 info(udev, "updating devpath from '%s' to '%s'\n",
733 udev_device_get_devpath(dev), val);
065db052 734 util_strscpyl(syspath, sizeof(syspath), udev_get_sys_path(udev), val, NULL);
bb144ed1
KS
735 udev_device_set_syspath(dev, syspath);
736 } else {
737 struct udev_list_entry *entry;
738
739 entry = udev_device_add_property(dev, key, val);
b25a9454
KS
740 /* store in db, skip private keys */
741 if (key[0] != '.')
8958da13 742 udev_list_entry_set_num(entry, true);
bd0ed2ff 743 }
be4bedd1
KS
744 return 0;
745}
746
6880b25d 747static int import_file_into_properties(struct udev_device *dev, const char *filename)
be4bedd1 748{
bb144ed1
KS
749 FILE *f;
750 char line[UTIL_LINE_SIZE];
be4bedd1 751
bb144ed1
KS
752 f = fopen(filename, "r");
753 if (f == NULL)
be4bedd1 754 return -1;
fc42bd5d 755 while (fgets(line, sizeof(line), f) != NULL)
bb144ed1
KS
756 import_property_from_string(dev, line);
757 fclose(f);
be4bedd1 758 return 0;
bd0ed2ff
KS
759}
760
2181d30a 761static int import_program_into_properties(struct udev_event *event, const char *program, const sigset_t *sigmask)
319c6700 762{
2181d30a 763 struct udev_device *dev = event->dev;
d0db192f 764 char **envp;
851dd4dd 765 char result[UTIL_LINE_SIZE];
bb144ed1 766 char *line;
2181d30a 767 int err;
319c6700 768
d0db192f 769 envp = udev_device_get_properties_envp(dev);
2181d30a
KS
770 err = udev_event_spawn(event, program, envp, sigmask, result, sizeof(result));
771 if (err < 0)
772 return err;
bb144ed1
KS
773
774 line = result;
775 while (line != NULL) {
776 char *pos;
777
778 pos = strchr(line, '\n');
779 if (pos != NULL) {
780 pos[0] = '\0';
781 pos = &pos[1];
782 }
783 import_property_from_string(dev, line);
784 line = pos;
785 }
786 return 0;
319c6700
KS
787}
788
6880b25d 789static int import_parent_into_properties(struct udev_device *dev, const char *filter)
0bfb84e1 790{
bb144ed1 791 struct udev *udev = udev_device_get_udev(dev);
aa8734ff
KS
792 struct udev_device *dev_parent;
793 struct udev_list_entry *list_entry;
0bfb84e1 794
bb144ed1 795 dev_parent = udev_device_get_parent(dev);
aa8734ff
KS
796 if (dev_parent == NULL)
797 return -1;
0bfb84e1 798
bb144ed1 799 dbg(udev, "found parent '%s', get the node name\n", udev_device_get_syspath(dev_parent));
aa8734ff
KS
800 udev_list_entry_foreach(list_entry, udev_device_get_properties_list_entry(dev_parent)) {
801 const char *key = udev_list_entry_get_name(list_entry);
802 const char *val = udev_list_entry_get_value(list_entry);
0bfb84e1 803
aa8734ff
KS
804 if (fnmatch(filter, key, 0) == 0) {
805 struct udev_list_entry *entry;
e2ecb34f 806
bb144ed1
KS
807 dbg(udev, "import key '%s=%s'\n", key, val);
808 entry = udev_device_add_property(dev, key, val);
b25a9454
KS
809 /* store in db, skip private keys */
810 if (key[0] != '.')
8958da13 811 udev_list_entry_set_num(entry, true);
aa8734ff 812 }
e2ecb34f 813 }
aa8734ff 814 return 0;
e2ecb34f
KS
815}
816
c86be870 817#define WAIT_LOOP_PER_SECOND 50
6880b25d 818static int wait_for_file(struct udev_device *dev, const char *file, int timeout)
b2fe4b9a 819{
6880b25d 820 struct udev *udev = udev_device_get_udev(dev);
17fcfb59 821 char filepath[UTIL_PATH_SIZE];
1822e9b0 822 char devicepath[UTIL_PATH_SIZE];
b2fe4b9a
KS
823 struct stat stats;
824 int loop = timeout * WAIT_LOOP_PER_SECOND;
825
ea97dc37 826 /* a relative path is a device attribute */
1822e9b0 827 devicepath[0] = '\0';
ea97dc37 828 if (file[0] != '/') {
065db052
KS
829 util_strscpyl(devicepath, sizeof(devicepath),
830 udev_get_sys_path(udev), udev_device_get_devpath(dev), NULL);
831 util_strscpyl(filepath, sizeof(filepath), devicepath, "/", file, NULL);
ea97dc37
KS
832 file = filepath;
833 }
834
6880b25d 835 dbg(udev, "will wait %i sec for '%s'\n", timeout, file);
b2fe4b9a 836 while (--loop) {
959e8b5d
DM
837 const struct timespec duration = { 0, 1000 * 1000 * 1000 / WAIT_LOOP_PER_SECOND };
838
656ba91e 839 /* lookup file */
ea97dc37 840 if (stat(file, &stats) == 0) {
6880b25d 841 info(udev, "file '%s' appeared after %i loops\n", file, (timeout * WAIT_LOOP_PER_SECOND) - loop-1);
b2fe4b9a
KS
842 return 0;
843 }
eb5b8640 844 /* make sure, the device did not disappear in the meantime */
ea97dc37 845 if (devicepath[0] != '\0' && stat(devicepath, &stats) != 0) {
6880b25d 846 info(udev, "device disappeared while waiting for '%s'\n", file);
656ba91e
KS
847 return -2;
848 }
6880b25d 849 info(udev, "wait for '%s' for %i mseconds\n", file, 1000 / WAIT_LOOP_PER_SECOND);
959e8b5d 850 nanosleep(&duration, NULL);
b2fe4b9a 851 }
6880b25d 852 info(udev, "waiting for '%s' failed\n", file);
b2fe4b9a
KS
853 return -1;
854}
855
0ea5e96e
KS
856static int attr_subst_subdir(char *attr, size_t len)
857{
761dfddc 858 bool found = false;
0ea5e96e 859
065db052
KS
860 if (strstr(attr, "/*/")) {
861 char *pos;
862 char dirname[UTIL_PATH_SIZE];
863 const char *tail;
0ea5e96e
KS
864 DIR *dir;
865
065db052
KS
866 util_strscpy(dirname, sizeof(dirname), attr);
867 pos = strstr(dirname, "/*/");
868 if (pos == NULL)
869 return -1;
870 pos[0] = '\0';
871 tail = &pos[2];
872 dir = opendir(dirname);
0ea5e96e
KS
873 if (dir != NULL) {
874 struct dirent *dent;
875
876 for (dent = readdir(dir); dent != NULL; dent = readdir(dir)) {
877 struct stat stats;
878
879 if (dent->d_name[0] == '.')
880 continue;
065db052 881 util_strscpyl(attr, len, dirname, "/", dent->d_name, tail, NULL);
0ea5e96e 882 if (stat(attr, &stats) == 0) {
761dfddc 883 found = true;
0ea5e96e
KS
884 break;
885 }
0ea5e96e
KS
886 }
887 closedir(dir);
888 }
0ea5e96e
KS
889 }
890
891 return found;
892}
893
b0f7409f 894static int get_key(struct udev *udev, char **line, char **key, enum operation_type *op, char **value)
a0e5382d 895{
6880b25d
KS
896 char *linepos;
897 char *temp;
a0e5382d 898
6880b25d 899 linepos = *line;
9257ecfc 900 if (linepos == NULL || linepos[0] == '\0')
6880b25d 901 return -1;
a0e5382d 902
6880b25d
KS
903 /* skip whitespace */
904 while (isspace(linepos[0]) || linepos[0] == ',')
905 linepos++;
aa8734ff 906
6880b25d
KS
907 /* get the key */
908 if (linepos[0] == '\0')
909 return -1;
910 *key = linepos;
81313e1b 911
88cbfb09 912 for (;;) {
6880b25d
KS
913 linepos++;
914 if (linepos[0] == '\0')
915 return -1;
916 if (isspace(linepos[0]))
81313e1b 917 break;
6880b25d
KS
918 if (linepos[0] == '=')
919 break;
920 if ((linepos[0] == '+') || (linepos[0] == '!') || (linepos[0] == ':'))
921 if (linepos[1] == '=')
1ff1aa42 922 break;
953249a3
KS
923 }
924
6880b25d
KS
925 /* remember end of key */
926 temp = linepos;
b2fe4b9a 927
6880b25d
KS
928 /* skip whitespace after key */
929 while (isspace(linepos[0]))
930 linepos++;
931 if (linepos[0] == '\0')
932 return -1;
b2fe4b9a 933
6880b25d
KS
934 /* get operation type */
935 if (linepos[0] == '=' && linepos[1] == '=') {
b0f7409f 936 *op = OP_MATCH;
6880b25d
KS
937 linepos += 2;
938 } else if (linepos[0] == '!' && linepos[1] == '=') {
b0f7409f 939 *op = OP_NOMATCH;
6880b25d
KS
940 linepos += 2;
941 } else if (linepos[0] == '+' && linepos[1] == '=') {
b0f7409f 942 *op = OP_ADD;
6880b25d
KS
943 linepos += 2;
944 } else if (linepos[0] == '=') {
b0f7409f 945 *op = OP_ASSIGN;
6880b25d
KS
946 linepos++;
947 } else if (linepos[0] == ':' && linepos[1] == '=') {
b0f7409f 948 *op = OP_ASSIGN_FINAL;
6880b25d
KS
949 linepos += 2;
950 } else
951 return -1;
d0c8cb7d 952
6880b25d
KS
953 /* terminate key */
954 temp[0] = '\0';
95776dc6 955
6880b25d
KS
956 /* skip whitespace after operator */
957 while (isspace(linepos[0]))
958 linepos++;
959 if (linepos[0] == '\0')
960 return -1;
aa8734ff 961
ac218d9c 962 /* get the value */
6880b25d
KS
963 if (linepos[0] == '"')
964 linepos++;
965 else
966 return -1;
967 *value = linepos;
aa8734ff 968
ac218d9c 969 /* terminate */
6880b25d
KS
970 temp = strchr(linepos, '"');
971 if (!temp)
972 return -1;
973 temp[0] = '\0';
974 temp++;
5d6a1fa6 975 dbg(udev, "%s '%s'-'%s'\n", operation_str(*op), *key, *value);
aa8734ff 976
6880b25d
KS
977 /* move line to next key */
978 *line = temp;
979 return 0;
980}
95776dc6 981
6880b25d
KS
982/* extract possible KEY{attr} */
983static char *get_key_attribute(struct udev *udev, char *str)
984{
985 char *pos;
986 char *attr;
95776dc6 987
6880b25d
KS
988 attr = strchr(str, '{');
989 if (attr != NULL) {
990 attr++;
991 pos = strchr(attr, '}');
992 if (pos == NULL) {
993 err(udev, "missing closing brace for format\n");
994 return NULL;
95776dc6 995 }
6880b25d
KS
996 pos[0] = '\0';
