xref: /freebsd/sbin/init/init.c (revision fbbd9655e5107c68e4e0146ff22b73d7350475bc)
18fae3551SRodney W. Grimes /*-
28fae3551SRodney W. Grimes  * Copyright (c) 1991, 1993
38fae3551SRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
48fae3551SRodney W. Grimes  *
58fae3551SRodney W. Grimes  * This code is derived from software contributed to Berkeley by
68fae3551SRodney W. Grimes  * Donn Seeley at Berkeley Software Design, Inc.
78fae3551SRodney W. Grimes  *
88fae3551SRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
98fae3551SRodney W. Grimes  * modification, are permitted provided that the following conditions
108fae3551SRodney W. Grimes  * are met:
118fae3551SRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
128fae3551SRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
138fae3551SRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
148fae3551SRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
158fae3551SRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
16*fbbd9655SWarner Losh  * 3. Neither the name of the University nor the names of its contributors
178fae3551SRodney W. Grimes  *    may be used to endorse or promote products derived from this software
188fae3551SRodney W. Grimes  *    without specific prior written permission.
198fae3551SRodney W. Grimes  *
208fae3551SRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
218fae3551SRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
228fae3551SRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
238fae3551SRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
248fae3551SRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
258fae3551SRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
268fae3551SRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
278fae3551SRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
288fae3551SRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
298fae3551SRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
308fae3551SRodney W. Grimes  * SUCH DAMAGE.
318fae3551SRodney W. Grimes  */
328fae3551SRodney W. Grimes 
338fae3551SRodney W. Grimes #ifndef lint
345df42cf4SPhilippe Charnier static const char copyright[] =
358fae3551SRodney W. Grimes "@(#) Copyright (c) 1991, 1993\n\
368fae3551SRodney W. Grimes 	The Regents of the University of California.  All rights reserved.\n";
378fae3551SRodney W. Grimes #endif /* not lint */
388fae3551SRodney W. Grimes 
398fae3551SRodney W. Grimes #ifndef lint
405df42cf4SPhilippe Charnier #if 0
418fae3551SRodney W. Grimes static char sccsid[] = "@(#)init.c	8.1 (Berkeley) 7/15/93";
425df42cf4SPhilippe Charnier #endif
435df42cf4SPhilippe Charnier static const char rcsid[] =
447f3dea24SPeter Wemm   "$FreeBSD$";
458fae3551SRodney W. Grimes #endif /* not lint */
468fae3551SRodney W. Grimes 
478fae3551SRodney W. Grimes #include <sys/param.h>
488889c700SDavid Nugent #include <sys/ioctl.h>
493f5ac575SEdward Tomasz Napierala #include <sys/mman.h>
5057622f22SPoul-Henning Kamp #include <sys/mount.h>
518fae3551SRodney W. Grimes #include <sys/sysctl.h>
528fae3551SRodney W. Grimes #include <sys/wait.h>
5386bf62dcSDavid Nugent #include <sys/stat.h>
541f083b1eSMaxime Henrion #include <sys/uio.h>
558fae3551SRodney W. Grimes 
568fae3551SRodney W. Grimes #include <db.h>
578fae3551SRodney W. Grimes #include <errno.h>
588fae3551SRodney W. Grimes #include <fcntl.h>
591a7bec91SWarner Losh #include <kenv.h>
60423b6a39SAndrey A. Chernov #include <libutil.h>
611a37aa56SDavid E. O'Brien #include <paths.h>
628fae3551SRodney W. Grimes #include <signal.h>
638fae3551SRodney W. Grimes #include <stdio.h>
648fae3551SRodney W. Grimes #include <stdlib.h>
658fae3551SRodney W. Grimes #include <string.h>
668fae3551SRodney W. Grimes #include <syslog.h>
678fae3551SRodney W. Grimes #include <time.h>
688fae3551SRodney W. Grimes #include <ttyent.h>
698fae3551SRodney W. Grimes #include <unistd.h>
70e460cfd3SNate Williams #include <sys/reboot.h>
71c5842835SPhilippe Charnier #include <err.h>
728fae3551SRodney W. Grimes 
738fae3551SRodney W. Grimes #include <stdarg.h>
748fae3551SRodney W. Grimes 
758fae3551SRodney W. Grimes #ifdef SECURE
768fae3551SRodney W. Grimes #include <pwd.h>
778fae3551SRodney W. Grimes #endif
788fae3551SRodney W. Grimes 
791ef60eb1SDavid Nugent #ifdef LOGIN_CAP
801ef60eb1SDavid Nugent #include <login_cap.h>
811ef60eb1SDavid Nugent #endif
821ef60eb1SDavid Nugent 
833f5ac575SEdward Tomasz Napierala #include "mntopts.h"
848fae3551SRodney W. Grimes #include "pathnames.h"
858fae3551SRodney W. Grimes 
868fae3551SRodney W. Grimes /*
878fae3551SRodney W. Grimes  * Sleep times; used to prevent thrashing.
888fae3551SRodney W. Grimes  */
898fae3551SRodney W. Grimes #define	GETTY_SPACING		 5	/* N secs minimum getty spacing */
908fae3551SRodney W. Grimes #define	GETTY_SLEEP		30	/* sleep N secs after spacing problem */
91b5df27e2SAndrey A. Chernov #define	GETTY_NSPACE		 3	/* max. spacing count to bring reaction */
928fae3551SRodney W. Grimes #define	WINDOW_WAIT		 3	/* wait N secs after starting window */
938fae3551SRodney W. Grimes #define	STALL_TIMEOUT		30	/* wait N secs after warning */
948fae3551SRodney W. Grimes #define	DEATH_WATCH		10	/* wait N secs for procs to die */
955df42cf4SPhilippe Charnier #define	DEATH_SCRIPT		120	/* wait for 2min for /etc/rc.shutdown */
96e82d5545SDavid Nugent #define	RESOURCE_RC		"daemon"
97e82d5545SDavid Nugent #define	RESOURCE_WINDOW		"default"
98e82d5545SDavid Nugent #define	RESOURCE_GETTY		"default"
998fae3551SRodney W. Grimes 
10045cfb1dcSXin LI static void handle(sig_t, ...);
10145cfb1dcSXin LI static void delset(sigset_t *, ...);
1028fae3551SRodney W. Grimes 
10345cfb1dcSXin LI static void stall(const char *, ...) __printflike(1, 2);
10445cfb1dcSXin LI static void warning(const char *, ...) __printflike(1, 2);
10545cfb1dcSXin LI static void emergency(const char *, ...) __printflike(1, 2);
10645cfb1dcSXin LI static void disaster(int);
10745cfb1dcSXin LI static void badsys(int);
1083f5ac575SEdward Tomasz Napierala static void revoke_ttys(void);
10945cfb1dcSXin LI static int  runshutdown(void);
110ab03e6d5SXin LI static char *strk(char *);
1118fae3551SRodney W. Grimes 
1128fae3551SRodney W. Grimes /*
1138fae3551SRodney W. Grimes  * We really need a recursive typedef...
1148fae3551SRodney W. Grimes  * The following at least guarantees that the return type of (*state_t)()
1158fae3551SRodney W. Grimes  * is sufficiently wide to hold a function pointer.
1168fae3551SRodney W. Grimes  */
11773bf18edSWarner Losh typedef long (*state_func_t)(void);
11873bf18edSWarner Losh typedef state_func_t (*state_t)(void);
1198fae3551SRodney W. Grimes 
12045cfb1dcSXin LI static state_func_t single_user(void);
12145cfb1dcSXin LI static state_func_t runcom(void);
12245cfb1dcSXin LI static state_func_t read_ttys(void);
12345cfb1dcSXin LI static state_func_t multi_user(void);
12445cfb1dcSXin LI static state_func_t clean_ttys(void);
12545cfb1dcSXin LI static state_func_t catatonia(void);
12645cfb1dcSXin LI static state_func_t death(void);
127acf0ab06SJilles Tjoelker static state_func_t death_single(void);
1283f5ac575SEdward Tomasz Napierala static state_func_t reroot(void);
1293f5ac575SEdward Tomasz Napierala static state_func_t reroot_phase_two(void);
1308fae3551SRodney W. Grimes 
13145cfb1dcSXin LI static state_func_t run_script(const char *);
1321a7bec91SWarner Losh 
1331efe3c6bSEd Schouten static enum { AUTOBOOT, FASTBOOT } runcom_mode = AUTOBOOT;
13477103ea3SPoul-Henning Kamp #define FALSE	0
13577103ea3SPoul-Henning Kamp #define TRUE	1
13677103ea3SPoul-Henning Kamp 
1371efe3c6bSEd Schouten static int Reboot = FALSE;
1381efe3c6bSEd Schouten static int howto = RB_AUTOBOOT;
1398fae3551SRodney W. Grimes 
1401efe3c6bSEd Schouten static int devfs;
141377b6d1eSEdward Tomasz Napierala static char *init_path_argv0;
14257622f22SPoul-Henning Kamp 
14345cfb1dcSXin LI static void transition(state_t);
14445cfb1dcSXin LI static state_t requested_transition;
145acf0ab06SJilles Tjoelker static state_t current_state = death_single;
1468fae3551SRodney W. Grimes 
1474c2c7b2cSEd Schouten static void open_console(void);
14845cfb1dcSXin LI static const char *get_shell(void);
14945cfb1dcSXin LI static void write_stderr(const char *message);
1508fae3551SRodney W. Grimes 
1518fae3551SRodney W. Grimes typedef struct init_session {
1528fae3551SRodney W. Grimes 	pid_t	se_process;		/* controlling process */
1538fae3551SRodney W. Grimes 	time_t	se_started;		/* used to avoid thrashing */
1548fae3551SRodney W. Grimes 	int	se_flags;		/* status of session */
1558fae3551SRodney W. Grimes #define	SE_SHUTDOWN	0x1		/* session won't be restarted */
156b0b670eeSAlfred Perlstein #define	SE_PRESENT	0x2		/* session is in /etc/ttys */
157b5df27e2SAndrey A. Chernov 	int	se_nspace;		/* spacing count */
1588fae3551SRodney W. Grimes 	char	*se_device;		/* filename of port */
1598fae3551SRodney W. Grimes 	char	*se_getty;		/* what to run on that port */
160b5df27e2SAndrey A. Chernov 	char	*se_getty_argv_space;   /* pre-parsed argument array space */
1618fae3551SRodney W. Grimes 	char	**se_getty_argv;	/* pre-parsed argument array */
1628fae3551SRodney W. Grimes 	char	*se_window;		/* window system (started only once) */
163b5df27e2SAndrey A. Chernov 	char	*se_window_argv_space;  /* pre-parsed argument array space */
1648fae3551SRodney W. Grimes 	char	**se_window_argv;	/* pre-parsed argument array */
165b5df27e2SAndrey A. Chernov 	char	*se_type;		/* default terminal type */
1668fae3551SRodney W. Grimes 	struct	init_session *se_prev;
1678fae3551SRodney W. Grimes 	struct	init_session *se_next;
1688fae3551SRodney W. Grimes } session_t;
1698fae3551SRodney W. Grimes 
17045cfb1dcSXin LI static void free_session(session_t *);
1710b57dd6bSJilles Tjoelker static session_t *new_session(session_t *, struct ttyent *);
17245cfb1dcSXin LI static session_t *sessions;
1738fae3551SRodney W. Grimes 
17445cfb1dcSXin LI static char **construct_argv(char *);
17545cfb1dcSXin LI static void start_window_system(session_t *);
17645cfb1dcSXin LI static void collect_child(pid_t);
17745cfb1dcSXin LI static pid_t start_getty(session_t *);
17845cfb1dcSXin LI static void transition_handler(int);
17945cfb1dcSXin LI static void alrm_handler(int);
18045cfb1dcSXin LI static void setsecuritylevel(int);
18145cfb1dcSXin LI static int getsecuritylevel(void);
18245cfb1dcSXin LI static int setupargv(session_t *, struct ttyent *);
183e82d5545SDavid Nugent #ifdef LOGIN_CAP
18445cfb1dcSXin LI static void setprocresources(const char *);
185e82d5545SDavid Nugent #endif
18645cfb1dcSXin LI static int clang;
1878fae3551SRodney W. Grimes 
18845cfb1dcSXin LI static int start_session_db(void);
18945cfb1dcSXin LI static void add_session(session_t *);
19045cfb1dcSXin LI static void del_session(session_t *);
19145cfb1dcSXin LI static session_t *find_session(pid_t);
19245cfb1dcSXin LI static DB *session_db;
1938fae3551SRodney W. Grimes 
1948fae3551SRodney W. Grimes /*
1958fae3551SRodney W. Grimes  * The mother of all processes.
1968fae3551SRodney W. Grimes  */
1978fae3551SRodney W. Grimes int
19873bf18edSWarner Losh main(int argc, char *argv[])
1998fae3551SRodney W. Grimes {
2001a7bec91SWarner Losh 	state_t initial_transition = runcom;
2011a7bec91SWarner Losh 	char kenv_value[PATH_MAX];
2023f5ac575SEdward Tomasz Napierala 	int c, error;
2038fae3551SRodney W. Grimes 	struct sigaction sa;
2048fae3551SRodney W. Grimes 	sigset_t mask;
2058fae3551SRodney W. Grimes 
2068fae3551SRodney W. Grimes 	/* Dispose of random users. */
207c5842835SPhilippe Charnier 	if (getuid() != 0)
208c5842835SPhilippe Charnier 		errx(1, "%s", strerror(EPERM));
2098fae3551SRodney W. Grimes 
2108fae3551SRodney W. Grimes 	/* System V users like to reexec init. */
2111681d659SRuslan Ermilov 	if (getpid() != 1) {
2121681d659SRuslan Ermilov #ifdef COMPAT_SYSV_INIT
2131681d659SRuslan Ermilov 		/* So give them what they want */
2141681d659SRuslan Ermilov 		if (argc > 1) {
2151681d659SRuslan Ermilov 			if (strlen(argv[1]) == 1) {
2163d438ad6SDavid E. O'Brien 				char runlevel = *argv[1];
2173d438ad6SDavid E. O'Brien 				int sig;
2188fae3551SRodney W. Grimes 
2191681d659SRuslan Ermilov 				switch (runlevel) {
2201681d659SRuslan Ermilov 				case '0': /* halt + poweroff */
2211681d659SRuslan Ermilov 					sig = SIGUSR2;
2221681d659SRuslan Ermilov 					break;
2231681d659SRuslan Ermilov 				case '1': /* single-user */
2241681d659SRuslan Ermilov 					sig = SIGTERM;
2251681d659SRuslan Ermilov 					break;
2261681d659SRuslan Ermilov 				case '6': /* reboot */
2271681d659SRuslan Ermilov 					sig = SIGINT;
2281681d659SRuslan Ermilov 					break;
2291681d659SRuslan Ermilov 				case 'c': /* block further logins */
2301681d659SRuslan Ermilov 					sig = SIGTSTP;
2311681d659SRuslan Ermilov 					break;
2321681d659SRuslan Ermilov 				case 'q': /* rescan /etc/ttys */
2331681d659SRuslan Ermilov 					sig = SIGHUP;
2341681d659SRuslan Ermilov 					break;
2353f5ac575SEdward Tomasz Napierala 				case 'r': /* remount root */
2363f5ac575SEdward Tomasz Napierala 					sig = SIGEMT;
2373f5ac575SEdward Tomasz Napierala 					break;
2381681d659SRuslan Ermilov 				default:
2391681d659SRuslan Ermilov 					goto invalid;
2401681d659SRuslan Ermilov 				}
2411681d659SRuslan Ermilov 				kill(1, sig);
2421681d659SRuslan Ermilov 				_exit(0);
2431681d659SRuslan Ermilov 			} else
2441681d659SRuslan Ermilov invalid:
2451681d659SRuslan Ermilov 				errx(1, "invalid run-level ``%s''", argv[1]);
2461681d659SRuslan Ermilov 		} else
2471681d659SRuslan Ermilov #endif
2481681d659SRuslan Ermilov 			errx(1, "already running");
2491681d659SRuslan Ermilov 	}
250377b6d1eSEdward Tomasz Napierala 
251377b6d1eSEdward Tomasz Napierala 	init_path_argv0 = strdup(argv[0]);
252377b6d1eSEdward Tomasz Napierala 	if (init_path_argv0 == NULL)
253377b6d1eSEdward Tomasz Napierala 		err(1, "strdup");
254377b6d1eSEdward Tomasz Napierala 
2558fae3551SRodney W. Grimes 	/*
2568fae3551SRodney W. Grimes 	 * Note that this does NOT open a file...
2578fae3551SRodney W. Grimes 	 * Does 'init' deserve its own facility number?
2588fae3551SRodney W. Grimes 	 */
25906224a94SNeel Natu 	openlog("init", LOG_CONS, LOG_AUTH);
2608fae3551SRodney W. Grimes 
2618fae3551SRodney W. Grimes 	/*
2628fae3551SRodney W. Grimes 	 * Create an initial session.
