blob: dde75f23679856a359ac2580e37b68d8225d8d9f [file] [log] [blame]
Eric Andersenaad1a882001-03-16 22:47:14 +00001/* vi: set sw=4 ts=4: */
2/*
3 * Utility routines.
4 *
5 * Copyright (C) tons of folks. Tracking down who wrote what
6 * isn't something I'm going to worry about... If you wrote something
7 * here, please feel free to acknowledge your work.
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
22 *
Glenn L McGrath2faee7b2003-05-26 14:09:12 +000023 * Based in part on code from sash, Copyright (c) 1999 by David I. Bell
Eric Andersenaad1a882001-03-16 22:47:14 +000024 * Permission has been granted to redistribute this code under the GPL.
25 *
26 */
27
Robert Grieblc9aca452002-06-04 20:06:25 +000028#include <unistd.h>
Eric Andersenaad1a882001-03-16 22:47:14 +000029#include <stdio.h>
30#include <stdlib.h>
Eric Andersen08ff8a42001-03-23 17:02:05 +000031#include <string.h>
Manuel Novoa III 31b98dd2004-02-01 10:03:05 +000032#include <assert.h>
Eric Andersenaad1a882001-03-16 22:47:14 +000033#include "busybox.h"
34
Eric Andersen674b08a2004-04-06 14:28:35 +000035const char usage_messages[] =
36
37#define MAKE_USAGE
38#include "usage.h"
39
40#include "applets.h"
41
42;
43
44#undef MAKE_USAGE
Eric Andersen2ccfef22001-03-19 19:30:24 +000045#undef APPLET
46#undef APPLET_NOUSAGE
47#undef PROTOTYPES
48#include "applets.h"
49
Eric Andersen674b08a2004-04-06 14:28:35 +000050
Glenn L McGrath7fc504c2004-02-22 11:13:28 +000051static struct BB_applet *applet_using;
Eric Andersenaad1a882001-03-16 22:47:14 +000052
Eric Andersen2ccfef22001-03-19 19:30:24 +000053/* The -1 arises because of the {0,NULL,0,-1} entry above. */
54const size_t NUM_APPLETS = (sizeof (applets) / sizeof (struct BB_applet) - 1);
55
Robert Grieblc9aca452002-06-04 20:06:25 +000056
Robert Grieblc9aca452002-06-04 20:06:25 +000057#ifdef CONFIG_FEATURE_SUID_CONFIG
58
59#include <sys/stat.h>
60#include <ctype.h>
Eric Andersen887ca792002-07-03 23:19:26 +000061#include "pwd_.h"
62#include "grp_.h"
Robert Grieblc9aca452002-06-04 20:06:25 +000063
Robert Grieblc9aca452002-06-04 20:06:25 +000064#define CONFIG_FILE "/etc/busybox.conf"
65
Glenn L McGrathb37367a2002-08-22 13:12:40 +000066/* applets [] is const, so we have to define this "override" structure */
Bernhard Reutner-Fischer6973abc2005-10-28 09:45:07 +000067static struct BB_suid_config
Glenn L McGrath2faee7b2003-05-26 14:09:12 +000068{
69 struct BB_applet *m_applet;
Robert Grieblc9aca452002-06-04 20:06:25 +000070
Glenn L McGrath2faee7b2003-05-26 14:09:12 +000071 uid_t m_uid;
72 gid_t m_gid;
73 mode_t m_mode;
Glenn L McGrathb37367a2002-08-22 13:12:40 +000074
Glenn L McGrath2faee7b2003-05-26 14:09:12 +000075 struct BB_suid_config *m_next;
Bernhard Reutner-Fischer6973abc2005-10-28 09:45:07 +000076} *suid_config;
Robert Grieblc9aca452002-06-04 20:06:25 +000077
Manuel Novoa III 7b565a02004-02-17 10:16:21 +000078static int suid_cfg_readable;
Robert Grieblc9aca452002-06-04 20:06:25 +000079
Glenn L McGrathb37367a2002-08-22 13:12:40 +000080/* check if u is member of group g */
Rob Landley8a7a6782005-09-05 04:13:33 +000081static int ingroup (uid_t u, gid_t g)
Robert Grieblc9aca452002-06-04 20:06:25 +000082{
Glenn L McGrath2faee7b2003-05-26 14:09:12 +000083 struct group *grp = getgrgid (g);
