xref: /titanic_44/usr/src/lib/libdevinfo/devinfo_devperm.c (revision c0eb16d4ff2fe43d82b2d148df266751e6201db8)
17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate  * CDDL HEADER START
37c478bd9Sstevel@tonic-gate  *
47c478bd9Sstevel@tonic-gate  * The contents of this file are subject to the terms of the
5facf4a8dSllai1  * Common Development and Distribution License (the "License").
6facf4a8dSllai1  * You may not use this file except in compliance with the License.
77c478bd9Sstevel@tonic-gate  *
87c478bd9Sstevel@tonic-gate  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
97c478bd9Sstevel@tonic-gate  * or http://www.opensolaris.org/os/licensing.
107c478bd9Sstevel@tonic-gate  * See the License for the specific language governing permissions
117c478bd9Sstevel@tonic-gate  * and limitations under the License.
127c478bd9Sstevel@tonic-gate  *
137c478bd9Sstevel@tonic-gate  * When distributing Covered Code, include this CDDL HEADER in each
147c478bd9Sstevel@tonic-gate  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
157c478bd9Sstevel@tonic-gate  * If applicable, add the following below this CDDL HEADER, with the
167c478bd9Sstevel@tonic-gate  * fields enclosed by brackets "[]" replaced with your own identifying
177c478bd9Sstevel@tonic-gate  * information: Portions Copyright [yyyy] [name of copyright owner]
187c478bd9Sstevel@tonic-gate  *
197c478bd9Sstevel@tonic-gate  * CDDL HEADER END
207c478bd9Sstevel@tonic-gate  */
217c478bd9Sstevel@tonic-gate /*
22c4ca7dc0Sfrits  * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
237c478bd9Sstevel@tonic-gate  * Use is subject to license terms.
247c478bd9Sstevel@tonic-gate  */
257c478bd9Sstevel@tonic-gate 
267c478bd9Sstevel@tonic-gate #pragma ident	"%Z%%M%	%I%	%E% SMI"
277c478bd9Sstevel@tonic-gate 
284bc0a2efScasper #define	_POSIX_PTHREAD_SEMANTICS	/* for getgrnam_r */
297c478bd9Sstevel@tonic-gate #ifdef lint
307c478bd9Sstevel@tonic-gate #define	_REENTRANT			/* for strtok_r */
317c478bd9Sstevel@tonic-gate #endif
327c478bd9Sstevel@tonic-gate 
337c478bd9Sstevel@tonic-gate #include <stdio.h>
347c478bd9Sstevel@tonic-gate #include <stdlib.h>
357c478bd9Sstevel@tonic-gate #include <string.h>
367c478bd9Sstevel@tonic-gate #include <unistd.h>
377c478bd9Sstevel@tonic-gate #include <dirent.h>
387c478bd9Sstevel@tonic-gate #include <errno.h>
397c478bd9Sstevel@tonic-gate #include <grp.h>
407c478bd9Sstevel@tonic-gate #include <pwd.h>
417c478bd9Sstevel@tonic-gate #include <nss_dbdefs.h>
427c478bd9Sstevel@tonic-gate #include <stdarg.h>
437c478bd9Sstevel@tonic-gate #include <syslog.h>
447c478bd9Sstevel@tonic-gate #include <sys/acl.h>
457c478bd9Sstevel@tonic-gate #include <sys/types.h>
467c478bd9Sstevel@tonic-gate #include <sys/stat.h>
477c478bd9Sstevel@tonic-gate #include <sys/ddi.h>
487c478bd9Sstevel@tonic-gate #include <sys/sunddi.h>
497c478bd9Sstevel@tonic-gate #include <sys/devinfo_impl.h>
507c478bd9Sstevel@tonic-gate #include <sys/hwconf.h>
517c478bd9Sstevel@tonic-gate #include <sys/modctl.h>
527c478bd9Sstevel@tonic-gate #include <libnvpair.h>
537c478bd9Sstevel@tonic-gate #include <device_info.h>
547c478bd9Sstevel@tonic-gate #include <regex.h>
557c478bd9Sstevel@tonic-gate #include <strings.h>
567c478bd9Sstevel@tonic-gate #include <libdevinfo.h>
57*c0eb16d4Sjg #include <zone.h>
587c478bd9Sstevel@tonic-gate 
597c478bd9Sstevel@tonic-gate extern int is_minor_node(const char *, const char **);
607c478bd9Sstevel@tonic-gate 
617c478bd9Sstevel@tonic-gate static int logindevperm(const char *, uid_t, gid_t, void (*)());
627c478bd9Sstevel@tonic-gate static int dir_dev_acc(char *, char *, uid_t, gid_t, mode_t, char *line,
637c478bd9Sstevel@tonic-gate 	void (*)());
647c478bd9Sstevel@tonic-gate static int setdevaccess(char *, uid_t, gid_t, mode_t, void (*)());
657c478bd9Sstevel@tonic-gate static void logerror(char *);
667c478bd9Sstevel@tonic-gate 
677c478bd9Sstevel@tonic-gate #define	MAX_LINELEN	256
687c478bd9Sstevel@tonic-gate #define	LOGINDEVPERM	"/etc/logindevperm"
697c478bd9Sstevel@tonic-gate #define	DIRWILD		"/*"			/* directory wildcard */
707c478bd9Sstevel@tonic-gate #define	DIRWLDLEN	2			/* strlen(DIRWILD) */
717c478bd9Sstevel@tonic-gate 
727c478bd9Sstevel@tonic-gate /*
737c478bd9Sstevel@tonic-gate  * Revoke all access to a device node and make sure that there are
747c478bd9Sstevel@tonic-gate  * no interposed streams devices attached.  Must be called before a
757c478bd9Sstevel@tonic-gate  * device is actually opened.
767c478bd9Sstevel@tonic-gate  * When fdetach is called, the underlying device node is revealed; it
777c478bd9Sstevel@tonic-gate  * will have the previous owner and that owner can re-attach; so we
787c478bd9Sstevel@tonic-gate  * retry until we win.
797c478bd9Sstevel@tonic-gate  * Ignore non-existent devices.
807c478bd9Sstevel@tonic-gate  */
817c478bd9Sstevel@tonic-gate static int
827c478bd9Sstevel@tonic-gate setdevaccess(char *dev, uid_t uid, gid_t gid, mode_t mode,
837c478bd9Sstevel@tonic-gate     void (*errmsg)(char *))
847c478bd9Sstevel@tonic-gate {
857c478bd9Sstevel@tonic-gate 	int err = 0, local_errno;
867c478bd9Sstevel@tonic-gate 	char errstring[MAX_LINELEN];
877c478bd9Sstevel@tonic-gate 
887c478bd9Sstevel@tonic-gate 	if (chown(dev, uid, gid) == -1) {
897c478bd9Sstevel@tonic-gate 		if (errno == ENOENT)	/* no such file */
907c478bd9Sstevel@tonic-gate 			return (0);
917c478bd9Sstevel@tonic-gate 		err = -1;
92c4ca7dc0Sfrits 		local_errno = errno;
937c478bd9Sstevel@tonic-gate 	}
947c478bd9Sstevel@tonic-gate 
957c478bd9Sstevel@tonic-gate 	while (fdetach(dev) == 0) {
967c478bd9Sstevel@tonic-gate 		if (chown(dev, uid, gid) == -1) {
977c478bd9Sstevel@tonic-gate 			err = -1;
987c478bd9Sstevel@tonic-gate 			local_errno = errno;
997c478bd9Sstevel@tonic-gate 		}
1007c478bd9Sstevel@tonic-gate 	}
1017c478bd9Sstevel@tonic-gate 	if (err && errmsg) {
1027c478bd9Sstevel@tonic-gate 		(void) snprintf(errstring, MAX_LINELEN,
1037c478bd9Sstevel@tonic-gate 		    "failed to chown device %s: %s\n",
1047c478bd9Sstevel@tonic-gate 		    dev, strerror(local_errno));
1057c478bd9Sstevel@tonic-gate 		(*errmsg)(errstring);
1067c478bd9Sstevel@tonic-gate 	}
1077c478bd9Sstevel@tonic-gate 
108fa9e4066Sahrens 	/*
109fa9e4066Sahrens 	 * strip_acl sets an acl and changes the files owner/group
110fa9e4066Sahrens 	 */
111fa9e4066Sahrens 	err = acl_strip(dev, uid, gid, mode);
1127c478bd9Sstevel@tonic-gate 
113fa9e4066Sahrens 	if (err != 0) {
1147c478bd9Sstevel@tonic-gate 		/*
1157c478bd9Sstevel@tonic-gate 		 * If the file system returned ENOSYS, we know that it
1167c478bd9Sstevel@tonic-gate 		 * doesn't support ACLs, therefore, we must assume that
1177c478bd9Sstevel@tonic-gate 		 * there were no ACLs to remove in the first place.
1187c478bd9Sstevel@tonic-gate 		 */
119facf4a8dSllai1 		err = 0;
1207c478bd9Sstevel@tonic-gate 		if (errno != ENOSYS) {
1217c478bd9Sstevel@tonic-gate 			err = -1;
1227c478bd9Sstevel@tonic-gate 
1237c478bd9Sstevel@tonic-gate 			if (errmsg) {
1247c478bd9Sstevel@tonic-gate 				(void) snprintf(errstring, MAX_LINELEN,
1257c478bd9Sstevel@tonic-gate 				    "failed to set acl on device %s: %s\n",
1267c478bd9Sstevel@tonic-gate 				    dev, strerror(errno));
1277c478bd9Sstevel@tonic-gate 				(*errmsg)(errstring);
1287c478bd9Sstevel@tonic-gate 			}
1297c478bd9Sstevel@tonic-gate 		}
1307c478bd9Sstevel@tonic-gate 		if (chmod(dev, mode) == -1) {
1317c478bd9Sstevel@tonic-gate 			err = -1;
1327c478bd9Sstevel@tonic-gate 			if (errmsg) {
1337c478bd9Sstevel@tonic-gate 				(void) snprintf(errstring, MAX_LINELEN,
1347c478bd9Sstevel@tonic-gate 				    "failed to chmod device %s: %s\n",
1357c478bd9Sstevel@tonic-gate 				    dev, strerror(errno));
1367c478bd9Sstevel@tonic-gate 				(*errmsg)(errstring);
1377c478bd9Sstevel@tonic-gate 			}
1387c478bd9Sstevel@tonic-gate 		}
139fa9e4066Sahrens 	}
1407c478bd9Sstevel@tonic-gate 
1417c478bd9Sstevel@tonic-gate 	return (err);
1427c478bd9Sstevel@tonic-gate }
1437c478bd9Sstevel@tonic-gate 
1447c478bd9Sstevel@tonic-gate /*
1457c478bd9Sstevel@tonic-gate  * logindevperm - change owner/group/permissions of devices
1467c478bd9Sstevel@tonic-gate  * list in /etc/logindevperm.
