exec.c revision 1.2 1 1.2 tls /* $NetBSD: exec.c,v 1.2 1997/01/12 19:11:49 tls Exp $ */
2 1.2 tls
3 1.1 jtc /*
4 1.1 jtc * execute command tree
5 1.1 jtc */
6 1.1 jtc
7 1.1 jtc #include "sh.h"
8 1.1 jtc #include "c_test.h"
9 1.1 jtc #include <ctype.h>
10 1.1 jtc #include "ksh_stat.h"
11 1.1 jtc
12 1.1 jtc /* Does ps4 get parameter substitutions done? */
13 1.1 jtc #ifdef KSH
14 1.1 jtc # define PS4_SUBSTITUTE(s) substitute((s), 0)
15 1.1 jtc #else
16 1.1 jtc # define PS4_SUBSTITUTE(s) (s)
17 1.1 jtc #endif /* KSH */
18 1.1 jtc
19 1.1 jtc static int comexec ARGS((struct op *t, struct tbl *volatile tp, char **ap,
20 1.1 jtc int volatile flags));
21 1.1 jtc static void scriptexec ARGS((struct op *tp, char **ap));
22 1.1 jtc static int call_builtin ARGS((struct tbl *tp, char **wp));
23 1.1 jtc static int iosetup ARGS((struct ioword *iop, struct tbl *tp));
24 1.1 jtc static int herein ARGS((char *hname, int sub));
25 1.1 jtc #ifdef KSH
26 1.1 jtc static char *do_selectargs ARGS((char **ap, bool_t print_menu));
27 1.1 jtc #endif /* KSH */
28 1.1 jtc #ifdef KSH
29 1.1 jtc static int dbteste_isa ARGS((Test_env *te, Test_meta meta));
30 1.1 jtc static const char *dbteste_getopnd ARGS((Test_env *te, Test_op op,
31 1.1 jtc int do_eval));
32 1.1 jtc static int dbteste_eval ARGS((Test_env *te, Test_op op, const char *opnd1,
33 1.1 jtc const char *opnd2, int do_eval));
34 1.1 jtc static void dbteste_error ARGS((Test_env *te, int offset, const char *msg));
35 1.1 jtc #endif /* KSH */
36 1.1 jtc #ifdef OS2
37 1.2 tls static int search_access1 ARGS((const char *path, int mode, int *errnop));
38 1.1 jtc #endif /* OS2 */
39 1.1 jtc
40 1.1 jtc
41 1.1 jtc /*
42 1.1 jtc * handle systems that don't have F_SETFD
43 1.1 jtc */
44 1.1 jtc #ifndef F_SETFD
45 1.1 jtc # ifndef MAXFD
46 1.1 jtc # define MAXFD 64
47 1.1 jtc # endif
48 1.1 jtc /* a bit field would be smaller, but this will work */
49 1.1 jtc static char clexec_tab[MAXFD+1];
50 1.1 jtc #endif
51 1.1 jtc
52 1.1 jtc /*
53 1.1 jtc * we now use this function always.
54 1.1 jtc */
55 1.1 jtc int
56 1.1 jtc fd_clexec(fd)
57 1.1 jtc int fd;
58 1.1 jtc {
59 1.1 jtc #ifndef F_SETFD
60 1.1 jtc if (fd >= 0 && fd < sizeof(clexec_tab)) {
61 1.1 jtc clexec_tab[fd] = 1;
62 1.1 jtc return 0;
63 1.1 jtc }
64 1.1 jtc return -1;
65 1.1 jtc #else
66 1.1 jtc return fcntl(fd, F_SETFD, 1);
67 1.1 jtc #endif
68 1.1 jtc }
69 1.1 jtc
70 1.1 jtc
71 1.1 jtc /*
72 1.1 jtc * execute command tree
73 1.1 jtc */
74 1.1 jtc int
75 1.1 jtc execute(t, flags)
76 1.1 jtc struct op * volatile t;
77 1.1 jtc volatile int flags; /* if XEXEC don't fork */
78 1.1 jtc {
79 1.1 jtc int i;
80 1.1 jtc volatile int rv = 0;
81 1.1 jtc int pv[2];
82 1.1 jtc char ** volatile ap;
83 1.1 jtc char *s, *cp;
84 1.1 jtc struct ioword **iowp;
85 1.1 jtc struct tbl *tp = NULL;
86 1.1 jtc
87 1.1 jtc if (t == NULL)
88 1.1 jtc return 0;
89 1.1 jtc
90 1.1 jtc /* Is this the end of a pipeline? If so, we want to evaluate the
91 1.1 jtc * command arguments
92 1.1 jtc bool_t eval_done = FALSE;
93 1.1 jtc if ((flags&XFORK) && !(flags&XEXEC) && (flags&XPCLOSE)) {
94 1.1 jtc eval_done = TRUE;
95 1.1 jtc tp = eval_execute_args(t, &ap);
96 1.1 jtc }
97 1.1 jtc */
98 1.1 jtc if ((flags&XFORK) && !(flags&XEXEC) && t->type != TPIPE)
99 1.1 jtc return exchild(t, flags, -1); /* run in sub-process */
100 1.1 jtc
101 1.1 jtc newenv(E_EXEC);
102 1.1 jtc if (trap)
103 1.1 jtc runtraps(0);
104 1.1 jtc
105 1.1 jtc if (t->type == TCOM) {
106 1.1 jtc /* Clear subst_exstat before argument expansion. Used by
107 1.1 jtc * null commands (see comexec()) and by c_set().
108 1.1 jtc */
109 1.1 jtc subst_exstat = 0;
110 1.1 jtc
111 1.1 jtc /* POSIX says expand command words first, then redirections,
112 1.1 jtc * and assignments last..
113 1.1 jtc */
114 1.1 jtc ap = eval(t->args, t->u.evalflags | DOBLANK | DOGLOB | DOTILDE);
115 1.1 jtc if (Flag(FXTRACE) && ap[0]) {
116 1.1 jtc shf_fprintf(shl_out, "%s",
117 1.1 jtc PS4_SUBSTITUTE(str_val(global("PS4"))));
118 1.1 jtc for (i = 0; ap[i]; i++)
119 1.1 jtc shf_fprintf(shl_out, "%s%s", ap[i],
120 1.1 jtc ap[i + 1] ? space : newline);
121 1.1 jtc shf_flush(shl_out);
122 1.1 jtc }
123 1.1 jtc if (ap[0])
124 1.1 jtc tp = findcom(ap[0], FC_BI|FC_FUNC);
125 1.1 jtc }
126 1.1 jtc
127 1.1 jtc if (t->ioact != NULL || t->type == TPIPE || t->type == TCOPROC) {
128 1.1 jtc e->savefd = (short *) alloc(sizeofN(short, NUFILE), ATEMP);
129 1.1 jtc /* initialize to not redirected */
130 1.1 jtc memset(e->savefd, 0, sizeofN(short, NUFILE));
131 1.1 jtc }
132 1.1 jtc
133 1.1 jtc /* do redirection, to be restored in quitenv() */
134 1.1 jtc if (t->ioact != NULL)
135 1.1 jtc for (iowp = t->ioact; *iowp != NULL; iowp++) {
136 1.1 jtc if (iosetup(*iowp, tp) < 0) {
137 1.1 jtc exstat = rv = 1;
138 1.1 jtc /* Redirection failures for special commands
139 1.1 jtc * cause (non-interactive) shell to exit.
140 1.1 jtc */
141 1.1 jtc if (tp && tp->type == CSHELL
142 1.1 jtc && (tp->flag & SPEC_BI))
143 1.1 jtc errorf(null);
144 1.1 jtc /* Deal with FERREXIT, quitenv(), etc. */
145 1.1 jtc goto Break;
146 1.1 jtc }
147 1.1 jtc }
148 1.1 jtc
149 1.1 jtc switch(t->type) {
150 1.1 jtc case TCOM:
151 1.1 jtc rv = comexec(t, tp, ap, flags);
152 1.1 jtc break;
153 1.1 jtc
154 1.1 jtc case TPAREN:
155 1.1 jtc rv = execute(t->left, flags|XFORK);
156 1.1 jtc break;
157 1.1 jtc
158 1.1 jtc case TPIPE:
159 1.1 jtc flags |= XFORK;
160 1.1 jtc flags &= ~XEXEC;
161 1.1 jtc e->savefd[0] = savefd(0, 0);
162 1.1 jtc (void) ksh_dup2(e->savefd[0], 0, FALSE); /* stdin of first */
163 1.1 jtc e->savefd[1] = savefd(1, 0);
164 1.1 jtc while (t->type == TPIPE) {
165 1.1 jtc openpipe(pv);
166 1.1 jtc (void) ksh_dup2(pv[1], 1, FALSE); /* stdout of curr */
167 1.1 jtc /* Let exchild() close pv[0] in child
168 1.1 jtc * (if this isn't done, commands like
169 1.1 jtc * (: ; cat /etc/termcap) | sleep 1
170 1.1 jtc * will hang forever).
