main.c revision 1.87 1 1.87 kre /* $NetBSD: main.c,v 1.87 2021/10/26 00:05:38 kre Exp $ */
2 1.17 cgd
3 1.1 cgd /*-
4 1.9 jtc * Copyright (c) 1991, 1993
5 1.9 jtc * The Regents of the University of California. All rights reserved.
6 1.1 cgd *
7 1.1 cgd * This code is derived from software contributed to Berkeley by
8 1.1 cgd * Kenneth Almquist.
9 1.1 cgd *
10 1.1 cgd * Redistribution and use in source and binary forms, with or without
11 1.1 cgd * modification, are permitted provided that the following conditions
12 1.1 cgd * are met:
13 1.1 cgd * 1. Redistributions of source code must retain the above copyright
14 1.1 cgd * notice, this list of conditions and the following disclaimer.
15 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 cgd * notice, this list of conditions and the following disclaimer in the
17 1.1 cgd * documentation and/or other materials provided with the distribution.
18 1.47 agc * 3. Neither the name of the University nor the names of its contributors
19 1.1 cgd * may be used to endorse or promote products derived from this software
20 1.1 cgd * without specific prior written permission.
21 1.1 cgd *
22 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 1.1 cgd * SUCH DAMAGE.
33 1.1 cgd */
34 1.1 cgd
35 1.26 christos #include <sys/cdefs.h>
36 1.1 cgd #ifndef lint
37 1.51 lukem __COPYRIGHT("@(#) Copyright (c) 1991, 1993\
38 1.51 lukem The Regents of the University of California. All rights reserved.");
39 1.1 cgd #endif /* not lint */
40 1.1 cgd
41 1.1 cgd #ifndef lint
42 1.17 cgd #if 0
43 1.21 christos static char sccsid[] = "@(#)main.c 8.7 (Berkeley) 7/19/95";
44 1.17 cgd #else
45 1.87 kre __RCSID("$NetBSD: main.c,v 1.87 2021/10/26 00:05:38 kre Exp $");
46 1.17 cgd #endif
47 1.1 cgd #endif /* not lint */
48 1.1 cgd
49 1.36 simonb #include <errno.h>
50 1.11 jtc #include <stdio.h>
51 1.1 cgd #include <signal.h>
52 1.11 jtc #include <sys/stat.h>
53 1.12 jtc #include <unistd.h>
54 1.87 kre #include <stdbool.h>
55 1.55 christos #include <stdlib.h>
56 1.46 christos #include <locale.h>
57 1.1 cgd #include <fcntl.h>
58 1.18 christos
59 1.18 christos
60 1.1 cgd #include "shell.h"
61 1.1 cgd #include "main.h"
62 1.1 cgd #include "mail.h"
63 1.1 cgd #include "options.h"
64 1.57 christos #include "builtins.h"
65 1.1 cgd #include "output.h"
66 1.1 cgd #include "parser.h"
67 1.1 cgd #include "nodes.h"
68 1.20 christos #include "expand.h"
69 1.1 cgd #include "eval.h"
70 1.1 cgd #include "jobs.h"
71 1.1 cgd #include "input.h"
72 1.1 cgd #include "trap.h"
73 1.1 cgd #include "var.h"
74 1.18 christos #include "show.h"
75 1.1 cgd #include "memalloc.h"
76 1.1 cgd #include "error.h"
77 1.1 cgd #include "init.h"
78 1.1 cgd #include "mystring.h"
79 1.11 jtc #include "exec.h"
80 1.23 christos #include "cd.h"
81 1.68 kre #include "redir.h"
82 1.1 cgd
83 1.1 cgd #define PROFILE 0
84 1.1 cgd
85 1.1 cgd int rootpid;
86 1.1 cgd int rootshell;
87 1.77 kre struct jmploc main_handler;
88 1.68 kre int max_user_fd;
89 1.86 kre long user_fd_limit;
90 1.87 kre bool privileged;
91 1.1 cgd #if PROFILE
92 1.1 cgd short profile_buf[16384];
93 1.1 cgd extern int etext();
94 1.1 cgd #endif
95 1.1 cgd
96 1.45 christos STATIC void read_profile(const char *);
97 1.1 cgd
98 1.1 cgd /*
99 1.1 cgd * Main routine. We initialize things, parse the arguments, execute
100 1.1 cgd * profiles if we're a login shell, and then call cmdloop to execute
101 1.1 cgd * commands. The setjmp call sets up the location to jump to when an
102 1.1 cgd * exception occurs. When an exception occurs the variable "state"
103 1.1 cgd * is used to figure out how far we had gotten.