1477c478bd9Sstevel@tonic-gate  */
1487c478bd9Sstevel@tonic-gate static int
1497c478bd9Sstevel@tonic-gate logindevperm(const char *ttyn, uid_t uid, gid_t gid, void (*errmsg)(char *))
1507c478bd9Sstevel@tonic-gate {
1517c478bd9Sstevel@tonic-gate 	int err = 0, lineno = 0;
1527c478bd9Sstevel@tonic-gate 	const char *field_delims = " \t\n";
1537c478bd9Sstevel@tonic-gate 	char line[MAX_LINELEN], errstring[MAX_LINELEN];
1547c478bd9Sstevel@tonic-gate 	char saveline[MAX_LINELEN];
1557c478bd9Sstevel@tonic-gate 	char *console;
1567c478bd9Sstevel@tonic-gate 	char *mode_str;
1577c478bd9Sstevel@tonic-gate 	char *dev_list;
1587c478bd9Sstevel@tonic-gate 	char *device;
1597c478bd9Sstevel@tonic-gate 	char *ptr;
1607c478bd9Sstevel@tonic-gate 	int mode;
1617c478bd9Sstevel@tonic-gate 	FILE *fp;
1627c478bd9Sstevel@tonic-gate 
1637c478bd9Sstevel@tonic-gate 	if ((fp = fopen(LOGINDEVPERM, "r")) == NULL) {
1647c478bd9Sstevel@tonic-gate 		if (errmsg) {
1657c478bd9Sstevel@tonic-gate 			(void) snprintf(errstring, MAX_LINELEN,
1667c478bd9Sstevel@tonic-gate 			    LOGINDEVPERM ": open failed: %s\n",
1677c478bd9Sstevel@tonic-gate 			    strerror(errno));
1687c478bd9Sstevel@tonic-gate 			(*errmsg)(errstring);
1697c478bd9Sstevel@tonic-gate 		}
1707c478bd9Sstevel@tonic-gate 		return (-1);
1717c478bd9Sstevel@tonic-gate 	}
1727c478bd9Sstevel@tonic-gate 
1737c478bd9Sstevel@tonic-gate 	while (fgets(line, MAX_LINELEN, fp) != NULL) {
1747c478bd9Sstevel@tonic-gate 		char *last;
1757c478bd9Sstevel@tonic-gate 		lineno++;
1767c478bd9Sstevel@tonic-gate 
1777c478bd9Sstevel@tonic-gate 		if ((ptr = strchr(line, '#')) != NULL)
1787c478bd9Sstevel@tonic-gate 			*ptr = '\0';	/* handle comments */
1797c478bd9Sstevel@tonic-gate 
1807c478bd9Sstevel@tonic-gate 		(void) strcpy(saveline, line);
1817c478bd9Sstevel@tonic-gate 
1827c478bd9Sstevel@tonic-gate 		console = strtok_r(line, field_delims, &last);
1837c478bd9Sstevel@tonic-gate 		if (console == NULL)
1847c478bd9Sstevel@tonic-gate 			continue;	/* ignore blank lines */
1857c478bd9Sstevel@tonic-gate 
1867c478bd9Sstevel@tonic-gate 		if (strcmp(console, ttyn) != 0)
1877c478bd9Sstevel@tonic-gate 			continue;	/* not our tty, skip */
1887c478bd9Sstevel@tonic-gate 
1897c478bd9Sstevel@tonic-gate 		mode_str = strtok_r(last, field_delims, &last);
1907c478bd9Sstevel@tonic-gate 		if (mode_str == NULL) {
1917c478bd9Sstevel@tonic-gate 			err = -1;	/* invalid entry, skip */
1927c478bd9Sstevel@tonic-gate 			if (errmsg) {
1937c478bd9Sstevel@tonic-gate 				(void) snprintf(errstring, MAX_LINELEN,
1947c478bd9Sstevel@tonic-gate 				    LOGINDEVPERM
1957c478bd9Sstevel@tonic-gate 				    ": line %d, invalid entry -- %s\n",
1967c478bd9Sstevel@tonic-gate 				    lineno, line);
1977c478bd9Sstevel@tonic-gate 				(*errmsg)(errstring);
1987c478bd9Sstevel@tonic-gate 			}
1997c478bd9Sstevel@tonic-gate 			continue;
2007c478bd9Sstevel@tonic-gate 		}
2017c478bd9Sstevel@tonic-gate 
2027c478bd9Sstevel@tonic-gate 		/* convert string to octal value */
2037c478bd9Sstevel@tonic-gate 		mode = strtol(mode_str, &ptr, 8);
2047c478bd9Sstevel@tonic-gate 		if (mode < 0 || mode > 0777 || *ptr != '\0') {
2057c478bd9Sstevel@tonic-gate 			err = -1;	/* invalid mode, skip */
2067c478bd9Sstevel@tonic-gate 			if (errmsg) {
2077c478bd9Sstevel@tonic-gate 				(void) snprintf(errstring, MAX_LINELEN,
2087c478bd9Sstevel@tonic-gate 				    LOGINDEVPERM
2097c478bd9Sstevel@tonic-gate 				    ": line %d, invalid mode -- %s\n",
2107c478bd9Sstevel@tonic-gate 				    lineno, mode_str);
2117c478bd9Sstevel@tonic-gate 				(*errmsg)(errstring);
2127c478bd9Sstevel@tonic-gate 			}
2137c478bd9Sstevel@tonic-gate 			continue;
2147c478bd9Sstevel@tonic-gate 		}
2157c478bd9Sstevel@tonic-gate 
2167c478bd9Sstevel@tonic-gate 		dev_list = strtok_r(last, field_delims, &last);
2177c478bd9Sstevel@tonic-gate 		if (dev_list == NULL) {
2187c478bd9Sstevel@tonic-gate 			err = -1;	/* empty device list, skip */
2197c478bd9Sstevel@tonic-gate 			if (errmsg) {
2207c478bd9Sstevel@tonic-gate 				(void) snprintf(errstring, MAX_LINELEN,
2217c478bd9Sstevel@tonic-gate 				    LOGINDEVPERM
2227c478bd9Sstevel@tonic-gate 				    ": line %d, empty device list -- %s\n",
2237c478bd9Sstevel@tonic-gate 				    lineno, line);
2247c478bd9Sstevel@tonic-gate 				(*errmsg)(errstring);
2257c478bd9Sstevel@tonic-gate 			}
2267c478bd9Sstevel@tonic-gate 			continue;
2277c478bd9Sstevel@tonic-gate 		}
2287c478bd9Sstevel@tonic-gate 
2297c478bd9Sstevel@tonic-gate 		device = strtok_r(dev_list, ":", &last);
2307c478bd9Sstevel@tonic-gate 		while (device != NULL) {
2317c478bd9Sstevel@tonic-gate 			if ((device[0] != '/') || (strlen(device) <= 1))  {
2327c478bd9Sstevel@tonic-gate 				err = -1;
2337c478bd9Sstevel@tonic-gate 			} else if (dir_dev_acc("/", &device[1], uid, gid, mode,
2347c478bd9Sstevel@tonic-gate 			    saveline, errmsg)) {
2357c478bd9Sstevel@tonic-gate 				err = -1;
2367c478bd9Sstevel@tonic-gate 			}
2377c478bd9Sstevel@tonic-gate 			device = strtok_r(last, ":", &last);
2387c478bd9Sstevel@tonic-gate 		}
2397c478bd9Sstevel@tonic-gate 	}
2407c478bd9Sstevel@tonic-gate 	(void) fclose(fp);
2417c478bd9Sstevel@tonic-gate 	return (err);
2427c478bd9Sstevel@tonic-gate }
2437c478bd9Sstevel@tonic-gate 
2447c478bd9Sstevel@tonic-gate /*
2457c478bd9Sstevel@tonic-gate  * returns 0 if resolved, -1 otherwise.
2467c478bd9Sstevel@tonic-gate  * devpath: Absolute path to /dev link
2477c478bd9Sstevel@tonic-gate  * devfs_path: Returns malloced string: /devices path w/out "/devices"
2487c478bd9Sstevel@tonic-gate  */
2497c478bd9Sstevel@tonic-gate static int
2507c478bd9Sstevel@tonic-gate resolve_link(char *devpath, char **devfs_path)
2517c478bd9Sstevel@tonic-gate {
2527c478bd9Sstevel@tonic-gate 	char contents[PATH_MAX + 1];
2537c478bd9Sstevel@tonic-gate 	char stage_link[PATH_MAX + 1];
2547c478bd9Sstevel@tonic-gate 	char *ptr;
2557c478bd9Sstevel@tonic-gate 	int linksize;
2567c478bd9Sstevel@tonic-gate 	char *slashdev = "/dev/";
2577c478bd9Sstevel@tonic-gate 
2587c478bd9Sstevel@tonic-gate 	if (devfs_path) {
2597c478bd9Sstevel@tonic-gate 		*devfs_path = NULL;
2607c478bd9Sstevel@tonic-gate 	}
2617c478bd9Sstevel@tonic-gate 
2627c478bd9Sstevel@tonic-gate 	linksize = readlink(devpath, contents, PATH_MAX);
2637c478bd9Sstevel@tonic-gate 
2647c478bd9Sstevel@tonic-gate 	if (linksize <= 0) {
2657c478bd9Sstevel@tonic-gate 		return (-1);
2667c478bd9Sstevel@tonic-gate 	} else {
2677c478bd9Sstevel@tonic-gate 		contents[linksize] = '\0';
2687c478bd9Sstevel@tonic-gate 	}
2697c478bd9Sstevel@tonic-gate 
2707c478bd9Sstevel@tonic-gate 	/*
2717c478bd9Sstevel@tonic-gate 	 * if the link contents is not a minor node assume
2727c478bd9Sstevel@tonic-gate 	 * that link contents is really a pointer to another
2737c478bd9Sstevel@tonic-gate 	 * link, and if so recurse and read its link contents.
