mirror of
https://github.com/Dasharo/systemd.git
synced 2026-03-06 15:02:31 -08:00
794 lines
29 KiB
C
794 lines
29 KiB
C
/* SPDX-License-Identifier: GPL-2.0-or-later */
|
|
|
|
#include <sys/file.h>
|
|
|
|
#include "sd-id128.h"
|
|
|
|
#include "alloc-util.h"
|
|
#include "device-private.h"
|
|
#include "device-util.h"
|
|
#include "devnum-util.h"
|
|
#include "dirent-util.h"
|
|
#include "escape.h"
|
|
#include "fd-util.h"
|
|
#include "fileio.h"
|
|
#include "format-util.h"
|
|
#include "fs-util.h"
|
|
#include "hexdecoct.h"
|
|
#include "label-util.h"
|
|
#include "mkdir-label.h"
|
|
#include "parse-util.h"
|
|
#include "path-util.h"
|
|
#include "selinux-util.h"
|
|
#include "smack-util.h"
|
|
#include "stat-util.h"
|
|
#include "string-util.h"
|
|
#include "udev-node.h"
|
|
#include "user-util.h"
|
|
|
|
#define UDEV_NODE_HASH_KEY SD_ID128_MAKE(b9,6a,f1,ce,40,31,44,1a,9e,19,ec,8b,ae,f3,e3,2f)
|
|
|
|
int udev_node_cleanup(void) {
|
|
_cleanup_closedir_ DIR *dir = NULL;
|
|
|
|
/* This must not be called when any workers exist. It would cause a race between mkdir() called
|
|
* by stack_directory_lock() and unlinkat() called by this. */
|
|
|
|
dir = opendir("/run/udev/links");
|
|
if (!dir) {
|
|
if (errno == ENOENT)
|
|
return 0;
|
|
|
|
return log_debug_errno(errno, "Failed to open directory '/run/udev/links', ignoring: %m");
|
|
}
|
|
|
|
FOREACH_DIRENT_ALL(de, dir, break) {
|
|
_cleanup_free_ char *lockfile = NULL;
|
|
|
|
if (de->d_name[0] == '.')
|
|
continue;
|
|
|
|
if (de->d_type != DT_DIR)
|
|
continue;
|
|
|
|
/* As commented in the above, this is called when no worker exists, hence the file is not
|
|
* locked. On a later uevent, the lock file will be created if necessary. So, we can safely
|
|
* remove the file now. */
|
|
lockfile = path_join(de->d_name, ".lock");
|
|
if (!lockfile)
|
|
return log_oom_debug();
|
|
|
|
if (unlinkat(dirfd(dir), lockfile, 0) < 0 && errno != ENOENT) {
|
|
log_debug_errno(errno, "Failed to remove '/run/udev/links/%s', ignoring: %m", lockfile);
|
|
continue;
|
|
}
|
|
|
|
if (unlinkat(dirfd(dir), de->d_name, AT_REMOVEDIR) < 0 && errno != ENOTEMPTY)
|
|
log_debug_errno(errno, "Failed to remove '/run/udev/links/%s', ignoring: %m", de->d_name);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int node_symlink(sd_device *dev, const char *devnode, const char *slink) {
|
|
struct stat st;
|
|
int r;
|
|
|
|
assert(dev);
|
|
assert(slink);
|
|
|
|
if (!devnode) {
|
|
r = sd_device_get_devname(dev, &devnode);
|
|
if (r < 0)
|
|
return log_device_debug_errno(dev, r, "Failed to get device node: %m");
|
|
}
|
|
|
|
if (lstat(slink, &st) >= 0) {
|
|
if (!S_ISLNK(st.st_mode))
|
|
return log_device_debug_errno(dev, SYNTHETIC_ERRNO(EEXIST),
|
|
"Conflicting inode '%s' found, symlink to '%s' will not be created.",
|
|
slink, devnode);
|
|
} else if (errno != ENOENT)
|
|
return log_device_debug_errno(dev, errno, "Failed to lstat() '%s': %m", slink);
|
|
|
|
r = mkdir_parents_label(slink, 0755);
|
|
if (r < 0)
|
|
return log_device_debug_errno(dev, r, "Failed to create parent directory of '%s': %m", slink);
|
|
|
|
/* use relative link */
|
|
r = symlink_atomic_full_label(devnode, slink, /* make_relative = */ true);
|
|
if (r < 0)
|
|
return log_device_debug_errno(dev, r, "Failed to create symlink '%s' to '%s': %m", slink, devnode);
|
|
|
|
log_device_debug(dev, "Successfully created symlink '%s' to '%s'", slink, devnode);
|
|
return 0;
|
|
}
|
|
|
|
static int stack_directory_read_one(int dirfd, const char *id, char **devnode, int *priority) {
|
|
_cleanup_free_ char *buf = NULL;
|
|
int tmp_prio, r;
|
|
|
|
assert(dirfd >= 0);
|
|
assert(id);
|
|
assert(priority);
|
|
|
|
/* This reads priority and device node from the symlink under /run/udev/links (or udev database).
