udev-rules.c revision ff944daa019c1101d6464412e6682732ec11143a
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen/*
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen * Copyright (C) 2003-2012 Kay Sievers <kay.sievers@vrfy.org>
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen *
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen * This program is free software: you can redistribute it and/or modify
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen * it under the terms of the GNU General Public License as published by
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen * the Free Software Foundation, either version 2 of the License, or
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen * (at your option) any later version.
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen *
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen * This program is distributed in the hope that it will be useful,
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen * but WITHOUT ANY WARRANTY; without even the implied warranty of
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen * GNU General Public License for more details.
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen *
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen * You should have received a copy of the GNU General Public License
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen * along with this program. If not, see <http://www.gnu.org/licenses/>.
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen#include <stddef.h>
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen#include <limits.h>
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen#include <stdlib.h>
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen#include <stdbool.h>
43b3a5ef61859f06cdbaf26765cab8e1adac4296Tom Gundersen#include <string.h>
7eb08da4b388b920c8a894b1500c9cc7dc1f31efTom Gundersen#include <stdio.h>
43b3a5ef61859f06cdbaf26765cab8e1adac4296Tom Gundersen#include <fcntl.h>
07630cea1f3a845c09309f197ac7c4f11edd3b62Lennart Poettering#include <ctype.h>
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen#include <unistd.h>
07630cea1f3a845c09309f197ac7c4f11edd3b62Lennart Poettering#include <errno.h>
07630cea1f3a845c09309f197ac7c4f11edd3b62Lennart Poettering#include <dirent.h>
a501033335ed402c8f7e86fe41a15531ba69abd7Tom Gundersen#include <fnmatch.h>
3ffd4af22052963e7a29431721ee204e634bea75Lennart Poettering#include <time.h>
43b3a5ef61859f06cdbaf26765cab8e1adac4296Tom Gundersen
07630cea1f3a845c09309f197ac7c4f11edd3b62Lennart Poettering#include "udev.h"
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen#include "path-util.h"
07630cea1f3a845c09309f197ac7c4f11edd3b62Lennart Poettering#include "conf-files.h"
1c4baffc1895809bae9ac36b670af90a4cb9cd7dTom Gundersen#include "strbuf.h"
c6f7c917a1b494d4455800823472227463f87438Tom Gundersen
6bedfcbb2970e06a4d3280c8fb62083d252ede73Lennart Poettering#define PREALLOC_TOKEN 2048
07630cea1f3a845c09309f197ac7c4f11edd3b62Lennart Poettering
3df3e884ae1237ef0d4d23b0e80f4ffda95ac135Ronny Chevalierstruct uid_gid {
8fcde01280adcbd07e8205b91ac52b06305b6208Lennart Poettering unsigned int name_off;
8b43440b7ef4b81c69c31de7ff820dc07a780254Lennart Poettering union {
07630cea1f3a845c09309f197ac7c4f11edd3b62Lennart Poettering uid_t uid;
07630cea1f3a845c09309f197ac7c4f11edd3b62Lennart Poettering gid_t gid;
07630cea1f3a845c09309f197ac7c4f11edd3b62Lennart Poettering };
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen};
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersenstruct udev_rules {
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen struct udev *udev;
a501033335ed402c8f7e86fe41a15531ba69abd7Tom Gundersen char **dirs;
a501033335ed402c8f7e86fe41a15531ba69abd7Tom Gundersen unsigned long long *dirs_ts_usec;
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen int resolve_names;
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen
1c4baffc1895809bae9ac36b670af90a4cb9cd7dTom Gundersen /* every key in the rules file becomes a token */
43b3a5ef61859f06cdbaf26765cab8e1adac4296Tom Gundersen struct token *tokens;
97f2d76d4f4dfab8b0629c09926a05a1e5621125Tom Gundersen unsigned int token_cur;
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen unsigned int token_max;
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen
2ad8416dd057e7e3185169609ca3006e7649f576Zbigniew Jędrzejewski-Szmek /* all key strings are copied and de-duplicated in a single continous string buffer */
2ad8416dd057e7e3185169609ca3006e7649f576Zbigniew Jędrzejewski-Szmek struct strbuf *strbuf;
2ad8416dd057e7e3185169609ca3006e7649f576Zbigniew Jędrzejewski-Szmek
2ad8416dd057e7e3185169609ca3006e7649f576Zbigniew Jędrzejewski-Szmek /* during rule parsing, uid/gid lookup results are cached */
2ad8416dd057e7e3185169609ca3006e7649f576Zbigniew Jędrzejewski-Szmek struct uid_gid *uids;
2ad8416dd057e7e3185169609ca3006e7649f576Zbigniew Jędrzejewski-Szmek unsigned int uids_cur;
2ad8416dd057e7e3185169609ca3006e7649f576Zbigniew Jędrzejewski-Szmek unsigned int uids_max;
2ad8416dd057e7e3185169609ca3006e7649f576Zbigniew Jędrzejewski-Szmek struct uid_gid *gids;
2ad8416dd057e7e3185169609ca3006e7649f576Zbigniew Jędrzejewski-Szmek unsigned int gids_cur;
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen unsigned int gids_max;
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen};
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen
5b9d4dc05560ddda89e48b6b39365824b15e1300Tom Gundersenstatic char *rules_str(struct udev_rules *rules, unsigned int off) {
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen return rules->strbuf->buf + off;
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen}
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen
43d60b77a83b3185e37c65c4f2649d24c227c7f0Tom Gundersenstatic unsigned int rules_add_string(struct udev_rules *rules, const char *s) {
43d60b77a83b3185e37c65c4f2649d24c227c7f0Tom Gundersen return strbuf_add_string(rules->strbuf, s, strlen(s));
43d60b77a83b3185e37c65c4f2649d24c227c7f0Tom Gundersen}
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen/* KEY=="", KEY!="", KEY+="", KEY="", KEY:="" */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersenenum operation_type {
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen OP_UNSET,
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen OP_MATCH,
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen OP_NOMATCH,
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen OP_MATCH_MAX,
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen OP_ADD,
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen OP_ASSIGN,
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen OP_ASSIGN_FINAL,
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen};
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersenenum string_glob_type {
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen GL_UNSET,
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen GL_PLAIN, /* no special chars */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen GL_GLOB, /* shell globs ?,*,[] */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen GL_SPLIT, /* multi-value A|B */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen GL_SPLIT_GLOB, /* multi-value with glob A*|B* */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen GL_SOMETHING, /* commonly used "?*" */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen};
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersenenum string_subst_type {
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen SB_UNSET,
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen SB_NONE,
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen SB_FORMAT,
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen SB_SUBSYS,
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen};
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen/* tokens of a rule are sorted/handled in this order */
03e334a1c7dc8c20c38902aa039440763acc9b17Lennart Poetteringenum token_type {
43b3a5ef61859f06cdbaf26765cab8e1adac4296Tom Gundersen TK_UNSET,
1c4baffc1895809bae9ac36b670af90a4cb9cd7dTom Gundersen TK_RULE,
43b3a5ef61859f06cdbaf26765cab8e1adac4296Tom Gundersen
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_M_ACTION, /* val */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_M_DEVPATH, /* val */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_M_KERNEL, /* val */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_M_DEVLINK, /* val */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_M_NAME, /* val */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_M_ENV, /* val, attr */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_M_TAG, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_SUBSYSTEM, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_DRIVER, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_WAITFOR, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_ATTR, /* val, attr */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_PARENTS_MIN,
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_KERNELS, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_SUBSYSTEMS, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_DRIVERS, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_ATTRS, /* val, attr */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_TAGS, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_PARENTS_MAX,
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_TEST, /* val, mode_t */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_EVENT_TIMEOUT, /* int */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_PROGRAM, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_IMPORT_FILE, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_IMPORT_PROG, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_IMPORT_BUILTIN, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_IMPORT_DB, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_IMPORT_CMDLINE, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_IMPORT_PARENT, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_RESULT, /* val */
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_M_MAX,
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen
9a4b012e43f23516373bf398dd9a458439d19939Tom Gundersen TK_A_STRING_ESCAPE_NONE,
6e37cd2f4af8928d905203108a4331e375d7127cThomas Hindoe Paaboel Andersen TK_A_STRING_ESCAPE_REPLACE,
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_A_DB_PERSIST,
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_A_INOTIFY_WATCH, /* int */
187dc6e554f2d5b4b5a3bee72c73ff5df6418aa6Thomas Hindoe Paaboel Andersen TK_A_DEVLINK_PRIO, /* int */
187dc6e554f2d5b4b5a3bee72c73ff5df6418aa6Thomas Hindoe Paaboel Andersen TK_A_OWNER, /* val */
187dc6e554f2d5b4b5a3bee72c73ff5df6418aa6Thomas Hindoe Paaboel Andersen TK_A_GROUP, /* val */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_A_MODE, /* val */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_A_OWNER_ID, /* uid_t */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_A_GROUP_ID, /* gid_t */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_A_MODE_ID, /* mode_t */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_A_STATIC_NODE, /* val */
ecb08ec6a5c52f2d940f3b8147e2a480affd46e1Zbigniew Jędrzejewski-Szmek TK_A_ENV, /* val, attr */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_A_TAG, /* val */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen TK_A_NAME, /* val */
ed88bcfb7c15029f9fc95ee2380759a9eb782d46Zbigniew Jędrzejewski-Szmek TK_A_DEVLINK, /* val */
ed88bcfb7c15029f9fc95ee2380759a9eb782d46Zbigniew Jędrzejewski-Szmek TK_A_ATTR, /* val, attr */
ed88bcfb7c15029f9fc95ee2380759a9eb782d46Zbigniew Jędrzejewski-Szmek TK_A_RUN_BUILTIN, /* val, bool */
ed88bcfb7c15029f9fc95ee2380759a9eb782d46Zbigniew Jędrzejewski-Szmek TK_A_RUN_PROGRAM, /* val, bool */
ed88bcfb7c15029f9fc95ee2380759a9eb782d46Zbigniew Jędrzejewski-Szmek TK_A_GOTO, /* size_t */
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen
ecb08ec6a5c52f2d940f3b8147e2a480affd46e1Zbigniew Jędrzejewski-Szmek TK_END,
ecb08ec6a5c52f2d940f3b8147e2a480affd46e1Zbigniew Jędrzejewski-Szmek};
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen/* we try to pack stuff in a way that we take only 12 bytes per token */
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersenstruct token {
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen union {
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen unsigned char type; /* same in rule and key */
e9f3d2d508bfd9fb5b54e82994bda365a71eb864Zbigniew Jędrzejewski-Szmek struct {
e9f3d2d508bfd9fb5b54e82994bda365a71eb864Zbigniew Jędrzejewski-Szmek enum token_type type:8;
e9f3d2d508bfd9fb5b54e82994bda365a71eb864Zbigniew Jędrzejewski-Szmek bool can_set_name:1;
36f822c4bd077f9121757e24b6516e5c7ada63b5Zbigniew Jędrzejewski-Szmek bool has_static_node:1;
36f822c4bd077f9121757e24b6516e5c7ada63b5Zbigniew Jędrzejewski-Szmek unsigned int unused:6;
ecb08ec6a5c52f2d940f3b8147e2a480affd46e1Zbigniew Jędrzejewski-Szmek unsigned short token_count;
36f822c4bd077f9121757e24b6516e5c7ada63b5Zbigniew Jędrzejewski-Szmek unsigned int label_off;
98a375f6d5cac24eb80d6d4e00699851324afdecTom Gundersen unsigned short filename_off;
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen unsigned short filename_line;
dab495dc23bf9a5ba0487a057bb594355555a0e9Tom Gundersen } rule;
dab495dc23bf9a5ba0487a057bb594355555a0e9Tom Gundersen struct {
dab495dc23bf9a5ba0487a057bb594355555a0e9Tom Gundersen enum token_type type:8;
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen enum operation_type op:8;
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen enum string_glob_type glob:8;
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen enum string_subst_type subst:4;
ecb08ec6a5c52f2d940f3b8147e2a480affd46e1Zbigniew Jędrzejewski-Szmek enum string_subst_type attrsubst:4;
