1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright 2008 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 */ 26 27 #pragma ident "%Z%%M% %I% %E% SMI" 28 29 /* 30 * Devfsadm replaces drvconfig, audlinks, disks, tapes, ports, devlinks 31 * as a general purpose device administrative utility. It creates 32 * devices special files in /devices and logical links in /dev, and 33 * coordinates updates to /etc/path_to_instance with the kernel. It 34 * operates in both command line mode to handle user or script invoked 35 * reconfiguration updates, and operates in daemon mode to handle dynamic 36 * reconfiguration for hotplugging support. 37 */ 38 39 #include <string.h> 40 #include <deflt.h> 41 #include <tsol/label.h> 42 #include <bsm/devices.h> 43 #include <bsm/devalloc.h> 44 #include <utime.h> 45 #include <sys/param.h> 46 #include <bsm/libbsm.h> 47 #include "devfsadm_impl.h" 48 49 /* externs from devalloc.c */ 50 extern void _reset_devalloc(int); 51 extern void _update_devalloc_db(devlist_t *, int, int, char *, char *); 52 extern int _da_check_for_usb(char *, char *); 53 54 /* create or remove nodes or links. unset with -n */ 55 static int file_mods = TRUE; 56 57 /* cleanup mode. Set with -C */ 58 static int cleanup = FALSE; 59 60 /* devlinks -d compatibility */ 61 static int devlinks_debug = FALSE; 62 63 /* flag to check if system is labeled */ 64 int system_labeled = FALSE; 65 66 /* flag to enable/disable device allocation with -e/-d */ 67 static int devalloc_flag = 0; 68 69 /* flag that indicates if device allocation is on or not */ 70 static int devalloc_is_on = 0; 71 72 /* flag to update device allocation database for this device type */ 73 static int update_devdb = 0; 74 75 /* 76 * devices to be deallocated with -d : 77 * audio, floppy, cd, floppy, tape, rmdisk. 78 */ 79 static char *devalloc_list[10] = {DDI_NT_AUDIO, DDI_NT_CD, DDI_NT_CD_CHAN, 80 DDI_NT_FD, DDI_NT_TAPE, DDI_NT_BLOCK_CHAN, 81 DDI_NT_UGEN, DDI_NT_USB_ATTACHMENT_POINT, 82 DDI_NT_SCSI_NEXUS, NULL}; 83 84 /* list of allocatable devices */ 85 static devlist_t devlist; 86 87 /* load a single driver only. set with -i */ 88 static int single_drv = FALSE; 89 static char *driver = NULL; 90 91 /* attempt to load drivers or defer attach nodes */ 92 static int load_attach_drv = TRUE; 93 94 /* set if invoked via /usr/lib/devfsadm/devfsadmd */ 95 static int daemon_mode = FALSE; 96 97 /* output directed to syslog during daemon mode if set */ 98 static int logflag = FALSE; 99 100 /* build links in /dev. -x to turn off */ 101 static int build_dev = TRUE; 102 103 /* build nodes in /devices. -y to turn off */ 104 static int build_devices = TRUE; 105 106 /* -z to turn off */ 107 static int flush_path_to_inst_enable = TRUE; 108 109 /* variables used for path_to_inst flushing */ 110 static int inst_count = 0; 111 static mutex_t count_lock; 112 static cond_t cv; 113 114 /* variables for minor_fini thread */ 115 static mutex_t minor_fini_mutex; 116 static int minor_fini_canceled = TRUE; 117 static int minor_fini_delayed = FALSE; 118 static cond_t minor_fini_cv; 119 static int minor_fini_timeout = MINOR_FINI_TIMEOUT_DEFAULT; 120 121 /* single-threads /dev modification */ 122 static sema_t dev_sema; 123 124 /* the program we were invoked as; ie argv[0] */ 125 static char *prog; 126 127 /* pointers to create/remove link lists */ 128 static create_list_t *create_head = NULL; 129 static remove_list_t *remove_head = NULL; 130 131 /* supports the class -c option */ 132 static char **classes = NULL; 133 static int num_classes = 0; 134 135 /* used with verbose option -v or -V */ 136 static int num_verbose = 0; 137 static char **verbose = NULL; 138 139 static struct mperm *minor_perms = NULL; 140 static driver_alias_t *driver_aliases = NULL; 141 142 /* set if -r alternate root given */ 143 static char *root_dir = ""; 144 145 /* /devices or <rootdir>/devices */ 146 static char *devices_dir = DEVICES; 147 148 /* /dev or <rootdir>/dev */ 149 static char *dev_dir = DEV; 150 151 /* /etc/dev or <rootdir>/etc/dev */ 152 static char *etc_dev_dir = ETCDEV; 153 154 /* 155 * writable root (for lock files and doors during install). 156 * This is also root dir for /dev attr dir during install. 157 */ 158 static char *attr_root = NULL; 159 160 /* /etc/path_to_inst unless -p used */ 161 static char *inst_file = INSTANCE_FILE; 162 163 /* /usr/lib/devfsadm/linkmods unless -l used */ 164 static char *module_dirs = MODULE_DIRS; 165 166 /* default uid/gid used if /etc/minor_perm entry not found */ 167 static uid_t root_uid; 168 static gid_t sys_gid; 169 170 /* /etc/devlink.tab unless devlinks -t used */ 171 static char *devlinktab_file = NULL; 172 173 /* File and data structure to reserve enumerate IDs */ 174 static char *enumerate_file = ENUMERATE_RESERVED; 175 static enumerate_file_t *enumerate_reserved = NULL; 176 177 /* set if /dev link is new. speeds up rm_stale_links */ 178 static int linknew = TRUE; 179 180 /* variables for devlink.tab compat processing */ 181 static devlinktab_list_t *devlinktab_list = NULL; 182 static unsigned int devlinktab_line = 0; 183 184 /* cache head for devfsadm_enumerate*() functions */ 185 static numeral_set_t *head_numeral_set = NULL; 186 187 /* list list of devfsadm modules */ 188 static module_t *module_head = NULL; 189 190 /* name_to_major list used in utility function */ 191 static n2m_t *n2m_list = NULL; 192 193 /* cache of some links used for performance */ 194 static linkhead_t *headlinkhead = NULL; 195 196 /* locking variables to prevent multiples writes to /dev */ 197 static int hold_dev_lock = FALSE; 198 static int hold_daemon_lock = FALSE; 199 static int dev_lock_fd; 200 static int daemon_lock_fd; 201 static char dev_lockfile[PATH_MAX + 1]; 202 static char daemon_lockfile[PATH_MAX + 1]; 203 204 /* last devinfo node/minor processed. used for performance */ 205 static di_node_t lnode; 206 static di_minor_t lminor; 207 static char lphy_path[PATH_MAX + 1] = {""}; 208 209 /* Globals used by the link database */ 210 static di_devlink_handle_t devlink_cache; 211 static int update_database = FALSE; 212 213 /* Globals used to set logindev perms */ 214 static struct login_dev *login_dev_cache = NULL; 215 static int login_dev_enable = FALSE; 216 217 /* Global to use devinfo snapshot cache */ 218 static int use_snapshot_cache = FALSE; 219 220 /* Global for no-further-processing hash */ 221 static item_t **nfp_hash; 222 static mutex_t nfp_mutex = DEFAULTMUTEX; 223 224 /* 225 * Packaged directories - not removed even when empty. 226 * The dirs must be listed in canonical form 227 * i.e. without leading "/dev/" 228 */ 229 static char *packaged_dirs[] = 230 {"dsk", "rdsk", "term", NULL}; 231 232 /* RCM related globals */ 233 static void *librcm_hdl; 234 static rcm_handle_t *rcm_hdl = NULL; 235 static thread_t process_rcm_events_tid; 236 static struct rcm_eventq *volatile rcm_eventq_head = NULL; 237 static struct rcm_eventq *rcm_eventq_tail = NULL; 238 static mutex_t rcm_eventq_lock; 239 static cond_t rcm_eventq_cv; 240 static volatile int need_to_exit_rcm_event_thread = 0; 241 242 /* Devname globals */ 243 static int devname_debug_msg = 1; 244 static nvlist_t *devname_maps = NULL; 245 static int devname_first_call = 1; 246 static int load_devname_nsmaps = FALSE; 247 static int lookup_door_fd = -1; 248 static char *lookup_door_path; 249 250 static void load_dev_acl(void); 251 static void update_drvconf(major_t); 252 static void check_reconfig_state(void); 253 static void devname_setup_nsmaps(void); 254 static int s_stat(const char *, struct stat *); 255 256 static int is_blank(char *); 257 258 /* sysevent queue related globals */ 259 static mutex_t syseventq_mutex = DEFAULTMUTEX; 260 static syseventq_t *syseventq_front; 261 static syseventq_t *syseventq_back; 262 static void process_syseventq(); 263 264 int 265 main(int argc, char *argv[]) 266 { 267 struct passwd *pw; 268 struct group *gp; 269 pid_t pid; 270 int cond = 0; 271 272 (void) setlocale(LC_ALL, ""); 273 (void) textdomain(TEXT_DOMAIN); 274 275 if ((prog = strrchr(argv[0], '/')) == NULL) { 276 prog = argv[0]; 277 } else { 278 prog++; 279 } 280 281 if (getuid() != 0) { 282 err_print(MUST_BE_ROOT); 283 devfsadm_exit(1); 284 } 285 286 /* 287 * Close all files except stdin/stdout/stderr 288 */ 289 closefrom(3); 290 291 if ((pw = getpwnam(DEFAULT_DEV_USER)) != NULL) { 292 root_uid = pw->pw_uid; 293 } else { 294 err_print(CANT_FIND_USER, DEFAULT_DEV_USER); 295 root_uid = (uid_t)0; /* assume 0 is root */ 296 } 297 298 /* the default group is sys */ 299 300 if ((gp = getgrnam(DEFAULT_DEV_GROUP)) != NULL) { 301 sys_gid = gp->gr_gid; 302 } else { 303 err_print(CANT_FIND_GROUP, DEFAULT_DEV_GROUP); 304 sys_gid = (gid_t)3; /* assume 3 is sys */ 305 } 306 307 (void) umask(0); 308 309 system_labeled = is_system_labeled(); 310 if (system_labeled == FALSE) { 311 /* 312 * is_system_labeled() will return false in case we are 313 * starting before the first reboot after Trusted Extensions 314 * is enabled. Check the setting in /etc/system to see if 315 * TX is enabled (even if not yet booted). 316 */ 317 if (defopen("/etc/system") == 0) { 318 if (defread("set sys_labeling=1") != NULL) 319 system_labeled = TRUE; 320 321 /* close defaults file */ 322 (void) defopen(NULL); 323 } 324 } 325 /* 326 * Check if device allocation is enabled. 327 */ 328 if (system_labeled) { 329 /* 330 * In TX, the first line in /etc/security/device_allocate has 331 * DEVICE_ALLOCATION=ON if the feature is enabled. 332 */ 333 devalloc_is_on = da_is_on(); 334 } else if (auditon(A_GETCOND, (caddr_t)&cond, sizeof (cond)) == 0) { 335 /* 336 * Device allocation (and auditing) is enabled if BSM is 337 * enabled. auditon returns -1 and sets errno to EINVAL if BSM 338 * is not enabled. 339 */ 340 devalloc_is_on = 1; 341 } 342 343 #ifdef DEBUG 344 if (system_labeled == FALSE) { 345 struct stat tx_stat; 346 347 /* test hook: see also mkdevalloc.c and allocate.c */ 348 system_labeled = is_system_labeled_debug(&tx_stat); 349 } 350 #endif 351 352 parse_args(argc, argv); 353 354 (void) sema_init(&dev_sema, 1, USYNC_THREAD, NULL); 355 356 /* Initialize device allocation list */ 357 devlist.audio = devlist.cd = devlist.floppy = devlist.tape = 358 devlist.rmdisk = NULL; 359 360 if (daemon_mode == TRUE) { 361 /* 362 * Build /dev and /devices before daemonizing if 363 * reconfig booting and daemon invoked with alternate 364 * root. This is to support install. 365 */ 366 if (getenv(RECONFIG_BOOT) != NULL && root_dir[0] != '\0') { 367 vprint(INFO_MID, CONFIGURING); 368 load_dev_acl(); 369 update_drvconf((major_t)-1); 370 process_devinfo_tree(); 371 (void) modctl(MODSETMINIROOT); 372 } 373 374 /* 375 * fork before detaching from tty in order to print error 376 * message if unable to acquire file lock. locks not preserved 377 * across forks. Even under debug we want to fork so that 378 * when executed at boot we don't hang. 379 */ 380 if (fork() != 0) { 381 devfsadm_exit(0); 382 } 383 384 /* set directory to / so it coredumps there */ 385 if (chdir("/") == -1) { 386 err_print(CHROOT_FAILED, strerror(errno)); 387 } 388 389 /* only one daemon can run at a time */ 390 if ((pid = enter_daemon_lock()) == getpid()) { 391 detachfromtty(); 392 (void) cond_init(&cv, USYNC_THREAD, 0); 393 (void) mutex_init(&count_lock, USYNC_THREAD, 0); 394 if (thr_create(NULL, NULL, 395 (void *(*)(void *))instance_flush_thread, 396 NULL, THR_DETACHED, NULL) != 0) { 397 err_print(CANT_CREATE_THREAD, "daemon", 398 strerror(errno)); 399 devfsadm_exit(1); 400 } 401 402 /* start the minor_fini_thread */ 403 (void) mutex_init(&minor_fini_mutex, USYNC_THREAD, 0); 404 (void) cond_init(&minor_fini_cv, USYNC_THREAD, 0); 405 if (thr_create(NULL, NULL, 406 (void *(*)(void *))minor_fini_thread, 407 NULL, THR_DETACHED, NULL)) { 408 err_print(CANT_CREATE_THREAD, "minor_fini", 409 strerror(errno)); 410 devfsadm_exit(1); 411 } 412 413 414 /* 415 * No need for rcm notifications when running 416 * with an alternate root. So initialize rcm only 417 * when devfsadm is running with root dir "/". 418 * Similarly, logindevperms need only be set 419 * in daemon mode and when root dir is "/". 420 */ 421 if (root_dir[0] == '\0') { 422 (void) rcm_init(); 423 login_dev_enable = TRUE; 424 } 425 daemon_update(); 426 } else { 427 err_print(DAEMON_RUNNING, pid); 428 devfsadm_exit(1); 429 } 430 exit_daemon_lock(); 431 432 } else { 433 /* not a daemon, so just build /dev and /devices */ 434 process_devinfo_tree(); 435 if (devalloc_flag != 0) 436 /* Enable/disable device allocation */ 437 _reset_devalloc(devalloc_flag); 438 } 439 return (0); 440 } 441 442 static void 443 update_drvconf(major_t major) 444 { 445 if (modctl(MODLOADDRVCONF, major) != 0) 446 err_print(gettext("update_drvconf failed for major %d\n"), 447 major); 448 } 449 450 451 static void 452 load_dev_acl() 453 { 454 if (load_devpolicy() != 0) 455 err_print(gettext("device policy load failed\n")); 456 load_minor_perm_file(); 457 } 458 459 /* 460 * As devfsadm is run early in boot to provide the kernel with 461 * minor_perm info, we might as well check for reconfig at the 462 * same time to avoid running devfsadm twice. This gets invoked 463 * earlier than the env variable RECONFIG_BOOT is set up. 464 */ 465 static void 466 check_reconfig_state() 467 { 468 struct stat sb; 469 470 if (s_stat("/reconfigure", &sb) == 0) { 471 (void) modctl(MODDEVNAME, MODDEVNAME_RECONFIG, 0); 472 } 473 } 474 475 static void 476 modctl_sysavail() 477 { 478 /* 479 * Inform /dev that system is available, that 480 * implicit reconfig can now be performed. 481 */ 482 (void) modctl(MODDEVNAME, MODDEVNAME_SYSAVAIL, 0); 483 } 484 485 static void 486 set_lock_root(void) 487 { 488 struct stat sb; 489 char *lock_root; 490 size_t len; 491 492 lock_root = attr_root ? attr_root : root_dir; 493 494 len = strlen(lock_root) + strlen(ETCDEV) + 1; 495 etc_dev_dir = s_malloc(len); 496 (void) snprintf(etc_dev_dir, len, "%s%s", lock_root, ETCDEV); 497 498 if (s_stat(etc_dev_dir, &sb) != 0) { 499 s_mkdirp(etc_dev_dir, S_IRWXU|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH); 500 } else if (!S_ISDIR(sb.st_mode)) { 501 err_print(NOT_DIR, etc_dev_dir); 502 devfsadm_exit(1); 503 } 504 } 505 506 507 /* 508 * Parse arguments for all 6 programs handled from devfsadm. 509 */ 510 static void 511 parse_args(int argc, char *argv[]) 512 { 513 char opt; 514 char get_linkcompat_opts = FALSE; 515 char *compat_class; 516 int num_aliases = 0; 517 int len; 518 int retval; 519 int add_bind = FALSE; 520 struct aliases *ap = NULL; 521 struct aliases *a_head = NULL; 522 struct aliases *a_tail = NULL; 523 struct modconfig mc; 524 525 if (strcmp(prog, DISKS) == 0) { 526 compat_class = "disk"; 527 get_linkcompat_opts = TRUE; 528 529 } else if (strcmp(prog, TAPES) == 0) { 530 compat_class = "tape"; 531 get_linkcompat_opts = TRUE; 532 533 } else if (strcmp(prog, PORTS) == 0) { 534 compat_class = "port"; 535 get_linkcompat_opts = TRUE; 536 537 } else if (strcmp(prog, AUDLINKS) == 0) { 538 compat_class = "audio"; 539 get_linkcompat_opts = TRUE; 540 541 } else if (strcmp(prog, DEVLINKS) == 0) { 542 devlinktab_file = DEVLINKTAB_FILE; 543 544 build_devices = FALSE; 545 load_attach_drv = FALSE; 546 547 while ((opt = getopt(argc, argv, "dnr:st:vV:")) != EOF) { 548 switch (opt) { 549 case 'd': 550 file_mods = FALSE; 551 flush_path_to_inst_enable = FALSE; 552 devlinks_debug = TRUE; 553 break; 554 case 'n': 555 /* prevent driver loading and deferred attach */ 556 load_attach_drv = FALSE; 557 break; 558 case 'r': 559 set_root_devices_dev_dir(optarg); 560 if (zone_pathcheck(root_dir) != 561 DEVFSADM_SUCCESS) 562 devfsadm_exit(1); 563 break; 564 case 's': 565 /* 566 * suppress. don't create/remove links/nodes 567 * useful with -v or -V 568 */ 569 file_mods = FALSE; 570 flush_path_to_inst_enable = FALSE; 571 break; 572 case 't': 573 /* supply a non-default table file */ 574 devlinktab_file = optarg; 575 break; 576 case 'v': 577 /* documented verbose flag */ 578 add_verbose_id(VERBOSE_MID); 579 break; 580 case 'V': 581 /* undocumented for extra verbose levels */ 582 add_verbose_id(optarg); 583 break; 584 default: 585 usage(); 586 break; 587 } 588 } 589 590 if (optind < argc) { 591 usage(); 592 } 593 594 } else if (strcmp(prog, DRVCONFIG) == 0) { 595 build_dev = FALSE; 596 597 while ((opt = 598 getopt(argc, argv, "a:bdc:i:m:np:R:r:svV:")) != EOF) { 599 switch (opt) { 600 case 'a': 601 ap = calloc(sizeof (struct aliases), 1); 602 ap->a_name = dequote(optarg); 603 len = strlen(ap->a_name) + 1; 604 if (len > MAXMODCONFNAME) { 605 err_print(ALIAS_TOO_LONG, 606 MAXMODCONFNAME, ap->a_name); 607 devfsadm_exit(1); 608 } 609 ap->a_len = len; 610 if (a_tail == NULL) { 611 a_head = ap; 612 } else { 613 a_tail->a_next = ap; 614 } 615 a_tail = ap; 616 num_aliases++; 617 add_bind = TRUE; 618 break; 619 case 'b': 620 add_bind = TRUE; 621 break; 622 case 'c': 623 (void) strcpy(mc.drvclass, optarg); 624 break; 625 case 'd': 626 /* 627 * need to keep for compatibility, but 628 * do nothing. 629 */ 630 break; 631 case 'i': 632 single_drv = TRUE; 633 (void) strcpy(mc.drvname, optarg); 634 driver = s_strdup(optarg); 635 break; 636 case 'm': 637 mc.major = atoi(optarg); 638 break; 639 case 'n': 640 /* prevent driver loading and deferred attach */ 641 load_attach_drv = FALSE; 642 break; 643 case 'p': 644 /* specify alternate path_to_inst file */ 645 inst_file = s_strdup(optarg); 646 break; 647 case 'R': 648 /* 649 * Private flag for suninstall to populate 650 * device information on the installed root. 651 */ 652 root_dir = s_strdup(optarg); 653 if (zone_pathcheck(root_dir) != 654 DEVFSADM_SUCCESS) 655 devfsadm_exit(devfsadm_copy()); 656 break; 657 case 'r': 658 devices_dir = s_strdup(optarg); 659 if (zone_pathcheck(devices_dir) != 660 DEVFSADM_SUCCESS) 661 devfsadm_exit(1); 662 break; 663 case 's': 664 /* 665 * suppress. don't create nodes 666 * useful with -v or -V 667 */ 668 file_mods = FALSE; 669 flush_path_to_inst_enable = FALSE; 670 break; 671 case 'v': 672 /* documented verbose flag */ 673 add_verbose_id(VERBOSE_MID); 674 break; 675 case 'V': 676 /* undocumented for extra verbose levels */ 677 add_verbose_id(optarg); 678 break; 679 default: 680 usage(); 681 } 682 } 683 684 if (optind < argc) { 685 usage(); 686 } 687 688 if ((add_bind == TRUE) && (mc.major == -1 || 689 mc.drvname[0] == NULL)) { 690 err_print(MAJOR_AND_B_FLAG); 691 devfsadm_exit(1); 692 } 693 if (add_bind == TRUE) { 694 mc.num_aliases = num_aliases; 695 mc.ap = a_head; 696 retval = modctl(MODADDMAJBIND, NULL, (caddr_t)&mc); 697 if (retval < 0) { 698 err_print(MODCTL_ADDMAJBIND); 699 } 700 devfsadm_exit(retval); 701 } 702 703 } else if ((strcmp(prog, DEVFSADM) == 0) || 704 (strcmp(prog, DEVFSADMD) == 0)) { 705 char *zonename = NULL; 706 int init_drvconf = 0; 707 int init_perm = 0; 708 int public_mode = 0; 709 int init_sysavail = 0; 710 711 if (strcmp(prog, DEVFSADMD) == 0) { 712 daemon_mode = TRUE; 713 } 714 715 devlinktab_file = DEVLINKTAB_FILE; 716 717 while ((opt = getopt(argc, argv, 718 "a:Cc:deIi:l:mnp:PR:r:sSt:vV:x:")) != EOF) { 719 if (opt == 'I' || opt == 'P' || opt == 'S') { 720 if (public_mode) 721 usage(); 722 } else { 723 if (init_perm || init_drvconf || init_sysavail) 724 usage(); 725 public_mode = 1; 726 } 727 switch (opt) { 728 case 'a': 729 attr_root = s_strdup(optarg); 730 break; 731 case 'C': 732 cleanup = TRUE; 733 break; 734 case 'c': 735 num_classes++; 736 classes = s_realloc(classes, num_classes * 737 sizeof (char *)); 738 classes[num_classes - 1] = optarg; 739 break; 740 case 'd': 741 if (daemon_mode == FALSE) { 742 /* 743 * Device allocation to be disabled. 744 */ 745 devalloc_flag = DA_OFF; 746 build_dev = FALSE; 747 } 748 break; 749 case 'e': 750 if (daemon_mode == FALSE) { 751 /* 752 * Device allocation to be enabled. 753 */ 754 devalloc_flag = DA_ON; 755 build_dev = FALSE; 756 } 757 break; 758 case 'I': /* update kernel driver.conf cache */ 759 if (daemon_mode == TRUE) 760 usage(); 761 init_drvconf = 1; 762 break; 763 case 'i': 764 single_drv = TRUE; 765 driver = s_strdup(optarg); 766 break; 767 case 'l': 768 /* specify an alternate module load path */ 769 module_dirs = s_strdup(optarg); 770 break; 771 case 'm': 772 load_devname_nsmaps = TRUE; 773 break; 774 case 'n': 775 /* prevent driver loading and deferred attach */ 776 load_attach_drv = FALSE; 777 break; 778 case 'p': 779 /* specify alternate path_to_inst file */ 780 inst_file = s_strdup(optarg); 781 break; 782 case 'P': 783 if (daemon_mode == TRUE) 784 usage(); 785 /* load minor_perm and device_policy */ 786 init_perm = 1; 787 break; 788 case 'R': 789 /* 790 * Private flag for suninstall to populate 791 * device information on the installed root. 792 */ 793 root_dir = s_strdup(optarg); 794 devfsadm_exit(devfsadm_copy()); 795 break; 796 case 'r': 797 set_root_devices_dev_dir(optarg); 798 break; 799 case 's': 800 /* 801 * suppress. don't create/remove links/nodes 802 * useful with -v or -V 803 */ 804 file_mods = FALSE; 805 flush_path_to_inst_enable = FALSE; 806 break; 807 case 'S': 808 if (daemon_mode == TRUE) 809 usage(); 810 init_sysavail = 1; 811 break; 812 case 't': 813 devlinktab_file = optarg; 814 break; 815 case 'v': 816 /* documented verbose flag */ 817 add_verbose_id(VERBOSE_MID); 818 break; 819 case 'V': 820 /* undocumented: specify verbose lvl */ 821 add_verbose_id(optarg); 822 break; 823 case 'x': 824 /* 825 * x is the "private switch" option. The 826 * goal is to not suck up all the other 827 * option letters. 828 */ 829 if (strcmp(optarg, "update_devlinksdb") == 0) { 830 update_database = TRUE; 831 } else if (strcmp(optarg, "no_dev") == 0) { 832 /* don't build /dev */ 833 build_dev = FALSE; 834 } else if (strcmp(optarg, "no_devices") == 0) { 835 /* don't build /devices */ 836 build_devices = FALSE; 837 } else if (strcmp(optarg, "no_p2i") == 0) { 838 /* don't flush path_to_inst */ 839 flush_path_to_inst_enable = FALSE; 840 } else if (strcmp(optarg, "use_dicache") == 0) { 841 use_snapshot_cache = TRUE; 842 } else { 843 usage(); 844 } 845 break; 846 default: 847 usage(); 848 break; 849 } 850 } 851 if (optind < argc) { 852 usage(); 853 } 854 855 /* 856 * We're not in zone mode; Check to see if the rootpath 857 * collides with any zonepaths. 858 */ 859 if (zonename == NULL) { 860 if (zone_pathcheck(root_dir) != DEVFSADM_SUCCESS) 861 devfsadm_exit(1); 862 } 863 864 if (init_drvconf || init_perm || init_sysavail) { 865 /* 866 * Load minor perm before force-loading drivers 867 * so the correct permissions are picked up. 868 */ 869 if (init_perm) { 870 check_reconfig_state(); 871 load_dev_acl(); 872 } 873 if (init_drvconf) 874 update_drvconf((major_t)-1); 875 if (init_sysavail) 876 modctl_sysavail(); 877 devfsadm_exit(0); 878 /* NOTREACHED */ 879 } 880 881 if (load_devname_nsmaps == TRUE) { 882 devname_setup_nsmaps(); 883 devfsadm_exit(0); 884 } 885 } 886 887 888 if (get_linkcompat_opts == TRUE) { 889 890 build_devices = FALSE; 891 load_attach_drv = FALSE; 892 num_classes++; 893 classes = s_realloc(classes, num_classes * 894 sizeof (char *)); 895 classes[num_classes - 1] = compat_class; 896 897 while ((opt = getopt(argc, argv, "Cnr:svV:")) != EOF) { 898 switch (opt) { 899 case 'C': 900 cleanup = TRUE; 901 break; 902 case 'n': 903 /* prevent driver loading or deferred attach */ 904 load_attach_drv = FALSE; 905 break; 906 case 'r': 907 set_root_devices_dev_dir(optarg); 908 if (zone_pathcheck(root_dir) != 909 DEVFSADM_SUCCESS) 910 devfsadm_exit(1); 911 break; 912 case 's': 913 /* suppress. don't create/remove links/nodes */ 914 /* useful with -v or -V */ 915 file_mods = FALSE; 916 flush_path_to_inst_enable = FALSE; 917 break; 918 case 'v': 919 /* documented verbose flag */ 920 add_verbose_id(VERBOSE_MID); 921 break; 922 case 'V': 923 /* undocumented for extra verbose levels */ 924 add_verbose_id(optarg); 925 break; 926 default: 927 usage(); 928 } 929 } 930 if (optind < argc) { 931 usage(); 932 } 933 } 934 set_lock_root(); 935 } 936 937 void 938 usage(void) 939 { 940 if (strcmp(prog, DEVLINKS) == 0) { 941 err_print(DEVLINKS_USAGE); 942 } else if (strcmp(prog, DRVCONFIG) == 0) { 943 err_print(DRVCONFIG_USAGE); 944 } else if ((strcmp(prog, DEVFSADM) == 0) || 945 (strcmp(prog, DEVFSADMD) == 0)) { 946 err_print(DEVFSADM_USAGE); 947 } else { 948 err_print(COMPAT_LINK_USAGE); 949 } 950 951 devfsadm_exit(1); 952 } 953 954 static void 955 devi_tree_walk(struct dca_impl *dcip, int flags, char *ev_subclass) 956 { 957 char *msg, *name; 958 struct mlist mlist = {0}; 959 di_node_t node; 960 961 vprint(CHATTY_MID, "devi_tree_walk: root=%s, minor=%s, driver=%s," 962 " error=%d, flags=%u\n", dcip->dci_root, 963 dcip->dci_minor ? dcip->dci_minor : "<NULL>", 964 dcip->dci_driver ? dcip->dci_driver : "<NULL>", dcip->dci_error, 965 dcip->dci_flags); 966 967 assert(dcip->dci_root); 968 969 if (dcip->dci_flags & DCA_LOAD_DRV) { 970 node = di_init_driver(dcip->dci_driver, flags); 971 msg = DRIVER_FAILURE; 972 name = dcip->dci_driver; 973 } else { 974 node = di_init(dcip->dci_root, flags); 975 msg = DI_INIT_FAILED; 976 name = dcip->dci_root; 977 } 978 979 if (node == DI_NODE_NIL) { 980 dcip->dci_error = errno; 981 /* 982 * Rapid hotplugging (commonly seen during USB testing), 983 * may remove a device before the create event for it 984 * has been processed. To prevent alarming users with 985 * a superfluous message, we suppress error messages 986 * for ENXIO and hotplug. 987 */ 988 if (!(errno == ENXIO && (dcip->dci_flags & DCA_HOT_PLUG))) 989 err_print(msg, name, strerror(dcip->dci_error)); 990 return; 991 } 992 993 if (dcip->dci_flags & DCA_FLUSH_PATHINST) 994 flush_path_to_inst(); 995 996 dcip->dci_arg = &mlist; 997 998 vprint(CHATTY_MID, "walking device tree\n"); 999 1000 (void) di_walk_minor(node, NULL, DI_CHECK_ALIAS, dcip, 1001 check_minor_type); 1002 1003 process_deferred_links(dcip, DCA_CREATE_LINK); 1004 1005 dcip->dci_arg = NULL; 1006 1007 /* 1008 * Finished creating devfs files and dev links. 1009 * Log sysevent and notify RCM. 1010 */ 1011 if (ev_subclass) 1012 build_and_enq_event(EC_DEV_ADD, ev_subclass, dcip->dci_root, 1013 node, dcip->dci_minor); 1014 1015 if ((dcip->dci_flags & DCA_NOTIFY_RCM) && rcm_hdl) 1016 (void) notify_rcm(node, dcip->dci_minor); 1017 1018 /* Add new device to device allocation database */ 1019 if (system_labeled && update_devdb) { 1020 _update_devalloc_db(&devlist, 0, DA_ADD, NULL, root_dir); 1021 update_devdb = 0; 1022 } 1023 1024 di_fini(node); 1025 } 1026 1027 static void 1028 process_deferred_links(struct dca_impl *dcip, int flags) 1029 { 1030 struct mlist *dep; 1031 struct minor *mp, *smp; 1032 1033 vprint(CHATTY_MID, "processing deferred links\n"); 1034 1035 dep = dcip->dci_arg; 1036 1037 /* 1038 * The list head is not used during the deferred create phase 1039 */ 1040 dcip->dci_arg = NULL; 1041 1042 assert(dep); 1043 assert((dep->head == NULL) ^ (dep->tail != NULL)); 1044 assert(flags == DCA_FREE_LIST || flags == DCA_CREATE_LINK); 1045 1046 for (smp = NULL, mp = dep->head; mp; mp = mp->next) { 1047 if (flags == DCA_CREATE_LINK) 1048 (void) check_minor_type(mp->node, mp->minor, dcip); 1049 free(smp); 1050 smp = mp; 1051 } 1052 1053 free(smp); 1054 } 1055 1056 /* 1057 * Called in non-daemon mode to take a snap shot of the devinfo tree. 1058 * Then it calls the appropriate functions to build /devices and /dev. 1059 * It also flushes path_to_inst. 1060 * DINFOCACHE snapshot needs to be updated when devfsadm is run. 1061 * This will only happen if the flags that devfsadm uses matches the flags 1062 * that DINFOCACHE uses and that is why flags is set to 1063 * DI_CACHE_SNAPSHOT_FLAGS. 1064 */ 1065 void 1066 process_devinfo_tree() 1067 { 1068 uint_t flags = DI_CACHE_SNAPSHOT_FLAGS; 1069 struct dca_impl dci; 1070 char name[MAXNAMELEN]; 1071 char *fcn = "process_devinfo_tree: "; 1072 1073 vprint(CHATTY_MID, "%senter\n", fcn); 1074 1075 dca_impl_init("/", NULL, &dci); 1076 1077 lock_dev(); 1078 1079 /* 1080 * Update kernel driver.conf cache when devfsadm/drvconfig 1081 * is invoked to build /devices and /dev. 1082 */ 1083 if (load_attach_drv == TRUE) 1084 update_drvconf((major_t)-1); 1085 1086 if (single_drv == TRUE) { 1087 /* 1088 * load a single driver, but walk the entire devinfo tree 1089 */ 1090 if (load_attach_drv == FALSE) 1091 err_print(DRV_LOAD_REQD); 1092 1093 vprint(CHATTY_MID, "%sattaching driver (%s)\n", fcn, driver); 1094 1095 dci.dci_flags |= DCA_LOAD_DRV; 1096 (void) snprintf(name, sizeof (name), "%s", driver); 1097 dci.dci_driver = name; 1098 1099 } else if (load_attach_drv == TRUE) { 1100 /* 1101 * Load and attach all drivers, then walk the entire tree. 1102 * If the cache flag is set, use DINFOCACHE to get cached 1103 * data. 1104 */ 1105 if (use_snapshot_cache == TRUE) { 1106 flags = DINFOCACHE; 1107 vprint(CHATTY_MID, "%susing snapshot cache\n", fcn); 1108 } else { 1109 vprint(CHATTY_MID, "%sattaching all drivers\n", fcn); 1110 flags |= DINFOFORCE; 1111 if (cleanup) { 1112 /* 1113 * remove dangling entries from /etc/devices 1114 * files. 1115 */ 1116 flags |= DINFOCLEANUP; 1117 } 1118 } 1119 } 1120 1121 if (((load_attach_drv == TRUE) || (single_drv == TRUE)) && 1122 (build_devices == TRUE)) { 1123 dci.dci_flags |= DCA_FLUSH_PATHINST; 1124 } 1125 1126 /* handle pre-cleanup operations desired by the modules. */ 1127 pre_and_post_cleanup(RM_PRE); 1128 1129 devi_tree_walk(&dci, flags, NULL); 1130 1131 if (dci.dci_error) { 1132 devfsadm_exit(1); 1133 } 1134 1135 /* handle post-cleanup operations desired by the modules. */ 1136 pre_and_post_cleanup(RM_POST); 1137 1138 unlock_dev(SYNC_STATE); 1139 } 1140 1141 /*ARGSUSED*/ 1142 static void 1143 print_cache_signal(int signo) 1144 { 1145 if (signal(SIGUSR1, print_cache_signal) == SIG_ERR) { 1146 err_print("signal SIGUSR1 failed: %s\n", strerror(errno)); 1147 devfsadm_exit(1); 1148 } 1149 } 1150 1151 static void 1152 revoke_lookup_door(void) 1153 { 1154 if (lookup_door_fd != -1) { 1155 if (door_revoke(lookup_door_fd) == -1) { 1156 err_print("door_revoke of %s failed - %s\n", 1157 lookup_door_path, strerror(errno)); 1158 } 1159 } 1160 } 1161 1162 /*ARGSUSED*/ 1163 static void 1164 catch_exit(int signo) 1165 { 1166 revoke_lookup_door(); 1167 } 1168 1169 /* 1170 * Register with eventd for messages. Create doors for synchronous 1171 * link creation. 