2001-03-17 04:17:14 +05:30
|
|
|
/* vi: set sw=4 ts=4: */
|
|
|
|
/*
|
|
|
|
* Utility routines.
|
|
|
|
*
|
|
|
|
* Copyright (C) tons of folks. Tracking down who wrote what
|
|
|
|
* isn't something I'm going to worry about... If you wrote something
|
|
|
|
* here, please feel free to acknowledge your work.
|
|
|
|
*
|
2003-05-26 19:39:12 +05:30
|
|
|
* Based in part on code from sash, Copyright (c) 1999 by David I. Bell
|
2001-03-17 04:17:14 +05:30
|
|
|
* Permission has been granted to redistribute this code under the GPL.
|
|
|
|
*
|
2006-05-01 06:23:40 +05:30
|
|
|
* Licensed under GPLv2 or later, see file License in this tarball for details.
|
2001-03-17 04:17:14 +05:30
|
|
|
*/
|
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
#include <assert.h>
|
2007-02-03 22:57:14 +05:30
|
|
|
#include "busybox.h"
|
|
|
|
|
2007-10-08 02:16:34 +05:30
|
|
|
|
2006-11-09 05:30:12 +05:30
|
|
|
/* Apparently uclibc defines __GLIBC__ (compat trick?). Oh well. */
|
|
|
|
#if ENABLE_STATIC && defined(__GLIBC__) && !defined(__UCLIBC__)
|
2006-10-20 19:12:57 +05:30
|
|
|
#warning Static linking against glibc produces buggy executables
|
2006-11-11 04:55:53 +05:30
|
|
|
#warning (glibc does not cope well with ld --gc-sections).
|
2006-10-30 01:07:13 +05:30
|
|
|
#warning See sources.redhat.com/bugzilla/show_bug.cgi?id=3400
|
2006-12-19 03:19:06 +05:30
|
|
|
#warning Note that glibc is unsuitable for static linking anyway.
|
|
|
|
#warning If you still want to do it, remove -Wl,--gc-sections
|
|
|
|
#warning from top-level Makefile and remove this warning.
|
2007-05-18 13:07:06 +05:30
|
|
|
#error Aborting compilation.
|
2006-10-20 19:12:57 +05:30
|
|
|
#endif
|
|
|
|
|
2007-04-09 08:35:48 +05:30
|
|
|
|
2007-04-11 03:08:30 +05:30
|
|
|
const struct bb_applet *current_applet;
|
2007-10-08 02:16:34 +05:30
|
|
|
const char *applet_name;
|
2007-04-11 12:34:23 +05:30
|
|
|
#if !BB_MMU
|
2007-04-10 19:46:19 +05:30
|
|
|
bool re_execed;
|
2007-04-09 08:35:48 +05:30
|
|
|
#endif
|
2001-03-20 01:00:24 +05:30
|
|
|
|
2007-04-17 02:25:27 +05:30
|
|
|
USE_FEATURE_SUID(static uid_t ruid;) /* real uid */
|
2002-06-05 01:36:25 +05:30
|
|
|
|
2007-04-09 08:35:48 +05:30
|
|
|
#if ENABLE_FEATURE_SUID_CONFIG
|
2002-06-05 01:36:25 +05:30
|
|
|
|
2007-04-09 08:35:48 +05:30
|
|
|
/* applets[] is const, so we have to define this "override" structure */
|
2007-04-09 08:41:58 +05:30
|
|
|
static struct BB_suid_config {
|
2007-04-11 03:08:30 +05:30
|
|
|
const struct bb_applet *m_applet;
|
2006-09-23 22:04:39 +05:30
|
|
|
uid_t m_uid;
|
|
|
|
gid_t m_gid;
|
|
|
|
mode_t m_mode;
|
|
|
|
struct BB_suid_config *m_next;
|
2005-10-28 15:15:07 +05:30
|
|
|
} *suid_config;
|
2002-06-05 01:36:25 +05:30
|
|
|
|
2007-04-10 19:46:19 +05:30
|
|
|
static bool suid_cfg_readable;
|
2002-06-05 01:36:25 +05:30
|
|
|
|
2002-08-22 18:42:40 +05:30
|
|
|
/* check if u is member of group g */
|
2006-09-23 22:04:39 +05:30
|
|
|
static int ingroup(uid_t u, gid_t g)
|
2002-06-05 01:36:25 +05:30
|
|
|
{
|
2006-09-23 22:04:39 +05:30
|
|
|
struct group *grp = getgrgid(g);
|
2002-08-22 18:42:40 +05:30
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
if (grp) {
|
|
|
|
char **mem;
|
2002-08-22 18:42:40 +05:30
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
for (mem = grp->gr_mem; *mem; mem++) {
|
|
|
|
struct passwd *pwd = getpwnam(*mem);
|
2002-08-22 18:42:40 +05:30
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
if (pwd && (pwd->pw_uid == u))
|
|
|
|
return 1;
|
|
|
|
}
|
2002-06-05 01:36:25 +05:30
|
|
|
}
|
2006-09-23 22:04:39 +05:30
|
|
|
return 0;
|
2002-06-05 01:36:25 +05:30
|
|
|
}
|
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* This should probably be a libbb routine. In that case,
|
|
|
|
* I'd probably rename it to something like bb_trimmed_slice.
