diff options
Diffstat (limited to 'miscutils/devfsd.c')
-rw-r--r-- | miscutils/devfsd.c | 2032 |
1 files changed, 2032 insertions, 0 deletions
diff --git a/miscutils/devfsd.c b/miscutils/devfsd.c new file mode 100644 index 000000000..f39bb7e3f --- /dev/null +++ b/miscutils/devfsd.c | |||
@@ -0,0 +1,2032 @@ | |||
1 | /* vi: set sw=4 ts=4: */ | ||
2 | /* | ||
3 | * Licensed under GPLv2 or later, see file LICENSE in this tarball for details. | ||
4 | */ | ||
5 | |||
6 | /* | ||
7 | devfsd implementation for busybox | ||
8 | |||
9 | Copyright (C) 2003 by Tito Ragusa <farmatito@tiscali.it> | ||
10 | |||
11 | Busybox version is based on some previous work and ideas | ||
12 | Copyright (C) [2003] by [Matteo Croce] <3297627799@wind.it> | ||
13 | |||
14 | devfsd.c | ||
15 | |||
16 | Main file for devfsd (devfs daemon for Linux). | ||
17 | |||
18 | Copyright (C) 1998-2002 Richard Gooch | ||
19 | |||
20 | devfsd.h | ||
21 | |||
22 | Header file for devfsd (devfs daemon for Linux). | ||
23 | |||
24 | Copyright (C) 1998-2000 Richard Gooch | ||
25 | |||
26 | compat_name.c | ||
27 | |||
28 | Compatibility name file for devfsd (build compatibility names). | ||
29 | |||
30 | Copyright (C) 1998-2002 Richard Gooch | ||
31 | |||
32 | expression.c | ||
33 | |||
34 | This code provides Borne Shell-like expression expansion. | ||
35 | |||
36 | Copyright (C) 1997-1999 Richard Gooch | ||
37 | |||
38 | This program is free software; you can redistribute it and/or modify | ||
39 | it under the terms of the GNU General Public License as published by | ||
40 | the Free Software Foundation; either version 2 of the License, or | ||
41 | (at your option) any later version. | ||
42 | |||
43 | This program is distributed in the hope that it will be useful, | ||
44 | but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
45 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
46 | GNU General Public License for more details. | ||
47 | |||
48 | You should have received a copy of the GNU General Public License | ||
49 | along with this program; if not, write to the Free Software | ||
50 | Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. | ||
51 | |||
52 | Richard Gooch may be reached by email at rgooch@atnf.csiro.au | ||
53 | The postal address is: | ||
54 | Richard Gooch, c/o ATNF, P. O. Box 76, Epping, N.S.W., 2121, Australia. | ||
55 | */ | ||
56 | |||
57 | #include "busybox.h" | ||
58 | #include "xregex.h" | ||
59 | #include <unistd.h> | ||
60 | #include <stdio.h> | ||
61 | #include <stdlib.h> | ||
62 | #include <stdarg.h> | ||
63 | #include <string.h> | ||
64 | #include <ctype.h> | ||
65 | #include <sys/stat.h> | ||
66 | #include <sys/types.h> | ||
67 | #include <sys/wait.h> | ||
68 | #include <sys/ioctl.h> | ||
69 | #include <sys/socket.h> | ||
70 | #include <sys/un.h> | ||
71 | #include <dirent.h> | ||
72 | #include <fcntl.h> | ||
73 | #include <syslog.h> | ||
74 | #include <signal.h> | ||
75 | #include <errno.h> | ||
76 | #include <sys/sysmacros.h> | ||
77 | |||
78 | |||
79 | /* Various defines taken from linux/major.h */ | ||
80 | #define IDE0_MAJOR 3 | ||
81 | #define IDE1_MAJOR 22 | ||
82 | #define IDE2_MAJOR 33 | ||
83 | #define IDE3_MAJOR 34 | ||
84 | #define IDE4_MAJOR 56 | ||
85 | #define IDE5_MAJOR 57 | ||
86 | #define IDE6_MAJOR 88 | ||
87 | #define IDE7_MAJOR 89 | ||
88 | #define IDE8_MAJOR 90 | ||
89 | #define IDE9_MAJOR 91 | ||
90 | |||
91 | |||
92 | /* Various defines taken from linux/devfs_fs.h */ | ||
93 | #define DEVFSD_PROTOCOL_REVISION_KERNEL 5 | ||
94 | #define DEVFSD_IOCTL_BASE 'd' | ||
95 | /* These are the various ioctls */ | ||
96 | #define DEVFSDIOC_GET_PROTO_REV _IOR(DEVFSD_IOCTL_BASE, 0, int) | ||
97 | #define DEVFSDIOC_SET_EVENT_MASK _IOW(DEVFSD_IOCTL_BASE, 2, int) | ||
98 | #define DEVFSDIOC_RELEASE_EVENT_QUEUE _IOW(DEVFSD_IOCTL_BASE, 3, int) | ||
99 | #define DEVFSDIOC_SET_CONFIG_DEBUG_MASK _IOW(DEVFSD_IOCTL_BASE, 4, int) | ||
100 | #define DEVFSD_NOTIFY_REGISTERED 0 | ||
101 | #define DEVFSD_NOTIFY_UNREGISTERED 1 | ||
102 | #define DEVFSD_NOTIFY_ASYNC_OPEN 2 | ||
103 | #define DEVFSD_NOTIFY_CLOSE 3 | ||
104 | #define DEVFSD_NOTIFY_LOOKUP 4 | ||
105 | #define DEVFSD_NOTIFY_CHANGE 5 | ||
106 | #define DEVFSD_NOTIFY_CREATE 6 | ||
107 | #define DEVFSD_NOTIFY_DELETE 7 | ||
108 | #define DEVFS_PATHLEN 1024 | ||
109 | /* Never change this otherwise the binary interface will change */ | ||
110 | |||
111 | struct devfsd_notify_struct | ||
112 | { /* Use native C types to ensure same types in kernel and user space */ | ||
113 | unsigned int type; /* DEVFSD_NOTIFY_* value */ | ||
114 | unsigned int mode; /* Mode of the inode or device entry */ | ||
115 | unsigned int major; /* Major number of device entry */ | ||
116 | unsigned int minor; /* Minor number of device entry */ | ||
117 | unsigned int uid; /* Uid of process, inode or device entry */ | ||
118 | unsigned int gid; /* Gid of process, inode or device entry */ | ||
119 | unsigned int overrun_count; /* Number of lost events */ | ||
120 | unsigned int namelen; /* Number of characters not including '\0' */ | ||
121 | /* The device name MUST come last */ | ||
122 | char devname[DEVFS_PATHLEN]; /* This will be '\0' terminated */ | ||
123 | }; | ||
124 | |||
125 | #define BUFFER_SIZE 16384 | ||
126 | #define DEVFSD_VERSION "1.3.25" | ||
127 | #define CONFIG_FILE "/etc/devfsd.conf" | ||
128 | #define MODPROBE "/sbin/modprobe" | ||
129 | #define MODPROBE_SWITCH_1 "-k" | ||
130 | #define MODPROBE_SWITCH_2 "-C" | ||
131 | #define CONFIG_MODULES_DEVFS "/etc/modules.devfs" | ||
132 | #define MAX_ARGS (6 + 1) | ||
133 | #define MAX_SUBEXPR 10 | ||
134 | #define STRING_LENGTH 255 | ||
135 | |||
136 | /* for get_uid_gid() */ | ||
137 | #define UID 0 | ||
138 | #define GID 1 | ||
139 | |||
140 | /* fork_and_execute() */ | ||
141 | # define DIE 1 | ||
142 | # define NO_DIE 0 | ||
143 | |||
144 | /* for dir_operation() */ | ||
145 | #define RESTORE 0 | ||
146 | #define SERVICE 1 | ||
147 | #define READ_CONFIG 2 | ||
148 | |||
149 | /* Update only after changing code to reflect new protocol */ | ||
150 | #define DEVFSD_PROTOCOL_REVISION_DAEMON 5 | ||
151 | |||
152 | /* Compile-time check */ | ||
153 | #if DEVFSD_PROTOCOL_REVISION_KERNEL != DEVFSD_PROTOCOL_REVISION_DAEMON | ||
154 | #error protocol version mismatch. Update your kernel headers | ||
155 | #endif | ||
156 | |||
157 | #define AC_PERMISSIONS 0 | ||
158 | #define AC_MODLOAD 1 | ||
159 | #define AC_EXECUTE 2 | ||
160 | #define AC_MFUNCTION 3 /* not supported by busybox */ | ||
161 | #define AC_CFUNCTION 4 /* not supported by busybox */ | ||
162 | #define AC_COPY 5 | ||
163 | #define AC_IGNORE 6 | ||
164 | #define AC_MKOLDCOMPAT 7 | ||
165 | #define AC_MKNEWCOMPAT 8 | ||
166 | #define AC_RMOLDCOMPAT 9 | ||
167 | #define AC_RMNEWCOMPAT 10 | ||
168 | #define AC_RESTORE 11 | ||
169 | |||
170 | struct permissions_type | ||
171 | { | ||
172 | mode_t mode; | ||
173 | uid_t uid; | ||
174 | gid_t gid; | ||
175 | }; | ||
176 | |||
177 | struct execute_type | ||
178 | { | ||
179 | char *argv[MAX_ARGS + 1]; /* argv[0] must always be the programme */ | ||
180 | }; | ||
181 | |||
182 | struct copy_type | ||
183 | { | ||
184 | const char *source; | ||
185 | const char *destination; | ||
186 | }; | ||
187 | |||
188 | struct action_type | ||
189 | { | ||
190 | unsigned int what; | ||
191 | unsigned int when; | ||
192 | }; | ||
193 | |||
194 | struct config_entry_struct | ||
195 | { | ||
196 | struct action_type action; | ||
197 | regex_t preg; | ||
198 | union | ||
199 | { | ||
200 | struct permissions_type permissions; | ||
201 | struct execute_type execute; | ||
202 | struct copy_type copy; | ||
203 | } | ||
204 | u; | ||
205 | struct config_entry_struct *next; | ||
206 | }; | ||
207 | |||
208 | struct get_variable_info | ||
209 | { | ||
210 | const struct devfsd_notify_struct *info; | ||
211 | const char *devname; | ||
212 | char devpath[STRING_LENGTH]; | ||
213 | }; | ||
214 | |||
215 | static void dir_operation(int , const char * , int, unsigned long* ); | ||
216 | static void service(struct stat statbuf, char *path); | ||
217 | static int st_expr_expand(char *, unsigned, const char *, const char *(*) (const char *, void *), void *); | ||
218 | static const char *get_old_name(const char *, unsigned, char *, unsigned, unsigned); | ||
219 | static int mksymlink (const char *oldpath, const char *newpath); | ||
220 | static void read_config_file (char *path, int optional, unsigned long *event_mask); | ||
221 | static void process_config_line (const char *, unsigned long *); | ||
222 | static int do_servicing (int, unsigned long); | ||
223 | static void service_name (const struct devfsd_notify_struct *); | ||
224 | static void action_permissions (const struct devfsd_notify_struct *, const struct config_entry_struct *); | ||
225 | static void action_execute (const struct devfsd_notify_struct *, const struct config_entry_struct *, | ||
226 | const regmatch_t *, unsigned); | ||
227 | static void action_modload (const struct devfsd_notify_struct *info, const struct config_entry_struct *entry); | ||
228 | static void action_copy (const struct devfsd_notify_struct *, const struct config_entry_struct *, | ||
229 | const regmatch_t *, unsigned); | ||
230 | static void action_compat (const struct devfsd_notify_struct *, unsigned); | ||
231 | static void free_config (void); | ||
232 | static void restore(char *spath, struct stat source_stat, int rootlen); | ||
233 | static int copy_inode (const char *, const struct stat *, mode_t, const char *, const struct stat *); | ||
234 | static mode_t get_mode (const char *); | ||
235 | static void signal_handler (int); | ||
236 | static const char *get_variable (const char *, void *); | ||
237 | static int make_dir_tree (const char *); | ||
238 | static int expand_expression(char *, unsigned, const char *, const char *(*)(const char *, void *), void *, | ||