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen unsigned int value_off;
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen union {
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen unsigned int attr_off;
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen unsigned int rule_goto;
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen mode_t mode;
f8a0bb5285024b6ce372c3157e761e6543ebdcd2Andreas Henriksson uid_t uid;
a2a5291b3f5ab6ed4c92f51d0fd10a03047380d8Zbigniew Jędrzejewski-Szmek gid_t gid;
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen int devlink_prio;
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen int event_timeout;
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen int watch;
74df0fca09b3c31ed19e14ba80f996fdff772417Lennart Poettering enum udev_builtin_cmd builtin_cmd;
b5884878a2874447b2a9f07f324a7cd909d96d48Lennart Poettering };
da927ba997d68401563b927f92e6e40e021a8e5cMichal Schmidt } key;
74df0fca09b3c31ed19e14ba80f996fdff772417Lennart Poettering };
b5884878a2874447b2a9f07f324a7cd909d96d48Lennart Poettering};
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen
a2a5291b3f5ab6ed4c92f51d0fd10a03047380d8Zbigniew Jędrzejewski-Szmek#define MAX_TK 64
a2a5291b3f5ab6ed4c92f51d0fd10a03047380d8Zbigniew Jędrzejewski-Szmekstruct rule_tmp {
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen struct udev_rules *rules;
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen struct token rule;
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen struct token token[MAX_TK];
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen unsigned int token_cur;
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen};
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen#ifdef DEBUG
edf029b7fd9a5853a87d3ca99aac2922bb8a277eTom Gundersenstatic const char *operation_str(enum operation_type type)
edf029b7fd9a5853a87d3ca99aac2922bb8a277eTom Gundersen{
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen static const char *operation_strs[] = {
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [OP_UNSET] = "UNSET",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [OP_MATCH] = "match",
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen [OP_NOMATCH] = "nomatch",
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen [OP_MATCH_MAX] = "MATCH_MAX",
3f85ef0f05ffc51e19f86fb83a1c51e8e3cd6817Harald Hoyer
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen [OP_ADD] = "add",
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen [OP_ASSIGN] = "assign",
97f2d76d4f4dfab8b0629c09926a05a1e5621125Tom Gundersen [OP_ASSIGN_FINAL] = "assign-final",
2ad8416dd057e7e3185169609ca3006e7649f576Zbigniew Jędrzejewski-Szmek} ;
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen
2ad8416dd057e7e3185169609ca3006e7649f576Zbigniew Jędrzejewski-Szmek return operation_strs[type];
f647962d64e844689f3e2acfce6102fc47e76df2Michal Schmidt}
f647962d64e844689f3e2acfce6102fc47e76df2Michal Schmidt
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersenstatic const char *string_glob_str(enum string_glob_type type)
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen{
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen static const char *string_glob_strs[] = {
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [GL_UNSET] = "UNSET",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [GL_PLAIN] = "plain",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [GL_GLOB] = "glob",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [GL_SPLIT] = "split",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [GL_SPLIT_GLOB] = "split-glob",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [GL_SOMETHING] = "split-glob",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen };
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen
2ad8416dd057e7e3185169609ca3006e7649f576Zbigniew Jędrzejewski-Szmek return string_glob_strs[type];
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen}
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen
464cf22f17e0cf2d8bfa6d72b5e7a662d634f149Tom Gundersenstatic const char *token_str(enum token_type type)
464cf22f17e0cf2d8bfa6d72b5e7a662d634f149Tom Gundersen{
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen static const char *token_strs[] = {
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [TK_UNSET] = "UNSET",
3b64e4d4f40baac56148c7d333d6a0053358ec7aTom Gundersen [TK_RULE] = "RULE",
3b64e4d4f40baac56148c7d333d6a0053358ec7aTom Gundersen
3b64e4d4f40baac56148c7d333d6a0053358ec7aTom Gundersen [TK_M_ACTION] = "M ACTION",
3b64e4d4f40baac56148c7d333d6a0053358ec7aTom Gundersen [TK_M_DEVPATH] = "M DEVPATH",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [TK_M_KERNEL] = "M KERNEL",
7eb08da4b388b920c8a894b1500c9cc7dc1f31efTom Gundersen [TK_M_DEVLINK] = "M DEVLINK",
7eb08da4b388b920c8a894b1500c9cc7dc1f31efTom Gundersen [TK_M_NAME] = "M NAME",
7eb08da4b388b920c8a894b1500c9cc7dc1f31efTom Gundersen [TK_M_ENV] = "M ENV",
b3e013148603aa670bc2c060ac63d48e54d76fc2Tom Gundersen [TK_M_TAG] = "M TAG",
edbb03e95a3c31bf719d5c6c46eec14d0bcb9c8fTom Gundersen [TK_M_SUBSYSTEM] = "M SUBSYSTEM",
7eb08da4b388b920c8a894b1500c9cc7dc1f31efTom Gundersen [TK_M_DRIVER] = "M DRIVER",
edbb03e95a3c31bf719d5c6c46eec14d0bcb9c8fTom Gundersen [TK_M_WAITFOR] = "M WAITFOR",
eb7040ec50fbfe5aad9eaf305bd442a4a235abaaTom Gundersen [TK_M_ATTR] = "M ATTR",
b3e013148603aa670bc2c060ac63d48e54d76fc2Tom Gundersen
9b1c2626cef16722603bded9bb52033aba34dd74Tom Gundersen [TK_M_PARENTS_MIN] = "M PARENTS_MIN",
bf175aafd20c9ef974709ef12c5acf836121af33Tom Gundersen [TK_M_KERNELS] = "M KERNELS",
b3e013148603aa670bc2c060ac63d48e54d76fc2Tom Gundersen [TK_M_SUBSYSTEMS] = "M SUBSYSTEMS",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_M_DRIVERS] = "M DRIVERS",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_M_ATTRS] = "M ATTRS",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_M_TAGS] = "M TAGS",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_M_PARENTS_MAX] = "M PARENTS_MAX",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_M_TEST] = "M TEST",
dc75168823540076b354135f6e2de7a9a978fbcaZbigniew Jędrzejewski-Szmek [TK_M_EVENT_TIMEOUT] = "M EVENT_TIMEOUT",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_M_PROGRAM] = "M PROGRAM",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_M_IMPORT_FILE] = "M IMPORT_FILE",
ca6038b89645c0c1bd547d6a420bf95eb3d6f4ccTom Gundersen [TK_M_IMPORT_PROG] = "M IMPORT_PROG",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_M_IMPORT_BUILTIN] = "M IMPORT_BUILTIN",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_M_IMPORT_DB] = "M IMPORT_DB",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_M_IMPORT_CMDLINE] = "M IMPORT_CMDLINE",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_M_IMPORT_PARENT] = "M IMPORT_PARENT",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_M_RESULT] = "M RESULT",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_M_MAX] = "M MAX",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_A_STRING_ESCAPE_NONE] = "A STRING_ESCAPE_NONE",
ca6038b89645c0c1bd547d6a420bf95eb3d6f4ccTom Gundersen [TK_A_STRING_ESCAPE_REPLACE] = "A STRING_ESCAPE_REPLACE",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_A_DB_PERSIST] = "A DB_PERSIST",
ca6038b89645c0c1bd547d6a420bf95eb3d6f4ccTom Gundersen [TK_A_INOTIFY_WATCH] = "A INOTIFY_WATCH",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_A_DEVLINK_PRIO] = "A DEVLINK_PRIO",
ca6038b89645c0c1bd547d6a420bf95eb3d6f4ccTom Gundersen [TK_A_OWNER] = "A OWNER",
ca6038b89645c0c1bd547d6a420bf95eb3d6f4ccTom Gundersen [TK_A_GROUP] = "A GROUP",
32bc8adcd836baff68e4d0f53b9a382f358cccf8Tom Gundersen [TK_A_MODE] = "A MODE",
ca6038b89645c0c1bd547d6a420bf95eb3d6f4ccTom Gundersen [TK_A_OWNER_ID] = "A OWNER_ID",
ca6038b89645c0c1bd547d6a420bf95eb3d6f4ccTom Gundersen [TK_A_GROUP_ID] = "A GROUP_ID",
ca6038b89645c0c1bd547d6a420bf95eb3d6f4ccTom Gundersen [TK_A_STATIC_NODE] = "A STATIC_NODE",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [TK_A_MODE_ID] = "A MODE_ID",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [TK_A_ENV] = "A ENV",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [TK_A_TAG] = "A ENV",
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen [TK_A_NAME] = "A NAME",
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen [TK_A_DEVLINK] = "A DEVLINK",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [TK_A_ATTR] = "A ATTR",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [TK_A_RUN_BUILTIN] = "A RUN_BUILTIN",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen [TK_A_RUN_PROGRAM] = "A RUN_PROGRAM",
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen [TK_A_GOTO] = "A GOTO",
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen
f1ac700248f231b7bdac2aafe8c35650efddb89fTom Gundersen [TK_END] = "END",
f1ac700248f231b7bdac2aafe8c35650efddb89fTom Gundersen };
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersen return token_strs[type];
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen}
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersenstatic void dump_token(struct udev_rules *rules, struct token *token)
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersen{
f1ac700248f231b7bdac2aafe8c35650efddb89fTom Gundersen enum token_type type = token->type;
f1ac700248f231b7bdac2aafe8c35650efddb89fTom Gundersen enum operation_type op = token->key.op;
f1ac700248f231b7bdac2aafe8c35650efddb89fTom Gundersen enum string_glob_type glob = token->key.glob;
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen const char *value = str(rules, token->key.value_off);
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen const char *attr = &rules->buf[token->key.attr_off];
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen switch (type) {
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen case TK_RULE:
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen {
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen const char *tks_ptr = (char *)rules->tokens;
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen const char *tk_ptr = (char *)token;
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen unsigned int idx = (tk_ptr - tks_ptr) / sizeof(struct token);
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersen
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen log_debug("* RULE %s:%u, token: %u, count: %u, label: '%s'\n",
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen &rules->buf[token->rule.filename_off], token->rule.filename_line,
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersen idx, token->rule.token_count,
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersen &rules->buf[token->rule.label_off]);
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen break;
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen }
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen case TK_M_ACTION:
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen case TK_M_DEVPATH:
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen case TK_M_KERNEL:
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen case TK_M_SUBSYSTEM:
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen case TK_M_DRIVER:
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersen case TK_M_WAITFOR:
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersen case TK_M_DEVLINK:
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen case TK_M_NAME:
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersen case TK_M_KERNELS:
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen case TK_M_SUBSYSTEMS:
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersen case TK_M_DRIVERS:
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen case TK_M_TAGS:
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen case TK_M_PROGRAM:
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen case TK_M_IMPORT_FILE:
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersen case TK_M_IMPORT_PROG:
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersen case TK_M_IMPORT_DB:
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen case TK_M_IMPORT_CMDLINE:
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen case TK_M_IMPORT_PARENT:
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen case TK_M_RESULT:
464cf22f17e0cf2d8bfa6d72b5e7a662d634f149Tom Gundersen case TK_A_NAME:
464cf22f17e0cf2d8bfa6d72b5e7a662d634f149Tom Gundersen case TK_A_DEVLINK:
9bf3b53533cdc9b95c921b71da755401f223f765Lennart Poettering case TK_A_OWNER:
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen case TK_A_GROUP:
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen case TK_A_MODE:
9bf3b53533cdc9b95c921b71da755401f223f765Lennart Poettering case TK_A_RUN_BUILTIN:
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen case TK_A_RUN_PROGRAM:
9bf3b53533cdc9b95c921b71da755401f223f765Lennart Poettering log_debug("%s %s '%s'(%s)\n",
9bf3b53533cdc9b95c921b71da755401f223f765Lennart Poettering token_str(type), operation_str(op), value, string_glob_str(glob));
b5db00e52ee2e20578839e4e4488f7b9af9abc38Umut Tezduyar Lindskog break;
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen case TK_M_IMPORT_BUILTIN:
55428d84f31b52da1c50b7469f14e15740547f20Tom Gundersen log_debug("%s %i '%s'\n", token_str(type), token->key.builtin_cmd, value);
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen break;
9bf3b53533cdc9b95c921b71da755401f223f765Lennart Poettering case TK_M_ATTR:
9bf3b53533cdc9b95c921b71da755401f223f765Lennart Poettering case TK_M_ATTRS:
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen case TK_M_ENV:
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen case TK_A_ATTR:
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen case TK_A_ENV:
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersen log_debug("%s %s '%s' '%s'(%s)\n",
