int id_main(int argc, char **argv) { struct passwd *p; uid_t uid; gid_t gid; unsigned long flags; short status; /* Don't allow -n -r -nr -ug -rug -nug -rnug */ /* Don't allow more than one username */ bb_opt_complementally = "?1:?:u--g:g--u:r?ug:n?ug"; flags = bb_getopt_ulflags(argc, argv, "rnug"); /* This values could be overwritten later */ uid = geteuid(); gid = getegid(); if (flags & PRINT_REAL) { uid = getuid(); gid = getgid(); } if(argv[optind]) { p=getpwnam(argv[optind]); /* bb_xgetpwnam is needed because it exits on failure */ uid = bb_xgetpwnam(argv[optind]); gid = p->pw_gid; /* in this case PRINT_REAL is the same */ } if(flags & (JUST_GROUP | JUST_USER)) { /* JUST_GROUP and JUST_USER are mutually exclusive */ if(flags & NAME_NOT_NUMBER) { /* bb_getpwuid and bb_getgrgid exit on failure so puts cannot segfault */ puts((flags & JUST_USER) ? bb_getpwuid(NULL, uid, -1 ) : bb_getgrgid(NULL, gid, -1 )); } else { bb_printf("%u\n",(flags & JUST_USER) ? uid : gid); } /* exit */ bb_fflush_stdout_and_exit(EXIT_SUCCESS); } /* Print full info like GNU id */ /* bb_getpwuid doesn't exit on failure here */ status=printf_full(uid, bb_getpwuid(NULL, uid, 0), 'u'); putchar(' '); /* bb_getgrgid doesn't exit on failure here */ status|=printf_full(gid, bb_getgrgid(NULL, gid, 0), 'g'); putchar('\n'); bb_fflush_stdout_and_exit(status); }
int whoami_main(int argc, char **argv) { if (argc > 1) bb_show_usage(); puts(bb_getpwuid(NULL, geteuid(), -1)); /* exits on error */ fflush_stdout_and_exit(EXIT_SUCCESS); }
int logger_main(int argc, char **argv) { char *str_p, *str_t; int i = 0; char name[80]; /* Fill out the name string early (may be overwritten later) */ bb_getpwuid(name, sizeof(name), geteuid()); str_t = name; /* Parse any options */ getopt32(argv, "p:st:", &str_p, &str_t); if (option_mask32 & 0x2) /* -s */ i |= LOG_PERROR; //if (option_mask32 & 0x4) /* -t */ openlog(str_t, i, 0); i = LOG_USER | LOG_NOTICE; if (option_mask32 & 0x1) /* -p */ i = pencode(str_p); argc -= optind; argv += optind; if (!argc) { #define strbuf bb_common_bufsiz1 while (fgets(strbuf, COMMON_BUFSIZE, stdin)) { if (strbuf[0] && NOT_LONE_CHAR(strbuf, '\n') ) { /* Neither "" nor "\n" */ syslog(i, "%s", strbuf); } } } else { char *message = NULL; int len = 0; int pos = 0; do { len += strlen(*argv) + 1; message = xrealloc(message, len + 1); sprintf(message + pos, " %s", *argv), pos = len; } while (*++argv); syslog(i, "%s", message + 1); /* skip leading " " */ } closelog(); return EXIT_SUCCESS; }
procps_status_t * procps_scan(int save_user_arg0) { static DIR *dir; struct dirent *entry; static procps_status_t ret_status; char *name; int n; char status[32]; char *status_tail; char buf[PROCPS_BUFSIZE]; procps_status_t curstatus; int pid; long tasknice; struct stat sb; if (!dir) { dir = opendir("/proc"); if(!dir) bb_error_msg_and_die("Can't open /proc"); } for(;;) { if((entry = readdir(dir)) == NULL) { closedir(dir); dir = 0; return 0; } name = entry->d_name; if (!(*name >= '0' && *name <= '9')) continue; memset(&curstatus, 0, sizeof(procps_status_t)); pid = atoi(name); curstatus.pid = pid; status_tail = status + sprintf(status, "/proc/%d", pid); if(stat(status, &sb)) continue; bb_getpwuid(curstatus.user, sb.st_uid, sizeof(curstatus.user)); strcpy(status_tail, "/stat"); n = read_to_buf(status, buf); if(n < 0) continue; name = strrchr(buf, ')'); /* split into "PID (cmd" and "<rest>" */ if(name == 0 || name[1] != ' ') continue; *name = 0; sscanf(buf, "%*s (%15c", curstatus.short_cmd); n = sscanf(name+2, "%c %d " "%*s %*s %*s %*s " /* pgrp, session, tty, tpgid */ "%*s %*s %*s %*s %*s " /* flags, min_flt, cmin_flt, maj_flt, cmaj_flt */ #ifdef CONFIG_FEATURE_TOP_CPU_USAGE_PERCENTAGE "%lu %lu " #else "%*s %*s " #endif "%*s %*s %*s " /* cutime, cstime, priority */ "%ld " "%*s %*s %*s " /* timeout, it_real_value, start_time */ "%*s " /* vsize */ "%ld", curstatus.state, &curstatus.ppid, #ifdef CONFIG_FEATURE_TOP_CPU_USAGE_PERCENTAGE &curstatus.utime, &curstatus.stime, #endif &tasknice, &curstatus.rss); #ifdef CONFIG_FEATURE_TOP_CPU_USAGE_PERCENTAGE if(n != 6) #else if(n != 4) #endif continue; if (curstatus.rss == 0 && curstatus.state[0] != 'Z') curstatus.state[1] = 'W'; else curstatus.state[1] = ' '; if (tasknice < 0) curstatus.state[2] = '<'; else if (tasknice > 0) curstatus.state[2] = 'N'; else curstatus.state[2] = ' '; #ifdef PAGE_SHIFT curstatus.rss <<= (PAGE_SHIFT - 10); /* 2**10 = 1kb */ #else curstatus.rss *= (getpagesize() >> 10); /* 2**10 = 1kb */ #endif if(save_user_arg0) { strcpy(status_tail, "/cmdline"); n = read_to_buf(status, buf); if(n > 0) { if(buf[n-1]=='\n') buf[--n] = 0; name = buf; while(n) { if(((unsigned char)*name) < ' ') *name = ' '; name++; n--; } *name = 0; if(buf[0]) curstatus.cmd = strdup(buf); /* if NULL it work true also */ } } return memcpy(&ret_status, &curstatus, sizeof(procps_status_t)); } }
int id_main(int argc, char **argv) { struct passwd *p; uid_t uid; gid_t gid; unsigned long flags; short status; #ifdef CONFIG_SELINUX security_context_t scontext; #endif /* Don't allow -n -r -nr -ug -rug -nug -rnug */ /* Don't allow more than one username */ bb_opt_complementally = "?1:?:u--g:g--u:r?ug:n?ug"; flags = bb_getopt_ulflags(argc, argv, "rnugZ"); /* This values could be overwritten later */ uid = geteuid(); gid = getegid(); if (flags & PRINT_REAL) { uid = getuid(); gid = getgid(); } if(argv[optind]) { p=getpwnam(argv[optind]); /* bb_xgetpwnam is needed because it exits on failure */ uid = bb_xgetpwnam(argv[optind]); gid = p->pw_gid; /* in this case PRINT_REAL is the same */ } #ifdef CONFIG_SELINUX if(flags & (JUST_GROUP | JUST_USER | JUST_CONTEXT )) { #else if(flags & (JUST_GROUP | JUST_USER )) { #endif /* JUST_GROUP and JUST_USER are mutually exclusive */ if(flags & NAME_NOT_NUMBER) { /* bb_getpwuid and bb_getgrgid exit on failure so puts cannot segfault */ puts((flags & JUST_USER) ? bb_getpwuid(NULL, uid, -1 ) : bb_getgrgid(NULL, gid, -1 )); } else { if (flags & JUST_USER){ bb_printf("%u\n",uid); } if (flags & JUST_GROUP){ bb_printf("%u\n",gid); } } #ifdef CONFIG_SELINUX if(flags & JUST_CONTEXT){ if( !is_selinux_enabled() ) { bb_error_msg_and_die("Sorry, --context (-Z) can be used only on " "a selinux-enabled kernel.\n" ); } if (argc - optind == 1){ bb_error_msg("cannot print security context when user specified"); bb_fflush_stdout_and_exit(EXIT_FAILURE); } if (getcon(&scontext)){ bb_error_msg("can't get process context"); bb_fflush_stdout_and_exit(EXIT_FAILURE); } bb_printf("%s\n", scontext); } #endif /* exit */ bb_fflush_stdout_and_exit(EXIT_SUCCESS); } /* Print full info like GNU id */ /* bb_getpwuid doesn't exit on failure here */ status=printf_full(uid, bb_getpwuid(NULL, uid, 0), 'u'); putchar(' '); /* bb_getgrgid doesn't exit on failure here */ status|=printf_full(gid, bb_getgrgid(NULL, gid, 0), 'g'); #ifdef CONFIG_SELINUX if ( is_selinux_enabled() ) { security_context_t mysid; char context[80]; int len = sizeof(context); getcon(&mysid); context[0] = '\0'; if (mysid) { len = strlen(mysid)+1; safe_strncpy(context, mysid, len); freecon(mysid); }else{ safe_strncpy(context, "unknown",8); } bb_printf(" context=%s", context); } #endif putchar('\n'); bb_fflush_stdout_and_exit(status); }