aboutsummaryrefslogtreecommitdiff
path: root/util-linux
diff options
context:
space:
mode:
authorRon Yorston <rmy@pobox.com>2017-07-18 15:58:52 +0100
committerRon Yorston <rmy@pobox.com>2017-07-18 15:58:52 +0100
commitb680f05ad449505e3d914bebd4c8d83bf768c094 (patch)
treec08ded13d430b0e7e0104f2eb594fad190ce98a3 /util-linux
parent258200ff81d5a9da54dab35acf36213eff1e399b (diff)
parent513a2457b65894b10b9fd6aa8753fca59eced08c (diff)
downloadbusybox-w32-b680f05ad449505e3d914bebd4c8d83bf768c094.tar.gz
busybox-w32-b680f05ad449505e3d914bebd4c8d83bf768c094.tar.bz2
busybox-w32-b680f05ad449505e3d914bebd4c8d83bf768c094.zip
Merge branch 'busybox' into merge
Diffstat (limited to 'util-linux')
-rw-r--r--util-linux/blkdiscard.c7
-rw-r--r--util-linux/fdisk.c3
-rwxr-xr-xutil-linux/mkfs_ext2_test.sh12
-rw-r--r--util-linux/mount.c3
-rw-r--r--util-linux/setpriv.c451
-rw-r--r--util-linux/unshare.c7
6 files changed, 473 insertions, 10 deletions
diff --git a/util-linux/blkdiscard.c b/util-linux/blkdiscard.c
index af0bc946d..85039c5d0 100644
--- a/util-linux/blkdiscard.c
+++ b/util-linux/blkdiscard.c
@@ -28,6 +28,13 @@
28#include "libbb.h" 28#include "libbb.h"
29#include <linux/fs.h> 29#include <linux/fs.h>
30 30
31#ifndef BLKDISCARD
32#define BLKDISCARD 0x1277
33#endif
34#ifndef BLKSECDISCARD
35#define BLKSECDISCARD 0x127d
36#endif
37
31int blkdiscard_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; 38int blkdiscard_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
32int blkdiscard_main(int argc UNUSED_PARAM, char **argv) 39int blkdiscard_main(int argc UNUSED_PARAM, char **argv)
33{ 40{
diff --git a/util-linux/fdisk.c b/util-linux/fdisk.c
index 916d4e30e..4467525c7 100644
--- a/util-linux/fdisk.c
+++ b/util-linux/fdisk.c
@@ -185,6 +185,8 @@ struct hd_geometry {
185 185
186#define HDIO_GETGEO 0x0301 /* get device geometry */ 186#define HDIO_GETGEO 0x0301 /* get device geometry */
187 187
188/* TODO: #if ENABLE_FEATURE_FDISK_WRITABLE */
189/* (currently fdisk_sun/sgi.c do not have proper WRITABLE #ifs) */
188static const char msg_building_new_label[] ALIGN1 = 190static const char msg_building_new_label[] ALIGN1 =
189"Building a new %s. Changes will remain in memory only,\n" 191"Building a new %s. Changes will remain in memory only,\n"
190"until you decide to write them. After that the previous content\n" 192"until you decide to write them. After that the previous content\n"
@@ -192,6 +194,7 @@ static const char msg_building_new_label[] ALIGN1 =
192 194
193static const char msg_part_already_defined[] ALIGN1 = 195static const char msg_part_already_defined[] ALIGN1 =
194"Partition %u is already defined, delete it before re-adding\n"; 196"Partition %u is already defined, delete it before re-adding\n";
197/* #endif */
195 198
196 199
197struct partition { 200struct partition {
diff --git a/util-linux/mkfs_ext2_test.sh b/util-linux/mkfs_ext2_test.sh
index f5347cc04..df22963f2 100755
--- a/util-linux/mkfs_ext2_test.sh
+++ b/util-linux/mkfs_ext2_test.sh
@@ -47,7 +47,7 @@ test_mke2fs() {
47kilobytes=60 47kilobytes=60
48while true; do 48while true; do
49 test_mke2fs || exit 1 49 test_mke2fs || exit 1
