1*7c356e86SAndroid Build Coastguard Worker /* $OpenBSD: main.c,v 1.57 2015/09/10 22:48:58 nicm Exp $ */
2*7c356e86SAndroid Build Coastguard Worker /* $OpenBSD: tty.c,v 1.10 2014/08/10 02:44:26 guenther Exp $ */
3*7c356e86SAndroid Build Coastguard Worker /* $OpenBSD: io.c,v 1.26 2015/09/11 08:00:27 guenther Exp $ */
4*7c356e86SAndroid Build Coastguard Worker /* $OpenBSD: table.c,v 1.16 2015/09/01 13:12:31 tedu Exp $ */
5*7c356e86SAndroid Build Coastguard Worker
6*7c356e86SAndroid Build Coastguard Worker /*-
7*7c356e86SAndroid Build Coastguard Worker * Copyright (c) 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010,
8*7c356e86SAndroid Build Coastguard Worker * 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018,
9*7c356e86SAndroid Build Coastguard Worker * 2019, 2020
10*7c356e86SAndroid Build Coastguard Worker * mirabilos <[email protected]>
11*7c356e86SAndroid Build Coastguard Worker *
12*7c356e86SAndroid Build Coastguard Worker * Provided that these terms and disclaimer and all copyright notices
13*7c356e86SAndroid Build Coastguard Worker * are retained or reproduced in an accompanying document, permission
14*7c356e86SAndroid Build Coastguard Worker * is granted to deal in this work without restriction, including un-
15*7c356e86SAndroid Build Coastguard Worker * limited rights to use, publicly perform, distribute, sell, modify,
16*7c356e86SAndroid Build Coastguard Worker * merge, give away, or sublicence.
17*7c356e86SAndroid Build Coastguard Worker *
18*7c356e86SAndroid Build Coastguard Worker * This work is provided "AS IS" and WITHOUT WARRANTY of any kind, to
19*7c356e86SAndroid Build Coastguard Worker * the utmost extent permitted by applicable law, neither express nor
20*7c356e86SAndroid Build Coastguard Worker * implied; without malicious intent or gross negligence. In no event
21*7c356e86SAndroid Build Coastguard Worker * may a licensor, author or contributor be held liable for indirect,
22*7c356e86SAndroid Build Coastguard Worker * direct, other damage, loss, or other issues arising in any way out
23*7c356e86SAndroid Build Coastguard Worker * of dealing in the work, even if advised of the possibility of such
24*7c356e86SAndroid Build Coastguard Worker * damage or existence of a defect, except proven that it results out
25*7c356e86SAndroid Build Coastguard Worker * of said person's immediate fault when using the work as intended.
26*7c356e86SAndroid Build Coastguard Worker */
27*7c356e86SAndroid Build Coastguard Worker
28*7c356e86SAndroid Build Coastguard Worker #define EXTERN
29*7c356e86SAndroid Build Coastguard Worker #include "sh.h"
30*7c356e86SAndroid Build Coastguard Worker
31*7c356e86SAndroid Build Coastguard Worker #if HAVE_LANGINFO_CODESET
32*7c356e86SAndroid Build Coastguard Worker #include <langinfo.h>
33*7c356e86SAndroid Build Coastguard Worker #endif
34*7c356e86SAndroid Build Coastguard Worker #if HAVE_SETLOCALE_CTYPE
35*7c356e86SAndroid Build Coastguard Worker #include <locale.h>
36*7c356e86SAndroid Build Coastguard Worker #endif
37*7c356e86SAndroid Build Coastguard Worker
38*7c356e86SAndroid Build Coastguard Worker __RCSID("$MirOS: src/bin/mksh/main.c,v 1.374 2020/10/01 20:28:54 tg Exp $");
39*7c356e86SAndroid Build Coastguard Worker
40*7c356e86SAndroid Build Coastguard Worker #ifndef MKSHRC_PATH
41*7c356e86SAndroid Build Coastguard Worker #define MKSHRC_PATH "~/.mkshrc"
42*7c356e86SAndroid Build Coastguard Worker #endif
43*7c356e86SAndroid Build Coastguard Worker
44*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_DEFAULT_TMPDIR
45*7c356e86SAndroid Build Coastguard Worker #define MKSH_DEFAULT_TMPDIR MKSH_UNIXROOT "/tmp"
46*7c356e86SAndroid Build Coastguard Worker #endif
47*7c356e86SAndroid Build Coastguard Worker
48*7c356e86SAndroid Build Coastguard Worker static uint8_t isuc(const char *);
49*7c356e86SAndroid Build Coastguard Worker static int main_init(int, const char *[], Source **, struct block **);
50*7c356e86SAndroid Build Coastguard Worker void chvt_reinit(void);
51*7c356e86SAndroid Build Coastguard Worker static void reclaim(void);
52*7c356e86SAndroid Build Coastguard Worker static void remove_temps(struct temp *);
53*7c356e86SAndroid Build Coastguard Worker static mksh_uari_t rndsetup(void);
54*7c356e86SAndroid Build Coastguard Worker static void init_environ(void);
55*7c356e86SAndroid Build Coastguard Worker #ifdef SIGWINCH
56*7c356e86SAndroid Build Coastguard Worker static void x_sigwinch(int);
57*7c356e86SAndroid Build Coastguard Worker #endif
58*7c356e86SAndroid Build Coastguard Worker
59*7c356e86SAndroid Build Coastguard Worker static const char initsubs[] =
60*7c356e86SAndroid Build Coastguard Worker "${PS2=> }"
61*7c356e86SAndroid Build Coastguard Worker "${PS3=#? }"
62*7c356e86SAndroid Build Coastguard Worker "${PS4=+ }"
63*7c356e86SAndroid Build Coastguard Worker "${SECONDS=0}"
64*7c356e86SAndroid Build Coastguard Worker "${TMOUT=0}"
65*7c356e86SAndroid Build Coastguard Worker "${EPOCHREALTIME=}";
66*7c356e86SAndroid Build Coastguard Worker
67*7c356e86SAndroid Build Coastguard Worker static const char *initcoms[] = {
68*7c356e86SAndroid Build Coastguard Worker Ttypeset, Tdr, initvsn, NULL,
69*7c356e86SAndroid Build Coastguard Worker Ttypeset, Tdx, "HOME", TPATH, TSHELL, NULL,
70*7c356e86SAndroid Build Coastguard Worker Ttypeset, "-i10", "COLUMNS", "LINES", "SECONDS", "TMOUT", NULL,
71*7c356e86SAndroid Build Coastguard Worker Talias,
72*7c356e86SAndroid Build Coastguard Worker "integer=\\\\builtin typeset -i",
73*7c356e86SAndroid Build Coastguard Worker "local=\\\\builtin typeset",
74*7c356e86SAndroid Build Coastguard Worker /* not "alias -t --": hash -r needs to work */
75*7c356e86SAndroid Build Coastguard Worker "hash=\\\\builtin alias -t",
76*7c356e86SAndroid Build Coastguard Worker "type=\\\\builtin whence -v",
77*7c356e86SAndroid Build Coastguard Worker "autoload=\\\\builtin typeset -fu",
78*7c356e86SAndroid Build Coastguard Worker "functions=\\\\builtin typeset -f",
79*7c356e86SAndroid Build Coastguard Worker "history=\\\\builtin fc -l",
80*7c356e86SAndroid Build Coastguard Worker "nameref=\\\\builtin typeset -n",
81*7c356e86SAndroid Build Coastguard Worker "nohup=nohup ",
82*7c356e86SAndroid Build Coastguard Worker "r=\\\\builtin fc -e -",
83*7c356e86SAndroid Build Coastguard Worker "login=\\\\builtin exec login",
84*7c356e86SAndroid Build Coastguard Worker NULL,
85*7c356e86SAndroid Build Coastguard Worker /* this is what AT&T ksh seems to track, with the addition of emacs */
86*7c356e86SAndroid Build Coastguard Worker Talias, "-tU",
87*7c356e86SAndroid Build Coastguard Worker Tcat, "cc", "chmod", "cp", "date", "ed", "emacs", "grep", "ls",
88*7c356e86SAndroid Build Coastguard Worker "make", "mv", "pr", "rm", "sed", Tsh, "vi", "who", NULL,
89*7c356e86SAndroid Build Coastguard Worker NULL
90*7c356e86SAndroid Build Coastguard Worker };
91*7c356e86SAndroid Build Coastguard Worker
92*7c356e86SAndroid Build Coastguard Worker static const char *restr_com[] = {
93*7c356e86SAndroid Build Coastguard Worker Ttypeset, Tdr, TPATH, TENV, TSHELL, NULL
94*7c356e86SAndroid Build Coastguard Worker };
95*7c356e86SAndroid Build Coastguard Worker
96*7c356e86SAndroid Build Coastguard Worker static bool initio_done;
97*7c356e86SAndroid Build Coastguard Worker
98*7c356e86SAndroid Build Coastguard Worker /* top-level parsing and execution environment */
99*7c356e86SAndroid Build Coastguard Worker static struct env env;
100*7c356e86SAndroid Build Coastguard Worker struct env *e = &env;
101*7c356e86SAndroid Build Coastguard Worker
102*7c356e86SAndroid Build Coastguard Worker /* compile-time assertions */
103*7c356e86SAndroid Build Coastguard Worker
104*7c356e86SAndroid Build Coastguard Worker /* this one should be defined by the standard */
105*7c356e86SAndroid Build Coastguard Worker cta(char_is_1_char, (sizeof(char) == 1) && (sizeof(signed char) == 1) &&
106*7c356e86SAndroid Build Coastguard Worker (sizeof(unsigned char) == 1));
107*7c356e86SAndroid Build Coastguard Worker cta(char_is_8_bits, ((CHAR_BIT) == 8) && ((int)(unsigned char)0xFF == 0xFF) &&
108*7c356e86SAndroid Build Coastguard Worker ((int)(unsigned char)0x100 == 0) && ((int)(unsigned char)(int)-1 == 0xFF));
109*7c356e86SAndroid Build Coastguard Worker /* the next assertion is probably not really needed */
110*7c356e86SAndroid Build Coastguard Worker cta(short_is_2_char, sizeof(short) == 2);
111*7c356e86SAndroid Build Coastguard Worker cta(short_size_no_matter_of_signedness, sizeof(short) == sizeof(unsigned short));
112*7c356e86SAndroid Build Coastguard Worker /* the next assertion is probably not really needed */
113*7c356e86SAndroid Build Coastguard Worker cta(int_is_4_char, sizeof(int) == 4);
114*7c356e86SAndroid Build Coastguard Worker cta(int_size_no_matter_of_signedness, sizeof(int) == sizeof(unsigned int));
115*7c356e86SAndroid Build Coastguard Worker
116*7c356e86SAndroid Build Coastguard Worker cta(long_ge_int, sizeof(long) >= sizeof(int));
117*7c356e86SAndroid Build Coastguard Worker cta(long_size_no_matter_of_signedness, sizeof(long) == sizeof(unsigned long));
118*7c356e86SAndroid Build Coastguard Worker
119*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_LEGACY_MODE
120*7c356e86SAndroid Build Coastguard Worker /* the next assertion is probably not really needed */
121*7c356e86SAndroid Build Coastguard Worker cta(ari_is_4_char, sizeof(mksh_ari_t) == 4);
122*7c356e86SAndroid Build Coastguard Worker /* but this is */
123*7c356e86SAndroid Build Coastguard Worker cta(ari_has_31_bit, 0 < (mksh_ari_t)(((((mksh_ari_t)1 << 15) << 15) - 1) * 2 + 1));
124*7c356e86SAndroid Build Coastguard Worker /* the next assertion is probably not really needed */
125*7c356e86SAndroid Build Coastguard Worker cta(uari_is_4_char, sizeof(mksh_uari_t) == 4);
126*7c356e86SAndroid Build Coastguard Worker /* but the next three are; we REQUIRE unsigned integer wraparound */
127*7c356e86SAndroid Build Coastguard Worker cta(uari_has_31_bit, 0 < (mksh_uari_t)(((((mksh_uari_t)1 << 15) << 15) - 1) * 2 + 1));
128*7c356e86SAndroid Build Coastguard Worker cta(uari_has_32_bit, 0 < (mksh_uari_t)(((((mksh_uari_t)1 << 15) << 15) - 1) * 4 + 3));
129*7c356e86SAndroid Build Coastguard Worker cta(uari_wrap_32_bit,
130*7c356e86SAndroid Build Coastguard Worker (mksh_uari_t)(((((mksh_uari_t)1 << 15) << 15) - 1) * 4 + 3) >
131*7c356e86SAndroid Build Coastguard Worker (mksh_uari_t)(((((mksh_uari_t)1 << 15) << 15) - 1) * 4 + 4));
132*7c356e86SAndroid Build Coastguard Worker #endif
133*7c356e86SAndroid Build Coastguard Worker /* these are always required */
134*7c356e86SAndroid Build Coastguard Worker cta(ari_is_signed, (mksh_ari_t)-1 < (mksh_ari_t)0);
135*7c356e86SAndroid Build Coastguard Worker cta(uari_is_unsigned, (mksh_uari_t)-1 > (mksh_uari_t)0);
136*7c356e86SAndroid Build Coastguard Worker /* we require these to have the precisely same size and assume 2s complement */
137*7c356e86SAndroid Build Coastguard Worker cta(ari_size_no_matter_of_signedness, sizeof(mksh_ari_t) == sizeof(mksh_uari_t));
138*7c356e86SAndroid Build Coastguard Worker
139*7c356e86SAndroid Build Coastguard Worker cta(sizet_size_no_matter_of_signedness, sizeof(ssize_t) == sizeof(size_t));
140*7c356e86SAndroid Build Coastguard Worker cta(sizet_voidptr_same_size, sizeof(size_t) == sizeof(void *));
141*7c356e86SAndroid Build Coastguard Worker cta(sizet_funcptr_same_size, sizeof(size_t) == sizeof(void (*)(void)));
142*7c356e86SAndroid Build Coastguard Worker /* our formatting routines assume this */
143*7c356e86SAndroid Build Coastguard Worker cta(ptr_fits_in_long, sizeof(size_t) <= sizeof(long));
144*7c356e86SAndroid Build Coastguard Worker cta(ari_fits_in_long, sizeof(mksh_ari_t) <= sizeof(long));
145*7c356e86SAndroid Build Coastguard Worker
146*7c356e86SAndroid Build Coastguard Worker static mksh_uari_t
rndsetup(void)147*7c356e86SAndroid Build Coastguard Worker rndsetup(void)
148*7c356e86SAndroid Build Coastguard Worker {
149*7c356e86SAndroid Build Coastguard Worker register uint32_t h;
150*7c356e86SAndroid Build Coastguard Worker struct {
151*7c356e86SAndroid Build Coastguard Worker ALLOC_ITEM alloc_INT;
152*7c356e86SAndroid Build Coastguard Worker void *dataptr, *stkptr, *mallocptr;
153*7c356e86SAndroid Build Coastguard Worker #if defined(__GLIBC__) && (__GLIBC__ >= 2)
154*7c356e86SAndroid Build Coastguard Worker sigjmp_buf jbuf;
155*7c356e86SAndroid Build Coastguard Worker #endif
156*7c356e86SAndroid Build Coastguard Worker struct timeval tv;
157*7c356e86SAndroid Build Coastguard Worker } *bufptr;
158*7c356e86SAndroid Build Coastguard Worker char *cp;
159*7c356e86SAndroid Build Coastguard Worker
160*7c356e86SAndroid Build Coastguard Worker cp = alloc(sizeof(*bufptr) - sizeof(ALLOC_ITEM), APERM);
161*7c356e86SAndroid Build Coastguard Worker /* clear the allocated space, for valgrind and to avoid UB */
162*7c356e86SAndroid Build Coastguard Worker memset(cp, 0, sizeof(*bufptr) - sizeof(ALLOC_ITEM));
163*7c356e86SAndroid Build Coastguard Worker /* undo what alloc() did to the malloc result address */
164*7c356e86SAndroid Build Coastguard Worker bufptr = (void *)(cp - sizeof(ALLOC_ITEM));
165*7c356e86SAndroid Build Coastguard Worker /* PIE or something similar provides us with deltas here */
166*7c356e86SAndroid Build Coastguard Worker bufptr->dataptr = &rndsetupstate;
167*7c356e86SAndroid Build Coastguard Worker /* ASLR in at least Windows, Linux, some BSDs */
168*7c356e86SAndroid Build Coastguard Worker bufptr->stkptr = &bufptr;
169*7c356e86SAndroid Build Coastguard Worker /* randomised malloc in BSD (and possibly others) */
170*7c356e86SAndroid Build Coastguard Worker bufptr->mallocptr = bufptr;
171*7c356e86SAndroid Build Coastguard Worker #if defined(__GLIBC__) && (__GLIBC__ >= 2)
172*7c356e86SAndroid Build Coastguard Worker /* glibc pointer guard */
173*7c356e86SAndroid Build Coastguard Worker sigsetjmp(bufptr->jbuf, 1);
174*7c356e86SAndroid Build Coastguard Worker #endif
175*7c356e86SAndroid Build Coastguard Worker /* introduce variation (and yes, second arg MBZ for portability) */
176*7c356e86SAndroid Build Coastguard Worker mksh_TIME(bufptr->tv);
177*7c356e86SAndroid Build Coastguard Worker
178*7c356e86SAndroid Build Coastguard Worker #ifdef MKSH_ALLOC_CATCH_UNDERRUNS
179*7c356e86SAndroid Build Coastguard Worker mprotect(((char *)bufptr) + 4096, 4096, PROT_READ | PROT_WRITE);
180*7c356e86SAndroid Build Coastguard Worker #endif
181*7c356e86SAndroid Build Coastguard Worker h = chvt_rndsetup(bufptr, sizeof(*bufptr));
182*7c356e86SAndroid Build Coastguard Worker
183*7c356e86SAndroid Build Coastguard Worker afree(cp, APERM);
184*7c356e86SAndroid Build Coastguard Worker return ((mksh_uari_t)h);
185*7c356e86SAndroid Build Coastguard Worker }
186*7c356e86SAndroid Build Coastguard Worker
187*7c356e86SAndroid Build Coastguard Worker void
chvt_reinit(void)188*7c356e86SAndroid Build Coastguard Worker chvt_reinit(void)
189*7c356e86SAndroid Build Coastguard Worker {
190*7c356e86SAndroid Build Coastguard Worker kshpid = procpid = getpid();
191*7c356e86SAndroid Build Coastguard Worker ksheuid = geteuid();
192*7c356e86SAndroid Build Coastguard Worker kshpgrp = getpgrp();
193*7c356e86SAndroid Build Coastguard Worker kshppid = getppid();
194*7c356e86SAndroid Build Coastguard Worker }
195*7c356e86SAndroid Build Coastguard Worker
196*7c356e86SAndroid Build Coastguard Worker static const char *empty_argv[] = {
197*7c356e86SAndroid Build Coastguard Worker Tmksh, NULL
198*7c356e86SAndroid Build Coastguard Worker };
199*7c356e86SAndroid Build Coastguard Worker
200*7c356e86SAndroid Build Coastguard Worker static uint8_t
isuc(const char * cx)201*7c356e86SAndroid Build Coastguard Worker isuc(const char *cx) {
202*7c356e86SAndroid Build Coastguard Worker char *cp, *x;
203*7c356e86SAndroid Build Coastguard Worker uint8_t rv = 0;
204*7c356e86SAndroid Build Coastguard Worker
205*7c356e86SAndroid Build Coastguard Worker if (!cx || !*cx)
206*7c356e86SAndroid Build Coastguard Worker return (0);
207*7c356e86SAndroid Build Coastguard Worker
208*7c356e86SAndroid Build Coastguard Worker /* uppercase a string duplicate */
209*7c356e86SAndroid Build Coastguard Worker strdupx(x, cx, ATEMP);
210*7c356e86SAndroid Build Coastguard Worker cp = x;
211*7c356e86SAndroid Build Coastguard Worker while ((*cp = ksh_toupper(*cp)))
212*7c356e86SAndroid Build Coastguard Worker ++cp;
213*7c356e86SAndroid Build Coastguard Worker
214*7c356e86SAndroid Build Coastguard Worker /* check for UTF-8 */
215*7c356e86SAndroid Build Coastguard Worker if (strstr(x, "UTF-8") || strstr(x, "UTF8"))
216*7c356e86SAndroid Build Coastguard Worker rv = 1;
217*7c356e86SAndroid Build Coastguard Worker
218*7c356e86SAndroid Build Coastguard Worker /* free copy and out */
219*7c356e86SAndroid Build Coastguard Worker afree(x, ATEMP);
220*7c356e86SAndroid Build Coastguard Worker return (rv);
221*7c356e86SAndroid Build Coastguard Worker }
222*7c356e86SAndroid Build Coastguard Worker
223*7c356e86SAndroid Build Coastguard Worker static int
main_init(int argc,const char * argv[],Source ** sp,struct block ** lp)224*7c356e86SAndroid Build Coastguard Worker main_init(int argc, const char *argv[], Source **sp, struct block **lp)
225*7c356e86SAndroid Build Coastguard Worker {
226*7c356e86SAndroid Build Coastguard Worker int argi, i;
227*7c356e86SAndroid Build Coastguard Worker Source *s = NULL;
228*7c356e86SAndroid Build Coastguard Worker struct block *l;
229*7c356e86SAndroid Build Coastguard Worker unsigned char restricted_shell = 0, errexit, utf_flag;
230*7c356e86SAndroid Build Coastguard Worker char *cp;
231*7c356e86SAndroid Build Coastguard Worker const char *ccp, **wp;
232*7c356e86SAndroid Build Coastguard Worker struct tbl *vp;
233*7c356e86SAndroid Build Coastguard Worker struct stat s_stdin;
234*7c356e86SAndroid Build Coastguard Worker #if !defined(_PATH_DEFPATH) && defined(_CS_PATH)
235*7c356e86SAndroid Build Coastguard Worker ssize_t k;
236*7c356e86SAndroid Build Coastguard Worker #endif
237*7c356e86SAndroid Build Coastguard Worker
238*7c356e86SAndroid Build Coastguard Worker #if defined(MKSH_EBCDIC) || defined(MKSH_FAUX_EBCDIC)
239*7c356e86SAndroid Build Coastguard Worker ebcdic_init();
240*7c356e86SAndroid Build Coastguard Worker #endif
241*7c356e86SAndroid Build Coastguard Worker set_ifs(TC_IFSWS);
242*7c356e86SAndroid Build Coastguard Worker
243*7c356e86SAndroid Build Coastguard Worker #ifdef __OS2__
244*7c356e86SAndroid Build Coastguard Worker os2_init(&argc, &argv);
245*7c356e86SAndroid Build Coastguard Worker #define builtin_name_cmp stricmp
246*7c356e86SAndroid Build Coastguard Worker #else
247*7c356e86SAndroid Build Coastguard Worker #define builtin_name_cmp strcmp
248*7c356e86SAndroid Build Coastguard Worker #endif
249*7c356e86SAndroid Build Coastguard Worker
250*7c356e86SAndroid Build Coastguard Worker /* do things like getpgrp() et al. */
251*7c356e86SAndroid Build Coastguard Worker chvt_reinit();
252*7c356e86SAndroid Build Coastguard Worker
253*7c356e86SAndroid Build Coastguard Worker /* make sure argv[] is sane, for weird OSes */
254*7c356e86SAndroid Build Coastguard Worker if (!*argv) {
255*7c356e86SAndroid Build Coastguard Worker argv = empty_argv;
256*7c356e86SAndroid Build Coastguard Worker argc = 1;
257*7c356e86SAndroid Build Coastguard Worker }
258*7c356e86SAndroid Build Coastguard Worker kshname = argv[0];
259*7c356e86SAndroid Build Coastguard Worker
260*7c356e86SAndroid Build Coastguard Worker /* initialise permanent Area */
261*7c356e86SAndroid Build Coastguard Worker ainit(&aperm);
262*7c356e86SAndroid Build Coastguard Worker /* max. name length: -2147483648 = 11 (+ NUL) */
263*7c356e86SAndroid Build Coastguard Worker vtemp = alloc(offsetof(struct tbl, name[0]) + 12, APERM);
264*7c356e86SAndroid Build Coastguard Worker
265*7c356e86SAndroid Build Coastguard Worker /* set up base environment */
266*7c356e86SAndroid Build Coastguard Worker env.type = E_NONE;
267*7c356e86SAndroid Build Coastguard Worker ainit(&env.area);
268*7c356e86SAndroid Build Coastguard Worker /* set up global l->vars and l->funs */
269*7c356e86SAndroid Build Coastguard Worker newblock();
270*7c356e86SAndroid Build Coastguard Worker
271*7c356e86SAndroid Build Coastguard Worker /* Do this first so output routines (eg, errorf, shellf) can work */
272*7c356e86SAndroid Build Coastguard Worker initio();
273*7c356e86SAndroid Build Coastguard Worker
274*7c356e86SAndroid Build Coastguard Worker /* determine the basename (without '-' or path) of the executable */
275*7c356e86SAndroid Build Coastguard Worker ccp = kshname;
276*7c356e86SAndroid Build Coastguard Worker goto begin_parsing_kshname;
277*7c356e86SAndroid Build Coastguard Worker while ((i = ccp[argi++])) {
278*7c356e86SAndroid Build Coastguard Worker if (mksh_cdirsep(i)) {
279*7c356e86SAndroid Build Coastguard Worker ccp += argi;
280*7c356e86SAndroid Build Coastguard Worker begin_parsing_kshname:
281*7c356e86SAndroid Build Coastguard Worker argi = 0;
282*7c356e86SAndroid Build Coastguard Worker }
283*7c356e86SAndroid Build Coastguard Worker }
284*7c356e86SAndroid Build Coastguard Worker Flag(FLOGIN) = (ord(*ccp) == ORD('-')) || (ord(*kshname) == ORD('-'));
285*7c356e86SAndroid Build Coastguard Worker if (ord(*ccp) == ORD('-'))
286*7c356e86SAndroid Build Coastguard Worker ++ccp;
287*7c356e86SAndroid Build Coastguard Worker if (!*ccp)
288*7c356e86SAndroid Build Coastguard Worker ccp = empty_argv[0];
289*7c356e86SAndroid Build Coastguard Worker
290*7c356e86SAndroid Build Coastguard Worker /*
291*7c356e86SAndroid Build Coastguard Worker * Turn on nohup by default. (AT&T ksh does not have a nohup
292*7c356e86SAndroid Build Coastguard Worker * option - it always sends the hup).