239 | const char *, const regmatch_t *, unsigned ); | ||
240 | static void expand_regexp (char *, size_t, const char *, const char *, const regmatch_t *, unsigned ); | ||
241 | static const char *expand_variable( char *, unsigned, unsigned *, const char *, | ||
242 | const char *(*) (const char *, void *), void * ); | ||
243 | static const char *get_variable_v2(const char *, const char *(*) (const char *, void *), void *); | ||
244 | static char get_old_ide_name (unsigned , unsigned); | ||
245 | static char *write_old_sd_name (char *, unsigned, unsigned, char *); | ||
246 | |||
247 | /* busybox functions */ | ||
248 | static void msg_logger(int pri, const char * fmt, ... )__attribute__ ((format (printf, 2, 3))); | ||
249 | static void msg_logger_and_die(int pri, const char * fmt, ... )__attribute__ ((noreturn, format (printf, 2, 3))); | ||
250 | static void do_ioctl_and_die(int fd, int request, unsigned long event_mask_flag); | ||
251 | static void fork_and_execute(int die, char *arg0, char **arg ); | ||
252 | static int get_uid_gid ( int, const char *); | ||
253 | static void safe_memcpy( char * dest, const char * src, int len); | ||
254 | static unsigned int scan_dev_name_common(const char *d, unsigned int n, int addendum, char *ptr); | ||
255 | static unsigned int scan_dev_name(const char *d, unsigned int n, char *ptr); | ||
256 | |||
257 | /* Structs and vars */ | ||
258 | static struct config_entry_struct *first_config = NULL; | ||
259 | static struct config_entry_struct *last_config = NULL; | ||
260 | static const char *mount_point = NULL; | ||
261 | static volatile int caught_signal = FALSE; | ||
262 | static volatile int caught_sighup = FALSE; | ||
263 | static struct initial_symlink_struct | ||
264 | { | ||
265 | char *dest; | ||
266 | char *name; | ||
267 | } initial_symlinks[] = | ||
268 | { | ||
269 | {"/proc/self/fd", "fd"}, | ||
270 | {"fd/0", "stdin"}, | ||
271 | {"fd/1", "stdout"}, | ||
272 | {"fd/2", "stderr"}, | ||
273 | {NULL, NULL}, | ||
274 | }; | ||
275 | |||
276 | static struct event_type | ||
277 | { | ||
278 | unsigned int type; /* The DEVFSD_NOTIFY_* value */ | ||
279 | const char *config_name; /* The name used in the config file */ | ||
280 | } event_types[] = | ||
281 | { | ||
282 | {DEVFSD_NOTIFY_REGISTERED, "REGISTER"}, | ||
283 | {DEVFSD_NOTIFY_UNREGISTERED, "UNREGISTER"}, | ||
284 | {DEVFSD_NOTIFY_ASYNC_OPEN, "ASYNC_OPEN"}, | ||
285 | {DEVFSD_NOTIFY_CLOSE, "CLOSE"}, | ||
286 | {DEVFSD_NOTIFY_LOOKUP, "LOOKUP"}, | ||
287 | {DEVFSD_NOTIFY_CHANGE, "CHANGE"}, | ||
288 | {DEVFSD_NOTIFY_CREATE, "CREATE"}, | ||
289 | {DEVFSD_NOTIFY_DELETE, "DELETE"}, | ||
290 | {0xffffffff, NULL} | ||
291 | }; | ||
292 | |||
293 | /* Busybox messages */ | ||
294 | |||
295 | static const char * const bb_msg_proto_rev = "protocol revision"; | ||
296 | static const char * const bb_msg_bad_config = "bad %s config file: %s"; | ||
297 | static const char * const bb_msg_small_buffer = "buffer too small"; | ||
298 | static const char * const bb_msg_variable_not_found = "variable: %s not found"; | ||
299 | |||
300 | /* Busybox functions */ | ||
301 | static void msg_logger(int pri, const char * fmt, ... ) | ||
302 | { | ||
303 | va_list ap; | ||
304 | int ret; | ||
305 | |||
306 | va_start(ap, fmt); | ||
307 | ret = access ("/dev/log", F_OK); | ||
308 | if (ret == 0) { | ||
309 | openlog(applet_name, 0, LOG_DAEMON); | ||
310 | vsyslog( pri , fmt, ap); | ||
311 | /* Man: A trailing newline is added when needed. */ | ||
312 | closelog(); | ||
313 | } | ||
314 | /* ENABLE_DEVFSD_VERBOSE is always enabled if msg_logger is used */ | ||
315 | if ((ENABLE_DEVFSD_VERBOSE && ret) || ENABLE_DEBUG) { | ||
316 | bb_error_msg(fmt, ap); | ||
317 | } | ||
318 | va_end(ap); | ||
319 | } | ||
320 | |||
321 | static void msg_logger_and_die(int pri, const char* fmt, ...) | ||
322 | { | ||
323 | va_list ap; | ||
324 | |||
325 | va_start(ap, fmt); | ||
326 | msg_logger(pri, fmt, ap); | ||
327 | va_end(ap); | ||
328 | exit(EXIT_FAILURE); | ||
329 | } | ||
330 | |||
331 | /* Busybox stuff */ | ||
332 | #if defined(CONFIG_DEVFSD_VERBOSE) || defined(CONFIG_DEBUG) | ||
333 | #define devfsd_error_msg(fmt, args...) bb_error_msg(fmt, ## args) | ||
334 | #define devfsd_perror_msg_and_die(fmt, args...) bb_perror_msg_and_die(fmt, ## args) | ||
335 | #define devfsd_error_msg_and_die(fmt, args...) bb_error_msg_and_die(fmt, ## args) | ||
336 | #if defined(CONFIG_DEBUG) | ||
337 | #define debug_msg_logger(x, fmt, args...) msg_logger(x, fmt, ## args) | ||
338 | #else | ||
339 | #define debug_msg_logger(x, fmt, args...) | ||
340 | #endif | ||
341 | #else | ||
342 | #define debug_msg_logger(x, fmt, args...) | ||
343 | #define msg_logger(p, fmt, args...) | ||
344 | #define msg_logger_and_die(p, fmt, args...) exit(1) | ||
345 | #define devfsd_perror_msg_and_die(fmt, args...) exit(1) | ||
346 | #define devfsd_error_msg_and_die(fmt, args...) exit(1) | ||
347 | #define devfsd_error_msg(fmt, args...) | ||
348 | #endif | ||
349 | |||
350 | static void do_ioctl_and_die(int fd, int request, unsigned long event_mask_flag) | ||
351 | { | ||
352 | if (ioctl (fd, request, event_mask_flag) == -1) | ||
353 | msg_logger_and_die(LOG_ERR, "ioctl"); | ||
354 | } | ||
355 | |||
356 | static void fork_and_execute(int die, char *arg0, char **arg ) | ||
357 | { | ||
358 | switch ( fork () ) | ||
359 | { | ||
360 | case 0: | ||
361 | /* Child */ | ||
362 | break; | ||
363 | case -1: | ||
364 | /* Parent: Error : die or return */ | ||
365 | msg_logger(LOG_ERR,(char *) bb_msg_memory_exhausted); | ||
366 | if(die) | ||
367 | exit(EXIT_FAILURE); | ||
368 | return; | ||
369 | default: | ||
370 | /* Parent : ok : return or exit */ | ||
371 | if(arg0 != NULL) | ||
372 | { | ||
373 | wait (NULL); | ||
374 | return; | ||
375 | } | ||
376 | exit (EXIT_SUCCESS); | ||
377 | } | ||
378 | /* Child : if arg0 != NULL do execvp */ | ||
379 | if(arg0 != NULL ) | ||
380 | { | ||
381 | execvp (arg0, arg); | ||
382 | msg_logger_and_die(LOG_ERR, "execvp"); | ||
383 | } | ||
384 | } | ||
385 | |||
386 | static void safe_memcpy( char *dest, const char *src, int len) | ||
387 | { | ||
388 | memcpy (dest , src , len ); | ||
389 | dest[len] = '\0'; | ||
390 | } | ||
391 | |||
392 | static unsigned int scan_dev_name_common(const char *d, unsigned int n, int addendum, char *ptr) | ||
393 | { | ||
394 | if(d[n - 4]=='d' && d[n - 3]=='i' && d[n - 2]=='s' && d[n - 1]=='c') | ||
395 | return 2 + addendum; | ||
396 | if(d[n - 2]=='c' && d[n - 1]=='d') | ||
397 | return 3 + addendum; | ||
398 | if(ptr[0]=='p' && ptr[1]=='a' && ptr[2]=='r' && ptr[3]=='t') | ||
399 | return 4 + addendum; | ||
400 | if(ptr[n - 2]=='m' && ptr[n - 1]=='t') | ||
401 | return 5 + addendum; | ||
402 | return 0; | ||
403 | } | ||
404 | |||
405 | static unsigned int scan_dev_name(const char *d, unsigned int n, char *ptr) | ||
406 | { | ||
407 | if(d[0]=='s' && d[1]=='c' && d[2]=='s' && d[3]=='i' && d[4]=='/') { | ||
408 | if( d[n - 7]=='g' && d[n - 6]=='e' && d[n - 5]=='n' && | ||
409 | d[n - 4]=='e' && d[n - 3]=='r' && d[n - 2]=='i' && | ||
410 | d[n - 1]=='c' ) | ||
411 | return 1; | ||
412 | return scan_dev_name_common(d, n, 0, ptr); | ||
413 | } | ||
414 | if(d[0]=='i' && d[1]=='d' && d[2]=='e' && d[3]=='/' && | ||
415 | d[4]=='h' && d[5]=='o' && d[6]=='s' && d[7]=='t') | ||
416 | return scan_dev_name_common(d, n, 4, ptr); | ||
417 | if(d[0]=='s' && d[1]=='b' && d[2]=='p' && d[3]=='/') | ||
418 | return 10; | ||
419 | if(d[0]=='v' && d[1]=='c' && d[2]=='c' && d[3]=='/') | ||
420 | return 11; | ||
421 | if(d[0]=='p' && d[1]=='t' && d[2]=='y' && d[3]=='/') | ||
422 | return 12; | ||
423 | return 0; | ||
424 | } | ||
425 | |||
426 | /* Public functions follow */ | ||
427 | |||
428 | int devfsd_main (int argc, char **argv) | ||
429 | { | ||
430 | int print_version = FALSE; | ||
431 | int do_daemon = TRUE; | ||
432 | int no_polling = FALSE; | ||
433 | int do_scan; | ||
434 | int fd, proto_rev, count; | ||
435 | unsigned long event_mask = 0; | ||
436 | struct sigaction new_action; | ||
437 | struct initial_symlink_struct *curr; | ||
438 | |||
439 | if (argc < 2) | ||
440 | bb_show_usage(); | ||
441 | |||
442 | for (count = 2; count < argc; ++count) | ||
443 | { | ||
444 | if(argv[count][0] == '-') | ||
445 | { | ||
446 | if(argv[count][1]=='v' && !argv[count][2]) /* -v */ | ||
447 | print_version = TRUE; | ||
448 | else if(ENABLE_DEVFSD_FG_NP && argv[count][1]=='f' | ||
449 | && argv[count][2]=='g' && !argv[count][3]) /* -fg */ | ||
450 | do_daemon = FALSE; | ||
451 | else if(ENABLE_DEVFSD_FG_NP && argv[count][1]=='n' | ||
452 | && argv[count][2]=='p' && !argv[count][3]) /* -np */ | ||
453 | no_polling = TRUE; | ||
454 | else | ||
455 | bb_show_usage(); | ||
456 | } | ||
457 | } | ||
458 | |||
459 | /* strip last / from mount point, so we don't need to check for it later */ | ||
460 | while( argv[1][1]!='\0' && argv[1][strlen(argv[1])-1] == '/' ) | ||
461 | argv[1][strlen(argv[1]) -1] = '\0'; | ||
462 | |||
463 | mount_point = argv[1]; | ||
464 | |||
465 | if (chdir (mount_point) != 0) | ||
466 | devfsd_perror_msg_and_die(mount_point); | ||
467 | |||
468 | fd = xopen (".devfsd", O_RDONLY); | ||
469 | |||
470 | if (fcntl (fd, F_SETFD, FD_CLOEXEC) != 0) | ||
471 | devfsd_perror_msg_and_die("FD_CLOEXEC"); | ||
472 | |||
473 | if (ioctl (fd, DEVFSDIOC_GET_PROTO_REV, &proto_rev) == -1) | ||
474 | msg_logger_and_die(LOG_ERR, "ioctl"); | ||
475 | |||
476 | /*setup initial entries */ | ||
477 | for (curr = initial_symlinks; curr->dest != NULL; ++curr) | ||
478 | symlink (curr->dest, curr->name); | ||
479 | |||
480 | /* NB: The check for CONFIG_FILE is done in read_config_file() */ | ||
481 | |||
482 | if ( print_version || (DEVFSD_PROTOCOL_REVISION_DAEMON != proto_rev) ) | ||
483 | { | ||
484 | printf( "%s v%s\nDaemon %s:\t%d\nKernel-side %s:\t%d\n", | ||
485 | applet_name,DEVFSD_VERSION,bb_msg_proto_rev, | ||
