main.c revision 1.83 1 1.83 kre /* $NetBSD: main.c,v 1.83 2020/02/06 19:51:59 kre Exp $ */
2 1.17 cgd
3 1.1 cgd /*-
4 1.9 jtc * Copyright (c) 1991, 1993
5 1.9 jtc * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * This code is derived from software contributed to Berkeley by
8 1.1 cgd * Kenneth Almquist.
9 1.1 cgd *
10 1.1 cgd * Redistribution and use in source and binary forms, with or without
11 1.1 cgd * modification, are permitted provided that the following conditions
12 1.1 cgd * are met:
13 1.1 cgd * 1. Redistributions of source code must retain the above copyright
14 1.1 cgd * notice, this list of conditions and the following disclaimer.
15 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 cgd * notice, this list of conditions and the following disclaimer in the
17 1.1 cgd * documentation and/or other materials provided with the distribution.
18 1.47 agc * 3. Neither the name of the University nor the names of its contributors
19 1.1 cgd * may be used to endorse or promote products derived from this software
20 1.1 cgd * without specific prior written permission.
21 1.1 cgd *
22 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 1.1 cgd * SUCH DAMAGE.
33 1.1 cgd */
34 1.1 cgd
35 1.26 christos #include <sys/cdefs.h>
36 1.1 cgd #ifndef lint
37 1.51 lukem __COPYRIGHT("@(#) Copyright (c) 1991, 1993\
38 1.51 lukem The Regents of the University of California. All rights reserved.");
39 1.1 cgd #endif /* not lint */
40 1.1 cgd
41 1.1 cgd #ifndef lint
42 1.17 cgd #if 0
43 1.21 christos static char sccsid[] = "@(#)main.c 8.7 (Berkeley) 7/19/95";
44 1.17 cgd #else
45 1.83 kre __RCSID("$NetBSD: main.c,v 1.83 2020/02/06 19:51:59 kre Exp $");
46 1.17 cgd #endif
47 1.1 cgd #endif /* not lint */
48 1.1 cgd
49 1.36 simonb #include <errno.h>
50 1.11 jtc #include <stdio.h>
51 1.1 cgd #include <signal.h>
52 1.11 jtc #include <sys/stat.h>
53 1.12 jtc #include <unistd.h>
54 1.55 christos #include <stdlib.h>
55 1.46 christos #include <locale.h>
56 1.1 cgd #include <fcntl.h>
57 1.18 christos
58 1.18 christos
59 1.1 cgd #include "shell.h"
60 1.1 cgd #include "main.h"
61 1.1 cgd #include "mail.h"
62 1.1 cgd #include "options.h"
63 1.57 christos #include "builtins.h"
64 1.1 cgd #include "output.h"
65 1.1 cgd #include "parser.h"
66 1.1 cgd #include "nodes.h"
67 1.20 christos #include "expand.h"
68 1.1 cgd #include "eval.h"
69 1.1 cgd #include "jobs.h"
70 1.1 cgd #include "input.h"
71 1.1 cgd #include "trap.h"
72 1.1 cgd #include "var.h"
73 1.18 christos #include "show.h"
74 1.1 cgd #include "memalloc.h"
75 1.1 cgd #include "error.h"
76 1.1 cgd #include "init.h"
77 1.1 cgd #include "mystring.h"
78 1.11 jtc #include "exec.h"
79 1.23 christos #include "cd.h"
80 1.68 kre #include "redir.h"
81 1.1 cgd
82 1.1 cgd #define PROFILE 0
83 1.1 cgd
84 1.1 cgd int rootpid;
85 1.1 cgd int rootshell;
86 1.77 kre struct jmploc main_handler;
87 1.68 kre int max_user_fd;
88 1.1 cgd #if PROFILE
89 1.1 cgd short profile_buf[16384];
90 1.1 cgd extern int etext();
91 1.1 cgd #endif
92 1.1 cgd
93 1.45 christos STATIC void read_profile(const char *);
94 1.1 cgd
95 1.1 cgd /*
96 1.1 cgd * Main routine. We initialize things, parse the arguments, execute
97 1.1 cgd * profiles if we're a login shell, and then call cmdloop to execute
98 1.1 cgd * commands. The setjmp call sets up the location to jump to when an
99 1.1 cgd * exception occurs. When an exception occurs the variable "state"
100 1.1 cgd * is used to figure out how far we had gotten.
