2001-03-17 04:17:14 +05:30
|
|
|
/* vi: set sw=4 ts=4: */
|
|
|
|
/*
|
|
|
|
* Utility routines.
|
|
|
|
*
|
|
|
|
* Copyright (C) tons of folks. Tracking down who wrote what
|
|
|
|
* isn't something I'm going to worry about... If you wrote something
|
|
|
|
* here, please feel free to acknowledge your work.
|
|
|
|
*
|
2003-05-26 19:39:12 +05:30
|
|
|
* Based in part on code from sash, Copyright (c) 1999 by David I. Bell
|
2001-03-17 04:17:14 +05:30
|
|
|
* Permission has been granted to redistribute this code under the GPL.
|
|
|
|
*
|
2006-05-01 06:23:40 +05:30
|
|
|
* Licensed under GPLv2 or later, see file License in this tarball for details.
|
2001-03-17 04:17:14 +05:30
|
|
|
*/
|
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
#include <assert.h>
|
2007-02-03 22:57:14 +05:30
|
|
|
#include "busybox.h"
|
|
|
|
|
|
|
|
#define PROTOTYPES
|
|
|
|
#include "applets.h"
|
|
|
|
#undef PROTOTYPES
|
|
|
|
|
2001-03-17 04:17:14 +05:30
|
|
|
|
2006-11-09 05:30:12 +05:30
|
|
|
/* Apparently uclibc defines __GLIBC__ (compat trick?). Oh well. */
|
|
|
|
#if ENABLE_STATIC && defined(__GLIBC__) && !defined(__UCLIBC__)
|
2006-10-20 19:12:57 +05:30
|
|
|
#warning Static linking against glibc produces buggy executables
|
2006-11-11 04:55:53 +05:30
|
|
|
#warning (glibc does not cope well with ld --gc-sections).
|
2006-10-30 01:07:13 +05:30
|
|
|
#warning See sources.redhat.com/bugzilla/show_bug.cgi?id=3400
|
2006-12-19 03:19:06 +05:30
|
|
|
#warning Note that glibc is unsuitable for static linking anyway.
|
|
|
|
#warning If you still want to do it, remove -Wl,--gc-sections
|
|
|
|
#warning from top-level Makefile and remove this warning.
|
2006-10-20 19:12:57 +05:30
|
|
|
#endif
|
|
|
|
|
2006-04-28 05:04:46 +05:30
|
|
|
#if ENABLE_SHOW_USAGE && !ENABLE_FEATURE_COMPRESS_USAGE
|
|
|
|
static const char usage_messages[] =
|
2004-04-06 19:58:35 +05:30
|
|
|
#define MAKE_USAGE
|
|
|
|
#include "usage.h"
|
|
|
|
#include "applets.h"
|
|
|
|
;
|
|
|
|
#undef MAKE_USAGE
|
2006-05-01 06:23:40 +05:30
|
|
|
#else
|
|
|
|
#define usage_messages 0
|
2006-04-01 00:13:55 +05:30
|
|
|
#endif /* ENABLE_SHOW_USAGE */
|
2006-04-28 05:04:46 +05:30
|
|
|
|
2001-03-20 01:00:24 +05:30
|
|
|
#undef APPLET
|
|
|
|
#undef APPLET_NOUSAGE
|
|
|
|
#undef PROTOTYPES
|
|
|
|
#include "applets.h"
|
|
|
|
|
2004-02-22 16:43:28 +05:30
|
|
|
static struct BB_applet *applet_using;
|
2001-03-17 04:17:14 +05:30
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
/* The -1 arises because of the {0,NULL,0,-1} entry. */
|
|
|
|
const unsigned short NUM_APPLETS = (sizeof(applets) / sizeof(struct BB_applet) - 1);
|
2001-03-20 01:00:24 +05:30
|
|
|
|
2002-06-05 01:36:25 +05:30
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
#if ENABLE_FEATURE_SUID_CONFIG
|
2002-06-05 01:36:25 +05:30
|
|
|
|
|
|
|
#include <ctype.h>
|
|
|
|
|
2002-08-22 18:42:40 +05:30
|
|
|
/* applets [] is const, so we have to define this "override" structure */
|
2005-10-28 15:15:07 +05:30
|
|
|
static struct BB_suid_config
|
2003-05-26 19:39:12 +05:30
|
|
|
{
|
2006-09-23 22:04:39 +05:30
|
|
|
struct BB_applet *m_applet;
|
2002-06-05 01:36:25 +05:30
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
uid_t m_uid;
|
|
|
|
