Annotation of /trunk/mkinitrd-magellan/busybox/shell/ash.c
Parent Directory
|
Revision Log
Revision 984 -
(hide annotations)
(download)
Sun May 30 11:32:42 2010 UTC (14 years, 1 month ago) by niro
File MIME type: text/plain
File size: 290487 byte(s)
Sun May 30 11:32:42 2010 UTC (14 years, 1 month ago) by niro
File MIME type: text/plain
File size: 290487 byte(s)
-updated to busybox-1.16.1 and enabled blkid/uuid support in default config
1 | niro | 532 | /* vi: set sw=4 ts=4: */ |
2 | /* | ||
3 | * ash shell port for busybox | ||
4 | * | ||
5 | niro | 984 | * This code is derived from software contributed to Berkeley by |
6 | * Kenneth Almquist. | ||
7 | * | ||
8 | * Original BSD copyright notice is retained at the end of this file. | ||
9 | * | ||
10 | niro | 532 | * Copyright (c) 1989, 1991, 1993, 1994 |
11 | * The Regents of the University of California. All rights reserved. | ||
12 | * | ||
13 | * Copyright (c) 1997-2005 Herbert Xu <herbert@gondor.apana.org.au> | ||
14 | * was re-ported from NetBSD and debianized. | ||
15 | * | ||
16 | * Licensed under the GPL v2 or later, see the file LICENSE in this tarball. | ||
17 | */ | ||
18 | |||
19 | /* | ||
20 | niro | 816 | * The following should be set to reflect the type of system you have: |
21 | niro | 532 | * JOBS -> 1 if you have Berkeley job control, 0 otherwise. |
22 | * define SYSV if you are running under System V. | ||
23 | * define DEBUG=1 to compile in debugging ('set -o debug' to turn on) | ||
24 | * define DEBUG=2 to compile in and turn on debugging. | ||
25 | * | ||
26 | * When debugging is on, debugging info will be written to ./trace and | ||
27 | * a quit signal will generate a core dump. | ||
28 | */ | ||
29 | #define DEBUG 0 | ||
30 | niro | 816 | /* Tweak debug output verbosity here */ |
31 | #define DEBUG_TIME 0 | ||
32 | #define DEBUG_PID 1 | ||
33 | #define DEBUG_SIG 1 | ||
34 | niro | 532 | |
35 | niro | 816 | #define PROFILE 0 |
36 | niro | 532 | |
37 | niro | 816 | #define JOBS ENABLE_ASH_JOB_CONTROL |
38 | niro | 532 | |
39 | #if DEBUG | ||
40 | niro | 816 | # ifndef _GNU_SOURCE |
41 | # define _GNU_SOURCE | ||
42 | # endif | ||
43 | niro | 532 | #endif |
44 | |||
45 | niro | 816 | #include "busybox.h" /* for applet_names */ |
46 | niro | 532 | #include <paths.h> |
47 | #include <setjmp.h> | ||
48 | #include <fnmatch.h> | ||
49 | niro | 984 | |
50 | #include "shell_common.h" | ||
51 | #include "builtin_read.h" | ||
52 | #include "math.h" | ||
53 | #if ENABLE_ASH_RANDOM_SUPPORT | ||
54 | # include "random.h" | ||
55 | #else | ||
56 | # define CLEAR_RANDOM_T(rnd) ((void)0) | ||
57 | niro | 532 | #endif |
58 | |||
59 | niro | 984 | #define SKIP_definitions 1 |
60 | #include "applet_tables.h" | ||
61 | #undef SKIP_definitions | ||
62 | #if NUM_APPLETS == 1 | ||
63 | /* STANDALONE does not make sense, and won't compile */ | ||
64 | # undef CONFIG_FEATURE_SH_STANDALONE | ||
65 | # undef ENABLE_FEATURE_SH_STANDALONE | ||
66 | # undef IF_FEATURE_SH_STANDALONE | ||
67 | # undef IF_NOT_FEATURE_SH_STANDALONE | ||
68 | # define ENABLE_FEATURE_SH_STANDALONE 0 | ||
69 | # define IF_FEATURE_SH_STANDALONE(...) | ||
70 | # define IF_NOT_FEATURE_SH_STANDALONE(...) __VA_ARGS__ | ||
71 | #endif | ||
72 | |||
73 | niro | 816 | #ifndef PIPE_BUF |
74 | # define PIPE_BUF 4096 /* amount of buffering in a pipe */ | ||
75 | niro | 532 | #endif |
76 | |||
77 | #if defined(__uClinux__) | ||
78 | niro | 984 | # error "Do not even bother, ash will not run on NOMMU machine" |
79 | niro | 532 | #endif |
80 | |||
81 | |||
82 | niro | 816 | /* ============ Hash table sizes. Configurable. */ |
83 | niro | 532 | |
84 | niro | 816 | #define VTABSIZE 39 |
85 | #define ATABSIZE 39 | ||
86 | #define CMDTABLESIZE 31 /* should be prime */ | ||
87 | niro | 532 | |
88 | |||
89 | niro | 816 | /* ============ Shell options */ |
90 | niro | 532 | |
91 | niro | 816 | static const char *const optletters_optnames[] = { |
92 | "e" "errexit", | ||
93 | "f" "noglob", | ||
94 | "I" "ignoreeof", | ||
95 | "i" "interactive", | ||
96 | "m" "monitor", | ||
97 | "n" "noexec", | ||
98 | "s" "stdin", | ||
99 | "x" "xtrace", | ||
100 | "v" "verbose", | ||
101 | "C" "noclobber", | ||
102 | "a" "allexport", | ||
103 | "b" "notify", | ||
104 | "u" "nounset", | ||
105 | "\0" "vi" | ||
106 | niro | 984 | #if ENABLE_ASH_BASH_COMPAT |
107 | ,"\0" "pipefail" | ||
108 | #endif | ||
109 | niro | 816 | #if DEBUG |
110 | ,"\0" "nolog" | ||
111 | ,"\0" "debug" | ||
112 | niro | 532 | #endif |
113 | niro | 816 | }; |
114 | niro | 532 | |
115 | niro | 984 | #define optletters(n) optletters_optnames[n][0] |
116 | #define optnames(n) (optletters_optnames[n] + 1) | ||
117 | niro | 532 | |
118 | niro | 816 | enum { NOPTS = ARRAY_SIZE(optletters_optnames) }; |
119 | niro | 532 | |
120 | |||
121 | niro | 816 | /* ============ Misc data */ |
122 | niro | 532 | |
123 | niro | 816 | static const char homestr[] ALIGN1 = "HOME"; |
124 | static const char snlfmt[] ALIGN1 = "%s\n"; | ||
125 | niro | 984 | static const char msg_illnum[] ALIGN1 = "Illegal number: %s"; |
126 | niro | 532 | |
127 | /* | ||
128 | * We enclose jmp_buf in a structure so that we can declare pointers to | ||
129 | * jump locations. The global variable handler contains the location to | ||
130 | niro | 984 | * jump to when an exception occurs, and the global variable exception_type |
131 | niro | 532 | * contains a code identifying the exception. To implement nested |
132 | * exception handlers, the user should save the value of handler on entry | ||
133 | * to an inner scope, set handler to point to a jmploc structure for the | ||
134 | * inner scope, and restore handler on exit from the scope. | ||
135 | */ | ||
136 | struct jmploc { | ||
137 | jmp_buf loc; | ||
138 | }; | ||
139 | |||
140 | niro | 816 | struct globals_misc { |
141 | /* pid of main shell */ | ||
142 | int rootpid; | ||
143 | /* shell level: 0 for the main shell, 1 for its children, and so on */ | ||
144 | int shlvl; | ||
145 | #define rootshell (!shlvl) | ||
146 | char *minusc; /* argument to -c option */ | ||
147 | niro | 532 | |
148 | niro | 816 | char *curdir; // = nullstr; /* current working directory */ |
149 | char *physdir; // = nullstr; /* physical working directory */ | ||
150 | |||
151 | char *arg0; /* value of $0 */ | ||
152 | |||
153 | struct jmploc *exception_handler; | ||
154 | |||
155 | niro | 984 | volatile int suppress_int; /* counter */ |
156 | volatile /*sig_atomic_t*/ smallint pending_int; /* 1 = got SIGINT */ | ||
157 | niro | 816 | /* last pending signal */ |
158 | niro | 984 | volatile /*sig_atomic_t*/ smallint pending_sig; |
159 | smallint exception_type; /* kind of exception (0..5) */ | ||
160 | niro | 816 | /* exceptions */ |
161 | niro | 532 | #define EXINT 0 /* SIGINT received */ |
162 | #define EXERROR 1 /* a generic error */ | ||
163 | #define EXSHELLPROC 2 /* execute a shell procedure */ | ||
164 | #define EXEXEC 3 /* command execution failed */ | ||
165 | #define EXEXIT 4 /* exit the shell */ | ||
166 | #define EXSIG 5 /* trapped signal in wait(1) */ | ||
167 | |||
168 | niro | 816 | smallint isloginsh; |
169 | char nullstr[1]; /* zero length string */ | ||
170 | niro | 532 | |
171 | niro | 816 | char optlist[NOPTS]; |
172 | #define eflag optlist[0] | ||
173 | #define fflag optlist[1] | ||
174 | #define Iflag optlist[2] | ||
175 | #define iflag optlist[3] | ||
176 | #define mflag optlist[4] | ||
177 | #define nflag optlist[5] | ||
178 | #define sflag optlist[6] | ||
179 | #define xflag optlist[7] | ||
180 | #define vflag optlist[8] | ||
181 | #define Cflag optlist[9] | ||
182 | #define aflag optlist[10] | ||
183 | #define bflag optlist[11] | ||
184 | #define uflag optlist[12] | ||
185 | #define viflag optlist[13] | ||
186 | niro | 984 | #if ENABLE_ASH_BASH_COMPAT |
187 | # define pipefail optlist[14] | ||
188 | #else | ||
189 | # define pipefail 0 | ||
190 | #endif | ||
191 | niro | 816 | #if DEBUG |
192 | niro | 984 | # define nolog optlist[14 + ENABLE_ASH_BASH_COMPAT] |
193 | # define debug optlist[15 + ENABLE_ASH_BASH_COMPAT] | ||
194 | niro | 816 | #endif |
195 | niro | 532 | |
196 | niro | 816 | /* trap handler commands */ |
197 | /* | ||
198 | * Sigmode records the current value of the signal handlers for the various | ||
199 | * modes. A value of zero means that the current handler is not known. | ||
200 | niro | 984 | * S_HARD_IGN indicates that the signal was ignored on entry to the shell. |
201 | niro | 816 | */ |
202 | char sigmode[NSIG - 1]; | ||
203 | niro | 984 | #define S_DFL 1 /* default signal handling (SIG_DFL) */ |
204 | #define S_CATCH 2 /* signal is caught */ | ||
205 | #define S_IGN 3 /* signal is ignored (SIG_IGN) */ | ||
206 | niro | 816 | #define S_HARD_IGN 4 /* signal is ignored permenantly */ |
207 | |||
208 | /* indicates specified signal received */ | ||
209 | niro | 984 | uint8_t gotsig[NSIG - 1]; /* offset by 1: "signal" 0 is meaningless */ |
210 | niro | 816 | char *trap[NSIG]; |
211 | niro | 984 | char **trap_ptr; /* used only by "trap hack" */ |
212 | niro | 816 | |
213 | /* Rarely referenced stuff */ | ||
214 | #if ENABLE_ASH_RANDOM_SUPPORT | ||
215 | niro | 984 | random_t random_gen; |
216 | niro | 816 | #endif |
217 | pid_t backgndpid; /* pid of last background process */ | ||
218 | smallint job_warning; /* user was warned about stopped jobs (can be 2, 1 or 0). */ | ||
219 | }; | ||
220 | extern struct globals_misc *const ash_ptr_to_globals_misc; | ||
221 | #define G_misc (*ash_ptr_to_globals_misc) | ||
222 | #define rootpid (G_misc.rootpid ) | ||
223 | #define shlvl (G_misc.shlvl ) | ||
224 | #define minusc (G_misc.minusc ) | ||
225 | #define curdir (G_misc.curdir ) | ||
226 | #define physdir (G_misc.physdir ) | ||
227 | #define arg0 (G_misc.arg0 ) | ||
228 | #define exception_handler (G_misc.exception_handler) | ||
229 | niro | 984 | #define exception_type (G_misc.exception_type ) |
230 | #define suppress_int (G_misc.suppress_int ) | ||
231 | #define pending_int (G_misc.pending_int ) | ||
232 | #define pending_sig (G_misc.pending_sig ) | ||
233 | niro | 816 | #define isloginsh (G_misc.isloginsh ) |
234 | #define nullstr (G_misc.nullstr ) | ||
235 | #define optlist (G_misc.optlist ) | ||
236 | #define sigmode (G_misc.sigmode ) | ||
237 | #define gotsig (G_misc.gotsig ) | ||
238 | #define trap (G_misc.trap ) | ||
239 | niro | 984 | #define trap_ptr (G_misc.trap_ptr ) |
240 | #define random_gen (G_misc.random_gen ) | ||
241 | niro | 816 | #define backgndpid (G_misc.backgndpid ) |
242 | #define job_warning (G_misc.job_warning) | ||
243 | #define INIT_G_misc() do { \ | ||
244 | (*(struct globals_misc**)&ash_ptr_to_globals_misc) = xzalloc(sizeof(G_misc)); \ | ||
245 | barrier(); \ | ||
246 | curdir = nullstr; \ | ||
247 | physdir = nullstr; \ | ||
248 | niro | 984 | trap_ptr = trap; \ |
249 | niro | 816 | } while (0) |
250 | |||
251 | |||
252 | /* ============ DEBUG */ | ||
253 | #if DEBUG | ||
254 | static void trace_printf(const char *fmt, ...); | ||
255 | static void trace_vprintf(const char *fmt, va_list va); | ||
256 | # define TRACE(param) trace_printf param | ||
257 | # define TRACEV(param) trace_vprintf param | ||
258 | niro | 984 | # define close(fd) do { \ |
259 | int dfd = (fd); \ | ||
260 | niro | 816 | if (close(dfd) < 0) \ |
261 | niro | 984 | bb_error_msg("bug on %d: closing %d(0x%x)", \ |
262 | niro | 816 | __LINE__, dfd, dfd); \ |
263 | } while (0) | ||
264 | #else | ||
265 | # define TRACE(param) | ||
266 | # define TRACEV(param) | ||
267 | #endif | ||
268 | |||
269 | |||
270 | /* ============ Utility functions */ | ||
271 | #define xbarrier() do { __asm__ __volatile__ ("": : :"memory"); } while (0) | ||
272 | |||
273 | static int isdigit_str9(const char *str) | ||
274 | { | ||
275 | int maxlen = 9 + 1; /* max 9 digits: 999999999 */ | ||
276 | while (--maxlen && isdigit(*str)) | ||
277 | str++; | ||
278 | return (*str == '\0'); | ||
279 | } | ||
280 | |||
281 | |||
282 | /* ============ Interrupts / exceptions */ | ||
283 | niro | 532 | /* |
284 | * These macros allow the user to suspend the handling of interrupt signals | ||
285 | niro | 816 | * over a period of time. This is similar to SIGHOLD or to sigblock, but |
286 | niro | 532 | * much more efficient and portable. (But hacking the kernel is so much |
287 | * more fun than worrying about efficiency and portability. :-)) | ||
288 | */ | ||
289 | niro | 816 | #define INT_OFF do { \ |
290 | niro | 984 | suppress_int++; \ |
291 | niro | 816 | xbarrier(); \ |
292 | } while (0) | ||
293 | niro | 532 | |
294 | niro | 816 | /* |
295 | * Called to raise an exception. Since C doesn't include exceptions, we | ||
296 | * just do a longjmp to the exception handler. The type of exception is | ||
297 | niro | 984 | * stored in the global variable "exception_type". |
298 | niro | 816 | */ |
299 | static void raise_exception(int) NORETURN; | ||
300 | static void | ||
301 | raise_exception(int e) | ||
302 | { | ||
303 | #if DEBUG | ||
304 | if (exception_handler == NULL) | ||
305 | abort(); | ||
306 | #endif | ||
307 | INT_OFF; | ||
308 | niro | 984 | exception_type = e; |
309 | niro | 816 | longjmp(exception_handler->loc, 1); |
310 | } | ||
311 | #if DEBUG | ||
312 | #define raise_exception(e) do { \ | ||
313 | TRACE(("raising exception %d on line %d\n", (e), __LINE__)); \ | ||
314 | raise_exception(e); \ | ||
315 | } while (0) | ||
316 | #endif | ||
317 | niro | 532 | |
318 | niro | 816 | /* |
319 | * Called from trap.c when a SIGINT is received. (If the user specifies | ||
320 | * that SIGINT is to be trapped or ignored using the trap builtin, then | ||
321 | * this routine is not called.) Suppressint is nonzero when interrupts | ||
322 | * are held using the INT_OFF macro. (The test for iflag is just | ||
323 | * defensive programming.) | ||
324 | */ | ||
325 | static void raise_interrupt(void) NORETURN; | ||
326 | static void | ||
327 | raise_interrupt(void) | ||
328 | { | ||
329 | niro | 984 | int ex_type; |
330 | niro | 532 | |
331 | niro | 984 | pending_int = 0; |
332 | niro | 816 | /* Signal is not automatically unmasked after it is raised, |
333 | * do it ourself - unmask all signals */ | ||
334 | sigprocmask_allsigs(SIG_UNBLOCK); | ||
335 | niro | 984 | /* pending_sig = 0; - now done in onsig() */ |
336 | niro | 532 | |
337 | niro | 984 | ex_type = EXSIG; |
338 | niro | 816 | if (gotsig[SIGINT - 1] && !trap[SIGINT]) { |
339 | if (!(rootshell && iflag)) { | ||
340 | /* Kill ourself with SIGINT */ | ||
341 | signal(SIGINT, SIG_DFL); | ||
342 | raise(SIGINT); | ||
343 | } | ||
344 | niro | 984 | ex_type = EXINT; |
345 | niro | 816 | } |
346 | niro | 984 | raise_exception(ex_type); |
347 | niro | 816 | /* NOTREACHED */ |
348 | } | ||
349 | #if DEBUG | ||
350 | #define raise_interrupt() do { \ | ||
351 | TRACE(("raising interrupt on line %d\n", __LINE__)); \ | ||
352 | raise_interrupt(); \ | ||
353 | } while (0) | ||
354 | #endif | ||
355 | niro | 532 | |
356 | niro | 984 | static IF_ASH_OPTIMIZE_FOR_SIZE(inline) void |
357 | niro | 816 | int_on(void) |
358 | { | ||
359 | niro | 984 | xbarrier(); |
360 | if (--suppress_int == 0 && pending_int) { | ||
361 | niro | 816 | raise_interrupt(); |
362 | niro | 532 | } |
363 | } | ||
364 | niro | 816 | #define INT_ON int_on() |
365 | niro | 984 | static IF_ASH_OPTIMIZE_FOR_SIZE(inline) void |
366 | niro | 816 | force_int_on(void) |
367 | niro | 532 | { |
368 | niro | 984 | xbarrier(); |
369 | suppress_int = 0; | ||
370 | if (pending_int) | ||
371 | niro | 816 | raise_interrupt(); |
372 | niro | 532 | } |
373 | niro | 816 | #define FORCE_INT_ON force_int_on() |
374 | niro | 532 | |
375 | niro | 984 | #define SAVE_INT(v) ((v) = suppress_int) |
376 | niro | 532 | |
377 | niro | 816 | #define RESTORE_INT(v) do { \ |
378 | xbarrier(); \ | ||
379 | niro | 984 | suppress_int = (v); \ |
380 | if (suppress_int == 0 && pending_int) \ | ||
381 | niro | 816 | raise_interrupt(); \ |
382 | } while (0) | ||
383 | niro | 532 | |
384 | |||
385 | niro | 816 | /* ============ Stdout/stderr output */ |
386 | niro | 532 | |
387 | niro | 816 | static void |
388 | outstr(const char *p, FILE *file) | ||
389 | { | ||
390 | INT_OFF; | ||
391 | fputs(p, file); | ||
392 | INT_ON; | ||
393 | } | ||
394 | niro | 532 | |
395 | niro | 816 | static void |
396 | flush_stdout_stderr(void) | ||
397 | { | ||
398 | INT_OFF; | ||
399 | niro | 984 | fflush_all(); |
400 | niro | 816 | INT_ON; |
401 | } | ||
402 | niro | 532 | |
403 | niro | 816 | static void |
404 | outcslow(int c, FILE *dest) | ||
405 | { | ||
406 | INT_OFF; | ||
407 | putc(c, dest); | ||
408 | fflush(dest); | ||
409 | INT_ON; | ||
410 | } | ||
411 | |||
412 | static int out1fmt(const char *, ...) __attribute__((__format__(__printf__,1,2))); | ||
413 | static int | ||
414 | out1fmt(const char *fmt, ...) | ||
415 | { | ||
416 | va_list ap; | ||
417 | int r; | ||
418 | |||
419 | INT_OFF; | ||
420 | va_start(ap, fmt); | ||
421 | r = vprintf(fmt, ap); | ||
422 | va_end(ap); | ||
423 | INT_ON; | ||
424 | return r; | ||
425 | } | ||
426 | |||
427 | static int fmtstr(char *, size_t, const char *, ...) __attribute__((__format__(__printf__,3,4))); | ||
428 | static int | ||
429 | fmtstr(char *outbuf, size_t length, const char *fmt, ...) | ||
430 | { | ||
431 | va_list ap; | ||
432 | int ret; | ||
433 | |||
434 | va_start(ap, fmt); | ||
435 | INT_OFF; | ||
436 | ret = vsnprintf(outbuf, length, fmt, ap); | ||
437 | va_end(ap); | ||
438 | INT_ON; | ||
439 | return ret; | ||
440 | } | ||
441 | |||
442 | static void | ||
443 | out1str(const char *p) | ||
444 | { | ||
445 | outstr(p, stdout); | ||
446 | } | ||
447 | |||
448 | static void | ||
449 | out2str(const char *p) | ||
450 | { | ||
451 | outstr(p, stderr); | ||
452 | niro | 984 | flush_stdout_stderr(); |
453 | niro | 816 | } |
454 | |||
455 | |||
456 | /* ============ Parser structures */ | ||
457 | |||
458 | /* control characters in argument strings */ | ||
459 | niro | 984 | #define CTL_FIRST CTLESC |
460 | #define CTLESC ((unsigned char)'\201') /* escape next character */ | ||
461 | #define CTLVAR ((unsigned char)'\202') /* variable defn */ | ||
462 | #define CTLENDVAR ((unsigned char)'\203') | ||
463 | #define CTLBACKQ ((unsigned char)'\204') | ||
464 | niro | 816 | #define CTLQUOTE 01 /* ored with CTLBACKQ code if in quotes */ |
465 | /* CTLBACKQ | CTLQUOTE == '\205' */ | ||
466 | niro | 984 | #define CTLARI ((unsigned char)'\206') /* arithmetic expression */ |
467 | #define CTLENDARI ((unsigned char)'\207') | ||
468 | #define CTLQUOTEMARK ((unsigned char)'\210') | ||
469 | #define CTL_LAST CTLQUOTEMARK | ||
470 | niro | 816 | |
471 | /* variable substitution byte (follows CTLVAR) */ | ||
472 | #define VSTYPE 0x0f /* type of variable substitution */ | ||
473 | #define VSNUL 0x10 /* colon--treat the empty string as unset */ | ||
474 | #define VSQUOTE 0x80 /* inside double quotes--suppress splitting */ | ||
475 | |||
476 | /* values of VSTYPE field */ | ||
477 | #define VSNORMAL 0x1 /* normal variable: $var or ${var} */ | ||
478 | #define VSMINUS 0x2 /* ${var-text} */ | ||
479 | #define VSPLUS 0x3 /* ${var+text} */ | ||
480 | #define VSQUESTION 0x4 /* ${var?message} */ | ||
481 | #define VSASSIGN 0x5 /* ${var=text} */ | ||
482 | #define VSTRIMRIGHT 0x6 /* ${var%pattern} */ | ||
483 | #define VSTRIMRIGHTMAX 0x7 /* ${var%%pattern} */ | ||
484 | #define VSTRIMLEFT 0x8 /* ${var#pattern} */ | ||
485 | #define VSTRIMLEFTMAX 0x9 /* ${var##pattern} */ | ||
486 | #define VSLENGTH 0xa /* ${#var} */ | ||
487 | #if ENABLE_ASH_BASH_COMPAT | ||
488 | #define VSSUBSTR 0xc /* ${var:position:length} */ | ||
489 | #define VSREPLACE 0xd /* ${var/pattern/replacement} */ | ||
490 | #define VSREPLACEALL 0xe /* ${var//pattern/replacement} */ | ||
491 | #endif | ||
492 | |||
493 | static const char dolatstr[] ALIGN1 = { | ||
494 | CTLVAR, VSNORMAL|VSQUOTE, '@', '=', '\0' | ||
495 | niro | 532 | }; |
496 | |||
497 | niro | 816 | #define NCMD 0 |
498 | #define NPIPE 1 | ||
499 | #define NREDIR 2 | ||
500 | #define NBACKGND 3 | ||
501 | niro | 532 | #define NSUBSHELL 4 |
502 | niro | 816 | #define NAND 5 |
503 | #define NOR 6 | ||
504 | #define NSEMI 7 | ||
505 | #define NIF 8 | ||
506 | #define NWHILE 9 | ||
507 | #define NUNTIL 10 | ||
508 | #define NFOR 11 | ||
509 | #define NCASE 12 | ||
510 | #define NCLIST 13 | ||
511 | #define NDEFUN 14 | ||
512 | #define NARG 15 | ||
513 | #define NTO 16 | ||
514 | #if ENABLE_ASH_BASH_COMPAT | ||
515 | #define NTO2 17 | ||
516 | #endif | ||
517 | #define NCLOBBER 18 | ||
518 | #define NFROM 19 | ||
519 | #define NFROMTO 20 | ||
520 | #define NAPPEND 21 | ||
521 | #define NTOFD 22 | ||
522 | #define NFROMFD 23 | ||
523 | #define NHERE 24 | ||
524 | #define NXHERE 25 | ||
525 | #define NNOT 26 | ||
526 | #define N_NUMBER 27 | ||
527 | niro | 532 | |
528 | niro | 816 | union node; |
529 | niro | 532 | |
530 | struct ncmd { | ||
531 | niro | 816 | smallint type; /* Nxxxx */ |
532 | union node *assign; | ||
533 | union node *args; | ||
534 | union node *redirect; | ||
535 | niro | 532 | }; |
536 | |||
537 | struct npipe { | ||
538 | niro | 816 | smallint type; |
539 | smallint pipe_backgnd; | ||
540 | struct nodelist *cmdlist; | ||
541 | niro | 532 | }; |
542 | |||
543 | struct nredir { | ||
544 | niro | 816 | smallint type; |
545 | union node *n; | ||
546 | union node *redirect; | ||
547 | niro | 532 | }; |
548 | |||
549 | struct nbinary { | ||
550 | niro | 816 | smallint type; |
551 | union node *ch1; | ||
552 | union node *ch2; | ||
553 | niro | 532 | }; |
554 | |||
555 | struct nif { | ||
556 | niro | 816 | smallint type; |
557 | union node *test; | ||
558 | union node *ifpart; | ||
559 | union node *elsepart; | ||
560 | niro | 532 | }; |
561 | |||
562 | struct nfor { | ||
563 | niro | 816 | smallint type; |
564 | union node *args; | ||
565 | union node *body; | ||
566 | char *var; | ||
567 | niro | 532 | }; |
568 | |||
569 | struct ncase { | ||
570 | niro | 816 | smallint type; |
571 | union node *expr; | ||
572 | union node *cases; | ||
573 | niro | 532 | }; |
574 | |||
575 | struct nclist { | ||
576 | niro | 816 | smallint type; |
577 | union node *next; | ||
578 | union node *pattern; | ||
579 | union node *body; | ||
580 | niro | 532 | }; |
581 | |||
582 | struct narg { | ||
583 | niro | 816 | smallint type; |
584 | union node *next; | ||
585 | char *text; | ||
586 | struct nodelist *backquote; | ||
587 | niro | 532 | }; |
588 | |||
589 | niro | 816 | /* nfile and ndup layout must match! |
590 | * NTOFD (>&fdnum) uses ndup structure, but we may discover mid-flight | ||
591 | * that it is actually NTO2 (>&file), and change its type. | ||
592 | */ | ||
593 | niro | 532 | struct nfile { |
594 | niro | 816 | smallint type; |
595 | union node *next; | ||
596 | int fd; | ||
597 | int _unused_dupfd; | ||
598 | union node *fname; | ||
599 | char *expfname; | ||
600 | niro | 532 | }; |
601 | |||
602 | struct ndup { | ||
603 | niro | 816 | smallint type; |
604 | union node *next; | ||
605 | int fd; | ||
606 | int dupfd; | ||
607 | union node *vname; | ||
608 | char *_unused_expfname; | ||
609 | niro | 532 | }; |
610 | |||
611 | struct nhere { | ||
612 | niro | 816 | smallint type; |
613 | union node *next; | ||
614 | int fd; | ||
615 | union node *doc; | ||
616 | niro | 532 | }; |
617 | |||
618 | struct nnot { | ||
619 | niro | 816 | smallint type; |
620 | union node *com; | ||
621 | niro | 532 | }; |
622 | |||
623 | union node { | ||
624 | niro | 816 | smallint type; |
625 | struct ncmd ncmd; | ||
626 | struct npipe npipe; | ||
627 | struct nredir nredir; | ||
628 | struct nbinary nbinary; | ||
629 | struct nif nif; | ||
630 | struct nfor nfor; | ||
631 | struct ncase ncase; | ||
632 | struct nclist nclist; | ||
633 | struct narg narg; | ||
634 | struct nfile nfile; | ||
635 | struct ndup ndup; | ||
636 | struct nhere nhere; | ||
637 | struct nnot nnot; | ||
638 | niro | 532 | }; |
639 | |||
640 | niro | 984 | /* |
641 | * NODE_EOF is returned by parsecmd when it encounters an end of file. | ||
642 | * It must be distinct from NULL. | ||
643 | */ | ||
644 | #define NODE_EOF ((union node *) -1L) | ||
645 | |||
646 | niro | 532 | struct nodelist { |
647 | struct nodelist *next; | ||
648 | union node *n; | ||
649 | }; | ||
650 | |||
651 | struct funcnode { | ||
652 | int count; | ||
653 | union node n; | ||
654 | }; | ||
655 | |||
656 | niro | 816 | /* |
657 | * Free a parse tree. | ||
658 | */ | ||
659 | static void | ||
660 | freefunc(struct funcnode *f) | ||
661 | { | ||
662 | if (f && --f->count < 0) | ||
663 | free(f); | ||
664 | } | ||
665 | niro | 532 | |
666 | |||
667 | niro | 816 | /* ============ Debugging output */ |
668 | niro | 532 | |
669 | niro | 816 | #if DEBUG |
670 | niro | 532 | |
671 | niro | 816 | static FILE *tracefile; |
672 | niro | 532 | |
673 | niro | 816 | static void |
674 | trace_printf(const char *fmt, ...) | ||
675 | { | ||
676 | va_list va; | ||
677 | niro | 532 | |
678 | niro | 816 | if (debug != 1) |
679 | return; | ||
680 | if (DEBUG_TIME) | ||
681 | fprintf(tracefile, "%u ", (int) time(NULL)); | ||
682 | if (DEBUG_PID) | ||
683 | fprintf(tracefile, "[%u] ", (int) getpid()); | ||
684 | if (DEBUG_SIG) | ||
685 | niro | 984 | fprintf(tracefile, "pending s:%d i:%d(supp:%d) ", pending_sig, pending_int, suppress_int); |
686 | niro | 816 | va_start(va, fmt); |
687 | vfprintf(tracefile, fmt, va); | ||
688 | va_end(va); | ||
689 | } | ||
690 | niro | 532 | |
691 | niro | 816 | static void |
692 | trace_vprintf(const char *fmt, va_list va) | ||
693 | { | ||
694 | if (debug != 1) | ||
695 | return; | ||
696 | if (DEBUG_TIME) | ||
697 | fprintf(tracefile, "%u ", (int) time(NULL)); | ||
698 | if (DEBUG_PID) | ||
699 | fprintf(tracefile, "[%u] ", (int) getpid()); | ||
700 | if (DEBUG_SIG) | ||
701 | niro | 984 | fprintf(tracefile, "pending s:%d i:%d(supp:%d) ", pending_sig, pending_int, suppress_int); |
702 | niro | 816 | vfprintf(tracefile, fmt, va); |
703 | } | ||
704 | |||
705 | static void | ||
706 | trace_puts(const char *s) | ||
707 | { | ||
708 | if (debug != 1) | ||
709 | return; | ||
710 | fputs(s, tracefile); | ||
711 | } | ||
712 | |||
713 | static void | ||
714 | trace_puts_quoted(char *s) | ||
715 | { | ||
716 | char *p; | ||
717 | char c; | ||
718 | |||
719 | if (debug != 1) | ||
720 | return; | ||
721 | putc('"', tracefile); | ||
722 | for (p = s; *p; p++) { | ||
723 | niro | 984 | switch ((unsigned char)*p) { |
724 | case '\n': c = 'n'; goto backslash; | ||
725 | case '\t': c = 't'; goto backslash; | ||
726 | case '\r': c = 'r'; goto backslash; | ||
727 | case '\"': c = '\"'; goto backslash; | ||
728 | case '\\': c = '\\'; goto backslash; | ||
729 | case CTLESC: c = 'e'; goto backslash; | ||
730 | case CTLVAR: c = 'v'; goto backslash; | ||
731 | case CTLVAR+CTLQUOTE: c = 'V'; goto backslash; | ||
732 | case CTLBACKQ: c = 'q'; goto backslash; | ||
733 | case CTLBACKQ+CTLQUOTE: c = 'Q'; goto backslash; | ||
734 | niro | 816 | backslash: |
735 | putc('\\', tracefile); | ||
736 | putc(c, tracefile); | ||
737 | break; | ||
738 | default: | ||
739 | if (*p >= ' ' && *p <= '~') | ||
740 | putc(*p, tracefile); | ||
741 | else { | ||
742 | putc('\\', tracefile); | ||
743 | niro | 984 | putc((*p >> 6) & 03, tracefile); |
744 | putc((*p >> 3) & 07, tracefile); | ||
745 | niro | 816 | putc(*p & 07, tracefile); |
746 | } | ||
747 | break; | ||
748 | } | ||
749 | } | ||
750 | putc('"', tracefile); | ||
751 | } | ||
752 | |||
753 | static void | ||
754 | trace_puts_args(char **ap) | ||
755 | { | ||
756 | if (debug != 1) | ||
757 | return; | ||
758 | if (!*ap) | ||
759 | return; | ||
760 | while (1) { | ||
761 | trace_puts_quoted(*ap); | ||
762 | if (!*++ap) { | ||
763 | putc('\n', tracefile); | ||
764 | break; | ||
765 | } | ||
766 | putc(' ', tracefile); | ||
767 | } | ||
768 | } | ||
769 | |||
770 | static void | ||
771 | opentrace(void) | ||
772 | { | ||
773 | char s[100]; | ||
774 | #ifdef O_APPEND | ||
775 | int flags; | ||
776 | #endif | ||
777 | |||
778 | if (debug != 1) { | ||
779 | if (tracefile) | ||
780 | fflush(tracefile); | ||
781 | /* leave open because libedit might be using it */ | ||
782 | return; | ||
783 | } | ||
784 | strcpy(s, "./trace"); | ||
785 | if (tracefile) { | ||
786 | if (!freopen(s, "a", tracefile)) { | ||
787 | fprintf(stderr, "Can't re-open %s\n", s); | ||
788 | debug = 0; | ||
789 | return; | ||
790 | } | ||
791 | } else { | ||
792 | tracefile = fopen(s, "a"); | ||
793 | if (tracefile == NULL) { | ||
794 | fprintf(stderr, "Can't open %s\n", s); | ||
795 | debug = 0; | ||
796 | return; | ||
797 | } | ||
798 | } | ||
799 | #ifdef O_APPEND | ||
800 | flags = fcntl(fileno(tracefile), F_GETFL); | ||
801 | if (flags >= 0) | ||
802 | fcntl(fileno(tracefile), F_SETFL, flags | O_APPEND); | ||
803 | #endif | ||
804 | setlinebuf(tracefile); | ||
805 | fputs("\nTracing started.\n", tracefile); | ||
806 | } | ||
807 | |||
808 | static void | ||
809 | indent(int amount, char *pfx, FILE *fp) | ||
810 | { | ||
811 | int i; | ||
812 | |||
813 | for (i = 0; i < amount; i++) { | ||
814 | if (pfx && i == amount - 1) | ||
815 | fputs(pfx, fp); | ||
816 | putc('\t', fp); | ||
817 | } | ||
818 | } | ||
819 | |||
820 | /* little circular references here... */ | ||
821 | static void shtree(union node *n, int ind, char *pfx, FILE *fp); | ||
822 | |||
823 | static void | ||
824 | sharg(union node *arg, FILE *fp) | ||
825 | { | ||
826 | char *p; | ||
827 | struct nodelist *bqlist; | ||
828 | niro | 984 | unsigned char subtype; |
829 | niro | 816 | |
830 | if (arg->type != NARG) { | ||
831 | out1fmt("<node type %d>\n", arg->type); | ||
832 | abort(); | ||
833 | } | ||
834 | bqlist = arg->narg.backquote; | ||
835 | for (p = arg->narg.text; *p; p++) { | ||
836 | niro | 984 | switch ((unsigned char)*p) { |
837 | niro | 816 | case CTLESC: |
838 | putc(*++p, fp); | ||
839 | break; | ||
840 | case CTLVAR: | ||
841 | putc('$', fp); | ||
842 | putc('{', fp); | ||
843 | subtype = *++p; | ||
844 | if (subtype == VSLENGTH) | ||
845 | putc('#', fp); | ||
846 | |||
847 | while (*p != '=') | ||
848 | putc(*p++, fp); | ||
849 | |||
850 | if (subtype & VSNUL) | ||
851 | putc(':', fp); | ||
852 | |||
853 | switch (subtype & VSTYPE) { | ||
854 | case VSNORMAL: | ||
855 | putc('}', fp); | ||
856 | break; | ||
857 | case VSMINUS: | ||
858 | putc('-', fp); | ||
859 | break; | ||
860 | case VSPLUS: | ||
861 | putc('+', fp); | ||
862 | break; | ||
863 | case VSQUESTION: | ||
864 | putc('?', fp); | ||
865 | break; | ||
866 | case VSASSIGN: | ||
867 | putc('=', fp); | ||
868 | break; | ||
869 | case VSTRIMLEFT: | ||
870 | putc('#', fp); | ||
871 | break; | ||
872 | case VSTRIMLEFTMAX: | ||
873 | putc('#', fp); | ||
874 | putc('#', fp); | ||
875 | break; | ||
876 | case VSTRIMRIGHT: | ||
877 | putc('%', fp); | ||
878 | break; | ||
879 | case VSTRIMRIGHTMAX: | ||
880 | putc('%', fp); | ||
881 | putc('%', fp); | ||
882 | break; | ||
883 | case VSLENGTH: | ||
884 | break; | ||
885 | default: | ||
886 | out1fmt("<subtype %d>", subtype); | ||
887 | } | ||
888 | break; | ||
889 | case CTLENDVAR: | ||
890 | putc('}', fp); | ||
891 | break; | ||
892 | case CTLBACKQ: | ||
893 | case CTLBACKQ|CTLQUOTE: | ||
894 | putc('$', fp); | ||
895 | putc('(', fp); | ||
896 | shtree(bqlist->n, -1, NULL, fp); | ||
897 | putc(')', fp); | ||
898 | break; | ||
899 | default: | ||
900 | putc(*p, fp); | ||
901 | break; | ||
902 | } | ||
903 | } | ||
904 | } | ||
905 | |||
906 | static void | ||
907 | shcmd(union node *cmd, FILE *fp) | ||
908 | { | ||
909 | union node *np; | ||
910 | int first; | ||
911 | const char *s; | ||
912 | int dftfd; | ||
913 | |||
914 | first = 1; | ||
915 | for (np = cmd->ncmd.args; np; np = np->narg.next) { | ||
916 | if (!first) | ||
917 | putc(' ', fp); | ||
918 | sharg(np, fp); | ||
919 | first = 0; | ||
920 | } | ||
921 | for (np = cmd->ncmd.redirect; np; np = np->nfile.next) { | ||
922 | if (!first) | ||
923 | putc(' ', fp); | ||
924 | dftfd = 0; | ||
925 | switch (np->nfile.type) { | ||
926 | case NTO: s = ">>"+1; dftfd = 1; break; | ||
927 | case NCLOBBER: s = ">|"; dftfd = 1; break; | ||
928 | case NAPPEND: s = ">>"; dftfd = 1; break; | ||
929 | #if ENABLE_ASH_BASH_COMPAT | ||
930 | case NTO2: | ||
931 | #endif | ||
932 | case NTOFD: s = ">&"; dftfd = 1; break; | ||
933 | case NFROM: s = "<"; break; | ||
934 | case NFROMFD: s = "<&"; break; | ||
935 | case NFROMTO: s = "<>"; break; | ||
936 | default: s = "*error*"; break; | ||
937 | } | ||
938 | if (np->nfile.fd != dftfd) | ||
939 | fprintf(fp, "%d", np->nfile.fd); | ||
940 | fputs(s, fp); | ||
941 | if (np->nfile.type == NTOFD || np->nfile.type == NFROMFD) { | ||
942 | fprintf(fp, "%d", np->ndup.dupfd); | ||
943 | } else { | ||
944 | sharg(np->nfile.fname, fp); | ||
945 | } | ||
946 | first = 0; | ||
947 | } | ||
948 | } | ||
949 | |||
950 | static void | ||
951 | shtree(union node *n, int ind, char *pfx, FILE *fp) | ||
952 | { | ||
953 | struct nodelist *lp; | ||
954 | const char *s; | ||
955 | |||
956 | if (n == NULL) | ||
957 | return; | ||
958 | |||
959 | indent(ind, pfx, fp); | ||
960 | niro | 984 | |
961 | if (n == NODE_EOF) { | ||
962 | fputs("<EOF>", fp); | ||
963 | return; | ||
964 | } | ||
965 | |||
966 | niro | 816 | switch (n->type) { |
967 | case NSEMI: | ||
968 | s = "; "; | ||
969 | goto binop; | ||
970 | case NAND: | ||
971 | s = " && "; | ||
972 | goto binop; | ||
973 | case NOR: | ||
974 | s = " || "; | ||
975 | binop: | ||
976 | shtree(n->nbinary.ch1, ind, NULL, fp); | ||
977 | /* if (ind < 0) */ | ||
978 | fputs(s, fp); | ||
979 | shtree(n->nbinary.ch2, ind, NULL, fp); | ||
980 | break; | ||
981 | case NCMD: | ||
982 | shcmd(n, fp); | ||
983 | if (ind >= 0) | ||
984 | putc('\n', fp); | ||
985 | break; | ||
986 | case NPIPE: | ||
987 | for (lp = n->npipe.cmdlist; lp; lp = lp->next) { | ||
988 | niro | 984 | shtree(lp->n, 0, NULL, fp); |
989 | niro | 816 | if (lp->next) |
990 | fputs(" | ", fp); | ||
991 | } | ||
992 | if (n->npipe.pipe_backgnd) | ||
993 | fputs(" &", fp); | ||
994 | if (ind >= 0) | ||
995 | putc('\n', fp); | ||
996 | break; | ||
997 | default: | ||
998 | fprintf(fp, "<node type %d>", n->type); | ||
999 | if (ind >= 0) | ||
1000 | putc('\n', fp); | ||
1001 | break; | ||
1002 | } | ||
1003 | } | ||
1004 | |||
1005 | static void | ||
1006 | showtree(union node *n) | ||
1007 | { | ||
1008 | trace_puts("showtree called\n"); | ||
1009 | niro | 984 | shtree(n, 1, NULL, stderr); |
1010 | niro | 816 | } |
1011 | |||
1012 | #endif /* DEBUG */ | ||
1013 | |||
1014 | |||
1015 | /* ============ Parser data */ | ||
1016 | |||
1017 | niro | 532 | /* |
1018 | niro | 816 | * ash_vmsg() needs parsefile->fd, hence parsefile definition is moved up. |
1019 | niro | 532 | */ |
1020 | niro | 816 | struct strlist { |
1021 | struct strlist *next; | ||
1022 | char *text; | ||
1023 | }; | ||
1024 | niro | 532 | |
1025 | niro | 816 | struct alias; |
1026 | niro | 532 | |
1027 | struct strpush { | ||
1028 | struct strpush *prev; /* preceding string on stack */ | ||
1029 | niro | 984 | char *prev_string; |
1030 | int prev_left_in_line; | ||
1031 | niro | 816 | #if ENABLE_ASH_ALIAS |
1032 | niro | 532 | struct alias *ap; /* if push was associated with an alias */ |
1033 | #endif | ||
1034 | char *string; /* remember the string since it may change */ | ||
1035 | }; | ||
1036 | |||
1037 | struct parsefile { | ||
1038 | struct parsefile *prev; /* preceding file on stack */ | ||
1039 | int linno; /* current line */ | ||
1040 | int fd; /* file descriptor (or -1 if string) */ | ||
1041 | niro | 984 | int left_in_line; /* number of chars left in this line */ |
1042 | int left_in_buffer; /* number of chars left in this buffer past the line */ | ||
1043 | char *next_to_pgetc; /* next char in buffer */ | ||
1044 | niro | 532 | char *buf; /* input buffer */ |
1045 | struct strpush *strpush; /* for pushing strings at this level */ | ||
1046 | struct strpush basestrpush; /* so pushing one is fast */ | ||
1047 | }; | ||
1048 | |||
1049 | niro | 816 | static struct parsefile basepf; /* top level input file */ |
1050 | static struct parsefile *g_parsefile = &basepf; /* current input file */ | ||
1051 | static int startlinno; /* line # where last token started */ | ||
1052 | static char *commandname; /* currently executing command */ | ||
1053 | static struct strlist *cmdenviron; /* environment for builtin command */ | ||
1054 | static uint8_t exitstatus; /* exit status of last command */ | ||
1055 | niro | 532 | |
1056 | |||
1057 | niro | 816 | /* ============ Message printing */ |
1058 | niro | 532 | |
1059 | niro | 816 | static void |
1060 | ash_vmsg(const char *msg, va_list ap) | ||
1061 | { | ||
1062 | fprintf(stderr, "%s: ", arg0); | ||
1063 | if (commandname) { | ||
1064 | if (strcmp(arg0, commandname)) | ||
1065 | fprintf(stderr, "%s: ", commandname); | ||
1066 | if (!iflag || g_parsefile->fd) | ||
1067 | fprintf(stderr, "line %d: ", startlinno); | ||
1068 | } | ||
1069 | vfprintf(stderr, msg, ap); | ||
1070 | outcslow('\n', stderr); | ||
1071 | } | ||
1072 | niro | 532 | |
1073 | niro | 816 | /* |
1074 | * Exverror is called to raise the error exception. If the second argument | ||
1075 | * is not NULL then error prints an error message using printf style | ||
1076 | * formatting. It then raises the error exception. | ||
1077 | */ | ||
1078 | static void ash_vmsg_and_raise(int, const char *, va_list) NORETURN; | ||
1079 | static void | ||
1080 | ash_vmsg_and_raise(int cond, const char *msg, va_list ap) | ||
1081 | { | ||
1082 | #if DEBUG | ||
1083 | if (msg) { | ||
1084 | TRACE(("ash_vmsg_and_raise(%d, \"", cond)); | ||
1085 | TRACEV((msg, ap)); | ||
1086 | TRACE(("\") pid=%d\n", getpid())); | ||
1087 | } else | ||
1088 | TRACE(("ash_vmsg_and_raise(%d, NULL) pid=%d\n", cond, getpid())); | ||
1089 | if (msg) | ||
1090 | #endif | ||
1091 | ash_vmsg(msg, ap); | ||
1092 | niro | 532 | |
1093 | niro | 816 | flush_stdout_stderr(); |
1094 | raise_exception(cond); | ||
1095 | /* NOTREACHED */ | ||
1096 | } | ||
1097 | niro | 532 | |
1098 | niro | 816 | static void ash_msg_and_raise_error(const char *, ...) NORETURN; |
1099 | static void | ||
1100 | ash_msg_and_raise_error(const char *msg, ...) | ||
1101 | { | ||
1102 | va_list ap; | ||
1103 | niro | 532 | |
1104 | niro | 816 | va_start(ap, msg); |
1105 | ash_vmsg_and_raise(EXERROR, msg, ap); | ||
1106 | /* NOTREACHED */ | ||
1107 | va_end(ap); | ||
1108 | } | ||
1109 | |||
1110 | niro | 984 | static void raise_error_syntax(const char *) NORETURN; |
1111 | static void | ||
1112 | raise_error_syntax(const char *msg) | ||
1113 | { | ||
1114 | ash_msg_and_raise_error("syntax error: %s", msg); | ||
1115 | /* NOTREACHED */ | ||
1116 | } | ||
1117 | |||
1118 | niro | 816 | static void ash_msg_and_raise(int, const char *, ...) NORETURN; |
1119 | static void | ||
1120 | ash_msg_and_raise(int cond, const char *msg, ...) | ||
1121 | { | ||
1122 | va_list ap; | ||
1123 | |||
1124 | va_start(ap, msg); | ||
1125 | ash_vmsg_and_raise(cond, msg, ap); | ||
1126 | /* NOTREACHED */ | ||
1127 | va_end(ap); | ||
1128 | } | ||
1129 | |||
1130 | /* | ||
1131 | * error/warning routines for external builtins | ||
1132 | */ | ||
1133 | static void | ||
1134 | ash_msg(const char *fmt, ...) | ||
1135 | { | ||
1136 | va_list ap; | ||
1137 | |||
1138 | va_start(ap, fmt); | ||
1139 | ash_vmsg(fmt, ap); | ||
1140 | va_end(ap); | ||
1141 | } | ||
1142 | |||
1143 | /* | ||
1144 | * Return a string describing an error. The returned string may be a | ||
1145 | * pointer to a static buffer that will be overwritten on the next call. | ||
1146 | * Action describes the operation that got the error. | ||
1147 | */ | ||
1148 | static const char * | ||
1149 | errmsg(int e, const char *em) | ||
1150 | { | ||
1151 | if (e == ENOENT || e == ENOTDIR) { | ||
1152 | return em; | ||
1153 | } | ||
1154 | return strerror(e); | ||
1155 | } | ||
1156 | |||
1157 | |||
1158 | /* ============ Memory allocation */ | ||
1159 | |||
1160 | niro | 984 | #if 0 |
1161 | /* I consider these wrappers nearly useless: | ||
1162 | * ok, they return you to nearest exception handler, but | ||
1163 | * how much memory do you leak in the process, making | ||
1164 | * memory starvation worse? | ||
1165 | */ | ||
1166 | static void * | ||
1167 | ckrealloc(void * p, size_t nbytes) | ||
1168 | { | ||
1169 | p = realloc(p, nbytes); | ||
1170 | if (!p) | ||
1171 | ash_msg_and_raise_error(bb_msg_memory_exhausted); | ||
1172 | return p; | ||
1173 | } | ||
1174 | |||
1175 | static void * | ||
1176 | ckmalloc(size_t nbytes) | ||
1177 | { | ||
1178 | return ckrealloc(NULL, nbytes); | ||
1179 | } | ||
1180 | |||
1181 | static void * | ||
1182 | ckzalloc(size_t nbytes) | ||
1183 | { | ||
1184 | return memset(ckmalloc(nbytes), 0, nbytes); | ||
1185 | } | ||
1186 | |||
1187 | static char * | ||
1188 | ckstrdup(const char *s) | ||
1189 | { | ||
1190 | char *p = strdup(s); | ||
1191 | if (!p) | ||
1192 | ash_msg_and_raise_error(bb_msg_memory_exhausted); | ||
1193 | return p; | ||
1194 | } | ||
1195 | #else | ||
1196 | /* Using bbox equivalents. They exit if out of memory */ | ||
1197 | # define ckrealloc xrealloc | ||
1198 | # define ckmalloc xmalloc | ||
1199 | # define ckzalloc xzalloc | ||
1200 | # define ckstrdup xstrdup | ||
1201 | #endif | ||
1202 | |||
1203 | niro | 816 | /* |
1204 | * It appears that grabstackstr() will barf with such alignments | ||
1205 | * because stalloc() will return a string allocated in a new stackblock. | ||
1206 | */ | ||
1207 | #define SHELL_ALIGN(nbytes) (((nbytes) + SHELL_SIZE) & ~SHELL_SIZE) | ||
1208 | enum { | ||
1209 | /* Most machines require the value returned from malloc to be aligned | ||
1210 | * in some way. The following macro will get this right | ||
1211 | * on many machines. */ | ||
1212 | niro | 984 | SHELL_SIZE = sizeof(union { int i; char *cp; double d; }) - 1, |
1213 | niro | 816 | /* Minimum size of a block */ |
1214 | MINSIZE = SHELL_ALIGN(504), | ||
1215 | }; | ||
1216 | |||
1217 | struct stack_block { | ||
1218 | struct stack_block *prev; | ||
1219 | char space[MINSIZE]; | ||
1220 | }; | ||
1221 | |||
1222 | struct stackmark { | ||
1223 | struct stack_block *stackp; | ||
1224 | char *stacknxt; | ||
1225 | size_t stacknleft; | ||
1226 | struct stackmark *marknext; | ||
1227 | }; | ||
1228 | |||
1229 | |||
1230 | struct globals_memstack { | ||
1231 | struct stack_block *g_stackp; // = &stackbase; | ||
1232 | struct stackmark *markp; | ||
1233 | char *g_stacknxt; // = stackbase.space; | ||
1234 | char *sstrend; // = stackbase.space + MINSIZE; | ||
1235 | size_t g_stacknleft; // = MINSIZE; | ||
1236 | int herefd; // = -1; | ||
1237 | struct stack_block stackbase; | ||
1238 | }; | ||
1239 | extern struct globals_memstack *const ash_ptr_to_globals_memstack; | ||
1240 | #define G_memstack (*ash_ptr_to_globals_memstack) | ||
1241 | #define g_stackp (G_memstack.g_stackp ) | ||
1242 | #define markp (G_memstack.markp ) | ||
1243 | #define g_stacknxt (G_memstack.g_stacknxt ) | ||
1244 | #define sstrend (G_memstack.sstrend ) | ||
1245 | #define g_stacknleft (G_memstack.g_stacknleft) | ||
1246 | #define herefd (G_memstack.herefd ) | ||
1247 | #define stackbase (G_memstack.stackbase ) | ||
1248 | #define INIT_G_memstack() do { \ | ||
1249 | (*(struct globals_memstack**)&ash_ptr_to_globals_memstack) = xzalloc(sizeof(G_memstack)); \ | ||
1250 | barrier(); \ | ||
1251 | g_stackp = &stackbase; \ | ||
1252 | g_stacknxt = stackbase.space; \ | ||
1253 | g_stacknleft = MINSIZE; \ | ||
1254 | sstrend = stackbase.space + MINSIZE; \ | ||
1255 | herefd = -1; \ | ||
1256 | } while (0) | ||
1257 | |||
1258 | niro | 984 | |
1259 | niro | 816 | #define stackblock() ((void *)g_stacknxt) |
1260 | #define stackblocksize() g_stacknleft | ||
1261 | |||
1262 | /* | ||
1263 | * Parse trees for commands are allocated in lifo order, so we use a stack | ||
1264 | * to make this more efficient, and also to avoid all sorts of exception | ||
1265 | * handling code to handle interrupts in the middle of a parse. | ||
1266 | * | ||
1267 | * The size 504 was chosen because the Ultrix malloc handles that size | ||
1268 | * well. | ||
1269 | */ | ||
1270 | static void * | ||
1271 | stalloc(size_t nbytes) | ||
1272 | { | ||
1273 | char *p; | ||
1274 | size_t aligned; | ||
1275 | |||
1276 | aligned = SHELL_ALIGN(nbytes); | ||
1277 | if (aligned > g_stacknleft) { | ||
1278 | size_t len; | ||
1279 | size_t blocksize; | ||
1280 | struct stack_block *sp; | ||
1281 | |||
1282 | blocksize = aligned; | ||
1283 | if (blocksize < MINSIZE) | ||
1284 | blocksize = MINSIZE; | ||
1285 | len = sizeof(struct stack_block) - MINSIZE + blocksize; | ||
1286 | if (len < blocksize) | ||
1287 | ash_msg_and_raise_error(bb_msg_memory_exhausted); | ||
1288 | INT_OFF; | ||
1289 | sp = ckmalloc(len); | ||
1290 | sp->prev = g_stackp; | ||
1291 | g_stacknxt = sp->space; | ||
1292 | g_stacknleft = blocksize; | ||
1293 | sstrend = g_stacknxt + blocksize; | ||
1294 | g_stackp = sp; | ||
1295 | INT_ON; | ||
1296 | } | ||
1297 | p = g_stacknxt; | ||
1298 | g_stacknxt += aligned; | ||
1299 | g_stacknleft -= aligned; | ||
1300 | return p; | ||
1301 | } | ||
1302 | |||
1303 | static void * | ||
1304 | stzalloc(size_t nbytes) | ||
1305 | { | ||
1306 | return memset(stalloc(nbytes), 0, nbytes); | ||
1307 | } | ||
1308 | |||
1309 | static void | ||
1310 | stunalloc(void *p) | ||
1311 | { | ||
1312 | niro | 532 | #if DEBUG |
1313 | niro | 816 | if (!p || (g_stacknxt < (char *)p) || ((char *)p < g_stackp->space)) { |
1314 | write(STDERR_FILENO, "stunalloc\n", 10); | ||
1315 | abort(); | ||
1316 | } | ||
1317 | #endif | ||
1318 | g_stacknleft += g_stacknxt - (char *)p; | ||
1319 | g_stacknxt = p; | ||
1320 | } | ||
1321 | |||
1322 | /* | ||
1323 | * Like strdup but works with the ash stack. | ||
1324 | */ | ||
1325 | static char * | ||
1326 | ststrdup(const char *p) | ||
1327 | { | ||
1328 | size_t len = strlen(p) + 1; | ||
1329 | return memcpy(stalloc(len), p, len); | ||
1330 | } | ||
1331 | |||
1332 | static void | ||
1333 | setstackmark(struct stackmark *mark) | ||
1334 | { | ||
1335 | mark->stackp = g_stackp; | ||
1336 | mark->stacknxt = g_stacknxt; | ||
1337 | mark->stacknleft = g_stacknleft; | ||
1338 | mark->marknext = markp; | ||
1339 | markp = mark; | ||
1340 | } | ||
1341 | |||
1342 | static void | ||
1343 | popstackmark(struct stackmark *mark) | ||
1344 | { | ||
1345 | struct stack_block *sp; | ||
1346 | |||
1347 | if (!mark->stackp) | ||
1348 | return; | ||
1349 | |||
1350 | INT_OFF; | ||
1351 | markp = mark->marknext; | ||
1352 | while (g_stackp != mark->stackp) { | ||
1353 | sp = g_stackp; | ||
1354 | g_stackp = sp->prev; | ||
1355 | free(sp); | ||
1356 | } | ||
1357 | g_stacknxt = mark->stacknxt; | ||
1358 | g_stacknleft = mark->stacknleft; | ||
1359 | sstrend = mark->stacknxt + mark->stacknleft; | ||
1360 | INT_ON; | ||
1361 | } | ||
1362 | |||
1363 | /* | ||
1364 | * When the parser reads in a string, it wants to stick the string on the | ||
1365 | * stack and only adjust the stack pointer when it knows how big the | ||
1366 | * string is. Stackblock (defined in stack.h) returns a pointer to a block | ||
1367 | * of space on top of the stack and stackblocklen returns the length of | ||
1368 | * this block. Growstackblock will grow this space by at least one byte, | ||
1369 | * possibly moving it (like realloc). Grabstackblock actually allocates the | ||
1370 | * part of the block that has been used. | ||
1371 | */ | ||
1372 | static void | ||
1373 | growstackblock(void) | ||
1374 | { | ||
1375 | size_t newlen; | ||
1376 | |||
1377 | newlen = g_stacknleft * 2; | ||
1378 | if (newlen < g_stacknleft) | ||
1379 | ash_msg_and_raise_error(bb_msg_memory_exhausted); | ||
1380 | if (newlen < 128) | ||
1381 | newlen += 128; | ||
1382 | |||
1383 | if (g_stacknxt == g_stackp->space && g_stackp != &stackbase) { | ||
1384 | struct stack_block *oldstackp; | ||
1385 | struct stackmark *xmark; | ||
1386 | struct stack_block *sp; | ||
1387 | struct stack_block *prevstackp; | ||
1388 | size_t grosslen; | ||
1389 | |||
1390 | INT_OFF; | ||
1391 | oldstackp = g_stackp; | ||
1392 | sp = g_stackp; | ||
1393 | prevstackp = sp->prev; | ||
1394 | grosslen = newlen + sizeof(struct stack_block) - MINSIZE; | ||
1395 | sp = ckrealloc(sp, grosslen); | ||
1396 | sp->prev = prevstackp; | ||
1397 | g_stackp = sp; | ||
1398 | g_stacknxt = sp->space; | ||
1399 | g_stacknleft = newlen; | ||
1400 | sstrend = sp->space + newlen; | ||
1401 | |||
1402 | /* | ||
1403 | * Stack marks pointing to the start of the old block | ||
1404 | * must be relocated to point to the new block | ||
1405 | */ | ||
1406 | xmark = markp; | ||
1407 | while (xmark != NULL && xmark->stackp == oldstackp) { | ||
1408 | xmark->stackp = g_stackp; | ||
1409 | xmark->stacknxt = g_stacknxt; | ||
1410 | xmark->stacknleft = g_stacknleft; | ||
1411 | xmark = xmark->marknext; | ||
1412 | } | ||
1413 | INT_ON; | ||
1414 | } else { | ||
1415 | char *oldspace = g_stacknxt; | ||
1416 | size_t oldlen = g_stacknleft; | ||
1417 | char *p = stalloc(newlen); | ||
1418 | |||
1419 | /* free the space we just allocated */ | ||
1420 | g_stacknxt = memcpy(p, oldspace, oldlen); | ||
1421 | g_stacknleft += newlen; | ||
1422 | } | ||
1423 | } | ||
1424 | |||
1425 | static void | ||
1426 | grabstackblock(size_t len) | ||
1427 | { | ||
1428 | len = SHELL_ALIGN(len); | ||
1429 | g_stacknxt += len; | ||
1430 | g_stacknleft -= len; | ||
1431 | } | ||
1432 | |||
1433 | /* | ||
1434 | * The following routines are somewhat easier to use than the above. | ||
1435 | * The user declares a variable of type STACKSTR, which may be declared | ||
1436 | * to be a register. The macro STARTSTACKSTR initializes things. Then | ||
1437 | * the user uses the macro STPUTC to add characters to the string. In | ||
1438 | * effect, STPUTC(c, p) is the same as *p++ = c except that the stack is | ||
1439 | * grown as necessary. When the user is done, she can just leave the | ||
1440 | * string there and refer to it using stackblock(). Or she can allocate | ||
1441 | * the space for it using grabstackstr(). If it is necessary to allow | ||
1442 | * someone else to use the stack temporarily and then continue to grow | ||
1443 | * the string, the user should use grabstack to allocate the space, and | ||
1444 | * then call ungrabstr(p) to return to the previous mode of operation. | ||
1445 | * | ||
1446 | * USTPUTC is like STPUTC except that it doesn't check for overflow. | ||
1447 | * CHECKSTACKSPACE can be called before USTPUTC to ensure that there | ||
1448 | * is space for at least one character. | ||
1449 | */ | ||
1450 | static void * | ||
1451 | growstackstr(void) | ||
1452 | { | ||
1453 | size_t len = stackblocksize(); | ||
1454 | if (herefd >= 0 && len >= 1024) { | ||
1455 | full_write(herefd, stackblock(), len); | ||
1456 | return stackblock(); | ||
1457 | } | ||
1458 | growstackblock(); | ||
1459 | return (char *)stackblock() + len; | ||
1460 | } | ||
1461 | |||
1462 | /* | ||
1463 | * Called from CHECKSTRSPACE. | ||
1464 | */ | ||
1465 | static char * | ||
1466 | makestrspace(size_t newlen, char *p) | ||
1467 | { | ||
1468 | size_t len = p - g_stacknxt; | ||
1469 | size_t size = stackblocksize(); | ||
1470 | |||
1471 | for (;;) { | ||
1472 | size_t nleft; | ||
1473 | |||
1474 | size = stackblocksize(); | ||
1475 | nleft = size - len; | ||
1476 | if (nleft >= newlen) | ||
1477 | break; | ||
1478 | growstackblock(); | ||
1479 | } | ||
1480 | return (char *)stackblock() + len; | ||
1481 | } | ||
1482 | |||
1483 | static char * | ||
1484 | stack_nputstr(const char *s, size_t n, char *p) | ||
1485 | { | ||
1486 | p = makestrspace(n, p); | ||
1487 | p = (char *)memcpy(p, s, n) + n; | ||
1488 | return p; | ||
1489 | } | ||
1490 | |||
1491 | static char * | ||
1492 | stack_putstr(const char *s, char *p) | ||
1493 | { | ||
1494 | return stack_nputstr(s, strlen(s), p); | ||
1495 | } | ||
1496 | |||
1497 | static char * | ||
1498 | _STPUTC(int c, char *p) | ||
1499 | { | ||
1500 | if (p == sstrend) | ||
1501 | p = growstackstr(); | ||
1502 | *p++ = c; | ||
1503 | return p; | ||
1504 | } | ||
1505 | |||
1506 | #define STARTSTACKSTR(p) ((p) = stackblock()) | ||
1507 | #define STPUTC(c, p) ((p) = _STPUTC((c), (p))) | ||
1508 | #define CHECKSTRSPACE(n, p) do { \ | ||
1509 | char *q = (p); \ | ||
1510 | size_t l = (n); \ | ||
1511 | size_t m = sstrend - q; \ | ||
1512 | if (l > m) \ | ||
1513 | (p) = makestrspace(l, q); \ | ||
1514 | } while (0) | ||
1515 | #define USTPUTC(c, p) (*(p)++ = (c)) | ||
1516 | #define STACKSTRNUL(p) do { \ | ||
1517 | if ((p) == sstrend) \ | ||
1518 | (p) = growstackstr(); \ | ||
1519 | *(p) = '\0'; \ | ||
1520 | } while (0) | ||
1521 | #define STUNPUTC(p) (--(p)) | ||
1522 | #define STTOPC(p) ((p)[-1]) | ||
1523 | #define STADJUST(amount, p) ((p) += (amount)) | ||
1524 | |||
1525 | #define grabstackstr(p) stalloc((char *)(p) - (char *)stackblock()) | ||
1526 | #define ungrabstackstr(s, p) stunalloc(s) | ||
1527 | #define stackstrend() ((void *)sstrend) | ||
1528 | |||
1529 | |||
1530 | /* ============ String helpers */ | ||
1531 | |||
1532 | /* | ||
1533 | * prefix -- see if pfx is a prefix of string. | ||
1534 | */ | ||
1535 | static char * | ||
1536 | prefix(const char *string, const char *pfx) | ||
1537 | { | ||
1538 | while (*pfx) { | ||
1539 | if (*pfx++ != *string++) | ||
1540 | return NULL; | ||
1541 | } | ||
1542 | return (char *) string; | ||
1543 | } | ||
1544 | |||
1545 | /* | ||
1546 | * Check for a valid number. This should be elsewhere. | ||
1547 | */ | ||
1548 | static int | ||
1549 | is_number(const char *p) | ||
1550 | { | ||
1551 | do { | ||
1552 | if (!isdigit(*p)) | ||
1553 | return 0; | ||
1554 | } while (*++p != '\0'); | ||
1555 | return 1; | ||
1556 | } | ||
1557 | |||
1558 | /* | ||
1559 | * Convert a string of digits to an integer, printing an error message on | ||
1560 | * failure. | ||
1561 | */ | ||
1562 | static int | ||
1563 | number(const char *s) | ||
1564 | { | ||
1565 | if (!is_number(s)) | ||
1566 | niro | 984 | ash_msg_and_raise_error(msg_illnum, s); |
1567 | niro | 816 | return atoi(s); |
1568 | } | ||
1569 | |||
1570 | /* | ||
1571 | * Produce a possibly single quoted string suitable as input to the shell. | ||
1572 | * The return string is allocated on the stack. | ||
1573 | */ | ||
1574 | static char * | ||
1575 | single_quote(const char *s) | ||
1576 | { | ||
1577 | char *p; | ||
1578 | |||
1579 | STARTSTACKSTR(p); | ||
1580 | |||
1581 | do { | ||
1582 | char *q; | ||
1583 | size_t len; | ||
1584 | |||
1585 | len = strchrnul(s, '\'') - s; | ||
1586 | |||
1587 | q = p = makestrspace(len + 3, p); | ||
1588 | |||
1589 | *q++ = '\''; | ||
1590 | q = (char *)memcpy(q, s, len) + len; | ||
1591 | *q++ = '\''; | ||
1592 | s += len; | ||
1593 | |||
1594 | STADJUST(q - p, p); | ||
1595 | |||
1596 | niro | 984 | if (*s != '\'') |
1597 | niro | 816 | break; |
1598 | niro | 984 | len = 0; |
1599 | do len++; while (*++s == '\''); | ||
1600 | niro | 816 | |
1601 | q = p = makestrspace(len + 3, p); | ||
1602 | |||
1603 | *q++ = '"'; | ||
1604 | niro | 984 | q = (char *)memcpy(q, s - len, len) + len; |
1605 | niro | 816 | *q++ = '"'; |
1606 | |||
1607 | STADJUST(q - p, p); | ||
1608 | } while (*s); | ||
1609 | |||
1610 | niro | 984 | USTPUTC('\0', p); |
1611 | niro | 816 | |
1612 | return stackblock(); | ||
1613 | } | ||
1614 | |||
1615 | |||
1616 | /* ============ nextopt */ | ||
1617 | |||
1618 | static char **argptr; /* argument list for builtin commands */ | ||
1619 | static char *optionarg; /* set by nextopt (like getopt) */ | ||
1620 | static char *optptr; /* used by nextopt */ | ||
1621 | |||
1622 | /* | ||
1623 | * XXX - should get rid of. Have all builtins use getopt(3). | ||
1624 | * The library getopt must have the BSD extension static variable | ||
1625 | * "optreset", otherwise it can't be used within the shell safely. | ||
1626 | * | ||
1627 | * Standard option processing (a la getopt) for builtin routines. | ||
1628 | * The only argument that is passed to nextopt is the option string; | ||
1629 | * the other arguments are unnecessary. It returns the character, | ||
1630 | * or '\0' on end of input. | ||
1631 | */ | ||
1632 | static int | ||
1633 | nextopt(const char *optstring) | ||
1634 | { | ||
1635 | char *p; | ||
1636 | const char *q; | ||
1637 | char c; | ||
1638 | |||
1639 | p = optptr; | ||
1640 | if (p == NULL || *p == '\0') { | ||
1641 | /* We ate entire "-param", take next one */ | ||
1642 | p = *argptr; | ||
1643 | if (p == NULL) | ||
1644 | return '\0'; | ||
1645 | if (*p != '-') | ||
1646 | return '\0'; | ||
1647 | if (*++p == '\0') /* just "-" ? */ | ||
1648 | return '\0'; | ||
1649 | argptr++; | ||
1650 | if (LONE_DASH(p)) /* "--" ? */ | ||
1651 | return '\0'; | ||
1652 | /* p => next "-param" */ | ||
1653 | } | ||
1654 | /* p => some option char in the middle of a "-param" */ | ||
1655 | c = *p++; | ||
1656 | for (q = optstring; *q != c;) { | ||
1657 | if (*q == '\0') | ||
1658 | ash_msg_and_raise_error("illegal option -%c", c); | ||
1659 | if (*++q == ':') | ||
1660 | q++; | ||
1661 | } | ||
1662 | if (*++q == ':') { | ||
1663 | if (*p == '\0') { | ||
1664 | p = *argptr++; | ||
1665 | if (p == NULL) | ||
1666 | ash_msg_and_raise_error("no arg for -%c option", c); | ||
1667 | } | ||
1668 | optionarg = p; | ||
1669 | p = NULL; | ||
1670 | } | ||
1671 | optptr = p; | ||
1672 | return c; | ||
1673 | } | ||
1674 | |||
1675 | |||
1676 | /* ============ Shell variables */ | ||
1677 | |||
1678 | /* | ||
1679 | * The parsefile structure pointed to by the global variable parsefile | ||
1680 | * contains information about the current file being read. | ||