|
|
|
|
*/
|
|
|
|
static char *get_trimmed_slice(char *s, char *e)
|
|
|
|
{
|
|
|
|
/* First, consider the value at e to be nul and back up until we
|
|
|
|
* reach a non-space char. Set the char after that (possibly at
|
|
|
|
* the original e) to nul. */
|
|
|
|
while (e-- > s) {
|
|
|
|
if (!isspace(*e)) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2007-04-09 08:35:48 +05:30
|
|
|
e[1] = '\0';
|
2004-02-01 15:33:05 +05:30
|
|
|
|
|
|
|
/* Next, advance past all leading space and return a ptr to the
|
|
|
|
* first non-space char; possibly the terminating nul. */
|
2006-06-19 01:50:07 +05:30
|
|
|
return skip_whitespace(s);
|
2004-02-01 15:33:05 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
/* Don't depend on the tools to combine strings. */
|
2007-08-13 02:28:27 +05:30
|
|
|
static const char config_file[] ALIGN1 = "/etc/busybox.conf";
|
2004-02-01 15:33:05 +05:30
|
|
|
|
|
|
|
/* We don't supply a value for the nul, so an index adjustment is
|
|
|
|
* necessary below. Also, we use unsigned short here to save some
|
|
|
|
* space even though these are really mode_t values. */
|
2007-08-13 02:28:27 +05:30
|
|
|
static const unsigned short mode_mask[] ALIGN2 = {
|
2007-04-09 08:35:48 +05:30
|
|
|
/* SST sst xxx --- */
|
2004-02-01 15:33:05 +05:30
|
|
|
S_ISUID, S_ISUID|S_IXUSR, S_IXUSR, 0, /* user */
|
|
|
|
S_ISGID, S_ISGID|S_IXGRP, S_IXGRP, 0, /* group */
|
|
|
|
0, S_IXOTH, S_IXOTH, 0 /* other */
|
|
|
|
};
|
2002-06-05 01:36:25 +05:30
|
|
|
|
2007-04-12 06:02:05 +05:30
|
|
|
#define parse_error(x) do { errmsg = x; goto pe_label; } while (0)
|
2007-04-09 08:35:48 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
static void parse_config_file(void)
|
2002-06-05 01:36:25 +05:30
|
|
|
{
|
2004-02-01 15:33:05 +05:30
|
|
|
struct BB_suid_config *sct_head;
|
|
|
|
struct BB_suid_config *sct;
|
2007-04-11 03:08:30 +05:30
|
|
|
const struct bb_applet *applet;
|
2004-02-01 15:33:05 +05:30
|
|
|
FILE *f;
|
2007-01-30 04:21:00 +05:30
|
|
|
const char *errmsg;
|
2004-02-01 15:33:05 +05:30
|
|
|
char *s;
|
|
|
|
char *e;
|
2007-04-10 19:46:19 +05:30
|
|
|
int i;
|
|
|
|
unsigned lc;
|
|
|
|
smallint section;
|
2004-02-01 15:33:05 +05:30
|
|
|
char buffer[256];
|
|
|
|
struct stat st;
|
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
assert(!suid_config); /* Should be set to NULL by bss init. */
|
2004-02-01 15:33:05 +05:30
|
|
|
|
2007-04-14 18:52:09 +05:30
|
|
|
ruid = getuid();
|
|
|
|
if (ruid == 0) /* run by root - don't need to even read config file */
|
|
|
|
return;
|
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
if ((stat(config_file, &st) != 0) /* No config file? */
|
|
|
|
|| !S_ISREG(st.st_mode) /* Not a regular file? */
|
|
|
|
|| (st.st_uid != 0) /* Not owned by root? */
|
|
|
|
|| (st.st_mode & (S_IWGRP | S_IWOTH)) /* Writable by non-root? */
|
|
|
|
|| !(f = fopen(config_file, "r")) /* Cannot open? */
|
|
|
|
) {
|
2004-02-01 15:33:05 +05:30
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-02-17 15:46:21 +05:30
|
|
|
suid_cfg_readable = 1;
|
2004-02-01 15:33:05 +05:30
|
|
|
sct_head = NULL;
|
|
|
|
section = lc = 0;
|
|
|
|
|
2007-04-09 08:35:48 +05:30
|
|
|
while (1) {
|
2004-02-01 15:33:05 +05:30
|
|
|
s = buffer;
|
2003-05-26 19:39:12 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
if (!fgets(s, sizeof(buffer), f)) { /* Are we done? */
|
|
|
|
if (ferror(f)) { /* Make sure it wasn't a read error. */
|
|
|
|
parse_error("reading");
|
|
|
|
}
|
|
|
|
fclose(f);
|
|
|
|
suid_config = sct_head; /* Success, so set the pointer. */
|
|
|
|
return;
|
|
|
|
}
|
2003-05-26 19:39:12 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
lc++; /* Got a (partial) line. */
|
|
|
|
|
|
|
|
/* If a line is too long for our buffer, we consider it an error.
