--- /dev/null
+Various bug fixes that apply to busybox 1.2.0, cherry-picked from the
+ongoing development branch. This will form the basis for busybox 1.2.1.
+
+I'll append fixes to this as they come up. (Check the file date, or the bug
+list below.) This file is basically a concatenation of the following:
+
+http://busybox.net/downloads/patches/svn-15575.patch
+http://busybox.net/downloads/patches/svn-15653.patch
+http://busybox.net/downloads/patches/svn-15656.patch
+http://busybox.net/downloads/patches/svn-15658.patch
+http://busybox.net/downloads/patches/svn-15659.patch
+http://busybox.net/downloads/patches/svn-15660.patch
+http://busybox.net/downloads/patches/svn-15670.patch
+http://busybox.net/downloads/patches/svn-15698.patch
+http://busybox.net/downloads/patches/svn-15700.patch
+http://busybox.net/downloads/patches/svn-15702.patch
+http://busybox.net/downloads/patches/svn-15705.patch
+http://busybox.net/downloads/patches/svn-15727.patch
+
+ ------------------------------------------------------------------------
+r15575 | landley | 2006-07-01 13:19:02 -0400 (Sat, 01 Jul 2006) | 2 lines
+Changed paths:
+ M /trunk/busybox/shell/lash.c
+
+Patch from Shaun Jackman moving the var=value logic to where it can do some
+good.
+
+ ------------------------------------------------------------------------
+Index: shell/lash.c
+===================================================================
+--- shell/lash.c (revision 15574)
++++ shell/lash.c (revision 15575)
+@@ -1171,12 +1171,6 @@
+ {
+ struct built_in_command *x;
+
+- /* Check if the command sets an environment variable. */
+- if( strchr(child->argv[0], '=') != NULL ) {
+- child->argv[1] = child->argv[0];
+- _exit(builtin_export(child));
+- }
+-
+ /* Check if the command matches any of the non-forking builtins.
+ * Depending on context, this might be redundant. But it's
+ * easier to waste a few CPU cycles than it is to figure out
+@@ -1300,6 +1294,12 @@
+ * is doomed to failure, and doesn't work on bash, either.
+ */
+ if (newjob->num_progs == 1) {
++ /* Check if the command sets an environment variable. */
++ if (strchr(child->argv[0], '=') != NULL) {
++ child->argv[1] = child->argv[0];
++ return builtin_export(child);
++ }
++
+ for (x = bltins; x->cmd; x++) {
+ if (strcmp(child->argv[0], x->cmd) == 0 ) {
+ int rcode;
+ ------------------------------------------------------------------------
+r15653 | landley | 2006-07-05 21:09:21 -0400 (Wed, 05 Jul 2006) | 6 lines
+Changed paths:
+ M /trunk/busybox/shell/ash.c
+
+Bug fix from Vladimir Oleynic via Paul Fox for:
+echo "+bond0" > /sys/class/net/bonding_masters
+while true; do
+ echo hello
+done
+
+ ------------------------------------------------------------------------
+Index: shell/ash.c
+===================================================================
+--- shell/ash.c (revision 15652)
++++ shell/ash.c (revision 15653)
+@@ -3469,6 +3469,7 @@
+ flushall();
+ cmddone:
+ exitstatus |= ferror(stdout);
++ clearerr(stdout);
+ commandname = savecmdname;
+ exsig = 0;
+ handler = savehandler;
+ ------------------------------------------------------------------------
+r15656 | landley | 2006-07-06 12:41:56 -0400 (Thu, 06 Jul 2006) | 5 lines
+Changed paths:
+ M /trunk/busybox/util-linux/dmesg.c
+
+Fix three embarassing thinkos in the new dmesg.c:
+1) the c argument shouldn't have had a : after that, dunno how that got there.
+2) the xgetlarg for level was using size
+3) because xgetlarg's error message _SUCKS_ (it does a show_usage() rather than giving any specific info about the range that was violated) I dropped the range down to 2 bytes. (Which works fine, I dunno why we were nit-picking about that...)
