static int builtin_uaccess(struct udev_device *dev, int argc, char *argv[], bool test) { int r; const char *path = NULL, *seat; bool changed_acl = false; uid_t uid; log_set_target(LOG_TARGET_AUTO); log_parse_environment(); log_open(); umask(0022); /* don't muck around with ACLs when the system is not running systemd */ if (!logind_running()) return 0; path = udev_device_get_devnode(dev); seat = udev_device_get_property_value(dev, "ID_SEAT"); if (!seat) seat = "seat0"; r = sd_seat_get_active(seat, NULL, &uid); if (r == -ENOENT) { /* No active session on this seat */ r = 0; goto finish; } else if (r < 0) { log_error("Failed to determine active user on seat %s.", seat); goto finish; } r = devnode_acl(path, true, false, 0, true, uid); if (r < 0) { log_error("Failed to apply ACL on %s: %s", path, strerror(-r)); goto finish; } changed_acl = true; r = 0; finish: if (path && !changed_acl) { int k; /* Better be safe than sorry and reset ACL */ k = devnode_acl(path, true, false, 0, false, 0); if (k < 0) { log_error("Failed to apply ACL on %s: %s", path, strerror(-k)); if (r >= 0) r = k; } } return r < 0 ? EXIT_FAILURE : EXIT_SUCCESS; }
static int builtin_uaccess(sd_device *dev, int argc, char *argv[], bool test) { const char *path = NULL, *seat; bool changed_acl = false; uid_t uid; int r; umask(0022); /* don't muck around with ACLs when the system is not running systemd */ if (!logind_running()) return 0; r = sd_device_get_devname(dev, &path); if (r < 0) { log_device_error_errno(dev, r, "Failed to get device name: %m"); goto finish; } if (sd_device_get_property_value(dev, "ID_SEAT", &seat) < 0) seat = "seat0"; r = sd_seat_get_active(seat, NULL, &uid); if (r < 0) { if (IN_SET(r, -ENXIO, -ENODATA)) /* No active session on this seat */ r = 0; else log_device_error_errno(dev, r, "Failed to determine active user on seat %s: %m", seat); goto finish; } r = devnode_acl(path, true, false, 0, true, uid); if (r < 0) { log_device_full(dev, r == -ENOENT ? LOG_DEBUG : LOG_ERR, r, "Failed to apply ACL: %m"); goto finish; } changed_acl = true; r = 0; finish: if (path && !changed_acl) { int k; /* Better be safe than sorry and reset ACL */ k = devnode_acl(path, true, false, 0, false, 0); if (k < 0) { log_device_full(dev, k == -ENOENT ? LOG_DEBUG : LOG_ERR, k, "Failed to apply ACL: %m"); if (r >= 0) r = k; } } return r; }
int devnode_acl_all(struct udev *udev, const char *seat, bool flush, bool del, uid_t old_uid, bool add, uid_t new_uid) { struct udev_list_entry *item = NULL, *first = NULL; struct udev_enumerate *e; int r; assert(udev); if (isempty(seat)) seat = "seat0"; e = udev_enumerate_new(udev); if (!e) return -ENOMEM; /* We can only match by one tag in libudev. We choose * "uaccess" for that. If we could match for two tags here we * could add the seat name as second match tag, but this would * be hardly optimizable in libudev, and hence checking the * second tag manually in our loop is a good solution. */ r = udev_enumerate_add_match_tag(e, "uaccess"); if (r < 0) goto finish; r = udev_enumerate_scan_devices(e); if (r < 0) goto finish; first = udev_enumerate_get_list_entry(e); udev_list_entry_foreach(item, first) { struct udev_device *d; const char *node, *sn; d = udev_device_new_from_syspath(udev, udev_list_entry_get_name(item)); if (!d) { r = -ENOMEM; goto finish; } sn = udev_device_get_property_value(d, "ID_SEAT"); if (isempty(sn)) sn = "seat0"; if (!streq(seat, sn)) { udev_device_unref(d); continue; } node = udev_device_get_devnode(d); if (!node) { /* In case people mistag devices with nodes, we need to ignore this */ udev_device_unref(d); continue; } log_debug("Fixing up %s for seat %s...", node, sn); r = devnode_acl(node, flush, del, old_uid, add, new_uid); udev_device_unref(d); if (r < 0) goto finish; } finish: if (e) udev_enumerate_unref(e); return r; }