source: trunk/src/sh_extern.c@ 222

Last change on this file since 222 was 215, checked in by katerina, 16 years ago

Consolidate filtering code (ticket #142) and match on regular expressions (ticket #143).

File size: 33.9 KB
RevLine 
[1]1/* SAMHAIN file system integrity testing */
2/* Copyright (C) 2000,2004 Rainer Wichmann */
3/* */
4/* This program is free software; you can redistribute it */
5/* and/or modify */
6/* it under the terms of the GNU General Public License as */
7/* published by */
8/* the Free Software Foundation; either version 2 of the License, or */
9/* (at your option) any later version. */
10/* */
11/* This program is distributed in the hope that it will be useful, */
12/* but WITHOUT ANY WARRANTY; without even the implied warranty of */
13/* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the */
14/* GNU General Public License for more details. */
15/* */
16/* You should have received a copy of the GNU General Public License */
17/* along with this program; if not, write to the Free Software */
18/* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
19
20
21#include "config_xor.h"
22
23
24#include <stdio.h>
25#include <string.h>
26#ifdef HAVE_MEMORY_H
27#include <memory.h>
28#endif
29
30/* replace #if 0 by #if 1 and set an appropriate path in front of '/pdbg.'
31 * for debugging
32 */
[212]33#if 0
34#define PDGBFILE "/pdbg."
[1]35#endif
36
37
38#if defined(PDGBFILE)
39static FILE * pdbg = NULL;
40static FILE * pdbgc = NULL;
41#define PDBG_OPEN if (pdbg == NULL) pdbg = fopen(PDGBFILE"main", "a")
42#define PDBG_CLOSE fclose (pdbg); pdbg = NULL
43#define PDBG(arg) fprintf(pdbg, "PDBG: step %d\n", arg); fflush(pdbg)
44#define PDBG_D(arg) fprintf(pdbg, "PDBG: %d\n", arg); fflush(pdbg)
45#define PDBG_S(arg) fprintf(pdbg, "PDBG: %s\n", arg); fflush(pdbg)
46
47#define PDBGC_OPEN if (pdbgc == NULL) pdbgc = fopen(PDGBFILE"child", "a")
48#define PDBGC_CLOSE fclose (pdbgc); pdbgc = NULL
49#define PDBGC(arg) fprintf(pdbgc, "PDBGC: step %d\n", arg); fflush(pdbgc)
50#define PDBGC_D(arg) fprintf(pdbgc, "PDBGC: %d\n", arg); fflush(pdbgc)
51#define PDBGC_S(arg) fprintf(pdbgc, "PDBGC: %s\n", arg); fflush(pdbgc)
52#else
53#define PDBG_OPEN
54#define PDBG_CLOSE
55#define PDBG(arg)
56#define PDBG_D(arg)
57#define PDBG_S(arg)
58#define PDBGC_OPEN
59#define PDBGC_CLOSE
60#define PDBGC(arg)
61#define PDBGC_D(arg)
62#define PDBGC_S(arg)
63#endif
64
65
66#include <stdlib.h>
67#include <pwd.h>
68#include <unistd.h>
69#include <fcntl.h>
70#include <signal.h>
71#include <sys/stat.h>
72#include <sys/types.h>
73#include <errno.h>
74#include <sys/wait.h>
75
76#if TIME_WITH_SYS_TIME
77#include <sys/time.h>
78#include <time.h>
79#else
80#if HAVE_SYS_TIME_H
81#include <sys/time.h>
82#else
83#include <time.h>
84#endif
85#endif
86
87
88#include "samhain.h"
89#include "sh_utils.h"
90#include "sh_unix.h"
91#include "sh_tiger.h"
92#include "sh_extern.h"
93#include "sh_calls.h"
[215]94#include "sh_filter.h"
[1]95#define SH_NEED_PWD_GRP 1
96#include "sh_static.h"
97
98
99#undef FIL__
100#define FIL__ _("sh_extern.c")
101
102extern int get_the_fd (SL_TICKET ticket);
103
104/*
105 * -- generic safe popen
106 */
107
108int sh_ext_popen (sh_tas_t * task)
109{
110 long status = 0;
111 int flags;
112 char * tmp;
113 char * tmp2;
114 int errnum;
115 int pipedes[2];
116 FILE * outf = NULL;
117 char * envp[1];
[29]118 char * argp[2];
[1]119
120 char * errfile;
[132]121 char errbuf[SH_ERRBUF_SIZE];
[1]122
123 static int some_error = 0;
124
125#if defined (__linux__)
126 SL_TICKET fd = -1;
127 char pname[128];
128 int pfd = -1;
129#endif
[102]130
[1]131 SL_ENTER(_("sh_ext_popen"));
132
133 /* Linux, HP-UX and FreeBSD will happily accept envp = argp = NULL
134 * Solaris (and probably some other Unices)
135 * needs a valid *envp[] with envp[0] = NULL;
136 * and similarly for argp
[29]137 * OpenBSD finally needs non-null argp[0] ...