486 | DEVFSD_PROTOCOL_REVISION_DAEMON,bb_msg_proto_rev, proto_rev); | ||
487 | if (DEVFSD_PROTOCOL_REVISION_DAEMON != proto_rev) | ||
488 | bb_error_msg_and_die( "%s mismatch!",bb_msg_proto_rev); | ||
489 | exit(EXIT_SUCCESS); /* -v */ | ||
490 | } | ||
491 | /* Tell kernel we are special (i.e. we get to see hidden entries) */ | ||
492 | do_ioctl_and_die(fd, DEVFSDIOC_SET_EVENT_MASK, 0); | ||
493 | |||
494 | sigemptyset (&new_action.sa_mask); | ||
495 | new_action.sa_flags = 0; | ||
496 | |||
497 | /* Set up SIGHUP and SIGUSR1 handlers */ | ||
498 | new_action.sa_handler = signal_handler; | ||
499 | if (sigaction (SIGHUP, &new_action, NULL) != 0 || sigaction (SIGUSR1, &new_action, NULL) != 0 ) | ||
500 | devfsd_error_msg_and_die( "sigaction"); | ||
501 | |||
502 | printf("%s v%s started for %s\n",applet_name, DEVFSD_VERSION, mount_point); | ||
503 | |||
504 | /* Set umask so that mknod(2), open(2) and mkdir(2) have complete control over permissions */ | ||
505 | umask (0); | ||
506 | read_config_file (CONFIG_FILE, FALSE, &event_mask); | ||
507 | /* Do the scan before forking, so that boot scripts see the finished product */ | ||
508 | dir_operation(SERVICE,mount_point,0,NULL); | ||
509 | |||
510 | if (ENABLE_DEVFSD_FG_NP && no_polling) | ||
511 | exit (0); | ||
512 | if (do_daemon) | ||
513 | { | ||
514 | /* Release so that the child can grab it */ | ||
515 | do_ioctl_and_die(fd, DEVFSDIOC_RELEASE_EVENT_QUEUE, 0); | ||
516 | fork_and_execute(DIE, NULL, NULL); | ||
517 | setsid (); /* Prevent hangups and become pgrp leader */ | ||
518 | } else if(ENABLE_DEVFSD_FG_NP) { | ||
519 | setpgid (0, 0); /* Become process group leader */ | ||
520 | } | ||
521 | |||
522 | while (TRUE) | ||
523 | { | ||
524 | do_scan = do_servicing (fd, event_mask); | ||
525 | |||
526 | free_config (); | ||
527 | read_config_file (CONFIG_FILE, FALSE, &event_mask); | ||
528 | if (do_scan) | ||
529 | dir_operation(SERVICE,mount_point,0,NULL); | ||
530 | } | ||
531 | } /* End Function main */ | ||
532 | |||
533 | |||
534 | /* Private functions follow */ | ||
535 | |||
536 | static void read_config_file (char *path, int optional, unsigned long *event_mask) | ||
537 | /* [SUMMARY] Read a configuration database. | ||
538 | <path> The path to read the database from. If this is a directory, all | ||
539 | entries in that directory will be read (except hidden entries). | ||
540 | <optional> If TRUE, the routine will silently ignore a missing config file. | ||
541 | <event_mask> The event mask is written here. This is not initialised. | ||
542 | [RETURNS] Nothing. | ||
543 | */ | ||
544 | { | ||
545 | struct stat statbuf; | ||
546 | FILE *fp; | ||
547 | char buf[STRING_LENGTH]; | ||
548 | char *line=NULL; | ||
549 | |||
550 | debug_msg_logger(LOG_INFO, "%s: %s", __FUNCTION__, path); | ||
551 | |||
552 | if (stat (path, &statbuf) == 0 ) | ||
553 | { | ||
554 | /* Don't read 0 length files: ignored */ | ||
555 | /*if( statbuf.st_size == 0 ) | ||
556 | return;*/ | ||
557 | if ( S_ISDIR (statbuf.st_mode) ) | ||
558 | { | ||
559 | /* strip last / from dirname so we don't need to check for it later */ | ||
560 | while( path && path[1]!='\0' && path[strlen(path)-1] == '/') | ||
561 | path[strlen(path) -1] = '\0'; | ||
562 | |||
563 | dir_operation(READ_CONFIG, path, 0, event_mask); | ||
564 | return; | ||
565 | } | ||
566 | if ( ( fp = fopen (path, "r") ) != NULL ) | ||
567 | { | ||
568 | while (fgets (buf, STRING_LENGTH, fp) != NULL) | ||
569 | { | ||
570 | /* Skip whitespace */ | ||
571 | for (line = buf; isspace (*line); ++line) | ||
572 | /*VOID*/; | ||
573 | if (line[0] == '\0' || line[0] == '#' ) | ||
574 | continue; | ||
575 | process_config_line (line, event_mask); | ||
576 | } | ||
577 | fclose (fp); | ||
578 | } else { | ||
579 | goto read_config_file_err; | ||
580 | } | ||
581 | } else { | ||
582 | read_config_file_err: | ||
583 | if(optional == 0 && errno == ENOENT) | ||
584 | msg_logger_and_die(LOG_ERR, "read config file: %s: %m", path); | ||
585 | } | ||
586 | return; | ||
587 | } /* End Function read_config_file */ | ||
588 | |||
589 | static void process_config_line (const char *line, unsigned long *event_mask) | ||
590 | /* [SUMMARY] Process a line from a configuration file. | ||
591 | <line> The configuration line. | ||
592 | <event_mask> The event mask is written here. This is not initialised. | ||
593 | [RETURNS] Nothing. | ||
594 | */ | ||
595 | { | ||
596 | int num_args, count; | ||
597 | struct config_entry_struct *new; | ||
598 | char p[MAX_ARGS][STRING_LENGTH]; | ||
599 | char when[STRING_LENGTH], what[STRING_LENGTH]; | ||
600 | char name[STRING_LENGTH]; | ||
601 | char * msg=""; | ||
602 | char *ptr; | ||
603 | int i; | ||
604 | |||
605 | /* !!!! Only Uppercase Keywords in devsfd.conf */ | ||
606 | static const char *const options[] = { | ||
607 | "CLEAR_CONFIG", "INCLUDE", "OPTIONAL_INCLUDE", | ||
608 | "RESTORE", "PERMISSIONS", "MODLOAD", "EXECUTE", | ||
609 | "COPY", "IGNORE", "MKOLDCOMPAT", "MKNEWCOMPAT", | ||
610 | "RMOLDCOMPAT", "RMNEWCOMPAT", 0 | ||
611 | }; | ||
612 | |||
613 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
614 | |||
615 | for (count = 0; count < MAX_ARGS; ++count) p[count][0] = '\0'; | ||
616 | num_args = sscanf (line, "%s %s %s %s %s %s %s %s %s %s", | ||
617 | when, name, what, | ||
618 | p[0], p[1], p[2], p[3], p[4], p[5], p[6]); | ||
619 | |||
620 | i = index_in_str_array(options, when ); | ||
621 | |||
622 | /*"CLEAR_CONFIG"*/ | ||
623 | if( i == 0) | ||
624 | { | ||
625 | free_config (); | ||
626 | *event_mask = 0; | ||
627 | return; | ||
628 | } | ||
629 | |||
630 | if ( num_args < 2) | ||
631 | goto process_config_line_err; | ||
632 | |||
633 | /* "INCLUDE" & "OPTIONAL_INCLUDE" */ | ||
634 | if( i == 1 || i == 2 ) | ||
635 | { | ||
636 | st_expr_expand (name, STRING_LENGTH, name, get_variable, NULL ); | ||
637 | msg_logger(LOG_INFO, "%sinclude: %s",(toupper (when[0]) == 'I') ? "": "optional_", name); | ||
638 | read_config_file (name, (toupper (when[0]) == 'I') ? FALSE : TRUE, event_mask); | ||
639 | return; | ||
640 | } | ||
641 | /* "RESTORE" */ | ||
642 | if( i == 3) | ||
643 | { | ||
644 | dir_operation(RESTORE,name, strlen (name),NULL); | ||
645 | return; | ||
646 | } | ||
647 | if (num_args < 3) | ||
648 | goto process_config_line_err; | ||
649 | |||
650 | new = xmalloc (sizeof *new); | ||
651 | memset (new, 0, sizeof *new); | ||
652 | |||
653 | for (count = 0; event_types[count].config_name != NULL; ++count) | ||
654 | { | ||
655 | if (strcasecmp (when, event_types[count].config_name) != 0) | ||
656 | continue; | ||
657 | new->action.when = event_types[count].type; | ||
658 | break; | ||
659 | } | ||
660 | if (event_types[count].config_name == NULL) | ||
661 | { | ||
662 | msg="WHEN in"; | ||
663 | goto process_config_line_err; | ||
664 | } | ||
665 | |||
666 | i = index_in_str_array(options, what ); | ||
667 | |||
668 | switch(i) | ||
669 | { | ||
670 | case 4: /* "PERMISSIONS" */ | ||
671 | new->action.what = AC_PERMISSIONS; | ||
672 | /* Get user and group */ | ||
673 | if ( ( ptr = strchr (p[0], '.') ) == NULL ) | ||
674 | { | ||
675 | msg="UID.GID"; | ||
676 | goto process_config_line_err; /*"missing '.' in UID.GID"*/ | ||
677 | } | ||
678 | |||
679 | *ptr++ = '\0'; | ||
680 | new->u.permissions.uid = get_uid_gid (UID, p[0]); | ||
681 | new->u.permissions.gid = get_uid_gid (GID, ptr); | ||
682 | /* Get mode */ | ||
683 | new->u.permissions.mode = get_mode (p[1]); | ||
684 | break; | ||
685 | case 5: /* MODLOAD */ | ||
686 | /*This action will pass "/dev/$devname" (i.e. "/dev/" prefixed to | ||
687 | the device name) to the module loading facility. In addition, | ||
688 | the /etc/modules.devfs configuration file is used.*/ | ||
689 | if (ENABLE_DEVFSD_MODLOAD) | ||
690 | new->action.what = AC_MODLOAD; | ||
691 | break; | ||
692 | case 6: /* EXECUTE */ | ||
693 | new->action.what = AC_EXECUTE; | ||
694 | num_args -= 3; | ||
695 | |||
696 | for (count = 0; count < num_args; ++count) | ||
697 | new->u.execute.argv[count] = xstrdup (p[count]); | ||
698 | |||
699 | new->u.execute.argv[num_args] = NULL; | ||
700 | break; | ||
701 | case 7: /* COPY */ | ||
702 | new->action.what = AC_COPY; | ||
703 | num_args -= 3; | ||
704 | if (num_args != 2) | ||
705 | goto process_config_line_err; /* missing path and function in line */ | ||
706 | |||
707 | new->u.copy.source = xstrdup (p[0]); | ||
708 | new->u.copy.destination = xstrdup (p[1]); | ||
709 | break; | ||
710 | case 8: /* IGNORE */ | ||
711 | /* FALLTROUGH */ | ||
712 | case 9: /* MKOLDCOMPAT */ | ||
713 | /* FALLTROUGH */ | ||
714 | case 10: /* MKNEWCOMPAT */ | ||
715 | /* FALLTROUGH */ | ||
716 | case 11:/* RMOLDCOMPAT */ | ||
717 | /* FALLTROUGH */ | ||
718 | case 12: /* RMNEWCOMPAT */ | ||
719 | /* AC_IGNORE 6 | ||
720 | AC_MKOLDCOMPAT 7 | ||
721 | AC_MKNEWCOMPAT 8 | ||
722 | AC_RMOLDCOMPAT 9 | ||
723 | AC_RMNEWCOMPAT 10*/ | ||
724 | new->action.what = i - 2; | ||
725 | break; | ||
726 | default: | ||
727 | msg ="WHAT in"; | ||
728 | goto process_config_line_err; | ||
729 | /*esac*/ | ||
730 | } /* switch (i) */ | ||
731 | |||
732 | xregcomp( &new->preg, name, REG_EXTENDED); | ||
733 | |||
734 | *event_mask |= 1 << new->action.when; | ||
735 | new->next = NULL; | ||
736 | if (first_config == NULL) | ||
737 | first_config = new; | ||
738 | else | ||
739 | last_config->next = new; | ||
740 | last_config = new; | ||
741 | return; | ||
742 | process_config_line_err: | ||
743 | msg_logger_and_die(LOG_ERR, bb_msg_bad_config, msg , line); | ||
744 | } /* End Function process_config_line */ | ||
745 | |||
746 | static int do_servicing (int fd, unsigned long event_mask) | ||
747 | /* [SUMMARY] Service devfs changes until a signal is received. | ||
748 | <fd> The open control file. | ||
749 | <event_mask> The event mask. | ||
750 | [RETURNS] TRUE if SIGHUP was caught, else FALSE. | ||
