1/*-
2 * Copyright (c) 2002 Dima Dorfman.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24 * SUCH DAMAGE.
25 */
26
27/*
28 * Rule subsystem manipulation.
29 */
30
31#include <sys/cdefs.h>
32__FBSDID("$FreeBSD$");
33
34#include <sys/param.h>
35#include <sys/conf.h>
36#include <sys/ioctl.h>
37
38#include <assert.h>
39#include <err.h>
40#include <errno.h>
41#include <grp.h>
42#include <pwd.h>
43#include <stdio.h>
44#include <stdlib.h>
45#include <string.h>
46#include <unistd.h>
47
48#include "extern.h"
49
50static void rulespec_infp(FILE *fp, unsigned long request, devfs_rsnum rsnum);
51static void rulespec_instr(struct devfs_rule *dr, const char *str,
52    devfs_rsnum rsnum);
53static void rulespec_intok(struct devfs_rule *dr, int ac, char **av,
54    devfs_rsnum rsnum);
55static void rulespec_outfp(FILE *fp, struct devfs_rule *dr);
56
57static command_t rule_add, rule_apply, rule_applyset;
58static command_t rule_del, rule_delset, rule_show, rule_showsets;
59
60static ctbl_t ctbl_rule = {
61	{ "add",		rule_add },
62	{ "apply",		rule_apply },
63	{ "applyset",		rule_applyset },
64	{ "del",		rule_del },
65	{ "delset",		rule_delset },
66	{ "show",		rule_show },
67	{ "showsets",		rule_showsets },
68	{ NULL,			NULL }
69};
70
71static struct intstr ist_type[] = {
72	{ "disk",		D_DISK },
73	{ "mem",		D_MEM },
74	{ "tape",		D_TAPE },
75	{ "tty",		D_TTY },
76	{ NULL,			-1 }
77};
78
79static devfs_rsnum in_rsnum;
80
81int
82rule_main(int ac, char **av)
83{
84	struct cmd *c;
85	int ch;
86
87	setprogname("devfs rule");
88	optreset = optind = 1;
89	while ((ch = getopt(ac, av, "s:")) != -1)
90		switch (ch) {
91		case 's':
92			in_rsnum = eatonum(optarg);
93			break;
94		default:
95			usage();
96		}
97	ac -= optind;
98	av += optind;
99	if (ac < 1)
100		usage();
101
102	for (c = ctbl_rule; c->name != NULL; ++c)
103		if (strcmp(c->name, av[0]) == 0)
104			exit((*c->handler)(ac, av));
105	errx(1, "unknown command: %s", av[0]);
106}
107
108static int
109rule_add(int ac, char **av)
110{
111	struct devfs_rule dr;
112	int rv;
113
114	if (ac < 2)
115		usage();
116	if (strcmp(av[1], "-") == 0)
117		rulespec_infp(stdin, DEVFSIO_RADD, in_rsnum);
118	else {
119		rulespec_intok(&dr, ac - 1, av + 1, in_rsnum);
120		rv = ioctl(mpfd, DEVFSIO_RADD, &dr);
121		if (rv == -1)
122			err(1, "ioctl DEVFSIO_RADD");
123	}
124	return (0);
125}
126
127static int
128rule_apply(int ac __unused, char **av __unused)
129{
130	struct devfs_rule dr;
131	devfs_rnum rnum;
132	devfs_rid rid;
133	int rv;
134
135	if (ac < 2)
136		usage();
137	if (!atonum(av[1], &rnum)) {
138		if (strcmp(av[1], "-") == 0)
139			rulespec_infp(stdin, DEVFSIO_RAPPLY, in_rsnum);
140		else {
141			rulespec_intok(&dr, ac - 1, av + 1, in_rsnum);
142			rv = ioctl(mpfd, DEVFSIO_RAPPLY, &dr);
143			if (rv == -1)
144				err(1, "ioctl DEVFSIO_RAPPLY");
145		}
146	} else {
147		rid = mkrid(in_rsnum, rnum);
148		rv = ioctl(mpfd, DEVFSIO_RAPPLYID, &rid);
149		if (rv == -1)
150			err(1, "ioctl DEVFSIO_RAPPLYID");
151	}
152	return (0);
153}
154
155static int
156rule_applyset(int ac, char **av __unused)
157{
158	int rv;
159
160	if (ac != 1)
161		usage();
162	rv = ioctl(mpfd, DEVFSIO_SAPPLY, &in_rsnum);
163	if (rv == -1)
164		err(1, "ioctl DEVFSIO_SAPPLY");
165	return (0);
166}
167
168static int
169rule_del(int ac __unused, char **av)
170{
171	devfs_rid rid;
172	int rv;
173
174	if (av[1] == NULL)
175		usage();
176	rid = mkrid(in_rsnum, eatoi(av[1]));
177	rv = ioctl(mpfd, DEVFSIO_RDEL, &rid);
178	if (rv == -1)
179		err(1, "ioctl DEVFSIO_RDEL");
180	return (0);
181}
182
183static int
184rule_delset(int ac, char **av __unused)
185{
186	struct devfs_rule dr;