997 dbg(udev, "attribute='%s'\n", attr);
998 return attr;
95776dc6 999 }
6880b25d
KS
1000 return NULL;
1001}
95776dc6 1002
0ef254d5
KS
1003static int rule_add_key(struct rule_tmp *rule_tmp, enum token_type type,
1004 enum operation_type op,
1005 const char *value, const void *data)
6880b25d
KS
1006{
1007 struct token *token = &rule_tmp->token[rule_tmp->token_cur];
32028733 1008 const char *attr = NULL;
ac218d9c
KS
1009
1010 memset(token, 0x00, sizeof(struct token));
6880b25d
KS
1011
1012 switch (type) {
6880b25d
KS
1013 case TK_M_ACTION:
1014 case TK_M_DEVPATH:
1015 case TK_M_KERNEL:
1016 case TK_M_SUBSYSTEM:
1017 case TK_M_DRIVER:
7aeeaedc 1018 case TK_M_WAITFOR:
6880b25d
KS
1019 case TK_M_DEVLINK:
1020 case TK_M_NAME:
1021 case TK_M_KERNELS:
1022 case TK_M_SUBSYSTEMS:
1023 case TK_M_DRIVERS:
7df0ed83 1024 case TK_M_TAGS:
6880b25d
KS
1025 case TK_M_PROGRAM:
1026 case TK_M_IMPORT_FILE:
1027 case TK_M_IMPORT_PROG:
5539f624 1028 case TK_M_IMPORT_DB:
c4f6dcc4 1029 case TK_M_IMPORT_CMDLINE:
6880b25d
KS
1030 case TK_M_IMPORT_PARENT:
1031 case TK_M_RESULT:
1032 case TK_A_OWNER:
1033 case TK_A_GROUP:
1034 case TK_A_MODE:
1035 case TK_A_NAME:
6880b25d 1036 case TK_A_GOTO:
3f896a2a 1037 case TK_M_TAG:
28460195 1038 case TK_A_TAG:
6880b25d 1039 token->key.value_off = add_string(rule_tmp->rules, value);
e57e7bc1 1040 break;
d7867b31 1041 case TK_M_IMPORT_BUILTIN:
81dadce5 1042 token->key.value_off = add_string(rule_tmp->rules, value);
d7867b31
KS
1043 token->key.builtin_cmd = *(enum udev_builtin_cmd *)data;
1044 break;
6880b25d
KS
1045 case TK_M_ENV:
1046 case TK_M_ATTR:
1047 case TK_M_ATTRS:
1048 case TK_A_ATTR:
1049 case TK_A_ENV:
32028733 1050 attr = data;
6880b25d
KS
1051 token->key.value_off = add_string(rule_tmp->rules, value);
1052 token->key.attr_off = add_string(rule_tmp->rules, attr);
1053 break;
6c29f2b9
KS
1054 case TK_A_DEVLINK:
1055 token->key.value_off = add_string(rule_tmp->rules, value);
1056 token->key.devlink_unique = *(int *)data;
1057 break;
6880b25d 1058 case TK_M_TEST:
6880b25d 1059 token->key.value_off = add_string(rule_tmp->rules, value);
ac218d9c
KS
1060 if (data != NULL)
1061 token->key.mode = *(mode_t *)data;
6880b25d 1062 break;
6880b25d
KS
1063 case TK_A_STRING_ESCAPE_NONE:
1064 case TK_A_STRING_ESCAPE_REPLACE:
9ead6627 1065 case TK_A_DB_PERSIST:
5d69a34c 1066 break;
6880b25d
KS
1067 case TK_A_RUN:
1068 token->key.value_off = add_string(rule_tmp->rules, value);
6880b25d 1069 break;
46f194cb 1070 case TK_A_INOTIFY_WATCH:
6880b25d
KS
1071 case TK_A_DEVLINK_PRIO:
1072 token->key.devlink_prio = *(int *)data;
1073 break;
1074 case TK_A_OWNER_ID:
1075 token->key.uid = *(uid_t *)data;
1076 break;
1077 case TK_A_GROUP_ID:
1078 token->key.gid = *(gid_t *)data;
1079 break;
1080 case TK_A_MODE_ID:
1081 token->key.mode = *(mode_t *)data;
1082 break;
761dfddc
KS
1083 case TK_A_STATIC_NODE:
1084 token->key.value_off = add_string(rule_tmp->rules, value);
1085 break;
2181d30a 1086 case TK_M_EVENT_TIMEOUT:
6880b25d
KS
1087 token->key.event_timeout = *(int *)data;
1088 break;
1089 case TK_RULE:
d15fcce4 1090 case TK_M_PARENTS_MIN:
b0f7409f 1091 case TK_M_PARENTS_MAX:
ac218d9c 1092 case TK_M_MAX:
6880b25d 1093 case TK_END:
ac218d9c 1094 case TK_UNSET:
6880b25d
KS
1095 err(rule_tmp->rules->udev, "wrong type %u\n", type);
1096 return -1;
724257d9 1097 }
ac218d9c 1098
fb045134
KS
1099 if (value != NULL && type < TK_M_MAX) {
1100 /* check if we need to split or call fnmatch() while matching rules */
32028733 1101 enum string_glob_type glob;
fb045134
KS
1102 int has_split;
1103 int has_glob;
1104
1105 has_split = (strchr(value, '|') != NULL);
32028733 1106 has_glob = (strchr(value, '*') != NULL || strchr(value, '?') != NULL || strchr(value, '[') != NULL);
fb045134
KS
1107 if (has_split && has_glob) {
1108 glob = GL_SPLIT_GLOB;
1109 } else if (has_split) {
1110 glob = GL_SPLIT;
1111 } else if (has_glob) {
1112 if (strcmp(value, "?*") == 0)
1113 glob = GL_SOMETHING;
1114 else
1115 glob = GL_GLOB;
32028733
KS
1116 } else {
1117 glob = GL_PLAIN;
ac218d9c 1118 }
32028733
KS
1119 token->key.glob = glob;
1120 }
1121
1122 if (value != NULL && type > TK_M_MAX) {
1123 /* check if assigned value has substitution chars */
1124 if (value[0] == '[')
1125 token->key.subst = SB_SUBSYS;
1126 else if (strchr(value, '%') != NULL || strchr(value, '$') != NULL)
1127 token->key.subst = SB_FORMAT;
1128 else
1129 token->key.subst = SB_NONE;
1130 }
1131
1132 if (attr != NULL) {
1133 /* check if property/attribut name has substitution chars */
1134 if (attr[0] == '[')
1135 token->key.attrsubst = SB_SUBSYS;
1136 else if (strchr(attr, '%') != NULL || strchr(attr, '$') != NULL)
1137 token->key.attrsubst = SB_FORMAT;
1138 else
1139 token->key.attrsubst = SB_NONE;
ac218d9c
KS
1140 }
1141
0ef254d5 1142 token->key.type = type;
6880b25d
KS
1143 token->key.op = op;
1144 rule_tmp->token_cur++;
1145 if (rule_tmp->token_cur >= ARRAY_SIZE(rule_tmp->token)) {
1146 err(rule_tmp->rules->udev, "temporary rule array too small\n");
1147 return -1;
e57e7bc1 1148 }
6880b25d
KS
1149 return 0;
1150}
e57e7bc1 1151
6880b25d
KS
1152static int sort_token(struct udev_rules *rules, struct rule_tmp *rule_tmp)
1153{
1154 unsigned int i;
1155 unsigned int start = 0;
1156 unsigned int end = rule_tmp->token_cur;
1157
1158 for (i = 0; i < rule_tmp->token_cur; i++) {
ac218d9c 1159 enum token_type next_val = TK_UNSET;
78715f65 1160 unsigned int next_idx = 0;
6880b25d
KS
1161 unsigned int j;
1162
1163 /* find smallest value */
1164 for (j = start; j < end; j++) {
ac218d9c 1165 if (rule_tmp->token[j].type == TK_UNSET)
6880b25d 1166 continue;
ac218d9c 1167 if (next_val == TK_UNSET || rule_tmp->token[j].type < next_val) {
6880b25d
KS
1168 next_val = rule_tmp->token[j].type;
1169 next_idx = j;
db6e59df 1170 }
5618b561 1171 }
5618b561 1172
6880b25d
KS
1173 /* add token and mark done */
1174 if (add_token(rules, &rule_tmp->token[next_idx]) != 0)
1175 return -1;
ac218d9c 1176 rule_tmp->token[next_idx].type = TK_UNSET;
956cf793 1177
6880b25d
KS
1178 /* shrink range */
1179 if (next_idx == start)
1180 start++;
1181 if (next_idx+1 == end)
1182 end--;
d0c8cb7d 1183 }
e57e7bc1 1184 return 0;
724257d9
GKH
1185}
1186
6880b25d
KS
1187static int add_rule(struct udev_rules *rules, char *line,
1188 const char *filename, unsigned int filename_off, unsigned int lineno)
724257d9 1189{
6880b25d
KS
1190 char *linepos;
1191 char *attr;
6880b25d 1192 struct rule_tmp rule_tmp;
724257d9 1193
6880b25d
KS
1194 memset(&rule_tmp, 0x00, sizeof(struct rule_tmp));
1195 rule_tmp.rules = rules;
1196 rule_tmp.rule.type = TK_RULE;
1197 rule_tmp.rule.rule.filename_off = filename_off;
0ef254d5 1198 rule_tmp.rule.rule.filename_line = lineno;
724257d9 1199
6880b25d 1200 linepos = line;
88cbfb09 1201 for (;;) {
6880b25d
KS
1202 char *key;
1203 char *value;
ac218d9c 1204 enum operation_type op;
6880b25d
KS
1205
1206 if (get_key(rules->udev, &linepos, &key, &op, &value) != 0)
6bf0ffe8
KS
1207 break;
1208
bd75fddb 1209 if (strcmp(key, "ACTION") == 0) {
b0f7409f 1210 if (op > OP_MATCH_MAX) {
6880b25d
KS
1211 err(rules->udev, "invalid ACTION operation\n");
1212 goto invalid;
1213 }
0ef254d5 1214 rule_add_key(&rule_tmp, TK_M_ACTION, op, value, NULL);
bf5d2964
KS
1215 continue;
1216 }
1217
bd75fddb 1218 if (strcmp(key, "DEVPATH") == 0) {
b0f7409f 1219 if (op > OP_MATCH_MAX) {
6880b25d
KS
1220 err(rules->udev, "invalid DEVPATH operation\n");
1221 goto invalid;
fd9efc00 1222 }
0ef254d5 1223 rule_add_key(&rule_tmp, TK_M_DEVPATH, op, value, NULL);
6880b25d
KS
1224 continue;
1225 }
c7521974 1226
bd75fddb 1227 if (strcmp(key, "KERNEL") == 0) {
b0f7409f 1228 if (op > OP_MATCH_MAX) {
c7521974
KS
1229 err(rules->udev, "invalid KERNEL operation\n");
1230 goto invalid;
1231 }
0ef254d5 1232 rule_add_key(&rule_tmp, TK_M_KERNEL, op, value, NULL);
c7521974
KS
1233 continue;
1234 }
1235
bd75fddb 1236 if (strcmp(key, "SUBSYSTEM") == 0) {
b0f7409f 1237 if (op > OP_MATCH_MAX) {
c7521974
KS
1238 err(rules->udev, "invalid SUBSYSTEM operation\n");
1239 goto invalid;
1240 }
1241 /* bus, class, subsystem events should all be the same */
1242 if (strcmp(value, "subsystem") == 0 ||
1243 strcmp(value, "bus") == 0 ||
1244 strcmp(value, "class") == 0) {
1245 if (strcmp(value, "bus") == 0 || strcmp(value, "class") == 0)
1246 err(rules->udev, "'%s' must be specified as 'subsystem' \n"
1247 "please fix it in %s:%u", value, filename, lineno);