gid_t m_gid;
|
|
|
|
mode_t m_mode;
|
2002-08-22 18:42:40 +05:30
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
struct BB_suid_config *m_next;
|
2005-10-28 15:15:07 +05:30
|
|
|
} *suid_config;
|
2002-06-05 01:36:25 +05:30
|
|
|
|
2004-02-17 15:46:21 +05:30
|
|
|
static int suid_cfg_readable;
|
2002-06-05 01:36:25 +05:30
|
|
|
|
2002-08-22 18:42:40 +05:30
|
|
|
/* check if u is member of group g */
|
2006-09-23 22:04:39 +05:30
|
|
|
static int ingroup(uid_t u, gid_t g)
|
2002-06-05 01:36:25 +05:30
|
|
|
{
|
2006-09-23 22:04:39 +05:30
|
|
|
struct group *grp = getgrgid(g);
|
2002-08-22 18:42:40 +05:30
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
if (grp) {
|
|
|
|
char **mem;
|
2002-08-22 18:42:40 +05:30
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
for (mem = grp->gr_mem; *mem; mem++) {
|
|
|
|
struct passwd *pwd = getpwnam(*mem);
|
2002-08-22 18:42:40 +05:30
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
if (pwd && (pwd->pw_uid == u))
|
|
|
|
return 1;
|
|
|
|
}
|
2002-06-05 01:36:25 +05:30
|
|
|
}
|
2006-09-23 22:04:39 +05:30
|
|
|
return 0;
|
2002-06-05 01:36:25 +05:30
|
|
|
}
|
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* This should probably be a libbb routine. In that case,
|
|
|
|
* I'd probably rename it to something like bb_trimmed_slice.
|
|
|
|
*/
|
|
|
|
static char *get_trimmed_slice(char *s, char *e)
|
|
|
|
{
|
|
|
|
/* First, consider the value at e to be nul and back up until we
|
|
|
|
* reach a non-space char. Set the char after that (possibly at
|
|
|
|
* the original e) to nul. */
|
|
|
|
while (e-- > s) {
|
|
|
|
if (!isspace(*e)) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
e[1] = 0;
|
|
|
|
|
|
|
|
/* Next, advance past all leading space and return a ptr to the
|
|
|
|
* first non-space char; possibly the terminating nul. */
|
2006-06-19 01:50:07 +05:30
|
|
|
return skip_whitespace(s);
|
2004-02-01 15:33:05 +05:30
|
|
|
}
|
|
|
|
|
2002-06-05 01:36:25 +05:30
|
|
|
|
2007-01-30 04:21:00 +05:30
|
|
|
#define parse_error(x) do { errmsg = x; goto pe_label; } while(0)
|
2002-06-05 01:36:25 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Don't depend on the tools to combine strings. */
|
2007-03-24 17:38:36 +05:30
|
|
|
static const char config_file[] = "/etc/busybox.conf";
|
2004-02-01 15:33:05 +05:30
|
|
|
|
|
|
|
/* There are 4 chars + 1 nul for each of user/group/other. */
|
|
|
|
static const char mode_chars[] = "Ssx-\0Ssx-\0Ttx-";
|
|
|
|
|
|
|
|
/* We don't supply a value for the nul, so an index adjustment is
|
|
|
|
* necessary below. Also, we use unsigned short here to save some
|
|
|
|
* space even though these are really mode_t values. */
|
|
|
|
static const unsigned short mode_mask[] = {
|
|
|
|
/* SST sst xxx --- */
|
|
|
|
S_ISUID, S_ISUID|S_IXUSR, S_IXUSR, 0, /* user */
|
|
|
|
S_ISGID, S_ISGID|S_IXGRP, S_IXGRP, 0, /* group */
|
|
|
|
0, S_IXOTH, S_IXOTH, 0 /* other */
|
|
|
|
};
|
2002-06-05 01:36:25 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
static void parse_config_file(void)
|
2002-06-05 01:36:25 +05:30
|
|
|
{
|
2004-02-01 15:33:05 +05:30
|
|
|
struct BB_suid_config *sct_head;
|
|
|
|
struct BB_suid_config *sct;
|
|
|
|
struct BB_applet *applet;
|
|
|
|