1681 | */ | ||
1682 | struct shparam { | ||
1683 | int nparam; /* # of positional parameters (without $0) */ | ||
1684 | #if ENABLE_ASH_GETOPTS | ||
1685 | int optind; /* next parameter to be processed by getopts */ | ||
1686 | int optoff; /* used by getopts */ | ||
1687 | #endif | ||
1688 | unsigned char malloced; /* if parameter list dynamically allocated */ | ||
1689 | char **p; /* parameter list */ | ||
1690 | }; | ||
1691 | |||
1692 | /* | ||
1693 | * Free the list of positional parameters. | ||
1694 | */ | ||
1695 | static void | ||
1696 | freeparam(volatile struct shparam *param) | ||
1697 | { | ||
1698 | if (param->malloced) { | ||
1699 | char **ap, **ap1; | ||
1700 | ap = ap1 = param->p; | ||
1701 | while (*ap) | ||
1702 | free(*ap++); | ||
1703 | free(ap1); | ||
1704 | } | ||
1705 | } | ||
1706 | |||
1707 | #if ENABLE_ASH_GETOPTS | ||
1708 | niro | 984 | static void FAST_FUNC getoptsreset(const char *value); |
1709 | niro | 816 | #endif |
1710 | |||
1711 | struct var { | ||
1712 | struct var *next; /* next entry in hash list */ | ||
1713 | int flags; /* flags are defined above */ | ||
1714 | const char *text; /* name=value */ | ||
1715 | niro | 984 | void (*func)(const char *) FAST_FUNC; /* function to be called when */ |
1716 | niro | 816 | /* the variable gets set/unset */ |
1717 | }; | ||
1718 | |||
1719 | struct localvar { | ||
1720 | struct localvar *next; /* next local variable in list */ | ||
1721 | struct var *vp; /* the variable that was made local */ | ||
1722 | int flags; /* saved flags */ | ||
1723 | const char *text; /* saved text */ | ||
1724 | }; | ||
1725 | |||
1726 | /* flags */ | ||
1727 | #define VEXPORT 0x01 /* variable is exported */ | ||
1728 | #define VREADONLY 0x02 /* variable cannot be modified */ | ||
1729 | #define VSTRFIXED 0x04 /* variable struct is statically allocated */ | ||
1730 | #define VTEXTFIXED 0x08 /* text is statically allocated */ | ||
1731 | #define VSTACK 0x10 /* text is allocated on the stack */ | ||
1732 | #define VUNSET 0x20 /* the variable is not set */ | ||
1733 | #define VNOFUNC 0x40 /* don't call the callback function */ | ||
1734 | #define VNOSET 0x80 /* do not set variable - just readonly test */ | ||
1735 | #define VNOSAVE 0x100 /* when text is on the heap before setvareq */ | ||
1736 | #if ENABLE_ASH_RANDOM_SUPPORT | ||
1737 | # define VDYNAMIC 0x200 /* dynamic variable */ | ||
1738 | niro | 532 | #else |
1739 | niro | 816 | # define VDYNAMIC 0 |
1740 | niro | 532 | #endif |
1741 | |||
1742 | |||
1743 | niro | 816 | /* Need to be before varinit_data[] */ |
1744 | #if ENABLE_LOCALE_SUPPORT | ||
1745 | niro | 984 | static void FAST_FUNC |
1746 | niro | 816 | change_lc_all(const char *value) |
1747 | { | ||
1748 | if (value && *value != '\0') | ||
1749 | setlocale(LC_ALL, value); | ||
1750 | } | ||
1751 | niro | 984 | static void FAST_FUNC |
1752 | niro | 816 | change_lc_ctype(const char *value) |
1753 | { | ||
1754 | if (value && *value != '\0') | ||
1755 | setlocale(LC_CTYPE, value); | ||
1756 | } | ||
1757 | #endif | ||
1758 | #if ENABLE_ASH_MAIL | ||
1759 | static void chkmail(void); | ||
1760 | niro | 984 | static void changemail(const char *) FAST_FUNC; |
1761 | niro | 816 | #endif |
1762 | niro | 984 | static void changepath(const char *) FAST_FUNC; |
1763 | niro | 816 | #if ENABLE_ASH_RANDOM_SUPPORT |
1764 | niro | 984 | static void change_random(const char *) FAST_FUNC; |
1765 | niro | 816 | #endif |
1766 | niro | 532 | |
1767 | niro | 816 | static const struct { |
1768 | int flags; | ||
1769 | const char *text; | ||
1770 | niro | 984 | void (*func)(const char *) FAST_FUNC; |
1771 | niro | 816 | } varinit_data[] = { |
1772 | { VSTRFIXED|VTEXTFIXED , defifsvar , NULL }, | ||
1773 | #if ENABLE_ASH_MAIL | ||
1774 | { VSTRFIXED|VTEXTFIXED|VUNSET, "MAIL\0" , changemail }, | ||
1775 | { VSTRFIXED|VTEXTFIXED|VUNSET, "MAILPATH\0", changemail }, | ||
1776 | #endif | ||
1777 | { VSTRFIXED|VTEXTFIXED , bb_PATH_root_path, changepath }, | ||
1778 | { VSTRFIXED|VTEXTFIXED , "PS1=$ " , NULL }, | ||
1779 | { VSTRFIXED|VTEXTFIXED , "PS2=> " , NULL }, | ||
1780 | { VSTRFIXED|VTEXTFIXED , "PS4=+ " , NULL }, | ||
1781 | #if ENABLE_ASH_GETOPTS | ||
1782 | { VSTRFIXED|VTEXTFIXED , "OPTIND=1" , getoptsreset }, | ||
1783 | #endif | ||
1784 | #if ENABLE_ASH_RANDOM_SUPPORT | ||
1785 | { VSTRFIXED|VTEXTFIXED|VUNSET|VDYNAMIC, "RANDOM\0", change_random }, | ||
1786 | #endif | ||
1787 | #if ENABLE_LOCALE_SUPPORT | ||
1788 | { VSTRFIXED|VTEXTFIXED|VUNSET, "LC_ALL\0" , change_lc_all }, | ||
1789 | { VSTRFIXED|VTEXTFIXED|VUNSET, "LC_CTYPE\0", change_lc_ctype }, | ||
1790 | #endif | ||
1791 | #if ENABLE_FEATURE_EDITING_SAVEHISTORY | ||
1792 | { VSTRFIXED|VTEXTFIXED|VUNSET, "HISTFILE\0", NULL }, | ||
1793 | #endif | ||
1794 | }; | ||
1795 | niro | 532 | |
1796 | niro | 816 | struct redirtab; |
1797 | |||
1798 | struct globals_var { | ||
1799 | struct shparam shellparam; /* $@ current positional parameters */ | ||
1800 | struct redirtab *redirlist; | ||
1801 | int g_nullredirs; | ||
1802 | int preverrout_fd; /* save fd2 before print debug if xflag is set. */ | ||
1803 | struct var *vartab[VTABSIZE]; | ||
1804 | struct var varinit[ARRAY_SIZE(varinit_data)]; | ||
1805 | niro | 532 | }; |
1806 | niro | 816 | extern struct globals_var *const ash_ptr_to_globals_var; |
1807 | #define G_var (*ash_ptr_to_globals_var) | ||
1808 | #define shellparam (G_var.shellparam ) | ||
1809 | //#define redirlist (G_var.redirlist ) | ||
1810 | #define g_nullredirs (G_var.g_nullredirs ) | ||
1811 | #define preverrout_fd (G_var.preverrout_fd) | ||
1812 | #define vartab (G_var.vartab ) | ||
1813 | #define varinit (G_var.varinit ) | ||
1814 | #define INIT_G_var() do { \ | ||
1815 | unsigned i; \ | ||
1816 | (*(struct globals_var**)&ash_ptr_to_globals_var) = xzalloc(sizeof(G_var)); \ | ||
1817 | barrier(); \ | ||
1818 | for (i = 0; i < ARRAY_SIZE(varinit_data); i++) { \ | ||
1819 | varinit[i].flags = varinit_data[i].flags; \ | ||
1820 | varinit[i].text = varinit_data[i].text; \ | ||
1821 | varinit[i].func = varinit_data[i].func; \ | ||
1822 | } \ | ||
1823 | } while (0) | ||
1824 | niro | 532 | |
1825 | niro | 816 | #define vifs varinit[0] |
1826 | #if ENABLE_ASH_MAIL | ||
1827 | # define vmail (&vifs)[1] | ||
1828 | # define vmpath (&vmail)[1] | ||
1829 | # define vpath (&vmpath)[1] | ||
1830 | #else | ||
1831 | # define vpath (&vifs)[1] | ||
1832 | #endif | ||
1833 | #define vps1 (&vpath)[1] | ||
1834 | #define vps2 (&vps1)[1] | ||
1835 | #define vps4 (&vps2)[1] | ||
1836 | #if ENABLE_ASH_GETOPTS | ||
1837 | # define voptind (&vps4)[1] | ||
1838 | # if ENABLE_ASH_RANDOM_SUPPORT | ||
1839 | # define vrandom (&voptind)[1] | ||
1840 | # endif | ||
1841 | #else | ||
1842 | # if ENABLE_ASH_RANDOM_SUPPORT | ||
1843 | # define vrandom (&vps4)[1] | ||
1844 | # endif | ||
1845 | #endif | ||
1846 | |||
1847 | /* | ||
1848 | * The following macros access the values of the above variables. | ||
1849 | * They have to skip over the name. They return the null string | ||
1850 | * for unset variables. | ||
1851 | */ | ||
1852 | #define ifsval() (vifs.text + 4) | ||
1853 | #define ifsset() ((vifs.flags & VUNSET) == 0) | ||
1854 | #if ENABLE_ASH_MAIL | ||
1855 | # define mailval() (vmail.text + 5) | ||
1856 | # define mpathval() (vmpath.text + 9) | ||
1857 | # define mpathset() ((vmpath.flags & VUNSET) == 0) | ||
1858 | #endif | ||
1859 | #define pathval() (vpath.text + 5) | ||
1860 | #define ps1val() (vps1.text + 4) | ||
1861 | #define ps2val() (vps2.text + 4) | ||
1862 | #define ps4val() (vps4.text + 4) | ||
1863 | #if ENABLE_ASH_GETOPTS | ||
1864 | # define optindval() (voptind.text + 7) | ||
1865 | #endif | ||
1866 | |||
1867 | |||
1868 | #define is_name(c) ((c) == '_' || isalpha((unsigned char)(c))) | ||
1869 | #define is_in_name(c) ((c) == '_' || isalnum((unsigned char)(c))) | ||
1870 | |||
1871 | #if ENABLE_ASH_GETOPTS | ||
1872 | niro | 984 | static void FAST_FUNC |
1873 | niro | 816 | getoptsreset(const char *value) |
1874 | niro | 532 | { |
1875 | niro | 816 | shellparam.optind = number(value); |
1876 | shellparam.optoff = -1; | ||
1877 | } | ||
1878 | #endif | ||
1879 | niro | 532 | |
1880 | niro | 816 | /* |
1881 | * Return of a legal variable name (a letter or underscore followed by zero or | ||
1882 | * more letters, underscores, and digits). | ||
1883 | */ | ||
1884 | niro | 984 | static char* FAST_FUNC |
1885 | niro | 816 | endofname(const char *name) |
1886 | { | ||
1887 | char *p; | ||
1888 | |||
1889 | p = (char *) name; | ||
1890 | if (!is_name(*p)) | ||
1891 | return p; | ||
1892 | while (*++p) { | ||
1893 | if (!is_in_name(*p)) | ||
1894 | break; | ||
1895 | } | ||
1896 | return p; | ||
1897 | niro | 532 | } |
1898 | |||
1899 | niro | 816 | /* |
1900 | * Compares two strings up to the first = or '\0'. The first | ||
1901 | * string must be terminated by '='; the second may be terminated by | ||
1902 | * either '=' or '\0'. | ||
1903 | */ | ||
1904 | static int | ||
1905 | varcmp(const char *p, const char *q) | ||
1906 | { | ||
1907 | int c, d; | ||
1908 | niro | 532 | |
1909 | niro | 816 | while ((c = *p) == (d = *q)) { |
1910 | if (!c || c == '=') | ||
1911 | goto out; | ||
1912 | p++; | ||
1913 | q++; | ||
1914 | } | ||
1915 | if (c == '=') | ||
1916 | c = '\0'; | ||
1917 | if (d == '=') | ||
1918 | d = '\0'; | ||
1919 | out: | ||
1920 | return c - d; | ||
1921 | } | ||
1922 | |||
1923 | static int | ||
1924 | varequal(const char *a, const char *b) | ||
1925 | { | ||
1926 | return !varcmp(a, b); | ||
1927 | } | ||
1928 | |||
1929 | niro | 532 | /* |
1930 | niro | 816 | * Find the appropriate entry in the hash table from the name. |
1931 | niro | 532 | */ |
1932 | niro | 816 | static struct var ** |
1933 | hashvar(const char *p) | ||
1934 | { | ||
1935 | unsigned hashval; | ||
1936 | niro | 532 | |
1937 | niro | 816 | hashval = ((unsigned char) *p) << 4; |
1938 | while (*p && *p != '=') | ||
1939 | hashval += (unsigned char) *p++; | ||
1940 | return &vartab[hashval % VTABSIZE]; | ||
1941 | } | ||
1942 | |||
1943 | static int | ||
1944 | vpcmp(const void *a, const void *b) | ||
1945 | { | ||
1946 | return varcmp(*(const char **)a, *(const char **)b); | ||
1947 | } | ||
1948 | |||
1949 | niro | 532 | /* |
1950 | niro | 816 | * This routine initializes the builtin variables. |
1951 | niro | 532 | */ |
1952 | niro | 816 | static void |
1953 | initvar(void) | ||
1954 | { | ||
1955 | struct var *vp; | ||
1956 | struct var *end; | ||
1957 | struct var **vpp; | ||
1958 | niro | 532 | |
1959 | niro | 816 | /* |
1960 | * PS1 depends on uid | ||
1961 | */ | ||
1962 | #if ENABLE_FEATURE_EDITING && ENABLE_FEATURE_EDITING_FANCY_PROMPT | ||
1963 | vps1.text = "PS1=\\w \\$ "; | ||
1964 | #else | ||
1965 | if (!geteuid()) | ||
1966 | vps1.text = "PS1=# "; | ||
1967 | #endif | ||
1968 | vp = varinit; | ||
1969 | end = vp + ARRAY_SIZE(varinit); | ||
1970 | do { | ||
1971 | vpp = hashvar(vp->text); | ||
1972 | vp->next = *vpp; | ||
1973 | *vpp = vp; | ||
1974 | } while (++vp < end); | ||
1975 | } | ||
1976 | |||
1977 | static struct var ** | ||
1978 | findvar(struct var **vpp, const char *name) | ||
1979 | { | ||
1980 | for (; *vpp; vpp = &(*vpp)->next) { | ||
1981 | if (varequal((*vpp)->text, name)) { | ||
1982 | break; | ||
1983 | } | ||
1984 | } | ||
1985 | return vpp; | ||
1986 | } | ||
1987 | |||
1988 | niro | 532 | /* |
1989 | niro | 816 | * Find the value of a variable. Returns NULL if not set. |
1990 | niro | 532 | */ |
1991 | niro | 984 | static const char* FAST_FUNC |
1992 | niro | 816 | lookupvar(const char *name) |
1993 | { | ||
1994 | struct var *v; | ||
1995 | niro | 532 | |
1996 | niro | 816 | v = *findvar(hashvar(name), name); |
1997 | if (v) { | ||
1998 | #if ENABLE_ASH_RANDOM_SUPPORT | ||
1999 | /* | ||
2000 | * Dynamic variables are implemented roughly the same way they are | ||
2001 | * in bash. Namely, they're "special" so long as they aren't unset. | ||
2002 | * As soon as they're unset, they're no longer dynamic, and dynamic | ||
2003 | * lookup will no longer happen at that point. -- PFM. | ||
2004 | */ | ||
2005 | if ((v->flags & VDYNAMIC)) | ||
2006 | (*v->func)(NULL); | ||
2007 | #endif | ||
2008 | if (!(v->flags & VUNSET)) | ||
2009 | return strchrnul(v->text, '=') + 1; | ||
2010 | } | ||
2011 | return NULL; | ||
2012 | } | ||
2013 | niro | 532 | |
2014 | niro | 816 | /* |
2015 | * Search the environment of a builtin command. | ||
2016 | */ | ||
2017 | niro | 984 | static const char * |
2018 | niro | 816 | bltinlookup(const char *name) |
2019 | { | ||
2020 | struct strlist *sp; | ||
2021 | niro | 532 | |
2022 | niro | 816 | for (sp = cmdenviron; sp; sp = sp->next) { |
2023 | if (varequal(sp->text, name)) | ||
2024 | return strchrnul(sp->text, '=') + 1; | ||
2025 | } | ||
2026 | return lookupvar(name); | ||
2027 | } | ||
2028 | |||
2029 | /* | ||
2030 | * Same as setvar except that the variable and value are passed in | ||
2031 | * the first argument as name=value. Since the first argument will | ||
2032 | * be actually stored in the table, it should not be a string that | ||
2033 | * will go away. | ||
2034 | * Called with interrupts off. | ||
2035 | */ | ||
2036 | static void | ||
2037 | setvareq(char *s, int flags) | ||
2038 | { | ||
2039 | struct var *vp, **vpp; | ||
2040 | |||
2041 | vpp = hashvar(s); | ||
2042 | flags |= (VEXPORT & (((unsigned) (1 - aflag)) - 1)); | ||
2043 | vp = *findvar(vpp, s); | ||
2044 | if (vp) { | ||
2045 | if ((vp->flags & (VREADONLY|VDYNAMIC)) == VREADONLY) { | ||
2046 | const char *n; | ||
2047 | |||
2048 | if (flags & VNOSAVE) | ||
2049 | free(s); | ||
2050 | n = vp->text; | ||
2051 | ash_msg_and_raise_error("%.*s: is read only", strchrnul(n, '=') - n, n); | ||
2052 | } | ||
2053 | |||
2054 | if (flags & VNOSET) | ||
2055 | return; | ||
2056 | |||
2057 | if (vp->func && (flags & VNOFUNC) == 0) | ||
2058 | (*vp->func)(strchrnul(s, '=') + 1); | ||
2059 | |||
2060 | if ((vp->flags & (VTEXTFIXED|VSTACK)) == 0) | ||
2061 | free((char*)vp->text); | ||
2062 | |||
2063 | flags |= vp->flags & ~(VTEXTFIXED|VSTACK|VNOSAVE|VUNSET); | ||
2064 | } else { | ||
2065 | if (flags & VNOSET) | ||
2066 | return; | ||
2067 | /* not found */ | ||
2068 | vp = ckzalloc(sizeof(*vp)); | ||
2069 | vp->next = *vpp; | ||
2070 | /*vp->func = NULL; - ckzalloc did it */ | ||
2071 | *vpp = vp; | ||
2072 | } | ||
2073 | if (!(flags & (VTEXTFIXED|VSTACK|VNOSAVE))) | ||
2074 | s = ckstrdup(s); | ||
2075 | vp->text = s; | ||
2076 | vp->flags = flags; | ||
2077 | } | ||
2078 | |||
2079 | /* | ||
2080 | * Set the value of a variable. The flags argument is ored with the | ||
2081 | * flags of the variable. If val is NULL, the variable is unset. | ||
2082 | */ | ||
2083 | static void | ||
2084 | setvar(const char *name, const char *val, int flags) | ||
2085 | { | ||
2086 | char *p, *q; | ||
2087 | size_t namelen; | ||
2088 | char *nameeq; | ||
2089 | size_t vallen; | ||
2090 | |||
2091 | q = endofname(name); | ||
2092 | p = strchrnul(q, '='); | ||
2093 | namelen = p - name; | ||
2094 | if (!namelen || p != q) | ||
2095 | ash_msg_and_raise_error("%.*s: bad variable name", namelen, name); | ||
2096 | vallen = 0; | ||
2097 | if (val == NULL) { | ||
2098 | flags |= VUNSET; | ||
2099 | } else { | ||
2100 | vallen = strlen(val); | ||
2101 | } | ||
2102 | INT_OFF; | ||
2103 | nameeq = ckmalloc(namelen + vallen + 2); | ||
2104 | p = (char *)memcpy(nameeq, name, namelen) + namelen; | ||
2105 | if (val) { | ||
2106 | *p++ = '='; | ||
2107 | p = (char *)memcpy(p, val, vallen) + vallen; | ||
2108 | } | ||
2109 | *p = '\0'; | ||
2110 | setvareq(nameeq, flags | VNOSAVE); | ||
2111 | INT_ON; | ||
2112 | } | ||
2113 | |||
2114 | niro | 984 | static void FAST_FUNC |
2115 | setvar2(const char *name, const char *val) | ||
2116 | { | ||
2117 | setvar(name, val, 0); | ||
2118 | } | ||
2119 | |||
2120 | niro | 816 | #if ENABLE_ASH_GETOPTS |
2121 | /* | ||
2122 | * Safe version of setvar, returns 1 on success 0 on failure. | ||
2123 | */ | ||
2124 | static int | ||
2125 | setvarsafe(const char *name, const char *val, int flags) | ||
2126 | { | ||
2127 | int err; | ||
2128 | volatile int saveint; | ||
2129 | struct jmploc *volatile savehandler = exception_handler; | ||
2130 | struct jmploc jmploc; | ||
2131 | |||
2132 | SAVE_INT(saveint); | ||
2133 | if (setjmp(jmploc.loc)) | ||
2134 | err = 1; | ||
2135 | else { | ||
2136 | exception_handler = &jmploc; | ||
2137 | setvar(name, val, flags); | ||
2138 | err = 0; | ||
2139 | } | ||
2140 | exception_handler = savehandler; | ||
2141 | RESTORE_INT(saveint); | ||
2142 | return err; | ||
2143 | } | ||
2144 | #endif | ||
2145 | |||
2146 | /* | ||
2147 | * Unset the specified variable. | ||
2148 | */ | ||
2149 | static int | ||
2150 | unsetvar(const char *s) | ||
2151 | { | ||
2152 | struct var **vpp; | ||
2153 | struct var *vp; | ||
2154 | int retval; | ||
2155 | |||
2156 | vpp = findvar(hashvar(s), s); | ||
2157 | vp = *vpp; | ||
2158 | retval = 2; | ||
2159 | if (vp) { | ||
2160 | int flags = vp->flags; | ||
2161 | |||
2162 | retval = 1; | ||
2163 | if (flags & VREADONLY) | ||
2164 | goto out; | ||
2165 | #if ENABLE_ASH_RANDOM_SUPPORT | ||
2166 | vp->flags &= ~VDYNAMIC; | ||
2167 | #endif | ||
2168 | if (flags & VUNSET) | ||
2169 | goto ok; | ||
2170 | if ((flags & VSTRFIXED) == 0) { | ||
2171 | INT_OFF; | ||
2172 | if ((flags & (VTEXTFIXED|VSTACK)) == 0) | ||
2173 | free((char*)vp->text); | ||
2174 | *vpp = vp->next; | ||
2175 | free(vp); | ||
2176 | INT_ON; | ||
2177 | } else { | ||
2178 | setvar(s, 0, 0); | ||
2179 | vp->flags &= ~VEXPORT; | ||
2180 | } | ||
2181 | ok: | ||
2182 | retval = 0; | ||
2183 | } | ||
2184 | out: | ||
2185 | return retval; | ||
2186 | } | ||
2187 | |||
2188 | /* | ||
2189 | * Process a linked list of variable assignments. | ||
2190 | */ | ||
2191 | static void | ||
2192 | listsetvar(struct strlist *list_set_var, int flags) | ||
2193 | { | ||
2194 | struct strlist *lp = list_set_var; | ||
2195 | |||
2196 | if (!lp) | ||
2197 | return; | ||
2198 | INT_OFF; | ||
2199 | do { | ||
2200 | setvareq(lp->text, flags); | ||
2201 | lp = lp->next; | ||
2202 | } while (lp); | ||
2203 | INT_ON; | ||
2204 | } | ||
2205 | |||
2206 | /* | ||
2207 | * Generate a list of variables satisfying the given conditions. | ||
2208 | */ | ||
2209 | static char ** | ||
2210 | listvars(int on, int off, char ***end) | ||
2211 | { | ||
2212 | struct var **vpp; | ||
2213 | struct var *vp; | ||
2214 | char **ep; | ||
2215 | int mask; | ||
2216 | |||
2217 | STARTSTACKSTR(ep); | ||
2218 | vpp = vartab; | ||
2219 | mask = on | off; | ||
2220 | do { | ||
2221 | for (vp = *vpp; vp; vp = vp->next) { | ||
2222 | if ((vp->flags & mask) == on) { | ||
2223 | if (ep == stackstrend()) | ||
2224 | ep = growstackstr(); | ||
2225 | *ep++ = (char *) vp->text; | ||
2226 | } | ||
2227 | } | ||
2228 | } while (++vpp < vartab + VTABSIZE); | ||
2229 | if (ep == stackstrend()) | ||
2230 | ep = growstackstr(); | ||
2231 | if (end) | ||
2232 | *end = ep; | ||
2233 | *ep++ = NULL; | ||
2234 | return grabstackstr(ep); | ||
2235 | } | ||
2236 | |||
2237 | |||
2238 | /* ============ Path search helper | ||
2239 | * | ||
2240 | * The variable path (passed by reference) should be set to the start | ||
2241 | niro | 984 | * of the path before the first call; path_advance will update |
2242 | * this value as it proceeds. Successive calls to path_advance will return | ||
2243 | niro | 816 | * the possible path expansions in sequence. If an option (indicated by |
2244 | * a percent sign) appears in the path entry then the global variable | ||
2245 | * pathopt will be set to point to it; otherwise pathopt will be set to | ||
2246 | * NULL. | ||
2247 | */ | ||
2248 | niro | 984 | static const char *pathopt; /* set by path_advance */ |
2249 | niro | 816 | |
2250 | static char * | ||
2251 | niro | 984 | path_advance(const char **path, const char *name) |
2252 | niro | 816 | { |
2253 | const char *p; | ||
2254 | char *q; | ||
2255 | const char *start; | ||
2256 | size_t len; | ||
2257 | |||
2258 | if (*path == NULL) | ||
2259 | return NULL; | ||
2260 | start = *path; | ||
2261 | for (p = start; *p && *p != ':' && *p != '%'; p++) | ||
2262 | continue; | ||
2263 | len = p - start + strlen(name) + 2; /* "2" is for '/' and '\0' */ | ||
2264 | while (stackblocksize() < len) | ||
2265 | growstackblock(); | ||
2266 | q = stackblock(); | ||
2267 | if (p != start) { | ||
2268 | memcpy(q, start, p - start); | ||
2269 | q += p - start; | ||
2270 | *q++ = '/'; | ||
2271 | } | ||
2272 | strcpy(q, name); | ||
2273 | pathopt = NULL; | ||
2274 | if (*p == '%') { | ||
2275 | pathopt = ++p; | ||
2276 | while (*p && *p != ':') | ||
2277 | p++; | ||
2278 | } | ||
2279 | if (*p == ':') | ||
2280 | *path = p + 1; | ||
2281 | else | ||
2282 | *path = NULL; | ||
2283 | return stalloc(len); | ||
2284 | } | ||
2285 | |||
2286 | |||
2287 | /* ============ Prompt */ | ||
2288 | |||
2289 | static smallint doprompt; /* if set, prompt the user */ | ||
2290 | static smallint needprompt; /* true if interactive and at start of line */ | ||
2291 | |||
2292 | #if ENABLE_FEATURE_EDITING | ||
2293 | static line_input_t *line_input_state; | ||
2294 | static const char *cmdedit_prompt; | ||
2295 | static void | ||
2296 | putprompt(const char *s) | ||
2297 | { | ||
2298 | if (ENABLE_ASH_EXPAND_PRMT) { | ||
2299 | free((char*)cmdedit_prompt); | ||
2300 | cmdedit_prompt = ckstrdup(s); | ||
2301 | return; | ||
2302 | } | ||
2303 | cmdedit_prompt = s; | ||
2304 | } | ||
2305 | niro | 532 | #else |
2306 | niro | 816 | static void |
2307 | putprompt(const char *s) | ||
2308 | { | ||
2309 | out2str(s); | ||
2310 | } | ||
2311 | niro | 532 | #endif |
2312 | |||
2313 | niro | 816 | #if ENABLE_ASH_EXPAND_PRMT |
2314 | /* expandstr() needs parsing machinery, so it is far away ahead... */ | ||
2315 | static const char *expandstr(const char *ps); | ||
2316 | #else | ||
2317 | #define expandstr(s) s | ||
2318 | #endif | ||
2319 | niro | 532 | |
2320 | niro | 816 | static void |
2321 | setprompt(int whichprompt) | ||
2322 | { | ||
2323 | const char *prompt; | ||
2324 | #if ENABLE_ASH_EXPAND_PRMT | ||
2325 | struct stackmark smark; | ||
2326 | #endif | ||
2327 | niro | 532 | |
2328 | niro | 816 | needprompt = 0; |
2329 | |||
2330 | switch (whichprompt) { | ||
2331 | case 1: | ||
2332 | prompt = ps1val(); | ||
2333 | break; | ||
2334 | case 2: | ||
2335 | prompt = ps2val(); | ||
2336 | break; | ||
2337 | default: /* 0 */ | ||
2338 | prompt = nullstr; | ||
2339 | } | ||
2340 | #if ENABLE_ASH_EXPAND_PRMT | ||
2341 | setstackmark(&smark); | ||
2342 | stalloc(stackblocksize()); | ||
2343 | #endif | ||
2344 | putprompt(expandstr(prompt)); | ||
2345 | #if ENABLE_ASH_EXPAND_PRMT | ||
2346 | popstackmark(&smark); | ||
2347 | #endif | ||
2348 | } | ||
2349 | |||
2350 | |||
2351 | /* ============ The cd and pwd commands */ | ||
2352 | |||
2353 | #define CD_PHYSICAL 1 | ||
2354 | #define CD_PRINT 2 | ||
2355 | |||
2356 | static int | ||
2357 | cdopt(void) | ||
2358 | { | ||
2359 | int flags = 0; | ||
2360 | int i, j; | ||
2361 | |||
2362 | j = 'L'; | ||
2363 | niro | 984 | while ((i = nextopt("LP")) != '\0') { |
2364 | niro | 816 | if (i != j) { |
2365 | flags ^= CD_PHYSICAL; | ||
2366 | j = i; | ||
2367 | } | ||
2368 | } | ||
2369 | |||
2370 | return flags; | ||
2371 | } | ||
2372 | |||
2373 | niro | 532 | /* |
2374 | niro | 816 | * Update curdir (the name of the current directory) in response to a |
2375 | * cd command. | ||
2376 | niro | 532 | */ |
2377 | niro | 816 | static const char * |
2378 | updatepwd(const char *dir) | ||
2379 | { | ||
2380 | char *new; | ||
2381 | char *p; | ||
2382 | char *cdcomppath; | ||
2383 | const char *lim; | ||
2384 | niro | 532 | |
2385 | niro | 816 | cdcomppath = ststrdup(dir); |
2386 | STARTSTACKSTR(new); | ||
2387 | if (*dir != '/') { | ||
2388 | if (curdir == nullstr) | ||
2389 | return 0; | ||
2390 | new = stack_putstr(curdir, new); | ||
2391 | } | ||
2392 | new = makestrspace(strlen(dir) + 2, new); | ||
2393 | lim = (char *)stackblock() + 1; | ||
2394 | if (*dir != '/') { | ||
2395 | if (new[-1] != '/') | ||
2396 | USTPUTC('/', new); | ||
2397 | if (new > lim && *lim == '/') | ||
2398 | lim++; | ||
2399 | } else { | ||
2400 | USTPUTC('/', new); | ||
2401 | cdcomppath++; | ||
2402 | if (dir[1] == '/' && dir[2] != '/') { | ||
2403 | USTPUTC('/', new); | ||
2404 | cdcomppath++; | ||
2405 | lim++; | ||
2406 | } | ||
2407 | } | ||
2408 | p = strtok(cdcomppath, "/"); | ||
2409 | while (p) { | ||
2410 | switch (*p) { | ||
2411 | case '.': | ||
2412 | if (p[1] == '.' && p[2] == '\0') { | ||
2413 | while (new > lim) { | ||
2414 | STUNPUTC(new); | ||
2415 | if (new[-1] == '/') | ||
2416 | break; | ||
2417 | } | ||
2418 | break; | ||
2419 | } | ||
2420 | if (p[1] == '\0') | ||
2421 | break; | ||
2422 | /* fall through */ | ||
2423 | default: | ||
2424 | new = stack_putstr(p, new); | ||
2425 | USTPUTC('/', new); | ||
2426 | } | ||
2427 | p = strtok(0, "/"); | ||
2428 | } | ||
2429 | if (new > lim) | ||
2430 | STUNPUTC(new); | ||
2431 | *new = 0; | ||
2432 | return stackblock(); | ||
2433 | } | ||
2434 | niro | 532 | |
2435 | /* | ||
2436 | niro | 816 | * Find out what the current directory is. If we already know the current |
2437 | * directory, this routine returns immediately. | ||
2438 | niro | 532 | */ |
2439 | niro | 816 | static char * |
2440 | getpwd(void) | ||
2441 | { | ||
2442 | char *dir = getcwd(NULL, 0); /* huh, using glibc extension? */ | ||
2443 | return dir ? dir : nullstr; | ||
2444 | } | ||
2445 | niro | 532 | |
2446 | niro | 816 | static void |
2447 | setpwd(const char *val, int setold) | ||
2448 | { | ||
2449 | char *oldcur, *dir; | ||
2450 | |||
2451 | oldcur = dir = curdir; | ||
2452 | |||
2453 | if (setold) { | ||
2454 | setvar("OLDPWD", oldcur, VEXPORT); | ||
2455 | } | ||
2456 | INT_OFF; | ||
2457 | if (physdir != nullstr) { | ||
2458 | if (physdir != oldcur) | ||
2459 | free(physdir); | ||
2460 | physdir = nullstr; | ||
2461 | } | ||
2462 | if (oldcur == val || !val) { | ||
2463 | char *s = getpwd(); | ||
2464 | physdir = s; | ||
2465 | if (!val) | ||
2466 | dir = s; | ||
2467 | } else | ||
2468 | dir = ckstrdup(val); | ||
2469 | if (oldcur != dir && oldcur != nullstr) { | ||
2470 | free(oldcur); | ||
2471 | } | ||
2472 | curdir = dir; | ||
2473 | INT_ON; | ||
2474 | setvar("PWD", dir, VEXPORT); | ||
2475 | } | ||
2476 | |||
2477 | static void hashcd(void); | ||
2478 | |||
2479 | /* | ||
2480 | * Actually do the chdir. We also call hashcd to let the routines in exec.c | ||
2481 | * know that the current directory has changed. | ||
2482 | */ | ||
2483 | static int | ||
2484 | docd(const char *dest, int flags) | ||
2485 | { | ||
2486 | const char *dir = 0; | ||
2487 | int err; | ||
2488 | |||
2489 | TRACE(("docd(\"%s\", %d) called\n", dest, flags)); | ||
2490 | |||
2491 | INT_OFF; | ||
2492 | if (!(flags & CD_PHYSICAL)) { | ||
2493 | dir = updatepwd(dest); | ||
2494 | if (dir) | ||
2495 | dest = dir; | ||
2496 | } | ||
2497 | err = chdir(dest); | ||
2498 | if (err) | ||
2499 | goto out; | ||
2500 | setpwd(dir, 1); | ||
2501 | hashcd(); | ||
2502 | out: | ||
2503 | INT_ON; | ||
2504 | return err; | ||
2505 | } | ||
2506 | |||
2507 | niro | 984 | static int FAST_FUNC |
2508 | niro | 816 | cdcmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
2509 | { | ||
2510 | const char *dest; | ||
2511 | const char *path; | ||
2512 | const char *p; | ||
2513 | char c; | ||
2514 | struct stat statb; | ||
2515 | int flags; | ||
2516 | |||
2517 | flags = cdopt(); | ||
2518 | dest = *argptr; | ||
2519 | if (!dest) | ||
2520 | dest = bltinlookup(homestr); | ||
2521 | else if (LONE_DASH(dest)) { | ||
2522 | dest = bltinlookup("OLDPWD"); | ||
2523 | flags |= CD_PRINT; | ||
2524 | } | ||
2525 | if (!dest) | ||
2526 | dest = nullstr; | ||
2527 | if (*dest == '/') | ||
2528 | goto step7; | ||
2529 | if (*dest == '.') { | ||
2530 | c = dest[1]; | ||
2531 | dotdot: | ||
2532 | switch (c) { | ||
2533 | case '\0': | ||
2534 | case '/': | ||
2535 | goto step6; | ||
2536 | case '.': | ||
2537 | c = dest[2]; | ||
2538 | if (c != '.') | ||
2539 | goto dotdot; | ||
2540 | } | ||
2541 | } | ||
2542 | if (!*dest) | ||
2543 | dest = "."; | ||
2544 | path = bltinlookup("CDPATH"); | ||
2545 | if (!path) { | ||
2546 | step6: | ||
2547 | step7: | ||
2548 | p = dest; | ||
2549 | goto docd; | ||
2550 | } | ||
2551 | do { | ||
2552 | c = *path; | ||
2553 | niro | 984 | p = path_advance(&path, dest); |
2554 | niro | 816 | if (stat(p, &statb) >= 0 && S_ISDIR(statb.st_mode)) { |
2555 | if (c && c != ':') | ||
2556 | flags |= CD_PRINT; | ||
2557 | docd: | ||
2558 | if (!docd(p, flags)) | ||
2559 | goto out; | ||
2560 | break; | ||
2561 | } | ||
2562 | } while (path); | ||
2563 | ash_msg_and_raise_error("can't cd to %s", dest); | ||
2564 | /* NOTREACHED */ | ||
2565 | out: | ||
2566 | if (flags & CD_PRINT) | ||
2567 | out1fmt(snlfmt, curdir); | ||
2568 | return 0; | ||
2569 | } | ||
2570 | |||
2571 | niro | 984 | static int FAST_FUNC |
2572 | niro | 816 | pwdcmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
2573 | { | ||
2574 | int flags; | ||
2575 | const char *dir = curdir; | ||
2576 | |||
2577 | flags = cdopt(); | ||
2578 | if (flags) { | ||
2579 | if (physdir == nullstr) | ||
2580 | setpwd(dir, 0); | ||
2581 | dir = physdir; | ||
2582 | } | ||
2583 | out1fmt(snlfmt, dir); | ||
2584 | return 0; | ||
2585 | } | ||
2586 | |||
2587 | |||
2588 | /* ============ ... */ | ||
2589 | |||
2590 | |||
2591 | #define IBUFSIZ COMMON_BUFSIZE | ||
2592 | /* buffer for top level input file */ | ||
2593 | #define basebuf bb_common_bufsiz1 | ||
2594 | |||
2595 | /* Syntax classes */ | ||
2596 | #define CWORD 0 /* character is nothing special */ | ||
2597 | #define CNL 1 /* newline character */ | ||
2598 | #define CBACK 2 /* a backslash character */ | ||
2599 | #define CSQUOTE 3 /* single quote */ | ||
2600 | #define CDQUOTE 4 /* double quote */ | ||
2601 | #define CENDQUOTE 5 /* a terminating quote */ | ||
2602 | #define CBQUOTE 6 /* backwards single quote */ | ||
2603 | #define CVAR 7 /* a dollar sign */ | ||
2604 | #define CENDVAR 8 /* a '}' character */ | ||
2605 | #define CLP 9 /* a left paren in arithmetic */ | ||
2606 | #define CRP 10 /* a right paren in arithmetic */ | ||
2607 | #define CENDFILE 11 /* end of file */ | ||
2608 | #define CCTL 12 /* like CWORD, except it must be escaped */ | ||
2609 | #define CSPCL 13 /* these terminate a word */ | ||
2610 | #define CIGN 14 /* character should be ignored */ | ||
2611 | |||
2612 | niro | 984 | #define PEOF 256 |
2613 | niro | 816 | #if ENABLE_ASH_ALIAS |
2614 | niro | 984 | # define PEOA 257 |
2615 | niro | 532 | #endif |
2616 | |||
2617 | niro | 984 | #define USE_SIT_FUNCTION ENABLE_ASH_OPTIMIZE_FOR_SIZE |
2618 | niro | 532 | |
2619 | niro | 984 | #if ENABLE_SH_MATH_SUPPORT |
2620 | # define SIT_ITEM(a,b,c,d) (a | (b << 4) | (c << 8) | (d << 12)) | ||
2621 | #else | ||
2622 | # define SIT_ITEM(a,b,c,d) (a | (b << 4) | (c << 8)) | ||
2623 | niro | 816 | #endif |
2624 | niro | 984 | static const uint16_t S_I_T[] = { |
2625 | niro | 816 | #if ENABLE_ASH_ALIAS |
2626 | niro | 984 | SIT_ITEM(CSPCL , CIGN , CIGN , CIGN ), /* 0, PEOA */ |
2627 | niro | 532 | #endif |
2628 | niro | 984 | SIT_ITEM(CSPCL , CWORD , CWORD, CWORD ), /* 1, ' ' */ |
2629 | SIT_ITEM(CNL , CNL , CNL , CNL ), /* 2, \n */ | ||
2630 | SIT_ITEM(CWORD , CCTL , CCTL , CWORD ), /* 3, !*-/:=?[]~ */ | ||
2631 | SIT_ITEM(CDQUOTE , CENDQUOTE, CWORD, CWORD ), /* 4, '"' */ | ||
2632 | SIT_ITEM(CVAR , CVAR , CWORD, CVAR ), /* 5, $ */ | ||
2633 | SIT_ITEM(CSQUOTE , CWORD , CENDQUOTE, CWORD), /* 6, "'" */ | ||
2634 | SIT_ITEM(CSPCL , CWORD , CWORD, CLP ), /* 7, ( */ | ||
2635 | SIT_ITEM(CSPCL , CWORD , CWORD, CRP ), /* 8, ) */ | ||
2636 | SIT_ITEM(CBACK , CBACK , CCTL , CBACK ), /* 9, \ */ | ||
2637 | SIT_ITEM(CBQUOTE , CBQUOTE , CWORD, CBQUOTE), /* 10, ` */ | ||
2638 | SIT_ITEM(CENDVAR , CENDVAR , CWORD, CENDVAR), /* 11, } */ | ||
2639 | #if !USE_SIT_FUNCTION | ||
2640 | SIT_ITEM(CENDFILE, CENDFILE , CENDFILE, CENDFILE),/* 12, PEOF */ | ||
2641 | SIT_ITEM(CWORD , CWORD , CWORD, CWORD ), /* 13, 0-9A-Za-z */ | ||
2642 | SIT_ITEM(CCTL , CCTL , CCTL , CCTL ) /* 14, CTLESC ... */ | ||
2643 | niro | 532 | #endif |
2644 | niro | 984 | #undef SIT_ITEM |
2645 | niro | 532 | }; |
2646 | niro | 984 | /* Constants below must match table above */ |
2647 | enum { | ||
2648 | niro | 816 | #if ENABLE_ASH_ALIAS |
2649 | niro | 984 | CSPCL_CIGN_CIGN_CIGN , /* 0 */ |
2650 | niro | 532 | #endif |
2651 | niro | 984 | CSPCL_CWORD_CWORD_CWORD , /* 1 */ |
2652 | CNL_CNL_CNL_CNL , /* 2 */ | ||
2653 | CWORD_CCTL_CCTL_CWORD , /* 3 */ | ||
2654 | CDQUOTE_CENDQUOTE_CWORD_CWORD , /* 4 */ | ||
2655 | CVAR_CVAR_CWORD_CVAR , /* 5 */ | ||
2656 | CSQUOTE_CWORD_CENDQUOTE_CWORD , /* 6 */ | ||
2657 | CSPCL_CWORD_CWORD_CLP , /* 7 */ | ||
2658 | CSPCL_CWORD_CWORD_CRP , /* 8 */ | ||
2659 | CBACK_CBACK_CCTL_CBACK , /* 9 */ | ||
2660 | CBQUOTE_CBQUOTE_CWORD_CBQUOTE , /* 10 */ | ||
2661 | CENDVAR_CENDVAR_CWORD_CENDVAR , /* 11 */ | ||
2662 | CENDFILE_CENDFILE_CENDFILE_CENDFILE, /* 12 */ | ||
2663 | CWORD_CWORD_CWORD_CWORD , /* 13 */ | ||
2664 | CCTL_CCTL_CCTL_CCTL , /* 14 */ | ||
2665 | niro | 532 | }; |
2666 | |||
2667 | niro | 984 | /* c in SIT(c, syntax) must be an *unsigned char* or PEOA or PEOF, |
2668 | * caller must ensure proper cast on it if c is *char_ptr! | ||
2669 | */ | ||
2670 | /* Values for syntax param */ | ||
2671 | #define BASESYNTAX 0 /* not in quotes */ | ||
2672 | #define DQSYNTAX 1 /* in double quotes */ | ||
2673 | #define SQSYNTAX 2 /* in single quotes */ | ||
2674 | #define ARISYNTAX 3 /* in arithmetic */ | ||
2675 | #define PSSYNTAX 4 /* prompt. never passed to SIT() */ | ||
2676 | niro | 532 | |
2677 | niro | 984 | #if USE_SIT_FUNCTION |
2678 | |||
2679 | niro | 816 | static int |
2680 | SIT(int c, int syntax) | ||
2681 | niro | 532 | { |
2682 | niro | 816 | static const char spec_symbls[] ALIGN1 = "\t\n !\"$&'()*-/:;<=>?[\\]`|}~"; |
2683 | niro | 984 | # if ENABLE_ASH_ALIAS |
2684 | static const uint8_t syntax_index_table[] ALIGN1 = { | ||
2685 | niro | 532 | 1, 2, 1, 3, 4, 5, 1, 6, /* "\t\n !\"$&'" */ |
2686 | 7, 8, 3, 3, 3, 3, 1, 1, /* "()*-/:;<" */ | ||
2687 | 3, 1, 3, 3, 9, 3, 10, 1, /* "=>?[\\]`|" */ | ||
2688 | 11, 3 /* "}~" */ | ||
2689 | }; | ||
2690 | niro | 984 | # else |
2691 | static const uint8_t syntax_index_table[] ALIGN1 = { | ||
2692 | niro | 532 | 0, 1, 0, 2, 3, 4, 0, 5, /* "\t\n !\"$&'" */ |
2693 | 6, 7, 2, 2, 2, 2, 0, 0, /* "()*-/:;<" */ | ||
2694 | 2, 0, 2, 2, 8, 2, 9, 0, /* "=>?[\\]`|" */ | ||
2695 | 10, 2 /* "}~" */ | ||
2696 | }; | ||
2697 | niro | 984 | # endif |
2698 | niro | 532 | const char *s; |
2699 | int indx; | ||
2700 | |||
2701 | niro | 984 | if (c == PEOF) |
2702 | niro | 532 | return CENDFILE; |
2703 | niro | 984 | # if ENABLE_ASH_ALIAS |
2704 | if (c == PEOA) | ||
2705 | niro | 532 | indx = 0; |
2706 | else | ||
2707 | niro | 984 | # endif |
2708 | { | ||
2709 | /* Cast is purely for paranoia here, | ||
2710 | * just in case someone passed signed char to us */ | ||
2711 | if ((unsigned char)c >= CTL_FIRST | ||
2712 | && (unsigned char)c <= CTL_LAST | ||
2713 | ) { | ||
2714 | return CCTL; | ||
2715 | } | ||
2716 | niro | 816 | s = strchrnul(spec_symbls, c); |
2717 | if (*s == '\0') | ||
2718 | niro | 532 | return CWORD; |
2719 | niro | 816 | indx = syntax_index_table[s - spec_symbls]; |
2720 | niro | 532 | } |
2721 | niro | 984 | return (S_I_T[indx] >> (syntax*4)) & 0xf; |
2722 | niro | 532 | } |
2723 | |||
2724 | niro | 816 | #else /* !USE_SIT_FUNCTION */ |
2725 | niro | 532 | |
2726 | niro | 984 | static const uint8_t syntax_index_table[] = { |
2727 | niro | 532 | /* BASESYNTAX_DQSYNTAX_SQSYNTAX_ARISYNTAX */ |
2728 | niro | 984 | /* 0 */ CWORD_CWORD_CWORD_CWORD, |
2729 | /* 1 */ CWORD_CWORD_CWORD_CWORD, | ||
2730 | /* 2 */ CWORD_CWORD_CWORD_CWORD, | ||
2731 | /* 3 */ CWORD_CWORD_CWORD_CWORD, | ||
2732 | /* 4 */ CWORD_CWORD_CWORD_CWORD, | ||
2733 | /* 5 */ CWORD_CWORD_CWORD_CWORD, | ||
2734 | /* 6 */ CWORD_CWORD_CWORD_CWORD, | ||
2735 | /* 7 */ CWORD_CWORD_CWORD_CWORD, | ||
2736 | /* 8 */ CWORD_CWORD_CWORD_CWORD, | ||
2737 | /* 9 "\t" */ CSPCL_CWORD_CWORD_CWORD, | ||
2738 | /* 10 "\n" */ CNL_CNL_CNL_CNL, | ||
2739 | /* 11 */ CWORD_CWORD_CWORD_CWORD, | ||
2740 | /* 12 */ CWORD_CWORD_CWORD_CWORD, | ||
2741 | /* 13 */ CWORD_CWORD_CWORD_CWORD, | ||
2742 | /* 14 */ CWORD_CWORD_CWORD_CWORD, | ||
2743 | /* 15 */ CWORD_CWORD_CWORD_CWORD, | ||
2744 | /* 16 */ CWORD_CWORD_CWORD_CWORD, | ||
2745 | /* 17 */ CWORD_CWORD_CWORD_CWORD, | ||
2746 | /* 18 */ CWORD_CWORD_CWORD_CWORD, | ||
2747 | /* 19 */ CWORD_CWORD_CWORD_CWORD, | ||
2748 | /* 20 */ CWORD_CWORD_CWORD_CWORD, | ||
2749 | /* 21 */ CWORD_CWORD_CWORD_CWORD, | ||
2750 | /* 22 */ CWORD_CWORD_CWORD_CWORD, | ||
2751 | /* 23 */ CWORD_CWORD_CWORD_CWORD, | ||
2752 | /* 24 */ CWORD_CWORD_CWORD_CWORD, | ||
2753 | /* 25 */ CWORD_CWORD_CWORD_CWORD, | ||
2754 | /* 26 */ CWORD_CWORD_CWORD_CWORD, | ||
2755 | /* 27 */ CWORD_CWORD_CWORD_CWORD, | ||
2756 | /* 28 */ CWORD_CWORD_CWORD_CWORD, | ||
2757 | /* 29 */ CWORD_CWORD_CWORD_CWORD, | ||
2758 | /* 30 */ CWORD_CWORD_CWORD_CWORD, | ||
2759 | /* 31 */ CWORD_CWORD_CWORD_CWORD, | ||
2760 | /* 32 " " */ CSPCL_CWORD_CWORD_CWORD, | ||
2761 | /* 33 "!" */ CWORD_CCTL_CCTL_CWORD, | ||
2762 | /* 34 """ */ CDQUOTE_CENDQUOTE_CWORD_CWORD, | ||
2763 | /* 35 "#" */ CWORD_CWORD_CWORD_CWORD, | ||
2764 | /* 36 "$" */ CVAR_CVAR_CWORD_CVAR, | ||
2765 | /* 37 "%" */ CWORD_CWORD_CWORD_CWORD, | ||
2766 | /* 38 "&" */ CSPCL_CWORD_CWORD_CWORD, | ||
2767 | /* 39 "'" */ CSQUOTE_CWORD_CENDQUOTE_CWORD, | ||
2768 | /* 40 "(" */ CSPCL_CWORD_CWORD_CLP, | ||
2769 | /* 41 ")" */ CSPCL_CWORD_CWORD_CRP, | ||
2770 | /* 42 "*" */ CWORD_CCTL_CCTL_CWORD, | ||
2771 | /* 43 "+" */ CWORD_CWORD_CWORD_CWORD, | ||
2772 | /* 44 "," */ CWORD_CWORD_CWORD_CWORD, | ||
2773 | /* 45 "-" */ CWORD_CCTL_CCTL_CWORD, | ||
2774 | /* 46 "." */ CWORD_CWORD_CWORD_CWORD, | ||
2775 | /* 47 "/" */ CWORD_CCTL_CCTL_CWORD, | ||
2776 | /* 48 "0" */ CWORD_CWORD_CWORD_CWORD, | ||
2777 | /* 49 "1" */ CWORD_CWORD_CWORD_CWORD, | ||
2778 | /* 50 "2" */ CWORD_CWORD_CWORD_CWORD, | ||
2779 | /* 51 "3" */ CWORD_CWORD_CWORD_CWORD, | ||
2780 | /* 52 "4" */ CWORD_CWORD_CWORD_CWORD, | ||
2781 | /* 53 "5" */ CWORD_CWORD_CWORD_CWORD, | ||
2782 | /* 54 "6" */ CWORD_CWORD_CWORD_CWORD, | ||
2783 | /* 55 "7" */ CWORD_CWORD_CWORD_CWORD, | ||
2784 | /* 56 "8" */ CWORD_CWORD_CWORD_CWORD, | ||
2785 | /* 57 "9" */ CWORD_CWORD_CWORD_CWORD, | ||
2786 | /* 58 ":" */ CWORD_CCTL_CCTL_CWORD, | ||
2787 | /* 59 ";" */ CSPCL_CWORD_CWORD_CWORD, | ||
2788 | /* 60 "<" */ CSPCL_CWORD_CWORD_CWORD, | ||
2789 | /* 61 "=" */ CWORD_CCTL_CCTL_CWORD, | ||
2790 | /* 62 ">" */ CSPCL_CWORD_CWORD_CWORD, | ||
2791 | /* 63 "?" */ CWORD_CCTL_CCTL_CWORD, | ||
2792 | /* 64 "@" */ CWORD_CWORD_CWORD_CWORD, | ||
2793 | /* 65 "A" */ CWORD_CWORD_CWORD_CWORD, | ||
2794 | /* 66 "B" */ CWORD_CWORD_CWORD_CWORD, | ||
2795 | /* 67 "C" */ CWORD_CWORD_CWORD_CWORD, | ||
2796 | /* 68 "D" */ CWORD_CWORD_CWORD_CWORD, | ||
2797 | /* 69 "E" */ CWORD_CWORD_CWORD_CWORD, | ||
2798 | /* 70 "F" */ CWORD_CWORD_CWORD_CWORD, | ||
2799 | /* 71 "G" */ CWORD_CWORD_CWORD_CWORD, | ||
2800 | /* 72 "H" */ CWORD_CWORD_CWORD_CWORD, | ||
2801 | /* 73 "I" */ CWORD_CWORD_CWORD_CWORD, | ||
2802 | /* 74 "J" */ CWORD_CWORD_CWORD_CWORD, | ||
2803 | /* 75 "K" */ CWORD_CWORD_CWORD_CWORD, | ||
2804 | /* 76 "L" */ CWORD_CWORD_CWORD_CWORD, | ||
2805 | /* 77 "M" */ CWORD_CWORD_CWORD_CWORD, | ||
2806 | /* 78 "N" */ CWORD_CWORD_CWORD_CWORD, | ||
2807 | /* 79 "O" */ CWORD_CWORD_CWORD_CWORD, | ||
2808 | /* 80 "P" */ CWORD_CWORD_CWORD_CWORD, | ||
2809 | /* 81 "Q" */ CWORD_CWORD_CWORD_CWORD, | ||
2810 | /* 82 "R" */ CWORD_CWORD_CWORD_CWORD, | ||
2811 | /* 83 "S" */ CWORD_CWORD_CWORD_CWORD, | ||
2812 | /* 84 "T" */ CWORD_CWORD_CWORD_CWORD, | ||
2813 | /* 85 "U" */ CWORD_CWORD_CWORD_CWORD, | ||
2814 | /* 86 "V" */ CWORD_CWORD_CWORD_CWORD, | ||
2815 | /* 87 "W" */ CWORD_CWORD_CWORD_CWORD, | ||
2816 | /* 88 "X" */ CWORD_CWORD_CWORD_CWORD, | ||
2817 | /* 89 "Y" */ CWORD_CWORD_CWORD_CWORD, | ||
2818 | /* 90 "Z" */ CWORD_CWORD_CWORD_CWORD, | ||
2819 | /* 91 "[" */ CWORD_CCTL_CCTL_CWORD, | ||
2820 | /* 92 "\" */ CBACK_CBACK_CCTL_CBACK, | ||
2821 | /* 93 "]" */ CWORD_CCTL_CCTL_CWORD, | ||
2822 | /* 94 "^" */ CWORD_CWORD_CWORD_CWORD, | ||
2823 | /* 95 "_" */ CWORD_CWORD_CWORD_CWORD, | ||
2824 | /* 96 "`" */ CBQUOTE_CBQUOTE_CWORD_CBQUOTE, | ||
2825 | /* 97 "a" */ CWORD_CWORD_CWORD_CWORD, | ||
2826 | /* 98 "b" */ CWORD_CWORD_CWORD_CWORD, | ||
2827 | /* 99 "c" */ CWORD_CWORD_CWORD_CWORD, | ||
2828 | /* 100 "d" */ CWORD_CWORD_CWORD_CWORD, | ||
2829 | /* 101 "e" */ CWORD_CWORD_CWORD_CWORD, | ||
2830 | /* 102 "f" */ CWORD_CWORD_CWORD_CWORD, | ||
2831 | /* 103 "g" */ CWORD_CWORD_CWORD_CWORD, | ||
2832 | /* 104 "h" */ CWORD_CWORD_CWORD_CWORD, | ||
2833 | /* 105 "i" */ CWORD_CWORD_CWORD_CWORD, | ||
2834 | /* 106 "j" */ CWORD_CWORD_CWORD_CWORD, | ||
2835 | /* 107 "k" */ CWORD_CWORD_CWORD_CWORD, | ||
2836 | /* 108 "l" */ CWORD_CWORD_CWORD_CWORD, | ||
2837 | /* 109 "m" */ CWORD_CWORD_CWORD_CWORD, | ||
2838 | /* 110 "n" */ CWORD_CWORD_CWORD_CWORD, | ||
2839 | /* 111 "o" */ CWORD_CWORD_CWORD_CWORD, | ||
2840 | /* 112 "p" */ CWORD_CWORD_CWORD_CWORD, | ||
2841 | /* 113 "q" */ CWORD_CWORD_CWORD_CWORD, | ||
2842 | /* 114 "r" */ CWORD_CWORD_CWORD_CWORD, | ||
2843 | /* 115 "s" */ CWORD_CWORD_CWORD_CWORD, | ||
2844 | /* 116 "t" */ CWORD_CWORD_CWORD_CWORD, | ||
2845 | /* 117 "u" */ CWORD_CWORD_CWORD_CWORD, | ||
2846 | /* 118 "v" */ CWORD_CWORD_CWORD_CWORD, | ||
2847 | /* 119 "w" */ CWORD_CWORD_CWORD_CWORD, | ||
2848 | /* 120 "x" */ CWORD_CWORD_CWORD_CWORD, | ||
2849 | /* 121 "y" */ CWORD_CWORD_CWORD_CWORD, | ||
2850 | /* 122 "z" */ CWORD_CWORD_CWORD_CWORD, | ||
2851 | /* 123 "{" */ CWORD_CWORD_CWORD_CWORD, | ||
2852 | /* 124 "|" */ CSPCL_CWORD_CWORD_CWORD, | ||
2853 | /* 125 "}" */ CENDVAR_CENDVAR_CWORD_CENDVAR, | ||
2854 | /* 126 "~" */ CWORD_CCTL_CCTL_CWORD, | ||
2855 | /* 127 del */ CWORD_CWORD_CWORD_CWORD, | ||
2856 | /* 128 0x80 */ CWORD_CWORD_CWORD_CWORD, | ||
2857 | /* 129 CTLESC */ CCTL_CCTL_CCTL_CCTL, | ||
2858 | /* 130 CTLVAR */ CCTL_CCTL_CCTL_CCTL, | ||
2859 | /* 131 CTLENDVAR */ CCTL_CCTL_CCTL_CCTL, | ||
2860 | /* 132 CTLBACKQ */ CCTL_CCTL_CCTL_CCTL, | ||
2861 | /* 133 CTLQUOTE */ CCTL_CCTL_CCTL_CCTL, | ||
2862 | /* 134 CTLARI */ CCTL_CCTL_CCTL_CCTL, | ||
2863 | /* 135 CTLENDARI */ CCTL_CCTL_CCTL_CCTL, | ||
2864 | /* 136 CTLQUOTEMARK */ CCTL_CCTL_CCTL_CCTL, | ||
2865 | /* 137 */ CWORD_CWORD_CWORD_CWORD, | ||
2866 | /* 138 */ CWORD_CWORD_CWORD_CWORD, | ||
2867 | /* 139 */ CWORD_CWORD_CWORD_CWORD, | ||
2868 | /* 140 */ CWORD_CWORD_CWORD_CWORD, | ||
2869 | /* 141 */ CWORD_CWORD_CWORD_CWORD, | ||
2870 | /* 142 */ CWORD_CWORD_CWORD_CWORD, | ||
2871 | /* 143 */ CWORD_CWORD_CWORD_CWORD, | ||
2872 | /* 144 */ CWORD_CWORD_CWORD_CWORD, | ||
2873 | /* 145 */ CWORD_CWORD_CWORD_CWORD, | ||
2874 | /* 146 */ CWORD_CWORD_CWORD_CWORD, | ||
2875 | /* 147 */ CWORD_CWORD_CWORD_CWORD, | ||
2876 | /* 148 */ CWORD_CWORD_CWORD_CWORD, | ||
2877 | /* 149 */ CWORD_CWORD_CWORD_CWORD, | ||
2878 | /* 150 */ CWORD_CWORD_CWORD_CWORD, | ||
2879 | /* 151 */ CWORD_CWORD_CWORD_CWORD, | ||
2880 | /* 152 */ CWORD_CWORD_CWORD_CWORD, | ||
2881 | /* 153 */ CWORD_CWORD_CWORD_CWORD, | ||
2882 | /* 154 */ CWORD_CWORD_CWORD_CWORD, | ||
2883 | /* 155 */ CWORD_CWORD_CWORD_CWORD, | ||
2884 | /* 156 */ CWORD_CWORD_CWORD_CWORD, | ||
2885 | /* 157 */ CWORD_CWORD_CWORD_CWORD, | ||
2886 | /* 158 */ CWORD_CWORD_CWORD_CWORD, | ||
2887 | /* 159 */ CWORD_CWORD_CWORD_CWORD, | ||
2888 | /* 160 */ CWORD_CWORD_CWORD_CWORD, | ||
2889 | /* 161 */ CWORD_CWORD_CWORD_CWORD, | ||
2890 | /* 162 */ CWORD_CWORD_CWORD_CWORD, | ||
2891 | /* 163 */ CWORD_CWORD_CWORD_CWORD, | ||
2892 | /* 164 */ CWORD_CWORD_CWORD_CWORD, | ||
2893 | /* 165 */ CWORD_CWORD_CWORD_CWORD, | ||
2894 | /* 166 */ CWORD_CWORD_CWORD_CWORD, | ||
2895 | /* 167 */ CWORD_CWORD_CWORD_CWORD, | ||
2896 | /* 168 */ CWORD_CWORD_CWORD_CWORD, | ||
2897 | /* 169 */ CWORD_CWORD_CWORD_CWORD, | ||
2898 | /* 170 */ CWORD_CWORD_CWORD_CWORD, | ||
2899 | /* 171 */ CWORD_CWORD_CWORD_CWORD, | ||
2900 | /* 172 */ CWORD_CWORD_CWORD_CWORD, | ||
2901 | /* 173 */ CWORD_CWORD_CWORD_CWORD, | ||
2902 | /* 174 */ CWORD_CWORD_CWORD_CWORD, | ||
2903 | /* 175 */ CWORD_CWORD_CWORD_CWORD, | ||
2904 | /* 176 */ CWORD_CWORD_CWORD_CWORD, | ||
2905 | /* 177 */ CWORD_CWORD_CWORD_CWORD, | ||
2906 | /* 178 */ CWORD_CWORD_CWORD_CWORD, | ||
2907 | /* 179 */ CWORD_CWORD_CWORD_CWORD, | ||
2908 | /* 180 */ CWORD_CWORD_CWORD_CWORD, | ||
2909 | /* 181 */ CWORD_CWORD_CWORD_CWORD, | ||
2910 | /* 182 */ CWORD_CWORD_CWORD_CWORD, | ||
2911 | /* 183 */ CWORD_CWORD_CWORD_CWORD, | ||
2912 | /* 184 */ CWORD_CWORD_CWORD_CWORD, | ||
2913 | /* 185 */ CWORD_CWORD_CWORD_CWORD, | ||
2914 | /* 186 */ CWORD_CWORD_CWORD_CWORD, | ||
2915 | /* 187 */ CWORD_CWORD_CWORD_CWORD, | ||
2916 | /* 188 */ CWORD_CWORD_CWORD_CWORD, | ||
2917 | /* 189 */ CWORD_CWORD_CWORD_CWORD, | ||
2918 | /* 190 */ CWORD_CWORD_CWORD_CWORD, | ||
2919 | /* 191 */ CWORD_CWORD_CWORD_CWORD, | ||
2920 | /* 192 */ CWORD_CWORD_CWORD_CWORD, | ||
2921 | /* 193 */ CWORD_CWORD_CWORD_CWORD, | ||
2922 | /* 194 */ CWORD_CWORD_CWORD_CWORD, | ||
2923 | /* 195 */ CWORD_CWORD_CWORD_CWORD, | ||
2924 | /* 196 */ CWORD_CWORD_CWORD_CWORD, | ||
2925 | /* 197 */ CWORD_CWORD_CWORD_CWORD, | ||
2926 | /* 198 */ CWORD_CWORD_CWORD_CWORD, | ||
2927 | /* 199 */ CWORD_CWORD_CWORD_CWORD, | ||
2928 | /* 200 */ CWORD_CWORD_CWORD_CWORD, | ||
2929 | /* 201 */ CWORD_CWORD_CWORD_CWORD, | ||
2930 | /* 202 */ CWORD_CWORD_CWORD_CWORD, | ||
2931 | /* 203 */ CWORD_CWORD_CWORD_CWORD, | ||
2932 | /* 204 */ CWORD_CWORD_CWORD_CWORD, | ||
2933 | /* 205 */ CWORD_CWORD_CWORD_CWORD, | ||
2934 | /* 206 */ CWORD_CWORD_CWORD_CWORD, | ||
2935 | /* 207 */ CWORD_CWORD_CWORD_CWORD, | ||
2936 | /* 208 */ CWORD_CWORD_CWORD_CWORD, | ||
2937 | /* 209 */ CWORD_CWORD_CWORD_CWORD, | ||
2938 | /* 210 */ CWORD_CWORD_CWORD_CWORD, | ||
2939 | /* 211 */ CWORD_CWORD_CWORD_CWORD, | ||
2940 | /* 212 */ CWORD_CWORD_CWORD_CWORD, | ||
2941 | /* 213 */ CWORD_CWORD_CWORD_CWORD, | ||
2942 | /* 214 */ CWORD_CWORD_CWORD_CWORD, | ||
2943 | /* 215 */ CWORD_CWORD_CWORD_CWORD, | ||
2944 | /* 216 */ CWORD_CWORD_CWORD_CWORD, | ||
2945 | /* 217 */ CWORD_CWORD_CWORD_CWORD, | ||
2946 | /* 218 */ CWORD_CWORD_CWORD_CWORD, | ||
2947 | /* 219 */ CWORD_CWORD_CWORD_CWORD, | ||
2948 | /* 220 */ CWORD_CWORD_CWORD_CWORD, | ||
2949 | /* 221 */ CWORD_CWORD_CWORD_CWORD, | ||
2950 | /* 222 */ CWORD_CWORD_CWORD_CWORD, | ||
2951 | /* 223 */ CWORD_CWORD_CWORD_CWORD, | ||
2952 | /* 224 */ CWORD_CWORD_CWORD_CWORD, | ||
2953 | /* 225 */ CWORD_CWORD_CWORD_CWORD, | ||
2954 | /* 226 */ CWORD_CWORD_CWORD_CWORD, | ||
2955 | /* 227 */ CWORD_CWORD_CWORD_CWORD, | ||
2956 | /* 228 */ CWORD_CWORD_CWORD_CWORD, | ||
2957 | /* 229 */ CWORD_CWORD_CWORD_CWORD, | ||
2958 | /* 230 */ CWORD_CWORD_CWORD_CWORD, | ||
2959 | /* 231 */ CWORD_CWORD_CWORD_CWORD, | ||
2960 | /* 232 */ CWORD_CWORD_CWORD_CWORD, | ||
2961 | /* 233 */ CWORD_CWORD_CWORD_CWORD, | ||
2962 | /* 234 */ CWORD_CWORD_CWORD_CWORD, | ||
2963 | /* 235 */ CWORD_CWORD_CWORD_CWORD, | ||
2964 | /* 236 */ CWORD_CWORD_CWORD_CWORD, | ||
2965 | /* 237 */ CWORD_CWORD_CWORD_CWORD, | ||
2966 | /* 238 */ CWORD_CWORD_CWORD_CWORD, | ||
2967 | /* 239 */ CWORD_CWORD_CWORD_CWORD, | ||
2968 | /* 230 */ CWORD_CWORD_CWORD_CWORD, | ||
2969 | /* 241 */ CWORD_CWORD_CWORD_CWORD, | ||
2970 | /* 242 */ CWORD_CWORD_CWORD_CWORD, | ||
2971 | /* 243 */ CWORD_CWORD_CWORD_CWORD, | ||
2972 | /* 244 */ CWORD_CWORD_CWORD_CWORD, | ||
2973 | /* 245 */ CWORD_CWORD_CWORD_CWORD, | ||
2974 | /* 246 */ CWORD_CWORD_CWORD_CWORD, | ||
2975 | /* 247 */ CWORD_CWORD_CWORD_CWORD, | ||
2976 | /* 248 */ CWORD_CWORD_CWORD_CWORD, | ||
2977 | /* 249 */ CWORD_CWORD_CWORD_CWORD, | ||
2978 | /* 250 */ CWORD_CWORD_CWORD_CWORD, | ||
2979 | /* 251 */ CWORD_CWORD_CWORD_CWORD, | ||
2980 | /* 252 */ CWORD_CWORD_CWORD_CWORD, | ||
2981 | /* 253 */ CWORD_CWORD_CWORD_CWORD, | ||
2982 | /* 254 */ CWORD_CWORD_CWORD_CWORD, | ||
2983 | /* 255 */ CWORD_CWORD_CWORD_CWORD, | ||
2984 | /* PEOF */ CENDFILE_CENDFILE_CENDFILE_CENDFILE, | ||
2985 | # if ENABLE_ASH_ALIAS | ||
2986 | /* PEOA */ CSPCL_CIGN_CIGN_CIGN, | ||
2987 | # endif | ||
2988 | niro | 532 | }; |
2989 | |||
2990 | niro | 984 | # define SIT(c, syntax) ((S_I_T[syntax_index_table[c]] >> ((syntax)*4)) & 0xf) |
2991 | niro | 816 | |
2992 | niro | 984 | #endif /* !USE_SIT_FUNCTION */ |
2993 | niro | 532 | |
2994 | |||
2995 | niro | 816 | /* ============ Alias handling */ |
2996 | niro | 532 | |
2997 | niro | 816 | #if ENABLE_ASH_ALIAS |
2998 | niro | 532 | |
2999 | niro | 816 | #define ALIASINUSE 1 |
3000 | #define ALIASDEAD 2 | ||
3001 | niro | 532 | |
3002 | niro | 816 | struct alias { |
3003 | struct alias *next; | ||
3004 | char *name; | ||
3005 | char *val; | ||
3006 | int flag; | ||
3007 | niro | 532 | }; |
3008 | |||
3009 | |||
3010 | niro | 816 | static struct alias **atab; // [ATABSIZE]; |
3011 | #define INIT_G_alias() do { \ | ||
3012 | atab = xzalloc(ATABSIZE * sizeof(atab[0])); \ | ||
3013 | } while (0) | ||
3014 | niro | 532 | |
3015 | |||
3016 | niro | 816 | static struct alias ** |
3017 | __lookupalias(const char *name) { | ||
3018 | unsigned int hashval; | ||
3019 | struct alias **app; | ||
3020 | const char *p; | ||
3021 | unsigned int ch; | ||
3022 | niro | 532 | |
3023 | niro | 816 | p = name; |
3024 | niro | 532 | |
3025 | niro | 816 | ch = (unsigned char)*p; |
3026 | hashval = ch << 4; | ||
3027 | while (ch) { | ||
3028 | hashval += ch; | ||
3029 | ch = (unsigned char)*++p; | ||
3030 | } | ||
3031 | app = &atab[hashval % ATABSIZE]; | ||
3032 | niro | 532 | |
3033 | niro | 816 | for (; *app; app = &(*app)->next) { |
3034 | if (strcmp(name, (*app)->name) == 0) { | ||
3035 | break; | ||
3036 | } | ||
3037 | } | ||
3038 | niro | 532 | |
3039 | niro | 816 | return app; |
3040 | niro | 532 | } |
3041 | |||
3042 | niro | 816 | static struct alias * |
3043 | lookupalias(const char *name, int check) | ||
3044 | niro | 532 | { |
3045 | niro | 816 | struct alias *ap = *__lookupalias(name); |
3046 | niro | 532 | |
3047 | niro | 816 | if (check && ap && (ap->flag & ALIASINUSE)) |
3048 | return NULL; | ||
3049 | return ap; | ||
3050 | niro | 532 | } |
3051 | |||
3052 | niro | 816 | static struct alias * |
3053 | freealias(struct alias *ap) | ||
3054 | niro | 532 | { |
3055 | niro | 816 | struct alias *next; |
3056 | niro | 532 | |
3057 | niro | 816 | if (ap->flag & ALIASINUSE) { |
3058 | ap->flag |= ALIASDEAD; | ||
3059 | return ap; | ||
3060 | } | ||
3061 | niro | 532 | |
3062 | niro | 816 | next = ap->next; |
3063 | free(ap->name); | ||
3064 | free(ap->val); | ||
3065 | free(ap); | ||
3066 | return next; | ||
3067 | niro | 532 | } |
3068 | |||
3069 | static void | ||
3070 | setalias(const char *name, const char *val) | ||
3071 | { | ||
3072 | struct alias *ap, **app; | ||
3073 | |||
3074 | app = __lookupalias(name); | ||
3075 | ap = *app; | ||
3076 | niro | 816 | INT_OFF; |
3077 | niro | 532 | if (ap) { |
3078 | if (!(ap->flag & ALIASINUSE)) { | ||
3079 | niro | 816 | free(ap->val); |
3080 | niro | 532 | } |
3081 | niro | 816 | ap->val = ckstrdup(val); |
3082 | niro | 532 | ap->flag &= ~ALIASDEAD; |
3083 | } else { | ||
3084 | /* not found */ | ||
3085 | niro | 816 | ap = ckzalloc(sizeof(struct alias)); |
3086 | ap->name = ckstrdup(name); | ||
3087 | ap->val = ckstrdup(val); | ||
3088 | /*ap->flag = 0; - ckzalloc did it */ | ||
3089 | /*ap->next = NULL;*/ | ||
3090 | niro | 532 | *app = ap; |
3091 | } | ||
3092 | niro | 816 | INT_ON; |
3093 | niro | 532 | } |
3094 | |||
3095 | static int | ||
3096 | unalias(const char *name) | ||
3097 | { | ||
3098 | struct alias **app; | ||
3099 | |||
3100 | app = __lookupalias(name); | ||
3101 | |||
3102 | if (*app) { | ||
3103 | niro | 816 | INT_OFF; |
3104 | niro | 532 | *app = freealias(*app); |
3105 | niro | 816 | INT_ON; |
3106 | niro | 532 | return 0; |
3107 | } | ||
3108 | |||
3109 | return 1; | ||
3110 | } | ||
3111 | |||
3112 | static void | ||
3113 | rmaliases(void) | ||
3114 | { | ||
3115 | struct alias *ap, **app; | ||
3116 | int i; | ||
3117 | |||
3118 | niro | 816 | INT_OFF; |
3119 | niro | 532 | for (i = 0; i < ATABSIZE; i++) { |
3120 | app = &atab[i]; | ||
3121 | for (ap = *app; ap; ap = *app) { | ||
3122 | *app = freealias(*app); | ||
3123 | if (ap == *app) { | ||
3124 | app = &ap->next; | ||
3125 | } | ||
3126 | } | ||
3127 | } | ||
3128 | niro | 816 | INT_ON; |
3129 | niro | 532 | } |
3130 | |||
3131 | niro | 816 | static void |
3132 | printalias(const struct alias *ap) | ||
3133 | niro | 532 | { |
3134 | niro | 816 | out1fmt("%s=%s\n", ap->name, single_quote(ap->val)); |
3135 | niro | 532 | } |
3136 | |||
3137 | /* | ||
3138 | * TODO - sort output | ||
3139 | */ | ||
3140 | niro | 984 | static int FAST_FUNC |
3141 | niro | 816 | aliascmd(int argc UNUSED_PARAM, char **argv) |
3142 | niro | 532 | { |
3143 | char *n, *v; | ||
3144 | int ret = 0; | ||
3145 | struct alias *ap; | ||
3146 | |||
3147 | niro | 816 | if (!argv[1]) { |
3148 | niro | 532 | int i; |
3149 | |||
3150 | niro | 816 | for (i = 0; i < ATABSIZE; i++) { |
3151 | niro | 532 | for (ap = atab[i]; ap; ap = ap->next) { |
3152 | printalias(ap); | ||
3153 | } | ||
3154 | niro | 816 | } |
3155 | niro | 532 | return 0; |
3156 | } | ||
3157 | while ((n = *++argv) != NULL) { | ||
3158 | niro | 816 | v = strchr(n+1, '='); |
3159 | if (v == NULL) { /* n+1: funny ksh stuff */ | ||
3160 | ap = *__lookupalias(n); | ||
3161 | if (ap == NULL) { | ||
3162 | niro | 532 | fprintf(stderr, "%s: %s not found\n", "alias", n); |
3163 | ret = 1; | ||
3164 | } else | ||
3165 | printalias(ap); | ||
3166 | } else { | ||
3167 | *v++ = '\0'; | ||
3168 | setalias(n, v); | ||
3169 | } | ||
3170 | } | ||
3171 | |||
3172 | return ret; | ||
3173 | } | ||
3174 | |||
3175 | niro | 984 | static int FAST_FUNC |
3176 | niro | 816 | unaliascmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
3177 | niro | 532 | { |
3178 | int i; | ||
3179 | |||
3180 | while ((i = nextopt("a")) != '\0') { | ||
3181 | if (i == 'a') { | ||
3182 | rmaliases(); | ||
3183 | return 0; | ||
3184 | } | ||
3185 | } | ||
3186 | for (i = 0; *argptr; argptr++) { | ||
3187 | if (unalias(*argptr)) { | ||
3188 | fprintf(stderr, "%s: %s not found\n", "unalias", *argptr); | ||
3189 | i = 1; | ||
3190 | } | ||
3191 | } | ||
3192 | |||
3193 | return i; | ||
3194 | } | ||
3195 | |||
3196 | niro | 816 | #endif /* ASH_ALIAS */ |
3197 | niro | 532 | |
3198 | |||
3199 | niro | 816 | /* ============ jobs.c */ |
3200 | niro | 532 | |
3201 | niro | 816 | /* Mode argument to forkshell. Don't change FORK_FG or FORK_BG. */ |
3202 | niro | 984 | #define FORK_FG 0 |
3203 | #define FORK_BG 1 | ||
3204 | niro | 816 | #define FORK_NOJOB 2 |
3205 | niro | 532 | |
3206 | niro | 816 | /* mode flags for showjob(s) */ |
3207 | niro | 984 | #define SHOW_ONLY_PGID 0x01 /* show only pgid (jobs -p) */ |
3208 | #define SHOW_PIDS 0x02 /* show individual pids, not just one line per job */ | ||
3209 | #define SHOW_CHANGED 0x04 /* only jobs whose state has changed */ | ||
3210 | niro | 532 | |
3211 | niro | 816 | /* |
3212 | * A job structure contains information about a job. A job is either a | ||
3213 | * single process or a set of processes contained in a pipeline. In the | ||
3214 | * latter case, pidlist will be non-NULL, and will point to a -1 terminated | ||
3215 | * array of pids. | ||
3216 | */ | ||
3217 | struct procstat { | ||
3218 | niro | 984 | pid_t ps_pid; /* process id */ |
3219 | int ps_status; /* last process status from wait() */ | ||
3220 | char *ps_cmd; /* text of command being run */ | ||
3221 | niro | 816 | }; |
3222 | niro | 532 | |
3223 | niro | 816 | struct job { |
3224 | struct procstat ps0; /* status of process */ | ||
3225 | struct procstat *ps; /* status or processes when more than one */ | ||
3226 | #if JOBS | ||
3227 | int stopstatus; /* status of a stopped job */ | ||
3228 | #endif | ||
3229 | uint32_t | ||
3230 | nprocs: 16, /* number of processes */ | ||
3231 | state: 8, | ||
3232 | #define JOBRUNNING 0 /* at least one proc running */ | ||
3233 | #define JOBSTOPPED 1 /* all procs are stopped */ | ||
3234 | #define JOBDONE 2 /* all procs are completed */ | ||
3235 | #if JOBS | ||
3236 | sigint: 1, /* job was killed by SIGINT */ | ||
3237 | jobctl: 1, /* job running under job control */ | ||
3238 | #endif | ||
3239 | waited: 1, /* true if this entry has been waited for */ | ||
3240 | used: 1, /* true if this entry is in used */ | ||
3241 | changed: 1; /* true if status has changed */ | ||
3242 | struct job *prev_job; /* previous job */ | ||
3243 | }; | ||
3244 | niro | 532 | |
3245 | niro | 816 | static struct job *makejob(/*union node *,*/ int); |
3246 | static int forkshell(struct job *, union node *, int); | ||
3247 | static int waitforjob(struct job *); | ||
3248 | niro | 532 | |
3249 | niro | 816 | #if !JOBS |
3250 | enum { doing_jobctl = 0 }; | ||
3251 | #define setjobctl(on) do {} while (0) | ||
3252 | #else | ||
3253 | static smallint doing_jobctl; //references:8 | ||
3254 | static void setjobctl(int); | ||
3255 | #endif | ||
3256 | niro | 532 | |
3257 | /* | ||
3258 | niro | 984 | * Ignore a signal. |
3259 | */ | ||
3260 | static void | ||
3261 | ignoresig(int signo) | ||
3262 | { | ||
3263 | /* Avoid unnecessary system calls. Is it already SIG_IGNed? */ | ||
3264 | if (sigmode[signo - 1] != S_IGN && sigmode[signo - 1] != S_HARD_IGN) { | ||
3265 | /* No, need to do it */ | ||