0ef254d5 1248 rule_add_key(&rule_tmp, TK_M_SUBSYSTEM, op, "subsystem|class|bus", NULL);
c7521974 1249 } else
0ef254d5 1250 rule_add_key(&rule_tmp, TK_M_SUBSYSTEM, op, value, NULL);
c7521974
KS
1251 continue;
1252 }
1253
bd75fddb 1254 if (strcmp(key, "DRIVER") == 0) {
b0f7409f 1255 if (op > OP_MATCH_MAX) {
c7521974
KS
1256 err(rules->udev, "invalid DRIVER operation\n");
1257 goto invalid;
1258 }
0ef254d5 1259 rule_add_key(&rule_tmp, TK_M_DRIVER, op, value, NULL);
c7521974
KS
1260 continue;
1261 }
1262
bd75fddb 1263 if (strncmp(key, "ATTR{", sizeof("ATTR{")-1) == 0) {
6880b25d 1264 attr = get_key_attribute(rules->udev, key + sizeof("ATTR")-1);
c7521974
KS
1265 if (attr == NULL) {
1266 err(rules->udev, "error parsing ATTR attribute\n");
1267 goto invalid;
1268 }
b0f7409f 1269 if (op < OP_MATCH_MAX) {
0ef254d5 1270 rule_add_key(&rule_tmp, TK_M_ATTR, op, value, attr);
6880b25d 1271 } else {
0ef254d5 1272 rule_add_key(&rule_tmp, TK_A_ATTR, op, value, attr);
6880b25d 1273 }
c7521974
KS
1274 continue;
1275 }
1276
6d87ee2e 1277 if (strcmp(key, "KERNELS") == 0) {
b0f7409f 1278 if (op > OP_MATCH_MAX) {
c7521974
KS
1279 err(rules->udev, "invalid KERNELS operation\n");
1280 goto invalid;
1281 }
0ef254d5 1282 rule_add_key(&rule_tmp, TK_M_KERNELS, op, value, NULL);
c7521974
KS
1283 continue;
1284 }
1285
6d87ee2e
KS
1286 if (strcmp(key, "SUBSYSTEMS") == 0) {
1287 if (op > OP_MATCH_MAX) {
1288 err(rules->udev, "invalid SUBSYSTEMS operation\n");
1289 goto invalid;
1290 }
1291 rule_add_key(&rule_tmp, TK_M_SUBSYSTEMS, op, value, NULL);
1292 continue;
1293 }
1294
bd75fddb 1295 if (strcmp(key, "DRIVERS") == 0) {
b0f7409f 1296 if (op > OP_MATCH_MAX) {
c7521974
KS
1297 err(rules->udev, "invalid DRIVERS operation\n");
1298 goto invalid;
1299 }
0ef254d5 1300 rule_add_key(&rule_tmp, TK_M_DRIVERS, op, value, NULL);
c7521974
KS
1301 continue;
1302 }
1303
6d87ee2e 1304 if (strncmp(key, "ATTRS{", sizeof("ATTRS{")-1) == 0) {
b0f7409f 1305 if (op > OP_MATCH_MAX) {
c7521974
KS
1306 err(rules->udev, "invalid ATTRS operation\n");
1307 goto invalid;
1308 }
6880b25d 1309 attr = get_key_attribute(rules->udev, key + sizeof("ATTRS")-1);
c7521974
KS
1310 if (attr == NULL) {
1311 err(rules->udev, "error parsing ATTRS attribute\n");
1312 goto invalid;
1313 }
1314 if (strncmp(attr, "device/", 7) == 0)
1315 err(rules->udev, "the 'device' link may not be available in a future kernel, "
1316 "please fix it in %s:%u", filename, lineno);
1317 else if (strstr(attr, "../") != NULL)
1318 err(rules->udev, "do not reference parent sysfs directories directly, "
1319 "it may break with a future kernel, please fix it in %s:%u", filename, lineno);
0ef254d5 1320 rule_add_key(&rule_tmp, TK_M_ATTRS, op, value, attr);
c7521974
KS
1321 continue;
1322 }
1323
7df0ed83
KS
1324 if (strcmp(key, "TAGS") == 0) {
1325 if (op > OP_MATCH_MAX) {
1326 err(rules->udev, "invalid TAGS operation\n");
1327 goto invalid;
1328 }
1329 rule_add_key(&rule_tmp, TK_M_TAGS, op, value, NULL);
1330 continue;
1331 }
1332
bd75fddb 1333 if (strncmp(key, "ENV{", sizeof("ENV{")-1) == 0) {
6880b25d 1334 attr = get_key_attribute(rules->udev, key + sizeof("ENV")-1);
c7521974
KS
1335 if (attr == NULL) {
1336 err(rules->udev, "error parsing ENV attribute\n");
1337 goto invalid;
1338 }
b0f7409f 1339 if (op < OP_MATCH_MAX) {
0ef254d5 1340 if (rule_add_key(&rule_tmp, TK_M_ENV, op, value, attr) != 0)
6880b25d
KS
1341 goto invalid;
1342 } else {
ace6bfa7
KS
1343 static const char *blacklist[] = {
1344 "ACTION",
1345 "SUBSYSTEM",
1346 "DEVTYPE",
1347 "MAJOR",
1348 "MINOR",
1349 "DRIVER",
1350 "IFINDEX",
1351 "DEVNAME",
1352 "DEVLINKS",
1353 "DEVPATH",
1354 "TAGS",
1355 };
1356 unsigned int i;
1357
1358 for (i = 0; i < ARRAY_SIZE(blacklist); i++)
1359 if (strcmp(attr, blacklist[i]) == 0) {
1360 err(rules->udev, "invalid ENV attribute, '%s' can not be set %s:%u\n", attr, filename, lineno);
1361 continue;
1362 }
0ef254d5 1363 if (rule_add_key(&rule_tmp, TK_A_ENV, op, value, attr) != 0)
6880b25d
KS
1364 goto invalid;
1365 }
c7521974
KS
1366 continue;
1367 }
1368
28460195 1369 if (strcmp(key, "TAG") == 0) {
3f896a2a
KS
1370 if (op < OP_MATCH_MAX)
1371 rule_add_key(&rule_tmp, TK_M_TAG, op, value, NULL);
1372 else
1373 rule_add_key(&rule_tmp, TK_A_TAG, op, value, NULL);
28460195
KS
1374 continue;
1375 }
1376
bd75fddb 1377 if (strcmp(key, "PROGRAM") == 0) {
0ef254d5 1378 rule_add_key(&rule_tmp, TK_M_PROGRAM, op, value, NULL);
c7521974
KS
1379 continue;
1380 }
1381
bd75fddb 1382 if (strcmp(key, "RESULT") == 0) {
b0f7409f 1383 if (op > OP_MATCH_MAX) {
c7521974
KS
1384 err(rules->udev, "invalid RESULT operation\n");
1385 goto invalid;
1386 }
0ef254d5 1387 rule_add_key(&rule_tmp, TK_M_RESULT, op, value, NULL);
c7521974
KS
1388 continue;
1389 }
1390
bd75fddb 1391 if (strncmp(key, "IMPORT", sizeof("IMPORT")-1) == 0) {
6880b25d 1392 attr = get_key_attribute(rules->udev, key + sizeof("IMPORT")-1);
d7867b31
KS
1393 if (attr == NULL) {
1394 err(rules->udev, "IMPORT{} type missing, ignoring IMPORT %s:%u\n", filename, lineno);
1395 continue;
1396 }
1397 if (strstr(attr, "program")) {
1398 /* find known built-in command */
1399 if (value[0] != '/') {
d7867b31
KS
1400 enum udev_builtin_cmd cmd;
1401
81dadce5 1402 cmd = udev_builtin_lookup(value);
d7867b31 1403 if (cmd < UDEV_BUILTIN_MAX) {
81dadce5
KS
1404 info(rules->udev, "IMPORT found builtin '%s', replacing %s:%u\n",
1405 value, filename, lineno);
1406 rule_add_key(&rule_tmp, TK_M_IMPORT_BUILTIN, op, value, &cmd);
d7867b31
KS
1407 continue;
1408 }
1409 }
c7521974 1410 dbg(rules->udev, "IMPORT will be executed\n");
0ef254d5 1411 rule_add_key(&rule_tmp, TK_M_IMPORT_PROG, op, value, NULL);
d7867b31
KS
1412 } else if (strstr(attr, "builtin")) {
1413 enum udev_builtin_cmd cmd = udev_builtin_lookup(value);
1414
1415 dbg(rules->udev, "IMPORT execute builtin\n");
1416 if (cmd < UDEV_BUILTIN_MAX)
81dadce5 1417 rule_add_key(&rule_tmp, TK_M_IMPORT_BUILTIN, op, value, &cmd);
d7867b31
KS
1418 else
1419 err(rules->udev, "IMPORT{builtin}: '%s' unknown %s:%u\n", value, filename, lineno);
1420 } else if (strstr(attr, "file")) {
c7521974 1421 dbg(rules->udev, "IMPORT will be included as file\n");
0ef254d5 1422 rule_add_key(&rule_tmp, TK_M_IMPORT_FILE, op, value, NULL);
d7867b31 1423 } else if (strstr(attr, "db")) {
5539f624
KS
1424 dbg(rules->udev, "IMPORT will include db values\n");
1425 rule_add_key(&rule_tmp, TK_M_IMPORT_DB, op, value, NULL);
d7867b31 1426 } else if (strstr(attr, "cmdline")) {
c4f6dcc4
KS
1427 dbg(rules->udev, "IMPORT will include db values\n");
1428 rule_add_key(&rule_tmp, TK_M_IMPORT_CMDLINE, op, value, NULL);
d7867b31 1429 } else if (strstr(attr, "parent")) {
c7521974 1430 dbg(rules->udev, "IMPORT will include the parent values\n");
0ef254d5 1431 rule_add_key(&rule_tmp, TK_M_IMPORT_PARENT, op, value, NULL);
c7521974 1432 }
c7521974
KS
1433 continue;
1434 }
1435
bd75fddb 1436 if (strncmp(key, "TEST", sizeof("TEST")-1) == 0) {
6880b25d
KS
1437 mode_t mode = 0;
1438
b0f7409f 1439 if (op > OP_MATCH_MAX) {
c7521974
KS
1440 err(rules->udev, "invalid TEST operation\n");
1441 goto invalid;
1442 }
6880b25d
KS
1443 attr = get_key_attribute(rules->udev, key + sizeof("TEST")-1);
1444 if (attr != NULL) {
1445 mode = strtol(attr, NULL, 8);
0ef254d5 1446 rule_add_key(&rule_tmp, TK_M_TEST, op, value, &mode);
6880b25d 1447 } else {
0ef254d5 1448 rule_add_key(&rule_tmp, TK_M_TEST, op, value, NULL);
6880b25d 1449 }
c7521974
KS
1450 continue;
1451 }
1452
289a1821
KS
1453 if (strcmp(key, "RUN") == 0) {
1454 rule_add_key(&rule_tmp, TK_A_RUN, op, value, NULL);
c7521974
KS
1455 continue;
1456 }
1457
bd75fddb 1458 if (strcmp(key, "WAIT_FOR") == 0 || strcmp(key, "WAIT_FOR_SYSFS") == 0) {
0ef254d5 1459 rule_add_key(&rule_tmp, TK_M_WAITFOR, 0, value, NULL);
c7521974
KS
1460 continue;
1461 }
1462
bd75fddb 1463 if (strcmp(key, "LABEL") == 0) {
6880b25d 1464 rule_tmp.rule.rule.label_off = add_string(rules, value);
c7521974
KS
1465 continue;
1466 }
1467
bd75fddb 1468 if (strcmp(key, "GOTO") == 0) {
0ef254d5 1469 rule_add_key(&rule_tmp, TK_A_GOTO, 0, value, NULL);
c7521974
KS
1470 continue;
1471 }
1472
bd75fddb 1473 if (strncmp(key, "NAME", sizeof("NAME")-1) == 0) {
b0f7409f 1474 if (op < OP_MATCH_MAX) {
0ef254d5 1475 rule_add_key(&rule_tmp, TK_M_NAME, op, value, NULL);
6880b25d 1476 } else {
75cb1ac5 1477 if (strcmp(value, "%k") == 0) {
d0d7b8d0 1478 err(rules->udev, "NAME=\"%%k\" is ignored, because it breaks kernel supplied names, "
75cb1ac5
KS
