Commit | Line | Data |
20188a90 |
1 | char rcsid[] = "$Header: perly.c,v 3.0.1.8 90/10/16 10:14:20 lwall Locked $\nPatch level: ###\n"; |
8d063cd8 |
2 | /* |
a687059c |
3 | * Copyright (c) 1989, Larry Wall |
4 | * |
5 | * You may distribute under the terms of the GNU General Public License |
6 | * as specified in the README file that comes with the perl 3.0 kit. |
7 | * |
8d063cd8 |
8 | * $Log: perly.c,v $ |
20188a90 |
9 | * Revision 3.0.1.8 90/10/16 10:14:20 lwall |
10 | * patch29: *foo now prints as *package'foo |
11 | * patch29: added waitpid |
12 | * patch29: the debugger now understands packages and evals |
13 | * patch29: added -M, -A and -C |
14 | * patch29: -w sometimes printed spurious warnings about ARGV and ENV |
15 | * patch29: require "./foo" didn't work right |
16 | * patch29: require error messages referred to wrong file |
17 | * |
6eb13c3b |
18 | * Revision 3.0.1.7 90/08/13 22:22:22 lwall |
19 | * patch28: defined(@array) and defined(%array) didn't work right |
20 | * |
33b78306 |
21 | * Revision 3.0.1.6 90/08/09 04:55:50 lwall |
22 | * patch19: added -x switch to extract script from input trash |
23 | * patch19: Added -c switch to do compilation only |
24 | * patch19: added numeric interpretation of $] |
25 | * patch19: added require operator |
26 | * patch19: $0, %ENV, @ARGV were wrong in dumped script |
27 | * patch19: . is now explicitly in @INC (and last) |
28 | * |
0f85fab0 |
29 | * Revision 3.0.1.5 90/03/27 16:20:57 lwall |
30 | * patch16: MSDOS support |
31 | * patch16: do FILE inside eval blows up |
32 | * |
ac58e20f |
33 | * Revision 3.0.1.4 90/02/28 18:06:41 lwall |
34 | * patch9: perl can now start up other interpreters scripts |
35 | * patch9: nested evals clobbered their longjmp environment |
36 | * patch9: eval could mistakenly return undef in array context |
37 | * |
663a0e37 |
38 | * Revision 3.0.1.3 89/12/21 20:15:41 lwall |
39 | * patch7: ANSI strerror() is now supported |
40 | * patch7: errno may now be a macro with an lvalue |
41 | * patch7: allowed setuid scripts to have a space after #! |
42 | * |
ffed7fef |
43 | * Revision 3.0.1.2 89/11/17 15:34:42 lwall |
44 | * patch5: fixed possible confusion about current effective gid |
45 | * |
ae986130 |
46 | * Revision 3.0.1.1 89/11/11 04:50:04 lwall |
47 | * patch2: moved yydebug to where its type didn't matter |
48 | * |
a687059c |
49 | * Revision 3.0 89/10/18 15:22:21 lwall |
50 | * 3.0 baseline |
8d063cd8 |
51 | * |
52 | */ |
53 | |
378cc40b |
54 | #include "EXTERN.h" |
55 | #include "perl.h" |
56 | #include "perly.h" |
20188a90 |
57 | #ifdef MSDOS |
58 | #include "patchlev.h" |
59 | #else |
a687059c |
60 | #include "patchlevel.h" |
20188a90 |
61 | #endif |
378cc40b |
62 | |
a687059c |
63 | #ifdef IAMSUID |
64 | #ifndef DOSUID |
65 | #define DOSUID |
66 | #endif |
67 | #endif |
378cc40b |
68 | |
a687059c |
69 | #ifdef SETUID_SCRIPTS_ARE_SECURE_NOW |
70 | #ifdef DOSUID |
71 | #undef DOSUID |
72 | #endif |
73 | #endif |
8d063cd8 |
74 | |
33b78306 |
75 | static char* moreswitches(); |
76 | static char* cddir; |
77 | extern char **environ; |
78 | static bool minus_c; |
79 | |
8d063cd8 |
80 | main(argc,argv,env) |
81 | register int argc; |
82 | register char **argv; |
83 | register char **env; |
84 | { |
85 | register STR *str; |
86 | register char *s; |
378cc40b |
87 | char *index(), *strcpy(), *getenv(); |
88 | bool dosearch = FALSE; |
a687059c |
89 | #ifdef DOSUID |
13281fa4 |
90 | char *validarg = ""; |
91 | #endif |
8d063cd8 |
92 | |
a687059c |
93 | #ifdef SETUID_SCRIPTS_ARE_SECURE_NOW |
94 | #ifdef IAMSUID |
95 | #undef IAMSUID |
96 | fatal("suidperl is no longer needed since the kernel can now execute\n\ |
97 | setuid perl scripts securely.\n"); |
98 | #endif |
99 | #endif |
100 | |
ac58e20f |
101 | origargv = argv; |
102 | origargc = argc; |
378cc40b |
103 | uid = (int)getuid(); |
104 | euid = (int)geteuid(); |
a687059c |
105 | gid = (int)getgid(); |
106 | egid = (int)getegid(); |
0f85fab0 |
107 | #ifdef MSDOS |
108 | /* |
109 | * There is no way we can refer to them from Perl so close them to save |
110 | * space. The other alternative would be to provide STDAUX and STDPRN |
111 | * filehandles. |
112 | */ |
113 | (void)fclose(stdaux); |
114 | (void)fclose(stdprn); |
115 | #endif |
a687059c |
116 | if (do_undump) { |
33b78306 |
117 | origfilename = savestr(argv[0]); |
a687059c |
118 | do_undump = 0; |
ac58e20f |
119 | loop_ptr = -1; /* start label stack again */ |
a687059c |
120 | goto just_doit; |
121 | } |
122 | (void)sprintf(index(rcsid,'#'), "%d\n", PATCHLEVEL); |
123 | linestr = Str_new(65,80); |
378cc40b |
124 | str_nset(linestr,"",0); |
a687059c |
125 | str = str_make("",0); /* first used for -I flags */ |
126 | curstash = defstash = hnew(0); |
127 | curstname = str_make("main",4); |
128 | stab_xhash(stabent("_main",TRUE)) = defstash; |
20188a90 |
129 | defstash->tbl_name = "main"; |
33b78306 |
130 | incstab = hadd(aadd(stabent("INC",TRUE))); |
a687059c |
131 | incstab->str_pok |= SP_MULTI; |