3266 | signal(signo, SIG_IGN); | ||
3267 | } | ||
3268 | sigmode[signo - 1] = S_HARD_IGN; | ||
3269 | } | ||
3270 | |||
3271 | /* | ||
3272 | * Signal handler. Only one usage site - in setsignal() | ||
3273 | */ | ||
3274 | static void | ||
3275 | onsig(int signo) | ||
3276 | { | ||
3277 | gotsig[signo - 1] = 1; | ||
3278 | |||
3279 | if (signo == SIGINT && !trap[SIGINT]) { | ||
3280 | if (!suppress_int) { | ||
3281 | pending_sig = 0; | ||
3282 | raise_interrupt(); /* does not return */ | ||
3283 | } | ||
3284 | pending_int = 1; | ||
3285 | } else { | ||
3286 | pending_sig = signo; | ||
3287 | } | ||
3288 | } | ||
3289 | |||
3290 | /* | ||
3291 | niro | 816 | * Set the signal handler for the specified signal. The routine figures |
3292 | * out what it should be set to. | ||
3293 | niro | 532 | */ |
3294 | niro | 816 | static void |
3295 | setsignal(int signo) | ||
3296 | niro | 532 | { |
3297 | niro | 984 | char *t; |
3298 | char cur_act, new_act; | ||
3299 | niro | 816 | struct sigaction act; |
3300 | niro | 532 | |
3301 | niro | 816 | t = trap[signo]; |
3302 | niro | 984 | new_act = S_DFL; |
3303 | if (t != NULL) { /* trap for this sig is set */ | ||
3304 | new_act = S_CATCH; | ||
3305 | if (t[0] == '\0') /* trap is "": ignore this sig */ | ||
3306 | new_act = S_IGN; | ||
3307 | } | ||
3308 | |||
3309 | if (rootshell && new_act == S_DFL) { | ||
3310 | niro | 816 | switch (signo) { |
3311 | case SIGINT: | ||
3312 | if (iflag || minusc || sflag == 0) | ||
3313 | niro | 984 | new_act = S_CATCH; |
3314 | niro | 816 | break; |
3315 | case SIGQUIT: | ||
3316 | #if DEBUG | ||
3317 | if (debug) | ||
3318 | break; | ||
3319 | #endif | ||
3320 | niro | 984 | /* man bash: |
3321 | * "In all cases, bash ignores SIGQUIT. Non-builtin | ||
3322 | * commands run by bash have signal handlers | ||
3323 | * set to the values inherited by the shell | ||
3324 | * from its parent". */ | ||
3325 | new_act = S_IGN; | ||
3326 | break; | ||
3327 | niro | 816 | case SIGTERM: |
3328 | if (iflag) | ||
3329 | niro | 984 | new_act = S_IGN; |
3330 | niro | 816 | break; |
3331 | #if JOBS | ||
3332 | case SIGTSTP: | ||
3333 | case SIGTTOU: | ||
3334 | if (mflag) | ||
3335 | niro | 984 | new_act = S_IGN; |
3336 | niro | 816 | break; |
3337 | #endif | ||
3338 | niro | 532 | } |
3339 | } | ||
3340 | niro | 984 | //TODO: if !rootshell, we reset SIGQUIT to DFL, |
3341 | //whereas we have to restore it to what shell got on entry | ||
3342 | //from the parent. See comment above | ||
3343 | niro | 532 | |
3344 | niro | 816 | t = &sigmode[signo - 1]; |
3345 | niro | 984 | cur_act = *t; |
3346 | if (cur_act == 0) { | ||
3347 | /* current setting is not yet known */ | ||
3348 | if (sigaction(signo, NULL, &act)) { | ||
3349 | /* pretend it worked; maybe we should give a warning, | ||
3350 | * but other shells don't. We don't alter sigmode, | ||
3351 | * so we retry every time. | ||
3352 | * btw, in Linux it never fails. --vda */ | ||
3353 | niro | 816 | return; |
3354 | niro | 532 | } |
3355 | niro | 816 | if (act.sa_handler == SIG_IGN) { |
3356 | niro | 984 | cur_act = S_HARD_IGN; |
3357 | niro | 816 | if (mflag |
3358 | && (signo == SIGTSTP || signo == SIGTTIN || signo == SIGTTOU) | ||
3359 | ) { | ||
3360 | niro | 984 | cur_act = S_IGN; /* don't hard ignore these */ |
3361 | niro | 816 | } |
3362 | } | ||
3363 | niro | 532 | } |
3364 | niro | 984 | if (cur_act == S_HARD_IGN || cur_act == new_act) |
3365 | niro | 816 | return; |
3366 | niro | 984 | |
3367 | niro | 816 | act.sa_handler = SIG_DFL; |
3368 | niro | 984 | switch (new_act) { |
3369 | niro | 816 | case S_CATCH: |
3370 | act.sa_handler = onsig; | ||
3371 | niro | 984 | act.sa_flags = 0; /* matters only if !DFL and !IGN */ |
3372 | sigfillset(&act.sa_mask); /* ditto */ | ||
3373 | niro | 816 | break; |
3374 | case S_IGN: | ||
3375 | act.sa_handler = SIG_IGN; | ||
3376 | break; | ||
3377 | niro | 532 | } |
3378 | niro | 816 | sigaction_set(signo, &act); |
3379 | niro | 984 | |
3380 | *t = new_act; | ||
3381 | niro | 532 | } |
3382 | |||
3383 | niro | 816 | /* mode flags for set_curjob */ |
3384 | #define CUR_DELETE 2 | ||
3385 | #define CUR_RUNNING 1 | ||
3386 | #define CUR_STOPPED 0 | ||
3387 | niro | 532 | |
3388 | niro | 816 | /* mode flags for dowait */ |
3389 | #define DOWAIT_NONBLOCK WNOHANG | ||
3390 | #define DOWAIT_BLOCK 0 | ||
3391 | niro | 532 | |
3392 | niro | 816 | #if JOBS |
3393 | /* pgrp of shell on invocation */ | ||
3394 | static int initialpgrp; //references:2 | ||
3395 | static int ttyfd = -1; //5 | ||
3396 | #endif | ||
3397 | /* array of jobs */ | ||
3398 | static struct job *jobtab; //5 | ||
3399 | /* size of array */ | ||
3400 | static unsigned njobs; //4 | ||
3401 | /* current job */ | ||
3402 | static struct job *curjob; //lots | ||
3403 | /* number of presumed living untracked jobs */ | ||
3404 | static int jobless; //4 | ||
3405 | |||
3406 | static void | ||
3407 | set_curjob(struct job *jp, unsigned mode) | ||
3408 | niro | 532 | { |
3409 | niro | 816 | struct job *jp1; |
3410 | struct job **jpp, **curp; | ||
3411 | niro | 532 | |
3412 | niro | 816 | /* first remove from list */ |
3413 | jpp = curp = &curjob; | ||
3414 | do { | ||
3415 | jp1 = *jpp; | ||
3416 | if (jp1 == jp) | ||
3417 | break; | ||
3418 | jpp = &jp1->prev_job; | ||
3419 | } while (1); | ||
3420 | *jpp = jp1->prev_job; | ||
3421 | |||
3422 | /* Then re-insert in correct position */ | ||
3423 | jpp = curp; | ||
3424 | switch (mode) { | ||
3425 | default: | ||
3426 | #if DEBUG | ||
3427 | abort(); | ||
3428 | #endif | ||
3429 | case CUR_DELETE: | ||
3430 | /* job being deleted */ | ||
3431 | break; | ||
3432 | case CUR_RUNNING: | ||
3433 | /* newly created job or backgrounded job, | ||
3434 | put after all stopped jobs. */ | ||
3435 | do { | ||
3436 | jp1 = *jpp; | ||
3437 | #if JOBS | ||
3438 | if (!jp1 || jp1->state != JOBSTOPPED) | ||
3439 | #endif | ||
3440 | niro | 532 | break; |
3441 | niro | 816 | jpp = &jp1->prev_job; |
3442 | } while (1); | ||
3443 | /* FALLTHROUGH */ | ||
3444 | #if JOBS | ||
3445 | case CUR_STOPPED: | ||
3446 | #endif | ||
3447 | /* newly stopped job - becomes curjob */ | ||
3448 | jp->prev_job = *jpp; | ||
3449 | *jpp = jp; | ||
3450 | break; | ||
3451 | niro | 532 | } |
3452 | } | ||
3453 | |||
3454 | niro | 816 | #if JOBS || DEBUG |
3455 | niro | 532 | static int |
3456 | niro | 816 | jobno(const struct job *jp) |
3457 | niro | 532 | { |
3458 | niro | 816 | return jp - jobtab + 1; |
3459 | niro | 532 | } |
3460 | niro | 816 | #endif |
3461 | niro | 532 | |
3462 | /* | ||
3463 | niro | 816 | * Convert a job name to a job structure. |
3464 | niro | 532 | */ |
3465 | niro | 816 | #if !JOBS |
3466 | #define getjob(name, getctl) getjob(name) | ||
3467 | #endif | ||
3468 | static struct job * | ||
3469 | getjob(const char *name, int getctl) | ||
3470 | niro | 532 | { |
3471 | niro | 816 | struct job *jp; |
3472 | struct job *found; | ||
3473 | niro | 984 | const char *err_msg = "%s: no such job"; |
3474 | niro | 816 | unsigned num; |
3475 | int c; | ||
3476 | const char *p; | ||
3477 | char *(*match)(const char *, const char *); | ||
3478 | niro | 532 | |
3479 | niro | 816 | jp = curjob; |
3480 | p = name; | ||
3481 | if (!p) | ||
3482 | goto currentjob; | ||
3483 | niro | 532 | |
3484 | niro | 816 | if (*p != '%') |
3485 | goto err; | ||
3486 | niro | 532 | |
3487 | niro | 816 | c = *++p; |
3488 | if (!c) | ||
3489 | goto currentjob; | ||
3490 | niro | 532 | |
3491 | niro | 816 | if (!p[1]) { |
3492 | if (c == '+' || c == '%') { | ||
3493 | currentjob: | ||
3494 | err_msg = "No current job"; | ||
3495 | goto check; | ||
3496 | } | ||
3497 | if (c == '-') { | ||
3498 | if (jp) | ||
3499 | jp = jp->prev_job; | ||
3500 | err_msg = "No previous job"; | ||
3501 | check: | ||
3502 | if (!jp) | ||
3503 | goto err; | ||
3504 | goto gotit; | ||
3505 | } | ||
3506 | } | ||
3507 | niro | 532 | |
3508 | niro | 816 | if (is_number(p)) { |
3509 | num = atoi(p); | ||
3510 | if (num < njobs) { | ||
3511 | jp = jobtab + num - 1; | ||
3512 | if (jp->used) | ||
3513 | goto gotit; | ||
3514 | goto err; | ||
3515 | } | ||
3516 | niro | 532 | } |
3517 | niro | 816 | |
3518 | match = prefix; | ||
3519 | if (*p == '?') { | ||
3520 | match = strstr; | ||
3521 | p++; | ||
3522 | niro | 532 | } |
3523 | niro | 816 | |
3524 | niro | 984 | found = NULL; |
3525 | while (jp) { | ||
3526 | if (match(jp->ps[0].ps_cmd, p)) { | ||
3527 | niro | 816 | if (found) |
3528 | goto err; | ||
3529 | found = jp; | ||
3530 | err_msg = "%s: ambiguous"; | ||
3531 | } | ||
3532 | jp = jp->prev_job; | ||
3533 | niro | 532 | } |
3534 | niro | 984 | if (!found) |
3535 | goto err; | ||
3536 | jp = found; | ||
3537 | niro | 532 | |
3538 | niro | 816 | gotit: |
3539 | #if JOBS | ||
3540 | err_msg = "job %s not created under job control"; | ||
3541 | if (getctl && jp->jobctl == 0) | ||
3542 | goto err; | ||
3543 | niro | 532 | #endif |
3544 | niro | 816 | return jp; |
3545 | err: | ||
3546 | ash_msg_and_raise_error(err_msg, name); | ||
3547 | niro | 532 | } |
3548 | |||
3549 | /* | ||
3550 | niro | 816 | * Mark a job structure as unused. |
3551 | niro | 532 | */ |
3552 | static void | ||
3553 | niro | 816 | freejob(struct job *jp) |
3554 | { | ||
3555 | struct procstat *ps; | ||
3556 | niro | 532 | int i; |
3557 | |||
3558 | niro | 816 | INT_OFF; |
3559 | for (i = jp->nprocs, ps = jp->ps; --i >= 0; ps++) { | ||
3560 | niro | 984 | if (ps->ps_cmd != nullstr) |
3561 | free(ps->ps_cmd); | ||
3562 | niro | 532 | } |
3563 | niro | 816 | if (jp->ps != &jp->ps0) |
3564 | free(jp->ps); | ||
3565 | jp->used = 0; | ||
3566 | set_curjob(jp, CUR_DELETE); | ||
3567 | INT_ON; | ||
3568 | niro | 532 | } |
3569 | |||
3570 | niro | 816 | #if JOBS |
3571 | niro | 532 | static void |
3572 | niro | 816 | xtcsetpgrp(int fd, pid_t pgrp) |
3573 | niro | 532 | { |
3574 | niro | 816 | if (tcsetpgrp(fd, pgrp)) |
3575 | ash_msg_and_raise_error("can't set tty process group (%m)"); | ||
3576 | niro | 532 | } |
3577 | |||
3578 | /* | ||
3579 | niro | 816 | * Turn job control on and off. |
3580 | * | ||
3581 | * Note: This code assumes that the third arg to ioctl is a character | ||
3582 | * pointer, which is true on Berkeley systems but not System V. Since | ||
3583 | * System V doesn't have job control yet, this isn't a problem now. | ||
3584 | * | ||
3585 | * Called with interrupts off. | ||
3586 | niro | 532 | */ |
3587 | static void | ||
3588 | niro | 816 | setjobctl(int on) |
3589 | niro | 532 | { |
3590 | niro | 816 | int fd; |
3591 | int pgrp; | ||
3592 | niro | 532 | |
3593 | niro | 816 | if (on == doing_jobctl || rootshell == 0) |
3594 | return; | ||
3595 | if (on) { | ||
3596 | int ofd; | ||
3597 | ofd = fd = open(_PATH_TTY, O_RDWR); | ||
3598 | if (fd < 0) { | ||
3599 | /* BTW, bash will try to open(ttyname(0)) if open("/dev/tty") fails. | ||
3600 | * That sometimes helps to acquire controlling tty. | ||
3601 | * Obviously, a workaround for bugs when someone | ||
3602 | * failed to provide a controlling tty to bash! :) */ | ||
3603 | fd = 2; | ||
3604 | while (!isatty(fd)) | ||
3605 | if (--fd < 0) | ||
3606 | goto out; | ||
3607 | } | ||
3608 | fd = fcntl(fd, F_DUPFD, 10); | ||
3609 | if (ofd >= 0) | ||
3610 | close(ofd); | ||
3611 | if (fd < 0) | ||
3612 | goto out; | ||
3613 | /* fd is a tty at this point */ | ||
3614 | close_on_exec_on(fd); | ||
3615 | do { /* while we are in the background */ | ||
3616 | pgrp = tcgetpgrp(fd); | ||
3617 | if (pgrp < 0) { | ||
3618 | out: | ||
3619 | ash_msg("can't access tty; job control turned off"); | ||
3620 | mflag = on = 0; | ||
3621 | goto close; | ||
3622 | } | ||
3623 | if (pgrp == getpgrp()) | ||
3624 | break; | ||
3625 | killpg(0, SIGTTIN); | ||
3626 | } while (1); | ||
3627 | initialpgrp = pgrp; | ||
3628 | |||
3629 | setsignal(SIGTSTP); | ||
3630 | setsignal(SIGTTOU); | ||
3631 | setsignal(SIGTTIN); | ||
3632 | pgrp = rootpid; | ||
3633 | setpgid(0, pgrp); | ||
3634 | xtcsetpgrp(fd, pgrp); | ||
3635 | } else { | ||
3636 | /* turning job control off */ | ||
3637 | fd = ttyfd; | ||
3638 | pgrp = initialpgrp; | ||
3639 | /* was xtcsetpgrp, but this can make exiting ash | ||
3640 | * loop forever if pty is already deleted */ | ||
3641 | tcsetpgrp(fd, pgrp); | ||
3642 | setpgid(0, pgrp); | ||
3643 | setsignal(SIGTSTP); | ||
3644 | setsignal(SIGTTOU); | ||
3645 | setsignal(SIGTTIN); | ||
3646 | close: | ||
3647 | if (fd >= 0) | ||
3648 | close(fd); | ||
3649 | fd = -1; | ||
3650 | } | ||
3651 | ttyfd = fd; | ||
3652 | doing_jobctl = on; | ||
3653 | niro | 532 | } |
3654 | |||
3655 | niro | 984 | static int FAST_FUNC |
3656 | niro | 816 | killcmd(int argc, char **argv) |
3657 | { | ||
3658 | int i = 1; | ||
3659 | if (argv[1] && strcmp(argv[1], "-l") != 0) { | ||
3660 | do { | ||
3661 | if (argv[i][0] == '%') { | ||
3662 | struct job *jp = getjob(argv[i], 0); | ||
3663 | niro | 984 | unsigned pid = jp->ps[0].ps_pid; |
3664 | niro | 816 | /* Enough space for ' -NNN<nul>' */ |
3665 | argv[i] = alloca(sizeof(int)*3 + 3); | ||
3666 | /* kill_main has matching code to expect | ||
3667 | * leading space. Needed to not confuse | ||
3668 | * negative pids with "kill -SIGNAL_NO" syntax */ | ||
3669 | sprintf(argv[i], " -%u", pid); | ||
3670 | } | ||
3671 | } while (argv[++i]); | ||
3672 | } | ||
3673 | return kill_main(argc, argv); | ||
3674 | } | ||
3675 | niro | 532 | |
3676 | static void | ||
3677 | niro | 984 | showpipe(struct job *jp /*, FILE *out*/) |
3678 | niro | 532 | { |
3679 | niro | 984 | struct procstat *ps; |
3680 | struct procstat *psend; | ||
3681 | niro | 532 | |
3682 | niro | 984 | psend = jp->ps + jp->nprocs; |
3683 | for (ps = jp->ps + 1; ps < psend; ps++) | ||
3684 | printf(" | %s", ps->ps_cmd); | ||
3685 | outcslow('\n', stdout); | ||
3686 | niro | 816 | flush_stdout_stderr(); |
3687 | niro | 532 | } |
3688 | |||
3689 | |||
3690 | niro | 816 | static int |
3691 | restartjob(struct job *jp, int mode) | ||
3692 | niro | 532 | { |
3693 | niro | 816 | struct procstat *ps; |
3694 | int i; | ||
3695 | int status; | ||
3696 | pid_t pgid; | ||
3697 | niro | 532 | |
3698 | niro | 816 | INT_OFF; |
3699 | if (jp->state == JOBDONE) | ||
3700 | goto out; | ||
3701 | jp->state = JOBRUNNING; | ||
3702 | niro | 984 | pgid = jp->ps[0].ps_pid; |
3703 | niro | 816 | if (mode == FORK_FG) |
3704 | xtcsetpgrp(ttyfd, pgid); | ||
3705 | killpg(pgid, SIGCONT); | ||
3706 | ps = jp->ps; | ||
3707 | i = jp->nprocs; | ||
3708 | do { | ||
3709 | niro | 984 | if (WIFSTOPPED(ps->ps_status)) { |
3710 | ps->ps_status = -1; | ||
3711 | niro | 816 | } |
3712 | ps++; | ||
3713 | } while (--i); | ||
3714 | out: | ||
3715 | status = (mode == FORK_FG) ? waitforjob(jp) : 0; | ||
3716 | INT_ON; | ||
3717 | return status; | ||
3718 | niro | 532 | } |
3719 | |||
3720 | niro | 984 | static int FAST_FUNC |
3721 | niro | 816 | fg_bgcmd(int argc UNUSED_PARAM, char **argv) |
3722 | niro | 532 | { |
3723 | niro | 816 | struct job *jp; |
3724 | int mode; | ||
3725 | int retval; | ||
3726 | niro | 532 | |
3727 | niro | 816 | mode = (**argv == 'f') ? FORK_FG : FORK_BG; |
3728 | nextopt(nullstr); | ||
3729 | argv = argptr; | ||
3730 | do { | ||
3731 | jp = getjob(*argv, 1); | ||
3732 | if (mode == FORK_BG) { | ||
3733 | set_curjob(jp, CUR_RUNNING); | ||
3734 | niro | 984 | printf("[%d] ", jobno(jp)); |
3735 | niro | 816 | } |
3736 | niro | 984 | out1str(jp->ps[0].ps_cmd); |
3737 | showpipe(jp /*, stdout*/); | ||
3738 | niro | 816 | retval = restartjob(jp, mode); |
3739 | } while (*argv && *++argv); | ||
3740 | return retval; | ||
3741 | niro | 532 | } |
3742 | niro | 816 | #endif |
3743 | niro | 532 | |
3744 | niro | 816 | static int |
3745 | sprint_status(char *s, int status, int sigonly) | ||
3746 | niro | 532 | { |
3747 | niro | 816 | int col; |
3748 | int st; | ||
3749 | niro | 532 | |
3750 | niro | 816 | col = 0; |
3751 | if (!WIFEXITED(status)) { | ||
3752 | #if JOBS | ||
3753 | if (WIFSTOPPED(status)) | ||
3754 | st = WSTOPSIG(status); | ||
3755 | else | ||
3756 | #endif | ||
3757 | st = WTERMSIG(status); | ||
3758 | if (sigonly) { | ||
3759 | if (st == SIGINT || st == SIGPIPE) | ||
3760 | goto out; | ||
3761 | #if JOBS | ||
3762 | if (WIFSTOPPED(status)) | ||
3763 | goto out; | ||
3764 | #endif | ||
3765 | } | ||
3766 | st &= 0x7f; | ||
3767 | col = fmtstr(s, 32, strsignal(st)); | ||
3768 | if (WCOREDUMP(status)) { | ||
3769 | col += fmtstr(s + col, 16, " (core dumped)"); | ||
3770 | } | ||
3771 | } else if (!sigonly) { | ||
3772 | st = WEXITSTATUS(status); | ||
3773 | if (st) | ||
3774 | col = fmtstr(s, 16, "Done(%d)", st); | ||
3775 | else | ||
3776 | col = fmtstr(s, 16, "Done"); | ||
3777 | niro | 532 | } |
3778 | niro | 816 | out: |
3779 | return col; | ||
3780 | niro | 532 | } |
3781 | |||
3782 | niro | 816 | static int |
3783 | dowait(int wait_flags, struct job *job) | ||
3784 | { | ||
3785 | int pid; | ||
3786 | int status; | ||
3787 | struct job *jp; | ||
3788 | struct job *thisjob; | ||
3789 | int state; | ||
3790 | niro | 532 | |
3791 | niro | 816 | TRACE(("dowait(0x%x) called\n", wait_flags)); |
3792 | niro | 532 | |
3793 | niro | 816 | /* Do a wait system call. If job control is compiled in, we accept |
3794 | * stopped processes. wait_flags may have WNOHANG, preventing blocking. | ||
3795 | * NB: _not_ safe_waitpid, we need to detect EINTR */ | ||
3796 | niro | 984 | if (doing_jobctl) |
3797 | wait_flags |= WUNTRACED; | ||
3798 | pid = waitpid(-1, &status, wait_flags); | ||
3799 | TRACE(("wait returns pid=%d, status=0x%x, errno=%d(%s)\n", | ||
3800 | pid, status, errno, strerror(errno))); | ||
3801 | if (pid <= 0) | ||
3802 | return pid; | ||
3803 | niro | 532 | |
3804 | niro | 816 | INT_OFF; |
3805 | thisjob = NULL; | ||
3806 | for (jp = curjob; jp; jp = jp->prev_job) { | ||
3807 | niro | 984 | struct procstat *ps; |
3808 | struct procstat *psend; | ||
3809 | niro | 816 | if (jp->state == JOBDONE) |
3810 | continue; | ||
3811 | state = JOBDONE; | ||
3812 | niro | 984 | ps = jp->ps; |
3813 | psend = ps + jp->nprocs; | ||
3814 | niro | 816 | do { |
3815 | niro | 984 | if (ps->ps_pid == pid) { |
3816 | niro | 816 | TRACE(("Job %d: changing status of proc %d " |
3817 | "from 0x%x to 0x%x\n", | ||
3818 | niro | 984 | jobno(jp), pid, ps->ps_status, status)); |
3819 | ps->ps_status = status; | ||
3820 | niro | 816 | thisjob = jp; |
3821 | } | ||
3822 | niro | 984 | if (ps->ps_status == -1) |
3823 | niro | 816 | state = JOBRUNNING; |
3824 | #if JOBS | ||
3825 | if (state == JOBRUNNING) | ||
3826 | continue; | ||
3827 | niro | 984 | if (WIFSTOPPED(ps->ps_status)) { |
3828 | jp->stopstatus = ps->ps_status; | ||
3829 | niro | 816 | state = JOBSTOPPED; |
3830 | } | ||
3831 | #endif | ||
3832 | niro | 984 | } while (++ps < psend); |
3833 | niro | 816 | if (thisjob) |
3834 | goto gotjob; | ||
3835 | } | ||
3836 | #if JOBS | ||
3837 | if (!WIFSTOPPED(status)) | ||
3838 | #endif | ||
3839 | jobless--; | ||
3840 | goto out; | ||
3841 | niro | 532 | |
3842 | niro | 816 | gotjob: |
3843 | if (state != JOBRUNNING) { | ||
3844 | thisjob->changed = 1; | ||
3845 | niro | 532 | |
3846 | niro | 816 | if (thisjob->state != state) { |
3847 | TRACE(("Job %d: changing state from %d to %d\n", | ||
3848 | jobno(thisjob), thisjob->state, state)); | ||
3849 | thisjob->state = state; | ||
3850 | #if JOBS | ||
3851 | if (state == JOBSTOPPED) { | ||
3852 | set_curjob(thisjob, CUR_STOPPED); | ||
3853 | } | ||
3854 | #endif | ||
3855 | } | ||
3856 | } | ||
3857 | niro | 532 | |
3858 | niro | 816 | out: |
3859 | INT_ON; | ||
3860 | niro | 532 | |
3861 | niro | 816 | if (thisjob && thisjob == job) { |
3862 | char s[48 + 1]; | ||
3863 | int len; | ||
3864 | niro | 532 | |
3865 | niro | 816 | len = sprint_status(s, status, 1); |
3866 | if (len) { | ||
3867 | s[len] = '\n'; | ||
3868 | s[len + 1] = '\0'; | ||
3869 | out2str(s); | ||
3870 | niro | 532 | } |
3871 | } | ||
3872 | niro | 816 | return pid; |
3873 | niro | 532 | } |
3874 | |||
3875 | niro | 984 | static int |
3876 | blocking_wait_with_raise_on_sig(struct job *job) | ||
3877 | { | ||
3878 | pid_t pid = dowait(DOWAIT_BLOCK, job); | ||
3879 | if (pid <= 0 && pending_sig) | ||
3880 | raise_exception(EXSIG); | ||
3881 | return pid; | ||
3882 | } | ||
3883 | |||
3884 | niro | 816 | #if JOBS |
3885 | static void | ||
3886 | showjob(FILE *out, struct job *jp, int mode) | ||
3887 | niro | 532 | { |
3888 | niro | 816 | struct procstat *ps; |
3889 | struct procstat *psend; | ||
3890 | int col; | ||
3891 | int indent_col; | ||
3892 | char s[80]; | ||
3893 | niro | 532 | |
3894 | niro | 816 | ps = jp->ps; |
3895 | niro | 532 | |
3896 | niro | 984 | if (mode & SHOW_ONLY_PGID) { /* jobs -p */ |
3897 | niro | 816 | /* just output process (group) id of pipeline */ |
3898 | niro | 984 | fprintf(out, "%d\n", ps->ps_pid); |
3899 | niro | 816 | return; |
3900 | niro | 532 | } |
3901 | |||
3902 | niro | 816 | col = fmtstr(s, 16, "[%d] ", jobno(jp)); |
3903 | indent_col = col; | ||
3904 | niro | 532 | |
3905 | niro | 816 | if (jp == curjob) |
3906 | niro | 984 | s[col - 3] = '+'; |
3907 | niro | 816 | else if (curjob && jp == curjob->prev_job) |
3908 | niro | 984 | s[col - 3] = '-'; |
3909 | niro | 532 | |
3910 | niro | 984 | if (mode & SHOW_PIDS) |
3911 | col += fmtstr(s + col, 16, "%d ", ps->ps_pid); | ||
3912 | niro | 532 | |
3913 | niro | 816 | psend = ps + jp->nprocs; |
3914 | niro | 532 | |
3915 | niro | 816 | if (jp->state == JOBRUNNING) { |
3916 | strcpy(s + col, "Running"); | ||
3917 | col += sizeof("Running") - 1; | ||
3918 | } else { | ||
3919 | niro | 984 | int status = psend[-1].ps_status; |
3920 | niro | 816 | if (jp->state == JOBSTOPPED) |
3921 | status = jp->stopstatus; | ||
3922 | col += sprint_status(s + col, status, 0); | ||
3923 | niro | 532 | } |
3924 | niro | 984 | /* By now, "[JOBID]* [maybe PID] STATUS" is printed */ |
3925 | niro | 816 | |
3926 | niro | 984 | /* This loop either prints "<cmd1> | <cmd2> | <cmd3>" line |
3927 | * or prints several "PID | <cmdN>" lines, | ||
3928 | * depending on SHOW_PIDS bit. | ||
3929 | * We do not print status of individual processes | ||
3930 | * between PID and <cmdN>. bash does it, but not very well: | ||
3931 | * first line shows overall job status, not process status, | ||
3932 | * making it impossible to know 1st process status. | ||
3933 | */ | ||
3934 | niro | 816 | goto start; |
3935 | do { | ||
3936 | /* for each process */ | ||
3937 | niro | 984 | s[0] = '\0'; |
3938 | col = 33; | ||
3939 | if (mode & SHOW_PIDS) | ||
3940 | col = fmtstr(s, 48, "\n%*c%d ", indent_col, ' ', ps->ps_pid) - 1; | ||
3941 | niro | 816 | start: |
3942 | niro | 984 | fprintf(out, "%s%*c%s%s", |
3943 | s, | ||
3944 | 33 - col >= 0 ? 33 - col : 0, ' ', | ||
3945 | ps == jp->ps ? "" : "| ", | ||
3946 | ps->ps_cmd | ||
3947 | niro | 532 | ); |
3948 | niro | 984 | } while (++ps != psend); |
3949 | outcslow('\n', out); | ||
3950 | niro | 532 | |
3951 | niro | 816 | jp->changed = 0; |
3952 | |||
3953 | if (jp->state == JOBDONE) { | ||
3954 | TRACE(("showjob: freeing job %d\n", jobno(jp))); | ||
3955 | freejob(jp); | ||
3956 | niro | 532 | } |
3957 | } | ||
3958 | |||
3959 | niro | 816 | /* |
3960 | * Print a list of jobs. If "change" is nonzero, only print jobs whose | ||
3961 | * statuses have changed since the last call to showjobs. | ||
3962 | */ | ||
3963 | niro | 532 | static void |
3964 | niro | 816 | showjobs(FILE *out, int mode) |
3965 | niro | 532 | { |
3966 | niro | 816 | struct job *jp; |
3967 | niro | 532 | |
3968 | niro | 984 | TRACE(("showjobs(0x%x) called\n", mode)); |
3969 | niro | 532 | |
3970 | niro | 984 | /* Handle all finished jobs */ |
3971 | niro | 816 | while (dowait(DOWAIT_NONBLOCK, NULL) > 0) |
3972 | continue; | ||
3973 | |||
3974 | for (jp = curjob; jp; jp = jp->prev_job) { | ||
3975 | if (!(mode & SHOW_CHANGED) || jp->changed) { | ||
3976 | showjob(out, jp, mode); | ||
3977 | niro | 532 | } |
3978 | } | ||
3979 | } | ||
3980 | |||
3981 | niro | 984 | static int FAST_FUNC |
3982 | niro | 816 | jobscmd(int argc UNUSED_PARAM, char **argv) |
3983 | { | ||
3984 | int mode, m; | ||
3985 | niro | 532 | |
3986 | niro | 816 | mode = 0; |
3987 | niro | 984 | while ((m = nextopt("lp")) != '\0') { |
3988 | niro | 816 | if (m == 'l') |
3989 | niro | 984 | mode |= SHOW_PIDS; |
3990 | niro | 816 | else |
3991 | niro | 984 | mode |= SHOW_ONLY_PGID; |
3992 | niro | 816 | } |
3993 | niro | 532 | |
3994 | niro | 816 | argv = argptr; |
3995 | if (*argv) { | ||
3996 | do | ||
3997 | niro | 984 | showjob(stdout, getjob(*argv, 0), mode); |
3998 | niro | 816 | while (*++argv); |
3999 | niro | 984 | } else { |
4000 | niro | 816 | showjobs(stdout, mode); |
4001 | niro | 984 | } |
4002 | niro | 816 | |
4003 | return 0; | ||
4004 | } | ||
4005 | #endif /* JOBS */ | ||
4006 | |||
4007 | niro | 984 | /* Called only on finished or stopped jobs (no members are running) */ |
4008 | niro | 816 | static int |
4009 | getstatus(struct job *job) | ||
4010 | niro | 532 | { |
4011 | niro | 816 | int status; |
4012 | int retval; | ||
4013 | niro | 984 | struct procstat *ps; |
4014 | niro | 532 | |
4015 | niro | 984 | /* Fetch last member's status */ |
4016 | ps = job->ps + job->nprocs - 1; | ||
4017 | status = ps->ps_status; | ||
4018 | if (pipefail) { | ||
4019 | /* "set -o pipefail" mode: use last _nonzero_ status */ | ||
4020 | while (status == 0 && --ps >= job->ps) | ||
4021 | status = ps->ps_status; | ||
4022 | } | ||
4023 | |||
4024 | niro | 816 | retval = WEXITSTATUS(status); |
4025 | if (!WIFEXITED(status)) { | ||
4026 | #if JOBS | ||
4027 | retval = WSTOPSIG(status); | ||
4028 | if (!WIFSTOPPED(status)) | ||
4029 | #endif | ||
4030 | { | ||
4031 | /* XXX: limits number of signals */ | ||
4032 | retval = WTERMSIG(status); | ||
4033 | #if JOBS | ||
4034 | if (retval == SIGINT) | ||
4035 | job->sigint = 1; | ||
4036 | #endif | ||
4037 | niro | 532 | } |
4038 | niro | 816 | retval += 128; |
4039 | niro | 532 | } |
4040 | niro | 984 | TRACE(("getstatus: job %d, nproc %d, status 0x%x, retval 0x%x\n", |
4041 | niro | 816 | jobno(job), job->nprocs, status, retval)); |
4042 | return retval; | ||
4043 | niro | 532 | } |
4044 | |||
4045 | niro | 984 | static int FAST_FUNC |
4046 | niro | 816 | waitcmd(int argc UNUSED_PARAM, char **argv) |
4047 | { | ||
4048 | struct job *job; | ||
4049 | int retval; | ||
4050 | struct job *jp; | ||
4051 | niro | 532 | |
4052 | niro | 984 | if (pending_sig) |
4053 | niro | 816 | raise_exception(EXSIG); |
4054 | niro | 532 | |
4055 | niro | 816 | nextopt(nullstr); |
4056 | retval = 0; | ||
4057 | niro | 532 | |
4058 | niro | 816 | argv = argptr; |
4059 | if (!*argv) { | ||
4060 | /* wait for all jobs */ | ||
4061 | for (;;) { | ||
4062 | jp = curjob; | ||
4063 | while (1) { | ||
4064 | if (!jp) /* no running procs */ | ||
4065 | goto ret; | ||
4066 | if (jp->state == JOBRUNNING) | ||
4067 | break; | ||
4068 | jp->waited = 1; | ||
4069 | jp = jp->prev_job; | ||
4070 | niro | 532 | } |
4071 | niro | 984 | /* man bash: |
4072 | * "When bash is waiting for an asynchronous command via | ||
4073 | * the wait builtin, the reception of a signal for which a trap | ||
4074 | * has been set will cause the wait builtin to return immediately | ||
4075 | * with an exit status greater than 128, immediately after which | ||
4076 | * the trap is executed." | ||
4077 | * Do we do it that way? */ | ||
4078 | blocking_wait_with_raise_on_sig(NULL); | ||
4079 | niro | 532 | } |
4080 | } | ||
4081 | niro | 816 | |
4082 | retval = 127; | ||
4083 | do { | ||
4084 | if (**argv != '%') { | ||
4085 | pid_t pid = number(*argv); | ||
4086 | job = curjob; | ||
4087 | while (1) { | ||
4088 | if (!job) | ||
4089 | goto repeat; | ||
4090 | niro | 984 | if (job->ps[job->nprocs - 1].ps_pid == pid) |
4091 | niro | 816 | break; |
4092 | job = job->prev_job; | ||
4093 | } | ||
4094 | } else | ||
4095 | job = getjob(*argv, 0); | ||
4096 | /* loop until process terminated or stopped */ | ||
4097 | while (job->state == JOBRUNNING) | ||
4098 | niro | 984 | blocking_wait_with_raise_on_sig(NULL); |
4099 | niro | 816 | job->waited = 1; |
4100 | retval = getstatus(job); | ||
4101 | niro | 984 | repeat: ; |
4102 | niro | 816 | } while (*++argv); |
4103 | |||
4104 | ret: | ||
4105 | return retval; | ||
4106 | niro | 532 | } |
4107 | |||
4108 | niro | 816 | static struct job * |
4109 | growjobtab(void) | ||
4110 | { | ||
4111 | size_t len; | ||
4112 | ptrdiff_t offset; | ||
4113 | struct job *jp, *jq; | ||
4114 | niro | 532 | |
4115 | niro | 816 | len = njobs * sizeof(*jp); |
4116 | jq = jobtab; | ||
4117 | jp = ckrealloc(jq, len + 4 * sizeof(*jp)); | ||
4118 | niro | 532 | |
4119 | niro | 816 | offset = (char *)jp - (char *)jq; |
4120 | if (offset) { | ||
4121 | /* Relocate pointers */ | ||
4122 | size_t l = len; | ||
4123 | niro | 532 | |
4124 | niro | 816 | jq = (struct job *)((char *)jq + l); |
4125 | while (l) { | ||
4126 | l -= sizeof(*jp); | ||
4127 | jq--; | ||
4128 | #define joff(p) ((struct job *)((char *)(p) + l)) | ||
4129 | #define jmove(p) (p) = (void *)((char *)(p) + offset) | ||
4130 | if (joff(jp)->ps == &jq->ps0) | ||
4131 | jmove(joff(jp)->ps); | ||
4132 | if (joff(jp)->prev_job) | ||
4133 | jmove(joff(jp)->prev_job); | ||
4134 | } | ||
4135 | if (curjob) | ||
4136 | jmove(curjob); | ||
4137 | #undef joff | ||
4138 | #undef jmove | ||
4139 | } | ||
4140 | niro | 532 | |
4141 | niro | 816 | njobs += 4; |
4142 | jobtab = jp; | ||
4143 | jp = (struct job *)((char *)jp + len); | ||
4144 | jq = jp + 3; | ||
4145 | do { | ||
4146 | jq->used = 0; | ||
4147 | } while (--jq >= jp); | ||
4148 | return jp; | ||
4149 | niro | 532 | } |
4150 | |||
4151 | /* | ||
4152 | niro | 816 | * Return a new job structure. |
4153 | * Called with interrupts off. | ||
4154 | niro | 532 | */ |
4155 | niro | 816 | static struct job * |
4156 | makejob(/*union node *node,*/ int nprocs) | ||
4157 | niro | 532 | { |
4158 | niro | 816 | int i; |
4159 | struct job *jp; | ||
4160 | niro | 532 | |
4161 | niro | 816 | for (i = njobs, jp = jobtab; ; jp++) { |
4162 | if (--i < 0) { | ||
4163 | jp = growjobtab(); | ||
4164 | niro | 532 | break; |
4165 | niro | 816 | } |
4166 | if (jp->used == 0) | ||
4167 | niro | 532 | break; |
4168 | niro | 816 | if (jp->state != JOBDONE || !jp->waited) |
4169 | continue; | ||
4170 | #if JOBS | ||
4171 | if (doing_jobctl) | ||
4172 | continue; | ||
4173 | #endif | ||
4174 | freejob(jp); | ||
4175 | break; | ||
4176 | niro | 532 | } |
4177 | niro | 816 | memset(jp, 0, sizeof(*jp)); |
4178 | #if JOBS | ||
4179 | /* jp->jobctl is a bitfield. | ||
4180 | * "jp->jobctl |= jobctl" likely to give awful code */ | ||
4181 | if (doing_jobctl) | ||
4182 | jp->jobctl = 1; | ||
4183 | #endif | ||
4184 | jp->prev_job = curjob; | ||
4185 | curjob = jp; | ||
4186 | jp->used = 1; | ||
4187 | jp->ps = &jp->ps0; | ||
4188 | if (nprocs > 1) { | ||
4189 | jp->ps = ckmalloc(nprocs * sizeof(struct procstat)); | ||
4190 | } | ||
4191 | TRACE(("makejob(%d) returns %%%d\n", nprocs, | ||
4192 | jobno(jp))); | ||
4193 | return jp; | ||
4194 | niro | 532 | } |
4195 | |||
4196 | niro | 816 | #if JOBS |
4197 | niro | 532 | /* |
4198 | niro | 816 | * Return a string identifying a command (to be printed by the |
4199 | * jobs command). | ||
4200 | niro | 532 | */ |
4201 | niro | 816 | static char *cmdnextc; |
4202 | niro | 532 | |
4203 | static void | ||
4204 | niro | 816 | cmdputs(const char *s) |
4205 | niro | 532 | { |
4206 | niro | 816 | static const char vstype[VSTYPE + 1][3] = { |
4207 | "", "}", "-", "+", "?", "=", | ||
4208 | "%", "%%", "#", "##" | ||
4209 | niro | 984 | IF_ASH_BASH_COMPAT(, ":", "/", "//") |
4210 | niro | 816 | }; |
4211 | niro | 532 | |
4212 | niro | 816 | const char *p, *str; |
4213 | niro | 984 | char cc[2]; |
4214 | niro | 816 | char *nextc; |
4215 | niro | 984 | unsigned char c; |
4216 | unsigned char subtype = 0; | ||
4217 | niro | 816 | int quoted = 0; |
4218 | |||
4219 | niro | 984 | cc[1] = '\0'; |
4220 | niro | 816 | nextc = makestrspace((strlen(s) + 1) * 8, cmdnextc); |
4221 | p = s; | ||
4222 | niro | 984 | while ((c = *p++) != '\0') { |
4223 | niro | 816 | str = NULL; |
4224 | switch (c) { | ||
4225 | case CTLESC: | ||
4226 | c = *p++; | ||
4227 | break; | ||
4228 | case CTLVAR: | ||
4229 | subtype = *p++; | ||
4230 | if ((subtype & VSTYPE) == VSLENGTH) | ||
4231 | str = "${#"; | ||
4232 | else | ||
4233 | str = "${"; | ||
4234 | if (!(subtype & VSQUOTE) == !(quoted & 1)) | ||
4235 | goto dostr; | ||
4236 | quoted ^= 1; | ||
4237 | c = '"'; | ||
4238 | break; | ||
4239 | case CTLENDVAR: | ||
4240 | str = "\"}" + !(quoted & 1); | ||
4241 | quoted >>= 1; | ||
4242 | subtype = 0; | ||
4243 | goto dostr; | ||
4244 | case CTLBACKQ: | ||
4245 | str = "$(...)"; | ||
4246 | goto dostr; | ||
4247 | case CTLBACKQ+CTLQUOTE: | ||
4248 | str = "\"$(...)\""; | ||
4249 | goto dostr; | ||
4250 | niro | 984 | #if ENABLE_SH_MATH_SUPPORT |
4251 | niro | 816 | case CTLARI: |
4252 | str = "$(("; | ||
4253 | goto dostr; | ||
4254 | case CTLENDARI: | ||
4255 | str = "))"; | ||
4256 | goto dostr; | ||
4257 | #endif | ||
4258 | case CTLQUOTEMARK: | ||
4259 | quoted ^= 1; | ||
4260 | c = '"'; | ||
4261 | break; | ||
4262 | case '=': | ||
4263 | if (subtype == 0) | ||
4264 | break; | ||
4265 | if ((subtype & VSTYPE) != VSNORMAL) | ||
4266 | quoted <<= 1; | ||
4267 | str = vstype[subtype & VSTYPE]; | ||
4268 | if (subtype & VSNUL) | ||
4269 | c = ':'; | ||
4270 | else | ||
4271 | goto checkstr; | ||
4272 | break; | ||
4273 | case '\'': | ||
4274 | case '\\': | ||
4275 | case '"': | ||
4276 | case '$': | ||
4277 | /* These can only happen inside quotes */ | ||
4278 | cc[0] = c; | ||
4279 | str = cc; | ||
4280 | c = '\\'; | ||
4281 | break; | ||
4282 | default: | ||
4283 | break; | ||
4284 | niro | 532 | } |
4285 | niro | 816 | USTPUTC(c, nextc); |
4286 | checkstr: | ||
4287 | if (!str) | ||
4288 | continue; | ||
4289 | dostr: | ||
4290 | niro | 984 | while ((c = *str++) != '\0') { |
4291 | niro | 816 | USTPUTC(c, nextc); |
4292 | niro | 532 | } |
4293 | niro | 984 | } /* while *p++ not NUL */ |
4294 | |||
4295 | niro | 816 | if (quoted & 1) { |
4296 | USTPUTC('"', nextc); | ||
4297 | niro | 532 | } |
4298 | niro | 816 | *nextc = 0; |
4299 | cmdnextc = nextc; | ||
4300 | niro | 532 | } |
4301 | |||
4302 | niro | 816 | /* cmdtxt() and cmdlist() call each other */ |
4303 | static void cmdtxt(union node *n); | ||
4304 | niro | 532 | |
4305 | static void | ||
4306 | niro | 816 | cmdlist(union node *np, int sep) |
4307 | niro | 532 | { |
4308 | niro | 816 | for (; np; np = np->narg.next) { |
4309 | if (!sep) | ||
4310 | cmdputs(" "); | ||
4311 | cmdtxt(np); | ||
4312 | if (sep && np->narg.next) | ||
4313 | cmdputs(" "); | ||
4314 | niro | 532 | } |
4315 | } | ||
4316 | |||
4317 | niro | 816 | static void |
4318 | cmdtxt(union node *n) | ||
4319 | niro | 532 | { |
4320 | niro | 816 | union node *np; |
4321 | struct nodelist *lp; | ||
4322 | const char *p; | ||
4323 | niro | 532 | |
4324 | niro | 816 | if (!n) |
4325 | return; | ||
4326 | switch (n->type) { | ||
4327 | default: | ||
4328 | #if DEBUG | ||
4329 | abort(); | ||
4330 | #endif | ||
4331 | case NPIPE: | ||
4332 | lp = n->npipe.cmdlist; | ||
4333 | for (;;) { | ||
4334 | cmdtxt(lp->n); | ||
4335 | lp = lp->next; | ||
4336 | if (!lp) | ||
4337 | break; | ||
4338 | cmdputs(" | "); | ||
4339 | } | ||
4340 | break; | ||
4341 | case NSEMI: | ||
4342 | p = "; "; | ||
4343 | goto binop; | ||
4344 | case NAND: | ||
4345 | p = " && "; | ||
4346 | goto binop; | ||
4347 | case NOR: | ||
4348 | p = " || "; | ||
4349 | binop: | ||
4350 | cmdtxt(n->nbinary.ch1); | ||
4351 | cmdputs(p); | ||
4352 | n = n->nbinary.ch2; | ||
4353 | goto donode; | ||
4354 | case NREDIR: | ||
4355 | case NBACKGND: | ||
4356 | n = n->nredir.n; | ||
4357 | goto donode; | ||
4358 | case NNOT: | ||
4359 | cmdputs("!"); | ||
4360 | n = n->nnot.com; | ||
4361 | donode: | ||
4362 | cmdtxt(n); | ||
4363 | break; | ||
4364 | case NIF: | ||
4365 | cmdputs("if "); | ||
4366 | cmdtxt(n->nif.test); | ||
4367 | cmdputs("; then "); | ||
4368 | if (n->nif.elsepart) { | ||
4369 | niro | 984 | cmdtxt(n->nif.ifpart); |
4370 | niro | 816 | cmdputs("; else "); |
4371 | n = n->nif.elsepart; | ||
4372 | niro | 984 | } else { |
4373 | n = n->nif.ifpart; | ||
4374 | niro | 816 | } |
4375 | p = "; fi"; | ||
4376 | goto dotail; | ||
4377 | case NSUBSHELL: | ||
4378 | cmdputs("("); | ||
4379 | n = n->nredir.n; | ||
4380 | p = ")"; | ||
4381 | goto dotail; | ||
4382 | case NWHILE: | ||
4383 | p = "while "; | ||
4384 | goto until; | ||
4385 | case NUNTIL: | ||
4386 | p = "until "; | ||
4387 | until: | ||
4388 | cmdputs(p); | ||
4389 | cmdtxt(n->nbinary.ch1); | ||
4390 | n = n->nbinary.ch2; | ||
4391 | p = "; done"; | ||
4392 | dodo: | ||
4393 | cmdputs("; do "); | ||
4394 | dotail: | ||
4395 | cmdtxt(n); | ||
4396 | goto dotail2; | ||
4397 | case NFOR: | ||
4398 | cmdputs("for "); | ||
4399 | cmdputs(n->nfor.var); | ||
4400 | cmdputs(" in "); | ||
4401 | cmdlist(n->nfor.args, 1); | ||
4402 | n = n->nfor.body; | ||
4403 | p = "; done"; | ||
4404 | goto dodo; | ||
4405 | case NDEFUN: | ||
4406 | cmdputs(n->narg.text); | ||
4407 | p = "() { ... }"; | ||
4408 | goto dotail2; | ||
4409 | case NCMD: | ||
4410 | cmdlist(n->ncmd.args, 1); | ||
4411 | cmdlist(n->ncmd.redirect, 0); | ||
4412 | break; | ||
4413 | case NARG: | ||
4414 | p = n->narg.text; | ||
4415 | dotail2: | ||
4416 | cmdputs(p); | ||
4417 | break; | ||
4418 | case NHERE: | ||
4419 | case NXHERE: | ||
4420 | p = "<<..."; | ||
4421 | goto dotail2; | ||
4422 | case NCASE: | ||
4423 | cmdputs("case "); | ||
4424 | cmdputs(n->ncase.expr->narg.text); | ||
4425 | cmdputs(" in "); | ||
4426 | for (np = n->ncase.cases; np; np = np->nclist.next) { | ||
4427 | cmdtxt(np->nclist.pattern); | ||
4428 | cmdputs(") "); | ||
4429 | cmdtxt(np->nclist.body); | ||
4430 | cmdputs(";; "); | ||
4431 | } | ||
4432 | p = "esac"; | ||
4433 | goto dotail2; | ||
4434 | case NTO: | ||
4435 | p = ">"; | ||
4436 | goto redir; | ||
4437 | case NCLOBBER: | ||
4438 | p = ">|"; | ||
4439 | goto redir; | ||
4440 | case NAPPEND: | ||
4441 | p = ">>"; | ||
4442 | goto redir; | ||
4443 | #if ENABLE_ASH_BASH_COMPAT | ||
4444 | case NTO2: | ||
4445 | #endif | ||
4446 | case NTOFD: | ||
4447 | p = ">&"; | ||
4448 | goto redir; | ||
4449 | case NFROM: | ||
4450 | p = "<"; | ||
4451 | goto redir; | ||
4452 | case NFROMFD: | ||
4453 | p = "<&"; | ||
4454 | goto redir; | ||
4455 | case NFROMTO: | ||
4456 | p = "<>"; | ||
4457 | redir: | ||
4458 | cmdputs(utoa(n->nfile.fd)); | ||
4459 | cmdputs(p); | ||
4460 | if (n->type == NTOFD || n->type == NFROMFD) { | ||
4461 | cmdputs(utoa(n->ndup.dupfd)); | ||
4462 | niro | 532 | break; |
4463 | } | ||
4464 | niro | 816 | n = n->nfile.fname; |
4465 | goto donode; | ||
4466 | niro | 532 | } |
4467 | } | ||
4468 | |||
4469 | niro | 816 | static char * |
4470 | commandtext(union node *n) | ||
4471 | niro | 532 | { |
4472 | niro | 816 | char *name; |
4473 | |||
4474 | STARTSTACKSTR(cmdnextc); | ||
4475 | cmdtxt(n); | ||
4476 | name = stackblock(); | ||
4477 | TRACE(("commandtext: name %p, end %p\n\t\"%s\"\n", | ||
4478 | name, cmdnextc, cmdnextc)); | ||
4479 | return ckstrdup(name); | ||
4480 | niro | 532 | } |
4481 | niro | 816 | #endif /* JOBS */ |
4482 | niro | 532 | |
4483 | /* | ||
4484 | niro | 816 | * Fork off a subshell. If we are doing job control, give the subshell its |
4485 | * own process group. Jp is a job structure that the job is to be added to. | ||
4486 | * N is the command that will be evaluated by the child. Both jp and n may | ||
4487 | * be NULL. The mode parameter can be one of the following: | ||
4488 | * FORK_FG - Fork off a foreground process. | ||
4489 | * FORK_BG - Fork off a background process. | ||
4490 | * FORK_NOJOB - Like FORK_FG, but don't give the process its own | ||
4491 | * process group even if job control is on. | ||
4492 | * | ||
4493 | * When job control is turned off, background processes have their standard | ||
4494 | * input redirected to /dev/null (except for the second and later processes | ||
4495 | * in a pipeline). | ||
4496 | * | ||
4497 | * Called with interrupts off. | ||
4498 | niro | 532 | */ |
4499 | niro | 816 | /* |
4500 | * Clear traps on a fork. | ||
4501 | */ | ||
4502 | niro | 532 | static void |
4503 | niro | 816 | clear_traps(void) |
4504 | niro | 532 | { |
4505 | niro | 816 | char **tp; |
4506 | niro | 532 | |
4507 | niro | 816 | for (tp = trap; tp < &trap[NSIG]; tp++) { |
4508 | if (*tp && **tp) { /* trap not NULL or "" (SIG_IGN) */ | ||
4509 | INT_OFF; | ||
4510 | niro | 984 | if (trap_ptr == trap) |
4511 | free(*tp); | ||
4512 | /* else: it "belongs" to trap_ptr vector, don't free */ | ||
4513 | niro | 816 | *tp = NULL; |
4514 | niro | 984 | if ((tp - trap) != 0) |
4515 | niro | 816 | setsignal(tp - trap); |
4516 | INT_ON; | ||
4517 | } | ||
4518 | } | ||
4519 | } | ||
4520 | niro | 532 | |
4521 | niro | 816 | /* Lives far away from here, needed for forkchild */ |
4522 | static void closescript(void); | ||
4523 | niro | 532 | |
4524 | niro | 816 | /* Called after fork(), in child */ |
4525 | niro | 984 | static NOINLINE void |
4526 | forkchild(struct job *jp, union node *n, int mode) | ||
4527 | niro | 816 | { |
4528 | int oldlvl; | ||
4529 | niro | 532 | |
4530 | niro | 816 | TRACE(("Child shell %d\n", getpid())); |
4531 | oldlvl = shlvl; | ||
4532 | shlvl++; | ||
4533 | niro | 532 | |
4534 | niro | 984 | /* man bash: "Non-builtin commands run by bash have signal handlers |
4535 | * set to the values inherited by the shell from its parent". | ||
4536 | * Do we do it correctly? */ | ||
4537 | |||
4538 | niro | 816 | closescript(); |
4539 | niro | 984 | |
4540 | if (mode == FORK_NOJOB /* is it `xxx` ? */ | ||
4541 | && n && n->type == NCMD /* is it single cmd? */ | ||
4542 | /* && n->ncmd.args->type == NARG - always true? */ | ||
4543 | && n->ncmd.args && strcmp(n->ncmd.args->narg.text, "trap") == 0 | ||
4544 | && n->ncmd.args->narg.next == NULL /* "trap" with no arguments */ | ||
4545 | /* && n->ncmd.args->narg.backquote == NULL - do we need to check this? */ | ||
4546 | ) { | ||
4547 | TRACE(("Trap hack\n")); | ||
4548 | /* Awful hack for `trap` or $(trap). | ||
4549 | * | ||
4550 | * http://www.opengroup.org/onlinepubs/009695399/utilities/trap.html | ||
4551 | * contains an example where "trap" is executed in a subshell: | ||
4552 | * | ||
4553 | * save_traps=$(trap) | ||
4554 | * ... | ||
4555 | * eval "$save_traps" | ||
4556 | * | ||
4557 | * Standard does not say that "trap" in subshell shall print | ||
4558 | * parent shell's traps. It only says that its output | ||
4559 | * must have suitable form, but then, in the above example | ||
4560 | * (which is not supposed to be normative), it implies that. | ||
4561 | * | ||
4562 | * bash (and probably other shell) does implement it | ||
4563 | * (traps are reset to defaults, but "trap" still shows them), | ||
4564 | * but as a result, "trap" logic is hopelessly messed up: | ||
4565 | * | ||
4566 | * # trap | ||
4567 | * trap -- 'echo Ho' SIGWINCH <--- we have a handler | ||
4568 | * # (trap) <--- trap is in subshell - no output (correct, traps are reset) | ||
4569 | * # true | trap <--- trap is in subshell - no output (ditto) | ||
4570 | * # echo `true | trap` <--- in subshell - output (but traps are reset!) | ||
4571 | * trap -- 'echo Ho' SIGWINCH | ||
4572 | * # echo `(trap)` <--- in subshell in subshell - output | ||
4573 | * trap -- 'echo Ho' SIGWINCH | ||
4574 | * # echo `true | (trap)` <--- in subshell in subshell in subshell - output! | ||
4575 | * trap -- 'echo Ho' SIGWINCH | ||
4576 | * | ||
4577 | * The rules when to forget and when to not forget traps | ||
4578 | * get really complex and nonsensical. | ||
4579 | * | ||
4580 | * Our solution: ONLY bare $(trap) or `trap` is special. | ||
4581 | */ | ||
4582 | /* Save trap handler strings for trap builtin to print */ | ||
4583 | trap_ptr = memcpy(xmalloc(sizeof(trap)), trap, sizeof(trap)); | ||
4584 | /* Fall through into clearing traps */ | ||
4585 | } | ||
4586 | niro | 816 | clear_traps(); |
4587 | #if JOBS | ||
4588 | /* do job control only in root shell */ | ||
4589 | doing_jobctl = 0; | ||
4590 | if (mode != FORK_NOJOB && jp->jobctl && !oldlvl) { | ||
4591 | pid_t pgrp; | ||
4592 | |||
4593 | if (jp->nprocs == 0) | ||
4594 | pgrp = getpid(); | ||
4595 | niro | 532 | else |
4596 | niro | 984 | pgrp = jp->ps[0].ps_pid; |
4597 | /* this can fail because we are doing it in the parent also */ | ||
4598 | setpgid(0, pgrp); | ||
4599 | niro | 816 | if (mode == FORK_FG) |
4600 | xtcsetpgrp(ttyfd, pgrp); | ||
4601 | setsignal(SIGTSTP); | ||
4602 | setsignal(SIGTTOU); | ||
4603 | } else | ||
4604 | #endif | ||
4605 | if (mode == FORK_BG) { | ||
4606 | niro | 984 | /* man bash: "When job control is not in effect, |
4607 | * asynchronous commands ignore SIGINT and SIGQUIT" */ | ||
4608 | niro | 816 | ignoresig(SIGINT); |
4609 | ignoresig(SIGQUIT); | ||
4610 | if (jp->nprocs == 0) { | ||
4611 | close(0); | ||
4612 | if (open(bb_dev_null, O_RDONLY) != 0) | ||
4613 | niro | 984 | ash_msg_and_raise_error("can't open '%s'", bb_dev_null); |
4614 | niro | 816 | } |
4615 | niro | 532 | } |
4616 | niro | 984 | if (!oldlvl) { |
4617 | if (iflag) { /* why if iflag only? */ | ||
4618 | setsignal(SIGINT); | ||
4619 | setsignal(SIGTERM); | ||
4620 | } | ||
4621 | /* man bash: | ||
4622 | * "In all cases, bash ignores SIGQUIT. Non-builtin | ||
4623 | * commands run by bash have signal handlers | ||
4624 | * set to the values inherited by the shell | ||
4625 | * from its parent". | ||
4626 | * Take care of the second rule: */ | ||
4627 | niro | 816 | setsignal(SIGQUIT); |
4628 | niro | 532 | } |
4629 | niro | 984 | #if JOBS |
4630 | if (n && n->type == NCMD | ||
4631 | && n->ncmd.args && strcmp(n->ncmd.args->narg.text, "jobs") == 0 | ||
4632 | ) { | ||
4633 | TRACE(("Job hack\n")); | ||
4634 | /* "jobs": we do not want to clear job list for it, | ||
4635 | * instead we remove only _its_ own_ job from job list. | ||
4636 | * This makes "jobs .... | cat" more useful. | ||
4637 | */ | ||
4638 | freejob(curjob); | ||
4639 | return; | ||
4640 | } | ||
4641 | #endif | ||
4642 | niro | 816 | for (jp = curjob; jp; jp = jp->prev_job) |
4643 | freejob(jp); | ||
4644 | jobless = 0; | ||
4645 | } | ||
4646 | niro | 532 | |
4647 | niro | 816 | /* Called after fork(), in parent */ |
4648 | #if !JOBS | ||
4649 | #define forkparent(jp, n, mode, pid) forkparent(jp, mode, pid) | ||
4650 | #endif | ||
4651 | static void | ||
4652 | forkparent(struct job *jp, union node *n, int mode, pid_t pid) | ||
4653 | { | ||
4654 | TRACE(("In parent shell: child = %d\n", pid)); | ||
4655 | if (!jp) { | ||
4656 | while (jobless && dowait(DOWAIT_NONBLOCK, NULL) > 0) | ||
4657 | continue; | ||
4658 | jobless++; | ||
4659 | return; | ||
4660 | niro | 532 | } |
4661 | niro | 816 | #if JOBS |
4662 | if (mode != FORK_NOJOB && jp->jobctl) { | ||
4663 | int pgrp; | ||
4664 | niro | 532 | |
4665 | niro | 816 | if (jp->nprocs == 0) |
4666 | pgrp = pid; | ||
4667 | else | ||
4668 | niro | 984 | pgrp = jp->ps[0].ps_pid; |
4669 | niro | 816 | /* This can fail because we are doing it in the child also */ |
4670 | setpgid(pid, pgrp); | ||
4671 | niro | 532 | } |
4672 | #endif | ||
4673 | niro | 816 | if (mode == FORK_BG) { |
4674 | backgndpid = pid; /* set $! */ | ||
4675 | set_curjob(jp, CUR_RUNNING); | ||
4676 | niro | 532 | } |
4677 | niro | 816 | if (jp) { |
4678 | struct procstat *ps = &jp->ps[jp->nprocs++]; | ||
4679 | niro | 984 | ps->ps_pid = pid; |
4680 | ps->ps_status = -1; | ||
4681 | ps->ps_cmd = nullstr; | ||
4682 | niro | 816 | #if JOBS |
4683 | if (doing_jobctl && n) | ||
4684 | niro | 984 | ps->ps_cmd = commandtext(n); |
4685 | niro | 816 | #endif |
4686 | niro | 532 | } |
4687 | } | ||
4688 | |||
4689 | static int | ||
4690 | niro | 816 | forkshell(struct job *jp, union node *n, int mode) |
4691 | { | ||
4692 | int pid; | ||
4693 | niro | 532 | |
4694 | niro | 816 | TRACE(("forkshell(%%%d, %p, %d) called\n", jobno(jp), n, mode)); |
4695 | pid = fork(); | ||
4696 | if (pid < 0) { | ||
4697 | TRACE(("Fork failed, errno=%d", errno)); | ||
4698 | if (jp) | ||
4699 | freejob(jp); | ||
4700 | ash_msg_and_raise_error("can't fork"); | ||
4701 | } | ||
4702 | niro | 984 | if (pid == 0) { |
4703 | CLEAR_RANDOM_T(&random_gen); /* or else $RANDOM repeats in child */ | ||
4704 | forkchild(jp, n, mode); | ||
4705 | } else { | ||
4706 | niro | 816 | forkparent(jp, n, mode, pid); |
4707 | niro | 984 | } |
4708 | niro | 816 | return pid; |
4709 | niro | 532 | } |
4710 | |||
4711 | niro | 816 | /* |
4712 | * Wait for job to finish. | ||
4713 | * | ||
4714 | niro | 984 | * Under job control we have the problem that while a child process |
4715 | * is running interrupts generated by the user are sent to the child | ||
4716 | * but not to the shell. This means that an infinite loop started by | ||
4717 | * an interactive user may be hard to kill. With job control turned off, | ||
4718 | * an interactive user may place an interactive program inside a loop. | ||
4719 | * If the interactive program catches interrupts, the user doesn't want | ||
4720 | niro | 816 | * these interrupts to also abort the loop. The approach we take here |
4721 | * is to have the shell ignore interrupt signals while waiting for a | ||
4722 | * foreground process to terminate, and then send itself an interrupt | ||
4723 | * signal if the child process was terminated by an interrupt signal. | ||
4724 | * Unfortunately, some programs want to do a bit of cleanup and then | ||
4725 | * exit on interrupt; unless these processes terminate themselves by | ||
4726 | * sending a signal to themselves (instead of calling exit) they will | ||
4727 | * confuse this approach. | ||
4728 | * | ||
4729 | * Called with interrupts off. | ||
4730 | */ | ||
4731 | niro | 532 | static int |
4732 | niro | 816 | waitforjob(struct job *jp) |
4733 | niro | 532 | { |
4734 | niro | 816 | int st; |
4735 | niro | 532 | |
4736 | niro | 816 | TRACE(("waitforjob(%%%d) called\n", jobno(jp))); |
4737 | niro | 984 | |
4738 | INT_OFF; | ||
4739 | niro | 816 | while (jp->state == JOBRUNNING) { |
4740 | niro | 984 | /* In non-interactive shells, we _can_ get |
4741 | * a keyboard signal here and be EINTRed, | ||
4742 | * but we just loop back, waiting for command to complete. | ||
4743 | * | ||
4744 | * man bash: | ||
4745 | * "If bash is waiting for a command to complete and receives | ||
4746 | * a signal for which a trap has been set, the trap | ||
4747 | * will not be executed until the command completes." | ||
4748 | * | ||
4749 | * Reality is that even if trap is not set, bash | ||
4750 | * will not act on the signal until command completes. | ||
4751 | * Try this. sleep5intoff.c: | ||
4752 | * #include <signal.h> | ||
4753 | * #include <unistd.h> | ||
4754 | * int main() { | ||
4755 | * sigset_t set; | ||
4756 | * sigemptyset(&set); | ||
4757 | * sigaddset(&set, SIGINT); | ||
4758 | * sigaddset(&set, SIGQUIT); | ||
4759 | * sigprocmask(SIG_BLOCK, &set, NULL); | ||
4760 | * sleep(5); | ||
4761 | * return 0; | ||
4762 | * } | ||
4763 | * $ bash -c './sleep5intoff; echo hi' | ||
4764 | * ^C^C^C^C <--- pressing ^C once a second | ||
4765 | * $ _ | ||
4766 | * $ bash -c './sleep5intoff; echo hi' | ||
4767 | * ^\^\^\^\hi <--- pressing ^\ (SIGQUIT) | ||
4768 | * $ _ | ||
4769 | */ | ||
4770 | niro | 816 | dowait(DOWAIT_BLOCK, jp); |
4771 | niro | 532 | } |
4772 | niro | 984 | INT_ON; |
4773 | |||
4774 | niro | 816 | st = getstatus(jp); |
4775 | #if JOBS | ||
4776 | if (jp->jobctl) { | ||
4777 | xtcsetpgrp(ttyfd, rootpid); | ||
4778 | /* | ||
4779 | * This is truly gross. | ||
4780 | * If we're doing job control, then we did a TIOCSPGRP which | ||
4781 | * caused us (the shell) to no longer be in the controlling | ||
4782 | * session -- so we wouldn't have seen any ^C/SIGINT. So, we | ||
4783 | * intuit from the subprocess exit status whether a SIGINT | ||
4784 | * occurred, and if so interrupt ourselves. Yuck. - mycroft | ||
4785 | */ | ||
4786 | if (jp->sigint) /* TODO: do the same with all signals */ | ||
4787 | raise(SIGINT); /* ... by raise(jp->sig) instead? */ | ||
4788 | } | ||
4789 | if (jp->state == JOBDONE) | ||
4790 | niro | 532 | #endif |
4791 | niro | 816 | freejob(jp); |
4792 | return st; | ||
4793 | niro | 532 | } |
4794 | |||
4795 | /* | ||
4796 | niro | 816 | * return 1 if there are stopped jobs, otherwise 0 |
4797 | niro | 532 | */ |
4798 | niro | 816 | static int |
4799 | stoppedjobs(void) | ||
4800 | niro | 532 | { |
4801 | niro | 816 | struct job *jp; |
4802 | int retval; | ||
4803 | niro | 532 | |
4804 | niro | 816 | retval = 0; |
4805 | if (job_warning) | ||
4806 | goto out; | ||
4807 | jp = curjob; | ||
4808 | if (jp && jp->state == JOBSTOPPED) { | ||
4809 | out2str("You have stopped jobs.\n"); | ||
4810 | job_warning = 2; | ||
4811 | retval++; | ||
4812 | } | ||
4813 | out: | ||
4814 | return retval; | ||
4815 | niro | 532 | } |
4816 | |||
4817 | |||
4818 | niro | 816 | /* ============ redir.c |
4819 | * | ||
4820 | * Code for dealing with input/output redirection. | ||
4821 | niro | 532 | */ |
4822 | |||
4823 | niro | 816 | #define EMPTY -2 /* marks an unused slot in redirtab */ |
4824 | #define CLOSED -3 /* marks a slot of previously-closed fd */ | ||
4825 | |||
4826 | niro | 532 | /* |
4827 | niro | 816 | * Open a file in noclobber mode. |
4828 | * The code was copied from bash. | ||
4829 | niro | 532 | */ |
4830 | static int | ||
4831 | niro | 816 | noclobberopen(const char *fname) |
4832 | niro | 532 | { |
4833 | niro | 816 | int r, fd; |
4834 | struct stat finfo, finfo2; | ||
4835 | |||
4836 | niro | 532 | /* |
4837 | niro | 816 | * If the file exists and is a regular file, return an error |
4838 | * immediately. | ||
4839 | niro | 532 | */ |
4840 | niro | 816 | r = stat(fname, &finfo); |
4841 | if (r == 0 && S_ISREG(finfo.st_mode)) { | ||
4842 | errno = EEXIST; | ||
4843 | return -1; | ||
4844 | niro | 532 | } |
4845 | |||
4846 | niro | 816 | /* |
4847 | * If the file was not present (r != 0), make sure we open it | ||
4848 | * exclusively so that if it is created before we open it, our open | ||
4849 | * will fail. Make sure that we do not truncate an existing file. | ||
4850 | * Note that we don't turn on O_EXCL unless the stat failed -- if the | ||
4851 | * file was not a regular file, we leave O_EXCL off. | ||
4852 | */ | ||
4853 | if (r != 0) | ||
4854 | return open(fname, O_WRONLY|O_CREAT|O_EXCL, 0666); | ||
4855 | fd = open(fname, O_WRONLY|O_CREAT, 0666); | ||
4856 | niro | 532 | |
4857 | niro | 816 | /* If the open failed, return the file descriptor right away. */ |
4858 | if (fd < 0) | ||
4859 | return fd; | ||
4860 | niro | 532 | |
4861 | /* | ||
4862 | niro | 816 | * OK, the open succeeded, but the file may have been changed from a |
4863 | * non-regular file to a regular file between the stat and the open. | ||
4864 | * We are assuming that the O_EXCL open handles the case where FILENAME | ||
4865 | * did not exist and is symlinked to an existing file between the stat | ||
4866 | * and open. | ||
4867 | niro | 532 | */ |
4868 | |||
4869 | niro | 816 | /* |
4870 | * If we can open it and fstat the file descriptor, and neither check | ||
4871 | * revealed that it was a regular file, and the file has not been | ||
4872 | * replaced, return the file descriptor. | ||
4873 | */ | ||
4874 | if (fstat(fd, &finfo2) == 0 && !S_ISREG(finfo2.st_mode) | ||
4875 | && finfo.st_dev == finfo2.st_dev && finfo.st_ino == finfo2.st_ino) | ||
4876 | return fd; | ||
4877 | niro | 532 | |
4878 | niro | 816 | /* The file has been replaced. badness. */ |
4879 | close(fd); | ||
4880 | errno = EEXIST; | ||
4881 | return -1; | ||
4882 | niro | 532 | } |
4883 | |||
4884 | niro | 816 | /* |
4885 | * Handle here documents. Normally we fork off a process to write the | ||
4886 | * data to a pipe. If the document is short, we can stuff the data in | ||
4887 | * the pipe without forking. | ||
4888 | */ | ||
4889 | /* openhere needs this forward reference */ | ||
4890 | static void expandhere(union node *arg, int fd); | ||
4891 | niro | 532 | static int |
4892 | niro | 816 | openhere(union node *redir) |
4893 | niro | 532 | { |
4894 | niro | 816 | int pip[2]; |
4895 | size_t len = 0; | ||
4896 | niro | 532 | |
4897 | niro | 816 | if (pipe(pip) < 0) |
4898 | ash_msg_and_raise_error("pipe call failed"); | ||
4899 | if (redir->type == NHERE) { | ||
4900 | len = strlen(redir->nhere.doc->narg.text); | ||
4901 | if (len <= PIPE_BUF) { | ||
4902 | full_write(pip[1], redir->nhere.doc->narg.text, len); | ||
4903 | goto out; | ||
4904 | } | ||
4905 | niro | 532 | } |
4906 | niro | 816 | if (forkshell((struct job *)NULL, (union node *)NULL, FORK_NOJOB) == 0) { |
4907 | /* child */ | ||
4908 | close(pip[0]); | ||
4909 | niro | 984 | ignoresig(SIGINT); //signal(SIGINT, SIG_IGN); |
4910 | ignoresig(SIGQUIT); //signal(SIGQUIT, SIG_IGN); | ||
4911 | ignoresig(SIGHUP); //signal(SIGHUP, SIG_IGN); | ||
4912 | ignoresig(SIGTSTP); //signal(SIGTSTP, SIG_IGN); | ||
4913 | niro | 816 | signal(SIGPIPE, SIG_DFL); |
4914 | if (redir->type == NHERE) | ||
4915 | full_write(pip[1], redir->nhere.doc->narg.text, len); | ||
4916 | else /* NXHERE */ | ||
4917 | expandhere(redir->nhere.doc, pip[1]); | ||
4918 | _exit(EXIT_SUCCESS); | ||
4919 | } | ||
4920 | out: | ||
4921 | close(pip[1]); | ||
4922 | return pip[0]; | ||
4923 | niro | 532 | } |
4924 | |||
4925 | niro | 816 | static int |
4926 | openredirect(union node *redir) | ||
4927 | niro | 532 | { |
4928 | niro | 816 | char *fname; |
4929 | int f; | ||
4930 | niro | 532 | |