1172 */ 1173 static void 1174 daemon_update(void) 1175 { 1176 int fd; 1177 char *fcn = "daemon_update: "; 1178 char door_file[MAXPATHLEN]; 1179 const char *subclass_list; 1180 sysevent_handle_t *sysevent_hp; 1181 vprint(CHATTY_MID, "%senter\n", fcn); 1182 1183 if (signal(SIGUSR1, print_cache_signal) == SIG_ERR) { 1184 err_print("signal SIGUSR1 failed: %s\n", strerror(errno)); 1185 devfsadm_exit(1); 1186 } 1187 if (signal(SIGTERM, catch_exit) == SIG_ERR) { 1188 err_print("signal SIGTERM failed: %s\n", strerror(errno)); 1189 devfsadm_exit(1); 1190 } 1191 1192 if (snprintf(door_file, sizeof (door_file), 1193 "%s%s", attr_root ? attr_root : root_dir, DEVFSADM_SERVICE_DOOR) 1194 >= sizeof (door_file)) { 1195 err_print("update_daemon failed to open sysevent service " 1196 "door\n"); 1197 devfsadm_exit(1); 1198 } 1199 if ((sysevent_hp = sysevent_open_channel_alt( 1200 door_file)) == NULL) { 1201 err_print(CANT_CREATE_DOOR, 1202 door_file, strerror(errno)); 1203 devfsadm_exit(1); 1204 } 1205 if (sysevent_bind_subscriber(sysevent_hp, event_handler) != 0) { 1206 err_print(CANT_CREATE_DOOR, 1207 door_file, strerror(errno)); 1208 (void) sysevent_close_channel(sysevent_hp); 1209 devfsadm_exit(1); 1210 } 1211 subclass_list = EC_SUB_ALL; 1212 if (sysevent_register_event(sysevent_hp, EC_ALL, &subclass_list, 1) 1213 != 0) { 1214 err_print(CANT_CREATE_DOOR, 1215 door_file, strerror(errno)); 1216 (void) sysevent_unbind_subscriber(sysevent_hp); 1217 (void) sysevent_close_channel(sysevent_hp); 1218 devfsadm_exit(1); 1219 } 1220 if (snprintf(door_file, sizeof (door_file), "%s/%s", 1221 etc_dev_dir, DEVFSADM_SYNCH_DOOR) >= sizeof (door_file)) { 1222 err_print(CANT_CREATE_DOOR, DEVFSADM_SYNCH_DOOR, 1223 strerror(ENAMETOOLONG)); 1224 devfsadm_exit(1); 1225 } 1226 1227 (void) s_unlink(door_file); 1228 if ((fd = open(door_file, O_RDWR | O_CREAT, SYNCH_DOOR_PERMS)) == -1) { 1229 err_print(CANT_CREATE_DOOR, door_file, strerror(errno)); 1230 devfsadm_exit(1); 1231 } 1232 (void) close(fd); 1233 1234 if ((fd = door_create(sync_handler, NULL, 1235 DOOR_REFUSE_DESC | DOOR_NO_CANCEL)) == -1) { 1236 err_print(CANT_CREATE_DOOR, door_file, strerror(errno)); 1237 (void) s_unlink(door_file); 1238 devfsadm_exit(1); 1239 } 1240 1241 if (fattach(fd, door_file) == -1) { 1242 err_print(CANT_CREATE_DOOR, door_file, strerror(errno)); 1243 (void) s_unlink(door_file); 1244 devfsadm_exit(1); 1245 } 1246 1247 /* 1248 * devname_lookup_door 1249 */ 1250 if (snprintf(door_file, sizeof (door_file), "%s/%s", 1251 etc_dev_dir, DEVNAME_LOOKUP_DOOR) >= sizeof (door_file)) { 1252 err_print(CANT_CREATE_DOOR, DEVNAME_LOOKUP_DOOR, 1253 strerror(ENAMETOOLONG)); 1254 devfsadm_exit(1); 1255 } 1256 1257 (void) s_unlink(door_file); 1258 if ((fd = open(door_file, O_RDWR | O_CREAT, S_IRUSR|S_IWUSR)) == -1) { 1259 err_print(CANT_CREATE_DOOR, door_file, strerror(errno)); 1260 devfsadm_exit(1); 1261 } 1262 (void) close(fd); 1263 1264 if ((fd = door_create(devname_lookup_handler, NULL, 1265 DOOR_REFUSE_DESC)) == -1) { 1266 err_print(CANT_CREATE_DOOR, door_file, strerror(errno)); 1267 (void) s_unlink(door_file); 1268 devfsadm_exit(1); 1269 } 1270 1271 (void) fdetach(door_file); 1272 lookup_door_path = s_strdup(door_file); 1273 retry: 1274 if (fattach(fd, door_file) == -1) { 1275 if (errno == EBUSY) 1276 goto retry; 1277 err_print(CANT_CREATE_DOOR, door_file, strerror(errno)); 1278 (void) s_unlink(door_file); 1279 devfsadm_exit(1); 1280 } 1281 lookup_door_fd = fd; 1282 1283 /* pass down the door name to kernel for door_ki_open */ 1284 if (devname_kcall(MODDEVNAME_LOOKUPDOOR, (void *)door_file) != 0) 1285 err_print(DEVNAME_CONTACT_FAILED, strerror(errno)); 1286 else 1287 devname_setup_nsmaps(); 1288 1289 vprint(CHATTY_MID, "%spausing\n", fcn); 1290 for (;;) { 1291 (void) pause(); 1292 } 1293 } 1294 1295 /*ARGSUSED*/ 1296 static void 1297 sync_handler(void *cookie, char *ap, size_t asize, 1298 door_desc_t *dp, uint_t ndesc) 1299 { 1300 door_cred_t dcred; 1301 struct dca_off *dcp, rdca; 1302 struct dca_impl dci; 1303 1304 /* 1305 * Must be root to make this call 1306 * If caller is not root, don't touch its data. 1307 */ 1308 if (door_cred(&dcred) != 0 || dcred.dc_euid != 0) { 1309 dcp = ⤷ 1310 dcp->dca_error = EPERM; 1311 goto out; 1312 } 1313 1314 assert(ap); 1315 assert(asize == sizeof (*dcp)); 1316 1317 dcp = (void *)ap; 1318 1319 /* 1320 * Root is always present and is the first component of "name" member 1321 */ 1322 assert(dcp->dca_root == 0); 1323 1324 /* 1325 * The structure passed in by the door_client uses offsets 1326 * instead of pointers to work across address space boundaries. 1327 * Now copy the data into a structure (dca_impl) which uses 1328 * pointers. 1329 */ 1330 dci.dci_root = &dcp->dca_name[dcp->dca_root]; 1331 dci.dci_minor = dcp->dca_minor ? &dcp->dca_name[dcp->dca_minor] : NULL; 1332 dci.dci_driver = 1333 dcp->dca_driver ? &dcp->dca_name[dcp->dca_driver] : NULL; 1334 dci.dci_error = 0; 1335 dci.dci_flags = dcp->dca_flags | (dci.dci_driver ? DCA_LOAD_DRV : 0); 1336 dci.dci_arg = NULL; 1337 1338 lock_dev(); 1339 devi_tree_walk(&dci, DINFOCPYALL, NULL); 1340 dcp->dca_error = dci.dci_error; 1341 1342 if (dcp->dca_flags & DCA_DEVLINK_SYNC) 1343 unlock_dev(SYNC_STATE); 1344 else 1345 unlock_dev(CACHE_STATE); 1346 1347 out: (void) door_return((char *)dcp, sizeof (*dcp), NULL, 0); 1348 } 1349 1350 static void 1351 lock_dev(void) 1352 { 1353 vprint(CHATTY_MID, "lock_dev(): entered\n"); 1354 1355 if (build_dev == FALSE) 1356 return; 1357 1358 /* lockout other threads from /dev */ 1359 while (sema_wait(&dev_sema) != 0); 1360 1361 /* 1362 * Lock out other devfsadm processes from /dev. 1363 * If this wasn't the last process to run, 1364 * clear caches 1365 */ 1366 if (enter_dev_lock() != getpid()) { 1367 invalidate_enumerate_cache(); 1368 rm_all_links_from_cache(); 1369 (void) di_devlink_close(&devlink_cache, DI_LINK_ERROR); 1370 1371 /* send any sysevents that were queued up. */ 1372 process_syseventq(); 1373 } 1374 1375 /* 1376 * (re)load the reverse links database if not 1377 * already cached. 1378 */ 1379 if (devlink_cache == NULL) 1380 devlink_cache = di_devlink_open(root_dir, 0); 1381 1382 /* 1383 * If modules were unloaded, reload them. Also use module status 1384 * as an indication that we should check to see if other binding 1385 * files need to be reloaded. 1386 */ 1387 if (module_head == NULL) { 1388 load_modules(); 1389 read_minor_perm_file(); 1390 read_driver_aliases_file(); 1391 read_devlinktab_file(); 1392 read_logindevperm_file(); 1393 read_enumerate_file(); 1394 } 1395 1396 if (module_head != NULL) 1397 return; 1398 1399 if (strcmp(prog, DEVLINKS) == 0) { 1400 if (devlinktab_list == NULL) { 1401 err_print(NO_LINKTAB, devlinktab_file); 1402 err_print(NO_MODULES, module_dirs); 1403 err_print(ABORTING); 1404 devfsadm_exit(1); 1405 } 1406 } else { 1407 err_print(NO_MODULES, module_dirs); 1408 if (strcmp(prog, DEVFSADM) == 0) { 1409 err_print(MODIFY_PATH); 1410 } 1411 } 1412 } 1413 1414 /* 1415 * Unlock the device. If we are processing a CACHE_STATE call, we signal a 1416 * minor_fini_thread delayed SYNC_STATE at the end of the call. If we are 1417 * processing a SYNC_STATE call, we cancel any minor_fini_thread SYNC_STATE 1418 * at both the start and end of the call since we will be doing the SYNC_STATE. 1419 */ 1420 static void 1421 unlock_dev(int flag) 1422 { 1423 assert(flag == SYNC_STATE || flag == CACHE_STATE); 1424 1425 vprint(CHATTY_MID, "unlock_dev(): entered\n"); 1426 1427 /* If we are starting a SYNC_STATE, cancel minor_fini_thread SYNC */ 1428 if (flag == SYNC_STATE) { 1429 (void) mutex_lock(&minor_fini_mutex); 1430 minor_fini_canceled = TRUE; 1431 minor_fini_delayed = FALSE; 1432 (void) mutex_unlock(&minor_fini_mutex); 1433 } 1434 1435 if (build_dev == FALSE) 1436 return; 1437 1438 if (devlink_cache == NULL) { 1439 err_print(NO_DEVLINK_CACHE); 1440 } 1441 assert(devlink_cache); 1442 1443 if (flag == SYNC_STATE) { 1444 unload_modules(); 1445 if (update_database) 1446 (void) di_devlink_update(devlink_cache); 1447 (void) di_devlink_close(&devlink_cache, 0); 1448 1449 /* 1450 * now that the devlinks db cache has been flushed, it is safe 1451 * to send any sysevents that were queued up. 1452 */ 1453 process_syseventq(); 1454 } 1455 1456 exit_dev_lock(); 1457 1458 (void) mutex_lock(&minor_fini_mutex); 1459 if (flag == SYNC_STATE) { 1460 /* We did a SYNC_STATE, cancel minor_fini_thread SYNC */ 1461 minor_fini_canceled = TRUE; 1462 minor_fini_delayed = FALSE; 1463 } else { 1464 /* We did a CACHE_STATE, start delayed minor_fini_thread SYNC */ 1465 minor_fini_canceled = FALSE; 1466 minor_fini_delayed = TRUE; 1467 (void) cond_signal(&minor_fini_cv); 1468 } 1469 (void) mutex_unlock(&minor_fini_mutex); 1470 1471 (void) sema_post(&dev_sema); 1472 } 1473 1474 /* 1475 * Check that if -r is set, it is not any part of a zone--- that is, that 1476 * the zonepath is not a substring of the root path. 1477 */ 1478 static int 1479 zone_pathcheck(char *checkpath) 1480 { 1481 void *dlhdl = NULL; 1482 char *name; 1483 char root[MAXPATHLEN]; /* resolved devfsadm root path */ 1484 char zroot[MAXPATHLEN]; /* zone root path */ 1485 char rzroot[MAXPATHLEN]; /* resolved zone root path */ 1486 char tmp[MAXPATHLEN]; 1487 FILE *cookie; 1488 int err = DEVFSADM_SUCCESS; 1489 1490 if (checkpath[0] == '\0') 1491 return (DEVFSADM_SUCCESS); 1492 1493 /* 1494 * Check if zones is available on this system. 1495 */ 1496 if ((dlhdl = dlopen(LIBZONECFG_PATH, RTLD_LAZY)) == NULL) { 1497 return (DEVFSADM_SUCCESS); 1498 } 1499 1500 bzero(root, sizeof (root)); 1501 if (resolvepath(checkpath, root, sizeof (root) - 1) == -1) { 1502 /* 1503 * In this case the user has done "devfsadm -r" on some path 1504 * which does not yet exist, or we got some other misc. error. 1505 * We punt and don't resolve the path in this case. 1506 */ 1507 (void) strlcpy(root, checkpath, sizeof (root)); 1508 } 1509 1510 if (strlen(root) > 0 && (root[strlen(root) - 1] != '/')) { 1511 (void) snprintf(tmp, sizeof (tmp), "%s/", root); 1512 (void) strlcpy(root, tmp, sizeof (root)); 1513 } 1514 1515 cookie = setzoneent(); 1516 while ((name = getzoneent(cookie)) != NULL) { 1517 /* Skip the global zone */ 1518 if (strcmp(name, GLOBAL_ZONENAME) == 0) { 1519 free(name); 1520 continue; 1521 } 1522 1523 if (zone_get_zonepath(name, zroot, sizeof (zroot)) != Z_OK) { 1524 free(name); 1525 continue; 1526 } 1527 1528 bzero(rzroot, sizeof (rzroot)); 1529 if (resolvepath(zroot, rzroot, sizeof (rzroot) - 1) == -1) { 1530 /* 1531 * Zone path doesn't exist, or other misc error, 1532 * so we try using the non-resolved pathname. 1533 */ 1534 (void) strlcpy(rzroot, zroot, sizeof (rzroot)); 1535 } 1536 if (strlen(rzroot) > 0 && (rzroot[strlen(rzroot) - 1] != '/')) { 1537 (void) snprintf(tmp, sizeof (tmp), "%s/", rzroot); 1538 (void) strlcpy(rzroot, tmp, sizeof (rzroot)); 1539 } 1540 1541 /* 1542 * Finally, the comparison. If the zone root path is a 1543 * leading substring of the root path, fail. 1544 */ 1545 if (strncmp(rzroot, root, strlen(rzroot)) == 0) { 1546 err_print(ZONE_PATHCHECK, root, name); 1547 err = DEVFSADM_FAILURE; 1548 free(name); 1549 break; 1550 } 1551 free(name); 1552 } 1553 endzoneent(cookie); 1554 (void) dlclose(dlhdl); 1555 return (err); 1556 } 1557 1558 /* 1559 * Called by the daemon when it receives an event from the devfsadm SLM 1560 * to syseventd. 1561 * 1562 * The devfsadm SLM uses a private event channel for communication to 1563 * devfsadmd set-up via private libsysevent interfaces. This handler is 1564 * used to bind to the devfsadmd channel for event delivery. 1565 * The devfsadmd SLM insures single calls to this routine as well as 1566 * synchronized event delivery. 1567 * 1568 */ 1569 static void 1570 event_handler(sysevent_t *ev) 1571 { 1572 char *path; 1573 char *minor; 1574 char *subclass; 1575 char *dev_ev_subclass; 1576 char *driver_name; 1577 nvlist_t *attr_list = NULL; 1578 int err = 0; 1579 int instance; 1580 int branch_event = 0; 1581 1582 subclass = sysevent_get_subclass_name(ev); 1583 vprint(EVENT_MID, "event_handler: %s id:0X%llx\n", 1584 subclass, sysevent_get_seq(ev)); 1585 1586 if (strcmp(subclass, ESC_DEVFS_START) == 0) { 1587 return; 1588 } 1589 1590 /* Check if event is an instance modification */ 1591 if (strcmp(subclass, ESC_DEVFS_INSTANCE_MOD) == 0) { 1592 devfs_instance_mod(); 1593 return; 1594 } 1595 if (sysevent_get_attr_list(ev, &attr_list) != 0) { 1596 vprint(EVENT_MID, "event_handler: can not get attr list\n"); 1597 return; 1598 } 1599 1600 if (strcmp(subclass, ESC_DEVFS_DEVI_ADD) == 0 || 1601 strcmp(subclass, ESC_DEVFS_DEVI_REMOVE) == 0 || 1602 strcmp(subclass, ESC_DEVFS_MINOR_CREATE) == 0 || 1603 strcmp(subclass, ESC_DEVFS_MINOR_REMOVE) == 0) { 1604 if ((err = nvlist_lookup_string(attr_list, DEVFS_PATHNAME, 1605 &path)) != 0) 1606 goto out; 1607 1608 if (nvlist_lookup_string(attr_list, DEVFS_DEVI_CLASS, 1609 &dev_ev_subclass) != 0) 1610 dev_ev_subclass = NULL; 1611 1612 if (nvlist_lookup_string(attr_list, DEVFS_DRIVER_NAME, 1613 &driver_name) != 0) 1614 driver_name = NULL; 1615 1616 if (nvlist_lookup_int32(attr_list, DEVFS_INSTANCE, 1617 &instance) != 0) 1618 instance = -1; 1619 1620 if (nvlist_lookup_int32(attr_list, DEVFS_BRANCH_EVENT, 1621 &branch_event) != 0) 1622 branch_event = 0; 1623 1624 if (nvlist_lookup_string(attr_list, DEVFS_MINOR_NAME, 1625 &minor) != 0) 1626 minor = NULL; 1627 1628 lock_dev(); 1629 1630 if (strcmp(ESC_DEVFS_DEVI_ADD, subclass) == 0) { 1631 add_minor_pathname(path, NULL, dev_ev_subclass); 1632 if (branch_event) { 1633 build_and_enq_event(EC_DEV_BRANCH, 1634 ESC_DEV_BRANCH_ADD, path, DI_NODE_NIL, 1635 NULL); 1636 } 1637 1638 } else if (strcmp(ESC_DEVFS_MINOR_CREATE, subclass) == 0) { 1639 add_minor_pathname(path, minor, dev_ev_subclass); 1640 1641 } else if (strcmp(ESC_DEVFS_MINOR_REMOVE, subclass) == 0) { 1642 hot_cleanup(path, minor, dev_ev_subclass, driver_name, 1643 instance); 1644 1645 } else { /* ESC_DEVFS_DEVI_REMOVE */ 1646 hot_cleanup(path, NULL, dev_ev_subclass, 1647 driver_name, instance); 1648 if (branch_event) { 1649 build_and_enq_event(EC_DEV_BRANCH, 1650 ESC_DEV_BRANCH_REMOVE, path, DI_NODE_NIL, 1651 NULL); 1652 } 1653 } 1654 1655 unlock_dev(CACHE_STATE); 1656 1657 } else if (strcmp(subclass, ESC_DEVFS_BRANCH_ADD) == 0 || 1658 strcmp(subclass, ESC_DEVFS_BRANCH_REMOVE) == 0) { 1659 if ((err = nvlist_lookup_string(attr_list, 1660 DEVFS_PATHNAME, &path)) != 0) 1661 goto out; 1662 1663 /* just log ESC_DEV_BRANCH... event */ 1664 if (strcmp(subclass, ESC_DEVFS_BRANCH_ADD) == 0) 1665 dev_ev_subclass = ESC_DEV_BRANCH_ADD; 1666 else 1667 dev_ev_subclass = ESC_DEV_BRANCH_REMOVE; 1668 1669 lock_dev(); 1670 build_and_enq_event(EC_DEV_BRANCH, dev_ev_subclass, path, 1671 DI_NODE_NIL, NULL); 1672 unlock_dev(CACHE_STATE); 1673 } else 1674 err_print(UNKNOWN_EVENT, subclass); 1675 1676 out: 1677 if (err) 1678 err_print(EVENT_ATTR_LOOKUP_FAILED, strerror(err)); 1679 nvlist_free(attr_list); 1680 } 1681 1682 static void 1683 dca_impl_init(char *root, char *minor, struct dca_impl *dcip) 1684 { 1685 assert(root); 1686 1687 dcip->dci_root = root; 1688 dcip->dci_minor = minor; 1689 dcip->dci_driver = NULL; 1690 dcip->dci_error = 0; 1691 dcip->dci_flags = 0; 1692 dcip->dci_arg = NULL; 1693 } 1694 1695 /* 1696 * Kernel logs a message when a devinfo node is attached. Try to create 1697 * /dev and /devices for each minor node. minorname can be NULL. 1698 */ 1699 void 1700 add_minor_pathname(char *node, char *minor, char *ev_subclass) 1701 { 1702 struct dca_impl dci; 1703 1704 vprint(CHATTY_MID, "add_minor_pathname: node_path=%s minor=%s\n", 1705 node, minor ? minor : "NULL"); 1706 1707 dca_impl_init(node, minor, &dci); 1708 1709 /* 1710 * Restrict hotplug link creation if daemon 1711 * started with -i option. 1712 */ 1713 if (single_drv == TRUE) { 1714 dci.dci_driver = driver; 1715 } 1716 1717 /* 1718 * We are being invoked in response to a hotplug 1719 * event. Also, notify RCM if nodetype indicates 1720 * a network device has been hotplugged. 1721 */ 1722 dci.dci_flags = DCA_HOT_PLUG | DCA_CHECK_TYPE; 1723 1724 devi_tree_walk(&dci, DINFOPROP|DINFOMINOR, ev_subclass); 1725 } 1726 1727 static di_node_t 1728 find_clone_node() 1729 { 1730 static di_node_t clone_node = DI_NODE_NIL; 1731 1732 if (clone_node == DI_NODE_NIL) 1733 clone_node = di_init("/pseudo/clone@0", DINFOPROP); 1734 return (clone_node); 1735 } 1736 1737 static int 1738 is_descendent_of(di_node_t node, char *driver) 1739 { 1740 while (node != DI_NODE_NIL) { 1741 char *drv = di_driver_name(node); 1742 if (strcmp(drv, driver) == 0) 1743 return (1); 1744 node = di_parent_node(node); 1745 } 1746 return (0); 1747 } 1748 1749 /* 1750 * Checks the minor type. If it is an alias node, then lookup 1751 * the real node/minor first, then call minor_process() to 1752 * do the real work. 1753 */ 1754 static int 1755 check_minor_type(di_node_t node, di_minor_t minor, void *arg) 1756 { 1757 ddi_minor_type minor_type; 1758 di_node_t clone_node; 1759 char *mn; 1760 char *nt; 1761 struct mlist *dep; 1762 struct dca_impl *dcip = arg; 1763 1764 assert(dcip); 1765 1766 dep = dcip->dci_arg; 1767 1768 mn = di_minor_name(minor); 1769 1770 /* 1771 * We match driver here instead of in minor_process 1772 * as we want the actual driver name. This check is 1773 * unnecessary during deferred processing. 1774 */ 1775 if (dep && 1776 ((dcip->dci_driver && !is_descendent_of(node, dcip->dci_driver)) || 1777 (dcip->dci_minor && strcmp(mn, dcip->dci_minor)))) { 1778 return (DI_WALK_CONTINUE); 1779 } 1780 1781 if ((dcip->dci_flags & DCA_CHECK_TYPE) && 1782 (nt = di_minor_nodetype(minor)) && 1783 (strcmp(nt, DDI_NT_NET) == 0)) { 1784 dcip->dci_flags |= DCA_NOTIFY_RCM; 1785 dcip->dci_flags &= ~DCA_CHECK_TYPE; 1786 } 1787 1788 minor_type = di_minor_type(minor); 1789 1790 if (minor_type == DDM_MINOR) { 1791 minor_process(node, minor, dep); 1792 1793 } else if (minor_type == DDM_ALIAS) { 1794 struct mlist *cdep, clone_del = {0}; 1795 1796 clone_node = find_clone_node(); 1797 if (clone_node == DI_NODE_NIL) { 1798 err_print(DI_INIT_FAILED, "clone", strerror(errno)); 1799 return (DI_WALK_CONTINUE); 1800 } 1801 1802 cdep = dep ? &clone_del : NULL; 1803 1804 minor_process(clone_node, minor, cdep); 1805 1806 /* 1807 * cache "alias" minor node and free "clone" minor 1808 */ 1809 if (cdep != NULL && cdep->head != NULL) { 1810 assert(cdep->tail != NULL); 1811 cache_deferred_minor(dep, node, minor); 1812 dcip->dci_arg = cdep; 1813 process_deferred_links(dcip, DCA_FREE_LIST); 1814 dcip->dci_arg = dep; 1815 } 1816 } 1817 1818 return (DI_WALK_CONTINUE); 1819 } 1820 1821 1822 /* 1823 * This is the entry point for each minor node, whether walking 1824 * the entire tree via di_walk_minor() or processing a hotplug event 1825 * for a single devinfo node (via hotplug ndi_devi_online()). 1826 */ 1827 /*ARGSUSED*/ 1828 static void 1829 minor_process(di_node_t node, di_minor_t minor, struct mlist *dep) 1830 { 1831 create_list_t *create; 1832 int defer; 1833 1834 vprint(CHATTY_MID, "minor_process: node=%s, minor=%s\n", 1835 di_node_name(node), di_minor_name(minor)); 1836 1837 if (dep != NULL) { 1838 1839 /* 1840 * Reset /devices node to minor_perm perm/ownership 1841 * if we are here to deactivate device allocation 1842 */ 1843 if (build_devices == TRUE) { 1844 reset_node_permissions(node, minor); 1845 } 1846 1847 if (build_dev == FALSE) { 1848 return; 1849 } 1850 1851 /* 1852 * This function will create any nodes for /etc/devlink.tab. 1853 * If devlink.tab handles link creation, we don't call any 1854 * devfsadm modules since that could cause duplicate caching 1855 * in the enumerate functions if different re strings are 1856 * passed that are logically identical. I'm still not 1857 * convinced this would cause any harm, but better to be safe. 1858 * 1859 * Deferred processing is available only for devlinks 1860 * created through devfsadm modules. 1861 */ 1862 if (process_devlink_compat(minor, node) == TRUE) { 1863 return; 1864 } 1865 } else { 1866 vprint(CHATTY_MID, "minor_process: deferred processing\n"); 1867 } 1868 1869 /* 1870 * look for relevant link create rules in the modules, and 1871 * invoke the link create callback function to build a link 1872 * if there is a match. 1873 */ 1874 defer = 0; 1875 for (create = create_head; create != NULL; create = create->next) { 1876 if ((minor_matches_rule(node, minor, create) == TRUE) && 1877 class_ok(create->create->device_class) == 1878 DEVFSADM_SUCCESS) { 1879 if (call_minor_init(create->modptr) == 1880 DEVFSADM_FAILURE) { 1881 continue; 1882 } 1883 1884 /* 1885 * If NOT doing the deferred creates (i.e. 1st pass) and 1886 * rule requests deferred processing cache the minor 1887 * data. 1888 * 1889 * If deferred processing (2nd pass), create links 1890 * ONLY if rule requests deferred processing. 1891 */ 1892 if (dep && ((create->create->flags & CREATE_MASK) == 1893 CREATE_DEFER)) { 1894 defer = 1; 1895 continue; 1896 } else if (dep == NULL && 1897 ((create->create->flags & CREATE_MASK) != 1898 CREATE_DEFER)) { 1899 continue; 1900 } 1901 1902 if ((*(create->create->callback_fcn)) 1903 (minor, node) == DEVFSADM_TERMINATE) { 1904 break; 1905 } 1906 } 1907 } 1908 1909 if (defer) 1910 cache_deferred_minor(dep, node, minor); 1911 } 1912 1913 1914 /* 1915 * Cache node and minor in defer list. 1916 */ 1917 static void 1918 cache_deferred_minor( 1919 struct mlist *dep, 1920 di_node_t node, 1921 di_minor_t minor) 1922 { 1923 struct minor *mp; 1924 const char *fcn = "cache_deferred_minor"; 1925 1926 vprint(CHATTY_MID, "%s node=%s, minor=%s\n", fcn, 1927 di_node_name(node), di_minor_name(minor)); 1928 1929 if (dep == NULL) { 1930 vprint(CHATTY_MID, "%s: cannot cache during " 1931 "deferred processing. Ignoring minor\n", fcn); 1932 return; 1933 } 1934 1935 mp = (struct minor *)s_zalloc(sizeof (struct minor)); 1936 mp->node = node; 1937 mp->minor = minor; 1938 mp->next = NULL; 1939 1940 assert(dep->head == NULL || dep->tail != NULL); 1941 if (dep->head == NULL) { 1942 dep->head = mp; 1943 } else { 1944 dep->tail->next = mp; 1945 } 1946 dep->tail = mp; 1947 } 1948 1949 /* 1950 * Check to see if "create" link creation rule matches this node/minor. 1951 * If it does, return TRUE. 1952 */ 1953 static int 1954 minor_matches_rule(di_node_t node, di_minor_t minor, create_list_t *create) 1955 { 1956 char *m_nodetype, *m_drvname; 1957 1958 if (create->create->node_type != NULL) { 1959 1960 m_nodetype = di_minor_nodetype(minor); 1961 assert(m_nodetype != NULL); 1962 1963 switch (create->create->flags & TYPE_MASK) { 1964 case TYPE_EXACT: 1965 if (strcmp(create->create->node_type, m_nodetype) != 1966 0) { 1967 return (FALSE); 1968 } 1969 break; 1970 case TYPE_PARTIAL: 1971 if (strncmp(create->create->node_type, m_nodetype, 1972 strlen(create->create->node_type)) != 0) { 1973 return (FALSE); 1974 } 1975 break; 1976 case TYPE_RE: 1977 if (regexec(&(create->node_type_comp), m_nodetype, 1978 0, NULL, 0) != 0) { 1979 return (FALSE); 1980 } 1981 break; 1982 } 1983 } 1984 1985 if (create->create->drv_name != NULL) { 1986 m_drvname = di_driver_name(node); 1987 switch (create->create->flags & DRV_MASK) { 1988 case DRV_EXACT: 1989 if (strcmp(create->create->drv_name, m_drvname) != 0) { 1990 return (FALSE); 1991 } 1992 break; 1993 case DRV_RE: 1994 if (regexec(&(create->drv_name_comp), m_drvname, 1995 0, NULL, 0) != 0) { 1996 return (FALSE); 1997 } 1998 break; 1999 } 2000 } 2001 2002 return (TRUE); 2003 } 2004 2005 /* 2006 * If no classes were given on the command line, then return DEVFSADM_SUCCESS. 2007 * Otherwise, return DEVFSADM_SUCCESS if the device "class" from the module 2008 * matches one of the device classes given on the command line, 2009 * otherwise, return DEVFSADM_FAILURE. 2010 */ 2011 static int 2012 class_ok(char *class) 2013 { 2014 int i; 2015 2016 if (num_classes == 0) { 2017 return (DEVFSADM_SUCCESS); 2018 } 2019 2020 for (i = 0; i < num_classes; i++) { 2021 if (strcmp(class, classes[i]) == 0) { 2022 return (DEVFSADM_SUCCESS); 2023 } 2024 } 2025 return (DEVFSADM_FAILURE); 2026 } 2027 2028 /* 2029 * call minor_fini on active modules, then unload ALL modules 2030 */ 2031 static void 2032 unload_modules(void) 2033 { 2034 module_t *module_free; 2035 create_list_t *create_free; 2036 remove_list_t *remove_free; 2037 2038 while (create_head != NULL) { 2039 create_free = create_head; 2040 create_head = create_head->next; 2041 2042 if ((create_free->create->flags & TYPE_RE) == TYPE_RE) { 2043 regfree(&(create_free->node_type_comp)); 2044 } 2045 if ((create_free->create->flags & DRV_RE) == DRV_RE) { 2046 regfree(&(create_free->drv_name_comp)); 2047 } 2048 free(create_free); 2049 } 2050 2051 while (remove_head != NULL) { 2052 remove_free = remove_head; 2053 remove_head = remove_head->next; 2054 free(remove_free); 2055 } 2056 2057 while (module_head != NULL) { 2058 2059 if ((module_head->minor_fini != NULL) && 2060 ((module_head->flags & MODULE_ACTIVE) == MODULE_ACTIVE)) { 2061 (void) (*(module_head->minor_fini))(); 2062 } 2063 2064 vprint(MODLOAD_MID, "unloading module %s\n", module_head->name); 2065 free(module_head->name); 2066 (void) dlclose(module_head->dlhandle); 2067 2068 module_free = module_head; 2069 module_head = module_head->next; 2070 free(module_free); 2071 } 2072 } 2073 2074 /* 2075 * Load devfsadm logical link processing modules. 2076 */ 2077 static void 2078 load_modules(void) 2079 { 2080 DIR *mod_dir; 2081 struct dirent *entp; 2082 char cdir[PATH_MAX + 1]; 2083 char *last; 2084 char *mdir = module_dirs; 2085 char *fcn = "load_modules: "; 2086 2087 while (*mdir != '\0') { 2088 2089 while (*mdir == ':') { 2090 mdir++; 2091 } 2092 2093 if (*mdir == '\0') { 2094 continue; 2095 } 2096 2097 last = strchr(mdir, ':'); 2098 2099 if (last == NULL) { 2100 last = mdir + strlen(mdir); 2101 } 2102 2103 (void) strncpy(cdir, mdir, last - mdir); 2104 cdir[last - mdir] = '\0'; 2105 mdir += strlen(cdir); 2106 2107 if ((mod_dir = opendir(cdir)) == NULL) { 2108 vprint(MODLOAD_MID, "%sopendir(%s): %s\n", 2109 fcn, cdir, strerror(errno)); 2110 continue; 2111 } 2112 2113 while ((entp = readdir(mod_dir)) != NULL) { 2114 2115 if ((strcmp(entp->d_name, ".") == 0) || 2116 (strcmp(entp->d_name, "..") == 0)) { 2117 continue; 2118 } 2119 2120 load_module(entp->d_name, cdir); 2121 } 2122 s_closedir(mod_dir); 2123 } 2124 } 2125 2126 static void 2127 load_module(char *mname, char *cdir) 2128 { 2129 _devfsadm_create_reg_t *create_reg; 2130 _devfsadm_remove_reg_V1_t *remove_reg; 2131 create_list_t *create_list_element; 2132 create_list_t **create_list_next; 2133 remove_list_t *remove_list_element; 2134 remove_list_t **remove_list_next; 2135 char epath[PATH_MAX + 1], *end; 2136 char *fcn = "load_module: "; 2137 char *dlerrstr; 2138 void *dlhandle; 2139 module_t *module; 2140 int flags; 2141 int n; 2142 int i; 2143 2144 /* ignore any file which does not end in '.so' */ 2145 if ((end = strstr(mname, MODULE_SUFFIX)) != NULL) { 2146 if (end[strlen(MODULE_SUFFIX)] != '\0') { 2147 return; 2148 } 2149 } else { 2150 return; 2151 } 2152 2153 (void) snprintf(epath, sizeof (epath), "%s/%s", cdir, mname); 2154 2155 if ((dlhandle = dlopen(epath, RTLD_LAZY)) == NULL) { 2156 dlerrstr = dlerror(); 2157 err_print(DLOPEN_FAILED, epath, 2158 dlerrstr ? dlerrstr : "unknown error"); 2159 return; 2160 } 2161 2162 /* dlsym the _devfsadm_create_reg structure */ 2163 if (NULL == (create_reg = (_devfsadm_create_reg_t *) 2164 dlsym(dlhandle, _DEVFSADM_CREATE_REG))) { 2165 vprint(MODLOAD_MID, "dlsym(%s, %s): symbol not found\n", epath, 2166 _DEVFSADM_CREATE_REG); 2167 } else { 2168 vprint(MODLOAD_MID, "%sdlsym(%s, %s) succeeded\n", 2169 fcn, epath, _DEVFSADM_CREATE_REG); 2170 } 2171 2172 /* dlsym the _devfsadm_remove_reg structure */ 2173 if (NULL == (remove_reg = (_devfsadm_remove_reg_V1_t *) 2174 dlsym(dlhandle, _DEVFSADM_REMOVE_REG))) { 2175 vprint(MODLOAD_MID, "dlsym(%s,\n\t%s): symbol not found\n", 2176 epath, _DEVFSADM_REMOVE_REG); 2177 } else { 2178 vprint(MODLOAD_MID, "dlsym(%s, %s): succeeded\n", 2179 epath, _DEVFSADM_REMOVE_REG); 2180 } 2181 2182 vprint(MODLOAD_MID, "module %s loaded\n", epath); 2183 2184 module = (module_t *)s_malloc(sizeof (module_t)); 2185 module->name = s_strdup(epath); 2186 module->dlhandle = dlhandle; 2187 2188 /* dlsym other module functions, to be called later */ 2189 module->minor_fini = (int (*)())dlsym(dlhandle, MINOR_FINI); 2190 module->minor_init = (int (*)())dlsym(dlhandle, MINOR_INIT); 2191 module->flags = 0; 2192 2193 /* 2194 * put a ptr to each struct devfsadm_create on "create_head" 2195 * list sorted in interpose_lvl. 2196 */ 2197 if (create_reg != NULL) { 2198 for (i = 0; i < create_reg->count; i++) { 2199 int flags = create_reg->tblp[i].flags; 2200 2201 create_list_element = (create_list_t *) 2202 s_malloc(sizeof (create_list_t)); 2203 2204 create_list_element->create = &(create_reg->tblp[i]); 2205 create_list_element->modptr = module; 2206 2207 if (((flags & CREATE_MASK) != 0) && 2208 ((flags & CREATE_MASK) != CREATE_DEFER)) { 2209 free(create_list_element); 2210 err_print("illegal flag combination in " 2211 "module create\n"); 2212 err_print(IGNORING_ENTRY, i, epath); 2213 continue; 2214 } 2215 2216 if (((flags & TYPE_MASK) == 0) ^ 2217 (create_reg->tblp[i].node_type == NULL)) { 2218 free(create_list_element); 2219 err_print("flags value incompatible with " 2220 "node_type value in module create\n"); 2221 err_print(IGNORING_ENTRY, i, epath); 2222 continue; 2223 } 2224 2225 if (((flags & TYPE_MASK) != 0) && 2226 ((flags & TYPE_MASK) != TYPE_EXACT) && 2227 ((flags & TYPE_MASK) != TYPE_RE) && 2228 ((flags & TYPE_MASK) != TYPE_PARTIAL)) { 2229 free(create_list_element); 2230 err_print("illegal TYPE_* flag combination in " 2231 "module create\n"); 2232 err_print(IGNORING_ENTRY, i, epath); 2233 continue; 2234 } 2235 2236 /* precompile regular expression for efficiency */ 2237 if ((flags & TYPE_RE) == TYPE_RE) { 2238 if ((n = regcomp(&(create_list_element-> 2239 node_type_comp), 2240 create_reg->tblp[i].node_type, 2241 REG_EXTENDED)) != 0) { 2242 free(create_list_element); 2243 err_print(REGCOMP_FAILED, 2244 create_reg->tblp[i].node_type, 2245 n); 2246 err_print(IGNORING_ENTRY, i, epath); 2247 continue; 2248 } 2249 } 2250 2251 if (((flags & DRV_MASK) == 0) ^ 2252 (create_reg->tblp[i].drv_name == NULL)) { 2253 if ((flags & TYPE_RE) == TYPE_RE) { 2254 regfree(&(create_list_element-> 2255 node_type_comp)); 2256 } 2257 free(create_list_element); 2258 err_print("flags value incompatible with " 2259 "drv_name value in module create\n"); 2260 err_print(IGNORING_ENTRY, i, epath); 2261 continue; 2262 } 2263 2264 if (((flags & DRV_MASK) != 0) && 2265 ((flags & DRV_MASK) != DRV_EXACT) && 2266 ((flags & DRV_MASK) != DRV_RE)) { 2267 if ((flags & TYPE_RE) == TYPE_RE) { 2268 regfree(&(create_list_element-> 2269 node_type_comp)); 2270 } 2271 free(create_list_element); 2272 err_print("illegal DRV_* flag combination in " 2273 "module create\n"); 2274 err_print(IGNORING_ENTRY, i, epath); 2275 continue; 2276 } 2277 2278 /* precompile regular expression for efficiency */ 2279 if ((create_reg->tblp[i].flags & DRV_RE) == DRV_RE) { 2280 if ((n = regcomp(&(create_list_element-> 2281 drv_name_comp), 2282 create_reg->tblp[i].drv_name, 2283 REG_EXTENDED)) != 0) { 2284 if ((flags & TYPE_RE) == TYPE_RE) { 2285 regfree(&(create_list_element-> 2286 node_type_comp)); 2287 } 2288 free(create_list_element); 2289 err_print(REGCOMP_FAILED, 2290 create_reg->tblp[i].drv_name, 2291 n); 2292 err_print(IGNORING_ENTRY, i, epath); 2293 continue; 2294 } 2295 } 2296 2297 2298 /* add to list sorted by interpose level */ 2299 for (create_list_next = &(create_head); 2300 (*create_list_next != NULL) && 2301 (*create_list_next)->create->interpose_lvl >= 2302 create_list_element->create->interpose_lvl; 2303 create_list_next = 2304 &((*create_list_next)->next)); 2305 create_list_element->next = *create_list_next; 2306 *create_list_next = create_list_element; 2307 } 2308 } 2309 2310 /* 2311 * put a ptr to each struct devfsadm_remove on "remove_head" 2312 * list sorted by interpose_lvl. 2313 */ 2314 flags = 0; 2315 if (remove_reg != NULL) { 2316 if (remove_reg->version < DEVFSADM_V1) 2317 flags |= RM_NOINTERPOSE; 2318 for (i = 0; i < remove_reg->count; i++) { 2319 2320 remove_list_element = (remove_list_t *) 2321 s_malloc(sizeof (remove_list_t)); 2322 2323 remove_list_element->remove = &(remove_reg->tblp[i]); 2324 remove_list_element->remove->flags |= flags; 2325 remove_list_element->modptr = module; 2326 2327 for (remove_list_next = &(remove_head); 2328 (*remove_list_next != NULL) && 2329 (*remove_list_next)->remove->interpose_lvl >= 2330 remove_list_element->remove->interpose_lvl; 2331 remove_list_next = 2332 &((*remove_list_next)->next)); 2333 remove_list_element->next = *remove_list_next; 2334 *remove_list_next = remove_list_element; 2335 } 2336 } 2337 2338 module->next = module_head; 2339 module_head = module; 2340 } 2341 2342 /* 2343 * After we have completed a CACHE_STATE, if a SYNC_STATE does not occur 2344 * within 'timeout' secs the minor_fini_thread needs to do a SYNC_STATE 2345 * so that we still call the minor_fini routines. 