xref: /titanic_50/usr/src/lib/libdevinfo/devinfo_devperm.c (revision c5c4113dfcabb1eed3d4bdf7609de5170027a794)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2007 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #pragma ident	"%Z%%M%	%I%	%E% SMI"
27 
28 #define	_POSIX_PTHREAD_SEMANTICS	/* for getgrnam_r */
29 #ifdef lint
30 #define	_REENTRANT			/* for strtok_r */
31 #endif
32 
33 #include <stdio.h>
34 #include <stdlib.h>
35 #include <ctype.h>
36 #include <string.h>
37 #include <unistd.h>
38 #include <dirent.h>
39 #include <errno.h>
40 #include <grp.h>
41 #include <pwd.h>
42 #include <nss_dbdefs.h>
43 #include <stdarg.h>
44 #include <syslog.h>
45 #include <sys/acl.h>
46 #include <sys/types.h>
47 #include <sys/stat.h>
48 #include <sys/ddi.h>
49 #include <sys/sunddi.h>
50 #include <sys/devinfo_impl.h>
51 #include <sys/hwconf.h>
52 #include <sys/modctl.h>
53 #include <libnvpair.h>
54 #include <device_info.h>
55 #include <regex.h>
56 #include <strings.h>
57 #include <libdevinfo.h>
58 #include <zone.h>
59 
60 extern int is_minor_node(const char *, const char **);
61 
62 static int logindevperm(const char *, uid_t, gid_t, void (*)());
63 static int dir_dev_acc(char *, char *, uid_t, gid_t, mode_t, char *line,
64 	void (*)());
65 static int setdevaccess(char *, uid_t, gid_t, mode_t, void (*)());
66 static void logerror(char *);
67 
68 static int is_blank(char *);
69 
70 #define	MAX_LINELEN	256
71 #define	LOGINDEVPERM	"/etc/logindevperm"
72 #define	DIRWILD		"/*"			/* directory wildcard */
73 #define	DIRWLDLEN	2			/* strlen(DIRWILD) */
74 
75 /*
76  * Revoke all access to a device node and make sure that there are
77  * no interposed streams devices attached.  Must be called before a
78  * device is actually opened.
79  * When fdetach is called, the underlying device node is revealed; it
80  * will have the previous owner and that owner can re-attach; so we
81  * retry until we win.
82  * Ignore non-existent devices.
83  */
84 static int
85 setdevaccess(char *dev, uid_t uid, gid_t gid, mode_t mode,
86     void (*errmsg)(char *))
87 {
88 	int err = 0, local_errno;
89 	char errstring[MAX_LINELEN];
90 	struct stat st;
91 
92 	if (chown(dev, uid, gid) == -1) {
93 		if (errno == ENOENT)	/* no such file */
94 			return (0);
95 		err = -1;
96 		local_errno = errno;
97 	}
98 
99 	/*
100 	 * don't fdetach block devices, as it will unmount them
101 	 */
102 	if (!((stat(dev, &st) == 0) && ((st.st_mode & S_IFMT) == S_IFBLK))) {
103 		while (fdetach(dev) == 0) {
104 			if (chown(dev, uid, gid) == -1) {
105 				err = -1;
106 				local_errno = errno;
107 			}
108 		}
109 		if (err && errmsg) {
110 			(void) snprintf(errstring, MAX_LINELEN,
111 			    "failed to chown device %s: %s\n",
112 			    dev, strerror(local_errno));
113 			(*errmsg)(errstring);
114 		}
115 	}
116 
117 	/*
118 	 * strip_acl sets an acl and changes the files owner/group
119 	 */
120 	err = acl_strip(dev, uid, gid, mode);
121 
122 	if (err != 0) {
123 		/*
124 		 * If the file system returned ENOSYS, we know that it
125 		 * doesn't support ACLs, therefore, we must assume that
126 		 * there were no ACLs to remove in the first place.
127 		 */
128 		err = 0;
129 		if (errno != ENOSYS) {
130 			err = -1;
131 
132 			if (errmsg) {
133 				(void) snprintf(errstring, MAX_LINELEN,
134 				    "failed to set acl on device %s: %s\n",
135 				    dev, strerror(errno));
136 				(*errmsg)(errstring);
137 			}
138 		}
139 		if (chmod(dev, mode) == -1) {
140 			err = -1;
141 			if (errmsg) {
142 				(void) snprintf(errstring, MAX_LINELEN,
143 				    "failed to chmod device %s: %s\n",
144 				    dev, strerror(errno));
145 				(*errmsg)(errstring);
146 			}
147 		}
148 	}
149 
150 	return (err);
151 }
152 
153 /*
154  * logindevperm - change owner/group/permissions of devices
155  * list in /etc/logindevperm.