4931 | niro | 816 | switch (redir->nfile.type) { |
4932 | case NFROM: | ||
4933 | fname = redir->nfile.expfname; | ||
4934 | f = open(fname, O_RDONLY); | ||
4935 | if (f < 0) | ||
4936 | goto eopen; | ||
4937 | break; | ||
4938 | case NFROMTO: | ||
4939 | fname = redir->nfile.expfname; | ||
4940 | f = open(fname, O_RDWR|O_CREAT|O_TRUNC, 0666); | ||
4941 | if (f < 0) | ||
4942 | goto ecreate; | ||
4943 | break; | ||
4944 | case NTO: | ||
4945 | #if ENABLE_ASH_BASH_COMPAT | ||
4946 | case NTO2: | ||
4947 | niro | 532 | #endif |
4948 | niro | 816 | /* Take care of noclobber mode. */ |
4949 | if (Cflag) { | ||
4950 | fname = redir->nfile.expfname; | ||
4951 | f = noclobberopen(fname); | ||
4952 | if (f < 0) | ||
4953 | goto ecreate; | ||
4954 | break; | ||
4955 | niro | 532 | } |
4956 | niro | 816 | /* FALLTHROUGH */ |
4957 | case NCLOBBER: | ||
4958 | fname = redir->nfile.expfname; | ||
4959 | f = open(fname, O_WRONLY|O_CREAT|O_TRUNC, 0666); | ||
4960 | if (f < 0) | ||
4961 | goto ecreate; | ||
4962 | niro | 532 | break; |
4963 | niro | 816 | case NAPPEND: |
4964 | fname = redir->nfile.expfname; | ||
4965 | f = open(fname, O_WRONLY|O_CREAT|O_APPEND, 0666); | ||
4966 | if (f < 0) | ||
4967 | goto ecreate; | ||
4968 | niro | 532 | break; |
4969 | default: | ||
4970 | niro | 816 | #if DEBUG |
4971 | abort(); | ||
4972 | #endif | ||
4973 | /* Fall through to eliminate warning. */ | ||
4974 | /* Our single caller does this itself */ | ||
4975 | // case NTOFD: | ||
4976 | // case NFROMFD: | ||
4977 | // f = -1; | ||
4978 | // break; | ||
4979 | case NHERE: | ||
4980 | case NXHERE: | ||
4981 | f = openhere(redir); | ||
4982 | niro | 532 | break; |
4983 | } | ||
4984 | |||
4985 | niro | 816 | return f; |
4986 | ecreate: | ||
4987 | ash_msg_and_raise_error("can't create %s: %s", fname, errmsg(errno, "nonexistent directory")); | ||
4988 | eopen: | ||
4989 | ash_msg_and_raise_error("can't open %s: %s", fname, errmsg(errno, "no such file")); | ||
4990 | niro | 532 | } |
4991 | |||
4992 | /* | ||
4993 | niro | 816 | * Copy a file descriptor to be >= to. Returns -1 |
4994 | * if the source file descriptor is closed, EMPTY if there are no unused | ||
4995 | * file descriptors left. | ||
4996 | niro | 532 | */ |
4997 | niro | 816 | /* 0x800..00: bit to set in "to" to request dup2 instead of fcntl(F_DUPFD). |
4998 | * old code was doing close(to) prior to copyfd() to achieve the same */ | ||
4999 | enum { | ||
5000 | COPYFD_EXACT = (int)~(INT_MAX), | ||
5001 | COPYFD_RESTORE = (int)((unsigned)COPYFD_EXACT >> 1), | ||
5002 | }; | ||
5003 | static int | ||
5004 | copyfd(int from, int to) | ||
5005 | niro | 532 | { |
5006 | niro | 816 | int newfd; |
5007 | niro | 532 | |
5008 | niro | 816 | if (to & COPYFD_EXACT) { |
5009 | to &= ~COPYFD_EXACT; | ||
5010 | /*if (from != to)*/ | ||
5011 | newfd = dup2(from, to); | ||
5012 | } else { | ||
5013 | newfd = fcntl(from, F_DUPFD, to); | ||
5014 | niro | 532 | } |
5015 | niro | 816 | if (newfd < 0) { |
5016 | if (errno == EMFILE) | ||
5017 | return EMPTY; | ||
5018 | /* Happens when source fd is not open: try "echo >&99" */ | ||
5019 | ash_msg_and_raise_error("%d: %m", from); | ||
5020 | niro | 532 | } |
5021 | niro | 816 | return newfd; |
5022 | niro | 532 | } |
5023 | |||
5024 | niro | 816 | /* Struct def and variable are moved down to the first usage site */ |
5025 | struct two_fd_t { | ||
5026 | int orig, copy; | ||
5027 | }; | ||
5028 | struct redirtab { | ||
5029 | struct redirtab *next; | ||
5030 | int nullredirs; | ||
5031 | int pair_count; | ||
5032 | niro | 984 | struct two_fd_t two_fd[]; |
5033 | niro | 816 | }; |
5034 | #define redirlist (G_var.redirlist) | ||
5035 | niro | 532 | |
5036 | niro | 816 | static int need_to_remember(struct redirtab *rp, int fd) |
5037 | niro | 532 | { |
5038 | niro | 816 | int i; |
5039 | niro | 532 | |
5040 | niro | 816 | if (!rp) /* remembering was not requested */ |
5041 | return 0; | ||
5042 | |||
5043 | for (i = 0; i < rp->pair_count; i++) { | ||
5044 | if (rp->two_fd[i].orig == fd) { | ||
5045 | /* already remembered */ | ||
5046 | return 0; | ||
5047 | } | ||
5048 | } | ||
5049 | return 1; | ||
5050 | niro | 532 | } |
5051 | |||
5052 | niro | 816 | /* "hidden" fd is a fd used to read scripts, or a copy of such */ |
5053 | static int is_hidden_fd(struct redirtab *rp, int fd) | ||
5054 | niro | 532 | { |
5055 | niro | 816 | int i; |
5056 | struct parsefile *pf; | ||
5057 | niro | 532 | |
5058 | niro | 816 | if (fd == -1) |
5059 | niro | 532 | return 0; |
5060 | niro | 816 | pf = g_parsefile; |
5061 | while (pf) { | ||
5062 | if (fd == pf->fd) { | ||
5063 | return 1; | ||
5064 | } | ||
5065 | pf = pf->prev; | ||
5066 | niro | 532 | } |
5067 | niro | 816 | if (!rp) |
5068 | return 0; | ||
5069 | fd |= COPYFD_RESTORE; | ||
5070 | for (i = 0; i < rp->pair_count; i++) { | ||
5071 | if (rp->two_fd[i].copy == fd) { | ||
5072 | return 1; | ||
5073 | niro | 532 | } |
5074 | } | ||
5075 | niro | 816 | return 0; |
5076 | niro | 532 | } |
5077 | |||
5078 | /* | ||
5079 | niro | 816 | * Process a list of redirection commands. If the REDIR_PUSH flag is set, |
5080 | * old file descriptors are stashed away so that the redirection can be | ||
5081 | * undone by calling popredir. If the REDIR_BACKQ flag is set, then the | ||
5082 | * standard output, and the standard error if it becomes a duplicate of | ||
5083 | * stdout, is saved in memory. | ||
5084 | niro | 532 | */ |
5085 | niro | 816 | /* flags passed to redirect */ |
5086 | #define REDIR_PUSH 01 /* save previous values of file descriptors */ | ||
5087 | #define REDIR_SAVEFD2 03 /* set preverrout */ | ||
5088 | niro | 532 | static void |
5089 | niro | 816 | redirect(union node *redir, int flags) |
5090 | niro | 532 | { |
5091 | niro | 816 | struct redirtab *sv; |
5092 | int sv_pos; | ||
5093 | int i; | ||
5094 | int fd; | ||
5095 | int newfd; | ||
5096 | int copied_fd2 = -1; | ||
5097 | niro | 532 | |
5098 | niro | 816 | g_nullredirs++; |
5099 | if (!redir) { | ||
5100 | niro | 532 | return; |
5101 | } | ||
5102 | |||
5103 | niro | 816 | sv = NULL; |
5104 | sv_pos = 0; | ||
5105 | INT_OFF; | ||
5106 | if (flags & REDIR_PUSH) { | ||
5107 | union node *tmp = redir; | ||
5108 | do { | ||
5109 | sv_pos++; | ||
5110 | #if ENABLE_ASH_BASH_COMPAT | ||
5111 | niro | 984 | if (tmp->nfile.type == NTO2) |
5112 | niro | 816 | sv_pos++; |
5113 | niro | 532 | #endif |
5114 | niro | 816 | tmp = tmp->nfile.next; |
5115 | } while (tmp); | ||
5116 | sv = ckmalloc(sizeof(*sv) + sv_pos * sizeof(sv->two_fd[0])); | ||
5117 | sv->next = redirlist; | ||
5118 | sv->pair_count = sv_pos; | ||
5119 | redirlist = sv; | ||
5120 | sv->nullredirs = g_nullredirs - 1; | ||
5121 | g_nullredirs = 0; | ||
5122 | while (sv_pos > 0) { | ||
5123 | sv_pos--; | ||
5124 | sv->two_fd[sv_pos].orig = sv->two_fd[sv_pos].copy = EMPTY; | ||
5125 | niro | 532 | } |
5126 | } | ||
5127 | |||
5128 | niro | 816 | do { |
5129 | fd = redir->nfile.fd; | ||
5130 | if (redir->nfile.type == NTOFD || redir->nfile.type == NFROMFD) { | ||
5131 | int right_fd = redir->ndup.dupfd; | ||
5132 | /* redirect from/to same file descriptor? */ | ||
5133 | if (right_fd == fd) | ||
5134 | niro | 532 | continue; |
5135 | niro | 816 | /* echo >&10 and 10 is a fd opened to the sh script? */ |
5136 | if (is_hidden_fd(sv, right_fd)) { | ||
5137 | errno = EBADF; /* as if it is closed */ | ||
5138 | ash_msg_and_raise_error("%d: %m", right_fd); | ||
5139 | } | ||
5140 | newfd = -1; | ||
5141 | } else { | ||
5142 | newfd = openredirect(redir); /* always >= 0 */ | ||
5143 | if (fd == newfd) { | ||
5144 | /* Descriptor wasn't open before redirect. | ||
5145 | * Mark it for close in the future */ | ||
5146 | if (need_to_remember(sv, fd)) { | ||
5147 | goto remember_to_close; | ||
5148 | } | ||
5149 | niro | 532 | continue; |
5150 | } | ||
5151 | } | ||
5152 | niro | 816 | #if ENABLE_ASH_BASH_COMPAT |
5153 | redirect_more: | ||
5154 | #endif | ||
5155 | if (need_to_remember(sv, fd)) { | ||
5156 | /* Copy old descriptor */ | ||
5157 | i = fcntl(fd, F_DUPFD, 10); | ||
5158 | /* You'd expect copy to be CLOEXECed. Currently these extra "saved" fds | ||
5159 | * are closed in popredir() in the child, preventing them from leaking | ||
5160 | * into child. (popredir() also cleans up the mess in case of failures) | ||
5161 | */ | ||
5162 | if (i == -1) { | ||
5163 | i = errno; | ||
5164 | if (i != EBADF) { | ||
5165 | /* Strange error (e.g. "too many files" EMFILE?) */ | ||
5166 | if (newfd >= 0) | ||
5167 | close(newfd); | ||
5168 | errno = i; | ||
5169 | ash_msg_and_raise_error("%d: %m", fd); | ||
5170 | /* NOTREACHED */ | ||
5171 | } | ||
5172 | /* EBADF: it is not open - good, remember to close it */ | ||
5173 | remember_to_close: | ||
5174 | i = CLOSED; | ||
5175 | } else { /* fd is open, save its copy */ | ||
5176 | /* "exec fd>&-" should not close fds | ||
5177 | * which point to script file(s). | ||
5178 | * Force them to be restored afterwards */ | ||
5179 | if (is_hidden_fd(sv, fd)) | ||
5180 | i |= COPYFD_RESTORE; | ||
5181 | } | ||
5182 | if (fd == 2) | ||
5183 | copied_fd2 = i; | ||
5184 | sv->two_fd[sv_pos].orig = fd; | ||
5185 | sv->two_fd[sv_pos].copy = i; | ||
5186 | sv_pos++; | ||
5187 | niro | 532 | } |
5188 | niro | 816 | if (newfd < 0) { |
5189 | /* NTOFD/NFROMFD: copy redir->ndup.dupfd to fd */ | ||
5190 | if (redir->ndup.dupfd < 0) { /* "fd>&-" */ | ||
5191 | /* Don't want to trigger debugging */ | ||
5192 | if (fd != -1) | ||
5193 | close(fd); | ||
5194 | } else { | ||
5195 | copyfd(redir->ndup.dupfd, fd | COPYFD_EXACT); | ||
5196 | } | ||
5197 | } else if (fd != newfd) { /* move newfd to fd */ | ||
5198 | copyfd(newfd, fd | COPYFD_EXACT); | ||
5199 | #if ENABLE_ASH_BASH_COMPAT | ||
5200 | if (!(redir->nfile.type == NTO2 && fd == 2)) | ||
5201 | niro | 532 | #endif |
5202 | niro | 816 | close(newfd); |
5203 | niro | 532 | } |
5204 | niro | 816 | #if ENABLE_ASH_BASH_COMPAT |
5205 | if (redir->nfile.type == NTO2 && fd == 1) { | ||
5206 | /* We already redirected it to fd 1, now copy it to 2 */ | ||
5207 | newfd = 1; | ||
5208 | fd = 2; | ||
5209 | goto redirect_more; | ||
5210 | niro | 532 | } |
5211 | niro | 816 | #endif |
5212 | } while ((redir = redir->nfile.next) != NULL); | ||
5213 | niro | 532 | |
5214 | niro | 816 | INT_ON; |
5215 | if ((flags & REDIR_SAVEFD2) && copied_fd2 >= 0) | ||
5216 | preverrout_fd = copied_fd2; | ||
5217 | } | ||
5218 | niro | 532 | |
5219 | niro | 816 | /* |
5220 | * Undo the effects of the last redirection. | ||
5221 | */ | ||
5222 | static void | ||
5223 | popredir(int drop, int restore) | ||
5224 | { | ||
5225 | struct redirtab *rp; | ||
5226 | int i; | ||
5227 | |||
5228 | if (--g_nullredirs >= 0) | ||
5229 | niro | 532 | return; |
5230 | niro | 816 | INT_OFF; |
5231 | rp = redirlist; | ||
5232 | for (i = 0; i < rp->pair_count; i++) { | ||
5233 | int fd = rp->two_fd[i].orig; | ||
5234 | int copy = rp->two_fd[i].copy; | ||
5235 | if (copy == CLOSED) { | ||
5236 | if (!drop) | ||
5237 | close(fd); | ||
5238 | continue; | ||
5239 | } | ||
5240 | if (copy != EMPTY) { | ||
5241 | if (!drop || (restore && (copy & COPYFD_RESTORE))) { | ||
5242 | copy &= ~COPYFD_RESTORE; | ||
5243 | /*close(fd);*/ | ||
5244 | copyfd(copy, fd | COPYFD_EXACT); | ||
5245 | } | ||
5246 | close(copy & ~COPYFD_RESTORE); | ||
5247 | } | ||
5248 | niro | 532 | } |
5249 | niro | 816 | redirlist = rp->next; |
5250 | g_nullredirs = rp->nullredirs; | ||
5251 | free(rp); | ||
5252 | INT_ON; | ||
5253 | niro | 532 | } |
5254 | |||
5255 | niro | 816 | /* |
5256 | * Undo all redirections. Called on error or interrupt. | ||
5257 | */ | ||
5258 | niro | 532 | |
5259 | /* | ||
5260 | niro | 816 | * Discard all saved file descriptors. |
5261 | niro | 532 | */ |
5262 | niro | 816 | static void |
5263 | clearredir(int drop) | ||
5264 | niro | 532 | { |
5265 | niro | 816 | for (;;) { |
5266 | g_nullredirs = 0; | ||
5267 | if (!redirlist) | ||
5268 | break; | ||
5269 | popredir(drop, /*restore:*/ 0); | ||
5270 | } | ||
5271 | niro | 532 | } |
5272 | |||
5273 | niro | 816 | static int |
5274 | redirectsafe(union node *redir, int flags) | ||
5275 | niro | 532 | { |
5276 | niro | 816 | int err; |
5277 | volatile int saveint; | ||
5278 | struct jmploc *volatile savehandler = exception_handler; | ||
5279 | struct jmploc jmploc; | ||
5280 | niro | 532 | |
5281 | niro | 816 | SAVE_INT(saveint); |
5282 | /* "echo 9>/dev/null; echo >&9; echo result: $?" - result should be 1, not 2! */ | ||
5283 | err = setjmp(jmploc.loc); // huh?? was = setjmp(jmploc.loc) * 2; | ||
5284 | if (!err) { | ||
5285 | exception_handler = &jmploc; | ||
5286 | redirect(redir, flags); | ||
5287 | } | ||
5288 | exception_handler = savehandler; | ||
5289 | niro | 984 | if (err && exception_type != EXERROR) |
5290 | niro | 816 | longjmp(exception_handler->loc, 1); |
5291 | RESTORE_INT(saveint); | ||
5292 | return err; | ||
5293 | niro | 532 | } |
5294 | |||
5295 | |||
5296 | niro | 816 | /* ============ Routines to expand arguments to commands |
5297 | * | ||
5298 | * We have to deal with backquotes, shell variables, and file metacharacters. | ||
5299 | */ | ||
5300 | niro | 532 | |
5301 | niro | 984 | #if ENABLE_SH_MATH_SUPPORT |
5302 | static arith_t | ||
5303 | ash_arith(const char *s) | ||
5304 | { | ||
5305 | arith_eval_hooks_t math_hooks; | ||
5306 | arith_t result; | ||
5307 | int errcode = 0; | ||
5308 | niro | 816 | |
5309 | niro | 984 | math_hooks.lookupvar = lookupvar; |
5310 | math_hooks.setvar = setvar2; | ||
5311 | math_hooks.endofname = endofname; | ||
5312 | |||
5313 | INT_OFF; | ||
5314 | result = arith(s, &errcode, &math_hooks); | ||
5315 | if (errcode < 0) { | ||
5316 | if (errcode == -3) | ||
5317 | ash_msg_and_raise_error("exponent less than 0"); | ||
5318 | if (errcode == -2) | ||
5319 | ash_msg_and_raise_error("divide by zero"); | ||
5320 | if (errcode == -5) | ||
5321 | ash_msg_and_raise_error("expression recursion loop detected"); | ||
5322 | raise_error_syntax(s); | ||
5323 | } | ||
5324 | INT_ON; | ||
5325 | |||
5326 | return result; | ||
5327 | } | ||
5328 | niro | 816 | #endif |
5329 | |||
5330 | niro | 532 | /* |
5331 | niro | 816 | * expandarg flags |
5332 | niro | 532 | */ |
5333 | niro | 816 | #define EXP_FULL 0x1 /* perform word splitting & file globbing */ |
5334 | #define EXP_TILDE 0x2 /* do normal tilde expansion */ | ||
5335 | #define EXP_VARTILDE 0x4 /* expand tildes in an assignment */ | ||
5336 | #define EXP_REDIR 0x8 /* file glob for a redirection (1 match only) */ | ||
5337 | #define EXP_CASE 0x10 /* keeps quotes around for CASE pattern */ | ||
5338 | #define EXP_RECORD 0x20 /* need to record arguments for ifs breakup */ | ||
5339 | #define EXP_VARTILDE2 0x40 /* expand tildes after colons only */ | ||
5340 | #define EXP_WORD 0x80 /* expand word in parameter expansion */ | ||
5341 | #define EXP_QWORD 0x100 /* expand word in quoted parameter expansion */ | ||
5342 | /* | ||
5343 | niro | 984 | * rmescape() flags |
5344 | niro | 816 | */ |
5345 | #define RMESCAPE_ALLOC 0x1 /* Allocate a new string */ | ||
5346 | #define RMESCAPE_GLOB 0x2 /* Add backslashes for glob */ | ||
5347 | #define RMESCAPE_QUOTED 0x4 /* Remove CTLESC unless in quotes */ | ||
5348 | #define RMESCAPE_GROW 0x8 /* Grow strings instead of stalloc */ | ||
5349 | #define RMESCAPE_HEAP 0x10 /* Malloc strings instead of stalloc */ | ||
5350 | niro | 532 | |
5351 | niro | 816 | /* |
5352 | * Structure specifying which parts of the string should be searched | ||
5353 | * for IFS characters. | ||
5354 | */ | ||
5355 | struct ifsregion { | ||
5356 | struct ifsregion *next; /* next region in list */ | ||
5357 | int begoff; /* offset of start of region */ | ||
5358 | int endoff; /* offset of end of region */ | ||
5359 | int nulonly; /* search for nul bytes only */ | ||
5360 | }; | ||
5361 | niro | 532 | |
5362 | niro | 816 | struct arglist { |
5363 | struct strlist *list; | ||
5364 | struct strlist **lastp; | ||
5365 | }; | ||
5366 | niro | 532 | |
5367 | niro | 816 | /* output of current string */ |
5368 | static char *expdest; | ||
5369 | /* list of back quote expressions */ | ||
5370 | static struct nodelist *argbackq; | ||
5371 | /* first struct in list of ifs regions */ | ||
5372 | static struct ifsregion ifsfirst; | ||
5373 | /* last struct in list */ | ||
5374 | static struct ifsregion *ifslastp; | ||
5375 | /* holds expanded arg list */ | ||
5376 | static struct arglist exparg; | ||
5377 | niro | 532 | |
5378 | /* | ||
5379 | niro | 816 | * Our own itoa(). |
5380 | niro | 532 | */ |
5381 | niro | 816 | static int |
5382 | cvtnum(arith_t num) | ||
5383 | { | ||
5384 | int len; | ||
5385 | niro | 532 | |
5386 | niro | 816 | expdest = makestrspace(32, expdest); |
5387 | niro | 984 | len = fmtstr(expdest, 32, arith_t_fmt, num); |
5388 | niro | 816 | STADJUST(len, expdest); |
5389 | return len; | ||
5390 | } | ||
5391 | |||
5392 | static size_t | ||
5393 | esclen(const char *start, const char *p) | ||
5394 | niro | 532 | { |
5395 | niro | 816 | size_t esc = 0; |
5396 | niro | 532 | |
5397 | niro | 984 | while (p > start && (unsigned char)*--p == CTLESC) { |
5398 | niro | 816 | esc++; |
5399 | niro | 532 | } |
5400 | niro | 816 | return esc; |
5401 | niro | 532 | } |
5402 | |||
5403 | /* | ||
5404 | niro | 816 | * Remove any CTLESC characters from a string. |
5405 | niro | 532 | */ |
5406 | niro | 816 | static char * |
5407 | niro | 984 | rmescapes(char *str, int flag) |
5408 | niro | 532 | { |
5409 | niro | 816 | static const char qchars[] ALIGN1 = { CTLESC, CTLQUOTEMARK, '\0' }; |
5410 | niro | 532 | |
5411 | niro | 816 | char *p, *q, *r; |
5412 | unsigned inquotes; | ||
5413 | niro | 984 | unsigned protect_against_glob; |
5414 | unsigned globbing; | ||
5415 | niro | 816 | |
5416 | p = strpbrk(str, qchars); | ||
5417 | niro | 984 | if (!p) |
5418 | niro | 816 | return str; |
5419 | niro | 984 | |
5420 | niro | 816 | q = p; |
5421 | r = str; | ||
5422 | if (flag & RMESCAPE_ALLOC) { | ||
5423 | size_t len = p - str; | ||
5424 | size_t fulllen = len + strlen(p) + 1; | ||
5425 | |||
5426 | if (flag & RMESCAPE_GROW) { | ||
5427 | r = makestrspace(fulllen, expdest); | ||
5428 | } else if (flag & RMESCAPE_HEAP) { | ||
5429 | r = ckmalloc(fulllen); | ||
5430 | } else { | ||
5431 | r = stalloc(fulllen); | ||
5432 | } | ||
5433 | q = r; | ||
5434 | if (len > 0) { | ||
5435 | q = (char *)memcpy(q, str, len) + len; | ||
5436 | } | ||
5437 | } | ||
5438 | niro | 984 | |
5439 | niro | 816 | inquotes = (flag & RMESCAPE_QUOTED) ^ RMESCAPE_QUOTED; |
5440 | globbing = flag & RMESCAPE_GLOB; | ||
5441 | niro | 984 | protect_against_glob = globbing; |
5442 | niro | 816 | while (*p) { |
5443 | niro | 984 | if ((unsigned char)*p == CTLQUOTEMARK) { |
5444 | // TODO: if no RMESCAPE_QUOTED in flags, inquotes never becomes 0 | ||
5445 | // (alternates between RMESCAPE_QUOTED and ~RMESCAPE_QUOTED). Is it ok? | ||
5446 | // Note: both inquotes and protect_against_glob only affect whether | ||
5447 | // CTLESC,<ch> gets converted to <ch> or to \<ch> | ||
5448 | niro | 816 | inquotes = ~inquotes; |
5449 | p++; | ||
5450 | niro | 984 | protect_against_glob = globbing; |
5451 | niro | 816 | continue; |
5452 | } | ||
5453 | if (*p == '\\') { | ||
5454 | /* naked back slash */ | ||
5455 | niro | 984 | protect_against_glob = 0; |
5456 | niro | 816 | goto copy; |
5457 | } | ||
5458 | niro | 984 | if ((unsigned char)*p == CTLESC) { |
5459 | niro | 816 | p++; |
5460 | niro | 984 | if (protect_against_glob && inquotes && *p != '/') { |
5461 | niro | 816 | *q++ = '\\'; |
5462 | niro | 532 | } |
5463 | } | ||
5464 | niro | 984 | protect_against_glob = globbing; |
5465 | niro | 816 | copy: |
5466 | *q++ = *p++; | ||
5467 | niro | 532 | } |
5468 | niro | 816 | *q = '\0'; |
5469 | if (flag & RMESCAPE_GROW) { | ||
5470 | expdest = r; | ||
5471 | STADJUST(q - r + 1, expdest); | ||
5472 | } | ||
5473 | return r; | ||
5474 | niro | 532 | } |
5475 | niro | 816 | #define pmatch(a, b) !fnmatch((a), (b), 0) |
5476 | niro | 532 | |
5477 | /* | ||
5478 | niro | 816 | * Prepare a pattern for a expmeta (internal glob(3)) call. |
5479 | niro | 532 | * |
5480 | niro | 816 | * Returns an stalloced string. |
5481 | niro | 532 | */ |
5482 | niro | 816 | static char * |
5483 | preglob(const char *pattern, int quoted, int flag) | ||
5484 | niro | 532 | { |
5485 | niro | 816 | flag |= RMESCAPE_GLOB; |
5486 | if (quoted) { | ||
5487 | flag |= RMESCAPE_QUOTED; | ||
5488 | niro | 532 | } |
5489 | niro | 984 | return rmescapes((char *)pattern, flag); |
5490 | niro | 532 | } |
5491 | |||
5492 | /* | ||
5493 | niro | 816 | * Put a string on the stack. |
5494 | niro | 532 | */ |
5495 | static void | ||
5496 | niro | 816 | memtodest(const char *p, size_t len, int syntax, int quotes) |
5497 | niro | 532 | { |
5498 | niro | 816 | char *q = expdest; |
5499 | niro | 532 | |
5500 | niro | 984 | q = makestrspace(quotes ? len * 2 : len, q); |
5501 | niro | 532 | |
5502 | niro | 816 | while (len--) { |
5503 | niro | 984 | unsigned char c = *p++; |
5504 | if (c == '\0') | ||
5505 | niro | 816 | continue; |
5506 | niro | 984 | if (quotes) { |
5507 | int n = SIT(c, syntax); | ||
5508 | if (n == CCTL || n == CBACK) | ||
5509 | USTPUTC(CTLESC, q); | ||
5510 | } | ||
5511 | niro | 816 | USTPUTC(c, q); |
5512 | } | ||
5513 | niro | 532 | |
5514 | niro | 816 | expdest = q; |
5515 | } | ||
5516 | niro | 532 | |
5517 | niro | 816 | static void |
5518 | strtodest(const char *p, int syntax, int quotes) | ||
5519 | niro | 532 | { |
5520 | niro | 816 | memtodest(p, strlen(p), syntax, quotes); |
5521 | niro | 532 | } |
5522 | |||
5523 | /* | ||
5524 | niro | 816 | * Record the fact that we have to scan this region of the |
5525 | * string for IFS characters. | ||
5526 | niro | 532 | */ |
5527 | niro | 816 | static void |
5528 | recordregion(int start, int end, int nulonly) | ||
5529 | niro | 532 | { |
5530 | niro | 816 | struct ifsregion *ifsp; |
5531 | niro | 532 | |
5532 | niro | 816 | if (ifslastp == NULL) { |
5533 | ifsp = &ifsfirst; | ||
5534 | } else { | ||
5535 | INT_OFF; | ||
5536 | ifsp = ckzalloc(sizeof(*ifsp)); | ||
5537 | /*ifsp->next = NULL; - ckzalloc did it */ | ||
5538 | ifslastp->next = ifsp; | ||
5539 | INT_ON; | ||
5540 | } | ||
5541 | ifslastp = ifsp; | ||
5542 | ifslastp->begoff = start; | ||
5543 | ifslastp->endoff = end; | ||
5544 | ifslastp->nulonly = nulonly; | ||
5545 | niro | 532 | } |
5546 | |||
5547 | static void | ||
5548 | niro | 816 | removerecordregions(int endoff) |
5549 | niro | 532 | { |
5550 | niro | 816 | if (ifslastp == NULL) |
5551 | return; | ||
5552 | niro | 532 | |
5553 | niro | 816 | if (ifsfirst.endoff > endoff) { |
5554 | while (ifsfirst.next != NULL) { | ||
5555 | struct ifsregion *ifsp; | ||
5556 | INT_OFF; | ||
5557 | ifsp = ifsfirst.next->next; | ||
5558 | free(ifsfirst.next); | ||
5559 | ifsfirst.next = ifsp; | ||
5560 | INT_ON; | ||
5561 | } | ||
5562 | if (ifsfirst.begoff > endoff) | ||
5563 | ifslastp = NULL; | ||
5564 | else { | ||
5565 | ifslastp = &ifsfirst; | ||
5566 | ifsfirst.endoff = endoff; | ||
5567 | } | ||
5568 | return; | ||
5569 | } | ||
5570 | |||
5571 | ifslastp = &ifsfirst; | ||
5572 | while (ifslastp->next && ifslastp->next->begoff < endoff) | ||
5573 | ifslastp=ifslastp->next; | ||
5574 | while (ifslastp->next != NULL) { | ||
5575 | struct ifsregion *ifsp; | ||
5576 | INT_OFF; | ||
5577 | ifsp = ifslastp->next->next; | ||
5578 | free(ifslastp->next); | ||
5579 | ifslastp->next = ifsp; | ||
5580 | INT_ON; | ||
5581 | } | ||
5582 | if (ifslastp->endoff > endoff) | ||
5583 | ifslastp->endoff = endoff; | ||
5584 | niro | 532 | } |
5585 | |||
5586 | niro | 816 | static char * |
5587 | niro | 984 | exptilde(char *startp, char *p, int flags) |
5588 | niro | 816 | { |
5589 | niro | 984 | unsigned char c; |
5590 | niro | 816 | char *name; |
5591 | struct passwd *pw; | ||
5592 | const char *home; | ||
5593 | niro | 984 | int quotes = flags & (EXP_FULL | EXP_CASE | EXP_REDIR); |
5594 | niro | 816 | int startloc; |
5595 | niro | 532 | |
5596 | niro | 816 | name = p + 1; |
5597 | niro | 532 | |
5598 | niro | 816 | while ((c = *++p) != '\0') { |
5599 | switch (c) { | ||
5600 | case CTLESC: | ||
5601 | return startp; | ||
5602 | case CTLQUOTEMARK: | ||
5603 | return startp; | ||
5604 | case ':': | ||
5605 | niro | 984 | if (flags & EXP_VARTILDE) |
5606 | niro | 816 | goto done; |
5607 | break; | ||
5608 | case '/': | ||
5609 | case CTLENDVAR: | ||
5610 | goto done; | ||
5611 | } | ||
5612 | } | ||
5613 | done: | ||
5614 | *p = '\0'; | ||
5615 | if (*name == '\0') { | ||
5616 | home = lookupvar(homestr); | ||
5617 | } else { | ||
5618 | pw = getpwnam(name); | ||
5619 | if (pw == NULL) | ||
5620 | goto lose; | ||
5621 | home = pw->pw_dir; | ||
5622 | } | ||
5623 | if (!home || !*home) | ||
5624 | goto lose; | ||
5625 | *p = c; | ||
5626 | startloc = expdest - (char *)stackblock(); | ||
5627 | strtodest(home, SQSYNTAX, quotes); | ||
5628 | recordregion(startloc, expdest - (char *)stackblock(), 0); | ||
5629 | return p; | ||
5630 | lose: | ||
5631 | *p = c; | ||
5632 | return startp; | ||
5633 | niro | 532 | } |
5634 | |||
5635 | /* | ||
5636 | niro | 816 | * Execute a command inside back quotes. If it's a builtin command, we |
5637 | * want to save its output in a block obtained from malloc. Otherwise | ||
5638 | * we fork off a subprocess and get the output of the command via a pipe. | ||
5639 | * Should be called with interrupts off. | ||
5640 | niro | 532 | */ |
5641 | niro | 816 | struct backcmd { /* result of evalbackcmd */ |
5642 | int fd; /* file descriptor to read from */ | ||
5643 | int nleft; /* number of chars in buffer */ | ||
5644 | char *buf; /* buffer */ | ||
5645 | struct job *jp; /* job structure for command */ | ||
5646 | }; | ||
5647 | niro | 532 | |
5648 | niro | 816 | /* These forward decls are needed to use "eval" code for backticks handling: */ |
5649 | static uint8_t back_exitstatus; /* exit status of backquoted command */ | ||
5650 | #define EV_EXIT 01 /* exit after evaluating tree */ | ||
5651 | static void evaltree(union node *, int); | ||
5652 | niro | 532 | |
5653 | niro | 984 | static void FAST_FUNC |
5654 | niro | 816 | evalbackcmd(union node *n, struct backcmd *result) |
5655 | niro | 532 | { |
5656 | niro | 816 | int saveherefd; |
5657 | niro | 532 | |
5658 | niro | 816 | result->fd = -1; |
5659 | result->buf = NULL; | ||
5660 | result->nleft = 0; | ||
5661 | result->jp = NULL; | ||
5662 | niro | 984 | if (n == NULL) |
5663 | niro | 532 | goto out; |
5664 | |||
5665 | niro | 816 | saveherefd = herefd; |
5666 | herefd = -1; | ||
5667 | niro | 532 | |
5668 | niro | 816 | { |
5669 | int pip[2]; | ||
5670 | struct job *jp; | ||
5671 | niro | 532 | |
5672 | niro | 816 | if (pipe(pip) < 0) |
5673 | ash_msg_and_raise_error("pipe call failed"); | ||
5674 | jp = makejob(/*n,*/ 1); | ||
5675 | if (forkshell(jp, n, FORK_NOJOB) == 0) { | ||
5676 | FORCE_INT_ON; | ||
5677 | close(pip[0]); | ||
5678 | if (pip[1] != 1) { | ||
5679 | /*close(1);*/ | ||
5680 | copyfd(pip[1], 1 | COPYFD_EXACT); | ||
5681 | close(pip[1]); | ||
5682 | } | ||
5683 | eflag = 0; | ||
5684 | evaltree(n, EV_EXIT); /* actually evaltreenr... */ | ||
5685 | /* NOTREACHED */ | ||
5686 | niro | 532 | } |
5687 | niro | 816 | close(pip[1]); |
5688 | result->fd = pip[0]; | ||
5689 | result->jp = jp; | ||
5690 | niro | 532 | } |
5691 | niro | 816 | herefd = saveherefd; |
5692 | out: | ||
5693 | TRACE(("evalbackcmd done: fd=%d buf=0x%x nleft=%d jp=0x%x\n", | ||
5694 | result->fd, result->buf, result->nleft, result->jp)); | ||
5695 | niro | 532 | } |
5696 | |||
5697 | niro | 816 | /* |
5698 | * Expand stuff in backwards quotes. | ||
5699 | */ | ||
5700 | static void | ||
5701 | expbackq(union node *cmd, int quoted, int quotes) | ||
5702 | niro | 532 | { |
5703 | niro | 816 | struct backcmd in; |
5704 | niro | 532 | int i; |
5705 | niro | 816 | char buf[128]; |
5706 | char *p; | ||
5707 | char *dest; | ||
5708 | int startloc; | ||
5709 | int syntax = quoted ? DQSYNTAX : BASESYNTAX; | ||
5710 | struct stackmark smark; | ||
5711 | niro | 532 | |
5712 | niro | 816 | INT_OFF; |
5713 | setstackmark(&smark); | ||
5714 | dest = expdest; | ||
5715 | startloc = dest - (char *)stackblock(); | ||
5716 | grabstackstr(dest); | ||
5717 | evalbackcmd(cmd, &in); | ||
5718 | popstackmark(&smark); | ||
5719 | |||
5720 | p = in.buf; | ||
5721 | i = in.nleft; | ||
5722 | if (i == 0) | ||
5723 | goto read; | ||
5724 | for (;;) { | ||
5725 | memtodest(p, i, syntax, quotes); | ||
5726 | read: | ||
5727 | if (in.fd < 0) | ||
5728 | break; | ||
5729 | i = nonblock_safe_read(in.fd, buf, sizeof(buf)); | ||
5730 | TRACE(("expbackq: read returns %d\n", i)); | ||
5731 | if (i <= 0) | ||
5732 | break; | ||
5733 | p = buf; | ||
5734 | niro | 532 | } |
5735 | |||
5736 | niro | 816 | free(in.buf); |
5737 | if (in.fd >= 0) { | ||
5738 | close(in.fd); | ||
5739 | back_exitstatus = waitforjob(in.jp); | ||
5740 | } | ||
5741 | INT_ON; | ||
5742 | niro | 532 | |
5743 | niro | 816 | /* Eat all trailing newlines */ |
5744 | dest = expdest; | ||
5745 | for (; dest > (char *)stackblock() && dest[-1] == '\n';) | ||
5746 | STUNPUTC(dest); | ||
5747 | expdest = dest; | ||
5748 | niro | 532 | |
5749 | niro | 816 | if (quoted == 0) |
5750 | recordregion(startloc, dest - (char *)stackblock(), 0); | ||
5751 | TRACE(("evalbackq: size=%d: \"%.*s\"\n", | ||
5752 | (dest - (char *)stackblock()) - startloc, | ||
5753 | (dest - (char *)stackblock()) - startloc, | ||
5754 | stackblock() + startloc)); | ||
5755 | niro | 532 | } |
5756 | |||
5757 | niro | 984 | #if ENABLE_SH_MATH_SUPPORT |
5758 | niro | 532 | /* |
5759 | niro | 816 | * Expand arithmetic expression. Backup to start of expression, |
5760 | * evaluate, place result in (backed up) result, adjust string position. | ||
5761 | niro | 532 | */ |
5762 | niro | 816 | static void |
5763 | expari(int quotes) | ||
5764 | { | ||
5765 | char *p, *start; | ||
5766 | int begoff; | ||
5767 | int flag; | ||
5768 | int len; | ||
5769 | niro | 532 | |
5770 | niro | 984 | /* ifsfree(); */ |
5771 | niro | 532 | |
5772 | niro | 816 | /* |
5773 | * This routine is slightly over-complicated for | ||
5774 | * efficiency. Next we scan backwards looking for the | ||
5775 | * start of arithmetic. | ||
5776 | */ | ||
5777 | start = stackblock(); | ||
5778 | p = expdest - 1; | ||
5779 | *p = '\0'; | ||
5780 | p--; | ||
5781 | do { | ||
5782 | int esc; | ||
5783 | niro | 532 | |
5784 | niro | 984 | while ((unsigned char)*p != CTLARI) { |
5785 | niro | 816 | p--; |
5786 | #if DEBUG | ||
5787 | if (p < start) { | ||
5788 | ash_msg_and_raise_error("missing CTLARI (shouldn't happen)"); | ||
5789 | } | ||
5790 | #endif | ||
5791 | } | ||
5792 | niro | 532 | |
5793 | niro | 816 | esc = esclen(start, p); |
5794 | if (!(esc % 2)) { | ||
5795 | break; | ||
5796 | } | ||
5797 | niro | 532 | |
5798 | niro | 816 | p -= esc + 1; |
5799 | } while (1); | ||
5800 | niro | 532 | |
5801 | niro | 816 | begoff = p - start; |
5802 | niro | 532 | |
5803 | niro | 816 | removerecordregions(begoff); |
5804 | niro | 532 | |
5805 | niro | 816 | flag = p[1]; |
5806 | niro | 532 | |
5807 | niro | 816 | expdest = p; |
5808 | niro | 532 | |
5809 | niro | 816 | if (quotes) |
5810 | niro | 984 | rmescapes(p + 2, 0); |
5811 | niro | 532 | |
5812 | niro | 984 | len = cvtnum(ash_arith(p + 2)); |
5813 | niro | 532 | |
5814 | niro | 816 | if (flag != '"') |
5815 | recordregion(begoff, begoff + len, 0); | ||
5816 | niro | 532 | } |
5817 | niro | 816 | #endif |
5818 | niro | 532 | |
5819 | niro | 816 | /* argstr needs it */ |
5820 | niro | 984 | static char *evalvar(char *p, int flags, struct strlist *var_str_list); |
5821 | niro | 532 | |
5822 | /* | ||
5823 | * Perform variable and command substitution. If EXP_FULL is set, output CTLESC | ||
5824 | * characters to allow for further processing. Otherwise treat | ||
5825 | * $@ like $* since no splitting will be performed. | ||
5826 | niro | 816 | * |
5827 | * var_str_list (can be NULL) is a list of "VAR=val" strings which take precedence | ||
5828 | * over shell varables. Needed for "A=a B=$A; echo $B" case - we use it | ||
5829 | * for correct expansion of "B=$A" word. | ||
5830 | niro | 532 | */ |
5831 | static void | ||
5832 | niro | 984 | argstr(char *p, int flags, struct strlist *var_str_list) |
5833 | niro | 532 | { |
5834 | niro | 816 | static const char spclchars[] ALIGN1 = { |
5835 | niro | 532 | '=', |
5836 | ':', | ||
5837 | CTLQUOTEMARK, | ||
5838 | CTLENDVAR, | ||
5839 | CTLESC, | ||
5840 | CTLVAR, | ||
5841 | CTLBACKQ, | ||
5842 | CTLBACKQ | CTLQUOTE, | ||
5843 | niro | 984 | #if ENABLE_SH_MATH_SUPPORT |
5844 | niro | 532 | CTLENDARI, |
5845 | #endif | ||
5846 | niro | 984 | '\0' |
5847 | niro | 532 | }; |
5848 | const char *reject = spclchars; | ||
5849 | niro | 984 | int quotes = flags & (EXP_FULL | EXP_CASE | EXP_REDIR); /* do CTLESC */ |
5850 | int breakall = flags & EXP_WORD; | ||
5851 | niro | 532 | int inquotes; |
5852 | size_t length; | ||
5853 | int startloc; | ||
5854 | |||
5855 | niro | 984 | if (!(flags & EXP_VARTILDE)) { |
5856 | niro | 532 | reject += 2; |
5857 | niro | 984 | } else if (flags & EXP_VARTILDE2) { |
5858 | niro | 532 | reject++; |
5859 | } | ||
5860 | inquotes = 0; | ||
5861 | length = 0; | ||
5862 | niro | 984 | if (flags & EXP_TILDE) { |
5863 | niro | 532 | char *q; |
5864 | |||
5865 | niro | 984 | flags &= ~EXP_TILDE; |
5866 | niro | 816 | tilde: |
5867 | niro | 532 | q = p; |
5868 | niro | 984 | if (*q == CTLESC && (flags & EXP_QWORD)) |
5869 | niro | 532 | q++; |
5870 | if (*q == '~') | ||
5871 | niro | 984 | p = exptilde(p, q, flags); |
5872 | niro | 532 | } |
5873 | niro | 816 | start: |
5874 | niro | 532 | startloc = expdest - (char *)stackblock(); |
5875 | for (;;) { | ||
5876 | niro | 984 | unsigned char c; |
5877 | |||
5878 | niro | 532 | length += strcspn(p + length, reject); |
5879 | c = p[length]; | ||
5880 | niro | 984 | if (c) { |
5881 | if (!(c & 0x80) | ||
5882 | #if ENABLE_SH_MATH_SUPPORT | ||
5883 | || c == CTLENDARI | ||
5884 | niro | 532 | #endif |
5885 | niro | 984 | ) { |
5886 | /* c == '=' || c == ':' || c == CTLENDARI */ | ||
5887 | length++; | ||
5888 | } | ||
5889 | niro | 532 | } |
5890 | if (length > 0) { | ||
5891 | int newloc; | ||
5892 | niro | 816 | expdest = stack_nputstr(p, length, expdest); |
5893 | niro | 532 | newloc = expdest - (char *)stackblock(); |
5894 | if (breakall && !inquotes && newloc > startloc) { | ||
5895 | recordregion(startloc, newloc, 0); | ||
5896 | } | ||
5897 | startloc = newloc; | ||
5898 | } | ||
5899 | p += length + 1; | ||
5900 | length = 0; | ||
5901 | |||
5902 | switch (c) { | ||
5903 | case '\0': | ||
5904 | goto breakloop; | ||
5905 | case '=': | ||
5906 | niro | 984 | if (flags & EXP_VARTILDE2) { |
5907 | niro | 532 | p--; |
5908 | continue; | ||
5909 | } | ||
5910 | niro | 984 | flags |= EXP_VARTILDE2; |
5911 | niro | 532 | reject++; |
5912 | /* fall through */ | ||
5913 | case ':': | ||
5914 | /* | ||
5915 | * sort of a hack - expand tildes in variable | ||
5916 | * assignments (after the first '=' and after ':'s). | ||
5917 | */ | ||
5918 | if (*--p == '~') { | ||
5919 | goto tilde; | ||
5920 | } | ||
5921 | continue; | ||
5922 | } | ||
5923 | |||
5924 | switch (c) { | ||
5925 | case CTLENDVAR: /* ??? */ | ||
5926 | goto breakloop; | ||
5927 | case CTLQUOTEMARK: | ||
5928 | /* "$@" syntax adherence hack */ | ||
5929 | niro | 984 | if (!inquotes |
5930 | && memcmp(p, dolatstr, 4) == 0 | ||
5931 | && ( p[4] == CTLQUOTEMARK | ||
5932 | || (p[4] == CTLENDVAR && p[5] == CTLQUOTEMARK) | ||
5933 | ) | ||
5934 | niro | 532 | ) { |
5935 | niro | 984 | p = evalvar(p + 1, flags, /* var_str_list: */ NULL) + 1; |
5936 | niro | 532 | goto start; |
5937 | } | ||
5938 | inquotes = !inquotes; | ||
5939 | niro | 816 | addquote: |
5940 | niro | 532 | if (quotes) { |
5941 | p--; | ||
5942 | length++; | ||
5943 | startloc++; | ||
5944 | } | ||
5945 | break; | ||
5946 | case CTLESC: | ||
5947 | startloc++; | ||
5948 | length++; | ||
5949 | goto addquote; | ||
5950 | case CTLVAR: | ||
5951 | niro | 984 | p = evalvar(p, flags, var_str_list); |
5952 | niro | 532 | goto start; |
5953 | case CTLBACKQ: | ||
5954 | niro | 984 | c = '\0'; |
5955 | niro | 532 | case CTLBACKQ|CTLQUOTE: |
5956 | expbackq(argbackq->n, c, quotes); | ||
5957 | argbackq = argbackq->next; | ||
5958 | goto start; | ||
5959 | niro | 984 | #if ENABLE_SH_MATH_SUPPORT |
5960 | niro | 532 | case CTLENDARI: |
5961 | p--; | ||
5962 | expari(quotes); | ||
5963 | goto start; | ||
5964 | #endif | ||
5965 | } | ||
5966 | } | ||
5967 | niro | 816 | breakloop: |
5968 | niro | 532 | ; |
5969 | } | ||
5970 | |||
5971 | static char * | ||
5972 | niro | 816 | scanleft(char *startp, char *rmesc, char *rmescend UNUSED_PARAM, char *str, int quotes, |
5973 | int zero) | ||
5974 | niro | 532 | { |
5975 | niro | 816 | // This commented out code was added by James Simmons <jsimmons@infradead.org> |
5976 | // as part of a larger change when he added support for ${var/a/b}. | ||
5977 | // However, it broke # and % operators: | ||
5978 | // | ||
5979 | //var=ababcdcd | ||
5980 | // ok bad | ||
5981 | //echo ${var#ab} abcdcd abcdcd | ||
5982 | //echo ${var##ab} abcdcd abcdcd | ||
5983 | //echo ${var#a*b} abcdcd ababcdcd (!) | ||
5984 | //echo ${var##a*b} cdcd cdcd | ||
5985 | //echo ${var#?} babcdcd ababcdcd (!) | ||
5986 | //echo ${var##?} babcdcd babcdcd | ||
5987 | //echo ${var#*} ababcdcd babcdcd (!) | ||
5988 | //echo ${var##*} | ||
5989 | //echo ${var%cd} ababcd ababcd | ||
5990 | //echo ${var%%cd} ababcd abab (!) | ||
5991 | //echo ${var%c*d} ababcd ababcd | ||
5992 | //echo ${var%%c*d} abab ababcdcd (!) | ||
5993 | //echo ${var%?} ababcdc ababcdc | ||
5994 | //echo ${var%%?} ababcdc ababcdcd (!) | ||
5995 | //echo ${var%*} ababcdcd ababcdcd | ||
5996 | //echo ${var%%*} | ||
5997 | // | ||
5998 | // Commenting it back out helped. Remove it completely if it really | ||
5999 | // is not needed. | ||
6000 | niro | 532 | |
6001 | niro | 816 | char *loc, *loc2; //, *full; |
6002 | niro | 532 | char c; |
6003 | |||
6004 | loc = startp; | ||
6005 | loc2 = rmesc; | ||
6006 | do { | ||
6007 | niro | 816 | int match; // = strlen(str); |
6008 | niro | 532 | const char *s = loc2; |
6009 | niro | 816 | |
6010 | niro | 532 | c = *loc2; |
6011 | if (zero) { | ||
6012 | *loc2 = '\0'; | ||
6013 | s = rmesc; | ||
6014 | } | ||
6015 | niro | 816 | match = pmatch(str, s); // this line was deleted |
6016 | |||
6017 | // // chop off end if its '*' | ||
6018 | // full = strrchr(str, '*'); | ||
6019 | // if (full && full != str) | ||
6020 | // match--; | ||
6021 | // | ||
6022 | // // If str starts with '*' replace with s. | ||
6023 | // if ((*str == '*') && strlen(s) >= match) { | ||
6024 | // full = xstrdup(s); | ||
6025 | // strncpy(full+strlen(s)-match+1, str+1, match-1); | ||
6026 | // } else | ||
6027 | // full = xstrndup(str, match); | ||
6028 | // match = strncmp(s, full, strlen(full)); | ||
6029 | // free(full); | ||
6030 | // | ||
6031 | niro | 532 | *loc2 = c; |
6032 | niro | 816 | if (match) // if (!match) |
6033 | niro | 532 | return loc; |
6034 | niro | 984 | if (quotes && (unsigned char)*loc == CTLESC) |
6035 | niro | 532 | loc++; |
6036 | loc++; | ||
6037 | loc2++; | ||
6038 | } while (c); | ||
6039 | return 0; | ||
6040 | } | ||
6041 | |||
6042 | static char * | ||
6043 | scanright(char *startp, char *rmesc, char *rmescend, char *str, int quotes, | ||
6044 | int zero) | ||
6045 | { | ||
6046 | int esc = 0; | ||
6047 | char *loc; | ||
6048 | char *loc2; | ||
6049 | |||
6050 | for (loc = str - 1, loc2 = rmescend; loc >= startp; loc2--) { | ||
6051 | int match; | ||
6052 | char c = *loc2; | ||
6053 | const char *s = loc2; | ||
6054 | if (zero) { | ||
6055 | *loc2 = '\0'; | ||
6056 | s = rmesc; | ||
6057 | } | ||
6058 | match = pmatch(str, s); | ||
6059 | *loc2 = c; | ||
6060 | if (match) | ||
6061 | return loc; | ||
6062 | loc--; | ||
6063 | if (quotes) { | ||
6064 | if (--esc < 0) { | ||
6065 | esc = esclen(startp, loc); | ||
6066 | } | ||
6067 | if (esc % 2) { | ||
6068 | esc--; | ||
6069 | loc--; | ||
6070 | } | ||
6071 | } | ||
6072 | } | ||
6073 | return 0; | ||
6074 | } | ||
6075 | |||
6076 | niro | 816 | static void varunset(const char *, const char *, const char *, int) NORETURN; |
6077 | static void | ||
6078 | varunset(const char *end, const char *var, const char *umsg, int varflags) | ||
6079 | { | ||
6080 | const char *msg; | ||
6081 | const char *tail; | ||
6082 | |||
6083 | tail = nullstr; | ||
6084 | msg = "parameter not set"; | ||
6085 | if (umsg) { | ||
6086 | niro | 984 | if ((unsigned char)*end == CTLENDVAR) { |
6087 | niro | 816 | if (varflags & VSNUL) |
6088 | tail = " or null"; | ||
6089 | niro | 984 | } else { |
6090 | niro | 816 | msg = umsg; |
6091 | niro | 984 | } |
6092 | niro | 816 | } |
6093 | ash_msg_and_raise_error("%.*s: %s%s", end - var - 1, var, msg, tail); | ||
6094 | } | ||
6095 | |||
6096 | #if ENABLE_ASH_BASH_COMPAT | ||
6097 | static char * | ||
6098 | parse_sub_pattern(char *arg, int inquotes) | ||
6099 | { | ||
6100 | char *idx, *repl = NULL; | ||
6101 | unsigned char c; | ||
6102 | |||
6103 | idx = arg; | ||
6104 | while (1) { | ||
6105 | c = *arg; | ||
6106 | if (!c) | ||
6107 | break; | ||
6108 | if (c == '/') { | ||
6109 | /* Only the first '/' seen is our separator */ | ||
6110 | if (!repl) { | ||
6111 | repl = idx + 1; | ||
6112 | c = '\0'; | ||
6113 | } | ||
6114 | } | ||
6115 | *idx++ = c; | ||
6116 | if (!inquotes && c == '\\' && arg[1] == '\\') | ||
6117 | arg++; /* skip both \\, not just first one */ | ||
6118 | arg++; | ||
6119 | } | ||
6120 | *idx = c; /* NUL */ | ||
6121 | |||
6122 | return repl; | ||
6123 | } | ||
6124 | #endif /* ENABLE_ASH_BASH_COMPAT */ | ||
6125 | |||
6126 | niro | 532 | static const char * |
6127 | niro | 816 | subevalvar(char *p, char *str, int strloc, int subtype, |
6128 | int startloc, int varflags, int quotes, struct strlist *var_str_list) | ||
6129 | niro | 532 | { |
6130 | niro | 816 | struct nodelist *saveargbackq = argbackq; |
6131 | niro | 532 | char *startp; |
6132 | char *loc; | ||
6133 | niro | 816 | char *rmesc, *rmescend; |
6134 | niro | 984 | IF_ASH_BASH_COMPAT(char *repl = NULL;) |
6135 | IF_ASH_BASH_COMPAT(char null = '\0';) | ||
6136 | IF_ASH_BASH_COMPAT(int pos, len, orig_len;) | ||
6137 | niro | 532 | int saveherefd = herefd; |
6138 | niro | 816 | int amount, workloc, resetloc; |
6139 | niro | 532 | int zero; |
6140 | niro | 816 | char *(*scan)(char*, char*, char*, char*, int, int); |
6141 | niro | 532 | |
6142 | herefd = -1; | ||
6143 | niro | 816 | argstr(p, (subtype != VSASSIGN && subtype != VSQUESTION) ? EXP_CASE : 0, |
6144 | var_str_list); | ||
6145 | niro | 532 | STPUTC('\0', expdest); |
6146 | herefd = saveherefd; | ||
6147 | argbackq = saveargbackq; | ||
6148 | niro | 816 | startp = (char *)stackblock() + startloc; |
6149 | niro | 532 | |
6150 | switch (subtype) { | ||
6151 | case VSASSIGN: | ||
6152 | setvar(str, startp, 0); | ||
6153 | amount = startp - expdest; | ||
6154 | STADJUST(amount, expdest); | ||
6155 | return startp; | ||
6156 | |||
6157 | niro | 816 | #if ENABLE_ASH_BASH_COMPAT |
6158 | case VSSUBSTR: | ||
6159 | loc = str = stackblock() + strloc; | ||
6160 | niro | 984 | /* Read POS in ${var:POS:LEN} */ |
6161 | pos = atoi(loc); /* number(loc) errors out on "1:4" */ | ||
6162 | niro | 816 | len = str - startp - 1; |
6163 | |||
6164 | /* *loc != '\0', guaranteed by parser */ | ||
6165 | if (quotes) { | ||
6166 | char *ptr; | ||
6167 | |||
6168 | niro | 984 | /* Adjust the length by the number of escapes */ |
6169 | niro | 816 | for (ptr = startp; ptr < (str - 1); ptr++) { |
6170 | niro | 984 | if ((unsigned char)*ptr == CTLESC) { |
6171 | niro | 816 | len--; |
6172 | ptr++; | ||
6173 | } | ||
6174 | } | ||
6175 | } | ||
6176 | orig_len = len; | ||
6177 | |||
6178 | if (*loc++ == ':') { | ||
6179 | niro | 984 | /* ${var::LEN} */ |
6180 | len = number(loc); | ||
6181 | niro | 816 | } else { |
6182 | niro | 984 | /* Skip POS in ${var:POS:LEN} */ |
6183 | niro | 816 | len = orig_len; |
6184 | niro | 984 | while (*loc && *loc != ':') { |
6185 | /* TODO? | ||
6186 | * bash complains on: var=qwe; echo ${var:1a:123} | ||
6187 | if (!isdigit(*loc)) | ||
6188 | ash_msg_and_raise_error(msg_illnum, str); | ||
6189 | */ | ||
6190 | niro | 816 | loc++; |
6191 | niro | 984 | } |
6192 | if (*loc++ == ':') { | ||
6193 | len = number(loc); | ||
6194 | } | ||
6195 | niro | 816 | } |
6196 | if (pos >= orig_len) { | ||
6197 | pos = 0; | ||
6198 | len = 0; | ||
6199 | } | ||
6200 | if (len > (orig_len - pos)) | ||
6201 | len = orig_len - pos; | ||
6202 | |||
6203 | for (str = startp; pos; str++, pos--) { | ||
6204 | niro | 984 | if (quotes && (unsigned char)*str == CTLESC) |
6205 | niro | 816 | str++; |
6206 | } | ||
6207 | for (loc = startp; len; len--) { | ||
6208 | niro | 984 | if (quotes && (unsigned char)*str == CTLESC) |
6209 | niro | 816 | *loc++ = *str++; |
6210 | *loc++ = *str++; | ||
6211 | } | ||
6212 | *loc = '\0'; | ||
6213 | amount = loc - expdest; | ||
6214 | STADJUST(amount, expdest); | ||
6215 | return loc; | ||
6216 | #endif | ||
6217 | |||
6218 | niro | 532 | case VSQUESTION: |
6219 | varunset(p, str, startp, varflags); | ||
6220 | /* NOTREACHED */ | ||
6221 | } | ||
6222 | niro | 816 | resetloc = expdest - (char *)stackblock(); |
6223 | niro | 532 | |
6224 | niro | 816 | /* We'll comeback here if we grow the stack while handling |
6225 | * a VSREPLACE or VSREPLACEALL, since our pointers into the | ||
6226 | * stack will need rebasing, and we'll need to remove our work | ||
6227 | * areas each time | ||
6228 | */ | ||
6229 | niro | 984 | IF_ASH_BASH_COMPAT(restart:) |
6230 | niro | 532 | |
6231 | niro | 816 | amount = expdest - ((char *)stackblock() + resetloc); |
6232 | STADJUST(-amount, expdest); | ||
6233 | startp = (char *)stackblock() + startloc; | ||
6234 | |||
6235 | niro | 532 | rmesc = startp; |
6236 | niro | 816 | rmescend = (char *)stackblock() + strloc; |
6237 | niro | 532 | if (quotes) { |
6238 | niro | 984 | rmesc = rmescapes(startp, RMESCAPE_ALLOC | RMESCAPE_GROW); |
6239 | niro | 532 | if (rmesc != startp) { |
6240 | rmescend = expdest; | ||
6241 | niro | 816 | startp = (char *)stackblock() + startloc; |
6242 | niro | 532 | } |
6243 | } | ||
6244 | rmescend--; | ||
6245 | niro | 816 | str = (char *)stackblock() + strloc; |
6246 | niro | 532 | preglob(str, varflags & VSQUOTE, 0); |
6247 | niro | 816 | workloc = expdest - (char *)stackblock(); |
6248 | niro | 532 | |
6249 | niro | 816 | #if ENABLE_ASH_BASH_COMPAT |
6250 | if (subtype == VSREPLACE || subtype == VSREPLACEALL) { | ||
6251 | char *idx, *end, *restart_detect; | ||
6252 | niro | 532 | |
6253 | niro | 816 | if (!repl) { |
6254 | repl = parse_sub_pattern(str, varflags & VSQUOTE); | ||
6255 | if (!repl) | ||
6256 | repl = &null; | ||
6257 | niro | 532 | } |
6258 | |||
6259 | niro | 816 | /* If there's no pattern to match, return the expansion unmolested */ |
6260 | if (*str == '\0') | ||
6261 | return 0; | ||
6262 | niro | 532 | |
6263 | niro | 816 | len = 0; |
6264 | idx = startp; | ||
6265 | end = str - 1; | ||
6266 | while (idx < end) { | ||
6267 | loc = scanright(idx, rmesc, rmescend, str, quotes, 1); | ||
6268 | if (!loc) { | ||
6269 | /* No match, advance */ | ||
6270 | restart_detect = stackblock(); | ||
6271 | STPUTC(*idx, expdest); | ||
6272 | niro | 984 | if (quotes && (unsigned char)*idx == CTLESC) { |
6273 | niro | 816 | idx++; |
6274 | len++; | ||
6275 | STPUTC(*idx, expdest); | ||
6276 | } | ||
6277 | if (stackblock() != restart_detect) | ||
6278 | goto restart; | ||
6279 | idx++; | ||
6280 | len++; | ||
6281 | rmesc++; | ||
6282 | continue; | ||
6283 | } | ||
6284 | niro | 532 | |
6285 | niro | 816 | if (subtype == VSREPLACEALL) { |
6286 | while (idx < loc) { | ||
6287 | niro | 984 | if (quotes && (unsigned char)*idx == CTLESC) |
6288 | niro | 816 | idx++; |
6289 | idx++; | ||
6290 | rmesc++; | ||
6291 | } | ||
6292 | niro | 984 | } else { |
6293 | niro | 816 | idx = loc; |
6294 | niro | 984 | } |
6295 | niro | 532 | |
6296 | niro | 816 | for (loc = repl; *loc; loc++) { |
6297 | restart_detect = stackblock(); | ||
6298 | STPUTC(*loc, expdest); | ||
6299 | if (stackblock() != restart_detect) | ||
6300 | goto restart; | ||
6301 | len++; | ||
6302 | } | ||
6303 | niro | 532 | |
6304 | niro | 816 | if (subtype == VSREPLACE) { |
6305 | while (*idx) { | ||
6306 | restart_detect = stackblock(); | ||
6307 | STPUTC(*idx, expdest); | ||
6308 | if (stackblock() != restart_detect) | ||
6309 | goto restart; | ||
6310 | len++; | ||
6311 | idx++; | ||
6312 | } | ||
6313 | break; | ||
6314 | niro | 532 | } |
6315 | } | ||
6316 | |||
6317 | niro | 816 | /* We've put the replaced text into a buffer at workloc, now |
6318 | * move it to the right place and adjust the stack. | ||
6319 | */ | ||
6320 | startp = stackblock() + startloc; | ||
6321 | STPUTC('\0', expdest); | ||
6322 | memmove(startp, stackblock() + workloc, len); | ||
6323 | startp[len++] = '\0'; | ||
6324 | amount = expdest - ((char *)stackblock() + startloc + len - 1); | ||
6325 | STADJUST(-amount, expdest); | ||
6326 | return startp; | ||
6327 | niro | 532 | } |
6328 | niro | 816 | #endif /* ENABLE_ASH_BASH_COMPAT */ |
6329 | niro | 532 | |
6330 | niro | 816 | subtype -= VSTRIMRIGHT; |
6331 | niro | 532 | #if DEBUG |
6332 | niro | 816 | if (subtype < 0 || subtype > 7) |
6333 | niro | 532 | abort(); |
6334 | #endif | ||
6335 | niro | 816 | /* zero = subtype == VSTRIMLEFT || subtype == VSTRIMLEFTMAX */ |
6336 | zero = subtype >> 1; | ||
6337 | /* VSTRIMLEFT/VSTRIMRIGHTMAX -> scanleft */ | ||
6338 | scan = (subtype & 1) ^ zero ? scanleft : scanright; | ||
6339 | niro | 532 | |
6340 | niro | 816 | loc = scan(startp, rmesc, rmescend, str, quotes, zero); |
6341 | if (loc) { | ||
6342 | if (zero) { | ||
6343 | memmove(startp, loc, str - loc); | ||
6344 | loc = startp + (str - loc) - 1; | ||
6345 | niro | 532 | } |
6346 | niro | 816 | *loc = '\0'; |
6347 | amount = loc - expdest; | ||
6348 | STADJUST(amount, expdest); | ||
6349 | niro | 532 | } |
6350 | niro | 816 | return loc; |
6351 | niro | 532 | } |
6352 | |||
6353 | /* | ||
6354 | * Add the value of a specialized variable to the stack string. | ||
6355 | niro | 984 | * name parameter (examples): |
6356 | * ash -c 'echo $1' name:'1=' | ||
6357 | * ash -c 'echo $qwe' name:'qwe=' | ||
6358 | * ash -c 'echo $$' name:'$=' | ||
6359 | * ash -c 'echo ${$}' name:'$=' | ||
6360 | * ash -c 'echo ${$##q}' name:'$=q' | ||
6361 | * ash -c 'echo ${#$}' name:'$=' | ||
6362 | * note: examples with bad shell syntax: | ||
6363 | * ash -c 'echo ${#$1}' name:'$=1' | ||
6364 | * ash -c 'echo ${#1#}' name:'1=#' | ||
6365 | niro | 532 | */ |
6366 | niro | 984 | static NOINLINE ssize_t |
6367 | niro | 816 | varvalue(char *name, int varflags, int flags, struct strlist *var_str_list) |
6368 | niro | 532 | { |
6369 | niro | 984 | const char *p; |
6370 | niro | 532 | int num; |
6371 | int i; | ||
6372 | int sepq = 0; | ||
6373 | ssize_t len = 0; | ||
6374 | niro | 984 | int subtype = varflags & VSTYPE; |
6375 | int quotes = flags & (EXP_FULL | EXP_CASE | EXP_REDIR); | ||
6376 | niro | 532 | int quoted = varflags & VSQUOTE; |
6377 | niro | 984 | int syntax = quoted ? DQSYNTAX : BASESYNTAX; |
6378 | niro | 532 | |
6379 | switch (*name) { | ||
6380 | case '$': | ||
6381 | num = rootpid; | ||
6382 | goto numvar; | ||
6383 | case '?': | ||
6384 | num = exitstatus; | ||
6385 | goto numvar; | ||
6386 | case '#': | ||
6387 | num = shellparam.nparam; | ||
6388 | goto numvar; | ||
6389 | case '!': | ||
6390 | num = backgndpid; | ||
6391 | if (num == 0) | ||
6392 | return -1; | ||
6393 | niro | 816 | numvar: |
6394 | niro | 532 | len = cvtnum(num); |
6395 | niro | 984 | goto check_1char_name; |
6396 | niro | 532 | case '-': |
6397 | niro | 984 | expdest = makestrspace(NOPTS, expdest); |
6398 | niro | 532 | for (i = NOPTS - 1; i >= 0; i--) { |
6399 | if (optlist[i]) { | ||
6400 | niro | 984 | USTPUTC(optletters(i), expdest); |
6401 | niro | 532 | len++; |
6402 | } | ||
6403 | } | ||
6404 | niro | 984 | check_1char_name: |
6405 | #if 0 | ||
6406 | /* handles cases similar to ${#$1} */ | ||
6407 | if (name[2] != '\0') | ||
6408 | raise_error_syntax("bad substitution"); | ||
6409 | #endif | ||
6410 | niro | 532 | break; |
6411 | niro | 984 | case '@': { |
6412 | char **ap; | ||
6413 | int sep; | ||
6414 | |||
6415 | if (quoted && (flags & EXP_FULL)) { | ||
6416 | /* note: this is not meant as PEOF value */ | ||
6417 | sep = 1 << CHAR_BIT; | ||
6418 | niro | 532 | goto param; |
6419 | niro | 984 | } |
6420 | niro | 532 | /* fall through */ |
6421 | case '*': | ||
6422 | niro | 984 | sep = ifsset() ? (unsigned char)(ifsval()[0]) : ' '; |
6423 | i = SIT(sep, syntax); | ||
6424 | if (quotes && (i == CCTL || i == CBACK)) | ||
6425 | niro | 532 | sepq = 1; |
6426 | niro | 816 | param: |
6427 | ap = shellparam.p; | ||
6428 | if (!ap) | ||
6429 | niro | 532 | return -1; |
6430 | niro | 984 | while ((p = *ap++) != NULL) { |
6431 | niro | 532 | size_t partlen; |
6432 | |||
6433 | partlen = strlen(p); | ||
6434 | len += partlen; | ||
6435 | |||
6436 | if (!(subtype == VSPLUS || subtype == VSLENGTH)) | ||
6437 | memtodest(p, partlen, syntax, quotes); | ||
6438 | |||
6439 | if (*ap && sep) { | ||
6440 | char *q; | ||
6441 | |||
6442 | len++; | ||
6443 | if (subtype == VSPLUS || subtype == VSLENGTH) { | ||
6444 | continue; | ||
6445 | } | ||
6446 | q = expdest; | ||
6447 | if (sepq) | ||
6448 | STPUTC(CTLESC, q); | ||
6449 | niro | 984 | /* note: may put NUL despite sep != 0 |
6450 | * (see sep = 1 << CHAR_BIT above) */ | ||
6451 | niro | 532 | STPUTC(sep, q); |
6452 | expdest = q; | ||
6453 | } | ||
6454 | } | ||
6455 | return len; | ||
6456 | niro | 984 | } /* case '@' and '*' */ |
6457 | niro | 532 | case '0': |
6458 | case '1': | ||
6459 | case '2': | ||
6460 | case '3': | ||
6461 | case '4': | ||
6462 | case '5': | ||
6463 | case '6': | ||
6464 | case '7': | ||
6465 | case '8': | ||
6466 | case '9': | ||
6467 | niro | 984 | num = atoi(name); /* number(name) fails on ${N#str} etc */ |
6468 | niro | 532 | if (num < 0 || num > shellparam.nparam) |
6469 | return -1; | ||
6470 | p = num ? shellparam.p[num - 1] : arg0; | ||
6471 | goto value; | ||
6472 | default: | ||
6473 | niro | 816 | /* NB: name has form "VAR=..." */ |
6474 | |||
6475 | /* "A=a B=$A" case: var_str_list is a list of "A=a" strings | ||
6476 | * which should be considered before we check variables. */ | ||
6477 | if (var_str_list) { | ||
6478 | unsigned name_len = (strchrnul(name, '=') - name) + 1; | ||
6479 | p = NULL; | ||
6480 | do { | ||
6481 | char *str, *eq; | ||
6482 | str = var_str_list->text; | ||
6483 | eq = strchr(str, '='); | ||
6484 | if (!eq) /* stop at first non-assignment */ | ||
6485 | break; | ||
6486 | eq++; | ||
6487 | if (name_len == (unsigned)(eq - str) | ||
6488 | niro | 984 | && strncmp(str, name, name_len) == 0 |
6489 | ) { | ||
6490 | niro | 816 | p = eq; |
6491 | /* goto value; - WRONG! */ | ||
6492 | /* think "A=1 A=2 B=$A" */ | ||
6493 | } | ||
6494 | var_str_list = var_str_list->next; | ||
6495 | } while (var_str_list); | ||
6496 | if (p) | ||
6497 | goto value; | ||
6498 | } | ||
6499 | niro | 532 | p = lookupvar(name); |
6500 | niro | 816 | value: |
6501 | niro | 532 | if (!p) |
6502 | return -1; | ||
6503 | |||
6504 | len = strlen(p); | ||
6505 | if (!(subtype == VSPLUS || subtype == VSLENGTH)) | ||
6506 | memtodest(p, len, syntax, quotes); | ||
6507 | return len; | ||
6508 | } | ||
6509 | |||
6510 | if (subtype == VSPLUS || subtype == VSLENGTH) | ||
6511 | STADJUST(-len, expdest); | ||
6512 | return len; | ||
6513 | } | ||
6514 | |||
6515 | /* | ||
6516 | niro | 816 | * Expand a variable, and return a pointer to the next character in the |
6517 | * input string. | ||
6518 | niro | 532 | */ |
6519 | niro | 816 | static char * |
6520 | niro | 984 | evalvar(char *p, int flags, struct strlist *var_str_list) |
6521 | niro | 532 | { |
6522 | niro | 816 | char varflags; |
6523 | char subtype; | ||
6524 | char quoted; | ||
6525 | char easy; | ||
6526 | char *var; | ||
6527 | int patloc; | ||
6528 | int startloc; | ||
6529 | ssize_t varlen; | ||
6530 | niro | 532 | |
6531 | niro | 984 | varflags = (unsigned char) *p++; |
6532 | niro | 816 | subtype = varflags & VSTYPE; |
6533 | quoted = varflags & VSQUOTE; | ||
6534 | var = p; | ||
6535 | easy = (!quoted || (*var == '@' && shellparam.nparam)); | ||
6536 | startloc = expdest - (char *)stackblock(); | ||
6537 | p = strchr(p, '=') + 1; | ||
6538 | |||
6539 | again: | ||
6540 | niro | 984 | varlen = varvalue(var, varflags, flags, var_str_list); |
6541 | niro | 816 | if (varflags & VSNUL) |
6542 | varlen--; | ||
6543 | |||
6544 | if (subtype == VSPLUS) { | ||
6545 | varlen = -1 - varlen; | ||
6546 | goto vsplus; | ||
6547 | niro | 532 | } |
6548 | niro | 816 | |
6549 | if (subtype == VSMINUS) { | ||
6550 | vsplus: | ||
6551 | if (varlen < 0) { | ||
6552 | argstr( | ||
6553 | niro | 984 | p, flags | EXP_TILDE | |
6554 | (quoted ? EXP_QWORD : EXP_WORD), | ||
6555 | niro | 816 | var_str_list |
6556 | ); | ||
6557 | goto end; | ||
6558 | } | ||
6559 | if (easy) | ||
6560 | goto record; | ||
6561 | goto end; | ||
6562 | } | ||
6563 | |||
6564 | if (subtype == VSASSIGN || subtype == VSQUESTION) { | ||
6565 | if (varlen < 0) { | ||
6566 | if (subevalvar(p, var, /* strloc: */ 0, | ||
6567 | subtype, startloc, varflags, | ||
6568 | /* quotes: */ 0, | ||
6569 | var_str_list) | ||
6570 | ) { | ||
6571 | varflags &= ~VSNUL; | ||
6572 | /* | ||