751 | */ | ||
752 | { | ||
753 | ssize_t bytes; | ||
754 | struct devfsd_notify_struct info; | ||
755 | unsigned long tmp_event_mask; | ||
756 | |||
757 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
758 | |||
759 | /* Tell devfs what events we care about */ | ||
760 | tmp_event_mask = event_mask; | ||
761 | do_ioctl_and_die(fd, DEVFSDIOC_SET_EVENT_MASK, tmp_event_mask); | ||
762 | while (!caught_signal) | ||
763 | { | ||
764 | errno = 0; | ||
765 | bytes = read (fd, (char *) &info, sizeof info); | ||
766 | if (caught_signal) | ||
767 | break; /* Must test for this first */ | ||
768 | if (errno == EINTR) | ||
769 | continue; /* Yes, the order is important */ | ||
770 | if (bytes < 1) | ||
771 | break; | ||
772 | service_name (&info); | ||
773 | } | ||
774 | if (caught_signal) | ||
775 | { | ||
776 | int c_sighup = caught_sighup; | ||
777 | |||
778 | caught_signal = FALSE; | ||
779 | caught_sighup = FALSE; | ||
780 | return c_sighup; | ||
781 | } | ||
782 | msg_logger_and_die(LOG_ERR, "read error on control file"); | ||
783 | } /* End Function do_servicing */ | ||
784 | |||
785 | static void service_name (const struct devfsd_notify_struct *info) | ||
786 | /* [SUMMARY] Service a single devfs change. | ||
787 | <info> The devfs change. | ||
788 | [RETURNS] Nothing. | ||
789 | */ | ||
790 | { | ||
791 | unsigned int n; | ||
792 | regmatch_t mbuf[MAX_SUBEXPR]; | ||
793 | struct config_entry_struct *entry; | ||
794 | |||
795 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
796 | if (ENABLE_DEBUG && info->overrun_count > 0) | ||
797 | debug_msg_logger(LOG_ERR, "lost %u events", info->overrun_count); | ||
798 | |||
799 | /* Discard lookups on "/dev/log" and "/dev/initctl" */ | ||
800 | if( info->type == DEVFSD_NOTIFY_LOOKUP && | ||
801 | ((info->devname[0]=='l' && info->devname[1]=='o' && | ||
802 | info->devname[2]=='g' && !info->devname[3]) || | ||
803 | ( info->devname[0]=='i' && info->devname[1]=='n' && | ||
804 | info->devname[2]=='i' && info->devname[3]=='t' && | ||
805 | info->devname[4]=='c' && info->devname[5]=='t' && | ||
806 | info->devname[6]=='l' && !info->devname[7]))) | ||
807 | return; | ||
808 | for (entry = first_config; entry != NULL; entry = entry->next) | ||
809 | { | ||
810 | /* First check if action matches the type, then check if name matches */ | ||
811 | if (info->type != entry->action.when || regexec (&entry->preg, info->devname, MAX_SUBEXPR, mbuf, 0) != 0 ) | ||
812 | continue; | ||
813 | for (n = 0; (n < MAX_SUBEXPR) && (mbuf[n].rm_so != -1); ++n) | ||
814 | /* VOID */; | ||
815 | |||
816 | debug_msg_logger(LOG_INFO, "%s: action.what %d", __FUNCTION__, entry->action.what); | ||
817 | |||
818 | switch (entry->action.what) | ||
819 | { | ||
820 | case AC_PERMISSIONS: | ||
821 | action_permissions (info, entry); | ||
822 | break; | ||
823 | case AC_MODLOAD: | ||
824 | if(ENABLE_DEVFSD_MODLOAD) | ||
825 | action_modload (info, entry); | ||
826 | break; | ||
827 | case AC_EXECUTE: | ||
828 | action_execute (info, entry, mbuf, n); | ||
829 | break; | ||
830 | case AC_COPY: | ||
831 | action_copy (info, entry, mbuf, n); | ||
832 | break; | ||
833 | case AC_IGNORE: | ||
834 | return; | ||
835 | /*break;*/ | ||
836 | case AC_MKOLDCOMPAT: | ||
837 | case AC_MKNEWCOMPAT: | ||
838 | case AC_RMOLDCOMPAT: | ||
839 | case AC_RMNEWCOMPAT: | ||
840 | action_compat (info, entry->action.what); | ||
841 | break; | ||
842 | default: | ||
843 | msg_logger_and_die(LOG_ERR, "Unknown action"); | ||
844 | } | ||
845 | } | ||
846 | } /* End Function service_name */ | ||
847 | |||
848 | static void action_permissions (const struct devfsd_notify_struct *info, | ||
849 | const struct config_entry_struct *entry) | ||
850 | /* [SUMMARY] Update permissions for a device entry. | ||
851 | <info> The devfs change. | ||
852 | <entry> The config file entry. | ||
853 | [RETURNS] Nothing. | ||
854 | */ | ||
855 | { | ||
856 | struct stat statbuf; | ||
857 | |||
858 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
859 | |||
860 | if ( stat (info->devname, &statbuf) != 0 || | ||
861 | chmod (info->devname,(statbuf.st_mode & S_IFMT) | (entry->u.permissions.mode & ~S_IFMT)) != 0 || | ||
862 | chown (info->devname, entry->u.permissions.uid, entry->u.permissions.gid) != 0) | ||
863 | { | ||
864 | msg_logger(LOG_ERR, "Can't chmod or chown: %s: %m",info->devname); | ||
865 | } | ||
866 | } /* End Function action_permissions */ | ||
867 | |||
868 | static void action_modload (const struct devfsd_notify_struct *info, | ||
869 | const struct config_entry_struct *entry ATTRIBUTE_UNUSED) | ||
870 | /* [SUMMARY] Load a module. | ||
871 | <info> The devfs change. | ||
872 | <entry> The config file entry. | ||
873 | [RETURNS] Nothing. | ||
874 | */ | ||
875 | { | ||
876 | char *argv[6]; | ||
877 | char device[STRING_LENGTH]; | ||
878 | |||
879 | argv[0] = MODPROBE; | ||
880 | argv[1] = MODPROBE_SWITCH_1; /* "-k" */ | ||
881 | argv[2] = MODPROBE_SWITCH_2; /* "-C" */ | ||
882 | argv[3] = CONFIG_MODULES_DEVFS; | ||
883 | argv[4] = device; | ||
884 | argv[5] = NULL; | ||
885 | |||
886 | snprintf (device, sizeof (device), "/dev/%s", info->devname); | ||
887 | debug_msg_logger(LOG_INFO, "%s: %s %s %s %s %s",__FUNCTION__, argv[0],argv[1],argv[2],argv[3],argv[4]); | ||
888 | fork_and_execute(DIE, argv[0], argv); | ||
889 | } /* End Function action_modload */ | ||
890 | |||
891 | static void action_execute (const struct devfsd_notify_struct *info, | ||
892 | const struct config_entry_struct *entry, | ||
893 | const regmatch_t *regexpr, unsigned int numexpr) | ||
894 | /* [SUMMARY] Execute a programme. | ||
895 | <info> The devfs change. | ||
896 | <entry> The config file entry. | ||
897 | <regexpr> The number of subexpression (start, end) offsets within the | ||
898 | device name. | ||
899 | <numexpr> The number of elements within <<regexpr>>. | ||
900 | [RETURNS] Nothing. | ||
901 | */ | ||
902 | { | ||
903 | unsigned int count; | ||
904 | struct get_variable_info gv_info; | ||
905 | char *argv[MAX_ARGS + 1]; | ||
906 | char largv[MAX_ARGS + 1][STRING_LENGTH]; | ||
907 | |||
908 | debug_msg_logger(LOG_INFO ,__FUNCTION__); | ||
909 | gv_info.info = info; | ||
910 | gv_info.devname = info->devname; | ||
911 | snprintf (gv_info.devpath, sizeof (gv_info.devpath), "%s/%s", mount_point, info->devname); | ||
912 | for (count = 0; entry->u.execute.argv[count] != NULL; ++count) | ||
913 | { | ||
914 | expand_expression (largv[count], STRING_LENGTH, | ||
915 | entry->u.execute.argv[count], | ||
916 | get_variable, &gv_info, | ||
917 | gv_info.devname, regexpr, numexpr ); | ||
918 | argv[count] = largv[count]; | ||
919 | } | ||
920 | argv[count] = NULL; | ||
921 | fork_and_execute(NO_DIE, argv[0], argv); | ||
922 | } /* End Function action_execute */ | ||
923 | |||
924 | |||
925 | static void action_copy (const struct devfsd_notify_struct *info, | ||
926 | const struct config_entry_struct *entry, | ||
927 | const regmatch_t *regexpr, unsigned int numexpr) | ||
928 | /* [SUMMARY] Copy permissions. | ||
929 | <info> The devfs change. | ||
930 | <entry> The config file entry. | ||
931 | <regexpr> This list of subexpression (start, end) offsets within the | ||
932 | device name. | ||
933 | <numexpr> The number of elements in <<regexpr>>. | ||
934 | [RETURNS] Nothing. | ||
935 | */ | ||
936 | { | ||
937 | mode_t new_mode; | ||
938 | struct get_variable_info gv_info; | ||
939 | struct stat source_stat, dest_stat; | ||
940 | char source[STRING_LENGTH], destination[STRING_LENGTH]; | ||
941 | int ret = 0; | ||
942 | |||
943 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
944 | |||
945 | dest_stat.st_mode = 0; | ||
946 | |||
947 | if ( (info->type == DEVFSD_NOTIFY_CHANGE) && S_ISLNK (info->mode) ) | ||
948 | return; | ||
949 | gv_info.info = info; | ||
950 | gv_info.devname = info->devname; | ||
951 | |||
952 | snprintf (gv_info.devpath, sizeof (gv_info.devpath), "%s/%s", mount_point, info->devname); | ||
953 | expand_expression (source, STRING_LENGTH, entry->u.copy.source, | ||
954 | get_variable, &gv_info, gv_info.devname, | ||
955 | regexpr, numexpr); | ||
956 | |||
957 | expand_expression (destination, STRING_LENGTH, entry->u.copy.destination, | ||
958 | get_variable, &gv_info, gv_info.devname, | ||
959 | regexpr, numexpr); | ||
960 | |||
961 | if ( !make_dir_tree (destination) || lstat (source, &source_stat) != 0) | ||
962 | return; | ||
963 | lstat (destination, &dest_stat); | ||
964 | new_mode = source_stat.st_mode & ~S_ISVTX; | ||
965 | if (info->type == DEVFSD_NOTIFY_CREATE) | ||
966 | new_mode |= S_ISVTX; | ||
967 | else if ( (info->type == DEVFSD_NOTIFY_CHANGE) && (dest_stat.st_mode & S_ISVTX) ) | ||
968 | new_mode |= S_ISVTX; | ||
969 | ret = copy_inode (destination, &dest_stat, new_mode, source, &source_stat); | ||
970 | if (ENABLE_DEBUG && ret && (errno != EEXIST)) | ||
971 | debug_msg_logger(LOG_ERR, "copy_inode: %s to %s: %m", source, destination); | ||
972 | return; | ||
973 | } /* End Function action_copy */ | ||
974 | |||
975 | static void action_compat (const struct devfsd_notify_struct *info, unsigned int action) | ||
976 | /* [SUMMARY] Process a compatibility request. | ||
977 | <info> The devfs change. | ||
978 | <action> The action to take. | ||
979 | [RETURNS] Nothing. | ||
980 | */ | ||
981 | { | ||
982 | int ret; | ||
983 | const char *compat_name = NULL; | ||
984 | const char *dest_name = info->devname; | ||
985 | char *ptr=NULL; | ||
986 | char compat_buf[STRING_LENGTH], dest_buf[STRING_LENGTH]; | ||
987 | int mode, host, bus, target, lun; | ||
988 | unsigned int i; | ||
989 | char rewind_; | ||
990 | /* 1 to 5 "scsi/" , 6 to 9 "ide/host" */ | ||
991 | static const char *const fmt[] = { | ||
992 | NULL , | ||
993 | "sg/c%db%dt%du%d", /* scsi/generic */ | ||
994 | "sd/c%db%dt%du%d", /* scsi/disc */ | ||
995 | "sr/c%db%dt%du%d", /* scsi/cd */ | ||
996 | "sd/c%db%dt%du%dp%d", /* scsi/part */ | ||