293*7c356e86SAndroid Build Coastguard Worker */
294*7c356e86SAndroid Build Coastguard Worker Flag(FNOHUP) = 1;
295*7c356e86SAndroid Build Coastguard Worker
296*7c356e86SAndroid Build Coastguard Worker /*
297*7c356e86SAndroid Build Coastguard Worker * Turn on brace expansion by default. AT&T kshs that have
298*7c356e86SAndroid Build Coastguard Worker * alternation always have it on.
299*7c356e86SAndroid Build Coastguard Worker */
300*7c356e86SAndroid Build Coastguard Worker Flag(FBRACEEXPAND) = 1;
301*7c356e86SAndroid Build Coastguard Worker
302*7c356e86SAndroid Build Coastguard Worker /*
303*7c356e86SAndroid Build Coastguard Worker * Turn on "set -x" inheritance by default.
304*7c356e86SAndroid Build Coastguard Worker */
305*7c356e86SAndroid Build Coastguard Worker Flag(FXTRACEREC) = 1;
306*7c356e86SAndroid Build Coastguard Worker
307*7c356e86SAndroid Build Coastguard Worker /* define built-in commands and see if we were called as one */
308*7c356e86SAndroid Build Coastguard Worker ktinit(APERM, &builtins,
309*7c356e86SAndroid Build Coastguard Worker /* currently up to 52 builtins: 75% of 128 = 2^7 */
310*7c356e86SAndroid Build Coastguard Worker 7);
311*7c356e86SAndroid Build Coastguard Worker for (i = 0; mkshbuiltins[i].name != NULL; ++i) {
312*7c356e86SAndroid Build Coastguard Worker const char *builtin_name;
313*7c356e86SAndroid Build Coastguard Worker
314*7c356e86SAndroid Build Coastguard Worker builtin_name = builtin(mkshbuiltins[i].name,
315*7c356e86SAndroid Build Coastguard Worker mkshbuiltins[i].func);
316*7c356e86SAndroid Build Coastguard Worker if (!builtin_name_cmp(ccp, builtin_name)) {
317*7c356e86SAndroid Build Coastguard Worker /* canonicalise argv[0] */
318*7c356e86SAndroid Build Coastguard Worker ccp = builtin_name;
319*7c356e86SAndroid Build Coastguard Worker as_builtin = true;
320*7c356e86SAndroid Build Coastguard Worker }
321*7c356e86SAndroid Build Coastguard Worker }
322*7c356e86SAndroid Build Coastguard Worker
323*7c356e86SAndroid Build Coastguard Worker if (!as_builtin) {
324*7c356e86SAndroid Build Coastguard Worker /* check for -T option early */
325*7c356e86SAndroid Build Coastguard Worker argi = parse_args(argv, OF_FIRSTTIME, NULL);
326*7c356e86SAndroid Build Coastguard Worker if (argi < 0)
327*7c356e86SAndroid Build Coastguard Worker return (1);
328*7c356e86SAndroid Build Coastguard Worker /* called as rsh, rmksh, -rsh, RKSH.EXE, etc.? */
329*7c356e86SAndroid Build Coastguard Worker if (ksh_eq(*ccp, 'R', 'r')) {
330*7c356e86SAndroid Build Coastguard Worker ++ccp;
331*7c356e86SAndroid Build Coastguard Worker ++restricted_shell;
332*7c356e86SAndroid Build Coastguard Worker }
333*7c356e86SAndroid Build Coastguard Worker #if defined(MKSH_BINSHPOSIX) || defined(MKSH_BINSHREDUCED)
334*7c356e86SAndroid Build Coastguard Worker /* are we called as -rsh or /bin/sh or SH.EXE or so? */
335*7c356e86SAndroid Build Coastguard Worker if (ksh_eq(ccp[0], 'S', 's') &&
336*7c356e86SAndroid Build Coastguard Worker ksh_eq(ccp[1], 'H', 'h')) {
337*7c356e86SAndroid Build Coastguard Worker /* either also turns off braceexpand */
338*7c356e86SAndroid Build Coastguard Worker #ifdef MKSH_BINSHPOSIX
339*7c356e86SAndroid Build Coastguard Worker /* enable better POSIX conformance */
340*7c356e86SAndroid Build Coastguard Worker change_flag(FPOSIX, OF_FIRSTTIME, true);
341*7c356e86SAndroid Build Coastguard Worker #endif
342*7c356e86SAndroid Build Coastguard Worker #ifdef MKSH_BINSHREDUCED
343*7c356e86SAndroid Build Coastguard Worker /* enable kludge/compat mode */
344*7c356e86SAndroid Build Coastguard Worker change_flag(FSH, OF_FIRSTTIME, true);
345*7c356e86SAndroid Build Coastguard Worker #endif
346*7c356e86SAndroid Build Coastguard Worker }
347*7c356e86SAndroid Build Coastguard Worker #endif
348*7c356e86SAndroid Build Coastguard Worker }
349*7c356e86SAndroid Build Coastguard Worker
350*7c356e86SAndroid Build Coastguard Worker initvar();
351*7c356e86SAndroid Build Coastguard Worker
352*7c356e86SAndroid Build Coastguard Worker inittraps();
353*7c356e86SAndroid Build Coastguard Worker
354*7c356e86SAndroid Build Coastguard Worker coproc_init();
355*7c356e86SAndroid Build Coastguard Worker
356*7c356e86SAndroid Build Coastguard Worker /* set up variable and command dictionaries */
357*7c356e86SAndroid Build Coastguard Worker ktinit(APERM, &taliases, 0);
358*7c356e86SAndroid Build Coastguard Worker ktinit(APERM, &aliases, 0);
359*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_NOPWNAM
360*7c356e86SAndroid Build Coastguard Worker ktinit(APERM, &homedirs, 0);
361*7c356e86SAndroid Build Coastguard Worker #endif
362*7c356e86SAndroid Build Coastguard Worker
363*7c356e86SAndroid Build Coastguard Worker /* define shell keywords */
364*7c356e86SAndroid Build Coastguard Worker initkeywords();
365*7c356e86SAndroid Build Coastguard Worker
366*7c356e86SAndroid Build Coastguard Worker init_histvec();
367*7c356e86SAndroid Build Coastguard Worker
368*7c356e86SAndroid Build Coastguard Worker /* initialise tty size before importing environment */
369*7c356e86SAndroid Build Coastguard Worker change_winsz();
370*7c356e86SAndroid Build Coastguard Worker
371*7c356e86SAndroid Build Coastguard Worker #ifdef _PATH_DEFPATH
372*7c356e86SAndroid Build Coastguard Worker def_path = _PATH_DEFPATH;
373*7c356e86SAndroid Build Coastguard Worker #else
374*7c356e86SAndroid Build Coastguard Worker #ifdef _CS_PATH
375*7c356e86SAndroid Build Coastguard Worker if ((k = confstr(_CS_PATH, NULL, 0)) > 0 &&
376*7c356e86SAndroid Build Coastguard Worker confstr(_CS_PATH, cp = alloc(k + 1, APERM), k + 1) == k + 1)
377*7c356e86SAndroid Build Coastguard Worker def_path = cp;
378*7c356e86SAndroid Build Coastguard Worker else
379*7c356e86SAndroid Build Coastguard Worker #endif
380*7c356e86SAndroid Build Coastguard Worker /*
381*7c356e86SAndroid Build Coastguard Worker * this is uniform across all OSes unless it
382*7c356e86SAndroid Build Coastguard Worker * breaks somewhere hard; don't try to optimise,
383*7c356e86SAndroid Build Coastguard Worker * e.g. add stuff for Interix or remove /usr
384*7c356e86SAndroid Build Coastguard Worker * for HURD, because e.g. Debian GNU/HURD is
385*7c356e86SAndroid Build Coastguard Worker * "keeping a regular /usr"; this is supposed
386*7c356e86SAndroid Build Coastguard Worker * to be a sane 'basic' default PATH
387*7c356e86SAndroid Build Coastguard Worker */
388*7c356e86SAndroid Build Coastguard Worker def_path = MKSH_UNIXROOT "/bin" MKSH_PATHSEPS
389*7c356e86SAndroid Build Coastguard Worker MKSH_UNIXROOT "/usr/bin" MKSH_PATHSEPS
390*7c356e86SAndroid Build Coastguard Worker MKSH_UNIXROOT "/sbin" MKSH_PATHSEPS
391*7c356e86SAndroid Build Coastguard Worker MKSH_UNIXROOT "/usr/sbin";
392*7c356e86SAndroid Build Coastguard Worker #endif
393*7c356e86SAndroid Build Coastguard Worker
394*7c356e86SAndroid Build Coastguard Worker /*
395*7c356e86SAndroid Build Coastguard Worker * Set PATH to def_path (will set the path global variable).
396*7c356e86SAndroid Build Coastguard Worker * (import of environment below will probably change this setting).
397*7c356e86SAndroid Build Coastguard Worker */
398*7c356e86SAndroid Build Coastguard Worker vp = global(TPATH);
399*7c356e86SAndroid Build Coastguard Worker /* setstr can't fail here */
400*7c356e86SAndroid Build Coastguard Worker setstr(vp, def_path, KSH_RETURN_ERROR);
401*7c356e86SAndroid Build Coastguard Worker
402*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_NO_CMDLINE_EDITING
403*7c356e86SAndroid Build Coastguard Worker /*
404*7c356e86SAndroid Build Coastguard Worker * Set edit mode to emacs by default, may be overridden
405*7c356e86SAndroid Build Coastguard Worker * by the environment or the user. Also, we want tab completion
406*7c356e86SAndroid Build Coastguard Worker * on in vi by default.
407*7c356e86SAndroid Build Coastguard Worker */
408*7c356e86SAndroid Build Coastguard Worker change_flag(FEMACS, OF_SPECIAL, true);
409*7c356e86SAndroid Build Coastguard Worker #if !MKSH_S_NOVI
410*7c356e86SAndroid Build Coastguard Worker Flag(FVITABCOMPLETE) = 1;
411*7c356e86SAndroid Build Coastguard Worker #endif
412*7c356e86SAndroid Build Coastguard Worker #endif
413*7c356e86SAndroid Build Coastguard Worker
414*7c356e86SAndroid Build Coastguard Worker /* import environment */
415*7c356e86SAndroid Build Coastguard Worker init_environ();
416*7c356e86SAndroid Build Coastguard Worker
417*7c356e86SAndroid Build Coastguard Worker /* override default PATH regardless of environment */
418*7c356e86SAndroid Build Coastguard Worker #ifdef MKSH_DEFPATH_OVERRIDE
419*7c356e86SAndroid Build Coastguard Worker vp = global(TPATH);
420*7c356e86SAndroid Build Coastguard Worker setstr(vp, MKSH_DEFPATH_OVERRIDE, KSH_RETURN_ERROR);
421*7c356e86SAndroid Build Coastguard Worker #endif
422*7c356e86SAndroid Build Coastguard Worker
423*7c356e86SAndroid Build Coastguard Worker /* for security */
424*7c356e86SAndroid Build Coastguard Worker typeset(TinitIFS, 0, 0, 0, 0);
425*7c356e86SAndroid Build Coastguard Worker
426*7c356e86SAndroid Build Coastguard Worker /* assign default shell variable values */
427*7c356e86SAndroid Build Coastguard Worker typeset("PATHSEP=" MKSH_PATHSEPS, 0, 0, 0, 0);
428*7c356e86SAndroid Build Coastguard Worker substitute(initsubs, 0);
429*7c356e86SAndroid Build Coastguard Worker
430*7c356e86SAndroid Build Coastguard Worker /* Figure out the current working directory and set $PWD */
431*7c356e86SAndroid Build Coastguard Worker vp = global(TPWD);
432*7c356e86SAndroid Build Coastguard Worker cp = str_val(vp);
433*7c356e86SAndroid Build Coastguard Worker /* Try to use existing $PWD if it is valid */
434*7c356e86SAndroid Build Coastguard Worker set_current_wd((mksh_abspath(cp) && test_eval(NULL, TO_FILEQ, cp,
435*7c356e86SAndroid Build Coastguard Worker Tdot, true)) ? cp : NULL);
436*7c356e86SAndroid Build Coastguard Worker if (current_wd[0])
437*7c356e86SAndroid Build Coastguard Worker simplify_path(current_wd);
438*7c356e86SAndroid Build Coastguard Worker /* Only set pwd if we know where we are or if it had a bogus value */
439*7c356e86SAndroid Build Coastguard Worker if (current_wd[0] || *cp)
440*7c356e86SAndroid Build Coastguard Worker /* setstr can't fail here */
441*7c356e86SAndroid Build Coastguard Worker setstr(vp, current_wd, KSH_RETURN_ERROR);
442*7c356e86SAndroid Build Coastguard Worker
443*7c356e86SAndroid Build Coastguard Worker for (wp = initcoms; *wp != NULL; wp++) {
444*7c356e86SAndroid Build Coastguard Worker c_builtin(wp);
445*7c356e86SAndroid Build Coastguard Worker while (*wp != NULL)
446*7c356e86SAndroid Build Coastguard Worker wp++;
447*7c356e86SAndroid Build Coastguard Worker }
448*7c356e86SAndroid Build Coastguard Worker setint_n(global("OPTIND"), 1, 10);
449*7c356e86SAndroid Build Coastguard Worker
450*7c356e86SAndroid Build Coastguard Worker kshuid = getuid();
451*7c356e86SAndroid Build Coastguard Worker kshgid = getgid();
452*7c356e86SAndroid Build Coastguard Worker kshegid = getegid();
453*7c356e86SAndroid Build Coastguard Worker
454*7c356e86SAndroid Build Coastguard Worker safe_prompt = ksheuid ? "$ " : "# ";
455*7c356e86SAndroid Build Coastguard Worker vp = global("PS1");
456*7c356e86SAndroid Build Coastguard Worker /* Set PS1 if unset or we are root and prompt doesn't contain a # */
457*7c356e86SAndroid Build Coastguard Worker if (!(vp->flag & ISSET) ||
458*7c356e86SAndroid Build Coastguard Worker (!ksheuid && !strchr(str_val(vp), '#')))
459*7c356e86SAndroid Build Coastguard Worker /* setstr can't fail here */
460*7c356e86SAndroid Build Coastguard Worker setstr(vp, safe_prompt, KSH_RETURN_ERROR);
461*7c356e86SAndroid Build Coastguard Worker setint_n((vp = global("BASHPID")), 0, 10);
462*7c356e86SAndroid Build Coastguard Worker vp->flag |= INT_U;
463*7c356e86SAndroid Build Coastguard Worker setint_n((vp = global("PGRP")), (mksh_uari_t)kshpgrp, 10);
464*7c356e86SAndroid Build Coastguard Worker vp->flag |= INT_U;
465*7c356e86SAndroid Build Coastguard Worker setint_n((vp = global("PPID")), (mksh_uari_t)kshppid, 10);
466*7c356e86SAndroid Build Coastguard Worker vp->flag |= INT_U;
467*7c356e86SAndroid Build Coastguard Worker setint_n((vp = global("USER_ID")), (mksh_uari_t)ksheuid, 10);
468*7c356e86SAndroid Build Coastguard Worker vp->flag |= INT_U;
469*7c356e86SAndroid Build Coastguard Worker setint_n((vp = global("KSHUID")), (mksh_uari_t)kshuid, 10);
470*7c356e86SAndroid Build Coastguard Worker vp->flag |= INT_U;
471*7c356e86SAndroid Build Coastguard Worker setint_n((vp = global("KSHEGID")), (mksh_uari_t)kshegid, 10);
472*7c356e86SAndroid Build Coastguard Worker vp->flag |= INT_U;
473*7c356e86SAndroid Build Coastguard Worker setint_n((vp = global("KSHGID")), (mksh_uari_t)kshgid, 10);
474*7c356e86SAndroid Build Coastguard Worker vp->flag |= INT_U;
475*7c356e86SAndroid Build Coastguard Worker setint_n((vp = global("RANDOM")), rndsetup(), 10);
476*7c356e86SAndroid Build Coastguard Worker vp->flag |= INT_U;
477*7c356e86SAndroid Build Coastguard Worker setint_n((vp_pipest = global("PIPESTATUS")), 0, 10);
478*7c356e86SAndroid Build Coastguard Worker
479*7c356e86SAndroid Build Coastguard Worker /* Set this before parsing arguments */
480*7c356e86SAndroid Build Coastguard Worker Flag(FPRIVILEGED) = (kshuid != ksheuid || kshgid != kshegid) ? 2 : 0;
481*7c356e86SAndroid Build Coastguard Worker
482*7c356e86SAndroid Build Coastguard Worker /* record if monitor is set on command line (see j_init() in jobs.c) */
483*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_UNEMPLOYED
484*7c356e86SAndroid Build Coastguard Worker Flag(FMONITOR) = 127;
485*7c356e86SAndroid Build Coastguard Worker #endif
486*7c356e86SAndroid Build Coastguard Worker /* this to note if utf-8 mode is set on command line (see below) */
487*7c356e86SAndroid Build Coastguard Worker UTFMODE = 2;
488*7c356e86SAndroid Build Coastguard Worker
489*7c356e86SAndroid Build Coastguard Worker if (!as_builtin) {
490*7c356e86SAndroid Build Coastguard Worker argi = parse_args(argv, OF_CMDLINE, NULL);
491*7c356e86SAndroid Build Coastguard Worker if (argi < 0)
492*7c356e86SAndroid Build Coastguard Worker return (1);
493*7c356e86SAndroid Build Coastguard Worker }
494*7c356e86SAndroid Build Coastguard Worker
495*7c356e86SAndroid Build Coastguard Worker /* process this later only, default to off (hysterical raisins) */
496*7c356e86SAndroid Build Coastguard Worker utf_flag = UTFMODE;
497*7c356e86SAndroid Build Coastguard Worker UTFMODE = 0;
498*7c356e86SAndroid Build Coastguard Worker
499*7c356e86SAndroid Build Coastguard Worker if (as_builtin) {
500*7c356e86SAndroid Build Coastguard Worker /* auto-detect from environment variables, always */
501*7c356e86SAndroid Build Coastguard Worker utf_flag = 3;
502*7c356e86SAndroid Build Coastguard Worker } else if (Flag(FCOMMAND)) {
503*7c356e86SAndroid Build Coastguard Worker s = pushs(SSTRINGCMDLINE, ATEMP);
504*7c356e86SAndroid Build Coastguard Worker if (!(s->start = s->str = argv[argi++]))
505*7c356e86SAndroid Build Coastguard Worker errorf(Tf_optfoo, "", "", 'c', Treq_arg);
506*7c356e86SAndroid Build Coastguard Worker while (*s->str) {
507*7c356e86SAndroid Build Coastguard Worker if (ctype(*s->str, C_QUOTE))
508*7c356e86SAndroid Build Coastguard Worker break;
509*7c356e86SAndroid Build Coastguard Worker s->str++;
510*7c356e86SAndroid Build Coastguard Worker }
511*7c356e86SAndroid Build Coastguard Worker if (!*s->str)
512*7c356e86SAndroid Build Coastguard Worker s->flags |= SF_MAYEXEC;
513*7c356e86SAndroid Build Coastguard Worker s->str = s->start;
514*7c356e86SAndroid Build Coastguard Worker #ifdef MKSH_MIDNIGHTBSD01ASH_COMPAT
515*7c356e86SAndroid Build Coastguard Worker /* compatibility to MidnightBSD 0.1 /bin/sh (kludge) */
516*7c356e86SAndroid Build Coastguard Worker if (Flag(FSH) && argv[argi] && !strcmp(argv[argi], "--"))
517*7c356e86SAndroid Build Coastguard Worker ++argi;
518*7c356e86SAndroid Build Coastguard Worker #endif
519*7c356e86SAndroid Build Coastguard Worker if (argv[argi])
520*7c356e86SAndroid Build Coastguard Worker kshname = argv[argi++];
521*7c356e86SAndroid Build Coastguard Worker } else if (argi < argc && !Flag(FSTDIN)) {
522*7c356e86SAndroid Build Coastguard Worker s = pushs(SFILE, ATEMP);
523*7c356e86SAndroid Build Coastguard Worker #ifdef __OS2__
524*7c356e86SAndroid Build Coastguard Worker /*
525*7c356e86SAndroid Build Coastguard Worker * A bug in OS/2 extproc (like shebang) handling makes
526*7c356e86SAndroid Build Coastguard Worker * it not pass the full pathname of a script, so we need
527*7c356e86SAndroid Build Coastguard Worker * to search for it. This changes the behaviour of a
528*7c356e86SAndroid Build Coastguard Worker * simple "mksh foo", but can't be helped.