33b78306 |
132 | for (argc--,argv++; argc > 0; argc--,argv++) { |
8d063cd8 |
133 | if (argv[0][0] != '-' || !argv[0][1]) |
134 | break; |
13281fa4 |
135 | #ifdef DOSUID |
136 | if (*validarg) |
137 | validarg = " PHOOEY "; |
138 | else |
139 | validarg = argv[0]; |
140 | #endif |
141 | s = argv[0]+1; |
8d063cd8 |
142 | reswitch: |
13281fa4 |
143 | switch (*s) { |
378cc40b |
144 | case 'a': |
33b78306 |
145 | case 'c': |
a687059c |
146 | case 'd': |
8d063cd8 |
147 | case 'D': |
33b78306 |
148 | case 'i': |
149 | case 'n': |
150 | case 'p': |
151 | case 'u': |
152 | case 'U': |
153 | case 'v': |
154 | case 'w': |
155 | if (s = moreswitches(s)) |
156 | goto reswitch; |
8d063cd8 |
157 | break; |
33b78306 |
158 | |
8d063cd8 |
159 | case 'e': |
a687059c |
160 | #ifdef TAINT |
161 | if (euid != uid || egid != gid) |
162 | fatal("No -e allowed in setuid scripts"); |
163 | #endif |
8d063cd8 |
164 | if (!e_fp) { |
a687059c |
165 | e_tmpname = savestr(TMPPATH); |
166 | (void)mktemp(e_tmpname); |
8d063cd8 |
167 | e_fp = fopen(e_tmpname,"w"); |
33b78306 |
168 | if (!e_fp) |
169 | fatal("Cannot open temporary file"); |
8d063cd8 |
170 | } |
33b78306 |
171 | if (argv[1]) { |
8d063cd8 |
172 | fputs(argv[1],e_fp); |
33b78306 |
173 | argc--,argv++; |
174 | } |
a687059c |
175 | (void)putc('\n', e_fp); |
8d063cd8 |
176 | break; |
177 | case 'I': |
a687059c |
178 | #ifdef TAINT |
179 | if (euid != uid || egid != gid) |
180 | fatal("No -I allowed in setuid scripts"); |
181 | #endif |
13281fa4 |
182 | str_cat(str,"-"); |
183 | str_cat(str,s); |
8d063cd8 |
184 | str_cat(str," "); |
a687059c |
185 | if (*++s) { |
186 | (void)apush(stab_array(incstab),str_make(s,0)); |
378cc40b |
187 | } |
33b78306 |
188 | else if (argv[1]) { |
a687059c |
189 | (void)apush(stab_array(incstab),str_make(argv[1],0)); |
8d063cd8 |
190 | str_cat(str,argv[1]); |
191 | argc--,argv++; |
192 | str_cat(str," "); |
193 | } |
194 | break; |
8d063cd8 |
195 | case 'P': |
a687059c |
196 | #ifdef TAINT |
197 | if (euid != uid || egid != gid) |
198 | fatal("No -P allowed in setuid scripts"); |
199 | #endif |
8d063cd8 |
200 | preprocess = TRUE; |
13281fa4 |
201 | s++; |
8d063cd8 |
202 | goto reswitch; |
203 | case 's': |
a687059c |
204 | #ifdef TAINT |
205 | if (euid != uid || egid != gid) |
206 | fatal("No -s allowed in setuid scripts"); |
207 | #endif |
8d063cd8 |
208 | doswitches = TRUE; |
13281fa4 |
209 | s++; |
8d063cd8 |
210 | goto reswitch; |
378cc40b |
211 | case 'S': |
212 | dosearch = TRUE; |
13281fa4 |
213 | s++; |
378cc40b |
214 | goto reswitch; |
33b78306 |
215 | case 'x': |
216 | doextract = TRUE; |
13281fa4 |
217 | s++; |
33b78306 |
218 | if (*s) |
219 | cddir = savestr(s); |
220 | break; |
8d063cd8 |
221 | case '-': |
222 | argc--,argv++; |
223 | goto switch_end; |
224 | case 0: |
225 | break; |
226 | default: |
13281fa4 |
227 | fatal("Unrecognized switch: -%s",s); |
8d063cd8 |
228 | } |
229 | } |
230 | switch_end: |
231 | if (e_fp) { |
a687059c |
232 | (void)fclose(e_fp); |
8d063cd8 |
233 | argc++,argv--; |
234 | argv[0] = e_tmpname; |
235 | } |
378cc40b |
236 | #ifndef PRIVLIB |
237 | #define PRIVLIB "/usr/local/lib/perl" |
238 | #endif |
a687059c |
239 | (void)apush(stab_array(incstab),str_make(PRIVLIB,0)); |
33b78306 |
240 | (void)apush(stab_array(incstab),str_make(".",1)); |
8d063cd8 |
241 | |
242 | str_set(&str_no,No); |
243 | str_set(&str_yes,Yes); |
8d063cd8 |
244 | |
245 | /* open script */ |
246 | |
247 | if (argv[0] == Nullch) |
248 | argv[0] = "-"; |
a687059c |
249 | if (dosearch && !index(argv[0], '/') && (s = getenv("PATH"))) { |
378cc40b |
250 | char *xfound = Nullch, *xfailed = Nullch; |
a687059c |
251 | int len; |
378cc40b |
252 | |
a687059c |
253 | bufend = s + strlen(s); |
378cc40b |
254 | while (*s) { |
33b78306 |
255 | #ifndef MSDOS |
a687059c |
256 | s = cpytill(tokenbuf,s,bufend,':',&len); |
33b78306 |
257 | #else |
258 | for (len = 0; *s && *s != ';'; tokenbuf[len++] = *s++); |
259 | tokenbuf[len] = '\0'; |
260 | #endif |
378cc40b |
261 | if (*s) |
262 | s++; |
33b78306 |
263 | #ifndef MSDOS |
264 | if (len && tokenbuf[len-1] != '/') |
265 | #else |
266 | if (len && tokenbuf[len-1] != '\\') |
267 | #endif |
a687059c |
268 | (void)strcat(tokenbuf+len,"/"); |
269 | (void)strcat(tokenbuf+len,argv[0]); |
378cc40b |
270 | #ifdef DEBUGGING |
271 | if (debug & 1) |
272 | fprintf(stderr,"Looking for %s\n",tokenbuf); |
273 | #endif |
274 | if (stat(tokenbuf,&statbuf) < 0) /* not there? */ |
275 | continue; |
276 | if ((statbuf.st_mode & S_IFMT) == S_IFREG |
a687059c |
277 | && cando(S_IREAD,TRUE,&statbuf) && cando(S_IEXEC,TRUE,&statbuf)) { |
378cc40b |
278 | xfound = tokenbuf; /* bingo! */ |
279 | break; |
280 | } |
281 | if (!xfailed) |
282 | xfailed = savestr(tokenbuf); |
283 | } |
284 | if (!xfound) |
a687059c |
285 | fatal("Can't execute %s", xfailed ? xfailed : argv[0] ); |
378cc40b |
286 | if (xfailed) |
a687059c |
287 | Safefree(xfailed); |
378cc40b |
288 | argv[0] = savestr(xfound); |
289 | } |
