Home | History | Annotate | Line # | Download | only in sh
      1  1.90       kre /*	$NetBSD: main.c,v 1.90 2023/04/07 10:34:13 kre Exp $	*/
      2  1.17       cgd 
      3   1.1       cgd /*-
      4   1.9       jtc  * Copyright (c) 1991, 1993
      5   1.9       jtc  *	The Regents of the University of California.  All rights reserved.
      6   1.1       cgd  *
      7   1.1       cgd  * This code is derived from software contributed to Berkeley by
      8   1.1       cgd  * Kenneth Almquist.
      9   1.1       cgd  *
     10   1.1       cgd  * Redistribution and use in source and binary forms, with or without
     11   1.1       cgd  * modification, are permitted provided that the following conditions
     12   1.1       cgd  * are met:
     13   1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     14   1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     15   1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     16   1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     17   1.1       cgd  *    documentation and/or other materials provided with the distribution.
     18  1.47       agc  * 3. Neither the name of the University nor the names of its contributors
     19   1.1       cgd  *    may be used to endorse or promote products derived from this software
     20   1.1       cgd  *    without specific prior written permission.
     21   1.1       cgd  *
     22   1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     23   1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     24   1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     25   1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     26   1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     27   1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     28   1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     29   1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     30   1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     31   1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     32   1.1       cgd  * SUCH DAMAGE.
     33   1.1       cgd  */
     34   1.1       cgd 
     35  1.26  christos #include <sys/cdefs.h>
     36   1.1       cgd #ifndef lint
     37  1.51     lukem __COPYRIGHT("@(#) Copyright (c) 1991, 1993\
     38  1.51     lukem  The Regents of the University of California.  All rights reserved.");
     39   1.1       cgd #endif /* not lint */
     40   1.1       cgd 
     41   1.1       cgd #ifndef lint
     42  1.17       cgd #if 0
     43  1.21  christos static char sccsid[] = "@(#)main.c	8.7 (Berkeley) 7/19/95";
     44  1.17       cgd #else
     45  1.90       kre __RCSID("$NetBSD: main.c,v 1.90 2023/04/07 10:34:13 kre Exp $");
     46  1.17       cgd #endif
     47   1.1       cgd #endif /* not lint */
     48   1.1       cgd 
     49  1.36    simonb #include <errno.h>
     50  1.11       jtc #include <stdio.h>
     51   1.1       cgd #include <signal.h>
     52  1.11       jtc #include <sys/stat.h>
     53  1.12       jtc #include <unistd.h>
     54  1.87       kre #include <stdbool.h>
     55  1.55  christos #include <stdlib.h>
     56  1.46  christos #include <locale.h>
     57   1.1       cgd #include <fcntl.h>
     58  1.18  christos 
     59  1.18  christos 
     60   1.1       cgd #include "shell.h"
     61   1.1       cgd #include "main.h"
     62   1.1       cgd #include "mail.h"
     63   1.1       cgd #include "options.h"
     64  1.57  christos #include "builtins.h"
     65   1.1       cgd #include "output.h"
     66   1.1       cgd #include "parser.h"
     67   1.1       cgd #include "nodes.h"
     68  1.20  christos #include "expand.h"
     69   1.1       cgd #include "eval.h"
     70   1.1       cgd #include "jobs.h"
     71   1.1       cgd #include "input.h"
     72   1.1       cgd #include "trap.h"
     73   1.1       cgd #include "var.h"
     74  1.18  christos #include "show.h"
     75   1.1       cgd #include "memalloc.h"
     76   1.1       cgd #include "error.h"
     77   1.1       cgd #include "init.h"
     78   1.1       cgd #include "mystring.h"
     79  1.11       jtc #include "exec.h"
     80  1.23  christos #include "cd.h"
     81  1.68       kre #include "redir.h"
     82   1.1       cgd 
     83   1.1       cgd #define PROFILE 0
     84   1.1       cgd 
     85   1.1       cgd int rootpid;
     86   1.1       cgd int rootshell;
     87  1.77       kre struct jmploc main_handler;
     88  1.68       kre int max_user_fd;
     89  1.86       kre long user_fd_limit;
     90  1.87       kre bool privileged;
     91   1.1       cgd #if PROFILE
     92   1.1       cgd short profile_buf[16384];
     93   1.1       cgd extern int etext();
     94   1.1       cgd #endif
     95   1.1       cgd 
     96  1.45  christos STATIC void read_profile(const char *);
     97   1.1       cgd 
     98   1.1       cgd /*
     99   1.1       cgd  * Main routine.  We initialize things, parse the arguments, execute
    100   1.1       cgd  * profiles if we're a login shell, and then call cmdloop to execute
    101   1.1       cgd  * commands.  The setjmp call sets up the location to jump to when an
    102   1.1       cgd  * exception occurs.  When an exception occurs the variable "state"
    103   1.1       cgd  * is used to figure out how far we had gotten.