156  */
157 static int
158 logindevperm(const char *ttyn, uid_t uid, gid_t gid, void (*errmsg)(char *))
159 {
160 	int err = 0, lineno = 0;
161 	const char *field_delims = " \t\n";
162 	char line[MAX_LINELEN], errstring[MAX_LINELEN];
163 	char saveline[MAX_LINELEN];
164 	char *console;
165 	char *mode_str;
166 	char *dev_list;
167 	char *device;
168 	char *ptr;
169 	int mode;
170 	FILE *fp;
171 
172 	if ((fp = fopen(LOGINDEVPERM, "r")) == NULL) {
173 		if (errmsg) {
174 			(void) snprintf(errstring, MAX_LINELEN,
175 			    LOGINDEVPERM ": open failed: %s\n",
176 			    strerror(errno));
177 			(*errmsg)(errstring);
178 		}
179 		return (-1);
180 	}
181 
182 	while (fgets(line, MAX_LINELEN, fp) != NULL) {
183 		char *last;
184 		lineno++;
185 
186 		if ((ptr = strchr(line, '#')) != NULL)
187 			*ptr = '\0';	/* handle comments */
188 
189 		(void) strcpy(saveline, line);
190 
191 		console = strtok_r(line, field_delims, &last);
192 		if (console == NULL)
193 			continue;	/* ignore blank lines */
194 
195 		if (strcmp(console, ttyn) != 0)
196 			continue;	/* not our tty, skip */
197 
198 		mode_str = strtok_r(last, field_delims, &last);
199 		if (mode_str == NULL) {
200 			err = -1;	/* invalid entry, skip */
201 			if (errmsg) {
202 				(void) snprintf(errstring, MAX_LINELEN,
203 				    LOGINDEVPERM
204 				    ": line %d, invalid entry -- %s\n",
205 				    lineno, line);
206 				(*errmsg)(errstring);
207 			}
208 			continue;
209 		}
210 
211 		/* convert string to octal value */
212 		mode = strtol(mode_str, &ptr, 8);
213 		if (mode < 0 || mode > 0777 || *ptr != '\0') {
214 			err = -1;	/* invalid mode, skip */
215 			if (errmsg) {
216 				(void) snprintf(errstring, MAX_LINELEN,
217 				    LOGINDEVPERM
218 				    ": line %d, invalid mode -- %s\n",
219 				    lineno, mode_str);
220 				(*errmsg)(errstring);
221 			}
222 			continue;
223 		}
224 
225 		dev_list = strtok_r(last, field_delims, &last);
226 		if (dev_list == NULL) {
227 			err = -1;	/* empty device list, skip */
228 			if (errmsg) {
229 				(void) snprintf(errstring, MAX_LINELEN,
230 				    LOGINDEVPERM
231 				    ": line %d, empty device list -- %s\n",
232 				    lineno, line);
233 				(*errmsg)(errstring);
234 			}
235 			continue;
236 		}
237 
238 		device = strtok_r(dev_list, ":", &last);
239 		while (device != NULL) {
240 			if ((device[0] != '/') || (strlen(device) <= 1))  {
241 				err = -1;
242 			} else if (dir_dev_acc("/", &device[1], uid, gid, mode,
243 			    saveline, errmsg)) {
244 				err = -1;
245 			}
246 			device = strtok_r(last, ":", &last);
247 		}
248 	}
249 	(void) fclose(fp);
250 	return (err);
251 }
252 
253 /*
254  * returns 0 if resolved, -1 otherwise.
255  * devpath: Absolute path to /dev link
256  * devfs_path: Returns malloced string: /devices path w/out "/devices"
257  */
258 static int
259 resolve_link(char *devpath, char **devfs_path)
260 {
261 	char contents[PATH_MAX + 1];
262 	char stage_link[PATH_MAX + 1];
263 	char *ptr;
264 	int linksize;
265 	char *slashdev = "/dev/";
266 
267 	if (devfs_path) {
268 		*devfs_path = NULL;
269 	}
270 
271 	linksize = readlink(devpath, contents, PATH_MAX);
272 
273 	if (linksize <= 0) {
274 		return (-1);
275 	} else {
276 		contents[linksize] = '\0';
277 	}
278 
279 	/*
280 	 * if the link contents is not a minor node assume
281 	 * that link contents is really a pointer to another
282 	 * link, and if so recurse and read its link contents.
