int main (int argc, char **argv) { progname = argv[0]; if (argc == 1 || strcmp (argv[1], "-h") == 0) { printf ("usage: %s NUM [NUM...]\n", progname); printf ("where NUM is a decimal number, NUM:COUNT or NUM-NUM\n"); exit (0); } while (--argc) { char *arg = *++argv; unsigned long num, num2; char *p; num = xstrtoul (arg, &p); if (*p == 0) print_number (num); else if (*p == ':') { *p++ = 0; num2 = xstrtoul (p, NULL); if (num2 == 0) { fprintf (stderr, "%s: invalid count\n", progname); exit (2); } print_range (num, num + num2 - 1); } else if (*p == '-') { *p++ = 0; num2 = xstrtoul (p, NULL); if (num2 < num) { fprintf (stderr, "%s: invalid range: %lu-%lu\n", progname, num, num2); exit (2); } print_range (num, num2); } else { fprintf (stderr, "%s: invalid argument\n", progname); exit (2); } } exit (0); }
int flash_lock_unlock_main(int argc UNUSED_PARAM, char **argv) { /* note: fields in these structs are 32-bits. * apparently we can't win anything by using off_t * or long long's for offset and/or sectors vars. */ struct mtd_info_user info; struct erase_info_user lock; unsigned long offset; long sectors; int fd; #define do_lock (ENABLE_FLASH_LOCK && (!ENABLE_FLASH_UNLOCK || (applet_name[6] == 'l'))) if (!argv[1]) bb_show_usage(); /* parse offset and number of sectors to lock */ offset = 0; sectors = -1; if (do_lock) { if (!argv[2] || !argv[3]) bb_show_usage(); offset = xstrtoul(argv[2], 0); sectors = xstrtol(argv[3], 0); } fd = xopen(argv[1], O_RDWR); xioctl(fd, MEMGETINFO, &info); lock.start = 0; lock.length = info.size; if (do_lock) { unsigned long size = info.size - info.erasesize; if (offset > size) { bb_error_msg_and_die("%lx is beyond device size %lx\n", offset, size); } if (sectors == -1) { sectors = info.size / info.erasesize; } else { // isn't this useless? unsigned long num = info.size / info.erasesize; if (sectors > num) { bb_error_msg_and_die("%ld are too many " "sectors, device only has " "%ld\n", sectors, num); } } lock.start = offset; lock.length = sectors * info.erasesize; xioctl(fd, MEMLOCK, &lock); } else { xioctl(fd, MEMUNLOCK, &lock); } return EXIT_SUCCESS; }
/* Work around Linux kernel issues on BTRFS and EXT4 before 2.6.39. FIXME: remove in 2013, or whenever we're pretty confident that the offending, unpatched kernels are no longer in use. */ static bool extent_need_sync (void) { /* For now always return true, to be on the safe side. If/when FIEMAP semantics are well defined (before SEEK_HOLE support is usable) and kernels implementing them are in use, we may relax this once again. */ return true; #if FIEMAP_BEHAVIOR_IS_DEFINED_AND_USABLE static int need_sync = -1; if (need_sync == -1) { struct utsname name; need_sync = 0; /* No workaround by default. */ # ifdef __linux__ if (uname (&name) != -1 && STRNCMP_LIT (name.release, "2.6.") == 0) { unsigned long val; if (xstrtoul (name.release + 4, NULL, 10, &val, NULL) == LONGINT_OK) { if (val < 39) need_sync = 1; } } # endif } return need_sync; #endif }
static int ctoi(char *s) { if (s[0] == '\'' && s[1] != '\0' && s[2] == '\'' && s[3] == '\0') return s[1]; // U+ means 0x if (s[0] == 'U' && s[1] == '+') { s[0] = '0'; s[1] = 'x'; } if (!isdigit(s[0])) return -1; return xstrtoul(s, 0); }