2638fae3551SRodney W. Grimes 	 */
2643f5ac575SEdward Tomasz Napierala 	if (setsid() < 0 && (errno != EPERM || getsid(0) != 1))
2658fae3551SRodney W. Grimes 		warning("initial setsid() failed: %m");
2668fae3551SRodney W. Grimes 
2678fae3551SRodney W. Grimes 	/*
2688fae3551SRodney W. Grimes 	 * Establish an initial user so that programs running
2698fae3551SRodney W. Grimes 	 * single user do not freak out and die (like passwd).
2708fae3551SRodney W. Grimes 	 */
2718fae3551SRodney W. Grimes 	if (setlogin("root") < 0)
2728fae3551SRodney W. Grimes 		warning("setlogin() failed: %m");
2738fae3551SRodney W. Grimes 
2748fae3551SRodney W. Grimes 	/*
2758fae3551SRodney W. Grimes 	 * This code assumes that we always get arguments through flags,
2768fae3551SRodney W. Grimes 	 * never through bits set in some random machine register.
2778fae3551SRodney W. Grimes 	 */
2783f5ac575SEdward Tomasz Napierala 	while ((c = getopt(argc, argv, "dsfr")) != -1)
2798fae3551SRodney W. Grimes 		switch (c) {
28057622f22SPoul-Henning Kamp 		case 'd':
28157622f22SPoul-Henning Kamp 			devfs = 1;
28257622f22SPoul-Henning Kamp 			break;
2838fae3551SRodney W. Grimes 		case 's':
2841a7bec91SWarner Losh 			initial_transition = single_user;
2858fae3551SRodney W. Grimes 			break;
2868fae3551SRodney W. Grimes 		case 'f':
2878fae3551SRodney W. Grimes 			runcom_mode = FASTBOOT;
2888fae3551SRodney W. Grimes 			break;
2893f5ac575SEdward Tomasz Napierala 		case 'r':
2903f5ac575SEdward Tomasz Napierala 			initial_transition = reroot_phase_two;
2913f5ac575SEdward Tomasz Napierala 			break;
2928fae3551SRodney W. Grimes 		default:
2938fae3551SRodney W. Grimes 			warning("unrecognized flag '-%c'", c);
2948fae3551SRodney W. Grimes 			break;
2958fae3551SRodney W. Grimes 		}
2968fae3551SRodney W. Grimes 
2978fae3551SRodney W. Grimes 	if (optind != argc)
2988fae3551SRodney W. Grimes 		warning("ignoring excess arguments");
2998fae3551SRodney W. Grimes 
3001a7bec91SWarner Losh 	/*
3011a7bec91SWarner Losh 	 * We catch or block signals rather than ignore them,
3021a7bec91SWarner Losh 	 * so that they get reset on exec.
3031a7bec91SWarner Losh 	 */
3041a7bec91SWarner Losh 	handle(badsys, SIGSYS, 0);
305091abe40SDavid E. O'Brien 	handle(disaster, SIGABRT, SIGFPE, SIGILL, SIGSEGV, SIGBUS, SIGXCPU,
306091abe40SDavid E. O'Brien 	    SIGXFSZ, 0);
3073f5ac575SEdward Tomasz Napierala 	handle(transition_handler, SIGHUP, SIGINT, SIGEMT, SIGTERM, SIGTSTP,
3083f5ac575SEdward Tomasz Napierala 	    SIGUSR1, SIGUSR2, 0);
3091a7bec91SWarner Losh 	handle(alrm_handler, SIGALRM, 0);
3101a7bec91SWarner Losh 	sigfillset(&mask);
3111a7bec91SWarner Losh 	delset(&mask, SIGABRT, SIGFPE, SIGILL, SIGSEGV, SIGBUS, SIGSYS,
3123f5ac575SEdward Tomasz Napierala 	    SIGXCPU, SIGXFSZ, SIGHUP, SIGINT, SIGEMT, SIGTERM, SIGTSTP,
3133f5ac575SEdward Tomasz Napierala 	    SIGALRM, SIGUSR1, SIGUSR2, 0);
3141a7bec91SWarner Losh 	sigprocmask(SIG_SETMASK, &mask, (sigset_t *) 0);
3151a7bec91SWarner Losh 	sigemptyset(&sa.sa_mask);
3161a7bec91SWarner Losh 	sa.sa_flags = 0;
3171a7bec91SWarner Losh 	sa.sa_handler = SIG_IGN;
318091abe40SDavid E. O'Brien 	sigaction(SIGTTIN, &sa, (struct sigaction *)0);
319091abe40SDavid E. O'Brien 	sigaction(SIGTTOU, &sa, (struct sigaction *)0);
3201a7bec91SWarner Losh 
3211a7bec91SWarner Losh 	/*
3221a7bec91SWarner Losh 	 * Paranoia.
3231a7bec91SWarner Losh 	 */
3241a7bec91SWarner Losh 	close(0);
3251a7bec91SWarner Losh 	close(1);
3261a7bec91SWarner Losh 	close(2);
3271a7bec91SWarner Losh 
3281a7bec91SWarner Losh 	if (kenv(KENV_GET, "init_script", kenv_value, sizeof(kenv_value)) > 0) {
3291a7bec91SWarner Losh 		state_func_t next_transition;
3301a7bec91SWarner Losh 
3312ef6931aSMarcelo Araujo 		if ((next_transition = run_script(kenv_value)) != NULL)
3321a7bec91SWarner Losh 			initial_transition = (state_t) next_transition;
3331a7bec91SWarner Losh 	}
3341a7bec91SWarner Losh 
3351a7bec91SWarner Losh 	if (kenv(KENV_GET, "init_chroot", kenv_value, sizeof(kenv_value)) > 0) {
3361a7bec91SWarner Losh 		if (chdir(kenv_value) != 0 || chroot(".") != 0)
3371a7bec91SWarner Losh 			warning("Can't chroot to %s: %m", kenv_value);
3381a7bec91SWarner Losh 	}
3391a7bec91SWarner Losh 
3401a7bec91SWarner Losh 	/*
3411a7bec91SWarner Losh 	 * Additional check if devfs needs to be mounted:
3421a7bec91SWarner Losh 	 * If "/" and "/dev" have the same device number,
3431a7bec91SWarner Losh 	 * then it hasn't been mounted yet.
3441a7bec91SWarner Losh 	 */
3451a7bec91SWarner Losh 	if (!devfs) {
3461a7bec91SWarner Losh 		struct stat stst;
3471a7bec91SWarner Losh 		dev_t root_devno;
3481a7bec91SWarner Losh 
3491a7bec91SWarner Losh 		stat("/", &stst);
3501a7bec91SWarner Losh 		root_devno = stst.st_dev;
3511a7bec91SWarner Losh 		if (stat("/dev", &stst) != 0)
3521a7bec91SWarner Losh 			warning("Can't stat /dev: %m");
3531a7bec91SWarner Losh 		else if (stst.st_dev == root_devno)
3541a7bec91SWarner Losh 			devfs++;
3551a7bec91SWarner Losh 	}
3561a7bec91SWarner Losh 
35757622f22SPoul-Henning Kamp 	if (devfs) {
3581f083b1eSMaxime Henrion 		struct iovec iov[4];
359421b0201SPoul-Henning Kamp 		char *s;
360421b0201SPoul-Henning Kamp 		int i;
361421b0201SPoul-Henning Kamp 
362ab03e6d5SXin LI 		char _fstype[]	= "fstype";
363ab03e6d5SXin LI 		char _devfs[]	= "devfs";
364ab03e6d5SXin LI 		char _fspath[]	= "fspath";
365ab03e6d5SXin LI 		char _path_dev[]= _PATH_DEV;
366ab03e6d5SXin LI 
367ab03e6d5SXin LI 		iov[0].iov_base = _fstype;
368ab03e6d5SXin LI 		iov[0].iov_len = sizeof(_fstype);
369ab03e6d5SXin LI 		iov[1].iov_base = _devfs;
370ab03e6d5SXin LI 		iov[1].iov_len = sizeof(_devfs);
371ab03e6d5SXin LI 		iov[2].iov_base = _fspath;
372ab03e6d5SXin LI 		iov[2].iov_len = sizeof(_fspath);
373421b0201SPoul-Henning Kamp 		/*
374421b0201SPoul-Henning Kamp 		 * Try to avoid the trailing slash in _PATH_DEV.
375421b0201SPoul-Henning Kamp 		 * Be *very* defensive.
376421b0201SPoul-Henning Kamp 		 */
377421b0201SPoul-Henning Kamp 		s = strdup(_PATH_DEV);
378421b0201SPoul-Henning Kamp 		if (s != NULL) {
379421b0201SPoul-Henning Kamp 			i = strlen(s);
380421b0201SPoul-Henning Kamp 			if (i > 0 && s[i - 1] == '/')
381421b0201SPoul-Henning Kamp 				s[i - 1] = '\0';
3821f083b1eSMaxime Henrion 			iov[3].iov_base = s;
3831f083b1eSMaxime Henrion 			iov[3].iov_len = strlen(s) + 1;
384421b0201SPoul-Henning Kamp 		} else {
385ab03e6d5SXin LI 			iov[3].iov_base = _path_dev;
386ab03e6d5SXin LI 			iov[3].iov_len = sizeof(_path_dev);
38757622f22SPoul-Henning Kamp 		}
3881f083b1eSMaxime Henrion 		nmount(iov, 4, 0);
3891f083b1eSMaxime Henrion 		if (s != NULL)
3901f083b1eSMaxime Henrion 			free(s);
391421b0201SPoul-Henning Kamp 	}
39257622f22SPoul-Henning Kamp 
3933f5ac575SEdward Tomasz Napierala 	if (initial_transition != reroot_phase_two) {
3943f5ac575SEdward Tomasz Napierala 		/*
3953f5ac575SEdward Tomasz Napierala 		 * Unmount reroot leftovers.  This runs after init(8)
3963f5ac575SEdward Tomasz Napierala 		 * gets reexecuted after reroot_phase_two() is done.
3973f5ac575SEdward Tomasz Napierala 		 */
3983f5ac575SEdward Tomasz Napierala 		error = unmount(_PATH_REROOT, MNT_FORCE);
3993f5ac575SEdward Tomasz Napierala 		if (error != 0 && errno != EINVAL)
4003f5ac575SEdward Tomasz Napierala 			warning("Cannot unmount %s: %m", _PATH_REROOT);
4013f5ac575SEdward Tomasz Napierala 	}
4023f5ac575SEdward Tomasz Napierala 
4038fae3551SRodney W. Grimes 	/*
4048fae3551SRodney W. Grimes 	 * Start the state machine.
4058fae3551SRodney W. Grimes 	 */
4061a7bec91SWarner Losh 	transition(initial_transition);
4078fae3551SRodney W. Grimes 
4088fae3551SRodney W. Grimes 	/*
4098fae3551SRodney W. Grimes 	 * Should never reach here.
4108fae3551SRodney W. Grimes 	 */
4118fae3551SRodney W. Grimes 	return 1;
4128fae3551SRodney W. Grimes }
4138fae3551SRodney W. Grimes 
4148fae3551SRodney W. Grimes /*
4158fae3551SRodney W. Grimes  * Associate a function with a signal handler.
4168fae3551SRodney W. Grimes  */
41745cfb1dcSXin LI static void
4188fae3551SRodney W. Grimes handle(sig_t handler, ...)
4198fae3551SRodney W. Grimes {
4208fae3551SRodney W. Grimes 	int sig;
4218fae3551SRodney W. Grimes 	struct sigaction sa;
42239034633SJames Raynard 	sigset_t mask_everything;
4238fae3551SRodney W. Grimes 	va_list ap;
4248fae3551SRodney W. Grimes 	va_start(ap, handler);
4258fae3551SRodney W. Grimes 
4268fae3551SRodney W. Grimes 	sa.sa_handler = handler;
4278fae3551SRodney W. Grimes 	sigfillset(&mask_everything);
4288fae3551SRodney W. Grimes 
42930e8350cSBruce Evans 	while ((sig = va_arg(ap, int)) != 0) {
4308fae3551SRodney W. Grimes 		sa.sa_mask = mask_everything;
4318fae3551SRodney W. Grimes 		/* XXX SA_RESTART? */
4328fae3551SRodney W. Grimes 		sa.sa_flags = sig == SIGCHLD ? SA_NOCLDSTOP : 0;
4338fae3551SRodney W. Grimes 		sigaction(sig, &sa, (struct sigaction *) 0);
4348fae3551SRodney W. Grimes 	}
4358fae3551SRodney W. Grimes 	va_end(ap);
4368fae3551SRodney W. Grimes }
4378fae3551SRodney W. Grimes 
4388fae3551SRodney W. Grimes /*
4398fae3551SRodney W. Grimes  * Delete a set of signals from a mask.
4408fae3551SRodney W. Grimes  */
44145cfb1dcSXin LI static void
4428fae3551SRodney W. Grimes delset(sigset_t *maskp, ...)
4438fae3551SRodney W. Grimes {
4448fae3551SRodney W. Grimes 	int sig;
4458fae3551SRodney W. Grimes 	va_list ap;
4468fae3551SRodney W. Grimes 	va_start(ap, maskp);
4478fae3551SRodney W. Grimes 
44830e8350cSBruce Evans 	while ((sig = va_arg(ap, int)) != 0)
4498fae3551SRodney W. Grimes 		sigdelset(maskp, sig);
4508fae3551SRodney W. Grimes 	va_end(ap);
4518fae3551SRodney W. Grimes }
4528fae3551SRodney W. Grimes 
4538fae3551SRodney W. Grimes /*
4548fae3551SRodney W. Grimes  * Log a message and sleep for a while (to give someone an opportunity
4558fae3551SRodney W. Grimes  * to read it and to save log or hardcopy output if the problem is chronic).
4568fae3551SRodney W. Grimes  * NB: should send a message to the session logger to avoid blocking.
4578fae3551SRodney W. Grimes  */
45845cfb1dcSXin LI static void
4595979df34SKris Kennaway stall(const char *message, ...)
4608fae3551SRodney W. Grimes {
4618fae3551SRodney W. Grimes 	va_list ap;
4628fae3551SRodney W. Grimes 	va_start(ap, message);
4638fae3551SRodney W. Grimes 
4648fae3551SRodney W. Grimes 	vsyslog(LOG_ALERT, message, ap);
4658fae3551SRodney W. Grimes 	va_end(ap);
4668fae3551SRodney W. Grimes 	sleep(STALL_TIMEOUT);
4678fae3551SRodney W. Grimes }
4688fae3551SRodney W. Grimes 
4698fae3551SRodney W. Grimes /*
4708fae3551SRodney W. Grimes  * Like stall(), but doesn't sleep.
4718fae3551SRodney W. Grimes  * If cpp had variadic macros, the two functions could be #defines for another.
4728fae3551SRodney W. Grimes  * NB: should send a message to the session logger to avoid blocking.
4738fae3551SRodney W. Grimes  */
47445cfb1dcSXin LI static void
4755979df34SKris Kennaway warning(const char *message, ...)
4768fae3551SRodney W. Grimes {
4778fae3551SRodney W. Grimes 	va_list ap;
4788fae3551SRodney W. Grimes 	va_start(ap, message);
4798fae3551SRodney W. Grimes 
4808fae3551SRodney W. Grimes 	vsyslog(LOG_ALERT, message, ap);
4818fae3551SRodney W. Grimes 	va_end(ap);
4828fae3551SRodney W. Grimes }
4838fae3551SRodney W. Grimes 
4848fae3551SRodney W. Grimes /*
4858fae3551SRodney W. Grimes  * Log an emergency message.
4868fae3551SRodney W. Grimes  * NB: should send a message to the session logger to avoid blocking.
4878fae3551SRodney W. Grimes  */
48845cfb1dcSXin LI static void
4895979df34SKris Kennaway emergency(const char *message, ...)
4908fae3551SRodney W. Grimes {
4918fae3551SRodney W. Grimes 	va_list ap;
4928fae3551SRodney W. Grimes 	va_start(ap, message);
4938fae3551SRodney W. Grimes 
4948fae3551SRodney W. Grimes 	vsyslog(LOG_EMERG, message, ap);
4958fae3551SRodney W. Grimes 	va_end(ap);
4968fae3551SRodney W. Grimes }
4978fae3551SRodney W. Grimes 
4988fae3551SRodney W. Grimes /*
4998fae3551SRodney W. Grimes  * Catch a SIGSYS signal.
5008fae3551SRodney W. Grimes  *
5018fae3551SRodney W. Grimes  * These may arise if a system does not support sysctl.
5028fae3551SRodney W. Grimes  * We tolerate up to 25 of these, then throw in the towel.
5038fae3551SRodney W. Grimes  */
50445cfb1dcSXin LI static void
50573bf18edSWarner Losh badsys(int sig)
5068fae3551SRodney W. Grimes {
5078fae3551SRodney W. Grimes 	static int badcount = 0;
5088fae3551SRodney W. Grimes 
5098fae3551SRodney W. Grimes 	if (badcount++ < 25)
5108fae3551SRodney W. Grimes 		return;
5118fae3551SRodney W. Grimes 	disaster(sig);
5128fae3551SRodney W. Grimes }
5138fae3551SRodney W. Grimes 
5148fae3551SRodney W. Grimes /*
5158fae3551SRodney W. Grimes  * Catch an unexpected signal.