    104   1.1       cgd  */
    105   1.1       cgd 
    106  1.15       cgd int
    107  1.45  christos main(int argc, char **argv)
    108  1.15       cgd {
    109   1.1       cgd 	struct stackmark smark;
    110   1.1       cgd 	volatile int state;
    111   1.1       cgd 	char *shinit;
    112  1.59  christos 	uid_t uid;
    113  1.59  christos 	gid_t gid;
    114  1.85       fox 	sigset_t mask;
    115  1.87       kre 	bool waspriv;
    116  1.59  christos 
    117  1.83       kre 	/*
    118  1.83       kre 	 * If we happen to be invoked with SIGCHLD ignored, we cannot
    119  1.83       kre 	 * successfully do almost anything.   Perhaps we should remember
    120  1.83       kre 	 * its state and pass it on ignored to children if it was ignored
    121  1.83       kre 	 * on entry, but that seems like just leaving the shit on the
    122  1.83       kre 	 * footpath for someone else to fall into...
    123  1.83       kre 	 */
    124  1.83       kre 	(void)signal(SIGCHLD, SIG_DFL);
    125  1.84       kre 	/*
    126  1.84       kre 	 * Similarly, SIGCHLD must not be blocked
    127  1.84       kre 	 */
    128  1.85       fox 	sigemptyset(&mask);
    129  1.85       fox 	sigaddset(&mask, SIGCHLD);
    130  1.85       fox 	sigprocmask(SIG_UNBLOCK, &mask, NULL);
    131  1.83       kre 
    132  1.59  christos 	uid = getuid();
    133  1.59  christos 	gid = getgid();
    134  1.46  christos 
    135  1.87       kre 	waspriv = privileged = (uid != geteuid()) || (gid != getegid());
    136  1.87       kre 
    137  1.68       kre 	max_user_fd = fcntl(0, F_MAXFD);
    138  1.68       kre 	if (max_user_fd < 2)
    139  1.68       kre 		max_user_fd = 2;
    140  1.86       kre 	user_fd_limit = sysconf(_SC_OPEN_MAX);
    141  1.68       kre 
    142  1.46  christos 	setlocale(LC_ALL, "");
    143   1.1       cgd 
    144  1.55  christos 	posix = getenv("POSIXLY_CORRECT") != NULL;
    145   1.1       cgd #if PROFILE
    146   1.1       cgd 	monitor(4, etext, profile_buf, sizeof profile_buf, 50);
    147   1.1       cgd #endif
    148   1.1       cgd 	state = 0;
    149  1.77       kre 	if (setjmp(main_handler.loc)) {
    150   1.1       cgd 		/*
    151   1.1       cgd 		 * When a shell procedure is executed, we raise the
    152   1.1       cgd 		 * exception EXSHELLPROC to clean up before executing
    153   1.1       cgd 		 * the shell procedure.
