xref: /aosp_15_r20/external/mksh/src/main.c (revision 7c356e860f31eadd15fd599fcfdb9fd21f16a9d4)
1*7c356e86SAndroid Build Coastguard Worker /*	$OpenBSD: main.c,v 1.57 2015/09/10 22:48:58 nicm Exp $	*/
2*7c356e86SAndroid Build Coastguard Worker /*	$OpenBSD: tty.c,v 1.10 2014/08/10 02:44:26 guenther Exp $	*/
3*7c356e86SAndroid Build Coastguard Worker /*	$OpenBSD: io.c,v 1.26 2015/09/11 08:00:27 guenther Exp $	*/
4*7c356e86SAndroid Build Coastguard Worker /*	$OpenBSD: table.c,v 1.16 2015/09/01 13:12:31 tedu Exp $	*/
5*7c356e86SAndroid Build Coastguard Worker 
6*7c356e86SAndroid Build Coastguard Worker /*-
7*7c356e86SAndroid Build Coastguard Worker  * Copyright (c) 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010,
8*7c356e86SAndroid Build Coastguard Worker  *		 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018,
9*7c356e86SAndroid Build Coastguard Worker  *		 2019, 2020
10*7c356e86SAndroid Build Coastguard Worker  *	mirabilos <[email protected]>
11*7c356e86SAndroid Build Coastguard Worker  *
12*7c356e86SAndroid Build Coastguard Worker  * Provided that these terms and disclaimer and all copyright notices
13*7c356e86SAndroid Build Coastguard Worker  * are retained or reproduced in an accompanying document, permission
14*7c356e86SAndroid Build Coastguard Worker  * is granted to deal in this work without restriction, including un-
15*7c356e86SAndroid Build Coastguard Worker  * limited rights to use, publicly perform, distribute, sell, modify,
16*7c356e86SAndroid Build Coastguard Worker  * merge, give away, or sublicence.
17*7c356e86SAndroid Build Coastguard Worker  *
18*7c356e86SAndroid Build Coastguard Worker  * This work is provided "AS IS" and WITHOUT WARRANTY of any kind, to
19*7c356e86SAndroid Build Coastguard Worker  * the utmost extent permitted by applicable law, neither express nor
20*7c356e86SAndroid Build Coastguard Worker  * implied; without malicious intent or gross negligence. In no event
21*7c356e86SAndroid Build Coastguard Worker  * may a licensor, author or contributor be held liable for indirect,
22*7c356e86SAndroid Build Coastguard Worker  * direct, other damage, loss, or other issues arising in any way out
23*7c356e86SAndroid Build Coastguard Worker  * of dealing in the work, even if advised of the possibility of such
24*7c356e86SAndroid Build Coastguard Worker  * damage or existence of a defect, except proven that it results out
25*7c356e86SAndroid Build Coastguard Worker  * of said person's immediate fault when using the work as intended.
26*7c356e86SAndroid Build Coastguard Worker  */
27*7c356e86SAndroid Build Coastguard Worker 
28*7c356e86SAndroid Build Coastguard Worker #define EXTERN
29*7c356e86SAndroid Build Coastguard Worker #include "sh.h"
30*7c356e86SAndroid Build Coastguard Worker 
31*7c356e86SAndroid Build Coastguard Worker #if HAVE_LANGINFO_CODESET
32*7c356e86SAndroid Build Coastguard Worker #include <langinfo.h>
33*7c356e86SAndroid Build Coastguard Worker #endif
34*7c356e86SAndroid Build Coastguard Worker #if HAVE_SETLOCALE_CTYPE
35*7c356e86SAndroid Build Coastguard Worker #include <locale.h>
36*7c356e86SAndroid Build Coastguard Worker #endif
37*7c356e86SAndroid Build Coastguard Worker 
38*7c356e86SAndroid Build Coastguard Worker __RCSID("$MirOS: src/bin/mksh/main.c,v 1.374 2020/10/01 20:28:54 tg Exp $");
39*7c356e86SAndroid Build Coastguard Worker 
40*7c356e86SAndroid Build Coastguard Worker #ifndef MKSHRC_PATH
41*7c356e86SAndroid Build Coastguard Worker #define MKSHRC_PATH	"~/.mkshrc"
42*7c356e86SAndroid Build Coastguard Worker #endif
43*7c356e86SAndroid Build Coastguard Worker 
44*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_DEFAULT_TMPDIR
45*7c356e86SAndroid Build Coastguard Worker #define MKSH_DEFAULT_TMPDIR	MKSH_UNIXROOT "/tmp"
46*7c356e86SAndroid Build Coastguard Worker #endif
47*7c356e86SAndroid Build Coastguard Worker 
48*7c356e86SAndroid Build Coastguard Worker static uint8_t isuc(const char *);
49*7c356e86SAndroid Build Coastguard Worker static int main_init(int, const char *[], Source **, struct block **);
50*7c356e86SAndroid Build Coastguard Worker void chvt_reinit(void);
51*7c356e86SAndroid Build Coastguard Worker static void reclaim(void);
52*7c356e86SAndroid Build Coastguard Worker static void remove_temps(struct temp *);
53*7c356e86SAndroid Build Coastguard Worker static mksh_uari_t rndsetup(void);
54*7c356e86SAndroid Build Coastguard Worker static void init_environ(void);
55*7c356e86SAndroid Build Coastguard Worker #ifdef SIGWINCH
56*7c356e86SAndroid Build Coastguard Worker static void x_sigwinch(int);
57*7c356e86SAndroid Build Coastguard Worker #endif
58*7c356e86SAndroid Build Coastguard Worker 
59*7c356e86SAndroid Build Coastguard Worker static const char initsubs[] =
60*7c356e86SAndroid Build Coastguard Worker     "${PS2=> }"
61*7c356e86SAndroid Build Coastguard Worker     "${PS3=#? }"
62*7c356e86SAndroid Build Coastguard Worker     "${PS4=+ }"
63*7c356e86SAndroid Build Coastguard Worker     "${SECONDS=0}"
64*7c356e86SAndroid Build Coastguard Worker     "${TMOUT=0}"
65*7c356e86SAndroid Build Coastguard Worker     "${EPOCHREALTIME=}";
66*7c356e86SAndroid Build Coastguard Worker 
67*7c356e86SAndroid Build Coastguard Worker static const char *initcoms[] = {
68*7c356e86SAndroid Build Coastguard Worker 	Ttypeset, Tdr, initvsn, NULL,
69*7c356e86SAndroid Build Coastguard Worker 	Ttypeset, Tdx, "HOME", TPATH, TSHELL, NULL,
70*7c356e86SAndroid Build Coastguard Worker 	Ttypeset, "-i10", "COLUMNS", "LINES", "SECONDS", "TMOUT", NULL,
71*7c356e86SAndroid Build Coastguard Worker 	Talias,
72*7c356e86SAndroid Build Coastguard Worker 	"integer=\\\\builtin typeset -i",
73*7c356e86SAndroid Build Coastguard Worker 	"local=\\\\builtin typeset",
74*7c356e86SAndroid Build Coastguard Worker 	/* not "alias -t --": hash -r needs to work */
75*7c356e86SAndroid Build Coastguard Worker 	"hash=\\\\builtin alias -t",
76*7c356e86SAndroid Build Coastguard Worker 	"type=\\\\builtin whence -v",
77*7c356e86SAndroid Build Coastguard Worker 	"autoload=\\\\builtin typeset -fu",
78*7c356e86SAndroid Build Coastguard Worker 	"functions=\\\\builtin typeset -f",
79*7c356e86SAndroid Build Coastguard Worker 	"history=\\\\builtin fc -l",
80*7c356e86SAndroid Build Coastguard Worker 	"nameref=\\\\builtin typeset -n",
81*7c356e86SAndroid Build Coastguard Worker 	"nohup=nohup ",
82*7c356e86SAndroid Build Coastguard Worker 	"r=\\\\builtin fc -e -",
83*7c356e86SAndroid Build Coastguard Worker 	"login=\\\\builtin exec login",
84*7c356e86SAndroid Build Coastguard Worker 	NULL,
85*7c356e86SAndroid Build Coastguard Worker 	 /* this is what AT&T ksh seems to track, with the addition of emacs */
86*7c356e86SAndroid Build Coastguard Worker 	Talias, "-tU",
87*7c356e86SAndroid Build Coastguard Worker 	Tcat, "cc", "chmod", "cp", "date", "ed", "emacs", "grep", "ls",
88*7c356e86SAndroid Build Coastguard Worker 	"make", "mv", "pr", "rm", "sed", Tsh, "vi", "who", NULL,
89*7c356e86SAndroid Build Coastguard Worker 	NULL
90*7c356e86SAndroid Build Coastguard Worker };
91*7c356e86SAndroid Build Coastguard Worker 
92*7c356e86SAndroid Build Coastguard Worker static const char *restr_com[] = {
93*7c356e86SAndroid Build Coastguard Worker 	Ttypeset, Tdr, TPATH, TENV, TSHELL, NULL
94*7c356e86SAndroid Build Coastguard Worker };
95*7c356e86SAndroid Build Coastguard Worker 
96*7c356e86SAndroid Build Coastguard Worker static bool initio_done;
97*7c356e86SAndroid Build Coastguard Worker 
98*7c356e86SAndroid Build Coastguard Worker /* top-level parsing and execution environment */
99*7c356e86SAndroid Build Coastguard Worker static struct env env;
100*7c356e86SAndroid Build Coastguard Worker struct env *e = &env;
101*7c356e86SAndroid Build Coastguard Worker 
102*7c356e86SAndroid Build Coastguard Worker /* compile-time assertions */
103*7c356e86SAndroid Build Coastguard Worker 
104*7c356e86SAndroid Build Coastguard Worker /* this one should be defined by the standard */
105*7c356e86SAndroid Build Coastguard Worker cta(char_is_1_char, (sizeof(char) == 1) && (sizeof(signed char) == 1) &&
106*7c356e86SAndroid Build Coastguard Worker     (sizeof(unsigned char) == 1));
107*7c356e86SAndroid Build Coastguard Worker cta(char_is_8_bits, ((CHAR_BIT) == 8) && ((int)(unsigned char)0xFF == 0xFF) &&
108*7c356e86SAndroid Build Coastguard Worker     ((int)(unsigned char)0x100 == 0) && ((int)(unsigned char)(int)-1 == 0xFF));
109*7c356e86SAndroid Build Coastguard Worker /* the next assertion is probably not really needed */
110*7c356e86SAndroid Build Coastguard Worker cta(short_is_2_char, sizeof(short) == 2);
111*7c356e86SAndroid Build Coastguard Worker cta(short_size_no_matter_of_signedness, sizeof(short) == sizeof(unsigned short));
112*7c356e86SAndroid Build Coastguard Worker /* the next assertion is probably not really needed */
113*7c356e86SAndroid Build Coastguard Worker cta(int_is_4_char, sizeof(int) == 4);
114*7c356e86SAndroid Build Coastguard Worker cta(int_size_no_matter_of_signedness, sizeof(int) == sizeof(unsigned int));
115*7c356e86SAndroid Build Coastguard Worker 
116*7c356e86SAndroid Build Coastguard Worker cta(long_ge_int, sizeof(long) >= sizeof(int));
117*7c356e86SAndroid Build Coastguard Worker cta(long_size_no_matter_of_signedness, sizeof(long) == sizeof(unsigned long));
118*7c356e86SAndroid Build Coastguard Worker 
119*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_LEGACY_MODE
120*7c356e86SAndroid Build Coastguard Worker /* the next assertion is probably not really needed */
121*7c356e86SAndroid Build Coastguard Worker cta(ari_is_4_char, sizeof(mksh_ari_t) == 4);
122*7c356e86SAndroid Build Coastguard Worker /* but this is */
123*7c356e86SAndroid Build Coastguard Worker cta(ari_has_31_bit, 0 < (mksh_ari_t)(((((mksh_ari_t)1 << 15) << 15) - 1) * 2 + 1));
124*7c356e86SAndroid Build Coastguard Worker /* the next assertion is probably not really needed */
125*7c356e86SAndroid Build Coastguard Worker cta(uari_is_4_char, sizeof(mksh_uari_t) == 4);
126*7c356e86SAndroid Build Coastguard Worker /* but the next three are; we REQUIRE unsigned integer wraparound */
127*7c356e86SAndroid Build Coastguard Worker cta(uari_has_31_bit, 0 < (mksh_uari_t)(((((mksh_uari_t)1 << 15) << 15) - 1) * 2 + 1));
128*7c356e86SAndroid Build Coastguard Worker cta(uari_has_32_bit, 0 < (mksh_uari_t)(((((mksh_uari_t)1 << 15) << 15) - 1) * 4 + 3));
129*7c356e86SAndroid Build Coastguard Worker cta(uari_wrap_32_bit,
130*7c356e86SAndroid Build Coastguard Worker     (mksh_uari_t)(((((mksh_uari_t)1 << 15) << 15) - 1) * 4 + 3) >
131*7c356e86SAndroid Build Coastguard Worker     (mksh_uari_t)(((((mksh_uari_t)1 << 15) << 15) - 1) * 4 + 4));
132*7c356e86SAndroid Build Coastguard Worker #endif
133*7c356e86SAndroid Build Coastguard Worker /* these are always required */
134*7c356e86SAndroid Build Coastguard Worker cta(ari_is_signed, (mksh_ari_t)-1 < (mksh_ari_t)0);
135*7c356e86SAndroid Build Coastguard Worker cta(uari_is_unsigned, (mksh_uari_t)-1 > (mksh_uari_t)0);
136*7c356e86SAndroid Build Coastguard Worker /* we require these to have the precisely same size and assume 2s complement */
137*7c356e86SAndroid Build Coastguard Worker cta(ari_size_no_matter_of_signedness, sizeof(mksh_ari_t) == sizeof(mksh_uari_t));
138*7c356e86SAndroid Build Coastguard Worker 
139*7c356e86SAndroid Build Coastguard Worker cta(sizet_size_no_matter_of_signedness, sizeof(ssize_t) == sizeof(size_t));
140*7c356e86SAndroid Build Coastguard Worker cta(sizet_voidptr_same_size, sizeof(size_t) == sizeof(void *));
141*7c356e86SAndroid Build Coastguard Worker cta(sizet_funcptr_same_size, sizeof(size_t) == sizeof(void (*)(void)));
142*7c356e86SAndroid Build Coastguard Worker /* our formatting routines assume this */
143*7c356e86SAndroid Build Coastguard Worker cta(ptr_fits_in_long, sizeof(size_t) <= sizeof(long));
144*7c356e86SAndroid Build Coastguard Worker cta(ari_fits_in_long, sizeof(mksh_ari_t) <= sizeof(long));
145*7c356e86SAndroid Build Coastguard Worker 
146*7c356e86SAndroid Build Coastguard Worker static mksh_uari_t
rndsetup(void)147*7c356e86SAndroid Build Coastguard Worker rndsetup(void)
148*7c356e86SAndroid Build Coastguard Worker {
149*7c356e86SAndroid Build Coastguard Worker 	register uint32_t h;
150*7c356e86SAndroid Build Coastguard Worker 	struct {
151*7c356e86SAndroid Build Coastguard Worker 		ALLOC_ITEM alloc_INT;
152*7c356e86SAndroid Build Coastguard Worker 		void *dataptr, *stkptr, *mallocptr;
153*7c356e86SAndroid Build Coastguard Worker #if defined(__GLIBC__) && (__GLIBC__ >= 2)
154*7c356e86SAndroid Build Coastguard Worker 		sigjmp_buf jbuf;
155*7c356e86SAndroid Build Coastguard Worker #endif
156*7c356e86SAndroid Build Coastguard Worker 		struct timeval tv;
157*7c356e86SAndroid Build Coastguard Worker 	} *bufptr;
158*7c356e86SAndroid Build Coastguard Worker 	char *cp;
159*7c356e86SAndroid Build Coastguard Worker 
160*7c356e86SAndroid Build Coastguard Worker 	cp = alloc(sizeof(*bufptr) - sizeof(ALLOC_ITEM), APERM);
161*7c356e86SAndroid Build Coastguard Worker 	/* clear the allocated space, for valgrind and to avoid UB */
162*7c356e86SAndroid Build Coastguard Worker 	memset(cp, 0, sizeof(*bufptr) - sizeof(ALLOC_ITEM));
163*7c356e86SAndroid Build Coastguard Worker 	/* undo what alloc() did to the malloc result address */
164*7c356e86SAndroid Build Coastguard Worker 	bufptr = (void *)(cp - sizeof(ALLOC_ITEM));
165*7c356e86SAndroid Build Coastguard Worker 	/* PIE or something similar provides us with deltas here */
166*7c356e86SAndroid Build Coastguard Worker 	bufptr->dataptr = &rndsetupstate;
167*7c356e86SAndroid Build Coastguard Worker 	/* ASLR in at least Windows, Linux, some BSDs */
168*7c356e86SAndroid Build Coastguard Worker 	bufptr->stkptr = &bufptr;
169*7c356e86SAndroid Build Coastguard Worker 	/* randomised malloc in BSD (and possibly others) */
170*7c356e86SAndroid Build Coastguard Worker 	bufptr->mallocptr = bufptr;
171*7c356e86SAndroid Build Coastguard Worker #if defined(__GLIBC__) && (__GLIBC__ >= 2)
172*7c356e86SAndroid Build Coastguard Worker 	/* glibc pointer guard */
173*7c356e86SAndroid Build Coastguard Worker 	sigsetjmp(bufptr->jbuf, 1);
174*7c356e86SAndroid Build Coastguard Worker #endif
175*7c356e86SAndroid Build Coastguard Worker 	/* introduce variation (and yes, second arg MBZ for portability) */
176*7c356e86SAndroid Build Coastguard Worker 	mksh_TIME(bufptr->tv);
177*7c356e86SAndroid Build Coastguard Worker 
178*7c356e86SAndroid Build Coastguard Worker #ifdef MKSH_ALLOC_CATCH_UNDERRUNS
179*7c356e86SAndroid Build Coastguard Worker 	mprotect(((char *)bufptr) + 4096, 4096, PROT_READ | PROT_WRITE);
180*7c356e86SAndroid Build Coastguard Worker #endif
181*7c356e86SAndroid Build Coastguard Worker 	h = chvt_rndsetup(bufptr, sizeof(*bufptr));
182*7c356e86SAndroid Build Coastguard Worker 
183*7c356e86SAndroid Build Coastguard Worker 	afree(cp, APERM);
184*7c356e86SAndroid Build Coastguard Worker 	return ((mksh_uari_t)h);
185*7c356e86SAndroid Build Coastguard Worker }
186*7c356e86SAndroid Build Coastguard Worker 
187*7c356e86SAndroid Build Coastguard Worker void
chvt_reinit(void)188*7c356e86SAndroid Build Coastguard Worker chvt_reinit(void)
189*7c356e86SAndroid Build Coastguard Worker {
190*7c356e86SAndroid Build Coastguard Worker 	kshpid = procpid = getpid();
191*7c356e86SAndroid Build Coastguard Worker 	ksheuid = geteuid();
192*7c356e86SAndroid Build Coastguard Worker 	kshpgrp = getpgrp();
193*7c356e86SAndroid Build Coastguard Worker 	kshppid = getppid();
194*7c356e86SAndroid Build Coastguard Worker }
195*7c356e86SAndroid Build Coastguard Worker 
196*7c356e86SAndroid Build Coastguard Worker static const char *empty_argv[] = {
197*7c356e86SAndroid Build Coastguard Worker 	Tmksh, NULL
198*7c356e86SAndroid Build Coastguard Worker };
199*7c356e86SAndroid Build Coastguard Worker 
200*7c356e86SAndroid Build Coastguard Worker static uint8_t
isuc(const char * cx)201*7c356e86SAndroid Build Coastguard Worker isuc(const char *cx) {
202*7c356e86SAndroid Build Coastguard Worker 	char *cp, *x;
203*7c356e86SAndroid Build Coastguard Worker 	uint8_t rv = 0;
204*7c356e86SAndroid Build Coastguard Worker 
205*7c356e86SAndroid Build Coastguard Worker 	if (!cx || !*cx)
206*7c356e86SAndroid Build Coastguard Worker 		return (0);
207*7c356e86SAndroid Build Coastguard Worker 
208*7c356e86SAndroid Build Coastguard Worker 	/* uppercase a string duplicate */
209*7c356e86SAndroid Build Coastguard Worker 	strdupx(x, cx, ATEMP);
210*7c356e86SAndroid Build Coastguard Worker 	cp = x;
211*7c356e86SAndroid Build Coastguard Worker 	while ((*cp = ksh_toupper(*cp)))
212*7c356e86SAndroid Build Coastguard Worker 		++cp;
213*7c356e86SAndroid Build Coastguard Worker 
214*7c356e86SAndroid Build Coastguard Worker 	/* check for UTF-8 */
215*7c356e86SAndroid Build Coastguard Worker 	if (strstr(x, "UTF-8") || strstr(x, "UTF8"))
216*7c356e86SAndroid Build Coastguard Worker 		rv = 1;
217*7c356e86SAndroid Build Coastguard Worker 
218*7c356e86SAndroid Build Coastguard Worker 	/* free copy and out */
219*7c356e86SAndroid Build Coastguard Worker 	afree(x, ATEMP);
220*7c356e86SAndroid Build Coastguard Worker 	return (rv);
221*7c356e86SAndroid Build Coastguard Worker }
222*7c356e86SAndroid Build Coastguard Worker 
223*7c356e86SAndroid Build Coastguard Worker static int
main_init(int argc,const char * argv[],Source ** sp,struct block ** lp)224*7c356e86SAndroid Build Coastguard Worker main_init(int argc, const char *argv[], Source **sp, struct block **lp)
225*7c356e86SAndroid Build Coastguard Worker {
226*7c356e86SAndroid Build Coastguard Worker 	int argi, i;
227*7c356e86SAndroid Build Coastguard Worker 	Source *s = NULL;
228*7c356e86SAndroid Build Coastguard Worker 	struct block *l;
229*7c356e86SAndroid Build Coastguard Worker 	unsigned char restricted_shell = 0, errexit, utf_flag;
230*7c356e86SAndroid Build Coastguard Worker 	char *cp;
231*7c356e86SAndroid Build Coastguard Worker 	const char *ccp, **wp;
232*7c356e86SAndroid Build Coastguard Worker 	struct tbl *vp;
233*7c356e86SAndroid Build Coastguard Worker 	struct stat s_stdin;
234*7c356e86SAndroid Build Coastguard Worker #if !defined(_PATH_DEFPATH) && defined(_CS_PATH)
235*7c356e86SAndroid Build Coastguard Worker 	ssize_t k;
236*7c356e86SAndroid Build Coastguard Worker #endif
237*7c356e86SAndroid Build Coastguard Worker 
238*7c356e86SAndroid Build Coastguard Worker #if defined(MKSH_EBCDIC) || defined(MKSH_FAUX_EBCDIC)
239*7c356e86SAndroid Build Coastguard Worker 	ebcdic_init();
240*7c356e86SAndroid Build Coastguard Worker #endif
241*7c356e86SAndroid Build Coastguard Worker 	set_ifs(TC_IFSWS);
242*7c356e86SAndroid Build Coastguard Worker 
243*7c356e86SAndroid Build Coastguard Worker #ifdef __OS2__
244*7c356e86SAndroid Build Coastguard Worker 	os2_init(&argc, &argv);
245*7c356e86SAndroid Build Coastguard Worker #define builtin_name_cmp stricmp
246*7c356e86SAndroid Build Coastguard Worker #else
247*7c356e86SAndroid Build Coastguard Worker #define builtin_name_cmp strcmp
248*7c356e86SAndroid Build Coastguard Worker #endif
249*7c356e86SAndroid Build Coastguard Worker 
250*7c356e86SAndroid Build Coastguard Worker 	/* do things like getpgrp() et al. */
251*7c356e86SAndroid Build Coastguard Worker 	chvt_reinit();
252*7c356e86SAndroid Build Coastguard Worker 
253*7c356e86SAndroid Build Coastguard Worker 	/* make sure argv[] is sane, for weird OSes */
254*7c356e86SAndroid Build Coastguard Worker 	if (!*argv) {
255*7c356e86SAndroid Build Coastguard Worker 		argv = empty_argv;
256*7c356e86SAndroid Build Coastguard Worker 		argc = 1;
257*7c356e86SAndroid Build Coastguard Worker 	}
258*7c356e86SAndroid Build Coastguard Worker 	kshname = argv[0];
259*7c356e86SAndroid Build Coastguard Worker 
260*7c356e86SAndroid Build Coastguard Worker 	/* initialise permanent Area */
261*7c356e86SAndroid Build Coastguard Worker 	ainit(&aperm);
262*7c356e86SAndroid Build Coastguard Worker 	/* max. name length: -2147483648 = 11 (+ NUL) */
263*7c356e86SAndroid Build Coastguard Worker 	vtemp = alloc(offsetof(struct tbl, name[0]) + 12, APERM);
264*7c356e86SAndroid Build Coastguard Worker 
265*7c356e86SAndroid Build Coastguard Worker 	/* set up base environment */
266*7c356e86SAndroid Build Coastguard Worker 	env.type = E_NONE;
267*7c356e86SAndroid Build Coastguard Worker 	ainit(&env.area);
268*7c356e86SAndroid Build Coastguard Worker 	/* set up global l->vars and l->funs */
269*7c356e86SAndroid Build Coastguard Worker 	newblock();
270*7c356e86SAndroid Build Coastguard Worker 
271*7c356e86SAndroid Build Coastguard Worker 	/* Do this first so output routines (eg, errorf, shellf) can work */
272*7c356e86SAndroid Build Coastguard Worker 	initio();
273*7c356e86SAndroid Build Coastguard Worker 
274*7c356e86SAndroid Build Coastguard Worker 	/* determine the basename (without '-' or path) of the executable */
275*7c356e86SAndroid Build Coastguard Worker 	ccp = kshname;
276*7c356e86SAndroid Build Coastguard Worker 	goto begin_parsing_kshname;
277*7c356e86SAndroid Build Coastguard Worker 	while ((i = ccp[argi++])) {
278*7c356e86SAndroid Build Coastguard Worker 		if (mksh_cdirsep(i)) {
279*7c356e86SAndroid Build Coastguard Worker 			ccp += argi;
280*7c356e86SAndroid Build Coastguard Worker  begin_parsing_kshname:
281*7c356e86SAndroid Build Coastguard Worker 			argi = 0;
282*7c356e86SAndroid Build Coastguard Worker 		}
283*7c356e86SAndroid Build Coastguard Worker 	}
284*7c356e86SAndroid Build Coastguard Worker 	Flag(FLOGIN) = (ord(*ccp) == ORD('-')) || (ord(*kshname) == ORD('-'));
285*7c356e86SAndroid Build Coastguard Worker 	if (ord(*ccp) == ORD('-'))
286*7c356e86SAndroid Build Coastguard Worker 		++ccp;
287*7c356e86SAndroid Build Coastguard Worker 	if (!*ccp)
288*7c356e86SAndroid Build Coastguard Worker 		ccp = empty_argv[0];
289*7c356e86SAndroid Build Coastguard Worker 
290*7c356e86SAndroid Build Coastguard Worker 	/*
291*7c356e86SAndroid Build Coastguard Worker 	 * Turn on nohup by default. (AT&T ksh does not have a nohup
292*7c356e86SAndroid Build Coastguard Worker 	 * option - it always sends the hup).