997 | "st/c%db%dt%du%dm%d%c", /* scsi/mt */ | ||
998 | "ide/hd/c%db%dt%du%d", /* ide/host/disc */ | ||
999 | "ide/cd/c%db%dt%du%d", /* ide/host/cd */ | ||
1000 | "ide/hd/c%db%dt%du%dp%d", /* ide/host/part */ | ||
1001 | "ide/mt/c%db%dt%du%d%s", /* ide/host/mt */ | ||
1002 | NULL | ||
1003 | }; | ||
1004 | |||
1005 | /* First construct compatibility name */ | ||
1006 | switch (action) | ||
1007 | { | ||
1008 | case AC_MKOLDCOMPAT: | ||
1009 | case AC_RMOLDCOMPAT: | ||
1010 | compat_name = get_old_name (info->devname, info->namelen, compat_buf, info->major, info->minor); | ||
1011 | break; | ||
1012 | case AC_MKNEWCOMPAT: | ||
1013 | case AC_RMNEWCOMPAT: | ||
1014 | ptr = strrchr (info->devname, '/') + 1; | ||
1015 | i=scan_dev_name(info->devname, info->namelen, ptr); | ||
1016 | |||
1017 | debug_msg_logger(LOG_INFO, "%s: scan_dev_name = %d", __FUNCTION__, i); | ||
1018 | |||
1019 | /* nothing found */ | ||
1020 | if(i==0 || i > 9) | ||
1021 | return; | ||
1022 | |||
1023 | sscanf (info->devname +((i<6)?5:4), "host%d/bus%d/target%d/lun%d/", &host, &bus, &target, &lun); | ||
1024 | snprintf (dest_buf, sizeof (dest_buf), "../%s", info->devname + ((i>5)?4:0)); | ||
1025 | dest_name = dest_buf; | ||
1026 | compat_name = compat_buf; | ||
1027 | |||
1028 | |||
1029 | /* 1 == scsi/generic 2 == scsi/disc 3 == scsi/cd 6 == ide/host/disc 7 == ide/host/cd */ | ||
1030 | if( i == 1 || i == 2 || i == 3 || i == 6 || i ==7 ) | ||
1031 | sprintf ( compat_buf, fmt[i], host, bus, target, lun); | ||
1032 | |||
1033 | /* 4 == scsi/part 8 == ide/host/part */ | ||
1034 | if( i == 4 || i == 8) | ||
1035 | sprintf ( compat_buf, fmt[i], host, bus, target, lun, atoi (ptr + 4) ); | ||
1036 | |||
1037 | /* 5 == scsi/mt */ | ||
1038 | if( i == 5) | ||
1039 | { | ||
1040 | rewind_ = info->devname[info->namelen - 1]; | ||
1041 | if (rewind_ != 'n') | ||
1042 | rewind_ = '\0'; | ||
1043 | mode=0; | ||
1044 | if(ptr[2] == 'l' /*108*/ || ptr[2] == 'm'/*109*/) | ||
1045 | mode = ptr[2] - 107; /* 1 or 2 */ | ||
1046 | if(ptr[2] == 'a') | ||
1047 | mode = 3; | ||
1048 | sprintf (compat_buf, fmt [i], host, bus, target, lun, mode, rewind_); | ||
1049 | } | ||
1050 | |||
1051 | /* 9 == ide/host/mt */ | ||
1052 | if( i == 9 ) | ||
1053 | snprintf (compat_buf, sizeof (compat_buf), fmt[i], host, bus, target, lun, ptr + 2); | ||
1054 | /* esac */ | ||
1055 | } /* switch(action) */ | ||
1056 | |||
1057 | if(compat_name == NULL ) | ||
1058 | return; | ||
1059 | |||
1060 | debug_msg_logger( LOG_INFO, "%s: %s", __FUNCTION__, compat_name); | ||
1061 | |||
1062 | /* Now decide what to do with it */ | ||
1063 | switch (action) | ||
1064 | { | ||
1065 | case AC_MKOLDCOMPAT: | ||
1066 | case AC_MKNEWCOMPAT: | ||
1067 | mksymlink (dest_name, compat_name); | ||
1068 | break; | ||
1069 | case AC_RMOLDCOMPAT: | ||
1070 | case AC_RMNEWCOMPAT: | ||
1071 | ret = unlink (compat_name); | ||
1072 | if (ENABLE_DEBUG && ret) | ||
1073 | debug_msg_logger(LOG_ERR, "unlink: %s: %m", compat_name); | ||
1074 | break; | ||
1075 | /*esac*/ | ||
1076 | } /* switch(action) */ | ||
1077 | } /* End Function action_compat */ | ||
1078 | |||
1079 | static void restore(char *spath, struct stat source_stat, int rootlen) | ||
1080 | { | ||
1081 | char dpath[STRING_LENGTH]; | ||
1082 | struct stat dest_stat; | ||
1083 | |||
1084 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1085 | |||
1086 | dest_stat.st_mode = 0; | ||
1087 | snprintf (dpath, sizeof dpath, "%s%s", mount_point, spath + rootlen); | ||
1088 | lstat (dpath, &dest_stat); | ||
1089 | |||
1090 | if ( S_ISLNK (source_stat.st_mode) || (source_stat.st_mode & S_ISVTX) ) | ||
1091 | copy_inode (dpath, &dest_stat, (source_stat.st_mode & ~S_ISVTX) , spath, &source_stat); | ||
1092 | |||
1093 | if ( S_ISDIR (source_stat.st_mode) ) | ||
1094 | dir_operation(RESTORE, spath, rootlen,NULL); | ||
1095 | } | ||
1096 | |||
1097 | |||
1098 | static int copy_inode (const char *destpath, const struct stat *dest_stat, | ||
1099 | mode_t new_mode, | ||
1100 | const char *sourcepath, const struct stat *source_stat) | ||
1101 | /* [SUMMARY] Copy an inode. | ||
1102 | <destpath> The destination path. An existing inode may be deleted. | ||
1103 | <dest_stat> The destination stat(2) information. | ||
1104 | <new_mode> The desired new mode for the destination. | ||
1105 | <sourcepath> The source path. | ||
1106 | <source_stat> The source stat(2) information. | ||
1107 | [RETURNS] TRUE on success, else FALSE. | ||
1108 | */ | ||
1109 | { | ||
1110 | int source_len, dest_len; | ||
1111 | char source_link[STRING_LENGTH], dest_link[STRING_LENGTH]; | ||
1112 | int fd, val; | ||
1113 | struct sockaddr_un un_addr; | ||
1114 | char symlink_val[STRING_LENGTH]; | ||
1115 | |||
1116 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1117 | |||
1118 | if ( (source_stat->st_mode & S_IFMT) == (dest_stat->st_mode & S_IFMT) ) | ||
1119 | { | ||
1120 | /* Same type */ | ||
1121 | if ( S_ISLNK (source_stat->st_mode) ) | ||
1122 | { | ||
1123 | if (( source_len = readlink (sourcepath, source_link, STRING_LENGTH - 1) ) < 0 || | ||
1124 | ( dest_len = readlink (destpath , dest_link , STRING_LENGTH - 1) ) < 0 ) | ||
1125 | return FALSE; | ||
1126 | source_link[source_len] = '\0'; | ||
1127 | dest_link[dest_len] = '\0'; | ||
1128 | if ( (source_len != dest_len) || (strcmp (source_link, dest_link) != 0) ) | ||
1129 | { | ||
1130 | unlink (destpath); | ||
1131 | symlink (source_link, destpath); | ||
1132 | } | ||
1133 | return TRUE; | ||
1134 | } /* Else not a symlink */ | ||
1135 | chmod (destpath, new_mode & ~S_IFMT); | ||
1136 | chown (destpath, source_stat->st_uid, source_stat->st_gid); | ||
1137 | return TRUE; | ||
1138 | } | ||
1139 | /* Different types: unlink and create */ | ||
1140 | unlink (destpath); | ||
1141 | switch (source_stat->st_mode & S_IFMT) | ||
1142 | { | ||
1143 | case S_IFSOCK: | ||
1144 | if ( ( fd = socket (AF_UNIX, SOCK_STREAM, 0) ) < 0 ) | ||
1145 | break; | ||
1146 | un_addr.sun_family = AF_UNIX; | ||
1147 | snprintf (un_addr.sun_path, sizeof (un_addr.sun_path), "%s", destpath); | ||
1148 | val = bind (fd, (struct sockaddr *) &un_addr, (int) sizeof un_addr); | ||
1149 | close (fd); | ||
1150 | if (val != 0 || chmod (destpath, new_mode & ~S_IFMT) != 0) | ||
1151 | break; | ||
1152 | goto do_chown; | ||
1153 | case S_IFLNK: | ||
1154 | if ( ( val = readlink (sourcepath, symlink_val, STRING_LENGTH - 1) ) < 0 ) | ||
1155 | break; | ||
1156 | symlink_val[val] = '\0'; | ||
1157 | if (symlink (symlink_val, destpath) == 0) | ||
1158 | return TRUE; | ||
1159 | break; | ||
1160 | case S_IFREG: | ||
1161 | if ( ( fd = open (destpath, O_RDONLY | O_CREAT, new_mode & ~S_IFMT) ) < 0 ) | ||
1162 | break; | ||
1163 | close (fd); | ||
1164 | if (chmod (destpath, new_mode & ~S_IFMT) != 0) | ||
1165 | break; | ||
1166 | goto do_chown; | ||
1167 | case S_IFBLK: | ||
1168 | case S_IFCHR: | ||
1169 | case S_IFIFO: | ||
1170 | if (mknod (destpath, new_mode, source_stat->st_rdev) != 0) | ||
1171 | break; | ||
1172 | goto do_chown; | ||
1173 | case S_IFDIR: | ||
1174 | if (mkdir (destpath, new_mode & ~S_IFMT) != 0) | ||
1175 | break; | ||
1176 | do_chown: | ||
1177 | if (chown (destpath, source_stat->st_uid, source_stat->st_gid) == 0) | ||
1178 | return TRUE; | ||
1179 | /*break;*/ | ||
1180 | } | ||
1181 | return FALSE; | ||
1182 | } /* End Function copy_inode */ | ||
1183 | |||
1184 | static void free_config (void) | ||
1185 | /* [SUMMARY] Free the configuration information. | ||
1186 | [RETURNS] Nothing. | ||
1187 | */ | ||
1188 | { | ||
1189 | struct config_entry_struct *c_entry; | ||
1190 | void *next; | ||
1191 | |||
1192 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1193 | |||
1194 | for (c_entry = first_config; c_entry != NULL; c_entry = next) | ||
1195 | { | ||
1196 | unsigned int count; | ||
1197 | |||
1198 | next = c_entry->next; | ||
1199 | regfree (&c_entry->preg); | ||
1200 | if (c_entry->action.what == AC_EXECUTE) | ||
1201 | { | ||
1202 | for (count = 0; count < MAX_ARGS; ++count) | ||
1203 | { | ||
1204 | if (c_entry->u.execute.argv[count] == NULL) | ||
1205 | break; | ||
1206 | free (c_entry->u.execute.argv[count]); | ||
1207 | } | ||
1208 | } | ||
1209 | free (c_entry); | ||
1210 | } | ||
1211 | first_config = NULL; | ||
1212 | last_config = NULL; | ||
1213 | } /* End Function free_config */ | ||
1214 | |||
1215 | static int get_uid_gid (int flag, const char *string) | ||
1216 | /* [SUMMARY] Convert a string to a UID or GID value. | ||
1217 | <flag> "UID" or "GID". | ||
1218 | <string> The string. | ||
1219 | [RETURNS] The UID or GID value. | ||
1220 | */ | ||
1221 | { | ||
1222 | struct passwd *pw_ent; | ||
1223 | struct group *grp_ent; | ||
1224 | static char *msg; | ||
1225 | |||
1226 | if (ENABLE_DEVFSD_VERBOSE) | ||
1227 | msg="user"; | ||
1228 | |||
1229 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1230 | |||
1231 | if(ENABLE_DEBUG && flag != UID && flag != GID) | ||
1232 | msg_logger_and_die(LOG_ERR,"%s: flag != UID && flag != GID", __FUNCTION__); | ||
1233 | |||
1234 | if ( isdigit (string[0]) || ( (string[0] == '-') && isdigit (string[1]) ) ) | ||
1235 | return atoi(string); | ||
1236 | |||
1237 | if ( flag == UID && ( pw_ent = getpwnam (string) ) != NULL ) | ||
1238 | return pw_ent->pw_uid; | ||
1239 | |||
1240 | if ( flag == GID && ( grp_ent = getgrnam (string) ) != NULL ) | ||
1241 | return grp_ent->gr_gid; | ||
1242 | else if(ENABLE_DEVFSD_VERBOSE) | ||
1243 | msg="group"; | ||
1244 | |||
1245 | if(ENABLE_DEVFSD_VERBOSE) | ||
1246 | msg_logger(LOG_ERR,"unknown %s: %s, defaulting to %cid=0", msg, string, msg[0]); | ||
1247 | return 0; | ||
1248 | }/* End Function get_uid_gid */ | ||
1249 | |||
1250 | static mode_t get_mode (const char *string) | ||
1251 | /* [SUMMARY] Convert a string to a mode value. | ||
1252 | <string> The string. | ||
1253 | [RETURNS] The mode value. | ||