6573 | * Remove any recorded regions beyond | ||
6574 | * start of variable | ||
6575 | */ | ||
6576 | removerecordregions(startloc); | ||
6577 | goto again; | ||
6578 | } | ||
6579 | goto end; | ||
6580 | } | ||
6581 | if (easy) | ||
6582 | goto record; | ||
6583 | goto end; | ||
6584 | } | ||
6585 | |||
6586 | if (varlen < 0 && uflag) | ||
6587 | varunset(p, var, 0, 0); | ||
6588 | |||
6589 | if (subtype == VSLENGTH) { | ||
6590 | cvtnum(varlen > 0 ? varlen : 0); | ||
6591 | goto record; | ||
6592 | } | ||
6593 | |||
6594 | if (subtype == VSNORMAL) { | ||
6595 | if (easy) | ||
6596 | goto record; | ||
6597 | goto end; | ||
6598 | } | ||
6599 | |||
6600 | #if DEBUG | ||
6601 | switch (subtype) { | ||
6602 | case VSTRIMLEFT: | ||
6603 | case VSTRIMLEFTMAX: | ||
6604 | case VSTRIMRIGHT: | ||
6605 | case VSTRIMRIGHTMAX: | ||
6606 | #if ENABLE_ASH_BASH_COMPAT | ||
6607 | case VSSUBSTR: | ||
6608 | case VSREPLACE: | ||
6609 | case VSREPLACEALL: | ||
6610 | #endif | ||
6611 | break; | ||
6612 | default: | ||
6613 | abort(); | ||
6614 | } | ||
6615 | #endif | ||
6616 | |||
6617 | if (varlen >= 0) { | ||
6618 | /* | ||
6619 | * Terminate the string and start recording the pattern | ||
6620 | * right after it | ||
6621 | */ | ||
6622 | STPUTC('\0', expdest); | ||
6623 | patloc = expdest - (char *)stackblock(); | ||
6624 | if (0 == subevalvar(p, /* str: */ NULL, patloc, subtype, | ||
6625 | startloc, varflags, | ||
6626 | niro | 984 | //TODO: | EXP_REDIR too? All other such places do it too |
6627 | /* quotes: */ flags & (EXP_FULL | EXP_CASE), | ||
6628 | niro | 816 | var_str_list) |
6629 | ) { | ||
6630 | int amount = expdest - ( | ||
6631 | (char *)stackblock() + patloc - 1 | ||
6632 | ); | ||
6633 | STADJUST(-amount, expdest); | ||
6634 | } | ||
6635 | /* Remove any recorded regions beyond start of variable */ | ||
6636 | removerecordregions(startloc); | ||
6637 | record: | ||
6638 | recordregion(startloc, expdest - (char *)stackblock(), quoted); | ||
6639 | } | ||
6640 | |||
6641 | end: | ||
6642 | if (subtype != VSNORMAL) { /* skip to end of alternative */ | ||
6643 | int nesting = 1; | ||
6644 | for (;;) { | ||
6645 | niro | 984 | unsigned char c = *p++; |
6646 | niro | 816 | if (c == CTLESC) |
6647 | p++; | ||
6648 | else if (c == CTLBACKQ || c == (CTLBACKQ|CTLQUOTE)) { | ||
6649 | if (varlen >= 0) | ||
6650 | argbackq = argbackq->next; | ||
6651 | } else if (c == CTLVAR) { | ||
6652 | if ((*p++ & VSTYPE) != VSNORMAL) | ||
6653 | nesting++; | ||
6654 | } else if (c == CTLENDVAR) { | ||
6655 | if (--nesting == 0) | ||
6656 | break; | ||
6657 | } | ||
6658 | } | ||
6659 | } | ||
6660 | return p; | ||
6661 | niro | 532 | } |
6662 | |||
6663 | /* | ||
6664 | * Break the argument string into pieces based upon IFS and add the | ||
6665 | * strings to the argument list. The regions of the string to be | ||
6666 | * searched for IFS characters have been stored by recordregion. | ||
6667 | */ | ||
6668 | static void | ||
6669 | ifsbreakup(char *string, struct arglist *arglist) | ||
6670 | { | ||
6671 | struct ifsregion *ifsp; | ||
6672 | struct strlist *sp; | ||
6673 | char *start; | ||
6674 | char *p; | ||
6675 | char *q; | ||
6676 | const char *ifs, *realifs; | ||
6677 | int ifsspc; | ||
6678 | int nulonly; | ||
6679 | |||
6680 | start = string; | ||
6681 | if (ifslastp != NULL) { | ||
6682 | ifsspc = 0; | ||
6683 | nulonly = 0; | ||
6684 | realifs = ifsset() ? ifsval() : defifs; | ||
6685 | ifsp = &ifsfirst; | ||
6686 | do { | ||
6687 | p = string + ifsp->begoff; | ||
6688 | nulonly = ifsp->nulonly; | ||
6689 | ifs = nulonly ? nullstr : realifs; | ||
6690 | ifsspc = 0; | ||
6691 | while (p < string + ifsp->endoff) { | ||
6692 | q = p; | ||
6693 | niro | 984 | if ((unsigned char)*p == CTLESC) |
6694 | niro | 532 | p++; |
6695 | niro | 816 | if (!strchr(ifs, *p)) { |
6696 | niro | 532 | p++; |
6697 | niro | 816 | continue; |
6698 | } | ||
6699 | if (!nulonly) | ||
6700 | ifsspc = (strchr(defifs, *p) != NULL); | ||
6701 | /* Ignore IFS whitespace at start */ | ||
6702 | if (q == start && ifsspc) { | ||
6703 | p++; | ||
6704 | start = p; | ||
6705 | continue; | ||
6706 | } | ||
6707 | *q = '\0'; | ||
6708 | sp = stzalloc(sizeof(*sp)); | ||
6709 | sp->text = start; | ||
6710 | *arglist->lastp = sp; | ||
6711 | arglist->lastp = &sp->next; | ||
6712 | p++; | ||
6713 | if (!nulonly) { | ||
6714 | for (;;) { | ||
6715 | if (p >= string + ifsp->endoff) { | ||
6716 | break; | ||
6717 | } | ||
6718 | q = p; | ||
6719 | niro | 984 | if ((unsigned char)*p == CTLESC) |
6720 | niro | 816 | p++; |
6721 | if (strchr(ifs, *p) == NULL) { | ||
6722 | p = q; | ||
6723 | break; | ||
6724 | } | ||
6725 | if (strchr(defifs, *p) == NULL) { | ||
6726 | if (ifsspc) { | ||
6727 | niro | 532 | p++; |
6728 | niro | 816 | ifsspc = 0; |
6729 | } else { | ||
6730 | niro | 532 | p = q; |
6731 | break; | ||
6732 | niro | 816 | } |
6733 | } else | ||
6734 | p++; | ||
6735 | niro | 532 | } |
6736 | niro | 816 | } |
6737 | start = p; | ||
6738 | } /* while */ | ||
6739 | ifsp = ifsp->next; | ||
6740 | } while (ifsp != NULL); | ||
6741 | niro | 532 | if (nulonly) |
6742 | goto add; | ||
6743 | } | ||
6744 | |||
6745 | if (!*start) | ||
6746 | return; | ||
6747 | |||
6748 | niro | 816 | add: |
6749 | sp = stzalloc(sizeof(*sp)); | ||
6750 | niro | 532 | sp->text = start; |
6751 | *arglist->lastp = sp; | ||
6752 | arglist->lastp = &sp->next; | ||
6753 | } | ||
6754 | |||
6755 | static void | ||
6756 | ifsfree(void) | ||
6757 | { | ||
6758 | struct ifsregion *p; | ||
6759 | |||
6760 | niro | 816 | INT_OFF; |
6761 | niro | 532 | p = ifsfirst.next; |
6762 | do { | ||
6763 | struct ifsregion *ifsp; | ||
6764 | ifsp = p->next; | ||
6765 | niro | 816 | free(p); |
6766 | niro | 532 | p = ifsp; |
6767 | } while (p); | ||
6768 | ifslastp = NULL; | ||
6769 | ifsfirst.next = NULL; | ||
6770 | niro | 816 | INT_ON; |
6771 | niro | 532 | } |
6772 | |||
6773 | /* | ||
6774 | * Add a file name to the list. | ||
6775 | */ | ||
6776 | static void | ||
6777 | addfname(const char *name) | ||
6778 | { | ||
6779 | struct strlist *sp; | ||
6780 | |||
6781 | niro | 816 | sp = stzalloc(sizeof(*sp)); |
6782 | sp->text = ststrdup(name); | ||
6783 | niro | 532 | *exparg.lastp = sp; |
6784 | exparg.lastp = &sp->next; | ||
6785 | } | ||
6786 | |||
6787 | niro | 816 | static char *expdir; |
6788 | niro | 532 | |
6789 | /* | ||
6790 | * Do metacharacter (i.e. *, ?, [...]) expansion. | ||
6791 | */ | ||
6792 | static void | ||
6793 | expmeta(char *enddir, char *name) | ||
6794 | { | ||
6795 | char *p; | ||
6796 | const char *cp; | ||
6797 | char *start; | ||
6798 | char *endname; | ||
6799 | int metaflag; | ||
6800 | struct stat statb; | ||
6801 | DIR *dirp; | ||
6802 | struct dirent *dp; | ||
6803 | int atend; | ||
6804 | int matchdot; | ||
6805 | |||
6806 | metaflag = 0; | ||
6807 | start = name; | ||
6808 | for (p = name; *p; p++) { | ||
6809 | if (*p == '*' || *p == '?') | ||
6810 | metaflag = 1; | ||
6811 | else if (*p == '[') { | ||
6812 | char *q = p + 1; | ||
6813 | if (*q == '!') | ||
6814 | q++; | ||
6815 | for (;;) { | ||
6816 | if (*q == '\\') | ||
6817 | q++; | ||
6818 | if (*q == '/' || *q == '\0') | ||
6819 | break; | ||
6820 | if (*++q == ']') { | ||
6821 | metaflag = 1; | ||
6822 | break; | ||
6823 | } | ||
6824 | } | ||
6825 | } else if (*p == '\\') | ||
6826 | p++; | ||
6827 | else if (*p == '/') { | ||
6828 | if (metaflag) | ||
6829 | goto out; | ||
6830 | start = p + 1; | ||
6831 | } | ||
6832 | } | ||
6833 | niro | 816 | out: |
6834 | niro | 532 | if (metaflag == 0) { /* we've reached the end of the file name */ |
6835 | if (enddir != expdir) | ||
6836 | metaflag++; | ||
6837 | p = name; | ||
6838 | do { | ||
6839 | if (*p == '\\') | ||
6840 | p++; | ||
6841 | *enddir++ = *p; | ||
6842 | } while (*p++); | ||
6843 | if (metaflag == 0 || lstat(expdir, &statb) >= 0) | ||
6844 | addfname(expdir); | ||
6845 | return; | ||
6846 | } | ||
6847 | endname = p; | ||
6848 | if (name < start) { | ||
6849 | p = name; | ||
6850 | do { | ||
6851 | if (*p == '\\') | ||
6852 | p++; | ||
6853 | *enddir++ = *p++; | ||
6854 | } while (p < start); | ||
6855 | } | ||
6856 | if (enddir == expdir) { | ||
6857 | cp = "."; | ||
6858 | } else if (enddir == expdir + 1 && *expdir == '/') { | ||
6859 | cp = "/"; | ||
6860 | } else { | ||
6861 | cp = expdir; | ||
6862 | enddir[-1] = '\0'; | ||
6863 | } | ||
6864 | niro | 816 | dirp = opendir(cp); |
6865 | if (dirp == NULL) | ||
6866 | niro | 532 | return; |
6867 | if (enddir != expdir) | ||
6868 | enddir[-1] = '/'; | ||
6869 | if (*endname == 0) { | ||
6870 | atend = 1; | ||
6871 | } else { | ||
6872 | atend = 0; | ||
6873 | *endname++ = '\0'; | ||
6874 | } | ||
6875 | matchdot = 0; | ||
6876 | p = start; | ||
6877 | if (*p == '\\') | ||
6878 | p++; | ||
6879 | if (*p == '.') | ||
6880 | matchdot++; | ||
6881 | niro | 984 | while (!pending_int && (dp = readdir(dirp)) != NULL) { |
6882 | niro | 816 | if (dp->d_name[0] == '.' && !matchdot) |
6883 | niro | 532 | continue; |
6884 | if (pmatch(start, dp->d_name)) { | ||
6885 | if (atend) { | ||
6886 | niro | 816 | strcpy(enddir, dp->d_name); |
6887 | niro | 532 | addfname(expdir); |
6888 | } else { | ||
6889 | niro | 816 | for (p = enddir, cp = dp->d_name; (*p++ = *cp++) != '\0';) |
6890 | niro | 532 | continue; |
6891 | p[-1] = '/'; | ||
6892 | expmeta(p, endname); | ||
6893 | } | ||
6894 | } | ||
6895 | } | ||
6896 | closedir(dirp); | ||
6897 | niro | 816 | if (!atend) |
6898 | niro | 532 | endname[-1] = '/'; |
6899 | } | ||
6900 | |||
6901 | static struct strlist * | ||
6902 | msort(struct strlist *list, int len) | ||
6903 | { | ||
6904 | struct strlist *p, *q = NULL; | ||
6905 | struct strlist **lpp; | ||
6906 | int half; | ||
6907 | int n; | ||
6908 | |||
6909 | if (len <= 1) | ||
6910 | return list; | ||
6911 | half = len >> 1; | ||
6912 | p = list; | ||
6913 | niro | 816 | for (n = half; --n >= 0;) { |
6914 | niro | 532 | q = p; |
6915 | p = p->next; | ||
6916 | } | ||
6917 | q->next = NULL; /* terminate first half of list */ | ||
6918 | q = msort(list, half); /* sort first half of list */ | ||
6919 | p = msort(p, len - half); /* sort second half */ | ||
6920 | lpp = &list; | ||
6921 | for (;;) { | ||
6922 | niro | 816 | #if ENABLE_LOCALE_SUPPORT |
6923 | niro | 532 | if (strcoll(p->text, q->text) < 0) |
6924 | #else | ||
6925 | if (strcmp(p->text, q->text) < 0) | ||
6926 | #endif | ||
6927 | { | ||
6928 | *lpp = p; | ||
6929 | lpp = &p->next; | ||
6930 | niro | 816 | p = *lpp; |
6931 | if (p == NULL) { | ||
6932 | niro | 532 | *lpp = q; |
6933 | break; | ||
6934 | } | ||
6935 | } else { | ||
6936 | *lpp = q; | ||
6937 | lpp = &q->next; | ||
6938 | niro | 816 | q = *lpp; |
6939 | if (q == NULL) { | ||
6940 | niro | 532 | *lpp = p; |
6941 | break; | ||
6942 | } | ||
6943 | } | ||
6944 | } | ||
6945 | return list; | ||
6946 | } | ||
6947 | |||
6948 | /* | ||
6949 | niro | 816 | * Sort the results of file name expansion. It calculates the number of |
6950 | * strings to sort and then calls msort (short for merge sort) to do the | ||
6951 | * work. | ||
6952 | niro | 532 | */ |
6953 | niro | 816 | static struct strlist * |
6954 | expsort(struct strlist *str) | ||
6955 | { | ||
6956 | int len; | ||
6957 | struct strlist *sp; | ||
6958 | niro | 532 | |
6959 | niro | 816 | len = 0; |
6960 | for (sp = str; sp; sp = sp->next) | ||
6961 | len++; | ||
6962 | return msort(str, len); | ||
6963 | niro | 532 | } |
6964 | |||
6965 | niro | 816 | static void |
6966 | expandmeta(struct strlist *str /*, int flag*/) | ||
6967 | { | ||
6968 | static const char metachars[] ALIGN1 = { | ||
6969 | '*', '?', '[', 0 | ||
6970 | }; | ||
6971 | /* TODO - EXP_REDIR */ | ||
6972 | niro | 532 | |
6973 | niro | 816 | while (str) { |
6974 | struct strlist **savelastp; | ||
6975 | struct strlist *sp; | ||
6976 | char *p; | ||
6977 | niro | 532 | |
6978 | niro | 816 | if (fflag) |
6979 | goto nometa; | ||
6980 | if (!strpbrk(str->text, metachars)) | ||
6981 | goto nometa; | ||
6982 | savelastp = exparg.lastp; | ||
6983 | niro | 532 | |
6984 | niro | 816 | INT_OFF; |
6985 | p = preglob(str->text, 0, RMESCAPE_ALLOC | RMESCAPE_HEAP); | ||
6986 | { | ||
6987 | int i = strlen(str->text); | ||
6988 | expdir = ckmalloc(i < 2048 ? 2048 : i); /* XXX */ | ||
6989 | } | ||
6990 | niro | 532 | |
6991 | niro | 816 | expmeta(expdir, p); |
6992 | free(expdir); | ||
6993 | if (p != str->text) | ||
6994 | free(p); | ||
6995 | INT_ON; | ||
6996 | if (exparg.lastp == savelastp) { | ||
6997 | /* | ||
6998 | * no matches | ||
6999 | */ | ||
7000 | nometa: | ||
7001 | *exparg.lastp = str; | ||
7002 | niro | 984 | rmescapes(str->text, 0); |
7003 | niro | 816 | exparg.lastp = &str->next; |
7004 | niro | 532 | } else { |
7005 | niro | 816 | *exparg.lastp = NULL; |
7006 | *savelastp = sp = expsort(*savelastp); | ||
7007 | while (sp->next != NULL) | ||
7008 | sp = sp->next; | ||
7009 | exparg.lastp = &sp->next; | ||
7010 | niro | 532 | } |
7011 | niro | 816 | str = str->next; |
7012 | niro | 532 | } |
7013 | niro | 816 | } |
7014 | |||
7015 | /* | ||
7016 | * Perform variable substitution and command substitution on an argument, | ||
7017 | * placing the resulting list of arguments in arglist. If EXP_FULL is true, | ||
7018 | * perform splitting and file name expansion. When arglist is NULL, perform | ||
7019 | * here document expansion. | ||
7020 | */ | ||
7021 | static void | ||
7022 | expandarg(union node *arg, struct arglist *arglist, int flag) | ||
7023 | { | ||
7024 | struct strlist *sp; | ||
7025 | char *p; | ||
7026 | |||
7027 | argbackq = arg->narg.backquote; | ||
7028 | STARTSTACKSTR(expdest); | ||
7029 | ifsfirst.next = NULL; | ||
7030 | ifslastp = NULL; | ||
7031 | argstr(arg->narg.text, flag, | ||
7032 | /* var_str_list: */ arglist ? arglist->list : NULL); | ||
7033 | p = _STPUTC('\0', expdest); | ||
7034 | expdest = p - 1; | ||
7035 | if (arglist == NULL) { | ||
7036 | return; /* here document expanded */ | ||
7037 | niro | 532 | } |
7038 | niro | 816 | p = grabstackstr(p); |
7039 | exparg.lastp = &exparg.list; | ||
7040 | /* | ||
7041 | * TODO - EXP_REDIR | ||
7042 | */ | ||
7043 | if (flag & EXP_FULL) { | ||
7044 | ifsbreakup(p, &exparg); | ||
7045 | *exparg.lastp = NULL; | ||
7046 | exparg.lastp = &exparg.list; | ||
7047 | expandmeta(exparg.list /*, flag*/); | ||
7048 | } else { | ||
7049 | if (flag & EXP_REDIR) /*XXX - for now, just remove escapes */ | ||
7050 | niro | 984 | rmescapes(p, 0); |
7051 | niro | 816 | sp = stzalloc(sizeof(*sp)); |
7052 | sp->text = p; | ||
7053 | *exparg.lastp = sp; | ||
7054 | exparg.lastp = &sp->next; | ||
7055 | niro | 532 | } |
7056 | niro | 816 | if (ifsfirst.next) |
7057 | ifsfree(); | ||
7058 | *exparg.lastp = NULL; | ||
7059 | if (exparg.list) { | ||
7060 | *arglist->lastp = exparg.list; | ||
7061 | arglist->lastp = exparg.lastp; | ||
7062 | } | ||
7063 | niro | 532 | } |
7064 | |||
7065 | niro | 816 | /* |
7066 | * Expand shell variables and backquotes inside a here document. | ||
7067 | */ | ||
7068 | static void | ||
7069 | expandhere(union node *arg, int fd) | ||
7070 | { | ||
7071 | herefd = fd; | ||
7072 | expandarg(arg, (struct arglist *)NULL, 0); | ||
7073 | full_write(fd, stackblock(), expdest - (char *)stackblock()); | ||
7074 | } | ||
7075 | niro | 532 | |
7076 | /* | ||
7077 | niro | 816 | * Returns true if the pattern matches the string. |
7078 | */ | ||
7079 | static int | ||
7080 | patmatch(char *pattern, const char *string) | ||
7081 | { | ||
7082 | return pmatch(preglob(pattern, 0, 0), string); | ||
7083 | } | ||
7084 | |||
7085 | /* | ||
7086 | niro | 532 | * See if a pattern matches in a case statement. |
7087 | */ | ||
7088 | niro | 816 | static int |
7089 | niro | 532 | casematch(union node *pattern, char *val) |
7090 | { | ||
7091 | struct stackmark smark; | ||
7092 | int result; | ||
7093 | |||
7094 | setstackmark(&smark); | ||
7095 | argbackq = pattern->narg.backquote; | ||
7096 | STARTSTACKSTR(expdest); | ||
7097 | ifslastp = NULL; | ||
7098 | niro | 816 | argstr(pattern->narg.text, EXP_TILDE | EXP_CASE, |
7099 | /* var_str_list: */ NULL); | ||
7100 | niro | 532 | STACKSTRNUL(expdest); |
7101 | result = patmatch(stackblock(), val); | ||
7102 | popstackmark(&smark); | ||
7103 | return result; | ||
7104 | } | ||
7105 | |||
7106 | |||
7107 | niro | 816 | /* ============ find_command */ |
7108 | niro | 532 | |
7109 | niro | 816 | struct builtincmd { |
7110 | const char *name; | ||
7111 | niro | 984 | int (*builtin)(int, char **) FAST_FUNC; |
7112 | niro | 816 | /* unsigned flags; */ |
7113 | }; | ||
7114 | #define IS_BUILTIN_SPECIAL(b) ((b)->name[0] & 1) | ||
7115 | /* "regular" builtins always take precedence over commands, | ||
7116 | * regardless of PATH=....%builtin... position */ | ||
7117 | #define IS_BUILTIN_REGULAR(b) ((b)->name[0] & 2) | ||
7118 | #define IS_BUILTIN_ASSIGN(b) ((b)->name[0] & 4) | ||
7119 | niro | 532 | |
7120 | niro | 816 | struct cmdentry { |
7121 | smallint cmdtype; /* CMDxxx */ | ||
7122 | union param { | ||
7123 | int index; | ||
7124 | /* index >= 0 for commands without path (slashes) */ | ||
7125 | /* (TODO: what exactly does the value mean? PATH position?) */ | ||
7126 | /* index == -1 for commands with slashes */ | ||
7127 | /* index == (-2 - applet_no) for NOFORK applets */ | ||
7128 | const struct builtincmd *cmd; | ||
7129 | struct funcnode *func; | ||
7130 | } u; | ||
7131 | }; | ||
7132 | /* values of cmdtype */ | ||
7133 | #define CMDUNKNOWN -1 /* no entry in table for command */ | ||
7134 | #define CMDNORMAL 0 /* command is an executable program */ | ||
7135 | #define CMDFUNCTION 1 /* command is a shell function */ | ||
7136 | #define CMDBUILTIN 2 /* command is a shell builtin */ | ||
7137 | niro | 532 | |
7138 | niro | 816 | /* action to find_command() */ |
7139 | #define DO_ERR 0x01 /* prints errors */ | ||
7140 | #define DO_ABS 0x02 /* checks absolute paths */ | ||
7141 | #define DO_NOFUNC 0x04 /* don't return shell functions, for command */ | ||
7142 | #define DO_ALTPATH 0x08 /* using alternate path */ | ||
7143 | #define DO_ALTBLTIN 0x20 /* %builtin in alt. path */ | ||
7144 | niro | 532 | |
7145 | niro | 816 | static void find_command(char *, struct cmdentry *, int, const char *); |
7146 | niro | 532 | |
7147 | |||
7148 | niro | 816 | /* ============ Hashing commands */ |
7149 | niro | 532 | |
7150 | /* | ||
7151 | niro | 816 | * When commands are first encountered, they are entered in a hash table. |
7152 | * This ensures that a full path search will not have to be done for them | ||
7153 | * on each invocation. | ||
7154 | * | ||
7155 | * We should investigate converting to a linear search, even though that | ||
7156 | * would make the command name "hash" a misnomer. | ||
7157 | niro | 532 | */ |
7158 | |||
7159 | niro | 816 | struct tblentry { |
7160 | struct tblentry *next; /* next entry in hash chain */ | ||
7161 | union param param; /* definition of builtin function */ | ||
7162 | smallint cmdtype; /* CMDxxx */ | ||
7163 | char rehash; /* if set, cd done since entry created */ | ||
7164 | char cmdname[1]; /* name of command */ | ||
7165 | }; | ||
7166 | niro | 532 | |
7167 | niro | 816 | static struct tblentry **cmdtable; |
7168 | #define INIT_G_cmdtable() do { \ | ||
7169 | cmdtable = xzalloc(CMDTABLESIZE * sizeof(cmdtable[0])); \ | ||
7170 | } while (0) | ||
7171 | niro | 532 | |
7172 | niro | 816 | static int builtinloc = -1; /* index in path of %builtin, or -1 */ |
7173 | niro | 532 | |
7174 | |||
7175 | niro | 816 | static void |
7176 | niro | 984 | tryexec(IF_FEATURE_SH_STANDALONE(int applet_no,) char *cmd, char **argv, char **envp) |
7177 | niro | 532 | { |
7178 | niro | 816 | int repeated = 0; |
7179 | niro | 532 | |
7180 | niro | 816 | #if ENABLE_FEATURE_SH_STANDALONE |
7181 | if (applet_no >= 0) { | ||
7182 | if (APPLET_IS_NOEXEC(applet_no)) { | ||
7183 | while (*envp) | ||
7184 | putenv(*envp++); | ||
7185 | run_applet_no_and_exit(applet_no, argv); | ||
7186 | niro | 532 | } |
7187 | niro | 816 | /* re-exec ourselves with the new arguments */ |
7188 | execve(bb_busybox_exec_path, argv, envp); | ||
7189 | /* If they called chroot or otherwise made the binary no longer | ||
7190 | * executable, fall through */ | ||
7191 | niro | 532 | } |
7192 | niro | 816 | #endif |
7193 | niro | 532 | |
7194 | niro | 816 | repeat: |
7195 | #ifdef SYSV | ||
7196 | do { | ||
7197 | execve(cmd, argv, envp); | ||
7198 | } while (errno == EINTR); | ||
7199 | niro | 532 | #else |
7200 | niro | 816 | execve(cmd, argv, envp); |
7201 | niro | 532 | #endif |
7202 | niro | 816 | if (repeated) { |
7203 | free(argv); | ||
7204 | return; | ||
7205 | niro | 532 | } |
7206 | niro | 816 | if (errno == ENOEXEC) { |
7207 | char **ap; | ||
7208 | char **new; | ||
7209 | niro | 532 | |
7210 | niro | 816 | for (ap = argv; *ap; ap++) |
7211 | continue; | ||
7212 | ap = new = ckmalloc((ap - argv + 2) * sizeof(ap[0])); | ||
7213 | ap[1] = cmd; | ||
7214 | ap[0] = cmd = (char *)DEFAULT_SHELL; | ||
7215 | ap += 2; | ||
7216 | argv++; | ||
7217 | while ((*ap++ = *argv++) != NULL) | ||
7218 | continue; | ||
7219 | argv = new; | ||
7220 | repeated++; | ||
7221 | goto repeat; | ||
7222 | niro | 532 | } |
7223 | } | ||
7224 | |||
7225 | /* | ||
7226 | niro | 816 | * Exec a program. Never returns. If you change this routine, you may |
7227 | * have to change the find_command routine as well. | ||
7228 | niro | 532 | */ |
7229 | niro | 816 | static void shellexec(char **, const char *, int) NORETURN; |
7230 | static void | ||
7231 | shellexec(char **argv, const char *path, int idx) | ||
7232 | niro | 532 | { |
7233 | niro | 816 | char *cmdname; |
7234 | int e; | ||
7235 | char **envp; | ||
7236 | int exerrno; | ||
7237 | #if ENABLE_FEATURE_SH_STANDALONE | ||
7238 | int applet_no = -1; | ||
7239 | #endif | ||
7240 | niro | 532 | |
7241 | niro | 816 | clearredir(/*drop:*/ 1); |
7242 | envp = listvars(VEXPORT, VUNSET, 0); | ||
7243 | if (strchr(argv[0], '/') != NULL | ||
7244 | #if ENABLE_FEATURE_SH_STANDALONE | ||
7245 | || (applet_no = find_applet_by_name(argv[0])) >= 0 | ||
7246 | niro | 532 | #endif |
7247 | niro | 816 | ) { |
7248 | niro | 984 | tryexec(IF_FEATURE_SH_STANDALONE(applet_no,) argv[0], argv, envp); |
7249 | niro | 816 | e = errno; |
7250 | } else { | ||
7251 | e = ENOENT; | ||
7252 | niro | 984 | while ((cmdname = path_advance(&path, argv[0])) != NULL) { |
7253 | niro | 816 | if (--idx < 0 && pathopt == NULL) { |
7254 | niro | 984 | tryexec(IF_FEATURE_SH_STANDALONE(-1,) cmdname, argv, envp); |
7255 | niro | 816 | if (errno != ENOENT && errno != ENOTDIR) |
7256 | e = errno; | ||
7257 | niro | 532 | } |
7258 | niro | 816 | stunalloc(cmdname); |
7259 | niro | 532 | } |
7260 | } | ||
7261 | |||
7262 | niro | 816 | /* Map to POSIX errors */ |
7263 | switch (e) { | ||
7264 | case EACCES: | ||
7265 | exerrno = 126; | ||
7266 | break; | ||
7267 | case ENOENT: | ||
7268 | exerrno = 127; | ||
7269 | break; | ||
7270 | default: | ||
7271 | exerrno = 2; | ||
7272 | break; | ||
7273 | niro | 532 | } |
7274 | niro | 816 | exitstatus = exerrno; |
7275 | niro | 984 | TRACE(("shellexec failed for %s, errno %d, suppress_int %d\n", |
7276 | argv[0], e, suppress_int)); | ||
7277 | niro | 816 | ash_msg_and_raise(EXEXEC, "%s: %s", argv[0], errmsg(e, "not found")); |
7278 | /* NOTREACHED */ | ||
7279 | niro | 532 | } |
7280 | |||
7281 | niro | 816 | static void |
7282 | printentry(struct tblentry *cmdp) | ||
7283 | { | ||
7284 | int idx; | ||
7285 | const char *path; | ||
7286 | char *name; | ||
7287 | niro | 532 | |
7288 | niro | 816 | idx = cmdp->param.index; |
7289 | path = pathval(); | ||
7290 | do { | ||
7291 | niro | 984 | name = path_advance(&path, cmdp->cmdname); |
7292 | niro | 816 | stunalloc(name); |
7293 | } while (--idx >= 0); | ||
7294 | out1fmt("%s%s\n", name, (cmdp->rehash ? "*" : nullstr)); | ||
7295 | niro | 532 | } |
7296 | |||
7297 | /* | ||
7298 | niro | 816 | * Clear out command entries. The argument specifies the first entry in |
7299 | * PATH which has changed. | ||
7300 | niro | 532 | */ |
7301 | niro | 816 | static void |
7302 | clearcmdentry(int firstchange) | ||
7303 | niro | 532 | { |
7304 | niro | 816 | struct tblentry **tblp; |
7305 | struct tblentry **pp; | ||
7306 | struct tblentry *cmdp; | ||
7307 | niro | 532 | |
7308 | niro | 816 | INT_OFF; |
7309 | for (tblp = cmdtable; tblp < &cmdtable[CMDTABLESIZE]; tblp++) { | ||
7310 | pp = tblp; | ||
7311 | while ((cmdp = *pp) != NULL) { | ||
7312 | if ((cmdp->cmdtype == CMDNORMAL && | ||
7313 | cmdp->param.index >= firstchange) | ||
7314 | || (cmdp->cmdtype == CMDBUILTIN && | ||
7315 | builtinloc >= firstchange) | ||
7316 | ) { | ||
7317 | *pp = cmdp->next; | ||
7318 | free(cmdp); | ||
7319 | } else { | ||
7320 | pp = &cmdp->next; | ||
7321 | } | ||
7322 | niro | 532 | } |
7323 | } | ||
7324 | niro | 816 | INT_ON; |
7325 | niro | 532 | } |
7326 | |||
7327 | /* | ||
7328 | niro | 816 | * Locate a command in the command hash table. If "add" is nonzero, |
7329 | * add the command to the table if it is not already present. The | ||
7330 | * variable "lastcmdentry" is set to point to the address of the link | ||
7331 | * pointing to the entry, so that delete_cmd_entry can delete the | ||
7332 | * entry. | ||
7333 | * | ||
7334 | * Interrupts must be off if called with add != 0. | ||
7335 | niro | 532 | */ |
7336 | niro | 816 | static struct tblentry **lastcmdentry; |
7337 | niro | 532 | |
7338 | niro | 816 | static struct tblentry * |
7339 | cmdlookup(const char *name, int add) | ||
7340 | niro | 532 | { |
7341 | niro | 816 | unsigned int hashval; |
7342 | const char *p; | ||
7343 | struct tblentry *cmdp; | ||
7344 | struct tblentry **pp; | ||
7345 | niro | 532 | |
7346 | niro | 816 | p = name; |
7347 | hashval = (unsigned char)*p << 4; | ||
7348 | while (*p) | ||
7349 | hashval += (unsigned char)*p++; | ||
7350 | hashval &= 0x7FFF; | ||
7351 | pp = &cmdtable[hashval % CMDTABLESIZE]; | ||
7352 | for (cmdp = *pp; cmdp; cmdp = cmdp->next) { | ||
7353 | if (strcmp(cmdp->cmdname, name) == 0) | ||
7354 | break; | ||
7355 | pp = &cmdp->next; | ||
7356 | niro | 532 | } |
7357 | niro | 816 | if (add && cmdp == NULL) { |
7358 | cmdp = *pp = ckzalloc(sizeof(struct tblentry) | ||
7359 | + strlen(name) | ||
7360 | /* + 1 - already done because | ||
7361 | * tblentry::cmdname is char[1] */); | ||
7362 | /*cmdp->next = NULL; - ckzalloc did it */ | ||
7363 | cmdp->cmdtype = CMDUNKNOWN; | ||
7364 | strcpy(cmdp->cmdname, name); | ||
7365 | niro | 532 | } |
7366 | niro | 816 | lastcmdentry = pp; |
7367 | return cmdp; | ||
7368 | niro | 532 | } |
7369 | |||
7370 | /* | ||
7371 | niro | 816 | * Delete the command entry returned on the last lookup. |
7372 | niro | 532 | */ |
7373 | static void | ||
7374 | niro | 816 | delete_cmd_entry(void) |
7375 | niro | 532 | { |
7376 | niro | 816 | struct tblentry *cmdp; |
7377 | |||
7378 | INT_OFF; | ||
7379 | cmdp = *lastcmdentry; | ||
7380 | *lastcmdentry = cmdp->next; | ||
7381 | if (cmdp->cmdtype == CMDFUNCTION) | ||
7382 | freefunc(cmdp->param.func); | ||
7383 | free(cmdp); | ||
7384 | INT_ON; | ||
7385 | niro | 532 | } |
7386 | |||
7387 | /* | ||
7388 | niro | 816 | * Add a new command entry, replacing any existing command entry for |
7389 | * the same name - except special builtins. | ||
7390 | niro | 532 | */ |
7391 | static void | ||
7392 | niro | 816 | addcmdentry(char *name, struct cmdentry *entry) |
7393 | niro | 532 | { |
7394 | niro | 816 | struct tblentry *cmdp; |
7395 | |||
7396 | cmdp = cmdlookup(name, 1); | ||
7397 | if (cmdp->cmdtype == CMDFUNCTION) { | ||
7398 | freefunc(cmdp->param.func); | ||
7399 | } | ||
7400 | cmdp->cmdtype = entry->cmdtype; | ||
7401 | cmdp->param = entry->u; | ||
7402 | cmdp->rehash = 0; | ||
7403 | niro | 532 | } |
7404 | |||
7405 | niro | 984 | static int FAST_FUNC |
7406 | niro | 816 | hashcmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
7407 | niro | 532 | { |
7408 | niro | 816 | struct tblentry **pp; |
7409 | struct tblentry *cmdp; | ||
7410 | int c; | ||
7411 | struct cmdentry entry; | ||
7412 | char *name; | ||
7413 | niro | 532 | |
7414 | niro | 816 | if (nextopt("r") != '\0') { |
7415 | clearcmdentry(0); | ||
7416 | return 0; | ||
7417 | } | ||
7418 | niro | 532 | |
7419 | niro | 816 | if (*argptr == NULL) { |
7420 | for (pp = cmdtable; pp < &cmdtable[CMDTABLESIZE]; pp++) { | ||
7421 | for (cmdp = *pp; cmdp; cmdp = cmdp->next) { | ||
7422 | if (cmdp->cmdtype == CMDNORMAL) | ||
7423 | printentry(cmdp); | ||
7424 | } | ||
7425 | } | ||
7426 | return 0; | ||
7427 | } | ||
7428 | niro | 532 | |
7429 | niro | 816 | c = 0; |
7430 | while ((name = *argptr) != NULL) { | ||
7431 | cmdp = cmdlookup(name, 0); | ||
7432 | if (cmdp != NULL | ||
7433 | && (cmdp->cmdtype == CMDNORMAL | ||
7434 | || (cmdp->cmdtype == CMDBUILTIN && builtinloc >= 0)) | ||
7435 | ) { | ||
7436 | delete_cmd_entry(); | ||
7437 | } | ||
7438 | find_command(name, &entry, DO_ERR, pathval()); | ||
7439 | if (entry.cmdtype == CMDUNKNOWN) | ||
7440 | c = 1; | ||
7441 | argptr++; | ||
7442 | } | ||
7443 | return c; | ||
7444 | niro | 532 | } |
7445 | |||
7446 | /* | ||
7447 | niro | 816 | * Called when a cd is done. Marks all commands so the next time they |
7448 | * are executed they will be rehashed. | ||
7449 | niro | 532 | */ |
7450 | static void | ||
7451 | niro | 816 | hashcd(void) |
7452 | niro | 532 | { |
7453 | niro | 816 | struct tblentry **pp; |
7454 | struct tblentry *cmdp; | ||
7455 | |||
7456 | for (pp = cmdtable; pp < &cmdtable[CMDTABLESIZE]; pp++) { | ||
7457 | for (cmdp = *pp; cmdp; cmdp = cmdp->next) { | ||
7458 | if (cmdp->cmdtype == CMDNORMAL | ||
7459 | || (cmdp->cmdtype == CMDBUILTIN | ||
7460 | && !IS_BUILTIN_REGULAR(cmdp->param.cmd) | ||
7461 | && builtinloc > 0) | ||
7462 | ) { | ||
7463 | cmdp->rehash = 1; | ||
7464 | } | ||
7465 | } | ||
7466 | } | ||
7467 | niro | 532 | } |
7468 | |||
7469 | /* | ||
7470 | niro | 816 | * Fix command hash table when PATH changed. |
7471 | * Called before PATH is changed. The argument is the new value of PATH; | ||
7472 | * pathval() still returns the old value at this point. | ||
7473 | * Called with interrupts off. | ||
7474 | niro | 532 | */ |
7475 | niro | 984 | static void FAST_FUNC |
7476 | niro | 816 | changepath(const char *new) |
7477 | niro | 532 | { |
7478 | niro | 816 | const char *old; |
7479 | int firstchange; | ||
7480 | int idx; | ||
7481 | int idx_bltin; | ||
7482 | |||
7483 | old = pathval(); | ||
7484 | firstchange = 9999; /* assume no change */ | ||
7485 | idx = 0; | ||
7486 | idx_bltin = -1; | ||
7487 | for (;;) { | ||
7488 | if (*old != *new) { | ||
7489 | firstchange = idx; | ||
7490 | if ((*old == '\0' && *new == ':') | ||
7491 | || (*old == ':' && *new == '\0')) | ||
7492 | firstchange++; | ||
7493 | old = new; /* ignore subsequent differences */ | ||
7494 | } | ||
7495 | if (*new == '\0') | ||
7496 | break; | ||
7497 | if (*new == '%' && idx_bltin < 0 && prefix(new + 1, "builtin")) | ||
7498 | idx_bltin = idx; | ||
7499 | if (*new == ':') | ||
7500 | idx++; | ||
7501 | new++, old++; | ||
7502 | niro | 532 | } |
7503 | niro | 816 | if (builtinloc < 0 && idx_bltin >= 0) |
7504 | builtinloc = idx_bltin; /* zap builtins */ | ||
7505 | if (builtinloc >= 0 && idx_bltin < 0) | ||
7506 | firstchange = 0; | ||
7507 | clearcmdentry(firstchange); | ||
7508 | builtinloc = idx_bltin; | ||
7509 | niro | 532 | } |
7510 | |||
7511 | niro | 816 | #define TEOF 0 |
7512 | #define TNL 1 | ||
7513 | #define TREDIR 2 | ||
7514 | #define TWORD 3 | ||
7515 | #define TSEMI 4 | ||
7516 | #define TBACKGND 5 | ||
7517 | #define TAND 6 | ||
7518 | #define TOR 7 | ||
7519 | #define TPIPE 8 | ||
7520 | #define TLP 9 | ||
7521 | #define TRP 10 | ||
7522 | #define TENDCASE 11 | ||
7523 | #define TENDBQUOTE 12 | ||
7524 | #define TNOT 13 | ||
7525 | #define TCASE 14 | ||
7526 | #define TDO 15 | ||
7527 | #define TDONE 16 | ||
7528 | #define TELIF 17 | ||
7529 | #define TELSE 18 | ||
7530 | #define TESAC 19 | ||
7531 | #define TFI 20 | ||
7532 | #define TFOR 21 | ||
7533 | #define TIF 22 | ||
7534 | #define TIN 23 | ||
7535 | #define TTHEN 24 | ||
7536 | #define TUNTIL 25 | ||
7537 | #define TWHILE 26 | ||
7538 | #define TBEGIN 27 | ||
7539 | #define TEND 28 | ||
7540 | typedef smallint token_id_t; | ||
7541 | niro | 532 | |
7542 | niro | 816 | /* first char is indicating which tokens mark the end of a list */ |
7543 | static const char *const tokname_array[] = { | ||
7544 | "\1end of file", | ||
7545 | "\0newline", | ||
7546 | "\0redirection", | ||
7547 | "\0word", | ||
7548 | "\0;", | ||
7549 | "\0&", | ||
7550 | "\0&&", | ||
7551 | "\0||", | ||
7552 | "\0|", | ||
7553 | "\0(", | ||
7554 | "\1)", | ||
7555 | "\1;;", | ||
7556 | "\1`", | ||
7557 | #define KWDOFFSET 13 | ||
7558 | /* the following are keywords */ | ||
7559 | "\0!", | ||
7560 | "\0case", | ||
7561 | "\1do", | ||
7562 | "\1done", | ||
7563 | "\1elif", | ||
7564 | "\1else", | ||
7565 | "\1esac", | ||
7566 | "\1fi", | ||
7567 | "\0for", | ||
7568 | "\0if", | ||
7569 | "\0in", | ||
7570 | "\1then", | ||
7571 | "\0until", | ||
7572 | "\0while", | ||
7573 | "\0{", | ||
7574 | "\1}", | ||
7575 | }; | ||
7576 | niro | 532 | |
7577 | niro | 816 | static const char * |
7578 | tokname(int tok) | ||
7579 | { | ||
7580 | static char buf[16]; | ||
7581 | niro | 532 | |
7582 | niro | 816 | //try this: |
7583 | //if (tok < TSEMI) return tokname_array[tok] + 1; | ||
7584 | //sprintf(buf, "\"%s\"", tokname_array[tok] + 1); | ||
7585 | //return buf; | ||
7586 | niro | 532 | |
7587 | niro | 816 | if (tok >= TSEMI) |
7588 | buf[0] = '"'; | ||
7589 | sprintf(buf + (tok >= TSEMI), "%s%c", | ||
7590 | tokname_array[tok] + 1, (tok >= TSEMI ? '"' : 0)); | ||
7591 | return buf; | ||
7592 | } | ||
7593 | niro | 532 | |
7594 | niro | 816 | /* Wrapper around strcmp for qsort/bsearch/... */ |
7595 | static int | ||
7596 | pstrcmp(const void *a, const void *b) | ||
7597 | niro | 532 | { |
7598 | niro | 816 | return strcmp((char*) a, (*(char**) b) + 1); |
7599 | } | ||
7600 | niro | 532 | |
7601 | niro | 816 | static const char *const * |
7602 | findkwd(const char *s) | ||
7603 | { | ||
7604 | return bsearch(s, tokname_array + KWDOFFSET, | ||
7605 | ARRAY_SIZE(tokname_array) - KWDOFFSET, | ||
7606 | sizeof(tokname_array[0]), pstrcmp); | ||
7607 | niro | 532 | } |
7608 | |||
7609 | /* | ||
7610 | niro | 816 | * Locate and print what a word is... |
7611 | niro | 532 | */ |
7612 | static int | ||
7613 | niro | 816 | describe_command(char *command, int describe_command_verbose) |
7614 | niro | 532 | { |
7615 | niro | 816 | struct cmdentry entry; |
7616 | struct tblentry *cmdp; | ||
7617 | #if ENABLE_ASH_ALIAS | ||
7618 | const struct alias *ap; | ||
7619 | #endif | ||
7620 | const char *path = pathval(); | ||
7621 | niro | 532 | |
7622 | niro | 816 | if (describe_command_verbose) { |
7623 | out1str(command); | ||
7624 | niro | 532 | } |
7625 | |||
7626 | niro | 816 | /* First look at the keywords */ |
7627 | if (findkwd(command)) { | ||
7628 | out1str(describe_command_verbose ? " is a shell keyword" : command); | ||
7629 | goto out; | ||
7630 | niro | 532 | } |
7631 | |||
7632 | niro | 816 | #if ENABLE_ASH_ALIAS |
7633 | /* Then look at the aliases */ | ||
7634 | ap = lookupalias(command, 0); | ||
7635 | if (ap != NULL) { | ||
7636 | if (!describe_command_verbose) { | ||
7637 | out1str("alias "); | ||
7638 | printalias(ap); | ||
7639 | niro | 532 | return 0; |
7640 | } | ||
7641 | niro | 816 | out1fmt(" is an alias for %s", ap->val); |
7642 | goto out; | ||
7643 | niro | 532 | } |
7644 | niro | 816 | #endif |
7645 | /* Then check if it is a tracked alias */ | ||
7646 | cmdp = cmdlookup(command, 0); | ||
7647 | if (cmdp != NULL) { | ||
7648 | entry.cmdtype = cmdp->cmdtype; | ||
7649 | entry.u = cmdp->param; | ||
7650 | } else { | ||
7651 | /* Finally use brute force */ | ||
7652 | find_command(command, &entry, DO_ABS, path); | ||
7653 | } | ||
7654 | niro | 532 | |
7655 | niro | 816 | switch (entry.cmdtype) { |
7656 | case CMDNORMAL: { | ||
7657 | int j = entry.u.index; | ||
7658 | char *p; | ||
7659 | if (j < 0) { | ||
7660 | p = command; | ||
7661 | niro | 532 | } else { |
7662 | niro | 816 | do { |
7663 | niro | 984 | p = path_advance(&path, command); |
7664 | niro | 816 | stunalloc(p); |
7665 | } while (--j >= 0); | ||
7666 | niro | 532 | } |
7667 | niro | 816 | if (describe_command_verbose) { |
7668 | out1fmt(" is%s %s", | ||
7669 | (cmdp ? " a tracked alias for" : nullstr), p | ||
7670 | ); | ||
7671 | } else { | ||
7672 | out1str(p); | ||
7673 | niro | 532 | } |
7674 | niro | 816 | break; |
7675 | } | ||
7676 | niro | 532 | |
7677 | niro | 816 | case CMDFUNCTION: |
7678 | if (describe_command_verbose) { | ||
7679 | out1str(" is a shell function"); | ||
7680 | } else { | ||
7681 | out1str(command); | ||
7682 | } | ||
7683 | break; | ||
7684 | niro | 532 | |
7685 | niro | 816 | case CMDBUILTIN: |
7686 | if (describe_command_verbose) { | ||
7687 | out1fmt(" is a %sshell builtin", | ||
7688 | IS_BUILTIN_SPECIAL(entry.u.cmd) ? | ||
7689 | "special " : nullstr | ||
7690 | ); | ||
7691 | } else { | ||
7692 | out1str(command); | ||
7693 | } | ||
7694 | break; | ||
7695 | niro | 532 | |
7696 | niro | 816 | default: |
7697 | if (describe_command_verbose) { | ||
7698 | out1str(": not found\n"); | ||
7699 | niro | 532 | } |
7700 | niro | 816 | return 127; |
7701 | } | ||
7702 | out: | ||
7703 | niro | 984 | out1str("\n"); |
7704 | niro | 816 | return 0; |
7705 | niro | 532 | } |
7706 | |||
7707 | niro | 984 | static int FAST_FUNC |
7708 | niro | 816 | typecmd(int argc UNUSED_PARAM, char **argv) |
7709 | niro | 532 | { |
7710 | niro | 816 | int i = 1; |
7711 | int err = 0; | ||
7712 | int verbose = 1; | ||
7713 | niro | 532 | |
7714 | niro | 816 | /* type -p ... ? (we don't bother checking for 'p') */ |
7715 | if (argv[1] && argv[1][0] == '-') { | ||
7716 | i++; | ||
7717 | verbose = 0; | ||
7718 | } | ||
7719 | while (argv[i]) { | ||
7720 | err |= describe_command(argv[i++], verbose); | ||
7721 | } | ||
7722 | return err; | ||
7723 | niro | 532 | } |
7724 | |||
7725 | niro | 816 | #if ENABLE_ASH_CMDCMD |
7726 | niro | 984 | static int FAST_FUNC |
7727 | niro | 816 | commandcmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
7728 | niro | 532 | { |
7729 | niro | 816 | int c; |
7730 | enum { | ||
7731 | VERIFY_BRIEF = 1, | ||
7732 | VERIFY_VERBOSE = 2, | ||
7733 | } verify = 0; | ||
7734 | niro | 532 | |
7735 | niro | 816 | while ((c = nextopt("pvV")) != '\0') |
7736 | if (c == 'V') | ||
7737 | verify |= VERIFY_VERBOSE; | ||
7738 | else if (c == 'v') | ||
7739 | verify |= VERIFY_BRIEF; | ||
7740 | #if DEBUG | ||
7741 | else if (c != 'p') | ||
7742 | abort(); | ||
7743 | niro | 532 | #endif |
7744 | niro | 816 | /* Mimic bash: just "command -v" doesn't complain, it's a nop */ |
7745 | if (verify && (*argptr != NULL)) { | ||
7746 | return describe_command(*argptr, verify - VERIFY_BRIEF); | ||
7747 | niro | 532 | } |
7748 | |||
7749 | niro | 816 | return 0; |
7750 | niro | 532 | } |
7751 | niro | 816 | #endif |
7752 | niro | 532 | |
7753 | |||
7754 | niro | 816 | /* ============ eval.c */ |
7755 | niro | 532 | |
7756 | niro | 816 | static int funcblocksize; /* size of structures in function */ |
7757 | static int funcstringsize; /* size of strings in node */ | ||
7758 | static void *funcblock; /* block to allocate function from */ | ||
7759 | static char *funcstring; /* block to allocate strings from */ | ||
7760 | niro | 532 | |
7761 | niro | 816 | /* flags in argument to evaltree */ |
7762 | #define EV_EXIT 01 /* exit after evaluating tree */ | ||
7763 | #define EV_TESTED 02 /* exit status is checked; ignore -e flag */ | ||
7764 | #define EV_BACKCMD 04 /* command executing within back quotes */ | ||
7765 | niro | 532 | |
7766 | niro | 984 | static const uint8_t nodesize[N_NUMBER] = { |
7767 | niro | 816 | [NCMD ] = SHELL_ALIGN(sizeof(struct ncmd)), |
7768 | [NPIPE ] = SHELL_ALIGN(sizeof(struct npipe)), | ||
7769 | [NREDIR ] = SHELL_ALIGN(sizeof(struct nredir)), | ||
7770 | [NBACKGND ] = SHELL_ALIGN(sizeof(struct nredir)), | ||
7771 | [NSUBSHELL] = SHELL_ALIGN(sizeof(struct nredir)), | ||
7772 | [NAND ] = SHELL_ALIGN(sizeof(struct nbinary)), | ||
7773 | [NOR ] = SHELL_ALIGN(sizeof(struct nbinary)), | ||
7774 | [NSEMI ] = SHELL_ALIGN(sizeof(struct nbinary)), | ||
7775 | [NIF ] = SHELL_ALIGN(sizeof(struct nif)), | ||
7776 | [NWHILE ] = SHELL_ALIGN(sizeof(struct nbinary)), | ||
7777 | [NUNTIL ] = SHELL_ALIGN(sizeof(struct nbinary)), | ||
7778 | [NFOR ] = SHELL_ALIGN(sizeof(struct nfor)), | ||
7779 | [NCASE ] = SHELL_ALIGN(sizeof(struct ncase)), | ||
7780 | [NCLIST ] = SHELL_ALIGN(sizeof(struct nclist)), | ||
7781 | [NDEFUN ] = SHELL_ALIGN(sizeof(struct narg)), | ||
7782 | [NARG ] = SHELL_ALIGN(sizeof(struct narg)), | ||
7783 | [NTO ] = SHELL_ALIGN(sizeof(struct nfile)), | ||
7784 | #if ENABLE_ASH_BASH_COMPAT | ||
7785 | [NTO2 ] = SHELL_ALIGN(sizeof(struct nfile)), | ||
7786 | #endif | ||
7787 | [NCLOBBER ] = SHELL_ALIGN(sizeof(struct nfile)), | ||
7788 | [NFROM ] = SHELL_ALIGN(sizeof(struct nfile)), | ||
7789 | [NFROMTO ] = SHELL_ALIGN(sizeof(struct nfile)), | ||
7790 | [NAPPEND ] = SHELL_ALIGN(sizeof(struct nfile)), | ||
7791 | [NTOFD ] = SHELL_ALIGN(sizeof(struct ndup)), | ||
7792 | [NFROMFD ] = SHELL_ALIGN(sizeof(struct ndup)), | ||
7793 | [NHERE ] = SHELL_ALIGN(sizeof(struct nhere)), | ||
7794 | [NXHERE ] = SHELL_ALIGN(sizeof(struct nhere)), | ||
7795 | [NNOT ] = SHELL_ALIGN(sizeof(struct nnot)), | ||
7796 | }; | ||
7797 | niro | 532 | |
7798 | niro | 816 | static void calcsize(union node *n); |
7799 | niro | 532 | |
7800 | niro | 816 | static void |
7801 | sizenodelist(struct nodelist *lp) | ||
7802 | { | ||
7803 | while (lp) { | ||
7804 | funcblocksize += SHELL_ALIGN(sizeof(struct nodelist)); | ||
7805 | calcsize(lp->n); | ||
7806 | lp = lp->next; | ||
7807 | } | ||
7808 | } | ||
7809 | niro | 532 | |
7810 | niro | 816 | static void |
7811 | calcsize(union node *n) | ||
7812 | { | ||
7813 | if (n == NULL) | ||
7814 | return; | ||
7815 | funcblocksize += nodesize[n->type]; | ||
7816 | switch (n->type) { | ||
7817 | case NCMD: | ||
7818 | calcsize(n->ncmd.redirect); | ||
7819 | calcsize(n->ncmd.args); | ||
7820 | calcsize(n->ncmd.assign); | ||
7821 | break; | ||
7822 | case NPIPE: | ||
7823 | sizenodelist(n->npipe.cmdlist); | ||
7824 | break; | ||
7825 | case NREDIR: | ||
7826 | case NBACKGND: | ||
7827 | case NSUBSHELL: | ||
7828 | calcsize(n->nredir.redirect); | ||
7829 | calcsize(n->nredir.n); | ||
7830 | break; | ||
7831 | case NAND: | ||
7832 | case NOR: | ||
7833 | case NSEMI: | ||
7834 | case NWHILE: | ||
7835 | case NUNTIL: | ||
7836 | calcsize(n->nbinary.ch2); | ||
7837 | calcsize(n->nbinary.ch1); | ||
7838 | break; | ||
7839 | case NIF: | ||
7840 | calcsize(n->nif.elsepart); | ||
7841 | calcsize(n->nif.ifpart); | ||
7842 | calcsize(n->nif.test); | ||
7843 | break; | ||
7844 | case NFOR: | ||
7845 | funcstringsize += strlen(n->nfor.var) + 1; | ||
7846 | calcsize(n->nfor.body); | ||
7847 | calcsize(n->nfor.args); | ||
7848 | break; | ||
7849 | case NCASE: | ||
7850 | calcsize(n->ncase.cases); | ||
7851 | calcsize(n->ncase.expr); | ||
7852 | break; | ||
7853 | case NCLIST: | ||
7854 | calcsize(n->nclist.body); | ||
7855 | calcsize(n->nclist.pattern); | ||
7856 | calcsize(n->nclist.next); | ||
7857 | break; | ||
7858 | case NDEFUN: | ||
7859 | case NARG: | ||
7860 | sizenodelist(n->narg.backquote); | ||
7861 | funcstringsize += strlen(n->narg.text) + 1; | ||
7862 | calcsize(n->narg.next); | ||
7863 | break; | ||
7864 | case NTO: | ||
7865 | #if ENABLE_ASH_BASH_COMPAT | ||
7866 | case NTO2: | ||
7867 | niro | 532 | #endif |
7868 | niro | 816 | case NCLOBBER: |
7869 | case NFROM: | ||
7870 | case NFROMTO: | ||
7871 | case NAPPEND: | ||
7872 | calcsize(n->nfile.fname); | ||
7873 | calcsize(n->nfile.next); | ||
7874 | break; | ||
7875 | case NTOFD: | ||
7876 | case NFROMFD: | ||
7877 | calcsize(n->ndup.vname); | ||
7878 | calcsize(n->ndup.next); | ||
7879 | break; | ||
7880 | case NHERE: | ||
7881 | case NXHERE: | ||
7882 | calcsize(n->nhere.doc); | ||
7883 | calcsize(n->nhere.next); | ||
7884 | break; | ||
7885 | case NNOT: | ||
7886 | calcsize(n->nnot.com); | ||
7887 | break; | ||
7888 | }; | ||
7889 | } | ||
7890 | niro | 532 | |
7891 | niro | 816 | static char * |
7892 | nodeckstrdup(char *s) | ||
7893 | { | ||
7894 | char *rtn = funcstring; | ||
7895 | niro | 532 | |
7896 | niro | 816 | strcpy(funcstring, s); |
7897 | funcstring += strlen(s) + 1; | ||
7898 | return rtn; | ||
7899 | } | ||
7900 | niro | 532 | |
7901 | niro | 816 | static union node *copynode(union node *); |
7902 | niro | 532 | |
7903 | niro | 816 | static struct nodelist * |
7904 | copynodelist(struct nodelist *lp) | ||
7905 | { | ||
7906 | struct nodelist *start; | ||
7907 | struct nodelist **lpp; | ||
7908 | niro | 532 | |
7909 | niro | 816 | lpp = &start; |
7910 | while (lp) { | ||
7911 | *lpp = funcblock; | ||
7912 | funcblock = (char *) funcblock + SHELL_ALIGN(sizeof(struct nodelist)); | ||
7913 | (*lpp)->n = copynode(lp->n); | ||
7914 | lp = lp->next; | ||
7915 | lpp = &(*lpp)->next; | ||
7916 | niro | 532 | } |
7917 | niro | 816 | *lpp = NULL; |
7918 | return start; | ||
7919 | niro | 532 | } |
7920 | |||
7921 | niro | 816 | static union node * |
7922 | copynode(union node *n) | ||
7923 | niro | 532 | { |
7924 | niro | 816 | union node *new; |
7925 | niro | 532 | |
7926 | niro | 816 | if (n == NULL) |
7927 | return NULL; | ||
7928 | new = funcblock; | ||
7929 | funcblock = (char *) funcblock + nodesize[n->type]; | ||
7930 | niro | 532 | |
7931 | niro | 816 | switch (n->type) { |
7932 | case NCMD: | ||
7933 | new->ncmd.redirect = copynode(n->ncmd.redirect); | ||
7934 | new->ncmd.args = copynode(n->ncmd.args); | ||
7935 | new->ncmd.assign = copynode(n->ncmd.assign); | ||
7936 | break; | ||
7937 | case NPIPE: | ||
7938 | new->npipe.cmdlist = copynodelist(n->npipe.cmdlist); | ||
7939 | new->npipe.pipe_backgnd = n->npipe.pipe_backgnd; | ||
7940 | break; | ||
7941 | case NREDIR: | ||
7942 | case NBACKGND: | ||
7943 | case NSUBSHELL: | ||
7944 | new->nredir.redirect = copynode(n->nredir.redirect); | ||
7945 | new->nredir.n = copynode(n->nredir.n); | ||
7946 | break; | ||
7947 | case NAND: | ||
7948 | case NOR: | ||
7949 | case NSEMI: | ||
7950 | case NWHILE: | ||
7951 | case NUNTIL: | ||
7952 | new->nbinary.ch2 = copynode(n->nbinary.ch2); | ||
7953 | new->nbinary.ch1 = copynode(n->nbinary.ch1); | ||
7954 | break; | ||
7955 | case NIF: | ||
7956 | new->nif.elsepart = copynode(n->nif.elsepart); | ||
7957 | new->nif.ifpart = copynode(n->nif.ifpart); | ||
7958 | new->nif.test = copynode(n->nif.test); | ||
7959 | break; | ||
7960 | case NFOR: | ||
7961 | new->nfor.var = nodeckstrdup(n->nfor.var); | ||
7962 | new->nfor.body = copynode(n->nfor.body); | ||
7963 | new->nfor.args = copynode(n->nfor.args); | ||
7964 | break; | ||
7965 | case NCASE: | ||
7966 | new->ncase.cases = copynode(n->ncase.cases); | ||
7967 | new->ncase.expr = copynode(n->ncase.expr); | ||
7968 | break; | ||
7969 | case NCLIST: | ||
7970 | new->nclist.body = copynode(n->nclist.body); | ||
7971 | new->nclist.pattern = copynode(n->nclist.pattern); | ||
7972 | new->nclist.next = copynode(n->nclist.next); | ||
7973 | break; | ||
7974 | case NDEFUN: | ||
7975 | case NARG: | ||
7976 | new->narg.backquote = copynodelist(n->narg.backquote); | ||
7977 | new->narg.text = nodeckstrdup(n->narg.text); | ||
7978 | new->narg.next = copynode(n->narg.next); | ||
7979 | break; | ||
7980 | case NTO: | ||
7981 | #if ENABLE_ASH_BASH_COMPAT | ||
7982 | case NTO2: | ||
7983 | #endif | ||
7984 | case NCLOBBER: | ||
7985 | case NFROM: | ||
7986 | case NFROMTO: | ||
7987 | case NAPPEND: | ||
7988 | new->nfile.fname = copynode(n->nfile.fname); | ||
7989 | new->nfile.fd = n->nfile.fd; | ||
7990 | new->nfile.next = copynode(n->nfile.next); | ||
7991 | break; | ||
7992 | case NTOFD: | ||
7993 | case NFROMFD: | ||
7994 | new->ndup.vname = copynode(n->ndup.vname); | ||
7995 | new->ndup.dupfd = n->ndup.dupfd; | ||
7996 | new->ndup.fd = n->ndup.fd; | ||
7997 | new->ndup.next = copynode(n->ndup.next); | ||
7998 | break; | ||
7999 | case NHERE: | ||
8000 | case NXHERE: | ||
8001 | new->nhere.doc = copynode(n->nhere.doc); | ||
8002 | new->nhere.fd = n->nhere.fd; | ||
8003 | new->nhere.next = copynode(n->nhere.next); | ||
8004 | break; | ||
8005 | case NNOT: | ||
8006 | new->nnot.com = copynode(n->nnot.com); | ||
8007 | break; | ||
8008 | }; | ||
8009 | new->type = n->type; | ||
8010 | return new; | ||
8011 | niro | 532 | } |
8012 | |||
8013 | /* | ||
8014 | niro | 816 | * Make a copy of a parse tree. |
8015 | niro | 532 | */ |
8016 | niro | 816 | static struct funcnode * |
8017 | copyfunc(union node *n) | ||
8018 | niro | 532 | { |
8019 | niro | 816 | struct funcnode *f; |
8020 | size_t blocksize; | ||
8021 | niro | 532 | |
8022 | niro | 816 | funcblocksize = offsetof(struct funcnode, n); |
8023 | funcstringsize = 0; | ||
8024 | calcsize(n); | ||
8025 | blocksize = funcblocksize; | ||
8026 | f = ckmalloc(blocksize + funcstringsize); | ||
8027 | funcblock = (char *) f + offsetof(struct funcnode, n); | ||
8028 | funcstring = (char *) f + blocksize; | ||
8029 | copynode(n); | ||
8030 | f->count = 0; | ||
8031 | return f; | ||
8032 | niro | 532 | } |
8033 | |||
8034 | /* | ||
8035 | niro | 816 | * Define a shell function. |
8036 | niro | 532 | */ |
8037 | static void | ||
8038 | niro | 816 | defun(char *name, union node *func) |
8039 | niro | 532 | { |
8040 | niro | 816 | struct cmdentry entry; |
8041 | niro | 532 | |
8042 | niro | 816 | INT_OFF; |
8043 | entry.cmdtype = CMDFUNCTION; | ||
8044 | entry.u.func = copyfunc(func); | ||
8045 | addcmdentry(name, &entry); | ||
8046 | INT_ON; | ||
8047 | niro | 532 | } |
8048 | |||
8049 | niro | 984 | /* Reasons for skipping commands (see comment on breakcmd routine) */ |
8050 | niro | 816 | #define SKIPBREAK (1 << 0) |
8051 | #define SKIPCONT (1 << 1) | ||
8052 | #define SKIPFUNC (1 << 2) | ||
8053 | #define SKIPFILE (1 << 3) | ||
8054 | #define SKIPEVAL (1 << 4) | ||
8055 | niro | 984 | static smallint evalskip; /* set to SKIPxxx if we are skipping commands */ |
8056 | niro | 816 | static int skipcount; /* number of levels to skip */ |
8057 | static int funcnest; /* depth of function calls */ | ||
8058 | static int loopnest; /* current loop nesting level */ | ||
8059 | niro | 532 | |
8060 | niro | 984 | /* Forward decl way out to parsing code - dotrap needs it */ |
8061 | niro | 816 | static int evalstring(char *s, int mask); |
8062 | |||
8063 | niro | 984 | /* Called to execute a trap. |
8064 | * Single callsite - at the end of evaltree(). | ||
8065 | * If we return non-zero, exaltree raises EXEXIT exception. | ||
8066 | * | ||
8067 | * Perhaps we should avoid entering new trap handlers | ||
8068 | * while we are executing a trap handler. [is it a TODO?] | ||
8069 | niro | 816 | */ |
8070 | niro | 532 | static int |
8071 | niro | 816 | dotrap(void) |
8072 | niro | 532 | { |
8073 | niro | 984 | uint8_t *g; |
8074 | int sig; | ||
8075 | uint8_t savestatus; | ||
8076 | niro | 532 | |
8077 | niro | 816 | savestatus = exitstatus; |
8078 | niro | 984 | pending_sig = 0; |
8079 | niro | 816 | xbarrier(); |
8080 | niro | 532 | |
8081 | niro | 816 | TRACE(("dotrap entered\n")); |
8082 | niro | 984 | for (sig = 1, g = gotsig; sig < NSIG; sig++, g++) { |
8083 | int want_exexit; | ||
8084 | char *t; | ||
8085 | |||
8086 | if (*g == 0) | ||
8087 | niro | 816 | continue; |
8088 | niro | 984 | t = trap[sig]; |
8089 | niro | 816 | /* non-trapped SIGINT is handled separately by raise_interrupt, |
8090 | * don't upset it by resetting gotsig[SIGINT-1] */ | ||
8091 | niro | 984 | if (sig == SIGINT && !t) |
8092 | niro | 816 | continue; |
8093 | |||
8094 | niro | 984 | TRACE(("sig %d is active, will run handler '%s'\n", sig, t)); |
8095 | *g = 0; | ||
8096 | if (!t) | ||
8097 | niro | 816 | continue; |
8098 | niro | 984 | want_exexit = evalstring(t, SKIPEVAL); |
8099 | niro | 816 | exitstatus = savestatus; |
8100 | niro | 984 | if (want_exexit) { |
8101 | TRACE(("dotrap returns %d\n", want_exexit)); | ||
8102 | return want_exexit; | ||
8103 | niro | 532 | } |
8104 | } | ||
8105 | |||
8106 | niro | 816 | TRACE(("dotrap returns 0\n")); |
8107 | return 0; | ||
8108 | niro | 532 | } |
8109 | |||
8110 | niro | 816 | /* forward declarations - evaluation is fairly recursive business... */ |
8111 | static void evalloop(union node *, int); | ||
8112 | static void evalfor(union node *, int); | ||
8113 | static void evalcase(union node *, int); | ||
8114 | static void evalsubshell(union node *, int); | ||
8115 | static void expredir(union node *); | ||
8116 | static void evalpipe(union node *, int); | ||
8117 | static void evalcommand(union node *, int); | ||
8118 | static int evalbltin(const struct builtincmd *, int, char **); | ||
8119 | static void prehash(union node *); | ||
8120 | niro | 532 | |
8121 | /* | ||
8122 | niro | 816 | * Evaluate a parse tree. The value is left in the global variable |
8123 | * exitstatus. | ||
8124 | niro | 532 | */ |
8125 | niro | 816 | static void |
8126 | evaltree(union node *n, int flags) | ||
8127 | niro | 532 | { |
8128 | niro | 816 | struct jmploc *volatile savehandler = exception_handler; |
8129 | struct jmploc jmploc; | ||
8130 | int checkexit = 0; | ||
8131 | void (*evalfn)(union node *, int); | ||
8132 | int status; | ||
8133 | int int_level; | ||
8134 | niro | 532 | |
8135 | niro | 816 | SAVE_INT(int_level); |
8136 | niro | 532 | |
8137 | niro | 816 | if (n == NULL) { |
8138 | TRACE(("evaltree(NULL) called\n")); | ||
8139 | goto out1; | ||
8140 | niro | 532 | } |
8141 | niro | 984 | TRACE(("evaltree(%p: %d, %d) called\n", n, n->type, flags)); |
8142 | niro | 532 | |
8143 | niro | 816 | exception_handler = &jmploc; |
8144 | { | ||
8145 | int err = setjmp(jmploc.loc); | ||
8146 | if (err) { | ||
8147 | /* if it was a signal, check for trap handlers */ | ||
8148 | niro | 984 | if (exception_type == EXSIG) { |
8149 | TRACE(("exception %d (EXSIG) in evaltree, err=%d\n", | ||
8150 | exception_type, err)); | ||
8151 | niro | 816 | goto out; |
8152 | } | ||
8153 | /* continue on the way out */ | ||
8154 | niro | 984 | TRACE(("exception %d in evaltree, propagating err=%d\n", |
8155 | exception_type, err)); | ||
8156 | niro | 816 | exception_handler = savehandler; |
8157 | longjmp(exception_handler->loc, err); | ||
8158 | niro | 532 | } |
8159 | } | ||
8160 | |||
8161 | niro | 816 | switch (n->type) { |
8162 | default: | ||
8163 | #if DEBUG | ||
8164 | out1fmt("Node type = %d\n", n->type); | ||
8165 | niro | 984 | fflush_all(); |
8166 | niro | 816 | break; |
8167 | #endif | ||
8168 | case NNOT: | ||
8169 | evaltree(n->nnot.com, EV_TESTED); | ||
8170 | status = !exitstatus; | ||
8171 | goto setstatus; | ||
8172 | case NREDIR: | ||
8173 | expredir(n->nredir.redirect); | ||
8174 | status = redirectsafe(n->nredir.redirect, REDIR_PUSH); | ||
8175 | if (!status) { | ||
8176 | evaltree(n->nredir.n, flags & EV_TESTED); | ||
8177 | status = exitstatus; | ||
8178 | niro | 532 | } |
8179 | niro | 816 | popredir(/*drop:*/ 0, /*restore:*/ 0 /* not sure */); |
8180 | goto setstatus; | ||
8181 | case NCMD: | ||
8182 | evalfn = evalcommand; | ||
8183 | checkexit: | ||
8184 | if (eflag && !(flags & EV_TESTED)) | ||
8185 | checkexit = ~0; | ||
8186 | goto calleval; | ||
8187 | case NFOR: | ||
8188 | evalfn = evalfor; | ||
8189 | goto calleval; | ||
8190 | case NWHILE: | ||
8191 | case NUNTIL: | ||
8192 | evalfn = evalloop; | ||
8193 | goto calleval; | ||
8194 | case NSUBSHELL: | ||
8195 | case NBACKGND: | ||
8196 | evalfn = evalsubshell; | ||
8197 | goto calleval; | ||
8198 | case NPIPE: | ||
8199 | evalfn = evalpipe; | ||
8200 | goto checkexit; | ||
8201 | case NCASE: | ||
8202 | evalfn = evalcase; | ||
8203 | goto calleval; | ||
8204 | case NAND: | ||
8205 | case NOR: | ||
8206 | case NSEMI: { | ||
8207 | niro | 532 | |
8208 | niro | 816 | #if NAND + 1 != NOR |
8209 | #error NAND + 1 != NOR | ||
8210 | niro | 532 | #endif |
8211 | niro | 816 | #if NOR + 1 != NSEMI |
8212 | #error NOR + 1 != NSEMI | ||
8213 | #endif | ||
8214 | unsigned is_or = n->type - NAND; | ||
8215 | evaltree( | ||
8216 | n->nbinary.ch1, | ||
8217 | (flags | ((is_or >> 1) - 1)) & EV_TESTED | ||
8218 | ); | ||
8219 | if (!exitstatus == is_or) | ||
8220 | niro | 532 | break; |
8221 | niro | 816 | if (!evalskip) { |
8222 | n = n->nbinary.ch2; | ||
8223 | evaln: | ||
8224 | evalfn = evaltree; | ||
8225 | calleval: | ||
8226 | evalfn(n, flags); | ||
8227 | break; | ||
8228 | niro | 532 | } |
8229 | niro | 816 | break; |
8230 | } | ||
8231 | case NIF: | ||
8232 | evaltree(n->nif.test, EV_TESTED); | ||
8233 | if (evalskip) | ||
8234 | niro | 532 | break; |
8235 | niro | 816 | if (exitstatus == 0) { |
8236 | n = n->nif.ifpart; | ||
8237 | goto evaln; | ||
8238 | } | ||
8239 | if (n->nif.elsepart) { | ||
8240 | n = n->nif.elsepart; | ||
8241 | goto evaln; | ||
8242 | } | ||
8243 | goto success; | ||
8244 | case NDEFUN: | ||
8245 | defun(n->narg.text, n->narg.next); | ||
8246 | success: | ||
8247 | status = 0; | ||
8248 | setstatus: | ||
8249 | exitstatus = status; | ||
8250 | niro | 532 | break; |
8251 | } | ||
8252 | |||
8253 | niro | 816 | out: |
8254 | exception_handler = savehandler; | ||
8255 | out1: | ||
8256 | if (checkexit & exitstatus) | ||
8257 | evalskip |= SKIPEVAL; | ||
8258 | niro | 984 | else if (pending_sig && dotrap()) |
8259 | niro | 816 | goto exexit; |
8260 | niro | 532 | |
8261 | niro | 816 | if (flags & EV_EXIT) { |