5168fae3551SRodney W. Grimes  */
51745cfb1dcSXin LI static void
51873bf18edSWarner Losh disaster(int sig)
5198fae3551SRodney W. Grimes {
520091abe40SDavid E. O'Brien 
5218fae3551SRodney W. Grimes 	emergency("fatal signal: %s",
5228889c700SDavid Nugent 	    (unsigned)sig < NSIG ? sys_siglist[sig] : "unknown signal");
5238fae3551SRodney W. Grimes 
5248fae3551SRodney W. Grimes 	sleep(STALL_TIMEOUT);
5258fae3551SRodney W. Grimes 	_exit(sig);		/* reboot */
5268fae3551SRodney W. Grimes }
5278fae3551SRodney W. Grimes 
5288fae3551SRodney W. Grimes /*
5298fae3551SRodney W. Grimes  * Get the security level of the kernel.
5308fae3551SRodney W. Grimes  */
53145cfb1dcSXin LI static int
53273bf18edSWarner Losh getsecuritylevel(void)
5338fae3551SRodney W. Grimes {
5348fae3551SRodney W. Grimes #ifdef KERN_SECURELVL
5358fae3551SRodney W. Grimes 	int name[2], curlevel;
5368fae3551SRodney W. Grimes 	size_t len;
5378fae3551SRodney W. Grimes 
5388fae3551SRodney W. Grimes 	name[0] = CTL_KERN;
5398fae3551SRodney W. Grimes 	name[1] = KERN_SECURELVL;
5408fae3551SRodney W. Grimes 	len = sizeof curlevel;
5418fae3551SRodney W. Grimes 	if (sysctl(name, 2, &curlevel, &len, NULL, 0) == -1) {
5428fae3551SRodney W. Grimes 		emergency("cannot get kernel security level: %s",
5438fae3551SRodney W. Grimes 		    strerror(errno));
5448fae3551SRodney W. Grimes 		return (-1);
5458fae3551SRodney W. Grimes 	}
5468fae3551SRodney W. Grimes 	return (curlevel);
5478fae3551SRodney W. Grimes #else
5488fae3551SRodney W. Grimes 	return (-1);
5498fae3551SRodney W. Grimes #endif
5508fae3551SRodney W. Grimes }
5518fae3551SRodney W. Grimes 
5528fae3551SRodney W. Grimes /*
5538fae3551SRodney W. Grimes  * Set the security level of the kernel.
5548fae3551SRodney W. Grimes  */
55545cfb1dcSXin LI static void
55673bf18edSWarner Losh setsecuritylevel(int newlevel)
5578fae3551SRodney W. Grimes {
5588fae3551SRodney W. Grimes #ifdef KERN_SECURELVL
5598fae3551SRodney W. Grimes 	int name[2], curlevel;
5608fae3551SRodney W. Grimes 
5618fae3551SRodney W. Grimes 	curlevel = getsecuritylevel();
5628fae3551SRodney W. Grimes 	if (newlevel == curlevel)
5638fae3551SRodney W. Grimes 		return;
5648fae3551SRodney W. Grimes 	name[0] = CTL_KERN;
5658fae3551SRodney W. Grimes 	name[1] = KERN_SECURELVL;
5668fae3551SRodney W. Grimes 	if (sysctl(name, 2, NULL, NULL, &newlevel, sizeof newlevel) == -1) {
5678fae3551SRodney W. Grimes 		emergency(
5688fae3551SRodney W. Grimes 		    "cannot change kernel security level from %d to %d: %s",
5698fae3551SRodney W. Grimes 		    curlevel, newlevel, strerror(errno));
5708fae3551SRodney W. Grimes 		return;
5718fae3551SRodney W. Grimes 	}
5728fae3551SRodney W. Grimes #ifdef SECURE
5738fae3551SRodney W. Grimes 	warning("kernel security level changed from %d to %d",
5748fae3551SRodney W. Grimes 	    curlevel, newlevel);
5758fae3551SRodney W. Grimes #endif
5768fae3551SRodney W. Grimes #endif
5778fae3551SRodney W. Grimes }
5788fae3551SRodney W. Grimes 
5798fae3551SRodney W. Grimes /*
5808fae3551SRodney W. Grimes  * Change states in the finite state machine.
5818fae3551SRodney W. Grimes  * The initial state is passed as an argument.
5828fae3551SRodney W. Grimes  */
58345cfb1dcSXin LI static void
58473bf18edSWarner Losh transition(state_t s)
5858fae3551SRodney W. Grimes {
586091abe40SDavid E. O'Brien 
587acf0ab06SJilles Tjoelker 	current_state = s;
5888fae3551SRodney W. Grimes 	for (;;)
589acf0ab06SJilles Tjoelker 		current_state = (state_t) (*current_state)();
5908fae3551SRodney W. Grimes }
5918fae3551SRodney W. Grimes 
5928fae3551SRodney W. Grimes /*
5938fae3551SRodney W. Grimes  * Start a session and allocate a controlling terminal.
5948fae3551SRodney W. Grimes  * Only called by children of init after forking.
5958fae3551SRodney W. Grimes  */
59645cfb1dcSXin LI static void
5974c2c7b2cSEd Schouten open_console(void)
5988fae3551SRodney W. Grimes {
5998fae3551SRodney W. Grimes 	int fd;
6008fae3551SRodney W. Grimes 
6016ee5808bSEd Schouten 	/*
6026ee5808bSEd Schouten 	 * Try to open /dev/console.  Open the device with O_NONBLOCK to
6036ee5808bSEd Schouten 	 * prevent potential blocking on a carrier.
6046ee5808bSEd Schouten 	 */
6054c2c7b2cSEd Schouten 	revoke(_PATH_CONSOLE);
6064c2c7b2cSEd Schouten 	if ((fd = open(_PATH_CONSOLE, O_RDWR | O_NONBLOCK)) != -1) {
6076ee5808bSEd Schouten 		(void)fcntl(fd, F_SETFL, fcntl(fd, F_GETFL) & ~O_NONBLOCK);
6084c2c7b2cSEd Schouten 		if (login_tty(fd) == 0)
6094c2c7b2cSEd Schouten 			return;
6104c2c7b2cSEd Schouten 		close(fd);
6114c2c7b2cSEd Schouten 	}
6124c2c7b2cSEd Schouten 
6134c2c7b2cSEd Schouten 	/* No luck.  Log output to file if possible. */
6144c2c7b2cSEd Schouten 	if ((fd = open(_PATH_DEVNULL, O_RDWR)) == -1) {
6154c2c7b2cSEd Schouten 		stall("cannot open null device.");
6168fae3551SRodney W. Grimes 		_exit(1);
6178fae3551SRodney W. Grimes 	}
6184c2c7b2cSEd Schouten 	if (fd != STDIN_FILENO) {
6194c2c7b2cSEd Schouten 		dup2(fd, STDIN_FILENO);
6204c2c7b2cSEd Schouten 		close(fd);
6218fae3551SRodney W. Grimes 	}
6224c2c7b2cSEd Schouten 	fd = open(_PATH_INITLOG, O_WRONLY | O_APPEND | O_CREAT, 0644);
6234c2c7b2cSEd Schouten 	if (fd == -1)
6244c2c7b2cSEd Schouten 		dup2(STDIN_FILENO, STDOUT_FILENO);
6254c2c7b2cSEd Schouten 	else if (fd != STDOUT_FILENO) {
6264c2c7b2cSEd Schouten 		dup2(fd, STDOUT_FILENO);
6274c2c7b2cSEd Schouten 		close(fd);
6284c2c7b2cSEd Schouten 	}
6294c2c7b2cSEd Schouten 	dup2(STDOUT_FILENO, STDERR_FILENO);
6308fae3551SRodney W. Grimes }
6318fae3551SRodney W. Grimes 
63245cfb1dcSXin LI static const char *
6331a7bec91SWarner Losh get_shell(void)
6341a7bec91SWarner Losh {
6351a7bec91SWarner Losh 	static char kenv_value[PATH_MAX];
6361a7bec91SWarner Losh 
6371a7bec91SWarner Losh 	if (kenv(KENV_GET, "init_shell", kenv_value, sizeof(kenv_value)) > 0)
6381a7bec91SWarner Losh 		return kenv_value;
6391a7bec91SWarner Losh 	else
6401a7bec91SWarner Losh 		return _PATH_BSHELL;
6411a7bec91SWarner Losh }
6421a7bec91SWarner Losh 
64345cfb1dcSXin LI static void
6441a7bec91SWarner Losh write_stderr(const char *message)
6451a7bec91SWarner Losh {
646091abe40SDavid E. O'Brien 
6471a7bec91SWarner Losh 	write(STDERR_FILENO, message, strlen(message));
6481a7bec91SWarner Losh }
6491a7bec91SWarner Losh 
6503f5ac575SEdward Tomasz Napierala static int
6513f5ac575SEdward Tomasz Napierala read_file(const char *path, void **bufp, size_t *bufsizep)
6523f5ac575SEdward Tomasz Napierala {
6533f5ac575SEdward Tomasz Napierala 	struct stat sb;
6543f5ac575SEdward Tomasz Napierala 	size_t bufsize;
6553f5ac575SEdward Tomasz Napierala 	void *buf;
6563f5ac575SEdward Tomasz Napierala 	ssize_t nbytes;
6573f5ac575SEdward Tomasz Napierala 	int error, fd;
6583f5ac575SEdward Tomasz Napierala 
6593f5ac575SEdward Tomasz Napierala 	fd = open(path, O_RDONLY);
6603f5ac575SEdward Tomasz Napierala 	if (fd < 0) {
6613f5ac575SEdward Tomasz Napierala 		emergency("%s: %s", path, strerror(errno));
6623f5ac575SEdward Tomasz Napierala 		return (-1);
6633f5ac575SEdward Tomasz Napierala 	}
6643f5ac575SEdward Tomasz Napierala 
6653f5ac575SEdward Tomasz Napierala 	error = fstat(fd, &sb);
6663f5ac575SEdward Tomasz Napierala 	if (error != 0) {
6673f5ac575SEdward Tomasz Napierala 		emergency("fstat: %s", strerror(errno));
668b9124fc3SEdward Tomasz Napierala 		close(fd);
6693f5ac575SEdward Tomasz Napierala 		return (error);
6703f5ac575SEdward Tomasz Napierala 	}
6713f5ac575SEdward Tomasz Napierala 
6723f5ac575SEdward Tomasz Napierala 	bufsize = sb.st_size;
6733f5ac575SEdward Tomasz Napierala 	buf = malloc(bufsize);
6743f5ac575SEdward Tomasz Napierala 	if (buf == NULL) {
6753f5ac575SEdward Tomasz Napierala 		emergency("malloc: %s", strerror(errno));
676b9124fc3SEdward Tomasz Napierala 		close(fd);
6773f5ac575SEdward Tomasz Napierala 		return (error);
6783f5ac575SEdward Tomasz Napierala 	}
6793f5ac575SEdward Tomasz Napierala 
6803f5ac575SEdward Tomasz Napierala 	nbytes = read(fd, buf, bufsize);
6813f5ac575SEdward Tomasz Napierala 	if (nbytes != (ssize_t)bufsize) {
6823f5ac575SEdward Tomasz Napierala 		emergency("read: %s", strerror(errno));
683b9124fc3SEdward Tomasz Napierala 		close(fd);
6843f5ac575SEdward Tomasz Napierala 		free(buf);
6853f5ac575SEdward Tomasz Napierala 		return (error);
6863f5ac575SEdward Tomasz Napierala 	}
6873f5ac575SEdward Tomasz Napierala 
6883f5ac575SEdward Tomasz Napierala 	error = close(fd);
6893f5ac575SEdward Tomasz Napierala 	if (error != 0) {
6903f5ac575SEdward Tomasz Napierala 		emergency("close: %s", strerror(errno));
6913f5ac575SEdward Tomasz Napierala 		free(buf);
6923f5ac575SEdward Tomasz Napierala 		return (error);
6933f5ac575SEdward Tomasz Napierala 	}
6943f5ac575SEdward Tomasz Napierala 
6953f5ac575SEdward Tomasz Napierala 	*bufp = buf;
6963f5ac575SEdward Tomasz Napierala 	*bufsizep = bufsize;
6973f5ac575SEdward Tomasz Napierala 
6983f5ac575SEdward Tomasz Napierala 	return (0);
6993f5ac575SEdward Tomasz Napierala }
7003f5ac575SEdward Tomasz Napierala 
7013f5ac575SEdward Tomasz Napierala static int
702b9124fc3SEdward Tomasz Napierala create_file(const char *path, const void *buf, size_t bufsize)
7033f5ac575SEdward Tomasz Napierala {
7043f5ac575SEdward Tomasz Napierala 	ssize_t nbytes;
7053f5ac575SEdward Tomasz Napierala 	int error, fd;
7063f5ac575SEdward Tomasz Napierala 
7073f5ac575SEdward Tomasz Napierala 	fd = open(path, O_WRONLY | O_CREAT | O_EXCL, 0700);
7083f5ac575SEdward Tomasz Napierala 	if (fd < 0) {
7093f5ac575SEdward Tomasz Napierala 		emergency("%s: %s", path, strerror(errno));
7103f5ac575SEdward Tomasz Napierala 		return (-1);
7113f5ac575SEdward Tomasz Napierala 	}
7123f5ac575SEdward Tomasz Napierala 
7133f5ac575SEdward Tomasz Napierala 	nbytes = write(fd, buf, bufsize);
7143f5ac575SEdward Tomasz Napierala 	if (nbytes != (ssize_t)bufsize) {
7153f5ac575SEdward Tomasz Napierala 		emergency("write: %s", strerror(errno));
716b9124fc3SEdward Tomasz Napierala 		close(fd);
7173f5ac575SEdward Tomasz Napierala 		return (-1);
7183f5ac575SEdward Tomasz Napierala 	}
7193f5ac575SEdward Tomasz Napierala 
7203f5ac575SEdward Tomasz Napierala 	error = close(fd);
7213f5ac575SEdward Tomasz Napierala 	if (error != 0) {
7223f5ac575SEdward Tomasz Napierala 		emergency("close: %s", strerror(errno));
7233f5ac575SEdward Tomasz Napierala 		return (-1);
7243f5ac575SEdward Tomasz Napierala 	}
7253f5ac575SEdward Tomasz Napierala 
7263f5ac575SEdward Tomasz Napierala 	return (0);
7273f5ac575SEdward Tomasz Napierala }
7283f5ac575SEdward Tomasz Napierala 
7293f5ac575SEdward Tomasz Napierala static int
7303f5ac575SEdward Tomasz Napierala mount_tmpfs(const char *fspath)
7313f5ac575SEdward Tomasz Napierala {
7323f5ac575SEdward Tomasz Napierala 	struct iovec *iov;
7333f5ac575SEdward Tomasz Napierala 	char errmsg[255];
7343f5ac575SEdward Tomasz Napierala 	int error, iovlen;
7353f5ac575SEdward Tomasz Napierala 
7363f5ac575SEdward Tomasz Napierala 	iov = NULL;
7373f5ac575SEdward Tomasz Napierala 	iovlen = 0;
7383f5ac575SEdward Tomasz Napierala 	memset(errmsg, 0, sizeof(errmsg));
7393f5ac575SEdward Tomasz Napierala 	build_iovec(&iov, &iovlen, "fstype",
7403f5ac575SEdward Tomasz Napierala 	    __DECONST(void *, "tmpfs"), (size_t)-1);
7413f5ac575SEdward Tomasz Napierala 	build_iovec(&iov, &iovlen, "fspath",
7423f5ac575SEdward Tomasz Napierala 	    __DECONST(void *, fspath), (size_t)-1);
7433f5ac575SEdward Tomasz Napierala 	build_iovec(&iov, &iovlen, "errmsg",
7443f5ac575SEdward Tomasz Napierala 	    errmsg, sizeof(errmsg));
7453f5ac575SEdward Tomasz Napierala 
7463f5ac575SEdward Tomasz Napierala 	error = nmount(iov, iovlen, 0);
7473f5ac575SEdward Tomasz Napierala 	if (error != 0) {
7483f5ac575SEdward Tomasz Napierala 		if (*errmsg != '\0') {
7493f5ac575SEdward Tomasz Napierala 			emergency("cannot mount tmpfs on %s: %s: %s",
7503f5ac575SEdward Tomasz Napierala 			    fspath, errmsg, strerror(errno));
7513f5ac575SEdward Tomasz Napierala 		} else {
7523f5ac575SEdward Tomasz Napierala 			emergency("cannot mount tmpfs on %s: %s",
7533f5ac575SEdward Tomasz Napierala 			    fspath, strerror(errno));
7543f5ac575SEdward Tomasz Napierala 		}
7553f5ac575SEdward Tomasz Napierala 		return (error);
7563f5ac575SEdward Tomasz Napierala 	}
7573f5ac575SEdward Tomasz Napierala 	return (0);
7583f5ac575SEdward Tomasz Napierala }
7593f5ac575SEdward Tomasz Napierala 
7603f5ac575SEdward Tomasz Napierala static state_func_t
7613f5ac575SEdward Tomasz Napierala reroot(void)
7623f5ac575SEdward Tomasz Napierala {
7633f5ac575SEdward Tomasz Napierala 	void *buf;
764377b6d1eSEdward Tomasz Napierala 	size_t bufsize;
765377b6d1eSEdward Tomasz Napierala 	int error;
7663f5ac575SEdward Tomasz Napierala 
767b9124fc3SEdward Tomasz Napierala 	buf = NULL;
768b9124fc3SEdward Tomasz Napierala 	bufsize = 0;
769b9124fc3SEdward Tomasz Napierala 
7703f5ac575SEdward Tomasz Napierala 	revoke_ttys();
7713f5ac575SEdward Tomasz Napierala 	runshutdown();
7723f5ac575SEdward Tomasz Napierala 
7733f5ac575SEdward Tomasz Napierala 	/*
7743f5ac575SEdward Tomasz Napierala 	 * Make sure nobody can interfere with our scheme.