|
|
|
|
* The following test does mistreat one corner case though.
|
|
|
|
* If the final line of the file does not end with a newline and
|
|
|
|
* yet exactly fills the buffer, it will be treated as too long
|
|
|
|
* even though there isn't really a problem. But it isn't really
|
|
|
|
* worth adding code to deal with such an unlikely situation, and
|
|
|
|
* we do err on the side of caution. Besides, the line would be
|
|
|
|
* too long if it did end with a newline. */
|
|
|
|
if (!strchr(s, '\n') && !feof(f)) {
|
|
|
|
parse_error("line too long");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Trim leading and trailing whitespace, ignoring comments, and
|
|
|
|
* check if the resulting string is empty. */
|
2007-03-24 17:38:36 +05:30
|
|
|
s = get_trimmed_slice(s, strchrnul(s, '#'));
|
|
|
|
if (!*s) {
|
2004-02-01 15:33:05 +05:30
|
|
|
continue;
|
|
|
|
}
|
2003-05-26 19:39:12 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Check for a section header. */
|
|
|
|
|
|
|
|
if (*s == '[') {
|
|
|
|
/* Unlike the old code, we ignore leading and trailing
|
|
|
|
* whitespace for the section name. We also require that
|
|
|
|
* there are no stray characters after the closing bracket. */
|
2007-03-24 17:38:36 +05:30
|
|
|
e = strchr(s, ']');
|
|
|
|
if (!e /* Missing right bracket? */
|
|
|
|
|| e[1] /* Trailing characters? */
|
|
|
|
|| !*(s = get_trimmed_slice(s+1, e)) /* Missing name? */
|
|
|
|
) {
|
2004-02-01 15:33:05 +05:30
|
|
|
parse_error("section header");
|
|
|
|
}
|
|
|
|
/* Right now we only have one section so just check it.
|
|
|
|
* If more sections are added in the future, please don't
|
|
|
|
* resort to cascading ifs with multiple strcasecmp calls.
|
|
|
|
* That kind of bloated code is all too common. A loop
|
|
|
|
* and a string table would be a better choice unless the
|
|
|
|
* number of sections is very small. */
|
|
|
|
if (strcasecmp(s, "SUID") == 0) {
|
|
|
|
section = 1;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
section = -1; /* Unknown section so set to skip. */
|
|
|
|
continue;
|
|
|
|
}
|
2003-05-26 19:39:12 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Process sections. */
|
2003-05-26 19:39:12 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
if (section == 1) { /* SUID */
|
|
|
|
/* Since we trimmed leading and trailing space above, we're
|
|
|
|
* now looking for strings of the form
|
|
|
|
* <key>[::space::]*=[::space::]*<value>
|
|
|
|
* where both key and value could contain inner whitespace. */
|
2003-05-26 19:39:12 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* First get the key (an applet name in our case). */
|
2007-03-24 17:38:36 +05:30
|
|
|
e = strchr(s, '=');
|
|
|
|
if (e) {
|
2004-02-01 15:33:05 +05:30
|
|
|
s = get_trimmed_slice(s, e);
|
|
|
|
}
|
|
|
|
if (!e || !*s) { /* Missing '=' or empty key. */
|
|
|
|
parse_error("keyword");
|
|
|
|
}
|
2003-05-26 19:39:12 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Ok, we have an applet name. Process the rhs if this
|
|
|
|
* applet is currently built in and ignore it otherwise.
