blob: fca67dc179e786f40543768b076547c5240daa9b [file] [log] [blame]
Eric Andersen25f27032001-04-26 23:22:31 +00001/* vi: set sw=4 ts=4: */
2/*
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003 * A prototype Bourne shell grammar parser.
4 * Intended to follow the original Thompson and Ritchie
5 * "small and simple is beautiful" philosophy, which
6 * incidentally is a good match to today's BusyBox.
Eric Andersen25f27032001-04-26 23:22:31 +00007 *
Denis Vlasenkoce4acbb2009-04-10 23:23:41 +00008 * Copyright (C) 2000,2001 Larry Doolittle <larry@doolittle.boa.org>
Denis Vlasenkoc8d27332009-04-06 10:47:21 +00009 * Copyright (C) 2008,2009 Denys Vlasenko <vda.linux@googlemail.com>
Eric Andersen25f27032001-04-26 23:22:31 +000010 *
Denys Vlasenkobbecd742010-10-03 17:22:52 +020011 * Licensed under GPLv2 or later, see file LICENSE in this source tree.
12 *
Eric Andersen25f27032001-04-26 23:22:31 +000013 * Credits:
14 * The parser routines proper are all original material, first
Eric Andersencb81e642003-07-14 21:21:08 +000015 * written Dec 2000 and Jan 2001 by Larry Doolittle. The
16 * execution engine, the builtins, and much of the underlying
17 * support has been adapted from busybox-0.49pre's lash, which is
Eric Andersenc7bda1c2004-03-15 08:29:22 +000018 * Copyright (C) 1999-2004 by Erik Andersen <andersen@codepoet.org>
Eric Andersencb81e642003-07-14 21:21:08 +000019 * written by Erik Andersen <andersen@codepoet.org>. That, in turn,
20 * is based in part on ladsh.c, by Michael K. Johnson and Erik W.
21 * Troan, which they placed in the public domain. I don't know
22 * how much of the Johnson/Troan code has survived the repeated
23 * rewrites.
24 *
Eric Andersen25f27032001-04-26 23:22:31 +000025 * Other credits:
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +000026 * o_addchr derived from similar w_addchar function in glibc-2.2.
Denis Vlasenko50f3aa42009-04-07 10:52:40 +000027 * parse_redirect, redirect_opt_num, and big chunks of main
Denis Vlasenko424f79b2009-03-22 14:23:34 +000028 * and many builtins derived from contributions by Erik Andersen.
29 * Miscellaneous bugfixes from Matt Kraai.
Eric Andersen25f27032001-04-26 23:22:31 +000030 *
31 * There are two big (and related) architecture differences between
32 * this parser and the lash parser. One is that this version is
33 * actually designed from the ground up to understand nearly all
34 * of the Bourne grammar. The second, consequential change is that
35 * the parser and input reader have been turned inside out. Now,
36 * the parser is in control, and asks for input as needed. The old
37 * way had the input reader in control, and it asked for parsing to
38 * take place as needed. The new way makes it much easier to properly
39 * handle the recursion implicit in the various substitutions, especially
40 * across continuation lines.
41 *
Denys Vlasenko349ef962010-05-21 15:46:24 +020042 * TODOs:
43 * grep for "TODO" and fix (some of them are easy)
Denys Vlasenkoa6ad3972010-05-22 00:26:06 +020044 * make complex ${var%...} constructs support optional
45 * make here documents optional
Denys Vlasenko203fd7b2017-07-17 16:13:35 +020046 * special variables (done: PWD, PPID, RANDOM)
47 * follow IFS rules more precisely, including update semantics
48 * tilde expansion
49 * aliases
Denys Vlasenko57000292018-01-12 14:41:45 +010050 * "command" missing features:
51 * command -p CMD: run CMD using default $PATH
52 * (can use this to override standalone shell as well?)
Denys Vlasenko1e660422017-07-17 21:10:50 +020053 * command BLTIN: disables special-ness (e.g. errors do not abort)
Denys Vlasenko57000292018-01-12 14:41:45 +010054 * command -V CMD1 CMD2 CMD3 (multiple args) (not in standard)
55 * builtins mandated by standards we don't support:
56 * [un]alias, fc:
Denys Vlasenko203fd7b2017-07-17 16:13:35 +020057 * fc -l[nr] [BEG] [END]: list range of commands in history
58 * fc [-e EDITOR] [BEG] [END]: edit/rerun range of commands
59 * fc -s [PAT=REP] [CMD]: rerun CMD, replacing PAT with REP
Mike Frysinger25a6ca02009-03-28 13:59:26 +000060 *
Denys Vlasenkoadc0e202010-05-17 18:56:58 +020061 * Bash compat TODO:
62 * redirection of stdout+stderr: &> and >&
Denys Vlasenkoadc0e202010-05-17 18:56:58 +020063 * reserved words: function select
64 * advanced test: [[ ]]
Denys Vlasenkoadc0e202010-05-17 18:56:58 +020065 * process substitution: <(list) and >(list)
66 * =~: regex operator
Denys Vlasenko9ca656b2009-06-10 13:39:35 +020067 * let EXPR [EXPR...]
Denys Vlasenko349ef962010-05-21 15:46:24 +020068 * Each EXPR is an arithmetic expression (ARITHMETIC EVALUATION)
69 * If the last arg evaluates to 0, let returns 1; 0 otherwise.
70 * NB: let `echo 'a=a + 1'` - error (IOW: multi-word expansion is used)
Denys Vlasenko9ca656b2009-06-10 13:39:35 +020071 * ((EXPR))
Denys Vlasenko349ef962010-05-21 15:46:24 +020072 * The EXPR is evaluated according to ARITHMETIC EVALUATION.
73 * This is exactly equivalent to let "EXPR".
Denys Vlasenkoadc0e202010-05-17 18:56:58 +020074 * $[EXPR]: synonym for $((EXPR))
Denys Vlasenko203fd7b2017-07-17 16:13:35 +020075 * indirect expansion: ${!VAR}
76 * substring op on @: ${@:n:m}
Denys Vlasenkobbecd742010-10-03 17:22:52 +020077 *
78 * Won't do:
Denys Vlasenko203fd7b2017-07-17 16:13:35 +020079 * Some builtins mandated by standards:
80 * newgrp [GRP]: not a builtin in bash but a suid binary
81 * which spawns a new shell with new group ID
Denys Vlasenko3632cb12018-04-10 15:25:41 +020082 *
83 * Status of [[ support:
84 * [[ args ]] are CMD_SINGLEWORD_NOGLOB:
85 * v='a b'; [[ $v = 'a b' ]]; echo 0:$?
Denys Vlasenko89e9d552018-04-11 01:15:33 +020086 * [[ /bin/n* ]]; echo 0:$?
Denys Vlasenko3632cb12018-04-10 15:25:41 +020087 * TODO:
88 * &&/|| are AND/OR ops, -a/-o are not
89 * quoting needs to be considered (-f is an operator, "-f" and ""-f are not; etc)
90 * = is glob match operator, not equality operator: STR = GLOB
91 * (in GLOB, quoting is significant on char-by-char basis: a*cd"*")
92 * == same as =
93 * add =~ regex match operator: STR =~ REGEX
Eric Andersen25f27032001-04-26 23:22:31 +000094 */
Denys Vlasenko202a2d12010-07-16 12:36:14 +020095//config:config HUSH
Denys Vlasenko4eed2c62017-07-18 22:01:24 +020096//config: bool "hush (64 kb)"
Denys Vlasenko202a2d12010-07-16 12:36:14 +020097//config: default y
98//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +020099//config: hush is a small shell. It handles the normal flow control
100//config: constructs such as if/then/elif/else/fi, for/in/do/done, while loops,
101//config: case/esac. Redirections, here documents, $((arithmetic))
102//config: and functions are supported.
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200103//config:
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200104//config: It will compile and work on no-mmu systems.
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200105//config:
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200106//config: It does not handle select, aliases, tilde expansion,
107//config: &>file and >&file redirection of stdout+stderr.
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200108//config:
109//config:config HUSH_BASH_COMPAT
110//config: bool "bash-compatible extensions"
111//config: default y
Denys Vlasenko0b883582016-12-23 16:49:07 +0100112//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200113//config:
Denys Vlasenko9e800222010-10-03 14:28:04 +0200114//config:config HUSH_BRACE_EXPANSION
115//config: bool "Brace expansion"
116//config: default y
117//config: depends on HUSH_BASH_COMPAT
118//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200119//config: Enable {abc,def} extension.
Denys Vlasenko9e800222010-10-03 14:28:04 +0200120//config:
Denys Vlasenko5807e182018-02-08 19:19:04 +0100121//config:config HUSH_LINENO_VAR
122//config: bool "$LINENO variable"
123//config: default y
124//config: depends on HUSH_BASH_COMPAT
125//config:
Denys Vlasenko54c21112018-01-27 20:46:45 +0100126//config:config HUSH_BASH_SOURCE_CURDIR
127//config: bool "'source' and '.' builtins search current directory after $PATH"
128//config: default n # do not encourage non-standard behavior
129//config: depends on HUSH_BASH_COMPAT
130//config: help
131//config: This is not compliant with standards. Avoid if possible.
132//config:
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200133//config:config HUSH_INTERACTIVE
134//config: bool "Interactive mode"
135//config: default y
Denys Vlasenko0b883582016-12-23 16:49:07 +0100136//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200137//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200138//config: Enable interactive mode (prompt and command editing).
139//config: Without this, hush simply reads and executes commands
140//config: from stdin just like a shell script from a file.
141//config: No prompt, no PS1/PS2 magic shell variables.
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200142//config:
Denys Vlasenko99862cb2010-09-12 17:34:13 +0200143//config:config HUSH_SAVEHISTORY
144//config: bool "Save command history to .hush_history"
145//config: default y
146//config: depends on HUSH_INTERACTIVE && FEATURE_EDITING_SAVEHISTORY
Denys Vlasenko99862cb2010-09-12 17:34:13 +0200147//config:
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200148//config:config HUSH_JOB
149//config: bool "Job control"
150//config: default y
151//config: depends on HUSH_INTERACTIVE
152//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200153//config: Enable job control: Ctrl-Z backgrounds, Ctrl-C interrupts current
154//config: command (not entire shell), fg/bg builtins work. Without this option,
155//config: "cmd &" still works by simply spawning a process and immediately
156//config: prompting for next command (or executing next command in a script),
157//config: but no separate process group is formed.
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200158//config:
159//config:config HUSH_TICK
Denys Vlasenkof5604222017-01-10 14:58:54 +0100160//config: bool "Support process substitution"
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200161//config: default y
Denys Vlasenko0b883582016-12-23 16:49:07 +0100162//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200163//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200164//config: Enable `command` and $(command).
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200165//config:
166//config:config HUSH_IF
167//config: bool "Support if/then/elif/else/fi"
168//config: default y
Denys Vlasenko0b883582016-12-23 16:49:07 +0100169//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200170//config:
171//config:config HUSH_LOOPS
172//config: bool "Support for, while and until loops"
173//config: default y
Denys Vlasenko0b883582016-12-23 16:49:07 +0100174//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200175//config:
176//config:config HUSH_CASE
177//config: bool "Support case ... esac statement"
178//config: default y
Denys Vlasenko0b883582016-12-23 16:49:07 +0100179//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200180//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200181//config: Enable case ... esac statement. +400 bytes.
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200182//config:
183//config:config HUSH_FUNCTIONS
184//config: bool "Support funcname() { commands; } syntax"
185//config: default y
Denys Vlasenko0b883582016-12-23 16:49:07 +0100186//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200187//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200188//config: Enable support for shell functions. +800 bytes.
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200189//config:
190//config:config HUSH_LOCAL
Denys Vlasenko7a85c602017-01-08 17:40:18 +0100191//config: bool "local builtin"
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200192//config: default y
193//config: depends on HUSH_FUNCTIONS
194//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200195//config: Enable support for local variables in functions.
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200196//config:
197//config:config HUSH_RANDOM_SUPPORT
198//config: bool "Pseudorandom generator and $RANDOM variable"
199//config: default y
Denys Vlasenko0b883582016-12-23 16:49:07 +0100200//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200201//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200202//config: Enable pseudorandom generator and dynamic variable "$RANDOM".
203//config: Each read of "$RANDOM" will generate a new pseudorandom value.
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200204//config:
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200205//config:config HUSH_MODE_X
206//config: bool "Support 'hush -x' option and 'set -x' command"
207//config: default y
Denys Vlasenko0b883582016-12-23 16:49:07 +0100208//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200209//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200210//config: This instructs hush to print commands before execution.
211//config: Adds ~300 bytes.
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200212//config:
Denys Vlasenko1cc68042017-01-09 17:10:04 +0100213//config:config HUSH_ECHO
214//config: bool "echo builtin"
215//config: default y
216//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko1cc68042017-01-09 17:10:04 +0100217//config:
218//config:config HUSH_PRINTF
219//config: bool "printf builtin"
220//config: default y
221//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenkof5604222017-01-10 14:58:54 +0100222//config:
Denys Vlasenko265062d2017-01-10 15:13:30 +0100223//config:config HUSH_TEST
224//config: bool "test builtin"
225//config: default y
226//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
227//config:
Denys Vlasenkof5604222017-01-10 14:58:54 +0100228//config:config HUSH_HELP
229//config: bool "help builtin"
230//config: default y
231//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko1cc68042017-01-09 17:10:04 +0100232//config:
Denys Vlasenko6ec76d82017-01-08 18:40:41 +0100233//config:config HUSH_EXPORT
234//config: bool "export builtin"
235//config: default y
236//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko6ec76d82017-01-08 18:40:41 +0100237//config:
238//config:config HUSH_EXPORT_N
239//config: bool "Support 'export -n' option"
240//config: default y
241//config: depends on HUSH_EXPORT
242//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200243//config: export -n unexports variables. It is a bash extension.
Denys Vlasenko6ec76d82017-01-08 18:40:41 +0100244//config:
Denys Vlasenko1e660422017-07-17 21:10:50 +0200245//config:config HUSH_READONLY
246//config: bool "readonly builtin"
247//config: default y
Denys Vlasenko6b0695b2017-07-17 21:47:27 +0200248//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko1e660422017-07-17 21:10:50 +0200249//config: help
Denys Vlasenko72089cf2017-07-21 09:50:55 +0200250//config: Enable support for read-only variables.
Denys Vlasenko1e660422017-07-17 21:10:50 +0200251//config:
Denys Vlasenko7a85c602017-01-08 17:40:18 +0100252//config:config HUSH_KILL
Denys Vlasenkof5604222017-01-10 14:58:54 +0100253//config: bool "kill builtin (supports kill %jobspec)"
Denys Vlasenko7a85c602017-01-08 17:40:18 +0100254//config: default y
255//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko7a85c602017-01-08 17:40:18 +0100256//config:
257//config:config HUSH_WAIT
258//config: bool "wait builtin"
259//config: default y
260//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko7a85c602017-01-08 17:40:18 +0100261//config:
Denys Vlasenko3bb3e1d2018-01-11 18:05:05 +0100262//config:config HUSH_COMMAND
263//config: bool "command builtin"
264//config: default y
265//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
266//config:
Denys Vlasenko7a85c602017-01-08 17:40:18 +0100267//config:config HUSH_TRAP
268//config: bool "trap builtin"
269//config: default y
270//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko7a85c602017-01-08 17:40:18 +0100271//config:
272//config:config HUSH_TYPE
273//config: bool "type builtin"
274//config: default y
275//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko7a85c602017-01-08 17:40:18 +0100276//config:
Denys Vlasenko11f2e992017-08-10 16:34:03 +0200277//config:config HUSH_TIMES
278//config: bool "times builtin"
279//config: default y
280//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
281//config:
Denys Vlasenko7a85c602017-01-08 17:40:18 +0100282//config:config HUSH_READ
283//config: bool "read builtin"
284//config: default y
285//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko7a85c602017-01-08 17:40:18 +0100286//config:
Denys Vlasenko10d5ece2017-01-08 18:28:43 +0100287//config:config HUSH_SET
288//config: bool "set builtin"
289//config: default y
290//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko10d5ece2017-01-08 18:28:43 +0100291//config:
292//config:config HUSH_UNSET
293//config: bool "unset builtin"
294//config: default y
295//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenkof5604222017-01-10 14:58:54 +0100296//config:
297//config:config HUSH_ULIMIT
298//config: bool "ulimit builtin"
299//config: default y
300//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko10d5ece2017-01-08 18:28:43 +0100301//config:
Denys Vlasenkod5933b12017-01-08 18:31:39 +0100302//config:config HUSH_UMASK
303//config: bool "umask builtin"
304//config: default y
305//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenkod5933b12017-01-08 18:31:39 +0100306//config:
Denys Vlasenko74d40582017-08-11 01:32:46 +0200307//config:config HUSH_GETOPTS
308//config: bool "getopts builtin"
309//config: default y
310//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
311//config:
Denys Vlasenko44719692017-01-08 18:44:41 +0100312//config:config HUSH_MEMLEAK
313//config: bool "memleak builtin (debugging)"
314//config: default n
315//config: depends on HUSH || SH_IS_HUSH || BASH_IS_HUSH
Denys Vlasenko202a2d12010-07-16 12:36:14 +0200316
Denys Vlasenko20704f02011-03-23 17:59:27 +0100317//applet:IF_HUSH(APPLET(hush, BB_DIR_BIN, BB_SUID_DROP))
Denys Vlasenko205d48e2017-01-29 14:57:33 +0100318// APPLET_ODDNAME:name main location suid_type help
Denys Vlasenko205d48e2017-01-29 14:57:33 +0100319//applet:IF_SH_IS_HUSH( APPLET_ODDNAME(sh, hush, BB_DIR_BIN, BB_SUID_DROP, hush))
Denys Vlasenko0b883582016-12-23 16:49:07 +0100320//applet:IF_BASH_IS_HUSH(APPLET_ODDNAME(bash, hush, BB_DIR_BIN, BB_SUID_DROP, hush))
Denys Vlasenko20704f02011-03-23 17:59:27 +0100321
322//kbuild:lib-$(CONFIG_HUSH) += hush.o match.o shell_common.o
Denys Vlasenko0b883582016-12-23 16:49:07 +0100323//kbuild:lib-$(CONFIG_SH_IS_HUSH) += hush.o match.o shell_common.o
324//kbuild:lib-$(CONFIG_BASH_IS_HUSH) += hush.o match.o shell_common.o
Denys Vlasenko20704f02011-03-23 17:59:27 +0100325//kbuild:lib-$(CONFIG_HUSH_RANDOM_SUPPORT) += random.o
326
Denys Vlasenkof2ed39b2018-04-05 16:46:49 +0200327/* -i (interactive) is also accepted,
328 * but does nothing, therefore not shown in help.
Dan Fandrich89ca2f92010-11-28 01:54:39 +0100329 * NOMMU-specific options are not meant to be used by users,
330 * therefore we don't show them either.
331 */
332//usage:#define hush_trivial_usage
Denys Vlasenkof2ed39b2018-04-05 16:46:49 +0200333//usage: "[-enxl] [-c 'SCRIPT' [ARG0 [ARGS]] / FILE [ARGS] / -s [ARGS]]"
Denys Vlasenkob0b83432011-03-07 12:34:59 +0100334//usage:#define hush_full_usage "\n\n"
335//usage: "Unix shell interpreter"
336
Denys Vlasenko67047462016-12-22 15:21:58 +0100337#if !(defined(__FreeBSD__) || defined(__OpenBSD__) || defined(__NetBSD__) \
338 || defined(__APPLE__) \
339 )
340# include <malloc.h> /* for malloc_trim */
341#endif
342#include <glob.h>
343/* #include <dmalloc.h> */
344#if ENABLE_HUSH_CASE
345# include <fnmatch.h>
346#endif
Denys Vlasenko11f2e992017-08-10 16:34:03 +0200347#include <sys/times.h>
Denys Vlasenko67047462016-12-22 15:21:58 +0100348#include <sys/utsname.h> /* for setting $HOSTNAME */
349
350#include "busybox.h" /* for APPLET_IS_NOFORK/NOEXEC */
351#include "unicode.h"
352#include "shell_common.h"
353#include "math.h"
354#include "match.h"
355#if ENABLE_HUSH_RANDOM_SUPPORT
356# include "random.h"
357#else
358# define CLEAR_RANDOM_T(rnd) ((void)0)
359#endif
360#ifndef F_DUPFD_CLOEXEC
361# define F_DUPFD_CLOEXEC F_DUPFD
362#endif
363#ifndef PIPE_BUF
364# define PIPE_BUF 4096 /* amount of buffering in a pipe */
365#endif
366
Denis Vlasenko1943aec2009-04-09 14:15:57 +0000367
Kang-Che Sung027d3ab2017-01-11 14:18:15 +0100368/* So far, all bash compat is controlled by one config option */
369/* Separate defines document which part of code implements what */
370#define BASH_PATTERN_SUBST ENABLE_HUSH_BASH_COMPAT
371#define BASH_SUBSTR ENABLE_HUSH_BASH_COMPAT
Kang-Che Sung027d3ab2017-01-11 14:18:15 +0100372#define BASH_SOURCE ENABLE_HUSH_BASH_COMPAT
373#define BASH_HOSTNAME_VAR ENABLE_HUSH_BASH_COMPAT
Denys Vlasenko4ee824f2017-07-03 01:22:13 +0200374#define BASH_TEST2 (ENABLE_HUSH_BASH_COMPAT && ENABLE_HUSH_TEST)
Denys Vlasenko1f41c882017-08-09 13:52:36 +0200375#define BASH_READ_D ENABLE_HUSH_BASH_COMPAT
Kang-Che Sung027d3ab2017-01-11 14:18:15 +0100376
377
Denys Vlasenko8d7be232009-05-25 16:38:32 +0200378/* Build knobs */
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +0000379#define LEAK_HUNTING 0
380#define BUILD_AS_NOMMU 0
381/* Enable/disable sanity checks. Ok to enable in production,
382 * only adds a bit of bloat. Set to >1 to get non-production level verbosity.
383 * Keeping 1 for now even in released versions.
384 */
385#define HUSH_DEBUG 1
Denys Vlasenko8d7be232009-05-25 16:38:32 +0200386/* Slightly bigger (+200 bytes), but faster hush.
387 * So far it only enables a trick with counting SIGCHLDs and forks,
388 * which allows us to do fewer waitpid's.
389 * (we can detect a case where neither forks were done nor SIGCHLDs happened
390 * and therefore waitpid will return the same result as last time)
391 */
392#define ENABLE_HUSH_FAST 0
Denys Vlasenko9297dbc2010-07-05 21:37:12 +0200393/* TODO: implement simplified code for users which do not need ${var%...} ops
394 * So far ${var%...} ops are always enabled:
395 */
396#define ENABLE_HUSH_DOLLAR_OPS 1
Denis Vlasenko1943aec2009-04-09 14:15:57 +0000397
398
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +0000399#if BUILD_AS_NOMMU
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +0000400# undef BB_MMU
401# undef USE_FOR_NOMMU
402# undef USE_FOR_MMU
403# define BB_MMU 0
404# define USE_FOR_NOMMU(...) __VA_ARGS__
405# define USE_FOR_MMU(...)
406#endif
407
Denys Vlasenko1fcbff22010-06-26 02:40:08 +0200408#include "NUM_APPLETS.h"
Denys Vlasenko14974842010-03-23 01:08:26 +0100409#if NUM_APPLETS == 1
Denis Vlasenko61befda2008-11-25 01:36:03 +0000410/* STANDALONE does not make sense, and won't compile */
Denis Vlasenkoce4acbb2009-04-10 23:23:41 +0000411# undef CONFIG_FEATURE_SH_STANDALONE
412# undef ENABLE_FEATURE_SH_STANDALONE
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000413# undef IF_FEATURE_SH_STANDALONE
Denys Vlasenko14974842010-03-23 01:08:26 +0100414# undef IF_NOT_FEATURE_SH_STANDALONE
415# define ENABLE_FEATURE_SH_STANDALONE 0
Denis Vlasenko5e34ff22009-04-21 11:09:40 +0000416# define IF_FEATURE_SH_STANDALONE(...)
417# define IF_NOT_FEATURE_SH_STANDALONE(...) __VA_ARGS__
Denis Vlasenko61befda2008-11-25 01:36:03 +0000418#endif
419
Denis Vlasenko05743d72008-02-10 12:10:08 +0000420#if !ENABLE_HUSH_INTERACTIVE
Denis Vlasenkoce4acbb2009-04-10 23:23:41 +0000421# undef ENABLE_FEATURE_EDITING
422# define ENABLE_FEATURE_EDITING 0
423# undef ENABLE_FEATURE_EDITING_FANCY_PROMPT
424# define ENABLE_FEATURE_EDITING_FANCY_PROMPT 0
Denys Vlasenko8cab6672012-04-20 14:48:00 +0200425# undef ENABLE_FEATURE_EDITING_SAVE_ON_EXIT
426# define ENABLE_FEATURE_EDITING_SAVE_ON_EXIT 0
Denis Vlasenko8412d792007-10-01 09:59:47 +0000427#endif
428
Denis Vlasenko424f79b2009-03-22 14:23:34 +0000429/* Do we support ANY keywords? */
430#if ENABLE_HUSH_IF || ENABLE_HUSH_LOOPS || ENABLE_HUSH_CASE
Denis Vlasenkoce4acbb2009-04-10 23:23:41 +0000431# define HAS_KEYWORDS 1
432# define IF_HAS_KEYWORDS(...) __VA_ARGS__
433# define IF_HAS_NO_KEYWORDS(...)
Denis Vlasenko424f79b2009-03-22 14:23:34 +0000434#else
Denis Vlasenkoce4acbb2009-04-10 23:23:41 +0000435# define HAS_KEYWORDS 0
436# define IF_HAS_KEYWORDS(...)
437# define IF_HAS_NO_KEYWORDS(...) __VA_ARGS__
Denis Vlasenko424f79b2009-03-22 14:23:34 +0000438#endif
Denis Vlasenko8412d792007-10-01 09:59:47 +0000439
Denis Vlasenkod01ff132007-05-02 21:40:23 +0000440/* If you comment out one of these below, it will be #defined later
441 * to perform debug printfs to stderr: */
Denis Vlasenko03eb8bf2007-05-14 16:19:34 +0000442#define debug_printf(...) do {} while (0)
Denis Vlasenko400c5b62007-05-04 13:07:27 +0000443/* Finer-grained debug switches */
Denis Vlasenko03eb8bf2007-05-14 16:19:34 +0000444#define debug_printf_parse(...) do {} while (0)
445#define debug_print_tree(a, b) do {} while (0)
446#define debug_printf_exec(...) do {} while (0)
Denis Vlasenkof886fd22008-10-13 12:36:05 +0000447#define debug_printf_env(...) do {} while (0)
Denis Vlasenko03eb8bf2007-05-14 16:19:34 +0000448#define debug_printf_jobs(...) do {} while (0)
449#define debug_printf_expand(...) do {} while (0)
Denys Vlasenko1e811b12010-05-22 03:12:29 +0200450#define debug_printf_varexp(...) do {} while (0)
Denis Vlasenkob61e13d2008-06-17 05:11:43 +0000451#define debug_printf_glob(...) do {} while (0)
Denys Vlasenko2db74612017-07-07 22:07:28 +0200452#define debug_printf_redir(...) do {} while (0)
Denis Vlasenkob61e13d2008-06-17 05:11:43 +0000453#define debug_printf_list(...) do {} while (0)
Denis Vlasenko30c9cc52008-06-17 07:24:29 +0000454#define debug_printf_subst(...) do {} while (0)
Denys Vlasenko8d6eab32018-04-07 17:01:31 +0200455#define debug_printf_prompt(...) do {} while (0)
Denis Vlasenko03eb8bf2007-05-14 16:19:34 +0000456#define debug_printf_clean(...) do {} while (0)
Denis Vlasenkod01ff132007-05-02 21:40:23 +0000457
Denis Vlasenkob6e65562009-04-03 16:49:04 +0000458#define ERR_PTR ((void*)(long)1)
459
Denys Vlasenkod5b5c2f2017-01-08 15:46:04 +0100460#define JOB_STATUS_FORMAT "[%u] %-22s %.40s\n"
Denis Vlasenko5ec61322008-06-24 00:50:07 +0000461
Denys Vlasenkoe85248a2010-05-22 06:20:26 +0200462#define _SPECIAL_VARS_STR "_*@$!?#"
463#define SPECIAL_VARS_STR ("_*@$!?#" + 1)
464#define NUMERIC_SPECVARS_STR ("_*@$!?#" + 3)
Kang-Che Sung027d3ab2017-01-11 14:18:15 +0100465#if BASH_PATTERN_SUBST
Denys Vlasenko36f774a2010-09-05 14:45:38 +0200466/* Support / and // replace ops */
467/* Note that // is stored as \ in "encoded" string representation */
468# define VAR_ENCODED_SUBST_OPS "\\/%#:-=+?"
469# define VAR_SUBST_OPS ("\\/%#:-=+?" + 1)
470# define MINUS_PLUS_EQUAL_QUESTION ("\\/%#:-=+?" + 5)
471#else
472# define VAR_ENCODED_SUBST_OPS "%#:-=+?"
473# define VAR_SUBST_OPS "%#:-=+?"
474# define MINUS_PLUS_EQUAL_QUESTION ("%#:-=+?" + 3)
475#endif
Denys Vlasenkoe85248a2010-05-22 06:20:26 +0200476
Denys Vlasenko932b9972018-01-11 12:39:48 +0100477#define SPECIAL_VAR_SYMBOL_STR "\3"
Denys Vlasenko18e8b612018-07-20 14:24:56 +0200478#define SPECIAL_VAR_SYMBOL_CHR '\3'
Denys Vlasenko932b9972018-01-11 12:39:48 +0100479#define SPECIAL_VAR_SYMBOL 3
480/* The "variable" with name "\1" emits string "\3". Testcase: "echo ^C" */
481#define SPECIAL_VAR_QUOTED_SVS 1
Eric Andersen25f27032001-04-26 23:22:31 +0000482
Denys Vlasenkocb6ff252009-05-04 00:14:30 +0200483struct variable;
484
Denis Vlasenkocc90f442009-04-08 16:40:34 +0000485static const char hush_version_str[] ALIGN1 = "HUSH_VERSION="BB_VER;
486
487/* This supports saving pointers malloced in vfork child,
Denis Vlasenkoc376db32009-04-15 21:49:48 +0000488 * to be freed in the parent.
Denis Vlasenkocc90f442009-04-08 16:40:34 +0000489 */
490#if !BB_MMU
491typedef struct nommu_save_t {
Denys Vlasenkocb6ff252009-05-04 00:14:30 +0200492 struct variable *old_vars;
Denis Vlasenkocc90f442009-04-08 16:40:34 +0000493 char **argv;
Denis Vlasenko27014ed2009-04-15 21:48:23 +0000494 char **argv_from_re_execing;
Denis Vlasenkocc90f442009-04-08 16:40:34 +0000495} nommu_save_t;
496#endif
497
Denys Vlasenko9b782552010-09-08 13:33:26 +0200498enum {
Eric Andersen25f27032001-04-26 23:22:31 +0000499 RES_NONE = 0,
Denis Vlasenko06810332007-05-21 23:30:54 +0000500#if ENABLE_HUSH_IF
Denis Vlasenko17f02e72008-07-14 04:32:29 +0000501 RES_IF ,
502 RES_THEN ,
503 RES_ELIF ,
504 RES_ELSE ,
505 RES_FI ,
Denis Vlasenko06810332007-05-21 23:30:54 +0000506#endif
507#if ENABLE_HUSH_LOOPS
Denis Vlasenko17f02e72008-07-14 04:32:29 +0000508 RES_FOR ,
509 RES_WHILE ,
510 RES_UNTIL ,
511 RES_DO ,
512 RES_DONE ,
Denis Vlasenkod91afa32008-07-29 11:10:01 +0000513#endif
514#if ENABLE_HUSH_LOOPS || ENABLE_HUSH_CASE
Denis Vlasenko17f02e72008-07-14 04:32:29 +0000515 RES_IN ,
Denis Vlasenko06810332007-05-21 23:30:54 +0000516#endif
Denis Vlasenko17f02e72008-07-14 04:32:29 +0000517#if ENABLE_HUSH_CASE
518 RES_CASE ,
Denys Vlasenkoe9bda902009-05-23 16:50:07 +0200519 /* three pseudo-keywords support contrived "case" syntax: */
520 RES_CASE_IN, /* "case ... IN", turns into RES_MATCH when IN is observed */
521 RES_MATCH , /* "word)" */
522 RES_CASE_BODY, /* "this command is inside CASE" */
Denis Vlasenko17f02e72008-07-14 04:32:29 +0000523 RES_ESAC ,
524#endif
525 RES_XXXX ,
526 RES_SNTX
Denys Vlasenko9b782552010-09-08 13:33:26 +0200527};
Denis Vlasenkoc7985b72008-06-17 05:43:38 +0000528
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +0000529typedef struct o_string {
530 char *data;
531 int length; /* position where data is appended */
532 int maxlen;
Denys Vlasenko5b686cb2010-09-08 13:44:34 +0200533 int o_expflags;
Denis Vlasenko02d6f1a2009-04-07 19:56:55 +0000534 /* At least some part of the string was inside '' or "",
535 * possibly empty one: word"", wo''rd etc. */
Denys Vlasenko38292b62010-09-05 14:49:40 +0200536 smallint has_quoted_part;
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +0000537 smallint has_empty_slot;
Denys Vlasenko168579a2018-07-19 13:45:54 +0200538 smallint ended_in_ifs;
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +0000539} o_string;
540enum {
Denys Vlasenko0e13b402010-09-21 12:35:39 +0200541 EXP_FLAG_SINGLEWORD = 0x80, /* must be 0x80 */
542 EXP_FLAG_GLOB = 0x2,
543 /* Protect newly added chars against globbing
544 * by prepending \ to *, ?, [, \ */
545 EXP_FLAG_ESC_GLOB_CHARS = 0x1,
546};
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +0000547/* Used for initialization: o_string foo = NULL_O_STRING; */
548#define NULL_O_STRING { NULL }
549
Denys Vlasenko29f9b722011-05-14 11:27:36 +0200550#ifndef debug_printf_parse
551static const char *const assignment_flag[] = {
552 "MAYBE_ASSIGNMENT",
553 "DEFINITELY_ASSIGNMENT",
554 "NOT_ASSIGNMENT",
555 "WORD_IS_KEYWORD",
556};
557#endif
558
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +0000559typedef struct in_str {
560 const char *p;
Denys Vlasenkod17a91d2016-09-29 18:02:37 +0200561 int peek_buf[2];
Denys Vlasenkocecbc982011-03-30 18:54:52 +0200562 int last_char;
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +0000563 FILE *file;
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +0000564} in_str;
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +0000565
Denys Vlasenko764b2f02009-06-07 16:05:04 +0200566/* The descrip member of this structure is only used to make
567 * debugging output pretty */
568static const struct {
569 int mode;
570 signed char default_fd;
571 char descrip[3];
572} redir_table[] = {
573 { O_RDONLY, 0, "<" },
574 { O_CREAT|O_TRUNC|O_WRONLY, 1, ">" },
575 { O_CREAT|O_APPEND|O_WRONLY, 1, ">>" },
576 { O_CREAT|O_RDWR, 1, "<>" },
577 { O_RDONLY, 0, "<<" },
578/* Should not be needed. Bogus default_fd helps in debugging */
579/* { O_RDONLY, 77, "<<" }, */
580};
581
Eric Andersen25f27032001-04-26 23:22:31 +0000582struct redir_struct {
Denis Vlasenko55789c62008-06-18 16:30:42 +0000583 struct redir_struct *next;
Denis Vlasenko5ec61322008-06-24 00:50:07 +0000584 char *rd_filename; /* filename */
Denis Vlasenko02d6f1a2009-04-07 19:56:55 +0000585 int rd_fd; /* fd to redirect */
586 /* fd to redirect to, or -3 if rd_fd is to be closed (n>&-) */
587 int rd_dup;
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +0000588 smallint rd_type; /* (enum redir_type) */
589 /* note: for heredocs, rd_filename contains heredoc delimiter,
Denis Vlasenko02d6f1a2009-04-07 19:56:55 +0000590 * and subsequently heredoc itself; and rd_dup is a bitmask:
Denys Vlasenko764b2f02009-06-07 16:05:04 +0200591 * bit 0: do we need to trim leading tabs?
592 * bit 1: is heredoc quoted (<<'delim' syntax) ?
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +0000593 */
Eric Andersen25f27032001-04-26 23:22:31 +0000594};
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +0000595typedef enum redir_type {
Denys Vlasenko764b2f02009-06-07 16:05:04 +0200596 REDIRECT_INPUT = 0,
597 REDIRECT_OVERWRITE = 1,
598 REDIRECT_APPEND = 2,
599 REDIRECT_IO = 3,
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +0000600 REDIRECT_HEREDOC = 4,
Denys Vlasenko764b2f02009-06-07 16:05:04 +0200601 REDIRECT_HEREDOC2 = 5, /* REDIRECT_HEREDOC after heredoc is loaded */
Denis Vlasenkoc96865f2009-04-10 00:20:58 +0000602
603 REDIRFD_CLOSE = -3,
604 REDIRFD_SYNTAX_ERR = -2,
Denis Vlasenko835fcfd2009-04-10 13:51:56 +0000605 REDIRFD_TO_FILE = -1,
606 /* otherwise, rd_fd is redirected to rd_dup */
Denis Vlasenkoc96865f2009-04-10 00:20:58 +0000607
Denis Vlasenko02d6f1a2009-04-07 19:56:55 +0000608 HEREDOC_SKIPTABS = 1,
609 HEREDOC_QUOTED = 2,
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +0000610} redir_type;
611
Eric Andersen25f27032001-04-26 23:22:31 +0000612
Denis Vlasenko9af22c72008-10-09 12:54:58 +0000613struct command {
Denis Vlasenko0c886c62007-01-30 22:30:09 +0000614 pid_t pid; /* 0 if exited */
Denys Vlasenko21b7f1b2018-04-05 15:15:53 +0200615 unsigned assignment_cnt; /* how many argv[i] are assignments? */
Denys Vlasenko5807e182018-02-08 19:19:04 +0100616#if ENABLE_HUSH_LINENO_VAR
Denys Vlasenko6aad1dd2018-01-19 15:37:04 +0100617 unsigned lineno;
618#endif
Denys Vlasenko9d617c42009-06-09 18:40:52 +0200619 smallint cmd_type; /* CMD_xxx */
620#define CMD_NORMAL 0
621#define CMD_SUBSHELL 1
Denys Vlasenko11752d42018-04-03 08:20:58 +0200622#if BASH_TEST2 || ENABLE_HUSH_LOCAL || ENABLE_HUSH_EXPORT || ENABLE_HUSH_READONLY
623/* used for "[[ EXPR ]]", and to prevent word splitting and globbing in
624 * "export v=t*"
625 */
Denys Vlasenko9ca656b2009-06-10 13:39:35 +0200626# define CMD_SINGLEWORD_NOGLOB 2
Denis Vlasenkoed055212009-04-11 10:37:10 +0000627#endif
Denys Vlasenko9ca656b2009-06-10 13:39:35 +0200628#if ENABLE_HUSH_FUNCTIONS
629# define CMD_FUNCDEF 3
630#endif
631
Denys Vlasenko6696eac2010-11-14 02:01:50 +0100632 smalluint cmd_exitcode;
Denys Vlasenkocb6ff252009-05-04 00:14:30 +0200633 /* if non-NULL, this "command" is { list }, ( list ), or a compound statement */
634 struct pipe *group;
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +0000635#if !BB_MMU
636 char *group_as_string;
637#endif
Denis Vlasenkoed055212009-04-11 10:37:10 +0000638#if ENABLE_HUSH_FUNCTIONS
639 struct function *child_func;
640/* This field is used to prevent a bug here:
Denys Vlasenko9d617c42009-06-09 18:40:52 +0200641 * while...do f1() {a;}; f1; f1() {b;}; f1; done
Denis Vlasenkoed055212009-04-11 10:37:10 +0000642 * When we execute "f1() {a;}" cmd, we create new function and clear
643 * cmd->group, cmd->group_as_string, cmd->argv[0].
Denys Vlasenko9d617c42009-06-09 18:40:52 +0200644 * When we execute "f1() {b;}", we notice that f1 exists,
645 * and that its "parent cmd" struct is still "alive",
Denis Vlasenkoed055212009-04-11 10:37:10 +0000646 * we put those fields back into cmd->xxx
647 * (struct function has ->parent_cmd ptr to facilitate that).
648 * When we loop back, we can execute "f1() {a;}" again and set f1 correctly.
649 * Without this trick, loop would execute a;b;b;b;...
650 * instead of correct sequence a;b;a;b;...
651 * When command is freed, it severs the link
652 * (sets ->child_func->parent_cmd to NULL).
653 */
654#endif
Denis Vlasenko9af22c72008-10-09 12:54:58 +0000655 char **argv; /* command name and arguments */
Denis Vlasenko03eb8bf2007-05-14 16:19:34 +0000656/* argv vector may contain variable references (^Cvar^C, ^C0^C etc)
657 * and on execution these are substituted with their values.
658 * Substitution can make _several_ words out of one argv[n]!
659 * Example: argv[0]=='.^C*^C.' here: echo .$*.
Denis Vlasenkoc7985b72008-06-17 05:43:38 +0000660 * References of the form ^C`cmd arg^C are `cmd arg` substitutions.
Denis Vlasenko03eb8bf2007-05-14 16:19:34 +0000661 */
Denis Vlasenkoed055212009-04-11 10:37:10 +0000662 struct redir_struct *redirects; /* I/O redirections */
663};
Denis Vlasenkof8c1f022009-04-17 11:55:42 +0000664/* Is there anything in this command at all? */
665#define IS_NULL_CMD(cmd) \
666 (!(cmd)->group && !(cmd)->argv && !(cmd)->redirects)
667
Eric Andersen25f27032001-04-26 23:22:31 +0000668struct pipe {
Denis Vlasenkob81b3df2007-04-28 16:48:04 +0000669 struct pipe *next;
Denis Vlasenkob7d8c0d2009-04-10 19:05:43 +0000670 int num_cmds; /* total number of commands in pipe */
Denis Vlasenko9af22c72008-10-09 12:54:58 +0000671 int alive_cmds; /* number of commands running (not exited) */
672 int stopped_cmds; /* number of commands alive, but stopped */
Denis Vlasenkoe3f2f892007-04-28 16:48:27 +0000673#if ENABLE_HUSH_JOB
Denys Vlasenkod5b5c2f2017-01-08 15:46:04 +0100674 unsigned jobid; /* job number */
Denis Vlasenko0c886c62007-01-30 22:30:09 +0000675 pid_t pgrp; /* process group ID for the job */
Denis Vlasenko219e88d2007-05-21 10:18:23 +0000676 char *cmdtext; /* name of job */
Denis Vlasenkob81b3df2007-04-28 16:48:04 +0000677#endif
Denis Vlasenko9af22c72008-10-09 12:54:58 +0000678 struct command *cmds; /* array of commands in pipe */
Denis Vlasenko219e88d2007-05-21 10:18:23 +0000679 smallint followup; /* PIPE_BG, PIPE_SEQ, PIPE_OR, PIPE_AND */
Denis Vlasenko5ec61322008-06-24 00:50:07 +0000680 IF_HAS_KEYWORDS(smallint pi_inverted;) /* "! cmd | cmd" */
681 IF_HAS_KEYWORDS(smallint res_word;) /* needed for if, for, while, until... */
Eric Andersen25f27032001-04-26 23:22:31 +0000682};
Denis Vlasenkoa2b11e32009-04-06 14:11:13 +0000683typedef enum pipe_style {
Denys Vlasenko00a06b92016-11-08 20:35:53 +0100684 PIPE_SEQ = 0,
685 PIPE_AND = 1,
686 PIPE_OR = 2,
687 PIPE_BG = 3,
Denis Vlasenkoa2b11e32009-04-06 14:11:13 +0000688} pipe_style;
Denis Vlasenkof8c1f022009-04-17 11:55:42 +0000689/* Is there anything in this pipe at all? */
690#define IS_NULL_PIPE(pi) \
691 ((pi)->num_cmds == 0 IF_HAS_KEYWORDS( && (pi)->res_word == RES_NONE))
Eric Andersen25f27032001-04-26 23:22:31 +0000692
Denis Vlasenko9af22c72008-10-09 12:54:58 +0000693/* This holds pointers to the various results of parsing */
694struct parse_context {
Denis Vlasenkof9f74292009-04-03 00:07:05 +0000695 /* linked list of pipes */
Denis Vlasenko9af22c72008-10-09 12:54:58 +0000696 struct pipe *list_head;
Denis Vlasenkof9f74292009-04-03 00:07:05 +0000697 /* last pipe (being constructed right now) */
Denis Vlasenko9af22c72008-10-09 12:54:58 +0000698 struct pipe *pipe;
Denis Vlasenkof9f74292009-04-03 00:07:05 +0000699 /* last command in pipe (being constructed right now) */
700 struct command *command;
701 /* last redirect in command->redirects list */
Denis Vlasenko9af22c72008-10-09 12:54:58 +0000702 struct redir_struct *pending_redirect;
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +0200703 o_string word;
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +0000704#if !BB_MMU
705 o_string as_string;
706#endif
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +0200707 smallint is_assignment; /* 0:maybe, 1:yes, 2:no, 3:keyword */
Denis Vlasenko9af22c72008-10-09 12:54:58 +0000708#if HAS_KEYWORDS
709 smallint ctx_res_w;
710 smallint ctx_inverted; /* "! cmd | cmd" */
711#if ENABLE_HUSH_CASE
712 smallint ctx_dsemicolon; /* ";;" seen */
713#endif
Denis Vlasenkof9f74292009-04-03 00:07:05 +0000714 /* bitmask of FLAG_xxx, for figuring out valid reserved words */
715 int old_flag;
716 /* group we are enclosed in:
Denis Vlasenko34d4d892009-04-04 20:24:37 +0000717 * example: "if pipe1; pipe2; then pipe3; fi"
718 * when we see "if" or "then", we malloc and copy current context,
719 * and make ->stack point to it. then we parse pipeN.
720 * when closing "then" / fi" / whatever is found,
721 * we move list_head into ->stack->command->group,
722 * copy ->stack into current context, and delete ->stack.
723 * (parsing of { list } and ( list ) doesn't use this method)
Denis Vlasenkof9f74292009-04-03 00:07:05 +0000724 */
Denis Vlasenko9af22c72008-10-09 12:54:58 +0000725 struct parse_context *stack;
726#endif
727};
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +0200728enum {
729 MAYBE_ASSIGNMENT = 0,
730 DEFINITELY_ASSIGNMENT = 1,
731 NOT_ASSIGNMENT = 2,
732 /* Not an assignment, but next word may be: "if v=xyz cmd;" */
733 WORD_IS_KEYWORD = 3,
734};
Denis Vlasenko9af22c72008-10-09 12:54:58 +0000735
Denis Vlasenkod76c0492007-05-25 02:16:25 +0000736/* On program start, environ points to initial environment.
737 * putenv adds new pointers into it, unsetenv removes them.
738 * Neither of these (de)allocates the strings.
739 * setenv allocates new strings in malloc space and does putenv,
740 * and thus setenv is unusable (leaky) for shell's purposes */
741#define setenv(...) setenv_is_leaky_dont_use()
742struct variable {
743 struct variable *next;
Denis Vlasenko28c0f0f2007-05-25 02:46:01 +0000744 char *varstr; /* points to "name=" portion */
Denis Vlasenkod76c0492007-05-25 02:16:25 +0000745 int max_len; /* if > 0, name is part of initial env; else name is malloced */
Denys Vlasenko332e4112018-04-04 22:32:59 +0200746 uint16_t var_nest_level;
Denis Vlasenkod76c0492007-05-25 02:16:25 +0000747 smallint flg_export; /* putenv should be done on this var */
Denis Vlasenko219e88d2007-05-21 10:18:23 +0000748 smallint flg_read_only;
Eric Andersen9ffb7dd2001-05-19 03:00:46 +0000749};
750
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +0000751enum {
Denis Vlasenkobcb25532008-07-28 23:04:34 +0000752 BC_BREAK = 1,
753 BC_CONTINUE = 2,
754};
755
Denis Vlasenkoc0ea3292009-04-10 21:22:02 +0000756#if ENABLE_HUSH_FUNCTIONS
Denis Vlasenkob7d8c0d2009-04-10 19:05:43 +0000757struct function {
758 struct function *next;
759 char *name;
Denis Vlasenkoed055212009-04-11 10:37:10 +0000760 struct command *parent_cmd;
Denis Vlasenkob7d8c0d2009-04-10 19:05:43 +0000761 struct pipe *body;
Denys Vlasenkoc1947f12009-10-23 01:30:26 +0200762# if !BB_MMU
Denis Vlasenkoc0ea3292009-04-10 21:22:02 +0000763 char *body_as_string;
Denys Vlasenkoc1947f12009-10-23 01:30:26 +0200764# endif
Denis Vlasenkob7d8c0d2009-04-10 19:05:43 +0000765};
Denis Vlasenkoc0ea3292009-04-10 21:22:02 +0000766#endif
Denis Vlasenkob7d8c0d2009-04-10 19:05:43 +0000767
Denis Vlasenkod76c0492007-05-25 02:16:25 +0000768
Denys Vlasenko6696eac2010-11-14 02:01:50 +0100769/* set -/+o OPT support. (TODO: make it optional)
770 * bash supports the following opts:
771 * allexport off
772 * braceexpand on
773 * emacs on
774 * errexit off
775 * errtrace off
776 * functrace off
777 * hashall on
778 * histexpand off
779 * history on
780 * ignoreeof off
781 * interactive-comments on
782 * keyword off
783 * monitor on
784 * noclobber off
785 * noexec off
786 * noglob off
787 * nolog off
788 * notify off
789 * nounset off
790 * onecmd off
791 * physical off
792 * pipefail off
793 * posix off
794 * privileged off
795 * verbose off
796 * vi off
797 * xtrace off
798 */
Dan Fandrich85c62472010-11-20 13:05:17 -0800799static const char o_opt_strings[] ALIGN1 =
800 "pipefail\0"
801 "noexec\0"
Denys Vlasenko9fda6092017-07-14 13:36:48 +0200802 "errexit\0"
Dan Fandrich85c62472010-11-20 13:05:17 -0800803#if ENABLE_HUSH_MODE_X
804 "xtrace\0"
805#endif
806 ;
Denys Vlasenko6696eac2010-11-14 02:01:50 +0100807enum {
808 OPT_O_PIPEFAIL,
Dan Fandrich85c62472010-11-20 13:05:17 -0800809 OPT_O_NOEXEC,
Denys Vlasenko9fda6092017-07-14 13:36:48 +0200810 OPT_O_ERREXIT,
Dan Fandrich85c62472010-11-20 13:05:17 -0800811#if ENABLE_HUSH_MODE_X
812 OPT_O_XTRACE,
813#endif
Denys Vlasenko6696eac2010-11-14 02:01:50 +0100814 NUM_OPT_O
815};
816
817
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +0200818struct FILE_list {
819 struct FILE_list *next;
820 FILE *fp;
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +0200821 int fd;
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +0200822};
823
824
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +0000825/* "Globals" within this file */
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +0000826/* Sorted roughly by size (smaller offsets == smaller code) */
827struct globals {
Denis Vlasenkoc8653f62009-04-27 23:29:14 +0000828 /* interactive_fd != 0 means we are an interactive shell.
829 * If we are, then saved_tty_pgrp can also be != 0, meaning
830 * that controlling tty is available. With saved_tty_pgrp == 0,
831 * job control still works, but terminal signals
832 * (^C, ^Z, ^Y, ^\) won't work at all, and background
833 * process groups can only be created with "cmd &".
834 * With saved_tty_pgrp != 0, hush will use tcsetpgrp()
835 * to give tty to the foreground process group,
836 * and will take it back when the group is stopped (^Z)
837 * or killed (^C).
838 */
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +0000839#if ENABLE_HUSH_INTERACTIVE
840 /* 'interactive_fd' is a fd# open to ctty, if we have one
841 * _AND_ if we decided to act interactively */
842 int interactive_fd;
843 const char *PS1;
Denys Vlasenkof5018da2018-04-06 17:58:21 +0200844 IF_FEATURE_EDITING_FANCY_PROMPT(const char *PS2;)
Denis Vlasenkoc8653f62009-04-27 23:29:14 +0000845# define G_interactive_fd (G.interactive_fd)
Denis Vlasenko60b392f2009-04-03 19:14:32 +0000846#else
Denis Vlasenkoc8653f62009-04-27 23:29:14 +0000847# define G_interactive_fd 0
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +0000848#endif
849#if ENABLE_FEATURE_EDITING
850 line_input_t *line_input_state;
851#endif
Denis Vlasenkocc3f20b2008-06-23 22:31:52 +0000852 pid_t root_pid;
Denys Vlasenkodea47882009-10-09 15:40:49 +0200853 pid_t root_ppid;
Denis Vlasenko87a86552008-07-29 19:43:10 +0000854 pid_t last_bg_pid;
Denys Vlasenko20b3d142009-10-09 20:59:39 +0200855#if ENABLE_HUSH_RANDOM_SUPPORT
856 random_t random_gen;
857#endif
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +0000858#if ENABLE_HUSH_JOB
859 int run_list_level;
Denys Vlasenkod5b5c2f2017-01-08 15:46:04 +0100860 unsigned last_jobid;
Denis Vlasenkoc8653f62009-04-27 23:29:14 +0000861 pid_t saved_tty_pgrp;
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +0000862 struct pipe *job_list;
Mike Frysinger38478a62009-05-20 04:48:06 -0400863# define G_saved_tty_pgrp (G.saved_tty_pgrp)
864#else
865# define G_saved_tty_pgrp 0
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +0000866#endif
Denys Vlasenko9fda6092017-07-14 13:36:48 +0200867 /* How deeply are we in context where "set -e" is ignored */
868 int errexit_depth;
869 /* "set -e" rules (do we follow them correctly?):
870 * Exit if pipe, list, or compound command exits with a non-zero status.
871 * Shell does not exit if failed command is part of condition in
872 * if/while, part of && or || list except the last command, any command
873 * in a pipe but the last, or if the command's return value is being
874 * inverted with !. If a compound command other than a subshell returns a
875 * non-zero status because a command failed while -e was being ignored, the
876 * shell does not exit. A trap on ERR, if set, is executed before the shell
877 * exits [ERR is a bashism].
878 *
879 * If a compound command or function executes in a context where -e is
880 * ignored, none of the commands executed within are affected by the -e
881 * setting. If a compound command or function sets -e while executing in a
882 * context where -e is ignored, that setting does not have any effect until
883 * the compound command or the command containing the function call completes.
884 */
885
Denys Vlasenko26777aa2010-11-22 23:49:10 +0100886 char o_opt[NUM_OPT_O];
Denys Vlasenko57542eb2010-11-28 03:59:30 +0100887#if ENABLE_HUSH_MODE_X
888# define G_x_mode (G.o_opt[OPT_O_XTRACE])
889#else
890# define G_x_mode 0
891#endif
Denys Vlasenko8d6eab32018-04-07 17:01:31 +0200892#if ENABLE_HUSH_INTERACTIVE
893 smallint promptmode; /* 0: PS1, 1: PS2 */
894#endif
Denis Vlasenko422cd7c2009-03-31 12:41:52 +0000895 smallint flag_SIGINT;
Denis Vlasenkodadfb492008-07-29 10:16:05 +0000896#if ENABLE_HUSH_LOOPS
Denis Vlasenkobcb25532008-07-28 23:04:34 +0000897 smallint flag_break_continue;
Denis Vlasenkodadfb492008-07-29 10:16:05 +0000898#endif
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +0000899#if ENABLE_HUSH_FUNCTIONS
900 /* 0: outside of a function (or sourced file)
901 * -1: inside of a function, ok to use return builtin
Denis Vlasenkoc8653f62009-04-27 23:29:14 +0000902 * 1: return is invoked, skip all till end of func
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +0000903 */
904 smallint flag_return_in_progress;
Denys Vlasenko04b46bc2016-10-01 22:28:03 +0200905# define G_flag_return_in_progress (G.flag_return_in_progress)
906#else
907# define G_flag_return_in_progress 0
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +0000908#endif
Denis Vlasenkoefea9d22009-04-09 13:43:11 +0000909 smallint exiting; /* used to prevent EXIT trap recursion */
Denys Vlasenko5fa05052018-04-03 11:21:13 +0200910 /* These support $?, $#, and $1 */
Denis Vlasenkoab2b0642009-04-06 18:42:11 +0000911 smalluint last_exitcode;
Denys Vlasenko5fa05052018-04-03 11:21:13 +0200912 smalluint expand_exitcode;
Denys Vlasenko840a4352017-07-07 22:56:02 +0200913 smalluint last_bg_pid_exitcode;
Denys Vlasenko4e4f88e2017-01-09 07:57:38 +0100914#if ENABLE_HUSH_SET
Denis Vlasenkocc4c6932009-04-05 07:38:48 +0000915 /* are global_argv and global_argv[1..n] malloced? (note: not [0]) */
Denis Vlasenko11fb7cf2009-03-20 10:13:08 +0000916 smalluint global_args_malloced;
Denys Vlasenko4e4f88e2017-01-09 07:57:38 +0100917# define G_global_args_malloced (G.global_args_malloced)
918#else
919# define G_global_args_malloced 0
920#endif
Denis Vlasenkoe1300f62009-03-22 11:41:18 +0000921 /* how many non-NULL argv's we have. NB: $# + 1 */
922 int global_argc;
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +0000923 char **global_argv;
Denis Vlasenkocc4c6932009-04-05 07:38:48 +0000924#if !BB_MMU
Denis Vlasenko46f9b6d2009-04-05 10:39:03 +0000925 char *argv0_for_re_execing;
Denis Vlasenkocc4c6932009-04-05 07:38:48 +0000926#endif
Denis Vlasenkodadfb492008-07-29 10:16:05 +0000927#if ENABLE_HUSH_LOOPS
Denis Vlasenko6a2d40f2008-07-28 23:07:06 +0000928 unsigned depth_break_continue;
Denis Vlasenkofcf37c32008-07-29 11:37:15 +0000929 unsigned depth_of_loop;
Denis Vlasenkodadfb492008-07-29 10:16:05 +0000930#endif
Denys Vlasenko238ff982017-08-29 13:38:30 +0200931#if ENABLE_HUSH_GETOPTS
932 unsigned getopt_count;
933#endif
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +0000934 const char *ifs;
Denys Vlasenko96786362018-04-11 16:02:58 +0200935 char *ifs_whitespace; /* = G.ifs or malloced */
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +0000936 const char *cwd;
Denys Vlasenko52e460b2010-09-16 16:12:00 +0200937 struct variable *top_var;
Denys Vlasenko29082232010-07-16 13:52:32 +0200938 char **expanded_assignments;
Denys Vlasenko295fef82009-06-03 12:47:26 +0200939 struct variable **shadowed_vars_pp;
Denys Vlasenko332e4112018-04-04 22:32:59 +0200940 unsigned var_nest_level;
941#if ENABLE_HUSH_FUNCTIONS
942# if ENABLE_HUSH_LOCAL
943 unsigned func_nest_level; /* solely to prevent "local v" in non-functions */
Denys Vlasenko295fef82009-06-03 12:47:26 +0200944# endif
Denys Vlasenko332e4112018-04-04 22:32:59 +0200945 struct function *top_func;
Denis Vlasenkoc0ea3292009-04-10 21:22:02 +0000946#endif
Denis Vlasenkod5762932009-03-31 11:22:57 +0000947 /* Signal and trap handling */
Denys Vlasenko8d7be232009-05-25 16:38:32 +0200948#if ENABLE_HUSH_FAST
949 unsigned count_SIGCHLD;
950 unsigned handled_SIGCHLD;
Denys Vlasenkoe2df5f42009-05-26 14:34:10 +0200951 smallint we_have_children;
Denys Vlasenko8d7be232009-05-25 16:38:32 +0200952#endif
Denys Vlasenko5807e182018-02-08 19:19:04 +0100953#if ENABLE_HUSH_LINENO_VAR
Denys Vlasenko6aad1dd2018-01-19 15:37:04 +0100954 unsigned lineno;
955 char *lineno_var;
Denys Vlasenko6aad1dd2018-01-19 15:37:04 +0100956#endif
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +0200957 struct FILE_list *FILE_list;
Denys Vlasenko10c01312011-05-11 11:49:21 +0200958 /* Which signals have non-DFL handler (even with no traps set)?
959 * Set at the start to:
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +0200960 * (SIGQUIT + maybe SPECIAL_INTERACTIVE_SIGS + maybe SPECIAL_JOBSTOP_SIGS)
Denys Vlasenko10c01312011-05-11 11:49:21 +0200961 * SPECIAL_INTERACTIVE_SIGS are cleared after fork.
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +0200962 * The rest is cleared right before execv syscalls.
Denys Vlasenko10c01312011-05-11 11:49:21 +0200963 * Other than these two times, never modified.
964 */
965 unsigned special_sig_mask;
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +0200966#if ENABLE_HUSH_JOB
967 unsigned fatal_sig_mask;
Denys Vlasenko4e4f88e2017-01-09 07:57:38 +0100968# define G_fatal_sig_mask (G.fatal_sig_mask)
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +0200969#else
Denys Vlasenko75e77de2011-05-12 13:12:47 +0200970# define G_fatal_sig_mask 0
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +0200971#endif
Denys Vlasenko7a85c602017-01-08 17:40:18 +0100972#if ENABLE_HUSH_TRAP
Denis Vlasenko7566bae2009-03-31 17:24:49 +0000973 char **traps; /* char *traps[NSIG] */
Denys Vlasenko7a85c602017-01-08 17:40:18 +0100974# define G_traps G.traps
975#else
976# define G_traps ((char**)NULL)
977#endif
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +0200978 sigset_t pending_set;
Denys Vlasenko44719692017-01-08 18:44:41 +0100979#if ENABLE_HUSH_MEMLEAK
Denis Vlasenkoc73b70c2009-04-08 11:48:57 +0000980 unsigned long memleak_value;
Denys Vlasenko44719692017-01-08 18:44:41 +0100981#endif
982#if HUSH_DEBUG
Denis Vlasenko0701dca2009-04-11 10:38:47 +0000983 int debug_indent;
Denis Vlasenkoc73b70c2009-04-08 11:48:57 +0000984#endif
Denys Vlasenko0806e402011-05-12 23:06:20 +0200985 struct sigaction sa;
Denys Vlasenko0448c552016-09-29 20:25:44 +0200986#if ENABLE_FEATURE_EDITING
987 char user_input_buf[CONFIG_FEATURE_EDITING_MAX_LEN];
988#endif
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +0000989};
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +0000990#define G (*ptr_to_globals)
Denis Vlasenko87a86552008-07-29 19:43:10 +0000991/* Not #defining name to G.name - this quickly gets unwieldy
992 * (too many defines). Also, I actually prefer to see when a variable
993 * is global, thus "G." prefix is a useful hint */
Denis Vlasenko574f2f42008-02-27 18:41:59 +0000994#define INIT_G() do { \
995 SET_PTR_TO_GLOBALS(xzalloc(sizeof(G))); \
Denys Vlasenko0806e402011-05-12 23:06:20 +0200996 /* memset(&G.sa, 0, sizeof(G.sa)); */ \
997 sigfillset(&G.sa.sa_mask); \
998 G.sa.sa_flags = SA_RESTART; \
Denis Vlasenko574f2f42008-02-27 18:41:59 +0000999} while (0)
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +00001000
1001
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001002/* Function prototypes for builtins */
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001003static int builtin_cd(char **argv) FAST_FUNC;
Denys Vlasenko1cc68042017-01-09 17:10:04 +01001004#if ENABLE_HUSH_ECHO
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001005static int builtin_echo(char **argv) FAST_FUNC;
Denys Vlasenko1cc68042017-01-09 17:10:04 +01001006#endif
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001007static int builtin_eval(char **argv) FAST_FUNC;
1008static int builtin_exec(char **argv) FAST_FUNC;
1009static int builtin_exit(char **argv) FAST_FUNC;
Denys Vlasenko6ec76d82017-01-08 18:40:41 +01001010#if ENABLE_HUSH_EXPORT
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001011static int builtin_export(char **argv) FAST_FUNC;
Denys Vlasenko6ec76d82017-01-08 18:40:41 +01001012#endif
Denys Vlasenko1e660422017-07-17 21:10:50 +02001013#if ENABLE_HUSH_READONLY
1014static int builtin_readonly(char **argv) FAST_FUNC;
1015#endif
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001016#if ENABLE_HUSH_JOB
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001017static int builtin_fg_bg(char **argv) FAST_FUNC;
1018static int builtin_jobs(char **argv) FAST_FUNC;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001019#endif
Denys Vlasenko74d40582017-08-11 01:32:46 +02001020#if ENABLE_HUSH_GETOPTS
1021static int builtin_getopts(char **argv) FAST_FUNC;
1022#endif
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001023#if ENABLE_HUSH_HELP
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001024static int builtin_help(char **argv) FAST_FUNC;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001025#endif
Denys Vlasenkoff463a82013-05-12 02:45:23 +02001026#if MAX_HISTORY && ENABLE_FEATURE_EDITING
Flemming Madsend96ffda2013-04-07 18:47:24 +02001027static int builtin_history(char **argv) FAST_FUNC;
1028#endif
Denys Vlasenko295fef82009-06-03 12:47:26 +02001029#if ENABLE_HUSH_LOCAL
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001030static int builtin_local(char **argv) FAST_FUNC;
Denys Vlasenko295fef82009-06-03 12:47:26 +02001031#endif
Denys Vlasenko44719692017-01-08 18:44:41 +01001032#if ENABLE_HUSH_MEMLEAK
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001033static int builtin_memleak(char **argv) FAST_FUNC;
Denis Vlasenkoc73b70c2009-04-08 11:48:57 +00001034#endif
Denys Vlasenko1125d7d2017-01-08 17:19:38 +01001035#if ENABLE_HUSH_PRINTF
Mike Frysinger4ebc76c2009-10-15 03:32:39 -04001036static int builtin_printf(char **argv) FAST_FUNC;
1037#endif
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001038static int builtin_pwd(char **argv) FAST_FUNC;
Denys Vlasenko7a85c602017-01-08 17:40:18 +01001039#if ENABLE_HUSH_READ
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001040static int builtin_read(char **argv) FAST_FUNC;
Denys Vlasenko7a85c602017-01-08 17:40:18 +01001041#endif
Denys Vlasenko10d5ece2017-01-08 18:28:43 +01001042#if ENABLE_HUSH_SET
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001043static int builtin_set(char **argv) FAST_FUNC;
Denys Vlasenko10d5ece2017-01-08 18:28:43 +01001044#endif
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001045static int builtin_shift(char **argv) FAST_FUNC;
1046static int builtin_source(char **argv) FAST_FUNC;
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01001047#if ENABLE_HUSH_TEST || BASH_TEST2
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001048static int builtin_test(char **argv) FAST_FUNC;
Denys Vlasenko265062d2017-01-10 15:13:30 +01001049#endif
Denys Vlasenko7a85c602017-01-08 17:40:18 +01001050#if ENABLE_HUSH_TRAP
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001051static int builtin_trap(char **argv) FAST_FUNC;
Denys Vlasenko7a85c602017-01-08 17:40:18 +01001052#endif
Denys Vlasenko1125d7d2017-01-08 17:19:38 +01001053#if ENABLE_HUSH_TYPE
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001054static int builtin_type(char **argv) FAST_FUNC;
Denys Vlasenko1125d7d2017-01-08 17:19:38 +01001055#endif
Denys Vlasenko11f2e992017-08-10 16:34:03 +02001056#if ENABLE_HUSH_TIMES
1057static int builtin_times(char **argv) FAST_FUNC;
1058#endif
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001059static int builtin_true(char **argv) FAST_FUNC;
Denys Vlasenkod5933b12017-01-08 18:31:39 +01001060#if ENABLE_HUSH_UMASK
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001061static int builtin_umask(char **argv) FAST_FUNC;
Denys Vlasenkod5933b12017-01-08 18:31:39 +01001062#endif
Denys Vlasenko10d5ece2017-01-08 18:28:43 +01001063#if ENABLE_HUSH_UNSET
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001064static int builtin_unset(char **argv) FAST_FUNC;
Denys Vlasenko10d5ece2017-01-08 18:28:43 +01001065#endif
Denys Vlasenko1125d7d2017-01-08 17:19:38 +01001066#if ENABLE_HUSH_KILL
1067static int builtin_kill(char **argv) FAST_FUNC;
1068#endif
1069#if ENABLE_HUSH_WAIT
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001070static int builtin_wait(char **argv) FAST_FUNC;
Denys Vlasenko1125d7d2017-01-08 17:19:38 +01001071#endif
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001072#if ENABLE_HUSH_LOOPS
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001073static int builtin_break(char **argv) FAST_FUNC;
1074static int builtin_continue(char **argv) FAST_FUNC;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001075#endif
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +00001076#if ENABLE_HUSH_FUNCTIONS
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02001077static int builtin_return(char **argv) FAST_FUNC;
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +00001078#endif
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001079
1080/* Table of built-in functions. They can be forked or not, depending on
1081 * context: within pipes, they fork. As simple commands, they do not.
1082 * When used in non-forking context, they can change global variables
1083 * in the parent shell process. If forked, of course they cannot.
1084 * For example, 'unset foo | whatever' will parse and run, but foo will
1085 * still be set at the end. */
1086struct built_in_command {
Denys Vlasenko17323a62010-01-28 01:57:05 +01001087 const char *b_cmd;
1088 int (*b_function)(char **argv) FAST_FUNC;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001089#if ENABLE_HUSH_HELP
Denys Vlasenko17323a62010-01-28 01:57:05 +01001090 const char *b_descr;
Denys Vlasenko28a105d2009-06-01 11:26:30 +02001091# define BLTIN(cmd, func, help) { cmd, func, help }
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001092#else
Denys Vlasenko28a105d2009-06-01 11:26:30 +02001093# define BLTIN(cmd, func, help) { cmd, func }
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001094#endif
1095};
1096
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001097static const struct built_in_command bltins1[] = {
Denys Vlasenko80f806c2017-01-10 16:51:10 +01001098 BLTIN("." , builtin_source , "Run commands in file"),
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001099 BLTIN(":" , builtin_true , NULL),
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001100#if ENABLE_HUSH_JOB
Denys Vlasenko80f806c2017-01-10 16:51:10 +01001101 BLTIN("bg" , builtin_fg_bg , "Resume job in background"),
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001102#endif
1103#if ENABLE_HUSH_LOOPS
Denys Vlasenko80f806c2017-01-10 16:51:10 +01001104 BLTIN("break" , builtin_break , "Exit loop"),
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001105#endif
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001106 BLTIN("cd" , builtin_cd , "Change directory"),
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001107#if ENABLE_HUSH_LOOPS
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001108 BLTIN("continue" , builtin_continue, "Start new loop iteration"),
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001109#endif
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001110 BLTIN("eval" , builtin_eval , "Construct and run shell command"),
1111 BLTIN("exec" , builtin_exec , "Execute command, don't return to shell"),
Denys Vlasenko80f806c2017-01-10 16:51:10 +01001112 BLTIN("exit" , builtin_exit , NULL),
Denys Vlasenko6ec76d82017-01-08 18:40:41 +01001113#if ENABLE_HUSH_EXPORT
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001114 BLTIN("export" , builtin_export , "Set environment variables"),
Denys Vlasenko6ec76d82017-01-08 18:40:41 +01001115#endif
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001116#if ENABLE_HUSH_JOB
Denys Vlasenkod2c15bc2017-07-18 18:14:42 +02001117 BLTIN("fg" , builtin_fg_bg , "Bring job to foreground"),
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001118#endif
Denys Vlasenko74d40582017-08-11 01:32:46 +02001119#if ENABLE_HUSH_GETOPTS
1120 BLTIN("getopts" , builtin_getopts , NULL),
1121#endif
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001122#if ENABLE_HUSH_HELP
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001123 BLTIN("help" , builtin_help , NULL),
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001124#endif
Denys Vlasenkoff463a82013-05-12 02:45:23 +02001125#if MAX_HISTORY && ENABLE_FEATURE_EDITING
Denys Vlasenko80f806c2017-01-10 16:51:10 +01001126 BLTIN("history" , builtin_history , "Show history"),
Flemming Madsend96ffda2013-04-07 18:47:24 +02001127#endif
Denis Vlasenko34d4d892009-04-04 20:24:37 +00001128#if ENABLE_HUSH_JOB
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001129 BLTIN("jobs" , builtin_jobs , "List jobs"),
Denis Vlasenko34d4d892009-04-04 20:24:37 +00001130#endif
Denys Vlasenko1125d7d2017-01-08 17:19:38 +01001131#if ENABLE_HUSH_KILL
1132 BLTIN("kill" , builtin_kill , "Send signals to processes"),
1133#endif
Denys Vlasenko295fef82009-06-03 12:47:26 +02001134#if ENABLE_HUSH_LOCAL
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001135 BLTIN("local" , builtin_local , "Set local variables"),
Denys Vlasenko295fef82009-06-03 12:47:26 +02001136#endif
Denys Vlasenko44719692017-01-08 18:44:41 +01001137#if ENABLE_HUSH_MEMLEAK
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001138 BLTIN("memleak" , builtin_memleak , NULL),
Denis Vlasenkoc73b70c2009-04-08 11:48:57 +00001139#endif
Denys Vlasenko7a85c602017-01-08 17:40:18 +01001140#if ENABLE_HUSH_READ
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001141 BLTIN("read" , builtin_read , "Input into variable"),
Denys Vlasenko7a85c602017-01-08 17:40:18 +01001142#endif
Denys Vlasenko1e660422017-07-17 21:10:50 +02001143#if ENABLE_HUSH_READONLY
1144 BLTIN("readonly" , builtin_readonly, "Make variables read-only"),
1145#endif
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +00001146#if ENABLE_HUSH_FUNCTIONS
Denys Vlasenko80f806c2017-01-10 16:51:10 +01001147 BLTIN("return" , builtin_return , "Return from function"),
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +00001148#endif
Denys Vlasenko10d5ece2017-01-08 18:28:43 +01001149#if ENABLE_HUSH_SET
Denys Vlasenko80f806c2017-01-10 16:51:10 +01001150 BLTIN("set" , builtin_set , "Set positional parameters"),
Denys Vlasenko10d5ece2017-01-08 18:28:43 +01001151#endif
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001152 BLTIN("shift" , builtin_shift , "Shift positional parameters"),
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01001153#if BASH_SOURCE
Denys Vlasenko80f806c2017-01-10 16:51:10 +01001154 BLTIN("source" , builtin_source , NULL),
Denys Vlasenko82731b42010-05-17 17:49:52 +02001155#endif
Denys Vlasenko11f2e992017-08-10 16:34:03 +02001156#if ENABLE_HUSH_TIMES
1157 BLTIN("times" , builtin_times , NULL),
1158#endif
Denys Vlasenko7a85c602017-01-08 17:40:18 +01001159#if ENABLE_HUSH_TRAP
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001160 BLTIN("trap" , builtin_trap , "Trap signals"),
Denys Vlasenko7a85c602017-01-08 17:40:18 +01001161#endif
Denys Vlasenko2bba5912014-03-14 12:43:57 +01001162 BLTIN("true" , builtin_true , NULL),
Denys Vlasenko1125d7d2017-01-08 17:19:38 +01001163#if ENABLE_HUSH_TYPE
Denys Vlasenko651a2692010-03-23 16:25:17 +01001164 BLTIN("type" , builtin_type , "Show command type"),
Denys Vlasenko1125d7d2017-01-08 17:19:38 +01001165#endif
Denys Vlasenko7a85c602017-01-08 17:40:18 +01001166#if ENABLE_HUSH_ULIMIT
Denys Vlasenko10d5ece2017-01-08 18:28:43 +01001167 BLTIN("ulimit" , shell_builtin_ulimit, "Control resource limits"),
Denys Vlasenko7a85c602017-01-08 17:40:18 +01001168#endif
Denys Vlasenkod5933b12017-01-08 18:31:39 +01001169#if ENABLE_HUSH_UMASK
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001170 BLTIN("umask" , builtin_umask , "Set file creation mask"),
Denys Vlasenkod5933b12017-01-08 18:31:39 +01001171#endif
Denys Vlasenko10d5ece2017-01-08 18:28:43 +01001172#if ENABLE_HUSH_UNSET
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001173 BLTIN("unset" , builtin_unset , "Unset variables"),
Denys Vlasenko10d5ece2017-01-08 18:28:43 +01001174#endif
Denys Vlasenko1125d7d2017-01-08 17:19:38 +01001175#if ENABLE_HUSH_WAIT
Denys Vlasenkod2c15bc2017-07-18 18:14:42 +02001176 BLTIN("wait" , builtin_wait , "Wait for process to finish"),
Denys Vlasenko1125d7d2017-01-08 17:19:38 +01001177#endif
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001178};
Denys Vlasenko80f806c2017-01-10 16:51:10 +01001179/* These builtins won't be used if we are on NOMMU and need to re-exec
1180 * (it's cheaper to run an external program in this case):
1181 */
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001182static const struct built_in_command bltins2[] = {
Denys Vlasenko265062d2017-01-10 15:13:30 +01001183#if ENABLE_HUSH_TEST
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001184 BLTIN("[" , builtin_test , NULL),
Denys Vlasenko265062d2017-01-10 15:13:30 +01001185#endif
Denys Vlasenko8944c672017-01-11 14:22:00 +01001186#if BASH_TEST2
1187 BLTIN("[[" , builtin_test , NULL),
1188#endif
Denys Vlasenko1cc68042017-01-09 17:10:04 +01001189#if ENABLE_HUSH_ECHO
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001190 BLTIN("echo" , builtin_echo , NULL),
Denys Vlasenko1cc68042017-01-09 17:10:04 +01001191#endif
Denys Vlasenko1125d7d2017-01-08 17:19:38 +01001192#if ENABLE_HUSH_PRINTF
Mike Frysinger4ebc76c2009-10-15 03:32:39 -04001193 BLTIN("printf" , builtin_printf , NULL),
1194#endif
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001195 BLTIN("pwd" , builtin_pwd , NULL),
Denys Vlasenko265062d2017-01-10 15:13:30 +01001196#if ENABLE_HUSH_TEST
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02001197 BLTIN("test" , builtin_test , NULL),
Denys Vlasenko265062d2017-01-10 15:13:30 +01001198#endif
Denis Vlasenko424f79b2009-03-22 14:23:34 +00001199};
1200
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +00001201
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001202/* Debug printouts.