171 1.1 jtc */
172 1.1 jtc exchild(t->left, flags|XPIPEO|XCCLOSE, pv[0]);
173 1.1 jtc (void) ksh_dup2(pv[0], 0, FALSE); /* stdin of next */
174 1.1 jtc closepipe(pv);
175 1.1 jtc flags |= XPIPEI;
176 1.1 jtc t = t->right;
177 1.1 jtc }
178 1.1 jtc restfd(1, e->savefd[1]); /* stdout of last */
179 1.1 jtc e->savefd[1] = 0; /* no need to re-restore this */
180 1.1 jtc /* Let exchild() close 0 in parent, after fork, before wait */
181 1.1 jtc i = exchild(t, flags|XPCLOSE, 0);
182 1.1 jtc if (!(flags&XBGND) && !(flags&XXCOM))
183 1.1 jtc rv = i;
184 1.1 jtc break;
185 1.1 jtc
186 1.1 jtc case TLIST:
187 1.1 jtc while (t->type == TLIST) {
188 1.1 jtc execute(t->left, flags & XERROK);
189 1.1 jtc t = t->right;
190 1.1 jtc }
191 1.1 jtc rv = execute(t, flags & XERROK);
192 1.1 jtc break;
193 1.1 jtc
194 1.1 jtc #ifdef KSH
195 1.1 jtc case TCOPROC:
196 1.1 jtc {
197 1.1 jtc # ifdef JOB_SIGS
198 1.1 jtc sigset_t omask;
199 1.1 jtc # endif /* JOB_SIGS */
200 1.1 jtc
201 1.1 jtc # ifdef JOB_SIGS
202 1.1 jtc /* Block sigchild as we are using things changed in the
203 1.1 jtc * signal handler
204 1.1 jtc */
205 1.1 jtc sigprocmask(SIG_BLOCK, &sm_sigchld, &omask);
206 1.1 jtc e->type = E_ERRH;
207 1.1 jtc i = ksh_sigsetjmp(e->jbuf, 0);
208 1.1 jtc if (i) {
209 1.1 jtc sigprocmask(SIG_SETMASK, &omask, (sigset_t *) 0);
210 1.1 jtc quitenv();
211 1.1 jtc unwind(i);
212 1.1 jtc /*NOTREACHED*/
213 1.1 jtc }
214 1.1 jtc # endif /* JOB_SIGS */
215 1.1 jtc /* Already have a (live) co-process? */
216 1.1 jtc if (coproc.job && coproc.write >= 0)
217 1.1 jtc errorf("coprocess already exists");
218 1.1 jtc
219 1.1 jtc /* Can we re-use the existing co-process pipe? */
220 1.1 jtc coproc_cleanup(TRUE);
221 1.1 jtc
222 1.1 jtc /* do this before opening pipes, in case these fail */
223 1.1 jtc e->savefd[0] = savefd(0, 0);
224 1.1 jtc e->savefd[1] = savefd(1, 0);
225 1.1 jtc
226 1.1 jtc openpipe(pv);
227 1.1 jtc ksh_dup2(pv[0], 0, FALSE);
228 1.1 jtc close(pv[0]);
229 1.1 jtc coproc.write = pv[1];
230 1.1 jtc coproc.job = (void *) 0;
231 1.1 jtc
232 1.1 jtc if (coproc.readw >= 0)
233 1.1 jtc ksh_dup2(coproc.readw, 1, FALSE);
234 1.1 jtc else {
235 1.1 jtc openpipe(pv);
236 1.1 jtc coproc.read = pv[0];
237 1.1 jtc ksh_dup2(pv[1], 1, FALSE);
238 1.1 jtc coproc.readw = pv[1]; /* closed before first read */
239 1.1 jtc coproc.njobs = 0;
240 1.1 jtc /* create new coprocess id */
241 1.1 jtc ++coproc.id;
242 1.1 jtc }
243 1.1 jtc # ifdef JOB_SIGS
244 1.1 jtc sigprocmask(SIG_SETMASK, &omask, (sigset_t *) 0);
245 1.1 jtc e->type = E_EXEC; /* no more need for error handler */
246 1.1 jtc # endif /* JOB_SIGS */
247 1.1 jtc
248 1.1 jtc /* exchild() closes coproc.* in child after fork,
249 1.1 jtc * will also increment coproc.njobs when the
250 1.1 jtc * job is actually created.
251 1.1 jtc */
252 1.1 jtc flags &= ~XEXEC;
253 1.1 jtc exchild(t->left, flags|XBGND|XFORK|XCOPROC|XCCLOSE,
254 1.1 jtc coproc.readw);
255 1.1 jtc break;
256 1.1 jtc }
257 1.1 jtc #endif /* KSH */
258 1.1 jtc
259 1.1 jtc case TASYNC:
260 1.1 jtc /* XXX non-optimal, I think - "(foo &)", forks for (),
261 1.1 jtc * forks again for async... parent should optimize
262 1.1 jtc * this to "foo &"...
263 1.1 jtc */
264 1.1 jtc rv = execute(t->left, (flags&~XEXEC)|XBGND|XFORK);
265 1.1 jtc break;
266 1.1 jtc
267 1.1 jtc case TOR:
268 1.1 jtc case TAND:
269 1.1 jtc rv = execute(t->left, XERROK);
270 1.1 jtc if (t->right != NULL && (rv == 0) == (t->type == TAND))
271 1.1 jtc rv = execute(t->right, flags & XERROK);
272 1.1 jtc else
273 1.1 jtc flags |= XERROK;
274 1.1 jtc break;
275 1.1 jtc
276 1.1 jtc case TBANG:
277 1.1 jtc rv = !execute(t->right, XERROK);
278 1.1 jtc break;
279 1.1 jtc
280 1.1 jtc #ifdef KSH
281 1.1 jtc case TDBRACKET:
282 1.1 jtc {
283 1.1 jtc Test_env te;
284 1.1 jtc
285 1.1 jtc te.flags = TEF_DBRACKET;
286 1.1 jtc te.pos.wp = t->args;
287 1.1 jtc te.isa = dbteste_isa;
288 1.1 jtc te.getopnd = dbteste_getopnd;
289 1.1 jtc te.eval = dbteste_eval;
290 1.1 jtc te.error = dbteste_error;
291 1.1 jtc
292 1.1 jtc rv = test_parse(&te);
293 1.1 jtc break;
294 1.1 jtc }
295 1.1 jtc #endif /* KSH */
296 1.1 jtc
297 1.1 jtc case TFOR:
298 1.1 jtc #ifdef KSH
299 1.1 jtc case TSELECT:
300 1.1 jtc {
301 1.1 jtc volatile bool_t is_first = TRUE;
302 1.1 jtc #endif /* KSH */
303 1.1 jtc ap = (t->vars != NULL) ?
304 1.1 jtc eval(t->vars, DOBLANK|DOGLOB|DOTILDE)
305 1.1 jtc : e->loc->argv + 1;
306 1.1 jtc e->type = E_LOOP;
307 1.1 jtc while (1) {
308 1.1 jtc i = ksh_sigsetjmp(e->jbuf, 0);
309 1.1 jtc if (!i)
310 1.1 jtc break;
311 1.1 jtc if ((e->flags&EF_BRKCONT_PASS)
312 1.1 jtc || (i != LBREAK && i != LCONTIN))
313 1.1 jtc {
314 1.1 jtc quitenv();
315 1.1 jtc unwind(i);
316 1.1 jtc } else if (i == LBREAK) {
317 1.1 jtc rv = 0;
318 1.1 jtc goto Break;
319 1.1 jtc }
320 1.1 jtc }
321 1.1 jtc rv = 0; /* in case of a continue */
322 1.1 jtc if (t->type == TFOR) {
323 1.1 jtc struct tbl *vq;
324 1.1 jtc
325 1.1 jtc while (*ap != NULL) {
326 1.1 jtc vq = global(t->str);
327 1.1 jtc if (vq->flag & RDONLY)
328 1.1 jtc errorf("%s is read only", t->str);
329 1.1 jtc setstr(vq, *ap++);
330 1.1 jtc rv = execute(t->left, flags & XERROK);
331 1.1 jtc }
332 1.1 jtc }
333 1.1 jtc #ifdef KSH
334 1.1 jtc else { /* TSELECT */
335 1.1 jtc struct tbl *vq;
336 1.1 jtc
337 1.1 jtc for (;;) {
338 1.1 jtc if (!(cp = do_selectargs(ap, is_first))) {
339 1.1 jtc rv = 1;
340 1.1 jtc break;
341 1.1 jtc }
342 1.1 jtc is_first = FALSE;
343 1.1 jtc vq = global(t->str);
344 1.1 jtc if (vq->flag & RDONLY)
345 1.1 jtc errorf("%s is read only", t->str);
346 1.1 jtc setstr(vq, cp);
347 1.1 jtc rv = execute(t->left, flags & XERROK);
348 1.1 jtc }
349 1.1 jtc }
350 1.1 jtc }
351 1.1 jtc #endif /* KSH */
352 1.1 jtc break;
353 1.1 jtc
354 1.1 jtc case TWHILE:
355 1.1 jtc case TUNTIL:
356 1.1 jtc e->type = E_LOOP;
357 1.1 jtc while (1) {
358 1.1 jtc i = ksh_sigsetjmp(e->jbuf, 0);
359 1.1 jtc if (!i)
360 1.1 jtc break;
361 1.1 jtc if ((e->flags&EF_BRKCONT_PASS)
362 1.1 jtc || (i != LBREAK && i != LCONTIN))
363 1.1 jtc {
364 1.1 jtc quitenv();
365 1.1 jtc unwind(i);
366 1.1 jtc } else if (i == LBREAK) {
367 1.1 jtc rv = 0;
368 1.1 jtc goto Break;
369 1.1 jtc }
370 1.1 jtc }
371 1.1 jtc rv = 0; /* in case of a continue */
372 1.1 jtc while ((execute(t->left, XERROK) == 0) == (t->type == TWHILE))
373 1.1 jtc rv = execute(t->right, flags & XERROK);
374 1.1 jtc break;
375 1.1 jtc
376 1.1 jtc case TIF:
377 1.1 jtc case TELIF:
378 1.1 jtc if (t->right == NULL)
379 1.1 jtc break; /* should be error */
380 1.1 jtc rv = execute(t->left, XERROK) == 0 ?