Glenn L McGrathb37367a2002-08-22 13:12:40 +000084
Glenn L McGrath2faee7b2003-05-26 14:09:12 +000085 if (grp) {
86 char **mem;
Glenn L McGrathb37367a2002-08-22 13:12:40 +000087
Glenn L McGrath2faee7b2003-05-26 14:09:12 +000088 for (mem = grp->gr_mem; *mem; mem++) {
89 struct passwd *pwd = getpwnam (*mem);
Glenn L McGrathb37367a2002-08-22 13:12:40 +000090
Glenn L McGrath2faee7b2003-05-26 14:09:12 +000091 if (pwd && (pwd->pw_uid == u))
92 return 1;
Robert Grieblc9aca452002-06-04 20:06:25 +000093 }
Glenn L McGrath2faee7b2003-05-26 14:09:12 +000094 }
95 return 0;
Robert Grieblc9aca452002-06-04 20:06:25 +000096}
97
Manuel Novoa III 31b98dd2004-02-01 10:03:05 +000098/* This should probably be a libbb routine. In that case,
99 * I'd probably rename it to something like bb_trimmed_slice.
100 */
101static char *get_trimmed_slice(char *s, char *e)
102{
103 /* First, consider the value at e to be nul and back up until we
104 * reach a non-space char. Set the char after that (possibly at
105 * the original e) to nul. */
106 while (e-- > s) {
107 if (!isspace(*e)) {
108 break;
109 }
110 }
111 e[1] = 0;
112
113 /* Next, advance past all leading space and return a ptr to the
114 * first non-space char; possibly the terminating nul. */
115 return (char *) bb_skip_whitespace(s);
116}
117
Glenn L McGrath2faee7b2003-05-26 14:09:12 +0000118
119#define parse_error(x) { err=x; goto pe_label; }
120
Manuel Novoa III 31b98dd2004-02-01 10:03:05 +0000121/* Don't depend on the tools to combine strings. */
122static const char config_file[] = CONFIG_FILE;
Glenn L McGrath2faee7b2003-05-26 14:09:12 +0000123
Manuel Novoa III 31b98dd2004-02-01 10:03:05 +0000124/* There are 4 chars + 1 nul for each of user/group/other. */
125static const char mode_chars[] = "Ssx-\0Ssx-\0Ttx-";
126
127/* We don't supply a value for the nul, so an index adjustment is
128 * necessary below. Also, we use unsigned short here to save some
129 * space even though these are really mode_t values. */
130static const unsigned short mode_mask[] = {
131 /* SST sst xxx --- */
132 S_ISUID, S_ISUID|S_IXUSR, S_IXUSR, 0, /* user */
133 S_ISGID, S_ISGID|S_IXGRP, S_IXGRP, 0, /* group */
134 0, S_IXOTH, S_IXOTH, 0 /* other */
135};
136
137static void parse_config_file(void)
Glenn L McGrath2faee7b2003-05-26 14:09:12 +0000138{
Manuel Novoa III 31b98dd2004-02-01 10:03:05 +0000139 struct BB_suid_config *sct_head;
140 struct BB_suid_config *sct;
141 struct BB_applet *applet;
142 FILE *f;
143 char *err;
144 char *s;
145 char *e;
146 int i, lc, section;
147 char buffer[256];
148 struct stat st;
Glenn L McGrath2faee7b2003-05-26 14:09:12 +0000149
Manuel Novoa III 31b98dd2004-02-01 10:03:05 +0000150 assert(!suid_config); /* Should be set to NULL by bss init. */
Glenn L McGrath2faee7b2003-05-26 14:09:12 +0000151
Manuel Novoa III 31b98dd2004-02-01 10:03:05 +0000152 if ((stat(config_file, &st) != 0) /* No config file? */
153 || !S_ISREG(st.st_mode) /* Not a regular file? */
154 || (st.st_uid != 0) /* Not owned by root? */
155 || (st.st_mode & (S_IWGRP | S_IWOTH)) /* Writable by non-root? */
156 || !(f = fopen(config_file, "r")) /* Can not open? */
157 ) {
158 return;
Robert Grieblc9aca452002-06-04 20:06:25 +0000159 }
Glenn L McGrathb37367a2002-08-22 13:12:40 +0000160
Manuel Novoa III 7b565a02004-02-17 10:16:21 +0000161 suid_cfg_readable = 1;