2346 */ 2347 /*ARGSUSED*/ 2348 static void 2349 minor_fini_thread(void *arg) 2350 { 2351 timestruc_t abstime; 2352 2353 vprint(INITFINI_MID, "minor_fini_thread starting\n"); 2354 2355 (void) mutex_lock(&minor_fini_mutex); 2356 for (;;) { 2357 /* wait the gather period, or until signaled */ 2358 abstime.tv_sec = time(NULL) + minor_fini_timeout; 2359 abstime.tv_nsec = 0; 2360 (void) cond_timedwait(&minor_fini_cv, 2361 &minor_fini_mutex, &abstime); 2362 2363 /* if minor_fini was canceled, go wait again */ 2364 if (minor_fini_canceled == TRUE) 2365 continue; 2366 2367 /* if minor_fini was delayed, go wait again */ 2368 if (minor_fini_delayed == TRUE) { 2369 minor_fini_delayed = FALSE; 2370 continue; 2371 } 2372 2373 /* done with cancellations and delays, do the SYNC_STATE */ 2374 (void) mutex_unlock(&minor_fini_mutex); 2375 2376 lock_dev(); 2377 unlock_dev(SYNC_STATE); 2378 vprint(INITFINI_MID, "minor_fini sync done\n"); 2379 2380 (void) mutex_lock(&minor_fini_mutex); 2381 } 2382 } 2383 2384 2385 /* 2386 * Attempt to initialize module, if a minor_init routine exists. Set 2387 * the active flag if the routine exists and succeeds. If it doesn't 2388 * exist, just set the active flag. 2389 */ 2390 static int 2391 call_minor_init(module_t *module) 2392 { 2393 char *fcn = "call_minor_init: "; 2394 2395 if ((module->flags & MODULE_ACTIVE) == MODULE_ACTIVE) { 2396 return (DEVFSADM_SUCCESS); 2397 } 2398 2399 vprint(INITFINI_MID, "%smodule %s. current state: inactive\n", 2400 fcn, module->name); 2401 2402 if (module->minor_init == NULL) { 2403 module->flags |= MODULE_ACTIVE; 2404 vprint(INITFINI_MID, "minor_init not defined\n"); 2405 return (DEVFSADM_SUCCESS); 2406 } 2407 2408 if ((*(module->minor_init))() == DEVFSADM_FAILURE) { 2409 err_print(FAILED_FOR_MODULE, MINOR_INIT, module->name); 2410 return (DEVFSADM_FAILURE); 2411 } 2412 2413 vprint(INITFINI_MID, "minor_init() returns DEVFSADM_SUCCESS. " 2414 "new state: active\n"); 2415 2416 module->flags |= MODULE_ACTIVE; 2417 return (DEVFSADM_SUCCESS); 2418 } 2419 2420 /* 2421 * Creates a symlink 'link' to the physical path of node:minor. 2422 * Construct link contents, then call create_link_common(). 2423 */ 2424 /*ARGSUSED*/ 2425 int 2426 devfsadm_mklink(char *link, di_node_t node, di_minor_t minor, int flags) 2427 { 2428 char rcontents[PATH_MAX]; 2429 char devlink[PATH_MAX]; 2430 char phy_path[PATH_MAX]; 2431 char *acontents; 2432 char *dev_path; 2433 int numslashes; 2434 int rv; 2435 int i, link_exists; 2436 int last_was_slash = FALSE; 2437 2438 /* 2439 * try to use devices path 2440 */ 2441 if ((node == lnode) && (minor == lminor)) { 2442 acontents = lphy_path; 2443 } else if (di_minor_type(minor) == DDM_ALIAS) { 2444 /* use /pseudo/clone@0:<driver> as the phys path */ 2445 (void) snprintf(phy_path, sizeof (phy_path), 2446 "/pseudo/clone@0:%s", 2447 di_driver_name(di_minor_devinfo(minor))); 2448 acontents = phy_path; 2449 } else { 2450 if ((dev_path = di_devfs_path(node)) == NULL) { 2451 err_print(DI_DEVFS_PATH_FAILED, strerror(errno)); 2452 devfsadm_exit(1); 2453 } 2454 (void) snprintf(phy_path, sizeof (phy_path), "%s:%s", 2455 dev_path, di_minor_name(minor)); 2456 di_devfs_path_free(dev_path); 2457 acontents = phy_path; 2458 } 2459 2460 /* prepend link with dev_dir contents */ 2461 (void) strlcpy(devlink, dev_dir, sizeof (devlink)); 2462 (void) strlcat(devlink, "/", sizeof (devlink)); 2463 (void) strlcat(devlink, link, sizeof (devlink)); 2464 2465 /* 2466 * Calculate # of ../ to add. Account for double '//' in path. 2467 * Ignore all leading slashes. 2468 */ 2469 for (i = 0; link[i] == '/'; i++) 2470 ; 2471 for (numslashes = 0; link[i] != '\0'; i++) { 2472 if (link[i] == '/') { 2473 if (last_was_slash == FALSE) { 2474 numslashes++; 2475 last_was_slash = TRUE; 2476 } 2477 } else { 2478 last_was_slash = FALSE; 2479 } 2480 } 2481 /* Don't count any trailing '/' */ 2482 if (link[i-1] == '/') { 2483 numslashes--; 2484 } 2485 2486 rcontents[0] = '\0'; 2487 do { 2488 (void) strlcat(rcontents, "../", sizeof (rcontents)); 2489 } while (numslashes-- != 0); 2490 2491 (void) strlcat(rcontents, "devices", sizeof (rcontents)); 2492 (void) strlcat(rcontents, acontents, sizeof (rcontents)); 2493 2494 if (devlinks_debug == TRUE) { 2495 vprint(INFO_MID, "adding link %s ==> %s\n", devlink, rcontents); 2496 } 2497 2498 if ((rv = create_link_common(devlink, rcontents, &link_exists)) 2499 == DEVFSADM_SUCCESS) { 2500 linknew = TRUE; 2501 add_link_to_cache(link, acontents); 2502 } else { 2503 linknew = FALSE; 2504 } 2505 2506 if (link_exists == TRUE) { 2507 /* Link exists or was just created */ 2508 (void) di_devlink_add_link(devlink_cache, link, rcontents, 2509 DI_PRIMARY_LINK); 2510 2511 if (system_labeled && (flags & DA_ADD)) { 2512 /* 2513 * Add this to the list of allocatable devices. If this 2514 * is a hotplugged, removable disk, add it as rmdisk. 2515 */ 2516 int instance = di_instance(node); 2517 2518 if ((flags & DA_CD) && 2519 (_da_check_for_usb(devlink, root_dir) == 1)) { 2520 (void) da_add_list(&devlist, devlink, instance, 2521 DA_ADD|DA_RMDISK); 2522 update_devdb = DA_RMDISK; 2523 } else if (linknew == TRUE) { 2524 (void) da_add_list(&devlist, devlink, instance, 2525 flags); 2526 update_devdb = flags; 2527 } 2528 } 2529 } 2530 2531 return (rv); 2532 } 2533 2534 /* 2535 * Creates a symlink link to primary_link. Calculates relative 2536 * directory offsets, then calls link_common(). 2537 */ 2538 /*ARGSUSED*/ 2539 int 2540 devfsadm_secondary_link(char *link, char *primary_link, int flags) 2541 { 2542 char contents[PATH_MAX + 1]; 2543 char devlink[PATH_MAX + 1]; 2544 int rv, link_exists; 2545 char *fpath; 2546 char *tpath; 2547 char *op; 2548 2549 /* prepend link with dev_dir contents */ 2550 (void) strcpy(devlink, dev_dir); 2551 (void) strcat(devlink, "/"); 2552 (void) strcat(devlink, link); 2553 /* 2554 * building extra link, so use first link as link contents, but first 2555 * make it relative. 2556 */ 2557 fpath = link; 2558 tpath = primary_link; 2559 op = contents; 2560 2561 while (*fpath == *tpath && *fpath != '\0') { 2562 fpath++, tpath++; 2563 } 2564 2565 /* Count directories to go up, if any, and add "../" */ 2566 while (*fpath != '\0') { 2567 if (*fpath == '/') { 2568 (void) strcpy(op, "../"); 2569 op += 3; 2570 } 2571 fpath++; 2572 } 2573 2574 /* 2575 * Back up to the start of the current path component, in 2576 * case in the middle 2577 */ 2578 while (tpath != primary_link && *(tpath-1) != '/') { 2579 tpath--; 2580 } 2581 (void) strcpy(op, tpath); 2582 2583 if (devlinks_debug == TRUE) { 2584 vprint(INFO_MID, "adding extra link %s ==> %s\n", 2585 devlink, contents); 2586 } 2587 2588 if ((rv = create_link_common(devlink, contents, &link_exists)) 2589 == DEVFSADM_SUCCESS) { 2590 /* 2591 * we need to save the ultimate /devices contents, and not the 2592 * secondary link, since hotcleanup only looks at /devices path. 2593 * Since we don't have devices path here, we can try to get it 2594 * by readlink'ing the secondary link. This assumes the primary 2595 * link was created first. 2596 */ 2597 add_link_to_cache(link, lphy_path); 2598 linknew = TRUE; 2599 if (system_labeled && 2600 ((flags & DA_AUDIO) && (flags & DA_ADD))) { 2601 /* 2602 * Add this device to the list of allocatable devices. 2603 */ 2604 int instance = 0; 2605 2606 op = strrchr(contents, '/'); 2607 op++; 2608 (void) sscanf(op, "%d", &instance); 2609 (void) da_add_list(&devlist, devlink, instance, flags); 2610 update_devdb = flags; 2611 } 2612 } else { 2613 linknew = FALSE; 2614 } 2615 2616 /* 2617 * If link exists or was just created, add it to the database 2618 */ 2619 if (link_exists == TRUE) { 2620 (void) di_devlink_add_link(devlink_cache, link, contents, 2621 DI_SECONDARY_LINK); 2622 } 2623 2624 return (rv); 2625 } 2626 2627 /* returns pointer to the devices directory */ 2628 char * 2629 devfsadm_get_devices_dir() 2630 { 2631 return (devices_dir); 2632 } 2633 2634 /* 2635 * Does the actual link creation. VERBOSE_MID only used if there is 2636 * a change. CHATTY_MID used otherwise. 2637 */ 2638 static int 2639 create_link_common(char *devlink, char *contents, int *exists) 2640 { 2641 int try; 2642 int linksize; 2643 int max_tries = 0; 2644 static int prev_link_existed = TRUE; 2645 char checkcontents[PATH_MAX + 1]; 2646 char *hide; 2647 2648 *exists = FALSE; 2649 2650 /* Database is not updated when file_mods == FALSE */ 2651 if (file_mods == FALSE) { 2652 linksize = readlink(devlink, checkcontents, PATH_MAX); 2653 if (linksize > 0) { 2654 checkcontents[linksize] = '\0'; 2655 if (strcmp(checkcontents, contents) != 0) { 2656 vprint(CHATTY_MID, REMOVING_LINK, 2657 devlink, checkcontents); 2658 return (DEVFSADM_SUCCESS); 2659 } else { 2660 vprint(CHATTY_MID, "link exists and is correct:" 2661 " %s -> %s\n", devlink, contents); 2662 /* failure only in that the link existed */ 2663 return (DEVFSADM_FAILURE); 2664 } 2665 } else { 2666 vprint(VERBOSE_MID, CREATING_LINK, devlink, contents); 2667 return (DEVFSADM_SUCCESS); 2668 } 2669 } 2670 2671 /* 2672 * systems calls are expensive, so predict whether to readlink 2673 * or symlink first, based on previous attempt 2674 */ 2675 if (prev_link_existed == FALSE) { 2676 try = CREATE_LINK; 2677 } else { 2678 try = READ_LINK; 2679 } 2680 2681 while (++max_tries <= 3) { 2682 2683 switch (try) { 2684 case CREATE_LINK: 2685 2686 if (symlink(contents, devlink) == 0) { 2687 vprint(VERBOSE_MID, CREATING_LINK, devlink, 2688 contents); 2689 prev_link_existed = FALSE; 2690 /* link successfully created */ 2691 *exists = TRUE; 2692 set_logindev_perms(devlink); 2693 return (DEVFSADM_SUCCESS); 2694 } else { 2695 switch (errno) { 2696 2697 case ENOENT: 2698 /* dirpath to node doesn't exist */ 2699 hide = strrchr(devlink, '/'); 2700 *hide = '\0'; 2701 s_mkdirp(devlink, S_IRWXU|S_IRGRP| 2702 S_IXGRP|S_IROTH|S_IXOTH); 2703 *hide = '/'; 2704 break; 2705 case EEXIST: 2706 try = READ_LINK; 2707 break; 2708 default: 2709 err_print(SYMLINK_FAILED, devlink, 2710 contents, strerror(errno)); 2711 return (DEVFSADM_FAILURE); 2712 } 2713 } 2714 break; 2715 2716 case READ_LINK: 2717 2718 linksize = readlink(devlink, checkcontents, PATH_MAX); 2719 if (linksize >= 0) { 2720 checkcontents[linksize] = '\0'; 2721 if (strcmp(checkcontents, contents) != 0) { 2722 s_unlink(devlink); 2723 vprint(VERBOSE_MID, REMOVING_LINK, 2724 devlink, checkcontents); 2725 try = CREATE_LINK; 2726 } else { 2727 prev_link_existed = TRUE; 2728 vprint(CHATTY_MID, 2729 "link exists and is correct:" 2730 " %s -> %s\n", devlink, 2731 contents); 2732 *exists = TRUE; 2733 /* failure in that the link existed */ 2734 return (DEVFSADM_FAILURE); 2735 } 2736 } else { 2737 switch (errno) { 2738 case EINVAL: 2739 /* not a symlink, remove and create */ 2740 s_unlink(devlink); 2741 default: 2742 /* maybe it didn't exist at all */ 2743 try = CREATE_LINK; 2744 break; 2745 } 2746 } 2747 break; 2748 } 2749 } 2750 err_print(MAX_ATTEMPTS, devlink, contents); 2751 return (DEVFSADM_FAILURE); 2752 } 2753 2754 static void 2755 set_logindev_perms(char *devlink) 2756 { 2757 struct login_dev *newdev; 2758 struct passwd pwd, *resp; 2759 char pwd_buf[PATH_MAX]; 2760 int rv; 2761 struct stat sb; 2762 char *devfs_path = NULL; 2763 2764 /* 2765 * We only want logindev perms to be set when a device is 2766 * hotplugged or an application requests synchronous creates. 2767 * So we enable this only in daemon mode. In addition, 2768 * login(1) only fixes the std. /dev dir. So we don't 2769 * change perms if alternate root is set. 2770 * login_dev_enable is TRUE only in these cases. 2771 */ 2772 if (login_dev_enable != TRUE) 2773 return; 2774 2775 /* 2776 * Normally, /etc/logindevperm has few (8 - 10 entries) which 2777 * may be regular expressions (globs were converted to RE). 2778 * So just do a linear search through the list. 2779 */ 2780 for (newdev = login_dev_cache; newdev; newdev = newdev->ldev_next) { 2781 vprint(FILES_MID, "matching %s with %s\n", devlink, 2782 newdev->ldev_device); 2783 2784 if (regexec(&newdev->ldev_device_regex, devlink, 0, 2785 NULL, 0) == 0) { 2786 vprint(FILES_MID, "matched %s with %s\n", devlink, 2787 newdev->ldev_device); 2788 break; 2789 } 2790 } 2791 2792 if (newdev == NULL) 2793 return; 2794 2795 /* 2796 * we have a match, now find the driver associated with this 2797 * minor node using a snapshot on the physical path 2798 */ 2799 (void) resolve_link(devlink, NULL, NULL, &devfs_path, 0); 2800 if (devfs_path) { 2801 di_node_t node; 2802 char *drv = NULL; 2803 struct driver_list *list; 2804 char *p; 2805 2806 /* truncate on : so we can take a snapshot */ 2807 (void) strcpy(pwd_buf, devfs_path); 2808 p = strrchr(pwd_buf, ':'); 2809 if (p == NULL) { 2810 free(devfs_path); 2811 return; 2812 } 2813 *p = '\0'; 2814 2815 vprint(FILES_MID, "link=%s->physpath=%s\n", 2816 devlink, pwd_buf); 2817 2818 node = di_init(pwd_buf, DINFOMINOR); 2819 2820 if (node) { 2821 drv = di_driver_name(node); 2822 2823 if (drv) { 2824 vprint(FILES_MID, "%s: driver is %s\n", 2825 devlink, drv); 2826 } 2827 di_fini(node); 2828 } 2829 /* search thru the driver list specified in logindevperm */ 2830 list = newdev->ldev_driver_list; 2831 if ((drv != NULL) && (list != NULL)) { 2832 while (list) { 2833 if (strcmp(list->driver_name, 2834 drv) == 0) { 2835 vprint(FILES_MID, 2836 "driver %s match!\n", drv); 2837 break; 2838 } 2839 list = list->next; 2840 } 2841 if (list == NULL) { 2842 vprint(FILES_MID, "no driver match!\n"); 2843 free(devfs_path); 2844 return; 2845 } 2846 } 2847 free(devfs_path); 2848 } else { 2849 return; 2850 } 2851 2852 vprint(FILES_MID, "changing permissions of %s\n", devlink); 2853 2854 /* 2855 * We have a match. We now attempt to determine the 2856 * owner and group of the console user. 2857 * 2858 * stat() the console device newdev->ldev_console 2859 * which will always exist - it will have the right owner but 2860 * not the right group. Use getpwuid_r() to determine group for this 2861 * uid. 2862 * Note, it is safe to use name service here since if name services 2863 * are not available (during boot or in single-user mode), then 2864 * console owner will be root and its gid can be found in 2865 * local files. 2866 */ 2867 if (stat(newdev->ldev_console, &sb) == -1) { 2868 vprint(VERBOSE_MID, STAT_FAILED, newdev->ldev_console, 2869 strerror(errno)); 2870 return; 2871 } 2872 2873 resp = NULL; 2874 rv = getpwuid_r(sb.st_uid, &pwd, pwd_buf, sizeof (pwd_buf), &resp); 2875 if (rv || resp == NULL) { 2876 rv = rv ? rv : EINVAL; 2877 vprint(VERBOSE_MID, GID_FAILED, sb.st_uid, 2878 strerror(rv)); 2879 return; 2880 } 2881 2882 assert(&pwd == resp); 2883 2884 sb.st_gid = resp->pw_gid; 2885 2886 if (chmod(devlink, newdev->ldev_perms) == -1) { 2887 vprint(VERBOSE_MID, CHMOD_FAILED, devlink, 2888 strerror(errno)); 2889 return; 2890 } 2891 2892 if (chown(devlink, sb.st_uid, sb.st_gid) == -1) { 2893 vprint(VERBOSE_MID, CHOWN_FAILED, devlink, 2894 strerror(errno)); 2895 } 2896 } 2897 2898 /* 2899 * Reset /devices node with appropriate permissions and 2900 * ownership as specified in /etc/minor_perm. 2901 */ 2902 static void 2903 reset_node_permissions(di_node_t node, di_minor_t minor) 2904 { 2905 int spectype; 2906 char phy_path[PATH_MAX + 1]; 2907 mode_t mode; 2908 dev_t dev; 2909 uid_t uid; 2910 gid_t gid; 2911 struct stat sb; 2912 char *dev_path, *aminor = NULL; 2913 2914 /* lphy_path starts with / */ 2915 if ((dev_path = di_devfs_path(node)) == NULL) { 2916 err_print(DI_DEVFS_PATH_FAILED, strerror(errno)); 2917 devfsadm_exit(1); 2918 } 2919 (void) strcpy(lphy_path, dev_path); 2920 di_devfs_path_free(dev_path); 2921 2922 (void) strcat(lphy_path, ":"); 2923 if (di_minor_type(minor) == DDM_ALIAS) { 2924 char *driver; 2925 aminor = di_minor_name(minor); 2926 driver = di_driver_name(di_minor_devinfo(minor)); 2927 (void) strcat(lphy_path, driver); 2928 } else 2929 (void) strcat(lphy_path, di_minor_name(minor)); 2930 2931 (void) strcpy(phy_path, devices_dir); 2932 (void) strcat(phy_path, lphy_path); 2933 2934 lnode = node; 2935 lminor = minor; 2936 2937 vprint(CHATTY_MID, "reset_node_permissions: phy_path=%s lphy_path=%s\n", 2938 phy_path, lphy_path); 2939 2940 dev = di_minor_devt(minor); 2941 spectype = di_minor_spectype(minor); /* block or char */ 2942 2943 getattr(phy_path, aminor, spectype, dev, &mode, &uid, &gid); 2944 2945 /* 2946 * compare and set permissions and ownership 2947 * 2948 * Under devfs, a quick insertion and removal of USB devices 2949 * would cause stat of physical path to fail. In this case, 2950 * we emit a verbose message, but don't print errors. 2951 */ 2952 if ((stat(phy_path, &sb) == -1) || (sb.st_rdev != dev)) { 2953 vprint(VERBOSE_MID, NO_DEVFS_NODE, phy_path); 2954 return; 2955 } 2956 2957 /* 2958 * If we are here for a new device 2959 * If device allocation is on 2960 * then 2961 * set ownership to root:other and permissions to 0000 2962 * else 2963 * set ownership and permissions as specified in minor_perm 2964 * If we are here for an existing device 2965 * If device allocation is to be turned on 2966 * then 2967 * reset ownership to root:other and permissions to 0000 2968 * else if device allocation is to be turned off 2969 * reset ownership and permissions to those specified in 2970 * minor_perm 2971 * else 2972 * preserve existing/user-modified ownership and 2973 * permissions 2974 * 2975 * devfs indicates a new device by faking access time to be zero. 2976 */ 2977 if (sb.st_atime != 0) { 2978 int i; 2979 char *nt; 2980 2981 if ((devalloc_flag == 0) && (devalloc_is_on != 1)) 2982 /* 2983 * Leave existing devices as they are if we are not 2984 * turning device allocation on/off. 2985 */ 2986 return; 2987 2988 nt = di_minor_nodetype(minor); 2989 2990 if (nt == NULL) 2991 return; 2992 2993 for (i = 0; devalloc_list[i]; i++) { 2994 if (strcmp(nt, devalloc_list[i]) == 0) 2995 /* 2996 * One of the types recognized by devalloc, 2997 * reset attrs. 2998 */ 2999 break; 3000 } 3001 if (devalloc_list[i] == NULL) 3002 return; 3003 } 3004 3005 if (file_mods == FALSE) { 3006 /* Nothing more to do if simulating */ 3007 vprint(VERBOSE_MID, PERM_MSG, phy_path, uid, gid, mode); 3008 return; 3009 } 3010 3011 if ((devalloc_flag == DA_ON) || (devalloc_is_on == 1)) { 3012 /* 3013 * we are here either to turn device allocation on 3014 * or to add a new device while device allocation in on 3015 */ 3016 mode = DEALLOC_MODE; 3017 uid = DA_UID; 3018 gid = DA_GID; 3019 } 3020 3021 if ((devalloc_is_on == 1) || (devalloc_flag == DA_ON) || 3022 (sb.st_mode != mode)) { 3023 if (chmod(phy_path, mode) == -1) 3024 vprint(VERBOSE_MID, CHMOD_FAILED, 3025 phy_path, strerror(errno)); 3026 } 3027 if ((devalloc_is_on == 1) || (devalloc_flag == DA_ON) || 3028 (sb.st_uid != uid || sb.st_gid != gid)) { 3029 if (chown(phy_path, uid, gid) == -1) 3030 vprint(VERBOSE_MID, CHOWN_FAILED, 3031 phy_path, strerror(errno)); 3032 } 3033 3034 /* Report that we actually did something */ 3035 vprint(VERBOSE_MID, PERM_MSG, phy_path, uid, gid, mode); 3036 } 3037 3038 /* 3039 * Removes logical link and the minor node it refers to. If file is a 3040 * link, we recurse and try to remove the minor node (or link if path is 3041 * a double link) that file's link contents refer to. 3042 */ 3043 static void 3044 devfsadm_rm_work(char *file, int recurse, int file_type) 3045 { 3046 char *fcn = "devfsadm_rm_work: "; 3047 int linksize; 3048 char contents[PATH_MAX + 1]; 3049 char nextfile[PATH_MAX + 1]; 3050 char newfile[PATH_MAX + 1]; 3051 char *ptr; 3052 3053 vprint(REMOVE_MID, "%s%s\n", fcn, file); 3054 3055 /* TYPE_LINK split into multiple if's due to excessive indentations */ 3056 if (file_type == TYPE_LINK) { 3057 (void) strcpy(newfile, dev_dir); 3058 (void) strcat(newfile, "/"); 3059 (void) strcat(newfile, file); 3060 } 3061 3062 if ((file_type == TYPE_LINK) && (recurse == TRUE) && 3063 ((linksize = readlink(newfile, contents, PATH_MAX)) > 0)) { 3064 contents[linksize] = '\0'; 3065 3066 if (is_minor_node(contents, &ptr) == DEVFSADM_TRUE) { 3067 devfsadm_rm_work(++ptr, FALSE, TYPE_DEVICES); 3068 } else { 3069 if (strncmp(contents, DEV "/", strlen(DEV) + 1) == 0) { 3070 devfsadm_rm_work(&contents[strlen(DEV) + 1], 3071 TRUE, TYPE_LINK); 3072 } else { 3073 if ((ptr = strrchr(file, '/')) != NULL) { 3074 *ptr = '\0'; 3075 (void) strcpy(nextfile, file); 3076 *ptr = '/'; 3077 (void) strcat(nextfile, "/"); 3078 } else { 3079 (void) strcpy(nextfile, ""); 3080 } 3081 (void) strcat(nextfile, contents); 3082 devfsadm_rm_work(nextfile, TRUE, TYPE_LINK); 3083 } 3084 } 3085 } 3086 3087 if (file_type == TYPE_LINK) { 3088 vprint(VERBOSE_MID, DEVFSADM_UNLINK, newfile); 3089 if (file_mods == TRUE) { 3090 rm_link_from_cache(file); 3091 s_unlink(newfile); 3092 rm_parent_dir_if_empty(newfile); 3093 invalidate_enumerate_cache(); 3094 (void) di_devlink_rm_link(devlink_cache, file); 3095 } 3096 } 3097 3098 /* 3099 * Note: we don't remove /devices entries because they are 3100 * covered by devfs. 3101 */ 3102 } 3103 3104 void 3105 devfsadm_rm_link(char *file) 3106 { 3107 devfsadm_rm_work(file, FALSE, TYPE_LINK); 3108 } 3109 3110 void 3111 devfsadm_rm_all(char *file) 3112 { 3113 devfsadm_rm_work(file, TRUE, TYPE_LINK); 3114 } 3115 3116 static int 3117 s_rmdir(char *path) 3118 { 3119 int i; 3120 char *rpath, *dir; 3121 const char *fcn = "s_rmdir"; 3122 3123 /* 3124 * Certain directories are created at install time by packages. 3125 * Some of them (listed in packaged_dirs[]) are required by apps 3126 * and need to be present even when empty. 3127 */ 3128 vprint(REMOVE_MID, "%s: checking if %s is packaged\n", fcn, path); 3129 3130 rpath = path + strlen(dev_dir) + 1; 3131 3132 for (i = 0; (dir = packaged_dirs[i]) != NULL; i++) { 3133 if (*rpath == *dir) { 3134 if (strcmp(rpath, dir) == 0) { 3135 vprint(REMOVE_MID, "%s: skipping packaged dir: " 3136 "%s\n", fcn, path); 3137 errno = EEXIST; 3138 return (-1); 3139 } 3140 } 3141 } 3142 3143 return (rmdir(path)); 3144 } 3145 3146 /* 3147 * Try to remove any empty directories up the tree. It is assumed that 3148 * pathname is a file that was removed, so start with its parent, and 3149 * work up the tree. 3150 */ 3151 static void 3152 rm_parent_dir_if_empty(char *pathname) 3153 { 3154 char *ptr, path[PATH_MAX + 1]; 3155 char *fcn = "rm_parent_dir_if_empty: "; 3156 finddevhdl_t fhandle; 3157 const char *f; 3158 int rv; 3159 3160 vprint(REMOVE_MID, "%schecking %s if empty\n", fcn, pathname); 3161 3162 (void) strcpy(path, pathname); 3163 3164 /* 3165 * ascend up the dir tree, deleting all empty dirs. 3166 * Return immediately if a dir is not empty. 3167 */ 3168 for (;;) { 3169 3170 if ((ptr = strrchr(path, '/')) == NULL) { 3171 return; 3172 } 3173 3174 *ptr = '\0'; 3175 3176 if ((rv = finddev_readdir(path, &fhandle)) != 0) { 3177 err_print(OPENDIR_FAILED, path, strerror(rv)); 3178 return; 3179 } 3180 3181 /* 3182 * An empty pathlist implies an empty directory 3183 */ 3184 f = finddev_next(fhandle); 3185 finddev_close(fhandle); 3186 if (f == NULL) { 3187 if (s_rmdir(path) == 0) { 3188 vprint(REMOVE_MID, 3189 "%sremoving empty dir %s\n", fcn, path); 3190 } else if (errno == EEXIST) { 3191 vprint(REMOVE_MID, 3192 "%sfailed to remove dir: %s\n", fcn, path); 3193 return; 3194 } 3195 } else { 3196 /* some other file is here, so return */ 3197 vprint(REMOVE_MID, "%sdir not empty: %s\n", fcn, path); 3198 return; 3199 } 3200 } 3201 } 3202 3203 /* 3204 * This function and all the functions it calls below were added to 3205 * handle the unique problem with world wide names (WWN). The problem is 3206 * that if a WWN device is moved to another address on the same controller 3207 * its logical link will change, while the physical node remains the same. 3208 * The result is that two logical links will point to the same physical path 3209 * in /devices, the valid link and a stale link. This function will 3210 * find all the stale nodes, though at a significant performance cost. 3211 * 3212 * Caching is used to increase performance. 3213 * A cache will be built from disk if the cache tag doesn't already exist. 3214 * The cache tag is a regular expression "dir_re", which selects a 3215 * subset of disks to search from typically something like 3216 * "dev/cXt[0-9]+d[0-9]+s[0-9]+". After the cache is built, consistency must 3217 * be maintained, so entries are added as new links are created, and removed 3218 * as old links are deleted. The whole cache is flushed if we are a daemon, 3219 * and another devfsadm process ran in between. 3220 * 3221 * Once the cache is built, this function finds the cache which matches 3222 * dir_re, and then it searches all links in that cache looking for 3223 * any link whose contents match "valid_link_contents" with a corresponding link 3224 * which does not match "valid_link". Any such matches are stale and removed. 3225 */ 3226 void 3227 devfsadm_rm_stale_links(char *dir_re, char *valid_link, di_node_t node, 3228 di_minor_t minor) 3229 { 3230 link_t *link; 3231 linkhead_t *head; 3232 char phy_path[PATH_MAX + 1]; 3233 char *valid_link_contents; 3234 char *dev_path; 3235 char rmlink[PATH_MAX + 1]; 3236 3237 /* 3238 * try to use devices path 3239 */ 3240 if ((node == lnode) && (minor == lminor)) { 3241 valid_link_contents = lphy_path; 3242 } else { 3243 if ((dev_path = di_devfs_path(node)) == NULL) { 3244 err_print(DI_DEVFS_PATH_FAILED, strerror(errno)); 3245 devfsadm_exit(1); 3246 } 3247 (void) strcpy(phy_path, dev_path); 3248 di_devfs_path_free(dev_path); 3249 3250 (void) strcat(phy_path, ":"); 3251 (void) strcat(phy_path, di_minor_name(minor)); 3252 valid_link_contents = phy_path; 3253 } 3254 3255 /* 3256 * As an optimization, check to make sure the corresponding 3257 * devlink was just created before continuing. 3258 */ 3259 3260 if (linknew == FALSE) { 3261 return; 3262 } 3263 3264 head = get_cached_links(dir_re); 3265 3266 assert(head->nextlink == NULL); 3267 3268 for (link = head->link; link != NULL; link = head->nextlink) { 3269 /* 3270 * See hot_cleanup() for why we do this 3271 */ 3272 head->nextlink = link->next; 3273 if ((strcmp(link->contents, valid_link_contents) == 0) && 3274 (strcmp(link->devlink, valid_link) != 0)) { 3275 vprint(CHATTY_MID, "removing %s -> %s\n" 3276 "valid link is: %s -> %s\n", 3277 link->devlink, link->contents, 3278 valid_link, valid_link_contents); 3279 /* 3280 * Use a copy of the cached link name as the 3281 * cache entry will go away during link removal 3282 */ 3283 (void) snprintf(rmlink, sizeof (rmlink), "%s", 3284 link->devlink); 3285 devfsadm_rm_link(rmlink); 3286 } 3287 } 3288 } 3289 3290 /* 3291 * Return previously created cache, or create cache. 3292 */ 3293 static linkhead_t * 3294 get_cached_links(char *dir_re) 3295 { 3296 recurse_dev_t rd; 3297 linkhead_t *linkhead; 3298 int n; 3299 3300 vprint(BUILDCACHE_MID, "get_cached_links: %s\n", dir_re); 3301 3302 for (linkhead = headlinkhead; linkhead != NULL; 3303 linkhead = linkhead->nexthead) { 3304 if (strcmp(linkhead->dir_re, dir_re) == 0) { 3305 return (linkhead); 3306 } 3307 } 3308 3309 /* 3310 * This tag is not in cache, so add it, along with all its 3311 * matching /dev entries. This is the only time we go to disk. 3312 */ 3313 linkhead = s_malloc(sizeof (linkhead_t)); 3314 linkhead->nexthead = headlinkhead; 3315 headlinkhead = linkhead; 3316 linkhead->dir_re = s_strdup(dir_re); 3317 3318 if ((n = regcomp(&(linkhead->dir_re_compiled), dir_re, 3319 REG_EXTENDED)) != 0) { 3320 err_print(REGCOMP_FAILED, dir_re, n); 3321 } 3322 3323 linkhead->nextlink = NULL; 3324 linkhead->link = NULL; 3325 3326 rd.fcn = build_devlink_list; 3327 rd.data = (void *)linkhead; 3328 3329 vprint(BUILDCACHE_MID, "get_cached_links: calling recurse_dev_re\n"); 3330 3331 /* call build_devlink_list for each directory in the dir_re RE */ 3332 if (dir_re[0] == '/') { 3333 recurse_dev_re("/", &dir_re[1], &rd); 3334 } else { 3335 recurse_dev_re(dev_dir, dir_re, &rd); 3336 } 3337 3338 return (linkhead); 3339 } 3340 3341 static void 3342 build_devlink_list(char *devlink, void *data) 3343 { 3344 char *fcn = "build_devlink_list: "; 3345 char *ptr; 3346 char *r_contents; 3347 char *r_devlink; 3348 char contents[PATH_MAX + 1]; 3349 char newlink[PATH_MAX + 1]; 3350 char stage_link[PATH_MAX + 1]; 3351 int linksize; 3352 linkhead_t *linkhead = (linkhead_t *)data; 3353 link_t *link; 3354 int i = 0; 3355 3356 vprint(BUILDCACHE_MID, "%scheck_link: %s\n", fcn, devlink); 3357 3358 (void) strcpy(newlink, devlink); 3359 3360 do { 3361 linksize = readlink(newlink, contents, PATH_MAX); 3362 if (linksize <= 0) { 3363 /* 3364 * The first pass through the do loop we may readlink() 3365 * non-symlink files(EINVAL) from false regexec matches. 