1b8ba871bSPeter Wemm /*-
2b8ba871bSPeter Wemm * Copyright (c) 1992, 1993, 1994
3b8ba871bSPeter Wemm * The Regents of the University of California. All rights reserved.
4b8ba871bSPeter Wemm * Copyright (c) 1992, 1993, 1994, 1995, 1996
5b8ba871bSPeter Wemm * Keith Bostic. All rights reserved.
6b8ba871bSPeter Wemm *
7b8ba871bSPeter Wemm * See the LICENSE file for redistribution information.
8b8ba871bSPeter Wemm */
9b8ba871bSPeter Wemm
10b8ba871bSPeter Wemm #include "config.h"
11b8ba871bSPeter Wemm
12f0957ccaSPeter Wemm #include <sys/types.h>
13b8ba871bSPeter Wemm #include <sys/queue.h>
14b8ba871bSPeter Wemm #include <sys/stat.h>
15b8ba871bSPeter Wemm
16b8ba871bSPeter Wemm #include <bitstring.h>
17b8ba871bSPeter Wemm #include <fcntl.h>
18b8ba871bSPeter Wemm #include <limits.h>
19b8ba871bSPeter Wemm #include <stdio.h>
20b8ba871bSPeter Wemm #include <stdlib.h>
21b8ba871bSPeter Wemm #include <string.h>
22b8ba871bSPeter Wemm #include <unistd.h>
23b8ba871bSPeter Wemm
24b8ba871bSPeter Wemm #include "../common/common.h"
25b8ba871bSPeter Wemm #include "tag.h"
26b8ba871bSPeter Wemm #include "pathnames.h"
27b8ba871bSPeter Wemm
28b8ba871bSPeter Wemm enum rc { NOEXIST, NOPERM, RCOK };
29c271fa92SBaptiste Daroussin static enum rc exrc_isok(SCR *, struct stat *, char *, int, int);
30b8ba871bSPeter Wemm
31c271fa92SBaptiste Daroussin static int ex_run_file(SCR *, char *);
32b8ba871bSPeter Wemm
33b8ba871bSPeter Wemm /*
34b8ba871bSPeter Wemm * ex_screen_copy --
35b8ba871bSPeter Wemm * Copy ex screen.
36b8ba871bSPeter Wemm *
37c271fa92SBaptiste Daroussin * PUBLIC: int ex_screen_copy(SCR *, SCR *);
38b8ba871bSPeter Wemm */
39b8ba871bSPeter Wemm int
ex_screen_copy(SCR * orig,SCR * sp)40f0957ccaSPeter Wemm ex_screen_copy(SCR *orig, SCR *sp)
41b8ba871bSPeter Wemm {
42b8ba871bSPeter Wemm EX_PRIVATE *oexp, *nexp;
43b8ba871bSPeter Wemm
44b8ba871bSPeter Wemm /* Create the private ex structure. */
45*110d525eSBaptiste Daroussin CALLOC_RET(orig, nexp, 1, sizeof(EX_PRIVATE));
46b8ba871bSPeter Wemm sp->ex_private = nexp;
47b8ba871bSPeter Wemm
48b8ba871bSPeter Wemm /* Initialize queues. */
49f0957ccaSPeter Wemm TAILQ_INIT(nexp->tq);
50f0957ccaSPeter Wemm TAILQ_INIT(nexp->tagfq);
51f0957ccaSPeter Wemm SLIST_INIT(nexp->cscq);
52b8ba871bSPeter Wemm
53b8ba871bSPeter Wemm if (orig == NULL) {
54b8ba871bSPeter Wemm } else {
55b8ba871bSPeter Wemm oexp = EXP(orig);
56b8ba871bSPeter Wemm
57b8ba871bSPeter Wemm if (oexp->lastbcomm != NULL &&
58f0957ccaSPeter Wemm (nexp->lastbcomm = v_wstrdup(sp, oexp->lastbcomm,
59f0957ccaSPeter Wemm STRLEN(oexp->lastbcomm))) == NULL) {
60b8ba871bSPeter Wemm msgq(sp, M_SYSERR, NULL);
61b8ba871bSPeter Wemm return(1);
62b8ba871bSPeter Wemm }
63b8ba871bSPeter Wemm if (ex_tag_copy(orig, sp))
64b8ba871bSPeter Wemm return (1);
65b8ba871bSPeter Wemm }
66b8ba871bSPeter Wemm return (0);
67b8ba871bSPeter Wemm }
68b8ba871bSPeter Wemm
69b8ba871bSPeter Wemm /*
70b8ba871bSPeter Wemm * ex_screen_end --
71b8ba871bSPeter Wemm * End a vi screen.