1203 */
1204#if HUSH_DEBUG
1205/* prevent disasters with G.debug_indent < 0 */
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001206# define indent() fdprintf(2, "%*s", (G.debug_indent * 2) & 0xff, "")
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001207# define debug_enter() (G.debug_indent++)
1208# define debug_leave() (G.debug_indent--)
1209#else
Denys Vlasenko28a105d2009-06-01 11:26:30 +02001210# define indent() ((void)0)
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001211# define debug_enter() ((void)0)
1212# define debug_leave() ((void)0)
1213#endif
1214
1215#ifndef debug_printf
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001216# define debug_printf(...) (indent(), fdprintf(2, __VA_ARGS__))
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001217#endif
1218
1219#ifndef debug_printf_parse
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001220# define debug_printf_parse(...) (indent(), fdprintf(2, __VA_ARGS__))
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001221#endif
1222
1223#ifndef debug_printf_exec
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001224#define debug_printf_exec(...) (indent(), fdprintf(2, __VA_ARGS__))
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001225#endif
1226
1227#ifndef debug_printf_env
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001228# define debug_printf_env(...) (indent(), fdprintf(2, __VA_ARGS__))
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001229#endif
1230
1231#ifndef debug_printf_jobs
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001232# define debug_printf_jobs(...) (indent(), fdprintf(2, __VA_ARGS__))
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001233# define DEBUG_JOBS 1
1234#else
1235# define DEBUG_JOBS 0
1236#endif
1237
1238#ifndef debug_printf_expand
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001239# define debug_printf_expand(...) (indent(), fdprintf(2, __VA_ARGS__))
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001240# define DEBUG_EXPAND 1
1241#else
1242# define DEBUG_EXPAND 0
1243#endif
1244
Denys Vlasenko1e811b12010-05-22 03:12:29 +02001245#ifndef debug_printf_varexp
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001246# define debug_printf_varexp(...) (indent(), fdprintf(2, __VA_ARGS__))
Denys Vlasenko1e811b12010-05-22 03:12:29 +02001247#endif
1248
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001249#ifndef debug_printf_glob
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001250# define debug_printf_glob(...) (indent(), fdprintf(2, __VA_ARGS__))
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001251# define DEBUG_GLOB 1
1252#else
1253# define DEBUG_GLOB 0
1254#endif
1255
Denys Vlasenko2db74612017-07-07 22:07:28 +02001256#ifndef debug_printf_redir
1257# define debug_printf_redir(...) (indent(), fdprintf(2, __VA_ARGS__))
1258#endif
1259
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001260#ifndef debug_printf_list
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001261# define debug_printf_list(...) (indent(), fdprintf(2, __VA_ARGS__))
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001262#endif
1263
1264#ifndef debug_printf_subst
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001265# define debug_printf_subst(...) (indent(), fdprintf(2, __VA_ARGS__))
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001266#endif
1267
Denys Vlasenko8d6eab32018-04-07 17:01:31 +02001268#ifndef debug_printf_prompt
1269# define debug_printf_prompt(...) (indent(), fdprintf(2, __VA_ARGS__))
1270#endif
1271
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001272#ifndef debug_printf_clean
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001273# define debug_printf_clean(...) (indent(), fdprintf(2, __VA_ARGS__))
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001274# define DEBUG_CLEAN 1
1275#else
1276# define DEBUG_CLEAN 0
1277#endif
1278
1279#if DEBUG_EXPAND
1280static void debug_print_strings(const char *prefix, char **vv)
1281{
1282 indent();
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001283 fdprintf(2, "%s:\n", prefix);
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001284 while (*vv)
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001285 fdprintf(2, " '%s'\n", *vv++);
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001286}
1287#else
Denys Vlasenko28a105d2009-06-01 11:26:30 +02001288# define debug_print_strings(prefix, vv) ((void)0)
Denis Vlasenko0701dca2009-04-11 10:38:47 +00001289#endif
1290
1291
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001292/* Leak hunting. Use hush_leaktool.sh for post-processing.
1293 */
1294#if LEAK_HUNTING
1295static void *xxmalloc(int lineno, size_t size)
Denis Vlasenko90e485c2007-05-23 15:22:50 +00001296{
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001297 void *ptr = xmalloc((size + 0xff) & ~0xff);
1298 fdprintf(2, "line %d: malloc %p\n", lineno, ptr);
1299 return ptr;
1300}
1301static void *xxrealloc(int lineno, void *ptr, size_t size)
1302{
1303 ptr = xrealloc(ptr, (size + 0xff) & ~0xff);
1304 fdprintf(2, "line %d: realloc %p\n", lineno, ptr);
1305 return ptr;
1306}
1307static char *xxstrdup(int lineno, const char *str)
1308{
1309 char *ptr = xstrdup(str);
1310 fdprintf(2, "line %d: strdup %p\n", lineno, ptr);
1311 return ptr;
1312}
1313static void xxfree(void *ptr)
1314{
1315 fdprintf(2, "free %p\n", ptr);
1316 free(ptr);
1317}
Denys Vlasenko8391c482010-05-22 17:50:43 +02001318# define xmalloc(s) xxmalloc(__LINE__, s)
1319# define xrealloc(p, s) xxrealloc(__LINE__, p, s)
1320# define xstrdup(s) xxstrdup(__LINE__, s)
1321# define free(p) xxfree(p)
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001322#endif
1323
1324
1325/* Syntax and runtime errors. They always abort scripts.
1326 * In interactive use they usually discard unparsed and/or unexecuted commands
1327 * and return to the prompt.
1328 * HUSH_DEBUG >= 2 prints line number in this file where it was detected.
1329 */
1330#if HUSH_DEBUG < 2
Denys Vlasenko39701202017-08-02 19:44:05 +02001331# define msg_and_die_if_script(lineno, ...) msg_and_die_if_script(__VA_ARGS__)
Denis Vlasenkoc0ea3292009-04-10 21:22:02 +00001332# define syntax_error(lineno, msg) syntax_error(msg)
1333# define syntax_error_at(lineno, msg) syntax_error_at(msg)
1334# define syntax_error_unterm_ch(lineno, ch) syntax_error_unterm_ch(ch)
1335# define syntax_error_unterm_str(lineno, s) syntax_error_unterm_str(s)
1336# define syntax_error_unexpected_ch(lineno, ch) syntax_error_unexpected_ch(ch)
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001337#endif
1338
Denys Vlasenko39701202017-08-02 19:44:05 +02001339static void die_if_script(void)
1340{
1341 if (!G_interactive_fd) {
1342 if (G.last_exitcode) /* sometines it's 2, not 1 (bash compat) */
1343 xfunc_error_retval = G.last_exitcode;
1344 xfunc_die();
1345 }
1346}
1347
1348static void msg_and_die_if_script(unsigned lineno, const char *fmt, ...)
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001349{
Denis Vlasenkod68ae082009-04-09 20:41:34 +00001350 va_list p;
1351
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001352#if HUSH_DEBUG >= 2
1353 bb_error_msg("hush.c:%u", lineno);
1354#endif
Denis Vlasenkod68ae082009-04-09 20:41:34 +00001355 va_start(p, fmt);
1356 bb_verror_msg(fmt, p, NULL);
1357 va_end(p);
Denys Vlasenko39701202017-08-02 19:44:05 +02001358 die_if_script();
Mike Frysinger6379bb42009-03-28 18:55:03 +00001359}
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001360
Denys Vlasenkocecbc982011-03-30 18:54:52 +02001361static void syntax_error(unsigned lineno UNUSED_PARAM, const char *msg)
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001362{
1363 if (msg)
Denys Vlasenkocecbc982011-03-30 18:54:52 +02001364 bb_error_msg("syntax error: %s", msg);
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001365 else
Denys Vlasenkocecbc982011-03-30 18:54:52 +02001366 bb_error_msg("syntax error");
Denys Vlasenko39701202017-08-02 19:44:05 +02001367 die_if_script();
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001368}
1369
Denys Vlasenkocecbc982011-03-30 18:54:52 +02001370static void syntax_error_at(unsigned lineno UNUSED_PARAM, const char *msg)
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001371{
Denys Vlasenkocecbc982011-03-30 18:54:52 +02001372 bb_error_msg("syntax error at '%s'", msg);
Denys Vlasenko39701202017-08-02 19:44:05 +02001373 die_if_script();
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001374}
1375
Denys Vlasenkocecbc982011-03-30 18:54:52 +02001376static void syntax_error_unterm_str(unsigned lineno UNUSED_PARAM, const char *s)
Mike Frysinger6a46ab82009-06-01 14:14:36 -04001377{
Denys Vlasenkocecbc982011-03-30 18:54:52 +02001378 bb_error_msg("syntax error: unterminated %s", s);
Denys Vlasenko39701202017-08-02 19:44:05 +02001379//? source4.tests fails: in bash, echo ${^} in script does not terminate the script
1380// die_if_script();
Mike Frysinger6a46ab82009-06-01 14:14:36 -04001381}
1382
Denis Vlasenkod68ae082009-04-09 20:41:34 +00001383static void syntax_error_unterm_ch(unsigned lineno, char ch)
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001384{
Mike Frysinger6a46ab82009-06-01 14:14:36 -04001385 char msg[2] = { ch, '\0' };
1386 syntax_error_unterm_str(lineno, msg);
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001387}
1388
Denys Vlasenkocecbc982011-03-30 18:54:52 +02001389static void syntax_error_unexpected_ch(unsigned lineno UNUSED_PARAM, int ch)
Denis Vlasenkoc0ea3292009-04-10 21:22:02 +00001390{
1391 char msg[2];
1392 msg[0] = ch;
1393 msg[1] = '\0';
Denys Vlasenkob05bcaf2017-01-03 11:47:50 +01001394#if HUSH_DEBUG >= 2
1395 bb_error_msg("hush.c:%u", lineno);
1396#endif
Denys Vlasenkocecbc982011-03-30 18:54:52 +02001397 bb_error_msg("syntax error: unexpected %s", ch == EOF ? "EOF" : msg);
Denys Vlasenko39701202017-08-02 19:44:05 +02001398 die_if_script();
Denis Vlasenkoc0ea3292009-04-10 21:22:02 +00001399}
1400
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001401#if HUSH_DEBUG < 2
Denys Vlasenko39701202017-08-02 19:44:05 +02001402# undef msg_and_die_if_script
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001403# undef syntax_error
1404# undef syntax_error_at
Denis Vlasenkod68ae082009-04-09 20:41:34 +00001405# undef syntax_error_unterm_ch
1406# undef syntax_error_unterm_str
Denis Vlasenkoc0ea3292009-04-10 21:22:02 +00001407# undef syntax_error_unexpected_ch
Denis Vlasenko90e485c2007-05-23 15:22:50 +00001408#else
Denys Vlasenko39701202017-08-02 19:44:05 +02001409# define msg_and_die_if_script(...) msg_and_die_if_script(__LINE__, __VA_ARGS__)
Denis Vlasenkoc0ea3292009-04-10 21:22:02 +00001410# define syntax_error(msg) syntax_error(__LINE__, msg)
1411# define syntax_error_at(msg) syntax_error_at(__LINE__, msg)
1412# define syntax_error_unterm_ch(ch) syntax_error_unterm_ch(__LINE__, ch)
1413# define syntax_error_unterm_str(s) syntax_error_unterm_str(__LINE__, s)
1414# define syntax_error_unexpected_ch(ch) syntax_error_unexpected_ch(__LINE__, ch)
Denis Vlasenko90e485c2007-05-23 15:22:50 +00001415#endif
Eric Andersen25f27032001-04-26 23:22:31 +00001416
Denis Vlasenko552433b2009-04-04 19:29:21 +00001417
Denys Vlasenkof5018da2018-04-06 17:58:21 +02001418#if ENABLE_HUSH_INTERACTIVE && ENABLE_FEATURE_EDITING_FANCY_PROMPT
Mike Frysinger67c1c7b2009-04-24 06:26:18 +00001419static void cmdedit_update_prompt(void);
1420#else
Denys Vlasenko28a105d2009-06-01 11:26:30 +02001421# define cmdedit_update_prompt() ((void)0)
Mike Frysinger67c1c7b2009-04-24 06:26:18 +00001422#endif
1423
1424
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001425/* Utility functions
1426 */
Denis Vlasenko55789c62008-06-18 16:30:42 +00001427/* Replace each \x with x in place, return ptr past NUL. */
1428static char *unbackslash(char *src)
1429{
Denys Vlasenko71885402009-09-24 01:44:13 +02001430 char *dst = src = strchrnul(src, '\\');
Denis Vlasenko55789c62008-06-18 16:30:42 +00001431 while (1) {
Denys Vlasenko89e9d552018-04-11 01:15:33 +02001432 if (*src == '\\') {
Denis Vlasenko55789c62008-06-18 16:30:42 +00001433 src++;
Denys Vlasenko89e9d552018-04-11 01:15:33 +02001434 if (*src != '\0') {
1435 /* \x -> x */
1436 *dst++ = *src++;
1437 continue;
1438 }
1439 /* else: "\<nul>". Do not delete this backslash.
1440 * Testcase: eval 'echo ok\'
1441 */
1442 *dst++ = '\\';
1443 /* fallthrough */
1444 }
Denis Vlasenko55789c62008-06-18 16:30:42 +00001445 if ((*dst++ = *src++) == '\0')
1446 break;
1447 }
1448 return dst;
1449}
1450
Denis Vlasenko11fb7cf2009-03-20 10:13:08 +00001451static char **add_strings_to_strings(char **strings, char **add, int need_to_dup)
Denis Vlasenkod65ea392007-10-01 10:02:25 +00001452{
1453 int i;
1454 unsigned count1;
1455 unsigned count2;
1456 char **v;
1457
1458 v = strings;
1459 count1 = 0;
1460 if (v) {
1461 while (*v) {
1462 count1++;
1463 v++;
1464 }
1465 }
1466 count2 = 0;
1467 v = add;
1468 while (*v) {
1469 count2++;
1470 v++;
1471 }
1472 v = xrealloc(strings, (count1 + count2 + 1) * sizeof(char*));
1473 v[count1 + count2] = NULL;
1474 i = count2;
1475 while (--i >= 0)
Denis Vlasenko11fb7cf2009-03-20 10:13:08 +00001476 v[count1 + i] = (need_to_dup ? xstrdup(add[i]) : add[i]);
Denis Vlasenkod65ea392007-10-01 10:02:25 +00001477 return v;
1478}
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001479#if LEAK_HUNTING
Denis Vlasenkocc90f442009-04-08 16:40:34 +00001480static char **xx_add_strings_to_strings(int lineno, char **strings, char **add, int need_to_dup)
1481{
1482 char **ptr = add_strings_to_strings(strings, add, need_to_dup);
1483 fdprintf(2, "line %d: add_strings_to_strings %p\n", lineno, ptr);
1484 return ptr;
1485}
1486#define add_strings_to_strings(strings, add, need_to_dup) \
1487 xx_add_strings_to_strings(__LINE__, strings, add, need_to_dup)
1488#endif
Denis Vlasenkod65ea392007-10-01 10:02:25 +00001489
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02001490/* Note: takes ownership of "add" ptr (it is not strdup'ed) */
Denis Vlasenko22d10a02008-10-13 08:53:43 +00001491static char **add_string_to_strings(char **strings, char *add)
Denis Vlasenkod65ea392007-10-01 10:02:25 +00001492{
1493 char *v[2];
Denis Vlasenkod65ea392007-10-01 10:02:25 +00001494 v[0] = add;
1495 v[1] = NULL;
Denis Vlasenko11fb7cf2009-03-20 10:13:08 +00001496 return add_strings_to_strings(strings, v, /*dup:*/ 0);
Denis Vlasenko22d10a02008-10-13 08:53:43 +00001497}
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00001498#if LEAK_HUNTING
Denis Vlasenkocc90f442009-04-08 16:40:34 +00001499static char **xx_add_string_to_strings(int lineno, char **strings, char *add)
1500{
1501 char **ptr = add_string_to_strings(strings, add);
1502 fdprintf(2, "line %d: add_string_to_strings %p\n", lineno, ptr);
1503 return ptr;
1504}
1505#define add_string_to_strings(strings, add) \
1506 xx_add_string_to_strings(__LINE__, strings, add)
1507#endif
Denis Vlasenkod65ea392007-10-01 10:02:25 +00001508
Denys Vlasenkoacdc49c2009-05-04 01:58:10 +02001509static void free_strings(char **strings)
Denis Vlasenkod65ea392007-10-01 10:02:25 +00001510{
Denis Vlasenkoafd7a8d2008-10-09 16:29:44 +00001511 char **v;
1512
1513 if (!strings)
1514 return;
Denis Vlasenkoafd7a8d2008-10-09 16:29:44 +00001515 v = strings;
1516 while (*v) {
Denys Vlasenkoacdc49c2009-05-04 01:58:10 +02001517 free(*v);
1518 v++;
Denis Vlasenkod65ea392007-10-01 10:02:25 +00001519 }
Denis Vlasenkoafd7a8d2008-10-09 16:29:44 +00001520 free(strings);
Denis Vlasenkod65ea392007-10-01 10:02:25 +00001521}
1522
Denys Vlasenko9acd63c2018-03-28 18:35:07 +02001523static int dup_CLOEXEC(int fd, int avoid_fd)
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02001524{
Denys Vlasenko2db74612017-07-07 22:07:28 +02001525 int newfd;
1526 repeat:
Denys Vlasenko9acd63c2018-03-28 18:35:07 +02001527 newfd = fcntl(fd, F_DUPFD_CLOEXEC, avoid_fd + 1);
1528 if (newfd >= 0) {
1529 if (F_DUPFD_CLOEXEC == F_DUPFD) /* if old libc (w/o F_DUPFD_CLOEXEC) */
1530 fcntl(newfd, F_SETFD, FD_CLOEXEC);
1531 } else { /* newfd < 0 */
Denys Vlasenko2db74612017-07-07 22:07:28 +02001532 if (errno == EBUSY)
1533 goto repeat;
1534 if (errno == EINTR)
1535 goto repeat;
1536 }
1537 return newfd;
1538}
1539
Denys Vlasenko657e9002017-07-30 23:34:04 +02001540static int xdup_CLOEXEC_and_close(int fd, int avoid_fd)
Denys Vlasenko2db74612017-07-07 22:07:28 +02001541{
1542 int newfd;
1543 repeat:
Denys Vlasenko657e9002017-07-30 23:34:04 +02001544 newfd = fcntl(fd, F_DUPFD_CLOEXEC, avoid_fd + 1);
Denys Vlasenko2db74612017-07-07 22:07:28 +02001545 if (newfd < 0) {
1546 if (errno == EBUSY)
1547 goto repeat;
1548 if (errno == EINTR)
1549 goto repeat;
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02001550 /* fd was not open? */
1551 if (errno == EBADF)
1552 return fd;
1553 xfunc_die();
1554 }
Denys Vlasenko657e9002017-07-30 23:34:04 +02001555 if (F_DUPFD_CLOEXEC == F_DUPFD) /* if old libc (w/o F_DUPFD_CLOEXEC) */
1556 fcntl(newfd, F_SETFD, FD_CLOEXEC);
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02001557 close(fd);
1558 return newfd;
1559}
1560
1561
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +02001562/* Manipulating the list of open FILEs */
1563static FILE *remember_FILE(FILE *fp)
1564{
1565 if (fp) {
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +02001566 struct FILE_list *n = xmalloc(sizeof(*n));
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +02001567 n->next = G.FILE_list;
1568 G.FILE_list = n;
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02001569 n->fp = fp;
1570 n->fd = fileno(fp);
1571 close_on_exec_on(n->fd);
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +02001572 }
1573 return fp;
1574}
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +02001575static void fclose_and_forget(FILE *fp)
1576{
1577 struct FILE_list **pp = &G.FILE_list;
1578 while (*pp) {
1579 struct FILE_list *cur = *pp;
1580 if (cur->fp == fp) {
1581 *pp = cur->next;
1582 free(cur);
1583 break;
1584 }
1585 pp = &cur->next;
1586 }
1587 fclose(fp);
1588}
Denys Vlasenko2db74612017-07-07 22:07:28 +02001589static int save_FILEs_on_redirect(int fd, int avoid_fd)
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02001590{
1591 struct FILE_list *fl = G.FILE_list;
1592 while (fl) {
1593 if (fd == fl->fd) {
1594 /* We use it only on script files, they are all CLOEXEC */
Denys Vlasenko657e9002017-07-30 23:34:04 +02001595 fl->fd = xdup_CLOEXEC_and_close(fd, avoid_fd);
Denys Vlasenko2db74612017-07-07 22:07:28 +02001596 debug_printf_redir("redirect_fd %d: matches a script fd, moving it to %d\n", fd, fl->fd);
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02001597 return 1;
1598 }
1599 fl = fl->next;
1600 }
1601 return 0;
1602}
1603static void restore_redirected_FILEs(void)
1604{
1605 struct FILE_list *fl = G.FILE_list;
1606 while (fl) {
1607 int should_be = fileno(fl->fp);
1608 if (fl->fd != should_be) {
Denys Vlasenko2db74612017-07-07 22:07:28 +02001609 debug_printf_redir("restoring script fd from %d to %d\n", fl->fd, should_be);
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02001610 xmove_fd(fl->fd, should_be);
1611 fl->fd = should_be;
1612 }
1613 fl = fl->next;
1614 }
1615}
Denys Vlasenko4ee824f2017-07-03 01:22:13 +02001616#if ENABLE_FEATURE_SH_STANDALONE && BB_MMU
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02001617static void close_all_FILE_list(void)
1618{
1619 struct FILE_list *fl = G.FILE_list;
1620 while (fl) {
1621 /* fclose would also free FILE object.
1622 * It is disastrous if we share memory with a vforked parent.
1623 * I'm not sure we never come here after vfork.
1624 * Therefore just close fd, nothing more.
1625 */
1626 /*fclose(fl->fp); - unsafe */
1627 close(fl->fd);
1628 fl = fl->next;
1629 }
1630}
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +02001631#endif
Denys Vlasenko32fdf2f2017-07-31 04:32:06 +02001632static int fd_in_FILEs(int fd)
1633{
1634 struct FILE_list *fl = G.FILE_list;
1635 while (fl) {
1636 if (fl->fd == fd)
1637 return 1;
1638 fl = fl->next;
1639 }
1640 return 0;
1641}
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +02001642
1643
Denis Vlasenko270b1c32009-04-17 18:54:50 +00001644/* Helpers for setting new $n and restoring them back
1645 */
1646typedef struct save_arg_t {
1647 char *sv_argv0;
1648 char **sv_g_argv;
1649 int sv_g_argc;
Denys Vlasenko4e4f88e2017-01-09 07:57:38 +01001650 IF_HUSH_SET(smallint sv_g_malloced;)
Denis Vlasenko270b1c32009-04-17 18:54:50 +00001651} save_arg_t;
1652
1653static void save_and_replace_G_args(save_arg_t *sv, char **argv)
1654{
Denis Vlasenko270b1c32009-04-17 18:54:50 +00001655 sv->sv_argv0 = argv[0];
1656 sv->sv_g_argv = G.global_argv;
1657 sv->sv_g_argc = G.global_argc;
Denys Vlasenko4e4f88e2017-01-09 07:57:38 +01001658 IF_HUSH_SET(sv->sv_g_malloced = G.global_args_malloced;)
Denis Vlasenko270b1c32009-04-17 18:54:50 +00001659
1660 argv[0] = G.global_argv[0]; /* retain $0 */
1661 G.global_argv = argv;
Denys Vlasenko4e4f88e2017-01-09 07:57:38 +01001662 IF_HUSH_SET(G.global_args_malloced = 0;)
Denis Vlasenko270b1c32009-04-17 18:54:50 +00001663
Denys Vlasenkod4e4fdb2017-07-03 21:31:16 +02001664 G.global_argc = 1 + string_array_len(argv + 1);
Denis Vlasenko270b1c32009-04-17 18:54:50 +00001665}
1666
1667static void restore_G_args(save_arg_t *sv, char **argv)
1668{
Denys Vlasenko4e4f88e2017-01-09 07:57:38 +01001669#if ENABLE_HUSH_SET
Denis Vlasenko270b1c32009-04-17 18:54:50 +00001670 if (G.global_args_malloced) {
1671 /* someone ran "set -- arg1 arg2 ...", undo */
Denys Vlasenko4e4f88e2017-01-09 07:57:38 +01001672 char **pp = G.global_argv;
Denis Vlasenko270b1c32009-04-17 18:54:50 +00001673 while (*++pp) /* note: does not free $0 */
1674 free(*pp);
1675 free(G.global_argv);
1676 }
Denys Vlasenko4e4f88e2017-01-09 07:57:38 +01001677#endif
Denis Vlasenko270b1c32009-04-17 18:54:50 +00001678 argv[0] = sv->sv_argv0;
1679 G.global_argv = sv->sv_g_argv;
1680 G.global_argc = sv->sv_g_argc;
Denys Vlasenko4e4f88e2017-01-09 07:57:38 +01001681 IF_HUSH_SET(G.global_args_malloced = sv->sv_g_malloced;)
Denis Vlasenko270b1c32009-04-17 18:54:50 +00001682}
1683
1684
Denis Vlasenkod5762932009-03-31 11:22:57 +00001685/* Basic theory of signal handling in shell
1686 * ========================================
Denis Vlasenko7b830e72009-03-31 13:05:32 +00001687 * This does not describe what hush does, rather, it is current understanding
1688 * what it _should_ do. If it doesn't, it's a bug.
Denis Vlasenkod5762932009-03-31 11:22:57 +00001689 * http://www.opengroup.org/onlinepubs/9699919799/utilities/V3_chap02.html#trap
1690 *
1691 * Signals are handled only after each pipe ("cmd | cmd | cmd" thing)
1692 * is finished or backgrounded. It is the same in interactive and
1693 * non-interactive shells, and is the same regardless of whether
Denis Vlasenko7b830e72009-03-31 13:05:32 +00001694 * a user trap handler is installed or a shell special one is in effect.
Denys Vlasenko69b1cef2009-09-21 10:21:44 +02001695 * ^C or ^Z from keyboard seems to execute "at once" because it usually
Denis Vlasenkod5762932009-03-31 11:22:57 +00001696 * backgrounds (i.e. stops) or kills all members of currently running
1697 * pipe.
1698 *
Denys Vlasenko8bd810b2013-11-28 01:50:01 +01001699 * Wait builtin is interruptible by signals for which user trap is set
Denis Vlasenkod5762932009-03-31 11:22:57 +00001700 * or by SIGINT in interactive shell.
1701 *
1702 * Trap handlers will execute even within trap handlers. (right?)
1703 *
Denys Vlasenkoe89a2412010-01-12 15:19:31 +01001704 * User trap handlers are forgotten when subshell ("(cmd)") is entered,
1705 * except for handlers set to '' (empty string).
Denis Vlasenkod5762932009-03-31 11:22:57 +00001706 *
1707 * If job control is off, backgrounded commands ("cmd &")
Denis Vlasenko7b830e72009-03-31 13:05:32 +00001708 * have SIGINT, SIGQUIT set to SIG_IGN.
Denis Vlasenkod5762932009-03-31 11:22:57 +00001709 *
Denys Vlasenko28a105d2009-06-01 11:26:30 +02001710 * Commands which are run in command substitution ("`cmd`")
Denis Vlasenko7b830e72009-03-31 13:05:32 +00001711 * have SIGTTIN, SIGTTOU, SIGTSTP set to SIG_IGN.
Denis Vlasenkod5762932009-03-31 11:22:57 +00001712 *
Denys Vlasenko4b7db4f2009-05-29 10:39:06 +02001713 * Ordinary commands have signals set to SIG_IGN/DFL as inherited
Denis Vlasenko7b830e72009-03-31 13:05:32 +00001714 * by the shell from its parent.
Denis Vlasenkod5762932009-03-31 11:22:57 +00001715 *
Denys Vlasenko28a105d2009-06-01 11:26:30 +02001716 * Signals which differ from SIG_DFL action
Denis Vlasenko7b830e72009-03-31 13:05:32 +00001717 * (note: child (i.e., [v]forked) shell is not an interactive shell):
Denis Vlasenkod5762932009-03-31 11:22:57 +00001718 *
1719 * SIGQUIT: ignore
1720 * SIGTERM (interactive): ignore
Denis Vlasenko7b830e72009-03-31 13:05:32 +00001721 * SIGHUP (interactive):
1722 * send SIGCONT to stopped jobs, send SIGHUP to all jobs and exit
Denis Vlasenkod5762932009-03-31 11:22:57 +00001723 * SIGTTIN, SIGTTOU, SIGTSTP (if job control is on): ignore
Denis Vlasenkoc4ada792009-04-15 23:29:00 +00001724 * Note that ^Z is handled not by trapping SIGTSTP, but by seeing
1725 * that all pipe members are stopped. Try this in bash:
1726 * while :; do :; done - ^Z does not background it
1727 * (while :; do :; done) - ^Z backgrounds it
Denis Vlasenkod5762932009-03-31 11:22:57 +00001728 * SIGINT (interactive): wait for last pipe, ignore the rest
Denis Vlasenko7b830e72009-03-31 13:05:32 +00001729 * of the command line, show prompt. NB: ^C does not send SIGINT
1730 * to interactive shell while shell is waiting for a pipe,
1731 * since shell is bg'ed (is not in foreground process group).
Denis Vlasenko7b830e72009-03-31 13:05:32 +00001732 * Example 1: this waits 5 sec, but does not execute ls:
1733 * "echo $$; sleep 5; ls -l" + "kill -INT <pid>"
1734 * Example 2: this does not wait and does not execute ls:
1735 * "echo $$; sleep 5 & wait; ls -l" + "kill -INT <pid>"
1736 * Example 3: this does not wait 5 sec, but executes ls:
1737 * "sleep 5; ls -l" + press ^C
Denys Vlasenkob8709032011-05-08 21:20:01 +02001738 * Example 4: this does not wait and does not execute ls:
1739 * "sleep 5 & wait; ls -l" + press ^C
Denis Vlasenkod5762932009-03-31 11:22:57 +00001740 *
1741 * (What happens to signals which are IGN on shell start?)
1742 * (What happens with signal mask on shell start?)
1743 *
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001744 * Old implementation
1745 * ==================
Denis Vlasenkod5762932009-03-31 11:22:57 +00001746 * We use in-kernel pending signal mask to determine which signals were sent.
1747 * We block all signals which we don't want to take action immediately,
1748 * i.e. we block all signals which need to have special handling as described
1749 * above, and all signals which have traps set.
1750 * After each pipe execution, we extract any pending signals via sigtimedwait()
1751 * and act on them.
1752 *
Denys Vlasenko10c01312011-05-11 11:49:21 +02001753 * unsigned special_sig_mask: a mask of such "special" signals
Denis Vlasenkod5762932009-03-31 11:22:57 +00001754 * sigset_t blocked_set: current blocked signal set
1755 *
Denis Vlasenko7b830e72009-03-31 13:05:32 +00001756 * "trap - SIGxxx":
Denys Vlasenko10c01312011-05-11 11:49:21 +02001757 * clear bit in blocked_set unless it is also in special_sig_mask
Denis Vlasenko7b830e72009-03-31 13:05:32 +00001758 * "trap 'cmd' SIGxxx":
1759 * set bit in blocked_set (even if 'cmd' is '')
Denis Vlasenkod5762932009-03-31 11:22:57 +00001760 * after [v]fork, if we plan to be a shell:
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00001761 * unblock signals with special interactive handling
1762 * (child shell is not interactive),
Denys Vlasenkoe89a2412010-01-12 15:19:31 +01001763 * unset all traps except '' (note: regardless of child shell's type - {}, (), etc)
Denis Vlasenkod5762932009-03-31 11:22:57 +00001764 * after [v]fork, if we plan to exec:
Denys Vlasenko69b1cef2009-09-21 10:21:44 +02001765 * POSIX says fork clears pending signal mask in child - no need to clear it.
Denis Vlasenko7b830e72009-03-31 13:05:32 +00001766 * Restore blocked signal set to one inherited by shell just prior to exec.
Denis Vlasenkod5762932009-03-31 11:22:57 +00001767 *
Denis Vlasenko7566bae2009-03-31 17:24:49 +00001768 * Note: as a result, we do not use signal handlers much. The only uses
Denys Vlasenko8d7be232009-05-25 16:38:32 +02001769 * are to count SIGCHLDs
Denis Vlasenko7566bae2009-03-31 17:24:49 +00001770 * and to restore tty pgrp on signal-induced exit.
Denys Vlasenko4ea0ca82009-09-25 12:58:37 +02001771 *
Denys Vlasenko67f71862009-09-25 14:21:06 +02001772 * Note 2 (compat):
Denys Vlasenko4ea0ca82009-09-25 12:58:37 +02001773 * Standard says "When a subshell is entered, traps that are not being ignored
1774 * are set to the default actions". bash interprets it so that traps which
Denys Vlasenkoe89a2412010-01-12 15:19:31 +01001775 * are set to '' (ignore) are NOT reset to defaults. We do the same.
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001776 *
1777 * Problem: the above approach makes it unwieldy to catch signals while
Denys Vlasenkoe95738f2013-07-08 03:13:08 +02001778 * we are in read builtin, or while we read commands from stdin:
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001779 * masked signals are not visible!
1780 *
1781 * New implementation
1782 * ==================
1783 * We record each signal we are interested in by installing signal handler
1784 * for them - a bit like emulating kernel pending signal mask in userspace.
1785 * We are interested in: signals which need to have special handling
1786 * as described above, and all signals which have traps set.
Denys Vlasenko8bd810b2013-11-28 01:50:01 +01001787 * Signals are recorded in pending_set.
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001788 * After each pipe execution, we extract any pending signals
1789 * and act on them.
1790 *
1791 * unsigned special_sig_mask: a mask of shell-special signals.
1792 * unsigned fatal_sig_mask: a mask of signals on which we restore tty pgrp.
1793 * char *traps[sig] if trap for sig is set (even if it's '').
1794 * sigset_t pending_set: set of sigs we received.
1795 *
1796 * "trap - SIGxxx":
1797 * if sig is in special_sig_mask, set handler back to:
1798 * record_pending_signo, or to IGN if it's a tty stop signal
1799 * if sig is in fatal_sig_mask, set handler back to sigexit.
1800 * else: set handler back to SIG_DFL
1801 * "trap 'cmd' SIGxxx":
1802 * set handler to record_pending_signo.
1803 * "trap '' SIGxxx":
1804 * set handler to SIG_IGN.
1805 * after [v]fork, if we plan to be a shell:
1806 * set signals with special interactive handling to SIG_DFL
1807 * (because child shell is not interactive),
1808 * unset all traps except '' (note: regardless of child shell's type - {}, (), etc)
1809 * after [v]fork, if we plan to exec:
1810 * POSIX says fork clears pending signal mask in child - no need to clear it.
1811 *
1812 * To make wait builtin interruptible, we handle SIGCHLD as special signal,
1813 * otherwise (if we leave it SIG_DFL) sigsuspend in wait builtin will not wake up on it.
1814 *
1815 * Note (compat):
1816 * Standard says "When a subshell is entered, traps that are not being ignored
1817 * are set to the default actions". bash interprets it so that traps which
1818 * are set to '' (ignore) are NOT reset to defaults. We do the same.
Denis Vlasenkod5762932009-03-31 11:22:57 +00001819 */
Denis Vlasenkoe4bd4f22009-04-17 13:52:51 +00001820enum {
1821 SPECIAL_INTERACTIVE_SIGS = 0
Denis Vlasenkoe4bd4f22009-04-17 13:52:51 +00001822 | (1 << SIGTERM)
Denis Vlasenkoe4bd4f22009-04-17 13:52:51 +00001823 | (1 << SIGINT)
Denis Vlasenkoc8653f62009-04-27 23:29:14 +00001824 | (1 << SIGHUP)
1825 ,
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001826 SPECIAL_JOBSTOP_SIGS = 0
Mike Frysinger38478a62009-05-20 04:48:06 -04001827#if ENABLE_HUSH_JOB
Denis Vlasenkoc8653f62009-04-27 23:29:14 +00001828 | (1 << SIGTTIN)
1829 | (1 << SIGTTOU)
1830 | (1 << SIGTSTP)
1831#endif
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001832 ,
Denis Vlasenkoe4bd4f22009-04-17 13:52:51 +00001833};
Denis Vlasenkod5762932009-03-31 11:22:57 +00001834
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001835static void record_pending_signo(int sig)
Denys Vlasenko54e9e122011-05-09 00:52:15 +02001836{
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001837 sigaddset(&G.pending_set, sig);
Denys Vlasenko8d7be232009-05-25 16:38:32 +02001838#if ENABLE_HUSH_FAST
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001839 if (sig == SIGCHLD) {
1840 G.count_SIGCHLD++;
Denys Vlasenko8d7be232009-05-25 16:38:32 +02001841//bb_error_msg("[%d] SIGCHLD_handler: G.count_SIGCHLD:%d G.handled_SIGCHLD:%d", getpid(), G.count_SIGCHLD, G.handled_SIGCHLD);
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001842 }
Denys Vlasenko8d7be232009-05-25 16:38:32 +02001843#endif
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001844}
Denis Vlasenko7566bae2009-03-31 17:24:49 +00001845
Denys Vlasenko0806e402011-05-12 23:06:20 +02001846static sighandler_t install_sighandler(int sig, sighandler_t handler)
1847{
1848 struct sigaction old_sa;
1849
1850 /* We could use signal() to install handlers... almost:
1851 * except that we need to mask ALL signals while handlers run.
1852 * I saw signal nesting in strace, race window isn't small.
1853 * SA_RESTART is also needed, but in Linux, signal()
1854 * sets SA_RESTART too.
1855 */
1856 /* memset(&G.sa, 0, sizeof(G.sa)); - already done */
1857 /* sigfillset(&G.sa.sa_mask); - already done */
1858 /* G.sa.sa_flags = SA_RESTART; - already done */
1859 G.sa.sa_handler = handler;
1860 sigaction(sig, &G.sa, &old_sa);
1861 return old_sa.sa_handler;
1862}
1863
Denys Vlasenkoe9abe752016-08-19 20:15:26 +02001864static void hush_exit(int exitcode) NORETURN;
Denys Vlasenkoe9abe752016-08-19 20:15:26 +02001865
Denys Vlasenkob6afcc72016-12-12 16:30:20 +01001866static void restore_ttypgrp_and__exit(void) NORETURN;
Denys Vlasenkoe9abe752016-08-19 20:15:26 +02001867static void restore_ttypgrp_and__exit(void)
1868{
1869 /* xfunc has failed! die die die */
1870 /* no EXIT traps, this is an escape hatch! */
1871 G.exiting = 1;
1872 hush_exit(xfunc_error_retval);
1873}
1874
Denys Vlasenkob6afcc72016-12-12 16:30:20 +01001875#if ENABLE_HUSH_JOB
1876
Denys Vlasenkoe9abe752016-08-19 20:15:26 +02001877/* Needed only on some libc:
1878 * It was observed that on exit(), fgetc'ed buffered data
1879 * gets "unwound" via lseek(fd, -NUM, SEEK_CUR).
1880 * With the net effect that even after fork(), not vfork(),
1881 * exit() in NOEXECed applet in "sh SCRIPT":
1882 * noexec_applet_here
1883 * echo END_OF_SCRIPT
1884 * lseeks fd in input FILE object from EOF to "e" in "echo END_OF_SCRIPT".
1885 * This makes "echo END_OF_SCRIPT" executed twice.
Denys Vlasenko39701202017-08-02 19:44:05 +02001886 * Similar problems can be seen with msg_and_die_if_script() -> xfunc_die()
Denys Vlasenkoe9abe752016-08-19 20:15:26 +02001887 * and in `cmd` handling.
1888 * If set as die_func(), this makes xfunc_die() exit via _exit(), not exit():
1889 */
Denys Vlasenkob6afcc72016-12-12 16:30:20 +01001890static void fflush_and__exit(void) NORETURN;
Denys Vlasenkoe9abe752016-08-19 20:15:26 +02001891static void fflush_and__exit(void)
1892{
1893 fflush_all();
1894 _exit(xfunc_error_retval);
1895}
1896
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00001897/* After [v]fork, in child: do not restore tty pgrp on xfunc death */
Denys Vlasenkoe9abe752016-08-19 20:15:26 +02001898# define disable_restore_tty_pgrp_on_exit() (die_func = fflush_and__exit)
Denis Vlasenko25af86f2009-04-07 13:29:27 +00001899/* After [v]fork, in parent: restore tty pgrp on xfunc death */
Denys Vlasenkoe9abe752016-08-19 20:15:26 +02001900# define enable_restore_tty_pgrp_on_exit() (die_func = restore_ttypgrp_and__exit)
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00001901
Denis Vlasenko54e7ffb2007-04-21 00:03:36 +00001902/* Restores tty foreground process group, and exits.
1903 * May be called as signal handler for fatal signal
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00001904 * (will resend signal to itself, producing correct exit state)
Denis Vlasenko54e7ffb2007-04-21 00:03:36 +00001905 * or called directly with -EXITCODE.
Denys Vlasenkoe9abe752016-08-19 20:15:26 +02001906 * We also call it if xfunc is exiting.
1907 */
Denis Vlasenkoa60f84e2008-07-05 09:18:54 +00001908static void sigexit(int sig) NORETURN;
Denis Vlasenko54e7ffb2007-04-21 00:03:36 +00001909static void sigexit(int sig)
1910{
Denis Vlasenkoabedaac2009-03-31 12:03:40 +00001911 /* Careful: we can end up here after [v]fork. Do not restore
Denis Vlasenko7b830e72009-03-31 13:05:32 +00001912 * tty pgrp then, only top-level shell process does that */
Denys Vlasenkoebc1ee22011-05-12 10:59:18 +02001913 if (G_saved_tty_pgrp && getpid() == G.root_pid) {
1914 /* Disable all signals: job control, SIGPIPE, etc.
1915 * Mostly paranoid measure, to prevent infinite SIGTTOU.
1916 */
1917 sigprocmask_allsigs(SIG_BLOCK);
Mike Frysinger38478a62009-05-20 04:48:06 -04001918 tcsetpgrp(G_interactive_fd, G_saved_tty_pgrp);
Denys Vlasenkoebc1ee22011-05-12 10:59:18 +02001919 }
Denis Vlasenko54e7ffb2007-04-21 00:03:36 +00001920
1921 /* Not a signal, just exit */
1922 if (sig <= 0)
1923 _exit(- sig);
1924
Denis Vlasenko400d8bb2008-02-24 13:36:01 +00001925 kill_myself_with_sig(sig); /* does not return */
Denis Vlasenko54e7ffb2007-04-21 00:03:36 +00001926}
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00001927#else
1928
Denys Vlasenko8391c482010-05-22 17:50:43 +02001929# define disable_restore_tty_pgrp_on_exit() ((void)0)
1930# define enable_restore_tty_pgrp_on_exit() ((void)0)
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00001931
Denis Vlasenkoe0755e52009-04-03 21:16:45 +00001932#endif
Denis Vlasenkob81b3df2007-04-28 16:48:04 +00001933
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001934static sighandler_t pick_sighandler(unsigned sig)
1935{
1936 sighandler_t handler = SIG_DFL;
1937 if (sig < sizeof(unsigned)*8) {
1938 unsigned sigmask = (1 << sig);
1939
1940#if ENABLE_HUSH_JOB
Denys Vlasenko75e77de2011-05-12 13:12:47 +02001941 /* is sig fatal? */
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001942 if (G_fatal_sig_mask & sigmask)
1943 handler = sigexit;
Denys Vlasenko75e77de2011-05-12 13:12:47 +02001944 else
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001945#endif
1946 /* sig has special handling? */
Denys Vlasenko75e77de2011-05-12 13:12:47 +02001947 if (G.special_sig_mask & sigmask) {
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001948 handler = record_pending_signo;
Denys Vlasenko0c40a732011-05-12 09:50:12 +02001949 /* TTIN/TTOU/TSTP can't be set to record_pending_signo
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001950 * in order to ignore them: they will be raised
Denys Vlasenkof58f7052011-05-12 02:10:33 +02001951 * in an endless loop when we try to do some
1952 * terminal ioctls! We do have to _ignore_ these.
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001953 */
1954 if (SPECIAL_JOBSTOP_SIGS & sigmask)
1955 handler = SIG_IGN;
Denys Vlasenko0c40a732011-05-12 09:50:12 +02001956 }
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02001957 }
1958 return handler;
1959}
1960
Mike Frysinger9f8128f2009-03-29 23:49:37 +00001961/* Restores tty foreground process group, and exits. */
Mike Frysinger9f8128f2009-03-29 23:49:37 +00001962static void hush_exit(int exitcode)
1963{
Denys Vlasenkobede2152011-09-04 16:12:33 +02001964#if ENABLE_FEATURE_EDITING_SAVE_ON_EXIT
1965 save_history(G.line_input_state);
1966#endif
1967
Denys Vlasenko8ee2ada2011-02-07 02:03:51 +01001968 fflush_all();
Denys Vlasenko7a85c602017-01-08 17:40:18 +01001969 if (G.exiting <= 0 && G_traps && G_traps[0] && G_traps[0][0]) {
Denys Vlasenko27c56f12010-09-07 09:56:34 +02001970 char *argv[3];
1971 /* argv[0] is unused */
Denys Vlasenko46f839c2018-01-19 16:58:44 +01001972 argv[1] = xstrdup(G_traps[0]); /* copy, since EXIT trap handler may modify G_traps[0] */
Denys Vlasenko27c56f12010-09-07 09:56:34 +02001973 argv[2] = NULL;
Denys Vlasenkoa110c902010-09-12 15:38:04 +02001974 G.exiting = 1; /* prevent EXIT trap recursion */
Denys Vlasenko7a85c602017-01-08 17:40:18 +01001975 /* Note: G_traps[0] is not cleared!
Denys Vlasenkode8c3f62010-09-12 16:13:44 +02001976 * "trap" will still show it, if executed
1977 * in the handler */
1978 builtin_eval(argv);
Denis Vlasenkod5762932009-03-31 11:22:57 +00001979 }
Mike Frysinger9f8128f2009-03-29 23:49:37 +00001980
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01001981#if ENABLE_FEATURE_CLEAN_UP
1982 {
1983 struct variable *cur_var;
1984 if (G.cwd != bb_msg_unknown)
1985 free((char*)G.cwd);
1986 cur_var = G.top_var;
1987 while (cur_var) {
1988 struct variable *tmp = cur_var;
1989 if (!cur_var->max_len)
1990 free(cur_var->varstr);
1991 cur_var = cur_var->next;
1992 free(tmp);
1993 }
1994 }
1995#endif
1996
Denys Vlasenko8131eea2009-11-02 14:19:51 +01001997 fflush_all();
Denys Vlasenko215b0ca2016-08-19 18:23:56 +02001998#if ENABLE_HUSH_JOB
Denis Vlasenkoabedaac2009-03-31 12:03:40 +00001999 sigexit(- (exitcode & 0xff));
2000#else
Denys Vlasenko215b0ca2016-08-19 18:23:56 +02002001 _exit(exitcode);
Denis Vlasenkoabedaac2009-03-31 12:03:40 +00002002#endif
Mike Frysinger9f8128f2009-03-29 23:49:37 +00002003}
2004
Denys Vlasenkoacd5bc82010-09-12 15:05:39 +02002005
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02002006//TODO: return a mask of ALL handled sigs?
2007static int check_and_run_traps(void)
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002008{
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002009 int last_sig = 0;
2010
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002011 while (1) {
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02002012 int sig;
Denys Vlasenko80542ba2011-05-08 21:23:43 +02002013
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02002014 if (sigisemptyset(&G.pending_set))
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002015 break;
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02002016 sig = 0;
2017 do {
2018 sig++;
2019 if (sigismember(&G.pending_set, sig)) {
2020 sigdelset(&G.pending_set, sig);
2021 goto got_sig;
2022 }
2023 } while (sig < NSIG);
2024 break;
Denys Vlasenkob8709032011-05-08 21:20:01 +02002025 got_sig:
Denys Vlasenko7a85c602017-01-08 17:40:18 +01002026 if (G_traps && G_traps[sig]) {
Denys Vlasenko04b46bc2016-10-01 22:28:03 +02002027 debug_printf_exec("%s: sig:%d handler:'%s'\n", __func__, sig, G.traps[sig]);
Denys Vlasenko7a85c602017-01-08 17:40:18 +01002028 if (G_traps[sig][0]) {
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002029 /* We have user-defined handler */
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02002030 smalluint save_rcode;
Denys Vlasenko27c56f12010-09-07 09:56:34 +02002031 char *argv[3];
2032 /* argv[0] is unused */
Denys Vlasenko749575d2018-01-30 04:29:03 +01002033 argv[1] = xstrdup(G_traps[sig]);
2034 /* why strdup? trap can modify itself: trap 'trap "echo oops" INT' INT */
Denys Vlasenko27c56f12010-09-07 09:56:34 +02002035 argv[2] = NULL;
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002036 save_rcode = G.last_exitcode;
2037 builtin_eval(argv);
Denys Vlasenko749575d2018-01-30 04:29:03 +01002038 free(argv[1]);
Denys Vlasenko8660aeb2016-11-24 17:44:02 +01002039//FIXME: shouldn't it be set to 128 + sig instead?
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002040 G.last_exitcode = save_rcode;
Denys Vlasenkob8709032011-05-08 21:20:01 +02002041 last_sig = sig;
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002042 } /* else: "" trap, ignoring signal */
2043 continue;
2044 }
2045 /* not a trap: special action */
2046 switch (sig) {
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002047 case SIGINT:
Denys Vlasenko04b46bc2016-10-01 22:28:03 +02002048 debug_printf_exec("%s: sig:%d default SIGINT handler\n", __func__, sig);
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002049 G.flag_SIGINT = 1;
Denys Vlasenkob8709032011-05-08 21:20:01 +02002050 last_sig = sig;
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002051 break;
2052#if ENABLE_HUSH_JOB
2053 case SIGHUP: {
Denys Vlasenko49e6bf22017-08-04 14:28:16 +02002054//TODO: why are we doing this? ash and dash don't do this,
2055//they have no handler for SIGHUP at all,
2056//they rely on kernel to send SIGHUP+SIGCONT to orphaned process groups
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002057 struct pipe *job;
Denys Vlasenko04b46bc2016-10-01 22:28:03 +02002058 debug_printf_exec("%s: sig:%d default SIGHUP handler\n", __func__, sig);
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002059 /* bash is observed to signal whole process groups,
2060 * not individual processes */
2061 for (job = G.job_list; job; job = job->next) {
2062 if (job->pgrp <= 0)
2063 continue;
2064 debug_printf_exec("HUPing pgrp %d\n", job->pgrp);
2065 if (kill(- job->pgrp, SIGHUP) == 0)
2066 kill(- job->pgrp, SIGCONT);
2067 }
2068 sigexit(SIGHUP);
2069 }
2070#endif
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02002071#if ENABLE_HUSH_FAST
2072 case SIGCHLD:
Denys Vlasenko04b46bc2016-10-01 22:28:03 +02002073 debug_printf_exec("%s: sig:%d default SIGCHLD handler\n", __func__, sig);
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02002074 G.count_SIGCHLD++;
2075//bb_error_msg("[%d] check_and_run_traps: G.count_SIGCHLD:%d G.handled_SIGCHLD:%d", getpid(), G.count_SIGCHLD, G.handled_SIGCHLD);
2076 /* Note:
Denys Vlasenko10ad6222017-04-17 16:13:32 +02002077 * We don't do 'last_sig = sig' here -> NOT returning this sig.
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02002078 * This simplifies wait builtin a bit.
2079 */
2080 break;
2081#endif
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002082 default: /* ignored: */
Denys Vlasenko04b46bc2016-10-01 22:28:03 +02002083 debug_printf_exec("%s: sig:%d default handling is to ignore\n", __func__, sig);
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002084 /* SIGTERM, SIGQUIT, SIGTTIN, SIGTTOU, SIGTSTP */
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02002085 /* Note:
Denys Vlasenko10ad6222017-04-17 16:13:32 +02002086 * We don't do 'last_sig = sig' here -> NOT returning this sig.
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02002087 * Example: wait is not interrupted by TERM
Denys Vlasenkob8709032011-05-08 21:20:01 +02002088 * in interactive shell, because TERM is ignored.
2089 */
Denis Vlasenko6b9e0532009-04-18 01:23:21 +00002090 break;
2091 }
2092 }
2093 return last_sig;
2094}
2095
Denis Vlasenkob81b3df2007-04-28 16:48:04 +00002096
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02002097static const char *get_cwd(int force)
Eric Andersen9ffb7dd2001-05-19 03:00:46 +00002098{
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02002099 if (force || G.cwd == NULL) {
2100 /* xrealloc_getcwd_or_warn(arg) calls free(arg),
2101 * we must not try to free(bb_msg_unknown) */
2102 if (G.cwd == bb_msg_unknown)
2103 G.cwd = NULL;
2104 G.cwd = xrealloc_getcwd_or_warn((char *)G.cwd);
2105 if (!G.cwd)
2106 G.cwd = bb_msg_unknown;
2107 }
Denis Vlasenko87a86552008-07-29 19:43:10 +00002108 return G.cwd;
Eric Andersen9ffb7dd2001-05-19 03:00:46 +00002109}
2110
Denis Vlasenko83506862007-11-23 13:11:42 +00002111
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002112/*
2113 * Shell and environment variable support
2114 */
Denys Vlasenko27c56f12010-09-07 09:56:34 +02002115static struct variable **get_ptr_to_local_var(const char *name, unsigned len)
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002116{
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002117 struct variable **pp;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002118 struct variable *cur;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002119
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002120 pp = &G.top_var;
2121 while ((cur = *pp) != NULL) {
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002122 if (strncmp(cur->varstr, name, len) == 0 && cur->varstr[len] == '=')
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002123 return pp;
2124 pp = &cur->next;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002125 }
2126 return NULL;
2127}
2128
Denys Vlasenko03dad222010-01-12 23:29:57 +01002129static const char* FAST_FUNC get_local_var_value(const char *name)
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002130{
Denys Vlasenko29082232010-07-16 13:52:32 +02002131 struct variable **vpp;
Denys Vlasenko27c56f12010-09-07 09:56:34 +02002132 unsigned len = strlen(name);
Denys Vlasenko29082232010-07-16 13:52:32 +02002133
2134 if (G.expanded_assignments) {
2135 char **cpp = G.expanded_assignments;
Denys Vlasenko29082232010-07-16 13:52:32 +02002136 while (*cpp) {
2137 char *cp = *cpp;
2138 if (strncmp(cp, name, len) == 0 && cp[len] == '=')
2139 return cp + len + 1;
2140 cpp++;
2141 }
2142 }
2143
Denys Vlasenko27c56f12010-09-07 09:56:34 +02002144 vpp = get_ptr_to_local_var(name, len);
Denys Vlasenko29082232010-07-16 13:52:32 +02002145 if (vpp)
Denys Vlasenko27c56f12010-09-07 09:56:34 +02002146 return (*vpp)->varstr + len + 1;
Denys Vlasenko29082232010-07-16 13:52:32 +02002147
Denys Vlasenkodea47882009-10-09 15:40:49 +02002148 if (strcmp(name, "PPID") == 0)
2149 return utoa(G.root_ppid);
2150 // bash compat: UID? EUID?
Denys Vlasenko20b3d142009-10-09 20:59:39 +02002151#if ENABLE_HUSH_RANDOM_SUPPORT
Denys Vlasenko27c56f12010-09-07 09:56:34 +02002152 if (strcmp(name, "RANDOM") == 0)
Denys Vlasenko20b3d142009-10-09 20:59:39 +02002153 return utoa(next_random(&G.random_gen));
2154#endif
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002155 return NULL;
2156}
2157
Denys Vlasenkocf079ff2018-04-06 14:50:12 +02002158static void handle_changed_special_names(const char *name, unsigned name_len)
2159{
Denys Vlasenkof5018da2018-04-06 17:58:21 +02002160 if (ENABLE_HUSH_INTERACTIVE && ENABLE_FEATURE_EDITING_FANCY_PROMPT
2161 && name_len == 3 && name[0] == 'P' && name[1] == 'S'
2162 ) {
Denys Vlasenkocf079ff2018-04-06 14:50:12 +02002163 cmdedit_update_prompt();
2164 return;
2165 }
2166
2167 if ((ENABLE_HUSH_LINENO_VAR || ENABLE_HUSH_GETOPTS)
2168 && name_len == 6
2169 ) {
2170#if ENABLE_HUSH_LINENO_VAR
Denys Vlasenko00bd7672018-04-06 14:57:53 +02002171 if (strncmp(name, "LINENO", 6) == 0) {
Denys Vlasenkocf079ff2018-04-06 14:50:12 +02002172 G.lineno_var = NULL;
Denys Vlasenko00bd7672018-04-06 14:57:53 +02002173 return;
2174 }
Denys Vlasenkocf079ff2018-04-06 14:50:12 +02002175#endif
2176#if ENABLE_HUSH_GETOPTS
Denys Vlasenko00bd7672018-04-06 14:57:53 +02002177 if (strncmp(name, "OPTIND", 6) == 0) {
Denys Vlasenkocf079ff2018-04-06 14:50:12 +02002178 G.getopt_count = 0;
Denys Vlasenko00bd7672018-04-06 14:57:53 +02002179 return;
2180 }
Denys Vlasenkocf079ff2018-04-06 14:50:12 +02002181#endif
2182 }
2183}
2184
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002185/* str holds "NAME=VAL" and is expected to be malloced.
Mike Frysinger6379bb42009-03-28 18:55:03 +00002186 * We take ownership of it.
Mike Frysinger6379bb42009-03-28 18:55:03 +00002187 */
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02002188#define SETFLAG_EXPORT (1 << 0)
2189#define SETFLAG_UNEXPORT (1 << 1)
2190#define SETFLAG_MAKE_RO (1 << 2)
Denys Vlasenko332e4112018-04-04 22:32:59 +02002191#define SETFLAG_VARLVL_SHIFT 3
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02002192static int set_local_var(char *str, unsigned flags)
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002193{
Denys Vlasenko61407802018-04-04 21:14:28 +02002194 struct variable **cur_pp;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002195 struct variable *cur;
Denys Vlasenkoa7693902016-10-03 15:01:06 +02002196 char *free_me = NULL;
Denis Vlasenko950bd722009-04-21 11:23:56 +00002197 char *eq_sign;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002198 int name_len;
Denys Vlasenko332e4112018-04-04 22:32:59 +02002199 unsigned local_lvl = (flags >> SETFLAG_VARLVL_SHIFT);
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002200
Denis Vlasenko950bd722009-04-21 11:23:56 +00002201 eq_sign = strchr(str, '=');
Denys Vlasenko929a41d2018-04-05 14:09:14 +02002202 if (HUSH_DEBUG && !eq_sign)
2203 bb_error_msg_and_die("BUG in setvar");
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002204
Denis Vlasenko950bd722009-04-21 11:23:56 +00002205 name_len = eq_sign - str + 1; /* including '=' */
Denys Vlasenko61407802018-04-04 21:14:28 +02002206 cur_pp = &G.top_var;
2207 while ((cur = *cur_pp) != NULL) {
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002208 if (strncmp(cur->varstr, str, name_len) != 0) {
Denys Vlasenko61407802018-04-04 21:14:28 +02002209 cur_pp = &cur->next;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002210 continue;
2211 }
Denys Vlasenkoa7693902016-10-03 15:01:06 +02002212
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002213 /* We found an existing var with this name */
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002214 if (cur->flg_read_only) {
Denys Vlasenko6b48e1f2017-07-17 21:31:17 +02002215 bb_error_msg("%s: readonly variable", str);
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002216 free(str);
Denys Vlasenko5b2cc0a2017-07-18 02:44:06 +02002217//NOTE: in bash, assignment in "export READONLY_VAR=Z" fails, and sets $?=1,
2218//but export per se succeeds (does put the var in env). We don't mimic that.
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002219 return -1;
2220 }
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02002221 if (flags & SETFLAG_UNEXPORT) { // && cur->flg_export ?
Denis Vlasenko950bd722009-04-21 11:23:56 +00002222 debug_printf_env("%s: unsetenv '%s'\n", __func__, str);
2223 *eq_sign = '\0';
2224 unsetenv(str);
2225 *eq_sign = '=';
2226 }
Denys Vlasenko332e4112018-04-04 22:32:59 +02002227 if (cur->var_nest_level < local_lvl) {
Denys Vlasenko295fef82009-06-03 12:47:26 +02002228 /* bash 3.2.33(1) and exported vars:
2229 * # export z=z
2230 * # f() { local z=a; env | grep ^z; }
2231 * # f
2232 * z=a
2233 * # env | grep ^z
2234 * z=z
2235 */
2236 if (cur->flg_export)
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02002237 flags |= SETFLAG_EXPORT;
Denys Vlasenko929a41d2018-04-05 14:09:14 +02002238 /* New variable is local ("local VAR=VAL" or
2239 * "VAR=VAL cmd")
2240 * and existing one is global, or local
2241 * on a lower level that new one.
2242 * Remove it from global variable list:
2243 */
2244 *cur_pp = cur->next;
2245 if (G.shadowed_vars_pp) {
2246 /* Save in "shadowed" list */
2247 debug_printf_env("shadowing %s'%s'/%u by '%s'/%u\n",
2248 cur->flg_export ? "exported " : "",
2249 cur->varstr, cur->var_nest_level, str, local_lvl
2250 );
2251 cur->next = *G.shadowed_vars_pp;
2252 *G.shadowed_vars_pp = cur;
2253 } else {
2254 /* Came from pseudo_exec_argv(), no need to save: delete it */
2255 debug_printf_env("shadow-deleting %s'%s'/%u by '%s'/%u\n",
2256 cur->flg_export ? "exported " : "",
2257 cur->varstr, cur->var_nest_level, str, local_lvl
2258 );
2259 if (cur->max_len == 0) /* allocated "VAR=VAL"? */
2260 free_me = cur->varstr; /* then free it later */
2261 free(cur);
2262 }
Denys Vlasenko295fef82009-06-03 12:47:26 +02002263 break;
2264 }
Denys Vlasenko332e4112018-04-04 22:32:59 +02002265
Denis Vlasenko950bd722009-04-21 11:23:56 +00002266 if (strcmp(cur->varstr + name_len, eq_sign + 1) == 0) {
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02002267 debug_printf_env("assignement '%s' does not change anything\n", str);
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002268 free_and_exp:
2269 free(str);
2270 goto exp;
2271 }
Denys Vlasenko929a41d2018-04-05 14:09:14 +02002272
2273 /* Replace the value in the found "struct variable" */
Denys Vlasenko295fef82009-06-03 12:47:26 +02002274 if (cur->max_len != 0) {
Denys Vlasenko929a41d2018-04-05 14:09:14 +02002275 if (cur->max_len >= strnlen(str, cur->max_len + 1)) {
Denys Vlasenko295fef82009-06-03 12:47:26 +02002276 /* This one is from startup env, reuse space */
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02002277 debug_printf_env("reusing startup env for '%s'\n", str);
Denys Vlasenko295fef82009-06-03 12:47:26 +02002278 strcpy(cur->varstr, str);
2279 goto free_and_exp;
2280 }
Denys Vlasenkoa7693902016-10-03 15:01:06 +02002281 /* Can't reuse */
2282 cur->max_len = 0;
2283 goto set_str_and_exp;
Denys Vlasenko295fef82009-06-03 12:47:26 +02002284 }
Denys Vlasenkoa7693902016-10-03 15:01:06 +02002285 /* max_len == 0 signifies "malloced" var, which we can
2286 * (and have to) free. But we can't free(cur->varstr) here:
2287 * if cur->flg_export is 1, it is in the environment.
2288 * We should either unsetenv+free, or wait until putenv,
2289 * then putenv(new)+free(old).
2290 */
2291 free_me = cur->varstr;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002292 goto set_str_and_exp;
2293 }
2294
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02002295 /* Not found or shadowed - create new variable struct */
Denys Vlasenko9db344a2018-04-09 19:05:11 +02002296 debug_printf_env("%s: alloc new var '%s'/%u\n", __func__, str, local_lvl);
Denys Vlasenko295fef82009-06-03 12:47:26 +02002297 cur = xzalloc(sizeof(*cur));
Denys Vlasenko332e4112018-04-04 22:32:59 +02002298 cur->var_nest_level = local_lvl;
Denys Vlasenko61407802018-04-04 21:14:28 +02002299 cur->next = *cur_pp;
2300 *cur_pp = cur;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002301
2302 set_str_and_exp:
2303 cur->varstr = str;
2304 exp:
Denys Vlasenko1e660422017-07-17 21:10:50 +02002305#if !BB_MMU || ENABLE_HUSH_READONLY
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02002306 if (flags & SETFLAG_MAKE_RO) {
2307 cur->flg_read_only = 1;
Denys Vlasenko1e660422017-07-17 21:10:50 +02002308 }
2309#endif
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02002310 if (flags & SETFLAG_EXPORT)
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002311 cur->flg_export = 1;
2312 if (cur->flg_export) {
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02002313 if (flags & SETFLAG_UNEXPORT) {
Denis Vlasenkoad4bd052009-04-20 22:04:21 +00002314 cur->flg_export = 0;
2315 /* unsetenv was already done */
2316 } else {
Denys Vlasenkoa7693902016-10-03 15:01:06 +02002317 int i;
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02002318 debug_printf_env("%s: putenv '%s'/%u\n", __func__, cur->varstr, cur->var_nest_level);
Denys Vlasenkoa7693902016-10-03 15:01:06 +02002319 i = putenv(cur->varstr);
2320 /* only now we can free old exported malloced string */
2321 free(free_me);
2322 return i;
Denis Vlasenkoad4bd052009-04-20 22:04:21 +00002323 }
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002324 }
Denys Vlasenkoa7693902016-10-03 15:01:06 +02002325 free(free_me);
Denys Vlasenko929a41d2018-04-05 14:09:14 +02002326
Denys Vlasenkocf079ff2018-04-06 14:50:12 +02002327 handle_changed_special_names(cur->varstr, name_len - 1);
Denys Vlasenko929a41d2018-04-05 14:09:14 +02002328
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002329 return 0;
2330}
2331
Denys Vlasenko6db47842009-09-05 20:15:17 +02002332/* Used at startup and after each cd */
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02002333static void set_pwd_var(unsigned flag)
Denys Vlasenko6db47842009-09-05 20:15:17 +02002334{
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02002335 set_local_var(xasprintf("PWD=%s", get_cwd(/*force:*/ 1)), flag);
Denys Vlasenko6db47842009-09-05 20:15:17 +02002336}
2337
Denys Vlasenko35a017c2018-06-26 18:27:54 +02002338#if ENABLE_HUSH_UNSET || ENABLE_HUSH_GETOPTS
Denys Vlasenkoacdc49c2009-05-04 01:58:10 +02002339static int unset_local_var_len(const char *name, int name_len)
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002340{
2341 struct variable *cur;
Denys Vlasenko61407802018-04-04 21:14:28 +02002342 struct variable **cur_pp;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002343
Denys Vlasenko61407802018-04-04 21:14:28 +02002344 cur_pp = &G.top_var;
2345 while ((cur = *cur_pp) != NULL) {
Denys Vlasenkocf079ff2018-04-06 14:50:12 +02002346 if (strncmp(cur->varstr, name, name_len) == 0
2347 && cur->varstr[name_len] == '='
2348 ) {
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002349 if (cur->flg_read_only) {
2350 bb_error_msg("%s: readonly variable", name);
Mike Frysingerd690f682009-03-30 06:50:54 +00002351 return EXIT_FAILURE;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002352 }
Denys Vlasenkocf079ff2018-04-06 14:50:12 +02002353
Denys Vlasenko61407802018-04-04 21:14:28 +02002354 *cur_pp = cur->next;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002355 debug_printf_env("%s: unsetenv '%s'\n", __func__, cur->varstr);
2356 bb_unsetenv(cur->varstr);
2357 if (!cur->max_len)
2358 free(cur->varstr);
2359 free(cur);
Denys Vlasenkocf079ff2018-04-06 14:50:12 +02002360
Denys Vlasenkof5018da2018-04-06 17:58:21 +02002361 break;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002362 }
Denys Vlasenko61407802018-04-04 21:14:28 +02002363 cur_pp = &cur->next;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002364 }
Denys Vlasenkof5018da2018-04-06 17:58:21 +02002365
2366 /* Handle "unset PS1" et al even if did not find the variable to unset */
2367 handle_changed_special_names(name, name_len);
2368
Mike Frysingerd690f682009-03-30 06:50:54 +00002369 return EXIT_SUCCESS;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002370}
2371
Denys Vlasenkoacdc49c2009-05-04 01:58:10 +02002372static int unset_local_var(const char *name)
2373{
2374 return unset_local_var_len(name, strlen(name));
2375}
Denys Vlasenko10d5ece2017-01-08 18:28:43 +01002376#endif
Denys Vlasenkoacdc49c2009-05-04 01:58:10 +02002377
Denys Vlasenkob2b14cb2018-06-26 18:09:22 +02002378#if BASH_HOSTNAME_VAR || ENABLE_FEATURE_SH_MATH || ENABLE_HUSH_READ || ENABLE_HUSH_GETOPTS \
2379 || (ENABLE_HUSH_INTERACTIVE && ENABLE_FEATURE_EDITING_FANCY_PROMPT)
Denys Vlasenko03dad222010-01-12 23:29:57 +01002380static void FAST_FUNC set_local_var_from_halves(const char *name, const char *val)
Mike Frysinger98c52642009-04-02 10:02:37 +00002381{
Denis Vlasenkob29eb6e2009-04-02 13:46:27 +00002382 char *var = xasprintf("%s=%s", name, val);
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02002383 set_local_var(var, /*flag:*/ 0);
Mike Frysinger98c52642009-04-02 10:02:37 +00002384}
Denys Vlasenkocc2fd5a2017-01-09 06:19:55 +01002385#endif
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002386
Denis Vlasenkob29eb6e2009-04-02 13:46:27 +00002387
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002388/*
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002389 * Helpers for "var1=val1 var2=val2 cmd" feature
2390 */
2391static void add_vars(struct variable *var)
2392{
2393 struct variable *next;
2394
2395 while (var) {
2396 next = var->next;
2397 var->next = G.top_var;
2398 G.top_var = var;
Denys Vlasenkoacdc49c2009-05-04 01:58:10 +02002399 if (var->flg_export) {
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02002400 debug_printf_env("%s: restoring exported '%s'/%u\n", __func__, var->varstr, var->var_nest_level);
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002401 putenv(var->varstr);
Denys Vlasenkoacdc49c2009-05-04 01:58:10 +02002402 } else {
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02002403 debug_printf_env("%s: restoring variable '%s'/%u\n", __func__, var->varstr, var->var_nest_level);
Denys Vlasenkoacdc49c2009-05-04 01:58:10 +02002404 }
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002405 var = next;
2406 }
2407}
2408
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02002409/* We put strings[i] into variable table and possibly putenv them.
2410 * If variable is read only, we can free the strings[i]
2411 * which attempts to overwrite it.
2412 * The strings[] vector itself is freed.
2413 */
Denys Vlasenko929a41d2018-04-05 14:09:14 +02002414static void set_vars_and_save_old(char **strings)
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002415{
2416 char **s;
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002417
2418 if (!strings)
Denys Vlasenko929a41d2018-04-05 14:09:14 +02002419 return;
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02002420
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002421 s = strings;
2422 while (*s) {
2423 struct variable *var_p;
2424 struct variable **var_pp;
2425 char *eq;
2426
2427 eq = strchr(*s, '=');
Denys Vlasenkoe36a5892018-07-18 16:12:23 +02002428 if (HUSH_DEBUG && !eq)
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02002429 bb_error_msg_and_die("BUG in varexp4");
Denys Vlasenkoe36a5892018-07-18 16:12:23 +02002430 var_pp = get_ptr_to_local_var(*s, eq - *s);
2431 if (var_pp) {
2432 var_p = *var_pp;
2433 if (var_p->flg_read_only) {
2434 char **p;
2435 bb_error_msg("%s: readonly variable", *s);
2436 /*
2437 * "VAR=V BLTIN" unsets VARs after BLTIN completes.
2438 * If VAR is readonly, leaving it in the list
2439 * after asssignment error (msg above)
2440 * causes doubled error message later, on unset.
2441 */
2442 debug_printf_env("removing/freeing '%s' element\n", *s);
2443 free(*s);
2444 p = s;
2445 do { *p = p[1]; p++; } while (*p);
2446 goto next;
2447 }
2448 /* below, set_local_var() with nest level will
2449 * "shadow" (remove) this variable from
2450 * global linked list.
2451 */
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002452 }
Denys Vlasenkoe36a5892018-07-18 16:12:23 +02002453 debug_printf_env("%s: env override '%s'/%u\n", __func__, *s, G.var_nest_level);
2454 set_local_var(*s, (G.var_nest_level << SETFLAG_VARLVL_SHIFT) | SETFLAG_EXPORT);
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002455 s++;
Denys Vlasenko61407802018-04-04 21:14:28 +02002456 next: ;
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002457 }
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02002458 free(strings);
Denys Vlasenkocb6ff252009-05-04 00:14:30 +02002459}
2460
2461
2462/*
Denys Vlasenkoc538d5b2014-08-13 09:57:44 +02002463 * Unicode helper
2464 */
2465static void reinit_unicode_for_hush(void)
2466{
2467 /* Unicode support should be activated even if LANG is set
2468 * _during_ shell execution, not only if it was set when
2469 * shell was started. Therefore, re-check LANG every time:
2470 */
Denys Vlasenko841f8332014-08-13 10:09:49 +02002471 if (ENABLE_FEATURE_CHECK_UNICODE_IN_ENV
2472 || ENABLE_UNICODE_USING_LOCALE
Denys Vlasenko4c201c02018-07-17 15:04:17 +02002473 ) {
Denys Vlasenko841f8332014-08-13 10:09:49 +02002474 const char *s = get_local_var_value("LC_ALL");
2475 if (!s) s = get_local_var_value("LC_CTYPE");
2476 if (!s) s = get_local_var_value("LANG");
2477 reinit_unicode(s);
2478 }
Denys Vlasenkoc538d5b2014-08-13 09:57:44 +02002479}
2480
Denys Vlasenkoc538d5b2014-08-13 09:57:44 +02002481/*
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002482 * in_str support (strings, and "strings" read from files).
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002483 */
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002484
2485#if ENABLE_HUSH_INTERACTIVE
Denys Vlasenko4074d492016-09-30 01:49:53 +02002486/* To test correct lineedit/interactive behavior, type from command line:
2487 * echo $P\
2488 * \
2489 * AT\
2490 * H\
2491 * \
Denys Vlasenko10ad6222017-04-17 16:13:32 +02002492 * It exercises a lot of corner cases.
Denys Vlasenko4074d492016-09-30 01:49:53 +02002493 */
Denys Vlasenkof5018da2018-04-06 17:58:21 +02002494# if ENABLE_FEATURE_EDITING_FANCY_PROMPT
Mike Frysinger67c1c7b2009-04-24 06:26:18 +00002495static void cmdedit_update_prompt(void)
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002496{
Denys Vlasenkof5018da2018-04-06 17:58:21 +02002497 G.PS1 = get_local_var_value("PS1");
2498 if (G.PS1 == NULL)
2499 G.PS1 = "";
2500 G.PS2 = get_local_var_value("PS2");
Mike Frysinger67c1c7b2009-04-24 06:26:18 +00002501 if (G.PS2 == NULL)
Denys Vlasenkof5018da2018-04-06 17:58:21 +02002502 G.PS2 = "";
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002503}
Denys Vlasenkof5018da2018-04-06 17:58:21 +02002504# endif
Denys Vlasenko8d6eab32018-04-07 17:01:31 +02002505static const char *setup_prompt_string(void)
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002506{
2507 const char *prompt_str;
Denys Vlasenkof5018da2018-04-06 17:58:21 +02002508
Denys Vlasenko8d6eab32018-04-07 17:01:31 +02002509 debug_printf_prompt("%s promptmode:%d\n", __func__, G.promptmode);
Denys Vlasenkof5018da2018-04-06 17:58:21 +02002510
2511 IF_FEATURE_EDITING_FANCY_PROMPT( prompt_str = G.PS2;)
2512 IF_NOT_FEATURE_EDITING_FANCY_PROMPT(prompt_str = "> ";)
Denys Vlasenko8d6eab32018-04-07 17:01:31 +02002513 if (G.promptmode == 0) { /* PS1 */
Denys Vlasenkof5018da2018-04-06 17:58:21 +02002514 if (!ENABLE_FEATURE_EDITING_FANCY_PROMPT) {
2515 /* No fancy prompts supported, (re)generate "CURDIR $ " by hand */
Mike Frysingerec2c6552009-03-28 12:24:44 +00002516 free((char*)G.PS1);
Denys Vlasenko6db47842009-09-05 20:15:17 +02002517 /* bash uses $PWD value, even if it is set by user.
2518 * It uses current dir only if PWD is unset.