283 	 */
284 	if (is_minor_node((const char *)contents, (const char **)&ptr) !=
285 	    1) {
286 		if (strncmp(contents, slashdev, strlen(slashdev)) == 0)  {
287 			/* absolute path, starting with /dev */
288 			(void) strcpy(stage_link, contents);
289 		} else {
290 			/* relative path, prefix devpath */
291 			if ((ptr = strrchr(devpath, '/')) == NULL) {
292 				/* invalid link */
293 				return (-1);
294 			}
295 			*ptr = '\0';
296 			(void) strcpy(stage_link, devpath);
297 			*ptr = '/';
298 			(void) strcat(stage_link, "/");
299 			(void) strcat(stage_link, contents);
300 
301 		}
302 		return (resolve_link(stage_link, devfs_path));
303 	}
304 
305 	if (devfs_path) {
306 		*devfs_path = strdup(ptr);
307 		if (*devfs_path == NULL) {
308 			return (-1);
309 		}
310 	}
311 
312 	return (0);
313 }
314 
315 /*
316  * check a logindevperm line for a driver list and match this against
317  * the driver of the minor node
318  * returns 0 if no drivers were specified or a driver match
319  */
320 static int
321 check_driver_match(char *path, char *line)
322 {
323 	char *drv, *driver, *lasts;
324 	char *devfs_path = NULL;
325 	char saveline[MAX_LINELEN];
326 	char *p;
327 
328 	if (resolve_link(path, &devfs_path) == 0) {
329 		char *p;
330 		char pwd_buf[PATH_MAX];
331 		di_node_t node;
332 
333 		/* truncate on : so we can take a snapshot */
334 		(void) strcpy(pwd_buf, devfs_path);
335 		p = strrchr(pwd_buf, ':');
336 		*p = '\0';
337 
338 		node = di_init(pwd_buf, DINFOMINOR);
339 		free(devfs_path);
340 
341 		if (node) {
342 			drv = di_driver_name(node);
343 			di_fini(node);
344 		} else {
345 			return (0);
346 		}
347 	} else {
348 		return (0);
349 	}
350 
351 	(void) strcpy(saveline, line);
352 
353 	p = strstr(saveline, "driver");
354 	if (p == NULL) {
355 		return (0);
356 	}
357 
358 	driver = strtok_r(p, "=", &lasts);
359 	if (driver) {
360 		if (strcmp(driver, "driver") == 0) {
361 			driver = strtok_r(NULL, ", \t\n", &lasts);
362 			while (driver) {
363 				if (strcmp(driver, drv) == 0) {
364 					return (0);
365 				}
366 				driver = strtok_r(NULL, ", \t\n", &lasts);
367 			}
368 		}
369 	}
370 
371 	return (-1);
372 }
373 
374 /*
375  * Apply owner/group/perms to all files (except "." and "..")
376  * in a directory.
377  * This function is recursive. We start with "/" and the rest of the pathname
378  * in left_to_do argument, and we walk the entire pathname which may contain
379  * regular expressions or '*' for each directory name or basename.
380  */
381 static int
382 dir_dev_acc(char *path, char *left_to_do, uid_t uid, gid_t gid, mode_t mode,
383     char *line, void (*errmsg)(char *))
384 {
385 	struct stat stat_buf;
386 	int err = 0;
387 	char errstring[MAX_LINELEN];
388 	char *p;
389 	regex_t regex;
390 	int alwaysmatch = 0;
391 	char *match;
392 	char *name, *newpath, *remainder_path;
393 	finddevhdl_t handle;
394 
395 	/*
396 	 * Determine if the search needs to be performed via finddev,
397 	 * which returns only persisted names in the global /dev, or
398 	 * readdir, for paths other than /dev and non-global zones.
399 	 * This use of finddev avoids triggering potential implicit
400 	 * reconfig for names managed by logindevperm but not present
401 	 * on the system.