104 1.1 cgd */
105 1.1 cgd
106 1.15 cgd int
107 1.45 christos main(int argc, char **argv)
108 1.15 cgd {
109 1.1 cgd struct stackmark smark;
110 1.1 cgd volatile int state;
111 1.1 cgd char *shinit;
112 1.59 christos uid_t uid;
113 1.59 christos gid_t gid;
114 1.85 fox sigset_t mask;
115 1.87 kre bool waspriv;
116 1.59 christos
117 1.83 kre /*
118 1.83 kre * If we happen to be invoked with SIGCHLD ignored, we cannot
119 1.83 kre * successfully do almost anything. Perhaps we should remember
120 1.83 kre * its state and pass it on ignored to children if it was ignored
121 1.83 kre * on entry, but that seems like just leaving the shit on the
122 1.83 kre * footpath for someone else to fall into...
123 1.83 kre */
124 1.83 kre (void)signal(SIGCHLD, SIG_DFL);
125 1.84 kre /*
126 1.84 kre * Similarly, SIGCHLD must not be blocked
127 1.84 kre */
128 1.85 fox sigemptyset(&mask);
129 1.85 fox sigaddset(&mask, SIGCHLD);
130 1.85 fox sigprocmask(SIG_UNBLOCK, &mask, NULL);
131 1.83 kre
132 1.59 christos uid = getuid();
133 1.59 christos gid = getgid();
134 1.46 christos
135 1.87 kre waspriv = privileged = (uid != geteuid()) || (gid != getegid());
136 1.87 kre
137 1.68 kre max_user_fd = fcntl(0, F_MAXFD);
138 1.68 kre if (max_user_fd < 2)
139 1.68 kre max_user_fd = 2;
140 1.86 kre user_fd_limit = sysconf(_SC_OPEN_MAX);
141 1.68 kre
142 1.46 christos setlocale(LC_ALL, "");
143 1.1 cgd
144 1.55 christos posix = getenv("POSIXLY_CORRECT") != NULL;
145 1.1 cgd #if PROFILE
146 1.1 cgd monitor(4, etext, profile_buf, sizeof profile_buf, 50);
147 1.1 cgd #endif
148 1.1 cgd state = 0;
149 1.77 kre if (setjmp(main_handler.loc)) {
150 1.1 cgd /*
151 1.1 cgd * When a shell procedure is executed, we raise the
152 1.1 cgd * exception EXSHELLPROC to clean up before executing
153 1.1 cgd * the shell procedure.