529*7c356e86SAndroid Build Coastguard Worker */
530*7c356e86SAndroid Build Coastguard Worker s->file = argv[argi++];
531*7c356e86SAndroid Build Coastguard Worker if (search_access(s->file, X_OK) != 0)
532*7c356e86SAndroid Build Coastguard Worker s->file = search_path(s->file, path, X_OK, NULL);
533*7c356e86SAndroid Build Coastguard Worker if (!s->file || !*s->file)
534*7c356e86SAndroid Build Coastguard Worker s->file = argv[argi - 1];
535*7c356e86SAndroid Build Coastguard Worker #else
536*7c356e86SAndroid Build Coastguard Worker s->file = argv[argi++];
537*7c356e86SAndroid Build Coastguard Worker #endif
538*7c356e86SAndroid Build Coastguard Worker s->u.shf = shf_open(s->file, O_RDONLY | O_MAYEXEC, 0,
539*7c356e86SAndroid Build Coastguard Worker SHF_MAPHI | SHF_CLEXEC);
540*7c356e86SAndroid Build Coastguard Worker if (s->u.shf == NULL) {
541*7c356e86SAndroid Build Coastguard Worker shl_stdout_ok = false;
542*7c356e86SAndroid Build Coastguard Worker warningf(true, Tf_sD_s, s->file, cstrerror(errno));
543*7c356e86SAndroid Build Coastguard Worker /* mandated by SUSv4 */
544*7c356e86SAndroid Build Coastguard Worker exstat = 127;
545*7c356e86SAndroid Build Coastguard Worker unwind(LERROR);
546*7c356e86SAndroid Build Coastguard Worker }
547*7c356e86SAndroid Build Coastguard Worker kshname = s->file;
548*7c356e86SAndroid Build Coastguard Worker } else {
549*7c356e86SAndroid Build Coastguard Worker Flag(FSTDIN) = 1;
550*7c356e86SAndroid Build Coastguard Worker s = pushs(SSTDIN, ATEMP);
551*7c356e86SAndroid Build Coastguard Worker s->file = "<stdin>";
552*7c356e86SAndroid Build Coastguard Worker s->u.shf = shf_fdopen(0, SHF_RD | can_seek(0),
553*7c356e86SAndroid Build Coastguard Worker NULL);
554*7c356e86SAndroid Build Coastguard Worker if (isatty(0) && isatty(2)) {
555*7c356e86SAndroid Build Coastguard Worker Flag(FTALKING) = Flag(FTALKING_I) = 1;
556*7c356e86SAndroid Build Coastguard Worker /* The following only if isatty(0) */
557*7c356e86SAndroid Build Coastguard Worker s->flags |= SF_TTY;
558*7c356e86SAndroid Build Coastguard Worker s->u.shf->flags |= SHF_INTERRUPT;
559*7c356e86SAndroid Build Coastguard Worker s->file = NULL;
560*7c356e86SAndroid Build Coastguard Worker }
561*7c356e86SAndroid Build Coastguard Worker }
562*7c356e86SAndroid Build Coastguard Worker
563*7c356e86SAndroid Build Coastguard Worker /* this bizarreness is mandated by POSIX */
564*7c356e86SAndroid Build Coastguard Worker if (Flag(FTALKING) && fstat(0, &s_stdin) >= 0 &&
565*7c356e86SAndroid Build Coastguard Worker S_ISCHR(s_stdin.st_mode))
566*7c356e86SAndroid Build Coastguard Worker reset_nonblock(0);
567*7c356e86SAndroid Build Coastguard Worker
568*7c356e86SAndroid Build Coastguard Worker /* initialise job control */
569*7c356e86SAndroid Build Coastguard Worker j_init();
570*7c356e86SAndroid Build Coastguard Worker /* do this after j_init() which calls tty_init_state() */
571*7c356e86SAndroid Build Coastguard Worker if (Flag(FTALKING)) {
572*7c356e86SAndroid Build Coastguard Worker if (utf_flag == 2) {
573*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_ASSUME_UTF8
574*7c356e86SAndroid Build Coastguard Worker /* auto-detect from locale or environment */
575*7c356e86SAndroid Build Coastguard Worker utf_flag = 4;
576*7c356e86SAndroid Build Coastguard Worker #else /* this may not be an #elif */
577*7c356e86SAndroid Build Coastguard Worker #if MKSH_ASSUME_UTF8
578*7c356e86SAndroid Build Coastguard Worker utf_flag = 1;
579*7c356e86SAndroid Build Coastguard Worker #else
580*7c356e86SAndroid Build Coastguard Worker /* always disable UTF-8 (for interactive) */
581*7c356e86SAndroid Build Coastguard Worker utf_flag = 0;
582*7c356e86SAndroid Build Coastguard Worker #endif
583*7c356e86SAndroid Build Coastguard Worker #endif
584*7c356e86SAndroid Build Coastguard Worker }
585*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_NO_CMDLINE_EDITING
586*7c356e86SAndroid Build Coastguard Worker x_init();
587*7c356e86SAndroid Build Coastguard Worker #endif
588*7c356e86SAndroid Build Coastguard Worker }
589*7c356e86SAndroid Build Coastguard Worker
590*7c356e86SAndroid Build Coastguard Worker #ifdef SIGWINCH
591*7c356e86SAndroid Build Coastguard Worker sigtraps[SIGWINCH].flags |= TF_SHELL_USES;
592*7c356e86SAndroid Build Coastguard Worker setsig(&sigtraps[SIGWINCH], x_sigwinch,
593*7c356e86SAndroid Build Coastguard Worker SS_RESTORE_ORIG|SS_FORCE|SS_SHTRAP);
594*7c356e86SAndroid Build Coastguard Worker #endif
595*7c356e86SAndroid Build Coastguard Worker
596*7c356e86SAndroid Build Coastguard Worker l = e->loc;
597*7c356e86SAndroid Build Coastguard Worker if (as_builtin) {
598*7c356e86SAndroid Build Coastguard Worker l->argc = argc;
599*7c356e86SAndroid Build Coastguard Worker l->argv = argv;
600*7c356e86SAndroid Build Coastguard Worker l->argv[0] = ccp;
601*7c356e86SAndroid Build Coastguard Worker } else {
602*7c356e86SAndroid Build Coastguard Worker l->argc = argc - argi;
603*7c356e86SAndroid Build Coastguard Worker /*
604*7c356e86SAndroid Build Coastguard Worker * allocate a new array because otherwise, when we modify
605*7c356e86SAndroid Build Coastguard Worker * it in-place, ps(1) output changes; the meaning of argc
606*7c356e86SAndroid Build Coastguard Worker * here is slightly different as it excludes kshname, and
607*7c356e86SAndroid Build Coastguard Worker * we add a trailing NULL sentinel as well
608*7c356e86SAndroid Build Coastguard Worker */
609*7c356e86SAndroid Build Coastguard Worker l->argv = alloc2(l->argc + 2, sizeof(void *), APERM);
610*7c356e86SAndroid Build Coastguard Worker l->argv[0] = kshname;
611*7c356e86SAndroid Build Coastguard Worker memcpy(&l->argv[1], &argv[argi], l->argc * sizeof(void *));
612*7c356e86SAndroid Build Coastguard Worker l->argv[l->argc + 1] = NULL;
613*7c356e86SAndroid Build Coastguard Worker getopts_reset(1);
614*7c356e86SAndroid Build Coastguard Worker }
615*7c356e86SAndroid Build Coastguard Worker
616*7c356e86SAndroid Build Coastguard Worker /* divine the initial state of the utf8-mode Flag */
617*7c356e86SAndroid Build Coastguard Worker ccp = null;
618*7c356e86SAndroid Build Coastguard Worker switch (utf_flag) {
619*7c356e86SAndroid Build Coastguard Worker
620*7c356e86SAndroid Build Coastguard Worker /* auto-detect from locale or environment */
621*7c356e86SAndroid Build Coastguard Worker case 4:
622*7c356e86SAndroid Build Coastguard Worker #if HAVE_SETLOCALE_CTYPE
623*7c356e86SAndroid Build Coastguard Worker ccp = setlocale(LC_CTYPE, "");
624*7c356e86SAndroid Build Coastguard Worker #if HAVE_LANGINFO_CODESET
625*7c356e86SAndroid Build Coastguard Worker if (!isuc(ccp))
626*7c356e86SAndroid Build Coastguard Worker ccp = nl_langinfo(CODESET);
627*7c356e86SAndroid Build Coastguard Worker #endif
628*7c356e86SAndroid Build Coastguard Worker if (!isuc(ccp))
629*7c356e86SAndroid Build Coastguard Worker ccp = null;
630*7c356e86SAndroid Build Coastguard Worker #endif
631*7c356e86SAndroid Build Coastguard Worker /* FALLTHROUGH */
632*7c356e86SAndroid Build Coastguard Worker
633*7c356e86SAndroid Build Coastguard Worker /* auto-detect from environment */
634*7c356e86SAndroid Build Coastguard Worker case 3:
635*7c356e86SAndroid Build Coastguard Worker /* these were imported from environ earlier */
636*7c356e86SAndroid Build Coastguard Worker if (ccp == null)
637*7c356e86SAndroid Build Coastguard Worker ccp = str_val(global("LC_ALL"));
638*7c356e86SAndroid Build Coastguard Worker if (ccp == null)
639*7c356e86SAndroid Build Coastguard Worker ccp = str_val(global("LC_CTYPE"));
640*7c356e86SAndroid Build Coastguard Worker if (ccp == null)
641*7c356e86SAndroid Build Coastguard Worker ccp = str_val(global("LANG"));
642*7c356e86SAndroid Build Coastguard Worker UTFMODE = isuc(ccp);
643*7c356e86SAndroid Build Coastguard Worker break;
644*7c356e86SAndroid Build Coastguard Worker
645*7c356e86SAndroid Build Coastguard Worker /* not set on command line, not FTALKING */
646*7c356e86SAndroid Build Coastguard Worker case 2:
647*7c356e86SAndroid Build Coastguard Worker /* unknown values */
648*7c356e86SAndroid Build Coastguard Worker default:
649*7c356e86SAndroid Build Coastguard Worker utf_flag = 0;
650*7c356e86SAndroid Build Coastguard Worker /* FALLTHROUGH */
651*7c356e86SAndroid Build Coastguard Worker
652*7c356e86SAndroid Build Coastguard Worker /* known values */
653*7c356e86SAndroid Build Coastguard Worker case 1:
654*7c356e86SAndroid Build Coastguard Worker case 0:
655*7c356e86SAndroid Build Coastguard Worker UTFMODE = utf_flag;
656*7c356e86SAndroid Build Coastguard Worker break;
657*7c356e86SAndroid Build Coastguard Worker }
658*7c356e86SAndroid Build Coastguard Worker
659*7c356e86SAndroid Build Coastguard Worker /* Disable during .profile/ENV reading */
660*7c356e86SAndroid Build Coastguard Worker restricted_shell |= Flag(FRESTRICTED);
661*7c356e86SAndroid Build Coastguard Worker Flag(FRESTRICTED) = 0;
662*7c356e86SAndroid Build Coastguard Worker errexit = Flag(FERREXIT);
663*7c356e86SAndroid Build Coastguard Worker Flag(FERREXIT) = 0;
664*7c356e86SAndroid Build Coastguard Worker
665*7c356e86SAndroid Build Coastguard Worker /* save flags for "set +o" handling */
666*7c356e86SAndroid Build Coastguard Worker memcpy(baseline_flags, shell_flags, sizeof(shell_flags));
667*7c356e86SAndroid Build Coastguard Worker /* disable these because they have special handling */
668*7c356e86SAndroid Build Coastguard Worker baseline_flags[(int)FPOSIX] = 0;
669*7c356e86SAndroid Build Coastguard Worker baseline_flags[(int)FSH] = 0;
670*7c356e86SAndroid Build Coastguard Worker /* ensure these always show up setting, for FPOSIX/FSH */
671*7c356e86SAndroid Build Coastguard Worker baseline_flags[(int)FBRACEEXPAND] = 0;
672*7c356e86SAndroid Build Coastguard Worker baseline_flags[(int)FUNNYCODE] = 0;
673*7c356e86SAndroid Build Coastguard Worker #if !defined(MKSH_SMALL) || defined(DEBUG)
674*7c356e86SAndroid Build Coastguard Worker /* mark as initialised */
675*7c356e86SAndroid Build Coastguard Worker baseline_flags[(int)FNFLAGS] = 1;
676*7c356e86SAndroid Build Coastguard Worker #endif
677*7c356e86SAndroid Build Coastguard Worker if (as_builtin)
678*7c356e86SAndroid Build Coastguard Worker goto skip_startup_files;
679*7c356e86SAndroid Build Coastguard Worker
680*7c356e86SAndroid Build Coastguard Worker /*
681*7c356e86SAndroid Build Coastguard Worker * Do this before profile/$ENV so that if it causes problems in them,
682*7c356e86SAndroid Build Coastguard Worker * user will know why things broke.
683*7c356e86SAndroid Build Coastguard Worker */
684*7c356e86SAndroid Build Coastguard Worker if (!current_wd[0] && Flag(FTALKING))
685*7c356e86SAndroid Build Coastguard Worker warningf(false, "can't determine current directory");
686*7c356e86SAndroid Build Coastguard Worker
687*7c356e86SAndroid Build Coastguard Worker if (Flag(FLOGIN))
688*7c356e86SAndroid Build Coastguard Worker include(MKSH_SYSTEM_PROFILE, 0, NULL, true);
689*7c356e86SAndroid Build Coastguard Worker if (Flag(FPRIVILEGED)) {
690*7c356e86SAndroid Build Coastguard Worker include(MKSH_SUID_PROFILE, 0, NULL, true);
691*7c356e86SAndroid Build Coastguard Worker /* note whether -p was enabled during startup */
692*7c356e86SAndroid Build Coastguard Worker if (Flag(FPRIVILEGED) == 1)
693*7c356e86SAndroid Build Coastguard Worker /* allow set -p to setuid() later */
694*7c356e86SAndroid Build Coastguard Worker Flag(FPRIVILEGED) = 3;
695*7c356e86SAndroid Build Coastguard Worker else
696*7c356e86SAndroid Build Coastguard Worker /* turn off -p if not set explicitly */
697*7c356e86SAndroid Build Coastguard Worker change_flag(FPRIVILEGED, OF_INTERNAL, false);
698*7c356e86SAndroid Build Coastguard Worker /* track shell-imposed changes */
699*7c356e86SAndroid Build Coastguard Worker baseline_flags[(int)FPRIVILEGED] = Flag(FPRIVILEGED);
700*7c356e86SAndroid Build Coastguard Worker } else {
701*7c356e86SAndroid Build Coastguard Worker if (Flag(FLOGIN))
702*7c356e86SAndroid Build Coastguard Worker include(substitute("$HOME/.profile", 0), 0, NULL, true);
703*7c356e86SAndroid Build Coastguard Worker if (Flag(FTALKING)) {
704*7c356e86SAndroid Build Coastguard Worker cp = substitute("${ENV:-" MKSHRC_PATH "}", DOTILDE);
705*7c356e86SAndroid Build Coastguard Worker if (cp[0] != '\0')
706*7c356e86SAndroid Build Coastguard Worker include(cp, 0, NULL, true);
707*7c356e86SAndroid Build Coastguard Worker }
708*7c356e86SAndroid Build Coastguard Worker }
709*7c356e86SAndroid Build Coastguard Worker if (restricted_shell) {
710*7c356e86SAndroid Build Coastguard Worker c_builtin(restr_com);
711*7c356e86SAndroid Build Coastguard Worker /* After typeset command... */
712*7c356e86SAndroid Build Coastguard Worker Flag(FRESTRICTED) = 1;
713*7c356e86SAndroid Build Coastguard Worker /* track shell-imposed changes */
714*7c356e86SAndroid Build Coastguard Worker baseline_flags[(int)FRESTRICTED] = 1;
715*7c356e86SAndroid Build Coastguard Worker }
716*7c356e86SAndroid Build Coastguard Worker Flag(FERREXIT) = errexit;
717*7c356e86SAndroid Build Coastguard Worker
718*7c356e86SAndroid Build Coastguard Worker if (Flag(FTALKING) && s)
719*7c356e86SAndroid Build Coastguard Worker hist_init(s);
720*7c356e86SAndroid Build Coastguard Worker else {
721*7c356e86SAndroid Build Coastguard Worker /* set after ENV */
722*7c356e86SAndroid Build Coastguard Worker skip_startup_files:
723*7c356e86SAndroid Build Coastguard Worker Flag(FTRACKALL) = 1;
724*7c356e86SAndroid Build Coastguard Worker /* track shell-imposed change (might lower surprise) */
725*7c356e86SAndroid Build Coastguard Worker baseline_flags[(int)FTRACKALL] = 1;
726*7c356e86SAndroid Build Coastguard Worker }
727*7c356e86SAndroid Build Coastguard Worker
728*7c356e86SAndroid Build Coastguard Worker alarm_init();
729*7c356e86SAndroid Build Coastguard Worker
730*7c356e86SAndroid Build Coastguard Worker *sp = s;
731*7c356e86SAndroid Build Coastguard Worker *lp = l;
732*7c356e86SAndroid Build Coastguard Worker return (0);
733*7c356e86SAndroid Build Coastguard Worker }
734*7c356e86SAndroid Build Coastguard Worker
735*7c356e86SAndroid Build Coastguard Worker /* this indirection barrier reduces stack usage during normal operation */
736*7c356e86SAndroid Build Coastguard Worker
737*7c356e86SAndroid Build Coastguard Worker int
main(int argc,const char * argv[])738*7c356e86SAndroid Build Coastguard Worker main(int argc, const char *argv[])
739*7c356e86SAndroid Build Coastguard Worker {
740*7c356e86SAndroid Build Coastguard Worker int rv;
741*7c356e86SAndroid Build Coastguard Worker Source *s;
742*7c356e86SAndroid Build Coastguard Worker struct block *l;
743*7c356e86SAndroid Build Coastguard Worker
744*7c356e86SAndroid Build Coastguard Worker if ((rv = main_init(argc, argv, &s, &l)) == 0) {
745*7c356e86SAndroid Build Coastguard Worker if (as_builtin) {
746*7c356e86SAndroid Build Coastguard Worker rv = c_builtin(l->argv);
747*7c356e86SAndroid Build Coastguard Worker } else {
748*7c356e86SAndroid Build Coastguard Worker shell(s, 0);
749*7c356e86SAndroid Build Coastguard Worker /* NOTREACHED */
750*7c356e86SAndroid Build Coastguard Worker }
751*7c356e86SAndroid Build Coastguard Worker }
752*7c356e86SAndroid Build Coastguard Worker return (rv);
753*7c356e86SAndroid Build Coastguard Worker }
754*7c356e86SAndroid Build Coastguard Worker
755*7c356e86SAndroid Build Coastguard Worker int
include(const char * name,int argc,const char ** argv,bool intr_ok)756*7c356e86SAndroid Build Coastguard Worker include(const char *name, int argc, const char **argv, bool intr_ok)
757*7c356e86SAndroid Build Coastguard Worker {
758*7c356e86SAndroid Build Coastguard Worker Source *volatile s = NULL;
759*7c356e86SAndroid Build Coastguard Worker struct shf *shf;
760*7c356e86SAndroid Build Coastguard Worker const char **volatile old_argv;
761*7c356e86SAndroid Build Coastguard Worker volatile int old_argc;
762*7c356e86SAndroid Build Coastguard Worker int i;
763*7c356e86SAndroid Build Coastguard Worker
764*7c356e86SAndroid Build Coastguard Worker shf = shf_open(name, O_RDONLY | O_MAYEXEC, 0, SHF_MAPHI | SHF_CLEXEC);
765*7c356e86SAndroid Build Coastguard Worker if (shf == NULL)
766*7c356e86SAndroid Build Coastguard Worker return (-1);
767*7c356e86SAndroid Build Coastguard Worker
768*7c356e86SAndroid Build Coastguard Worker if (argv) {
769*7c356e86SAndroid Build Coastguard Worker old_argv = e->loc->argv;
770*7c356e86SAndroid Build Coastguard Worker old_argc = e->loc->argc;
771*7c356e86SAndroid Build Coastguard Worker } else {
772*7c356e86SAndroid Build Coastguard Worker old_argv = NULL;
773*7c356e86SAndroid Build Coastguard Worker old_argc = 0;
774*7c356e86SAndroid Build Coastguard Worker }
775*7c356e86SAndroid Build Coastguard Worker newenv(E_INCL);
776*7c356e86SAndroid Build Coastguard Worker if ((i = kshsetjmp(e->jbuf))) {
777*7c356e86SAndroid Build Coastguard Worker quitenv(s ? s->u.shf : NULL);
778*7c356e86SAndroid Build Coastguard Worker if (old_argv) {
779*7c356e86SAndroid Build Coastguard Worker e->loc->argv = old_argv;
780*7c356e86SAndroid Build Coastguard Worker e->loc->argc = old_argc;
781*7c356e86SAndroid Build Coastguard Worker }
782*7c356e86SAndroid Build Coastguard Worker switch (i) {
783*7c356e86SAndroid Build Coastguard Worker case LRETURN:
784*7c356e86SAndroid Build Coastguard Worker case LERROR:
785*7c356e86SAndroid Build Coastguard Worker case LERREXT:
786*7c356e86SAndroid Build Coastguard Worker /* see below */
787*7c356e86SAndroid Build Coastguard Worker return (exstat & 0xFF);
788*7c356e86SAndroid Build Coastguard Worker case LINTR:
789*7c356e86SAndroid Build Coastguard Worker /*
790*7c356e86SAndroid Build Coastguard Worker * intr_ok is set if we are including .profile or $ENV.