3366 * Suppress error messages in those cases or if the link 3367 * content is the empty string. 3368 */ 3369 if (linksize < 0 && (i || errno != EINVAL)) 3370 err_print(READLINK_FAILED, "build_devlink_list", 3371 newlink, strerror(errno)); 3372 return; 3373 } 3374 contents[linksize] = '\0'; 3375 i = 1; 3376 3377 if (is_minor_node(contents, &r_contents) == DEVFSADM_FALSE) { 3378 /* 3379 * assume that link contents is really a pointer to 3380 * another link, so recurse and read its link contents. 3381 * 3382 * some link contents are absolute: 3383 * /dev/audio -> /dev/sound/0 3384 */ 3385 if (strncmp(contents, DEV "/", 3386 strlen(DEV) + strlen("/")) != 0) { 3387 3388 if ((ptr = strrchr(newlink, '/')) == NULL) { 3389 vprint(REMOVE_MID, "%s%s -> %s invalid " 3390 "link. missing '/'\n", fcn, 3391 newlink, contents); 3392 return; 3393 } 3394 *ptr = '\0'; 3395 (void) strcpy(stage_link, newlink); 3396 *ptr = '/'; 3397 (void) strcat(stage_link, "/"); 3398 (void) strcat(stage_link, contents); 3399 (void) strcpy(newlink, stage_link); 3400 } else { 3401 (void) strcpy(newlink, dev_dir); 3402 (void) strcat(newlink, "/"); 3403 (void) strcat(newlink, 3404 &contents[strlen(DEV) + strlen("/")]); 3405 } 3406 3407 } else { 3408 newlink[0] = '\0'; 3409 } 3410 } while (newlink[0] != '\0'); 3411 3412 if (strncmp(devlink, dev_dir, strlen(dev_dir)) != 0) { 3413 vprint(BUILDCACHE_MID, "%sinvalid link: %s\n", fcn, devlink); 3414 return; 3415 } 3416 3417 r_devlink = devlink + strlen(dev_dir); 3418 3419 if (r_devlink[0] != '/') 3420 return; 3421 3422 link = s_malloc(sizeof (link_t)); 3423 3424 /* don't store the '/' after rootdir/dev */ 3425 r_devlink += 1; 3426 3427 vprint(BUILDCACHE_MID, "%scaching link: %s\n", fcn, r_devlink); 3428 link->devlink = s_strdup(r_devlink); 3429 3430 link->contents = s_strdup(r_contents); 3431 3432 link->next = linkhead->link; 3433 linkhead->link = link; 3434 } 3435 3436 /* 3437 * to be consistent, devlink must not begin with / and must be 3438 * relative to /dev/, whereas physpath must contain / and be 3439 * relative to /devices. 3440 */ 3441 static void 3442 add_link_to_cache(char *devlink, char *physpath) 3443 { 3444 linkhead_t *linkhead; 3445 link_t *link; 3446 int added = 0; 3447 3448 if (file_mods == FALSE) { 3449 return; 3450 } 3451 3452 vprint(CACHE_MID, "add_link_to_cache: %s -> %s ", 3453 devlink, physpath); 3454 3455 for (linkhead = headlinkhead; linkhead != NULL; 3456 linkhead = linkhead->nexthead) { 3457 if (regexec(&(linkhead->dir_re_compiled), devlink, 0, NULL, 3458 0) == 0) { 3459 added++; 3460 link = s_malloc(sizeof (link_t)); 3461 link->devlink = s_strdup(devlink); 3462 link->contents = s_strdup(physpath); 3463 link->next = linkhead->link; 3464 linkhead->link = link; 3465 } 3466 } 3467 3468 vprint(CACHE_MID, 3469 " %d %s\n", added, added == 0 ? "NOT ADDED" : "ADDED"); 3470 } 3471 3472 /* 3473 * Remove devlink from cache. Devlink must be relative to /dev/ and not start 3474 * with /. 3475 */ 3476 static void 3477 rm_link_from_cache(char *devlink) 3478 { 3479 linkhead_t *linkhead; 3480 link_t **linkp; 3481 link_t *save; 3482 3483 vprint(CACHE_MID, "rm_link_from_cache enter: %s\n", devlink); 3484 3485 for (linkhead = headlinkhead; linkhead != NULL; 3486 linkhead = linkhead->nexthead) { 3487 if (regexec(&(linkhead->dir_re_compiled), devlink, 0, NULL, 3488 0) == 0) { 3489 3490 for (linkp = &(linkhead->link); *linkp != NULL; ) { 3491 if ((strcmp((*linkp)->devlink, devlink) == 0)) { 3492 save = *linkp; 3493 *linkp = (*linkp)->next; 3494 /* 3495 * We are removing our caller's 3496 * "next" link. Update the nextlink 3497 * field in the head so that our 3498 * callers accesses the next valid 3499 * link 3500 */ 3501 if (linkhead->nextlink == save) 3502 linkhead->nextlink = *linkp; 3503 free(save->devlink); 3504 free(save->contents); 3505 free(save); 3506 vprint(CACHE_MID, " %s FREED FROM " 3507 "CACHE\n", devlink); 3508 } else { 3509 linkp = &((*linkp)->next); 3510 } 3511 } 3512 } 3513 } 3514 } 3515 3516 static void 3517 rm_all_links_from_cache() 3518 { 3519 linkhead_t *linkhead; 3520 linkhead_t *nextlinkhead; 3521 link_t *link; 3522 link_t *nextlink; 3523 3524 vprint(CACHE_MID, "rm_all_links_from_cache\n"); 3525 3526 for (linkhead = headlinkhead; linkhead != NULL; 3527 linkhead = nextlinkhead) { 3528 3529 nextlinkhead = linkhead->nexthead; 3530 assert(linkhead->nextlink == NULL); 3531 for (link = linkhead->link; link != NULL; link = nextlink) { 3532 nextlink = link->next; 3533 free(link->devlink); 3534 free(link->contents); 3535 free(link); 3536 } 3537 regfree(&(linkhead->dir_re_compiled)); 3538 free(linkhead->dir_re); 3539 free(linkhead); 3540 } 3541 headlinkhead = NULL; 3542 } 3543 3544 /* 3545 * Called when the kernel has modified the incore path_to_inst data. This 3546 * function will schedule a flush of the data to the filesystem. 3547 */ 3548 static void 3549 devfs_instance_mod(void) 3550 { 3551 char *fcn = "devfs_instance_mod: "; 3552 vprint(PATH2INST_MID, "%senter\n", fcn); 3553 3554 /* signal instance thread */ 3555 (void) mutex_lock(&count_lock); 3556 inst_count++; 3557 (void) cond_signal(&cv); 3558 (void) mutex_unlock(&count_lock); 3559 } 3560 3561 static void 3562 instance_flush_thread(void) 3563 { 3564 int i; 3565 int idle; 3566 3567 for (;;) { 3568 3569 (void) mutex_lock(&count_lock); 3570 while (inst_count == 0) { 3571 (void) cond_wait(&cv, &count_lock); 3572 } 3573 inst_count = 0; 3574 3575 vprint(PATH2INST_MID, "signaled to flush path_to_inst." 3576 " Enter delay loop\n"); 3577 /* 3578 * Wait MAX_IDLE_DELAY seconds after getting the last flush 3579 * path_to_inst event before invoking a flush, but never wait 3580 * more than MAX_DELAY seconds after getting the first event. 3581 */ 3582 for (idle = 0, i = 0; i < MAX_DELAY; i++) { 3583 3584 (void) mutex_unlock(&count_lock); 3585 (void) sleep(1); 3586 (void) mutex_lock(&count_lock); 3587 3588 /* shorten the delay if we are idle */ 3589 if (inst_count == 0) { 3590 idle++; 3591 if (idle > MAX_IDLE_DELAY) { 3592 break; 3593 } 3594 } else { 3595 inst_count = idle = 0; 3596 } 3597 } 3598 3599 (void) mutex_unlock(&count_lock); 3600 3601 flush_path_to_inst(); 3602 } 3603 } 3604 3605 /* 3606 * Helper function for flush_path_to_inst() below; this routine calls the 3607 * inst_sync syscall to flush the path_to_inst database to the given file. 3608 */ 3609 static int 3610 do_inst_sync(char *filename) 3611 { 3612 void (*sigsaved)(int); 3613 int err = 0; 3614 3615 vprint(INSTSYNC_MID, "do_inst_sync: about to flush %s\n", filename); 3616 sigsaved = sigset(SIGSYS, SIG_IGN); 3617 if (inst_sync(filename, 0) == -1) 3618 err = errno; 3619 (void) sigset(SIGSYS, sigsaved); 3620 3621 switch (err) { 3622 case 0: 3623 return (DEVFSADM_SUCCESS); 3624 case EALREADY: /* no-op, path_to_inst already up to date */ 3625 return (EALREADY); 3626 case ENOSYS: 3627 err_print(CANT_LOAD_SYSCALL); 3628 break; 3629 case EPERM: 3630 err_print(SUPER_TO_SYNC); 3631 break; 3632 default: 3633 err_print(INSTSYNC_FAILED, filename, strerror(err)); 3634 break; 3635 } 3636 return (DEVFSADM_FAILURE); 3637 } 3638 3639 /* 3640 * Flush the kernel's path_to_inst database to /etc/path_to_inst. To do so 3641 * safely, the database is flushed to a temporary file, then moved into place. 3642 * 3643 * The following files are used during this process: 3644 * /etc/path_to_inst: The path_to_inst file 3645 * /etc/path_to_inst.<pid>: Contains data flushed from the kernel 3646 * /etc/path_to_inst.old: The backup file 3647 * /etc/path_to_inst.old.<pid>: Temp file for creating backup 3648 * 3649 */ 3650 static void 3651 flush_path_to_inst(void) 3652 { 3653 char *new_inst_file = NULL; 3654 char *old_inst_file = NULL; 3655 char *old_inst_file_npid = NULL; 3656 FILE *inst_file_fp = NULL; 3657 FILE *old_inst_file_fp = NULL; 3658 struct stat sb; 3659 int err = 0; 3660 int c; 3661 int inst_strlen; 3662 3663 vprint(PATH2INST_MID, "flush_path_to_inst: %s\n", 3664 (flush_path_to_inst_enable == TRUE) ? "ENABLED" : "DISABLED"); 3665 3666 if (flush_path_to_inst_enable == FALSE) { 3667 return; 3668 } 3669 3670 inst_strlen = strlen(inst_file); 3671 new_inst_file = s_malloc(inst_strlen + PID_STR_LEN + 2); 3672 old_inst_file = s_malloc(inst_strlen + PID_STR_LEN + 6); 3673 old_inst_file_npid = s_malloc(inst_strlen + 3674 sizeof (INSTANCE_FILE_SUFFIX)); 3675 3676 (void) snprintf(new_inst_file, inst_strlen + PID_STR_LEN + 2, 3677 "%s.%ld", inst_file, getpid()); 3678 3679 if (stat(new_inst_file, &sb) == 0) { 3680 s_unlink(new_inst_file); 3681 } 3682 3683 if ((err = do_inst_sync(new_inst_file)) != DEVFSADM_SUCCESS) { 3684 goto out; 3685 /*NOTREACHED*/ 3686 } 3687 3688 /* 3689 * Now we deal with the somewhat tricky updating and renaming 3690 * of this critical piece of kernel state. 3691 */ 3692 3693 /* 3694 * Copy the current instance file into a temporary file. 3695 * Then rename the temporary file into the backup (.old) 3696 * file and rename the newly flushed kernel data into 3697 * the instance file. 3698 * Of course if 'inst_file' doesn't exist, there's much 3699 * less for us to do .. tee hee. 3700 */ 3701 if ((inst_file_fp = fopen(inst_file, "r")) == NULL) { 3702 /* 3703 * No such file. Rename the new onto the old 3704 */ 3705 if ((err = rename(new_inst_file, inst_file)) != 0) 3706 err_print(RENAME_FAILED, inst_file, strerror(errno)); 3707 goto out; 3708 /*NOTREACHED*/ 3709 } 3710 3711 (void) snprintf(old_inst_file, inst_strlen + PID_STR_LEN + 6, 3712 "%s.old.%ld", inst_file, getpid()); 3713 3714 if (stat(old_inst_file, &sb) == 0) { 3715 s_unlink(old_inst_file); 3716 } 3717 3718 if ((old_inst_file_fp = fopen(old_inst_file, "w")) == NULL) { 3719 /* 3720 * Can't open the 'old_inst_file' file for writing. 3721 * This is somewhat strange given that the syscall 3722 * just succeeded to write a file out.. hmm.. maybe 3723 * the fs just filled up or something nasty. 3724 * 3725 * Anyway, abort what we've done so far. 3726 */ 3727 err_print(CANT_UPDATE, old_inst_file); 3728 err = DEVFSADM_FAILURE; 3729 goto out; 3730 /*NOTREACHED*/ 3731 } 3732 3733 /* 3734 * Copy current instance file into the temporary file 3735 */ 3736 err = 0; 3737 while ((c = getc(inst_file_fp)) != EOF) { 3738 if ((err = putc(c, old_inst_file_fp)) == EOF) { 3739 break; 3740 } 3741 } 3742 3743 if (fclose(old_inst_file_fp) == EOF || err == EOF) { 3744 vprint(INFO_MID, CANT_UPDATE, old_inst_file); 3745 err = DEVFSADM_FAILURE; 3746 goto out; 3747 /* NOTREACHED */ 3748 } 3749 3750 /* 3751 * Set permissions to be the same on the backup as 3752 * /etc/path_to_inst. 3753 */ 3754 (void) chmod(old_inst_file, 0444); 3755 3756 /* 3757 * So far, everything we've done is more or less reversible. 3758 * But now we're going to commit ourselves. 3759 */ 3760 3761 (void) snprintf(old_inst_file_npid, 3762 inst_strlen + sizeof (INSTANCE_FILE_SUFFIX), 3763 "%s%s", inst_file, INSTANCE_FILE_SUFFIX); 3764 3765 if ((err = rename(old_inst_file, old_inst_file_npid)) != 0) { 3766 err_print(RENAME_FAILED, old_inst_file_npid, 3767 strerror(errno)); 3768 } else if ((err = rename(new_inst_file, inst_file)) != 0) { 3769 err_print(RENAME_FAILED, inst_file, strerror(errno)); 3770 } 3771 3772 out: 3773 if (inst_file_fp != NULL) { 3774 if (fclose(inst_file_fp) == EOF) { 3775 err_print(FCLOSE_FAILED, inst_file, strerror(errno)); 3776 } 3777 } 3778 3779 if (stat(new_inst_file, &sb) == 0) { 3780 s_unlink(new_inst_file); 3781 } 3782 free(new_inst_file); 3783 3784 if (stat(old_inst_file, &sb) == 0) { 3785 s_unlink(old_inst_file); 3786 } 3787 free(old_inst_file); 3788 3789 free(old_inst_file_npid); 3790 3791 if (err != 0 && err != EALREADY) { 3792 err_print(FAILED_TO_UPDATE, inst_file); 3793 } 3794 } 3795 3796 /* 3797 * detach from tty. For daemon mode. 3798 */ 3799 void 3800 detachfromtty() 3801 { 3802 (void) setsid(); 3803 if (DEVFSADM_DEBUG_ON == TRUE) { 3804 return; 3805 } 3806 3807 (void) close(0); 3808 (void) close(1); 3809 (void) close(2); 3810 (void) open("/dev/null", O_RDWR, 0); 3811 (void) dup(0); 3812 (void) dup(0); 3813 openlog(DEVFSADMD, LOG_PID, LOG_DAEMON); 3814 (void) setlogmask(LOG_UPTO(LOG_INFO)); 3815 logflag = TRUE; 3816 } 3817 3818 /* 3819 * Use an advisory lock to synchronize updates to /dev. If the lock is 3820 * held by another process, block in the fcntl() system call until that 3821 * process drops the lock or exits. The lock file itself is 3822 * DEV_LOCK_FILE. The process id of the current and last process owning 3823 * the lock is kept in the lock file. After acquiring the lock, read the 3824 * process id and return it. It is the process ID which last owned the 3825 * lock, and will be used to determine if caches need to be flushed. 3826 * 3827 * NOTE: if the devlink database is held open by the caller, it may 3828 * be closed by this routine. This is to enforce the following lock ordering: 3829 * 1) /dev lock 2) database open 3830 */ 3831 pid_t 3832 enter_dev_lock() 3833 { 3834 struct flock lock; 3835 int n; 3836 pid_t pid; 3837 pid_t last_owner_pid; 3838 3839 if (file_mods == FALSE) { 3840 return (0); 3841 } 3842 3843 (void) snprintf(dev_lockfile, sizeof (dev_lockfile), 3844 "%s/%s", etc_dev_dir, DEV_LOCK_FILE); 3845 3846 vprint(LOCK_MID, "enter_dev_lock: lock file %s\n", dev_lockfile); 3847 3848 dev_lock_fd = open(dev_lockfile, O_CREAT|O_RDWR, 0644); 3849 if (dev_lock_fd < 0) { 3850 err_print(OPEN_FAILED, dev_lockfile, strerror(errno)); 3851 devfsadm_exit(1); 3852 } 3853 3854 lock.l_type = F_WRLCK; 3855 lock.l_whence = SEEK_SET; 3856 lock.l_start = 0; 3857 lock.l_len = 0; 3858 3859 /* try for the lock, but don't wait */ 3860 if (fcntl(dev_lock_fd, F_SETLK, &lock) == -1) { 3861 if ((errno == EACCES) || (errno == EAGAIN)) { 3862 pid = 0; 3863 n = read(dev_lock_fd, &pid, sizeof (pid_t)); 3864 vprint(LOCK_MID, "waiting for PID %d to complete\n", 3865 (int)pid); 3866 if (lseek(dev_lock_fd, 0, SEEK_SET) == (off_t)-1) { 3867 err_print(LSEEK_FAILED, dev_lockfile, 3868 strerror(errno)); 3869 devfsadm_exit(1); 3870 } 3871 /* 3872 * wait for the dev lock. If we have the database open, 3873 * close it first - the order of lock acquisition should 3874 * always be: 1) dev_lock 2) database 3875 * This is to prevent deadlocks with any locks the 3876 * database code may hold. 3877 */ 3878 (void) di_devlink_close(&devlink_cache, 0); 3879 3880 /* send any sysevents that were queued up. */ 3881 process_syseventq(); 3882 3883 if (fcntl(dev_lock_fd, F_SETLKW, &lock) == -1) { 3884 err_print(LOCK_FAILED, dev_lockfile, 3885 strerror(errno)); 3886 devfsadm_exit(1); 3887 } 3888 } 3889 } 3890 3891 hold_dev_lock = TRUE; 3892 pid = 0; 3893 n = read(dev_lock_fd, &pid, sizeof (pid_t)); 3894 if (n == sizeof (pid_t) && pid == getpid()) { 3895 return (pid); 3896 } 3897 3898 last_owner_pid = pid; 3899 3900 if (lseek(dev_lock_fd, 0, SEEK_SET) == (off_t)-1) { 3901 err_print(LSEEK_FAILED, dev_lockfile, strerror(errno)); 3902 devfsadm_exit(1); 3903 } 3904 pid = getpid(); 3905 n = write(dev_lock_fd, &pid, sizeof (pid_t)); 3906 if (n != sizeof (pid_t)) { 3907 err_print(WRITE_FAILED, dev_lockfile, strerror(errno)); 3908 devfsadm_exit(1); 3909 } 3910 3911 return (last_owner_pid); 3912 } 3913 3914 /* 3915 * Drop the advisory /dev lock, close lock file. Close and re-open the 3916 * file every time so to ensure a resync if for some reason the lock file 3917 * gets removed. 3918 */ 3919 void 3920 exit_dev_lock() 3921 { 3922 struct flock unlock; 3923 3924 if (hold_dev_lock == FALSE) { 3925 return; 3926 } 3927 3928 vprint(LOCK_MID, "exit_dev_lock: lock file %s\n", dev_lockfile); 3929 3930 unlock.l_type = F_UNLCK; 3931 unlock.l_whence = SEEK_SET; 3932 unlock.l_start = 0; 3933 unlock.l_len = 0; 3934 3935 if (fcntl(dev_lock_fd, F_SETLK, &unlock) == -1) { 3936 err_print(UNLOCK_FAILED, dev_lockfile, strerror(errno)); 3937 } 3938 3939 hold_dev_lock = FALSE; 3940 3941 if (close(dev_lock_fd) == -1) { 3942 err_print(CLOSE_FAILED, dev_lockfile, strerror(errno)); 3943 devfsadm_exit(1); 3944 } 3945 } 3946 3947 /* 3948 * 3949 * Use an advisory lock to ensure that only one daemon process is active 3950 * in the system at any point in time. If the lock is held by another 3951 * process, do not block but return the pid owner of the lock to the 3952 * caller immediately. The lock is cleared if the holding daemon process 3953 * exits for any reason even if the lock file remains, so the daemon can 3954 * be restarted if necessary. The lock file is DAEMON_LOCK_FILE. 3955 */ 3956 pid_t 3957 enter_daemon_lock(void) 3958 { 3959 struct flock lock; 3960 3961 (void) snprintf(daemon_lockfile, sizeof (daemon_lockfile), 3962 "%s/%s", etc_dev_dir, DAEMON_LOCK_FILE); 3963 3964 vprint(LOCK_MID, "enter_daemon_lock: lock file %s\n", daemon_lockfile); 3965 3966 daemon_lock_fd = open(daemon_lockfile, O_CREAT|O_RDWR, 0644); 3967 if (daemon_lock_fd < 0) { 3968 err_print(OPEN_FAILED, daemon_lockfile, strerror(errno)); 3969 devfsadm_exit(1); 3970 } 3971 3972 lock.l_type = F_WRLCK; 3973 lock.l_whence = SEEK_SET; 3974 lock.l_start = 0; 3975 lock.l_len = 0; 3976 3977 if (fcntl(daemon_lock_fd, F_SETLK, &lock) == -1) { 3978 3979 if (errno == EAGAIN || errno == EDEADLK) { 3980 if (fcntl(daemon_lock_fd, F_GETLK, &lock) == -1) { 3981 err_print(LOCK_FAILED, daemon_lockfile, 3982 strerror(errno)); 3983 devfsadm_exit(1); 3984 } 3985 return (lock.l_pid); 3986 } 3987 } 3988 hold_daemon_lock = TRUE; 3989 return (getpid()); 3990 } 3991 3992 /* 3993 * Drop the advisory daemon lock, close lock file 3994 */ 3995 void 3996 exit_daemon_lock(void) 3997 { 3998 struct flock lock; 3999 4000 if (hold_daemon_lock == FALSE) { 4001 return; 4002 } 4003 4004 vprint(LOCK_MID, "exit_daemon_lock: lock file %s\n", daemon_lockfile); 4005 4006 lock.l_type = F_UNLCK; 4007 lock.l_whence = SEEK_SET; 4008 lock.l_start = 0; 4009 lock.l_len = 0; 4010 4011 if (fcntl(daemon_lock_fd, F_SETLK, &lock) == -1) { 4012 err_print(UNLOCK_FAILED, daemon_lockfile, strerror(errno)); 4013 } 4014 4015 if (close(daemon_lock_fd) == -1) { 4016 err_print(CLOSE_FAILED, daemon_lockfile, strerror(errno)); 4017 devfsadm_exit(1); 4018 } 4019 } 4020 4021 /* 4022 * Called to removed danging nodes in two different modes: RM_PRE, RM_POST. 4023 * RM_PRE mode is called before processing the entire devinfo tree, and RM_POST 4024 * is called after processing the entire devinfo tree. 4025 */ 4026 static void 4027 pre_and_post_cleanup(int flags) 4028 { 4029 remove_list_t *rm; 4030 recurse_dev_t rd; 4031 cleanup_data_t cleanup_data; 4032 char *fcn = "pre_and_post_cleanup: "; 4033 4034 if (build_dev == FALSE) 4035 return; 4036 4037 vprint(CHATTY_MID, "attempting %s-cleanup\n", 4038 flags == RM_PRE ? "pre" : "post"); 4039 vprint(REMOVE_MID, "%sflags = %d\n", fcn, flags); 4040 4041 /* 4042 * the generic function recurse_dev_re is shared among different 4043 * functions, so set the method and data that it should use for 4044 * matches. 4045 */ 4046 rd.fcn = matching_dev; 4047 rd.data = (void *)&cleanup_data; 4048 cleanup_data.flags = flags; 4049 4050 (void) mutex_lock(&nfp_mutex); 4051 nfphash_create(); 4052 4053 for (rm = remove_head; rm != NULL; rm = rm->next) { 4054 if ((flags & rm->remove->flags) == flags) { 4055 cleanup_data.rm = rm; 4056 /* 4057 * If reached this point, RM_PRE or RM_POST cleanup is 4058 * desired. clean_ok() decides whether to clean 4059 * under the given circumstances. 4060 */ 4061 vprint(REMOVE_MID, "%scleanup: PRE or POST\n", fcn); 4062 if (clean_ok(rm->remove) == DEVFSADM_SUCCESS) { 4063 vprint(REMOVE_MID, "cleanup: cleanup OK\n"); 4064 recurse_dev_re(dev_dir, rm->remove-> 4065 dev_dirs_re, &rd); 4066 } 4067 } 4068 } 4069 nfphash_destroy(); 4070 (void) mutex_unlock(&nfp_mutex); 4071 } 4072 4073 /* 4074 * clean_ok() determines whether cleanup should be done according 4075 * to the following matrix: 4076 * 4077 * command line arguments RM_PRE RM_POST RM_PRE && RM_POST && 4078 * RM_ALWAYS RM_ALWAYS 4079 * ---------------------- ------ ----- --------- ---------- 4080 * 4081 * <neither -c nor -C> - - pre-clean post-clean 4082 * 4083 * -C pre-clean post-clean pre-clean post-clean 4084 * 4085 * -C -c class pre-clean post-clean pre-clean post-clean 4086 * if class if class if class if class 4087 * matches matches matches matches 4088 * 4089 * -c class - - pre-clean post-clean 4090 * if class if class 4091 * matches matches 4092 * 4093 */ 4094 static int 4095 clean_ok(devfsadm_remove_V1_t *remove) 4096 { 4097 int i; 4098 4099 if (single_drv == TRUE) { 4100 /* no cleanup at all when using -i option */ 4101 return (DEVFSADM_FAILURE); 4102 } 4103 4104 /* 4105 * no cleanup if drivers are not loaded. We make an exception 4106 * for the "disks" program however, since disks has a public 4107 * cleanup flag (-C) and disk drivers are usually never 4108 * unloaded. 4109 */ 4110 if (load_attach_drv == FALSE && strcmp(prog, DISKS) != 0) { 4111 return (DEVFSADM_FAILURE); 4112 } 4113 4114 /* if the cleanup flag was not specified, return false */ 4115 if ((cleanup == FALSE) && ((remove->flags & RM_ALWAYS) == 0)) { 4116 return (DEVFSADM_FAILURE); 4117 } 4118 4119 if (num_classes == 0) { 4120 return (DEVFSADM_SUCCESS); 4121 } 4122 4123 /* 4124 * if reached this point, check to see if the class in the given 4125 * remove structure matches a class given on the command line 4126 */ 4127 4128 for (i = 0; i < num_classes; i++) { 4129 if (strcmp(remove->device_class, classes[i]) == 0) { 4130 return (DEVFSADM_SUCCESS); 4131 } 4132 } 4133 4134 return (DEVFSADM_FAILURE); 4135 } 4136 4137 /* 4138 * Called to remove dangling nodes after receiving a hotplug event 4139 * containing the physical node pathname to be removed. 4140 */ 4141 void 4142 hot_cleanup(char *node_path, char *minor_name, char *ev_subclass, 4143 char *driver_name, int instance) 4144 { 4145 link_t *link; 4146 linkhead_t *head; 4147 remove_list_t *rm; 4148 char *fcn = "hot_cleanup: "; 4149 char path[PATH_MAX + 1]; 4150 int path_len; 4151 char rmlink[PATH_MAX + 1]; 4152 nvlist_t *nvl = NULL; 4153 int skip; 4154 int ret; 4155 4156 /* 4157 * dev links can go away as part of hot cleanup. 4158 * So first build event attributes in order capture dev links. 4159 */ 4160 if (ev_subclass != NULL) 4161 nvl = build_event_attributes(EC_DEV_REMOVE, ev_subclass, 4162 node_path, DI_NODE_NIL, driver_name, instance, minor_name); 4163 4164 (void) strcpy(path, node_path); 4165 (void) strcat(path, ":"); 4166 (void) strcat(path, minor_name == NULL ? "" : minor_name); 4167 4168 path_len = strlen(path); 4169 4170 vprint(REMOVE_MID, "%spath=%s\n", fcn, path); 4171 4172 (void) mutex_lock(&nfp_mutex); 4173 nfphash_create(); 4174 4175 for (rm = remove_head; rm != NULL; rm = rm->next) { 4176 if ((RM_HOT & rm->remove->flags) == RM_HOT) { 4177 head = get_cached_links(rm->remove->dev_dirs_re); 4178 assert(head->nextlink == NULL); 4179 for (link = head->link; 4180 link != NULL; link = head->nextlink) { 4181 /* 4182 * The remove callback below may remove 4183 * the current and/or any or all of the 4184 * subsequent links in the list. 4185 * Save the next link in the head. If 4186 * the callback removes the next link 4187 * the saved pointer in the head will be 4188 * updated by the callback to point at 4189 * the next valid link. 4190 */ 4191 head->nextlink = link->next; 4192 4193 /* 4194 * if devlink is in no-further-process hash, 4195 * skip its remove 4196 */ 4197 if (nfphash_lookup(link->devlink) != NULL) 4198 continue; 4199 4200 if (minor_name) 4201 skip = strcmp(link->contents, path); 4202 else 4203 skip = strncmp(link->contents, path, 4204 path_len); 4205 if (skip || 4206 (call_minor_init(rm->modptr) == 4207 DEVFSADM_FAILURE)) 4208 continue; 4209 4210 vprint(REMOVE_MID, 4211 "%sremoving %s -> %s\n", fcn, 4212 link->devlink, link->contents); 4213 /* 4214 * Use a copy of the cached link name 4215 * as the cache entry will go away 4216 * during link removal 4217 */ 4218 (void) snprintf(rmlink, sizeof (rmlink), 4219 "%s", link->devlink); 4220 if (rm->remove->flags & RM_NOINTERPOSE) { 4221 ((void (*)(char *)) 4222 (rm->remove->callback_fcn))(rmlink); 4223 } else { 4224 ret = ((int (*)(char *)) 4225 (rm->remove->callback_fcn))(rmlink); 4226 if (ret == DEVFSADM_TERMINATE) 4227 nfphash_insert(rmlink); 4228 } 4229 } 4230 } 4231 } 4232 4233 nfphash_destroy(); 4234 (void) mutex_unlock(&nfp_mutex); 4235 4236 /* update device allocation database */ 4237 if (system_labeled) { 4238 int ret = 0; 4239 int devtype = 0; 4240 char devname[MAXNAMELEN]; 4241 4242 devname[0] = '\0'; 4243 if (strstr(node_path, DA_SOUND_NAME)) 4244 devtype = DA_AUDIO; 4245 else if (strstr(node_path, "disk")) 4246 devtype = DA_RMDISK; 4247 else 4248 goto out; 4249 ret = da_remove_list(&devlist, NULL, devtype, devname, 4250 sizeof (devname)); 4251 if (ret != -1) 4252 (void) _update_devalloc_db(&devlist, devtype, DA_REMOVE, 4253 devname, root_dir); 4254 } 4255 4256 out: 4257 /* now log an event */ 4258 if (nvl) { 4259 log_event(EC_DEV_REMOVE, ev_subclass, nvl); 4260 free(nvl); 4261 } 4262 } 4263 4264 /* 4265 * Open the dir current_dir. For every file which matches the first dir 4266 * component of path_re, recurse. If there are no more *dir* path 4267 * components left in path_re (ie no more /), then call function rd->fcn. 4268 */ 4269 static void 4270 recurse_dev_re(char *current_dir, char *path_re, recurse_dev_t *rd) 4271 { 4272 regex_t re1; 4273 char *slash; 4274 char new_path[PATH_MAX + 1]; 4275 char *anchored_path_re; 4276 size_t len; 4277 finddevhdl_t fhandle; 4278 const char *fp; 4279 4280 vprint(RECURSEDEV_MID, "recurse_dev_re: curr = %s path=%s\n", 4281 current_dir, path_re); 4282 4283 if (finddev_readdir(current_dir, &fhandle) != 0) 4284 return; 4285 4286 len = strlen(path_re); 4287 if ((slash = strchr(path_re, '/')) != NULL) { 4288 len = (slash - path_re); 4289 } 4290 4291 anchored_path_re = s_malloc(len + 3); 4292 (void) sprintf(anchored_path_re, "^%.*s$", len, path_re); 4293 4294 if (regcomp(&re1, anchored_path_re, REG_EXTENDED) != 0) { 4295 free(anchored_path_re); 4296 goto out; 4297 } 4298 4299 free(anchored_path_re); 4300 4301 while ((fp = finddev_next(fhandle)) != NULL) { 4302 4303 if (regexec(&re1, fp, 0, NULL, 0) == 0) { 4304 /* match */ 4305 (void) strcpy(new_path, current_dir); 4306 (void) strcat(new_path, "/"); 4307 (void) strcat(new_path, fp); 4308 4309 vprint(RECURSEDEV_MID, "recurse_dev_re: match, new " 4310 "path = %s\n", new_path); 4311 4312 if (slash != NULL) { 4313 recurse_dev_re(new_path, slash + 1, rd); 4314 } else { 4315 /* reached the leaf component of path_re */ 4316 vprint(RECURSEDEV_MID, 4317 "recurse_dev_re: calling fcn\n"); 4318 (*(rd->fcn))(new_path, rd->data); 4319 } 4320 } 4321 } 4322 4323 regfree(&re1); 4324 4325 out: 4326 finddev_close(fhandle); 4327 } 4328 4329 /* 4330 * Found a devpath which matches a RE in the remove structure. 4331 * Now check to see if it is dangling. 4332 */ 4333 static void 4334 matching_dev(char *devpath, void *data) 4335 { 4336 cleanup_data_t *cleanup_data = data; 4337 int norm_len = strlen(dev_dir) + strlen("/"); 4338 int ret; 4339 char *fcn = "matching_dev: "; 4340 4341 vprint(RECURSEDEV_MID, "%sexamining devpath = '%s'\n", fcn, 4342 devpath); 4343 4344 /* 4345 * If the link is in the no-further-process hash 4346 * don't do any remove operation on it. 4347 */ 4348 if (nfphash_lookup(devpath + norm_len) != NULL) 4349 return; 4350 4351 if (resolve_link(devpath, NULL, NULL, NULL, 1) == TRUE) { 4352 if (call_minor_init(cleanup_data->rm->modptr) == 4353 DEVFSADM_FAILURE) { 4354 return; 4355 } 4356 4357 devpath += norm_len; 4358 4359 vprint(RECURSEDEV_MID, "%scalling" 4360 " callback %s\n", fcn, devpath); 4361 if (cleanup_data->rm->remove->flags & RM_NOINTERPOSE) 4362 ((void (*)(char *)) 4363 (cleanup_data->rm->remove->callback_fcn))(devpath); 4364 else { 4365 ret = ((int (*)(char *)) 4366 (cleanup_data->rm->remove->callback_fcn))(devpath); 4367 if (ret == DEVFSADM_TERMINATE) { 4368 /* 4369 * We want no further remove processing for 4370 * this link. Add it to the nfp_hash; 4371 */ 4372 nfphash_insert(devpath); 4373 } 4374 } 4375 } 4376 } 4377 4378 int 4379 devfsadm_read_link(char *link, char **devfs_path) 4380 { 4381 char devlink[PATH_MAX]; 4382 4383 *devfs_path = NULL; 4384 4385 /* prepend link with dev_dir contents */ 4386 (void) strcpy(devlink, dev_dir); 4387 (void) strcat(devlink, "/"); 4388 (void) strcat(devlink, link); 4389 4390 /* We *don't* want a stat of the /devices node */ 4391 (void) resolve_link(devlink, NULL, NULL, devfs_path, 0); 4392 4393 return (*devfs_path ? DEVFSADM_SUCCESS : DEVFSADM_FAILURE); 4394 } 4395 4396 int 4397 devfsadm_link_valid(char *link) 4398 { 4399 struct stat sb; 4400 char devlink[PATH_MAX + 1], *contents = NULL; 4401 int rv, type; 4402 int instance = 0; 4403 4404 /* prepend link with dev_dir contents */ 4405 (void) strcpy(devlink, dev_dir); 4406 (void) strcat(devlink, "/"); 4407 (void) strcat(devlink, link); 4408 4409 if (!device_exists(devlink) || lstat(devlink, &sb) != 0) { 4410 return (DEVFSADM_FALSE); 4411 } 4412 4413 contents = NULL; 4414 type = 0; 4415 if (resolve_link(devlink, &contents, &type, NULL, 1) == TRUE) { 4416 rv = DEVFSADM_FALSE; 4417 } else { 4418 rv = DEVFSADM_TRUE; 4419 } 4420 4421 /* 4422 * The link exists. Add it to the database 4423 */ 4424 (void) di_devlink_add_link(devlink_cache, link, contents, type); 4425 if (system_labeled && (rv == DEVFSADM_TRUE) && 4426 strstr(devlink, DA_AUDIO_NAME) && contents) { 4427 (void) sscanf(contents, "%*[a-z]%d", &instance); 4428 (void) da_add_list(&devlist, devlink, instance, 4429 DA_ADD|DA_AUDIO); 4430 _update_devalloc_db(&devlist, 0, DA_ADD, NULL, root_dir); 4431 } 4432 free(contents); 4433 4434 return (rv); 4435 } 4436 4437 /* 4438 * devpath: Absolute path to /dev link 4439 * content_p: Returns malloced string (link content) 4440 * type_p: Returns link type: primary or secondary 4441 * devfs_path: Returns malloced string: /devices path w/out "/devices" 4442 * dangle: if set, check if link is dangling 4443 * Returns: 4444 * TRUE if dangling 4445 * FALSE if not or if caller doesn't care 4446 * Caller is assumed to have initialized pointer contents to NULL 4447 */ 4448 static int 4449 resolve_link(char *devpath, char **content_p, int *type_p, char **devfs_path, 4450 int dangle) 4451 { 4452 char contents[PATH_MAX + 1]; 4453 char stage_link[PATH_MAX + 1]; 4454 char *fcn = "resolve_link: "; 4455 char *ptr; 4456 int linksize; 4457 int rv = TRUE; 4458 struct stat sb; 4459 4460 linksize = readlink(devpath, contents, PATH_MAX); 4461 4462 if (linksize <= 0) { 4463 return (FALSE); 4464 } else { 4465 contents[linksize] = '\0'; 4466 } 4467 vprint(REMOVE_MID, "%s %s -> %s\n", fcn, devpath, contents); 4468 4469 if (content_p) { 4470 *content_p = s_strdup(contents); 4471 } 4472 4473 /* 4474 * Check to see if this is a link pointing to another link in /dev. The 4475 * cheap way to do this is to look for a lack of ../devices/. 