187	int rv;
188
189	if (ac != 1)
190		usage();
191	memset(&dr, '\0', sizeof(dr));
192	dr.dr_magic = DEVFS_MAGIC;
193	dr.dr_id = mkrid(in_rsnum, 0);
194	while (ioctl(mpfd, DEVFSIO_RGETNEXT, &dr) != -1) {
195		rv = ioctl(mpfd, DEVFSIO_RDEL, &dr.dr_id);
196		if (rv == -1)
197			err(1, "ioctl DEVFSIO_RDEL");
198	}
199	if (errno != ENOENT)
200		err(1, "ioctl DEVFSIO_RGETNEXT");
201	return (0);
202}
203
204static int
205rule_show(int ac __unused, char **av)
206{
207	struct devfs_rule dr;
208	devfs_rnum rnum;
209	int rv;
210
211	memset(&dr, '\0', sizeof(dr));
212	dr.dr_magic = DEVFS_MAGIC;
213	if (av[1] != NULL) {
214		rnum = eatoi(av[1]);
215		dr.dr_id = mkrid(in_rsnum, rnum - 1);
216		rv = ioctl(mpfd, DEVFSIO_RGETNEXT, &dr);
217		if (rv == -1)
218			err(1, "ioctl DEVFSIO_RGETNEXT");
219		if (rid2rn(dr.dr_id) == rnum)
220			rulespec_outfp(stdout, &dr);
221	} else {
222		dr.dr_id = mkrid(in_rsnum, 0);
223		while (ioctl(mpfd, DEVFSIO_RGETNEXT, &dr) != -1)
224			rulespec_outfp(stdout, &dr);
225		if (errno != ENOENT)
226			err(1, "ioctl DEVFSIO_RGETNEXT");
227	}
228	return (0);
229}
230
231static int
232rule_showsets(int ac, char **av __unused)
233{
234	devfs_rsnum rsnum;
235
236	if (ac != 1)
237		usage();
238	rsnum = 0;
239	while (ioctl(mpfd, DEVFSIO_SGETNEXT, &rsnum) != -1)
240		printf("%d\n", rsnum);
241	if (errno != ENOENT)
242		err(1, "ioctl DEVFSIO_SGETNEXT");
243	return (0);
244}
245
246int
247ruleset_main(int ac, char **av)
248{
249	devfs_rsnum rsnum;
250	int rv;
251
252	setprogname("devfs ruleset");
253	if (ac < 2)
254		usage();
255	rsnum = eatonum(av[1]);
256	rv = ioctl(mpfd, DEVFSIO_SUSE, &rsnum);
257	if (rv == -1)
258		err(1, "ioctl DEVFSIO_SUSE");
259	return (0);
260}
261
262
263/*
264 * Input rules from a file (probably the standard input).  This
265 * differs from the other rulespec_in*() routines in that it also
266 * calls ioctl() for the rules, since it is impractical (and not very
267 * useful) to return a list (or array) of rules, just so the caller
268 * can call call ioctl() for each of them.
269 */
270static void
271rulespec_infp(FILE *fp, unsigned long request, devfs_rsnum rsnum)
272{
273	struct devfs_rule dr;
274	char *line;
275	int rv;
276
277	assert(fp == stdin);	/* XXX: De-hardcode "stdin" from error msg. */
278	while (efgetln(fp, &line)) {
279		rulespec_instr(&dr, line, rsnum);
280		rv = ioctl(mpfd, request, &dr);
281		if (rv == -1)
282			err(1, "ioctl");
283		free(line);	/* efgetln() always malloc()s. */
284	}
285	if (ferror(stdin))
286		err(1, "stdin");
287}
288
289/*
290 * Construct a /struct devfs_rule/ from a string.
291 */
292static void
293rulespec_instr(struct devfs_rule *dr, const char *str, devfs_rsnum rsnum)
294{
295	char **av;
296	int ac;
297
298	tokenize(str, &ac, &av);
299	if (ac == 0)
300		errx(1, "unexpected end of rulespec");
301	rulespec_intok(dr, ac, av, rsnum);
302	free(av[0]);
303	free(av);
304}
305
306/*
307 * Construct a /struct devfs_rule/ from ac and av.
308 */
309static void
310rulespec_intok(struct devfs_rule *dr, int ac __unused, char **av,
311    devfs_rsnum rsnum)
312{
313	struct intstr *is;
314	struct passwd *pw;
315	struct group *gr;
316	devfs_rnum rnum;
317	void *set;
318
319	memset(dr, '\0', sizeof(*dr));
320
321	/*
322	 * We don't maintain ac hereinafter.
323	 */
324	if (av[0] == NULL)
325		errx(1, "unexpected end of rulespec");
326
327	/* If the first argument is an integer, treat it as a rule number. */
328	if (!atonum(av[0], &rnum))
329		rnum = 0;		/* auto-number */
330	else
331		++av;
332
333	/*
334	 * These aren't table-driven since that would result in more
335	 * tiny functions than I care to deal with.
