source: MondoRescue/branches/3.2/mindi-busybox/miscutils/devfsd.c@ 3232

Last change on this file since 3232 was 3232, checked in by Bruno Cornec, 10 years ago
  • Update mindi-busybox to 1.21.1
File size: 54.2 KB
RevLine 
[1765]1/* vi: set sw=4 ts=4: */
[821]2/*
[2725]3 * Licensed under GPLv2 or later, see file LICENSE in this source tree.
[1765]4 */
5
6/*
[821]7 devfsd implementation for busybox
8
9 Copyright (C) 2003 by Tito Ragusa <farmatito@tiscali.it>
10
11 Busybox version is based on some previous work and ideas
12 Copyright (C) [2003] by [Matteo Croce] <3297627799@wind.it>
13
14 devfsd.c
15
16 Main file for devfsd (devfs daemon for Linux).
17
18 Copyright (C) 1998-2002 Richard Gooch
19
20 devfsd.h
21
22 Header file for devfsd (devfs daemon for Linux).
23
24 Copyright (C) 1998-2000 Richard Gooch
25
26 compat_name.c
27
28 Compatibility name file for devfsd (build compatibility names).
29
30 Copyright (C) 1998-2002 Richard Gooch
31
32 expression.c
33
34 This code provides Borne Shell-like expression expansion.
35
36 Copyright (C) 1997-1999 Richard Gooch
37
38 This program is free software; you can redistribute it and/or modify
39 it under the terms of the GNU General Public License as published by
40 the Free Software Foundation; either version 2 of the License, or
41 (at your option) any later version.
42
43 This program is distributed in the hope that it will be useful,
44 but WITHOUT ANY WARRANTY; without even the implied warranty of
45 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
46 GNU General Public License for more details.
47
48 You should have received a copy of the GNU General Public License
49 along with this program; if not, write to the Free Software
50 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
51
52 Richard Gooch may be reached by email at rgooch@atnf.csiro.au
53 The postal address is:
54 Richard Gooch, c/o ATNF, P. O. Box 76, Epping, N.S.W., 2121, Australia.
55*/
[3232]56
57//usage:#define devfsd_trivial_usage
58//usage: "mntpnt [-v]" IF_DEVFSD_FG_NP("[-fg][-np]")
59//usage:#define devfsd_full_usage "\n\n"
60//usage: "Manage devfs permissions and old device name symlinks\n"
61//usage: "\n mntpnt The mount point where devfs is mounted"
62//usage: "\n -v Print the protocol version numbers for devfsd"
63//usage: "\n and the kernel-side protocol version and exit"
64//usage: IF_DEVFSD_FG_NP(
65//usage: "\n -fg Run in foreground"
66//usage: "\n -np Exit after parsing the configuration file"
67//usage: "\n and processing synthetic REGISTER events,"
68//usage: "\n don't poll for events"
69//usage: )
70
[2725]71#include "libbb.h"
72#include "xregex.h"
73#include <syslog.h>
[821]74
75#include <sys/un.h>
76#include <sys/sysmacros.h>
77
78/* Various defines taken from linux/major.h */
79#define IDE0_MAJOR 3
80#define IDE1_MAJOR 22
81#define IDE2_MAJOR 33
82#define IDE3_MAJOR 34
83#define IDE4_MAJOR 56
84#define IDE5_MAJOR 57
85#define IDE6_MAJOR 88
86#define IDE7_MAJOR 89
87#define IDE8_MAJOR 90
88#define IDE9_MAJOR 91
89
90
91/* Various defines taken from linux/devfs_fs.h */
92#define DEVFSD_PROTOCOL_REVISION_KERNEL 5
[2725]93#define DEVFSD_IOCTL_BASE 'd'
[821]94/* These are the various ioctls */
95#define DEVFSDIOC_GET_PROTO_REV _IOR(DEVFSD_IOCTL_BASE, 0, int)
96#define DEVFSDIOC_SET_EVENT_MASK _IOW(DEVFSD_IOCTL_BASE, 2, int)
97#define DEVFSDIOC_RELEASE_EVENT_QUEUE _IOW(DEVFSD_IOCTL_BASE, 3, int)
98#define DEVFSDIOC_SET_CONFIG_DEBUG_MASK _IOW(DEVFSD_IOCTL_BASE, 4, int)
99#define DEVFSD_NOTIFY_REGISTERED 0
100#define DEVFSD_NOTIFY_UNREGISTERED 1
101#define DEVFSD_NOTIFY_ASYNC_OPEN 2
102#define DEVFSD_NOTIFY_CLOSE 3
103#define DEVFSD_NOTIFY_LOOKUP 4
104#define DEVFSD_NOTIFY_CHANGE 5
105#define DEVFSD_NOTIFY_CREATE 6
106#define DEVFSD_NOTIFY_DELETE 7
107#define DEVFS_PATHLEN 1024
108/* Never change this otherwise the binary interface will change */
109
[2725]110struct devfsd_notify_struct {
111 /* Use native C types to ensure same types in kernel and user space */
112 unsigned int type; /* DEVFSD_NOTIFY_* value */
113 unsigned int mode; /* Mode of the inode or device entry */
114 unsigned int major; /* Major number of device entry */
115 unsigned int minor; /* Minor number of device entry */
116 unsigned int uid; /* Uid of process, inode or device entry */
117 unsigned int gid; /* Gid of process, inode or device entry */
118 unsigned int overrun_count; /* Number of lost events */
119 unsigned int namelen; /* Number of characters not including '\0' */
120 /* The device name MUST come last */
121 char devname[DEVFS_PATHLEN]; /* This will be '\0' terminated */
[821]122};
123
124#define BUFFER_SIZE 16384
125#define DEVFSD_VERSION "1.3.25"
126#define CONFIG_FILE "/etc/devfsd.conf"
127#define MODPROBE "/sbin/modprobe"
128#define MODPROBE_SWITCH_1 "-k"
129#define MODPROBE_SWITCH_2 "-C"
130#define CONFIG_MODULES_DEVFS "/etc/modules.devfs"
131#define MAX_ARGS (6 + 1)
132#define MAX_SUBEXPR 10
133#define STRING_LENGTH 255
134
135/* for get_uid_gid() */
136#define UID 0
137#define GID 1
138
139/* fork_and_execute() */
140# define DIE 1
141# define NO_DIE 0
142
143/* for dir_operation() */
144#define RESTORE 0
145#define SERVICE 1
146#define READ_CONFIG 2
147
148/* Update only after changing code to reflect new protocol */
149#define DEVFSD_PROTOCOL_REVISION_DAEMON 5
150
151/* Compile-time check */
152#if DEVFSD_PROTOCOL_REVISION_KERNEL != DEVFSD_PROTOCOL_REVISION_DAEMON
153#error protocol version mismatch. Update your kernel headers
154#endif
155
156#define AC_PERMISSIONS 0
157#define AC_MODLOAD 1
158#define AC_EXECUTE 2
159#define AC_MFUNCTION 3 /* not supported by busybox */
160#define AC_CFUNCTION 4 /* not supported by busybox */
161#define AC_COPY 5
162#define AC_IGNORE 6
163#define AC_MKOLDCOMPAT 7
164#define AC_MKNEWCOMPAT 8
165#define AC_RMOLDCOMPAT 9
166#define AC_RMNEWCOMPAT 10
167#define AC_RESTORE 11
168
[2725]169struct permissions_type {
[1765]170 mode_t mode;
171 uid_t uid;
172 gid_t gid;
[821]173};
174
[2725]175struct execute_type {
[1765]176 char *argv[MAX_ARGS + 1]; /* argv[0] must always be the programme */
[821]177};
178
[2725]179struct copy_type {
[1765]180 const char *source;
181 const char *destination;
[821]182};
183
[2725]184struct action_type {
[1765]185 unsigned int what;
186 unsigned int when;
[821]187};
188
[2725]189struct config_entry_struct {
[1765]190 struct action_type action;
191 regex_t preg;
192 union
193 {
[821]194 struct permissions_type permissions;
195 struct execute_type execute;
196 struct copy_type copy;
[1765]197 }
198 u;
199 struct config_entry_struct *next;
[821]200};
201
[2725]202struct get_variable_info {
[1765]203 const struct devfsd_notify_struct *info;
204 const char *devname;
205 char devpath[STRING_LENGTH];
[821]206};
207
[1765]208static void dir_operation(int , const char * , int, unsigned long*);
[821]209static void service(struct stat statbuf, char *path);
[1765]210static int st_expr_expand(char *, unsigned, const char *, const char *(*)(const char *, void *), void *);
[821]211static const char *get_old_name(const char *, unsigned, char *, unsigned, unsigned);
[1765]212static int mksymlink(const char *oldpath, const char *newpath);
213static void read_config_file(char *path, int optional, unsigned long *event_mask);
214static void process_config_line(const char *, unsigned long *);
215static int do_servicing(int, unsigned long);
216static void service_name(const struct devfsd_notify_struct *);
217static void action_permissions(const struct devfsd_notify_struct *, const struct config_entry_struct *);
218static void action_execute(const struct devfsd_notify_struct *, const struct config_entry_struct *,
[821]219 const regmatch_t *, unsigned);
[1765]220static void action_modload(const struct devfsd_notify_struct *info, const struct config_entry_struct *entry);
221static void action_copy(const struct devfsd_notify_struct *, const struct config_entry_struct *,
[3232]222 const regmatch_t *, unsigned);
[1765]223static void action_compat(const struct devfsd_notify_struct *, unsigned);
224static void free_config(void);
[821]225static void restore(char *spath, struct stat source_stat, int rootlen);
[1765]226static int copy_inode(const char *, const struct stat *, mode_t, const char *, const struct stat *);
227static mode_t get_mode(const char *);
228static void signal_handler(int);
229static const char *get_variable(const char *, void *);
230static int make_dir_tree(const char *);
[821]231static int expand_expression(char *, unsigned, const char *, const char *(*)(const char *, void *), void *,