791*7c356e86SAndroid Build Coastguard Worker * If user ^Cs out, we don't want to kill the shell...
792*7c356e86SAndroid Build Coastguard Worker */
793*7c356e86SAndroid Build Coastguard Worker if (intr_ok && ((exstat & 0xFF) - 128) != SIGTERM)
794*7c356e86SAndroid Build Coastguard Worker return (1);
795*7c356e86SAndroid Build Coastguard Worker /* FALLTHROUGH */
796*7c356e86SAndroid Build Coastguard Worker case LEXIT:
797*7c356e86SAndroid Build Coastguard Worker case LLEAVE:
798*7c356e86SAndroid Build Coastguard Worker case LSHELL:
799*7c356e86SAndroid Build Coastguard Worker unwind(i);
800*7c356e86SAndroid Build Coastguard Worker /* NOTREACHED */
801*7c356e86SAndroid Build Coastguard Worker default:
802*7c356e86SAndroid Build Coastguard Worker internal_errorf(Tunexpected_type, Tunwind, Tsource, i);
803*7c356e86SAndroid Build Coastguard Worker /* NOTREACHED */
804*7c356e86SAndroid Build Coastguard Worker }
805*7c356e86SAndroid Build Coastguard Worker }
806*7c356e86SAndroid Build Coastguard Worker if (argv) {
807*7c356e86SAndroid Build Coastguard Worker e->loc->argv = argv;
808*7c356e86SAndroid Build Coastguard Worker e->loc->argc = argc;
809*7c356e86SAndroid Build Coastguard Worker }
810*7c356e86SAndroid Build Coastguard Worker s = pushs(SFILE, ATEMP);
811*7c356e86SAndroid Build Coastguard Worker s->u.shf = shf;
812*7c356e86SAndroid Build Coastguard Worker strdupx(s->file, name, ATEMP);
813*7c356e86SAndroid Build Coastguard Worker i = shell(s, 1);
814*7c356e86SAndroid Build Coastguard Worker quitenv(s->u.shf);
815*7c356e86SAndroid Build Coastguard Worker if (old_argv) {
816*7c356e86SAndroid Build Coastguard Worker e->loc->argv = old_argv;
817*7c356e86SAndroid Build Coastguard Worker e->loc->argc = old_argc;
818*7c356e86SAndroid Build Coastguard Worker }
819*7c356e86SAndroid Build Coastguard Worker /* & 0xff to ensure value not -1 */
820*7c356e86SAndroid Build Coastguard Worker return (i & 0xFF);
821*7c356e86SAndroid Build Coastguard Worker }
822*7c356e86SAndroid Build Coastguard Worker
823*7c356e86SAndroid Build Coastguard Worker /* spawn a command into a shell optionally keeping track of the line number */
824*7c356e86SAndroid Build Coastguard Worker int
command(const char * comm,int line)825*7c356e86SAndroid Build Coastguard Worker command(const char *comm, int line)
826*7c356e86SAndroid Build Coastguard Worker {
827*7c356e86SAndroid Build Coastguard Worker Source *s, *sold = source;
828*7c356e86SAndroid Build Coastguard Worker int rv;
829*7c356e86SAndroid Build Coastguard Worker
830*7c356e86SAndroid Build Coastguard Worker s = pushs(SSTRING, ATEMP);
831*7c356e86SAndroid Build Coastguard Worker s->start = s->str = comm;
832*7c356e86SAndroid Build Coastguard Worker s->line = line;
833*7c356e86SAndroid Build Coastguard Worker rv = shell(s, 1);
834*7c356e86SAndroid Build Coastguard Worker source = sold;
835*7c356e86SAndroid Build Coastguard Worker return (rv);
836*7c356e86SAndroid Build Coastguard Worker }
837*7c356e86SAndroid Build Coastguard Worker
838*7c356e86SAndroid Build Coastguard Worker /*
839*7c356e86SAndroid Build Coastguard Worker * run the commands from the input source, returning status.
840*7c356e86SAndroid Build Coastguard Worker */
841*7c356e86SAndroid Build Coastguard Worker int
shell(Source * volatile s,volatile int level)842*7c356e86SAndroid Build Coastguard Worker shell(Source * volatile s, volatile int level)
843*7c356e86SAndroid Build Coastguard Worker {
844*7c356e86SAndroid Build Coastguard Worker struct op *t;
845*7c356e86SAndroid Build Coastguard Worker volatile bool wastty = tobool(s->flags & SF_TTY);
846*7c356e86SAndroid Build Coastguard Worker volatile uint8_t attempts = 13;
847*7c356e86SAndroid Build Coastguard Worker volatile bool interactive = (level == 0) && Flag(FTALKING);
848*7c356e86SAndroid Build Coastguard Worker volatile bool sfirst = true;
849*7c356e86SAndroid Build Coastguard Worker Source *volatile old_source = source;
850*7c356e86SAndroid Build Coastguard Worker int i;
851*7c356e86SAndroid Build Coastguard Worker
852*7c356e86SAndroid Build Coastguard Worker newenv(level == 2 ? E_EVAL : E_PARSE);
853*7c356e86SAndroid Build Coastguard Worker if (level == 2)
854*7c356e86SAndroid Build Coastguard Worker e->flags |= EF_IN_EVAL;
855*7c356e86SAndroid Build Coastguard Worker if (interactive)
856*7c356e86SAndroid Build Coastguard Worker really_exit = false;
857*7c356e86SAndroid Build Coastguard Worker switch ((i = kshsetjmp(e->jbuf))) {
858*7c356e86SAndroid Build Coastguard Worker case 0:
859*7c356e86SAndroid Build Coastguard Worker break;
860*7c356e86SAndroid Build Coastguard Worker case LBREAK:
861*7c356e86SAndroid Build Coastguard Worker case LCONTIN:
862*7c356e86SAndroid Build Coastguard Worker /* assert: interactive == false */
863*7c356e86SAndroid Build Coastguard Worker source = old_source;
864*7c356e86SAndroid Build Coastguard Worker quitenv(NULL);
865*7c356e86SAndroid Build Coastguard Worker if (level == 2) {
866*7c356e86SAndroid Build Coastguard Worker /* keep on going */
867*7c356e86SAndroid Build Coastguard Worker unwind(i);
868*7c356e86SAndroid Build Coastguard Worker /* NOTREACHED */
869*7c356e86SAndroid Build Coastguard Worker }
870*7c356e86SAndroid Build Coastguard Worker internal_errorf(Tf_cant_s, Tshell,
871*7c356e86SAndroid Build Coastguard Worker i == LBREAK ? Tbreak : Tcontinue);
872*7c356e86SAndroid Build Coastguard Worker /* NOTREACHED */
873*7c356e86SAndroid Build Coastguard Worker case LINTR:
874*7c356e86SAndroid Build Coastguard Worker /* we get here if SIGINT not caught or ignored */
875*7c356e86SAndroid Build Coastguard Worker case LERROR:
876*7c356e86SAndroid Build Coastguard Worker case LERREXT:
877*7c356e86SAndroid Build Coastguard Worker case LSHELL:
878*7c356e86SAndroid Build Coastguard Worker if (interactive) {
879*7c356e86SAndroid Build Coastguard Worker if (i == LINTR)
880*7c356e86SAndroid Build Coastguard Worker shellf("\n");
881*7c356e86SAndroid Build Coastguard Worker /*
882*7c356e86SAndroid Build Coastguard Worker * Reset any eof that was read as part of a
883*7c356e86SAndroid Build Coastguard Worker * multiline command.
884*7c356e86SAndroid Build Coastguard Worker */
885*7c356e86SAndroid Build Coastguard Worker if (Flag(FIGNOREEOF) && s->type == SEOF && wastty)
886*7c356e86SAndroid Build Coastguard Worker s->type = SSTDIN;
887*7c356e86SAndroid Build Coastguard Worker /*
888*7c356e86SAndroid Build Coastguard Worker * Used by exit command to get back to
889*7c356e86SAndroid Build Coastguard Worker * top level shell. Kind of strange since
890*7c356e86SAndroid Build Coastguard Worker * interactive is set if we are reading from
891*7c356e86SAndroid Build Coastguard Worker * a tty, but to have stopped jobs, one only
892*7c356e86SAndroid Build Coastguard Worker * needs FMONITOR set (not FTALKING/SF_TTY)...
893*7c356e86SAndroid Build Coastguard Worker */
894*7c356e86SAndroid Build Coastguard Worker /* toss any input we have so far */
895*7c356e86SAndroid Build Coastguard Worker yyrecursive_pop(true);
896*7c356e86SAndroid Build Coastguard Worker s->start = s->str = null;
897*7c356e86SAndroid Build Coastguard Worker retrace_info = NULL;
898*7c356e86SAndroid Build Coastguard Worker herep = heres;
899*7c356e86SAndroid Build Coastguard Worker break;
900*7c356e86SAndroid Build Coastguard Worker }
901*7c356e86SAndroid Build Coastguard Worker /* FALLTHROUGH */
902*7c356e86SAndroid Build Coastguard Worker case LEXIT:
903*7c356e86SAndroid Build Coastguard Worker case LLEAVE:
904*7c356e86SAndroid Build Coastguard Worker case LRETURN:
905*7c356e86SAndroid Build Coastguard Worker source = old_source;
906*7c356e86SAndroid Build Coastguard Worker quitenv(NULL);
907*7c356e86SAndroid Build Coastguard Worker if (i == LERREXT && level == 2)
908*7c356e86SAndroid Build Coastguard Worker return (exstat & 0xFF);
909*7c356e86SAndroid Build Coastguard Worker /* keep on going */
910*7c356e86SAndroid Build Coastguard Worker unwind(i);
911*7c356e86SAndroid Build Coastguard Worker /* NOTREACHED */
912*7c356e86SAndroid Build Coastguard Worker default:
913*7c356e86SAndroid Build Coastguard Worker source = old_source;
914*7c356e86SAndroid Build Coastguard Worker quitenv(NULL);
915*7c356e86SAndroid Build Coastguard Worker internal_errorf(Tunexpected_type, Tunwind, Tshell, i);
916*7c356e86SAndroid Build Coastguard Worker /* NOTREACHED */
917*7c356e86SAndroid Build Coastguard Worker }
918*7c356e86SAndroid Build Coastguard Worker while (/* CONSTCOND */ 1) {
919*7c356e86SAndroid Build Coastguard Worker if (trap)
920*7c356e86SAndroid Build Coastguard Worker runtraps(0);
921*7c356e86SAndroid Build Coastguard Worker
922*7c356e86SAndroid Build Coastguard Worker if (s->next == NULL) {
923*7c356e86SAndroid Build Coastguard Worker if (Flag(FVERBOSE))
924*7c356e86SAndroid Build Coastguard Worker s->flags |= SF_ECHO;
925*7c356e86SAndroid Build Coastguard Worker else
926*7c356e86SAndroid Build Coastguard Worker s->flags &= ~SF_ECHO;
927*7c356e86SAndroid Build Coastguard Worker }
928*7c356e86SAndroid Build Coastguard Worker if (interactive) {
929*7c356e86SAndroid Build Coastguard Worker j_notify();
930*7c356e86SAndroid Build Coastguard Worker set_prompt(PS1, s);
931*7c356e86SAndroid Build Coastguard Worker }
932*7c356e86SAndroid Build Coastguard Worker t = compile(s, sfirst, true);
933*7c356e86SAndroid Build Coastguard Worker if (interactive)
934*7c356e86SAndroid Build Coastguard Worker histsave(&s->line, NULL, HIST_FLUSH, true);
935*7c356e86SAndroid Build Coastguard Worker sfirst = false;
936*7c356e86SAndroid Build Coastguard Worker if (!t)
937*7c356e86SAndroid Build Coastguard Worker goto source_no_tree;
938*7c356e86SAndroid Build Coastguard Worker if (t->type == TEOF) {
939*7c356e86SAndroid Build Coastguard Worker if (wastty && Flag(FIGNOREEOF) && --attempts > 0) {
940*7c356e86SAndroid Build Coastguard Worker shellf("Use 'exit' to leave mksh\n");
941*7c356e86SAndroid Build Coastguard Worker s->type = SSTDIN;
942*7c356e86SAndroid Build Coastguard Worker } else if (wastty && !really_exit &&
943*7c356e86SAndroid Build Coastguard Worker j_stopped_running()) {
944*7c356e86SAndroid Build Coastguard Worker really_exit = true;
945*7c356e86SAndroid Build Coastguard Worker s->type = SSTDIN;
946*7c356e86SAndroid Build Coastguard Worker } else {
947*7c356e86SAndroid Build Coastguard Worker /*
948*7c356e86SAndroid Build Coastguard Worker * this for POSIX which says EXIT traps
949*7c356e86SAndroid Build Coastguard Worker * shall be taken in the environment
950*7c356e86SAndroid Build Coastguard Worker * immediately after the last command
951*7c356e86SAndroid Build Coastguard Worker * executed.
952*7c356e86SAndroid Build Coastguard Worker */
953*7c356e86SAndroid Build Coastguard Worker if (level == 0)
954*7c356e86SAndroid Build Coastguard Worker unwind(LEXIT);
955*7c356e86SAndroid Build Coastguard Worker break;
956*7c356e86SAndroid Build Coastguard Worker }
957*7c356e86SAndroid Build Coastguard Worker } else if ((s->flags & SF_MAYEXEC) && t->type == TCOM)
958*7c356e86SAndroid Build Coastguard Worker t->u.evalflags |= DOTCOMEXEC;
959*7c356e86SAndroid Build Coastguard Worker if (!Flag(FNOEXEC) || (s->flags & SF_TTY))
960*7c356e86SAndroid Build Coastguard Worker exstat = execute(t, 0, NULL) & 0xFF;
961*7c356e86SAndroid Build Coastguard Worker
962*7c356e86SAndroid Build Coastguard Worker if (t->type != TEOF && interactive && really_exit)
963*7c356e86SAndroid Build Coastguard Worker really_exit = false;
964*7c356e86SAndroid Build Coastguard Worker
965*7c356e86SAndroid Build Coastguard Worker source_no_tree:
966*7c356e86SAndroid Build Coastguard Worker reclaim();
967*7c356e86SAndroid Build Coastguard Worker }
968*7c356e86SAndroid Build Coastguard Worker source = old_source;
969*7c356e86SAndroid Build Coastguard Worker quitenv(NULL);
970*7c356e86SAndroid Build Coastguard Worker return (exstat & 0xFF);
971*7c356e86SAndroid Build Coastguard Worker }
972*7c356e86SAndroid Build Coastguard Worker
973*7c356e86SAndroid Build Coastguard Worker /* return to closest error handler or shell(), exit if none found */
974*7c356e86SAndroid Build Coastguard Worker /* note: i MUST NOT be 0 */
975*7c356e86SAndroid Build Coastguard Worker void
unwind(int i)976*7c356e86SAndroid Build Coastguard Worker unwind(int i)
977*7c356e86SAndroid Build Coastguard Worker {
978*7c356e86SAndroid Build Coastguard Worker /* during eval, skip FERREXIT trap */
979*7c356e86SAndroid Build Coastguard Worker if (i == LERREXT && (e->flags & EF_IN_EVAL))
980*7c356e86SAndroid Build Coastguard Worker goto defer_traps;
981*7c356e86SAndroid Build Coastguard Worker
982*7c356e86SAndroid Build Coastguard Worker /* ordering for EXIT vs ERR is a bit odd (this is what AT&T ksh does) */
983*7c356e86SAndroid Build Coastguard Worker if (i == LEXIT || ((i == LERROR || i == LERREXT || i == LINTR) &&
984*7c356e86SAndroid Build Coastguard Worker sigtraps[ksh_SIGEXIT].trap &&
985*7c356e86SAndroid Build Coastguard Worker (!Flag(FTALKING) || Flag(FERREXIT)))) {
986*7c356e86SAndroid Build Coastguard Worker ++trap_nested;
987*7c356e86SAndroid Build Coastguard Worker runtrap(&sigtraps[ksh_SIGEXIT], trap_nested == 1);
988*7c356e86SAndroid Build Coastguard Worker --trap_nested;
989*7c356e86SAndroid Build Coastguard Worker i = LLEAVE;
990*7c356e86SAndroid Build Coastguard Worker } else if (Flag(FERREXIT) && (i == LERROR || i == LERREXT || i == LINTR)) {
991*7c356e86SAndroid Build Coastguard Worker ++trap_nested;
992*7c356e86SAndroid Build Coastguard Worker runtrap(&sigtraps[ksh_SIGERR], trap_nested == 1);
993*7c356e86SAndroid Build Coastguard Worker --trap_nested;
994*7c356e86SAndroid Build Coastguard Worker i = LLEAVE;
995*7c356e86SAndroid Build Coastguard Worker }
996*7c356e86SAndroid Build Coastguard Worker defer_traps:
997*7c356e86SAndroid Build Coastguard Worker
998*7c356e86SAndroid Build Coastguard Worker while (/* CONSTCOND */ 1) {
999*7c356e86SAndroid Build Coastguard Worker switch (e->type) {
1000*7c356e86SAndroid Build Coastguard Worker case E_PARSE:
1001*7c356e86SAndroid Build Coastguard Worker case E_FUNC:
1002*7c356e86SAndroid Build Coastguard Worker case E_INCL:
1003*7c356e86SAndroid Build Coastguard Worker case E_LOOP:
1004*7c356e86SAndroid Build Coastguard Worker case E_ERRH:
1005*7c356e86SAndroid Build Coastguard Worker case E_EVAL:
1006*7c356e86SAndroid Build Coastguard Worker kshlongjmp(e->jbuf, i);
1007*7c356e86SAndroid Build Coastguard Worker /* NOTREACHED */
1008*7c356e86SAndroid Build Coastguard Worker case E_NONE:
1009*7c356e86SAndroid Build Coastguard Worker if (i == LINTR)
1010*7c356e86SAndroid Build Coastguard Worker e->flags |= EF_FAKE_SIGDIE;
1011*7c356e86SAndroid Build Coastguard Worker /* FALLTHROUGH */
1012*7c356e86SAndroid Build Coastguard Worker default:
1013*7c356e86SAndroid Build Coastguard Worker quitenv(NULL);
1014*7c356e86SAndroid Build Coastguard Worker }
1015*7c356e86SAndroid Build Coastguard Worker }
1016*7c356e86SAndroid Build Coastguard Worker }
1017*7c356e86SAndroid Build Coastguard Worker
1018*7c356e86SAndroid Build Coastguard Worker void
newenv(int type)1019*7c356e86SAndroid Build Coastguard Worker newenv(int type)
1020*7c356e86SAndroid Build Coastguard Worker {
1021*7c356e86SAndroid Build Coastguard Worker struct env *ep;
1022*7c356e86SAndroid Build Coastguard Worker char *cp;
1023*7c356e86SAndroid Build Coastguard Worker
1024*7c356e86SAndroid Build Coastguard Worker /*
1025*7c356e86SAndroid Build Coastguard Worker * struct env includes ALLOC_ITEM for alignment constraints
1026*7c356e86SAndroid Build Coastguard Worker * so first get the actually used memory, then assign it
1027*7c356e86SAndroid Build Coastguard Worker */
1028*7c356e86SAndroid Build Coastguard Worker cp = alloc(sizeof(struct env) - sizeof(ALLOC_ITEM), ATEMP);
1029*7c356e86SAndroid Build Coastguard Worker /* undo what alloc() did to the malloc result address */
1030*7c356e86SAndroid Build Coastguard Worker ep = (void *)(cp - sizeof(ALLOC_ITEM));
1031*7c356e86SAndroid Build Coastguard Worker /* initialise public members of struct env (not the ALLOC_ITEM) */
1032*7c356e86SAndroid Build Coastguard Worker ainit(&ep->area);
1033*7c356e86SAndroid Build Coastguard Worker ep->oenv = e;
1034*7c356e86SAndroid Build Coastguard Worker ep->loc = e->loc;
1035*7c356e86SAndroid Build Coastguard Worker ep->savefd = NULL;
1036*7c356e86SAndroid Build Coastguard Worker ep->temps = NULL;
1037*7c356e86SAndroid Build Coastguard Worker ep->yyrecursive_statep = NULL;
1038*7c356e86SAndroid Build Coastguard Worker ep->type = type;
1039*7c356e86SAndroid Build Coastguard Worker ep->flags = e->flags & EF_IN_EVAL;
1040*7c356e86SAndroid Build Coastguard Worker e = ep;
1041*7c356e86SAndroid Build Coastguard Worker }
1042*7c356e86SAndroid Build Coastguard Worker
1043*7c356e86SAndroid Build Coastguard Worker void
quitenv(struct shf * shf)1044*7c356e86SAndroid Build Coastguard Worker quitenv(struct shf *shf)
1045*7c356e86SAndroid Build Coastguard Worker {
1046*7c356e86SAndroid Build Coastguard Worker struct env *ep = e;
1047*7c356e86SAndroid Build Coastguard Worker char *cp;
1048*7c356e86SAndroid Build Coastguard Worker int fd;
1049*7c356e86SAndroid Build Coastguard Worker
1050*7c356e86SAndroid Build Coastguard Worker yyrecursive_pop(true);
1051*7c356e86SAndroid Build Coastguard Worker while (ep->oenv && ep->oenv->loc != ep->loc)
1052*7c356e86SAndroid Build Coastguard Worker popblock();
1053*7c356e86SAndroid Build Coastguard Worker if (ep->savefd != NULL) {
1054*7c356e86SAndroid Build Coastguard Worker for (fd = 0; fd < NUFILE; fd++)
1055*7c356e86SAndroid Build Coastguard Worker /* if ep->savefd[fd] < 0, means fd was closed */
1056*7c356e86SAndroid Build Coastguard Worker if (ep->savefd[fd])
1057*7c356e86SAndroid Build Coastguard Worker restfd(fd, ep->savefd[fd]);
1058*7c356e86SAndroid Build Coastguard Worker if (ep->savefd[2])
1059*7c356e86SAndroid Build Coastguard Worker /* Clear any write errors */
1060*7c356e86SAndroid Build Coastguard Worker shf_reopen(2, SHF_WR, shl_out);
1061*7c356e86SAndroid Build Coastguard Worker }
1062*7c356e86SAndroid Build Coastguard Worker /*
1063*7c356e86SAndroid Build Coastguard Worker * Bottom of the stack.
1064*7c356e86SAndroid Build Coastguard Worker * Either main shell is exiting or cleanup_parents_env() was called.