a687059c |
290 | |
20188a90 |
291 | fdpid = anew(Nullstab); /* for remembering popen pids by fd */ |
292 | pidstatus = hnew(Nullstab); /* for remembering status of dead pids */ |
a687059c |
293 | |
33b78306 |
294 | origfilename = savestr(argv[0]); |
20188a90 |
295 | curcmd->c_filestab = fstab(origfilename); |
296 | if (strEQ(origfilename,"-")) |
8d063cd8 |
297 | argv[0] = ""; |
298 | if (preprocess) { |
378cc40b |
299 | str_cat(str,"-I"); |
300 | str_cat(str,PRIVLIB); |
a687059c |
301 | (void)sprintf(buf, "\ |
20188a90 |
302 | %ssed %s -e '/^[^#]/b' \ |
8d063cd8 |
303 | -e '/^#[ ]*include[ ]/b' \ |
304 | -e '/^#[ ]*define[ ]/b' \ |
305 | -e '/^#[ ]*if[ ]/b' \ |
306 | -e '/^#[ ]*ifdef[ ]/b' \ |
378cc40b |
307 | -e '/^#[ ]*ifndef[ ]/b' \ |
8d063cd8 |
308 | -e '/^#[ ]*else/b' \ |
309 | -e '/^#[ ]*endif/b' \ |
310 | -e 's/^#.*//' \ |
378cc40b |
311 | %s | %s -C %s %s", |
20188a90 |
312 | #ifdef MSDOS |
313 | "", |
314 | #else |
315 | "/bin/", |
316 | #endif |
33b78306 |
317 | (doextract ? "-e '1,/^#/d\n'" : ""), |
378cc40b |
318 | argv[0], CPPSTDIN, str_get(str), CPPMINUS); |
33b78306 |
319 | doextract = FALSE; |
a687059c |
320 | #ifdef IAMSUID /* actually, this is caught earlier */ |
13281fa4 |
321 | if (euid != uid && !euid) /* if running suidperl */ |
a687059c |
322 | #ifdef SETEUID |
323 | (void)seteuid(uid); /* musn't stay setuid root */ |
324 | #else |
325 | #ifdef SETREUID |
326 | (void)setreuid(-1, uid); |
327 | #else |
328 | setuid(uid); |
329 | #endif |
13281fa4 |
330 | #endif |
a687059c |
331 | #endif /* IAMSUID */ |
332 | rsfp = mypopen(buf,"r"); |
8d063cd8 |
333 | } |
334 | else if (!*argv[0]) |
335 | rsfp = stdin; |
336 | else |
337 | rsfp = fopen(argv[0],"r"); |
13281fa4 |
338 | if (rsfp == Nullfp) { |
339 | #ifdef DOSUID |
a687059c |
340 | #ifndef IAMSUID /* in case script is not readable before setuid */ |
20188a90 |
341 | if (euid && stat(stab_val(curcmd->c_filestab)->str_ptr,&statbuf) >= 0 && |
13281fa4 |
342 | statbuf.st_mode & (S_ISUID|S_ISGID)) { |
a687059c |
343 | (void)sprintf(buf, "%s/%s", BIN, "suidperl"); |
344 | execv(buf, origargv); /* try again */ |
13281fa4 |
345 | fatal("Can't do setuid\n"); |
346 | } |
347 | #endif |
348 | #endif |
a687059c |
349 | fatal("Can't open perl script \"%s\": %s\n", |
20188a90 |
350 | stab_val(curcmd->c_filestab)->str_ptr, strerror(errno)); |
13281fa4 |
351 | } |
8d063cd8 |
352 | str_free(str); /* free -I directories */ |
353 | |
13281fa4 |
354 | /* do we need to emulate setuid on scripts? */ |
355 | |
356 | /* This code is for those BSD systems that have setuid #! scripts disabled |
357 | * in the kernel because of a security problem. Merely defining DOSUID |
358 | * in perl will not fix that problem, but if you have disabled setuid |
359 | * scripts in the kernel, this will attempt to emulate setuid and setgid |
360 | * on scripts that have those now-otherwise-useless bits set. The setuid |
361 | * root version must be called suidperl. If regular perl discovers that |
362 | * it has opened a setuid script, it calls suidperl with the same argv |
363 | * that it had. If suidperl finds that the script it has just opened |
364 | * is NOT setuid root, it sets the effective uid back to the uid. We |
365 | * don't just make perl setuid root because that loses the effective |
366 | * uid we had before invoking perl, if it was different from the uid. |
367 | * |
368 | * DOSUID must be defined in both perl and suidperl, and IAMSUID must |
369 | * be defined in suidperl only. suidperl must be setuid root. The |
370 | * Configure script will set this up for you if you want it. |
a687059c |
371 | * |
372 | * There is also the possibility of have a script which is running |
373 | * set-id due to a C wrapper. We want to do the TAINT checks |
374 | * on these set-id scripts, but don't want to have the overhead of |
375 | * them in normal perl, and can't use suidperl because it will lose |
376 | * the effective uid info, so we have an additional non-setuid root |
377 | * version called taintperl that just does the TAINT checks. |
13281fa4 |
378 | */ |
a687059c |
379 | |
13281fa4 |
380 | #ifdef DOSUID |
381 | if (fstat(fileno(rsfp),&statbuf) < 0) /* normal stat is insecure */ |
20188a90 |
382 | fatal("Can't stat script \"%s\"",origfilename); |
13281fa4 |
383 | if (statbuf.st_mode & (S_ISUID|S_ISGID)) { |
384 | int len; |
385 | |
a687059c |
386 | #ifdef IAMSUID |
387 | #ifndef SETREUID |
388 | /* On this access check to make sure the directories are readable, |
389 | * there is actually a small window that the user could use to make |
390 | * filename point to an accessible directory. So there is a faint |
391 | * chance that someone could execute a setuid script down in a |
392 | * non-accessible directory. I don't know what to do about that. |
393 | * But I don't think it's too important. The manual lies when |
394 | * it says access() is useful in setuid programs. |
395 | */ |
20188a90 |
396 | if (access(stab_val(curcmd->c_filestab)->str_ptr,1)) /*double check*/ |