[1]138 */
[29]139 argp[0] = task->command;
140 argp[1] = NULL;
[1]141 envp[0] = NULL;
142
143 /*
144 * -- check whether path is trustworthy
145 */
[169]146 status = sl_trustfile(task->command, NULL, NULL);
147#if 0
[1]148 if ((uid_t) -1 != task->trusted_users[0])
149 {
150 status = sl_trustfile(task->command, task->trusted_users, NULL);
151 }
[169]152#endif
[1]153
154 PDBG_OPEN;
155 PDBG_D( (int) status);
156
157 if ( SL_ENONE != status)
158 {
159 PDBG_S("SL_ENONE != status");
160 if (some_error == 0)
161 {
162 tmp = sh_util_safe_name (task->command);
163 errfile = sl_trust_errfile();
164 if (errfile[0] != '\0')
165 {
166 tmp2 = sh_util_safe_name (sl_trust_errfile());
167 sh_error_handle((-1), FIL__, __LINE__, status, MSG_E_TRUST2,
168 sl_error_string((int)status), tmp, tmp2);
169 SH_FREE(tmp2);
170 }
171 else
172 {
173 sh_error_handle((-1), FIL__, __LINE__, status, MSG_E_TRUST1,
174 sl_error_string((int)status), tmp);
175 }
176 SH_FREE(tmp);
177 }
178 some_error = 1;
179 SL_RETURN ((-1), _("sh_ext_popen"));
180 }
181
182 PDBG(1);
183
184 /*
185 * -- check whether the checksum is correct; with linux emulate fdexec
186 */
187#if !defined(__linux__) && !defined(SL_DEBUG)
188 if (task->checksum[0] != '\0')
189 {
[133]190 char hashbuf[KEYBUF_SIZE];
[1]191 PDBG_S("checksum test");
192 if (0 != sl_strcmp(task->checksum,
[160]193 sh_tiger_hash (task->command, TIGER_FILE, TIGER_NOLIM,
[133]194 hashbuf, sizeof(hashbuf))
195 )
[1]196 )
197 {
198 PDBG_S("checksum mismatch");
199 if (some_error == 0)
200 {
201 tmp = sh_util_safe_name (task->command);
202 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_E_HASH, tmp);
203 SH_FREE(tmp);
204 }
205 some_error = 1;
206 SL_RETURN ((-1), _("sh_ext_popen"));
207 }
208 }
209#endif
210
211 some_error = 0;
212
213 PDBG(2);
214
215 /*
216 * -- Create the pipe
217 */
218 if (aud_pipe(FIL__, __LINE__, pipedes) < 0)
219 {
220 PDBG_S("pipe() failure");
221 errnum = errno;
222 sh_error_handle((-1), FIL__, __LINE__, errnum, MSG_E_SUBGEN,
[132]223 sh_error_message(errnum, errbuf, sizeof(errbuf)), _("pipe"));
[1]224 SL_RETURN ((-1), _("sh_ext_popen"));
225 }
226
227 PDBG(3);
[102]228
[1]229 /*
[102]230 * -- Flush streams and fork
[1]231 */
[102]232 fflush (NULL);
233
[1]234 task->pid = aud_fork(FIL__, __LINE__);
235
236 if (task->pid == (pid_t) - 1)
237 {
238 PDBG_S("fork() failure");
239 /*@-usedef@*/
240 (void) close(pipedes[0]);
241 (void) close(pipedes[1]);
242 /*@+usedef@*/
243 errnum = errno;
244 sh_error_handle((-1), FIL__, __LINE__, errnum, MSG_E_SUBGEN,
[132]245 sh_error_message(errnum, errbuf, sizeof(errbuf)), _("fork"));
[1]246 SL_RETURN ((-1), _("sh_ext_popen"));
247 }
248
249 PDBG(4);
250
251 if (task->pid == (pid_t) 0)
252 {
253 /*
254 * -- fork again, if requested
255 */
256 if (S_TRUE == task->fork_twice)
257 {
258 task->pid = aud_fork(FIL__, __LINE__);
259
260 if (task->pid == (pid_t) - 1)
261 {
262 aud__exit (FIL__, __LINE__, EXIT_FAILURE);
263 }
264 }
265
266 if (task->pid == (pid_t) 0)
267 {
268 PDBGC_OPEN;
269 PDBGC(1);
270
271 /*
272 * -- grandchild - make write side of the pipe stdin
273 */
274 if (task->rw == 'w')
275 {
276 if (retry_aud_dup2(FIL__, __LINE__,
277 pipedes[STDIN_FILENO], STDIN_FILENO) < 0)
278 aud__exit(FIL__, __LINE__,EXIT_FAILURE);
279 }
280 else
281 {
282 if (retry_aud_dup2(FIL__, __LINE__,
283 pipedes[STDOUT_FILENO], STDOUT_FILENO) < 0)
284 aud__exit(FIL__, __LINE__,EXIT_FAILURE);
285 }
286 PDBGC(2);
287
288
289 /* close the pipe descriptors
290 */
291 (void) close (pipedes[STDIN_FILENO]);
292 (void) close (pipedes[STDOUT_FILENO]);
293
294 /* don't leak file descriptors
295 */
296#if !defined(PDGBFILE)
[174]297 sh_unix_closeall (3, task->com_fd, SL_TRUE); /* in child process */
[1]298#endif
299
300 /* drop root privileges, if possible && requested
301 */
302 if (task->privileged == 0 && 0 == getuid())
303 {
304 PDBGC_S("privileged");
305
306 /* zero priv info
307 */
308 memset(skey, 0, sizeof(sh_key_t));
309
310 (void) aud_setgid(FIL__, __LINE__,(gid_t) task->run_user_gid);
311 (void) aud_setuid(FIL__, __LINE__,(uid_t) task->run_user_uid);
312 /* make sure we cannot get root again
313 */
314 if (aud_setuid(FIL__, __LINE__,0) >= 0)
315 aud__exit(FIL__, __LINE__,EXIT_FAILURE);
316 }
317
318 PDBGC(3);
319 (void) fflush(NULL);
320
321 if (task->rw == 'w')
322 {
323 PDBGC_S("w");
324 (void) fcntl (STDOUT_FILENO, F_SETFD, FD_CLOEXEC);
325 (void) fcntl (STDERR_FILENO, F_SETFD, FD_CLOEXEC);
326 /*
327 freopen(_("/dev/null"), "r+", stderr);
328 freopen(_("/dev/null"), "r+", stdout);
329 */
330 }
331 else
332 {
333 PDBGC_S("r");
334 (void) retry_aud_dup2 (FIL__, __LINE__,
335 STDOUT_FILENO, STDERR_FILENO);
336 (void) fcntl (STDIN_FILENO, F_SETFD, FD_CLOEXEC);