[3232]232 const char *, const regmatch_t *, unsigned);
[1765]233static void expand_regexp(char *, size_t, const char *, const char *, const regmatch_t *, unsigned);
[821]234static const char *expand_variable( char *, unsigned, unsigned *, const char *,
[1765]235 const char *(*)(const char *, void *), void *);
236static const char *get_variable_v2(const char *, const char *(*)(const char *, void *), void *);
[3232]237static char get_old_ide_name(unsigned, unsigned);
[1765]238static char *write_old_sd_name(char *, unsigned, unsigned, const char *);
[821]239
240/* busybox functions */
[1765]241static int get_uid_gid(int flag, const char *string);
242static void safe_memcpy(char * dest, const char * src, int len);
243static unsigned int scan_dev_name_common(const char *d, unsigned int n, int addendum, const char *ptr);
244static unsigned int scan_dev_name(const char *d, unsigned int n, const char *ptr);
[821]245
246/* Structs and vars */
247static struct config_entry_struct *first_config = NULL;
248static struct config_entry_struct *last_config = NULL;
[1765]249static char *mount_point = NULL;
[821]250static volatile int caught_signal = FALSE;
251static volatile int caught_sighup = FALSE;
[1765]252static struct initial_symlink_struct {
253 const char *dest;
254 const char *name;
255} initial_symlinks[] = {
256 {"/proc/self/fd", "fd"},
257 {"fd/0", "stdin"},
258 {"fd/1", "stdout"},
259 {"fd/2", "stderr"},
260 {NULL, NULL},
[821]261};
262
[1765]263static struct event_type {
264 unsigned int type; /* The DEVFSD_NOTIFY_* value */
265 const char *config_name; /* The name used in the config file */
266} event_types[] = {
267 {DEVFSD_NOTIFY_REGISTERED, "REGISTER"},
268 {DEVFSD_NOTIFY_UNREGISTERED, "UNREGISTER"},
269 {DEVFSD_NOTIFY_ASYNC_OPEN, "ASYNC_OPEN"},
270 {DEVFSD_NOTIFY_CLOSE, "CLOSE"},
271 {DEVFSD_NOTIFY_LOOKUP, "LOOKUP"},
272 {DEVFSD_NOTIFY_CHANGE, "CHANGE"},
273 {DEVFSD_NOTIFY_CREATE, "CREATE"},
274 {DEVFSD_NOTIFY_DELETE, "DELETE"},
275 {0xffffffff, NULL}
[821]276};
277
278/* Busybox messages */
279
[1765]280static const char bb_msg_proto_rev[] ALIGN1 = "protocol revision";
281static const char bb_msg_bad_config[] ALIGN1 = "bad %s config file: %s";
282static const char bb_msg_small_buffer[] ALIGN1 = "buffer too small";
283static const char bb_msg_variable_not_found[] ALIGN1 = "variable: %s not found";
[821]284
285/* Busybox stuff */
[1765]286#if ENABLE_DEVFSD_VERBOSE || ENABLE_DEBUG
287#define info_logger(p, fmt, args...) bb_info_msg(fmt, ## args)
288#define msg_logger(p, fmt, args...) bb_error_msg(fmt, ## args)
289#define msg_logger_and_die(p, fmt, args...) bb_error_msg_and_die(fmt, ## args)
290#define error_logger(p, fmt, args...) bb_perror_msg(fmt, ## args)
291#define error_logger_and_die(p, fmt, args...) bb_perror_msg_and_die(fmt, ## args)
[821]292#else
[1765]293#define info_logger(p, fmt, args...)
[821]294#define msg_logger(p, fmt, args...)
[2725]295#define msg_logger_and_die(p, fmt, args...) exit(EXIT_FAILURE)
[1765]296#define error_logger(p, fmt, args...)
[2725]297#define error_logger_and_die(p, fmt, args...) exit(EXIT_FAILURE)
[821]298#endif
299
[1765]300static void safe_memcpy(char *dest, const char *src, int len)
[821]301{
[1765]302 memcpy(dest , src, len);
[821]303 dest[len] = '\0';
304}
305
[1765]306static unsigned int scan_dev_name_common(const char *d, unsigned int n, int addendum, const char *ptr)
[821]307{
[1765]308 if (d[n - 4] == 'd' && d[n - 3] == 'i' && d[n - 2] == 's' && d[n - 1] == 'c')
309 return 2 + addendum;
310 if (d[n - 2] == 'c' && d[n - 1] == 'd')
311 return 3 + addendum;
312 if (ptr[0] == 'p' && ptr[1] == 'a' && ptr[2] == 'r' && ptr[3] == 't')
313 return 4 + addendum;
314 if (ptr[n - 2] == 'm' && ptr[n - 1] == 't')
315 return 5 + addendum;
316 return 0;
[821]317}
318
[1765]319static unsigned int scan_dev_name(const char *d, unsigned int n, const char *ptr)
[821]320{
[1765]321 if (d[0] == 's' && d[1] == 'c' && d[2] == 's' && d[3] == 'i' && d[4] == '/') {
322 if (d[n - 7] == 'g' && d[n - 6] == 'e' && d[n - 5] == 'n'
323 && d[n - 4] == 'e' && d[n - 3] == 'r' && d[n - 2] == 'i' && d[n - 1] == 'c'
324 )
[821]325 return 1;
326 return scan_dev_name_common(d, n, 0, ptr);
327 }
[1765]328 if (d[0] == 'i' && d[1] == 'd' && d[2] == 'e' && d[3] == '/'
329 && d[4] == 'h' && d[5] == 'o' && d[6] == 's' && d[7] == 't'
330 )
[821]331 return scan_dev_name_common(d, n, 4, ptr);
[1765]332 if (d[0] == 's' && d[1] == 'b' && d[2] == 'p' && d[3] == '/')
[821]333 return 10;
[1765]334 if (d[0] == 'v' && d[1] == 'c' && d[2] == 'c' && d[3] == '/')
[821]335 return 11;
[1765]336 if (d[0] == 'p' && d[1] == 't' && d[2] == 'y' && d[3] == '/')
[821]337 return 12;
338 return 0;
339}
340
341/* Public functions follow */
342
[2725]343int devfsd_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
[1765]344int devfsd_main(int argc, char **argv)
[821]345{
346 int print_version = FALSE;
347 int do_daemon = TRUE;
348 int no_polling = FALSE;
349 int do_scan;
350 int fd, proto_rev, count;
351 unsigned long event_mask = 0;
352 struct sigaction new_action;
353 struct initial_symlink_struct *curr;
354
355 if (argc < 2)
356 bb_show_usage();
357
[1765]358 for (count = 2; count < argc; ++count) {
359 if (argv[count][0] == '-') {
360 if (argv[count][1] == 'v' && !argv[count][2]) /* -v */
361 print_version = TRUE;
362 else if (ENABLE_DEVFSD_FG_NP && argv[count][1] == 'f'
363 && argv[count][2] == 'g' && !argv[count][3]) /* -fg */
364 do_daemon = FALSE;
365 else if (ENABLE_DEVFSD_FG_NP && argv[count][1] == 'n'
366 && argv[count][2] == 'p' && !argv[count][3]) /* -np */
367 no_polling = TRUE;
[821]368 else
369 bb_show_usage();
370 }
371 }
372
[1765]373 mount_point = bb_simplify_path(argv[1]);
[821]374
[1765]375 xchdir(mount_point);
[821]376
[1765]377 fd = xopen(".devfsd", O_RDONLY);
[2725]378 close_on_exec_on(fd);
[1765]379 xioctl(fd, DEVFSDIOC_GET_PROTO_REV, &proto_rev);
[821]380
381 /*setup initial entries */
[1765]382 for (curr = initial_symlinks; curr->dest != NULL; ++curr)
383 symlink(curr->dest, curr->name);
[821]384
385 /* NB: The check for CONFIG_FILE is done in read_config_file() */
386
[1765]387 if (print_version || (DEVFSD_PROTOCOL_REVISION_DAEMON != proto_rev)) {
388 printf("%s v%s\nDaemon %s:\t%d\nKernel-side %s:\t%d\n",
389 applet_name, DEVFSD_VERSION, bb_msg_proto_rev,
390 DEVFSD_PROTOCOL_REVISION_DAEMON, bb_msg_proto_rev, proto_rev);
[821]391 if (DEVFSD_PROTOCOL_REVISION_DAEMON != proto_rev)
[1765]392 bb_error_msg_and_die("%s mismatch!", bb_msg_proto_rev);
[821]393 exit(EXIT_SUCCESS); /* -v */
394 }
[1765]395 /* Tell kernel we are special(i.e. we get to see hidden entries) */
396 xioctl(fd, DEVFSDIOC_SET_EVENT_MASK, 0);
[821]397
[2725]398 /* Set up SIGHUP and SIGUSR1 handlers */
[1765]399 sigemptyset(&new_action.sa_mask);
[821]400 new_action.sa_flags = 0;
401 new_action.sa_handler = signal_handler;
[2725]402 sigaction_set(SIGHUP, &new_action);
403 sigaction_set(SIGUSR1, &new_action);
[821]404
[2725]405 printf("%s v%s started for %s\n", applet_name, DEVFSD_VERSION, mount_point);
[821]406
407 /* Set umask so that mknod(2), open(2) and mkdir(2) have complete control over permissions */
[1765]408 umask(0);
409 read_config_file((char*)CONFIG_FILE, FALSE, &event_mask);
[821]410 /* Do the scan before forking, so that boot scripts see the finished product */
[1765]411 dir_operation(SERVICE, mount_point, 0, NULL);
[821]412
413 if (ENABLE_DEVFSD_FG_NP && no_polling)
[2725]414 exit(EXIT_SUCCESS);
[1765]415
416 if (ENABLE_DEVFSD_VERBOSE || ENABLE_DEBUG)
417 logmode = LOGMODE_BOTH;
418 else if (do_daemon == TRUE)
419 logmode = LOGMODE_SYSLOG;
420 /* This is the default */
421 /*else
422 logmode = LOGMODE_STDIO; */
423
424 if (do_daemon) {
[821]425 /* Release so that the child can grab it */
[1765]426 xioctl(fd, DEVFSDIOC_RELEASE_EVENT_QUEUE, 0);
427 bb_daemonize_or_rexec(0, argv);
428 } else if (ENABLE_DEVFSD_FG_NP) {
429 setpgid(0, 0); /* Become process group leader */
[821]430 }
431
[1765]432 while (TRUE) {
433 do_scan = do_servicing(fd, event_mask);
[821]434
[1765]435 free_config();
436 read_config_file((char*)CONFIG_FILE, FALSE, &event_mask);
[821]437 if (do_scan)
[1765]438 dir_operation(SERVICE, mount_point, 0, NULL);
[821]439 }
[1765]440 if (ENABLE_FEATURE_CLEAN_UP) free(mount_point);
[821]441} /* End Function main */
442
443
444/* Private functions follow */
445
[1765]446static void read_config_file(char *path, int optional, unsigned long *event_mask)
[821]447/* [SUMMARY] Read a configuration database.