293*7c356e86SAndroid Build Coastguard Worker 	 */
294*7c356e86SAndroid Build Coastguard Worker 	Flag(FNOHUP) = 1;
295*7c356e86SAndroid Build Coastguard Worker 
296*7c356e86SAndroid Build Coastguard Worker 	/*
297*7c356e86SAndroid Build Coastguard Worker 	 * Turn on brace expansion by default. AT&T kshs that have
298*7c356e86SAndroid Build Coastguard Worker 	 * alternation always have it on.
299*7c356e86SAndroid Build Coastguard Worker 	 */
300*7c356e86SAndroid Build Coastguard Worker 	Flag(FBRACEEXPAND) = 1;
301*7c356e86SAndroid Build Coastguard Worker 
302*7c356e86SAndroid Build Coastguard Worker 	/*
303*7c356e86SAndroid Build Coastguard Worker 	 * Turn on "set -x" inheritance by default.
304*7c356e86SAndroid Build Coastguard Worker 	 */
305*7c356e86SAndroid Build Coastguard Worker 	Flag(FXTRACEREC) = 1;
306*7c356e86SAndroid Build Coastguard Worker 
307*7c356e86SAndroid Build Coastguard Worker 	/* define built-in commands and see if we were called as one */
308*7c356e86SAndroid Build Coastguard Worker 	ktinit(APERM, &builtins,
309*7c356e86SAndroid Build Coastguard Worker 	    /* currently up to 52 builtins: 75% of 128 = 2^7 */
310*7c356e86SAndroid Build Coastguard Worker 	    7);
311*7c356e86SAndroid Build Coastguard Worker 	for (i = 0; mkshbuiltins[i].name != NULL; ++i) {
312*7c356e86SAndroid Build Coastguard Worker 		const char *builtin_name;
313*7c356e86SAndroid Build Coastguard Worker 
314*7c356e86SAndroid Build Coastguard Worker 		builtin_name = builtin(mkshbuiltins[i].name,
315*7c356e86SAndroid Build Coastguard Worker 		    mkshbuiltins[i].func);
316*7c356e86SAndroid Build Coastguard Worker 		if (!builtin_name_cmp(ccp, builtin_name)) {
317*7c356e86SAndroid Build Coastguard Worker 			/* canonicalise argv[0] */
318*7c356e86SAndroid Build Coastguard Worker 			ccp = builtin_name;
319*7c356e86SAndroid Build Coastguard Worker 			as_builtin = true;
320*7c356e86SAndroid Build Coastguard Worker 		}
321*7c356e86SAndroid Build Coastguard Worker 	}
322*7c356e86SAndroid Build Coastguard Worker 
323*7c356e86SAndroid Build Coastguard Worker 	if (!as_builtin) {
324*7c356e86SAndroid Build Coastguard Worker 		/* check for -T option early */
325*7c356e86SAndroid Build Coastguard Worker 		argi = parse_args(argv, OF_FIRSTTIME, NULL);
326*7c356e86SAndroid Build Coastguard Worker 		if (argi < 0)
327*7c356e86SAndroid Build Coastguard Worker 			return (1);
328*7c356e86SAndroid Build Coastguard Worker 		/* called as rsh, rmksh, -rsh, RKSH.EXE, etc.? */
329*7c356e86SAndroid Build Coastguard Worker 		if (ksh_eq(*ccp, 'R', 'r')) {
330*7c356e86SAndroid Build Coastguard Worker 			++ccp;
331*7c356e86SAndroid Build Coastguard Worker 			++restricted_shell;
332*7c356e86SAndroid Build Coastguard Worker 		}
333*7c356e86SAndroid Build Coastguard Worker #if defined(MKSH_BINSHPOSIX) || defined(MKSH_BINSHREDUCED)
334*7c356e86SAndroid Build Coastguard Worker 		/* are we called as -rsh or /bin/sh or SH.EXE or so? */
335*7c356e86SAndroid Build Coastguard Worker 		if (ksh_eq(ccp[0], 'S', 's') &&
336*7c356e86SAndroid Build Coastguard Worker 		    ksh_eq(ccp[1], 'H', 'h')) {
337*7c356e86SAndroid Build Coastguard Worker 			/* either also turns off braceexpand */
338*7c356e86SAndroid Build Coastguard Worker #ifdef MKSH_BINSHPOSIX
339*7c356e86SAndroid Build Coastguard Worker 			/* enable better POSIX conformance */
340*7c356e86SAndroid Build Coastguard Worker 			change_flag(FPOSIX, OF_FIRSTTIME, true);
341*7c356e86SAndroid Build Coastguard Worker #endif
342*7c356e86SAndroid Build Coastguard Worker #ifdef MKSH_BINSHREDUCED
343*7c356e86SAndroid Build Coastguard Worker 			/* enable kludge/compat mode */
344*7c356e86SAndroid Build Coastguard Worker 			change_flag(FSH, OF_FIRSTTIME, true);
345*7c356e86SAndroid Build Coastguard Worker #endif
346*7c356e86SAndroid Build Coastguard Worker 		}
347*7c356e86SAndroid Build Coastguard Worker #endif
348*7c356e86SAndroid Build Coastguard Worker 	}
349*7c356e86SAndroid Build Coastguard Worker 
350*7c356e86SAndroid Build Coastguard Worker 	initvar();
351*7c356e86SAndroid Build Coastguard Worker 
352*7c356e86SAndroid Build Coastguard Worker 	inittraps();
353*7c356e86SAndroid Build Coastguard Worker 
354*7c356e86SAndroid Build Coastguard Worker 	coproc_init();
355*7c356e86SAndroid Build Coastguard Worker 
356*7c356e86SAndroid Build Coastguard Worker 	/* set up variable and command dictionaries */
357*7c356e86SAndroid Build Coastguard Worker 	ktinit(APERM, &taliases, 0);
358*7c356e86SAndroid Build Coastguard Worker 	ktinit(APERM, &aliases, 0);
359*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_NOPWNAM
360*7c356e86SAndroid Build Coastguard Worker 	ktinit(APERM, &homedirs, 0);
361*7c356e86SAndroid Build Coastguard Worker #endif
362*7c356e86SAndroid Build Coastguard Worker 
363*7c356e86SAndroid Build Coastguard Worker 	/* define shell keywords */
364*7c356e86SAndroid Build Coastguard Worker 	initkeywords();
365*7c356e86SAndroid Build Coastguard Worker 
366*7c356e86SAndroid Build Coastguard Worker 	init_histvec();
367*7c356e86SAndroid Build Coastguard Worker 
368*7c356e86SAndroid Build Coastguard Worker 	/* initialise tty size before importing environment */
369*7c356e86SAndroid Build Coastguard Worker 	change_winsz();
370*7c356e86SAndroid Build Coastguard Worker 
371*7c356e86SAndroid Build Coastguard Worker #ifdef _PATH_DEFPATH
372*7c356e86SAndroid Build Coastguard Worker 	def_path = _PATH_DEFPATH;
373*7c356e86SAndroid Build Coastguard Worker #else
374*7c356e86SAndroid Build Coastguard Worker #ifdef _CS_PATH
375*7c356e86SAndroid Build Coastguard Worker 	if ((k = confstr(_CS_PATH, NULL, 0)) > 0 &&
376*7c356e86SAndroid Build Coastguard Worker 	    confstr(_CS_PATH, cp = alloc(k + 1, APERM), k + 1) == k + 1)
377*7c356e86SAndroid Build Coastguard Worker 		def_path = cp;
378*7c356e86SAndroid Build Coastguard Worker 	else
379*7c356e86SAndroid Build Coastguard Worker #endif
380*7c356e86SAndroid Build Coastguard Worker 		/*
381*7c356e86SAndroid Build Coastguard Worker 		 * this is uniform across all OSes unless it
382*7c356e86SAndroid Build Coastguard Worker 		 * breaks somewhere hard; don't try to optimise,
383*7c356e86SAndroid Build Coastguard Worker 		 * e.g. add stuff for Interix or remove /usr
384*7c356e86SAndroid Build Coastguard Worker 		 * for HURD, because e.g. Debian GNU/HURD is
385*7c356e86SAndroid Build Coastguard Worker 		 * "keeping a regular /usr"; this is supposed
386*7c356e86SAndroid Build Coastguard Worker 		 * to be a sane 'basic' default PATH
387*7c356e86SAndroid Build Coastguard Worker 		 */
388*7c356e86SAndroid Build Coastguard Worker 		def_path = MKSH_UNIXROOT "/bin" MKSH_PATHSEPS
389*7c356e86SAndroid Build Coastguard Worker 		    MKSH_UNIXROOT "/usr/bin" MKSH_PATHSEPS
390*7c356e86SAndroid Build Coastguard Worker 		    MKSH_UNIXROOT "/sbin" MKSH_PATHSEPS
391*7c356e86SAndroid Build Coastguard Worker 		    MKSH_UNIXROOT "/usr/sbin";
392*7c356e86SAndroid Build Coastguard Worker #endif
393*7c356e86SAndroid Build Coastguard Worker 
394*7c356e86SAndroid Build Coastguard Worker 	/*
395*7c356e86SAndroid Build Coastguard Worker 	 * Set PATH to def_path (will set the path global variable).
396*7c356e86SAndroid Build Coastguard Worker 	 * (import of environment below will probably change this setting).
397*7c356e86SAndroid Build Coastguard Worker 	 */
398*7c356e86SAndroid Build Coastguard Worker 	vp = global(TPATH);
399*7c356e86SAndroid Build Coastguard Worker 	/* setstr can't fail here */
400*7c356e86SAndroid Build Coastguard Worker 	setstr(vp, def_path, KSH_RETURN_ERROR);
401*7c356e86SAndroid Build Coastguard Worker 
402*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_NO_CMDLINE_EDITING
403*7c356e86SAndroid Build Coastguard Worker 	/*
404*7c356e86SAndroid Build Coastguard Worker 	 * Set edit mode to emacs by default, may be overridden
405*7c356e86SAndroid Build Coastguard Worker 	 * by the environment or the user. Also, we want tab completion
406*7c356e86SAndroid Build Coastguard Worker 	 * on in vi by default.
407*7c356e86SAndroid Build Coastguard Worker 	 */
408*7c356e86SAndroid Build Coastguard Worker 	change_flag(FEMACS, OF_SPECIAL, true);
409*7c356e86SAndroid Build Coastguard Worker #if !MKSH_S_NOVI
410*7c356e86SAndroid Build Coastguard Worker 	Flag(FVITABCOMPLETE) = 1;
411*7c356e86SAndroid Build Coastguard Worker #endif
412*7c356e86SAndroid Build Coastguard Worker #endif
413*7c356e86SAndroid Build Coastguard Worker 
414*7c356e86SAndroid Build Coastguard Worker 	/* import environment */
415*7c356e86SAndroid Build Coastguard Worker 	init_environ();
416*7c356e86SAndroid Build Coastguard Worker 
417*7c356e86SAndroid Build Coastguard Worker 	/* override default PATH regardless of environment */
418*7c356e86SAndroid Build Coastguard Worker #ifdef MKSH_DEFPATH_OVERRIDE
419*7c356e86SAndroid Build Coastguard Worker 	vp = global(TPATH);
420*7c356e86SAndroid Build Coastguard Worker 	setstr(vp, MKSH_DEFPATH_OVERRIDE, KSH_RETURN_ERROR);
421*7c356e86SAndroid Build Coastguard Worker #endif
422*7c356e86SAndroid Build Coastguard Worker 
423*7c356e86SAndroid Build Coastguard Worker 	/* for security */
424*7c356e86SAndroid Build Coastguard Worker 	typeset(TinitIFS, 0, 0, 0, 0);
425*7c356e86SAndroid Build Coastguard Worker 
426*7c356e86SAndroid Build Coastguard Worker 	/* assign default shell variable values */
427*7c356e86SAndroid Build Coastguard Worker 	typeset("PATHSEP=" MKSH_PATHSEPS, 0, 0, 0, 0);
428*7c356e86SAndroid Build Coastguard Worker 	substitute(initsubs, 0);
429*7c356e86SAndroid Build Coastguard Worker 
430*7c356e86SAndroid Build Coastguard Worker 	/* Figure out the current working directory and set $PWD */
431*7c356e86SAndroid Build Coastguard Worker 	vp = global(TPWD);
432*7c356e86SAndroid Build Coastguard Worker 	cp = str_val(vp);
433*7c356e86SAndroid Build Coastguard Worker 	/* Try to use existing $PWD if it is valid */
434*7c356e86SAndroid Build Coastguard Worker 	set_current_wd((mksh_abspath(cp) && test_eval(NULL, TO_FILEQ, cp,
435*7c356e86SAndroid Build Coastguard Worker 	    Tdot, true)) ? cp : NULL);
436*7c356e86SAndroid Build Coastguard Worker 	if (current_wd[0])
437*7c356e86SAndroid Build Coastguard Worker 		simplify_path(current_wd);
438*7c356e86SAndroid Build Coastguard Worker 	/* Only set pwd if we know where we are or if it had a bogus value */
439*7c356e86SAndroid Build Coastguard Worker 	if (current_wd[0] || *cp)
440*7c356e86SAndroid Build Coastguard Worker 		/* setstr can't fail here */
441*7c356e86SAndroid Build Coastguard Worker 		setstr(vp, current_wd, KSH_RETURN_ERROR);
442*7c356e86SAndroid Build Coastguard Worker 
443*7c356e86SAndroid Build Coastguard Worker 	for (wp = initcoms; *wp != NULL; wp++) {
444*7c356e86SAndroid Build Coastguard Worker 		c_builtin(wp);
445*7c356e86SAndroid Build Coastguard Worker 		while (*wp != NULL)
446*7c356e86SAndroid Build Coastguard Worker 			wp++;
447*7c356e86SAndroid Build Coastguard Worker 	}
448*7c356e86SAndroid Build Coastguard Worker 	setint_n(global("OPTIND"), 1, 10);
449*7c356e86SAndroid Build Coastguard Worker 
450*7c356e86SAndroid Build Coastguard Worker 	kshuid = getuid();
451*7c356e86SAndroid Build Coastguard Worker 	kshgid = getgid();
452*7c356e86SAndroid Build Coastguard Worker 	kshegid = getegid();
453*7c356e86SAndroid Build Coastguard Worker 
454*7c356e86SAndroid Build Coastguard Worker 	safe_prompt = ksheuid ? "$ " : "# ";
455*7c356e86SAndroid Build Coastguard Worker 	vp = global("PS1");
456*7c356e86SAndroid Build Coastguard Worker 	/* Set PS1 if unset or we are root and prompt doesn't contain a # */
457*7c356e86SAndroid Build Coastguard Worker 	if (!(vp->flag & ISSET) ||
458*7c356e86SAndroid Build Coastguard Worker 	    (!ksheuid && !strchr(str_val(vp), '#')))
459*7c356e86SAndroid Build Coastguard Worker 		/* setstr can't fail here */
460*7c356e86SAndroid Build Coastguard Worker 		setstr(vp, safe_prompt, KSH_RETURN_ERROR);
461*7c356e86SAndroid Build Coastguard Worker 	setint_n((vp = global("BASHPID")), 0, 10);
462*7c356e86SAndroid Build Coastguard Worker 	vp->flag |= INT_U;
463*7c356e86SAndroid Build Coastguard Worker 	setint_n((vp = global("PGRP")), (mksh_uari_t)kshpgrp, 10);
464*7c356e86SAndroid Build Coastguard Worker 	vp->flag |= INT_U;
465*7c356e86SAndroid Build Coastguard Worker 	setint_n((vp = global("PPID")), (mksh_uari_t)kshppid, 10);
466*7c356e86SAndroid Build Coastguard Worker 	vp->flag |= INT_U;
467*7c356e86SAndroid Build Coastguard Worker 	setint_n((vp = global("USER_ID")), (mksh_uari_t)ksheuid, 10);
468*7c356e86SAndroid Build Coastguard Worker 	vp->flag |= INT_U;
469*7c356e86SAndroid Build Coastguard Worker 	setint_n((vp = global("KSHUID")), (mksh_uari_t)kshuid, 10);
470*7c356e86SAndroid Build Coastguard Worker 	vp->flag |= INT_U;
471*7c356e86SAndroid Build Coastguard Worker 	setint_n((vp = global("KSHEGID")), (mksh_uari_t)kshegid, 10);
472*7c356e86SAndroid Build Coastguard Worker 	vp->flag |= INT_U;
473*7c356e86SAndroid Build Coastguard Worker 	setint_n((vp = global("KSHGID")), (mksh_uari_t)kshgid, 10);
474*7c356e86SAndroid Build Coastguard Worker 	vp->flag |= INT_U;
475*7c356e86SAndroid Build Coastguard Worker 	setint_n((vp = global("RANDOM")), rndsetup(), 10);
476*7c356e86SAndroid Build Coastguard Worker 	vp->flag |= INT_U;
477*7c356e86SAndroid Build Coastguard Worker 	setint_n((vp_pipest = global("PIPESTATUS")), 0, 10);
478*7c356e86SAndroid Build Coastguard Worker 
479*7c356e86SAndroid Build Coastguard Worker 	/* Set this before parsing arguments */
480*7c356e86SAndroid Build Coastguard Worker 	Flag(FPRIVILEGED) = (kshuid != ksheuid || kshgid != kshegid) ? 2 : 0;
481*7c356e86SAndroid Build Coastguard Worker 
482*7c356e86SAndroid Build Coastguard Worker 	/* record if monitor is set on command line (see j_init() in jobs.c) */
483*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_UNEMPLOYED
484*7c356e86SAndroid Build Coastguard Worker 	Flag(FMONITOR) = 127;
485*7c356e86SAndroid Build Coastguard Worker #endif
486*7c356e86SAndroid Build Coastguard Worker 	/* this to note if utf-8 mode is set on command line (see below) */
487*7c356e86SAndroid Build Coastguard Worker 	UTFMODE = 2;
488*7c356e86SAndroid Build Coastguard Worker 
489*7c356e86SAndroid Build Coastguard Worker 	if (!as_builtin) {
490*7c356e86SAndroid Build Coastguard Worker 		argi = parse_args(argv, OF_CMDLINE, NULL);
491*7c356e86SAndroid Build Coastguard Worker 		if (argi < 0)
492*7c356e86SAndroid Build Coastguard Worker 			return (1);
493*7c356e86SAndroid Build Coastguard Worker 	}
494*7c356e86SAndroid Build Coastguard Worker 
495*7c356e86SAndroid Build Coastguard Worker 	/* process this later only, default to off (hysterical raisins) */
496*7c356e86SAndroid Build Coastguard Worker 	utf_flag = UTFMODE;
497*7c356e86SAndroid Build Coastguard Worker 	UTFMODE = 0;
498*7c356e86SAndroid Build Coastguard Worker 
499*7c356e86SAndroid Build Coastguard Worker 	if (as_builtin) {
500*7c356e86SAndroid Build Coastguard Worker 		/* auto-detect from environment variables, always */
501*7c356e86SAndroid Build Coastguard Worker 		utf_flag = 3;
502*7c356e86SAndroid Build Coastguard Worker 	} else if (Flag(FCOMMAND)) {
503*7c356e86SAndroid Build Coastguard Worker 		s = pushs(SSTRINGCMDLINE, ATEMP);
504*7c356e86SAndroid Build Coastguard Worker 		if (!(s->start = s->str = argv[argi++]))
505*7c356e86SAndroid Build Coastguard Worker 			errorf(Tf_optfoo, "", "", 'c', Treq_arg);
506*7c356e86SAndroid Build Coastguard Worker 		while (*s->str) {
507*7c356e86SAndroid Build Coastguard Worker 			if (ctype(*s->str, C_QUOTE))
508*7c356e86SAndroid Build Coastguard Worker 				break;
509*7c356e86SAndroid Build Coastguard Worker 			s->str++;
510*7c356e86SAndroid Build Coastguard Worker 		}
511*7c356e86SAndroid Build Coastguard Worker 		if (!*s->str)
512*7c356e86SAndroid Build Coastguard Worker 			s->flags |= SF_MAYEXEC;
513*7c356e86SAndroid Build Coastguard Worker 		s->str = s->start;
514*7c356e86SAndroid Build Coastguard Worker #ifdef MKSH_MIDNIGHTBSD01ASH_COMPAT
515*7c356e86SAndroid Build Coastguard Worker 		/* compatibility to MidnightBSD 0.1 /bin/sh (kludge) */
516*7c356e86SAndroid Build Coastguard Worker 		if (Flag(FSH) && argv[argi] && !strcmp(argv[argi], "--"))
517*7c356e86SAndroid Build Coastguard Worker 			++argi;
518*7c356e86SAndroid Build Coastguard Worker #endif
519*7c356e86SAndroid Build Coastguard Worker 		if (argv[argi])
520*7c356e86SAndroid Build Coastguard Worker 			kshname = argv[argi++];
521*7c356e86SAndroid Build Coastguard Worker 	} else if (argi < argc && !Flag(FSTDIN)) {
522*7c356e86SAndroid Build Coastguard Worker 		s = pushs(SFILE, ATEMP);
523*7c356e86SAndroid Build Coastguard Worker #ifdef __OS2__
524*7c356e86SAndroid Build Coastguard Worker 		/*
525*7c356e86SAndroid Build Coastguard Worker 		 * A bug in OS/2 extproc (like shebang) handling makes
526*7c356e86SAndroid Build Coastguard Worker 		 * it not pass the full pathname of a script, so we need
527*7c356e86SAndroid Build Coastguard Worker 		 * to search for it. This changes the behaviour of a
528*7c356e86SAndroid Build Coastguard Worker 		 * simple "mksh foo", but can't be helped.