775126ba219SEdward Tomasz Napierala 	 * Ignore ESRCH, which can apparently happen when
776126ba219SEdward Tomasz Napierala 	 * there are no processes to kill.
7773f5ac575SEdward Tomasz Napierala 	 */
7783f5ac575SEdward Tomasz Napierala 	error = kill(-1, SIGKILL);
779126ba219SEdward Tomasz Napierala 	if (error != 0 && errno != ESRCH) {
7803f5ac575SEdward Tomasz Napierala 		emergency("kill(2) failed: %s", strerror(errno));
7813f5ac575SEdward Tomasz Napierala 		goto out;
7823f5ac575SEdward Tomasz Napierala 	}
7833f5ac575SEdward Tomasz Napierala 
7843f5ac575SEdward Tomasz Napierala 	/*
7853f5ac575SEdward Tomasz Napierala 	 * Copy the init binary into tmpfs, so that we can unmount
7863f5ac575SEdward Tomasz Napierala 	 * the old rootfs without committing suicide.
7873f5ac575SEdward Tomasz Napierala 	 */
788377b6d1eSEdward Tomasz Napierala 	error = read_file(init_path_argv0, &buf, &bufsize);
7893f5ac575SEdward Tomasz Napierala 	if (error != 0)
7903f5ac575SEdward Tomasz Napierala 		goto out;
7913f5ac575SEdward Tomasz Napierala 	error = mount_tmpfs(_PATH_REROOT);
7923f5ac575SEdward Tomasz Napierala 	if (error != 0)
7933f5ac575SEdward Tomasz Napierala 		goto out;
7943f5ac575SEdward Tomasz Napierala 	error = create_file(_PATH_REROOT_INIT, buf, bufsize);
7953f5ac575SEdward Tomasz Napierala 	if (error != 0)
7963f5ac575SEdward Tomasz Napierala 		goto out;
7973f5ac575SEdward Tomasz Napierala 
7983f5ac575SEdward Tomasz Napierala 	/*
7993f5ac575SEdward Tomasz Napierala 	 * Execute the temporary init.
8003f5ac575SEdward Tomasz Napierala 	 */
8013f5ac575SEdward Tomasz Napierala 	execl(_PATH_REROOT_INIT, _PATH_REROOT_INIT, "-r", NULL);
8023f5ac575SEdward Tomasz Napierala 	emergency("cannot exec %s: %s", _PATH_REROOT_INIT, strerror(errno));
8033f5ac575SEdward Tomasz Napierala 
8043f5ac575SEdward Tomasz Napierala out:
8053f5ac575SEdward Tomasz Napierala 	emergency("reroot failed; going to single user mode");
806b9124fc3SEdward Tomasz Napierala 	free(buf);
8073f5ac575SEdward Tomasz Napierala 	return (state_func_t) single_user;
8083f5ac575SEdward Tomasz Napierala }
8093f5ac575SEdward Tomasz Napierala 
8103f5ac575SEdward Tomasz Napierala static state_func_t
8113f5ac575SEdward Tomasz Napierala reroot_phase_two(void)
8123f5ac575SEdward Tomasz Napierala {
8133f5ac575SEdward Tomasz Napierala 	char init_path[PATH_MAX], *path, *path_component;
8143f5ac575SEdward Tomasz Napierala 	size_t init_path_len;
8153f5ac575SEdward Tomasz Napierala 	int nbytes, error;
8163f5ac575SEdward Tomasz Napierala 
8173f5ac575SEdward Tomasz Napierala 	/*
8183f5ac575SEdward Tomasz Napierala 	 * Ask the kernel to mount the new rootfs.
8193f5ac575SEdward Tomasz Napierala 	 */
8203f5ac575SEdward Tomasz Napierala 	error = reboot(RB_REROOT);
8213f5ac575SEdward Tomasz Napierala 	if (error != 0) {
8223f5ac575SEdward Tomasz Napierala 		emergency("RB_REBOOT failed: %s", strerror(errno));
8233f5ac575SEdward Tomasz Napierala 		goto out;
8243f5ac575SEdward Tomasz Napierala 	}
8253f5ac575SEdward Tomasz Napierala 
8263f5ac575SEdward Tomasz Napierala 	/*
8273f5ac575SEdward Tomasz Napierala 	 * Figure out where the destination init(8) binary is.  Note that
8283f5ac575SEdward Tomasz Napierala 	 * the path could be different than what we've started with.  Use
8293f5ac575SEdward Tomasz Napierala 	 * the value from kenv, if set, or the one from sysctl otherwise.
8303f5ac575SEdward Tomasz Napierala 	 * The latter defaults to a hardcoded value, but can be overridden
8313f5ac575SEdward Tomasz Napierala 	 * by a build time option.
8323f5ac575SEdward Tomasz Napierala 	 */
8333f5ac575SEdward Tomasz Napierala 	nbytes = kenv(KENV_GET, "init_path", init_path, sizeof(init_path));
8343f5ac575SEdward Tomasz Napierala 	if (nbytes <= 0) {
8353f5ac575SEdward Tomasz Napierala 		init_path_len = sizeof(init_path);
8363f5ac575SEdward Tomasz Napierala 		error = sysctlbyname("kern.init_path",
8373f5ac575SEdward Tomasz Napierala 		    init_path, &init_path_len, NULL, 0);
8383f5ac575SEdward Tomasz Napierala 		if (error != 0) {
8393f5ac575SEdward Tomasz Napierala 			emergency("failed to retrieve kern.init_path: %s",
8403f5ac575SEdward Tomasz Napierala 			    strerror(errno));
8413f5ac575SEdward Tomasz Napierala 			goto out;
8423f5ac575SEdward Tomasz Napierala 		}
8433f5ac575SEdward Tomasz Napierala 	}
8443f5ac575SEdward Tomasz Napierala 
8453f5ac575SEdward Tomasz Napierala 	/*
8463f5ac575SEdward Tomasz Napierala 	 * Repeat the init search logic from sys/kern/init_path.c
8473f5ac575SEdward Tomasz Napierala 	 */
8483f5ac575SEdward Tomasz Napierala 	path_component = init_path;
8493f5ac575SEdward Tomasz Napierala 	while ((path = strsep(&path_component, ":")) != NULL) {
8503f5ac575SEdward Tomasz Napierala 		/*
8513f5ac575SEdward Tomasz Napierala 		 * Execute init(8) from the new rootfs.
8523f5ac575SEdward Tomasz Napierala 		 */
8533f5ac575SEdward Tomasz Napierala 		execl(path, path, NULL);
8543f5ac575SEdward Tomasz Napierala 	}
8553f5ac575SEdward Tomasz Napierala 	emergency("cannot exec init from %s: %s", init_path, strerror(errno));
8563f5ac575SEdward Tomasz Napierala 
8573f5ac575SEdward Tomasz Napierala out:
8583f5ac575SEdward Tomasz Napierala 	emergency("reroot failed; going to single user mode");
8593f5ac575SEdward Tomasz Napierala 	return (state_func_t) single_user;
8603f5ac575SEdward Tomasz Napierala }
8613f5ac575SEdward Tomasz Napierala 
8628fae3551SRodney W. Grimes /*
8638fae3551SRodney W. Grimes  * Bring the system up single user.
8648fae3551SRodney W. Grimes  */
86545cfb1dcSXin LI static state_func_t
86673bf18edSWarner Losh single_user(void)
8678fae3551SRodney W. Grimes {
8688fae3551SRodney W. Grimes 	pid_t pid, wpid;
8698fae3551SRodney W. Grimes 	int status;
8708fae3551SRodney W. Grimes 	sigset_t mask;
8711a7bec91SWarner Losh 	const char *shell;
8728fae3551SRodney W. Grimes 	char *argv[2];
8738402d33aSKonstantin Belousov 	struct timeval tv, tn;
8748fae3551SRodney W. Grimes #ifdef SECURE
8758fae3551SRodney W. Grimes 	struct ttyent *typ;
8768fae3551SRodney W. Grimes 	struct passwd *pp;
8778fae3551SRodney W. Grimes 	static const char banner[] =
8788fae3551SRodney W. Grimes 		"Enter root password, or ^D to go multi-user\n";
8798fae3551SRodney W. Grimes 	char *clear, *password;
8808fae3551SRodney W. Grimes #endif
88163322c28SPoul-Henning Kamp #ifdef DEBUGSHELL
88263322c28SPoul-Henning Kamp 	char altshell[128];
88363322c28SPoul-Henning Kamp #endif
8848fae3551SRodney W. Grimes 
885db8ad19dSJordan K. Hubbard 	if (Reboot) {
886a0a549c7SRuslan Ermilov 		/* Instead of going single user, let's reboot the machine */
887e460cfd3SNate Williams 		sync();
888e10037dfSKonstantin Belousov 		if (reboot(howto) == -1) {
889e10037dfSKonstantin Belousov 			emergency("reboot(%#x) failed, %s", howto,
890e10037dfSKonstantin Belousov 			    strerror(errno));
891e10037dfSKonstantin Belousov 			_exit(1); /* panic and reboot */
892e10037dfSKonstantin Belousov 		}
893e10037dfSKonstantin Belousov 		warning("reboot(%#x) returned", howto);
894e10037dfSKonstantin Belousov 		_exit(0); /* panic as well */
895e460cfd3SNate Williams 	}
896e460cfd3SNate Williams 
8971a7bec91SWarner Losh 	shell = get_shell();
8981a7bec91SWarner Losh 
8998fae3551SRodney W. Grimes 	if ((pid = fork()) == 0) {
9008fae3551SRodney W. Grimes 		/*
9018fae3551SRodney W. Grimes 		 * Start the single user session.
9028fae3551SRodney W. Grimes 		 */
9034c2c7b2cSEd Schouten 		open_console();
9048fae3551SRodney W. Grimes 
9058fae3551SRodney W. Grimes #ifdef SECURE
9068fae3551SRodney W. Grimes 		/*
9078fae3551SRodney W. Grimes 		 * Check the root password.
9088fae3551SRodney W. Grimes 		 * We don't care if the console is 'on' by default;
9098fae3551SRodney W. Grimes 		 * it's the only tty that can be 'off' and 'secure'.
9108fae3551SRodney W. Grimes 		 */
9118fae3551SRodney W. Grimes 		typ = getttynam("console");
9128fae3551SRodney W. Grimes 		pp = getpwnam("root");
913a69497d7SMatthew Dillon 		if (typ && (typ->ty_status & TTY_SECURE) == 0 &&
914a69497d7SMatthew Dillon 		    pp && *pp->pw_passwd) {
9151a7bec91SWarner Losh 			write_stderr(banner);
9168fae3551SRodney W. Grimes 			for (;;) {
9178fae3551SRodney W. Grimes 				clear = getpass("Password:");
9182ef6931aSMarcelo Araujo 				if (clear == NULL || *clear == '\0')
9198fae3551SRodney W. Grimes 					_exit(0);
9208fae3551SRodney W. Grimes 				password = crypt(clear, pp->pw_passwd);
9218fae3551SRodney W. Grimes 				bzero(clear, _PASSWORD_LEN);
92229dcf726SKevin Lo 				if (password == NULL ||
92329dcf726SKevin Lo 				    strcmp(password, pp->pw_passwd) == 0)
9248fae3551SRodney W. Grimes 					break;
9258fae3551SRodney W. Grimes 				warning("single-user login failed\n");
9268fae3551SRodney W. Grimes 			}
9278fae3551SRodney W. Grimes 		}
9288fae3551SRodney W. Grimes 		endttyent();
9298fae3551SRodney W. Grimes 		endpwent();
9308fae3551SRodney W. Grimes #endif /* SECURE */
9318fae3551SRodney W. Grimes 
9328fae3551SRodney W. Grimes #ifdef DEBUGSHELL
9338fae3551SRodney W. Grimes 		{
93463322c28SPoul-Henning Kamp 			char *cp = altshell;
9358fae3551SRodney W. Grimes 			int num;
9368fae3551SRodney W. Grimes 
9371a7bec91SWarner Losh #define	SHREQUEST "Enter full pathname of shell or RETURN for "
9381a7bec91SWarner Losh 			write_stderr(SHREQUEST);
9391a7bec91SWarner Losh 			write_stderr(shell);
9401a7bec91SWarner Losh 			write_stderr(": ");
9418fae3551SRodney W. Grimes 			while ((num = read(STDIN_FILENO, cp, 1)) != -1 &&
9428fae3551SRodney W. Grimes 			    num != 0 && *cp != '\n' && cp < &altshell[127])
9438fae3551SRodney W. Grimes 				cp++;
9448fae3551SRodney W. Grimes 			*cp = '\0';
9458fae3551SRodney W. Grimes 			if (altshell[0] != '\0')
9468fae3551SRodney W. Grimes 				shell = altshell;
9478fae3551SRodney W. Grimes 		}
9488fae3551SRodney W. Grimes #endif /* DEBUGSHELL */
9498fae3551SRodney W. Grimes 
9508fae3551SRodney W. Grimes 		/*
9518fae3551SRodney W. Grimes 		 * Unblock signals.
9528fae3551SRodney W. Grimes 		 * We catch all the interesting ones,
9538fae3551SRodney W. Grimes 		 * and those are reset to SIG_DFL on exec.
9548fae3551SRodney W. Grimes 		 */
9558fae3551SRodney W. Grimes 		sigemptyset(&mask);
9568fae3551SRodney W. Grimes 		sigprocmask(SIG_SETMASK, &mask, (sigset_t *) 0);
9578fae3551SRodney W. Grimes 
9588fae3551SRodney W. Grimes 		/*
9598fae3551SRodney W. Grimes 		 * Fire off a shell.
9608fae3551SRodney W. Grimes 		 * If the default one doesn't work, try the Bourne shell.
9618fae3551SRodney W. Grimes 		 */
962ab03e6d5SXin LI 
963ab03e6d5SXin LI 		char name[] = "-sh";
964ab03e6d5SXin LI 
965ab03e6d5SXin LI 		argv[0] = name;
9668fae3551SRodney W. Grimes 		argv[1] = 0;
9678fae3551SRodney W. Grimes 		execv(shell, argv);
9688fae3551SRodney W. Grimes 		emergency("can't exec %s for single user: %m", shell);
9698fae3551SRodney W. Grimes 		execv(_PATH_BSHELL, argv);
9708fae3551SRodney W. Grimes 		emergency("can't exec %s for single user: %m", _PATH_BSHELL);
9718fae3551SRodney W. Grimes 		sleep(STALL_TIMEOUT);
9728fae3551SRodney W. Grimes 		_exit(1);
9738fae3551SRodney W. Grimes 	}
9748fae3551SRodney W. Grimes 
9758fae3551SRodney W. Grimes 	if (pid == -1) {
9768fae3551SRodney W. Grimes 		/*
9778fae3551SRodney W. Grimes 		 * We are seriously hosed.  Do our best.
9788fae3551SRodney W. Grimes 		 */
9798fae3551SRodney W. Grimes 		emergency("can't fork single-user shell, trying again");
9808fae3551SRodney W. Grimes 		while (waitpid(-1, (int *) 0, WNOHANG) > 0)
9818fae3551SRodney W. Grimes 			continue;
9828fae3551SRodney W. Grimes 		return (state_func_t) single_user;
9838fae3551SRodney W. Grimes 	}
9848fae3551SRodney W. Grimes 
9858fae3551SRodney W. Grimes 	requested_transition = 0;
9868fae3551SRodney W. Grimes 	do {
9878fae3551SRodney W. Grimes 		if ((wpid = waitpid(-1, &status, WUNTRACED)) != -1)
9888fae3551SRodney W. Grimes 			collect_child(wpid);
9898fae3551SRodney W. Grimes 		if (wpid == -1) {
9908fae3551SRodney W. Grimes 			if (errno == EINTR)
9918fae3551SRodney W. Grimes 				continue;
9928fae3551SRodney W. Grimes 			warning("wait for single-user shell failed: %m; restarting");
9938fae3551SRodney W. Grimes 			return (state_func_t) single_user;
9948fae3551SRodney W. Grimes 		}
9958fae3551SRodney W. Grimes 		if (wpid == pid && WIFSTOPPED(status)) {
9968fae3551SRodney W. Grimes 			warning("init: shell stopped, restarting\n");
9978fae3551SRodney W. Grimes 			kill(pid, SIGCONT);
9988fae3551SRodney W. Grimes 			wpid = -1;
9998fae3551SRodney W. Grimes 		}
10008fae3551SRodney W. Grimes 	} while (wpid != pid && !requested_transition);
10018fae3551SRodney W. Grimes 
10028fae3551SRodney W. Grimes 	if (requested_transition)
10038fae3551SRodney W. Grimes 		return (state_func_t) requested_transition;
10048fae3551SRodney W. Grimes 
10058fae3551SRodney W. Grimes 	if (!WIFEXITED(status)) {
10068fae3551SRodney W. Grimes 		if (WTERMSIG(status) == SIGKILL) {
10078fae3551SRodney W. Grimes 			/*
10088fae3551SRodney W. Grimes 			 *  reboot(8) killed shell?