448 <path> The path to read the database from. If this is a directory, all
[1765]449 entries in that directory will be read(except hidden entries).
[821]450 <optional> If TRUE, the routine will silently ignore a missing config file.
451 <event_mask> The event mask is written here. This is not initialised.
452 [RETURNS] Nothing.
453*/
454{
455 struct stat statbuf;
456 FILE *fp;
457 char buf[STRING_LENGTH];
[1765]458 char *line = NULL;
459 char *p;
[821]460
[1765]461 if (stat(path, &statbuf) == 0) {
[821]462 /* Don't read 0 length files: ignored */
[1765]463 /*if (statbuf.st_size == 0)
[821]464 return;*/
[1765]465 if (S_ISDIR(statbuf.st_mode)) {
466 p = bb_simplify_path(path);
467 dir_operation(READ_CONFIG, p, 0, event_mask);
468 free(p);
[821]469 return;
470 }
[2725]471 fp = fopen_for_read(path);
472 if (fp != NULL) {
[1765]473 while (fgets(buf, STRING_LENGTH, fp) != NULL) {
[821]474 /* Skip whitespace */
[1765]475 line = buf;
476 line = skip_whitespace(line);
477 if (line[0] == '\0' || line[0] == '#')
[821]478 continue;
[1765]479 process_config_line(line, event_mask);
[821]480 }
[1765]481 fclose(fp);
[821]482 } else {
483 goto read_config_file_err;
484 }
485 } else {
486read_config_file_err:
[1765]487 if (optional == 0 && errno == ENOENT)
488 error_logger_and_die(LOG_ERR, "read config file: %s", path);
[821]489 }
490} /* End Function read_config_file */
491
[1765]492static void process_config_line(const char *line, unsigned long *event_mask)
[821]493/* [SUMMARY] Process a line from a configuration file.
494 <line> The configuration line.
495 <event_mask> The event mask is written here. This is not initialised.
496 [RETURNS] Nothing.
497*/
498{
499 int num_args, count;
500 struct config_entry_struct *new;
501 char p[MAX_ARGS][STRING_LENGTH];
502 char when[STRING_LENGTH], what[STRING_LENGTH];
503 char name[STRING_LENGTH];
[1765]504 const char *msg = "";
[821]505 char *ptr;
506 int i;
507
508 /* !!!! Only Uppercase Keywords in devsfd.conf */
[1765]509 static const char options[] ALIGN1 =
510 "CLEAR_CONFIG\0""INCLUDE\0""OPTIONAL_INCLUDE\0"
511 "RESTORE\0""PERMISSIONS\0""MODLOAD\0""EXECUTE\0"
512 "COPY\0""IGNORE\0""MKOLDCOMPAT\0""MKNEWCOMPAT\0"
513 "RMOLDCOMPAT\0""RMNEWCOMPAT\0";
[821]514
[1765]515 for (count = 0; count < MAX_ARGS; ++count)
516 p[count][0] = '\0';
517 num_args = sscanf(line, "%s %s %s %s %s %s %s %s %s %s",
[821]518 when, name, what,
519 p[0], p[1], p[2], p[3], p[4], p[5], p[6]);
520
[1765]521 i = index_in_strings(options, when);
[821]522
[1765]523 /* "CLEAR_CONFIG" */
524 if (i == 0) {
525 free_config();
[821]526 *event_mask = 0;
527 return;
528 }
529
[1765]530 if (num_args < 2)
[821]531 goto process_config_line_err;
532
533 /* "INCLUDE" & "OPTIONAL_INCLUDE" */
[1765]534 if (i == 1 || i == 2) {
535 st_expr_expand(name, STRING_LENGTH, name, get_variable, NULL);
536 info_logger(LOG_INFO, "%sinclude: %s", (toupper(when[0]) == 'I') ? "": "optional_", name);
537 read_config_file(name, (toupper(when[0]) == 'I') ? FALSE : TRUE, event_mask);
[821]538 return;
539 }
540 /* "RESTORE" */
[1765]541 if (i == 3) {
542 dir_operation(RESTORE, name, strlen(name),NULL);
[821]543 return;
544 }
545 if (num_args < 3)
546 goto process_config_line_err;
547
[1765]548 new = xzalloc(sizeof *new);
[821]549
[1765]550 for (count = 0; event_types[count].config_name != NULL; ++count) {
551 if (strcasecmp(when, event_types[count].config_name) != 0)
[821]552 continue;
553 new->action.when = event_types[count].type;
554 break;
555 }
[1765]556 if (event_types[count].config_name == NULL) {
557 msg = "WHEN in";
[821]558 goto process_config_line_err;
559 }
560
[1765]561 i = index_in_strings(options, what);
[821]562
[1765]563 switch (i) {
[821]564 case 4: /* "PERMISSIONS" */
565 new->action.what = AC_PERMISSIONS;
566 /* Get user and group */
[2725]567 ptr = strchr(p[0], '.');
568 if (ptr == NULL) {
[1765]569 msg = "UID.GID";
[821]570 goto process_config_line_err; /*"missing '.' in UID.GID"*/
571 }
572
573 *ptr++ = '\0';
[1765]574 new->u.permissions.uid = get_uid_gid(UID, p[0]);
575 new->u.permissions.gid = get_uid_gid(GID, ptr);
[821]576 /* Get mode */
[1765]577 new->u.permissions.mode = get_mode(p[1]);
[821]578 break;
579 case 5: /* MODLOAD */
[1765]580 /*This action will pass "/dev/$devname"(i.e. "/dev/" prefixed to
[821]581 the device name) to the module loading facility. In addition,
582 the /etc/modules.devfs configuration file is used.*/
[3232]583 if (ENABLE_DEVFSD_MODLOAD)
[821]584 new->action.what = AC_MODLOAD;
[3232]585 break;
[821]586 case 6: /* EXECUTE */
587 new->action.what = AC_EXECUTE;
588 num_args -= 3;
589
590 for (count = 0; count < num_args; ++count)
[1765]591 new->u.execute.argv[count] = xstrdup(p[count]);
[821]592
593 new->u.execute.argv[num_args] = NULL;
594 break;
595 case 7: /* COPY */
596 new->action.what = AC_COPY;
597 num_args -= 3;
598 if (num_args != 2)
599 goto process_config_line_err; /* missing path and function in line */
600
[1765]601 new->u.copy.source = xstrdup(p[0]);
602 new->u.copy.destination = xstrdup(p[1]);
[821]603 break;
604 case 8: /* IGNORE */
605 /* FALLTROUGH */
606 case 9: /* MKOLDCOMPAT */
607 /* FALLTROUGH */
608 case 10: /* MKNEWCOMPAT */
609 /* FALLTROUGH */
610 case 11:/* RMOLDCOMPAT */
611 /* FALLTROUGH */
612 case 12: /* RMNEWCOMPAT */
613 /* AC_IGNORE 6
614 AC_MKOLDCOMPAT 7
615 AC_MKNEWCOMPAT 8
616 AC_RMOLDCOMPAT 9
617 AC_RMNEWCOMPAT 10*/
618 new->action.what = i - 2;
619 break;
620 default:
[1765]621 msg = "WHAT in";
[821]622 goto process_config_line_err;
623 /*esac*/
624 } /* switch (i) */
625
[1765]626 xregcomp(&new->preg, name, REG_EXTENDED);
[821]627
628 *event_mask |= 1 << new->action.when;
629 new->next = NULL;
630 if (first_config == NULL)
631 first_config = new;
632 else
633 last_config->next = new;
634 last_config = new;
635 return;
[1765]636
637 process_config_line_err:
[821]638 msg_logger_and_die(LOG_ERR, bb_msg_bad_config, msg , line);
639} /* End Function process_config_line */
640
[1765]641static int do_servicing(int fd, unsigned long event_mask)
[821]642/* [SUMMARY] Service devfs changes until a signal is received.
643 <fd> The open control file.
644 <event_mask> The event mask.
645 [RETURNS] TRUE if SIGHUP was caught, else FALSE.