529*7c356e86SAndroid Build Coastguard Worker 		 */
530*7c356e86SAndroid Build Coastguard Worker 		s->file = argv[argi++];
531*7c356e86SAndroid Build Coastguard Worker 		if (search_access(s->file, X_OK) != 0)
532*7c356e86SAndroid Build Coastguard Worker 			s->file = search_path(s->file, path, X_OK, NULL);
533*7c356e86SAndroid Build Coastguard Worker 		if (!s->file || !*s->file)
534*7c356e86SAndroid Build Coastguard Worker 			s->file = argv[argi - 1];
535*7c356e86SAndroid Build Coastguard Worker #else
536*7c356e86SAndroid Build Coastguard Worker 		s->file = argv[argi++];
537*7c356e86SAndroid Build Coastguard Worker #endif
538*7c356e86SAndroid Build Coastguard Worker 		s->u.shf = shf_open(s->file, O_RDONLY | O_MAYEXEC, 0,
539*7c356e86SAndroid Build Coastguard Worker 		    SHF_MAPHI | SHF_CLEXEC);
540*7c356e86SAndroid Build Coastguard Worker 		if (s->u.shf == NULL) {
541*7c356e86SAndroid Build Coastguard Worker 			shl_stdout_ok = false;
542*7c356e86SAndroid Build Coastguard Worker 			warningf(true, Tf_sD_s, s->file, cstrerror(errno));
543*7c356e86SAndroid Build Coastguard Worker 			/* mandated by SUSv4 */
544*7c356e86SAndroid Build Coastguard Worker 			exstat = 127;
545*7c356e86SAndroid Build Coastguard Worker 			unwind(LERROR);
546*7c356e86SAndroid Build Coastguard Worker 		}
547*7c356e86SAndroid Build Coastguard Worker 		kshname = s->file;
548*7c356e86SAndroid Build Coastguard Worker 	} else {
549*7c356e86SAndroid Build Coastguard Worker 		Flag(FSTDIN) = 1;
550*7c356e86SAndroid Build Coastguard Worker 		s = pushs(SSTDIN, ATEMP);
551*7c356e86SAndroid Build Coastguard Worker 		s->file = "<stdin>";
552*7c356e86SAndroid Build Coastguard Worker 		s->u.shf = shf_fdopen(0, SHF_RD | can_seek(0),
553*7c356e86SAndroid Build Coastguard Worker 		    NULL);
554*7c356e86SAndroid Build Coastguard Worker 		if (isatty(0) && isatty(2)) {
555*7c356e86SAndroid Build Coastguard Worker 			Flag(FTALKING) = Flag(FTALKING_I) = 1;
556*7c356e86SAndroid Build Coastguard Worker 			/* The following only if isatty(0) */
557*7c356e86SAndroid Build Coastguard Worker 			s->flags |= SF_TTY;
558*7c356e86SAndroid Build Coastguard Worker 			s->u.shf->flags |= SHF_INTERRUPT;
559*7c356e86SAndroid Build Coastguard Worker 			s->file = NULL;
560*7c356e86SAndroid Build Coastguard Worker 		}
561*7c356e86SAndroid Build Coastguard Worker 	}
562*7c356e86SAndroid Build Coastguard Worker 
563*7c356e86SAndroid Build Coastguard Worker 	/* this bizarreness is mandated by POSIX */
564*7c356e86SAndroid Build Coastguard Worker 	if (Flag(FTALKING) && fstat(0, &s_stdin) >= 0 &&
565*7c356e86SAndroid Build Coastguard Worker 	    S_ISCHR(s_stdin.st_mode))
566*7c356e86SAndroid Build Coastguard Worker 		reset_nonblock(0);
567*7c356e86SAndroid Build Coastguard Worker 
568*7c356e86SAndroid Build Coastguard Worker 	/* initialise job control */
569*7c356e86SAndroid Build Coastguard Worker 	j_init();
570*7c356e86SAndroid Build Coastguard Worker 	/* do this after j_init() which calls tty_init_state() */
571*7c356e86SAndroid Build Coastguard Worker 	if (Flag(FTALKING)) {
572*7c356e86SAndroid Build Coastguard Worker 		if (utf_flag == 2) {
573*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_ASSUME_UTF8
574*7c356e86SAndroid Build Coastguard Worker 			/* auto-detect from locale or environment */
575*7c356e86SAndroid Build Coastguard Worker 			utf_flag = 4;
576*7c356e86SAndroid Build Coastguard Worker #else /* this may not be an #elif */
577*7c356e86SAndroid Build Coastguard Worker #if MKSH_ASSUME_UTF8
578*7c356e86SAndroid Build Coastguard Worker 			utf_flag = 1;
579*7c356e86SAndroid Build Coastguard Worker #else
580*7c356e86SAndroid Build Coastguard Worker 			/* always disable UTF-8 (for interactive) */
581*7c356e86SAndroid Build Coastguard Worker 			utf_flag = 0;
582*7c356e86SAndroid Build Coastguard Worker #endif
583*7c356e86SAndroid Build Coastguard Worker #endif
584*7c356e86SAndroid Build Coastguard Worker 		}
585*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_NO_CMDLINE_EDITING
586*7c356e86SAndroid Build Coastguard Worker 		x_init();
587*7c356e86SAndroid Build Coastguard Worker #endif
588*7c356e86SAndroid Build Coastguard Worker 	}
589*7c356e86SAndroid Build Coastguard Worker 
590*7c356e86SAndroid Build Coastguard Worker #ifdef SIGWINCH
591*7c356e86SAndroid Build Coastguard Worker 	sigtraps[SIGWINCH].flags |= TF_SHELL_USES;
592*7c356e86SAndroid Build Coastguard Worker 	setsig(&sigtraps[SIGWINCH], x_sigwinch,
593*7c356e86SAndroid Build Coastguard Worker 	    SS_RESTORE_ORIG|SS_FORCE|SS_SHTRAP);
594*7c356e86SAndroid Build Coastguard Worker #endif
595*7c356e86SAndroid Build Coastguard Worker 
596*7c356e86SAndroid Build Coastguard Worker 	l = e->loc;
597*7c356e86SAndroid Build Coastguard Worker 	if (as_builtin) {
598*7c356e86SAndroid Build Coastguard Worker 		l->argc = argc;
599*7c356e86SAndroid Build Coastguard Worker 		l->argv = argv;
600*7c356e86SAndroid Build Coastguard Worker 		l->argv[0] = ccp;
601*7c356e86SAndroid Build Coastguard Worker 	} else {
602*7c356e86SAndroid Build Coastguard Worker 		l->argc = argc - argi;
603*7c356e86SAndroid Build Coastguard Worker 		/*
604*7c356e86SAndroid Build Coastguard Worker 		 * allocate a new array because otherwise, when we modify
605*7c356e86SAndroid Build Coastguard Worker 		 * it in-place, ps(1) output changes; the meaning of argc
606*7c356e86SAndroid Build Coastguard Worker 		 * here is slightly different as it excludes kshname, and
607*7c356e86SAndroid Build Coastguard Worker 		 * we add a trailing NULL sentinel as well
608*7c356e86SAndroid Build Coastguard Worker 		 */
609*7c356e86SAndroid Build Coastguard Worker 		l->argv = alloc2(l->argc + 2, sizeof(void *), APERM);
610*7c356e86SAndroid Build Coastguard Worker 		l->argv[0] = kshname;
611*7c356e86SAndroid Build Coastguard Worker 		memcpy(&l->argv[1], &argv[argi], l->argc * sizeof(void *));
612*7c356e86SAndroid Build Coastguard Worker 		l->argv[l->argc + 1] = NULL;
613*7c356e86SAndroid Build Coastguard Worker 		getopts_reset(1);
614*7c356e86SAndroid Build Coastguard Worker 	}
615*7c356e86SAndroid Build Coastguard Worker 
616*7c356e86SAndroid Build Coastguard Worker 	/* divine the initial state of the utf8-mode Flag */
617*7c356e86SAndroid Build Coastguard Worker 	ccp = null;
618*7c356e86SAndroid Build Coastguard Worker 	switch (utf_flag) {
619*7c356e86SAndroid Build Coastguard Worker 
620*7c356e86SAndroid Build Coastguard Worker 	/* auto-detect from locale or environment */
621*7c356e86SAndroid Build Coastguard Worker 	case 4:
622*7c356e86SAndroid Build Coastguard Worker #if HAVE_SETLOCALE_CTYPE
623*7c356e86SAndroid Build Coastguard Worker 		ccp = setlocale(LC_CTYPE, "");
624*7c356e86SAndroid Build Coastguard Worker #if HAVE_LANGINFO_CODESET
625*7c356e86SAndroid Build Coastguard Worker 		if (!isuc(ccp))
626*7c356e86SAndroid Build Coastguard Worker 			ccp = nl_langinfo(CODESET);
627*7c356e86SAndroid Build Coastguard Worker #endif
628*7c356e86SAndroid Build Coastguard Worker 		if (!isuc(ccp))
629*7c356e86SAndroid Build Coastguard Worker 			ccp = null;
630*7c356e86SAndroid Build Coastguard Worker #endif
631*7c356e86SAndroid Build Coastguard Worker 		/* FALLTHROUGH */
632*7c356e86SAndroid Build Coastguard Worker 
633*7c356e86SAndroid Build Coastguard Worker 	/* auto-detect from environment */
634*7c356e86SAndroid Build Coastguard Worker 	case 3:
635*7c356e86SAndroid Build Coastguard Worker 		/* these were imported from environ earlier */
636*7c356e86SAndroid Build Coastguard Worker 		if (ccp == null)
637*7c356e86SAndroid Build Coastguard Worker 			ccp = str_val(global("LC_ALL"));
638*7c356e86SAndroid Build Coastguard Worker 		if (ccp == null)
639*7c356e86SAndroid Build Coastguard Worker 			ccp = str_val(global("LC_CTYPE"));
640*7c356e86SAndroid Build Coastguard Worker 		if (ccp == null)
641*7c356e86SAndroid Build Coastguard Worker 			ccp = str_val(global("LANG"));
642*7c356e86SAndroid Build Coastguard Worker 		UTFMODE = isuc(ccp);
643*7c356e86SAndroid Build Coastguard Worker 		break;
644*7c356e86SAndroid Build Coastguard Worker 
645*7c356e86SAndroid Build Coastguard Worker 	/* not set on command line, not FTALKING */
646*7c356e86SAndroid Build Coastguard Worker 	case 2:
647*7c356e86SAndroid Build Coastguard Worker 	/* unknown values */
648*7c356e86SAndroid Build Coastguard Worker 	default:
649*7c356e86SAndroid Build Coastguard Worker 		utf_flag = 0;
650*7c356e86SAndroid Build Coastguard Worker 		/* FALLTHROUGH */
651*7c356e86SAndroid Build Coastguard Worker 
652*7c356e86SAndroid Build Coastguard Worker 	/* known values */
653*7c356e86SAndroid Build Coastguard Worker 	case 1:
654*7c356e86SAndroid Build Coastguard Worker 	case 0:
655*7c356e86SAndroid Build Coastguard Worker 		UTFMODE = utf_flag;
656*7c356e86SAndroid Build Coastguard Worker 		break;
657*7c356e86SAndroid Build Coastguard Worker 	}
658*7c356e86SAndroid Build Coastguard Worker 
659*7c356e86SAndroid Build Coastguard Worker 	/* Disable during .profile/ENV reading */
660*7c356e86SAndroid Build Coastguard Worker 	restricted_shell |= Flag(FRESTRICTED);
661*7c356e86SAndroid Build Coastguard Worker 	Flag(FRESTRICTED) = 0;
662*7c356e86SAndroid Build Coastguard Worker 	errexit = Flag(FERREXIT);
663*7c356e86SAndroid Build Coastguard Worker 	Flag(FERREXIT) = 0;
664*7c356e86SAndroid Build Coastguard Worker 
665*7c356e86SAndroid Build Coastguard Worker 	/* save flags for "set +o" handling */
666*7c356e86SAndroid Build Coastguard Worker 	memcpy(baseline_flags, shell_flags, sizeof(shell_flags));
667*7c356e86SAndroid Build Coastguard Worker 	/* disable these because they have special handling */
668*7c356e86SAndroid Build Coastguard Worker 	baseline_flags[(int)FPOSIX] = 0;
669*7c356e86SAndroid Build Coastguard Worker 	baseline_flags[(int)FSH] = 0;
670*7c356e86SAndroid Build Coastguard Worker 	/* ensure these always show up setting, for FPOSIX/FSH */
671*7c356e86SAndroid Build Coastguard Worker 	baseline_flags[(int)FBRACEEXPAND] = 0;
672*7c356e86SAndroid Build Coastguard Worker 	baseline_flags[(int)FUNNYCODE] = 0;
673*7c356e86SAndroid Build Coastguard Worker #if !defined(MKSH_SMALL) || defined(DEBUG)
674*7c356e86SAndroid Build Coastguard Worker 	/* mark as initialised */
675*7c356e86SAndroid Build Coastguard Worker 	baseline_flags[(int)FNFLAGS] = 1;
676*7c356e86SAndroid Build Coastguard Worker #endif
677*7c356e86SAndroid Build Coastguard Worker 	if (as_builtin)
678*7c356e86SAndroid Build Coastguard Worker 		goto skip_startup_files;
679*7c356e86SAndroid Build Coastguard Worker 
680*7c356e86SAndroid Build Coastguard Worker 	/*
681*7c356e86SAndroid Build Coastguard Worker 	 * Do this before profile/$ENV so that if it causes problems in them,
682*7c356e86SAndroid Build Coastguard Worker 	 * user will know why things broke.
683*7c356e86SAndroid Build Coastguard Worker 	 */
684*7c356e86SAndroid Build Coastguard Worker 	if (!current_wd[0] && Flag(FTALKING))
685*7c356e86SAndroid Build Coastguard Worker 		warningf(false, "can't determine current directory");
686*7c356e86SAndroid Build Coastguard Worker 
687*7c356e86SAndroid Build Coastguard Worker 	if (Flag(FLOGIN))
688*7c356e86SAndroid Build Coastguard Worker 		include(MKSH_SYSTEM_PROFILE, 0, NULL, true);
689*7c356e86SAndroid Build Coastguard Worker 	if (Flag(FPRIVILEGED)) {
690*7c356e86SAndroid Build Coastguard Worker 		include(MKSH_SUID_PROFILE, 0, NULL, true);
691*7c356e86SAndroid Build Coastguard Worker 		/* note whether -p was enabled during startup */
692*7c356e86SAndroid Build Coastguard Worker 		if (Flag(FPRIVILEGED) == 1)
693*7c356e86SAndroid Build Coastguard Worker 			/* allow set -p to setuid() later */
694*7c356e86SAndroid Build Coastguard Worker 			Flag(FPRIVILEGED) = 3;
695*7c356e86SAndroid Build Coastguard Worker 		else
696*7c356e86SAndroid Build Coastguard Worker 			/* turn off -p if not set explicitly */
697*7c356e86SAndroid Build Coastguard Worker 			change_flag(FPRIVILEGED, OF_INTERNAL, false);
698*7c356e86SAndroid Build Coastguard Worker 		/* track shell-imposed changes */
699*7c356e86SAndroid Build Coastguard Worker 		baseline_flags[(int)FPRIVILEGED] = Flag(FPRIVILEGED);
700*7c356e86SAndroid Build Coastguard Worker 	} else {
701*7c356e86SAndroid Build Coastguard Worker 		if (Flag(FLOGIN))
702*7c356e86SAndroid Build Coastguard Worker 			include(substitute("$HOME/.profile", 0), 0, NULL, true);
703*7c356e86SAndroid Build Coastguard Worker 		if (Flag(FTALKING)) {
704*7c356e86SAndroid Build Coastguard Worker 			cp = substitute("${ENV:-" MKSHRC_PATH "}", DOTILDE);
705*7c356e86SAndroid Build Coastguard Worker 			if (cp[0] != '\0')
706*7c356e86SAndroid Build Coastguard Worker 				include(cp, 0, NULL, true);
707*7c356e86SAndroid Build Coastguard Worker 		}
708*7c356e86SAndroid Build Coastguard Worker 	}
709*7c356e86SAndroid Build Coastguard Worker 	if (restricted_shell) {
710*7c356e86SAndroid Build Coastguard Worker 		c_builtin(restr_com);
711*7c356e86SAndroid Build Coastguard Worker 		/* After typeset command... */
712*7c356e86SAndroid Build Coastguard Worker 		Flag(FRESTRICTED) = 1;
713*7c356e86SAndroid Build Coastguard Worker 		/* track shell-imposed changes */
714*7c356e86SAndroid Build Coastguard Worker 		baseline_flags[(int)FRESTRICTED] = 1;
715*7c356e86SAndroid Build Coastguard Worker 	}
716*7c356e86SAndroid Build Coastguard Worker 	Flag(FERREXIT) = errexit;
717*7c356e86SAndroid Build Coastguard Worker 
718*7c356e86SAndroid Build Coastguard Worker 	if (Flag(FTALKING) && s)
719*7c356e86SAndroid Build Coastguard Worker 		hist_init(s);
720*7c356e86SAndroid Build Coastguard Worker 	else {
721*7c356e86SAndroid Build Coastguard Worker 		/* set after ENV */
722*7c356e86SAndroid Build Coastguard Worker  skip_startup_files:
723*7c356e86SAndroid Build Coastguard Worker 		Flag(FTRACKALL) = 1;
724*7c356e86SAndroid Build Coastguard Worker 		/* track shell-imposed change (might lower surprise) */
725*7c356e86SAndroid Build Coastguard Worker 		baseline_flags[(int)FTRACKALL] = 1;
726*7c356e86SAndroid Build Coastguard Worker 	}
727*7c356e86SAndroid Build Coastguard Worker 
728*7c356e86SAndroid Build Coastguard Worker 	alarm_init();
729*7c356e86SAndroid Build Coastguard Worker 
730*7c356e86SAndroid Build Coastguard Worker 	*sp = s;
731*7c356e86SAndroid Build Coastguard Worker 	*lp = l;
732*7c356e86SAndroid Build Coastguard Worker 	return (0);
733*7c356e86SAndroid Build Coastguard Worker }
734*7c356e86SAndroid Build Coastguard Worker 
735*7c356e86SAndroid Build Coastguard Worker /* this indirection barrier reduces stack usage during normal operation */
736*7c356e86SAndroid Build Coastguard Worker 
737*7c356e86SAndroid Build Coastguard Worker int
main(int argc,const char * argv[])738*7c356e86SAndroid Build Coastguard Worker main(int argc, const char *argv[])
739*7c356e86SAndroid Build Coastguard Worker {
740*7c356e86SAndroid Build Coastguard Worker 	int rv;
741*7c356e86SAndroid Build Coastguard Worker 	Source *s;
742*7c356e86SAndroid Build Coastguard Worker 	struct block *l;
743*7c356e86SAndroid Build Coastguard Worker 
744*7c356e86SAndroid Build Coastguard Worker 	if ((rv = main_init(argc, argv, &s, &l)) == 0) {
745*7c356e86SAndroid Build Coastguard Worker 		if (as_builtin) {
746*7c356e86SAndroid Build Coastguard Worker 			rv = c_builtin(l->argv);
747*7c356e86SAndroid Build Coastguard Worker 		} else {
748*7c356e86SAndroid Build Coastguard Worker 			shell(s, 0);
749*7c356e86SAndroid Build Coastguard Worker 			/* NOTREACHED */
750*7c356e86SAndroid Build Coastguard Worker 		}
751*7c356e86SAndroid Build Coastguard Worker 	}
752*7c356e86SAndroid Build Coastguard Worker 	return (rv);
753*7c356e86SAndroid Build Coastguard Worker }
754*7c356e86SAndroid Build Coastguard Worker 
755*7c356e86SAndroid Build Coastguard Worker int
include(const char * name,int argc,const char ** argv,bool intr_ok)756*7c356e86SAndroid Build Coastguard Worker include(const char *name, int argc, const char **argv, bool intr_ok)
757*7c356e86SAndroid Build Coastguard Worker {
758*7c356e86SAndroid Build Coastguard Worker 	Source *volatile s = NULL;
759*7c356e86SAndroid Build Coastguard Worker 	struct shf *shf;
760*7c356e86SAndroid Build Coastguard Worker 	const char **volatile old_argv;
761*7c356e86SAndroid Build Coastguard Worker 	volatile int old_argc;
762*7c356e86SAndroid Build Coastguard Worker 	int i;
763*7c356e86SAndroid Build Coastguard Worker 
764*7c356e86SAndroid Build Coastguard Worker 	shf = shf_open(name, O_RDONLY | O_MAYEXEC, 0, SHF_MAPHI | SHF_CLEXEC);
765*7c356e86SAndroid Build Coastguard Worker 	if (shf == NULL)
766*7c356e86SAndroid Build Coastguard Worker 		return (-1);
767*7c356e86SAndroid Build Coastguard Worker 
768*7c356e86SAndroid Build Coastguard Worker 	if (argv) {
769*7c356e86SAndroid Build Coastguard Worker 		old_argv = e->loc->argv;
770*7c356e86SAndroid Build Coastguard Worker 		old_argc = e->loc->argc;
771*7c356e86SAndroid Build Coastguard Worker 	} else {
772*7c356e86SAndroid Build Coastguard Worker 		old_argv = NULL;
773*7c356e86SAndroid Build Coastguard Worker 		old_argc = 0;
774*7c356e86SAndroid Build Coastguard Worker 	}
775*7c356e86SAndroid Build Coastguard Worker 	newenv(E_INCL);
776*7c356e86SAndroid Build Coastguard Worker 	if ((i = kshsetjmp(e->jbuf))) {
777*7c356e86SAndroid Build Coastguard Worker 		quitenv(s ? s->u.shf : NULL);
778*7c356e86SAndroid Build Coastguard Worker 		if (old_argv) {
779*7c356e86SAndroid Build Coastguard Worker 			e->loc->argv = old_argv;
780*7c356e86SAndroid Build Coastguard Worker 			e->loc->argc = old_argc;
781*7c356e86SAndroid Build Coastguard Worker 		}
782*7c356e86SAndroid Build Coastguard Worker 		switch (i) {
783*7c356e86SAndroid Build Coastguard Worker 		case LRETURN:
784*7c356e86SAndroid Build Coastguard Worker 		case LERROR:
785*7c356e86SAndroid Build Coastguard Worker 		case LERREXT:
786*7c356e86SAndroid Build Coastguard Worker 			/* see below */
787*7c356e86SAndroid Build Coastguard Worker 			return (exstat & 0xFF);
788*7c356e86SAndroid Build Coastguard Worker 		case LINTR:
789*7c356e86SAndroid Build Coastguard Worker 			/*
790*7c356e86SAndroid Build Coastguard Worker 			 * intr_ok is set if we are including .profile or $ENV.