402 	 */
403 	if (!device_exists(path)) {
404 		return (-1);
405 	}
406 	if (stat(path, &stat_buf) == -1) {
407 		/*
408 		 * ENOENT errors are expected errors when there are
409 		 * dangling /dev device links. Ignore them silently
410 		 */
411 		if (errno == ENOENT) {
412 			return (0);
413 		}
414 		if (errmsg) {
415 			(void) snprintf(errstring, MAX_LINELEN,
416 			    "failed to stat %s: %s\n", path,
417 			    strerror(errno));
418 			(*errmsg)(errstring);
419 		}
420 		return (-1);
421 	} else {
422 		if (!S_ISDIR(stat_buf.st_mode)) {
423 			if (strlen(left_to_do) == 0) {
424 				/* finally check the driver matches */
425 				if (check_driver_match(path, line) == 0) {
426 					/* we are done, set the permissions */
427 					if (setdevaccess(path,
428 					    uid, gid, mode, errmsg)) {
429 
430 						return (-1);
431 					}
432 				}
433 			}
434 			return (0);
435 		}
436 	}
437 
438 	if (finddev_readdir(path, &handle) != 0)
439 		return (0);
440 
441 	p = strchr(left_to_do, '/');
442 	alwaysmatch = 0;
443 
444 	newpath = (char *)malloc(MAXPATHLEN);
445 	if (newpath == NULL) {
446 		finddev_close(handle);
447 		return (-1);
448 	}
449 	match = (char *)calloc(MAXPATHLEN, 1);
450 	if (match == NULL) {
451 		finddev_close(handle);
452 		free(newpath);
453 		return (-1);
454 	}
455 
456 	if (p) {
457 		(void) strncpy(match, left_to_do, p - left_to_do);
458 	} else {
459 		(void) strcpy(match, left_to_do);
460 	}
461 
462 	if (strcmp(match, "*") == 0) {
463 		alwaysmatch = 1;
464 	} else {
465 		if (regcomp(&regex, match, REG_EXTENDED) != 0) {
466 			free(newpath);
467 			free(match);
468 			finddev_close(handle);
469 			return (-1);
470 		}
471 	}
472 
473 	while ((name = (char *)finddev_next(handle)) != NULL) {
474 		if (alwaysmatch ||
475 		    regexec(&regex, name, 0, NULL, 0) == 0) {
476 			if (strcmp(path, "/") == 0) {
477 				(void) snprintf(newpath,
478 				    MAXPATHLEN, "%s%s", path, name);
479 			} else {
480 				(void) snprintf(newpath,
481 				    MAXPATHLEN, "%s/%s", path, name);
482 			}
483 
484 			/*
485 			 * recurse but adjust what is still left to do
486 			 */
487 			remainder_path = (p ?
488 			    left_to_do + (p - left_to_do) + 1 :
489 			    &left_to_do[strlen(left_to_do)]);
490 			if (dir_dev_acc(newpath, remainder_path,
491 			    uid, gid, mode, line, errmsg)) {
492 				err = -1;
493 			}
494 		}
495 	}
496 
497 	finddev_close(handle);
498 	free(newpath);
499 	free(match);
500 	if (!alwaysmatch) {
501 		regfree(&regex);
502 	}
503 
504 	return (err);
505 }
506 
507 /*
508  * di_devperm_login - modify access of devices in /etc/logindevperm
509  * by changing owner/group/permissions to that of ttyn.
510  */
511 int
512 di_devperm_login(const char *ttyn, uid_t uid, gid_t gid,
513     void (*errmsg)(char *))
514 {
515 	int err;
516 	struct group grp, *grpp;
517 	gid_t tty_gid;
518 	char grbuf[NSS_BUFLEN_GROUP];
519 
520 	if (errmsg == NULL)
521 		errmsg = logerror;
522 
523 	if (ttyn == NULL) {
524 		(*errmsg)("di_devperm_login: NULL tty device\n");
525 		return (-1);
526 	}
527 
528 	if (getgrnam_r("tty", &grp, grbuf, NSS_BUFLEN_GROUP, &grpp) != 0) {
529 		tty_gid = grpp->gr_gid;
530 	} else {
531 		/*
532 		 * this should never happen, but if it does set
533 		 * group to tty's traditional value.
534 		 */
535 		tty_gid = 7;
536 	}
537 
538 	/* set the login console device permission */
539 	err = setdevaccess((char *)ttyn, uid, tty_gid,
540 	    S_IRUSR|S_IWUSR|S_IWGRP, errmsg);
541 	if (err) {
542 		return (err);
543 	}
544 
545 	/* set the device permissions */
546 	return (logindevperm(ttyn, uid, gid, errmsg));
547 }
548 
549 /*
550  * di_devperm_logout - clean up access of devices in /etc/logindevperm
551  * by resetting owner/group/permissions.