|
2007-04-09 08:35:48 +05:30
|
|
|
* Note: this can hide config file bugs which only pop
|
2004-02-01 15:33:05 +05:30
|
|
|
* up when the busybox configuration is changed. */
|
2007-03-24 17:38:36 +05:30
|
|
|
applet = find_applet_by_name(s);
|
|
|
|
if (applet) {
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Note: We currently don't check for duplicates!
|
|
|
|
* The last config line for each applet will be the
|
|
|
|
* one used since we insert at the head of the list.
|
|
|
|
* I suppose this could be considered a feature. */
|
|
|
|
sct = xmalloc(sizeof(struct BB_suid_config));
|
|
|
|
sct->m_applet = applet;
|
|
|
|
sct->m_mode = 0;
|
|
|
|
sct->m_next = sct_head;
|
|
|
|
sct_head = sct;
|
|
|
|
|
|
|
|
/* Get the specified mode. */
|
|
|
|
|
2006-06-19 01:50:07 +05:30
|
|
|
e = skip_whitespace(e+1);
|
2004-02-01 15:33:05 +05:30
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
for (i = 0; i < 3; i++) {
|
2007-05-03 04:31:32 +05:30
|
|
|
/* There are 4 chars + 1 nul for each of user/group/other. */
|
2007-08-13 02:28:27 +05:30
|
|
|
static const char mode_chars[] ALIGN1 = "Ssx-\0" "Ssx-\0" "Ttx-";
|
2007-05-03 04:31:32 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
const char *q;
|
2007-03-24 17:38:36 +05:30
|
|
|
q = strchrnul(mode_chars + 5*i, *e++);
|
|
|
|
if (!*q) {
|
2004-02-01 15:33:05 +05:30
|
|
|
parse_error("mode");
|
|
|
|
}
|
|
|
|
/* Adjust by -i to account for nul. */
|
|
|
|
sct->m_mode |= mode_mask[(q - mode_chars) - i];
|
2003-05-26 19:39:12 +05:30
|
|
|
}
|
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Now get the the user/group info. */
|
2006-01-15 19:34:57 +05:30
|
|
|
|
2006-06-19 01:50:07 +05:30
|
|
|
s = skip_whitespace(e);
|
2004-02-01 15:33:05 +05:30
|
|
|
|
2007-04-09 08:35:48 +05:30
|
|
|
/* Note: we require whitespace between the mode and the
|
2004-02-01 15:33:05 +05:30
|
|
|
* user/group info. */
|
|
|
|
if ((s == e) || !(e = strchr(s, '.'))) {
|
|
|
|
parse_error("<uid>.<gid>");
|
|
|
|
}
|
2007-03-24 17:38:36 +05:30
|
|
|
*e++ = '\0';
|
2004-02-01 15:33:05 +05:30
|
|
|
|
|
|
|
/* We can't use get_ug_id here since it would exit()
|
|
|
|
* if a uid or gid was not found. Oh well... */
|
2007-03-24 17:38:36 +05:30
|
|
|
sct->m_uid = bb_strtoul(s, NULL, 10);
|
|
|
|
if (errno) {
|
|
|
|
struct passwd *pwd = getpwnam(s);
|
|
|
|
if (!pwd) {
|
|
|
|
parse_error("user");
|
2004-02-01 15:33:05 +05:30
|
|
|
}
|
2007-03-24 17:38:36 +05:30
|
|
|
sct->m_uid = pwd->pw_uid;
|
|
|
|
}
|
2004-02-01 15:33:05 +05:30
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
sct->m_gid = bb_strtoul(e, NULL, 10);
|
|
|
|
if (errno) {
|
|
|
|
struct group *grp;
|
|
|
|
grp = getgrnam(e);
|
|
|
|
if (!grp) {
|
|
|
|
parse_error("group");
|
2004-02-01 15:33:05 +05:30
|
|
|
}
|
2007-03-24 17:38:36 +05:30
|
|
|
sct->m_gid = grp->gr_gid;
|
2003-05-26 19:39:12 +05:30
|
|
|
}
|
2002-06-05 01:36:25 +05:30
|
|
|
}
|
2004-02-01 15:33:05 +05:30
|
|
|
continue;
|
2002-06-05 01:36:25 +05:30
|
|
|
}
|
2002-08-22 18:42:40 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Unknown sections are ignored. */
|
2002-06-06 23:00:16 +05:30
|
|
|
|
2004-02-01 15:33:05 +05:30
|
|
|
/* Encountering configuration lines prior to seeing a
|
|
|
|
* section header is treated as an error. This is how
|
2004-04-14 23:21:38 +05:30
|
|
|
* the old code worked, but it may not be desirable.