101 1.1 cgd */
102 1.1 cgd
103 1.15 cgd int
104 1.45 christos main(int argc, char **argv)
105 1.15 cgd {
106 1.1 cgd struct stackmark smark;
107 1.1 cgd volatile int state;
108 1.1 cgd char *shinit;
109 1.59 christos uid_t uid;
110 1.59 christos gid_t gid;
111 1.59 christos
112 1.83 kre /*
113 1.83 kre * If we happen to be invoked with SIGCHLD ignored, we cannot
114 1.83 kre * successfully do almost anything. Perhaps we should remember
115 1.83 kre * its state and pass it on ignored to children if it was ignored
116 1.83 kre * on entry, but that seems like just leaving the shit on the
117 1.83 kre * footpath for someone else to fall into...
118 1.83 kre */
119 1.83 kre (void)signal(SIGCHLD, SIG_DFL);
120 1.83 kre
121 1.59 christos uid = getuid();
122 1.59 christos gid = getgid();
123 1.46 christos
124 1.68 kre max_user_fd = fcntl(0, F_MAXFD);
125 1.68 kre if (max_user_fd < 2)
126 1.68 kre max_user_fd = 2;
127 1.68 kre
128 1.46 christos setlocale(LC_ALL, "");
129 1.1 cgd
130 1.55 christos posix = getenv("POSIXLY_CORRECT") != NULL;
131 1.1 cgd #if PROFILE
132 1.1 cgd monitor(4, etext, profile_buf, sizeof profile_buf, 50);
133 1.1 cgd #endif
134 1.1 cgd state = 0;
135 1.77 kre if (setjmp(main_handler.loc)) {
136 1.1 cgd /*
137 1.1 cgd * When a shell procedure is executed, we raise the
138 1.1 cgd * exception EXSHELLPROC to clean up before executing
139 1.1 cgd * the shell procedure.
140 1.1 cgd */
141 1.24 christos switch (exception) {
142 1.24 christos case EXSHELLPROC:
143 1.1 cgd rootpid = getpid();
144 1.1 cgd rootshell = 1;
145 1.1 cgd minusc = NULL;
146 1.1 cgd state = 3;
147 1.24 christos break;
148 1.24 christos
149 1.24 christos case EXEXEC:
150 1.24 christos exitstatus = exerrno;
151 1.24 christos break;
152 1.24 christos
153 1.24 christos case EXERROR:
154 1.24 christos exitstatus = 2;
155 1.24 christos break;
156 1.24 christos
157 1.24 christos default:
158 1.24 christos break;
159 1.24 christos }
160 1.24 christos
161 1.24 christos if (exception != EXSHELLPROC) {
162 1.75 kre if (state == 0 || iflag == 0 || ! rootshell ||
163 1.75 kre exception == EXEXIT)
164 1.45 christos exitshell(exitstatus);
165 1.24 christos }
166 1.1 cgd reset();
167 1.63 christos if (exception == EXINT) {
168 1.1 cgd out2c('\n');
169 1.1 cgd flushout(&errout);
170 1.1 cgd }
171 1.1 cgd popstackmark(&smark);
172 1.1 cgd FORCEINTON; /* enable interrupts */
173 1.1 cgd if (state == 1)
174 1.1 cgd goto state1;
175 1.1 cgd else if (state == 2)
176 1.1 cgd goto state2;
177 1.9 jtc else if (state == 3)
178 1.9 jtc goto state3;
179 1.1 cgd else
180 1.9 jtc goto state4;
181 1.1 cgd }
182 1.77 kre handler = &main_handler;
183 1.1 cgd #ifdef DEBUG
184 1.70 kre #if DEBUG >= 2
185 1.69 kre debug = 1; /* this may be reset by procargs() later */
186 1.48 jmmv #endif
187 1.1 cgd opentrace();
188 1.1 cgd trputs("Shell args: "); trargs(argv);
189 1.70 kre #if DEBUG >= 3
190 1.71 kre set_debug(((DEBUG)==3 ? "_@" : "++"), 1);
191 1.70 kre #endif
192 1.1 cgd #endif
193 1.1 cgd rootpid = getpid();
194 1.1 cgd rootshell = 1;
195 1.1 cgd init();
196 1.50 christos initpwd();
197 1.1 cgd setstackmark(&smark);
198 1.1 cgd procargs(argc, argv);
199 1.59 christos
200 1.59 christos /*
201 1.59 christos * Limit bogus system(3) or popen(3) calls in setuid binaries,
202 1.59 christos * by requiring the -p flag
203 1.59 christos */
204 1.59 christos if (!pflag && (uid != geteuid() || gid != getegid())) {
205 1.59 christos setuid(uid);
206 1.59 christos setgid(gid);
207 1.59 christos /* PS1 might need to be changed accordingly. */
208 1.59 christos choose_ps1();
209 1.59 christos }
210 1.59 christos
211 1.1 cgd if (argv[0] && argv[0][0] == '-') {
212 1.1 cgd state = 1;
