More bbsh design notes.

Allan Clark allanc at chickenandporn.com
Thu Sep 14 09:23:45 UTC 2006


On 9/14/06, Ian Oliver <lists at foxhill.co.uk> wrote:
> ...
>
> BTW, did I mention that on this here embedded box in front of me, the Korean engineers
> who hacked all the calls to ifconfig, route, etc. into udhcpc also got it to directly
> write the IP address and netmask into known places in memory? So, I'll be needing
> config options for where to write the values, and I'll need them endian swapping. :)

winxksh is a shell that has a "call" function: toss the arguments onto
a stack (strings?) and call the dlsym() of the entrypoint.  Kinda
risky, but that basic connection has been done before in UNIX, would
give you access to a BB variant of hton() et al, and opens up the
shell to dlopen() all sorts of DLLs, without a whole lot of hacking.
You could dlopen() a different DLL (of course, I mean .so) if the
shell works out not-quite-complex-enough, but most of your coding can
continue to be interpreted.

Allan
-- 
allanc at chickenandporn.com  http://dr.chickenandporn.com/



More information about the busybox mailing list