1065*7c356e86SAndroid Build Coastguard Worker */
1066*7c356e86SAndroid Build Coastguard Worker if (ep->oenv == NULL) {
1067*7c356e86SAndroid Build Coastguard Worker #ifdef DEBUG_LEAKS
1068*7c356e86SAndroid Build Coastguard Worker int i;
1069*7c356e86SAndroid Build Coastguard Worker #endif
1070*7c356e86SAndroid Build Coastguard Worker
1071*7c356e86SAndroid Build Coastguard Worker if (ep->type == E_NONE) {
1072*7c356e86SAndroid Build Coastguard Worker /* Main shell exiting? */
1073*7c356e86SAndroid Build Coastguard Worker #if HAVE_PERSISTENT_HISTORY
1074*7c356e86SAndroid Build Coastguard Worker if (Flag(FTALKING))
1075*7c356e86SAndroid Build Coastguard Worker hist_finish();
1076*7c356e86SAndroid Build Coastguard Worker #endif
1077*7c356e86SAndroid Build Coastguard Worker j_exit();
1078*7c356e86SAndroid Build Coastguard Worker if (ep->flags & EF_FAKE_SIGDIE) {
1079*7c356e86SAndroid Build Coastguard Worker int sig = (exstat & 0xFF) - 128;
1080*7c356e86SAndroid Build Coastguard Worker
1081*7c356e86SAndroid Build Coastguard Worker /*
1082*7c356e86SAndroid Build Coastguard Worker * ham up our death a bit (AT&T ksh
1083*7c356e86SAndroid Build Coastguard Worker * only seems to do this for SIGTERM)
1084*7c356e86SAndroid Build Coastguard Worker * Don't do it for SIGQUIT, since we'd
1085*7c356e86SAndroid Build Coastguard Worker * dump a core..
1086*7c356e86SAndroid Build Coastguard Worker */
1087*7c356e86SAndroid Build Coastguard Worker if ((sig == SIGINT || sig == SIGTERM) &&
1088*7c356e86SAndroid Build Coastguard Worker (kshpgrp == kshpid)) {
1089*7c356e86SAndroid Build Coastguard Worker setsig(&sigtraps[sig], SIG_DFL,
1090*7c356e86SAndroid Build Coastguard Worker SS_RESTORE_CURR | SS_FORCE);
1091*7c356e86SAndroid Build Coastguard Worker kill(0, sig);
1092*7c356e86SAndroid Build Coastguard Worker }
1093*7c356e86SAndroid Build Coastguard Worker }
1094*7c356e86SAndroid Build Coastguard Worker }
1095*7c356e86SAndroid Build Coastguard Worker if (shf)
1096*7c356e86SAndroid Build Coastguard Worker shf_close(shf);
1097*7c356e86SAndroid Build Coastguard Worker reclaim();
1098*7c356e86SAndroid Build Coastguard Worker #ifdef DEBUG_LEAKS
1099*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_NO_CMDLINE_EDITING
1100*7c356e86SAndroid Build Coastguard Worker x_done();
1101*7c356e86SAndroid Build Coastguard Worker #endif
1102*7c356e86SAndroid Build Coastguard Worker #ifndef MKSH_NOPROSPECTOFWORK
1103*7c356e86SAndroid Build Coastguard Worker /* block at least SIGCHLD during/after afreeall */
1104*7c356e86SAndroid Build Coastguard Worker sigprocmask(SIG_BLOCK, &sm_sigchld, NULL);
1105*7c356e86SAndroid Build Coastguard Worker #endif
1106*7c356e86SAndroid Build Coastguard Worker afreeall(APERM);
1107*7c356e86SAndroid Build Coastguard Worker for (fd = 3; fd < NUFILE; fd++)
1108*7c356e86SAndroid Build Coastguard Worker if ((i = fcntl(fd, F_GETFD, 0)) != -1 &&
1109*7c356e86SAndroid Build Coastguard Worker (i & FD_CLOEXEC))
1110*7c356e86SAndroid Build Coastguard Worker close(fd);
1111*7c356e86SAndroid Build Coastguard Worker close(2);
1112*7c356e86SAndroid Build Coastguard Worker close(1);
1113*7c356e86SAndroid Build Coastguard Worker close(0);
1114*7c356e86SAndroid Build Coastguard Worker #endif
1115*7c356e86SAndroid Build Coastguard Worker exit(exstat & 0xFF);
1116*7c356e86SAndroid Build Coastguard Worker }
1117*7c356e86SAndroid Build Coastguard Worker if (shf)
1118*7c356e86SAndroid Build Coastguard Worker shf_close(shf);
1119*7c356e86SAndroid Build Coastguard Worker reclaim();
1120*7c356e86SAndroid Build Coastguard Worker
1121*7c356e86SAndroid Build Coastguard Worker e = e->oenv;
1122*7c356e86SAndroid Build Coastguard Worker
1123*7c356e86SAndroid Build Coastguard Worker /* free the struct env - tricky due to the ALLOC_ITEM inside */
1124*7c356e86SAndroid Build Coastguard Worker cp = (void *)ep;
1125*7c356e86SAndroid Build Coastguard Worker afree(cp + sizeof(ALLOC_ITEM), ATEMP);
1126*7c356e86SAndroid Build Coastguard Worker }
1127*7c356e86SAndroid Build Coastguard Worker
1128*7c356e86SAndroid Build Coastguard Worker /* Called after a fork to cleanup stuff left over from parents environment */
1129*7c356e86SAndroid Build Coastguard Worker void
cleanup_parents_env(void)1130*7c356e86SAndroid Build Coastguard Worker cleanup_parents_env(void)
1131*7c356e86SAndroid Build Coastguard Worker {
1132*7c356e86SAndroid Build Coastguard Worker struct env *ep;
1133*7c356e86SAndroid Build Coastguard Worker int fd;
1134*7c356e86SAndroid Build Coastguard Worker
1135*7c356e86SAndroid Build Coastguard Worker /*
1136*7c356e86SAndroid Build Coastguard Worker * Don't clean up temporary files - parent will probably need them.
1137*7c356e86SAndroid Build Coastguard Worker * Also, can't easily reclaim memory since variables, etc. could be
1138*7c356e86SAndroid Build Coastguard Worker * anywhere.
1139*7c356e86SAndroid Build Coastguard Worker */
1140*7c356e86SAndroid Build Coastguard Worker
1141*7c356e86SAndroid Build Coastguard Worker /* close all file descriptors hiding in savefd */
1142*7c356e86SAndroid Build Coastguard Worker for (ep = e; ep; ep = ep->oenv) {
1143*7c356e86SAndroid Build Coastguard Worker if (ep->savefd) {
1144*7c356e86SAndroid Build Coastguard Worker for (fd = 0; fd < NUFILE; fd++)
1145*7c356e86SAndroid Build Coastguard Worker if (ep->savefd[fd] > 0)
1146*7c356e86SAndroid Build Coastguard Worker close(ep->savefd[fd]);
1147*7c356e86SAndroid Build Coastguard Worker afree(ep->savefd, &ep->area);
1148*7c356e86SAndroid Build Coastguard Worker ep->savefd = NULL;
1149*7c356e86SAndroid Build Coastguard Worker }
1150*7c356e86SAndroid Build Coastguard Worker #ifdef DEBUG_LEAKS
1151*7c356e86SAndroid Build Coastguard Worker if (ep->type != E_NONE)
1152*7c356e86SAndroid Build Coastguard Worker ep->type = E_GONE;
1153*7c356e86SAndroid Build Coastguard Worker #endif
1154*7c356e86SAndroid Build Coastguard Worker }
1155*7c356e86SAndroid Build Coastguard Worker #ifndef DEBUG_LEAKS
1156*7c356e86SAndroid Build Coastguard Worker e->oenv = NULL;
1157*7c356e86SAndroid Build Coastguard Worker #endif
1158*7c356e86SAndroid Build Coastguard Worker }
1159*7c356e86SAndroid Build Coastguard Worker
1160*7c356e86SAndroid Build Coastguard Worker /* Called just before an execve cleanup stuff temporary files */
1161*7c356e86SAndroid Build Coastguard Worker void
cleanup_proc_env(void)1162*7c356e86SAndroid Build Coastguard Worker cleanup_proc_env(void)
1163*7c356e86SAndroid Build Coastguard Worker {
1164*7c356e86SAndroid Build Coastguard Worker struct env *ep;
1165*7c356e86SAndroid Build Coastguard Worker
1166*7c356e86SAndroid Build Coastguard Worker for (ep = e; ep; ep = ep->oenv)
1167*7c356e86SAndroid Build Coastguard Worker remove_temps(ep->temps);
1168*7c356e86SAndroid Build Coastguard Worker }
1169*7c356e86SAndroid Build Coastguard Worker
1170*7c356e86SAndroid Build Coastguard Worker /* remove temp files and free ATEMP Area */
1171*7c356e86SAndroid Build Coastguard Worker static void
reclaim(void)1172*7c356e86SAndroid Build Coastguard Worker reclaim(void)
1173*7c356e86SAndroid Build Coastguard Worker {
1174*7c356e86SAndroid Build Coastguard Worker struct block *l;
1175*7c356e86SAndroid Build Coastguard Worker
1176*7c356e86SAndroid Build Coastguard Worker while ((l = e->loc) && (!e->oenv || e->oenv->loc != l)) {
1177*7c356e86SAndroid Build Coastguard Worker e->loc = l->next;
1178*7c356e86SAndroid Build Coastguard Worker afreeall(&l->area);
1179*7c356e86SAndroid Build Coastguard Worker }
1180*7c356e86SAndroid Build Coastguard Worker
1181*7c356e86SAndroid Build Coastguard Worker remove_temps(e->temps);
1182*7c356e86SAndroid Build Coastguard Worker e->temps = NULL;
1183*7c356e86SAndroid Build Coastguard Worker
1184*7c356e86SAndroid Build Coastguard Worker /*
1185*7c356e86SAndroid Build Coastguard Worker * if the memory backing source is reclaimed, things
1186*7c356e86SAndroid Build Coastguard Worker * will end up badly when a function expecting it to
1187*7c356e86SAndroid Build Coastguard Worker * be valid is run; a NULL pointer is easily debugged
1188*7c356e86SAndroid Build Coastguard Worker */
1189*7c356e86SAndroid Build Coastguard Worker if (source && source->areap == &e->area)
1190*7c356e86SAndroid Build Coastguard Worker source = NULL;
1191*7c356e86SAndroid Build Coastguard Worker afreeall(&e->area);
1192*7c356e86SAndroid Build Coastguard Worker }
1193*7c356e86SAndroid Build Coastguard Worker
1194*7c356e86SAndroid Build Coastguard Worker static void
remove_temps(struct temp * tp)1195*7c356e86SAndroid Build Coastguard Worker remove_temps(struct temp *tp)
1196*7c356e86SAndroid Build Coastguard Worker {
1197*7c356e86SAndroid Build Coastguard Worker while (tp) {
1198*7c356e86SAndroid Build Coastguard Worker if (tp->pid == procpid)
1199*7c356e86SAndroid Build Coastguard Worker unlink(tp->tffn);
1200*7c356e86SAndroid Build Coastguard Worker tp = tp->next;
1201*7c356e86SAndroid Build Coastguard Worker }
1202*7c356e86SAndroid Build Coastguard Worker }
1203*7c356e86SAndroid Build Coastguard Worker
1204*7c356e86SAndroid Build Coastguard Worker /*
1205*7c356e86SAndroid Build Coastguard Worker * Initialise tty_fd. Used for tracking the size of the terminal,
1206*7c356e86SAndroid Build Coastguard Worker * saving/resetting tty modes upon foreground job completion, and
1207*7c356e86SAndroid Build Coastguard Worker * for setting up the tty process group. Return values:
1208*7c356e86SAndroid Build Coastguard Worker * 0 = got controlling tty
1209*7c356e86SAndroid Build Coastguard Worker * 1 = got terminal but no controlling tty
1210*7c356e86SAndroid Build Coastguard Worker * 2 = cannot find a terminal
1211*7c356e86SAndroid Build Coastguard Worker * 3 = cannot dup fd
1212*7c356e86SAndroid Build Coastguard Worker * 4 = cannot make fd close-on-exec
1213*7c356e86SAndroid Build Coastguard Worker * An existing tty_fd is cached if no "better" one could be found,
1214*7c356e86SAndroid Build Coastguard Worker * i.e. if tty_devtty was already set or the new would not set it.
1215*7c356e86SAndroid Build Coastguard Worker */
1216*7c356e86SAndroid Build Coastguard Worker int
tty_init_fd(void)1217*7c356e86SAndroid Build Coastguard Worker tty_init_fd(void)
1218*7c356e86SAndroid Build Coastguard Worker {
1219*7c356e86SAndroid Build Coastguard Worker int fd, rv, eno = 0;
1220*7c356e86SAndroid Build Coastguard Worker bool do_close = false, is_devtty = true;
1221*7c356e86SAndroid Build Coastguard Worker
1222*7c356e86SAndroid Build Coastguard Worker if (tty_devtty) {
1223*7c356e86SAndroid Build Coastguard Worker /* already got a tty which is /dev/tty */
1224*7c356e86SAndroid Build Coastguard Worker return (0);
1225*7c356e86SAndroid Build Coastguard Worker }
1226*7c356e86SAndroid Build Coastguard Worker
1227*7c356e86SAndroid Build Coastguard Worker #ifdef _UWIN
1228*7c356e86SAndroid Build Coastguard Worker /*XXX imake style */
1229*7c356e86SAndroid Build Coastguard Worker if (isatty(3)) {
1230*7c356e86SAndroid Build Coastguard Worker /* fd 3 on UWIN _is_ /dev/tty (or our controlling tty) */
1231*7c356e86SAndroid Build Coastguard Worker fd = 3;
1232*7c356e86SAndroid Build Coastguard Worker goto got_fd;
1233*7c356e86SAndroid Build Coastguard Worker }
1234*7c356e86SAndroid Build Coastguard Worker #endif
1235*7c356e86SAndroid Build Coastguard Worker if ((fd = open(T_devtty, O_RDWR, 0)) >= 0) {
1236*7c356e86SAndroid Build Coastguard Worker do_close = true;
1237*7c356e86SAndroid Build Coastguard Worker goto got_fd;
1238*7c356e86SAndroid Build Coastguard Worker }
1239*7c356e86SAndroid Build Coastguard Worker eno = errno;
1240*7c356e86SAndroid Build Coastguard Worker
1241*7c356e86SAndroid Build Coastguard Worker if (tty_fd >= 0) {
1242*7c356e86SAndroid Build Coastguard Worker /* already got a non-devtty one */
1243*7c356e86SAndroid Build Coastguard Worker rv = 1;
1244*7c356e86SAndroid Build Coastguard Worker goto out;
1245*7c356e86SAndroid Build Coastguard Worker }
1246*7c356e86SAndroid Build Coastguard Worker is_devtty = false;
1247*7c356e86SAndroid Build Coastguard Worker
1248*7c356e86SAndroid Build Coastguard Worker if (isatty((fd = 0)) || isatty((fd = 2)))
1249*7c356e86SAndroid Build Coastguard Worker goto got_fd;
1250*7c356e86SAndroid Build Coastguard Worker /* cannot find one */
1251*7c356e86SAndroid Build Coastguard Worker rv = 2;
1252*7c356e86SAndroid Build Coastguard Worker /* assert: do_close == false */
1253*7c356e86SAndroid Build Coastguard Worker goto out;
1254*7c356e86SAndroid Build Coastguard Worker
1255*7c356e86SAndroid Build Coastguard Worker got_fd:
1256*7c356e86SAndroid Build Coastguard Worker if ((rv = fcntl(fd, F_DUPFD, FDBASE)) < 0) {
1257*7c356e86SAndroid Build Coastguard Worker eno = errno;
1258*7c356e86SAndroid Build Coastguard Worker rv = 3;
1259*7c356e86SAndroid Build Coastguard Worker goto out;
1260*7c356e86SAndroid Build Coastguard Worker }
1261*7c356e86SAndroid Build Coastguard Worker if (fcntl(rv, F_SETFD, FD_CLOEXEC) < 0) {
1262*7c356e86SAndroid Build Coastguard Worker eno = errno;
1263*7c356e86SAndroid Build Coastguard Worker close(rv);
1264*7c356e86SAndroid Build Coastguard Worker rv = 4;
1265*7c356e86SAndroid Build Coastguard Worker goto out;
1266*7c356e86SAndroid Build Coastguard Worker }
1267*7c356e86SAndroid Build Coastguard Worker tty_fd = rv;
1268*7c356e86SAndroid Build Coastguard Worker tty_devtty = is_devtty;
1269*7c356e86SAndroid Build Coastguard Worker rv = eno = 0;
1270*7c356e86SAndroid Build Coastguard Worker out:
1271*7c356e86SAndroid Build Coastguard Worker if (do_close)
1272*7c356e86SAndroid Build Coastguard Worker close(fd);
1273*7c356e86SAndroid Build Coastguard Worker errno = eno;
1274*7c356e86SAndroid Build Coastguard Worker return (rv);
1275*7c356e86SAndroid Build Coastguard Worker }
1276*7c356e86SAndroid Build Coastguard Worker
1277*7c356e86SAndroid Build Coastguard Worker /* A shell error occurred (eg, syntax error, etc.) */
1278*7c356e86SAndroid Build Coastguard Worker
1279*7c356e86SAndroid Build Coastguard Worker #define VWARNINGF_ERRORPREFIX 1
1280*7c356e86SAndroid Build Coastguard Worker #define VWARNINGF_FILELINE 2
1281*7c356e86SAndroid Build Coastguard Worker #define VWARNINGF_BUILTIN 4
1282*7c356e86SAndroid Build Coastguard Worker #define VWARNINGF_INTERNAL 8
1283*7c356e86SAndroid Build Coastguard Worker
1284*7c356e86SAndroid Build Coastguard Worker static void vwarningf(unsigned int, const char *, va_list)
1285*7c356e86SAndroid Build Coastguard Worker MKSH_A_FORMAT(__printf__, 2, 0);
1286*7c356e86SAndroid Build Coastguard Worker
1287*7c356e86SAndroid Build Coastguard Worker static void
vwarningf(unsigned int flags,const char * fmt,va_list ap)1288*7c356e86SAndroid Build Coastguard Worker vwarningf(unsigned int flags, const char *fmt, va_list ap)
1289*7c356e86SAndroid Build Coastguard Worker {
1290*7c356e86SAndroid Build Coastguard Worker if (fmt) {
1291*7c356e86SAndroid Build Coastguard Worker if (flags & VWARNINGF_INTERNAL)
1292*7c356e86SAndroid Build Coastguard Worker shf_fprintf(shl_out, Tf_sD_, "internal error");
1293*7c356e86SAndroid Build Coastguard Worker if (flags & VWARNINGF_ERRORPREFIX)
1294*7c356e86SAndroid Build Coastguard Worker error_prefix(tobool(flags & VWARNINGF_FILELINE));
1295*7c356e86SAndroid Build Coastguard Worker if ((flags & VWARNINGF_BUILTIN) &&
1296*7c356e86SAndroid Build Coastguard Worker /* not set when main() calls parse_args() */
1297*7c356e86SAndroid Build Coastguard Worker builtin_argv0 && builtin_argv0 != kshname)
1298*7c356e86SAndroid Build Coastguard Worker shf_fprintf(shl_out, Tf_sD_, builtin_argv0);
1299*7c356e86SAndroid Build Coastguard Worker shf_vfprintf(shl_out, fmt, ap);
1300*7c356e86SAndroid Build Coastguard Worker shf_putchar('\n', shl_out);
1301*7c356e86SAndroid Build Coastguard Worker }
1302*7c356e86SAndroid Build Coastguard Worker shf_flush(shl_out);
1303*7c356e86SAndroid Build Coastguard Worker }
1304*7c356e86SAndroid Build Coastguard Worker
1305*7c356e86SAndroid Build Coastguard Worker void
errorfx(int rc,const char * fmt,...)1306*7c356e86SAndroid Build Coastguard Worker errorfx(int rc, const char *fmt, ...)
1307*7c356e86SAndroid Build Coastguard Worker {
1308*7c356e86SAndroid Build Coastguard Worker va_list va;
1309*7c356e86SAndroid Build Coastguard Worker
1310*7c356e86SAndroid Build Coastguard Worker exstat = rc;
1311*7c356e86SAndroid Build Coastguard Worker
1312*7c356e86SAndroid Build Coastguard Worker /* debugging: note that stdout not valid */
1313*7c356e86SAndroid Build Coastguard Worker shl_stdout_ok = false;
1314*7c356e86SAndroid Build Coastguard Worker
1315*7c356e86SAndroid Build Coastguard Worker va_start(va, fmt);
1316*7c356e86SAndroid Build Coastguard Worker vwarningf(VWARNINGF_ERRORPREFIX | VWARNINGF_FILELINE, fmt, va);
1317*7c356e86SAndroid Build Coastguard Worker va_end(va);
1318*7c356e86SAndroid Build Coastguard Worker unwind(LERROR);
1319*7c356e86SAndroid Build Coastguard Worker }
1320*7c356e86SAndroid Build Coastguard Worker
1321*7c356e86SAndroid Build Coastguard Worker void
errorf(const char * fmt,...)1322*7c356e86SAndroid Build Coastguard Worker errorf(const char *fmt, ...)
1323*7c356e86SAndroid Build Coastguard Worker {
1324*7c356e86SAndroid Build Coastguard Worker va_list va;
1325*7c356e86SAndroid Build Coastguard Worker
1326*7c356e86SAndroid Build Coastguard Worker exstat = 1;
1327*7c356e86SAndroid Build Coastguard Worker
1328*7c356e86SAndroid Build Coastguard Worker /* debugging: note that stdout not valid */
1329*7c356e86SAndroid Build Coastguard Worker shl_stdout_ok = false;
1330*7c356e86SAndroid Build Coastguard Worker
1331*7c356e86SAndroid Build Coastguard Worker va_start(va, fmt);
1332*7c356e86SAndroid Build Coastguard Worker vwarningf(VWARNINGF_ERRORPREFIX | VWARNINGF_FILELINE, fmt, va);
1333*7c356e86SAndroid Build Coastguard Worker va_end(va);
1334*7c356e86SAndroid Build Coastguard Worker unwind(LERROR);
1335*7c356e86SAndroid Build Coastguard Worker }
1336*7c356e86SAndroid Build Coastguard Worker
1337*7c356e86SAndroid Build Coastguard Worker /* like errorf(), but no unwind is done */
1338*7c356e86SAndroid Build Coastguard Worker void
warningf(bool fileline,const char * fmt,...)1339*7c356e86SAndroid Build Coastguard Worker warningf(bool fileline, const char *fmt, ...)
1340*7c356e86SAndroid Build Coastguard Worker {
1341*7c356e86SAndroid Build Coastguard Worker va_list va;
1342*7c356e86SAndroid Build Coastguard Worker
1343*7c356e86SAndroid Build Coastguard Worker va_start(va, fmt);
1344*7c356e86SAndroid Build Coastguard Worker vwarningf(VWARNINGF_ERRORPREFIX | (fileline ? VWARNINGF_FILELINE : 0),
1345*7c356e86SAndroid Build Coastguard Worker fmt, va);
1346*7c356e86SAndroid Build Coastguard Worker va_end(va);
1347*7c356e86SAndroid Build Coastguard Worker }
1348*7c356e86SAndroid Build Coastguard Worker
1349*7c356e86SAndroid Build Coastguard Worker /*
1350*7c356e86SAndroid Build Coastguard Worker * Used by built-in utilities to prefix shell and utility name to message
1351*7c356e86SAndroid Build Coastguard Worker * (also unwinds environments for special builtins).