213 1.1 cgd read_profile("/etc/profile");
214 1.79 kre state1:
215 1.1 cgd state = 2;
216 1.1 cgd read_profile(".profile");
217 1.24 christos }
218 1.79 kre state2:
219 1.1 cgd state = 3;
220 1.56 christos if ((iflag || !posix) &&
221 1.56 christos getuid() == geteuid() && getgid() == getegid()) {
222 1.79 kre struct stackmark env_smark;
223 1.79 kre
224 1.79 kre setstackmark(&env_smark);
225 1.14 jtc if ((shinit = lookupvar("ENV")) != NULL && *shinit != '\0') {
226 1.14 jtc state = 3;
227 1.79 kre read_profile(expandenv(shinit));
228 1.14 jtc }
229 1.79 kre popstackmark(&env_smark);
230 1.9 jtc }
231 1.79 kre state3:
232 1.9 jtc state = 4;
233 1.71 kre line_number = 1; /* undo anything from profile files */
234 1.71 kre
235 1.33 christos if (sflag == 0 || minusc) {
236 1.32 christos static int sigs[] = {
237 1.32 christos SIGINT, SIGQUIT, SIGHUP,
238 1.31 christos #ifdef SIGTSTP
239 1.32 christos SIGTSTP,
240 1.31 christos #endif
241 1.32 christos SIGPIPE
242 1.31 christos };
243 1.32 christos #define SIGSSIZE (sizeof(sigs)/sizeof(sigs[0]))
244 1.53 lukem size_t i;
245 1.31 christos
246 1.31 christos for (i = 0; i < SIGSSIZE; i++)
247 1.42 christos setsignal(sigs[i], 0);
248 1.33 christos }
249 1.33 christos
250 1.33 christos if (minusc)
251 1.75 kre evalstring(minusc, sflag ? 0 : EV_EXIT);
252 1.33 christos
253 1.1 cgd if (sflag || minusc == NULL) {
254 1.79 kre state4: /* XXX ??? - why isn't this before the "if" statement */
255 1.1 cgd cmdloop(1);
256 1.82 kre if (iflag) {
257 1.82 kre out2str("\n");
258 1.82 kre flushout(&errout);
259 1.82 kre }
260 1.1 cgd }
261 1.1 cgd #if PROFILE
262 1.1 cgd monitor(0);
263 1.1 cgd #endif
264 1.80 kre line_number = plinno;
265 1.1 cgd exitshell(exitstatus);
266 1.28 mycroft /* NOTREACHED */
267 1.1 cgd }
268 1.1 cgd
269 1.1 cgd
270 1.1 cgd /*
271 1.1 cgd * Read and execute commands. "Top" is nonzero for the top level command
272 1.1 cgd * loop; it turns on prompting if the shell is interactive.
273 1.1 cgd */
274 1.1 cgd
275 1.1 cgd void
276 1.45 christos cmdloop(int top)
277 1.15 cgd {
278 1.1 cgd union node *n;
279 1.1 cgd struct stackmark smark;
280 1.1 cgd int inter;
281 1.9 jtc int numeof = 0;
282 1.58 christos enum skipstate skip;
283 1.1 cgd
284 1.72 kre CTRACE(DBG_ALWAYS, ("cmdloop(%d) called\n", top));
285 1.1 cgd setstackmark(&smark);
286 1.1 cgd for (;;) {
287 1.1 cgd if (pendingsigs)
288 1.1 cgd dotrap();
289 1.1 cgd inter = 0;
290 1.49 christos if (iflag == 1 && top) {
291 1.45 christos inter = 1;
292 1.45 christos showjobs(out2, SHOW_CHANGED);
293 1.1 cgd chkmail(0);
294 1.45 christos flushout(&errout);
295 1.61 christos nflag = 0;
296 1.1 cgd }
297 1.1 cgd n = parsecmd(inter);
298 1.72 kre VXTRACE(DBG_PARSE|DBG_EVAL|DBG_CMDS,("cmdloop: "),showtree(n));
299 1.1 cgd if (n == NEOF) {
300 1.9 jtc if (!top || numeof >= 50)
301 1.1 cgd break;
302 1.61 christos if (nflag)
303 1.61 christos break;
304 1.9 jtc if (!stoppedjobs()) {
305 1.62 martin if (!iflag || !Iflag)
306 1.9 jtc break;
307 1.9 jtc out2str("\nUse \"exit\" to leave shell.\n");
308 1.9 jtc }
309 1.1 cgd numeof++;
310 1.1 cgd } else if (n != NULL && nflag == 0) {
311 1.9 jtc job_warning = (job_warning == 2) ? 1 : 0;
312 1.9 jtc numeof = 0;
313 1.74 kre evaltree(n, 0);
314 1.1 cgd }
315 1.76 kre rststackmark(&smark);
316 1.58 christos
317 1.58 christos /*
318 1.58 christos * Any SKIP* can occur here! SKIP(FUNC|BREAK|CONT) occur when
319 1.58 christos * a dotcmd is in a loop or a function body and appropriate
320 1.58 christos * built-ins occurs in file scope in the sourced file. Values
321 1.58 christos * other than SKIPFILE are reset by the appropriate eval*()
322 1.58 christos * that contained the dotcmd() call.