10098fae3551SRodney W. Grimes 			 */
10108fae3551SRodney W. Grimes 			warning("single user shell terminated.");
10118402d33aSKonstantin Belousov 			gettimeofday(&tv, NULL);
10128402d33aSKonstantin Belousov 			tn = tv;
10138402d33aSKonstantin Belousov 			tv.tv_sec += STALL_TIMEOUT;
10148402d33aSKonstantin Belousov 			while (tv.tv_sec > tn.tv_sec || (tv.tv_sec ==
10158402d33aSKonstantin Belousov 			    tn.tv_sec && tv.tv_usec > tn.tv_usec)) {
10168402d33aSKonstantin Belousov 				sleep(1);
10178402d33aSKonstantin Belousov 				gettimeofday(&tn, NULL);
10188402d33aSKonstantin Belousov 			}
10198fae3551SRodney W. Grimes 			_exit(0);
10208fae3551SRodney W. Grimes 		} else {
10218fae3551SRodney W. Grimes 			warning("single user shell terminated, restarting");
10228fae3551SRodney W. Grimes 			return (state_func_t) single_user;
10238fae3551SRodney W. Grimes 		}
10248fae3551SRodney W. Grimes 	}
10258fae3551SRodney W. Grimes 
10268fae3551SRodney W. Grimes 	runcom_mode = FASTBOOT;
10278fae3551SRodney W. Grimes 	return (state_func_t) runcom;
10288fae3551SRodney W. Grimes }
10298fae3551SRodney W. Grimes 
10308fae3551SRodney W. Grimes /*
10318fae3551SRodney W. Grimes  * Run the system startup script.
10328fae3551SRodney W. Grimes  */
103345cfb1dcSXin LI static state_func_t
103473bf18edSWarner Losh runcom(void)
10358fae3551SRodney W. Grimes {
10361a7bec91SWarner Losh 	state_func_t next_transition;
10371a7bec91SWarner Losh 
10382ef6931aSMarcelo Araujo 	if ((next_transition = run_script(_PATH_RUNCOM)) != NULL)
10391a7bec91SWarner Losh 		return next_transition;
10401a7bec91SWarner Losh 
10411a7bec91SWarner Losh 	runcom_mode = AUTOBOOT;		/* the default */
10421a7bec91SWarner Losh 	return (state_func_t) read_ttys;
10431a7bec91SWarner Losh }
10441a7bec91SWarner Losh 
10451a7bec91SWarner Losh /*
10461a7bec91SWarner Losh  * Run a shell script.
10471a7bec91SWarner Losh  * Returns 0 on success, otherwise the next transition to enter:
10481a7bec91SWarner Losh  *  - single_user if fork/execv/waitpid failed, or if the script
10491a7bec91SWarner Losh  *    terminated with a signal or exit code != 0.
1050acf0ab06SJilles Tjoelker  *  - death_single if a SIGTERM was delivered to init(8).
10511a7bec91SWarner Losh  */
105245cfb1dcSXin LI static state_func_t
10531a7bec91SWarner Losh run_script(const char *script)
10541a7bec91SWarner Losh {
10558fae3551SRodney W. Grimes 	pid_t pid, wpid;
10568fae3551SRodney W. Grimes 	int status;
10578fae3551SRodney W. Grimes 	char *argv[4];
10581a7bec91SWarner Losh 	const char *shell;
10598fae3551SRodney W. Grimes 	struct sigaction sa;
10608fae3551SRodney W. Grimes 
10611a7bec91SWarner Losh 	shell = get_shell();
10621a7bec91SWarner Losh 
10638fae3551SRodney W. Grimes 	if ((pid = fork()) == 0) {
10648fae3551SRodney W. Grimes 		sigemptyset(&sa.sa_mask);
10658fae3551SRodney W. Grimes 		sa.sa_flags = 0;
10668fae3551SRodney W. Grimes 		sa.sa_handler = SIG_IGN;
1067091abe40SDavid E. O'Brien 		sigaction(SIGTSTP, &sa, (struct sigaction *)0);
1068091abe40SDavid E. O'Brien 		sigaction(SIGHUP, &sa, (struct sigaction *)0);
10698fae3551SRodney W. Grimes 
10704c2c7b2cSEd Schouten 		open_console();
10718fae3551SRodney W. Grimes 
1072ab03e6d5SXin LI 		char _sh[]		= "sh";
1073ab03e6d5SXin LI 		char _autoboot[]	= "autoboot";
1074ab03e6d5SXin LI 
1075ab03e6d5SXin LI 		argv[0] = _sh;
10761a7bec91SWarner Losh 		argv[1] = __DECONST(char *, script);
1077ab03e6d5SXin LI 		argv[2] = runcom_mode == AUTOBOOT ? _autoboot : 0;
10788fae3551SRodney W. Grimes 		argv[3] = 0;
10798fae3551SRodney W. Grimes 
10808fae3551SRodney W. Grimes 		sigprocmask(SIG_SETMASK, &sa.sa_mask, (sigset_t *) 0);
10818fae3551SRodney W. Grimes 
10821ef60eb1SDavid Nugent #ifdef LOGIN_CAP
10831ef60eb1SDavid Nugent 		setprocresources(RESOURCE_RC);
10841ef60eb1SDavid Nugent #endif
10851a7bec91SWarner Losh 		execv(shell, argv);
10861a7bec91SWarner Losh 		stall("can't exec %s for %s: %m", shell, script);
10878fae3551SRodney W. Grimes 		_exit(1);	/* force single user mode */
10888fae3551SRodney W. Grimes 	}
10898fae3551SRodney W. Grimes 
10908fae3551SRodney W. Grimes 	if (pid == -1) {
10911a7bec91SWarner Losh 		emergency("can't fork for %s on %s: %m", shell, script);
10928fae3551SRodney W. Grimes 		while (waitpid(-1, (int *) 0, WNOHANG) > 0)
10938fae3551SRodney W. Grimes 			continue;
10948fae3551SRodney W. Grimes 		sleep(STALL_TIMEOUT);
10958fae3551SRodney W. Grimes 		return (state_func_t) single_user;
10968fae3551SRodney W. Grimes 	}
10978fae3551SRodney W. Grimes 
10988fae3551SRodney W. Grimes 	/*
10998fae3551SRodney W. Grimes 	 * Copied from single_user().  This is a bit paranoid.
11008fae3551SRodney W. Grimes 	 */
11016e8ff8b7SDag-Erling Smørgrav 	requested_transition = 0;
11028fae3551SRodney W. Grimes 	do {
11038fae3551SRodney W. Grimes 		if ((wpid = waitpid(-1, &status, WUNTRACED)) != -1)
11048fae3551SRodney W. Grimes 			collect_child(wpid);
11058fae3551SRodney W. Grimes 		if (wpid == -1) {
11063f5ac575SEdward Tomasz Napierala 			if (requested_transition == death_single ||
11073f5ac575SEdward Tomasz Napierala 			    requested_transition == reroot)
11083f5ac575SEdward Tomasz Napierala 				return (state_func_t) requested_transition;
11098fae3551SRodney W. Grimes 			if (errno == EINTR)
11108fae3551SRodney W. Grimes 				continue;
11111a7bec91SWarner Losh 			warning("wait for %s on %s failed: %m; going to "
11121a7bec91SWarner Losh 			    "single user mode", shell, script);
11138fae3551SRodney W. Grimes 			return (state_func_t) single_user;
11148fae3551SRodney W. Grimes 		}
11158fae3551SRodney W. Grimes 		if (wpid == pid && WIFSTOPPED(status)) {
11168fae3551SRodney W. Grimes 			warning("init: %s on %s stopped, restarting\n",
11171a7bec91SWarner Losh 			    shell, script);
11188fae3551SRodney W. Grimes 			kill(pid, SIGCONT);
11198fae3551SRodney W. Grimes 			wpid = -1;
11208fae3551SRodney W. Grimes 		}
11218fae3551SRodney W. Grimes 	} while (wpid != pid);
11228fae3551SRodney W. Grimes 
11238fae3551SRodney W. Grimes 	if (WIFSIGNALED(status) && WTERMSIG(status) == SIGTERM &&
11248fae3551SRodney W. Grimes 	    requested_transition == catatonia) {
11258fae3551SRodney W. Grimes 		/* /etc/rc executed /sbin/reboot; wait for the end quietly */
11268fae3551SRodney W. Grimes 		sigset_t s;
11278fae3551SRodney W. Grimes 
11288fae3551SRodney W. Grimes 		sigfillset(&s);
11298fae3551SRodney W. Grimes 		for (;;)
11308fae3551SRodney W. Grimes 			sigsuspend(&s);
11318fae3551SRodney W. Grimes 	}
11328fae3551SRodney W. Grimes 
11338fae3551SRodney W. Grimes 	if (!WIFEXITED(status)) {
11341a7bec91SWarner Losh 		warning("%s on %s terminated abnormally, going to single "
11351a7bec91SWarner Losh 		    "user mode", shell, script);
11368fae3551SRodney W. Grimes 		return (state_func_t) single_user;
11378fae3551SRodney W. Grimes 	}
11388fae3551SRodney W. Grimes 
11398fae3551SRodney W. Grimes 	if (WEXITSTATUS(status))
11408fae3551SRodney W. Grimes 		return (state_func_t) single_user;
11418fae3551SRodney W. Grimes 
11421a7bec91SWarner Losh 	return (state_func_t) 0;
11438fae3551SRodney W. Grimes }
11448fae3551SRodney W. Grimes 
11458fae3551SRodney W. Grimes /*
11468fae3551SRodney W. Grimes  * Open the session database.
11478fae3551SRodney W. Grimes  *
11488fae3551SRodney W. Grimes  * NB: We could pass in the size here; is it necessary?
11498fae3551SRodney W. Grimes  */
115045cfb1dcSXin LI static int
115173bf18edSWarner Losh start_session_db(void)
11528fae3551SRodney W. Grimes {
11538fae3551SRodney W. Grimes 	if (session_db && (*session_db->close)(session_db))
11548fae3551SRodney W. Grimes 		emergency("session database close: %s", strerror(errno));
115514adaa14SMarcelo Araujo 	if ((session_db = dbopen(NULL, O_RDWR, 0, DB_HASH, NULL)) == NULL) {
11568fae3551SRodney W. Grimes 		emergency("session database open: %s", strerror(errno));
11578fae3551SRodney W. Grimes 		return (1);
11588fae3551SRodney W. Grimes 	}
11598fae3551SRodney W. Grimes 	return (0);
11608fae3551SRodney W. Grimes 
11618fae3551SRodney W. Grimes }
11628fae3551SRodney W. Grimes 
11638fae3551SRodney W. Grimes /*
11648fae3551SRodney W. Grimes  * Add a new login session.
11658fae3551SRodney W. Grimes  */
116645cfb1dcSXin LI static void
116773bf18edSWarner Losh add_session(session_t *sp)
11688fae3551SRodney W. Grimes {
11698fae3551SRodney W. Grimes 	DBT key;
11708fae3551SRodney W. Grimes 	DBT data;
11718fae3551SRodney W. Grimes 
11728fae3551SRodney W. Grimes 	key.data = &sp->se_process;
11738fae3551SRodney W. Grimes 	key.size = sizeof sp->se_process;
11748fae3551SRodney W. Grimes 	data.data = &sp;
11758fae3551SRodney W. Grimes 	data.size = sizeof sp;
11768fae3551SRodney W. Grimes 
11778fae3551SRodney W. Grimes 	if ((*session_db->put)(session_db, &key, &data, 0))
11788fae3551SRodney W. Grimes 		emergency("insert %d: %s", sp->se_process, strerror(errno));
11798fae3551SRodney W. Grimes }
11808fae3551SRodney W. Grimes 
11818fae3551SRodney W. Grimes /*
11828fae3551SRodney W. Grimes  * Delete an old login session.
11838fae3551SRodney W. Grimes  */
118445cfb1dcSXin LI static void
118573bf18edSWarner Losh del_session(session_t *sp)
11868fae3551SRodney W. Grimes {
11878fae3551SRodney W. Grimes 	DBT key;
11888fae3551SRodney W. Grimes 
11898fae3551SRodney W. Grimes 	key.data = &sp->se_process;
11908fae3551SRodney W. Grimes 	key.size = sizeof sp->se_process;
11918fae3551SRodney W. Grimes 
11928fae3551SRodney W. Grimes 	if ((*session_db->del)(session_db, &key, 0))
11938fae3551SRodney W. Grimes 		emergency("delete %d: %s", sp->se_process, strerror(errno));
11948fae3551SRodney W. Grimes }
11958fae3551SRodney W. Grimes 
11968fae3551SRodney W. Grimes /*
11978fae3551SRodney W. Grimes  * Look up a login session by pid.
11988fae3551SRodney W. Grimes  */
119945cfb1dcSXin LI static session_t *
12008fae3551SRodney W. Grimes find_session(pid_t pid)
12018fae3551SRodney W. Grimes {
12028fae3551SRodney W. Grimes 	DBT key;
12038fae3551SRodney W. Grimes 	DBT data;
12048fae3551SRodney W. Grimes 	session_t *ret;
12058fae3551SRodney W. Grimes 
12068fae3551SRodney W. Grimes 	key.data = &pid;
12078fae3551SRodney W. Grimes 	key.size = sizeof pid;
12088fae3551SRodney W. Grimes 	if ((*session_db->get)(session_db, &key, &data, 0) != 0)
12098fae3551SRodney W. Grimes 		return 0;
12108fae3551SRodney W. Grimes 	bcopy(data.data, (char *)&ret, sizeof(ret));
12118fae3551SRodney W. Grimes 	return ret;
12128fae3551SRodney W. Grimes }
12138fae3551SRodney W. Grimes 
12148fae3551SRodney W. Grimes /*
12158fae3551SRodney W. Grimes  * Construct an argument vector from a command line.
12168fae3551SRodney W. Grimes  */
121745cfb1dcSXin LI static char **
121873bf18edSWarner Losh construct_argv(char *command)
12198fae3551SRodney W. Grimes {
12203d438ad6SDavid E. O'Brien 	int argc = 0;
12213d438ad6SDavid E. O'Brien 	char **argv = (char **) malloc(((strlen(command) + 1) / 2 + 1)
12228fae3551SRodney W. Grimes 						* sizeof (char *));
12238fae3551SRodney W. Grimes 
12242ef6931aSMarcelo Araujo 	if ((argv[argc++] = strk(command)) == NULL) {
12256be40c95SRuslan Ermilov 		free(argv);
12266be40c95SRuslan Ermilov 		return (NULL);
12276be40c95SRuslan Ermilov 	}
12288889c700SDavid Nugent 	while ((argv[argc++] = strk((char *) 0)) != NULL)
12298fae3551SRodney W. Grimes 		continue;
12308fae3551SRodney W. Grimes 	return argv;
12318fae3551SRodney W. Grimes }
12328fae3551SRodney W. Grimes 
12338fae3551SRodney W. Grimes /*
12348fae3551SRodney W. Grimes  * Deallocate a session descriptor.
12358fae3551SRodney W. Grimes  */
123645cfb1dcSXin LI static void
123773bf18edSWarner Losh free_session(session_t *sp)
12388fae3551SRodney W. Grimes {
12398fae3551SRodney W. Grimes 	free(sp->se_device);
12408fae3551SRodney W. Grimes 	if (sp->se_getty) {
12418fae3551SRodney W. Grimes 		free(sp->se_getty);
1242b5df27e2SAndrey A. Chernov 		free(sp->se_getty_argv_space);
12438fae3551SRodney W. Grimes 		free(sp->se_getty_argv);
12448fae3551SRodney W. Grimes 	}
12458fae3551SRodney W. Grimes 	if (sp->se_window) {
12468fae3551SRodney W. Grimes 		free(sp->se_window);
1247b5df27e2SAndrey A. Chernov 		free(sp->se_window_argv_space);
12488fae3551SRodney W. Grimes 		free(sp->se_window_argv);
12498fae3551SRodney W. Grimes 	}
1250b5df27e2SAndrey A. Chernov 	if (sp->se_type)
1251b5df27e2SAndrey A. Chernov 		free(sp->se_type);
12528fae3551SRodney W. Grimes 	free(sp);
12538fae3551SRodney W. Grimes }
12548fae3551SRodney W. Grimes 
12558fae3551SRodney W. Grimes /*
12568fae3551SRodney W. Grimes  * Allocate a new session descriptor.