381 1.1 jtc execute(t->right->left, flags & XERROK) :
382 1.1 jtc execute(t->right->right, flags & XERROK);
383 1.1 jtc break;
384 1.1 jtc
385 1.1 jtc case TCASE:
386 1.1 jtc cp = evalstr(t->str, DOTILDE);
387 1.1 jtc for (t = t->left; t != NULL && t->type == TPAT; t = t->right)
388 1.1 jtc for (ap = t->vars; *ap; ap++)
389 1.1 jtc if ((s = evalstr(*ap, DOTILDE|DOPAT))
390 1.1 jtc && gmatch(cp, s, FALSE))
391 1.1 jtc goto Found;
392 1.1 jtc break;
393 1.1 jtc Found:
394 1.1 jtc rv = execute(t->left, flags & XERROK);
395 1.1 jtc break;
396 1.1 jtc
397 1.1 jtc case TBRACE:
398 1.1 jtc rv = execute(t->left, flags & XERROK);
399 1.1 jtc break;
400 1.1 jtc
401 1.1 jtc case TFUNCT:
402 1.1 jtc rv = define(t->str, t);
403 1.1 jtc break;
404 1.1 jtc
405 1.1 jtc case TTIME:
406 1.1 jtc rv = timex(t, flags);
407 1.1 jtc break;
408 1.1 jtc
409 1.1 jtc case TEXEC: /* an eval'd TCOM */
410 1.1 jtc s = t->args[0];
411 1.1 jtc ap = makenv();
412 1.1 jtc #ifndef F_SETFD
413 1.1 jtc for (i = 0; i < sizeof(clexec_tab); i++)
414 1.1 jtc if (clexec_tab[i]) {
415 1.1 jtc close(i);
416 1.1 jtc clexec_tab[i] = 0;
417 1.1 jtc }
418 1.1 jtc #endif
419 1.1 jtc restoresigs();
420 1.2 tls cleanup_proc_env();
421 1.1 jtc ksh_execve(t->str, t->args, ap);
422 1.1 jtc if (errno == ENOEXEC)
423 1.1 jtc scriptexec(t, ap);
424 1.1 jtc else
425 1.1 jtc errorf("%s: %s", s, strerror(errno));
426 1.1 jtc }
427 1.1 jtc Break:
428 1.1 jtc exstat = rv;
429 1.1 jtc
430 1.1 jtc quitenv(); /* restores IO */
431 1.1 jtc if ((flags&XEXEC))
432 1.1 jtc exit(rv); /* exit child */
433 1.1 jtc if (rv != 0 && !(flags & XERROK)) {
434 1.1 jtc if (Flag(FERREXIT))
435 1.1 jtc unwind(LERROR);
436 1.1 jtc trapsig(SIGERR_);
437 1.1 jtc }
438 1.1 jtc return rv;
439 1.1 jtc }
440 1.1 jtc
441 1.1 jtc /*
442 1.1 jtc * execute simple command
443 1.1 jtc */
444 1.1 jtc
445 1.1 jtc static int
446 1.1 jtc comexec(t, tp, ap, flags)
447 1.1 jtc struct op *t;
448 1.1 jtc struct tbl *volatile tp;
449 1.1 jtc register char **ap;
450 1.1 jtc int volatile flags;
451 1.1 jtc {
452 1.1 jtc int i;
453 1.1 jtc int rv = 0;
454 1.1 jtc register char *cp;
455 1.1 jtc register char **lastp;
456 1.1 jtc static struct op texec; /* Must be static (XXX but why?) */
457 1.1 jtc int type_flags;
458 1.1 jtc int keepasn_ok;
459 1.1 jtc int fcflags = FC_BI|FC_FUNC|FC_PATH;
460 1.1 jtc
461 1.1 jtc /* snag the last argument for $_ XXX not the same as at&t ksh,
462 1.1 jtc * which only seems to set $_ after a newline (but not in
463 1.1 jtc * functions/dot scripts, but in interactive and scipt) -
464 1.1 jtc * perhaps save last arg here and set it in shell()?.
465 1.1 jtc */
466 1.1 jtc if (*(lastp = ap)) {
467 1.1 jtc while (*++lastp)
468 1.1 jtc ;
469 1.1 jtc setstr(typeset("_", LOCAL, 0, 0, 0), *--lastp);
470 1.1 jtc }
471 1.1 jtc
472 1.1 jtc /* Deal with the shell builtins builtin, exec and command since
473 1.1 jtc * they can be followed by other commands. This must be done before
474 1.1 jtc * we know if we should create a local block, which must be done
475 1.1 jtc * before we can do a path search (in case the assignments change
476 1.1 jtc * PATH).
477 1.1 jtc * Odd cases:
478 1.1 jtc * FOO=bar exec > /dev/null FOO is kept but not exported
479 1.1 jtc * FOO=bar exec foobar FOO is exported
480 1.1 jtc * FOO=bar command exec > /dev/null FOO is neither kept nor exported
481 1.1 jtc * FOO=bar command FOO is neither kept nor exported
482 1.1 jtc * PATH=... foobar use new PATH in foobar search
483 1.1 jtc */
484 1.1 jtc keepasn_ok = 1;
485 1.1 jtc while (tp && tp->type == CSHELL) {
486 1.1 jtc fcflags = FC_BI|FC_FUNC|FC_PATH;/* undo effects of command */
487 1.1 jtc if (tp->val.f == c_builtin) {
488 1.1 jtc if ((cp = *++ap) == NULL) {
489 1.1 jtc tp = NULL;
490 1.1 jtc break;
491 1.1 jtc }
492 1.1 jtc tp = findcom(cp, FC_BI);
493 1.1 jtc if (tp == NULL)
494 1.1 jtc errorf("builtin: %s: not a builtin", cp);
495 1.1 jtc continue;
496 1.1 jtc } else if (tp->val.f == c_exec) {
497 1.1 jtc if (ap[1] == NULL)
498 1.1 jtc break;
499 1.1 jtc ap++;
500 1.1 jtc flags |= XEXEC;
501 1.1 jtc } else if (tp->val.f == c_command) {
502 1.1 jtc int optc, saw_p = 0;
503 1.1 jtc
504 1.1 jtc /* Ugly dealing with options in two places (here and
505 1.1 jtc * in c_command(), but such is life)
506 1.1 jtc */
507 1.1 jtc ksh_getopt_reset(&builtin_opt, 0);
508 1.1 jtc while ((optc = ksh_getopt(ap, &builtin_opt, ":p"))
509 1.1 jtc == 'p')
510 1.1 jtc saw_p = 1;
511 1.1 jtc if (optc != EOF)
512 1.1 jtc break; /* command -vV or something */
513 1.1 jtc /* don't look for functions */
514 1.1 jtc fcflags = FC_BI|FC_PATH;
515 1.1 jtc if (saw_p) {
516 1.1 jtc if (Flag(FRESTRICTED)) {
517 1.1 jtc warningf(TRUE,
518 1.1 jtc "command -p: restricted");
519 1.1 jtc rv = 1;
520 1.1 jtc goto Leave;
521 1.1 jtc }
522 1.1 jtc fcflags |= FC_DEFPATH;
523 1.1 jtc }
524 1.1 jtc ap += builtin_opt.optind;
525 1.2 tls /* POSIX says special builtins lose their status
526 1.1 jtc * if accessed using command.
527 1.1 jtc */
528 1.1 jtc keepasn_ok = 0;
529 1.1 jtc if (!ap[0]) {
530 1.1 jtc /* ensure command with no args exits with 0 */
531 1.1 jtc subst_exstat = 0;
532 1.1 jtc break;
533 1.1 jtc }
534 1.1 jtc } else
535 1.1 jtc break;
536 1.1 jtc tp = findcom(ap[0], fcflags & (FC_BI|FC_FUNC));
537 1.1 jtc }
538 1.1 jtc if (keepasn_ok && (!ap[0] || (tp && (tp->flag & KEEPASN))))
539 1.1 jtc type_flags = 0;
540 1.1 jtc else {
541 1.1 jtc /* create new variable/function block */
542 1.1 jtc newblock();
543 1.1 jtc /* ksh functions don't keep assignments, POSIX functions do. */
544 1.1 jtc if (keepasn_ok && tp && tp->type == CFUNC
545 1.1 jtc && !(tp->flag & FKSH))
546 1.1 jtc type_flags = 0;
547 1.1 jtc else
548 1.1 jtc type_flags = LOCAL|LOCAL_COPY|EXPORT;
549 1.1 jtc }
550 1.1 jtc if (Flag(FEXPORT))
551 1.1 jtc type_flags |= EXPORT;
552 1.1 jtc for (i = 0; t->vars[i]; i++) {
553 1.1 jtc cp = evalstr(t->vars[i], DOASNTILDE);
554 1.1 jtc if (Flag(FXTRACE)) {
555 1.1 jtc if (i == 0)
556 1.1 jtc shf_fprintf(shl_out, "%s",
557 1.1 jtc PS4_SUBSTITUTE(str_val(global("PS4"))));
558 1.1 jtc shf_fprintf(shl_out, "%s%s", cp,
559 1.1 jtc t->vars[i + 1] ? space : newline);
560 1.1 jtc if (!t->vars[i + 1])
561 1.1 jtc shf_flush(shl_out);
562 1.1 jtc }
563 1.1 jtc typeset(cp, type_flags, 0, 0, 0);
564 1.1 jtc }
565 1.1 jtc
566 1.1 jtc if ((cp = *ap) == NULL) {
567 1.1 jtc rv = subst_exstat;
568 1.1 jtc goto Leave;
569 1.1 jtc } else if (!tp) {
570 1.1 jtc if (Flag(FRESTRICTED) && ksh_strchr_dirsep(cp)) {
571 1.1 jtc warningf(TRUE, "%s: restricted", cp);
572 1.1 jtc rv = 1;
573 1.1 jtc goto Leave;
574 1.1 jtc }
575 1.1 jtc tp = findcom(cp, fcflags);
576 1.1 jtc }
577 1.1 jtc
578 1.1 jtc switch (tp->type) {
579 1.1 jtc case CSHELL: /* shell built-in */
580 1.1 jtc rv = call_builtin(tp, ap);
581 1.1 jtc break;
582 1.1 jtc
583 1.1 jtc case CFUNC: /* function call */
584 1.1 jtc {
585 1.1 jtc volatile int old_xflag;
586 1.1 jtc volatile Tflag old_inuse;
587 1.1 jtc const char *volatile old_kshname;
588 1.1 jtc
589 1.1 jtc if (!(tp->flag & ISSET)) {
590 1.1 jtc struct tbl *ftp;
591 1.1 jtc
592 1.1 jtc if (!tp->u.fpath) {
593 1.1 jtc if (tp->u2.errno_) {
594 1.1 jtc warningf(TRUE,
595 1.1 jtc "%s: can't find function definition file - %s",
596 1.1 jtc cp, strerror(tp->u2.errno_));
597 1.1 jtc rv = 126;
598 1.1 jtc } else {
599 1.1 jtc warningf(TRUE,
600 1.1 jtc "%s: can't find function definition file", cp);
601 1.1 jtc rv = 127;
602 1.1 jtc }
603 1.1 jtc break;
604 1.1 jtc }
605 1.1 jtc if (include(tp->u.fpath, 0, (char **) 0, 0) < 0) {
606 1.1 jtc warningf(TRUE,
607 1.1 jtc "%s: can't open function definition file %s - %s",
608 1.1 jtc cp, tp->u.fpath, strerror(errno));
609 1.1 jtc rv = 127;
610 1.1 jtc break;
611 1.1 jtc }
612 1.1 jtc if (!(ftp = findfunc(cp, hash(cp), FALSE))
613 1.1 jtc || !(ftp->flag & ISSET))
614 1.1 jtc {
615 1.1 jtc warningf(TRUE,
616 1.1 jtc "%s: function not defined by %s",
617 1.1 jtc cp, tp->u.fpath);
618 1.1 jtc rv = 127;
619 1.1 jtc break;
620 1.1 jtc }
621 1.1 jtc tp = ftp;
622 1.1 jtc }
623 1.1 jtc
624 1.1 jtc /* ksh functions set $0 to function name, POSIX functions leave
625 1.1 jtc * $0 unchanged.