|
2004-02-01 15:33:05 +05:30
|
|
|
* We may want to simply ignore such lines in case they
|
|
|
|
* are used in some future version of busybox. */
|
|
|
|
if (!section) {
|
|
|
|
parse_error("keyword outside section");
|
|
|
|
}
|
|
|
|
|
2007-04-09 08:35:48 +05:30
|
|
|
} /* while (1) */
|
2004-02-01 15:33:05 +05:30
|
|
|
|
|
|
|
pe_label:
|
|
|
|
fprintf(stderr, "Parse error in %s, line %d: %s\n",
|
2007-01-30 04:21:00 +05:30
|
|
|
config_file, lc, errmsg);
|
2004-02-01 15:33:05 +05:30
|
|
|
|
|
|
|
fclose(f);
|
|
|
|
/* Release any allocated memory before returning. */
|
|
|
|
while (sct_head) {
|
|
|
|
sct = sct_head->m_next;
|
|
|
|
free(sct_head);
|
|
|
|
sct_head = sct;
|
|
|
|
}
|
2002-06-05 01:36:25 +05:30
|
|
|
}
|
2005-09-05 09:43:33 +05:30
|
|
|
#else
|
2007-04-14 18:52:09 +05:30
|
|
|
static inline void parse_config_file(void)
|
|
|
|
{
|
2007-04-17 02:25:27 +05:30
|
|
|
USE_FEATURE_SUID(ruid = getuid();)
|
2007-04-14 18:52:09 +05:30
|
|
|
}
|
2007-04-09 08:35:48 +05:30
|
|
|
#endif /* FEATURE_SUID_CONFIG */
|
|
|
|
|
2005-09-05 09:43:33 +05:30
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
#if ENABLE_FEATURE_SUID
|
2007-04-11 03:08:30 +05:30
|
|
|
static void check_suid(const struct bb_applet *applet)
|
2005-09-05 09:43:33 +05:30
|
|
|
{
|
2007-05-03 04:31:32 +05:30
|
|
|
gid_t rgid; /* real gid */
|
2007-04-14 18:52:09 +05:30
|
|
|
|
|
|
|
if (ruid == 0) /* set by parse_config_file() */
|
|
|
|
return; /* run by root - no need to check more */
|
|
|
|
rgid = getgid();
|
2005-09-05 09:43:33 +05:30
|
|
|
|
2007-03-24 17:38:36 +05:30
|
|
|
#if ENABLE_FEATURE_SUID_CONFIG
|
2006-09-23 22:04:39 +05:30
|
|
|
if (suid_cfg_readable) {
|
2007-05-04 20:24:36 +05:30
|
|
|
uid_t uid;
|
2006-09-23 22:04:39 +05:30
|
|
|
struct BB_suid_config *sct;
|
2007-03-24 17:38:36 +05:30
|
|
|
mode_t m;
|
2005-09-05 09:43:33 +05:30
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
for (sct = suid_config; sct; sct = sct->m_next) {
|
|
|
|
if (sct->m_applet == applet)
|
2007-03-24 17:38:36 +05:30
|
|
|
goto found;
|
2006-09-23 22:04:39 +05:30
|
|
|
}
|
2007-03-24 17:38:36 +05:30
|
|
|
/* default: drop all privileges */
|
|
|
|
xsetgid(rgid);
|
|
|
|
xsetuid(ruid);
|
|
|
|
return;
|
|
|
|
found:
|
|
|
|
m = sct->m_mode;
|
|
|
|
if (sct->m_uid == ruid)
|
|
|
|
/* same uid */
|
|
|
|
m >>= 6;
|
|
|
|
else if ((sct->m_gid == rgid) || ingroup(ruid, sct->m_gid))
|
|
|
|
/* same group / in group */
|
|
|
|
m >>= 3;
|
|
|
|
|
|
|
|
if (!(m & S_IXOTH)) /* is x bit not set ? */
|
|
|
|
bb_error_msg_and_die("you have no permission to run this applet!");
|
|
|
|
|
2007-05-03 04:31:32 +05:30
|
|
|
/* _both_ sgid and group_exec have to be set for setegid */
|
|
|
|
if ((sct->m_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP))
|
|
|
|
rgid = sct->m_gid;
|
|
|
|
/* else (no setegid) we will set egid = rgid */
|
|
|
|
|
|
|
|
/* We set effective AND saved ids. If saved-id is not set