791*7c356e86SAndroid Build Coastguard Worker 			 * If user ^Cs out, we don't want to kill the shell...
792*7c356e86SAndroid Build Coastguard Worker 			 */
793*7c356e86SAndroid Build Coastguard Worker 			if (intr_ok && ((exstat & 0xFF) - 128) != SIGTERM)
794*7c356e86SAndroid Build Coastguard Worker 				return (1);
795*7c356e86SAndroid Build Coastguard Worker 			/* FALLTHROUGH */
796*7c356e86SAndroid Build Coastguard Worker 		case LEXIT:
797*7c356e86SAndroid Build Coastguard Worker 		case LLEAVE:
798*7c356e86SAndroid Build Coastguard Worker 		case LSHELL:
799*7c356e86SAndroid Build Coastguard Worker 			unwind(i);
800*7c356e86SAndroid Build Coastguard Worker 			/* NOTREACHED */
801*7c356e86SAndroid Build Coastguard Worker 		default:
802*7c356e86SAndroid Build Coastguard Worker 			internal_errorf(Tunexpected_type, Tunwind, Tsource, i);
803*7c356e86SAndroid Build Coastguard Worker 			/* NOTREACHED */
804*7c356e86SAndroid Build Coastguard Worker 		}
805*7c356e86SAndroid Build Coastguard Worker 	}
806*7c356e86SAndroid Build Coastguard Worker 	if (argv) {
807*7c356e86SAndroid Build Coastguard Worker 		e->loc->argv = argv;
808*7c356e86SAndroid Build Coastguard Worker 		e->loc->argc = argc;
809*7c356e86SAndroid Build Coastguard Worker 	}
810*7c356e86SAndroid Build Coastguard Worker 	s = pushs(SFILE, ATEMP);
811*7c356e86SAndroid Build Coastguard Worker 	s->u.shf = shf;
812*7c356e86SAndroid Build Coastguard Worker 	strdupx(s->file, name, ATEMP);
813*7c356e86SAndroid Build Coastguard Worker 	i = shell(s, 1);
814*7c356e86SAndroid Build Coastguard Worker 	quitenv(s->u.shf);
815*7c356e86SAndroid Build Coastguard Worker 	if (old_argv) {
816*7c356e86SAndroid Build Coastguard Worker 		e->loc->argv = old_argv;
817*7c356e86SAndroid Build Coastguard Worker 		e->loc->argc = old_argc;
818*7c356e86SAndroid Build Coastguard Worker 	}
819*7c356e86SAndroid Build Coastguard Worker 	/* & 0xff to ensure value not -1 */
820*7c356e86SAndroid Build Coastguard Worker 	return (i & 0xFF);
821*7c356e86SAndroid Build Coastguard Worker }
822*7c356e86SAndroid Build Coastguard Worker 
823*7c356e86SAndroid Build Coastguard Worker /* spawn a command into a shell optionally keeping track of the line number */
824*7c356e86SAndroid Build Coastguard Worker int
command(const char * comm,int line)825*7c356e86SAndroid Build Coastguard Worker command(const char *comm, int line)
826*7c356e86SAndroid Build Coastguard Worker {
827*7c356e86SAndroid Build Coastguard Worker 	Source *s, *sold = source;
828*7c356e86SAndroid Build Coastguard Worker 	int rv;
829*7c356e86SAndroid Build Coastguard Worker 
830*7c356e86SAndroid Build Coastguard Worker 	s = pushs(SSTRING, ATEMP);
831*7c356e86SAndroid Build Coastguard Worker 	s->start = s->str = comm;
832*7c356e86SAndroid Build Coastguard Worker 	s->line = line;
833*7c356e86SAndroid Build Coastguard Worker 	rv = shell(s, 1);
834*7c356e86SAndroid Build Coastguard Worker 	source = sold;
835*7c356e86SAndroid Build Coastguard Worker 	return (rv);
836*7c356e86SAndroid Build Coastguard Worker }
837*7c356e86SAndroid Build Coastguard Worker 
838*7c356e86SAndroid Build Coastguard Worker /*
839*7c356e86SAndroid Build Coastguard Worker  * run the commands from the input source, returning status.
840*7c356e86SAndroid Build Coastguard Worker  */
841*7c356e86SAndroid Build Coastguard Worker int
shell(Source * volatile s,volatile int level)842*7c356e86SAndroid Build Coastguard Worker shell(Source * volatile s, volatile int level)
843*7c356e86SAndroid Build Coastguard Worker {
844*7c356e86SAndroid Build Coastguard Worker 	struct op *t;
845*7c356e86SAndroid Build Coastguard Worker 	volatile bool wastty = tobool(s->flags & SF_TTY);
846*7c356e86SAndroid Build Coastguard Worker 	volatile uint8_t attempts = 13;
847*7c356e86SAndroid Build Coastguard Worker 	volatile bool interactive = (level == 0) && Flag(FTALKING);
848*7c356e86SAndroid Build Coastguard Worker 	volatile bool sfirst = true;
849*7c356e86SAndroid Build Coastguard Worker 	Source *volatile old_source = source;
850*7c356e86SAndroid Build Coastguard Worker 	int i;
851*7c356e86SAndroid Build Coastguard Worker 
852*7c356e86SAndroid Build Coastguard Worker 	newenv(level == 2 ? E_EVAL : E_PARSE);
853*7c356e86SAndroid Build Coastguard Worker 	if (level == 2)
854*7c356e86SAndroid Build Coastguard Worker 		e->flags |= EF_IN_EVAL;
855*7c356e86SAndroid Build Coastguard Worker 	if (interactive)
856*7c356e86SAndroid Build Coastguard Worker 		really_exit = false;
857*7c356e86SAndroid Build Coastguard Worker 	switch ((i = kshsetjmp(e->jbuf))) {
858*7c356e86SAndroid Build Coastguard Worker 	case 0:
859*7c356e86SAndroid Build Coastguard Worker 		break;
860*7c356e86SAndroid Build Coastguard Worker 	case LBREAK:
861*7c356e86SAndroid Build Coastguard Worker 	case LCONTIN:
862*7c356e86SAndroid Build Coastguard Worker 		/* assert: interactive == false */
863*7c356e86SAndroid Build Coastguard Worker 		source = old_source;
864*7c356e86SAndroid Build Coastguard Worker 		quitenv(NULL);
865*7c356e86SAndroid Build Coastguard Worker 		if (level == 2) {
866*7c356e86SAndroid Build Coastguard Worker 			/* keep on going */
867*7c356e86SAndroid Build Coastguard Worker 			unwind(i);
868*7c356e86SAndroid Build Coastguard Worker 			/* NOTREACHED */
869*7c356e86SAndroid Build Coastguard Worker 		}
870*7c356e86SAndroid Build Coastguard Worker 		internal_errorf(Tf_cant_s, Tshell,
871*7c356e86SAndroid Build Coastguard Worker 		    i == LBREAK ? Tbreak : Tcontinue);
872*7c356e86SAndroid Build Coastguard Worker 		/* NOTREACHED */
873*7c356e86SAndroid Build Coastguard Worker 	case LINTR:
874*7c356e86SAndroid Build Coastguard Worker 		/* we get here if SIGINT not caught or ignored */
875*7c356e86SAndroid Build Coastguard Worker 	case LERROR:
876*7c356e86SAndroid Build Coastguard Worker 	case LERREXT:
877*7c356e86SAndroid Build Coastguard Worker 	case LSHELL:
878*7c356e86SAndroid Build Coastguard Worker 		if (interactive) {
879*7c356e86SAndroid Build Coastguard Worker 			if (i == LINTR)
880*7c356e86SAndroid Build Coastguard Worker 				shellf("\n");
881*7c356e86SAndroid Build Coastguard Worker 			/*
882*7c356e86SAndroid Build Coastguard Worker 			 * Reset any eof that was read as part of a
883*7c356e86SAndroid Build Coastguard Worker 			 * multiline command.
884*7c356e86SAndroid Build Coastguard Worker 			 */
885*7c356e86SAndroid Build Coastguard Worker 			if (Flag(FIGNOREEOF) && s->type == SEOF && wastty)
886*7c356e86SAndroid Build Coastguard Worker 				s->type = SSTDIN;
887*7c356e86SAndroid Build Coastguard Worker 			/*
888*7c356e86SAndroid Build Coastguard Worker 			 * Used by exit command to get back to
889*7c356e86SAndroid Build Coastguard Worker 			 * top level shell. Kind of strange since
890*7c356e86SAndroid Build Coastguard Worker 			 * interactive is set if we are reading from
891*7c356e86SAndroid Build Coastguard Worker 			 * a tty, but to have stopped jobs, one only
892*7c356e86SAndroid Build Coastguard Worker 			 * needs FMONITOR set (not FTALKING/SF_TTY)...
893*7c356e86SAndroid Build Coastguard Worker 			 */
894*7c356e86SAndroid Build Coastguard Worker 			/* toss any input we have so far */
895*7c356e86SAndroid Build Coastguard Worker 			yyrecursive_pop(true);
896*7c356e86SAndroid Build Coastguard Worker 			s->start = s->str = null;
897*7c356e86SAndroid Build Coastguard Worker 			retrace_info = NULL;
898*7c356e86SAndroid Build Coastguard Worker 			herep = heres;
899*7c356e86SAndroid Build Coastguard Worker 			break;
900*7c356e86SAndroid Build Coastguard Worker 		}
901*7c356e86SAndroid Build Coastguard Worker 		/* FALLTHROUGH */
902*7c356e86SAndroid Build Coastguard Worker 	case LEXIT:
903*7c356e86SAndroid Build Coastguard Worker 	case LLEAVE:
904*7c356e86SAndroid Build Coastguard Worker 	case LRETURN:
905*7c356e86SAndroid Build Coastguard Worker 		source = old_source;
906*7c356e86SAndroid Build Coastguard Worker 		quitenv(NULL);
907*7c356e86SAndroid Build Coastguard Worker 		if (i == LERREXT && level == 2)
908*7c356e86SAndroid Build Coastguard Worker 			return (exstat & 0xFF);
909*7c356e86SAndroid Build Coastguard Worker 		/* keep on going */
910*7c356e86SAndroid Build Coastguard Worker 		unwind(i);
911*7c356e86SAndroid Build Coastguard Worker 		/* NOTREACHED */
912*7c356e86SAndroid Build Coastguard Worker 	default:
913*7c356e86SAndroid Build Coastguard Worker 		source = old_source;
914*7c356e86SAndroid Build Coastguard Worker 		quitenv(NULL);
915*7c356e86SAndroid Build Coastguard Worker 		internal_errorf(Tunexpected_type, Tunwind, Tshell, i);
916*7c356e86SAndroid Build Coastguard Worker 		/* NOTREACHED */
917*7c356e86SAndroid Build Coastguard Worker 	}
918*7c356e86SAndroid Build Coastguard Worker 	while (/* CONSTCOND */ 1) {
919*7c356e86SAndroid Build Coastguard Worker 		if (trap)
920*7c356e86SAndroid Build Coastguard Worker 			runtraps(0);
921*7c356e86SAndroid Build Coastguard Worker 
922*7c356e86SAndroid Build Coastguard Worker 		if (s->next == NULL) {
923*7c356e86SAndroid Build Coastguard Worker 			if (Flag(FVERBOSE))
924*7c356e86SAndroid Build Coastguard Worker 				s->flags |= SF_ECHO;
925*7c356e86SAndroid Build Coastguard Worker 			else
926*7c356e86SAndroid Build Coastguard Worker 				s->flags &= ~SF_ECHO;
927*7c356e86SAndroid Build Coastguard Worker 		}
928*7c356e86SAndroid Build Coastguard Worker 		if (interactive) {
929*7c356e86SAndroid Build Coastguard Worker 			j_notify();
930*7c356e86SAndroid Build Coastguard Worker 			set_prompt(PS1, s);
931*7c356e86SAndroid Build Coastguard Worker 		}
932*7c356e86SAndroid Build Coastguard Worker 		t = compile(s, sfirst, true);
933*7c356e86SAndroid Build Coastguard Worker 		if (interactive)
934*7c356e86SAndroid Build Coastguard Worker 			histsave(&s->line, NULL, HIST_FLUSH, true);
935*7c356e86SAndroid Build Coastguard Worker 		sfirst = false;
936*7c356e86SAndroid Build Coastguard Worker 		if (!t)
937*7c356e86SAndroid Build Coastguard Worker 			goto source_no_tree;
938*7c356e86SAndroid Build Coastguard Worker 		if (t->type == TEOF) {
939*7c356e86SAndroid Build Coastguard Worker 			if (wastty && Flag(FIGNOREEOF) && --attempts > 0) {
940*7c356e86SAndroid Build Coastguard Worker 				shellf("Use 'exit' to leave mksh\n");
941*7c356e86SAndroid Build Coastguard Worker 				s->type = SSTDIN;
942*7c356e86SAndroid Build Coastguard Worker 			} else if (wastty && !really_exit &&
943*7c356e86SAndroid Build Coastguard Worker 			    j_stopped_running()) {
944*7c356e86SAndroid Build Coastguard Worker 				really_exit = true;
945*7c356e86SAndroid Build Coastguard Worker 				s->type = SSTDIN;
946*7c356e86SAndroid Build Coastguard Worker 			} else {
947*7c356e86SAndroid Build Coastguard Worker 				/*
948*7c356e86SAndroid Build Coastguard Worker 				 * this for POSIX which says EXIT traps
949*7c356e86SAndroid Build Coastguard Worker 				 * shall be taken in the environment
950*7c356e86SAndroid Build Coastguard Worker 				 * immediately after the last command
951*7c356e86SAndroid Build Coastguard Worker 				 * executed.
952*7c356e86SAndroid Build Coastguard Worker 				 */
953*7c356e86SAndroid Build Coastguard Worker 				if (level == 0)
954*7c356e86SAndroid Build Coastguard Worker 					unwind(LEXIT);
955*7c356e86SAndroid Build Coastguard Worker 				break;
956*7c356e86SAndroid Build Coastguard Worker 			}
957*7c356e86SAndroid Build Coastguard Worker 		} else if ((s->flags & SF_MAYEXEC) && t->type == TCOM)
958*7c356e86SAndroid Build Coastguard Worker 			t->u.evalflags |= DOTCOMEXEC;
959*7c356e86SAndroid Build Coastguard Worker 		if (!Flag(FNOEXEC) || (s->flags & SF_TTY))
960*7c356e86SAndroid Build Coastguard Worker 			exstat = execute(t, 0, NULL) & 0xFF;
961*7c356e86SAndroid Build Coastguard Worker 
962*7c356e86SAndroid Build Coastguard Worker 		if (t->type != TEOF && interactive && really_exit)
963*7c356e86SAndroid Build Coastguard Worker 			really_exit = false;
964*7c356e86SAndroid Build Coastguard Worker 
965*7c356e86SAndroid Build Coastguard Worker  source_no_tree:
966*7c356e86SAndroid Build Coastguard Worker 		reclaim();
967*7c356e86SAndroid Build Coastguard Worker 	}
968*7c356e86SAndroid Build Coastguard Worker 	source = old_source;
969*7c356e86SAndroid Build Coastguard Worker 	quitenv(NULL);
970*7c356e86SAndroid Build Coastguard Worker 	return (exstat & 0xFF);
971*7c356e86SAndroid Build Coastguard Worker }
972*7c356e86SAndroid Build Coastguard Worker 
973*7c356e86SAndroid Build Coastguard Worker /* return to closest error handler or shell(), exit if none found */
974*7c356e86SAndroid Build Coastguard Worker /* note: i MUST NOT be 0 */
975*7c356e86SAndroid Build Coastguard Worker void
unwind(int i)976*7c356e86SAndroid Build Coastguard Worker unwind(int i)
977*7c356e86SAndroid Build Coastguard Worker {
978*7c356e86SAndroid Build Coastguard Worker 	/* during eval, skip FERREXIT trap */
979*7c356e86SAndroid Build Coastguard Worker 	if (i == LERREXT && (e->flags & EF_IN_EVAL))
980*7c356e86SAndroid Build Coastguard Worker 		goto defer_traps;
981*7c356e86SAndroid Build Coastguard Worker 
982*7c356e86SAndroid Build Coastguard Worker 	/* ordering for EXIT vs ERR is a bit odd (this is what AT&T ksh does) */
983*7c356e86SAndroid Build Coastguard Worker 	if (i == LEXIT || ((i == LERROR || i == LERREXT || i == LINTR) &&
984*7c356e86SAndroid Build Coastguard Worker 	    sigtraps[ksh_SIGEXIT].trap &&
985*7c356e86SAndroid Build Coastguard Worker 	    (!Flag(FTALKING) || Flag(FERREXIT)))) {
986*7c356e86SAndroid Build Coastguard Worker 		++trap_nested;
987*7c356e86SAndroid Build Coastguard Worker 		runtrap(&sigtraps[ksh_SIGEXIT], trap_nested == 1);
988*7c356e86SAndroid Build Coastguard Worker 		--trap_nested;
989*7c356e86SAndroid Build Coastguard Worker 		i = LLEAVE;
990*7c356e86SAndroid Build Coastguard Worker 	} else if (Flag(FERREXIT) && (i == LERROR || i == LERREXT || i == LINTR)) {
991*7c356e86SAndroid Build Coastguard Worker 		++trap_nested;
992*7c356e86SAndroid Build Coastguard Worker 		runtrap(&sigtraps[ksh_SIGERR], trap_nested == 1);
993*7c356e86SAndroid Build Coastguard Worker 		--trap_nested;
994*7c356e86SAndroid Build Coastguard Worker 		i = LLEAVE;
995*7c356e86SAndroid Build Coastguard Worker 	}
996*7c356e86SAndroid Build Coastguard Worker  defer_traps:
997*7c356e86SAndroid Build Coastguard Worker 
998*7c356e86SAndroid Build Coastguard Worker 	while (/* CONSTCOND */ 1) {
999*7c356e86SAndroid Build Coastguard Worker 		switch (e->type) {
1000*7c356e86SAndroid Build Coastguard Worker 		case E_PARSE:
1001*7c356e86SAndroid Build Coastguard Worker 		case E_FUNC:
1002*7c356e86SAndroid Build Coastguard Worker 		case E_INCL:
1003*7c356e86SAndroid Build Coastguard Worker 		case E_LOOP:
1004*7c356e86SAndroid Build Coastguard Worker 		case E_ERRH:
1005*7c356e86SAndroid Build Coastguard Worker 		case E_EVAL:
1006*7c356e86SAndroid Build Coastguard Worker 			kshlongjmp(e->jbuf, i);
1007*7c356e86SAndroid Build Coastguard Worker 			/* NOTREACHED */
1008*7c356e86SAndroid Build Coastguard Worker 		case E_NONE:
1009*7c356e86SAndroid Build Coastguard Worker 			if (i == LINTR)
1010*7c356e86SAndroid Build Coastguard Worker 				e->flags |= EF_FAKE_SIGDIE;
1011*7c356e86SAndroid Build Coastguard Worker 			/* FALLTHROUGH */
1012*7c356e86SAndroid Build Coastguard Worker 		default:
1013*7c356e86SAndroid Build Coastguard Worker 			quitenv(NULL);
1014*7c356e86SAndroid Build Coastguard Worker 		}
1015*7c356e86SAndroid Build Coastguard Worker 	}
1016*7c356e86SAndroid Build Coastguard Worker }
1017*7c356e86SAndroid Build Coastguard Worker 
1018*7c356e86SAndroid Build Coastguard Worker void
newenv(int type)1019*7c356e86SAndroid Build Coastguard Worker newenv(int type)
1020*7c356e86SAndroid Build Coastguard Worker {
1021*7c356e86SAndroid Build Coastguard Worker 	struct env *ep;
1022*7c356e86SAndroid Build Coastguard Worker 	char *cp;
1023*7c356e86SAndroid Build Coastguard Worker 
1024*7c356e86SAndroid Build Coastguard Worker 	/*
1025*7c356e86SAndroid Build Coastguard Worker 	 * struct env includes ALLOC_ITEM for alignment constraints
1026*7c356e86SAndroid Build Coastguard Worker 	 * so first get the actually used memory, then assign it
1027*7c356e86SAndroid Build Coastguard Worker 	 */
1028*7c356e86SAndroid Build Coastguard Worker 	cp = alloc(sizeof(struct env) - sizeof(ALLOC_ITEM), ATEMP);
1029*7c356e86SAndroid Build Coastguard Worker 	/* undo what alloc() did to the malloc result address */
1030*7c356e86SAndroid Build Coastguard Worker 	ep = (void *)(cp - sizeof(ALLOC_ITEM));
1031*7c356e86SAndroid Build Coastguard Worker 	/* initialise public members of struct env (not the ALLOC_ITEM) */
1032*7c356e86SAndroid Build Coastguard Worker 	ainit(&ep->area);
1033*7c356e86SAndroid Build Coastguard Worker 	ep->oenv = e;
1034*7c356e86SAndroid Build Coastguard Worker 	ep->loc = e->loc;
1035*7c356e86SAndroid Build Coastguard Worker 	ep->savefd = NULL;
1036*7c356e86SAndroid Build Coastguard Worker 	ep->temps = NULL;
1037*7c356e86SAndroid Build Coastguard Worker 	ep->yyrecursive_statep = NULL;
1038*7c356e86SAndroid Build Coastguard Worker 	ep->type = type;
1039*7c356e86SAndroid Build Coastguard Worker 	ep->flags = e->flags & EF_IN_EVAL;
1040*7c356e86SAndroid Build Coastguard Worker 	e = ep;
1041*7c356e86SAndroid Build Coastguard Worker }
1042*7c356e86SAndroid Build Coastguard Worker 
1043*7c356e86SAndroid Build Coastguard Worker void
quitenv(struct shf * shf)1044*7c356e86SAndroid Build Coastguard Worker quitenv(struct shf *shf)
1045*7c356e86SAndroid Build Coastguard Worker {
1046*7c356e86SAndroid Build Coastguard Worker 	struct env *ep = e;
1047*7c356e86SAndroid Build Coastguard Worker 	char *cp;
1048*7c356e86SAndroid Build Coastguard Worker 	int fd;
1049*7c356e86SAndroid Build Coastguard Worker 
1050*7c356e86SAndroid Build Coastguard Worker 	yyrecursive_pop(true);
1051*7c356e86SAndroid Build Coastguard Worker 	while (ep->oenv && ep->oenv->loc != ep->loc)
1052*7c356e86SAndroid Build Coastguard Worker 		popblock();
1053*7c356e86SAndroid Build Coastguard Worker 	if (ep->savefd != NULL) {
1054*7c356e86SAndroid Build Coastguard Worker 		for (fd = 0; fd < NUFILE; fd++)
1055*7c356e86SAndroid Build Coastguard Worker 			/* if ep->savefd[fd] < 0, means fd was closed */
1056*7c356e86SAndroid Build Coastguard Worker 			if (ep->savefd[fd])
1057*7c356e86SAndroid Build Coastguard Worker 				restfd(fd, ep->savefd[fd]);
1058*7c356e86SAndroid Build Coastguard Worker 		if (ep->savefd[2])
1059*7c356e86SAndroid Build Coastguard Worker 			/* Clear any write errors */
1060*7c356e86SAndroid Build Coastguard Worker 			shf_reopen(2, SHF_WR, shl_out);
1061*7c356e86SAndroid Build Coastguard Worker 	}
1062*7c356e86SAndroid Build Coastguard Worker 	/*
1063*7c356e86SAndroid Build Coastguard Worker 	 * Bottom of the stack.
1064*7c356e86SAndroid Build Coastguard Worker 	 * Either main shell is exiting or cleanup_parents_env() was called.
