From: Theodore Ts'o Date: Wed, 1 Jul 2009 03:06:44 +0000 (-0400) Subject: libuuid: Don't run uuidd if it would fail due to permission problems X-Git-Url: https://err.no/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=7e54fe51ae92fa1acb8b9226191519b28b87c00e;p=util-linux libuuid: Don't run uuidd if it would fail due to permission problems Some distributions don't like installing uuidd setuid or setgid. So if the setuid or setigid bit is not set with uuidd, and the current process does not have write access to the UUIDD work directory, don't try running uuidd, since it won't work properly. Signed-off-by: "Theodore Ts'o" --- diff --git a/shlibs/uuid/src/gen_uuid.c b/shlibs/uuid/src/gen_uuid.c index 13096c0d..8bb29f38 100644 --- a/shlibs/uuid/src/gen_uuid.c +++ b/shlibs/uuid/src/gen_uuid.c @@ -485,6 +485,7 @@ static int get_uuid_via_daemon(int op, uuid_t out, int *num) ssize_t ret; int32_t reply_len = 0, expected = 16; struct sockaddr_un srv_addr; + struct stat st; pid_t pid; static const char *uuidd_path = UUIDD_PATH; static int access_ret = -2; @@ -500,6 +501,10 @@ static int get_uuid_via_daemon(int op, uuid_t out, int *num) sizeof(struct sockaddr_un)) < 0) { if (access_ret == -2) access_ret = access(uuidd_path, X_OK); + if (access_ret == 0) + access_ret = stat(uuidd_path, &st); + if (access_ret == 0 && (st.st_mode & (S_ISUID | S_ISGID)) == 0) + access_ret = access(UUIDD_DIR, W_OK); if (access_ret == 0 && start_attempts++ < 5) { if ((pid = fork()) == 0) { close_all_fds(); diff --git a/shlibs/uuid/src/uuidd.h b/shlibs/uuid/src/uuidd.h index c8072361..68ee0e5c 100644 --- a/shlibs/uuid/src/uuidd.h +++ b/shlibs/uuid/src/uuidd.h @@ -35,8 +35,9 @@ #ifndef _UUID_UUIDD_H #define _UUID_UUIDD_H -#define UUIDD_SOCKET_PATH "/var/run/uuidd/request" -#define UUIDD_PIDFILE_PATH "/var/run/uuidd/uuidd.pid" +#define UUIDD_DIR "/var/run/uuidd" +#define UUIDD_SOCKET_PATH UUIDD_DIR "/request" +#define UUIDD_PIDFILE_PATH UUIDD_DIR "/uuidd.pid" #define UUIDD_PATH "/usr/sbin/uuidd" #define UUIDD_OP_GETPID 0