50 : $((kilobytes++)) 50 kilobytes=$((kilobytes+1))
51 test $kilobytes = 200 && break 51 test $kilobytes = 200 && break
52done 52done
53 53
@@ -56,7 +56,7 @@ done
56kilobytes=$((1 * 8*1024 - 50)) 56kilobytes=$((1 * 8*1024 - 50))
57while true; do 57while true; do
58 test_mke2fs || exit 1 58 test_mke2fs || exit 1
59 : $((kilobytes++)) 59 kilobytes=$((kilobytes+1))
60 test $kilobytes = $((1 * 8*1024 + 300)) && break 60 test $kilobytes = $((1 * 8*1024 + 300)) && break
61done 61done
62 62
@@ -65,7 +65,7 @@ done
65kilobytes=$((2 * 8*1024 - 50)) 65kilobytes=$((2 * 8*1024 - 50))
66while true; do 66while true; do
67 test_mke2fs || exit 1 67 test_mke2fs || exit 1
68 : $((kilobytes++)) 68 kilobytes=$((kilobytes+1))
69 test $kilobytes = $((2 * 8*1024 + 400)) && break 69 test $kilobytes = $((2 * 8*1024 + 400)) && break
70done 70done
71 71
@@ -74,7 +74,7 @@ done
74kilobytes=$((3 * 8*1024 - 50)) 74kilobytes=$((3 * 8*1024 - 50))
75while true; do 75while true; do
76 test_mke2fs || exit 1 76 test_mke2fs || exit 1
77 : $((kilobytes++)) 77 kilobytes=$((kilobytes+1))
78 test $kilobytes = $((3 * 8*1024 + 500)) && break 78 test $kilobytes = $((3 * 8*1024 + 500)) && break
79done 79done
80 80
@@ -83,7 +83,7 @@ done
83kilobytes=$((4 * 8*1024 - 50)) 83kilobytes=$((4 * 8*1024 - 50))
84while true; do 84while true; do
85 test_mke2fs || exit 1 85 test_mke2fs || exit 1
86 : $((kilobytes++)) 86 kilobytes=$((kilobytes+1))
87 test $kilobytes = $((4 * 8*1024 + 600)) && break 87 test $kilobytes = $((4 * 8*1024 + 600)) && break
88done 88done
89 89
@@ -92,7 +92,7 @@ done
92kilobytes=$((5 * 8*1024 - 50)) 92kilobytes=$((5 * 8*1024 - 50))
93while true; do 93while true; do
94 test_mke2fs || exit 1 94 test_mke2fs || exit 1
95 : $((kilobytes++)) 95 kilobytes=$((kilobytes+1))
96 test $kilobytes = $((5 * 8*1024 + 700)) && break 96 test $kilobytes = $((5 * 8*1024 + 700)) && break
97done 97done
98exit 98exit
diff --git a/util-linux/mount.c b/util-linux/mount.c
index 6bb18524d..5fcc7958c 100644
--- a/util-linux/mount.c
+++ b/util-linux/mount.c
@@ -246,7 +246,8 @@
246/* This is just a warning of a common mistake. Possibly this should be a 246/* This is just a warning of a common mistake. Possibly this should be a
247 * uclibc faq entry rather than in busybox... */ 247 * uclibc faq entry rather than in busybox... */
248# if defined(__UCLIBC__) && ! defined(__UCLIBC_HAS_RPC__) 248# if defined(__UCLIBC__) && ! defined(__UCLIBC_HAS_RPC__)
249# error "You need to build uClibc with UCLIBC_HAS_RPC for NFS support" 249# warning "You probably need to build uClibc with UCLIBC_HAS_RPC for NFS support"
250 /* not #error, since user may be using e.g. libtirpc instead */
250# endif 251# endif
251# include <rpc/rpc.h> 252# include <rpc/rpc.h>
252# include <rpc/pmap_prot.h> 253# include <rpc/pmap_prot.h>
diff --git a/util-linux/setpriv.c b/util-linux/setpriv.c
new file mode 100644
index 000000000..3d8dfea52
--- /dev/null
+++ b/util-linux/setpriv.c
@@ -0,0 +1,451 @@
1/* vi: set sw=4 ts=4: */
2/*
3 * setpriv implementation for busybox based on linux-utils-ng 2.29
4 *
5 * Copyright (C) 2017 by <assafgordon@gmail.com>
6 *
7 * Licensed under GPLv2 or later, see file LICENSE in this source tree.