1065*7c356e86SAndroid Build Coastguard Worker 	 */
1066*7c356e86SAndroid Build Coastguard Worker 	if (ep->oenv == NULL) {
1067*7c356e86SAndroid Build Coastguard Worker #ifdef DEBUG_LEAKS
1068*7c356e86SAndroid Build Coastguard Worker 		int i;
1069*7c356e86SAndroid Build Coastguard Worker #endif
1070*7c356e86SAndroid Build Coastguard Worker 
1071*7c356e86SAndroid Build Coastguard Worker 		if (ep->type == E_NONE) {
1072*7c356e86SAndroid Build Coastguard Worker 			/* Main shell exiting? */
1073*7c356e86SAndroid Build Coastguard Worker #if HAVE_PERSISTENT_HISTORY
1074*7c356e86SAndroid Build Coastguard Worker 			if (Flag(FTALKING))
1075*7c356e86SAndroid Build Coastguard Worker 				hist_finish();
1076*7c356e86SAndroid Build Coastguard Worker #endif
1077*7c356e86SAndroid Build Coastguard Worker 			j_exit();
1078*7c356e86SAndroid Build Coastguard Worker 			if (ep->flags & EF_FAKE_SIGDIE) {
1079*7c356e86SAndroid Build Coastguard Worker 				int sig = (exstat & 0xFF) - 128;
1080*7c356e86SAndroid Build Coastguard Worker 
1081*7c356e86SAndroid Build Coastguard Worker 				/*
1082*7c356e86SAndroid Build Coastguard Worker 				 * ham up our death a bit (AT&T ksh
1083*7c356e86SAndroid Build Coastguard Worker 				 * only seems to do this for SIGTERM)
1084*7c356e86SAndroid Build Coastguard Worker 				 * Don't do it for SIGQUIT, since we'd
1085*7c356e86SAndroid Build Coastguard Worker 				 * dump a core..
1086*7c356e86SAndroid Build Coastguard Worker 				 */
1087*7c356e86SAndroid Build Coastguard Worker 				if ((sig == SIGINT || sig == SIGTERM) &&
1088*7c356e86SAndroid Build Coastguard Worker 				    (kshpgrp == kshpid)) {
1089*7c356e86SAndroid Build Coastguard Worker 					setsig(&sigtraps[sig], SIG_DFL,
1090*7c356e86SAndroid Build Coastguard Worker 					    SS_RESTORE_CURR | SS_FORCE);
1091*7c356e86SAndroid Build Coastguard Worker 					kill(0, sig);
1092*7c356e86SAndroid Build Coastguard Worker 				}
1093*7c356e86SAndroid Build Coastguard Worker 			}
1094*7c356e86SAndroid Build Coastguard Worker 		}
1095*7c356e86SAndroid Build Coastguard Worker 		if (shf)
1096*7c356e86SAndroid Build Coastguard Worker 			shf_close(shf);
1097*7c356e86SAndroid Build Coastguard Worker 		reclaim();
1098*7c356e86SAndroid Build Coastguard Worker #ifdef DEBUG_LEAKS
1099*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_NO_CMDLINE_EDITING
1100*7c356e86SAndroid Build Coastguard Worker 		x_done();
1101*7c356e86SAndroid Build Coastguard Worker #endif
1102*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_NOPROSPECTOFWORK
1103*7c356e86SAndroid Build Coastguard Worker 		/* block at least SIGCHLD during/after afreeall */
1104*7c356e86SAndroid Build Coastguard Worker 		sigprocmask(SIG_BLOCK, &sm_sigchld, NULL);
1105*7c356e86SAndroid Build Coastguard Worker #endif
1106*7c356e86SAndroid Build Coastguard Worker 		afreeall(APERM);
1107*7c356e86SAndroid Build Coastguard Worker 		for (fd = 3; fd < NUFILE; fd++)
1108*7c356e86SAndroid Build Coastguard Worker 			if ((i = fcntl(fd, F_GETFD, 0)) != -1 &&
1109*7c356e86SAndroid Build Coastguard Worker 			    (i & FD_CLOEXEC))
1110*7c356e86SAndroid Build Coastguard Worker 				close(fd);
1111*7c356e86SAndroid Build Coastguard Worker 		close(2);
1112*7c356e86SAndroid Build Coastguard Worker 		close(1);
1113*7c356e86SAndroid Build Coastguard Worker 		close(0);
1114*7c356e86SAndroid Build Coastguard Worker #endif
1115*7c356e86SAndroid Build Coastguard Worker 		exit(exstat & 0xFF);
1116*7c356e86SAndroid Build Coastguard Worker 	}
1117*7c356e86SAndroid Build Coastguard Worker 	if (shf)
1118*7c356e86SAndroid Build Coastguard Worker 		shf_close(shf);
1119*7c356e86SAndroid Build Coastguard Worker 	reclaim();
1120*7c356e86SAndroid Build Coastguard Worker 
1121*7c356e86SAndroid Build Coastguard Worker 	e = e->oenv;
1122*7c356e86SAndroid Build Coastguard Worker 
1123*7c356e86SAndroid Build Coastguard Worker 	/* free the struct env - tricky due to the ALLOC_ITEM inside */
1124*7c356e86SAndroid Build Coastguard Worker 	cp = (void *)ep;
1125*7c356e86SAndroid Build Coastguard Worker 	afree(cp + sizeof(ALLOC_ITEM), ATEMP);
1126*7c356e86SAndroid Build Coastguard Worker }
1127*7c356e86SAndroid Build Coastguard Worker 
1128*7c356e86SAndroid Build Coastguard Worker /* Called after a fork to cleanup stuff left over from parents environment */
1129*7c356e86SAndroid Build Coastguard Worker void
cleanup_parents_env(void)1130*7c356e86SAndroid Build Coastguard Worker cleanup_parents_env(void)
1131*7c356e86SAndroid Build Coastguard Worker {
1132*7c356e86SAndroid Build Coastguard Worker 	struct env *ep;
1133*7c356e86SAndroid Build Coastguard Worker 	int fd;
1134*7c356e86SAndroid Build Coastguard Worker 
1135*7c356e86SAndroid Build Coastguard Worker 	/*
1136*7c356e86SAndroid Build Coastguard Worker 	 * Don't clean up temporary files - parent will probably need them.
1137*7c356e86SAndroid Build Coastguard Worker 	 * Also, can't easily reclaim memory since variables, etc. could be
1138*7c356e86SAndroid Build Coastguard Worker 	 * anywhere.
1139*7c356e86SAndroid Build Coastguard Worker 	 */
1140*7c356e86SAndroid Build Coastguard Worker 
1141*7c356e86SAndroid Build Coastguard Worker 	/* close all file descriptors hiding in savefd */
1142*7c356e86SAndroid Build Coastguard Worker 	for (ep = e; ep; ep = ep->oenv) {
1143*7c356e86SAndroid Build Coastguard Worker 		if (ep->savefd) {
1144*7c356e86SAndroid Build Coastguard Worker 			for (fd = 0; fd < NUFILE; fd++)
1145*7c356e86SAndroid Build Coastguard Worker 				if (ep->savefd[fd] > 0)
1146*7c356e86SAndroid Build Coastguard Worker 					close(ep->savefd[fd]);
1147*7c356e86SAndroid Build Coastguard Worker 			afree(ep->savefd, &ep->area);
1148*7c356e86SAndroid Build Coastguard Worker 			ep->savefd = NULL;
1149*7c356e86SAndroid Build Coastguard Worker 		}
1150*7c356e86SAndroid Build Coastguard Worker #ifdef DEBUG_LEAKS
1151*7c356e86SAndroid Build Coastguard Worker 		if (ep->type != E_NONE)
1152*7c356e86SAndroid Build Coastguard Worker 			ep->type = E_GONE;
1153*7c356e86SAndroid Build Coastguard Worker #endif
1154*7c356e86SAndroid Build Coastguard Worker 	}
1155*7c356e86SAndroid Build Coastguard Worker #ifndef DEBUG_LEAKS
1156*7c356e86SAndroid Build Coastguard Worker 	e->oenv = NULL;
1157*7c356e86SAndroid Build Coastguard Worker #endif
1158*7c356e86SAndroid Build Coastguard Worker }
1159*7c356e86SAndroid Build Coastguard Worker 
1160*7c356e86SAndroid Build Coastguard Worker /* Called just before an execve cleanup stuff temporary files */
1161*7c356e86SAndroid Build Coastguard Worker void
cleanup_proc_env(void)1162*7c356e86SAndroid Build Coastguard Worker cleanup_proc_env(void)
1163*7c356e86SAndroid Build Coastguard Worker {
1164*7c356e86SAndroid Build Coastguard Worker 	struct env *ep;
1165*7c356e86SAndroid Build Coastguard Worker 
1166*7c356e86SAndroid Build Coastguard Worker 	for (ep = e; ep; ep = ep->oenv)
1167*7c356e86SAndroid Build Coastguard Worker 		remove_temps(ep->temps);
1168*7c356e86SAndroid Build Coastguard Worker }
1169*7c356e86SAndroid Build Coastguard Worker 
1170*7c356e86SAndroid Build Coastguard Worker /* remove temp files and free ATEMP Area */
1171*7c356e86SAndroid Build Coastguard Worker static void
reclaim(void)1172*7c356e86SAndroid Build Coastguard Worker reclaim(void)
1173*7c356e86SAndroid Build Coastguard Worker {
1174*7c356e86SAndroid Build Coastguard Worker 	struct block *l;
1175*7c356e86SAndroid Build Coastguard Worker 
1176*7c356e86SAndroid Build Coastguard Worker 	while ((l = e->loc) && (!e->oenv || e->oenv->loc != l)) {
1177*7c356e86SAndroid Build Coastguard Worker 		e->loc = l->next;
1178*7c356e86SAndroid Build Coastguard Worker 		afreeall(&l->area);
1179*7c356e86SAndroid Build Coastguard Worker 	}
1180*7c356e86SAndroid Build Coastguard Worker 
1181*7c356e86SAndroid Build Coastguard Worker 	remove_temps(e->temps);
1182*7c356e86SAndroid Build Coastguard Worker 	e->temps = NULL;
1183*7c356e86SAndroid Build Coastguard Worker 
1184*7c356e86SAndroid Build Coastguard Worker 	/*
1185*7c356e86SAndroid Build Coastguard Worker 	 * if the memory backing source is reclaimed, things
1186*7c356e86SAndroid Build Coastguard Worker 	 * will end up badly when a function expecting it to
1187*7c356e86SAndroid Build Coastguard Worker 	 * be valid is run; a NULL pointer is easily debugged
1188*7c356e86SAndroid Build Coastguard Worker 	 */
1189*7c356e86SAndroid Build Coastguard Worker 	if (source && source->areap == &e->area)
1190*7c356e86SAndroid Build Coastguard Worker 		source = NULL;
1191*7c356e86SAndroid Build Coastguard Worker 	afreeall(&e->area);
1192*7c356e86SAndroid Build Coastguard Worker }
1193*7c356e86SAndroid Build Coastguard Worker 
1194*7c356e86SAndroid Build Coastguard Worker static void
remove_temps(struct temp * tp)1195*7c356e86SAndroid Build Coastguard Worker remove_temps(struct temp *tp)
1196*7c356e86SAndroid Build Coastguard Worker {
1197*7c356e86SAndroid Build Coastguard Worker 	while (tp) {
1198*7c356e86SAndroid Build Coastguard Worker 		if (tp->pid == procpid)
1199*7c356e86SAndroid Build Coastguard Worker 			unlink(tp->tffn);
1200*7c356e86SAndroid Build Coastguard Worker 		tp = tp->next;
1201*7c356e86SAndroid Build Coastguard Worker 	}
1202*7c356e86SAndroid Build Coastguard Worker }
1203*7c356e86SAndroid Build Coastguard Worker 
1204*7c356e86SAndroid Build Coastguard Worker /*
1205*7c356e86SAndroid Build Coastguard Worker  * Initialise tty_fd. Used for tracking the size of the terminal,
1206*7c356e86SAndroid Build Coastguard Worker  * saving/resetting tty modes upon foreground job completion, and
1207*7c356e86SAndroid Build Coastguard Worker  * for setting up the tty process group. Return values:
1208*7c356e86SAndroid Build Coastguard Worker  *	0 = got controlling tty
1209*7c356e86SAndroid Build Coastguard Worker  *	1 = got terminal but no controlling tty
1210*7c356e86SAndroid Build Coastguard Worker  *	2 = cannot find a terminal
1211*7c356e86SAndroid Build Coastguard Worker  *	3 = cannot dup fd
1212*7c356e86SAndroid Build Coastguard Worker  *	4 = cannot make fd close-on-exec
1213*7c356e86SAndroid Build Coastguard Worker  * An existing tty_fd is cached if no "better" one could be found,
1214*7c356e86SAndroid Build Coastguard Worker  * i.e. if tty_devtty was already set or the new would not set it.
1215*7c356e86SAndroid Build Coastguard Worker  */
1216*7c356e86SAndroid Build Coastguard Worker int
tty_init_fd(void)1217*7c356e86SAndroid Build Coastguard Worker tty_init_fd(void)
1218*7c356e86SAndroid Build Coastguard Worker {
1219*7c356e86SAndroid Build Coastguard Worker 	int fd, rv, eno = 0;
1220*7c356e86SAndroid Build Coastguard Worker 	bool do_close = false, is_devtty = true;
1221*7c356e86SAndroid Build Coastguard Worker 
1222*7c356e86SAndroid Build Coastguard Worker 	if (tty_devtty) {
1223*7c356e86SAndroid Build Coastguard Worker 		/* already got a tty which is /dev/tty */
1224*7c356e86SAndroid Build Coastguard Worker 		return (0);
1225*7c356e86SAndroid Build Coastguard Worker 	}
1226*7c356e86SAndroid Build Coastguard Worker 
1227*7c356e86SAndroid Build Coastguard Worker #ifdef _UWIN
1228*7c356e86SAndroid Build Coastguard Worker 	/*XXX imake style */
1229*7c356e86SAndroid Build Coastguard Worker 	if (isatty(3)) {
1230*7c356e86SAndroid Build Coastguard Worker 		/* fd 3 on UWIN _is_ /dev/tty (or our controlling tty) */
1231*7c356e86SAndroid Build Coastguard Worker 		fd = 3;
1232*7c356e86SAndroid Build Coastguard Worker 		goto got_fd;
1233*7c356e86SAndroid Build Coastguard Worker 	}
1234*7c356e86SAndroid Build Coastguard Worker #endif
1235*7c356e86SAndroid Build Coastguard Worker 	if ((fd = open(T_devtty, O_RDWR, 0)) >= 0) {
1236*7c356e86SAndroid Build Coastguard Worker 		do_close = true;
1237*7c356e86SAndroid Build Coastguard Worker 		goto got_fd;
1238*7c356e86SAndroid Build Coastguard Worker 	}
1239*7c356e86SAndroid Build Coastguard Worker 	eno = errno;
1240*7c356e86SAndroid Build Coastguard Worker 
1241*7c356e86SAndroid Build Coastguard Worker 	if (tty_fd >= 0) {
1242*7c356e86SAndroid Build Coastguard Worker 		/* already got a non-devtty one */
1243*7c356e86SAndroid Build Coastguard Worker 		rv = 1;
1244*7c356e86SAndroid Build Coastguard Worker 		goto out;
1245*7c356e86SAndroid Build Coastguard Worker 	}
1246*7c356e86SAndroid Build Coastguard Worker 	is_devtty = false;
1247*7c356e86SAndroid Build Coastguard Worker 
1248*7c356e86SAndroid Build Coastguard Worker 	if (isatty((fd = 0)) || isatty((fd = 2)))
1249*7c356e86SAndroid Build Coastguard Worker 		goto got_fd;
1250*7c356e86SAndroid Build Coastguard Worker 	/* cannot find one */
1251*7c356e86SAndroid Build Coastguard Worker 	rv = 2;
1252*7c356e86SAndroid Build Coastguard Worker 	/* assert: do_close == false */
1253*7c356e86SAndroid Build Coastguard Worker 	goto out;
1254*7c356e86SAndroid Build Coastguard Worker 
1255*7c356e86SAndroid Build Coastguard Worker  got_fd:
1256*7c356e86SAndroid Build Coastguard Worker 	if ((rv = fcntl(fd, F_DUPFD, FDBASE)) < 0) {
1257*7c356e86SAndroid Build Coastguard Worker 		eno = errno;
1258*7c356e86SAndroid Build Coastguard Worker 		rv = 3;
1259*7c356e86SAndroid Build Coastguard Worker 		goto out;
1260*7c356e86SAndroid Build Coastguard Worker 	}
1261*7c356e86SAndroid Build Coastguard Worker 	if (fcntl(rv, F_SETFD, FD_CLOEXEC) < 0) {
1262*7c356e86SAndroid Build Coastguard Worker 		eno = errno;
1263*7c356e86SAndroid Build Coastguard Worker 		close(rv);
1264*7c356e86SAndroid Build Coastguard Worker 		rv = 4;
1265*7c356e86SAndroid Build Coastguard Worker 		goto out;
1266*7c356e86SAndroid Build Coastguard Worker 	}
1267*7c356e86SAndroid Build Coastguard Worker 	tty_fd = rv;
1268*7c356e86SAndroid Build Coastguard Worker 	tty_devtty = is_devtty;
1269*7c356e86SAndroid Build Coastguard Worker 	rv = eno = 0;
1270*7c356e86SAndroid Build Coastguard Worker  out:
1271*7c356e86SAndroid Build Coastguard Worker 	if (do_close)
1272*7c356e86SAndroid Build Coastguard Worker 		close(fd);
1273*7c356e86SAndroid Build Coastguard Worker 	errno = eno;
1274*7c356e86SAndroid Build Coastguard Worker 	return (rv);
1275*7c356e86SAndroid Build Coastguard Worker }
1276*7c356e86SAndroid Build Coastguard Worker 
1277*7c356e86SAndroid Build Coastguard Worker /* A shell error occurred (eg, syntax error, etc.) */
1278*7c356e86SAndroid Build Coastguard Worker 
1279*7c356e86SAndroid Build Coastguard Worker #define VWARNINGF_ERRORPREFIX	1
1280*7c356e86SAndroid Build Coastguard Worker #define VWARNINGF_FILELINE	2
1281*7c356e86SAndroid Build Coastguard Worker #define VWARNINGF_BUILTIN	4
1282*7c356e86SAndroid Build Coastguard Worker #define VWARNINGF_INTERNAL	8
1283*7c356e86SAndroid Build Coastguard Worker 
1284*7c356e86SAndroid Build Coastguard Worker static void vwarningf(unsigned int, const char *, va_list)
1285*7c356e86SAndroid Build Coastguard Worker     MKSH_A_FORMAT(__printf__, 2, 0);
1286*7c356e86SAndroid Build Coastguard Worker 
1287*7c356e86SAndroid Build Coastguard Worker static void
vwarningf(unsigned int flags,const char * fmt,va_list ap)1288*7c356e86SAndroid Build Coastguard Worker vwarningf(unsigned int flags, const char *fmt, va_list ap)
1289*7c356e86SAndroid Build Coastguard Worker {
1290*7c356e86SAndroid Build Coastguard Worker 	if (fmt) {
1291*7c356e86SAndroid Build Coastguard Worker 		if (flags & VWARNINGF_INTERNAL)
1292*7c356e86SAndroid Build Coastguard Worker 			shf_fprintf(shl_out, Tf_sD_, "internal error");
1293*7c356e86SAndroid Build Coastguard Worker 		if (flags & VWARNINGF_ERRORPREFIX)
1294*7c356e86SAndroid Build Coastguard Worker 			error_prefix(tobool(flags & VWARNINGF_FILELINE));
1295*7c356e86SAndroid Build Coastguard Worker 		if ((flags & VWARNINGF_BUILTIN) &&
1296*7c356e86SAndroid Build Coastguard Worker 		    /* not set when main() calls parse_args() */
1297*7c356e86SAndroid Build Coastguard Worker 		    builtin_argv0 && builtin_argv0 != kshname)
1298*7c356e86SAndroid Build Coastguard Worker 			shf_fprintf(shl_out, Tf_sD_, builtin_argv0);
1299*7c356e86SAndroid Build Coastguard Worker 		shf_vfprintf(shl_out, fmt, ap);
1300*7c356e86SAndroid Build Coastguard Worker 		shf_putchar('\n', shl_out);
1301*7c356e86SAndroid Build Coastguard Worker 	}
1302*7c356e86SAndroid Build Coastguard Worker 	shf_flush(shl_out);
1303*7c356e86SAndroid Build Coastguard Worker }
1304*7c356e86SAndroid Build Coastguard Worker 
1305*7c356e86SAndroid Build Coastguard Worker void
errorfx(int rc,const char * fmt,...)1306*7c356e86SAndroid Build Coastguard Worker errorfx(int rc, const char *fmt, ...)
1307*7c356e86SAndroid Build Coastguard Worker {
1308*7c356e86SAndroid Build Coastguard Worker 	va_list va;
1309*7c356e86SAndroid Build Coastguard Worker 
1310*7c356e86SAndroid Build Coastguard Worker 	exstat = rc;
1311*7c356e86SAndroid Build Coastguard Worker 
1312*7c356e86SAndroid Build Coastguard Worker 	/* debugging: note that stdout not valid */
1313*7c356e86SAndroid Build Coastguard Worker 	shl_stdout_ok = false;
1314*7c356e86SAndroid Build Coastguard Worker 
1315*7c356e86SAndroid Build Coastguard Worker 	va_start(va, fmt);
1316*7c356e86SAndroid Build Coastguard Worker 	vwarningf(VWARNINGF_ERRORPREFIX | VWARNINGF_FILELINE, fmt, va);
1317*7c356e86SAndroid Build Coastguard Worker 	va_end(va);
1318*7c356e86SAndroid Build Coastguard Worker 	unwind(LERROR);
1319*7c356e86SAndroid Build Coastguard Worker }
1320*7c356e86SAndroid Build Coastguard Worker 
1321*7c356e86SAndroid Build Coastguard Worker void
errorf(const char * fmt,...)1322*7c356e86SAndroid Build Coastguard Worker errorf(const char *fmt, ...)
1323*7c356e86SAndroid Build Coastguard Worker {
1324*7c356e86SAndroid Build Coastguard Worker 	va_list va;
1325*7c356e86SAndroid Build Coastguard Worker 
1326*7c356e86SAndroid Build Coastguard Worker 	exstat = 1;
1327*7c356e86SAndroid Build Coastguard Worker 
1328*7c356e86SAndroid Build Coastguard Worker 	/* debugging: note that stdout not valid */
1329*7c356e86SAndroid Build Coastguard Worker 	shl_stdout_ok = false;
1330*7c356e86SAndroid Build Coastguard Worker 
1331*7c356e86SAndroid Build Coastguard Worker 	va_start(va, fmt);
1332*7c356e86SAndroid Build Coastguard Worker 	vwarningf(VWARNINGF_ERRORPREFIX | VWARNINGF_FILELINE, fmt, va);
1333*7c356e86SAndroid Build Coastguard Worker 	va_end(va);
1334*7c356e86SAndroid Build Coastguard Worker 	unwind(LERROR);
1335*7c356e86SAndroid Build Coastguard Worker }
1336*7c356e86SAndroid Build Coastguard Worker 
1337*7c356e86SAndroid Build Coastguard Worker /* like errorf(), but no unwind is done */
1338*7c356e86SAndroid Build Coastguard Worker void
warningf(bool fileline,const char * fmt,...)1339*7c356e86SAndroid Build Coastguard Worker warningf(bool fileline, const char *fmt, ...)
1340*7c356e86SAndroid Build Coastguard Worker {
1341*7c356e86SAndroid Build Coastguard Worker 	va_list va;
1342*7c356e86SAndroid Build Coastguard Worker 
1343*7c356e86SAndroid Build Coastguard Worker 	va_start(va, fmt);
1344*7c356e86SAndroid Build Coastguard Worker 	vwarningf(VWARNINGF_ERRORPREFIX | (fileline ? VWARNINGF_FILELINE : 0),
1345*7c356e86SAndroid Build Coastguard Worker 	    fmt, va);
1346*7c356e86SAndroid Build Coastguard Worker 	va_end(va);
1347*7c356e86SAndroid Build Coastguard Worker }
1348*7c356e86SAndroid Build Coastguard Worker 
1349*7c356e86SAndroid Build Coastguard Worker /*
1350*7c356e86SAndroid Build Coastguard Worker  * Used by built-in utilities to prefix shell and utility name to message
1351*7c356e86SAndroid Build Coastguard Worker  * (also unwinds environments for special builtins).
