dnscrypto-proxy: Support files updated.
[tomato.git] / release / src / router / samba3 / source / lib / smbrun.c
blobe81224b5af376ff98bd79b2cf40b85cf191ee277
1 /*
2 Unix SMB/CIFS implementation.
3 run a command as a specified user
4 Copyright (C) Andrew Tridgell 1992-1998
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 #include "includes.h"
23 /* need to move this from here!! need some sleep ... */
24 struct current_user current_user;
26 /****************************************************************************
27 This is a utility function of smbrun().
28 ****************************************************************************/
30 static int setup_out_fd(void)
32 int fd;
33 pstring path;
35 slprintf(path, sizeof(path)-1, "%s/smb.XXXXXX", tmpdir());
37 /* now create the file */
38 fd = smb_mkstemp(path);
40 if (fd == -1) {
41 DEBUG(0,("setup_out_fd: Failed to create file %s. (%s)\n",
42 path, strerror(errno) ));
43 return -1;
46 DEBUG(10,("setup_out_fd: Created tmp file %s\n", path ));
48 /* Ensure file only kept around by open fd. */
49 unlink(path);
50 return fd;
53 /****************************************************************************
54 run a command being careful about uid/gid handling and putting the output in
55 outfd (or discard it if outfd is NULL).
56 ****************************************************************************/
58 static int smbrun_internal(const char *cmd, int *outfd, BOOL sanitize)
60 pid_t pid;
61 uid_t uid = current_user.ut.uid;
62 gid_t gid = current_user.ut.gid;
65 * Lose any elevated privileges.
67 drop_effective_capability(KERNEL_OPLOCK_CAPABILITY);
68 drop_effective_capability(DMAPI_ACCESS_CAPABILITY);
70 /* point our stdout at the file we want output to go into */
72 if (outfd && ((*outfd = setup_out_fd()) == -1)) {
73 return -1;
76 /* in this method we will exec /bin/sh with the correct
77 arguments, after first setting stdout to point at the file */
80 * We need to temporarily stop CatchChild from eating
81 * SIGCLD signals as it also eats the exit status code. JRA.
84 CatchChildLeaveStatus();
86 if ((pid=sys_fork()) < 0) {
87 DEBUG(0,("smbrun: fork failed with error %s\n", strerror(errno) ));
88 CatchChild();
89 if (outfd) {
90 close(*outfd);
91 *outfd = -1;
93 return errno;
96 if (pid) {
98 * Parent.
100 int status=0;
101 pid_t wpid;
104 /* the parent just waits for the child to exit */
105 while((wpid = sys_waitpid(pid,&status,0)) < 0) {
106 if(errno == EINTR) {
107 errno = 0;
108 continue;
110 break;
113 CatchChild();
115 if (wpid != pid) {
116 DEBUG(2,("waitpid(%d) : %s\n",(int)pid,strerror(errno)));
117 if (outfd) {
118 close(*outfd);
119 *outfd = -1;
121 return -1;
124 /* Reset the seek pointer. */
125 if (outfd) {
126 sys_lseek(*outfd, 0, SEEK_SET);
129 #if defined(WIFEXITED) && defined(WEXITSTATUS)
130 if (WIFEXITED(status)) {
131 return WEXITSTATUS(status);
133 #endif
135 return status;
138 CatchChild();
140 /* we are in the child. we exec /bin/sh to do the work for us. we
141 don't directly exec the command we want because it may be a
142 pipeline or anything else the config file specifies */
144 /* point our stdout at the file we want output to go into */
145 if (outfd) {
146 close(1);
147 if (sys_dup2(*outfd,1) != 1) {
148 DEBUG(2,("Failed to create stdout file descriptor\n"));
149 close(*outfd);
150 exit(80);
154 /* now completely lose our privileges. This is a fairly paranoid
155 way of doing it, but it does work on all systems that I know of */
157 become_user_permanently(uid, gid);
159 if (getuid() != uid || geteuid() != uid ||
160 getgid() != gid || getegid() != gid) {
161 /* we failed to lose our privileges - do not execute
162 the command */
163 exit(81); /* we can't print stuff at this stage,
164 instead use exit codes for debugging */
167 #ifndef __INSURE__
168 /* close all other file descriptors, leaving only 0, 1 and 2. 0 and
169 2 point to /dev/null from the startup code */
171 int fd;
172 for (fd=3;fd<256;fd++) close(fd);
174 #endif
177 const char *newcmd = sanitize ? escape_shell_string(cmd) : cmd;
178 if (!newcmd) {
179 exit(82);
181 execl("/bin/sh","sh","-c",newcmd,NULL);
184 /* not reached */
185 exit(83);
186 return 1;
189 /****************************************************************************