4476 */ 4477 4478 if (is_minor_node(contents, &ptr) == DEVFSADM_FALSE) { 4479 4480 if (type_p) { 4481 *type_p = DI_SECONDARY_LINK; 4482 } 4483 4484 /* 4485 * assume that linkcontents is really a pointer to another 4486 * link, and if so recurse and read its link contents. 4487 */ 4488 if (strncmp(contents, DEV "/", strlen(DEV) + 1) == 0) { 4489 (void) strcpy(stage_link, dev_dir); 4490 (void) strcat(stage_link, "/"); 4491 (void) strcpy(stage_link, 4492 &contents[strlen(DEV) + strlen("/")]); 4493 } else { 4494 if ((ptr = strrchr(devpath, '/')) == NULL) { 4495 vprint(REMOVE_MID, "%s%s -> %s invalid link. " 4496 "missing '/'\n", fcn, devpath, 4497 contents); 4498 return (TRUE); 4499 } 4500 *ptr = '\0'; 4501 (void) strcpy(stage_link, devpath); 4502 *ptr = '/'; 4503 (void) strcat(stage_link, "/"); 4504 (void) strcat(stage_link, contents); 4505 } 4506 return (resolve_link(stage_link, NULL, NULL, devfs_path, 4507 dangle)); 4508 } 4509 4510 /* Current link points at a /devices minor node */ 4511 if (type_p) { 4512 *type_p = DI_PRIMARY_LINK; 4513 } 4514 4515 if (devfs_path) 4516 *devfs_path = s_strdup(ptr); 4517 4518 rv = FALSE; 4519 if (dangle) 4520 rv = (stat(ptr - strlen(DEVICES), &sb) == -1); 4521 4522 vprint(REMOVE_MID, "%slink=%s, returning %s\n", fcn, 4523 devpath, ((rv == TRUE) ? "TRUE" : "FALSE")); 4524 4525 return (rv); 4526 } 4527 4528 /* 4529 * Returns the substring of interest, given a path. 4530 */ 4531 static char * 4532 alloc_cmp_str(const char *path, devfsadm_enumerate_t *dep) 4533 { 4534 uint_t match; 4535 char *np, *ap, *mp; 4536 char *cmp_str = NULL; 4537 char at[] = "@"; 4538 char *fcn = "alloc_cmp_str"; 4539 4540 np = ap = mp = NULL; 4541 4542 /* 4543 * extract match flags from the flags argument. 4544 */ 4545 match = (dep->flags & MATCH_MASK); 4546 4547 vprint(ENUM_MID, "%s: enumeration match type: 0x%x" 4548 " path: %s\n", fcn, match, path); 4549 4550 /* 4551 * MATCH_CALLBACK and MATCH_ALL are the only flags 4552 * which may be used if "path" is a /dev path 4553 */ 4554 if (match == MATCH_CALLBACK) { 4555 if (dep->sel_fcn == NULL) { 4556 vprint(ENUM_MID, "%s: invalid enumerate" 4557 " callback: path: %s\n", fcn, path); 4558 return (NULL); 4559 } 4560 cmp_str = dep->sel_fcn(path, dep->cb_arg); 4561 return (cmp_str); 4562 } 4563 4564 cmp_str = s_strdup(path); 4565 4566 if (match == MATCH_ALL) { 4567 return (cmp_str); 4568 } 4569 4570 /* 4571 * The remaining flags make sense only for /devices 4572 * paths 4573 */ 4574 if ((mp = strrchr(cmp_str, ':')) == NULL) { 4575 vprint(ENUM_MID, "%s: invalid path: %s\n", 4576 fcn, path); 4577 goto err; 4578 } 4579 4580 if (match == MATCH_MINOR) { 4581 /* A NULL "match_arg" values implies entire minor */ 4582 if (get_component(mp + 1, dep->match_arg) == NULL) { 4583 vprint(ENUM_MID, "%s: invalid minor component:" 4584 " path: %s\n", fcn, path); 4585 goto err; 4586 } 4587 return (cmp_str); 4588 } 4589 4590 if ((np = strrchr(cmp_str, '/')) == NULL) { 4591 vprint(ENUM_MID, "%s: invalid path: %s\n", fcn, path); 4592 goto err; 4593 } 4594 4595 if (match == MATCH_PARENT) { 4596 if (strcmp(cmp_str, "/") == 0) { 4597 vprint(ENUM_MID, "%s: invalid path: %s\n", 4598 fcn, path); 4599 goto err; 4600 } 4601 4602 if (np == cmp_str) { 4603 *(np + 1) = '\0'; 4604 } else { 4605 *np = '\0'; 4606 } 4607 return (cmp_str); 4608 } 4609 4610 /* ap can be NULL - Leaf address may not exist or be empty string */ 4611 ap = strchr(np+1, '@'); 4612 4613 /* minor is no longer of interest */ 4614 *mp = '\0'; 4615 4616 if (match == MATCH_NODE) { 4617 if (ap) 4618 *ap = '\0'; 4619 return (cmp_str); 4620 } else if (match == MATCH_ADDR) { 4621 /* 4622 * The empty string is a valid address. The only MATCH_ADDR 4623 * allowed in this case is against the whole address or 4624 * the first component of the address (match_arg=NULL/"0"/"1") 4625 * Note that in this case, the path won't have an "@" 4626 * As a result ap will be NULL. We fake up an ap = @'\0' 4627 * so that get_component() will work correctly. 4628 */ 4629 if (ap == NULL) { 4630 ap = at; 4631 } 4632 4633 if (get_component(ap + 1, dep->match_arg) == NULL) { 4634 vprint(ENUM_MID, "%s: invalid leaf addr. component:" 4635 " path: %s\n", fcn, path); 4636 goto err; 4637 } 4638 return (cmp_str); 4639 } 4640 4641 vprint(ENUM_MID, "%s: invalid enumeration flags: 0x%x" 4642 " path: %s\n", fcn, dep->flags, path); 4643 4644 /*FALLTHRU*/ 4645 err: 4646 free(cmp_str); 4647 return (NULL); 4648 } 4649 4650 4651 /* 4652 * "str" is expected to be a string with components separated by ',' 4653 * The terminating null char is considered a separator. 4654 * get_component() will remove the portion of the string beyond 4655 * the component indicated. 4656 * If comp_str is NULL, the entire "str" is returned. 4657 */ 4658 static char * 4659 get_component(char *str, const char *comp_str) 4660 { 4661 long comp; 4662 char *cp; 4663 4664 if (str == NULL) { 4665 return (NULL); 4666 } 4667 4668 if (comp_str == NULL) { 4669 return (str); 4670 } 4671 4672 errno = 0; 4673 comp = strtol(comp_str, &cp, 10); 4674 if (errno != 0 || *cp != '\0' || comp < 0) { 4675 return (NULL); 4676 } 4677 4678 if (comp == 0) 4679 return (str); 4680 4681 for (cp = str; ; cp++) { 4682 if (*cp == ',' || *cp == '\0') 4683 comp--; 4684 if (*cp == '\0' || comp <= 0) { 4685 break; 4686 } 4687 } 4688 4689 if (comp == 0) { 4690 *cp = '\0'; 4691 } else { 4692 str = NULL; 4693 } 4694 4695 return (str); 4696 } 4697 4698 4699 /* 4700 * Enumerate serves as a generic counter as well as a means to determine 4701 * logical unit/controller numbers for such items as disk and tape 4702 * drives. 4703 * 4704 * rules[] is an array of devfsadm_enumerate_t structures which defines 4705 * the enumeration rules to be used for a specified set of links in /dev. 4706 * The set of links is specified through regular expressions (of the flavor 4707 * described in regex(5)). These regular expressions are used to determine 4708 * the set of links in /dev to examine. The last path component in these 4709 * regular expressions MUST contain a parenthesized subexpression surrounding 4710 * the RE which is to be considered the enumerating component. The subexp 4711 * member in a rule is the subexpression number of the enumerating 4712 * component. Subexpressions in the last path component are numbered starting 4713 * from 1. 4714 * 4715 * A cache of current id assignments is built up from existing symlinks and 4716 * new assignments use the lowest unused id. Assignments are based on a 4717 * match of a specified substring of a symlink's contents. If the specified 4718 * component for the devfs_path argument matches the corresponding substring 4719 * for a existing symlink's contents, the cached id is returned. Else, a new 4720 * id is created and returned in *buf. *buf must be freed by the caller. 4721 * 4722 * An id assignment may be governed by a combination of rules, each rule 4723 * applicable to a different subset of links in /dev. For example, controller 4724 * numbers may be determined by a combination of disk symlinks in /dev/[r]dsk 4725 * and controller symlinks in /dev/cfg, with the two sets requiring different 4726 * rules to derive the "substring of interest". In such cases, the rules 4727 * array will have more than one element. 4728 */ 4729 int 4730 devfsadm_enumerate_int(char *devfs_path, int index, char **buf, 4731 devfsadm_enumerate_t rules[], int nrules) 4732 { 4733 return (find_enum_id(rules, nrules, 4734 devfs_path, index, "0", INTEGER, buf, 0)); 4735 } 4736 4737 int 4738 disk_enumerate_int(char *devfs_path, int index, char **buf, 4739 devfsadm_enumerate_t rules[], int nrules) 4740 { 4741 return (find_enum_id(rules, nrules, 4742 devfs_path, index, "0", INTEGER, buf, 1)); 4743 } 4744 4745 /* 4746 * Same as above, but allows a starting value to be specified. 4747 * Private to devfsadm.... used by devlinks. 4748 */ 4749 static int 4750 devfsadm_enumerate_int_start(char *devfs_path, int index, char **buf, 4751 devfsadm_enumerate_t rules[], int nrules, char *start) 4752 { 4753 return (find_enum_id(rules, nrules, 4754 devfs_path, index, start, INTEGER, buf, 0)); 4755 } 4756 4757 /* 4758 * devfsadm_enumerate_char serves as a generic counter returning 4759 * a single letter. 4760 */ 4761 int 4762 devfsadm_enumerate_char(char *devfs_path, int index, char **buf, 4763 devfsadm_enumerate_t rules[], int nrules) 4764 { 4765 return (find_enum_id(rules, nrules, 4766 devfs_path, index, "a", LETTER, buf, 0)); 4767 } 4768 4769 /* 4770 * Same as above, but allows a starting char to be specified. 4771 * Private to devfsadm - used by ports module (port_link.c) 4772 */ 4773 int 4774 devfsadm_enumerate_char_start(char *devfs_path, int index, char **buf, 4775 devfsadm_enumerate_t rules[], int nrules, char *start) 4776 { 4777 return (find_enum_id(rules, nrules, 4778 devfs_path, index, start, LETTER, buf, 0)); 4779 } 4780 4781 4782 /* 4783 * For a given numeral_set (see get_cached_set for desc of numeral_set), 4784 * search all cached entries looking for matches on a specified substring 4785 * of devfs_path. The substring is derived from devfs_path based on the 4786 * rule specified by "index". If a match is found on a cached entry, 4787 * return the enumerated id in buf. Otherwise, create a new id by calling 4788 * new_id, then cache and return that entry. 4789 */ 4790 static int 4791 find_enum_id(devfsadm_enumerate_t rules[], int nrules, 4792 char *devfs_path, int index, char *min, int type, char **buf, 4793 int multiple) 4794 { 4795 numeral_t *matchnp; 4796 numeral_t *numeral; 4797 int matchcount = 0; 4798 char *cmp_str; 4799 char *fcn = "find_enum_id"; 4800 numeral_set_t *set; 4801 4802 if (rules == NULL) { 4803 vprint(ENUM_MID, "%s: no rules. path: %s\n", 4804 fcn, devfs_path ? devfs_path : "<NULL path>"); 4805 return (DEVFSADM_FAILURE); 4806 } 4807 4808 if (devfs_path == NULL) { 4809 vprint(ENUM_MID, "%s: NULL path\n", fcn); 4810 return (DEVFSADM_FAILURE); 4811 } 4812 4813 if (nrules <= 0 || index < 0 || index >= nrules || buf == NULL) { 4814 vprint(ENUM_MID, "%s: invalid arguments. path: %s\n", 4815 fcn, devfs_path); 4816 return (DEVFSADM_FAILURE); 4817 } 4818 4819 *buf = NULL; 4820 4821 4822 cmp_str = alloc_cmp_str(devfs_path, &rules[index]); 4823 if (cmp_str == NULL) { 4824 return (DEVFSADM_FAILURE); 4825 } 4826 4827 if ((set = get_enum_cache(rules, nrules)) == NULL) { 4828 free(cmp_str); 4829 return (DEVFSADM_FAILURE); 4830 } 4831 4832 assert(nrules == set->re_count); 4833 4834 /* 4835 * Check and see if a matching entry is already cached. 4836 */ 4837 matchcount = lookup_enum_cache(set, cmp_str, rules, index, 4838 &matchnp); 4839 4840 if (matchcount < 0 || matchcount > 1) { 4841 free(cmp_str); 4842 if (multiple && matchcount > 1) 4843 return (DEVFSADM_MULTIPLE); 4844 else 4845 return (DEVFSADM_FAILURE); 4846 } 4847 4848 /* if matching entry already cached, return it */ 4849 if (matchcount == 1) { 4850 /* should never create a link with a reserved ID */ 4851 vprint(ENUM_MID, "%s: 1 match w/ ID: %s\n", fcn, matchnp->id); 4852 assert(matchnp->flags == 0); 4853 *buf = s_strdup(matchnp->id); 4854 free(cmp_str); 4855 return (DEVFSADM_SUCCESS); 4856 } 4857 4858 /* 4859 * no cached entry, initialize a numeral struct 4860 * by calling new_id() and cache onto the numeral_set 4861 */ 4862 numeral = s_malloc(sizeof (numeral_t)); 4863 numeral->id = new_id(set->headnumeral, type, min); 4864 numeral->full_path = s_strdup(devfs_path); 4865 numeral->rule_index = index; 4866 numeral->cmp_str = cmp_str; 4867 cmp_str = NULL; 4868 numeral->flags = 0; 4869 vprint(RSRV_MID, "%s: alloc new_id: %s numeral flags = %d\n", 4870 fcn, numeral->id, numeral->flags); 4871 4872 4873 /* insert to head of list for fast lookups */ 4874 numeral->next = set->headnumeral; 4875 set->headnumeral = numeral; 4876 4877 *buf = s_strdup(numeral->id); 4878 return (DEVFSADM_SUCCESS); 4879 } 4880 4881 4882 /* 4883 * Looks up the specified cache for a match with a specified string 4884 * Returns: 4885 * -1 : on error. 4886 * 0/1/2 : Number of matches. 4887 * Returns the matching element only if there is a single match. 4888 * If the "uncached" flag is set, derives the "cmp_str" afresh 4889 * for the match instead of using cached values. 4890 */ 4891 static int 4892 lookup_enum_cache(numeral_set_t *set, char *cmp_str, 4893 devfsadm_enumerate_t rules[], int index, numeral_t **matchnpp) 4894 { 4895 int matchcount = 0, rv = -1; 4896 int uncached; 4897 numeral_t *np; 4898 char *fcn = "lookup_enum_cache"; 4899 char *cp; 4900 4901 *matchnpp = NULL; 4902 4903 assert(index < set->re_count); 4904 4905 if (cmp_str == NULL) { 4906 return (-1); 4907 } 4908 4909 uncached = 0; 4910 if ((rules[index].flags & MATCH_UNCACHED) == MATCH_UNCACHED) { 4911 uncached = 1; 4912 } 4913 4914 /* 4915 * Check and see if a matching entry is already cached. 4916 */ 4917 for (np = set->headnumeral; np != NULL; np = np->next) { 4918 4919 /* 4920 * Skip reserved IDs 4921 */ 4922 if (np->flags & NUMERAL_RESERVED) { 4923 vprint(RSRV_MID, "lookup_enum_cache: " 4924 "Cannot Match with reserved ID (%s), " 4925 "skipping\n", np->id); 4926 assert(np->flags == NUMERAL_RESERVED); 4927 continue; 4928 } else { 4929 vprint(RSRV_MID, "lookup_enum_cache: " 4930 "Attempting match with numeral ID: %s" 4931 " numeral flags = %d\n", np->id, np->flags); 4932 assert(np->flags == 0); 4933 } 4934 4935 if (np->cmp_str == NULL) { 4936 vprint(ENUM_MID, "%s: invalid entry in enumerate" 4937 " cache. path: %s\n", fcn, np->full_path); 4938 return (-1); 4939 } 4940 4941 if (uncached) { 4942 vprint(CHATTY_MID, "%s: bypassing enumerate cache." 4943 " path: %s\n", fcn, cmp_str); 4944 cp = alloc_cmp_str(np->full_path, 4945 &rules[np->rule_index]); 4946 if (cp == NULL) 4947 return (-1); 4948 rv = strcmp(cmp_str, cp); 4949 free(cp); 4950 } else { 4951 rv = strcmp(cmp_str, np->cmp_str); 4952 } 4953 4954 if (rv == 0) { 4955 if (matchcount++ != 0) { 4956 break; /* more than 1 match. */ 4957 } 4958 *matchnpp = np; 4959 } 4960 } 4961 4962 return (matchcount); 4963 } 4964 4965 #ifdef DEBUG 4966 static void 4967 dump_enum_cache(numeral_set_t *setp) 4968 { 4969 int i; 4970 numeral_t *np; 4971 char *fcn = "dump_enum_cache"; 4972 4973 vprint(ENUM_MID, "%s: re_count = %d\n", fcn, setp->re_count); 4974 for (i = 0; i < setp->re_count; i++) { 4975 vprint(ENUM_MID, "%s: re[%d] = %s\n", fcn, i, setp->re[i]); 4976 } 4977 4978 for (np = setp->headnumeral; np != NULL; np = np->next) { 4979 vprint(ENUM_MID, "%s: id: %s\n", fcn, np->id); 4980 vprint(ENUM_MID, "%s: full_path: %s\n", fcn, np->full_path); 4981 vprint(ENUM_MID, "%s: rule_index: %d\n", fcn, np->rule_index); 4982 vprint(ENUM_MID, "%s: cmp_str: %s\n", fcn, np->cmp_str); 4983 vprint(ENUM_MID, "%s: flags: %d\n", fcn, np->flags); 4984 } 4985 } 4986 #endif 4987 4988 /* 4989 * For a given set of regular expressions in rules[], this function returns 4990 * either a previously cached struct numeral_set or it will create and 4991 * cache a new struct numeral_set. There is only one struct numeral_set 4992 * for the combination of REs present in rules[]. Each numeral_set contains 4993 * the regular expressions in rules[] used for cache selection AND a linked 4994 * list of struct numerals, ONE FOR EACH *UNIQUE* numeral or character ID 4995 * selected by the grouping parenthesized subexpression found in the last 4996 * path component of each rules[].re. For example, the RE: "rmt/([0-9]+)" 4997 * selects all the logical nodes of the correct form in dev/rmt/. 4998 * Each rmt/X will store a *single* struct numeral... ie 0, 1, 2 each get a 4999 * single struct numeral. There is no need to store more than a single logical 5000 * node matching X since the information desired in the devfspath would be 5001 * identical for the portion of the devfspath of interest. (the part up to, 5002 * but not including the minor name in this example.) 5003 * 5004 * If the given numeral_set is not yet cached, call enumerate_recurse to 5005 * create it. 5006 */ 5007 static numeral_set_t * 5008 get_enum_cache(devfsadm_enumerate_t rules[], int nrules) 5009 { 5010 /* linked list of numeral sets */ 5011 numeral_set_t *setp; 5012 int i; 5013 int ret; 5014 char *path_left; 5015 enumerate_file_t *entry; 5016 char *fcn = "get_enum_cache"; 5017 5018 /* 5019 * See if we've already cached this numeral set. 5020 */ 5021 for (setp = head_numeral_set; setp != NULL; setp = setp->next) { 5022 /* 5023 * check all regexp's passed in function against 5024 * those in cached set. 5025 */ 5026 if (nrules != setp->re_count) { 5027 continue; 5028 } 5029 5030 for (i = 0; i < nrules; i++) { 5031 if (strcmp(setp->re[i], rules[i].re) != 0) { 5032 break; 5033 } 5034 } 5035 5036 if (i == nrules) { 5037 return (setp); 5038 } 5039 } 5040 5041 /* 5042 * If the MATCH_UNCACHED flag is set, we should not be here. 5043 */ 5044 for (i = 0; i < nrules; i++) { 5045 if ((rules[i].flags & MATCH_UNCACHED) == MATCH_UNCACHED) { 5046 vprint(ENUM_MID, "%s: invalid enumeration flags: " 5047 "0x%x\n", fcn, rules[i].flags); 5048 return (NULL); 5049 } 5050 } 5051 5052 /* 5053 * Since we made it here, we have not yet cached the given set of 5054 * logical nodes matching the passed re. Create a cached entry 5055 * struct numeral_set and populate it with a minimal set of 5056 * logical nodes from /dev. 5057 */ 5058 5059 setp = s_malloc(sizeof (numeral_set_t)); 5060 setp->re = s_malloc(sizeof (char *) * nrules); 5061 for (i = 0; i < nrules; i++) { 5062 setp->re[i] = s_strdup(rules[i].re); 5063 } 5064 setp->re_count = nrules; 5065 setp->headnumeral = NULL; 5066 5067 /* put this new cached set on the cached set list */ 5068 setp->next = head_numeral_set; 5069 head_numeral_set = setp; 5070 5071 /* 5072 * For each RE, search the "reserved" list to create numeral IDs that 5073 * are reserved. 5074 */ 5075 for (entry = enumerate_reserved; entry; entry = entry->er_next) { 5076 5077 vprint(RSRV_MID, "parsing rstring: %s\n", entry->er_file); 5078 5079 for (i = 0; i < nrules; i++) { 5080 path_left = s_strdup(setp->re[i]); 5081 vprint(RSRV_MID, "parsing rule RE: %s\n", path_left); 5082 ret = enumerate_parse(entry->er_file, path_left, 5083 setp, rules, i); 5084 free(path_left); 5085 if (ret == 1) { 5086 /* 5087 * We found the reserved ID for this entry. 5088 * We still keep the entry since it is needed 5089 * by the new link bypass code in disks 5090 */ 5091 vprint(RSRV_MID, "found rsv ID: rstring: %s " 5092 "rule RE: %s\n", entry->er_file, path_left); 5093 break; 5094 } 5095 } 5096 } 5097 5098 /* 5099 * For each RE, search disk and cache any matches on the 5100 * numeral list. 5101 */ 5102 for (i = 0; i < nrules; i++) { 5103 path_left = s_strdup(setp->re[i]); 5104 enumerate_recurse(dev_dir, path_left, setp, rules, i); 5105 free(path_left); 5106 } 5107 5108 #ifdef DEBUG 5109 dump_enum_cache(setp); 5110 #endif 5111 5112 return (setp); 5113 } 5114 5115 5116 /* 5117 * This function stats the pathname namebuf. If this is a directory 5118 * entry, we recurse down dname/fname until we find the first symbolic 5119 * link, and then stat and return it. This is valid for the same reason 5120 * that we only need to read a single pathname for multiple matching 5121 * logical ID's... ie, all the logical nodes should contain identical 5122 * physical paths for the parts we are interested. 5123 */ 5124 int 5125 get_stat_info(char *namebuf, struct stat *sb) 5126 { 5127 char *cp; 5128 finddevhdl_t fhandle; 5129 const char *fp; 5130 5131 if (lstat(namebuf, sb) < 0) { 5132 (void) err_print(LSTAT_FAILED, namebuf, strerror(errno)); 5133 return (DEVFSADM_FAILURE); 5134 } 5135 5136 if ((sb->st_mode & S_IFMT) == S_IFLNK) { 5137 return (DEVFSADM_SUCCESS); 5138 } 5139 5140 /* 5141 * If it is a dir, recurse down until we find a link and 5142 * then use the link. 5143 */ 5144 if ((sb->st_mode & S_IFMT) == S_IFDIR) { 5145 5146 if (finddev_readdir(namebuf, &fhandle) != 0) { 5147 return (DEVFSADM_FAILURE); 5148 } 5149 5150 /* 5151 * Search each dir entry looking for a symlink. Return 5152 * the first symlink found in namebuf. Recurse dirs. 5153 */ 5154 while ((fp = finddev_next(fhandle)) != NULL) { 5155 cp = namebuf + strlen(namebuf); 5156 if ((strlcat(namebuf, "/", PATH_MAX) >= PATH_MAX) || 5157 (strlcat(namebuf, fp, PATH_MAX) >= PATH_MAX)) { 5158 *cp = '\0'; 5159 finddev_close(fhandle); 5160 return (DEVFSADM_FAILURE); 5161 } 5162 if (get_stat_info(namebuf, sb) == DEVFSADM_SUCCESS) { 5163 finddev_close(fhandle); 5164 return (DEVFSADM_SUCCESS); 5165 } 5166 *cp = '\0'; 5167 } 5168 finddev_close(fhandle); 5169 } 5170 5171 /* no symlink found, so return error */ 5172 return (DEVFSADM_FAILURE); 5173 } 5174 5175 /* 5176 * An existing matching ID was not found, so this function is called to 5177 * create the next lowest ID. In the INTEGER case, return the next 5178 * lowest unused integer. In the case of LETTER, return the next lowest 5179 * unused letter. Return empty string if all 26 are used. 5180 * Only IDs >= min will be returned. 5181 */ 5182 char * 5183 new_id(numeral_t *numeral, int type, char *min) 5184 { 5185 int imin; 5186 temp_t *temp; 5187 temp_t *ptr; 5188 temp_t **previous; 5189 temp_t *head = NULL; 5190 char *retval; 5191 static char tempbuff[8]; 5192 numeral_t *np; 5193 5194 if (type == LETTER) { 5195 5196 char letter[26], i; 5197 5198 if (numeral == NULL) { 5199 return (s_strdup(min)); 5200 } 5201 5202 for (i = 0; i < 26; i++) { 5203 letter[i] = 0; 5204 } 5205 5206 for (np = numeral; np != NULL; np = np->next) { 5207 assert(np->flags == 0 || 5208 np->flags == NUMERAL_RESERVED); 5209 letter[*np->id - 'a']++; 5210 } 5211 5212 imin = *min - 'a'; 5213 5214 for (i = imin; i < 26; i++) { 5215 if (letter[i] == 0) { 5216 retval = s_malloc(2); 5217 retval[0] = 'a' + i; 5218 retval[1] = '\0'; 5219 return (retval); 5220 } 5221 } 5222 5223 return (s_strdup("")); 5224 } 5225 5226 if (type == INTEGER) { 5227 5228 if (numeral == NULL) { 5229 return (s_strdup(min)); 5230 } 5231 5232 imin = atoi(min); 5233 5234 /* sort list */ 5235 for (np = numeral; np != NULL; np = np->next) { 5236 assert(np->flags == 0 || 5237 np->flags == NUMERAL_RESERVED); 5238 temp = s_malloc(sizeof (temp_t)); 5239 temp->integer = atoi(np->id); 5240 temp->next = NULL; 5241 5242 previous = &head; 5243 for (ptr = head; ptr != NULL; ptr = ptr->next) { 5244 if (temp->integer < ptr->integer) { 5245 temp->next = ptr; 5246 *previous = temp; 5247 break; 5248 } 5249 previous = &(ptr->next); 5250 } 5251 if (ptr == NULL) { 5252 *previous = temp; 5253 } 5254 } 5255 5256 /* now search sorted list for first hole >= imin */ 5257 for (ptr = head; ptr != NULL; ptr = ptr->next) { 5258 if (imin == ptr->integer) { 5259 imin++; 5260 } else { 5261 if (imin < ptr->integer) { 5262 break; 5263 } 5264 } 5265 5266 } 5267 5268 /* free temp list */ 5269 for (ptr = head; ptr != NULL; ) { 5270 temp = ptr; 5271 ptr = ptr->next; 5272 free(temp); 5273 } 5274 5275 (void) sprintf(tempbuff, "%d", imin); 5276 return (s_strdup(tempbuff)); 5277 } 5278 5279 return (s_strdup("")); 5280 } 5281 5282 static int 5283 enumerate_parse(char *rsvstr, char *path_left, numeral_set_t *setp, 5284 devfsadm_enumerate_t rules[], int index) 5285 { 5286 char *slash1 = NULL; 5287 char *slash2 = NULL; 5288 char *numeral_id; 5289 char *path_left_save; 5290 char *rsvstr_save; 5291 int ret = 0; 5292 static int warned = 0; 5293 5294 rsvstr_save = rsvstr; 5295 path_left_save = path_left; 5296 5297 if (rsvstr == NULL || rsvstr[0] == '\0' || rsvstr[0] == '/') { 5298 if (!warned) { 5299 err_print("invalid reserved filepath: %s\n", 5300 rsvstr ? rsvstr : "<NULL>"); 5301 warned = 1; 5302 } 5303 return (0); 5304 } 5305 5306 vprint(RSRV_MID, "processing rule: %s, rstring: %s\n", 5307 path_left, rsvstr); 5308 5309 5310 for (;;) { 5311 /* get rid of any extra '/' in the reserve string */ 5312 while (*rsvstr == '/') { 5313 rsvstr++; 5314 } 5315 5316 /* get rid of any extra '/' in the RE */ 5317 while (*path_left == '/') { 5318 path_left++; 5319 } 5320 5321 if (slash1 = strchr(path_left, '/')) { 5322 *slash1 = '\0'; 5323 } 5324 if (slash2 = strchr(rsvstr, '/')) { 5325 *slash2 = '\0'; 5326 } 5327 5328 if ((slash1 != NULL) ^ (slash2 != NULL)) { 5329 ret = 0; 5330 vprint(RSRV_MID, "mismatch in # of path components\n"); 5331 goto out; 5332 } 5333 5334 /* 5335 * Returns true if path_left matches the list entry. 5336 * If it is the last path component, pass subexp 5337 * so that it will return the corresponding ID in 5338 * numeral_id. 5339 */ 5340 numeral_id = NULL; 5341 if (match_path_component(path_left, rsvstr, &numeral_id, 5342 slash1 ? 0 : rules[index].subexp)) { 5343 5344 /* We have a match. */ 5345 if (slash1 == NULL) { 5346 /* Is last path component */ 5347 vprint(RSRV_MID, "match and last component\n"); 5348 create_reserved_numeral(setp, numeral_id); 5349 if (numeral_id != NULL) { 5350 free(numeral_id); 5351 } 5352 ret = 1; 5353 goto out; 5354 } else { 5355 /* Not last path component. Continue parsing */ 5356 *slash1 = '/'; 5357 *slash2 = '/'; 5358 path_left = slash1 + 1; 5359 rsvstr = slash2 + 1; 5360 vprint(RSRV_MID, 5361 "match and NOT last component\n"); 5362 continue; 5363 } 5364 } else { 5365 /* No match */ 5366 ret = 0; 5367 vprint(RSRV_MID, "No match: rule RE = %s, " 5368 "rstring = %s\n", path_left, rsvstr); 5369 goto out; 5370 } 5371 } 5372 5373 out: 5374 if (slash1) 5375 *slash1 = '/'; 5376 if (slash2) 5377 *slash2 = '/'; 5378 5379 if (ret == 1) { 5380 vprint(RSRV_MID, "match: rule RE: %s, rstring: %s\n", 5381 path_left_save, rsvstr_save); 5382 } else { 5383 vprint(RSRV_MID, "NO match: rule RE: %s, rstring: %s\n", 5384 path_left_save, rsvstr_save); 5385 } 5386 5387 return (ret); 5388 } 5389 5390 /* 5391 * Search current_dir for all files which match the first path component 5392 * of path_left, which is an RE. If a match is found, but there are more 5393 * components of path_left, then recurse, otherwise, if we have reached 5394 * the last component of path_left, call create_cached_numerals for each 5395 * file. At some point, recurse_dev_re() should be rewritten so that this 5396 * function can be eliminated. 5397 */ 5398 static void 5399 enumerate_recurse(char *current_dir, char *path_left, numeral_set_t *setp, 5400 devfsadm_enumerate_t rules[], int index) 5401 { 5402 char *slash; 5403 char *new_path; 5404 char *numeral_id; 5405 finddevhdl_t fhandle; 5406 const char *fp; 5407 5408 if (finddev_readdir(current_dir, &fhandle) != 0) { 5409 return; 5410 } 5411 5412 /* get rid of any extra '/' */ 5413 while (*path_left == '/') { 5414 path_left++; 5415 } 5416 5417 if (slash = strchr(path_left, '/')) { 5418 *slash = '\0'; 5419 } 5420 5421 while ((fp = finddev_next(fhandle)) != NULL) { 5422 5423 /* 5424 * Returns true if path_left matches the list entry. 5425 * If it is the last path component, pass subexp 5426 * so that it will return the corresponding ID in 5427 * numeral_id. 5428 */ 5429 numeral_id = NULL; 5430 if (match_path_component(path_left, (char *)fp, &numeral_id, 5431 slash ? 