8 *
9 */
10//config:config SETPRIV
11//config: bool "setpriv"
12//config: default y
13//config: select PLATFORM_LINUX
14//config: select LONG_OPTS
15//config: help
16//config: Run a program with different Linux privilege settings.
17//config: Requires kernel >= 3.5
18//config:
19//config:config FEATURE_SETPRIV_DUMP
20//config: bool "Support dumping current privilege state"
21//config: default y
22//config: depends on SETPRIV
23//config: help
24//config: Enables the "--dump" switch to print out the current privilege
25//config: state. This is helpful for diagnosing problems.
26//config:
27//config:config FEATURE_SETPRIV_CAPABILITIES
28//config: bool "Support capabilities"
29//config: default y
30//config: depends on SETPRIV
31//config: help
32//config: Capabilities can be used to grant processes additional rights
33//config: without the necessity to always execute as the root user.
34//config: Enabling this option enables "--dump" to show information on
35//config: capabilities.
36//config:
37//config:config FEATURE_SETPRIV_CAPABILITY_NAMES
38//config: bool "Support capability names"
39//config: default y
40//config: depends on SETPRIV && FEATURE_SETPRIV_CAPABILITIES
41//config: help
42//config: Capabilities can be either referenced via a human-readble name,
43//config: e.g. "net_admin", or using their index, e.g. "cap_12". Enabling
44//config: this option allows using the human-readable names in addition to
45//config: the index-based names.
46
47//applet:IF_SETPRIV(APPLET(setpriv, BB_DIR_BIN, BB_SUID_DROP))
48
49//kbuild:lib-$(CONFIG_SETPRIV) += setpriv.o
50
51//usage:#define setpriv_trivial_usage
52//usage: "[OPTIONS] PROG [ARGS]"
53//usage:#define setpriv_full_usage "\n\n"
54//usage: "Run PROG with different privilege settings\n"
55//usage: IF_FEATURE_SETPRIV_DUMP(
56//usage: "\n-d,--dump Show current capabilities"
57//usage: )
58//usage: "\n--nnp,--no-new-privs Ignore setuid/setgid bits and file capabilities"
59//usage: IF_FEATURE_SETPRIV_CAPABILITIES(
60//usage: "\n--inh-caps CAP,CAP Set inheritable capabilities"
61//usage: "\n--ambient-caps CAP,CAP Set ambient capabilities"
62//usage: )
63
64//setpriv from util-linux 2.28:
65// -d, --dump show current state (and do not exec anything)
66// --nnp, --no-new-privs disallow granting new privileges
67// --inh-caps <caps,...> set inheritable capabilities
68// --bounding-set <caps> set capability bounding set
69// --ruid <uid> set real uid
70// --euid <uid> set effective uid
71// --rgid <gid> set real gid
72// --egid <gid> set effective gid
73// --reuid <uid> set real and effective uid
74// --regid <gid> set real and effective gid
75// --clear-groups clear supplementary groups
76// --keep-groups keep supplementary groups
77// --groups <group,...> set supplementary groups
78// --securebits <bits> set securebits
79// --selinux-label <label> set SELinux label
80// --apparmor-profile <pr> set AppArmor profile
81
82#if ENABLE_FEATURE_SETPRIV_CAPABILITIES
83#include <linux/capability.h>
84// #include <sys/capability.h>
85// This header is in libcap, but the functions are in libc.