1479 "please remove it from %s:%u\n", filename, lineno);
1480 continue;
1481 }
d0d7b8d0
KS
1482 if (value[0] == '\0') {
1483 info(rules->udev, "NAME=\"\" is ignored, because udev will not delete any device nodes, "
1484 "please remove it from %s:%u\n", filename, lineno);
75cb1ac5 1485 continue;
d0d7b8d0 1486 }
0ef254d5 1487 rule_add_key(&rule_tmp, TK_A_NAME, op, value, NULL);
c7521974 1488 }
761dfddc 1489 rule_tmp.rule.rule.can_set_name = true;
c7521974
KS
1490 continue;
1491 }
1492
bcb8b231 1493 if (strncmp(key, "SYMLINK", sizeof("SYMLINK")-1) == 0) {
6c29f2b9 1494 if (op < OP_MATCH_MAX) {
0ef254d5 1495 rule_add_key(&rule_tmp, TK_M_DEVLINK, op, value, NULL);
6c29f2b9
KS
1496 } else {
1497 int flag = 0;
1498
1499 attr = get_key_attribute(rules->udev, key + sizeof("SYMLINK")-1);
1500 if (attr != NULL && strstr(attr, "unique") != NULL)
1501 flag = 1;
1502 rule_add_key(&rule_tmp, TK_A_DEVLINK, op, value, &flag);
1503 }
761dfddc 1504 rule_tmp.rule.rule.can_set_name = true;
b0f7409f
KS
1505 continue;
1506 }
c7521974 1507
bd75fddb 1508 if (strcmp(key, "OWNER") == 0) {
6880b25d
KS
1509 uid_t uid;
1510 char *endptr;
1511
1512 uid = strtoul(value, &endptr, 10);
1513 if (endptr[0] == '\0') {
0ef254d5 1514 rule_add_key(&rule_tmp, TK_A_OWNER_ID, op, NULL, &uid);
5f03ed8a 1515 } else if ((rules->resolve_names > 0) && strchr("$%", value[0]) == NULL) {
154a7b84 1516 uid = add_uid(rules, value);
0ef254d5 1517 rule_add_key(&rule_tmp, TK_A_OWNER_ID, op, NULL, &uid);
055e40ed 1518 } else if (rules->resolve_names >= 0) {
0ef254d5 1519 rule_add_key(&rule_tmp, TK_A_OWNER, op, value, NULL);
c7521974 1520 }
761dfddc 1521 rule_tmp.rule.rule.can_set_name = true;
c7521974
KS
1522 continue;
1523 }
1524
bd75fddb 1525 if (strcmp(key, "GROUP") == 0) {
6880b25d
KS
1526 gid_t gid;
1527 char *endptr;
1528
1529 gid = strtoul(value, &endptr, 10);
1530 if (endptr[0] == '\0') {
0ef254d5 1531 rule_add_key(&rule_tmp, TK_A_GROUP_ID, op, NULL, &gid);
5f03ed8a 1532 } else if ((rules->resolve_names > 0) && strchr("$%", value[0]) == NULL) {
154a7b84 1533 gid = add_gid(rules, value);
0ef254d5 1534 rule_add_key(&rule_tmp, TK_A_GROUP_ID, op, NULL, &gid);
055e40ed 1535 } else if (rules->resolve_names >= 0) {
0ef254d5 1536 rule_add_key(&rule_tmp, TK_A_GROUP, op, value, NULL);
c7521974 1537 }
761dfddc 1538 rule_tmp.rule.rule.can_set_name = true;
c7521974
KS
1539 continue;
1540 }
1541
bd75fddb 1542 if (strcmp(key, "MODE") == 0) {
6880b25d
KS
1543 mode_t mode;
1544 char *endptr;
1545
1546 mode = strtol(value, &endptr, 8);
1547 if (endptr[0] == '\0')
0ef254d5 1548 rule_add_key(&rule_tmp, TK_A_MODE_ID, op, NULL, &mode);
6880b25d 1549 else
0ef254d5 1550 rule_add_key(&rule_tmp, TK_A_MODE, op, value, NULL);
761dfddc 1551 rule_tmp.rule.rule.can_set_name = true;
c7521974
KS
1552 continue;
1553 }
1554
bd75fddb 1555 if (strcmp(key, "OPTIONS") == 0) {
c7521974
KS
1556 const char *pos;
1557
c7521974
KS
1558 pos = strstr(value, "link_priority=");
1559 if (pos != NULL) {
6880b25d
KS
1560 int prio = atoi(&pos[strlen("link_priority=")]);
1561
3b529da4 1562 rule_add_key(&rule_tmp, TK_A_DEVLINK_PRIO, op, NULL, &prio);
6880b25d 1563 dbg(rules->udev, "link priority=%i\n", prio);
c7521974 1564 }
9ead6627 1565
c7521974
KS
1566 pos = strstr(value, "event_timeout=");
1567 if (pos != NULL) {
6880b25d
KS
1568 int tout = atoi(&pos[strlen("event_timeout=")]);
1569
2181d30a 1570 rule_add_key(&rule_tmp, TK_M_EVENT_TIMEOUT, op, NULL, &tout);
214a6c79 1571 dbg(rules->udev, "event timeout=%i\n", tout);
c7521974 1572 }
9ead6627 1573
c7521974
KS
1574 pos = strstr(value, "string_escape=");
1575 if (pos != NULL) {
1576 pos = &pos[strlen("string_escape=")];
1577 if (strncmp(pos, "none", strlen("none")) == 0)
3b529da4 1578 rule_add_key(&rule_tmp, TK_A_STRING_ESCAPE_NONE, op, NULL, NULL);
c7521974 1579 else if (strncmp(pos, "replace", strlen("replace")) == 0)
3b529da4 1580 rule_add_key(&rule_tmp, TK_A_STRING_ESCAPE_REPLACE, op, NULL, NULL);
c7521974 1581 }
9ead6627 1582
d3990a57 1583 pos = strstr(value, "db_persist");
9ead6627
KS
1584 if (pos != NULL)
1585 rule_add_key(&rule_tmp, TK_A_DB_PERSIST, op, NULL, NULL);
1586
46f194cb 1587 pos = strstr(value, "nowatch");
bd284db1 1588 if (pos != NULL) {
46f194cb
KS
1589 const int off = 0;
1590
3b529da4 1591 rule_add_key(&rule_tmp, TK_A_INOTIFY_WATCH, op, NULL, &off);
46f194cb
KS
1592 dbg(rules->udev, "inotify watch of device disabled\n");
1593 } else {
1594 pos = strstr(value, "watch");
1595 if (pos != NULL) {
1596 const int on = 1;
1597
3b529da4 1598 rule_add_key(&rule_tmp, TK_A_INOTIFY_WATCH, op, NULL, &on);
46f194cb
KS
1599 dbg(rules->udev, "inotify watch of device requested\n");
1600 }
bd284db1 1601 }
9ead6627 1602
761dfddc
KS
1603 pos = strstr(value, "static_node=");
1604 if (pos != NULL) {
3b529da4 1605 rule_add_key(&rule_tmp, TK_A_STATIC_NODE, op, &pos[strlen("static_node=")], NULL);
761dfddc
KS
1606 rule_tmp.rule.rule.has_static_node = true;
1607 }
9ead6627 1608
c7521974
KS
1609 continue;
1610 }
95691487 1611
c7521974 1612 err(rules->udev, "unknown key '%s' in %s:%u\n", key, filename, lineno);
95691487 1613 goto invalid;
c7521974
KS
1614 }
1615
6880b25d 1616 /* add rule token */
3f3aa9f5 1617 rule_tmp.rule.rule.token_count = 1 + rule_tmp.token_cur;
6880b25d
KS
1618 if (add_token(rules, &rule_tmp.rule) != 0)
1619 goto invalid;
c7521974 1620
6880b25d
KS
1621 /* add tokens to list, sorted by type */
1622 if (sort_token(rules, &rule_tmp) != 0)
1623 goto invalid;
3f3aa9f5 1624
6880b25d 1625 return 0;
c7521974
KS
1626invalid:
1627 err(rules->udev, "invalid rule '%s:%u'\n", filename, lineno);
1628 return -1;
1629}
1630
0ef254d5 1631static int parse_file(struct udev_rules *rules, const char *filename, unsigned short filename_off)
c7521974
KS
1632{
1633 FILE *f;
77f89e93 1634 unsigned int first_token;
c7521974 1635 char line[UTIL_LINE_SIZE];
6880b25d
KS
1636 int line_nr = 0;
1637 unsigned int i;
c7521974 1638
c7521974
KS
1639 info(rules->udev, "reading '%s' as rules file\n", filename);
1640
1641 f = fopen(filename, "r");
1642 if (f == NULL)
1643 return -1;
77f89e93
KS
1644
1645 first_token = rules->token_cur;
1646
335e316a 1647 while (fgets(line, sizeof(line), f) != NULL) {
c7521974
KS
1648 char *key;
1649 size_t len;
1650
1651 /* skip whitespace */
1652 line_nr++;
1653 key = line;
1654 while (isspace(key[0]))
1655 key++;
1656
1657 /* comment */
1658 if (key[0] == '#')
1659 continue;
1660
1661 len = strlen(line);
1662 if (len < 3)
1663 continue;
1664
1665 /* continue reading if backslash+newline is found */
1666 while (line[len-2] == '\\') {
1667 if (fgets(&line[len-2], (sizeof(line)-len)+2, f) == NULL)
1668 break;
6d691b2b
FZ
1669 if (strlen(&line[len-2]) < 2)
1670 break;
c7521974
KS
1671 line_nr++;
1672 len = strlen(line);
1673 }
1674
1675 if (len+1 >= sizeof(line)) {
1676 err(rules->udev, "line too long '%s':%u, ignored\n", filename, line_nr);
1677 continue;
1678 }
6880b25d 1679 add_rule(rules, key, filename, filename_off, line_nr);
c7521974
KS
1680 }
1681 fclose(f);
1682
6880b25d 1683 /* link GOTOs to LABEL rules in this file to be able to fast-forward */
77f89e93 1684 for (i = first_token+1; i < rules->token_cur; i++) {
6880b25d
KS
1685 if (rules->tokens[i].type == TK_A_GOTO) {
1686 char *label = &rules->buf[rules->tokens[i].key.value_off];
1687 unsigned int j;
1688
1689 for (j = i+1; j < rules->token_cur; j++) {
1690 if (rules->tokens[j].type != TK_RULE)
1691 continue;
1692 if (rules->tokens[j].rule.label_off == 0)
1693 continue;
1694 if (strcmp(label, &rules->buf[rules->tokens[j].rule.label_off]) != 0)
1695 continue;
1696 rules->tokens[i].key.rule_goto = j;
0c377989 1697 break;
c7521974 1698 }
6880b25d
KS
1699 if (rules->tokens[i].key.rule_goto == 0)
1700 err(rules->udev, "GOTO '%s' has no matching label in: '%s'\n", label, filename);
c7521974
KS
1701 }
1702 }
1703 return 0;
1704}
1705
869c9031 1706static int add_matching_files(struct udev *udev, struct udev_list *file_list, const char *dirname, const char *suffix)
c7521974 1707{
c7521974 1708 DIR *dir;
c7c32e9c 1709 struct dirent *dent;
c7521974
KS
1710 char filename[UTIL_PATH_SIZE];
1711
1712 dbg(udev, "open directory '%s'\n", dirname);
1713 dir = opendir(dirname);
1714 if (dir == NULL) {
92e52e2f 1715 info(udev, "unable to open '%s': %m\n", dirname);
c7521974
KS
1716 return -1;
1717 }
1718
c7c32e9c 1719 for (dent = readdir(dir); dent != NULL; dent = readdir(dir)) {
78230c0d 1720 if (dent->d_name[0] == '.')