1352*7c356e86SAndroid Build Coastguard Worker  */
1353*7c356e86SAndroid Build Coastguard Worker void
bi_errorf(const char * fmt,...)1354*7c356e86SAndroid Build Coastguard Worker bi_errorf(const char *fmt, ...)
1355*7c356e86SAndroid Build Coastguard Worker {
1356*7c356e86SAndroid Build Coastguard Worker 	va_list va;
1357*7c356e86SAndroid Build Coastguard Worker 
1358*7c356e86SAndroid Build Coastguard Worker 	/* debugging: note that stdout not valid */
1359*7c356e86SAndroid Build Coastguard Worker 	shl_stdout_ok = false;
1360*7c356e86SAndroid Build Coastguard Worker 
1361*7c356e86SAndroid Build Coastguard Worker 	exstat = 1;
1362*7c356e86SAndroid Build Coastguard Worker 
1363*7c356e86SAndroid Build Coastguard Worker 	va_start(va, fmt);
1364*7c356e86SAndroid Build Coastguard Worker 	vwarningf(VWARNINGF_ERRORPREFIX | VWARNINGF_FILELINE |
1365*7c356e86SAndroid Build Coastguard Worker 	    VWARNINGF_BUILTIN, fmt, va);
1366*7c356e86SAndroid Build Coastguard Worker 	va_end(va);
1367*7c356e86SAndroid Build Coastguard Worker 
1368*7c356e86SAndroid Build Coastguard Worker 	/* POSIX special builtins cause non-interactive shells to exit */
1369*7c356e86SAndroid Build Coastguard Worker 	if (builtin_spec) {
1370*7c356e86SAndroid Build Coastguard Worker 		builtin_argv0 = NULL;
1371*7c356e86SAndroid Build Coastguard Worker 		/* may not want to use LERROR here */
1372*7c356e86SAndroid Build Coastguard Worker 		unwind(LERROR);
1373*7c356e86SAndroid Build Coastguard Worker 	}
1374*7c356e86SAndroid Build Coastguard Worker }
1375*7c356e86SAndroid Build Coastguard Worker 
1376*7c356e86SAndroid Build Coastguard Worker /*
1377*7c356e86SAndroid Build Coastguard Worker  * Used by functions called by builtins and not:
1378*7c356e86SAndroid Build Coastguard Worker  * identical to errorfx if first argument is nil,
1379*7c356e86SAndroid Build Coastguard Worker  * like bi_errorf storing the errorlevel into it otherwise
1380*7c356e86SAndroid Build Coastguard Worker  */
1381*7c356e86SAndroid Build Coastguard Worker void
maybe_errorf(int * ep,int rc,const char * fmt,...)1382*7c356e86SAndroid Build Coastguard Worker maybe_errorf(int *ep, int rc, const char *fmt, ...)
1383*7c356e86SAndroid Build Coastguard Worker {
1384*7c356e86SAndroid Build Coastguard Worker 	va_list va;
1385*7c356e86SAndroid Build Coastguard Worker 
1386*7c356e86SAndroid Build Coastguard Worker 	/* debugging: note that stdout not valid */
1387*7c356e86SAndroid Build Coastguard Worker 	shl_stdout_ok = false;
1388*7c356e86SAndroid Build Coastguard Worker 
1389*7c356e86SAndroid Build Coastguard Worker 	exstat = rc;
1390*7c356e86SAndroid Build Coastguard Worker 
1391*7c356e86SAndroid Build Coastguard Worker 	va_start(va, fmt);
1392*7c356e86SAndroid Build Coastguard Worker 	vwarningf(VWARNINGF_ERRORPREFIX | VWARNINGF_FILELINE |
1393*7c356e86SAndroid Build Coastguard Worker 	    (ep ? VWARNINGF_BUILTIN : 0), fmt, va);
1394*7c356e86SAndroid Build Coastguard Worker 	va_end(va);
1395*7c356e86SAndroid Build Coastguard Worker 
1396*7c356e86SAndroid Build Coastguard Worker 	if (!ep)
1397*7c356e86SAndroid Build Coastguard Worker 		goto and_out;
1398*7c356e86SAndroid Build Coastguard Worker 	*ep = rc;
1399*7c356e86SAndroid Build Coastguard Worker 
1400*7c356e86SAndroid Build Coastguard Worker 	/* POSIX special builtins cause non-interactive shells to exit */
1401*7c356e86SAndroid Build Coastguard Worker 	if (builtin_spec) {
1402*7c356e86SAndroid Build Coastguard Worker 		builtin_argv0 = NULL;
1403*7c356e86SAndroid Build Coastguard Worker 		/* may not want to use LERROR here */
1404*7c356e86SAndroid Build Coastguard Worker  and_out:
1405*7c356e86SAndroid Build Coastguard Worker 		unwind(LERROR);
1406*7c356e86SAndroid Build Coastguard Worker 	}
1407*7c356e86SAndroid Build Coastguard Worker }
1408*7c356e86SAndroid Build Coastguard Worker 
1409*7c356e86SAndroid Build Coastguard Worker /* Called when something that shouldn't happen does */
1410*7c356e86SAndroid Build Coastguard Worker void
internal_errorf(const char * fmt,...)1411*7c356e86SAndroid Build Coastguard Worker internal_errorf(const char *fmt, ...)
1412*7c356e86SAndroid Build Coastguard Worker {
1413*7c356e86SAndroid Build Coastguard Worker 	va_list va;
1414*7c356e86SAndroid Build Coastguard Worker 
1415*7c356e86SAndroid Build Coastguard Worker 	va_start(va, fmt);
1416*7c356e86SAndroid Build Coastguard Worker 	vwarningf(VWARNINGF_INTERNAL, fmt, va);
1417*7c356e86SAndroid Build Coastguard Worker 	va_end(va);
1418*7c356e86SAndroid Build Coastguard Worker 	unwind(LERROR);
1419*7c356e86SAndroid Build Coastguard Worker }
1420*7c356e86SAndroid Build Coastguard Worker 
1421*7c356e86SAndroid Build Coastguard Worker void
internal_warningf(const char * fmt,...)1422*7c356e86SAndroid Build Coastguard Worker internal_warningf(const char *fmt, ...)
1423*7c356e86SAndroid Build Coastguard Worker {
1424*7c356e86SAndroid Build Coastguard Worker 	va_list va;
1425*7c356e86SAndroid Build Coastguard Worker 
1426*7c356e86SAndroid Build Coastguard Worker 	va_start(va, fmt);
1427*7c356e86SAndroid Build Coastguard Worker 	vwarningf(VWARNINGF_INTERNAL, fmt, va);
1428*7c356e86SAndroid Build Coastguard Worker 	va_end(va);
1429*7c356e86SAndroid Build Coastguard Worker }
1430*7c356e86SAndroid Build Coastguard Worker 
1431*7c356e86SAndroid Build Coastguard Worker /* used by error reporting functions to print "ksh: .kshrc[25]: " */
1432*7c356e86SAndroid Build Coastguard Worker void
error_prefix(bool fileline)1433*7c356e86SAndroid Build Coastguard Worker error_prefix(bool fileline)
1434*7c356e86SAndroid Build Coastguard Worker {
1435*7c356e86SAndroid Build Coastguard Worker 	/* Avoid foo: foo[2]: ... */
1436*7c356e86SAndroid Build Coastguard Worker 	if (!fileline || !source || !source->file ||
1437*7c356e86SAndroid Build Coastguard Worker 	    strcmp(source->file, kshname) != 0)
1438*7c356e86SAndroid Build Coastguard Worker 		shf_fprintf(shl_out, Tf_sD_, kshname +
1439*7c356e86SAndroid Build Coastguard Worker 		    (*kshname == '-' ? 1 : 0));
1440*7c356e86SAndroid Build Coastguard Worker 	if (fileline && source && source->file != NULL) {
1441*7c356e86SAndroid Build Coastguard Worker 		shf_fprintf(shl_out, "%s[%lu]: ", source->file,
1442*7c356e86SAndroid Build Coastguard Worker 		    (unsigned long)(source->errline ?
1443*7c356e86SAndroid Build Coastguard Worker 		    source->errline : source->line));
1444*7c356e86SAndroid Build Coastguard Worker 		source->errline = 0;
1445*7c356e86SAndroid Build Coastguard Worker 	}
1446*7c356e86SAndroid Build Coastguard Worker }
1447*7c356e86SAndroid Build Coastguard Worker 
1448*7c356e86SAndroid Build Coastguard Worker /* printf to shl_out (stderr) with flush */
1449*7c356e86SAndroid Build Coastguard Worker void
shellf(const char * fmt,...)1450*7c356e86SAndroid Build Coastguard Worker shellf(const char *fmt, ...)
1451*7c356e86SAndroid Build Coastguard Worker {
1452*7c356e86SAndroid Build Coastguard Worker 	va_list va;
1453*7c356e86SAndroid Build Coastguard Worker 
1454*7c356e86SAndroid Build Coastguard Worker 	if (!initio_done)
1455*7c356e86SAndroid Build Coastguard Worker 		/* shl_out may not be set up yet... */
1456*7c356e86SAndroid Build Coastguard Worker 		return;
1457*7c356e86SAndroid Build Coastguard Worker 	va_start(va, fmt);
1458*7c356e86SAndroid Build Coastguard Worker 	shf_vfprintf(shl_out, fmt, va);
1459*7c356e86SAndroid Build Coastguard Worker 	va_end(va);
1460*7c356e86SAndroid Build Coastguard Worker 	shf_flush(shl_out);
1461*7c356e86SAndroid Build Coastguard Worker }
1462*7c356e86SAndroid Build Coastguard Worker 
1463*7c356e86SAndroid Build Coastguard Worker /* printf to shl_stdout (stdout) */
1464*7c356e86SAndroid Build Coastguard Worker void
shprintf(const char * fmt,...)1465*7c356e86SAndroid Build Coastguard Worker shprintf(const char *fmt, ...)
1466*7c356e86SAndroid Build Coastguard Worker {
1467*7c356e86SAndroid Build Coastguard Worker 	va_list va;
1468*7c356e86SAndroid Build Coastguard Worker 
1469*7c356e86SAndroid Build Coastguard Worker 	if (!shl_stdout_ok)
1470*7c356e86SAndroid Build Coastguard Worker 		internal_errorf("shl_stdout not valid");
1471*7c356e86SAndroid Build Coastguard Worker 	va_start(va, fmt);
1472*7c356e86SAndroid Build Coastguard Worker 	shf_vfprintf(shl_stdout, fmt, va);
1473*7c356e86SAndroid Build Coastguard Worker 	va_end(va);
1474*7c356e86SAndroid Build Coastguard Worker }
1475*7c356e86SAndroid Build Coastguard Worker 
1476*7c356e86SAndroid Build Coastguard Worker /* test if we can seek backwards fd (returns 0 or SHF_UNBUF) */
1477*7c356e86SAndroid Build Coastguard Worker int
can_seek(int fd)1478*7c356e86SAndroid Build Coastguard Worker can_seek(int fd)
1479*7c356e86SAndroid Build Coastguard Worker {
1480*7c356e86SAndroid Build Coastguard Worker 	struct stat statb;
1481*7c356e86SAndroid Build Coastguard Worker 
1482*7c356e86SAndroid Build Coastguard Worker 	return (fstat(fd, &statb) == 0 && !S_ISREG(statb.st_mode) ?
1483*7c356e86SAndroid Build Coastguard Worker 	    SHF_UNBUF : 0);
1484*7c356e86SAndroid Build Coastguard Worker }
1485*7c356e86SAndroid Build Coastguard Worker 
1486*7c356e86SAndroid Build Coastguard Worker #ifdef DF
1487*7c356e86SAndroid Build Coastguard Worker int shl_dbg_fd;
1488*7c356e86SAndroid Build Coastguard Worker #define NSHF_IOB 4
1489*7c356e86SAndroid Build Coastguard Worker #else
1490*7c356e86SAndroid Build Coastguard Worker #define NSHF_IOB 3
1491*7c356e86SAndroid Build Coastguard Worker #endif
1492*7c356e86SAndroid Build Coastguard Worker struct shf shf_iob[NSHF_IOB];
1493*7c356e86SAndroid Build Coastguard Worker 
1494*7c356e86SAndroid Build Coastguard Worker void
initio(void)1495*7c356e86SAndroid Build Coastguard Worker initio(void)
1496*7c356e86SAndroid Build Coastguard Worker {
1497*7c356e86SAndroid Build Coastguard Worker #ifdef DF
1498*7c356e86SAndroid Build Coastguard Worker 	const char *lfp;
1499*7c356e86SAndroid Build Coastguard Worker #endif
1500*7c356e86SAndroid Build Coastguard Worker 
1501*7c356e86SAndroid Build Coastguard Worker 	/* force buffer allocation */
1502*7c356e86SAndroid Build Coastguard Worker 	shf_fdopen(1, SHF_WR, shl_stdout);
1503*7c356e86SAndroid Build Coastguard Worker 	shf_fdopen(2, SHF_WR, shl_out);
1504*7c356e86SAndroid Build Coastguard Worker 	shf_fdopen(2, SHF_WR, shl_xtrace);
1505*7c356e86SAndroid Build Coastguard Worker #ifdef DF
1506*7c356e86SAndroid Build Coastguard Worker 	if ((lfp = getenv("SDMKSH_PATH")) == NULL) {
1507*7c356e86SAndroid Build Coastguard Worker 		if ((lfp = getenv("HOME")) == NULL || !mksh_abspath(lfp))
1508*7c356e86SAndroid Build Coastguard Worker 			errorf("can't get home directory");
1509*7c356e86SAndroid Build Coastguard Worker 		strpathx(lfp, lfp, "mksh-dbg.txt", 1);
1510*7c356e86SAndroid Build Coastguard Worker 	}
1511*7c356e86SAndroid Build Coastguard Worker 
1512*7c356e86SAndroid Build Coastguard Worker 	if ((shl_dbg_fd = open(lfp, O_WRONLY | O_APPEND | O_CREAT, 0600)) < 0)
1513*7c356e86SAndroid Build Coastguard Worker 		errorf("can't open debug output file %s", lfp);
1514*7c356e86SAndroid Build Coastguard Worker 	if (shl_dbg_fd < FDBASE) {
1515*7c356e86SAndroid Build Coastguard Worker 		int nfd;
1516*7c356e86SAndroid Build Coastguard Worker 
1517*7c356e86SAndroid Build Coastguard Worker 		nfd = fcntl(shl_dbg_fd, F_DUPFD, FDBASE);
1518*7c356e86SAndroid Build Coastguard Worker 		close(shl_dbg_fd);
1519*7c356e86SAndroid Build Coastguard Worker 		if ((shl_dbg_fd = nfd) == -1)
1520*7c356e86SAndroid Build Coastguard Worker 			errorf("can't dup debug output file");
1521*7c356e86SAndroid Build Coastguard Worker 	}
1522*7c356e86SAndroid Build Coastguard Worker 	fcntl(shl_dbg_fd, F_SETFD, FD_CLOEXEC);
1523*7c356e86SAndroid Build Coastguard Worker 	shf_fdopen(shl_dbg_fd, SHF_WR, shl_dbg);
1524*7c356e86SAndroid Build Coastguard Worker 	DF("=== open ===");
1525*7c356e86SAndroid Build Coastguard Worker #endif
1526*7c356e86SAndroid Build Coastguard Worker 	initio_done = true;
1527*7c356e86SAndroid Build Coastguard Worker }
1528*7c356e86SAndroid Build Coastguard Worker 
1529*7c356e86SAndroid Build Coastguard Worker /* A dup2() with error checking */
1530*7c356e86SAndroid Build Coastguard Worker int
ksh_dup2(int ofd,int nfd,bool errok)1531*7c356e86SAndroid Build Coastguard Worker ksh_dup2(int ofd, int nfd, bool errok)
1532*7c356e86SAndroid Build Coastguard Worker {
1533*7c356e86SAndroid Build Coastguard Worker 	int rv;
1534*7c356e86SAndroid Build Coastguard Worker 
1535*7c356e86SAndroid Build Coastguard Worker 	if (((rv = dup2(ofd, nfd)) < 0) && !errok && (errno != EBADF))
1536*7c356e86SAndroid Build Coastguard Worker 		errorf(Ttoo_many_files);
1537*7c356e86SAndroid Build Coastguard Worker 
1538*7c356e86SAndroid Build Coastguard Worker #ifdef __ultrix
1539*7c356e86SAndroid Build Coastguard Worker 	/*XXX imake style */
1540*7c356e86SAndroid Build Coastguard Worker 	if (rv >= 0)
1541*7c356e86SAndroid Build Coastguard Worker 		fcntl(nfd, F_SETFD, 0);
1542*7c356e86SAndroid Build Coastguard Worker #endif
1543*7c356e86SAndroid Build Coastguard Worker 
1544*7c356e86SAndroid Build Coastguard Worker 	return (rv);
1545*7c356e86SAndroid Build Coastguard Worker }
1546*7c356e86SAndroid Build Coastguard Worker 
1547*7c356e86SAndroid Build Coastguard Worker /*
1548*7c356e86SAndroid Build Coastguard Worker  * Move fd from user space (0 <= fd < 10) to shell space (fd >= 10),
1549*7c356e86SAndroid Build Coastguard Worker  * set close-on-exec flag. See FDBASE in sh.h, maybe 24 not 10 here.
1550*7c356e86SAndroid Build Coastguard Worker  */
1551*7c356e86SAndroid Build Coastguard Worker short
savefd(int fd)1552*7c356e86SAndroid Build Coastguard Worker savefd(int fd)
1553*7c356e86SAndroid Build Coastguard Worker {
1554*7c356e86SAndroid Build Coastguard Worker 	int nfd = fd;
1555*7c356e86SAndroid Build Coastguard Worker 
1556*7c356e86SAndroid Build Coastguard Worker 	if (fd < FDBASE && (nfd = fcntl(fd, F_DUPFD, FDBASE)) < 0 &&
1557*7c356e86SAndroid Build Coastguard Worker 	    (errno == EBADF || errno == EPERM))
1558*7c356e86SAndroid Build Coastguard Worker 		return (-1);
1559*7c356e86SAndroid Build Coastguard Worker 	if (nfd < 0 || nfd > SHRT_MAX)
1560*7c356e86SAndroid Build Coastguard Worker 		errorf(Ttoo_many_files);
1561*7c356e86SAndroid Build Coastguard Worker 	fcntl(nfd, F_SETFD, FD_CLOEXEC);
1562*7c356e86SAndroid Build Coastguard Worker 	return ((short)nfd);
1563*7c356e86SAndroid Build Coastguard Worker }
1564*7c356e86SAndroid Build Coastguard Worker 
1565*7c356e86SAndroid Build Coastguard Worker void
restfd(int fd,int ofd)1566*7c356e86SAndroid Build Coastguard Worker restfd(int fd, int ofd)
1567*7c356e86SAndroid Build Coastguard Worker {
1568*7c356e86SAndroid Build Coastguard Worker 	if (fd == 2)
1569*7c356e86SAndroid Build Coastguard Worker 		shf_flush(&shf_iob[/* fd */ 2]);
1570*7c356e86SAndroid Build Coastguard Worker 	if (ofd < 0)
1571*7c356e86SAndroid Build Coastguard Worker 		/* original fd closed */
1572*7c356e86SAndroid Build Coastguard Worker 		close(fd);
1573*7c356e86SAndroid Build Coastguard Worker 	else if (fd != ofd) {
1574*7c356e86SAndroid Build Coastguard Worker 		/*XXX: what to do if this dup fails? */
1575*7c356e86SAndroid Build Coastguard Worker 		ksh_dup2(ofd, fd, true);
1576*7c356e86SAndroid Build Coastguard Worker 		close(ofd);
1577*7c356e86SAndroid Build Coastguard Worker 	}
1578*7c356e86SAndroid Build Coastguard Worker }
1579*7c356e86SAndroid Build Coastguard Worker 
1580*7c356e86SAndroid Build Coastguard Worker void
openpipe(int * pv)1581*7c356e86SAndroid Build Coastguard Worker openpipe(int *pv)
1582*7c356e86SAndroid Build Coastguard Worker {
1583*7c356e86SAndroid Build Coastguard Worker 	int lpv[2];
1584*7c356e86SAndroid Build Coastguard Worker 
1585*7c356e86SAndroid Build Coastguard Worker 	if (pipe(lpv) < 0)
1586*7c356e86SAndroid Build Coastguard Worker 		errorf("can't create pipe - try again");
1587*7c356e86SAndroid Build Coastguard Worker 	pv[0] = savefd(lpv[0]);
1588*7c356e86SAndroid Build Coastguard Worker 	if (pv[0] != lpv[0])
1589*7c356e86SAndroid Build Coastguard Worker 		close(lpv[0]);
1590*7c356e86SAndroid Build Coastguard Worker 	pv[1] = savefd(lpv[1]);
1591*7c356e86SAndroid Build Coastguard Worker 	if (pv[1] != lpv[1])
1592*7c356e86SAndroid Build Coastguard Worker 		close(lpv[1]);
1593*7c356e86SAndroid Build Coastguard Worker #ifdef __OS2__
1594*7c356e86SAndroid Build Coastguard Worker 	setmode(pv[0], O_BINARY);
1595*7c356e86SAndroid Build Coastguard Worker 	setmode(pv[1], O_BINARY);
1596*7c356e86SAndroid Build Coastguard Worker #endif
1597*7c356e86SAndroid Build Coastguard Worker }
1598*7c356e86SAndroid Build Coastguard Worker 
1599*7c356e86SAndroid Build Coastguard Worker void
closepipe(int * pv)1600*7c356e86SAndroid Build Coastguard Worker closepipe(int *pv)
1601*7c356e86SAndroid Build Coastguard Worker {
1602*7c356e86SAndroid Build Coastguard Worker 	close(pv[0]);
1603*7c356e86SAndroid Build Coastguard Worker 	close(pv[1]);
1604*7c356e86SAndroid Build Coastguard Worker }
1605*7c356e86SAndroid Build Coastguard Worker 
1606*7c356e86SAndroid Build Coastguard Worker /*
1607*7c356e86SAndroid Build Coastguard Worker  * Called by iosetup() (deals with 2>&4, etc.), c_read, c_print to turn
1608*7c356e86SAndroid Build Coastguard Worker  * a string (the X in 2>&X, read -uX, print -uX) into a file descriptor.