|
|
* If 'devnode' is NULL, obtained priority is always set to '*priority'. If 'devnode' is non-NULL,
|
|
* this updates '*devnode' and '*priority'. */
|
|
|
|
/* First, let's try to read the entry with the new format, which should replace the old format pretty
|
|
* quickly. */
|
|
r = readlinkat_malloc(dirfd, id, &buf);
|
|
if (r >= 0) {
|
|
char *colon;
|
|
|
|
/* With the new format, the devnode and priority can be obtained from symlink itself. */
|
|
|
|
colon = strchr(buf, ':');
|
|
if (!colon || colon == buf)
|
|
return -EINVAL;
|
|
|
|
*colon = '\0';
|
|
|
|
/* Of course, this check is racy, but it is not necessary to be perfect. Even if the device
|
|
* node will be removed after this check, we will receive 'remove' uevent, and the invalid
|
|
* symlink will be removed during processing the event. The check is just for shortening the
|
|
* timespan that the symlink points to a non-existing device node. */
|
|
if (access(colon + 1, F_OK) < 0)
|
|
return -ENODEV;
|
|
|
|
r = safe_atoi(buf, &tmp_prio);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (!devnode)
|
|
goto finalize;
|
|
|
|
if (*devnode && tmp_prio <= *priority)
|
|
return 0; /* Unchanged */
|
|
|
|
r = free_and_strdup(devnode, colon + 1);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
} else if (r == -EINVAL) { /* Not a symlink ? try the old format */
|
|
_cleanup_(sd_device_unrefp) sd_device *dev = NULL;
|
|
const char *val;
|
|
|
|
/* Old format. The devnode and priority must be obtained from uevent and udev database. */
|
|
|
|
r = sd_device_new_from_device_id(&dev, id);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = device_get_devlink_priority(dev, &tmp_prio);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (!devnode)
|
|
goto finalize;
|
|
|
|
if (*devnode && tmp_prio <= *priority)
|
|
return 0; /* Unchanged */
|
|
|
|
r = sd_device_get_devname(dev, &val);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = free_and_strdup(devnode, val);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
} else
|
|
return r == -ENOENT ? -ENODEV : r;
|
|
|
|
finalize:
|
|
*priority = tmp_prio;
|
|
return 1; /* Updated */
|
|
}
|
|
|
|
static int stack_directory_find_prioritized_devnode(sd_device *dev, int dirfd, bool add, char **ret) {
|
|
_cleanup_closedir_ DIR *dir = NULL;
|
|
_cleanup_free_ char *devnode = NULL;
|
|
int r, priority;
|
|
const char *id;
|
|
|
|
assert(dev);
|
|
assert(dirfd >= 0);
|
|
assert(ret);
|
|
|
|
/* Find device node of device with highest priority. This returns 1 if a device found, 0 if no
|
|
* device found, or a negative errno on error. */
|
|
|
|
if (add) {
|
|
const char *n;
|
|
|
|
r = device_get_devlink_priority(dev, &priority);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_device_get_devname(dev, &n);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
devnode = strdup(n);
|
|
if (!devnode)