72b8ba871bSPeter Wemm *
73c271fa92SBaptiste Daroussin * PUBLIC: int ex_screen_end(SCR *);
74b8ba871bSPeter Wemm */
75b8ba871bSPeter Wemm int
ex_screen_end(SCR * sp)76f0957ccaSPeter Wemm ex_screen_end(SCR *sp)
77b8ba871bSPeter Wemm {
78b8ba871bSPeter Wemm EX_PRIVATE *exp;
79b8ba871bSPeter Wemm int rval;
80b8ba871bSPeter Wemm
81b8ba871bSPeter Wemm if ((exp = EXP(sp)) == NULL)
82b8ba871bSPeter Wemm return (0);
83b8ba871bSPeter Wemm
84b8ba871bSPeter Wemm rval = 0;
85b8ba871bSPeter Wemm
86b8ba871bSPeter Wemm /* Close down script connections. */
87b8ba871bSPeter Wemm if (F_ISSET(sp, SC_SCRIPT) && sscr_end(sp))
88b8ba871bSPeter Wemm rval = 1;
89b8ba871bSPeter Wemm
90b8ba871bSPeter Wemm if (argv_free(sp))
91b8ba871bSPeter Wemm rval = 1;
92b8ba871bSPeter Wemm
93b8ba871bSPeter Wemm free(exp->ibp);
94b8ba871bSPeter Wemm
95b8ba871bSPeter Wemm free(exp->lastbcomm);
96b8ba871bSPeter Wemm
97f0957ccaSPeter Wemm free(exp->ibcw.bp1.c);
98f0957ccaSPeter Wemm
99b8ba871bSPeter Wemm if (ex_tag_free(sp))
100b8ba871bSPeter Wemm rval = 1;
101b8ba871bSPeter Wemm
102f0957ccaSPeter Wemm if (cscope_end(sp))
103f0957ccaSPeter Wemm rval = 1;
104f0957ccaSPeter Wemm
105b8ba871bSPeter Wemm /* Free private memory. */
106b8ba871bSPeter Wemm free(exp);
107b8ba871bSPeter Wemm sp->ex_private = NULL;
108b8ba871bSPeter Wemm
109b8ba871bSPeter Wemm return (rval);
110b8ba871bSPeter Wemm }
111b8ba871bSPeter Wemm
112b8ba871bSPeter Wemm /*
113b8ba871bSPeter Wemm * ex_optchange --
114b8ba871bSPeter Wemm * Handle change of options for ex.
115b8ba871bSPeter Wemm *
116c271fa92SBaptiste Daroussin * PUBLIC: int ex_optchange(SCR *, int, char *, u_long *);
117b8ba871bSPeter Wemm */
118b8ba871bSPeter Wemm int
ex_optchange(SCR * sp,int offset,char * str,u_long * valp)119f0957ccaSPeter Wemm ex_optchange(SCR *sp, int offset, char *str, u_long *valp)
120b8ba871bSPeter Wemm {
121b8ba871bSPeter Wemm switch (offset) {
122b8ba871bSPeter Wemm case O_TAGS:
123b8ba871bSPeter Wemm return (ex_tagf_alloc(sp, str));
124b8ba871bSPeter Wemm }
125b8ba871bSPeter Wemm return (0);
126b8ba871bSPeter Wemm }
127b8ba871bSPeter Wemm
128b8ba871bSPeter Wemm /*
129b8ba871bSPeter Wemm * ex_exrc --
130b8ba871bSPeter Wemm * Read the EXINIT environment variable and the startup exrc files,
131b8ba871bSPeter Wemm * and execute their commands.