626 1.1 jtc */
627 1.1 jtc old_kshname = kshname;
628 1.1 jtc if (tp->flag & FKSH)
629 1.1 jtc kshname = ap[0];
630 1.1 jtc e->loc->argv = ap;
631 1.1 jtc for (i = 0; *ap++ != NULL; i++)
632 1.1 jtc ;
633 1.1 jtc e->loc->argc = i - 1;
634 1.1 jtc getopts_reset(1);
635 1.1 jtc
636 1.1 jtc old_xflag = Flag(FXTRACE);
637 1.1 jtc Flag(FXTRACE) = tp->flag & TRACE ? TRUE : FALSE;
638 1.1 jtc
639 1.1 jtc old_inuse = tp->flag & FINUSE;
640 1.1 jtc tp->flag |= FINUSE;
641 1.1 jtc
642 1.1 jtc e->type = E_FUNC;
643 1.1 jtc i = ksh_sigsetjmp(e->jbuf, 0);
644 1.1 jtc if (i == 0) {
645 1.1 jtc /* seems odd to pass XERROK here, but at&t ksh does */
646 1.1 jtc exstat = execute(tp->val.t, flags & XERROK);
647 1.1 jtc i = LRETURN;
648 1.1 jtc }
649 1.1 jtc kshname = old_kshname;
650 1.1 jtc Flag(FXTRACE) = old_xflag;
651 1.1 jtc tp->flag = (tp->flag & ~FINUSE) | old_inuse;
652 1.1 jtc /* Were we deleted while executing? If so, free the execution
653 1.1 jtc * tree. todo: Unfortunately, the table entry is never re-used
654 1.1 jtc * until the lookup table is expanded.
655 1.1 jtc */
656 1.1 jtc if ((tp->flag & (FDELETE|FINUSE)) == FDELETE) {
657 1.1 jtc if (tp->flag & ALLOC) {
658 1.1 jtc tp->flag &= ~ALLOC;
659 1.1 jtc tfree(tp->val.t, tp->areap);
660 1.1 jtc }
661 1.1 jtc tp->flag = 0;
662 1.1 jtc }
663 1.1 jtc switch (i) {
664 1.1 jtc case LRETURN:
665 1.1 jtc case LERROR:
666 1.1 jtc rv = exstat;
667 1.1 jtc break;
668 1.1 jtc case LINTR:
669 1.1 jtc case LEXIT:
670 1.1 jtc case LLEAVE:
671 1.1 jtc case LSHELL:
672 1.1 jtc quitenv();
673 1.1 jtc unwind(i);
674 1.1 jtc /*NOTREACHED*/
675 1.1 jtc default:
676 1.1 jtc quitenv();
677 1.1 jtc internal_errorf(1, "CFUNC %d", i);
678 1.1 jtc }
679 1.1 jtc break;
680 1.1 jtc }
681 1.1 jtc
682 1.1 jtc case CEXEC: /* executable command */
683 1.1 jtc case CTALIAS: /* tracked alias */
684 1.1 jtc if (!(tp->flag&ISSET)) {
685 1.1 jtc /* errno_ will be set if the named command was found
686 1.1 jtc * but could not be executed (permissions, no execute
687 1.1 jtc * bit, directory, etc). Print out a (hopefully)
688 1.1 jtc * useful error message and set the exit status to 126.
689 1.1 jtc */
690 1.1 jtc if (tp->u2.errno_) {
691 1.1 jtc warningf(TRUE, "%s: cannot execute - %s", cp,
692 1.1 jtc strerror(tp->u2.errno_));
693 1.1 jtc rv = 126; /* POSIX */
694 1.1 jtc } else {
695 1.1 jtc warningf(TRUE, "%s: not found", cp);
696 1.1 jtc rv = 127;
697 1.1 jtc }
698 1.1 jtc break;
699 1.1 jtc }
700 1.1 jtc
701 1.1 jtc /* set $_ to program's full path */
702 1.1 jtc setstr(typeset("_", LOCAL|EXPORT, 0, 0, 0), tp->val.s);
703 1.1 jtc
704 1.1 jtc if (flags&XEXEC) {
705 1.1 jtc j_exit();
706 1.1 jtc if (!(flags&XBGND) || Flag(FMONITOR)) {
707 1.1 jtc setexecsig(&sigtraps[SIGINT], SS_RESTORE_ORIG);
708 1.1 jtc setexecsig(&sigtraps[SIGQUIT], SS_RESTORE_ORIG);
709 1.1 jtc }
710 1.1 jtc }
711 1.1 jtc
712 1.1 jtc /* to fork we set up a TEXEC node and call execute */
713 1.1 jtc texec.type = TEXEC;
714 1.1 jtc texec.left = t; /* for tprint */
715 1.1 jtc texec.str = tp->val.s;
716 1.1 jtc texec.args = ap;
717 1.1 jtc rv = exchild(&texec, flags, -1);
718 1.1 jtc break;
719 1.1 jtc }
720 1.1 jtc Leave:
721 1.1 jtc if (flags & XEXEC) {
722 1.1 jtc exstat = rv;
723 1.1 jtc unwind(LLEAVE);
724 1.1 jtc }
725 1.1 jtc return rv;
726 1.1 jtc }
727 1.1 jtc
728 1.1 jtc static void
729 1.1 jtc scriptexec(tp, ap)
730 1.1 jtc register struct op *tp;
731 1.1 jtc register char **ap;
732 1.1 jtc {
733 1.1 jtc char *shell;
734 1.1 jtc
735 1.1 jtc shell = str_val(global(EXECSHELL_STR));
736 1.1 jtc if (shell && *shell)
737 1.1 jtc shell = search(shell, path, X_OK, (int *) 0);
738 1.1 jtc if (!shell || !*shell)
739 1.1 jtc shell = EXECSHELL;
740 1.1 jtc
741 1.1 jtc *tp->args-- = tp->str;
742 1.1 jtc #ifdef SHARPBANG
743 1.1 jtc {
744 1.1 jtc char buf[LINE];
745 1.1 jtc register char *cp;
746 1.1 jtc register int fd, n;
747 1.1 jtc
748 1.1 jtc buf[0] = '\0';
749 1.1 jtc if ((fd = open(tp->str, O_RDONLY)) >= 0) {
750 1.1 jtc if ((n = read(fd, buf, LINE - 1)) > 0)
751 1.1 jtc buf[n] = '\0';
752 1.1 jtc (void) close(fd);
753 1.1 jtc }
754 1.1 jtc if ((buf[0] == '#' && buf[1] == '!' && (cp = &buf[2]))
755 1.1 jtc # ifdef OS2
756 1.1 jtc || (strncmp(buf, "extproc", 7) == 0 && isspace(buf[7])
757 1.1 jtc && (cp = &buf[7]))
758 1.1 jtc # endif /* OS2 */
759 1.1 jtc )
760 1.1 jtc {
761 1.1 jtc while (*cp && (*cp == ' ' || *cp == '\t'))
762 1.1 jtc cp++;
763 1.1 jtc if (*cp && *cp != '\n') {
764 1.1 jtc char *a0 = cp, *a1 = (char *) 0;
765 1.1 jtc # ifdef OS2
766 1.1 jtc char *a2 = cp;
767 1.1 jtc # endif /* OS2 */
768 1.1 jtc
769 1.1 jtc while (*cp && *cp != '\n' && *cp != ' '
770 1.1 jtc && *cp != '\t')
771 1.1 jtc {
772 1.1 jtc # ifdef OS2
773 1.1 jtc /* Allow shell search without prepended path
774 1.1 jtc * if shell with / in pathname cannot be found.
775 1.1 jtc * Use / explicitly so \ can be used if explicit
776 1.1 jtc * needs to be forced.
777 1.1 jtc */
778 1.1 jtc if (*cp == '/')
779 1.1 jtc a2 = cp + 1;
780 1.1 jtc # endif /* OS2 */
781 1.1 jtc cp++;
782 1.1 jtc }
783 1.1 jtc if (*cp && *cp != '\n') {
784 1.1 jtc *cp++ = '\0';
785 1.1 jtc while (*cp
786 1.1 jtc && (*cp == ' ' || *cp == '\t'))
787 1.1 jtc cp++;
788 1.1 jtc if (*cp && *cp != '\n') {
789 1.1 jtc a1 = cp;
790 1.1 jtc /* all one argument */
791 1.1 jtc while (*cp && *cp != '\n')
792 1.1 jtc cp++;
793 1.1 jtc }
794 1.1 jtc }
795 1.1 jtc if (*cp == '\n') {
796 1.1 jtc *cp = '\0';
797 1.1 jtc if (a1)
798 1.1 jtc *tp->args-- = a1;
799 1.1 jtc # ifdef OS2
800 1.1 jtc if (a0 != a2 && search_access(a0, X_OK, (int *) 0))
801 1.1 jtc a0 = a2;
802 1.1 jtc # endif /* OS2 */
803 1.1 jtc shell = a0;
804 1.1 jtc }
805 1.1 jtc }
806 1.1 jtc # ifdef OS2
807 1.1 jtc } else {
808 1.1 jtc /* Use ksh documented shell default if present
809 1.1 jtc * else use OS2_SHELL which is assumed to need
810 1.1 jtc * the /c option and '\' as dir separater.
811 1.1 jtc */
812 1.1 jtc char *p = shell;
813 1.1 jtc
814 1.1 jtc shell = str_val(global("EXECSHELL"));
815 1.1 jtc if (shell && *shell)
816 1.1 jtc shell = search(shell, path, X_OK, (int *) 0);
817 1.1 jtc if (!shell || !*shell) {
818 1.1 jtc shell = p;
819 1.1 jtc *tp->args-- = "/c";
820 1.1 jtc for (p = tp->str; *p; p++)
821 1.1 jtc if (*p == '/')
822 1.1 jtc *p = '\\';
823 1.1 jtc }
824 1.1 jtc # endif /* OS2 */
825 1.1 jtc }
826 1.1 jtc }
827 1.1 jtc #endif /* SHARPBANG */
828 1.1 jtc *tp->args = shell;
829 1.1 jtc
830 1.1 jtc ksh_execve(tp->args[0], tp->args, ap);
831 1.1 jtc
832 1.1 jtc /* report both the program that was run and the bogus shell */
833 1.1 jtc errorf("%s: %s: %s", tp->str, shell, strerror(errno));
834 1.1 jtc }
835 1.1 jtc
836 1.1 jtc int
837 1.1 jtc shcomexec(wp)
838 1.1 jtc register char **wp;
839 1.1 jtc {
840 1.1 jtc register struct tbl *tp;
841 1.1 jtc
842 1.1 jtc tp = tsearch(&builtins, *wp, hash(*wp));
843 1.1 jtc if (tp == NULL)
844 1.1 jtc internal_errorf(1, "shcomexec: %s", *wp);
845 1.1 jtc return call_builtin(tp, wp);
846 1.1 jtc }
847 1.1 jtc
848 1.1 jtc /*
849 1.1 jtc * Search function tables for a function. If create set, a table entry
850 1.1 jtc * is created if none is found.