154 1.1 cgd */
155 1.24 christos switch (exception) {
156 1.24 christos case EXSHELLPROC:
157 1.1 cgd rootpid = getpid();
158 1.1 cgd rootshell = 1;
159 1.1 cgd minusc = NULL;
160 1.1 cgd state = 3;
161 1.24 christos break;
162 1.24 christos
163 1.24 christos case EXEXEC:
164 1.24 christos exitstatus = exerrno;
165 1.24 christos break;
166 1.24 christos
167 1.24 christos case EXERROR:
168 1.24 christos exitstatus = 2;
169 1.24 christos break;
170 1.24 christos
171 1.24 christos default:
172 1.24 christos break;
173 1.24 christos }
174 1.24 christos
175 1.24 christos if (exception != EXSHELLPROC) {
176 1.75 kre if (state == 0 || iflag == 0 || ! rootshell ||
177 1.75 kre exception == EXEXIT)
178 1.45 christos exitshell(exitstatus);
179 1.24 christos }
180 1.1 cgd reset();
181 1.63 christos if (exception == EXINT) {
182 1.1 cgd out2c('\n');
183 1.1 cgd flushout(&errout);
184 1.1 cgd }
185 1.1 cgd popstackmark(&smark);
186 1.1 cgd FORCEINTON; /* enable interrupts */
187 1.1 cgd if (state == 1)
188 1.1 cgd goto state1;
189 1.1 cgd else if (state == 2)
190 1.1 cgd goto state2;
191 1.9 jtc else if (state == 3)
192 1.9 jtc goto state3;
193 1.1 cgd else
194 1.9 jtc goto state4;
195 1.1 cgd }
196 1.77 kre handler = &main_handler;
197 1.1 cgd #ifdef DEBUG
198 1.70 kre #if DEBUG >= 2
199 1.69 kre debug = 1; /* this may be reset by procargs() later */
200 1.48 jmmv #endif
201 1.1 cgd opentrace();
202 1.87 kre if (privileged)
203 1.87 kre trputs("Privileged ");
204 1.1 cgd trputs("Shell args: "); trargs(argv);
205 1.70 kre #if DEBUG >= 3
206 1.71 kre set_debug(((DEBUG)==3 ? "_@" : "++"), 1);
207 1.70 kre #endif
208 1.1 cgd #endif
209 1.1 cgd rootpid = getpid();
210 1.1 cgd rootshell = 1;
211 1.1 cgd init();
212 1.50 christos initpwd();
213 1.1 cgd setstackmark(&smark);
214 1.1 cgd procargs(argc, argv);
215 1.59 christos
216 1.87 kre #if 0 /* This now happens (indirectly) in the procargs() just above */
217 1.59 christos /*
218 1.59 christos * Limit bogus system(3) or popen(3) calls in setuid binaries,
219 1.59 christos * by requiring the -p flag
220 1.59 christos */
221 1.59 christos if (!pflag && (uid != geteuid() || gid != getegid())) {
222 1.59 christos setuid(uid);
223 1.59 christos setgid(gid);
224 1.59 christos /* PS1 might need to be changed accordingly. */
225 1.59 christos choose_ps1();
226 1.59 christos }
227 1.87 kre #else /* except for this one little bit */
228 1.87 kre if (waspriv && !privileged)
229 1.87 kre choose_ps1();
230 1.87 kre #endif
231 1.59 christos
232 1.1 cgd if (argv[0] && argv[0][0] == '-') {
233 1.1 cgd state = 1;
234 1.1 cgd read_profile("/etc/profile");
235 1.79 kre state1:
236 1.1 cgd state = 2;
237 1.87 kre if (!privileged) {
238 1.87 kre char *profile;
239 1.87 kre const char *home;
240 1.87 kre
241 1.87 kre home = lookupvar("HOME");
242 1.87 kre if (home == NULL)
243 1.87 kre home = nullstr;
244 1.87 kre profile = ststrcat(NULL, home, "/.profile", NULL);
245 1.87 kre read_profile(profile);
246 1.87 kre stunalloc(profile);
247 1.87 kre }
248 1.87 kre #if 0 /* FreeBSD does (effectively) ...*/
249 1.87 kre else
250 1.87 kre read_profile("/etc/suid_profile");
251 1.87 kre #endif
252 1.24 christos }
253 1.79 kre state2:
254 1.1 cgd state = 3;
255 1.87 kre if ((iflag || !posix) && !privileged) {
256 1.79 kre struct stackmark env_smark;
257 1.79 kre
258 1.79 kre setstackmark(&env_smark);