c7521974
KS
1721 continue;
1722
1723 /* look for file matching with specified suffix */
1724 if (suffix != NULL) {
1725 const char *ext;
1726
78230c0d 1727 ext = strrchr(dent->d_name, '.');
c7521974
KS
1728 if (ext == NULL)
1729 continue;
1730 if (strcmp(ext, suffix) != 0)
1731 continue;
1732 }
e6c1a2bd
KS
1733 util_strscpyl(filename, sizeof(filename), dirname, "/", dent->d_name, NULL);
1734 dbg(udev, "put file '%s' into list\n", filename);
c7c32e9c
KS
1735 /*
1736 * the basename is the key, the filename the value
1737 * identical basenames from different directories overwrite each other
1738 * entries are sorted after basename
1739 */
869c9031 1740 udev_list_entry_add(file_list, dent->d_name, filename);
c7521974
KS
1741 }
1742
1743 closedir(dir);
1744 return 0;
1745}
1746
d7ddce18 1747struct udev_rules *udev_rules_new(struct udev *udev, int resolve_names)
c7521974 1748{
d7ddce18 1749 struct udev_rules *rules;
869c9031 1750 struct udev_list file_list;
c7c32e9c 1751 struct udev_list_entry *file_loop;
6880b25d 1752 struct token end_token;
c7521974 1753
27f4528b 1754 rules = calloc(1, sizeof(struct udev_rules));
d7ddce18 1755 if (rules == NULL)
6880b25d 1756 return NULL;
c7521974
KS
1757 rules->udev = udev;
1758 rules->resolve_names = resolve_names;
869c9031 1759 udev_list_init(udev, &file_list, true);
c7521974 1760
6880b25d
KS
1761 /* init token array and string buffer */
1762 rules->tokens = malloc(PREALLOC_TOKEN * sizeof(struct token));
1851332c
YK
1763 if (rules->tokens == NULL) {
1764 free(rules);
34d6a259 1765 return NULL;
1851332c 1766 }
34d6a259 1767 rules->token_max = PREALLOC_TOKEN;
bcf44d55 1768
6880b25d 1769 rules->buf = malloc(PREALLOC_STRBUF);
1851332c
YK
1770 if (rules->buf == NULL) {
1771 free(rules->tokens);
1772 free(rules);
34d6a259 1773 return NULL;
1851332c 1774 }
34d6a259
KS
1775 rules->buf_max = PREALLOC_STRBUF;
1776 /* offset 0 is always '\0' */
1777 rules->buf[0] = '\0';
1778 rules->buf_cur = 1;
86b57788
KS
1779 dbg(udev, "prealloc %zu bytes tokens (%u * %zu bytes), %zu bytes buffer\n",
1780 rules->token_max * sizeof(struct token), rules->token_max, sizeof(struct token), rules->buf_max);
6880b25d 1781
bcf44d55 1782 rules->trie_nodes = malloc(PREALLOC_TRIE * sizeof(struct trie_node));
1851332c
YK
1783 if (rules->trie_nodes == NULL) {
1784 free(rules->buf);
1785 free(rules->tokens);
1786 free(rules);
bcf44d55 1787 return NULL;
1851332c 1788 }
bcf44d55 1789 rules->trie_nodes_max = PREALLOC_TRIE;
949075db 1790 /* offset 0 is the trie root, with an empty string */
023ed7b0 1791 memset(rules->trie_nodes, 0x00, sizeof(struct trie_node));
bcf44d55
KS
1792 rules->trie_nodes_cur = 1;
1793
c7c32e9c
KS
1794 if (udev_get_rules_path(udev) == NULL) {
1795 char filename[UTIL_PATH_SIZE];
c7521974 1796
12a362be 1797 /* /usr/lib/udev -- system rules */
c7c32e9c
KS
1798 add_matching_files(udev, &file_list, LIBEXECDIR "/rules.d", ".rules");
1799
12a362be 1800 /* /etc/udev -- local administration rules */
c7521974
KS
1801 add_matching_files(udev, &file_list, SYSCONFDIR "/udev/rules.d", ".rules");
1802
12a362be 1803 /* /run/udev -- runtime rules */
4ec9c3e7 1804 util_strscpyl(filename, sizeof(filename), udev_get_run_path(udev), "/rules.d", NULL);
c7c32e9c
KS
1805 add_matching_files(udev, &file_list, filename, ".rules");
1806 } else {
1807 /* custom rules files location for testing */
1808 add_matching_files(udev, &file_list, udev_get_rules_path(udev), ".rules");
c7521974
KS
1809 }
1810
0ef254d5
KS
1811 /* add all filenames to the string buffer */
1812 udev_list_entry_foreach(file_loop, udev_list_get_entry(&file_list)) {
c7c32e9c 1813 const char *filename = udev_list_entry_get_value(file_loop);
0ef254d5
KS
1814 unsigned int filename_off;
1815
1816 filename_off = add_string(rules, filename);
1817 /* the offset in the rule is limited to unsigned short */
1818 if (filename_off < USHRT_MAX)
8958da13 1819 udev_list_entry_set_num(file_loop, filename_off);
0ef254d5
KS
1820 }
1821
c7c32e9c
KS
1822 /* parse all rules files */
1823 udev_list_entry_foreach(file_loop, udev_list_get_entry(&file_list)) {
1824 const char *filename = udev_list_entry_get_value(file_loop);
8958da13 1825 unsigned int filename_off = udev_list_entry_get_num(file_loop);
a178e7fe 1826 struct stat st;
c7521974 1827
a178e7fe
KS
1828 if (stat(filename, &st) != 0) {
1829 err(udev, "can not find '%s': %m\n", filename);
1830 continue;
1831 }
1832 if (S_ISREG(st.st_mode) && st.st_size <= 0) {
1833 info(udev, "ignore empty '%s'\n", filename);
1834 continue;
1835 }
1836 if (S_ISCHR(st.st_mode)) {
1837 info(udev, "ignore masked '%s'\n", filename);
1838 continue;
1839 }
1840 parse_file(rules, filename, filename_off);
c7521974 1841 }
869c9031 1842 udev_list_cleanup(&file_list);
6880b25d
KS
1843
1844 memset(&end_token, 0x00, sizeof(struct token));
1845 end_token.type = TK_END;
1846 add_token(rules, &end_token);
1847
154a7b84 1848 /* shrink allocated token and string buffer */
6880b25d
KS
1849 if (rules->token_cur < rules->token_max) {
1850 struct token *tokens;
1851
1852 tokens = realloc(rules->tokens, rules->token_cur * sizeof(struct token));
1853 if (tokens != NULL || rules->token_cur == 0) {
1854 rules->tokens = tokens;
1855 rules->token_max = rules->token_cur;
1856 }
1857 }
1858 if (rules->buf_cur < rules->buf_max) {
1859 char *buf;
1860
1861 buf = realloc(rules->buf, rules->buf_cur);
1862 if (buf != NULL || rules->buf_cur == 0) {
1863 rules->buf = buf;
1864 rules->buf_max = rules->buf_cur;
1865 }
1866 }
0dd9f015 1867 info(udev, "rules use %zu bytes tokens (%u * %zu bytes), %zu bytes buffer\n",
6880b25d 1868 rules->token_max * sizeof(struct token), rules->token_max, sizeof(struct token), rules->buf_max);
023ed7b0
KS
1869 info(udev, "temporary index used %zu bytes (%u * %zu bytes)\n",
1870 rules->trie_nodes_cur * sizeof(struct trie_node),
1871 rules->trie_nodes_cur, sizeof(struct trie_node));
1449a55d
AJ
1872
1873 /* cleanup trie */
bcf44d55
KS
1874 free(rules->trie_nodes);
1875 rules->trie_nodes = NULL;
1876 rules->trie_nodes_cur = 0;
1877 rules->trie_nodes_max = 0;
6880b25d 1878
154a7b84
KS
1879 /* cleanup uid/gid cache */
1880 free(rules->uids);
1881 rules->uids = NULL;
1882 rules->uids_cur = 0;
1883 rules->uids_max = 0;
1884 free(rules->gids);
1885 rules->gids = NULL;
1886 rules->gids_cur = 0;
1887 rules->gids_max = 0;
1888
6880b25d 1889 dump_rules(rules);
d7ddce18 1890 return rules;
c7521974
KS
1891}
1892
d7ddce18 1893void udev_rules_unref(struct udev_rules *rules)
c7521974 1894{
d7ddce18
KS
1895 if (rules == NULL)
1896 return;
6880b25d
KS
1897 free(rules->tokens);
1898 free(rules->buf);
bcf44d55 1899 free(rules->trie_nodes);
154a7b84
KS
1900 free(rules->uids);
1901 free(rules->gids);
d7ddce18 1902 free(rules);
c7521974 1903}
6880b25d
KS
1904
1905static int match_key(struct udev_rules *rules, struct token *token, const char *val)
1906{
6880b25d
KS
1907 char *key_value = &rules->buf[token->key.value_off];
1908 char *pos;
761dfddc 1909 bool match = false;
6880b25d
KS
1910
1911 if (val == NULL)
1912 val = "";
1913
ac218d9c
KS
1914 switch (token->key.glob) {
1915 case GL_PLAIN:
1916 match = (strcmp(key_value, val) == 0);
1917 break;
1918 case GL_GLOB:
1919 match = (fnmatch(key_value, val, 0) == 0);
1920 break;
1921 case GL_SPLIT:
1922 {
91a75e4a
KS
1923 const char *split;
1924 size_t len;
6880b25d 1925
91a75e4a
KS
1926 split = &rules->buf[token->key.value_off];
1927 len = strlen(val);
88cbfb09 1928 for (;;) {
91a75e4a
KS
1929 const char *next;
1930
1931 next = strchr(split, '|');
1932 if (next != NULL) {
1933 size_t matchlen = (size_t)(next - split);
1934
1935 match = (matchlen == len && strncmp(split, val, matchlen) == 0);
1936 if (match)
1937 break;
1938 } else {
1939 match = (strcmp(split, val) == 0);
ac218d9c 1940 break;
91a75e4a
KS
1941 }
1942 split = &next[1];
6880b25d 1943 }
ac218d9c 1944 break;
6880b25d 1945 }
ac218d9c
KS
1946 case GL_SPLIT_GLOB:
1947 {
1948 char value[UTIL_PATH_SIZE];
1949
065db052 1950 util_strscpy(value, sizeof(value), &rules->buf[token->key.value_off]);
ac218d9c
KS
1951 key_value = value;
1952 while (key_value != NULL) {
1953 pos = strchr(key_value, '|');
1954 if (pos != NULL) {
1955 pos[0] = '\0';
1956 pos = &pos[1];
1957 }
5d6a1fa6 1958 dbg(rules->udev, "match %s '%s' <-> '%s'\n", token_str(token->type), key_value, val);
ac218d9c
KS
1959 match = (fnmatch(key_value, val, 0) == 0);
1960 if (match)
1961 break;
1962 key_value = pos;
1963 }
1964 break;
1965 }
db463fd3
KS
1966 case GL_SOMETHING:
1967 match = (val[0] != '\0');
1968 break;
ac218d9c
KS
1969 case GL_UNSET:
1970 return -1;
6880b25d
KS
1971 }
1972
b0f7409f 1973 if (match && (token->key.op == OP_MATCH)) {
5d6a1fa6 1974 dbg(rules->udev, "%s is true (matching value)\n", token_str(token->type));
6880b25d
KS
1975 return 0;
1976 }
b0f7409f 1977 if (!match && (token->key.op == OP_NOMATCH)) {
5d6a1fa6 1978 dbg(rules->udev, "%s is true (non-matching value)\n", token_str(token->type));
6880b25d
KS
1979 return 0;
1980 }
5d6a1fa6 1981 dbg(rules->udev, "%s is not true\n", token_str(token->type));
6880b25d
KS
1982 return -1;
1983}
1984
1985static int match_attr(struct udev_rules *rules, struct udev_device *dev, struct udev_event *event, struct token *cur)