FILE *f;
|
2007-01-30 04:21:00 +05:30
|
|
|
const char *errmsg;
|
2004-02-01 15:33:05 +05:30
|
|
|
char *s;
|
|
|
|
char *e;
|
|
|
|
int i, lc, section;
|
|
|
|
char buffer[256];
|
|
|
|
struct stat st;
|
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
assert(!suid_config); /* Should be set to NULL by bss init. */
|
2004-02-01 15:33:05 +05:30
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
if ((stat(config_file, &st) != 0) /* No config file? */
|
|
|
|
|| !S_ISREG(st.st_mode) /* Not a regular file? */
|
|
|
|
|| (st.st_uid != 0) /* Not owned by root? */
|
|
|
|
|| (st.st_mode & (S_IWGRP | S_IWOTH)) /* Writable by non-root? */
|
|
|
|
|| !(f = fopen(config_file, "r")) /* Cannot open? */
|
|
|
|
) {
|
2004-02-01 15:33:05 +05:30
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-02-17 15:46:21 +05:30
|
|
|
suid_cfg_readable = 1;
|
2004-02-01 15:33:05 +05:30
|
|
|
sct_head = NULL;
|
|
|
|
section = lc = 0;
|
|
|
|
|
|
|
|
do {
|
|
|
|
s = buffer;
|
2003-05-26 19:39:12 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
if (!fgets(s, sizeof(buffer), f)) { /* Are we done? */
|
|
|
|
if (ferror(f)) { /* Make sure it wasn't a read error. */
|
|
|
|
parse_error("reading");
|
|
|
|
}
|
|
|
|
fclose(f);
|
|
|
|
suid_config = sct_head; /* Success, so set the pointer. */
|
|
|
|
return;
|
|
|
|
}
|
2003-05-26 19:39:12 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
lc++; /* Got a (partial) line. */
|
|
|
|
|
|
|
|
/* If a line is too long for our buffer, we consider it an error.
|
|
|
|
* The following test does mistreat one corner case though.
|
|
|
|
* If the final line of the file does not end with a newline and
|
|
|
|
* yet exactly fills the buffer, it will be treated as too long
|
|
|
|
* even though there isn't really a problem. But it isn't really
|
|
|
|
* worth adding code to deal with such an unlikely situation, and
|
|
|
|
* we do err on the side of caution. Besides, the line would be
|
|
|
|
* too long if it did end with a newline. */
|
|
|
|
if (!strchr(s, '\n') && !feof(f)) {
|
|
|
|
parse_error("line too long");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Trim leading and trailing whitespace, ignoring comments, and
|
|
|
|
* check if the resulting string is empty. */
|
2007-03-24 17:38:36 +05:30
|
|
|
s = get_trimmed_slice(s, strchrnul(s, '#'));
|
|
|
|
if (!*s) {
|
2004-02-01 15:33:05 +05:30
|
|
|
continue;
|
|
|
|
}
|
2003-05-26 19:39:12 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Check for a section header. */
|
|
|
|
|
|
|
|
if (*s == '[') {
|
|
|
|
/* Unlike the old code, we ignore leading and trailing
|
|
|
|
* whitespace for the section name. We also require that
|
|
|
|
* there are no stray characters after the closing bracket. */
|
2007-03-24 17:38:36 +05:30
|
|
|
e = strchr(s, ']');
|
|
|
|
if (!e /* Missing right bracket? */
|
|
|
|
|| e[1] /* Trailing characters? */
|
|
|
|
|| !*(s = get_trimmed_slice(s+1, e)) /* Missing name? */
|
|
|
|
) {
|
2004-02-01 15:33:05 +05:30
|
|
|
parse_error("section header");
|
|
|
|
}
|
|
|
|
/* Right now we only have one section so just check it.
|
|
|
|
* If more sections are added in the future, please don't
|
|
|
|
* resort to cascading ifs with multiple strcasecmp calls.