|
|
|
|
* like we do below, seteiud(0) can still later succeed! */
|
|
|
|
if (setresgid(-1, rgid, rgid))
|
|
|
|
bb_perror_msg_and_die("setresgid");
|
|
|
|
|
|
|
|
/* do we have to set effective uid? */
|
|
|
|
uid = ruid;
|
|
|
|
if (sct->m_mode & S_ISUID)
|
|
|
|
uid = sct->m_uid;
|
|
|
|
/* else (no seteuid) we will set euid = ruid */
|
|
|
|
|
|
|
|
if (setresuid(-1, uid, uid))
|
|
|
|
bb_perror_msg_and_die("setresuid");
|
2006-09-23 22:04:39 +05:30
|
|
|
return;
|
2007-03-24 17:38:36 +05:30
|
|
|
}
|
|
|
|
#if !ENABLE_FEATURE_SUID_CONFIG_QUIET
|
|
|
|
{
|
2007-04-10 19:46:19 +05:30
|
|
|
static bool onetime = 0;
|
2005-09-05 09:43:33 +05:30
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
if (!onetime) {
|
|
|
|
onetime = 1;
|
2006-10-17 04:09:51 +05:30
|
|
|
fprintf(stderr, "Using fallback suid method\n");
|
2006-09-23 22:04:39 +05:30
|
|
|
}
|
|
|
|
}
|
2007-03-24 17:38:36 +05:30
|
|
|
#endif
|
2002-06-05 01:36:25 +05:30
|
|
|
#endif
|
|
|
|
|
2006-09-23 22:04:39 +05:30
|
|
|
if (applet->need_suid == _BB_SUID_ALWAYS) {
|
2007-05-03 04:31:32 +05:30
|
|
|
/* Real uid is not 0. If euid isn't 0 too, suid bit
|
|
|
|
* is most probably not set on our executable */
|
2007-03-24 17:38:36 +05:30
|
|
|
if (geteuid())
|
|
|
|
bb_error_msg_and_die("applet requires root privileges!");
|
2006-09-23 22:04:39 +05:30
|
|
|
} else if (applet->need_suid == _BB_SUID_NEVER) {
|
2007-04-14 18:52:09 +05:30
|
|
|
xsetgid(rgid); /* drop all privileges */
|
2006-09-23 22:04:39 +05:30
|
|
|
xsetuid(ruid);
|
|
|
|
}
|
2005-09-05 09:43:33 +05:30
|
|
|
}
|
|
|
|
#else
|
2007-04-09 08:35:48 +05:30
|
|
|
#define check_suid(x) ((void)0)
|
|
|
|
#endif /* FEATURE_SUID */
|
2005-09-05 09:43:33 +05:30
|
|
|
|
|
|
|
|
2007-04-09 08:35:48 +05:30
|
|
|
#if ENABLE_FEATURE_INSTALLER
|
|
|
|
/* create (sym)links for each applet */
|
|
|
|
static void install_links(const char *busybox, int use_symbolic_links)
|
2005-09-05 09:43:33 +05:30
|
|
|
{
|
2007-04-11 03:08:30 +05:30
|
|
|
/* directory table
|
|
|
|
* this should be consistent w/ the enum,
|
|
|
|
* busybox.h::bb_install_loc_t, or else... */
|
2007-08-13 02:28:27 +05:30
|
|
|
static const char usr_bin [] ALIGN1 = "/usr/bin";
|
|
|
|
static const char usr_sbin[] ALIGN1 = "/usr/sbin";
|
2007-04-11 03:08:30 +05:30
|
|
|
static const char *const install_dir[] = {
|
|
|
|
&usr_bin [8], /* "", equivalent to "/" for concat_path_file() */
|
|
|
|
&usr_bin [4], /* "/bin" */
|
|
|
|
&usr_sbin[4], /* "/sbin" */
|
|
|
|
usr_bin,
|
|
|
|
usr_sbin
|
|
|
|
};
|
|
|
|
|
2007-04-09 08:35:48 +05:30
|
|
|
int (*lf)(const char *, const char *) = link;
|
|
|
|
char *fpc;
|
|
|
|
int i;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (use_symbolic_links)
|
|
|
|
lf = symlink;
|
|
|
|
|
|
|
|
for (i = 0; applets[i].name != NULL; i++) {
|
|
|
|
fpc = concat_path_file(
|
2007-04-11 03:08:30 +05:30
|
|
|
install_dir[applets[i].install_loc],