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersen token_str(type), operation_str(op), attr, value, string_glob_str(glob));
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen break;
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen case TK_M_TAG:
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen case TK_A_TAG:
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen log_debug("%s %s '%s'\n", token_str(type), operation_str(op), value);
464cf22f17e0cf2d8bfa6d72b5e7a662d634f149Tom Gundersen break;
464cf22f17e0cf2d8bfa6d72b5e7a662d634f149Tom Gundersen case TK_A_STRING_ESCAPE_NONE:
3e137a1b9a0eac2bf43d493d3302c3c959b6ccdbTom Gundersen case TK_A_STRING_ESCAPE_REPLACE:
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen case TK_A_DB_PERSIST:
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen log_debug("%s\n", token_str(type));
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen break;
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen case TK_M_TEST:
43b3a5ef61859f06cdbaf26765cab8e1adac4296Tom Gundersen log_debug("%s %s '%s'(%s) %#o\n",
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen token_str(type), operation_str(op), value, string_glob_str(glob), token->key.mode);
3e137a1b9a0eac2bf43d493d3302c3c959b6ccdbTom Gundersen break;
3e137a1b9a0eac2bf43d493d3302c3c959b6ccdbTom Gundersen case TK_A_INOTIFY_WATCH:
3e137a1b9a0eac2bf43d493d3302c3c959b6ccdbTom Gundersen log_debug("%s %u\n", token_str(type), token->key.watch);
3e137a1b9a0eac2bf43d493d3302c3c959b6ccdbTom Gundersen break;
3e137a1b9a0eac2bf43d493d3302c3c959b6ccdbTom Gundersen case TK_A_DEVLINK_PRIO:
3e137a1b9a0eac2bf43d493d3302c3c959b6ccdbTom Gundersen log_debug("%s %u\n", token_str(type), token->key.devlink_prio);
3e137a1b9a0eac2bf43d493d3302c3c959b6ccdbTom Gundersen break;
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen case TK_A_OWNER_ID:
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen log_debug("%s %s %u\n", token_str(type), operation_str(op), token->key.uid);
dab495dc23bf9a5ba0487a057bb594355555a0e9Tom Gundersen break;
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen case TK_A_GROUP_ID:
dab495dc23bf9a5ba0487a057bb594355555a0e9Tom Gundersen log_debug("%s %s %u\n", token_str(type), operation_str(op), token->key.gid);
755bde375f4db393ad06e73340bfcf4d0cf91bb2Lennart Poettering break;
755bde375f4db393ad06e73340bfcf4d0cf91bb2Lennart Poettering case TK_A_MODE_ID:
a501033335ed402c8f7e86fe41a15531ba69abd7Tom Gundersen log_debug("%s %s %#o\n", token_str(type), operation_str(op), token->key.mode);
aedca89268ed4fd6be41e55a605f011033ad1fb5Tom Gundersen break;
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen case TK_A_STATIC_NODE:
755bde375f4db393ad06e73340bfcf4d0cf91bb2Lennart Poettering log_debug("%s '%s'\n", token_str(type), value);
755bde375f4db393ad06e73340bfcf4d0cf91bb2Lennart Poettering break;
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen case TK_M_EVENT_TIMEOUT:
43b3a5ef61859f06cdbaf26765cab8e1adac4296Tom Gundersen log_debug("%s %u\n", token_str(type), token->key.event_timeout);
43b3a5ef61859f06cdbaf26765cab8e1adac4296Tom Gundersen break;
43b3a5ef61859f06cdbaf26765cab8e1adac4296Tom Gundersen case TK_A_GOTO:
43b3a5ef61859f06cdbaf26765cab8e1adac4296Tom Gundersen log_debug("%s '%s' %u\n", token_str(type), value, token->key.rule_goto);
43b3a5ef61859f06cdbaf26765cab8e1adac4296Tom Gundersen break;
43b3a5ef61859f06cdbaf26765cab8e1adac4296Tom Gundersen case TK_END:
f61942250a43a123580d7bbe5d7873dc5118ed97Tom Gundersen log_debug("* %s\n", token_str(type));
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen break;
daeb71a36a98834664e4d95773a3629b746f4db8Tom Gundersen case TK_M_PARENTS_MIN:
68ba38770640413b4fa06773447666eb88a38d4cTom Gundersen case TK_M_PARENTS_MAX:
68ba38770640413b4fa06773447666eb88a38d4cTom Gundersen case TK_M_MAX:
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen case TK_UNSET:
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen log_debug("unknown type %u\n", type);
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen break;
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen }
e51660ae56bb747ece2cab8fe6eec37f4d06a438Tom Gundersen}
e51660ae56bb747ece2cab8fe6eec37f4d06a438Tom Gundersen
e51660ae56bb747ece2cab8fe6eec37f4d06a438Tom Gundersenstatic void dump_rules(struct udev_rules *rules)
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen{
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen unsigned int i;
daeb71a36a98834664e4d95773a3629b746f4db8Tom Gundersen
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen log_debug("dumping %u (%zu bytes) tokens, %u (%zu bytes) strings\n",
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen rules->token_cur,
daeb71a36a98834664e4d95773a3629b746f4db8Tom Gundersen rules->token_cur * sizeof(struct token),
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen rules->buf_count,
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen rules->buf_cur);
daeb71a36a98834664e4d95773a3629b746f4db8Tom Gundersen for(i = 0; i < rules->token_cur; i++)
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen dump_token(rules, &rules->tokens[i]);
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen}
daeb71a36a98834664e4d95773a3629b746f4db8Tom Gundersen#else
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersenstatic inline const char *operation_str(enum operation_type type) { return NULL; }
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersenstatic inline const char *token_str(enum token_type type) { return NULL; }
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersenstatic inline void dump_token(struct udev_rules *rules, struct token *token) {}
daeb71a36a98834664e4d95773a3629b746f4db8Tom Gundersenstatic inline void dump_rules(struct udev_rules *rules) {}
daeb71a36a98834664e4d95773a3629b746f4db8Tom Gundersen#endif /* DEBUG */
daeb71a36a98834664e4d95773a3629b746f4db8Tom Gundersen
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersenstatic int add_token(struct udev_rules *rules, struct token *token)
3c9b886068d99e5d3cbabcac32a4decf37244c54Tom Gundersen{
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen /* grow buffer if needed */
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen if (rules->token_cur+1 >= rules->token_max) {
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen struct token *tokens;
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen unsigned int add;
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen /* double the buffer size */
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen add = rules->token_max;
92d927f850d4b668b44f3e5f41e266d934d03726Tom Gundersen if (add < 8)
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen add = 8;
1c25683e0f40c6169676cc44fa1897082597feecTom Gundersen
1c25683e0f40c6169676cc44fa1897082597feecTom Gundersen tokens = realloc(rules->tokens, (rules->token_max + add ) * sizeof(struct token));
a669ea9860900d5cdebbc4cb9aaea72db7e28a02Tom Gundersen if (tokens == NULL)
1c25683e0f40c6169676cc44fa1897082597feecTom Gundersen return -1;
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen rules->tokens = tokens;
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen rules->token_max += add;
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen }
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen memcpy(&rules->tokens[rules->token_cur], token, sizeof(struct token));
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen rules->token_cur++;
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen return 0;
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen}
1c25683e0f40c6169676cc44fa1897082597feecTom Gundersen
1c25683e0f40c6169676cc44fa1897082597feecTom Gundersenstatic uid_t add_uid(struct udev_rules *rules, const char *owner)
a669ea9860900d5cdebbc4cb9aaea72db7e28a02Tom Gundersen{
1c25683e0f40c6169676cc44fa1897082597feecTom Gundersen unsigned int i;
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen uid_t uid;
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen unsigned int off;
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen /* lookup, if we know it already */
66d3752e812915a549ebee01769ee761c1495667Jacob Keller for (i = 0; i < rules->uids_cur; i++) {
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen off = rules->uids[i].name_off;
5fde13d748749f0e06e2e6cdd15f0980a79ea82cTom Gundersen if (streq(rules_str(rules, off), owner)) {
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen uid = rules->uids[i].uid;
16b9b87aeee9353b5b8dae6089a69752422a5b09Tom Gundersen return uid;
dab495dc23bf9a5ba0487a057bb594355555a0e9Tom Gundersen }
f647962d64e844689f3e2acfce6102fc47e76df2Michal Schmidt }
f647962d64e844689f3e2acfce6102fc47e76df2Michal Schmidt uid = util_lookup_user(rules->udev, owner);
43b3a5ef61859f06cdbaf26765cab8e1adac4296Tom Gundersen
d95b83b87d7d7c50e550f7128827f73a321c8934Tom Gundersen /* grow buffer if needed */
d95b83b87d7d7c50e550f7128827f73a321c8934Tom Gundersen if (rules->uids_cur+1 >= rules->uids_max) {
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen struct uid_gid *uids;
af6f0d422c521374ee6a2dd92df5935a5a476ae5Tom Gundersen unsigned int add;
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen /* double the buffer size */
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen add = rules->uids_max;
a7f7d1bde43fc825c49afea3f946f5b4b3d563e0Harald Hoyer if (add < 1)
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen add = 8;
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen uids = realloc(rules->uids, (rules->uids_max + add ) * sizeof(struct uid_gid));
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen if (uids == NULL)
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen return uid;
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen rules->uids = uids;
aedca89268ed4fd6be41e55a605f011033ad1fb5Tom Gundersen rules->uids_max += add;
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen }
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen rules->uids[rules->uids_cur].uid = uid;
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen off = rules_add_string(rules, owner);
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen if (off <= 0)
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen return uid;
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen rules->uids[rules->uids_cur].name_off = off;
847a8a5fed4d265dfa659917515c6f9bd1b8d5c4Tom Gundersen rules->uids_cur++;
2c5859afecee81e345fc9526b1083bf79990ffb8Daniel Mack return uid;
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen}
66d3752e812915a549ebee01769ee761c1495667Jacob Keller
66d3752e812915a549ebee01769ee761c1495667Jacob Kellerstatic gid_t add_gid(struct udev_rules *rules, const char *group)
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen{
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen unsigned int i;
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen gid_t gid;
464cf22f17e0cf2d8bfa6d72b5e7a662d634f149Tom Gundersen unsigned int off;
464cf22f17e0cf2d8bfa6d72b5e7a662d634f149Tom Gundersen
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen /* lookup, if we know it already */
2c5859afecee81e345fc9526b1083bf79990ffb8Daniel Mack for (i = 0; i < rules->gids_cur; i++) {
04b67d49254d956d31bcfe80340fb9df7ed332d3Tom Gundersen off = rules->gids[i].name_off;
e51660ae56bb747ece2cab8fe6eec37f4d06a438Tom Gundersen if (streq(rules_str(rules, off), group)) {
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen gid = rules->gids[i].gid;
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen return gid;
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen }
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen }
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen gid = util_lookup_group(rules->udev, group);
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen
be32eb9b7fbcb22e4b648086d644135e38279633Tom Gundersen /* grow buffer if needed */
464cf22f17e0cf2d8bfa6d72b5e7a662d634f149Tom Gundersen if (rules->gids_cur+1 >= rules->gids_max) {
464cf22f17e0cf2d8bfa6d72b5e7a662d634f149Tom Gundersen struct uid_gid *gids;
464cf22f17e0cf2d8bfa6d72b5e7a662d634f149Tom Gundersen unsigned int add;
/* double the buffer size */
add = rules->gids_max;
if (add < 1)
add = 8;
gids = realloc(rules->gids, (rules->gids_max + add ) * sizeof(struct uid_gid));
if (gids == NULL)
return gid;
rules->gids = gids;
rules->gids_max += add;
}
rules->gids[rules->gids_cur].gid = gid;
off = rules_add_string(rules, group);
if (off <= 0)
return gid;
rules->gids[rules->gids_cur].name_off = off;
rules->gids_cur++;
return gid;
}
static int import_property_from_string(struct udev_device *dev, char *line)
{
char *key;
char *val;
size_t len;
/* find key */
key = line;
while (isspace(key[0]))
key++;
/* comment or empty line */
if (key[0] == '#' || key[0] == '\0')
return -1;
/* split key/value */
val = strchr(key, '=');
if (val == NULL)
return -1;
val[0] = '\0';
val++;
/* find value */
while (isspace(val[0]))
val++;
/* terminate key */
len = strlen(key);
if (len == 0)
return -1;
while (isspace(key[len-1]))
len--;
key[len] = '\0';
/* terminate value */
len = strlen(val);
if (len == 0)
return -1;
while (isspace(val[len-1]))
len--;
val[len] = '\0';
if (len == 0)
return -1;
/* unquote */
if (val[0] == '"' || val[0] == '\'') {
if (val[len-1] != val[0]) {
log_debug("inconsistent quoting: '%s', skip\n", line);
return -1;
}
val[len-1] = '\0';
val++;
}
/* handle device, renamed by external tool, returning new path */
if (streq(key, "DEVPATH")) {
char syspath[UTIL_PATH_SIZE];
log_debug("updating devpath from '%s' to '%s'\n",
udev_device_get_devpath(dev), val);
util_strscpyl(syspath, sizeof(syspath), "/sys", val, NULL);
udev_device_set_syspath(dev, syspath);
} else {
struct udev_list_entry *entry;
entry = udev_device_add_property(dev, key, val);
/* store in db, skip private keys */
if (key[0] != '.')