86// Comment in the header says this above capset/capget:
87/* system calls - look to libc for function to system call mapping */
88extern int capset(cap_user_header_t header, cap_user_data_t data);
89extern int capget(cap_user_header_t header, const cap_user_data_t data);
90// so for bbox, let's just repeat the declarations.
91// This way, libcap needs not be installed in build environment.
92#endif
93#include <sys/prctl.h>
94#include "libbb.h"
95
96#ifndef PR_CAPBSET_READ
97#define PR_CAPBSET_READ 23
98#endif
99
100#ifndef PR_SET_NO_NEW_PRIVS
101#define PR_SET_NO_NEW_PRIVS 38
102#endif
103
104#ifndef PR_GET_NO_NEW_PRIVS
105#define PR_GET_NO_NEW_PRIVS 39
106#endif
107
108#ifndef PR_CAP_AMBIENT
109#define PR_CAP_AMBIENT 47
110#define PR_CAP_AMBIENT_IS_SET 1
111#define PR_CAP_AMBIENT_RAISE 2
112#define PR_CAP_AMBIENT_LOWER 3
113#endif
114
115enum {
116 IF_FEATURE_SETPRIV_DUMP(OPTBIT_DUMP,)
117 IF_FEATURE_SETPRIV_CAPABILITIES(OPTBIT_INH,)
118 IF_FEATURE_SETPRIV_CAPABILITIES(OPTBIT_AMB,)
119 OPTBIT_NNP,
120
121 IF_FEATURE_SETPRIV_DUMP(OPT_DUMP = (1 << OPTBIT_DUMP),)
122 IF_FEATURE_SETPRIV_CAPABILITIES(OPT_INH = (1 << OPTBIT_INH),)
123 IF_FEATURE_SETPRIV_CAPABILITIES(OPT_AMB = (1 << OPTBIT_AMB),)
124 OPT_NNP = (1 << OPTBIT_NNP),
125};
126
127#if ENABLE_FEATURE_SETPRIV_CAPABILITIES
128struct caps {
129 struct __user_cap_header_struct header;
130 cap_user_data_t data;
131 int u32s;
132};
133
134# if ENABLE_FEATURE_SETPRIV_CAPABILITY_NAMES
135static const char *const capabilities[] = {
136 "chown",
137 "dac_override",
138 "dac_read_search",
139 "fowner",
140 "fsetid",
141 "kill",
142 "setgid",
143 "setuid",
144 "setpcap",
145 "linux_immutable",
146 "net_bind_service",
147 "net_broadcast",
148 "net_admin",
149 "net_raw",
150 "ipc_lock",
151 "ipc_owner",
152 "sys_module",
153 "sys_rawio",
154 "sys_chroot",
155 "sys_ptrace",
156 "sys_pacct",
157 "sys_admin",
158 "sys_boot",
159 "sys_nice",
160 "sys_resource",
161 "sys_time",
162 "sys_tty_config",
163 "mknod",
164 "lease",
165 "audit_write",
166 "audit_control",
167 "setfcap",
168 "mac_override",
169 "mac_admin",
170 "syslog",
171 "wake_alarm",
172 "block_suspend",
173 "audit_read",
174};
175# endif /* FEATURE_SETPRIV_CAPABILITY_NAMES */
176
177static void getcaps(struct caps *caps)
178{
179 static const uint8_t versions[] = {
180 _LINUX_CAPABILITY_U32S_3, /* = 2 (fits into byte) */
181 _LINUX_CAPABILITY_U32S_2, /* = 2 */
182 _LINUX_CAPABILITY_U32S_1, /* = 1 */
183 };
184 int i;
185
186 caps->header.pid = 0;
187 for (i = 0; i < ARRAY_SIZE(versions); i++) {
188 caps->header.version = versions[i];
189 if (capget(&caps->header, NULL) == 0)
190 goto got_it;
191 }
192 bb_simple_perror_msg_and_die("capget");
193 got_it:
194
195 switch (caps->header.version) {
196 case _LINUX_CAPABILITY_VERSION_1:
197 caps->u32s = _LINUX_CAPABILITY_U32S_1;
198 break;