|
2007-04-09 08:35:48 +05:30
|
|
|
applets[i].name);
|
|
|
|
rc = lf(busybox, fpc);
|
|
|
|
if (rc != 0 && errno != EEXIST) {
|
2007-10-01 17:28:38 +05:30
|
|
|
bb_simple_perror_msg(fpc);
|
2007-04-09 08:35:48 +05:30
|
|
|
}
|
|
|
|
free(fpc);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
#define install_links(x,y) ((void)0)
|
|
|
|
#endif /* FEATURE_INSTALLER */
|
2005-09-05 09:43:33 +05:30
|
|
|
|
2007-04-09 08:35:48 +05:30
|
|
|
|
|
|
|
/* If we were called as "busybox..." */
|
2007-04-14 15:39:57 +05:30
|
|
|
static int busybox_main(char **argv)
|
2007-04-09 08:35:48 +05:30
|
|
|
{
|
2007-04-19 02:30:21 +05:30
|
|
|
if (!argv[1]) {
|
|
|
|
/* Called without arguments */
|
|
|
|
const struct bb_applet *a;
|
|
|
|
int col, output_width;
|
|
|
|
help:
|
|
|
|
output_width = 80;
|
|
|
|
if (ENABLE_FEATURE_AUTOWIDTH) {
|
2007-09-05 17:00:34 +05:30
|
|
|
/* Obtain the terminal width */
|
2007-04-19 02:30:21 +05:30
|
|
|
get_terminal_width_height(0, &output_width, NULL);
|
|
|
|
}
|
|
|
|
/* leading tab and room to wrap */
|
|
|
|
output_width -= sizeof("start-stop-daemon, ") + 8;
|
|
|
|
|
2007-06-13 17:57:17 +05:30
|
|
|
printf("%s multi-call binary\n", bb_banner); /* reuse const string... */
|
2007-09-21 01:14:10 +05:30
|
|
|
printf("Copyright (C) 1998-2006 Erik Andersen, Rob Landley, and others.\n"
|
|
|
|
"Licensed under GPLv2. See source distribution for full notice.\n"
|
2007-04-19 02:30:21 +05:30
|
|
|
"\n"
|
|
|
|
"Usage: busybox [function] [arguments]...\n"
|
|
|
|
" or: [function] [arguments]...\n"
|
|
|
|
"\n"
|
|
|
|
"\tBusyBox is a multi-call binary that combines many common Unix\n"
|
|
|
|
"\tutilities into a single executable. Most people will create a\n"
|
|
|
|
"\tlink to busybox for each function they wish to use and BusyBox\n"
|
|
|
|
"\twill act like whatever it was invoked as!\n"
|
2007-06-13 17:57:17 +05:30
|
|
|
"\nCurrently defined functions:\n");
|
2007-04-19 02:30:21 +05:30
|
|
|
col = 0;
|
|
|
|
a = applets;
|
|
|
|
while (a->name) {
|
|
|
|
if (col > output_width) {
|
|
|
|
puts(",");
|
|
|
|
col = 0;
|
|
|
|
}
|
|
|
|
col += printf("%s%s", (col ? ", " : "\t"), a->name);
|
|
|
|
a++;
|
|
|
|
}
|
|
|
|
puts("\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ENABLE_FEATURE_INSTALLER && strcmp(argv[1], "--install") == 0) {
|
2007-06-08 20:32:55 +05:30
|
|
|
const char *busybox;
|
2007-09-05 17:00:34 +05:30
|
|
|
busybox = xmalloc_readlink(bb_busybox_exec_path);
|
2007-04-09 08:35:48 +05:30
|
|
|
if (!busybox)
|
2007-06-08 20:32:55 +05:30
|
|
|
busybox = bb_busybox_exec_path;
|
|
|
|
/* -s makes symlinks */
|
2007-09-05 17:00:34 +05:30
|
|
|
install_links(busybox, argv[2] && strcmp(argv[2], "-s") == 0);
|
2007-04-09 08:35:48 +05:30
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2007-04-19 02:30:21 +05:30
|
|
|
if (strcmp(argv[1], "--help") == 0) {
|
|
|
|
/* "busybox --help [<applet>]" */
|
|
|
|
if (!argv[2])
|
|
|
|