851 1.1 jtc */
852 1.1 jtc struct tbl *
853 1.1 jtc findfunc(name, h, create)
854 1.1 jtc const char *name;
855 1.1 jtc unsigned int h;
856 1.1 jtc int create;
857 1.1 jtc {
858 1.1 jtc struct block *l;
859 1.1 jtc struct tbl *tp = (struct tbl *) 0;
860 1.1 jtc
861 1.1 jtc for (l = e->loc; l; l = l->next) {
862 1.1 jtc tp = tsearch(&l->funs, name, h);
863 1.1 jtc if (tp)
864 1.1 jtc break;
865 1.1 jtc if (!l->next && create) {
866 1.1 jtc tp = tenter(&l->funs, name, h);
867 1.1 jtc tp->flag = DEFINED;
868 1.1 jtc tp->type = CFUNC;
869 1.1 jtc tp->val.t = (struct op *) 0;
870 1.1 jtc break;
871 1.1 jtc }
872 1.1 jtc }
873 1.1 jtc return tp;
874 1.1 jtc }
875 1.1 jtc
876 1.1 jtc /*
877 1.1 jtc * define function. Returns 1 if function is being undefined (t == 0) and
878 1.1 jtc * function did not exist, returns 0 otherwise.
879 1.1 jtc */
880 1.1 jtc int
881 1.1 jtc define(name, t)
882 1.1 jtc const char *name;
883 1.1 jtc struct op *t;
884 1.1 jtc {
885 1.1 jtc struct tbl *tp;
886 1.1 jtc int was_set = 0;
887 1.1 jtc
888 1.1 jtc while (1) {
889 1.1 jtc tp = findfunc(name, hash(name), TRUE);
890 1.1 jtc
891 1.1 jtc if (tp->flag & ISSET)
892 1.1 jtc was_set = 1;
893 1.1 jtc /* If this function is currently being executed, we zap this
894 1.1 jtc * table entry so findfunc() won't see it
895 1.1 jtc */
896 1.1 jtc if (tp->flag & FINUSE) {
897 1.1 jtc tp->name[0] = '\0';
898 1.1 jtc tp->flag &= ~DEFINED; /* ensure it won't be found */
899 1.1 jtc tp->flag |= FDELETE;
900 1.1 jtc } else
901 1.1 jtc break;
902 1.1 jtc }
903 1.1 jtc
904 1.1 jtc if (tp->flag & ALLOC) {
905 1.1 jtc tp->flag &= ~(ISSET|ALLOC);
906 1.1 jtc tfree(tp->val.t, tp->areap);
907 1.1 jtc }
908 1.1 jtc
909 1.1 jtc if (t == NULL) { /* undefine */
910 1.1 jtc tdelete(tp);
911 1.1 jtc return was_set ? 0 : 1;
912 1.1 jtc }
913 1.1 jtc
914 1.1 jtc tp->val.t = tcopy(t->left, tp->areap);
915 1.1 jtc tp->flag |= (ISSET|ALLOC);
916 1.1 jtc if (t->u.ksh_func)
917 1.1 jtc tp->flag |= FKSH;
918 1.1 jtc
919 1.1 jtc return 0;
920 1.1 jtc }
921 1.1 jtc
922 1.1 jtc /*
923 1.1 jtc * add builtin
924 1.1 jtc */
925 1.1 jtc void
926 1.1 jtc builtin(name, func)
927 1.1 jtc const char *name;
928 1.1 jtc int (*func) ARGS((char **));
929 1.1 jtc {
930 1.1 jtc register struct tbl *tp;
931 1.1 jtc Tflag flag;
932 1.1 jtc
933 1.1 jtc /* see if any flags should be set for this builtin */
934 1.1 jtc for (flag = 0; ; name++) {
935 1.1 jtc if (*name == '=') /* command does variable assignment */
936 1.1 jtc flag |= KEEPASN;
937 1.1 jtc else if (*name == '*') /* POSIX special builtin */
938 1.1 jtc flag |= SPEC_BI;
939 1.1 jtc else if (*name == '+') /* POSIX regular builtin */
940 1.1 jtc flag |= REG_BI;
941 1.1 jtc else
942 1.1 jtc break;
943 1.1 jtc }
944 1.1 jtc
945 1.1 jtc tp = tenter(&builtins, name, hash(name));
946 1.1 jtc tp->flag = DEFINED | flag;
947 1.1 jtc tp->type = CSHELL;
948 1.1 jtc tp->val.f = func;
949 1.1 jtc }
950 1.1 jtc
951 1.1 jtc /*
952 1.1 jtc * find command
953 1.1 jtc * either function, hashed command, or built-in (in that order)
954 1.1 jtc */
955 1.1 jtc struct tbl *
956 1.1 jtc findcom(name, flags)
957 1.1 jtc const char *name;
958 1.1 jtc int flags; /* FC_* */
959 1.1 jtc {
960 1.1 jtc static struct tbl temp;
961 1.1 jtc unsigned int h = hash(name);
962 1.1 jtc struct tbl *tp = NULL, *tbi;
963 1.1 jtc int insert = Flag(FTRACKALL); /* insert if not found */
964 1.1 jtc char *fpath; /* for function autoloading */
965 1.1 jtc char *npath;
966 1.1 jtc
967 1.1 jtc if (ksh_strchr_dirsep(name) != NULL) {
968 1.1 jtc insert = 0;
969 1.1 jtc /* prevent FPATH search below */
970 1.1 jtc flags &= ~FC_FUNC;
971 1.1 jtc goto Search;
972 1.1 jtc }
973 1.1 jtc tbi = (flags & FC_BI) ? tsearch(&builtins, name, h) : NULL;
974 1.1 jtc /* POSIX says special builtins first, then functions, then
975 1.1 jtc * POSIX regular builtins, then search path...
976 1.1 jtc */
977 1.1 jtc if ((flags & FC_SPECBI) && tbi && (tbi->flag & SPEC_BI))
978 1.1 jtc tp = tbi;
979 1.1 jtc if (!tp && (flags & FC_FUNC)) {
980 1.1 jtc tp = findfunc(name, h, FALSE);
981 1.1 jtc if (tp && !(tp->flag & ISSET)) {
982 1.1 jtc if ((fpath = str_val(global("FPATH"))) == null) {
983 1.1 jtc tp->u.fpath = (char *) 0;
984 1.1 jtc tp->u2.errno_ = 0;
985 1.1 jtc } else
986 1.1 jtc tp->u.fpath = search(name, fpath, R_OK,
987 1.1 jtc &tp->u2.errno_);
988 1.1 jtc }
989 1.1 jtc }
990 1.1 jtc if (!tp && (flags & FC_REGBI) && tbi && (tbi->flag & REG_BI))
991 1.1 jtc tp = tbi;
992 1.1 jtc /* todo: posix says non-special/non-regular builtins must
993 1.1 jtc * be triggered by some user-controllable means like a
994 1.1 jtc * special directory in PATH. Requires modifications to
995 1.1 jtc * the search() function. Tracked aliases should be
996 1.1 jtc * modified to allow tracking of builtin commands.
997 1.1 jtc * This should be under control of the FPOSIX flag.
998 1.1 jtc * If this is changed, also change c_whence...
999 1.1 jtc */
1000 1.1 jtc if (!tp && (flags & FC_UNREGBI) && tbi)
1001 1.1 jtc tp = tbi;
1002 1.1 jtc if (!tp && (flags & FC_PATH) && !(flags & FC_DEFPATH)) {
1003 1.1 jtc tp = tsearch(&taliases, name, h);
1004 1.1 jtc if (tp && (tp->flag & ISSET) && eaccess(tp->val.s, X_OK) != 0) {
1005 1.1 jtc if (tp->flag & ALLOC) {
1006 1.1 jtc tp->flag &= ~ALLOC;
1007 1.1 jtc afree(tp->val.s, APERM);
1008 1.1 jtc }
1009 1.1 jtc tp->flag &= ~ISSET;
1010 1.1 jtc }
1011 1.1 jtc }
1012 1.1 jtc
1013 1.1 jtc Search:
1014 1.1 jtc if ((!tp || (tp->type == CTALIAS && !(tp->flag&ISSET)))
1015 1.1 jtc && (flags & FC_PATH))
1016 1.1 jtc {
1017 1.1 jtc if (!tp) {
1018 1.1 jtc if (insert && !(flags & FC_DEFPATH)) {
1019 1.1 jtc tp = tenter(&taliases, name, h);
1020 1.1 jtc tp->type = CTALIAS;
1021 1.1 jtc } else {
1022 1.1 jtc tp = &temp;
1023 1.1 jtc tp->type = CEXEC;
1024 1.1 jtc }
1025 1.1 jtc tp->flag = DEFINED; /* make ~ISSET */
1026 1.1 jtc }
1027 1.1 jtc npath = search(name, flags & FC_DEFPATH ? def_path : path,
1028 1.1 jtc X_OK, &tp->u2.errno_);
1029 1.1 jtc if (npath) {
1030 1.1 jtc tp->val.s = tp == &temp ? npath : str_save(npath, APERM);
1031 1.1 jtc tp->flag |= ISSET|ALLOC;
1032 1.1 jtc } else if ((flags & FC_FUNC)
1033 1.1 jtc && (fpath = str_val(global("FPATH"))) != null
1034 1.1 jtc && (npath = search(name, fpath, R_OK,
1035 1.1 jtc &tp->u2.errno_)) != (char *) 0)
1036 1.1 jtc {
1037 1.1 jtc /* An undocumented feature of at&t ksh is that it
1038 1.1 jtc * searches FPATH if a command is not found, even
1039 1.1 jtc * if the command hasn't been set up as an autoloaded
1040 1.1 jtc * function (ie, no typeset -uf).