190 Use only in known safe shell calls (printing).
191 ****************************************************************************/
193 int smbrun_no_sanitize(const char *cmd, int *outfd)
195 return smbrun_internal(cmd, outfd, False);
198 /****************************************************************************
199 By default this now sanitizes shell expansion.
200 ****************************************************************************/
202 int smbrun(const char *cmd, int *outfd)
204 return smbrun_internal(cmd, outfd, True);
207 /****************************************************************************
208 run a command being careful about uid/gid handling and putting the output in
209 outfd (or discard it if outfd is NULL).
210 sends the provided secret to the child stdin.
211 ****************************************************************************/
213 int smbrunsecret(const char *cmd, const char *secret)
215 pid_t pid;
216 uid_t uid = current_user.ut.uid;
217 gid_t gid = current_user.ut.gid;
218 int ifd[2];
221 * Lose any elevated privileges.
223 drop_effective_capability(KERNEL_OPLOCK_CAPABILITY);
224 drop_effective_capability(DMAPI_ACCESS_CAPABILITY);
226 /* build up an input pipe */
227 if(pipe(ifd)) {
228 return -1;
231 /* in this method we will exec /bin/sh with the correct
232 arguments, after first setting stdout to point at the file */
235 * We need to temporarily stop CatchChild from eating
236 * SIGCLD signals as it also eats the exit status code. JRA.
239 CatchChildLeaveStatus();
241 if ((pid=sys_fork()) < 0) {
242 DEBUG(0, ("smbrunsecret: fork failed with error %s\n", strerror(errno)));
243 CatchChild();
244 return errno;
247 if (pid) {
249 * Parent.
251 int status = 0;
252 pid_t wpid;
253 size_t towrite;
254 ssize_t wrote;
256 close(ifd[0]);
257 /* send the secret */
258 towrite = strlen(secret);
259 wrote = write(ifd[1], secret, towrite);
260 if ( wrote != towrite ) {
261 DEBUG(0,("smbrunsecret: wrote %ld of %lu bytes\n",(long)wrote,(unsigned long)towrite));
263 fsync(ifd[1]);
264 close(ifd[1]);
266 /* the parent just waits for the child to exit */
267 while((wpid = sys_waitpid(pid, &status, 0)) < 0) {
268 if(errno == EINTR) {
269 errno = 0;
270 continue;
272 break;
275 CatchChild();
277 if (wpid != pid) {
278 DEBUG(2, ("waitpid(%d) : %s\n", (int)pid, strerror(errno)));
279 return -1;
282 #if defined(WIFEXITED) && defined(WEXITSTATUS)
283 if (WIFEXITED(status)) {
284 return WEXITSTATUS(status);
286 #endif
288 return status;
291 CatchChild();
293 /* we are in the child. we exec /bin/sh to do the work for us. we
294 don't directly exec the command we want because it may be a
295 pipeline or anything else the config file specifies */
297 close(ifd[1]);
298 close(0);
299 if (sys_dup2(ifd[0], 0) != 0) {
300 DEBUG(2,("Failed to create stdin file descriptor\n"));
301 close(ifd[0]);
302 exit(80);
305 /* now completely lose our privileges. This is a fairly paranoid
306 way of doing it, but it does work on all systems that I know of */
308 become_user_permanently(uid, gid);
310 if (getuid() != uid || geteuid() != uid ||
311 getgid() != gid || getegid() != gid) {
312 /* we failed to lose our privileges - do not execute
313 the command */
314 exit(81); /* we can't print stuff at this stage,
315 instead use exit codes for debugging */
318 #ifndef __INSURE__
319 /* close all other file descriptors, leaving only 0, 1 and 2. 0 and
320 2 point to /dev/null from the startup code */
322 int fd;
323 for (fd = 3; fd < 256; fd++) close(fd);
325 #endif
327 execl("/bin/sh", "sh", "-c", cmd, NULL);
329 /* not reached */
330 exit(82);
331 return 1;