+
+ ------------------------------------------------------------------------
+Index: util-linux/dmesg.c
+===================================================================
+--- util-linux/dmesg.c (revision 15655)
++++ util-linux/dmesg.c (revision 15656)
+@@ -15,16 +15,16 @@
+ int dmesg_main(int argc, char *argv[])
+ {
+ char *size, *level;
+- int flags = bb_getopt_ulflags(argc, argv, "c:s:n:", &size, &level);
++ int flags = bb_getopt_ulflags(argc, argv, "cs:n:", &size, &level);
+
+ if (flags & 4) {
+- if(klogctl(8, NULL, bb_xgetlarg(size, 10, 0, 10)))
++ if(klogctl(8, NULL, bb_xgetlarg(level, 10, 0, 10)))
+ bb_perror_msg_and_die("klogctl");
+ } else {
+ int len;
+ char *buf;
+
+- len = (flags & 2) ? bb_xgetlarg(size, 10, 4096, INT_MAX) : 16384;
++ len = (flags & 2) ? bb_xgetlarg(size, 10, 2, INT_MAX) : 16384;
+ buf = xmalloc(len);
+ if (0 > (len = klogctl(3 + (flags & 1), buf, len)))
+ bb_perror_msg_and_die("klogctl");
+ ------------------------------------------------------------------------
+r15658 | pgf | 2006-07-06 16:00:43 -0400 (Thu, 06 Jul 2006) | 4 lines
+Changed paths:
+ M /trunk/busybox/Makefile
+
+fix dependencies so that compressed usage gets rebuilt if
+ a) include/usage.h is changed, and
+ b) after "make clean".
+
+ ------------------------------------------------------------------------
+Index: Makefile
+===================================================================
+--- Makefile (revision 15657)
++++ Makefile (revision 15658)
+@@ -436,13 +436,16 @@
+
+ ifeq ($(strip $(CONFIG_FEATURE_COMPRESS_USAGE)),y)
+ USAGE_BIN:=scripts/usage
+-$(USAGE_BIN): $(top_srcdir)/scripts/usage.c .config
++$(USAGE_BIN): $(top_srcdir)/scripts/usage.c .config \
++ $(top_srcdir)/include/usage.h
+ $(do_link.h)
+
+ DEP_INCLUDES += include/usage_compressed.h
+
+-include/usage_compressed.h: .config $(USAGE_BIN) $(top_srcdir)/scripts/usage_compressed
+- $(Q)SED="$(SED)" $(SHELL) $(top_srcdir)/scripts/usage_compressed "$(top_builddir)/scripts" > $@
++include/usage_compressed.h: .config $(USAGE_BIN) \
++ $(top_srcdir)/scripts/usage_compressed
++ $(Q)SED="$(SED)" $(SHELL) $(top_srcdir)/scripts/usage_compressed \
++ "$(top_builddir)/scripts" > $@
+ endif # CONFIG_FEATURE_COMPRESS_USAGE
+
+ # workaround alleged bug in make-3.80, make-3.81
+@@ -470,7 +473,8 @@
+ docs/BusyBox.txt docs/BusyBox.1 docs/BusyBox.html \
+ docs/busybox.net/BusyBox.html busybox.links \
+ libbusybox.so* \
+- .config.old busybox busybox_unstripped
++ .config.old busybox busybox_unstripped \
++ include/usage_compressed.h scripts/usage
+ - rm -r -f _install testsuite/links
+ - find . -name .\*.flags -o -name \*.o -o -name \*.om -o -name \*.syn \
+ -o -name \*.os -o -name \*.osm -o -name \*.a | xargs rm -f
+ ------------------------------------------------------------------------
+r15659 | landley | 2006-07-06 16:02:47 -0400 (Thu, 06 Jul 2006) | 3 lines
+Changed paths:
+ M /trunk/busybox/libbb/Makefile
+
+Attempt to address Shaun Jackman's problem adding "busybox: busybox.bflt" to
+.config.mak.
+
+ ------------------------------------------------------------------------
+Index: libbb/Makefile
+===================================================================
+--- libbb/Makefile (revision 15658)
++++ libbb/Makefile (revision 15659)
+@@ -12,6 +12,12 @@
+ endif
+ srcdir=$(top_srcdir)/libbb
+ LIBBB_DIR:=./
++
++# Ensure "all" is still the default target when make is run by itself in
++# libbb, even if the files we include define rules for targets.