1352*7c356e86SAndroid Build Coastguard Worker */
1353*7c356e86SAndroid Build Coastguard Worker void
bi_errorf(const char * fmt,...)1354*7c356e86SAndroid Build Coastguard Worker bi_errorf(const char *fmt, ...)
1355*7c356e86SAndroid Build Coastguard Worker {
1356*7c356e86SAndroid Build Coastguard Worker va_list va;
1357*7c356e86SAndroid Build Coastguard Worker
1358*7c356e86SAndroid Build Coastguard Worker /* debugging: note that stdout not valid */
1359*7c356e86SAndroid Build Coastguard Worker shl_stdout_ok = false;
1360*7c356e86SAndroid Build Coastguard Worker
1361*7c356e86SAndroid Build Coastguard Worker exstat = 1;
1362*7c356e86SAndroid Build Coastguard Worker
1363*7c356e86SAndroid Build Coastguard Worker va_start(va, fmt);
1364*7c356e86SAndroid Build Coastguard Worker vwarningf(VWARNINGF_ERRORPREFIX | VWARNINGF_FILELINE |
1365*7c356e86SAndroid Build Coastguard Worker VWARNINGF_BUILTIN, fmt, va);
1366*7c356e86SAndroid Build Coastguard Worker va_end(va);
1367*7c356e86SAndroid Build Coastguard Worker
1368*7c356e86SAndroid Build Coastguard Worker /* POSIX special builtins cause non-interactive shells to exit */
1369*7c356e86SAndroid Build Coastguard Worker if (builtin_spec) {
1370*7c356e86SAndroid Build Coastguard Worker builtin_argv0 = NULL;
1371*7c356e86SAndroid Build Coastguard Worker /* may not want to use LERROR here */
1372*7c356e86SAndroid Build Coastguard Worker unwind(LERROR);
1373*7c356e86SAndroid Build Coastguard Worker }
1374*7c356e86SAndroid Build Coastguard Worker }
1375*7c356e86SAndroid Build Coastguard Worker
1376*7c356e86SAndroid Build Coastguard Worker /*
1377*7c356e86SAndroid Build Coastguard Worker * Used by functions called by builtins and not:
1378*7c356e86SAndroid Build Coastguard Worker * identical to errorfx if first argument is nil,
1379*7c356e86SAndroid Build Coastguard Worker * like bi_errorf storing the errorlevel into it otherwise
1380*7c356e86SAndroid Build Coastguard Worker */
1381*7c356e86SAndroid Build Coastguard Worker void
maybe_errorf(int * ep,int rc,const char * fmt,...)1382*7c356e86SAndroid Build Coastguard Worker maybe_errorf(int *ep, int rc, const char *fmt, ...)
1383*7c356e86SAndroid Build Coastguard Worker {
1384*7c356e86SAndroid Build Coastguard Worker va_list va;
1385*7c356e86SAndroid Build Coastguard Worker
1386*7c356e86SAndroid Build Coastguard Worker /* debugging: note that stdout not valid */
1387*7c356e86SAndroid Build Coastguard Worker shl_stdout_ok = false;
1388*7c356e86SAndroid Build Coastguard Worker
1389*7c356e86SAndroid Build Coastguard Worker exstat = rc;
1390*7c356e86SAndroid Build Coastguard Worker
1391*7c356e86SAndroid Build Coastguard Worker va_start(va, fmt);
1392*7c356e86SAndroid Build Coastguard Worker vwarningf(VWARNINGF_ERRORPREFIX | VWARNINGF_FILELINE |
1393*7c356e86SAndroid Build Coastguard Worker (ep ? VWARNINGF_BUILTIN : 0), fmt, va);
1394*7c356e86SAndroid Build Coastguard Worker va_end(va);
1395*7c356e86SAndroid Build Coastguard Worker
1396*7c356e86SAndroid Build Coastguard Worker if (!ep)
1397*7c356e86SAndroid Build Coastguard Worker goto and_out;
1398*7c356e86SAndroid Build Coastguard Worker *ep = rc;
1399*7c356e86SAndroid Build Coastguard Worker
1400*7c356e86SAndroid Build Coastguard Worker /* POSIX special builtins cause non-interactive shells to exit */
1401*7c356e86SAndroid Build Coastguard Worker if (builtin_spec) {
1402*7c356e86SAndroid Build Coastguard Worker builtin_argv0 = NULL;
1403*7c356e86SAndroid Build Coastguard Worker /* may not want to use LERROR here */
1404*7c356e86SAndroid Build Coastguard Worker and_out:
1405*7c356e86SAndroid Build Coastguard Worker unwind(LERROR);
1406*7c356e86SAndroid Build Coastguard Worker }
1407*7c356e86SAndroid Build Coastguard Worker }
1408*7c356e86SAndroid Build Coastguard Worker
1409*7c356e86SAndroid Build Coastguard Worker /* Called when something that shouldn't happen does */
1410*7c356e86SAndroid Build Coastguard Worker void
internal_errorf(const char * fmt,...)1411*7c356e86SAndroid Build Coastguard Worker internal_errorf(const char *fmt, ...)
1412*7c356e86SAndroid Build Coastguard Worker {
1413*7c356e86SAndroid Build Coastguard Worker va_list va;
1414*7c356e86SAndroid Build Coastguard Worker
1415*7c356e86SAndroid Build Coastguard Worker va_start(va, fmt);
1416*7c356e86SAndroid Build Coastguard Worker vwarningf(VWARNINGF_INTERNAL, fmt, va);
1417*7c356e86SAndroid Build Coastguard Worker va_end(va);
1418*7c356e86SAndroid Build Coastguard Worker unwind(LERROR);
1419*7c356e86SAndroid Build Coastguard Worker }
1420*7c356e86SAndroid Build Coastguard Worker
1421*7c356e86SAndroid Build Coastguard Worker void
internal_warningf(const char * fmt,...)1422*7c356e86SAndroid Build Coastguard Worker internal_warningf(const char *fmt, ...)
1423*7c356e86SAndroid Build Coastguard Worker {
1424*7c356e86SAndroid Build Coastguard Worker va_list va;
1425*7c356e86SAndroid Build Coastguard Worker
1426*7c356e86SAndroid Build Coastguard Worker va_start(va, fmt);
1427*7c356e86SAndroid Build Coastguard Worker vwarningf(VWARNINGF_INTERNAL, fmt, va);
1428*7c356e86SAndroid Build Coastguard Worker va_end(va);
1429*7c356e86SAndroid Build Coastguard Worker }
1430*7c356e86SAndroid Build Coastguard Worker
1431*7c356e86SAndroid Build Coastguard Worker /* used by error reporting functions to print "ksh: .kshrc[25]: " */
1432*7c356e86SAndroid Build Coastguard Worker void
error_prefix(bool fileline)1433*7c356e86SAndroid Build Coastguard Worker error_prefix(bool fileline)
1434*7c356e86SAndroid Build Coastguard Worker {
1435*7c356e86SAndroid Build Coastguard Worker /* Avoid foo: foo[2]: ... */
1436*7c356e86SAndroid Build Coastguard Worker if (!fileline || !source || !source->file ||
1437*7c356e86SAndroid Build Coastguard Worker strcmp(source->file, kshname) != 0)
1438*7c356e86SAndroid Build Coastguard Worker shf_fprintf(shl_out, Tf_sD_, kshname +
1439*7c356e86SAndroid Build Coastguard Worker (*kshname == '-' ? 1 : 0));
1440*7c356e86SAndroid Build Coastguard Worker if (fileline && source && source->file != NULL) {
1441*7c356e86SAndroid Build Coastguard Worker shf_fprintf(shl_out, "%s[%lu]: ", source->file,
1442*7c356e86SAndroid Build Coastguard Worker (unsigned long)(source->errline ?
1443*7c356e86SAndroid Build Coastguard Worker source->errline : source->line));
1444*7c356e86SAndroid Build Coastguard Worker source->errline = 0;
1445*7c356e86SAndroid Build Coastguard Worker }
1446*7c356e86SAndroid Build Coastguard Worker }
1447*7c356e86SAndroid Build Coastguard Worker
1448*7c356e86SAndroid Build Coastguard Worker /* printf to shl_out (stderr) with flush */
1449*7c356e86SAndroid Build Coastguard Worker void
shellf(const char * fmt,...)1450*7c356e86SAndroid Build Coastguard Worker shellf(const char *fmt, ...)
1451*7c356e86SAndroid Build Coastguard Worker {
1452*7c356e86SAndroid Build Coastguard Worker va_list va;
1453*7c356e86SAndroid Build Coastguard Worker
1454*7c356e86SAndroid Build Coastguard Worker if (!initio_done)
1455*7c356e86SAndroid Build Coastguard Worker /* shl_out may not be set up yet... */
1456*7c356e86SAndroid Build Coastguard Worker return;
1457*7c356e86SAndroid Build Coastguard Worker va_start(va, fmt);
1458*7c356e86SAndroid Build Coastguard Worker shf_vfprintf(shl_out, fmt, va);
1459*7c356e86SAndroid Build Coastguard Worker va_end(va);
1460*7c356e86SAndroid Build Coastguard Worker shf_flush(shl_out);
1461*7c356e86SAndroid Build Coastguard Worker }
1462*7c356e86SAndroid Build Coastguard Worker
1463*7c356e86SAndroid Build Coastguard Worker /* printf to shl_stdout (stdout) */
1464*7c356e86SAndroid Build Coastguard Worker void
shprintf(const char * fmt,...)1465*7c356e86SAndroid Build Coastguard Worker shprintf(const char *fmt, ...)
1466*7c356e86SAndroid Build Coastguard Worker {
1467*7c356e86SAndroid Build Coastguard Worker va_list va;
1468*7c356e86SAndroid Build Coastguard Worker
1469*7c356e86SAndroid Build Coastguard Worker if (!shl_stdout_ok)
1470*7c356e86SAndroid Build Coastguard Worker internal_errorf("shl_stdout not valid");
1471*7c356e86SAndroid Build Coastguard Worker va_start(va, fmt);
1472*7c356e86SAndroid Build Coastguard Worker shf_vfprintf(shl_stdout, fmt, va);
1473*7c356e86SAndroid Build Coastguard Worker va_end(va);
1474*7c356e86SAndroid Build Coastguard Worker }
1475*7c356e86SAndroid Build Coastguard Worker
1476*7c356e86SAndroid Build Coastguard Worker /* test if we can seek backwards fd (returns 0 or SHF_UNBUF) */
1477*7c356e86SAndroid Build Coastguard Worker int
can_seek(int fd)1478*7c356e86SAndroid Build Coastguard Worker can_seek(int fd)
1479*7c356e86SAndroid Build Coastguard Worker {
1480*7c356e86SAndroid Build Coastguard Worker struct stat statb;
1481*7c356e86SAndroid Build Coastguard Worker
1482*7c356e86SAndroid Build Coastguard Worker return (fstat(fd, &statb) == 0 && !S_ISREG(statb.st_mode) ?
1483*7c356e86SAndroid Build Coastguard Worker SHF_UNBUF : 0);
1484*7c356e86SAndroid Build Coastguard Worker }
1485*7c356e86SAndroid Build Coastguard Worker
1486*7c356e86SAndroid Build Coastguard Worker #ifdef DF
1487*7c356e86SAndroid Build Coastguard Worker int shl_dbg_fd;
1488*7c356e86SAndroid Build Coastguard Worker #define NSHF_IOB 4
1489*7c356e86SAndroid Build Coastguard Worker #else
1490*7c356e86SAndroid Build Coastguard Worker #define NSHF_IOB 3
1491*7c356e86SAndroid Build Coastguard Worker #endif
1492*7c356e86SAndroid Build Coastguard Worker struct shf shf_iob[NSHF_IOB];
1493*7c356e86SAndroid Build Coastguard Worker
1494*7c356e86SAndroid Build Coastguard Worker void
initio(void)1495*7c356e86SAndroid Build Coastguard Worker initio(void)
1496*7c356e86SAndroid Build Coastguard Worker {
1497*7c356e86SAndroid Build Coastguard Worker #ifdef DF
1498*7c356e86SAndroid Build Coastguard Worker const char *lfp;
1499*7c356e86SAndroid Build Coastguard Worker #endif
1500*7c356e86SAndroid Build Coastguard Worker
1501*7c356e86SAndroid Build Coastguard Worker /* force buffer allocation */
1502*7c356e86SAndroid Build Coastguard Worker shf_fdopen(1, SHF_WR, shl_stdout);
1503*7c356e86SAndroid Build Coastguard Worker shf_fdopen(2, SHF_WR, shl_out);
1504*7c356e86SAndroid Build Coastguard Worker shf_fdopen(2, SHF_WR, shl_xtrace);
1505*7c356e86SAndroid Build Coastguard Worker #ifdef DF
1506*7c356e86SAndroid Build Coastguard Worker if ((lfp = getenv("SDMKSH_PATH")) == NULL) {
1507*7c356e86SAndroid Build Coastguard Worker if ((lfp = getenv("HOME")) == NULL || !mksh_abspath(lfp))
1508*7c356e86SAndroid Build Coastguard Worker errorf("can't get home directory");
1509*7c356e86SAndroid Build Coastguard Worker strpathx(lfp, lfp, "mksh-dbg.txt", 1);
1510*7c356e86SAndroid Build Coastguard Worker }
1511*7c356e86SAndroid Build Coastguard Worker
1512*7c356e86SAndroid Build Coastguard Worker if ((shl_dbg_fd = open(lfp, O_WRONLY | O_APPEND | O_CREAT, 0600)) < 0)
1513*7c356e86SAndroid Build Coastguard Worker errorf("can't open debug output file %s", lfp);
1514*7c356e86SAndroid Build Coastguard Worker if (shl_dbg_fd < FDBASE) {
1515*7c356e86SAndroid Build Coastguard Worker int nfd;
1516*7c356e86SAndroid Build Coastguard Worker
1517*7c356e86SAndroid Build Coastguard Worker nfd = fcntl(shl_dbg_fd, F_DUPFD, FDBASE);
1518*7c356e86SAndroid Build Coastguard Worker close(shl_dbg_fd);
1519*7c356e86SAndroid Build Coastguard Worker if ((shl_dbg_fd = nfd) == -1)
1520*7c356e86SAndroid Build Coastguard Worker errorf("can't dup debug output file");
1521*7c356e86SAndroid Build Coastguard Worker }
1522*7c356e86SAndroid Build Coastguard Worker fcntl(shl_dbg_fd, F_SETFD, FD_CLOEXEC);
1523*7c356e86SAndroid Build Coastguard Worker shf_fdopen(shl_dbg_fd, SHF_WR, shl_dbg);
1524*7c356e86SAndroid Build Coastguard Worker DF("=== open ===");
1525*7c356e86SAndroid Build Coastguard Worker #endif
1526*7c356e86SAndroid Build Coastguard Worker initio_done = true;
1527*7c356e86SAndroid Build Coastguard Worker }
1528*7c356e86SAndroid Build Coastguard Worker
1529*7c356e86SAndroid Build Coastguard Worker /* A dup2() with error checking */
1530*7c356e86SAndroid Build Coastguard Worker int
ksh_dup2(int ofd,int nfd,bool errok)1531*7c356e86SAndroid Build Coastguard Worker ksh_dup2(int ofd, int nfd, bool errok)
1532*7c356e86SAndroid Build Coastguard Worker {
1533*7c356e86SAndroid Build Coastguard Worker int rv;
1534*7c356e86SAndroid Build Coastguard Worker
1535*7c356e86SAndroid Build Coastguard Worker if (((rv = dup2(ofd, nfd)) < 0) && !errok && (errno != EBADF))
1536*7c356e86SAndroid Build Coastguard Worker errorf(Ttoo_many_files);
1537*7c356e86SAndroid Build Coastguard Worker
1538*7c356e86SAndroid Build Coastguard Worker #ifdef __ultrix
1539*7c356e86SAndroid Build Coastguard Worker /*XXX imake style */
1540*7c356e86SAndroid Build Coastguard Worker if (rv >= 0)
1541*7c356e86SAndroid Build Coastguard Worker fcntl(nfd, F_SETFD, 0);
1542*7c356e86SAndroid Build Coastguard Worker #endif
1543*7c356e86SAndroid Build Coastguard Worker
1544*7c356e86SAndroid Build Coastguard Worker return (rv);
1545*7c356e86SAndroid Build Coastguard Worker }
1546*7c356e86SAndroid Build Coastguard Worker
1547*7c356e86SAndroid Build Coastguard Worker /*
1548*7c356e86SAndroid Build Coastguard Worker * Move fd from user space (0 <= fd < 10) to shell space (fd >= 10),
1549*7c356e86SAndroid Build Coastguard Worker * set close-on-exec flag. See FDBASE in sh.h, maybe 24 not 10 here.
1550*7c356e86SAndroid Build Coastguard Worker */
1551*7c356e86SAndroid Build Coastguard Worker short
savefd(int fd)1552*7c356e86SAndroid Build Coastguard Worker savefd(int fd)
1553*7c356e86SAndroid Build Coastguard Worker {
1554*7c356e86SAndroid Build Coastguard Worker int nfd = fd;
1555*7c356e86SAndroid Build Coastguard Worker
1556*7c356e86SAndroid Build Coastguard Worker if (fd < FDBASE && (nfd = fcntl(fd, F_DUPFD, FDBASE)) < 0 &&
1557*7c356e86SAndroid Build Coastguard Worker (errno == EBADF || errno == EPERM))
1558*7c356e86SAndroid Build Coastguard Worker return (-1);
1559*7c356e86SAndroid Build Coastguard Worker if (nfd < 0 || nfd > SHRT_MAX)
1560*7c356e86SAndroid Build Coastguard Worker errorf(Ttoo_many_files);
1561*7c356e86SAndroid Build Coastguard Worker fcntl(nfd, F_SETFD, FD_CLOEXEC);
1562*7c356e86SAndroid Build Coastguard Worker return ((short)nfd);
1563*7c356e86SAndroid Build Coastguard Worker }
1564*7c356e86SAndroid Build Coastguard Worker
1565*7c356e86SAndroid Build Coastguard Worker void
restfd(int fd,int ofd)1566*7c356e86SAndroid Build Coastguard Worker restfd(int fd, int ofd)
1567*7c356e86SAndroid Build Coastguard Worker {
1568*7c356e86SAndroid Build Coastguard Worker if (fd == 2)
1569*7c356e86SAndroid Build Coastguard Worker shf_flush(&shf_iob[/* fd */ 2]);
1570*7c356e86SAndroid Build Coastguard Worker if (ofd < 0)
1571*7c356e86SAndroid Build Coastguard Worker /* original fd closed */
1572*7c356e86SAndroid Build Coastguard Worker close(fd);
1573*7c356e86SAndroid Build Coastguard Worker else if (fd != ofd) {
1574*7c356e86SAndroid Build Coastguard Worker /*XXX: what to do if this dup fails? */
1575*7c356e86SAndroid Build Coastguard Worker ksh_dup2(ofd, fd, true);
1576*7c356e86SAndroid Build Coastguard Worker close(ofd);
1577*7c356e86SAndroid Build Coastguard Worker }
1578*7c356e86SAndroid Build Coastguard Worker }
1579*7c356e86SAndroid Build Coastguard Worker
1580*7c356e86SAndroid Build Coastguard Worker void
openpipe(int * pv)1581*7c356e86SAndroid Build Coastguard Worker openpipe(int *pv)
1582*7c356e86SAndroid Build Coastguard Worker {
1583*7c356e86SAndroid Build Coastguard Worker int lpv[2];
1584*7c356e86SAndroid Build Coastguard Worker
1585*7c356e86SAndroid Build Coastguard Worker if (pipe(lpv) < 0)
1586*7c356e86SAndroid Build Coastguard Worker errorf("can't create pipe - try again");
1587*7c356e86SAndroid Build Coastguard Worker pv[0] = savefd(lpv[0]);
1588*7c356e86SAndroid Build Coastguard Worker if (pv[0] != lpv[0])
1589*7c356e86SAndroid Build Coastguard Worker close(lpv[0]);
1590*7c356e86SAndroid Build Coastguard Worker pv[1] = savefd(lpv[1]);
1591*7c356e86SAndroid Build Coastguard Worker if (pv[1] != lpv[1])
1592*7c356e86SAndroid Build Coastguard Worker close(lpv[1]);
1593*7c356e86SAndroid Build Coastguard Worker #ifdef __OS2__
1594*7c356e86SAndroid Build Coastguard Worker setmode(pv[0], O_BINARY);
1595*7c356e86SAndroid Build Coastguard Worker setmode(pv[1], O_BINARY);
1596*7c356e86SAndroid Build Coastguard Worker #endif
1597*7c356e86SAndroid Build Coastguard Worker }
1598*7c356e86SAndroid Build Coastguard Worker
1599*7c356e86SAndroid Build Coastguard Worker void
closepipe(int * pv)1600*7c356e86SAndroid Build Coastguard Worker closepipe(int *pv)
1601*7c356e86SAndroid Build Coastguard Worker {
1602*7c356e86SAndroid Build Coastguard Worker close(pv[0]);
1603*7c356e86SAndroid Build Coastguard Worker close(pv[1]);
1604*7c356e86SAndroid Build Coastguard Worker }
1605*7c356e86SAndroid Build Coastguard Worker
1606*7c356e86SAndroid Build Coastguard Worker /*
1607*7c356e86SAndroid Build Coastguard Worker * Called by iosetup() (deals with 2>&4, etc.), c_read, c_print to turn
1608*7c356e86SAndroid Build Coastguard Worker * a string (the X in 2>&X, read -uX, print -uX) into a file descriptor.