1609*7c356e86SAndroid Build Coastguard Worker  */
1610*7c356e86SAndroid Build Coastguard Worker int
check_fd(const char * name,int mode,const char ** emsgp)1611*7c356e86SAndroid Build Coastguard Worker check_fd(const char *name, int mode, const char **emsgp)
1612*7c356e86SAndroid Build Coastguard Worker {
1613*7c356e86SAndroid Build Coastguard Worker 	int fd, fl;
1614*7c356e86SAndroid Build Coastguard Worker 
1615*7c356e86SAndroid Build Coastguard Worker 	if (!name[0] || name[1])
1616*7c356e86SAndroid Build Coastguard Worker 		goto illegal_fd_name;
1617*7c356e86SAndroid Build Coastguard Worker 	if (name[0] == 'p')
1618*7c356e86SAndroid Build Coastguard Worker 		return (coproc_getfd(mode, emsgp));
1619*7c356e86SAndroid Build Coastguard Worker 	if (!ctype(name[0], C_DIGIT)) {
1620*7c356e86SAndroid Build Coastguard Worker  illegal_fd_name:
1621*7c356e86SAndroid Build Coastguard Worker 		if (emsgp)
1622*7c356e86SAndroid Build Coastguard Worker 			*emsgp = "illegal file descriptor name";
1623*7c356e86SAndroid Build Coastguard Worker 		return (-1);
1624*7c356e86SAndroid Build Coastguard Worker 	}
1625*7c356e86SAndroid Build Coastguard Worker 
1626*7c356e86SAndroid Build Coastguard Worker 	if ((fl = fcntl((fd = ksh_numdig(name[0])), F_GETFL, 0)) < 0) {
1627*7c356e86SAndroid Build Coastguard Worker 		if (emsgp)
1628*7c356e86SAndroid Build Coastguard Worker 			*emsgp = "bad file descriptor";
1629*7c356e86SAndroid Build Coastguard Worker 		return (-1);
1630*7c356e86SAndroid Build Coastguard Worker 	}
1631*7c356e86SAndroid Build Coastguard Worker 	fl &= O_ACCMODE;
1632*7c356e86SAndroid Build Coastguard Worker 	/*
1633*7c356e86SAndroid Build Coastguard Worker 	 * X_OK is a kludge to disable this check for dups (x<&1):
1634*7c356e86SAndroid Build Coastguard Worker 	 * historical shells never did this check (XXX don't know what
1635*7c356e86SAndroid Build Coastguard Worker 	 * POSIX has to say).
1636*7c356e86SAndroid Build Coastguard Worker 	 */
1637*7c356e86SAndroid Build Coastguard Worker 	if (!(mode & X_OK) && fl != O_RDWR && (
1638*7c356e86SAndroid Build Coastguard Worker 	    ((mode & R_OK) && fl != O_RDONLY) ||
1639*7c356e86SAndroid Build Coastguard Worker 	    ((mode & W_OK) && fl != O_WRONLY))) {
1640*7c356e86SAndroid Build Coastguard Worker 		if (emsgp)
1641*7c356e86SAndroid Build Coastguard Worker 			*emsgp = (fl == O_WRONLY) ?
1642*7c356e86SAndroid Build Coastguard Worker 			    "fd not open for reading" :
1643*7c356e86SAndroid Build Coastguard Worker 			    "fd not open for writing";
1644*7c356e86SAndroid Build Coastguard Worker 		return (-1);
1645*7c356e86SAndroid Build Coastguard Worker 	}
1646*7c356e86SAndroid Build Coastguard Worker 	return (fd);
1647*7c356e86SAndroid Build Coastguard Worker }
1648*7c356e86SAndroid Build Coastguard Worker 
1649*7c356e86SAndroid Build Coastguard Worker /* Called once from main */
1650*7c356e86SAndroid Build Coastguard Worker void
coproc_init(void)1651*7c356e86SAndroid Build Coastguard Worker coproc_init(void)
1652*7c356e86SAndroid Build Coastguard Worker {
1653*7c356e86SAndroid Build Coastguard Worker 	coproc.read = coproc.readw = coproc.write = -1;
1654*7c356e86SAndroid Build Coastguard Worker 	coproc.njobs = 0;
1655*7c356e86SAndroid Build Coastguard Worker 	coproc.id = 0;
1656*7c356e86SAndroid Build Coastguard Worker }
1657*7c356e86SAndroid Build Coastguard Worker 
1658*7c356e86SAndroid Build Coastguard Worker /* Called by c_read() when eof is read - close fd if it is the co-process fd */
1659*7c356e86SAndroid Build Coastguard Worker void
coproc_read_close(int fd)1660*7c356e86SAndroid Build Coastguard Worker coproc_read_close(int fd)
1661*7c356e86SAndroid Build Coastguard Worker {
1662*7c356e86SAndroid Build Coastguard Worker 	if (coproc.read >= 0 && fd == coproc.read) {
1663*7c356e86SAndroid Build Coastguard Worker 		coproc_readw_close(fd);
1664*7c356e86SAndroid Build Coastguard Worker 		close(coproc.read);
1665*7c356e86SAndroid Build Coastguard Worker 		coproc.read = -1;
1666*7c356e86SAndroid Build Coastguard Worker 	}
1667*7c356e86SAndroid Build Coastguard Worker }
1668*7c356e86SAndroid Build Coastguard Worker 
1669*7c356e86SAndroid Build Coastguard Worker /*
1670*7c356e86SAndroid Build Coastguard Worker  * Called by c_read() and by iosetup() to close the other side of the
1671*7c356e86SAndroid Build Coastguard Worker  * read pipe, so reads will actually terminate.
1672*7c356e86SAndroid Build Coastguard Worker  */
1673*7c356e86SAndroid Build Coastguard Worker void
coproc_readw_close(int fd)1674*7c356e86SAndroid Build Coastguard Worker coproc_readw_close(int fd)
1675*7c356e86SAndroid Build Coastguard Worker {
1676*7c356e86SAndroid Build Coastguard Worker 	if (coproc.readw >= 0 && coproc.read >= 0 && fd == coproc.read) {
1677*7c356e86SAndroid Build Coastguard Worker 		close(coproc.readw);
1678*7c356e86SAndroid Build Coastguard Worker 		coproc.readw = -1;
1679*7c356e86SAndroid Build Coastguard Worker 	}
1680*7c356e86SAndroid Build Coastguard Worker }
1681*7c356e86SAndroid Build Coastguard Worker 
1682*7c356e86SAndroid Build Coastguard Worker /*
1683*7c356e86SAndroid Build Coastguard Worker  * Called by c_print when a write to a fd fails with EPIPE and by iosetup
1684*7c356e86SAndroid Build Coastguard Worker  * when co-process input is dup'd
1685*7c356e86SAndroid Build Coastguard Worker  */
1686*7c356e86SAndroid Build Coastguard Worker void
coproc_write_close(int fd)1687*7c356e86SAndroid Build Coastguard Worker coproc_write_close(int fd)
1688*7c356e86SAndroid Build Coastguard Worker {
1689*7c356e86SAndroid Build Coastguard Worker 	if (coproc.write >= 0 && fd == coproc.write) {
1690*7c356e86SAndroid Build Coastguard Worker 		close(coproc.write);
1691*7c356e86SAndroid Build Coastguard Worker 		coproc.write = -1;
1692*7c356e86SAndroid Build Coastguard Worker 	}
1693*7c356e86SAndroid Build Coastguard Worker }
1694*7c356e86SAndroid Build Coastguard Worker 
1695*7c356e86SAndroid Build Coastguard Worker /*
1696*7c356e86SAndroid Build Coastguard Worker  * Called to check for existence of/value of the co-process file descriptor.
1697*7c356e86SAndroid Build Coastguard Worker  * (Used by check_fd() and by c_read/c_print to deal with -p option).
1698*7c356e86SAndroid Build Coastguard Worker  */
1699*7c356e86SAndroid Build Coastguard Worker int
coproc_getfd(int mode,const char ** emsgp)1700*7c356e86SAndroid Build Coastguard Worker coproc_getfd(int mode, const char **emsgp)
1701*7c356e86SAndroid Build Coastguard Worker {
1702*7c356e86SAndroid Build Coastguard Worker 	int fd = (mode & R_OK) ? coproc.read : coproc.write;
1703*7c356e86SAndroid Build Coastguard Worker 
1704*7c356e86SAndroid Build Coastguard Worker 	if (fd >= 0)
1705*7c356e86SAndroid Build Coastguard Worker 		return (fd);
1706*7c356e86SAndroid Build Coastguard Worker 	if (emsgp)
1707*7c356e86SAndroid Build Coastguard Worker 		*emsgp = "no coprocess";
1708*7c356e86SAndroid Build Coastguard Worker 	return (-1);
1709*7c356e86SAndroid Build Coastguard Worker }
1710*7c356e86SAndroid Build Coastguard Worker 
1711*7c356e86SAndroid Build Coastguard Worker /*
1712*7c356e86SAndroid Build Coastguard Worker  * called to close file descriptors related to the coprocess (if any)
1713*7c356e86SAndroid Build Coastguard Worker  * Should be called with SIGCHLD blocked.
1714*7c356e86SAndroid Build Coastguard Worker  */
1715*7c356e86SAndroid Build Coastguard Worker void
coproc_cleanup(int reuse)1716*7c356e86SAndroid Build Coastguard Worker coproc_cleanup(int reuse)
1717*7c356e86SAndroid Build Coastguard Worker {
1718*7c356e86SAndroid Build Coastguard Worker 	/* This to allow co-processes to share output pipe */
1719*7c356e86SAndroid Build Coastguard Worker 	if (!reuse || coproc.readw < 0 || coproc.read < 0) {
1720*7c356e86SAndroid Build Coastguard Worker 		if (coproc.read >= 0) {
1721*7c356e86SAndroid Build Coastguard Worker 			close(coproc.read);
1722*7c356e86SAndroid Build Coastguard Worker 			coproc.read = -1;
1723*7c356e86SAndroid Build Coastguard Worker 		}
1724*7c356e86SAndroid Build Coastguard Worker 		if (coproc.readw >= 0) {
1725*7c356e86SAndroid Build Coastguard Worker 			close(coproc.readw);
1726*7c356e86SAndroid Build Coastguard Worker 			coproc.readw = -1;
1727*7c356e86SAndroid Build Coastguard Worker 		}
1728*7c356e86SAndroid Build Coastguard Worker 	}
1729*7c356e86SAndroid Build Coastguard Worker 	if (coproc.write >= 0) {
1730*7c356e86SAndroid Build Coastguard Worker 		close(coproc.write);
1731*7c356e86SAndroid Build Coastguard Worker 		coproc.write = -1;
1732*7c356e86SAndroid Build Coastguard Worker 	}
1733*7c356e86SAndroid Build Coastguard Worker }
1734*7c356e86SAndroid Build Coastguard Worker 
1735*7c356e86SAndroid Build Coastguard Worker struct temp *
maketemp(Area * ap,Temp_type type,struct temp ** tlist)1736*7c356e86SAndroid Build Coastguard Worker maketemp(Area *ap, Temp_type type, struct temp **tlist)
1737*7c356e86SAndroid Build Coastguard Worker {
1738*7c356e86SAndroid Build Coastguard Worker 	char *cp;
1739*7c356e86SAndroid Build Coastguard Worker 	size_t len;
1740*7c356e86SAndroid Build Coastguard Worker 	int i, j;
1741*7c356e86SAndroid Build Coastguard Worker 	struct temp *tp;
1742*7c356e86SAndroid Build Coastguard Worker 	const char *dir;
1743*7c356e86SAndroid Build Coastguard Worker 	struct stat sb;
1744*7c356e86SAndroid Build Coastguard Worker 
1745*7c356e86SAndroid Build Coastguard Worker 	dir = tmpdir ? tmpdir : MKSH_DEFAULT_TMPDIR;
1746*7c356e86SAndroid Build Coastguard Worker 	/* add "/shXXXXXX.tmp" plus NUL */
1747*7c356e86SAndroid Build Coastguard Worker 	len = strlen(dir);
1748*7c356e86SAndroid Build Coastguard Worker 	checkoktoadd(len, offsetof(struct temp, tffn[0]) + 14);
1749*7c356e86SAndroid Build Coastguard Worker 	tp = alloc(offsetof(struct temp, tffn[0]) + 14 + len, ap);
1750*7c356e86SAndroid Build Coastguard Worker 
1751*7c356e86SAndroid Build Coastguard Worker 	tp->shf = NULL;
1752*7c356e86SAndroid Build Coastguard Worker 	tp->pid = procpid;
1753*7c356e86SAndroid Build Coastguard Worker 	tp->type = type;
1754*7c356e86SAndroid Build Coastguard Worker 
1755*7c356e86SAndroid Build Coastguard Worker 	if (stat(dir, &sb) || !S_ISDIR(sb.st_mode)) {
1756*7c356e86SAndroid Build Coastguard Worker 		tp->tffn[0] = '\0';
1757*7c356e86SAndroid Build Coastguard Worker 		goto maketemp_out;
1758*7c356e86SAndroid Build Coastguard Worker 	}
1759*7c356e86SAndroid Build Coastguard Worker 
1760*7c356e86SAndroid Build Coastguard Worker 	cp = (void *)tp;
1761*7c356e86SAndroid Build Coastguard Worker 	cp += offsetof(struct temp, tffn[0]);
1762*7c356e86SAndroid Build Coastguard Worker 	memcpy(cp, dir, len);
1763*7c356e86SAndroid Build Coastguard Worker 	cp += len;
1764*7c356e86SAndroid Build Coastguard Worker 	memcpy(cp, "/shXXXXXX.tmp", 14);
1765*7c356e86SAndroid Build Coastguard Worker 	/* point to the first of six Xes */
1766*7c356e86SAndroid Build Coastguard Worker 	cp += 3;
1767*7c356e86SAndroid Build Coastguard Worker 
1768*7c356e86SAndroid Build Coastguard Worker 	/* cyclically attempt to open a temporary file */
1769*7c356e86SAndroid Build Coastguard Worker 	do {
1770*7c356e86SAndroid Build Coastguard Worker 		/* generate random part of filename */
1771*7c356e86SAndroid Build Coastguard Worker 		len = 0;
1772*7c356e86SAndroid Build Coastguard Worker 		do {
1773*7c356e86SAndroid Build Coastguard Worker 			cp[len++] = digits_lc[rndget() % 36];
1774*7c356e86SAndroid Build Coastguard Worker 		} while (len < 6);
1775*7c356e86SAndroid Build Coastguard Worker 
1776*7c356e86SAndroid Build Coastguard Worker 		/* check if this one works */
1777*7c356e86SAndroid Build Coastguard Worker 		if ((i = binopen3(tp->tffn, O_CREAT | O_EXCL | O_RDWR,
1778*7c356e86SAndroid Build Coastguard Worker 		    0600)) < 0 && errno != EEXIST)
1779*7c356e86SAndroid Build Coastguard Worker 			goto maketemp_out;
1780*7c356e86SAndroid Build Coastguard Worker 	} while (i < 0);
1781*7c356e86SAndroid Build Coastguard Worker 
1782*7c356e86SAndroid Build Coastguard Worker 	if (type == TT_FUNSUB) {
1783*7c356e86SAndroid Build Coastguard Worker 		/* map us high and mark as close-on-exec */
1784*7c356e86SAndroid Build Coastguard Worker 		if ((j = savefd(i)) != i) {
1785*7c356e86SAndroid Build Coastguard Worker 			close(i);
1786*7c356e86SAndroid Build Coastguard Worker 			i = j;
1787*7c356e86SAndroid Build Coastguard Worker 		}
1788*7c356e86SAndroid Build Coastguard Worker 
1789*7c356e86SAndroid Build Coastguard Worker 		/* operation mode for the shf */
1790*7c356e86SAndroid Build Coastguard Worker 		j = SHF_RD;
1791*7c356e86SAndroid Build Coastguard Worker 	} else
1792*7c356e86SAndroid Build Coastguard Worker 		j = SHF_WR;
1793*7c356e86SAndroid Build Coastguard Worker 
1794*7c356e86SAndroid Build Coastguard Worker 	/* shf_fdopen cannot fail, so no fd leak */
1795*7c356e86SAndroid Build Coastguard Worker 	tp->shf = shf_fdopen(i, j, NULL);
1796*7c356e86SAndroid Build Coastguard Worker 
1797*7c356e86SAndroid Build Coastguard Worker  maketemp_out:
1798*7c356e86SAndroid Build Coastguard Worker 	tp->next = *tlist;
1799*7c356e86SAndroid Build Coastguard Worker 	*tlist = tp;
1800*7c356e86SAndroid Build Coastguard Worker 	return (tp);
1801*7c356e86SAndroid Build Coastguard Worker }
1802*7c356e86SAndroid Build Coastguard Worker 
1803*7c356e86SAndroid Build Coastguard Worker /*
1804*7c356e86SAndroid Build Coastguard Worker  * We use a similar collision resolution algorithm as Python 2.5.4
1805*7c356e86SAndroid Build Coastguard Worker  * but with a slightly tweaked implementation written from scratch.
1806*7c356e86SAndroid Build Coastguard Worker  */
1807*7c356e86SAndroid Build Coastguard Worker 
1808*7c356e86SAndroid Build Coastguard Worker #define	INIT_TBLSHIFT	3	/* initial table shift (2^3 = 8) */
1809*7c356e86SAndroid Build Coastguard Worker #define PERTURB_SHIFT	5	/* see Python 2.5.4 Objects/dictobject.c */
1810*7c356e86SAndroid Build Coastguard Worker 
1811*7c356e86SAndroid Build Coastguard Worker static void tgrow(struct table *);
1812*7c356e86SAndroid Build Coastguard Worker static int tnamecmp(const void *, const void *);
1813*7c356e86SAndroid Build Coastguard Worker 
1814*7c356e86SAndroid Build Coastguard Worker static void
tgrow(struct table * tp)1815*7c356e86SAndroid Build Coastguard Worker tgrow(struct table *tp)
1816*7c356e86SAndroid Build Coastguard Worker {
1817*7c356e86SAndroid Build Coastguard Worker 	size_t i, j, osize, mask, perturb;
1818*7c356e86SAndroid Build Coastguard Worker 	struct tbl *tblp, **pp;
1819*7c356e86SAndroid Build Coastguard Worker 	struct tbl **ntblp, **otblp = tp->tbls;
1820*7c356e86SAndroid Build Coastguard Worker 
1821*7c356e86SAndroid Build Coastguard Worker 	if (tp->tshift > 29)
1822*7c356e86SAndroid Build Coastguard Worker 		internal_errorf("hash table size limit reached");
1823*7c356e86SAndroid Build Coastguard Worker 
1824*7c356e86SAndroid Build Coastguard Worker 	/* calculate old size, new shift and new size */
1825*7c356e86SAndroid Build Coastguard Worker 	osize = (size_t)1 << (tp->tshift++);
1826*7c356e86SAndroid Build Coastguard Worker 	i = osize << 1;
1827*7c356e86SAndroid Build Coastguard Worker 
1828*7c356e86SAndroid Build Coastguard Worker 	ntblp = alloc2(i, sizeof(struct tbl *), tp->areap);
1829*7c356e86SAndroid Build Coastguard Worker 	/* multiplication cannot overflow: alloc2 checked that */
1830*7c356e86SAndroid Build Coastguard Worker 	memset(ntblp, 0, i * sizeof(struct tbl *));
1831*7c356e86SAndroid Build Coastguard Worker 
1832*7c356e86SAndroid Build Coastguard Worker 	/* table can get very full when reaching its size limit */
1833*7c356e86SAndroid Build Coastguard Worker 	tp->nfree = (tp->tshift == 30) ? 0x3FFF0000UL :
1834*7c356e86SAndroid Build Coastguard Worker 	    /* but otherwise, only 75% */
1835*7c356e86SAndroid Build Coastguard Worker 	    ((i * 3) / 4);
1836*7c356e86SAndroid Build Coastguard Worker 	tp->tbls = ntblp;
1837*7c356e86SAndroid Build Coastguard Worker 	if (otblp == NULL)
1838*7c356e86SAndroid Build Coastguard Worker 		return;
1839*7c356e86SAndroid Build Coastguard Worker 
1840*7c356e86SAndroid Build Coastguard Worker 	mask = i - 1;
1841*7c356e86SAndroid Build Coastguard Worker 	for (i = 0; i < osize; i++)
1842*7c356e86SAndroid Build Coastguard Worker 		if ((tblp = otblp[i]) != NULL) {
1843*7c356e86SAndroid Build Coastguard Worker 			if ((tblp->flag & DEFINED)) {
1844*7c356e86SAndroid Build Coastguard Worker 				/* search for free hash table slot */
1845*7c356e86SAndroid Build Coastguard Worker 				j = perturb = tblp->ua.hval;
1846*7c356e86SAndroid Build Coastguard Worker 				goto find_first_empty_slot;
1847*7c356e86SAndroid Build Coastguard Worker  find_next_empty_slot:
1848*7c356e86SAndroid Build Coastguard Worker 				j = (j << 2) + j + perturb + 1;
1849*7c356e86SAndroid Build Coastguard Worker 				perturb >>= PERTURB_SHIFT;
1850*7c356e86SAndroid Build Coastguard Worker  find_first_empty_slot:
1851*7c356e86SAndroid Build Coastguard Worker 				pp = &ntblp[j & mask];
1852*7c356e86SAndroid Build Coastguard Worker 				if (*pp != NULL)
1853*7c356e86SAndroid Build Coastguard Worker 					goto find_next_empty_slot;
1854*7c356e86SAndroid Build Coastguard Worker 				/* found an empty hash table slot */
1855*7c356e86SAndroid Build Coastguard Worker 				*pp = tblp;
1856*7c356e86SAndroid Build Coastguard Worker 				tp->nfree--;
1857*7c356e86SAndroid Build Coastguard Worker 			} else if (!(tblp->flag & FINUSE)) {
1858*7c356e86SAndroid Build Coastguard Worker 				afree(tblp, tp->areap);
1859*7c356e86SAndroid Build Coastguard Worker 			}
1860*7c356e86SAndroid Build Coastguard Worker 		}
1861*7c356e86SAndroid Build Coastguard Worker 	afree(otblp, tp->areap);
1862*7c356e86SAndroid Build Coastguard Worker }
1863*7c356e86SAndroid Build Coastguard Worker 
1864*7c356e86SAndroid Build Coastguard Worker void
ktinit(Area * ap,struct table * tp,uint8_t initshift)1865*7c356e86SAndroid Build Coastguard Worker ktinit(Area *ap, struct table *tp, uint8_t initshift)
1866*7c356e86SAndroid Build Coastguard Worker {
1867*7c356e86SAndroid Build Coastguard Worker 	tp->areap = ap;
1868*7c356e86SAndroid Build Coastguard Worker 	tp->tbls = NULL;
1869*7c356e86SAndroid Build Coastguard Worker 	tp->tshift = ((initshift > INIT_TBLSHIFT) ?
