Your message dated Sat, 06 Mar 2021 23:48:27 +0000
with message-id <[email protected]>
and subject line Bug#978011: fixed in systemd 247.3-2
has caused the Debian Bug report #978011,
regarding udev: uaccess is set before ID_SMARTCARD_READER
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
978011: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978011
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: systemd
Version: 247.2-2
Severity: normal

Dear Maintainer,

I have a smartcard reader which exposes the CCID class (0x0b) on its function.
I see there are udev rules to grant uaccess based on this:

  $ rgrep SMARTCARD /lib/udev/rules.d
  70-uaccess.rules:ENV{ID_SMARTCARD_READER}=="?*", TAG+="uaccess"
  99-systemd.rules:SUBSYSTEM=="usb", ENV{DEVTYPE}=="usb_device", 
ENV{ID_USB_INTERFACES}=="*:0b????:*", ENV{ID_SMARTCARD_READER}="1"
  99-systemd.rules:ENV{ID_SMARTCARD_READER}=="?*", TAG+="systemd", 
ENV{SYSTEMD_WANTS}+="smartcard.target", 
ENV{SYSTEMD_USER_WANTS}+="smartcard.target"

Which make me think that there is an intent to grant uaccess to these devices.

but while the ones in 99-systemd.rules have an effect (see below for
"udevadm info", note ID_SMARTCARD_READER=1 and
SYSTEMD_*WANTS=smartcard.target being present), the TAG+="uaccess" does not.

I suspect this is because of the file ordering: 70-uaccess vs. 99-systemd .

Wouldn't it make more sense to apply the uaccess rules after setting the
ID_SMARTCARD_READER flag ?

I have no special knowledge of these files, and I suspect it is not as easy as
reordering them. I guess a fix would rather be to set these flags much earlier,
then setting the uaccess rules in 60-uaccess.rules, and finally setting the
SYSTEMD_*WANTS in 99-sustemd.rules.

Such change would avoid having to write a custom rule for such device, and
would be greatly appreciated.

$ udevadm info --query=all /sys/bus/usb/devices/1-9.3
P: /devices/pci0000:00/0000:00:14.0/usb1/1-9/1-9.3
N: bus/usb/001/051
L: 0
E: DEVPATH=/devices/pci0000:00/0000:00:14.0/usb1/1-9/1-9.3
E: DEVNAME=/dev/bus/usb/001/051
E: DEVTYPE=usb_device
E: DRIVER=usb
E: PRODUCT=1d6b/104/509
E: TYPE=0/0/0
E: BUSNUM=001
E: DEVNUM=051
E: MAJOR=189
E: MINOR=50
E: SUBSYSTEM=usb
E: USEC_INITIALIZED=308446022565
E: ID_VENDOR=Vincent_Pelletier
E: ID_VENDOR_ENC=Vincent\x20Pelletier
E: ID_VENDOR_ID=1d6b
E: ID_MODEL=python-smartcard-app-openpgp
E: ID_MODEL_ENC=python-smartcard-app-openpgp
E: ID_MODEL_ID=0104
E: ID_REVISION=0509
E: ID_SERIAL=Vincent_Pelletier_python-smartcard-app-openpgp_00000000e8246167
E: ID_SERIAL_SHORT=00000000e8246167
E: ID_BUS=usb
E: ID_USB_INTERFACES=:0b0000:
E: ID_VENDOR_FROM_DATABASE=Linux Foundation
E: ID_MODEL_FROM_DATABASE=Multifunction Composite Gadget
E: ID_PATH=pci-0000:00:14.0-usb-0:9.3
E: ID_PATH_TAG=pci-0000_00_14_0-usb-0_9_3
E: ID_FOR_SEAT=usb-pci-0000_00_14_0-usb-0_9_3
E: ID_SMARTCARD_READER=1
E: SYSTEMD_WANTS=smartcard.target
E: SYSTEMD_USER_WANTS=smartcard.target
E: TAGS=:seat:systemd:
E: CURRENT_TAGS=:seat:systemd:

Regards,
Vincent Pelletier

-- Package-specific info:

-- System Information:
Debian Release: bullseye/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armhf