646*/
647{
648 ssize_t bytes;
649 struct devfsd_notify_struct info;
650
[1765]651 /* (void*) cast is only in order to match prototype */
652 xioctl(fd, DEVFSDIOC_SET_EVENT_MASK, (void*)event_mask);
653 while (!caught_signal) {
[821]654 errno = 0;
[2725]655 bytes = read(fd, (char *) &info, sizeof info);
[821]656 if (caught_signal)
657 break; /* Must test for this first */
658 if (errno == EINTR)
659 continue; /* Yes, the order is important */
660 if (bytes < 1)
661 break;
[1765]662 service_name(&info);
[821]663 }
[1765]664 if (caught_signal) {
[821]665 int c_sighup = caught_sighup;
666
667 caught_signal = FALSE;
668 caught_sighup = FALSE;
[1765]669 return c_sighup;
[821]670 }
671 msg_logger_and_die(LOG_ERR, "read error on control file");
672} /* End Function do_servicing */
673
[1765]674static void service_name(const struct devfsd_notify_struct *info)
[821]675/* [SUMMARY] Service a single devfs change.
676 <info> The devfs change.
677 [RETURNS] Nothing.
678*/
679{
680 unsigned int n;
681 regmatch_t mbuf[MAX_SUBEXPR];
682 struct config_entry_struct *entry;
683
684 if (ENABLE_DEBUG && info->overrun_count > 0)
[1765]685 msg_logger(LOG_ERR, "lost %u events", info->overrun_count);
[821]686
687 /* Discard lookups on "/dev/log" and "/dev/initctl" */
[1765]688 if (info->type == DEVFSD_NOTIFY_LOOKUP
689 && ((info->devname[0] == 'l' && info->devname[1] == 'o'
690 && info->devname[2] == 'g' && !info->devname[3])
691 || (info->devname[0] == 'i' && info->devname[1] == 'n'
692 && info->devname[2] == 'i' && info->devname[3] == 't'
693 && info->devname[4] == 'c' && info->devname[5] == 't'
694 && info->devname[6] == 'l' && !info->devname[7]))
695 )
696 return;
697
698 for (entry = first_config; entry != NULL; entry = entry->next) {
[821]699 /* First check if action matches the type, then check if name matches */
[1765]700 if (info->type != entry->action.when
701 || regexec(&entry->preg, info->devname, MAX_SUBEXPR, mbuf, 0) != 0)
[821]702 continue;
[1765]703 for (n = 0;(n < MAX_SUBEXPR) && (mbuf[n].rm_so != -1); ++n)
[821]704 /* VOID */;
705
[1765]706 switch (entry->action.what) {
[821]707 case AC_PERMISSIONS:
[1765]708 action_permissions(info, entry);
[821]709 break;
710 case AC_MODLOAD:
[1765]711 if (ENABLE_DEVFSD_MODLOAD)
712 action_modload(info, entry);
[821]713 break;
714 case AC_EXECUTE:
[1765]715 action_execute(info, entry, mbuf, n);
[821]716 break;
717 case AC_COPY:
[1765]718 action_copy(info, entry, mbuf, n);
[821]719 break;
720 case AC_IGNORE:
721 return;
722 /*break;*/
723 case AC_MKOLDCOMPAT:
724 case AC_MKNEWCOMPAT:
725 case AC_RMOLDCOMPAT:
726 case AC_RMNEWCOMPAT:
[1765]727 action_compat(info, entry->action.what);
[821]728 break;
729 default:
730 msg_logger_and_die(LOG_ERR, "Unknown action");
731 }
732 }
733} /* End Function service_name */
734
[1765]735static void action_permissions(const struct devfsd_notify_struct *info,
[821]736 const struct config_entry_struct *entry)
737/* [SUMMARY] Update permissions for a device entry.
738 <info> The devfs change.
739 <entry> The config file entry.
740 [RETURNS] Nothing.
741*/
742{
743 struct stat statbuf;
744
[1765]745 if (stat(info->devname, &statbuf) != 0
746 || chmod(info->devname, (statbuf.st_mode & S_IFMT) | (entry->u.permissions.mode & ~S_IFMT)) != 0
747 || chown(info->devname, entry->u.permissions.uid, entry->u.permissions.gid) != 0
748 )
749 error_logger(LOG_ERR, "Can't chmod or chown: %s", info->devname);
[821]750} /* End Function action_permissions */
751
[1765]752static void action_modload(const struct devfsd_notify_struct *info,
[3232]753 const struct config_entry_struct *entry UNUSED_PARAM)
[821]754/* [SUMMARY] Load a module.
755 <info> The devfs change.
756 <entry> The config file entry.
757 [RETURNS] Nothing.
758*/
759{
760 char *argv[6];
761
[1765]762 argv[0] = (char*)MODPROBE;
763 argv[1] = (char*)MODPROBE_SWITCH_1; /* "-k" */
764 argv[2] = (char*)MODPROBE_SWITCH_2; /* "-C" */
765 argv[3] = (char*)CONFIG_MODULES_DEVFS;
766 argv[4] = concat_path_file("/dev", info->devname); /* device */
[821]767 argv[5] = NULL;
768
[2725]769 spawn_and_wait(argv);
[1765]770 free(argv[4]);
[821]771} /* End Function action_modload */
772
[1765]773static void action_execute(const struct devfsd_notify_struct *info,
[3232]774 const struct config_entry_struct *entry,
775 const regmatch_t *regexpr, unsigned int numexpr)
[821]776/* [SUMMARY] Execute a programme.
777 <info> The devfs change.
778 <entry> The config file entry.
[1765]779 <regexpr> The number of subexpression(start, end) offsets within the
[821]780 device name.
781 <numexpr> The number of elements within <<regexpr>>.
782 [RETURNS] Nothing.
783*/
784{
785 unsigned int count;
786 struct get_variable_info gv_info;
787 char *argv[MAX_ARGS + 1];
788 char largv[MAX_ARGS + 1][STRING_LENGTH];
789
790 gv_info.info = info;
791 gv_info.devname = info->devname;
[1765]792 snprintf(gv_info.devpath, sizeof(gv_info.devpath), "%s/%s", mount_point, info->devname);
793 for (count = 0; entry->u.execute.argv[count] != NULL; ++count) {
794 expand_expression(largv[count], STRING_LENGTH,
[821]795 entry->u.execute.argv[count],
796 get_variable, &gv_info,
[1765]797 gv_info.devname, regexpr, numexpr);
[821]798 argv[count] = largv[count];
799 }
800 argv[count] = NULL;
[2725]801 spawn_and_wait(argv);
[821]802} /* End Function action_execute */
803
804
[1765]805static void action_copy(const struct devfsd_notify_struct *info,
[3232]806 const struct config_entry_struct *entry,
807 const regmatch_t *regexpr, unsigned int numexpr)
[821]808/* [SUMMARY] Copy permissions.
809 <info> The devfs change.
810 <entry> The config file entry.
[1765]811 <regexpr> This list of subexpression(start, end) offsets within the
[821]812 device name.
813 <numexpr> The number of elements in <<regexpr>>.
814 [RETURNS] Nothing.
815*/
816{
817 mode_t new_mode;
818 struct get_variable_info gv_info;
819 struct stat source_stat, dest_stat;
820 char source[STRING_LENGTH], destination[STRING_LENGTH];
821 int ret = 0;
822
823 dest_stat.st_mode = 0;
824
[1765]825 if ((info->type == DEVFSD_NOTIFY_CHANGE) && S_ISLNK(info->mode))
[821]826 return;
827 gv_info.info = info;
828 gv_info.devname = info->devname;
829
[1765]830 snprintf(gv_info.devpath, sizeof(gv_info.devpath), "%s/%s", mount_point, info->devname);
831 expand_expression(source, STRING_LENGTH, entry->u.copy.source,
[821]832 get_variable, &gv_info, gv_info.devname,
833 regexpr, numexpr);
834
[1765]835 expand_expression(destination, STRING_LENGTH, entry->u.copy.destination,
[821]836 get_variable, &gv_info, gv_info.devname,
837 regexpr, numexpr);
838
[1765]839 if (!make_dir_tree(destination) || lstat(source, &source_stat) != 0)
[821]840 return;
[1765]841 lstat(destination, &dest_stat);
[821]842 new_mode = source_stat.st_mode & ~S_ISVTX;
843 if (info->type == DEVFSD_NOTIFY_CREATE)
844 new_mode |= S_ISVTX;
[1765]845 else if ((info->type == DEVFSD_NOTIFY_CHANGE) &&(dest_stat.st_mode & S_ISVTX))
[821]846 new_mode |= S_ISVTX;
[1765]847 ret = copy_inode(destination, &dest_stat, new_mode, source, &source_stat);
[821]848 if (ENABLE_DEBUG && ret && (errno != EEXIST))
[1765]849 error_logger(LOG_ERR, "copy_inode: %s to %s", source, destination);
[821]850} /* End Function action_copy */
851
[1765]852static void action_compat(const struct devfsd_notify_struct *info, unsigned int action)
[821]853/* [SUMMARY] Process a compatibility request.
854 <info> The devfs change.
855 <action> The action to take.
856 [RETURNS] Nothing.