udev_list_entry_set_num(entry, true);
}
return 0;
}
static int import_file_into_properties(struct udev_device *dev, const char *filename)
{
FILE *f;
char line[UTIL_LINE_SIZE];
f = fopen(filename, "re");
if (f == NULL)
return -1;
while (fgets(line, sizeof(line), f) != NULL)
import_property_from_string(dev, line);
fclose(f);
return 0;
}
static int import_program_into_properties(struct udev_event *event, const char *program, const sigset_t *sigmask)
{
struct udev_device *dev = event->dev;
char **envp;
char result[UTIL_LINE_SIZE];
char *line;
int err;
envp = udev_device_get_properties_envp(dev);
err = udev_event_spawn(event, program, envp, sigmask, result, sizeof(result));
if (err < 0)
return err;
line = result;
while (line != NULL) {
char *pos;
pos = strchr(line, '\n');
if (pos != NULL) {
pos[0] = '\0';
pos = &pos[1];
}
import_property_from_string(dev, line);
line = pos;
}
return 0;
}
static int import_parent_into_properties(struct udev_device *dev, const char *filter)
{
struct udev_device *dev_parent;
struct udev_list_entry *list_entry;
dev_parent = udev_device_get_parent(dev);
if (dev_parent == NULL)
return -1;
udev_list_entry_foreach(list_entry, udev_device_get_properties_list_entry(dev_parent)) {
const char *key = udev_list_entry_get_name(list_entry);
const char *val = udev_list_entry_get_value(list_entry);
if (fnmatch(filter, key, 0) == 0) {
struct udev_list_entry *entry;
entry = udev_device_add_property(dev, key, val);
/* store in db, skip private keys */
if (key[0] != '.')
udev_list_entry_set_num(entry, true);
}
}
return 0;
}
#define WAIT_LOOP_PER_SECOND 50
static int wait_for_file(struct udev_device *dev, const char *file, int timeout)
{
char filepath[UTIL_PATH_SIZE];
char devicepath[UTIL_PATH_SIZE];
struct stat stats;
int loop = timeout * WAIT_LOOP_PER_SECOND;
/* a relative path is a device attribute */
devicepath[0] = '\0';
if (file[0] != '/') {
util_strscpyl(devicepath, sizeof(devicepath), udev_device_get_syspath(dev), NULL);
util_strscpyl(filepath, sizeof(filepath), devicepath, "/", file, NULL);
file = filepath;
}
while (--loop) {
const struct timespec duration = { 0, 1000 * 1000 * 1000 / WAIT_LOOP_PER_SECOND };
/* lookup file */
if (stat(file, &stats) == 0) {
log_debug("file '%s' appeared after %i loops\n", file, (timeout * WAIT_LOOP_PER_SECOND) - loop-1);
return 0;
}
/* make sure, the device did not disappear in the meantime */
if (devicepath[0] != '\0' && stat(devicepath, &stats) != 0) {
log_debug("device disappeared while waiting for '%s'\n", file);
return -2;
}
log_debug("wait for '%s' for %i mseconds\n", file, 1000 / WAIT_LOOP_PER_SECOND);
nanosleep(&duration, NULL);
}
log_debug("waiting for '%s' failed\n", file);
return -1;
}
static int attr_subst_subdir(char *attr, size_t len)
{
bool found = false;
if (strstr(attr, "/*/")) {
char *pos;
char dirname[UTIL_PATH_SIZE];
const char *tail;
DIR *dir;
util_strscpy(dirname, sizeof(dirname), attr);
pos = strstr(dirname, "/*/");
if (pos == NULL)
return -1;
pos[0] = '\0';
tail = &pos[2];
dir = opendir(dirname);
if (dir != NULL) {
struct dirent *dent;
for (dent = readdir(dir); dent != NULL; dent = readdir(dir)) {
struct stat stats;
if (dent->d_name[0] == '.')
continue;
util_strscpyl(attr, len, dirname, "/", dent->d_name, tail, NULL);
if (stat(attr, &stats) == 0) {
found = true;
break;
}
}
closedir(dir);
}
}
return found;
}
static int get_key(struct udev *udev, char **line, char **key, enum operation_type *op, char **value)
{
char *linepos;
char *temp;
linepos = *line;
if (linepos == NULL || linepos[0] == '\0')
return -1;
/* skip whitespace */
while (isspace(linepos[0]) || linepos[0] == ',')
linepos++;
/* get the key */
if (linepos[0] == '\0')
return -1;
*key = linepos;
for (;;) {
linepos++;
if (linepos[0] == '\0')
return -1;
if (isspace(linepos[0]))
break;
if (linepos[0] == '=')
break;
if ((linepos[0] == '+') || (linepos[0] == '!') || (linepos[0] == ':'))
if (linepos[1] == '=')
break;
}
/* remember end of key */
temp = linepos;
/* skip whitespace after key */
while (isspace(linepos[0]))
linepos++;
if (linepos[0] == '\0')
return -1;
/* get operation type */
if (linepos[0] == '=' && linepos[1] == '=') {
*op = OP_MATCH;
linepos += 2;
} else if (linepos[0] == '!' && linepos[1] == '=') {
*op = OP_NOMATCH;
linepos += 2;
} else if (linepos[0] == '+' && linepos[1] == '=') {
*op = OP_ADD;
linepos += 2;
} else if (linepos[0] == '=') {
*op = OP_ASSIGN;
linepos++;
} else if (linepos[0] == ':' && linepos[1] == '=') {
*op = OP_ASSIGN_FINAL;
linepos += 2;
} else
return -1;
/* terminate key */
temp[0] = '\0';
/* skip whitespace after operator */
while (isspace(linepos[0]))
linepos++;
if (linepos[0] == '\0')
return -1;
/* get the value */
if (linepos[0] == '"')
linepos++;
else
return -1;
*value = linepos;
/* terminate */
temp = strchr(linepos, '"');
if (!temp)
return -1;
temp[0] = '\0';
temp++;
/* move line to next key */
*line = temp;
return 0;
}
/* extract possible KEY{attr} */
static const char *get_key_attribute(struct udev *udev, char *str)
{
char *pos;
char *attr;
attr = strchr(str, '{');
if (attr != NULL) {
attr++;
pos = strchr(attr, '}');
if (pos == NULL) {
log_error("missing closing brace for format\n");
return NULL;
}
pos[0] = '\0';
return attr;
}
return NULL;
}
static int rule_add_key(struct rule_tmp *rule_tmp, enum token_type type,
enum operation_type op,
const char *value, const void *data)
{
struct token *token = &rule_tmp->token[rule_tmp->token_cur];
const char *attr = NULL;
memset(token, 0x00, sizeof(struct token));
switch (type) {
case TK_M_ACTION:
case TK_M_DEVPATH:
case TK_M_KERNEL:
case TK_M_SUBSYSTEM:
case TK_M_DRIVER:
case TK_M_WAITFOR:
case TK_M_DEVLINK:
case TK_M_NAME:
case TK_M_KERNELS:
case TK_M_SUBSYSTEMS:
case TK_M_DRIVERS:
case TK_M_TAGS:
case TK_M_PROGRAM:
case TK_M_IMPORT_FILE:
case TK_M_IMPORT_PROG:
case TK_M_IMPORT_DB:
case TK_M_IMPORT_CMDLINE:
case TK_M_IMPORT_PARENT:
case TK_M_RESULT:
case TK_A_OWNER:
case TK_A_GROUP:
case TK_A_MODE:
case TK_A_DEVLINK:
case TK_A_NAME:
case TK_A_GOTO:
case TK_M_TAG:
case TK_A_TAG:
token->key.value_off = rules_add_string(rule_tmp->rules, value);
break;
case TK_M_IMPORT_BUILTIN:
token->key.value_off = rules_add_string(rule_tmp->rules, value);
token->key.builtin_cmd = *(enum udev_builtin_cmd *)data;
break;
case TK_M_ENV:
case TK_M_ATTR:
case TK_M_ATTRS:
case TK_A_ATTR:
case TK_A_ENV:
attr = data;
token->key.value_off = rules_add_string(rule_tmp->rules, value);
token->key.attr_off = rules_add_string(rule_tmp->rules, attr);
break;
case TK_M_TEST:
token->key.value_off = rules_add_string(rule_tmp->rules, value);
if (data != NULL)
token->key.mode = *(mode_t *)data;
break;
case TK_A_STRING_ESCAPE_NONE:
case TK_A_STRING_ESCAPE_REPLACE:
case TK_A_DB_PERSIST:
break;
case TK_A_RUN_BUILTIN:
case TK_A_RUN_PROGRAM:
token->key.builtin_cmd = *(enum udev_builtin_cmd *)data;
token->key.value_off = rules_add_string(rule_tmp->rules, value);
break;
case TK_A_INOTIFY_WATCH:
case TK_A_DEVLINK_PRIO:
token->key.devlink_prio = *(int *)data;
break;
case TK_A_OWNER_ID:
token->key.uid = *(uid_t *)data;
break;
case TK_A_GROUP_ID:
token->key.gid = *(gid_t *)data;
break;
case TK_A_MODE_ID:
token->key.mode = *(mode_t *)data;
break;
case TK_A_STATIC_NODE:
token->key.value_off = rules_add_string(rule_tmp->rules, value);
break;
case TK_M_EVENT_TIMEOUT:
token->key.event_timeout = *(int *)data;
break;
case TK_RULE:
case TK_M_PARENTS_MIN:
case TK_M_PARENTS_MAX:
case TK_M_MAX:
case TK_END:
case TK_UNSET:
log_error("wrong type %u\n", type);
return -1;
}
if (value != NULL && type < TK_M_MAX) {
/* check if we need to split or call fnmatch() while matching rules */
enum string_glob_type glob;
int has_split;
int has_glob;
has_split = (strchr(value, '|') != NULL);
has_glob = (strchr(value, '*') != NULL || strchr(value, '?') != NULL || strchr(value, '[') != NULL);
if (has_split && has_glob) {
glob = GL_SPLIT_GLOB;
} else if (has_split) {
glob = GL_SPLIT;
} else if (has_glob) {
if (streq(value, "?*"))
glob = GL_SOMETHING;
else
glob = GL_GLOB;
} else {
glob = GL_PLAIN;
}
token->key.glob = glob;
}
if (value != NULL && type > TK_M_MAX) {
/* check if assigned value has substitution chars */
if (value[0] == '[')
token->key.subst = SB_SUBSYS;
else if (strchr(value, '%') != NULL || strchr(value, '$') != NULL)
token->key.subst = SB_FORMAT;
else
token->key.subst = SB_NONE;
}
if (attr != NULL) {
/* check if property/attribut name has substitution chars */
if (attr[0] == '[')
token->key.attrsubst = SB_SUBSYS;
else if (strchr(attr, '%') != NULL || strchr(attr, '$') != NULL)
token->key.attrsubst = SB_FORMAT;
else
token->key.attrsubst = SB_NONE;
}
token->key.type = type;
token->key.op = op;
rule_tmp->token_cur++;
if (rule_tmp->token_cur >= ELEMENTSOF(rule_tmp->token)) {
log_error("temporary rule array too small\n");
return -1;
}
return 0;
}
static int sort_token(struct udev_rules *rules, struct rule_tmp *rule_tmp)
{
unsigned int i;
unsigned int start = 0;
unsigned int end = rule_tmp->token_cur;
for (i = 0; i < rule_tmp->token_cur; i++) {
enum token_type next_val = TK_UNSET;
unsigned int next_idx = 0;
unsigned int j;
/* find smallest value */
for (j = start; j < end; j++) {
if (rule_tmp->token[j].type == TK_UNSET)
continue;
if (next_val == TK_UNSET || rule_tmp->token[j].type < next_val) {
next_val = rule_tmp->token[j].type;
next_idx = j;
}
}
/* add token and mark done */
if (add_token(rules, &rule_tmp->token[next_idx]) != 0)