552  */
553 int
554 di_devperm_logout(const char *ttyn)
555 {
556 	struct passwd *pwd;
557 	uid_t root_uid;
558 	gid_t root_gid;
559 
560 	if (ttyn == NULL)
561 		return (-1);
562 
563 	pwd = getpwnam("root");
564 	if (pwd != NULL) {
565 		root_uid = pwd->pw_uid;
566 		root_gid = pwd->pw_gid;
567 	} else {
568 		/*
569 		 * this should never happen, but if it does set user
570 		 * and group to root's traditional values.
571 		 */
572 		root_uid = 0;
573 		root_gid = 0;
574 	}
575 
576 	return (logindevperm(ttyn, root_uid, root_gid, NULL));
577 }
578 
579 static void
580 logerror(char *errstring)
581 {
582 	syslog(LOG_AUTH | LOG_CRIT, "%s", errstring);
583 }
584 
585 
586 /*
587  * Tokens are separated by ' ', '\t', ':', '=', '&', '|', ';', '\n', or '\0'
588  */
589 static int
590 getnexttoken(char *next, char **nextp, char **tokenpp, char *tchar)
591 {
592 	char *cp;
593 	char *cp1;
594 	char *tokenp;
595 
596 	cp = next;
597 	while (*cp == ' ' || *cp == '\t') {
598 		cp++;			/* skip leading spaces */
599 	}
600 	tokenp = cp;			/* start of token */
601 	while (*cp != '\0' && *cp != '\n' && *cp != ' ' && *cp != '\t' &&
602 		*cp != ':' && *cp != '=' && *cp != '&' &&
603 		*cp != '|' && *cp != ';') {
604 		cp++;			/* point to next character */
605 	}
606 	/*
607 	 * If terminating character is a space or tab, look ahead to see if
608 	 * there's another terminator that's not a space or a tab.
609 	 * (This code handles trailing spaces.)
610 	 */
611 	if (*cp == ' ' || *cp == '\t') {
612 		cp1 = cp;
613 		while (*++cp1 == ' ' || *cp1 == '\t')
614 			;
615 		if (*cp1 == '=' || *cp1 == ':' || *cp1 == '&' || *cp1 == '|' ||
616 			*cp1 == ';' || *cp1 == '\n' || *cp1 == '\0') {
617 			*cp = NULL;	/* terminate token */
618 			cp = cp1;
619 		}
620 	}
621 	if (tchar != NULL) {
622 		*tchar = *cp;		/* save terminating character */
623 		if (*tchar == '\0') {
624 			*tchar = '\n';
625 		}
626 	}
627 	*cp++ = '\0';			/* terminate token, point to next */
628 	*nextp = cp;			/* set pointer to next character */
629 	if (cp - tokenp - 1 == 0) {
630 		return (0);
631 	}
632 	*tokenpp = tokenp;
633 	return (1);
634 }
635 
636 /*
637  * get a decimal octal or hex number. Handle '~' for one's complement.
638  */
639 static int
640 getvalue(char *token, int *valuep)
641 {
642 	int radix;
643 	int retval = 0;
644 	int onescompl = 0;
645 	int negate = 0;
646 	char c;
647 
648 	if (*token == '~') {
649 		onescompl++; /* perform one's complement on result */
650 		token++;
651 	} else if (*token == '-') {
652 		negate++;
653 		token++;
654 	}
655 	if (*token == '0') {
656 		token++;
657 		c = *token;
658 
659 		if (c == '\0') {
660 			*valuep = 0;	/* value is 0 */
661 			return (0);
662 		}
663 
664 		if (c == 'x' || c == 'X') {
665 			radix = 16;
666 			token++;
667 		} else {
668 			radix = 8;
669 		}
670 	} else
671 		radix = 10;
672 
673 	while ((c = *token++)) {
674 		switch (radix) {
675 		case 8:
676 			if (c >= '0' && c <= '7') {
677 				c -= '0';
678 			} else {
679 				/* invalid number */
680 				return (0);
681 			}
682 			retval = (retval << 3) + c;
683 			break;
684 		case 10:
685 			if (c >= '0' && c <= '9') {
686 				c -= '0';
687 			} else {
688 				/* invalid number */
689 				return (0);
690 			}
691 			retval = (retval * 10) + c;
692 			break;
693 		case 16:
694 			if (c >= 'a' && c <= 'f') {
695 				c = c - 'a' + 10;
696 			} else if (c >= 'A' && c <= 'F') {
697 				c = c - 'A' + 10;
698 			} else if (c >= '0' && c <= '9') {
699 				c -= '0';
700 			} else {
701 				/* invalid number */
702 				return (0);
703 			}
704 			retval = (retval << 4) + c;
705 			break;
706 		}
707 	}