13281fa4 |
397 | fatal("Permission denied"); |
a687059c |
398 | #else |
399 | /* If we can swap euid and uid, then we can determine access rights |
400 | * with a simple stat of the file, and then compare device and |
401 | * inode to make sure we did stat() on the same file we opened. |
402 | * Then we just have to make sure he or she can execute it. |
403 | */ |
404 | { |
405 | struct stat tmpstatbuf; |
406 | |
407 | if (setreuid(euid,uid) < 0 || getuid() != euid || geteuid() != uid) |
408 | fatal("Can't swap uid and euid"); /* really paranoid */ |
20188a90 |
409 | if (stat(stab_val(curcmd->c_filestab)->str_ptr,&tmpstatbuf) < 0) |
410 | fatal("Permission denied"); /* testing full pathname here */ |
a687059c |
411 | if (tmpstatbuf.st_dev != statbuf.st_dev || |
412 | tmpstatbuf.st_ino != statbuf.st_ino) { |
413 | (void)fclose(rsfp); |
414 | if (rsfp = mypopen("/bin/mail root","w")) { /* heh, heh */ |
415 | fprintf(rsfp, |
416 | "User %d tried to run dev %d ino %d in place of dev %d ino %d!\n\ |
417 | (Filename of set-id script was %s, uid %d gid %d.)\n\nSincerely,\nperl\n", |
418 | uid,tmpstatbuf.st_dev, tmpstatbuf.st_ino, |
419 | statbuf.st_dev, statbuf.st_ino, |
20188a90 |
420 | stab_val(curcmd->c_filestab)->str_ptr, |
421 | statbuf.st_uid, statbuf.st_gid); |
a687059c |
422 | (void)mypclose(rsfp); |
423 | } |
424 | fatal("Permission denied\n"); |
425 | } |
426 | if (setreuid(uid,euid) < 0 || getuid() != uid || geteuid() != euid) |
427 | fatal("Can't reswap uid and euid"); |
428 | if (!cando(S_IEXEC,FALSE,&statbuf)) /* can real uid exec? */ |
429 | fatal("Permission denied\n"); |
430 | } |
431 | #endif /* SETREUID */ |
432 | #endif /* IAMSUID */ |
433 | |
13281fa4 |
434 | if ((statbuf.st_mode & S_IFMT) != S_IFREG) |
435 | fatal("Permission denied"); |
a687059c |
436 | if ((statbuf.st_mode >> 6) & S_IWRITE) |
437 | fatal("Setuid/gid script is writable by world"); |
13281fa4 |
438 | doswitches = FALSE; /* -s is insecure in suid */ |
33b78306 |
439 | curcmd->c_line++; |
13281fa4 |
440 | if (fgets(tokenbuf,sizeof tokenbuf, rsfp) == Nullch || |
441 | strnNE(tokenbuf,"#!",2) ) /* required even on Sys V */ |
442 | fatal("No #! line"); |
663a0e37 |
443 | s = tokenbuf+2; |
444 | if (*s == ' ') s++; |
445 | while (!isspace(*s)) s++; |
13281fa4 |
446 | if (strnNE(s-4,"perl",4)) /* sanity check */ |
447 | fatal("Not a perl script"); |
a687059c |
448 | while (*s == ' ' || *s == '\t') s++; |
13281fa4 |
449 | /* |
450 | * #! arg must be what we saw above. They can invoke it by |
451 | * mentioning suidperl explicitly, but they may not add any strange |
452 | * arguments beyond what #! says if they do invoke suidperl that way. |
453 | */ |
454 | len = strlen(validarg); |
455 | if (strEQ(validarg," PHOOEY ") || |
456 | strnNE(s,validarg,len) || !isspace(s[len])) |
a687059c |
457 | fatal("Args must match #! line"); |
458 | |
459 | #ifndef IAMSUID |
460 | if (euid != uid && (statbuf.st_mode & S_ISUID) && |
461 | euid == statbuf.st_uid) |
462 | if (!do_undump) |
463 | fatal("YOU HAVEN'T DISABLED SET-ID SCRIPTS IN THE KERNEL YET!\n\ |
464 | FIX YOUR KERNEL, PUT A C WRAPPER AROUND THIS SCRIPT, OR USE -u AND UNDUMP!\n"); |
465 | #endif /* IAMSUID */ |
13281fa4 |
466 | |
467 | if (euid) { /* oops, we're not the setuid root perl */ |
a687059c |
468 | (void)fclose(rsfp); |
13281fa4 |
469 | #ifndef IAMSUID |
a687059c |
470 | (void)sprintf(buf, "%s/%s", BIN, "suidperl"); |
471 | execv(buf, origargv); /* try again */ |
13281fa4 |
472 | #endif |
473 | fatal("Can't do setuid\n"); |
474 | } |
475 | |
ffed7fef |
476 | if (statbuf.st_mode & S_ISGID && statbuf.st_gid != egid) |
a687059c |
477 | #ifdef SETEGID |
478 | (void)setegid(statbuf.st_gid); |
479 | #else |
480 | #ifdef SETREGID |
481 | (void)setregid((GIDTYPE)-1,statbuf.st_gid); |
482 | #else |
483 | setgid(statbuf.st_gid); |
484 | #endif |
485 | #endif |
486 | if (statbuf.st_mode & S_ISUID) { |
487 | if (statbuf.st_uid != euid) |
488 | #ifdef SETEUID |
489 | (void)seteuid(statbuf.st_uid); /* all that for this */ |
490 | #else |
491 | #ifdef SETREUID |
492 | (void)setreuid((UIDTYPE)-1,statbuf.st_uid); |
493 | #else |
494 | setuid(statbuf.st_uid); |
495 | #endif |
496 | #endif |
497 | } |
498 | else if (uid) /* oops, mustn't run as root */ |
499 | #ifdef SETEUID |
500 | (void)seteuid((UIDTYPE)uid); |
501 | #else |
502 | #ifdef SETREUID |
503 | (void)setreuid((UIDTYPE)-1,(UIDTYPE)uid); |
504 | #else |
505 | setuid((UIDTYPE)uid); |
506 | #endif |
507 | #endif |
ffed7fef |
508 | uid = (int)getuid(); |
13281fa4 |
509 | euid = (int)geteuid(); |
ffed7fef |
510 | gid = (int)getgid(); |
511 | egid = (int)getegid(); |
a687059c |
512 | if (!cando(S_IEXEC,TRUE,&statbuf)) |
13281fa4 |
513 | fatal("Permission denied\n"); /* they can't do this */ |
514 | } |
515 | #ifdef IAMSUID |
516 | else if (preprocess) |
517 | fatal("-P not allowed for setuid/setgid script\n"); |
518 | else |
519 | fatal("Script is not setuid/setgid in suidperl\n"); |
a687059c |