8262 | exexit: | ||
8263 | raise_exception(EXEXIT); | ||
8264 | niro | 532 | } |
8265 | |||
8266 | niro | 816 | RESTORE_INT(int_level); |
8267 | TRACE(("leaving evaltree (no interrupts)\n")); | ||
8268 | niro | 532 | } |
8269 | |||
8270 | niro | 816 | #if !defined(__alpha__) || (defined(__GNUC__) && __GNUC__ >= 3) |
8271 | static | ||
8272 | #endif | ||
8273 | void evaltreenr(union node *, int) __attribute__ ((alias("evaltree"),__noreturn__)); | ||
8274 | niro | 532 | |
8275 | niro | 816 | static void |
8276 | evalloop(union node *n, int flags) | ||
8277 | niro | 532 | { |
8278 | niro | 816 | int status; |
8279 | niro | 532 | |
8280 | niro | 816 | loopnest++; |
8281 | status = 0; | ||
8282 | flags &= EV_TESTED; | ||
8283 | for (;;) { | ||
8284 | int i; | ||
8285 | niro | 532 | |
8286 | niro | 816 | evaltree(n->nbinary.ch1, EV_TESTED); |
8287 | if (evalskip) { | ||
8288 | skipping: | ||
8289 | if (evalskip == SKIPCONT && --skipcount <= 0) { | ||
8290 | evalskip = 0; | ||
8291 | continue; | ||
8292 | } | ||
8293 | if (evalskip == SKIPBREAK && --skipcount <= 0) | ||
8294 | evalskip = 0; | ||
8295 | break; | ||
8296 | niro | 532 | } |
8297 | niro | 816 | i = exitstatus; |
8298 | if (n->type != NWHILE) | ||
8299 | i = !i; | ||
8300 | if (i != 0) | ||
8301 | break; | ||
8302 | evaltree(n->nbinary.ch2, flags); | ||
8303 | status = exitstatus; | ||
8304 | if (evalskip) | ||
8305 | goto skipping; | ||
8306 | niro | 532 | } |
8307 | niro | 816 | loopnest--; |
8308 | exitstatus = status; | ||
8309 | niro | 532 | } |
8310 | |||
8311 | niro | 816 | static void |
8312 | evalfor(union node *n, int flags) | ||
8313 | niro | 532 | { |
8314 | niro | 816 | struct arglist arglist; |
8315 | union node *argp; | ||
8316 | struct strlist *sp; | ||
8317 | struct stackmark smark; | ||
8318 | |||
8319 | setstackmark(&smark); | ||
8320 | arglist.list = NULL; | ||
8321 | arglist.lastp = &arglist.list; | ||
8322 | for (argp = n->nfor.args; argp; argp = argp->narg.next) { | ||
8323 | expandarg(argp, &arglist, EXP_FULL | EXP_TILDE | EXP_RECORD); | ||
8324 | /* XXX */ | ||
8325 | if (evalskip) | ||
8326 | goto out; | ||
8327 | niro | 532 | } |
8328 | niro | 816 | *arglist.lastp = NULL; |
8329 | niro | 532 | |
8330 | niro | 816 | exitstatus = 0; |
8331 | loopnest++; | ||
8332 | flags &= EV_TESTED; | ||
8333 | for (sp = arglist.list; sp; sp = sp->next) { | ||
8334 | setvar(n->nfor.var, sp->text, 0); | ||
8335 | evaltree(n->nfor.body, flags); | ||
8336 | if (evalskip) { | ||
8337 | if (evalskip == SKIPCONT && --skipcount <= 0) { | ||
8338 | evalskip = 0; | ||
8339 | continue; | ||
8340 | } | ||
8341 | if (evalskip == SKIPBREAK && --skipcount <= 0) | ||
8342 | evalskip = 0; | ||
8343 | break; | ||
8344 | } | ||
8345 | niro | 532 | } |
8346 | niro | 816 | loopnest--; |
8347 | out: | ||
8348 | popstackmark(&smark); | ||
8349 | niro | 532 | } |
8350 | |||
8351 | niro | 816 | static void |
8352 | evalcase(union node *n, int flags) | ||
8353 | niro | 532 | { |
8354 | niro | 816 | union node *cp; |
8355 | union node *patp; | ||
8356 | struct arglist arglist; | ||
8357 | struct stackmark smark; | ||
8358 | niro | 532 | |
8359 | niro | 816 | setstackmark(&smark); |
8360 | arglist.list = NULL; | ||
8361 | arglist.lastp = &arglist.list; | ||
8362 | expandarg(n->ncase.expr, &arglist, EXP_TILDE); | ||
8363 | exitstatus = 0; | ||
8364 | for (cp = n->ncase.cases; cp && evalskip == 0; cp = cp->nclist.next) { | ||
8365 | for (patp = cp->nclist.pattern; patp; patp = patp->narg.next) { | ||
8366 | if (casematch(patp, arglist.list->text)) { | ||
8367 | if (evalskip == 0) { | ||
8368 | evaltree(cp->nclist.body, flags); | ||
8369 | } | ||
8370 | goto out; | ||
8371 | } | ||
8372 | } | ||
8373 | niro | 532 | } |
8374 | niro | 816 | out: |
8375 | popstackmark(&smark); | ||
8376 | niro | 532 | } |
8377 | |||
8378 | /* | ||
8379 | niro | 816 | * Kick off a subshell to evaluate a tree. |
8380 | niro | 532 | */ |
8381 | niro | 816 | static void |
8382 | evalsubshell(union node *n, int flags) | ||
8383 | niro | 532 | { |
8384 | niro | 816 | struct job *jp; |
8385 | int backgnd = (n->type == NBACKGND); | ||
8386 | int status; | ||
8387 | niro | 532 | |
8388 | niro | 816 | expredir(n->nredir.redirect); |
8389 | if (!backgnd && flags & EV_EXIT && !trap[0]) | ||
8390 | goto nofork; | ||
8391 | INT_OFF; | ||
8392 | jp = makejob(/*n,*/ 1); | ||
8393 | if (forkshell(jp, n, backgnd) == 0) { | ||
8394 | INT_ON; | ||
8395 | flags |= EV_EXIT; | ||
8396 | if (backgnd) | ||
8397 | flags &=~ EV_TESTED; | ||
8398 | nofork: | ||
8399 | redirect(n->nredir.redirect, 0); | ||
8400 | evaltreenr(n->nredir.n, flags); | ||
8401 | /* never returns */ | ||
8402 | niro | 532 | } |
8403 | niro | 816 | status = 0; |
8404 | if (!backgnd) | ||
8405 | status = waitforjob(jp); | ||
8406 | exitstatus = status; | ||
8407 | INT_ON; | ||
8408 | niro | 532 | } |
8409 | |||
8410 | /* | ||
8411 | niro | 816 | * Compute the names of the files in a redirection list. |
8412 | niro | 532 | */ |
8413 | niro | 816 | static void fixredir(union node *, const char *, int); |
8414 | static void | ||
8415 | expredir(union node *n) | ||
8416 | niro | 532 | { |
8417 | niro | 816 | union node *redir; |
8418 | niro | 532 | |
8419 | niro | 816 | for (redir = n; redir; redir = redir->nfile.next) { |
8420 | struct arglist fn; | ||
8421 | |||
8422 | fn.list = NULL; | ||
8423 | fn.lastp = &fn.list; | ||
8424 | switch (redir->type) { | ||
8425 | case NFROMTO: | ||
8426 | case NFROM: | ||
8427 | case NTO: | ||
8428 | #if ENABLE_ASH_BASH_COMPAT | ||
8429 | case NTO2: | ||
8430 | niro | 532 | #endif |
8431 | niro | 816 | case NCLOBBER: |
8432 | case NAPPEND: | ||
8433 | expandarg(redir->nfile.fname, &fn, EXP_TILDE | EXP_REDIR); | ||
8434 | #if ENABLE_ASH_BASH_COMPAT | ||
8435 | store_expfname: | ||
8436 | #endif | ||
8437 | redir->nfile.expfname = fn.list->text; | ||
8438 | break; | ||
8439 | case NFROMFD: | ||
8440 | case NTOFD: /* >& */ | ||
8441 | if (redir->ndup.vname) { | ||
8442 | expandarg(redir->ndup.vname, &fn, EXP_FULL | EXP_TILDE); | ||
8443 | if (fn.list == NULL) | ||
8444 | ash_msg_and_raise_error("redir error"); | ||
8445 | #if ENABLE_ASH_BASH_COMPAT | ||
8446 | //FIXME: we used expandarg with different args! | ||
8447 | if (!isdigit_str9(fn.list->text)) { | ||
8448 | /* >&file, not >&fd */ | ||
8449 | if (redir->nfile.fd != 1) /* 123>&file - BAD */ | ||
8450 | ash_msg_and_raise_error("redir error"); | ||
8451 | redir->type = NTO2; | ||
8452 | goto store_expfname; | ||
8453 | } | ||
8454 | #endif | ||
8455 | fixredir(redir, fn.list->text, 1); | ||
8456 | } | ||
8457 | break; | ||
8458 | } | ||
8459 | } | ||
8460 | niro | 532 | } |
8461 | |||
8462 | /* | ||
8463 | niro | 816 | * Evaluate a pipeline. All the processes in the pipeline are children |
8464 | * of the process creating the pipeline. (This differs from some versions | ||
8465 | * of the shell, which make the last process in a pipeline the parent | ||
8466 | * of all the rest.) | ||
8467 | niro | 532 | */ |
8468 | niro | 816 | static void |
8469 | evalpipe(union node *n, int flags) | ||
8470 | niro | 532 | { |
8471 | struct job *jp; | ||
8472 | niro | 816 | struct nodelist *lp; |
8473 | int pipelen; | ||
8474 | int prevfd; | ||
8475 | int pip[2]; | ||
8476 | niro | 532 | |
8477 | niro | 816 | TRACE(("evalpipe(0x%lx) called\n", (long)n)); |
8478 | pipelen = 0; | ||
8479 | for (lp = n->npipe.cmdlist; lp; lp = lp->next) | ||
8480 | pipelen++; | ||
8481 | flags |= EV_EXIT; | ||
8482 | INT_OFF; | ||
8483 | jp = makejob(/*n,*/ pipelen); | ||
8484 | prevfd = -1; | ||
8485 | for (lp = n->npipe.cmdlist; lp; lp = lp->next) { | ||
8486 | prehash(lp->n); | ||
8487 | pip[1] = -1; | ||
8488 | if (lp->next) { | ||
8489 | if (pipe(pip) < 0) { | ||
8490 | close(prevfd); | ||
8491 | ash_msg_and_raise_error("pipe call failed"); | ||
8492 | niro | 532 | } |
8493 | niro | 816 | } |
8494 | if (forkshell(jp, lp->n, n->npipe.pipe_backgnd) == 0) { | ||
8495 | INT_ON; | ||
8496 | if (pip[1] >= 0) { | ||
8497 | close(pip[0]); | ||
8498 | niro | 532 | } |
8499 | niro | 816 | if (prevfd > 0) { |
8500 | dup2(prevfd, 0); | ||
8501 | close(prevfd); | ||
8502 | niro | 532 | } |
8503 | niro | 816 | if (pip[1] > 1) { |
8504 | dup2(pip[1], 1); | ||
8505 | close(pip[1]); | ||
8506 | } | ||
8507 | evaltreenr(lp->n, flags); | ||
8508 | /* never returns */ | ||
8509 | niro | 532 | } |
8510 | niro | 816 | if (prevfd >= 0) |
8511 | close(prevfd); | ||
8512 | prevfd = pip[0]; | ||
8513 | /* Don't want to trigger debugging */ | ||
8514 | if (pip[1] != -1) | ||
8515 | close(pip[1]); | ||
8516 | niro | 532 | } |
8517 | niro | 816 | if (n->npipe.pipe_backgnd == 0) { |
8518 | exitstatus = waitforjob(jp); | ||
8519 | TRACE(("evalpipe: job done exit status %d\n", exitstatus)); | ||
8520 | niro | 532 | } |
8521 | niro | 816 | INT_ON; |
8522 | niro | 532 | } |
8523 | |||
8524 | /* | ||
8525 | niro | 816 | * Controls whether the shell is interactive or not. |
8526 | niro | 532 | */ |
8527 | niro | 816 | static void |
8528 | setinteractive(int on) | ||
8529 | niro | 532 | { |
8530 | niro | 816 | static smallint is_interactive; |
8531 | niro | 532 | |
8532 | niro | 816 | if (++on == is_interactive) |
8533 | return; | ||
8534 | is_interactive = on; | ||
8535 | setsignal(SIGINT); | ||
8536 | setsignal(SIGQUIT); | ||
8537 | setsignal(SIGTERM); | ||
8538 | #if !ENABLE_FEATURE_SH_EXTRA_QUIET | ||
8539 | if (is_interactive > 1) { | ||
8540 | /* Looks like they want an interactive shell */ | ||
8541 | static smallint did_banner; | ||
8542 | |||
8543 | if (!did_banner) { | ||
8544 | niro | 984 | /* note: ash and hush share this string */ |
8545 | out1fmt("\n\n%s %s\n" | ||
8546 | niro | 816 | "Enter 'help' for a list of built-in commands." |
8547 | "\n\n", | ||
8548 | niro | 984 | bb_banner, |
8549 | "built-in shell (ash)" | ||
8550 | ); | ||
8551 | niro | 816 | did_banner = 1; |
8552 | } | ||
8553 | niro | 532 | } |
8554 | niro | 816 | #endif |
8555 | } | ||
8556 | niro | 532 | |
8557 | niro | 816 | static void |
8558 | optschanged(void) | ||
8559 | { | ||
8560 | #if DEBUG | ||
8561 | opentrace(); | ||
8562 | #endif | ||
8563 | setinteractive(iflag); | ||
8564 | setjobctl(mflag); | ||
8565 | #if ENABLE_FEATURE_EDITING_VI | ||
8566 | if (viflag) | ||
8567 | line_input_state->flags |= VI_MODE; | ||
8568 | else | ||
8569 | line_input_state->flags &= ~VI_MODE; | ||
8570 | #else | ||
8571 | viflag = 0; /* forcibly keep the option off */ | ||
8572 | #endif | ||
8573 | niro | 532 | } |
8574 | |||
8575 | niro | 816 | static struct localvar *localvars; |
8576 | |||
8577 | niro | 532 | /* |
8578 | niro | 816 | * Called after a function returns. |
8579 | * Interrupts must be off. | ||
8580 | niro | 532 | */ |
8581 | static void | ||
8582 | niro | 816 | poplocalvars(void) |
8583 | niro | 532 | { |
8584 | niro | 816 | struct localvar *lvp; |
8585 | struct var *vp; | ||
8586 | niro | 532 | |
8587 | niro | 816 | while ((lvp = localvars) != NULL) { |
8588 | localvars = lvp->next; | ||
8589 | vp = lvp->vp; | ||
8590 | niro | 984 | TRACE(("poplocalvar %s\n", vp ? vp->text : "-")); |
8591 | niro | 816 | if (vp == NULL) { /* $- saved */ |
8592 | memcpy(optlist, lvp->text, sizeof(optlist)); | ||
8593 | free((char*)lvp->text); | ||
8594 | optschanged(); | ||
8595 | } else if ((lvp->flags & (VUNSET|VSTRFIXED)) == VUNSET) { | ||
8596 | unsetvar(vp->text); | ||
8597 | niro | 532 | } else { |
8598 | niro | 816 | if (vp->func) |
8599 | (*vp->func)(strchrnul(lvp->text, '=') + 1); | ||
8600 | if ((vp->flags & (VTEXTFIXED|VSTACK)) == 0) | ||
8601 | free((char*)vp->text); | ||
8602 | vp->flags = lvp->flags; | ||
8603 | vp->text = lvp->text; | ||
8604 | niro | 532 | } |
8605 | niro | 816 | free(lvp); |
8606 | niro | 532 | } |
8607 | } | ||
8608 | |||
8609 | niro | 816 | static int |
8610 | evalfun(struct funcnode *func, int argc, char **argv, int flags) | ||
8611 | niro | 532 | { |
8612 | niro | 816 | volatile struct shparam saveparam; |
8613 | struct localvar *volatile savelocalvars; | ||
8614 | struct jmploc *volatile savehandler; | ||
8615 | struct jmploc jmploc; | ||
8616 | int e; | ||
8617 | |||
8618 | saveparam = shellparam; | ||
8619 | savelocalvars = localvars; | ||
8620 | e = setjmp(jmploc.loc); | ||
8621 | if (e) { | ||
8622 | goto funcdone; | ||
8623 | niro | 532 | } |
8624 | niro | 816 | INT_OFF; |
8625 | savehandler = exception_handler; | ||
8626 | exception_handler = &jmploc; | ||
8627 | localvars = NULL; | ||
8628 | shellparam.malloced = 0; | ||
8629 | func->count++; | ||
8630 | funcnest++; | ||
8631 | INT_ON; | ||
8632 | shellparam.nparam = argc - 1; | ||
8633 | shellparam.p = argv + 1; | ||
8634 | #if ENABLE_ASH_GETOPTS | ||
8635 | shellparam.optind = 1; | ||
8636 | shellparam.optoff = -1; | ||
8637 | #endif | ||
8638 | evaltree(&func->n, flags & EV_TESTED); | ||
8639 | funcdone: | ||
8640 | INT_OFF; | ||
8641 | funcnest--; | ||
8642 | freefunc(func); | ||
8643 | poplocalvars(); | ||
8644 | localvars = savelocalvars; | ||
8645 | freeparam(&shellparam); | ||
8646 | shellparam = saveparam; | ||
8647 | exception_handler = savehandler; | ||
8648 | INT_ON; | ||
8649 | evalskip &= ~SKIPFUNC; | ||
8650 | return e; | ||
8651 | niro | 532 | } |
8652 | |||
8653 | niro | 816 | #if ENABLE_ASH_CMDCMD |
8654 | static char ** | ||
8655 | parse_command_args(char **argv, const char **path) | ||
8656 | niro | 532 | { |
8657 | niro | 816 | char *cp, c; |
8658 | |||
8659 | for (;;) { | ||
8660 | cp = *++argv; | ||
8661 | if (!cp) | ||
8662 | return 0; | ||
8663 | if (*cp++ != '-') | ||
8664 | niro | 532 | break; |
8665 | niro | 816 | c = *cp++; |
8666 | if (!c) | ||
8667 | niro | 532 | break; |
8668 | niro | 816 | if (c == '-' && !*cp) { |
8669 | argv++; | ||
8670 | niro | 532 | break; |
8671 | niro | 816 | } |
8672 | do { | ||
8673 | switch (c) { | ||
8674 | case 'p': | ||
8675 | *path = bb_default_path; | ||
8676 | niro | 532 | break; |
8677 | niro | 816 | default: |
8678 | /* run 'typecmd' for other options */ | ||
8679 | return 0; | ||
8680 | } | ||
8681 | c = *cp++; | ||
8682 | } while (c); | ||
8683 | niro | 532 | } |
8684 | niro | 816 | return argv; |
8685 | niro | 532 | } |
8686 | niro | 816 | #endif |
8687 | niro | 532 | |
8688 | niro | 816 | /* |
8689 | * Make a variable a local variable. When a variable is made local, it's | ||
8690 | * value and flags are saved in a localvar structure. The saved values | ||
8691 | * will be restored when the shell function returns. We handle the name | ||
8692 | * "-" as a special case. | ||
8693 | */ | ||
8694 | niro | 532 | static void |
8695 | niro | 816 | mklocal(char *name) |
8696 | niro | 532 | { |
8697 | niro | 816 | struct localvar *lvp; |
8698 | struct var **vpp; | ||
8699 | struct var *vp; | ||
8700 | niro | 532 | |
8701 | niro | 816 | INT_OFF; |
8702 | lvp = ckzalloc(sizeof(struct localvar)); | ||
8703 | if (LONE_DASH(name)) { | ||
8704 | char *p; | ||
8705 | p = ckmalloc(sizeof(optlist)); | ||
8706 | lvp->text = memcpy(p, optlist, sizeof(optlist)); | ||
8707 | vp = NULL; | ||
8708 | } else { | ||
8709 | char *eq; | ||
8710 | niro | 532 | |
8711 | niro | 816 | vpp = hashvar(name); |
8712 | vp = *findvar(vpp, name); | ||
8713 | eq = strchr(name, '='); | ||
8714 | if (vp == NULL) { | ||
8715 | if (eq) | ||
8716 | setvareq(name, VSTRFIXED); | ||
8717 | else | ||
8718 | setvar(name, NULL, VSTRFIXED); | ||
8719 | vp = *vpp; /* the new variable */ | ||
8720 | lvp->flags = VUNSET; | ||
8721 | } else { | ||
8722 | lvp->text = vp->text; | ||
8723 | lvp->flags = vp->flags; | ||
8724 | vp->flags |= VSTRFIXED|VTEXTFIXED; | ||
8725 | if (eq) | ||
8726 | setvareq(name, 0); | ||
8727 | niro | 532 | } |
8728 | } | ||
8729 | niro | 816 | lvp->vp = vp; |
8730 | lvp->next = localvars; | ||
8731 | localvars = lvp; | ||
8732 | INT_ON; | ||
8733 | niro | 532 | } |
8734 | |||
8735 | /* | ||
8736 | niro | 816 | * The "local" command. |
8737 | niro | 532 | */ |
8738 | niro | 984 | static int FAST_FUNC |
8739 | niro | 816 | localcmd(int argc UNUSED_PARAM, char **argv) |
8740 | niro | 532 | { |
8741 | niro | 816 | char *name; |
8742 | niro | 532 | |
8743 | niro | 816 | argv = argptr; |
8744 | while ((name = *argv++) != NULL) { | ||
8745 | mklocal(name); | ||
8746 | niro | 532 | } |
8747 | niro | 816 | return 0; |
8748 | niro | 532 | } |
8749 | |||
8750 | niro | 984 | static int FAST_FUNC |
8751 | niro | 816 | falsecmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
8752 | { | ||
8753 | return 1; | ||
8754 | } | ||
8755 | niro | 532 | |
8756 | niro | 984 | static int FAST_FUNC |
8757 | niro | 816 | truecmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
8758 | niro | 532 | { |
8759 | niro | 816 | return 0; |
8760 | niro | 532 | } |
8761 | |||
8762 | niro | 984 | static int FAST_FUNC |
8763 | niro | 816 | execcmd(int argc UNUSED_PARAM, char **argv) |
8764 | { | ||
8765 | if (argv[1]) { | ||
8766 | iflag = 0; /* exit on error */ | ||
8767 | mflag = 0; | ||
8768 | optschanged(); | ||
8769 | shellexec(argv + 1, pathval(), 0); | ||
8770 | } | ||
8771 | return 0; | ||
8772 | } | ||
8773 | niro | 532 | |
8774 | /* | ||
8775 | niro | 816 | * The return command. |
8776 | niro | 532 | */ |
8777 | niro | 984 | static int FAST_FUNC |
8778 | niro | 816 | returncmd(int argc UNUSED_PARAM, char **argv) |
8779 | niro | 532 | { |
8780 | niro | 816 | /* |
8781 | * If called outside a function, do what ksh does; | ||
8782 | * skip the rest of the file. | ||
8783 | */ | ||
8784 | evalskip = funcnest ? SKIPFUNC : SKIPFILE; | ||
8785 | return argv[1] ? number(argv[1]) : exitstatus; | ||
8786 | } | ||
8787 | niro | 532 | |
8788 | niro | 816 | /* Forward declarations for builtintab[] */ |
8789 | niro | 984 | static int breakcmd(int, char **) FAST_FUNC; |
8790 | static int dotcmd(int, char **) FAST_FUNC; | ||
8791 | static int evalcmd(int, char **) FAST_FUNC; | ||
8792 | static int exitcmd(int, char **) FAST_FUNC; | ||
8793 | static int exportcmd(int, char **) FAST_FUNC; | ||
8794 | niro | 816 | #if ENABLE_ASH_GETOPTS |
8795 | niro | 984 | static int getoptscmd(int, char **) FAST_FUNC; |
8796 | niro | 532 | #endif |
8797 | niro | 816 | #if !ENABLE_FEATURE_SH_EXTRA_QUIET |
8798 | niro | 984 | static int helpcmd(int, char **) FAST_FUNC; |
8799 | niro | 532 | #endif |
8800 | niro | 984 | #if ENABLE_SH_MATH_SUPPORT |
8801 | static int letcmd(int, char **) FAST_FUNC; | ||
8802 | niro | 816 | #endif |
8803 | niro | 984 | static int readcmd(int, char **) FAST_FUNC; |
8804 | static int setcmd(int, char **) FAST_FUNC; | ||
8805 | static int shiftcmd(int, char **) FAST_FUNC; | ||
8806 | static int timescmd(int, char **) FAST_FUNC; | ||
8807 | static int trapcmd(int, char **) FAST_FUNC; | ||
8808 | static int umaskcmd(int, char **) FAST_FUNC; | ||
8809 | static int unsetcmd(int, char **) FAST_FUNC; | ||
8810 | static int ulimitcmd(int, char **) FAST_FUNC; | ||
8811 | niro | 532 | |
8812 | niro | 816 | #define BUILTIN_NOSPEC "0" |
8813 | #define BUILTIN_SPECIAL "1" | ||
8814 | #define BUILTIN_REGULAR "2" | ||
8815 | #define BUILTIN_SPEC_REG "3" | ||
8816 | #define BUILTIN_ASSIGN "4" | ||
8817 | #define BUILTIN_SPEC_ASSG "5" | ||
8818 | #define BUILTIN_REG_ASSG "6" | ||
8819 | #define BUILTIN_SPEC_REG_ASSG "7" | ||
8820 | niro | 532 | |
8821 | niro | 984 | /* Stubs for calling non-FAST_FUNC's */ |
8822 | #if ENABLE_ASH_BUILTIN_ECHO | ||
8823 | static int FAST_FUNC echocmd(int argc, char **argv) { return echo_main(argc, argv); } | ||
8824 | #endif | ||
8825 | #if ENABLE_ASH_BUILTIN_PRINTF | ||
8826 | static int FAST_FUNC printfcmd(int argc, char **argv) { return printf_main(argc, argv); } | ||
8827 | #endif | ||
8828 | #if ENABLE_ASH_BUILTIN_TEST | ||
8829 | static int FAST_FUNC testcmd(int argc, char **argv) { return test_main(argc, argv); } | ||
8830 | #endif | ||
8831 | niro | 532 | |
8832 | niro | 816 | /* Keep these in proper order since it is searched via bsearch() */ |
8833 | static const struct builtincmd builtintab[] = { | ||
8834 | { BUILTIN_SPEC_REG ".", dotcmd }, | ||
8835 | { BUILTIN_SPEC_REG ":", truecmd }, | ||
8836 | #if ENABLE_ASH_BUILTIN_TEST | ||
8837 | { BUILTIN_REGULAR "[", testcmd }, | ||
8838 | #if ENABLE_ASH_BASH_COMPAT | ||
8839 | { BUILTIN_REGULAR "[[", testcmd }, | ||
8840 | niro | 532 | #endif |
8841 | #endif | ||
8842 | niro | 816 | #if ENABLE_ASH_ALIAS |
8843 | { BUILTIN_REG_ASSG "alias", aliascmd }, | ||
8844 | niro | 532 | #endif |
8845 | niro | 816 | #if JOBS |
8846 | { BUILTIN_REGULAR "bg", fg_bgcmd }, | ||
8847 | niro | 532 | #endif |
8848 | niro | 816 | { BUILTIN_SPEC_REG "break", breakcmd }, |
8849 | { BUILTIN_REGULAR "cd", cdcmd }, | ||
8850 | { BUILTIN_NOSPEC "chdir", cdcmd }, | ||
8851 | #if ENABLE_ASH_CMDCMD | ||
8852 | { BUILTIN_REGULAR "command", commandcmd }, | ||
8853 | niro | 532 | #endif |
8854 | niro | 816 | { BUILTIN_SPEC_REG "continue", breakcmd }, |
8855 | #if ENABLE_ASH_BUILTIN_ECHO | ||
8856 | { BUILTIN_REGULAR "echo", echocmd }, | ||
8857 | niro | 532 | #endif |
8858 | niro | 816 | { BUILTIN_SPEC_REG "eval", evalcmd }, |
8859 | { BUILTIN_SPEC_REG "exec", execcmd }, | ||
8860 | { BUILTIN_SPEC_REG "exit", exitcmd }, | ||
8861 | { BUILTIN_SPEC_REG_ASSG "export", exportcmd }, | ||
8862 | { BUILTIN_REGULAR "false", falsecmd }, | ||
8863 | #if JOBS | ||
8864 | { BUILTIN_REGULAR "fg", fg_bgcmd }, | ||
8865 | #endif | ||
8866 | #if ENABLE_ASH_GETOPTS | ||
8867 | { BUILTIN_REGULAR "getopts", getoptscmd }, | ||
8868 | #endif | ||
8869 | { BUILTIN_NOSPEC "hash", hashcmd }, | ||
8870 | #if !ENABLE_FEATURE_SH_EXTRA_QUIET | ||
8871 | { BUILTIN_NOSPEC "help", helpcmd }, | ||
8872 | #endif | ||
8873 | #if JOBS | ||
8874 | { BUILTIN_REGULAR "jobs", jobscmd }, | ||
8875 | { BUILTIN_REGULAR "kill", killcmd }, | ||
8876 | #endif | ||
8877 | niro | 984 | #if ENABLE_SH_MATH_SUPPORT |
8878 | niro | 816 | { BUILTIN_NOSPEC "let", letcmd }, |
8879 | #endif | ||
8880 | { BUILTIN_ASSIGN "local", localcmd }, | ||
8881 | #if ENABLE_ASH_BUILTIN_PRINTF | ||
8882 | { BUILTIN_REGULAR "printf", printfcmd }, | ||
8883 | #endif | ||
8884 | { BUILTIN_NOSPEC "pwd", pwdcmd }, | ||
8885 | { BUILTIN_REGULAR "read", readcmd }, | ||
8886 | { BUILTIN_SPEC_REG_ASSG "readonly", exportcmd }, | ||
8887 | { BUILTIN_SPEC_REG "return", returncmd }, | ||
8888 | { BUILTIN_SPEC_REG "set", setcmd }, | ||
8889 | { BUILTIN_SPEC_REG "shift", shiftcmd }, | ||
8890 | { BUILTIN_SPEC_REG "source", dotcmd }, | ||
8891 | #if ENABLE_ASH_BUILTIN_TEST | ||
8892 | { BUILTIN_REGULAR "test", testcmd }, | ||
8893 | #endif | ||
8894 | { BUILTIN_SPEC_REG "times", timescmd }, | ||
8895 | { BUILTIN_SPEC_REG "trap", trapcmd }, | ||
8896 | { BUILTIN_REGULAR "true", truecmd }, | ||
8897 | { BUILTIN_NOSPEC "type", typecmd }, | ||
8898 | { BUILTIN_NOSPEC "ulimit", ulimitcmd }, | ||
8899 | { BUILTIN_REGULAR "umask", umaskcmd }, | ||
8900 | #if ENABLE_ASH_ALIAS | ||
8901 | { BUILTIN_REGULAR "unalias", unaliascmd }, | ||
8902 | #endif | ||
8903 | { BUILTIN_SPEC_REG "unset", unsetcmd }, | ||
8904 | { BUILTIN_REGULAR "wait", waitcmd }, | ||
8905 | }; | ||
8906 | niro | 532 | |
8907 | niro | 816 | /* Should match the above table! */ |
8908 | #define COMMANDCMD (builtintab + \ | ||
8909 | 2 + \ | ||
8910 | 1 * ENABLE_ASH_BUILTIN_TEST + \ | ||
8911 | 1 * ENABLE_ASH_BUILTIN_TEST * ENABLE_ASH_BASH_COMPAT + \ | ||
8912 | 1 * ENABLE_ASH_ALIAS + \ | ||
8913 | 1 * ENABLE_ASH_JOB_CONTROL + \ | ||
8914 | 3) | ||
8915 | #define EXECCMD (builtintab + \ | ||
8916 | 2 + \ | ||
8917 | 1 * ENABLE_ASH_BUILTIN_TEST + \ | ||
8918 | 1 * ENABLE_ASH_BUILTIN_TEST * ENABLE_ASH_BASH_COMPAT + \ | ||
8919 | 1 * ENABLE_ASH_ALIAS + \ | ||
8920 | 1 * ENABLE_ASH_JOB_CONTROL + \ | ||
8921 | 3 + \ | ||
8922 | 1 * ENABLE_ASH_CMDCMD + \ | ||
8923 | 1 + \ | ||
8924 | ENABLE_ASH_BUILTIN_ECHO + \ | ||
8925 | 1) | ||
8926 | niro | 532 | |
8927 | /* | ||
8928 | niro | 816 | * Search the table of builtin commands. |
8929 | niro | 532 | */ |
8930 | niro | 816 | static struct builtincmd * |
8931 | find_builtin(const char *name) | ||
8932 | { | ||
8933 | struct builtincmd *bp; | ||
8934 | niro | 532 | |
8935 | niro | 816 | bp = bsearch( |
8936 | name, builtintab, ARRAY_SIZE(builtintab), sizeof(builtintab[0]), | ||
8937 | pstrcmp | ||
8938 | ); | ||
8939 | return bp; | ||
8940 | } | ||
8941 | |||
8942 | /* | ||
8943 | * Execute a simple command. | ||
8944 | */ | ||
8945 | niro | 532 | static int |
8946 | niro | 816 | isassignment(const char *p) |
8947 | niro | 532 | { |
8948 | niro | 816 | const char *q = endofname(p); |
8949 | if (p == q) | ||
8950 | return 0; | ||
8951 | return *q == '='; | ||
8952 | } | ||
8953 | niro | 984 | static int FAST_FUNC |
8954 | niro | 816 | bltincmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
8955 | { | ||
8956 | /* Preserve exitstatus of a previous possible redirection | ||
8957 | * as POSIX mandates */ | ||
8958 | return back_exitstatus; | ||
8959 | } | ||
8960 | static void | ||
8961 | evalcommand(union node *cmd, int flags) | ||
8962 | { | ||
8963 | static const struct builtincmd null_bltin = { | ||
8964 | "\0\0", bltincmd /* why three NULs? */ | ||
8965 | }; | ||
8966 | niro | 532 | struct stackmark smark; |
8967 | niro | 816 | union node *argp; |
8968 | struct arglist arglist; | ||
8969 | struct arglist varlist; | ||
8970 | char **argv; | ||
8971 | int argc; | ||
8972 | const struct strlist *sp; | ||
8973 | struct cmdentry cmdentry; | ||
8974 | struct job *jp; | ||
8975 | char *lastarg; | ||
8976 | const char *path; | ||
8977 | int spclbltin; | ||
8978 | int status; | ||
8979 | char **nargv; | ||
8980 | struct builtincmd *bcmd; | ||
8981 | smallint cmd_is_exec; | ||
8982 | smallint pseudovarflag = 0; | ||
8983 | niro | 532 | |
8984 | niro | 816 | /* First expand the arguments. */ |
8985 | TRACE(("evalcommand(0x%lx, %d) called\n", (long)cmd, flags)); | ||
8986 | setstackmark(&smark); | ||
8987 | back_exitstatus = 0; | ||
8988 | niro | 532 | |
8989 | niro | 816 | cmdentry.cmdtype = CMDBUILTIN; |
8990 | cmdentry.u.cmd = &null_bltin; | ||
8991 | varlist.lastp = &varlist.list; | ||
8992 | *varlist.lastp = NULL; | ||
8993 | arglist.lastp = &arglist.list; | ||
8994 | *arglist.lastp = NULL; | ||
8995 | niro | 532 | |
8996 | niro | 816 | argc = 0; |
8997 | if (cmd->ncmd.args) { | ||
8998 | bcmd = find_builtin(cmd->ncmd.args->narg.text); | ||
8999 | pseudovarflag = bcmd && IS_BUILTIN_ASSIGN(bcmd); | ||
9000 | niro | 532 | } |
9001 | |||
9002 | niro | 816 | for (argp = cmd->ncmd.args; argp; argp = argp->narg.next) { |
9003 | struct strlist **spp; | ||
9004 | niro | 532 | |
9005 | niro | 816 | spp = arglist.lastp; |
9006 | if (pseudovarflag && isassignment(argp->narg.text)) | ||
9007 | expandarg(argp, &arglist, EXP_VARTILDE); | ||
9008 | else | ||
9009 | expandarg(argp, &arglist, EXP_FULL | EXP_TILDE); | ||
9010 | niro | 532 | |
9011 | niro | 816 | for (sp = *spp; sp; sp = sp->next) |
9012 | argc++; | ||
9013 | } | ||
9014 | niro | 532 | |
9015 | niro | 816 | argv = nargv = stalloc(sizeof(char *) * (argc + 1)); |
9016 | for (sp = arglist.list; sp; sp = sp->next) { | ||
9017 | TRACE(("evalcommand arg: %s\n", sp->text)); | ||
9018 | *nargv++ = sp->text; | ||
9019 | } | ||
9020 | *nargv = NULL; | ||
9021 | niro | 532 | |
9022 | niro | 816 | lastarg = NULL; |
9023 | if (iflag && funcnest == 0 && argc > 0) | ||
9024 | lastarg = nargv[-1]; | ||
9025 | niro | 532 | |
9026 | niro | 816 | preverrout_fd = 2; |
9027 | expredir(cmd->ncmd.redirect); | ||
9028 | status = redirectsafe(cmd->ncmd.redirect, REDIR_PUSH | REDIR_SAVEFD2); | ||
9029 | niro | 532 | |
9030 | niro | 816 | path = vpath.text; |
9031 | for (argp = cmd->ncmd.assign; argp; argp = argp->narg.next) { | ||
9032 | struct strlist **spp; | ||
9033 | char *p; | ||
9034 | niro | 532 | |
9035 | niro | 816 | spp = varlist.lastp; |
9036 | expandarg(argp, &varlist, EXP_VARTILDE); | ||
9037 | niro | 532 | |
9038 | niro | 816 | /* |
9039 | * Modify the command lookup path, if a PATH= assignment | ||
9040 | * is present | ||
9041 | */ | ||
9042 | p = (*spp)->text; | ||
9043 | if (varequal(p, path)) | ||
9044 | path = p; | ||
9045 | } | ||
9046 | niro | 532 | |
9047 | niro | 816 | /* Print the command if xflag is set. */ |
9048 | if (xflag) { | ||
9049 | int n; | ||
9050 | const char *p = " %s"; | ||
9051 | niro | 532 | |
9052 | niro | 816 | p++; |
9053 | fdprintf(preverrout_fd, p, expandstr(ps4val())); | ||
9054 | niro | 532 | |
9055 | niro | 816 | sp = varlist.list; |
9056 | for (n = 0; n < 2; n++) { | ||
9057 | while (sp) { | ||
9058 | fdprintf(preverrout_fd, p, sp->text); | ||
9059 | sp = sp->next; | ||
9060 | if (*p == '%') { | ||
9061 | p--; | ||
9062 | } | ||
9063 | } | ||
9064 | sp = arglist.list; | ||
9065 | } | ||
9066 | safe_write(preverrout_fd, "\n", 1); | ||
9067 | } | ||
9068 | niro | 532 | |
9069 | niro | 816 | cmd_is_exec = 0; |
9070 | spclbltin = -1; | ||
9071 | niro | 532 | |
9072 | niro | 816 | /* Now locate the command. */ |
9073 | if (argc) { | ||
9074 | const char *oldpath; | ||
9075 | int cmd_flag = DO_ERR; | ||
9076 | niro | 532 | |
9077 | niro | 816 | path += 5; |
9078 | oldpath = path; | ||
9079 | for (;;) { | ||
9080 | find_command(argv[0], &cmdentry, cmd_flag, path); | ||
9081 | if (cmdentry.cmdtype == CMDUNKNOWN) { | ||
9082 | niro | 984 | flush_stdout_stderr(); |
9083 | niro | 816 | status = 127; |
9084 | goto bail; | ||
9085 | } | ||
9086 | |||
9087 | /* implement bltin and command here */ | ||
9088 | if (cmdentry.cmdtype != CMDBUILTIN) | ||
9089 | break; | ||
9090 | if (spclbltin < 0) | ||
9091 | spclbltin = IS_BUILTIN_SPECIAL(cmdentry.u.cmd); | ||
9092 | if (cmdentry.u.cmd == EXECCMD) | ||
9093 | cmd_is_exec = 1; | ||
9094 | #if ENABLE_ASH_CMDCMD | ||
9095 | if (cmdentry.u.cmd == COMMANDCMD) { | ||
9096 | path = oldpath; | ||
9097 | nargv = parse_command_args(argv, &path); | ||
9098 | if (!nargv) | ||
9099 | break; | ||
9100 | argc -= nargv - argv; | ||
9101 | argv = nargv; | ||
9102 | cmd_flag |= DO_NOFUNC; | ||
9103 | } else | ||
9104 | #endif | ||
9105 | break; | ||
9106 | niro | 532 | } |
9107 | } | ||
9108 | |||
9109 | niro | 816 | if (status) { |
9110 | /* We have a redirection error. */ | ||
9111 | if (spclbltin > 0) | ||
9112 | raise_exception(EXERROR); | ||
9113 | bail: | ||
9114 | exitstatus = status; | ||
9115 | goto out; | ||
9116 | } | ||
9117 | niro | 532 | |
9118 | niro | 816 | /* Execute the command. */ |
9119 | switch (cmdentry.cmdtype) { | ||
9120 | default: | ||
9121 | niro | 532 | |
9122 | niro | 816 | #if ENABLE_FEATURE_SH_NOFORK |
9123 | /* Hmmm... shouldn't it happen somewhere in forkshell() instead? | ||
9124 | * Why "fork off a child process if necessary" doesn't apply to NOFORK? */ | ||
9125 | { | ||
9126 | /* find_command() encodes applet_no as (-2 - applet_no) */ | ||
9127 | int applet_no = (- cmdentry.u.index - 2); | ||
9128 | if (applet_no >= 0 && APPLET_IS_NOFORK(applet_no)) { | ||
9129 | listsetvar(varlist.list, VEXPORT|VSTACK); | ||
9130 | /* run <applet>_main() */ | ||
9131 | exitstatus = run_nofork_applet(applet_no, argv); | ||
9132 | break; | ||
9133 | } | ||
9134 | } | ||
9135 | #endif | ||
9136 | /* Fork off a child process if necessary. */ | ||
9137 | if (!(flags & EV_EXIT) || trap[0]) { | ||
9138 | INT_OFF; | ||
9139 | jp = makejob(/*cmd,*/ 1); | ||
9140 | if (forkshell(jp, cmd, FORK_FG) != 0) { | ||
9141 | exitstatus = waitforjob(jp); | ||
9142 | INT_ON; | ||
9143 | TRACE(("forked child exited with %d\n", exitstatus)); | ||
9144 | break; | ||
9145 | } | ||
9146 | FORCE_INT_ON; | ||
9147 | } | ||
9148 | listsetvar(varlist.list, VEXPORT|VSTACK); | ||
9149 | shellexec(argv, path, cmdentry.u.index); | ||
9150 | /* NOTREACHED */ | ||
9151 | niro | 532 | |
9152 | niro | 816 | case CMDBUILTIN: |
9153 | cmdenviron = varlist.list; | ||
9154 | if (cmdenviron) { | ||
9155 | struct strlist *list = cmdenviron; | ||
9156 | int i = VNOSET; | ||
9157 | if (spclbltin > 0 || argc == 0) { | ||
9158 | i = 0; | ||
9159 | if (cmd_is_exec && argc > 1) | ||
9160 | i = VEXPORT; | ||
9161 | } | ||
9162 | listsetvar(list, i); | ||
9163 | } | ||
9164 | /* Tight loop with builtins only: | ||
9165 | * "while kill -0 $child; do true; done" | ||
9166 | * will never exit even if $child died, unless we do this | ||
9167 | * to reap the zombie and make kill detect that it's gone: */ | ||
9168 | dowait(DOWAIT_NONBLOCK, NULL); | ||
9169 | niro | 532 | |
9170 | niro | 816 | if (evalbltin(cmdentry.u.cmd, argc, argv)) { |
9171 | int exit_status; | ||
9172 | niro | 984 | int i = exception_type; |
9173 | niro | 816 | if (i == EXEXIT) |
9174 | goto raise; | ||
9175 | exit_status = 2; | ||
9176 | if (i == EXINT) | ||
9177 | exit_status = 128 + SIGINT; | ||
9178 | if (i == EXSIG) | ||
9179 | niro | 984 | exit_status = 128 + pending_sig; |
9180 | niro | 816 | exitstatus = exit_status; |
9181 | if (i == EXINT || spclbltin > 0) { | ||
9182 | raise: | ||
9183 | longjmp(exception_handler->loc, 1); | ||
9184 | } | ||
9185 | FORCE_INT_ON; | ||
9186 | } | ||
9187 | break; | ||
9188 | niro | 532 | |
9189 | niro | 816 | case CMDFUNCTION: |
9190 | listsetvar(varlist.list, 0); | ||
9191 | /* See above for the rationale */ | ||
9192 | dowait(DOWAIT_NONBLOCK, NULL); | ||
9193 | if (evalfun(cmdentry.u.func, argc, argv, flags)) | ||
9194 | goto raise; | ||
9195 | break; | ||
9196 | } | ||
9197 | niro | 532 | |
9198 | niro | 816 | out: |
9199 | popredir(/*drop:*/ cmd_is_exec, /*restore:*/ cmd_is_exec); | ||
9200 | if (lastarg) { | ||
9201 | /* dsl: I think this is intended to be used to support | ||
9202 | * '_' in 'vi' command mode during line editing... | ||
9203 | * However I implemented that within libedit itself. | ||
9204 | */ | ||
9205 | setvar("_", lastarg, 0); | ||
9206 | niro | 532 | } |
9207 | niro | 816 | popstackmark(&smark); |
9208 | niro | 532 | } |
9209 | |||
9210 | static int | ||
9211 | niro | 816 | evalbltin(const struct builtincmd *cmd, int argc, char **argv) |
9212 | niro | 532 | { |
9213 | niro | 816 | char *volatile savecmdname; |
9214 | struct jmploc *volatile savehandler; | ||
9215 | struct jmploc jmploc; | ||
9216 | int i; | ||
9217 | niro | 532 | |
9218 | niro | 816 | savecmdname = commandname; |
9219 | i = setjmp(jmploc.loc); | ||
9220 | if (i) | ||
9221 | goto cmddone; | ||
9222 | savehandler = exception_handler; | ||
9223 | exception_handler = &jmploc; | ||
9224 | commandname = argv[0]; | ||
9225 | argptr = argv + 1; | ||
9226 | optptr = NULL; /* initialize nextopt */ | ||
9227 | exitstatus = (*cmd->builtin)(argc, argv); | ||
9228 | flush_stdout_stderr(); | ||
9229 | cmddone: | ||
9230 | exitstatus |= ferror(stdout); | ||
9231 | clearerr(stdout); | ||
9232 | commandname = savecmdname; | ||
9233 | exception_handler = savehandler; | ||
9234 | |||
9235 | return i; | ||
9236 | niro | 532 | } |
9237 | |||
9238 | static int | ||
9239 | niro | 816 | goodname(const char *p) |
9240 | niro | 532 | { |
9241 | niro | 816 | return !*endofname(p); |
9242 | niro | 532 | } |
9243 | |||
9244 | |||
9245 | /* | ||
9246 | niro | 816 | * Search for a command. This is called before we fork so that the |
9247 | * location of the command will be available in the parent as well as | ||
9248 | * the child. The check for "goodname" is an overly conservative | ||
9249 | * check that the name will not be subject to expansion. | ||
9250 | niro | 532 | */ |
9251 | niro | 816 | static void |
9252 | prehash(union node *n) | ||
9253 | niro | 532 | { |
9254 | niro | 816 | struct cmdentry entry; |
9255 | niro | 532 | |
9256 | niro | 816 | if (n->type == NCMD && n->ncmd.args && goodname(n->ncmd.args->narg.text)) |
9257 | find_command(n->ncmd.args->narg.text, &entry, 0, pathval()); | ||
9258 | niro | 532 | } |
9259 | |||
9260 | niro | 816 | |
9261 | /* ============ Builtin commands | ||
9262 | * | ||
9263 | * Builtin commands whose functions are closely tied to evaluation | ||
9264 | * are implemented here. | ||
9265 | niro | 532 | */ |
9266 | |||
9267 | /* | ||
9268 | niro | 816 | * Handle break and continue commands. Break, continue, and return are |
9269 | * all handled by setting the evalskip flag. The evaluation routines | ||
9270 | * above all check this flag, and if it is set they start skipping | ||
9271 | * commands rather than executing them. The variable skipcount is | ||
9272 | * the number of loops to break/continue, or the number of function | ||
9273 | * levels to return. (The latter is always 1.) It should probably | ||
9274 | * be an error to break out of more loops than exist, but it isn't | ||
9275 | * in the standard shell so we don't make it one here. | ||
9276 | niro | 532 | */ |
9277 | niro | 984 | static int FAST_FUNC |
9278 | niro | 816 | breakcmd(int argc UNUSED_PARAM, char **argv) |
9279 | niro | 532 | { |
9280 | niro | 816 | int n = argv[1] ? number(argv[1]) : 1; |
9281 | niro | 532 | |
9282 | niro | 816 | if (n <= 0) |
9283 | niro | 984 | ash_msg_and_raise_error(msg_illnum, argv[1]); |
9284 | niro | 816 | if (n > loopnest) |
9285 | n = loopnest; | ||
9286 | if (n > 0) { | ||
9287 | evalskip = (**argv == 'c') ? SKIPCONT : SKIPBREAK; | ||
9288 | skipcount = n; | ||
9289 | niro | 532 | } |
9290 | niro | 816 | return 0; |
9291 | niro | 532 | } |
9292 | |||
9293 | |||
9294 | niro | 816 | /* ============ input.c |
9295 | * | ||
9296 | * This implements the input routines used by the parser. | ||
9297 | */ | ||
9298 | niro | 532 | |
9299 | niro | 816 | enum { |
9300 | INPUT_PUSH_FILE = 1, | ||
9301 | INPUT_NOFILE_OK = 2, | ||
9302 | }; | ||
9303 | niro | 532 | |
9304 | niro | 816 | static smallint checkkwd; |
9305 | /* values of checkkwd variable */ | ||
9306 | #define CHKALIAS 0x1 | ||
9307 | #define CHKKWD 0x2 | ||
9308 | #define CHKNL 0x4 | ||
9309 | niro | 532 | |
9310 | niro | 984 | /* |
9311 | * Push a string back onto the input at this current parsefile level. | ||
9312 | * We handle aliases this way. | ||
9313 | */ | ||
9314 | #if !ENABLE_ASH_ALIAS | ||
9315 | #define pushstring(s, ap) pushstring(s) | ||
9316 | #endif | ||
9317 | niro | 816 | static void |
9318 | niro | 984 | pushstring(char *s, struct alias *ap) |
9319 | { | ||
9320 | struct strpush *sp; | ||
9321 | int len; | ||
9322 | |||
9323 | len = strlen(s); | ||
9324 | INT_OFF; | ||
9325 | if (g_parsefile->strpush) { | ||
9326 | sp = ckzalloc(sizeof(*sp)); | ||
9327 | sp->prev = g_parsefile->strpush; | ||
9328 | } else { | ||
9329 | sp = &(g_parsefile->basestrpush); | ||
9330 | } | ||
9331 | g_parsefile->strpush = sp; | ||
9332 | sp->prev_string = g_parsefile->next_to_pgetc; | ||
9333 | sp->prev_left_in_line = g_parsefile->left_in_line; | ||
9334 | #if ENABLE_ASH_ALIAS | ||
9335 | sp->ap = ap; | ||
9336 | if (ap) { | ||
9337 | ap->flag |= ALIASINUSE; | ||
9338 | sp->string = s; | ||
9339 | } | ||
9340 | #endif | ||
9341 | g_parsefile->next_to_pgetc = s; | ||
9342 | g_parsefile->left_in_line = len; | ||
9343 | INT_ON; | ||
9344 | } | ||
9345 | |||
9346 | static void | ||
9347 | niro | 816 | popstring(void) |
9348 | niro | 532 | { |
9349 | niro | 816 | struct strpush *sp = g_parsefile->strpush; |
9350 | niro | 532 | |
9351 | niro | 816 | INT_OFF; |
9352 | #if ENABLE_ASH_ALIAS | ||
9353 | if (sp->ap) { | ||
9354 | niro | 984 | if (g_parsefile->next_to_pgetc[-1] == ' ' |
9355 | || g_parsefile->next_to_pgetc[-1] == '\t' | ||
9356 | ) { | ||
9357 | niro | 816 | checkkwd |= CHKALIAS; |
9358 | } | ||
9359 | if (sp->string != sp->ap->val) { | ||
9360 | free(sp->string); | ||
9361 | } | ||
9362 | sp->ap->flag &= ~ALIASINUSE; | ||
9363 | if (sp->ap->flag & ALIASDEAD) { | ||
9364 | unalias(sp->ap->name); | ||
9365 | } | ||
9366 | niro | 532 | } |
9367 | niro | 816 | #endif |
9368 | niro | 984 | g_parsefile->next_to_pgetc = sp->prev_string; |
9369 | g_parsefile->left_in_line = sp->prev_left_in_line; | ||
9370 | niro | 816 | g_parsefile->strpush = sp->prev; |
9371 | if (sp != &(g_parsefile->basestrpush)) | ||
9372 | free(sp); | ||
9373 | INT_ON; | ||
9374 | niro | 532 | } |
9375 | |||
9376 | niro | 984 | //FIXME: BASH_COMPAT with "...&" does TWO pungetc(): |
9377 | //it peeks whether it is &>, and then pushes back both chars. | ||
9378 | //This function needs to save last *next_to_pgetc to buf[0] | ||
9379 | //to make two pungetc() reliable. Currently, | ||
9380 | // pgetc (out of buf: does preadfd), pgetc, pungetc, pungetc won't work... | ||
9381 | niro | 816 | static int |
9382 | preadfd(void) | ||
9383 | niro | 532 | { |
9384 | niro | 816 | int nr; |
9385 | char *buf = g_parsefile->buf; | ||
9386 | niro | 532 | |
9387 | niro | 984 | g_parsefile->next_to_pgetc = buf; |
9388 | niro | 816 | #if ENABLE_FEATURE_EDITING |
9389 | retry: | ||
9390 | if (!iflag || g_parsefile->fd != STDIN_FILENO) | ||
9391 | nr = nonblock_safe_read(g_parsefile->fd, buf, BUFSIZ - 1); | ||
9392 | else { | ||
9393 | #if ENABLE_FEATURE_TAB_COMPLETION | ||
9394 | line_input_state->path_lookup = pathval(); | ||
9395 | #endif | ||
9396 | nr = read_line_input(cmdedit_prompt, buf, BUFSIZ, line_input_state); | ||
9397 | if (nr == 0) { | ||
9398 | /* Ctrl+C pressed */ | ||
9399 | if (trap[SIGINT]) { | ||
9400 | buf[0] = '\n'; | ||
9401 | buf[1] = '\0'; | ||
9402 | raise(SIGINT); | ||
9403 | return 1; | ||
9404 | } | ||
9405 | goto retry; | ||
9406 | } | ||
9407 | if (nr < 0 && errno == 0) { | ||
9408 | /* Ctrl+D pressed */ | ||
9409 | nr = 0; | ||
9410 | } | ||
9411 | } | ||
9412 | #else | ||
9413 | nr = nonblock_safe_read(g_parsefile->fd, buf, BUFSIZ - 1); | ||
9414 | #endif | ||
9415 | niro | 532 | |
9416 | niro | 816 | #if 0 |
9417 | /* nonblock_safe_read() handles this problem */ | ||
9418 | if (nr < 0) { | ||
9419 | if (parsefile->fd == 0 && errno == EWOULDBLOCK) { | ||
9420 | int flags = fcntl(0, F_GETFL); | ||
9421 | if (flags >= 0 && (flags & O_NONBLOCK)) { | ||
9422 | flags &= ~O_NONBLOCK; | ||
9423 | if (fcntl(0, F_SETFL, flags) >= 0) { | ||
9424 | out2str("sh: turning off NDELAY mode\n"); | ||
9425 | goto retry; | ||
9426 | } | ||
9427 | } | ||
9428 | niro | 532 | } |
9429 | } | ||
9430 | niro | 816 | #endif |
9431 | return nr; | ||
9432 | niro | 532 | } |
9433 | |||
9434 | /* | ||
9435 | niro | 816 | * Refill the input buffer and return the next input character: |
9436 | niro | 532 | * |
9437 | niro | 816 | * 1) If a string was pushed back on the input, pop it; |
9438 | niro | 984 | * 2) If an EOF was pushed back (g_parsefile->left_in_line < -BIGNUM) |
9439 | * or we are reading from a string so we can't refill the buffer, | ||
9440 | * return EOF. | ||
9441 | * 3) If there is more stuff in this buffer, use it else call read to fill it. | ||
9442 | niro | 816 | * 4) Process input up to the next newline, deleting nul characters. |
9443 | niro | 532 | */ |
9444 | niro | 816 | //#define pgetc_debug(...) bb_error_msg(__VA_ARGS__) |
9445 | #define pgetc_debug(...) ((void)0) | ||
9446 | static int | ||
9447 | preadbuffer(void) | ||
9448 | { | ||
9449 | char *q; | ||
9450 | int more; | ||
9451 | niro | 532 | |
9452 | niro | 816 | while (g_parsefile->strpush) { |
9453 | #if ENABLE_ASH_ALIAS | ||
9454 | niro | 984 | if (g_parsefile->left_in_line == -1 |
9455 | && g_parsefile->strpush->ap | ||
9456 | && g_parsefile->next_to_pgetc[-1] != ' ' | ||
9457 | && g_parsefile->next_to_pgetc[-1] != '\t' | ||
9458 | niro | 816 | ) { |
9459 | pgetc_debug("preadbuffer PEOA"); | ||
9460 | return PEOA; | ||
9461 | } | ||
9462 | #endif | ||
9463 | popstring(); | ||
9464 | /* try "pgetc" now: */ | ||
9465 | niro | 984 | pgetc_debug("preadbuffer internal pgetc at %d:%p'%s'", |
9466 | g_parsefile->left_in_line, | ||
9467 | g_parsefile->next_to_pgetc, | ||
9468 | g_parsefile->next_to_pgetc); | ||
9469 | if (--g_parsefile->left_in_line >= 0) | ||
9470 | return (unsigned char)(*g_parsefile->next_to_pgetc++); | ||
9471 | niro | 532 | } |
9472 | niro | 984 | /* on both branches above g_parsefile->left_in_line < 0. |
9473 | niro | 816 | * "pgetc" needs refilling. |
9474 | */ | ||
9475 | niro | 532 | |
9476 | niro | 984 | /* -90 is our -BIGNUM. Below we use -99 to mark "EOF on read", |
9477 | * pungetc() may increment it a few times. | ||
9478 | * Assuming it won't increment it to less than -90. | ||
9479 | niro | 816 | */ |
9480 | niro | 984 | if (g_parsefile->left_in_line < -90 || g_parsefile->buf == NULL) { |
9481 | niro | 816 | pgetc_debug("preadbuffer PEOF1"); |
9482 | niro | 984 | /* even in failure keep left_in_line and next_to_pgetc |
9483 | * in lock step, for correct multi-layer pungetc. | ||
9484 | * left_in_line was decremented before preadbuffer(), | ||
9485 | * must inc next_to_pgetc: */ | ||
9486 | g_parsefile->next_to_pgetc++; | ||
9487 | niro | 816 | return PEOF; |
9488 | } | ||
9489 | niro | 532 | |
9490 | niro | 984 | more = g_parsefile->left_in_buffer; |
9491 | niro | 816 | if (more <= 0) { |
9492 | flush_stdout_stderr(); | ||
9493 | again: | ||
9494 | more = preadfd(); | ||
9495 | if (more <= 0) { | ||
9496 | niro | 984 | /* don't try reading again */ |
9497 | g_parsefile->left_in_line = -99; | ||
9498 | niro | 816 | pgetc_debug("preadbuffer PEOF2"); |
9499 | niro | 984 | g_parsefile->next_to_pgetc++; |
9500 | niro | 816 | return PEOF; |
9501 | } | ||
9502 | } | ||
9503 | niro | 532 | |
9504 | niro | 816 | /* Find out where's the end of line. |
9505 | niro | 984 | * Set g_parsefile->left_in_line |
9506 | * and g_parsefile->left_in_buffer acordingly. | ||
9507 | niro | 816 | * NUL chars are deleted. |
9508 | */ | ||
9509 | niro | 984 | q = g_parsefile->next_to_pgetc; |
9510 | niro | 532 | for (;;) { |
9511 | niro | 816 | char c; |
9512 | niro | 532 | |
9513 | niro | 816 | more--; |
9514 | |||
9515 | c = *q; | ||
9516 | if (c == '\0') { | ||
9517 | memmove(q, q + 1, more); | ||
9518 | } else { | ||
9519 | q++; | ||
9520 | if (c == '\n') { | ||
9521 | niro | 984 | g_parsefile->left_in_line = q - g_parsefile->next_to_pgetc - 1; |
9522 | niro | 816 | break; |
9523 | } | ||
9524 | } | ||
9525 | |||
9526 | if (more <= 0) { | ||
9527 | niro | 984 | g_parsefile->left_in_line = q - g_parsefile->next_to_pgetc - 1; |
9528 | if (g_parsefile->left_in_line < 0) | ||
9529 | niro | 816 | goto again; |
9530 | niro | 532 | break; |
9531 | niro | 816 | } |
9532 | niro | 532 | } |
9533 | niro | 984 | g_parsefile->left_in_buffer = more; |
9534 | niro | 532 | |
9535 | niro | 816 | if (vflag) { |
9536 | char save = *q; | ||
9537 | *q = '\0'; | ||
9538 | niro | 984 | out2str(g_parsefile->next_to_pgetc); |
9539 | niro | 816 | *q = save; |
9540 | } | ||
9541 | |||
9542 | niro | 984 | pgetc_debug("preadbuffer at %d:%p'%s'", |
9543 | g_parsefile->left_in_line, | ||
9544 | g_parsefile->next_to_pgetc, | ||
9545 | g_parsefile->next_to_pgetc); | ||
9546 | return (unsigned char)*g_parsefile->next_to_pgetc++; | ||
9547 | niro | 532 | } |
9548 | |||
9549 | niro | 984 | #define pgetc_as_macro() \ |
9550 | (--g_parsefile->left_in_line >= 0 \ | ||
9551 | ? (unsigned char)*g_parsefile->next_to_pgetc++ \ | ||
9552 | : preadbuffer() \ | ||
9553 | ) | ||
9554 | niro | 816 | |
9555 | static int | ||
9556 | pgetc(void) | ||
9557 | niro | 532 | { |
9558 | niro | 984 | pgetc_debug("pgetc_fast at %d:%p'%s'", |
9559 | g_parsefile->left_in_line, | ||
9560 | g_parsefile->next_to_pgetc, | ||
9561 | g_parsefile->next_to_pgetc); | ||
9562 | niro | 816 | return pgetc_as_macro(); |
9563 | niro | 532 | } |
9564 | |||
9565 | niro | 816 | #if ENABLE_ASH_OPTIMIZE_FOR_SIZE |
9566 | niro | 984 | # define pgetc_fast() pgetc() |
9567 | niro | 816 | #else |
9568 | niro | 984 | # define pgetc_fast() pgetc_as_macro() |
9569 | niro | 816 | #endif |
9570 | niro | 532 | |
9571 | niro | 816 | #if ENABLE_ASH_ALIAS |
9572 | static int | ||
9573 | niro | 984 | pgetc_without_PEOA(void) |
9574 | niro | 816 | { |
9575 | int c; | ||
9576 | do { | ||
9577 | niro | 984 | pgetc_debug("pgetc_fast at %d:%p'%s'", |
9578 | g_parsefile->left_in_line, | ||
9579 | g_parsefile->next_to_pgetc, | ||
9580 | g_parsefile->next_to_pgetc); | ||
9581 | niro | 816 | c = pgetc_fast(); |
9582 | } while (c == PEOA); | ||
9583 | return c; | ||
9584 | } | ||
9585 | #else | ||
9586 | niro | 984 | # define pgetc_without_PEOA() pgetc() |
9587 | niro | 816 | #endif |
9588 | niro | 532 | |
9589 | /* | ||
9590 | niro | 816 | * Read a line from the script. |
9591 | niro | 532 | */ |
9592 | niro | 816 | static char * |
9593 | pfgets(char *line, int len) | ||
9594 | { | ||
9595 | char *p = line; | ||
9596 | int nleft = len; | ||
9597 | int c; | ||
9598 | niro | 532 | |
9599 | niro | 816 | while (--nleft > 0) { |
9600 | niro | 984 | c = pgetc_without_PEOA(); |
9601 | niro | 816 | if (c == PEOF) { |
9602 | if (p == line) | ||
9603 | return NULL; | ||
9604 | break; | ||
9605 | } | ||
9606 | *p++ = c; | ||
9607 | if (c == '\n') | ||
9608 | break; | ||
9609 | niro | 532 | } |
9610 | niro | 816 | *p = '\0'; |
9611 | return line; | ||
9612 | niro | 532 | } |
9613 | |||
9614 | /* | ||
9615 | niro | 816 | * Undo the last call to pgetc. Only one character may be pushed back. |
9616 | * PEOF may be pushed back. | ||
9617 | niro | 532 | */ |
9618 | niro | 816 | static void |
9619 | pungetc(void) | ||
9620 | niro | 532 | { |
9621 | niro | 984 | g_parsefile->left_in_line++; |
9622 | g_parsefile->next_to_pgetc--; | ||
9623 | pgetc_debug("pushed back to %d:%p'%s'", | ||
9624 | g_parsefile->left_in_line, | ||
9625 | g_parsefile->next_to_pgetc, | ||
9626 | g_parsefile->next_to_pgetc); | ||
9627 | niro | 532 | } |
9628 | |||
9629 | /* | ||
9630 | niro | 816 | * To handle the "." command, a stack of input files is used. Pushfile |
9631 | * adds a new entry to the stack and popfile restores the previous level. | ||
9632 | niro | 532 | */ |
9633 | niro | 816 | static void |
9634 | pushfile(void) | ||
9635 | { | ||
9636 | struct parsefile *pf; | ||
9637 | niro | 532 | |
9638 | niro | 816 | pf = ckzalloc(sizeof(*pf)); |
9639 | pf->prev = g_parsefile; | ||
9640 | pf->fd = -1; | ||
9641 | /*pf->strpush = NULL; - ckzalloc did it */ | ||
9642 | /*pf->basestrpush.prev = NULL;*/ | ||
9643 | g_parsefile = pf; | ||
9644 | } | ||
9645 | niro | 532 | |
9646 | niro | 816 | static void |
9647 | popfile(void) | ||
9648 | { | ||
9649 | struct parsefile *pf = g_parsefile; | ||
9650 | niro | 532 | |
9651 | niro | 816 | INT_OFF; |
9652 | if (pf->fd >= 0) | ||
9653 | close(pf->fd); | ||
9654 | free(pf->buf); | ||
9655 | while (pf->strpush) | ||
9656 | popstring(); | ||
9657 | g_parsefile = pf->prev; | ||
9658 | free(pf); | ||
9659 | INT_ON; | ||
9660 | niro | 532 | } |
9661 | |||
9662 | /* | ||
9663 | niro | 816 | * Return to top level. |
9664 | niro | 532 | */ |
9665 | niro | 816 | static void |
9666 | popallfiles(void) | ||
9667 | niro | 532 | { |
9668 | niro | 816 | while (g_parsefile != &basepf) |
9669 | popfile(); | ||
9670 | niro | 532 | } |
9671 | |||
9672 | niro | 816 | /* |
9673 | * Close the file(s) that the shell is reading commands from. Called | ||
9674 | * after a fork is done. | ||
9675 | */ | ||
9676 | niro | 532 | static void |
9677 | niro | 816 | closescript(void) |
9678 | niro | 532 | { |
9679 | niro | 816 | popallfiles(); |
9680 | if (g_parsefile->fd > 0) { | ||
9681 | close(g_parsefile->fd); | ||
9682 | g_parsefile->fd = 0; | ||
9683 | } | ||
9684 | niro | 532 | } |
9685 | |||
9686 | niro | 816 | /* |
9687 | * Like setinputfile, but takes an open file descriptor. Call this with | ||
9688 | * interrupts off. | ||
9689 | */ | ||
9690 | niro | 532 | static void |
9691 | niro | 816 | setinputfd(int fd, int push) |
9692 | niro | 532 | { |
9693 | niro | 816 | close_on_exec_on(fd); |
9694 | if (push) { | ||
9695 | pushfile(); | ||
9696 | g_parsefile->buf = NULL; | ||
9697 | niro | 532 | } |
9698 | niro | 816 | g_parsefile->fd = fd; |
9699 | if (g_parsefile->buf == NULL) | ||
9700 | g_parsefile->buf = ckmalloc(IBUFSIZ); | ||
9701 | niro | 984 | g_parsefile->left_in_buffer = 0; |
9702 | g_parsefile->left_in_line = 0; | ||
9703 | g_parsefile->linno = 1; | ||
9704 | niro | 532 | } |
9705 | |||
9706 | niro | 816 | /* |
9707 | * Set the input to take input from a file. If push is set, push the | ||
9708 | * old input onto the stack first. | ||
9709 | */ | ||
9710 | static int | ||
9711 | setinputfile(const char *fname, int flags) | ||
9712 | niro | 532 | { |
9713 | niro | 816 | int fd; |
9714 | int fd2; | ||
9715 | niro | 532 | |
9716 | niro | 816 | INT_OFF; |
9717 | fd = open(fname, O_RDONLY); | ||
9718 | if (fd < 0) { | ||
9719 | if (flags & INPUT_NOFILE_OK) | ||
9720 | goto out; | ||
9721 | niro | 984 | ash_msg_and_raise_error("can't open '%s'", fname); |
9722 | niro | 816 | } |
9723 | if (fd < 10) { | ||
9724 | fd2 = copyfd(fd, 10); | ||
9725 | close(fd); | ||
9726 | if (fd2 < 0) | ||
9727 | ash_msg_and_raise_error("out of file descriptors"); | ||
9728 | fd = fd2; | ||
9729 | } | ||
9730 | setinputfd(fd, flags & INPUT_PUSH_FILE); | ||
9731 | out: | ||
9732 | INT_ON; | ||
9733 | return fd; | ||
9734 | niro | 532 | } |
9735 | |||
9736 | niro | 816 | /* |
9737 | * Like setinputfile, but takes input from a string. | ||
9738 | */ | ||
9739 | static void | ||
9740 | setinputstring(char *string) | ||
9741 | niro | 532 | { |
9742 | niro | 816 | INT_OFF; |
9743 | pushfile(); | ||
9744 | niro | 984 | g_parsefile->next_to_pgetc = string; |
9745 | g_parsefile->left_in_line = strlen(string); | ||
9746 | niro | 816 | g_parsefile->buf = NULL; |
9747 | niro | 984 | g_parsefile->linno = 1; |
9748 | niro | 816 | INT_ON; |
9749 | niro | 532 | } |
9750 | |||
9751 | |||
9752 | niro | 816 | /* ============ mail.c |
9753 | * | ||
9754 | * Routines to check for mail. | ||
9755 | */ | ||
9756 | niro | 532 | |
9757 | niro | 816 | #if ENABLE_ASH_MAIL |
9758 | niro | 532 | |
9759 | niro | 816 | #define MAXMBOXES 10 |
9760 | niro | 532 | |
9761 | niro | 816 | /* times of mailboxes */ |
9762 | static time_t mailtime[MAXMBOXES]; | ||
9763 | /* Set if MAIL or MAILPATH is changed. */ | ||
9764 | static smallint mail_var_path_changed; | ||
9765 | |||
9766 | niro | 532 | /* |
9767 | niro | 816 | * Print appropriate message(s) if mail has arrived. |
9768 | * If mail_var_path_changed is set, | ||
9769 | * then the value of MAIL has mail_var_path_changed, | ||
9770 | * so we just update the values. | ||
9771 | niro | 532 | */ |
9772 | niro | 816 | static void |
9773 | chkmail(void) | ||
9774 | { | ||
9775 | const char *mpath; | ||
9776 | char *p; | ||
9777 | char *q; | ||
9778 | time_t *mtp; | ||
9779 | struct stackmark smark; | ||
9780 | struct stat statb; | ||
9781 | niro | 532 | |
9782 | niro | 816 | setstackmark(&smark); |
9783 | mpath = mpathset() ? mpathval() : mailval(); | ||
9784 | for (mtp = mailtime; mtp < mailtime + MAXMBOXES; mtp++) { | ||
9785 | niro | 984 | p = path_advance(&mpath, nullstr); |
9786 | niro | 816 | if (p == NULL) |
9787 | break; | ||
9788 | if (*p == '\0') | ||
9789 | continue; | ||
9790 | for (q = p; *q; q++) | ||
9791 | continue; | ||
9792 | #if DEBUG | ||
9793 | if (q[-1] != '/') | ||
9794 | abort(); | ||
9795 | #endif | ||
9796 | q[-1] = '\0'; /* delete trailing '/' */ | ||
9797 | if (stat(p, &statb) < 0) { | ||
9798 | *mtp = 0; | ||
9799 | continue; | ||
9800 | } | ||
9801 | if (!mail_var_path_changed && statb.st_mtime != *mtp) { | ||
9802 | fprintf( | ||
9803 | stderr, snlfmt, | ||
9804 | pathopt ? pathopt : "you have mail" | ||
9805 | ); | ||
9806 | } | ||
9807 | *mtp = statb.st_mtime; | ||
9808 | } | ||
9809 | mail_var_path_changed = 0; | ||
9810 | popstackmark(&smark); | ||
9811 | } | ||
9812 | |||
9813 | niro | 984 | static void FAST_FUNC |
9814 | niro | 816 | changemail(const char *val UNUSED_PARAM) |
9815 | niro | 532 | { |
9816 | niro | 816 | mail_var_path_changed = 1; |
9817 | niro | 532 | } |
9818 | |||
9819 | niro | 816 | #endif /* ASH_MAIL */ |
9820 | niro | 532 | |
9821 | |||
9822 | niro | 816 | /* ============ ??? */ |
9823 | niro | 532 | |
9824 | /* | ||
9825 | niro | 816 | * Set the shell parameters. |
9826 | niro | 532 | */ |
9827 | niro | 816 | static void |
9828 | setparam(char **argv) | ||
9829 | niro | 532 | { |
9830 | niro | 816 | char **newparam; |
9831 | char **ap; | ||
9832 | int nparam; | ||
9833 | niro | 532 | |
9834 | niro | 816 | for (nparam = 0; argv[nparam]; nparam++) |
9835 | continue; | ||
9836 | ap = newparam = ckmalloc((nparam + 1) * sizeof(*ap)); | ||
9837 | while (*argv) { | ||
9838 | *ap++ = ckstrdup(*argv++); | ||
9839 | niro | 532 | } |
9840 | niro | 816 | *ap = NULL; |
9841 | freeparam(&shellparam); | ||
9842 | shellparam.malloced = 1; | ||
9843 | shellparam.nparam = nparam; | ||
9844 | shellparam.p = newparam; | ||
9845 | #if ENABLE_ASH_GETOPTS | ||
9846 | niro | 532 | shellparam.optind = 1; |
9847 | shellparam.optoff = -1; | ||
9848 | #endif | ||
9849 | } | ||
9850 | |||
9851 | niro | 816 | /* |
9852 | * Process shell options. The global variable argptr contains a pointer | ||
9853 | * to the argument list; we advance it past the options. | ||
9854 | * | ||
9855 | * SUSv3 section 2.8.1 "Consequences of Shell Errors" says: | ||
9856 | * For a non-interactive shell, an error condition encountered | ||
9857 | * by a special built-in ... shall cause the shell to write a diagnostic message | ||
9858 | * to standard error and exit as shown in the following table: | ||
9859 | * Error Special Built-In | ||
9860 | * ... | ||
9861 | * Utility syntax error (option or operand error) Shall exit | ||
9862 | * ... | ||
9863 | * However, in bug 1142 (http://busybox.net/bugs/view.php?id=1142) | ||
9864 | * we see that bash does not do that (set "finishes" with error code 1 instead, | ||
9865 | * and shell continues), and people rely on this behavior! | ||
9866 | * Testcase: | ||
9867 | * set -o barfoo 2>/dev/null | ||
9868 | * echo $? | ||
9869 | * | ||
9870 | * Oh well. Let's mimic that. | ||
9871 | */ | ||
9872 | static int | ||
9873 | plus_minus_o(char *name, int val) | ||
9874 | niro | 532 | { |
9875 | int i; | ||
9876 | |||
9877 | niro | 816 | if (name) { |