0 : rules[index].subexp)) { 5432 5433 new_path = s_malloc(strlen(current_dir) + 5434 strlen(fp) + 2); 5435 5436 (void) strcpy(new_path, current_dir); 5437 (void) strcat(new_path, "/"); 5438 (void) strcat(new_path, fp); 5439 5440 if (slash != NULL) { 5441 enumerate_recurse(new_path, slash + 1, 5442 setp, rules, index); 5443 } else { 5444 create_cached_numeral(new_path, setp, 5445 numeral_id, rules, index); 5446 if (numeral_id != NULL) { 5447 free(numeral_id); 5448 } 5449 } 5450 free(new_path); 5451 } 5452 } 5453 5454 if (slash != NULL) { 5455 *slash = '/'; 5456 } 5457 finddev_close(fhandle); 5458 } 5459 5460 5461 /* 5462 * Returns true if file matches file_re. If subexp is non-zero, it means 5463 * we are searching the last path component and need to return the 5464 * parenthesized subexpression subexp in id. 5465 * 5466 */ 5467 static int 5468 match_path_component(char *file_re, char *file, char **id, int subexp) 5469 { 5470 regex_t re1; 5471 int match = 0; 5472 int nelements; 5473 regmatch_t *pmatch; 5474 5475 if (subexp != 0) { 5476 nelements = subexp + 1; 5477 pmatch = (regmatch_t *) 5478 s_malloc(sizeof (regmatch_t) * nelements); 5479 } else { 5480 pmatch = NULL; 5481 nelements = 0; 5482 } 5483 5484 if (regcomp(&re1, file_re, REG_EXTENDED) != 0) { 5485 if (pmatch != NULL) { 5486 free(pmatch); 5487 } 5488 return (0); 5489 } 5490 5491 if (regexec(&re1, file, nelements, pmatch, 0) == 0) { 5492 match = 1; 5493 } 5494 5495 if ((match != 0) && (subexp != 0)) { 5496 int size = pmatch[subexp].rm_eo - pmatch[subexp].rm_so; 5497 *id = s_malloc(size + 1); 5498 (void) strncpy(*id, &file[pmatch[subexp].rm_so], size); 5499 (*id)[size] = '\0'; 5500 } 5501 5502 if (pmatch != NULL) { 5503 free(pmatch); 5504 } 5505 regfree(&re1); 5506 return (match); 5507 } 5508 5509 static void 5510 create_reserved_numeral(numeral_set_t *setp, char *numeral_id) 5511 { 5512 numeral_t *np; 5513 5514 vprint(RSRV_MID, "Attempting to create reserved numeral: %s\n", 5515 numeral_id); 5516 5517 /* 5518 * We found a numeral_id from an entry in the enumerate_reserved file 5519 * which matched the re passed in from devfsadm_enumerate. We only 5520 * need to make sure ONE copy of numeral_id exists on the numeral list. 5521 * We only need to store /dev/dsk/cNtod0s0 and no other entries 5522 * hanging off of controller N. 5523 */ 5524 for (np = setp->headnumeral; np != NULL; np = np->next) { 5525 if (strcmp(numeral_id, np->id) == 0) { 5526 vprint(RSRV_MID, "ID: %s, already reserved\n", np->id); 5527 assert(np->flags == NUMERAL_RESERVED); 5528 return; 5529 } else { 5530 assert(np->flags == 0 || 5531 np->flags == NUMERAL_RESERVED); 5532 } 5533 } 5534 5535 /* NOT on list, so add it */ 5536 np = s_malloc(sizeof (numeral_t)); 5537 np->id = s_strdup(numeral_id); 5538 np->full_path = NULL; 5539 np->rule_index = 0; 5540 np->cmp_str = NULL; 5541 np->flags = NUMERAL_RESERVED; 5542 np->next = setp->headnumeral; 5543 setp->headnumeral = np; 5544 5545 vprint(RSRV_MID, "Reserved numeral ID: %s\n", np->id); 5546 } 5547 5548 /* 5549 * This function is called for every file which matched the leaf 5550 * component of the RE. If the "numeral_id" is not already on the 5551 * numeral set's numeral list, add it and its physical path. 5552 */ 5553 static void 5554 create_cached_numeral(char *path, numeral_set_t *setp, char *numeral_id, 5555 devfsadm_enumerate_t rules[], int index) 5556 { 5557 char linkbuf[PATH_MAX + 1]; 5558 char lpath[PATH_MAX + 1]; 5559 char *linkptr, *cmp_str; 5560 numeral_t *np; 5561 int linksize; 5562 struct stat sb; 5563 const char *fcn = "create_cached_numeral"; 5564 5565 assert(index >= 0 && index < setp->re_count); 5566 assert(strcmp(rules[index].re, setp->re[index]) == 0); 5567 5568 /* 5569 * We found a numeral_id from an entry in /dev which matched 5570 * the re passed in from devfsadm_enumerate. We only need to make sure 5571 * ONE copy of numeral_id exists on the numeral list. We only need 5572 * to store /dev/dsk/cNtod0s0 and no other entries hanging off 5573 * of controller N. 5574 */ 5575 for (np = setp->headnumeral; np != NULL; np = np->next) { 5576 assert(np->flags == 0 || np->flags == NUMERAL_RESERVED); 5577 if (strcmp(numeral_id, np->id) == 0) { 5578 /* 5579 * Note that we can't assert that the flags field 5580 * of the numeral is 0, since both reserved and 5581 * unreserved links in /dev come here 5582 */ 5583 if (np->flags == NUMERAL_RESERVED) { 5584 vprint(RSRV_MID, "ID derived from /dev link is" 5585 " reserved: %s\n", np->id); 5586 } else { 5587 vprint(RSRV_MID, "ID derived from /dev link is" 5588 " NOT reserved: %s\n", np->id); 5589 } 5590 return; 5591 } 5592 } 5593 5594 /* NOT on list, so add it */ 5595 5596 (void) strcpy(lpath, path); 5597 /* 5598 * If path is a dir, it is changed to the first symbolic link it find 5599 * if it finds one. 5600 */ 5601 if (get_stat_info(lpath, &sb) == DEVFSADM_FAILURE) { 5602 return; 5603 } 5604 5605 /* If we get here, we found a symlink */ 5606 linksize = readlink(lpath, linkbuf, PATH_MAX); 5607 5608 if (linksize <= 0) { 5609 err_print(READLINK_FAILED, fcn, lpath, strerror(errno)); 5610 return; 5611 } 5612 5613 linkbuf[linksize] = '\0'; 5614 5615 /* 5616 * the following just points linkptr to the root of the /devices 5617 * node if it is a minor node, otherwise, to the first char of 5618 * linkbuf if it is a link. 5619 */ 5620 (void) is_minor_node(linkbuf, &linkptr); 5621 5622 cmp_str = alloc_cmp_str(linkptr, &rules[index]); 5623 if (cmp_str == NULL) { 5624 return; 5625 } 5626 5627 np = s_malloc(sizeof (numeral_t)); 5628 5629 np->id = s_strdup(numeral_id); 5630 np->full_path = s_strdup(linkptr); 5631 np->rule_index = index; 5632 np->cmp_str = cmp_str; 5633 np->flags = 0; 5634 5635 np->next = setp->headnumeral; 5636 setp->headnumeral = np; 5637 } 5638 5639 5640 /* 5641 * This should be called either before or after granting access to a 5642 * command line version of devfsadm running, since it may have changed 5643 * the state of /dev. It forces future enumerate calls to re-build 5644 * cached information from /dev. 5645 */ 5646 void 5647 invalidate_enumerate_cache(void) 5648 { 5649 numeral_set_t *setp; 5650 numeral_set_t *savedsetp; 5651 numeral_t *savednumset; 5652 numeral_t *numset; 5653 int i; 5654 5655 for (setp = head_numeral_set; setp != NULL; ) { 5656 /* 5657 * check all regexp's passed in function against 5658 * those in cached set. 5659 */ 5660 5661 savedsetp = setp; 5662 setp = setp->next; 5663 5664 for (i = 0; i < savedsetp->re_count; i++) { 5665 free(savedsetp->re[i]); 5666 } 5667 free(savedsetp->re); 5668 5669 for (numset = savedsetp->headnumeral; numset != NULL; ) { 5670 savednumset = numset; 5671 numset = numset->next; 5672 assert(savednumset->rule_index < savedsetp->re_count); 5673 free(savednumset->id); 5674 free(savednumset->full_path); 5675 free(savednumset->cmp_str); 5676 free(savednumset); 5677 } 5678 free(savedsetp); 5679 } 5680 head_numeral_set = NULL; 5681 } 5682 5683 /* 5684 * Copies over links from /dev to <root>/dev and device special files in 5685 * /devices to <root>/devices, preserving the existing file modes. If 5686 * the link or special file already exists on <root>, skip the copy. (it 5687 * would exist only if a package hard coded it there, so assume package 5688 * knows best?). Use /etc/name_to_major and <root>/etc/name_to_major to 5689 * make translations for major numbers on device special files. No need to 5690 * make a translation on minor_perm since if the file was created in the 5691 * miniroot then it would presumably have the same minor_perm entry in 5692 * <root>/etc/minor_perm. To be used only by install. 5693 */ 5694 int 5695 devfsadm_copy(void) 5696 { 5697 char filename[PATH_MAX + 1]; 5698 5699 /* load the installed root's name_to_major for translations */ 5700 (void) snprintf(filename, sizeof (filename), "%s%s", root_dir, 5701 NAME_TO_MAJOR); 5702 if (load_n2m_table(filename) == DEVFSADM_FAILURE) { 5703 return (DEVFSADM_FAILURE); 5704 } 5705 5706 /* Copy /dev to target disk. No need to copy /devices with devfs */ 5707 (void) nftw(DEV, devfsadm_copy_file, 20, FTW_PHYS); 5708 5709 /* Let install handle copying over path_to_inst */ 5710 5711 return (DEVFSADM_SUCCESS); 5712 } 5713 5714 /* 5715 * This function copies links, dirs, and device special files. 5716 * Note that it always returns DEVFSADM_SUCCESS, so that nftw doesn't 5717 * abort. 5718 */ 5719 /*ARGSUSED*/ 5720 static int 5721 devfsadm_copy_file(const char *file, const struct stat *stat, 5722 int flags, struct FTW *ftw) 5723 { 5724 struct stat sp; 5725 dev_t newdev; 5726 char newfile[PATH_MAX + 1]; 5727 char linkcontents[PATH_MAX + 1]; 5728 int bytes; 5729 const char *fcn = "devfsadm_copy_file"; 5730 5731 (void) strcpy(newfile, root_dir); 5732 (void) strcat(newfile, "/"); 5733 (void) strcat(newfile, file); 5734 5735 if (lstat(newfile, &sp) == 0) { 5736 /* newfile already exists, so no need to continue */ 5737 return (DEVFSADM_SUCCESS); 5738 } 5739 5740 if (((stat->st_mode & S_IFMT) == S_IFBLK) || 5741 ((stat->st_mode & S_IFMT) == S_IFCHR)) { 5742 if (translate_major(stat->st_rdev, &newdev) == 5743 DEVFSADM_FAILURE) { 5744 return (DEVFSADM_SUCCESS); 5745 } 5746 if (mknod(newfile, stat->st_mode, newdev) == -1) { 5747 err_print(MKNOD_FAILED, newfile, strerror(errno)); 5748 return (DEVFSADM_SUCCESS); 5749 } 5750 } else if ((stat->st_mode & S_IFMT) == S_IFDIR) { 5751 if (mknod(newfile, stat->st_mode, 0) == -1) { 5752 err_print(MKNOD_FAILED, newfile, strerror(errno)); 5753 return (DEVFSADM_SUCCESS); 5754 } 5755 } else if ((stat->st_mode & S_IFMT) == S_IFLNK) { 5756 if ((bytes = readlink(file, linkcontents, PATH_MAX)) == -1) { 5757 err_print(READLINK_FAILED, fcn, file, strerror(errno)); 5758 return (DEVFSADM_SUCCESS); 5759 } 5760 linkcontents[bytes] = '\0'; 5761 if (symlink(linkcontents, newfile) == -1) { 5762 err_print(SYMLINK_FAILED, newfile, newfile, 5763 strerror(errno)); 5764 return (DEVFSADM_SUCCESS); 5765 } 5766 } 5767 5768 (void) lchown(newfile, stat->st_uid, stat->st_gid); 5769 return (DEVFSADM_SUCCESS); 5770 } 5771 5772 /* 5773 * Given a dev_t from the running kernel, return the new_dev_t 5774 * by translating to the major number found on the installed 5775 * target's root name_to_major file. 5776 */ 5777 static int 5778 translate_major(dev_t old_dev, dev_t *new_dev) 5779 { 5780 major_t oldmajor; 5781 major_t newmajor; 5782 minor_t oldminor; 5783 minor_t newminor; 5784 char cdriver[FILENAME_MAX + 1]; 5785 char driver[FILENAME_MAX + 1]; 5786 char *fcn = "translate_major: "; 5787 5788 oldmajor = major(old_dev); 5789 if (modctl(MODGETNAME, driver, sizeof (driver), 5790 &oldmajor) != 0) { 5791 return (DEVFSADM_FAILURE); 5792 } 5793 5794 if (strcmp(driver, "clone") != 0) { 5795 /* non-clone case */ 5796 5797 /* look up major number is target's name2major */ 5798 if (get_major_no(driver, &newmajor) == DEVFSADM_FAILURE) { 5799 return (DEVFSADM_FAILURE); 5800 } 5801 5802 *new_dev = makedev(newmajor, minor(old_dev)); 5803 if (old_dev != *new_dev) { 5804 vprint(CHATTY_MID, "%sdriver: %s old: %lu,%lu " 5805 "new: %lu,%lu\n", fcn, driver, major(old_dev), 5806 minor(old_dev), major(*new_dev), 5807 minor(*new_dev)); 5808 } 5809 return (DEVFSADM_SUCCESS); 5810 } else { 5811 /* 5812 * The clone is a special case. Look at its minor 5813 * number since it is the major number of the real driver. 5814 */ 5815 if (get_major_no(driver, &newmajor) == DEVFSADM_FAILURE) { 5816 return (DEVFSADM_FAILURE); 5817 } 5818 5819 oldminor = minor(old_dev); 5820 if (modctl(MODGETNAME, cdriver, sizeof (cdriver), 5821 &oldminor) != 0) { 5822 err_print(MODGETNAME_FAILED, oldminor); 5823 return (DEVFSADM_FAILURE); 5824 } 5825 5826 if (get_major_no(cdriver, &newminor) == DEVFSADM_FAILURE) { 5827 return (DEVFSADM_FAILURE); 5828 } 5829 5830 *new_dev = makedev(newmajor, newminor); 5831 if (old_dev != *new_dev) { 5832 vprint(CHATTY_MID, "%sdriver: %s old: " 5833 "%lu,%lu new: %lu,%lu\n", fcn, driver, 5834 major(old_dev), minor(old_dev), 5835 major(*new_dev), minor(*new_dev)); 5836 } 5837 return (DEVFSADM_SUCCESS); 5838 } 5839 } 5840 5841 /* 5842 * 5843 * Find the major number for driver, searching the n2m_list that was 5844 * built in load_n2m_table(). 5845 */ 5846 static int 5847 get_major_no(char *driver, major_t *major) 5848 { 5849 n2m_t *ptr; 5850 5851 for (ptr = n2m_list; ptr != NULL; ptr = ptr->next) { 5852 if (strcmp(ptr->driver, driver) == 0) { 5853 *major = ptr->major; 5854 return (DEVFSADM_SUCCESS); 5855 } 5856 } 5857 err_print(FIND_MAJOR_FAILED, driver); 5858 return (DEVFSADM_FAILURE); 5859 } 5860 5861 /* 5862 * Loads a name_to_major table into memory. Used only for suninstall's 5863 * private -R option to devfsadm, to translate major numbers from the 5864 * running to the installed target disk. 5865 */ 5866 static int 5867 load_n2m_table(char *file) 5868 { 5869 FILE *fp; 5870 char line[1024], *cp; 5871 char driver[PATH_MAX + 1]; 5872 major_t major; 5873 n2m_t *ptr; 5874 int ln = 0; 5875 5876 if ((fp = fopen(file, "r")) == NULL) { 5877 err_print(FOPEN_FAILED, file, strerror(errno)); 5878 return (DEVFSADM_FAILURE); 5879 } 5880 5881 while (fgets(line, sizeof (line), fp) != NULL) { 5882 ln++; 5883 /* cut off comments starting with '#' */ 5884 if ((cp = strchr(line, '#')) != NULL) 5885 *cp = '\0'; 5886 /* ignore comment or blank lines */ 5887 if (is_blank(line)) 5888 continue; 5889 /* sanity-check */ 5890 if (sscanf(line, "%1024s%lu", driver, &major) != 2) { 5891 err_print(IGNORING_LINE_IN, ln, file); 5892 continue; 5893 } 5894 ptr = (n2m_t *)s_malloc(sizeof (n2m_t)); 5895 ptr->major = major; 5896 ptr->driver = s_strdup(driver); 5897 ptr->next = n2m_list; 5898 n2m_list = ptr; 5899 } 5900 if (fclose(fp) == EOF) { 5901 err_print(FCLOSE_FAILED, file, strerror(errno)); 5902 } 5903 return (DEVFSADM_SUCCESS); 5904 } 5905 5906 /* 5907 * Called at devfsadm startup to read the file /etc/dev/enumerate_reserved 5908 * Creates a linked list of devlinks from which reserved IDs can be derived 5909 */ 5910 static void 5911 read_enumerate_file(void) 5912 { 5913 FILE *fp; 5914 int linenum; 5915 char line[PATH_MAX+1]; 5916 enumerate_file_t *entry; 5917 struct stat current_sb; 5918 static struct stat cached_sb; 5919 static int cached = FALSE; 5920 5921 assert(enumerate_file); 5922 5923 if (stat(enumerate_file, ¤t_sb) == -1) { 5924 vprint(RSRV_MID, "No reserved file: %s\n", enumerate_file); 5925 cached = FALSE; 5926 if (enumerate_reserved != NULL) { 5927 vprint(RSRV_MID, "invalidating %s cache\n", 5928 enumerate_file); 5929 } 5930 while (enumerate_reserved != NULL) { 5931 entry = enumerate_reserved; 5932 enumerate_reserved = entry->er_next; 5933 free(entry->er_file); 5934 free(entry->er_id); 5935 free(entry); 5936 } 5937 return; 5938 } 5939 5940 /* if already cached, check to see if it is still valid */ 5941 if (cached == TRUE) { 5942 5943 if (current_sb.st_mtime == cached_sb.st_mtime) { 5944 vprint(RSRV_MID, "%s cache valid\n", enumerate_file); 5945 vprint(FILES_MID, "%s cache valid\n", enumerate_file); 5946 return; 5947 } 5948 5949 vprint(RSRV_MID, "invalidating %s cache\n", enumerate_file); 5950 vprint(FILES_MID, "invalidating %s cache\n", enumerate_file); 5951 5952 while (enumerate_reserved != NULL) { 5953 entry = enumerate_reserved; 5954 enumerate_reserved = entry->er_next; 5955 free(entry->er_file); 5956 free(entry->er_id); 5957 free(entry); 5958 } 5959 vprint(RSRV_MID, "Recaching file: %s\n", enumerate_file); 5960 } else { 5961 vprint(RSRV_MID, "Caching file (first time): %s\n", 5962 enumerate_file); 5963 cached = TRUE; 5964 } 5965 5966 (void) stat(enumerate_file, &cached_sb); 5967 5968 if ((fp = fopen(enumerate_file, "r")) == NULL) { 5969 err_print(FOPEN_FAILED, enumerate_file, strerror(errno)); 5970 return; 5971 } 5972 5973 vprint(RSRV_MID, "Reading reserve file: %s\n", enumerate_file); 5974 linenum = 0; 5975 while (fgets(line, sizeof (line), fp) != NULL) { 5976 char *cp, *ncp; 5977 5978 linenum++; 5979 5980 /* remove newline */ 5981 cp = strchr(line, '\n'); 5982 if (cp) 5983 *cp = '\0'; 5984 5985 vprint(RSRV_MID, "Reserve file: line %d: %s\n", 5986 linenum, line); 5987 5988 /* skip over space and tab */ 5989 for (cp = line; *cp == ' ' || *cp == '\t'; cp++); 5990 5991 if (*cp == '\0' || *cp == '#') { 5992 vprint(RSRV_MID, "Skipping line: '%s'\n", line); 5993 continue; /* blank line or comment line */ 5994 } 5995 5996 ncp = cp; 5997 5998 /* delete trailing blanks */ 5999 for (; *cp != ' ' && *cp != '\t' && *cp != '\0'; cp++); 6000 *cp = '\0'; 6001 6002 entry = s_zalloc(sizeof (enumerate_file_t)); 6003 entry->er_file = s_strdup(ncp); 6004 entry->er_id = NULL; 6005 entry->er_next = enumerate_reserved; 6006 enumerate_reserved = entry; 6007 } 6008 6009 if (fclose(fp) == EOF) { 6010 err_print(FCLOSE_FAILED, enumerate_file, strerror(errno)); 6011 } 6012 } 6013 6014 /* 6015 * Called at devfsadm startup to read in the devlink.tab file. Creates 6016 * a linked list of devlinktab_list structures which will be 6017 * searched for every minor node. 6018 */ 6019 static void 6020 read_devlinktab_file(void) 6021 { 6022 devlinktab_list_t *headp = NULL; 6023 devlinktab_list_t *entryp; 6024 devlinktab_list_t **previous; 6025 devlinktab_list_t *save; 6026 char line[MAX_DEVLINK_LINE], *cp; 6027 char *selector; 6028 char *p_link; 6029 char *s_link; 6030 FILE *fp; 6031 int i; 6032 static struct stat cached_sb; 6033 struct stat current_sb; 6034 static int cached = FALSE; 6035 6036 if (devlinktab_file == NULL) { 6037 return; 6038 } 6039 6040 (void) stat(devlinktab_file, ¤t_sb); 6041 6042 /* if already cached, check to see if it is still valid */ 6043 if (cached == TRUE) { 6044 6045 if (current_sb.st_mtime == cached_sb.st_mtime) { 6046 vprint(FILES_MID, "%s cache valid\n", devlinktab_file); 6047 return; 6048 } 6049 6050 vprint(FILES_MID, "invalidating %s cache\n", devlinktab_file); 6051 6052 while (devlinktab_list != NULL) { 6053 free_link_list(devlinktab_list->p_link); 6054 free_link_list(devlinktab_list->s_link); 6055 free_selector_list(devlinktab_list->selector); 6056 free(devlinktab_list->selector_pattern); 6057 free(devlinktab_list->p_link_pattern); 6058 if (devlinktab_list->s_link_pattern != NULL) { 6059 free(devlinktab_list->s_link_pattern); 6060 } 6061 save = devlinktab_list; 6062 devlinktab_list = devlinktab_list->next; 6063 free(save); 6064 } 6065 } else { 6066 cached = TRUE; 6067 } 6068 6069 (void) stat(devlinktab_file, &cached_sb); 6070 6071 if ((fp = fopen(devlinktab_file, "r")) == NULL) { 6072 err_print(FOPEN_FAILED, devlinktab_file, strerror(errno)); 6073 return; 6074 } 6075 6076 previous = &headp; 6077 6078 while (fgets(line, sizeof (line), fp) != NULL) { 6079 devlinktab_line++; 6080 i = strlen(line); 6081 if (line[i-1] == NEWLINE) { 6082 line[i-1] = '\0'; 6083 } else if (i == sizeof (line-1)) { 6084 err_print(LINE_TOO_LONG, devlinktab_line, 6085 devlinktab_file, sizeof (line)-1); 6086 while (((i = getc(fp)) != '\n') && (i != EOF)); 6087 continue; 6088 } 6089 6090 /* cut off comments starting with '#' */ 6091 if ((cp = strchr(line, '#')) != NULL) 6092 *cp = '\0'; 6093 /* ignore comment or blank lines */ 6094 if (is_blank(line)) 6095 continue; 6096 6097 vprint(DEVLINK_MID, "table: %s line %d: '%s'\n", 6098 devlinktab_file, devlinktab_line, line); 6099 6100 /* break each entry into fields. s_link may be NULL */ 6101 if (split_devlinktab_entry(line, &selector, &p_link, 6102 &s_link) == DEVFSADM_FAILURE) { 6103 vprint(DEVLINK_MID, "split_entry returns failure\n"); 6104 continue; 6105 } else { 6106 vprint(DEVLINK_MID, "split_entry selector='%s' " 6107 "p_link='%s' s_link='%s'\n\n", selector, 6108 p_link, (s_link == NULL) ? "" : s_link); 6109 } 6110 6111 entryp = (devlinktab_list_t *) 6112 s_malloc(sizeof (devlinktab_list_t)); 6113 6114 entryp->line_number = devlinktab_line; 6115 6116 if ((entryp->selector = 6117 create_selector_list(selector)) == NULL) { 6118 free(entryp); 6119 continue; 6120 } 6121 entryp->selector_pattern = s_strdup(selector); 6122 6123 if ((entryp->p_link = create_link_list(p_link)) == NULL) { 6124 free_selector_list(entryp->selector); 6125 free(entryp->selector_pattern); 6126 free(entryp); 6127 continue; 6128 } 6129 6130 entryp->p_link_pattern = s_strdup(p_link); 6131 6132 if (s_link != NULL) { 6133 if ((entryp->s_link = 6134 create_link_list(s_link)) == NULL) { 6135 free_selector_list(entryp->selector); 6136 free_link_list(entryp->p_link); 6137 free(entryp->selector_pattern); 6138 free(entryp->p_link_pattern); 6139 free(entryp); 6140 continue; 6141 } 6142 entryp->s_link_pattern = s_strdup(s_link); 6143 } else { 6144 entryp->s_link = NULL; 6145 entryp->s_link_pattern = NULL; 6146 6147 } 6148 6149 /* append to end of list */ 6150 6151 entryp->next = NULL; 6152 *previous = entryp; 6153 previous = &(entryp->next); 6154 } 6155 if (fclose(fp) == EOF) { 6156 err_print(FCLOSE_FAILED, devlinktab_file, strerror(errno)); 6157 } 6158 devlinktab_list = headp; 6159 } 6160 6161 /* 6162 * 6163 * For a single line entry in devlink.tab, split the line into fields 6164 * selector, p_link, and an optionally s_link. If s_link field is not 6165 * present, then return NULL in s_link (not NULL string). 6166 */ 6167 static int 6168 split_devlinktab_entry(char *entry, char **selector, char **p_link, 6169 char **s_link) 6170 { 6171 char *tab; 6172 6173 *selector = entry; 6174 6175 if ((tab = strchr(entry, TAB)) != NULL) { 6176 *tab = '\0'; 6177 *p_link = ++tab; 6178 } else { 6179 err_print(MISSING_TAB, devlinktab_line, devlinktab_file); 6180 return (DEVFSADM_FAILURE); 6181 } 6182 6183 if (*p_link == '\0') { 6184 err_print(MISSING_DEVNAME, devlinktab_line, devlinktab_file); 6185 return (DEVFSADM_FAILURE); 6186 } 6187 6188 if ((tab = strchr(*p_link, TAB)) != NULL) { 6189 *tab = '\0'; 6190 *s_link = ++tab; 6191 if (strchr(*s_link, TAB) != NULL) { 6192 err_print(TOO_MANY_FIELDS, devlinktab_line, 6193 devlinktab_file); 6194 return (DEVFSADM_FAILURE); 6195 } 6196 } else { 6197 *s_link = NULL; 6198 } 6199 6200 return (DEVFSADM_SUCCESS); 6201 } 6202 6203 /* 6204 * For a given devfs_spec field, for each element in the field, add it to 6205 * a linked list of devfs_spec structures. Return the linked list in 6206 * devfs_spec_list. 6207 */ 6208 static selector_list_t * 6209 create_selector_list(char *selector) 6210 { 6211 char *key; 6212 char *val; 6213 int error = FALSE; 6214 selector_list_t *head_selector_list = NULL; 6215 selector_list_t *selector_list; 6216 6217 /* parse_devfs_spec splits the next field into keyword & value */ 6218 while ((*selector != NULL) && (error == FALSE)) { 6219 if (parse_selector(&selector, &key, 6220 &val) == DEVFSADM_FAILURE) { 6221 error = TRUE; 6222 break; 6223 } else { 6224 selector_list = (selector_list_t *) 6225 s_malloc(sizeof (selector_list_t)); 6226 if (strcmp(NAME_S, key) == 0) { 6227 selector_list->key = NAME; 6228 } else if (strcmp(TYPE_S, key) == 0) { 6229 selector_list->key = TYPE; 6230 } else if (strncmp(ADDR_S, key, ADDR_S_LEN) == 0) { 6231 selector_list->key = ADDR; 6232 if (key[ADDR_S_LEN] == '\0') { 6233 selector_list->arg = 0; 6234 } else if (isdigit(key[ADDR_S_LEN]) != 6235 FALSE) { 6236 selector_list->arg = 6237 atoi(&key[ADDR_S_LEN]); 6238 } else { 6239 error = TRUE; 6240 free(selector_list); 6241 err_print(BADKEYWORD, key, 6242 devlinktab_line, 6243 devlinktab_file); 6244 break; 6245 } 6246 } else if (strncmp(MINOR_S, key, 6247 MINOR_S_LEN) == 0) { 6248 selector_list->key = MINOR; 6249 if (key[MINOR_S_LEN] == '\0') { 6250 selector_list->arg = 0; 6251 } else if (isdigit(key[MINOR_S_LEN]) != 6252 FALSE) { 6253 selector_list->arg = 6254 atoi(&key[MINOR_S_LEN]); 6255 } else { 6256 error = TRUE; 6257 free(selector_list); 6258 err_print(BADKEYWORD, key, 6259 devlinktab_line, 6260 devlinktab_file); 6261 break; 6262 } 6263 vprint(DEVLINK_MID, "MINOR = %s\n", val); 6264 } else { 6265 err_print(UNRECOGNIZED_KEY, key, 6266 devlinktab_line, devlinktab_file); 6267 error = TRUE; 6268 free(selector_list); 6269 break; 6270 } 6271 selector_list->val = s_strdup(val); 6272 selector_list->next = head_selector_list; 6273 head_selector_list = selector_list; 6274 vprint(DEVLINK_MID, "key='%s' val='%s' arg=%d\n", 6275 key, val, selector_list->arg); 6276 } 6277 } 6278 6279 if ((error == FALSE) && (head_selector_list != NULL)) { 6280 return (head_selector_list); 6281 } else { 6282 /* parse failed. Free any allocated structs */ 6283 free_selector_list(head_selector_list); 6284 return (NULL); 6285 } 6286 } 6287 6288 /* 6289 * Takes a semicolon separated list of selector elements and breaks up 6290 * into a keyword-value pair. semicolon and equal characters are 6291 * replaced with NULL's. On success, selector is updated to point to the 6292 * terminating NULL character terminating the keyword-value pair, and the 6293 * function returns DEVFSADM_SUCCESS. If there is a syntax error, 6294 * devfs_spec is not modified and function returns DEVFSADM_FAILURE. 6295 */ 6296 static int 6297 parse_selector(char **selector, char **key, char **val) 6298 { 6299 char *equal; 6300 char *semi_colon; 6301 6302 *key = *selector; 6303 6304 if ((equal = strchr(*key, '=')) != NULL) { 6305 *equal = '\0'; 6306 } else { 6307 err_print(MISSING_EQUAL, devlinktab_line, devlinktab_file); 6308 return (DEVFSADM_FAILURE); 6309 } 6310 6311 *val = ++equal; 6312 if ((semi_colon = strchr(equal, ';')) != NULL) { 6313 *semi_colon = '\0'; 6314 *selector = semi_colon + 1; 6315 } else { 6316 *selector = equal + strlen(equal); 6317 } 6318 return (DEVFSADM_SUCCESS); 6319 } 6320 6321 /* 6322 * link is either the second or third field of devlink.tab. Parse link 6323 * into a linked list of devlink structures and return ptr to list. Each 6324 * list element is either a constant string, or one of the following 6325 * escape sequences: \M, \A, \N, or \D. The first three escape sequences 6326 * take a numerical argument. 6327 */ 6328 static link_list_t * 6329 create_link_list(char *link) 6330 { 6331 int x = 0; 6332 int error = FALSE; 6333 int counter_found = FALSE; 6334 link_list_t *head = NULL; 6335 link_list_t **ptr; 6336 link_list_t *link_list; 6337 char constant[MAX_DEVLINK_LINE]; 6338 char *error_str; 6339 6340 if (link == NULL) { 6341 return (NULL); 6342 } 6343 6344 while ((*link != '\0') && (error == FALSE)) { 6345 link_list = (link_list_t *)s_malloc(sizeof (link_list_t)); 6346 link_list->next = NULL; 6347 6348 while ((*link != '\0') && (*link != '\\')) { 6349 /* a non-escaped string */ 6350 constant[x++] = *(link++); 6351 } 6352 if (x != 0) { 6353 constant[x] = '\0'; 6354 link_list->type = CONSTANT; 6355 link_list->constant = s_strdup(constant); 6356 x = 0; 6357 vprint(DEVLINK_MID, "CONSTANT FOUND %s\n", constant); 6358 } else { 6359 switch (*(++link)) { 6360 case 'M': 6361 link_list->type = MINOR; 6362 break; 6363 case 'A': 6364 link_list->type = ADDR; 6365 break; 6366 case 'N': 6367 if (counter_found == TRUE) { 6368 error = TRUE; 6369 error_str = "multiple counters " 6370 "not permitted"; 6371 free(link_list); 6372 } else { 6373 counter_found = TRUE; 6374 link_list->type = COUNTER; 6375 } 6376 break; 6377 case 'D': 6378 link_list->type = NAME; 6379 break; 6380 default: 6381 error = TRUE; 6382 free(link_list); 6383 error_str = "unrecognized escape sequence"; 6384 break; 6385 } 6386 if (*(link++) != 'D') { 6387 if (isdigit(*link) == FALSE) { 6388 error_str = "escape sequence must be " 6389 "followed by a digit\n"; 6390 error = TRUE; 6391 free(link_list); 6392 } else { 6393 link_list->arg = 6394 (int)strtoul(link, &link, 10); 6395 vprint(DEVLINK_MID, "link_list->arg = " 6396 "%d\n", link_list->arg); 6397 } 6398 } 6399 } 6400 /* append link_list struct to end of list */ 6401 if (error == FALSE) { 6402 for (ptr = &head; *ptr != NULL; ptr = &((*ptr)->next)); 6403 *ptr = link_list; 6404 } 6405 } 6406 6407 if (error == FALSE) { 6408 return (head); 6409 } else { 6410 err_print(CONFIG_INCORRECT, devlinktab_line, devlinktab_file, 6411 error_str); 6412 free_link_list(head); 6413 return (NULL); 6414 } 6415 } 6416 6417 /* 6418 * Called for each minor node devfsadm processes; for each minor node, 6419 * look for matches in the devlinktab_list list which was created on 6420 * startup read_devlinktab_file(). If there is a match, call build_links() 6421 * to build a logical devlink and a possible extra devlink. 6422 */ 6423 static int 6424 process_devlink_compat(di_minor_t minor, di_node_t node) 6425 { 6426 int link_built = FALSE; 6427 devlinktab_list_t *entry; 6428 char *nodetype; 6429 char *dev_path; 6430 6431 if (devlinks_debug == TRUE) { 6432 nodetype = di_minor_nodetype(minor); 6433 assert(nodetype != NULL); 6434 if ((dev_path = di_devfs_path(node)) != NULL) { 6435 vprint(INFO_MID, "'%s' entry: %s:%s\n", nodetype, 6436 dev_path, 6437 di_minor_name(minor) ? di_minor_name(minor) : 6438 ""); 6439 di_devfs_path_free(dev_path); 6440 } 6441 6442 } 6443 6444 6445 /* don't process devlink.tab if devfsadm invoked with -c <class> */ 6446 if (num_classes > 0) { 6447 return (FALSE); 6448 } 6449 6450 for (entry = devlinktab_list; entry != NULL; entry = entry->next) { 6451 if (devlink_matches(entry, minor, node) == DEVFSADM_SUCCESS) { 6452 link_built = TRUE; 6453 (void) build_links(entry, minor, node); 6454 } 6455 } 6456 return (link_built); 6457 } 6458 6459 /* 6460 * For a given devlink.tab devlinktab_list entry, see if the selector 6461 * field matches this minor node. If it does, return DEVFSADM_SUCCESS, 6462 * otherwise DEVFSADM_FAILURE. 6463 */ 6464 static int 6465 devlink_matches(devlinktab_list_t *entry, di_minor_t minor, di_node_t node) 6466 { 6467 selector_list_t *selector = entry->selector; 6468 char *addr; 6469 char *minor_name; 6470 char *node_type; 6471 6472 for (; selector != NULL; selector = selector->next) { 6473 switch (selector->key) { 6474 case NAME: 6475 if (strcmp(di_node_name(node), selector->val) != 0) { 6476 return (DEVFSADM_FAILURE); 6477 } 6478 break; 6479 case TYPE: 6480 node_type = di_minor_nodetype(minor); 6481 assert(node_type != NULL); 6482 if (strcmp(node_type, selector->val) != 0) { 6483 return (DEVFSADM_FAILURE); 6484 } 6485 break; 6486 case ADDR: 6487 if ((addr = di_bus_addr(node)) == NULL) { 6488 return (DEVFSADM_FAILURE); 6489 } 6490 if (selector->arg == 0) { 6491 if (strcmp(addr, selector->val) != 0) { 6492 return (DEVFSADM_FAILURE); 6493 } 6494 } else { 6495 if (compare_field(addr, selector->val, 6496 selector->arg) == DEVFSADM_FAILURE) { 6497 return (DEVFSADM_FAILURE); 6498 } 6499 } 6500 break; 6501 case MINOR: 6502 if ((minor_name = di_minor_name(minor)) == NULL) { 6503 return (DEVFSADM_FAILURE); 6504 } 6505 if (selector->arg == 0) { 6506 if (strcmp(minor_name, selector->val) != 0) { 6507 return (DEVFSADM_FAILURE); 6508 } 6509 } else { 6510 if (compare_field(minor_name, selector->val, 6511 selector->arg) == DEVFSADM_FAILURE) { 6512 return (DEVFSADM_FAILURE); 6513 } 6514 } 6515 break; 6516 default: 6517 return (DEVFSADM_FAILURE); 6518 } 6519 } 6520 6521 return (DEVFSADM_SUCCESS); 6522 } 6523 6524 /* 6525 * For the given minor node and devlinktab_list entry from devlink.tab, 6526 * build a logical dev link and a possible extra devlink. 6527 * Return DEVFSADM_SUCCESS if link is created, otherwise DEVFSADM_FAILURE. 6528 */ 6529 static int 6530 build_links(devlinktab_list_t *entry, di_minor_t minor, di_node_t node) 6531 { 6532 char secondary_link[PATH_MAX + 1]; 6533 char primary_link[PATH_MAX + 1]; 6534 char contents[PATH_MAX + 1]; 6535 char *dev_path; 6536 6537 if ((dev_path = di_devfs_path(node)) == NULL) { 6538 err_print(DI_DEVFS_PATH_FAILED, strerror(errno)); 6539 devfsadm_exit(1); 6540 } 6541 (void) strcpy(contents, dev_path); 6542 di_devfs_path_free(dev_path); 6543 6544 (void) strcat(contents, ":"); 6545 (void) strcat(contents, di_minor_name(minor)); 6546 6547 if (construct_devlink(primary_link, entry->p_link, contents, 6548 minor, node, 6549 entry->p_link_pattern) == DEVFSADM_FAILURE) { 6550 return (DEVFSADM_FAILURE); 6551 } 6552 (void) devfsadm_mklink(primary_link, node, minor, 0); 6553 6554 if (entry->s_link == NULL) { 6555 return (DEVFSADM_SUCCESS); 6556 } 6557 6558 if (construct_devlink(secondary_link, entry->s_link, 6559 primary_link, minor, node, 6560 entry->s_link_pattern) == DEVFSADM_FAILURE) { 6561 return (DEVFSADM_FAILURE); 6562 } 6563 6564 (void) devfsadm_secondary_link(secondary_link, primary_link, 0); 6565 6566 return (DEVFSADM_SUCCESS); 6567 } 6568 6569 /* 6570 * The counter rule for devlink.tab entries is implemented via 6571 * devfsadm_enumerate_int_start(). One of the arguments to this function 6572 * is a path, where each path component is treated as a regular expression. 6573 * For devlink.tab entries, this path regular expression is derived from 6574 * the devlink spec. get_anchored_re() accepts path regular expressions derived 6575 * from devlink.tab entries and inserts the anchors '^' and '$' at the beginning 6576 * and end respectively of each path component. This is done to prevent 6577 * false matches. For example, without anchors, "a/([0-9]+)" will match "ab/c9" 6578 * and incorrect links will be generated. 