520 | #else |
521 | #ifndef TAINT /* we aren't taintperl or suidperl */ |
522 | /* script has a wrapper--can't run suidperl or we lose euid */ |
523 | else if (euid != uid || egid != gid) { |
524 | (void)fclose(rsfp); |
525 | (void)sprintf(buf, "%s/%s", BIN, "taintperl"); |
526 | execv(buf, origargv); /* try again */ |
527 | fatal("Can't run setuid script with taint checks"); |
528 | } |
529 | #endif /* TAINT */ |
13281fa4 |
530 | #endif /* IAMSUID */ |
a687059c |
531 | #else /* !DOSUID */ |
532 | #ifndef TAINT /* we aren't taintperl or suidperl */ |
533 | if (euid != uid || egid != gid) { /* (suidperl doesn't exist, in fact) */ |
534 | #ifndef SETUID_SCRIPTS_ARE_SECURE_NOW |
535 | fstat(fileno(rsfp),&statbuf); /* may be either wrapped or real suid */ |
536 | if ((euid != uid && euid == statbuf.st_uid && statbuf.st_mode & S_ISUID) |
537 | || |
538 | (egid != gid && egid == statbuf.st_gid && statbuf.st_mode & S_ISGID) |
539 | ) |
540 | if (!do_undump) |
541 | fatal("YOU HAVEN'T DISABLED SET-ID SCRIPTS IN THE KERNEL YET!\n\ |
542 | FIX YOUR KERNEL, PUT A C WRAPPER AROUND THIS SCRIPT, OR USE -u AND UNDUMP!\n"); |
543 | #endif /* SETUID_SCRIPTS_ARE_SECURE_NOW */ |
544 | /* not set-id, must be wrapped */ |
545 | (void)fclose(rsfp); |
546 | (void)sprintf(buf, "%s/%s", BIN, "taintperl"); |
547 | execv(buf, origargv); /* try again */ |
548 | fatal("Can't run setuid script with taint checks"); |
549 | } |
550 | #endif /* TAINT */ |
13281fa4 |
551 | #endif /* DOSUID */ |
552 | |
33b78306 |
553 | #if !defined(IAMSUID) && !defined(TAINT) |
554 | |
555 | /* skip forward in input to the real script? */ |
556 | |
557 | while (doextract) { |
558 | if ((s = str_gets(linestr, rsfp, 0)) == Nullch) |
559 | fatal("No Perl script found in input\n"); |
560 | if (*s == '#' && s[1] == '!' && instr(s,"perl")) { |
561 | ungetc('\n',rsfp); /* to keep line count right */ |
562 | doextract = FALSE; |
563 | if (s = instr(s,"perl -")) { |
564 | s += 6; |
565 | while (s = moreswitches(s)) ; |
566 | } |
567 | if (cddir && chdir(cddir) < 0) |
568 | fatal("Can't chdir to %s",cddir); |
569 | } |
570 | } |
571 | #endif /* !defined(IAMSUID) && !defined(TAINT) */ |
572 | |
8d063cd8 |
573 | defstab = stabent("_",TRUE); |
574 | |
a687059c |
575 | if (perldb) { |
576 | debstash = hnew(0); |
577 | stab_xhash(stabent("_DB",TRUE)) = debstash; |
578 | curstash = debstash; |
20188a90 |
579 | dbargs = stab_xarray(aadd((tmpstab = stabent("args",TRUE)))); |
a687059c |
580 | tmpstab->str_pok |= SP_MULTI; |
20188a90 |
581 | dbargs->ary_flags = 0; |
a687059c |
582 | subname = str_make("main",4); |
583 | DBstab = stabent("DB",TRUE); |
584 | DBstab->str_pok |= SP_MULTI; |
20188a90 |
585 | DBline = stabent("dbline",TRUE); |
586 | DBline->str_pok |= SP_MULTI; |
a687059c |
587 | DBsub = hadd(tmpstab = stabent("sub",TRUE)); |
588 | tmpstab->str_pok |= SP_MULTI; |
589 | DBsingle = stab_val((tmpstab = stabent("single",TRUE))); |
590 | tmpstab->str_pok |= SP_MULTI; |
20188a90 |
591 | DBtrace = stab_val((tmpstab = stabent("trace",TRUE))); |
592 | tmpstab->str_pok |= SP_MULTI; |
593 | DBsignal = stab_val((tmpstab = stabent("signal",TRUE))); |
594 | tmpstab->str_pok |= SP_MULTI; |
a687059c |
595 | curstash = defstash; |
596 | } |
597 | |
8d063cd8 |
598 | /* init tokener */ |
599 | |
a687059c |
600 | bufend = bufptr = str_get(linestr); |
601 | |
602 | savestack = anew(Nullstab); /* for saving non-local values */ |
603 | stack = anew(Nullstab); /* for saving non-local values */ |
604 | stack->ary_flags = 0; /* not a real array */ |
6eb13c3b |
605 | afill(stack,63); afill(stack,-1); /* preextend stack */ |
606 | afill(savestack,63); afill(savestack,-1); |
8d063cd8 |
607 | |
a687059c |
608 | /* now parse the script */ |
8d063cd8 |
609 | |
a687059c |
610 | error_count = 0; |
33b78306 |
611 | if (yyparse() || error_count) { |
612 | if (minus_c) |
613 | fatal("%s had compilation errors.\n", origfilename); |
614 | else { |
615 | fatal("Execution of %s aborted due to compilation errors.\n", |
616 | origfilename); |
617 | } |
618 | } |
8d063cd8 |
619 | |
a687059c |
620 | New(50,loop_stack,128,struct loop); |
ae986130 |
621 | #ifdef DEBUGGING |
622 | if (debug) { |
623 | New(51,debname,128,char); |
624 | New(52,debdelim,128,char); |
625 | } |
626 | #endif |
a687059c |
627 | curstash = defstash; |
378cc40b |
628 | |
629 | preprocess = FALSE; |
8d063cd8 |
630 | if (e_fp) { |
631 | e_fp = Nullfp; |
a687059c |
632 | (void)UNLINK(e_tmpname); |
633 | } |
634 | |
635 | /* initialize everything that won't change if we undump */ |
636 | |
637 | if (sigstab = stabent("SIG",allstabs)) { |
638 | sigstab->str_pok |= SP_MULTI; |
639 | (void)hadd(sigstab); |
640 | } |
641 | |
20188a90 |
642 | magicalize("!#?^~=-%0123456789.+&*()<>,\\/[|`':\024"); |
33b78306 |
643 | userinit(); /* in case linked C routines want magical variables */ |
a687059c |
644 | |
645 | amperstab = stabent("&",allstabs); |
646 | leftstab = stabent("`",allstabs); |
647 | rightstab = stabent("'",allstabs); |