2747c478bd9Sstevel@tonic-gate 	 */
2757c478bd9Sstevel@tonic-gate 	if (is_minor_node((const char *)contents, (const char **)&ptr) !=
2767c478bd9Sstevel@tonic-gate 	    1) {
2777c478bd9Sstevel@tonic-gate 		if (strncmp(contents, slashdev, strlen(slashdev)) == 0)  {
2787c478bd9Sstevel@tonic-gate 			/* absolute path, starting with /dev */
2797c478bd9Sstevel@tonic-gate 			(void) strcpy(stage_link, contents);
2807c478bd9Sstevel@tonic-gate 		} else {
2817c478bd9Sstevel@tonic-gate 			/* relative path, prefix devpath */
2827c478bd9Sstevel@tonic-gate 			if ((ptr = strrchr(devpath, '/')) == NULL) {
2837c478bd9Sstevel@tonic-gate 				/* invalid link */
2847c478bd9Sstevel@tonic-gate 				return (-1);
2857c478bd9Sstevel@tonic-gate 			}
2867c478bd9Sstevel@tonic-gate 			*ptr = '\0';
2877c478bd9Sstevel@tonic-gate 			(void) strcpy(stage_link, devpath);
2887c478bd9Sstevel@tonic-gate 			*ptr = '/';
2897c478bd9Sstevel@tonic-gate 			(void) strcat(stage_link, "/");
2907c478bd9Sstevel@tonic-gate 			(void) strcat(stage_link, contents);
2917c478bd9Sstevel@tonic-gate 
2927c478bd9Sstevel@tonic-gate 		}
2937c478bd9Sstevel@tonic-gate 		return (resolve_link(stage_link, devfs_path));
2947c478bd9Sstevel@tonic-gate 	}
2957c478bd9Sstevel@tonic-gate 
2967c478bd9Sstevel@tonic-gate 	if (devfs_path) {
2977c478bd9Sstevel@tonic-gate 		*devfs_path = strdup(ptr);
2987c478bd9Sstevel@tonic-gate 		if (*devfs_path == NULL) {
2997c478bd9Sstevel@tonic-gate 			return (-1);
3007c478bd9Sstevel@tonic-gate 		}
3017c478bd9Sstevel@tonic-gate 	}
3027c478bd9Sstevel@tonic-gate 
3037c478bd9Sstevel@tonic-gate 	return (0);
3047c478bd9Sstevel@tonic-gate }
3057c478bd9Sstevel@tonic-gate 
3067c478bd9Sstevel@tonic-gate /*
3077c478bd9Sstevel@tonic-gate  * check a logindevperm line for a driver list and match this against
3087c478bd9Sstevel@tonic-gate  * the driver of the minor node
3097c478bd9Sstevel@tonic-gate  * returns 0 if no drivers were specified or a driver match
3107c478bd9Sstevel@tonic-gate  */
3117c478bd9Sstevel@tonic-gate static int
3127c478bd9Sstevel@tonic-gate check_driver_match(char *path, char *line)
3137c478bd9Sstevel@tonic-gate {
3147c478bd9Sstevel@tonic-gate 	char *drv, *driver, *lasts;
3157c478bd9Sstevel@tonic-gate 	char *devfs_path = NULL;
3167c478bd9Sstevel@tonic-gate 	char saveline[MAX_LINELEN];
3177c478bd9Sstevel@tonic-gate 	char *p;
3187c478bd9Sstevel@tonic-gate 
3197c478bd9Sstevel@tonic-gate 	if (resolve_link(path, &devfs_path) == 0) {
3207c478bd9Sstevel@tonic-gate 		char *p;
3217c478bd9Sstevel@tonic-gate 		char pwd_buf[PATH_MAX];
3227c478bd9Sstevel@tonic-gate 		di_node_t node;
3237c478bd9Sstevel@tonic-gate 
3247c478bd9Sstevel@tonic-gate 		/* truncate on : so we can take a snapshot */
3257c478bd9Sstevel@tonic-gate 		(void) strcpy(pwd_buf, devfs_path);
3267c478bd9Sstevel@tonic-gate 		p = strrchr(pwd_buf, ':');
3277c478bd9Sstevel@tonic-gate 		*p = '\0';
3287c478bd9Sstevel@tonic-gate 
3297c478bd9Sstevel@tonic-gate 		node = di_init(pwd_buf, DINFOMINOR);
3307c478bd9Sstevel@tonic-gate 		free(devfs_path);
3317c478bd9Sstevel@tonic-gate 
3327c478bd9Sstevel@tonic-gate 		if (node) {
3337c478bd9Sstevel@tonic-gate 			drv = di_driver_name(node);
3347c478bd9Sstevel@tonic-gate 			di_fini(node);
3357c478bd9Sstevel@tonic-gate 		} else {
3367c478bd9Sstevel@tonic-gate 			return (0);
3377c478bd9Sstevel@tonic-gate 		}
3387c478bd9Sstevel@tonic-gate 	} else {
3397c478bd9Sstevel@tonic-gate 		return (0);
3407c478bd9Sstevel@tonic-gate 	}
3417c478bd9Sstevel@tonic-gate 
3427c478bd9Sstevel@tonic-gate 	(void) strcpy(saveline, line);
3437c478bd9Sstevel@tonic-gate 
3447c478bd9Sstevel@tonic-gate 	p = strstr(saveline, "driver");
3457c478bd9Sstevel@tonic-gate 	if (p == NULL) {
3467c478bd9Sstevel@tonic-gate 		return (0);
3477c478bd9Sstevel@tonic-gate 	}
3487c478bd9Sstevel@tonic-gate 
3497c478bd9Sstevel@tonic-gate 	driver = strtok_r(p, "=", &lasts);
3507c478bd9Sstevel@tonic-gate 	if (driver) {
3517c478bd9Sstevel@tonic-gate 		if (strcmp(driver, "driver") == 0) {
3527c478bd9Sstevel@tonic-gate 			driver = strtok_r(NULL, ", \t\n", &lasts);
3537c478bd9Sstevel@tonic-gate 			while (driver) {
3547c478bd9Sstevel@tonic-gate 				if (strcmp(driver, drv) == 0) {
3557c478bd9Sstevel@tonic-gate 					return (0);
3567c478bd9Sstevel@tonic-gate 				}
3577c478bd9Sstevel@tonic-gate 				driver = strtok_r(NULL, ", \t\n", &lasts);
3587c478bd9Sstevel@tonic-gate 			}
3597c478bd9Sstevel@tonic-gate 		}
3607c478bd9Sstevel@tonic-gate 	}
3617c478bd9Sstevel@tonic-gate 
3627c478bd9Sstevel@tonic-gate 	return (-1);
3637c478bd9Sstevel@tonic-gate }
3647c478bd9Sstevel@tonic-gate 
3657c478bd9Sstevel@tonic-gate /*
3667c478bd9Sstevel@tonic-gate  * Apply owner/group/perms to all files (except "." and "..")
3677c478bd9Sstevel@tonic-gate  * in a directory.
3687c478bd9Sstevel@tonic-gate  * This function is recursive. We start with "/" and the rest of the pathname
3697c478bd9Sstevel@tonic-gate  * in left_to_do argument, and we walk the entire pathname which may contain
3707c478bd9Sstevel@tonic-gate  * regular expressions or '*' for each directory name or basename.
3717c478bd9Sstevel@tonic-gate  */
3727c478bd9Sstevel@tonic-gate static int
3737c478bd9Sstevel@tonic-gate dir_dev_acc(char *path, char *left_to_do, uid_t uid, gid_t gid, mode_t mode,
3747c478bd9Sstevel@tonic-gate     char *line, void (*errmsg)(char *))
3757c478bd9Sstevel@tonic-gate {
3767c478bd9Sstevel@tonic-gate 	struct stat stat_buf;
3777c478bd9Sstevel@tonic-gate 	int err = 0;
3787c478bd9Sstevel@tonic-gate 	DIR *dirp;
3794bc0a2efScasper 	struct dirent *direntp;
380c4ca7dc0Sfrits 	char errstring[MAX_LINELEN];
381facf4a8dSllai1 	char *p;
382facf4a8dSllai1 	regex_t regex;
383facf4a8dSllai1 	int alwaysmatch = 0;
384facf4a8dSllai1 	char *match;
385facf4a8dSllai1 	char *name, *newpath, *remainder_path;
386facf4a8dSllai1 	finddevhdl_t handle;
387facf4a8dSllai1 	int find_method;
388facf4a8dSllai1 
389facf4a8dSllai1 	/*
390*c0eb16d4Sjg 	 * Determine if the search needs to be performed via finddev,
391*c0eb16d4Sjg 	 * which returns only persisted names in the global /dev, or
392*c0eb16d4Sjg 	 * readdir, for paths other than /dev and non-global zones.
393*c0eb16d4Sjg 	 * This use of finddev avoids triggering potential implicit
394*c0eb16d4Sjg 	 * reconfig for names managed by logindevperm but not present
395*c0eb16d4Sjg 	 * on the system.
396facf4a8dSllai1 	 */
397*c0eb16d4Sjg 	find_method = ((getzoneid() == GLOBAL_ZONEID) &&
398*c0eb16d4Sjg 	    ((strcmp(path, "/dev") == 0) ||
399*c0eb16d4Sjg 	    (strncmp(path, "/dev/", 5) == 0))) ?