6579 */ 6580 static int 6581 get_anchored_re(char *link, char *anchored_re, char *pattern) 6582 { 6583 if (*link == '/' || *link == '\0') { 6584 err_print(INVALID_DEVLINK_SPEC, pattern); 6585 return (DEVFSADM_FAILURE); 6586 } 6587 6588 *anchored_re++ = '^'; 6589 for (; *link != '\0'; ) { 6590 if (*link == '/') { 6591 while (*link == '/') 6592 link++; 6593 *anchored_re++ = '$'; 6594 *anchored_re++ = '/'; 6595 if (*link != '\0') { 6596 *anchored_re++ = '^'; 6597 } 6598 } else { 6599 *anchored_re++ = *link++; 6600 if (*link == '\0') { 6601 *anchored_re++ = '$'; 6602 } 6603 } 6604 } 6605 *anchored_re = '\0'; 6606 6607 return (DEVFSADM_SUCCESS); 6608 } 6609 6610 static int 6611 construct_devlink(char *link, link_list_t *link_build, char *contents, 6612 di_minor_t minor, di_node_t node, char *pattern) 6613 { 6614 int counter_offset = -1; 6615 devfsadm_enumerate_t rules[1] = {NULL}; 6616 char templink[PATH_MAX + 1]; 6617 char *buff; 6618 char start[10]; 6619 char *node_path; 6620 char anchored_re[PATH_MAX + 1]; 6621 6622 link[0] = '\0'; 6623 6624 for (; link_build != NULL; link_build = link_build->next) { 6625 switch (link_build->type) { 6626 case NAME: 6627 (void) strcat(link, di_node_name(node)); 6628 break; 6629 case CONSTANT: 6630 (void) strcat(link, link_build->constant); 6631 break; 6632 case ADDR: 6633 if (component_cat(link, di_bus_addr(node), 6634 link_build->arg) == DEVFSADM_FAILURE) { 6635 node_path = di_devfs_path(node); 6636 err_print(CANNOT_BE_USED, pattern, node_path, 6637 di_minor_name(minor)); 6638 di_devfs_path_free(node_path); 6639 return (DEVFSADM_FAILURE); 6640 } 6641 break; 6642 case MINOR: 6643 if (component_cat(link, di_minor_name(minor), 6644 link_build->arg) == DEVFSADM_FAILURE) { 6645 node_path = di_devfs_path(node); 6646 err_print(CANNOT_BE_USED, pattern, node_path, 6647 di_minor_name(minor)); 6648 di_devfs_path_free(node_path); 6649 return (DEVFSADM_FAILURE); 6650 } 6651 break; 6652 case COUNTER: 6653 counter_offset = strlen(link); 6654 (void) strcat(link, "([0-9]+)"); 6655 (void) sprintf(start, "%d", link_build->arg); 6656 break; 6657 default: 6658 return (DEVFSADM_FAILURE); 6659 } 6660 } 6661 6662 if (counter_offset != -1) { 6663 /* 6664 * copy anything appended after "([0-9]+)" into 6665 * templink 6666 */ 6667 6668 (void) strcpy(templink, 6669 &link[counter_offset + strlen("([0-9]+)")]); 6670 if (get_anchored_re(link, anchored_re, pattern) 6671 != DEVFSADM_SUCCESS) { 6672 return (DEVFSADM_FAILURE); 6673 } 6674 rules[0].re = anchored_re; 6675 rules[0].subexp = 1; 6676 rules[0].flags = MATCH_ALL; 6677 if (devfsadm_enumerate_int_start(contents, 0, &buff, 6678 rules, 1, start) == DEVFSADM_FAILURE) { 6679 return (DEVFSADM_FAILURE); 6680 } 6681 (void) strcpy(&link[counter_offset], buff); 6682 free(buff); 6683 (void) strcat(link, templink); 6684 vprint(DEVLINK_MID, "COUNTER is %s\n", link); 6685 } 6686 return (DEVFSADM_SUCCESS); 6687 } 6688 6689 /* 6690 * Compares "field" number of the comma separated list "full_name" with 6691 * field_item. Returns DEVFSADM_SUCCESS for match, 6692 * DEVFSADM_FAILURE for no match. 6693 */ 6694 static int 6695 compare_field(char *full_name, char *field_item, int field) 6696 { 6697 --field; 6698 while ((*full_name != '\0') && (field != 0)) { 6699 if (*(full_name++) == ',') { 6700 field--; 6701 } 6702 } 6703 6704 if (field != 0) { 6705 return (DEVFSADM_FAILURE); 6706 } 6707 6708 while ((*full_name != '\0') && (*field_item != '\0') && 6709 (*full_name != ',')) { 6710 if (*(full_name++) != *(field_item++)) { 6711 return (DEVFSADM_FAILURE); 6712 } 6713 } 6714 6715 if (*field_item != '\0') { 6716 return (DEVFSADM_FAILURE); 6717 } 6718 6719 if ((*full_name == '\0') || (*full_name == ',')) 6720 return (DEVFSADM_SUCCESS); 6721 6722 return (DEVFSADM_FAILURE); 6723 } 6724 6725 /* 6726 * strcat() field # "field" of comma separated list "name" to "link". 6727 * Field 0 is the entire name. 6728 * Return DEVFSADM_SUCCESS or DEVFSADM_FAILURE. 6729 */ 6730 static int 6731 component_cat(char *link, char *name, int field) 6732 { 6733 6734 if (name == NULL) { 6735 return (DEVFSADM_FAILURE); 6736 } 6737 6738 if (field == 0) { 6739 (void) strcat(link, name); 6740 return (DEVFSADM_SUCCESS); 6741 } 6742 6743 while (*link != '\0') { 6744 link++; 6745 } 6746 6747 --field; 6748 while ((*name != '\0') && (field != 0)) { 6749 if (*(name++) == ',') { 6750 --field; 6751 } 6752 } 6753 6754 if (field != 0) { 6755 return (DEVFSADM_FAILURE); 6756 } 6757 6758 while ((*name != '\0') && (*name != ',')) { 6759 *(link++) = *(name++); 6760 } 6761 6762 *link = '\0'; 6763 return (DEVFSADM_SUCCESS); 6764 } 6765 6766 static void 6767 free_selector_list(selector_list_t *head) 6768 { 6769 selector_list_t *temp; 6770 6771 while (head != NULL) { 6772 temp = head; 6773 head = head->next; 6774 free(temp->val); 6775 free(temp); 6776 } 6777 } 6778 6779 static void 6780 free_link_list(link_list_t *head) 6781 { 6782 link_list_t *temp; 6783 6784 while (head != NULL) { 6785 temp = head; 6786 head = head->next; 6787 if (temp->type == CONSTANT) { 6788 free(temp->constant); 6789 } 6790 free(temp); 6791 } 6792 } 6793 6794 /* 6795 * Prints only if level matches one of the debug levels 6796 * given on command line. INFO_MID is always printed. 6797 * 6798 * See devfsadm.h for a listing of globally defined levels and 6799 * meanings. Modules should prefix the level with their 6800 * module name to prevent collisions. 6801 */ 6802 /*PRINTFLIKE2*/ 6803 void 6804 devfsadm_print(char *msgid, char *message, ...) 6805 { 6806 va_list ap; 6807 static int newline = TRUE; 6808 int x; 6809 6810 if (msgid != NULL) { 6811 for (x = 0; x < num_verbose; x++) { 6812 if (strcmp(verbose[x], msgid) == 0) { 6813 break; 6814 } 6815 if (strcmp(verbose[x], ALL_MID) == 0) { 6816 break; 6817 } 6818 } 6819 if (x == num_verbose) { 6820 return; 6821 } 6822 } 6823 6824 va_start(ap, message); 6825 6826 if (msgid == NULL) { 6827 if (logflag == TRUE) { 6828 (void) vsyslog(LOG_NOTICE, message, ap); 6829 } else { 6830 (void) vfprintf(stdout, message, ap); 6831 } 6832 6833 } else { 6834 if (logflag == TRUE) { 6835 (void) syslog(LOG_DEBUG, "%s[%ld]: %s: ", 6836 prog, getpid(), msgid); 6837 (void) vsyslog(LOG_DEBUG, message, ap); 6838 } else { 6839 if (newline == TRUE) { 6840 (void) fprintf(stdout, "%s[%ld]: %s: ", 6841 prog, getpid(), msgid); 6842 } 6843 (void) vfprintf(stdout, message, ap); 6844 } 6845 } 6846 6847 if (message[strlen(message) - 1] == '\n') { 6848 newline = TRUE; 6849 } else { 6850 newline = FALSE; 6851 } 6852 va_end(ap); 6853 } 6854 6855 /* 6856 * print error messages to the terminal or to syslog 6857 */ 6858 /*PRINTFLIKE1*/ 6859 void 6860 devfsadm_errprint(char *message, ...) 6861 { 6862 va_list ap; 6863 6864 va_start(ap, message); 6865 6866 if (logflag == TRUE) { 6867 (void) vsyslog(LOG_ERR, message, ap); 6868 } else { 6869 (void) fprintf(stderr, "%s: ", prog); 6870 (void) vfprintf(stderr, message, ap); 6871 } 6872 va_end(ap); 6873 } 6874 6875 /* 6876 * return noupdate state (-s) 6877 */ 6878 int 6879 devfsadm_noupdate(void) 6880 { 6881 return (file_mods == TRUE ? DEVFSADM_TRUE : DEVFSADM_FALSE); 6882 } 6883 6884 /* 6885 * return current root update path (-r) 6886 */ 6887 const char * 6888 devfsadm_root_path(void) 6889 { 6890 if (root_dir[0] == '\0') { 6891 return ("/"); 6892 } else { 6893 return ((const char *)root_dir); 6894 } 6895 } 6896 6897 void 6898 devfsadm_free_dev_names(char **dev_names, int len) 6899 { 6900 int i; 6901 6902 for (i = 0; i < len; i++) 6903 free(dev_names[i]); 6904 free(dev_names); 6905 } 6906 6907 /* 6908 * Return all devlinks corresponding to phys_path as an array of strings. 6909 * The number of entries in the array is returned through lenp. 6910 * devfsadm_free_dev_names() is used to free the returned array. 6911 * NULL is returned on failure or when there are no matching devlinks. 6912 * 6913 * re is an extended regular expression in regex(5) format used to further 6914 * match devlinks pointing to phys_path; it may be NULL to match all 6915 */ 6916 char ** 6917 devfsadm_lookup_dev_names(char *phys_path, char *re, int *lenp) 6918 { 6919 struct devlink_cb_arg cb_arg; 6920 char **dev_names = NULL; 6921 int i; 6922 6923 *lenp = 0; 6924 cb_arg.count = 0; 6925 cb_arg.rv = 0; 6926 (void) di_devlink_cache_walk(devlink_cache, re, phys_path, 6927 DI_PRIMARY_LINK, &cb_arg, devlink_cb); 6928 6929 if (cb_arg.rv == -1 || cb_arg.count <= 0) 6930 return (NULL); 6931 6932 dev_names = s_malloc(cb_arg.count * sizeof (char *)); 6933 if (dev_names == NULL) 6934 goto out; 6935 6936 for (i = 0; i < cb_arg.count; i++) { 6937 dev_names[i] = s_strdup(cb_arg.dev_names[i]); 6938 if (dev_names[i] == NULL) { 6939 devfsadm_free_dev_names(dev_names, i); 6940 dev_names = NULL; 6941 goto out; 6942 } 6943 } 6944 *lenp = cb_arg.count; 6945 6946 out: 6947 free_dev_names(&cb_arg); 6948 return (dev_names); 6949 } 6950 6951 /* common exit function which ensures releasing locks */ 6952 static void 6953 devfsadm_exit(int status) 6954 { 6955 if (DEVFSADM_DEBUG_ON) { 6956 vprint(INFO_MID, "exit status = %d\n", status); 6957 } 6958 6959 if (rcm_hdl) { 6960 if (thr_self() != process_rcm_events_tid) { 6961 (void) mutex_lock(&rcm_eventq_lock); 6962 need_to_exit_rcm_event_thread = 1; 6963 (void) cond_broadcast(&rcm_eventq_cv); 6964 (void) mutex_unlock(&rcm_eventq_lock); 6965 6966 /* wait until process_rcm_events() thread exits */ 6967 (void) thr_join(process_rcm_events_tid, NULL, NULL); 6968 } 6969 librcm_free_handle(rcm_hdl); 6970 (void) dlclose(librcm_hdl); 6971 } 6972 6973 exit_dev_lock(); 6974 exit_daemon_lock(); 6975 6976 if (logflag == TRUE) { 6977 closelog(); 6978 } 6979 6980 exit(status); 6981 } 6982 6983 /* 6984 * set root_dir, devices_dir, dev_dir using optarg. 6985 */ 6986 static void 6987 set_root_devices_dev_dir(char *dir) 6988 { 6989 size_t len; 6990 6991 root_dir = s_strdup(dir); 6992 len = strlen(dir) + strlen(DEVICES) + 1; 6993 devices_dir = s_malloc(len); 6994 (void) snprintf(devices_dir, len, "%s%s", root_dir, DEVICES); 6995 len = strlen(root_dir) + strlen(DEV) + 1; 6996 dev_dir = s_malloc(len); 6997 (void) snprintf(dev_dir, len, "%s%s", root_dir, DEV); 6998 } 6999 7000 /* 7001 * Removes quotes. 7002 */ 7003 static char * 7004 dequote(char *src) 7005 { 7006 char *dst; 7007 int len; 7008 7009 len = strlen(src); 7010 dst = s_malloc(len + 1); 7011 if (src[0] == '\"' && src[len - 1] == '\"') { 7012 len -= 2; 7013 (void) strncpy(dst, &src[1], len); 7014 dst[len] = '\0'; 7015 } else { 7016 (void) strcpy(dst, src); 7017 } 7018 return (dst); 7019 } 7020 7021 /* 7022 * For a given physical device pathname and spectype, return the 7023 * ownership and permissions attributes by looking in data from 7024 * /etc/minor_perm. If currently in installation mode, check for 7025 * possible major number translations from the miniroot to the installed 7026 * root's name_to_major table. Note that there can be multiple matches, 7027 * but the last match takes effect. pts seems to rely on this 7028 * implementation behavior. 7029 */ 7030 static void 7031 getattr(char *phy_path, char *aminor, int spectype, dev_t dev, mode_t *mode, 7032 uid_t *uid, gid_t *gid) 7033 { 7034 char devname[PATH_MAX + 1]; 7035 char *node_name; 7036 char *minor_name; 7037 int match = FALSE; 7038 int is_clone; 7039 int mp_drvname_matches_node_name; 7040 int mp_drvname_matches_minor_name; 7041 int mp_drvname_is_clone; 7042 int mp_drvname_matches_drvname; 7043 struct mperm *mp; 7044 major_t major_no; 7045 char driver[PATH_MAX + 1]; 7046 7047 /* 7048 * Get the driver name based on the major number since the name 7049 * in /devices may be generic. Could be running with more major 7050 * numbers than are in /etc/name_to_major, so get it from the kernel 7051 */ 7052 major_no = major(dev); 7053 7054 if (modctl(MODGETNAME, driver, sizeof (driver), &major_no) != 0) { 7055 /* return default values */ 7056 goto use_defaults; 7057 } 7058 7059 (void) strcpy(devname, phy_path); 7060 7061 node_name = strrchr(devname, '/'); /* node name is the last */ 7062 /* component */ 7063 if (node_name == NULL) { 7064 err_print(NO_NODE, devname); 7065 goto use_defaults; 7066 } 7067 7068 minor_name = strchr(++node_name, '@'); /* see if it has address part */ 7069 7070 if (minor_name != NULL) { 7071 *minor_name++ = '\0'; 7072 } else { 7073 minor_name = node_name; 7074 } 7075 7076 minor_name = strchr(minor_name, ':'); /* look for minor name */ 7077 7078 if (minor_name == NULL) { 7079 err_print(NO_MINOR, devname); 7080 goto use_defaults; 7081 } 7082 *minor_name++ = '\0'; 7083 7084 /* 7085 * mp->mp_drvname = device name from minor_perm 7086 * mp->mp_minorname = minor part of device name from 7087 * minor_perm 7088 * drvname = name of driver for this device 7089 */ 7090 7091 is_clone = (strcmp(node_name, "clone") == 0 ? TRUE : FALSE); 7092 for (mp = minor_perms; mp != NULL; mp = mp->mp_next) { 7093 mp_drvname_matches_node_name = 7094 (strcmp(mp->mp_drvname, node_name) == 0 ? TRUE : FALSE); 7095 mp_drvname_matches_minor_name = 7096 (strcmp(mp->mp_drvname, minor_name) == 0 ? TRUE:FALSE); 7097 mp_drvname_is_clone = 7098 (strcmp(mp->mp_drvname, "clone") == 0 ? TRUE : FALSE); 7099 mp_drvname_matches_drvname = 7100 (strcmp(mp->mp_drvname, driver) == 0 ? TRUE : FALSE); 7101 7102 /* 7103 * If one of the following cases is true, then we try to change 7104 * the permissions if a "shell global pattern match" of 7105 * mp_>mp_minorname matches minor_name. 7106 * 7107 * 1. mp->mp_drvname matches driver. 7108 * 7109 * OR 7110 * 7111 * 2. mp->mp_drvname matches node_name and this 7112 * name is an alias of the driver name 7113 * 7114 * OR 7115 * 7116 * 3. /devices entry is the clone device and either 7117 * minor_perm entry is the clone device or matches 7118 * the minor part of the clone device. 7119 */ 7120 7121 if ((mp_drvname_matches_drvname == TRUE)|| 7122 ((mp_drvname_matches_node_name == TRUE) && 7123 (alias(driver, node_name) == TRUE)) || 7124 ((is_clone == TRUE) && 7125 ((mp_drvname_is_clone == TRUE) || 7126 (mp_drvname_matches_minor_name == TRUE)))) { 7127 /* 7128 * Check that the minor part of the 7129 * device name from the minor_perm 7130 * entry matches and if so, set the 7131 * permissions. 7132 * 7133 * Under real devfs, clone minor name is changed 7134 * to match the driver name, but minor_perm may 7135 * not match. We reconcile it here. 7136 */ 7137 if (aminor != NULL) 7138 minor_name = aminor; 7139 7140 if (gmatch(minor_name, mp->mp_minorname) != 0) { 7141 *uid = mp->mp_uid; 7142 *gid = mp->mp_gid; 7143 *mode = spectype | mp->mp_mode; 7144 match = TRUE; 7145 } 7146 } 7147 } 7148 7149 if (match == TRUE) { 7150 return; 7151 } 7152 7153 use_defaults: 7154 /* not found in minor_perm, so just use default values */ 7155 *uid = root_uid; 7156 *gid = sys_gid; 7157 *mode = (spectype | 0600); 7158 } 7159 7160 /* 7161 * Called by devfs_read_minor_perm() to report errors 7162 * key is: 7163 * line number: ignoring line number error 7164 * errno: open/close errors 7165 * size: alloc errors 7166 */ 7167 static void 7168 minorperm_err_cb(minorperm_err_t mp_err, int key) 7169 { 7170 switch (mp_err) { 7171 case MP_FOPEN_ERR: 7172 err_print(FOPEN_FAILED, MINOR_PERM_FILE, strerror(key)); 7173 break; 7174 case MP_FCLOSE_ERR: 7175 err_print(FCLOSE_FAILED, MINOR_PERM_FILE, strerror(key)); 7176 break; 7177 case MP_IGNORING_LINE_ERR: 7178 err_print(IGNORING_LINE_IN, key, MINOR_PERM_FILE); 7179 break; 7180 case MP_ALLOC_ERR: 7181 err_print(MALLOC_FAILED, key); 7182 break; 7183 case MP_NVLIST_ERR: 7184 err_print(NVLIST_ERROR, MINOR_PERM_FILE, strerror(key)); 7185 break; 7186 case MP_CANT_FIND_USER_ERR: 7187 err_print(CANT_FIND_USER, DEFAULT_DEV_USER); 7188 break; 7189 case MP_CANT_FIND_GROUP_ERR: 7190 err_print(CANT_FIND_GROUP, DEFAULT_DEV_GROUP); 7191 break; 7192 } 7193 } 7194 7195 static void 7196 read_minor_perm_file(void) 7197 { 7198 static int cached = FALSE; 7199 static struct stat cached_sb; 7200 struct stat current_sb; 7201 7202 (void) stat(MINOR_PERM_FILE, ¤t_sb); 7203 7204 /* If already cached, check to see if it is still valid */ 7205 if (cached == TRUE) { 7206 7207 if (current_sb.st_mtime == cached_sb.st_mtime) { 7208 vprint(FILES_MID, "%s cache valid\n", MINOR_PERM_FILE); 7209 return; 7210 } 7211 devfs_free_minor_perm(minor_perms); 7212 minor_perms = NULL; 7213 } else { 7214 cached = TRUE; 7215 } 7216 7217 (void) stat(MINOR_PERM_FILE, &cached_sb); 7218 7219 vprint(FILES_MID, "loading binding file: %s\n", MINOR_PERM_FILE); 7220 7221 minor_perms = devfs_read_minor_perm(minorperm_err_cb); 7222 } 7223 7224 static void 7225 load_minor_perm_file(void) 7226 { 7227 read_minor_perm_file(); 7228 if (devfs_load_minor_perm(minor_perms, minorperm_err_cb) != 0) 7229 err_print(gettext("minor_perm load failed\n")); 7230 } 7231 7232 static char * 7233 convert_to_re(char *dev) 7234 { 7235 char *p, *l, *out; 7236 int i; 7237 7238 out = s_malloc(PATH_MAX); 7239 7240 for (l = p = dev, i = 0; (*p != '\0') && (i < (PATH_MAX - 1)); 7241 ++p, i++) { 7242 if ((*p == '*') && ((l != p) && (*l == '/'))) { 7243 out[i++] = '.'; 7244 out[i] = '+'; 7245 } else { 7246 out[i] = *p; 7247 } 7248 l = p; 7249 } 7250 out[i] = '\0'; 7251 p = (char *)s_malloc(strlen(out) + 1); 7252 (void) strlcpy(p, out, strlen(out) + 1); 7253 free(out); 7254 7255 vprint(FILES_MID, "converted %s -> %s\n", dev, p); 7256 7257 return (p); 7258 } 7259 7260 static void 7261 read_logindevperm_file(void) 7262 { 7263 static int cached = FALSE; 7264 static struct stat cached_sb; 7265 struct stat current_sb; 7266 struct login_dev *ldev; 7267 FILE *fp; 7268 char line[MAX_LDEV_LINE]; 7269 int ln, perm, rv; 7270 char *cp, *console, *dlist, *dev; 7271 char *lasts, *devlasts, *permstr, *drv; 7272 struct driver_list *list, *next; 7273 7274 /* Read logindevperm only when enabled */ 7275 if (login_dev_enable != TRUE) 7276 return; 7277 7278 if (cached == TRUE) { 7279 if (stat(LDEV_FILE, ¤t_sb) == 0 && 7280 current_sb.st_mtime == cached_sb.st_mtime) { 7281 vprint(FILES_MID, "%s cache valid\n", LDEV_FILE); 7282 return; 7283 } 7284 vprint(FILES_MID, "invalidating %s cache\n", LDEV_FILE); 7285 while (login_dev_cache != NULL) { 7286 7287 ldev = login_dev_cache; 7288 login_dev_cache = ldev->ldev_next; 7289 free(ldev->ldev_console); 7290 free(ldev->ldev_device); 7291 regfree(&ldev->ldev_device_regex); 7292 list = ldev->ldev_driver_list; 7293 while (list) { 7294 next = list->next; 7295 free(list); 7296 list = next; 7297 } 7298 free(ldev); 7299 } 7300 } else { 7301 cached = TRUE; 7302 } 7303 7304 assert(login_dev_cache == NULL); 7305 7306 if (stat(LDEV_FILE, &cached_sb) != 0) { 7307 cached = FALSE; 7308 return; 7309 } 7310 7311 vprint(FILES_MID, "loading file: %s\n", LDEV_FILE); 7312 7313 if ((fp = fopen(LDEV_FILE, "r")) == NULL) { 7314 /* Not fatal to devfsadm */ 7315 cached = FALSE; 7316 err_print(FOPEN_FAILED, LDEV_FILE, strerror(errno)); 7317 return; 7318 } 7319 7320 ln = 0; 7321 while (fgets(line, MAX_LDEV_LINE, fp) != NULL) { 7322 ln++; 7323 7324 /* Remove comments */ 7325 if ((cp = strchr(line, '#')) != NULL) 7326 *cp = '\0'; 7327 7328 if ((console = strtok_r(line, LDEV_DELIMS, &lasts)) == NULL) 7329 continue; /* Blank line */ 7330 7331 if ((permstr = strtok_r(NULL, LDEV_DELIMS, &lasts)) == NULL) { 7332 err_print(IGNORING_LINE_IN, ln, LDEV_FILE); 7333 continue; /* Malformed line */ 7334 } 7335 7336 /* 7337 * permstr is string in octal format. Convert to int 7338 */ 7339 cp = NULL; 7340 errno = 0; 7341 perm = strtol(permstr, &cp, 8); 7342 if (errno || perm < 0 || perm > 0777 || *cp != '\0') { 7343 err_print(IGNORING_LINE_IN, ln, LDEV_FILE); 7344 continue; 7345 } 7346 7347 if ((dlist = strtok_r(NULL, LDEV_DELIMS, &lasts)) == NULL) { 7348 err_print(IGNORING_LINE_IN, ln, LDEV_FILE); 7349 continue; 7350 } 7351 7352 dev = strtok_r(dlist, LDEV_DEV_DELIM, &devlasts); 7353 while (dev) { 7354 7355 ldev = (struct login_dev *)s_zalloc( 7356 sizeof (struct login_dev)); 7357 ldev->ldev_console = s_strdup(console); 7358 ldev->ldev_perms = perm; 7359 7360 /* 7361 * the logical device name may contain '*' which 7362 * we convert to a regular expression 7363 */ 7364 ldev->ldev_device = convert_to_re(dev); 7365 if (ldev->ldev_device && 7366 (rv = regcomp(&ldev->ldev_device_regex, 7367 ldev->ldev_device, REG_EXTENDED))) { 7368 bzero(&ldev->ldev_device_regex, 7369 sizeof (ldev->ldev_device_regex)); 7370 err_print(REGCOMP_FAILED, 7371 ldev->ldev_device, rv); 7372 } 7373 ldev->ldev_next = login_dev_cache; 7374 login_dev_cache = ldev; 7375 dev = strtok_r(NULL, LDEV_DEV_DELIM, &devlasts); 7376 } 7377 7378 drv = strtok_r(NULL, LDEV_DRVLIST_DELIMS, &lasts); 7379 if (drv) { 7380 if (strcmp(drv, LDEV_DRVLIST_NAME) == 0) { 7381 7382 drv = strtok_r(NULL, LDEV_DRV_DELIMS, 7383 &lasts); 7384 7385 while (drv) { 7386 vprint(FILES_MID, 7387 "logindevperm driver=%s\n", 7388 drv); 7389 7390 /* 7391 * create a linked list of driver 7392 * names 7393 */ 7394 list = (struct driver_list *) 7395 s_zalloc( 7396 sizeof (struct driver_list)); 7397 (void) strlcpy(list->driver_name, drv, 7398 sizeof (list->driver_name)); 7399 list->next = ldev->ldev_driver_list; 7400 ldev->ldev_driver_list = list; 7401 drv = strtok_r(NULL, LDEV_DRV_DELIMS, 7402 &lasts); 7403 } 7404 } 7405 } 7406 } 7407 (void) fclose(fp); 7408 } 7409 7410 /* 7411 * Tokens are separated by ' ', '\t', ':', '=', '&', '|', ';', '\n', or '\0' 7412 * 7413 * Returns DEVFSADM_SUCCESS if token found, DEVFSADM_FAILURE otherwise. 7414 */ 7415 static int 7416 getnexttoken(char *next, char **nextp, char **tokenpp, char *tchar) 7417 { 7418 char *cp; 7419 char *cp1; 7420 char *tokenp; 7421 7422 cp = next; 7423 while (*cp == ' ' || *cp == '\t') { 7424 cp++; /* skip leading spaces */ 7425 } 7426 tokenp = cp; /* start of token */ 7427 while (*cp != '\0' && *cp != '\n' && *cp != ' ' && *cp != '\t' && 7428 *cp != ':' && *cp != '=' && *cp != '&' && 7429 *cp != '|' && *cp != ';') { 7430 cp++; /* point to next character */ 7431 } 7432 /* 7433 * If terminating character is a space or tab, look ahead to see if 7434 * there's another terminator that's not a space or a tab. 7435 * (This code handles trailing spaces.) 7436 */ 7437 if (*cp == ' ' || *cp == '\t') { 7438 cp1 = cp; 7439 while (*++cp1 == ' ' || *cp1 == '\t') 7440 ; 7441 if (*cp1 == '=' || *cp1 == ':' || *cp1 == '&' || *cp1 == '|' || 7442 *cp1 == ';' || *cp1 == '\n' || *cp1 == '\0') { 7443 *cp = NULL; /* terminate token */ 7444 cp = cp1; 7445 } 7446 } 7447 if (tchar != NULL) { 7448 *tchar = *cp; /* save terminating character */ 7449 if (*tchar == '\0') { 7450 *tchar = '\n'; 7451 } 7452 } 7453 *cp++ = '\0'; /* terminate token, point to next */ 7454 *nextp = cp; /* set pointer to next character */ 7455 if (cp - tokenp - 1 == 0) { 7456 return (DEVFSADM_FAILURE); 7457 } 7458 *tokenpp = tokenp; 7459 return (DEVFSADM_SUCCESS); 7460 } 7461 7462 /* 7463 * read or reread the driver aliases file 7464 */ 7465 static void 7466 read_driver_aliases_file(void) 7467 { 7468 7469 driver_alias_t *save; 7470 driver_alias_t *lst_tail; 7471 driver_alias_t *ap; 7472 static int cached = FALSE; 7473 FILE *afd; 7474 char line[256]; 7475 char *cp; 7476 char *p; 7477 char t; 7478 int ln = 0; 7479 static struct stat cached_sb; 7480 struct stat current_sb; 7481 7482 (void) stat(ALIASFILE, ¤t_sb); 7483 7484 /* If already cached, check to see if it is still valid */ 7485 if (cached == TRUE) { 7486 7487 if (current_sb.st_mtime == cached_sb.st_mtime) { 7488 vprint(FILES_MID, "%s cache valid\n", ALIASFILE); 7489 return; 7490 } 7491 7492 vprint(FILES_MID, "invalidating %s cache\n", ALIASFILE); 7493 while (driver_aliases != NULL) { 7494 free(driver_aliases->alias_name); 7495 free(driver_aliases->driver_name); 7496 save = driver_aliases; 7497 driver_aliases = driver_aliases->next; 7498 free(save); 7499 } 7500 } else { 7501 cached = TRUE; 7502 } 7503 7504 (void) stat(ALIASFILE, &cached_sb); 7505 7506 vprint(FILES_MID, "loading binding file: %s\n", ALIASFILE); 7507 7508 if ((afd = fopen(ALIASFILE, "r")) == NULL) { 7509 err_print(FOPEN_FAILED, ALIASFILE, strerror(errno)); 7510 devfsadm_exit(1); 7511 } 7512 7513 while (fgets(line, sizeof (line), afd) != NULL) { 7514 ln++; 7515 /* cut off comments starting with '#' */ 7516 if ((cp = strchr(line, '#')) != NULL) 7517 *cp = '\0'; 7518 /* ignore comment or blank lines */ 7519 if (is_blank(line)) 7520 continue; 7521 cp = line; 7522 if (getnexttoken(cp, &cp, &p, &t) == DEVFSADM_FAILURE) { 7523 err_print(IGNORING_LINE_IN, ln, ALIASFILE); 7524 continue; 7525 } 7526 if (t == '\n' || t == '\0') { 7527 err_print(DRV_BUT_NO_ALIAS, ln, ALIASFILE); 7528 continue; 7529 } 7530 ap = (struct driver_alias *) 7531 s_zalloc(sizeof (struct driver_alias)); 7532 ap->driver_name = s_strdup(p); 7533 if (getnexttoken(cp, &cp, &p, &t) == DEVFSADM_FAILURE) { 7534 err_print(DRV_BUT_NO_ALIAS, ln, ALIASFILE); 7535 free(ap->driver_name); 7536 free(ap); 7537 continue; 7538 } 7539 if (*p == '"') { 7540 if (p[strlen(p) - 1] == '"') { 7541 p[strlen(p) - 1] = '\0'; 7542 p++; 7543 } 7544 } 7545 ap->alias_name = s_strdup(p); 7546 if (driver_aliases == NULL) { 7547 driver_aliases = ap; 7548 lst_tail = ap; 7549 } else { 7550 lst_tail->next = ap; 7551 lst_tail = ap; 7552 } 7553 } 7554 if (fclose(afd) == EOF) { 7555 err_print(FCLOSE_FAILED, ALIASFILE, strerror(errno)); 7556 } 7557 } 7558 7559 /* 7560 * return TRUE if alias_name is an alias for driver_name, otherwise 7561 * return FALSE. 7562 */ 7563 static int 7564 alias(char *driver_name, char *alias_name) 7565 { 7566 driver_alias_t *alias; 7567 7568 /* 7569 * check for a match 7570 */ 7571 for (alias = driver_aliases; alias != NULL; alias = alias->next) { 7572 if ((strcmp(alias->driver_name, driver_name) == 0) && 7573 (strcmp(alias->alias_name, alias_name) == 0)) { 7574 return (TRUE); 7575 } 7576 } 7577 return (FALSE); 7578 } 7579 7580 /* 7581 * convenience functions 7582 */ 7583 static int 7584 s_stat(const char *path, struct stat *sbufp) 7585 { 7586 int rv; 7587 retry: 7588 if ((rv = stat(path, sbufp)) == -1) { 7589 if (errno == EINTR) 7590 goto retry; 7591 } 7592 return (rv); 7593 } 7594 7595 static void * 7596 s_malloc(const size_t size) 7597 { 7598 void *rp; 7599 7600 rp = malloc(size); 7601 if (rp == NULL) { 7602 err_print(MALLOC_FAILED, size); 7603 devfsadm_exit(1); 7604 } 7605 return (rp); 7606 } 7607 7608 /* 7609 * convenience functions 7610 */ 7611 static void * 7612 s_realloc(void *ptr, const size_t size) 7613 { 7614 ptr = realloc(ptr, size); 7615 if (ptr == NULL) { 7616 err_print(REALLOC_FAILED, size); 7617 devfsadm_exit(1); 7618 } 7619 return (ptr); 7620 } 7621 7622 static void * 7623 s_zalloc(const size_t size) 7624 { 7625 void *rp; 7626 7627 rp = calloc(1, size); 7628 if (rp == NULL) { 7629 err_print(CALLOC_FAILED, size); 7630 devfsadm_exit(1); 7631 } 7632 return (rp); 7633 } 7634 7635 char * 7636 s_strdup(const char *ptr) 7637 { 7638 void *rp; 7639 7640 rp = strdup(ptr); 7641 if (rp == NULL) { 7642 err_print(STRDUP_FAILED, ptr); 7643 devfsadm_exit(1); 7644 } 7645 return (rp); 7646 } 7647 7648 static void 7649 s_closedir(DIR *dirp) 7650 { 7651 retry: 7652 if (closedir(dirp) != 0) { 7653 if (errno == EINTR) 7654 goto retry; 7655 err_print(CLOSEDIR_FAILED, strerror(errno)); 7656 } 7657 } 7658 7659 static void 7660 s_mkdirp(const char *path, const mode_t mode) 7661 { 7662 vprint(CHATTY_MID, "mkdirp(%s, 0x%lx)\n", path, mode); 7663 if (mkdirp(path, mode) == -1) { 7664 if (errno != EEXIST) { 7665 err_print(MKDIR_FAILED, path, mode, strerror(errno)); 7666 } 7667 } 7668 } 7669 7670 static void 7671 s_unlink(const char *file) 7672 { 7673 retry: 7674 if (unlink(file) == -1) { 7675 if (errno == EINTR || errno == EAGAIN) 7676 goto retry; 7677 if (errno != ENOENT) { 7678 err_print(UNLINK_FAILED, file, strerror(errno)); 7679 } 7680 } 7681 } 7682 7683 static void 7684 add_verbose_id(char *mid) 7685 { 7686 num_verbose++; 7687 verbose = s_realloc(verbose, num_verbose * sizeof (char *)); 7688 verbose[num_verbose - 1] = mid; 7689 } 7690 7691 /* 7692 * returns DEVFSADM_TRUE if contents is a minor node in /devices. 7693 * If mn_root is not NULL, mn_root is set to: 7694 * if contents is a /dev node, mn_root = contents 7695 * OR 7696 * if contents is a /devices node, mn_root set to the '/' 7697 * following /devices. 7698 */ 7699 static int 7700 is_minor_node(char *contents, char **mn_root) 7701 { 7702 char *ptr; 7703 char device_prefix[100]; 7704 7705 (void) snprintf(device_prefix, sizeof (device_prefix), "../devices/"); 7706 7707 if ((ptr = strstr(contents, device_prefix)) != NULL) { 7708 if (mn_root != NULL) { 7709 /* mn_root should point to the / following /devices */ 7710 *mn_root = ptr += strlen(device_prefix) - 1; 7711 } 7712 return (DEVFSADM_TRUE); 7713 } 7714 7715 (void) snprintf(device_prefix, sizeof (device_prefix), "/devices/"); 7716 7717 if (strncmp(contents, device_prefix, strlen(device_prefix)) == 0) { 7718 if (mn_root != NULL) { 7719 /* mn_root should point to the / following /devices */ 7720 *mn_root = contents + strlen(device_prefix) - 1; 7721 } 7722 return (DEVFSADM_TRUE); 7723 } 7724 7725 if (mn_root != NULL) { 7726 *mn_root = contents; 7727 } 7728 return (DEVFSADM_FALSE); 7729 } 7730 7731 /* 7732 * Lookup nvpair corresponding to the given name and type: 7733 * 7734 * The standard nvlist_lookup functions in libnvpair don't work as our 7735 * nvlist is not allocated with NV_UNIQUE_NAME or NV_UNIQUE_NAME_TYPE. 7736 */ 7737 static nvpair_t * 7738 lookup_nvpair(nvlist_t *nvl, char *name, data_type_t type) 7739 { 7740 nvpair_t *nvp; 7741 7742 for (nvp = nvlist_next_nvpair(nvl, NULL); nvp != NULL; 7743 nvp = nvlist_next_nvpair(nvl, nvp)) { 7744 if (strcmp(name, nvpair_name(nvp)) == 0 && 7745 nvpair_type(nvp) == type) 7746 return (nvp); 7747 } 7748 7749 return (NULL); 7750 } 7751 7752 /*ARGSUSED*/ 7753 static void 7754 process_rcm_events(void *arg) 7755 { 7756 struct rcm_eventq *ev, *ev_next; 7757 nvpair_t *nvp; 7758 char *path, *driver; 7759 int instance; 7760 int err; 7761 int need_to_exit; 7762 7763 for (;;) { 7764 (void) mutex_lock(&rcm_eventq_lock); 7765 while (rcm_eventq_head == NULL && 7766 need_to_exit_rcm_event_thread == 0) 7767 (void) cond_wait(&rcm_eventq_cv, &rcm_eventq_lock); 7768 7769 need_to_exit = need_to_exit_rcm_event_thread; 7770 ev = rcm_eventq_head; 7771 rcm_eventq_head = rcm_eventq_tail = NULL; 7772 (void) mutex_unlock(&rcm_eventq_lock); 7773 7774 for (; ev != NULL; ev = ev_next) { 7775 /* 7776 * Private notification interface to RCM: 7777 * Do not retry the RCM notification on an error since 7778 * we do not know whether the failure occurred in 7779 * librcm, rcm_daemon or rcm modules or scripts. 7780 */ 7781 if (librcm_notify_event(rcm_hdl, 7782 RCM_RESOURCE_NETWORK_NEW, 0, ev->nvl, NULL) 7783 != RCM_SUCCESS) { 7784 7785 err = errno; 7786 7787 if (((nvp = lookup_nvpair(ev->nvl, 7788 RCM_NV_DEVFS_PATH, DATA_TYPE_STRING)) 7789 == NULL) || 7790 (nvpair_value_string(nvp, &path) != 0)) 7791 path = "unknown"; 7792 7793 if (((nvp = lookup_nvpair(ev->nvl, 7794 RCM_NV_DRIVER_NAME, DATA_TYPE_STRING)) 7795 == NULL) || 7796 (nvpair_value_string(nvp, &driver) != 0)) 7797 driver = "unknown"; 7798 if (((nvp = lookup_nvpair(ev->nvl, 7799 RCM_NV_INSTANCE, DATA_TYPE_INT32)) 7800 == NULL) || 7801 (nvpair_value_int32(nvp, &instance) != 0)) 7802 instance = -1; 7803 7804 err_print(RCM_NOTIFY_FAILED, path, driver, 7805 instance, strerror(err)); 7806 } 7807 7808 ev_next = ev->next; 7809 nvlist_free(ev->nvl); 7810 free(ev); 7811 } 7812 7813 if (need_to_exit) 7814 return; 7815 } 7816 } 7817 7818 /* 7819 * Initialize rcm related handles and function pointers. 