199 case _LINUX_CAPABILITY_VERSION_2:
200 caps->u32s = _LINUX_CAPABILITY_U32S_2;
201 break;
202 case _LINUX_CAPABILITY_VERSION_3:
203 caps->u32s = _LINUX_CAPABILITY_U32S_3;
204 break;
205 default:
206 bb_error_msg_and_die("unsupported capability version");
207 }
208
209 caps->data = xmalloc(sizeof(caps->data[0]) * caps->u32s);
210 if (capget(&caps->header, caps->data) < 0)
211 bb_simple_perror_msg_and_die("capget");
212}
213
214static void parse_cap(unsigned long *index, const char *cap)
215{
216 unsigned long i;
217
218 switch (cap[0]) {
219 case '-':
220 break;
221 case '+':
222 break;
223 default:
224 bb_error_msg_and_die("invalid capability '%s'", cap);
225 break;
226 }
227
228 cap++;
229 if ((sscanf(cap, "cap_%lu", &i)) == 1) {
230 if (!cap_valid(i))
231 bb_error_msg_and_die("unsupported capability '%s'", cap);
232 *index = i;
233 return;
234 }
235
236# if ENABLE_FEATURE_SETPRIV_CAPABILITY_NAMES
237 for (i = 0; i < ARRAY_SIZE(capabilities); i++) {
238 if (strcmp(capabilities[i], cap) != 0)
239 continue;
240
241 if (!cap_valid(i))
242 bb_error_msg_and_die("unsupported capability '%s'", cap);
243 *index = i;
244 return;
245 }
246# endif
247
248 bb_error_msg_and_die("unknown capability '%s'", cap);
249}
250
251static void set_inh_caps(char *capstring)
252{
253 struct caps caps;
254
255 getcaps(&caps);
256
257 capstring = strtok(capstring, ",");
258 while (capstring) {
259 unsigned long cap;
260
261 parse_cap(&cap, capstring);
262 if (CAP_TO_INDEX(cap) >= caps.u32s)
263 bb_error_msg_and_die("invalid capability cap");
264
265 if (capstring[0] == '+')
266 caps.data[CAP_TO_INDEX(cap)].inheritable |= CAP_TO_MASK(cap);
267 else
268 caps.data[CAP_TO_INDEX(cap)].inheritable &= ~CAP_TO_MASK(cap);
269 capstring = strtok(NULL, ",");
270 }
271
272 if ((capset(&caps.header, caps.data)) < 0)
273 bb_perror_msg_and_die("capset");
274
275 if (ENABLE_FEATURE_CLEAN_UP)
276 free(caps.data);
277}
278
279static void set_ambient_caps(char *string)
280{
281 char *cap;
282
283 cap = strtok(string, ",");
284 while (cap) {
285 unsigned long index;
286
287 parse_cap(&index, cap);
288 if (cap[0] == '+') {
289 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, index, 0, 0) < 0)
290 bb_perror_msg("cap_ambient_raise");
291 } else {
292 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_LOWER, index, 0, 0) < 0)
293 bb_perror_msg("cap_ambient_lower");
294 }
295 cap = strtok(NULL, ",");
296 }
297}
298#endif /* FEATURE_SETPRIV_CAPABILITIES */
299
300#if ENABLE_FEATURE_SETPRIV_DUMP
301# if ENABLE_FEATURE_SETPRIV_CAPABILITY_NAMES
302static void printf_cap(const char *pfx, unsigned cap_no)
303{
304 if (cap_no < ARRAY_SIZE(capabilities)) {
305 printf("%s%s", pfx, capabilities[cap_no]);
306 return;
307 }
308 printf("%scap_%u", pfx, cap_no);
309}
310# else
311# define printf_cap(pfx, cap_no) printf("%scap_%u", (pfx), (cap_no))
312# endif
313