2519 * We always use current dir. */
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02002520 G.PS1 = xasprintf("%s %c ", get_cwd(0), (geteuid() != 0) ? '$' : '#');
Denys Vlasenkof5018da2018-04-06 17:58:21 +02002521 }
2522 prompt_str = G.PS1;
2523 }
Denys Vlasenko4074d492016-09-30 01:49:53 +02002524 debug_printf("prompt_str '%s'\n", prompt_str);
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002525 return prompt_str;
2526}
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002527static int get_user_input(struct in_str *i)
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002528{
2529 int r;
2530 const char *prompt_str;
2531
Denys Vlasenko8d6eab32018-04-07 17:01:31 +02002532 prompt_str = setup_prompt_string();
Denys Vlasenko8391c482010-05-22 17:50:43 +02002533# if ENABLE_FEATURE_EDITING
Denys Vlasenko8660aeb2016-11-24 17:44:02 +01002534 for (;;) {
Denys Vlasenkoc538d5b2014-08-13 09:57:44 +02002535 reinit_unicode_for_hush();
Denys Vlasenko4b89d512016-11-25 03:41:03 +01002536 if (G.flag_SIGINT) {
2537 /* There was ^C'ed, make it look prettier: */
2538 bb_putchar('\n');
2539 G.flag_SIGINT = 0;
2540 }
Denis Vlasenko422cd7c2009-03-31 12:41:52 +00002541 /* buglet: SIGINT will not make new prompt to appear _at once_,
Denys Vlasenko4b89d512016-11-25 03:41:03 +01002542 * only after <Enter>. (^C works immediately) */
Denys Vlasenko0448c552016-09-29 20:25:44 +02002543 r = read_line_input(G.line_input_state, prompt_str,
Denys Vlasenko84ea60e2017-08-02 17:27:28 +02002544 G.user_input_buf, CONFIG_FEATURE_EDITING_MAX_LEN-1
Denys Vlasenko0448c552016-09-29 20:25:44 +02002545 );
Denys Vlasenko4b89d512016-11-25 03:41:03 +01002546 /* read_line_input intercepts ^C, "convert" it to SIGINT */
Denys Vlasenkodd4b4462017-08-02 16:52:12 +02002547 if (r == 0)
Denys Vlasenko8660aeb2016-11-24 17:44:02 +01002548 raise(SIGINT);
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02002549 check_and_run_traps();
Denys Vlasenko8660aeb2016-11-24 17:44:02 +01002550 if (r != 0 && !G.flag_SIGINT)
2551 break;
2552 /* ^C or SIGINT: repeat */
Denys Vlasenkodd4b4462017-08-02 16:52:12 +02002553 /* bash prints ^C even on real SIGINT (non-kbd generated) */
2554 write(STDOUT_FILENO, "^C", 2);
Denys Vlasenko8660aeb2016-11-24 17:44:02 +01002555 G.last_exitcode = 128 + SIGINT;
2556 }
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002557 if (r < 0) {
2558 /* EOF/error detected */
Denys Vlasenko4074d492016-09-30 01:49:53 +02002559 i->p = NULL;
2560 i->peek_buf[0] = r = EOF;
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002561 return r;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002562 }
Denys Vlasenko4074d492016-09-30 01:49:53 +02002563 i->p = G.user_input_buf;
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002564 return (unsigned char)*i->p++;
Denys Vlasenko8391c482010-05-22 17:50:43 +02002565# else
Denys Vlasenko8660aeb2016-11-24 17:44:02 +01002566 for (;;) {
Denis Vlasenko422cd7c2009-03-31 12:41:52 +00002567 G.flag_SIGINT = 0;
Denys Vlasenkob8709032011-05-08 21:20:01 +02002568 if (i->last_char == '\0' || i->last_char == '\n') {
2569 /* Why check_and_run_traps here? Try this interactively:
2570 * $ trap 'echo INT' INT; (sleep 2; kill -INT $$) &
2571 * $ <[enter], repeatedly...>
2572 * Without check_and_run_traps, handler never runs.
2573 */
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02002574 check_and_run_traps();
Denys Vlasenkob8709032011-05-08 21:20:01 +02002575 fputs(prompt_str, stdout);
2576 }
Denys Vlasenko8131eea2009-11-02 14:19:51 +01002577 fflush_all();
Denys Vlasenko4b89d512016-11-25 03:41:03 +01002578//FIXME: here ^C or SIGINT will have effect only after <Enter>
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002579 r = fgetc(i->file);
Denys Vlasenko8660aeb2016-11-24 17:44:02 +01002580 /* In !ENABLE_FEATURE_EDITING we don't use read_line_input,
2581 * no ^C masking happens during fgetc, no special code for ^C:
2582 * it generates SIGINT as usual.
2583 */
2584 check_and_run_traps();
2585 if (G.flag_SIGINT)
2586 G.last_exitcode = 128 + SIGINT;
2587 if (r != '\0')
2588 break;
2589 }
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002590 return r;
Denys Vlasenko8391c482010-05-22 17:50:43 +02002591# endif
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002592}
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002593/* This is the magic location that prints prompts
2594 * and gets data back from the user */
Denys Vlasenko4074d492016-09-30 01:49:53 +02002595static int fgetc_interactive(struct in_str *i)
2596{
2597 int ch;
2598 /* If it's interactive stdin, get new line. */
2599 if (G_interactive_fd && i->file == stdin) {
2600 /* Returns first char (or EOF), the rest is in i->p[] */
2601 ch = get_user_input(i);
Denys Vlasenko8d6eab32018-04-07 17:01:31 +02002602 G.promptmode = 1; /* PS2 */
2603 debug_printf_prompt("%s promptmode=%d\n", __func__, G.promptmode);
Denys Vlasenko4074d492016-09-30 01:49:53 +02002604 } else {
2605 /* Not stdin: script file, sourced file, etc */
2606 do ch = fgetc(i->file); while (ch == '\0');
2607 }
2608 return ch;
2609}
2610#else
2611static inline int fgetc_interactive(struct in_str *i)
2612{
2613 int ch;
2614 do ch = fgetc(i->file); while (ch == '\0');
2615 return ch;
2616}
2617#endif /* INTERACTIVE */
2618
Denys Vlasenko87e039d2016-11-08 22:35:05 +01002619static int i_getch(struct in_str *i)
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002620{
2621 int ch;
2622
Denys Vlasenko87e039d2016-11-08 22:35:05 +01002623 if (!i->file) {
2624 /* string-based in_str */
2625 ch = (unsigned char)*i->p;
2626 if (ch != '\0') {
2627 i->p++;
2628 i->last_char = ch;
2629 return ch;
2630 }
2631 return EOF;
2632 }
2633
2634 /* FILE-based in_str */
2635
Denys Vlasenko4074d492016-09-30 01:49:53 +02002636#if ENABLE_FEATURE_EDITING
2637 /* This can be stdin, check line editing char[] buffer */
2638 if (i->p && *i->p != '\0') {
2639 ch = (unsigned char)*i->p++;
2640 goto out;
2641 }
2642#endif
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002643 /* peek_buf[] is an int array, not char. Can contain EOF. */
2644 ch = i->peek_buf[0];
Denys Vlasenko4074d492016-09-30 01:49:53 +02002645 if (ch != 0) {
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002646 int ch2 = i->peek_buf[1];
2647 i->peek_buf[0] = ch2;
2648 if (ch2 == 0) /* very likely, avoid redundant write */
2649 goto out;
2650 i->peek_buf[1] = 0;
2651 goto out;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002652 }
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002653
Denys Vlasenko4074d492016-09-30 01:49:53 +02002654 ch = fgetc_interactive(i);
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002655 out:
Denis Vlasenko913a2012009-04-05 22:17:04 +00002656 debug_printf("file_get: got '%c' %d\n", ch, ch);
Denys Vlasenkocecbc982011-03-30 18:54:52 +02002657 i->last_char = ch;
Denys Vlasenko5807e182018-02-08 19:19:04 +01002658#if ENABLE_HUSH_LINENO_VAR
2659 if (ch == '\n') {
Denys Vlasenko6aad1dd2018-01-19 15:37:04 +01002660 G.lineno++;
Denys Vlasenko5807e182018-02-08 19:19:04 +01002661 debug_printf_parse("G.lineno++ = %u\n", G.lineno);
2662 }
Denys Vlasenko6aad1dd2018-01-19 15:37:04 +01002663#endif
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002664 return ch;
2665}
2666
Denys Vlasenko87e039d2016-11-08 22:35:05 +01002667static int i_peek(struct in_str *i)
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002668{
2669 int ch;
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002670
Denys Vlasenko87e039d2016-11-08 22:35:05 +01002671 if (!i->file) {
2672 /* string-based in_str */
2673 /* Doesn't report EOF on NUL. None of the callers care. */
2674 return (unsigned char)*i->p;
2675 }
2676
2677 /* FILE-based in_str */
2678
Denys Vlasenko4074d492016-09-30 01:49:53 +02002679#if ENABLE_FEATURE_EDITING && ENABLE_HUSH_INTERACTIVE
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002680 /* This can be stdin, check line editing char[] buffer */
2681 if (i->p && *i->p != '\0')
2682 return (unsigned char)*i->p;
2683#endif
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002684 /* peek_buf[] is an int array, not char. Can contain EOF. */
2685 ch = i->peek_buf[0];
Denys Vlasenko4074d492016-09-30 01:49:53 +02002686 if (ch != 0)
2687 return ch;
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002688
Denys Vlasenko4074d492016-09-30 01:49:53 +02002689 /* Need to get a new char */
2690 ch = fgetc_interactive(i);
2691 debug_printf("file_peek: got '%c' %d\n", ch, ch);
2692
2693 /* Save it by either rolling back line editing buffer, or in i->peek_buf[0] */
2694#if ENABLE_FEATURE_EDITING && ENABLE_HUSH_INTERACTIVE
2695 if (i->p) {
2696 i->p -= 1;
2697 return ch;
2698 }
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002699#endif
Denys Vlasenko4074d492016-09-30 01:49:53 +02002700 i->peek_buf[0] = ch;
2701 /*i->peek_buf[1] = 0; - already is */
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002702 return ch;
2703}
2704
Denys Vlasenko4074d492016-09-30 01:49:53 +02002705/* Only ever called if i_peek() was called, and did not return EOF.
2706 * IOW: we know the previous peek saw an ordinary char, not EOF, not NUL,
2707 * not end-of-line. Therefore we never need to read a new editing line here.
2708 */
2709static int i_peek2(struct in_str *i)
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002710{
Denys Vlasenko4074d492016-09-30 01:49:53 +02002711 int ch;
2712
2713 /* There are two cases when i->p[] buffer exists.
2714 * (1) it's a string in_str.
Denys Vlasenko08755f92016-09-30 02:02:25 +02002715 * (2) It's a file, and we have a saved line editing buffer.
Denys Vlasenko4074d492016-09-30 01:49:53 +02002716 * In both cases, we know that i->p[0] exists and not NUL, and
2717 * the peek2 result is in i->p[1].
2718 */
2719 if (i->p)
2720 return (unsigned char)i->p[1];
2721
2722 /* Now we know it is a file-based in_str. */
2723
2724 /* peek_buf[] is an int array, not char. Can contain EOF. */
2725 /* Is there 2nd char? */
2726 ch = i->peek_buf[1];
2727 if (ch == 0) {
2728 /* We did not read it yet, get it now */
2729 do ch = fgetc(i->file); while (ch == '\0');
2730 i->peek_buf[1] = ch;
2731 }
2732
2733 debug_printf("file_peek2: got '%c' %d\n", ch, ch);
2734 return ch;
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02002735}
2736
Denys Vlasenkoa94eeb02018-03-31 20:16:31 +02002737static int i_getch_and_eat_bkslash_nl(struct in_str *input)
2738{
2739 for (;;) {
2740 int ch, ch2;
2741
2742 ch = i_getch(input);
2743 if (ch != '\\')
2744 return ch;
2745 ch2 = i_peek(input);
2746 if (ch2 != '\n')
2747 return ch;
2748 /* backslash+newline, skip it */
2749 i_getch(input);
2750 }
2751}
2752
2753/* Note: this function _eats_ \<newline> pairs, safe to use plain
2754 * i_getch() after it instead of i_getch_and_eat_bkslash_nl().
2755 */
2756static int i_peek_and_eat_bkslash_nl(struct in_str *input)
2757{
2758 for (;;) {
2759 int ch, ch2;
2760
2761 ch = i_peek(input);
2762 if (ch != '\\')
2763 return ch;
2764 ch2 = i_peek2(input);
2765 if (ch2 != '\n')
2766 return ch;
2767 /* backslash+newline, skip it */
2768 i_getch(input);
2769 i_getch(input);
2770 }
2771}
2772
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002773static void setup_file_in_str(struct in_str *i, FILE *f)
2774{
Denys Vlasenkoa1463192011-01-18 17:55:04 +01002775 memset(i, 0, sizeof(*i));
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002776 i->file = f;
Denys Vlasenkoa1463192011-01-18 17:55:04 +01002777 /* i->p = NULL; */
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002778}
2779
2780static void setup_string_in_str(struct in_str *i, const char *s)
2781{
Denys Vlasenkoa1463192011-01-18 17:55:04 +01002782 memset(i, 0, sizeof(*i));
Denys Vlasenko87e039d2016-11-08 22:35:05 +01002783 /*i->file = NULL */;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002784 i->p = s;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00002785}
2786
2787
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00002788/*
2789 * o_string support
2790 */
2791#define B_CHUNK (32 * sizeof(char*))
Eric Andersen25f27032001-04-26 23:22:31 +00002792
Denis Vlasenko0b677d82009-04-10 13:49:10 +00002793static void o_reset_to_empty_unquoted(o_string *o)
Eric Andersen25f27032001-04-26 23:22:31 +00002794{
2795 o->length = 0;
Denys Vlasenko38292b62010-09-05 14:49:40 +02002796 o->has_quoted_part = 0;
Denis Vlasenkod65ea392007-10-01 10:02:25 +00002797 if (o->data)
2798 o->data[0] = '\0';
Eric Andersen25f27032001-04-26 23:22:31 +00002799}
2800
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00002801static void o_free(o_string *o)
Eric Andersen25f27032001-04-26 23:22:31 +00002802{
Aaron Lehmanna170e1c2002-11-28 11:27:31 +00002803 free(o->data);
Denis Vlasenkod65ea392007-10-01 10:02:25 +00002804 memset(o, 0, sizeof(*o));
Eric Andersen25f27032001-04-26 23:22:31 +00002805}
2806
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00002807static ALWAYS_INLINE void o_free_unsafe(o_string *o)
2808{
2809 free(o->data);
2810}
2811
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00002812static void o_grow_by(o_string *o, int len)
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00002813{
2814 if (o->length + len > o->maxlen) {
Denys Vlasenko46e64982016-09-29 19:50:55 +02002815 o->maxlen += (2 * len) | (B_CHUNK-1);
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00002816 o->data = xrealloc(o->data, 1 + o->maxlen);
2817 }
2818}
2819
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00002820static void o_addchr(o_string *o, int ch)
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00002821{
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00002822 debug_printf("o_addchr: '%c' o->length=%d o=%p\n", ch, o->length, o);
Denys Vlasenko46e64982016-09-29 19:50:55 +02002823 if (o->length < o->maxlen) {
2824 /* likely. avoid o_grow_by() call */
2825 add:
2826 o->data[o->length] = ch;
2827 o->length++;
2828 o->data[o->length] = '\0';
2829 return;
2830 }
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00002831 o_grow_by(o, 1);
Denys Vlasenko46e64982016-09-29 19:50:55 +02002832 goto add;
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00002833}
2834
Denys Vlasenko657086a2016-09-29 18:07:42 +02002835#if 0
2836/* Valid only if we know o_string is not empty */
2837static void o_delchr(o_string *o)
2838{
2839 o->length--;
2840 o->data[o->length] = '\0';
2841}
2842#endif
2843
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00002844static void o_addblock(o_string *o, const char *str, int len)
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00002845{
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00002846 o_grow_by(o, len);
Denys Vlasenko0675b032017-07-24 02:17:05 +02002847 ((char*)mempcpy(&o->data[o->length], str, len))[0] = '\0';
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00002848 o->length += len;
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00002849}
2850
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00002851static void o_addstr(o_string *o, const char *str)
Mike Frysinger98c52642009-04-02 10:02:37 +00002852{
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00002853 o_addblock(o, str, strlen(str));
2854}
Denys Vlasenko2e48d532010-05-22 17:30:39 +02002855
Denys Vlasenko1e811b12010-05-22 03:12:29 +02002856#if !BB_MMU
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00002857static void nommu_addchr(o_string *o, int ch)
2858{
2859 if (o)
2860 o_addchr(o, ch);
2861}
2862#else
Denys Vlasenko28a105d2009-06-01 11:26:30 +02002863# define nommu_addchr(o, str) ((void)0)
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00002864#endif
2865
2866static void o_addstr_with_NUL(o_string *o, const char *str)
2867{
2868 o_addblock(o, str, strlen(str) + 1);
Mike Frysinger98c52642009-04-02 10:02:37 +00002869}
2870
Denys Vlasenkof3e28182009-11-17 03:35:31 +01002871/*
Denys Vlasenko238081f2010-10-03 14:26:26 +02002872 * HUSH_BRACE_EXPANSION code needs corresponding quoting on variable expansion side.
Denys Vlasenkof3e28182009-11-17 03:35:31 +01002873 * Currently, "v='{q,w}'; echo $v" erroneously expands braces in $v.
2874 * Apparently, on unquoted $v bash still does globbing
2875 * ("v='*.txt'; echo $v" prints all .txt files),
2876 * but NOT brace expansion! Thus, there should be TWO independent
2877 * quoting mechanisms on $v expansion side: one protects
2878 * $v from brace expansion, and other additionally protects "$v" against globbing.
2879 * We have only second one.
2880 */
2881
Denys Vlasenko9e800222010-10-03 14:28:04 +02002882#if ENABLE_HUSH_BRACE_EXPANSION
Denys Vlasenkof3e28182009-11-17 03:35:31 +01002883# define MAYBE_BRACES "{}"
2884#else
2885# define MAYBE_BRACES ""
2886#endif
2887
Eric Andersen25f27032001-04-26 23:22:31 +00002888/* My analysis of quoting semantics tells me that state information
2889 * is associated with a destination, not a source.
2890 */
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002891static void o_addqchr(o_string *o, int ch)
Eric Andersen25f27032001-04-26 23:22:31 +00002892{
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002893 int sz = 1;
Denys Vlasenkof3e28182009-11-17 03:35:31 +01002894 char *found = strchr("*?[\\" MAYBE_BRACES, ch);
Denis Vlasenko371de4a2008-10-14 12:43:13 +00002895 if (found)
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002896 sz++;
Denis Vlasenko371de4a2008-10-14 12:43:13 +00002897 o_grow_by(o, sz);
2898 if (found) {
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002899 o->data[o->length] = '\\';
2900 o->length++;
Eric Andersen25f27032001-04-26 23:22:31 +00002901 }
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002902 o->data[o->length] = ch;
2903 o->length++;
2904 o->data[o->length] = '\0';
Eric Andersen25f27032001-04-26 23:22:31 +00002905}
2906
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002907static void o_addQchr(o_string *o, int ch)
Denis Vlasenko87f40ba2008-06-10 22:39:37 +00002908{
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002909 int sz = 1;
Denys Vlasenko5b686cb2010-09-08 13:44:34 +02002910 if ((o->o_expflags & EXP_FLAG_ESC_GLOB_CHARS)
2911 && strchr("*?[\\" MAYBE_BRACES, ch)
2912 ) {
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002913 sz++;
2914 o->data[o->length] = '\\';
2915 o->length++;
2916 }
2917 o_grow_by(o, sz);
2918 o->data[o->length] = ch;
2919 o->length++;
2920 o->data[o->length] = '\0';
2921}
2922
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02002923static void o_addqblock(o_string *o, const char *str, int len)
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002924{
Denis Vlasenko87f40ba2008-06-10 22:39:37 +00002925 while (len) {
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002926 char ch;
2927 int sz;
Denys Vlasenkof3e28182009-11-17 03:35:31 +01002928 int ordinary_cnt = strcspn(str, "*?[\\" MAYBE_BRACES);
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002929 if (ordinary_cnt > len) /* paranoia */
2930 ordinary_cnt = len;
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00002931 o_addblock(o, str, ordinary_cnt);
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002932 if (ordinary_cnt == len)
Denys Vlasenko4fb53fb2011-08-01 14:06:20 +02002933 return; /* NUL is already added by o_addblock */
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002934 str += ordinary_cnt;
Denis Vlasenko30c9cc52008-06-17 07:24:29 +00002935 len -= ordinary_cnt + 1; /* we are processing + 1 char below */
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002936
Denis Vlasenko87f40ba2008-06-10 22:39:37 +00002937 ch = *str++;
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002938 sz = 1;
Denys Vlasenkof3e28182009-11-17 03:35:31 +01002939 if (ch) { /* it is necessarily one of "*?[\\" MAYBE_BRACES */
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002940 sz++;
2941 o->data[o->length] = '\\';
2942 o->length++;
Denis Vlasenko87f40ba2008-06-10 22:39:37 +00002943 }
Denis Vlasenko7e3d33b2008-06-12 13:31:04 +00002944 o_grow_by(o, sz);
2945 o->data[o->length] = ch;
2946 o->length++;
Denis Vlasenko87f40ba2008-06-10 22:39:37 +00002947 }
Denys Vlasenko4fb53fb2011-08-01 14:06:20 +02002948 o->data[o->length] = '\0';
Denis Vlasenko87f40ba2008-06-10 22:39:37 +00002949}
2950
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02002951static void o_addQblock(o_string *o, const char *str, int len)
2952{
Denys Vlasenko5b686cb2010-09-08 13:44:34 +02002953 if (!(o->o_expflags & EXP_FLAG_ESC_GLOB_CHARS)) {
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02002954 o_addblock(o, str, len);
2955 return;
2956 }
2957 o_addqblock(o, str, len);
2958}
2959
Denys Vlasenko38292b62010-09-05 14:49:40 +02002960static void o_addQstr(o_string *o, const char *str)
2961{
2962 o_addQblock(o, str, strlen(str));
2963}
2964
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00002965/* A special kind of o_string for $VAR and `cmd` expansion.
2966 * It contains char* list[] at the beginning, which is grown in 16 element
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00002967 * increments. Actual string data starts at the next multiple of 16 * (char*).
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00002968 * list[i] contains an INDEX (int!) into this string data.
2969 * It means that if list[] needs to grow, data needs to be moved higher up
2970 * but list[i]'s need not be modified.
2971 * NB: remembering how many list[i]'s you have there is crucial.
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00002972 * o_finalize_list() operation post-processes this structure - calculates
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00002973 * and stores actual char* ptrs in list[]. Oh, it NULL terminates it as well.
2974 */
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00002975#if DEBUG_EXPAND || DEBUG_GLOB
2976static void debug_print_list(const char *prefix, o_string *o, int n)
2977{
2978 char **list = (char**)o->data;
2979 int string_start = ((n + 0xf) & ~0xf) * sizeof(list[0]);
2980 int i = 0;
Denis Vlasenko0701dca2009-04-11 10:38:47 +00002981
2982 indent();
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01002983 fdprintf(2, "%s: list:%p n:%d string_start:%d length:%d maxlen:%d glob:%d quoted:%d escape:%d\n",
Denys Vlasenko5b686cb2010-09-08 13:44:34 +02002984 prefix, list, n, string_start, o->length, o->maxlen,
2985 !!(o->o_expflags & EXP_FLAG_GLOB),
2986 o->has_quoted_part,
2987 !!(o->o_expflags & EXP_FLAG_ESC_GLOB_CHARS));
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00002988 while (i < n) {
Denis Vlasenko0701dca2009-04-11 10:38:47 +00002989 indent();
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01002990 fdprintf(2, " list[%d]=%d '%s' %p\n", i, (int)(uintptr_t)list[i],
2991 o->data + (int)(uintptr_t)list[i] + string_start,
2992 o->data + (int)(uintptr_t)list[i] + string_start);
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00002993 i++;
2994 }
2995 if (n) {
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01002996 const char *p = o->data + (int)(uintptr_t)list[n - 1] + string_start;
Denis Vlasenko0701dca2009-04-11 10:38:47 +00002997 indent();
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01002998 fdprintf(2, " total_sz:%ld\n", (long)((p + strlen(p) + 1) - o->data));
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00002999 }
3000}
3001#else
Denys Vlasenko28a105d2009-06-01 11:26:30 +02003002# define debug_print_list(prefix, o, n) ((void)0)
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003003#endif
3004
3005/* n = o_save_ptr_helper(str, n) "starts new string" by storing an index value
3006 * in list[n] so that it points past last stored byte so far.
3007 * It returns n+1. */
3008static int o_save_ptr_helper(o_string *o, int n)
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00003009{
3010 char **list = (char**)o->data;
Denis Vlasenko895bea22008-06-10 18:06:24 +00003011 int string_start;
3012 int string_len;
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00003013
3014 if (!o->has_empty_slot) {
Denis Vlasenko895bea22008-06-10 18:06:24 +00003015 string_start = ((n + 0xf) & ~0xf) * sizeof(list[0]);
3016 string_len = o->length - string_start;
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00003017 if (!(n & 0xf)) { /* 0, 0x10, 0x20...? */
Denis Vlasenko30c9cc52008-06-17 07:24:29 +00003018 debug_printf_list("list[%d]=%d string_start=%d (growing)\n", n, string_len, string_start);
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00003019 /* list[n] points to string_start, make space for 16 more pointers */
3020 o->maxlen += 0x10 * sizeof(list[0]);
3021 o->data = xrealloc(o->data, o->maxlen + 1);
Denis Vlasenko7049ff82008-06-25 09:53:17 +00003022 list = (char**)o->data;
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00003023 memmove(list + n + 0x10, list + n, string_len);
3024 o->length += 0x10 * sizeof(list[0]);
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00003025 } else {
3026 debug_printf_list("list[%d]=%d string_start=%d\n",
3027 n, string_len, string_start);
3028 }
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00003029 } else {
3030 /* We have empty slot at list[n], reuse without growth */
Denis Vlasenko895bea22008-06-10 18:06:24 +00003031 string_start = ((n+1 + 0xf) & ~0xf) * sizeof(list[0]); /* NB: n+1! */
3032 string_len = o->length - string_start;
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00003033 debug_printf_list("list[%d]=%d string_start=%d (empty slot)\n",
3034 n, string_len, string_start);
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00003035 o->has_empty_slot = 0;
3036 }
Denys Vlasenko4fb53fb2011-08-01 14:06:20 +02003037 o->has_quoted_part = 0;
Denys Vlasenkoda463fb2010-09-07 09:53:50 +02003038 list[n] = (char*)(uintptr_t)string_len;
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00003039 return n + 1;
3040}
3041
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003042/* "What was our last o_save_ptr'ed position (byte offset relative o->data)?" */
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00003043static int o_get_last_ptr(o_string *o, int n)
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00003044{
3045 char **list = (char**)o->data;
3046 int string_start = ((n + 0xf) & ~0xf) * sizeof(list[0]);
3047
Denys Vlasenkoda463fb2010-09-07 09:53:50 +02003048 return ((int)(uintptr_t)list[n-1]) + string_start;
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00003049}
3050
Denys Vlasenko9e800222010-10-03 14:28:04 +02003051#if ENABLE_HUSH_BRACE_EXPANSION
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003052/* There in a GNU extension, GLOB_BRACE, but it is not usable:
3053 * first, it processes even {a} (no commas), second,
3054 * I didn't manage to make it return strings when they don't match
Denys Vlasenko160746b2009-11-16 05:51:18 +01003055 * existing files. Need to re-implement it.
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003056 */
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003057
3058/* Helper */
3059static int glob_needed(const char *s)
3060{
3061 while (*s) {
3062 if (*s == '\\') {
3063 if (!s[1])
3064 return 0;
3065 s += 2;
3066 continue;
3067 }
3068 if (*s == '*' || *s == '[' || *s == '?' || *s == '{')
3069 return 1;
3070 s++;
3071 }
3072 return 0;
3073}
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003074/* Return pointer to next closing brace or to comma */
3075static const char *next_brace_sub(const char *cp)
3076{
3077 unsigned depth = 0;
3078 cp++;
3079 while (*cp != '\0') {
3080 if (*cp == '\\') {
3081 if (*++cp == '\0')
3082 break;
3083 cp++;
3084 continue;
Denys Vlasenko3581c622010-01-25 13:39:24 +01003085 }
Denys Vlasenkoda463fb2010-09-07 09:53:50 +02003086 if ((*cp == '}' && depth-- == 0) || (*cp == ',' && depth == 0))
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003087 break;
Denys Vlasenkoda463fb2010-09-07 09:53:50 +02003088 if (*cp++ == '{')
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003089 depth++;
3090 }
3091
3092 return *cp != '\0' ? cp : NULL;
3093}
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003094/* Recursive brace globber. Note: may garble pattern[]. */
3095static int glob_brace(char *pattern, o_string *o, int n)
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003096{
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003097 char *new_pattern_buf;
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003098 const char *begin;
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003099 const char *next;
3100 const char *rest;
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003101 const char *p;
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003102 size_t rest_len;
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003103
3104 debug_printf_glob("glob_brace('%s')\n", pattern);
3105
3106 begin = pattern;
3107 while (1) {
3108 if (*begin == '\0')
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003109 goto simple_glob;
Denys Vlasenkoda463fb2010-09-07 09:53:50 +02003110 if (*begin == '{') {
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003111 /* Find the first sub-pattern and at the same time
3112 * find the rest after the closing brace */
3113 next = next_brace_sub(begin);
3114 if (next == NULL) {
3115 /* An illegal expression */
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003116 goto simple_glob;
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003117 }
Denys Vlasenkoda463fb2010-09-07 09:53:50 +02003118 if (*next == '}') {
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003119 /* "{abc}" with no commas - illegal
3120 * brace expr, disregard and skip it */
3121 begin = next + 1;
3122 continue;
3123 }
3124 break;
3125 }
3126 if (*begin == '\\' && begin[1] != '\0')
3127 begin++;
3128 begin++;
3129 }
3130 debug_printf_glob("begin:%s\n", begin);
3131 debug_printf_glob("next:%s\n", next);
3132
3133 /* Now find the end of the whole brace expression */
3134 rest = next;
Denys Vlasenkoda463fb2010-09-07 09:53:50 +02003135 while (*rest != '}') {
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003136 rest = next_brace_sub(rest);
3137 if (rest == NULL) {
3138 /* An illegal expression */
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003139 goto simple_glob;
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003140 }
3141 debug_printf_glob("rest:%s\n", rest);
3142 }
3143 rest_len = strlen(++rest) + 1;
3144
3145 /* We are sure the brace expression is well-formed */
3146
3147 /* Allocate working buffer large enough for our work */
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003148 new_pattern_buf = xmalloc(strlen(pattern));
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003149
3150 /* We have a brace expression. BEGIN points to the opening {,
3151 * NEXT points past the terminator of the first element, and REST
3152 * points past the final }. We will accumulate result names from
3153 * recursive runs for each brace alternative in the buffer using
3154 * GLOB_APPEND. */
3155
3156 p = begin + 1;
3157 while (1) {
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003158 /* Construct the new glob expression */
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003159 memcpy(
3160 mempcpy(
3161 mempcpy(new_pattern_buf,
3162 /* We know the prefix for all sub-patterns */
3163 pattern, begin - pattern),
3164 p, next - p),
3165 rest, rest_len);
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003166
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003167 /* Note: glob_brace() may garble new_pattern_buf[].
3168 * That's why we re-copy prefix every time (1st memcpy above).
3169 */
3170 n = glob_brace(new_pattern_buf, o, n);
Denys Vlasenkoda463fb2010-09-07 09:53:50 +02003171 if (*next == '}') {
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003172 /* We saw the last entry */
3173 break;
3174 }
3175 p = next + 1;
3176 next = next_brace_sub(next);
3177 }
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003178 free(new_pattern_buf);
3179 return n;
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003180
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003181 simple_glob:
3182 {
3183 int gr;
3184 glob_t globdata;
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003185
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003186 memset(&globdata, 0, sizeof(globdata));
3187 gr = glob(pattern, 0, NULL, &globdata);
3188 debug_printf_glob("glob('%s'):%d\n", pattern, gr);
3189 if (gr != 0) {
3190 if (gr == GLOB_NOMATCH) {
3191 globfree(&globdata);
3192 /* NB: garbles parameter */
3193 unbackslash(pattern);
3194 o_addstr_with_NUL(o, pattern);
3195 debug_printf_glob("glob pattern '%s' is literal\n", pattern);
3196 return o_save_ptr_helper(o, n);
3197 }
3198 if (gr == GLOB_NOSPACE)
Denys Vlasenko899ae532018-04-01 19:59:37 +02003199 bb_die_memory_exhausted();
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003200 /* GLOB_ABORTED? Only happens with GLOB_ERR flag,
3201 * but we didn't specify it. Paranoia again. */
3202 bb_error_msg_and_die("glob error %d on '%s'", gr, pattern);
3203 }
3204 if (globdata.gl_pathv && globdata.gl_pathv[0]) {
3205 char **argv = globdata.gl_pathv;
3206 while (1) {
3207 o_addstr_with_NUL(o, *argv);
3208 n = o_save_ptr_helper(o, n);
3209 argv++;
3210 if (!*argv)
3211 break;
3212 }
3213 }
3214 globfree(&globdata);
3215 }
3216 return n;
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003217}
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003218/* Performs globbing on last list[],
3219 * saving each result as a new list[].
3220 */
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02003221static int perform_glob(o_string *o, int n)
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003222{
3223 char *pattern, *copy;
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003224
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02003225 debug_printf_glob("start perform_glob: n:%d o->data:%p\n", n, o->data);
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003226 if (!o->data)
3227 return o_save_ptr_helper(o, n);
3228 pattern = o->data + o_get_last_ptr(o, n);
3229 debug_printf_glob("glob pattern '%s'\n", pattern);
3230 if (!glob_needed(pattern)) {
3231 /* unbackslash last string in o in place, fix length */
3232 o->length = unbackslash(pattern) - o->data;
3233 debug_printf_glob("glob pattern '%s' is literal\n", pattern);
3234 return o_save_ptr_helper(o, n);
3235 }
3236
3237 copy = xstrdup(pattern);
3238 /* "forget" pattern in o */
3239 o->length = pattern - o->data;
3240 n = glob_brace(copy, o, n);
3241 free(copy);
3242 if (DEBUG_GLOB)
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02003243 debug_print_list("perform_glob returning", o, n);
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003244 return n;
3245}
3246
Denys Vlasenko238081f2010-10-03 14:26:26 +02003247#else /* !HUSH_BRACE_EXPANSION */
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003248
3249/* Helper */
3250static int glob_needed(const char *s)
3251{
3252 while (*s) {
3253 if (*s == '\\') {
3254 if (!s[1])
3255 return 0;
3256 s += 2;
3257 continue;
3258 }
3259 if (*s == '*' || *s == '[' || *s == '?')
3260 return 1;
3261 s++;
3262 }
3263 return 0;
3264}
3265/* Performs globbing on last list[],
3266 * saving each result as a new list[].
3267 */
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02003268static int perform_glob(o_string *o, int n)
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003269{
3270 glob_t globdata;
3271 int gr;
3272 char *pattern;
3273
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02003274 debug_printf_glob("start perform_glob: n:%d o->data:%p\n", n, o->data);
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003275 if (!o->data)
3276 return o_save_ptr_helper(o, n);
3277 pattern = o->data + o_get_last_ptr(o, n);
Denis Vlasenko30c9cc52008-06-17 07:24:29 +00003278 debug_printf_glob("glob pattern '%s'\n", pattern);
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003279 if (!glob_needed(pattern)) {
3280 literal:
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003281 /* unbackslash last string in o in place, fix length */
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003282 o->length = unbackslash(pattern) - o->data;
Denis Vlasenko30c9cc52008-06-17 07:24:29 +00003283 debug_printf_glob("glob pattern '%s' is literal\n", pattern);
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003284 return o_save_ptr_helper(o, n);
3285 }
3286
3287 memset(&globdata, 0, sizeof(globdata));
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003288 /* Can't use GLOB_NOCHECK: it does not unescape the string.
3289 * If we glob "*.\*" and don't find anything, we need
3290 * to fall back to using literal "*.*", but GLOB_NOCHECK
3291 * will return "*.\*"!
3292 */
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003293 gr = glob(pattern, 0, NULL, &globdata);
3294 debug_printf_glob("glob('%s'):%d\n", pattern, gr);
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003295 if (gr != 0) {
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003296 if (gr == GLOB_NOMATCH) {
3297 globfree(&globdata);
3298 goto literal;
3299 }
3300 if (gr == GLOB_NOSPACE)
Denys Vlasenko899ae532018-04-01 19:59:37 +02003301 bb_die_memory_exhausted();
Denys Vlasenko5b2db972009-11-16 05:49:36 +01003302 /* GLOB_ABORTED? Only happens with GLOB_ERR flag,
3303 * but we didn't specify it. Paranoia again. */
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003304 bb_error_msg_and_die("glob error %d on '%s'", gr, pattern);
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003305 }
3306 if (globdata.gl_pathv && globdata.gl_pathv[0]) {
3307 char **argv = globdata.gl_pathv;
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003308 /* "forget" pattern in o */
3309 o->length = pattern - o->data;
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003310 while (1) {
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00003311 o_addstr_with_NUL(o, *argv);
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003312 n = o_save_ptr_helper(o, n);
3313 argv++;
3314 if (!*argv)
3315 break;
3316 }
3317 }
3318 globfree(&globdata);
3319 if (DEBUG_GLOB)
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02003320 debug_print_list("perform_glob returning", o, n);
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003321 return n;
3322}
3323
Denys Vlasenko238081f2010-10-03 14:26:26 +02003324#endif /* !HUSH_BRACE_EXPANSION */
Denys Vlasenkof3e28182009-11-17 03:35:31 +01003325
Denys Vlasenko5b686cb2010-09-08 13:44:34 +02003326/* If o->o_expflags & EXP_FLAG_GLOB, glob the string so far remembered.
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00003327 * Otherwise, just finish current list[] and start new */
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003328static int o_save_ptr(o_string *o, int n)
3329{
Denys Vlasenko5b686cb2010-09-08 13:44:34 +02003330 if (o->o_expflags & EXP_FLAG_GLOB) {
Denis Vlasenkoa8b6dff2009-03-20 12:05:14 +00003331 /* If o->has_empty_slot, list[n] was already globbed
3332 * (if it was requested back then when it was filled)
3333 * so don't do that again! */
3334 if (!o->has_empty_slot)
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02003335 return perform_glob(o, n); /* o_save_ptr_helper is inside */
Denis Vlasenkoa8b6dff2009-03-20 12:05:14 +00003336 }
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003337 return o_save_ptr_helper(o, n);
3338}
3339
3340/* "Please convert list[n] to real char* ptrs, and NULL terminate it." */
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00003341static char **o_finalize_list(o_string *o, int n)
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00003342{
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003343 char **list;
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00003344 int string_start;
3345
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003346 n = o_save_ptr(o, n); /* force growth for list[n] if necessary */
3347 if (DEBUG_EXPAND)
3348 debug_print_list("finalized", o, n);
Denis Vlasenko30c9cc52008-06-17 07:24:29 +00003349 debug_printf_expand("finalized n:%d\n", n);
Denis Vlasenkob61e13d2008-06-17 05:11:43 +00003350 list = (char**)o->data;
3351 string_start = ((n + 0xf) & ~0xf) * sizeof(list[0]);
3352 list[--n] = NULL;
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00003353 while (n) {
3354 n--;
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003355 list[n] = o->data + (int)(uintptr_t)list[n] + string_start;
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00003356 }
3357 return list;
3358}
3359
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003360static void free_pipe_list(struct pipe *pi);
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003361
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003362/* Returns pi->next - next pipe in the list */
3363static struct pipe *free_pipe(struct pipe *pi)
Denis Vlasenkof886fd22008-10-13 12:36:05 +00003364{
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003365 struct pipe *next;
3366 int i;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003367
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003368 debug_printf_clean("free_pipe (pid %d)\n", getpid());
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003369 for (i = 0; i < pi->num_cmds; i++) {
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003370 struct command *command;
3371 struct redir_struct *r, *rnext;
3372
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003373 command = &pi->cmds[i];
Denis Vlasenko0701dca2009-04-11 10:38:47 +00003374 debug_printf_clean(" command %d:\n", i);
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003375 if (command->argv) {
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003376 if (DEBUG_CLEAN) {
3377 int a;
3378 char **p;
3379 for (a = 0, p = command->argv; *p; a++, p++) {
3380 debug_printf_clean(" argv[%d] = %s\n", a, *p);
3381 }
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003382 }
3383 free_strings(command->argv);
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003384 //command->argv = NULL;
Denis Vlasenkob6e65562009-04-03 16:49:04 +00003385 }
3386 /* not "else if": on syntax error, we may have both! */
3387 if (command->group) {
Denys Vlasenko9d617c42009-06-09 18:40:52 +02003388 debug_printf_clean(" begin group (cmd_type:%d)\n",
3389 command->cmd_type);
Denis Vlasenko0701dca2009-04-11 10:38:47 +00003390 free_pipe_list(command->group);
3391 debug_printf_clean(" end group\n");
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003392 //command->group = NULL;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003393 }
Denis Vlasenkoed055212009-04-11 10:37:10 +00003394 /* else is crucial here.
3395 * If group != NULL, child_func is meaningless */
3396#if ENABLE_HUSH_FUNCTIONS
3397 else if (command->child_func) {
3398 debug_printf_exec("cmd %p releases child func at %p\n", command, command->child_func);
3399 command->child_func->parent_cmd = NULL;
3400 }
3401#endif
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00003402#if !BB_MMU
3403 free(command->group_as_string);
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003404 //command->group_as_string = NULL;
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00003405#endif
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003406 for (r = command->redirects; r; r = rnext) {
Denis Vlasenko0701dca2009-04-11 10:38:47 +00003407 debug_printf_clean(" redirect %d%s",
3408 r->rd_fd, redir_table[r->rd_type].descrip);
Denis Vlasenko02d6f1a2009-04-07 19:56:55 +00003409 /* guard against the case >$FOO, where foo is unset or blank */
3410 if (r->rd_filename) {
3411 debug_printf_clean(" fname:'%s'\n", r->rd_filename);
3412 free(r->rd_filename);
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003413 //r->rd_filename = NULL;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003414 }
Denis Vlasenko02d6f1a2009-04-07 19:56:55 +00003415 debug_printf_clean(" rd_dup:%d\n", r->rd_dup);
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003416 rnext = r->next;
3417 free(r);
3418 }
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003419 //command->redirects = NULL;
Denis Vlasenkof886fd22008-10-13 12:36:05 +00003420 }
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003421 free(pi->cmds); /* children are an array, they get freed all at once */
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003422 //pi->cmds = NULL;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003423#if ENABLE_HUSH_JOB
3424 free(pi->cmdtext);
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003425 //pi->cmdtext = NULL;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003426#endif
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003427
3428 next = pi->next;
3429 free(pi);
3430 return next;
Denis Vlasenkof886fd22008-10-13 12:36:05 +00003431}
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00003432
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003433static void free_pipe_list(struct pipe *pi)
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003434{
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003435 while (pi) {
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003436#if HAS_KEYWORDS
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003437 debug_printf_clean("pipe reserved word %d\n", pi->res_word);
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003438#endif
Denis Vlasenko0701dca2009-04-11 10:38:47 +00003439 debug_printf_clean("pipe followup code %d\n", pi->followup);
Denys Vlasenko27c56f12010-09-07 09:56:34 +02003440 pi = free_pipe(pi);
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003441 }
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003442}
3443
3444
Denys Vlasenkob36abf22010-09-05 14:50:59 +02003445/*** Parsing routines ***/
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00003446
Denys Vlasenko7b4c0fd2010-11-22 17:58:14 +01003447#ifndef debug_print_tree
3448static void debug_print_tree(struct pipe *pi, int lvl)
3449{
3450 static const char *const PIPE[] = {
3451 [PIPE_SEQ] = "SEQ",
3452 [PIPE_AND] = "AND",
3453 [PIPE_OR ] = "OR" ,
3454 [PIPE_BG ] = "BG" ,
3455 };
3456 static const char *RES[] = {
3457 [RES_NONE ] = "NONE" ,
3458# if ENABLE_HUSH_IF
3459 [RES_IF ] = "IF" ,
3460 [RES_THEN ] = "THEN" ,
3461 [RES_ELIF ] = "ELIF" ,
3462 [RES_ELSE ] = "ELSE" ,
3463 [RES_FI ] = "FI" ,
3464# endif
3465# if ENABLE_HUSH_LOOPS
3466 [RES_FOR ] = "FOR" ,
3467 [RES_WHILE] = "WHILE",
3468 [RES_UNTIL] = "UNTIL",
3469 [RES_DO ] = "DO" ,
3470 [RES_DONE ] = "DONE" ,
3471# endif
3472# if ENABLE_HUSH_LOOPS || ENABLE_HUSH_CASE
3473 [RES_IN ] = "IN" ,
3474# endif
3475# if ENABLE_HUSH_CASE
3476 [RES_CASE ] = "CASE" ,
3477 [RES_CASE_IN ] = "CASE_IN" ,
3478 [RES_MATCH] = "MATCH",
3479 [RES_CASE_BODY] = "CASE_BODY",
3480 [RES_ESAC ] = "ESAC" ,
3481# endif
3482 [RES_XXXX ] = "XXXX" ,
3483 [RES_SNTX ] = "SNTX" ,
3484 };
3485 static const char *const CMDTYPE[] = {
3486 "{}",
3487 "()",
3488 "[noglob]",
3489# if ENABLE_HUSH_FUNCTIONS
3490 "func()",
3491# endif
3492 };
3493
3494 int pin, prn;
3495
3496 pin = 0;
3497 while (pi) {
Denys Vlasenko5807e182018-02-08 19:19:04 +01003498 fdprintf(2, "%*spipe %d %sres_word=%s followup=%d %s\n",
3499 lvl*2, "",
3500 pin,
3501 (IF_HAS_KEYWORDS(pi->pi_inverted ? "! " :) ""),
3502 RES[pi->res_word],
3503 pi->followup, PIPE[pi->followup]
3504 );
Denys Vlasenko7b4c0fd2010-11-22 17:58:14 +01003505 prn = 0;
3506 while (prn < pi->num_cmds) {
3507 struct command *command = &pi->cmds[prn];
3508 char **argv = command->argv;
3509
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01003510 fdprintf(2, "%*s cmd %d assignment_cnt:%d",
Denys Vlasenko7b4c0fd2010-11-22 17:58:14 +01003511 lvl*2, "", prn,
3512 command->assignment_cnt);
Denys Vlasenko5807e182018-02-08 19:19:04 +01003513#if ENABLE_HUSH_LINENO_VAR
3514 fdprintf(2, " LINENO:%u", command->lineno);
3515#endif
Denys Vlasenko7b4c0fd2010-11-22 17:58:14 +01003516 if (command->group) {
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01003517 fdprintf(2, " group %s: (argv=%p)%s%s\n",
Denys Vlasenko7b4c0fd2010-11-22 17:58:14 +01003518 CMDTYPE[command->cmd_type],
3519 argv
3520# if !BB_MMU
3521 , " group_as_string:", command->group_as_string
3522# else
3523 , "", ""
3524# endif
3525 );
3526 debug_print_tree(command->group, lvl+1);
3527 prn++;
3528 continue;
3529 }
3530 if (argv) while (*argv) {
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01003531 fdprintf(2, " '%s'", *argv);
Denys Vlasenko7b4c0fd2010-11-22 17:58:14 +01003532 argv++;
3533 }
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01003534 fdprintf(2, "\n");
Denys Vlasenko7b4c0fd2010-11-22 17:58:14 +01003535 prn++;
3536 }
3537 pi = pi->next;
3538 pin++;
3539 }
3540}
3541#endif /* debug_print_tree */
3542
Denis Vlasenkoac678ec2007-04-16 22:32:04 +00003543static struct pipe *new_pipe(void)
3544{
Eric Andersen25f27032001-04-26 23:22:31 +00003545 struct pipe *pi;
Denis Vlasenko3ac0e002007-04-28 16:45:22 +00003546 pi = xzalloc(sizeof(struct pipe));
Denis Vlasenko5ec61322008-06-24 00:50:07 +00003547 /*pi->res_word = RES_NONE; - RES_NONE is 0 anyway */
Eric Andersen25f27032001-04-26 23:22:31 +00003548 return pi;
3549}
3550
Denis Vlasenkof8c1f022009-04-17 11:55:42 +00003551/* Command (member of a pipe) is complete, or we start a new pipe
3552 * if ctx->command is NULL.
3553 * No errors possible here.
3554 */
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003555static int done_command(struct parse_context *ctx)
3556{
3557 /* The command is really already in the pipe structure, so
3558 * advance the pipe counter and make a new, null command. */
3559 struct pipe *pi = ctx->pipe;
3560 struct command *command = ctx->command;
3561
Denys Vlasenkod6a37d82016-09-20 16:22:24 +02003562#if 0 /* Instead we emit error message at run time */
3563 if (ctx->pending_redirect) {
3564 /* For example, "cmd >" (no filename to redirect to) */
Denys Vlasenko39701202017-08-02 19:44:05 +02003565 syntax_error("invalid redirect");
Denys Vlasenkod6a37d82016-09-20 16:22:24 +02003566 ctx->pending_redirect = NULL;
3567 }
3568#endif
3569
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003570 if (command) {
Denis Vlasenkof8c1f022009-04-17 11:55:42 +00003571 if (IS_NULL_CMD(command)) {
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003572 debug_printf_parse("done_command: skipping null cmd, num_cmds=%d\n", pi->num_cmds);
Denis Vlasenkof8c1f022009-04-17 11:55:42 +00003573 goto clear_and_ret;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003574 }
3575 pi->num_cmds++;
3576 debug_printf_parse("done_command: ++num_cmds=%d\n", pi->num_cmds);
Denis Vlasenkocd418a22009-04-06 18:08:35 +00003577 //debug_print_tree(ctx->list_head, 20);
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003578 } else {
3579 debug_printf_parse("done_command: initializing, num_cmds=%d\n", pi->num_cmds);
3580 }
3581
3582 /* Only real trickiness here is that the uncommitted
3583 * command structure is not counted in pi->num_cmds. */
3584 pi->cmds = xrealloc(pi->cmds, sizeof(*pi->cmds) * (pi->num_cmds+1));
Denis Vlasenkof8c1f022009-04-17 11:55:42 +00003585 ctx->command = command = &pi->cmds[pi->num_cmds];
3586 clear_and_ret:
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003587 memset(command, 0, sizeof(*command));
Denys Vlasenko5807e182018-02-08 19:19:04 +01003588#if ENABLE_HUSH_LINENO_VAR
Denys Vlasenko6aad1dd2018-01-19 15:37:04 +01003589 command->lineno = G.lineno;
Denys Vlasenko5807e182018-02-08 19:19:04 +01003590 debug_printf_parse("command->lineno = G.lineno (%u)\n", G.lineno);
Denys Vlasenko6aad1dd2018-01-19 15:37:04 +01003591#endif
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003592 return pi->num_cmds; /* used only for 0/nonzero check */
3593}
3594
3595static void done_pipe(struct parse_context *ctx, pipe_style type)
3596{
3597 int not_null;
3598
3599 debug_printf_parse("done_pipe entered, followup %d\n", type);
3600 /* Close previous command */
3601 not_null = done_command(ctx);
Denis Vlasenkocd418a22009-04-06 18:08:35 +00003602#if HAS_KEYWORDS
3603 ctx->pipe->pi_inverted = ctx->ctx_inverted;
3604 ctx->ctx_inverted = 0;
3605 ctx->pipe->res_word = ctx->ctx_res_w;
3606#endif
Denys Vlasenkob24e55d2017-07-16 20:29:35 +02003607 if (type == PIPE_BG && ctx->list_head != ctx->pipe) {
3608 /* Necessary since && and || have precedence over &:
Denys Vlasenkoee553b92017-07-15 22:51:55 +02003609 * "cmd1 && cmd2 &" must spawn both cmds, not only cmd2,
3610 * in a backgrounded subshell.
3611 */
3612 struct pipe *pi;
3613 struct command *command;
3614
Denys Vlasenkob24e55d2017-07-16 20:29:35 +02003615 /* Is this actually this construct, all pipes end with && or ||? */
Denys Vlasenkoee553b92017-07-15 22:51:55 +02003616 pi = ctx->list_head;
3617 while (pi != ctx->pipe) {
3618 if (pi->followup != PIPE_AND && pi->followup != PIPE_OR)
3619 goto no_conv;
3620 pi = pi->next;
3621 }
3622
3623 debug_printf_parse("BG with more than one pipe, converting to { p1 &&...pN; } &\n");
3624 pi->followup = PIPE_SEQ; /* close pN _not_ with "&"! */
3625 pi = xzalloc(sizeof(*pi));
3626 pi->followup = PIPE_BG;
3627 pi->num_cmds = 1;
3628 pi->cmds = xzalloc(sizeof(pi->cmds[0]));
3629 command = &pi->cmds[0];
3630 if (CMD_NORMAL != 0) /* "if xzalloc didn't do that already" */
3631 command->cmd_type = CMD_NORMAL;
3632 command->group = ctx->list_head;
3633#if !BB_MMU
Denys Vlasenkob24e55d2017-07-16 20:29:35 +02003634 command->group_as_string = xstrndup(
3635 ctx->as_string.data,
3636 ctx->as_string.length - 1 /* do not copy last char, "&" */
3637 );
Denys Vlasenkoee553b92017-07-15 22:51:55 +02003638#endif
3639 /* Replace all pipes in ctx with one newly created */
3640 ctx->list_head = ctx->pipe = pi;
Denys Vlasenkob24e55d2017-07-16 20:29:35 +02003641 } else {
3642 no_conv:
3643 ctx->pipe->followup = type;
Denys Vlasenkoee553b92017-07-15 22:51:55 +02003644 }
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003645
3646 /* Without this check, even just <enter> on command line generates
3647 * tree of three NOPs (!). Which is harmless but annoying.
Denis Vlasenkof8c1f022009-04-17 11:55:42 +00003648 * IOW: it is safe to do it unconditionally. */
Denis Vlasenkocd418a22009-04-06 18:08:35 +00003649 if (not_null
Denis Vlasenko7f959372009-04-14 08:06:59 +00003650#if ENABLE_HUSH_IF
Denis Vlasenkocd418a22009-04-06 18:08:35 +00003651 || ctx->ctx_res_w == RES_FI
Denis Vlasenko7f959372009-04-14 08:06:59 +00003652#endif
3653#if ENABLE_HUSH_LOOPS
Denis Vlasenkocd418a22009-04-06 18:08:35 +00003654 || ctx->ctx_res_w == RES_DONE
3655 || ctx->ctx_res_w == RES_FOR
3656 || ctx->ctx_res_w == RES_IN
Denis Vlasenko7f959372009-04-14 08:06:59 +00003657#endif
3658#if ENABLE_HUSH_CASE
Denis Vlasenkocd418a22009-04-06 18:08:35 +00003659 || ctx->ctx_res_w == RES_ESAC
3660#endif
3661 ) {
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003662 struct pipe *new_p;
3663 debug_printf_parse("done_pipe: adding new pipe: "
3664 "not_null:%d ctx->ctx_res_w:%d\n",
3665 not_null, ctx->ctx_res_w);
3666 new_p = new_pipe();
3667 ctx->pipe->next = new_p;
3668 ctx->pipe = new_p;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003669 /* RES_THEN, RES_DO etc are "sticky" -
Denis Vlasenkof8c1f022009-04-17 11:55:42 +00003670 * they remain set for pipes inside if/while.
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003671 * This is used to control execution.
3672 * RES_FOR and RES_IN are NOT sticky (needed to support
3673 * cases where variable or value happens to match a keyword):
3674 */
3675#if ENABLE_HUSH_LOOPS
3676 if (ctx->ctx_res_w == RES_FOR
3677 || ctx->ctx_res_w == RES_IN)
3678 ctx->ctx_res_w = RES_NONE;
3679#endif
3680#if ENABLE_HUSH_CASE
3681 if (ctx->ctx_res_w == RES_MATCH)
Denys Vlasenkoe9bda902009-05-23 16:50:07 +02003682 ctx->ctx_res_w = RES_CASE_BODY;
3683 if (ctx->ctx_res_w == RES_CASE)
3684 ctx->ctx_res_w = RES_CASE_IN;
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003685#endif
Denis Vlasenkob6e65562009-04-03 16:49:04 +00003686 ctx->command = NULL; /* trick done_command below */
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003687 /* Create the memory for command, roughly:
3688 * ctx->pipe->cmds = new struct command;
3689 * ctx->command = &ctx->pipe->cmds[0];
3690 */
3691 done_command(ctx);
Denis Vlasenkocd418a22009-04-06 18:08:35 +00003692 //debug_print_tree(ctx->list_head, 10);
Denis Vlasenko424f79b2009-03-22 14:23:34 +00003693 }
3694 debug_printf_parse("done_pipe return\n");
3695}
3696
Denis Vlasenko9af22c72008-10-09 12:54:58 +00003697static void initialize_context(struct parse_context *ctx)
Eric Andersen25f27032001-04-26 23:22:31 +00003698{
Denis Vlasenkoa8442002008-06-14 11:00:17 +00003699 memset(ctx, 0, sizeof(*ctx));
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003700 if (MAYBE_ASSIGNMENT != 0)
3701 ctx->is_assignment = MAYBE_ASSIGNMENT;
Denis Vlasenko1a735862007-05-23 00:32:25 +00003702 ctx->pipe = ctx->list_head = new_pipe();
Denis Vlasenko9af22c72008-10-09 12:54:58 +00003703 /* Create the memory for command, roughly:
3704 * ctx->pipe->cmds = new struct command;
3705 * ctx->command = &ctx->pipe->cmds[0];
Denis Vlasenkoa8442002008-06-14 11:00:17 +00003706 */
3707 done_command(ctx);
Eric Andersen25f27032001-04-26 23:22:31 +00003708}
3709
Denis Vlasenkoa8442002008-06-14 11:00:17 +00003710/* If a reserved word is found and processed, parse context is modified
3711 * and 1 is returned.
Eric Andersen25f27032001-04-26 23:22:31 +00003712 */
Denis Vlasenko5ec61322008-06-24 00:50:07 +00003713#if HAS_KEYWORDS
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003714struct reserved_combo {
3715 char literal[6];
3716 unsigned char res;
3717 unsigned char assignment_flag;
3718 int flag;
3719};
3720enum {
3721 FLAG_END = (1 << RES_NONE ),
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003722# if ENABLE_HUSH_IF
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003723 FLAG_IF = (1 << RES_IF ),
3724 FLAG_THEN = (1 << RES_THEN ),
3725 FLAG_ELIF = (1 << RES_ELIF ),
3726 FLAG_ELSE = (1 << RES_ELSE ),
3727 FLAG_FI = (1 << RES_FI ),
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003728# endif
3729# if ENABLE_HUSH_LOOPS
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003730 FLAG_FOR = (1 << RES_FOR ),
3731 FLAG_WHILE = (1 << RES_WHILE),
3732 FLAG_UNTIL = (1 << RES_UNTIL),
3733 FLAG_DO = (1 << RES_DO ),
3734 FLAG_DONE = (1 << RES_DONE ),
3735 FLAG_IN = (1 << RES_IN ),
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003736# endif
3737# if ENABLE_HUSH_CASE
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003738 FLAG_MATCH = (1 << RES_MATCH),
3739 FLAG_ESAC = (1 << RES_ESAC ),
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003740# endif
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003741 FLAG_START = (1 << RES_XXXX ),
3742};
3743
3744static const struct reserved_combo* match_reserved_word(o_string *word)
3745{
Eric Andersen25f27032001-04-26 23:22:31 +00003746 /* Mostly a list of accepted follow-up reserved words.
3747 * FLAG_END means we are done with the sequence, and are ready
3748 * to turn the compound list into a command.
3749 * FLAG_START means the word must start a new compound list.
3750 */
Denis Vlasenkoc72c1ed2007-01-30 22:31:26 +00003751 static const struct reserved_combo reserved_list[] = {
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003752# if ENABLE_HUSH_IF
Denys Vlasenko29f9b722011-05-14 11:27:36 +02003753 { "!", RES_NONE, NOT_ASSIGNMENT , 0 },
3754 { "if", RES_IF, MAYBE_ASSIGNMENT, FLAG_THEN | FLAG_START },
3755 { "then", RES_THEN, MAYBE_ASSIGNMENT, FLAG_ELIF | FLAG_ELSE | FLAG_FI },
3756 { "elif", RES_ELIF, MAYBE_ASSIGNMENT, FLAG_THEN },
3757 { "else", RES_ELSE, MAYBE_ASSIGNMENT, FLAG_FI },
3758 { "fi", RES_FI, NOT_ASSIGNMENT , FLAG_END },
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003759# endif
3760# if ENABLE_HUSH_LOOPS
Denys Vlasenko29f9b722011-05-14 11:27:36 +02003761 { "for", RES_FOR, NOT_ASSIGNMENT , FLAG_IN | FLAG_DO | FLAG_START },
3762 { "while", RES_WHILE, MAYBE_ASSIGNMENT, FLAG_DO | FLAG_START },
3763 { "until", RES_UNTIL, MAYBE_ASSIGNMENT, FLAG_DO | FLAG_START },
3764 { "in", RES_IN, NOT_ASSIGNMENT , FLAG_DO },
3765 { "do", RES_DO, MAYBE_ASSIGNMENT, FLAG_DONE },
3766 { "done", RES_DONE, NOT_ASSIGNMENT , FLAG_END },
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003767# endif
3768# if ENABLE_HUSH_CASE
Denys Vlasenko29f9b722011-05-14 11:27:36 +02003769 { "case", RES_CASE, NOT_ASSIGNMENT , FLAG_MATCH | FLAG_START },
3770 { "esac", RES_ESAC, NOT_ASSIGNMENT , FLAG_END },
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003771# endif
Eric Andersen25f27032001-04-26 23:22:31 +00003772 };
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003773 const struct reserved_combo *r;
3774
Denys Vlasenkoe4dcba12010-10-28 18:57:19 +02003775 for (r = reserved_list; r < reserved_list + ARRAY_SIZE(reserved_list); r++) {
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003776 if (strcmp(word->data, r->literal) == 0)
3777 return r;
3778 }
3779 return NULL;
3780}
Denys Vlasenko5807e182018-02-08 19:19:04 +01003781/* Return NULL: not a keyword, else: keyword
Denis Vlasenkobb929512009-04-16 10:59:40 +00003782 */
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003783static const struct reserved_combo* reserved_word(struct parse_context *ctx)
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003784{
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003785# if ENABLE_HUSH_CASE
Denis Vlasenko17f02e72008-07-14 04:32:29 +00003786 static const struct reserved_combo reserved_match = {
Denis Vlasenko2b576b82008-08-04 00:46:07 +00003787 "", RES_MATCH, NOT_ASSIGNMENT , FLAG_MATCH | FLAG_ESAC
Denis Vlasenko17f02e72008-07-14 04:32:29 +00003788 };
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003789# endif
Denis Vlasenkoc72c1ed2007-01-30 22:31:26 +00003790 const struct reserved_combo *r;
Denis Vlasenkoc72c1ed2007-01-30 22:31:26 +00003791
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003792 if (ctx->word.has_quoted_part)
Denis Vlasenkobb929512009-04-16 10:59:40 +00003793 return 0;
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003794 r = match_reserved_word(&ctx->word);
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003795 if (!r)
Denys Vlasenko5807e182018-02-08 19:19:04 +01003796 return r; /* NULL */
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003797
3798 debug_printf("found reserved word %s, res %d\n", r->literal, r->res);
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003799# if ENABLE_HUSH_CASE
Denys Vlasenkoe9bda902009-05-23 16:50:07 +02003800 if (r->res == RES_IN && ctx->ctx_res_w == RES_CASE_IN) {
3801 /* "case word IN ..." - IN part starts first MATCH part */
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003802 r = &reserved_match;
Denys Vlasenkoe9bda902009-05-23 16:50:07 +02003803 } else
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003804# endif
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003805 if (r->flag == 0) { /* '!' */
3806 if (ctx->ctx_inverted) { /* bash doesn't accept '! ! true' */
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00003807 syntax_error("! ! command");
Denis Vlasenkobb929512009-04-16 10:59:40 +00003808 ctx->ctx_res_w = RES_SNTX;
Eric Andersen25f27032001-04-26 23:22:31 +00003809 }
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003810 ctx->ctx_inverted = 1;
Denys Vlasenko5807e182018-02-08 19:19:04 +01003811 return r;
Eric Andersen25f27032001-04-26 23:22:31 +00003812 }
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003813 if (r->flag & FLAG_START) {
Denis Vlasenkob6e65562009-04-03 16:49:04 +00003814 struct parse_context *old;
Denis Vlasenkobb929512009-04-16 10:59:40 +00003815
Denys Vlasenko9e55a152017-07-10 10:01:12 +02003816 old = xmemdup(ctx, sizeof(*ctx));
Denis Vlasenkob6e65562009-04-03 16:49:04 +00003817 debug_printf_parse("push stack %p\n", old);
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003818 initialize_context(ctx);
Denis Vlasenkob6e65562009-04-03 16:49:04 +00003819 ctx->stack = old;
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003820 } else if (/*ctx->ctx_res_w == RES_NONE ||*/ !(ctx->old_flag & (1 << r->res))) {
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003821 syntax_error_at(ctx->word.data);
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003822 ctx->ctx_res_w = RES_SNTX;
Denys Vlasenko5807e182018-02-08 19:19:04 +01003823 return r;
Denis Vlasenkobb929512009-04-16 10:59:40 +00003824 } else {
3825 /* "{...} fi" is ok. "{...} if" is not
3826 * Example:
3827 * if { echo foo; } then { echo bar; } fi */
3828 if (ctx->command->group)
3829 done_pipe(ctx, PIPE_SEQ);
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003830 }
Denis Vlasenkobb929512009-04-16 10:59:40 +00003831
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003832 ctx->ctx_res_w = r->res;
3833 ctx->old_flag = r->flag;
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003834 ctx->is_assignment = r->assignment_flag;
3835 debug_printf_parse("ctx->is_assignment='%s'\n", assignment_flag[ctx->is_assignment]);
Denis Vlasenkobb929512009-04-16 10:59:40 +00003836
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003837 if (ctx->old_flag & FLAG_END) {
3838 struct parse_context *old;
Denis Vlasenkobb929512009-04-16 10:59:40 +00003839
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003840 done_pipe(ctx, PIPE_SEQ);
Denis Vlasenkob6e65562009-04-03 16:49:04 +00003841 debug_printf_parse("pop stack %p\n", ctx->stack);
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003842 old = ctx->stack;
3843 old->command->group = ctx->list_head;
Denys Vlasenko9d617c42009-06-09 18:40:52 +02003844 old->command->cmd_type = CMD_NORMAL;
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003845# if !BB_MMU
Denys Vlasenkob5be13c2015-09-04 06:22:10 +02003846 /* At this point, the compound command's string is in
3847 * ctx->as_string... except for the leading keyword!
3848 * Consider this example: "echo a | if true; then echo a; fi"
3849 * ctx->as_string will contain "true; then echo a; fi",
3850 * with "if " remaining in old->as_string!
3851 */
3852 {
3853 char *str;
3854 int len = old->as_string.length;
3855 /* Concatenate halves */
3856 o_addstr(&old->as_string, ctx->as_string.data);
3857 o_free_unsafe(&ctx->as_string);
3858 /* Find where leading keyword starts in first half */
3859 str = old->as_string.data + len;
3860 if (str > old->as_string.data)
3861 str--; /* skip whitespace after keyword */
3862 while (str > old->as_string.data && isalpha(str[-1]))
3863 str--;
3864 /* Ugh, we're done with this horrid hack */
3865 old->command->group_as_string = xstrdup(str);
3866 debug_printf_parse("pop, remembering as:'%s'\n",
3867 old->command->group_as_string);
3868 }
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003869# endif
Denis Vlasenkoc3735272008-10-09 12:58:26 +00003870 *ctx = *old; /* physical copy */
3871 free(old);
3872 }
Denys Vlasenko5807e182018-02-08 19:19:04 +01003873 return r;
Eric Andersen25f27032001-04-26 23:22:31 +00003874}
Denys Vlasenkoc0836532009-10-19 13:13:06 +02003875#endif /* HAS_KEYWORDS */
Eric Andersen25f27032001-04-26 23:22:31 +00003876
Denis Vlasenkoa8442002008-06-14 11:00:17 +00003877/* Word is complete, look at it and update parsing context.
Denis Vlasenkob6e65562009-04-03 16:49:04 +00003878 * Normal return is 0. Syntax errors return 1.
3879 * Note: on return, word is reset, but not o_free'd!
3880 */
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003881static int done_word(struct parse_context *ctx)
Eric Andersen25f27032001-04-26 23:22:31 +00003882{
Denis Vlasenko9af22c72008-10-09 12:54:58 +00003883 struct command *command = ctx->command;
Eric Andersen25f27032001-04-26 23:22:31 +00003884
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003885 debug_printf_parse("done_word entered: '%s' %p\n", ctx->word.data, command);
3886 if (ctx->word.length == 0 && !ctx->word.has_quoted_part) {
Denis Vlasenkoab876cd2008-06-18 16:29:32 +00003887 debug_printf_parse("done_word return 0: true null, ignored\n");
3888 return 0;
Eric Andersen25f27032001-04-26 23:22:31 +00003889 }
Denis Vlasenko2b576b82008-08-04 00:46:07 +00003890
Eric Andersen25f27032001-04-26 23:22:31 +00003891 if (ctx->pending_redirect) {
Denis Vlasenkoab876cd2008-06-18 16:29:32 +00003892 /* We do not glob in e.g. >*.tmp case. bash seems to glob here
3893 * only if run as "bash", not "sh" */
Denys Vlasenkoe84212f2018-04-01 20:11:23 +02003894 /* http://pubs.opengroup.org/onlinepubs/9699919799/utilities/V3_chap02.html
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00003895 * "2.7 Redirection
Denys Vlasenkoe84212f2018-04-01 20:11:23 +02003896 * If the redirection operator is "<<" or "<<-", the word
3897 * that follows the redirection operator shall be
3898 * subjected to quote removal; it is unspecified whether
3899 * any of the other expansions occur. For the other
3900 * redirection operators, the word that follows the
3901 * redirection operator shall be subjected to tilde
3902 * expansion, parameter expansion, command substitution,
3903 * arithmetic expansion, and quote removal.
3904 * Pathname expansion shall not be performed
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00003905 * on the word by a non-interactive shell; an interactive
3906 * shell may perform it, but shall do so only when
3907 * the expansion would result in one word."
3908 */
Denys Vlasenkobb6f5732018-04-01 18:55:00 +02003909//bash does not do parameter/command substitution or arithmetic expansion
3910//for _heredoc_ redirection word: these constructs look for exact eof marker
3911// as written:
3912// <<EOF$t
3913// <<EOF$((1))
Denys Vlasenkoe84212f2018-04-01 20:11:23 +02003914// <<EOF`true` [this case also makes heredoc "quoted", a-la <<"EOF". Probably bash-4.3.43 bug]
3915
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003916 ctx->pending_redirect->rd_filename = xstrdup(ctx->word.data);
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00003917 /* Cater for >\file case:
3918 * >\a creates file a; >\\a, >"\a", >"\\a" create file \a
3919 * Same with heredocs:
3920 * for <<\H delim is H; <<\\H, <<"\H", <<"\\H" - \H
3921 */
Denys Vlasenkoe640cb42009-05-28 16:49:11 +02003922 if (ctx->pending_redirect->rd_type == REDIRECT_HEREDOC) {
3923 unbackslash(ctx->pending_redirect->rd_filename);
3924 /* Is it <<"HEREDOC"? */
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003925 if (ctx->word.has_quoted_part) {
Denys Vlasenkoe640cb42009-05-28 16:49:11 +02003926 ctx->pending_redirect->rd_dup |= HEREDOC_QUOTED;
3927 }
Denis Vlasenko02d6f1a2009-04-07 19:56:55 +00003928 }
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003929 debug_printf_parse("word stored in rd_filename: '%s'\n", ctx->word.data);
Denis Vlasenko1fd1ea42009-04-10 12:03:20 +00003930 ctx->pending_redirect = NULL;
Eric Andersen25f27032001-04-26 23:22:31 +00003931 } else {
Denis Vlasenko5ec61322008-06-24 00:50:07 +00003932#if HAS_KEYWORDS
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00003933# if ENABLE_HUSH_CASE
Denis Vlasenko757361f2008-07-14 08:26:47 +00003934 if (ctx->ctx_dsemicolon
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003935 && strcmp(ctx->word.data, "esac") != 0 /* not "... pattern) cmd;; esac" */
Denis Vlasenko757361f2008-07-14 08:26:47 +00003936 ) {
Denis Vlasenko395ae452008-07-14 06:29:38 +00003937 /* already done when ctx_dsemicolon was set to 1: */
Denis Vlasenko17f02e72008-07-14 04:32:29 +00003938 /* ctx->ctx_res_w = RES_MATCH; */
3939 ctx->ctx_dsemicolon = 0;
3940 } else
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00003941# endif
Denis Vlasenko9af22c72008-10-09 12:54:58 +00003942 if (!command->argv /* if it's the first word... */
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00003943# if ENABLE_HUSH_LOOPS
Denis Vlasenko733e3fb2008-07-06 10:01:13 +00003944 && ctx->ctx_res_w != RES_FOR /* ...not after FOR or IN */
3945 && ctx->ctx_res_w != RES_IN
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00003946# endif
Denys Vlasenkoe9bda902009-05-23 16:50:07 +02003947# if ENABLE_HUSH_CASE
3948 && ctx->ctx_res_w != RES_CASE
3949# endif
Denis Vlasenko733e3fb2008-07-06 10:01:13 +00003950 ) {
Denys Vlasenko5807e182018-02-08 19:19:04 +01003951 const struct reserved_combo *reserved;
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003952 reserved = reserved_word(ctx);
Denys Vlasenko5807e182018-02-08 19:19:04 +01003953 debug_printf_parse("checking for reserved-ness: %d\n", !!reserved);
Denys Vlasenko29f9b722011-05-14 11:27:36 +02003954 if (reserved) {
Denys Vlasenko5807e182018-02-08 19:19:04 +01003955# if ENABLE_HUSH_LINENO_VAR
3956/* Case:
3957 * "while ...; do
3958 * cmd ..."
3959 * If we don't close the pipe _now_, immediately after "do", lineno logic
3960 * sees "cmd" as starting at "do" - i.e., at the previous line.
3961 */
3962 if (0
3963 IF_HUSH_IF(|| reserved->res == RES_THEN)
3964 IF_HUSH_IF(|| reserved->res == RES_ELIF)
3965 IF_HUSH_IF(|| reserved->res == RES_ELSE)
3966 IF_HUSH_LOOPS(|| reserved->res == RES_DO)
3967 ) {
3968 done_pipe(ctx, PIPE_SEQ);
3969 }
3970# endif
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003971 o_reset_to_empty_unquoted(&ctx->word);
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00003972 debug_printf_parse("done_word return %d\n",
3973 (ctx->ctx_res_w == RES_SNTX));
Denis Vlasenko5ec61322008-06-24 00:50:07 +00003974 return (ctx->ctx_res_w == RES_SNTX);
Denis Vlasenkoe725bfe2007-05-03 22:45:39 +00003975 }
Denys Vlasenko11752d42018-04-03 08:20:58 +02003976# if defined(CMD_SINGLEWORD_NOGLOB)
3977 if (0
3978# if BASH_TEST2
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003979 || strcmp(ctx->word.data, "[[") == 0
Denys Vlasenko11752d42018-04-03 08:20:58 +02003980# endif
3981 /* In bash, local/export/readonly are special, args
3982 * are assignments and therefore expansion of them
3983 * should be "one-word" expansion:
3984 * $ export i=`echo 'a b'` # one arg: "i=a b"
3985 * compare with:
3986 * $ ls i=`echo 'a b'` # two args: "i=a" and "b"
3987 * ls: cannot access i=a: No such file or directory
3988 * ls: cannot access b: No such file or directory
3989 * Note: bash 3.2.33(1) does this only if export word
3990 * itself is not quoted:
3991 * $ export i=`echo 'aaa bbb'`; echo "$i"
3992 * aaa bbb
3993 * $ "export" i=`echo 'aaa bbb'`; echo "$i"
3994 * aaa
3995 */
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02003996 IF_HUSH_LOCAL( || strcmp(ctx->word.data, "local") == 0)
3997 IF_HUSH_EXPORT( || strcmp(ctx->word.data, "export") == 0)
3998 IF_HUSH_READONLY(|| strcmp(ctx->word.data, "readonly") == 0)
Denys Vlasenko11752d42018-04-03 08:20:58 +02003999 ) {
Denys Vlasenko9d617c42009-06-09 18:40:52 +02004000 command->cmd_type = CMD_SINGLEWORD_NOGLOB;
4001 }
4002 /* fall through */
Denys Vlasenko9ca656b2009-06-10 13:39:35 +02004003# endif
Eric Andersen25f27032001-04-26 23:22:31 +00004004 }
Denys Vlasenko11752d42018-04-03 08:20:58 +02004005#endif /* HAS_KEYWORDS */
4006
Denis Vlasenkobb929512009-04-16 10:59:40 +00004007 if (command->group) {
4008 /* "{ echo foo; } echo bar" - bad */
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02004009 syntax_error_at(ctx->word.data);
Denis Vlasenkobb929512009-04-16 10:59:40 +00004010 debug_printf_parse("done_word return 1: syntax error, "
4011 "groups and arglists don't mix\n");
4012 return 1;
4013 }
Denys Vlasenko29f9b722011-05-14 11:27:36 +02004014
4015 /* If this word wasn't an assignment, next ones definitely
4016 * can't be assignments. Even if they look like ones. */
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02004017 if (ctx->is_assignment != DEFINITELY_ASSIGNMENT
4018 && ctx->is_assignment != WORD_IS_KEYWORD
Denys Vlasenko29f9b722011-05-14 11:27:36 +02004019 ) {
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02004020 ctx->is_assignment = NOT_ASSIGNMENT;
Denys Vlasenko29f9b722011-05-14 11:27:36 +02004021 } else {
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02004022 if (ctx->is_assignment == DEFINITELY_ASSIGNMENT) {
Denys Vlasenko29f9b722011-05-14 11:27:36 +02004023 command->assignment_cnt++;
4024 debug_printf_parse("++assignment_cnt=%d\n", command->assignment_cnt);
4025 }
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02004026 debug_printf_parse("ctx->is_assignment was:'%s'\n", assignment_flag[ctx->is_assignment]);
4027 ctx->is_assignment = MAYBE_ASSIGNMENT;
Denys Vlasenko29f9b722011-05-14 11:27:36 +02004028 }
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02004029 debug_printf_parse("ctx->is_assignment='%s'\n", assignment_flag[ctx->is_assignment]);
4030 command->argv = add_string_to_strings(command->argv, xstrdup(ctx->word.data));
Denis Vlasenko9af22c72008-10-09 12:54:58 +00004031 debug_print_strings("word appended to argv", command->argv);
Denis Vlasenkoe725bfe2007-05-03 22:45:39 +00004032 }
Eric Andersen25f27032001-04-26 23:22:31 +00004033
Denis Vlasenko06810332007-05-21 23:30:54 +00004034#if ENABLE_HUSH_LOOPS
Denis Vlasenko733e3fb2008-07-06 10:01:13 +00004035 if (ctx->ctx_res_w == RES_FOR) {
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02004036 if (ctx->word.has_quoted_part
Denis Vlasenko1fd1ea42009-04-10 12:03:20 +00004037 || !is_well_formed_var_name(command->argv[0], '\0')
4038 ) {
Denis Vlasenkob7d8c0d2009-04-10 19:05:43 +00004039 /* bash says just "not a valid identifier" */
Denis Vlasenko1fd1ea42009-04-10 12:03:20 +00004040 syntax_error("not a valid identifier in for");
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00004041 return 1;
4042 }
Denis Vlasenko1fd1ea42009-04-10 12:03:20 +00004043 /* Force FOR to have just one word (variable name) */
4044 /* NB: basically, this makes hush see "for v in ..."