|
|
|
|
* That kind of bloated code is all too common. A loop
|
|
|
|
* and a string table would be a better choice unless the
|
|
|
|
* number of sections is very small. */
|
|
|
|
if (strcasecmp(s, "SUID") == 0) {
|
|
|
|
section = 1;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
section = -1; /* Unknown section so set to skip. */
|
|
|
|
continue;
|
|
|
|
}
|
2003-05-26 19:39:12 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Process sections. */
|
2003-05-26 19:39:12 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
if (section == 1) { /* SUID */
|
|
|
|
/* Since we trimmed leading and trailing space above, we're
|
|
|
|
* now looking for strings of the form
|
|
|
|
* <key>[::space::]*=[::space::]*<value>
|
|
|
|
* where both key and value could contain inner whitespace. */
|
2003-05-26 19:39:12 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* First get the key (an applet name in our case). */
|
2007-03-24 17:38:36 +05:30
|
|
|
e = strchr(s, '=');
|
|
|
|
if (e) {
|
2004-02-01 15:33:05 +05:30
|
|
|
s = get_trimmed_slice(s, e);
|
|
|
|
}
|
|
|
|
if (!e || !*s) { /* Missing '=' or empty key. */
|
|
|
|
parse_error("keyword");
|
|
|
|
}
|
2003-05-26 19:39:12 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Ok, we have an applet name. Process the rhs if this
|
|
|
|
* applet is currently built in and ignore it otherwise.
|
|
|
|
* Note: This can hide config file bugs which only pop
|
|
|
|
* up when the busybox configuration is changed. */
|
2007-03-24 17:38:36 +05:30
|
|
|
applet = find_applet_by_name(s);
|
|
|
|
if (applet) {
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Note: We currently don't check for duplicates!
|
|
|
|
* The last config line for each applet will be the
|
|
|
|
* one used since we insert at the head of the list.
|
|
|
|
* I suppose this could be considered a feature. */
|
|
|
|
sct = xmalloc(sizeof(struct BB_suid_config));
|
|
|
|
sct->m_applet = applet;
|
|
|
|
sct->m_mode = 0;
|
|
|
|
sct->m_next = sct_head;
|
|
|
|
sct_head = sct;
|
|
|
|
|
|
|
|
/* Get the specified mode. */
|
|
|
|
|
2006-06-19 01:50:07 +05:30
|
|
|
e = skip_whitespace(e+1);
|
2004-02-01 15:33:05 +05:30
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
for (i = 0; i < 3; i++) {
|
2004-02-01 15:33:05 +05:30
|
|
|
const char *q;
|
2007-03-24 17:38:36 +05:30
|
|
|
q = strchrnul(mode_chars + 5*i, *e++);
|
|
|
|
if (!*q) {
|
2004-02-01 15:33:05 +05:30
|
|
|
parse_error("mode");
|
|
|
|
}
|
|
|
|
/* Adjust by -i to account for nul. */
|
|
|
|
sct->m_mode |= mode_mask[(q - mode_chars) - i];
|
2003-05-26 19:39:12 +05:30
|
|
|
}
|
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Now get the the user/group info. */
|
2006-01-15 19:34:57 +05:30
|
|
|
|
2006-06-19 01:50:07 +05:30
|
|
|
s = skip_whitespace(e);
|
2004-02-01 15:33:05 +05:30
|
|
|
|
|
|
|
/* Note: We require whitespace between the mode and the
|
|
|
|
* user/group info. */
|
|
|
|
if ((s == e) || !(e = strchr(s, '.'))) {
|
|
|
|
parse_error("<uid>.<gid>");
|
|
|
|
}
|
2007-03-24 17:38:36 +05:30
|
|
|
*e++ = '\0';
|
2004-02-01 15:33:05 +05:30
|
|
|
|
|
|
|
/* We can't use get_ug_id here since it would exit()
|
|
|
|
* if a uid or gid was not found. Oh well... */
|
2007-03-24 17:38:36 +05:30
|
|
|
sct->m_uid = bb_strtoul(s, NULL, 10);
|
|
|
|
if (errno) {
|
|
|
|
struct passwd *pwd = getpwnam(s);
|
|
|
|
if (!pwd) {
|
|
|
|
parse_error("user");
|
2004-02-01 15:33:05 +05:30
|
|
|
}
|
2007-03-24 17:38:36 +05:30
|
|
|
sct->m_uid = pwd->pw_uid;
|
|
|
|
}
|
2004-02-01 15:33:05 +05:30
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
sct->m_gid = bb_strtoul(e, NULL, 10);
|
|
|
|
if (errno) {
|
|
|
|
struct group *grp;
|
|
|
|
grp = getgrnam(e);
|
|
|
|
if (!grp) {
|
|
|
|
parse_error("group");
|
2004-02-01 15:33:05 +05:30
|
|
|
}
|
2007-03-24 17:38:36 +05:30
|
|
|
sct->m_gid = grp->gr_gid;
|
2003-05-26 19:39:12 +05:30
|
|
|
}
|
2002-06-05 01:36:25 +05:30
|
|
|
}
|
2004-02-01 15:33:05 +05:30
|
|
|
continue;
|
2002-06-05 01:36:25 +05:30
|
|
|
}
|
2002-08-22 18:42:40 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Unknown sections are ignored. */
|
2002-06-06 23:00:16 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Encountering configuration lines prior to seeing a
|
|
|
|
* section header is treated as an error. This is how
|
2004-04-14 23:21:38 +05:30
|
|
|
* the old code worked, but it may not be desirable.