|
|
return -ENOMEM;
|
|
}
|
|
|
|
dir = xopendirat(dirfd, ".", O_NOFOLLOW);
|
|
if (!dir)
|
|
return -errno;
|
|
|
|
r = device_get_device_id(dev, &id);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
FOREACH_DIRENT(de, dir, break) {
|
|
|
|
/* skip ourself */
|
|
if (streq(de->d_name, id))
|
|
continue;
|
|
|
|
r = stack_directory_read_one(dirfd, de->d_name, &devnode, &priority);
|
|
if (r < 0 && r != -ENODEV)
|
|
log_debug_errno(r, "Failed to read '%s', ignoring: %m", de->d_name);
|
|
}
|
|
|
|
*ret = TAKE_PTR(devnode);
|
|
return !!*ret;
|
|
}
|
|
|
|
static int stack_directory_update(sd_device *dev, int fd, bool add) {
|
|
const char *id;
|
|
int r;
|
|
|
|
assert(dev);
|
|
assert(fd >= 0);
|
|
|
|
r = device_get_device_id(dev, &id);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (add) {
|
|
_cleanup_free_ char *data = NULL, *buf = NULL;
|
|
const char *devname;
|
|
int priority;
|
|
|
|
r = sd_device_get_devname(dev, &devname);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = device_get_devlink_priority(dev, &priority);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
if (asprintf(&data, "%i:%s", priority, devname) < 0)
|
|
return -ENOMEM;
|
|
|
|
if (readlinkat_malloc(fd, id, &buf) >= 0 && streq(buf, data))
|
|
return 0; /* Unchanged. */
|
|
|
|
(void) unlinkat(fd, id, 0);
|
|
|
|
if (symlinkat(data, fd, id) < 0)
|
|
return -errno;
|
|
|
|
} else {
|
|
if (unlinkat(fd, id, 0) < 0) {
|
|
if (errno == ENOENT)
|
|
return 0; /* Unchanged. */
|
|
return -errno;
|
|
}
|
|
}
|
|
|
|
return 1; /* Updated. */
|
|
}
|
|
|
|
size_t udev_node_escape_path(const char *src, char *dest, size_t size) {
|
|
size_t i, j;
|
|
uint64_t h;
|
|
|
|
assert(src);
|
|
assert(dest);
|
|
assert(size >= 12);
|
|
|
|
for (i = 0, j = 0; src[i] != '\0'; i++) {
|
|
if (src[i] == '/') {
|
|
if (j+4 >= size - 12 + 1)
|
|
goto toolong;
|
|
memcpy(&dest[j], "\\x2f", 4);
|
|
j += 4;
|
|
} else if (src[i] == '\\') {
|
|
if (j+4 >= size - 12 + 1)
|
|
goto toolong;
|
|
memcpy(&dest[j], "\\x5c", 4);
|
|
j += 4;
|
|
} else {
|
|
if (j+1 >= size - 12 + 1)
|
|
goto toolong;
|
|
dest[j] = src[i];
|
|
j++;
|
|
}
|
|
}
|
|
dest[j] = '\0';
|
|
return j;
|
|
|
|
toolong:
|
|
/* If the input path is too long to encode as a filename, then let's suffix with a string
|
|
* generated from the hash of the path. */
|
|
|
|
h = siphash24_string(src, UDEV_NODE_HASH_KEY.bytes);
|
|
|
|
for (unsigned k = 0; k <= 10; k++)
|
|
dest[size - k - 2] = urlsafe_base64char((h >> (k * 6)) & 63);
|
|
|
|
dest[size - 1] = '\0';
|
|
return size - 1;
|
|
}
|
|
|
|
static int stack_directory_get_name(const char *slink, char **ret) {
|
|
_cleanup_free_ char *s = NULL, *dirname = NULL;
|
|
char name_enc[NAME_MAX+1];
|
|
const char *name;
|
|
|
|
assert(slink);
|
|
assert(ret);
|
|
|
|
s = strdup(slink);
|
|
if (!s)
|
|
return -ENOMEM;
|
|
|
|
path_simplify(s);