1041 1.1 jtc */
1042 1.1 jtc tp = &temp;
1043 1.1 jtc tp->type = CFUNC;
1044 1.1 jtc tp->flag = DEFINED; /* make ~ISSET */
1045 1.1 jtc tp->u.fpath = npath;
1046 1.1 jtc }
1047 1.1 jtc }
1048 1.1 jtc return tp;
1049 1.1 jtc }
1050 1.1 jtc
1051 1.1 jtc /*
1052 1.1 jtc * flush executable commands with relative paths
1053 1.1 jtc */
1054 1.1 jtc void
1055 1.1 jtc flushcom(all)
1056 1.1 jtc int all; /* just relative or all */
1057 1.1 jtc {
1058 1.1 jtc struct tbl *tp;
1059 1.1 jtc struct tstate ts;
1060 1.1 jtc
1061 1.1 jtc for (twalk(&ts, &taliases); (tp = tnext(&ts)) != NULL; )
1062 1.1 jtc if ((tp->flag&ISSET) && (all || !ISDIRSEP(tp->val.s[0]))) {
1063 1.1 jtc if (tp->flag&ALLOC) {
1064 1.1 jtc tp->flag &= ~(ALLOC|ISSET);
1065 1.1 jtc afree(tp->val.s, APERM);
1066 1.1 jtc }
1067 1.1 jtc tp->flag = ~ISSET;
1068 1.1 jtc }
1069 1.1 jtc }
1070 1.1 jtc
1071 1.1 jtc /* Check if path is something we want to find. Returns -1 for failure. */
1072 1.1 jtc int
1073 1.1 jtc search_access(path, mode, errnop)
1074 1.1 jtc const char *path;
1075 1.1 jtc int mode;
1076 1.1 jtc int *errnop; /* set if candidate found, but not suitable */
1077 1.1 jtc {
1078 1.1 jtc #ifndef OS2
1079 1.1 jtc int ret, err = 0;
1080 1.1 jtc struct stat statb;
1081 1.1 jtc
1082 1.1 jtc if (stat(path, &statb) < 0)
1083 1.1 jtc return -1;
1084 1.1 jtc ret = eaccess(path, mode);
1085 1.1 jtc if (ret < 0)
1086 1.1 jtc err = errno; /* File exists, but we can't access it */
1087 1.1 jtc else if (mode == X_OK && (!S_ISREG(statb.st_mode)
1088 1.1 jtc /* This 'cause access() says root can execute everything */
1089 1.1 jtc || !(statb.st_mode & (S_IXUSR|S_IXGRP|S_IXOTH))))
1090 1.1 jtc {
1091 1.1 jtc ret = -1;
1092 1.1 jtc err = S_ISDIR(statb.st_mode) ? EISDIR : EACCES;
1093 1.1 jtc }
1094 1.1 jtc if (err && errnop)
1095 1.1 jtc *errnop = err;
1096 1.1 jtc return ret;
1097 1.1 jtc #else /* !OS2 */
1098 1.1 jtc /*
1099 1.1 jtc * NOTE: ASSUMES path can be modified and has enough room at the
1100 1.1 jtc * end of the string for a suffix (ie, 4 extra characters).
1101 1.1 jtc * Certain code knows this (eg, eval.c(globit()),
1102 1.1 jtc * exec.c(search())).
1103 1.1 jtc */
1104 1.1 jtc static char *xsuffixes[] = { ".ksh", ".exe", ".", ".sh", ".cmd",
1105 1.1 jtc ".com", ".bat", (char *) 0
1106 1.1 jtc };
1107 1.1 jtc static char *rsuffixes[] = { ".ksh", ".", ".sh", ".cmd", ".bat",
1108 1.1 jtc (char *) 0
1109 1.1 jtc };
1110 1.1 jtc int i;
1111 1.1 jtc char *mpath = (char *) path;
1112 1.1 jtc char *tp = mpath + strlen(mpath);
1113 1.1 jtc char *p;
1114 1.1 jtc char **sfx;
1115 1.1 jtc
1116 1.1 jtc /* If a suffix has been specified, check if it is one of the
1117 1.1 jtc * suffixes that indicate the file is executable - if so, change
1118 1.1 jtc * the access test to R_OK...
1119 1.1 jtc * This code assumes OS/2 files can have only one suffix...
1120 1.1 jtc */
1121 1.1 jtc if ((p = strrchr((p = ksh_strrchr_dirsep(mpath)) ? p : mpath, '.'))) {
1122 1.1 jtc if (mode == X_OK)
1123 1.1 jtc mode = R_OK;
1124 1.1 jtc return search_access1(mpath, mode, errnop);
1125 1.1 jtc }
1126 1.1 jtc /* Try appending the various suffixes. Different suffixes for
1127 1.1 jtc * read and execute 'cause we don't want to read an executable...
1128 1.1 jtc */
1129 1.1 jtc sfx = mode == R_OK ? rsuffixes : xsuffixes;
1130 1.1 jtc for (i = 0; sfx[i]; i++) {
1131 1.1 jtc strcpy(tp, p = sfx[i]);
1132 1.1 jtc if (search_access1(mpath, R_OK, errnop) == 0)
1133 1.1 jtc return 0;
1134 1.1 jtc *tp = '\0';
1135 1.1 jtc }
1136 1.1 jtc return -1;
1137 1.1 jtc #endif /* !OS2 */
1138 1.1 jtc }
1139 1.1 jtc
1140 1.1 jtc #ifdef OS2
1141 1.1 jtc static int
1142 1.1 jtc search_access1(path, mode, errnop)
1143 1.1 jtc const char *path;
1144 1.1 jtc int mode;
1145 1.1 jtc int *errnop; /* set if candidate found, but not suitable */
1146 1.1 jtc {
1147 1.1 jtc int ret, err = 0;
1148 1.1 jtc struct stat statb;
1149 1.1 jtc
1150 1.1 jtc if (stat(path, &statb) < 0)
1151 1.1 jtc return -1;
1152 1.1 jtc ret = eaccess(path, mode);
1153 1.1 jtc if (ret < 0)
1154 1.1 jtc err = errno; /* File exists, but we can't access it */
1155 1.1 jtc else if (!S_ISREG(statb.st_mode)) {
1156 1.1 jtc ret = -1;
1157 1.1 jtc err = S_ISDIR(statb.st_mode) ? EISDIR : EACCES;
1158 1.1 jtc }
1159 1.1 jtc if (err && errnop)
1160 1.1 jtc *errnop = err;
1161 1.1 jtc return ret;
1162 1.1 jtc }
1163 1.1 jtc #endif /* OS2 */
1164 1.1 jtc
1165 1.1 jtc /*
1166 1.1 jtc * search for command with PATH
1167 1.1 jtc */
1168 1.1 jtc char *
1169 1.1 jtc search(name, path, mode, errnop)
1170 1.1 jtc const char *name;
1171 1.1 jtc const char *path;
1172 1.1 jtc int mode; /* R_OK or X_OK */
1173 1.1 jtc int *errnop; /* set if candidate found, but not suitable */
1174 1.1 jtc {
1175 1.1 jtc const char *sp, *p;
1176 1.1 jtc char *xp;
1177 1.1 jtc XString xs;
1178 1.1 jtc int namelen;
1179 1.1 jtc
1180 1.1 jtc if (errnop)
1181 1.1 jtc *errnop = 0;
1182 1.1 jtc #ifdef OS2
1183 1.1 jtc /* Xinit() allocates 8 additional bytes, so appended suffixes won't
1184 1.1 jtc * overflow the memory.
1185 1.1 jtc */
1186 1.1 jtc namelen = strlen(name) + 1;
1187 1.1 jtc Xinit(xs, xp, namelen, ATEMP);
1188 1.1 jtc memcpy(Xstring(xs, xp), name, namelen);
1189 1.1 jtc
1190 1.1 jtc if (ksh_strchr_dirsep(name)) {
1191 1.1 jtc if (search_access(Xstring(xs, xp), mode, errnop) >= 0)
1192 1.1 jtc return Xstring(xs, xp); /* not Xclose() - see above */
1193 1.1 jtc Xfree(xs, xp);
1194 1.1 jtc return NULL;
1195 1.1 jtc }
1196 1.1 jtc
1197 1.1 jtc /* Look in current context always. (os2 style) */
1198 1.1 jtc if (search_access(Xstring(xs, xp), mode, errnop) == 0)
1199 1.1 jtc return Xstring(xs, xp); /* not Xclose() - xp may be wrong */
1200 1.1 jtc #else /* OS2 */
1201 1.1 jtc if (ksh_strchr_dirsep(name)) {
1202 1.1 jtc if (search_access(name, mode, errnop) == 0)
1203 1.1 jtc return (char *) name;
1204 1.1 jtc return NULL;
1205 1.1 jtc }
1206 1.1 jtc
1207 1.1 jtc namelen = strlen(name) + 1;
1208 1.1 jtc Xinit(xs, xp, 128, ATEMP);
1209 1.1 jtc #endif /* OS2 */
1210 1.1 jtc
1211 1.1 jtc sp = path;
1212 1.1 jtc while (sp != NULL) {
1213 1.1 jtc xp = Xstring(xs, xp);
1214 1.1 jtc if (!(p = strchr(sp, PATHSEP)))
1215 1.1 jtc p = sp + strlen(sp);