|
2004-02-01 15:33:05 +05:30
|
|
|
* We may want to simply ignore such lines in case they
|
|
|
|
* are used in some future version of busybox. */
|
|
|
|
if (!section) {
|
|
|
|
parse_error("keyword outside section");
|
|
|
|
}
|
|
|
|
|
|
|
|
} while (1);
|
|
|
|
|
|
|
|
pe_label:
|
|
|
|
fprintf(stderr, "Parse error in %s, line %d: %s\n",
|
2007-01-30 04:21:00 +05:30
|
|
|
config_file, lc, errmsg);
|
2004-02-01 15:33:05 +05:30
|
|
|
|
|
|
|
fclose(f);
|
|
|
|
/* Release any allocated memory before returning. */
|
|
|
|
while (sct_head) {
|
|
|
|
sct = sct_head->m_next;
|
|
|
|
free(sct_head);
|
|
|
|
sct_head = sct;
|
|
|
|
}
|
2002-06-05 01:36:25 +05:30
|
|
|
}
|
|
|
|
|
2005-09-05 09:43:33 +05:30
|
|
|
#else
|
2007-01-25 03:32:01 +05:30
|
|
|
#define parse_config_file() ((void)0)
|
2005-09-05 09:43:33 +05:30
|
|
|
#endif /* CONFIG_FEATURE_SUID_CONFIG */
|
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
#if ENABLE_FEATURE_SUID
|
2006-10-17 04:09:51 +05:30
|
|
|
static void check_suid(struct BB_applet *applet)
|
2005-09-05 09:43:33 +05:30
|
|
|
{
|
2006-10-17 04:09:51 +05:30
|
|
|
uid_t ruid = getuid(); /* real [ug]id */
|
|
|
|
uid_t rgid = getgid();
|
2005-09-05 09:43:33 +05:30
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
#if ENABLE_FEATURE_SUID_CONFIG
|
2006-09-23 22:04:39 +05:30
|
|
|
if (suid_cfg_readable) {
|
|
|
|
struct BB_suid_config *sct;
|
2007-03-24 17:38:36 +05:30
|
|
|
mode_t m;
|
2005-09-05 09:43:33 +05:30
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
for (sct = suid_config; sct; sct = sct->m_next) {
|
|
|
|
if (sct->m_applet == applet)
|
2007-03-24 17:38:36 +05:30
|
|
|
goto found;
|
2006-09-23 22:04:39 +05:30
|
|
|
}
|
2007-03-24 17:38:36 +05:30
|
|
|
/* default: drop all privileges */
|
|
|
|
xsetgid(rgid);
|
|
|
|
xsetuid(ruid);
|
|
|
|
return;
|
|
|
|
found:
|
|
|
|
m = sct->m_mode;
|
|
|
|
if (sct->m_uid == ruid)
|
|
|
|
/* same uid */
|
|
|
|
m >>= 6;
|
|
|
|
else if ((sct->m_gid == rgid) || ingroup(ruid, sct->m_gid))
|
|
|
|
/* same group / in group */
|
|
|
|
m >>= 3;
|
|
|
|
|
|
|
|
if (!(m & S_IXOTH)) /* is x bit not set ? */
|
|
|
|
bb_error_msg_and_die("you have no permission to run this applet!");
|
|
|
|
|
|
|
|
if (sct->m_gid != 0) {
|
|
|
|
/* _both_ have to be set for sgid */
|
|
|
|
if ((sct->m_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) {
|
|
|
|
xsetgid(sct->m_gid);
|
|
|
|
} else xsetgid(rgid); /* no sgid -> drop */
|
|
|
|
}
|
|
|
|
if (sct->m_uid != 0) {
|
|
|
|
if (sct->m_mode & S_ISUID) xsetuid(sct->m_uid);
|
|
|
|
else xsetuid(ruid); /* no suid -> drop */
|
2006-09-23 22:04:39 +05:30