|
|
|
|
if (!path_is_normalized(s))
|
|
return -EINVAL;
|
|
|
|
name = path_startswith(s, "/dev");
|
|
if (empty_or_root(name))
|
|
return -EINVAL;
|
|
|
|
udev_node_escape_path(name, name_enc, sizeof(name_enc));
|
|
|
|
dirname = path_join("/run/udev/links", name_enc);
|
|
if (!dirname)
|
|
return -ENOMEM;
|
|
|
|
*ret = TAKE_PTR(dirname);
|
|
return 0;
|
|
}
|
|
|
|
static int stack_directory_open(sd_device *dev, const char *slink, int *ret_dirfd, int *ret_lockfd) {
|
|
_cleanup_close_ int dirfd = -EBADF, lockfd = -EBADF;
|
|
_cleanup_free_ char *dirname = NULL;
|
|
int r;
|
|
|
|
assert(dev);
|
|
assert(slink);
|
|
assert(ret_dirfd);
|
|
assert(ret_lockfd);
|
|
|
|
r = stack_directory_get_name(slink, &dirname);
|
|
if (r < 0)
|
|
return log_device_debug_errno(dev, r, "Failed to build stack directory name for '%s': %m", slink);
|
|
|
|
r = mkdir_parents(dirname, 0755);
|
|
if (r < 0)
|
|
return log_device_debug_errno(dev, r, "Failed to create stack directory '%s': %m", dirname);
|
|
|
|
dirfd = open_mkdir_at(AT_FDCWD, dirname, O_CLOEXEC | O_DIRECTORY | O_NOFOLLOW | O_RDONLY, 0755);
|
|
if (dirfd < 0)
|
|
return log_device_debug_errno(dev, dirfd, "Failed to open stack directory '%s': %m", dirname);
|
|
|
|
lockfd = openat(dirfd, ".lock", O_CLOEXEC | O_NOFOLLOW | O_RDONLY | O_CREAT, 0600);
|
|
if (lockfd < 0)
|
|
return log_device_debug_errno(dev, errno, "Failed to create lock file for stack directory '%s': %m", dirname);
|
|
|
|
if (flock(lockfd, LOCK_EX) < 0)
|
|
return log_device_debug_errno(dev, errno, "Failed to place a lock on lock file for %s: %m", dirname);
|
|
|
|
*ret_dirfd = TAKE_FD(dirfd);
|
|
*ret_lockfd = TAKE_FD(lockfd);
|
|
return 0;
|
|
}
|
|
|
|
static int node_get_current(const char *slink, int dirfd, char **ret_id, int *ret_prio) {
|
|
_cleanup_(sd_device_unrefp) sd_device *dev = NULL;
|
|
_cleanup_free_ char *id_dup = NULL;
|
|
const char *id;
|
|
int r;
|
|
|
|
assert(slink);
|
|
assert(dirfd >= 0);
|
|
assert(ret_id);
|
|
|
|
r = sd_device_new_from_devname(&dev, slink);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = device_get_device_id(dev, &id);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
id_dup = strdup(id);
|
|
if (!id_dup)
|
|
return -ENOMEM;
|
|
|
|
if (ret_prio) {
|
|
r = stack_directory_read_one(dirfd, id, NULL, ret_prio);
|
|
if (r < 0)
|
|
return r;
|
|
}
|
|
|
|
*ret_id = TAKE_PTR(id_dup);
|
|
return 0;
|
|
}
|
|
|
|
static int link_update(sd_device *dev, const char *slink, bool add) {
|
|
_cleanup_free_ char *current_id = NULL, *devnode = NULL;
|
|
_cleanup_close_ int dirfd = -EBADF, lockfd = -EBADF;
|
|
int r, current_prio;
|
|
|
|
assert(dev);
|
|
assert(slink);
|
|
|
|
r = stack_directory_open(dev, slink, &dirfd, &lockfd);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = node_get_current(slink, dirfd, ¤t_id, add ? ¤t_prio : NULL);
|
|