132b8ba871bSPeter Wemm *
133c271fa92SBaptiste Daroussin * PUBLIC: int ex_exrc(SCR *);
134b8ba871bSPeter Wemm */
135b8ba871bSPeter Wemm int
ex_exrc(SCR * sp)136f0957ccaSPeter Wemm ex_exrc(SCR *sp)
137b8ba871bSPeter Wemm {
138b8ba871bSPeter Wemm struct stat hsb, lsb;
139f0957ccaSPeter Wemm char *p, *path;
140f0957ccaSPeter Wemm CHAR_T *wp;
141f0957ccaSPeter Wemm size_t wlen;
142b8ba871bSPeter Wemm
143b8ba871bSPeter Wemm /*
144b8ba871bSPeter Wemm * Source the system, environment, $HOME and local .exrc values.
145b8ba871bSPeter Wemm * Vi historically didn't check $HOME/.exrc if the environment
146b8ba871bSPeter Wemm * variable EXINIT was set. This is all done before the file is
147b8ba871bSPeter Wemm * read in, because things in the .exrc information can set, for
148b8ba871bSPeter Wemm * example, the recovery directory.
149b8ba871bSPeter Wemm *
150b8ba871bSPeter Wemm * !!!
151b8ba871bSPeter Wemm * While nvi can handle any of the options settings of historic vi,
152b8ba871bSPeter Wemm * the converse is not true. Since users are going to have to have
153b8ba871bSPeter Wemm * files and environmental variables that work with both, we use nvi
154b8ba871bSPeter Wemm * versions of both the $HOME and local startup files if they exist,
155b8ba871bSPeter Wemm * otherwise the historic ones.
156b8ba871bSPeter Wemm *
157b8ba871bSPeter Wemm * !!!
158b8ba871bSPeter Wemm * For a discussion of permissions and when what .exrc files are
159b8ba871bSPeter Wemm * read, see the comment above the exrc_isok() function below.
160b8ba871bSPeter Wemm *
161b8ba871bSPeter Wemm * !!!
162b8ba871bSPeter Wemm * If the user started the historic of vi in $HOME, vi read the user's
163b8ba871bSPeter Wemm * .exrc file twice, as $HOME/.exrc and as ./.exrc. We avoid this, as
164b8ba871bSPeter Wemm * it's going to make some commands behave oddly, and I can't imagine
165b8ba871bSPeter Wemm * anyone depending on it.
166b8ba871bSPeter Wemm */
167b8ba871bSPeter Wemm switch (exrc_isok(sp, &hsb, _PATH_SYSEXRC, 1, 0)) {
168b8ba871bSPeter Wemm case NOEXIST:
169b8ba871bSPeter Wemm case NOPERM:
170b8ba871bSPeter Wemm break;
171b8ba871bSPeter Wemm case RCOK:
172b8ba871bSPeter Wemm if (ex_run_file(sp, _PATH_SYSEXRC))
173b8ba871bSPeter Wemm return (1);
174b8ba871bSPeter Wemm break;
175b8ba871bSPeter Wemm }
176b8ba871bSPeter Wemm
177b8ba871bSPeter Wemm /* Run the commands. */
178b8ba871bSPeter Wemm if (EXCMD_RUNNING(sp->gp))
179b8ba871bSPeter Wemm (void)ex_cmd(sp);
180b8ba871bSPeter Wemm if (F_ISSET(sp, SC_EXIT | SC_EXIT_FORCE))
181b8ba871bSPeter Wemm return (0);
182b8ba871bSPeter Wemm
183b8ba871bSPeter Wemm if ((p = getenv("NEXINIT")) != NULL) {
184f0957ccaSPeter Wemm CHAR2INT(sp, p, strlen(p) + 1, wp, wlen);
185f0957ccaSPeter Wemm if (ex_run_str(sp, "NEXINIT", wp, wlen - 1, 1, 0))
186b8ba871bSPeter Wemm return (1);
187b8ba871bSPeter Wemm } else if ((p = getenv("EXINIT")) != NULL) {
188f0957ccaSPeter Wemm CHAR2INT(sp, p, strlen(p) + 1, wp, wlen);