857*/
858{
859 int ret;
860 const char *compat_name = NULL;
861 const char *dest_name = info->devname;
[1765]862 const char *ptr;
[821]863 char compat_buf[STRING_LENGTH], dest_buf[STRING_LENGTH];
864 int mode, host, bus, target, lun;
865 unsigned int i;
866 char rewind_;
867 /* 1 to 5 "scsi/" , 6 to 9 "ide/host" */
868 static const char *const fmt[] = {
869 NULL ,
870 "sg/c%db%dt%du%d", /* scsi/generic */
871 "sd/c%db%dt%du%d", /* scsi/disc */
872 "sr/c%db%dt%du%d", /* scsi/cd */
873 "sd/c%db%dt%du%dp%d", /* scsi/part */
874 "st/c%db%dt%du%dm%d%c", /* scsi/mt */
875 "ide/hd/c%db%dt%du%d", /* ide/host/disc */
876 "ide/cd/c%db%dt%du%d", /* ide/host/cd */
877 "ide/hd/c%db%dt%du%dp%d", /* ide/host/part */
878 "ide/mt/c%db%dt%du%d%s", /* ide/host/mt */
879 NULL
880 };
881
882 /* First construct compatibility name */
[1765]883 switch (action) {
[821]884 case AC_MKOLDCOMPAT:
885 case AC_RMOLDCOMPAT:
[1765]886 compat_name = get_old_name(info->devname, info->namelen, compat_buf, info->major, info->minor);
[821]887 break;
888 case AC_MKNEWCOMPAT:
889 case AC_RMNEWCOMPAT:
[1765]890 ptr = bb_basename(info->devname);
891 i = scan_dev_name(info->devname, info->namelen, ptr);
[821]892
893 /* nothing found */
[1765]894 if (i == 0 || i > 9)
[821]895 return;
896
[1765]897 sscanf(info->devname + ((i < 6) ? 5 : 4), "host%d/bus%d/target%d/lun%d/", &host, &bus, &target, &lun);
898 snprintf(dest_buf, sizeof(dest_buf), "../%s", info->devname + (( i > 5) ? 4 : 0));
[821]899 dest_name = dest_buf;
900 compat_name = compat_buf;
901
902
903 /* 1 == scsi/generic 2 == scsi/disc 3 == scsi/cd 6 == ide/host/disc 7 == ide/host/cd */
[1765]904 if (i == 1 || i == 2 || i == 3 || i == 6 || i ==7)
905 sprintf(compat_buf, fmt[i], host, bus, target, lun);
[821]906
907 /* 4 == scsi/part 8 == ide/host/part */
[1765]908 if (i == 4 || i == 8)
909 sprintf(compat_buf, fmt[i], host, bus, target, lun, atoi(ptr + 4));
[821]910
911 /* 5 == scsi/mt */
[1765]912 if (i == 5) {
[821]913 rewind_ = info->devname[info->namelen - 1];
914 if (rewind_ != 'n')
915 rewind_ = '\0';
916 mode=0;
[1765]917 if (ptr[2] == 'l' /*108*/ || ptr[2] == 'm'/*109*/)
[821]918 mode = ptr[2] - 107; /* 1 or 2 */
[1765]919 if (ptr[2] == 'a')
[821]920 mode = 3;
[1765]921 sprintf(compat_buf, fmt[i], host, bus, target, lun, mode, rewind_);
[821]922 }
923
924 /* 9 == ide/host/mt */
[1765]925 if (i == 9)
926 snprintf(compat_buf, sizeof(compat_buf), fmt[i], host, bus, target, lun, ptr + 2);
[821]927 /* esac */
[1765]928 } /* switch (action) */
[821]929
[1765]930 if (compat_name == NULL)
[821]931 return;
932
933 /* Now decide what to do with it */
[1765]934 switch (action) {
[821]935 case AC_MKOLDCOMPAT:
936 case AC_MKNEWCOMPAT:
[1765]937 mksymlink(dest_name, compat_name);
[821]938 break;
939 case AC_RMOLDCOMPAT:
940 case AC_RMNEWCOMPAT:
[1765]941 ret = unlink(compat_name);
[821]942 if (ENABLE_DEBUG && ret)
[1765]943 error_logger(LOG_ERR, "unlink: %s", compat_name);
[821]944 break;
945 /*esac*/
[1765]946 } /* switch (action) */
[821]947} /* End Function action_compat */
948
949static void restore(char *spath, struct stat source_stat, int rootlen)
950{
[1765]951 char *dpath;
[821]952 struct stat dest_stat;
953
954 dest_stat.st_mode = 0;
[1765]955 dpath = concat_path_file(mount_point, spath + rootlen);
956 lstat(dpath, &dest_stat);
957 free(dpath);
958 if (S_ISLNK(source_stat.st_mode) || (source_stat.st_mode & S_ISVTX))
[2725]959 copy_inode(dpath, &dest_stat, (source_stat.st_mode & ~S_ISVTX), spath, &source_stat);
[821]960
[1765]961 if (S_ISDIR(source_stat.st_mode))
[2725]962 dir_operation(RESTORE, spath, rootlen, NULL);
[821]963}
964
965
[1765]966static int copy_inode(const char *destpath, const struct stat *dest_stat,
[821]967 mode_t new_mode,
968 const char *sourcepath, const struct stat *source_stat)
969/* [SUMMARY] Copy an inode.
970 <destpath> The destination path. An existing inode may be deleted.
971 <dest_stat> The destination stat(2) information.
972 <new_mode> The desired new mode for the destination.
973 <sourcepath> The source path.
974 <source_stat> The source stat(2) information.
975 [RETURNS] TRUE on success, else FALSE.
976*/
977{
978 int source_len, dest_len;
979 char source_link[STRING_LENGTH], dest_link[STRING_LENGTH];
980 int fd, val;
981 struct sockaddr_un un_addr;
982 char symlink_val[STRING_LENGTH];
983
[1765]984 if ((source_stat->st_mode & S_IFMT) ==(dest_stat->st_mode & S_IFMT)) {
[821]985 /* Same type */
[1765]986 if (S_ISLNK(source_stat->st_mode)) {
[2725]987 source_len = readlink(sourcepath, source_link, STRING_LENGTH - 1);
988 if ((source_len < 0)
989 || (dest_len = readlink(destpath, dest_link, STRING_LENGTH - 1)) < 0
[1765]990 )
991 return FALSE;
[821]992 source_link[source_len] = '\0';
993 dest_link[dest_len] = '\0';
[1765]994 if ((source_len != dest_len) || (strcmp(source_link, dest_link) != 0)) {
995 unlink(destpath);
996 symlink(source_link, destpath);
[821]997 }
[1765]998 return TRUE;
[821]999 } /* Else not a symlink */
[1765]1000 chmod(destpath, new_mode & ~S_IFMT);
1001 chown(destpath, source_stat->st_uid, source_stat->st_gid);
1002 return TRUE;
[821]1003 }
1004 /* Different types: unlink and create */
[1765]1005 unlink(destpath);
1006 switch (source_stat->st_mode & S_IFMT) {
[821]1007 case S_IFSOCK:
[2725]1008 fd = socket(AF_UNIX, SOCK_STREAM, 0);
1009 if (fd < 0)
[821]1010 break;
1011 un_addr.sun_family = AF_UNIX;
[1765]1012 snprintf(un_addr.sun_path, sizeof(un_addr.sun_path), "%s", destpath);
[2725]1013 val = bind(fd, (struct sockaddr *) &un_addr, (int) sizeof un_addr);
[1765]1014 close(fd);
1015 if (val != 0 || chmod(destpath, new_mode & ~S_IFMT) != 0)
[821]1016 break;
1017 goto do_chown;
1018 case S_IFLNK:
[2725]1019 val = readlink(sourcepath, symlink_val, STRING_LENGTH - 1);
1020 if (val < 0)
[821]1021 break;
1022 symlink_val[val] = '\0';
[1765]1023 if (symlink(symlink_val, destpath) == 0)
1024 return TRUE;
[821]1025 break;
1026 case S_IFREG:
[2725]1027 fd = open(destpath, O_RDONLY | O_CREAT, new_mode & ~S_IFMT);
1028 if (fd < 0)
[821]1029 break;
[1765]1030 close(fd);
1031 if (chmod(destpath, new_mode & ~S_IFMT) != 0)
[821]1032 break;
1033 goto do_chown;
1034 case S_IFBLK:
1035 case S_IFCHR:
1036 case S_IFIFO:
[1765]1037 if (mknod(destpath, new_mode, source_stat->st_rdev) != 0)
[821]1038 break;
1039 goto do_chown;
1040 case S_IFDIR:
[1765]1041 if (mkdir(destpath, new_mode & ~S_IFMT) != 0)
[821]1042 break;
1043do_chown:
[1765]1044 if (chown(destpath, source_stat->st_uid, source_stat->st_gid) == 0)
1045 return TRUE;
[821]1046 /*break;*/
1047 }
[1765]1048 return FALSE;
[821]1049} /* End Function copy_inode */
1050
[1765]1051static void free_config(void)
[821]1052/* [SUMMARY] Free the configuration information.
1053 [RETURNS] Nothing.
1054*/
1055{
1056 struct config_entry_struct *c_entry;
1057 void *next;
1058
[1765]1059 for (c_entry = first_config; c_entry != NULL; c_entry = next) {
[821]1060 unsigned int count;
1061
1062 next = c_entry->next;
[1765]1063 regfree(&c_entry->preg);
1064 if (c_entry->action.what == AC_EXECUTE) {
1065 for (count = 0; count < MAX_ARGS; ++count) {
[821]1066 if (c_entry->u.execute.argv[count] == NULL)
1067 break;
[1765]1068 free(c_entry->u.execute.argv[count]);
[821]1069 }
1070 }
[1765]1071 free(c_entry);
[821]1072 }
1073 first_config = NULL;
1074 last_config = NULL;
1075} /* End Function free_config */
1076
[1765]1077static int get_uid_gid(int flag, const char *string)
[821]1078/* [SUMMARY] Convert a string to a UID or GID value.
1079 <flag> "UID" or "GID".
1080 <string> The string.
1081 [RETURNS] The UID or GID value.
1082*/
1083{
1084 struct passwd *pw_ent;
1085 struct group *grp_ent;
[1765]1086 static const char *msg;
[821]1087
1088 if (ENABLE_DEVFSD_VERBOSE)
[1765]1089 msg = "user";
[821]1090
[1765]1091 if (isdigit(string[0]) ||((string[0] == '-') && isdigit(string[1])))
1092 return atoi(string);
[821]1093
[2725]1094 if (flag == UID && (pw_ent = getpwnam(string)) != NULL)
[1765]1095 return pw_ent->pw_uid;
[821]1096
[1765]1097 if (flag == GID && (grp_ent = getgrnam(string)) != NULL)
1098 return grp_ent->gr_gid;
1099 else if (ENABLE_DEVFSD_VERBOSE)
1100 msg = "group";
[821]1101
[1765]1102 if (ENABLE_DEVFSD_VERBOSE)
[2725]1103 msg_logger(LOG_ERR, "unknown %s: %s, defaulting to %cid=0", msg, string, msg[0]);
[1765]1104 return 0;
[821]1105}/* End Function get_uid_gid */
1106
[1765]1107static mode_t get_mode(const char *string)
[821]1108/* [SUMMARY] Convert a string to a mode value.
