File:  [ELWIX - Embedded LightWeight unIX -] / embedtools / src / cfexec.c
Revision 1.5.20.3: download - view: text, annotated - select for diffs - revision graph
Sun Oct 8 22:28:26 2017 UTC (6 years, 8 months ago) by misho
Branches: tools3_0
Diff to: branchpoint 1.5: preferred, unified
changes

    1: /*************************************************************************
    2:  * (C) 2009 AITNET - Sofia/Bulgaria - <office@aitbg.com>
    3:  *  by Michael Pounov <misho@aitbg.com>
    4:  *
    5:  * $Author: misho $
    6:  * $Id: cfexec.c,v 1.5.20.3 2017/10/08 22:28:26 misho Exp $
    7:  *
    8:  *************************************************************************
    9: The ELWIX and AITNET software is distributed under the following
   10: terms:
   11: 
   12: All of the documentation and software included in the ELWIX and AITNET
   13: Releases is copyrighted by ELWIX - Sofia/Bulgaria <info@elwix.org>
   14: 
   15: Copyright 2004 - 2017
   16: 	by Michael Pounov <misho@elwix.org>.  All rights reserved.
   17: 
   18: Redistribution and use in source and binary forms, with or without
   19: modification, are permitted provided that the following conditions
   20: are met:
   21: 1. Redistributions of source code must retain the above copyright
   22:    notice, this list of conditions and the following disclaimer.
   23: 2. Redistributions in binary form must reproduce the above copyright
   24:    notice, this list of conditions and the following disclaimer in the
   25:    documentation and/or other materials provided with the distribution.
   26: 3. All advertising materials mentioning features or use of this software
   27:    must display the following acknowledgement:
   28: This product includes software developed by Michael Pounov <misho@elwix.org>
   29: ELWIX - Embedded LightWeight unIX and its contributors.
   30: 4. Neither the name of AITNET nor the names of its contributors
   31:    may be used to endorse or promote products derived from this software
   32:    without specific prior written permission.
   33: 
   34: THIS SOFTWARE IS PROVIDED BY AITNET AND CONTRIBUTORS ``AS IS'' AND
   35: ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   36: IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   37: ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
   38: FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   39: DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   40: OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   41: HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   42: LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   43: OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   44: SUCH DAMAGE.
   45: */
   46: #include "global.h"
   47: 
   48: 
   49: cfg_root_t cfg;
   50: int Verbose, Timeout, kq;
   51: ait_val_t User, Mount, Dev, Chroot;
   52: char szSess[MAXPATHLEN], szSLCK[MAXPATHLEN], szConfig[MAXPATHLEN];
   53: extern char compiled[], compiledby[], compilehost[];
   54: 
   55: 
   56: static void
   57: Usage()
   58: {
   59: 
   60: 	printf(	"CFExec is tool for managment R/W operation with CompactFlash\n"
   61: 		"=== %s === %s@%s ===\n\n"
   62: 		"  Syntax: cfexec [options] [exec_file]\n\n"
   63: 		"\t-v\t\tVerbose ...\n"
   64: 		"\t-c <dir>\tAfter execute chroot to dir [default=/]\n"
   65: 		"\t-u <user>\tAfter execute suid to user [default=root]\n"
   66: 		"\t-d <dev>\tOther device [default=/dev/ufs/elwix]\n"