1254 | */ | ||
1255 | { | ||
1256 | mode_t mode; | ||
1257 | int i; | ||
1258 | |||
1259 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1260 | |||
1261 | if ( isdigit (string[0]) ) | ||
1262 | return strtoul(string, NULL, 8); | ||
1263 | if (strlen (string) != 9) | ||
1264 | msg_logger_and_die(LOG_ERR, "bad mode: %s", string); | ||
1265 | |||
1266 | mode = 0; | ||
1267 | i= S_IRUSR; | ||
1268 | while(i>0) | ||
1269 | { | ||
1270 | if(string[0]=='r'||string[0]=='w'||string[0]=='x') | ||
1271 | mode+=i; | ||
1272 | i=i/2; | ||
1273 | string++; | ||
1274 | } | ||
1275 | return mode; | ||
1276 | } /* End Function get_mode */ | ||
1277 | |||
1278 | static void signal_handler (int sig) | ||
1279 | { | ||
1280 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1281 | |||
1282 | caught_signal = TRUE; | ||
1283 | if (sig == SIGHUP) | ||
1284 | caught_sighup = TRUE; | ||
1285 | |||
1286 | msg_logger(LOG_INFO, "Caught signal %d", sig); | ||
1287 | } /* End Function signal_handler */ | ||
1288 | |||
1289 | static const char *get_variable (const char *variable, void *info) | ||
1290 | { | ||
1291 | struct get_variable_info *gv_info = info; | ||
1292 | static char hostname[STRING_LENGTH], sbuf[STRING_LENGTH]; | ||
1293 | const char *field_names[] = { "hostname", "mntpt", "devpath", "devname", | ||
1294 | "uid", "gid", "mode", hostname, mount_point, | ||
1295 | gv_info->devpath, gv_info->devname, 0 }; | ||
1296 | int i; | ||
1297 | |||
1298 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1299 | |||
1300 | if (gethostname (hostname, STRING_LENGTH - 1) != 0) | ||
1301 | msg_logger_and_die(LOG_ERR, "gethostname: %m"); | ||
1302 | |||
1303 | /* Here on error we should do exit(RV_SYS_ERROR), instead we do exit(EXIT_FAILURE) */ | ||
1304 | hostname[STRING_LENGTH - 1] = '\0'; | ||
1305 | |||
1306 | /* index_in_str_array returns i>=0 */ | ||
1307 | i=index_in_str_array(field_names, variable); | ||
1308 | |||
1309 | if ( i > 6 || i < 0 || (i > 1 && gv_info == NULL)) | ||
1310 | return NULL; | ||
1311 | if( i >= 0 && i <= 3) | ||
1312 | { | ||
1313 | debug_msg_logger(LOG_INFO, "%s: i=%d %s", __FUNCTION__, i ,field_names[i+7]); | ||
1314 | return field_names[i+7]; | ||
1315 | } | ||
1316 | |||
1317 | if(i == 4 ) | ||
1318 | sprintf (sbuf, "%u", gv_info->info->uid); | ||
1319 | else if(i == 5) | ||
1320 | sprintf (sbuf, "%u", gv_info->info->gid); | ||
1321 | else if(i == 6) | ||
1322 | sprintf (sbuf, "%o", gv_info->info->mode); | ||
1323 | |||
1324 | debug_msg_logger(LOG_INFO, "%s: %s", __FUNCTION__, sbuf); | ||
1325 | |||
1326 | return sbuf; | ||
1327 | } /* End Function get_variable */ | ||
1328 | |||
1329 | static void service(struct stat statbuf, char *path) | ||
1330 | { | ||
1331 | struct devfsd_notify_struct info; | ||
1332 | |||
1333 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1334 | |||
1335 | memset (&info, 0, sizeof info); | ||
1336 | info.type = DEVFSD_NOTIFY_REGISTERED; | ||
1337 | info.mode = statbuf.st_mode; | ||
1338 | info.major = major (statbuf.st_rdev); | ||
1339 | info.minor = minor (statbuf.st_rdev); | ||
1340 | info.uid = statbuf.st_uid; | ||
1341 | info.gid = statbuf.st_gid; | ||
1342 | snprintf (info.devname, sizeof (info.devname), "%s", path + strlen (mount_point) + 1); | ||
1343 | info.namelen = strlen (info.devname); | ||
1344 | service_name (&info); | ||
1345 | if ( S_ISDIR (statbuf.st_mode) ) | ||
1346 | dir_operation(SERVICE,path,0,NULL); | ||
1347 | } | ||
1348 | |||
1349 | static void dir_operation(int type, const char * dir_name, int var, unsigned long *event_mask) | ||
1350 | /* [SUMMARY] Scan a directory tree and generate register events on leaf nodes. | ||
1351 | <flag> To choose which function to perform | ||
1352 | <dp> The directory pointer. This is closed upon completion. | ||
1353 | <dir_name> The name of the directory. | ||
1354 | <rootlen> string length parameter. | ||
1355 | [RETURNS] Nothing. | ||
1356 | */ | ||
1357 | { | ||
1358 | struct stat statbuf; | ||
1359 | DIR *dp; | ||
1360 | struct dirent *de; | ||
1361 | char path[STRING_LENGTH]; | ||
1362 | |||
1363 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1364 | |||
1365 | if((dp = opendir( dir_name))==NULL) | ||
1366 | { | ||
1367 | debug_msg_logger(LOG_ERR, "opendir: %s: %m", dir_name); | ||
1368 | return; | ||
1369 | } | ||
1370 | |||
1371 | while ( (de = readdir (dp) ) != NULL ) | ||
1372 | { | ||
1373 | |||
1374 | if(de->d_name && *de->d_name == '.' && (!de->d_name[1] || (de->d_name[1] == '.' && !de->d_name[2]))) | ||
1375 | continue; | ||
1376 | snprintf (path, sizeof (path), "%s/%s", dir_name, de->d_name); | ||
1377 | debug_msg_logger(LOG_ERR, "%s: %s", __FUNCTION__, path); | ||
1378 | |||
1379 | if (lstat (path, &statbuf) != 0) | ||
1380 | { | ||
1381 | debug_msg_logger(LOG_ERR, "%s: %s: %m", __FUNCTION__, path); | ||
1382 | continue; | ||
1383 | } | ||
1384 | switch(type) | ||
1385 | { | ||
1386 | case SERVICE: | ||
1387 | service(statbuf,path); | ||
1388 | break; | ||
1389 | case RESTORE: | ||
1390 | restore(path, statbuf, var); | ||
1391 | break; | ||
1392 | case READ_CONFIG: | ||
1393 | read_config_file (path, var, event_mask); | ||
1394 | break; | ||
1395 | } | ||
1396 | } | ||
1397 | closedir (dp); | ||
1398 | } /* End Function do_scan_and_service */ | ||
1399 | |||
1400 | static int mksymlink (const char *oldpath, const char *newpath) | ||
1401 | /* [SUMMARY] Create a symlink, creating intervening directories as required. | ||
1402 | <oldpath> The string contained in the symlink. | ||
1403 | <newpath> The name of the new symlink. | ||
1404 | [RETURNS] 0 on success, else -1. | ||
1405 | */ | ||
1406 | { | ||
1407 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1408 | |||
1409 | if ( !make_dir_tree (newpath) ) | ||
1410 | return -1; | ||
1411 | |||
1412 | if (symlink (oldpath, newpath) != 0) { | ||
1413 | if (errno != EEXIST) { | ||
1414 | debug_msg_logger(LOG_ERR, "%s: %s to %s: %m", __FUNCTION__, oldpath, newpath); | ||
1415 | return -1; | ||
1416 | } | ||
1417 | } | ||
1418 | return 0; | ||
1419 | } /* End Function mksymlink */ | ||
1420 | |||
1421 | |||
1422 | static int make_dir_tree (const char *path) | ||
1423 | /* [SUMMARY] Creating intervening directories for a path as required. | ||
1424 | <path> The full pathname (including the leaf node). | ||
1425 | [RETURNS] TRUE on success, else FALSE. | ||
1426 | */ | ||
1427 | { | ||
1428 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1429 | |||
1430 | if (bb_make_directory( dirname((char *)path), -1, FILEUTILS_RECUR )==-1) | ||
1431 | { | ||
1432 | debug_msg_logger(LOG_ERR, "%s: %s: %m",__FUNCTION__, path); | ||
1433 | return FALSE; | ||
1434 | } | ||
1435 | return TRUE; | ||
1436 | } /* End Function make_dir_tree */ | ||
1437 | |||
1438 | static int expand_expression(char *output, unsigned int outsize, | ||
1439 | const char *input, | ||
1440 | const char *(*get_variable_func)(const char *variable, void *info), | ||
1441 | void *info, | ||
1442 | const char *devname, | ||
1443 | const regmatch_t *ex, unsigned int numexp) | ||
1444 | /* [SUMMARY] Expand environment variables and regular subexpressions in string. | ||
1445 | <output> The output expanded expression is written here. | ||
1446 | <length> The size of the output buffer. | ||
1447 | <input> The input expression. This may equal <<output>>. | ||
1448 | <get_variable> A function which will be used to get variable values. If | ||
1449 | this returns NULL, the environment is searched instead. If this is NULL, | ||
1450 | only the environment is searched. | ||
1451 | <info> An arbitrary pointer passed to <<get_variable>>. | ||
1452 | <devname> Device name; specifically, this is the string that contains all | ||
1453 | of the regular subexpressions. | ||
1454 | <ex> Array of start / end offsets into info->devname for each subexpression | ||
1455 | <numexp> Number of regular subexpressions found in <<devname>>. | ||
1456 | [RETURNS] TRUE on success, else FALSE. | ||
1457 | */ | ||
1458 | { | ||
1459 | char temp[STRING_LENGTH]; | ||
1460 | |||
1461 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1462 | |||
1463 | if ( !st_expr_expand (temp, STRING_LENGTH, input, get_variable_func, info) ) | ||
1464 | return FALSE; | ||
1465 | expand_regexp (output, outsize, temp, devname, ex, numexp); | ||
1466 | return TRUE; | ||
1467 | } /* End Function expand_expression */ | ||
1468 | |||
1469 | static void expand_regexp (char *output, size_t outsize, const char *input, | ||
1470 | const char *devname, | ||
1471 | const regmatch_t *ex, unsigned int numex ) | ||
1472 | /* [SUMMARY] Expand all occurrences of the regular subexpressions \0 to \9. | ||
1473 | <output> The output expanded expression is written here. | ||
1474 | <outsize> The size of the output buffer. | ||
1475 | <input> The input expression. This may NOT equal <<output>>, because | ||
1476 | supporting that would require yet another string-copy. However, it's not | ||
1477 | hard to write a simple wrapper function to add this functionality for those | ||
1478 | few cases that need it. | ||
1479 | <devname> Device name; specifically, this is the string that contains all | ||
1480 | of the regular subexpressions. | ||
1481 | <ex> An array of start and end offsets into <<devname>>, one for each | ||
1482 | subexpression | ||
1483 | <numex> Number of subexpressions in the offset-array <<ex>>. | ||
1484 | [RETURNS] Nothing. | ||
1485 | */ | ||
1486 | { | ||
1487 | const char last_exp = '0' - 1 + numex; | ||
1488 | int c = -1; | ||
1489 | |||
1490 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1491 | |||
1492 | /* Guarantee NULL termination by writing an explicit '\0' character into | ||
1493 | the very last byte */ | ||
1494 | if (outsize) | ||
1495 | output[--outsize] = '\0'; | ||
1496 | /* Copy the input string into the output buffer, replacing '\\' with '\' | ||