337 /*
338 freopen(_("/dev/null"), "r+", stdin);
339 */
340 }
341
342 PDBGC(4);
343
344
345#if defined(__linux__)
346 /*
347 * -- emulate an fdexec with checksum testing
348 */
349 if (task->checksum[0] != '\0')
350 {
351 PDBGC_S("fexecve");
352 if (task->com_fd != (-1))
353 {
354 pfd = retry_aud_dup(FIL__, __LINE__, task->com_fd);
355 if (pfd < 0)
356 {
357 PDBGC_S("fexecve: dup2 failed");
358 aud__exit(FIL__, __LINE__, EXIT_FAILURE);
359 }
360 }
361 else
362 {
[133]363 char hashbuf[KEYBUF_SIZE];
364
[1]365 fd =
366 sl_open_read(task->command,
367 task->privileged==0 ? SL_NOPRIV : SL_YESPRIV);
[133]368
[1]369 if (0 != sl_strcmp(task->checksum,
370 sh_tiger_hash (task->command,
[160]371 fd, TIGER_NOLIM, hashbuf, sizeof(hashbuf))))
[1]372 {
373 PDBGC_S("fexecve: checksum mismatch");
374 aud__exit(FIL__, __LINE__, EXIT_FAILURE);
375 }
376 pfd = get_the_fd(fd);
377 }
378
379 PDBGC(5);
[22]380 sl_snprintf(pname, sizeof(pname), _("/proc/self/fd/%d"), pfd);
381 if (access(pname, R_OK|X_OK) == 0) /* flawfinder: ignore */
[1]382 {
383 PDBGC(6);
384 PDBGC_CLOSE;
385 fcntl (pfd, F_SETFD, FD_CLOEXEC);
386 retry_aud_execve (FIL__, __LINE__,
387 pname,
388 (task->argc == 0) ? NULL : task->argv,
389 (task->envc == 0) ? NULL : task->envv
390 );
391
392 errnum = errno;
393 PDBGC_OPEN;
394 PDBGC_S(strerror(errnum));
395 PDBGC_S(task->command);
396 PDBGC_S("fexecve: failed");
397 PDBGC_CLOSE;
398 /* failed
399 */
400 aud__exit(FIL__, __LINE__, EXIT_FAILURE);
401 }
402 PDBGC_S("fexecve: not working");
403 /*
404 * procfs not working, go ahead; checksum is tested already
405 */
406 if (fd != -1)
407 sl_close(fd);
408 else if (pfd != -1)
409 close(fd);
410 }
411#endif
412
413 PDBGC_S(" -- non fexecve --");
414 /*
415 * -- execute path if executable
416 */
[22]417 if (0 == access(task->command, R_OK|X_OK)) /* flawfinder: ignore */
[1]418 {
419 PDBGC(5);
420 PDBGC_CLOSE;
421 (void) retry_aud_execve (FIL__, __LINE__,
422 task->command,
423 (task->argc == 0) ? argp : task->argv,
424 (task->envc == 0) ? envp : task->envv
425 );
426 }
427 errnum = errno;
428 PDBGC_OPEN;
429 PDBGC_S(strerror(errnum));
430 PDBGC_S(task->command);
431 PDBGC_S("execve: failed");
432 PDBGC_CLOSE;
433 /* failed
434 */
435 aud__exit(FIL__, __LINE__, EXIT_FAILURE);
436 }
437 /*
438 * if we have forked twice, this is parent::detached_subprocess
439 */
440 if (S_TRUE == task->fork_twice)
441 {
442 aud__exit (FIL__, __LINE__, 0);
443 }
444 }
445
446
447 /*
448 * -- parent; task->pid is child pid; exit status is status of
449 * grandchild if exited
450 */
451 if (S_TRUE == task->fork_twice)
452 {
453 (void) waitpid (task->pid, NULL, 0);
454 }
455
456 PDBG(5);
457 /* open an output stream on top of the write side of the pipe
458 */
459 if (task->rw == 'w')
460 {
461 PDBG_S("is w");
462 (void) close (pipedes[STDIN_FILENO]);
463 (void) retry_fcntl (FIL__, __LINE__, pipedes[STDOUT_FILENO],
464 F_SETFD, FD_CLOEXEC);
465 outf = fdopen (pipedes[STDOUT_FILENO], "w");
466 }
467 else
468 {
469 PDBG_S("is r");
470 (void) close (pipedes[STDOUT_FILENO]);
471 (void) retry_fcntl (FIL__, __LINE__, pipedes[STDIN_FILENO],
472 F_SETFD, FD_CLOEXEC);
473 outf = fdopen (pipedes[STDIN_FILENO], "r");
474 }
475
476 if (outf == NULL)
477 {
478 errnum = errno;
479 PDBG_S("outf == NULL");
480 tmp = sh_util_safe_name (task->command);
481
482 if (task->privileged == 0 && 0 == getuid())
483 sh_error_handle((-1), FIL__, __LINE__, errnum, MSG_NOEXEC,
484 (UID_CAST) task->run_user_uid, tmp);
485 else
486 sh_error_handle((-1), FIL__, __LINE__, errnum, MSG_NOEXEC,
487 (UID_CAST) getuid(), tmp);
488
489 SH_FREE(tmp);
490
491 (void) aud_kill (FIL__, __LINE__, task->pid, SIGKILL);
492 (void) close (pipedes[STDOUT_FILENO]);
493 (void) close (pipedes[STDIN_FILENO]);
494 (void) waitpid (task->pid, NULL, 0);
495 task->pid = 0;
496
497 SL_RETURN ((-1), _("sh_ext_popen"));
498 }
499
500 if (task->rw == 'w')
501 task->pipeFD = pipedes[STDOUT_FILENO];
502 else
503 task->pipeFD = pipedes[STDIN_FILENO];
504
505 PDBG_D(task->pipeFD);
506
507 task->pipeTI = sl_make_ticket(task->pipeFD, _("pipe"));
508
509 flags = (int) retry_fcntl (FIL__, __LINE__, task->pipeFD, F_GETFL, 0);
510 if (flags != (-1))
511 (void) retry_fcntl (FIL__, __LINE__, task->pipeFD,
512 F_SETFL, flags|O_NONBLOCK);
513 task->pipe = outf;
514
515 PDBG_S("return from popen");
516 PDBG_CLOSE;
517
518 SL_RETURN (0, _("sh_ext_popen"));
519}
520
521/*
522 * -- close the pipe
523 */
524extern int flag_err_debug;
525
526int sh_ext_pclose (sh_tas_t * task)
527{
528 int status = 0;
529 int retry = 0;
530 pid_t retval;
531 char infomsg[256];
532
533 SL_ENTER(_("sh_ext_pclose"));
534
[211]535 PDBG_OPEN;
[1]536 PDBG_S(" -> pclose");