708 	if (onescompl) {
709 		retval = ~retval;
710 	}
711 	if (negate) {
712 		retval = -retval;
713 	}
714 	*valuep = retval;
715 	return (1);
716 }
717 
718 /*
719  * Read /etc/minor_perm, return mperm list of entries
720  */
721 struct mperm *
722 i_devfs_read_minor_perm(char *drvname, void (*errcb)(minorperm_err_t, int))
723 {
724 	FILE *pfd;
725 	struct mperm *mp;
726 	char line[MAX_MINOR_PERM_LINE];
727 	char *cp, *p, t;
728 	struct mperm *minor_perms = NULL;
729 	struct mperm *mptail = NULL;
730 	struct passwd *pw;
731 	struct group *gp;
732 	uid_t root_uid;
733 	gid_t sys_gid;
734 	int ln = 0;
735 
736 	/*
737 	 * Get root/sys ids, these being the most common
738 	 */
739 	if ((pw = getpwnam(DEFAULT_DEV_USER)) != NULL) {
740 		root_uid = pw->pw_uid;
741 	} else {
742 		(*errcb)(MP_CANT_FIND_USER_ERR, 0);
743 		root_uid = (uid_t)0;	/* assume 0 is root */
744 	}
745 	if ((gp = getgrnam(DEFAULT_DEV_GROUP)) != NULL) {
746 		sys_gid = gp->gr_gid;
747 	} else {
748 		(*errcb)(MP_CANT_FIND_GROUP_ERR, 0);
749 		sys_gid = (gid_t)3;	/* assume 3 is sys */
750 	}
751 
752 	if ((pfd = fopen(MINOR_PERM_FILE, "r")) == NULL) {
753 		(*errcb)(MP_FOPEN_ERR, errno);
754 		return (NULL);
755 	}
756 	while (fgets(line, MAX_MINOR_PERM_LINE, pfd) != NULL) {
757 		ln++;
758 		/* cut off comments starting with '#' */
759 		if ((cp = strchr(line, '#')) != NULL)
760 			*cp = '\0';
761 		/* ignore comment or blank lines */
762 		if (is_blank(line))
763 			continue;
764 		mp = (struct mperm *)calloc(1, sizeof (struct mperm));
765 		if (mp == NULL) {
766 			(*errcb)(MP_ALLOC_ERR, sizeof (struct mperm));
767 			continue;
768 		}
769 		cp = line;
770 		/* sanity-check */
771 		if (getnexttoken(cp, &cp, &p, &t) == 0) {
772 			(*errcb)(MP_IGNORING_LINE_ERR, ln);
773 			devfs_free_minor_perm(mp);
774 			continue;
775 		}
776 		mp->mp_drvname = strdup(p);
777 		if (mp->mp_drvname == NULL) {
778 			(*errcb)(MP_ALLOC_ERR, strlen(p)+1);
779 			devfs_free_minor_perm(mp);
780 			continue;
781 		} else if (t == '\n' || t == '\0') {
782 			(*errcb)(MP_IGNORING_LINE_ERR, ln);
783 			devfs_free_minor_perm(mp);
784 			continue;
785 		}
786 		if (t == ':') {
787 			if (getnexttoken(cp, &cp, &p, &t) == 0) {
788 				(*errcb)(MP_IGNORING_LINE_ERR, ln);
789 				devfs_free_minor_perm(mp);
790 			}
791 			mp->mp_minorname = strdup(p);
792 			if (mp->mp_minorname == NULL) {
793 				(*errcb)(MP_ALLOC_ERR, strlen(p)+1);
794 				devfs_free_minor_perm(mp);
795 				continue;
796 			}
797 		} else {
798 			mp->mp_minorname = NULL;
799 		}
800 
801 		if (t == '\n' || t == '\0') {
802 			devfs_free_minor_perm(mp);
803 			(*errcb)(MP_IGNORING_LINE_ERR, ln);
804 			continue;
805 		}
806 		if (getnexttoken(cp, &cp, &p, &t) == 0) {
807 			goto link;
808 		}
809 		if (getvalue(p, (int *)&mp->mp_mode) == 0) {
810 			goto link;
811 		}
812 		if (t == '\n' || t == '\0') {	/* no owner or group */
813 			goto link;
814 		}
815 		if (getnexttoken(cp, &cp, &p, &t) == 0) {
816 			goto link;
817 		}
818 		mp->mp_owner = strdup(p);
819 		if (mp->mp_owner == NULL) {
820 			(*errcb)(MP_ALLOC_ERR, strlen(p)+1);
821 			devfs_free_minor_perm(mp);
822 			continue;
823 		} else if (t == '\n' || t == '\0') {	/* no group */
824 			goto link;
825 		}
826 		if (getnexttoken(cp, &cp, &p, 0) == 0) {
827 			goto link;
828 		}
829 		mp->mp_group = strdup(p);
830 		if (mp->mp_group == NULL) {
831 			(*errcb)(MP_ALLOC_ERR, strlen(p)+1);
832 			devfs_free_minor_perm(mp);
833 			continue;
834 		}
835 link:
836 		if (drvname != NULL) {
837 			/*
838 			 * We only want the minor perm entry for a
839 			 * the named driver.  The driver name is the
840 			 * minor in the clone case.