189f0957ccaSPeter Wemm if (ex_run_str(sp, "EXINIT", wp, wlen - 1, 1, 0))
190b8ba871bSPeter Wemm return (1);
191b8ba871bSPeter Wemm } else if ((p = getenv("HOME")) != NULL && *p) {
192f0957ccaSPeter Wemm int st = 0;
193f0957ccaSPeter Wemm
194f0957ccaSPeter Wemm if ((path = join(p, _PATH_NEXRC)) == NULL) {
195f0957ccaSPeter Wemm msgq(sp, M_SYSERR, NULL);
196f0957ccaSPeter Wemm return (1);
197f0957ccaSPeter Wemm }
198b8ba871bSPeter Wemm switch (exrc_isok(sp, &hsb, path, 0, 1)) {
199b8ba871bSPeter Wemm case NOEXIST:
200f0957ccaSPeter Wemm free(path);
201f0957ccaSPeter Wemm if ((path = join(p, _PATH_EXRC)) == NULL) {
202f0957ccaSPeter Wemm msgq(sp, M_SYSERR, NULL);
203f0957ccaSPeter Wemm return (1);
204f0957ccaSPeter Wemm }
205b8ba871bSPeter Wemm if (exrc_isok(sp,
206b8ba871bSPeter Wemm &hsb, path, 0, 1) == RCOK && ex_run_file(sp, path))
207f0957ccaSPeter Wemm st = 1;
208b8ba871bSPeter Wemm break;
209b8ba871bSPeter Wemm case NOPERM:
210b8ba871bSPeter Wemm break;
211b8ba871bSPeter Wemm case RCOK:
212b8ba871bSPeter Wemm if (ex_run_file(sp, path))
213f0957ccaSPeter Wemm st = 1;
214b8ba871bSPeter Wemm break;
215b8ba871bSPeter Wemm }
216f0957ccaSPeter Wemm free(path);
217f0957ccaSPeter Wemm if (st)
218f0957ccaSPeter Wemm return st;
219b8ba871bSPeter Wemm }
220b8ba871bSPeter Wemm
221b8ba871bSPeter Wemm /* Run the commands. */
222b8ba871bSPeter Wemm if (EXCMD_RUNNING(sp->gp))
223b8ba871bSPeter Wemm (void)ex_cmd(sp);
224b8ba871bSPeter Wemm if (F_ISSET(sp, SC_EXIT | SC_EXIT_FORCE))
225b8ba871bSPeter Wemm return (0);
226b8ba871bSPeter Wemm
227b8ba871bSPeter Wemm /* Previous commands may have set the exrc option. */
228b8ba871bSPeter Wemm if (O_ISSET(sp, O_EXRC)) {
229b8ba871bSPeter Wemm switch (exrc_isok(sp, &lsb, _PATH_NEXRC, 0, 0)) {
230b8ba871bSPeter Wemm case NOEXIST:
231b8ba871bSPeter Wemm if (exrc_isok(sp, &lsb, _PATH_EXRC, 0, 0) == RCOK &&
232b8ba871bSPeter Wemm (lsb.st_dev != hsb.st_dev ||
233b8ba871bSPeter Wemm lsb.st_ino != hsb.st_ino) &&
234b8ba871bSPeter Wemm ex_run_file(sp, _PATH_EXRC))
235b8ba871bSPeter Wemm return (1);
236b8ba871bSPeter Wemm break;
237b8ba871bSPeter Wemm case NOPERM:
238b8ba871bSPeter Wemm break;
239b8ba871bSPeter Wemm case RCOK:
240b8ba871bSPeter Wemm if ((lsb.st_dev != hsb.st_dev ||
241b8ba871bSPeter Wemm lsb.st_ino != hsb.st_ino) &&
242b8ba871bSPeter Wemm ex_run_file(sp, _PATH_NEXRC))
243b8ba871bSPeter Wemm return (1);
244b8ba871bSPeter Wemm break;
245b8ba871bSPeter Wemm }
246b8ba871bSPeter Wemm /* Run the commands. */
247b8ba871bSPeter Wemm if (EXCMD_RUNNING(sp->gp))
248b8ba871bSPeter Wemm (void)ex_cmd(sp);
249b8ba871bSPeter Wemm if (F_ISSET(sp, SC_EXIT | SC_EXIT_FORCE))
250b8ba871bSPeter Wemm return (0);
251b8ba871bSPeter Wemm }
252b8ba871bSPeter Wemm
253b8ba871bSPeter Wemm return (0);
254b8ba871bSPeter Wemm }
255b8ba871bSPeter Wemm
256b8ba871bSPeter Wemm /*
257b8ba871bSPeter Wemm * ex_run_file --
258b8ba871bSPeter Wemm * Set up a file of ex commands to run.