537 (void) fflush(task->pipe);
538 (void) fclose(task->pipe);
539 if (!SL_ISERROR(task->pipeTI))
540 (void) sl_close(task->pipeTI);
541
542 task->pipe = NULL;
543 task->pipeFD = (-1);
544 task->pipeTI = SL_ETICKET;
545
546 if (S_FALSE == task->fork_twice)
547 {
548 infomsg[0] = '\0';
549
550 nochmal:
551 retval = waitpid(task->pid, &(task->exit_status), WNOHANG|WUNTRACED);
552 /*@-bufferoverflowhigh@*/
553 if (task->pid == retval)
554 {
[96]555#ifndef USE_UNO
[1]556 if (WIFEXITED(task->exit_status) != 0)
557 {
558 task->exit_status = WEXITSTATUS(task->exit_status);
559 if ((flag_err_debug == SL_TRUE) || (task->exit_status != 0))
[22]560 sl_snprintf(infomsg, sizeof(infomsg),
561 _("Subprocess exited normally with status %d"),
562 task->exit_status);
[1]563 }
564 else if (WIFSIGNALED(task->exit_status) != 0)
565 {
[22]566 sl_snprintf(infomsg, sizeof(infomsg),
567 _("Subprocess terminated by signal %d"),
568 WTERMSIG(task->exit_status));
[1]569 task->exit_status = EXIT_FAILURE;
570 }
571 else if (WIFSTOPPED(task->exit_status) != 0)
572 {
[22]573 sl_snprintf(infomsg, sizeof(infomsg),
574 _("Subprocess stopped by signal %d, killing"),
575 WSTOPSIG(task->exit_status));
[1]576 task->exit_status = EXIT_FAILURE;
577 (void) aud_kill (FIL__, __LINE__, task->pid, 9);
578 (void) retry_msleep (0, 30);
579 (void) waitpid (task->pid, NULL, WNOHANG|WUNTRACED);
580 }
581 else
582 {
[22]583 sl_snprintf(infomsg, sizeof(infomsg),
584 _("Subprocess exit status unknown"));
[1]585 task->exit_status = EXIT_FAILURE;
586 }
[96]587#else
588 task->exit_status = EXIT_FAILURE;
589#endif
[1]590 }
591 else if (0 == retval)
592 {
593 if (retry < 3)
594 {
595 ++retry;
596 (void) retry_msleep(0, (retry * 30));
597 goto nochmal;
598 }
599 (void) aud_kill (FIL__, __LINE__, task->pid, 9);
[22]600 sl_snprintf(infomsg, sizeof(infomsg),
601 _("Subprocess not yet exited, killing"));
[1]602 task->exit_status = EXIT_FAILURE;
603 (void) waitpid (task->pid, NULL, 0);
604 }
605 else
606 {
[22]607 sl_snprintf(infomsg, sizeof(infomsg),
608 _("Waitpid returned error %d\n"), errno);
[1]609 task->exit_status = EXIT_FAILURE;
610 }
611 /*@+bufferoverflowhigh@*/
612 status = task->exit_status;
613 if (flag_err_debug == SL_TRUE)
614 {
615 sh_error_handle(SH_ERR_ALL, FIL__, __LINE__, task->exit_status,
616 MSG_E_SUBGEN, infomsg, _("sh_ext_pclose"));
617 }
618 else if (status != 0)
619 {
620 sh_error_handle(SH_ERR_INFO, FIL__, __LINE__, task->exit_status,
621 MSG_E_SUBGEN, infomsg, _("sh_ext_pclose"));
622 }
623 }
624
625 task->pid = 0;
626 task->exit_status = 0;
627 PDBG_S(" <--");
628 PDBG_CLOSE;
629 SL_RETURN (status, _("sh_ext_pclose"));
630}
631
632void sh_ext_tas_init (sh_tas_t * tas)
633{
634 int i;
635
636 tas->command = NULL;
637 tas->argc = 0;
638 tas->envc = 0;
639 tas->checksum[0] = '\0';
640 tas->pipeFD = (-1);
641 tas->pipeTI = SL_ETICKET;
642 tas->pid = (pid_t) -1;
643 tas->privileged = 1;
644 tas->pipe = NULL;
645 tas->rw = 'w';
646 tas->exit_status = 0;
647 tas->fork_twice = S_TRUE;
648
649 for (i = 0; i < 32; ++i)
650 {
651 tas->argv[i] = NULL;
652 tas->envv[i] = NULL;
[169]653#if 0
[1]654 tas->trusted_users[i] = (uid_t) -1;
[169]655#endif
[1]656 }
657
658 tas->run_user_uid = (uid_t) getuid();
659 tas->run_user_gid = (gid_t) getgid();
660
661 tas->com_fd = -1;
662 tas->com_ti = -1;
663 return;
664}
665
666
[22]667int sh_ext_tas_add_envv(sh_tas_t * tas, const char * key, const char * val)
[1]668{
669 size_t sk = 0, sv = 0;
670 int si;
671
672 SL_ENTER(_("sh_ext_tas_add_envv"));
673
674 if (tas == NULL || (key == NULL && val == NULL) ||
675 tas->envc >= 30)
676 {
677 SL_RETURN (-1, _("sh_ext_tas_add_envv"));
678 }
679 if (key != NULL)
680 sk = strlen(key) + 1;
681 if (val != NULL)
682 sv = strlen(val) + 1;
683
[34]684 if (!sl_ok_adds(sk, sv))
685 {
686 SL_RETURN (-1, _("sh_ext_tas_add_envv"));
687 }
[1]688 si = tas->envc;
689 tas->envv[si] = SH_ALLOC(sk + sv);
690
691 if (key != NULL)
692 {
693 (void) sl_strlcpy(tas->envv[si], key, sk+sv);
694 (void) sl_strlcat(tas->envv[si], "=", sk+sv);
695 if (val != NULL)
696 (void) sl_strlcat(tas->envv[si], val, sk+sv);
697 }
698 else
699 (void) sl_strlcpy(tas->envv[si], val, sv);
700
701 ++(tas->envc);
702 SL_RETURN ((tas->envc), _("sh_ext_tas_add_envv"));
703}
704
705int sh_ext_tas_rm_argv(sh_tas_t * tas)
706{
707 int last;
708
709 SL_ENTER(_("sh_ext_tas_rm_argv"));
710 if (tas == NULL || tas->argc == 0)
711 {
712 SL_RETURN (-1, _("sh_ext_tas_rm_argv"));
713 }
714
715 last = (tas->argc - 1);
716 --(tas->argc);
717 SH_FREE(tas->argv[last]);
718 tas->argv[last] = NULL;
719 SL_RETURN ((tas->argc), _("sh_ext_tas_rm_argv"));
720}
721
[22]722int sh_ext_tas_add_argv(sh_tas_t * tas, const char * val)
[1]723{
724 size_t sv = 0;