1497 | and '\0' .. '\9' with subexpressions 0 .. 9, if they exist. Other \x | ||
1498 | codes are deleted */ | ||
1499 | while ( (c != '\0') && (outsize != 0) ) | ||
1500 | { | ||
1501 | c = *input; | ||
1502 | ++input; | ||
1503 | if (c == '\\') | ||
1504 | { | ||
1505 | c = *input; | ||
1506 | ++input; | ||
1507 | if (c != '\\') | ||
1508 | { | ||
1509 | if ((c >= '0') && (c <= last_exp)) | ||
1510 | { | ||
1511 | const regmatch_t *subexp = ex + (c - '0'); | ||
1512 | unsigned int sublen = subexp->rm_eo - subexp->rm_so; | ||
1513 | |||
1514 | /* Range checking */ | ||
1515 | if (sublen > outsize) | ||
1516 | sublen = outsize; | ||
1517 | strncpy (output, devname + subexp->rm_so, sublen); | ||
1518 | output += sublen; | ||
1519 | outsize -= sublen; | ||
1520 | } | ||
1521 | continue; | ||
1522 | } | ||
1523 | } | ||
1524 | *output = c; | ||
1525 | ++output; | ||
1526 | --outsize; | ||
1527 | } /* while */ | ||
1528 | } /* End Function expand_regexp */ | ||
1529 | |||
1530 | |||
1531 | /* from compat_name.c */ | ||
1532 | |||
1533 | struct translate_struct | ||
1534 | { | ||
1535 | char *match; /* The string to match to (up to length) */ | ||
1536 | char *format; /* Format of output, "%s" takes data past match string, | ||
1537 | NULL is effectively "%s" (just more efficient) */ | ||
1538 | }; | ||
1539 | |||
1540 | static struct translate_struct translate_table[] = | ||
1541 | { | ||
1542 | {"sound/", NULL}, | ||
1543 | {"printers/", "lp%s"}, | ||
1544 | {"v4l/", NULL}, | ||
1545 | {"parports/", "parport%s"}, | ||
1546 | {"fb/", "fb%s"}, | ||
1547 | {"netlink/", NULL}, | ||
1548 | {"loop/", "loop%s"}, | ||
1549 | {"floppy/", "fd%s"}, | ||
1550 | {"rd/", "ram%s"}, | ||
1551 | {"md/", "md%s"}, /* Meta-devices */ | ||
1552 | {"vc/", "tty%s"}, | ||
1553 | {"misc/", NULL}, | ||
1554 | {"isdn/", NULL}, | ||
1555 | {"pg/", "pg%s"}, /* Parallel port generic ATAPI interface*/ | ||
1556 | {"i2c/", "i2c-%s"}, | ||
1557 | {"staliomem/", "staliomem%s"}, /* Stallion serial driver control */ | ||
1558 | {"tts/E", "ttyE%s"}, /* Stallion serial driver */ | ||
1559 | {"cua/E", "cue%s"}, /* Stallion serial driver callout */ | ||
1560 | {"tts/R", "ttyR%s"}, /* Rocketport serial driver */ | ||
1561 | {"cua/R", "cur%s"}, /* Rocketport serial driver callout */ | ||
1562 | {"ip2/", "ip2%s"}, /* Computone serial driver control */ | ||
1563 | {"tts/F", "ttyF%s"}, /* Computone serial driver */ | ||
1564 | {"cua/F", "cuf%s"}, /* Computone serial driver callout */ | ||
1565 | {"tts/C", "ttyC%s"}, /* Cyclades serial driver */ | ||
1566 | {"cua/C", "cub%s"}, /* Cyclades serial driver callout */ | ||
1567 | {"tts/", "ttyS%s"}, /* Generic serial: must be after others */ | ||
1568 | {"cua/", "cua%s"}, /* Generic serial: must be after others */ | ||
1569 | {"input/js", "js%s"}, /* Joystick driver */ | ||
1570 | {NULL, NULL} | ||
1571 | }; | ||
1572 | |||
1573 | const char *get_old_name (const char *devname, unsigned int namelen, | ||
1574 | char *buffer, unsigned int major, unsigned int minor) | ||
1575 | /* [SUMMARY] Translate a kernel-supplied name into an old name. | ||
1576 | <devname> The device name provided by the kernel. | ||
1577 | <namelen> The length of the name. | ||
1578 | <buffer> A buffer that may be used. This should be at least 128 bytes long. | ||
1579 | <major> The major number for the device. | ||
1580 | <minor> The minor number for the device. | ||
1581 | [RETURNS] A pointer to the old name if known, else NULL. | ||
1582 | */ | ||
1583 | { | ||
1584 | const char *compat_name = NULL; | ||
1585 | char *ptr; | ||
1586 | struct translate_struct *trans; | ||
1587 | unsigned int i; | ||
1588 | char mode; | ||
1589 | int indexx; | ||
1590 | const char *pty1; | ||
1591 | const char *pty2; | ||
1592 | size_t len; | ||
1593 | /* 1 to 5 "scsi/" , 6 to 9 "ide/host", 10 sbp/, 11 vcc/, 12 pty/ */ | ||
1594 | static const char *const fmt[] = { | ||
1595 | NULL , | ||
1596 | "sg%u", /* scsi/generic */ | ||
1597 | NULL, /* scsi/disc */ | ||
1598 | "sr%u", /* scsi/cd */ | ||
1599 | NULL, /* scsi/part */ | ||
1600 | "nst%u%c", /* scsi/mt */ | ||
1601 | "hd%c" , /* ide/host/disc */ | ||
1602 | "hd%c" , /* ide/host/cd */ | ||
1603 | "hd%c%s", /* ide/host/part */ | ||
1604 | "%sht%d", /* ide/host/mt */ | ||
1605 | "sbpcd%u", /* sbp/ */ | ||
1606 | "vcs%s", /* vcc/ */ | ||
1607 | "%cty%c%c", /* pty/ */ | ||
1608 | NULL | ||
1609 | }; | ||
1610 | |||
1611 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1612 | |||
1613 | for (trans = translate_table; trans->match != NULL; ++trans) | ||
1614 | { | ||
1615 | len = strlen (trans->match); | ||
1616 | |||
1617 | if (strncmp (devname, trans->match, len) == 0) | ||
1618 | { | ||
1619 | if (trans->format == NULL) | ||
1620 | return devname + len; | ||
1621 | sprintf (buffer, trans->format, devname + len); | ||
1622 | return buffer; | ||
1623 | } | ||
1624 | } | ||
1625 | |||
1626 | ptr = (strrchr (devname, '/') + 1); | ||
1627 | i = scan_dev_name(devname, namelen, ptr); | ||
1628 | |||
1629 | if( i > 0 && i < 13) | ||
1630 | compat_name = buffer; | ||
1631 | else | ||
1632 | return NULL; | ||
1633 | |||
1634 | debug_msg_logger(LOG_INFO, "%s: scan_dev_name = %d", __FUNCTION__, i); | ||
1635 | |||
1636 | /* 1 == scsi/generic, 3 == scsi/cd, 10 == sbp/ */ | ||
1637 | if( i == 1 || i == 3 || i == 10 ) | ||
1638 | sprintf (buffer, fmt[i], minor); | ||
1639 | |||
1640 | /* 2 ==scsi/disc, 4 == scsi/part */ | ||
1641 | if( i == 2 || i == 4) | ||
1642 | compat_name = write_old_sd_name (buffer, major, minor,((i == 2)?"":(ptr + 4))); | ||
1643 | |||
1644 | /* 5 == scsi/mt */ | ||
1645 | if( i == 5) | ||
1646 | { | ||
1647 | mode = ptr[2]; | ||
1648 | if (mode == 'n') | ||
1649 | mode = '\0'; | ||
1650 | sprintf (buffer, fmt[i], minor & 0x1f, mode); | ||
1651 | if (devname[namelen - 1] != 'n') | ||
1652 | ++compat_name; | ||
1653 | } | ||
1654 | /* 6 == ide/host/disc, 7 == ide/host/cd, 8 == ide/host/part */ | ||
1655 | if( i == 6 || i == 7 || i == 8 ) | ||
1656 | /* last arg should be ignored for i == 6 or i== 7 */ | ||
1657 | sprintf (buffer, fmt[i] , get_old_ide_name (major, minor), ptr + 4); | ||
1658 | |||
1659 | /* 9 == ide/host/mt */ | ||
1660 | if( i == 9 ) | ||
1661 | sprintf (buffer, fmt[i], ptr + 2, minor & 0x7f); | ||
1662 | |||
1663 | /* 11 == vcc/ */ | ||
1664 | if( i == 11 ) | ||
1665 | { | ||
1666 | sprintf (buffer, fmt[i], devname + 4); | ||
1667 | if (buffer[3] == '0') | ||
1668 | buffer[3] = '\0'; | ||
1669 | } | ||
1670 | /* 12 == pty/ */ | ||
1671 | if( i == 12 ) | ||
1672 | { | ||
1673 | pty1 = "pqrstuvwxyzabcde"; | ||
1674 | pty2 = "0123456789abcdef"; | ||
1675 | indexx = atoi (devname + 5); | ||
1676 | sprintf (buffer, fmt[i], (devname[4] == 'm') ? 'p' : 't', pty1[indexx >> 4], pty2[indexx & 0x0f]); | ||
1677 | } | ||
1678 | |||
1679 | if(ENABLE_DEBUG && compat_name!=NULL) | ||
1680 | msg_logger(LOG_INFO, "%s: compat_name %s", __FUNCTION__, compat_name); | ||
1681 | |||
1682 | return compat_name; | ||
1683 | } /* End Function get_old_name */ | ||
1684 | |||
1685 | static char get_old_ide_name (unsigned int major, unsigned int minor) | ||
1686 | /* [SUMMARY] Get the old IDE name for a device. | ||
1687 | <major> The major number for the device. | ||
1688 | <minor> The minor number for the device. | ||
1689 | [RETURNS] The drive letter. | ||
1690 | */ | ||
1691 | { | ||
1692 | char letter='y'; /* 121 */ | ||
1693 | char c='a'; /* 97 */ | ||
1694 | int i=IDE0_MAJOR; | ||
1695 | |||
1696 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1697 | |||
1698 | /* I hope it works like the previous code as it saves a few bytes. Tito ;P */ | ||
1699 | do { | ||
1700 | if( i==IDE0_MAJOR || i==IDE1_MAJOR || i==IDE2_MAJOR || | ||
1701 | i==IDE3_MAJOR || i==IDE4_MAJOR || i==IDE5_MAJOR || | ||
1702 | i==IDE6_MAJOR || i==IDE7_MAJOR || i==IDE8_MAJOR || | ||
1703 | i==IDE9_MAJOR ) | ||
1704 | { | ||
1705 | if((unsigned int)i==major) | ||
1706 | { | ||
1707 | letter=c; | ||
1708 | break; | ||
1709 | } | ||
1710 | c+=2; | ||
1711 | } | ||
1712 | i++; | ||
1713 | } while(i<=IDE9_MAJOR); | ||
1714 | |||
1715 | if (minor > 63) | ||
1716 | ++letter; | ||
1717 | return letter; | ||
1718 | } /* End Function get_old_ide_name */ | ||
1719 | |||
1720 | static char *write_old_sd_name (char *buffer, | ||
1721 | unsigned int major, unsigned int minor, | ||
1722 | char *part) | ||
1723 | /* [SUMMARY] Write the old SCSI disc name to a buffer. | ||
1724 | <buffer> The buffer to write to. | ||
1725 | <major> The major number for the device. | ||
1726 | <minor> The minor number for the device. | ||
1727 | <part> The partition string. Must be "" for a whole-disc entry. | ||
1728 | [RETURNS] A pointer to the buffer on success, else NULL. | ||
1729 | */ | ||
1730 | { | ||
1731 | unsigned int disc_index; | ||
1732 | |||
1733 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1734 | |||
1735 | if (major == 8) | ||
1736 | { | ||
1737 | sprintf (buffer, "sd%c%s", 'a' + (minor >> 4), part); | ||
1738 | return buffer; | ||
1739 | } | ||
1740 | if ( (major > 64) && (major < 72) ) | ||
1741 | { | ||
1742 | disc_index = ( (major - 64) << 4 ) + (minor >> 4); | ||
1743 | if (disc_index < 26) | ||
1744 | sprintf (buffer, "sd%c%s", 'a' + disc_index, part); | ||
1745 | else | ||
1746 | sprintf (buffer, "sd%c%c%s", 'a' + (disc_index / 26) - 1, 'a' + disc_index % 26,part); | ||
1747 | return buffer; | ||
1748 | } | ||
1749 | return NULL; | ||
1750 | } /* End Function write_old_sd_name */ | ||
1751 | |||
1752 | |||
1753 | /* expression.c */ | ||
1754 | |||
1755 | /*EXPERIMENTAL_FUNCTION*/ | ||
1756 | |||
1757 | int st_expr_expand (char *output, unsigned int length, const char *input, | ||
1758 | const char *(*get_variable_func) (const char *variable, | ||
1759 | void *info), | ||
1760 | void *info) | ||
1761 | /* [SUMMARY] Expand an expression using Borne Shell-like unquoted rules. | ||
