X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;f=include%2Flibbb.h;h=759eb8d15602cdf9a76a146b6a8c931c3b1e75f7;hb=fe42d17318fffed53f02617fd668d896000bdd28;hp=d7332714fc33c3744d4557f488f8c66225e64b98;hpb=06af2165288cd6516b89001ec9e24992619230e0;p=oweals%2Fbusybox.git diff --git a/include/libbb.h b/include/libbb.h index d7332714f..759eb8d15 100644 --- a/include/libbb.h +++ b/include/libbb.h @@ -41,6 +41,7 @@ #if ENABLE_SELINUX #include +#include #endif #if ENABLE_LOCALE_SUPPORT @@ -258,8 +259,8 @@ extern int ndelay_off(int fd); extern DIR *xopendir(const char *path); extern DIR *warn_opendir(const char *path); -char *xgetcwd(char *cwd); -char *xreadlink(const char *path); +char *xrealloc_getcwd_or_warn(char *cwd); +char *xmalloc_readlink_or_warn(const char *path); char *xmalloc_realpath(const char *path); extern void xstat(const char *filename, struct stat *buf); extern pid_t spawn(char **argv); @@ -271,6 +272,7 @@ extern void xdaemon(int nochdir, int noclose); /* More clever/thorough xdaemon */ extern void bb_sanitize_stdio_maybe_daemonize(int daemonize); extern void bb_sanitize_stdio(void); +/* NB: be careful: dont open syslog/network sockets before bb_daemonize */ extern void bb_daemonize(void); extern void xchdir(const char *path); extern void xsetenv(const char *key, const char *value); @@ -289,7 +291,7 @@ int setsockopt_broadcast(int fd); /* NB: returns port in host byte order */ unsigned bb_lookup_port(const char *port, const char *protocol, unsigned default_port); typedef struct len_and_sockaddr { - int len; + socklen_t len; union { struct sockaddr sa; struct sockaddr_in sin; @@ -316,21 +318,27 @@ int xconnect_stream(const len_and_sockaddr *lsa); /* Return malloc'ed len_and_sockaddr with socket address of host:port * Currently will return IPv4 or IPv6 sockaddrs only * (depending on host), but in theory nothing prevents e.g. - * UNIX socket address being returned, IPX sockaddr etc... */ + * UNIX socket address being returned, IPX sockaddr etc... + * On error does bb_error_msg and returns NULL */ len_and_sockaddr* host2sockaddr(const char *host, int port); +/* Version which dies on error */ +len_and_sockaddr* xhost2sockaddr(const char *host, int port); +len_and_sockaddr* xdotted2sockaddr(const char *host, int port); #if ENABLE_FEATURE_IPV6 /* Same, useful if you want to force family (e.g. IPv6) */ len_and_sockaddr* host_and_af2sockaddr(const char *host, int port, sa_family_t af); +len_and_sockaddr* xhost_and_af2sockaddr(const char *host, int port, sa_family_t af); #else /* [we evaluate af: think about "host_and_af2sockaddr(..., af++)"] */ #define host_and_af2sockaddr(host, port, af) ((void)(af), host2sockaddr((host), (port))) +#define xhost_and_af2sockaddr(host, port, af) ((void)(af), xhost2sockaddr((host), (port))) #endif /* Assign sin[6]_port member if the socket is of corresponding type, * otherwise no-op. Useful for ftp. * NB: does NOT do htons() internally, just direct assignment. */ void set_nport(len_and_sockaddr *lsa, unsigned port); /* Retrieve sin[6]_port or return -1 for non-INET[6] lsa's */ -int get_nport(len_and_sockaddr *lsa); +int get_nport(const len_and_sockaddr *lsa); /* Reverse DNS. Returns NULL on failure. */ char* xmalloc_sockaddr2host(const struct sockaddr *sa, socklen_t salen); /* This one doesn't append :PORTNUM */ @@ -341,8 +349,10 @@ char* xmalloc_sockaddr2hostonly_noport(const struct sockaddr *sa, socklen_t sale char* xmalloc_sockaddr2dotted(const struct sockaddr *sa, socklen_t salen); char* xmalloc_sockaddr2dotted_noport(const struct sockaddr *sa, socklen_t salen); // "old" (ipv4 only) API -// users: traceroute.c hostname.c ifconfig.c ping.c +// users: traceroute.c hostname.c struct hostent *xgethostbyname(const char *name); +// Also inetd.c and inetd.c are using gethostbyname(), +// + inet_common.c has additional IPv4-only stuff extern char *xstrdup(const char *s); @@ -434,7 +444,10 @@ struct bb_uidgid_t { uid_t uid; gid_t gid; }; +/* always sets uid and gid */ int get_uidgid(struct bb_uidgid_t*, const char*, int numeric_ok); +/* chown-like handling of "user[:[group]" */ +void parse_chown_usergroup_or_die(struct bb_uidgid_t *u, char *user_group); /* what is this? */ /*extern char *bb_getug(char *buffer, char *idname, long id, int bufsize, char prefix);*/ char *bb_getpwuid(char *name, long uid, int bufsize); @@ -463,8 +476,9 @@ typedef struct llist_s { extern void llist_add_to(llist_t **old_head, void *data); extern void llist_add_to_end(llist_t **list_head, void *data); extern void *llist_pop(llist_t **elm); +extern void llist_unlink(llist_t **head, llist_t *elm); extern void llist_free(llist_t *elm, void (*freeit)(void *data)); -extern llist_t* rev_llist(llist_t *list); +extern llist_t* llist_rev(llist_t *list); enum { LOGMODE_NONE = 0, @@ -501,9 +515,14 @@ int bb_test(int argc, char** argv); #if ENABLE_ROUTE void bb_displayroutes(int noresolve, int netstatfmt); #endif +int chown_main(int argc, char **argv); #if ENABLE_GUNZIP int gunzip_main(int argc, char **argv); #endif +int bbunpack(char **argv, + char* (*make_new_name)(char *filename), + USE_DESKTOP(long long) int (*unpacker)(void) +); /* Networking */ @@ -554,14 +573,15 @@ int execable_file(const char *name); char *find_execable(const char *filename); int exists_execable(const char *filename); -#ifdef ENABLE_FEATURE_EXEC_PREFER_APPLETS -#define BB_EXECVP(prog,cmd) \ - execvp((find_applet_by_name(prog)) ? CONFIG_BUSYBOX_EXEC_PATH : prog, cmd) +#if ENABLE_FEATURE_EXEC_PREFER_APPLETS +int bb_execvp(const char *file, char *const argv[]); +#define BB_EXECVP(prog,cmd) bb_execvp(prog,cmd) #define BB_EXECLP(prog,cmd,...) \ - execlp((find_applet_by_name(prog)) ? CONFIG_BUSYBOX_EXEC_PATH : prog, cmd, __VA_ARGS__) + execlp((find_applet_by_name(prog)) ? CONFIG_BUSYBOX_EXEC_PATH : prog, \ + cmd, __VA_ARGS__) #else -#define BB_EXECVP(prog,cmd) execvp(prog,cmd) -#define BB_EXECLP(prog,cmd,...) execvp(prog,cmd, __VA_ARGS__) +#define BB_EXECVP(prog,cmd) execvp(prog,cmd) +#define BB_EXECLP(prog,cmd,...) execlp(prog,cmd, __VA_ARGS__) #endif USE_DESKTOP(long long) int uncompress(int fd_in, int fd_out); @@ -583,7 +603,11 @@ extern void run_shell(const char *shell, int loginshell, const char *command, co #if ENABLE_SELINUX extern void renew_current_security_context(void); extern void set_current_security_context(security_context_t sid); +extern context_t set_security_context_component(security_context_t cur_context, + char *user, char *role, char *type, char *range); +extern void setfscreatecon_or_die(security_context_t scontext); #endif +extern void selinux_or_die(void); extern int restricted_shell(const char *shell); extern void setup_environment(const char *shell, int loginshell, int changeenv, const struct passwd *pw); extern int correct_password(const struct passwd *pw); @@ -659,7 +683,7 @@ typedef struct { DIR *dir; /* Fields are set to 0/NULL if failed to determine (or not requested) */ char *cmd; - unsigned long rss; + unsigned long vsz; unsigned long stime, utime; unsigned pid; unsigned ppid; @@ -682,13 +706,13 @@ enum { PSSCAN_COMM = 1 << 5, PSSCAN_CMD = 1 << 6, PSSCAN_STATE = 1 << 7, - PSSCAN_RSS = 1 << 8, + PSSCAN_VSZ = 1 << 8, PSSCAN_STIME = 1 << 9, PSSCAN_UTIME = 1 << 10, /* These are all retrieved from proc/NN/stat in one go: */ PSSCAN_STAT = PSSCAN_PPID | PSSCAN_PGID | PSSCAN_SID | PSSCAN_COMM | PSSCAN_STATE - | PSSCAN_RSS | PSSCAN_STIME | PSSCAN_UTIME, + | PSSCAN_VSZ | PSSCAN_STIME | PSSCAN_UTIME, }; procps_status_t* alloc_procps_scan(int flags); void free_procps_scan(procps_status_t* sp); @@ -726,7 +750,7 @@ void *md5_end(void *resbuf, md5_ctx_t *ctx); uint32_t *crc32_filltable(int endian); -enum { /* DO NOT CHANGE THESE VALUES! cp.c depends on them. */ +enum { /* DO NOT CHANGE THESE VALUES! cp.c, mv.c, install.c depend on them. */ FILEUTILS_PRESERVE_STATUS = 1, FILEUTILS_DEREFERENCE = 2, FILEUTILS_RECUR = 4, @@ -734,9 +758,13 @@ enum { /* DO NOT CHANGE THESE VALUES! cp.c depends on them. */ FILEUTILS_INTERACTIVE = 0x10, FILEUTILS_MAKE_HARDLINK = 0x20, FILEUTILS_MAKE_SOFTLINK = 0x40, +#if ENABLE_SELINUX + FILEUTILS_PRESERVE_SECURITY_CONTEXT = 0x80, + FILEUTILS_SET_SECURITY_CONTEXT = 0x100 +#endif }; -#define FILEUTILS_CP_OPTSTR "pdRfils" +#define FILEUTILS_CP_OPTSTR "pdRfils" USE_SELINUX("c") extern const char *applet_name; extern const char BB_BANNER[]; @@ -835,7 +863,7 @@ extern const char bb_default_login_shell[]; /* The following devices are the same on devfs and non-devfs systems. */ #define CURRENT_TTY "/dev/tty" -#define CONSOLE_DEV "/dev/console" +#define DEV_CONSOLE "/dev/console" #ifndef RB_POWER_OFF