Manuel Novoa III 31b98dd2004-02-01 10:03:05 +0000162 sct_head = NULL;
163 section = lc = 0;
Robert Grieblc9aca452002-06-04 20:06:25 +0000164
Manuel Novoa III 31b98dd2004-02-01 10:03:05 +0000165 do {
166 s = buffer;
167
168 if (!fgets(s, sizeof(buffer), f)) { /* Are we done? */
169 if (ferror(f)) { /* Make sure it wasn't a read error. */
170 parse_error("reading");
171 }
172 fclose(f);
173 suid_config = sct_head; /* Success, so set the pointer. */
174 return;
175 }
176
177 lc++; /* Got a (partial) line. */
178
179 /* If a line is too long for our buffer, we consider it an error.
180 * The following test does mistreat one corner case though.
181 * If the final line of the file does not end with a newline and
182 * yet exactly fills the buffer, it will be treated as too long
183 * even though there isn't really a problem. But it isn't really
184 * worth adding code to deal with such an unlikely situation, and
185 * we do err on the side of caution. Besides, the line would be
186 * too long if it did end with a newline. */
187 if (!strchr(s, '\n') && !feof(f)) {
188 parse_error("line too long");
189 }
190
191 /* Trim leading and trailing whitespace, ignoring comments, and
192 * check if the resulting string is empty. */
193 if (!*(s = get_trimmed_slice(s, strchrnul(s, '#')))) {
194 continue;
195 }
196
197 /* Check for a section header. */
198
199 if (*s == '[') {
200 /* Unlike the old code, we ignore leading and trailing
201 * whitespace for the section name. We also require that
202 * there are no stray characters after the closing bracket. */
203 if (!(e = strchr(s, ']')) /* Missing right bracket? */
204 || e[1] /* Trailing characters? */
205 || !*(s = get_trimmed_slice(s+1, e)) /* Missing name? */
206 ) {
207 parse_error("section header");
208 }
209 /* Right now we only have one section so just check it.
210 * If more sections are added in the future, please don't
211 * resort to cascading ifs with multiple strcasecmp calls.
212 * That kind of bloated code is all too common. A loop
213 * and a string table would be a better choice unless the
214 * number of sections is very small. */
215 if (strcasecmp(s, "SUID") == 0) {
216 section = 1;
217 continue;
218 }
219 section = -1; /* Unknown section so set to skip. */
220 continue;
221 }
222
223 /* Process sections. */
224
225 if (section == 1) { /* SUID */
226 /* Since we trimmed leading and trailing space above, we're
227 * now looking for strings of the form
228 * <key>[::space::]*=[::space::]*<value>
229 * where both key and value could contain inner whitespace. */
230
231 /* First get the key (an applet name in our case). */
232 if (!!(e = strchr(s, '='))) {
233 s = get_trimmed_slice(s, e);
234 }
235 if (!e || !*s) { /* Missing '=' or empty key. */
236 parse_error("keyword");
237 }
238
239 /* Ok, we have an applet name. Process the rhs if this
240 * applet is currently built in and ignore it otherwise.
241 * Note: This can hide config file bugs which only pop
242 * up when the busybox configuration is changed. */
243 if ((applet = find_applet_by_name(s))) {
244 /* Note: We currently don't check for duplicates!
245 * The last config line for each applet will be the
246 * one used since we insert at the head of the list.