1257b0b670eeSAlfred Perlstein  * Mark it SE_PRESENT.
12588fae3551SRodney W. Grimes  */
125945cfb1dcSXin LI static session_t *
12600b57dd6bSJilles Tjoelker new_session(session_t *sprev, struct ttyent *typ)
12618fae3551SRodney W. Grimes {
12623d438ad6SDavid E. O'Brien 	session_t *sp;
12634cbf8903SPaul Traina 	int fd;
12648fae3551SRodney W. Grimes 
12658fae3551SRodney W. Grimes 	if ((typ->ty_status & TTY_ON) == 0 ||
12668fae3551SRodney W. Grimes 	    typ->ty_name == 0 ||
12678fae3551SRodney W. Grimes 	    typ->ty_getty == 0)
12688fae3551SRodney W. Grimes 		return 0;
12698fae3551SRodney W. Grimes 
12701054bb1eSAndrey A. Chernov 	sp = (session_t *) calloc(1, sizeof (session_t));
12718fae3551SRodney W. Grimes 
1272b0b670eeSAlfred Perlstein 	sp->se_flags |= SE_PRESENT;
12738fae3551SRodney W. Grimes 
12748fae3551SRodney W. Grimes 	sp->se_device = malloc(sizeof(_PATH_DEV) + strlen(typ->ty_name));
1275091abe40SDavid E. O'Brien 	sprintf(sp->se_device, "%s%s", _PATH_DEV, typ->ty_name);
12768fae3551SRodney W. Grimes 
12774cbf8903SPaul Traina 	/*
12784cbf8903SPaul Traina 	 * Attempt to open the device, if we get "device not configured"
12794cbf8903SPaul Traina 	 * then don't add the device to the session list.
12804cbf8903SPaul Traina 	 */
12814cbf8903SPaul Traina 	if ((fd = open(sp->se_device, O_RDONLY | O_NONBLOCK, 0)) < 0) {
128289e3b380SWarner Losh 		if (errno == ENXIO) {
12834cbf8903SPaul Traina 			free_session(sp);
12844cbf8903SPaul Traina 			return (0);
12854cbf8903SPaul Traina 		}
12864cbf8903SPaul Traina 	} else
12874cbf8903SPaul Traina 		close(fd);
12884cbf8903SPaul Traina 
12898fae3551SRodney W. Grimes 	if (setupargv(sp, typ) == 0) {
12908fae3551SRodney W. Grimes 		free_session(sp);
12918fae3551SRodney W. Grimes 		return (0);
12928fae3551SRodney W. Grimes 	}
12938fae3551SRodney W. Grimes 
12948fae3551SRodney W. Grimes 	sp->se_next = 0;
129514adaa14SMarcelo Araujo 	if (sprev == NULL) {
12968fae3551SRodney W. Grimes 		sessions = sp;
12978fae3551SRodney W. Grimes 		sp->se_prev = 0;
12988fae3551SRodney W. Grimes 	} else {
12998fae3551SRodney W. Grimes 		sprev->se_next = sp;
13008fae3551SRodney W. Grimes 		sp->se_prev = sprev;
13018fae3551SRodney W. Grimes 	}
13028fae3551SRodney W. Grimes 
13038fae3551SRodney W. Grimes 	return sp;
13048fae3551SRodney W. Grimes }
13058fae3551SRodney W. Grimes 
13068fae3551SRodney W. Grimes /*
13078fae3551SRodney W. Grimes  * Calculate getty and if useful window argv vectors.
13088fae3551SRodney W. Grimes  */
130945cfb1dcSXin LI static int
131073bf18edSWarner Losh setupargv(session_t *sp, struct ttyent *typ)
13118fae3551SRodney W. Grimes {
13128fae3551SRodney W. Grimes 
13138fae3551SRodney W. Grimes 	if (sp->se_getty) {
13148fae3551SRodney W. Grimes 		free(sp->se_getty);
1315b5df27e2SAndrey A. Chernov 		free(sp->se_getty_argv_space);
13168fae3551SRodney W. Grimes 		free(sp->se_getty_argv);
13178fae3551SRodney W. Grimes 	}
13188fae3551SRodney W. Grimes 	sp->se_getty = malloc(strlen(typ->ty_getty) + strlen(typ->ty_name) + 2);
1319091abe40SDavid E. O'Brien 	sprintf(sp->se_getty, "%s %s", typ->ty_getty, typ->ty_name);
1320b5df27e2SAndrey A. Chernov 	sp->se_getty_argv_space = strdup(sp->se_getty);
1321b5df27e2SAndrey A. Chernov 	sp->se_getty_argv = construct_argv(sp->se_getty_argv_space);
132214adaa14SMarcelo Araujo 	if (sp->se_getty_argv == NULL) {
13238fae3551SRodney W. Grimes 		warning("can't parse getty for port %s", sp->se_device);
13248fae3551SRodney W. Grimes 		free(sp->se_getty);
1325b5df27e2SAndrey A. Chernov 		free(sp->se_getty_argv_space);
1326b5df27e2SAndrey A. Chernov 		sp->se_getty = sp->se_getty_argv_space = 0;
13278fae3551SRodney W. Grimes 		return (0);
13288fae3551SRodney W. Grimes 	}
1329b5df27e2SAndrey A. Chernov 	if (sp->se_window) {
13308fae3551SRodney W. Grimes 		free(sp->se_window);
1331b5df27e2SAndrey A. Chernov 		free(sp->se_window_argv_space);
1332b5df27e2SAndrey A. Chernov 		free(sp->se_window_argv);
1333b5df27e2SAndrey A. Chernov 	}
1334b5df27e2SAndrey A. Chernov 	sp->se_window = sp->se_window_argv_space = 0;
1335b5df27e2SAndrey A. Chernov 	sp->se_window_argv = 0;
1336b5df27e2SAndrey A. Chernov 	if (typ->ty_window) {
13378fae3551SRodney W. Grimes 		sp->se_window = strdup(typ->ty_window);
1338b5df27e2SAndrey A. Chernov 		sp->se_window_argv_space = strdup(sp->se_window);
1339b5df27e2SAndrey A. Chernov 		sp->se_window_argv = construct_argv(sp->se_window_argv_space);
134014adaa14SMarcelo Araujo 		if (sp->se_window_argv == NULL) {
13418fae3551SRodney W. Grimes 			warning("can't parse window for port %s",
13428fae3551SRodney W. Grimes 			    sp->se_device);
1343b5df27e2SAndrey A. Chernov 			free(sp->se_window_argv_space);
13448fae3551SRodney W. Grimes 			free(sp->se_window);
1345b5df27e2SAndrey A. Chernov 			sp->se_window = sp->se_window_argv_space = 0;
13468fae3551SRodney W. Grimes 			return (0);
13478fae3551SRodney W. Grimes 		}
13488fae3551SRodney W. Grimes 	}
1349b5df27e2SAndrey A. Chernov 	if (sp->se_type)
1350b5df27e2SAndrey A. Chernov 		free(sp->se_type);
1351b5df27e2SAndrey A. Chernov 	sp->se_type = typ->ty_type ? strdup(typ->ty_type) : 0;
13528fae3551SRodney W. Grimes 	return (1);
13538fae3551SRodney W. Grimes }
13548fae3551SRodney W. Grimes 
13558fae3551SRodney W. Grimes /*
13568fae3551SRodney W. Grimes  * Walk the list of ttys and create sessions for each active line.
13578fae3551SRodney W. Grimes  */
135845cfb1dcSXin LI static state_func_t
135973bf18edSWarner Losh read_ttys(void)
13608fae3551SRodney W. Grimes {
13613d438ad6SDavid E. O'Brien 	session_t *sp, *snext;
13623d438ad6SDavid E. O'Brien 	struct ttyent *typ;
13638fae3551SRodney W. Grimes 
13648fae3551SRodney W. Grimes 	/*
13658fae3551SRodney W. Grimes 	 * Destroy any previous session state.
13668fae3551SRodney W. Grimes 	 * There shouldn't be any, but just in case...
13678fae3551SRodney W. Grimes 	 */
13688fae3551SRodney W. Grimes 	for (sp = sessions; sp; sp = snext) {
13698fae3551SRodney W. Grimes 		snext = sp->se_next;
13708fae3551SRodney W. Grimes 		free_session(sp);
13718fae3551SRodney W. Grimes 	}
13728fae3551SRodney W. Grimes 	sessions = 0;
13738fae3551SRodney W. Grimes 	if (start_session_db())
13748fae3551SRodney W. Grimes 		return (state_func_t) single_user;
13758fae3551SRodney W. Grimes 
13768fae3551SRodney W. Grimes 	/*
13778fae3551SRodney W. Grimes 	 * Allocate a session entry for each active port.
13788fae3551SRodney W. Grimes 	 * Note that sp starts at 0.
13798fae3551SRodney W. Grimes 	 */
13808889c700SDavid Nugent 	while ((typ = getttyent()) != NULL)
13810b57dd6bSJilles Tjoelker 		if ((snext = new_session(sp, typ)) != NULL)
13828fae3551SRodney W. Grimes 			sp = snext;
13838fae3551SRodney W. Grimes 
13848fae3551SRodney W. Grimes 	endttyent();
13858fae3551SRodney W. Grimes 
13868fae3551SRodney W. Grimes 	return (state_func_t) multi_user;
13878fae3551SRodney W. Grimes }
13888fae3551SRodney W. Grimes 
13898fae3551SRodney W. Grimes /*
13908fae3551SRodney W. Grimes  * Start a window system running.
13918fae3551SRodney W. Grimes  */
139245cfb1dcSXin LI static void
139373bf18edSWarner Losh start_window_system(session_t *sp)
13948fae3551SRodney W. Grimes {
13958fae3551SRodney W. Grimes 	pid_t pid;
13968fae3551SRodney W. Grimes 	sigset_t mask;
1397b5df27e2SAndrey A. Chernov 	char term[64], *env[2];
13985010c3b6SKonstantin Belousov 	int status;
13998fae3551SRodney W. Grimes 
14008fae3551SRodney W. Grimes 	if ((pid = fork()) == -1) {
14018fae3551SRodney W. Grimes 		emergency("can't fork for window system on port %s: %m",
14028fae3551SRodney W. Grimes 		    sp->se_device);
14038fae3551SRodney W. Grimes 		/* hope that getty fails and we can try again */
14048fae3551SRodney W. Grimes 		return;
14058fae3551SRodney W. Grimes 	}
1406091abe40SDavid E. O'Brien 	if (pid) {
14075010c3b6SKonstantin Belousov 		waitpid(-1, &status, 0);
14088fae3551SRodney W. Grimes 		return;
14095010c3b6SKonstantin Belousov 	}
14105010c3b6SKonstantin Belousov 
14115010c3b6SKonstantin Belousov 	/* reparent window process to the init to not make a zombie on exit */
14125010c3b6SKonstantin Belousov 	if ((pid = fork()) == -1) {
14135010c3b6SKonstantin Belousov 		emergency("can't fork for window system on port %s: %m",
14145010c3b6SKonstantin Belousov 		    sp->se_device);
14155010c3b6SKonstantin Belousov 		_exit(1);
14165010c3b6SKonstantin Belousov 	}
14175010c3b6SKonstantin Belousov 	if (pid)
14185010c3b6SKonstantin Belousov 		_exit(0);
14198fae3551SRodney W. Grimes 
14208fae3551SRodney W. Grimes 	sigemptyset(&mask);
14218fae3551SRodney W. Grimes 	sigprocmask(SIG_SETMASK, &mask, (sigset_t *) 0);
14228fae3551SRodney W. Grimes 
14238fae3551SRodney W. Grimes 	if (setsid() < 0)
14248fae3551SRodney W. Grimes 		emergency("setsid failed (window) %m");
14258fae3551SRodney W. Grimes 
14261ef60eb1SDavid Nugent #ifdef LOGIN_CAP
14271ef60eb1SDavid Nugent 	setprocresources(RESOURCE_WINDOW);
14281ef60eb1SDavid Nugent #endif
1429b5df27e2SAndrey A. Chernov 	if (sp->se_type) {
1430b5df27e2SAndrey A. Chernov 		/* Don't use malloc after fork */
1431b5df27e2SAndrey A. Chernov 		strcpy(term, "TERM=");
143233a20f82SDavid Greenman 		strncat(term, sp->se_type, sizeof(term) - 6);
1433b5df27e2SAndrey A. Chernov 		env[0] = term;
1434b5df27e2SAndrey A. Chernov 		env[1] = 0;
1435b5df27e2SAndrey A. Chernov 	}
1436b5df27e2SAndrey A. Chernov 	else
1437b5df27e2SAndrey A. Chernov 		env[0] = 0;
1438b5df27e2SAndrey A. Chernov 	execve(sp->se_window_argv[0], sp->se_window_argv, env);
14398fae3551SRodney W. Grimes 	stall("can't exec window system '%s' for port %s: %m",
14408fae3551SRodney W. Grimes 		sp->se_window_argv[0], sp->se_device);
14418fae3551SRodney W. Grimes 	_exit(1);
14428fae3551SRodney W. Grimes }
14438fae3551SRodney W. Grimes 
14448fae3551SRodney W. Grimes /*
14458fae3551SRodney W. Grimes  * Start a login session running.
14468fae3551SRodney W. Grimes  */
144745cfb1dcSXin LI static pid_t
144873bf18edSWarner Losh start_getty(session_t *sp)
14498fae3551SRodney W. Grimes {
14508fae3551SRodney W. Grimes 	pid_t pid;
14518fae3551SRodney W. Grimes 	sigset_t mask;
14528fae3551SRodney W. Grimes 	time_t current_time = time((time_t *) 0);
1453228d7ef2SAndrey A. Chernov 	int too_quick = 0;
1454b5df27e2SAndrey A. Chernov 	char term[64], *env[2];
14558fae3551SRodney W. Grimes 
1456bb2e87c4SMike Pritchard 	if (current_time >= sp->se_started &&
1457228d7ef2SAndrey A. Chernov 	    current_time - sp->se_started < GETTY_SPACING) {
1458228d7ef2SAndrey A. Chernov 		if (++sp->se_nspace > GETTY_NSPACE) {
1459228d7ef2SAndrey A. Chernov 			sp->se_nspace = 0;
1460228d7ef2SAndrey A. Chernov 			too_quick = 1;
1461228d7ef2SAndrey A. Chernov 		}
1462228d7ef2SAndrey A. Chernov 	} else
1463228d7ef2SAndrey A. Chernov 		sp->se_nspace = 0;
1464228d7ef2SAndrey A. Chernov 
14658fae3551SRodney W. Grimes 	/*
14668fae3551SRodney W. Grimes 	 * fork(), not vfork() -- we can't afford to block.
14678fae3551SRodney W. Grimes 	 */
14688fae3551SRodney W. Grimes 	if ((pid = fork()) == -1) {
14698fae3551SRodney W. Grimes 		emergency("can't fork for getty on port %s: %m", sp->se_device);
14708fae3551SRodney W. Grimes 		return -1;
14718fae3551SRodney W. Grimes 	}
14728fae3551SRodney W. Grimes 
14738fae3551SRodney W. Grimes 	if (pid)
14748fae3551SRodney W. Grimes 		return pid;
14758fae3551SRodney W. Grimes 
1476228d7ef2SAndrey A. Chernov 	if (too_quick) {
1477b5df27e2SAndrey A. Chernov 		warning("getty repeating too quickly on port %s, sleeping %d secs",
1478b5df27e2SAndrey A. Chernov 		    sp->se_device, GETTY_SLEEP);
14798fae3551SRodney W. Grimes 		sleep((unsigned) GETTY_SLEEP);
14808fae3551SRodney W. Grimes 	}
14818fae3551SRodney W. Grimes 
14828fae3551SRodney W. Grimes 	if (sp->se_window) {
14838fae3551SRodney W. Grimes 		start_window_system(sp);
14848fae3551SRodney W. Grimes 		sleep(WINDOW_WAIT);
14858fae3551SRodney W. Grimes 	}
14868fae3551SRodney W. Grimes 
14878fae3551SRodney W. Grimes 	sigemptyset(&mask);
14888fae3551SRodney W. Grimes 	sigprocmask(SIG_SETMASK, &mask, (sigset_t *) 0);
14898fae3551SRodney W. Grimes 
14901ef60eb1SDavid Nugent #ifdef LOGIN_CAP
14911ef60eb1SDavid Nugent 	setprocresources(RESOURCE_GETTY);
14921ef60eb1SDavid Nugent #endif
1493b5df27e2SAndrey A. Chernov 	if (sp->se_type) {
1494b5df27e2SAndrey A. Chernov 		/* Don't use malloc after fork */
1495b5df27e2SAndrey A. Chernov 		strcpy(term, "TERM=");
149633a20f82SDavid Greenman 		strncat(term, sp->se_type, sizeof(term) - 6);
1497b5df27e2SAndrey A. Chernov 		env[0] = term;
1498b5df27e2SAndrey A. Chernov 		env[1] = 0;
1499091abe40SDavid E. O'Brien 	} else
1500b5df27e2SAndrey A. Chernov 		env[0] = 0;
1501b5df27e2SAndrey A. Chernov 	execve(sp->se_getty_argv[0], sp->se_getty_argv, env);
15028fae3551SRodney W. Grimes 	stall("can't exec getty '%s' for port %s: %m",
15038fae3551SRodney W. Grimes 		sp->se_getty_argv[0], sp->se_device);
15048fae3551SRodney W. Grimes 	_exit(1);
15058fae3551SRodney W. Grimes }
15068fae3551SRodney W. Grimes 
15078fae3551SRodney W. Grimes /*
15088fae3551SRodney W. Grimes  * Collect exit status for a child.