return -1;
rule_tmp->token[next_idx].type = TK_UNSET;
/* shrink range */
if (next_idx == start)
start++;
if (next_idx+1 == end)
end--;
}
return 0;
}
static int add_rule(struct udev_rules *rules, char *line,
const char *filename, unsigned int filename_off, unsigned int lineno)
{
char *linepos;
const char *attr;
struct rule_tmp rule_tmp;
memset(&rule_tmp, 0x00, sizeof(struct rule_tmp));
rule_tmp.rules = rules;
rule_tmp.rule.type = TK_RULE;
/* the offset in the rule is limited to unsigned short */
if (filename_off < USHRT_MAX)
rule_tmp.rule.rule.filename_off = filename_off;
rule_tmp.rule.rule.filename_line = lineno;
linepos = line;
for (;;) {
char *key;
char *value;
enum operation_type op;
if (get_key(rules->udev, &linepos, &key, &op, &value) != 0)
break;
if (streq(key, "ACTION")) {
if (op > OP_MATCH_MAX) {
log_error("invalid ACTION operation\n");
goto invalid;
}
rule_add_key(&rule_tmp, TK_M_ACTION, op, value, NULL);
continue;
}
if (streq(key, "DEVPATH")) {
if (op > OP_MATCH_MAX) {
log_error("invalid DEVPATH operation\n");
goto invalid;
}
rule_add_key(&rule_tmp, TK_M_DEVPATH, op, value, NULL);
continue;
}
if (streq(key, "KERNEL")) {
if (op > OP_MATCH_MAX) {
log_error("invalid KERNEL operation\n");
goto invalid;
}
rule_add_key(&rule_tmp, TK_M_KERNEL, op, value, NULL);
continue;
}
if (streq(key, "SUBSYSTEM")) {
if (op > OP_MATCH_MAX) {
log_error("invalid SUBSYSTEM operation\n");
goto invalid;
}
/* bus, class, subsystem events should all be the same */
if (streq(value, "subsystem") ||
streq(value, "bus") ||
streq(value, "class")) {
if (streq(value, "bus") || streq(value, "class"))
log_error("'%s' must be specified as 'subsystem' \n"
"please fix it in %s:%u", value, filename, lineno);
rule_add_key(&rule_tmp, TK_M_SUBSYSTEM, op, "subsystem|class|bus", NULL);
} else
rule_add_key(&rule_tmp, TK_M_SUBSYSTEM, op, value, NULL);
continue;
}
if (streq(key, "DRIVER")) {
if (op > OP_MATCH_MAX) {
log_error("invalid DRIVER operation\n");
goto invalid;
}
rule_add_key(&rule_tmp, TK_M_DRIVER, op, value, NULL);
continue;
}
if (startswith(key, "ATTR{")) {
attr = get_key_attribute(rules->udev, key + sizeof("ATTR")-1);
if (attr == NULL) {
log_error("error parsing ATTR attribute\n");
goto invalid;
}
if (op < OP_MATCH_MAX) {
rule_add_key(&rule_tmp, TK_M_ATTR, op, value, attr);
} else {
rule_add_key(&rule_tmp, TK_A_ATTR, op, value, attr);
}
continue;
}
if (streq(key, "KERNELS")) {
if (op > OP_MATCH_MAX) {
log_error("invalid KERNELS operation\n");
goto invalid;
}
rule_add_key(&rule_tmp, TK_M_KERNELS, op, value, NULL);
continue;
}
if (streq(key, "SUBSYSTEMS")) {
if (op > OP_MATCH_MAX) {
log_error("invalid SUBSYSTEMS operation\n");
goto invalid;
}
rule_add_key(&rule_tmp, TK_M_SUBSYSTEMS, op, value, NULL);
continue;
}
if (streq(key, "DRIVERS")) {
if (op > OP_MATCH_MAX) {
log_error("invalid DRIVERS operation\n");
goto invalid;
}
rule_add_key(&rule_tmp, TK_M_DRIVERS, op, value, NULL);
continue;
}
if (startswith(key, "ATTRS{")) {
if (op > OP_MATCH_MAX) {
log_error("invalid ATTRS operation\n");
goto invalid;
}
attr = get_key_attribute(rules->udev, key + sizeof("ATTRS")-1);
if (attr == NULL) {
log_error("error parsing ATTRS attribute\n");
goto invalid;
}
if (startswith(attr, "device/"))
log_error("the 'device' link may not be available in a future kernel, "
"please fix it in %s:%u", filename, lineno);
else if (strstr(attr, "../") != NULL)
log_error("do not reference parent sysfs directories directly, "
"it may break with a future kernel, please fix it in %s:%u", filename, lineno);
rule_add_key(&rule_tmp, TK_M_ATTRS, op, value, attr);
continue;
}
if (streq(key, "TAGS")) {
if (op > OP_MATCH_MAX) {
log_error("invalid TAGS operation\n");
goto invalid;
}
rule_add_key(&rule_tmp, TK_M_TAGS, op, value, NULL);
continue;
}
if (startswith(key, "ENV{")) {
attr = get_key_attribute(rules->udev, key + sizeof("ENV")-1);
if (attr == NULL) {
log_error("error parsing ENV attribute\n");
goto invalid;
}
if (op < OP_MATCH_MAX) {
if (rule_add_key(&rule_tmp, TK_M_ENV, op, value, attr) != 0)
goto invalid;
} else {
static const char *blacklist[] = {
"ACTION",
"SUBSYSTEM",
"DEVTYPE",
"MAJOR",
"MINOR",
"DRIVER",
"IFINDEX",
"DEVNAME",
"DEVLINKS",
"DEVPATH",
"TAGS",
};
unsigned int i;
for (i = 0; i < ELEMENTSOF(blacklist); i++) {
if (!streq(attr, blacklist[i]))
continue;
log_error("invalid ENV attribute, '%s' can not be set %s:%u\n", attr, filename, lineno);
goto invalid;
}
if (rule_add_key(&rule_tmp, TK_A_ENV, op, value, attr) != 0)
goto invalid;
}
continue;
}
if (streq(key, "TAG")) {
if (op < OP_MATCH_MAX)
rule_add_key(&rule_tmp, TK_M_TAG, op, value, NULL);
else
rule_add_key(&rule_tmp, TK_A_TAG, op, value, NULL);
continue;
}
if (streq(key, "PROGRAM")) {
rule_add_key(&rule_tmp, TK_M_PROGRAM, op, value, NULL);
continue;
}
if (streq(key, "RESULT")) {
if (op > OP_MATCH_MAX) {
log_error("invalid RESULT operation\n");
goto invalid;
}
rule_add_key(&rule_tmp, TK_M_RESULT, op, value, NULL);
continue;
}
if (startswith(key, "IMPORT")) {
attr = get_key_attribute(rules->udev, key + sizeof("IMPORT")-1);
if (attr == NULL) {
log_error("IMPORT{} type missing, ignoring IMPORT %s:%u\n", filename, lineno);
continue;
}
if (streq(attr, "program")) {
/* find known built-in command */
if (value[0] != '/') {
enum udev_builtin_cmd cmd;
cmd = udev_builtin_lookup(value);
if (cmd < UDEV_BUILTIN_MAX) {
log_debug("IMPORT found builtin '%s', replacing %s:%u\n",
value, filename, lineno);
rule_add_key(&rule_tmp, TK_M_IMPORT_BUILTIN, op, value, &cmd);
continue;
}
}
rule_add_key(&rule_tmp, TK_M_IMPORT_PROG, op, value, NULL);
} else if (streq(attr, "builtin")) {
enum udev_builtin_cmd cmd = udev_builtin_lookup(value);
if (cmd < UDEV_BUILTIN_MAX)
rule_add_key(&rule_tmp, TK_M_IMPORT_BUILTIN, op, value, &cmd);
else
log_error("IMPORT{builtin}: '%s' unknown %s:%u\n", value, filename, lineno);
} else if (streq(attr, "file")) {
rule_add_key(&rule_tmp, TK_M_IMPORT_FILE, op, value, NULL);
} else if (streq(attr, "db")) {
rule_add_key(&rule_tmp, TK_M_IMPORT_DB, op, value, NULL);
} else if (streq(attr, "cmdline")) {
rule_add_key(&rule_tmp, TK_M_IMPORT_CMDLINE, op, value, NULL);
} else if (streq(attr, "parent")) {
rule_add_key(&rule_tmp, TK_M_IMPORT_PARENT, op, value, NULL);
} else
log_error("IMPORT{} unknown type, ignoring IMPORT %s:%u\n", filename, lineno);
continue;
}
if (startswith(key, "TEST")) {
mode_t mode = 0;
if (op > OP_MATCH_MAX) {
log_error("invalid TEST operation\n");
goto invalid;
}
attr = get_key_attribute(rules->udev, key + sizeof("TEST")-1);
if (attr != NULL) {
mode = strtol(attr, NULL, 8);
rule_add_key(&rule_tmp, TK_M_TEST, op, value, &mode);
} else {
rule_add_key(&rule_tmp, TK_M_TEST, op, value, NULL);
}
continue;
}
if (startswith(key, "RUN")) {
attr = get_key_attribute(rules->udev, key + sizeof("RUN")-1);
if (attr == NULL)
attr = "program";
if (streq(attr, "builtin")) {
enum udev_builtin_cmd cmd = udev_builtin_lookup(value);
if (cmd < UDEV_BUILTIN_MAX)
rule_add_key(&rule_tmp, TK_A_RUN_BUILTIN, op, value, &cmd);
else
log_error("IMPORT{builtin}: '%s' unknown %s:%u\n", value, filename, lineno);
} else if (streq(attr, "program")) {
enum udev_builtin_cmd cmd = UDEV_BUILTIN_MAX;
rule_add_key(&rule_tmp, TK_A_RUN_PROGRAM, op, value, &cmd);
} else {
log_error("RUN{} unknown type, ignoring RUN %s:%u\n", filename, lineno);
}
continue;
}
if (streq(key, "WAIT_FOR") || streq(key, "WAIT_FOR_SYSFS")) {
rule_add_key(&rule_tmp, TK_M_WAITFOR, 0, value, NULL);
continue;
}
if (streq(key, "LABEL")) {
rule_tmp.rule.rule.label_off = rules_add_string(rules, value);
continue;
}
if (streq(key, "GOTO")) {
rule_add_key(&rule_tmp, TK_A_GOTO, 0, value, NULL);
continue;
}
if (startswith(key, "NAME")) {
if (op < OP_MATCH_MAX) {
rule_add_key(&rule_tmp, TK_M_NAME, op, value, NULL);
} else {
if (streq(value, "%k")) {
log_error("NAME=\"%%k\" is ignored, because it breaks kernel supplied names, "
"please remove it from %s:%u\n", filename, lineno);
continue;
}
if (value[0] == '\0') {
log_debug("NAME=\"\" is ignored, because udev will not delete any device nodes, "
"please remove it from %s:%u\n", filename, lineno);
continue;
}
rule_add_key(&rule_tmp, TK_A_NAME, op, value, NULL);
}
rule_tmp.rule.rule.can_set_name = true;
continue;
}
if (streq(key, "SYMLINK")) {
if (op < OP_MATCH_MAX)
rule_add_key(&rule_tmp, TK_M_DEVLINK, op, value, NULL);
else
rule_add_key(&rule_tmp, TK_A_DEVLINK, op, value, NULL);
rule_tmp.rule.rule.can_set_name = true;
continue;
}
if (streq(key, "OWNER")) {
uid_t uid;
char *endptr;
uid = strtoul(value, &endptr, 10);
if (endptr[0] == '\0') {
rule_add_key(&rule_tmp, TK_A_OWNER_ID, op, NULL, &uid);
} else if ((rules->resolve_names > 0) && strchr("$%", value[0]) == NULL) {
uid = add_uid(rules, value);
rule_add_key(&rule_tmp, TK_A_OWNER_ID, op, NULL, &uid);
} else if (rules->resolve_names >= 0) {
rule_add_key(&rule_tmp, TK_A_OWNER, op, value, NULL);
}
rule_tmp.rule.rule.can_set_name = true;
continue;
}
if (streq(key, "GROUP")) {
gid_t gid;
char *endptr;
gid = strtoul(value, &endptr, 10);
if (endptr[0] == '\0') {
rule_add_key(&rule_tmp, TK_A_GROUP_ID, op, NULL, &gid);
} else if ((rules->resolve_names > 0) && strchr("$%", value[0]) == NULL) {
gid = add_gid(rules, value);
rule_add_key(&rule_tmp, TK_A_GROUP_ID, op, NULL, &gid);
} else if (rules->resolve_names >= 0) {
rule_add_key(&rule_tmp, TK_A_GROUP, op, value, NULL);
}
rule_tmp.rule.rule.can_set_name = true;
continue;