if (r < 0 && !ERRNO_IS_DEVICE_ABSENT(r))
|
|
return log_device_debug_errno(dev, r, "Failed to get the current device node priority for '%s': %m", slink);
|
|
|
|
r = stack_directory_update(dev, dirfd, add);
|
|
if (r < 0)
|
|
return log_device_debug_errno(dev, r, "Failed to update stack directory for '%s': %m", slink);
|
|
|
|
if (current_id) {
|
|
const char *id;
|
|
|
|
r = device_get_device_id(dev, &id);
|
|
if (r < 0)
|
|
return log_device_debug_errno(dev, r, "Failed to get device id: %m");
|
|
|
|
if (add) {
|
|
int prio;
|
|
|
|
r = device_get_devlink_priority(dev, &prio);
|
|
if (r < 0)
|
|
return log_device_debug_errno(dev, r, "Failed to get devlink priority: %m");
|
|
|
|
if (streq(current_id, id)) {
|
|
if (current_prio <= prio)
|
|
/* The devlink is ours and already exists, and the new priority is
|
|
* equal or higher than the previous. Hence, it is not necessary to
|
|
* recreate it. */
|
|
return 0;
|
|
|
|
/* The devlink priority is downgraded. Another device may have a higher
|
|
* priority now. Let's find the device node with the highest priority. */
|
|
} else {
|
|
if (current_prio >= prio)
|
|
/* The devlink with equal or higher priority already exists and is
|
|
* owned by another device. Hence, it is not necessary to recreate it. */
|
|
return 0;
|
|
|
|
/* This device has a higher priority than the current. Let's create the
|
|
* devlink to our device node. */
|
|
return node_symlink(dev, NULL, slink);
|
|
}
|
|
|
|
} else {
|
|
if (!streq(current_id, id))
|
|
/* The devlink already exists and is owned by another device. Hence, it is
|
|
* not necessary to recreate it. */
|
|
return 0;
|
|
|
|
/* The current devlink is ours, and the target device will be removed. Hence, we need
|
|
* to search the device that has the highest priority. and update the devlink. */
|
|
}
|
|
} else {
|
|
/* The requested devlink does not exist, or the target device does not exist and the devlink
|
|
* points to a non-existing device. Let's search the device that has the highest priority,
|
|
* and update the devlink. */
|
|
;
|
|
}
|
|
|
|
r = stack_directory_find_prioritized_devnode(dev, dirfd, add, &devnode);
|
|
if (r < 0)
|
|
return log_device_debug_errno(dev, r, "Failed to determine device node with the highest priority for '%s': %m", slink);
|
|
if (r > 0)
|
|
return node_symlink(dev, devnode, slink);
|
|
|
|
log_device_debug(dev, "No reference left for '%s', removing", slink);
|
|
|
|
if (unlink(slink) < 0 && errno != ENOENT)
|
|
log_device_debug_errno(dev, errno, "Failed to remove '%s', ignoring: %m", slink);
|
|
|
|
(void) rmdir_parents(slink, "/dev");
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int device_get_devpath_by_devnum(sd_device *dev, char **ret) {
|
|
const char *subsystem;
|
|
dev_t devnum;
|
|
int r;
|
|
|
|
assert(dev);
|
|
assert(ret);
|
|
|
|