841 			 */
842 			if (strcmp(mp->mp_drvname, "clone") == 0) {
843 				if (mp->mp_minorname == NULL ||
844 				    strcmp(drvname, mp->mp_minorname) != 0) {
845 					devfs_free_minor_perm(mp);
846 					continue;
847 				}
848 			} else {
849 				if (strcmp(drvname, mp->mp_drvname) != 0) {
850 					devfs_free_minor_perm(mp);
851 					continue;
852 				}
853 			}
854 		}
855 		if (minor_perms == NULL) {
856 			minor_perms = mp;
857 		} else {
858 			mptail->mp_next = mp;
859 		}
860 		mptail = mp;
861 
862 		/*
863 		 * Compute the uid's and gid's here - there are
864 		 * fewer lines in the /etc/minor_perm file than there
865 		 * are devices to be stat(2)ed.  And almost every
866 		 * device is 'root sys'.  See 1135520.
867 		 */
868 		if (mp->mp_owner == NULL ||
869 		    strcmp(mp->mp_owner, DEFAULT_DEV_USER) == 0 ||
870 		    (pw = getpwnam(mp->mp_owner)) == NULL) {
871 			mp->mp_uid = root_uid;
872 		} else {
873 			mp->mp_uid = pw->pw_uid;
874 		}
875 
876 		if (mp->mp_group == NULL ||
877 		    strcmp(mp->mp_group, DEFAULT_DEV_GROUP) == 0 ||
878 		    (gp = getgrnam(mp->mp_group)) == NULL) {
879 			mp->mp_gid = sys_gid;
880 		} else {
881 			mp->mp_gid = gp->gr_gid;
882 		}
883 	}
884 
885 	if (fclose(pfd) == EOF) {
886 		(*errcb)(MP_FCLOSE_ERR, errno);
887 	}
888 
889 	return (minor_perms);
890 }
891 
892 struct mperm *
893 devfs_read_minor_perm(void (*errcb)(minorperm_err_t, int))
894 {
895 	return (i_devfs_read_minor_perm(NULL, errcb));
896 }
897 
898 static struct mperm *
899 i_devfs_read_minor_perm_by_driver(char *drvname,
900 	void (*errcb)(minorperm_err_t mp_err, int key))
901 {
902 	return (i_devfs_read_minor_perm(drvname, errcb));
903 }
904 
905 /*
906  * Free mperm list of entries
907  */
908 void
909 devfs_free_minor_perm(struct mperm *mplist)
910 {
911 	struct mperm *mp, *next;
912 
913 	for (mp = mplist; mp != NULL; mp = next) {
914 		next = mp->mp_next;
915 
916 		if (mp->mp_drvname)
917 			free(mp->mp_drvname);
918 		if (mp->mp_minorname)
919 			free(mp->mp_minorname);
920 		if (mp->mp_owner)
921 			free(mp->mp_owner);
922 		if (mp->mp_group)
923 			free(mp->mp_group);
924 		free(mp);
925 	}
926 }
927 
928 static int
929 i_devfs_add_perm_entry(nvlist_t *nvl, struct mperm *mp)
930 {
931 	int err;
932 
933 	err = nvlist_add_string(nvl, mp->mp_drvname, mp->mp_minorname);
934 	if (err != 0)
935 		return (err);
936 
937 	err = nvlist_add_int32(nvl, "mode", (int32_t)mp->mp_mode);
938 	if (err != 0)
939 		return (err);
940 
941 	err = nvlist_add_int32(nvl, "uid", (int32_t)mp->mp_uid);
942 	if (err != 0)
943 		return (err);
944 
945 	err = nvlist_add_int32(nvl, "gid", (int32_t)mp->mp_gid);
946 	return (err);
947 }
948 
949 static nvlist_t *