1109 <string> The string.
1110 [RETURNS] The mode value.
1111*/
1112{
1113 mode_t mode;
1114 int i;
1115
[1765]1116 if (isdigit(string[0]))
1117 return strtoul(string, NULL, 8);
1118 if (strlen(string) != 9)
[821]1119 msg_logger_and_die(LOG_ERR, "bad mode: %s", string);
1120
1121 mode = 0;
[1765]1122 i = S_IRUSR;
1123 while (i > 0) {
1124 if (string[0] == 'r' || string[0] == 'w' || string[0] == 'x')
1125 mode += i;
1126 i = i / 2;
[821]1127 string++;
1128 }
[1765]1129 return mode;
[821]1130} /* End Function get_mode */
1131
[1765]1132static void signal_handler(int sig)
[821]1133{
1134 caught_signal = TRUE;
1135 if (sig == SIGHUP)
1136 caught_sighup = TRUE;
1137
[1765]1138 info_logger(LOG_INFO, "Caught signal %d", sig);
[821]1139} /* End Function signal_handler */
1140
[1765]1141static const char *get_variable(const char *variable, void *info)
[821]1142{
[1765]1143 static char sbuf[sizeof(int)*3 + 2]; /* sign and NUL */
[2725]1144 static char *hostname;
[1765]1145
[821]1146 struct get_variable_info *gv_info = info;
[1765]1147 const char *field_names[] = {
1148 "hostname", "mntpt", "devpath", "devname",
1149 "uid", "gid", "mode", hostname, mount_point,
1150 gv_info->devpath, gv_info->devname, NULL
1151 };
[821]1152 int i;
1153
[2725]1154 if (!hostname)
1155 hostname = safe_gethostname();
[1765]1156 /* index_in_str_array returns i>=0 */
1157 i = index_in_str_array(field_names, variable);
[821]1158
[1765]1159 if (i > 6 || i < 0 || (i > 1 && gv_info == NULL))
1160 return NULL;
1161 if (i >= 0 && i <= 3)
1162 return field_names[i + 7];
[821]1163
[1765]1164 if (i == 4)
1165 sprintf(sbuf, "%u", gv_info->info->uid);
1166 else if (i == 5)
1167 sprintf(sbuf, "%u", gv_info->info->gid);
1168 else if (i == 6)
1169 sprintf(sbuf, "%o", gv_info->info->mode);
1170 return sbuf;
[821]1171} /* End Function get_variable */
1172
1173static void service(struct stat statbuf, char *path)
1174{
1175 struct devfsd_notify_struct info;
1176
[1765]1177 memset(&info, 0, sizeof info);
[821]1178 info.type = DEVFSD_NOTIFY_REGISTERED;
1179 info.mode = statbuf.st_mode;
[1765]1180 info.major = major(statbuf.st_rdev);
1181 info.minor = minor(statbuf.st_rdev);
[821]1182 info.uid = statbuf.st_uid;
1183 info.gid = statbuf.st_gid;
[1765]1184 snprintf(info.devname, sizeof(info.devname), "%s", path + strlen(mount_point) + 1);
1185 info.namelen = strlen(info.devname);
1186 service_name(&info);
1187 if (S_ISDIR(statbuf.st_mode))
1188 dir_operation(SERVICE, path, 0, NULL);
[821]1189}
1190
1191static void dir_operation(int type, const char * dir_name, int var, unsigned long *event_mask)
1192/* [SUMMARY] Scan a directory tree and generate register events on leaf nodes.
1193 <flag> To choose which function to perform
1194 <dp> The directory pointer. This is closed upon completion.
1195 <dir_name> The name of the directory.
1196 <rootlen> string length parameter.
1197 [RETURNS] Nothing.
1198*/
1199{
1200 struct stat statbuf;
1201 DIR *dp;
1202 struct dirent *de;
[1765]1203 char *path;
[821]1204
[2725]1205 dp = warn_opendir(dir_name);
1206 if (dp == NULL)
[821]1207 return;
1208
[1765]1209 while ((de = readdir(dp)) != NULL) {
[821]1210
[1765]1211 if (de->d_name && DOT_OR_DOTDOT(de->d_name))
[821]1212 continue;
[1765]1213 path = concat_path_file(dir_name, de->d_name);
1214 if (lstat(path, &statbuf) == 0) {
1215 switch (type) {
1216 case SERVICE:
1217 service(statbuf, path);
1218 break;
1219 case RESTORE:
1220 restore(path, statbuf, var);
1221 break;
1222 case READ_CONFIG:
1223 read_config_file(path, var, event_mask);
1224 break;
1225 }
[821]1226 }
[1765]1227 free(path);
[821]1228 }
[1765]1229 closedir(dp);
[821]1230} /* End Function do_scan_and_service */
1231
[1765]1232static int mksymlink(const char *oldpath, const char *newpath)
[821]1233/* [SUMMARY] Create a symlink, creating intervening directories as required.
1234 <oldpath> The string contained in the symlink.
1235 <newpath> The name of the new symlink.
1236 [RETURNS] 0 on success, else -1.
1237*/
1238{
[1765]1239 if (!make_dir_tree(newpath))
1240 return -1;
[821]1241
[1765]1242 if (symlink(oldpath, newpath) != 0) {
[821]1243 if (errno != EEXIST)
[1765]1244 return -1;
[821]1245 }
[1765]1246 return 0;
[821]1247} /* End Function mksymlink */
1248
1249
[1765]1250static int make_dir_tree(const char *path)
[821]1251/* [SUMMARY] Creating intervening directories for a path as required.
[1765]1252 <path> The full pathname(including the leaf node).
[821]1253 [RETURNS] TRUE on success, else FALSE.
1254*/
1255{
[1765]1256 if (bb_make_directory(dirname((char *)path), -1, FILEUTILS_RECUR) == -1)
1257 return FALSE;
1258 return TRUE;
[821]1259} /* End Function make_dir_tree */
1260
1261static int expand_expression(char *output, unsigned int outsize,
[3232]1262 const char *input,
1263 const char *(*get_variable_func)(const char *variable, void *info),
1264 void *info,
1265 const char *devname,
1266 const regmatch_t *ex, unsigned int numexp)
[821]1267/* [SUMMARY] Expand environment variables and regular subexpressions in string.
1268 <output> The output expanded expression is written here.
1269 <length> The size of the output buffer.
1270 <input> The input expression. This may equal <<output>>.
1271 <get_variable> A function which will be used to get variable values. If
1272 this returns NULL, the environment is searched instead. If this is NULL,
1273 only the environment is searched.
1274 <info> An arbitrary pointer passed to <<get_variable>>.
1275 <devname> Device name; specifically, this is the string that contains all
1276 of the regular subexpressions.
1277 <ex> Array of start / end offsets into info->devname for each subexpression
1278 <numexp> Number of regular subexpressions found in <<devname>>.
1279 [RETURNS] TRUE on success, else FALSE.
1280*/
1281{
1282 char temp[STRING_LENGTH];
1283
[1765]1284 if (!st_expr_expand(temp, STRING_LENGTH, input, get_variable_func, info))
1285 return FALSE;
1286 expand_regexp(output, outsize, temp, devname, ex, numexp);
1287 return TRUE;
[821]1288} /* End Function expand_expression */
1289
[1765]1290static void expand_regexp(char *output, size_t outsize, const char *input,
[3232]1291 const char *devname,
1292 const regmatch_t *ex, unsigned int numex)
[821]1293/* [SUMMARY] Expand all occurrences of the regular subexpressions \0 to \9.
1294 <output> The output expanded expression is written here.
1295 <outsize> The size of the output buffer.
1296 <input> The input expression. This may NOT equal <<output>>, because
1297 supporting that would require yet another string-copy. However, it's not
1298 hard to write a simple wrapper function to add this functionality for those
1299 few cases that need it.
1300 <devname> Device name; specifically, this is the string that contains all
1301 of the regular subexpressions.
1302 <ex> An array of start and end offsets into <<devname>>, one for each
1303 subexpression
1304 <numex> Number of subexpressions in the offset-array <<ex>>.
1305 [RETURNS] Nothing.