259b8ba871bSPeter Wemm */
260b8ba871bSPeter Wemm static int
ex_run_file(SCR * sp,char * name)261f0957ccaSPeter Wemm ex_run_file(SCR *sp, char *name)
262b8ba871bSPeter Wemm {
263b8ba871bSPeter Wemm EXCMD cmd;
264f0957ccaSPeter Wemm CHAR_T *wp;
265f0957ccaSPeter Wemm size_t wlen;
266b8ba871bSPeter Wemm
267f0957ccaSPeter Wemm ex_cinit(sp, &cmd, C_SOURCE, 0, OOBLNO, OOBLNO, 0);
268f0957ccaSPeter Wemm CHAR2INT(sp, name, strlen(name)+1, wp, wlen);
269f0957ccaSPeter Wemm argv_exp0(sp, &cmd, wp, wlen - 1);
270b8ba871bSPeter Wemm return (ex_source(sp, &cmd));
271b8ba871bSPeter Wemm }
272b8ba871bSPeter Wemm
273b8ba871bSPeter Wemm /*
274b8ba871bSPeter Wemm * ex_run_str --
275b8ba871bSPeter Wemm * Set up a string of ex commands to run.
276b8ba871bSPeter Wemm *
277c271fa92SBaptiste Daroussin * PUBLIC: int ex_run_str(SCR *, char *, CHAR_T *, size_t, int, int);
278b8ba871bSPeter Wemm */
279b8ba871bSPeter Wemm int
ex_run_str(SCR * sp,char * name,CHAR_T * str,size_t len,int ex_flags,int nocopy)280f0957ccaSPeter Wemm ex_run_str(SCR *sp, char *name, CHAR_T *str, size_t len, int ex_flags, int nocopy)
281b8ba871bSPeter Wemm {
282b8ba871bSPeter Wemm GS *gp;
283b8ba871bSPeter Wemm EXCMD *ecp;
284b8ba871bSPeter Wemm
285b8ba871bSPeter Wemm gp = sp->gp;
286b8ba871bSPeter Wemm if (EXCMD_RUNNING(gp)) {
287*110d525eSBaptiste Daroussin CALLOC_RET(sp, ecp, 1, sizeof(EXCMD));
288f0957ccaSPeter Wemm SLIST_INSERT_HEAD(gp->ecq, ecp, q);
289b8ba871bSPeter Wemm } else
290b8ba871bSPeter Wemm ecp = &gp->excmd;
291b8ba871bSPeter Wemm
292b8ba871bSPeter Wemm F_INIT(ecp,
293b8ba871bSPeter Wemm ex_flags ? E_BLIGNORE | E_NOAUTO | E_NOPRDEF | E_VLITONLY : 0);
294b8ba871bSPeter Wemm
295b8ba871bSPeter Wemm if (nocopy)
296b8ba871bSPeter Wemm ecp->cp = str;
297b8ba871bSPeter Wemm else
298f0957ccaSPeter Wemm if ((ecp->cp = v_wstrdup(sp, str, len)) == NULL)
299b8ba871bSPeter Wemm return (1);
300b8ba871bSPeter Wemm ecp->clen = len;
301b8ba871bSPeter Wemm
302b8ba871bSPeter Wemm if (name == NULL)
303b8ba871bSPeter Wemm ecp->if_name = NULL;
304b8ba871bSPeter Wemm else {
305b8ba871bSPeter Wemm if ((ecp->if_name = v_strdup(sp, name, strlen(name))) == NULL)
306b8ba871bSPeter Wemm return (1);
307b8ba871bSPeter Wemm ecp->if_lno = 1;
308b8ba871bSPeter Wemm F_SET(ecp, E_NAMEDISCARD);
309b8ba871bSPeter Wemm }
310b8ba871bSPeter Wemm
311b8ba871bSPeter Wemm return (0);
312b8ba871bSPeter Wemm }
313b8ba871bSPeter Wemm
314b8ba871bSPeter Wemm /*
315b8ba871bSPeter Wemm * exrc_isok --
316b8ba871bSPeter Wemm * Check a .exrc file for source-ability.