400facf4a8dSllai1 		FLAG_USE_FINDDEV : FLAG_USE_READDIR;
4017c478bd9Sstevel@tonic-gate 
4027c478bd9Sstevel@tonic-gate 	/* path must be a valid name */
403facf4a8dSllai1 	if (find_method == FLAG_USE_FINDDEV && !device_exists(path)) {
404facf4a8dSllai1 		return (-1);
405facf4a8dSllai1 	}
4067c478bd9Sstevel@tonic-gate 	if (stat(path, &stat_buf) == -1) {
407c4ca7dc0Sfrits 		/*
408c4ca7dc0Sfrits 		 * ENOENT errors are expected errors when there are
409c4ca7dc0Sfrits 		 * dangling /dev device links. Ignore them silently
410c4ca7dc0Sfrits 		 */
411c4ca7dc0Sfrits 		if (errno == ENOENT) {
412c4ca7dc0Sfrits 			return (0);
413c4ca7dc0Sfrits 		}
414c4ca7dc0Sfrits 		if (errmsg) {
415c4ca7dc0Sfrits 			(void) snprintf(errstring, MAX_LINELEN,
416c4ca7dc0Sfrits 			    "failed to stat %s: %s\n", path,
417c4ca7dc0Sfrits 			    strerror(errno));
418c4ca7dc0Sfrits 			(*errmsg)(errstring);
419c4ca7dc0Sfrits 		}
4207c478bd9Sstevel@tonic-gate 		return (-1);
4217c478bd9Sstevel@tonic-gate 	} else {
4227c478bd9Sstevel@tonic-gate 		if (!S_ISDIR(stat_buf.st_mode)) {
4237c478bd9Sstevel@tonic-gate 			if (strlen(left_to_do) == 0) {
4247c478bd9Sstevel@tonic-gate 				/* finally check the driver matches */
4257c478bd9Sstevel@tonic-gate 				if (check_driver_match(path, line) == 0) {
4267c478bd9Sstevel@tonic-gate 					/* we are done, set the permissions */
4277c478bd9Sstevel@tonic-gate 					if (setdevaccess(path,
4287c478bd9Sstevel@tonic-gate 					    uid, gid, mode, errmsg)) {
4297c478bd9Sstevel@tonic-gate 
4307c478bd9Sstevel@tonic-gate 						return (-1);
4317c478bd9Sstevel@tonic-gate 					}
4327c478bd9Sstevel@tonic-gate 				}
4337c478bd9Sstevel@tonic-gate 			}
4347c478bd9Sstevel@tonic-gate 			return (0);
4357c478bd9Sstevel@tonic-gate 		}
4367c478bd9Sstevel@tonic-gate 	}
4377c478bd9Sstevel@tonic-gate 
438facf4a8dSllai1 	if (find_method == FLAG_USE_READDIR) {
4397c478bd9Sstevel@tonic-gate 		dirp = opendir(path);
440facf4a8dSllai1 		if (dirp == NULL)
4417c478bd9Sstevel@tonic-gate 			return (0);
4427c478bd9Sstevel@tonic-gate 	} else {
443facf4a8dSllai1 		if (finddev_readdir(path, &handle) != 0)
444facf4a8dSllai1 			return (0);
445facf4a8dSllai1 	}
446facf4a8dSllai1 
447facf4a8dSllai1 	p = strchr(left_to_do, '/');
448facf4a8dSllai1 	alwaysmatch = 0;
4497c478bd9Sstevel@tonic-gate 
4507c478bd9Sstevel@tonic-gate 	newpath = (char *)malloc(MAXPATHLEN);
4517c478bd9Sstevel@tonic-gate 	if (newpath == NULL) {
4527c478bd9Sstevel@tonic-gate 		return (-1);
4537c478bd9Sstevel@tonic-gate 	}
4547c478bd9Sstevel@tonic-gate 	match = (char *)calloc(MAXPATHLEN, 1);
4557c478bd9Sstevel@tonic-gate 	if (match == NULL) {
4567c478bd9Sstevel@tonic-gate 		free(newpath);
4577c478bd9Sstevel@tonic-gate 		return (-1);
4587c478bd9Sstevel@tonic-gate 	}
4597c478bd9Sstevel@tonic-gate 
4607c478bd9Sstevel@tonic-gate 	if (p) {
4617c478bd9Sstevel@tonic-gate 		(void) strncpy(match, left_to_do, p - left_to_do);
4627c478bd9Sstevel@tonic-gate 	} else {
4637c478bd9Sstevel@tonic-gate 		(void) strcpy(match, left_to_do);
4647c478bd9Sstevel@tonic-gate 	}
4657c478bd9Sstevel@tonic-gate 
4667c478bd9Sstevel@tonic-gate 	if (strcmp(match, "*") == 0) {
4677c478bd9Sstevel@tonic-gate 		alwaysmatch = 1;
4687c478bd9Sstevel@tonic-gate 	} else {
4697c478bd9Sstevel@tonic-gate 		if (regcomp(&regex, match, REG_EXTENDED) != 0) {
4707c478bd9Sstevel@tonic-gate 			free(newpath);
4717c478bd9Sstevel@tonic-gate 			free(match);
4727c478bd9Sstevel@tonic-gate 			return (-1);
4737c478bd9Sstevel@tonic-gate 		}
4747c478bd9Sstevel@tonic-gate 	}
4757c478bd9Sstevel@tonic-gate 
476facf4a8dSllai1 	for (;;) {
477facf4a8dSllai1 		if (find_method == FLAG_USE_READDIR) {
478facf4a8dSllai1 			if ((direntp = readdir(dirp)) == NULL)
479facf4a8dSllai1 				break;
4807c478bd9Sstevel@tonic-gate 			name = direntp->d_name;
4817c478bd9Sstevel@tonic-gate 			if ((strcmp(name, ".") == 0) ||
4827c478bd9Sstevel@tonic-gate 			    (strcmp(name, "..") == 0))
4837c478bd9Sstevel@tonic-gate 				continue;
484facf4a8dSllai1 		} else {
485facf4a8dSllai1 			if ((name = (char *)finddev_next(handle)) == NULL)
486facf4a8dSllai1 				break;
487facf4a8dSllai1 		}
4887c478bd9Sstevel@tonic-gate 
4897c478bd9Sstevel@tonic-gate 		if (alwaysmatch ||
4907c478bd9Sstevel@tonic-gate 		    regexec(&regex, name, 0, NULL, 0) == 0) {
4917c478bd9Sstevel@tonic-gate 			if (strcmp(path, "/") == 0) {
4927c478bd9Sstevel@tonic-gate 				(void) snprintf(newpath,
4937c478bd9Sstevel@tonic-gate 				    MAXPATHLEN, "%s%s", path, name);
4947c478bd9Sstevel@tonic-gate 			} else {
4957c478bd9Sstevel@tonic-gate 				(void) snprintf(newpath,
4967c478bd9Sstevel@tonic-gate 				    MAXPATHLEN, "%s/%s", path, name);
4977c478bd9Sstevel@tonic-gate 			}
4987c478bd9Sstevel@tonic-gate 
4997c478bd9Sstevel@tonic-gate 			/*
5007c478bd9Sstevel@tonic-gate 			 * recurse but adjust what is still left to do
5017c478bd9Sstevel@tonic-gate 			 */
5027c478bd9Sstevel@tonic-gate 			remainder_path = (p ?
5037c478bd9Sstevel@tonic-gate 			    left_to_do + (p - left_to_do) + 1 :
5047c478bd9Sstevel@tonic-gate 			    &left_to_do[strlen(left_to_do)]);
5057c478bd9Sstevel@tonic-gate 			if (dir_dev_acc(newpath, remainder_path,
5067c478bd9Sstevel@tonic-gate 			    uid, gid, mode, line, errmsg)) {
5077c478bd9Sstevel@tonic-gate 				err = -1;
5087c478bd9Sstevel@tonic-gate 			}
5097c478bd9Sstevel@tonic-gate 		}
5107c478bd9Sstevel@tonic-gate 	}
511facf4a8dSllai1 
512facf4a8dSllai1 	if (find_method == FLAG_USE_READDIR) {
5137c478bd9Sstevel@tonic-gate 		(void) closedir(dirp);
514facf4a8dSllai1 	} else {
515facf4a8dSllai1 		finddev_close(handle);
516facf4a8dSllai1 	}
5177c478bd9Sstevel@tonic-gate 	free(newpath);
5187c478bd9Sstevel@tonic-gate 	free(match);
5197c478bd9Sstevel@tonic-gate 	if (!alwaysmatch) {
5207c478bd9Sstevel@tonic-gate 		regfree(&regex);
5217c478bd9Sstevel@tonic-gate 	}
5227c478bd9Sstevel@tonic-gate 
5237c478bd9Sstevel@tonic-gate 	return (err);
5247c478bd9Sstevel@tonic-gate }
5257c478bd9Sstevel@tonic-gate 
5267c478bd9Sstevel@tonic-gate /*
5277c478bd9Sstevel@tonic-gate  * di_devperm_login - modify access of devices in /etc/logindevperm
5287c478bd9Sstevel@tonic-gate  * by changing owner/group/permissions to that of ttyn.
5297c478bd9Sstevel@tonic-gate  */
5307c478bd9Sstevel@tonic-gate int
5317c478bd9Sstevel@tonic-gate di_devperm_login(const char *ttyn, uid_t uid, gid_t gid,
5327c478bd9Sstevel@tonic-gate     void (*errmsg)(char *))
5337c478bd9Sstevel@tonic-gate {
5347c478bd9Sstevel@tonic-gate 	int err;
5357c478bd9Sstevel@tonic-gate 	struct group grp, *grpp;
5367c478bd9Sstevel@tonic-gate 	gid_t tty_gid;
5377c478bd9Sstevel@tonic-gate 	char grbuf[NSS_BUFLEN_GROUP];
5387c478bd9Sstevel@tonic-gate 
5397c478bd9Sstevel@tonic-gate 	if (errmsg == NULL)
5407c478bd9Sstevel@tonic-gate 		errmsg = logerror;
5417c478bd9Sstevel@tonic-gate 
5427c478bd9Sstevel@tonic-gate 	if (ttyn == NULL) {
5437c478bd9Sstevel@tonic-gate 		(*errmsg)("di_devperm_login: NULL tty device\n");
5447c478bd9Sstevel@tonic-gate 		return (-1);
5457c478bd9Sstevel@tonic-gate 	}
5467c478bd9Sstevel@tonic-gate 
5477c478bd9Sstevel@tonic-gate 	if (getgrnam_r("tty", &grp, grbuf, NSS_BUFLEN_GROUP, &grpp) != 0) {
5487c478bd9Sstevel@tonic-gate 		tty_gid = grpp->gr_gid;
5497c478bd9Sstevel@tonic-gate 	} else {
5507c478bd9Sstevel@tonic-gate 		/*
5517c478bd9Sstevel@tonic-gate 		 * this should never happen, but if it does set
5527c478bd9Sstevel@tonic-gate 		 * group to tty's traditional value.