++
++all:
++
+ include $(top_srcdir)/Rules.mak
+ include $(top_builddir)/.config
+ include Makefile.in
+ ------------------------------------------------------------------------
+r15660 | landley | 2006-07-06 16:30:19 -0400 (Thu, 06 Jul 2006) | 3 lines
+Changed paths:
+ M /trunk/busybox/archival/libunarchive/get_header_tar.c
+
+Fix tar so it can extract git-generated tarballs, based on a suggestion
+from Erik Frederiksen.
+
+ ------------------------------------------------------------------------
+Index: archival/libunarchive/get_header_tar.c
+===================================================================
+--- archival/libunarchive/get_header_tar.c (revision 15659)
++++ archival/libunarchive/get_header_tar.c (revision 15660)
+@@ -137,10 +137,6 @@
+ case '1':
+ file_header->mode |= S_IFREG;
+ break;
+- case 'x':
+- case 'g':
+- bb_error_msg_and_die("pax is not tar");
+- break;
+ case '7':
+ /* Reserved for high performance files, treat as normal file */
+ case 0:
+@@ -188,8 +184,11 @@
+ case 'N': /* Old GNU for names > 100 characters */
+ case 'S': /* Sparse file */
+ case 'V': /* Volume header */
+- bb_error_msg("Ignoring GNU extension type %c", tar.formated.typeflag);
+ #endif
++ case 'g': /* pax global header */
++ case 'x': /* pax extended header */
++ bb_error_msg("Ignoring extension type %c", tar.formated.typeflag);
++ break;
+ default:
+ bb_error_msg("Unknown typeflag: 0x%x", tar.formated.typeflag);
+ }
+ ------------------------------------------------------------------------
+r15670 | landley | 2006-07-09 13:03:07 -0400 (Sun, 09 Jul 2006) | 3 lines
+Changed paths:
+ M /trunk/busybox/shell/lash.c
+
+Bugfix from Shaun Jackman (check that argv[optind] isn't null before
+dereferencing it) plus a bunch of tweaks from me.
+
+ ------------------------------------------------------------------------
+Index: shell/lash.c
+===================================================================
+--- shell/lash.c (revision 15669)
++++ shell/lash.c (revision 15670)
+@@ -1498,6 +1498,8 @@
+ remove_job(&job_list, job_list.fg);
+ }
+ }
++#else
++void free_memory(void);
+ #endif
+
+ #ifdef CONFIG_LASH_JOB_CONTROL
+@@ -1528,7 +1530,7 @@
+ /* Put ourselves in our own process group. */
+ setsid();
+ shell_pgrp = getpid ();
+- setpgid (shell_pgrp, shell_pgrp);
++ setpgid(shell_pgrp, shell_pgrp);
+
+ /* Grab control of the terminal. */
+ tcsetpgrp(shell_terminal, shell_pgrp);
+@@ -1577,7 +1579,7 @@
+ argv = argv+optind;
+ break;
+ case 'i':
+- interactive = TRUE;
++ interactive++;
+ break;
+ default:
+ bb_show_usage();
+@@ -1591,18 +1593,18 @@
+ * standard output is a terminal
+ * Refer to Posix.2, the description of the `sh' utility. */
+ if (argv[optind]==NULL && input==stdin &&
+- isatty(STDIN_FILENO) && isatty(STDOUT_FILENO)) {
+- interactive=TRUE;
++ isatty(STDIN_FILENO) && isatty(STDOUT_FILENO))
++ {
++ interactive++;
+ }
+ setup_job_control();
+- if (interactive==TRUE) {
+- //printf( "optind=%d argv[optind]='%s'\n", optind, argv[optind]);
++ if (interactive) {
+ /* Looks like they want an interactive shell */
+-#ifndef CONFIG_FEATURE_SH_EXTRA_QUIET
+- printf( "\n\n%s Built-in shell (lash)\n", BB_BANNER);
+- printf( "Enter 'help' for a list of built-in commands.\n\n");
+-#endif
+- } else if (local_pending_command==NULL) {
++ if (!ENABLE_FEATURE_SH_EXTRA_QUIET) {
++ printf( "\n\n%s Built-in shell (lash)\n", BB_BANNER);
++ printf( "Enter 'help' for a list of built-in commands.\n\n");