Kernel: Linux 5.9.0-4-amd64 (SMP w/8 CPU threads)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_FIRMWARE_WORKAROUND, 
TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr:en_GB
Shell: /bin/sh linked to /bin/bash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages systemd depends on:
ii  adduser                 3.118
ii  libacl1                 2.2.53-8
ii  libapparmor1            2.13.5-1+b2
ii  libaudit1               1:3.0-1
ii  libblkid1               2.36.1-3
ii  libc6                   2.31-6
ii  libcap2                 1:2.44-1
ii  libcrypt1               1:4.4.17-1
ii  libcryptsetup12         2:2.3.4-1
ii  libgcrypt20             1.8.7-2
ii  libgnutls30             3.7.0-3
ii  libgpg-error0           1.38-2
ii  libip4tc2               1.8.6-1
ii  libkmod2                27+20200310-2
ii  liblz4-1                1.9.3-1
ii  liblzma5                5.2.4-1+b1
ii  libmount1               2.36.1-3
ii  libpam0g                1.3.1-5
ii  libseccomp2             2.5.1-1
ii  libselinux1             3.1-2+b2
ii  libsystemd0             247.2-2
ii  libzstd1                1.4.5+dfsg-4
ii  mount                   2.36.1-3
ii  openntpd [time-daemon]  1:6.2p3-4.1
ii  util-linux              2.36.1-3

Versions of packages systemd recommends:
ii  dbus  1.12.20-1

Versions of packages systemd suggests:
ii  policykit-1        0.105-29
pn  systemd-container  <none>

Versions of packages systemd is related to:
pn  dracut           <none>
ii  initramfs-tools  0.139
pn  libnss-systemd   <none>
ii  libpam-systemd   247.2-2
ii  udev             247.2-2

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: systemd
Source-Version: 247.3-2
Done: Michael Biebl <[email protected]>

We believe that the bug you reported is fixed in the latest version of
systemd, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Biebl <[email protected]> (supplier of updated systemd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 06 Mar 2021 22:32:14 +0100
Source: systemd
Architecture: source
Version: 247.3-2
Distribution: unstable
Urgency: medium
Maintainer: Debian systemd Maintainers 
<[email protected]>
Changed-By: Michael Biebl <[email protected]>
Closes: 898530 931753 975289 978011 980820 981407
Changes:
 systemd (247.3-2) unstable; urgency=medium
 .
   * Downgrade a couple of warnings to debug.
     If a package still ships only a SysV init script or if a service file or
     tmpfile uses /var/run, downgrade those messages to debug. We can use
     lintian to detect those issues.
     For service files and tmpfiles in /etc, keep the warning, as those files
     are typically added locally and aren't checked by lintian.
     (Closes: #981407)
   * core: fix mtime calculation of dropin files
     (Closes: #975289)
   * analyze: slightly reword PrivateTmp= message
     (Closes: #931753)
   * rules: move ID_SMARTCARD_READER definition to a <70 configuration
     (Closes: #978011)
   * units: turn off DNSSEC validation when timesyncd resolves hostnames
     (Closes: #898530)
   * table: drop trailing white spaces of the last cell in row
     (Closes: #980820)
Checksums-Sha1:
 a618fb6dfe398ca4e7cc31f86c63ba20c5c08658 5167 systemd_247.3-2.dsc
 cefda9b089182955299b0c5958fae2c94ec8f501 164040 systemd_247.3-2.debian.tar.xz
 b9977d4468d6f6b1855755e1ee6a8a942fbbd749 9338 systemd_247.3-2_source.buildinfo
Checksums-Sha256:
 d1fb8b11cf690f087ba261de62991eda89b4320f78db4e958ae3f86051af8b46 5167 
systemd_247.3-2.dsc
 b1e9dd90a70532878d7fcd8d46c9312922b85165b447fba56bd99e5ffebd2d23 164040 
systemd_247.3-2.debian.tar.xz
 fa3e43ce64887df32793f504211d40949762e9069f3ec6689495f3df374a4a96 9338 
systemd_247.3-2_source.buildinfo
Files:
 1d0ea4e9f98f1ba7df9829efd3711c63 5167 admin optional systemd_247.3-2.dsc
 40989205a5f994f85af72702799b85ba 164040 admin optional 
systemd_247.3-2.debian.tar.xz
 9759fe24572d5c42039a14057b08c3d4 9338 admin optional 
systemd_247.3-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=LQ7L
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to