|
|
|
}
|
|
|
|
return;
|
2007-03-24 17:38:36 +05:30
|
|
|
}
|
|
|
|
#if !ENABLE_FEATURE_SUID_CONFIG_QUIET
|
|
|
|
{
|
|
|
|
static smallint onetime = 0;
|
2005-09-05 09:43:33 +05:30
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
if (!onetime) {
|
|
|
|
onetime = 1;
|
2006-10-17 04:09:51 +05:30
|
|
|
fprintf(stderr, "Using fallback suid method\n");
|
2006-09-23 22:04:39 +05:30
|
|
|
}
|
|
|
|
}
|
2007-03-24 17:38:36 +05:30
|
|
|
#endif
|
2002-06-05 01:36:25 +05:30
|
|
|
#endif
|
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
if (applet->need_suid == _BB_SUID_ALWAYS) {
|
2007-03-24 17:38:36 +05:30
|
|
|
if (geteuid())
|
|
|
|
bb_error_msg_and_die("applet requires root privileges!");
|
2006-09-23 22:04:39 +05:30
|
|
|
} else if (applet->need_suid == _BB_SUID_NEVER) {
|
|
|
|
xsetgid(rgid); /* drop all privileges */
|
|
|
|
xsetuid(ruid);
|
|
|
|
}
|
2005-09-05 09:43:33 +05:30
|
|
|
}
|
|
|
|
#else
|
|
|
|
#define check_suid(x)
|
|
|
|
#endif /* CONFIG_FEATURE_SUID */
|
|
|
|
|
|
|
|
|
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
#if ENABLE_FEATURE_COMPRESS_USAGE
|
2005-09-05 09:43:33 +05:30
|
|
|
|
2006-04-28 05:04:46 +05:30
|
|
|
#include "usage_compressed.h"
|
|
|
|
#include "unarchive.h"
|
2005-09-05 09:43:33 +05:30
|
|
|
|
2006-04-28 05:04:46 +05:30
|
|
|
static const char *unpack_usage_messages(void)
|
2005-09-05 09:43:33 +05:30
|
|
|
{
|
2006-04-28 05:04:46 +05:30
|
|
|
int input[2], output[2], pid;
|
|
|
|
char *buf;
|
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
if (pipe(input) < 0 || pipe(output) < 0)
|
2006-04-28 05:04:46 +05:30
|
|
|
exit(1);
|
|
|
|
|
|
|
|
pid = fork();
|
|
|
|
switch (pid) {
|
|
|
|
case -1: /* error */
|
|
|
|
exit(1);
|
|
|
|
case 0: /* child */
|
|
|
|
close(input[1]);
|
|
|
|
close(output[0]);
|
|
|
|
uncompressStream(input[0], output[1]);
|
|
|
|
exit(0);
|
2005-09-05 09:43:33 +05:30
|
|
|
}
|
2006-04-28 05:04:46 +05:30
|
|
|
/* parent */
|
|
|
|
|
|
|
|
close(input[0]);
|
|
|
|
close(output[1]);
|
|
|
|
pid = fork();
|
|
|
|
switch (pid) {
|
|
|
|
case -1: /* error */
|
|
|
|
exit(1);
|
|
|
|
case 0: /* child */
|
2006-07-16 13:44:35 +05:30
|
|
|
full_write(input[1], packed_usage, sizeof(packed_usage));
|
2006-04-28 05:04:46 +05:30
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
/* parent */
|
|
|
|
close(input[1]);
|
2005-09-05 09:43:33 +05:30
|
|
|
|
2006-04-28 05:04:46 +05:30
|
|
|
buf = xmalloc(SIZEOF_usage_messages);
|
2006-07-16 13:44:35 +05:30
|
|
|
full_read(output[0], buf, SIZEOF_usage_messages);
|
2006-04-28 05:04:46 +05:30
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