4045 * syntax as if it is "for v; in ...". FOR and IN become
4046 * two pipe structs in parse tree. */
Denis Vlasenkofbf6dea2007-04-13 19:56:56 +00004047 done_pipe(ctx, PIPE_SEQ);
Denis Vlasenko733e3fb2008-07-06 10:01:13 +00004048 }
Denis Vlasenko06810332007-05-21 23:30:54 +00004049#endif
Denis Vlasenko17f02e72008-07-14 04:32:29 +00004050#if ENABLE_HUSH_CASE
4051 /* Force CASE to have just one word */
4052 if (ctx->ctx_res_w == RES_CASE) {
4053 done_pipe(ctx, PIPE_SEQ);
4054 }
4055#endif
Denis Vlasenko1fd1ea42009-04-10 12:03:20 +00004056
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02004057 o_reset_to_empty_unquoted(&ctx->word);
Denis Vlasenko1fd1ea42009-04-10 12:03:20 +00004058
Denis Vlasenkoe725bfe2007-05-03 22:45:39 +00004059 debug_printf_parse("done_word return 0\n");
Eric Andersen25f27032001-04-26 23:22:31 +00004060 return 0;
4061}
4062
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004063
4064/* Peek ahead in the input to find out if we have a "&n" construct,
4065 * as in "2>&1", that represents duplicating a file descriptor.
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00004066 * Return:
4067 * REDIRFD_CLOSE if >&- "close fd" construct is seen,
4068 * REDIRFD_SYNTAX_ERR if syntax error,
4069 * REDIRFD_TO_FILE if no & was seen,
4070 * or the number found.
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004071 */
4072#if BB_MMU
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00004073#define parse_redir_right_fd(as_string, input) \
4074 parse_redir_right_fd(input)
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004075#endif
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00004076static int parse_redir_right_fd(o_string *as_string, struct in_str *input)
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004077{
4078 int ch, d, ok;
4079
4080 ch = i_peek(input);
4081 if (ch != '&')
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00004082 return REDIRFD_TO_FILE;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004083
4084 ch = i_getch(input); /* get the & */
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004085 nommu_addchr(as_string, ch);
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004086 ch = i_peek(input);
4087 if (ch == '-') {
4088 ch = i_getch(input);
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004089 nommu_addchr(as_string, ch);
Denis Vlasenko02d6f1a2009-04-07 19:56:55 +00004090 return REDIRFD_CLOSE;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004091 }
4092 d = 0;
4093 ok = 0;
4094 while (ch != EOF && isdigit(ch)) {
4095 d = d*10 + (ch-'0');
4096 ok = 1;
4097 ch = i_getch(input);
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004098 nommu_addchr(as_string, ch);
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004099 ch = i_peek(input);
4100 }
4101 if (ok) return d;
4102
4103//TODO: this is the place to catch ">&file" bashism (redirect both fd 1 and 2)
4104
4105 bb_error_msg("ambiguous redirect");
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00004106 return REDIRFD_SYNTAX_ERR;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004107}
4108
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00004109/* Return code is 0 normal, 1 if a syntax error is detected
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004110 */
4111static int parse_redirect(struct parse_context *ctx,
4112 int fd,
4113 redir_type style,
4114 struct in_str *input)
4115{
4116 struct command *command = ctx->command;
4117 struct redir_struct *redir;
4118 struct redir_struct **redirp;
4119 int dup_num;
4120
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00004121 dup_num = REDIRFD_TO_FILE;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004122 if (style != REDIRECT_HEREDOC) {
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00004123 /* Check for a '>&1' type redirect */
4124 dup_num = parse_redir_right_fd(&ctx->as_string, input);
4125 if (dup_num == REDIRFD_SYNTAX_ERR)
4126 return 1;
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004127 } else {
Denys Vlasenkoa94eeb02018-03-31 20:16:31 +02004128 int ch = i_peek_and_eat_bkslash_nl(input);
Denis Vlasenko02d6f1a2009-04-07 19:56:55 +00004129 dup_num = (ch == '-'); /* HEREDOC_SKIPTABS bit is 1 */
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004130 if (dup_num) { /* <<-... */
4131 ch = i_getch(input);
4132 nommu_addchr(&ctx->as_string, ch);
4133 ch = i_peek(input);
4134 }
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004135 }
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004136
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00004137 if (style == REDIRECT_OVERWRITE && dup_num == REDIRFD_TO_FILE) {
Denys Vlasenkoa94eeb02018-03-31 20:16:31 +02004138 int ch = i_peek_and_eat_bkslash_nl(input);
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004139 if (ch == '|') {
4140 /* >|FILE redirect ("clobbering" >).
4141 * Since we do not support "set -o noclobber" yet,
4142 * >| and > are the same for now. Just eat |.
4143 */
4144 ch = i_getch(input);
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004145 nommu_addchr(&ctx->as_string, ch);
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004146 }
4147 }
4148
4149 /* Create a new redir_struct and append it to the linked list */
4150 redirp = &command->redirects;
4151 while ((redir = *redirp) != NULL) {
4152 redirp = &(redir->next);
4153 }
4154 *redirp = redir = xzalloc(sizeof(*redir));
4155 /* redir->next = NULL; */
4156 /* redir->rd_filename = NULL; */
4157 redir->rd_type = style;
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004158 redir->rd_fd = (fd == -1) ? redir_table[style].default_fd : fd;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004159
Denis Vlasenko02d6f1a2009-04-07 19:56:55 +00004160 debug_printf_parse("redirect type %d %s\n", redir->rd_fd,
4161 redir_table[style].descrip);
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004162
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004163 redir->rd_dup = dup_num;
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00004164 if (style != REDIRECT_HEREDOC && dup_num != REDIRFD_TO_FILE) {
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004165 /* Erik had a check here that the file descriptor in question
4166 * is legit; I postpone that to "run time"
4167 * A "-" representation of "close me" shows up as a -3 here */
Denis Vlasenko02d6f1a2009-04-07 19:56:55 +00004168 debug_printf_parse("duplicating redirect '%d>&%d'\n",
4169 redir->rd_fd, redir->rd_dup);
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004170 } else {
Denys Vlasenkod6a37d82016-09-20 16:22:24 +02004171#if 0 /* Instead we emit error message at run time */
4172 if (ctx->pending_redirect) {
4173 /* For example, "cmd > <file" */
Denys Vlasenko39701202017-08-02 19:44:05 +02004174 syntax_error("invalid redirect");
Denys Vlasenkod6a37d82016-09-20 16:22:24 +02004175 }
4176#endif
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004177 /* Set ctx->pending_redirect, so we know what to do at the
4178 * end of the next parsed word. */
4179 ctx->pending_redirect = redir;
4180 }
4181 return 0;
4182}
4183
Eric Andersen25f27032001-04-26 23:22:31 +00004184/* If a redirect is immediately preceded by a number, that number is
4185 * supposed to tell which file descriptor to redirect. This routine
4186 * looks for such preceding numbers. In an ideal world this routine
4187 * needs to handle all the following classes of redirects...
4188 * echo 2>foo # redirects fd 2 to file "foo", nothing passed to echo
4189 * echo 49>foo # redirects fd 49 to file "foo", nothing passed to echo
4190 * echo -2>foo # redirects fd 1 to file "foo", "-2" passed to echo
4191 * echo 49x>foo # redirects fd 1 to file "foo", "49x" passed to echo
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004192 *
4193 * http://www.opengroup.org/onlinepubs/009695399/utilities/xcu_chap02.html
4194 * "2.7 Redirection
4195 * ... If n is quoted, the number shall not be recognized as part of
4196 * the redirection expression. For example:
4197 * echo \2>a
4198 * writes the character 2 into file a"
Denys Vlasenko38292b62010-09-05 14:49:40 +02004199 * We are getting it right by setting ->has_quoted_part on any \<char>
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004200 *
4201 * A -1 return means no valid number was found,
4202 * the caller should use the appropriate default for this redirection.
Eric Andersen25f27032001-04-26 23:22:31 +00004203 */
4204static int redirect_opt_num(o_string *o)
4205{
4206 int num;
4207
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004208 if (o->data == NULL)
Denis Vlasenkobb81c582007-01-30 22:32:09 +00004209 return -1;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004210 num = bb_strtou(o->data, NULL, 10);
4211 if (errno || num < 0)
4212 return -1;
Denis Vlasenko0b677d82009-04-10 13:49:10 +00004213 o_reset_to_empty_unquoted(o);
Eric Andersen25f27032001-04-26 23:22:31 +00004214 return num;
4215}
4216
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004217#if BB_MMU
4218#define fetch_till_str(as_string, input, word, skip_tabs) \
4219 fetch_till_str(input, word, skip_tabs)
4220#endif
4221static char *fetch_till_str(o_string *as_string,
4222 struct in_str *input,
4223 const char *word,
Denys Vlasenko77b32cc2010-09-06 11:27:32 +02004224 int heredoc_flags)
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004225{
4226 o_string heredoc = NULL_O_STRING;
Denys Vlasenko5b6210c2010-09-09 13:32:21 +02004227 unsigned past_EOL;
Denys Vlasenko77b32cc2010-09-06 11:27:32 +02004228 int prev = 0; /* not \ */
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004229 int ch;
4230
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004231 goto jump_in;
Denys Vlasenkob8709032011-05-08 21:20:01 +02004232
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004233 while (1) {
4234 ch = i_getch(input);
Denys Vlasenko5b6210c2010-09-09 13:32:21 +02004235 if (ch != EOF)
4236 nommu_addchr(as_string, ch);
Denys Vlasenko0f018b32017-07-29 20:43:26 +02004237 if (ch == '\n' || ch == EOF) {
4238 check_heredoc_end:
4239 if ((heredoc_flags & HEREDOC_QUOTED) || prev != '\\') {
4240 if (strcmp(heredoc.data + past_EOL, word) == 0) {
4241 heredoc.data[past_EOL] = '\0';
4242 debug_printf_parse("parsed heredoc '%s'\n", heredoc.data);
4243 return heredoc.data;
4244 }
4245 if (ch == '\n') {
4246 /* This is a new line.
4247 * Remember position and backslash-escaping status.
4248 */
4249 o_addchr(&heredoc, ch);
4250 prev = ch;
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004251 jump_in:
Denys Vlasenko0f018b32017-07-29 20:43:26 +02004252 past_EOL = heredoc.length;
4253 /* Get 1st char of next line, possibly skipping leading tabs */
4254 do {
4255 ch = i_getch(input);
4256 if (ch != EOF)
4257 nommu_addchr(as_string, ch);
4258 } while ((heredoc_flags & HEREDOC_SKIPTABS) && ch == '\t');
4259 /* If this immediately ended the line,
4260 * go back to end-of-line checks.
4261 */
4262 if (ch == '\n')
4263 goto check_heredoc_end;
4264 }
Denys Vlasenko5b6210c2010-09-09 13:32:21 +02004265 }
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004266 }
4267 if (ch == EOF) {
4268 o_free_unsafe(&heredoc);
4269 return NULL;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004270 }
4271 o_addchr(&heredoc, ch);
Denys Vlasenko5b6210c2010-09-09 13:32:21 +02004272 nommu_addchr(as_string, ch);
Denys Vlasenkoc3adfac2010-09-06 11:46:03 +02004273 if (prev == '\\' && ch == '\\')
4274 /* Correctly handle foo\\<eol> (not a line cont.) */
4275 prev = 0; /* not \ */
4276 else
4277 prev = ch;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004278 }
4279}
4280
Denis Vlasenko3dfb0352009-04-08 09:29:14 +00004281/* Look at entire parse tree for not-yet-loaded REDIRECT_HEREDOCs
4282 * and load them all. There should be exactly heredoc_cnt of them.
4283 */
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004284static int fetch_heredocs(int heredoc_cnt, struct parse_context *ctx, struct in_str *input)
4285{
4286 struct pipe *pi = ctx->list_head;
4287
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00004288 while (pi && heredoc_cnt) {
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004289 int i;
4290 struct command *cmd = pi->cmds;
4291
4292 debug_printf_parse("fetch_heredocs: num_cmds:%d cmd argv0:'%s'\n",
4293 pi->num_cmds,
4294 cmd->argv ? cmd->argv[0] : "NONE");
4295 for (i = 0; i < pi->num_cmds; i++) {
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004296 struct redir_struct *redir = cmd->redirects;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004297
4298 debug_printf_parse("fetch_heredocs: %d cmd argv0:'%s'\n",
4299 i, cmd->argv ? cmd->argv[0] : "NONE");
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004300 while (redir) {
4301 if (redir->rd_type == REDIRECT_HEREDOC) {
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004302 char *p;
4303
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004304 redir->rd_type = REDIRECT_HEREDOC2;
Denys Vlasenko764b2f02009-06-07 16:05:04 +02004305 /* redir->rd_dup is (ab)used to indicate <<- */
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004306 p = fetch_till_str(&ctx->as_string, input,
Denys Vlasenko77b32cc2010-09-06 11:27:32 +02004307 redir->rd_filename, redir->rd_dup);
Denis Vlasenko3dfb0352009-04-08 09:29:14 +00004308 if (!p) {
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00004309 syntax_error("unexpected EOF in here document");
Denis Vlasenko3dfb0352009-04-08 09:29:14 +00004310 return 1;
4311 }
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004312 free(redir->rd_filename);
4313 redir->rd_filename = p;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004314 heredoc_cnt--;
4315 }
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004316 redir = redir->next;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004317 }
4318 cmd++;
4319 }
4320 pi = pi->next;
4321 }
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00004322#if 0
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004323 /* Should be 0. If it isn't, it's a parse error */
Denis Vlasenko3dfb0352009-04-08 09:29:14 +00004324 if (heredoc_cnt)
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00004325 bb_error_msg_and_die("heredoc BUG 2");
4326#endif
4327 return 0;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004328}
4329
4330
Denys Vlasenkob36abf22010-09-05 14:50:59 +02004331static int run_list(struct pipe *pi);
4332#if BB_MMU
4333#define parse_stream(pstring, input, end_trigger) \
4334 parse_stream(input, end_trigger)
4335#endif
4336static struct pipe *parse_stream(char **pstring,
4337 struct in_str *input,
4338 int end_trigger);
Denis Vlasenkoba7cf262007-05-25 14:34:30 +00004339
Eric Andersen25f27032001-04-26 23:22:31 +00004340
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02004341static int parse_group(struct parse_context *ctx,
Eric Andersen25f27032001-04-26 23:22:31 +00004342 struct in_str *input, int ch)
4343{
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02004344 /* ctx->word contains characters seen prior to ( or {.
Denis Vlasenko027e3fd2009-04-02 22:50:40 +00004345 * Typically it's empty, but for function defs,
Denis Vlasenko371de4a2008-10-14 12:43:13 +00004346 * it contains function name (without '()'). */
Denys Vlasenkofbf44852018-04-03 14:56:52 +02004347#if BB_MMU
4348# define as_string NULL
4349#else
4350 char *as_string = NULL;
4351#endif
Denis Vlasenkob6e65562009-04-03 16:49:04 +00004352 struct pipe *pipe_list;
Denis Vlasenko240c2552009-04-03 03:45:05 +00004353 int endch;
Denis Vlasenko9af22c72008-10-09 12:54:58 +00004354 struct command *command = ctx->command;
Denis Vlasenkoe725bfe2007-05-03 22:45:39 +00004355
4356 debug_printf_parse("parse_group entered\n");
Denis Vlasenko371de4a2008-10-14 12:43:13 +00004357#if ENABLE_HUSH_FUNCTIONS
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02004358 if (ch == '(' && !ctx->word.has_quoted_part) {
4359 if (ctx->word.length)
4360 if (done_word(ctx))
Denis Vlasenkobb929512009-04-16 10:59:40 +00004361 return 1;
Denis Vlasenkoc0ea3292009-04-10 21:22:02 +00004362 if (!command->argv)
4363 goto skip; /* (... */
4364 if (command->argv[1]) { /* word word ... (... */
4365 syntax_error_unexpected_ch('(');
4366 return 1;
Denis Vlasenkob7d8c0d2009-04-10 19:05:43 +00004367 }
Denis Vlasenkoc0ea3292009-04-10 21:22:02 +00004368 /* it is "word(..." or "word (..." */
4369 do
4370 ch = i_getch(input);
4371 while (ch == ' ' || ch == '\t');
4372 if (ch != ')') {
4373 syntax_error_unexpected_ch(ch);
4374 return 1;
4375 }
4376 nommu_addchr(&ctx->as_string, ch);
4377 do
4378 ch = i_getch(input);
4379 while (ch == ' ' || ch == '\t' || ch == '\n');
Denys Vlasenkofbf44852018-04-03 14:56:52 +02004380 if (ch != '{' && ch != '(') {
Denis Vlasenkoc0ea3292009-04-10 21:22:02 +00004381 syntax_error_unexpected_ch(ch);
4382 return 1;
4383 }
4384 nommu_addchr(&ctx->as_string, ch);
Denys Vlasenko9d617c42009-06-09 18:40:52 +02004385 command->cmd_type = CMD_FUNCDEF;
Denis Vlasenkoc0ea3292009-04-10 21:22:02 +00004386 goto skip;
Denis Vlasenko371de4a2008-10-14 12:43:13 +00004387 }
4388#endif
Denys Vlasenkod8389ad2009-11-16 03:18:46 +01004389
4390#if 0 /* Prevented by caller */
Denis Vlasenkob7d8c0d2009-04-10 19:05:43 +00004391 if (command->argv /* word [word]{... */
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02004392 || ctx->word.length /* word{... */
4393 || ctx->word.has_quoted_part /* ""{... */
Denis Vlasenko9af22c72008-10-09 12:54:58 +00004394 ) {
Denis Vlasenko05d3b7c2009-04-09 19:16:15 +00004395 syntax_error(NULL);
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004396 debug_printf_parse("parse_group return 1: "
4397 "syntax error, groups and arglists don't mix\n");
Denis Vlasenkoe725bfe2007-05-03 22:45:39 +00004398 return 1;
Eric Andersen25f27032001-04-26 23:22:31 +00004399 }
Denys Vlasenkod8389ad2009-11-16 03:18:46 +01004400#endif
Denis Vlasenkob7d8c0d2009-04-10 19:05:43 +00004401
Denys Vlasenkofbf44852018-04-03 14:56:52 +02004402 IF_HUSH_FUNCTIONS(skip:)
4403
Denis Vlasenko240c2552009-04-03 03:45:05 +00004404 endch = '}';
Denis Vlasenko90e485c2007-05-23 15:22:50 +00004405 if (ch == '(') {
Denis Vlasenko240c2552009-04-03 03:45:05 +00004406 endch = ')';
Denys Vlasenkofbf44852018-04-03 14:56:52 +02004407 IF_HUSH_FUNCTIONS(if (command->cmd_type != CMD_FUNCDEF))
4408 command->cmd_type = CMD_SUBSHELL;
Denis Vlasenkof8c1f022009-04-17 11:55:42 +00004409 } else {
4410 /* bash does not allow "{echo...", requires whitespace */
Denys Vlasenko672a55e2016-11-04 18:46:14 +01004411 ch = i_peek(input);
4412 if (ch != ' ' && ch != '\t' && ch != '\n'
4413 && ch != '(' /* but "{(..." is allowed (without whitespace) */
4414 ) {
Denis Vlasenkof8c1f022009-04-17 11:55:42 +00004415 syntax_error_unexpected_ch(ch);
4416 return 1;
4417 }
Denys Vlasenko672a55e2016-11-04 18:46:14 +01004418 if (ch != '(') {
4419 ch = i_getch(input);
4420 nommu_addchr(&ctx->as_string, ch);
4421 }
Eric Andersen25f27032001-04-26 23:22:31 +00004422 }
Denis Vlasenkob7d8c0d2009-04-10 19:05:43 +00004423
Denys Vlasenkofbf44852018-04-03 14:56:52 +02004424 pipe_list = parse_stream(&as_string, input, endch);
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00004425#if !BB_MMU
Denys Vlasenkofbf44852018-04-03 14:56:52 +02004426 if (as_string)
4427 o_addstr(&ctx->as_string, as_string);
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00004428#endif
Denys Vlasenkofbf44852018-04-03 14:56:52 +02004429
4430 /* empty ()/{} or parse error? */
4431 if (!pipe_list || pipe_list == ERR_PTR) {
4432 /* parse_stream already emitted error msg */
4433 if (!BB_MMU)
4434 free(as_string);
4435 debug_printf_parse("parse_group return 1: "
4436 "parse_stream returned %p\n", pipe_list);
4437 return 1;
Denis Vlasenkof8d01d32008-06-14 17:13:20 +00004438 }
Denys Vlasenkofbf44852018-04-03 14:56:52 +02004439#if !BB_MMU
4440 as_string[strlen(as_string) - 1] = '\0'; /* plink ')' or '}' */
4441 command->group_as_string = as_string;
4442 debug_printf_parse("end of group, remembering as:'%s'\n",
4443 command->group_as_string);
4444#endif
4445
4446#if ENABLE_HUSH_FUNCTIONS
4447 /* Convert "f() (cmds)" to "f() {(cmds)}" */
4448 if (command->cmd_type == CMD_FUNCDEF && endch == ')') {
4449 struct command *cmd2;
4450
4451 cmd2 = xzalloc(sizeof(*cmd2));
4452 cmd2->cmd_type = CMD_SUBSHELL;
4453 cmd2->group = pipe_list;
4454# if !BB_MMU
4455//UNTESTED!
4456 cmd2->group_as_string = command->group_as_string;
4457 command->group_as_string = xasprintf("(%s)", command->group_as_string);
4458# endif
4459
4460 pipe_list = new_pipe();
4461 pipe_list->cmds = cmd2;
4462 pipe_list->num_cmds = 1;
4463 }
4464#endif
4465
4466 command->group = pipe_list;
4467
Denis Vlasenkob6e65562009-04-03 16:49:04 +00004468 debug_printf_parse("parse_group return 0\n");
4469 return 0;
Denis Vlasenko9af22c72008-10-09 12:54:58 +00004470 /* command remains "open", available for possible redirects */
Denys Vlasenkofbf44852018-04-03 14:56:52 +02004471#undef as_string
Eric Andersen25f27032001-04-26 23:22:31 +00004472}
4473
Denys Vlasenko0b883582016-12-23 16:49:07 +01004474#if ENABLE_HUSH_TICK || ENABLE_FEATURE_SH_MATH || ENABLE_HUSH_DOLLAR_OPS
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004475/* Subroutines for copying $(...) and `...` things */
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004476static int add_till_backquote(o_string *dest, struct in_str *input, int in_dquote);
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004477/* '...' */
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004478static int add_till_single_quote(o_string *dest, struct in_str *input)
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004479{
4480 while (1) {
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00004481 int ch = i_getch(input);
Denis Vlasenko5c090a92009-04-08 21:51:33 +00004482 if (ch == EOF) {
Denis Vlasenkod68ae082009-04-09 20:41:34 +00004483 syntax_error_unterm_ch('\'');
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004484 return 0;
Denis Vlasenko5c090a92009-04-08 21:51:33 +00004485 }
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004486 if (ch == '\'')
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004487 return 1;
Denis Vlasenko82dfec32008-06-16 12:47:11 +00004488 o_addchr(dest, ch);
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004489 }
4490}
4491/* "...\"...`..`...." - do we need to handle "...$(..)..." too? */
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004492static int add_till_double_quote(o_string *dest, struct in_str *input)
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004493{
4494 while (1) {
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00004495 int ch = i_getch(input);
Denis Vlasenko5c090a92009-04-08 21:51:33 +00004496 if (ch == EOF) {
Denis Vlasenkod68ae082009-04-09 20:41:34 +00004497 syntax_error_unterm_ch('"');
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004498 return 0;
Denis Vlasenko5c090a92009-04-08 21:51:33 +00004499 }
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004500 if (ch == '"')
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004501 return 1;
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004502 if (ch == '\\') { /* \x. Copy both chars. */
Denis Vlasenko82dfec32008-06-16 12:47:11 +00004503 o_addchr(dest, ch);
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00004504 ch = i_getch(input);
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004505 }
Denis Vlasenko82dfec32008-06-16 12:47:11 +00004506 o_addchr(dest, ch);
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004507 if (ch == '`') {
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004508 if (!add_till_backquote(dest, input, /*in_dquote:*/ 1))
4509 return 0;
Denis Vlasenko82dfec32008-06-16 12:47:11 +00004510 o_addchr(dest, ch);
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004511 continue;
4512 }
Denis Vlasenko5703c222008-06-15 11:49:42 +00004513 //if (ch == '$') ...
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004514 }
4515}
4516/* Process `cmd` - copy contents until "`" is seen. Complicated by
4517 * \` quoting.
4518 * "Within the backquoted style of command substitution, backslash
4519 * shall retain its literal meaning, except when followed by: '$', '`', or '\'.
4520 * The search for the matching backquote shall be satisfied by the first
4521 * backquote found without a preceding backslash; during this search,
4522 * if a non-escaped backquote is encountered within a shell comment,
4523 * a here-document, an embedded command substitution of the $(command)
4524 * form, or a quoted string, undefined results occur. A single-quoted
4525 * or double-quoted string that begins, but does not end, within the
4526 * "`...`" sequence produces undefined results."
4527 * Example Output
4528 * echo `echo '\'TEST\`echo ZZ\`BEST` \TESTZZBEST
4529 */
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004530static int add_till_backquote(o_string *dest, struct in_str *input, int in_dquote)
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004531{
4532 while (1) {
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00004533 int ch = i_getch(input);
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004534 if (ch == '`')
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004535 return 1;
Denis Vlasenko5c090a92009-04-08 21:51:33 +00004536 if (ch == '\\') {
Denys Vlasenkoacd5bc82010-09-12 15:05:39 +02004537 /* \x. Copy both unless it is \`, \$, \\ and maybe \" */
4538 ch = i_getch(input);
4539 if (ch != '`'
4540 && ch != '$'
4541 && ch != '\\'
4542 && (!in_dquote || ch != '"')
4543 ) {
4544 o_addchr(dest, '\\');
Denis Vlasenko5c090a92009-04-08 21:51:33 +00004545 }
Denys Vlasenkoacd5bc82010-09-12 15:05:39 +02004546 }
4547 if (ch == EOF) {
4548 syntax_error_unterm_ch('`');
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004549 return 0;
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004550 }
Denis Vlasenko82dfec32008-06-16 12:47:11 +00004551 o_addchr(dest, ch);
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004552 }
4553}
4554/* Process $(cmd) - copy contents until ")" is seen. Complicated by
4555 * quoting and nested ()s.
4556 * "With the $(command) style of command substitution, all characters
4557 * following the open parenthesis to the matching closing parenthesis
4558 * constitute the command. Any valid shell script can be used for command,
4559 * except a script consisting solely of redirections which produces
4560 * unspecified results."
4561 * Example Output
4562 * echo $(echo '(TEST)' BEST) (TEST) BEST
4563 * echo $(echo 'TEST)' BEST) TEST) BEST
4564 * echo $(echo \(\(TEST\) BEST) ((TEST) BEST
Denys Vlasenko74369502010-05-21 19:52:01 +02004565 *
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004566 * Also adapted to eat ${var%...} and $((...)) constructs, since ... part
Denys Vlasenkoa6ad3972010-05-22 00:26:06 +02004567 * can contain arbitrary constructs, just like $(cmd).
Denys Vlasenko36f774a2010-09-05 14:45:38 +02004568 * In bash compat mode, it needs to also be able to stop on ':' or '/'
4569 * for ${var:N[:M]} and ${var/P[/R]} parsing.
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004570 */
Denys Vlasenko74369502010-05-21 19:52:01 +02004571#define DOUBLE_CLOSE_CHAR_FLAG 0x80
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004572static int add_till_closing_bracket(o_string *dest, struct in_str *input, unsigned end_ch)
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004573{
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004574 int ch;
Denys Vlasenko74369502010-05-21 19:52:01 +02004575 char dbl = end_ch & DOUBLE_CLOSE_CHAR_FLAG;
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01004576# if BASH_SUBSTR || BASH_PATTERN_SUBST
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004577 char end_char2 = end_ch >> 8;
Denys Vlasenko9297dbc2010-07-05 21:37:12 +02004578# endif
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004579 end_ch &= (DOUBLE_CLOSE_CHAR_FLAG - 1);
4580
Denys Vlasenko817a2022018-06-26 15:35:17 +02004581#if ENABLE_HUSH_INTERACTIVE
Denys Vlasenko8d6eab32018-04-07 17:01:31 +02004582 G.promptmode = 1; /* PS2 */
Denys Vlasenko817a2022018-06-26 15:35:17 +02004583#endif
Denys Vlasenko8d6eab32018-04-07 17:01:31 +02004584 debug_printf_prompt("%s promptmode=%d\n", __func__, G.promptmode);
4585
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004586 while (1) {
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004587 ch = i_getch(input);
Denis Vlasenko5c090a92009-04-08 21:51:33 +00004588 if (ch == EOF) {
Denys Vlasenkoa6ad3972010-05-22 00:26:06 +02004589 syntax_error_unterm_ch(end_ch);
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004590 return 0;
Denis Vlasenko5c090a92009-04-08 21:51:33 +00004591 }
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01004592 if (ch == end_ch
4593# if BASH_SUBSTR || BASH_PATTERN_SUBST
Denys Vlasenko55f81332018-03-02 18:12:12 +01004594 || ch == end_char2
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01004595# endif
4596 ) {
Denys Vlasenkoa6ad3972010-05-22 00:26:06 +02004597 if (!dbl)
4598 break;
4599 /* we look for closing )) of $((EXPR)) */
Denys Vlasenko657086a2016-09-29 18:07:42 +02004600 if (i_peek_and_eat_bkslash_nl(input) == end_ch) {
Denys Vlasenkoa6ad3972010-05-22 00:26:06 +02004601 i_getch(input); /* eat second ')' */
4602 break;
Mike Frysinger98c52642009-04-02 10:02:37 +00004603 }
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004604 }
Denis Vlasenko82dfec32008-06-16 12:47:11 +00004605 o_addchr(dest, ch);
Denys Vlasenkod4802c62018-03-02 20:48:36 +01004606 //bb_error_msg("%s:o_addchr('%c')", __func__, ch);
Denys Vlasenkoa6ad3972010-05-22 00:26:06 +02004607 if (ch == '(' || ch == '{') {
4608 ch = (ch == '(' ? ')' : '}');
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004609 if (!add_till_closing_bracket(dest, input, ch))
4610 return 0;
Denys Vlasenkoa6ad3972010-05-22 00:26:06 +02004611 o_addchr(dest, ch);
4612 continue;
4613 }
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004614 if (ch == '\'') {
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004615 if (!add_till_single_quote(dest, input))
4616 return 0;
Denis Vlasenko82dfec32008-06-16 12:47:11 +00004617 o_addchr(dest, ch);
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004618 continue;
4619 }
4620 if (ch == '"') {
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004621 if (!add_till_double_quote(dest, input))
4622 return 0;
Denis Vlasenko82dfec32008-06-16 12:47:11 +00004623 o_addchr(dest, ch);
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004624 continue;
4625 }
Denys Vlasenkoa6ad3972010-05-22 00:26:06 +02004626 if (ch == '`') {
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004627 if (!add_till_backquote(dest, input, /*in_dquote:*/ 0))
4628 return 0;
Denys Vlasenkoa6ad3972010-05-22 00:26:06 +02004629 o_addchr(dest, ch);
4630 continue;
4631 }
Denis Vlasenko5c090a92009-04-08 21:51:33 +00004632 if (ch == '\\') {
4633 /* \x. Copy verbatim. Important for \(, \) */
Denis Vlasenko76db5ad2008-06-12 12:58:20 +00004634 ch = i_getch(input);
Denis Vlasenko5c090a92009-04-08 21:51:33 +00004635 if (ch == EOF) {
Denys Vlasenkod4802c62018-03-02 20:48:36 +01004636 syntax_error_unterm_ch(end_ch);
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004637 return 0;
Denis Vlasenko5c090a92009-04-08 21:51:33 +00004638 }
Denys Vlasenko657086a2016-09-29 18:07:42 +02004639#if 0
4640 if (ch == '\n') {
4641 /* "backslash+newline", ignore both */
4642 o_delchr(dest); /* undo insertion of '\' */
4643 continue;
4644 }
4645#endif
Denis Vlasenko82dfec32008-06-16 12:47:11 +00004646 o_addchr(dest, ch);
Denys Vlasenkod4802c62018-03-02 20:48:36 +01004647 //bb_error_msg("%s:o_addchr('%c') after '\\'", __func__, ch);
Denis Vlasenko76db5ad2008-06-12 12:58:20 +00004648 continue;
4649 }
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004650 }
Denys Vlasenko8d6eab32018-04-07 17:01:31 +02004651 debug_printf_parse("%s return '%s' ch:'%c'\n", __func__, dest->data, ch);
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004652 return ch;
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004653}
Denys Vlasenko0b883582016-12-23 16:49:07 +01004654#endif /* ENABLE_HUSH_TICK || ENABLE_FEATURE_SH_MATH || ENABLE_HUSH_DOLLAR_OPS */
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00004655
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00004656/* Return code: 0 for OK, 1 for syntax error */
Denis Vlasenko609f2ab2009-04-04 23:15:14 +00004657#if BB_MMU
Denys Vlasenko101a4e32010-09-09 14:04:57 +02004658#define parse_dollar(as_string, dest, input, quote_mask) \
4659 parse_dollar(dest, input, quote_mask)
Denys Vlasenkoddc62f62010-05-22 00:53:32 +02004660#define as_string NULL
Denis Vlasenko609f2ab2009-04-04 23:15:14 +00004661#endif
Denys Vlasenko2e48d532010-05-22 17:30:39 +02004662static int parse_dollar(o_string *as_string,
Denis Vlasenko609f2ab2009-04-04 23:15:14 +00004663 o_string *dest,
Denys Vlasenko101a4e32010-09-09 14:04:57 +02004664 struct in_str *input, unsigned char quote_mask)
Eric Andersen25f27032001-04-26 23:22:31 +00004665{
Denys Vlasenko657086a2016-09-29 18:07:42 +02004666 int ch = i_peek_and_eat_bkslash_nl(input); /* first character after the $ */
Denis Vlasenkoe0a33672007-05-10 23:06:55 +00004667
Denys Vlasenko2e48d532010-05-22 17:30:39 +02004668 debug_printf_parse("parse_dollar entered: ch='%c'\n", ch);
Denis Vlasenko1f4cf512007-05-16 10:39:24 +00004669 if (isalpha(ch)) {
Denys Vlasenko0ca31982018-01-25 13:20:50 +01004670 make_var:
Denis Vlasenko609f2ab2009-04-04 23:15:14 +00004671 ch = i_getch(input);
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004672 nommu_addchr(as_string, ch);
Denys Vlasenko0ca31982018-01-25 13:20:50 +01004673 /*make_var1:*/
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00004674 o_addchr(dest, SPECIAL_VAR_SYMBOL);
Denis Vlasenkoe0a33672007-05-10 23:06:55 +00004675 while (1) {
Denis Vlasenkoe0a33672007-05-10 23:06:55 +00004676 debug_printf_parse(": '%c'\n", ch);
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00004677 o_addchr(dest, ch | quote_mask);
Denis Vlasenko1f4cf512007-05-16 10:39:24 +00004678 quote_mask = 0;
Denys Vlasenko657086a2016-09-29 18:07:42 +02004679 ch = i_peek_and_eat_bkslash_nl(input);
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02004680 if (!isalnum(ch) && ch != '_') {
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02004681 /* End of variable name reached */
Denis Vlasenko602d13c2007-05-13 18:34:53 +00004682 break;
Denys Vlasenkod17a91d2016-09-29 18:02:37 +02004683 }
Denis Vlasenko609f2ab2009-04-04 23:15:14 +00004684 ch = i_getch(input);
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004685 nommu_addchr(as_string, ch);
Eric Andersen25f27032001-04-26 23:22:31 +00004686 }
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00004687 o_addchr(dest, SPECIAL_VAR_SYMBOL);
Eric Andersen25f27032001-04-26 23:22:31 +00004688 } else if (isdigit(ch)) {
Denis Vlasenko602d13c2007-05-13 18:34:53 +00004689 make_one_char_var:
Denis Vlasenko609f2ab2009-04-04 23:15:14 +00004690 ch = i_getch(input);
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004691 nommu_addchr(as_string, ch);
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00004692 o_addchr(dest, SPECIAL_VAR_SYMBOL);
Denis Vlasenko602d13c2007-05-13 18:34:53 +00004693 debug_printf_parse(": '%c'\n", ch);
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00004694 o_addchr(dest, ch | quote_mask);
4695 o_addchr(dest, SPECIAL_VAR_SYMBOL);
Eric Andersen25f27032001-04-26 23:22:31 +00004696 } else switch (ch) {
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004697 case '$': /* pid */
4698 case '!': /* last bg pid */
4699 case '?': /* last exit code */
4700 case '#': /* number of args */
4701 case '*': /* args */
4702 case '@': /* args */
4703 goto make_one_char_var;
4704 case '{': {
Denys Vlasenko2093ad22017-07-26 00:07:27 +02004705 char len_single_ch;
4706
Mike Frysingeref3e7fd2009-06-01 14:13:39 -04004707 o_addchr(dest, SPECIAL_VAR_SYMBOL);
4708
Denys Vlasenko74369502010-05-21 19:52:01 +02004709 ch = i_getch(input); /* eat '{' */
4710 nommu_addchr(as_string, ch);
4711
Denys Vlasenko46e64982016-09-29 19:50:55 +02004712 ch = i_getch_and_eat_bkslash_nl(input); /* first char after '{' */
Denys Vlasenko74369502010-05-21 19:52:01 +02004713 /* It should be ${?}, or ${#var},
4714 * or even ${?+subst} - operator acting on a special variable,
4715 * or the beginning of variable name.
4716 */
Denys Vlasenko101a4e32010-09-09 14:04:57 +02004717 if (ch == EOF
4718 || (!strchr(_SPECIAL_VARS_STR, ch) && !isalnum(ch)) /* not one of those */
4719 ) {
Denys Vlasenko74369502010-05-21 19:52:01 +02004720 bad_dollar_syntax:
4721 syntax_error_unterm_str("${name}");
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004722 debug_printf_parse("parse_dollar return 0: unterminated ${name}\n");
4723 return 0;
Denys Vlasenko74369502010-05-21 19:52:01 +02004724 }
Denys Vlasenko101a4e32010-09-09 14:04:57 +02004725 nommu_addchr(as_string, ch);
Denys Vlasenko2093ad22017-07-26 00:07:27 +02004726 len_single_ch = ch;
Denys Vlasenko74369502010-05-21 19:52:01 +02004727 ch |= quote_mask;
4728
Denys Vlasenkoddc62f62010-05-22 00:53:32 +02004729 /* It's possible to just call add_till_closing_bracket() at this point.
Denys Vlasenko74369502010-05-21 19:52:01 +02004730 * However, this regresses some of our testsuite cases
4731 * which check invalid constructs like ${%}.
4732 * Oh well... let's check that the var name part is fine... */
4733
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004734 while (1) {
Denys Vlasenkoddc62f62010-05-22 00:53:32 +02004735 unsigned pos;
4736
Denys Vlasenko74369502010-05-21 19:52:01 +02004737 o_addchr(dest, ch);
4738 debug_printf_parse(": '%c'\n", ch);
4739
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004740 ch = i_getch(input);
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004741 nommu_addchr(as_string, ch);
Denys Vlasenko74369502010-05-21 19:52:01 +02004742 if (ch == '}')
Mike Frysinger98c52642009-04-02 10:02:37 +00004743 break;
Mike Frysinger98c52642009-04-02 10:02:37 +00004744
Denys Vlasenko74369502010-05-21 19:52:01 +02004745 if (!isalnum(ch) && ch != '_') {
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004746 unsigned end_ch;
4747 unsigned char last_ch;
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004748 /* handle parameter expansions
4749 * http://www.opengroup.org/onlinepubs/009695399/utilities/xcu_chap02.html#tag_02_06_02
4750 */
Denys Vlasenko2093ad22017-07-26 00:07:27 +02004751 if (!strchr(VAR_SUBST_OPS, ch)) { /* ${var<bad_char>... */
4752 if (len_single_ch != '#'
4753 /*|| !strchr(SPECIAL_VARS_STR, ch) - disallow errors like ${#+} ? */
4754 || i_peek(input) != '}'
4755 ) {
4756 goto bad_dollar_syntax;
4757 }
4758 /* else: it's "length of C" ${#C} op,
4759 * where C is a single char
4760 * special var name, e.g. ${#!}.
4761 */
4762 }
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004763 /* Eat everything until closing '}' (or ':') */
4764 end_ch = '}';
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01004765 if (BASH_SUBSTR
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004766 && ch == ':'
Denys Vlasenko36f774a2010-09-05 14:45:38 +02004767 && !strchr(MINUS_PLUS_EQUAL_QUESTION, i_peek(input))
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004768 ) {
4769 /* It's ${var:N[:M]} thing */
4770 end_ch = '}' * 0x100 + ':';
4771 }
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01004772 if (BASH_PATTERN_SUBST
Denys Vlasenko36f774a2010-09-05 14:45:38 +02004773 && ch == '/'
4774 ) {
4775 /* It's ${var/[/]pattern[/repl]} thing */
4776 if (i_peek(input) == '/') { /* ${var//pattern[/repl]}? */
4777 i_getch(input);
4778 nommu_addchr(as_string, '/');
4779 ch = '\\';
4780 }
4781 end_ch = '}' * 0x100 + '/';
4782 }
4783 o_addchr(dest, ch);
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004784 again:
Denys Vlasenkoddc62f62010-05-22 00:53:32 +02004785 if (!BB_MMU)
4786 pos = dest->length;
Denys Vlasenko9297dbc2010-07-05 21:37:12 +02004787#if ENABLE_HUSH_DOLLAR_OPS
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004788 last_ch = add_till_closing_bracket(dest, input, end_ch);
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004789 if (last_ch == 0) /* error? */
4790 return 0;
Denys Vlasenko9297dbc2010-07-05 21:37:12 +02004791#else
4792#error Simple code to only allow ${var} is not implemented
4793#endif
Denys Vlasenkoddc62f62010-05-22 00:53:32 +02004794 if (as_string) {
4795 o_addstr(as_string, dest->data + pos);
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004796 o_addchr(as_string, last_ch);
Denys Vlasenkoddc62f62010-05-22 00:53:32 +02004797 }
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004798
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01004799 if ((BASH_SUBSTR || BASH_PATTERN_SUBST)
4800 && (end_ch & 0xff00)
4801 ) {
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004802 /* close the first block: */
4803 o_addchr(dest, SPECIAL_VAR_SYMBOL);
Denys Vlasenko36f774a2010-09-05 14:45:38 +02004804 /* while parsing N from ${var:N[:M]}
4805 * or pattern from ${var/[/]pattern[/repl]} */
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004806 if ((end_ch & 0xff) == last_ch) {
Denys Vlasenko36f774a2010-09-05 14:45:38 +02004807 /* got ':' or '/'- parse the rest */
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004808 end_ch = '}';
4809 goto again;
4810 }
Denys Vlasenko36f774a2010-09-05 14:45:38 +02004811 /* got '}' */
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01004812 if (BASH_SUBSTR && end_ch == '}' * 0x100 + ':') {
Denys Vlasenko36f774a2010-09-05 14:45:38 +02004813 /* it's ${var:N} - emulate :999999999 */
4814 o_addstr(dest, "999999999");
4815 } /* else: it's ${var/[/]pattern} */
Denys Vlasenko1e811b12010-05-22 03:12:29 +02004816 }
Denys Vlasenko74369502010-05-21 19:52:01 +02004817 break;
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004818 }
Denys Vlasenko2093ad22017-07-26 00:07:27 +02004819 len_single_ch = 0; /* it can't be ${#C} op */
Denys Vlasenko74369502010-05-21 19:52:01 +02004820 }
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004821 o_addchr(dest, SPECIAL_VAR_SYMBOL);
4822 break;
4823 }
Denys Vlasenko0b883582016-12-23 16:49:07 +01004824#if ENABLE_FEATURE_SH_MATH || ENABLE_HUSH_TICK
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004825 case '(': {
Denys Vlasenkoddc62f62010-05-22 00:53:32 +02004826 unsigned pos;
4827
Denis Vlasenko609f2ab2009-04-04 23:15:14 +00004828 ch = i_getch(input);
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004829 nommu_addchr(as_string, ch);
Denys Vlasenko0b883582016-12-23 16:49:07 +01004830# if ENABLE_FEATURE_SH_MATH
Denys Vlasenko657086a2016-09-29 18:07:42 +02004831 if (i_peek_and_eat_bkslash_nl(input) == '(') {
Denis Vlasenko609f2ab2009-04-04 23:15:14 +00004832 ch = i_getch(input);
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004833 nommu_addchr(as_string, ch);
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004834 o_addchr(dest, SPECIAL_VAR_SYMBOL);
4835 o_addchr(dest, /*quote_mask |*/ '+');
Denys Vlasenkoddc62f62010-05-22 00:53:32 +02004836 if (!BB_MMU)
4837 pos = dest->length;
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004838 if (!add_till_closing_bracket(dest, input, ')' | DOUBLE_CLOSE_CHAR_FLAG))
4839 return 0; /* error */
Denis Vlasenkoc4a7af52009-04-05 20:33:27 +00004840 if (as_string) {
4841 o_addstr(as_string, dest->data + pos);
4842 o_addchr(as_string, ')');
4843 o_addchr(as_string, ')');
Denis Vlasenko0bb4a232009-04-05 01:42:59 +00004844 }
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004845 o_addchr(dest, SPECIAL_VAR_SYMBOL);
Eric Andersen25f27032001-04-26 23:22:31 +00004846 break;
Denis Vlasenko76db5ad2008-06-12 12:58:20 +00004847 }
Denis Vlasenkod85a5df2009-04-05 08:43:57 +00004848# endif
4849# if ENABLE_HUSH_TICK
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004850 o_addchr(dest, SPECIAL_VAR_SYMBOL);
4851 o_addchr(dest, quote_mask | '`');
Denys Vlasenkoddc62f62010-05-22 00:53:32 +02004852 if (!BB_MMU)
4853 pos = dest->length;
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004854 if (!add_till_closing_bracket(dest, input, ')'))
4855 return 0; /* error */
Denis Vlasenkoc4a7af52009-04-05 20:33:27 +00004856 if (as_string) {
4857 o_addstr(as_string, dest->data + pos);
Denys Vlasenkob70cef72010-01-12 13:45:45 +01004858 o_addchr(as_string, ')');
Denis Vlasenko0bb4a232009-04-05 01:42:59 +00004859 }
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004860 o_addchr(dest, SPECIAL_VAR_SYMBOL);
Denis Vlasenkod85a5df2009-04-05 08:43:57 +00004861# endif
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004862 break;
4863 }
Denis Vlasenkod85a5df2009-04-05 08:43:57 +00004864#endif
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004865 case '_':
Denys Vlasenko0ca31982018-01-25 13:20:50 +01004866 goto make_var;
4867#if 0
Denys Vlasenko69b1cef2009-09-21 10:21:44 +02004868 /* TODO: $_ and $-: */
4869 /* $_ Shell or shell script name; or last argument of last command
4870 * (if last command wasn't a pipe; if it was, bash sets $_ to "");
4871 * but in command's env, set to full pathname used to invoke it */
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004872 /* $- Option flags set by set builtin or shell options (-i etc) */
Denys Vlasenko0ca31982018-01-25 13:20:50 +01004873 ch = i_getch(input);
4874 nommu_addchr(as_string, ch);
4875 ch = i_peek_and_eat_bkslash_nl(input);
4876 if (isalnum(ch)) { /* it's $_name or $_123 */
4877 ch = '_';
4878 goto make_var1;
4879 }
4880 /* else: it's $_ */
4881#endif
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004882 default:
4883 o_addQchr(dest, '$');
Eric Andersen25f27032001-04-26 23:22:31 +00004884 }
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004885 debug_printf_parse("parse_dollar return 1 (ok)\n");
4886 return 1;
Denys Vlasenkoddc62f62010-05-22 00:53:32 +02004887#undef as_string
Eric Andersen25f27032001-04-26 23:22:31 +00004888}
4889
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00004890#if BB_MMU
Denys Vlasenkob762c782018-07-17 14:21:38 +02004891#define encode_string(as_string, dest, input, dquote_end) \
Denys Vlasenkod98e5c62010-09-10 10:44:23 +02004892 encode_string(dest, input, dquote_end)
Denys Vlasenkoddc62f62010-05-22 00:53:32 +02004893#define as_string NULL
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00004894#endif
Denys Vlasenkod98e5c62010-09-10 10:44:23 +02004895static int encode_string(o_string *as_string,
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00004896 o_string *dest,
4897 struct in_str *input,
Denys Vlasenkob762c782018-07-17 14:21:38 +02004898 int dquote_end)
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004899{
Denis Vlasenko6da69cd2009-04-04 12:12:58 +00004900 int ch;
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004901 int next;
4902
4903 again:
4904 ch = i_getch(input);
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00004905 if (ch != EOF)
4906 nommu_addchr(as_string, ch);
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004907 if (ch == dquote_end) { /* may be only '"' or EOF */
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004908 debug_printf_parse("encode_string return 1 (ok)\n");
4909 return 1;
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004910 }
Denis Vlasenko3dfb0352009-04-08 09:29:14 +00004911 /* note: can't move it above ch == dquote_end check! */
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004912 if (ch == EOF) {
Denis Vlasenkod68ae082009-04-09 20:41:34 +00004913 syntax_error_unterm_ch('"');
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004914 return 0; /* error */
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004915 }
4916 next = '\0';
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004917 if (ch != '\n') {
4918 next = i_peek(input);
4919 }
Denys Vlasenkof37eb392009-10-18 11:46:35 +02004920 debug_printf_parse("\" ch=%c (%d) escape=%d\n",
Denys Vlasenko5b686cb2010-09-08 13:44:34 +02004921 ch, ch, !!(dest->o_expflags & EXP_FLAG_ESC_GLOB_CHARS));
Denys Vlasenkob762c782018-07-17 14:21:38 +02004922 if (ch == '\\') {
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004923 if (next == EOF) {
Denys Vlasenko4709df02018-04-10 14:49:01 +02004924 /* Testcase: in interactive shell a file with
4925 * echo "unterminated string\<eof>
4926 * is sourced.
4927 */
4928 syntax_error_unterm_ch('"');
4929 return 0; /* error */
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004930 }
4931 /* bash:
4932 * "The backslash retains its special meaning [in "..."]
4933 * only when followed by one of the following characters:
4934 * $, `, ", \, or <newline>. A double quote may be quoted
Denys Vlasenkoe640cb42009-05-28 16:49:11 +02004935 * within double quotes by preceding it with a backslash."
Denys Vlasenkod98e5c62010-09-10 10:44:23 +02004936 * NB: in (unquoted) heredoc, above does not apply to ",
4937 * therefore we check for it by "next == dquote_end" cond.
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004938 */
Denys Vlasenkod98e5c62010-09-10 10:44:23 +02004939 if (next == dquote_end || strchr("$`\\\n", next)) {
Denys Vlasenko850b15b2010-09-09 12:58:19 +02004940 ch = i_getch(input); /* eat next */
4941 if (ch == '\n')
4942 goto again; /* skip \<newline> */
Denys Vlasenko4f870492010-09-10 11:06:01 +02004943 } /* else: ch remains == '\\', and we double it below: */
4944 o_addqchr(dest, ch); /* \c if c is a glob char, else just c */
Denys Vlasenko850b15b2010-09-09 12:58:19 +02004945 nommu_addchr(as_string, ch);
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004946 goto again;
4947 }
4948 if (ch == '$') {
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004949 if (!parse_dollar(as_string, dest, input, /*quote_mask:*/ 0x80)) {
4950 debug_printf_parse("encode_string return 0: "
4951 "parse_dollar returned 0 (error)\n");
4952 return 0;
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004953 }
4954 goto again;
4955 }
4956#if ENABLE_HUSH_TICK
4957 if (ch == '`') {
Denys Vlasenkoddc62f62010-05-22 00:53:32 +02004958 //unsigned pos = dest->length;
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004959 o_addchr(dest, SPECIAL_VAR_SYMBOL);
4960 o_addchr(dest, 0x80 | '`');
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01004961 if (!add_till_backquote(dest, input, /*in_dquote:*/ dquote_end == '"'))
4962 return 0; /* error */
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004963 o_addchr(dest, SPECIAL_VAR_SYMBOL);
4964 //debug_printf_subst("SUBST RES3 '%s'\n", dest->data + pos);
Denis Vlasenkof328e002009-04-02 16:55:38 +00004965 goto again;
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004966 }
4967#endif
Denis Vlasenkof328e002009-04-02 16:55:38 +00004968 o_addQchr(dest, ch);
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004969 goto again;
Denys Vlasenkoddc62f62010-05-22 00:53:32 +02004970#undef as_string
Denis Vlasenko2f1d3942009-04-02 16:31:29 +00004971}
4972
Denis Vlasenkob6e65562009-04-03 16:49:04 +00004973/*
4974 * Scan input until EOF or end_trigger char.
4975 * Return a list of pipes to execute, or NULL on EOF
4976 * or if end_trigger character is met.
Denys Vlasenkocecbc982011-03-30 18:54:52 +02004977 * On syntax error, exit if shell is not interactive,
Denis Vlasenkob6e65562009-04-03 16:49:04 +00004978 * reset parsing machinery and start parsing anew,
4979 * or return ERR_PTR.
Denis Vlasenko027e3fd2009-04-02 22:50:40 +00004980 */
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00004981static struct pipe *parse_stream(char **pstring,
4982 struct in_str *input,
4983 int end_trigger)
Eric Andersen25f27032001-04-26 23:22:31 +00004984{
Denis Vlasenkob6e65562009-04-03 16:49:04 +00004985 struct parse_context ctx;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00004986 int heredoc_cnt;
Eric Andersen25f27032001-04-26 23:22:31 +00004987
Denys Vlasenko77a7b552010-09-09 12:40:03 +02004988 /* Single-quote triggers a bypass of the main loop until its mate is
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02004989 * found. When recursing, quote state is passed in via ctx.word.o_expflags.
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00004990 */
Denis Vlasenkob6e65562009-04-03 16:49:04 +00004991 debug_printf_parse("parse_stream entered, end_trigger='%c'\n",
Denys Vlasenko90a99042009-09-06 02:36:23 +02004992 end_trigger ? end_trigger : 'X');
Denis Vlasenko0701dca2009-04-11 10:38:47 +00004993 debug_enter();
Denis Vlasenkoe725bfe2007-05-03 22:45:39 +00004994
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02004995 initialize_context(&ctx);
4996
4997 /* If very first arg is "" or '', ctx.word.data may end up NULL.
4998 * Preventing this:
4999 */
Denys Vlasenko8b08d5a2018-07-18 15:48:53 +02005000 ctx.word.data = xzalloc(1); /* start as "", not as NULL */
Denys Vlasenkof37eb392009-10-18 11:46:35 +02005001
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02005002 /* We used to separate words on $IFS here. This was wrong.
5003 * $IFS is used only for word splitting when $var is expanded,
Denys Vlasenko77a7b552010-09-09 12:40:03 +02005004 * here we should use blank chars as separators, not $IFS
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02005005 */
Denys Vlasenko77a7b552010-09-09 12:40:03 +02005006
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00005007 heredoc_cnt = 0;
Denis Vlasenko1a735862007-05-23 00:32:25 +00005008 while (1) {
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02005009 const char *is_blank;
Denis Vlasenko6da69cd2009-04-04 12:12:58 +00005010 const char *is_special;
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00005011 int ch;
5012 int next;
5013 int redir_fd;
5014 redir_type redir_style;
Denis Vlasenko6da69cd2009-04-04 12:12:58 +00005015
Denis Vlasenko46ccdcb2008-06-10 18:05:12 +00005016 ch = i_getch(input);
Denis Vlasenko6da69cd2009-04-04 12:12:58 +00005017 debug_printf_parse(": ch=%c (%d) escape=%d\n",
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005018 ch, ch, !!(ctx.word.o_expflags & EXP_FLAG_ESC_GLOB_CHARS));
Denis Vlasenko6da69cd2009-04-04 12:12:58 +00005019 if (ch == EOF) {
5020 struct pipe *pi;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00005021
5022 if (heredoc_cnt) {
Denis Vlasenkod68ae082009-04-09 20:41:34 +00005023 syntax_error_unterm_str("here document");
Denys Vlasenkob1cfc452009-05-02 17:18:34 +02005024 goto parse_error;
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00005025 }
Denys Vlasenkob1cfc452009-05-02 17:18:34 +02005026 if (end_trigger == ')') {
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01005027 syntax_error_unterm_ch('(');
5028 goto parse_error;
Denys Vlasenkob1cfc452009-05-02 17:18:34 +02005029 }
Denys Vlasenko42246472016-11-07 16:22:35 +01005030 if (end_trigger == '}') {
5031 syntax_error_unterm_ch('{');
5032 goto parse_error;
5033 }
Denys Vlasenkob1cfc452009-05-02 17:18:34 +02005034
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005035 if (done_word(&ctx)) {
Denys Vlasenkob1cfc452009-05-02 17:18:34 +02005036 goto parse_error;
Denis Vlasenko55789c62008-06-18 16:30:42 +00005037 }
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005038 o_free(&ctx.word);
Denis Vlasenko6da69cd2009-04-04 12:12:58 +00005039 done_pipe(&ctx, PIPE_SEQ);
Denis Vlasenko6da69cd2009-04-04 12:12:58 +00005040 pi = ctx.list_head;
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00005041 /* If we got nothing... */
Denis Vlasenko0b677d82009-04-10 13:49:10 +00005042 /* (this makes bare "&" cmd a no-op.
5043 * bash says: "syntax error near unexpected token '&'") */
Denis Vlasenko6da69cd2009-04-04 12:12:58 +00005044 if (pi->num_cmds == 0
Denys Vlasenko60cb48c2013-01-14 15:57:44 +01005045 IF_HAS_KEYWORDS(&& pi->res_word == RES_NONE)
Denis Vlasenko6da69cd2009-04-04 12:12:58 +00005046 ) {
Denis Vlasenko0701dca2009-04-11 10:38:47 +00005047 free_pipe_list(pi);
Denis Vlasenko6da69cd2009-04-04 12:12:58 +00005048 pi = NULL;
5049 }
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00005050#if !BB_MMU
Denys Vlasenkob5be13c2015-09-04 06:22:10 +02005051 debug_printf_parse("as_string1 '%s'\n", ctx.as_string.data);
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00005052 if (pstring)
5053 *pstring = ctx.as_string.data;
5054 else
5055 o_free_unsafe(&ctx.as_string);
5056#endif
Denis Vlasenko0701dca2009-04-11 10:38:47 +00005057 debug_leave();
5058 debug_printf_parse("parse_stream return %p\n", pi);
Denis Vlasenko6da69cd2009-04-04 12:12:58 +00005059 return pi;
Denis Vlasenko1a735862007-05-23 00:32:25 +00005060 }
Denys Vlasenkod8389ad2009-11-16 03:18:46 +01005061
Denys Vlasenko0403bed2018-04-11 01:33:54 +02005062 /* Handle "'" and "\" first, as they won't play nice with
5063 * i_peek_and_eat_bkslash_nl() anyway:
5064 * echo z\\
5065 * and
5066 * echo '\
5067 * '
5068 * would break.
5069 */
Denys Vlasenkof693b602018-04-11 20:00:43 +02005070 if (ch == '\\') {
5071 ch = i_getch(input);
5072 if (ch == '\n')
5073 continue; /* drop \<newline>, get next char */
5074 nommu_addchr(&ctx.as_string, '\\');
5075 o_addchr(&ctx.word, '\\');
5076 if (ch == EOF) {
5077 /* Testcase: eval 'echo Ok\' */
5078 /* bash-4.3.43 was removing backslash,
5079 * but 4.4.19 retains it, most other shells too
5080 */
5081 continue; /* get next char */
5082 }
5083 /* Example: echo Hello \2>file
5084 * we need to know that word 2 is quoted
5085 */
5086 ctx.word.has_quoted_part = 1;
5087 nommu_addchr(&ctx.as_string, ch);
5088 o_addchr(&ctx.word, ch);
5089 continue; /* get next char */
5090 }
5091 nommu_addchr(&ctx.as_string, ch);
Denys Vlasenko92a930b2018-04-10 14:20:48 +02005092 if (ch == '\'') {
5093 ctx.word.has_quoted_part = 1;
5094 next = i_getch(input);
5095 if (next == '\'' && !ctx.pending_redirect)
5096 goto insert_empty_quoted_str_marker;
5097
5098 ch = next;
5099 while (1) {
5100 if (ch == EOF) {
5101 syntax_error_unterm_ch('\'');
5102 goto parse_error;
5103 }
5104 nommu_addchr(&ctx.as_string, ch);
5105 if (ch == '\'')
5106 break;
5107 if (ch == SPECIAL_VAR_SYMBOL) {
5108 /* Convert raw ^C to corresponding special variable reference */
5109 o_addchr(&ctx.word, SPECIAL_VAR_SYMBOL);
5110 o_addchr(&ctx.word, SPECIAL_VAR_QUOTED_SVS);
5111 }
5112 o_addqchr(&ctx.word, ch);
5113 ch = i_getch(input);
5114 }
5115 continue; /* get next char */
Denys Vlasenko1e5111b2018-04-01 03:04:55 +02005116 }
Denys Vlasenko92a930b2018-04-10 14:20:48 +02005117
Denys Vlasenko0403bed2018-04-11 01:33:54 +02005118 next = '\0';
5119 if (ch != '\n')
5120 next = i_peek_and_eat_bkslash_nl(input);
5121
Denys Vlasenko92a930b2018-04-10 14:20:48 +02005122 is_special = "{}<>;&|()#" /* special outside of "str" */
Denys Vlasenko0403bed2018-04-11 01:33:54 +02005123 "$\"" IF_HUSH_TICK("`") /* always special */
Denys Vlasenko932b9972018-01-11 12:39:48 +01005124 SPECIAL_VAR_SYMBOL_STR;
Denys Vlasenkod8389ad2009-11-16 03:18:46 +01005125 /* Are { and } special here? */
Denys Vlasenko3227d3f2010-05-17 09:49:47 +02005126 if (ctx.command->argv /* word [word]{... - non-special */
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005127 || ctx.word.length /* word{... - non-special */
5128 || ctx.word.has_quoted_part /* ""{... - non-special */
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02005129 || (next != ';' /* }; - special */
5130 && next != ')' /* }) - special */
Denys Vlasenko672a55e2016-11-04 18:46:14 +01005131 && next != '(' /* {( - special */
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02005132 && next != '&' /* }& and }&& ... - special */
5133 && next != '|' /* }|| ... - special */
5134 && !strchr(defifs, next) /* {word - non-special */
Denys Vlasenko3227d3f2010-05-17 09:49:47 +02005135 )
Denys Vlasenkod8389ad2009-11-16 03:18:46 +01005136 ) {
5137 /* They are not special, skip "{}" */
5138 is_special += 2;
5139 }
5140 is_special = strchr(is_special, ch);
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02005141 is_blank = strchr(defifs, ch);
Denis Vlasenko6da69cd2009-04-04 12:12:58 +00005142
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02005143 if (!is_special && !is_blank) { /* ordinary char */
Denis Vlasenkobf25fbc2009-04-19 13:57:51 +00005144 ordinary_char:
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005145 o_addQchr(&ctx.word, ch);
5146 if ((ctx.is_assignment == MAYBE_ASSIGNMENT
5147 || ctx.is_assignment == WORD_IS_KEYWORD)
Denis Vlasenko55789c62008-06-18 16:30:42 +00005148 && ch == '='
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005149 && is_well_formed_var_name(ctx.word.data, '=')
Denis Vlasenko55789c62008-06-18 16:30:42 +00005150 ) {
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005151 ctx.is_assignment = DEFINITELY_ASSIGNMENT;
5152 debug_printf_parse("ctx.is_assignment='%s'\n", assignment_flag[ctx.is_assignment]);
Denis Vlasenko55789c62008-06-18 16:30:42 +00005153 }
Denis Vlasenkobb81c582007-01-30 22:32:09 +00005154 continue;
5155 }
Denis Vlasenko240c2552009-04-03 03:45:05 +00005156
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02005157 if (is_blank) {
Denys Vlasenko5807e182018-02-08 19:19:04 +01005158#if ENABLE_HUSH_LINENO_VAR
5159/* Case:
5160 * "while ...; do<whitespace><newline>
5161 * cmd ..."
5162 * would think that "cmd" starts in <whitespace> -
5163 * i.e., at the previous line.
5164 * We need to skip all whitespace before newlines.
5165 */
Denys Vlasenkof7869012018-02-08 19:39:42 +01005166 while (ch != '\n') {
5167 next = i_peek(input);
5168 if (next != ' ' && next != '\t' && next != '\n')
5169 break; /* next char is not ws */
5170 ch = i_getch(input);
Denys Vlasenko5807e182018-02-08 19:19:04 +01005171 }
Denys Vlasenkof7869012018-02-08 19:39:42 +01005172 /* ch == last eaten whitespace char */
Denys Vlasenko5807e182018-02-08 19:19:04 +01005173#endif
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005174 if (done_word(&ctx)) {
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005175 goto parse_error;
Eric Andersenaac75e52001-04-30 18:18:45 +00005176 }
Denis Vlasenko37181682009-04-03 03:19:15 +00005177 if (ch == '\n') {
Denys Vlasenko7b4c0fd2010-11-22 17:58:14 +01005178 /* Is this a case when newline is simply ignored?
5179 * Some examples:
5180 * "cmd | <newline> cmd ..."
5181 * "case ... in <newline> word) ..."
5182 */
5183 if (IS_NULL_CMD(ctx.command)
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005184 && ctx.word.length == 0 && !ctx.word.has_quoted_part
Denis Vlasenkof1736072008-07-31 10:09:26 +00005185 ) {
Denys Vlasenko642e71a2011-01-07 15:16:05 +01005186 /* This newline can be ignored. But...
Denys Vlasenko98c46d12011-01-18 17:30:07 +01005187 * Without check #1, interactive shell
5188 * ignores even bare <newline>,
5189 * and shows the continuation prompt:
Denys Vlasenko642e71a2011-01-07 15:16:05 +01005190 * ps1_prompt$ <enter>
Denys Vlasenko98c46d12011-01-18 17:30:07 +01005191 * ps2> _ <=== wrong, should be ps1
5192 * Without check #2, "cmd & <newline>"
5193 * is similarly mistreated.
5194 * (BTW, this makes "cmd & cmd"
5195 * and "cmd && cmd" non-orthogonal.
5196 * Really, ask yourself, why
5197 * "cmd && <newline>" doesn't start
5198 * cmd but waits for more input?
Denys Vlasenkob24e55d2017-07-16 20:29:35 +02005199 * The only reason is that it might be
5200 * a "cmd1 && <nl> cmd2 &" construct,
5201 * cmd1 may need to run in BG).
Denys Vlasenko642e71a2011-01-07 15:16:05 +01005202 */
5203 struct pipe *pi = ctx.list_head;
Denys Vlasenko98c46d12011-01-18 17:30:07 +01005204 if (pi->num_cmds != 0 /* check #1 */
5205 && pi->followup != PIPE_BG /* check #2 */
5206 ) {
Denys Vlasenko642e71a2011-01-07 15:16:05 +01005207 continue;
Denys Vlasenko98c46d12011-01-18 17:30:07 +01005208 }
Denis Vlasenkof1736072008-07-31 10:09:26 +00005209 }
Denis Vlasenko240c2552009-04-03 03:45:05 +00005210 /* Treat newline as a command separator. */
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005211 done_pipe(&ctx, PIPE_SEQ);
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00005212 debug_printf_parse("heredoc_cnt:%d\n", heredoc_cnt);
5213 if (heredoc_cnt) {
Denis Vlasenko3dfb0352009-04-08 09:29:14 +00005214 if (fetch_heredocs(heredoc_cnt, &ctx, input)) {
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00005215 goto parse_error;
Denis Vlasenko3dfb0352009-04-08 09:29:14 +00005216 }
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00005217 heredoc_cnt = 0;
5218 }
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005219 ctx.is_assignment = MAYBE_ASSIGNMENT;
5220 debug_printf_parse("ctx.is_assignment='%s'\n", assignment_flag[ctx.is_assignment]);
Denis Vlasenko240c2552009-04-03 03:45:05 +00005221 ch = ';';
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02005222 /* note: if (is_blank) continue;
Denis Vlasenko240c2552009-04-03 03:45:05 +00005223 * will still trigger for us */
Denis Vlasenkoe725bfe2007-05-03 22:45:39 +00005224 }
Denis Vlasenkobb81c582007-01-30 22:32:09 +00005225 }
Denis Vlasenko9f8d9382009-04-19 14:03:11 +00005226
5227 /* "cmd}" or "cmd }..." without semicolon or &:
5228 * } is an ordinary char in this case, even inside { cmd; }
5229 * Pathological example: { ""}; } should exec "}" cmd
5230 */
Denis Vlasenkodcd78c42009-04-19 23:07:51 +00005231 if (ch == '}') {
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005232 if (ctx.word.length != 0 /* word} */
5233 || ctx.word.has_quoted_part /* ""} */
Denis Vlasenkodcd78c42009-04-19 23:07:51 +00005234 ) {
5235 goto ordinary_char;
5236 }
Denys Vlasenko672a55e2016-11-04 18:46:14 +01005237 if (!IS_NULL_CMD(ctx.command)) { /* cmd } */
5238 /* Generally, there should be semicolon: "cmd; }"
5239 * However, bash allows to omit it if "cmd" is
5240 * a group. Examples:
5241 * { { echo 1; } }
5242 * {(echo 1)}
5243 * { echo 0 >&2 | { echo 1; } }
5244 * { while false; do :; done }
5245 * { case a in b) ;; esac }
5246 */
5247 if (ctx.command->group)
5248 goto term_group;
5249 goto ordinary_char;
5250 }
Denis Vlasenkodcd78c42009-04-19 23:07:51 +00005251 if (!IS_NULL_PIPE(ctx.pipe)) /* cmd | } */
Denys Vlasenko672a55e2016-11-04 18:46:14 +01005252 /* Can't be an end of {cmd}, skip the check */
Denis Vlasenkodcd78c42009-04-19 23:07:51 +00005253 goto skip_end_trigger;
5254 /* else: } does terminate a group */
Denis Vlasenko9f8d9382009-04-19 14:03:11 +00005255 }
Denys Vlasenko672a55e2016-11-04 18:46:14 +01005256 term_group:
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00005257 if (end_trigger && end_trigger == ch
Denys Vlasenkoe9bda902009-05-23 16:50:07 +02005258 && (ch != ';' || heredoc_cnt == 0)
5259#if ENABLE_HUSH_CASE
5260 && (ch != ')'
5261 || ctx.ctx_res_w != RES_MATCH
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005262 || (!ctx.word.has_quoted_part && strcmp(ctx.word.data, "esac") == 0)
Denys Vlasenkoe9bda902009-05-23 16:50:07 +02005263 )
5264#endif
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00005265 ) {
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00005266 if (heredoc_cnt) {
5267 /* This is technically valid:
5268 * { cat <<HERE; }; echo Ok
5269 * heredoc
5270 * heredoc
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00005271 * HERE
5272 * but we don't support this.
5273 * We require heredoc to be in enclosing {}/(),
5274 * if any.
5275 */
Denis Vlasenkod68ae082009-04-09 20:41:34 +00005276 syntax_error_unterm_str("here document");
Denis Vlasenko6c9be7f2009-04-07 02:29:51 +00005277 goto parse_error;
5278 }
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005279 if (done_word(&ctx)) {
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005280 goto parse_error;
5281 }
5282 done_pipe(&ctx, PIPE_SEQ);
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005283 ctx.is_assignment = MAYBE_ASSIGNMENT;
5284 debug_printf_parse("ctx.is_assignment='%s'\n", assignment_flag[ctx.is_assignment]);
Denis Vlasenko240c2552009-04-03 03:45:05 +00005285 /* Do we sit outside of any if's, loops or case's? */
Denis Vlasenko37181682009-04-03 03:19:15 +00005286 if (!HAS_KEYWORDS
Denys Vlasenko60cb48c2013-01-14 15:57:44 +01005287 IF_HAS_KEYWORDS(|| (ctx.ctx_res_w == RES_NONE && ctx.old_flag == 0))
Denis Vlasenko37181682009-04-03 03:19:15 +00005288 ) {
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005289 o_free(&ctx.word);
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00005290#if !BB_MMU
Denys Vlasenkob5be13c2015-09-04 06:22:10 +02005291 debug_printf_parse("as_string2 '%s'\n", ctx.as_string.data);
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00005292 if (pstring)
5293 *pstring = ctx.as_string.data;
5294 else
5295 o_free_unsafe(&ctx.as_string);
5296#endif
Denys Vlasenko39701202017-08-02 19:44:05 +02005297 if (ch != ';' && IS_NULL_PIPE(ctx.list_head)) {
5298 /* Example: bare "{ }", "()" */
5299 G.last_exitcode = 2; /* bash compat */
5300 syntax_error_unexpected_ch(ch);
5301 goto parse_error2;
5302 }
Denis Vlasenko0701dca2009-04-11 10:38:47 +00005303 debug_printf_parse("parse_stream return %p: "
5304 "end_trigger char found\n",
5305 ctx.list_head);
Denys Vlasenko39701202017-08-02 19:44:05 +02005306 debug_leave();
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005307 return ctx.list_head;
Denis Vlasenkof8d01d32008-06-14 17:13:20 +00005308 }
Denis Vlasenkobb81c582007-01-30 22:32:09 +00005309 }
Denys Vlasenko92a930b2018-04-10 14:20:48 +02005310
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02005311 if (is_blank)
Denis Vlasenkobb81c582007-01-30 22:32:09 +00005312 continue;
Denis Vlasenko55789c62008-06-18 16:30:42 +00005313
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00005314 /* Catch <, > before deciding whether this word is
5315 * an assignment. a=1 2>z b=2: b=2 is still assignment */
5316 switch (ch) {
5317 case '>':
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005318 redir_fd = redirect_opt_num(&ctx.word);
5319 if (done_word(&ctx)) {
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00005320 goto parse_error;
5321 }
5322 redir_style = REDIRECT_OVERWRITE;
5323 if (next == '>') {
5324 redir_style = REDIRECT_APPEND;
5325 ch = i_getch(input);
5326 nommu_addchr(&ctx.as_string, ch);
5327 }
5328#if 0
5329 else if (next == '(') {
5330 syntax_error(">(process) not supported");
5331 goto parse_error;
5332 }
5333#endif
5334 if (parse_redirect(&ctx, redir_fd, redir_style, input))
5335 goto parse_error;
Denys Vlasenko92a930b2018-04-10 14:20:48 +02005336 continue; /* get next char */
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00005337 case '<':
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005338 redir_fd = redirect_opt_num(&ctx.word);
5339 if (done_word(&ctx)) {
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00005340 goto parse_error;
5341 }
5342 redir_style = REDIRECT_INPUT;
5343 if (next == '<') {
5344 redir_style = REDIRECT_HEREDOC;
5345 heredoc_cnt++;
5346 debug_printf_parse("++heredoc_cnt=%d\n", heredoc_cnt);
5347 ch = i_getch(input);
5348 nommu_addchr(&ctx.as_string, ch);
5349 } else if (next == '>') {
5350 redir_style = REDIRECT_IO;
5351 ch = i_getch(input);
5352 nommu_addchr(&ctx.as_string, ch);
5353 }
5354#if 0
5355 else if (next == '(') {
5356 syntax_error("<(process) not supported");
5357 goto parse_error;
5358 }
5359#endif
5360 if (parse_redirect(&ctx, redir_fd, redir_style, input))
5361 goto parse_error;
Denys Vlasenko92a930b2018-04-10 14:20:48 +02005362 continue; /* get next char */
Denys Vlasenko7b4c0fd2010-11-22 17:58:14 +01005363 case '#':
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005364 if (ctx.word.length == 0 && !ctx.word.has_quoted_part) {
Denys Vlasenko7b4c0fd2010-11-22 17:58:14 +01005365 /* skip "#comment" */
Denys Vlasenko25f3b732017-10-22 15:55:48 +02005366 /* note: we do not add it to &ctx.as_string */
5367/* TODO: in bash:
5368 * comment inside $() goes to the next \n, even inside quoted string (!):
5369 * cmd "$(cmd2 #comment)" - syntax error
5370 * cmd "`cmd2 #comment`" - ok
5371 * We accept both (comment ends where command subst ends, in both cases).