1762 | <output> The output expanded expression is written here. | ||
1763 | <length> The size of the output buffer. | ||
1764 | <input> The input expression. This may equal <<output>>. | ||
1765 | <get_variable> A function which will be used to get variable values. If | ||
1766 | this returns NULL, the environment is searched instead. If this is NULL, | ||
1767 | only the environment is searched. | ||
1768 | <info> An arbitrary pointer passed to <<get_variable>>. | ||
1769 | [RETURNS] TRUE on success, else FALSE. | ||
1770 | */ | ||
1771 | { | ||
1772 | char ch; | ||
1773 | unsigned int len; | ||
1774 | unsigned int out_pos = 0; | ||
1775 | const char *env; | ||
1776 | const char *ptr; | ||
1777 | struct passwd *pwent; | ||
1778 | char buffer[BUFFER_SIZE], tmp[STRING_LENGTH]; | ||
1779 | |||
1780 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1781 | |||
1782 | if (length > BUFFER_SIZE) | ||
1783 | length = BUFFER_SIZE; | ||
1784 | for (; TRUE; ++input) | ||
1785 | { | ||
1786 | switch (ch = *input) | ||
1787 | { | ||
1788 | case '$': | ||
1789 | /* Variable expansion */ | ||
1790 | input = expand_variable (buffer, length, &out_pos, ++input, get_variable_func, info); | ||
1791 | if (input == NULL) | ||
1792 | return FALSE; | ||
1793 | break; | ||
1794 | case '~': | ||
1795 | /* Home directory expansion */ | ||
1796 | ch = input[1]; | ||
1797 | if ( isspace (ch) || (ch == '/') || (ch == '\0') ) | ||
1798 | { | ||
1799 | /* User's own home directory: leave separator for next time */ | ||
1800 | if ( ( env = getenv ("HOME") ) == NULL ) | ||
1801 | { | ||
1802 | msg_logger(LOG_INFO, bb_msg_variable_not_found, "HOME"); | ||
1803 | return FALSE; | ||
1804 | } | ||
1805 | len = strlen (env); | ||
1806 | if (len + out_pos >= length) | ||
1807 | goto st_expr_expand_out; | ||
1808 | memcpy (buffer + out_pos, env, len + 1); | ||
1809 | out_pos += len; | ||
1810 | continue; | ||
1811 | } | ||
1812 | /* Someone else's home directory */ | ||
1813 | for (ptr = ++input; !isspace (ch) && (ch != '/') && (ch != '\0'); ch = *++ptr) | ||
1814 | /* VOID */ ; | ||
1815 | len = ptr - input; | ||
1816 | if (len >= sizeof tmp) | ||
1817 | goto st_expr_expand_out; | ||
1818 | safe_memcpy (tmp, input, len); | ||
1819 | input = ptr - 1; | ||
1820 | if ( ( pwent = getpwnam (tmp) ) == NULL ) | ||
1821 | { | ||
1822 | msg_logger(LOG_INFO, "no pwent for: %s", tmp); | ||
1823 | return FALSE; | ||
1824 | } | ||
1825 | len = strlen (pwent->pw_dir); | ||
1826 | if (len + out_pos >= length) | ||
1827 | goto st_expr_expand_out; | ||
1828 | memcpy (buffer + out_pos, pwent->pw_dir, len + 1); | ||
1829 | out_pos += len; | ||
1830 | break; | ||
1831 | case '\0': | ||
1832 | /* Falltrough */ | ||
1833 | default: | ||
1834 | if (out_pos >= length) | ||
1835 | goto st_expr_expand_out; | ||
1836 | buffer[out_pos++] = ch; | ||
1837 | if (ch == '\0') | ||
1838 | { | ||
1839 | memcpy (output, buffer, out_pos); | ||
1840 | return TRUE; | ||
1841 | } | ||
1842 | break; | ||
1843 | /* esac */ | ||
1844 | } | ||
1845 | } | ||
1846 | return FALSE; | ||
1847 | st_expr_expand_out: | ||
1848 | msg_logger(LOG_INFO, bb_msg_small_buffer); | ||
1849 | return FALSE; | ||
1850 | } /* End Function st_expr_expand */ | ||
1851 | |||
1852 | |||
1853 | /* Private functions follow */ | ||
1854 | |||
1855 | static const char *expand_variable (char *buffer, unsigned int length, | ||
1856 | unsigned int *out_pos, const char *input, | ||
1857 | const char *(*func) (const char *variable, | ||
1858 | void *info), | ||
1859 | void *info) | ||
1860 | /* [SUMMARY] Expand a variable. | ||
1861 | <buffer> The buffer to write to. | ||
1862 | <length> The length of the output buffer. | ||
1863 | <out_pos> The current output position. This is updated. | ||
1864 | <input> A pointer to the input character pointer. | ||
1865 | <func> A function which will be used to get variable values. If this | ||
1866 | returns NULL, the environment is searched instead. If this is NULL, only | ||
1867 | the environment is searched. | ||
1868 | <info> An arbitrary pointer passed to <<func>>. | ||
1869 | <errfp> Diagnostic messages are written here. | ||
1870 | [RETURNS] A pointer to the end of this subexpression on success, else NULL. | ||
1871 | */ | ||
1872 | { | ||
1873 | char ch; | ||
1874 | int len; | ||
1875 | unsigned int open_braces; | ||
1876 | const char *env, *ptr; | ||
1877 | char tmp[STRING_LENGTH]; | ||
1878 | |||
1879 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
1880 | |||
1881 | ch = input[0]; | ||
1882 | if (ch == '$') | ||
1883 | { | ||
1884 | /* Special case for "$$": PID */ | ||
1885 | sprintf ( tmp, "%d", (int) getpid () ); | ||
1886 | len = strlen (tmp); | ||
1887 | if (len + *out_pos >= length) | ||
1888 | goto expand_variable_out; | ||
1889 | |||
1890 | memcpy (buffer + *out_pos, tmp, len + 1); | ||
1891 | out_pos += len; | ||
1892 | return input; | ||
1893 | } | ||
1894 | /* Ordinary variable expansion, possibly in braces */ | ||
1895 | if (ch != '{') | ||
1896 | { | ||
1897 | /* Simple variable expansion */ | ||
1898 | for (ptr = input; isalnum (ch) || (ch == '_') || (ch == ':');ch = *++ptr) | ||
1899 | /* VOID */ ; | ||
1900 | len = ptr - input; | ||
1901 | if ((size_t)len >= sizeof tmp) | ||
1902 | goto expand_variable_out; | ||
1903 | |||
1904 | safe_memcpy (tmp, input, len); | ||
1905 | input = ptr - 1; | ||
1906 | if ( ( env = get_variable_v2 (tmp, func, info) ) == NULL ) | ||
1907 | { | ||
1908 | msg_logger(LOG_INFO, bb_msg_variable_not_found, tmp); | ||
1909 | return NULL; | ||
1910 | } | ||
1911 | len = strlen (env); | ||
1912 | if (len + *out_pos >= length) | ||
1913 | goto expand_variable_out; | ||
1914 | |||
1915 | memcpy (buffer + *out_pos, env, len + 1); | ||
1916 | *out_pos += len; | ||
1917 | return input; | ||
1918 | } | ||
1919 | /* Variable in braces: check for ':' tricks */ | ||
1920 | ch = *++input; | ||
1921 | for (ptr = input; isalnum (ch) || (ch == '_'); ch = *++ptr) | ||
1922 | /* VOID */; | ||
1923 | if (ch == '}') | ||
1924 | { | ||
1925 | /* Must be simple variable expansion with "${var}" */ | ||
1926 | len = ptr - input; | ||
1927 | if ((size_t)len >= sizeof tmp) | ||
1928 | goto expand_variable_out; | ||
1929 | |||
1930 | safe_memcpy (tmp, input, len); | ||
1931 | ptr = expand_variable (buffer, length, out_pos, tmp, func, info ); | ||
1932 | if (ptr == NULL) | ||
1933 | return NULL; | ||
1934 | return input + len; | ||
1935 | } | ||
1936 | if (ch != ':' || ptr[1] != '-' ) | ||
1937 | { | ||
1938 | msg_logger(LOG_INFO, "illegal char in var name"); | ||
1939 | return NULL; | ||
1940 | } | ||
1941 | /* It's that handy "${var:-word}" expression. Check if var is defined */ | ||
1942 | len = ptr - input; | ||
1943 | if ((size_t)len >= sizeof tmp) | ||
1944 | goto expand_variable_out; | ||
1945 | |||
1946 | safe_memcpy (tmp, input, len); | ||
1947 | /* Move input pointer to ':' */ | ||
1948 | input = ptr; | ||
1949 | /* First skip to closing brace, taking note of nested expressions */ | ||
1950 | ptr += 2; | ||
1951 | ch = ptr[0]; | ||
1952 | for (open_braces = 1; open_braces > 0; ch = *++ptr) | ||
1953 | { | ||
1954 | switch (ch) | ||
1955 | { | ||
1956 | case '{': | ||
1957 | ++open_braces; | ||
1958 | break; | ||
1959 | case '}': | ||
1960 | --open_braces; | ||
1961 | break; | ||
1962 | case '\0': | ||
1963 | msg_logger(LOG_INFO,"\"}\" not found in: %s", input); | ||
1964 | return NULL; | ||
1965 | default: | ||
1966 | break; | ||
1967 | } | ||
1968 | } | ||
1969 | --ptr; | ||
1970 | /* At this point ptr should point to closing brace of "${var:-word}" */ | ||
1971 | if ( ( env = get_variable_v2 (tmp, func, info) ) != NULL ) | ||
1972 | { | ||
1973 | /* Found environment variable, so skip the input to the closing brace | ||
1974 | and return the variable */ | ||
1975 | input = ptr; | ||
1976 | len = strlen (env); | ||
1977 | if (len + *out_pos >= length) | ||
1978 | goto expand_variable_out; | ||
1979 | |||
1980 | memcpy (buffer + *out_pos, env, len + 1); | ||
1981 | *out_pos += len; | ||
1982 | return input; | ||
1983 | } | ||
1984 | /* Environment variable was not found, so process word. Advance input | ||
1985 | pointer to start of word in "${var:-word}" */ | ||
1986 | input += 2; | ||
1987 | len = ptr - input; | ||
1988 | if ((size_t)len >= sizeof tmp) | ||
1989 | goto expand_variable_out; | ||
1990 | |||
1991 | safe_memcpy (tmp, input, len); | ||
1992 | input = ptr; | ||
1993 | if ( !st_expr_expand (tmp, STRING_LENGTH, tmp, func, info ) ) | ||
1994 | return NULL; | ||
1995 | len = strlen (tmp); | ||
1996 | if (len + *out_pos >= length) | ||
1997 | goto expand_variable_out; | ||
1998 | |||
1999 | memcpy (buffer + *out_pos, tmp, len + 1); | ||
2000 | *out_pos += len; | ||
2001 | return input; | ||
2002 | expand_variable_out: | ||
2003 | msg_logger(LOG_INFO, bb_msg_small_buffer); | ||
2004 | return NULL; | ||
2005 | } /* End Function expand_variable */ | ||
2006 | |||
2007 | |||
2008 | static const char *get_variable_v2 (const char *variable, | ||
2009 | const char *(*func) (const char *variable, void *info), | ||
2010 | void *info) | ||
2011 | /* [SUMMARY] Get a variable from the environment or . | ||
2012 | <variable> The variable name. | ||
2013 | <func> A function which will be used to get the variable. If this returns | ||
2014 | NULL, the environment is searched instead. If this is NULL, only the | ||
2015 | environment is searched. | ||
2016 | [RETURNS] The value of the variable on success, else NULL. | ||
2017 | */ | ||
2018 | { | ||
2019 | const char *value; | ||
2020 | |||
2021 | debug_msg_logger(LOG_INFO, __FUNCTION__); | ||
2022 | |||
2023 | if (func != NULL) | ||
2024 | { | ||
2025 | value = (*func) (variable, info); | ||
2026 | if (value != NULL) | ||
2027 | return value; | ||
2028 | } | ||
2029 | return getenv(variable); | ||
2030 | } /* End Function get_variable */ | ||
2031 | |||
2032 | /* END OF CODE */ | ||