1986{
32028733
KS
1987 const char *name;
1988 char nbuf[UTIL_NAME_SIZE];
1989 const char *value;
1990 char vbuf[UTIL_NAME_SIZE];
6880b25d
KS
1991 size_t len;
1992
32028733
KS
1993 name = &rules->buf[cur->key.attr_off];
1994 switch (cur->key.attrsubst) {
1995 case SB_FORMAT:
1996 udev_event_apply_format(event, name, nbuf, sizeof(nbuf));
1997 name = nbuf;
1998 /* fall through */
1999 case SB_NONE:
2000 value = udev_device_get_sysattr_value(dev, name);
2001 if (value == NULL)
aeb53ca3 2002 return -1;
32028733
KS
2003 break;
2004 case SB_SUBSYS:
2005 if (util_resolve_subsys_kernel(event->udev, name, vbuf, sizeof(vbuf), 1) != 0)
2006 return -1;
2007 value = vbuf;
2008 break;
2009 default:
2010 return -1;
6880b25d 2011 }
6880b25d 2012
32028733
KS
2013 /* remove trailing whitespace, if not asked to match for it */
2014 len = strlen(value);
2015 if (len > 0 && isspace(value[len-1])) {
2016 const char *key_value;
2017 size_t klen;
2018
2019 key_value = &rules->buf[cur->key.value_off];
2020 klen = strlen(key_value);
2021 if (klen > 0 && !isspace(key_value[klen-1])) {
2022 if (value != vbuf) {
2023 util_strscpy(vbuf, sizeof(vbuf), value);
2024 value = vbuf;
2025 }
2026 while (len > 0 && isspace(vbuf[--len]))
2027 vbuf[len] = '\0';
2028 dbg(rules->udev, "removed trailing whitespace from '%s'\n", value);
2029 }
6880b25d 2030 }
32028733 2031
6880b25d
KS
2032 return match_key(rules, cur, value);
2033}
2034
2035enum escape_type {
2036 ESCAPE_UNSET,
2037 ESCAPE_NONE,
2038 ESCAPE_REPLACE,
2039};
2040
2181d30a 2041int udev_rules_apply_to_event(struct udev_rules *rules, struct udev_event *event, const sigset_t *sigmask)
6880b25d 2042{
6880b25d 2043 struct token *cur;
34d6a259 2044 struct token *rule;
3e5c7595 2045 enum escape_type esc = ESCAPE_UNSET;
4b06c409 2046 bool can_set_name;
6880b25d
KS
2047
2048 if (rules->tokens == NULL)
2049 return -1;
2050
4b06c409 2051 can_set_name = ((strcmp(udev_device_get_action(event->dev), "remove") != 0) &&
00f98bd2 2052 (major(udev_device_get_devnum(event->dev)) > 0 ||
ff0e1f4e 2053 udev_device_get_ifindex(event->dev) > 0));
00f98bd2 2054
6880b25d
KS
2055 /* loop through token list, match, run actions or forward to next rule */
2056 cur = &rules->tokens[0];
34d6a259 2057 rule = cur;
761dfddc 2058 for (;;) {
6880b25d
KS
2059 dump_token(rules, cur);
2060 switch (cur->type) {
2061 case TK_RULE:
2062 /* current rule */
2063 rule = cur;
00f98bd2 2064 /* possibly skip rules which want to set NAME, SYMLINK, OWNER, GROUP, MODE */
761dfddc 2065 if (!can_set_name && rule->rule.can_set_name)
0c057e9c 2066 goto nomatch;
6880b25d
KS
2067 esc = ESCAPE_UNSET;
2068 break;
6880b25d
KS
2069 case TK_M_ACTION:
2070 if (match_key(rules, cur, udev_device_get_action(event->dev)) != 0)
2071 goto nomatch;
2072 break;
2073 case TK_M_DEVPATH:
2074 if (match_key(rules, cur, udev_device_get_devpath(event->dev)) != 0)
2075 goto nomatch;
2076 break;
2077 case TK_M_KERNEL:
2078 if (match_key(rules, cur, udev_device_get_sysname(event->dev)) != 0)
2079 goto nomatch;
2080 break;
38932b9f
KS
2081 case TK_M_DEVLINK: {
2082 size_t devlen = strlen(udev_get_dev_path(event->udev))+1;
2083 struct udev_list_entry *list_entry;
2084 bool match = false;
2085
2086 udev_list_entry_foreach(list_entry, udev_device_get_devlinks_list_entry(event->dev)) {
2087 const char *devlink;
2088
2089 devlink = &udev_list_entry_get_name(list_entry)[devlen];
2090 if (match_key(rules, cur, devlink) == 0) {
2091 match = true;
2092 break;
6880b25d 2093 }
6880b25d 2094 }
38932b9f
KS
2095 if (!match)
2096 goto nomatch;
2097 break;
2098 }
6880b25d
KS
2099 case TK_M_NAME:
2100 if (match_key(rules, cur, event->name) != 0)
2101 goto nomatch;
2102 break;
38932b9f
KS
2103 case TK_M_ENV: {
2104 const char *key_name = &rules->buf[cur->key.attr_off];
2105 const char *value;
2106
2107 value = udev_device_get_property_value(event->dev, key_name);
2108 if (value == NULL) {
2109 dbg(event->udev, "ENV{%s} is not set, treat as empty\n", key_name);
2110 value = "";
6880b25d 2111 }
38932b9f
KS
2112 if (match_key(rules, cur, value))
2113 goto nomatch;
2114 break;
2115 }
2116 case TK_M_TAG: {
2117 struct udev_list_entry *list_entry;
2118 bool match = false;
2119
2120 udev_list_entry_foreach(list_entry, udev_device_get_tags_list_entry(event->dev)) {
2121 if (strcmp(&rules->buf[cur->key.value_off], udev_list_entry_get_name(list_entry)) == 0) {
2122 match = true;
2123 break;
3f896a2a 2124 }
3f896a2a 2125 }
38932b9f
KS
2126 if (!match && (cur->key.op != OP_NOMATCH))
2127 goto nomatch;
2128 break;
2129 }
6880b25d
KS
2130 case TK_M_SUBSYSTEM:
2131 if (match_key(rules, cur, udev_device_get_subsystem(event->dev)) != 0)
2132 goto nomatch;
2133 break;
2134 case TK_M_DRIVER:
2135 if (match_key(rules, cur, udev_device_get_driver(event->dev)) != 0)
2136 goto nomatch;
2137 break;
38932b9f
KS
2138 case TK_M_WAITFOR: {
2139 char filename[UTIL_PATH_SIZE];
2140 int found;
2141
2142 udev_event_apply_format(event, &rules->buf[cur->key.value_off], filename, sizeof(filename));
2143 found = (wait_for_file(event->dev, filename, 10) == 0);
2144 if (!found && (cur->key.op != OP_NOMATCH))
2145 goto nomatch;
2146 break;
2147 }
6880b25d
KS
2148 case TK_M_ATTR:
2149 if (match_attr(rules, event->dev, event, cur) != 0)
2150 goto nomatch;
2151 break;
2152 case TK_M_KERNELS:
2153 case TK_M_SUBSYSTEMS:
2154 case TK_M_DRIVERS:
7df0ed83
KS
2155 case TK_M_ATTRS:
2156 case TK_M_TAGS: {
38932b9f 2157 struct token *next;
6880b25d 2158
38932b9f
KS
2159 /* get whole sequence of parent matches */
2160 next = cur;
2161 while (next->type > TK_M_PARENTS_MIN && next->type < TK_M_PARENTS_MAX)
2162 next++;
6880b25d 2163
38932b9f
KS
2164 /* loop over parents */
2165 event->dev_parent = event->dev;
2166 for (;;) {
2167 struct token *key;
2168
2169 dbg(event->udev, "parent: '%s'\n", udev_device_get_syspath(event->dev_parent));
2170 /* loop over sequence of parent match keys */
2171 for (key = cur; key < next; key++ ) {
2172 dump_token(rules, key);
2173 switch(key->type) {
2174 case TK_M_KERNELS:
2175 if (match_key(rules, key, udev_device_get_sysname(event->dev_parent)) != 0)
2176 goto try_parent;
2177 break;
2178 case TK_M_SUBSYSTEMS:
2179 if (match_key(rules, key, udev_device_get_subsystem(event->dev_parent)) != 0)
2180 goto try_parent;
2181 break;
2182 case TK_M_DRIVERS:
2183 if (match_key(rules, key, udev_device_get_driver(event->dev_parent)) != 0)
2184 goto try_parent;
2185 break;
2186 case TK_M_ATTRS:
2187 if (match_attr(rules, event->dev_parent, event, key) != 0)
2188 goto try_parent;
2189 break;
7df0ed83
KS
2190 case TK_M_TAGS: {
2191 bool match = udev_device_has_tag(event->dev_parent, &rules->buf[cur->key.value_off]);
2192
2193 if (match && key->key.op == OP_NOMATCH)
2194 goto try_parent;
2195 if (!match && key->key.op == OP_MATCH)
2196 goto try_parent;
2197 break;
2198 }
38932b9f 2199 default:
6880b25d 2200 goto nomatch;
6880b25d 2201 }
38932b9f 2202 dbg(event->udev, "parent key matched\n");
065db052 2203 }
38932b9f 2204 dbg(event->udev, "all parent keys matched\n");
6880b25d 2205 break;
38932b9f
KS
2206
2207 try_parent:
2208 event->dev_parent = udev_device_get_parent(event->dev_parent);
2209 if (event->dev_parent == NULL)
2210 goto nomatch;
2211 }
2212 /* move behind our sequence of parent match keys */
2213 cur = next;
2214 continue;
2215 }
2216 case TK_M_TEST: {
2217 char filename[UTIL_PATH_SIZE];
2218 struct stat statbuf;
2219 int match;
2220
2221 udev_event_apply_format(event, &rules->buf[cur->key.value_off], filename, sizeof(filename));
2222 if (util_resolve_subsys_kernel(event->udev, filename, filename, sizeof(filename), 0) != 0) {
2223 if (filename[0] != '/') {
2224 char tmp[UTIL_PATH_SIZE];
2225
2226 util_strscpy(tmp, sizeof(tmp), filename);
2227 util_strscpyl(filename, sizeof(filename),
2228 udev_device_get_syspath(event->dev), "/", tmp, NULL);
2229 }
6880b25d 2230 }
38932b9f
KS
2231 attr_subst_subdir(filename, sizeof(filename));
2232
2233 match = (stat(filename, &statbuf) == 0);
2234 dbg(event->udev, "'%s' %s", filename, match ? "exists\n" : "does not exist\n");
2235 if (match && cur->key.mode > 0) {
2236 match = ((statbuf.st_mode & cur->key.mode) > 0);
2237 dbg(event->udev, "'%s' has mode=%#o and %s %#o\n", filename, statbuf.st_mode,
2238 match ? "matches" : "does not match", cur->key.mode);
2239 }
2240 if (match && cur->key.op == OP_NOMATCH)
2241 goto nomatch;
2242 if (!match && cur->key.op == OP_MATCH)
2243 goto nomatch;
2244 break;
2245 }
2181d30a
KS
2246 case TK_M_EVENT_TIMEOUT:
2247 info(event->udev, "OPTIONS event_timeout=%u\n", cur->key.event_timeout);
2248 event->timeout_usec = cur->key.event_timeout * 1000 * 1000;
2249 break;
38932b9f
KS
2250 case TK_M_PROGRAM: {
2251 char program[UTIL_PATH_SIZE];
2252 char **envp;
2253 char result[UTIL_PATH_SIZE];
2254
2255 free(event->program_result);
2256 event->program_result = NULL;
2257 udev_event_apply_format(event, &rules->buf[cur->key.value_off], program, sizeof(program));
2258 envp = udev_device_get_properties_envp(event->dev);
2259 info(event->udev, "PROGRAM '%s' %s:%u\n",
2260 program,
2261 &rules->buf[rule->rule.filename_off],
2262 rule->rule.filename_line);
6880b25d 2263
38932b9f
KS