950 i_devfs_minor_perm_nvlist(struct mperm *mplist,
951 	void (*errcb)(minorperm_err_t, int))
952 {
953 	int err;
954 	struct mperm *mp;
955 	nvlist_t *nvl = NULL;
956 
957 	if ((err = nvlist_alloc(&nvl, 0, 0)) != 0) {
958 		(*errcb)(MP_NVLIST_ERR, err);
959 		return (NULL);
960 	}
961 
962 	for (mp = mplist; mp != NULL; mp = mp->mp_next) {
963 		if ((err = i_devfs_add_perm_entry(nvl, mp)) != 0) {
964 			(*errcb)(MP_NVLIST_ERR, err);
965 			nvlist_free(nvl);
966 			return (NULL);
967 		}
968 	}
969 
970 	return (nvl);
971 }
972 
973 /*
974  * Load all minor perm entries into the kernel
975  * Done at boot time via devfsadm
976  */
977 int
978 devfs_load_minor_perm(struct mperm *mplist,
979 	void (*errcb)(minorperm_err_t, int))
980 {
981 	int err;
982 	char *buf = NULL;
983 	size_t buflen;
984 	nvlist_t *nvl;
985 
986 	nvl = i_devfs_minor_perm_nvlist(mplist, errcb);
987 	if (nvl == NULL)
988 		return (-1);
989 
990 	if (nvlist_pack(nvl, &buf, &buflen, NV_ENCODE_NATIVE, 0) != 0) {
991 		nvlist_free(nvl);
992 		return (-1);
993 	}
994 
995 	err = modctl(MODLOADMINORPERM, buf, buflen);
996 	nvlist_free(nvl);
997 	free(buf);
998 
999 	return (err);
1000 }
1001 
1002 /*
1003  * Add/remove minor perm entry for a driver
1004  */
1005 static int
1006 i_devfs_update_minor_perm(char *drv, int ctl,
1007 	void (*errcb)(minorperm_err_t, int))
1008 {
1009 	int err;
1010 	char *buf;
1011 	size_t buflen;
1012 	nvlist_t *nvl;
1013 	struct mperm *mplist;
1014 
1015 	mplist = i_devfs_read_minor_perm_by_driver(drv, errcb);
1016 
1017 	nvl = i_devfs_minor_perm_nvlist(mplist, errcb);
1018 	if (nvl == NULL)
1019 		return (-1);
1020 
1021 	buf = NULL;
1022 	if (nvlist_pack(nvl, &buf, &buflen, NV_ENCODE_NATIVE, 0) != 0) {
1023 		nvlist_free(nvl);
1024 		return (-1);
1025 	}
1026 
1027 	err = modctl(ctl, buf, buflen);
1028 	nvlist_free(nvl);
1029 	devfs_free_minor_perm(mplist);
1030 	free(buf);
1031 
1032 	return (err);
1033 }
1034 
1035 int
1036 devfs_add_minor_perm(char *drv,
1037 	void (*errcb)(minorperm_err_t, int))
1038 {
1039 	return (i_devfs_update_minor_perm(drv, MODADDMINORPERM, errcb));
1040 }
1041 
1042 int
1043 devfs_rm_minor_perm(char *drv,
1044 	void (*errcb)(minorperm_err_t, int))
1045 {
1046 	return (i_devfs_update_minor_perm(drv, MODREMMINORPERM, errcb));
1047 }
1048 
1049 /*
1050  * is_blank() returns 1 (true) if a line specified is composed of
1051  * whitespace characters only. otherwise, it returns 0 (false).
1052  *
1053  * Note. the argument (line) must be null-terminated.
1054  */
1055 static int
1056 is_blank(char *line)
1057 {
1058 	for (/* nothing */; *line != '\0'; line++)
1059 		if (!isspace(*line))
1060 			return (0);
1061 	return (1);
1062 }
1063