725 int si;
726
727 SL_ENTER(_("sh_ext_tas_add_argv"));
728
729 if (tas == NULL || val == NULL ||
730 tas->argc >= 30)
731 {
732 SL_RETURN (-1, _("sh_ext_tas_add_argv"));
733 }
734
735 if (val != NULL)
736 sv = strlen(val) + 1;
737
738 si = tas->argc;
739 tas->argv[si] = SH_ALLOC(sv);
740
741 (void) sl_strlcpy(tas->argv[si], val, sv);
742
743 ++(tas->argc);
744 SL_RETURN ((tas->argc), _("sh_ext_tas_add_argv"));
745}
746
[22]747void sh_ext_tas_command(sh_tas_t * tas, const char * command)
[1]748{
749 size_t len = sl_strlen(command);
750 tas->command = SH_ALLOC(len+1);
751 (void) sl_strlcpy(tas->command, command, len+1);
752 return;
753}
754
755void sh_ext_tas_free(sh_tas_t * tas)
756{
757 int i;
758 if (NULL != tas->command) SH_FREE(tas->command);
759
760 for (i = 0; i < 32; ++i)
761 {
762 if (NULL != tas->argv[i]) SH_FREE(tas->argv[i]);
763 if (NULL != tas->envv[i]) SH_FREE(tas->envv[i]);
764 }
765
766 if (tas->com_ti != (-1))
767 {
768 (void) sl_close(tas->com_ti);
769 tas->com_ti = -1;
770 tas->com_fd = -1;
771 }
772
773 return;
774}
775
[211]776/* Execute command, return first line of output
777 * ifconfig | grep -1 lo | tail -n 1 | sed s/.*inet addr:\([0-9.]*\)\(.*\)/\1/
778 */
779char * sh_ext_popen_str (char * command)
780{
781 sh_tas_t task;
782 struct sigaction new_act;
783 struct sigaction old_act;
784 char * out = NULL;
785 int status;
[1]786
[211]787 SL_ENTER(_("sh_ext_popen_str"));
788
789 sh_ext_tas_init(&task);
790
791 (void) sh_ext_tas_add_envv (&task, _("SHELL"),
792 _("/bin/sh"));
793 (void) sh_ext_tas_add_envv (&task, _("PATH"),
794 _("/sbin:/bin:/usr/sbin:/usr/bin:/usr/ucb"));
795 (void) sh_ext_tas_add_envv (&task, _("IFS"), " \n\t");
796 if (sh.timezone != NULL)
797 {
798 (void) sh_ext_tas_add_envv(&task, "TZ", sh.timezone);
799 }
800
801 sh_ext_tas_command(&task, _("/bin/sh"));
802
803 (void) sh_ext_tas_add_argv(&task, _("/bin/sh"));
804 (void) sh_ext_tas_add_argv(&task, _("-c"));
805 (void) sh_ext_tas_add_argv(&task, command);
806
807 task.rw = 'r';
808 task.fork_twice = S_FALSE;
809
810 status = sh_ext_popen(&task);
811
812 if (status != 0)
813 {
814 sh_error_handle(SH_ERR_ALL, FIL__, __LINE__, status, MSG_E_SUBGEN,
815 _("Could not open pipe"), _("sh_ext_popen_str"));
816 SL_RETURN ((NULL), _("sh_ext_popen_str"));
817 }
818
819 /* ignore SIGPIPE (instead get EPIPE if connection is closed)
820 */
821 new_act.sa_handler = SIG_IGN;
822 (void) retry_sigaction (FIL__, __LINE__, SIGPIPE, &new_act, &old_act);
823
824 /* read from the open pipe
825 */
826 if (task.pipe != NULL)
827 {
828 int try = 1200; /* 1000 * 0.1 = 120 sec */
829 sh_string * s = sh_string_new(0);
830 do {
831 sh_string_read(s, task.pipe, 0);
832 if (sh_string_len(s) == 0)
833 {
834 --try; retry_msleep(0, 100);
835 }
836 } while (sh_string_len(s) == 0 && try != 0);
837
838 if (sh_string_len(s) == 0)
839 {
840 sh_error_handle(SH_ERR_ALL, FIL__, __LINE__, status, MSG_E_SUBGEN,
841 _("No output from command"), _("sh_ext_popen_str"));
842 }
843
844 out = sh_util_strdup(sh_string_str(s));
845 sh_string_destroy(&s);
846 }
847
848 /* restore old signal handler
849 */
850 (void) retry_sigaction (FIL__, __LINE__, SIGPIPE, &old_act, NULL);
851
852 /* close pipe and return exit status
853 */
854 (void) sh_ext_pclose(&task);
855 sh_ext_tas_free (&task);
856 SL_RETURN ((out), _("sh_ext_popen_str"));
857}
858
859
860
861
[1]862/* --------------- EXTERN STUFF ------------------- */
863
864#if defined(WITH_EXTERNAL)
865
866typedef struct _sh_com_t
867{
868 char type[4];
869
[215]870 sh_filter_type * filter;
871
[1]872 time_t deadtime;
873 time_t last_run;
874
875 sh_tas_t tas;
876
877 struct _sh_com_t * next;
878
879} sh_com_t;
880
881
882static
883void set3 (char * pos, char c1, char c2, char c3)
884{
885 pos[0] = c1;
886 pos[1] = c2;
887 pos[2] = c3;
888 pos[3] = '\0';
889 return;
890}
891
892
893
894/* initialize the external command structure
895 */
896static
897sh_com_t * command_init(void)
898{
899 uid_t ff_euid;
900 sh_com_t * ext_com = NULL;
901
902 SL_ENTER(_("command_init"));
903
904 ext_com = (sh_com_t *) SH_ALLOC(sizeof(sh_com_t));
905
906 if (!ext_com)
907 {
[170]908 SL_RETURN( NULL, _("command_init"));
[1]909 }
910
911 sh_ext_tas_init (&(ext_com->tas));
912
913 (void) sl_get_euid(&ff_euid);
[169]914#if 0
[1]915 ext_com->tas.trusted_users[0] = (uid_t) 0;
916 ext_com->tas.trusted_users[1] = (uid_t) (ff_euid);
[169]917#endif
[1]918
919 /* ------------------------------------------------- */
920
921 set3(ext_com->type, 'l', 'o', 'g');
[215]922 ext_com->filter = NULL;
[1]923 ext_com->deadtime = 0;
924 ext_com->last_run = 0;
925
926 ext_com->next = NULL;
927
[170]928 SL_RETURN( ext_com, _("command_init"));
[1]929}
930