9878 | for (i = 0; i < NOPTS; i++) { | ||
9879 | if (strcmp(name, optnames(i)) == 0) { | ||
9880 | niro | 532 | optlist[i] = val; |
9881 | niro | 816 | return 0; |
9882 | niro | 532 | } |
9883 | niro | 816 | } |
9884 | ash_msg("illegal option %co %s", val ? '-' : '+', name); | ||
9885 | return 1; | ||
9886 | niro | 532 | } |
9887 | niro | 816 | for (i = 0; i < NOPTS; i++) { |
9888 | if (val) { | ||
9889 | out1fmt("%-16s%s\n", optnames(i), optlist[i] ? "on" : "off"); | ||
9890 | } else { | ||
9891 | out1fmt("set %co %s\n", optlist[i] ? '-' : '+', optnames(i)); | ||
9892 | } | ||
9893 | } | ||
9894 | return 0; | ||
9895 | niro | 532 | } |
9896 | niro | 816 | static void |
9897 | setoption(int flag, int val) | ||
9898 | { | ||
9899 | int i; | ||
9900 | niro | 532 | |
9901 | niro | 816 | for (i = 0; i < NOPTS; i++) { |
9902 | if (optletters(i) == flag) { | ||
9903 | optlist[i] = val; | ||
9904 | return; | ||
9905 | } | ||
9906 | } | ||
9907 | ash_msg_and_raise_error("illegal option %c%c", val ? '-' : '+', flag); | ||
9908 | /* NOTREACHED */ | ||
9909 | } | ||
9910 | static int | ||
9911 | niro | 532 | options(int cmdline) |
9912 | { | ||
9913 | char *p; | ||
9914 | int val; | ||
9915 | int c; | ||
9916 | |||
9917 | if (cmdline) | ||
9918 | minusc = NULL; | ||
9919 | while ((p = *argptr) != NULL) { | ||
9920 | niro | 816 | c = *p++; |
9921 | if (c != '-' && c != '+') | ||
9922 | break; | ||
9923 | niro | 532 | argptr++; |
9924 | niro | 816 | val = 0; /* val = 0 if c == '+' */ |
9925 | if (c == '-') { | ||
9926 | niro | 532 | val = 1; |
9927 | if (p[0] == '\0' || LONE_DASH(p)) { | ||
9928 | if (!cmdline) { | ||
9929 | /* "-" means turn off -x and -v */ | ||
9930 | if (p[0] == '\0') | ||
9931 | xflag = vflag = 0; | ||
9932 | /* "--" means reset params */ | ||
9933 | else if (*argptr == NULL) | ||
9934 | setparam(argptr); | ||
9935 | } | ||
9936 | break; /* "-" or "--" terminates options */ | ||
9937 | } | ||
9938 | } | ||
9939 | niro | 816 | /* first char was + or - */ |
9940 | niro | 532 | while ((c = *p++) != '\0') { |
9941 | niro | 816 | /* bash 3.2 indeed handles -c CMD and +c CMD the same */ |
9942 | niro | 532 | if (c == 'c' && cmdline) { |
9943 | niro | 816 | minusc = p; /* command is after shell args */ |
9944 | niro | 532 | } else if (c == 'o') { |
9945 | niro | 816 | if (plus_minus_o(*argptr, val)) { |
9946 | /* it already printed err message */ | ||
9947 | return 1; /* error */ | ||
9948 | } | ||
9949 | niro | 532 | if (*argptr) |
9950 | argptr++; | ||
9951 | niro | 816 | } else if (cmdline && (c == 'l')) { /* -l or +l == --login */ |
9952 | isloginsh = 1; | ||
9953 | /* bash does not accept +-login, we also won't */ | ||
9954 | } else if (cmdline && val && (c == '-')) { /* long options */ | ||
9955 | niro | 532 | if (strcmp(p, "login") == 0) |
9956 | isloginsh = 1; | ||
9957 | break; | ||
9958 | } else { | ||
9959 | setoption(c, val); | ||
9960 | } | ||
9961 | } | ||
9962 | } | ||
9963 | niro | 816 | return 0; |
9964 | niro | 532 | } |
9965 | |||
9966 | /* | ||
9967 | niro | 816 | * The shift builtin command. |
9968 | niro | 532 | */ |
9969 | niro | 984 | static int FAST_FUNC |
9970 | niro | 816 | shiftcmd(int argc UNUSED_PARAM, char **argv) |
9971 | niro | 532 | { |
9972 | niro | 816 | int n; |
9973 | char **ap1, **ap2; | ||
9974 | niro | 532 | |
9975 | niro | 816 | n = 1; |
9976 | if (argv[1]) | ||
9977 | n = number(argv[1]); | ||
9978 | if (n > shellparam.nparam) | ||
9979 | n = 0; /* bash compat, was = shellparam.nparam; */ | ||
9980 | INT_OFF; | ||
9981 | shellparam.nparam -= n; | ||
9982 | for (ap1 = shellparam.p; --n >= 0; ap1++) { | ||
9983 | if (shellparam.malloced) | ||
9984 | free(*ap1); | ||
9985 | niro | 532 | } |
9986 | niro | 816 | ap2 = shellparam.p; |
9987 | while ((*ap2++ = *ap1++) != NULL) | ||
9988 | continue; | ||
9989 | #if ENABLE_ASH_GETOPTS | ||
9990 | niro | 532 | shellparam.optind = 1; |
9991 | shellparam.optoff = -1; | ||
9992 | #endif | ||
9993 | niro | 816 | INT_ON; |
9994 | return 0; | ||
9995 | niro | 532 | } |
9996 | |||
9997 | /* | ||
9998 | niro | 816 | * POSIX requires that 'set' (but not export or readonly) output the |
9999 | * variables in lexicographic order - by the locale's collating order (sigh). | ||
10000 | * Maybe we could keep them in an ordered balanced binary tree | ||
10001 | * instead of hashed lists. | ||
10002 | * For now just roll 'em through qsort for printing... | ||
10003 | niro | 532 | */ |
10004 | niro | 816 | static int |
10005 | showvars(const char *sep_prefix, int on, int off) | ||
10006 | niro | 532 | { |
10007 | niro | 816 | const char *sep; |
10008 | char **ep, **epend; | ||
10009 | niro | 532 | |
10010 | niro | 816 | ep = listvars(on, off, &epend); |
10011 | qsort(ep, epend - ep, sizeof(char *), vpcmp); | ||
10012 | niro | 532 | |
10013 | niro | 816 | sep = *sep_prefix ? " " : sep_prefix; |
10014 | niro | 532 | |
10015 | niro | 816 | for (; ep < epend; ep++) { |
10016 | const char *p; | ||
10017 | const char *q; | ||
10018 | niro | 532 | |
10019 | niro | 816 | p = strchrnul(*ep, '='); |
10020 | q = nullstr; | ||
10021 | if (*p) | ||
10022 | q = single_quote(++p); | ||
10023 | out1fmt("%s%s%.*s%s\n", sep_prefix, sep, (int)(p - *ep), *ep, q); | ||
10024 | niro | 532 | } |
10025 | return 0; | ||
10026 | } | ||
10027 | |||
10028 | /* | ||
10029 | * The set command builtin. | ||
10030 | */ | ||
10031 | niro | 984 | static int FAST_FUNC |
10032 | niro | 816 | setcmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
10033 | { | ||
10034 | int retval; | ||
10035 | niro | 532 | |
10036 | niro | 816 | if (!argv[1]) |
10037 | niro | 532 | return showvars(nullstr, 0, VUNSET); |
10038 | niro | 816 | INT_OFF; |
10039 | retval = 1; | ||
10040 | if (!options(0)) { /* if no parse error... */ | ||
10041 | retval = 0; | ||
10042 | optschanged(); | ||
10043 | if (*argptr != NULL) { | ||
10044 | setparam(argptr); | ||
10045 | } | ||
10046 | niro | 532 | } |
10047 | niro | 816 | INT_ON; |
10048 | return retval; | ||
10049 | niro | 532 | } |
10050 | |||
10051 | niro | 816 | #if ENABLE_ASH_RANDOM_SUPPORT |
10052 | niro | 984 | static void FAST_FUNC |
10053 | niro | 816 | change_random(const char *value) |
10054 | niro | 532 | { |
10055 | niro | 984 | uint32_t t; |
10056 | niro | 532 | |
10057 | niro | 816 | if (value == NULL) { |
10058 | niro | 532 | /* "get", generate */ |
10059 | niro | 984 | t = next_random(&random_gen); |
10060 | niro | 532 | /* set without recursion */ |
10061 | niro | 816 | setvar(vrandom.text, utoa(t), VNOFUNC); |
10062 | niro | 532 | vrandom.flags &= ~VNOFUNC; |
10063 | } else { | ||
10064 | /* set/reset */ | ||
10065 | niro | 984 | t = strtoul(value, NULL, 10); |
10066 | INIT_RANDOM_T(&random_gen, (t ? t : 1), t); | ||
10067 | niro | 532 | } |
10068 | } | ||
10069 | #endif | ||
10070 | |||
10071 | niro | 816 | #if ENABLE_ASH_GETOPTS |
10072 | niro | 532 | static int |
10073 | getopts(char *optstr, char *optvar, char **optfirst, int *param_optind, int *optoff) | ||
10074 | { | ||
10075 | char *p, *q; | ||
10076 | char c = '?'; | ||
10077 | int done = 0; | ||
10078 | int err = 0; | ||
10079 | char s[12]; | ||
10080 | char **optnext; | ||
10081 | |||
10082 | niro | 816 | if (*param_optind < 1) |
10083 | niro | 532 | return 1; |
10084 | optnext = optfirst + *param_optind - 1; | ||
10085 | |||
10086 | niro | 816 | if (*param_optind <= 1 || *optoff < 0 || (int)strlen(optnext[-1]) < *optoff) |
10087 | niro | 532 | p = NULL; |
10088 | else | ||
10089 | p = optnext[-1] + *optoff; | ||
10090 | if (p == NULL || *p == '\0') { | ||
10091 | /* Current word is done, advance */ | ||
10092 | p = *optnext; | ||
10093 | if (p == NULL || *p != '-' || *++p == '\0') { | ||
10094 | niro | 816 | atend: |
10095 | niro | 532 | p = NULL; |
10096 | done = 1; | ||
10097 | goto out; | ||
10098 | } | ||
10099 | optnext++; | ||
10100 | if (LONE_DASH(p)) /* check for "--" */ | ||
10101 | goto atend; | ||
10102 | } | ||
10103 | |||
10104 | c = *p++; | ||
10105 | niro | 816 | for (q = optstr; *q != c;) { |
10106 | niro | 532 | if (*q == '\0') { |
10107 | if (optstr[0] == ':') { | ||
10108 | s[0] = c; | ||
10109 | s[1] = '\0'; | ||
10110 | err |= setvarsafe("OPTARG", s, 0); | ||
10111 | } else { | ||
10112 | fprintf(stderr, "Illegal option -%c\n", c); | ||
10113 | niro | 816 | unsetvar("OPTARG"); |
10114 | niro | 532 | } |
10115 | c = '?'; | ||
10116 | goto out; | ||
10117 | } | ||
10118 | if (*++q == ':') | ||
10119 | q++; | ||
10120 | } | ||
10121 | |||
10122 | if (*++q == ':') { | ||
10123 | if (*p == '\0' && (p = *optnext) == NULL) { | ||
10124 | if (optstr[0] == ':') { | ||
10125 | s[0] = c; | ||
10126 | s[1] = '\0'; | ||
10127 | err |= setvarsafe("OPTARG", s, 0); | ||
10128 | c = ':'; | ||
10129 | } else { | ||
10130 | fprintf(stderr, "No arg for -%c option\n", c); | ||
10131 | niro | 816 | unsetvar("OPTARG"); |
10132 | niro | 532 | c = '?'; |
10133 | } | ||
10134 | goto out; | ||
10135 | } | ||
10136 | |||
10137 | if (p == *optnext) | ||
10138 | optnext++; | ||
10139 | err |= setvarsafe("OPTARG", p, 0); | ||
10140 | p = NULL; | ||
10141 | } else | ||
10142 | err |= setvarsafe("OPTARG", nullstr, 0); | ||
10143 | niro | 816 | out: |
10144 | niro | 532 | *optoff = p ? p - *(optnext - 1) : -1; |
10145 | *param_optind = optnext - optfirst + 1; | ||
10146 | fmtstr(s, sizeof(s), "%d", *param_optind); | ||
10147 | err |= setvarsafe("OPTIND", s, VNOFUNC); | ||
10148 | s[0] = c; | ||
10149 | s[1] = '\0'; | ||
10150 | err |= setvarsafe(optvar, s, 0); | ||
10151 | if (err) { | ||
10152 | *param_optind = 1; | ||
10153 | *optoff = -1; | ||
10154 | niro | 816 | flush_stdout_stderr(); |
10155 | raise_exception(EXERROR); | ||
10156 | niro | 532 | } |
10157 | return done; | ||
10158 | } | ||
10159 | |||
10160 | /* | ||
10161 | * The getopts builtin. Shellparam.optnext points to the next argument | ||
10162 | * to be processed. Shellparam.optptr points to the next character to | ||
10163 | * be processed in the current argument. If shellparam.optnext is NULL, | ||
10164 | * then it's the first time getopts has been called. | ||
10165 | */ | ||
10166 | niro | 984 | static int FAST_FUNC |
10167 | niro | 532 | getoptscmd(int argc, char **argv) |
10168 | { | ||
10169 | char **optbase; | ||
10170 | |||
10171 | if (argc < 3) | ||
10172 | niro | 816 | ash_msg_and_raise_error("usage: getopts optstring var [arg]"); |
10173 | if (argc == 3) { | ||
10174 | niro | 532 | optbase = shellparam.p; |
10175 | if (shellparam.optind > shellparam.nparam + 1) { | ||
10176 | shellparam.optind = 1; | ||
10177 | shellparam.optoff = -1; | ||
10178 | } | ||
10179 | niro | 816 | } else { |
10180 | niro | 532 | optbase = &argv[3]; |
10181 | if (shellparam.optind > argc - 2) { | ||
10182 | shellparam.optind = 1; | ||
10183 | shellparam.optoff = -1; | ||
10184 | } | ||
10185 | } | ||
10186 | |||
10187 | return getopts(argv[1], argv[2], optbase, &shellparam.optind, | ||
10188 | niro | 816 | &shellparam.optoff); |
10189 | niro | 532 | } |
10190 | niro | 816 | #endif /* ASH_GETOPTS */ |
10191 | niro | 532 | |
10192 | |||
10193 | niro | 816 | /* ============ Shell parser */ |
10194 | niro | 532 | |
10195 | niro | 816 | struct heredoc { |
10196 | struct heredoc *next; /* next here document in list */ | ||
10197 | union node *here; /* redirection node */ | ||
10198 | char *eofmark; /* string indicating end of input */ | ||
10199 | smallint striptabs; /* if set, strip leading tabs */ | ||
10200 | }; | ||
10201 | niro | 532 | |
10202 | niro | 816 | static smallint tokpushback; /* last token pushed back */ |
10203 | static smallint parsebackquote; /* nonzero if we are inside backquotes */ | ||
10204 | static smallint quoteflag; /* set if (part of) last token was quoted */ | ||
10205 | static token_id_t lasttoken; /* last token read (integer id Txxx) */ | ||
10206 | static struct heredoc *heredoclist; /* list of here documents to read */ | ||
10207 | static char *wordtext; /* text of last word returned by readtoken */ | ||
10208 | static struct nodelist *backquotelist; | ||
10209 | static union node *redirnode; | ||
10210 | static struct heredoc *heredoc; | ||
10211 | niro | 532 | |
10212 | niro | 816 | /* |
10213 | * Called when an unexpected token is read during the parse. The argument | ||
10214 | * is the token that is expected, or -1 if more than one type of token can | ||
10215 | * occur at this point. | ||
10216 | */ | ||
10217 | static void raise_error_unexpected_syntax(int) NORETURN; | ||
10218 | niro | 532 | static void |
10219 | niro | 816 | raise_error_unexpected_syntax(int token) |
10220 | niro | 532 | { |
10221 | niro | 816 | char msg[64]; |
10222 | int l; | ||
10223 | niro | 532 | |
10224 | niro | 984 | l = sprintf(msg, "unexpected %s", tokname(lasttoken)); |
10225 | niro | 816 | if (token >= 0) |
10226 | sprintf(msg + l, " (expecting %s)", tokname(token)); | ||
10227 | raise_error_syntax(msg); | ||
10228 | /* NOTREACHED */ | ||
10229 | niro | 532 | } |
10230 | |||
10231 | #define EOFMARKLEN 79 | ||
10232 | |||
10233 | niro | 816 | /* parsing is heavily cross-recursive, need these forward decls */ |
10234 | niro | 532 | static union node *andor(void); |
10235 | static union node *pipeline(void); | ||
10236 | niro | 816 | static union node *parse_command(void); |
10237 | niro | 532 | static void parseheredoc(void); |
10238 | static char peektoken(void); | ||
10239 | static int readtoken(void); | ||
10240 | |||
10241 | static union node * | ||
10242 | list(int nlflag) | ||
10243 | { | ||
10244 | union node *n1, *n2, *n3; | ||
10245 | int tok; | ||
10246 | |||
10247 | checkkwd = CHKNL | CHKKWD | CHKALIAS; | ||
10248 | if (nlflag == 2 && peektoken()) | ||
10249 | return NULL; | ||
10250 | n1 = NULL; | ||
10251 | for (;;) { | ||
10252 | n2 = andor(); | ||
10253 | tok = readtoken(); | ||
10254 | if (tok == TBACKGND) { | ||
10255 | if (n2->type == NPIPE) { | ||
10256 | niro | 816 | n2->npipe.pipe_backgnd = 1; |
10257 | niro | 532 | } else { |
10258 | if (n2->type != NREDIR) { | ||
10259 | niro | 816 | n3 = stzalloc(sizeof(struct nredir)); |
10260 | niro | 532 | n3->nredir.n = n2; |
10261 | niro | 816 | /*n3->nredir.redirect = NULL; - stzalloc did it */ |
10262 | niro | 532 | n2 = n3; |
10263 | } | ||
10264 | n2->type = NBACKGND; | ||
10265 | } | ||
10266 | } | ||
10267 | if (n1 == NULL) { | ||
10268 | n1 = n2; | ||
10269 | niro | 816 | } else { |
10270 | n3 = stzalloc(sizeof(struct nbinary)); | ||
10271 | niro | 532 | n3->type = NSEMI; |
10272 | n3->nbinary.ch1 = n1; | ||
10273 | n3->nbinary.ch2 = n2; | ||
10274 | n1 = n3; | ||
10275 | } | ||
10276 | switch (tok) { | ||
10277 | case TBACKGND: | ||
10278 | case TSEMI: | ||
10279 | tok = readtoken(); | ||
10280 | /* fall through */ | ||
10281 | case TNL: | ||
10282 | if (tok == TNL) { | ||
10283 | parseheredoc(); | ||
10284 | if (nlflag == 1) | ||
10285 | return n1; | ||
10286 | } else { | ||
10287 | niro | 816 | tokpushback = 1; |
10288 | niro | 532 | } |
10289 | checkkwd = CHKNL | CHKKWD | CHKALIAS; | ||
10290 | if (peektoken()) | ||
10291 | return n1; | ||
10292 | break; | ||
10293 | case TEOF: | ||
10294 | if (heredoclist) | ||
10295 | parseheredoc(); | ||
10296 | else | ||
10297 | pungetc(); /* push back EOF on input */ | ||
10298 | return n1; | ||
10299 | default: | ||
10300 | if (nlflag == 1) | ||
10301 | niro | 816 | raise_error_unexpected_syntax(-1); |
10302 | tokpushback = 1; | ||
10303 | niro | 532 | return n1; |
10304 | } | ||
10305 | } | ||
10306 | } | ||
10307 | |||
10308 | static union node * | ||
10309 | andor(void) | ||
10310 | { | ||
10311 | union node *n1, *n2, *n3; | ||
10312 | int t; | ||
10313 | |||
10314 | n1 = pipeline(); | ||
10315 | for (;;) { | ||
10316 | niro | 816 | t = readtoken(); |
10317 | if (t == TAND) { | ||
10318 | niro | 532 | t = NAND; |
10319 | } else if (t == TOR) { | ||
10320 | t = NOR; | ||
10321 | } else { | ||
10322 | niro | 816 | tokpushback = 1; |
10323 | niro | 532 | return n1; |
10324 | } | ||
10325 | checkkwd = CHKNL | CHKKWD | CHKALIAS; | ||
10326 | n2 = pipeline(); | ||
10327 | niro | 816 | n3 = stzalloc(sizeof(struct nbinary)); |
10328 | niro | 532 | n3->type = t; |
10329 | n3->nbinary.ch1 = n1; | ||
10330 | n3->nbinary.ch2 = n2; | ||
10331 | n1 = n3; | ||
10332 | } | ||
10333 | } | ||
10334 | |||
10335 | static union node * | ||
10336 | pipeline(void) | ||
10337 | { | ||
10338 | union node *n1, *n2, *pipenode; | ||
10339 | struct nodelist *lp, *prev; | ||
10340 | int negate; | ||
10341 | |||
10342 | negate = 0; | ||
10343 | TRACE(("pipeline: entered\n")); | ||
10344 | if (readtoken() == TNOT) { | ||
10345 | negate = !negate; | ||
10346 | checkkwd = CHKKWD | CHKALIAS; | ||
10347 | } else | ||
10348 | niro | 816 | tokpushback = 1; |
10349 | n1 = parse_command(); | ||
10350 | niro | 532 | if (readtoken() == TPIPE) { |
10351 | niro | 816 | pipenode = stzalloc(sizeof(struct npipe)); |
10352 | niro | 532 | pipenode->type = NPIPE; |
10353 | niro | 816 | /*pipenode->npipe.pipe_backgnd = 0; - stzalloc did it */ |
10354 | lp = stzalloc(sizeof(struct nodelist)); | ||
10355 | niro | 532 | pipenode->npipe.cmdlist = lp; |
10356 | lp->n = n1; | ||
10357 | do { | ||
10358 | prev = lp; | ||
10359 | niro | 816 | lp = stzalloc(sizeof(struct nodelist)); |
10360 | niro | 532 | checkkwd = CHKNL | CHKKWD | CHKALIAS; |
10361 | niro | 816 | lp->n = parse_command(); |
10362 | niro | 532 | prev->next = lp; |
10363 | } while (readtoken() == TPIPE); | ||
10364 | lp->next = NULL; | ||
10365 | n1 = pipenode; | ||
10366 | } | ||
10367 | niro | 816 | tokpushback = 1; |
10368 | niro | 532 | if (negate) { |
10369 | niro | 816 | n2 = stzalloc(sizeof(struct nnot)); |
10370 | niro | 532 | n2->type = NNOT; |
10371 | n2->nnot.com = n1; | ||
10372 | return n2; | ||
10373 | niro | 816 | } |
10374 | return n1; | ||
10375 | niro | 532 | } |
10376 | |||
10377 | niro | 816 | static union node * |
10378 | makename(void) | ||
10379 | { | ||
10380 | union node *n; | ||
10381 | niro | 532 | |
10382 | niro | 816 | n = stzalloc(sizeof(struct narg)); |
10383 | n->type = NARG; | ||
10384 | /*n->narg.next = NULL; - stzalloc did it */ | ||
10385 | n->narg.text = wordtext; | ||
10386 | n->narg.backquote = backquotelist; | ||
10387 | return n; | ||
10388 | } | ||
10389 | niro | 532 | |
10390 | niro | 816 | static void |
10391 | fixredir(union node *n, const char *text, int err) | ||
10392 | { | ||
10393 | int fd; | ||
10394 | |||
10395 | TRACE(("Fix redir %s %d\n", text, err)); | ||
10396 | if (!err) | ||
10397 | n->ndup.vname = NULL; | ||
10398 | |||
10399 | fd = bb_strtou(text, NULL, 10); | ||
10400 | if (!errno && fd >= 0) | ||
10401 | n->ndup.dupfd = fd; | ||
10402 | else if (LONE_DASH(text)) | ||
10403 | n->ndup.dupfd = -1; | ||
10404 | else { | ||
10405 | if (err) | ||
10406 | raise_error_syntax("bad fd number"); | ||
10407 | n->ndup.vname = makename(); | ||
10408 | } | ||
10409 | } | ||
10410 | |||
10411 | /* | ||
10412 | * Returns true if the text contains nothing to expand (no dollar signs | ||
10413 | * or backquotes). | ||
10414 | */ | ||
10415 | static int | ||
10416 | niro | 984 | noexpand(const char *text) |
10417 | niro | 816 | { |
10418 | niro | 984 | unsigned char c; |
10419 | niro | 816 | |
10420 | niro | 984 | while ((c = *text++) != '\0') { |
10421 | niro | 816 | if (c == CTLQUOTEMARK) |
10422 | continue; | ||
10423 | if (c == CTLESC) | ||
10424 | niro | 984 | text++; |
10425 | niro | 816 | else if (SIT(c, BASESYNTAX) == CCTL) |
10426 | return 0; | ||
10427 | } | ||
10428 | return 1; | ||
10429 | } | ||
10430 | |||
10431 | static void | ||
10432 | parsefname(void) | ||
10433 | { | ||
10434 | union node *n = redirnode; | ||
10435 | |||
10436 | if (readtoken() != TWORD) | ||
10437 | raise_error_unexpected_syntax(-1); | ||
10438 | if (n->type == NHERE) { | ||
10439 | struct heredoc *here = heredoc; | ||
10440 | struct heredoc *p; | ||
10441 | int i; | ||
10442 | |||
10443 | if (quoteflag == 0) | ||
10444 | n->type = NXHERE; | ||
10445 | TRACE(("Here document %d\n", n->type)); | ||
10446 | if (!noexpand(wordtext) || (i = strlen(wordtext)) == 0 || i > EOFMARKLEN) | ||
10447 | raise_error_syntax("illegal eof marker for << redirection"); | ||
10448 | niro | 984 | rmescapes(wordtext, 0); |
10449 | niro | 816 | here->eofmark = wordtext; |
10450 | here->next = NULL; | ||
10451 | if (heredoclist == NULL) | ||
10452 | heredoclist = here; | ||
10453 | else { | ||
10454 | for (p = heredoclist; p->next; p = p->next) | ||
10455 | continue; | ||
10456 | p->next = here; | ||
10457 | } | ||
10458 | } else if (n->type == NTOFD || n->type == NFROMFD) { | ||
10459 | fixredir(n, wordtext, 0); | ||
10460 | } else { | ||
10461 | n->nfile.fname = makename(); | ||
10462 | } | ||
10463 | } | ||
10464 | |||
10465 | niro | 532 | static union node * |
10466 | niro | 816 | simplecmd(void) |
10467 | niro | 532 | { |
10468 | niro | 816 | union node *args, **app; |
10469 | union node *n = NULL; | ||
10470 | union node *vars, **vpp; | ||
10471 | union node **rpp, *redir; | ||
10472 | int savecheckkwd; | ||
10473 | #if ENABLE_ASH_BASH_COMPAT | ||
10474 | smallint double_brackets_flag = 0; | ||
10475 | #endif | ||
10476 | |||
10477 | args = NULL; | ||
10478 | app = &args; | ||
10479 | vars = NULL; | ||
10480 | vpp = &vars; | ||
10481 | redir = NULL; | ||
10482 | rpp = &redir; | ||
10483 | |||
10484 | savecheckkwd = CHKALIAS; | ||
10485 | for (;;) { | ||
10486 | int t; | ||
10487 | checkkwd = savecheckkwd; | ||
10488 | t = readtoken(); | ||
10489 | switch (t) { | ||
10490 | #if ENABLE_ASH_BASH_COMPAT | ||
10491 | case TAND: /* "&&" */ | ||
10492 | case TOR: /* "||" */ | ||
10493 | if (!double_brackets_flag) { | ||
10494 | tokpushback = 1; | ||
10495 | goto out; | ||
10496 | } | ||
10497 | wordtext = (char *) (t == TAND ? "-a" : "-o"); | ||
10498 | #endif | ||
10499 | case TWORD: | ||
10500 | n = stzalloc(sizeof(struct narg)); | ||
10501 | n->type = NARG; | ||
10502 | /*n->narg.next = NULL; - stzalloc did it */ | ||
10503 | n->narg.text = wordtext; | ||
10504 | #if ENABLE_ASH_BASH_COMPAT | ||
10505 | if (strcmp("[[", wordtext) == 0) | ||
10506 | double_brackets_flag = 1; | ||
10507 | else if (strcmp("]]", wordtext) == 0) | ||
10508 | double_brackets_flag = 0; | ||
10509 | #endif | ||
10510 | n->narg.backquote = backquotelist; | ||
10511 | if (savecheckkwd && isassignment(wordtext)) { | ||
10512 | *vpp = n; | ||
10513 | vpp = &n->narg.next; | ||
10514 | } else { | ||
10515 | *app = n; | ||
10516 | app = &n->narg.next; | ||
10517 | savecheckkwd = 0; | ||
10518 | } | ||
10519 | break; | ||
10520 | case TREDIR: | ||
10521 | *rpp = n = redirnode; | ||
10522 | rpp = &n->nfile.next; | ||
10523 | parsefname(); /* read name of redirection file */ | ||
10524 | break; | ||
10525 | case TLP: | ||
10526 | if (args && app == &args->narg.next | ||
10527 | && !vars && !redir | ||
10528 | ) { | ||
10529 | struct builtincmd *bcmd; | ||
10530 | const char *name; | ||
10531 | |||
10532 | /* We have a function */ | ||
10533 | if (readtoken() != TRP) | ||
10534 | raise_error_unexpected_syntax(TRP); | ||
10535 | name = n->narg.text; | ||
10536 | if (!goodname(name) | ||
10537 | || ((bcmd = find_builtin(name)) && IS_BUILTIN_SPECIAL(bcmd)) | ||
10538 | ) { | ||
10539 | raise_error_syntax("bad function name"); | ||
10540 | } | ||
10541 | n->type = NDEFUN; | ||
10542 | checkkwd = CHKNL | CHKKWD | CHKALIAS; | ||
10543 | n->narg.next = parse_command(); | ||
10544 | return n; | ||
10545 | } | ||
10546 | /* fall through */ | ||
10547 | default: | ||
10548 | tokpushback = 1; | ||
10549 | goto out; | ||
10550 | } | ||
10551 | } | ||
10552 | out: | ||
10553 | *app = NULL; | ||
10554 | *vpp = NULL; | ||
10555 | *rpp = NULL; | ||
10556 | n = stzalloc(sizeof(struct ncmd)); | ||
10557 | n->type = NCMD; | ||
10558 | n->ncmd.args = args; | ||
10559 | n->ncmd.assign = vars; | ||
10560 | n->ncmd.redirect = redir; | ||
10561 | return n; | ||
10562 | } | ||
10563 | |||
10564 | static union node * | ||
10565 | parse_command(void) | ||
10566 | { | ||
10567 | niro | 532 | union node *n1, *n2; |
10568 | union node *ap, **app; | ||
10569 | union node *cp, **cpp; | ||
10570 | union node *redir, **rpp; | ||
10571 | union node **rpp2; | ||
10572 | int t; | ||
10573 | |||
10574 | redir = NULL; | ||
10575 | rpp2 = &redir; | ||
10576 | |||
10577 | switch (readtoken()) { | ||
10578 | default: | ||
10579 | niro | 816 | raise_error_unexpected_syntax(-1); |
10580 | niro | 532 | /* NOTREACHED */ |
10581 | case TIF: | ||
10582 | niro | 816 | n1 = stzalloc(sizeof(struct nif)); |
10583 | niro | 532 | n1->type = NIF; |
10584 | n1->nif.test = list(0); | ||
10585 | if (readtoken() != TTHEN) | ||
10586 | niro | 816 | raise_error_unexpected_syntax(TTHEN); |
10587 | niro | 532 | n1->nif.ifpart = list(0); |
10588 | n2 = n1; | ||
10589 | while (readtoken() == TELIF) { | ||
10590 | niro | 816 | n2->nif.elsepart = stzalloc(sizeof(struct nif)); |
10591 | niro | 532 | n2 = n2->nif.elsepart; |
10592 | n2->type = NIF; | ||
10593 | n2->nif.test = list(0); | ||
10594 | if (readtoken() != TTHEN) | ||
10595 | niro | 816 | raise_error_unexpected_syntax(TTHEN); |
10596 | niro | 532 | n2->nif.ifpart = list(0); |
10597 | } | ||
10598 | if (lasttoken == TELSE) | ||
10599 | n2->nif.elsepart = list(0); | ||
10600 | else { | ||
10601 | n2->nif.elsepart = NULL; | ||
10602 | niro | 816 | tokpushback = 1; |
10603 | niro | 532 | } |
10604 | t = TFI; | ||
10605 | break; | ||
10606 | case TWHILE: | ||
10607 | case TUNTIL: { | ||
10608 | int got; | ||
10609 | niro | 816 | n1 = stzalloc(sizeof(struct nbinary)); |
10610 | n1->type = (lasttoken == TWHILE) ? NWHILE : NUNTIL; | ||
10611 | niro | 532 | n1->nbinary.ch1 = list(0); |
10612 | niro | 816 | got = readtoken(); |
10613 | if (got != TDO) { | ||
10614 | TRACE(("expecting DO got %s %s\n", tokname(got), | ||
10615 | got == TWORD ? wordtext : "")); | ||
10616 | raise_error_unexpected_syntax(TDO); | ||
10617 | niro | 532 | } |
10618 | n1->nbinary.ch2 = list(0); | ||
10619 | t = TDONE; | ||
10620 | break; | ||
10621 | } | ||
10622 | case TFOR: | ||
10623 | niro | 816 | if (readtoken() != TWORD || quoteflag || !goodname(wordtext)) |
10624 | raise_error_syntax("bad for loop variable"); | ||
10625 | n1 = stzalloc(sizeof(struct nfor)); | ||
10626 | niro | 532 | n1->type = NFOR; |
10627 | n1->nfor.var = wordtext; | ||
10628 | checkkwd = CHKKWD | CHKALIAS; | ||
10629 | if (readtoken() == TIN) { | ||
10630 | app = ≈ | ||
10631 | while (readtoken() == TWORD) { | ||
10632 | niro | 816 | n2 = stzalloc(sizeof(struct narg)); |
10633 | niro | 532 | n2->type = NARG; |
10634 | niro | 816 | /*n2->narg.next = NULL; - stzalloc did it */ |
10635 | niro | 532 | n2->narg.text = wordtext; |
10636 | n2->narg.backquote = backquotelist; | ||
10637 | *app = n2; | ||
10638 | app = &n2->narg.next; | ||
10639 | } | ||
10640 | *app = NULL; | ||
10641 | n1->nfor.args = ap; | ||
10642 | if (lasttoken != TNL && lasttoken != TSEMI) | ||
10643 | niro | 816 | raise_error_unexpected_syntax(-1); |
10644 | niro | 532 | } else { |
10645 | niro | 816 | n2 = stzalloc(sizeof(struct narg)); |
10646 | niro | 532 | n2->type = NARG; |
10647 | niro | 816 | /*n2->narg.next = NULL; - stzalloc did it */ |
10648 | niro | 532 | n2->narg.text = (char *)dolatstr; |
10649 | niro | 816 | /*n2->narg.backquote = NULL;*/ |
10650 | niro | 532 | n1->nfor.args = n2; |
10651 | /* | ||
10652 | * Newline or semicolon here is optional (but note | ||
10653 | * that the original Bourne shell only allowed NL). | ||
10654 | */ | ||
10655 | if (lasttoken != TNL && lasttoken != TSEMI) | ||
10656 | niro | 816 | tokpushback = 1; |
10657 | niro | 532 | } |
10658 | checkkwd = CHKNL | CHKKWD | CHKALIAS; | ||
10659 | if (readtoken() != TDO) | ||
10660 | niro | 816 | raise_error_unexpected_syntax(TDO); |
10661 | niro | 532 | n1->nfor.body = list(0); |
10662 | t = TDONE; | ||
10663 | break; | ||
10664 | case TCASE: | ||
10665 | niro | 816 | n1 = stzalloc(sizeof(struct ncase)); |
10666 | niro | 532 | n1->type = NCASE; |
10667 | if (readtoken() != TWORD) | ||
10668 | niro | 816 | raise_error_unexpected_syntax(TWORD); |
10669 | n1->ncase.expr = n2 = stzalloc(sizeof(struct narg)); | ||
10670 | niro | 532 | n2->type = NARG; |
10671 | niro | 816 | /*n2->narg.next = NULL; - stzalloc did it */ |
10672 | niro | 532 | n2->narg.text = wordtext; |
10673 | n2->narg.backquote = backquotelist; | ||
10674 | do { | ||
10675 | checkkwd = CHKKWD | CHKALIAS; | ||
10676 | } while (readtoken() == TNL); | ||
10677 | if (lasttoken != TIN) | ||
10678 | niro | 816 | raise_error_unexpected_syntax(TIN); |
10679 | niro | 532 | cpp = &n1->ncase.cases; |
10680 | niro | 816 | next_case: |
10681 | niro | 532 | checkkwd = CHKNL | CHKKWD; |
10682 | t = readtoken(); | ||
10683 | niro | 816 | while (t != TESAC) { |
10684 | niro | 532 | if (lasttoken == TLP) |
10685 | readtoken(); | ||
10686 | niro | 816 | *cpp = cp = stzalloc(sizeof(struct nclist)); |
10687 | niro | 532 | cp->type = NCLIST; |
10688 | app = &cp->nclist.pattern; | ||
10689 | for (;;) { | ||
10690 | niro | 816 | *app = ap = stzalloc(sizeof(struct narg)); |
10691 | niro | 532 | ap->type = NARG; |
10692 | niro | 816 | /*ap->narg.next = NULL; - stzalloc did it */ |
10693 | niro | 532 | ap->narg.text = wordtext; |
10694 | ap->narg.backquote = backquotelist; | ||
10695 | if (readtoken() != TPIPE) | ||
10696 | break; | ||
10697 | app = &ap->narg.next; | ||
10698 | readtoken(); | ||
10699 | } | ||
10700 | niro | 816 | //ap->narg.next = NULL; |
10701 | niro | 532 | if (lasttoken != TRP) |
10702 | niro | 816 | raise_error_unexpected_syntax(TRP); |
10703 | niro | 532 | cp->nclist.body = list(2); |
10704 | |||
10705 | cpp = &cp->nclist.next; | ||
10706 | |||
10707 | checkkwd = CHKNL | CHKKWD; | ||
10708 | niro | 816 | t = readtoken(); |
10709 | if (t != TESAC) { | ||
10710 | niro | 532 | if (t != TENDCASE) |
10711 | niro | 816 | raise_error_unexpected_syntax(TENDCASE); |
10712 | goto next_case; | ||
10713 | niro | 532 | } |
10714 | } | ||
10715 | *cpp = NULL; | ||
10716 | goto redir; | ||
10717 | case TLP: | ||
10718 | niro | 816 | n1 = stzalloc(sizeof(struct nredir)); |
10719 | niro | 532 | n1->type = NSUBSHELL; |
10720 | n1->nredir.n = list(0); | ||
10721 | niro | 816 | /*n1->nredir.redirect = NULL; - stzalloc did it */ |
10722 | niro | 532 | t = TRP; |
10723 | break; | ||
10724 | case TBEGIN: | ||
10725 | n1 = list(0); | ||
10726 | t = TEND; | ||
10727 | break; | ||
10728 | case TWORD: | ||
10729 | case TREDIR: | ||
10730 | niro | 816 | tokpushback = 1; |
10731 | niro | 532 | return simplecmd(); |
10732 | } | ||
10733 | |||
10734 | if (readtoken() != t) | ||
10735 | niro | 816 | raise_error_unexpected_syntax(t); |
10736 | niro | 532 | |
10737 | niro | 816 | redir: |
10738 | niro | 532 | /* Now check for redirection which may follow command */ |
10739 | checkkwd = CHKKWD | CHKALIAS; | ||
10740 | rpp = rpp2; | ||
10741 | while (readtoken() == TREDIR) { | ||
10742 | *rpp = n2 = redirnode; | ||
10743 | rpp = &n2->nfile.next; | ||
10744 | parsefname(); | ||
10745 | } | ||
10746 | niro | 816 | tokpushback = 1; |
10747 | niro | 532 | *rpp = NULL; |
10748 | if (redir) { | ||
10749 | if (n1->type != NSUBSHELL) { | ||
10750 | niro | 816 | n2 = stzalloc(sizeof(struct nredir)); |
10751 | niro | 532 | n2->type = NREDIR; |
10752 | n2->nredir.n = n1; | ||
10753 | n1 = n2; | ||
10754 | } | ||
10755 | n1->nredir.redirect = redir; | ||
10756 | } | ||
10757 | return n1; | ||
10758 | } | ||
10759 | |||
10760 | niro | 816 | #if ENABLE_ASH_BASH_COMPAT |
10761 | static int decode_dollar_squote(void) | ||
10762 | niro | 532 | { |
10763 | niro | 816 | static const char C_escapes[] ALIGN1 = "nrbtfav""x\\01234567"; |
10764 | int c, cnt; | ||
10765 | char *p; | ||
10766 | char buf[4]; | ||
10767 | niro | 532 | |
10768 | niro | 816 | c = pgetc(); |
10769 | p = strchr(C_escapes, c); | ||
10770 | if (p) { | ||
10771 | buf[0] = c; | ||
10772 | p = buf; | ||
10773 | cnt = 3; | ||
10774 | if ((unsigned char)(c - '0') <= 7) { /* \ooo */ | ||
10775 | do { | ||
10776 | c = pgetc(); | ||
10777 | *++p = c; | ||
10778 | } while ((unsigned char)(c - '0') <= 7 && --cnt); | ||
10779 | pungetc(); | ||
10780 | } else if (c == 'x') { /* \xHH */ | ||
10781 | do { | ||
10782 | c = pgetc(); | ||
10783 | *++p = c; | ||
10784 | } while (isxdigit(c) && --cnt); | ||
10785 | pungetc(); | ||
10786 | if (cnt == 3) { /* \x but next char is "bad" */ | ||
10787 | c = 'x'; | ||
10788 | goto unrecognized; | ||
10789 | niro | 532 | } |
10790 | niro | 816 | } else { /* simple seq like \\ or \t */ |
10791 | p++; | ||
10792 | niro | 532 | } |
10793 | niro | 816 | *p = '\0'; |
10794 | p = buf; | ||
10795 | c = bb_process_escape_sequence((void*)&p); | ||
10796 | } else { /* unrecognized "\z": print both chars unless ' or " */ | ||
10797 | if (c != '\'' && c != '"') { | ||
10798 | unrecognized: | ||
10799 | c |= 0x100; /* "please encode \, then me" */ | ||
10800 | niro | 532 | } |
10801 | } | ||
10802 | niro | 816 | return c; |
10803 | niro | 532 | } |
10804 | #endif | ||
10805 | |||
10806 | /* | ||
10807 | * If eofmark is NULL, read a word or a redirection symbol. If eofmark | ||
10808 | * is not NULL, read a here document. In the latter case, eofmark is the | ||
10809 | * word which marks the end of the document and striptabs is true if | ||
10810 | niro | 984 | * leading tabs should be stripped from the document. The argument c |
10811 | niro | 532 | * is the first character of the input token or document. |
10812 | * | ||
10813 | * Because C does not have internal subroutines, I have simulated them | ||
10814 | * using goto's to implement the subroutine linkage. The following macros | ||
10815 | * will run code that appears at the end of readtoken1. | ||
10816 | */ | ||
10817 | #define CHECKEND() {goto checkend; checkend_return:;} | ||
10818 | #define PARSEREDIR() {goto parseredir; parseredir_return:;} | ||
10819 | #define PARSESUB() {goto parsesub; parsesub_return:;} | ||
10820 | #define PARSEBACKQOLD() {oldstyle = 1; goto parsebackq; parsebackq_oldreturn:;} | ||
10821 | #define PARSEBACKQNEW() {oldstyle = 0; goto parsebackq; parsebackq_newreturn:;} | ||
10822 | #define PARSEARITH() {goto parsearith; parsearith_return:;} | ||
10823 | static int | ||
10824 | niro | 984 | readtoken1(int c, int syntax, char *eofmark, int striptabs) |
10825 | niro | 532 | { |
10826 | niro | 816 | /* NB: syntax parameter fits into smallint */ |
10827 | niro | 984 | /* c parameter is an unsigned char or PEOF or PEOA */ |
10828 | niro | 532 | char *out; |
10829 | int len; | ||
10830 | char line[EOFMARKLEN + 1]; | ||
10831 | niro | 816 | struct nodelist *bqlist; |
10832 | smallint quotef; | ||
10833 | smallint dblquote; | ||
10834 | smallint oldstyle; | ||
10835 | smallint prevsyntax; /* syntax before arithmetic */ | ||
10836 | #if ENABLE_ASH_EXPAND_PRMT | ||
10837 | smallint pssyntax; /* we are expanding a prompt string */ | ||
10838 | #endif | ||
10839 | int varnest; /* levels of variables expansion */ | ||
10840 | int arinest; /* levels of arithmetic expansion */ | ||
10841 | int parenlevel; /* levels of parens in arithmetic */ | ||
10842 | int dqvarnest; /* levels of variables expansion within double quotes */ | ||
10843 | |||
10844 | niro | 984 | IF_ASH_BASH_COMPAT(smallint bash_dollar_squote = 0;) |
10845 | niro | 816 | |
10846 | niro | 532 | #if __GNUC__ |
10847 | /* Avoid longjmp clobbering */ | ||
10848 | (void) &out; | ||
10849 | (void) "ef; | ||
10850 | (void) &dblquote; | ||
10851 | (void) &varnest; | ||
10852 | (void) &arinest; | ||
10853 | (void) &parenlevel; | ||
10854 | (void) &dqvarnest; | ||
10855 | (void) &oldstyle; | ||
10856 | (void) &prevsyntax; | ||
10857 | (void) &syntax; | ||
10858 | #endif | ||
10859 | niro | 984 | startlinno = g_parsefile->linno; |
10860 | niro | 816 | bqlist = NULL; |
10861 | niro | 532 | quotef = 0; |
10862 | niro | 816 | oldstyle = 0; |
10863 | prevsyntax = 0; | ||
10864 | #if ENABLE_ASH_EXPAND_PRMT | ||
10865 | pssyntax = (syntax == PSSYNTAX); | ||
10866 | if (pssyntax) | ||
10867 | syntax = DQSYNTAX; | ||
10868 | #endif | ||
10869 | dblquote = (syntax == DQSYNTAX); | ||
10870 | niro | 532 | varnest = 0; |
10871 | arinest = 0; | ||
10872 | parenlevel = 0; | ||
10873 | dqvarnest = 0; | ||
10874 | |||
10875 | STARTSTACKSTR(out); | ||
10876 | niro | 816 | loop: |
10877 | /* For each line, until end of word */ | ||
10878 | { | ||
10879 | niro | 532 | CHECKEND(); /* set c to PEOF if at end of here document */ |
10880 | for (;;) { /* until end of line or end of word */ | ||
10881 | CHECKSTRSPACE(4, out); /* permit 4 calls to USTPUTC */ | ||
10882 | switch (SIT(c, syntax)) { | ||
10883 | case CNL: /* '\n' */ | ||
10884 | if (syntax == BASESYNTAX) | ||
10885 | goto endword; /* exit outer loop */ | ||
10886 | USTPUTC(c, out); | ||
10887 | niro | 984 | g_parsefile->linno++; |
10888 | niro | 532 | if (doprompt) |
10889 | setprompt(2); | ||
10890 | c = pgetc(); | ||
10891 | goto loop; /* continue outer loop */ | ||
10892 | case CWORD: | ||
10893 | USTPUTC(c, out); | ||
10894 | break; | ||
10895 | case CCTL: | ||
10896 | if (eofmark == NULL || dblquote) | ||
10897 | USTPUTC(CTLESC, out); | ||
10898 | niro | 816 | #if ENABLE_ASH_BASH_COMPAT |
10899 | if (c == '\\' && bash_dollar_squote) { | ||
10900 | c = decode_dollar_squote(); | ||
10901 | if (c & 0x100) { | ||
10902 | USTPUTC('\\', out); | ||
10903 | c = (unsigned char)c; | ||
10904 | } | ||
10905 | } | ||
10906 | #endif | ||
10907 | niro | 532 | USTPUTC(c, out); |
10908 | break; | ||
10909 | case CBACK: /* backslash */ | ||
10910 | niro | 984 | c = pgetc_without_PEOA(); |
10911 | niro | 532 | if (c == PEOF) { |
10912 | USTPUTC(CTLESC, out); | ||
10913 | USTPUTC('\\', out); | ||
10914 | pungetc(); | ||
10915 | } else if (c == '\n') { | ||
10916 | if (doprompt) | ||
10917 | setprompt(2); | ||
10918 | } else { | ||
10919 | niro | 816 | #if ENABLE_ASH_EXPAND_PRMT |
10920 | if (c == '$' && pssyntax) { | ||
10921 | USTPUTC(CTLESC, out); | ||
10922 | USTPUTC('\\', out); | ||
10923 | } | ||
10924 | #endif | ||
10925 | if (dblquote && c != '\\' | ||
10926 | && c != '`' && c != '$' | ||
10927 | && (c != '"' || eofmark != NULL) | ||
10928 | niro | 532 | ) { |
10929 | USTPUTC(CTLESC, out); | ||
10930 | USTPUTC('\\', out); | ||
10931 | } | ||
10932 | if (SIT(c, SQSYNTAX) == CCTL) | ||
10933 | USTPUTC(CTLESC, out); | ||
10934 | USTPUTC(c, out); | ||
10935 | niro | 816 | quotef = 1; |
10936 | niro | 532 | } |
10937 | break; | ||
10938 | case CSQUOTE: | ||
10939 | syntax = SQSYNTAX; | ||
10940 | niro | 816 | quotemark: |
10941 | niro | 532 | if (eofmark == NULL) { |
10942 | USTPUTC(CTLQUOTEMARK, out); | ||
10943 | } | ||
10944 | break; | ||
10945 | case CDQUOTE: | ||
10946 | syntax = DQSYNTAX; | ||
10947 | dblquote = 1; | ||
10948 | goto quotemark; | ||
10949 | case CENDQUOTE: | ||
10950 | niro | 984 | IF_ASH_BASH_COMPAT(bash_dollar_squote = 0;) |
10951 | niro | 816 | if (eofmark != NULL && arinest == 0 |
10952 | && varnest == 0 | ||
10953 | ) { | ||
10954 | niro | 532 | USTPUTC(c, out); |
10955 | } else { | ||
10956 | if (dqvarnest == 0) { | ||
10957 | syntax = BASESYNTAX; | ||
10958 | dblquote = 0; | ||
10959 | } | ||
10960 | niro | 816 | quotef = 1; |
10961 | niro | 532 | goto quotemark; |
10962 | } | ||
10963 | break; | ||
10964 | case CVAR: /* '$' */ | ||
10965 | PARSESUB(); /* parse substitution */ | ||
10966 | break; | ||
10967 | case CENDVAR: /* '}' */ | ||
10968 | if (varnest > 0) { | ||
10969 | varnest--; | ||
10970 | if (dqvarnest > 0) { | ||
10971 | dqvarnest--; | ||
10972 | } | ||
10973 | USTPUTC(CTLENDVAR, out); | ||
10974 | } else { | ||
10975 | USTPUTC(c, out); | ||
10976 | } | ||
10977 | break; | ||
10978 | niro | 984 | #if ENABLE_SH_MATH_SUPPORT |
10979 | niro | 532 | case CLP: /* '(' in arithmetic */ |
10980 | parenlevel++; | ||
10981 | USTPUTC(c, out); | ||
10982 | break; | ||
10983 | case CRP: /* ')' in arithmetic */ | ||
10984 | if (parenlevel > 0) { | ||
10985 | USTPUTC(c, out); | ||
10986 | --parenlevel; | ||
10987 | } else { | ||
10988 | if (pgetc() == ')') { | ||
10989 | if (--arinest == 0) { | ||
10990 | USTPUTC(CTLENDARI, out); | ||
10991 | syntax = prevsyntax; | ||
10992 | niro | 816 | dblquote = (syntax == DQSYNTAX); |
10993 | niro | 532 | } else |
10994 | USTPUTC(')', out); | ||
10995 | } else { | ||
10996 | /* | ||
10997 | * unbalanced parens | ||
10998 | * (don't 2nd guess - no error) | ||
10999 | */ | ||
11000 | pungetc(); | ||
11001 | USTPUTC(')', out); | ||
11002 | } | ||
11003 | } | ||
11004 | break; | ||
11005 | #endif | ||
11006 | case CBQUOTE: /* '`' */ | ||
11007 | PARSEBACKQOLD(); | ||
11008 | break; | ||
11009 | case CENDFILE: | ||
11010 | goto endword; /* exit outer loop */ | ||
11011 | case CIGN: | ||
11012 | break; | ||
11013 | default: | ||
11014 | niro | 816 | if (varnest == 0) { |
11015 | #if ENABLE_ASH_BASH_COMPAT | ||
11016 | if (c == '&') { | ||
11017 | if (pgetc() == '>') | ||
11018 | c = 0x100 + '>'; /* flag &> */ | ||
11019 | pungetc(); | ||
11020 | } | ||
11021 | #endif | ||
11022 | niro | 532 | goto endword; /* exit outer loop */ |
11023 | niro | 816 | } |
11024 | niro | 984 | IF_ASH_ALIAS(if (c != PEOA)) |
11025 | niro | 532 | USTPUTC(c, out); |
11026 | |||
11027 | } | ||
11028 | niro | 816 | c = pgetc_fast(); |
11029 | } /* for (;;) */ | ||
11030 | niro | 532 | } |
11031 | niro | 816 | endword: |
11032 | niro | 984 | #if ENABLE_SH_MATH_SUPPORT |
11033 | niro | 532 | if (syntax == ARISYNTAX) |
11034 | niro | 816 | raise_error_syntax("missing '))'"); |
11035 | niro | 532 | #endif |
11036 | niro | 816 | if (syntax != BASESYNTAX && !parsebackquote && eofmark == NULL) |
11037 | raise_error_syntax("unterminated quoted string"); | ||
11038 | niro | 532 | if (varnest != 0) { |
11039 | niro | 984 | startlinno = g_parsefile->linno; |
11040 | niro | 532 | /* { */ |
11041 | niro | 816 | raise_error_syntax("missing '}'"); |
11042 | niro | 532 | } |
11043 | USTPUTC('\0', out); | ||
11044 | len = out - (char *)stackblock(); | ||
11045 | out = stackblock(); | ||
11046 | if (eofmark == NULL) { | ||
11047 | niro | 984 | if ((c == '>' || c == '<' IF_ASH_BASH_COMPAT( || c == 0x100 + '>')) |
11048 | niro | 532 | && quotef == 0 |
11049 | niro | 816 | ) { |
11050 | if (isdigit_str9(out)) { | ||
11051 | PARSEREDIR(); /* passed as params: out, c */ | ||
11052 | lasttoken = TREDIR; | ||
11053 | return lasttoken; | ||
11054 | } | ||
11055 | /* else: non-number X seen, interpret it | ||
11056 | * as "NNNX>file" = "NNNX >file" */ | ||
11057 | niro | 532 | } |
11058 | niro | 816 | pungetc(); |
11059 | niro | 532 | } |
11060 | quoteflag = quotef; | ||
11061 | backquotelist = bqlist; | ||
11062 | grabstackblock(len); | ||
11063 | wordtext = out; | ||
11064 | niro | 816 | lasttoken = TWORD; |
11065 | return lasttoken; | ||
11066 | niro | 532 | /* end of readtoken routine */ |
11067 | |||
11068 | /* | ||
11069 | * Check to see whether we are at the end of the here document. When this | ||
11070 | * is called, c is set to the first character of the next input line. If | ||
11071 | * we are at the end of the here document, this routine sets the c to PEOF. | ||
11072 | */ | ||
11073 | checkend: { | ||
11074 | if (eofmark) { | ||
11075 | niro | 816 | #if ENABLE_ASH_ALIAS |
11076 | niro | 984 | if (c == PEOA) |
11077 | c = pgetc_without_PEOA(); | ||
11078 | niro | 532 | #endif |
11079 | if (striptabs) { | ||
11080 | while (c == '\t') { | ||
11081 | niro | 984 | c = pgetc_without_PEOA(); |
11082 | niro | 532 | } |
11083 | } | ||
11084 | if (c == *eofmark) { | ||
11085 | niro | 816 | if (pfgets(line, sizeof(line)) != NULL) { |
11086 | niro | 532 | char *p, *q; |
11087 | |||
11088 | p = line; | ||
11089 | niro | 816 | for (q = eofmark + 1; *q && *p == *q; p++, q++) |
11090 | continue; | ||
11091 | niro | 532 | if (*p == '\n' && *q == '\0') { |
11092 | c = PEOF; | ||
11093 | niro | 984 | g_parsefile->linno++; |
11094 | niro | 532 | needprompt = doprompt; |
11095 | } else { | ||
11096 | pushstring(line, NULL); | ||
11097 | } | ||
11098 | } | ||
11099 | } | ||
11100 | } | ||
11101 | goto checkend_return; | ||
11102 | } | ||
11103 | |||
11104 | /* | ||
11105 | * Parse a redirection operator. The variable "out" points to a string | ||
11106 | * specifying the fd to be redirected. The variable "c" contains the | ||
11107 | * first character of the redirection operator. | ||
11108 | */ | ||
11109 | parseredir: { | ||
11110 | niro | 816 | /* out is already checked to be a valid number or "" */ |
11111 | int fd = (*out == '\0' ? -1 : atoi(out)); | ||
11112 | niro | 532 | union node *np; |
11113 | |||
11114 | niro | 816 | np = stzalloc(sizeof(struct nfile)); |
11115 | niro | 532 | if (c == '>') { |
11116 | np->nfile.fd = 1; | ||
11117 | c = pgetc(); | ||
11118 | if (c == '>') | ||
11119 | np->type = NAPPEND; | ||
11120 | else if (c == '|') | ||
11121 | np->type = NCLOBBER; | ||
11122 | else if (c == '&') | ||
11123 | np->type = NTOFD; | ||
11124 | niro | 816 | /* it also can be NTO2 (>&file), but we can't figure it out yet */ |
11125 | niro | 532 | else { |
11126 | np->type = NTO; | ||
11127 | pungetc(); | ||
11128 | } | ||
11129 | niro | 816 | } |
11130 | #if ENABLE_ASH_BASH_COMPAT | ||
11131 | else if (c == 0x100 + '>') { /* this flags &> redirection */ | ||
11132 | np->nfile.fd = 1; | ||
11133 | pgetc(); /* this is '>', no need to check */ | ||
11134 | np->type = NTO2; | ||
11135 | } | ||
11136 | #endif | ||
11137 | else { /* c == '<' */ | ||
11138 | /*np->nfile.fd = 0; - stzalloc did it */ | ||
11139 | c = pgetc(); | ||
11140 | switch (c) { | ||
11141 | niro | 532 | case '<': |
11142 | niro | 816 | if (sizeof(struct nfile) != sizeof(struct nhere)) { |
11143 | np = stzalloc(sizeof(struct nhere)); | ||
11144 | /*np->nfile.fd = 0; - stzalloc did it */ | ||
11145 | niro | 532 | } |
11146 | np->type = NHERE; | ||
11147 | niro | 816 | heredoc = stzalloc(sizeof(struct heredoc)); |
11148 | niro | 532 | heredoc->here = np; |
11149 | niro | 816 | c = pgetc(); |
11150 | if (c == '-') { | ||
11151 | niro | 532 | heredoc->striptabs = 1; |
11152 | } else { | ||
11153 | niro | 816 | /*heredoc->striptabs = 0; - stzalloc did it */ |
11154 | niro | 532 | pungetc(); |
11155 | } | ||
11156 | break; | ||
11157 | |||
11158 | case '&': | ||
11159 | np->type = NFROMFD; | ||
11160 | break; | ||
11161 | |||
11162 | case '>': | ||
11163 | np->type = NFROMTO; | ||
11164 | break; | ||
11165 | |||
11166 | default: | ||
11167 | np->type = NFROM; | ||
11168 | pungetc(); | ||
11169 | break; | ||
11170 | } | ||
11171 | } | ||
11172 | niro | 816 | if (fd >= 0) |
11173 | np->nfile.fd = fd; | ||
11174 | niro | 532 | redirnode = np; |
11175 | goto parseredir_return; | ||
11176 | } | ||
11177 | |||
11178 | /* | ||
11179 | * Parse a substitution. At this point, we have read the dollar sign | ||
11180 | * and nothing else. | ||
11181 | */ | ||
11182 | |||
11183 | niro | 816 | /* is_special(c) evaluates to 1 for c in "!#$*-0123456789?@"; 0 otherwise |
11184 | * (assuming ascii char codes, as the original implementation did) */ | ||
11185 | #define is_special(c) \ | ||
11186 | (((unsigned)(c) - 33 < 32) \ | ||
11187 | && ((0xc1ff920dU >> ((unsigned)(c) - 33)) & 1)) | ||
11188 | niro | 532 | parsesub: { |
11189 | niro | 984 | unsigned char subtype; |
11190 | niro | 532 | int typeloc; |
11191 | int flags; | ||
11192 | char *p; | ||
11193 | niro | 816 | static const char types[] ALIGN1 = "}-+?="; |
11194 | niro | 532 | |
11195 | c = pgetc(); | ||
11196 | niro | 984 | if (c > 255 /* PEOA or PEOF */ |
11197 | niro | 816 | || (c != '(' && c != '{' && !is_name(c) && !is_special(c)) |
11198 | niro | 532 | ) { |
11199 | niro | 816 | #if ENABLE_ASH_BASH_COMPAT |
11200 | if (c == '\'') | ||
11201 | bash_dollar_squote = 1; | ||
11202 | else | ||
11203 | #endif | ||
11204 | USTPUTC('$', out); | ||
11205 | niro | 532 | pungetc(); |
11206 | } else if (c == '(') { /* $(command) or $((arith)) */ | ||
11207 | if (pgetc() == '(') { | ||
11208 | niro | 984 | #if ENABLE_SH_MATH_SUPPORT |
11209 | niro | 532 | PARSEARITH(); |
11210 | #else | ||
11211 | niro | 816 | raise_error_syntax("you disabled math support for $((arith)) syntax"); |
11212 | niro | 532 | #endif |
11213 | } else { | ||
11214 | pungetc(); | ||
11215 | PARSEBACKQNEW(); | ||
11216 | } | ||
11217 | } else { | ||
11218 | USTPUTC(CTLVAR, out); | ||
11219 | typeloc = out - (char *)stackblock(); | ||
11220 | USTPUTC(VSNORMAL, out); | ||
11221 | subtype = VSNORMAL; | ||
11222 | if (c == '{') { | ||
11223 | c = pgetc(); | ||
11224 | if (c == '#') { | ||
11225 | niro | 816 | c = pgetc(); |
11226 | if (c == '}') | ||
11227 | niro | 532 | c = '#'; |
11228 | else | ||
11229 | subtype = VSLENGTH; | ||
11230 | niro | 816 | } else |
11231 | niro | 532 | subtype = 0; |
11232 | } | ||
11233 | niro | 984 | if (c <= 255 /* not PEOA or PEOF */ && is_name(c)) { |
11234 | niro | 532 | do { |
11235 | STPUTC(c, out); | ||
11236 | c = pgetc(); | ||
11237 | niro | 984 | } while (c <= 255 /* not PEOA or PEOF */ && is_in_name(c)); |
11238 | niro | 816 | } else if (isdigit(c)) { |
11239 | niro | 532 | do { |
11240 | STPUTC(c, out); | ||
11241 | c = pgetc(); | ||
11242 | niro | 816 | } while (isdigit(c)); |
11243 | } else if (is_special(c)) { | ||
11244 | niro | 532 | USTPUTC(c, out); |
11245 | c = pgetc(); | ||
11246 | niro | 816 | } else { |
11247 | badsub: | ||
11248 | raise_error_syntax("bad substitution"); | ||
11249 | niro | 532 | } |
11250 | niro | 984 | if (c != '}' && subtype == VSLENGTH) |
11251 | goto badsub; | ||
11252 | niro | 532 | |
11253 | STPUTC('=', out); | ||
11254 | flags = 0; | ||
11255 | if (subtype == 0) { | ||
11256 | switch (c) { | ||
11257 | case ':': | ||
11258 | niro | 816 | c = pgetc(); |
11259 | #if ENABLE_ASH_BASH_COMPAT | ||
11260 | if (c == ':' || c == '$' || isdigit(c)) { | ||
11261 | pungetc(); | ||
11262 | subtype = VSSUBSTR; | ||
11263 | break; | ||
11264 | } | ||
11265 | #endif | ||
11266 | niro | 532 | flags = VSNUL; |
11267 | /*FALLTHROUGH*/ | ||
11268 | default: | ||
11269 | p = strchr(types, c); | ||
11270 | if (p == NULL) | ||
11271 | goto badsub; | ||
11272 | subtype = p - types + VSNORMAL; | ||
11273 | break; | ||
11274 | case '%': | ||
11275 | niro | 816 | case '#': { |
11276 | int cc = c; | ||
11277 | subtype = c == '#' ? VSTRIMLEFT : VSTRIMRIGHT; | ||
11278 | c = pgetc(); | ||
11279 | if (c == cc) | ||
11280 | subtype++; | ||
11281 | else | ||
11282 | pungetc(); | ||
11283 | break; | ||
11284 | niro | 532 | } |
11285 | niro | 816 | #if ENABLE_ASH_BASH_COMPAT |
11286 | case '/': | ||
11287 | subtype = VSREPLACE; | ||
11288 | c = pgetc(); | ||
11289 | if (c == '/') | ||
11290 | subtype++; /* VSREPLACEALL */ | ||
11291 | else | ||
11292 | pungetc(); | ||
11293 | break; | ||
11294 | #endif | ||
11295 | } | ||
11296 | niro | 532 | } else { |
11297 | pungetc(); | ||
11298 | } | ||
11299 | if (dblquote || arinest) | ||
11300 | flags |= VSQUOTE; | ||
11301 | niro | 984 | ((unsigned char *)stackblock())[typeloc] = subtype | flags; |
11302 | niro | 532 | if (subtype != VSNORMAL) { |
11303 | varnest++; | ||
11304 | if (dblquote || arinest) { | ||
11305 | dqvarnest++; | ||
11306 | } | ||
11307 | } | ||
11308 | } | ||
11309 | goto parsesub_return; | ||
11310 | } | ||
11311 | |||
11312 | /* | ||
11313 | * Called to parse command substitutions. Newstyle is set if the command | ||
11314 | * is enclosed inside $(...); nlpp is a pointer to the head of the linked | ||
11315 | * list of commands (passed by reference), and savelen is the number of | ||
11316 | * characters on the top of the stack which must be preserved. | ||
11317 | */ | ||
11318 | parsebackq: { | ||
11319 | struct nodelist **nlpp; | ||
11320 | niro | 816 | smallint savepbq; |
11321 | niro | 532 | union node *n; |
11322 | char *volatile str; | ||
11323 | struct jmploc jmploc; | ||
11324 | struct jmploc *volatile savehandler; | ||
11325 | size_t savelen; | ||
11326 | niro | 816 | smallint saveprompt = 0; |
11327 | |||
11328 | niro | 532 | #ifdef __GNUC__ |
11329 | (void) &saveprompt; | ||
11330 | #endif | ||
11331 | savepbq = parsebackquote; | ||
11332 | if (setjmp(jmploc.loc)) { | ||
11333 | niro | 816 | free(str); |
11334 | niro | 532 | parsebackquote = 0; |
11335 | niro | 816 | exception_handler = savehandler; |
11336 | longjmp(exception_handler->loc, 1); | ||
11337 | niro | 532 | } |
11338 | niro | 816 | INT_OFF; |
11339 | niro | 532 | str = NULL; |
11340 | savelen = out - (char *)stackblock(); | ||
11341 | if (savelen > 0) { | ||
11342 | str = ckmalloc(savelen); | ||
11343 | memcpy(str, stackblock(), savelen); | ||
11344 | } | ||
11345 | niro | 816 | savehandler = exception_handler; |
11346 | exception_handler = &jmploc; | ||
11347 | INT_ON; | ||
11348 | niro | 532 | if (oldstyle) { |
11349 | /* We must read until the closing backquote, giving special | ||
11350 | treatment to some slashes, and then push the string and | ||
11351 | reread it as input, interpreting it normally. */ | ||
11352 | char *pout; | ||
11353 | int pc; | ||
11354 | size_t psavelen; | ||
11355 | char *pstr; | ||
11356 | |||
11357 | |||
11358 | STARTSTACKSTR(pout); | ||
11359 | for (;;) { | ||
11360 | if (needprompt) { | ||
11361 | setprompt(2); | ||
11362 | } | ||
11363 | niro | 816 | pc = pgetc(); |
11364 | switch (pc) { | ||
11365 | niro | 532 | case '`': |
11366 | goto done; | ||
11367 | |||
11368 | case '\\': | ||
11369 | niro | 816 | pc = pgetc(); |
11370 | if (pc == '\n') { | ||
11371 | niro | 984 | g_parsefile->linno++; |
11372 | niro | 532 | if (doprompt) |
11373 | setprompt(2); | ||
11374 | /* | ||
11375 | * If eating a newline, avoid putting | ||
11376 | * the newline into the new character | ||
11377 | * stream (via the STPUTC after the | ||
11378 | * switch). | ||
11379 | */ | ||
11380 | continue; | ||
11381 | } | ||
11382 | if (pc != '\\' && pc != '`' && pc != '$' | ||
11383 | niro | 984 | && (!dblquote || pc != '"') |
11384 | ) { | ||
11385 | niro | 532 | STPUTC('\\', pout); |
11386 | niro | 984 | } |
11387 | if (pc <= 255 /* not PEOA or PEOF */) { | ||
11388 | niro | 532 | break; |
11389 | } | ||
11390 | /* fall through */ | ||
11391 | |||
11392 | case PEOF: | ||
11393 | niro | 984 | IF_ASH_ALIAS(case PEOA:) |
11394 | startlinno = g_parsefile->linno; | ||
11395 | niro | 816 | raise_error_syntax("EOF in backquote substitution"); |
11396 | niro | 532 | |
11397 | case '\n': | ||
11398 | niro | 984 | g_parsefile->linno++; |
11399 | niro | 532 | needprompt = doprompt; |
11400 | break; | ||
11401 | |||
11402 | default: | ||
11403 | break; | ||
11404 | } | ||
11405 | STPUTC(pc, pout); | ||
11406 | } | ||
11407 | niro | 816 | done: |
11408 | niro | 532 | STPUTC('\0', pout); |
11409 | psavelen = pout - (char *)stackblock(); | ||
11410 | if (psavelen > 0) { | ||
11411 | pstr = grabstackstr(pout); | ||
11412 | setinputstring(pstr); | ||
11413 | } | ||
11414 | } | ||
11415 | nlpp = &bqlist; | ||
11416 | while (*nlpp) | ||
11417 | nlpp = &(*nlpp)->next; | ||
11418 | niro | 816 | *nlpp = stzalloc(sizeof(**nlpp)); |
11419 | /* (*nlpp)->next = NULL; - stzalloc did it */ | ||
11420 | niro | 532 | parsebackquote = oldstyle; |
11421 | |||
11422 | if (oldstyle) { | ||
11423 | saveprompt = doprompt; | ||
11424 | doprompt = 0; | ||
11425 | } | ||
11426 | |||
11427 | n = list(2); | ||
11428 | |||
11429 | if (oldstyle) | ||
11430 | doprompt = saveprompt; | ||
11431 | niro | 816 | else if (readtoken() != TRP) |
11432 | raise_error_unexpected_syntax(TRP); | ||
11433 | niro | 532 | |
11434 | (*nlpp)->n = n; | ||
11435 | if (oldstyle) { | ||
11436 | /* | ||
11437 | * Start reading from old file again, ignoring any pushed back | ||
11438 | * tokens left from the backquote parsing | ||
11439 | */ | ||
11440 | popfile(); | ||
11441 | tokpushback = 0; | ||
11442 | } | ||
11443 | while (stackblocksize() <= savelen) | ||
11444 | growstackblock(); | ||
11445 | STARTSTACKSTR(out); | ||
11446 | if (str) { | ||
11447 | memcpy(out, str, savelen); | ||
11448 | STADJUST(savelen, out); | ||
11449 | niro | 816 | INT_OFF; |
11450 | free(str); | ||
11451 | niro | 532 | str = NULL; |
11452 | niro | 816 | INT_ON; |
11453 | niro | 532 | } |
11454 | parsebackquote = savepbq; | ||
11455 | niro | 816 | exception_handler = savehandler; |
11456 | niro | 532 | if (arinest || dblquote) |
11457 | USTPUTC(CTLBACKQ | CTLQUOTE, out); | ||
11458 | else | ||
11459 | USTPUTC(CTLBACKQ, out); | ||
11460 | if (oldstyle) | ||
11461 | goto parsebackq_oldreturn; | ||
11462 | niro | 816 | goto parsebackq_newreturn; |
11463 | niro | 532 | } |
11464 | |||
11465 | niro | 984 | #if ENABLE_SH_MATH_SUPPORT |
11466 | niro | 532 | /* |
11467 | * Parse an arithmetic expansion (indicate start of one and set state) | ||
11468 | */ | ||
11469 | parsearith: { | ||
11470 | if (++arinest == 1) { | ||
11471 | prevsyntax = syntax; | ||
11472 | syntax = ARISYNTAX; | ||
11473 | USTPUTC(CTLARI, out); | ||
11474 | if (dblquote) | ||
11475 | niro | 816 | USTPUTC('"', out); |
11476 | niro | 532 | else |
11477 | niro | 816 | USTPUTC(' ', out); |
11478 | niro | 532 | } else { |
11479 | /* | ||
11480 | * we collapse embedded arithmetic expansion to | ||
11481 | * parenthesis, which should be equivalent | ||
11482 | */ | ||
11483 | USTPUTC('(', out); | ||
11484 | } | ||
11485 | goto parsearith_return; | ||
11486 | } | ||
11487 | #endif | ||
11488 | |||
11489 | } /* end of readtoken */ | ||
11490 | |||
11491 | /* | ||
11492 | niro | 816 | * Read the next input token. |
11493 | * If the token is a word, we set backquotelist to the list of cmds in | ||
11494 | * backquotes. We set quoteflag to true if any part of the word was | ||
11495 | * quoted. | ||
11496 | * If the token is TREDIR, then we set redirnode to a structure containing | ||
11497 | * the redirection. | ||