goto help;
|
|
|
|
/* convert to "<applet> --help" */
|
|
|
|
argv[0] = argv[2];
|
|
|
|
argv[2] = NULL;
|
2007-04-09 08:59:43 +05:30
|
|
|
} else {
|
2007-04-19 02:30:21 +05:30
|
|
|
/* "busybox <applet> arg1 arg2 ..." */
|
|
|
|
argv++;
|
2007-04-09 08:59:43 +05:30
|
|
|
}
|
2007-08-25 23:55:24 +05:30
|
|
|
/* We support "busybox /a/path/to/applet args..." too. Allows for
|
|
|
|
* "#!/bin/busybox"-style wrappers */
|
2007-09-24 23:57:04 +05:30
|
|
|
applet_name = bb_get_last_path_component_nostrip(argv[0]);
|
2007-08-25 23:55:24 +05:30
|
|
|
run_applet_and_exit(applet_name, argv);
|
2007-04-09 08:35:48 +05:30
|
|
|
bb_error_msg_and_die("applet not found");
|
|
|
|
}
|
|
|
|
|
2007-04-14 15:39:57 +05:30
|
|
|
void run_current_applet_and_exit(char **argv)
|
2007-04-09 08:41:58 +05:30
|
|
|
{
|
2007-04-14 15:39:57 +05:30
|
|
|
int argc = 1;
|
|
|
|
|
|
|
|
while (argv[argc])
|
|
|
|
argc++;
|
|
|
|
|
2007-04-12 17:57:32 +05:30
|
|
|
/* Reinit some shared global data */
|
|
|
|
optind = 1;
|
|
|
|
xfunc_error_retval = EXIT_FAILURE;
|
|
|
|
|
2007-04-09 08:41:58 +05:30
|
|
|
applet_name = current_applet->name;
|
|
|
|
if (argc == 2 && !strcmp(argv[1], "--help"))
|
|
|
|
bb_show_usage();
|
|
|
|
if (ENABLE_FEATURE_SUID)
|
|
|
|
check_suid(current_applet);
|
|
|
|
exit(current_applet->main(argc, argv));
|
|
|
|
}
|
|
|
|
|
2007-04-14 15:39:57 +05:30
|
|
|
void run_applet_and_exit(const char *name, char **argv)
|
2007-04-09 08:35:48 +05:30
|
|
|
{
|
|
|
|
current_applet = find_applet_by_name(name);
|
2007-04-09 08:41:58 +05:30
|
|
|
if (current_applet)
|
2007-04-14 15:39:57 +05:30
|
|
|
run_current_applet_and_exit(argv);
|
2007-03-24 17:38:36 +05:30
|
|
|
if (!strncmp(name, "busybox", 7))
|
2007-04-14 15:39:57 +05:30
|
|
|
exit(busybox_main(argv));
|
2005-09-05 09:43:33 +05:30
|
|
|
}
|
2007-04-09 08:35:48 +05:30
|
|
|
|
|
|
|
|
|
|
|
int main(int argc, char **argv)
|
|
|
|
{
|
2007-10-08 02:30:41 +05:30
|
|
|
bbox_prepare_main(argv);
|
2007-06-01 03:46:38 +05:30
|
|
|
|
2007-04-11 12:34:23 +05:30
|
|
|
#if !BB_MMU
|
2007-04-09 08:35:48 +05:30
|
|
|
/* NOMMU re-exec trick sets high-order bit in first byte of name */
|
2007-04-11 05:02:37 +05:30
|
|
|
if (argv[0][0] & 0x80) {
|
2007-04-09 08:35:48 +05:30
|
|
|
re_execed = 1;
|
2007-04-11 05:02:37 +05:30
|
|
|
argv[0][0] &= 0x7f;
|
2007-04-09 08:35:48 +05:30
|
|
|
}
|
|
|
|
#endif
|
2007-04-11 05:02:37 +05:30
|
|
|
applet_name = argv[0];
|
2007-04-09 08:35:48 +05:30
|
|
|
if (applet_name[0] == '-')
|
|
|
|
applet_name++;
|
2007-06-30 13:34:05 +05:30
|
|
|
applet_name = bb_basename(applet_name);
|
2007-04-09 08:35:48 +05:30
|
|
|
|
2007-04-14 18:52:09 +05:30
|
|
|
parse_config_file(); /* ...maybe, if FEATURE_SUID_CONFIG */
|
2007-04-09 08:35:48 +05:30
|
|
|
|
2007-04-14 15:39:57 +05:30
|
|
|
run_applet_and_exit(applet_name, argv);
|
2007-04-09 08:35:48 +05:30
|
|
|
bb_error_msg_and_die("applet not found");
|
|
|
|
}
|