r = sd_device_get_subsystem(dev, &subsystem);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
r = sd_device_get_devnum(dev, &devnum);
|
|
if (r < 0)
|
|
return r;
|
|
|
|
return device_path_make_major_minor(streq(subsystem, "block") ? S_IFBLK : S_IFCHR, devnum, ret);
|
|
}
|
|
|
|
int udev_node_update(sd_device *dev, sd_device *dev_old) {
|
|
_cleanup_free_ char *filename = NULL;
|
|
const char *devlink;
|
|
int r;
|
|
|
|
assert(dev);
|
|
assert(dev_old);
|
|
|
|
/* update possible left-over symlinks */
|
|
FOREACH_DEVICE_DEVLINK(dev_old, devlink) {
|
|
/* check if old link name still belongs to this device */
|
|
if (device_has_devlink(dev, devlink))
|
|
continue;
|
|
|
|
log_device_debug(dev,
|
|
"Removing/updating old device symlink '%s', which is no longer belonging to this device.",
|
|
devlink);
|
|
|
|
r = link_update(dev, devlink, /* add = */ false);
|
|
if (r < 0)
|
|
log_device_warning_errno(dev, r,
|
|
"Failed to remove/update device symlink '%s', ignoring: %m",
|
|
devlink);
|
|
}
|
|
|
|
/* create/update symlinks, add symlinks to name index */
|
|
FOREACH_DEVICE_DEVLINK(dev, devlink) {
|
|
r = link_update(dev, devlink, /* add = */ true);
|
|
if (r < 0)
|
|
log_device_warning_errno(dev, r,
|
|
"Failed to create/update device symlink '%s', ignoring: %m",
|
|
devlink);
|
|
}
|
|
|
|
r = device_get_devpath_by_devnum(dev, &filename);
|
|
if (r < 0)
|
|
return log_device_debug_errno(dev, r, "Failed to get device path: %m");
|
|
|
|
/* always add /dev/{block,char}/$major:$minor */
|
|
r = node_symlink(dev, NULL, filename);
|
|
if (r < 0)
|
|
return log_device_warning_errno(dev, r, "Failed to create device symlink '%s': %m", filename);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int udev_node_remove(sd_device *dev) {
|
|
_cleanup_free_ char *filename = NULL;
|
|
const char *devlink;
|
|
int r;
|
|
|
|
assert(dev);
|
|
|
|
/* remove/update symlinks, remove symlinks from name index */
|
|
FOREACH_DEVICE_DEVLINK(dev, devlink) {
|
|
r = link_update(dev, devlink, /* add = */ false);
|
|
if (r < 0)
|
|
log_device_warning_errno(dev, r,
|
|
"Failed to remove/update device symlink '%s', ignoring: %m",
|
|
devlink);
|
|
}
|
|
|
|
r = device_get_devpath_by_devnum(dev, &filename);
|
|
if (r < 0)
|
|
return log_device_debug_errno(dev, r, "Failed to get device path: %m");
|
|
|
|
/* remove /dev/{block,char}/$major:$minor */
|
|
if (unlink(filename) < 0 && errno != ENOENT)
|
|
return log_device_debug_errno(dev, errno, "Failed to remove '%s': %m", filename);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int udev_node_apply_permissions_impl(
|
|
sd_device *dev, /* can be NULL, only used for logging. */
|
|
int node_fd,
|
|
const char *devnode,
|
|
bool apply_mac,
|
|
mode_t mode,
|
|
uid_t uid,
|
|
gid_t gid,
|
|
OrderedHashmap *seclabel_list) {
|
|
|
|
bool apply_mode, apply_uid, apply_gid;
|
|
struct stat stats;
|
|
int r;
|
|
|
|