++ }
++ } else if (!local_pending_command && argv[optind]) {
+ //printf( "optind=%d argv[optind]='%s'\n", optind, argv[optind]);
+ input = bb_xfopen(argv[optind], "r");
+ /* be lazy, never mark this closed */
+@@ -1614,15 +1616,10 @@
+ if (!cwd)
+ cwd = bb_msg_unknown;
+
+-#ifdef CONFIG_FEATURE_CLEAN_UP
+- atexit(free_memory);
+-#endif
++ if (ENABLE_FEATURE_CLEAN_UP) atexit(free_memory);
+
+-#ifdef CONFIG_FEATURE_COMMAND_EDITING
+- cmdedit_set_initial_prompt();
+-#else
+- PS1 = NULL;
+-#endif
++ if (ENABLE_FEATURE_COMMAND_EDITING) cmdedit_set_initial_prompt();
++ else PS1 = NULL;
+
+ return (busy_loop(input));
+ }
+ ------------------------------------------------------------------------
+r15698 | vapier | 2006-07-14 23:59:00 -0400 (Fri, 14 Jul 2006) | 2 lines
+Changed paths:
+ M /trunk/busybox/libbb/obscure.c
+
+Tito writes: If the gecos field of an user is empty, obscure reports a false "similar to gecos" error.
+
+ ------------------------------------------------------------------------
+Index: libbb/obscure.c
+===================================================================
+--- libbb/obscure.c (revision 15697)
++++ libbb/obscure.c (revision 15698)
+@@ -109,7 +109,7 @@
+ return "similar to username";
+ }
+ /* no gecos as-is, as sub-string, reversed, capitalized, doubled */
+- if (string_checker(new_p, pw->pw_gecos)) {
++ if (*pw->pw_gecos && string_checker(new_p, pw->pw_gecos)) {
+ return "similar to gecos";
+ }
+ /* hostname as-is, as sub-string, reversed, capitalized, doubled */
+ ------------------------------------------------------------------------
+r15700 | landley | 2006-07-15 19:00:46 -0400 (Sat, 15 Jul 2006) | 4 lines
+Changed paths:
+ M /trunk/busybox/include/libbb.h
+ M /trunk/busybox/libbb/xfuncs.c
+
+We need xsetuid() and xsetgid() because per-user process resource limits can
+prevent a process from switching to a user that has too many processes, and
+when that happens WE'RE STILL ROOT. See http://lwn.net/Articles/190331/
+
+ ------------------------------------------------------------------------
+Index: libbb/xfuncs.c
+===================================================================
+--- libbb/xfuncs.c (revision 15699)
++++ libbb/xfuncs.c (revision 15700)
+@@ -232,3 +232,15 @@
+ return 0;
+ }
+ #endif
++
++#ifdef L_setuid
++void xsetgid(gid_t gid)
++{
++ if (setgid(gid)) bb_error_msg_and_die("setgid");
++}
++
++void xsetuid(uid_t uid)
++{
++ if (setuid(uid)) bb_error_msg_and_die("setuid");
++}
++#endif
+Index: include/libbb.h
+===================================================================
+--- include/libbb.h (revision 15699)
++++ include/libbb.h (revision 15700)
+@@ -185,6 +185,8 @@
+ extern bb_xbind(int sockfd, struct sockaddr *my_addr, socklen_t addrlen);
+ extern void bb_xlisten(int s, int backlog);
+ extern void bb_xchdir(const char *path);
++extern void xsetgid(gid_t gid);
++extern void xsetuid(uid_t uid);
+
+ #define BB_GETOPT_ERROR 0x80000000UL
+ extern const char *bb_opt_complementally;
+ ------------------------------------------------------------------------
+r15702 | landley | 2006-07-16 04:06:34 -0400 (Sun, 16 Jul 2006) | 2 lines
+Changed paths:
+ M /trunk/busybox/loginutils/passwd.c
+ M /trunk/busybox/networking/arping.c
+ M /trunk/busybox/networking/ether-wake.c
+ M /trunk/busybox/networking/fakeidentd.c
+ M /trunk/busybox/networking/inetd.c
+ M /trunk/busybox/networking/traceroute.c
+
+Convert setuid/setgid users to xsetuid/xsetgid.