11498 | * In all cases, the variable startlinno is set to the number of the line | ||
11499 | * on which the token starts. | ||
11500 | * | ||
11501 | * [Change comment: here documents and internal procedures] | ||
11502 | * [Readtoken shouldn't have any arguments. Perhaps we should make the | ||
11503 | * word parsing code into a separate routine. In this case, readtoken | ||
11504 | * doesn't need to have any internal procedures, but parseword does. | ||
11505 | * We could also make parseoperator in essence the main routine, and | ||
11506 | * have parseword (readtoken1?) handle both words and redirection.] | ||
11507 | niro | 532 | */ |
11508 | niro | 816 | #define NEW_xxreadtoken |
11509 | #ifdef NEW_xxreadtoken | ||
11510 | /* singles must be first! */ | ||
11511 | static const char xxreadtoken_chars[7] ALIGN1 = { | ||
11512 | '\n', '(', ')', /* singles */ | ||
11513 | '&', '|', ';', /* doubles */ | ||
11514 | 0 | ||
11515 | }; | ||
11516 | niro | 532 | |
11517 | niro | 816 | #define xxreadtoken_singles 3 |
11518 | #define xxreadtoken_doubles 3 | ||
11519 | niro | 532 | |
11520 | niro | 816 | static const char xxreadtoken_tokens[] ALIGN1 = { |
11521 | TNL, TLP, TRP, /* only single occurrence allowed */ | ||
11522 | TBACKGND, TPIPE, TSEMI, /* if single occurrence */ | ||
11523 | TEOF, /* corresponds to trailing nul */ | ||
11524 | TAND, TOR, TENDCASE /* if double occurrence */ | ||
11525 | }; | ||
11526 | niro | 532 | |
11527 | niro | 816 | static int |
11528 | xxreadtoken(void) | ||
11529 | niro | 532 | { |
11530 | niro | 816 | int c; |
11531 | niro | 532 | |
11532 | niro | 816 | if (tokpushback) { |
11533 | tokpushback = 0; | ||
11534 | return lasttoken; | ||
11535 | niro | 532 | } |
11536 | niro | 816 | if (needprompt) { |
11537 | setprompt(2); | ||
11538 | } | ||
11539 | niro | 984 | startlinno = g_parsefile->linno; |
11540 | niro | 816 | for (;;) { /* until token or start of word found */ |
11541 | c = pgetc_fast(); | ||
11542 | niro | 984 | if (c == ' ' || c == '\t' IF_ASH_ALIAS( || c == PEOA)) |
11543 | niro | 816 | continue; |
11544 | niro | 532 | |
11545 | niro | 816 | if (c == '#') { |
11546 | while ((c = pgetc()) != '\n' && c != PEOF) | ||
11547 | continue; | ||
11548 | pungetc(); | ||
11549 | } else if (c == '\\') { | ||
11550 | if (pgetc() != '\n') { | ||
11551 | pungetc(); | ||
11552 | break; /* return readtoken1(...) */ | ||
11553 | } | ||
11554 | niro | 984 | startlinno = ++g_parsefile->linno; |
11555 | niro | 816 | if (doprompt) |
11556 | setprompt(2); | ||
11557 | } else { | ||
11558 | const char *p; | ||
11559 | niro | 532 | |
11560 | niro | 816 | p = xxreadtoken_chars + sizeof(xxreadtoken_chars) - 1; |
11561 | if (c != PEOF) { | ||
11562 | if (c == '\n') { | ||
11563 | niro | 984 | g_parsefile->linno++; |
11564 | niro | 816 | needprompt = doprompt; |
11565 | } | ||
11566 | niro | 532 | |
11567 | niro | 816 | p = strchr(xxreadtoken_chars, c); |
11568 | if (p == NULL) | ||
11569 | break; /* return readtoken1(...) */ | ||
11570 | niro | 532 | |
11571 | niro | 816 | if ((int)(p - xxreadtoken_chars) >= xxreadtoken_singles) { |
11572 | int cc = pgetc(); | ||
11573 | if (cc == c) { /* double occurrence? */ | ||
11574 | p += xxreadtoken_doubles + 1; | ||
11575 | } else { | ||
11576 | pungetc(); | ||
11577 | #if ENABLE_ASH_BASH_COMPAT | ||
11578 | if (c == '&' && cc == '>') /* &> */ | ||
11579 | break; /* return readtoken1(...) */ | ||
11580 | #endif | ||
11581 | } | ||
11582 | } | ||
11583 | } | ||
11584 | lasttoken = xxreadtoken_tokens[p - xxreadtoken_chars]; | ||
11585 | return lasttoken; | ||
11586 | } | ||
11587 | } /* for (;;) */ | ||
11588 | niro | 532 | |
11589 | niro | 816 | return readtoken1(c, BASESYNTAX, (char *) NULL, 0); |
11590 | niro | 532 | } |
11591 | niro | 816 | #else /* old xxreadtoken */ |
11592 | #define RETURN(token) return lasttoken = token | ||
11593 | static int | ||
11594 | xxreadtoken(void) | ||
11595 | niro | 532 | { |
11596 | niro | 816 | int c; |
11597 | niro | 532 | |
11598 | niro | 816 | if (tokpushback) { |
11599 | tokpushback = 0; | ||
11600 | return lasttoken; | ||
11601 | } | ||
11602 | if (needprompt) { | ||
11603 | setprompt(2); | ||
11604 | } | ||
11605 | niro | 984 | startlinno = g_parsefile->linno; |
11606 | niro | 816 | for (;;) { /* until token or start of word found */ |
11607 | c = pgetc_fast(); | ||
11608 | switch (c) { | ||
11609 | case ' ': case '\t': | ||
11610 | niro | 984 | IF_ASH_ALIAS(case PEOA:) |
11611 | niro | 816 | continue; |
11612 | case '#': | ||
11613 | while ((c = pgetc()) != '\n' && c != PEOF) | ||
11614 | continue; | ||
11615 | pungetc(); | ||
11616 | continue; | ||
11617 | case '\\': | ||
11618 | if (pgetc() == '\n') { | ||
11619 | niro | 984 | startlinno = ++g_parsefile->linno; |
11620 | niro | 816 | if (doprompt) |
11621 | setprompt(2); | ||
11622 | continue; | ||
11623 | } | ||
11624 | pungetc(); | ||
11625 | goto breakloop; | ||
11626 | case '\n': | ||
11627 | niro | 984 | g_parsefile->linno++; |
11628 | niro | 816 | needprompt = doprompt; |
11629 | RETURN(TNL); | ||
11630 | case PEOF: | ||
11631 | RETURN(TEOF); | ||
11632 | case '&': | ||
11633 | if (pgetc() == '&') | ||
11634 | RETURN(TAND); | ||
11635 | pungetc(); | ||
11636 | RETURN(TBACKGND); | ||
11637 | case '|': | ||
11638 | if (pgetc() == '|') | ||
11639 | RETURN(TOR); | ||
11640 | pungetc(); | ||
11641 | RETURN(TPIPE); | ||
11642 | case ';': | ||
11643 | if (pgetc() == ';') | ||
11644 | RETURN(TENDCASE); | ||
11645 | pungetc(); | ||
11646 | RETURN(TSEMI); | ||
11647 | case '(': | ||
11648 | RETURN(TLP); | ||
11649 | case ')': | ||
11650 | RETURN(TRP); | ||
11651 | default: | ||
11652 | goto breakloop; | ||
11653 | } | ||
11654 | niro | 532 | } |
11655 | niro | 816 | breakloop: |
11656 | return readtoken1(c, BASESYNTAX, (char *)NULL, 0); | ||
11657 | #undef RETURN | ||
11658 | niro | 532 | } |
11659 | niro | 816 | #endif /* old xxreadtoken */ |
11660 | niro | 532 | |
11661 | niro | 816 | static int |
11662 | readtoken(void) | ||
11663 | niro | 532 | { |
11664 | niro | 816 | int t; |
11665 | #if DEBUG | ||
11666 | smallint alreadyseen = tokpushback; | ||
11667 | #endif | ||
11668 | niro | 532 | |
11669 | niro | 816 | #if ENABLE_ASH_ALIAS |
11670 | top: | ||
11671 | niro | 532 | #endif |
11672 | |||
11673 | niro | 816 | t = xxreadtoken(); |
11674 | niro | 532 | |
11675 | /* | ||
11676 | niro | 816 | * eat newlines |
11677 | niro | 532 | */ |
11678 | niro | 816 | if (checkkwd & CHKNL) { |
11679 | while (t == TNL) { | ||
11680 | parseheredoc(); | ||
11681 | t = xxreadtoken(); | ||
11682 | } | ||
11683 | niro | 532 | } |
11684 | |||
11685 | niro | 816 | if (t != TWORD || quoteflag) { |
11686 | goto out; | ||
11687 | } | ||
11688 | niro | 532 | |
11689 | /* | ||
11690 | niro | 816 | * check for keywords |
11691 | niro | 532 | */ |
11692 | niro | 816 | if (checkkwd & CHKKWD) { |
11693 | const char *const *pp; | ||
11694 | niro | 532 | |
11695 | niro | 816 | pp = findkwd(wordtext); |
11696 | if (pp) { | ||
11697 | lasttoken = t = pp - tokname_array; | ||
11698 | TRACE(("keyword %s recognized\n", tokname(t))); | ||
11699 | niro | 532 | goto out; |
11700 | } | ||
11701 | } | ||
11702 | niro | 816 | |
11703 | if (checkkwd & CHKALIAS) { | ||
11704 | #if ENABLE_ASH_ALIAS | ||
11705 | struct alias *ap; | ||
11706 | ap = lookupalias(wordtext, 1); | ||
11707 | if (ap != NULL) { | ||
11708 | if (*ap->val) { | ||
11709 | pushstring(ap->val, ap); | ||
11710 | } | ||
11711 | goto top; | ||
11712 | } | ||
11713 | niro | 532 | #endif |
11714 | } | ||
11715 | niro | 816 | out: |
11716 | checkkwd = 0; | ||
11717 | #if DEBUG | ||
11718 | if (!alreadyseen) | ||
11719 | TRACE(("token %s %s\n", tokname(t), t == TWORD ? wordtext : "")); | ||
11720 | else | ||
11721 | TRACE(("reread token %s %s\n", tokname(t), t == TWORD ? wordtext : "")); | ||
11722 | #endif | ||
11723 | return t; | ||
11724 | niro | 532 | } |
11725 | |||
11726 | niro | 816 | static char |
11727 | peektoken(void) | ||
11728 | niro | 532 | { |
11729 | niro | 816 | int t; |
11730 | niro | 532 | |
11731 | niro | 816 | t = readtoken(); |
11732 | tokpushback = 1; | ||
11733 | return tokname_array[t][0]; | ||
11734 | niro | 532 | } |
11735 | |||
11736 | niro | 816 | /* |
11737 | niro | 984 | * Read and parse a command. Returns NODE_EOF on end of file. |
11738 | * (NULL is a valid parse tree indicating a blank line.) | ||
11739 | niro | 816 | */ |
11740 | static union node * | ||
11741 | parsecmd(int interact) | ||
11742 | niro | 532 | { |
11743 | niro | 816 | int t; |
11744 | niro | 532 | |
11745 | niro | 816 | tokpushback = 0; |
11746 | doprompt = interact; | ||
11747 | if (doprompt) | ||
11748 | setprompt(doprompt); | ||
11749 | needprompt = 0; | ||
11750 | t = readtoken(); | ||
11751 | if (t == TEOF) | ||
11752 | niro | 984 | return NODE_EOF; |
11753 | niro | 816 | if (t == TNL) |
11754 | return NULL; | ||
11755 | tokpushback = 1; | ||
11756 | return list(1); | ||
11757 | niro | 532 | } |
11758 | |||
11759 | /* | ||
11760 | niro | 816 | * Input any here documents. |
11761 | niro | 532 | */ |
11762 | static void | ||
11763 | niro | 816 | parseheredoc(void) |
11764 | niro | 532 | { |
11765 | niro | 816 | struct heredoc *here; |
11766 | niro | 532 | union node *n; |
11767 | |||
11768 | niro | 816 | here = heredoclist; |
11769 | heredoclist = NULL; | ||
11770 | niro | 532 | |
11771 | niro | 816 | while (here) { |
11772 | if (needprompt) { | ||
11773 | setprompt(2); | ||
11774 | niro | 532 | } |
11775 | niro | 816 | readtoken1(pgetc(), here->here->type == NHERE? SQSYNTAX : DQSYNTAX, |
11776 | here->eofmark, here->striptabs); | ||
11777 | n = stzalloc(sizeof(struct narg)); | ||
11778 | n->narg.type = NARG; | ||
11779 | /*n->narg.next = NULL; - stzalloc did it */ | ||
11780 | n->narg.text = wordtext; | ||
11781 | n->narg.backquote = backquotelist; | ||
11782 | here->here->nhere.doc = n; | ||
11783 | here = here->next; | ||
11784 | } | ||
11785 | niro | 532 | } |
11786 | |||
11787 | |||
11788 | /* | ||
11789 | niro | 816 | * called by editline -- any expansions to the prompt should be added here. |
11790 | niro | 532 | */ |
11791 | niro | 816 | #if ENABLE_ASH_EXPAND_PRMT |
11792 | static const char * | ||
11793 | expandstr(const char *ps) | ||
11794 | niro | 532 | { |
11795 | niro | 816 | union node n; |
11796 | niro | 532 | |
11797 | niro | 984 | /* XXX Fix (char *) cast. It _is_ a bug. ps is variable's value, |
11798 | * and token processing _can_ alter it (delete NULs etc). */ | ||
11799 | niro | 816 | setinputstring((char *)ps); |
11800 | readtoken1(pgetc(), PSSYNTAX, nullstr, 0); | ||
11801 | popfile(); | ||
11802 | |||
11803 | n.narg.type = NARG; | ||
11804 | n.narg.next = NULL; | ||
11805 | n.narg.text = wordtext; | ||
11806 | n.narg.backquote = backquotelist; | ||
11807 | |||
11808 | expandarg(&n, NULL, 0); | ||
11809 | return stackblock(); | ||
11810 | niro | 532 | } |
11811 | niro | 816 | #endif |
11812 | niro | 532 | |
11813 | /* | ||
11814 | niro | 816 | * Execute a command or commands contained in a string. |
11815 | niro | 532 | */ |
11816 | niro | 816 | static int |
11817 | evalstring(char *s, int mask) | ||
11818 | { | ||
11819 | union node *n; | ||
11820 | struct stackmark smark; | ||
11821 | int skip; | ||
11822 | niro | 532 | |
11823 | niro | 816 | setinputstring(s); |
11824 | setstackmark(&smark); | ||
11825 | niro | 532 | |
11826 | niro | 816 | skip = 0; |
11827 | niro | 984 | while ((n = parsecmd(0)) != NODE_EOF) { |
11828 | niro | 816 | evaltree(n, 0); |
11829 | popstackmark(&smark); | ||
11830 | skip = evalskip; | ||
11831 | if (skip) | ||
11832 | niro | 532 | break; |
11833 | } | ||
11834 | niro | 816 | popfile(); |
11835 | |||
11836 | skip &= mask; | ||
11837 | evalskip = skip; | ||
11838 | return skip; | ||
11839 | niro | 532 | } |
11840 | |||
11841 | /* | ||
11842 | niro | 816 | * The eval command. |
11843 | niro | 532 | */ |
11844 | niro | 984 | static int FAST_FUNC |
11845 | niro | 816 | evalcmd(int argc UNUSED_PARAM, char **argv) |
11846 | niro | 532 | { |
11847 | niro | 816 | char *p; |
11848 | char *concat; | ||
11849 | niro | 532 | |
11850 | niro | 816 | if (argv[1]) { |
11851 | p = argv[1]; | ||
11852 | argv += 2; | ||
11853 | if (argv[0]) { | ||
11854 | STARTSTACKSTR(concat); | ||
11855 | for (;;) { | ||
11856 | concat = stack_putstr(p, concat); | ||
11857 | p = *argv++; | ||
11858 | if (p == NULL) | ||
11859 | break; | ||
11860 | STPUTC(' ', concat); | ||
11861 | } | ||
11862 | STPUTC('\0', concat); | ||
11863 | p = grabstackstr(concat); | ||
11864 | } | ||
11865 | evalstring(p, ~SKIPEVAL); | ||
11866 | niro | 532 | |
11867 | } | ||
11868 | niro | 816 | return exitstatus; |
11869 | niro | 532 | } |
11870 | |||
11871 | niro | 816 | /* |
11872 | niro | 984 | * Read and execute commands. |
11873 | * "Top" is nonzero for the top level command loop; | ||
11874 | * it turns on prompting if the shell is interactive. | ||
11875 | niro | 816 | */ |
11876 | static int | ||
11877 | cmdloop(int top) | ||
11878 | niro | 532 | { |
11879 | niro | 816 | union node *n; |
11880 | struct stackmark smark; | ||
11881 | int inter; | ||
11882 | int numeof = 0; | ||
11883 | niro | 532 | |
11884 | niro | 816 | TRACE(("cmdloop(%d) called\n", top)); |
11885 | for (;;) { | ||
11886 | int skip; | ||
11887 | niro | 532 | |
11888 | niro | 816 | setstackmark(&smark); |
11889 | #if JOBS | ||
11890 | if (doing_jobctl) | ||
11891 | showjobs(stderr, SHOW_CHANGED); | ||
11892 | #endif | ||
11893 | inter = 0; | ||
11894 | if (iflag && top) { | ||
11895 | inter++; | ||
11896 | #if ENABLE_ASH_MAIL | ||
11897 | chkmail(); | ||
11898 | #endif | ||
11899 | } | ||
11900 | n = parsecmd(inter); | ||
11901 | niro | 984 | #if DEBUG |
11902 | if (DEBUG > 2 && debug && (n != NODE_EOF)) | ||
11903 | showtree(n); | ||
11904 | #endif | ||
11905 | if (n == NODE_EOF) { | ||
11906 | niro | 816 | if (!top || numeof >= 50) |
11907 | break; | ||
11908 | if (!stoppedjobs()) { | ||
11909 | if (!Iflag) | ||
11910 | break; | ||
11911 | out2str("\nUse \"exit\" to leave shell.\n"); | ||
11912 | } | ||
11913 | numeof++; | ||
11914 | } else if (nflag == 0) { | ||
11915 | /* job_warning can only be 2,1,0. Here 2->1, 1/0->0 */ | ||
11916 | job_warning >>= 1; | ||
11917 | numeof = 0; | ||
11918 | evaltree(n, 0); | ||
11919 | } | ||
11920 | popstackmark(&smark); | ||
11921 | skip = evalskip; | ||
11922 | niro | 532 | |
11923 | niro | 816 | if (skip) { |
11924 | evalskip = 0; | ||
11925 | return skip & SKIPEVAL; | ||
11926 | niro | 532 | } |
11927 | } | ||
11928 | niro | 816 | return 0; |
11929 | niro | 532 | } |
11930 | |||
11931 | niro | 816 | /* |
11932 | * Take commands from a file. To be compatible we should do a path | ||
11933 | * search for the file, which is necessary to find sub-commands. | ||
11934 | */ | ||
11935 | static char * | ||
11936 | find_dot_file(char *name) | ||
11937 | niro | 532 | { |
11938 | niro | 816 | char *fullname; |
11939 | const char *path = pathval(); | ||
11940 | struct stat statb; | ||
11941 | niro | 532 | |
11942 | niro | 816 | /* don't try this for absolute or relative paths */ |
11943 | if (strchr(name, '/')) | ||
11944 | return name; | ||
11945 | |||
11946 | niro | 984 | /* IIRC standards do not say whether . is to be searched. |
11947 | * And it is even smaller this way, making it unconditional for now: | ||
11948 | */ | ||
11949 | if (1) { /* ENABLE_ASH_BASH_COMPAT */ | ||
11950 | fullname = name; | ||
11951 | goto try_cur_dir; | ||
11952 | } | ||
11953 | |||
11954 | while ((fullname = path_advance(&path, name)) != NULL) { | ||
11955 | try_cur_dir: | ||
11956 | niro | 816 | if ((stat(fullname, &statb) == 0) && S_ISREG(statb.st_mode)) { |
11957 | /* | ||
11958 | * Don't bother freeing here, since it will | ||
11959 | * be freed by the caller. | ||
11960 | */ | ||
11961 | return fullname; | ||
11962 | niro | 532 | } |
11963 | niro | 984 | if (fullname != name) |
11964 | stunalloc(fullname); | ||
11965 | niro | 532 | } |
11966 | niro | 816 | |
11967 | /* not found in the PATH */ | ||
11968 | ash_msg_and_raise_error("%s: not found", name); | ||
11969 | /* NOTREACHED */ | ||
11970 | niro | 532 | } |
11971 | |||
11972 | niro | 984 | static int FAST_FUNC |
11973 | niro | 816 | dotcmd(int argc, char **argv) |
11974 | niro | 532 | { |
11975 | niro | 816 | struct strlist *sp; |
11976 | volatile struct shparam saveparam; | ||
11977 | int status = 0; | ||
11978 | niro | 532 | |
11979 | niro | 816 | for (sp = cmdenviron; sp; sp = sp->next) |
11980 | setvareq(ckstrdup(sp->text), VSTRFIXED | VTEXTFIXED); | ||
11981 | niro | 532 | |
11982 | niro | 816 | if (argv[1]) { /* That's what SVR2 does */ |
11983 | char *fullname = find_dot_file(argv[1]); | ||
11984 | argv += 2; | ||
11985 | argc -= 2; | ||
11986 | if (argc) { /* argc > 0, argv[0] != NULL */ | ||
11987 | saveparam = shellparam; | ||
11988 | shellparam.malloced = 0; | ||
11989 | shellparam.nparam = argc; | ||
11990 | shellparam.p = argv; | ||
11991 | }; | ||
11992 | niro | 532 | |
11993 | niro | 816 | setinputfile(fullname, INPUT_PUSH_FILE); |
11994 | commandname = fullname; | ||
11995 | cmdloop(0); | ||
11996 | popfile(); | ||
11997 | niro | 532 | |
11998 | niro | 816 | if (argc) { |
11999 | freeparam(&shellparam); | ||
12000 | shellparam = saveparam; | ||
12001 | }; | ||
12002 | status = exitstatus; | ||
12003 | niro | 532 | } |
12004 | niro | 816 | return status; |
12005 | niro | 532 | } |
12006 | |||
12007 | niro | 984 | static int FAST_FUNC |
12008 | niro | 816 | exitcmd(int argc UNUSED_PARAM, char **argv) |
12009 | { | ||
12010 | if (stoppedjobs()) | ||
12011 | return 0; | ||
12012 | if (argv[1]) | ||
12013 | exitstatus = number(argv[1]); | ||
12014 | raise_exception(EXEXIT); | ||
12015 | /* NOTREACHED */ | ||
12016 | } | ||
12017 | niro | 532 | |
12018 | niro | 816 | /* |
12019 | * Read a file containing shell functions. | ||
12020 | */ | ||
12021 | niro | 532 | static void |
12022 | niro | 816 | readcmdfile(char *name) |
12023 | niro | 532 | { |
12024 | niro | 816 | setinputfile(name, INPUT_PUSH_FILE); |
12025 | cmdloop(0); | ||
12026 | popfile(); | ||
12027 | niro | 532 | } |
12028 | |||
12029 | |||
12030 | niro | 816 | /* ============ find_command inplementation */ |
12031 | niro | 532 | |
12032 | /* | ||
12033 | niro | 816 | * Resolve a command name. If you change this routine, you may have to |
12034 | * change the shellexec routine as well. | ||
12035 | niro | 532 | */ |
12036 | niro | 816 | static void |
12037 | find_command(char *name, struct cmdentry *entry, int act, const char *path) | ||
12038 | niro | 532 | { |
12039 | niro | 816 | struct tblentry *cmdp; |
12040 | int idx; | ||
12041 | int prev; | ||
12042 | char *fullname; | ||
12043 | struct stat statb; | ||
12044 | int e; | ||
12045 | int updatetbl; | ||
12046 | struct builtincmd *bcmd; | ||
12047 | niro | 532 | |
12048 | niro | 816 | /* If name contains a slash, don't use PATH or hash table */ |
12049 | if (strchr(name, '/') != NULL) { | ||
12050 | entry->u.index = -1; | ||
12051 | if (act & DO_ABS) { | ||
12052 | while (stat(name, &statb) < 0) { | ||
12053 | #ifdef SYSV | ||
12054 | if (errno == EINTR) | ||
12055 | continue; | ||
12056 | #endif | ||
12057 | entry->cmdtype = CMDUNKNOWN; | ||
12058 | return; | ||
12059 | } | ||
12060 | } | ||
12061 | entry->cmdtype = CMDNORMAL; | ||
12062 | niro | 532 | return; |
12063 | niro | 816 | } |
12064 | niro | 532 | |
12065 | niro | 816 | /* #if ENABLE_FEATURE_SH_STANDALONE... moved after builtin check */ |
12066 | niro | 532 | |
12067 | niro | 816 | updatetbl = (path == pathval()); |
12068 | if (!updatetbl) { | ||
12069 | act |= DO_ALTPATH; | ||
12070 | if (strstr(path, "%builtin") != NULL) | ||
12071 | act |= DO_ALTBLTIN; | ||
12072 | } | ||
12073 | niro | 532 | |
12074 | niro | 816 | /* If name is in the table, check answer will be ok */ |
12075 | cmdp = cmdlookup(name, 0); | ||
12076 | if (cmdp != NULL) { | ||
12077 | int bit; | ||
12078 | niro | 532 | |
12079 | niro | 816 | switch (cmdp->cmdtype) { |
12080 | niro | 532 | default: |
12081 | niro | 816 | #if DEBUG |
12082 | abort(); | ||
12083 | #endif | ||
12084 | case CMDNORMAL: | ||
12085 | bit = DO_ALTPATH; | ||
12086 | niro | 532 | break; |
12087 | niro | 816 | case CMDFUNCTION: |
12088 | bit = DO_NOFUNC; | ||
12089 | break; | ||
12090 | case CMDBUILTIN: | ||
12091 | bit = DO_ALTBLTIN; | ||
12092 | break; | ||
12093 | niro | 532 | } |
12094 | niro | 816 | if (act & bit) { |
12095 | updatetbl = 0; | ||
12096 | cmdp = NULL; | ||
12097 | } else if (cmdp->rehash == 0) | ||
12098 | /* if not invalidated by cd, we're done */ | ||
12099 | goto success; | ||
12100 | niro | 532 | } |
12101 | |||
12102 | niro | 816 | /* If %builtin not in path, check for builtin next */ |
12103 | bcmd = find_builtin(name); | ||
12104 | if (bcmd) { | ||
12105 | if (IS_BUILTIN_REGULAR(bcmd)) | ||
12106 | goto builtin_success; | ||
12107 | if (act & DO_ALTPATH) { | ||
12108 | if (!(act & DO_ALTBLTIN)) | ||
12109 | goto builtin_success; | ||
12110 | } else if (builtinloc <= 0) { | ||
12111 | goto builtin_success; | ||
12112 | } | ||
12113 | } | ||
12114 | niro | 532 | |
12115 | niro | 816 | #if ENABLE_FEATURE_SH_STANDALONE |
12116 | { | ||
12117 | int applet_no = find_applet_by_name(name); | ||
12118 | if (applet_no >= 0) { | ||
12119 | entry->cmdtype = CMDNORMAL; | ||
12120 | entry->u.index = -2 - applet_no; | ||
12121 | return; | ||
12122 | } | ||
12123 | niro | 532 | } |
12124 | #endif | ||
12125 | |||
12126 | niro | 816 | /* We have to search path. */ |
12127 | prev = -1; /* where to start */ | ||
12128 | if (cmdp && cmdp->rehash) { /* doing a rehash */ | ||
12129 | if (cmdp->cmdtype == CMDBUILTIN) | ||
12130 | prev = builtinloc; | ||
12131 | else | ||
12132 | prev = cmdp->param.index; | ||
12133 | niro | 532 | } |
12134 | niro | 816 | |
12135 | e = ENOENT; | ||
12136 | idx = -1; | ||
12137 | loop: | ||
12138 | niro | 984 | while ((fullname = path_advance(&path, name)) != NULL) { |
12139 | niro | 816 | stunalloc(fullname); |
12140 | /* NB: code below will still use fullname | ||
12141 | * despite it being "unallocated" */ | ||
12142 | idx++; | ||
12143 | if (pathopt) { | ||
12144 | if (prefix(pathopt, "builtin")) { | ||
12145 | if (bcmd) | ||
12146 | goto builtin_success; | ||
12147 | continue; | ||
12148 | } | ||
12149 | if ((act & DO_NOFUNC) | ||
12150 | || !prefix(pathopt, "func") | ||
12151 | ) { /* ignore unimplemented options */ | ||
12152 | continue; | ||
12153 | } | ||
12154 | niro | 532 | } |
12155 | niro | 816 | /* if rehash, don't redo absolute path names */ |
12156 | if (fullname[0] == '/' && idx <= prev) { | ||
12157 | if (idx < prev) | ||
12158 | continue; | ||
12159 | TRACE(("searchexec \"%s\": no change\n", name)); | ||
12160 | goto success; | ||
12161 | } | ||
12162 | while (stat(fullname, &statb) < 0) { | ||
12163 | #ifdef SYSV | ||
12164 | if (errno == EINTR) | ||
12165 | continue; | ||
12166 | #endif | ||
12167 | if (errno != ENOENT && errno != ENOTDIR) | ||
12168 | e = errno; | ||
12169 | goto loop; | ||
12170 | } | ||
12171 | e = EACCES; /* if we fail, this will be the error */ | ||
12172 | if (!S_ISREG(statb.st_mode)) | ||
12173 | continue; | ||
12174 | if (pathopt) { /* this is a %func directory */ | ||
12175 | stalloc(strlen(fullname) + 1); | ||
12176 | /* NB: stalloc will return space pointed by fullname | ||
12177 | * (because we don't have any intervening allocations | ||
12178 | * between stunalloc above and this stalloc) */ | ||
12179 | readcmdfile(fullname); | ||
12180 | cmdp = cmdlookup(name, 0); | ||
12181 | if (cmdp == NULL || cmdp->cmdtype != CMDFUNCTION) | ||
12182 | ash_msg_and_raise_error("%s not defined in %s", name, fullname); | ||
12183 | stunalloc(fullname); | ||
12184 | goto success; | ||
12185 | } | ||
12186 | TRACE(("searchexec \"%s\" returns \"%s\"\n", name, fullname)); | ||
12187 | if (!updatetbl) { | ||
12188 | entry->cmdtype = CMDNORMAL; | ||
12189 | entry->u.index = idx; | ||
12190 | niro | 532 | return; |
12191 | } | ||
12192 | niro | 816 | INT_OFF; |
12193 | cmdp = cmdlookup(name, 1); | ||
12194 | cmdp->cmdtype = CMDNORMAL; | ||
12195 | cmdp->param.index = idx; | ||
12196 | INT_ON; | ||
12197 | goto success; | ||
12198 | niro | 532 | } |
12199 | |||
12200 | niro | 816 | /* We failed. If there was an entry for this command, delete it */ |
12201 | if (cmdp && updatetbl) | ||
12202 | delete_cmd_entry(); | ||
12203 | if (act & DO_ERR) | ||
12204 | ash_msg("%s: %s", name, errmsg(e, "not found")); | ||
12205 | entry->cmdtype = CMDUNKNOWN; | ||
12206 | return; | ||
12207 | niro | 532 | |
12208 | niro | 816 | builtin_success: |
12209 | if (!updatetbl) { | ||
12210 | entry->cmdtype = CMDBUILTIN; | ||
12211 | entry->u.cmd = bcmd; | ||
12212 | return; | ||
12213 | } | ||
12214 | INT_OFF; | ||
12215 | cmdp = cmdlookup(name, 1); | ||
12216 | cmdp->cmdtype = CMDBUILTIN; | ||
12217 | cmdp->param.cmd = bcmd; | ||
12218 | INT_ON; | ||
12219 | success: | ||
12220 | cmdp->rehash = 0; | ||
12221 | entry->cmdtype = cmdp->cmdtype; | ||
12222 | entry->u = cmdp->param; | ||
12223 | } | ||
12224 | niro | 532 | |
12225 | |||
12226 | niro | 816 | /* ============ trap.c */ |
12227 | niro | 532 | |
12228 | /* | ||
12229 | * The trap builtin. | ||
12230 | */ | ||
12231 | niro | 984 | static int FAST_FUNC |
12232 | niro | 816 | trapcmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
12233 | niro | 532 | { |
12234 | char *action; | ||
12235 | char **ap; | ||
12236 | int signo; | ||
12237 | |||
12238 | nextopt(nullstr); | ||
12239 | ap = argptr; | ||
12240 | if (!*ap) { | ||
12241 | niro | 816 | for (signo = 0; signo < NSIG; signo++) { |
12242 | niro | 984 | char *tr = trap_ptr[signo]; |
12243 | if (tr) { | ||
12244 | /* note: bash adds "SIG", but only if invoked | ||
12245 | * as "bash". If called as "sh", or if set -o posix, | ||
12246 | * then it prints short signal names. | ||
12247 | * We are printing short names: */ | ||
12248 | niro | 532 | out1fmt("trap -- %s %s\n", |
12249 | niro | 984 | single_quote(tr), |
12250 | niro | 816 | get_signame(signo)); |
12251 | niro | 984 | /* trap_ptr != trap only if we are in special-cased `trap` code. |
12252 | * In this case, we will exit very soon, no need to free(). */ | ||
12253 | /* if (trap_ptr != trap && tp[0]) */ | ||
12254 | /* free(tr); */ | ||
12255 | niro | 532 | } |
12256 | } | ||
12257 | niro | 984 | /* |
12258 | if (trap_ptr != trap) { | ||
12259 | free(trap_ptr); | ||
12260 | trap_ptr = trap; | ||
12261 | } | ||
12262 | */ | ||
12263 | niro | 532 | return 0; |
12264 | } | ||
12265 | niro | 984 | |
12266 | niro | 816 | action = NULL; |
12267 | if (ap[1]) | ||
12268 | niro | 532 | action = *ap++; |
12269 | while (*ap) { | ||
12270 | niro | 816 | signo = get_signum(*ap); |
12271 | if (signo < 0) | ||
12272 | ash_msg_and_raise_error("%s: bad trap", *ap); | ||
12273 | INT_OFF; | ||
12274 | niro | 532 | if (action) { |
12275 | if (LONE_DASH(action)) | ||
12276 | action = NULL; | ||
12277 | else | ||
12278 | niro | 816 | action = ckstrdup(action); |
12279 | niro | 532 | } |
12280 | niro | 816 | free(trap[signo]); |
12281 | niro | 532 | trap[signo] = action; |
12282 | if (signo != 0) | ||
12283 | setsignal(signo); | ||
12284 | niro | 816 | INT_ON; |
12285 | niro | 532 | ap++; |
12286 | } | ||
12287 | return 0; | ||
12288 | } | ||
12289 | |||
12290 | |||
12291 | niro | 816 | /* ============ Builtins */ |
12292 | niro | 532 | |
12293 | niro | 816 | #if !ENABLE_FEATURE_SH_EXTRA_QUIET |
12294 | niro | 532 | /* |
12295 | niro | 816 | * Lists available builtins |
12296 | niro | 532 | */ |
12297 | niro | 984 | static int FAST_FUNC |
12298 | niro | 816 | helpcmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
12299 | niro | 532 | { |
12300 | niro | 816 | unsigned col; |
12301 | unsigned i; | ||
12302 | niro | 532 | |
12303 | niro | 984 | out1fmt( |
12304 | "Built-in commands:\n" | ||
12305 | "------------------\n"); | ||
12306 | niro | 816 | for (col = 0, i = 0; i < ARRAY_SIZE(builtintab); i++) { |
12307 | niro | 532 | col += out1fmt("%c%s", ((col == 0) ? '\t' : ' '), |
12308 | niro | 816 | builtintab[i].name + 1); |
12309 | niro | 532 | if (col > 60) { |
12310 | out1fmt("\n"); | ||
12311 | col = 0; | ||
12312 | } | ||
12313 | } | ||
12314 | niro | 816 | #if ENABLE_FEATURE_SH_STANDALONE |
12315 | { | ||
12316 | const char *a = applet_names; | ||
12317 | while (*a) { | ||
12318 | col += out1fmt("%c%s", ((col == 0) ? '\t' : ' '), a); | ||
12319 | if (col > 60) { | ||
12320 | out1fmt("\n"); | ||
12321 | col = 0; | ||
12322 | } | ||
12323 | a += strlen(a) + 1; | ||
12324 | niro | 532 | } |
12325 | } | ||
12326 | #endif | ||
12327 | out1fmt("\n\n"); | ||
12328 | return EXIT_SUCCESS; | ||
12329 | } | ||
12330 | niro | 816 | #endif /* FEATURE_SH_EXTRA_QUIET */ |
12331 | niro | 532 | |
12332 | /* | ||
12333 | * The export and readonly commands. | ||
12334 | */ | ||
12335 | niro | 984 | static int FAST_FUNC |
12336 | niro | 816 | exportcmd(int argc UNUSED_PARAM, char **argv) |
12337 | niro | 532 | { |
12338 | struct var *vp; | ||
12339 | char *name; | ||
12340 | const char *p; | ||
12341 | char **aptr; | ||
12342 | niro | 816 | int flag = argv[0][0] == 'r' ? VREADONLY : VEXPORT; |
12343 | niro | 532 | |
12344 | niro | 816 | if (nextopt("p") != 'p') { |
12345 | aptr = argptr; | ||
12346 | name = *aptr; | ||
12347 | if (name) { | ||
12348 | do { | ||
12349 | p = strchr(name, '='); | ||
12350 | if (p != NULL) { | ||
12351 | p++; | ||
12352 | } else { | ||
12353 | vp = *findvar(hashvar(name), name); | ||
12354 | if (vp) { | ||
12355 | vp->flags |= flag; | ||
12356 | continue; | ||
12357 | } | ||
12358 | niro | 532 | } |
12359 | niro | 816 | setvar(name, p, flag); |
12360 | } while ((name = *++aptr) != NULL); | ||
12361 | return 0; | ||
12362 | niro | 532 | } |
12363 | } | ||
12364 | niro | 816 | showvars(argv[0], flag, 0); |
12365 | niro | 532 | return 0; |
12366 | } | ||
12367 | |||
12368 | /* | ||
12369 | niro | 816 | * Delete a function if it exists. |
12370 | niro | 532 | */ |
12371 | static void | ||
12372 | niro | 816 | unsetfunc(const char *name) |
12373 | niro | 532 | { |
12374 | niro | 816 | struct tblentry *cmdp; |
12375 | niro | 532 | |
12376 | niro | 816 | cmdp = cmdlookup(name, 0); |
12377 | if (cmdp!= NULL && cmdp->cmdtype == CMDFUNCTION) | ||
12378 | delete_cmd_entry(); | ||
12379 | niro | 532 | } |
12380 | |||
12381 | /* | ||
12382 | * The unset builtin command. We unset the function before we unset the | ||
12383 | * variable to allow a function to be unset when there is a readonly variable | ||
12384 | * with the same name. | ||
12385 | */ | ||
12386 | niro | 984 | static int FAST_FUNC |
12387 | niro | 816 | unsetcmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
12388 | niro | 532 | { |
12389 | char **ap; | ||
12390 | int i; | ||
12391 | int flag = 0; | ||
12392 | int ret = 0; | ||
12393 | |||
12394 | while ((i = nextopt("vf")) != '\0') { | ||
12395 | flag = i; | ||
12396 | } | ||
12397 | |||
12398 | niro | 816 | for (ap = argptr; *ap; ap++) { |
12399 | niro | 532 | if (flag != 'f') { |
12400 | i = unsetvar(*ap); | ||
12401 | ret |= i; | ||
12402 | if (!(i & 2)) | ||
12403 | continue; | ||
12404 | } | ||
12405 | if (flag != 'v') | ||
12406 | unsetfunc(*ap); | ||
12407 | } | ||
12408 | return ret & 1; | ||
12409 | } | ||
12410 | |||
12411 | |||
12412 | /* setmode.c */ | ||
12413 | |||
12414 | #include <sys/times.h> | ||
12415 | |||
12416 | niro | 816 | static const unsigned char timescmd_str[] ALIGN1 = { |
12417 | niro | 532 | ' ', offsetof(struct tms, tms_utime), |
12418 | '\n', offsetof(struct tms, tms_stime), | ||
12419 | ' ', offsetof(struct tms, tms_cutime), | ||
12420 | '\n', offsetof(struct tms, tms_cstime), | ||
12421 | 0 | ||
12422 | }; | ||
12423 | |||
12424 | niro | 984 | static int FAST_FUNC |
12425 | niro | 816 | timescmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
12426 | niro | 532 | { |
12427 | niro | 816 | long clk_tck, s, t; |
12428 | niro | 532 | const unsigned char *p; |
12429 | struct tms buf; | ||
12430 | |||
12431 | clk_tck = sysconf(_SC_CLK_TCK); | ||
12432 | times(&buf); | ||
12433 | |||
12434 | p = timescmd_str; | ||
12435 | do { | ||
12436 | t = *(clock_t *)(((char *) &buf) + p[1]); | ||
12437 | s = t / clk_tck; | ||
12438 | out1fmt("%ldm%ld.%.3lds%c", | ||
12439 | s/60, s%60, | ||
12440 | ((t - s * clk_tck) * 1000) / clk_tck, | ||
12441 | p[0]); | ||
12442 | } while (*(p += 2)); | ||
12443 | |||
12444 | return 0; | ||
12445 | } | ||
12446 | |||
12447 | niro | 984 | #if ENABLE_SH_MATH_SUPPORT |
12448 | niro | 532 | /* |
12449 | niro | 984 | * The let builtin. partial stolen from GNU Bash, the Bourne Again SHell. |
12450 | * Copyright (C) 1987, 1989, 1991 Free Software Foundation, Inc. | ||
12451 | niro | 532 | * |
12452 | niro | 984 | * Copyright (C) 2003 Vladimir Oleynik <dzo@simtreas.ru> |
12453 | niro | 532 | */ |
12454 | niro | 984 | static int FAST_FUNC |
12455 | niro | 816 | letcmd(int argc UNUSED_PARAM, char **argv) |
12456 | niro | 532 | { |
12457 | niro | 816 | arith_t i; |
12458 | niro | 532 | |
12459 | niro | 816 | argv++; |
12460 | if (!*argv) | ||
12461 | ash_msg_and_raise_error("expression expected"); | ||
12462 | do { | ||
12463 | niro | 984 | i = ash_arith(*argv); |
12464 | niro | 816 | } while (*++argv); |
12465 | niro | 532 | |
12466 | return !i; | ||
12467 | } | ||
12468 | niro | 984 | #endif /* SH_MATH_SUPPORT */ |
12469 | niro | 532 | |
12470 | |||
12471 | niro | 816 | /* ============ miscbltin.c |
12472 | * | ||
12473 | niro | 532 | * Miscellaneous builtins. |
12474 | */ | ||
12475 | |||
12476 | #undef rflag | ||
12477 | |||
12478 | #if defined(__GLIBC__) && __GLIBC__ == 2 && __GLIBC_MINOR__ < 1 | ||
12479 | typedef enum __rlimit_resource rlim_t; | ||
12480 | #endif | ||
12481 | |||
12482 | /* | ||
12483 | niro | 816 | * The read builtin. Options: |
12484 | * -r Do not interpret '\' specially | ||
12485 | * -s Turn off echo (tty only) | ||
12486 | * -n NCHARS Read NCHARS max | ||
12487 | * -p PROMPT Display PROMPT on stderr (if input is from tty) | ||
12488 | * -t SECONDS Timeout after SECONDS (tty or pipe only) | ||
12489 | * -u FD Read from given FD instead of fd 0 | ||
12490 | niro | 532 | * This uses unbuffered input, which may be avoidable in some cases. |
12491 | niro | 816 | * TODO: bash also has: |
12492 | * -a ARRAY Read into array[0],[1],etc | ||
12493 | * -d DELIM End on DELIM char, not newline | ||
12494 | * -e Use line editing (tty only) | ||
12495 | niro | 532 | */ |
12496 | niro | 984 | static int FAST_FUNC |
12497 | niro | 816 | readcmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
12498 | niro | 532 | { |
12499 | niro | 984 | char *opt_n = NULL; |
12500 | char *opt_p = NULL; | ||
12501 | char *opt_t = NULL; | ||
12502 | char *opt_u = NULL; | ||
12503 | int read_flags = 0; | ||
12504 | const char *r; | ||
12505 | niro | 532 | int i; |
12506 | |||
12507 | niro | 984 | while ((i = nextopt("p:u:rt:n:s")) != '\0') { |
12508 | niro | 532 | switch (i) { |
12509 | case 'p': | ||
12510 | niro | 984 | opt_p = optionarg; |
12511 | niro | 532 | break; |
12512 | case 'n': | ||
12513 | niro | 984 | opt_n = optionarg; |
12514 | niro | 532 | break; |
12515 | case 's': | ||
12516 | niro | 984 | read_flags |= BUILTIN_READ_SILENT; |
12517 | niro | 532 | break; |
12518 | case 't': | ||
12519 | niro | 984 | opt_t = optionarg; |
12520 | niro | 532 | break; |
12521 | case 'r': | ||
12522 | niro | 984 | read_flags |= BUILTIN_READ_RAW; |
12523 | niro | 532 | break; |
12524 | niro | 816 | case 'u': |
12525 | niro | 984 | opt_u = optionarg; |
12526 | niro | 816 | break; |
12527 | niro | 532 | default: |
12528 | break; | ||
12529 | } | ||
12530 | } | ||
12531 | |||
12532 | niro | 984 | r = shell_builtin_read(setvar2, |
12533 | argptr, | ||
12534 | bltinlookup("IFS"), /* can be NULL */ | ||
12535 | read_flags, | ||
12536 | opt_n, | ||
12537 | opt_p, | ||
12538 | opt_t, | ||
12539 | opt_u | ||
12540 | ); | ||
12541 | niro | 816 | |
12542 | niro | 984 | if ((uintptr_t)r > 1) |
12543 | ash_msg_and_raise_error(r); | ||
12544 | niro | 532 | |
12545 | niro | 984 | return (uintptr_t)r; |
12546 | niro | 532 | } |
12547 | |||
12548 | niro | 984 | static int FAST_FUNC |
12549 | niro | 816 | umaskcmd(int argc UNUSED_PARAM, char **argv) |
12550 | niro | 532 | { |
12551 | niro | 816 | static const char permuser[3] ALIGN1 = "ugo"; |
12552 | static const char permmode[3] ALIGN1 = "rwx"; | ||
12553 | static const short permmask[] ALIGN2 = { | ||
12554 | niro | 532 | S_IRUSR, S_IWUSR, S_IXUSR, |
12555 | S_IRGRP, S_IWGRP, S_IXGRP, | ||
12556 | S_IROTH, S_IWOTH, S_IXOTH | ||
12557 | }; | ||
12558 | |||
12559 | niro | 984 | /* TODO: use bb_parse_mode() instead */ |
12560 | |||
12561 | niro | 532 | char *ap; |
12562 | mode_t mask; | ||
12563 | int i; | ||
12564 | int symbolic_mode = 0; | ||
12565 | |||
12566 | while (nextopt("S") != '\0') { | ||
12567 | symbolic_mode = 1; | ||
12568 | } | ||
12569 | |||
12570 | niro | 816 | INT_OFF; |
12571 | niro | 532 | mask = umask(0); |
12572 | umask(mask); | ||
12573 | niro | 816 | INT_ON; |
12574 | niro | 532 | |
12575 | niro | 816 | ap = *argptr; |
12576 | if (ap == NULL) { | ||
12577 | niro | 532 | if (symbolic_mode) { |
12578 | char buf[18]; | ||
12579 | char *p = buf; | ||
12580 | |||
12581 | for (i = 0; i < 3; i++) { | ||
12582 | int j; | ||
12583 | |||
12584 | *p++ = permuser[i]; | ||
12585 | *p++ = '='; | ||
12586 | for (j = 0; j < 3; j++) { | ||
12587 | if ((mask & permmask[3 * i + j]) == 0) { | ||
12588 | *p++ = permmode[j]; | ||
12589 | } | ||
12590 | } | ||
12591 | *p++ = ','; | ||
12592 | } | ||
12593 | *--p = 0; | ||
12594 | puts(buf); | ||
12595 | } else { | ||
12596 | out1fmt("%.4o\n", mask); | ||
12597 | } | ||
12598 | } else { | ||
12599 | niro | 816 | if (isdigit((unsigned char) *ap)) { |
12600 | niro | 532 | mask = 0; |
12601 | do { | ||
12602 | if (*ap >= '8' || *ap < '0') | ||
12603 | niro | 984 | ash_msg_and_raise_error(msg_illnum, argv[1]); |
12604 | niro | 532 | mask = (mask << 3) + (*ap - '0'); |
12605 | } while (*++ap != '\0'); | ||
12606 | umask(mask); | ||
12607 | } else { | ||
12608 | mask = ~mask & 0777; | ||
12609 | if (!bb_parse_mode(ap, &mask)) { | ||
12610 | niro | 816 | ash_msg_and_raise_error("illegal mode: %s", ap); |
12611 | niro | 532 | } |
12612 | umask(~mask & 0777); | ||
12613 | } | ||
12614 | } | ||
12615 | return 0; | ||
12616 | } | ||
12617 | |||
12618 | /* | ||
12619 | * ulimit builtin | ||
12620 | * | ||
12621 | * This code, originally by Doug Gwyn, Doug Kingston, Eric Gisin, and | ||
12622 | * Michael Rendell was ripped from pdksh 5.0.8 and hacked for use with | ||
12623 | * ash by J.T. Conklin. | ||
12624 | * | ||
12625 | * Public domain. | ||
12626 | */ | ||
12627 | struct limits { | ||
12628 | niro | 816 | uint8_t cmd; /* RLIMIT_xxx fit into it */ |
12629 | uint8_t factor_shift; /* shift by to get rlim_{cur,max} values */ | ||
12630 | niro | 532 | char option; |
12631 | }; | ||
12632 | |||
12633 | niro | 816 | static const struct limits limits_tbl[] = { |
12634 | niro | 532 | #ifdef RLIMIT_CPU |
12635 | niro | 816 | { RLIMIT_CPU, 0, 't' }, |
12636 | niro | 532 | #endif |
12637 | #ifdef RLIMIT_FSIZE | ||
12638 | niro | 816 | { RLIMIT_FSIZE, 9, 'f' }, |
12639 | niro | 532 | #endif |
12640 | #ifdef RLIMIT_DATA | ||
12641 | niro | 816 | { RLIMIT_DATA, 10, 'd' }, |
12642 | niro | 532 | #endif |
12643 | #ifdef RLIMIT_STACK | ||
12644 | niro | 816 | { RLIMIT_STACK, 10, 's' }, |
12645 | niro | 532 | #endif |
12646 | niro | 816 | #ifdef RLIMIT_CORE |
12647 | { RLIMIT_CORE, 9, 'c' }, | ||
12648 | niro | 532 | #endif |
12649 | #ifdef RLIMIT_RSS | ||
12650 | niro | 816 | { RLIMIT_RSS, 10, 'm' }, |
12651 | niro | 532 | #endif |
12652 | #ifdef RLIMIT_MEMLOCK | ||
12653 | niro | 816 | { RLIMIT_MEMLOCK, 10, 'l' }, |
12654 | niro | 532 | #endif |
12655 | #ifdef RLIMIT_NPROC | ||
12656 | niro | 816 | { RLIMIT_NPROC, 0, 'p' }, |
12657 | niro | 532 | #endif |
12658 | #ifdef RLIMIT_NOFILE | ||
12659 | niro | 816 | { RLIMIT_NOFILE, 0, 'n' }, |
12660 | niro | 532 | #endif |
12661 | #ifdef RLIMIT_AS | ||
12662 | niro | 816 | { RLIMIT_AS, 10, 'v' }, |
12663 | niro | 532 | #endif |
12664 | #ifdef RLIMIT_LOCKS | ||
12665 | niro | 816 | { RLIMIT_LOCKS, 0, 'w' }, |
12666 | niro | 532 | #endif |
12667 | }; | ||
12668 | niro | 816 | static const char limits_name[] = |
12669 | #ifdef RLIMIT_CPU | ||
12670 | "time(seconds)" "\0" | ||
12671 | #endif | ||
12672 | #ifdef RLIMIT_FSIZE | ||
12673 | "file(blocks)" "\0" | ||
12674 | #endif | ||
12675 | #ifdef RLIMIT_DATA | ||
12676 | "data(kb)" "\0" | ||
12677 | #endif | ||
12678 | #ifdef RLIMIT_STACK | ||
12679 | "stack(kb)" "\0" | ||
12680 | #endif | ||
12681 | #ifdef RLIMIT_CORE | ||
12682 | "coredump(blocks)" "\0" | ||
12683 | #endif | ||
12684 | #ifdef RLIMIT_RSS | ||
12685 | "memory(kb)" "\0" | ||
12686 | #endif | ||
12687 | #ifdef RLIMIT_MEMLOCK | ||
12688 | "locked memory(kb)" "\0" | ||
12689 | #endif | ||
12690 | #ifdef RLIMIT_NPROC | ||
12691 | "process" "\0" | ||
12692 | #endif | ||
12693 | #ifdef RLIMIT_NOFILE | ||
12694 | "nofiles" "\0" | ||
12695 | #endif | ||
12696 | #ifdef RLIMIT_AS | ||
12697 | "vmemory(kb)" "\0" | ||
12698 | #endif | ||
12699 | #ifdef RLIMIT_LOCKS | ||
12700 | "locks" "\0" | ||
12701 | #endif | ||
12702 | ; | ||
12703 | niro | 532 | |
12704 | enum limtype { SOFT = 0x1, HARD = 0x2 }; | ||
12705 | |||
12706 | niro | 816 | static void |
12707 | printlim(enum limtype how, const struct rlimit *limit, | ||
12708 | niro | 532 | const struct limits *l) |
12709 | { | ||
12710 | rlim_t val; | ||
12711 | |||
12712 | val = limit->rlim_max; | ||
12713 | if (how & SOFT) | ||
12714 | val = limit->rlim_cur; | ||
12715 | |||
12716 | if (val == RLIM_INFINITY) | ||
12717 | out1fmt("unlimited\n"); | ||
12718 | else { | ||
12719 | niro | 816 | val >>= l->factor_shift; |
12720 | niro | 532 | out1fmt("%lld\n", (long long) val); |
12721 | } | ||
12722 | } | ||
12723 | |||
12724 | niro | 984 | static int FAST_FUNC |
12725 | niro | 816 | ulimitcmd(int argc UNUSED_PARAM, char **argv UNUSED_PARAM) |
12726 | niro | 532 | { |
12727 | niro | 984 | rlim_t val; |
12728 | niro | 532 | enum limtype how = SOFT | HARD; |
12729 | niro | 816 | const struct limits *l; |
12730 | int set, all = 0; | ||
12731 | int optc, what; | ||
12732 | struct rlimit limit; | ||
12733 | niro | 532 | |
12734 | what = 'f'; | ||
12735 | while ((optc = nextopt("HSa" | ||
12736 | #ifdef RLIMIT_CPU | ||
12737 | "t" | ||
12738 | #endif | ||
12739 | #ifdef RLIMIT_FSIZE | ||
12740 | "f" | ||
12741 | #endif | ||
12742 | #ifdef RLIMIT_DATA | ||
12743 | "d" | ||
12744 | #endif | ||
12745 | #ifdef RLIMIT_STACK | ||
12746 | "s" | ||
12747 | #endif | ||
12748 | #ifdef RLIMIT_CORE | ||
12749 | "c" | ||
12750 | #endif | ||
12751 | #ifdef RLIMIT_RSS | ||
12752 | "m" | ||
12753 | #endif | ||
12754 | #ifdef RLIMIT_MEMLOCK | ||
12755 | "l" | ||
12756 | #endif | ||
12757 | #ifdef RLIMIT_NPROC | ||
12758 | "p" | ||
12759 | #endif | ||
12760 | #ifdef RLIMIT_NOFILE | ||
12761 | "n" | ||
12762 | #endif | ||
12763 | #ifdef RLIMIT_AS | ||
12764 | "v" | ||
12765 | #endif | ||
12766 | #ifdef RLIMIT_LOCKS | ||
12767 | "w" | ||
12768 | #endif | ||
12769 | niro | 816 | )) != '\0') |
12770 | niro | 532 | switch (optc) { |
12771 | case 'H': | ||
12772 | how = HARD; | ||
12773 | break; | ||
12774 | case 'S': | ||
12775 | how = SOFT; | ||
12776 | break; | ||
12777 | case 'a': | ||
12778 | all = 1; | ||
12779 | break; | ||
12780 | default: | ||
12781 | what = optc; | ||
12782 | } | ||
12783 | |||
12784 | niro | 816 | for (l = limits_tbl; l->option != what; l++) |
12785 | continue; | ||
12786 | niro | 532 | |
12787 | set = *argptr ? 1 : 0; | ||
12788 | niro | 984 | val = 0; |
12789 | niro | 532 | if (set) { |
12790 | char *p = *argptr; | ||
12791 | |||
12792 | if (all || argptr[1]) | ||
12793 | niro | 816 | ash_msg_and_raise_error("too many arguments"); |
12794 | niro | 532 | if (strncmp(p, "unlimited\n", 9) == 0) |
12795 | val = RLIM_INFINITY; | ||
12796 | else { | ||
12797 | niro | 984 | if (sizeof(val) == sizeof(int)) |
12798 | val = bb_strtou(p, NULL, 10); | ||
12799 | else if (sizeof(val) == sizeof(long)) | ||
12800 | val = bb_strtoul(p, NULL, 10); | ||
12801 | else | ||
12802 | val = bb_strtoull(p, NULL, 10); | ||
12803 | if (errno) | ||
12804 | niro | 816 | ash_msg_and_raise_error("bad number"); |
12805 | val <<= l->factor_shift; | ||
12806 | niro | 532 | } |
12807 | } | ||
12808 | if (all) { | ||
12809 | niro | 816 | const char *lname = limits_name; |
12810 | for (l = limits_tbl; l != &limits_tbl[ARRAY_SIZE(limits_tbl)]; l++) { | ||
12811 | niro | 532 | getrlimit(l->cmd, &limit); |
12812 | niro | 816 | out1fmt("%-20s ", lname); |
12813 | lname += strlen(lname) + 1; | ||
12814 | niro | 532 | printlim(how, &limit, l); |
12815 | } | ||
12816 | return 0; | ||
12817 | } | ||
12818 | |||
12819 | getrlimit(l->cmd, &limit); | ||
12820 | if (set) { | ||
12821 | if (how & HARD) | ||
12822 | limit.rlim_max = val; | ||
12823 | if (how & SOFT) | ||
12824 | limit.rlim_cur = val; | ||
12825 | if (setrlimit(l->cmd, &limit) < 0) | ||
12826 | niro | 816 | ash_msg_and_raise_error("error setting limit (%m)"); |
12827 | niro | 532 | } else { |
12828 | printlim(how, &limit, l); | ||
12829 | } | ||
12830 | return 0; | ||
12831 | } | ||
12832 | |||
12833 | niro | 816 | /* ============ main() and helpers */ |
12834 | |||
12835 | /* | ||
12836 | * Called to exit the shell. | ||
12837 | */ | ||
12838 | static void exitshell(void) NORETURN; | ||
12839 | static void | ||
12840 | exitshell(void) | ||
12841 | { | ||
12842 | struct jmploc loc; | ||
12843 | char *p; | ||
12844 | int status; | ||
12845 | |||
12846 | status = exitstatus; | ||
12847 | TRACE(("pid %d, exitshell(%d)\n", getpid(), status)); | ||
12848 | if (setjmp(loc.loc)) { | ||
12849 | niro | 984 | if (exception_type == EXEXIT) |
12850 | niro | 816 | /* dash bug: it just does _exit(exitstatus) here |
12851 | * but we have to do setjobctl(0) first! | ||
12852 | * (bug is still not fixed in dash-0.5.3 - if you run dash | ||
12853 | * under Midnight Commander, on exit from dash MC is backgrounded) */ | ||
12854 | status = exitstatus; | ||
12855 | goto out; | ||
12856 | niro | 532 | } |
12857 | niro | 816 | exception_handler = &loc; |
12858 | p = trap[0]; | ||
12859 | if (p) { | ||
12860 | trap[0] = NULL; | ||
12861 | evalstring(p, 0); | ||
12862 | niro | 984 | free(p); |
12863 | niro | 816 | } |
12864 | flush_stdout_stderr(); | ||
12865 | out: | ||
12866 | setjobctl(0); | ||
12867 | _exit(status); | ||
12868 | /* NOTREACHED */ | ||
12869 | niro | 532 | } |
12870 | |||
12871 | niro | 816 | static void |
12872 | init(void) | ||
12873 | { | ||
12874 | /* from input.c: */ | ||
12875 | niro | 984 | basepf.next_to_pgetc = basepf.buf = basebuf; |
12876 | niro | 532 | |
12877 | niro | 816 | /* from trap.c: */ |
12878 | signal(SIGCHLD, SIG_DFL); | ||
12879 | niro | 984 | /* bash re-enables SIGHUP which is SIG_IGNed on entry. |
12880 | * Try: "trap '' HUP; bash; echo RET" and type "kill -HUP $$" | ||
12881 | */ | ||
12882 | signal(SIGHUP, SIG_DFL); | ||
12883 | niro | 816 | |
12884 | /* from var.c: */ | ||
12885 | { | ||
12886 | char **envp; | ||
12887 | const char *p; | ||
12888 | struct stat st1, st2; | ||
12889 | |||
12890 | initvar(); | ||
12891 | for (envp = environ; envp && *envp; envp++) { | ||
12892 | if (strchr(*envp, '=')) { | ||
12893 | setvareq(*envp, VEXPORT|VTEXTFIXED); | ||
12894 | } | ||
12895 | } | ||
12896 | |||
12897 | niro | 984 | setvar("PPID", utoa(getppid()), 0); |
12898 | niro | 816 | |
12899 | p = lookupvar("PWD"); | ||
12900 | if (p) | ||
12901 | if (*p != '/' || stat(p, &st1) || stat(".", &st2) | ||
12902 | || st1.st_dev != st2.st_dev || st1.st_ino != st2.st_ino) | ||
12903 | p = '\0'; | ||
12904 | setpwd(p, 0); | ||
12905 | } | ||
12906 | } | ||
12907 | |||
12908 | /* | ||
12909 | * Process the shell command line arguments. | ||
12910 | */ | ||
12911 | static void | ||
12912 | procargs(char **argv) | ||
12913 | niro | 532 | { |
12914 | niro | 816 | int i; |
12915 | const char *xminusc; | ||
12916 | char **xargv; | ||
12917 | |||
12918 | xargv = argv; | ||
12919 | arg0 = xargv[0]; | ||
12920 | /* if (xargv[0]) - mmm, this is always true! */ | ||
12921 | xargv++; | ||
12922 | for (i = 0; i < NOPTS; i++) | ||
12923 | optlist[i] = 2; | ||
12924 | argptr = xargv; | ||
12925 | if (options(1)) { | ||
12926 | /* it already printed err message */ | ||
12927 | raise_exception(EXERROR); | ||
12928 | } | ||
12929 | xargv = argptr; | ||
12930 | xminusc = minusc; | ||
12931 | if (*xargv == NULL) { | ||
12932 | if (xminusc) | ||
12933 | ash_msg_and_raise_error(bb_msg_requires_arg, "-c"); | ||
12934 | sflag = 1; | ||
12935 | } | ||
12936 | if (iflag == 2 && sflag == 1 && isatty(0) && isatty(1)) | ||
12937 | iflag = 1; | ||
12938 | if (mflag == 2) | ||
12939 | mflag = iflag; | ||
12940 | for (i = 0; i < NOPTS; i++) | ||
12941 | if (optlist[i] == 2) | ||
12942 | optlist[i] = 0; | ||
12943 | #if DEBUG == 2 | ||
12944 | debug = 1; | ||
12945 | #endif | ||
12946 | /* POSIX 1003.2: first arg after -c cmd is $0, remainder $1... */ | ||
12947 | if (xminusc) { | ||
12948 | minusc = *xargv++; | ||
12949 | if (*xargv) | ||
12950 | goto setarg0; | ||
12951 | } else if (!sflag) { | ||
12952 | setinputfile(*xargv, 0); | ||
12953 | setarg0: | ||
12954 | arg0 = *xargv++; | ||
12955 | commandname = arg0; | ||
12956 | } | ||
12957 | |||
12958 | shellparam.p = xargv; | ||
12959 | #if ENABLE_ASH_GETOPTS | ||
12960 | shellparam.optind = 1; | ||
12961 | shellparam.optoff = -1; | ||
12962 | #endif | ||
12963 | /* assert(shellparam.malloced == 0 && shellparam.nparam == 0); */ | ||
12964 | while (*xargv) { | ||
12965 | shellparam.nparam++; | ||
12966 | xargv++; | ||
12967 | } | ||
12968 | optschanged(); | ||
12969 | niro | 532 | } |
12970 | niro | 816 | |
12971 | /* | ||
12972 | * Read /etc/profile or .profile. | ||
12973 | */ | ||
12974 | static void | ||
12975 | read_profile(const char *name) | ||
12976 | { | ||
12977 | int skip; | ||
12978 | |||
12979 | if (setinputfile(name, INPUT_PUSH_FILE | INPUT_NOFILE_OK) < 0) | ||
12980 | return; | ||
12981 | skip = cmdloop(0); | ||
12982 | popfile(); | ||
12983 | if (skip) | ||
12984 | exitshell(); | ||
12985 | } | ||
12986 | |||
12987 | /* | ||
12988 | * This routine is called when an error or an interrupt occurs in an | ||
12989 | * interactive shell and control is returned to the main command loop. | ||
12990 | */ | ||
12991 | static void | ||
12992 | reset(void) | ||
12993 | { | ||
12994 | /* from eval.c: */ | ||
12995 | evalskip = 0; | ||
12996 | loopnest = 0; | ||
12997 | /* from input.c: */ | ||
12998 | niro | 984 | g_parsefile->left_in_buffer = 0; |
12999 | g_parsefile->left_in_line = 0; /* clear input buffer */ | ||
13000 | niro | 816 | popallfiles(); |
13001 | /* from parser.c: */ | ||
13002 | tokpushback = 0; | ||
13003 | checkkwd = 0; | ||
13004 | /* from redir.c: */ | ||
13005 | clearredir(/*drop:*/ 0); | ||
13006 | } | ||
13007 | |||
13008 | #if PROFILE | ||
13009 | static short profile_buf[16384]; | ||
13010 | extern int etext(); | ||
13011 | niro | 532 | #endif |
13012 | |||
13013 | niro | 816 | /* |
13014 | * Main routine. We initialize things, parse the arguments, execute | ||
13015 | * profiles if we're a login shell, and then call cmdloop to execute | ||
13016 | * commands. The setjmp call sets up the location to jump to when an | ||
13017 | * exception occurs. When an exception occurs the variable "state" | ||
13018 | * is used to figure out how far we had gotten. | ||
13019 | */ | ||
13020 | int ash_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE; | ||
13021 | int ash_main(int argc UNUSED_PARAM, char **argv) | ||
13022 | { | ||
13023 | niro | 984 | const char *shinit; |
13024 | volatile smallint state; | ||
13025 | niro | 816 | struct jmploc jmploc; |
13026 | struct stackmark smark; | ||
13027 | |||
13028 | /* Initialize global data */ | ||
13029 | INIT_G_misc(); | ||
13030 | INIT_G_memstack(); | ||
13031 | INIT_G_var(); | ||
13032 | #if ENABLE_ASH_ALIAS | ||
13033 | INIT_G_alias(); | ||
13034 | #endif | ||
13035 | INIT_G_cmdtable(); | ||
13036 | |||
13037 | #if PROFILE | ||
13038 | monitor(4, etext, profile_buf, sizeof(profile_buf), 50); | ||
13039 | #endif | ||
13040 | |||
13041 | #if ENABLE_FEATURE_EDITING | ||
13042 | line_input_state = new_line_input_t(FOR_SHELL | WITH_PATH_LOOKUP); | ||
13043 | #endif | ||
13044 | state = 0; | ||
13045 | if (setjmp(jmploc.loc)) { | ||
13046 | niro | 984 | smallint e; |
13047 | smallint s; | ||
13048 | niro | 816 | |
13049 | reset(); | ||
13050 | |||
13051 | niro | 984 | e = exception_type; |
13052 | niro | 816 | if (e == EXERROR) |
13053 | exitstatus = 2; | ||
13054 | s = state; | ||
13055 | if (e == EXEXIT || s == 0 || iflag == 0 || shlvl) | ||
13056 | exitshell(); | ||
13057 | niro | 984 | if (e == EXINT) |
13058 | outcslow('\n', stderr); | ||
13059 | niro | 816 | |
13060 | popstackmark(&smark); | ||
13061 | FORCE_INT_ON; /* enable interrupts */ | ||
13062 | if (s == 1) | ||
13063 | goto state1; | ||
13064 | if (s == 2) | ||
13065 | goto state2; | ||
13066 | if (s == 3) | ||
13067 | goto state3; | ||
13068 | goto state4; | ||
13069 | } | ||
13070 | exception_handler = &jmploc; | ||
13071 | #if DEBUG | ||
13072 | opentrace(); | ||
13073 | TRACE(("Shell args: ")); | ||
13074 | trace_puts_args(argv); | ||
13075 | #endif | ||
13076 | rootpid = getpid(); | ||
13077 | |||
13078 | init(); | ||
13079 | setstackmark(&smark); | ||
13080 | procargs(argv); | ||
13081 | |||
13082 | #if ENABLE_FEATURE_EDITING_SAVEHISTORY | ||
13083 | if (iflag) { | ||
13084 | const char *hp = lookupvar("HISTFILE"); | ||
13085 | |||
13086 | if (hp == NULL) { | ||
13087 | hp = lookupvar("HOME"); | ||
13088 | if (hp != NULL) { | ||
13089 | char *defhp = concat_path_file(hp, ".ash_history"); | ||
13090 | setvar("HISTFILE", defhp, 0); | ||
13091 | free(defhp); | ||
13092 | } | ||
13093 | } | ||
13094 | } | ||
13095 | #endif | ||
13096 | niro | 984 | if (/* argv[0] && */ argv[0][0] == '-') |
13097 | niro | 816 | isloginsh = 1; |
13098 | if (isloginsh) { | ||
13099 | state = 1; | ||
13100 | read_profile("/etc/profile"); | ||
13101 | state1: | ||
13102 | state = 2; | ||
13103 | read_profile(".profile"); | ||
13104 | } | ||
13105 | state2: | ||
13106 | state = 3; | ||
13107 | if ( | ||
13108 | #ifndef linux | ||
13109 | getuid() == geteuid() && getgid() == getegid() && | ||
13110 | #endif | ||
13111 | iflag | ||
13112 | ) { | ||
13113 | shinit = lookupvar("ENV"); | ||
13114 | if (shinit != NULL && *shinit != '\0') { | ||
13115 | read_profile(shinit); | ||
13116 | } | ||
13117 | } | ||
13118 | state3: | ||
13119 | state = 4; | ||
13120 | if (minusc) { | ||
13121 | /* evalstring pushes parsefile stack. | ||
13122 | * Ensure we don't falsely claim that 0 (stdin) | ||
13123 | niro | 984 | * is one of stacked source fds. |
13124 | * Testcase: ash -c 'exec 1>&0' must not complain. */ | ||
13125 | niro | 816 | if (!sflag) |
13126 | g_parsefile->fd = -1; | ||
13127 | evalstring(minusc, 0); | ||
13128 | } | ||
13129 | |||
13130 | if (sflag || minusc == NULL) { | ||
13131 | niro | 984 | #if defined MAX_HISTORY && MAX_HISTORY > 0 && ENABLE_FEATURE_EDITING_SAVEHISTORY |
13132 | niro | 816 | if (iflag) { |
13133 | const char *hp = lookupvar("HISTFILE"); | ||
13134 | niro | 984 | if (hp) |
13135 | niro | 816 | line_input_state->hist_file = hp; |
13136 | } | ||
13137 | #endif | ||
13138 | state4: /* XXX ??? - why isn't this before the "if" statement */ | ||
13139 | cmdloop(1); | ||
13140 | } | ||
13141 | #if PROFILE | ||
13142 | monitor(0); | ||
13143 | #endif | ||
13144 | #ifdef GPROF | ||
13145 | { | ||
13146 | extern void _mcleanup(void); | ||
13147 | _mcleanup(); | ||
13148 | } | ||
13149 | #endif | ||
13150 | exitshell(); | ||
13151 | /* NOTREACHED */ | ||
13152 | } | ||
13153 | |||
13154 | |||
13155 | niro | 532 | /*- |
13156 | * Copyright (c) 1989, 1991, 1993, 1994 | ||
13157 | * The Regents of the University of California. All rights reserved. | ||
13158 | * | ||
13159 | * This code is derived from software contributed to Berkeley by | ||
13160 | * Kenneth Almquist. | ||
13161 | * | ||
13162 | * Redistribution and use in source and binary forms, with or without | ||
13163 | * modification, are permitted provided that the following conditions | ||
13164 | * are met: | ||
13165 | * 1. Redistributions of source code must retain the above copyright | ||
13166 | * notice, this list of conditions and the following disclaimer. | ||
13167 | * 2. Redistributions in binary form must reproduce the above copyright | ||
13168 | * notice, this list of conditions and the following disclaimer in the | ||
13169 | * documentation and/or other materials provided with the distribution. | ||
13170 | * 3. Neither the name of the University nor the names of its contributors | ||
13171 | * may be used to endorse or promote products derived from this software | ||
13172 | * without specific prior written permission. | ||
13173 | * | ||
13174 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND | ||
13175 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
13176 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | ||
13177 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE | ||
13178 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | ||
13179 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | ||
13180 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
13181 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | ||
13182 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | ||
13183 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | ||
13184 | * SUCH DAMAGE. | ||
13185 | */ |