2264 if (udev_event_spawn(event, program, envp, sigmask, result, sizeof(result)) < 0) {
2265 if (cur->key.op != OP_NOMATCH)
2266 goto nomatch;
2267 } else {
2268 int count;
2269
2270 util_remove_trailing_chars(result, '\n');
2271 if (esc == ESCAPE_UNSET || esc == ESCAPE_REPLACE) {
0bbe8838 2272 count = util_replace_chars(result, UDEV_ALLOWED_CHARS_INPUT);
38932b9f
KS
2273 if (count > 0)
2274 info(event->udev, "%i character(s) replaced\n" , count);
6880b25d 2275 }
38932b9f
KS
2276 event->program_result = strdup(result);
2277 dbg(event->udev, "storing result '%s'\n", event->program_result);
2278 if (cur->key.op == OP_NOMATCH)
2279 goto nomatch;
6880b25d 2280 }
38932b9f
KS
2281 break;
2282 }
2283 case TK_M_IMPORT_FILE: {
2284 char import[UTIL_PATH_SIZE];
6880b25d 2285
38932b9f
KS
2286 udev_event_apply_format(event, &rules->buf[cur->key.value_off], import, sizeof(import));
2287 if (import_file_into_properties(event->dev, import) != 0)
2288 if (cur->key.op != OP_NOMATCH)
2289 goto nomatch;
2290 break;
2291 }
2292 case TK_M_IMPORT_PROG: {
2293 char import[UTIL_PATH_SIZE];
5539f624 2294
38932b9f
KS
2295 udev_event_apply_format(event, &rules->buf[cur->key.value_off], import, sizeof(import));
2296 info(event->udev, "IMPORT '%s' %s:%u\n",
2297 import,
2298 &rules->buf[rule->rule.filename_off],
2299 rule->rule.filename_line);
5539f624 2300
38932b9f
KS
2301 if (import_program_into_properties(event, import, sigmask) != 0)
2302 if (cur->key.op != OP_NOMATCH)
2303 goto nomatch;
2304 break;
2305 }
d7867b31 2306 case TK_M_IMPORT_BUILTIN: {
0e2856a2 2307 char command[UTIL_PATH_SIZE];
81dadce5
KS
2308
2309 if (udev_builtin_run_once(cur->key.builtin_cmd)) {
2310 /* check if we ran already */
2311 if (event->builtin_run & (1 << cur->key.builtin_cmd)) {
2312 info(event->udev, "IMPORT builtin skip '%s' %s:%u\n",
2313 udev_builtin_name(cur->key.builtin_cmd),
2314 &rules->buf[rule->rule.filename_off],
2315 rule->rule.filename_line);
2316 /* return the result from earlier run */
2317 if (event->builtin_ret & (1 << cur->key.builtin_cmd))
d7867b31 2318 if (cur->key.op != OP_NOMATCH)
81dadce5
KS
2319 goto nomatch;
2320 break;
2321 }
2322 /* mark as ran */
2323 event->builtin_run |= (1 << cur->key.builtin_cmd);
d7867b31 2324 }
0e2856a2
KS
2325
2326 udev_event_apply_format(event, &rules->buf[cur->key.value_off], command, sizeof(command));
d7867b31
KS
2327 info(event->udev, "IMPORT builtin '%s' %s:%u\n",
2328 udev_builtin_name(cur->key.builtin_cmd),
2329 &rules->buf[rule->rule.filename_off],
2330 rule->rule.filename_line);
0e2856a2 2331
81dadce5 2332 if (udev_builtin_run(event->dev, cur->key.builtin_cmd, command, false) != 0) {
d7867b31
KS
2333 /* remember failure */
2334 info(rules->udev, "IMPORT builtin '%s' returned non-zero\n",
2335 udev_builtin_name(cur->key.builtin_cmd));
2336 event->builtin_ret |= (1 << cur->key.builtin_cmd);
2337 if (cur->key.op != OP_NOMATCH)
2338 goto nomatch;
2339 }
2340 break;
2341 }
38932b9f
KS
2342 case TK_M_IMPORT_DB: {
2343 const char *key = &rules->buf[cur->key.value_off];
2344 const char *value;
2345
2346 value = udev_device_get_property_value(event->dev_db, key);
2347 if (value != NULL) {
2348 struct udev_list_entry *entry;
c4f6dcc4 2349
38932b9f
KS
2350 entry = udev_device_add_property(event->dev, key, value);
2351 udev_list_entry_set_num(entry, true);
2352 } else {
2353 if (cur->key.op != OP_NOMATCH)
2354 goto nomatch;
2355 }
2356 break;
2357 }
2358 case TK_M_IMPORT_CMDLINE: {
2359 FILE *f;
2360 bool imported = false;
2361
2362 f = fopen("/proc/cmdline", "r");
2363 if (f != NULL) {
2364 char cmdline[4096];
2365
2366 if (fgets(cmdline, sizeof(cmdline), f) != NULL) {
2367 const char *key = &rules->buf[cur->key.value_off];
2368 char *pos;
2369
2370 pos = strstr(cmdline, key);
2371 if (pos != NULL) {
2372 struct udev_list_entry *entry;
2373
2374 pos += strlen(key);
2375 if (pos[0] == '\0' || isspace(pos[0])) {
2376 /* we import simple flags as 'FLAG=1' */
2377 entry = udev_device_add_property(event->dev, key, "1");
2378 udev_list_entry_set_num(entry, true);
2379 imported = true;
2380 } else if (pos[0] == '=') {
2381 const char *value;
2382
2383 pos++;
2384 value = pos;
2385 while (pos[0] != '\0' && !isspace(pos[0]))
7d2b68b7 2386 pos++;
38932b9f
KS
2387 pos[0] = '\0';
2388 entry = udev_device_add_property(event->dev, key, value);
2389 udev_list_entry_set_num(entry, true);
2390 imported = true;
c4f6dcc4
KS
2391 }
2392 }
c4f6dcc4 2393 }
38932b9f 2394 fclose(f);
c4f6dcc4 2395 }
38932b9f
KS
2396 if (!imported && cur->key.op != OP_NOMATCH)
2397 goto nomatch;
2398 break;
2399 }
2400 case TK_M_IMPORT_PARENT: {
2401 char import[UTIL_PATH_SIZE];
6880b25d 2402
38932b9f
KS
2403 udev_event_apply_format(event, &rules->buf[cur->key.value_off], import, sizeof(import));
2404 if (import_parent_into_properties(event->dev, import) != 0)
2405 if (cur->key.op != OP_NOMATCH)
2406 goto nomatch;
2407 break;
2408 }
6880b25d
KS
2409 case TK_M_RESULT:
2410 if (match_key(rules, cur, event->program_result) != 0)
2411 goto nomatch;
2412 break;
6880b25d
KS
2413 case TK_A_STRING_ESCAPE_NONE:
2414 esc = ESCAPE_NONE;
2415 break;
2416 case TK_A_STRING_ESCAPE_REPLACE:
2417 esc = ESCAPE_REPLACE;
2418 break;
9ead6627
KS
2419 case TK_A_DB_PERSIST:
2420 udev_device_set_db_persist(event->dev);
2421 break;
bd284db1 2422 case TK_A_INOTIFY_WATCH:
3b529da4
KS
2423 if (event->inotify_watch_final)
2424 break;
2425 if (cur->key.op == OP_ASSIGN_FINAL)
2426 event->inotify_watch_final = true;
46f194cb 2427 event->inotify_watch = cur->key.watch;
bd284db1 2428 break;
6880b25d
KS
2429 case TK_A_DEVLINK_PRIO:
2430 udev_device_set_devlink_priority(event->dev, cur->key.devlink_prio);
2431 break;
38932b9f
KS
2432 case TK_A_OWNER: {
2433 char owner[UTIL_NAME_SIZE];
6880b25d 2434
38932b9f 2435 if (event->owner_final)
6880b25d 2436 break;
38932b9f
KS
2437 if (cur->key.op == OP_ASSIGN_FINAL)
2438 event->owner_final = true;
2439 udev_event_apply_format(event, &rules->buf[cur->key.value_off], owner, sizeof(owner));
2440 event->uid = util_lookup_user(event->udev, owner);
2441 info(event->udev, "OWNER %u %s:%u\n",
2442 event->uid,
2443 &rules->buf[rule->rule.filename_off],
2444 rule->rule.filename_line);
2445 break;
2446 }
2447 case TK_A_GROUP: {
2448 char group[UTIL_NAME_SIZE];
6880b25d 2449
38932b9f 2450 if (event->group_final)
6880b25d 2451 break;
38932b9f
KS
2452 if (cur->key.op == OP_ASSIGN_FINAL)
2453 event->group_final = true;
2454 udev_event_apply_format(event, &rules->buf[cur->key.value_off], group, sizeof(group));
2455 event->gid = util_lookup_group(event->udev, group);
2456 info(event->udev, "GROUP %u %s:%u\n",
2457 event->gid,
2458 &rules->buf[rule->rule.filename_off],
2459 rule->rule.filename_line);
2460 break;
2461 }
2462 case TK_A_MODE: {
2463 char mode_str[UTIL_NAME_SIZE];
2464 mode_t mode;
2465 char *endptr;
6880b25d 2466
38932b9f
KS
2467 if (event->mode_final)
2468 break;
2469 udev_event_apply_format(event, &rules->buf[cur->key.value_off], mode_str, sizeof(mode_str));
2470 mode = strtol(mode_str, &endptr, 8);
2471 if (endptr[0] != '\0') {
2472 err(event->udev, "ignoring invalid mode '%s'\n", mode_str);
6880b25d
KS
2473 break;
2474 }
38932b9f
KS
2475 if (cur->key.op == OP_ASSIGN_FINAL)
2476 event->mode_final = true;
2477 event->mode_set = true;
2478 event->mode = mode;
2479 info(event->udev, "MODE %#o %s:%u\n",
2480 event->mode,
2481 &rules->buf[rule->rule.filename_off],
2482 rule->rule.filename_line);
2483 break;
2484 }
6880b25d
KS
2485 case TK_A_OWNER_ID:
2486 if (event->owner_final)
2487 break;
b0f7409f 2488 if (cur->key.op == OP_ASSIGN_FINAL)
761dfddc 2489 event->owner_final = true;
6880b25d 2490 event->uid = cur->key.uid;
0ef254d5
KS
2491 info(event->udev, "OWNER %u %s:%u\n",
2492 event->uid,
2493 &rules->buf[rule->rule.filename_off],
2494 rule->rule.filename_line);
6880b25d
KS
2495 break;
2496 case TK_A_GROUP_ID:
2497 if (event->group_final)
2498 break;
b0f7409f 2499 if (cur->key.op == OP_ASSIGN_FINAL)
761dfddc 2500 event->group_final = true;
6880b25d 2501 event->gid = cur->key.gid;
0ef254d5
KS
2502 info(event->udev, "GROUP %u %s:%u\n",
2503 event->gid,
2504 &rules->buf[rule->rule.filename_off],
2505 rule->rule.filename_line);
6880b25d
KS
2506 break;
2507 case TK_A_MODE_ID:
2508 if (event->mode_final)
2509 break;
b0f7409f 2510 if (cur->key.op == OP_ASSIGN_FINAL)
761dfddc 2511 event->mode_final = true;
3cf1a8e3 2512 event->mode_set = true;
6880b25d 2513 event->mode = cur->key.mode;
0ef254d5
KS
2514 info(event->udev, "MODE %#o %s:%u\n",
2515 event->mode,
2516 &rules->buf[rule->rule.filename_off],
2517 rule->rule.filename_line);
6880b25d 2518 break;
761dfddc 2519 case TK_A_STATIC_NODE:
79449642 2520 event->static_node = true;
761dfddc 2521 break;
38932b9f
KS
2522 case TK_A_ENV: {
2523 const char *name = &rules->buf[cur->key.attr_off];
2524 char *value = &rules->buf[cur->key.value_off];
2525
2526 if (value[0] != '\0') {
2527 char temp_value[UTIL_NAME_SIZE];
2528 struct udev_list_entry *entry;
2529
2530 udev_event_apply_format(event, value, temp_value, sizeof(temp_value));
2531 entry = udev_device_add_property(event->dev, name, temp_value);
2532 /* store in db, skip private keys */
2533 if (name[0] != '.')