648 | sawampersand = (amperstab || leftstab || rightstab); |
649 | if (tmpstab = stabent(":",allstabs)) |
650 | str_set(STAB_STR(tmpstab),chopset); |
20188a90 |
651 | if (tmpstab = stabent("\024",allstabs)) |
652 | time(&basetime); |
a687059c |
653 | |
654 | /* these aren't necessarily magical */ |
655 | if (tmpstab = stabent(";",allstabs)) |
656 | str_set(STAB_STR(tmpstab),"\034"); |
33b78306 |
657 | if (tmpstab = stabent("]",allstabs)) { |
658 | str = STAB_STR(tmpstab); |
659 | str_set(str,rcsid); |
660 | strncpy(tokenbuf,rcsid+19,3); |
661 | sprintf(tokenbuf+3,"%2.2d",PATCHLEVEL); |
662 | str->str_u.str_nval = atof(tokenbuf); |
663 | str->str_nok = 1; |
664 | } |
a687059c |
665 | str_nset(stab_val(stabent("\"", TRUE)), " ", 1); |
666 | |
667 | stdinstab = stabent("STDIN",TRUE); |
668 | stdinstab->str_pok |= SP_MULTI; |
669 | stab_io(stdinstab) = stio_new(); |
670 | stab_io(stdinstab)->ifp = stdin; |
671 | tmpstab = stabent("stdin",TRUE); |
672 | stab_io(tmpstab) = stab_io(stdinstab); |
673 | tmpstab->str_pok |= SP_MULTI; |
674 | |
675 | tmpstab = stabent("STDOUT",TRUE); |
676 | tmpstab->str_pok |= SP_MULTI; |
677 | stab_io(tmpstab) = stio_new(); |
678 | stab_io(tmpstab)->ofp = stab_io(tmpstab)->ifp = stdout; |
679 | defoutstab = tmpstab; |
680 | tmpstab = stabent("stdout",TRUE); |
681 | stab_io(tmpstab) = stab_io(defoutstab); |
682 | tmpstab->str_pok |= SP_MULTI; |
683 | |
684 | curoutstab = stabent("STDERR",TRUE); |
685 | curoutstab->str_pok |= SP_MULTI; |
686 | stab_io(curoutstab) = stio_new(); |
687 | stab_io(curoutstab)->ofp = stab_io(curoutstab)->ifp = stderr; |
688 | tmpstab = stabent("stderr",TRUE); |
689 | stab_io(tmpstab) = stab_io(curoutstab); |
690 | tmpstab->str_pok |= SP_MULTI; |
691 | curoutstab = defoutstab; /* switch back to STDOUT */ |
692 | |
693 | statname = Str_new(66,0); /* last filename we did stat on */ |
694 | |
a687059c |
695 | if (do_undump) |
696 | abort(); |
697 | |
698 | just_doit: /* come here if running an undumped a.out */ |
8d063cd8 |
699 | argc--,argv++; /* skip name of script */ |
700 | if (doswitches) { |
701 | for (; argc > 0 && **argv == '-'; argc--,argv++) { |
702 | if (argv[0][1] == '-') { |
703 | argc--,argv++; |
704 | break; |
705 | } |
a687059c |
706 | str_numset(stab_val(stabent(argv[0]+1,TRUE)),(double)1.0); |
8d063cd8 |
707 | } |
708 | } |
a687059c |
709 | #ifdef TAINT |
710 | tainted = 1; |
711 | #endif |
33b78306 |
712 | if (tmpstab = stabent("0",allstabs)) |
713 | str_set(STAB_STR(tmpstab),origfilename); |
a559c259 |
714 | if (argvstab = stabent("ARGV",allstabs)) { |
a687059c |
715 | argvstab->str_pok |= SP_MULTI; |
716 | (void)aadd(argvstab); |
33b78306 |
717 | aclear(stab_array(argvstab)); |
8d063cd8 |
718 | for (; argc > 0; argc--,argv++) { |
a687059c |
719 | (void)apush(stab_array(argvstab),str_make(argv[0],0)); |
8d063cd8 |
720 | } |
721 | } |
a687059c |
722 | #ifdef TAINT |
723 | (void) stabent("ENV",TRUE); /* must test PATH and IFS */ |
724 | #endif |
a559c259 |
725 | if (envstab = stabent("ENV",allstabs)) { |
a687059c |
726 | envstab->str_pok |= SP_MULTI; |
727 | (void)hadd(envstab); |
20188a90 |
728 | hclear(stab_hash(envstab), FALSE); |
33b78306 |
729 | if (env != environ) |
730 | environ[0] = Nullch; |
8d063cd8 |
731 | for (; *env; env++) { |
732 | if (!(s = index(*env,'='))) |
733 | continue; |
734 | *s++ = '\0'; |
a687059c |
735 | str = str_make(s--,0); |
736 | str_magic(str, envstab, 'E', *env, s - *env); |
737 | (void)hstore(stab_hash(envstab), *env, s - *env, str, 0); |
738 | *s = '='; |
8d063cd8 |
739 | } |
740 | } |
a687059c |
741 | #ifdef TAINT |
742 | tainted = 0; |
743 | #endif |
378cc40b |
744 | if (tmpstab = stabent("$",allstabs)) |
8d063cd8 |
745 | str_numset(STAB_STR(tmpstab),(double)getpid()); |
746 | |
20188a90 |
747 | if (dowarn) { |
748 | stab_check('A','Z'); |
749 | stab_check('a','z'); |
750 | } |
751 | |
a687059c |
752 | if (setjmp(top_env)) /* sets goto_targ on longjump */ |
ac58e20f |
753 | loop_ptr = -1; /* start label stack again */ |
8d063cd8 |
754 | |
755 | #ifdef DEBUGGING |
756 | if (debug & 1024) |
a687059c |
757 | dump_all(); |
8d063cd8 |
758 | if (debug) |
759 | fprintf(stderr,"\nEXECUTING...\n\n"); |
760 | #endif |
761 | |
33b78306 |
762 | if (minus_c) { |
763 | fprintf(stderr,"%s syntax OK\n", origfilename); |
764 | exit(0); |
765 | } |
766 | |
8d063cd8 |
767 | /* do it */ |
768 | |
a687059c |
769 | (void) cmd_exec(main_root,G_SCALAR,-1); |
8d063cd8 |
770 | |
771 | if (goto_targ) |
378cc40b |
772 | fatal("Can't find label \"%s\"--aborting",goto_targ); |
8d063cd8 |
773 | exit(0); |
378cc40b |
774 | /* NOTREACHED */ |
8d063cd8 |
775 | } |
776 | |
777 | magicalize(list) |
778 | register char *list; |
779 | { |
8d063cd8 |
780 | char sym[2]; |
781 | |
782 | sym[1] = '\0'; |
33b78306 |
783 | while (*sym = *list++) |
784 | magicname(sym, Nullch, 0); |
785 | } |
786 | |
787 | int |
788 | magicname(sym,name,namlen) |
789 | char *sym; |
790 | char *name; |
791 | int namlen; |
792 | { |