static char const * parse_with_separator (char const *spec, char const *separator, uid_t *uid, gid_t *gid, char **username, char **groupname) { static const char *E_invalid_user = N_("invalid user"); static const char *E_invalid_group = N_("invalid group"); static const char *E_bad_spec = N_("invalid spec"); const char *error_msg; struct passwd *pwd; struct group *grp; char *u; char const *g; char *gname = NULL; uid_t unum = *uid; gid_t gnum = *gid; error_msg = NULL; *username = *groupname = NULL; /* Set U and G to nonzero length strings corresponding to user and group specifiers or to NULL. If U is not NULL, it is a newly allocated string. */ u = NULL; if (separator == NULL) { if (*spec) u = xstrdup (spec); } else { size_t ulen = separator - spec; if (ulen != 0) { u = xmemdup (spec, ulen + 1); u[ulen] = '\0'; } } g = (separator == NULL || *(separator + 1) == '\0' ? NULL : separator + 1); #ifdef __DJGPP__ /* Pretend that we are the user U whose group is G. This makes pwd and grp functions ``know'' about the UID and GID of these. */ if (u && !is_number (u)) setenv ("USER", u, 1); if (g && !is_number (g)) setenv ("GROUP", g, 1); #endif if (u != NULL) { /* If it starts with "+", skip the look-up. */ pwd = (*u == '+' ? NULL : getpwnam (u)); if (pwd == NULL) { bool use_login_group = (separator != NULL && g == NULL); if (use_login_group) { /* If there is no group, then there may not be a trailing ":", either. */ error_msg = E_bad_spec; } else { unsigned long int tmp; if (xstrtoul (u, NULL, 10, &tmp, "") == LONGINT_OK && tmp <= MAXUID && (uid_t) tmp != (uid_t) -1) unum = tmp; else error_msg = E_invalid_user; } } else { unum = pwd->pw_uid; if (g == NULL && separator != NULL) { /* A separator was given, but a group was not specified, so get the login group. */ char buf[INT_BUFSIZE_BOUND (uintmax_t)]; gnum = pwd->pw_gid; grp = getgrgid (gnum); gname = xstrdup (grp ? grp->gr_name : umaxtostr (gnum, buf)); endgrent (); } } endpwent (); } if (g != NULL && error_msg == NULL) { /* Explicit group. */ /* If it starts with "+", skip the look-up. */ grp = (*g == '+' ? NULL : getgrnam (g)); if (grp == NULL) { unsigned long int tmp; if (xstrtoul (g, NULL, 10, &tmp, "") == LONGINT_OK && tmp <= MAXGID && (gid_t) tmp != (gid_t) -1) gnum = tmp; else error_msg = E_invalid_group; } else gnum = grp->gr_gid; endgrent (); /* Save a file descriptor. */ gname = xstrdup (g); } if (error_msg == NULL) { *uid = unum; *gid = gnum; *username = u; *groupname = gname; u = NULL; } else free (gname); free (u); return _(error_msg); }
int main (int argc, char **argv) { static struct option long_options[] = { {"input", required_argument, 0, 'i'}, {"output", required_argument, 0, 'o'}, {"read-length", required_argument, 0, 'r'}, {"bpb", required_argument, 0, 'b'}, {"mrate1", required_argument, 0, 'x'}, {"mrate2", required_argument, 0, 'y'}, {"mrate3", required_argument, 0, 'z'}, {"help", no_argument, 0, 'h'} }; outfp = NULL; read_length = 48; bpb = 2; mrate1 = mrate2 = mrate3 = 0; for (;;) { int option_index = 0; int c = getopt_long (argc, argv, "i:o:p:r:n:b:x:y:z:h", long_options, &option_index); if (-1 == c) break; switch (c) { case 'i': if (optarg[0] == '-' && optarg[1] == '\0') infp = stdin; else assert (NULL != (infp = xfopen (optarg, "r"))); break; case 'o': if (optarg[0] == '-' && optarg[1] == '\0') outfp = stdout; else assert (NULL != (outfp = xfopen (optarg, "w"))); break; case 'r': read_length = xstrtoul (optarg); break; case 'b': bpb = xstrtoul (optarg); break; case 'x': mrate1 = xstrtoul (optarg); break; case 'y': mrate2 = xstrtoul (optarg); break; case 'z': mrate3 = xstrtoul (optarg); break; case 'h': usage (); return 0; case '?': default: usage (); return 1; } } if (NULL == infp) infp = stdin; if (NULL == outfp) outfp = stdout; if (0 != readgen ()) print_error ("Failed to convert input to binary."); fclose (infp); fclose (outfp); return 0; }
int ipcrm_main(int argc, char **argv) { int c; int error = 0; /* if the command is executed without parameters, do nothing */ if (argc == 1) return 0; #if IPCRM_LEGACY /* check to see if the command is being invoked in the old way if so then run the old code. Valid commands are msg, shm, sem. */ { type_id what = 0; /* silence gcc */ char w; w = argv[1][0]; if ( ((w == 'm' && argv[1][1] == 's' && argv[1][2] == 'g') || (argv[1][0] == 's' && ((w = argv[1][1]) == 'h' || w == 'e') && argv[1][2] == 'm') ) && argv[1][3] == '\0' ) { if (argc < 3) bb_show_usage(); if (w == 'h') what = SHM; else if (w == 'm') what = MSG; else if (w == 'e') what = SEM; if (remove_ids(what, &argv[2])) fflush_stdout_and_exit(EXIT_FAILURE); printf("resource(s) deleted\n"); return 0; } } #endif /* IPCRM_LEGACY */ /* process new syntax to conform with SYSV ipcrm */ while ((c = getopt(argc, argv, "q:m:s:Q:M:S:h?")) != -1) { int result; int id = 0; int iskey = isupper(c); /* needed to delete semaphores */ union semun arg; arg.val = 0; if ((c == '?') || (c == 'h')) { bb_show_usage(); } /* we don't need case information any more */ c = tolower(c); /* make sure the option is in range: allowed are q, m, s */ if (c != 'q' && c != 'm' && c != 's') { bb_show_usage(); } if (iskey) { /* keys are in hex or decimal */ key_t key = xstrtoul(optarg, 0); if (key == IPC_PRIVATE) { error++; bb_error_msg("illegal key (%s)", optarg); continue; } /* convert key to id */ id = ((c == 'q') ? msgget(key, 0) : (c == 'm') ? shmget(key, 0, 0) : semget(key, 0, 0)); if (id < 0) { const char *errmsg; error++; switch (errno) { case EACCES: errmsg = "permission denied for"; break; case EIDRM: errmsg = "already removed"; break; case ENOENT: errmsg = "invalid"; break; default: errmsg = "unknown error in"; break; } bb_error_msg("%s %s (%s)", errmsg, "key", optarg); continue; } } else { /* ids are in decimal */ id = xatoul(optarg); } result = ((c == 'q') ? msgctl(id, IPC_RMID, NULL) : (c == 'm') ? shmctl(id, IPC_RMID, NULL) : semctl(id, 0, IPC_RMID, arg)); if (result) { const char *errmsg; const char *const what = iskey ? "key" : "id"; error++; switch (errno) { case EACCES: case EPERM: errmsg = "permission denied for"; break; case EINVAL: errmsg = "invalid"; break; case EIDRM: errmsg = "already removed"; break; default: errmsg = "unknown error in"; break; } bb_error_msg("%s %s (%s)", errmsg, what, optarg); continue; } } /* print usage if we still have some arguments left over */ if (optind != argc) { bb_show_usage(); } /* exit value reflects the number of errors encountered */ return error; }