1870*7c356e86SAndroid Build Coastguard Worker 	    initshift : INIT_TBLSHIFT) - 1;
1871*7c356e86SAndroid Build Coastguard Worker 	tgrow(tp);
1872*7c356e86SAndroid Build Coastguard Worker }
1873*7c356e86SAndroid Build Coastguard Worker 
1874*7c356e86SAndroid Build Coastguard Worker /* table, name (key) to search for, hash(name), rv pointer to tbl ptr */
1875*7c356e86SAndroid Build Coastguard Worker struct tbl *
ktscan(struct table * tp,const char * name,uint32_t h,struct tbl *** ppp)1876*7c356e86SAndroid Build Coastguard Worker ktscan(struct table *tp, const char *name, uint32_t h, struct tbl ***ppp)
1877*7c356e86SAndroid Build Coastguard Worker {
1878*7c356e86SAndroid Build Coastguard Worker 	size_t j, perturb, mask;
1879*7c356e86SAndroid Build Coastguard Worker 	struct tbl **pp, *p;
1880*7c356e86SAndroid Build Coastguard Worker 
1881*7c356e86SAndroid Build Coastguard Worker 	mask = ((size_t)1 << (tp->tshift)) - 1;
1882*7c356e86SAndroid Build Coastguard Worker 	/* search for hash table slot matching name */
1883*7c356e86SAndroid Build Coastguard Worker 	j = perturb = h;
1884*7c356e86SAndroid Build Coastguard Worker 	goto find_first_slot;
1885*7c356e86SAndroid Build Coastguard Worker  find_next_slot:
1886*7c356e86SAndroid Build Coastguard Worker 	j = (j << 2) + j + perturb + 1;
1887*7c356e86SAndroid Build Coastguard Worker 	perturb >>= PERTURB_SHIFT;
1888*7c356e86SAndroid Build Coastguard Worker  find_first_slot:
1889*7c356e86SAndroid Build Coastguard Worker 	pp = &tp->tbls[j & mask];
1890*7c356e86SAndroid Build Coastguard Worker 	if ((p = *pp) != NULL && (p->ua.hval != h || !(p->flag & DEFINED) ||
1891*7c356e86SAndroid Build Coastguard Worker 	    strcmp(p->name, name)))
1892*7c356e86SAndroid Build Coastguard Worker 		goto find_next_slot;
1893*7c356e86SAndroid Build Coastguard Worker 	/* p == NULL if not found, correct found entry otherwise */
1894*7c356e86SAndroid Build Coastguard Worker 	if (ppp)
1895*7c356e86SAndroid Build Coastguard Worker 		*ppp = pp;
1896*7c356e86SAndroid Build Coastguard Worker 	return (p);
1897*7c356e86SAndroid Build Coastguard Worker }
1898*7c356e86SAndroid Build Coastguard Worker 
1899*7c356e86SAndroid Build Coastguard Worker /* table, name (key) to enter, hash(n) */
1900*7c356e86SAndroid Build Coastguard Worker struct tbl *
ktenter(struct table * tp,const char * n,uint32_t h)1901*7c356e86SAndroid Build Coastguard Worker ktenter(struct table *tp, const char *n, uint32_t h)
1902*7c356e86SAndroid Build Coastguard Worker {
1903*7c356e86SAndroid Build Coastguard Worker 	struct tbl **pp, *p;
1904*7c356e86SAndroid Build Coastguard Worker 	size_t len;
1905*7c356e86SAndroid Build Coastguard Worker 
1906*7c356e86SAndroid Build Coastguard Worker  Search:
1907*7c356e86SAndroid Build Coastguard Worker 	if ((p = ktscan(tp, n, h, &pp)))
1908*7c356e86SAndroid Build Coastguard Worker 		return (p);
1909*7c356e86SAndroid Build Coastguard Worker 
1910*7c356e86SAndroid Build Coastguard Worker 	if (tp->nfree == 0) {
1911*7c356e86SAndroid Build Coastguard Worker 		/* too full */
1912*7c356e86SAndroid Build Coastguard Worker 		tgrow(tp);
1913*7c356e86SAndroid Build Coastguard Worker 		goto Search;
1914*7c356e86SAndroid Build Coastguard Worker 	}
1915*7c356e86SAndroid Build Coastguard Worker 
1916*7c356e86SAndroid Build Coastguard Worker 	/* create new tbl entry */
1917*7c356e86SAndroid Build Coastguard Worker 	len = strlen(n);
1918*7c356e86SAndroid Build Coastguard Worker 	checkoktoadd(len, offsetof(struct tbl, name[0]) + 1);
1919*7c356e86SAndroid Build Coastguard Worker 	p = alloc(offsetof(struct tbl, name[0]) + ++len, tp->areap);
1920*7c356e86SAndroid Build Coastguard Worker 	p->flag = 0;
1921*7c356e86SAndroid Build Coastguard Worker 	p->type = 0;
1922*7c356e86SAndroid Build Coastguard Worker 	p->areap = tp->areap;
1923*7c356e86SAndroid Build Coastguard Worker 	p->ua.hval = h;
1924*7c356e86SAndroid Build Coastguard Worker 	p->u2.field = 0;
1925*7c356e86SAndroid Build Coastguard Worker 	p->u.array = NULL;
1926*7c356e86SAndroid Build Coastguard Worker 	memcpy(p->name, n, len);
1927*7c356e86SAndroid Build Coastguard Worker 
1928*7c356e86SAndroid Build Coastguard Worker 	/* enter in tp->tbls */
1929*7c356e86SAndroid Build Coastguard Worker 	tp->nfree--;
1930*7c356e86SAndroid Build Coastguard Worker 	*pp = p;
1931*7c356e86SAndroid Build Coastguard Worker 	return (p);
1932*7c356e86SAndroid Build Coastguard Worker }
1933*7c356e86SAndroid Build Coastguard Worker 
1934*7c356e86SAndroid Build Coastguard Worker void
ktwalk(struct tstate * ts,struct table * tp)1935*7c356e86SAndroid Build Coastguard Worker ktwalk(struct tstate *ts, struct table *tp)
1936*7c356e86SAndroid Build Coastguard Worker {
1937*7c356e86SAndroid Build Coastguard Worker 	ts->left = (size_t)1 << (tp->tshift);
1938*7c356e86SAndroid Build Coastguard Worker 	ts->next = tp->tbls;
1939*7c356e86SAndroid Build Coastguard Worker }
1940*7c356e86SAndroid Build Coastguard Worker 
1941*7c356e86SAndroid Build Coastguard Worker struct tbl *
ktnext(struct tstate * ts)1942*7c356e86SAndroid Build Coastguard Worker ktnext(struct tstate *ts)
1943*7c356e86SAndroid Build Coastguard Worker {
1944*7c356e86SAndroid Build Coastguard Worker 	while (--ts->left >= 0) {
1945*7c356e86SAndroid Build Coastguard Worker 		struct tbl *p = *ts->next++;
1946*7c356e86SAndroid Build Coastguard Worker 		if (p != NULL && (p->flag & DEFINED))
1947*7c356e86SAndroid Build Coastguard Worker 			return (p);
1948*7c356e86SAndroid Build Coastguard Worker 	}
1949*7c356e86SAndroid Build Coastguard Worker 	return (NULL);
1950*7c356e86SAndroid Build Coastguard Worker }
1951*7c356e86SAndroid Build Coastguard Worker 
1952*7c356e86SAndroid Build Coastguard Worker static int
tnamecmp(const void * p1,const void * p2)1953*7c356e86SAndroid Build Coastguard Worker tnamecmp(const void *p1, const void *p2)
1954*7c356e86SAndroid Build Coastguard Worker {
1955*7c356e86SAndroid Build Coastguard Worker 	const struct tbl *a = *((const struct tbl * const *)p1);
1956*7c356e86SAndroid Build Coastguard Worker 	const struct tbl *b = *((const struct tbl * const *)p2);
1957*7c356e86SAndroid Build Coastguard Worker 
1958*7c356e86SAndroid Build Coastguard Worker 	return (ascstrcmp(a->name, b->name));
1959*7c356e86SAndroid Build Coastguard Worker }
1960*7c356e86SAndroid Build Coastguard Worker 
1961*7c356e86SAndroid Build Coastguard Worker struct tbl **
ktsort(struct table * tp)1962*7c356e86SAndroid Build Coastguard Worker ktsort(struct table *tp)
1963*7c356e86SAndroid Build Coastguard Worker {
1964*7c356e86SAndroid Build Coastguard Worker 	size_t i;
1965*7c356e86SAndroid Build Coastguard Worker 	struct tbl **p, **sp, **dp;
1966*7c356e86SAndroid Build Coastguard Worker 
1967*7c356e86SAndroid Build Coastguard Worker 	/*
1968*7c356e86SAndroid Build Coastguard Worker 	 * since the table is never entirely full, no need to reserve
1969*7c356e86SAndroid Build Coastguard Worker 	 * additional space for the trailing NULL appended below
1970*7c356e86SAndroid Build Coastguard Worker 	 */
1971*7c356e86SAndroid Build Coastguard Worker 	i = (size_t)1 << (tp->tshift);
1972*7c356e86SAndroid Build Coastguard Worker 	p = alloc2(i, sizeof(struct tbl *), ATEMP);
1973*7c356e86SAndroid Build Coastguard Worker 	sp = tp->tbls;		/* source */
1974*7c356e86SAndroid Build Coastguard Worker 	dp = p;			/* dest */
1975*7c356e86SAndroid Build Coastguard Worker 	while (i--)
1976*7c356e86SAndroid Build Coastguard Worker 		if ((*dp = *sp++) != NULL && (((*dp)->flag & DEFINED) ||
1977*7c356e86SAndroid Build Coastguard Worker 		    ((*dp)->flag & ARRAY)))
1978*7c356e86SAndroid Build Coastguard Worker 			dp++;
1979*7c356e86SAndroid Build Coastguard Worker 	qsort(p, (i = dp - p), sizeof(struct tbl *), tnamecmp);
1980*7c356e86SAndroid Build Coastguard Worker 	p[i] = NULL;
1981*7c356e86SAndroid Build Coastguard Worker 	return (p);
1982*7c356e86SAndroid Build Coastguard Worker }
1983*7c356e86SAndroid Build Coastguard Worker 
1984*7c356e86SAndroid Build Coastguard Worker #ifdef SIGWINCH
1985*7c356e86SAndroid Build Coastguard Worker static void
x_sigwinch(int sig MKSH_A_UNUSED)1986*7c356e86SAndroid Build Coastguard Worker x_sigwinch(int sig MKSH_A_UNUSED)
1987*7c356e86SAndroid Build Coastguard Worker {
1988*7c356e86SAndroid Build Coastguard Worker 	/* this runs inside interrupt context, with errno saved */
1989*7c356e86SAndroid Build Coastguard Worker 
1990*7c356e86SAndroid Build Coastguard Worker 	got_winch = 1;
1991*7c356e86SAndroid Build Coastguard Worker }
1992*7c356e86SAndroid Build Coastguard Worker #endif
1993*7c356e86SAndroid Build Coastguard Worker 
1994*7c356e86SAndroid Build Coastguard Worker #ifdef DF
1995*7c356e86SAndroid Build Coastguard Worker void
DF(const char * fmt,...)1996*7c356e86SAndroid Build Coastguard Worker DF(const char *fmt, ...)
1997*7c356e86SAndroid Build Coastguard Worker {
1998*7c356e86SAndroid Build Coastguard Worker 	va_list args;
1999*7c356e86SAndroid Build Coastguard Worker 	struct timeval tv;
2000*7c356e86SAndroid Build Coastguard Worker 	mirtime_mjd mjd;
2001*7c356e86SAndroid Build Coastguard Worker 
2002*7c356e86SAndroid Build Coastguard Worker 	mksh_lockfd(shl_dbg_fd);
2003*7c356e86SAndroid Build Coastguard Worker 	mksh_TIME(tv);
2004*7c356e86SAndroid Build Coastguard Worker 	timet2mjd(&mjd, tv.tv_sec);
2005*7c356e86SAndroid Build Coastguard Worker 	shf_fprintf(shl_dbg, "[%02u:%02u:%02u (%u) %u.%06u] ",
2006*7c356e86SAndroid Build Coastguard Worker 	    (unsigned)mjd.sec / 3600, ((unsigned)mjd.sec / 60) % 60,
2007*7c356e86SAndroid Build Coastguard Worker 	    (unsigned)mjd.sec % 60, (unsigned)getpid(),
2008*7c356e86SAndroid Build Coastguard Worker 	    (unsigned)tv.tv_sec, (unsigned)tv.tv_usec);
2009*7c356e86SAndroid Build Coastguard Worker 	va_start(args, fmt);
2010*7c356e86SAndroid Build Coastguard Worker 	shf_vfprintf(shl_dbg, fmt, args);
2011*7c356e86SAndroid Build Coastguard Worker 	va_end(args);
2012*7c356e86SAndroid Build Coastguard Worker 	shf_putc('\n', shl_dbg);
2013*7c356e86SAndroid Build Coastguard Worker 	shf_flush(shl_dbg);
2014*7c356e86SAndroid Build Coastguard Worker 	mksh_unlkfd(shl_dbg_fd);
2015*7c356e86SAndroid Build Coastguard Worker }
2016*7c356e86SAndroid Build Coastguard Worker #endif
2017*7c356e86SAndroid Build Coastguard Worker 
2018*7c356e86SAndroid Build Coastguard Worker void
x_mkraw(int fd,mksh_ttyst * ocb,bool forread)2019*7c356e86SAndroid Build Coastguard Worker x_mkraw(int fd, mksh_ttyst *ocb, bool forread)
2020*7c356e86SAndroid Build Coastguard Worker {
2021*7c356e86SAndroid Build Coastguard Worker 	mksh_ttyst cb;
2022*7c356e86SAndroid Build Coastguard Worker 
2023*7c356e86SAndroid Build Coastguard Worker 	if (ocb)
2024*7c356e86SAndroid Build Coastguard Worker 		mksh_tcget(fd, ocb);
2025*7c356e86SAndroid Build Coastguard Worker 	else
2026*7c356e86SAndroid Build Coastguard Worker 		ocb = &tty_state;
2027*7c356e86SAndroid Build Coastguard Worker 
2028*7c356e86SAndroid Build Coastguard Worker 	cb = *ocb;
2029*7c356e86SAndroid Build Coastguard Worker 	if (forread) {
2030*7c356e86SAndroid Build Coastguard Worker 		cb.c_iflag &= ~(ISTRIP);
2031*7c356e86SAndroid Build Coastguard Worker 		cb.c_lflag &= ~(ICANON) | ECHO;
2032*7c356e86SAndroid Build Coastguard Worker 	} else {
2033*7c356e86SAndroid Build Coastguard Worker 		cb.c_iflag &= ~(INLCR | ICRNL | ISTRIP);
2034*7c356e86SAndroid Build Coastguard Worker 		cb.c_lflag &= ~(ISIG | ICANON | ECHO);
2035*7c356e86SAndroid Build Coastguard Worker 	}
2036*7c356e86SAndroid Build Coastguard Worker #if defined(VLNEXT) && defined(_POSIX_VDISABLE)
2037*7c356e86SAndroid Build Coastguard Worker 	/* OSF/1 processes lnext when ~icanon */
2038*7c356e86SAndroid Build Coastguard Worker 	cb.c_cc[VLNEXT] = _POSIX_VDISABLE;
2039*7c356e86SAndroid Build Coastguard Worker #endif
2040*7c356e86SAndroid Build Coastguard Worker 	/* SunOS 4.1.x and OSF/1 process discard(flush) when ~icanon */
2041*7c356e86SAndroid Build Coastguard Worker #if defined(VDISCARD) && defined(_POSIX_VDISABLE)
2042*7c356e86SAndroid Build Coastguard Worker 	cb.c_cc[VDISCARD] = _POSIX_VDISABLE;
2043*7c356e86SAndroid Build Coastguard Worker #endif
2044*7c356e86SAndroid Build Coastguard Worker 	cb.c_cc[VTIME] = 0;
2045*7c356e86SAndroid Build Coastguard Worker 	cb.c_cc[VMIN] = 1;
2046*7c356e86SAndroid Build Coastguard Worker 
2047*7c356e86SAndroid Build Coastguard Worker 	mksh_tcset(fd, &cb);
2048*7c356e86SAndroid Build Coastguard Worker }
2049*7c356e86SAndroid Build Coastguard Worker 
2050*7c356e86SAndroid Build Coastguard Worker #ifdef MKSH_ENVDIR
2051*7c356e86SAndroid Build Coastguard Worker static void
init_environ(void)2052*7c356e86SAndroid Build Coastguard Worker init_environ(void)
2053*7c356e86SAndroid Build Coastguard Worker {
2054*7c356e86SAndroid Build Coastguard Worker 	char *xp;
2055*7c356e86SAndroid Build Coastguard Worker 	ssize_t n;
2056*7c356e86SAndroid Build Coastguard Worker 	XString xs;
2057*7c356e86SAndroid Build Coastguard Worker 	struct shf *shf;
2058*7c356e86SAndroid Build Coastguard Worker 	DIR *dirp;
2059*7c356e86SAndroid Build Coastguard Worker 	struct dirent *dent;
2060*7c356e86SAndroid Build Coastguard Worker 
2061*7c356e86SAndroid Build Coastguard Worker 	if ((dirp = opendir(MKSH_ENVDIR)) == NULL) {
2062*7c356e86SAndroid Build Coastguard Worker 		warningf(false, "cannot read environment from %s: %s",
2063*7c356e86SAndroid Build Coastguard Worker 		    MKSH_ENVDIR, cstrerror(errno));
2064*7c356e86SAndroid Build Coastguard Worker 		return;
2065*7c356e86SAndroid Build Coastguard Worker 	}
2066*7c356e86SAndroid Build Coastguard Worker 	XinitN(xs, 256, ATEMP);
2067*7c356e86SAndroid Build Coastguard Worker  read_envfile:
2068*7c356e86SAndroid Build Coastguard Worker 	errno = 0;
2069*7c356e86SAndroid Build Coastguard Worker 	if ((dent = readdir(dirp)) != NULL) {
2070*7c356e86SAndroid Build Coastguard Worker 		if (skip_varname(dent->d_name, true)[0] == '\0') {
2071*7c356e86SAndroid Build Coastguard Worker 			strpathx(xp, MKSH_ENVDIR, dent->d_name, 1);
2072*7c356e86SAndroid Build Coastguard Worker 			if (!(shf = shf_open(xp, O_RDONLY, 0, 0))) {
2073*7c356e86SAndroid Build Coastguard Worker 				warningf(false,
2074*7c356e86SAndroid Build Coastguard Worker 				    "cannot read environment %s from %s: %s",
2075*7c356e86SAndroid Build Coastguard Worker 				    dent->d_name, MKSH_ENVDIR,
2076*7c356e86SAndroid Build Coastguard Worker 				    cstrerror(errno));
2077*7c356e86SAndroid Build Coastguard Worker 				goto read_envfile;
2078*7c356e86SAndroid Build Coastguard Worker 			}
2079*7c356e86SAndroid Build Coastguard Worker 			afree(xp, ATEMP);
2080*7c356e86SAndroid Build Coastguard Worker 			n = strlen(dent->d_name);
2081*7c356e86SAndroid Build Coastguard Worker 			xp = Xstring(xs, xp);
2082*7c356e86SAndroid Build Coastguard Worker 			XcheckN(xs, xp, n + 32);
2083*7c356e86SAndroid Build Coastguard Worker 			memcpy(xp, dent->d_name, n);
2084*7c356e86SAndroid Build Coastguard Worker 			xp += n;
2085*7c356e86SAndroid Build Coastguard Worker 			*xp++ = '=';
2086*7c356e86SAndroid Build Coastguard Worker 			while ((n = shf_read(xp, Xnleft(xs, xp), shf)) > 0) {
2087*7c356e86SAndroid Build Coastguard Worker 				xp += n;
2088*7c356e86SAndroid Build Coastguard Worker 				if (Xnleft(xs, xp) <= 0)
2089*7c356e86SAndroid Build Coastguard Worker 					XcheckN(xs, xp, Xlength(xs, xp));
2090*7c356e86SAndroid Build Coastguard Worker 			}
2091*7c356e86SAndroid Build Coastguard Worker 			if (n < 0) {
2092*7c356e86SAndroid Build Coastguard Worker 				warningf(false,
2093*7c356e86SAndroid Build Coastguard Worker 				    "cannot read environment %s from %s: %s",
2094*7c356e86SAndroid Build Coastguard Worker 				    dent->d_name, MKSH_ENVDIR,
2095*7c356e86SAndroid Build Coastguard Worker 				    cstrerror(shf_errno(shf)));
2096*7c356e86SAndroid Build Coastguard Worker 			} else {
2097*7c356e86SAndroid Build Coastguard Worker 				*xp = '\0';
2098*7c356e86SAndroid Build Coastguard Worker 				xp = Xstring(xs, xp);
2099*7c356e86SAndroid Build Coastguard Worker 				rndpush(xp);
2100*7c356e86SAndroid Build Coastguard Worker 				typeset(xp, IMPORT | EXPORT, 0, 0, 0);
2101*7c356e86SAndroid Build Coastguard Worker 			}
2102*7c356e86SAndroid Build Coastguard Worker 			shf_close(shf);
2103*7c356e86SAndroid Build Coastguard Worker 		}
2104*7c356e86SAndroid Build Coastguard Worker 		goto read_envfile;
2105*7c356e86SAndroid Build Coastguard Worker 	} else if (errno)
2106*7c356e86SAndroid Build Coastguard Worker 		warningf(false, "cannot read environment from %s: %s",
2107*7c356e86SAndroid Build Coastguard Worker 		    MKSH_ENVDIR, cstrerror(errno));
2108*7c356e86SAndroid Build Coastguard Worker 	closedir(dirp);
2109*7c356e86SAndroid Build Coastguard Worker 	Xfree(xs, xp);
2110*7c356e86SAndroid Build Coastguard Worker }
2111*7c356e86SAndroid Build Coastguard Worker #else
2112*7c356e86SAndroid Build Coastguard Worker extern char **environ;
2113*7c356e86SAndroid Build Coastguard Worker 
2114*7c356e86SAndroid Build Coastguard Worker static void
init_environ(void)2115*7c356e86SAndroid Build Coastguard Worker init_environ(void)
2116*7c356e86SAndroid Build Coastguard Worker {
2117*7c356e86SAndroid Build Coastguard Worker 	const char **wp;
2118*7c356e86SAndroid Build Coastguard Worker 
2119*7c356e86SAndroid Build Coastguard Worker 	if (environ == NULL)
2120*7c356e86SAndroid Build Coastguard Worker 		return;
2121*7c356e86SAndroid Build Coastguard Worker 
2122*7c356e86SAndroid Build Coastguard Worker 	wp = (const char **)environ;
2123*7c356e86SAndroid Build Coastguard Worker 	while (*wp != NULL) {
2124*7c356e86SAndroid Build Coastguard Worker 		rndpush(*wp);
2125*7c356e86SAndroid Build Coastguard Worker 		typeset(*wp, IMPORT | EXPORT, 0, 0, 0);
2126*7c356e86SAndroid Build Coastguard Worker 		++wp;
2127*7c356e86SAndroid Build Coastguard Worker 	}
2128*7c356e86SAndroid Build Coastguard Worker }
2129*7c356e86SAndroid Build Coastguard Worker #endif
2130*7c356e86SAndroid Build Coastguard Worker 
2131*7c356e86SAndroid Build Coastguard Worker #ifdef MKSH_EARLY_LOCALE_TRACKING
2132*7c356e86SAndroid Build Coastguard Worker void
recheck_ctype(void)2133*7c356e86SAndroid Build Coastguard Worker recheck_ctype(void)
2134*7c356e86SAndroid Build Coastguard Worker {
2135*7c356e86SAndroid Build Coastguard Worker 	const char *ccp;
2136*7c356e86SAndroid Build Coastguard Worker 	uint8_t old_utfmode = UTFMODE;
2137*7c356e86SAndroid Build Coastguard Worker 
2138*7c356e86SAndroid Build Coastguard Worker 	ccp = str_val(global("LC_ALL"));
2139*7c356e86SAndroid Build Coastguard Worker 	if (ccp == null)
2140*7c356e86SAndroid Build Coastguard Worker 		ccp = str_val(global("LC_CTYPE"));
2141*7c356e86SAndroid Build Coastguard Worker 	if (ccp == null)
2142*7c356e86SAndroid Build Coastguard Worker 		ccp = str_val(global("LANG"));
2143*7c356e86SAndroid Build Coastguard Worker 	UTFMODE = isuc(ccp);
2144*7c356e86SAndroid Build Coastguard Worker #if HAVE_SETLOCALE_CTYPE
2145*7c356e86SAndroid Build Coastguard Worker 	ccp = setlocale(LC_CTYPE, ccp);
2146*7c356e86SAndroid Build Coastguard Worker #if HAVE_LANGINFO_CODESET
2147*7c356e86SAndroid Build Coastguard Worker 	if (!isuc(ccp))
2148*7c356e86SAndroid Build Coastguard Worker 		ccp = nl_langinfo(CODESET);
2149*7c356e86SAndroid Build Coastguard Worker #endif
2150*7c356e86SAndroid Build Coastguard Worker 	if (isuc(ccp))
2151*7c356e86SAndroid Build Coastguard Worker 		UTFMODE = 1;
2152*7c356e86SAndroid Build Coastguard Worker #endif
2153*7c356e86SAndroid Build Coastguard Worker 
2154*7c356e86SAndroid Build Coastguard Worker 	if (Flag(FPOSIX) && UTFMODE && !old_utfmode)
2155*7c356e86SAndroid Build Coastguard Worker 		warningf(true, "early locale tracking enabled UTF-8 mode while in POSIX mode, you are now noncompliant");
2156*7c356e86SAndroid Build Coastguard Worker }
2157*7c356e86SAndroid Build Coastguard Worker #endif
2158