5537c478bd9Sstevel@tonic-gate 		 */
5547c478bd9Sstevel@tonic-gate 		tty_gid = 7;
5557c478bd9Sstevel@tonic-gate 	}
5567c478bd9Sstevel@tonic-gate 
5577c478bd9Sstevel@tonic-gate 	/* set the login console device permission */
5587c478bd9Sstevel@tonic-gate 	err = setdevaccess((char *)ttyn, uid, tty_gid,
5597c478bd9Sstevel@tonic-gate 	    S_IRUSR|S_IWUSR|S_IWGRP, errmsg);
5607c478bd9Sstevel@tonic-gate 	if (err) {
5617c478bd9Sstevel@tonic-gate 		return (err);
5627c478bd9Sstevel@tonic-gate 	}
5637c478bd9Sstevel@tonic-gate 
5647c478bd9Sstevel@tonic-gate 	/* set the device permissions */
5657c478bd9Sstevel@tonic-gate 	return (logindevperm(ttyn, uid, gid, errmsg));
5667c478bd9Sstevel@tonic-gate }
5677c478bd9Sstevel@tonic-gate 
5687c478bd9Sstevel@tonic-gate /*
5697c478bd9Sstevel@tonic-gate  * di_devperm_logout - clean up access of devices in /etc/logindevperm
5707c478bd9Sstevel@tonic-gate  * by resetting owner/group/permissions.
5717c478bd9Sstevel@tonic-gate  */
5727c478bd9Sstevel@tonic-gate int
5737c478bd9Sstevel@tonic-gate di_devperm_logout(const char *ttyn)
5747c478bd9Sstevel@tonic-gate {
5757c478bd9Sstevel@tonic-gate 	struct passwd *pwd;
5767c478bd9Sstevel@tonic-gate 	uid_t root_uid;
5777c478bd9Sstevel@tonic-gate 	gid_t root_gid;
5787c478bd9Sstevel@tonic-gate 
5797c478bd9Sstevel@tonic-gate 	if (ttyn == NULL)
5807c478bd9Sstevel@tonic-gate 		return (-1);
5817c478bd9Sstevel@tonic-gate 
5827c478bd9Sstevel@tonic-gate 	pwd = getpwnam("root");
5837c478bd9Sstevel@tonic-gate 	if (pwd != NULL) {
5847c478bd9Sstevel@tonic-gate 		root_uid = pwd->pw_uid;
5857c478bd9Sstevel@tonic-gate 		root_gid = pwd->pw_gid;
5867c478bd9Sstevel@tonic-gate 	} else {
5877c478bd9Sstevel@tonic-gate 		/*
5887c478bd9Sstevel@tonic-gate 		 * this should never happen, but if it does set user
5897c478bd9Sstevel@tonic-gate 		 * and group to root's traditional values.
5907c478bd9Sstevel@tonic-gate 		 */
5917c478bd9Sstevel@tonic-gate 		root_uid = 0;
5927c478bd9Sstevel@tonic-gate 		root_gid = 0;
5937c478bd9Sstevel@tonic-gate 	}
5947c478bd9Sstevel@tonic-gate 
5957c478bd9Sstevel@tonic-gate 	return (logindevperm(ttyn, root_uid, root_gid, NULL));
5967c478bd9Sstevel@tonic-gate }
5977c478bd9Sstevel@tonic-gate 
5987c478bd9Sstevel@tonic-gate static void
5997c478bd9Sstevel@tonic-gate logerror(char *errstring)
6007c478bd9Sstevel@tonic-gate {
6017c478bd9Sstevel@tonic-gate 	syslog(LOG_AUTH | LOG_CRIT, "%s", errstring);
6027c478bd9Sstevel@tonic-gate }
6037c478bd9Sstevel@tonic-gate 
6047c478bd9Sstevel@tonic-gate 
6057c478bd9Sstevel@tonic-gate /*
6067c478bd9Sstevel@tonic-gate  * Tokens are separated by ' ', '\t', ':', '=', '&', '|', ';', '\n', or '\0'
6077c478bd9Sstevel@tonic-gate  */
6087c478bd9Sstevel@tonic-gate static int
6097c478bd9Sstevel@tonic-gate getnexttoken(char *next, char **nextp, char **tokenpp, char *tchar)
6107c478bd9Sstevel@tonic-gate {
6117c478bd9Sstevel@tonic-gate 	char *cp;
6127c478bd9Sstevel@tonic-gate 	char *cp1;
6137c478bd9Sstevel@tonic-gate 	char *tokenp;
6147c478bd9Sstevel@tonic-gate 
6157c478bd9Sstevel@tonic-gate 	cp = next;
6167c478bd9Sstevel@tonic-gate 	while (*cp == ' ' || *cp == '\t') {
6177c478bd9Sstevel@tonic-gate 		cp++;			/* skip leading spaces */
6187c478bd9Sstevel@tonic-gate 	}
6197c478bd9Sstevel@tonic-gate 	tokenp = cp;			/* start of token */
6207c478bd9Sstevel@tonic-gate 	while (*cp != '\0' && *cp != '\n' && *cp != ' ' && *cp != '\t' &&
6217c478bd9Sstevel@tonic-gate 		*cp != ':' && *cp != '=' && *cp != '&' &&
6227c478bd9Sstevel@tonic-gate 		*cp != '|' && *cp != ';') {
6237c478bd9Sstevel@tonic-gate 		cp++;			/* point to next character */
6247c478bd9Sstevel@tonic-gate 	}
6257c478bd9Sstevel@tonic-gate 	/*
6267c478bd9Sstevel@tonic-gate 	 * If terminating character is a space or tab, look ahead to see if
6277c478bd9Sstevel@tonic-gate 	 * there's another terminator that's not a space or a tab.
6287c478bd9Sstevel@tonic-gate 	 * (This code handles trailing spaces.)
6297c478bd9Sstevel@tonic-gate 	 */
6307c478bd9Sstevel@tonic-gate 	if (*cp == ' ' || *cp == '\t') {
6317c478bd9Sstevel@tonic-gate 		cp1 = cp;
6327c478bd9Sstevel@tonic-gate 		while (*++cp1 == ' ' || *cp1 == '\t')
6337c478bd9Sstevel@tonic-gate 			;
6347c478bd9Sstevel@tonic-gate 		if (*cp1 == '=' || *cp1 == ':' || *cp1 == '&' || *cp1 == '|' ||
6357c478bd9Sstevel@tonic-gate 			*cp1 == ';' || *cp1 == '\n' || *cp1 == '\0') {
6367c478bd9Sstevel@tonic-gate 			*cp = NULL;	/* terminate token */
6377c478bd9Sstevel@tonic-gate 			cp = cp1;
6387c478bd9Sstevel@tonic-gate 		}
6397c478bd9Sstevel@tonic-gate 	}
6407c478bd9Sstevel@tonic-gate 	if (tchar != NULL) {
6417c478bd9Sstevel@tonic-gate 		*tchar = *cp;		/* save terminating character */
6427c478bd9Sstevel@tonic-gate 		if (*tchar == '\0') {
6437c478bd9Sstevel@tonic-gate 			*tchar = '\n';
6447c478bd9Sstevel@tonic-gate 		}
6457c478bd9Sstevel@tonic-gate 	}
6467c478bd9Sstevel@tonic-gate 	*cp++ = '\0';			/* terminate token, point to next */
6477c478bd9Sstevel@tonic-gate 	*nextp = cp;			/* set pointer to next character */
6487c478bd9Sstevel@tonic-gate 	if (cp - tokenp - 1 == 0) {
6497c478bd9Sstevel@tonic-gate 		return (0);
6507c478bd9Sstevel@tonic-gate 	}
6517c478bd9Sstevel@tonic-gate 	*tokenpp = tokenp;
6527c478bd9Sstevel@tonic-gate 	return (1);
6537c478bd9Sstevel@tonic-gate }
6547c478bd9Sstevel@tonic-gate 
6557c478bd9Sstevel@tonic-gate /*
6567c478bd9Sstevel@tonic-gate  * get a decimal octal or hex number. Handle '~' for one's complement.