247 * I suppose this could be considered a feature. */
248 sct = xmalloc(sizeof(struct BB_suid_config));
249 sct->m_applet = applet;
250 sct->m_mode = 0;
251 sct->m_next = sct_head;
252 sct_head = sct;
253
254 /* Get the specified mode. */
255
256 e = (char *) bb_skip_whitespace(e+1);
257
258 for (i=0 ; i < 3 ; i++) {
259 const char *q;
260 if (!*(q = strchrnul(mode_chars + 5*i, *e++))) {
261 parse_error("mode");
262 }
263 /* Adjust by -i to account for nul. */
264 sct->m_mode |= mode_mask[(q - mode_chars) - i];
265 }
266
267 /* Now get the the user/group info. */
Eric Andersenc7bda1c2004-03-15 08:29:22 +0000268
Manuel Novoa III 31b98dd2004-02-01 10:03:05 +0000269 s = (char *) bb_skip_whitespace(e);
270
271 /* Note: We require whitespace between the mode and the
272 * user/group info. */
273 if ((s == e) || !(e = strchr(s, '.'))) {
274 parse_error("<uid>.<gid>");
275 }
276 *e++ = 0;
277
278 /* We can't use get_ug_id here since it would exit()
279 * if a uid or gid was not found. Oh well... */
280 {
281 char *e2;
282
283 sct->m_uid = strtoul(s, &e2, 10);
284 if (*e2 || (s == e2)) {
285 struct passwd *pwd;
286 if (!(pwd = getpwnam(s))) {
287 parse_error("user");
288 }
289 sct->m_uid = pwd->pw_uid;
290 }
291
292 sct->m_gid = strtoul(e, &e2, 10);
293 if (*e2 || (e == e2)) {
294 struct group *grp;
295 if (!(grp = getgrnam(e))) {
296 parse_error("group");
297 }
298 sct->m_gid = grp->gr_gid;
299 }
300 }
301 }
302 continue;
303 }
304
305 /* Unknown sections are ignored. */
306
307 /* Encountering configuration lines prior to seeing a
308 * section header is treated as an error. This is how
Eric Andersenaff114c2004-04-14 17:51:38 +0000309 * the old code worked, but it may not be desirable.
Manuel Novoa III 31b98dd2004-02-01 10:03:05 +0000310 * We may want to simply ignore such lines in case they
311 * are used in some future version of busybox. */
312 if (!section) {
313 parse_error("keyword outside section");
314 }
315
316 } while (1);
317
318 pe_label:
319 fprintf(stderr, "Parse error in %s, line %d: %s\n",
320 config_file, lc, err);
321
322 fclose(f);
323 /* Release any allocated memory before returning. */
324 while (sct_head) {
325 sct = sct_head->m_next;
326 free(sct_head);
327 sct_head = sct;
328 }
329 return;
Robert Grieblc9aca452002-06-04 20:06:25 +0000330}
331
Rob Landley8a7a6782005-09-05 04:13:33 +0000332#else
Rob Landleycc59aae2005-12-07 23:17:28 +0000333#define parse_config_file()
Rob Landley8a7a6782005-09-05 04:13:33 +0000334#endif /* CONFIG_FEATURE_SUID_CONFIG */
335
336#ifdef CONFIG_FEATURE_SUID
337static void check_suid (struct BB_applet *applet)
338{
339 uid_t ruid = getuid (); /* real [ug]id */
340 uid_t rgid = getgid ();
341
342#ifdef CONFIG_FEATURE_SUID_CONFIG
343 if (suid_cfg_readable) {
344 struct BB_suid_config *sct;
345
346 for (sct = suid_config; sct; sct = sct->m_next) {
347 if (sct->m_applet == applet)
348 break;
349 }
350 if (sct) {
351 mode_t m = sct->m_mode;
352
353 if (sct->m_uid == ruid) /* same uid */
354 m >>= 6;
355 else if ((sct->m_gid == rgid) || ingroup (ruid, sct->m_gid)) /* same group / in group */
356 m >>= 3;
357
358 if (!(m & S_IXOTH)) /* is x bit not set ? */
359 bb_error_msg_and_die ("You have no permission to run this applet!");