2534 udev_list_entry_set_num(entry, true);
2535 } else {
2536 udev_device_add_property(event->dev, name, NULL);
6880b25d 2537 }
38932b9f
KS
2538 break;
2539 }
1eb037a7
KS
2540 case TK_A_TAG: {
2541 char tag[UTIL_PATH_SIZE];
705a165d 2542 const char *p;
1eb037a7
KS
2543
2544 udev_event_apply_format(event, &rules->buf[cur->key.value_off], tag, sizeof(tag));
1dbfbfbe
KS
2545 if (cur->key.op == OP_ASSIGN || cur->key.op == OP_ASSIGN_FINAL)
2546 udev_device_cleanup_tags_list(event->dev);
705a165d
KS
2547 for (p = tag; *p != '\0'; p++) {
2548 if ((*p >= 'a' && *p <= 'z') ||
2549 (*p >= 'A' && *p <= 'Z') ||
2550 (*p >= '0' && *p <= '9') ||
2551 *p == '-' || *p == '_')
2552 continue;
2553 err(event->udev, "ignoring invalid tag name '%s'\n", tag);
2554 break;
2555 }
1eb037a7 2556 udev_device_add_tag(event->dev, tag);
28460195 2557 break;
1eb037a7 2558 }
38932b9f
KS
2559 case TK_A_NAME: {
2560 const char *name = &rules->buf[cur->key.value_off];
2561 char name_str[UTIL_PATH_SIZE];
2562 int count;
6880b25d 2563
38932b9f 2564 if (event->name_final)
6880b25d 2565 break;
38932b9f
KS
2566 if (cur->key.op == OP_ASSIGN_FINAL)
2567 event->name_final = true;
2568 udev_event_apply_format(event, name, name_str, sizeof(name_str));
2569 if (esc == ESCAPE_UNSET || esc == ESCAPE_REPLACE) {
0bbe8838 2570 count = util_replace_chars(name_str, "/");
6880b25d 2571 if (count > 0)
38932b9f 2572 info(event->udev, "%i character(s) replaced\n", count);
6880b25d 2573 }
38932b9f
KS
2574 free(event->name);
2575 event->name = strdup(name_str);
2576 info(event->udev, "NAME '%s' %s:%u\n",
2577 event->name,
2578 &rules->buf[rule->rule.filename_off],
2579 rule->rule.filename_line);
6880b25d 2580 break;
38932b9f
KS
2581 }
2582 case TK_A_DEVLINK: {
2583 char temp[UTIL_PATH_SIZE];
2584 char filename[UTIL_PATH_SIZE];
2585 char *pos, *next;
2586 int count = 0;
2587
2588 if (event->devlink_final)
6880b25d 2589 break;
38932b9f 2590 if (major(udev_device_get_devnum(event->dev)) == 0)
6880b25d 2591 break;
38932b9f
KS
2592 if (cur->key.op == OP_ASSIGN_FINAL)
2593 event->devlink_final = true;
2594 if (cur->key.op == OP_ASSIGN || cur->key.op == OP_ASSIGN_FINAL)
2595 udev_device_cleanup_devlinks_list(event->dev);
2596
2597 /* allow multiple symlinks separated by spaces */
2598 udev_event_apply_format(event, &rules->buf[cur->key.value_off], temp, sizeof(temp));
2599 if (esc == ESCAPE_UNSET)
0bbe8838 2600 count = util_replace_chars(temp, "/ ");
38932b9f 2601 else if (esc == ESCAPE_REPLACE)
0bbe8838 2602 count = util_replace_chars(temp, "/");
38932b9f
KS
2603 if (count > 0)
2604 info(event->udev, "%i character(s) replaced\n" , count);
2605 dbg(event->udev, "rule applied, added symlink(s) '%s'\n", temp);
2606 pos = temp;
2607 while (isspace(pos[0]))
2608 pos++;
2609 next = strchr(pos, ' ');
2610 while (next != NULL) {
2611 next[0] = '\0';
2612 info(event->udev, "LINK '%s' %s:%u\n", pos,
2613 &rules->buf[rule->rule.filename_off], rule->rule.filename_line);
2614 util_strscpyl(filename, sizeof(filename), udev_get_dev_path(event->udev), "/", pos, NULL);
2615 udev_device_add_devlink(event->dev, filename, cur->key.devlink_unique);
2616 while (isspace(next[1]))
2617 next++;
2618 pos = &next[1];
2619 next = strchr(pos, ' ');
2620 }
2621 if (pos[0] != '\0') {
2622 info(event->udev, "LINK '%s' %s:%u\n", pos,
2623 &rules->buf[rule->rule.filename_off], rule->rule.filename_line);
2624 util_strscpyl(filename, sizeof(filename), udev_get_dev_path(event->udev), "/", pos, NULL);
2625 udev_device_add_devlink(event->dev, filename, cur->key.devlink_unique);
2626 }
2627 break;
2628 }
2629 case TK_A_ATTR: {
2630 const char *key_name = &rules->buf[cur->key.attr_off];
2631 char attr[UTIL_PATH_SIZE];
2632 char value[UTIL_NAME_SIZE];
2633 FILE *f;
2634
2635 if (util_resolve_subsys_kernel(event->udev, key_name, attr, sizeof(attr), 0) != 0)
2636 util_strscpyl(attr, sizeof(attr), udev_device_get_syspath(event->dev), "/", key_name, NULL);
2637 attr_subst_subdir(attr, sizeof(attr));
2638
2639 udev_event_apply_format(event, &rules->buf[cur->key.value_off], value, sizeof(value));
2640 info(event->udev, "ATTR '%s' writing '%s' %s:%u\n", attr, value,
2641 &rules->buf[rule->rule.filename_off],
2642 rule->rule.filename_line);
2643 f = fopen(attr, "w");
2644 if (f != NULL) {
2645 if (fprintf(f, "%s", value) <= 0)
2646 err(event->udev, "error writing ATTR{%s}: %m\n", attr);
2647 fclose(f);
2648 } else {
2649 err(event->udev, "error opening ATTR{%s} for writing: %m\n", attr);
6880b25d 2650 }
38932b9f
KS
2651 break;
2652 }
2653 case TK_A_RUN: {
38932b9f 2654 if (cur->key.op == OP_ASSIGN || cur->key.op == OP_ASSIGN_FINAL)
869c9031 2655 udev_list_cleanup(&event->run_list);
38932b9f
KS
2656 info(event->udev, "RUN '%s' %s:%u\n",
2657 &rules->buf[cur->key.value_off],
2658 &rules->buf[rule->rule.filename_off],
2659 rule->rule.filename_line);
289a1821 2660 udev_list_entry_add(&event->run_list, &rules->buf[cur->key.value_off], NULL);
38932b9f
KS
2661 break;
2662 }
6880b25d 2663 case TK_A_GOTO:
0c377989
KS
2664 if (cur->key.rule_goto == 0)
2665 break;
6880b25d
KS
2666 cur = &rules->tokens[cur->key.rule_goto];
2667 continue;
6270756c 2668 case TK_END:
11ae7578 2669 return 0;
6880b25d 2670
d15fcce4 2671 case TK_M_PARENTS_MIN:
b0f7409f 2672 case TK_M_PARENTS_MAX:
ac218d9c 2673 case TK_M_MAX:
ac218d9c 2674 case TK_UNSET:
6880b25d
KS
2675 err(rules->udev, "wrong type %u\n", cur->type);
2676 goto nomatch;
2677 }
2678
2679 cur++;
2680 continue;
2681 nomatch:
2682 /* fast-forward to next rule */
3f3aa9f5
AJ
2683 cur = rule + rule->rule.token_count;
2684 dbg(rules->udev, "forward to rule: %u\n",
2685 (unsigned int) (cur - rules->tokens));
6880b25d 2686 }
6880b25d 2687}
761dfddc
KS
2688
2689void udev_rules_apply_static_dev_perms(struct udev_rules *rules)
2690{
2691 struct token *cur;
2692 struct token *rule;
2693 uid_t uid = 0;
2694 gid_t gid = 0;
2695 mode_t mode = 0;
2696
2697 if (rules->tokens == NULL)
2698 return;
2699
2700 cur = &rules->tokens[0];
2701 rule = cur;
2702 for (;;) {
2703 switch (cur->type) {
2704 case TK_RULE:
2705 /* current rule */
2706 rule = cur;
2707
2708 /* skip rules without a static_node tag */
2709 if (!rule->rule.has_static_node)
2710 goto next;
2711
2712 uid = 0;
2713 gid = 0;
2714 mode = 0;
2715 break;
2716 case TK_A_OWNER_ID:
2717 uid = cur->key.uid;
2718 break;
2719 case TK_A_GROUP_ID:
2720 gid = cur->key.gid;
2721 break;
2722 case TK_A_MODE_ID:
2723 mode = cur->key.mode;
2724 break;
2725 case TK_A_STATIC_NODE: {
2726 char filename[UTIL_PATH_SIZE];
2727 struct stat stats;
c112873b 2728
761dfddc 2729 /* we assure, that the permissions tokens are sorted before the static token */
36acdbcc 2730 if (mode == 0 && uid == 0 && gid == 0)
761dfddc
KS
2731 goto next;
2732 util_strscpyl(filename, sizeof(filename), udev_get_dev_path(rules->udev), "/",
2733 &rules->buf[cur->key.value_off], NULL);
2734 if (stat(filename, &stats) != 0)
2735 goto next;
2736 if (!S_ISBLK(stats.st_mode) && !S_ISCHR(stats.st_mode))
2737 goto next;
79449642
KS
2738 if (mode == 0) {
2739 if (gid > 0)
2740 mode = 0660;
2741 else
2742 mode = 0600;
2743 }
2744 /* set sticky bit, so we do not remove the node on module unload */
2745 mode |= 01000;
2746 if (mode != (stats.st_mode & 01777)) {
761dfddc
KS
2747 chmod(filename, mode);
2748 info(rules->udev, "chmod '%s' %#o\n", filename, mode);
2749 }
c112873b 2750
761dfddc
KS
2751 if ((uid != 0 && uid != stats.st_uid) || (gid != 0 && gid != stats.st_gid)) {
2752 chown(filename, uid, gid);
2753 info(rules->udev, "chown '%s' %u %u\n", filename, uid, gid);
2754 }
c112873b 2755
761dfddc
KS
2756 utimensat(AT_FDCWD, filename, NULL, 0);
2757 break;
2758 }
2759 case TK_END:
2760 return;
2761 }
2762
2763 cur++;
2764 continue;
2765next:
2766 /* fast-forward to next rule */
2767 cur = rule + rule->rule.token_count;
2768 continue;
2769 }
2770}