5372 */
Denys Vlasenko7b4c0fd2010-11-22 17:58:14 +01005373 while (1) {
5374 ch = i_peek(input);
Denys Vlasenko25f3b732017-10-22 15:55:48 +02005375 if (ch == '\n') {
5376 nommu_addchr(&ctx.as_string, '\n');
Denys Vlasenko7b4c0fd2010-11-22 17:58:14 +01005377 break;
Denys Vlasenko25f3b732017-10-22 15:55:48 +02005378 }
5379 ch = i_getch(input);
5380 if (ch == EOF)
5381 break;
Denys Vlasenko7b4c0fd2010-11-22 17:58:14 +01005382 }
Denys Vlasenko92a930b2018-04-10 14:20:48 +02005383 continue; /* get next char */
Denys Vlasenko7b4c0fd2010-11-22 17:58:14 +01005384 }
5385 break;
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00005386 }
Denys Vlasenko92a930b2018-04-10 14:20:48 +02005387 skip_end_trigger:
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00005388
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005389 if (ctx.is_assignment == MAYBE_ASSIGNMENT
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00005390 /* check that we are not in word in "a=1 2>word b=1": */
5391 && !ctx.pending_redirect
5392 ) {
5393 /* ch is a special char and thus this word
5394 * cannot be an assignment */
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005395 ctx.is_assignment = NOT_ASSIGNMENT;
5396 debug_printf_parse("ctx.is_assignment='%s'\n", assignment_flag[ctx.is_assignment]);
Denis Vlasenkoc96865f2009-04-10 00:20:58 +00005397 }
5398
Denys Vlasenkocbfe6ad2009-08-12 19:47:44 +02005399 /* Note: nommu_addchr(&ctx.as_string, ch) is already done */
5400
Denis Vlasenkobb81c582007-01-30 22:32:09 +00005401 switch (ch) {
Denys Vlasenko932b9972018-01-11 12:39:48 +01005402 case SPECIAL_VAR_SYMBOL:
5403 /* Convert raw ^C to corresponding special variable reference */
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005404 o_addchr(&ctx.word, SPECIAL_VAR_SYMBOL);
5405 o_addchr(&ctx.word, SPECIAL_VAR_QUOTED_SVS);
Denys Vlasenko932b9972018-01-11 12:39:48 +01005406 /* fall through */
5407 case '#':
5408 /* non-comment #: "echo a#b" etc */
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005409 o_addchr(&ctx.word, ch);
Denys Vlasenkoe8b1bc02018-04-10 13:13:10 +02005410 continue; /* get next char */
Eric Andersen25f27032001-04-26 23:22:31 +00005411 case '$':
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005412 if (!parse_dollar(&ctx.as_string, &ctx.word, input, /*quote_mask:*/ 0)) {
Denis Vlasenkoa24c8ca2009-04-04 15:24:40 +00005413 debug_printf_parse("parse_stream parse error: "
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01005414 "parse_dollar returned 0 (error)\n");
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005415 goto parse_error;
Denis Vlasenkoe725bfe2007-05-03 22:45:39 +00005416 }
Denys Vlasenkoe8b1bc02018-04-10 13:13:10 +02005417 continue; /* get next char */
Denys Vlasenkoe8b1bc02018-04-10 13:13:10 +02005418 case '"':
5419 ctx.word.has_quoted_part = 1;
5420 if (next == '"' && !ctx.pending_redirect) {
Denys Vlasenko92a930b2018-04-10 14:20:48 +02005421 i_getch(input); /* eat second " */
Denys Vlasenko6e42b892011-08-01 18:16:43 +02005422 insert_empty_quoted_str_marker:
5423 nommu_addchr(&ctx.as_string, next);
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005424 o_addchr(&ctx.word, SPECIAL_VAR_SYMBOL);
5425 o_addchr(&ctx.word, SPECIAL_VAR_SYMBOL);
Denys Vlasenkoe8b1bc02018-04-10 13:13:10 +02005426 continue; /* get next char */
Eric Andersen25f27032001-04-26 23:22:31 +00005427 }
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005428 if (ctx.is_assignment == NOT_ASSIGNMENT)
5429 ctx.word.o_expflags |= EXP_FLAG_ESC_GLOB_CHARS;
Denys Vlasenkob762c782018-07-17 14:21:38 +02005430 if (!encode_string(&ctx.as_string, &ctx.word, input, '"'))
Denys Vlasenko77a7b552010-09-09 12:40:03 +02005431 goto parse_error;
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005432 ctx.word.o_expflags &= ~EXP_FLAG_ESC_GLOB_CHARS;
Denys Vlasenkoe8b1bc02018-04-10 13:13:10 +02005433 continue; /* get next char */
Denis Vlasenko14b5dd92007-05-20 21:51:38 +00005434#if ENABLE_HUSH_TICK
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00005435 case '`': {
Denys Vlasenko60a94142011-05-13 20:57:01 +02005436 USE_FOR_NOMMU(unsigned pos;)
Denys Vlasenko2e48d532010-05-22 17:30:39 +02005437
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005438 o_addchr(&ctx.word, SPECIAL_VAR_SYMBOL);
5439 o_addchr(&ctx.word, '`');
5440 USE_FOR_NOMMU(pos = ctx.word.length;)
5441 if (!add_till_backquote(&ctx.word, input, /*in_dquote:*/ 0))
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01005442 goto parse_error;
Denys Vlasenko2e48d532010-05-22 17:30:39 +02005443# if !BB_MMU
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005444 o_addstr(&ctx.as_string, ctx.word.data + pos);
Denis Vlasenko5c090a92009-04-08 21:51:33 +00005445 o_addchr(&ctx.as_string, '`');
Denys Vlasenko2e48d532010-05-22 17:30:39 +02005446# endif
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005447 o_addchr(&ctx.word, SPECIAL_VAR_SYMBOL);
5448 //debug_printf_subst("SUBST RES3 '%s'\n", ctx.word.data + pos);
Denys Vlasenkoe8b1bc02018-04-10 13:13:10 +02005449 continue; /* get next char */
Denis Vlasenko7b4f3f12008-06-10 18:04:32 +00005450 }
Denis Vlasenko14b5dd92007-05-20 21:51:38 +00005451#endif
Eric Andersen25f27032001-04-26 23:22:31 +00005452 case ';':
Denis Vlasenko17f02e72008-07-14 04:32:29 +00005453#if ENABLE_HUSH_CASE
5454 case_semi:
5455#endif
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005456 if (done_word(&ctx)) {
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005457 goto parse_error;
5458 }
5459 done_pipe(&ctx, PIPE_SEQ);
Denis Vlasenko17f02e72008-07-14 04:32:29 +00005460#if ENABLE_HUSH_CASE
5461 /* Eat multiple semicolons, detect
5462 * whether it means something special */
5463 while (1) {
Denys Vlasenko1e5111b2018-04-01 03:04:55 +02005464 ch = i_peek_and_eat_bkslash_nl(input);
Denis Vlasenko17f02e72008-07-14 04:32:29 +00005465 if (ch != ';')
5466 break;
Denis Vlasenko609f2ab2009-04-04 23:15:14 +00005467 ch = i_getch(input);
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00005468 nommu_addchr(&ctx.as_string, ch);
Denys Vlasenkoe9bda902009-05-23 16:50:07 +02005469 if (ctx.ctx_res_w == RES_CASE_BODY) {
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005470 ctx.ctx_dsemicolon = 1;
5471 ctx.ctx_res_w = RES_MATCH;
Denis Vlasenko17f02e72008-07-14 04:32:29 +00005472 break;
5473 }
5474 }
5475#endif
Denis Vlasenko2b576b82008-08-04 00:46:07 +00005476 new_cmd:
5477 /* We just finished a cmd. New one may start
5478 * with an assignment */
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005479 ctx.is_assignment = MAYBE_ASSIGNMENT;
5480 debug_printf_parse("ctx.is_assignment='%s'\n", assignment_flag[ctx.is_assignment]);
Denys Vlasenkoe8b1bc02018-04-10 13:13:10 +02005481 continue; /* get next char */
Eric Andersen25f27032001-04-26 23:22:31 +00005482 case '&':
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005483 if (done_word(&ctx)) {
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005484 goto parse_error;
5485 }
Denis Vlasenkobb81c582007-01-30 22:32:09 +00005486 if (next == '&') {
Denis Vlasenko609f2ab2009-04-04 23:15:14 +00005487 ch = i_getch(input);
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00005488 nommu_addchr(&ctx.as_string, ch);
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005489 done_pipe(&ctx, PIPE_AND);
Eric Andersen25f27032001-04-26 23:22:31 +00005490 } else {
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005491 done_pipe(&ctx, PIPE_BG);
Eric Andersen25f27032001-04-26 23:22:31 +00005492 }
Denis Vlasenko2b576b82008-08-04 00:46:07 +00005493 goto new_cmd;
Eric Andersen25f27032001-04-26 23:22:31 +00005494 case '|':
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005495 if (done_word(&ctx)) {
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005496 goto parse_error;
5497 }
Denis Vlasenkofbeeb322008-07-31 00:17:01 +00005498#if ENABLE_HUSH_CASE
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005499 if (ctx.ctx_res_w == RES_MATCH)
Denis Vlasenkof1736072008-07-31 10:09:26 +00005500 break; /* we are in case's "word | word)" */
Denis Vlasenkofbeeb322008-07-31 00:17:01 +00005501#endif
Denis Vlasenko2b576b82008-08-04 00:46:07 +00005502 if (next == '|') { /* || */
Denis Vlasenko609f2ab2009-04-04 23:15:14 +00005503 ch = i_getch(input);
Denis Vlasenkoaf07b7c2009-04-07 13:26:18 +00005504 nommu_addchr(&ctx.as_string, ch);
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005505 done_pipe(&ctx, PIPE_OR);
Eric Andersen25f27032001-04-26 23:22:31 +00005506 } else {
5507 /* we could pick up a file descriptor choice here
5508 * with redirect_opt_num(), but bash doesn't do it.
5509 * "echo foo 2| cat" yields "foo 2". */
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005510 done_command(&ctx);
Eric Andersen25f27032001-04-26 23:22:31 +00005511 }
Denis Vlasenko2b576b82008-08-04 00:46:07 +00005512 goto new_cmd;
Eric Andersen25f27032001-04-26 23:22:31 +00005513 case '(':
Denis Vlasenko17f02e72008-07-14 04:32:29 +00005514#if ENABLE_HUSH_CASE
Denis Vlasenkof1736072008-07-31 10:09:26 +00005515 /* "case... in [(]word)..." - skip '(' */
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005516 if (ctx.ctx_res_w == RES_MATCH
5517 && ctx.command->argv == NULL /* not (word|(... */
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005518 && ctx.word.length == 0 /* not word(... */
5519 && ctx.word.has_quoted_part == 0 /* not ""(... */
Denis Vlasenko17f02e72008-07-14 04:32:29 +00005520 ) {
Denys Vlasenkoe8b1bc02018-04-10 13:13:10 +02005521 continue; /* get next char */
Denis Vlasenko17f02e72008-07-14 04:32:29 +00005522 }
5523#endif
Eric Andersen25f27032001-04-26 23:22:31 +00005524 case '{':
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005525 if (parse_group(&ctx, input, ch) != 0) {
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005526 goto parse_error;
Denis Vlasenkoe725bfe2007-05-03 22:45:39 +00005527 }
Denis Vlasenko2b576b82008-08-04 00:46:07 +00005528 goto new_cmd;
Eric Andersen25f27032001-04-26 23:22:31 +00005529 case ')':
Denis Vlasenko17f02e72008-07-14 04:32:29 +00005530#if ENABLE_HUSH_CASE
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005531 if (ctx.ctx_res_w == RES_MATCH)
Denis Vlasenko17f02e72008-07-14 04:32:29 +00005532 goto case_semi;
5533#endif
Eric Andersen25f27032001-04-26 23:22:31 +00005534 case '}':
Denis Vlasenkoc3735272008-10-09 12:58:26 +00005535 /* proper use of this character is caught by end_trigger:
5536 * if we see {, we call parse_group(..., end_trigger='}')
5537 * and it will match } earlier (not here). */
Denys Vlasenkob05bcaf2017-01-03 11:47:50 +01005538 G.last_exitcode = 2;
Denys Vlasenko39701202017-08-02 19:44:05 +02005539 syntax_error_unexpected_ch(ch);
Denys Vlasenko9fda6092017-07-14 13:36:48 +02005540 goto parse_error2;
Eric Andersen25f27032001-04-26 23:22:31 +00005541 default:
Denis Vlasenko5ec61322008-06-24 00:50:07 +00005542 if (HUSH_DEBUG)
Denys Vlasenko332e4112018-04-04 22:32:59 +02005543 bb_error_msg_and_die("BUG: unexpected %c", ch);
Eric Andersen25f27032001-04-26 23:22:31 +00005544 }
Denis Vlasenkof8d01d32008-06-14 17:13:20 +00005545 } /* while (1) */
Denis Vlasenko027e3fd2009-04-02 22:50:40 +00005546
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005547 parse_error:
Denys Vlasenkob05bcaf2017-01-03 11:47:50 +01005548 G.last_exitcode = 1;
Denys Vlasenko9fda6092017-07-14 13:36:48 +02005549 parse_error2:
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005550 {
Denis Vlasenko60b392f2009-04-03 19:14:32 +00005551 struct parse_context *pctx;
5552 IF_HAS_KEYWORDS(struct parse_context *p2;)
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005553
5554 /* Clean up allocated tree.
Denys Vlasenko764b2f02009-06-07 16:05:04 +02005555 * Sample for finding leaks on syntax error recovery path.
5556 * Run it from interactive shell, watch pmap `pidof hush`.
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005557 * while if false; then false; fi; do break; fi
Denis Vlasenkocc4c6932009-04-05 07:38:48 +00005558 * Samples to catch leaks at execution:
Denys Vlasenko5d5a6112016-11-07 19:36:50 +01005559 * while if (true | { true;}); then echo ok; fi; do break; done
5560 * while if (true | { true;}); then echo ok; fi; do (if echo ok; break; then :; fi) | cat; break; done
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005561 */
5562 pctx = &ctx;
5563 do {
5564 /* Update pipe/command counts,
5565 * otherwise freeing may miss some */
5566 done_pipe(pctx, PIPE_SEQ);
5567 debug_printf_clean("freeing list %p from ctx %p\n",
5568 pctx->list_head, pctx);
5569 debug_print_tree(pctx->list_head, 0);
Denis Vlasenko0701dca2009-04-11 10:38:47 +00005570 free_pipe_list(pctx->list_head);
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005571 debug_printf_clean("freed list %p\n", pctx->list_head);
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00005572#if !BB_MMU
5573 o_free_unsafe(&pctx->as_string);
5574#endif
Denis Vlasenko60b392f2009-04-03 19:14:32 +00005575 IF_HAS_KEYWORDS(p2 = pctx->stack;)
Denis Vlasenkob6e65562009-04-03 16:49:04 +00005576 if (pctx != &ctx) {
5577 free(pctx);
5578 }
Denis Vlasenko60b392f2009-04-03 19:14:32 +00005579 IF_HAS_KEYWORDS(pctx = p2;)
5580 } while (HAS_KEYWORDS && pctx);
Denys Vlasenkocecbc982011-03-30 18:54:52 +02005581
Denys Vlasenko09b7a7e2018-04-10 03:22:10 +02005582 o_free(&ctx.word);
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00005583#if !BB_MMU
Denys Vlasenkocecbc982011-03-30 18:54:52 +02005584 if (pstring)
5585 *pstring = NULL;
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00005586#endif
Denys Vlasenkocecbc982011-03-30 18:54:52 +02005587 debug_leave();
5588 return ERR_PTR;
Denis Vlasenko027e3fd2009-04-02 22:50:40 +00005589 }
Eric Andersen25f27032001-04-26 23:22:31 +00005590}
5591
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005592
5593/*** Execution routines ***/
5594
5595/* Expansion can recurse, need forward decls: */
Denys Vlasenko637982f2017-07-06 01:52:23 +02005596#if !BASH_PATTERN_SUBST && !ENABLE_HUSH_CASE
Denys Vlasenko34179952018-04-11 13:47:59 +02005597#define expand_string_to_string(str, EXP_flags, do_unbackslash) \
Denys Vlasenkod98e5c62010-09-10 10:44:23 +02005598 expand_string_to_string(str)
5599#endif
Denys Vlasenko34179952018-04-11 13:47:59 +02005600static char *expand_string_to_string(const char *str, int EXP_flags, int do_unbackslash);
Denys Vlasenko26777aa2010-11-22 23:49:10 +01005601#if ENABLE_HUSH_TICK
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005602static int process_command_subs(o_string *dest, const char *s);
Denys Vlasenko26777aa2010-11-22 23:49:10 +01005603#endif
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005604
5605/* expand_strvec_to_strvec() takes a list of strings, expands
5606 * all variable references within and returns a pointer to
5607 * a list of expanded strings, possibly with larger number
5608 * of strings. (Think VAR="a b"; echo $VAR).
5609 * This new list is allocated as a single malloc block.
5610 * NULL-terminated list of char* pointers is at the beginning of it,
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02005611 * followed by strings themselves.
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005612 * Caller can deallocate entire list by single free(list). */
5613
Denys Vlasenko238081f2010-10-03 14:26:26 +02005614/* A horde of its helpers come first: */
5615
5616static void o_addblock_duplicate_backslash(o_string *o, const char *str, int len)
5617{
5618 while (--len >= 0) {
Denys Vlasenko9e800222010-10-03 14:28:04 +02005619 char c = *str++;
Denys Vlasenko957f79f2010-10-03 17:15:50 +02005620
Denys Vlasenko9e800222010-10-03 14:28:04 +02005621#if ENABLE_HUSH_BRACE_EXPANSION
5622 if (c == '{' || c == '}') {
5623 /* { -> \{, } -> \} */
5624 o_addchr(o, '\\');
Denys Vlasenko957f79f2010-10-03 17:15:50 +02005625 /* And now we want to add { or } and continue:
5626 * o_addchr(o, c);
5627 * continue;
Denys Vlasenko10ad6222017-04-17 16:13:32 +02005628 * luckily, just falling through achieves this.
Denys Vlasenko957f79f2010-10-03 17:15:50 +02005629 */
Denys Vlasenko9e800222010-10-03 14:28:04 +02005630 }
5631#endif
5632 o_addchr(o, c);
5633 if (c == '\\') {
Denys Vlasenko238081f2010-10-03 14:26:26 +02005634 /* \z -> \\\z; \<eol> -> \\<eol> */
5635 o_addchr(o, '\\');
5636 if (len) {
5637 len--;
5638 o_addchr(o, '\\');
5639 o_addchr(o, *str++);
5640 }
5641 }
5642 }
5643}
5644
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005645/* Store given string, finalizing the word and starting new one whenever
5646 * we encounter IFS char(s). This is used for expanding variable values.
Denys Vlasenko6e42b892011-08-01 18:16:43 +02005647 * End-of-string does NOT finalize word: think about 'echo -$VAR-'.
Denys Vlasenko168579a2018-07-19 13:45:54 +02005648 * Return in output->ended_in_ifs:
Denys Vlasenko6e42b892011-08-01 18:16:43 +02005649 * 1 - ended with IFS char, else 0 (this includes case of empty str).
5650 */
Denys Vlasenko168579a2018-07-19 13:45:54 +02005651static int expand_on_ifs(o_string *output, int n, const char *str)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005652{
Denys Vlasenko6e42b892011-08-01 18:16:43 +02005653 int last_is_ifs = 0;
5654
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005655 while (1) {
Denys Vlasenko4fb53fb2011-08-01 14:06:20 +02005656 int word_len;
5657
5658 if (!*str) /* EOL - do not finalize word */
5659 break;
5660 word_len = strcspn(str, G.ifs);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005661 if (word_len) {
Denys Vlasenko4fb53fb2011-08-01 14:06:20 +02005662 /* We have WORD_LEN leading non-IFS chars */
Denys Vlasenko238081f2010-10-03 14:26:26 +02005663 if (!(output->o_expflags & EXP_FLAG_GLOB)) {
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02005664 o_addblock(output, str, word_len);
Denys Vlasenko238081f2010-10-03 14:26:26 +02005665 } else {
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02005666 /* Protect backslashes against globbing up :)
Denys Vlasenkoa769e022010-09-10 10:12:34 +02005667 * Example: "v='\*'; echo b$v" prints "b\*"
5668 * (and does not try to glob on "*")
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02005669 */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005670 o_addblock_duplicate_backslash(output, str, word_len);
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02005671 /*/ Why can't we do it easier? */
5672 /*o_addblock(output, str, word_len); - WRONG: "v='\*'; echo Z$v" prints "Z*" instead of "Z\*" */
5673 /*o_addqblock(output, str, word_len); - WRONG: "v='*'; echo Z$v" prints "Z*" instead of Z* files */
5674 }
Denys Vlasenko6e42b892011-08-01 18:16:43 +02005675 last_is_ifs = 0;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005676 str += word_len;
Denys Vlasenko4fb53fb2011-08-01 14:06:20 +02005677 if (!*str) /* EOL - do not finalize word */
5678 break;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005679 }
Denys Vlasenko6e42b892011-08-01 18:16:43 +02005680
5681 /* We know str here points to at least one IFS char */
5682 last_is_ifs = 1;
Denys Vlasenko96786362018-04-11 16:02:58 +02005683 str += strspn(str, G.ifs_whitespace); /* skip IFS whitespace chars */
Denys Vlasenko6e42b892011-08-01 18:16:43 +02005684 if (!*str) /* EOL - do not finalize word */
5685 break;
5686
Denys Vlasenko96786362018-04-11 16:02:58 +02005687 if (G.ifs_whitespace != G.ifs /* usually false ($IFS is usually all whitespace), */
5688 && strchr(G.ifs, *str) /* the second check would fail */
5689 ) {
5690 /* This is a non-whitespace $IFS char */
5691 /* Skip it and IFS whitespace chars, start new word */
5692 str++;
5693 str += strspn(str, G.ifs_whitespace);
5694 goto new_word;
5695 }
5696
Denys Vlasenko6e42b892011-08-01 18:16:43 +02005697 /* Start new word... but not always! */
5698 /* Case "v=' a'; echo ''$v": we do need to finalize empty word: */
Denys Vlasenko4fb53fb2011-08-01 14:06:20 +02005699 if (output->has_quoted_part
5700 /* Case "v=' a'; echo $v":
5701 * here nothing precedes the space in $v expansion,
5702 * therefore we should not finish the word
Denys Vlasenko6e42b892011-08-01 18:16:43 +02005703 * (IOW: if there *is* word to finalize, only then do it):
Denys Vlasenko4fb53fb2011-08-01 14:06:20 +02005704 */
Denys Vlasenko6e42b892011-08-01 18:16:43 +02005705 || (n > 0 && output->data[output->length - 1])
Denys Vlasenko4fb53fb2011-08-01 14:06:20 +02005706 ) {
Denys Vlasenko96786362018-04-11 16:02:58 +02005707 new_word:
Denys Vlasenko4fb53fb2011-08-01 14:06:20 +02005708 o_addchr(output, '\0');
5709 debug_print_list("expand_on_ifs", output, n);
5710 n = o_save_ptr(output, n);
5711 }
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005712 }
Denys Vlasenko6e42b892011-08-01 18:16:43 +02005713
Denys Vlasenko168579a2018-07-19 13:45:54 +02005714 output->ended_in_ifs = last_is_ifs;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005715 debug_print_list("expand_on_ifs[1]", output, n);
5716 return n;
5717}
5718
5719/* Helper to expand $((...)) and heredoc body. These act as if
5720 * they are in double quotes, with the exception that they are not :).
5721 * Just the rules are similar: "expand only $var and `cmd`"
5722 *
5723 * Returns malloced string.
5724 * As an optimization, we return NULL if expansion is not needed.
5725 */
Denys Vlasenkob762c782018-07-17 14:21:38 +02005726static char *encode_then_expand_string(const char *str)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005727{
5728 char *exp_str;
5729 struct in_str input;
5730 o_string dest = NULL_O_STRING;
Denys Vlasenko0d2e0de2018-07-17 14:33:19 +02005731 const char *cp;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005732
Denys Vlasenko0d2e0de2018-07-17 14:33:19 +02005733 cp = str;
5734 for (;;) {
5735 if (!*cp) return NULL; /* string has no special chars */
5736 if (*cp == '$') break;
5737 if (*cp == '\\') break;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005738#if ENABLE_HUSH_TICK
Denys Vlasenko0d2e0de2018-07-17 14:33:19 +02005739 if (*cp == '`') break;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005740#endif
Denys Vlasenko0d2e0de2018-07-17 14:33:19 +02005741 cp++;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005742 }
5743
5744 /* We need to expand. Example:
5745 * echo $(($a + `echo 1`)) $((1 + $((2)) ))
5746 */
5747 setup_string_in_str(&input, str);
Denys Vlasenkob762c782018-07-17 14:21:38 +02005748 encode_string(NULL, &dest, &input, EOF);
Denys Vlasenko3eab24e2011-03-24 05:25:59 +01005749//TODO: error check (encode_string returns 0 on error)?
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005750 //bb_error_msg("'%s' -> '%s'", str, dest.data);
Denys Vlasenko34179952018-04-11 13:47:59 +02005751 exp_str = expand_string_to_string(dest.data,
Denys Vlasenkob762c782018-07-17 14:21:38 +02005752 EXP_FLAG_ESC_GLOB_CHARS,
5753 /*unbackslash:*/ 1
5754 );
5755 //bb_error_msg("'%s' -> '%s'", dest.data, exp_str);
5756 o_free_unsafe(&dest);
5757 return exp_str;
5758}
5759
5760#if !BASH_PATTERN_SUBST
5761#define encode_then_expand_vararg(str, handle_squotes, do_unbackslash) \
5762 encode_then_expand_vararg(str, handle_squotes)
5763#endif
5764static char *encode_then_expand_vararg(const char *str, int handle_squotes, int do_unbackslash)
5765{
5766#if !BASH_PATTERN_SUBST
5767 const int do_unbackslash = 0;
5768#endif
5769 char *exp_str;
5770 struct in_str input;
5771 o_string dest = NULL_O_STRING;
Denys Vlasenko0d2e0de2018-07-17 14:33:19 +02005772 const char *cp;
Denys Vlasenkob762c782018-07-17 14:21:38 +02005773
Denys Vlasenko0d2e0de2018-07-17 14:33:19 +02005774 cp = str;
5775 for (;;) {
5776 if (!*cp) return NULL; /* string has no special chars */
5777 if (*cp == '$') break;
5778 if (*cp == '\\') break;
5779 if (*cp == '\'') break;
5780 if (*cp == '"') break;
Denys Vlasenkob762c782018-07-17 14:21:38 +02005781#if ENABLE_HUSH_TICK
Denys Vlasenko0d2e0de2018-07-17 14:33:19 +02005782 if (*cp == '`') break;
Denys Vlasenkob762c782018-07-17 14:21:38 +02005783#endif
Denys Vlasenko0d2e0de2018-07-17 14:33:19 +02005784 cp++;
Denys Vlasenkob762c782018-07-17 14:21:38 +02005785 }
5786
5787 /* Expanding ARG in ${var#ARG}, ${var%ARG}, or ${var/ARG/ARG}.
5788 * These can contain single- and double-quoted strings,
5789 * and treated as if the ARG string is initially unquoted. IOW:
5790 * ${var#ARG} and "${var#ARG}" treat ARG the same (ARG can even be
5791 * a dquoted string: "${var#"zz"}"), the difference only comes later
5792 * (word splitting and globbing of the ${var...} result).
5793 */
5794
5795 setup_string_in_str(&input, str);
Denys Vlasenko8b08d5a2018-07-18 15:48:53 +02005796 dest.data = xzalloc(1); /* start as "", not as NULL */
Denys Vlasenkob762c782018-07-17 14:21:38 +02005797 exp_str = NULL;
5798
5799 for (;;) {
5800 int ch;
Denys Vlasenkob762c782018-07-17 14:21:38 +02005801
5802 ch = i_getch(&input);
5803 if (ch == EOF) {
5804 if (dest.o_expflags) { /* EXP_FLAG_ESC_GLOB_CHARS set? */
5805 syntax_error_unterm_ch('"');
5806 goto ret; /* error */
5807 }
5808 break;
5809 }
5810 debug_printf_parse("%s: ch=%c (%d) escape=%d\n",
5811 __func__, ch, ch, !!dest.o_expflags);
5812 if (ch == '\'' && handle_squotes && !dest.o_expflags) {
5813//quoting version of add_till_single_quote() (try to merge?):
5814 for (;;) {
5815 ch = i_getch(&input);
5816 if (ch == EOF) {
5817 syntax_error_unterm_ch('\'');
5818 goto ret; /* error */
5819 }
5820 if (ch == '\'')
5821 break;
5822 o_addqchr(&dest, ch);
5823 }
5824 continue;
5825 }
5826 if (ch == '"') {
5827 dest.o_expflags ^= EXP_FLAG_ESC_GLOB_CHARS;
5828 continue;
5829 }
5830 if (ch == '\\') {
5831 ch = i_getch(&input);
5832 if (ch == EOF) {
5833//example? error message? syntax_error_unterm_ch('"');
5834 debug_printf_parse("%s: error: \\<eof>\n", __func__);
5835 goto ret;
5836 }
5837 o_addqchr(&dest, ch);
5838 continue;
5839 }
Denys Vlasenkob762c782018-07-17 14:21:38 +02005840 if (ch == '$') {
5841 if (!parse_dollar(NULL, &dest, &input, /*quote_mask:*/ 0x80)) {
5842 debug_printf_parse("%s: error: parse_dollar returned 0 (error)\n", __func__);
5843 goto ret;
5844 }
5845 continue;
5846 }
5847#if ENABLE_HUSH_TICK
5848 if (ch == '`') {
5849 //unsigned pos = dest->length;
5850 o_addchr(&dest, SPECIAL_VAR_SYMBOL);
5851 o_addchr(&dest, 0x80 | '`');
5852 if (!add_till_backquote(&dest, &input,
5853 /*in_dquote:*/ dest.o_expflags /* nonzero if EXP_FLAG_ESC_GLOB_CHARS set */
5854 )
5855 ) {
5856 goto ret; /* error */
5857 }
5858 o_addchr(&dest, SPECIAL_VAR_SYMBOL);
5859 //debug_printf_subst("SUBST RES3 '%s'\n", dest->data + pos);
5860 continue;
5861 }
5862#endif
5863 o_addQchr(&dest, ch);
5864 } /* for (;;) */
5865
5866 debug_printf_parse("encode: '%s' -> '%s'\n", str, dest.data);
5867 exp_str = expand_string_to_string(dest.data,
Denys Vlasenko34179952018-04-11 13:47:59 +02005868 do_unbackslash ? EXP_FLAG_ESC_GLOB_CHARS : 0,
5869 do_unbackslash
5870 );
Denys Vlasenkob762c782018-07-17 14:21:38 +02005871 ret:
5872 debug_printf_parse("expand: '%s' -> '%s'\n", dest.data, exp_str);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005873 o_free_unsafe(&dest);
5874 return exp_str;
5875}
5876
Denys Vlasenko0b883582016-12-23 16:49:07 +01005877#if ENABLE_FEATURE_SH_MATH
Denys Vlasenko063847d2010-09-15 13:33:02 +02005878static arith_t expand_and_evaluate_arith(const char *arg, const char **errmsg_p)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005879{
Denys Vlasenko06d44d72010-09-13 12:49:03 +02005880 arith_state_t math_state;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005881 arith_t res;
5882 char *exp_str;
5883
Denys Vlasenko06d44d72010-09-13 12:49:03 +02005884 math_state.lookupvar = get_local_var_value;
5885 math_state.setvar = set_local_var_from_halves;
5886 //math_state.endofname = endofname;
Denys Vlasenkob762c782018-07-17 14:21:38 +02005887 exp_str = encode_then_expand_string(arg);
Denys Vlasenko06d44d72010-09-13 12:49:03 +02005888 res = arith(&math_state, exp_str ? exp_str : arg);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005889 free(exp_str);
Denys Vlasenko063847d2010-09-15 13:33:02 +02005890 if (errmsg_p)
5891 *errmsg_p = math_state.errmsg;
5892 if (math_state.errmsg)
Denys Vlasenko39701202017-08-02 19:44:05 +02005893 msg_and_die_if_script(math_state.errmsg);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005894 return res;
5895}
5896#endif
5897
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01005898#if BASH_PATTERN_SUBST
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005899/* ${var/[/]pattern[/repl]} helpers */
5900static char *strstr_pattern(char *val, const char *pattern, int *size)
5901{
5902 while (1) {
5903 char *end = scan_and_match(val, pattern, SCAN_MOVE_FROM_RIGHT + SCAN_MATCH_LEFT_HALF);
5904 debug_printf_varexp("val:'%s' pattern:'%s' end:'%s'\n", val, pattern, end);
5905 if (end) {
5906 *size = end - val;
5907 return val;
5908 }
5909 if (*val == '\0')
5910 return NULL;
5911 /* Optimization: if "*pat" did not match the start of "string",
5912 * we know that "tring", "ring" etc will not match too:
5913 */
5914 if (pattern[0] == '*')
5915 return NULL;
5916 val++;
5917 }
5918}
5919static char *replace_pattern(char *val, const char *pattern, const char *repl, char exp_op)
5920{
5921 char *result = NULL;
5922 unsigned res_len = 0;
5923 unsigned repl_len = strlen(repl);
5924
Denys Vlasenkocba79a82018-01-25 14:07:40 +01005925 /* Null pattern never matches, including if "var" is empty */
5926 if (!pattern[0])
5927 return result; /* NULL, no replaces happened */
5928
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005929 while (1) {
5930 int size;
5931 char *s = strstr_pattern(val, pattern, &size);
5932 if (!s)
5933 break;
5934
5935 result = xrealloc(result, res_len + (s - val) + repl_len + 1);
Denys Vlasenko0675b032017-07-24 02:17:05 +02005936 strcpy(mempcpy(result + res_len, val, s - val), repl);
5937 res_len += (s - val) + repl_len;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005938 debug_printf_varexp("val:'%s' s:'%s' result:'%s'\n", val, s, result);
5939
5940 val = s + size;
5941 if (exp_op == '/')
5942 break;
5943 }
Denys Vlasenko0675b032017-07-24 02:17:05 +02005944 if (*val && result) {
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005945 result = xrealloc(result, res_len + strlen(val) + 1);
5946 strcpy(result + res_len, val);
5947 debug_printf_varexp("val:'%s' result:'%s'\n", val, result);
5948 }
5949 debug_printf_varexp("result:'%s'\n", result);
5950 return result;
5951}
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01005952#endif /* BASH_PATTERN_SUBST */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005953
Denys Vlasenko168579a2018-07-19 13:45:54 +02005954static int append_str_maybe_ifs_split(o_string *output, int n,
Denys Vlasenko18e8b612018-07-20 14:24:56 +02005955 int first_ch, const char *val)
Denys Vlasenko116b50a2018-07-19 11:16:53 +02005956{
5957 if (!(first_ch & 0x80)) { /* unquoted $VAR */
5958 debug_printf_expand("unquoted '%s', output->o_escape:%d\n", val,
5959 !!(output->o_expflags & EXP_FLAG_ESC_GLOB_CHARS));
5960 if (val && val[0])
Denys Vlasenko168579a2018-07-19 13:45:54 +02005961 n = expand_on_ifs(output, n, val);
Denys Vlasenko116b50a2018-07-19 11:16:53 +02005962 } else { /* quoted "$VAR" */
5963 output->has_quoted_part = 1;
5964 debug_printf_expand("quoted '%s', output->o_escape:%d\n", val,
5965 !!(output->o_expflags & EXP_FLAG_ESC_GLOB_CHARS));
5966 if (val && val[0])
5967 o_addQstr(output, val);
5968 }
5969 return n;
5970}
5971
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005972/* Helper:
5973 * Handles <SPECIAL_VAR_SYMBOL>varname...<SPECIAL_VAR_SYMBOL> construct.
5974 */
Denys Vlasenko8a6a4612018-07-19 12:14:47 +02005975static NOINLINE int expand_one_var(o_string *output,
Denys Vlasenko168579a2018-07-19 13:45:54 +02005976 int n, int first_ch, char *arg, char **pp)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005977{
Denys Vlasenko0ca31982018-01-25 13:20:50 +01005978 const char *val;
5979 char *to_be_freed;
5980 char *p;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005981 char *var;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005982 char exp_op;
5983 char exp_save = exp_save; /* for compiler */
5984 char *exp_saveptr; /* points to expansion operator */
5985 char *exp_word = exp_word; /* for compiler */
Denys Vlasenkobfc02a72010-09-09 14:38:46 +02005986 char arg0;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005987
Denys Vlasenko0ca31982018-01-25 13:20:50 +01005988 val = NULL;
5989 to_be_freed = NULL;
5990 p = *pp;
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02005991 *p = '\0'; /* replace trailing SPECIAL_VAR_SYMBOL */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005992 var = arg;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005993 exp_saveptr = arg[1] ? strchr(VAR_ENCODED_SUBST_OPS, arg[1]) : NULL;
Denys Vlasenkobfc02a72010-09-09 14:38:46 +02005994 arg0 = arg[0];
Denys Vlasenkob762c782018-07-17 14:21:38 +02005995 arg[0] = (arg0 & 0x7f);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02005996 exp_op = 0;
5997
Denys Vlasenkob762c782018-07-17 14:21:38 +02005998 if (arg[0] == '#' && arg[1] /* ${#...} but not ${#} */
Denys Vlasenko2093ad22017-07-26 00:07:27 +02005999 && (!exp_saveptr /* and ( not(${#<op_char>...}) */
6000 || (arg[2] == '\0' && strchr(SPECIAL_VARS_STR, arg[1])) /* or ${#C} "len of $C" ) */
6001 ) /* NB: skipping ^^^specvar check mishandles ${#::2} */
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02006002 ) {
6003 /* It must be length operator: ${#var} */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006004 var++;
6005 exp_op = 'L';
6006 } else {
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02006007 /* Maybe handle parameter expansion */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006008 if (exp_saveptr /* if 2nd char is one of expansion operators */
Denys Vlasenkob762c782018-07-17 14:21:38 +02006009 && strchr(NUMERIC_SPECVARS_STR, arg[0]) /* 1st char is special variable */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006010 ) {
6011 /* ${?:0}, ${#[:]%0} etc */
6012 exp_saveptr = var + 1;
6013 } else {
6014 /* ${?}, ${var}, ${var:0}, ${var[:]%0} etc */
6015 exp_saveptr = var+1 + strcspn(var+1, VAR_ENCODED_SUBST_OPS);
6016 }
6017 exp_op = exp_save = *exp_saveptr;
6018 if (exp_op) {
6019 exp_word = exp_saveptr + 1;
6020 if (exp_op == ':') {
6021 exp_op = *exp_word++;
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02006022//TODO: try ${var:} and ${var:bogus} in non-bash config
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01006023 if (BASH_SUBSTR
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02006024 && (!exp_op || !strchr(MINUS_PLUS_EQUAL_QUESTION, exp_op))
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006025 ) {
6026 /* oops... it's ${var:N[:M]}, not ${var:?xxx} or some such */
6027 exp_op = ':';
6028 exp_word--;
6029 }
6030 }
6031 *exp_saveptr = '\0';
6032 } /* else: it's not an expansion op, but bare ${var} */
6033 }
6034
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02006035 /* Look up the variable in question */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006036 if (isdigit(var[0])) {
Denys Vlasenko77a7b552010-09-09 12:40:03 +02006037 /* parse_dollar should have vetted var for us */
Denys Vlasenko8a6a4612018-07-19 12:14:47 +02006038 int nn = xatoi_positive(var);
6039 if (nn < G.global_argc)
6040 val = G.global_argv[nn];
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006041 /* else val remains NULL: $N with too big N */
6042 } else {
6043 switch (var[0]) {
6044 case '$': /* pid */
6045 val = utoa(G.root_pid);
6046 break;
6047 case '!': /* bg pid */
6048 val = G.last_bg_pid ? utoa(G.last_bg_pid) : "";
6049 break;
6050 case '?': /* exitcode */
6051 val = utoa(G.last_exitcode);
6052 break;
6053 case '#': /* argc */
6054 val = utoa(G.global_argc ? G.global_argc-1 : 0);
6055 break;
6056 default:
6057 val = get_local_var_value(var);
6058 }
6059 }
6060
6061 /* Handle any expansions */
6062 if (exp_op == 'L') {
Denys Vlasenkoc538d5b2014-08-13 09:57:44 +02006063 reinit_unicode_for_hush();
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006064 debug_printf_expand("expand: length(%s)=", val);
Denys Vlasenkoc538d5b2014-08-13 09:57:44 +02006065 val = utoa(val ? unicode_strlen(val) : 0);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006066 debug_printf_expand("%s\n", val);
6067 } else if (exp_op) {
6068 if (exp_op == '%' || exp_op == '#') {
6069 /* Standard-mandated substring removal ops:
6070 * ${parameter%word} - remove smallest suffix pattern
6071 * ${parameter%%word} - remove largest suffix pattern
6072 * ${parameter#word} - remove smallest prefix pattern
6073 * ${parameter##word} - remove largest prefix pattern
6074 *
6075 * Word is expanded to produce a glob pattern.
6076 * Then var's value is matched to it and matching part removed.
6077 */
Denys Vlasenkob762c782018-07-17 14:21:38 +02006078//FIXME: ${x#...${...}...}
6079//should evaluate inner ${...} even if x is "" and no shrinking of it is possible -
6080//inner ${...} may have side effects!
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006081 if (val && val[0]) {
Denys Vlasenko4f870492010-09-10 11:06:01 +02006082 char *t;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006083 char *exp_exp_word;
6084 char *loc;
6085 unsigned scan_flags = pick_scan(exp_op, *exp_word);
Denys Vlasenkoe4dcba12010-10-28 18:57:19 +02006086 if (exp_op == *exp_word) /* ## or %% */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006087 exp_word++;
Denys Vlasenko55f81332018-03-02 18:12:12 +01006088 debug_printf_expand("expand: exp_word:'%s'\n", exp_word);
Denys Vlasenkob762c782018-07-17 14:21:38 +02006089 exp_exp_word = encode_then_expand_vararg(exp_word, /*handle_squotes:*/ 1, /*unbackslash:*/ 0);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006090 if (exp_exp_word)
6091 exp_word = exp_exp_word;
Denys Vlasenkob762c782018-07-17 14:21:38 +02006092 debug_printf_expand("expand: exp_word:'%s'\n", exp_word);
6093 /*
6094 * HACK ALERT. We depend here on the fact that
Denys Vlasenko4f870492010-09-10 11:06:01 +02006095 * G.global_argv and results of utoa and get_local_var_value
6096 * are actually in writable memory:
Denys Vlasenkob762c782018-07-17 14:21:38 +02006097 * scan_and_match momentarily stores NULs there.
6098 */
Denys Vlasenko4f870492010-09-10 11:06:01 +02006099 t = (char*)val;
6100 loc = scan_and_match(t, exp_word, scan_flags);
Denys Vlasenko55f81332018-03-02 18:12:12 +01006101 debug_printf_expand("op:%c str:'%s' pat:'%s' res:'%s'\n", exp_op, t, exp_word, loc);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006102 free(exp_exp_word);
6103 if (loc) { /* match was found */
6104 if (scan_flags & SCAN_MATCH_LEFT_HALF) /* #[#] */
Denys Vlasenko4f870492010-09-10 11:06:01 +02006105 val = loc; /* take right part */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006106 else /* %[%] */
Denys Vlasenko4f870492010-09-10 11:06:01 +02006107 val = to_be_freed = xstrndup(val, loc - val); /* left */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006108 }
6109 }
6110 }
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01006111#if BASH_PATTERN_SUBST
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006112 else if (exp_op == '/' || exp_op == '\\') {
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02006113 /* It's ${var/[/]pattern[/repl]} thing.
6114 * Note that in encoded form it has TWO parts:
6115 * var/pattern<SPECIAL_VAR_SYMBOL>repl<SPECIAL_VAR_SYMBOL>
Denys Vlasenko4f870492010-09-10 11:06:01 +02006116 * and if // is used, it is encoded as \:
6117 * var\pattern<SPECIAL_VAR_SYMBOL>repl<SPECIAL_VAR_SYMBOL>
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02006118 */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006119 if (val && val[0]) {
Denys Vlasenko4f870492010-09-10 11:06:01 +02006120 /* pattern uses non-standard expansion.
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02006121 * repl should be unbackslashed and globbed
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02006122 * by the usual expansion rules:
Denys Vlasenkode026252018-04-05 17:04:53 +02006123 * >az >bz
6124 * v='a bz'; echo "${v/a*z/a*z}" #prints "a*z"
6125 * v='a bz'; echo "${v/a*z/\z}" #prints "z"
6126 * v='a bz'; echo ${v/a*z/a*z} #prints "az"
6127 * v='a bz'; echo ${v/a*z/\z} #prints "z"
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02006128 * (note that a*z _pattern_ is never globbed!)
6129 */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006130 char *pattern, *repl, *t;
Denys Vlasenkob762c782018-07-17 14:21:38 +02006131 pattern = encode_then_expand_vararg(exp_word, /*handle_squotes:*/ 1, /*unbackslash:*/ 0);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006132 if (!pattern)
6133 pattern = xstrdup(exp_word);
6134 debug_printf_varexp("pattern:'%s'->'%s'\n", exp_word, pattern);
6135 *p++ = SPECIAL_VAR_SYMBOL;
6136 exp_word = p;
6137 p = strchr(p, SPECIAL_VAR_SYMBOL);
6138 *p = '\0';
Denys Vlasenkob762c782018-07-17 14:21:38 +02006139 repl = encode_then_expand_vararg(exp_word, /*handle_squotes:*/ 1, /*unbackslash:*/ 1);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006140 debug_printf_varexp("repl:'%s'->'%s'\n", exp_word, repl);
6141 /* HACK ALERT. We depend here on the fact that
6142 * G.global_argv and results of utoa and get_local_var_value
6143 * are actually in writable memory:
6144 * replace_pattern momentarily stores NULs there. */
6145 t = (char*)val;
6146 to_be_freed = replace_pattern(t,
6147 pattern,
6148 (repl ? repl : exp_word),
6149 exp_op);
6150 if (to_be_freed) /* at least one replace happened */
6151 val = to_be_freed;
6152 free(pattern);
6153 free(repl);
Denys Vlasenkocba79a82018-01-25 14:07:40 +01006154 } else {
6155 /* Empty variable always gives nothing */
6156 // "v=''; echo ${v/*/w}" prints "", not "w"
6157 /* Just skip "replace" part */
6158 *p++ = SPECIAL_VAR_SYMBOL;
6159 p = strchr(p, SPECIAL_VAR_SYMBOL);
6160 *p = '\0';
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006161 }
6162 }
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01006163#endif /* BASH_PATTERN_SUBST */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006164 else if (exp_op == ':') {
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01006165#if BASH_SUBSTR && ENABLE_FEATURE_SH_MATH
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006166 /* It's ${var:N[:M]} bashism.
6167 * Note that in encoded form it has TWO parts:
6168 * var:N<SPECIAL_VAR_SYMBOL>M<SPECIAL_VAR_SYMBOL>
6169 */
6170 arith_t beg, len;
Denys Vlasenko063847d2010-09-15 13:33:02 +02006171 const char *errmsg;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006172
Denys Vlasenko063847d2010-09-15 13:33:02 +02006173 beg = expand_and_evaluate_arith(exp_word, &errmsg);
6174 if (errmsg)
6175 goto arith_err;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006176 debug_printf_varexp("beg:'%s'=%lld\n", exp_word, (long long)beg);
6177 *p++ = SPECIAL_VAR_SYMBOL;
6178 exp_word = p;
6179 p = strchr(p, SPECIAL_VAR_SYMBOL);
6180 *p = '\0';
Denys Vlasenko063847d2010-09-15 13:33:02 +02006181 len = expand_and_evaluate_arith(exp_word, &errmsg);
6182 if (errmsg)
6183 goto arith_err;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006184 debug_printf_varexp("len:'%s'=%lld\n", exp_word, (long long)len);
Denys Vlasenkoe32b6502017-07-17 16:46:57 +02006185 if (beg < 0) {
6186 /* negative beg counts from the end */
6187 beg = (arith_t)strlen(val) + beg;
6188 if (beg < 0) /* ${v: -999999} is "" */
6189 beg = len = 0;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006190 }
Denys Vlasenkoe32b6502017-07-17 16:46:57 +02006191 debug_printf_varexp("from val:'%s'\n", val);
6192 if (len < 0) {
6193 /* in bash, len=-n means strlen()-n */
6194 len = (arith_t)strlen(val) - beg + len;
6195 if (len < 0) /* bash compat */
Denys Vlasenko39701202017-08-02 19:44:05 +02006196 msg_and_die_if_script("%s: substring expression < 0", var);
Denys Vlasenkoe32b6502017-07-17 16:46:57 +02006197 }
Denys Vlasenko0ba80e42017-07-17 16:50:20 +02006198 if (len <= 0 || !val || beg >= strlen(val)) {
Denys Vlasenkoe32b6502017-07-17 16:46:57 +02006199 arith_err:
6200 val = NULL;
6201 } else {
6202 /* Paranoia. What if user entered 9999999999999
6203 * which fits in arith_t but not int? */
6204 if (len >= INT_MAX)
6205 len = INT_MAX;
6206 val = to_be_freed = xstrndup(val + beg, len);
6207 }
6208 debug_printf_varexp("val:'%s'\n", val);
6209#else /* not (HUSH_SUBSTR_EXPANSION && FEATURE_SH_MATH) */
Denys Vlasenko39701202017-08-02 19:44:05 +02006210 msg_and_die_if_script("malformed ${%s:...}", var);
Denys Vlasenkoe32b6502017-07-17 16:46:57 +02006211 val = NULL;
6212#endif
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006213 } else { /* one of "-=+?" */
6214 /* Standard-mandated substitution ops:
6215 * ${var?word} - indicate error if unset
6216 * If var is unset, word (or a message indicating it is unset
6217 * if word is null) is written to standard error
6218 * and the shell exits with a non-zero exit status.
6219 * Otherwise, the value of var is substituted.
6220 * ${var-word} - use default value
6221 * If var is unset, word is substituted.
6222 * ${var=word} - assign and use default value
6223 * If var is unset, word is assigned to var.
6224 * In all cases, final value of var is substituted.
6225 * ${var+word} - use alternative value
6226 * If var is unset, null is substituted.
6227 * Otherwise, word is substituted.
6228 *
6229 * Word is subjected to tilde expansion, parameter expansion,
6230 * command substitution, and arithmetic expansion.
6231 * If word is not needed, it is not expanded.
6232 *
6233 * Colon forms (${var:-word}, ${var:=word} etc) do the same,
6234 * but also treat null var as if it is unset.
6235 */
Denys Vlasenko8a6a4612018-07-19 12:14:47 +02006236/*
6237 * Word-splitting and squote behavior of bash:
6238 * $ f() { for i; do echo "|$i|"; done; };
6239 *
6240 * $ x=; f ${x:?'x y' z}
Denys Vlasenko168579a2018-07-19 13:45:54 +02006241 * bash: x: x y z #BUG: does not abort, ${} results in empty expansion
Denys Vlasenko8a6a4612018-07-19 12:14:47 +02006242 * $ x=; f "${x:?'x y' z}"
Denys Vlasenko168579a2018-07-19 13:45:54 +02006243 * bash: x: x y z # dash prints: dash: x: 'x y' z #BUG: does not abort, ${} results in ""
Denys Vlasenko8a6a4612018-07-19 12:14:47 +02006244 *
6245 * $ x=; f ${x:='x y' z}
6246 * |x|
6247 * |y|
6248 * |z|
6249 * $ x=; f "${x:='x y' z}"
6250 * |'x y' z|
6251 *
6252 * $ x=x; f ${x:+'x y' z}
6253 * |x y|
6254 * |z|
6255 * $ x=x; f "${x:+'x y' z}"
6256 * |'x y' z|
6257 *
6258 * $ x=; f ${x:-'x y' z}
6259 * |x y|
6260 * |z|
6261 * $ x=; f "${x:-'x y' z}"
6262 * |'x y' z|
6263 */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006264 int use_word = (!val || ((exp_save == ':') && !val[0]));
6265 if (exp_op == '+')
6266 use_word = !use_word;
6267 debug_printf_expand("expand: op:%c (null:%s) test:%i\n", exp_op,
6268 (exp_save == ':') ? "true" : "false", use_word);
6269 if (use_word) {
Denys Vlasenkob762c782018-07-17 14:21:38 +02006270//FIXME: unquoted ${x:+"b c" d} and ${x:+'b c' d} should expand to two words
6271//currently it expands to three.
Denys Vlasenko8a6a4612018-07-19 12:14:47 +02006272 to_be_freed = encode_then_expand_vararg(exp_word,
6273 /*handle_squotes:*/ !(arg0 & 0x80),
6274 /*unbackslash:*/ 0
6275 );
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006276 if (to_be_freed)
6277 exp_word = to_be_freed;
6278 if (exp_op == '?') {
6279 /* mimic bash message */
Denys Vlasenko39701202017-08-02 19:44:05 +02006280 msg_and_die_if_script("%s: %s",
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006281 var,
Denys Vlasenko645c6972017-07-25 15:18:57 +02006282 exp_word[0]
6283 ? exp_word
6284 : "parameter null or not set"
6285 /* ash has more specific messages, a-la: */
6286 /*: (exp_save == ':' ? "parameter null or not set" : "parameter not set")*/
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006287 );
6288//TODO: how interactive bash aborts expansion mid-command?
Denys Vlasenko168579a2018-07-19 13:45:54 +02006289//It aborts the entire line, returns to prompt:
Denys Vlasenko8a6a4612018-07-19 12:14:47 +02006290// $ f() { for i; do echo "|$i|"; done; }; x=; f "${x:?'x y' z}"; echo YO
6291// bash: x: x y z
6292// $
6293// ("echo YO" is not executed, neither the f function call)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006294 } else {
6295 val = exp_word;
6296 }
6297
6298 if (exp_op == '=') {
6299 /* ${var=[word]} or ${var:=[word]} */
6300 if (isdigit(var[0]) || var[0] == '#') {
6301 /* mimic bash message */
Denys Vlasenko39701202017-08-02 19:44:05 +02006302 msg_and_die_if_script("$%s: cannot assign in this way", var);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006303 val = NULL;
6304 } else {
6305 char *new_var = xasprintf("%s=%s", var, val);
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02006306 set_local_var(new_var, /*flag:*/ 0);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006307 }
6308 }
6309 }
6310 } /* one of "-=+?" */
6311
6312 *exp_saveptr = exp_save;
6313 } /* if (exp_op) */
6314
Denys Vlasenkobfc02a72010-09-09 14:38:46 +02006315 arg[0] = arg0;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006316 *pp = p;
Denys Vlasenko8a6a4612018-07-19 12:14:47 +02006317
Denys Vlasenko168579a2018-07-19 13:45:54 +02006318 n = append_str_maybe_ifs_split(output, n, first_ch, val);
Denys Vlasenko8a6a4612018-07-19 12:14:47 +02006319
6320 free(to_be_freed);
6321 return n;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006322}
6323
6324/* Expand all variable references in given string, adding words to list[]
6325 * at n, n+1,... positions. Return updated n (so that list[n] is next one
6326 * to be filled). This routine is extremely tricky: has to deal with
6327 * variables/parameters with whitespace, $* and $@, and constructs like
6328 * 'echo -$*-'. If you play here, you must run testsuite afterwards! */
Denys Vlasenko95d48f22010-09-08 13:58:55 +02006329static NOINLINE int expand_vars_to_list(o_string *output, int n, char *arg)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006330{
Denys Vlasenko95d48f22010-09-08 13:58:55 +02006331 /* output->o_expflags & EXP_FLAG_SINGLEWORD (0x80) if we are in
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006332 * expansion of right-hand side of assignment == 1-element expand.
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006333 */
Denys Vlasenkobfc02a72010-09-09 14:38:46 +02006334 char cant_be_null = 0; /* only bit 0x80 matters */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006335 char *p;
6336
Denys Vlasenko168579a2018-07-19 13:45:54 +02006337 output->ended_in_ifs = 0; /* did last unquoted expansion end with IFS chars? */
6338
Denys Vlasenko95d48f22010-09-08 13:58:55 +02006339 debug_printf_expand("expand_vars_to_list: arg:'%s' singleword:%x\n", arg,
6340 !!(output->o_expflags & EXP_FLAG_SINGLEWORD));
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006341 debug_print_list("expand_vars_to_list", output, n);
6342 n = o_save_ptr(output, n);
6343 debug_print_list("expand_vars_to_list[0]", output, n);
6344
6345 while ((p = strchr(arg, SPECIAL_VAR_SYMBOL)) != NULL) {
6346 char first_ch;
Denys Vlasenko0b883582016-12-23 16:49:07 +01006347#if ENABLE_FEATURE_SH_MATH
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006348 char arith_buf[sizeof(arith_t)*3 + 2];
6349#endif
Denys Vlasenko6e42b892011-08-01 18:16:43 +02006350
Denys Vlasenko168579a2018-07-19 13:45:54 +02006351 if (output->ended_in_ifs) {
Denys Vlasenko6e42b892011-08-01 18:16:43 +02006352 o_addchr(output, '\0');
6353 n = o_save_ptr(output, n);
Denys Vlasenko168579a2018-07-19 13:45:54 +02006354 output->ended_in_ifs = 0;
Denys Vlasenko6e42b892011-08-01 18:16:43 +02006355 }
6356
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006357 o_addblock(output, arg, p - arg);
6358 debug_print_list("expand_vars_to_list[1]", output, n);
6359 arg = ++p;
6360 p = strchr(p, SPECIAL_VAR_SYMBOL);
6361
Denys Vlasenkobfc02a72010-09-09 14:38:46 +02006362 /* Fetch special var name (if it is indeed one of them)
6363 * and quote bit, force the bit on if singleword expansion -
6364 * important for not getting v=$@ expand to many words. */
Denys Vlasenko95d48f22010-09-08 13:58:55 +02006365 first_ch = arg[0] | (output->o_expflags & EXP_FLAG_SINGLEWORD);
Denys Vlasenkobfc02a72010-09-09 14:38:46 +02006366
6367 /* Is this variable quoted and thus expansion can't be null?
6368 * "$@" is special. Even if quoted, it can still
6369 * expand to nothing (not even an empty string),
6370 * thus it is excluded. */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006371 if ((first_ch & 0x7f) != '@')
Denys Vlasenkobfc02a72010-09-09 14:38:46 +02006372 cant_be_null |= first_ch;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006373
6374 switch (first_ch & 0x7f) {
6375 /* Highest bit in first_ch indicates that var is double-quoted */
6376 case '*':
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02006377 case '@': {
6378 int i;
6379 if (!G.global_argv[1])
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006380 break;
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02006381 i = 1;
Denys Vlasenkobfc02a72010-09-09 14:38:46 +02006382 cant_be_null |= first_ch; /* do it for "$@" _now_, when we know it's not empty */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006383 if (!(first_ch & 0x80)) { /* unquoted $* or $@ */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006384 while (G.global_argv[i]) {
Denys Vlasenko168579a2018-07-19 13:45:54 +02006385 n = expand_on_ifs(output, n, G.global_argv[i]);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006386 debug_printf_expand("expand_vars_to_list: argv %d (last %d)\n", i, G.global_argc - 1);
6387 if (G.global_argv[i++][0] && G.global_argv[i]) {
6388 /* this argv[] is not empty and not last:
6389 * put terminating NUL, start new word */
6390 o_addchr(output, '\0');
6391 debug_print_list("expand_vars_to_list[2]", output, n);
6392 n = o_save_ptr(output, n);
6393 debug_print_list("expand_vars_to_list[3]", output, n);
6394 }
6395 }
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006396 } else
Denys Vlasenko95d48f22010-09-08 13:58:55 +02006397 /* If EXP_FLAG_SINGLEWORD, we handle assignment 'a=....$@.....'
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006398 * and in this case should treat it like '$*' - see 'else...' below */
Denys Vlasenko6ffaa002018-03-31 00:46:07 +02006399 if (first_ch == (char)('@'|0x80) /* quoted $@ */
Denys Vlasenkobfc02a72010-09-09 14:38:46 +02006400 && !(output->o_expflags & EXP_FLAG_SINGLEWORD) /* not v="$@" case */
Denys Vlasenko95d48f22010-09-08 13:58:55 +02006401 ) {
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006402 while (1) {
6403 o_addQstr(output, G.global_argv[i]);
6404 if (++i >= G.global_argc)
6405 break;
6406 o_addchr(output, '\0');
6407 debug_print_list("expand_vars_to_list[4]", output, n);
6408 n = o_save_ptr(output, n);
6409 }
Denys Vlasenkobfc02a72010-09-09 14:38:46 +02006410 } else { /* quoted $* (or v="$@" case): add as one word */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006411 while (1) {
6412 o_addQstr(output, G.global_argv[i]);
6413 if (!G.global_argv[++i])
6414 break;
6415 if (G.ifs[0])
6416 o_addchr(output, G.ifs[0]);
6417 }
Denys Vlasenko4fb53fb2011-08-01 14:06:20 +02006418 output->has_quoted_part = 1;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006419 }
6420 break;
Denys Vlasenkoc49d2d92010-09-06 10:26:37 +02006421 }
Denys Vlasenko18e8b612018-07-20 14:24:56 +02006422 case SPECIAL_VAR_SYMBOL: {
6423 /* <SPECIAL_VAR_SYMBOL><SPECIAL_VAR_SYMBOL> */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006424 /* "Empty variable", used to make "" etc to not disappear */
Denys Vlasenko4fb53fb2011-08-01 14:06:20 +02006425 output->has_quoted_part = 1;
Denys Vlasenkobfc02a72010-09-09 14:38:46 +02006426 cant_be_null = 0x80;
Denys Vlasenko18e8b612018-07-20 14:24:56 +02006427 arg++;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006428 break;
Denys Vlasenko18e8b612018-07-20 14:24:56 +02006429 }
Denys Vlasenko932b9972018-01-11 12:39:48 +01006430 case SPECIAL_VAR_QUOTED_SVS:
6431 /* <SPECIAL_VAR_SYMBOL><SPECIAL_VAR_QUOTED_SVS><SPECIAL_VAR_SYMBOL> */
Denys Vlasenko18e8b612018-07-20 14:24:56 +02006432 /* "^C variable", represents literal ^C char (possible in scripts) */
6433 o_addchr(output, SPECIAL_VAR_SYMBOL_CHR);
Denys Vlasenko932b9972018-01-11 12:39:48 +01006434 arg++;
Denys Vlasenko932b9972018-01-11 12:39:48 +01006435 break;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006436#if ENABLE_HUSH_TICK
Denys Vlasenko18e8b612018-07-20 14:24:56 +02006437 case '`': {
6438 /* <SPECIAL_VAR_SYMBOL>`cmd<SPECIAL_VAR_SYMBOL> */
Denys Vlasenko116b50a2018-07-19 11:16:53 +02006439 o_string subst_result = NULL_O_STRING;
6440
Denys Vlasenkobfc02a72010-09-09 14:38:46 +02006441 *p = '\0'; /* replace trailing <SPECIAL_VAR_SYMBOL> */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006442 arg++;
6443 /* Can't just stuff it into output o_string,
6444 * expanded result may need to be globbed
Denys Vlasenko10ad6222017-04-17 16:13:32 +02006445 * and $IFS-split */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006446 debug_printf_subst("SUBST '%s' first_ch %x\n", arg, first_ch);
6447 G.last_exitcode = process_command_subs(&subst_result, arg);
Denys Vlasenko5fa05052018-04-03 11:21:13 +02006448 G.expand_exitcode = G.last_exitcode;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006449 debug_printf_subst("SUBST RES:%d '%s'\n", G.last_exitcode, subst_result.data);
Denys Vlasenko168579a2018-07-19 13:45:54 +02006450 n = append_str_maybe_ifs_split(output, n, first_ch, subst_result.data);
Denys Vlasenko116b50a2018-07-19 11:16:53 +02006451 o_free_unsafe(&subst_result);
Denys Vlasenko18e8b612018-07-20 14:24:56 +02006452 break;
Denys Vlasenko116b50a2018-07-19 11:16:53 +02006453 }
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006454#endif
Denys Vlasenko0b883582016-12-23 16:49:07 +01006455#if ENABLE_FEATURE_SH_MATH
Denys Vlasenko18e8b612018-07-20 14:24:56 +02006456 case '+': {
6457 /* <SPECIAL_VAR_SYMBOL>+arith<SPECIAL_VAR_SYMBOL> */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006458 arith_t res;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006459
6460 arg++; /* skip '+' */
6461 *p = '\0'; /* replace trailing <SPECIAL_VAR_SYMBOL> */
6462 debug_printf_subst("ARITH '%s' first_ch %x\n", arg, first_ch);
Denys Vlasenko063847d2010-09-15 13:33:02 +02006463 res = expand_and_evaluate_arith(arg, NULL);
Denys Vlasenkobed7c812010-09-16 11:50:46 +02006464 debug_printf_subst("ARITH RES '"ARITH_FMT"'\n", res);
6465 sprintf(arith_buf, ARITH_FMT, res);
Denys Vlasenko18e8b612018-07-20 14:24:56 +02006466 o_addstr(output, arith_buf);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006467 break;
6468 }
6469#endif
Denys Vlasenko8a6a4612018-07-19 12:14:47 +02006470 default:
Denys Vlasenko18e8b612018-07-20 14:24:56 +02006471 /* <SPECIAL_VAR_SYMBOL>varname[ops]<SPECIAL_VAR_SYMBOL> */
Denys Vlasenko168579a2018-07-19 13:45:54 +02006472 n = expand_one_var(output, n, first_ch, arg, &p);
Denys Vlasenko18e8b612018-07-20 14:24:56 +02006473 break;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006474 } /* switch (char after <SPECIAL_VAR_SYMBOL>) */
6475
Denys Vlasenkobfc02a72010-09-09 14:38:46 +02006476 /* Restore NULL'ed SPECIAL_VAR_SYMBOL.
6477 * Do the check to avoid writing to a const string. */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006478 if (*p != SPECIAL_VAR_SYMBOL)
6479 *p = SPECIAL_VAR_SYMBOL;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006480 arg = ++p;
6481 } /* end of "while (SPECIAL_VAR_SYMBOL is found) ..." */
6482
6483 if (arg[0]) {
Denys Vlasenko168579a2018-07-19 13:45:54 +02006484 if (output->ended_in_ifs) {
Denys Vlasenko6e42b892011-08-01 18:16:43 +02006485 o_addchr(output, '\0');
6486 n = o_save_ptr(output, n);
6487 }
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006488 debug_print_list("expand_vars_to_list[a]", output, n);
6489 /* this part is literal, and it was already pre-quoted
6490 * if needed (much earlier), do not use o_addQstr here! */
6491 o_addstr_with_NUL(output, arg);
6492 debug_print_list("expand_vars_to_list[b]", output, n);
6493 } else if (output->length == o_get_last_ptr(output, n) /* expansion is empty */
Denys Vlasenkobfc02a72010-09-09 14:38:46 +02006494 && !(cant_be_null & 0x80) /* and all vars were not quoted. */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006495 ) {
6496 n--;
6497 /* allow to reuse list[n] later without re-growth */
6498 output->has_empty_slot = 1;
6499 } else {
6500 o_addchr(output, '\0');
6501 }
6502
6503 return n;
6504}
6505
Denys Vlasenko95d48f22010-09-08 13:58:55 +02006506static char **expand_variables(char **argv, unsigned expflags)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006507{
6508 int n;
6509 char **list;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006510 o_string output = NULL_O_STRING;
6511
Denys Vlasenko95d48f22010-09-08 13:58:55 +02006512 output.o_expflags = expflags;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006513
6514 n = 0;
Denys Vlasenkoda463fb2010-09-07 09:53:50 +02006515 while (*argv) {
Denys Vlasenko95d48f22010-09-08 13:58:55 +02006516 n = expand_vars_to_list(&output, n, *argv);
Denys Vlasenkoda463fb2010-09-07 09:53:50 +02006517 argv++;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006518 }
6519 debug_print_list("expand_variables", &output, n);
6520
6521 /* output.data (malloced in one block) gets returned in "list" */
6522 list = o_finalize_list(&output, n);
6523 debug_print_strings("expand_variables[1]", list);
6524 return list;
6525}
6526
6527static char **expand_strvec_to_strvec(char **argv)
6528{
Denys Vlasenko5b686cb2010-09-08 13:44:34 +02006529 return expand_variables(argv, EXP_FLAG_GLOB | EXP_FLAG_ESC_GLOB_CHARS);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006530}
6531
Denys Vlasenko11752d42018-04-03 08:20:58 +02006532#if defined(CMD_SINGLEWORD_NOGLOB)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006533static char **expand_strvec_to_strvec_singleword_noglob(char **argv)
6534{
Denys Vlasenko5b686cb2010-09-08 13:44:34 +02006535 return expand_variables(argv, EXP_FLAG_SINGLEWORD);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006536}
6537#endif
6538
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02006539/* Used for expansion of right hand of assignments,
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02006540 * $((...)), heredocs, variable expansion parts.
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02006541 *
6542 * NB: should NOT do globbing!
6543 * "export v=/bin/c*; env | grep ^v=" outputs "v=/bin/c*"
6544 */
Denys Vlasenko34179952018-04-11 13:47:59 +02006545static char *expand_string_to_string(const char *str, int EXP_flags, int do_unbackslash)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006546{
Denys Vlasenko637982f2017-07-06 01:52:23 +02006547#if !BASH_PATTERN_SUBST && !ENABLE_HUSH_CASE
Denys Vlasenkod98e5c62010-09-10 10:44:23 +02006548 const int do_unbackslash = 1;
Denys Vlasenko34179952018-04-11 13:47:59 +02006549 const int EXP_flags = EXP_FLAG_ESC_GLOB_CHARS;
Denys Vlasenkod98e5c62010-09-10 10:44:23 +02006550#endif
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006551 char *argv[2], **list;
6552
Denys Vlasenkoebee4102010-09-10 10:17:53 +02006553 debug_printf_expand("string_to_string<='%s'\n", str);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006554 /* This is generally an optimization, but it also
6555 * handles "", which otherwise trips over !list[0] check below.
6556 * (is this ever happens that we actually get str="" here?)
6557 */
6558 if (!strchr(str, SPECIAL_VAR_SYMBOL) && !strchr(str, '\\')) {
6559 //TODO: Can use on strings with \ too, just unbackslash() them?
Denys Vlasenkoebee4102010-09-10 10:17:53 +02006560 debug_printf_expand("string_to_string(fast)=>'%s'\n", str);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006561 return xstrdup(str);
6562 }
6563
6564 argv[0] = (char*)str;
6565 argv[1] = NULL;
Denys Vlasenko34179952018-04-11 13:47:59 +02006566 list = expand_variables(argv, EXP_flags | EXP_FLAG_SINGLEWORD);
Denys Vlasenko2e711012018-07-18 16:02:25 +02006567 if (!list[0]) {
6568 /* Example where it happens:
6569 * x=; echo ${x:-"$@"}
6570 */
6571 ((char*)list)[0] = '\0';
6572 } else {
6573 if (HUSH_DEBUG)
6574 if (list[1])
6575 bb_error_msg_and_die("BUG in varexp2");
6576 /* actually, just move string 2*sizeof(char*) bytes back */
6577 overlapping_strcpy((char*)list, list[0]);
6578 if (do_unbackslash)
6579 unbackslash((char*)list);
6580 }
Denys Vlasenkoebee4102010-09-10 10:17:53 +02006581 debug_printf_expand("string_to_string=>'%s'\n", (char*)list);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006582 return (char*)list;
6583}
6584
Denys Vlasenkoabf75562018-04-02 17:25:18 +02006585#if 0
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006586static char* expand_strvec_to_string(char **argv)
6587{
6588 char **list;
6589
Denys Vlasenko5b686cb2010-09-08 13:44:34 +02006590 list = expand_variables(argv, EXP_FLAG_SINGLEWORD);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006591 /* Convert all NULs to spaces */
6592 if (list[0]) {
6593 int n = 1;
6594 while (list[n]) {
6595 if (HUSH_DEBUG)
6596 if (list[n-1] + strlen(list[n-1]) + 1 != list[n])
6597 bb_error_msg_and_die("BUG in varexp3");
6598 /* bash uses ' ' regardless of $IFS contents */
6599 list[n][-1] = ' ';
6600 n++;
6601 }
6602 }
Denys Vlasenko78c9c732016-09-29 01:44:17 +02006603 overlapping_strcpy((char*)list, list[0] ? list[0] : "");
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006604 debug_printf_expand("strvec_to_string='%s'\n", (char*)list);
6605 return (char*)list;
6606}
Denys Vlasenko1f191122018-01-11 13:17:30 +01006607#endif
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006608
6609static char **expand_assignments(char **argv, int count)
6610{
6611 int i;
6612 char **p;
6613
6614 G.expanded_assignments = p = NULL;
6615 /* Expand assignments into one string each */
6616 for (i = 0; i < count; i++) {
Denys Vlasenko34179952018-04-11 13:47:59 +02006617 p = add_string_to_strings(p,
6618 expand_string_to_string(argv[i],
6619 EXP_FLAG_ESC_GLOB_CHARS,
6620 /*unbackslash:*/ 1
6621 )
6622 );
6623 G.expanded_assignments = p;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006624 }
6625 G.expanded_assignments = NULL;
6626 return p;
6627}
6628
6629
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02006630static void switch_off_special_sigs(unsigned mask)
6631{
6632 unsigned sig = 0;
6633 while ((mask >>= 1) != 0) {
6634 sig++;
6635 if (!(mask & 1))
6636 continue;
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006637#if ENABLE_HUSH_TRAP
6638 if (G_traps) {
6639 if (G_traps[sig] && !G_traps[sig][0])
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02006640 /* trap is '', has to remain SIG_IGN */
6641 continue;
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006642 free(G_traps[sig]);
6643 G_traps[sig] = NULL;
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02006644 }
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006645#endif
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02006646 /* We are here only if no trap or trap was not '' */
Denys Vlasenko0806e402011-05-12 23:06:20 +02006647 install_sighandler(sig, SIG_DFL);
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02006648 }
6649}
6650
Denys Vlasenkob347df92011-08-09 22:49:15 +02006651#if BB_MMU
6652/* never called */
6653void re_execute_shell(char ***to_free, const char *s,
6654 char *g_argv0, char **g_argv,
6655 char **builtin_argv) NORETURN;
6656
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006657static void reset_traps_to_defaults(void)
6658{
6659 /* This function is always called in a child shell
6660 * after fork (not vfork, NOMMU doesn't use this function).
6661 */
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006662 IF_HUSH_TRAP(unsigned sig;)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006663 unsigned mask;
6664
6665 /* Child shells are not interactive.
6666 * SIGTTIN/SIGTTOU/SIGTSTP should not have special handling.
6667 * Testcase: (while :; do :; done) + ^Z should background.
6668 * Same goes for SIGTERM, SIGHUP, SIGINT.
6669 */
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02006670 mask = (G.special_sig_mask & SPECIAL_INTERACTIVE_SIGS) | G_fatal_sig_mask;
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006671 if (!G_traps && !mask)
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02006672 return; /* already no traps and no special sigs */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006673
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02006674 /* Switch off special sigs */
6675 switch_off_special_sigs(mask);
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006676# if ENABLE_HUSH_JOB
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02006677 G_fatal_sig_mask = 0;
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006678# endif
Denys Vlasenko10c01312011-05-11 11:49:21 +02006679 G.special_sig_mask &= ~SPECIAL_INTERACTIVE_SIGS;
Denys Vlasenkof58f7052011-05-12 02:10:33 +02006680 /* SIGQUIT,SIGCHLD and maybe SPECIAL_JOBSTOP_SIGS
6681 * remain set in G.special_sig_mask */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006682
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006683# if ENABLE_HUSH_TRAP
6684 if (!G_traps)
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02006685 return;
6686
6687 /* Reset all sigs to default except ones with empty traps */
6688 for (sig = 0; sig < NSIG; sig++) {
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006689 if (!G_traps[sig])
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02006690 continue; /* no trap: nothing to do */
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006691 if (!G_traps[sig][0])
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02006692 continue; /* empty trap: has to remain SIG_IGN */
6693 /* sig has non-empty trap, reset it: */
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006694 free(G_traps[sig]);
6695 G_traps[sig] = NULL;
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02006696 /* There is no signal for trap 0 (EXIT) */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006697 if (sig == 0)
6698 continue;
Denys Vlasenko0806e402011-05-12 23:06:20 +02006699 install_sighandler(sig, pick_sighandler(sig));
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006700 }
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006701# endif
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006702}
6703
6704#else /* !BB_MMU */
6705
6706static void re_execute_shell(char ***to_free, const char *s,
6707 char *g_argv0, char **g_argv,
6708 char **builtin_argv) NORETURN;
6709static void re_execute_shell(char ***to_free, const char *s,
6710 char *g_argv0, char **g_argv,
6711 char **builtin_argv)
6712{
6713# define NOMMU_HACK_FMT ("-$%x:%x:%x:%x:%x:%llx" IF_HUSH_LOOPS(":%x"))
6714 /* delims + 2 * (number of bytes in printed hex numbers) */
6715 char param_buf[sizeof(NOMMU_HACK_FMT) + 2 * (sizeof(int)*6 + sizeof(long long)*1)];
6716 char *heredoc_argv[4];
6717 struct variable *cur;
6718# if ENABLE_HUSH_FUNCTIONS
6719 struct function *funcp;
6720# endif
6721 char **argv, **pp;
6722 unsigned cnt;
6723 unsigned long long empty_trap_mask;
6724
6725 if (!g_argv0) { /* heredoc */
6726 argv = heredoc_argv;
6727 argv[0] = (char *) G.argv0_for_re_execing;
6728 argv[1] = (char *) "-<";
6729 argv[2] = (char *) s;
6730 argv[3] = NULL;
6731 pp = &argv[3]; /* used as pointer to empty environment */
6732 goto do_exec;
6733 }
6734
6735 cnt = 0;
6736 pp = builtin_argv;
6737 if (pp) while (*pp++)
6738 cnt++;
6739
6740 empty_trap_mask = 0;
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006741 if (G_traps) {
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006742 int sig;
6743 for (sig = 1; sig < NSIG; sig++) {
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006744 if (G_traps[sig] && !G_traps[sig][0])
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006745 empty_trap_mask |= 1LL << sig;
6746 }
6747 }
6748
6749 sprintf(param_buf, NOMMU_HACK_FMT
6750 , (unsigned) G.root_pid
6751 , (unsigned) G.root_ppid
6752 , (unsigned) G.last_bg_pid
6753 , (unsigned) G.last_exitcode
6754 , cnt
6755 , empty_trap_mask
6756 IF_HUSH_LOOPS(, G.depth_of_loop)
6757 );
6758# undef NOMMU_HACK_FMT
6759 /* 1:hush 2:-$<pid>:<pid>:<exitcode>:<etc...> <vars...> <funcs...>
6760 * 3:-c 4:<cmd> 5:<arg0> <argN...> 6:NULL
6761 */
6762 cnt += 6;
6763 for (cur = G.top_var; cur; cur = cur->next) {
6764 if (!cur->flg_export || cur->flg_read_only)
6765 cnt += 2;
6766 }
6767# if ENABLE_HUSH_FUNCTIONS
6768 for (funcp = G.top_func; funcp; funcp = funcp->next)
6769 cnt += 3;
6770# endif
6771 pp = g_argv;
6772 while (*pp++)
6773 cnt++;
6774 *to_free = argv = pp = xzalloc(sizeof(argv[0]) * cnt);
6775 *pp++ = (char *) G.argv0_for_re_execing;
6776 *pp++ = param_buf;
6777 for (cur = G.top_var; cur; cur = cur->next) {
6778 if (strcmp(cur->varstr, hush_version_str) == 0)
6779 continue;
6780 if (cur->flg_read_only) {
6781 *pp++ = (char *) "-R";
6782 *pp++ = cur->varstr;
6783 } else if (!cur->flg_export) {
6784 *pp++ = (char *) "-V";
6785 *pp++ = cur->varstr;
6786 }
6787 }
6788# if ENABLE_HUSH_FUNCTIONS
6789 for (funcp = G.top_func; funcp; funcp = funcp->next) {
6790 *pp++ = (char *) "-F";
6791 *pp++ = funcp->name;
6792 *pp++ = funcp->body_as_string;
6793 }
6794# endif
6795 /* We can pass activated traps here. Say, -Tnn:trap_string
6796 *
6797 * However, POSIX says that subshells reset signals with traps
6798 * to SIG_DFL.