360
361 if ((sct->m_mode & (S_ISGID | S_IXGRP)) == (S_ISGID | S_IXGRP)) { /* *both* have to be set for sgid */
362 if (setegid (sct->m_gid))
363 bb_error_msg_and_die
364 ("BusyBox binary has insufficient rights to set proper GID for applet!");
365 } else
366 setgid (rgid); /* no sgid -> drop */
367
368 if (sct->m_mode & S_ISUID) {
369 if (seteuid (sct->m_uid))
370 bb_error_msg_and_die
371 ("BusyBox binary has insufficient rights to set proper UID for applet!");
372 } else
373 setuid (ruid); /* no suid -> drop */
374 } else {
375 /* default: drop all priviledges */
376 setgid (rgid);
377 setuid (ruid);
378 }
379 return;
380 } else {
381#ifndef CONFIG_FEATURE_SUID_CONFIG_QUIET
382 static int onetime = 0;
383
384 if (!onetime) {
385 onetime = 1;
386 fprintf (stderr, "Using fallback suid method\n");
387 }
388#endif
389 }
Robert Grieblc9aca452002-06-04 20:06:25 +0000390#endif
391
Rob Landley8a7a6782005-09-05 04:13:33 +0000392 if (applet->need_suid == _BB_SUID_ALWAYS) {
393 if (geteuid () != 0)
394 bb_error_msg_and_die ("This applet requires root priviledges!");
395 } else if (applet->need_suid == _BB_SUID_NEVER) {
396 setgid (rgid); /* drop all priviledges */
397 setuid (ruid);
398 }
399}
400#else
401#define check_suid(x)
402#endif /* CONFIG_FEATURE_SUID */
403
404
405
406
407
408extern void bb_show_usage (void)
409{
410 const char *format_string;
411 const char *usage_string = usage_messages;
412 int i;
413
414 for (i = applet_using - applets; i > 0;) {
415 if (!*usage_string++) {
416 --i;
417 }
418 }
419
420 format_string = "%s\n\nUsage: %s %s\n\n";
421 if (*usage_string == '\b')
422 format_string = "%s\n\nNo help available.\n\n";
423 fprintf (stderr, format_string, bb_msg_full_version, applet_using->name,
424 usage_string);
425
Rob Landley046d6e72005-10-12 21:50:02 +0000426 exit (bb_default_error_retval);
Rob Landley8a7a6782005-09-05 04:13:33 +0000427}
428
429static int applet_name_compare (const void *x, const void *y)
430{
431 const char *name = x;
432 const struct BB_applet *applet = y;
433
434 return strcmp (name, applet->name);
435}
436
437extern const size_t NUM_APPLETS;
438
439struct BB_applet *find_applet_by_name (const char *name)
440{
441 return bsearch (name, applets, NUM_APPLETS, sizeof (struct BB_applet),
442 applet_name_compare);
443}
444
445void run_applet_by_name (const char *name, int argc, char **argv)
446{
447 if(ENABLE_FEATURE_SUID_CONFIG) parse_config_file ();
448
449 if(!strncmp(name, "busybox", 7)) busybox_main(argc, argv);
450 /* Do a binary search to find the applet entry given the name. */
451 applet_using = find_applet_by_name(name);
452 if(applet_using) {
453 bb_applet_name = applet_using->name;
454 if(argc==2 && !strcmp(argv[1], "--help")) bb_show_usage ();
455 if(ENABLE_FEATURE_SUID) check_suid (applet_using);
456 exit ((*(applet_using->main)) (argc, argv));
457 }
458}
459
Robert Grieblc9aca452002-06-04 20:06:25 +0000460
Eric Andersenaad1a882001-03-16 22:47:14 +0000461/* END CODE */
462/*
Manuel Novoa III 31b98dd2004-02-01 10:03:05 +0000463 Local Variables:
464 c-file-style: "linux"
465 c-basic-offset: 4
466 tab-width: 4
Eric Andersenaad1a882001-03-16 22:47:14 +0000467End:
468*/