   67: 		"\t-m <mnt>\tOther mount dir [default=/]\n"
   68: 		"\t-t <sec>\tTimeout for autolock mount dir after seconds [default=300]\n"
   69: 		"\t-L <reason>\tService lock and set RW state of device with reason\n"
   70: 		"\t-U \t\tService unlock and set RO state of device\n"
   71: 		"\n", compiled, compiledby, compilehost);
   72: }
   73: 
   74: static int
   75: update(int flags)
   76: {
   77: 	struct ufs_args mnt;
   78: 
   79: 	memset(&mnt, 0, sizeof mnt);
   80: 	mnt.fspec = AIT_GET_STR(&Dev);
   81: #ifdef __NetBSD__
   82: 	if (mount("ufs", AIT_GET_STR(&Mount), flags, &mnt, sizeof mnt) == -1) {
   83: #else
   84: 	if (mount("ufs", AIT_GET_STR(&Mount), flags, &mnt) == -1) {
   85: #endif
   86: 		printf("Error:: can`t update mount %s #%d - %s\n", AIT_GET_STR(&Mount), 
   87: 				errno, strerror(errno));
   88: 		return -1;
   89: 	}
   90: 
   91: 	VERB(5) printf("Info(5):: safe mount for device %s to %s operation (%s)\n", 
   92: 			AIT_GET_STR(&Dev), AIT_GET_STR(&Mount), (flags & MNT_RDONLY) ? "ro" : "rw");
   93: 	return 0;
   94: }
   95: 
   96: static void
   97: setuser()
   98: {
   99: 	struct passwd *pw;
  100: 
  101: 	pw = getpwnam(AIT_GET_LIKE(&User, char*));
  102: 	if (pw) {
  103: 		setuid(pw->pw_uid);
  104: 		setgid(pw->pw_gid);
  105: 		endpwent();
  106: 
  107: 		VERB(5) printf("Info(5):: Suid to user %s.\n", AIT_GET_STR(&User));
  108: 	} else
  109: 		VERB(5) printf("Info(5):: Can`t suid to user %s !\n", AIT_GET_STR(&User));
  110: }
  111: 
  112: static int
  113: mkevent(struct kevent *chg, struct kevent *evt)
  114: {
  115: 	int f;
  116: 	char szStr[STRSIZ];
  117: 
  118: 	f = open(szSess, O_CREAT | O_WRONLY | O_TRUNC, 0644);
  119: 	if (f == -1) {
  120: 		printf("Error:: can`t lock session #%d - %s\n", errno, strerror(errno));
  121: 		return -1;
  122: 	} else {
  123: 		memset(szStr, 0, sizeof szStr);
  124: 		snprintf(szStr, sizeof szStr, "%d", getpid());
  125: 		write(f, szStr, strlen(szStr));
  126: 	}
  127: 	VERB(3) printf("Created lock file %s\n", szSess);
  128: 
  129: 	if (chg && evt) {
  130: 		kq = kqueue();
  131: 		if (kq == -1) {
  132: 			printf("Error:: can`t execute safe mount #%d - %s\n", errno, strerror(errno));
  133: 			close(f);
  134: 			unlink(szSess);
  135: 			return -1;
  136: 		} else {
  137: 			memset(chg, 0, sizeof(struct kevent));
  138: 			memset(evt, 0, sizeof(struct kevent));
  139: 
  140: 			EV_SET(chg, f, EVFILT_VNODE, EV_ADD, NOTE_DELETE | NOTE_RENAME | NOTE_REVOKE, 
  141: 					0, NULL);
  142: 		}
  143: 	}
  144: 
  145: 	return f;
  146: }
  147: 
  148: static void
  149: cleanexit()
  150: {
  151: 	AIT_FREE_VAL(&User);
  152: 	AIT_FREE_VAL(&Dev);
  153: 	AIT_FREE_VAL(&Mount);
  154: 	AIT_FREE_VAL(&Chroot);
  155: 
  156: 	cfgUnloadConfig(&cfg);
  157: }
  158: 
  159: static int
  160: s_unlck()
  161: {
  162: 	if (access(szSLCK, F_OK))
  163: 		return 1;
  164: 
  165: 	if (access(szSess, F_OK) && update(MNT_UPDATE | MNT_RDONLY) == -1)
  166: 		return 8;
  167: 
  168: 	unlink(szSLCK);
  169: 	VERB(3) printf("Unlock & deleted service lock file %s\n", szSLCK);
  170: 	return 0;
  171: }
  172: 
  173: static int
  174: s_lck(const char *reason)
  175: {
  176: 	int f;
  177: 	char szStr[STRSIZ];
  178: 
  179: 	if (!access(szSLCK, F_OK)) {
  180: 		printf("cfexec:: Service held lock ...\n");
  181: 		return 127;
  182: 	}
  183: 
  184: 	f = open(szSLCK, O_CREAT | O_WRONLY | O_TRUNC, 0644);