7820 * Since RCM need not present in miniroot, we dlopen librcm. 7821 */ 7822 static int 7823 rcm_init(void) 7824 { 7825 #define LIBRCM_PATH "/lib/librcm.so" 7826 rcm_handle_t *hdl = NULL; 7827 int err; 7828 7829 if ((librcm_hdl = dlopen(LIBRCM_PATH, RTLD_LAZY)) == NULL) { 7830 /* 7831 * don't log an error here, since librcm may not be present 7832 * in miniroot. 7833 */ 7834 return (-1); 7835 } 7836 7837 librcm_alloc_handle = (int (*)())dlsym(librcm_hdl, "rcm_alloc_handle"); 7838 librcm_free_handle = (void (*)())dlsym(librcm_hdl, "rcm_free_handle"); 7839 librcm_notify_event = (int (*)())dlsym(librcm_hdl, "rcm_notify_event"); 7840 7841 if (librcm_alloc_handle == NULL || librcm_notify_event == NULL || 7842 librcm_free_handle == NULL) { 7843 err_print(MISSING_SYMBOLS, LIBRCM_PATH); 7844 goto out; 7845 } 7846 7847 /* Initialize the rcm handle */ 7848 if (librcm_alloc_handle(NULL, 0, NULL, &hdl) != RCM_SUCCESS) { 7849 err_print(RCM_ALLOC_HANDLE_ERROR); 7850 goto out; 7851 } 7852 7853 (void) cond_init(&rcm_eventq_cv, USYNC_THREAD, 0); 7854 (void) mutex_init(&rcm_eventq_lock, USYNC_THREAD, 0); 7855 7856 /* create a thread to notify RCM of events */ 7857 if ((err = thr_create(NULL, 0, (void *(*)(void *))process_rcm_events, 7858 NULL, 0, &process_rcm_events_tid)) != 0) { 7859 err_print(CANT_CREATE_THREAD, "process_rcm_events", 7860 strerror(err)); 7861 goto out; 7862 } 7863 7864 rcm_hdl = hdl; 7865 return (0); 7866 7867 out: 7868 if (hdl) 7869 librcm_free_handle(hdl); 7870 (void) dlclose(librcm_hdl); 7871 return (-1); 7872 } 7873 7874 /* 7875 * Build an nvlist using the minor data. Pack it and add the packed nvlist 7876 * as a byte array to nv_list parameter. 7877 * Return 0 on success, errno on failure. 7878 */ 7879 static int 7880 add_minor_data_to_nvl(nvlist_t *nv_list, di_minor_t minor) 7881 { 7882 nvlist_t *nvl = NULL; 7883 int32_t minor_type; 7884 char *minor_name, *minor_node_type; 7885 int err; 7886 char *buf = NULL; 7887 size_t buflen = 0; 7888 7889 if ((err = nvlist_alloc(&nvl, 0, 0)) != 0) 7890 return (err); 7891 7892 minor_type = (int32_t)di_minor_type(minor); 7893 if ((err = nvlist_add_int32(nvl, RCM_NV_MINOR_TYPE, minor_type)) != 0) 7894 goto error; 7895 7896 minor_name = di_minor_name(minor); 7897 if ((err = nvlist_add_string(nvl, RCM_NV_MINOR_NAME, minor_name)) != 0) 7898 goto error; 7899 7900 if ((minor_node_type = di_minor_nodetype(minor)) == NULL) 7901 minor_node_type = ""; 7902 if ((err = nvlist_add_string(nvl, RCM_NV_MINOR_NODE_TYPE, 7903 minor_node_type)) != 0) 7904 goto error; 7905 7906 if ((err = nvlist_pack(nvl, &buf, &buflen, NV_ENCODE_NATIVE, 0)) != 0) 7907 goto error; 7908 7909 err = nvlist_add_byte_array(nv_list, RCM_NV_MINOR_DATA, 7910 (uchar_t *)(buf), (uint_t)(buflen)); 7911 7912 error: 7913 nvlist_free(nvl); 7914 if (buf) 7915 free(buf); 7916 return (err); 7917 } 7918 7919 static void 7920 enqueue_rcm_event(nvlist_t *nvl) 7921 { 7922 struct rcm_eventq *ev; 7923 7924 ev = (struct rcm_eventq *)s_zalloc(sizeof (struct rcm_eventq)); 7925 ev->nvl = nvl; 7926 7927 (void) mutex_lock(&rcm_eventq_lock); 7928 if (rcm_eventq_head == NULL) 7929 rcm_eventq_head = ev; 7930 else 7931 rcm_eventq_tail->next = ev; 7932 rcm_eventq_tail = ev; 7933 (void) cond_broadcast(&rcm_eventq_cv); 7934 (void) mutex_unlock(&rcm_eventq_lock); 7935 } 7936 7937 /* 7938 * Generate an nvlist using the information given in node and minor_name. 7939 * If minor_name is NULL the nvlist will contain information on 7940 * all minor nodes. Otherwise the nvlist will contain information 7941 * only on the given minor_name. Notify RCM passing the nvlist. 7942 * 7943 * Return 0 upon successfully notifying RCM, errno on failure. 7944 */ 7945 static int 7946 notify_rcm(di_node_t node, char *minor_name) 7947 { 7948 nvlist_t *nvl = NULL; 7949 char *path, *driver_name; 7950 char *node_name; 7951 int err; 7952 int32_t instance; 7953 di_minor_t minor; 7954 7955 if ((driver_name = di_driver_name(node)) == NULL) 7956 driver_name = ""; 7957 7958 instance = (int32_t)di_instance(node); 7959 7960 if ((path = di_devfs_path(node)) == NULL) { 7961 err = errno; 7962 goto error; 7963 } 7964 7965 if ((err = nvlist_alloc(&nvl, 0, 0)) != 0) 7966 goto error; 7967 7968 if ((err = nvlist_add_string(nvl, RCM_NV_DRIVER_NAME, driver_name)) 7969 != 0) 7970 goto error; 7971 7972 if ((err = nvlist_add_int32(nvl, RCM_NV_INSTANCE, instance)) != 0) 7973 goto error; 7974 7975 if ((node_name = di_node_name(node)) == NULL) 7976 node_name = ""; 7977 if ((err = nvlist_add_string(nvl, RCM_NV_NODE_NAME, node_name)) != 0) 7978 goto error; 7979 7980 if ((err = nvlist_add_string(nvl, RCM_NV_DEVFS_PATH, path)) != 0) 7981 goto error; 7982 7983 minor = di_minor_next(node, DI_MINOR_NIL); 7984 while (minor != DI_MINOR_NIL) { 7985 if ((minor_name == NULL) || 7986 (strcmp(minor_name, di_minor_name(minor)) == 0)) { 7987 if ((err = add_minor_data_to_nvl(nvl, minor)) != 0) 7988 goto error; 7989 } 7990 minor = di_minor_next(node, minor); 7991 } 7992 7993 enqueue_rcm_event(nvl); 7994 di_devfs_path_free(path); 7995 return (0); 7996 7997 error: 7998 err_print(RCM_NVLIST_BUILD_ERROR, ((path != NULL) ? path : "unknown"), 7999 driver_name, instance, strerror(err)); 8000 8001 if (path) 8002 di_devfs_path_free(path); 8003 if (nvl) 8004 nvlist_free(nvl); 8005 return (err); 8006 } 8007 8008 /* 8009 * Add the specified property to nvl. 8010 * Returns: 8011 * 0 successfully added 8012 * -1 an error occurred 8013 * 1 could not add the property for reasons not due to errors. 8014 */ 8015 static int 8016 add_property(nvlist_t *nvl, di_prop_t prop) 8017 { 8018 char *name; 8019 char *attr_name; 8020 int n, len; 8021 int32_t *int32p; 8022 int64_t *int64p; 8023 char *str; 8024 char **strarray; 8025 uchar_t *bytep; 8026 int rv = 0; 8027 int i; 8028 8029 if ((name = di_prop_name(prop)) == NULL) 8030 return (-1); 8031 8032 len = sizeof (DEV_PROP_PREFIX) + strlen(name); 8033 if ((attr_name = malloc(len)) == NULL) 8034 return (-1); 8035 8036 (void) strlcpy(attr_name, DEV_PROP_PREFIX, len); 8037 (void) strlcat(attr_name, name, len); 8038 8039 switch (di_prop_type(prop)) { 8040 case DI_PROP_TYPE_BOOLEAN: 8041 if (nvlist_add_boolean(nvl, attr_name) != 0) 8042 goto out; 8043 break; 8044 8045 case DI_PROP_TYPE_INT: 8046 if ((n = di_prop_ints(prop, &int32p)) < 1) 8047 goto out; 8048 8049 if (n <= (PROP_LEN_LIMIT / sizeof (int32_t))) { 8050 if (nvlist_add_int32_array(nvl, attr_name, int32p, 8051 n) != 0) 8052 goto out; 8053 } else 8054 rv = 1; 8055 break; 8056 8057 case DI_PROP_TYPE_INT64: 8058 if ((n = di_prop_int64(prop, &int64p)) < 1) 8059 goto out; 8060 8061 if (n <= (PROP_LEN_LIMIT / sizeof (int64_t))) { 8062 if (nvlist_add_int64_array(nvl, attr_name, int64p, 8063 n) != 0) 8064 goto out; 8065 } else 8066 rv = 1; 8067 break; 8068 8069 case DI_PROP_TYPE_BYTE: 8070 case DI_PROP_TYPE_UNKNOWN: 8071 if ((n = di_prop_bytes(prop, &bytep)) < 1) 8072 goto out; 8073 8074 if (n <= PROP_LEN_LIMIT) { 8075 if (nvlist_add_byte_array(nvl, attr_name, bytep, n) 8076 != 0) 8077 goto out; 8078 } else 8079 rv = 1; 8080 break; 8081 8082 case DI_PROP_TYPE_STRING: 8083 if ((n = di_prop_strings(prop, &str)) < 1) 8084 goto out; 8085 8086 if ((strarray = malloc(n * sizeof (char *))) == NULL) 8087 goto out; 8088 8089 len = 0; 8090 for (i = 0; i < n; i++) { 8091 strarray[i] = str + len; 8092 len += strlen(strarray[i]) + 1; 8093 } 8094 8095 if (len <= PROP_LEN_LIMIT) { 8096 if (nvlist_add_string_array(nvl, attr_name, strarray, 8097 n) != 0) { 8098 free(strarray); 8099 goto out; 8100 } 8101 } else 8102 rv = 1; 8103 free(strarray); 8104 break; 8105 8106 default: 8107 rv = 1; 8108 break; 8109 } 8110 8111 free(attr_name); 8112 return (rv); 8113 8114 out: 8115 free(attr_name); 8116 return (-1); 8117 } 8118 8119 static void 8120 free_dev_names(struct devlink_cb_arg *x) 8121 { 8122 int i; 8123 8124 for (i = 0; i < x->count; i++) { 8125 free(x->dev_names[i]); 8126 free(x->link_contents[i]); 8127 } 8128 } 8129 8130 /* callback function for di_devlink_cache_walk */ 8131 static int 8132 devlink_cb(di_devlink_t dl, void *arg) 8133 { 8134 struct devlink_cb_arg *x = (struct devlink_cb_arg *)arg; 8135 const char *path; 8136 const char *content; 8137 8138 if ((path = di_devlink_path(dl)) == NULL || 8139 (content = di_devlink_content(dl)) == NULL || 8140 (x->dev_names[x->count] = s_strdup(path)) == NULL) 8141 goto out; 8142 8143 if ((x->link_contents[x->count] = s_strdup(content)) == NULL) { 8144 free(x->dev_names[x->count]); 8145 goto out; 8146 } 8147 8148 x->count++; 8149 if (x->count >= MAX_DEV_NAME_COUNT) 8150 return (DI_WALK_TERMINATE); 8151 8152 return (DI_WALK_CONTINUE); 8153 8154 out: 8155 x->rv = -1; 8156 free_dev_names(x); 8157 return (DI_WALK_TERMINATE); 8158 } 8159 8160 /* 8161 * Lookup dev name corresponding to the phys_path. 8162 * phys_path is path to a node or minor node. 8163 * Returns: 8164 * 0 with *dev_name set to the dev name 8165 * Lookup succeeded and dev_name found 8166 * 0 with *dev_name set to NULL 8167 * Lookup encountered no errors but dev name not found 8168 * -1 8169 * Lookup failed 8170 */ 8171 static int 8172 lookup_dev_name(char *phys_path, char **dev_name) 8173 { 8174 struct devlink_cb_arg cb_arg; 8175 8176 *dev_name = NULL; 8177 8178 cb_arg.count = 0; 8179 cb_arg.rv = 0; 8180 (void) di_devlink_cache_walk(devlink_cache, NULL, phys_path, 8181 DI_PRIMARY_LINK, &cb_arg, devlink_cb); 8182 8183 if (cb_arg.rv == -1) 8184 return (-1); 8185 8186 if (cb_arg.count > 0) { 8187 *dev_name = s_strdup(cb_arg.dev_names[0]); 8188 free_dev_names(&cb_arg); 8189 if (*dev_name == NULL) 8190 return (-1); 8191 } 8192 8193 return (0); 8194 } 8195 8196 static char * 8197 lookup_disk_dev_name(char *node_path) 8198 { 8199 struct devlink_cb_arg cb_arg; 8200 char *dev_name = NULL; 8201 int i; 8202 char *p; 8203 int len1, len2; 8204 8205 #define DEV_RDSK "/dev/rdsk/" 8206 #define DISK_RAW_MINOR ",raw" 8207 8208 cb_arg.count = 0; 8209 cb_arg.rv = 0; 8210 (void) di_devlink_cache_walk(devlink_cache, NULL, node_path, 8211 DI_PRIMARY_LINK, &cb_arg, devlink_cb); 8212 8213 if (cb_arg.rv == -1 || cb_arg.count == 0) 8214 return (NULL); 8215 8216 /* first try lookup based on /dev/rdsk name */ 8217 for (i = 0; i < cb_arg.count; i++) { 8218 if (strncmp(cb_arg.dev_names[i], DEV_RDSK, 8219 sizeof (DEV_RDSK) - 1) == 0) { 8220 dev_name = s_strdup(cb_arg.dev_names[i]); 8221 break; 8222 } 8223 } 8224 8225 if (dev_name == NULL) { 8226 /* now try lookup based on a minor name ending with ",raw" */ 8227 len1 = sizeof (DISK_RAW_MINOR) - 1; 8228 for (i = 0; i < cb_arg.count; i++) { 8229 len2 = strlen(cb_arg.link_contents[i]); 8230 if (len2 >= len1 && 8231 strcmp(cb_arg.link_contents[i] + len2 - len1, 8232 DISK_RAW_MINOR) == 0) { 8233 dev_name = s_strdup(cb_arg.dev_names[i]); 8234 break; 8235 } 8236 } 8237 } 8238 8239 free_dev_names(&cb_arg); 8240 8241 if (dev_name == NULL) 8242 return (NULL); 8243 if (strlen(dev_name) == 0) { 8244 free(dev_name); 8245 return (NULL); 8246 } 8247 8248 /* if the name contains slice or partition number strip it */ 8249 p = dev_name + strlen(dev_name) - 1; 8250 if (isdigit(*p)) { 8251 while (p != dev_name && isdigit(*p)) 8252 p--; 8253 if (*p == 's' || *p == 'p') 8254 *p = '\0'; 8255 } 8256 8257 return (dev_name); 8258 } 8259 8260 static char * 8261 lookup_lofi_dev_name(char *node_path, char *minor) 8262 { 8263 struct devlink_cb_arg cb_arg; 8264 char *dev_name = NULL; 8265 int i; 8266 int len1, len2; 8267 8268 cb_arg.count = 0; 8269 cb_arg.rv = 0; 8270 (void) di_devlink_cache_walk(devlink_cache, NULL, node_path, 8271 DI_PRIMARY_LINK, &cb_arg, devlink_cb); 8272 8273 if (cb_arg.rv == -1 || cb_arg.count == 0) 8274 return (NULL); 8275 8276 /* lookup based on a minor name ending with ",raw" */ 8277 len1 = strlen(minor); 8278 for (i = 0; i < cb_arg.count; i++) { 8279 len2 = strlen(cb_arg.link_contents[i]); 8280 if (len2 >= len1 && 8281 strcmp(cb_arg.link_contents[i] + len2 - len1, 8282 minor) == 0) { 8283 dev_name = s_strdup(cb_arg.dev_names[i]); 8284 break; 8285 } 8286 } 8287 8288 free_dev_names(&cb_arg); 8289 8290 if (dev_name == NULL) 8291 return (NULL); 8292 if (strlen(dev_name) == 0) { 8293 free(dev_name); 8294 return (NULL); 8295 } 8296 8297 return (dev_name); 8298 } 8299 8300 static char * 8301 lookup_network_dev_name(char *node_path, char *driver_name) 8302 { 8303 char *dev_name = NULL; 8304 char phys_path[MAXPATHLEN]; 8305 8306 if (lookup_dev_name(node_path, &dev_name) == -1) 8307 return (NULL); 8308 8309 if (dev_name == NULL) { 8310 /* dlpi style-2 only interface */ 8311 (void) snprintf(phys_path, sizeof (phys_path), 8312 "/pseudo/clone@0:%s", driver_name); 8313 if (lookup_dev_name(phys_path, &dev_name) == -1 || 8314 dev_name == NULL) 8315 return (NULL); 8316 } 8317 8318 return (dev_name); 8319 } 8320 8321 static char * 8322 lookup_printer_dev_name(char *node_path) 8323 { 8324 struct devlink_cb_arg cb_arg; 8325 char *dev_name = NULL; 8326 int i; 8327 8328 #define DEV_PRINTERS "/dev/printers/" 8329 8330 cb_arg.count = 0; 8331 cb_arg.rv = 0; 8332 (void) di_devlink_cache_walk(devlink_cache, NULL, node_path, 8333 DI_PRIMARY_LINK, &cb_arg, devlink_cb); 8334 8335 if (cb_arg.rv == -1 || cb_arg.count == 0) 8336 return (NULL); 8337 8338 /* first try lookup based on /dev/printers name */ 8339 for (i = 0; i < cb_arg.count; i++) { 8340 if (strncmp(cb_arg.dev_names[i], DEV_PRINTERS, 8341 sizeof (DEV_PRINTERS) - 1) == 0) { 8342 dev_name = s_strdup(cb_arg.dev_names[i]); 8343 break; 8344 } 8345 } 8346 8347 /* fallback to the first name */ 8348 if ((dev_name == NULL) && (cb_arg.count > 0)) 8349 dev_name = s_strdup(cb_arg.dev_names[0]); 8350 8351 free_dev_names(&cb_arg); 8352 8353 return (dev_name); 8354 } 8355 8356 /* 8357 * Build an nvlist containing all attributes for devfs events. 8358 * Returns nvlist pointer on success, NULL on failure. 8359 */ 8360 static nvlist_t * 8361 build_event_attributes(char *class, char *subclass, char *node_path, 8362 di_node_t node, char *driver_name, int instance, char *minor) 8363 { 8364 nvlist_t *nvl; 8365 int err = 0; 8366 di_prop_t prop; 8367 int count; 8368 char *prop_name; 8369 int x; 8370 char *dev_name = NULL; 8371 int dev_name_lookup_err = 0; 8372 8373 if ((err = nvlist_alloc(&nvl, NV_UNIQUE_NAME_TYPE, 0)) != 0) { 8374 nvl = NULL; 8375 goto out; 8376 } 8377 8378 if ((err = nvlist_add_int32(nvl, EV_VERSION, EV_V1)) != 0) 8379 goto out; 8380 8381 if ((err = nvlist_add_string(nvl, DEV_PHYS_PATH, node_path)) != 0) 8382 goto out; 8383 8384 if (strcmp(class, EC_DEV_ADD) != 0 && 8385 strcmp(class, EC_DEV_REMOVE) != 0) 8386 return (nvl); 8387 8388 if (driver_name == NULL || instance == -1) 8389 goto out; 8390 8391 if (strcmp(subclass, ESC_DISK) == 0) { 8392 if ((dev_name = lookup_disk_dev_name(node_path)) == NULL) { 8393 dev_name_lookup_err = 1; 8394 goto out; 8395 } 8396 } else if (strcmp(subclass, ESC_NETWORK) == 0) { 8397 if ((dev_name = lookup_network_dev_name(node_path, driver_name)) 8398 == NULL) { 8399 dev_name_lookup_err = 1; 8400 goto out; 8401 } 8402 } else if (strcmp(subclass, ESC_PRINTER) == 0) { 8403 if ((dev_name = lookup_printer_dev_name(node_path)) == NULL) { 8404 dev_name_lookup_err = 1; 8405 goto out; 8406 } 8407 } else if (strcmp(subclass, ESC_LOFI) == 0) { 8408 /* 8409 * The raw minor node is created or removed after the block 8410 * node. Lofi devfs events are dependent on this behavior. 8411 * Generate the sysevent only for the raw minor node. 8412 */ 8413 if (strstr(minor, "raw") == NULL) { 8414 if (nvl) { 8415 nvlist_free(nvl); 8416 } 8417 return (NULL); 8418 } 8419 if ((dev_name = lookup_lofi_dev_name(node_path, minor)) == 8420 NULL) { 8421 dev_name_lookup_err = 1; 8422 goto out; 8423 } 8424 } 8425 8426 if (dev_name) { 8427 if ((err = nvlist_add_string(nvl, DEV_NAME, dev_name)) != 0) 8428 goto out; 8429 free(dev_name); 8430 dev_name = NULL; 8431 } 8432 8433 if ((err = nvlist_add_string(nvl, DEV_DRIVER_NAME, driver_name)) != 0) 8434 goto out; 8435 8436 if ((err = nvlist_add_int32(nvl, DEV_INSTANCE, instance)) != 0) 8437 goto out; 8438 8439 if (strcmp(class, EC_DEV_ADD) == 0) { 8440 /* add properties */ 8441 count = 0; 8442 for (prop = di_prop_next(node, DI_PROP_NIL); 8443 prop != DI_PROP_NIL && count < MAX_PROP_COUNT; 8444 prop = di_prop_next(node, prop)) { 8445 8446 if (di_prop_devt(prop) != DDI_DEV_T_NONE) 8447 continue; 8448 8449 if ((x = add_property(nvl, prop)) == 0) 8450 count++; 8451 else if (x == -1) { 8452 if ((prop_name = di_prop_name(prop)) == NULL) 8453 prop_name = ""; 8454 err_print(PROP_ADD_FAILED, prop_name); 8455 goto out; 8456 } 8457 } 8458 } 8459 8460 return (nvl); 8461 8462 out: 8463 if (nvl) 8464 nvlist_free(nvl); 8465 8466 if (dev_name) 8467 free(dev_name); 8468 8469 if (dev_name_lookup_err) 8470 err_print(DEV_NAME_LOOKUP_FAILED, node_path); 8471 else 8472 err_print(BUILD_EVENT_ATTR_FAILED, (err) ? strerror(err) : ""); 8473 return (NULL); 8474 } 8475 8476 static void 8477 log_event(char *class, char *subclass, nvlist_t *nvl) 8478 { 8479 sysevent_id_t eid; 8480 8481 if (sysevent_post_event(class, subclass, "SUNW", DEVFSADMD, 8482 nvl, &eid) != 0) { 8483 err_print(LOG_EVENT_FAILED, strerror(errno)); 8484 } 8485 } 8486 8487 /* 8488 * When devfsadmd needs to generate sysevents, they are queued for later 8489 * delivery this allows them to be delivered after the devlinks db cache has 8490 * been flushed guaranteeing that applications consuming these events have 8491 * access to an accurate devlinks db. The queue is a FIFO, sysevents to be 8492 * inserted in the front of the queue and consumed off the back. 8493 */ 8494 static void 8495 enqueue_sysevent(char *class, char *subclass, nvlist_t *nvl) 8496 { 8497 syseventq_t *tmp; 8498 8499 if ((tmp = s_zalloc(sizeof (*tmp))) == NULL) 8500 return; 8501 8502 tmp->class = s_strdup(class); 8503 tmp->subclass = s_strdup(subclass); 8504 tmp->nvl = nvl; 8505 8506 (void) mutex_lock(&syseventq_mutex); 8507 if (syseventq_front != NULL) 8508 syseventq_front->next = tmp; 8509 else 8510 syseventq_back = tmp; 8511 syseventq_front = tmp; 8512 (void) mutex_unlock(&syseventq_mutex); 8513 } 8514 8515 static void 8516 process_syseventq() 8517 { 8518 (void) mutex_lock(&syseventq_mutex); 8519 while (syseventq_back != NULL) { 8520 syseventq_t *tmp = syseventq_back; 8521 8522 vprint(CHATTY_MID, "sending queued event: %s, %s\n", 8523 tmp->class, tmp->subclass); 8524 8525 log_event(tmp->class, tmp->subclass, tmp->nvl); 8526 8527 if (tmp->class != NULL) 8528 free(tmp->class); 8529 if (tmp->subclass != NULL) 8530 free(tmp->subclass); 8531 if (tmp->nvl != NULL) 8532 nvlist_free(tmp->nvl); 8533 syseventq_back = syseventq_back->next; 8534 if (syseventq_back == NULL) 8535 syseventq_front = NULL; 8536 free(tmp); 8537 } 8538 (void) mutex_unlock(&syseventq_mutex); 8539 } 8540 8541 static void 8542 build_and_enq_event(char *class, char *subclass, char *node_path, 8543 di_node_t node, char *minor) 8544 { 8545 nvlist_t *nvl; 8546 8547 vprint(CHATTY_MID, "build_and_enq_event(%s, %s, %s, 0x%8.8x)\n", 8548 class, subclass, node_path, (int)node); 8549 8550 if (node != DI_NODE_NIL) 8551 nvl = build_event_attributes(class, subclass, node_path, node, 8552 di_driver_name(node), di_instance(node), minor); 8553 else 8554 nvl = build_event_attributes(class, subclass, node_path, node, 8555 NULL, -1, minor); 8556 8557 if (nvl) { 8558 enqueue_sysevent(class, subclass, nvl); 8559 } 8560 } 8561 8562 /* 8563 * is_blank() returns 1 (true) if a line specified is composed of 8564 * whitespace characters only. otherwise, it returns 0 (false). 8565 * 8566 * Note. the argument (line) must be null-terminated. 8567 */ 8568 static int 8569 is_blank(char *line) 8570 { 8571 for (/* nothing */; *line != '\0'; line++) 8572 if (!isspace(*line)) 8573 return (0); 8574 return (1); 8575 } 8576 8577 /* 8578 * Functions to deal with the no-further-processing hash 8579 */ 8580 8581 static void 8582 nfphash_create(void) 8583 { 8584 assert(nfp_hash == NULL); 8585 nfp_hash = s_zalloc(NFP_HASH_SZ * sizeof (item_t *)); 8586 } 8587 8588 static int 8589 nfphash_fcn(char *key) 8590 { 8591 int i; 8592 uint64_t sum = 0; 8593 8594 for (i = 0; key[i] != '\0'; i++) { 8595 sum += (uchar_t)key[i]; 8596 } 8597 8598 return (sum % NFP_HASH_SZ); 8599 } 8600 8601 static item_t * 8602 nfphash_lookup(char *key) 8603 { 8604 int index; 8605 item_t *ip; 8606 8607 index = nfphash_fcn(key); 8608 8609 assert(index >= 0); 8610 8611 for (ip = nfp_hash[index]; ip; ip = ip->i_next) { 8612 if (strcmp(ip->i_key, key) == 0) 8613 return (ip); 8614 } 8615 8616 return (NULL); 8617 } 8618 8619 static void 8620 nfphash_insert(char *key) 8621 { 8622 item_t *ip; 8623 int index; 8624 8625 index = nfphash_fcn(key); 8626 8627 assert(index >= 0); 8628 8629 ip = s_zalloc(sizeof (item_t)); 8630 ip->i_key = s_strdup(key); 8631 8632 ip->i_next = nfp_hash[index]; 8633 nfp_hash[index] = ip; 8634 } 8635 8636 static void 8637 nfphash_destroy(void) 8638 { 8639 int i; 8640 item_t *ip; 8641 8642 for (i = 0; i < NFP_HASH_SZ; i++) { 8643 /*LINTED*/ 8644 while (ip = nfp_hash[i]) { 8645 nfp_hash[i] = ip->i_next; 8646 free(ip->i_key); 8647 free(ip); 8648 } 8649 } 8650 8651 free(nfp_hash); 8652 nfp_hash = NULL; 8653 } 8654 8655 static int 8656 devname_kcall(int subcmd, void *args) 8657 { 8658 int error = 0; 8659 char *nvlbuf = NULL; 8660 size_t nvlsize; 8661 8662 switch (subcmd) { 8663 case MODDEVNAME_NSMAPS: 8664 error = nvlist_pack((nvlist_t *)args, &nvlbuf, &nvlsize, 0, 0); 8665 if (error) { 8666 err_print("packing MODDEVNAME_NSMAPS failed\n"); 8667 break; 8668 } 8669 error = modctl(MODDEVNAME, subcmd, nvlbuf, nvlsize); 8670 if (error) { 8671 vprint(INFO_MID, "modctl(MODDEVNAME, " 8672 "MODDEVNAME_NSMAPS) failed - %s\n", 8673 strerror(errno)); 8674 } 8675 free(nvlbuf); 8676 nvlist_free(args); 8677 break; 8678 case MODDEVNAME_LOOKUPDOOR: 8679 error = modctl(MODDEVNAME, subcmd, (uintptr_t)args); 8680 if (error) { 8681 vprint(INFO_MID, "modctl(MODDEVNAME, " 8682 "MODDEVNAME_LOOKUPDOOR) failed - %s\n", 8683 strerror(errno)); 8684 } 8685 break; 8686 default: 8687 error = EINVAL; 8688 break; 8689 } 8690 return (error); 8691 } 8692 8693 static void 8694 devname_setup_nsmaps(void) 8695 { 8696 int error = 0; 8697 8698 if (devname_first_call) { 8699 devname_first_call = 0; 8700 } 8701 8702 error = di_devname_get_mapinfo(DEVNAME_MASTER_MAP, &devname_maps); 8703 8704 if (error) { 8705 vprint(DEVNAME_MID, "devname_setup_nsmaps: non-existing/empty" 8706 "%s\n", DEVNAME_MASTER_MAP); 8707 } else { 8708 di_devname_print_mapinfo(devname_maps); 8709 8710 /* pass down the existing map names to kernel */ 8711 (void) devname_kcall(MODDEVNAME_NSMAPS, (void *)devname_maps); 8712 } 8713 } 8714 8715 static void 8716 devname_ns_services(uint8_t cmd, char *key, char *map) 8717 { 8718 nvlist_t *nvl = NULL; 8719 int32_t error = 0; 8720 sdev_door_res_t res; 8721 8722 vprint(DEVNAME_MID, "devname_ns_services: cmd %d key %s map %s\n", 8723 cmd, key, map); 8724 8725 switch (cmd) { 8726 case DEVFSADMD_NS_LOOKUP: 8727 vprint(DEVNAME_MID, "calling di_devname_get_mapent\n"); 8728 error = di_devname_get_mapent(key, map, &nvl); 8729 if (nvl == NULL) { 8730 error = DEVFSADM_NS_FAILED; 8731 goto done; 8732 } 8733 8734 if (error) { 8735 nvlist_free(nvl); 8736 goto done; 8737 } 8738 8739 if (devname_debug_msg) 8740 di_devname_print_mapinfo(nvl); 8741 8742 vprint(DEVNAME_MID, "calling di_devname_action_on_key for %d\n", 8743 cmd); 8744 error = di_devname_action_on_key(nvl, cmd, key, (void *)&res); 8745 nvlist_free(nvl); 8746 break; 8747 case DEVFSADMD_NS_READDIR: 8748 vprint(DEVNAME_MID, "calling di_devname_get_mapinfo for cmd %d" 8749 "\n", cmd); 8750 error = di_devname_get_mapinfo(map, &nvl); 8751 if (nvl == NULL) { 8752 error = DEVFSADM_NS_FAILED; 8753 goto done; 8754 } 8755 8756 if (error) { 8757 nvlist_free(nvl); 8758 goto done; 8759 } 8760 8761 if (devname_debug_msg) 8762 di_devname_print_mapinfo(nvl); 8763 8764 vprint(DEVNAME_MID, "calling di_devname_action_on_key\n"); 8765 error = di_devname_action_on_key(nvl, cmd, key, (void *)&res); 8766 nvlist_free(nvl); 8767 break; 8768 default: 8769 error = DEVFSADM_RUN_NOTSUP; 8770 break; 8771 } 8772 8773 done: 8774 vprint(DEVNAME_MID, "error %d\n", error); 8775 res.devfsadm_error = error; 8776 (void) door_return((char *)&res, sizeof (struct sdev_door_res), 8777 NULL, 0); 8778 } 8779 8780 /* ARGSUSED */ 8781 static void 8782 devname_lookup_handler(void *cookie, char *argp, size_t arg_size, 8783 door_desc_t *dp, uint_t n_desc) 8784 { 8785 int32_t error = 0; 8786 door_cred_t dcred; 8787 struct dca_impl dci; 8788 uint8_t cmd; 8789 char *ns_map, *ns_name; 8790 sdev_door_res_t res; 8791 sdev_door_arg_t *args; 8792 8793 if (argp == NULL || arg_size == 0) { 8794 vprint(DEVNAME_MID, "devname_lookup_handler: argp wrong\n"); 8795 error = DEVFSADM_RUN_INVALID; 8796 goto done; 8797 } 8798 vprint(DEVNAME_MID, "devname_lookup_handler\n"); 8799 8800 if (door_cred(&dcred) != 0 || dcred.dc_euid != 0) { 8801 vprint(DEVNAME_MID, "devname_lookup_handler: cred wrong\n"); 8802 error = DEVFSADM_RUN_EPERM; 8803 goto done; 8804 } 8805 8806 args = (sdev_door_arg_t *)argp; 8807 cmd = args->devfsadm_cmd; 8808 8809 vprint(DEVNAME_MID, "devname_lookup_handler: cmd %d\n", cmd); 8810 switch (cmd) { 8811 case DEVFSADMD_NS_LOOKUP: 8812 case DEVFSADMD_NS_READDIR: 8813 ns_name = s_strdup(args->ns_hdl.ns_name); 8814 ns_map = s_strdup(args->ns_hdl.ns_map); 8815 8816 vprint(DEVNAME_MID, " ns_name %s ns_map %s\n", ns_name, ns_map); 8817 if (ns_name == NULL || ns_map == NULL) { 8818 error = DEVFSADM_RUN_INVALID; 8819 goto done; 8820 } 8821 8822 devname_ns_services(cmd, ns_name, ns_map); 8823 return; 8824 case DEVFSADMD_RUN_ALL: 8825 /* 8826 * run "devfsadm" 8827 */ 8828 dci.dci_root = "/"; 8829 dci.dci_minor = NULL; 8830 dci.dci_driver = NULL; 8831 dci.dci_error = 0; 8832 dci.dci_flags = 0; 8833 dci.dci_arg = NULL; 8834 8835 lock_dev(); 8836 update_drvconf((major_t)-1); 8837 dci.dci_flags |= DCA_FLUSH_PATHINST; 8838 8839 pre_and_post_cleanup(RM_PRE); 8840 devi_tree_walk(&dci, DINFOFORCE|DI_CACHE_SNAPSHOT_FLAGS, NULL); 8841 error = (int32_t)dci.dci_error; 8842 if (!error) { 8843 pre_and_post_cleanup(RM_POST); 8844 update_database = TRUE; 8845 unlock_dev(SYNC_STATE); 8846 update_database = FALSE; 8847 } else { 8848 if (DEVFSADM_DEBUG_ON) { 8849 vprint(INFO_MID, "devname_lookup_handler: " 8850 "DEVFSADMD_RUN_ALL failed\n"); 8851 } 8852 8853 unlock_dev(SYNC_STATE); 8854 } 8855 break; 8856 default: 8857 /* log an error here? */ 8858 error = DEVFSADM_RUN_NOTSUP; 8859 break; 8860 } 8861 8862 done: 8863 vprint(DEVNAME_MID, "devname_lookup_handler: error %d\n", error); 8864 res.devfsadm_error = error; 8865 (void) door_return((char *)&res, sizeof (struct sdev_door_res), 8866 NULL, 0); 8867 } 8868 8869 8870 di_devlink_handle_t 8871 devfsadm_devlink_cache(void) 8872 { 8873 return (devlink_cache); 8874 } 8875 8876 int 8877 devfsadm_reserve_id_cache(devlink_re_t re_array[], enumerate_file_t *head) 8878 { 8879 enumerate_file_t *entry; 8880 int nelem; 8881 int i; 8882 int subex; 8883 char *re; 8884 size_t size; 8885 regmatch_t *pmch; 8886 8887 /* 8888 * Check the <RE, subexp> array passed in and compile it. 8889 */ 8890 for (i = 0; re_array[i].d_re; i++) { 8891 if (re_array[i].d_subexp == 0) { 8892 err_print("bad subexp value in RE: %s\n", 8893 re_array[i].d_re); 8894 goto bad_re; 8895 } 8896 8897 re = re_array[i].d_re; 8898 if (regcomp(&re_array[i].d_rcomp, re, REG_EXTENDED) != 0) { 8899 err_print("reg. exp. failed to compile: %s\n", re); 8900 goto bad_re; 8901 } 8902 subex = re_array[i].d_subexp; 8903 nelem = subex + 1; 8904 re_array[i].d_pmatch = s_malloc(sizeof (regmatch_t) * nelem); 8905 } 8906 8907 entry = head ? head : enumerate_reserved; 8908 for (; entry; entry = entry->er_next) { 8909 if (entry->er_id) { 8910 vprint(RSBY_MID, "entry %s already has ID %s\n", 8911 entry->er_file, entry->er_id); 8912 continue; 8913 } 8914 for (i = 0; re_array[i].d_re; i++) { 8915 subex = re_array[i].d_subexp; 8916 pmch = re_array[i].d_pmatch; 8917 if (regexec(&re_array[i].d_rcomp, entry->er_file, 8918 subex + 1, pmch, 0) != 0) { 8919 /* No match */ 8920 continue; 8921 } 8922 size = pmch[subex].rm_eo - pmch[subex].rm_so; 8923 entry->er_id = s_malloc(size + 1); 8924 (void) strncpy(entry->er_id, 8925 &entry->er_file[pmch[subex].rm_so], size); 8926 entry->er_id[size] = '\0'; 8927 if (head) { 8928 vprint(RSBY_MID, "devlink(%s) matches RE(%s). " 8929 "ID is %s\n", entry->er_file, 8930 re_array[i].d_re, entry->er_id); 8931 } else { 8932 vprint(RSBY_MID, "rsrv entry(%s) matches " 8933 "RE(%s) ID is %s\n", entry->er_file, 8934 re_array[i].d_re, entry->er_id); 8935 } 8936 break; 8937 } 8938 } 8939 8940 for (i = 0; re_array[i].d_re; i++) { 8941 regfree(&re_array[i].d_rcomp); 8942 assert(re_array[i].d_pmatch); 8943 free(re_array[i].d_pmatch); 8944 } 8945 8946 entry = head ? head : enumerate_reserved; 8947 for (; entry; entry = entry->er_next) { 8948 if (entry->er_id == NULL) 8949 continue; 8950 if (head) { 8951 vprint(RSBY_MID, "devlink: %s\n", entry->er_file); 8952 vprint(RSBY_MID, "ID: %s\n", entry->er_id); 8953 } else { 8954 vprint(RSBY_MID, "reserve file entry: %s\n", 8955 entry->er_file); 8956 vprint(RSBY_MID, "reserve file id: %s\n", 8957 entry->er_id); 8958 } 8959 } 8960 8961 return (DEVFSADM_SUCCESS); 8962 8963 bad_re: 8964 for (i = i-1; i >= 0; i--) { 8965 regfree(&re_array[i].d_rcomp); 8966 assert(re_array[i].d_pmatch); 8967 free(re_array[i].d_pmatch); 8968 } 8969 return (DEVFSADM_FAILURE); 8970 } 8971 8972 /* 8973 * This functions errs on the side of caution. If there is any error 8974 * we assume that the devlink is *not* reserved 8975 */ 8976 int 8977 devfsadm_is_reserved(devlink_re_t re_array[], char *devlink) 8978 { 8979 int match; 8980 enumerate_file_t estruct = {NULL}; 8981 enumerate_file_t *entry; 8982 8983 match = 0; 8984 estruct.er_file = devlink; 8985 estruct.er_id = NULL; 8986 estruct.er_next = NULL; 8987 8988 if (devfsadm_reserve_id_cache(re_array, &estruct) != DEVFSADM_SUCCESS) { 8989 err_print("devfsadm_is_reserved: devlink (%s) does not " 8990 "match RE\n", devlink); 8991 return (0); 8992 } 8993 if (estruct.er_id == NULL) { 8994 err_print("devfsadm_is_reserved: ID derived from devlink %s " 8995 "is NULL\n", devlink); 8996 return (0); 8997 } 8998 8999 entry = enumerate_reserved; 9000 for (; entry; entry = entry->er_next) { 9001 if (entry->er_id == NULL) 9002 continue; 9003 if (strcmp(entry->er_id, estruct.er_id) != 0) 9004 continue; 9005 match = 1; 9006 vprint(RSBY_MID, "reserve file entry (%s) and devlink (%s) " 9007 "match\n", entry->er_file, devlink); 9008 break; 9009 } 9010 9011 free(estruct.er_id); 9012 return (match); 9013 } 9014