1306*/
1307{
1308 const char last_exp = '0' - 1 + numex;
1309 int c = -1;
1310
1311 /* Guarantee NULL termination by writing an explicit '\0' character into
1312 the very last byte */
1313 if (outsize)
1314 output[--outsize] = '\0';
1315 /* Copy the input string into the output buffer, replacing '\\' with '\'
1316 and '\0' .. '\9' with subexpressions 0 .. 9, if they exist. Other \x
1317 codes are deleted */
[1765]1318 while ((c != '\0') && (outsize != 0)) {
[821]1319 c = *input;
1320 ++input;
[1765]1321 if (c == '\\') {
[821]1322 c = *input;
1323 ++input;
[1765]1324 if (c != '\\') {
1325 if ((c >= '0') && (c <= last_exp)) {
[821]1326 const regmatch_t *subexp = ex + (c - '0');
1327 unsigned int sublen = subexp->rm_eo - subexp->rm_so;
1328
1329 /* Range checking */
1330 if (sublen > outsize)
1331 sublen = outsize;
[1765]1332 strncpy(output, devname + subexp->rm_so, sublen);
[821]1333 output += sublen;
1334 outsize -= sublen;
1335 }
1336 continue;
1337 }
1338 }
1339 *output = c;
1340 ++output;
1341 --outsize;
1342 } /* while */
1343} /* End Function expand_regexp */
1344
1345
1346/* from compat_name.c */
1347
[2725]1348struct translate_struct {
[1765]1349 const char *match; /* The string to match to(up to length) */
1350 const char *format; /* Format of output, "%s" takes data past match string,
1351 NULL is effectively "%s"(just more efficient) */
[821]1352};
1353
1354static struct translate_struct translate_table[] =
1355{
1356 {"sound/", NULL},
1357 {"printers/", "lp%s"},
1358 {"v4l/", NULL},
1359 {"parports/", "parport%s"},
1360 {"fb/", "fb%s"},
1361 {"netlink/", NULL},
1362 {"loop/", "loop%s"},
1363 {"floppy/", "fd%s"},
1364 {"rd/", "ram%s"},
1365 {"md/", "md%s"}, /* Meta-devices */
1366 {"vc/", "tty%s"},
1367 {"misc/", NULL},
1368 {"isdn/", NULL},
1369 {"pg/", "pg%s"}, /* Parallel port generic ATAPI interface*/
1370 {"i2c/", "i2c-%s"},
1371 {"staliomem/", "staliomem%s"}, /* Stallion serial driver control */
1372 {"tts/E", "ttyE%s"}, /* Stallion serial driver */
1373 {"cua/E", "cue%s"}, /* Stallion serial driver callout */
1374 {"tts/R", "ttyR%s"}, /* Rocketport serial driver */
1375 {"cua/R", "cur%s"}, /* Rocketport serial driver callout */
1376 {"ip2/", "ip2%s"}, /* Computone serial driver control */
1377 {"tts/F", "ttyF%s"}, /* Computone serial driver */
1378 {"cua/F", "cuf%s"}, /* Computone serial driver callout */
1379 {"tts/C", "ttyC%s"}, /* Cyclades serial driver */
1380 {"cua/C", "cub%s"}, /* Cyclades serial driver callout */
1381 {"tts/", "ttyS%s"}, /* Generic serial: must be after others */
1382 {"cua/", "cua%s"}, /* Generic serial: must be after others */
1383 {"input/js", "js%s"}, /* Joystick driver */
1384 {NULL, NULL}
1385};
1386
[1765]1387const char *get_old_name(const char *devname, unsigned int namelen,
[3232]1388 char *buffer, unsigned int major, unsigned int minor)
[821]1389/* [SUMMARY] Translate a kernel-supplied name into an old name.
1390 <devname> The device name provided by the kernel.
1391 <namelen> The length of the name.
1392 <buffer> A buffer that may be used. This should be at least 128 bytes long.
1393 <major> The major number for the device.
1394 <minor> The minor number for the device.
1395 [RETURNS] A pointer to the old name if known, else NULL.
1396*/
1397{
1398 const char *compat_name = NULL;
[1765]1399 const char *ptr;
[821]1400 struct translate_struct *trans;
1401 unsigned int i;
1402 char mode;
1403 int indexx;
1404 const char *pty1;
1405 const char *pty2;
1406 size_t len;
1407 /* 1 to 5 "scsi/" , 6 to 9 "ide/host", 10 sbp/, 11 vcc/, 12 pty/ */
1408 static const char *const fmt[] = {
1409 NULL ,
1410 "sg%u", /* scsi/generic */
1411 NULL, /* scsi/disc */
1412 "sr%u", /* scsi/cd */
1413 NULL, /* scsi/part */
1414 "nst%u%c", /* scsi/mt */
1415 "hd%c" , /* ide/host/disc */
1416 "hd%c" , /* ide/host/cd */
1417 "hd%c%s", /* ide/host/part */
1418 "%sht%d", /* ide/host/mt */
1419 "sbpcd%u", /* sbp/ */
1420 "vcs%s", /* vcc/ */
1421 "%cty%c%c", /* pty/ */
1422 NULL
1423 };
1424
[1765]1425 for (trans = translate_table; trans->match != NULL; ++trans) {
[3232]1426 len = strlen(trans->match);
[821]1427
[1765]1428 if (strncmp(devname, trans->match, len) == 0) {
[821]1429 if (trans->format == NULL)
[1765]1430 return devname + len;
1431 sprintf(buffer, trans->format, devname + len);
1432 return buffer;
[821]1433 }
1434 }
1435
[1765]1436 ptr = bb_basename(devname);
[821]1437 i = scan_dev_name(devname, namelen, ptr);
1438
[1765]1439 if (i > 0 && i < 13)
[821]1440 compat_name = buffer;
1441 else
1442 return NULL;
1443
1444 /* 1 == scsi/generic, 3 == scsi/cd, 10 == sbp/ */
[1765]1445 if (i == 1 || i == 3 || i == 10)
1446 sprintf(buffer, fmt[i], minor);
[821]1447
1448 /* 2 ==scsi/disc, 4 == scsi/part */
[1765]1449 if (i == 2 || i == 4)
[2725]1450 compat_name = write_old_sd_name(buffer, major, minor, ((i == 2) ? "" : (ptr + 4)));
[821]1451
1452 /* 5 == scsi/mt */
[1765]1453 if (i == 5) {
[821]1454 mode = ptr[2];
1455 if (mode == 'n')
1456 mode = '\0';
[1765]1457 sprintf(buffer, fmt[i], minor & 0x1f, mode);
[821]1458 if (devname[namelen - 1] != 'n')
1459 ++compat_name;
1460 }
1461 /* 6 == ide/host/disc, 7 == ide/host/cd, 8 == ide/host/part */
[1765]1462 if (i == 6 || i == 7 || i == 8)
[821]1463 /* last arg should be ignored for i == 6 or i== 7 */
[1765]1464 sprintf(buffer, fmt[i] , get_old_ide_name(major, minor), ptr + 4);
[821]1465
1466 /* 9 == ide/host/mt */
[1765]1467 if (i == 9)
1468 sprintf(buffer, fmt[i], ptr + 2, minor & 0x7f);
[821]1469
1470 /* 11 == vcc/ */
[1765]1471 if (i == 11) {
1472 sprintf(buffer, fmt[i], devname + 4);
[821]1473 if (buffer[3] == '0')
1474 buffer[3] = '\0';
1475 }
1476 /* 12 == pty/ */
[1765]1477 if (i == 12) {
[821]1478 pty1 = "pqrstuvwxyzabcde";
1479 pty2 = "0123456789abcdef";
[1765]1480 indexx = atoi(devname + 5);
1481 sprintf(buffer, fmt[i], (devname[4] == 'm') ? 'p' : 't', pty1[indexx >> 4], pty2[indexx & 0x0f]);
[821]1482 }
[1765]1483 return compat_name;
[821]1484} /* End Function get_old_name */
1485
[1765]1486static char get_old_ide_name(unsigned int major, unsigned int minor)
[821]1487/* [SUMMARY] Get the old IDE name for a device.
1488 <major> The major number for the device.
1489 <minor> The minor number for the device.
1490 [RETURNS] The drive letter.
1491*/
1492{
[1765]1493 char letter = 'y'; /* 121 */
1494 char c = 'a'; /* 97 */
1495 int i = IDE0_MAJOR;
[821]1496
1497 /* I hope it works like the previous code as it saves a few bytes. Tito ;P */
1498 do {
[1765]1499 if (i == IDE0_MAJOR || i == IDE1_MAJOR || i == IDE2_MAJOR
1500 || i == IDE3_MAJOR || i == IDE4_MAJOR || i == IDE5_MAJOR
1501 || i == IDE6_MAJOR || i == IDE7_MAJOR || i == IDE8_MAJOR
1502 || i == IDE9_MAJOR
1503 ) {
1504 if ((unsigned int)i == major) {
1505 letter = c;
[821]1506 break;
1507 }
[1765]1508 c += 2;
[821]1509 }
1510 i++;
[1765]1511 } while (i <= IDE9_MAJOR);
[821]1512
1513 if (minor > 63)
1514 ++letter;
[1765]1515 return letter;
[821]1516} /* End Function get_old_ide_name */
1517
[1765]1518static char *write_old_sd_name(char *buffer,
[821]1519 unsigned int major, unsigned int minor,
[1765]1520 const char *part)
[821]1521/* [SUMMARY] Write the old SCSI disc name to a buffer.
1522 <buffer> The buffer to write to.
1523 <major> The major number for the device.
1524 <minor> The minor number for the device.
1525 <part> The partition string. Must be "" for a whole-disc entry.
1526 [RETURNS] A pointer to the buffer on success, else NULL.
1527*/
1528{
1529 unsigned int disc_index;
1530
[1765]1531 if (major == 8) {
1532 sprintf(buffer, "sd%c%s", 'a' + (minor >> 4), part);
1533 return buffer;
[821]1534 }
[1765]1535 if ((major > 64) && (major < 72)) {
1536 disc_index = ((major - 64) << 4) +(minor >> 4);
[821]1537 if (disc_index < 26)
[1765]1538 sprintf(buffer, "sd%c%s", 'a' + disc_index, part);
[821]1539 else
[1765]1540 sprintf(buffer, "sd%c%c%s", 'a' +(disc_index / 26) - 1, 'a' + disc_index % 26, part);
1541 return buffer;
[821]1542 }
[1765]1543 return NULL;
[821]1544} /* End Function write_old_sd_name */
1545
1546
1547/* expression.c */
1548
1549/*EXPERIMENTAL_FUNCTION*/
1550
[1765]1551int st_expr_expand(char *output, unsigned int length, const char *input,
[3232]1552 const char *(*get_variable_func)(const char *variable,
1553 void *info),
1554 void *info)
[821]1555/* [SUMMARY] Expand an expression using Borne Shell-like unquoted rules.
1556 <output> The output expanded expression is written here.
1557 <length> The size of the output buffer.
1558 <input> The input expression. This may equal <<output>>.
1559 <get_variable> A function which will be used to get variable values. If
1560 this returns NULL, the environment is searched instead. If this is NULL,
1561 only the environment is searched.