259 1.14 jtc if ((shinit = lookupvar("ENV")) != NULL && *shinit != '\0') {
260 1.14 jtc state = 3;
261 1.79 kre read_profile(expandenv(shinit));
262 1.14 jtc }
263 1.79 kre popstackmark(&env_smark);
264 1.9 jtc }
265 1.79 kre state3:
266 1.9 jtc state = 4;
267 1.71 kre line_number = 1; /* undo anything from profile files */
268 1.71 kre
269 1.33 christos if (sflag == 0 || minusc) {
270 1.32 christos static int sigs[] = {
271 1.32 christos SIGINT, SIGQUIT, SIGHUP,
272 1.31 christos #ifdef SIGTSTP
273 1.32 christos SIGTSTP,
274 1.31 christos #endif
275 1.32 christos SIGPIPE
276 1.31 christos };
277 1.32 christos #define SIGSSIZE (sizeof(sigs)/sizeof(sigs[0]))
278 1.53 lukem size_t i;
279 1.31 christos
280 1.31 christos for (i = 0; i < SIGSSIZE; i++)
281 1.42 christos setsignal(sigs[i], 0);
282 1.33 christos }
283 1.33 christos
284 1.87 kre rststackmark(&smark); /* this one is never popped */
285 1.87 kre
286 1.33 christos if (minusc)
287 1.75 kre evalstring(minusc, sflag ? 0 : EV_EXIT);
288 1.33 christos
289 1.1 cgd if (sflag || minusc == NULL) {
290 1.79 kre state4: /* XXX ??? - why isn't this before the "if" statement */
291 1.1 cgd cmdloop(1);
292 1.82 kre if (iflag) {
293 1.82 kre out2str("\n");
294 1.82 kre flushout(&errout);
295 1.82 kre }
296 1.1 cgd }
297 1.1 cgd #if PROFILE
298 1.1 cgd monitor(0);
299 1.1 cgd #endif
300 1.80 kre line_number = plinno;
301 1.1 cgd exitshell(exitstatus);
302 1.28 mycroft /* NOTREACHED */
303 1.1 cgd }
304 1.1 cgd
305 1.1 cgd
306 1.1 cgd /*
307 1.1 cgd * Read and execute commands. "Top" is nonzero for the top level command
308 1.1 cgd * loop; it turns on prompting if the shell is interactive.
309 1.1 cgd */
310 1.1 cgd
311 1.1 cgd void
312 1.45 christos cmdloop(int top)
313 1.15 cgd {
314 1.1 cgd union node *n;
315 1.1 cgd struct stackmark smark;
316 1.1 cgd int inter;
317 1.9 jtc int numeof = 0;
318 1.58 christos enum skipstate skip;
319 1.1 cgd
320 1.72 kre CTRACE(DBG_ALWAYS, ("cmdloop(%d) called\n", top));
321 1.1 cgd setstackmark(&smark);
322 1.1 cgd for (;;) {
323 1.1 cgd if (pendingsigs)
324 1.1 cgd dotrap();
325 1.1 cgd inter = 0;
326 1.49 christos if (iflag == 1 && top) {
327 1.45 christos inter = 1;
328 1.45 christos showjobs(out2, SHOW_CHANGED);
329 1.1 cgd chkmail(0);
330 1.45 christos flushout(&errout);
331 1.61 christos nflag = 0;
332 1.1 cgd }
333 1.1 cgd n = parsecmd(inter);
334 1.72 kre VXTRACE(DBG_PARSE|DBG_EVAL|DBG_CMDS,("cmdloop: "),showtree(n));
335 1.1 cgd if (n == NEOF) {
336 1.9 jtc if (!top || numeof >= 50)
337 1.1 cgd break;
338 1.61 christos if (nflag)
339 1.61 christos break;
340 1.9 jtc if (!stoppedjobs()) {
341 1.62 martin if (!iflag || !Iflag)
342 1.9 jtc break;
343 1.9 jtc out2str("\nUse \"exit\" to leave shell.\n");
344 1.9 jtc }
345 1.1 cgd numeof++;
346 1.1 cgd } else if (n != NULL && nflag == 0) {
347 1.9 jtc job_warning = (job_warning == 2) ? 1 : 0;
348 1.9 jtc numeof = 0;
349 1.74 kre evaltree(n, 0);
350 1.1 cgd }
351 1.76 kre rststackmark(&smark);
352 1.58 christos
353 1.58 christos /*
354 1.58 christos * Any SKIP* can occur here! SKIP(FUNC|BREAK|CONT) occur when
355 1.58 christos * a dotcmd is in a loop or a function body and appropriate
356 1.58 christos * built-ins occurs in file scope in the sourced file. Values
357 1.58 christos * other than SKIPFILE are reset by the appropriate eval*()
358 1.58 christos * that contained the dotcmd() call.