assert(node_fd >= 0);
|
|
assert(devnode);
|
|
|
|
if (fstat(node_fd, &stats) < 0)
|
|
return log_device_debug_errno(dev, errno, "cannot stat() node %s: %m", devnode);
|
|
|
|
/* If group is set, but mode is not set, "upgrade" mode for the group. */
|
|
if (mode == MODE_INVALID && gid_is_valid(gid) && gid > 0)
|
|
mode = 0660;
|
|
|
|
apply_mode = mode != MODE_INVALID && (stats.st_mode & 0777) != (mode & 0777);
|
|
apply_uid = uid_is_valid(uid) && stats.st_uid != uid;
|
|
apply_gid = gid_is_valid(gid) && stats.st_gid != gid;
|
|
|
|
if (apply_mode || apply_uid || apply_gid || apply_mac) {
|
|
bool selinux = false, smack = false;
|
|
const char *name, *label;
|
|
|
|
if (apply_mode || apply_uid || apply_gid) {
|
|
log_device_debug(dev, "Setting permissions %s, uid=" UID_FMT ", gid=" GID_FMT ", mode=%#o",
|
|
devnode,
|
|
uid_is_valid(uid) ? uid : stats.st_uid,
|
|
gid_is_valid(gid) ? gid : stats.st_gid,
|
|
mode != MODE_INVALID ? mode & 0777 : stats.st_mode & 0777);
|
|
|
|
r = fchmod_and_chown(node_fd, mode, uid, gid);
|
|
if (r < 0)
|
|
log_device_full_errno(dev, r == -ENOENT ? LOG_DEBUG : LOG_ERR, r,
|
|
"Failed to set owner/mode of %s to uid=" UID_FMT
|
|
", gid=" GID_FMT ", mode=%#o: %m",
|
|
devnode,
|
|
uid_is_valid(uid) ? uid : stats.st_uid,
|
|
gid_is_valid(gid) ? gid : stats.st_gid,
|
|
mode != MODE_INVALID ? mode & 0777 : stats.st_mode & 0777);
|
|
} else
|
|
log_device_debug(dev, "Preserve permissions of %s, uid=" UID_FMT ", gid=" GID_FMT ", mode=%#o",
|
|
devnode,
|
|
uid_is_valid(uid) ? uid : stats.st_uid,
|
|
gid_is_valid(gid) ? gid : stats.st_gid,
|
|
mode != MODE_INVALID ? mode & 0777 : stats.st_mode & 0777);
|
|
|
|
/* apply SECLABEL{$module}=$label */
|
|
ORDERED_HASHMAP_FOREACH_KEY(label, name, seclabel_list) {
|
|
int q;
|
|
|
|
if (streq(name, "selinux")) {
|
|
selinux = true;
|
|
|
|
q = mac_selinux_apply_fd(node_fd, devnode, label);
|
|
if (q < 0)
|
|
log_device_full_errno(dev, q == -ENOENT ? LOG_DEBUG : LOG_ERR, q,
|
|
"SECLABEL: failed to set SELinux label '%s': %m", label);
|
|
else
|
|
log_device_debug(dev, "SECLABEL: set SELinux label '%s'", label);
|
|
|
|
} else if (streq(name, "smack")) {
|
|
smack = true;
|
|
|
|
q = mac_smack_apply_fd(node_fd, SMACK_ATTR_ACCESS, label);
|
|
if (q < 0)
|
|
log_device_full_errno(dev, q == -ENOENT ? LOG_DEBUG : LOG_ERR, q,
|
|
"SECLABEL: failed to set SMACK label '%s': %m", label);
|
|
else
|
|
log_device_debug(dev, "SECLABEL: set SMACK label '%s'", label);
|
|
|
|
} else
|
|
log_device_error(dev, "SECLABEL: unknown subsystem, ignoring '%s'='%s'", name, label);
|
|
}
|
|
|
|
/* set the defaults */
|
|
if (!selinux)
|
|
(void) mac_selinux_fix_full(node_fd, NULL, devnode, LABEL_IGNORE_ENOENT);
|
|
if (!smack)
|
|
(void) mac_smack_apply_fd(node_fd, SMACK_ATTR_ACCESS, NULL);
|
|
}
|
|
|
|
/* always update timestamp when we re-use the node, like on media change events */