1562 <info> An arbitrary pointer passed to <<get_variable>>.
1563 [RETURNS] TRUE on success, else FALSE.
1564*/
1565{
1566 char ch;
1567 unsigned int len;
1568 unsigned int out_pos = 0;
1569 const char *env;
1570 const char *ptr;
1571 struct passwd *pwent;
1572 char buffer[BUFFER_SIZE], tmp[STRING_LENGTH];
1573
1574 if (length > BUFFER_SIZE)
1575 length = BUFFER_SIZE;
[1765]1576 for (; TRUE; ++input) {
1577 switch (ch = *input) {
[821]1578 case '$':
1579 /* Variable expansion */
[1765]1580 input = expand_variable(buffer, length, &out_pos, ++input, get_variable_func, info);
[821]1581 if (input == NULL)
[1765]1582 return FALSE;
[821]1583 break;
1584 case '~':
1585 /* Home directory expansion */
1586 ch = input[1];
[1765]1587 if (isspace(ch) ||(ch == '/') ||(ch == '\0')) {
[821]1588 /* User's own home directory: leave separator for next time */
[2725]1589 env = getenv("HOME");
1590 if (env == NULL) {
[1765]1591 info_logger(LOG_INFO, bb_msg_variable_not_found, "HOME");
1592 return FALSE;
[821]1593 }
[1765]1594 len = strlen(env);
[821]1595 if (len + out_pos >= length)
1596 goto st_expr_expand_out;
[1765]1597 memcpy(buffer + out_pos, env, len + 1);
[821]1598 out_pos += len;
1599 continue;
1600 }
1601 /* Someone else's home directory */
[1765]1602 for (ptr = ++input; !isspace(ch) && (ch != '/') && (ch != '\0'); ch = *++ptr)
1603 /* VOID */;
[821]1604 len = ptr - input;
1605 if (len >= sizeof tmp)
1606 goto st_expr_expand_out;
[1765]1607 safe_memcpy(tmp, input, len);
[821]1608 input = ptr - 1;
[2725]1609 pwent = getpwnam(tmp);
1610 if (pwent == NULL) {
[1765]1611 info_logger(LOG_INFO, "no pwent for: %s", tmp);
1612 return FALSE;
[821]1613 }
[1765]1614 len = strlen(pwent->pw_dir);
[821]1615 if (len + out_pos >= length)
1616 goto st_expr_expand_out;
[1765]1617 memcpy(buffer + out_pos, pwent->pw_dir, len + 1);
[821]1618 out_pos += len;
1619 break;
1620 case '\0':
1621 /* Falltrough */
1622 default:
1623 if (out_pos >= length)
1624 goto st_expr_expand_out;
1625 buffer[out_pos++] = ch;
[1765]1626 if (ch == '\0') {
1627 memcpy(output, buffer, out_pos);
1628 return TRUE;
[821]1629 }
1630 break;
1631 /* esac */
1632 }
1633 }
[1765]1634 return FALSE;
[821]1635st_expr_expand_out:
[1765]1636 info_logger(LOG_INFO, bb_msg_small_buffer);
1637 return FALSE;
[821]1638} /* End Function st_expr_expand */
1639
1640
1641/* Private functions follow */
1642
[1765]1643static const char *expand_variable(char *buffer, unsigned int length,
[3232]1644 unsigned int *out_pos, const char *input,
1645 const char *(*func)(const char *variable,
1646 void *info),
1647 void *info)
[821]1648/* [SUMMARY] Expand a variable.
1649 <buffer> The buffer to write to.
1650 <length> The length of the output buffer.
1651 <out_pos> The current output position. This is updated.
1652 <input> A pointer to the input character pointer.
1653 <func> A function which will be used to get variable values. If this
1654 returns NULL, the environment is searched instead. If this is NULL, only
1655 the environment is searched.
1656 <info> An arbitrary pointer passed to <<func>>.
1657 <errfp> Diagnostic messages are written here.
1658 [RETURNS] A pointer to the end of this subexpression on success, else NULL.
1659*/
1660{
1661 char ch;
1662 int len;
1663 unsigned int open_braces;
1664 const char *env, *ptr;
1665 char tmp[STRING_LENGTH];
1666
1667 ch = input[0];
[1765]1668 if (ch == '$') {
[821]1669 /* Special case for "$$": PID */
[2725]1670 sprintf(tmp, "%d", (int) getpid());
[1765]1671 len = strlen(tmp);
[821]1672 if (len + *out_pos >= length)
1673 goto expand_variable_out;
1674
[1765]1675 memcpy(buffer + *out_pos, tmp, len + 1);
[821]1676 out_pos += len;
[1765]1677 return input;
[821]1678 }
1679 /* Ordinary variable expansion, possibly in braces */
[1765]1680 if (ch != '{') {
[821]1681 /* Simple variable expansion */
[1765]1682 for (ptr = input; isalnum(ch) || (ch == '_') || (ch == ':'); ch = *++ptr)
1683 /* VOID */;
[821]1684 len = ptr - input;
1685 if ((size_t)len >= sizeof tmp)
1686 goto expand_variable_out;
1687
[1765]1688 safe_memcpy(tmp, input, len);
[821]1689 input = ptr - 1;
[2725]1690 env = get_variable_v2(tmp, func, info);
1691 if (env == NULL) {
[1765]1692 info_logger(LOG_INFO, bb_msg_variable_not_found, tmp);
1693 return NULL;
[821]1694 }
[1765]1695 len = strlen(env);
[821]1696 if (len + *out_pos >= length)
1697 goto expand_variable_out;
1698
[1765]1699 memcpy(buffer + *out_pos, env, len + 1);
[821]1700 *out_pos += len;
[1765]1701 return input;
[821]1702 }
1703 /* Variable in braces: check for ':' tricks */
1704 ch = *++input;
[1765]1705 for (ptr = input; isalnum(ch) || (ch == '_'); ch = *++ptr)
[821]1706 /* VOID */;
[1765]1707 if (ch == '}') {
[821]1708 /* Must be simple variable expansion with "${var}" */
1709 len = ptr - input;
1710 if ((size_t)len >= sizeof tmp)
1711 goto expand_variable_out;
1712
[1765]1713 safe_memcpy(tmp, input, len);
1714 ptr = expand_variable(buffer, length, out_pos, tmp, func, info);
[821]1715 if (ptr == NULL)
[1765]1716 return NULL;
1717 return input + len;
[821]1718 }
[1765]1719 if (ch != ':' || ptr[1] != '-') {
1720 info_logger(LOG_INFO, "illegal char in var name");
1721 return NULL;
[821]1722 }
1723 /* It's that handy "${var:-word}" expression. Check if var is defined */
1724 len = ptr - input;
1725 if ((size_t)len >= sizeof tmp)
1726 goto expand_variable_out;
1727
[1765]1728 safe_memcpy(tmp, input, len);
[821]1729 /* Move input pointer to ':' */
1730 input = ptr;
1731 /* First skip to closing brace, taking note of nested expressions */
1732 ptr += 2;
1733 ch = ptr[0];
[1765]1734 for (open_braces = 1; open_braces > 0; ch = *++ptr) {
1735 switch (ch) {
[821]1736 case '{':
1737 ++open_braces;
1738 break;
1739 case '}':
1740 --open_braces;
1741 break;
1742 case '\0':
[2725]1743 info_logger(LOG_INFO, "\"}\" not found in: %s", input);
[1765]1744 return NULL;
[821]1745 default:
1746 break;
1747 }
1748 }
1749 --ptr;
1750 /* At this point ptr should point to closing brace of "${var:-word}" */
[2725]1751 env = get_variable_v2(tmp, func, info);
1752 if (env != NULL) {
[821]1753 /* Found environment variable, so skip the input to the closing brace
1754 and return the variable */
1755 input = ptr;
[1765]1756 len = strlen(env);
[821]1757 if (len + *out_pos >= length)
1758 goto expand_variable_out;
1759
[1765]1760 memcpy(buffer + *out_pos, env, len + 1);
[821]1761 *out_pos += len;
[1765]1762 return input;
[821]1763 }
1764 /* Environment variable was not found, so process word. Advance input
1765 pointer to start of word in "${var:-word}" */
1766 input += 2;
1767 len = ptr - input;
1768 if ((size_t)len >= sizeof tmp)
1769 goto expand_variable_out;
1770
[1765]1771 safe_memcpy(tmp, input, len);
[821]1772 input = ptr;
[1765]1773 if (!st_expr_expand(tmp, STRING_LENGTH, tmp, func, info))
1774 return NULL;
1775 len = strlen(tmp);
[821]1776 if (len + *out_pos >= length)
1777 goto expand_variable_out;
1778
[1765]1779 memcpy(buffer + *out_pos, tmp, len + 1);
[821]1780 *out_pos += len;
[1765]1781 return input;
[821]1782expand_variable_out:
[1765]1783 info_logger(LOG_INFO, bb_msg_small_buffer);
1784 return NULL;
[821]1785} /* End Function expand_variable */
1786
1787
[1765]1788static const char *get_variable_v2(const char *variable,
[3232]1789 const char *(*func)(const char *variable, void *info),
1790 void *info)
[821]1791/* [SUMMARY] Get a variable from the environment or .
1792 <variable> The variable name.
1793 <func> A function which will be used to get the variable. If this returns
1794 NULL, the environment is searched instead. If this is NULL, only the
1795 environment is searched.
1796 [RETURNS] The value of the variable on success, else NULL.
1797*/
1798{
1799 const char *value;
1800
[1765]1801 if (func != NULL) {
1802 value = (*func)(variable, info);
[821]1803 if (value != NULL)
[1765]1804 return value;
[821]1805 }
[1765]1806 return getenv(variable);
[821]1807} /* End Function get_variable */
1808
1809/* END OF CODE */
Note: See TracBrowser for help on using the repository browser.