1216 1.1 jtc if (p != sp) {
1217 1.1 jtc XcheckN(xs, xp, p - sp);
1218 1.1 jtc memcpy(xp, sp, p - sp);
1219 1.1 jtc xp += p - sp;
1220 1.1 jtc *xp++ = DIRSEP;
1221 1.1 jtc }
1222 1.1 jtc sp = p;
1223 1.1 jtc XcheckN(xs, xp, namelen);
1224 1.1 jtc memcpy(xp, name, namelen);
1225 1.1 jtc if (search_access(Xstring(xs, xp), mode, errnop) == 0)
1226 1.1 jtc #ifdef OS2
1227 1.1 jtc return Xstring(xs, xp); /* Not Xclose() - see above */
1228 1.1 jtc #else /* OS2 */
1229 1.1 jtc return Xclose(xs, xp + namelen);
1230 1.1 jtc #endif /* OS2 */
1231 1.1 jtc if (*sp++ == '\0')
1232 1.1 jtc sp = NULL;
1233 1.1 jtc }
1234 1.1 jtc Xfree(xs, xp);
1235 1.1 jtc return NULL;
1236 1.1 jtc }
1237 1.1 jtc
1238 1.1 jtc static int
1239 1.1 jtc call_builtin(tp, wp)
1240 1.1 jtc struct tbl *tp;
1241 1.1 jtc char **wp;
1242 1.1 jtc {
1243 1.1 jtc int rv;
1244 1.1 jtc
1245 1.1 jtc builtin_argv0 = wp[0];
1246 1.1 jtc builtin_flag = tp->flag;
1247 1.1 jtc shf_reopen(1, SHF_WR, shl_stdout);
1248 1.1 jtc shl_stdout_ok = 1;
1249 1.1 jtc ksh_getopt_reset(&builtin_opt, GF_ERROR);
1250 1.1 jtc rv = (*tp->val.f)(wp);
1251 1.1 jtc shf_flush(shl_stdout);
1252 1.1 jtc shl_stdout_ok = 0;
1253 1.1 jtc builtin_flag = 0;
1254 1.1 jtc builtin_argv0 = (char *) 0;
1255 1.1 jtc return rv;
1256 1.1 jtc }
1257 1.1 jtc
1258 1.1 jtc /*
1259 1.1 jtc * set up redirection, saving old fd's in e->savefd
1260 1.1 jtc */
1261 1.1 jtc static int
1262 1.1 jtc iosetup(iop, tp)
1263 1.1 jtc register struct ioword *iop;
1264 1.1 jtc struct tbl *tp;
1265 1.1 jtc {
1266 1.1 jtc register int u = -1;
1267 1.1 jtc char *cp = iop->name;
1268 1.1 jtc int iotype = iop->flag & IOTYPE;
1269 1.1 jtc int do_open = 1, do_close = 0, UNINITIALIZED(flags);
1270 1.1 jtc struct ioword iotmp;
1271 1.1 jtc struct stat statb;
1272 1.1 jtc
1273 1.1 jtc if (iotype != IOHERE)
1274 1.1 jtc cp = evalonestr(cp, DOTILDE|(Flag(FTALKING) ? DOGLOB : 0));
1275 1.1 jtc
1276 1.1 jtc /* Used for tracing and error messages to print expanded cp */
1277 1.1 jtc iotmp = *iop;
1278 1.1 jtc iotmp.name = (iotype == IOHERE) ? (char *) 0 : cp;
1279 1.1 jtc iotmp.flag |= IONAMEXP;
1280 1.1 jtc
1281 1.1 jtc if (Flag(FXTRACE))
1282 1.1 jtc shellf("%s%s\n",
1283 1.1 jtc PS4_SUBSTITUTE(str_val(global("PS4"))),
1284 1.1 jtc snptreef((char *) 0, 32, "%R", &iotmp));
1285 1.1 jtc
1286 1.1 jtc switch (iotype) {
1287 1.1 jtc case IOREAD:
1288 1.1 jtc flags = O_RDONLY;
1289 1.1 jtc break;
1290 1.1 jtc
1291 1.1 jtc case IOCAT:
1292 1.1 jtc flags = O_WRONLY | O_APPEND | O_CREAT;
1293 1.1 jtc break;
1294 1.1 jtc
1295 1.1 jtc case IOWRITE:
1296 1.1 jtc flags = O_WRONLY | O_CREAT | O_TRUNC;
1297 1.1 jtc if (Flag(FNOCLOBBER) && !(iop->flag & IOCLOB)
1298 1.1 jtc && (stat(cp, &statb) < 0 || S_ISREG(statb.st_mode)))
1299 1.1 jtc flags |= O_EXCL;
1300 1.1 jtc break;
1301 1.1 jtc
1302 1.1 jtc case IORDWR:
1303 1.1 jtc flags = O_RDWR | O_CREAT;
1304 1.1 jtc break;
1305 1.1 jtc
1306 1.1 jtc case IOHERE:
1307 1.1 jtc do_open = 0;
1308 1.1 jtc /* herein() returns -2 if error has been printed */
1309 1.1 jtc u = herein(cp, iop->flag & IOEVAL);
1310 1.1 jtc /* cp may have wrong name */
1311 1.1 jtc break;
1312 1.1 jtc
1313 1.1 jtc case IODUP:
1314 1.1 jtc {
1315 1.1 jtc const char *emsg;
1316 1.1 jtc
1317 1.1 jtc do_open = 0;
1318 1.1 jtc if (*cp == '-' && !cp[1]) {
1319 1.1 jtc u = 1009; /* prevent error return below */
1320 1.1 jtc do_close = 1;
1321 1.1 jtc } else if ((u = check_fd(cp,
1322 1.1 jtc X_OK | ((iop->flag & IORDUP) ? R_OK : W_OK),
1323 1.1 jtc &emsg)) < 0)
1324 1.1 jtc {
1325 1.1 jtc warningf(TRUE, "%s: %s",
1326 1.1 jtc snptreef((char *) 0, 32, "%R", &iotmp), emsg);
1327 1.1 jtc return -1;
1328 1.1 jtc }
1329 1.1 jtc break;
1330 1.1 jtc }
1331 1.1 jtc }
1332 1.1 jtc if (do_open) {
1333 1.1 jtc if (Flag(FRESTRICTED) && (flags & O_CREAT)) {
1334 1.1 jtc warningf(TRUE, "%s: restricted", cp);
1335 1.1 jtc return -1;
1336 1.1 jtc }
1337 1.1 jtc u = open(cp, flags, 0666);
1338 1.1 jtc #ifdef OS2
1339 1.1 jtc if (u < 0 && strcmp(cp, "/dev/null") == 0)
1340 1.1 jtc u = open("nul", flags, 0666);
1341 1.1 jtc #endif /* OS2 */
1342 1.1 jtc }
1343 1.1 jtc if (u < 0) {
1344 1.1 jtc /* herein() may already have printed message */
1345 1.1 jtc if (u == -1)
1346 1.1 jtc warningf(TRUE, "cannot %s %s: %s",
1347 1.1 jtc iotype == IODUP ? "dup"
1348 1.1 jtc : (iotype == IOREAD || iotype == IOHERE) ?
1349 1.1 jtc "open" : "create", cp, strerror(errno));
1350 1.1 jtc return -1;
1351 1.1 jtc }
1352 1.1 jtc /* Do not save if it has already been redirected (i.e. "cat >x >y"). */
1353 1.1 jtc if (e->savefd[iop->unit] == 0)
1354 1.1 jtc /* c_exec() assumes e->savefd[fd] set for any redirections.
1355 1.1 jtc * Ask savefd() not to close iop->unit - allows error messages
1356 1.1 jtc * to be seen if iop->unit is 2; also means we can't lose
1357 1.1 jtc * the fd (eg, both dup2 below and dup2 in restfd() failing).
1358 1.1 jtc */
1359 1.1 jtc e->savefd[iop->unit] = savefd(iop->unit, 1);
1360 1.1 jtc
1361 1.1 jtc if (do_close)
1362 1.1 jtc close(iop->unit);
1363 1.1 jtc else if (u != iop->unit) {
1364 1.1 jtc if (ksh_dup2(u, iop->unit, TRUE) < 0) {
1365 1.1 jtc warningf(TRUE,
1366 1.1 jtc "could not finish (dup) redirection %s: %s",
1367 1.1 jtc snptreef((char *) 0, 32, "%R", &iotmp),
1368 1.1 jtc strerror(errno));
1369 1.1 jtc if (iotype != IODUP)
1370 1.1 jtc close(u);
1371 1.1 jtc return -1;
1372 1.1 jtc }
1373 1.1 jtc if (iotype != IODUP)
1374 1.1 jtc close(u);
1375 1.1 jtc #ifdef KSH
1376 1.1 jtc /* Touching any co-process fd in an empty exec
1377 1.1 jtc * causes the shell to close its copies
1378 1.1 jtc */
1379 1.1 jtc else if (tp && tp->type == CSHELL && tp->val.f == c_exec) {
1380 1.1 jtc if (iop->flag & IORDUP) /* possible exec <&p */
1381 1.1 jtc coproc_read_close(u);
1382 1.1 jtc else /* possible exec >&p */
1383 1.1 jtc coproc_write_close(u);
1384 1.1 jtc }
1385 1.1 jtc #endif /* KSH */
1386 1.1 jtc }
1387 1.1 jtc if (u == 2) /* Clear any write errors */
1388 1.1 jtc shf_reopen(2, SHF_WR, shl_out);
1389 1.1 jtc return 0;
1390 1.1 jtc }
1391 1.1 jtc
1392 1.1 jtc /*
1393 1.1 jtc * open here document temp file.
1394 1.1 jtc * if unquoted here, expand here temp file into second temp file.