#else
|
2006-05-04 01:49:14 +05:30
|
|
|
#define unpack_usage_messages() usage_messages
|
2006-04-28 05:04:46 +05:30
|
|
|
#endif /* ENABLE_FEATURE_COMPRESS_USAGE */
|
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
void bb_show_usage(void)
|
2006-04-28 05:04:46 +05:30
|
|
|
{
|
|
|
|
if (ENABLE_SHOW_USAGE) {
|
|
|
|
const char *format_string;
|
|
|
|
const char *usage_string = unpack_usage_messages();
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = applet_using - applets; i > 0;)
|
|
|
|
if (!*usage_string++) --i;
|
|
|
|
|
|
|
|
format_string = "%s\n\nUsage: %s %s\n\n";
|
|
|
|
if (*usage_string == '\b')
|
|
|
|
format_string = "%s\n\nNo help available.\n\n";
|
2006-11-01 15:55:35 +05:30
|
|
|
fprintf(stderr, format_string, bb_msg_full_version,
|
2006-04-28 05:04:46 +05:30
|
|
|
applet_using->name, usage_string);
|
|
|
|
}
|
2005-09-05 09:43:33 +05:30
|
|
|
|
2006-10-04 01:58:06 +05:30
|
|
|
exit(xfunc_error_retval);
|
2005-09-05 09:43:33 +05:30
|
|
|
}
|
|
|
|
|
2006-07-16 13:44:35 +05:30
|
|
|
static int applet_name_compare(const void *name, const void *vapplet)
|
2005-09-05 09:43:33 +05:30
|
|
|
{
|
2006-09-23 22:04:39 +05:30
|
|
|
const struct BB_applet *applet = vapplet;
|
2005-09-05 09:43:33 +05:30
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
return strcmp(name, applet->name);
|
2005-09-05 09:43:33 +05:30
|
|
|
}
|
|
|
|
|
2006-07-16 13:44:35 +05:30
|
|
|
struct BB_applet *find_applet_by_name(const char *name)
|
2005-09-05 09:43:33 +05:30
|
|
|
{
|
2006-09-23 22:04:39 +05:30
|
|
|
return bsearch(name, applets, NUM_APPLETS, sizeof(struct BB_applet),
|
|
|
|
applet_name_compare);
|
2005-09-05 09:43:33 +05:30
|
|
|
}
|
|
|
|
|
2006-07-16 13:44:35 +05:30
|
|
|
void run_applet_by_name(const char *name, int argc, char **argv)
|
2005-09-05 09:43:33 +05:30
|
|
|
{
|
2006-12-24 20:53:28 +05:30
|
|
|
if (ENABLE_FEATURE_SUID_CONFIG)
|
|
|
|
parse_config_file();
|
2005-09-05 09:43:33 +05:30
|
|
|
|
|
|
|
/* Do a binary search to find the applet entry given the name. */
|
|
|
|
applet_using = find_applet_by_name(name);
|
2006-07-16 13:44:35 +05:30
|
|
|
if (applet_using) {
|
2006-10-04 02:30:43 +05:30
|
|
|
applet_name = applet_using->name;
|
2006-12-24 20:53:28 +05:30
|
|
|
if (argc == 2 && !strcmp(argv[1], "--help"))
|
|
|
|
bb_show_usage();
|
|
|
|
if (ENABLE_FEATURE_SUID)
|
|
|
|
check_suid(applet_using);
|
|
|
|
exit(applet_using->main(argc, argv));
|
2005-09-05 09:43:33 +05:30
|
|
|
}
|
2007-03-24 17:38:36 +05:30
|
|
|
if (!strncmp(name, "busybox", 7))
|
|
|
|
exit(busybox_main(argc, argv));
|
2005-09-05 09:43:33 +05:30
|
|
|
}
|