317b8ba871bSPeter Wemm *
318b8ba871bSPeter Wemm * !!!
319b8ba871bSPeter Wemm * Historically, vi read the $HOME and local .exrc files if they were owned
320b8ba871bSPeter Wemm * by the user's real ID, or the "sourceany" option was set, regardless of
321b8ba871bSPeter Wemm * any other considerations. We no longer support the sourceany option as
322b8ba871bSPeter Wemm * it's a security problem of mammoth proportions. We require the system
323b8ba871bSPeter Wemm * .exrc file to be owned by root, the $HOME .exrc file to be owned by the
324b8ba871bSPeter Wemm * user's effective ID (or that the user's effective ID be root) and the
325b8ba871bSPeter Wemm * local .exrc files to be owned by the user's effective ID. In all cases,
326b8ba871bSPeter Wemm * the file cannot be writeable by anyone other than its owner.
327b8ba871bSPeter Wemm *
328b8ba871bSPeter Wemm * In O'Reilly ("Learning the VI Editor", Fifth Ed., May 1992, page 106),
329b8ba871bSPeter Wemm * it notes that System V release 3.2 and later has an option "[no]exrc".
330b8ba871bSPeter Wemm * The behavior is that local .exrc files are read only if the exrc option
331b8ba871bSPeter Wemm * is set. The default for the exrc option was off, so, by default, local
332b8ba871bSPeter Wemm * .exrc files were not read. The problem this was intended to solve was
333b8ba871bSPeter Wemm * that System V permitted users to give away files, so there's no possible
334b8ba871bSPeter Wemm * ownership or writeability test to ensure that the file is safe.
335b8ba871bSPeter Wemm *
336b8ba871bSPeter Wemm * POSIX 1003.2-1992 standardized exrc as an option. It required the exrc
337b8ba871bSPeter Wemm * option to be off by default, thus local .exrc files are not to be read
338b8ba871bSPeter Wemm * by default. The Rationale noted (incorrectly) that this was a change
339b8ba871bSPeter Wemm * to historic practice, but correctly noted that a default of off improves
340b8ba871bSPeter Wemm * system security. POSIX also required that vi check the effective user
341b8ba871bSPeter Wemm * ID instead of the real user ID, which is why we've switched from historic
342b8ba871bSPeter Wemm * practice.
343b8ba871bSPeter Wemm *
344b8ba871bSPeter Wemm * We initialize the exrc variable to off. If it's turned on by the system
345b8ba871bSPeter Wemm * or $HOME .exrc files, and the local .exrc file passes the ownership and
346b8ba871bSPeter Wemm * writeability tests, then we read it. This breaks historic 4BSD practice,
347b8ba871bSPeter Wemm * but it gives us a measure of security on systems where users can give away
348b8ba871bSPeter Wemm * files.