char get_header_tar(archive_handle_t *archive_handle) { static int end; file_header_t *file_header = archive_handle->file_header; struct { /* ustar header, Posix 1003.1 */ char name[100]; /* 0-99 */ char mode[8]; /* 100-107 */ char uid[8]; /* 108-115 */ char gid[8]; /* 116-123 */ char size[12]; /* 124-135 */ char mtime[12]; /* 136-147 */ char chksum[8]; /* 148-155 */ char typeflag; /* 156-156 */ char linkname[100]; /* 157-256 */ char magic[6]; /* 257-262 */ char version[2]; /* 263-264 */ char uname[32]; /* 265-296 */ char gname[32]; /* 297-328 */ char devmajor[8]; /* 329-336 */ char devminor[8]; /* 337-344 */ char prefix[155]; /* 345-499 */ char padding[12]; /* 500-512 */ } tar; char *cp; int i, sum_u, sum_s, sum; int parse_names; if (sizeof(tar) != 512) BUG_tar_header_size(); #if ENABLE_FEATURE_TAR_GNU_EXTENSIONS again: #endif /* Align header */ data_align(archive_handle, 512); again_after_align: xread(archive_handle->src_fd, &tar, 512); archive_handle->offset += 512; /* If there is no filename its an empty header */ if (tar.name[0] == 0) { if (end) { /* This is the second consecutive empty header! End of archive! * Read until the end to empty the pipe from gz or bz2 */ while (full_read(archive_handle->src_fd, &tar, 512) == 512) /* repeat */; return EXIT_FAILURE; } end = 1; return EXIT_SUCCESS; } end = 0; /* Check header has valid magic, "ustar" is for the proper tar * 0's are for the old tar format */ if (strncmp(tar.magic, "ustar", 5) != 0) { #if ENABLE_FEATURE_TAR_OLDGNU_COMPATIBILITY if (memcmp(tar.magic, "\0\0\0\0", 5) != 0) #endif bb_error_msg_and_die("invalid tar magic"); } /* Do checksum on headers. * POSIX says that checksum is done on unsigned bytes, but * Sun and HP-UX gets it wrong... more details in * GNU tar source. */ sum_s = sum_u = ' ' * sizeof(tar.chksum); for (i = 0; i < 148 ; i++) { sum_u += ((unsigned char*)&tar)[i]; sum_s += ((signed char*)&tar)[i]; } for (i = 156; i < 512 ; i++) { sum_u += ((unsigned char*)&tar)[i]; sum_s += ((signed char*)&tar)[i]; } /* This field does not need special treatment (getOctal) */ sum = xstrtoul(tar.chksum, 8); if (sum_u != sum && sum_s != sum) { bb_error_msg_and_die("invalid tar header checksum"); } /* 0 is reserved for high perf file, treat as normal file */ if (!tar.typeflag) tar.typeflag = '0'; parse_names = (tar.typeflag >= '0' && tar.typeflag <= '7'); /* getOctal trashes subsequent field, therefore we call it * on fields in reverse order */ if (tar.devmajor[0]) { unsigned minor = GET_OCTAL(tar.devminor); unsigned major = GET_OCTAL(tar.devmajor); file_header->device = makedev(major, minor); } file_header->link_name = NULL; if (!linkname && parse_names && tar.linkname[0]) { /* we trash magic[0] here, it's ok */ tar.linkname[sizeof(tar.linkname)] = '\0'; file_header->link_name = xstrdup(tar.linkname); /* FIXME: what if we have non-link object with link_name? */ /* Will link_name be free()ed? */ } file_header->mtime = GET_OCTAL(tar.mtime); file_header->size = GET_OCTAL(tar.size); file_header->gid = GET_OCTAL(tar.gid); file_header->uid = GET_OCTAL(tar.uid); /* Set bits 0-11 of the files mode */ file_header->mode = 07777 & GET_OCTAL(tar.mode); file_header->name = NULL; if (!longname && parse_names) { /* we trash mode[0] here, it's ok */ tar.name[sizeof(tar.name)] = '\0'; if (tar.prefix[0]) { /* and padding[0] */ tar.prefix[sizeof(tar.prefix)] = '\0'; file_header->name = concat_path_file(tar.prefix, tar.name); } else file_header->name = xstrdup(tar.name); } /* Set bits 12-15 of the files mode */ /* (typeflag was not trashed because chksum does not use getOctal) */ switch (tar.typeflag) { /* busybox identifies hard links as being regular files with 0 size and a link name */ case '1': file_header->mode |= S_IFREG; break; case '7': /* case 0: */ case '0': #if ENABLE_FEATURE_TAR_OLDGNU_COMPATIBILITY if (last_char_is(file_header->name, '/')) { file_header->mode |= S_IFDIR; } else #endif file_header->mode |= S_IFREG; break; case '2': file_header->mode |= S_IFLNK; break; case '3': file_header->mode |= S_IFCHR; break; case '4': file_header->mode |= S_IFBLK; break; case '5': file_header->mode |= S_IFDIR; break; case '6': file_header->mode |= S_IFIFO; break; #if ENABLE_FEATURE_TAR_GNU_EXTENSIONS case 'L': /* free: paranoia: tar with several consecutive longnames */ free(longname); /* For paranoia reasons we allocate extra NUL char */ longname = xzalloc(file_header->size + 1); /* We read ASCIZ string, including NUL */ xread(archive_handle->src_fd, longname, file_header->size); archive_handle->offset += file_header->size; /* return get_header_tar(archive_handle); */ /* gcc 4.1.1 didn't optimize it into jump */ /* so we will do it ourself, this also saves stack */ goto again; case 'K': free(linkname); linkname = xzalloc(file_header->size + 1); xread(archive_handle->src_fd, linkname, file_header->size); archive_handle->offset += file_header->size; /* return get_header_tar(archive_handle); */ goto again; case 'D': /* GNU dump dir */ case 'M': /* Continuation of multi volume archive */ case 'N': /* Old GNU for names > 100 characters */ case 'S': /* Sparse file */ case 'V': /* Volume header */ #endif case 'g': /* pax global header */ case 'x': { /* pax extended header */ off_t sz; bb_error_msg("warning: skipping header '%c'", tar.typeflag); sz = (file_header->size + 511) & ~(off_t)511; archive_handle->offset += sz; sz >>= 9; /* sz /= 512 but w/o contortions for signed div */ while (sz--) xread(archive_handle->src_fd, &tar, 512); /* return get_header_tar(archive_handle); */ goto again_after_align; } default: bb_error_msg_and_die("unknown typeflag: 0x%x", tar.typeflag); } #if ENABLE_FEATURE_TAR_GNU_EXTENSIONS if (longname) { file_header->name = longname; longname = NULL; } if (linkname) { file_header->link_name = linkname; linkname = NULL; } #endif if (!strncmp(file_header->name, "/../"+1, 3) || strstr(file_header->name, "/../") ) { bb_error_msg_and_die("name with '..' encountered: '%s'", file_header->name); } /* Strip trailing '/' in directories */ /* Must be done after mode is set as '/' is used to check if it's a directory */ cp = last_char_is(file_header->name, '/'); if (archive_handle->filter(archive_handle) == EXIT_SUCCESS) { archive_handle->action_header(archive_handle->file_header); /* Note that we kill the '/' only after action_header() */ /* (like GNU tar 1.15.1: verbose mode outputs "dir/dir/") */ if (cp) *cp = '\0'; archive_handle->flags |= ARCHIVE_EXTRACT_QUIET; archive_handle->action_data(archive_handle); llist_add_to(&(archive_handle->passed), file_header->name); } else { data_skip(archive_handle); free(file_header->name); } archive_handle->offset += file_header->size; free(file_header->link_name); /* Do not free(file_header->name)! */ return EXIT_SUCCESS; }