931/* the list of external commands
932 */
933static sh_com_t * ext_coms = NULL;
934
935/* if -1, allocation of last command has failed,
936 * thus don't fill in options
937 */
938static int ext_failed = -1;
939
940static
[22]941int sh_ext_add_envv(const char * key, const char * val)
[1]942{
[34]943 int retval;
944
[1]945 SL_ENTER(_("sh_ext_add_envv"));
946
947 if (ext_coms == NULL || ext_failed == (-1) ||
948 (key == NULL && val == NULL) ||
949 ext_coms->tas.envc >= 30)
950 {
951 SL_RETURN (-1, _("sh_ext_add_envv"));
952 }
953
[34]954 retval = sh_ext_tas_add_envv(&(ext_coms->tas), key, val);
[1]955
[34]956 if (retval >= 0)
957 retval = 0;
958
959 SL_RETURN (retval, _("sh_ext_add_envv"));
[1]960}
961
962
963
964static
[22]965int sh_ext_init(const char * command)
[1]966{
967 sh_com_t * retval;
968 size_t size;
969
970 SL_ENTER(_("sh_ext_init"));
971
972 if (command == NULL)
973 {
974 SL_RETURN (-1, _("sh_ext_init"));
975 }
976 size = strlen(command);
977 if (command[0] != '/' || size < 2)
978 {
979 SL_RETURN (-1, _("sh_ext_init"));
980 }
981
982 if (NULL == (retval = command_init()))
983 {
984 SL_RETURN (-1, _("sh_ext_init"));
985 }
986
987 sh_ext_tas_command(&(retval->tas), command);
988
989 if (sh.timezone != NULL)
990 {
991 (void) sh_ext_add_envv( "TZ", sh.timezone);
992 }
993
994 retval->next = ext_coms;
995 ext_coms = retval;
996 SL_RETURN (0, _("sh_ext_init"));
997}
998
999static
[22]1000int sh_ext_uid (const char * user, /*@out@*/uid_t * uid, /*@out@*/gid_t * gid)
[1]1001{
[131]1002 struct passwd * tempres;
1003#if defined(HAVE_PTHREAD) && defined (_POSIX_THREAD_SAFE_FUNCTIONS) && defined(HAVE_GETPWNAM_R)
1004 struct passwd pwd;
1005 char buffer[SH_PWBUF_SIZE];
1006#endif
[1]1007
1008 SL_ENTER(_("sh_ext_uid"));
1009
1010 *uid = (uid_t)-1; *gid = (gid_t)-1;
1011
1012 if (user == NULL)
1013 {
1014 SL_RETURN (-1, _("sh_ext_uid"));
1015 }
[131]1016
1017#if defined(HAVE_PTHREAD) && defined (_POSIX_THREAD_SAFE_FUNCTIONS) && defined(HAVE_GETPWNAM_R)
1018 sh_getpwnam_r(user, &pwd, buffer, sizeof(buffer), &tempres);
1019#else
[1]1020 tempres = sh_getpwnam(user);
[131]1021#endif
[1]1022
1023 if (NULL != tempres)
1024 {
1025 *uid = tempres->pw_uid;
1026 *gid = tempres->pw_gid;
1027 SL_RETURN (0, _("sh_ext_uid"));
1028 }
1029
1030 SL_RETURN (-1, _("sh_ext_uid"));
1031}
1032
1033
1034static
[22]1035int sh_ext_add (const char * argstring, int * ntok, char * stok[])
[1]1036{
1037 int i = 0;
1038 size_t s;
1039 char * p;
[22]1040 char * new;
1041 size_t len;
[1]1042
1043 SL_ENTER(_("sh_ext_add"));
1044
1045 if (NULL == argstring)
1046 {
1047 SL_RETURN((-1), _("sh_ext_add"));
1048 }
1049
[22]1050 len = strlen(argstring) + 1;
1051 new = SH_ALLOC(len);
1052 sl_strlcpy(new, argstring, len);
1053
[1]1054 do
1055 {
[131]1056#if defined(HAVE_PTHREAD) && defined (_POSIX_THREAD_SAFE_FUNCTIONS) && defined(HAVE_STRTOK_R)
1057 char * saveptr;
[1]1058 if (i == 0)
[131]1059 p = strtok_r (new, ", \t", &saveptr);
1060 else
1061 p = strtok_r (NULL, ", \t", &saveptr);
1062#else
1063 if (i == 0)
[22]1064 p = strtok (new, ", \t");
[1]1065 else
1066 p = strtok (NULL, ", \t");
[131]1067#endif
1068
[1]1069 if (p == NULL)
1070 break;
1071
1072 s = strlen(p) + 1;
1073 if (stok[i] != NULL)
1074 SH_FREE(stok[i]);
1075 stok[i] = SH_ALLOC(s);
1076 (void) sl_strlcpy(stok[i], p, s);
1077
1078 ++i;
1079 if (i == 30)
1080 break;
1081 }
1082 while (p != NULL);
1083
1084 *ntok = i;
[22]1085 SH_FREE(new);
[1]1086
1087 SL_RETURN (0, _("sh_ext_add"));
1088}
1089
1090/*********************************************************
1091 *
1092 * Public functions
1093 *
1094 *
1095 *********************************************************/
1096
1097/*
1098 * -- start a new external command, and add it to the list
1099 */
[22]1100int sh_ext_setcommand(const char * cmd)
[1]1101{
1102 int i;
1103
1104 SL_ENTER(_("sh_ext_setcommand"));
1105 if ( (i = sh_ext_init(cmd)) < 0)
1106 ext_failed = -1;
1107 else
1108 ext_failed = 0;
1109 SL_RETURN( i, _("sh_ext_setcommand"));
1110}
1111
1112
1113/*
1114 * -- clean up the command list
1115 */
1116int sh_ext_cleanup(void)
1117{
1118 sh_com_t * retval;
1119
1120 SL_ENTER(_("sh_ext_cleanup"));
1121
1122 while (ext_coms != NULL)
1123 {
1124 retval = ext_coms;
1125 ext_coms = retval->next;
1126
1127 sh_ext_tas_free (&(retval->tas));
1128
[215]1129 if (retval->filter)
1130 sh_filter_free (retval->filter);
[1]1131
1132 SH_FREE(retval);
1133
1134 }
1135
1136 SL_RETURN (0, _("sh_ext_cleanup"));
1137}
1138
1139/*
[164]1140 * -- explicitely close a command
1141 */
1142int sh_ext_close_command (const char * str)
1143{
1144 (void) str;
1145 if (ext_coms == NULL || ext_failed == (-1))
1146 return (-1);
1147 ext_failed = (-1);
1148 return 0;