793 | register STAB *stab; |
794 | |
795 | if (stab = stabent(sym,allstabs)) { |
796 | stab_flags(stab) = SF_VMAGIC; |
797 | str_magic(stab_val(stab), stab, 0, name, namlen); |
378cc40b |
798 | } |
8d063cd8 |
799 | } |
800 | |
a687059c |
801 | /* this routine is in perly.c by virtue of being sort of an alternate main() */ |
8d063cd8 |
802 | |
a687059c |
803 | int |
804 | do_eval(str,optype,stash,gimme,arglast) |
805 | STR *str; |
806 | int optype; |
807 | HASH *stash; |
808 | int gimme; |
809 | int *arglast; |
8d063cd8 |
810 | { |
a687059c |
811 | STR **st = stack->ary_array; |
812 | int retval; |
813 | CMD *myroot; |
814 | ARRAY *ar; |
815 | int i; |
33b78306 |
816 | CMD * VOLATILE oldcurcmd = curcmd; |
ac58e20f |
817 | VOLATILE int oldtmps_base = tmps_base; |
818 | VOLATILE int oldsave = savestack->ary_fill; |
20188a90 |
819 | VOLATILE int oldperldb = perldb; |
ac58e20f |
820 | SPAT * VOLATILE oldspat = curspat; |
a687059c |
821 | static char *last_eval = Nullch; |
822 | static CMD *last_root = Nullcmd; |
663a0e37 |
823 | VOLATILE int sp = arglast[0]; |
33b78306 |
824 | char *specfilename; |
20188a90 |
825 | char *tmpfilename; |
8d063cd8 |
826 | |
a687059c |
827 | tmps_base = tmps_max; |
828 | if (curstash != stash) { |
829 | (void)savehptr(&curstash); |
830 | curstash = stash; |
8d063cd8 |
831 | } |
a687059c |
832 | str_set(stab_val(stabent("@",TRUE)),""); |
20188a90 |
833 | if (curcmd->c_line == 0) /* don't debug debugger... */ |
834 | perldb = FALSE; |
33b78306 |
835 | curcmd = &compiling; |
836 | if (optype == O_EVAL) { /* normal eval */ |
20188a90 |
837 | curcmd->c_filestab = fstab("(eval)"); |
33b78306 |
838 | curcmd->c_line = 1; |
a687059c |
839 | str_sset(linestr,str); |
840 | str_cat(linestr,";"); /* be kind to them */ |
8d063cd8 |
841 | } |
a687059c |
842 | else { |
0f85fab0 |
843 | if (last_root && !in_eval) { |
a687059c |
844 | Safefree(last_eval); |
845 | cmd_free(last_root); |
846 | last_root = Nullcmd; |
8d063cd8 |
847 | } |
33b78306 |
848 | specfilename = str_get(str); |
a687059c |
849 | str_set(linestr,""); |
20188a90 |
850 | if (optype == O_REQUIRE && &str_undef != |
33b78306 |
851 | hfetch(stab_hash(incstab), specfilename, strlen(specfilename), 0)) { |
20188a90 |
852 | curcmd = oldcurcmd; |
33b78306 |
853 | tmps_base = oldtmps_base; |
854 | st[++sp] = &str_yes; |
20188a90 |
855 | perldb = oldperldb; |
33b78306 |
856 | return sp; |
857 | } |
20188a90 |
858 | tmpfilename = savestr(specfilename); |
859 | if (index("/.", *tmpfilename)) |
860 | rsfp = fopen(tmpfilename,"r"); |
33b78306 |
861 | else { |
862 | ar = stab_array(incstab); |
a687059c |
863 | for (i = 0; i <= ar->ary_fill; i++) { |
20188a90 |
864 | (void)sprintf(buf, "%s/%s", |
865 | str_get(afetch(ar,i,TRUE)), specfilename); |
a687059c |
866 | rsfp = fopen(buf,"r"); |
867 | if (rsfp) { |
33b78306 |
868 | char *s = buf; |
869 | |
870 | if (*s == '.' && s[1] == '/') |
871 | s += 2; |
20188a90 |
872 | Safefree(tmpfilename); |
873 | tmpfilename = savestr(s); |
8d063cd8 |
874 | break; |
875 | } |
378cc40b |
876 | } |
877 | } |
20188a90 |
878 | curcmd->c_filestab = fstab(tmpfilename); |
879 | Safefree(tmpfilename); |
a687059c |
880 | if (!rsfp) { |
20188a90 |
881 | curcmd = oldcurcmd; |
a687059c |
882 | tmps_base = oldtmps_base; |
33b78306 |
883 | if (optype == O_REQUIRE) { |
884 | sprintf(tokenbuf,"Can't locate %s in @INC", specfilename); |
885 | if (instr(tokenbuf,".h ")) |
886 | strcat(tokenbuf," (change .h to .ph maybe?)"); |
887 | if (instr(tokenbuf,".ph ")) |
6eb13c3b |
888 | strcat(tokenbuf," (did you run h2ph?)"); |
33b78306 |
889 | fatal("%s",tokenbuf); |
890 | } |
a687059c |
891 | if (gimme != G_ARRAY) |
892 | st[++sp] = &str_undef; |
20188a90 |
893 | perldb = oldperldb; |
a687059c |
894 | return sp; |
8d063cd8 |
895 | } |
33b78306 |
896 | curcmd->c_line = 0; |
8d063cd8 |
897 | } |
a687059c |
898 | in_eval++; |
899 | oldoldbufptr = oldbufptr = bufptr = str_get(linestr); |
900 | bufend = bufptr + linestr->str_cur; |
ac58e20f |
901 | if (++loop_ptr >= loop_max) { |
902 | loop_max += 128; |
903 | Renew(loop_stack, loop_max, struct loop); |
904 | } |
905 | loop_stack[loop_ptr].loop_label = "_EVAL_"; |
906 | loop_stack[loop_ptr].loop_sp = sp; |
907 | #ifdef DEBUGGING |
908 | if (debug & 4) { |
909 | deb("(Pushing label #%d _EVAL_)\n", loop_ptr); |
910 | } |
911 | #endif |
912 | if (setjmp(loop_stack[loop_ptr].loop_env)) { |
a687059c |
913 | retval = 1; |
914 | last_root = Nullcmd; |
8d063cd8 |
915 | } |
a687059c |
916 | else { |
917 | error_count = 0; |
20188a90 |
918 | if (rsfp) { |
a687059c |
919 | retval = yyparse(); |
20188a90 |
920 | retval |= error_count; |
921 | } |
a687059c |
922 | else if (last_root && *bufptr == *last_eval && strEQ(bufptr,last_eval)){ |
923 | retval = 0; |
924 | eval_root = last_root; /* no point in reparsing */ |
925 | } |
926 | else if (in_eval == 1) { |
927 | if (last_root) { |
928 | Safefree(last_eval); |
929 | cmd_free(last_root); |
8d063cd8 |
930 | } |
a687059c |