    154   1.1       cgd 		 */
    155  1.24  christos 		switch (exception) {
    156  1.24  christos 		case EXSHELLPROC:
    157   1.1       cgd 			rootpid = getpid();
    158   1.1       cgd 			rootshell = 1;
    159   1.1       cgd 			minusc = NULL;
    160   1.1       cgd 			state = 3;
    161  1.24  christos 			break;
    162  1.24  christos 
    163  1.24  christos 		case EXEXEC:
    164  1.24  christos 			exitstatus = exerrno;
    165  1.24  christos 			break;
    166  1.24  christos 
    167  1.24  christos 		case EXERROR:
    168  1.24  christos 			exitstatus = 2;
    169  1.24  christos 			break;
    170  1.24  christos 
    171  1.24  christos 		default:
    172  1.24  christos 			break;
    173  1.24  christos 		}
    174  1.24  christos 
    175  1.24  christos 		if (exception != EXSHELLPROC) {
    176  1.75       kre 			if (state == 0 || iflag == 0 || ! rootshell ||
    177  1.75       kre 			    exception == EXEXIT)
    178  1.45  christos 				exitshell(exitstatus);
    179  1.24  christos 		}
    180   1.1       cgd 		reset();
    181  1.63  christos 		if (exception == EXINT) {
    182   1.1       cgd 			out2c('\n');
    183   1.1       cgd 			flushout(&errout);
    184   1.1       cgd 		}
    185   1.1       cgd 		popstackmark(&smark);
    186   1.1       cgd 		FORCEINTON;				/* enable interrupts */
    187   1.1       cgd 		if (state == 1)
    188   1.1       cgd 			goto state1;
    189   1.1       cgd 		else if (state == 2)
    190   1.1       cgd 			goto state2;
    191   1.9       jtc 		else if (state == 3)
    192   1.9       jtc 			goto state3;
    193   1.1       cgd 		else
    194   1.9       jtc 			goto state4;
    195   1.1       cgd 	}
    196  1.77       kre 	handler = &main_handler;
    197   1.1       cgd #ifdef DEBUG
    198  1.70       kre #if DEBUG >= 2
    199  1.69       kre 	debug = 1;	/* this may be reset by procargs() later */
    200  1.48      jmmv #endif
    201   1.1       cgd 	opentrace();
    202  1.87       kre 	if (privileged)
    203  1.87       kre 		trputs("Privileged ");
    204   1.1       cgd 	trputs("Shell args:  ");  trargs(argv);
    205  1.70       kre #if DEBUG >= 3
    206  1.71       kre 	set_debug(((DEBUG)==3 ? "_@" : "++"), 1);
    207  1.70       kre #endif
    208   1.1       cgd #endif
    209   1.1       cgd 	rootpid = getpid();
    210   1.1       cgd 	rootshell = 1;
    211   1.1       cgd 	init();
    212  1.50  christos 	initpwd();
    213   1.1       cgd 	setstackmark(&smark);
    214   1.1       cgd 	procargs(argc, argv);
    215  1.89       kre 	setvar_invocation(argc, argv);
    216  1.59  christos 
    217  1.87       kre #if 0	/* This now happens (indirectly) in the procargs() just above */
    218  1.59  christos 	/*
    219  1.59  christos 	 * Limit bogus system(3) or popen(3) calls in setuid binaries,
    220  1.59  christos 	 * by requiring the -p flag
    221  1.59  christos 	 */
    222  1.59  christos 	if (!pflag && (uid != geteuid() || gid != getegid())) {
    223  1.59  christos 		setuid(uid);
    224  1.59  christos 		setgid(gid);
    225  1.59  christos 		/* PS1 might need to be changed accordingly. */
    226  1.59  christos 		choose_ps1();
    227  1.59  christos 	}
    228  1.87       kre #else	/* except for this one little bit */
    229  1.87       kre 	if (waspriv && !privileged)
    230  1.87       kre 		choose_ps1();
    231  1.87       kre #endif
    232  1.59  christos 
    233  1.89       kre 	if (loginsh) {
    234   1.1       cgd 		state = 1;
    235   1.1       cgd 		read_profile("/etc/profile");
    236  1.79       kre  state1:
    237   1.1       cgd 		state = 2;
    238  1.87       kre 		if (!privileged) {
    239  1.87       kre 			char *profile;
    240  1.87       kre 			const char *home;
    241  1.87       kre 
    242  1.87       kre 			home = lookupvar("HOME");
    243  1.87       kre 			if (home == NULL)
    244  1.87       kre 				home = nullstr;
    245  1.88       kre 			profile = ststrcat(NULL, home, "/.profile", STSTRC_END);
    246  1.87       kre 			read_profile(profile);
    247  1.87       kre 			stunalloc(profile);
    248  1.87       kre 		}
    249  1.87       kre #if 0	/* FreeBSD does (effectively) ...*/
    250  1.87       kre 		else
    251  1.87       kre 			read_profile("/etc/suid_profile");
    252  1.87       kre #endif
    253  1.24  christos 	}
    254  1.79       kre  state2:
    255   1.1       cgd 	state = 3;
    256  1.87       kre 	if ((iflag || !posix) && !privileged) {
    257  1.79       kre 		struct stackmark env_smark;
    258  1.79       kre 