314static int dump(void)
315{
316 IF_FEATURE_SETPRIV_CAPABILITIES(struct caps caps;)
317 const char *fmt;
318 uid_t ruid, euid, suid;
319 gid_t rgid, egid, sgid;
320 gid_t *gids;
321 int i, ngids, nnp;
322
323 getresuid(&ruid, &euid, &suid); /* never fails in Linux */
324 getresgid(&rgid, &egid, &sgid); /* never fails in Linux */
325 ngids = 0;
326 gids = bb_getgroups(&ngids, NULL); /* never fails in Linux */
327
328 nnp = prctl(PR_GET_NO_NEW_PRIVS, 0, 0, 0, 0);
329 if (nnp < 0)
330 bb_perror_msg_and_die("prctl: %s", "GET_NO_NEW_PRIVS");
331
332 printf("uid: %u\n", (unsigned)ruid);
333 printf("euid: %u\n", (unsigned)euid);
334 printf("gid: %u\n", (unsigned)rgid);
335 printf("egid: %u\n", (unsigned)egid);
336
337 printf("Supplementary groups: ");
338 if (ngids == 0) {
339 printf("[none]");
340 } else {
341 fmt = ",%u" + 1;
342 for (i = 0; i < ngids; i++) {
343 printf(fmt, (unsigned)gids[i]);
344 fmt = ",%u";
345 }
346 }
347 printf("\nno_new_privs: %d\n", nnp);
348
349# if ENABLE_FEATURE_SETPRIV_CAPABILITIES
350 getcaps(&caps);
351 printf("Inheritable capabilities: ");
352 fmt = "";
353 for (i = 0; cap_valid(i); i++) {
354 unsigned idx = CAP_TO_INDEX(i);
355 if (idx >= caps.u32s) {
356 printf("\nindex: %u u32s: %u capability: %u\n", idx, caps.u32s, i);
357 bb_error_msg_and_die("unsupported capability");
358 }
359 if (caps.data[idx].inheritable & CAP_TO_MASK(i)) {
360 printf_cap(fmt, i);
361 fmt = ",";
362 }
363 }
364 if (!fmt[0])
365 printf("[none]");
366
367 printf("\nAmbient capabilities: ");
368 fmt = "";
369 for (i = 0; cap_valid(i); i++) {
370 int ret = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, (unsigned long) i, 0UL, 0UL);
371 if (ret < 0)
372 bb_perror_msg_and_die("prctl: %s", "CAP_AMBIENT_IS_SET");
373 if (ret) {
374 printf_cap(fmt, i);
375 fmt = ",";
376 }
377 }
378 if (i == 0)
379 printf("[unsupported]");
380 else if (!fmt[0])
381 printf("[none]");
382
383 printf("\nCapability bounding set: ");
384 fmt = "";
385 for (i = 0; cap_valid(i); i++) {
386 int ret = prctl(PR_CAPBSET_READ, (unsigned long) i, 0UL, 0UL, 0UL);
387 if (ret < 0)
388 bb_perror_msg_and_die("prctl: %s", "CAPBSET_READ");
389 if (ret) {
390 printf_cap(fmt, i);
391 fmt = ",";
392 }
393 }
394 if (!fmt[0])
395 printf("[none]");
396 bb_putchar('\n');
397# endif
398
399 if (ENABLE_FEATURE_CLEAN_UP) {
400 IF_FEATURE_SETPRIV_CAPABILITIES(free(caps.data);)
401 free(gids);
402 }
403 return EXIT_SUCCESS;
404}
405#endif /* FEATURE_SETPRIV_DUMP */
406
407int setpriv_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
408int setpriv_main(int argc UNUSED_PARAM, char **argv)
409{
410 static const char setpriv_longopts[] ALIGN1 =
411 IF_FEATURE_SETPRIV_DUMP(
412 "dump\0" No_argument "d"
413 )
414 "nnp\0" No_argument "\xff"
415 "no-new-privs\0" No_argument "\xff"
416 IF_FEATURE_SETPRIV_CAPABILITIES(
417 "inh-caps\0" Required_argument "\xfe"