6799 * I tested bash-3.2 and it not only does that with true subshells
6800 * of the form ( list ), but with any forked children shells.
6801 * I set trap "echo W" WINCH; and then tried:
6802 *
6803 * { echo 1; sleep 20; echo 2; } &
6804 * while true; do echo 1; sleep 20; echo 2; break; done &
6805 * true | { echo 1; sleep 20; echo 2; } | cat
6806 *
6807 * In all these cases sending SIGWINCH to the child shell
6808 * did not run the trap. If I add trap "echo V" WINCH;
6809 * _inside_ group (just before echo 1), it works.
6810 *
6811 * I conclude it means we don't need to pass active traps here.
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006812 */
6813 *pp++ = (char *) "-c";
6814 *pp++ = (char *) s;
6815 if (builtin_argv) {
6816 while (*++builtin_argv)
6817 *pp++ = *builtin_argv;
6818 *pp++ = (char *) "";
6819 }
6820 *pp++ = g_argv0;
6821 while (*g_argv)
6822 *pp++ = *g_argv++;
6823 /* *pp = NULL; - is already there */
6824 pp = environ;
6825
6826 do_exec:
6827 debug_printf_exec("re_execute_shell pid:%d cmd:'%s'\n", getpid(), s);
Denys Vlasenko75e77de2011-05-12 13:12:47 +02006828 /* Don't propagate SIG_IGN to the child */
6829 if (SPECIAL_JOBSTOP_SIGS != 0)
6830 switch_off_special_sigs(G.special_sig_mask & SPECIAL_JOBSTOP_SIGS);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006831 execve(bb_busybox_exec_path, argv, pp);
6832 /* Fallback. Useful for init=/bin/hush usage etc */
6833 if (argv[0][0] == '/')
6834 execve(argv[0], argv, pp);
6835 xfunc_error_retval = 127;
6836 bb_error_msg_and_die("can't re-execute the shell");
6837}
6838#endif /* !BB_MMU */
6839
6840
6841static int run_and_free_list(struct pipe *pi);
6842
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00006843/* Executing from string: eval, sh -c '...'
Denis Vlasenkob6e65562009-04-03 16:49:04 +00006844 * or from file: /etc/profile, . file, sh <script>, sh (intereactive)
6845 * end_trigger controls how often we stop parsing
6846 * NUL: parse all, execute, return
6847 * ';': parse till ';' or newline, execute, repeat till EOF
6848 */
6849static void parse_and_run_stream(struct in_str *inp, int end_trigger)
Eric Andersen25f27032001-04-26 23:22:31 +00006850{
Denys Vlasenko00243b02009-11-16 02:00:03 +01006851 /* Why we need empty flag?
6852 * An obscure corner case "false; ``; echo $?":
6853 * empty command in `` should still set $? to 0.
6854 * But we can't just set $? to 0 at the start,
6855 * this breaks "false; echo `echo $?`" case.
6856 */
6857 bool empty = 1;
Denis Vlasenkob6e65562009-04-03 16:49:04 +00006858 while (1) {
6859 struct pipe *pipe_list;
Denis Vlasenkof8d01d32008-06-14 17:13:20 +00006860
Denys Vlasenkoa1463192011-01-18 17:55:04 +01006861#if ENABLE_HUSH_INTERACTIVE
Denys Vlasenko8d6eab32018-04-07 17:01:31 +02006862 if (end_trigger == ';') {
6863 G.promptmode = 0; /* PS1 */
6864 debug_printf_prompt("%s promptmode=%d\n", __func__, G.promptmode);
6865 }
Denys Vlasenkoa1463192011-01-18 17:55:04 +01006866#endif
Denis Vlasenko9aa7d6f2009-04-04 22:47:50 +00006867 pipe_list = parse_stream(NULL, inp, end_trigger);
Denys Vlasenkocecbc982011-03-30 18:54:52 +02006868 if (!pipe_list || pipe_list == ERR_PTR) { /* EOF/error */
6869 /* If we are in "big" script
6870 * (not in `cmd` or something similar)...
6871 */
6872 if (pipe_list == ERR_PTR && end_trigger == ';') {
6873 /* Discard cached input (rest of line) */
6874 int ch = inp->last_char;
6875 while (ch != EOF && ch != '\n') {
6876 //bb_error_msg("Discarded:'%c'", ch);
6877 ch = i_getch(inp);
6878 }
6879 /* Force prompt */
6880 inp->p = NULL;
6881 /* This stream isn't empty */
6882 empty = 0;
6883 continue;
6884 }
6885 if (!pipe_list && empty)
Denys Vlasenko00243b02009-11-16 02:00:03 +01006886 G.last_exitcode = 0;
Denis Vlasenkob6e65562009-04-03 16:49:04 +00006887 break;
Denys Vlasenko00243b02009-11-16 02:00:03 +01006888 }
Denis Vlasenkob6e65562009-04-03 16:49:04 +00006889 debug_print_tree(pipe_list, 0);
6890 debug_printf_exec("parse_and_run_stream: run_and_free_list\n");
6891 run_and_free_list(pipe_list);
Denys Vlasenko00243b02009-11-16 02:00:03 +01006892 empty = 0;
Denys Vlasenko04b46bc2016-10-01 22:28:03 +02006893 if (G_flag_return_in_progress == 1)
Denys Vlasenko68d5cb52011-03-24 02:50:03 +01006894 break;
Denis Vlasenkob6e65562009-04-03 16:49:04 +00006895 }
Eric Andersen25f27032001-04-26 23:22:31 +00006896}
6897
Denis Vlasenkob6e65562009-04-03 16:49:04 +00006898static void parse_and_run_string(const char *s)
Eric Andersen25f27032001-04-26 23:22:31 +00006899{
6900 struct in_str input;
Denys Vlasenkoaa617ac2018-02-13 15:30:13 +01006901 //IF_HUSH_LINENO_VAR(unsigned sv = G.lineno;)
6902
Eric Andersen25f27032001-04-26 23:22:31 +00006903 setup_string_in_str(&input, s);
Denis Vlasenkob6e65562009-04-03 16:49:04 +00006904 parse_and_run_stream(&input, '\0');
Denys Vlasenkoaa617ac2018-02-13 15:30:13 +01006905 //IF_HUSH_LINENO_VAR(G.lineno = sv;)
Eric Andersen25f27032001-04-26 23:22:31 +00006906}
6907
Denis Vlasenkob6e65562009-04-03 16:49:04 +00006908static void parse_and_run_file(FILE *f)
Eric Andersen25f27032001-04-26 23:22:31 +00006909{
Eric Andersen25f27032001-04-26 23:22:31 +00006910 struct in_str input;
Denys Vlasenkoaa617ac2018-02-13 15:30:13 +01006911 IF_HUSH_LINENO_VAR(unsigned sv = G.lineno;)
Denys Vlasenko6aad1dd2018-01-19 15:37:04 +01006912
Denys Vlasenkoaa617ac2018-02-13 15:30:13 +01006913 IF_HUSH_LINENO_VAR(G.lineno = 1;)
Denys Vlasenkob8d076b2018-01-19 16:00:57 +01006914 setup_file_in_str(&input, f);
Denis Vlasenkob6e65562009-04-03 16:49:04 +00006915 parse_and_run_stream(&input, ';');
Denys Vlasenkoaa617ac2018-02-13 15:30:13 +01006916 IF_HUSH_LINENO_VAR(G.lineno = sv;)
Eric Andersen25f27032001-04-26 23:22:31 +00006917}
6918
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006919#if ENABLE_HUSH_TICK
6920static FILE *generate_stream_from_string(const char *s, pid_t *pid_p)
6921{
6922 pid_t pid;
6923 int channel[2];
6924# if !BB_MMU
6925 char **to_free = NULL;
6926# endif
6927
6928 xpipe(channel);
6929 pid = BB_MMU ? xfork() : xvfork();
6930 if (pid == 0) { /* child */
6931 disable_restore_tty_pgrp_on_exit();
6932 /* Process substitution is not considered to be usual
6933 * 'command execution'.
6934 * SUSv3 says ctrl-Z should be ignored, ctrl-C should not.
6935 */
6936 bb_signals(0
6937 + (1 << SIGTSTP)
6938 + (1 << SIGTTIN)
6939 + (1 << SIGTTOU)
6940 , SIG_IGN);
6941 CLEAR_RANDOM_T(&G.random_gen); /* or else $RANDOM repeats in child */
6942 close(channel[0]); /* NB: close _first_, then move fd! */
6943 xmove_fd(channel[1], 1);
6944 /* Prevent it from trying to handle ctrl-z etc */
6945 IF_HUSH_JOB(G.run_list_level = 1;)
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006946# if ENABLE_HUSH_TRAP
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006947 /* Awful hack for `trap` or $(trap).
6948 *
6949 * http://www.opengroup.org/onlinepubs/009695399/utilities/trap.html
6950 * contains an example where "trap" is executed in a subshell:
6951 *
6952 * save_traps=$(trap)
6953 * ...
6954 * eval "$save_traps"
6955 *
6956 * Standard does not say that "trap" in subshell shall print
6957 * parent shell's traps. It only says that its output
6958 * must have suitable form, but then, in the above example
6959 * (which is not supposed to be normative), it implies that.
6960 *
6961 * bash (and probably other shell) does implement it
6962 * (traps are reset to defaults, but "trap" still shows them),
6963 * but as a result, "trap" logic is hopelessly messed up:
6964 *
6965 * # trap
6966 * trap -- 'echo Ho' SIGWINCH <--- we have a handler
6967 * # (trap) <--- trap is in subshell - no output (correct, traps are reset)
6968 * # true | trap <--- trap is in subshell - no output (ditto)
6969 * # echo `true | trap` <--- in subshell - output (but traps are reset!)
6970 * trap -- 'echo Ho' SIGWINCH
6971 * # echo `(trap)` <--- in subshell in subshell - output
6972 * trap -- 'echo Ho' SIGWINCH
6973 * # echo `true | (trap)` <--- in subshell in subshell in subshell - output!
6974 * trap -- 'echo Ho' SIGWINCH
6975 *
6976 * The rules when to forget and when to not forget traps
6977 * get really complex and nonsensical.
6978 *
6979 * Our solution: ONLY bare $(trap) or `trap` is special.
6980 */
6981 s = skip_whitespace(s);
Denys Vlasenko8dff01d2015-03-12 17:48:34 +01006982 if (is_prefixed_with(s, "trap")
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006983 && skip_whitespace(s + 4)[0] == '\0'
6984 ) {
6985 static const char *const argv[] = { NULL, NULL };
6986 builtin_trap((char**)argv);
Denys Vlasenkoe9abe752016-08-19 20:15:26 +02006987 fflush_all(); /* important */
6988 _exit(0);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006989 }
Denys Vlasenko7a85c602017-01-08 17:40:18 +01006990# endif
Denys Vlasenkob36abf22010-09-05 14:50:59 +02006991# if BB_MMU
6992 reset_traps_to_defaults();
6993 parse_and_run_string(s);
6994 _exit(G.last_exitcode);
6995# else
6996 /* We re-execute after vfork on NOMMU. This makes this script safe:
6997 * yes "0123456789012345678901234567890" | dd bs=32 count=64k >BIG
6998 * huge=`cat BIG` # was blocking here forever
6999 * echo OK
7000 */
7001 re_execute_shell(&to_free,
7002 s,
7003 G.global_argv[0],
7004 G.global_argv + 1,
7005 NULL);
7006# endif
7007 }
7008
7009 /* parent */
7010 *pid_p = pid;
7011# if ENABLE_HUSH_FAST
7012 G.count_SIGCHLD++;
7013//bb_error_msg("[%d] fork in generate_stream_from_string:"
7014// " G.count_SIGCHLD:%d G.handled_SIGCHLD:%d",
7015// getpid(), G.count_SIGCHLD, G.handled_SIGCHLD);
7016# endif
7017 enable_restore_tty_pgrp_on_exit();
7018# if !BB_MMU
7019 free(to_free);
7020# endif
7021 close(channel[1]);
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +02007022 return remember_FILE(xfdopen_for_read(channel[0]));
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007023}
7024
7025/* Return code is exit status of the process that is run. */
7026static int process_command_subs(o_string *dest, const char *s)
7027{
7028 FILE *fp;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007029 pid_t pid;
7030 int status, ch, eol_cnt;
7031
7032 fp = generate_stream_from_string(s, &pid);
7033
7034 /* Now send results of command back into original context */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007035 eol_cnt = 0;
Denys Vlasenkoaa617ac2018-02-13 15:30:13 +01007036 while ((ch = getc(fp)) != EOF) {
7037 if (ch == '\0')
7038 continue;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007039 if (ch == '\n') {
7040 eol_cnt++;
7041 continue;
7042 }
7043 while (eol_cnt) {
7044 o_addchr(dest, '\n');
7045 eol_cnt--;
7046 }
7047 o_addQchr(dest, ch);
7048 }
7049
7050 debug_printf("done reading from `cmd` pipe, closing it\n");
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +02007051 fclose_and_forget(fp);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007052 /* We need to extract exitcode. Test case
7053 * "true; echo `sleep 1; false` $?"
7054 * should print 1 */
7055 safe_waitpid(pid, &status, 0);
7056 debug_printf("child exited. returning its exitcode:%d\n", WEXITSTATUS(status));
7057 return WEXITSTATUS(status);
7058}
7059#endif /* ENABLE_HUSH_TICK */
7060
7061
7062static void setup_heredoc(struct redir_struct *redir)
7063{
7064 struct fd_pair pair;
7065 pid_t pid;
7066 int len, written;
7067 /* the _body_ of heredoc (misleading field name) */
7068 const char *heredoc = redir->rd_filename;
7069 char *expanded;
7070#if !BB_MMU
7071 char **to_free;
7072#endif
7073
7074 expanded = NULL;
7075 if (!(redir->rd_dup & HEREDOC_QUOTED)) {
Denys Vlasenkob762c782018-07-17 14:21:38 +02007076 expanded = encode_then_expand_string(heredoc);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007077 if (expanded)
7078 heredoc = expanded;
7079 }
7080 len = strlen(heredoc);
7081
7082 close(redir->rd_fd); /* often saves dup2+close in xmove_fd */
7083 xpiped_pair(pair);
7084 xmove_fd(pair.rd, redir->rd_fd);
7085
7086 /* Try writing without forking. Newer kernels have
7087 * dynamically growing pipes. Must use non-blocking write! */
7088 ndelay_on(pair.wr);
7089 while (1) {
7090 written = write(pair.wr, heredoc, len);
7091 if (written <= 0)
7092 break;
7093 len -= written;
7094 if (len == 0) {
7095 close(pair.wr);
7096 free(expanded);
7097 return;
7098 }
7099 heredoc += written;
7100 }
7101 ndelay_off(pair.wr);
7102
7103 /* Okay, pipe buffer was not big enough */
7104 /* Note: we must not create a stray child (bastard? :)
7105 * for the unsuspecting parent process. Child creates a grandchild
7106 * and exits before parent execs the process which consumes heredoc
7107 * (that exec happens after we return from this function) */
7108#if !BB_MMU
7109 to_free = NULL;
7110#endif
7111 pid = xvfork();
7112 if (pid == 0) {
7113 /* child */
7114 disable_restore_tty_pgrp_on_exit();
7115 pid = BB_MMU ? xfork() : xvfork();
7116 if (pid != 0)
7117 _exit(0);
7118 /* grandchild */
7119 close(redir->rd_fd); /* read side of the pipe */
7120#if BB_MMU
7121 full_write(pair.wr, heredoc, len); /* may loop or block */
7122 _exit(0);
7123#else
7124 /* Delegate blocking writes to another process */
7125 xmove_fd(pair.wr, STDOUT_FILENO);
7126 re_execute_shell(&to_free, heredoc, NULL, NULL, NULL);
7127#endif
7128 }
7129 /* parent */
7130#if ENABLE_HUSH_FAST
7131 G.count_SIGCHLD++;
7132//bb_error_msg("[%d] fork in setup_heredoc: G.count_SIGCHLD:%d G.handled_SIGCHLD:%d", getpid(), G.count_SIGCHLD, G.handled_SIGCHLD);
7133#endif
7134 enable_restore_tty_pgrp_on_exit();
7135#if !BB_MMU
7136 free(to_free);
7137#endif
7138 close(pair.wr);
7139 free(expanded);
7140 wait(NULL); /* wait till child has died */
7141}
7142
Denys Vlasenko2db74612017-07-07 22:07:28 +02007143struct squirrel {
7144 int orig_fd;
7145 int moved_to;
7146 /* moved_to = n: fd was moved to n; restore back to orig_fd after redir */
7147 /* moved_to = -1: fd was opened by redirect; close orig_fd after redir */
7148};
7149
Denys Vlasenko621fc502017-07-24 12:42:17 +02007150static struct squirrel *append_squirrel(struct squirrel *sq, int i, int orig, int moved)
7151{
7152 sq = xrealloc(sq, (i + 2) * sizeof(sq[0]));
7153 sq[i].orig_fd = orig;
7154 sq[i].moved_to = moved;
7155 sq[i+1].orig_fd = -1; /* end marker */
7156 return sq;
7157}
7158
Denys Vlasenko2db74612017-07-07 22:07:28 +02007159static struct squirrel *add_squirrel(struct squirrel *sq, int fd, int avoid_fd)
7160{
Denys Vlasenko621fc502017-07-24 12:42:17 +02007161 int moved_to;
Denys Vlasenko32fdf2f2017-07-31 04:32:06 +02007162 int i;
Denys Vlasenko2db74612017-07-07 22:07:28 +02007163
Denys Vlasenkod16e6122017-08-11 15:41:39 +02007164 i = 0;
7165 if (sq) for (; sq[i].orig_fd >= 0; i++) {
Denys Vlasenko2db74612017-07-07 22:07:28 +02007166 /* If we collide with an already moved fd... */
7167 if (fd == sq[i].moved_to) {
Denys Vlasenko9acd63c2018-03-28 18:35:07 +02007168 sq[i].moved_to = dup_CLOEXEC(sq[i].moved_to, avoid_fd);
Denys Vlasenko2db74612017-07-07 22:07:28 +02007169 debug_printf_redir("redirect_fd %d: already busy, moving to %d\n", fd, sq[i].moved_to);
7170 if (sq[i].moved_to < 0) /* what? */
7171 xfunc_die();
7172 return sq;
7173 }
7174 if (fd == sq[i].orig_fd) {
7175 /* Example: echo Hello >/dev/null 1>&2 */
7176 debug_printf_redir("redirect_fd %d: already moved\n", fd);
7177 return sq;
7178 }
Denys Vlasenko2db74612017-07-07 22:07:28 +02007179 }
7180
Denys Vlasenko2db74612017-07-07 22:07:28 +02007181 /* If this fd is open, we move and remember it; if it's closed, moved_to = -1 */
Denys Vlasenko9acd63c2018-03-28 18:35:07 +02007182 moved_to = dup_CLOEXEC(fd, avoid_fd);
Denys Vlasenko621fc502017-07-24 12:42:17 +02007183 debug_printf_redir("redirect_fd %d: previous fd is moved to %d (-1 if it was closed)\n", fd, moved_to);
7184 if (moved_to < 0 && errno != EBADF)
Denys Vlasenko2db74612017-07-07 22:07:28 +02007185 xfunc_die();
Denys Vlasenko621fc502017-07-24 12:42:17 +02007186 return append_squirrel(sq, i, fd, moved_to);
Denys Vlasenko2db74612017-07-07 22:07:28 +02007187}
7188
Denys Vlasenko657e9002017-07-30 23:34:04 +02007189static struct squirrel *add_squirrel_closed(struct squirrel *sq, int fd)
7190{
7191 int i;
7192
Denys Vlasenkod16e6122017-08-11 15:41:39 +02007193 i = 0;
7194 if (sq) for (; sq[i].orig_fd >= 0; i++) {
Denys Vlasenko657e9002017-07-30 23:34:04 +02007195 /* If we collide with an already moved fd... */
7196 if (fd == sq[i].orig_fd) {
7197 /* Examples:
7198 * "echo 3>FILE 3>&- 3>FILE"
7199 * "echo 3>&- 3>FILE"
7200 * No need for last redirect to insert
7201 * another "need to close 3" indicator.
7202 */
7203 debug_printf_redir("redirect_fd %d: already moved or closed\n", fd);
7204 return sq;
7205 }
Denys Vlasenko657e9002017-07-30 23:34:04 +02007206 }
7207
7208 debug_printf_redir("redirect_fd %d: previous fd was closed\n", fd);
7209 return append_squirrel(sq, i, fd, -1);
7210}
7211
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02007212/* fd: redirect wants this fd to be used (e.g. 3>file).
7213 * Move all conflicting internally used fds,
7214 * and remember them so that we can restore them later.
7215 */
Denys Vlasenko657e9002017-07-30 23:34:04 +02007216static int save_fd_on_redirect(int fd, int avoid_fd, struct squirrel **sqp)
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02007217{
Denys Vlasenko2db74612017-07-07 22:07:28 +02007218 if (avoid_fd < 9) /* the important case here is that it can be -1 */
7219 avoid_fd = 9;
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02007220
7221#if ENABLE_HUSH_INTERACTIVE
Denys Vlasenko32fdf2f2017-07-31 04:32:06 +02007222 if (fd == G.interactive_fd) {
7223 /* Testcase: "ls -l /proc/$$/fd 255>&-" should work */
Denys Vlasenko657e9002017-07-30 23:34:04 +02007224 G.interactive_fd = xdup_CLOEXEC_and_close(G.interactive_fd, avoid_fd);
Denys Vlasenko2db74612017-07-07 22:07:28 +02007225 debug_printf_redir("redirect_fd %d: matches interactive_fd, moving it to %d\n", fd, G.interactive_fd);
7226 return 1; /* "we closed fd" */
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02007227 }
7228#endif
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02007229 /* Are we called from setup_redirects(squirrel==NULL)? Two cases:
7230 * (1) Redirect in a forked child. No need to save FILEs' fds,
7231 * we aren't going to use them anymore, ok to trash.
Denys Vlasenko2db74612017-07-07 22:07:28 +02007232 * (2) "exec 3>FILE". Bummer. We can save script FILEs' fds,
7233 * but how are we doing to restore them?
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02007234 * "fileno(fd) = new_fd" can't be done.
7235 */
Denys Vlasenko2db74612017-07-07 22:07:28 +02007236 if (!sqp)
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02007237 return 0;
7238
Denys Vlasenko2db74612017-07-07 22:07:28 +02007239 /* If this one of script's fds? */
7240 if (save_FILEs_on_redirect(fd, avoid_fd))
7241 return 1; /* yes. "we closed fd" */
7242
7243 /* Check whether it collides with any open fds (e.g. stdio), save fds as needed */
7244 *sqp = add_squirrel(*sqp, fd, avoid_fd);
7245 return 0; /* "we did not close fd" */
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02007246}
7247
Denys Vlasenko2db74612017-07-07 22:07:28 +02007248static void restore_redirects(struct squirrel *sq)
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02007249{
Denys Vlasenko2db74612017-07-07 22:07:28 +02007250 if (sq) {
Denys Vlasenko32fdf2f2017-07-31 04:32:06 +02007251 int i;
7252 for (i = 0; sq[i].orig_fd >= 0; i++) {
Denys Vlasenko2db74612017-07-07 22:07:28 +02007253 if (sq[i].moved_to >= 0) {
7254 /* We simply die on error */
7255 debug_printf_redir("restoring redirected fd from %d to %d\n", sq[i].moved_to, sq[i].orig_fd);
7256 xmove_fd(sq[i].moved_to, sq[i].orig_fd);
7257 } else {
7258 /* cmd1 9>FILE; cmd2_should_see_fd9_closed */
7259 debug_printf_redir("restoring redirected fd %d: closing it\n", sq[i].orig_fd);
7260 close(sq[i].orig_fd);
7261 }
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02007262 }
Denys Vlasenko2db74612017-07-07 22:07:28 +02007263 free(sq);
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02007264 }
7265
Denys Vlasenko2db74612017-07-07 22:07:28 +02007266 /* If moved, G.interactive_fd stays on new fd, not restoring it */
Denys Vlasenkoaa3576a2016-08-22 19:54:12 +02007267
7268 restore_redirected_FILEs();
7269}
7270
Denys Vlasenkobf1c3442017-07-31 04:54:53 +02007271#if ENABLE_FEATURE_SH_STANDALONE && BB_MMU
Denys Vlasenko5b3d2eb2017-07-31 18:02:28 +02007272static void close_saved_fds_and_FILE_fds(void)
Denys Vlasenkobf1c3442017-07-31 04:54:53 +02007273{
7274 if (G_interactive_fd)
7275 close(G_interactive_fd);
7276 close_all_FILE_list();
7277}
7278#endif
7279
Denys Vlasenko32fdf2f2017-07-31 04:32:06 +02007280static int internally_opened_fd(int fd, struct squirrel *sq)
7281{
7282 int i;
7283
7284#if ENABLE_HUSH_INTERACTIVE
7285 if (fd == G.interactive_fd)
7286 return 1;
7287#endif
7288 /* If this one of script's fds? */
7289 if (fd_in_FILEs(fd))
7290 return 1;
7291
7292 if (sq) for (i = 0; sq[i].orig_fd >= 0; i++) {
7293 if (fd == sq[i].moved_to)
7294 return 1;
7295 }
7296 return 0;
7297}
7298
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007299/* squirrel != NULL means we squirrel away copies of stdin, stdout,
7300 * and stderr if they are redirected. */
Denys Vlasenko2db74612017-07-07 22:07:28 +02007301static int setup_redirects(struct command *prog, struct squirrel **sqp)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007302{
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007303 struct redir_struct *redir;
7304
7305 for (redir = prog->redirects; redir; redir = redir->next) {
Denys Vlasenko657e9002017-07-30 23:34:04 +02007306 int newfd;
7307 int closed;
7308
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007309 if (redir->rd_type == REDIRECT_HEREDOC2) {
Denys Vlasenko869994c2016-08-20 15:16:00 +02007310 /* "rd_fd<<HERE" case */
Denys Vlasenko657e9002017-07-30 23:34:04 +02007311 save_fd_on_redirect(redir->rd_fd, /*avoid:*/ 0, sqp);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007312 /* for REDIRECT_HEREDOC2, rd_filename holds _contents_
7313 * of the heredoc */
7314 debug_printf_parse("set heredoc '%s'\n",
7315 redir->rd_filename);
7316 setup_heredoc(redir);
7317 continue;
7318 }
7319
7320 if (redir->rd_dup == REDIRFD_TO_FILE) {
Denys Vlasenko869994c2016-08-20 15:16:00 +02007321 /* "rd_fd<*>file" case (<*> is <,>,>>,<>) */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007322 char *p;
Denys Vlasenko657e9002017-07-30 23:34:04 +02007323 int mode;
7324
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007325 if (redir->rd_filename == NULL) {
Denys Vlasenkod6a37d82016-09-20 16:22:24 +02007326 /*
7327 * Examples:
7328 * "cmd >" (no filename)
7329 * "cmd > <file" (2nd redirect starts too early)
7330 */
Denys Vlasenko39701202017-08-02 19:44:05 +02007331 syntax_error("invalid redirect");
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007332 continue;
7333 }
7334 mode = redir_table[redir->rd_type].mode;
Denys Vlasenko34179952018-04-11 13:47:59 +02007335 p = expand_string_to_string(redir->rd_filename,
7336 EXP_FLAG_ESC_GLOB_CHARS, /*unbackslash:*/ 1);
Denys Vlasenko657e9002017-07-30 23:34:04 +02007337 newfd = open_or_warn(p, mode);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007338 free(p);
Denys Vlasenko657e9002017-07-30 23:34:04 +02007339 if (newfd < 0) {
Denys Vlasenko869994c2016-08-20 15:16:00 +02007340 /* Error message from open_or_warn can be lost
7341 * if stderr has been redirected, but bash
7342 * and ash both lose it as well
7343 * (though zsh doesn't!)
7344 */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007345 return 1;
7346 }
Denys Vlasenko657e9002017-07-30 23:34:04 +02007347 if (newfd == redir->rd_fd && sqp) {
Denys Vlasenko621fc502017-07-24 12:42:17 +02007348 /* open() gave us precisely the fd we wanted.
7349 * This means that this fd was not busy
7350 * (not opened to anywhere).
7351 * Remember to close it on restore:
7352 */
Denys Vlasenko657e9002017-07-30 23:34:04 +02007353 *sqp = add_squirrel_closed(*sqp, newfd);
7354 debug_printf_redir("redir to previously closed fd %d\n", newfd);
Denys Vlasenko621fc502017-07-24 12:42:17 +02007355 }
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007356 } else {
Denys Vlasenko657e9002017-07-30 23:34:04 +02007357 /* "rd_fd>&rd_dup" or "rd_fd>&-" case */
7358 newfd = redir->rd_dup;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007359 }
7360
Denys Vlasenko657e9002017-07-30 23:34:04 +02007361 if (newfd == redir->rd_fd)
7362 continue;
7363
7364 /* if "N>FILE": move newfd to redir->rd_fd */
7365 /* if "N>&M": dup newfd to redir->rd_fd */
7366 /* if "N>&-": close redir->rd_fd (newfd is REDIRFD_CLOSE) */
7367
7368 closed = save_fd_on_redirect(redir->rd_fd, /*avoid:*/ newfd, sqp);
7369 if (newfd == REDIRFD_CLOSE) {
7370 /* "N>&-" means "close me" */
7371 if (!closed) {
7372 /* ^^^ optimization: saving may already
7373 * have closed it. If not... */
7374 close(redir->rd_fd);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007375 }
Denys Vlasenko657e9002017-07-30 23:34:04 +02007376 /* Sometimes we do another close on restore, getting EBADF.
7377 * Consider "echo 3>FILE 3>&-"
7378 * first redirect remembers "need to close 3",
7379 * and second redirect closes 3! Restore code then closes 3 again.
7380 */
7381 } else {
Denys Vlasenko32fdf2f2017-07-31 04:32:06 +02007382 /* if newfd is a script fd or saved fd, simulate EBADF */
7383 if (internally_opened_fd(newfd, sqp ? *sqp : NULL)) {
7384 //errno = EBADF;
7385 //bb_perror_msg_and_die("can't duplicate file descriptor");
7386 newfd = -1; /* same effect as code above */
7387 }
Denys Vlasenko657e9002017-07-30 23:34:04 +02007388 xdup2(newfd, redir->rd_fd);
7389 if (redir->rd_dup == REDIRFD_TO_FILE)
7390 /* "rd_fd > FILE" */
7391 close(newfd);
7392 /* else: "rd_fd > rd_dup" */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007393 }
7394 }
7395 return 0;
7396}
7397
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007398static char *find_in_path(const char *arg)
7399{
7400 char *ret = NULL;
7401 const char *PATH = get_local_var_value("PATH");
7402
7403 if (!PATH)
7404 return NULL;
7405
7406 while (1) {
7407 const char *end = strchrnul(PATH, ':');
7408 int sz = end - PATH; /* must be int! */
7409
7410 free(ret);
7411 if (sz != 0) {
7412 ret = xasprintf("%.*s/%s", sz, PATH, arg);
7413 } else {
7414 /* We have xxx::yyyy in $PATH,
7415 * it means "use current dir" */
7416 ret = xstrdup(arg);
7417 }
7418 if (access(ret, F_OK) == 0)
7419 break;
7420
7421 if (*end == '\0') {
7422 free(ret);
7423 return NULL;
7424 }
7425 PATH = end + 1;
7426 }
7427
7428 return ret;
7429}
7430
Denys Vlasenkoda463fb2010-09-07 09:53:50 +02007431static const struct built_in_command *find_builtin_helper(const char *name,
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007432 const struct built_in_command *x,
7433 const struct built_in_command *end)
7434{
7435 while (x != end) {
7436 if (strcmp(name, x->b_cmd) != 0) {
7437 x++;
7438 continue;
7439 }
7440 debug_printf_exec("found builtin '%s'\n", name);
7441 return x;
7442 }
7443 return NULL;
7444}
Denys Vlasenkoda463fb2010-09-07 09:53:50 +02007445static const struct built_in_command *find_builtin1(const char *name)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007446{
7447 return find_builtin_helper(name, bltins1, &bltins1[ARRAY_SIZE(bltins1)]);
7448}
Denys Vlasenkoda463fb2010-09-07 09:53:50 +02007449static const struct built_in_command *find_builtin(const char *name)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007450{
7451 const struct built_in_command *x = find_builtin1(name);
7452 if (x)
7453 return x;
7454 return find_builtin_helper(name, bltins2, &bltins2[ARRAY_SIZE(bltins2)]);
7455}
7456
Denys Vlasenko99496dc2018-06-26 15:36:58 +02007457static void remove_nested_vars(void)
7458{
7459 struct variable *cur;
7460 struct variable **cur_pp;
7461
7462 cur_pp = &G.top_var;
7463 while ((cur = *cur_pp) != NULL) {
7464 if (cur->var_nest_level <= G.var_nest_level) {
7465 cur_pp = &cur->next;
7466 continue;
7467 }
7468 /* Unexport */
7469 if (cur->flg_export) {
7470 debug_printf_env("unexporting nested '%s'/%u\n", cur->varstr, cur->var_nest_level);
7471 bb_unsetenv(cur->varstr);
7472 }
7473 /* Remove from global list */
7474 *cur_pp = cur->next;
7475 /* Free */
7476 if (!cur->max_len) {
7477 debug_printf_env("freeing nested '%s'/%u\n", cur->varstr, cur->var_nest_level);
7478 free(cur->varstr);
7479 }
7480 free(cur);
7481 }
7482}
7483
7484static void enter_var_nest_level(void)
7485{
7486 G.var_nest_level++;
7487 debug_printf_env("var_nest_level++ %u\n", G.var_nest_level);
7488
7489 /* Try: f() { echo -n .; f; }; f
7490 * struct variable::var_nest_level is uint16_t,
7491 * thus limiting recursion to < 2^16.
7492 * In any case, with 8 Mbyte stack SEGV happens
7493 * not too long after 2^16 recursions anyway.
7494 */
7495 if (G.var_nest_level > 0xff00)
7496 bb_error_msg_and_die("fatal recursion (depth %u)", G.var_nest_level);
7497}
7498
7499static void leave_var_nest_level(void)
7500{
7501 G.var_nest_level--;
7502 debug_printf_env("var_nest_level-- %u\n", G.var_nest_level);
7503 if (HUSH_DEBUG && (int)G.var_nest_level < 0)
7504 bb_error_msg_and_die("BUG: nesting underflow");
7505
7506 remove_nested_vars();
7507}
7508
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007509#if ENABLE_HUSH_FUNCTIONS
7510static struct function **find_function_slot(const char *name)
7511{
Denys Vlasenko33f7c8f2018-03-06 17:21:57 +01007512 struct function *funcp;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007513 struct function **funcpp = &G.top_func;
Denys Vlasenko33f7c8f2018-03-06 17:21:57 +01007514
7515 while ((funcp = *funcpp) != NULL) {
7516 if (strcmp(name, funcp->name) == 0) {
7517 debug_printf_exec("found function '%s'\n", name);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007518 break;
7519 }
Denys Vlasenko33f7c8f2018-03-06 17:21:57 +01007520 funcpp = &funcp->next;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007521 }
7522 return funcpp;
7523}
7524
Denys Vlasenko33f7c8f2018-03-06 17:21:57 +01007525static ALWAYS_INLINE const struct function *find_function(const char *name)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007526{
7527 const struct function *funcp = *find_function_slot(name);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007528 return funcp;
7529}
7530
7531/* Note: takes ownership on name ptr */
7532static struct function *new_function(char *name)
7533{
7534 struct function **funcpp = find_function_slot(name);
7535 struct function *funcp = *funcpp;
7536
7537 if (funcp != NULL) {
7538 struct command *cmd = funcp->parent_cmd;
7539 debug_printf_exec("func %p parent_cmd %p\n", funcp, cmd);
7540 if (!cmd) {
7541 debug_printf_exec("freeing & replacing function '%s'\n", funcp->name);
7542 free(funcp->name);
7543 /* Note: if !funcp->body, do not free body_as_string!
7544 * This is a special case of "-F name body" function:
7545 * body_as_string was not malloced! */
7546 if (funcp->body) {
7547 free_pipe_list(funcp->body);
7548# if !BB_MMU
7549 free(funcp->body_as_string);
7550# endif
7551 }
7552 } else {
7553 debug_printf_exec("reinserting in tree & replacing function '%s'\n", funcp->name);
7554 cmd->argv[0] = funcp->name;
7555 cmd->group = funcp->body;
7556# if !BB_MMU
7557 cmd->group_as_string = funcp->body_as_string;
7558# endif
7559 }
7560 } else {
7561 debug_printf_exec("remembering new function '%s'\n", name);
7562 funcp = *funcpp = xzalloc(sizeof(*funcp));
7563 /*funcp->next = NULL;*/
7564 }
7565
7566 funcp->name = name;
7567 return funcp;
7568}
7569
Denys Vlasenko10d5ece2017-01-08 18:28:43 +01007570# if ENABLE_HUSH_UNSET
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007571static void unset_func(const char *name)
7572{
7573 struct function **funcpp = find_function_slot(name);
7574 struct function *funcp = *funcpp;
7575
7576 if (funcp != NULL) {
7577 debug_printf_exec("freeing function '%s'\n", funcp->name);
7578 *funcpp = funcp->next;
7579 /* funcp is unlinked now, deleting it.
7580 * Note: if !funcp->body, the function was created by
7581 * "-F name body", do not free ->body_as_string
7582 * and ->name as they were not malloced. */
7583 if (funcp->body) {
7584 free_pipe_list(funcp->body);
7585 free(funcp->name);
Denys Vlasenko10d5ece2017-01-08 18:28:43 +01007586# if !BB_MMU
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007587 free(funcp->body_as_string);
Denys Vlasenko10d5ece2017-01-08 18:28:43 +01007588# endif
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007589 }
7590 free(funcp);
7591 }
7592}
Denys Vlasenko10d5ece2017-01-08 18:28:43 +01007593# endif
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007594
7595# if BB_MMU
7596#define exec_function(to_free, funcp, argv) \
7597 exec_function(funcp, argv)
7598# endif
7599static void exec_function(char ***to_free,
7600 const struct function *funcp,
7601 char **argv) NORETURN;
7602static void exec_function(char ***to_free,
7603 const struct function *funcp,
7604 char **argv)
7605{
7606# if BB_MMU
Denys Vlasenkod4e4fdb2017-07-03 21:31:16 +02007607 int n;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007608
7609 argv[0] = G.global_argv[0];
7610 G.global_argv = argv;
Denys Vlasenkod4e4fdb2017-07-03 21:31:16 +02007611 G.global_argc = n = 1 + string_array_len(argv + 1);
Denys Vlasenko5b3d2eb2017-07-31 18:02:28 +02007612
7613// Example when we are here: "cmd | func"
7614// func will run with saved-redirect fds open.
7615// $ f() { echo /proc/self/fd/*; }
7616// $ true | f
7617// /proc/self/fd/0 /proc/self/fd/1 /proc/self/fd/2 /proc/self/fd/255 /proc/self/fd/3
7618// stdio^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ G_interactive_fd^ DIR fd for glob
7619// Same in script:
7620// $ . ./SCRIPT
7621// /proc/self/fd/0 /proc/self/fd/1 /proc/self/fd/2 /proc/self/fd/255 /proc/self/fd/3 /proc/self/fd/4
7622// stdio^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ G_interactive_fd^ opened ./SCRIPT DIR fd for glob
7623// They are CLOEXEC so external programs won't see them, but
7624// for "more correctness" we might want to close those extra fds here:
7625//? close_saved_fds_and_FILE_fds();
7626
Denys Vlasenko332e4112018-04-04 22:32:59 +02007627 /* "we are in a function, ok to use return" */
Denys Vlasenko5b3d2eb2017-07-31 18:02:28 +02007628 G_flag_return_in_progress = -1;
Denys Vlasenko9db344a2018-04-09 19:05:11 +02007629 enter_var_nest_level();
Denys Vlasenko5b3d2eb2017-07-31 18:02:28 +02007630 IF_HUSH_LOCAL(G.func_nest_level++;)
7631
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007632 /* On MMU, funcp->body is always non-NULL */
7633 n = run_list(funcp->body);
7634 fflush_all();
7635 _exit(n);
7636# else
Denys Vlasenko5b3d2eb2017-07-31 18:02:28 +02007637//? close_saved_fds_and_FILE_fds();
7638
7639//TODO: check whether "true | func_with_return" works
7640
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007641 re_execute_shell(to_free,
7642 funcp->body_as_string,
7643 G.global_argv[0],
7644 argv + 1,
7645 NULL);
7646# endif
7647}
7648
7649static int run_function(const struct function *funcp, char **argv)
7650{
7651 int rc;
7652 save_arg_t sv;
7653 smallint sv_flg;
7654
7655 save_and_replace_G_args(&sv, argv);
7656
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02007657 /* "We are in function, ok to use return" */
Denys Vlasenko04b46bc2016-10-01 22:28:03 +02007658 sv_flg = G_flag_return_in_progress;
7659 G_flag_return_in_progress = -1;
Denys Vlasenko332e4112018-04-04 22:32:59 +02007660
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02007661 /* Make "local" variables properly shadow previous ones */
7662 IF_HUSH_LOCAL(enter_var_nest_level();)
Denys Vlasenko5b3d2eb2017-07-31 18:02:28 +02007663 IF_HUSH_LOCAL(G.func_nest_level++;)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007664
7665 /* On MMU, funcp->body is always non-NULL */
7666# if !BB_MMU
7667 if (!funcp->body) {
7668 /* Function defined by -F */
7669 parse_and_run_string(funcp->body_as_string);
7670 rc = G.last_exitcode;
7671 } else
7672# endif
7673 {
7674 rc = run_list(funcp->body);
7675 }
7676
Denys Vlasenko332e4112018-04-04 22:32:59 +02007677 IF_HUSH_LOCAL(G.func_nest_level--;)
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02007678 IF_HUSH_LOCAL(leave_var_nest_level();)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007679
Denys Vlasenko04b46bc2016-10-01 22:28:03 +02007680 G_flag_return_in_progress = sv_flg;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007681
7682 restore_G_args(&sv, argv);
7683
7684 return rc;
7685}
7686#endif /* ENABLE_HUSH_FUNCTIONS */
7687
7688
7689#if BB_MMU
7690#define exec_builtin(to_free, x, argv) \
7691 exec_builtin(x, argv)
7692#else
7693#define exec_builtin(to_free, x, argv) \
7694 exec_builtin(to_free, argv)
7695#endif
7696static void exec_builtin(char ***to_free,
7697 const struct built_in_command *x,
7698 char **argv) NORETURN;
7699static void exec_builtin(char ***to_free,
7700 const struct built_in_command *x,
7701 char **argv)
7702{
7703#if BB_MMU
Denys Vlasenko8ee2ada2011-02-07 02:03:51 +01007704 int rcode;
7705 fflush_all();
Denys Vlasenko5b3d2eb2017-07-31 18:02:28 +02007706//? close_saved_fds_and_FILE_fds();
Denys Vlasenko8ee2ada2011-02-07 02:03:51 +01007707 rcode = x->b_function(argv);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007708 fflush_all();
7709 _exit(rcode);
7710#else
Denys Vlasenko8ee2ada2011-02-07 02:03:51 +01007711 fflush_all();
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007712 /* On NOMMU, we must never block!
7713 * Example: { sleep 99 | read line; } & echo Ok
7714 */
7715 re_execute_shell(to_free,
7716 argv[0],
7717 G.global_argv[0],
7718 G.global_argv + 1,
7719 argv);
7720#endif
7721}
7722
7723
7724static void execvp_or_die(char **argv) NORETURN;
7725static void execvp_or_die(char **argv)
7726{
Denys Vlasenko04465da2016-10-03 01:01:15 +02007727 int e;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007728 debug_printf_exec("execing '%s'\n", argv[0]);
Denys Vlasenko75e77de2011-05-12 13:12:47 +02007729 /* Don't propagate SIG_IGN to the child */
7730 if (SPECIAL_JOBSTOP_SIGS != 0)
7731 switch_off_special_sigs(G.special_sig_mask & SPECIAL_JOBSTOP_SIGS);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007732 execvp(argv[0], argv);
Denys Vlasenko04465da2016-10-03 01:01:15 +02007733 e = 2;
7734 if (errno == EACCES) e = 126;
7735 if (errno == ENOENT) e = 127;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007736 bb_perror_msg("can't execute '%s'", argv[0]);
Denys Vlasenko04465da2016-10-03 01:01:15 +02007737 _exit(e);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007738}
7739
7740#if ENABLE_HUSH_MODE_X
7741static void dump_cmd_in_x_mode(char **argv)
7742{
7743 if (G_x_mode && argv) {
7744 /* We want to output the line in one write op */
7745 char *buf, *p;
7746 int len;
7747 int n;
7748
7749 len = 3;
7750 n = 0;
7751 while (argv[n])
7752 len += strlen(argv[n++]) + 1;
7753 buf = xmalloc(len);
7754 buf[0] = '+';
7755 p = buf + 1;
7756 n = 0;
7757 while (argv[n])
7758 p += sprintf(p, " %s", argv[n++]);
7759 *p++ = '\n';
7760 *p = '\0';
7761 fputs(buf, stderr);
7762 free(buf);
7763 }
7764}
7765#else
7766# define dump_cmd_in_x_mode(argv) ((void)0)
7767#endif
7768
Denys Vlasenko57000292018-01-12 14:41:45 +01007769#if ENABLE_HUSH_COMMAND
7770static void if_command_vV_print_and_exit(char opt_vV, char *cmd, const char *explanation)
7771{
7772 char *to_free;
Denys Vlasenkoafb73a22018-01-12 16:17:59 +01007773
Denys Vlasenko57000292018-01-12 14:41:45 +01007774 if (!opt_vV)
7775 return;
7776
7777 to_free = NULL;
7778 if (!explanation) {
7779 char *path = getenv("PATH");
7780 explanation = to_free = find_executable(cmd, &path); /* path == NULL is ok */
Denys Vlasenkoafb73a22018-01-12 16:17:59 +01007781 if (!explanation)
7782 _exit(1); /* PROG was not found */
Denys Vlasenko57000292018-01-12 14:41:45 +01007783 if (opt_vV != 'V')
7784 cmd = to_free; /* -v PROG prints "/path/to/PROG" */
7785 }
Denys Vlasenkoafb73a22018-01-12 16:17:59 +01007786 printf((opt_vV == 'V') ? "%s is %s\n" : "%s\n", cmd, explanation);
Denys Vlasenko57000292018-01-12 14:41:45 +01007787 free(to_free);
7788 fflush_all();
Denys Vlasenkoafb73a22018-01-12 16:17:59 +01007789 _exit(0);
Denys Vlasenko57000292018-01-12 14:41:45 +01007790}
7791#else
7792# define if_command_vV_print_and_exit(a,b,c) ((void)0)
7793#endif
7794
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007795#if BB_MMU
7796#define pseudo_exec_argv(nommu_save, argv, assignment_cnt, argv_expanded) \
7797 pseudo_exec_argv(argv, assignment_cnt, argv_expanded)
7798#define pseudo_exec(nommu_save, command, argv_expanded) \
7799 pseudo_exec(command, argv_expanded)
7800#endif
7801
7802/* Called after [v]fork() in run_pipe, or from builtin_exec.
7803 * Never returns.
7804 * Don't exit() here. If you don't exec, use _exit instead.
7805 * The at_exit handlers apparently confuse the calling process,
Denys Vlasenko215b0ca2016-08-19 18:23:56 +02007806 * in particular stdin handling. Not sure why? -- because of vfork! (vda)
Denys Vlasenko215b0ca2016-08-19 18:23:56 +02007807 */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007808static void pseudo_exec_argv(nommu_save_t *nommu_save,
7809 char **argv, int assignment_cnt,
7810 char **argv_expanded) NORETURN;
7811static NOINLINE void pseudo_exec_argv(nommu_save_t *nommu_save,
7812 char **argv, int assignment_cnt,
7813 char **argv_expanded)
7814{
Denys Vlasenko57000292018-01-12 14:41:45 +01007815 const struct built_in_command *x;
Denys Vlasenko929a41d2018-04-05 14:09:14 +02007816 struct variable **sv_shadowed;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007817 char **new_env;
Denys Vlasenko34f6b122018-04-05 11:30:17 +02007818 IF_HUSH_COMMAND(char opt_vV = 0;)
7819 IF_HUSH_FUNCTIONS(const struct function *funcp;)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007820
7821 new_env = expand_assignments(argv, assignment_cnt);
7822 dump_cmd_in_x_mode(new_env);
7823
7824 if (!argv[assignment_cnt]) {
7825 /* Case when we are here: ... | var=val | ...
7826 * (note that we do not exit early, i.e., do not optimize out
7827 * expand_assignments(): think about ... | var=`sleep 1` | ...
7828 */
7829 free_strings(new_env);
7830 _exit(EXIT_SUCCESS);
7831 }
7832
Denys Vlasenko929a41d2018-04-05 14:09:14 +02007833 sv_shadowed = G.shadowed_vars_pp;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007834#if BB_MMU
Denys Vlasenko929a41d2018-04-05 14:09:14 +02007835 G.shadowed_vars_pp = NULL; /* "don't save, free them instead" */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007836#else
Denys Vlasenko929a41d2018-04-05 14:09:14 +02007837 G.shadowed_vars_pp = &nommu_save->old_vars;
Denys Vlasenko9db344a2018-04-09 19:05:11 +02007838 G.var_nest_level++;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007839#endif
Denys Vlasenko929a41d2018-04-05 14:09:14 +02007840 set_vars_and_save_old(new_env);
7841 G.shadowed_vars_pp = sv_shadowed;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007842
7843 if (argv_expanded) {
7844 argv = argv_expanded;
7845 } else {
7846 argv = expand_strvec_to_strvec(argv + assignment_cnt);
7847#if !BB_MMU
7848 nommu_save->argv = argv;
7849#endif
7850 }
7851 dump_cmd_in_x_mode(argv);
7852
7853#if ENABLE_FEATURE_SH_STANDALONE || BB_MMU
7854 if (strchr(argv[0], '/') != NULL)
7855 goto skip;
7856#endif
7857
Denys Vlasenko75481d32017-07-31 05:27:09 +02007858#if ENABLE_HUSH_FUNCTIONS
7859 /* Check if the command matches any functions (this goes before bltins) */
Denys Vlasenko34f6b122018-04-05 11:30:17 +02007860 funcp = find_function(argv[0]);
7861 if (funcp)
7862 exec_function(&nommu_save->argv_from_re_execing, funcp, argv);
Denys Vlasenko75481d32017-07-31 05:27:09 +02007863#endif
7864
Denys Vlasenko57000292018-01-12 14:41:45 +01007865#if ENABLE_HUSH_COMMAND
7866 /* "command BAR": run BAR without looking it up among functions
7867 * "command -v BAR": print "BAR" or "/path/to/BAR"; or exit 1
7868 * "command -V BAR": print "BAR is {a function,a shell builtin,/path/to/BAR}"
7869 */
7870 while (strcmp(argv[0], "command") == 0 && argv[1]) {
7871 char *p;
7872
7873 argv++;
7874 p = *argv;
7875 if (p[0] != '-' || !p[1])
7876 continue; /* bash allows "command command command [-OPT] BAR" */
7877
7878 for (;;) {
7879 p++;
7880 switch (*p) {
7881 case '\0':
7882 argv++;
7883 p = *argv;
7884 if (p[0] != '-' || !p[1])
7885 goto after_opts;
7886 continue; /* next arg is also -opts, process it too */
7887 case 'v':
7888 case 'V':
7889 opt_vV = *p;
7890 continue;
7891 default:
7892 bb_error_msg_and_die("%s: %s: invalid option", "command", argv[0]);
7893 }
7894 }
7895 }
7896 after_opts:
7897# if ENABLE_HUSH_FUNCTIONS
7898 if (opt_vV && find_function(argv[0]))
7899 if_command_vV_print_and_exit(opt_vV, argv[0], "a function");
7900# endif
7901#endif
7902
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007903 /* Check if the command matches any of the builtins.
7904 * Depending on context, this might be redundant. But it's
7905 * easier to waste a few CPU cycles than it is to figure out
7906 * if this is one of those cases.
7907 */
Denys Vlasenko57000292018-01-12 14:41:45 +01007908 /* Why "BB_MMU ? :" difference in logic? -
7909 * On NOMMU, it is more expensive to re-execute shell
7910 * just in order to run echo or test builtin.
7911 * It's better to skip it here and run corresponding
7912 * non-builtin later. */
7913 x = BB_MMU ? find_builtin(argv[0]) : find_builtin1(argv[0]);
7914 if (x) {
7915 if_command_vV_print_and_exit(opt_vV, argv[0], "a shell builtin");
7916 exec_builtin(&nommu_save->argv_from_re_execing, x, argv);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007917 }
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007918
7919#if ENABLE_FEATURE_SH_STANDALONE
7920 /* Check if the command matches any busybox applets */
7921 {
7922 int a = find_applet_by_name(argv[0]);
7923 if (a >= 0) {
Denys Vlasenko57000292018-01-12 14:41:45 +01007924 if_command_vV_print_and_exit(opt_vV, argv[0], "an applet");
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007925# if BB_MMU /* see above why on NOMMU it is not allowed */
7926 if (APPLET_IS_NOEXEC(a)) {
Denys Vlasenkobf1c3442017-07-31 04:54:53 +02007927 /* Do not leak open fds from opened script files etc.
7928 * Testcase: interactive "ls -l /proc/self/fd"
7929 * should not show tty fd open.
7930 */
Denys Vlasenko5b3d2eb2017-07-31 18:02:28 +02007931 close_saved_fds_and_FILE_fds();
Denys Vlasenko75481d32017-07-31 05:27:09 +02007932//FIXME: should also close saved redir fds
Denys Vlasenko9acd63c2018-03-28 18:35:07 +02007933//This casuses test failures in
7934//redir_children_should_not_see_saved_fd_2.tests
7935//redir_children_should_not_see_saved_fd_3.tests
7936//if you replace "busybox find" with just "find" in them
Denys Vlasenko7c40ddd2017-08-02 16:37:39 +02007937 /* Without this, "rm -i FILE" can't be ^C'ed: */
7938 switch_off_special_sigs(G.special_sig_mask);
Denys Vlasenkoc9c1ccc2017-08-07 18:59:35 +02007939 debug_printf_exec("running applet '%s'\n", argv[0]);
Denys Vlasenko80e8e3c2017-08-07 19:24:57 +02007940 run_noexec_applet_and_exit(a, argv[0], argv);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007941 }
7942# endif
7943 /* Re-exec ourselves */
7944 debug_printf_exec("re-execing applet '%s'\n", argv[0]);
Denys Vlasenko75e77de2011-05-12 13:12:47 +02007945 /* Don't propagate SIG_IGN to the child */
7946 if (SPECIAL_JOBSTOP_SIGS != 0)
7947 switch_off_special_sigs(G.special_sig_mask & SPECIAL_JOBSTOP_SIGS);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007948 execv(bb_busybox_exec_path, argv);
7949 /* If they called chroot or otherwise made the binary no longer
7950 * executable, fall through */
7951 }
7952 }
7953#endif
7954
7955#if ENABLE_FEATURE_SH_STANDALONE || BB_MMU
7956 skip:
7957#endif
Denys Vlasenko57000292018-01-12 14:41:45 +01007958 if_command_vV_print_and_exit(opt_vV, argv[0], NULL);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007959 execvp_or_die(argv);
7960}
7961
7962/* Called after [v]fork() in run_pipe
7963 */
7964static void pseudo_exec(nommu_save_t *nommu_save,
7965 struct command *command,
7966 char **argv_expanded) NORETURN;
7967static void pseudo_exec(nommu_save_t *nommu_save,
7968 struct command *command,
7969 char **argv_expanded)
7970{
Denys Vlasenko49015a62018-04-03 13:02:43 +02007971#if ENABLE_HUSH_FUNCTIONS
7972 if (command->cmd_type == CMD_FUNCDEF) {
7973 /* Ignore funcdefs in pipes:
7974 * true | f() { cmd }
7975 */
7976 _exit(0);
7977 }
7978#endif
7979
Denys Vlasenkob36abf22010-09-05 14:50:59 +02007980 if (command->argv) {
7981 pseudo_exec_argv(nommu_save, command->argv,
7982 command->assignment_cnt, argv_expanded);
7983 }
7984
7985 if (command->group) {
7986 /* Cases when we are here:
7987 * ( list )
7988 * { list } &
7989 * ... | ( list ) | ...
7990 * ... | { list } | ...
7991 */
7992#if BB_MMU
7993 int rcode;
7994 debug_printf_exec("pseudo_exec: run_list\n");
7995 reset_traps_to_defaults();
7996 rcode = run_list(command->group);
7997 /* OK to leak memory by not calling free_pipe_list,
7998 * since this process is about to exit */
7999 _exit(rcode);
8000#else
8001 re_execute_shell(&nommu_save->argv_from_re_execing,
8002 command->group_as_string,
8003 G.global_argv[0],
8004 G.global_argv + 1,
8005 NULL);
8006#endif
8007 }
8008
8009 /* Case when we are here: ... | >file */
8010 debug_printf_exec("pseudo_exec'ed null command\n");
8011 _exit(EXIT_SUCCESS);
8012}
8013
8014#if ENABLE_HUSH_JOB
8015static const char *get_cmdtext(struct pipe *pi)
8016{
8017 char **argv;
8018 char *p;
8019 int len;
8020
8021 /* This is subtle. ->cmdtext is created only on first backgrounding.
8022 * (Think "cat, <ctrl-z>, fg, <ctrl-z>, fg, <ctrl-z>...." here...)
8023 * On subsequent bg argv is trashed, but we won't use it */
8024 if (pi->cmdtext)
8025 return pi->cmdtext;
Denys Vlasenko1eada9a2016-11-08 17:28:45 +01008026
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008027 argv = pi->cmds[0].argv;
Denys Vlasenko1eada9a2016-11-08 17:28:45 +01008028 if (!argv) {
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008029 pi->cmdtext = xzalloc(1);
8030 return pi->cmdtext;
8031 }
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008032 len = 0;
8033 do {
8034 len += strlen(*argv) + 1;
8035 } while (*++argv);
8036 p = xmalloc(len);
8037 pi->cmdtext = p;
8038 argv = pi->cmds[0].argv;
8039 do {
Denys Vlasenko1eada9a2016-11-08 17:28:45 +01008040 p = stpcpy(p, *argv);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008041 *p++ = ' ';
8042 } while (*++argv);
8043 p[-1] = '\0';
8044 return pi->cmdtext;
8045}
8046
Denys Vlasenko2ed74e22017-07-14 19:58:46 +02008047static void remove_job_from_table(struct pipe *pi)
8048{
8049 struct pipe *prev_pipe;
8050
8051 if (pi == G.job_list) {
8052 G.job_list = pi->next;
8053 } else {
8054 prev_pipe = G.job_list;
8055 while (prev_pipe->next != pi)
8056 prev_pipe = prev_pipe->next;
8057 prev_pipe->next = pi->next;
8058 }
8059 G.last_jobid = 0;
8060 if (G.job_list)
8061 G.last_jobid = G.job_list->jobid;
8062}
8063
8064static void delete_finished_job(struct pipe *pi)
8065{
8066 remove_job_from_table(pi);
8067 free_pipe(pi);
8068}
8069
8070static void clean_up_last_dead_job(void)
8071{
8072 if (G.job_list && !G.job_list->alive_cmds)
8073 delete_finished_job(G.job_list);
8074}
8075
Denys Vlasenko16096292017-07-10 10:00:28 +02008076static void insert_job_into_table(struct pipe *pi)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008077{
8078 struct pipe *job, **jobp;
8079 int i;
8080
Denys Vlasenko2ed74e22017-07-14 19:58:46 +02008081 clean_up_last_dead_job();
8082
Denys Vlasenko9e55a152017-07-10 10:01:12 +02008083 /* Find the end of the list, and find next job ID to use */
8084 i = 0;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008085 jobp = &G.job_list;
Denys Vlasenko9e55a152017-07-10 10:01:12 +02008086 while ((job = *jobp) != NULL) {
8087 if (job->jobid > i)
8088 i = job->jobid;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008089 jobp = &job->next;
Denys Vlasenko9e55a152017-07-10 10:01:12 +02008090 }
8091 pi->jobid = i + 1;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008092
Denys Vlasenko9e55a152017-07-10 10:01:12 +02008093 /* Create a new job struct at the end */
8094 job = *jobp = xmemdup(pi, sizeof(*pi));
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008095 job->next = NULL;
8096 job->cmds = xzalloc(sizeof(pi->cmds[0]) * pi->num_cmds);
8097 /* Cannot copy entire pi->cmds[] vector! This causes double frees */
8098 for (i = 0; i < pi->num_cmds; i++) {
8099 job->cmds[i].pid = pi->cmds[i].pid;
8100 /* all other fields are not used and stay zero */
8101 }
8102 job->cmdtext = xstrdup(get_cmdtext(pi));
8103
8104 if (G_interactive_fd)
Denys Vlasenkod5b5c2f2017-01-08 15:46:04 +01008105 printf("[%u] %u %s\n", job->jobid, (unsigned)job->cmds[0].pid, job->cmdtext);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008106 G.last_jobid = job->jobid;
8107}
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008108#endif /* JOB */
8109
Denys Vlasenko62b717b2016-11-07 22:12:18 +01008110static int job_exited_or_stopped(struct pipe *pi)
8111{
8112 int rcode, i;
8113
8114 if (pi->alive_cmds != pi->stopped_cmds)
8115 return -1;
8116
8117 /* All processes in fg pipe have exited or stopped */
8118 rcode = 0;
8119 i = pi->num_cmds;
8120 while (--i >= 0) {
8121 rcode = pi->cmds[i].cmd_exitcode;
8122 /* usually last process gives overall exitstatus,
8123 * but with "set -o pipefail", last *failed* process does */
8124 if (G.o_opt[OPT_O_PIPEFAIL] == 0 || rcode != 0)
8125 break;
8126 }
8127 IF_HAS_KEYWORDS(if (pi->pi_inverted) rcode = !rcode;)
8128 return rcode;
8129}
8130
Denys Vlasenko7e675362016-10-28 21:57:31 +02008131static int process_wait_result(struct pipe *fg_pipe, pid_t childpid, int status)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008132{
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008133#if ENABLE_HUSH_JOB
8134 struct pipe *pi;
8135#endif
Denys Vlasenko7e675362016-10-28 21:57:31 +02008136 int i, dead;
8137
8138 dead = WIFEXITED(status) || WIFSIGNALED(status);
8139
8140#if DEBUG_JOBS
8141 if (WIFSTOPPED(status))
8142 debug_printf_jobs("pid %d stopped by sig %d (exitcode %d)\n",
8143 childpid, WSTOPSIG(status), WEXITSTATUS(status));
8144 if (WIFSIGNALED(status))
8145 debug_printf_jobs("pid %d killed by sig %d (exitcode %d)\n",
8146 childpid, WTERMSIG(status), WEXITSTATUS(status));
8147 if (WIFEXITED(status))
8148 debug_printf_jobs("pid %d exited, exitcode %d\n",
8149 childpid, WEXITSTATUS(status));
8150#endif
8151 /* Were we asked to wait for a fg pipe? */
8152 if (fg_pipe) {
8153 i = fg_pipe->num_cmds;
Denys Vlasenko62b717b2016-11-07 22:12:18 +01008154
Denys Vlasenko7e675362016-10-28 21:57:31 +02008155 while (--i >= 0) {
Denys Vlasenko62b717b2016-11-07 22:12:18 +01008156 int rcode;
8157
Denys Vlasenko7e675362016-10-28 21:57:31 +02008158 debug_printf_jobs("check pid %d\n", fg_pipe->cmds[i].pid);
8159 if (fg_pipe->cmds[i].pid != childpid)
8160 continue;
8161 if (dead) {
8162 int ex;
8163 fg_pipe->cmds[i].pid = 0;
8164 fg_pipe->alive_cmds--;
8165 ex = WEXITSTATUS(status);
8166 /* bash prints killer signal's name for *last*
8167 * process in pipe (prints just newline for SIGINT/SIGPIPE).
8168 * Mimic this. Example: "sleep 5" + (^\ or kill -QUIT)
8169 */
8170 if (WIFSIGNALED(status)) {
8171 int sig = WTERMSIG(status);
8172 if (i == fg_pipe->num_cmds-1)
8173 /* TODO: use strsignal() instead for bash compat? but that's bloat... */
8174 puts(sig == SIGINT || sig == SIGPIPE ? "" : get_signame(sig));
8175 /* TODO: if (WCOREDUMP(status)) + " (core dumped)"; */
8176 /* TODO: MIPS has 128 sigs (1..128), what if sig==128 here?
8177 * Maybe we need to use sig | 128? */
8178 ex = sig + 128;
8179 }
8180 fg_pipe->cmds[i].cmd_exitcode = ex;
8181 } else {
8182 fg_pipe->stopped_cmds++;
8183 }
8184 debug_printf_jobs("fg_pipe: alive_cmds %d stopped_cmds %d\n",
8185 fg_pipe->alive_cmds, fg_pipe->stopped_cmds);
Denys Vlasenko62b717b2016-11-07 22:12:18 +01008186 rcode = job_exited_or_stopped(fg_pipe);
8187 if (rcode >= 0) {
Denys Vlasenko7e675362016-10-28 21:57:31 +02008188/* Note: *non-interactive* bash does not continue if all processes in fg pipe
8189 * are stopped. Testcase: "cat | cat" in a script (not on command line!)
8190 * and "killall -STOP cat" */
8191 if (G_interactive_fd) {
8192#if ENABLE_HUSH_JOB
8193 if (fg_pipe->alive_cmds != 0)
Denys Vlasenko16096292017-07-10 10:00:28 +02008194 insert_job_into_table(fg_pipe);
Denys Vlasenko7e675362016-10-28 21:57:31 +02008195#endif
8196 return rcode;
8197 }
8198 if (fg_pipe->alive_cmds == 0)
8199 return rcode;
8200 }
8201 /* There are still running processes in the fg_pipe */
8202 return -1;
8203 }
Denys Vlasenko10ad6222017-04-17 16:13:32 +02008204 /* It wasn't in fg_pipe, look for process in bg pipes */
Denys Vlasenko7e675362016-10-28 21:57:31 +02008205 }
8206
8207#if ENABLE_HUSH_JOB
8208 /* We were asked to wait for bg or orphaned children */
8209 /* No need to remember exitcode in this case */
8210 for (pi = G.job_list; pi; pi = pi->next) {
8211 for (i = 0; i < pi->num_cmds; i++) {
8212 if (pi->cmds[i].pid == childpid)
8213 goto found_pi_and_prognum;
8214 }
8215 }
8216 /* Happens when shell is used as init process (init=/bin/sh) */
8217 debug_printf("checkjobs: pid %d was not in our list!\n", childpid);
8218 return -1; /* this wasn't a process from fg_pipe */
8219
8220 found_pi_and_prognum:
8221 if (dead) {
8222 /* child exited */
Denys Vlasenko840a4352017-07-07 22:56:02 +02008223 int rcode = WEXITSTATUS(status);
Denys Vlasenko7e675362016-10-28 21:57:31 +02008224 if (WIFSIGNALED(status))
Denys Vlasenko840a4352017-07-07 22:56:02 +02008225 rcode = 128 + WTERMSIG(status);
8226 pi->cmds[i].cmd_exitcode = rcode;
8227 if (G.last_bg_pid == pi->cmds[i].pid)
8228 G.last_bg_pid_exitcode = rcode;
8229 pi->cmds[i].pid = 0;
Denys Vlasenko7e675362016-10-28 21:57:31 +02008230 pi->alive_cmds--;
8231 if (!pi->alive_cmds) {
Denys Vlasenko2ed74e22017-07-14 19:58:46 +02008232 if (G_interactive_fd) {
Denys Vlasenko7e675362016-10-28 21:57:31 +02008233 printf(JOB_STATUS_FORMAT, pi->jobid,
8234 "Done", pi->cmdtext);
Denys Vlasenko2ed74e22017-07-14 19:58:46 +02008235 delete_finished_job(pi);
8236 } else {
8237/*
8238 * bash deletes finished jobs from job table only in interactive mode,
8239 * after "jobs" cmd, or if pid of a new process matches one of the old ones
8240 * (see cleanup_dead_jobs(), delete_old_job(), J_NOTIFIED in bash source).
8241 * Testcase script: "(exit 3) & sleep 1; wait %1; echo $?" prints 3 in bash.
8242 * We only retain one "dead" job, if it's the single job on the list.
8243 * This covers most of real-world scenarios where this is useful.
8244 */
8245 if (pi != G.job_list)
8246 delete_finished_job(pi);
8247 }
Denys Vlasenko7e675362016-10-28 21:57:31 +02008248 }
8249 } else {
8250 /* child stopped */
8251 pi->stopped_cmds++;
8252 }
8253#endif
8254 return -1; /* this wasn't a process from fg_pipe */
8255}
8256
8257/* Check to see if any processes have exited -- if they have,
8258 * figure out why and see if a job has completed.
Denys Vlasenko62b717b2016-11-07 22:12:18 +01008259 *
8260 * If non-NULL fg_pipe: wait for its completion or stop.
8261 * Return its exitcode or zero if stopped.
8262 *
8263 * Alternatively (fg_pipe == NULL, waitfor_pid != 0):
8264 * waitpid(WNOHANG), if waitfor_pid exits or stops, return exitcode+1,
8265 * else return <0 if waitpid errors out (e.g. ECHILD: nothing to wait for)
8266 * or 0 if no children changed status.
8267 *
8268 * Alternatively (fg_pipe == NULL, waitfor_pid == 0),
8269 * return <0 if waitpid errors out (e.g. ECHILD: nothing to wait for)
8270 * or 0 if no children changed status.
Denys Vlasenko7e675362016-10-28 21:57:31 +02008271 */
8272static int checkjobs(struct pipe *fg_pipe, pid_t waitfor_pid)
8273{
8274 int attributes;
8275 int status;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008276 int rcode = 0;
8277
8278 debug_printf_jobs("checkjobs %p\n", fg_pipe);
8279
8280 attributes = WUNTRACED;
8281 if (fg_pipe == NULL)
8282 attributes |= WNOHANG;
8283
8284 errno = 0;
8285#if ENABLE_HUSH_FAST
8286 if (G.handled_SIGCHLD == G.count_SIGCHLD) {
8287//bb_error_msg("[%d] checkjobs: G.count_SIGCHLD:%d G.handled_SIGCHLD:%d children?:%d fg_pipe:%p",
8288//getpid(), G.count_SIGCHLD, G.handled_SIGCHLD, G.we_have_children, fg_pipe);
8289 /* There was neither fork nor SIGCHLD since last waitpid */
8290 /* Avoid doing waitpid syscall if possible */
8291 if (!G.we_have_children) {
8292 errno = ECHILD;
8293 return -1;
8294 }
8295 if (fg_pipe == NULL) { /* is WNOHANG set? */
8296 /* We have children, but they did not exit
8297 * or stop yet (we saw no SIGCHLD) */
8298 return 0;
8299 }
8300 /* else: !WNOHANG, waitpid will block, can't short-circuit */
8301 }
8302#endif
8303
8304/* Do we do this right?
8305 * bash-3.00# sleep 20 | false
8306 * <ctrl-Z pressed>
8307 * [3]+ Stopped sleep 20 | false
8308 * bash-3.00# echo $?
8309 * 1 <========== bg pipe is not fully done, but exitcode is already known!
8310 * [hush 1.14.0: yes we do it right]
8311 */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008312 while (1) {
Denys Vlasenko7e675362016-10-28 21:57:31 +02008313 pid_t childpid;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008314#if ENABLE_HUSH_FAST
Denys Vlasenko7e675362016-10-28 21:57:31 +02008315 int i;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008316 i = G.count_SIGCHLD;
8317#endif
8318 childpid = waitpid(-1, &status, attributes);
8319 if (childpid <= 0) {
8320 if (childpid && errno != ECHILD)
8321 bb_perror_msg("waitpid");
8322#if ENABLE_HUSH_FAST
8323 else { /* Until next SIGCHLD, waitpid's are useless */
8324 G.we_have_children = (childpid == 0);
8325 G.handled_SIGCHLD = i;
8326//bb_error_msg("[%d] checkjobs: waitpid returned <= 0, G.count_SIGCHLD:%d G.handled_SIGCHLD:%d", getpid(), G.count_SIGCHLD, G.handled_SIGCHLD);
8327 }
8328#endif
Denys Vlasenko7e675362016-10-28 21:57:31 +02008329 /* ECHILD (no children), or 0 (no change in children status) */
8330 rcode = childpid;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008331 break;
8332 }
Denys Vlasenko7e675362016-10-28 21:57:31 +02008333 rcode = process_wait_result(fg_pipe, childpid, status);
8334 if (rcode >= 0) {
8335 /* fg_pipe exited or stopped */
8336 break;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008337 }
Denys Vlasenko7e675362016-10-28 21:57:31 +02008338 if (childpid == waitfor_pid) {
Denys Vlasenko62b717b2016-11-07 22:12:18 +01008339 debug_printf_exec("childpid==waitfor_pid:%d status:0x%08x\n", childpid, status);
Denys Vlasenko7e675362016-10-28 21:57:31 +02008340 rcode = WEXITSTATUS(status);
8341 if (WIFSIGNALED(status))
8342 rcode = 128 + WTERMSIG(status);
Denys Vlasenko62b717b2016-11-07 22:12:18 +01008343 if (WIFSTOPPED(status))
8344 /* bash: "cmd & wait $!" and cmd stops: $? = 128 + stopsig */
8345 rcode = 128 + WSTOPSIG(status);
Denys Vlasenko7e675362016-10-28 21:57:31 +02008346 rcode++;
8347 break; /* "wait PID" called us, give it exitcode+1 */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008348 }
Denys Vlasenko7e675362016-10-28 21:57:31 +02008349 /* This wasn't one of our processes, or */
8350 /* fg_pipe still has running processes, do waitpid again */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008351 } /* while (waitpid succeeds)... */
8352
8353 return rcode;
8354}
8355
8356#if ENABLE_HUSH_JOB
Denys Vlasenkoda463fb2010-09-07 09:53:50 +02008357static int checkjobs_and_fg_shell(struct pipe *fg_pipe)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008358{
8359 pid_t p;
Denys Vlasenko7e675362016-10-28 21:57:31 +02008360 int rcode = checkjobs(fg_pipe, 0 /*(no pid to wait for)*/);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008361 if (G_saved_tty_pgrp) {
8362 /* Job finished, move the shell to the foreground */
8363 p = getpgrp(); /* our process group id */
8364 debug_printf_jobs("fg'ing ourself: getpgrp()=%d\n", (int)p);
8365 tcsetpgrp(G_interactive_fd, p);
8366 }
8367 return rcode;
8368}
8369#endif
8370
8371/* Start all the jobs, but don't wait for anything to finish.
8372 * See checkjobs().
8373 *
8374 * Return code is normally -1, when the caller has to wait for children
8375 * to finish to determine the exit status of the pipe. If the pipe
8376 * is a simple builtin command, however, the action is done by the
8377 * time run_pipe returns, and the exit code is provided as the
8378 * return value.
8379 *
8380 * Returns -1 only if started some children. IOW: we have to
8381 * mask out retvals of builtins etc with 0xff!
8382 *
8383 * The only case when we do not need to [v]fork is when the pipe
8384 * is single, non-backgrounded, non-subshell command. Examples:
8385 * cmd ; ... { list } ; ...
8386 * cmd && ... { list } && ...
8387 * cmd || ... { list } || ...
Denys Vlasenkob72baeb2011-02-02 18:38:57 +01008388 * If it is, then we can run cmd as a builtin, NOFORK,
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008389 * or (if SH_STANDALONE) an applet, and we can run the { list }
8390 * with run_list. If it isn't one of these, we fork and exec cmd.
