summaryrefslogtreecommitdiffstats
path: root/src/plugins/abrt-action-install-debuginfo.c
blob: 77cd370b863678d1f66da22b79e426e66199f7f2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
#include <unistd.h>
#include <string.h>

// TODO: honor configure --prefix here:
#define EXECUTABLE "/usr/bin/abrt-action-install-debuginfo.py"

static void error_msg_and_die(const char *msg, const char *arg)
{
    write(2, msg, strlen(msg));
    if (arg)
    {
        write(2, " '", 2);
        write(2, msg, strlen(msg));
        write(2, "'", 1);
    }
    write(2, "\n", 1);
    exit(1);
}


/* A binary wrapper is needed around python scripts if we want
 * to run them in sgid/suid mode.
 *
 * This is such a wrapper.
 */
int main(int argc, char **argv)
{
    /*
     * We disallow passing of arguments which point to writable dirs.
     * This way, the script will always use default arguments.
     */
    char **pp = argv;
    char *arg;
    while ((arg = *++pp) != NULL)
    {
        if (strncmp(arg, "--cache", 7) == 0)
            error_msg_and_die("bad option", arg);
        if (strncmp(arg, "--tmpdir", 8) == 0)
            error_msg_and_die("bad option", arg);
    }

    /* We use full path, and execv instead of execvp in order to
     * disallow user to execute his own abrt-action-install-debuginfo.py
     * in his dir by setting up corresponding malicious $PATH.
     */
    execv(EXECUTABLE, argv);
    error_msg_and_die("Can't execute", EXECUTABLE);
}