+
+ ------------------------------------------------------------------------
+Index: networking/fakeidentd.c
+===================================================================
+--- networking/fakeidentd.c (revision 15701)
++++ networking/fakeidentd.c (revision 15702)
+@@ -159,8 +159,8 @@
+
+ close(0);
+ inetbind();
+- if (setgid(nogrp)) bb_error_msg_and_die("Could not setgid()");
+- if (setuid(nobody)) bb_error_msg_and_die("Could not setuid()");
++ xsetgid(nogrp);
++ xsetuid(nobody);
+ close(1);
+ close(2);
+
+Index: networking/ether-wake.c
+===================================================================
+--- networking/ether-wake.c (revision 15701)
++++ networking/ether-wake.c (revision 15702)
+@@ -145,7 +145,7 @@
+ s = make_socket();
+
+ /* now that we have a raw socket we can drop root */
+- setuid(getuid());
++ xsetuid(getuid());
+
+ /* look up the dest mac address */
+ get_dest_addr(argv[optind], &eaddr);
+Index: networking/inetd.c
+===================================================================
+--- networking/inetd.c (revision 15701)
++++ networking/inetd.c (revision 15702)
+@@ -1513,11 +1513,11 @@
+ if (sep->se_group) {
+ pwd->pw_gid = grp->gr_gid;
+ }
+- setgid ((gid_t) pwd->pw_gid);
++ xsetgid ((gid_t) pwd->pw_gid);
+ initgroups (pwd->pw_name, pwd->pw_gid);
+- setuid ((uid_t) pwd->pw_uid);
++ xsetuid((uid_t) pwd->pw_uid);
+ } else if (sep->se_group) {
+- setgid (grp->gr_gid);
++ xsetgid(grp->gr_gid);
+ setgroups (1, &grp->gr_gid);
+ }
+ dup2 (ctrl, 0);
+Index: networking/traceroute.c
+===================================================================
+--- networking/traceroute.c (revision 15701)
++++ networking/traceroute.c (revision 15702)
+@@ -941,7 +941,6 @@
+ #endif
+ u_short off = 0;
+ struct IFADDRLIST *al;
+- int uid = getuid();
+ char *device = NULL;
+ int max_ttl = 30;
+ char *max_ttl_str = NULL;
+@@ -1010,8 +1009,7 @@
+ * set the ip source address of the outbound
+ * probe (e.g., on a multi-homed host).
+ */
+- if (uid)
+- bb_error_msg_and_die("-s %s: Permission denied", source);
++ if (getuid()) bb_error_msg_and_die("-s %s: Permission denied", source);
+ }
+ if(waittime_str)
+ waittime = str2val(waittime_str, "wait time", 2, 24 * 60 * 60);
+@@ -1160,8 +1158,8 @@
+ sizeof(on));
+
+ /* Revert to non-privileged user after opening sockets */
+- setgid(getgid());
+- setuid(uid);
++ xsetgid(getgid());
++ xsetuid(getuid());
+
+ outip = (struct ip *)xcalloc(1, (unsigned)packlen);
+
+Index: networking/arping.c
+===================================================================
+--- networking/arping.c (revision 15701)
++++ networking/arping.c (revision 15702)
+@@ -262,7 +262,8 @@
+ s = socket(PF_PACKET, SOCK_DGRAM, 0);
+ ifindex = errno;
+
+- setuid(getuid());
++ // Drop suid root privileges
++ xsetuid(getuid());
+
+ {
+ unsigned long opt;
+Index: loginutils/passwd.c
+===================================================================
+--- loginutils/passwd.c (revision 15701)
++++ loginutils/passwd.c (revision 15702)
+@@ -227,10 +227,7 @@
+ signal(SIGINT, SIG_IGN);
+ signal(SIGQUIT, SIG_IGN);
+ umask(077);
+- if (setuid(0)) {
+- syslog(LOG_ERR, "can't setuid(0)");
+- bb_error_msg_and_die( "Cannot change ID to root.\n");
+- }
++ xsetuid(0);
+ if (!update_passwd(pw, crypt_passwd)) {
+ syslog(LOG_INFO, "password for `%s' changed by user `%s'", name,
+ myname);
+ ------------------------------------------------------------------------
+r15705 | landley | 2006-07-16 14:58:18 -0400 (Sun, 16 Jul 2006) | 2 lines
+Changed paths:
+ M /trunk/busybox/loginutils/adduser.c
+
+Bugfix from Tito to make sure /etc/group gets updated.