323 1.58 christos */
324 1.58 christos skip = current_skipstate();
325 1.58 christos if (skip != SKIPNONE) {
326 1.58 christos if (skip == SKIPFILE)
327 1.58 christos stop_skipping();
328 1.22 christos break;
329 1.22 christos }
330 1.1 cgd }
331 1.39 christos popstackmark(&smark);
332 1.1 cgd }
333 1.1 cgd
334 1.1 cgd
335 1.1 cgd
336 1.1 cgd /*
337 1.1 cgd * Read /etc/profile or .profile. Return on error.
338 1.1 cgd */
339 1.1 cgd
340 1.1 cgd STATIC void
341 1.45 christos read_profile(const char *name)
342 1.30 cjs {
343 1.1 cgd int fd;
344 1.30 cjs int xflag_set = 0;
345 1.30 cjs int vflag_set = 0;
346 1.1 cgd
347 1.79 kre if (*name == '\0')
348 1.79 kre return;
349 1.79 kre
350 1.1 cgd INTOFF;
351 1.1 cgd if ((fd = open(name, O_RDONLY)) >= 0)
352 1.1 cgd setinputfd(fd, 1);
353 1.1 cgd INTON;
354 1.1 cgd if (fd < 0)
355 1.1 cgd return;
356 1.30 cjs /* -q turns off -x and -v just when executing init files */
357 1.30 cjs if (qflag) {
358 1.30 cjs if (xflag)
359 1.30 cjs xflag = 0, xflag_set = 1;
360 1.30 cjs if (vflag)
361 1.30 cjs vflag = 0, vflag_set = 1;
362 1.30 cjs }
363 1.81 kre (void)set_dot_funcnest(1); /* allow profile to "return" */
364 1.1 cgd cmdloop(0);
365 1.81 kre (void)set_dot_funcnest(0);
366 1.30 cjs if (qflag) {
367 1.30 cjs if (xflag_set)
368 1.30 cjs xflag = 1;
369 1.30 cjs if (vflag_set)
370 1.30 cjs vflag = 1;
371 1.30 cjs }
372 1.1 cgd popfile();
373 1.1 cgd }
374 1.1 cgd
375 1.1 cgd
376 1.1 cgd
377 1.1 cgd /*
378 1.1 cgd * Read a file containing shell functions.
379 1.1 cgd */
380 1.1 cgd
381 1.1 cgd void
382 1.45 christos readcmdfile(char *name)
383 1.16 cgd {
384 1.1 cgd int fd;
385 1.1 cgd
386 1.1 cgd INTOFF;
387 1.1 cgd if ((fd = open(name, O_RDONLY)) >= 0)
388 1.1 cgd setinputfd(fd, 1);
389 1.1 cgd else
390 1.1 cgd error("Can't open %s", name);
391 1.1 cgd INTON;
392 1.1 cgd cmdloop(0);
393 1.1 cgd popfile();
394 1.1 cgd }
395 1.1 cgd
396 1.1 cgd
397 1.1 cgd
398 1.15 cgd int
399 1.45 christos exitcmd(int argc, char **argv)
400 1.15 cgd {
401 1.9 jtc if (stoppedjobs())
402 1.18 christos return 0;
403 1.1 cgd if (argc > 1)
404 1.78 kre exitshell(number(argv[1]));
405 1.78 kre else
406 1.78 kre exitshell_savedstatus();
407 1.28 mycroft /* NOTREACHED */
408 1.1 cgd }
409