359 1.58 christos */
360 1.58 christos skip = current_skipstate();
361 1.58 christos if (skip != SKIPNONE) {
362 1.58 christos if (skip == SKIPFILE)
363 1.58 christos stop_skipping();
364 1.22 christos break;
365 1.22 christos }
366 1.1 cgd }
367 1.39 christos popstackmark(&smark);
368 1.1 cgd }
369 1.1 cgd
370 1.1 cgd
371 1.1 cgd
372 1.1 cgd /*
373 1.1 cgd * Read /etc/profile or .profile. Return on error.
374 1.1 cgd */
375 1.1 cgd
376 1.1 cgd STATIC void
377 1.45 christos read_profile(const char *name)
378 1.30 cjs {
379 1.1 cgd int fd;
380 1.30 cjs int xflag_set = 0;
381 1.30 cjs int vflag_set = 0;
382 1.1 cgd
383 1.79 kre if (*name == '\0')
384 1.79 kre return;
385 1.79 kre
386 1.1 cgd INTOFF;
387 1.1 cgd if ((fd = open(name, O_RDONLY)) >= 0)
388 1.1 cgd setinputfd(fd, 1);
389 1.1 cgd INTON;
390 1.1 cgd if (fd < 0)
391 1.1 cgd return;
392 1.30 cjs /* -q turns off -x and -v just when executing init files */
393 1.30 cjs if (qflag) {
394 1.30 cjs if (xflag)
395 1.30 cjs xflag = 0, xflag_set = 1;
396 1.30 cjs if (vflag)
397 1.30 cjs vflag = 0, vflag_set = 1;
398 1.30 cjs }
399 1.81 kre (void)set_dot_funcnest(1); /* allow profile to "return" */
400 1.1 cgd cmdloop(0);
401 1.81 kre (void)set_dot_funcnest(0);
402 1.30 cjs if (qflag) {
403 1.30 cjs if (xflag_set)
404 1.30 cjs xflag = 1;
405 1.30 cjs if (vflag_set)
406 1.30 cjs vflag = 1;
407 1.30 cjs }
408 1.1 cgd popfile();
409 1.1 cgd }
410 1.1 cgd
411 1.1 cgd
412 1.1 cgd
413 1.1 cgd /*
414 1.1 cgd * Read a file containing shell functions.
415 1.1 cgd */
416 1.1 cgd
417 1.1 cgd void
418 1.45 christos readcmdfile(char *name)
419 1.16 cgd {
420 1.1 cgd int fd;
421 1.1 cgd
422 1.1 cgd INTOFF;
423 1.1 cgd if ((fd = open(name, O_RDONLY)) >= 0)
424 1.1 cgd setinputfd(fd, 1);
425 1.1 cgd else
426 1.1 cgd error("Can't open %s", name);
427 1.1 cgd INTON;
428 1.1 cgd cmdloop(0);
429 1.1 cgd popfile();
430 1.1 cgd }
431 1.1 cgd
432 1.1 cgd
433 1.1 cgd
434 1.15 cgd int
435 1.45 christos exitcmd(int argc, char **argv)
436 1.15 cgd {
437 1.9 jtc if (stoppedjobs())
438 1.18 christos return 0;
439 1.1 cgd if (argc > 1)
440 1.78 kre exitshell(number(argv[1]));
441 1.78 kre else
442 1.78 kre exitshell_savedstatus();
443 1.28 mycroft /* NOTREACHED */
444 1.1 cgd }
445