}
if (streq(key, "MODE")) {
mode_t mode;
char *endptr;
mode = strtol(value, &endptr, 8);
if (endptr[0] == '\0')
rule_add_key(&rule_tmp, TK_A_MODE_ID, op, NULL, &mode);
else
rule_add_key(&rule_tmp, TK_A_MODE, op, value, NULL);
rule_tmp.rule.rule.can_set_name = true;
continue;
}
if (streq(key, "OPTIONS")) {
const char *pos;
pos = strstr(value, "link_priority=");
if (pos != NULL) {
int prio = atoi(&pos[strlen("link_priority=")]);
rule_add_key(&rule_tmp, TK_A_DEVLINK_PRIO, op, NULL, &prio);
}
pos = strstr(value, "event_timeout=");
if (pos != NULL) {
int tout = atoi(&pos[strlen("event_timeout=")]);
rule_add_key(&rule_tmp, TK_M_EVENT_TIMEOUT, op, NULL, &tout);
}
pos = strstr(value, "string_escape=");
if (pos != NULL) {
pos = &pos[strlen("string_escape=")];
if (startswith(pos, "none"))
rule_add_key(&rule_tmp, TK_A_STRING_ESCAPE_NONE, op, NULL, NULL);
else if (startswith(pos, "replace"))
rule_add_key(&rule_tmp, TK_A_STRING_ESCAPE_REPLACE, op, NULL, NULL);
}
pos = strstr(value, "db_persist");
if (pos != NULL)
rule_add_key(&rule_tmp, TK_A_DB_PERSIST, op, NULL, NULL);
pos = strstr(value, "nowatch");
if (pos != NULL) {
const int off = 0;
rule_add_key(&rule_tmp, TK_A_INOTIFY_WATCH, op, NULL, &off);
} else {
pos = strstr(value, "watch");
if (pos != NULL) {
const int on = 1;
rule_add_key(&rule_tmp, TK_A_INOTIFY_WATCH, op, NULL, &on);
}
}
pos = strstr(value, "static_node=");
if (pos != NULL) {
rule_add_key(&rule_tmp, TK_A_STATIC_NODE, op, &pos[strlen("static_node=")], NULL);
rule_tmp.rule.rule.has_static_node = true;
}
continue;
}
log_error("unknown key '%s' in %s:%u\n", key, filename, lineno);
goto invalid;
}
/* add rule token */
rule_tmp.rule.rule.token_count = 1 + rule_tmp.token_cur;
if (add_token(rules, &rule_tmp.rule) != 0)
goto invalid;
/* add tokens to list, sorted by type */
if (sort_token(rules, &rule_tmp) != 0)
goto invalid;
return 0;
invalid:
log_error("invalid rule '%s:%u'\n", filename, lineno);
return -1;
}
static int parse_file(struct udev_rules *rules, const char *filename)
{
FILE *f;
unsigned int first_token;
unsigned int filename_off;
char line[UTIL_LINE_SIZE];
int line_nr = 0;
unsigned int i;
if (null_or_empty_path(filename)) {
log_debug("skip empty file: %s\n", filename);
return 0;
}
log_debug("read rules file: %s\n", filename);
f = fopen(filename, "re");
if (f == NULL)
return -1;
first_token = rules->token_cur;
filename_off = rules_add_string(rules, filename);
while (fgets(line, sizeof(line), f) != NULL) {
char *key;
size_t len;
/* skip whitespace */
line_nr++;
key = line;
while (isspace(key[0]))
key++;
/* comment */
if (key[0] == '#')
continue;
len = strlen(line);
if (len < 3)
continue;
/* continue reading if backslash+newline is found */
while (line[len-2] == '\\') {
if (fgets(&line[len-2], (sizeof(line)-len)+2, f) == NULL)
break;
if (strlen(&line[len-2]) < 2)
break;
line_nr++;
len = strlen(line);
}
if (len+1 >= sizeof(line)) {
log_error("line too long '%s':%u, ignored\n", filename, line_nr);
continue;
}
add_rule(rules, key, filename, filename_off, line_nr);
}
fclose(f);
/* link GOTOs to LABEL rules in this file to be able to fast-forward */
for (i = first_token+1; i < rules->token_cur; i++) {
if (rules->tokens[i].type == TK_A_GOTO) {
char *label = rules_str(rules, rules->tokens[i].key.value_off);
unsigned int j;
for (j = i+1; j < rules->token_cur; j++) {
if (rules->tokens[j].type != TK_RULE)
continue;
if (rules->tokens[j].rule.label_off == 0)
continue;
if (!streq(label, rules_str(rules, rules->tokens[j].rule.label_off)))
continue;
rules->tokens[i].key.rule_goto = j;
break;
}
if (rules->tokens[i].key.rule_goto == 0)
log_error("GOTO '%s' has no matching label in: '%s'\n", label, filename);
}
}
return 0;
}
struct udev_rules *udev_rules_new(struct udev *udev, int resolve_names)
{
struct udev_rules *rules;
struct udev_list file_list;
struct token end_token;
char **files, **f;
int r;
rules = calloc(1, sizeof(struct udev_rules));
if (rules == NULL)
return NULL;
rules->udev = udev;
rules->resolve_names = resolve_names;
udev_list_init(udev, &file_list, true);
/* init token array and string buffer */
rules->tokens = malloc(PREALLOC_TOKEN * sizeof(struct token));
if (rules->tokens == NULL)
return udev_rules_unref(rules);
rules->token_max = PREALLOC_TOKEN;
rules->strbuf = strbuf_new();
if (!rules->strbuf)
return udev_rules_unref(rules);
rules->dirs = strv_new("/etc/udev/rules.d",
"/run/udev/rules.d",
UDEVLIBEXECDIR "/rules.d",
NULL);
if (!rules->dirs) {
log_error("failed to build config directory array");
return udev_rules_unref(rules);
}
if (!path_strv_canonicalize(rules->dirs)) {
log_error("failed to canonicalize config directories\n");
return udev_rules_unref(rules);
}
strv_uniq(rules->dirs);
rules->dirs_ts_usec = calloc(strv_length(rules->dirs), sizeof(long long));
if(!rules->dirs_ts_usec)
return udev_rules_unref(rules);
udev_rules_check_timestamp(rules);
r = conf_files_list_strv(&files, ".rules", (const char **)rules->dirs);
if (r < 0) {
log_error("failed to enumerate rules files: %s\n", strerror(-r));
return udev_rules_unref(rules);
}
/*
* The offset value in the rules strct is limited; add all
* rules file names to the beginning of the string buffer.
*/
STRV_FOREACH(f, files)
rules_add_string(rules, *f);
STRV_FOREACH(f, files)
parse_file(rules, *f);
strv_free(files);
memset(&end_token, 0x00, sizeof(struct token));
end_token.type = TK_END;
add_token(rules, &end_token);
log_debug("rules contain %zu bytes tokens (%u * %zu bytes), %zu bytes strings\n",
rules->token_max * sizeof(struct token), rules->token_max, sizeof(struct token), rules->strbuf->len);
/* cleanup temporary strbuf data */
log_debug("%zu strings (%zu bytes), %zu de-duplicated (%zu bytes), %zu trie nodes used\n",
rules->strbuf->in_count, rules->strbuf->in_len,
rules->strbuf->dedup_count, rules->strbuf->dedup_len, rules->strbuf->nodes_count);
strbuf_complete(rules->strbuf);
/* cleanup uid/gid cache */
free(rules->uids);
rules->uids = NULL;
rules->uids_cur = 0;
rules->uids_max = 0;
free(rules->gids);
rules->gids = NULL;
rules->gids_cur = 0;
rules->gids_max = 0;
dump_rules(rules);
return rules;
}
struct udev_rules *udev_rules_unref(struct udev_rules *rules)
{
if (rules == NULL)
return NULL;
free(rules->tokens);
strbuf_cleanup(rules->strbuf);
free(rules->uids);
free(rules->gids);
strv_free(rules->dirs);
free(rules->dirs_ts_usec);
free(rules);
return NULL;
}
bool udev_rules_check_timestamp(struct udev_rules *rules)
{
unsigned int i;
bool changed = false;
if (rules == NULL)
goto out;
for (i = 0; rules->dirs[i]; i++) {
struct stat stats;
if (stat(rules->dirs[i], &stats) < 0)
continue;
if (rules->dirs_ts_usec[i] == ts_usec(&stats.st_mtim))
continue;
/* first check */
if (rules->dirs_ts_usec[i] != 0) {
log_debug("reload - timestamp of '%s' changed\n", rules->dirs[i]);
changed = true;
}
/* update timestamp */
rules->dirs_ts_usec[i] = ts_usec(&stats.st_mtim);
}
out:
return changed;
}
static int match_key(struct udev_rules *rules, struct token *token, const char *val)
{
char *key_value = rules_str(rules, token->key.value_off);
char *pos;
bool match = false;
if (val == NULL)
val = "";
switch (token->key.glob) {
case GL_PLAIN:
match = (streq(key_value, val));
break;
case GL_GLOB:
match = (fnmatch(key_value, val, 0) == 0);
break;
case GL_SPLIT:
{
const char *s;
size_t len;
s = rules_str(rules, token->key.value_off);
len = strlen(val);
for (;;) {
const char *next;
next = strchr(s, '|');
if (next != NULL) {
size_t matchlen = (size_t)(next - s);
match = (matchlen == len && strncmp(s, val, matchlen) == 0);
if (match)
break;
} else {
match = (streq(s, val));
break;
}
s = &next[1];
}
break;
}
case GL_SPLIT_GLOB:
{
char value[UTIL_PATH_SIZE];
util_strscpy(value, sizeof(value), rules_str(rules, token->key.value_off));
key_value = value;
while (key_value != NULL) {
pos = strchr(key_value, '|');
if (pos != NULL) {
pos[0] = '\0';
pos = &pos[1];
}
match = (fnmatch(key_value, val, 0) == 0);
if (match)
break;
key_value = pos;
}
break;
}
case GL_SOMETHING:
match = (val[0] != '\0');
break;
case GL_UNSET:
return -1;
}
if (match && (token->key.op == OP_MATCH))
return 0;
if (!match && (token->key.op == OP_NOMATCH))
return 0;
return -1;
}
static int match_attr(struct udev_rules *rules, struct udev_device *dev, struct udev_event *event, struct token *cur)
{
const char *name;
char nbuf[UTIL_NAME_SIZE];
const char *value;
char vbuf[UTIL_NAME_SIZE];
size_t len;
name = rules_str(rules, cur->key.attr_off);
switch (cur->key.attrsubst) {
case SB_FORMAT:
udev_event_apply_format(event, name, nbuf, sizeof(nbuf));
name = nbuf;
/* fall through */
case SB_NONE:
value = udev_device_get_sysattr_value(dev, name);
if (value == NULL)
return -1;
break;
case SB_SUBSYS:
if (util_resolve_subsys_kernel(event->udev, name, vbuf, sizeof(vbuf), 1) != 0)
return -1;
value = vbuf;
break;
default:
return -1;
}
/* remove trailing whitespace, if not asked to match for it */
len = strlen(value);
if (len > 0 && isspace(value[len-1])) {
const char *key_value;
size_t klen;
key_value = rules_str(rules, cur->key.value_off);
klen = strlen(key_value);
if (klen > 0 && !isspace(key_value[klen-1])) {
if (value != vbuf) {
util_strscpy(vbuf, sizeof(vbuf), value);
value = vbuf;
}
while (len > 0 && isspace(vbuf[--len]))
vbuf[len] = '\0';
}
}
return match_key(rules, cur, value);
}
enum escape_type {
ESCAPE_UNSET,
ESCAPE_NONE,
ESCAPE_REPLACE,
};