15098fae3551SRodney W. Grimes  * If an exiting login, start a new login running.
15108fae3551SRodney W. Grimes  */
151145cfb1dcSXin LI static void
15128fae3551SRodney W. Grimes collect_child(pid_t pid)
15138fae3551SRodney W. Grimes {
15143d438ad6SDavid E. O'Brien 	session_t *sp, *sprev, *snext;
15158fae3551SRodney W. Grimes 
15168fae3551SRodney W. Grimes 	if (! sessions)
15178fae3551SRodney W. Grimes 		return;
15188fae3551SRodney W. Grimes 
15198fae3551SRodney W. Grimes 	if (! (sp = find_session(pid)))
15208fae3551SRodney W. Grimes 		return;
15218fae3551SRodney W. Grimes 
15228fae3551SRodney W. Grimes 	del_session(sp);
15238fae3551SRodney W. Grimes 	sp->se_process = 0;
15248fae3551SRodney W. Grimes 
15258fae3551SRodney W. Grimes 	if (sp->se_flags & SE_SHUTDOWN) {
15268889c700SDavid Nugent 		if ((sprev = sp->se_prev) != NULL)
15278fae3551SRodney W. Grimes 			sprev->se_next = sp->se_next;
15288fae3551SRodney W. Grimes 		else
15298fae3551SRodney W. Grimes 			sessions = sp->se_next;
15308889c700SDavid Nugent 		if ((snext = sp->se_next) != NULL)
15318fae3551SRodney W. Grimes 			snext->se_prev = sp->se_prev;
15328fae3551SRodney W. Grimes 		free_session(sp);
15338fae3551SRodney W. Grimes 		return;
15348fae3551SRodney W. Grimes 	}
15358fae3551SRodney W. Grimes 
15368fae3551SRodney W. Grimes 	if ((pid = start_getty(sp)) == -1) {
15378fae3551SRodney W. Grimes 		/* serious trouble */
15388fae3551SRodney W. Grimes 		requested_transition = clean_ttys;
15398fae3551SRodney W. Grimes 		return;
15408fae3551SRodney W. Grimes 	}
15418fae3551SRodney W. Grimes 
15428fae3551SRodney W. Grimes 	sp->se_process = pid;
15438fae3551SRodney W. Grimes 	sp->se_started = time((time_t *) 0);
15448fae3551SRodney W. Grimes 	add_session(sp);
15458fae3551SRodney W. Grimes }
15468fae3551SRodney W. Grimes 
15478fae3551SRodney W. Grimes /*
15488fae3551SRodney W. Grimes  * Catch a signal and request a state transition.
15498fae3551SRodney W. Grimes  */
155045cfb1dcSXin LI static void
155173bf18edSWarner Losh transition_handler(int sig)
15528fae3551SRodney W. Grimes {
15538fae3551SRodney W. Grimes 
15548fae3551SRodney W. Grimes 	switch (sig) {
15558fae3551SRodney W. Grimes 	case SIGHUP:
1556acf0ab06SJilles Tjoelker 		if (current_state == read_ttys || current_state == multi_user ||
1557acf0ab06SJilles Tjoelker 		    current_state == clean_ttys || current_state == catatonia)
15588fae3551SRodney W. Grimes 			requested_transition = clean_ttys;
15598fae3551SRodney W. Grimes 		break;
1560a0a549c7SRuslan Ermilov 	case SIGUSR2:
1561a0a549c7SRuslan Ermilov 		howto = RB_POWEROFF;
1562a0a549c7SRuslan Ermilov 	case SIGUSR1:
1563a0a549c7SRuslan Ermilov 		howto |= RB_HALT;
1564e460cfd3SNate Williams 	case SIGINT:
1565db8ad19dSJordan K. Hubbard 		Reboot = TRUE;
15668fae3551SRodney W. Grimes 	case SIGTERM:
1567acf0ab06SJilles Tjoelker 		if (current_state == read_ttys || current_state == multi_user ||
1568acf0ab06SJilles Tjoelker 		    current_state == clean_ttys || current_state == catatonia)
15698fae3551SRodney W. Grimes 			requested_transition = death;
1570acf0ab06SJilles Tjoelker 		else
1571acf0ab06SJilles Tjoelker 			requested_transition = death_single;
15728fae3551SRodney W. Grimes 		break;
15738fae3551SRodney W. Grimes 	case SIGTSTP:
1574acf0ab06SJilles Tjoelker 		if (current_state == runcom || current_state == read_ttys ||
1575acf0ab06SJilles Tjoelker 		    current_state == clean_ttys ||
1576acf0ab06SJilles Tjoelker 		    current_state == multi_user || current_state == catatonia)
15778fae3551SRodney W. Grimes 			requested_transition = catatonia;
15788fae3551SRodney W. Grimes 		break;
15793f5ac575SEdward Tomasz Napierala 	case SIGEMT:
15803f5ac575SEdward Tomasz Napierala 		requested_transition = reroot;
15813f5ac575SEdward Tomasz Napierala 		break;
15828fae3551SRodney W. Grimes 	default:
15838fae3551SRodney W. Grimes 		requested_transition = 0;
15848fae3551SRodney W. Grimes 		break;
15858fae3551SRodney W. Grimes 	}
15868fae3551SRodney W. Grimes }
15878fae3551SRodney W. Grimes 
15888fae3551SRodney W. Grimes /*
15898fae3551SRodney W. Grimes  * Take the system multiuser.
15908fae3551SRodney W. Grimes  */
159145cfb1dcSXin LI static state_func_t
159273bf18edSWarner Losh multi_user(void)
15938fae3551SRodney W. Grimes {
15948fae3551SRodney W. Grimes 	pid_t pid;
15953d438ad6SDavid E. O'Brien 	session_t *sp;
15968fae3551SRodney W. Grimes 
15978fae3551SRodney W. Grimes 	requested_transition = 0;
15988fae3551SRodney W. Grimes 
15998fae3551SRodney W. Grimes 	/*
16008fae3551SRodney W. Grimes 	 * If the administrator has not set the security level to -1
16018fae3551SRodney W. Grimes 	 * to indicate that the kernel should not run multiuser in secure
16028fae3551SRodney W. Grimes 	 * mode, and the run script has not set a higher level of security
16038fae3551SRodney W. Grimes 	 * than level 1, then put the kernel into secure mode.
16048fae3551SRodney W. Grimes 	 */
16058fae3551SRodney W. Grimes 	if (getsecuritylevel() == 0)
16068fae3551SRodney W. Grimes 		setsecuritylevel(1);
16078fae3551SRodney W. Grimes 
16088fae3551SRodney W. Grimes 	for (sp = sessions; sp; sp = sp->se_next) {
16098fae3551SRodney W. Grimes 		if (sp->se_process)
16108fae3551SRodney W. Grimes 			continue;
16118fae3551SRodney W. Grimes 		if ((pid = start_getty(sp)) == -1) {
16128fae3551SRodney W. Grimes 			/* serious trouble */
16138fae3551SRodney W. Grimes 			requested_transition = clean_ttys;
16148fae3551SRodney W. Grimes 			break;
16158fae3551SRodney W. Grimes 		}
16168fae3551SRodney W. Grimes 		sp->se_process = pid;
16178fae3551SRodney W. Grimes 		sp->se_started = time((time_t *) 0);
16188fae3551SRodney W. Grimes 		add_session(sp);
16198fae3551SRodney W. Grimes 	}
16208fae3551SRodney W. Grimes 
16218fae3551SRodney W. Grimes 	while (!requested_transition)
16228fae3551SRodney W. Grimes 		if ((pid = waitpid(-1, (int *) 0, 0)) != -1)
16238fae3551SRodney W. Grimes 			collect_child(pid);
16248fae3551SRodney W. Grimes 
16258fae3551SRodney W. Grimes 	return (state_func_t) requested_transition;
16268fae3551SRodney W. Grimes }
16278fae3551SRodney W. Grimes 
16288fae3551SRodney W. Grimes /*
1629b0b670eeSAlfred Perlstein  * This is an (n*2)+(n^2) algorithm.  We hope it isn't run often...
16308fae3551SRodney W. Grimes  */
163145cfb1dcSXin LI static state_func_t
163273bf18edSWarner Losh clean_ttys(void)
16338fae3551SRodney W. Grimes {
16343d438ad6SDavid E. O'Brien 	session_t *sp, *sprev;
16353d438ad6SDavid E. O'Brien 	struct ttyent *typ;
16363d438ad6SDavid E. O'Brien 	int devlen;
1637b5df27e2SAndrey A. Chernov 	char *old_getty, *old_window, *old_type;
16388fae3551SRodney W. Grimes 
1639b0b670eeSAlfred Perlstein 	/*
1640b0b670eeSAlfred Perlstein 	 * mark all sessions for death, (!SE_PRESENT)
1641b0b670eeSAlfred Perlstein 	 * as we find or create new ones they'll be marked as keepers,
1642b0b670eeSAlfred Perlstein 	 * we'll later nuke all the ones not found in /etc/ttys
1643b0b670eeSAlfred Perlstein 	 */
1644b0b670eeSAlfred Perlstein 	for (sp = sessions; sp != NULL; sp = sp->se_next)
1645b0b670eeSAlfred Perlstein 		sp->se_flags &= ~SE_PRESENT;
1646b0b670eeSAlfred Perlstein 
16478fae3551SRodney W. Grimes 	devlen = sizeof(_PATH_DEV) - 1;
16488889c700SDavid Nugent 	while ((typ = getttyent()) != NULL) {
16498fae3551SRodney W. Grimes 		for (sprev = 0, sp = sessions; sp; sprev = sp, sp = sp->se_next)
16508fae3551SRodney W. Grimes 			if (strcmp(typ->ty_name, sp->se_device + devlen) == 0)
16518fae3551SRodney W. Grimes 				break;
16528fae3551SRodney W. Grimes 
16538fae3551SRodney W. Grimes 		if (sp) {
1654b0b670eeSAlfred Perlstein 			/* we want this one to live */
1655b0b670eeSAlfred Perlstein 			sp->se_flags |= SE_PRESENT;
16568fae3551SRodney W. Grimes 			if ((typ->ty_status & TTY_ON) == 0 ||
16578fae3551SRodney W. Grimes 			    typ->ty_getty == 0) {
16588fae3551SRodney W. Grimes 				sp->se_flags |= SE_SHUTDOWN;
16598fae3551SRodney W. Grimes 				kill(sp->se_process, SIGHUP);
16608fae3551SRodney W. Grimes 				continue;
16618fae3551SRodney W. Grimes 			}
16628fae3551SRodney W. Grimes 			sp->se_flags &= ~SE_SHUTDOWN;
1663b5df27e2SAndrey A. Chernov 			old_getty = sp->se_getty ? strdup(sp->se_getty) : 0;
1664b5df27e2SAndrey A. Chernov 			old_window = sp->se_window ? strdup(sp->se_window) : 0;
1665b5df27e2SAndrey A. Chernov 			old_type = sp->se_type ? strdup(sp->se_type) : 0;
16668fae3551SRodney W. Grimes 			if (setupargv(sp, typ) == 0) {
16678fae3551SRodney W. Grimes 				warning("can't parse getty for port %s",
16688fae3551SRodney W. Grimes 					sp->se_device);
16698fae3551SRodney W. Grimes 				sp->se_flags |= SE_SHUTDOWN;
16708fae3551SRodney W. Grimes 				kill(sp->se_process, SIGHUP);
16718fae3551SRodney W. Grimes 			}
1672b5df27e2SAndrey A. Chernov 			else if (   !old_getty
16738889c700SDavid Nugent 				 || (!old_type && sp->se_type)
16748889c700SDavid Nugent 				 || (old_type && !sp->se_type)
16758889c700SDavid Nugent 				 || (!old_window && sp->se_window)
16768889c700SDavid Nugent 				 || (old_window && !sp->se_window)
16778889c700SDavid Nugent 				 || (strcmp(old_getty, sp->se_getty) != 0)
16788889c700SDavid Nugent 				 || (old_window && strcmp(old_window, sp->se_window) != 0)
16798889c700SDavid Nugent 				 || (old_type && strcmp(old_type, sp->se_type) != 0)
1680b5df27e2SAndrey A. Chernov 				) {
1681b5df27e2SAndrey A. Chernov 				/* Don't set SE_SHUTDOWN here */
1682b5df27e2SAndrey A. Chernov 				sp->se_nspace = 0;
1683b5df27e2SAndrey A. Chernov 				sp->se_started = 0;
1684b5df27e2SAndrey A. Chernov 				kill(sp->se_process, SIGHUP);
1685b5df27e2SAndrey A. Chernov 			}
1686b5df27e2SAndrey A. Chernov 			if (old_getty)
1687b5df27e2SAndrey A. Chernov 				free(old_getty);
16882d887af5SMike Heffner 			if (old_window)
1689b5df27e2SAndrey A. Chernov 				free(old_window);
1690b5df27e2SAndrey A. Chernov 			if (old_type)
1691b5df27e2SAndrey A. Chernov 				free(old_type);
16928fae3551SRodney W. Grimes 			continue;
16938fae3551SRodney W. Grimes 		}
16948fae3551SRodney W. Grimes 
16950b57dd6bSJilles Tjoelker 		new_session(sprev, typ);
16968fae3551SRodney W. Grimes 	}
16978fae3551SRodney W. Grimes 
16988fae3551SRodney W. Grimes 	endttyent();
16998fae3551SRodney W. Grimes 
1700b0b670eeSAlfred Perlstein 	/*
1701b0b670eeSAlfred Perlstein 	 * sweep through and kill all deleted sessions
1702b0b670eeSAlfred Perlstein 	 * ones who's /etc/ttys line was deleted (SE_PRESENT unset)
1703b0b670eeSAlfred Perlstein 	 */
1704b0b670eeSAlfred Perlstein 	for (sp = sessions; sp != NULL; sp = sp->se_next) {
1705b0b670eeSAlfred Perlstein 		if ((sp->se_flags & SE_PRESENT) == 0) {
1706b0b670eeSAlfred Perlstein 			sp->se_flags |= SE_SHUTDOWN;
1707b0b670eeSAlfred Perlstein 			kill(sp->se_process, SIGHUP);
1708b0b670eeSAlfred Perlstein 		}
1709b0b670eeSAlfred Perlstein 	}
1710b0b670eeSAlfred Perlstein 
17118fae3551SRodney W. Grimes 	return (state_func_t) multi_user;
17128fae3551SRodney W. Grimes }
17138fae3551SRodney W. Grimes 
17148fae3551SRodney W. Grimes /*
17158fae3551SRodney W. Grimes  * Block further logins.
17168fae3551SRodney W. Grimes  */
171745cfb1dcSXin LI static state_func_t
171873bf18edSWarner Losh catatonia(void)
17198fae3551SRodney W. Grimes {
17203d438ad6SDavid E. O'Brien 	session_t *sp;
17218fae3551SRodney W. Grimes 
17228fae3551SRodney W. Grimes 	for (sp = sessions; sp; sp = sp->se_next)
17238fae3551SRodney W. Grimes 		sp->se_flags |= SE_SHUTDOWN;
17248fae3551SRodney W. Grimes 
17258fae3551SRodney W. Grimes 	return (state_func_t) multi_user;
17268fae3551SRodney W. Grimes }
17278fae3551SRodney W. Grimes 
17288fae3551SRodney W. Grimes /*
17298fae3551SRodney W. Grimes  * Note SIGALRM.
17308fae3551SRodney W. Grimes  */
173145cfb1dcSXin LI static void
173273bf18edSWarner Losh alrm_handler(int sig)
17338fae3551SRodney W. Grimes {
1734091abe40SDavid E. O'Brien 
17358889c700SDavid Nugent 	(void)sig;
17368fae3551SRodney W. Grimes 	clang = 1;
17378fae3551SRodney W. Grimes }
17388fae3551SRodney W. Grimes 
17398fae3551SRodney W. Grimes /*
17408fae3551SRodney W. Grimes  * Bring the system down to single user.