1149}
1150
1151/*
[1]1152 * -- add keywords to the OR filter
1153 */
[22]1154int sh_ext_add_or (const char * str)
[1]1155{
1156 if (ext_coms == NULL || ext_failed == (-1))
1157 return (-1);
[215]1158 if (ext_coms->filter == NULL)
1159 ext_coms->filter = sh_filter_alloc();
1160 return (sh_filter_add(str, ext_coms->filter, SH_FILT_OR));
[1]1161}
1162
1163/*
1164 * -- add keywords to the AND filter
1165 */
[22]1166int sh_ext_add_and (const char * str)
[1]1167{
1168 if (ext_coms == NULL || ext_failed == (-1))
1169 return (-1);
[215]1170 if (ext_coms->filter == NULL)
1171 ext_coms->filter = sh_filter_alloc();
1172 return (sh_filter_add(str, ext_coms->filter, SH_FILT_AND));
[1]1173}
1174
1175/*
1176 * -- add keywords to the NOT filter
1177 */
[22]1178int sh_ext_add_not (const char * str)
[1]1179{
1180 if (ext_coms == NULL || ext_failed == (-1))
1181 return (-1);
[215]1182 if (ext_coms->filter == NULL)
1183 ext_coms->filter = sh_filter_alloc();
1184 return (sh_filter_add(str, ext_coms->filter, SH_FILT_NOT));
[1]1185}
1186
1187/*
1188 * -- add keywords to the CL argument list
1189 */
[22]1190int sh_ext_add_argv (const char * str)
[1]1191{
1192 if (ext_coms == NULL || ext_failed == (-1))
1193 return (-1);
1194 return (sh_ext_add (str, &(ext_coms->tas.argc), ext_coms->tas.argv));
1195}
1196
1197/*
1198 * -- add a path to the environment
1199 */
[22]1200int sh_ext_add_default (const char * dummy)
[1]1201{
[22]1202 char * p = NULL;
[1]1203 int i;
[132]1204 char dir[SH_PATHBUF];
[1]1205
1206 SL_ENTER(_("sh_ext_add_default"));
1207 if (dummy[0] == 'n' || dummy[0] == 'N' ||
1208 dummy[0] == 'f' || dummy[0] == 'F' || dummy[0] == '0')
1209 {
1210 SL_RETURN(0, _("sh_ext_add_default"));
1211 }
[132]1212 p = sh_unix_getUIDdir (SH_ERR_ERR, (uid_t) ext_coms->tas.run_user_uid,
1213 dir, sizeof(dir));
[1]1214 if (p)
1215 (void) sh_ext_add_envv (_("HOME"), p);
1216 (void) sh_ext_add_envv (_("SHELL"), _("/bin/sh"));
[211]1217 (void) sh_ext_add_envv (_("PATH"), _("/sbin:/bin:/usr/sbin:/usr/bin"));
1218 (void) sh_ext_add_envv (_("IFS"), " \n\t");
[1]1219 i = (p == NULL ? (-1) : 0);
1220 SL_RETURN(i, _("sh_ext_add_default"));
1221}
1222
1223/*
1224 * -- add an environment variable
1225 */
[22]1226int sh_ext_add_environ (const char * str)
[1]1227{
1228 int i;
[49]1229
[1]1230 SL_ENTER(_("sh_ext_add_environ"));
1231 i = sh_ext_add_envv (NULL, str);
1232 SL_RETURN(i, _("sh_ext_add_environ"));
1233}
1234
1235/*
1236 * -- set deadtime
1237 */
[22]1238int sh_ext_deadtime (const char * str)
[1]1239{
1240 long deadtime = 0;
1241 char * tail = NULL;
1242
1243 SL_ENTER(_("sh_ext_deadtime"));
1244
1245 if (ext_coms == NULL || ext_failed == (-1) || str == NULL)
1246 {
[170]1247 SL_RETURN (-1, _("sh_ext_deadtime"));
[1]1248 }
1249 deadtime = strtol(str, &tail, 10);
1250 if (tail == str || deadtime < 0 || deadtime == LONG_MAX)
1251 {
[170]1252 SL_RETURN (-1, _("sh_ext_deadtime"));
[1]1253 }
1254
1255 ext_coms->deadtime = (time_t) deadtime;
[170]1256 SL_RETURN (0, _("sh_ext_deadtime"));
[1]1257}
1258
1259/*
1260 * -- define type
1261 */
[22]1262int sh_ext_type (const char * str)
[1]1263{
1264 SL_ENTER(_("sh_ext_type"));
1265
1266 if (ext_coms == NULL || ext_failed == (-1) || str == NULL)
1267 {
1268 SL_RETURN((-1), _("sh_ext_type"));
1269 }
1270
1271 if (strlen(str) != 3)
1272 {
1273 SL_RETURN((-1), _("sh_ext_type"));
1274 }
1275
1276 set3(ext_coms->type, str[0], str[1], str[2]);
1277
1278 if (str[0] == 'l' && str[1] == 'o' && str[2] == 'g')
1279 ext_coms->tas.rw = 'w';
1280 else if (str[0] == 's' && str[1] == 'r' && str[2] == 'v')
1281 ext_coms->tas.rw = 'w';
1282 else if (str[0] == 'm' && str[1] == 'o' && str[2] == 'n')
1283 ext_coms->tas.rw = 'r';
1284 else
1285 {
1286 SL_RETURN((-1), _("sh_ext_type"));
1287 }
1288
1289 SL_RETURN(0, _("sh_ext_type"));
1290}
1291
1292
1293
1294/*
1295 * -- define checksum
1296 */
[22]1297int sh_ext_checksum (const char * str)
[1]1298{
1299 SL_ENTER(_("sh_ext_checksum"));
1300 if (ext_coms == NULL || ext_failed == (-1) || str == NULL)
1301 {
1302 SL_RETURN((-1), _("sh_ext_checksum"));
1303 }
1304
1305 if (sl_strlen(str) != KEY_LEN)
1306 {
1307 SL_RETURN((-1), _("sh_ext_checksum"));
1308 }
1309
1310 (void) sl_strlcpy (ext_coms->tas.checksum, str, KEY_LEN+1);
1311
1312 SL_RETURN((0), _("sh_ext_checksum"));
1313}
1314
1315/*
1316 * -- choose privileges
1317 */
[22]1318int sh_ext_priv (const char * c)
[1]1319{
1320
1321 uid_t me_uid;
1322 gid_t me_gid;
1323
1324 SL_ENTER(_("sh_ext_priv"));
1325 if (0 == sh_ext_uid (c, &me_uid, &me_gid))
1326 {
1327 ext_coms->tas.run_user_uid = me_uid;
1328 ext_coms->tas.run_user_gid = me_gid;
1329 if (me_uid != (uid_t) 0)
1330 ext_coms->tas.privileged = 0;
1331 SL_RETURN((0), _("sh_ext_priv"));