int udev_rules_apply_to_event(struct udev_rules *rules, struct udev_event *event, const sigset_t *sigmask)
{
struct token *cur;
struct token *rule;
enum escape_type esc = ESCAPE_UNSET;
bool can_set_name;
if (rules->tokens == NULL)
return -1;
can_set_name = ((!streq(udev_device_get_action(event->dev), "remove")) &&
(major(udev_device_get_devnum(event->dev)) > 0 ||
udev_device_get_ifindex(event->dev) > 0));
/* loop through token list, match, run actions or forward to next rule */
cur = &rules->tokens[0];
rule = cur;
for (;;) {
dump_token(rules, cur);
switch (cur->type) {
case TK_RULE:
/* current rule */
rule = cur;
/* possibly skip rules which want to set NAME, SYMLINK, OWNER, GROUP, MODE */
if (!can_set_name && rule->rule.can_set_name)
goto nomatch;
esc = ESCAPE_UNSET;
break;
case TK_M_ACTION:
if (match_key(rules, cur, udev_device_get_action(event->dev)) != 0)
goto nomatch;
break;
case TK_M_DEVPATH:
if (match_key(rules, cur, udev_device_get_devpath(event->dev)) != 0)
goto nomatch;
break;
case TK_M_KERNEL:
if (match_key(rules, cur, udev_device_get_sysname(event->dev)) != 0)
goto nomatch;
break;
case TK_M_DEVLINK: {
struct udev_list_entry *list_entry;
bool match = false;
udev_list_entry_foreach(list_entry, udev_device_get_devlinks_list_entry(event->dev)) {
const char *devlink;
devlink = udev_list_entry_get_name(list_entry) + strlen("/dev/");
if (match_key(rules, cur, devlink) == 0) {
match = true;
break;
}
}
if (!match)
goto nomatch;
break;
}
case TK_M_NAME:
if (match_key(rules, cur, event->name) != 0)
goto nomatch;
break;
case TK_M_ENV: {
const char *key_name = rules_str(rules, cur->key.attr_off);
const char *value;
value = udev_device_get_property_value(event->dev, key_name);
if (value == NULL)
value = "";
if (match_key(rules, cur, value))
goto nomatch;
break;
}
case TK_M_TAG: {
struct udev_list_entry *list_entry;
bool match = false;
udev_list_entry_foreach(list_entry, udev_device_get_tags_list_entry(event->dev)) {
if (streq(rules_str(rules, cur->key.value_off), udev_list_entry_get_name(list_entry))) {
match = true;
break;
}
}
if (!match && (cur->key.op != OP_NOMATCH))
goto nomatch;
break;
}
case TK_M_SUBSYSTEM:
if (match_key(rules, cur, udev_device_get_subsystem(event->dev)) != 0)
goto nomatch;
break;
case TK_M_DRIVER:
if (match_key(rules, cur, udev_device_get_driver(event->dev)) != 0)
goto nomatch;
break;
case TK_M_WAITFOR: {
char filename[UTIL_PATH_SIZE];
int found;
udev_event_apply_format(event, rules_str(rules, cur->key.value_off), filename, sizeof(filename));
found = (wait_for_file(event->dev, filename, 10) == 0);
if (!found && (cur->key.op != OP_NOMATCH))
goto nomatch;
break;
}
case TK_M_ATTR:
if (match_attr(rules, event->dev, event, cur) != 0)
goto nomatch;
break;
case TK_M_KERNELS:
case TK_M_SUBSYSTEMS:
case TK_M_DRIVERS:
case TK_M_ATTRS:
case TK_M_TAGS: {
struct token *next;
/* get whole sequence of parent matches */
next = cur;
while (next->type > TK_M_PARENTS_MIN && next->type < TK_M_PARENTS_MAX)
next++;
/* loop over parents */
event->dev_parent = event->dev;
for (;;) {
struct token *key;
/* loop over sequence of parent match keys */
for (key = cur; key < next; key++ ) {
dump_token(rules, key);
switch(key->type) {
case TK_M_KERNELS:
if (match_key(rules, key, udev_device_get_sysname(event->dev_parent)) != 0)
goto try_parent;
break;
case TK_M_SUBSYSTEMS:
if (match_key(rules, key, udev_device_get_subsystem(event->dev_parent)) != 0)
goto try_parent;
break;
case TK_M_DRIVERS:
if (match_key(rules, key, udev_device_get_driver(event->dev_parent)) != 0)
goto try_parent;
break;
case TK_M_ATTRS:
if (match_attr(rules, event->dev_parent, event, key) != 0)
goto try_parent;
break;
case TK_M_TAGS: {
bool match = udev_device_has_tag(event->dev_parent, rules_str(rules, cur->key.value_off));
if (match && key->key.op == OP_NOMATCH)
goto try_parent;
if (!match && key->key.op == OP_MATCH)
goto try_parent;
break;
}
default:
goto nomatch;
}
}
break;
try_parent:
event->dev_parent = udev_device_get_parent(event->dev_parent);
if (event->dev_parent == NULL)
goto nomatch;
}
/* move behind our sequence of parent match keys */
cur = next;
continue;
}
case TK_M_TEST: {
char filename[UTIL_PATH_SIZE];
struct stat statbuf;
int match;
udev_event_apply_format(event, rules_str(rules, cur->key.value_off), filename, sizeof(filename));
if (util_resolve_subsys_kernel(event->udev, filename, filename, sizeof(filename), 0) != 0) {
if (filename[0] != '/') {
char tmp[UTIL_PATH_SIZE];
util_strscpy(tmp, sizeof(tmp), filename);
util_strscpyl(filename, sizeof(filename),
udev_device_get_syspath(event->dev), "/", tmp, NULL);
}
}
attr_subst_subdir(filename, sizeof(filename));
match = (stat(filename, &statbuf) == 0);
if (match && cur->key.mode > 0)
match = ((statbuf.st_mode & cur->key.mode) > 0);
if (match && cur->key.op == OP_NOMATCH)
goto nomatch;
if (!match && cur->key.op == OP_MATCH)
goto nomatch;
break;
}
case TK_M_EVENT_TIMEOUT:
log_debug("OPTIONS event_timeout=%u\n", cur->key.event_timeout);
event->timeout_usec = cur->key.event_timeout * 1000 * 1000;
break;
case TK_M_PROGRAM: {
char program[UTIL_PATH_SIZE];
char **envp;
char result[UTIL_PATH_SIZE];
free(event->program_result);
event->program_result = NULL;
udev_event_apply_format(event, rules_str(rules, cur->key.value_off), program, sizeof(program));
envp = udev_device_get_properties_envp(event->dev);
log_debug("PROGRAM '%s' %s:%u\n",
program,
rules_str(rules, rule->rule.filename_off),
rule->rule.filename_line);
if (udev_event_spawn(event, program, envp, sigmask, result, sizeof(result)) < 0) {
if (cur->key.op != OP_NOMATCH)
goto nomatch;
} else {
int count;
util_remove_trailing_chars(result, '\n');
if (esc == ESCAPE_UNSET || esc == ESCAPE_REPLACE) {
count = util_replace_chars(result, UDEV_ALLOWED_CHARS_INPUT);
if (count > 0)
log_debug("%i character(s) replaced\n" , count);
}
event->program_result = strdup(result);
if (cur->key.op == OP_NOMATCH)
goto nomatch;
}
break;
}
case TK_M_IMPORT_FILE: {
char import[UTIL_PATH_SIZE];
udev_event_apply_format(event, rules_str(rules, cur->key.value_off), import, sizeof(import));
if (import_file_into_properties(event->dev, import) != 0)
if (cur->key.op != OP_NOMATCH)
goto nomatch;
break;
}
case TK_M_IMPORT_PROG: {
char import[UTIL_PATH_SIZE];
udev_event_apply_format(event, rules_str(rules, cur->key.value_off), import, sizeof(import));
log_debug("IMPORT '%s' %s:%u\n",
import,
rules_str(rules, rule->rule.filename_off),
rule->rule.filename_line);
if (import_program_into_properties(event, import, sigmask) != 0)
if (cur->key.op != OP_NOMATCH)
goto nomatch;
break;
}
case TK_M_IMPORT_BUILTIN: {
char command[UTIL_PATH_SIZE];
if (udev_builtin_run_once(cur->key.builtin_cmd)) {
/* check if we ran already */
if (event->builtin_run & (1 << cur->key.builtin_cmd)) {
log_debug("IMPORT builtin skip '%s' %s:%u\n",
udev_builtin_name(cur->key.builtin_cmd),
rules_str(rules, rule->rule.filename_off),
rule->rule.filename_line);
/* return the result from earlier run */
if (event->builtin_ret & (1 << cur->key.builtin_cmd))
if (cur->key.op != OP_NOMATCH)
goto nomatch;
break;
}
/* mark as ran */
event->builtin_run |= (1 << cur->key.builtin_cmd);
}
udev_event_apply_format(event, rules_str(rules, cur->key.value_off), command, sizeof(command));
log_debug("IMPORT builtin '%s' %s:%u\n",
udev_builtin_name(cur->key.builtin_cmd),
rules_str(rules, rule->rule.filename_off),
rule->rule.filename_line);
if (udev_builtin_run(event->dev, cur->key.builtin_cmd, command, false) != 0) {
/* remember failure */
log_debug("IMPORT builtin '%s' returned non-zero\n",
udev_builtin_name(cur->key.builtin_cmd));
event->builtin_ret |= (1 << cur->key.builtin_cmd);
if (cur->key.op != OP_NOMATCH)
goto nomatch;
}
break;
}
case TK_M_IMPORT_DB: {
const char *key = rules_str(rules, cur->key.value_off);
const char *value;
value = udev_device_get_property_value(event->dev_db, key);
if (value != NULL) {
struct udev_list_entry *entry;
entry = udev_device_add_property(event->dev, key, value);
udev_list_entry_set_num(entry, true);
} else {
if (cur->key.op != OP_NOMATCH)
goto nomatch;
}
break;
}
case TK_M_IMPORT_CMDLINE: {
FILE *f;
bool imported = false;
f = fopen("/proc/cmdline", "re");
if (f != NULL) {
char cmdline[4096];
if (fgets(cmdline, sizeof(cmdline), f) != NULL) {
const char *key = rules_str(rules, cur->key.value_off);
char *pos;
pos = strstr(cmdline, key);
if (pos != NULL) {
struct udev_list_entry *entry;
pos += strlen(key);
if (pos[0] == '\0' || isspace(pos[0])) {
/* we import simple flags as 'FLAG=1' */
entry = udev_device_add_property(event->dev, key, "1");
udev_list_entry_set_num(entry, true);
imported = true;
} else if (pos[0] == '=') {
const char *value;
pos++;
value = pos;
while (pos[0] != '\0' && !isspace(pos[0]))
pos++;
pos[0] = '\0';
entry = udev_device_add_property(event->dev, key, value);
udev_list_entry_set_num(entry, true);
imported = true;
}
}
}
fclose(f);
}
if (!imported && cur->key.op != OP_NOMATCH)
goto nomatch;
break;
}
case TK_M_IMPORT_PARENT: {
char import[UTIL_PATH_SIZE];
udev_event_apply_format(event, rules_str(rules, cur->key.value_off), import, sizeof(import));
if (import_parent_into_properties(event->dev, import) != 0)
if (cur->key.op != OP_NOMATCH)
goto nomatch;
break;
}
case TK_M_RESULT:
if (match_key(rules, cur, event->program_result) != 0)
goto nomatch;
break;
case TK_A_STRING_ESCAPE_NONE:
esc = ESCAPE_NONE;
break;
case TK_A_STRING_ESCAPE_REPLACE:
esc = ESCAPE_REPLACE;