    259  1.79       kre 		setstackmark(&env_smark);
    260  1.14       jtc 		if ((shinit = lookupvar("ENV")) != NULL && *shinit != '\0') {
    261  1.14       jtc 			state = 3;
    262  1.79       kre 			read_profile(expandenv(shinit));
    263  1.14       jtc 		}
    264  1.79       kre 		popstackmark(&env_smark);
    265   1.9       jtc 	}
    266  1.79       kre  state3:
    267   1.9       jtc 	state = 4;
    268  1.71       kre 	line_number = 1;	/* undo anything from profile files */
    269  1.71       kre 
    270  1.33  christos 	if (sflag == 0 || minusc) {
    271  1.32  christos 		static int sigs[] =  {
    272  1.90       kre 		    SIGINT, SIGQUIT, SIGHUP,
    273  1.31  christos #ifdef SIGTSTP
    274  1.32  christos 		    SIGTSTP,
    275  1.31  christos #endif
    276  1.32  christos 		    SIGPIPE
    277  1.31  christos 		};
    278  1.32  christos #define SIGSSIZE (sizeof(sigs)/sizeof(sigs[0]))
    279  1.53     lukem 		size_t i;
    280  1.31  christos 
    281  1.31  christos 		for (i = 0; i < SIGSSIZE; i++)
    282  1.42  christos 		    setsignal(sigs[i], 0);
    283  1.33  christos 	}
    284  1.33  christos 
    285  1.87       kre 	rststackmark(&smark);	/* this one is never popped */
    286  1.87       kre 
    287  1.33  christos 	if (minusc)
    288  1.75       kre 		evalstring(minusc, sflag ? 0 : EV_EXIT);
    289  1.33  christos 
    290   1.1       cgd 	if (sflag || minusc == NULL) {
    291  1.79       kre  state4:	/* XXX ??? - why isn't this before the "if" statement */
    292   1.1       cgd 		cmdloop(1);
    293  1.82       kre 		if (iflag) {
    294  1.82       kre 			out2str("\n");
    295  1.82       kre 			flushout(&errout);
    296  1.82       kre 		}
    297   1.1       cgd 	}
    298   1.1       cgd #if PROFILE
    299   1.1       cgd 	monitor(0);
    300   1.1       cgd #endif
    301  1.80       kre 	line_number = plinno;
    302   1.1       cgd 	exitshell(exitstatus);
    303  1.28   mycroft 	/* NOTREACHED */
    304   1.1       cgd }
    305   1.1       cgd 
    306   1.1       cgd 
    307   1.1       cgd /*
    308   1.1       cgd  * Read and execute commands.  "Top" is nonzero for the top level command
    309   1.1       cgd  * loop; it turns on prompting if the shell is interactive.
    310   1.1       cgd  */
    311   1.1       cgd 
    312   1.1       cgd void
    313  1.45  christos cmdloop(int top)
    314  1.15       cgd {
    315   1.1       cgd 	union node *n;
    316   1.1       cgd 	struct stackmark smark;
    317   1.1       cgd 	int inter;
    318   1.9       jtc 	int numeof = 0;
    319  1.58  christos 	enum skipstate skip;
    320   1.1       cgd 
    321  1.72       kre 	CTRACE(DBG_ALWAYS, ("cmdloop(%d) called\n", top));
    322   1.1       cgd 	setstackmark(&smark);
    323   1.1       cgd 	for (;;) {
    324   1.1       cgd 		if (pendingsigs)
    325   1.1       cgd 			dotrap();
    326   1.1       cgd 		inter = 0;
    327  1.49  christos 		if (iflag == 1 && top) {
    328  1.45  christos 			inter = 1;
    329  1.45  christos 			showjobs(out2, SHOW_CHANGED);
    330   1.1       cgd 			chkmail(0);
    331  1.45  christos 			flushout(&errout);
    332  1.61  christos 			nflag = 0;
    333   1.1       cgd 		}
    334   1.1       cgd 		n = parsecmd(inter);
    335  1.72       kre 		VXTRACE(DBG_PARSE|DBG_EVAL|DBG_CMDS,("cmdloop: "),showtree(n));
    336   1.1       cgd 		if (n == NEOF) {
    337   1.9       jtc 			if (!top || numeof >= 50)
    338   1.1       cgd 				break;
    339  1.61  christos 			if (nflag)
    340  1.61  christos 				break;
    341   1.9       jtc 			if (!stoppedjobs()) {
    342  1.62    martin 				if (!iflag || !Iflag)
    343   1.9       jtc 					break;
    344   1.9       jtc 				out2str("\nUse \"exit\" to leave shell.\n");
    345   1.9       jtc 			}
    346   1.1       cgd 			numeof++;
    347   1.1       cgd 		} else if (n != NULL && nflag == 0) {
    348   1.9       jtc 			job_warning = (job_warning == 2) ? 1 : 0;
    349   1.9       jtc 			numeof = 0;
    350  1.74       kre 			evaltree(n, 0);
    351   1.1       cgd 		}
    352  1.76       kre 		rststackmark(&smark);
    353  1.58  christos 
    354  1.58  christos 		/*
    355  1.58  christos 		 * Any SKIP* can occur here!  SKIP(FUNC|BREAK|CONT) occur when
    356  1.58  christos 		 * a dotcmd is in a loop or a function body and appropriate
    357  1.58  christos 		 * built-ins occurs in file scope in the sourced file.  Values
    358  1.58  christos 		 * other than SKIPFILE are reset by the appropriate eval*()
    359  1.58  christos 		 * that contained the dotcmd() call.