1609*7c356e86SAndroid Build Coastguard Worker */
1610*7c356e86SAndroid Build Coastguard Worker int
check_fd(const char * name,int mode,const char ** emsgp)1611*7c356e86SAndroid Build Coastguard Worker check_fd(const char *name, int mode, const char **emsgp)
1612*7c356e86SAndroid Build Coastguard Worker {
1613*7c356e86SAndroid Build Coastguard Worker int fd, fl;
1614*7c356e86SAndroid Build Coastguard Worker
1615*7c356e86SAndroid Build Coastguard Worker if (!name[0] || name[1])
1616*7c356e86SAndroid Build Coastguard Worker goto illegal_fd_name;
1617*7c356e86SAndroid Build Coastguard Worker if (name[0] == 'p')
1618*7c356e86SAndroid Build Coastguard Worker return (coproc_getfd(mode, emsgp));
1619*7c356e86SAndroid Build Coastguard Worker if (!ctype(name[0], C_DIGIT)) {
1620*7c356e86SAndroid Build Coastguard Worker illegal_fd_name:
1621*7c356e86SAndroid Build Coastguard Worker if (emsgp)
1622*7c356e86SAndroid Build Coastguard Worker *emsgp = "illegal file descriptor name";
1623*7c356e86SAndroid Build Coastguard Worker return (-1);
1624*7c356e86SAndroid Build Coastguard Worker }
1625*7c356e86SAndroid Build Coastguard Worker
1626*7c356e86SAndroid Build Coastguard Worker if ((fl = fcntl((fd = ksh_numdig(name[0])), F_GETFL, 0)) < 0) {
1627*7c356e86SAndroid Build Coastguard Worker if (emsgp)
1628*7c356e86SAndroid Build Coastguard Worker *emsgp = "bad file descriptor";
1629*7c356e86SAndroid Build Coastguard Worker return (-1);
1630*7c356e86SAndroid Build Coastguard Worker }
1631*7c356e86SAndroid Build Coastguard Worker fl &= O_ACCMODE;
1632*7c356e86SAndroid Build Coastguard Worker /*
1633*7c356e86SAndroid Build Coastguard Worker * X_OK is a kludge to disable this check for dups (x<&1):
1634*7c356e86SAndroid Build Coastguard Worker * historical shells never did this check (XXX don't know what
1635*7c356e86SAndroid Build Coastguard Worker * POSIX has to say).
1636*7c356e86SAndroid Build Coastguard Worker */
1637*7c356e86SAndroid Build Coastguard Worker if (!(mode & X_OK) && fl != O_RDWR && (
1638*7c356e86SAndroid Build Coastguard Worker ((mode & R_OK) && fl != O_RDONLY) ||
1639*7c356e86SAndroid Build Coastguard Worker ((mode & W_OK) && fl != O_WRONLY))) {
1640*7c356e86SAndroid Build Coastguard Worker if (emsgp)
1641*7c356e86SAndroid Build Coastguard Worker *emsgp = (fl == O_WRONLY) ?
1642*7c356e86SAndroid Build Coastguard Worker "fd not open for reading" :
1643*7c356e86SAndroid Build Coastguard Worker "fd not open for writing";
1644*7c356e86SAndroid Build Coastguard Worker return (-1);
1645*7c356e86SAndroid Build Coastguard Worker }
1646*7c356e86SAndroid Build Coastguard Worker return (fd);
1647*7c356e86SAndroid Build Coastguard Worker }
1648*7c356e86SAndroid Build Coastguard Worker
1649*7c356e86SAndroid Build Coastguard Worker /* Called once from main */
1650*7c356e86SAndroid Build Coastguard Worker void
coproc_init(void)1651*7c356e86SAndroid Build Coastguard Worker coproc_init(void)
1652*7c356e86SAndroid Build Coastguard Worker {
1653*7c356e86SAndroid Build Coastguard Worker coproc.read = coproc.readw = coproc.write = -1;
1654*7c356e86SAndroid Build Coastguard Worker coproc.njobs = 0;
1655*7c356e86SAndroid Build Coastguard Worker coproc.id = 0;
1656*7c356e86SAndroid Build Coastguard Worker }
1657*7c356e86SAndroid Build Coastguard Worker
1658*7c356e86SAndroid Build Coastguard Worker /* Called by c_read() when eof is read - close fd if it is the co-process fd */
1659*7c356e86SAndroid Build Coastguard Worker void
coproc_read_close(int fd)1660*7c356e86SAndroid Build Coastguard Worker coproc_read_close(int fd)
1661*7c356e86SAndroid Build Coastguard Worker {
1662*7c356e86SAndroid Build Coastguard Worker if (coproc.read >= 0 && fd == coproc.read) {
1663*7c356e86SAndroid Build Coastguard Worker coproc_readw_close(fd);
1664*7c356e86SAndroid Build Coastguard Worker close(coproc.read);
1665*7c356e86SAndroid Build Coastguard Worker coproc.read = -1;
1666*7c356e86SAndroid Build Coastguard Worker }
1667*7c356e86SAndroid Build Coastguard Worker }
1668*7c356e86SAndroid Build Coastguard Worker
1669*7c356e86SAndroid Build Coastguard Worker /*
1670*7c356e86SAndroid Build Coastguard Worker * Called by c_read() and by iosetup() to close the other side of the
1671*7c356e86SAndroid Build Coastguard Worker * read pipe, so reads will actually terminate.
1672*7c356e86SAndroid Build Coastguard Worker */
1673*7c356e86SAndroid Build Coastguard Worker void
coproc_readw_close(int fd)1674*7c356e86SAndroid Build Coastguard Worker coproc_readw_close(int fd)
1675*7c356e86SAndroid Build Coastguard Worker {
1676*7c356e86SAndroid Build Coastguard Worker if (coproc.readw >= 0 && coproc.read >= 0 && fd == coproc.read) {
1677*7c356e86SAndroid Build Coastguard Worker close(coproc.readw);
1678*7c356e86SAndroid Build Coastguard Worker coproc.readw = -1;
1679*7c356e86SAndroid Build Coastguard Worker }
1680*7c356e86SAndroid Build Coastguard Worker }
1681*7c356e86SAndroid Build Coastguard Worker
1682*7c356e86SAndroid Build Coastguard Worker /*
1683*7c356e86SAndroid Build Coastguard Worker * Called by c_print when a write to a fd fails with EPIPE and by iosetup
1684*7c356e86SAndroid Build Coastguard Worker * when co-process input is dup'd
1685*7c356e86SAndroid Build Coastguard Worker */
1686*7c356e86SAndroid Build Coastguard Worker void
coproc_write_close(int fd)1687*7c356e86SAndroid Build Coastguard Worker coproc_write_close(int fd)
1688*7c356e86SAndroid Build Coastguard Worker {
1689*7c356e86SAndroid Build Coastguard Worker if (coproc.write >= 0 && fd == coproc.write) {
1690*7c356e86SAndroid Build Coastguard Worker close(coproc.write);
1691*7c356e86SAndroid Build Coastguard Worker coproc.write = -1;
1692*7c356e86SAndroid Build Coastguard Worker }
1693*7c356e86SAndroid Build Coastguard Worker }
1694*7c356e86SAndroid Build Coastguard Worker
1695*7c356e86SAndroid Build Coastguard Worker /*
1696*7c356e86SAndroid Build Coastguard Worker * Called to check for existence of/value of the co-process file descriptor.
1697*7c356e86SAndroid Build Coastguard Worker * (Used by check_fd() and by c_read/c_print to deal with -p option).
1698*7c356e86SAndroid Build Coastguard Worker */
1699*7c356e86SAndroid Build Coastguard Worker int
coproc_getfd(int mode,const char ** emsgp)1700*7c356e86SAndroid Build Coastguard Worker coproc_getfd(int mode, const char **emsgp)
1701*7c356e86SAndroid Build Coastguard Worker {
1702*7c356e86SAndroid Build Coastguard Worker int fd = (mode & R_OK) ? coproc.read : coproc.write;
1703*7c356e86SAndroid Build Coastguard Worker
1704*7c356e86SAndroid Build Coastguard Worker if (fd >= 0)
1705*7c356e86SAndroid Build Coastguard Worker return (fd);
1706*7c356e86SAndroid Build Coastguard Worker if (emsgp)
1707*7c356e86SAndroid Build Coastguard Worker *emsgp = "no coprocess";
1708*7c356e86SAndroid Build Coastguard Worker return (-1);
1709*7c356e86SAndroid Build Coastguard Worker }
1710*7c356e86SAndroid Build Coastguard Worker
1711*7c356e86SAndroid Build Coastguard Worker /*
1712*7c356e86SAndroid Build Coastguard Worker * called to close file descriptors related to the coprocess (if any)
1713*7c356e86SAndroid Build Coastguard Worker * Should be called with SIGCHLD blocked.
1714*7c356e86SAndroid Build Coastguard Worker */
1715*7c356e86SAndroid Build Coastguard Worker void
coproc_cleanup(int reuse)1716*7c356e86SAndroid Build Coastguard Worker coproc_cleanup(int reuse)
1717*7c356e86SAndroid Build Coastguard Worker {
1718*7c356e86SAndroid Build Coastguard Worker /* This to allow co-processes to share output pipe */
1719*7c356e86SAndroid Build Coastguard Worker if (!reuse || coproc.readw < 0 || coproc.read < 0) {
1720*7c356e86SAndroid Build Coastguard Worker if (coproc.read >= 0) {
1721*7c356e86SAndroid Build Coastguard Worker close(coproc.read);
1722*7c356e86SAndroid Build Coastguard Worker coproc.read = -1;
1723*7c356e86SAndroid Build Coastguard Worker }
1724*7c356e86SAndroid Build Coastguard Worker if (coproc.readw >= 0) {
1725*7c356e86SAndroid Build Coastguard Worker close(coproc.readw);
1726*7c356e86SAndroid Build Coastguard Worker coproc.readw = -1;
1727*7c356e86SAndroid Build Coastguard Worker }
1728*7c356e86SAndroid Build Coastguard Worker }
1729*7c356e86SAndroid Build Coastguard Worker if (coproc.write >= 0) {
1730*7c356e86SAndroid Build Coastguard Worker close(coproc.write);
1731*7c356e86SAndroid Build Coastguard Worker coproc.write = -1;
1732*7c356e86SAndroid Build Coastguard Worker }
1733*7c356e86SAndroid Build Coastguard Worker }
1734*7c356e86SAndroid Build Coastguard Worker
1735*7c356e86SAndroid Build Coastguard Worker struct temp *
maketemp(Area * ap,Temp_type type,struct temp ** tlist)1736*7c356e86SAndroid Build Coastguard Worker maketemp(Area *ap, Temp_type type, struct temp **tlist)
1737*7c356e86SAndroid Build Coastguard Worker {
1738*7c356e86SAndroid Build Coastguard Worker char *cp;
1739*7c356e86SAndroid Build Coastguard Worker size_t len;
1740*7c356e86SAndroid Build Coastguard Worker int i, j;
1741*7c356e86SAndroid Build Coastguard Worker struct temp *tp;
1742*7c356e86SAndroid Build Coastguard Worker const char *dir;
1743*7c356e86SAndroid Build Coastguard Worker struct stat sb;
1744*7c356e86SAndroid Build Coastguard Worker
1745*7c356e86SAndroid Build Coastguard Worker dir = tmpdir ? tmpdir : MKSH_DEFAULT_TMPDIR;
1746*7c356e86SAndroid Build Coastguard Worker /* add "/shXXXXXX.tmp" plus NUL */
1747*7c356e86SAndroid Build Coastguard Worker len = strlen(dir);
1748*7c356e86SAndroid Build Coastguard Worker checkoktoadd(len, offsetof(struct temp, tffn[0]) + 14);
1749*7c356e86SAndroid Build Coastguard Worker tp = alloc(offsetof(struct temp, tffn[0]) + 14 + len, ap);
1750*7c356e86SAndroid Build Coastguard Worker
1751*7c356e86SAndroid Build Coastguard Worker tp->shf = NULL;
1752*7c356e86SAndroid Build Coastguard Worker tp->pid = procpid;
1753*7c356e86SAndroid Build Coastguard Worker tp->type = type;
1754*7c356e86SAndroid Build Coastguard Worker
1755*7c356e86SAndroid Build Coastguard Worker if (stat(dir, &sb) || !S_ISDIR(sb.st_mode)) {
1756*7c356e86SAndroid Build Coastguard Worker tp->tffn[0] = '\0';
1757*7c356e86SAndroid Build Coastguard Worker goto maketemp_out;
1758*7c356e86SAndroid Build Coastguard Worker }
1759*7c356e86SAndroid Build Coastguard Worker
1760*7c356e86SAndroid Build Coastguard Worker cp = (void *)tp;
1761*7c356e86SAndroid Build Coastguard Worker cp += offsetof(struct temp, tffn[0]);
1762*7c356e86SAndroid Build Coastguard Worker memcpy(cp, dir, len);
1763*7c356e86SAndroid Build Coastguard Worker cp += len;
1764*7c356e86SAndroid Build Coastguard Worker memcpy(cp, "/shXXXXXX.tmp", 14);
1765*7c356e86SAndroid Build Coastguard Worker /* point to the first of six Xes */
1766*7c356e86SAndroid Build Coastguard Worker cp += 3;
1767*7c356e86SAndroid Build Coastguard Worker
1768*7c356e86SAndroid Build Coastguard Worker /* cyclically attempt to open a temporary file */
1769*7c356e86SAndroid Build Coastguard Worker do {
1770*7c356e86SAndroid Build Coastguard Worker /* generate random part of filename */
1771*7c356e86SAndroid Build Coastguard Worker len = 0;
1772*7c356e86SAndroid Build Coastguard Worker do {
1773*7c356e86SAndroid Build Coastguard Worker cp[len++] = digits_lc[rndget() % 36];
1774*7c356e86SAndroid Build Coastguard Worker } while (len < 6);
1775*7c356e86SAndroid Build Coastguard Worker
1776*7c356e86SAndroid Build Coastguard Worker /* check if this one works */
1777*7c356e86SAndroid Build Coastguard Worker if ((i = binopen3(tp->tffn, O_CREAT | O_EXCL | O_RDWR,
1778*7c356e86SAndroid Build Coastguard Worker 0600)) < 0 && errno != EEXIST)
1779*7c356e86SAndroid Build Coastguard Worker goto maketemp_out;
1780*7c356e86SAndroid Build Coastguard Worker } while (i < 0);
1781*7c356e86SAndroid Build Coastguard Worker
1782*7c356e86SAndroid Build Coastguard Worker if (type == TT_FUNSUB) {
1783*7c356e86SAndroid Build Coastguard Worker /* map us high and mark as close-on-exec */
1784*7c356e86SAndroid Build Coastguard Worker if ((j = savefd(i)) != i) {
1785*7c356e86SAndroid Build Coastguard Worker close(i);
1786*7c356e86SAndroid Build Coastguard Worker i = j;
1787*7c356e86SAndroid Build Coastguard Worker }
1788*7c356e86SAndroid Build Coastguard Worker
1789*7c356e86SAndroid Build Coastguard Worker /* operation mode for the shf */
1790*7c356e86SAndroid Build Coastguard Worker j = SHF_RD;
1791*7c356e86SAndroid Build Coastguard Worker } else
1792*7c356e86SAndroid Build Coastguard Worker j = SHF_WR;
1793*7c356e86SAndroid Build Coastguard Worker
1794*7c356e86SAndroid Build Coastguard Worker /* shf_fdopen cannot fail, so no fd leak */
1795*7c356e86SAndroid Build Coastguard Worker tp->shf = shf_fdopen(i, j, NULL);
1796*7c356e86SAndroid Build Coastguard Worker
1797*7c356e86SAndroid Build Coastguard Worker maketemp_out:
1798*7c356e86SAndroid Build Coastguard Worker tp->next = *tlist;
1799*7c356e86SAndroid Build Coastguard Worker *tlist = tp;
1800*7c356e86SAndroid Build Coastguard Worker return (tp);
1801*7c356e86SAndroid Build Coastguard Worker }
1802*7c356e86SAndroid Build Coastguard Worker
1803*7c356e86SAndroid Build Coastguard Worker /*
1804*7c356e86SAndroid Build Coastguard Worker * We use a similar collision resolution algorithm as Python 2.5.4
1805*7c356e86SAndroid Build Coastguard Worker * but with a slightly tweaked implementation written from scratch.
1806*7c356e86SAndroid Build Coastguard Worker */
1807*7c356e86SAndroid Build Coastguard Worker
1808*7c356e86SAndroid Build Coastguard Worker #define INIT_TBLSHIFT 3 /* initial table shift (2^3 = 8) */
1809*7c356e86SAndroid Build Coastguard Worker #define PERTURB_SHIFT 5 /* see Python 2.5.4 Objects/dictobject.c */
1810*7c356e86SAndroid Build Coastguard Worker
1811*7c356e86SAndroid Build Coastguard Worker static void tgrow(struct table *);
1812*7c356e86SAndroid Build Coastguard Worker static int tnamecmp(const void *, const void *);
1813*7c356e86SAndroid Build Coastguard Worker
1814*7c356e86SAndroid Build Coastguard Worker static void
tgrow(struct table * tp)1815*7c356e86SAndroid Build Coastguard Worker tgrow(struct table *tp)
1816*7c356e86SAndroid Build Coastguard Worker {
1817*7c356e86SAndroid Build Coastguard Worker size_t i, j, osize, mask, perturb;
1818*7c356e86SAndroid Build Coastguard Worker struct tbl *tblp, **pp;
1819*7c356e86SAndroid Build Coastguard Worker struct tbl **ntblp, **otblp = tp->tbls;
1820*7c356e86SAndroid Build Coastguard Worker
1821*7c356e86SAndroid Build Coastguard Worker if (tp->tshift > 29)
1822*7c356e86SAndroid Build Coastguard Worker internal_errorf("hash table size limit reached");
1823*7c356e86SAndroid Build Coastguard Worker
1824*7c356e86SAndroid Build Coastguard Worker /* calculate old size, new shift and new size */
1825*7c356e86SAndroid Build Coastguard Worker osize = (size_t)1 << (tp->tshift++);
1826*7c356e86SAndroid Build Coastguard Worker i = osize << 1;
1827*7c356e86SAndroid Build Coastguard Worker
1828*7c356e86SAndroid Build Coastguard Worker ntblp = alloc2(i, sizeof(struct tbl *), tp->areap);
1829*7c356e86SAndroid Build Coastguard Worker /* multiplication cannot overflow: alloc2 checked that */
1830*7c356e86SAndroid Build Coastguard Worker memset(ntblp, 0, i * sizeof(struct tbl *));
1831*7c356e86SAndroid Build Coastguard Worker
1832*7c356e86SAndroid Build Coastguard Worker /* table can get very full when reaching its size limit */
1833*7c356e86SAndroid Build Coastguard Worker tp->nfree = (tp->tshift == 30) ? 0x3FFF0000UL :
1834*7c356e86SAndroid Build Coastguard Worker /* but otherwise, only 75% */
1835*7c356e86SAndroid Build Coastguard Worker ((i * 3) / 4);
1836*7c356e86SAndroid Build Coastguard Worker tp->tbls = ntblp;
1837*7c356e86SAndroid Build Coastguard Worker if (otblp == NULL)
1838*7c356e86SAndroid Build Coastguard Worker return;
1839*7c356e86SAndroid Build Coastguard Worker
1840*7c356e86SAndroid Build Coastguard Worker mask = i - 1;
1841*7c356e86SAndroid Build Coastguard Worker for (i = 0; i < osize; i++)
1842*7c356e86SAndroid Build Coastguard Worker if ((tblp = otblp[i]) != NULL) {
1843*7c356e86SAndroid Build Coastguard Worker if ((tblp->flag & DEFINED)) {
1844*7c356e86SAndroid Build Coastguard Worker /* search for free hash table slot */
1845*7c356e86SAndroid Build Coastguard Worker j = perturb = tblp->ua.hval;
1846*7c356e86SAndroid Build Coastguard Worker goto find_first_empty_slot;
1847*7c356e86SAndroid Build Coastguard Worker find_next_empty_slot:
1848*7c356e86SAndroid Build Coastguard Worker j = (j << 2) + j + perturb + 1;
1849*7c356e86SAndroid Build Coastguard Worker perturb >>= PERTURB_SHIFT;
1850*7c356e86SAndroid Build Coastguard Worker find_first_empty_slot:
1851*7c356e86SAndroid Build Coastguard Worker pp = &ntblp[j & mask];
1852*7c356e86SAndroid Build Coastguard Worker if (*pp != NULL)
1853*7c356e86SAndroid Build Coastguard Worker goto find_next_empty_slot;
1854*7c356e86SAndroid Build Coastguard Worker /* found an empty hash table slot */
1855*7c356e86SAndroid Build Coastguard Worker *pp = tblp;
1856*7c356e86SAndroid Build Coastguard Worker tp->nfree--;
1857*7c356e86SAndroid Build Coastguard Worker } else if (!(tblp->flag & FINUSE)) {
1858*7c356e86SAndroid Build Coastguard Worker afree(tblp, tp->areap);
1859*7c356e86SAndroid Build Coastguard Worker }
1860*7c356e86SAndroid Build Coastguard Worker }
1861*7c356e86SAndroid Build Coastguard Worker afree(otblp, tp->areap);
1862*7c356e86SAndroid Build Coastguard Worker }
1863*7c356e86SAndroid Build Coastguard Worker
1864*7c356e86SAndroid Build Coastguard Worker void
ktinit(Area * ap,struct table * tp,uint8_t initshift)1865*7c356e86SAndroid Build Coastguard Worker ktinit(Area *ap, struct table *tp, uint8_t initshift)
1866*7c356e86SAndroid Build Coastguard Worker {
1867*7c356e86SAndroid Build Coastguard Worker tp->areap = ap;
1868*7c356e86SAndroid Build Coastguard Worker tp->tbls = NULL;
1869*7c356e86SAndroid Build Coastguard Worker tp->tshift = ((initshift > INIT_TBLSHIFT) ?