17418fae3551SRodney W. Grimes  */
174245cfb1dcSXin LI static state_func_t
174373bf18edSWarner Losh death(void)
17448fae3551SRodney W. Grimes {
17452eb0015aSColin Percival 	int block, blocked;
17462eb0015aSColin Percival 	size_t len;
17472eb0015aSColin Percival 
17482eb0015aSColin Percival 	/* Temporarily block suspend. */
17492eb0015aSColin Percival 	len = sizeof(blocked);
17502eb0015aSColin Percival 	block = 1;
17512eb0015aSColin Percival 	if (sysctlbyname("kern.suspend_blocked", &blocked, &len,
17522eb0015aSColin Percival 	    &block, sizeof(block)) == -1)
17532eb0015aSColin Percival 		blocked = 0;
17548fae3551SRodney W. Grimes 
17554ae35b5dSEd Schouten 	/*
17564ae35b5dSEd Schouten 	 * Also revoke the TTY here.  Because runshutdown() may reopen
17574ae35b5dSEd Schouten 	 * the TTY whose getty we're killing here, there is no guarantee
17584ae35b5dSEd Schouten 	 * runshutdown() will perform the initial open() call, causing
17594ae35b5dSEd Schouten 	 * the terminal attributes to be misconfigured.
17604ae35b5dSEd Schouten 	 */
17613f5ac575SEdward Tomasz Napierala 	revoke_ttys();
17628fae3551SRodney W. Grimes 
17638889c700SDavid Nugent 	/* Try to run the rc.shutdown script within a period of time */
1764091abe40SDavid E. O'Brien 	runshutdown();
17658889c700SDavid Nugent 
17662eb0015aSColin Percival 	/* Unblock suspend if we blocked it. */
17672eb0015aSColin Percival 	if (!blocked)
17682eb0015aSColin Percival 		sysctlbyname("kern.suspend_blocked", NULL, NULL,
17692eb0015aSColin Percival 		    &blocked, sizeof(blocked));
17702eb0015aSColin Percival 
1771acf0ab06SJilles Tjoelker 	return (state_func_t) death_single;
1772acf0ab06SJilles Tjoelker }
1773acf0ab06SJilles Tjoelker 
1774acf0ab06SJilles Tjoelker /*
1775acf0ab06SJilles Tjoelker  * Do what is necessary to reinitialize single user mode or reboot
1776acf0ab06SJilles Tjoelker  * from an incomplete state.
1777acf0ab06SJilles Tjoelker  */
1778acf0ab06SJilles Tjoelker static state_func_t
1779acf0ab06SJilles Tjoelker death_single(void)
1780acf0ab06SJilles Tjoelker {
1781acf0ab06SJilles Tjoelker 	int i;
1782acf0ab06SJilles Tjoelker 	pid_t pid;
1783acf0ab06SJilles Tjoelker 	static const int death_sigs[2] = { SIGTERM, SIGKILL };
1784acf0ab06SJilles Tjoelker 
1785acf0ab06SJilles Tjoelker 	revoke(_PATH_CONSOLE);
1786acf0ab06SJilles Tjoelker 
1787c3d7c52eSAndrey A. Chernov 	for (i = 0; i < 2; ++i) {
17888fae3551SRodney W. Grimes 		if (kill(-1, death_sigs[i]) == -1 && errno == ESRCH)
17898fae3551SRodney W. Grimes 			return (state_func_t) single_user;
17908fae3551SRodney W. Grimes 
17918fae3551SRodney W. Grimes 		clang = 0;
17928fae3551SRodney W. Grimes 		alarm(DEATH_WATCH);
17938fae3551SRodney W. Grimes 		do
17948fae3551SRodney W. Grimes 			if ((pid = waitpid(-1, (int *)0, 0)) != -1)
17958fae3551SRodney W. Grimes 				collect_child(pid);
17968fae3551SRodney W. Grimes 		while (clang == 0 && errno != ECHILD);
17978fae3551SRodney W. Grimes 
17988fae3551SRodney W. Grimes 		if (errno == ECHILD)
17998fae3551SRodney W. Grimes 			return (state_func_t) single_user;
18008fae3551SRodney W. Grimes 	}
18018fae3551SRodney W. Grimes 
18028fae3551SRodney W. Grimes 	warning("some processes would not die; ps axl advised");
18038fae3551SRodney W. Grimes 
18048fae3551SRodney W. Grimes 	return (state_func_t) single_user;
18058fae3551SRodney W. Grimes }
18068889c700SDavid Nugent 
18073f5ac575SEdward Tomasz Napierala static void
18083f5ac575SEdward Tomasz Napierala revoke_ttys(void)
18093f5ac575SEdward Tomasz Napierala {
18103f5ac575SEdward Tomasz Napierala 	session_t *sp;
18113f5ac575SEdward Tomasz Napierala 
18123f5ac575SEdward Tomasz Napierala 	for (sp = sessions; sp; sp = sp->se_next) {
18133f5ac575SEdward Tomasz Napierala 		sp->se_flags |= SE_SHUTDOWN;
18143f5ac575SEdward Tomasz Napierala 		kill(sp->se_process, SIGHUP);
18153f5ac575SEdward Tomasz Napierala 		revoke(sp->se_device);
18163f5ac575SEdward Tomasz Napierala 	}
18173f5ac575SEdward Tomasz Napierala }
18183f5ac575SEdward Tomasz Napierala 
18198889c700SDavid Nugent /*
18208889c700SDavid Nugent  * Run the system shutdown script.
18218889c700SDavid Nugent  *
18228889c700SDavid Nugent  * Exit codes:      XXX I should document more
18238889c700SDavid Nugent  * -2       shutdown script terminated abnormally
18248889c700SDavid Nugent  * -1       fatal error - can't run script
18258889c700SDavid Nugent  * 0        good.
18268889c700SDavid Nugent  * >0       some error (exit code)
18278889c700SDavid Nugent  */
182845cfb1dcSXin LI static int
182973bf18edSWarner Losh runshutdown(void)
18308889c700SDavid Nugent {
18318889c700SDavid Nugent 	pid_t pid, wpid;
18328889c700SDavid Nugent 	int status;
18338889c700SDavid Nugent 	int shutdowntimeout;
18348889c700SDavid Nugent 	size_t len;
1835a69497d7SMatthew Dillon 	char *argv[4];
18361a7bec91SWarner Losh 	const char *shell;
18378889c700SDavid Nugent 	struct sigaction sa;
183886bf62dcSDavid Nugent 	struct stat sb;
183986bf62dcSDavid Nugent 
184086bf62dcSDavid Nugent 	/*
184186bf62dcSDavid Nugent 	 * rc.shutdown is optional, so to prevent any unnecessary
184286bf62dcSDavid Nugent 	 * complaints from the shell we simply don't run it if the
184386bf62dcSDavid Nugent 	 * file does not exist. If the stat() here fails for other
184486bf62dcSDavid Nugent 	 * reasons, we'll let the shell complain.
184586bf62dcSDavid Nugent 	 */
184686bf62dcSDavid Nugent 	if (stat(_PATH_RUNDOWN, &sb) == -1 && errno == ENOENT)
184786bf62dcSDavid Nugent 		return 0;
18488889c700SDavid Nugent 
18491a7bec91SWarner Losh 	shell = get_shell();
18501a7bec91SWarner Losh 
18518889c700SDavid Nugent 	if ((pid = fork()) == 0) {
18528889c700SDavid Nugent 		sigemptyset(&sa.sa_mask);
18538889c700SDavid Nugent 		sa.sa_flags = 0;
18548889c700SDavid Nugent 		sa.sa_handler = SIG_IGN;
1855091abe40SDavid E. O'Brien 		sigaction(SIGTSTP, &sa, (struct sigaction *)0);
1856091abe40SDavid E. O'Brien 		sigaction(SIGHUP, &sa, (struct sigaction *)0);
18578889c700SDavid Nugent 
18584c2c7b2cSEd Schouten 		open_console();
1859ab03e6d5SXin LI 
1860ab03e6d5SXin LI 		char _sh[]	= "sh";
1861ab03e6d5SXin LI 		char _reboot[]	= "reboot";
1862ab03e6d5SXin LI 		char _single[]	= "single";
1863ab03e6d5SXin LI 		char _path_rundown[] = _PATH_RUNDOWN;
1864ab03e6d5SXin LI 
1865ab03e6d5SXin LI 		argv[0] = _sh;
1866ab03e6d5SXin LI 		argv[1] = _path_rundown;
1867ab03e6d5SXin LI 		argv[2] = Reboot ? _reboot : _single;
1868a69497d7SMatthew Dillon 		argv[3] = 0;
18698889c700SDavid Nugent 
18708889c700SDavid Nugent 		sigprocmask(SIG_SETMASK, &sa.sa_mask, (sigset_t *) 0);
18718889c700SDavid Nugent 
187225cf4a54SAndrey A. Chernov #ifdef LOGIN_CAP
187325cf4a54SAndrey A. Chernov 		setprocresources(RESOURCE_RC);
187425cf4a54SAndrey A. Chernov #endif
18751a7bec91SWarner Losh 		execv(shell, argv);
18761a7bec91SWarner Losh 		warning("can't exec %s for %s: %m", shell, _PATH_RUNDOWN);
18778889c700SDavid Nugent 		_exit(1);	/* force single user mode */
18788889c700SDavid Nugent 	}
18798889c700SDavid Nugent 
18808889c700SDavid Nugent 	if (pid == -1) {
18811a7bec91SWarner Losh 		emergency("can't fork for %s on %s: %m", shell, _PATH_RUNDOWN);
18828889c700SDavid Nugent 		while (waitpid(-1, (int *) 0, WNOHANG) > 0)
18838889c700SDavid Nugent 			continue;
18848889c700SDavid Nugent 		sleep(STALL_TIMEOUT);
18858889c700SDavid Nugent 		return -1;
18868889c700SDavid Nugent 	}
18878889c700SDavid Nugent 
18888889c700SDavid Nugent 	len = sizeof(shutdowntimeout);
1889091abe40SDavid E. O'Brien 	if (sysctlbyname("kern.init_shutdown_timeout", &shutdowntimeout, &len,
1890091abe40SDavid E. O'Brien 	    NULL, 0) == -1 || shutdowntimeout < 2)
18918889c700SDavid Nugent 		shutdowntimeout = DEATH_SCRIPT;
18928889c700SDavid Nugent 	alarm(shutdowntimeout);
18938889c700SDavid Nugent 	clang = 0;
18948889c700SDavid Nugent 	/*
18958889c700SDavid Nugent 	 * Copied from single_user().  This is a bit paranoid.
18968889c700SDavid Nugent 	 * Use the same ALRM handler.
18978889c700SDavid Nugent 	 */
18988889c700SDavid Nugent 	do {
18998889c700SDavid Nugent 		if ((wpid = waitpid(-1, &status, WUNTRACED)) != -1)
19008889c700SDavid Nugent 			collect_child(wpid);
19018889c700SDavid Nugent 		if (clang == 1) {
19028889c700SDavid Nugent 			/* we were waiting for the sub-shell */
19038889c700SDavid Nugent 			kill(wpid, SIGTERM);
19041a7bec91SWarner Losh 			warning("timeout expired for %s on %s: %m; going to "
19051a7bec91SWarner Losh 			    "single user mode", shell, _PATH_RUNDOWN);
19068889c700SDavid Nugent 			return -1;
19078889c700SDavid Nugent 		}
19088889c700SDavid Nugent 		if (wpid == -1) {
19098889c700SDavid Nugent 			if (errno == EINTR)
19108889c700SDavid Nugent 				continue;
19111a7bec91SWarner Losh 			warning("wait for %s on %s failed: %m; going to "
19121a7bec91SWarner Losh 			    "single user mode", shell, _PATH_RUNDOWN);
19138889c700SDavid Nugent 			return -1;
19148889c700SDavid Nugent 		}
19158889c700SDavid Nugent 		if (wpid == pid && WIFSTOPPED(status)) {
19168889c700SDavid Nugent 			warning("init: %s on %s stopped, restarting\n",
19171a7bec91SWarner Losh 				shell, _PATH_RUNDOWN);
19188889c700SDavid Nugent 			kill(pid, SIGCONT);
19198889c700SDavid Nugent 			wpid = -1;
19208889c700SDavid Nugent 		}
19218889c700SDavid Nugent 	} while (wpid != pid && !clang);
19228889c700SDavid Nugent 
19238889c700SDavid Nugent 	/* Turn off the alarm */
19248889c700SDavid Nugent 	alarm(0);
19258889c700SDavid Nugent 
19268889c700SDavid Nugent 	if (WIFSIGNALED(status) && WTERMSIG(status) == SIGTERM &&
19278889c700SDavid Nugent 	    requested_transition == catatonia) {
19288889c700SDavid Nugent 		/*
19298889c700SDavid Nugent 		 * /etc/rc.shutdown executed /sbin/reboot;
19308889c700SDavid Nugent 		 * wait for the end quietly
19318889c700SDavid Nugent 		 */
19328889c700SDavid Nugent 		sigset_t s;
19338889c700SDavid Nugent 
19348889c700SDavid Nugent 		sigfillset(&s);
19358889c700SDavid Nugent 		for (;;)
19368889c700SDavid Nugent 			sigsuspend(&s);
19378889c700SDavid Nugent 	}
19388889c700SDavid Nugent 
19398889c700SDavid Nugent 	if (!WIFEXITED(status)) {
19401a7bec91SWarner Losh 		warning("%s on %s terminated abnormally, going to "
19411a7bec91SWarner Losh 		    "single user mode", shell, _PATH_RUNDOWN);
19428889c700SDavid Nugent 		return -2;
19438889c700SDavid Nugent 	}
19448889c700SDavid Nugent 
19458889c700SDavid Nugent 	if ((status = WEXITSTATUS(status)) != 0)
19468889c700SDavid Nugent 		warning("%s returned status %d", _PATH_RUNDOWN, status);
19478889c700SDavid Nugent 
19488889c700SDavid Nugent 	return status;
19498889c700SDavid Nugent }
19508889c700SDavid Nugent 
1951ab03e6d5SXin LI static char *
195281ab7fb2SAndrey A. Chernov strk(char *p)
195381ab7fb2SAndrey A. Chernov {
195481ab7fb2SAndrey A. Chernov 	static char *t;
195581ab7fb2SAndrey A. Chernov 	char *q;
195681ab7fb2SAndrey A. Chernov 	int c;
195781ab7fb2SAndrey A. Chernov 
195881ab7fb2SAndrey A. Chernov 	if (p)
195981ab7fb2SAndrey A. Chernov 		t = p;
196081ab7fb2SAndrey A. Chernov 	if (!t)
196181ab7fb2SAndrey A. Chernov 		return 0;
196281ab7fb2SAndrey A. Chernov 
196381ab7fb2SAndrey A. Chernov 	c = *t;
196481ab7fb2SAndrey A. Chernov 	while (c == ' ' || c == '\t' )
196581ab7fb2SAndrey A. Chernov 		c = *++t;
196681ab7fb2SAndrey A. Chernov 	if (!c) {
196781ab7fb2SAndrey A. Chernov 		t = 0;
196881ab7fb2SAndrey A. Chernov 		return 0;
196981ab7fb2SAndrey A. Chernov 	}
197081ab7fb2SAndrey A. Chernov 	q = t;
197181ab7fb2SAndrey A. Chernov 	if (c == '\'') {
197281ab7fb2SAndrey A. Chernov 		c = *++t;
197381ab7fb2SAndrey A. Chernov 		q = t;
197481ab7fb2SAndrey A. Chernov 		while (c && c != '\'')
197581ab7fb2SAndrey A. Chernov 			c = *++t;
197681ab7fb2SAndrey A. Chernov 		if (!c)  /* unterminated string */
197781ab7fb2SAndrey A. Chernov 			q = t = 0;
197881ab7fb2SAndrey A. Chernov 		else
197981ab7fb2SAndrey A. Chernov 			*t++ = 0;
198081ab7fb2SAndrey A. Chernov 	} else {
198181ab7fb2SAndrey A. Chernov 		while (c && c != ' ' && c != '\t' )
198281ab7fb2SAndrey A. Chernov 			c = *++t;
198381ab7fb2SAndrey A. Chernov 		*t++ = 0;
198481ab7fb2SAndrey A. Chernov 		if (!c)
198581ab7fb2SAndrey A. Chernov 			t = 0;
198681ab7fb2SAndrey A. Chernov 	}
198781ab7fb2SAndrey A. Chernov 	return q;
198881ab7fb2SAndrey A. Chernov }
19891ef60eb1SDavid Nugent 
19901ef60eb1SDavid Nugent #ifdef LOGIN_CAP
199145cfb1dcSXin LI static void
199273bf18edSWarner Losh setprocresources(const char *cname)
19931ef60eb1SDavid Nugent {
1994e82d5545SDavid Nugent 	login_cap_t *lc;
1995a2ee73bcSAndrey A. Chernov 	if ((lc = login_getclassbyname(cname, NULL)) != NULL) {
1996091abe40SDavid E. O'Brien 		setusercontext(lc, (struct passwd*)NULL, 0,
1997595ab563SJilles Tjoelker 		    LOGIN_SETPRIORITY | LOGIN_SETRESOURCES |
1998595ab563SJilles Tjoelker 		    LOGIN_SETLOGINCLASS | LOGIN_SETCPUMASK);
19991ef60eb1SDavid Nugent 		login_close(lc);
20001ef60eb1SDavid Nugent 	}
20011ef60eb1SDavid Nugent }
20021ef60eb1SDavid Nugent #endif
2003