418 "ambient-caps\0" Required_argument "\xfd"
419 )
420 ;
421 int opts;
422 IF_FEATURE_SETPRIV_CAPABILITIES(char *inh_caps, *ambient_caps;)
423
424 applet_long_options = setpriv_longopts;
425 opts = getopt32(argv, "+"IF_FEATURE_SETPRIV_DUMP("d")
426 IF_FEATURE_SETPRIV_CAPABILITIES("\xfe:\xfd:", &inh_caps, &ambient_caps));
427 argv += optind;
428
429#if ENABLE_FEATURE_SETPRIV_DUMP
430 if (opts & OPT_DUMP) {
431 if (argv[0] || (opts - OPT_DUMP) != 0)
432 bb_show_usage();
433 return dump();
434 }
435#endif
436 if (opts & OPT_NNP) {
437 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0))
438 bb_perror_msg_and_die("prctl: %s", "SET_NO_NEW_PRIVS");
439 }
440
441#if ENABLE_FEATURE_SETPRIV_CAPABILITIES
442 if (opts & OPT_INH)
443 set_inh_caps(inh_caps);
444 if (opts & OPT_AMB)
445 set_ambient_caps(ambient_caps);
446#endif
447
448 if (!argv[0])
449 bb_show_usage();
450 BB_EXECVP_or_die(argv);
451}
diff --git a/util-linux/unshare.c b/util-linux/unshare.c
index 52e8f1421..875e3f86e 100644
--- a/util-linux/unshare.c
+++ b/util-linux/unshare.c
@@ -9,12 +9,13 @@
9//config:config UNSHARE 9//config:config UNSHARE
10//config: bool "unshare" 10//config: bool "unshare"
11//config: default y 11//config: default y
12//config: depends on LONG_OPTS && !NOMMU 12//config: depends on !NOMMU
13//config: select PLATFORM_LINUX 13//config: select PLATFORM_LINUX
14//config: select LONG_OPTS
14//config: help 15//config: help
15//config: Run program with some namespaces unshared from parent. 16//config: Run program with some namespaces unshared from parent.
16 17
17// depends on LONG_OPTS: it is awkward to exclude code which handles --propagation 18// needs LONG_OPTS: it is awkward to exclude code which handles --propagation
18// and --setgroups based on LONG_OPTS, so instead applet requires LONG_OPTS. 19// and --setgroups based on LONG_OPTS, so instead applet requires LONG_OPTS.
19// depends on !NOMMU: we need fork() 20// depends on !NOMMU: we need fork()
20 21
@@ -32,7 +33,7 @@
32//usage: "\n -p,--pid[=FILE] Unshare PID namespace" 33//usage: "\n -p,--pid[=FILE] Unshare PID namespace"
33//usage: "\n -U,--user[=FILE] Unshare user namespace" 34//usage: "\n -U,--user[=FILE] Unshare user namespace"
34//usage: "\n -f,--fork Fork before execing PROG" 35//usage: "\n -f,--fork Fork before execing PROG"
35//usage: "\n -r,--map-root-user Map current user to root (implies -u)" 36//usage: "\n -r,--map-root-user Map current user to root (implies -U)"
36//usage: "\n --mount-proc[=DIR] Mount /proc filesystem first (implies -m)" 37//usage: "\n --mount-proc[=DIR] Mount /proc filesystem first (implies -m)"
37//usage: "\n --propagation slave|shared|private|unchanged" 38//usage: "\n --propagation slave|shared|private|unchanged"
38//usage: "\n Modify mount propagation in mount namespace" 39//usage: "\n Modify mount propagation in mount namespace"