8391 *
8392 * Cases when we must fork:
8393 * non-single: cmd | cmd
8394 * backgrounded: cmd & { list } &
8395 * subshell: ( list ) [&]
8396 */
8397#if !ENABLE_HUSH_MODE_X
Denys Vlasenkoc96bb2c2018-06-26 15:43:56 +02008398#define redirect_and_varexp_helper(command, squirrel, argv_expanded) \
8399 redirect_and_varexp_helper(command, squirrel)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008400#endif
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02008401static int redirect_and_varexp_helper(
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008402 struct command *command,
Denys Vlasenko2db74612017-07-07 22:07:28 +02008403 struct squirrel **sqp,
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008404 char **argv_expanded)
8405{
Denys Vlasenko41d8f102018-04-05 14:41:21 +02008406 /* Assignments occur before redirects. Try:
8407 * a=`sleep 1` sleep 2 3>/qwe/rty
8408 */
8409
8410 char **new_env = expand_assignments(command->argv, command->assignment_cnt);
8411 dump_cmd_in_x_mode(new_env);
8412 dump_cmd_in_x_mode(argv_expanded);
8413 /* this takes ownership of new_env[i] elements, and frees new_env: */
8414 set_vars_and_save_old(new_env);
8415
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008416 /* setup_redirects acts on file descriptors, not FILEs.
8417 * This is perfect for work that comes after exec().
8418 * Is it really safe for inline use? Experimentally,
8419 * things seem to work. */
Denys Vlasenko41d8f102018-04-05 14:41:21 +02008420 return setup_redirects(command, sqp);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008421}
8422static NOINLINE int run_pipe(struct pipe *pi)
8423{
8424 static const char *const null_ptr = NULL;
8425
8426 int cmd_no;
8427 int next_infd;
8428 struct command *command;
8429 char **argv_expanded;
8430 char **argv;
Denys Vlasenko2db74612017-07-07 22:07:28 +02008431 struct squirrel *squirrel = NULL;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008432 int rcode;
8433
8434 debug_printf_exec("run_pipe start: members:%d\n", pi->num_cmds);
8435 debug_enter();
8436
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02008437 /* Testcase: set -- q w e; (IFS='' echo "$*"; IFS=''; echo "$*"); echo "$*"
8438 * Result should be 3 lines: q w e, qwe, q w e
8439 */
Denys Vlasenko96786362018-04-11 16:02:58 +02008440 if (G.ifs_whitespace != G.ifs)
8441 free(G.ifs_whitespace);
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02008442 G.ifs = get_local_var_value("IFS");
Denys Vlasenko96786362018-04-11 16:02:58 +02008443 if (G.ifs) {
8444 char *p;
8445 G.ifs_whitespace = (char*)G.ifs;
8446 p = skip_whitespace(G.ifs);
8447 if (*p) {
8448 /* Not all $IFS is whitespace */
8449 char *d;
8450 int len = p - G.ifs;
8451 p = skip_non_whitespace(p);
8452 G.ifs_whitespace = xmalloc(len + strlen(p) + 1); /* can overestimate */
8453 d = mempcpy(G.ifs_whitespace, G.ifs, len);
8454 while (*p) {
8455 if (isspace(*p))
8456 *d++ = *p;
8457 p++;
8458 }
8459 *d = '\0';
8460 }
8461 } else {
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02008462 G.ifs = defifs;
Denys Vlasenko96786362018-04-11 16:02:58 +02008463 G.ifs_whitespace = (char*)G.ifs;
8464 }
Denys Vlasenko1fd3d942010-09-08 13:31:53 +02008465
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008466 IF_HUSH_JOB(pi->pgrp = -1;)
8467 pi->stopped_cmds = 0;
8468 command = &pi->cmds[0];
8469 argv_expanded = NULL;
8470
8471 if (pi->num_cmds != 1
8472 || pi->followup == PIPE_BG
8473 || command->cmd_type == CMD_SUBSHELL
8474 ) {
8475 goto must_fork;
8476 }
8477
8478 pi->alive_cmds = 1;
8479
8480 debug_printf_exec(": group:%p argv:'%s'\n",
8481 command->group, command->argv ? command->argv[0] : "NONE");
8482
8483 if (command->group) {
8484#if ENABLE_HUSH_FUNCTIONS
8485 if (command->cmd_type == CMD_FUNCDEF) {
8486 /* "executing" func () { list } */
8487 struct function *funcp;
8488
8489 funcp = new_function(command->argv[0]);
8490 /* funcp->name is already set to argv[0] */
8491 funcp->body = command->group;
8492# if !BB_MMU
8493 funcp->body_as_string = command->group_as_string;
8494 command->group_as_string = NULL;
8495# endif
8496 command->group = NULL;
8497 command->argv[0] = NULL;
8498 debug_printf_exec("cmd %p has child func at %p\n", command, funcp);
8499 funcp->parent_cmd = command;
8500 command->child_func = funcp;
8501
8502 debug_printf_exec("run_pipe: return EXIT_SUCCESS\n");
8503 debug_leave();
8504 return EXIT_SUCCESS;
8505 }
8506#endif
8507 /* { list } */
8508 debug_printf("non-subshell group\n");
8509 rcode = 1; /* exitcode if redir failed */
Denys Vlasenko2db74612017-07-07 22:07:28 +02008510 if (setup_redirects(command, &squirrel) == 0) {
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008511 debug_printf_exec(": run_list\n");
Denys Vlasenkod1b84572018-03-28 18:42:54 +02008512//FIXME: we need to pass squirrel down into run_list()
8513//for SH_STANDALONE case, or else this construct:
8514// { find /proc/self/fd; true; } >FILE; cmd2
8515//has no way of closing saved fd#1 for "find",
8516//and in SH_STANDALONE mode, "find" is not execed,
8517//therefore CLOEXEC on saved fd does not help.
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008518 rcode = run_list(command->group) & 0xff;
8519 }
8520 restore_redirects(squirrel);
8521 IF_HAS_KEYWORDS(if (pi->pi_inverted) rcode = !rcode;)
8522 debug_leave();
8523 debug_printf_exec("run_pipe: return %d\n", rcode);
8524 return rcode;
8525 }
8526
8527 argv = command->argv ? command->argv : (char **) &null_ptr;
8528 {
8529 const struct built_in_command *x;
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02008530 IF_HUSH_FUNCTIONS(const struct function *funcp;)
8531 IF_NOT_HUSH_FUNCTIONS(enum { funcp = 0 };)
Denys Vlasenko929a41d2018-04-05 14:09:14 +02008532 struct variable **sv_shadowed;
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02008533 struct variable *old_vars;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008534
Denys Vlasenko5807e182018-02-08 19:19:04 +01008535#if ENABLE_HUSH_LINENO_VAR
Denys Vlasenkob8d076b2018-01-19 16:00:57 +01008536 if (G.lineno_var)
8537 strcpy(G.lineno_var + sizeof("LINENO=")-1, utoa(command->lineno));
8538#endif
Denys Vlasenko6aad1dd2018-01-19 15:37:04 +01008539
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008540 if (argv[command->assignment_cnt] == NULL) {
Denys Vlasenko5fa05052018-04-03 11:21:13 +02008541 /* Assignments, but no command.
8542 * Ensure redirects take effect (that is, create files).
8543 * Try "a=t >file"
8544 */
Denys Vlasenko21b7f1b2018-04-05 15:15:53 +02008545 unsigned i;
Denys Vlasenko5fa05052018-04-03 11:21:13 +02008546 G.expand_exitcode = 0;
Denys Vlasenko21b7f1b2018-04-05 15:15:53 +02008547 only_assignments:
Denys Vlasenko2db74612017-07-07 22:07:28 +02008548 rcode = setup_redirects(command, &squirrel);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008549 restore_redirects(squirrel);
Denys Vlasenko21b7f1b2018-04-05 15:15:53 +02008550
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008551 /* Set shell variables */
8552 if (G_x_mode)
8553 bb_putchar_stderr('+');
Denys Vlasenko21b7f1b2018-04-05 15:15:53 +02008554 i = 0;
8555 while (i < command->assignment_cnt) {
Denys Vlasenko34179952018-04-11 13:47:59 +02008556 char *p = expand_string_to_string(argv[i],
8557 EXP_FLAG_ESC_GLOB_CHARS,
8558 /*unbackslash:*/ 1
8559 );
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008560 if (G_x_mode)
8561 fprintf(stderr, " %s", p);
Denys Vlasenko21b7f1b2018-04-05 15:15:53 +02008562 debug_printf_env("set shell var:'%s'->'%s'\n", *argv, p);
Denys Vlasenko38ef39a2017-07-18 01:40:01 +02008563 if (set_local_var(p, /*flag:*/ 0)) {
8564 /* assignment to readonly var / putenv error? */
8565 rcode = 1;
8566 }
Denys Vlasenko21b7f1b2018-04-05 15:15:53 +02008567 i++;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008568 }
8569 if (G_x_mode)
8570 bb_putchar_stderr('\n');
8571 /* Redirect error sets $? to 1. Otherwise,
8572 * if evaluating assignment value set $?, retain it.
Denys Vlasenko5fa05052018-04-03 11:21:13 +02008573 * Else, clear $?:
8574 * false; q=`exit 2`; echo $? - should print 2
8575 * false; x=1; echo $? - should print 0
8576 * Because of the 2nd case, we can't just use G.last_exitcode.
8577 */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008578 if (rcode == 0)
Denys Vlasenko5fa05052018-04-03 11:21:13 +02008579 rcode = G.expand_exitcode;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008580 IF_HAS_KEYWORDS(if (pi->pi_inverted) rcode = !rcode;)
8581 debug_leave();
8582 debug_printf_exec("run_pipe: return %d\n", rcode);
8583 return rcode;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008584 }
8585
8586 /* Expand the rest into (possibly) many strings each */
Denys Vlasenko11752d42018-04-03 08:20:58 +02008587#if defined(CMD_SINGLEWORD_NOGLOB)
Denys Vlasenko929a41d2018-04-05 14:09:14 +02008588 if (command->cmd_type == CMD_SINGLEWORD_NOGLOB)
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008589 argv_expanded = expand_strvec_to_strvec_singleword_noglob(argv + command->assignment_cnt);
Denys Vlasenko929a41d2018-04-05 14:09:14 +02008590 else
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008591#endif
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008592 argv_expanded = expand_strvec_to_strvec(argv + command->assignment_cnt);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008593
Denys Vlasenko41d8f102018-04-05 14:41:21 +02008594 /* If someone gives us an empty string: `cmd with empty output` */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008595 if (!argv_expanded[0]) {
8596 free(argv_expanded);
Denys Vlasenko21b7f1b2018-04-05 15:15:53 +02008597 /* `false` still has to set exitcode 1 */
8598 G.expand_exitcode = G.last_exitcode;
Denys Vlasenko41d8f102018-04-05 14:41:21 +02008599 goto only_assignments;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008600 }
8601
Denys Vlasenko929a41d2018-04-05 14:09:14 +02008602 old_vars = NULL;
8603 sv_shadowed = G.shadowed_vars_pp;
8604
Denys Vlasenko75481d32017-07-31 05:27:09 +02008605 /* Check if argv[0] matches any functions (this goes before bltins) */
Denys Vlasenko929a41d2018-04-05 14:09:14 +02008606 IF_HUSH_FUNCTIONS(funcp = find_function(argv_expanded[0]);)
8607 IF_HUSH_FUNCTIONS(x = NULL;)
8608 IF_HUSH_FUNCTIONS(if (!funcp))
Denys Vlasenko75481d32017-07-31 05:27:09 +02008609 x = find_builtin(argv_expanded[0]);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008610 if (x || funcp) {
Denys Vlasenko34f6b122018-04-05 11:30:17 +02008611 if (x && x->b_function == builtin_exec && argv_expanded[1] == NULL) {
8612 debug_printf("exec with redirects only\n");
Denys Vlasenko41d8f102018-04-05 14:41:21 +02008613 /*
8614 * Variable assignments are executed, but then "forgotten":
8615 * a=`sleep 1;echo A` exec 3>&-; echo $a
8616 * sleeps, but prints nothing.
8617 */
8618 enter_var_nest_level();
8619 G.shadowed_vars_pp = &old_vars;
8620 rcode = redirect_and_varexp_helper(command, /*squirrel:*/ NULL, argv_expanded);
8621 G.shadowed_vars_pp = sv_shadowed;
Denys Vlasenko34f6b122018-04-05 11:30:17 +02008622 /* rcode=1 can be if redir file can't be opened */
Denys Vlasenko41d8f102018-04-05 14:41:21 +02008623
Denys Vlasenko34f6b122018-04-05 11:30:17 +02008624 goto clean_up_and_ret1;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008625 }
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02008626
Denys Vlasenko34f6b122018-04-05 11:30:17 +02008627 /* Bump var nesting, or this will leak exported $a:
Denys Vlasenkod358b0b2018-04-05 00:51:55 +02008628 * a=b true; env | grep ^a=
8629 */
8630 enter_var_nest_level();
Denys Vlasenko929a41d2018-04-05 14:09:14 +02008631 /* Collect all variables "shadowed" by helper
8632 * (IOW: old vars overridden by "var1=val1 var2=val2 cmd..." syntax)
8633 * into old_vars list:
8634 */
8635 G.shadowed_vars_pp = &old_vars;
8636 rcode = redirect_and_varexp_helper(command, &squirrel, argv_expanded);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008637 if (rcode == 0) {
8638 if (!funcp) {
Denys Vlasenko929a41d2018-04-05 14:09:14 +02008639 /* Do not collect *to old_vars list* vars shadowed
8640 * by e.g. "local VAR" builtin (collect them
8641 * in the previously nested list instead):
8642 * don't want them to be restored immediately
8643 * after "local" completes.
8644 */
8645 G.shadowed_vars_pp = sv_shadowed;
8646
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008647 debug_printf_exec(": builtin '%s' '%s'...\n",
8648 x->b_cmd, argv_expanded[1]);
Denys Vlasenko8ee2ada2011-02-07 02:03:51 +01008649 fflush_all();
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008650 rcode = x->b_function(argv_expanded) & 0xff;
8651 fflush_all();
8652 }
8653#if ENABLE_HUSH_FUNCTIONS
8654 else {
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008655 debug_printf_exec(": function '%s' '%s'...\n",
8656 funcp->name, argv_expanded[1]);
8657 rcode = run_function(funcp, argv_expanded) & 0xff;
Denys Vlasenko929a41d2018-04-05 14:09:14 +02008658 /*
8659 * But do collect *to old_vars list* vars shadowed
8660 * within function execution. To that end, restore
8661 * this pointer _after_ function run:
8662 */
8663 G.shadowed_vars_pp = sv_shadowed;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008664 }
8665#endif
8666 }
Denys Vlasenko34f6b122018-04-05 11:30:17 +02008667 } else
Denys Vlasenko82d1c1f2017-12-31 17:30:02 +01008668 if (ENABLE_FEATURE_SH_NOFORK && NUM_APPLETS > 1) {
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008669 int n = find_applet_by_name(argv_expanded[0]);
Denys Vlasenko34f6b122018-04-05 11:30:17 +02008670 if (n < 0 || !APPLET_IS_NOFORK(n))
8671 goto must_fork;
8672
8673 enter_var_nest_level();
Denys Vlasenko929a41d2018-04-05 14:09:14 +02008674 /* Collect all variables "shadowed" by helper into old_vars list */
8675 G.shadowed_vars_pp = &old_vars;
8676 rcode = redirect_and_varexp_helper(command, &squirrel, argv_expanded);
8677 G.shadowed_vars_pp = sv_shadowed;
8678
Denys Vlasenko34f6b122018-04-05 11:30:17 +02008679 if (rcode == 0) {
8680 debug_printf_exec(": run_nofork_applet '%s' '%s'...\n",
8681 argv_expanded[0], argv_expanded[1]);
8682 /*
8683 * Note: signals (^C) can't interrupt here.
8684 * We remember them and they will be acted upon
8685 * after applet returns.
8686 * This makes applets which can run for a long time
8687 * and/or wait for user input ineligible for NOFORK:
8688 * for example, "yes" or "rm" (rm -i waits for input).
8689 */
8690 rcode = run_nofork_applet(n, argv_expanded);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008691 }
Denys Vlasenko4e1dc532018-04-05 13:10:34 +02008692 } else
8693 goto must_fork;
Denys Vlasenko34f6b122018-04-05 11:30:17 +02008694
Denys Vlasenko41d8f102018-04-05 14:41:21 +02008695 restore_redirects(squirrel);
8696 clean_up_and_ret1:
Denys Vlasenko34f6b122018-04-05 11:30:17 +02008697 leave_var_nest_level();
8698 add_vars(old_vars);
Denys Vlasenko34f6b122018-04-05 11:30:17 +02008699
8700 /*
8701 * Try "usleep 99999999" + ^C + "echo $?"
8702 * with FEATURE_SH_NOFORK=y.
8703 */
8704 if (!funcp) {
8705 /* It was builtin or nofork.
8706 * if this would be a real fork/execed program,
8707 * it should have died if a fatal sig was received.
8708 * But OTOH, there was no separate process,
8709 * the sig was sent to _shell_, not to non-existing
8710 * child.
8711 * Let's just handle ^C only, this one is obvious:
8712 * we aren't ok with exitcode 0 when ^C was pressed
8713 * during builtin/nofork.
8714 */
8715 if (sigismember(&G.pending_set, SIGINT))
8716 rcode = 128 + SIGINT;
8717 }
Denys Vlasenko34f6b122018-04-05 11:30:17 +02008718 free(argv_expanded);
8719 IF_HAS_KEYWORDS(if (pi->pi_inverted) rcode = !rcode;)
8720 debug_leave();
8721 debug_printf_exec("run_pipe return %d\n", rcode);
8722 return rcode;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008723 }
8724
8725 must_fork:
8726 /* NB: argv_expanded may already be created, and that
8727 * might include `cmd` runs! Do not rerun it! We *must*
8728 * use argv_expanded if it's non-NULL */
8729
8730 /* Going to fork a child per each pipe member */
8731 pi->alive_cmds = 0;
8732 next_infd = 0;
8733
8734 cmd_no = 0;
8735 while (cmd_no < pi->num_cmds) {
8736 struct fd_pair pipefds;
8737#if !BB_MMU
Denys Vlasenko9db344a2018-04-09 19:05:11 +02008738 int sv_var_nest_level = G.var_nest_level;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008739 volatile nommu_save_t nommu_save;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008740 nommu_save.old_vars = NULL;
8741 nommu_save.argv = NULL;
8742 nommu_save.argv_from_re_execing = NULL;
8743#endif
8744 command = &pi->cmds[cmd_no];
8745 cmd_no++;
8746 if (command->argv) {
8747 debug_printf_exec(": pipe member '%s' '%s'...\n",
8748 command->argv[0], command->argv[1]);
8749 } else {
8750 debug_printf_exec(": pipe member with no argv\n");
8751 }
8752
8753 /* pipes are inserted between pairs of commands */
8754 pipefds.rd = 0;
8755 pipefds.wr = 1;
8756 if (cmd_no < pi->num_cmds)
8757 xpiped_pair(pipefds);
8758
Denys Vlasenko5807e182018-02-08 19:19:04 +01008759#if ENABLE_HUSH_LINENO_VAR
Denys Vlasenkob8d076b2018-01-19 16:00:57 +01008760 if (G.lineno_var)
8761 strcpy(G.lineno_var + sizeof("LINENO=")-1, utoa(command->lineno));
8762#endif
Denys Vlasenko6aad1dd2018-01-19 15:37:04 +01008763
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008764 command->pid = BB_MMU ? fork() : vfork();
8765 if (!command->pid) { /* child */
8766#if ENABLE_HUSH_JOB
8767 disable_restore_tty_pgrp_on_exit();
8768 CLEAR_RANDOM_T(&G.random_gen); /* or else $RANDOM repeats in child */
8769
8770 /* Every child adds itself to new process group
8771 * with pgid == pid_of_first_child_in_pipe */
8772 if (G.run_list_level == 1 && G_interactive_fd) {
8773 pid_t pgrp;
8774 pgrp = pi->pgrp;
8775 if (pgrp < 0) /* true for 1st process only */
8776 pgrp = getpid();
8777 if (setpgid(0, pgrp) == 0
8778 && pi->followup != PIPE_BG
8779 && G_saved_tty_pgrp /* we have ctty */
8780 ) {
8781 /* We do it in *every* child, not just first,
8782 * to avoid races */
8783 tcsetpgrp(G_interactive_fd, pgrp);
8784 }
8785 }
8786#endif
8787 if (pi->alive_cmds == 0 && pi->followup == PIPE_BG) {
8788 /* 1st cmd in backgrounded pipe
8789 * should have its stdin /dev/null'ed */
8790 close(0);
8791 if (open(bb_dev_null, O_RDONLY))
8792 xopen("/", O_RDONLY);
8793 } else {
8794 xmove_fd(next_infd, 0);
8795 }
8796 xmove_fd(pipefds.wr, 1);
8797 if (pipefds.rd > 1)
8798 close(pipefds.rd);
8799 /* Like bash, explicit redirects override pipes,
Denys Vlasenko869994c2016-08-20 15:16:00 +02008800 * and the pipe fd (fd#1) is available for dup'ing:
8801 * "cmd1 2>&1 | cmd2": fd#1 is duped to fd#2, thus stderr
8802 * of cmd1 goes into pipe.
8803 */
8804 if (setup_redirects(command, NULL)) {
8805 /* Happens when redir file can't be opened:
8806 * $ hush -c 'echo FOO >&2 | echo BAR 3>/qwe/rty; echo BAZ'
8807 * FOO
8808 * hush: can't open '/qwe/rty': No such file or directory
8809 * BAZ
8810 * (echo BAR is not executed, it hits _exit(1) below)
8811 */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008812 _exit(1);
Denys Vlasenko869994c2016-08-20 15:16:00 +02008813 }
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008814
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008815 /* Stores to nommu_save list of env vars putenv'ed
8816 * (NOMMU, on MMU we don't need that) */
8817 /* cast away volatility... */
8818 pseudo_exec((nommu_save_t*) &nommu_save, command, argv_expanded);
8819 /* pseudo_exec() does not return */
8820 }
8821
8822 /* parent or error */
8823#if ENABLE_HUSH_FAST
8824 G.count_SIGCHLD++;
8825//bb_error_msg("[%d] fork in run_pipe: G.count_SIGCHLD:%d G.handled_SIGCHLD:%d", getpid(), G.count_SIGCHLD, G.handled_SIGCHLD);
8826#endif
8827 enable_restore_tty_pgrp_on_exit();
8828#if !BB_MMU
8829 /* Clean up after vforked child */
8830 free(nommu_save.argv);
8831 free(nommu_save.argv_from_re_execing);
Denys Vlasenko9db344a2018-04-09 19:05:11 +02008832 G.var_nest_level = sv_var_nest_level;
8833 remove_nested_vars();
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008834 add_vars(nommu_save.old_vars);
8835#endif
8836 free(argv_expanded);
8837 argv_expanded = NULL;
8838 if (command->pid < 0) { /* [v]fork failed */
8839 /* Clearly indicate, was it fork or vfork */
8840 bb_perror_msg(BB_MMU ? "vfork"+1 : "vfork");
8841 } else {
8842 pi->alive_cmds++;
8843#if ENABLE_HUSH_JOB
8844 /* Second and next children need to know pid of first one */
8845 if (pi->pgrp < 0)
8846 pi->pgrp = command->pid;
8847#endif
8848 }
8849
8850 if (cmd_no > 1)
8851 close(next_infd);
8852 if (cmd_no < pi->num_cmds)
8853 close(pipefds.wr);
8854 /* Pass read (output) pipe end to next iteration */
8855 next_infd = pipefds.rd;
8856 }
8857
8858 if (!pi->alive_cmds) {
8859 debug_leave();
8860 debug_printf_exec("run_pipe return 1 (all forks failed, no children)\n");
8861 return 1;
8862 }
8863
8864 debug_leave();
8865 debug_printf_exec("run_pipe return -1 (%u children started)\n", pi->alive_cmds);
8866 return -1;
8867}
8868
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008869/* NB: called by pseudo_exec, and therefore must not modify any
8870 * global data until exec/_exit (we can be a child after vfork!) */
8871static int run_list(struct pipe *pi)
8872{
8873#if ENABLE_HUSH_CASE
8874 char *case_word = NULL;
8875#endif
8876#if ENABLE_HUSH_LOOPS
8877 struct pipe *loop_top = NULL;
8878 char **for_lcur = NULL;
8879 char **for_list = NULL;
8880#endif
8881 smallint last_followup;
8882 smalluint rcode;
8883#if ENABLE_HUSH_IF || ENABLE_HUSH_CASE
8884 smalluint cond_code = 0;
8885#else
8886 enum { cond_code = 0 };
8887#endif
8888#if HAS_KEYWORDS
Denys Vlasenko9b782552010-09-08 13:33:26 +02008889 smallint rword; /* RES_foo */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008890 smallint last_rword; /* ditto */
8891#endif
8892
8893 debug_printf_exec("run_list start lvl %d\n", G.run_list_level);
8894 debug_enter();
8895
8896#if ENABLE_HUSH_LOOPS
8897 /* Check syntax for "for" */
Denys Vlasenko0d6a4ec2010-12-18 01:34:49 +01008898 {
8899 struct pipe *cpipe;
8900 for (cpipe = pi; cpipe; cpipe = cpipe->next) {
8901 if (cpipe->res_word != RES_FOR && cpipe->res_word != RES_IN)
8902 continue;
8903 /* current word is FOR or IN (BOLD in comments below) */
8904 if (cpipe->next == NULL) {
8905 syntax_error("malformed for");
8906 debug_leave();
8907 debug_printf_exec("run_list lvl %d return 1\n", G.run_list_level);
8908 return 1;
8909 }
8910 /* "FOR v; do ..." and "for v IN a b; do..." are ok */
8911 if (cpipe->next->res_word == RES_DO)
8912 continue;
8913 /* next word is not "do". It must be "in" then ("FOR v in ...") */
8914 if (cpipe->res_word == RES_IN /* "for v IN a b; not_do..."? */
8915 || cpipe->next->res_word != RES_IN /* FOR v not_do_and_not_in..."? */
8916 ) {
8917 syntax_error("malformed for");
8918 debug_leave();
8919 debug_printf_exec("run_list lvl %d return 1\n", G.run_list_level);
8920 return 1;
8921 }
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008922 }
8923 }
8924#endif
8925
8926 /* Past this point, all code paths should jump to ret: label
8927 * in order to return, no direct "return" statements please.
8928 * This helps to ensure that no memory is leaked. */
8929
8930#if ENABLE_HUSH_JOB
8931 G.run_list_level++;
8932#endif
8933
8934#if HAS_KEYWORDS
8935 rword = RES_NONE;
8936 last_rword = RES_XXXX;
8937#endif
8938 last_followup = PIPE_SEQ;
8939 rcode = G.last_exitcode;
8940
8941 /* Go through list of pipes, (maybe) executing them. */
8942 for (; pi; pi = IF_HUSH_LOOPS(rword == RES_DONE ? loop_top : ) pi->next) {
Denys Vlasenko5cc9bf62016-11-08 17:34:44 +01008943 int r;
Denys Vlasenko9fda6092017-07-14 13:36:48 +02008944 int sv_errexit_depth;
Denys Vlasenko5cc9bf62016-11-08 17:34:44 +01008945
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008946 if (G.flag_SIGINT)
8947 break;
Denys Vlasenko04b46bc2016-10-01 22:28:03 +02008948 if (G_flag_return_in_progress == 1)
8949 break;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008950
8951 IF_HAS_KEYWORDS(rword = pi->res_word;)
8952 debug_printf_exec(": rword=%d cond_code=%d last_rword=%d\n",
8953 rword, cond_code, last_rword);
Denys Vlasenko9fda6092017-07-14 13:36:48 +02008954
8955 sv_errexit_depth = G.errexit_depth;
Denys Vlasenko82d1c1f2017-12-31 17:30:02 +01008956 if (
8957#if ENABLE_HUSH_IF
8958 rword == RES_IF || rword == RES_ELIF ||
8959#endif
Denys Vlasenko9fda6092017-07-14 13:36:48 +02008960 pi->followup != PIPE_SEQ
8961 ) {
8962 G.errexit_depth++;
8963 }
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008964#if ENABLE_HUSH_LOOPS
8965 if ((rword == RES_WHILE || rword == RES_UNTIL || rword == RES_FOR)
8966 && loop_top == NULL /* avoid bumping G.depth_of_loop twice */
8967 ) {
8968 /* start of a loop: remember where loop starts */
8969 loop_top = pi;
8970 G.depth_of_loop++;
8971 }
8972#endif
8973 /* Still in the same "if...", "then..." or "do..." branch? */
8974 if (IF_HAS_KEYWORDS(rword == last_rword &&) 1) {
8975 if ((rcode == 0 && last_followup == PIPE_OR)
8976 || (rcode != 0 && last_followup == PIPE_AND)
8977 ) {
8978 /* It is "<true> || CMD" or "<false> && CMD"
8979 * and we should not execute CMD */
8980 debug_printf_exec("skipped cmd because of || or &&\n");
8981 last_followup = pi->followup;
Denys Vlasenko3beab832013-04-07 18:16:58 +02008982 goto dont_check_jobs_but_continue;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02008983 }
8984 }
8985 last_followup = pi->followup;
8986 IF_HAS_KEYWORDS(last_rword = rword;)
8987#if ENABLE_HUSH_IF
8988 if (cond_code) {
8989 if (rword == RES_THEN) {
8990 /* if false; then ... fi has exitcode 0! */
8991 G.last_exitcode = rcode = EXIT_SUCCESS;
8992 /* "if <false> THEN cmd": skip cmd */
8993 continue;
8994 }
8995 } else {
8996 if (rword == RES_ELSE || rword == RES_ELIF) {
8997 /* "if <true> then ... ELSE/ELIF cmd":
8998 * skip cmd and all following ones */
8999 break;
9000 }
9001 }
9002#endif
9003#if ENABLE_HUSH_LOOPS
9004 if (rword == RES_FOR) { /* && pi->num_cmds - always == 1 */
9005 if (!for_lcur) {
9006 /* first loop through for */
9007
9008 static const char encoded_dollar_at[] ALIGN1 = {
9009 SPECIAL_VAR_SYMBOL, '@' | 0x80, SPECIAL_VAR_SYMBOL, '\0'
9010 }; /* encoded representation of "$@" */
9011 static const char *const encoded_dollar_at_argv[] = {
9012 encoded_dollar_at, NULL
9013 }; /* argv list with one element: "$@" */
9014 char **vals;
9015
9016 vals = (char**)encoded_dollar_at_argv;
9017 if (pi->next->res_word == RES_IN) {
9018 /* if no variable values after "in" we skip "for" */
9019 if (!pi->next->cmds[0].argv) {
9020 G.last_exitcode = rcode = EXIT_SUCCESS;
9021 debug_printf_exec(": null FOR: exitcode EXIT_SUCCESS\n");
9022 break;
9023 }
9024 vals = pi->next->cmds[0].argv;
9025 } /* else: "for var; do..." -> assume "$@" list */
9026 /* create list of variable values */
9027 debug_print_strings("for_list made from", vals);
9028 for_list = expand_strvec_to_strvec(vals);
9029 for_lcur = for_list;
9030 debug_print_strings("for_list", for_list);
9031 }
9032 if (!*for_lcur) {
9033 /* "for" loop is over, clean up */
9034 free(for_list);
9035 for_list = NULL;
9036 for_lcur = NULL;
9037 break;
9038 }
9039 /* Insert next value from for_lcur */
9040 /* note: *for_lcur already has quotes removed, $var expanded, etc */
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02009041 set_local_var(xasprintf("%s=%s", pi->cmds[0].argv[0], *for_lcur++), /*flag:*/ 0);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009042 continue;
9043 }
9044 if (rword == RES_IN) {
9045 continue; /* "for v IN list;..." - "in" has no cmds anyway */
9046 }
9047 if (rword == RES_DONE) {
9048 continue; /* "done" has no cmds too */
9049 }
9050#endif
9051#if ENABLE_HUSH_CASE
9052 if (rword == RES_CASE) {
Denys Vlasenkoaeaee432016-11-04 20:14:04 +01009053 debug_printf_exec("CASE cond_code:%d\n", cond_code);
Denys Vlasenko34179952018-04-11 13:47:59 +02009054 case_word = expand_string_to_string(pi->cmds->argv[0],
9055 EXP_FLAG_ESC_GLOB_CHARS, /*unbackslash:*/ 1);
Denys Vlasenkoabf75562018-04-02 17:25:18 +02009056 debug_printf_exec("CASE word1:'%s'\n", case_word);
9057 //unbackslash(case_word);
9058 //debug_printf_exec("CASE word2:'%s'\n", case_word);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009059 continue;
9060 }
9061 if (rword == RES_MATCH) {
9062 char **argv;
9063
Denys Vlasenkoaeaee432016-11-04 20:14:04 +01009064 debug_printf_exec("MATCH cond_code:%d\n", cond_code);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009065 if (!case_word) /* "case ... matched_word) ... WORD)": we executed selected branch, stop */
9066 break;
9067 /* all prev words didn't match, does this one match? */
9068 argv = pi->cmds->argv;
9069 while (*argv) {
Denys Vlasenko34179952018-04-11 13:47:59 +02009070 char *pattern;
9071 debug_printf_exec("expand_string_to_string('%s')\n", *argv);
9072 pattern = expand_string_to_string(*argv,
9073 EXP_FLAG_ESC_GLOB_CHARS,
9074 /*unbackslash:*/ 0
9075 );
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009076 /* TODO: which FNM_xxx flags to use? */
9077 cond_code = (fnmatch(pattern, case_word, /*flags:*/ 0) != 0);
Denys Vlasenko34179952018-04-11 13:47:59 +02009078 debug_printf_exec("fnmatch(pattern:'%s',str:'%s'):%d\n",
9079 pattern, case_word, cond_code);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009080 free(pattern);
Denys Vlasenko34179952018-04-11 13:47:59 +02009081 if (cond_code == 0) {
9082 /* match! we will execute this branch */
Denys Vlasenkoaeaee432016-11-04 20:14:04 +01009083 free(case_word);
9084 case_word = NULL; /* make future "word)" stop */
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009085 break;
9086 }
9087 argv++;
9088 }
9089 continue;
9090 }
9091 if (rword == RES_CASE_BODY) { /* inside of a case branch */
Denys Vlasenkoaeaee432016-11-04 20:14:04 +01009092 debug_printf_exec("CASE_BODY cond_code:%d\n", cond_code);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009093 if (cond_code != 0)
9094 continue; /* not matched yet, skip this pipe */
9095 }
Denys Vlasenkoaeaee432016-11-04 20:14:04 +01009096 if (rword == RES_ESAC) {
9097 debug_printf_exec("ESAC cond_code:%d\n", cond_code);
9098 if (case_word) {
9099 /* "case" did not match anything: still set $? (to 0) */
9100 G.last_exitcode = rcode = EXIT_SUCCESS;
9101 }
9102 }
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009103#endif
9104 /* Just pressing <enter> in shell should check for jobs.
9105 * OTOH, in non-interactive shell this is useless
9106 * and only leads to extra job checks */
9107 if (pi->num_cmds == 0) {
9108 if (G_interactive_fd)
9109 goto check_jobs_and_continue;
9110 continue;
9111 }
9112
9113 /* After analyzing all keywords and conditions, we decided
9114 * to execute this pipe. NB: have to do checkjobs(NULL)
9115 * after run_pipe to collect any background children,
9116 * even if list execution is to be stopped. */
9117 debug_printf_exec(": run_pipe with %d members\n", pi->num_cmds);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009118#if ENABLE_HUSH_LOOPS
Denys Vlasenko5cc9bf62016-11-08 17:34:44 +01009119 G.flag_break_continue = 0;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009120#endif
Denys Vlasenko5cc9bf62016-11-08 17:34:44 +01009121 rcode = r = run_pipe(pi); /* NB: rcode is a smalluint, r is int */
9122 if (r != -1) {
9123 /* We ran a builtin, function, or group.
9124 * rcode is already known
9125 * and we don't need to wait for anything. */
9126 debug_printf_exec(": builtin/func exitcode %d\n", rcode);
9127 G.last_exitcode = rcode;
9128 check_and_run_traps();
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009129#if ENABLE_HUSH_LOOPS
Denys Vlasenko5cc9bf62016-11-08 17:34:44 +01009130 /* Was it "break" or "continue"? */
9131 if (G.flag_break_continue) {
9132 smallint fbc = G.flag_break_continue;
9133 /* We might fall into outer *loop*,
9134 * don't want to break it too */
9135 if (loop_top) {
9136 G.depth_break_continue--;
9137 if (G.depth_break_continue == 0)
9138 G.flag_break_continue = 0;
9139 /* else: e.g. "continue 2" should *break* once, *then* continue */
9140 } /* else: "while... do... { we are here (innermost list is not a loop!) };...done" */
9141 if (G.depth_break_continue != 0 || fbc == BC_BREAK) {
Denys Vlasenko7e675362016-10-28 21:57:31 +02009142 checkjobs(NULL, 0 /*(no pid to wait for)*/);
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009143 break;
9144 }
Denys Vlasenko5cc9bf62016-11-08 17:34:44 +01009145 /* "continue": simulate end of loop */
9146 rword = RES_DONE;
9147 continue;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009148 }
Denys Vlasenko5cc9bf62016-11-08 17:34:44 +01009149#endif
9150 if (G_flag_return_in_progress == 1) {
9151 checkjobs(NULL, 0 /*(no pid to wait for)*/);
9152 break;
9153 }
9154 } else if (pi->followup == PIPE_BG) {
9155 /* What does bash do with attempts to background builtins? */
9156 /* even bash 3.2 doesn't do that well with nested bg:
9157 * try "{ { sleep 10; echo DEEP; } & echo HERE; } &".
9158 * I'm NOT treating inner &'s as jobs */
9159#if ENABLE_HUSH_JOB
9160 if (G.run_list_level == 1)
Denys Vlasenko16096292017-07-10 10:00:28 +02009161 insert_job_into_table(pi);
Denys Vlasenko5cc9bf62016-11-08 17:34:44 +01009162#endif
9163 /* Last command's pid goes to $! */
9164 G.last_bg_pid = pi->cmds[pi->num_cmds - 1].pid;
Denys Vlasenko840a4352017-07-07 22:56:02 +02009165 G.last_bg_pid_exitcode = 0;
Denys Vlasenko5cc9bf62016-11-08 17:34:44 +01009166 debug_printf_exec(": cmd&: exitcode EXIT_SUCCESS\n");
Denys Vlasenko7c40ddd2017-08-02 16:37:39 +02009167/* Check pi->pi_inverted? "! sleep 1 & echo $?": bash says 1. dash and ash say 0 */
Denys Vlasenko6c635d62016-11-08 20:26:11 +01009168 rcode = EXIT_SUCCESS;
9169 goto check_traps;
Denys Vlasenko5cc9bf62016-11-08 17:34:44 +01009170 } else {
9171#if ENABLE_HUSH_JOB
9172 if (G.run_list_level == 1 && G_interactive_fd) {
9173 /* Waits for completion, then fg's main shell */
9174 rcode = checkjobs_and_fg_shell(pi);
9175 debug_printf_exec(": checkjobs_and_fg_shell exitcode %d\n", rcode);
Denys Vlasenko6c635d62016-11-08 20:26:11 +01009176 goto check_traps;
Denys Vlasenko5cc9bf62016-11-08 17:34:44 +01009177 }
Denys Vlasenko6c635d62016-11-08 20:26:11 +01009178#endif
9179 /* This one just waits for completion */
9180 rcode = checkjobs(pi, 0 /*(no pid to wait for)*/);
9181 debug_printf_exec(": checkjobs exitcode %d\n", rcode);
9182 check_traps:
Denys Vlasenko5cc9bf62016-11-08 17:34:44 +01009183 G.last_exitcode = rcode;
9184 check_and_run_traps();
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009185 }
9186
Denys Vlasenko9fda6092017-07-14 13:36:48 +02009187 /* Handle "set -e" */
9188 if (rcode != 0 && G.o_opt[OPT_O_ERREXIT]) {
9189 debug_printf_exec("ERREXIT:1 errexit_depth:%d\n", G.errexit_depth);
9190 if (G.errexit_depth == 0)
9191 hush_exit(rcode);
9192 }
9193 G.errexit_depth = sv_errexit_depth;
9194
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009195 /* Analyze how result affects subsequent commands */
9196#if ENABLE_HUSH_IF
9197 if (rword == RES_IF || rword == RES_ELIF)
9198 cond_code = rcode;
9199#endif
Denys Vlasenko3beab832013-04-07 18:16:58 +02009200 check_jobs_and_continue:
Denys Vlasenko7e675362016-10-28 21:57:31 +02009201 checkjobs(NULL, 0 /*(no pid to wait for)*/);
Denys Vlasenko3beab832013-04-07 18:16:58 +02009202 dont_check_jobs_but_continue: ;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009203#if ENABLE_HUSH_LOOPS
9204 /* Beware of "while false; true; do ..."! */
Denys Vlasenko00ae9892011-05-31 17:35:45 +02009205 if (pi->next
9206 && (pi->next->res_word == RES_DO || pi->next->res_word == RES_DONE)
Denys Vlasenko56a3b822011-06-01 12:47:07 +02009207 /* check for RES_DONE is needed for "while ...; do \n done" case */
Denys Vlasenko00ae9892011-05-31 17:35:45 +02009208 ) {
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009209 if (rword == RES_WHILE) {
9210 if (rcode) {
9211 /* "while false; do...done" - exitcode 0 */
9212 G.last_exitcode = rcode = EXIT_SUCCESS;
9213 debug_printf_exec(": while expr is false: breaking (exitcode:EXIT_SUCCESS)\n");
Denys Vlasenko3beab832013-04-07 18:16:58 +02009214 break;
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009215 }
9216 }
9217 if (rword == RES_UNTIL) {
9218 if (!rcode) {
9219 debug_printf_exec(": until expr is true: breaking\n");
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009220 break;
9221 }
9222 }
9223 }
9224#endif
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009225 } /* for (pi) */
9226
9227#if ENABLE_HUSH_JOB
9228 G.run_list_level--;
9229#endif
9230#if ENABLE_HUSH_LOOPS
9231 if (loop_top)
9232 G.depth_of_loop--;
9233 free(for_list);
9234#endif
9235#if ENABLE_HUSH_CASE
9236 free(case_word);
9237#endif
9238 debug_leave();
9239 debug_printf_exec("run_list lvl %d return %d\n", G.run_list_level + 1, rcode);
9240 return rcode;
9241}
9242
9243/* Select which version we will use */
9244static int run_and_free_list(struct pipe *pi)
9245{
9246 int rcode = 0;
9247 debug_printf_exec("run_and_free_list entered\n");
Dan Fandrich85c62472010-11-20 13:05:17 -08009248 if (!G.o_opt[OPT_O_NOEXEC]) {
Denys Vlasenkob36abf22010-09-05 14:50:59 +02009249 debug_printf_exec(": run_list: 1st pipe with %d cmds\n", pi->num_cmds);
9250 rcode = run_list(pi);
9251 }
9252 /* free_pipe_list has the side effect of clearing memory.
9253 * In the long run that function can be merged with run_list,
9254 * but doing that now would hobble the debugging effort. */
9255 free_pipe_list(pi);
9256 debug_printf_exec("run_and_free_list return %d\n", rcode);
9257 return rcode;
9258}
9259
9260
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009261static void install_sighandlers(unsigned mask)
Eric Andersen52a97ca2001-06-22 06:49:26 +00009262{
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009263 sighandler_t old_handler;
9264 unsigned sig = 0;
9265 while ((mask >>= 1) != 0) {
9266 sig++;
9267 if (!(mask & 1))
9268 continue;
Denys Vlasenko0806e402011-05-12 23:06:20 +02009269 old_handler = install_sighandler(sig, pick_sighandler(sig));
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009270 /* POSIX allows shell to re-enable SIGCHLD
9271 * even if it was SIG_IGN on entry.
9272 * Therefore we skip IGN check for it:
9273 */
9274 if (sig == SIGCHLD)
9275 continue;
Denys Vlasenko49e6bf22017-08-04 14:28:16 +02009276 /* bash re-enables SIGHUP which is SIG_IGNed on entry.
9277 * Try: "trap '' HUP; bash; echo RET" and type "kill -HUP $$"
9278 */
9279 //if (sig == SIGHUP) continue; - TODO?
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009280 if (old_handler == SIG_IGN) {
9281 /* oops... restore back to IGN, and record this fact */
Denys Vlasenko0806e402011-05-12 23:06:20 +02009282 install_sighandler(sig, old_handler);
Denys Vlasenko7a85c602017-01-08 17:40:18 +01009283#if ENABLE_HUSH_TRAP
9284 if (!G_traps)
9285 G_traps = xzalloc(sizeof(G_traps[0]) * NSIG);
9286 free(G_traps[sig]);
9287 G_traps[sig] = xzalloc(1); /* == xstrdup(""); */
9288#endif
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009289 }
9290 }
9291}
9292
9293/* Called a few times only (or even once if "sh -c") */
9294static void install_special_sighandlers(void)
9295{
Denis Vlasenkof9375282009-04-05 19:13:39 +00009296 unsigned mask;
Denys Vlasenkoe89a2412010-01-12 15:19:31 +01009297
Denys Vlasenko54e9e122011-05-09 00:52:15 +02009298 /* Which signals are shell-special? */
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009299 mask = (1 << SIGQUIT) | (1 << SIGCHLD);
Denys Vlasenko54e9e122011-05-09 00:52:15 +02009300 if (G_interactive_fd) {
9301 mask |= SPECIAL_INTERACTIVE_SIGS;
9302 if (G_saved_tty_pgrp) /* we have ctty, job control sigs work */
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009303 mask |= SPECIAL_JOBSTOP_SIGS;
Denys Vlasenko54e9e122011-05-09 00:52:15 +02009304 }
Denys Vlasenkof58f7052011-05-12 02:10:33 +02009305 /* Careful, do not re-install handlers we already installed */
9306 if (G.special_sig_mask != mask) {
9307 unsigned diff = mask & ~G.special_sig_mask;
9308 G.special_sig_mask = mask;
9309 install_sighandlers(diff);
9310 }
Denis Vlasenkof9375282009-04-05 19:13:39 +00009311}
9312
9313#if ENABLE_HUSH_JOB
9314/* helper */
Denys Vlasenko54e9e122011-05-09 00:52:15 +02009315/* Set handlers to restore tty pgrp and exit */
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009316static void install_fatal_sighandlers(void)
Denis Vlasenkof9375282009-04-05 19:13:39 +00009317{
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009318 unsigned mask;
Denys Vlasenko54e9e122011-05-09 00:52:15 +02009319
9320 /* We will restore tty pgrp on these signals */
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009321 mask = 0
Denys Vlasenko830ea352016-11-08 04:59:11 +01009322 /*+ (1 << SIGILL ) * HUSH_DEBUG*/
9323 /*+ (1 << SIGFPE ) * HUSH_DEBUG*/
Denys Vlasenko54e9e122011-05-09 00:52:15 +02009324 + (1 << SIGBUS ) * HUSH_DEBUG
9325 + (1 << SIGSEGV) * HUSH_DEBUG
Denys Vlasenko830ea352016-11-08 04:59:11 +01009326 /*+ (1 << SIGTRAP) * HUSH_DEBUG*/
Denys Vlasenko54e9e122011-05-09 00:52:15 +02009327 + (1 << SIGABRT)
9328 /* bash 3.2 seems to handle these just like 'fatal' ones */
9329 + (1 << SIGPIPE)
9330 + (1 << SIGALRM)
Denys Vlasenkof58f7052011-05-12 02:10:33 +02009331 /* if we are interactive, SIGHUP, SIGTERM and SIGINT are special sigs.
Denys Vlasenko54e9e122011-05-09 00:52:15 +02009332 * if we aren't interactive... but in this case
Denys Vlasenkof58f7052011-05-12 02:10:33 +02009333 * we never want to restore pgrp on exit, and this fn is not called
9334 */
Denys Vlasenko54e9e122011-05-09 00:52:15 +02009335 /*+ (1 << SIGHUP )*/
9336 /*+ (1 << SIGTERM)*/
9337 /*+ (1 << SIGINT )*/
9338 ;
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009339 G_fatal_sig_mask = mask;
Denys Vlasenko54e9e122011-05-09 00:52:15 +02009340
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009341 install_sighandlers(mask);
Denis Vlasenkof9375282009-04-05 19:13:39 +00009342}
Denis Vlasenkob81b3df2007-04-28 16:48:04 +00009343#endif
Eric Andersenada18ff2001-05-21 16:18:22 +00009344
Denys Vlasenko6696eac2010-11-14 02:01:50 +01009345static int set_mode(int state, char mode, const char *o_opt)
Denis Vlasenkod5762932009-03-31 11:22:57 +00009346{
Denys Vlasenko6696eac2010-11-14 02:01:50 +01009347 int idx;
Denis Vlasenkod5762932009-03-31 11:22:57 +00009348 switch (mode) {
Denys Vlasenko6696eac2010-11-14 02:01:50 +01009349 case 'n':
Dan Fandrich85c62472010-11-20 13:05:17 -08009350 G.o_opt[OPT_O_NOEXEC] = state;
Denys Vlasenko6696eac2010-11-14 02:01:50 +01009351 break;
9352 case 'x':
9353 IF_HUSH_MODE_X(G_x_mode = state;)
9354 break;
9355 case 'o':
9356 if (!o_opt) {
9357 /* "set -+o" without parameter.
9358 * in bash, set -o produces this output:
9359 * pipefail off
9360 * and set +o:
9361 * set +o pipefail
9362 * We always use the second form.
9363 */
9364 const char *p = o_opt_strings;
9365 idx = 0;
9366 while (*p) {
9367 printf("set %co %s\n", (G.o_opt[idx] ? '-' : '+'), p);
9368 idx++;
9369 p += strlen(p) + 1;
9370 }
9371 break;
9372 }
9373 idx = index_in_strings(o_opt_strings, o_opt);
9374 if (idx >= 0) {
9375 G.o_opt[idx] = state;
9376 break;
9377 }
Denys Vlasenko9fda6092017-07-14 13:36:48 +02009378 case 'e':
9379 G.o_opt[OPT_O_ERREXIT] = state;
9380 break;
Denys Vlasenko6696eac2010-11-14 02:01:50 +01009381 default:
9382 return EXIT_FAILURE;
Denis Vlasenkod5762932009-03-31 11:22:57 +00009383 }
9384 return EXIT_SUCCESS;
9385}
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00009386
Denis Vlasenko9b49a5e2007-10-11 10:05:36 +00009387int hush_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
Matt Kraai2d91deb2001-08-01 17:21:35 +00009388int hush_main(int argc, char **argv)
Eric Andersen25f27032001-04-26 23:22:31 +00009389{
Denys Vlasenkof58f7052011-05-12 02:10:33 +02009390 enum {
9391 OPT_login = (1 << 0),
Denys Vlasenkof2ed39b2018-04-05 16:46:49 +02009392 OPT_s = (1 << 1),
Denys Vlasenkof58f7052011-05-12 02:10:33 +02009393 };
9394 unsigned flags;
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02009395 unsigned builtin_argc;
Denis Vlasenkofbf6dea2007-04-13 19:56:56 +00009396 char **e;
Denis Vlasenkod76c0492007-05-25 02:16:25 +00009397 struct variable *cur_var;
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01009398 struct variable *shell_ver;
Eric Andersenbc604a22001-05-16 05:24:03 +00009399
Denis Vlasenko574f2f42008-02-27 18:41:59 +00009400 INIT_G();
Denys Vlasenko10c01312011-05-11 11:49:21 +02009401 if (EXIT_SUCCESS != 0) /* if EXIT_SUCCESS == 0, it is already done */
Denis Vlasenkoab2b0642009-04-06 18:42:11 +00009402 G.last_exitcode = EXIT_SUCCESS;
Denys Vlasenkoe9abe752016-08-19 20:15:26 +02009403
Denys Vlasenko10c01312011-05-11 11:49:21 +02009404#if ENABLE_HUSH_FAST
9405 G.count_SIGCHLD++; /* ensure it is != G.handled_SIGCHLD */
9406#endif
Denis Vlasenko46f9b6d2009-04-05 10:39:03 +00009407#if !BB_MMU
9408 G.argv0_for_re_execing = argv[0];
9409#endif
Denys Vlasenko6aad1dd2018-01-19 15:37:04 +01009410
Denis Vlasenko0a83fc32007-05-25 11:12:32 +00009411 /* Deal with HUSH_VERSION */
Denys Vlasenko6aad1dd2018-01-19 15:37:04 +01009412 debug_printf_env("unsetenv '%s'\n", "HUSH_VERSION");
9413 unsetenv("HUSH_VERSION"); /* in case it exists in initial env */
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01009414 shell_ver = xzalloc(sizeof(*shell_ver));
9415 shell_ver->flg_export = 1;
9416 shell_ver->flg_read_only = 1;
Denys Vlasenko4f870492010-09-10 11:06:01 +02009417 /* Code which handles ${var<op>...} needs writable values for all variables,
Denys Vlasenko36f774a2010-09-05 14:45:38 +02009418 * therefore we xstrdup: */
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01009419 shell_ver->varstr = xstrdup(hush_version_str);
Denys Vlasenko6aad1dd2018-01-19 15:37:04 +01009420
Denys Vlasenko605067b2010-09-06 12:10:51 +02009421 /* Create shell local variables from the values
9422 * currently living in the environment */
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01009423 G.top_var = shell_ver;
Denis Vlasenko87a86552008-07-29 19:43:10 +00009424 cur_var = G.top_var;
Denis Vlasenko0a83fc32007-05-25 11:12:32 +00009425 e = environ;
Denis Vlasenkod76c0492007-05-25 02:16:25 +00009426 if (e) while (*e) {
9427 char *value = strchr(*e, '=');
9428 if (value) { /* paranoia */
9429 cur_var->next = xzalloc(sizeof(*cur_var));
9430 cur_var = cur_var->next;
Denis Vlasenko28c0f0f2007-05-25 02:46:01 +00009431 cur_var->varstr = *e;
Denis Vlasenkod76c0492007-05-25 02:16:25 +00009432 cur_var->max_len = strlen(*e);
9433 cur_var->flg_export = 1;
9434 }
9435 e++;
9436 }
Denys Vlasenko605067b2010-09-06 12:10:51 +02009437 /* (Re)insert HUSH_VERSION into env (AFTER we scanned the env!) */
Denys Vlasenko75eb9d22010-12-21 21:18:12 +01009438 debug_printf_env("putenv '%s'\n", shell_ver->varstr);
9439 putenv(shell_ver->varstr);
Denys Vlasenko6db47842009-09-05 20:15:17 +02009440
9441 /* Export PWD */
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02009442 set_pwd_var(SETFLAG_EXPORT);
Denys Vlasenko3fa97af2014-04-15 11:43:29 +02009443
Denys Vlasenkof5018da2018-04-06 17:58:21 +02009444#if ENABLE_HUSH_INTERACTIVE && ENABLE_FEATURE_EDITING_FANCY_PROMPT
9445 /* Set (but not export) PS1/2 unless already set */
9446 if (!get_local_var_value("PS1"))
9447 set_local_var_from_halves("PS1", "\\w \\$ ");
9448 if (!get_local_var_value("PS2"))
9449 set_local_var_from_halves("PS2", "> ");
9450#endif
9451
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01009452#if BASH_HOSTNAME_VAR
Denys Vlasenko3fa97af2014-04-15 11:43:29 +02009453 /* Set (but not export) HOSTNAME unless already set */
9454 if (!get_local_var_value("HOSTNAME")) {
9455 struct utsname uts;
9456 uname(&uts);
9457 set_local_var_from_halves("HOSTNAME", uts.nodename);
9458 }
Denys Vlasenko6db47842009-09-05 20:15:17 +02009459 /* bash also exports SHLVL and _,
9460 * and sets (but doesn't export) the following variables:
9461 * BASH=/bin/bash
9462 * BASH_VERSINFO=([0]="3" [1]="2" [2]="0" [3]="1" [4]="release" [5]="i386-pc-linux-gnu")
9463 * BASH_VERSION='3.2.0(1)-release'
9464 * HOSTTYPE=i386
9465 * MACHTYPE=i386-pc-linux-gnu
9466 * OSTYPE=linux-gnu
Denys Vlasenkodea47882009-10-09 15:40:49 +02009467 * PPID=<NNNNN> - we also do it elsewhere
Denys Vlasenko6db47842009-09-05 20:15:17 +02009468 * EUID=<NNNNN>
9469 * UID=<NNNNN>
9470 * GROUPS=()
9471 * LINES=<NNN>
9472 * COLUMNS=<NNN>
9473 * BASH_ARGC=()
9474 * BASH_ARGV=()
9475 * BASH_LINENO=()
9476 * BASH_SOURCE=()
9477 * DIRSTACK=()
9478 * PIPESTATUS=([0]="0")
9479 * HISTFILE=/<xxx>/.bash_history
9480 * HISTFILESIZE=500
9481 * HISTSIZE=500
9482 * MAILCHECK=60
9483 * PATH=/usr/gnu/bin:/usr/local/bin:/bin:/usr/bin:.
9484 * SHELL=/bin/bash
9485 * SHELLOPTS=braceexpand:emacs:hashall:histexpand:history:interactive-comments:monitor
9486 * TERM=dumb
9487 * OPTERR=1
9488 * OPTIND=1
9489 * IFS=$' \t\n'
Denys Vlasenko6db47842009-09-05 20:15:17 +02009490 * PS4='+ '
9491 */
Denys Vlasenko3fa97af2014-04-15 11:43:29 +02009492#endif
Denys Vlasenko6db47842009-09-05 20:15:17 +02009493
Denys Vlasenko5807e182018-02-08 19:19:04 +01009494#if ENABLE_HUSH_LINENO_VAR
9495 if (ENABLE_HUSH_LINENO_VAR) {
Denys Vlasenko6aad1dd2018-01-19 15:37:04 +01009496 char *p = xasprintf("LINENO=%*s", (int)(sizeof(int)*3), "");
9497 set_local_var(p, /*flags*/ 0);
9498 G.lineno_var = p; /* can't assign before set_local_var("LINENO=...") */
9499 }
9500#endif
9501
Denis Vlasenko38f63192007-01-22 09:03:07 +00009502#if ENABLE_FEATURE_EDITING
Denys Vlasenkoe45af7a2011-09-04 16:15:24 +02009503 G.line_input_state = new_line_input_t(FOR_SHELL);
Denis Vlasenko8e1c7152007-01-22 07:21:38 +00009504#endif
Denys Vlasenko99862cb2010-09-12 17:34:13 +02009505
Eric Andersen94ac2442001-05-22 19:05:18 +00009506 /* Initialize some more globals to non-zero values */
Mike Frysinger67c1c7b2009-04-24 06:26:18 +00009507 cmdedit_update_prompt();
Denis Vlasenkoc8be5ee2007-05-17 15:38:46 +00009508
Denys Vlasenkoe9abe752016-08-19 20:15:26 +02009509 die_func = restore_ttypgrp_and__exit;
Denis Vlasenkoed782372009-04-10 00:45:02 +00009510
Denis Vlasenkoc4a7af52009-04-05 20:33:27 +00009511 /* Shell is non-interactive at first. We need to call
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009512 * install_special_sighandlers() if we are going to execute "sh <script>",
Denis Vlasenkod3f973e2009-04-06 10:21:42 +00009513 * "sh -c <cmds>" or login shell's /etc/profile and friends.
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009514 * If we later decide that we are interactive, we run install_special_sighandlers()
Denis Vlasenkoc4a7af52009-04-05 20:33:27 +00009515 * in order to intercept (more) signals.
9516 */
9517
9518 /* Parse options */
Mike Frysinger19a7ea12009-03-28 13:02:11 +00009519 /* http://www.opengroup.org/onlinepubs/9699919799/utilities/sh.html */
Denys Vlasenkof58f7052011-05-12 02:10:33 +02009520 flags = (argv[0] && argv[0][0] == '-') ? OPT_login : 0;
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02009521 builtin_argc = 0;
Denis Vlasenko0bb4a232009-04-05 01:42:59 +00009522 while (1) {
Denys Vlasenkof2ed39b2018-04-05 16:46:49 +02009523 int opt = getopt(argc, argv, "+c:exinsl"
Denis Vlasenko0bb4a232009-04-05 01:42:59 +00009524#if !BB_MMU
Denis Vlasenkobc569742009-04-12 20:35:19 +00009525 "<:$:R:V:"
9526# if ENABLE_HUSH_FUNCTIONS
9527 "F:"
9528# endif
Denis Vlasenko0bb4a232009-04-05 01:42:59 +00009529#endif
9530 );
9531 if (opt <= 0)
9532 break;
Eric Andersen25f27032001-04-26 23:22:31 +00009533 switch (opt) {
Denis Vlasenkofbf6dea2007-04-13 19:56:56 +00009534 case 'c':
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02009535 /* Possibilities:
9536 * sh ... -c 'script'
9537 * sh ... -c 'script' ARG0 [ARG1...]
9538 * On NOMMU, if builtin_argc != 0,
Denys Vlasenko17323a62010-01-28 01:57:05 +01009539 * sh ... -c 'builtin' BARGV... "" ARG0 [ARG1...]
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02009540 * "" needs to be replaced with NULL
9541 * and BARGV vector fed to builtin function.
Denys Vlasenko17323a62010-01-28 01:57:05 +01009542 * Note: the form without ARG0 never happens:
9543 * sh ... -c 'builtin' BARGV... ""
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02009544 */
Denys Vlasenkodea47882009-10-09 15:40:49 +02009545 if (!G.root_pid) {
Denis Vlasenko46f9b6d2009-04-05 10:39:03 +00009546 G.root_pid = getpid();
Denys Vlasenkodea47882009-10-09 15:40:49 +02009547 G.root_ppid = getppid();
9548 }
Denis Vlasenko87a86552008-07-29 19:43:10 +00009549 G.global_argv = argv + optind;
9550 G.global_argc = argc - optind;
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02009551 if (builtin_argc) {
9552 /* -c 'builtin' [BARGV...] "" ARG0 [ARG1...] */
9553 const struct built_in_command *x;
9554
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009555 install_special_sighandlers();
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02009556 x = find_builtin(optarg);
9557 if (x) { /* paranoia */
9558 G.global_argc -= builtin_argc; /* skip [BARGV...] "" */
9559 G.global_argv += builtin_argc;
9560 G.global_argv[-1] = NULL; /* replace "" */
Denys Vlasenko8ee2ada2011-02-07 02:03:51 +01009561 fflush_all();
Denys Vlasenko17323a62010-01-28 01:57:05 +01009562 G.last_exitcode = x->b_function(argv + optind - 1);
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02009563 }
9564 goto final_return;
9565 }
9566 if (!G.global_argv[0]) {
9567 /* -c 'script' (no params): prevent empty $0 */
9568 G.global_argv--; /* points to argv[i] of 'script' */
9569 G.global_argv[0] = argv[0];
Denys Vlasenko5ae8f1c2010-05-22 06:32:11 +02009570 G.global_argc++;
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02009571 } /* else -c 'script' ARG0 [ARG1...]: $0 is ARG0 */
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009572 install_special_sighandlers();
Denis Vlasenkob6e65562009-04-03 16:49:04 +00009573 parse_and_run_string(optarg);
Denis Vlasenkofbf6dea2007-04-13 19:56:56 +00009574 goto final_return;
9575 case 'i':
Denis Vlasenkoc666f712007-05-16 22:18:54 +00009576 /* Well, we cannot just declare interactiveness,
9577 * we have to have some stuff (ctty, etc) */
Denis Vlasenko60b392f2009-04-03 19:14:32 +00009578 /* G_interactive_fd++; */
Denis Vlasenkofbf6dea2007-04-13 19:56:56 +00009579 break;
Mike Frysinger19a7ea12009-03-28 13:02:11 +00009580 case 's':
Denys Vlasenkof2ed39b2018-04-05 16:46:49 +02009581 flags |= OPT_s;
Mike Frysinger19a7ea12009-03-28 13:02:11 +00009582 break;
Denys Vlasenkof58f7052011-05-12 02:10:33 +02009583 case 'l':
9584 flags |= OPT_login;
9585 break;
Denis Vlasenko0bb4a232009-04-05 01:42:59 +00009586#if !BB_MMU
Denis Vlasenko50f3aa42009-04-07 10:52:40 +00009587 case '<': /* "big heredoc" support */
Denys Vlasenko729ecb82010-06-07 14:14:26 +02009588 full_write1_str(optarg);
Denis Vlasenko50f3aa42009-04-07 10:52:40 +00009589 _exit(0);
Denys Vlasenkoe89a2412010-01-12 15:19:31 +01009590 case '$': {
9591 unsigned long long empty_trap_mask;
9592
Denis Vlasenko34e573d2009-04-06 12:56:28 +00009593 G.root_pid = bb_strtou(optarg, &optarg, 16);
9594 optarg++;
Denys Vlasenkodea47882009-10-09 15:40:49 +02009595 G.root_ppid = bb_strtou(optarg, &optarg, 16);
9596 optarg++;
Denis Vlasenko34e573d2009-04-06 12:56:28 +00009597 G.last_bg_pid = bb_strtou(optarg, &optarg, 16);
9598 optarg++;
Denis Vlasenkoab2b0642009-04-06 18:42:11 +00009599 G.last_exitcode = bb_strtou(optarg, &optarg, 16);
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +02009600 optarg++;
9601 builtin_argc = bb_strtou(optarg, &optarg, 16);
Denys Vlasenkoe89a2412010-01-12 15:19:31 +01009602 optarg++;
9603 empty_trap_mask = bb_strtoull(optarg, &optarg, 16);
9604 if (empty_trap_mask != 0) {
Denys Vlasenko4ee824f2017-07-03 01:22:13 +02009605 IF_HUSH_TRAP(int sig;)
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009606 install_special_sighandlers();
Denys Vlasenko4ee824f2017-07-03 01:22:13 +02009607# if ENABLE_HUSH_TRAP
Denys Vlasenko7a85c602017-01-08 17:40:18 +01009608 G_traps = xzalloc(sizeof(G_traps[0]) * NSIG);
Denys Vlasenkoe89a2412010-01-12 15:19:31 +01009609 for (sig = 1; sig < NSIG; sig++) {
9610 if (empty_trap_mask & (1LL << sig)) {
Denys Vlasenko7a85c602017-01-08 17:40:18 +01009611 G_traps[sig] = xzalloc(1); /* == xstrdup(""); */
Denys Vlasenko0806e402011-05-12 23:06:20 +02009612 install_sighandler(sig, SIG_IGN);
Denys Vlasenkoe89a2412010-01-12 15:19:31 +01009613 }
9614 }
Denys Vlasenko4ee824f2017-07-03 01:22:13 +02009615# endif
Denys Vlasenkoe89a2412010-01-12 15:19:31 +01009616 }
Denis Vlasenkod3f973e2009-04-06 10:21:42 +00009617# if ENABLE_HUSH_LOOPS
Denis Vlasenko34e573d2009-04-06 12:56:28 +00009618 optarg++;
9619 G.depth_of_loop = bb_strtou(optarg, &optarg, 16);
Denis Vlasenkod3f973e2009-04-06 10:21:42 +00009620# endif
Denys Vlasenkoeb0de052018-04-09 17:54:07 +02009621# if ENABLE_HUSH_FUNCTIONS
9622 /* nommu uses re-exec trick for "... | func | ...",
9623 * should allow "return".
9624 * This accidentally allows returns in subshells.
9625 */
9626 G_flag_return_in_progress = -1;
9627# endif
Denis Vlasenko34e573d2009-04-06 12:56:28 +00009628 break;
Denys Vlasenkoe89a2412010-01-12 15:19:31 +01009629 }
Denis Vlasenko0bb4a232009-04-05 01:42:59 +00009630 case 'R':
9631 case 'V':
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02009632 set_local_var(xstrdup(optarg), opt == 'R' ? SETFLAG_MAKE_RO : 0);
Denis Vlasenko0bb4a232009-04-05 01:42:59 +00009633 break;
Denis Vlasenkobc569742009-04-12 20:35:19 +00009634# if ENABLE_HUSH_FUNCTIONS
9635 case 'F': {
9636 struct function *funcp = new_function(optarg);
9637 /* funcp->name is already set to optarg */
9638 /* funcp->body is set to NULL. It's a special case. */
9639 funcp->body_as_string = argv[optind];
9640 optind++;
9641 break;
9642 }
9643# endif
Denis Vlasenko0bb4a232009-04-05 01:42:59 +00009644#endif
Mike Frysingerad88d5a2009-03-28 13:44:51 +00009645 case 'n':
9646 case 'x':
Denys Vlasenko9fda6092017-07-14 13:36:48 +02009647 case 'e':
Denys Vlasenko6696eac2010-11-14 02:01:50 +01009648 if (set_mode(1, opt, NULL) == 0) /* no error */
Mike Frysingerad88d5a2009-03-28 13:44:51 +00009649 break;
Denis Vlasenkofbf6dea2007-04-13 19:56:56 +00009650 default:
Eric Andersen9ffb7dd2001-05-19 03:00:46 +00009651#ifndef BB_VER
Denis Vlasenkofbf6dea2007-04-13 19:56:56 +00009652 fprintf(stderr, "Usage: sh [FILE]...\n"
9653 " or: sh -c command [args]...\n\n");
9654 exit(EXIT_FAILURE);
Eric Andersen9ffb7dd2001-05-19 03:00:46 +00009655#else
Denis Vlasenkofbf6dea2007-04-13 19:56:56 +00009656 bb_show_usage();
Eric Andersen9ffb7dd2001-05-19 03:00:46 +00009657#endif
Eric Andersen25f27032001-04-26 23:22:31 +00009658 }
Denis Vlasenkof9375282009-04-05 19:13:39 +00009659 } /* option parsing loop */
Denis Vlasenko46f9b6d2009-04-05 10:39:03 +00009660
Denys Vlasenkof58f7052011-05-12 02:10:33 +02009661 /* Skip options. Try "hush -l": $1 should not be "-l"! */
9662 G.global_argc = argc - (optind - 1);
9663 G.global_argv = argv + (optind - 1);
9664 G.global_argv[0] = argv[0];
9665
Denys Vlasenkodea47882009-10-09 15:40:49 +02009666 if (!G.root_pid) {
Denis Vlasenko46f9b6d2009-04-05 10:39:03 +00009667 G.root_pid = getpid();
Denys Vlasenkodea47882009-10-09 15:40:49 +02009668 G.root_ppid = getppid();
9669 }
Denis Vlasenkof9375282009-04-05 19:13:39 +00009670
9671 /* If we are login shell... */
Denys Vlasenkof58f7052011-05-12 02:10:33 +02009672 if (flags & OPT_login) {
Denis Vlasenko46f9b6d2009-04-05 10:39:03 +00009673 FILE *input;
Denis Vlasenko46f9b6d2009-04-05 10:39:03 +00009674 debug_printf("sourcing /etc/profile\n");
9675 input = fopen_for_read("/etc/profile");
9676 if (input != NULL) {
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +02009677 remember_FILE(input);
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009678 install_special_sighandlers();
Denis Vlasenko46f9b6d2009-04-05 10:39:03 +00009679 parse_and_run_file(input);
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +02009680 fclose_and_forget(input);
Denis Vlasenko46f9b6d2009-04-05 10:39:03 +00009681 }
Denis Vlasenkof9375282009-04-05 19:13:39 +00009682 /* bash: after sourcing /etc/profile,
9683 * tries to source (in the given order):
9684 * ~/.bash_profile, ~/.bash_login, ~/.profile,
Denys Vlasenko28a105d2009-06-01 11:26:30 +02009685 * stopping on first found. --noprofile turns this off.
Denis Vlasenkof9375282009-04-05 19:13:39 +00009686 * bash also sources ~/.bash_logout on exit.
9687 * If called as sh, skips .bash_XXX files.
9688 */
Denis Vlasenko46f9b6d2009-04-05 10:39:03 +00009689 }
9690
Denys Vlasenkof2ed39b2018-04-05 16:46:49 +02009691 /* -s is: hush -s ARGV1 ARGV2 (no SCRIPT) */
9692 if (!(flags & OPT_s) && G.global_argv[1]) {
Denis Vlasenkof9375282009-04-05 19:13:39 +00009693 FILE *input;
9694 /*
Denis Vlasenkod3f973e2009-04-06 10:21:42 +00009695 * "bash <script>" (which is never interactive (unless -i?))
9696 * sources $BASH_ENV here (without scanning $PATH).
Denis Vlasenkof9375282009-04-05 19:13:39 +00009697 * If called as sh, does the same but with $ENV.
Denys Vlasenko2eb0a7e2016-10-27 11:28:59 +02009698 * Also NB, per POSIX, $ENV should undergo parameter expansion.
Denis Vlasenkof9375282009-04-05 19:13:39 +00009699 */
Denys Vlasenkof58f7052011-05-12 02:10:33 +02009700 G.global_argc--;
9701 G.global_argv++;
9702 debug_printf("running script '%s'\n", G.global_argv[0]);
Denys Vlasenkob7adf7a2016-10-25 17:00:13 +02009703 xfunc_error_retval = 127; /* for "hush /does/not/exist" case */
Denys Vlasenkof58f7052011-05-12 02:10:33 +02009704 input = xfopen_for_read(G.global_argv[0]);
Denys Vlasenkob7adf7a2016-10-25 17:00:13 +02009705 xfunc_error_retval = 1;
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +02009706 remember_FILE(input);
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009707 install_special_sighandlers();
Denis Vlasenkof9375282009-04-05 19:13:39 +00009708 parse_and_run_file(input);
9709#if ENABLE_FEATURE_CLEAN_UP
Denys Vlasenko7b25b1c2016-08-20 15:58:34 +02009710 fclose_and_forget(input);
Denis Vlasenkof9375282009-04-05 19:13:39 +00009711#endif
9712 goto final_return;
9713 }
9714
Denis Vlasenkoc4a7af52009-04-05 20:33:27 +00009715 /* Up to here, shell was non-interactive. Now it may become one.
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009716 * NB: don't forget to (re)run install_special_sighandlers() as needed.
Denis Vlasenkoc4a7af52009-04-05 20:33:27 +00009717 */
Denis Vlasenkof9375282009-04-05 19:13:39 +00009718
Denys Vlasenko28a105d2009-06-01 11:26:30 +02009719 /* A shell is interactive if the '-i' flag was given,
9720 * or if all of the following conditions are met:
Denis Vlasenko55b2de72007-04-18 17:21:28 +00009721 * no -c command
Eric Andersen25f27032001-04-26 23:22:31 +00009722 * no arguments remaining or the -s flag given
9723 * standard input is a terminal
9724 * standard output is a terminal
Denis Vlasenkof9375282009-04-05 19:13:39 +00009725 * Refer to Posix.2, the description of the 'sh' utility.
9726 */
9727#if ENABLE_HUSH_JOB
9728 if (isatty(STDIN_FILENO) && isatty(STDOUT_FILENO)) {
Mike Frysinger38478a62009-05-20 04:48:06 -04009729 G_saved_tty_pgrp = tcgetpgrp(STDIN_FILENO);
9730 debug_printf("saved_tty_pgrp:%d\n", G_saved_tty_pgrp);
9731 if (G_saved_tty_pgrp < 0)
9732 G_saved_tty_pgrp = 0;
Denis Vlasenkoc8653f62009-04-27 23:29:14 +00009733
9734 /* try to dup stdin to high fd#, >= 255 */
Denys Vlasenko9acd63c2018-03-28 18:35:07 +02009735 G_interactive_fd = dup_CLOEXEC(STDIN_FILENO, 254);
Denis Vlasenkoc8653f62009-04-27 23:29:14 +00009736 if (G_interactive_fd < 0) {
9737 /* try to dup to any fd */
9738 G_interactive_fd = dup(STDIN_FILENO);
Denis Vlasenko60b392f2009-04-03 19:14:32 +00009739 if (G_interactive_fd < 0) {
Denis Vlasenkoc8653f62009-04-27 23:29:14 +00009740 /* give up */
9741 G_interactive_fd = 0;
Mike Frysinger38478a62009-05-20 04:48:06 -04009742 G_saved_tty_pgrp = 0;
Denis Vlasenko54e7ffb2007-04-21 00:03:36 +00009743 }
9744 }
Denis Vlasenkoc8653f62009-04-27 23:29:14 +00009745// TODO: track & disallow any attempts of user
9746// to (inadvertently) close/redirect G_interactive_fd
Eric Andersen25f27032001-04-26 23:22:31 +00009747 }
Denis Vlasenkof9375282009-04-05 19:13:39 +00009748 debug_printf("interactive_fd:%d\n", G_interactive_fd);
Denis Vlasenko60b392f2009-04-03 19:14:32 +00009749 if (G_interactive_fd) {
Denis Vlasenkof9375282009-04-05 19:13:39 +00009750 close_on_exec_on(G_interactive_fd);
Denis Vlasenkoc8653f62009-04-27 23:29:14 +00009751
Mike Frysinger38478a62009-05-20 04:48:06 -04009752 if (G_saved_tty_pgrp) {
Denis Vlasenkoc8653f62009-04-27 23:29:14 +00009753 /* If we were run as 'hush &', sleep until we are
9754 * in the foreground (tty pgrp == our pgrp).
