1.\" 2.\" Copyright (c) 2002 Dima Dorfman. 3.\" All rights reserved. 4.\" 5.\" Redistribution and use in source and binary forms, with or without 6.\" modification, are permitted provided that the following conditions 7.\" are met: 8.\" 1. Redistributions of source code must retain the above copyright 9.\" notice, this list of conditions and the following disclaimer. 10.\" 2. Redistributions in binary form must reproduce the above copyright 11.\" notice, this list of conditions and the following disclaimer in the 12.\" documentation and/or other materials provided with the distribution. 13.\" 14.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 15.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 16.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 17.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24.\" SUCH DAMAGE. 25.\" 26.\" $FreeBSD$ 27.\" 28.Dd June 27, 2008 29.Dt DEVFS 8 30.Os 31.Sh NAME 32.Nm devfs 33.Nd "DEVFS control" 34.Sh SYNOPSIS 35.Nm 36.Op Fl m Ar mount-point 37.Ar keyword 38.Ar argument ... 39.Sh DESCRIPTION 40The 41.Nm 42utility provides an interface to manipulate properties of 43.Xr devfs 5 44mounts. 45.Pp 46The 47.Ar keyword 48argument determines the context for 49the rest of the arguments. 50For example, 51most of the commands related to the rule subsystem must be preceded by the 52.Cm rule 53keyword. 54The following flags are common to all keywords: 55.Bl -tag -offset indent 56.It Fl m Ar mount-point 57Operate on 58.Ar mount-point , 59which is expected to be a 60.Xr devfs 5 61mount. 62If this option is not specified, 63.Nm 64operates on 65.Pa /dev . 66.El 67.Ss Rule Subsystem 68The 69.Xr devfs 5 70rule subsystem provides a way for the administrator of a system to control 71the attributes of DEVFS nodes. 72.\" XXX devfs node? entry? what? 73Each DEVFS mount-point has a 74.Dq ruleset , 75or a list of rules, 76associated with it. 77When a device driver creates a new node, 78all the rules in the ruleset associated with each mount-point are applied 79(see below) before the node becomes visible to the userland. 80This permits the administrator to change the properties, 81including the visibility, 82of certain nodes. 83For example, one might want to hide all disk nodes in a 84.Xr jail 2 Ns 's 85.Pa /dev . 86.Ss Rule Manipulation 87Rule manipulation commands follow the 88.Cm rule 89keyword. 90The following flags are common to all of the rule manipulation commands: 91.Bl -tag -offset indent 92.It Fl s Ar ruleset 93Operate on the ruleset with the number 94.Ar ruleset . 95If this is not specified, 96the commands operate on the ruleset currently associated with the 97specified mount-point. 98.El 99.Pp 100The following commands are recognized: 101.Bl -tag -offset indent 102.It Cm rule add Oo Ar rulenum Oc Ar rulespec 103Add the rule described by 104.Ar rulespec 105(defined below) 106to the ruleset. 107The rule has the number 108.Ar rulenum 109if it is explicitly specified; 110otherwise, the rule number is automatically determined by the kernel. 111.It Cm rule apply Ar rulenum | rulespec 112Apply rule number 113.Ar rulenum 114or the rule described by 115.Ar rulespec 116to the mount-point. 117Rules that are 118.Dq applied 119have their conditions checked against all nodes 120in the mount-point and the actions taken if they match. 121.It Cm rule applyset 122Apply all the rules in the ruleset to the mount-point 123(see above for the definition of 124.Dq apply ) . 125.It Cm rule del Ar rulenum 126Delete rule number 127.Ar rulenum 128from the ruleset. 129.It Cm rule delset 130Delete all rules from the ruleset. 131.It Cm rule show Op Ar rulenum 132Display the rule number 133.Ar rulenum , 134or all the rules in the ruleset. 135The output lines (one line per rule) are expected to be valid 136.Ar rulespec Ns s . 137.It Cm rule showsets 138Report the numbers of existing rulesets. 139.It Cm ruleset Ar ruleset 140Set ruleset number 141.Ar ruleset 142as the current ruleset for the mount-point. 143.El 144.Ss Rule Specification 145Rules have two parts: the conditions and the actions. 146The conditions determine which DEVFS nodes the rule matches 147and the actions determine what should be done when a rule matches a node. 148For example, a rule can be written that sets the GID to 149.Dq Li operator 150for all devices of type tape. 151If the first token of a rule specification is a single dash 152.Pq Sq Fl , 153rules are read from the standard input and the rest of the specification 154is ignored. 155.Pp 156The following conditions are recognized. 157Conditions are ANDed together when matching a device; 158if OR is desired, multiple rules can be written. 159.Bl -tag -offset indent 160.It Cm path Ar pattern 161Matches any node with a path that matches 162.Ar pattern , 163which is interpreted as a 164.Xr glob 3 Ns -style 165pattern. 166.It Cm type Ar devtype 167Matches any node that is of type 168.Ar devtype . 169Valid types are 170.Cm disk , mem , tape 171and 172.Cm tty . 173.El 174.Pp 175The following actions are recognized. 176Although there is no explicit delimiter between conditions and actions, 177they may not be intermixed. 178.Bl -tag -offset indent 179.It Cm group Ar gid 180Set the GID of the node to 181.Ar gid , 182which may be a group name 183(looked up in 184.Pa /etc/group ) 185or number. 186.It Cm hide 187Hide the node. 188Nodes may later be revived manually with 189.Xr mknod 8 190or with the 191.Cm unhide 192action. 