break;
case TK_A_DB_PERSIST:
udev_device_set_db_persist(event->dev);
break;
case TK_A_INOTIFY_WATCH:
if (event->inotify_watch_final)
break;
if (cur->key.op == OP_ASSIGN_FINAL)
event->inotify_watch_final = true;
event->inotify_watch = cur->key.watch;
break;
case TK_A_DEVLINK_PRIO:
udev_device_set_devlink_priority(event->dev, cur->key.devlink_prio);
break;
case TK_A_OWNER: {
char owner[UTIL_NAME_SIZE];
if (event->owner_final)
break;
if (cur->key.op == OP_ASSIGN_FINAL)
event->owner_final = true;
udev_event_apply_format(event, rules_str(rules, cur->key.value_off), owner, sizeof(owner));
event->uid = util_lookup_user(event->udev, owner);
log_debug("OWNER %u %s:%u\n",
event->uid,
rules_str(rules, rule->rule.filename_off),
rule->rule.filename_line);
break;
}
case TK_A_GROUP: {
char group[UTIL_NAME_SIZE];
if (event->group_final)
break;
if (cur->key.op == OP_ASSIGN_FINAL)
event->group_final = true;
udev_event_apply_format(event, rules_str(rules, cur->key.value_off), group, sizeof(group));
event->gid = util_lookup_group(event->udev, group);
log_debug("GROUP %u %s:%u\n",
event->gid,
rules_str(rules, rule->rule.filename_off),
rule->rule.filename_line);
break;
}
case TK_A_MODE: {
char mode_str[UTIL_NAME_SIZE];
mode_t mode;
char *endptr;
if (event->mode_final)
break;
udev_event_apply_format(event, rules_str(rules, cur->key.value_off), mode_str, sizeof(mode_str));
mode = strtol(mode_str, &endptr, 8);
if (endptr[0] != '\0') {
log_error("ignoring invalid mode '%s'\n", mode_str);
break;
}
if (cur->key.op == OP_ASSIGN_FINAL)
event->mode_final = true;
event->mode_set = true;
event->mode = mode;
log_debug("MODE %#o %s:%u\n",
event->mode,
rules_str(rules, rule->rule.filename_off),
rule->rule.filename_line);
break;
}
case TK_A_OWNER_ID:
if (event->owner_final)
break;
if (cur->key.op == OP_ASSIGN_FINAL)
event->owner_final = true;
event->uid = cur->key.uid;
log_debug("OWNER %u %s:%u\n",
event->uid,
rules_str(rules, rule->rule.filename_off),
rule->rule.filename_line);
break;
case TK_A_GROUP_ID:
if (event->group_final)
break;
if (cur->key.op == OP_ASSIGN_FINAL)
event->group_final = true;
event->gid = cur->key.gid;
log_debug("GROUP %u %s:%u\n",
event->gid,
rules_str(rules, rule->rule.filename_off),
rule->rule.filename_line);
break;
case TK_A_MODE_ID:
if (event->mode_final)
break;
if (cur->key.op == OP_ASSIGN_FINAL)
event->mode_final = true;
event->mode_set = true;
event->mode = cur->key.mode;
log_debug("MODE %#o %s:%u\n",
event->mode,
rules_str(rules, rule->rule.filename_off),
rule->rule.filename_line);
break;
case TK_A_ENV: {
const char *name = rules_str(rules, cur->key.attr_off);
char *value = rules_str(rules, cur->key.value_off);
char value_new[UTIL_NAME_SIZE];
const char *value_old = NULL;
struct udev_list_entry *entry;
if (value[0] == '\0') {
if (cur->key.op == OP_ADD)
break;
udev_device_add_property(event->dev, name, NULL);
break;
}
if (cur->key.op == OP_ADD)
value_old = udev_device_get_property_value(event->dev, name);
if (value_old) {
char temp[UTIL_NAME_SIZE];
/* append value separated by space */
udev_event_apply_format(event, value, temp, sizeof(temp));
util_strscpyl(value_new, sizeof(value_new), value_old, " ", temp, NULL);
} else
udev_event_apply_format(event, value, value_new, sizeof(value_new));
entry = udev_device_add_property(event->dev, name, value_new);
/* store in db, skip private keys */
if (name[0] != '.')
udev_list_entry_set_num(entry, true);
break;
}
case TK_A_TAG: {
char tag[UTIL_PATH_SIZE];
const char *p;
udev_event_apply_format(event, rules_str(rules, cur->key.value_off), tag, sizeof(tag));
if (cur->key.op == OP_ASSIGN || cur->key.op == OP_ASSIGN_FINAL)
udev_device_cleanup_tags_list(event->dev);
for (p = tag; *p != '\0'; p++) {
if ((*p >= 'a' && *p <= 'z') ||
(*p >= 'A' && *p <= 'Z') ||
(*p >= '0' && *p <= '9') ||
*p == '-' || *p == '_')
continue;
log_error("ignoring invalid tag name '%s'\n", tag);
break;
}
udev_device_add_tag(event->dev, tag);
break;
}
case TK_A_NAME: {
const char *name = rules_str(rules, cur->key.value_off);
char name_str[UTIL_PATH_SIZE];
int count;
if (event->name_final)
break;
if (cur->key.op == OP_ASSIGN_FINAL)
event->name_final = true;
udev_event_apply_format(event, name, name_str, sizeof(name_str));
if (esc == ESCAPE_UNSET || esc == ESCAPE_REPLACE) {
count = util_replace_chars(name_str, "/");
if (count > 0)
log_debug("%i character(s) replaced\n", count);
}
if (major(udev_device_get_devnum(event->dev)) &&
(!streq(name_str, udev_device_get_devnode(event->dev) + strlen("/dev/")))) {
log_error("NAME=\"%s\" ignored, kernel device nodes "
"can not be renamed; please fix it in %s:%u\n", name,
rules_str(rules, rule->rule.filename_off), rule->rule.filename_line);
break;
}
free(event->name);
event->name = strdup(name_str);
log_debug("NAME '%s' %s:%u\n",
event->name,
rules_str(rules, rule->rule.filename_off),
rule->rule.filename_line);
break;
}
case TK_A_DEVLINK: {
char temp[UTIL_PATH_SIZE];
char filename[UTIL_PATH_SIZE];
char *pos, *next;
int count = 0;
if (event->devlink_final)
break;
if (major(udev_device_get_devnum(event->dev)) == 0)
break;
if (cur->key.op == OP_ASSIGN_FINAL)
event->devlink_final = true;
if (cur->key.op == OP_ASSIGN || cur->key.op == OP_ASSIGN_FINAL)
udev_device_cleanup_devlinks_list(event->dev);
/* allow multiple symlinks separated by spaces */
udev_event_apply_format(event, rules_str(rules, cur->key.value_off), temp, sizeof(temp));
if (esc == ESCAPE_UNSET)
count = util_replace_chars(temp, "/ ");
else if (esc == ESCAPE_REPLACE)
count = util_replace_chars(temp, "/");
if (count > 0)
log_debug("%i character(s) replaced\n" , count);
pos = temp;
while (isspace(pos[0]))
pos++;
next = strchr(pos, ' ');
while (next != NULL) {
next[0] = '\0';
log_debug("LINK '%s' %s:%u\n", pos,
rules_str(rules, rule->rule.filename_off), rule->rule.filename_line);
util_strscpyl(filename, sizeof(filename), "/dev/", pos, NULL);
udev_device_add_devlink(event->dev, filename);
while (isspace(next[1]))
next++;
pos = &next[1];
next = strchr(pos, ' ');
}
if (pos[0] != '\0') {
log_debug("LINK '%s' %s:%u\n", pos,
rules_str(rules, rule->rule.filename_off), rule->rule.filename_line);
util_strscpyl(filename, sizeof(filename), "/dev/", pos, NULL);
udev_device_add_devlink(event->dev, filename);
}
break;
}
case TK_A_ATTR: {
const char *key_name = rules_str(rules, cur->key.attr_off);
char attr[UTIL_PATH_SIZE];
char value[UTIL_NAME_SIZE];
FILE *f;
if (util_resolve_subsys_kernel(event->udev, key_name, attr, sizeof(attr), 0) != 0)
util_strscpyl(attr, sizeof(attr), udev_device_get_syspath(event->dev), "/", key_name, NULL);
attr_subst_subdir(attr, sizeof(attr));
udev_event_apply_format(event, rules_str(rules, cur->key.value_off), value, sizeof(value));
log_debug("ATTR '%s' writing '%s' %s:%u\n", attr, value,
rules_str(rules, rule->rule.filename_off),
rule->rule.filename_line);
f = fopen(attr, "we");
if (f != NULL) {
if (fprintf(f, "%s", value) <= 0)
log_error("error writing ATTR{%s}: %m\n", attr);
fclose(f);
} else {
log_error("error opening ATTR{%s} for writing: %m\n", attr);
}
break;
}
case TK_A_RUN_BUILTIN:
case TK_A_RUN_PROGRAM: {
struct udev_list_entry *entry;
if (cur->key.op == OP_ASSIGN || cur->key.op == OP_ASSIGN_FINAL)
udev_list_cleanup(&event->run_list);
log_debug("RUN '%s' %s:%u\n",
rules_str(rules, cur->key.value_off),
rules_str(rules, rule->rule.filename_off),
rule->rule.filename_line);
entry = udev_list_entry_add(&event->run_list, rules_str(rules, cur->key.value_off), NULL);
udev_list_entry_set_num(entry, cur->key.builtin_cmd);
break;
}
case TK_A_GOTO:
if (cur->key.rule_goto == 0)
break;
cur = &rules->tokens[cur->key.rule_goto];
continue;
case TK_END:
return 0;
case TK_M_PARENTS_MIN:
case TK_M_PARENTS_MAX:
case TK_M_MAX:
case TK_UNSET:
log_error("wrong type %u\n", cur->type);
goto nomatch;
}
cur++;
continue;
nomatch:
/* fast-forward to next rule */
cur = rule + rule->rule.token_count;
}
}
void udev_rules_apply_static_dev_perms(struct udev_rules *rules)
{
struct token *cur;
struct token *rule;
uid_t uid = 0;
gid_t gid = 0;
mode_t mode = 0;
if (rules->tokens == NULL)
return;
cur = &rules->tokens[0];
rule = cur;
for (;;) {
switch (cur->type) {
case TK_RULE:
/* current rule */
rule = cur;
/* skip rules without a static_node tag */
if (!rule->rule.has_static_node)
goto next;
uid = 0;
gid = 0;
mode = 0;
break;
case TK_A_OWNER_ID:
uid = cur->key.uid;
break;
case TK_A_GROUP_ID:
gid = cur->key.gid;
break;
case TK_A_MODE_ID:
mode = cur->key.mode;
break;
case TK_A_STATIC_NODE: {
char filename[UTIL_PATH_SIZE];
struct stat stats;
/* we assure, that the permissions tokens are sorted before the static token */
if (mode == 0 && uid == 0 && gid == 0)
goto next;
util_strscpyl(filename, sizeof(filename), "/dev/", rules_str(rules, cur->key.value_off), NULL);
if (stat(filename, &stats) != 0)
goto next;
if (!S_ISBLK(stats.st_mode) && !S_ISCHR(stats.st_mode))
goto next;
if (mode == 0) {
if (gid > 0)
mode = 0660;
else
mode = 0600;
}
if (mode != (stats.st_mode & 01777)) {
chmod(filename, mode);
log_debug("chmod '%s' %#o\n", filename, mode);
}
if ((uid != 0 && uid != stats.st_uid) || (gid != 0 && gid != stats.st_gid)) {
chown(filename, uid, gid);
log_debug("chown '%s' %u %u\n", filename, uid, gid);
}
utimensat(AT_FDCWD, filename, NULL, 0);
break;
}
case TK_END:
return;
}
cur++;
continue;
next:
/* fast-forward to next rule */
cur = rule + rule->rule.token_count;
continue;
}
}