9755 * If we get started under a job aware app (like bash),
9756 * make sure we are now in charge so we don't fight over
9757 * who gets the foreground */
9758 while (1) {
9759 pid_t shell_pgrp = getpgrp();
Mike Frysinger38478a62009-05-20 04:48:06 -04009760 G_saved_tty_pgrp = tcgetpgrp(G_interactive_fd);
9761 if (G_saved_tty_pgrp == shell_pgrp)
Denis Vlasenkoc8653f62009-04-27 23:29:14 +00009762 break;
9763 /* send TTIN to ourself (should stop us) */
9764 kill(- shell_pgrp, SIGTTIN);
9765 }
Denis Vlasenkof9375282009-04-05 19:13:39 +00009766 }
Denis Vlasenkoc8653f62009-04-27 23:29:14 +00009767
Denys Vlasenkof58f7052011-05-12 02:10:33 +02009768 /* Install more signal handlers */
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009769 install_special_sighandlers();
Denis Vlasenkoc8653f62009-04-27 23:29:14 +00009770
Mike Frysinger38478a62009-05-20 04:48:06 -04009771 if (G_saved_tty_pgrp) {
Denis Vlasenkoc8653f62009-04-27 23:29:14 +00009772 /* Set other signals to restore saved_tty_pgrp */
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009773 install_fatal_sighandlers();
Denis Vlasenkoc8653f62009-04-27 23:29:14 +00009774 /* Put ourselves in our own process group
9775 * (bash, too, does this only if ctty is available) */
9776 bb_setpgrp(); /* is the same as setpgid(our_pid, our_pid); */
9777 /* Grab control of the terminal */
9778 tcsetpgrp(G_interactive_fd, getpid());
9779 }
Denys Vlasenko550bf5b2015-10-09 16:42:57 +02009780 enable_restore_tty_pgrp_on_exit();
Denys Vlasenko4840ae82011-09-04 15:28:03 +02009781
9782# if ENABLE_HUSH_SAVEHISTORY && MAX_HISTORY > 0
9783 {
9784 const char *hp = get_local_var_value("HISTFILE");
9785 if (!hp) {
9786 hp = get_local_var_value("HOME");
9787 if (hp)
9788 hp = concat_path_file(hp, ".hush_history");
9789 } else {
9790 hp = xstrdup(hp);
9791 }
9792 if (hp) {
9793 G.line_input_state->hist_file = hp;
Denys Vlasenko4840ae82011-09-04 15:28:03 +02009794 //set_local_var(xasprintf("HISTFILE=%s", ...));
9795 }
9796# if ENABLE_FEATURE_SH_HISTFILESIZE
9797 hp = get_local_var_value("HISTFILESIZE");
9798 G.line_input_state->max_history = size_from_HISTFILESIZE(hp);
9799# endif
9800 }
9801# endif
Denys Vlasenkoe89a2412010-01-12 15:19:31 +01009802 } else {
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009803 install_special_sighandlers();
Denys Vlasenkoe89a2412010-01-12 15:19:31 +01009804 }
Denis Vlasenkoe3f2f892007-04-28 16:48:27 +00009805#elif ENABLE_HUSH_INTERACTIVE
Denis Vlasenkof9375282009-04-05 19:13:39 +00009806 /* No job control compiled in, only prompt/line editing */
9807 if (isatty(STDIN_FILENO) && isatty(STDOUT_FILENO)) {
Denys Vlasenko9acd63c2018-03-28 18:35:07 +02009808 G_interactive_fd = dup_CLOEXEC(STDIN_FILENO, 254);
Denis Vlasenko60b392f2009-04-03 19:14:32 +00009809 if (G_interactive_fd < 0) {
Denis Vlasenkoe3f2f892007-04-28 16:48:27 +00009810 /* try to dup to any fd */
Denys Vlasenkod1a83232018-06-26 15:50:33 +02009811 G_interactive_fd = dup_CLOEXEC(STDIN_FILENO, -1);
Denis Vlasenko60b392f2009-04-03 19:14:32 +00009812 if (G_interactive_fd < 0)
Denis Vlasenkoe3f2f892007-04-28 16:48:27 +00009813 /* give up */
Denis Vlasenko60b392f2009-04-03 19:14:32 +00009814 G_interactive_fd = 0;
Denis Vlasenkoe3f2f892007-04-28 16:48:27 +00009815 }
9816 }
Denis Vlasenko60b392f2009-04-03 19:14:32 +00009817 if (G_interactive_fd) {
Denis Vlasenkof9375282009-04-05 19:13:39 +00009818 close_on_exec_on(G_interactive_fd);
Denis Vlasenkof9375282009-04-05 19:13:39 +00009819 }
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009820 install_special_sighandlers();
Denis Vlasenkof9375282009-04-05 19:13:39 +00009821#else
9822 /* We have interactiveness code disabled */
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +02009823 install_special_sighandlers();
Denis Vlasenkof9375282009-04-05 19:13:39 +00009824#endif
9825 /* bash:
9826 * if interactive but not a login shell, sources ~/.bashrc
9827 * (--norc turns this off, --rcfile <file> overrides)
9828 */
9829
9830 if (!ENABLE_FEATURE_SH_EXTRA_QUIET && G_interactive_fd) {
Denys Vlasenkoc34c0332009-09-29 12:25:30 +02009831 /* note: ash and hush share this string */
9832 printf("\n\n%s %s\n"
9833 IF_HUSH_HELP("Enter 'help' for a list of built-in commands.\n")
9834 "\n",
9835 bb_banner,
9836 "hush - the humble shell"
9837 );
Mike Frysingerb2705e12009-03-23 08:44:02 +00009838 }
9839
Denis Vlasenkof9375282009-04-05 19:13:39 +00009840 parse_and_run_file(stdin);
Eric Andersen25f27032001-04-26 23:22:31 +00009841
Denis Vlasenkod76c0492007-05-25 02:16:25 +00009842 final_return:
Denis Vlasenkoab2b0642009-04-06 18:42:11 +00009843 hush_exit(G.last_exitcode);
Eric Andersen25f27032001-04-26 23:22:31 +00009844}
Denis Vlasenko96702ca2007-11-23 23:28:55 +00009845
9846
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00009847/*
9848 * Built-ins
9849 */
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02009850static int FAST_FUNC builtin_true(char **argv UNUSED_PARAM)
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00009851{
9852 return 0;
9853}
9854
Denys Vlasenko265062d2017-01-10 15:13:30 +01009855#if ENABLE_HUSH_TEST || ENABLE_HUSH_ECHO || ENABLE_HUSH_PRINTF || ENABLE_HUSH_KILL
Denys Vlasenko8bc7f2c2009-10-19 13:20:52 +02009856static int run_applet_main(char **argv, int (*applet_main_func)(int argc, char **argv))
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00009857{
Denys Vlasenkod4e4fdb2017-07-03 21:31:16 +02009858 int argc = string_array_len(argv);
9859 return applet_main_func(argc, argv);
Mike Frysingerccb19592009-10-15 03:31:15 -04009860}
Denys Vlasenko265062d2017-01-10 15:13:30 +01009861#endif
Kang-Che Sung027d3ab2017-01-11 14:18:15 +01009862#if ENABLE_HUSH_TEST || BASH_TEST2
Mike Frysingerccb19592009-10-15 03:31:15 -04009863static int FAST_FUNC builtin_test(char **argv)
9864{
Denys Vlasenkoc0836532009-10-19 13:13:06 +02009865 return run_applet_main(argv, test_main);
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00009866}
Denys Vlasenko265062d2017-01-10 15:13:30 +01009867#endif
Denys Vlasenko1cc68042017-01-09 17:10:04 +01009868#if ENABLE_HUSH_ECHO
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02009869static int FAST_FUNC builtin_echo(char **argv)
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00009870{
Denys Vlasenkoc0836532009-10-19 13:13:06 +02009871 return run_applet_main(argv, echo_main);
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00009872}
Denys Vlasenko1cc68042017-01-09 17:10:04 +01009873#endif
Denys Vlasenko1125d7d2017-01-08 17:19:38 +01009874#if ENABLE_HUSH_PRINTF
Mike Frysinger4ebc76c2009-10-15 03:32:39 -04009875static int FAST_FUNC builtin_printf(char **argv)
9876{
Denys Vlasenkoc0836532009-10-19 13:13:06 +02009877 return run_applet_main(argv, printf_main);
Mike Frysinger4ebc76c2009-10-15 03:32:39 -04009878}
9879#endif
9880
Denys Vlasenkoa1184af2017-01-10 15:58:02 +01009881#if ENABLE_HUSH_HELP
9882static int FAST_FUNC builtin_help(char **argv UNUSED_PARAM)
9883{
9884 const struct built_in_command *x;
9885
9886 printf(
9887 "Built-in commands:\n"
9888 "------------------\n");
9889 for (x = bltins1; x != &bltins1[ARRAY_SIZE(bltins1)]; x++) {
9890 if (x->b_descr)
9891 printf("%-10s%s\n", x->b_cmd, x->b_descr);
9892 }
9893 return EXIT_SUCCESS;
9894}
9895#endif
9896
9897#if MAX_HISTORY && ENABLE_FEATURE_EDITING
9898static int FAST_FUNC builtin_history(char **argv UNUSED_PARAM)
9899{
9900 show_history(G.line_input_state);
9901 return EXIT_SUCCESS;
9902}
9903#endif
9904
Denys Vlasenkob131cce2010-05-20 03:39:43 +02009905static char **skip_dash_dash(char **argv)
9906{
9907 argv++;
9908 if (argv[0] && argv[0][0] == '-' && argv[0][1] == '-' && argv[0][2] == '\0')
9909 argv++;
9910 return argv;
9911}
9912
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02009913static int FAST_FUNC builtin_cd(char **argv)
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00009914{
Denys Vlasenkob131cce2010-05-20 03:39:43 +02009915 const char *newdir;
9916
9917 argv = skip_dash_dash(argv);
9918 newdir = argv[0];
Denis Vlasenkobfbc9712009-04-06 12:04:42 +00009919 if (newdir == NULL) {
Denis Vlasenkob6e65562009-04-03 16:49:04 +00009920 /* bash does nothing (exitcode 0) if HOME is ""; if it's unset,
Denis Vlasenko0b677d82009-04-10 13:49:10 +00009921 * bash says "bash: cd: HOME not set" and does nothing
9922 * (exitcode 1)
Denis Vlasenkob6e65562009-04-03 16:49:04 +00009923 */
Denys Vlasenko90a99042009-09-06 02:36:23 +02009924 const char *home = get_local_var_value("HOME");
9925 newdir = home ? home : "/";
Denis Vlasenkob0a64782009-04-06 11:33:07 +00009926 }
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00009927 if (chdir(newdir)) {
Denis Vlasenkobfbc9712009-04-06 12:04:42 +00009928 /* Mimic bash message exactly */
9929 bb_perror_msg("cd: %s", newdir);
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00009930 return EXIT_FAILURE;
9931 }
Denys Vlasenko6db47842009-09-05 20:15:17 +02009932 /* Read current dir (get_cwd(1) is inside) and set PWD.
9933 * Note: do not enforce exporting. If PWD was unset or unexported,
9934 * set it again, but do not export. bash does the same.
9935 */
Denys Vlasenko3bab36b2017-07-18 01:05:24 +02009936 set_pwd_var(/*flag:*/ 0);
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00009937 return EXIT_SUCCESS;
9938}
9939
Denys Vlasenkoa1184af2017-01-10 15:58:02 +01009940static int FAST_FUNC builtin_pwd(char **argv UNUSED_PARAM)
9941{
9942 puts(get_cwd(0));
9943 return EXIT_SUCCESS;
9944}
9945
9946static int FAST_FUNC builtin_eval(char **argv)
9947{
Denys Vlasenkoa1184af2017-01-10 15:58:02 +01009948 argv = skip_dash_dash(argv);
Denys Vlasenko1f191122018-01-11 13:17:30 +01009949
Denys Vlasenkob0441a72018-07-15 18:03:56 +02009950 if (!argv[0])
9951 return EXIT_SUCCESS;
Denys Vlasenko1f191122018-01-11 13:17:30 +01009952
Denys Vlasenkob0441a72018-07-15 18:03:56 +02009953 if (!argv[1]) {
Denys Vlasenkoa1184af2017-01-10 15:58:02 +01009954 /* bash:
9955 * eval "echo Hi; done" ("done" is syntax error):
9956 * "echo Hi" will not execute too.
9957 */
Denys Vlasenkob0441a72018-07-15 18:03:56 +02009958 parse_and_run_string(argv[0]);
9959 } else {
9960 /* "The eval utility shall construct a command by
9961 * concatenating arguments together, separating
9962 * each with a <space> character."
9963 */
9964 char *str, *p;
9965 unsigned len = 0;
9966 char **pp = argv;
9967 do
9968 len += strlen(*pp) + 1;
9969 while (*++pp);
9970 str = p = xmalloc(len);
9971 pp = argv;
9972 for (;;) {
9973 p = stpcpy(p, *pp);
9974 pp++;
9975 if (!*pp)
9976 break;
9977 *p++ = ' ';
9978 }
9979 parse_and_run_string(str);
Denys Vlasenkoa1184af2017-01-10 15:58:02 +01009980 free(str);
Denys Vlasenkoa1184af2017-01-10 15:58:02 +01009981 }
Denys Vlasenkob0441a72018-07-15 18:03:56 +02009982 return G.last_exitcode;
Denys Vlasenkoa1184af2017-01-10 15:58:02 +01009983}
9984
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +02009985static int FAST_FUNC builtin_exec(char **argv)
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00009986{
Denys Vlasenkob131cce2010-05-20 03:39:43 +02009987 argv = skip_dash_dash(argv);
9988 if (argv[0] == NULL)
Denis Vlasenkoc7985b72008-06-17 05:43:38 +00009989 return EXIT_SUCCESS; /* bash does this */
Denys Vlasenkof37eb392009-10-18 11:46:35 +02009990
Denys Vlasenkof37eb392009-10-18 11:46:35 +02009991 /* Careful: we can end up here after [v]fork. Do not restore
9992 * tty pgrp then, only top-level shell process does that */
9993 if (G_saved_tty_pgrp && getpid() == G.root_pid)
9994 tcsetpgrp(G_interactive_fd, G_saved_tty_pgrp);
9995
Denys Vlasenko5b3d2eb2017-07-31 18:02:28 +02009996 /* Saved-redirect fds, script fds and G_interactive_fd are still
9997 * open here. However, they are all CLOEXEC, and execv below
9998 * closes them. Try interactive "exec ls -l /proc/self/fd",
9999 * it should show no extra open fds in the "ls" process.
10000 * If we'd try to run builtins/NOEXECs, this would need improving.
10001 */
10002 //close_saved_fds_and_FILE_fds();
10003
Denys Vlasenko3ef4f772009-10-19 23:09:06 +020010004 /* TODO: if exec fails, bash does NOT exit! We do.
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +020010005 * We'll need to undo trap cleanup (it's inside execvp_or_die)
Denys Vlasenko3ef4f772009-10-19 23:09:06 +020010006 * and tcsetpgrp, and this is inherently racy.
10007 */
10008 execvp_or_die(argv);
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010009}
10010
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +020010011static int FAST_FUNC builtin_exit(char **argv)
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010012{
Denis Vlasenkocd418a22009-04-06 18:08:35 +000010013 debug_printf_exec("%s()\n", __func__);
Denis Vlasenko40e84372009-04-18 11:23:38 +000010014
10015 /* interactive bash:
10016 * # trap "echo EEE" EXIT
10017 * # exit
10018 * exit
10019 * There are stopped jobs.
10020 * (if there are _stopped_ jobs, running ones don't count)
10021 * # exit
10022 * exit
Denys Vlasenko6830ade2013-01-15 13:58:01 +010010023 * EEE (then bash exits)
Denis Vlasenko40e84372009-04-18 11:23:38 +000010024 *
Denys Vlasenkoa110c902010-09-12 15:38:04 +020010025 * TODO: we can use G.exiting = -1 as indicator "last cmd was exit"
Denis Vlasenko40e84372009-04-18 11:23:38 +000010026 */
Denis Vlasenkoefea9d22009-04-09 13:43:11 +000010027
10028 /* note: EXIT trap is run by hush_exit */
Denys Vlasenkob131cce2010-05-20 03:39:43 +020010029 argv = skip_dash_dash(argv);
10030 if (argv[0] == NULL)
Denis Vlasenkoab2b0642009-04-06 18:42:11 +000010031 hush_exit(G.last_exitcode);
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010032 /* mimic bash: exit 123abc == exit 255 + error msg */
10033 xfunc_error_retval = 255;
10034 /* bash: exit -2 == exit 254, no error msg */
Denys Vlasenkob131cce2010-05-20 03:39:43 +020010035 hush_exit(xatoi(argv[0]) & 0xff);
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010036}
10037
Denys Vlasenkoa1184af2017-01-10 15:58:02 +010010038#if ENABLE_HUSH_TYPE
10039/* http://www.opengroup.org/onlinepubs/9699919799/utilities/type.html */
10040static int FAST_FUNC builtin_type(char **argv)
10041{
10042 int ret = EXIT_SUCCESS;
10043
10044 while (*++argv) {
10045 const char *type;
10046 char *path = NULL;
10047
10048 if (0) {} /* make conditional compile easier below */
10049 /*else if (find_alias(*argv))
10050 type = "an alias";*/
10051#if ENABLE_HUSH_FUNCTIONS
10052 else if (find_function(*argv))
10053 type = "a function";
10054#endif
10055 else if (find_builtin(*argv))
10056 type = "a shell builtin";
10057 else if ((path = find_in_path(*argv)) != NULL)
10058 type = path;
10059 else {
10060 bb_error_msg("type: %s: not found", *argv);
10061 ret = EXIT_FAILURE;
10062 continue;
10063 }
10064
10065 printf("%s is %s\n", *argv, type);
10066 free(path);
10067 }
10068
10069 return ret;
10070}
10071#endif
10072
10073#if ENABLE_HUSH_READ
10074/* Interruptibility of read builtin in bash
10075 * (tested on bash-4.2.8 by sending signals (not by ^C)):
10076 *
10077 * Empty trap makes read ignore corresponding signal, for any signal.
10078 *
10079 * SIGINT:
10080 * - terminates non-interactive shell;
10081 * - interrupts read in interactive shell;
10082 * if it has non-empty trap:
10083 * - executes trap and returns to command prompt in interactive shell;
10084 * - executes trap and returns to read in non-interactive shell;
10085 * SIGTERM:
10086 * - is ignored (does not interrupt) read in interactive shell;
10087 * - terminates non-interactive shell;
10088 * if it has non-empty trap:
10089 * - executes trap and returns to read;
10090 * SIGHUP:
10091 * - terminates shell (regardless of interactivity);
10092 * if it has non-empty trap:
10093 * - executes trap and returns to read;
Denys Vlasenkof5470412017-05-22 19:34:45 +020010094 * SIGCHLD from children:
10095 * - does not interrupt read regardless of interactivity:
10096 * try: sleep 1 & read x; echo $x
Denys Vlasenkoa1184af2017-01-10 15:58:02 +010010097 */
10098static int FAST_FUNC builtin_read(char **argv)
10099{
10100 const char *r;
10101 char *opt_n = NULL;
10102 char *opt_p = NULL;
10103 char *opt_t = NULL;
10104 char *opt_u = NULL;
Denys Vlasenko1f41c882017-08-09 13:52:36 +020010105 char *opt_d = NULL; /* optimized out if !BASH */
Denys Vlasenkoa1184af2017-01-10 15:58:02 +010010106 const char *ifs;
10107 int read_flags;
10108
10109 /* "!": do not abort on errors.
10110 * Option string must start with "sr" to match BUILTIN_READ_xxx
10111 */
Denys Vlasenko1f41c882017-08-09 13:52:36 +020010112 read_flags = getopt32(argv,
10113#if BASH_READ_D
10114 "!srn:p:t:u:d:", &opt_n, &opt_p, &opt_t, &opt_u, &opt_d
10115#else
10116 "!srn:p:t:u:", &opt_n, &opt_p, &opt_t, &opt_u
10117#endif
10118 );
Denys Vlasenkoa1184af2017-01-10 15:58:02 +010010119 if (read_flags == (uint32_t)-1)
10120 return EXIT_FAILURE;
10121 argv += optind;
10122 ifs = get_local_var_value("IFS"); /* can be NULL */
10123
10124 again:
10125 r = shell_builtin_read(set_local_var_from_halves,
10126 argv,
10127 ifs,
10128 read_flags,
10129 opt_n,
10130 opt_p,
10131 opt_t,
Denys Vlasenko1f41c882017-08-09 13:52:36 +020010132 opt_u,
10133 opt_d
Denys Vlasenkoa1184af2017-01-10 15:58:02 +010010134 );
10135
10136 if ((uintptr_t)r == 1 && errno == EINTR) {
10137 unsigned sig = check_and_run_traps();
Denys Vlasenkof5470412017-05-22 19:34:45 +020010138 if (sig != SIGINT)
Denys Vlasenkoa1184af2017-01-10 15:58:02 +010010139 goto again;
10140 }
10141
10142 if ((uintptr_t)r > 1) {
10143 bb_error_msg("%s", r);
10144 r = (char*)(uintptr_t)1;
10145 }
10146
10147 return (uintptr_t)r;
10148}
10149#endif
10150
10151#if ENABLE_HUSH_UMASK
10152static int FAST_FUNC builtin_umask(char **argv)
10153{
10154 int rc;
10155 mode_t mask;
10156
10157 rc = 1;
10158 mask = umask(0);
10159 argv = skip_dash_dash(argv);
10160 if (argv[0]) {
10161 mode_t old_mask = mask;
10162
10163 /* numeric umasks are taken as-is */
10164 /* symbolic umasks are inverted: "umask a=rx" calls umask(222) */
10165 if (!isdigit(argv[0][0]))
10166 mask ^= 0777;
10167 mask = bb_parse_mode(argv[0], mask);
10168 if (!isdigit(argv[0][0]))
10169 mask ^= 0777;
10170 if ((unsigned)mask > 0777) {
10171 mask = old_mask;
10172 /* bash messages:
10173 * bash: umask: 'q': invalid symbolic mode operator
10174 * bash: umask: 999: octal number out of range
10175 */
10176 bb_error_msg("%s: invalid mode '%s'", "umask", argv[0]);
10177 rc = 0;
10178 }
10179 } else {
10180 /* Mimic bash */
10181 printf("%04o\n", (unsigned) mask);
10182 /* fall through and restore mask which we set to 0 */
10183 }
10184 umask(mask);
10185
10186 return !rc; /* rc != 0 - success */
10187}
10188#endif
10189
Denys Vlasenko41ade052017-01-08 18:56:24 +010010190#if ENABLE_HUSH_EXPORT || ENABLE_HUSH_TRAP
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010191static void print_escaped(const char *s)
10192{
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +020010193 if (*s == '\'')
10194 goto squote;
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010195 do {
Denys Vlasenkod6b05eb2009-06-06 20:59:55 +020010196 const char *p = strchrnul(s, '\'');
10197 /* print 'xxxx', possibly just '' */
10198 printf("'%.*s'", (int)(p - s), s);
10199 if (*p == '\0')
10200 break;
10201 s = p;
10202 squote:
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010203 /* s points to '; print "'''...'''" */
10204 putchar('"');
10205 do putchar('\''); while (*++s == '\'');
10206 putchar('"');
10207 } while (*s);
10208}
Denys Vlasenko41ade052017-01-08 18:56:24 +010010209#endif
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010210
Denys Vlasenko1e660422017-07-17 21:10:50 +020010211#if ENABLE_HUSH_EXPORT || ENABLE_HUSH_LOCAL || ENABLE_HUSH_READONLY
Denys Vlasenko3bab36b2017-07-18 01:05:24 +020010212static int helper_export_local(char **argv, unsigned flags)
Denys Vlasenko295fef82009-06-03 12:47:26 +020010213{
10214 do {
10215 char *name = *argv;
Denys Vlasenko27c56f12010-09-07 09:56:34 +020010216 char *name_end = strchrnul(name, '=');
Denys Vlasenko295fef82009-06-03 12:47:26 +020010217
10218 /* So far we do not check that name is valid (TODO?) */
10219
Denys Vlasenko27c56f12010-09-07 09:56:34 +020010220 if (*name_end == '\0') {
10221 struct variable *var, **vpp;
Denys Vlasenko295fef82009-06-03 12:47:26 +020010222
Denys Vlasenko27c56f12010-09-07 09:56:34 +020010223 vpp = get_ptr_to_local_var(name, name_end - name);
10224 var = vpp ? *vpp : NULL;
10225
Denys Vlasenko3bab36b2017-07-18 01:05:24 +020010226 if (flags & SETFLAG_UNEXPORT) {
Denys Vlasenko295fef82009-06-03 12:47:26 +020010227 /* export -n NAME (without =VALUE) */
10228 if (var) {
10229 var->flg_export = 0;
10230 debug_printf_env("%s: unsetenv '%s'\n", __func__, name);
10231 unsetenv(name);
10232 } /* else: export -n NOT_EXISTING_VAR: no-op */
10233 continue;
10234 }
Denys Vlasenko3bab36b2017-07-18 01:05:24 +020010235 if (flags & SETFLAG_EXPORT) {
Denys Vlasenko295fef82009-06-03 12:47:26 +020010236 /* export NAME (without =VALUE) */
10237 if (var) {
10238 var->flg_export = 1;
10239 debug_printf_env("%s: putenv '%s'\n", __func__, var->varstr);
10240 putenv(var->varstr);
10241 continue;
10242 }
10243 }
Denys Vlasenko38ef39a2017-07-18 01:40:01 +020010244 if (flags & SETFLAG_MAKE_RO) {
10245 /* readonly NAME (without =VALUE) */
10246 if (var) {
10247 var->flg_read_only = 1;
10248 continue;
10249 }
10250 }
Denys Vlasenko6ec76d82017-01-08 18:40:41 +010010251# if ENABLE_HUSH_LOCAL
Denys Vlasenkob95ee962017-07-17 21:19:53 +020010252 /* Is this "local" bltin? */
Denys Vlasenko3bab36b2017-07-18 01:05:24 +020010253 if (!(flags & (SETFLAG_EXPORT|SETFLAG_UNEXPORT|SETFLAG_MAKE_RO))) {
Denys Vlasenko332e4112018-04-04 22:32:59 +020010254 unsigned lvl = flags >> SETFLAG_VARLVL_SHIFT;
10255 if (var && var->var_nest_level == lvl) {
Denys Vlasenkob95ee962017-07-17 21:19:53 +020010256 /* "local x=abc; ...; local x" - ignore second local decl */
10257 continue;
10258 }
Denys Vlasenko61508d92016-10-02 21:12:02 +020010259 }
Denys Vlasenko6ec76d82017-01-08 18:40:41 +010010260# endif
Denys Vlasenko295fef82009-06-03 12:47:26 +020010261 /* Exporting non-existing variable.
10262 * bash does not put it in environment,
10263 * but remembers that it is exported,
10264 * and does put it in env when it is set later.
Denys Vlasenko1e660422017-07-17 21:10:50 +020010265 * We just set it to "" and export.
10266 */
Denys Vlasenko295fef82009-06-03 12:47:26 +020010267 /* Or, it's "local NAME" (without =VALUE).
Denys Vlasenko1e660422017-07-17 21:10:50 +020010268 * bash sets the value to "".
10269 */
10270 /* Or, it's "readonly NAME" (without =VALUE).
10271 * bash remembers NAME and disallows its creation
10272 * in the future.
10273 */
Denys Vlasenko295fef82009-06-03 12:47:26 +020010274 name = xasprintf("%s=", name);
10275 } else {
10276 /* (Un)exporting/making local NAME=VALUE */
10277 name = xstrdup(name);
10278 }
Denys Vlasenko21b7f1b2018-04-05 15:15:53 +020010279 debug_printf_env("%s: set_local_var('%s')\n", __func__, name);
Denys Vlasenko38ef39a2017-07-18 01:40:01 +020010280 if (set_local_var(name, flags))
10281 return EXIT_FAILURE;
Denys Vlasenko295fef82009-06-03 12:47:26 +020010282 } while (*++argv);
Denys Vlasenko1e660422017-07-17 21:10:50 +020010283 return EXIT_SUCCESS;
Denys Vlasenko295fef82009-06-03 12:47:26 +020010284}
Denys Vlasenko6ec76d82017-01-08 18:40:41 +010010285#endif
Denys Vlasenko295fef82009-06-03 12:47:26 +020010286
Denys Vlasenko6ec76d82017-01-08 18:40:41 +010010287#if ENABLE_HUSH_EXPORT
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +020010288static int FAST_FUNC builtin_export(char **argv)
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010289{
Denis Vlasenkoad4bd052009-04-20 22:04:21 +000010290 unsigned opt_unexport;
10291
Denys Vlasenkodf5131c2009-06-07 16:04:17 +020010292#if ENABLE_HUSH_EXPORT_N
10293 /* "!": do not abort on errors */
10294 opt_unexport = getopt32(argv, "!n");
10295 if (opt_unexport == (uint32_t)-1)
10296 return EXIT_FAILURE;
10297 argv += optind;
10298#else
10299 opt_unexport = 0;
10300 argv++;
10301#endif
10302
10303 if (argv[0] == NULL) {
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010304 char **e = environ;
Denis Vlasenko0b677d82009-04-10 13:49:10 +000010305 if (e) {
10306 while (*e) {
10307#if 0
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010308 puts(*e++);
Denis Vlasenko0b677d82009-04-10 13:49:10 +000010309#else
10310 /* ash emits: export VAR='VAL'
10311 * bash: declare -x VAR="VAL"
10312 * we follow ash example */
10313 const char *s = *e++;
10314 const char *p = strchr(s, '=');
10315
10316 if (!p) /* wtf? take next variable */
10317 continue;
10318 /* export var= */
10319 printf("export %.*s", (int)(p - s) + 1, s);
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010320 print_escaped(p + 1);
Denis Vlasenko0b677d82009-04-10 13:49:10 +000010321 putchar('\n');
10322#endif
10323 }
Denys Vlasenko8131eea2009-11-02 14:19:51 +010010324 /*fflush_all(); - done after each builtin anyway */
Denis Vlasenko0b677d82009-04-10 13:49:10 +000010325 }
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010326 return EXIT_SUCCESS;
10327 }
10328
Denys Vlasenko3bab36b2017-07-18 01:05:24 +020010329 return helper_export_local(argv, opt_unexport ? SETFLAG_UNEXPORT : SETFLAG_EXPORT);
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010330}
Denys Vlasenko6ec76d82017-01-08 18:40:41 +010010331#endif
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010332
Denys Vlasenko295fef82009-06-03 12:47:26 +020010333#if ENABLE_HUSH_LOCAL
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +020010334static int FAST_FUNC builtin_local(char **argv)
Denys Vlasenko295fef82009-06-03 12:47:26 +020010335{
10336 if (G.func_nest_level == 0) {
10337 bb_error_msg("%s: not in a function", argv[0]);
10338 return EXIT_FAILURE; /* bash compat */
10339 }
Denys Vlasenko1e660422017-07-17 21:10:50 +020010340 argv++;
Denys Vlasenkod358b0b2018-04-05 00:51:55 +020010341 /* Since all builtins run in a nested variable level,
10342 * need to use level - 1 here. Or else the variable will be removed at once
10343 * after builtin returns.
10344 */
10345 return helper_export_local(argv, (G.var_nest_level - 1) << SETFLAG_VARLVL_SHIFT);
Denys Vlasenko295fef82009-06-03 12:47:26 +020010346}
10347#endif
10348
Denys Vlasenko1e660422017-07-17 21:10:50 +020010349#if ENABLE_HUSH_READONLY
10350static int FAST_FUNC builtin_readonly(char **argv)
10351{
Denys Vlasenko3bab36b2017-07-18 01:05:24 +020010352 argv++;
10353 if (*argv == NULL) {
Denys Vlasenko1e660422017-07-17 21:10:50 +020010354 /* bash: readonly [-p]: list all readonly VARs
10355 * (-p has no effect in bash)
10356 */
10357 struct variable *e;
10358 for (e = G.top_var; e; e = e->next) {
10359 if (e->flg_read_only) {
10360//TODO: quote value: readonly VAR='VAL'
10361 printf("readonly %s\n", e->varstr);
10362 }
10363 }
10364 return EXIT_SUCCESS;
10365 }
Denys Vlasenko3bab36b2017-07-18 01:05:24 +020010366 return helper_export_local(argv, SETFLAG_MAKE_RO);
Denys Vlasenko1e660422017-07-17 21:10:50 +020010367}
10368#endif
10369
Denys Vlasenko10d5ece2017-01-08 18:28:43 +010010370#if ENABLE_HUSH_UNSET
Denys Vlasenko61508d92016-10-02 21:12:02 +020010371/* http://www.opengroup.org/onlinepubs/9699919799/utilities/V3_chap02.html#unset */
10372static int FAST_FUNC builtin_unset(char **argv)
10373{
10374 int ret;
10375 unsigned opts;
10376
10377 /* "!": do not abort on errors */
10378 /* "+": stop at 1st non-option */
10379 opts = getopt32(argv, "!+vf");
10380 if (opts == (unsigned)-1)
10381 return EXIT_FAILURE;
10382 if (opts == 3) {
10383 bb_error_msg("unset: -v and -f are exclusive");
10384 return EXIT_FAILURE;
10385 }
10386 argv += optind;
10387
10388 ret = EXIT_SUCCESS;
10389 while (*argv) {
10390 if (!(opts & 2)) { /* not -f */
10391 if (unset_local_var(*argv)) {
10392 /* unset <nonexistent_var> doesn't fail.
10393 * Error is when one tries to unset RO var.
10394 * Message was printed by unset_local_var. */
10395 ret = EXIT_FAILURE;
10396 }
10397 }
Denys Vlasenko10d5ece2017-01-08 18:28:43 +010010398# if ENABLE_HUSH_FUNCTIONS
Denys Vlasenko61508d92016-10-02 21:12:02 +020010399 else {
10400 unset_func(*argv);
10401 }
Denys Vlasenko10d5ece2017-01-08 18:28:43 +010010402# endif
Denys Vlasenko61508d92016-10-02 21:12:02 +020010403 argv++;
10404 }
10405 return ret;
10406}
Denys Vlasenko10d5ece2017-01-08 18:28:43 +010010407#endif
Denys Vlasenko61508d92016-10-02 21:12:02 +020010408
Denys Vlasenko10d5ece2017-01-08 18:28:43 +010010409#if ENABLE_HUSH_SET
Denys Vlasenko61508d92016-10-02 21:12:02 +020010410/* http://www.opengroup.org/onlinepubs/9699919799/utilities/V3_chap02.html#set
10411 * built-in 'set' handler
10412 * SUSv3 says:
10413 * set [-abCefhmnuvx] [-o option] [argument...]
10414 * set [+abCefhmnuvx] [+o option] [argument...]
10415 * set -- [argument...]
10416 * set -o
10417 * set +o
10418 * Implementations shall support the options in both their hyphen and
10419 * plus-sign forms. These options can also be specified as options to sh.
10420 * Examples:
10421 * Write out all variables and their values: set
10422 * Set $1, $2, and $3 and set "$#" to 3: set c a b
10423 * Turn on the -x and -v options: set -xv
10424 * Unset all positional parameters: set --
10425 * Set $1 to the value of x, even if it begins with '-' or '+': set -- "$x"
10426 * Set the positional parameters to the expansion of x, even if x expands
10427 * with a leading '-' or '+': set -- $x
10428 *
10429 * So far, we only support "set -- [argument...]" and some of the short names.
10430 */
10431static int FAST_FUNC builtin_set(char **argv)
10432{
10433 int n;
10434 char **pp, **g_argv;
10435 char *arg = *++argv;
10436
10437 if (arg == NULL) {
10438 struct variable *e;
10439 for (e = G.top_var; e; e = e->next)
10440 puts(e->varstr);
10441 return EXIT_SUCCESS;
10442 }
10443
10444 do {
10445 if (strcmp(arg, "--") == 0) {
10446 ++argv;
10447 goto set_argv;
10448 }
10449 if (arg[0] != '+' && arg[0] != '-')
10450 break;
10451 for (n = 1; arg[n]; ++n) {
10452 if (set_mode((arg[0] == '-'), arg[n], argv[1]))
10453 goto error;
10454 if (arg[n] == 'o' && argv[1])
10455 argv++;
10456 }
10457 } while ((arg = *++argv) != NULL);
10458 /* Now argv[0] is 1st argument */
10459
10460 if (arg == NULL)
10461 return EXIT_SUCCESS;
10462 set_argv:
10463
10464 /* NB: G.global_argv[0] ($0) is never freed/changed */
10465 g_argv = G.global_argv;
10466 if (G.global_args_malloced) {
10467 pp = g_argv;
10468 while (*++pp)
10469 free(*pp);
10470 g_argv[1] = NULL;
10471 } else {
10472 G.global_args_malloced = 1;
10473 pp = xzalloc(sizeof(pp[0]) * 2);
10474 pp[0] = g_argv[0]; /* retain $0 */
10475 g_argv = pp;
10476 }
10477 /* This realloc's G.global_argv */
10478 G.global_argv = pp = add_strings_to_strings(g_argv, argv, /*dup:*/ 1);
10479
Denys Vlasenkod4e4fdb2017-07-03 21:31:16 +020010480 G.global_argc = 1 + string_array_len(pp + 1);
Denys Vlasenko61508d92016-10-02 21:12:02 +020010481
10482 return EXIT_SUCCESS;
10483
10484 /* Nothing known, so abort */
10485 error:
Denys Vlasenko57000292018-01-12 14:41:45 +010010486 bb_error_msg("%s: %s: invalid option", "set", arg);
Denys Vlasenko61508d92016-10-02 21:12:02 +020010487 return EXIT_FAILURE;
10488}
Denys Vlasenko10d5ece2017-01-08 18:28:43 +010010489#endif
Denys Vlasenko61508d92016-10-02 21:12:02 +020010490
10491static int FAST_FUNC builtin_shift(char **argv)
10492{
10493 int n = 1;
10494 argv = skip_dash_dash(argv);
10495 if (argv[0]) {
Denys Vlasenkoe59591a2017-07-06 20:12:44 +020010496 n = bb_strtou(argv[0], NULL, 10);
10497 if (errno || n < 0) {
10498 /* shared string with ash.c */
10499 bb_error_msg("Illegal number: %s", argv[0]);
10500 /*
10501 * ash aborts in this case.
10502 * bash prints error message and set $? to 1.
10503 * Interestingly, for "shift 99999" bash does not
10504 * print error message, but does set $? to 1
10505 * (and does no shifting at all).
10506 */
10507 }
Denys Vlasenko61508d92016-10-02 21:12:02 +020010508 }
10509 if (n >= 0 && n < G.global_argc) {
Denys Vlasenko4e4f88e2017-01-09 07:57:38 +010010510 if (G_global_args_malloced) {
Denys Vlasenko61508d92016-10-02 21:12:02 +020010511 int m = 1;
10512 while (m <= n)
10513 free(G.global_argv[m++]);
10514 }
10515 G.global_argc -= n;
10516 memmove(&G.global_argv[1], &G.global_argv[n+1],
10517 G.global_argc * sizeof(G.global_argv[0]));
10518 return EXIT_SUCCESS;
10519 }
10520 return EXIT_FAILURE;
10521}
10522
Denys Vlasenko74d40582017-08-11 01:32:46 +020010523#if ENABLE_HUSH_GETOPTS
10524static int FAST_FUNC builtin_getopts(char **argv)
10525{
Denys Vlasenko9a7d0a02017-08-11 02:37:48 +020010526/* http://pubs.opengroup.org/onlinepubs/9699919799/utilities/getopts.html
10527
Denys Vlasenko74d40582017-08-11 01:32:46 +020010528TODO:
Denys Vlasenko74d40582017-08-11 01:32:46 +020010529If a required argument is not found, and getopts is not silent,
10530a question mark (?) is placed in VAR, OPTARG is unset, and a
10531diagnostic message is printed. If getopts is silent, then a
10532colon (:) is placed in VAR and OPTARG is set to the option
10533character found.
10534
10535Test that VAR is a valid variable name?
Denys Vlasenko9a7d0a02017-08-11 02:37:48 +020010536
10537"Whenever the shell is invoked, OPTIND shall be initialized to 1"
Denys Vlasenko74d40582017-08-11 01:32:46 +020010538*/
10539 char cbuf[2];
10540 const char *cp, *optstring, *var;
Denys Vlasenko238ff982017-08-29 13:38:30 +020010541 int c, n, exitcode, my_opterr;
10542 unsigned count;
Denys Vlasenko74d40582017-08-11 01:32:46 +020010543
10544 optstring = *++argv;
10545 if (!optstring || !(var = *++argv)) {
10546 bb_error_msg("usage: getopts OPTSTRING VAR [ARGS]");
10547 return EXIT_FAILURE;
10548 }
10549
Denys Vlasenko238ff982017-08-29 13:38:30 +020010550 if (argv[1])
10551 argv[0] = G.global_argv[0]; /* for error messages in getopt() */
10552 else
10553 argv = G.global_argv;
10554 cbuf[1] = '\0';
10555
10556 my_opterr = 0;
Denys Vlasenko048491f2017-08-17 12:36:39 +020010557 if (optstring[0] != ':') {
Denys Vlasenko419db032017-08-11 17:21:14 +020010558 cp = get_local_var_value("OPTERR");
Denys Vlasenko048491f2017-08-17 12:36:39 +020010559 /* 0 if "OPTERR=0", 1 otherwise */
Denys Vlasenko238ff982017-08-29 13:38:30 +020010560 my_opterr = (!cp || NOT_LONE_CHAR(cp, '0'));
Denys Vlasenko419db032017-08-11 17:21:14 +020010561 }
Denys Vlasenko74d40582017-08-11 01:32:46 +020010562
10563 /* getopts stops on first non-option. Add "+" to force that */
10564 /*if (optstring[0] != '+')*/ {
10565 char *s = alloca(strlen(optstring) + 2);
10566 sprintf(s, "+%s", optstring);
10567 optstring = s;
10568 }
10569
Denys Vlasenko238ff982017-08-29 13:38:30 +020010570 /* Naively, now we should just
10571 * cp = get_local_var_value("OPTIND");
10572 * optind = cp ? atoi(cp) : 0;
10573 * optarg = NULL;
10574 * opterr = my_opterr;
10575 * c = getopt(string_array_len(argv), argv, optstring);
10576 * and be done? Not so fast...
10577 * Unlike normal getopt() usage in C programs, here
10578 * each successive call will (usually) have the same argv[] CONTENTS,
10579 * but not the ADDRESSES. Worse yet, it's possible that between
10580 * invocations of "getopts", there will be calls to shell builtins
10581 * which use getopt() internally. Example:
10582 * while getopts "abc" RES -a -bc -abc de; do
10583 * unset -ff func
10584 * done
10585 * This would not work correctly: getopt() call inside "unset"
10586 * modifies internal libc state which is tracking position in
10587 * multi-option strings ("-abc"). At best, it can skip options
10588 * or return the same option infinitely. With glibc implementation
10589 * of getopt(), it would use outright invalid pointers and return
10590 * garbage even _without_ "unset" mangling internal state.
10591 *
10592 * We resort to resetting getopt() state and calling it N times,
10593 * until we get Nth result (or failure).
10594 * (N == G.getopt_count is reset to 0 whenever OPTIND is [un]set).
10595 */
Denys Vlasenko60161812017-08-29 14:32:17 +020010596 GETOPT_RESET();
Denys Vlasenko238ff982017-08-29 13:38:30 +020010597 count = 0;
10598 n = string_array_len(argv);
10599 do {
10600 optarg = NULL;
10601 opterr = (count < G.getopt_count) ? 0 : my_opterr;
10602 c = getopt(n, argv, optstring);
10603 if (c < 0)
10604 break;
10605 count++;
10606 } while (count <= G.getopt_count);
10607
10608 /* Set OPTIND. Prevent resetting of the magic counter! */
10609 set_local_var_from_halves("OPTIND", utoa(optind));
10610 G.getopt_count = count; /* "next time, give me N+1'th result" */
Denys Vlasenko60161812017-08-29 14:32:17 +020010611 GETOPT_RESET(); /* just in case */
Denys Vlasenko419db032017-08-11 17:21:14 +020010612
10613 /* Set OPTARG */
10614 /* Always set or unset, never left as-is, even on exit/error:
10615 * "If no option was found, or if the option that was found
10616 * does not have an option-argument, OPTARG shall be unset."
10617 */
10618 cp = optarg;
10619 if (c == '?') {
10620 /* If ":optstring" and unknown option is seen,
10621 * it is stored to OPTARG.
10622 */
10623 if (optstring[1] == ':') {
10624 cbuf[0] = optopt;
10625 cp = cbuf;
10626 }
10627 }
10628 if (cp)
10629 set_local_var_from_halves("OPTARG", cp);
10630 else
10631 unset_local_var("OPTARG");
10632
10633 /* Convert -1 to "?" */
Denys Vlasenko74d40582017-08-11 01:32:46 +020010634 exitcode = EXIT_SUCCESS;
10635 if (c < 0) { /* -1: end of options */
10636 exitcode = EXIT_FAILURE;
10637 c = '?';
10638 }
Denys Vlasenko419db032017-08-11 17:21:14 +020010639
Denys Vlasenko238ff982017-08-29 13:38:30 +020010640 /* Set VAR */
Denys Vlasenko74d40582017-08-11 01:32:46 +020010641 cbuf[0] = c;
Denys Vlasenko74d40582017-08-11 01:32:46 +020010642 set_local_var_from_halves(var, cbuf);
Denys Vlasenko9a7d0a02017-08-11 02:37:48 +020010643
Denys Vlasenko74d40582017-08-11 01:32:46 +020010644 return exitcode;
10645}
10646#endif
10647
Denys Vlasenkoa1184af2017-01-10 15:58:02 +010010648static int FAST_FUNC builtin_source(char **argv)
Denys Vlasenko61508d92016-10-02 21:12:02 +020010649{
Denys Vlasenkoa1184af2017-01-10 15:58:02 +010010650 char *arg_path, *filename;
10651 FILE *input;
10652 save_arg_t sv;
10653 char *args_need_save;
10654#if ENABLE_HUSH_FUNCTIONS
10655 smallint sv_flg;
Denys Vlasenko7a85c602017-01-08 17:40:18 +010010656#endif
Denys Vlasenko61508d92016-10-02 21:12:02 +020010657
Denys Vlasenkoa1184af2017-01-10 15:58:02 +010010658 argv = skip_dash_dash(argv);
10659 filename = argv[0];
10660 if (!filename) {
10661 /* bash says: "bash: .: filename argument required" */
10662 return 2; /* bash compat */
10663 }
10664 arg_path = NULL;
10665 if (!strchr(filename, '/')) {
10666 arg_path = find_in_path(filename);
10667 if (arg_path)
10668 filename = arg_path;
Denys Vlasenko54c21112018-01-27 20:46:45 +010010669 else if (!ENABLE_HUSH_BASH_SOURCE_CURDIR) {
Denys Vlasenkof7e0fea2018-01-27 19:05:59 +010010670 errno = ENOENT;
10671 bb_simple_perror_msg(filename);
10672 return EXIT_FAILURE;
10673 }
Denys Vlasenkoa1184af2017-01-10 15:58:02 +010010674 }
10675 input = remember_FILE(fopen_or_warn(filename, "r"));
10676 free(arg_path);
10677 if (!input) {
10678 /* bb_perror_msg("%s", *argv); - done by fopen_or_warn */
10679 /* POSIX: non-interactive shell should abort here,
10680 * not merely fail. So far no one complained :)
10681 */
10682 return EXIT_FAILURE;
10683 }
10684
10685#if ENABLE_HUSH_FUNCTIONS
10686 sv_flg = G_flag_return_in_progress;
10687 /* "we are inside sourced file, ok to use return" */
10688 G_flag_return_in_progress = -1;
10689#endif
10690 args_need_save = argv[1]; /* used as a boolean variable */
10691 if (args_need_save)
10692 save_and_replace_G_args(&sv, argv);
10693
10694 /* "false; . ./empty_line; echo Zero:$?" should print 0 */
10695 G.last_exitcode = 0;
10696 parse_and_run_file(input);
10697 fclose_and_forget(input);
10698
10699 if (args_need_save) /* can't use argv[1] instead: "shift" can mangle it */
10700 restore_G_args(&sv, argv);
10701#if ENABLE_HUSH_FUNCTIONS
10702 G_flag_return_in_progress = sv_flg;
10703#endif
10704
10705 return G.last_exitcode;
10706}
10707
Denys Vlasenko7a85c602017-01-08 17:40:18 +010010708#if ENABLE_HUSH_TRAP
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +020010709static int FAST_FUNC builtin_trap(char **argv)
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010710{
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010711 int sig;
10712 char *new_cmd;
10713
Denys Vlasenko7a85c602017-01-08 17:40:18 +010010714 if (!G_traps)
10715 G_traps = xzalloc(sizeof(G_traps[0]) * NSIG);
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010716
10717 argv++;
10718 if (!*argv) {
Denis Vlasenko6008d8a2009-04-18 13:05:10 +000010719 int i;
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010720 /* No args: print all trapped */
10721 for (i = 0; i < NSIG; ++i) {
Denys Vlasenko7a85c602017-01-08 17:40:18 +010010722 if (G_traps[i]) {
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010723 printf("trap -- ");
Denys Vlasenko7a85c602017-01-08 17:40:18 +010010724 print_escaped(G_traps[i]);
Denys Vlasenkoe74aaf92009-09-27 02:05:45 +020010725 /* note: bash adds "SIG", but only if invoked
10726 * as "bash". If called as "sh", or if set -o posix,
10727 * then it prints short signal names.
10728 * We are printing short names: */
10729 printf(" %s\n", get_signame(i));
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010730 }
10731 }
Denys Vlasenko8131eea2009-11-02 14:19:51 +010010732 /*fflush_all(); - done after each builtin anyway */
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010733 return EXIT_SUCCESS;
10734 }
10735
10736 new_cmd = NULL;
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010737 /* If first arg is a number: reset all specified signals */
10738 sig = bb_strtou(*argv, NULL, 10);
10739 if (errno == 0) {
10740 int ret;
10741 process_sig_list:
10742 ret = EXIT_SUCCESS;
10743 while (*argv) {
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +020010744 sighandler_t handler;
10745
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010746 sig = get_signum(*argv++);
Denys Vlasenko86981e32017-07-25 20:06:17 +020010747 if (sig < 0) {
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010748 ret = EXIT_FAILURE;
10749 /* Mimic bash message exactly */
Denys Vlasenko74562982017-07-06 18:40:45 +020010750 bb_error_msg("trap: %s: invalid signal specification", argv[-1]);
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010751 continue;
10752 }
10753
Denys Vlasenko7a85c602017-01-08 17:40:18 +010010754 free(G_traps[sig]);
10755 G_traps[sig] = xstrdup(new_cmd);
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010756
Denys Vlasenkoe89a2412010-01-12 15:19:31 +010010757 debug_printf("trap: setting SIG%s (%i) to '%s'\n",
Denys Vlasenko7a85c602017-01-08 17:40:18 +010010758 get_signame(sig), sig, G_traps[sig]);
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010759
10760 /* There is no signal for 0 (EXIT) */
10761 if (sig == 0)
10762 continue;
10763
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +020010764 if (new_cmd)
10765 handler = (new_cmd[0] ? record_pending_signo : SIG_IGN);
10766 else
10767 /* We are removing trap handler */
10768 handler = pick_sighandler(sig);
Denys Vlasenko0806e402011-05-12 23:06:20 +020010769 install_sighandler(sig, handler);
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010770 }
10771 return ret;
10772 }
10773
10774 if (!argv[1]) { /* no second arg */
10775 bb_error_msg("trap: invalid arguments");
10776 return EXIT_FAILURE;
10777 }
10778
10779 /* First arg is "-": reset all specified to default */
10780 /* First arg is "--": skip it, the rest is "handler SIGs..." */
10781 /* Everything else: set arg as signal handler
10782 * (includes "" case, which ignores signal) */
10783 if (argv[0][0] == '-') {
10784 if (argv[0][1] == '\0') { /* "-" */
10785 /* new_cmd remains NULL: "reset these sigs" */
10786 goto reset_traps;
10787 }
10788 if (argv[0][1] == '-' && argv[0][2] == '\0') { /* "--" */
10789 argv++;
10790 }
10791 /* else: "-something", no special meaning */
10792 }
10793 new_cmd = *argv;
10794 reset_traps:
10795 argv++;
10796 goto process_sig_list;
10797}
Denys Vlasenko7a85c602017-01-08 17:40:18 +010010798#endif
Denis Vlasenko38e626d2009-04-18 12:58:19 +000010799
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010800#if ENABLE_HUSH_JOB
Denys Vlasenko4e1c8b42016-11-07 20:06:40 +010010801static struct pipe *parse_jobspec(const char *str)
10802{
10803 struct pipe *pi;
Denys Vlasenkod5b5c2f2017-01-08 15:46:04 +010010804 unsigned jobnum;
Denys Vlasenko4e1c8b42016-11-07 20:06:40 +010010805
Denys Vlasenkod5b5c2f2017-01-08 15:46:04 +010010806 if (sscanf(str, "%%%u", &jobnum) != 1) {
10807 if (str[0] != '%'
10808 || (str[1] != '%' && str[1] != '+' && str[1] != '\0')
10809 ) {
10810 bb_error_msg("bad argument '%s'", str);
10811 return NULL;
10812 }
10813 /* It is "%%", "%+" or "%" - current job */
10814 jobnum = G.last_jobid;
10815 if (jobnum == 0) {
10816 bb_error_msg("no current job");
10817 return NULL;
10818 }
Denys Vlasenko4e1c8b42016-11-07 20:06:40 +010010819 }
10820 for (pi = G.job_list; pi; pi = pi->next) {
10821 if (pi->jobid == jobnum) {
10822 return pi;
10823 }
10824 }
Denys Vlasenkofd68f1e2017-01-09 05:47:57 +010010825 bb_error_msg("%u: no such job", jobnum);
Denys Vlasenko4e1c8b42016-11-07 20:06:40 +010010826 return NULL;
10827}
10828
Denys Vlasenkoa1184af2017-01-10 15:58:02 +010010829static int FAST_FUNC builtin_jobs(char **argv UNUSED_PARAM)
10830{
10831 struct pipe *job;
10832 const char *status_string;
10833
10834 checkjobs(NULL, 0 /*(no pid to wait for)*/);
10835 for (job = G.job_list; job; job = job->next) {
10836 if (job->alive_cmds == job->stopped_cmds)
10837 status_string = "Stopped";
10838 else
10839 status_string = "Running";
10840
10841 printf(JOB_STATUS_FORMAT, job->jobid, status_string, job->cmdtext);
10842 }
Denys Vlasenko2ed74e22017-07-14 19:58:46 +020010843
10844 clean_up_last_dead_job();
10845
Denys Vlasenkoa1184af2017-01-10 15:58:02 +010010846 return EXIT_SUCCESS;
10847}
10848
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010849/* built-in 'fg' and 'bg' handler */
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +020010850static int FAST_FUNC builtin_fg_bg(char **argv)
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010851{
Denys Vlasenko4e1c8b42016-11-07 20:06:40 +010010852 int i;
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010853 struct pipe *pi;
10854
Denis Vlasenko60b392f2009-04-03 19:14:32 +000010855 if (!G_interactive_fd)
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010856 return EXIT_FAILURE;
Denis Vlasenkoc8653f62009-04-27 23:29:14 +000010857
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010858 /* If they gave us no args, assume they want the last backgrounded task */
10859 if (!argv[1]) {
Denis Vlasenko87a86552008-07-29 19:43:10 +000010860 for (pi = G.job_list; pi; pi = pi->next) {
10861 if (pi->jobid == G.last_jobid) {
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010862 goto found;
10863 }
10864 }
10865 bb_error_msg("%s: no current job", argv[0]);
10866 return EXIT_FAILURE;
10867 }
Denys Vlasenko4e1c8b42016-11-07 20:06:40 +010010868
10869 pi = parse_jobspec(argv[1]);
10870 if (!pi)
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010871 return EXIT_FAILURE;
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010872 found:
Denis Vlasenko6b9e0532009-04-18 01:23:21 +000010873 /* TODO: bash prints a string representation
10874 * of job being foregrounded (like "sleep 1 | cat") */
Mike Frysinger38478a62009-05-20 04:48:06 -040010875 if (argv[0][0] == 'f' && G_saved_tty_pgrp) {
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010876 /* Put the job into the foreground. */
Denis Vlasenko60b392f2009-04-03 19:14:32 +000010877 tcsetpgrp(G_interactive_fd, pi->pgrp);
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010878 }
10879
10880 /* Restart the processes in the job */
Denis Vlasenko9af22c72008-10-09 12:54:58 +000010881 debug_printf_jobs("reviving %d procs, pgrp %d\n", pi->num_cmds, pi->pgrp);
10882 for (i = 0; i < pi->num_cmds; i++) {
10883 debug_printf_jobs("reviving pid %d\n", pi->cmds[i].pid);
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010884 }
Denis Vlasenko9af22c72008-10-09 12:54:58 +000010885 pi->stopped_cmds = 0;
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010886
10887 i = kill(- pi->pgrp, SIGCONT);
10888 if (i < 0) {
10889 if (errno == ESRCH) {
Denys Vlasenko16096292017-07-10 10:00:28 +020010890 delete_finished_job(pi);
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010891 return EXIT_SUCCESS;
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010892 }
Denis Vlasenko34d4d892009-04-04 20:24:37 +000010893 bb_perror_msg("kill (SIGCONT)");
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010894 }
10895
Denis Vlasenko34d4d892009-04-04 20:24:37 +000010896 if (argv[0][0] == 'f') {
Denys Vlasenko16096292017-07-10 10:00:28 +020010897 remove_job_from_table(pi); /* FG job shouldn't be in job table */
Denis Vlasenkoc7985b72008-06-17 05:43:38 +000010898 return checkjobs_and_fg_shell(pi);
10899 }
10900 return EXIT_SUCCESS;
10901}
10902#endif
10903
Denys Vlasenko1125d7d2017-01-08 17:19:38 +010010904#if ENABLE_HUSH_KILL
10905static int FAST_FUNC builtin_kill(char **argv)
10906{
10907 int ret = 0;
10908
Denys Vlasenkofd68f1e2017-01-09 05:47:57 +010010909# if ENABLE_HUSH_JOB
10910 if (argv[1] && strcmp(argv[1], "-l") != 0) {
10911 int i = 1;
Denys Vlasenko1125d7d2017-01-08 17:19:38 +010010912
10913 do {
10914 struct pipe *pi;
10915 char *dst;
10916 int j, n;
10917
10918 if (argv[i][0] != '%')
10919 continue;
10920 /*
10921 * "kill %N" - job kill
10922 * Converting to pgrp / pid kill
10923 */
10924 pi = parse_jobspec(argv[i]);
10925 if (!pi) {
10926 /* Eat bad jobspec */
10927 j = i;
10928 do {
10929 j++;
10930 argv[j - 1] = argv[j];
10931 } while (argv[j]);
10932 ret = 1;
10933 i--;
10934 continue;
10935 }
10936 /*
10937 * In jobs started under job control, we signal
10938 * entire process group by kill -PGRP_ID.
10939 * This happens, f.e., in interactive shell.
10940 *
10941 * Otherwise, we signal each child via
10942 * kill PID1 PID2 PID3.
10943 * Testcases:
10944 * sh -c 'sleep 1|sleep 1 & kill %1'
10945 * sh -c 'true|sleep 2 & sleep 1; kill %1'
10946 * sh -c 'true|sleep 1 & sleep 2; kill %1'
10947 */
Denys Vlasenko5362cc42017-01-09 05:57:13 +010010948 n = G_interactive_fd ? 1 : pi->num_cmds;
Denys Vlasenko1125d7d2017-01-08 17:19:38 +010010949 dst = alloca(n * sizeof(int)*4);
10950 argv[i] = dst;
Denys Vlasenko1125d7d2017-01-08 17:19:38 +010010951 if (G_interactive_fd)
10952 dst += sprintf(dst, " -%u", (int)pi->pgrp);
Denys Vlasenkofd68f1e2017-01-09 05:47:57 +010010953 else for (j = 0; j < n; j++) {
Denys Vlasenko1125d7d2017-01-08 17:19:38 +010010954 struct command *cmd = &pi->cmds[j];
10955 /* Skip exited members of the job */
10956 if (cmd->pid == 0)
10957 continue;
10958 /*
10959 * kill_main has matching code to expect
10960 * leading space. Needed to not confuse
10961 * negative pids with "kill -SIGNAL_NO" syntax
10962 */
10963 dst += sprintf(dst, " %u", (int)cmd->pid);
10964 }
10965 *dst = '\0';
10966 } while (argv[++i]);
10967 }
Denys Vlasenkofd68f1e2017-01-09 05:47:57 +010010968# endif
Denys Vlasenko1125d7d2017-01-08 17:19:38 +010010969
Denys Vlasenkofd68f1e2017-01-09 05:47:57 +010010970 if (argv[1] || ret == 0) {
Denys Vlasenko1125d7d2017-01-08 17:19:38 +010010971 ret = run_applet_main(argv, kill_main);
10972 }
Denys Vlasenkofd68f1e2017-01-09 05:47:57 +010010973 /* else: ret = 1, "kill %bad_jobspec" case */
Denys Vlasenko1125d7d2017-01-08 17:19:38 +010010974 return ret;
10975}
10976#endif
10977
10978#if ENABLE_HUSH_WAIT
Mike Frysinger56bdea12009-03-28 20:01:58 +000010979/* http://www.opengroup.org/onlinepubs/9699919799/utilities/wait.html */
Denys Vlasenko62b717b2016-11-07 22:12:18 +010010980#if !ENABLE_HUSH_JOB
10981# define wait_for_child_or_signal(pipe,pid) wait_for_child_or_signal(pid)
10982#endif
10983static int wait_for_child_or_signal(struct pipe *waitfor_pipe, pid_t waitfor_pid)
Denys Vlasenko7e675362016-10-28 21:57:31 +020010984{
10985 int ret = 0;
10986 for (;;) {
10987 int sig;
Denys Vlasenko62b717b2016-11-07 22:12:18 +010010988 sigset_t oldset;
Denys Vlasenko7e675362016-10-28 21:57:31 +020010989
Denys Vlasenko830ea352016-11-08 04:59:11 +010010990 if (!sigisemptyset(&G.pending_set))
10991 goto check_sig;
10992
Denys Vlasenko7e675362016-10-28 21:57:31 +020010993 /* waitpid is not interruptible by SA_RESTARTed
10994 * signals which we use. Thus, this ugly dance:
10995 */
10996
10997 /* Make sure possible SIGCHLD is stored in kernel's
10998 * pending signal mask before we call waitpid.
10999 * Or else we may race with SIGCHLD, lose it,
Denys Vlasenko62b717b2016-11-07 22:12:18 +010011000 * and get stuck in sigsuspend...
Denys Vlasenko7e675362016-10-28 21:57:31 +020011001 */
Denys Vlasenko62b717b2016-11-07 22:12:18 +010011002 sigfillset(&oldset); /* block all signals, remember old set */
11003 sigprocmask(SIG_SETMASK, &oldset, &oldset);
Denys Vlasenko7e675362016-10-28 21:57:31 +020011004
11005 if (!sigisemptyset(&G.pending_set)) {
11006 /* Crap! we raced with some signal! */
Denys Vlasenko7e675362016-10-28 21:57:31 +020011007 goto restore;
11008 }
11009
11010 /*errno = 0; - checkjobs does this */
Denys Vlasenko62b717b2016-11-07 22:12:18 +010011011/* Can't pass waitfor_pipe into checkjobs(): it won't be interruptible */
Denys Vlasenko7e675362016-10-28 21:57:31 +020011012 ret = checkjobs(NULL, waitfor_pid); /* waitpid(WNOHANG) inside */
Denys Vlasenko62b717b2016-11-07 22:12:18 +010011013 debug_printf_exec("checkjobs:%d\n", ret);
11014#if ENABLE_HUSH_JOB
11015 if (waitfor_pipe) {
11016 int rcode = job_exited_or_stopped(waitfor_pipe);
11017 debug_printf_exec("job_exited_or_stopped:%d\n", rcode);
11018 if (rcode >= 0) {
11019 ret = rcode;
11020 sigprocmask(SIG_SETMASK, &oldset, NULL);
11021 break;
11022 }
11023 }
11024#endif
Denys Vlasenko7e675362016-10-28 21:57:31 +020011025 /* if ECHILD, there are no children (ret is -1 or 0) */
11026 /* if ret == 0, no children changed state */
11027 /* if ret != 0, it's exitcode+1 of exited waitfor_pid child */
Denys Vlasenko62b717b2016-11-07 22:12:18 +010011028 if (errno == ECHILD || ret) {
11029 ret--;
11030 if (ret < 0) /* if ECHILD, may need to fix "ret" */
Denys Vlasenko7e675362016-10-28 21:57:31 +020011031 ret = 0;
11032 sigprocmask(SIG_SETMASK, &oldset, NULL);
11033 break;
11034 }
Denys Vlasenko7e675362016-10-28 21:57:31 +020011035 /* Wait for SIGCHLD or any other signal */
Denys Vlasenko7e675362016-10-28 21:57:31 +020011036 /* It is vitally important for sigsuspend that SIGCHLD has non-DFL handler! */
11037 /* Note: sigsuspend invokes signal handler */
11038 sigsuspend(&oldset);
11039 restore:
11040 sigprocmask(SIG_SETMASK, &oldset, NULL);
Denys Vlasenko830ea352016-11-08 04:59:11 +010011041 check_sig:
Denys Vlasenko7e675362016-10-28 21:57:31 +020011042 /* So, did we get a signal? */
Denys Vlasenko7e675362016-10-28 21:57:31 +020011043 sig = check_and_run_traps();
11044 if (sig /*&& sig != SIGCHLD - always true */) {
Denys Vlasenko7c40ddd2017-08-02 16:37:39 +020011045 /* Do this for any (non-ignored) signal, not only for ^C */
Denys Vlasenko7e675362016-10-28 21:57:31 +020011046 ret = 128 + sig;
11047 break;
11048 }
11049 /* SIGCHLD, or no signal, or ignored one, such as SIGQUIT. Repeat */
11050 }
11051 return ret;
11052}
11053
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +020011054static int FAST_FUNC builtin_wait(char **argv)
Mike Frysinger56bdea12009-03-28 20:01:58 +000011055{
Denys Vlasenko7e675362016-10-28 21:57:31 +020011056 int ret;
Denys Vlasenko9d6cbaf2011-05-11 23:56:11 +020011057 int status;
Mike Frysinger56bdea12009-03-28 20:01:58 +000011058
Denys Vlasenkob131cce2010-05-20 03:39:43 +020011059 argv = skip_dash_dash(argv);
11060 if (argv[0] == NULL) {
Denis Vlasenko7566bae2009-03-31 17:24:49 +000011061 /* Don't care about wait results */
11062 /* Note 1: must wait until there are no more children */
11063 /* Note 2: must be interruptible */
11064 /* Examples:
11065 * $ sleep 3 & sleep 6 & wait
11066 * [1] 30934 sleep 3
11067 * [2] 30935 sleep 6
11068 * [1] Done sleep 3
11069 * [2] Done sleep 6
11070 * $ sleep 3 & sleep 6 & wait
11071 * [1] 30936 sleep 3
11072 * [2] 30937 sleep 6
11073 * [1] Done sleep 3
11074 * ^C <-- after ~4 sec from keyboard
11075 * $
11076 */
Denys Vlasenko62b717b2016-11-07 22:12:18 +010011077 return wait_for_child_or_signal(NULL, 0 /*(no job and no pid to wait for)*/);
Denis Vlasenko7566bae2009-03-31 17:24:49 +000011078 }
Mike Frysinger56bdea12009-03-28 20:01:58 +000011079
Denys Vlasenko7e675362016-10-28 21:57:31 +020011080 do {
Denis Vlasenkod5762932009-03-31 11:22:57 +000011081 pid_t pid = bb_strtou(*argv, NULL, 10);
Denys Vlasenko7e675362016-10-28 21:57:31 +020011082 if (errno || pid <= 0) {
Denys Vlasenko62b717b2016-11-07 22:12:18 +010011083#if ENABLE_HUSH_JOB
11084 if (argv[0][0] == '%') {
Denys Vlasenko02affb42016-11-08 00:59:29 +010011085 struct pipe *wait_pipe;
Denys Vlasenkod5b5c2f2017-01-08 15:46:04 +010011086 ret = 127; /* bash compat for bad jobspecs */
Denys Vlasenko62b717b2016-11-07 22:12:18 +010011087 wait_pipe = parse_jobspec(*argv);
11088 if (wait_pipe) {
Denys Vlasenko02affb42016-11-08 00:59:29 +010011089 ret = job_exited_or_stopped(wait_pipe);
Denys Vlasenko2ed74e22017-07-14 19:58:46 +020011090 if (ret < 0) {
Denys Vlasenko02affb42016-11-08 00:59:29 +010011091 ret = wait_for_child_or_signal(wait_pipe, 0);
Denys Vlasenko2ed74e22017-07-14 19:58:46 +020011092 } else {
11093 /* waiting on "last dead job" removes it */
11094 clean_up_last_dead_job();
Denys Vlasenko13102632017-07-08 00:24:32 +020011095 }
Denys Vlasenko62b717b2016-11-07 22:12:18 +010011096 }
Denys Vlasenkod5b5c2f2017-01-08 15:46:04 +010011097 /* else: parse_jobspec() already emitted error msg */
11098 continue;
Denys Vlasenko62b717b2016-11-07 22:12:18 +010011099 }
11100#endif
Denis Vlasenkod5762932009-03-31 11:22:57 +000011101 /* mimic bash message */
11102 bb_error_msg("wait: '%s': not a pid or valid job spec", *argv);
Denys Vlasenko9db74e42016-10-28 22:39:12 +020011103 ret = EXIT_FAILURE;
11104 continue; /* bash checks all argv[] */
Denis Vlasenkod5762932009-03-31 11:22:57 +000011105 }
Denys Vlasenko02affb42016-11-08 00:59:29 +010011106
Denys Vlasenko7e675362016-10-28 21:57:31 +020011107 /* Do we have such child? */
11108 ret = waitpid(pid, &status, WNOHANG);
11109 if (ret < 0) {
11110 /* No */
Denys Vlasenko840a4352017-07-07 22:56:02 +020011111 ret = 127;
Denys Vlasenko7e675362016-10-28 21:57:31 +020011112 if (errno == ECHILD) {
Denys Vlasenko0c5657e2017-07-14 19:27:03 +020011113 if (pid == G.last_bg_pid) {
Denys Vlasenko9db74e42016-10-28 22:39:12 +020011114 /* "wait $!" but last bg task has already exited. Try:
11115 * (sleep 1; exit 3) & sleep 2; echo $?; wait $!; echo $?
11116 * In bash it prints exitcode 0, then 3.
Denys Vlasenko26ad94b2016-11-07 23:07:21 +010011117 * In dash, it is 127.
Denys Vlasenko9db74e42016-10-28 22:39:12 +020011118 */
Denys Vlasenko840a4352017-07-07 22:56:02 +020011119 ret = G.last_bg_pid_exitcode;
Denys Vlasenko26ad94b2016-11-07 23:07:21 +010011120 } else {
11121 /* Example: "wait 1". mimic bash message */
11122 bb_error_msg("wait: pid %d is not a child of this shell", (int)pid);
Denys Vlasenko9db74e42016-10-28 22:39:12 +020011123 }
Denys Vlasenko7e675362016-10-28 21:57:31 +020011124 } else {
11125 /* ??? */
11126 bb_perror_msg("wait %s", *argv);
11127 }
Denys Vlasenko9db74e42016-10-28 22:39:12 +020011128 continue; /* bash checks all argv[] */
11129 }
11130 if (ret == 0) {
Denys Vlasenko7e675362016-10-28 21:57:31 +020011131 /* Yes, and it still runs */
Denys Vlasenko02affb42016-11-08 00:59:29 +010011132 ret = wait_for_child_or_signal(NULL, pid);
Denys Vlasenko7e675362016-10-28 21:57:31 +020011133 } else {
11134 /* Yes, and it just exited */
Denys Vlasenko02affb42016-11-08 00:59:29 +010011135 process_wait_result(NULL, pid, status);
Denys Vlasenko85378cd2015-10-11 21:47:11 +020011136 ret = WEXITSTATUS(status);
Mike Frysinger56bdea12009-03-28 20:01:58 +000011137 if (WIFSIGNALED(status))
11138 ret = 128 + WTERMSIG(status);
Mike Frysinger56bdea12009-03-28 20:01:58 +000011139 }
Denys Vlasenko9db74e42016-10-28 22:39:12 +020011140 } while (*++argv);
Mike Frysinger56bdea12009-03-28 20:01:58 +000011141
11142 return ret;
11143}
Denys Vlasenko1125d7d2017-01-08 17:19:38 +010011144#endif
Mike Frysinger56bdea12009-03-28 20:01:58 +000011145
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +000011146#if ENABLE_HUSH_LOOPS || ENABLE_HUSH_FUNCTIONS
11147static unsigned parse_numeric_argv1(char **argv, unsigned def, unsigned def_min)
11148{
11149 if (argv[1]) {
11150 def = bb_strtou(argv[1], NULL, 10);
11151 if (errno || def < def_min || argv[2]) {
11152 bb_error_msg("%s: bad arguments", argv[0]);
11153 def = UINT_MAX;
11154 }
11155 }
11156 return def;
11157}
11158#endif
11159
Denis Vlasenkodadfb492008-07-29 10:16:05 +000011160#if ENABLE_HUSH_LOOPS
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +020011161static int FAST_FUNC builtin_break(char **argv)
Denis Vlasenkobcb25532008-07-28 23:04:34 +000011162{
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +000011163 unsigned depth;
Denis Vlasenko87a86552008-07-29 19:43:10 +000011164 if (G.depth_of_loop == 0) {
Denis Vlasenko4f504a92008-07-29 19:48:30 +000011165 bb_error_msg("%s: only meaningful in a loop", argv[0]);
Denys Vlasenko49117b42016-07-21 14:40:08 +020011166 /* if we came from builtin_continue(), need to undo "= 1" */
11167 G.flag_break_continue = 0;
Denis Vlasenkofcf37c32008-07-29 11:37:15 +000011168 return EXIT_SUCCESS; /* bash compat */
11169 }
Denys Vlasenko49117b42016-07-21 14:40:08 +020011170 G.flag_break_continue++; /* BC_BREAK = 1, or BC_CONTINUE = 2 */
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +000011171
11172 G.depth_break_continue = depth = parse_numeric_argv1(argv, 1, 1);
11173 if (depth == UINT_MAX)
11174 G.flag_break_continue = BC_BREAK;
11175 if (G.depth_of_loop < depth)
Denis Vlasenko87a86552008-07-29 19:43:10 +000011176 G.depth_break_continue = G.depth_of_loop;
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +000011177
Denis Vlasenkobcb25532008-07-28 23:04:34 +000011178 return EXIT_SUCCESS;
11179}
11180
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +020011181static int FAST_FUNC builtin_continue(char **argv)
Denis Vlasenkobcb25532008-07-28 23:04:34 +000011182{
Denis Vlasenko4f504a92008-07-29 19:48:30 +000011183 G.flag_break_continue = 1; /* BC_CONTINUE = 2 = 1+1 */
11184 return builtin_break(argv);
Denis Vlasenkobcb25532008-07-28 23:04:34 +000011185}
Denis Vlasenkodadfb492008-07-29 10:16:05 +000011186#endif
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +000011187
11188#if ENABLE_HUSH_FUNCTIONS
Denys Vlasenkod5f1b1b2009-06-05 12:06:05 +020011189static int FAST_FUNC builtin_return(char **argv)
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +000011190{
11191 int rc;
11192
Denys Vlasenko04b46bc2016-10-01 22:28:03 +020011193 if (G_flag_return_in_progress != -1) {
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +000011194 bb_error_msg("%s: not in a function or sourced script", argv[0]);
11195 return EXIT_FAILURE; /* bash compat */
11196 }
11197
Denys Vlasenko04b46bc2016-10-01 22:28:03 +020011198 G_flag_return_in_progress = 1;
Denis Vlasenko3d40d8e2009-04-17 23:44:18 +000011199
11200 /* bash:
11201 * out of range: wraps around at 256, does not error out
11202 * non-numeric param:
11203 * f() { false; return qwe; }; f; echo $?
11204 * bash: return: qwe: numeric argument required <== we do this
11205 * 255 <== we also do this
11206 */
11207 rc = parse_numeric_argv1(argv, G.last_exitcode, 0);
11208 return rc;
11209}
11210#endif
Denys Vlasenkoa1184af2017-01-10 15:58:02 +010011211
Denys Vlasenko11f2e992017-08-10 16:34:03 +020011212#if ENABLE_HUSH_TIMES
11213static int FAST_FUNC builtin_times(char **argv UNUSED_PARAM)
11214{
11215 static const uint8_t times_tbl[] ALIGN1 = {
11216 ' ', offsetof(struct tms, tms_utime),
11217 '\n', offsetof(struct tms, tms_stime),
11218 ' ', offsetof(struct tms, tms_cutime),
11219 '\n', offsetof(struct tms, tms_cstime),
11220 0
11221 };
11222 const uint8_t *p;
11223 unsigned clk_tck;
11224 struct tms buf;
11225
11226 clk_tck = bb_clk_tck();
11227
11228 times(&buf);
11229 p = times_tbl;
11230 do {
11231 unsigned sec, frac;
11232 unsigned long t;
11233 t = *(clock_t *)(((char *) &buf) + p[1]);
11234 sec = t / clk_tck;
11235 frac = t % clk_tck;
11236 printf("%um%u.%03us%c",
11237 sec / 60, sec % 60,
11238 (frac * 1000) / clk_tck,
11239 p[0]);
11240 p += 2;
11241 } while (*p);
11242
11243 return EXIT_SUCCESS;
11244}
11245#endif
11246
Denys Vlasenkoa1184af2017-01-10 15:58:02 +010011247#if ENABLE_HUSH_MEMLEAK
11248static int FAST_FUNC builtin_memleak(char **argv UNUSED_PARAM)
11249{
11250 void *p;
11251 unsigned long l;
11252
11253# ifdef M_TRIM_THRESHOLD
11254 /* Optional. Reduces probability of false positives */
11255 malloc_trim(0);
11256# endif
11257 /* Crude attempt to find where "free memory" starts,
11258 * sans fragmentation. */
11259 p = malloc(240);
11260 l = (unsigned long)p;
11261 free(p);
11262 p = malloc(3400);
11263 if (l < (unsigned long)p) l = (unsigned long)p;
11264 free(p);
11265
11266
11267# if 0 /* debug */
11268 {
11269 struct mallinfo mi = mallinfo();
11270 printf("top alloc:0x%lx malloced:%d+%d=%d\n", l,
11271 mi.arena, mi.hblkhd, mi.arena + mi.hblkhd);
11272 }
11273# endif
11274
11275 if (!G.memleak_value)
11276 G.memleak_value = l;
11277
11278 l -= G.memleak_value;
11279 if ((long)l < 0)
11280 l = 0;
11281 l /= 1024;
11282 if (l > 127)
11283 l = 127;
11284
11285 /* Exitcode is "how many kilobytes we leaked since 1st call" */
11286 return l;
11287}
11288#endif