|
|
r = futimens_opath(node_fd, NULL);
|
|
if (r < 0)
|
|
log_device_debug_errno(dev, r, "Failed to adjust timestamp of node %s: %m", devnode);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int udev_node_apply_permissions(
|
|
sd_device *dev,
|
|
bool apply_mac,
|
|
mode_t mode,
|
|
uid_t uid,
|
|
gid_t gid,
|
|
OrderedHashmap *seclabel_list) {
|
|
|
|
const char *devnode;
|
|
_cleanup_close_ int node_fd = -EBADF;
|
|
int r;
|
|
|
|
assert(dev);
|
|
|
|
r = sd_device_get_devname(dev, &devnode);
|
|
if (r < 0)
|
|
return log_device_debug_errno(dev, r, "Failed to get devname: %m");
|
|
|
|
node_fd = sd_device_open(dev, O_PATH|O_CLOEXEC);
|
|
if (node_fd < 0) {
|
|
if (ERRNO_IS_DEVICE_ABSENT(node_fd)) {
|
|
log_device_debug_errno(dev, node_fd, "Device node %s is missing, skipping handling.", devnode);
|
|
return 0; /* This is necessarily racey, so ignore missing the device */
|
|
}
|
|
|
|
return log_device_debug_errno(dev, node_fd, "Cannot open node %s: %m", devnode);
|
|
}
|
|
|
|
return udev_node_apply_permissions_impl(dev, node_fd, devnode, apply_mac, mode, uid, gid, seclabel_list);
|
|
}
|
|
|
|
int static_node_apply_permissions(
|
|
const char *name,
|
|
mode_t mode,
|
|
uid_t uid,
|
|
gid_t gid,
|
|
char **tags) {
|
|
|
|
_cleanup_free_ char *unescaped_filename = NULL;
|
|
_cleanup_close_ int node_fd = -EBADF;
|
|
const char *devnode;
|
|
struct stat stats;
|
|
int r;
|
|
|
|
assert(name);
|
|
|
|
if (uid == UID_INVALID && gid == GID_INVALID && mode == MODE_INVALID && !tags)
|
|
return 0;
|
|
|
|
devnode = strjoina("/dev/", name);
|
|
|
|
node_fd = open(devnode, O_PATH|O_CLOEXEC);
|
|
if (node_fd < 0) {
|
|
if (errno != ENOENT)
|
|
return log_error_errno(errno, "Failed to open %s: %m", devnode);
|
|
return 0;
|
|
}
|
|
|
|
if (fstat(node_fd, &stats) < 0)
|
|
return log_error_errno(errno, "Failed to stat %s: %m", devnode);
|
|
|
|
if (!S_ISBLK(stats.st_mode) && !S_ISCHR(stats.st_mode)) {
|
|
log_warning("%s is neither block nor character device, ignoring.", devnode);
|
|
return 0;
|
|
}
|
|
|
|
if (!strv_isempty(tags)) {
|
|
unescaped_filename = xescape(name, "/.");
|
|
if (!unescaped_filename)
|
|
return log_oom();
|
|
}
|
|
|
|
/* export the tags to a directory as symlinks, allowing otherwise dead nodes to be tagged */
|
|
STRV_FOREACH(t, tags) {
|
|
_cleanup_free_ char *p = NULL;
|
|
|
|
p = path_join("/run/udev/static_node-tags/", *t, unescaped_filename);
|
|
if (!p)
|
|
return log_oom();
|
|
|
|
r = mkdir_parents(p, 0755);
|
|
if (r < 0)
|
|
return log_error_errno(r, "Failed to create parent directory for %s: %m", p);
|
|
|
|
r = symlink(devnode, p);
|
|
if (r < 0 && errno != EEXIST)
|
|
return log_error_errno(errno, "Failed to create symlink %s -> %s: %m", p, devnode);
|
|
}
|
|
|
|
return udev_node_apply_permissions_impl(NULL, node_fd, devnode, false, mode, uid, gid, NULL);
|
|
}
|