931 | last_eval = savestr(bufptr); |
932 | last_root = Nullcmd; |
933 | retval = yyparse(); |
20188a90 |
934 | retval |= error_count; |
a687059c |
935 | if (!retval) |
936 | last_root = eval_root; |
8d063cd8 |
937 | } |
a687059c |
938 | else |
939 | retval = yyparse(); |
8d063cd8 |
940 | } |
a687059c |
941 | myroot = eval_root; /* in case cmd_exec does another eval! */ |
20188a90 |
942 | |
943 | if (retval) { |
ac58e20f |
944 | st = stack->ary_array; |
945 | sp = arglast[0]; |
946 | if (gimme != G_ARRAY) |
947 | st[++sp] = &str_undef; |
a687059c |
948 | last_root = Nullcmd; /* can't free on error, for some reason */ |
949 | if (rsfp) { |
950 | fclose(rsfp); |
951 | rsfp = 0; |
952 | } |
8d063cd8 |
953 | } |
8d063cd8 |
954 | else { |
a687059c |
955 | sp = cmd_exec(eval_root,gimme,sp); |
956 | st = stack->ary_array; |
957 | for (i = arglast[0] + 1; i <= sp; i++) |
958 | st[i] = str_static(st[i]); |
959 | /* if we don't save result, free zaps it */ |
960 | if (in_eval != 1 && myroot != last_root) |
961 | cmd_free(myroot); |
a559c259 |
962 | } |
20188a90 |
963 | |
964 | perldb = oldperldb; |
a559c259 |
965 | in_eval--; |
ac58e20f |
966 | #ifdef DEBUGGING |
20188a90 |
967 | if (debug & 4) { |
968 | char *tmps = loop_stack[loop_ptr].loop_label; |
969 | deb("(Popping label #%d %s)\n",loop_ptr, |
970 | tmps ? tmps : "" ); |
971 | } |
ac58e20f |
972 | #endif |
973 | loop_ptr--; |
378cc40b |
974 | tmps_base = oldtmps_base; |
a687059c |
975 | curspat = oldspat; |
378cc40b |
976 | if (savestack->ary_fill > oldsave) /* let them use local() */ |
977 | restorelist(oldsave); |
20188a90 |
978 | |
979 | if (optype != O_EVAL) { |
980 | if (retval) { |
981 | if (optype == O_REQUIRE) |
982 | fatal("%s", str_get(stab_val(stabent("@",TRUE)))); |
983 | } |
984 | else { |
985 | curcmd = oldcurcmd; |
986 | if (gimme == G_SCALAR ? str_true(st[sp]) : sp > arglast[0]) { |
987 | (void)hstore(stab_hash(incstab), specfilename, |
988 | strlen(specfilename), str_smake(stab_val(curcmd->c_filestab)), |
989 | 0 ); |
990 | } |
991 | else if (optype == O_REQUIRE) |
992 | fatal("%s did not return a true value", specfilename); |
993 | } |
994 | } |
995 | curcmd = oldcurcmd; |
a687059c |
996 | return sp; |
378cc40b |
997 | } |
33b78306 |
998 | |
999 | /* This routine handles any switches that can be given during run */ |
1000 | |
1001 | static char * |
1002 | moreswitches(s) |
1003 | char *s; |
1004 | { |
1005 | reswitch: |
1006 | switch (*s) { |
1007 | case 'a': |
1008 | minus_a = TRUE; |
1009 | s++; |
1010 | return s; |
1011 | case 'c': |
1012 | minus_c = TRUE; |
1013 | s++; |
1014 | return s; |
1015 | case 'd': |
1016 | #ifdef TAINT |
1017 | if (euid != uid || egid != gid) |
1018 | fatal("No -d allowed in setuid scripts"); |
1019 | #endif |
1020 | perldb = TRUE; |
1021 | s++; |
1022 | return s; |
1023 | case 'D': |
1024 | #ifdef DEBUGGING |
1025 | #ifdef TAINT |
1026 | if (euid != uid || egid != gid) |
1027 | fatal("No -D allowed in setuid scripts"); |
1028 | #endif |
1029 | debug = atoi(s+1); |
1030 | #else |
1031 | warn("Recompile perl with -DDEBUGGING to use -D switch\n"); |
1032 | #endif |
1033 | break; |
1034 | case 'i': |
1035 | inplace = savestr(s+1); |
1036 | for (s = inplace; *s && !isspace(*s); s++) ; |
1037 | *s = '\0'; |
1038 | argvoutstab = stabent("ARGVOUT",TRUE); |
1039 | break; |
1040 | case 'I': |
1041 | #ifdef TAINT |
1042 | if (euid != uid || egid != gid) |
1043 | fatal("No -I allowed in setuid scripts"); |
1044 | #endif |
1045 | if (*++s) { |
1046 | (void)apush(stab_array(incstab),str_make(s,0)); |
1047 | } |
1048 | else |
1049 | fatal("No space allowed after -I"); |
1050 | break; |
1051 | case 'n': |
1052 | minus_n = TRUE; |
1053 | s++; |
1054 | return s; |
1055 | case 'p': |
1056 | minus_p = TRUE; |
1057 | s++; |
1058 | return s; |
1059 | case 'u': |
1060 | do_undump = TRUE; |
1061 | s++; |
1062 | return s; |
1063 | case 'U': |
1064 | unsafe = TRUE; |
1065 | s++; |
1066 | return s; |
1067 | case 'v': |
20188a90 |
1068 | fputs("\nThis is perl, version 3.0\n\n",stdout); |
33b78306 |
1069 | fputs(rcsid,stdout); |
1070 | fputs("\nCopyright (c) 1989, 1990, Larry Wall\n",stdout); |
1071 | #ifdef MSDOS |
1072 | fputs("MS-DOS port Copyright (c) 1989, 1990, Diomidis Spinellis\n", |
1073 | stdout); |
20188a90 |
1074 | #ifdef OS2 |
1075 | fputs("OS/2 port Copyright (c) 1990, Raymond Chen, Kai Uwe Rommel\n", |
1076 | stdout); |
1077 | #endif |
33b78306 |
1078 | #endif |
1079 | fputs("\n\ |
1080 | Perl may be copied only under the terms of the GNU General Public License,\n\ |
1081 | a copy of which can be found with the Perl 3.0 distribution kit.\n",stdout); |
20188a90 |
1082 | #ifdef MSDOS |
1083 | usage(origargv[0]); |
1084 | #endif |
33b78306 |
1085 | exit(0); |
1086 | case 'w': |
1087 | dowarn = TRUE; |
1088 | s++; |
1089 | return s; |
1090 | case ' ': |
1091 | case '\n': |
1092 | case '\t': |
1093 | break; |
1094 | default: |
1095 | fatal("Switch meaningless after -x: -%s",s); |
1096 | } |
1097 | return Nullch; |
1098 | } |