336	 */
337	for (;;) {
338		if (av[0] == NULL)
339			break;
340		else if (strcmp(av[0], "type") == 0) {
341			if (av[1] == NULL)
342				errx(1, "expecting argument for type");
343			for (is = ist_type; is->s != NULL; ++is)
344				if (strcmp(av[1], is->s) == 0) {
345					dr->dr_dswflags |= is->i;
346					break;
347				}
348			if (is->s == NULL)
349				errx(1, "unknown type: %s", av[1]);
350			dr->dr_icond |= DRC_DSWFLAGS;
351			av += 2;
352		} else if (strcmp(av[0], "path") == 0) {
353			if (av[1] == NULL)
354				errx(1, "expecting argument for path");
355			if (strlcpy(dr->dr_pathptrn, av[1], DEVFS_MAXPTRNLEN)
356			    >= DEVFS_MAXPTRNLEN)
357				warnx("pattern specified too long; truncated");
358			dr->dr_icond |= DRC_PATHPTRN;
359			av += 2;
360		} else
361			break;
362	}
363	while (av[0] != NULL) {
364		if (strcmp(av[0], "hide") == 0) {
365			dr->dr_iacts |= DRA_BACTS;
366			dr->dr_bacts |= DRB_HIDE;
367			++av;
368		} else if (strcmp(av[0], "unhide") == 0) {
369			dr->dr_iacts |= DRA_BACTS;
370			dr->dr_bacts |= DRB_UNHIDE;
371			++av;
372		} else if (strcmp(av[0], "user") == 0) {
373			if (av[1] == NULL)
374				errx(1, "expecting argument for user");
375			dr->dr_iacts |= DRA_UID;
376			pw = getpwnam(av[1]);
377			if (pw != NULL)
378				dr->dr_uid = pw->pw_uid;
379			else
380				dr->dr_uid = eatoi(av[1]); /* XXX overflow */
381			av += 2;
382		} else if (strcmp(av[0], "group") == 0) {
383			if (av[1] == NULL)
384				errx(1, "expecting argument for group");
385			dr->dr_iacts |= DRA_GID;
386			gr = getgrnam(av[1]);
387			if (gr != NULL)
388				dr->dr_gid = gr->gr_gid;
389			else
390				dr->dr_gid = eatoi(av[1]); /* XXX overflow */
391			av += 2;
392		} else if (strcmp(av[0], "mode") == 0) {
393			if (av[1] == NULL)
394				errx(1, "expecting argument for mode");
395			dr->dr_iacts |= DRA_MODE;
396			set = setmode(av[1]);
397			if (set == NULL)
398				errx(1, "invalid mode: %s", av[1]);
399			dr->dr_mode = getmode(set, 0);
400			av += 2;
401		} else if (strcmp(av[0], "include") == 0) {
402			if (av[1] == NULL)
403				errx(1, "expecting argument for include");
404			dr->dr_iacts |= DRA_INCSET;
405			dr->dr_incset = eatonum(av[1]);
406			av += 2;
407		} else
408			errx(1, "unknown argument: %s", av[0]);
409	}
410
411	dr->dr_id = mkrid(rsnum, rnum);
412	dr->dr_magic = DEVFS_MAGIC;
413}
414
415/*
416 * Write a human-readable (and machine-parsable, by rulespec_in*())
417 * representation of dr to bufp.  *bufp should be free(3)'d when the
418 * caller is finished with it.
419 */
420static void
421rulespec_outfp(FILE *fp, struct devfs_rule *dr)
422{
423	struct intstr *is;
424	struct passwd *pw;
425	struct group *gr;
426
427	fprintf(fp, "%d", rid2rn(dr->dr_id));
428
429	if (dr->dr_icond & DRC_DSWFLAGS)
430		for (is = ist_type; is->s != NULL; ++is)
431			if (dr->dr_dswflags & is->i)
432				fprintf(fp, " type %s", is->s);
433	if (dr->dr_icond & DRC_PATHPTRN)
434		fprintf(fp, " path %s", dr->dr_pathptrn);
435
436	if (dr->dr_iacts & DRA_BACTS) {
437		if (dr->dr_bacts & DRB_HIDE)
438			fprintf(fp, " hide");
439		if (dr->dr_bacts & DRB_UNHIDE)
440			fprintf(fp, " unhide");
441	}
442	if (dr->dr_iacts & DRA_UID) {
443		pw = getpwuid(dr->dr_uid);
444		if (pw == NULL)
445			fprintf(fp, " user %d", dr->dr_uid);
446		else
447			fprintf(fp, " user %s", pw->pw_name);
448	}
449	if (dr->dr_iacts & DRA_GID) {
450		gr = getgrgid(dr->dr_gid);
451		if (gr == NULL)
452			fprintf(fp, " group %d", dr->dr_gid);
453		else
454			fprintf(fp, " group %s", gr->gr_name);
455	}
456	if (dr->dr_iacts & DRA_MODE)
457		fprintf(fp, " mode %o", dr->dr_mode);
458	if (dr->dr_iacts & DRA_INCSET)
459		fprintf(fp, " include %d", dr->dr_incset);
460
461	fprintf(fp, "\n");
462}
463