1870*7c356e86SAndroid Build Coastguard Worker initshift : INIT_TBLSHIFT) - 1;
1871*7c356e86SAndroid Build Coastguard Worker tgrow(tp);
1872*7c356e86SAndroid Build Coastguard Worker }
1873*7c356e86SAndroid Build Coastguard Worker
1874*7c356e86SAndroid Build Coastguard Worker /* table, name (key) to search for, hash(name), rv pointer to tbl ptr */
1875*7c356e86SAndroid Build Coastguard Worker struct tbl *
ktscan(struct table * tp,const char * name,uint32_t h,struct tbl *** ppp)1876*7c356e86SAndroid Build Coastguard Worker ktscan(struct table *tp, const char *name, uint32_t h, struct tbl ***ppp)
1877*7c356e86SAndroid Build Coastguard Worker {
1878*7c356e86SAndroid Build Coastguard Worker size_t j, perturb, mask;
1879*7c356e86SAndroid Build Coastguard Worker struct tbl **pp, *p;
1880*7c356e86SAndroid Build Coastguard Worker
1881*7c356e86SAndroid Build Coastguard Worker mask = ((size_t)1 << (tp->tshift)) - 1;
1882*7c356e86SAndroid Build Coastguard Worker /* search for hash table slot matching name */
1883*7c356e86SAndroid Build Coastguard Worker j = perturb = h;
1884*7c356e86SAndroid Build Coastguard Worker goto find_first_slot;
1885*7c356e86SAndroid Build Coastguard Worker find_next_slot:
1886*7c356e86SAndroid Build Coastguard Worker j = (j << 2) + j + perturb + 1;
1887*7c356e86SAndroid Build Coastguard Worker perturb >>= PERTURB_SHIFT;
1888*7c356e86SAndroid Build Coastguard Worker find_first_slot:
1889*7c356e86SAndroid Build Coastguard Worker pp = &tp->tbls[j & mask];
1890*7c356e86SAndroid Build Coastguard Worker if ((p = *pp) != NULL && (p->ua.hval != h || !(p->flag & DEFINED) ||
1891*7c356e86SAndroid Build Coastguard Worker strcmp(p->name, name)))
1892*7c356e86SAndroid Build Coastguard Worker goto find_next_slot;
1893*7c356e86SAndroid Build Coastguard Worker /* p == NULL if not found, correct found entry otherwise */
1894*7c356e86SAndroid Build Coastguard Worker if (ppp)
1895*7c356e86SAndroid Build Coastguard Worker *ppp = pp;
1896*7c356e86SAndroid Build Coastguard Worker return (p);
1897*7c356e86SAndroid Build Coastguard Worker }
1898*7c356e86SAndroid Build Coastguard Worker
1899*7c356e86SAndroid Build Coastguard Worker /* table, name (key) to enter, hash(n) */
1900*7c356e86SAndroid Build Coastguard Worker struct tbl *
ktenter(struct table * tp,const char * n,uint32_t h)1901*7c356e86SAndroid Build Coastguard Worker ktenter(struct table *tp, const char *n, uint32_t h)
1902*7c356e86SAndroid Build Coastguard Worker {
1903*7c356e86SAndroid Build Coastguard Worker struct tbl **pp, *p;
1904*7c356e86SAndroid Build Coastguard Worker size_t len;
1905*7c356e86SAndroid Build Coastguard Worker
1906*7c356e86SAndroid Build Coastguard Worker Search:
1907*7c356e86SAndroid Build Coastguard Worker if ((p = ktscan(tp, n, h, &pp)))
1908*7c356e86SAndroid Build Coastguard Worker return (p);
1909*7c356e86SAndroid Build Coastguard Worker
1910*7c356e86SAndroid Build Coastguard Worker if (tp->nfree == 0) {
1911*7c356e86SAndroid Build Coastguard Worker /* too full */
1912*7c356e86SAndroid Build Coastguard Worker tgrow(tp);
1913*7c356e86SAndroid Build Coastguard Worker goto Search;
1914*7c356e86SAndroid Build Coastguard Worker }
1915*7c356e86SAndroid Build Coastguard Worker
1916*7c356e86SAndroid Build Coastguard Worker /* create new tbl entry */
1917*7c356e86SAndroid Build Coastguard Worker len = strlen(n);
1918*7c356e86SAndroid Build Coastguard Worker checkoktoadd(len, offsetof(struct tbl, name[0]) + 1);
1919*7c356e86SAndroid Build Coastguard Worker p = alloc(offsetof(struct tbl, name[0]) + ++len, tp->areap);
1920*7c356e86SAndroid Build Coastguard Worker p->flag = 0;
1921*7c356e86SAndroid Build Coastguard Worker p->type = 0;
1922*7c356e86SAndroid Build Coastguard Worker p->areap = tp->areap;
1923*7c356e86SAndroid Build Coastguard Worker p->ua.hval = h;
1924*7c356e86SAndroid Build Coastguard Worker p->u2.field = 0;
1925*7c356e86SAndroid Build Coastguard Worker p->u.array = NULL;
1926*7c356e86SAndroid Build Coastguard Worker memcpy(p->name, n, len);
1927*7c356e86SAndroid Build Coastguard Worker
1928*7c356e86SAndroid Build Coastguard Worker /* enter in tp->tbls */
1929*7c356e86SAndroid Build Coastguard Worker tp->nfree--;
1930*7c356e86SAndroid Build Coastguard Worker *pp = p;
1931*7c356e86SAndroid Build Coastguard Worker return (p);
1932*7c356e86SAndroid Build Coastguard Worker }
1933*7c356e86SAndroid Build Coastguard Worker
1934*7c356e86SAndroid Build Coastguard Worker void
ktwalk(struct tstate * ts,struct table * tp)1935*7c356e86SAndroid Build Coastguard Worker ktwalk(struct tstate *ts, struct table *tp)
1936*7c356e86SAndroid Build Coastguard Worker {
1937*7c356e86SAndroid Build Coastguard Worker ts->left = (size_t)1 << (tp->tshift);
1938*7c356e86SAndroid Build Coastguard Worker ts->next = tp->tbls;
1939*7c356e86SAndroid Build Coastguard Worker }
1940*7c356e86SAndroid Build Coastguard Worker
1941*7c356e86SAndroid Build Coastguard Worker struct tbl *
ktnext(struct tstate * ts)1942*7c356e86SAndroid Build Coastguard Worker ktnext(struct tstate *ts)
1943*7c356e86SAndroid Build Coastguard Worker {
1944*7c356e86SAndroid Build Coastguard Worker while (--ts->left >= 0) {
1945*7c356e86SAndroid Build Coastguard Worker struct tbl *p = *ts->next++;
1946*7c356e86SAndroid Build Coastguard Worker if (p != NULL && (p->flag & DEFINED))
1947*7c356e86SAndroid Build Coastguard Worker return (p);
1948*7c356e86SAndroid Build Coastguard Worker }
1949*7c356e86SAndroid Build Coastguard Worker return (NULL);
1950*7c356e86SAndroid Build Coastguard Worker }
1951*7c356e86SAndroid Build Coastguard Worker
1952*7c356e86SAndroid Build Coastguard Worker static int
tnamecmp(const void * p1,const void * p2)1953*7c356e86SAndroid Build Coastguard Worker tnamecmp(const void *p1, const void *p2)
1954*7c356e86SAndroid Build Coastguard Worker {
1955*7c356e86SAndroid Build Coastguard Worker const struct tbl *a = *((const struct tbl * const *)p1);
1956*7c356e86SAndroid Build Coastguard Worker const struct tbl *b = *((const struct tbl * const *)p2);
1957*7c356e86SAndroid Build Coastguard Worker
1958*7c356e86SAndroid Build Coastguard Worker return (ascstrcmp(a->name, b->name));
1959*7c356e86SAndroid Build Coastguard Worker }
1960*7c356e86SAndroid Build Coastguard Worker
1961*7c356e86SAndroid Build Coastguard Worker struct tbl **
ktsort(struct table * tp)1962*7c356e86SAndroid Build Coastguard Worker ktsort(struct table *tp)
1963*7c356e86SAndroid Build Coastguard Worker {
1964*7c356e86SAndroid Build Coastguard Worker size_t i;
1965*7c356e86SAndroid Build Coastguard Worker struct tbl **p, **sp, **dp;
1966*7c356e86SAndroid Build Coastguard Worker
1967*7c356e86SAndroid Build Coastguard Worker /*
1968*7c356e86SAndroid Build Coastguard Worker * since the table is never entirely full, no need to reserve
1969*7c356e86SAndroid Build Coastguard Worker * additional space for the trailing NULL appended below
1970*7c356e86SAndroid Build Coastguard Worker */
1971*7c356e86SAndroid Build Coastguard Worker i = (size_t)1 << (tp->tshift);
1972*7c356e86SAndroid Build Coastguard Worker p = alloc2(i, sizeof(struct tbl *), ATEMP);
1973*7c356e86SAndroid Build Coastguard Worker sp = tp->tbls; /* source */
1974*7c356e86SAndroid Build Coastguard Worker dp = p; /* dest */
1975*7c356e86SAndroid Build Coastguard Worker while (i--)
1976*7c356e86SAndroid Build Coastguard Worker if ((*dp = *sp++) != NULL && (((*dp)->flag & DEFINED) ||
1977*7c356e86SAndroid Build Coastguard Worker ((*dp)->flag & ARRAY)))
1978*7c356e86SAndroid Build Coastguard Worker dp++;
1979*7c356e86SAndroid Build Coastguard Worker qsort(p, (i = dp - p), sizeof(struct tbl *), tnamecmp);
1980*7c356e86SAndroid Build Coastguard Worker p[i] = NULL;
1981*7c356e86SAndroid Build Coastguard Worker return (p);
1982*7c356e86SAndroid Build Coastguard Worker }
1983*7c356e86SAndroid Build Coastguard Worker
1984*7c356e86SAndroid Build Coastguard Worker #ifdef SIGWINCH
1985*7c356e86SAndroid Build Coastguard Worker static void
x_sigwinch(int sig MKSH_A_UNUSED)1986*7c356e86SAndroid Build Coastguard Worker x_sigwinch(int sig MKSH_A_UNUSED)
1987*7c356e86SAndroid Build Coastguard Worker {
1988*7c356e86SAndroid Build Coastguard Worker /* this runs inside interrupt context, with errno saved */
1989*7c356e86SAndroid Build Coastguard Worker
1990*7c356e86SAndroid Build Coastguard Worker got_winch = 1;
1991*7c356e86SAndroid Build Coastguard Worker }
1992*7c356e86SAndroid Build Coastguard Worker #endif
1993*7c356e86SAndroid Build Coastguard Worker
1994*7c356e86SAndroid Build Coastguard Worker #ifdef DF
1995*7c356e86SAndroid Build Coastguard Worker void
DF(const char * fmt,...)1996*7c356e86SAndroid Build Coastguard Worker DF(const char *fmt, ...)
1997*7c356e86SAndroid Build Coastguard Worker {
1998*7c356e86SAndroid Build Coastguard Worker va_list args;
1999*7c356e86SAndroid Build Coastguard Worker struct timeval tv;
2000*7c356e86SAndroid Build Coastguard Worker mirtime_mjd mjd;
2001*7c356e86SAndroid Build Coastguard Worker
2002*7c356e86SAndroid Build Coastguard Worker mksh_lockfd(shl_dbg_fd);
2003*7c356e86SAndroid Build Coastguard Worker mksh_TIME(tv);
2004*7c356e86SAndroid Build Coastguard Worker timet2mjd(&mjd, tv.tv_sec);
2005*7c356e86SAndroid Build Coastguard Worker shf_fprintf(shl_dbg, "[%02u:%02u:%02u (%u) %u.%06u] ",
2006*7c356e86SAndroid Build Coastguard Worker (unsigned)mjd.sec / 3600, ((unsigned)mjd.sec / 60) % 60,
2007*7c356e86SAndroid Build Coastguard Worker (unsigned)mjd.sec % 60, (unsigned)getpid(),
2008*7c356e86SAndroid Build Coastguard Worker (unsigned)tv.tv_sec, (unsigned)tv.tv_usec);
2009*7c356e86SAndroid Build Coastguard Worker va_start(args, fmt);
2010*7c356e86SAndroid Build Coastguard Worker shf_vfprintf(shl_dbg, fmt, args);
2011*7c356e86SAndroid Build Coastguard Worker va_end(args);
2012*7c356e86SAndroid Build Coastguard Worker shf_putc('\n', shl_dbg);
2013*7c356e86SAndroid Build Coastguard Worker shf_flush(shl_dbg);
2014*7c356e86SAndroid Build Coastguard Worker mksh_unlkfd(shl_dbg_fd);
2015*7c356e86SAndroid Build Coastguard Worker }
2016*7c356e86SAndroid Build Coastguard Worker #endif
2017*7c356e86SAndroid Build Coastguard Worker
2018*7c356e86SAndroid Build Coastguard Worker void
x_mkraw(int fd,mksh_ttyst * ocb,bool forread)2019*7c356e86SAndroid Build Coastguard Worker x_mkraw(int fd, mksh_ttyst *ocb, bool forread)
2020*7c356e86SAndroid Build Coastguard Worker {
2021*7c356e86SAndroid Build Coastguard Worker mksh_ttyst cb;
2022*7c356e86SAndroid Build Coastguard Worker
2023*7c356e86SAndroid Build Coastguard Worker if (ocb)
2024*7c356e86SAndroid Build Coastguard Worker mksh_tcget(fd, ocb);
2025*7c356e86SAndroid Build Coastguard Worker else
2026*7c356e86SAndroid Build Coastguard Worker ocb = &tty_state;
2027*7c356e86SAndroid Build Coastguard Worker
2028*7c356e86SAndroid Build Coastguard Worker cb = *ocb;
2029*7c356e86SAndroid Build Coastguard Worker if (forread) {
2030*7c356e86SAndroid Build Coastguard Worker cb.c_iflag &= ~(ISTRIP);
2031*7c356e86SAndroid Build Coastguard Worker cb.c_lflag &= ~(ICANON) | ECHO;
2032*7c356e86SAndroid Build Coastguard Worker } else {
2033*7c356e86SAndroid Build Coastguard Worker cb.c_iflag &= ~(INLCR | ICRNL | ISTRIP);
2034*7c356e86SAndroid Build Coastguard Worker cb.c_lflag &= ~(ISIG | ICANON | ECHO);
2035*7c356e86SAndroid Build Coastguard Worker }
2036*7c356e86SAndroid Build Coastguard Worker #if defined(VLNEXT) && defined(_POSIX_VDISABLE)
2037*7c356e86SAndroid Build Coastguard Worker /* OSF/1 processes lnext when ~icanon */
2038*7c356e86SAndroid Build Coastguard Worker cb.c_cc[VLNEXT] = _POSIX_VDISABLE;
2039*7c356e86SAndroid Build Coastguard Worker #endif
2040*7c356e86SAndroid Build Coastguard Worker /* SunOS 4.1.x and OSF/1 process discard(flush) when ~icanon */
2041*7c356e86SAndroid Build Coastguard Worker #if defined(VDISCARD) && defined(_POSIX_VDISABLE)
2042*7c356e86SAndroid Build Coastguard Worker cb.c_cc[VDISCARD] = _POSIX_VDISABLE;
2043*7c356e86SAndroid Build Coastguard Worker #endif
2044*7c356e86SAndroid Build Coastguard Worker cb.c_cc[VTIME] = 0;
2045*7c356e86SAndroid Build Coastguard Worker cb.c_cc[VMIN] = 1;
2046*7c356e86SAndroid Build Coastguard Worker
2047*7c356e86SAndroid Build Coastguard Worker mksh_tcset(fd, &cb);
2048*7c356e86SAndroid Build Coastguard Worker }
2049*7c356e86SAndroid Build Coastguard Worker
2050*7c356e86SAndroid Build Coastguard Worker #ifdef MKSH_ENVDIR
2051*7c356e86SAndroid Build Coastguard Worker static void
init_environ(void)2052*7c356e86SAndroid Build Coastguard Worker init_environ(void)
2053*7c356e86SAndroid Build Coastguard Worker {
2054*7c356e86SAndroid Build Coastguard Worker char *xp;
2055*7c356e86SAndroid Build Coastguard Worker ssize_t n;
2056*7c356e86SAndroid Build Coastguard Worker XString xs;
2057*7c356e86SAndroid Build Coastguard Worker struct shf *shf;
2058*7c356e86SAndroid Build Coastguard Worker DIR *dirp;
2059*7c356e86SAndroid Build Coastguard Worker struct dirent *dent;
2060*7c356e86SAndroid Build Coastguard Worker
2061*7c356e86SAndroid Build Coastguard Worker if ((dirp = opendir(MKSH_ENVDIR)) == NULL) {
2062*7c356e86SAndroid Build Coastguard Worker warningf(false, "cannot read environment from %s: %s",
2063*7c356e86SAndroid Build Coastguard Worker MKSH_ENVDIR, cstrerror(errno));
2064*7c356e86SAndroid Build Coastguard Worker return;
2065*7c356e86SAndroid Build Coastguard Worker }
2066*7c356e86SAndroid Build Coastguard Worker XinitN(xs, 256, ATEMP);
2067*7c356e86SAndroid Build Coastguard Worker read_envfile:
2068*7c356e86SAndroid Build Coastguard Worker errno = 0;
2069*7c356e86SAndroid Build Coastguard Worker if ((dent = readdir(dirp)) != NULL) {
2070*7c356e86SAndroid Build Coastguard Worker if (skip_varname(dent->d_name, true)[0] == '\0') {
2071*7c356e86SAndroid Build Coastguard Worker strpathx(xp, MKSH_ENVDIR, dent->d_name, 1);
2072*7c356e86SAndroid Build Coastguard Worker if (!(shf = shf_open(xp, O_RDONLY, 0, 0))) {
2073*7c356e86SAndroid Build Coastguard Worker warningf(false,
2074*7c356e86SAndroid Build Coastguard Worker "cannot read environment %s from %s: %s",
2075*7c356e86SAndroid Build Coastguard Worker dent->d_name, MKSH_ENVDIR,
2076*7c356e86SAndroid Build Coastguard Worker cstrerror(errno));
2077*7c356e86SAndroid Build Coastguard Worker goto read_envfile;
2078*7c356e86SAndroid Build Coastguard Worker }
2079*7c356e86SAndroid Build Coastguard Worker afree(xp, ATEMP);
2080*7c356e86SAndroid Build Coastguard Worker n = strlen(dent->d_name);
2081*7c356e86SAndroid Build Coastguard Worker xp = Xstring(xs, xp);
2082*7c356e86SAndroid Build Coastguard Worker XcheckN(xs, xp, n + 32);
2083*7c356e86SAndroid Build Coastguard Worker memcpy(xp, dent->d_name, n);
2084*7c356e86SAndroid Build Coastguard Worker xp += n;
2085*7c356e86SAndroid Build Coastguard Worker *xp++ = '=';
2086*7c356e86SAndroid Build Coastguard Worker while ((n = shf_read(xp, Xnleft(xs, xp), shf)) > 0) {
2087*7c356e86SAndroid Build Coastguard Worker xp += n;
2088*7c356e86SAndroid Build Coastguard Worker if (Xnleft(xs, xp) <= 0)
2089*7c356e86SAndroid Build Coastguard Worker XcheckN(xs, xp, Xlength(xs, xp));
2090*7c356e86SAndroid Build Coastguard Worker }
2091*7c356e86SAndroid Build Coastguard Worker if (n < 0) {
2092*7c356e86SAndroid Build Coastguard Worker warningf(false,
2093*7c356e86SAndroid Build Coastguard Worker "cannot read environment %s from %s: %s",
2094*7c356e86SAndroid Build Coastguard Worker dent->d_name, MKSH_ENVDIR,
2095*7c356e86SAndroid Build Coastguard Worker cstrerror(shf_errno(shf)));
2096*7c356e86SAndroid Build Coastguard Worker } else {
2097*7c356e86SAndroid Build Coastguard Worker *xp = '\0';
2098*7c356e86SAndroid Build Coastguard Worker xp = Xstring(xs, xp);
2099*7c356e86SAndroid Build Coastguard Worker rndpush(xp);
2100*7c356e86SAndroid Build Coastguard Worker typeset(xp, IMPORT | EXPORT, 0, 0, 0);
2101*7c356e86SAndroid Build Coastguard Worker }
2102*7c356e86SAndroid Build Coastguard Worker shf_close(shf);
2103*7c356e86SAndroid Build Coastguard Worker }
2104*7c356e86SAndroid Build Coastguard Worker goto read_envfile;
2105*7c356e86SAndroid Build Coastguard Worker } else if (errno)
2106*7c356e86SAndroid Build Coastguard Worker warningf(false, "cannot read environment from %s: %s",
2107*7c356e86SAndroid Build Coastguard Worker MKSH_ENVDIR, cstrerror(errno));
2108*7c356e86SAndroid Build Coastguard Worker closedir(dirp);
2109*7c356e86SAndroid Build Coastguard Worker Xfree(xs, xp);
2110*7c356e86SAndroid Build Coastguard Worker }
2111*7c356e86SAndroid Build Coastguard Worker #else
2112*7c356e86SAndroid Build Coastguard Worker extern char **environ;
2113*7c356e86SAndroid Build Coastguard Worker
2114*7c356e86SAndroid Build Coastguard Worker static void
init_environ(void)2115*7c356e86SAndroid Build Coastguard Worker init_environ(void)
2116*7c356e86SAndroid Build Coastguard Worker {
2117*7c356e86SAndroid Build Coastguard Worker const char **wp;
2118*7c356e86SAndroid Build Coastguard Worker
2119*7c356e86SAndroid Build Coastguard Worker if (environ == NULL)
2120*7c356e86SAndroid Build Coastguard Worker return;
2121*7c356e86SAndroid Build Coastguard Worker
2122*7c356e86SAndroid Build Coastguard Worker wp = (const char **)environ;
2123*7c356e86SAndroid Build Coastguard Worker while (*wp != NULL) {
2124*7c356e86SAndroid Build Coastguard Worker rndpush(*wp);
2125*7c356e86SAndroid Build Coastguard Worker typeset(*wp, IMPORT | EXPORT, 0, 0, 0);
2126*7c356e86SAndroid Build Coastguard Worker ++wp;
2127*7c356e86SAndroid Build Coastguard Worker }
2128*7c356e86SAndroid Build Coastguard Worker }
2129*7c356e86SAndroid Build Coastguard Worker #endif
2130*7c356e86SAndroid Build Coastguard Worker
2131*7c356e86SAndroid Build Coastguard Worker #ifdef MKSH_EARLY_LOCALE_TRACKING
2132*7c356e86SAndroid Build Coastguard Worker void
recheck_ctype(void)2133*7c356e86SAndroid Build Coastguard Worker recheck_ctype(void)
2134*7c356e86SAndroid Build Coastguard Worker {
2135*7c356e86SAndroid Build Coastguard Worker const char *ccp;
2136*7c356e86SAndroid Build Coastguard Worker uint8_t old_utfmode = UTFMODE;
2137*7c356e86SAndroid Build Coastguard Worker
2138*7c356e86SAndroid Build Coastguard Worker ccp = str_val(global("LC_ALL"));
2139*7c356e86SAndroid Build Coastguard Worker if (ccp == null)
2140*7c356e86SAndroid Build Coastguard Worker ccp = str_val(global("LC_CTYPE"));
2141*7c356e86SAndroid Build Coastguard Worker if (ccp == null)
2142*7c356e86SAndroid Build Coastguard Worker ccp = str_val(global("LANG"));
2143*7c356e86SAndroid Build Coastguard Worker UTFMODE = isuc(ccp);
2144*7c356e86SAndroid Build Coastguard Worker #if HAVE_SETLOCALE_CTYPE
2145*7c356e86SAndroid Build Coastguard Worker ccp = setlocale(LC_CTYPE, ccp);
2146*7c356e86SAndroid Build Coastguard Worker #if HAVE_LANGINFO_CODESET
2147*7c356e86SAndroid Build Coastguard Worker if (!isuc(ccp))
2148*7c356e86SAndroid Build Coastguard Worker ccp = nl_langinfo(CODESET);
2149*7c356e86SAndroid Build Coastguard Worker #endif
2150*7c356e86SAndroid Build Coastguard Worker if (isuc(ccp))
2151*7c356e86SAndroid Build Coastguard Worker UTFMODE = 1;
2152*7c356e86SAndroid Build Coastguard Worker #endif
2153*7c356e86SAndroid Build Coastguard Worker
2154*7c356e86SAndroid Build Coastguard Worker if (Flag(FPOSIX) && UTFMODE && !old_utfmode)
2155*7c356e86SAndroid Build Coastguard Worker warningf(true, "early locale tracking enabled UTF-8 mode while in POSIX mode, you are now noncompliant");
2156*7c356e86SAndroid Build Coastguard Worker }
2157*7c356e86SAndroid Build Coastguard Worker #endif
2158