+
+ ------------------------------------------------------------------------
+Index: loginutils/adduser.c
+===================================================================
+--- loginutils/adduser.c (revision 15704)
++++ loginutils/adduser.c (revision 15705)
+@@ -96,6 +96,7 @@
+ static int adduser(struct passwd *p, unsigned long flags)
+ {
+ FILE *file;
++ int addgroup = !p->pw_gid;
+
+ /* make sure everything is kosher and setup uid && gid */
+ file = bb_xfopen(bb_path_passwd_file, "a");
+@@ -132,9 +133,8 @@
+ /* add to group */
+ /* addgroup should be responsible for dealing w/ gshadow */
+ /* if using a pre-existing group, don't create one */
+- if (p->pw_gid == 0) {
+- addgroup_wrapper(p);
+- }
++ if (addgroup) addgroup_wrapper(p);
++
+ /* Clear the umask for this process so it doesn't
+ * * screw up the permissions on the mkdir and chown. */
+ umask(0);
+ ------------------------------------------------------------------------
+r15727 | landley | 2006-07-19 17:33:42 -0400 (Wed, 19 Jul 2006) | 4 lines
+Changed paths:
+ M /trunk/busybox/modutils/modprobe.c
+
+Patch from Yann Morin to look for modules.conf in the right place on 2.6.
+Fixes http://bugs.busybox.net/view.php?id=942
+
+
+ ------------------------------------------------------------------------
+Index: modutils/modprobe.c
+===================================================================
+--- modutils/modprobe.c (revision 15726)
++++ modutils/modprobe.c (revision 15727)
+@@ -545,29 +545,37 @@
+ }
+ close ( fd );
+
++ /*
++ * First parse system-specific options and aliases
++ * as they take precedence over the kernel ones.
++ */
+ if (!ENABLE_FEATURE_2_6_MODULES
+ || ( fd = open ( "/etc/modprobe.conf", O_RDONLY )) < 0 )
+ if (( fd = open ( "/etc/modules.conf", O_RDONLY )) < 0 )
+- if (( fd = open ( "/etc/conf.modules", O_RDONLY )) < 0 )
+- return first;
++ fd = open ( "/etc/conf.modules", O_RDONLY );
+
+- include_conf (&first, ¤t, buffer, sizeof(buffer), fd);
+- close(fd);
++ if (fd >= 0) {
++ include_conf (&first, ¤t, buffer, sizeof(buffer), fd);
++ close(fd);
++ }
+
+- filename = bb_xasprintf("/lib/modules/%s/modules.alias", un.release);
+- fd = open ( filename, O_RDONLY );
+- if (ENABLE_FEATURE_CLEAN_UP)
+- free(filename);
+- if (fd < 0) {
+- /* Ok, that didn't work. Fall back to looking in /lib/modules */
+- if (( fd = open ( "/lib/modules/modules.alias", O_RDONLY )) < 0 ) {
+- return first;
++ /* Only 2.6 has a modules.alias file */
++ if (ENABLE_FEATURE_2_6_MODULES) {
++ /* Parse kernel-declared aliases */
++ filename = bb_xasprintf("/lib/modules/%s/modules.alias", un.release);
++ if ((fd = open ( filename, O_RDONLY )) < 0) {
++ /* Ok, that didn't work. Fall back to looking in /lib/modules */
++ fd = open ( "/lib/modules/modules.alias", O_RDONLY );
+ }
++ if (ENABLE_FEATURE_CLEAN_UP)
++ free(filename);
++
++ if (fd >= 0) {
++ include_conf (&first, ¤t, buffer, sizeof(buffer), fd);
++ close(fd);
++ }
+ }
+
+- include_conf (&first, ¤t, buffer, sizeof(buffer), fd);
+- close(fd);
+-
+ return first;
+ }
+