1332 }
1333
1334 SL_RETURN (-1, _("sh_ext_priv"));
1335}
1336
1337
1338
1339
1340/*
1341 * -- check filters
1342 */
1343static int sh_ext_filter (char * message, sh_com_t * task)
1344{
1345 time_t now_time;
1346
1347 SL_ENTER(_("sh_ext_filter"));
1348
[215]1349 if (task->filter)
[1]1350 {
[215]1351 if (0 != sh_filter_filter (message, task->filter))
[1]1352 {
[215]1353 SL_RETURN ((-1), _("sh_ext_filter"));
[1]1354 }
1355 }
1356
[215]1357 /* Filter passed, check deadtime */
[1]1358
[215]1359 if (task->deadtime != (time_t) 0)
[1]1360 {
1361 now_time = time (NULL);
1362
1363 if (task->last_run == (time_t) 0)
1364 {
1365 task->last_run = now_time;
1366 }
1367 else if ((time_t)(now_time-task->last_run) < task->deadtime)
1368 {
1369 SL_RETURN ((-1), _("sh_ext_filter"));
1370 }
1371 else
1372 {
1373 task->last_run = now_time;
1374 }
1375 }
1376
1377 SL_RETURN ((0), _("sh_ext_filter"));
1378}
1379
1380
1381
1382/*
1383 * -- execute external script/program
1384 */
1385int sh_ext_execute (char t1, char t2, char t3, /*@null@*/char * message,
1386 size_t msg_siz)
1387{
1388 int caperr;
1389 sh_com_t * listval = ext_coms;
1390 int status = 0;
1391 char * tmp;
[132]1392 char errbuf[SH_ERRBUF_SIZE];
[1]1393
1394 static int some_error = 0;
1395
1396 struct sigaction new_act;
1397 struct sigaction old_act;
1398
1399 SL_ENTER(_("sh_ext_execute"));
1400
1401 PDBG_OPEN;
1402
1403 if (listval == NULL || message == NULL)
1404 {
1405 SL_RETURN ((-1), _("sh_ext_execute"));
1406 }
1407
1408 PDBG(-1);
1409
1410 if (msg_siz == 0)
1411 msg_siz = sl_strlen(message);
1412
1413
1414 /* ignore SIGPIPE (instead get EPIPE if connection is closed)
1415 */
1416 new_act.sa_handler = SIG_IGN;
1417 (void) retry_sigaction (FIL__, __LINE__, SIGPIPE, &new_act, &old_act);
1418
1419 while (listval != NULL)
1420 {
[212]1421 PDBG_OPEN;
[1]1422 PDBG(-2);
1423 if (t1 == listval->type[0] &&
1424 t2 == listval->type[1] &&
1425 t3 == listval->type[2] &&
1426 0 == sh_ext_filter (message, listval))
1427 {
1428 PDBG(-3);
1429
1430 if (0 != (caperr = sl_get_cap_sub()))
1431 {
1432 sh_error_handle((-1), FIL__, __LINE__, caperr, MSG_E_SUBGEN,
[132]1433 sh_error_message (caperr, errbuf, sizeof(errbuf)),
[1]1434 _("sl_get_cap_sub"));
1435 }
1436 if (0 == sh_ext_popen (&(listval->tas)))
1437 {
1438 PDBG_OPEN;
1439 PDBG(-4);
1440 if (NULL != listval->tas.pipe && listval->tas.rw == 'w')
1441 {
1442 PDBG(-5);
1443 if (message != NULL)
1444 {
1445 PDBG(-6);
1446 status = (int) write (listval->tas.pipeFD,
1447 message, msg_siz);
1448 if (status >= 0)
1449 status = (int) write (listval->tas.pipeFD, "\n", 1);
1450 }
1451 PDBG_D(status);
1452 if (status >= 0)
1453 status = (int) write (listval->tas.pipeFD, "[", 1);
1454 PDBG_D(status);
1455 if (status >= 0)
1456 status = (int) write (listval->tas.pipeFD, "E", 1);
1457 PDBG_D(status);
1458 if (status >= 0)
1459 status = (int) write (listval->tas.pipeFD, "O", 1);
1460 PDBG_D(status);
1461 if (status >= 0)
1462 status = (int) write (listval->tas.pipeFD, "F", 1);
1463 PDBG_D(status);
1464 if (status >= 0)
1465 status = (int) write (listval->tas.pipeFD, "]", 1);
1466 PDBG_D(status);
1467 if (status >= 0)
1468 status = (int) write (listval->tas.pipeFD, "\n", 1);
1469 PDBG_D(status);
1470 if (status >= 0)
1471 {
1472 some_error = 0;
1473 }
1474 if ((status < 0) && (some_error == 0))
1475 {
1476 some_error = 1;
1477 PDBG_S("some error");
1478 PDBG_D(status);
1479 tmp = sh_util_safe_name (listval->tas.command);
1480
1481 if (tmp)
1482 {
1483 if (listval->tas.privileged == 0 &&
1484 (0 == getuid() || 0 != sl_is_suid()) )
1485 sh_error_handle((-1), FIL__, __LINE__, 0,
1486 MSG_NOEXEC,
1487 (UID_CAST) listval->tas.run_user_uid,
1488 tmp);
1489 else
1490 sh_error_handle((-1), FIL__, __LINE__, 0,
1491 MSG_NOEXEC,
1492 (UID_CAST) getuid(), tmp);
1493
1494 SH_FREE(tmp);
1495 }
1496
1497 }
1498 PDBG(-7);
1499 (void) fflush(listval->tas.pipe);
1500 }
1501 PDBG(-8);
1502 (void) sh_ext_pclose(&(listval->tas));
1503 }
1504 else
1505 {
1506 PDBG_OPEN;
1507 PDBG_S("0 != sh_ext_popen()");
1508 }
1509 if (0 != (caperr = sl_drop_cap_sub()))
1510 {
1511 sh_error_handle((-1), FIL__, __LINE__, caperr, MSG_E_SUBGEN,
[132]1512 sh_error_message (caperr, errbuf, sizeof(errbuf)),
[1]1513 _("sl_drop_cap_sub"));
1514 }
1515
1516 }
1517 listval = listval->next;
1518 }
1519 PDBG_OPEN;
1520 PDBG_S("no more commands");
1521
1522 /* restore old signal handler
1523 */
1524 (void) retry_sigaction (FIL__, __LINE__, SIGPIPE, &old_act, NULL);
1525 PDBG_S("return");
1526 PDBG_CLOSE;
1527
1528 SL_RETURN ((0), _("sh_ext_execute"));
1529}
1530
1531
1532/* #if defined(WITH_EXTERNAL) */
1533#endif
Note: See TracBrowser for help on using the repository browser.