349b8ba871bSPeter Wemm */
350b8ba871bSPeter Wemm static enum rc
exrc_isok(SCR * sp,struct stat * sbp,char * path,int rootown,int rootid)351f0957ccaSPeter Wemm exrc_isok(SCR *sp, struct stat *sbp, char *path, int rootown, int rootid)
352b8ba871bSPeter Wemm {
353b8ba871bSPeter Wemm enum { ROOTOWN, OWN, WRITER } etype;
354b8ba871bSPeter Wemm uid_t euid;
355b8ba871bSPeter Wemm int nf1, nf2;
356f0957ccaSPeter Wemm char *a, *b, *buf;
357b8ba871bSPeter Wemm
358b8ba871bSPeter Wemm /* Check for the file's existence. */
359b8ba871bSPeter Wemm if (stat(path, sbp))
360b8ba871bSPeter Wemm return (NOEXIST);
361b8ba871bSPeter Wemm
362b8ba871bSPeter Wemm /* Check ownership permissions. */
363b8ba871bSPeter Wemm euid = geteuid();
364b8ba871bSPeter Wemm if (!(rootown && sbp->st_uid == 0) &&
365b8ba871bSPeter Wemm !(rootid && euid == 0) && sbp->st_uid != euid) {
366b8ba871bSPeter Wemm etype = rootown ? ROOTOWN : OWN;
367b8ba871bSPeter Wemm goto denied;
368b8ba871bSPeter Wemm }
369b8ba871bSPeter Wemm
370b8ba871bSPeter Wemm /* Check writeability. */
371b8ba871bSPeter Wemm if (sbp->st_mode & (S_IWGRP | S_IWOTH)) {
372b8ba871bSPeter Wemm etype = WRITER;
373b8ba871bSPeter Wemm goto denied;
374b8ba871bSPeter Wemm }
375b8ba871bSPeter Wemm return (RCOK);
376b8ba871bSPeter Wemm
377b8ba871bSPeter Wemm denied: a = msg_print(sp, path, &nf1);
378f0957ccaSPeter Wemm if (strchr(path, '/') == NULL && (buf = getcwd(NULL, 0)) != NULL) {
379f0957ccaSPeter Wemm char *p;
380f0957ccaSPeter Wemm
381b8ba871bSPeter Wemm b = msg_print(sp, buf, &nf2);
382f0957ccaSPeter Wemm if ((p = join(b, a)) == NULL) {
383f0957ccaSPeter Wemm msgq(sp, M_SYSERR, NULL);
384f0957ccaSPeter Wemm goto err;
385f0957ccaSPeter Wemm }
386b8ba871bSPeter Wemm switch (etype) {
387b8ba871bSPeter Wemm case ROOTOWN:
388b8ba871bSPeter Wemm msgq(sp, M_ERR,
389f0957ccaSPeter Wemm "128|%s: not sourced: not owned by you or root", p);
390b8ba871bSPeter Wemm break;
391b8ba871bSPeter Wemm case OWN:
392b8ba871bSPeter Wemm msgq(sp, M_ERR,
393f0957ccaSPeter Wemm "129|%s: not sourced: not owned by you", p);
394b8ba871bSPeter Wemm break;
395b8ba871bSPeter Wemm case WRITER:
396b8ba871bSPeter Wemm msgq(sp, M_ERR,
397f0957ccaSPeter Wemm "130|%s: not sourced: writeable by a user other than the owner", p);
398b8ba871bSPeter Wemm break;
399b8ba871bSPeter Wemm }
400f0957ccaSPeter Wemm free(p);
401f0957ccaSPeter Wemm err: free(buf);
402b8ba871bSPeter Wemm if (nf2)
403b8ba871bSPeter Wemm FREE_SPACE(sp, b, 0);
404b8ba871bSPeter Wemm } else
405b8ba871bSPeter Wemm switch (etype) {
406b8ba871bSPeter Wemm case ROOTOWN:
407b8ba871bSPeter Wemm msgq(sp, M_ERR,
408b8ba871bSPeter Wemm "128|%s: not sourced: not owned by you or root", a);
409b8ba871bSPeter Wemm break;
410b8ba871bSPeter Wemm case OWN:
411b8ba871bSPeter Wemm msgq(sp, M_ERR,
412b8ba871bSPeter Wemm "129|%s: not sourced: not owned by you", a);
413b8ba871bSPeter Wemm break;
414b8ba871bSPeter Wemm case WRITER:
415b8ba871bSPeter Wemm msgq(sp, M_ERR,
416b8ba871bSPeter Wemm "130|%s: not sourced: writeable by a user other than the owner", a);
417b8ba871bSPeter Wemm break;
418b8ba871bSPeter Wemm }
419b8ba871bSPeter Wemm
420b8ba871bSPeter Wemm if (nf1)
421b8ba871bSPeter Wemm FREE_SPACE(sp, a, 0);
422b8ba871bSPeter Wemm return (NOPERM);
423b8ba871bSPeter Wemm }
424