  185: 	if (f == -1) {
  186: 		printf("Error:: can`t service lock session #%d - %s\n", errno, strerror(errno));
  187: 		return 5;
  188: 	} else {
  189: 		memset(szStr, 0, sizeof szStr);
  190: 		snprintf(szStr, sizeof szStr, "[%d] - %s", getpid(), reason);
  191: 		write(f, szStr, strlen(szStr));
  192: 	}
  193: 	close(f);
  194: 
  195: 	if (update(MNT_UPDATE) == -1) {
  196: 		unlink(szSLCK);
  197: 		return 4;
  198: 	}
  199: 
  200: 	VERB(3) printf("Lock & created service lock file %s\n", szSLCK);
  201: 	return 0;
  202: }
  203: 
  204: 
  205: int
  206: main(int argc, char **argv)
  207: {
  208: 	char ch, mod = 0, reason[STRSIZ];
  209: 	const char *err = NULL;
  210: 	struct kevent chg, evt;
  211: 	struct timespec ts;
  212: 	pid_t pid;
  213: 	int f, ret = 0, stat = 0;
  214: 
  215: 	strlcpy(szConfig, DEFAULT_CONFIG, MAXPATHLEN);
  216: 	/* Load variables from config if exists */
  217: 	if (!cfgLoadConfig(szConfig, &cfg)) {
  218: 		cfg_loadAttribute(&cfg, "cfexec", "timeout", &User, DEFAULT_TIMEOUT);
  219: #ifndef HAVE_STRTONUM
  220: 		Timeout = (int) strtol(szUser, NULL, 0);
  221: #else
  222: 		Timeout = strtonum(AIT_GET_STR(&User), 0, 3600, &err);
  223: #endif
  224: 		AIT_FREE_VAL(&User);
  225: 		if (!Timeout && err) {
  226: 			printf("Error:: in seconds for timeout %s - %s\n", optarg, err);
  227: 			cfgUnloadConfig(&cfg);
  228: 			return 1;
  229: 		}
  230: 		cfg_loadAttribute(&cfg, "cfexec", "suid", &User, DEFAULT_USER);
  231: 		cfg_loadAttribute(&cfg, "cfexec", "mount", &Mount, DEFAULT_MOUNT);
  232: 		cfg_loadAttribute(&cfg, "cfexec", "device", &Dev, DEFAULT_DEVICE);
  233: 		cfg_loadAttribute(&cfg, "cfexec", "chroot", &Chroot, DEFAULT_CHROOT);
  234: 
  235: 		cfgUnloadConfig(&cfg);
  236: 	} else {
  237: 		Timeout = atoi(DEFAULT_TIMEOUT);
  238: 		AIT_SET_STR(&User, DEFAULT_USER);
  239: 		AIT_SET_STR(&Mount, DEFAULT_MOUNT);
  240: 		AIT_SET_STR(&Dev, DEFAULT_DEVICE);
  241: 		AIT_SET_STR(&Chroot, DEFAULT_CHROOT);
  242: 	}
  243: 
  244: 	atexit(cleanexit);
  245: 
  246: 	/* Load variables from arguments if exists */
  247: 	while ((ch = getopt(argc, argv, "hvUu:c:d:m:t:L:")) != -1)
  248: 		switch (ch) {
  249: 			case 'v':
  250: 				Verbose++;
  251: 				break;
  252: 			case 'u':
  253: 				AIT_SET_STR(&User, optarg);
  254: 				break;
  255: 			case 'c':
  256: 				AIT_SET_STR(&Chroot, optarg);
  257: 				break;
  258: 			case 'd':
  259: 				AIT_SET_STR(&Dev, optarg);
  260: 				break;
  261: 			case 'm':
  262: 				AIT_SET_STR(&Mount, optarg);
  263: 				break;
  264: 			case 'L':
  265: 				strlcpy(reason, optarg, sizeof reason);
  266: 				mod = 1;
  267: 				break;
  268: 			case 'U':
  269: 				mod = -1;
  270: 				break;
  271: 			case 't':
  272: #ifndef HAVE_STRTONUM
  273: 				Timeout = (int) strtol(optarg, NULL, 0);
  274: #else
  275: 				Timeout = strtonum(optarg, 0, 3600, &err);
  276: #endif
  277: 				if (!Timeout && err) {
  278: 					printf("Error:: in seconds for timeout %s - %s\n",
  279: 							optarg, err);
  280: 					return 1;
  281: 				}
  282: 				break;
  283: 			case 'h':
  284: 			default:
  285: 				Usage();
  286: 				return 1;
  287: 		}
  288: 	argc -= optind;
  289: 	argv += optind;
  290: 
  291: 	memset(szSess, 0, MAXPATHLEN);
  292: 	snprintf(szSess, MAXPATHLEN, "%s%s-cfexec.LCK", DEFAULT_TMP, AIT_GET_STR(&Mount));
  293: 	memset(szSLCK, 0, MAXPATHLEN);
  294: 	snprintf(szSLCK, MAXPATHLEN, CFEXEC_SLOCK, DEFAULT_TMP);