6577c478bd9Sstevel@tonic-gate  */
6587c478bd9Sstevel@tonic-gate static int
6597c478bd9Sstevel@tonic-gate getvalue(char *token, int *valuep)
6607c478bd9Sstevel@tonic-gate {
6617c478bd9Sstevel@tonic-gate 	int radix;
6627c478bd9Sstevel@tonic-gate 	int retval = 0;
6637c478bd9Sstevel@tonic-gate 	int onescompl = 0;
6647c478bd9Sstevel@tonic-gate 	int negate = 0;
6657c478bd9Sstevel@tonic-gate 	char c;
6667c478bd9Sstevel@tonic-gate 
6677c478bd9Sstevel@tonic-gate 	if (*token == '~') {
6687c478bd9Sstevel@tonic-gate 		onescompl++; /* perform one's complement on result */
6697c478bd9Sstevel@tonic-gate 		token++;
6707c478bd9Sstevel@tonic-gate 	} else if (*token == '-') {
6717c478bd9Sstevel@tonic-gate 		negate++;
6727c478bd9Sstevel@tonic-gate 		token++;
6737c478bd9Sstevel@tonic-gate 	}
6747c478bd9Sstevel@tonic-gate 	if (*token == '0') {
6757c478bd9Sstevel@tonic-gate 		token++;
6767c478bd9Sstevel@tonic-gate 		c = *token;
6777c478bd9Sstevel@tonic-gate 
6787c478bd9Sstevel@tonic-gate 		if (c == '\0') {
6797c478bd9Sstevel@tonic-gate 			*valuep = 0;	/* value is 0 */
6807c478bd9Sstevel@tonic-gate 			return (0);
6817c478bd9Sstevel@tonic-gate 		}
6827c478bd9Sstevel@tonic-gate 
6837c478bd9Sstevel@tonic-gate 		if (c == 'x' || c == 'X') {
6847c478bd9Sstevel@tonic-gate 			radix = 16;
6857c478bd9Sstevel@tonic-gate 			token++;
6867c478bd9Sstevel@tonic-gate 		} else {
6877c478bd9Sstevel@tonic-gate 			radix = 8;
6887c478bd9Sstevel@tonic-gate 		}
6897c478bd9Sstevel@tonic-gate 	} else
6907c478bd9Sstevel@tonic-gate 		radix = 10;
6917c478bd9Sstevel@tonic-gate 
6927c478bd9Sstevel@tonic-gate 	while ((c = *token++)) {
6937c478bd9Sstevel@tonic-gate 		switch (radix) {
6947c478bd9Sstevel@tonic-gate 		case 8:
6957c478bd9Sstevel@tonic-gate 			if (c >= '0' && c <= '7') {
6967c478bd9Sstevel@tonic-gate 				c -= '0';
6977c478bd9Sstevel@tonic-gate 			} else {
6987c478bd9Sstevel@tonic-gate 				/* invalid number */
6997c478bd9Sstevel@tonic-gate 				return (0);
7007c478bd9Sstevel@tonic-gate 			}
7017c478bd9Sstevel@tonic-gate 			retval = (retval << 3) + c;
7027c478bd9Sstevel@tonic-gate 			break;
7037c478bd9Sstevel@tonic-gate 		case 10:
7047c478bd9Sstevel@tonic-gate 			if (c >= '0' && c <= '9') {
7057c478bd9Sstevel@tonic-gate 				c -= '0';
7067c478bd9Sstevel@tonic-gate 			} else {
7077c478bd9Sstevel@tonic-gate 				/* invalid number */
7087c478bd9Sstevel@tonic-gate 				return (0);
7097c478bd9Sstevel@tonic-gate 			}
7107c478bd9Sstevel@tonic-gate 			retval = (retval * 10) + c;
7117c478bd9Sstevel@tonic-gate 			break;
7127c478bd9Sstevel@tonic-gate 		case 16:
7137c478bd9Sstevel@tonic-gate 			if (c >= 'a' && c <= 'f') {
7147c478bd9Sstevel@tonic-gate 				c = c - 'a' + 10;
7157c478bd9Sstevel@tonic-gate 			} else if (c >= 'A' && c <= 'F') {
7167c478bd9Sstevel@tonic-gate 				c = c - 'A' + 10;
7177c478bd9Sstevel@tonic-gate 			} else if (c >= '0' && c <= '9') {
7187c478bd9Sstevel@tonic-gate 				c -= '0';
7197c478bd9Sstevel@tonic-gate 			} else {
7207c478bd9Sstevel@tonic-gate 				/* invalid number */
7217c478bd9Sstevel@tonic-gate 				return (0);
7227c478bd9Sstevel@tonic-gate 			}
7237c478bd9Sstevel@tonic-gate 			retval = (retval << 4) + c;
7247c478bd9Sstevel@tonic-gate 			break;
7257c478bd9Sstevel@tonic-gate 		}
7267c478bd9Sstevel@tonic-gate 	}
7277c478bd9Sstevel@tonic-gate 	if (onescompl) {
7287c478bd9Sstevel@tonic-gate 		retval = ~retval;
7297c478bd9Sstevel@tonic-gate 	}
7307c478bd9Sstevel@tonic-gate 	if (negate) {
7317c478bd9Sstevel@tonic-gate 		retval = -retval;
7327c478bd9Sstevel@tonic-gate 	}
7337c478bd9Sstevel@tonic-gate 	*valuep = retval;
7347c478bd9Sstevel@tonic-gate 	return (1);
7357c478bd9Sstevel@tonic-gate }
7367c478bd9Sstevel@tonic-gate 
7377c478bd9Sstevel@tonic-gate /*
7387c478bd9Sstevel@tonic-gate  * Read /etc/minor_perm, return mperm list of entries
7397c478bd9Sstevel@tonic-gate  */
7407c478bd9Sstevel@tonic-gate struct mperm *
7417c478bd9Sstevel@tonic-gate i_devfs_read_minor_perm(char *drvname, void (*errcb)(minorperm_err_t, int))
7427c478bd9Sstevel@tonic-gate {
7437c478bd9Sstevel@tonic-gate 	FILE *pfd;
7447c478bd9Sstevel@tonic-gate 	struct mperm *mp;
7457c478bd9Sstevel@tonic-gate 	char line[MAX_MINOR_PERM_LINE];
7467c478bd9Sstevel@tonic-gate 	char *cp, *p, t;
7477c478bd9Sstevel@tonic-gate 	struct mperm *minor_perms = NULL;
7487c478bd9Sstevel@tonic-gate 	struct mperm *mptail = NULL;
7497c478bd9Sstevel@tonic-gate 	struct passwd *pw;
7507c478bd9Sstevel@tonic-gate 	struct group *gp;
7517c478bd9Sstevel@tonic-gate 	uid_t root_uid;
7527c478bd9Sstevel@tonic-gate 	gid_t sys_gid;
7537c478bd9Sstevel@tonic-gate 	int ln = 0;
7547c478bd9Sstevel@tonic-gate 
7557c478bd9Sstevel@tonic-gate 	/*
7567c478bd9Sstevel@tonic-gate 	 * Get root/sys ids, these being the most common
7577c478bd9Sstevel@tonic-gate 	 */
7587c478bd9Sstevel@tonic-gate 	if ((pw = getpwnam(DEFAULT_DEV_USER)) != NULL) {
7597c478bd9Sstevel@tonic-gate 		root_uid = pw->pw_uid;
7607c478bd9Sstevel@tonic-gate 	} else {
7617c478bd9Sstevel@tonic-gate 		(*errcb)(MP_CANT_FIND_USER_ERR, 0);
7627c478bd9Sstevel@tonic-gate 		root_uid = (uid_t)0;	/* assume 0 is root */
7637c478bd9Sstevel@tonic-gate 	}
7647c478bd9Sstevel@tonic-gate 	if ((gp = getgrnam(DEFAULT_DEV_GROUP)) != NULL) {
7657c478bd9Sstevel@tonic-gate 		sys_gid = gp->gr_gid;
7667c478bd9Sstevel@tonic-gate 	} else {
7677c478bd9Sstevel@tonic-gate 		(*errcb)(MP_CANT_FIND_GROUP_ERR, 0);
7687c478bd9Sstevel@tonic-gate 		sys_gid = (gid_t)3;	/* assume 3 is sys */
7697c478bd9Sstevel@tonic-gate 	}
7707c478bd9Sstevel@tonic-gate 
7717c478bd9Sstevel@tonic-gate 	if ((pfd = fopen(MINOR_PERM_FILE, "r")) == NULL) {
7727c478bd9Sstevel@tonic-gate 		(*errcb)(MP_FOPEN_ERR, errno);
7737c478bd9Sstevel@tonic-gate 		return (NULL);
7747c478bd9Sstevel@tonic-gate 	}
7757c478bd9Sstevel@tonic-gate 	while (fgets(line, MAX_MINOR_PERM_LINE - 1, pfd) != NULL) {
7767c478bd9Sstevel@tonic-gate 		ln++;
7777c478bd9Sstevel@tonic-gate 		mp = (struct mperm *)calloc(1, sizeof (struct mperm));
7787c478bd9Sstevel@tonic-gate 		if (mp == NULL) {
7797c478bd9Sstevel@tonic-gate 			(*errcb)(MP_ALLOC_ERR, sizeof (struct mperm));
7807c478bd9Sstevel@tonic-gate 			continue;
7817c478bd9Sstevel@tonic-gate 		}
7827c478bd9Sstevel@tonic-gate 		cp = line;
7837c478bd9Sstevel@tonic-gate 		if (getnexttoken(cp, &cp, &p, &t) == 0) {
7847c478bd9Sstevel@tonic-gate 			(*errcb)(MP_IGNORING_LINE_ERR, ln);
7857c478bd9Sstevel@tonic-gate 			devfs_free_minor_perm(mp);
7867c478bd9Sstevel@tonic-gate 			continue;
7877c478bd9Sstevel@tonic-gate 		}
7887c478bd9Sstevel@tonic-gate 		mp->mp_drvname = strdup(p);
7897c478bd9Sstevel@tonic-gate 		if (mp->mp_drvname == NULL) {
7907c478bd9Sstevel@tonic-gate 			(*errcb)(MP_ALLOC_ERR, strlen(p)+1);
7917c478bd9Sstevel@tonic-gate 			devfs_free_minor_perm(mp);
7927c478bd9Sstevel@tonic-gate 			continue;
7937c478bd9Sstevel@tonic-gate 		} else if (t == '\n' || t == '\0') {