193.It Cm include Ar ruleset 194Apply all the rules in ruleset number 195.Ar ruleset 196to the node. 197This does not necessarily result in any changes to the node 198(e.g., if none of the rules in the included ruleset match). 199.It Cm mode Ar filemode 200Set the file mode to 201.Ar filemode , 202which is interpreted as in 203.Xr chmod 1 . 204.It Cm user Ar uid 205Set the UID to 206.Ar uid , 207which may be a user name 208(looked up in 209.Pa /etc/passwd ) 210or number. 211.It Cm unhide 212Unhide the node. 213.El 214.Sh IMPLEMENTATION NOTES 215Rulesets are created by the kernel at the first reference 216and destroyed when the last reference disappears. 217E.g., a ruleset is created when a rule is added to it or when it is set 218as the current ruleset for a mount-point, and 219a ruleset is destroyed when the last rule in it is deleted 220and no other references to it exist 221(i.e., it is not included by any rules and it is not the current ruleset 222for any mount-point). 223.Pp 224Ruleset number 0 is the default ruleset for all new mount-points. 225It is always empty, cannot be modified or deleted, and does not show up 226in the output of 227.Cm showsets . 228.Pp 229Rules and rulesets are unique to the entire system, 230not a particular mount-point. 231I.e., a 232.Cm showsets 233will return the same information regardless of the mount-point specified with 234.Fl m . 235The mount-point is only relevant when changing what its current ruleset is 236or when using one of the apply commands. 237.Sh FILES 238.Bl -tag -compact 239.It Pa /etc/defaults/devfs.rules 240Default 241.Nm 242configuration file. 243.It Pa /etc/devfs.rules 244Local 245.Nm 246configuration file. 247.It Pa /etc/devfs.conf 248Boot-time 249.Nm 250configuration file. 251.It Pa /usr/share/examples/etc/devfs.conf 252Example boot-time 253.Nm 254configuration file. 255.El 256.Sh EXAMPLES 257When the system boots, 258the only ruleset that exists is ruleset number 0; 259since the latter may not be modified, we have to create another ruleset 260before adding rules. 261Note that since most of the following examples do not specify 262.Fl m , 263the operations are performed on 264.Pa /dev 265(this only matters for things that might change the properties of nodes). 266.Pp 267.Dl "devfs ruleset 10" 268.Pp 269Specify that ruleset 10 should be the current ruleset for 270.Pa /dev 271(if it does not already exist, it is created). 272.Pp 273.Dl "devfs rule add path speaker mode 666" 274.Pp 275Add a rule that causes all nodes that have a path that matches 276.Dq Li speaker 277(this is only 278.Pa /dev/speaker ) 279to have the file mode 666 (read and write for all). 280Note that if any such nodes already exist, their mode will not be changed 281unless this rule (or ruleset) is explicitly applied (see below). 282The mode 283.Em will 284be changed if the node is created 285.Em after 286the rule is added 287(e.g., the 288.Pa atspeaker 289module is loaded after the above rule is added). 290.Pp 291.Dl "devfs rule applyset" 292.Pp 293Apply all the rules in the current ruleset to all the existing nodes. 294E.g., if the above rule was added after 295.Pa /dev/speaker 296was created, 297this command will cause its file mode to be changed to 666 298as prescribed by the rule. 299.Pp 300.Dl devfs rule add path "snp*" mode 660 group snoopers 301.Pp 302(Quoting the argument to 303.Cm path 304is often necessary to disable the shell's globbing features.) 305For all devices with a path that matches 306.Dq Li snp* , 307set the file mode to 660 and the GID to 308.Dq Li snoopers . 309This permits users in the 310.Dq Li snoopers 311group to use the 312.Xr snp 4 313devices. 314.Pp 315.Dl "devfs rule -s 20 add type disk group wheel" 316.Pp 317Add a rule to ruleset number 20. 318Since this ruleset is not the current ruleset for any mount-points, 319this rule is never applied automatically (unless ruleset 20 becomes 320a current ruleset for some mount-point at a later time). 321However, it can be applied explicitly, as such: 322.Pp 323.Dl "devfs -m /my/jail/dev rule -s 20 applyset" 324.Pp 325This will apply all rules in ruleset number 20 to the DEVFS mount on 326.Pa /my/jail/dev . 327It does not matter that ruleset 20 is not the current ruleset for that 328mount-point; the rules are still applied. 329.Pp 330.Dl "devfs rule apply hide" 331.Pp 332Since this rule has no conditions, the action 333.Pq Cm hide 334will be applied to all nodes. 335Since hiding all nodes is not very useful, we can undo it: 336.Pp 337.Dl "devfs rule apply unhide" 338.Pp 339which applies 340.Cm unhide 341to all the nodes, 342causing them to reappear. 343.Pp 344.Dl "devfs rule -s 10 add - < my_rules" 345.Pp 346Add all the rules from the file 347.Pa my_rules 348to ruleset 10. 349.Pp 350.Dl "devfs rule -s 20 show | devfs rule -s 10 add -" 351.Pp 352Since 353.Cm show 354outputs valid rules, 355this feature can be used to copy rulesets. 356The above copies all the rules from ruleset 20 into ruleset 10. 357The rule numbers are preserved, 358but ruleset 10 may already have rules with non-conflicting numbers 359(these will be preserved). 360.Sh SEE ALSO 361.Xr chmod 1 , 362.Xr jail 2 , 363.Xr glob 3 , 364.Xr devfs 5 , 365.Xr devfs.conf 5 , 366.Xr devfs.rules 5 , 367.Xr chown 8 , 368.Xr jail 8 , 369.Xr mknod 8 370.Sh AUTHORS 371.An Dima Dorfman 372