  295: 
  296: 	/* we have request for service lock! */
  297: 	if (mod) {
  298: 		VERB(3) printf("Info(3):: mode=%hhd\n", mod);
  299: 		if (mod == -1)
  300: 			ret = s_unlck();
  301: 		else
  302: 			ret = s_lck(reason);
  303: 		return ret;
  304: 	}
  305: 
  306: 	VERB(3) printf("Info(3):: Chroot=%s SUID=%s Device=%s Mount=%s Timeout=%d Session=%s\n", 
  307: 			AIT_GET_STR(&Chroot), AIT_GET_STR(&User), AIT_GET_STR(&Dev), 
  308: 			AIT_GET_STR(&Mount), Timeout, szSess);
  309: 
  310: 	if (!access(szSess, F_OK)) {
  311: 		printf("cfexec already running ...\n");
  312: 		return 127;
  313: 	}
  314: 
  315: 	if (!argc) {
  316: 		switch (fork()) {
  317: 			case -1:
  318: 				printf("Error:: can`t execute safe mount #%d - %s\n", 
  319: 						errno, strerror(errno));
  320: 				return 3;
  321: 			case 0:
  322: 				VERB(5) printf("Info(5):: Go safe mount.\n");
  323: 				setsid();
  324: 
  325: 				if ((f = mkevent(&chg, &evt)) == -1)
  326: 					return 4;
  327: 
  328: 				if (update(MNT_UPDATE) == -1)
  329: 					return 5;
  330: 
  331: 				if (Timeout) {
  332: 					memset(&ts, 0, sizeof ts);
  333: 					ts.tv_sec = Timeout;
  334: 				}
  335: 				switch (kevent(kq, &chg, 1, &evt, 1, !Timeout ? NULL : &ts)) {
  336: 					case -1:
  337: 						printf("Error:: can`t execute safe mount #%d - %s\n", 
  338: 								errno, strerror(errno));
  339: 						stat = 7;
  340: 						break;
  341: 					case 0:
  342: 						if (!access(szSLCK, F_OK)) {
  343: 							VERB(1) printf("Timeout reached - service locked\n");
  344: 							break;
  345: 						}
  346: 						VERB(1) printf("Timeout reached - secure mount\n");
  347: 					default:
  348: 						VERB(1) printf("Lock file is deleted - secure mount\n");
  349: 						if (access(szSLCK, F_OK) && update(MNT_UPDATE | MNT_RDONLY) == -1)
  350: 							stat = 8;
  351: 				}
  352: 
  353: 				close(kq);
  354: 				close(f);
  355: 				unlink(szSess);
  356: 				break;
  357: 		}
  358: 	} else {
  359: 		/*
  360: 		sigemptyset(&sig);
  361: 		sigaddset(&sig, SIGINT);
  362: 		sigaddset(&sig, SIGTSTP);
  363: 		sigprocmask(SIG_BLOCK, &sig, &oldsig);
  364: 		*/
  365: 
  366: 		if ((f = mkevent(NULL, NULL)) == -1)
  367: 			return 4;
  368: 		else
  369: 			close(f);
  370: 
  371: 		if (update(MNT_UPDATE) == -1)
  372: 			return 5;
  373: 
  374: 		switch ((pid = vfork())) {
  375: 			case -1:
  376: 				printf("Error:: can`t execute safe mount #%d - %s\n", 
  377: 						errno, strerror(errno));
  378: 				stat = 3;
  379: 				break;
  380: 			case 0:
  381: 				VERB(5) printf("Go to running process %s\n", *argv);
  382: 				if (chroot(AIT_GET_STR(&Chroot)) == -1) {
  383: 					printf("Error:: can`t chroot to dir %s #%d - %s\n", 
  384: 							AIT_GET_STR(&Chroot), errno, strerror(errno));
  385: 				} else {
  386: 					if (strncmp(AIT_GET_STR(&User), "root", 5))
  387: 						setuser();
  388: 
  389: 					/* chdir("/"); */
  390: 					execvp(*argv, argv);
  391: 				}
  392: 				_exit(127);
  393: 				break;
  394: 			default:
  395: 				waitpid(pid, &stat, 0);
  396: 				stat = WEXITSTATUS(stat);
  397: 				VERB(3) printf("Return code: %d\n", stat);
  398: 
  399: 				if (access(szSLCK, F_OK) && update(MNT_UPDATE | MNT_RDONLY) == -1)
  400: 					stat = 8;
  401: 				break;
  402: 		}
  403: 
  404: 		unlink(szSess);
  405: 	}
  406: 
  407: 	return stat;
  408: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>