7947c478bd9Sstevel@tonic-gate 			(*errcb)(MP_IGNORING_LINE_ERR, ln);
7957c478bd9Sstevel@tonic-gate 			devfs_free_minor_perm(mp);
7967c478bd9Sstevel@tonic-gate 			continue;
7977c478bd9Sstevel@tonic-gate 		}
7987c478bd9Sstevel@tonic-gate 		if (t == ':') {
7997c478bd9Sstevel@tonic-gate 			if (getnexttoken(cp, &cp, &p, &t) == 0) {
8007c478bd9Sstevel@tonic-gate 				(*errcb)(MP_IGNORING_LINE_ERR, ln);
8017c478bd9Sstevel@tonic-gate 				devfs_free_minor_perm(mp);
8027c478bd9Sstevel@tonic-gate 			}
8037c478bd9Sstevel@tonic-gate 			mp->mp_minorname = strdup(p);
8047c478bd9Sstevel@tonic-gate 			if (mp->mp_minorname == NULL) {
8057c478bd9Sstevel@tonic-gate 				(*errcb)(MP_ALLOC_ERR, strlen(p)+1);
8067c478bd9Sstevel@tonic-gate 				devfs_free_minor_perm(mp);
8077c478bd9Sstevel@tonic-gate 				continue;
8087c478bd9Sstevel@tonic-gate 			}
8097c478bd9Sstevel@tonic-gate 		} else {
8107c478bd9Sstevel@tonic-gate 			mp->mp_minorname = NULL;
8117c478bd9Sstevel@tonic-gate 		}
8127c478bd9Sstevel@tonic-gate 
8137c478bd9Sstevel@tonic-gate 		if (t == '\n' || t == '\0') {
8147c478bd9Sstevel@tonic-gate 			devfs_free_minor_perm(mp);
8157c478bd9Sstevel@tonic-gate 			(*errcb)(MP_IGNORING_LINE_ERR, ln);
8167c478bd9Sstevel@tonic-gate 			continue;
8177c478bd9Sstevel@tonic-gate 		}
8187c478bd9Sstevel@tonic-gate 		if (getnexttoken(cp, &cp, &p, &t) == 0) {
8197c478bd9Sstevel@tonic-gate 			goto link;
8207c478bd9Sstevel@tonic-gate 		}
8217c478bd9Sstevel@tonic-gate 		if (getvalue(p, (int *)&mp->mp_mode) == 0) {
8227c478bd9Sstevel@tonic-gate 			goto link;
8237c478bd9Sstevel@tonic-gate 		}
8247c478bd9Sstevel@tonic-gate 		if (t == '\n' || t == '\0') {	/* no owner or group */
8257c478bd9Sstevel@tonic-gate 			goto link;
8267c478bd9Sstevel@tonic-gate 		}
8277c478bd9Sstevel@tonic-gate 		if (getnexttoken(cp, &cp, &p, &t) == 0) {
8287c478bd9Sstevel@tonic-gate 			goto link;
8297c478bd9Sstevel@tonic-gate 		}
8307c478bd9Sstevel@tonic-gate 		mp->mp_owner = strdup(p);
8317c478bd9Sstevel@tonic-gate 		if (mp->mp_owner == NULL) {
8327c478bd9Sstevel@tonic-gate 			(*errcb)(MP_ALLOC_ERR, strlen(p)+1);
8337c478bd9Sstevel@tonic-gate 			devfs_free_minor_perm(mp);
8347c478bd9Sstevel@tonic-gate 			continue;
8357c478bd9Sstevel@tonic-gate 		} else if (t == '\n' || t == '\0') {	/* no group */
8367c478bd9Sstevel@tonic-gate 			goto link;
8377c478bd9Sstevel@tonic-gate 		}
8387c478bd9Sstevel@tonic-gate 		if (getnexttoken(cp, &cp, &p, 0) == 0) {
8397c478bd9Sstevel@tonic-gate 			goto link;
8407c478bd9Sstevel@tonic-gate 		}
8417c478bd9Sstevel@tonic-gate 		mp->mp_group = strdup(p);
8427c478bd9Sstevel@tonic-gate 		if (mp->mp_group == NULL) {
8437c478bd9Sstevel@tonic-gate 			(*errcb)(MP_ALLOC_ERR, strlen(p)+1);
8447c478bd9Sstevel@tonic-gate 			devfs_free_minor_perm(mp);
8457c478bd9Sstevel@tonic-gate 			continue;
8467c478bd9Sstevel@tonic-gate 		}
8477c478bd9Sstevel@tonic-gate link:
8487c478bd9Sstevel@tonic-gate 		if (drvname != NULL) {
8497c478bd9Sstevel@tonic-gate 			/*
8507c478bd9Sstevel@tonic-gate 			 * We only want the minor perm entry for a
8517c478bd9Sstevel@tonic-gate 			 * the named driver.  The driver name is the
8527c478bd9Sstevel@tonic-gate 			 * minor in the clone case.
8537c478bd9Sstevel@tonic-gate 			 */
8547c478bd9Sstevel@tonic-gate 			if (strcmp(mp->mp_drvname, "clone") == 0) {
8557c478bd9Sstevel@tonic-gate 				if (mp->mp_minorname == NULL ||
8567c478bd9Sstevel@tonic-gate 				    strcmp(drvname, mp->mp_minorname) != 0) {
8577c478bd9Sstevel@tonic-gate 					devfs_free_minor_perm(mp);
8587c478bd9Sstevel@tonic-gate 					continue;
8597c478bd9Sstevel@tonic-gate 				}
8607c478bd9Sstevel@tonic-gate 			} else {
8617c478bd9Sstevel@tonic-gate 				if (strcmp(drvname, mp->mp_drvname) != 0) {
8627c478bd9Sstevel@tonic-gate 					devfs_free_minor_perm(mp);
8637c478bd9Sstevel@tonic-gate 					continue;
8647c478bd9Sstevel@tonic-gate 				}
8657c478bd9Sstevel@tonic-gate 			}
8667c478bd9Sstevel@tonic-gate 		}
8677c478bd9Sstevel@tonic-gate 		if (minor_perms == NULL) {
8687c478bd9Sstevel@tonic-gate 			minor_perms = mp;
8697c478bd9Sstevel@tonic-gate 		} else {
8707c478bd9Sstevel@tonic-gate 			mptail->mp_next = mp;
8717c478bd9Sstevel@tonic-gate 		}
8727c478bd9Sstevel@tonic-gate 		mptail = mp;
8737c478bd9Sstevel@tonic-gate 
8747c478bd9Sstevel@tonic-gate 		/*
8757c478bd9Sstevel@tonic-gate 		 * Compute the uid's and gid's here - there are
8767c478bd9Sstevel@tonic-gate 		 * fewer lines in the /etc/minor_perm file than there
8777c478bd9Sstevel@tonic-gate 		 * are devices to be stat(2)ed.  And almost every
8787c478bd9Sstevel@tonic-gate 		 * device is 'root sys'.  See 1135520.
8797c478bd9Sstevel@tonic-gate 		 */
8807c478bd9Sstevel@tonic-gate 		if (mp->mp_owner == NULL ||
8817c478bd9Sstevel@tonic-gate 		    strcmp(mp->mp_owner, DEFAULT_DEV_USER) == 0 ||
8827c478bd9Sstevel@tonic-gate 		    (pw = getpwnam(mp->mp_owner)) == NULL) {
8837c478bd9Sstevel@tonic-gate 			mp->mp_uid = root_uid;
8847c478bd9Sstevel@tonic-gate 		} else {
8857c478bd9Sstevel@tonic-gate 			mp->mp_uid = pw->pw_uid;
8867c478bd9Sstevel@tonic-gate 		}
8877c478bd9Sstevel@tonic-gate 
8887c478bd9Sstevel@tonic-gate 		if (mp->mp_group == NULL ||
8897c478bd9Sstevel@tonic-gate 		    strcmp(mp->mp_group, DEFAULT_DEV_GROUP) == 0 ||
8907c478bd9Sstevel@tonic-gate 		    (gp = getgrnam(mp->mp_group)) == NULL) {
8917c478bd9Sstevel@tonic-gate 			mp->mp_gid = sys_gid;
8927c478bd9Sstevel@tonic-gate 		} else {
8937c478bd9Sstevel@tonic-gate 			mp->mp_gid = gp->gr_gid;
8947c478bd9Sstevel@tonic-gate 		}
8957c478bd9Sstevel@tonic-gate 	}
8967c478bd9Sstevel@tonic-gate 
8977c478bd9Sstevel@tonic-gate 	if (fclose(pfd) == EOF) {
8987c478bd9Sstevel@tonic-gate 		(*errcb)(MP_FCLOSE_ERR, errno);
8997c478bd9Sstevel@tonic-gate 	}
9007c478bd9Sstevel@tonic-gate 
9017c478bd9Sstevel@tonic-gate 	return (minor_perms);
9027c478bd9Sstevel@tonic-gate }
9037c478bd9Sstevel@tonic-gate 
9047c478bd9Sstevel@tonic-gate struct mperm *
9057c478bd9Sstevel@tonic-gate devfs_read_minor_perm(void (*errcb)(minorperm_err_t, int))
9067c478bd9Sstevel@tonic-gate {
9077c478bd9Sstevel@tonic-gate 	return (i_devfs_read_minor_perm(NULL, errcb));
9087c478bd9Sstevel@tonic-gate }
9097c478bd9Sstevel@tonic-gate 
9107c478bd9Sstevel@tonic-gate static struct mperm *
9117c478bd9Sstevel@tonic-gate i_devfs_read_minor_perm_by_driver(char *drvname,
9127c478bd9Sstevel@tonic-gate 	void (*errcb)(minorperm_err_t mp_err, int key))
9137c478bd9Sstevel@tonic-gate {
9147c478bd9Sstevel@tonic-gate 	return (i_devfs_read_minor_perm(drvname, errcb));
9157c478bd9Sstevel@tonic-gate }
9167c478bd9Sstevel@tonic-gate 
9177c478bd9Sstevel@tonic-gate /*
9187c478bd9Sstevel@tonic-gate  * Free mperm list of entries
9197c478bd9Sstevel@tonic-gate  */
9207c478bd9Sstevel@tonic-gate void
9217c478bd9Sstevel@tonic-gate devfs_free_minor_perm(struct mperm *mplist)
9227c478bd9Sstevel@tonic-gate {