    360  1.58  christos 		 */
    361  1.58  christos 		skip = current_skipstate();
    362  1.58  christos 		if (skip != SKIPNONE) {
    363  1.58  christos 			if (skip == SKIPFILE)
    364  1.58  christos 				stop_skipping();
    365  1.22  christos 			break;
    366  1.22  christos 		}
    367   1.1       cgd 	}
    368  1.39  christos 	popstackmark(&smark);
    369   1.1       cgd }
    370   1.1       cgd 
    371   1.1       cgd 
    372   1.1       cgd 
    373   1.1       cgd /*
    374   1.1       cgd  * Read /etc/profile or .profile.  Return on error.
    375   1.1       cgd  */
    376   1.1       cgd 
    377   1.1       cgd STATIC void
    378  1.45  christos read_profile(const char *name)
    379  1.30       cjs {
    380   1.1       cgd 	int fd;
    381  1.30       cjs 	int xflag_set = 0;
    382  1.30       cjs 	int vflag_set = 0;
    383   1.1       cgd 
    384  1.79       kre 	if (*name == '\0')
    385  1.79       kre 		return;
    386  1.79       kre 
    387   1.1       cgd 	INTOFF;
    388   1.1       cgd 	if ((fd = open(name, O_RDONLY)) >= 0)
    389   1.1       cgd 		setinputfd(fd, 1);
    390   1.1       cgd 	INTON;
    391   1.1       cgd 	if (fd < 0)
    392   1.1       cgd 		return;
    393  1.30       cjs 	/* -q turns off -x and -v just when executing init files */
    394  1.30       cjs 	if (qflag)  {
    395  1.30       cjs 	    if (xflag)
    396  1.30       cjs 		    xflag = 0, xflag_set = 1;
    397  1.30       cjs 	    if (vflag)
    398  1.30       cjs 		    vflag = 0, vflag_set = 1;
    399  1.30       cjs 	}
    400  1.81       kre 	(void)set_dot_funcnest(1);	/* allow profile to "return" */
    401   1.1       cgd 	cmdloop(0);
    402  1.81       kre 	(void)set_dot_funcnest(0);
    403  1.30       cjs 	if (qflag)  {
    404  1.30       cjs 	    if (xflag_set)
    405  1.30       cjs 		    xflag = 1;
    406  1.30       cjs 	    if (vflag_set)
    407  1.30       cjs 		    vflag = 1;
    408  1.30       cjs 	}
    409   1.1       cgd 	popfile();
    410   1.1       cgd }
    411   1.1       cgd 
    412   1.1       cgd 
    413   1.1       cgd 
    414   1.1       cgd /*
    415   1.1       cgd  * Read a file containing shell functions.
    416   1.1       cgd  */
    417   1.1       cgd 
    418   1.1       cgd void
    419  1.45  christos readcmdfile(char *name)
    420  1.16       cgd {
    421   1.1       cgd 	int fd;
    422   1.1       cgd 
    423   1.1       cgd 	INTOFF;
    424   1.1       cgd 	if ((fd = open(name, O_RDONLY)) >= 0)
    425   1.1       cgd 		setinputfd(fd, 1);
    426   1.1       cgd 	else
    427   1.1       cgd 		error("Can't open %s", name);
    428   1.1       cgd 	INTON;
    429   1.1       cgd 	cmdloop(0);
    430   1.1       cgd 	popfile();
    431   1.1       cgd }
    432   1.1       cgd 
    433   1.1       cgd 
    434   1.1       cgd 
    435  1.15       cgd int
    436  1.45  christos exitcmd(int argc, char **argv)
    437  1.15       cgd {
    438   1.9       jtc 	if (stoppedjobs())
    439  1.18  christos 		return 0;
    440   1.1       cgd 	if (argc > 1)
    441  1.78       kre 		exitshell(number(argv[1]));
    442  1.78       kre 	else
    443  1.78       kre 		exitshell_savedstatus();
    444  1.28   mycroft 	/* NOTREACHED */
    445   1.1       cgd }
    446