9237c478bd9Sstevel@tonic-gate 	struct mperm *mp, *next;
9247c478bd9Sstevel@tonic-gate 
9257c478bd9Sstevel@tonic-gate 	for (mp = mplist; mp != NULL; mp = next) {
9267c478bd9Sstevel@tonic-gate 		next = mp->mp_next;
9277c478bd9Sstevel@tonic-gate 
9287c478bd9Sstevel@tonic-gate 		if (mp->mp_drvname)
9297c478bd9Sstevel@tonic-gate 			free(mp->mp_drvname);
9307c478bd9Sstevel@tonic-gate 		if (mp->mp_minorname)
9317c478bd9Sstevel@tonic-gate 			free(mp->mp_minorname);
9327c478bd9Sstevel@tonic-gate 		if (mp->mp_owner)
9337c478bd9Sstevel@tonic-gate 			free(mp->mp_owner);
9347c478bd9Sstevel@tonic-gate 		if (mp->mp_group)
9357c478bd9Sstevel@tonic-gate 			free(mp->mp_group);
9367c478bd9Sstevel@tonic-gate 		free(mp);
9377c478bd9Sstevel@tonic-gate 	}
9387c478bd9Sstevel@tonic-gate }
9397c478bd9Sstevel@tonic-gate 
9407c478bd9Sstevel@tonic-gate static int
9417c478bd9Sstevel@tonic-gate i_devfs_add_perm_entry(nvlist_t *nvl, struct mperm *mp)
9427c478bd9Sstevel@tonic-gate {
9437c478bd9Sstevel@tonic-gate 	int err;
9447c478bd9Sstevel@tonic-gate 
9457c478bd9Sstevel@tonic-gate 	err = nvlist_add_string(nvl, mp->mp_drvname, mp->mp_minorname);
9467c478bd9Sstevel@tonic-gate 	if (err != 0)
9477c478bd9Sstevel@tonic-gate 		return (err);
9487c478bd9Sstevel@tonic-gate 
9497c478bd9Sstevel@tonic-gate 	err = nvlist_add_int32(nvl, "mode", (int32_t)mp->mp_mode);
9507c478bd9Sstevel@tonic-gate 	if (err != 0)
9517c478bd9Sstevel@tonic-gate 		return (err);
9527c478bd9Sstevel@tonic-gate 
9537c478bd9Sstevel@tonic-gate 	err = nvlist_add_int32(nvl, "uid", (int32_t)mp->mp_uid);
9547c478bd9Sstevel@tonic-gate 	if (err != 0)
9557c478bd9Sstevel@tonic-gate 		return (err);
9567c478bd9Sstevel@tonic-gate 
9577c478bd9Sstevel@tonic-gate 	err = nvlist_add_int32(nvl, "gid", (int32_t)mp->mp_gid);
9587c478bd9Sstevel@tonic-gate 	return (err);
9597c478bd9Sstevel@tonic-gate }
9607c478bd9Sstevel@tonic-gate 
9617c478bd9Sstevel@tonic-gate static nvlist_t *
9627c478bd9Sstevel@tonic-gate i_devfs_minor_perm_nvlist(struct mperm *mplist,
9637c478bd9Sstevel@tonic-gate 	void (*errcb)(minorperm_err_t, int))
9647c478bd9Sstevel@tonic-gate {
9657c478bd9Sstevel@tonic-gate 	int err;
9667c478bd9Sstevel@tonic-gate 	struct mperm *mp;
9677c478bd9Sstevel@tonic-gate 	nvlist_t *nvl = NULL;
9687c478bd9Sstevel@tonic-gate 
9697c478bd9Sstevel@tonic-gate 	if ((err = nvlist_alloc(&nvl, 0, 0)) != 0) {
9707c478bd9Sstevel@tonic-gate 		(*errcb)(MP_NVLIST_ERR, err);
9717c478bd9Sstevel@tonic-gate 		return (NULL);
9727c478bd9Sstevel@tonic-gate 	}
9737c478bd9Sstevel@tonic-gate 
9747c478bd9Sstevel@tonic-gate 	for (mp = mplist; mp != NULL; mp = mp->mp_next) {
9757c478bd9Sstevel@tonic-gate 		if ((err = i_devfs_add_perm_entry(nvl, mp)) != 0) {
9767c478bd9Sstevel@tonic-gate 			(*errcb)(MP_NVLIST_ERR, err);
9777c478bd9Sstevel@tonic-gate 			nvlist_free(nvl);
9787c478bd9Sstevel@tonic-gate 			return (NULL);
9797c478bd9Sstevel@tonic-gate 		}
9807c478bd9Sstevel@tonic-gate 	}
9817c478bd9Sstevel@tonic-gate 
9827c478bd9Sstevel@tonic-gate 	return (nvl);
9837c478bd9Sstevel@tonic-gate }
9847c478bd9Sstevel@tonic-gate 
9857c478bd9Sstevel@tonic-gate /*
9867c478bd9Sstevel@tonic-gate  * Load all minor perm entries into the kernel
9877c478bd9Sstevel@tonic-gate  * Done at boot time via devfsadm
9887c478bd9Sstevel@tonic-gate  */
9897c478bd9Sstevel@tonic-gate int
9907c478bd9Sstevel@tonic-gate devfs_load_minor_perm(struct mperm *mplist,
9917c478bd9Sstevel@tonic-gate 	void (*errcb)(minorperm_err_t, int))
9927c478bd9Sstevel@tonic-gate {
9937c478bd9Sstevel@tonic-gate 	int err;
9947c478bd9Sstevel@tonic-gate 	char *buf = NULL;
9957c478bd9Sstevel@tonic-gate 	size_t buflen;
9967c478bd9Sstevel@tonic-gate 	nvlist_t *nvl;
9977c478bd9Sstevel@tonic-gate 
9987c478bd9Sstevel@tonic-gate 	nvl = i_devfs_minor_perm_nvlist(mplist, errcb);
9997c478bd9Sstevel@tonic-gate 	if (nvl == NULL)
10007c478bd9Sstevel@tonic-gate 		return (-1);
10017c478bd9Sstevel@tonic-gate 
10027c478bd9Sstevel@tonic-gate 	if (nvlist_pack(nvl, &buf, &buflen, NV_ENCODE_NATIVE, 0) != 0) {
10037c478bd9Sstevel@tonic-gate 		nvlist_free(nvl);
10047c478bd9Sstevel@tonic-gate 		return (-1);
10057c478bd9Sstevel@tonic-gate 	}
10067c478bd9Sstevel@tonic-gate 
10077c478bd9Sstevel@tonic-gate 	err = modctl(MODLOADMINORPERM, buf, buflen);
10087c478bd9Sstevel@tonic-gate 	nvlist_free(nvl);
10097c478bd9Sstevel@tonic-gate 	free(buf);
10107c478bd9Sstevel@tonic-gate 
10117c478bd9Sstevel@tonic-gate 	return (err);
10127c478bd9Sstevel@tonic-gate }
10137c478bd9Sstevel@tonic-gate 
10147c478bd9Sstevel@tonic-gate /*
10157c478bd9Sstevel@tonic-gate  * Add/remove minor perm entry for a driver
10167c478bd9Sstevel@tonic-gate  */
10177c478bd9Sstevel@tonic-gate static int
10187c478bd9Sstevel@tonic-gate i_devfs_update_minor_perm(char *drv, int ctl,
10197c478bd9Sstevel@tonic-gate 	void (*errcb)(minorperm_err_t, int))
10207c478bd9Sstevel@tonic-gate {
10217c478bd9Sstevel@tonic-gate 	int err;
10227c478bd9Sstevel@tonic-gate 	char *buf;
10237c478bd9Sstevel@tonic-gate 	size_t buflen;
10247c478bd9Sstevel@tonic-gate 	nvlist_t *nvl;
10257c478bd9Sstevel@tonic-gate 	struct mperm *mplist;
10267c478bd9Sstevel@tonic-gate 
10277c478bd9Sstevel@tonic-gate 	mplist = i_devfs_read_minor_perm_by_driver(drv, errcb);
10287c478bd9Sstevel@tonic-gate 
10297c478bd9Sstevel@tonic-gate 	nvl = i_devfs_minor_perm_nvlist(mplist, errcb);
10307c478bd9Sstevel@tonic-gate 	if (nvl == NULL)
10317c478bd9Sstevel@tonic-gate 		return (-1);
10327c478bd9Sstevel@tonic-gate 
10337c478bd9Sstevel@tonic-gate 	buf = NULL;
10347c478bd9Sstevel@tonic-gate 	if (nvlist_pack(nvl, &buf, &buflen, NV_ENCODE_NATIVE, 0) != 0) {
10357c478bd9Sstevel@tonic-gate 		nvlist_free(nvl);
10367c478bd9Sstevel@tonic-gate 		return (-1);
10377c478bd9Sstevel@tonic-gate 	}
10387c478bd9Sstevel@tonic-gate 
10397c478bd9Sstevel@tonic-gate 	err = modctl(ctl, buf, buflen);
10407c478bd9Sstevel@tonic-gate 	nvlist_free(nvl);
10417c478bd9Sstevel@tonic-gate 	devfs_free_minor_perm(mplist);
10427c478bd9Sstevel@tonic-gate 	free(buf);
10437c478bd9Sstevel@tonic-gate 
10447c478bd9Sstevel@tonic-gate 	return (err);
10457c478bd9Sstevel@tonic-gate }
10467c478bd9Sstevel@tonic-gate 
10477c478bd9Sstevel@tonic-gate int
10487c478bd9Sstevel@tonic-gate devfs_add_minor_perm(char *drv,
10497c478bd9Sstevel@tonic-gate 	void (*errcb)(minorperm_err_t, int))
10507c478bd9Sstevel@tonic-gate {
10517c478bd9Sstevel@tonic-gate 	return (i_devfs_update_minor_perm(drv, MODADDMINORPERM, errcb));
10527c478bd9Sstevel@tonic-gate }
10537c478bd9Sstevel@tonic-gate 
10547c478bd9Sstevel@tonic-gate int
10557c478bd9Sstevel@tonic-gate devfs_rm_minor_perm(char *drv,
10567c478bd9Sstevel@tonic-gate 	void (*errcb)(minorperm_err_t, int))
10577c478bd9Sstevel@tonic-gate {
10587c478bd9Sstevel@tonic-gate 	return (i_devfs_update_minor_perm(drv, MODREMMINORPERM, errcb));
10597c478bd9Sstevel@tonic-gate }
1060