1395 1.1 jtc */
1396 1.1 jtc static int
1397 1.1 jtc herein(hname, sub)
1398 1.1 jtc char *hname;
1399 1.1 jtc int sub;
1400 1.1 jtc {
1401 1.1 jtc int fd;
1402 1.1 jtc
1403 1.1 jtc /* ksh -c 'cat << EOF' can cause this... */
1404 1.1 jtc if (hname == (char *) 0) {
1405 1.1 jtc warningf(TRUE, "here document missing");
1406 1.1 jtc return -2; /* special to iosetup(): don't print error */
1407 1.1 jtc }
1408 1.1 jtc if (sub) {
1409 1.1 jtc char *cp;
1410 1.1 jtc struct source *s, *volatile osource = source;
1411 1.1 jtc struct temp *h;
1412 1.1 jtc struct shf *volatile shf;
1413 1.1 jtc int i;
1414 1.1 jtc
1415 1.1 jtc /* must be before newenv() 'cause shf uses ATEMP */
1416 1.1 jtc shf = shf_open(hname, O_RDONLY, 0, SHF_MAPHI|SHF_CLEXEC);
1417 1.1 jtc if (shf == NULL)
1418 1.1 jtc return -1;
1419 1.1 jtc newenv(E_ERRH);
1420 1.1 jtc i = ksh_sigsetjmp(e->jbuf, 0);
1421 1.1 jtc if (i) {
1422 1.1 jtc if (shf)
1423 1.1 jtc shf_close(shf);
1424 1.1 jtc source = osource;
1425 1.1 jtc quitenv(); /* after shf_close() due to alloc */
1426 1.1 jtc return -2; /* special to iosetup(): don't print error */
1427 1.1 jtc }
1428 1.1 jtc /* set up yylex input from here file */
1429 1.1 jtc s = pushs(SFILE, ATEMP);
1430 1.1 jtc s->u.shf = shf;
1431 1.1 jtc source = s;
1432 1.1 jtc if (yylex(ONEWORD) != LWORD)
1433 1.1 jtc internal_errorf(1, "herein: yylex");
1434 1.1 jtc shf_close(shf);
1435 1.1 jtc shf = (struct shf *) 0;
1436 1.1 jtc cp = evalstr(yylval.cp, 0);
1437 1.1 jtc
1438 1.1 jtc /* write expanded input to another temp file */
1439 1.1 jtc h = maketemp(ATEMP);
1440 1.1 jtc h->next = e->temps; e->temps = h;
1441 1.1 jtc if (!(shf = h->shf) || (fd = open(h->name, O_RDONLY, 0)) < 0)
1442 1.1 jtc /* shf closeed by error handler */
1443 1.1 jtc errorf("%s: %s", h->name, strerror(errno));
1444 1.1 jtc shf_puts(cp, shf);
1445 1.1 jtc if (shf_close(shf) == EOF) {
1446 1.1 jtc close(fd);
1447 1.1 jtc shf = (struct shf *) 0;
1448 1.1 jtc errorf("error writing %s: %s", h->name,
1449 1.1 jtc strerror(errno));
1450 1.1 jtc }
1451 1.1 jtc shf = (struct shf *) 0;
1452 1.1 jtc
1453 1.1 jtc quitenv();
1454 1.1 jtc } else {
1455 1.1 jtc fd = open(hname, O_RDONLY, 0);
1456 1.1 jtc if (fd < 0)
1457 1.1 jtc return -1;
1458 1.1 jtc }
1459 1.1 jtc
1460 1.1 jtc return fd;
1461 1.1 jtc }
1462 1.1 jtc
1463 1.1 jtc #ifdef KSH
1464 1.1 jtc /*
1465 1.1 jtc * ksh special - the select command processing section
1466 1.1 jtc * print the args in column form - assuming that we can
1467 1.1 jtc */
1468 1.1 jtc static char *
1469 1.1 jtc do_selectargs(ap, print_menu)
1470 1.1 jtc register char **ap;
1471 1.1 jtc bool_t print_menu;
1472 1.1 jtc {
1473 1.1 jtc static const char *const read_args[] = {
1474 1.1 jtc "read", "-r", "REPLY", (char *) 0
1475 1.1 jtc };
1476 1.1 jtc char *s;
1477 1.1 jtc int i, argct;
1478 1.1 jtc
1479 1.1 jtc for (argct = 0; ap[argct]; argct++)
1480 1.1 jtc ;
1481 1.1 jtc while (1) {
1482 1.1 jtc /* Menu is printed if
1483 1.1 jtc * - this is the first time around the select loop
1484 1.1 jtc * - the user enters a blank line
1485 1.1 jtc * - the REPLY parameter is empty
1486 1.1 jtc */
1487 1.1 jtc if (print_menu || !*str_val(global("REPLY")))
1488 1.1 jtc pr_menu(ap);
1489 1.1 jtc shellf("%s", str_val(global("PS3")));
1490 1.1 jtc if (call_builtin(findcom("read", FC_BI), (char **) read_args))
1491 1.1 jtc return (char *) 0;
1492 1.1 jtc s = str_val(global("REPLY"));
1493 1.1 jtc if (*s) {
1494 1.1 jtc i = atoi(s);
1495 1.1 jtc return (i >= 1 && i <= argct) ? ap[i - 1] : null;
1496 1.1 jtc }
1497 1.1 jtc print_menu = 1;
1498 1.1 jtc }
1499 1.1 jtc }
1500 1.1 jtc
1501 1.1 jtc struct select_menu_info {
1502 1.1 jtc char *const *args;
1503 1.1 jtc int arg_width;
1504 1.1 jtc int num_width;
1505 1.1 jtc } info;
1506 1.1 jtc
1507 1.1 jtc static char *select_fmt_entry ARGS((void *arg, int i, char *buf, int buflen));
1508 1.1 jtc
1509 1.1 jtc /* format a single select menu item */
1510 1.1 jtc static char *
1511 1.1 jtc select_fmt_entry(arg, i, buf, buflen)
1512 1.1 jtc void *arg;
1513 1.1 jtc int i;
1514 1.1 jtc char *buf;
1515 1.1 jtc int buflen;
1516 1.1 jtc {
1517 1.1 jtc struct select_menu_info *smi = (struct select_menu_info *) arg;
1518 1.1 jtc
1519 1.1 jtc shf_snprintf(buf, buflen, "%*d) %s",
1520 1.1 jtc smi->num_width, i + 1, smi->args[i]);
1521 1.1 jtc return buf;
1522 1.1 jtc }
1523 1.1 jtc
1524 1.1 jtc /*
1525 1.1 jtc * print a select style menu
1526 1.1 jtc */
1527 1.1 jtc int
1528 1.1 jtc pr_menu(ap)
1529 1.1 jtc char *const *ap;
1530 1.1 jtc {
1531 1.1 jtc struct select_menu_info smi;
1532 1.1 jtc char *const *pp;
1533 1.1 jtc int nwidth, dwidth;
1534 1.1 jtc int i, n;
1535 1.1 jtc
1536 1.1 jtc /* Width/column calculations were done once and saved, but this
1537 1.1 jtc * means select can't be used recursively so we re-calculate each
1538 1.1 jtc * time (could save in a structure that is returned, but its probably
1539 1.1 jtc * not worth the bother).
1540 1.1 jtc */
1541 1.1 jtc
1542 1.1 jtc /*
1543 1.1 jtc * get dimensions of the list
1544 1.1 jtc */
1545 1.1 jtc for (n = 0, nwidth = 0, pp = ap; *pp; n++, pp++) {
1546 1.1 jtc i = strlen(*pp);
1547 1.1 jtc nwidth = (i > nwidth) ? i : nwidth;
1548 1.1 jtc }
1549 1.1 jtc /*
1550 1.1 jtc * we will print an index of the form
1551 1.1 jtc * %d)
1552 1.1 jtc * in front of each entry
1553 1.1 jtc * get the max width of this
1554 1.1 jtc */
1555 1.1 jtc for (i = n, dwidth = 1; i >= 10; i /= 10)
1556 1.1 jtc dwidth++;
1557 1.1 jtc
1558 1.1 jtc smi.args = ap;
1559 1.1 jtc smi.arg_width = nwidth;
1560 1.1 jtc smi.num_width = dwidth;
1561 1.1 jtc print_columns(shl_out, n, select_fmt_entry, (void *) &smi,
1562 1.1 jtc dwidth + nwidth + 2);
1563 1.1 jtc
1564 1.1 jtc return n;
1565 1.1 jtc }
1566 1.1 jtc #endif /* KSH */
1567 1.1 jtc #ifdef KSH
1568 1.1 jtc
1569 1.1 jtc /*
1570 1.1 jtc * [[ ... ]] evaluation routines
1571 1.1 jtc */
1572 1.1 jtc
1573 1.1 jtc extern const char *const dbtest_tokens[];
1574 1.1 jtc extern const char db_close[];
1575 1.1 jtc
1576 1.1 jtc /* Test if the current token is a whatever. Accepts the current token if
1577 1.1 jtc * it is. Returns 0 if it is not, non-zero if it is (in the case of
1578 1.1 jtc * TM_UNOP and TM_BINOP, the returned value is a Test_op).
1579 1.1 jtc */
1580 1.1 jtc static int
1581 1.1 jtc dbteste_isa(te, meta)
1582 1.1 jtc Test_env *te;
1583 1.1 jtc Test_meta meta;
1584 1.1 jtc {
1585 1.1 jtc int ret = 0;
1586 1.1 jtc int uqword;
1587 1.1 jtc char *p;
1588 1.1 jtc
1589 1.1 jtc if (!*te->pos.wp)
1590 1.1 jtc return meta == TM_END;
1591 1.1 jtc
1592 1.1 jtc /* unquoted word? */
1593 1.1 jtc for (p = *te->pos.wp; *p == CHAR; p += 2)
1594 1.1 jtc ;
1595 1.1 jtc uqword = *p == EOS;
1596 1.1 jtc
1597 1.1 jtc if (meta == TM_UNOP || meta == TM_BINOP) {
1598 1.1 jtc if (uqword) {
1599 1.1 jtc char buf[8]; /* longer than the longest operator */
1600 1.1 jtc char *q = buf;
1601 1.1 jtc for (p = *te->pos.wp; *p == CHAR
1602 1.1 jtc && q < &buf[sizeof(buf) - 1];
1603 1.1 jtc p += 2)
1604 1.1 jtc *q++ = p[1];
1605 1.1 jtc *q = '\0';
1606 1.1 jtc ret = (int) test_isop(te, meta, buf);
1607 1.1 jtc }
1608 1.1 jtc } else if (meta == TM_END)
1609 1.1 jtc ret = 0;
1610 1.1 jtc else
1611 1.1 jtc ret = uqword
1612 1.1 jtc && strcmp(*te->pos.wp, dbtest_tokens[(int) meta]) == 0;
1613 1.1 jtc
1614 1.1 jtc /* Accept the token? */
1615 1.1 jtc if (ret)
1616 1.1 jtc te->pos.wp++;
1617 1.1 jtc
1618 1.1 jtc return ret;
1619 1.1 jtc }
1620 1.1 jtc
1621 1.1 jtc static const char *
1622 1.1 jtc dbteste_getopnd(te, op, do_eval)
1623 1.1 jtc Test_env *te;
1624 1.1 jtc Test_op op;
1625 1.1 jtc int do_eval;
1626 1.1 jtc {
1627 1.1 jtc char *s = *te->pos.wp;
1628 1.1 jtc
1629 1.1 jtc if (!s)
1630 1.1 jtc return (char *) 0;
1631 1.1 jtc
1632 1.1 jtc te->pos.wp++;
1633 1.1 jtc
1634 1.1 jtc if (!do_eval)
1635 1.1 jtc return null;
1636 1.1 jtc
1637 1.1 jtc if (op == TO_STEQL || op == TO_STNEQ)
1638 1.1 jtc s = evalstr(s, DOTILDE | DOPAT);
1639 1.1 jtc else
1640 1.1 jtc s = evalstr(s, DOTILDE);
1641 1.1 jtc
1642 1.1 jtc return s;
1643 1.1 jtc }
1644 1.1 jtc
1645 1.1 jtc static int
1646 1.1 jtc dbteste_eval(te, op, opnd1, opnd2, do_eval)
1647 1.1 jtc Test_env *te;
1648 1.1 jtc Test_op op;
1649 1.1 jtc const char *opnd1;
1650 1.1 jtc const char *opnd2;
1651 1.1 jtc int do_eval;
1652 1.1 jtc {
1653 1.1 jtc return test_eval(te, op, opnd1, opnd2, do_eval);
1654 1.1 jtc }
1655 1.1 jtc
1656 1.1 jtc static void
1657 1.1 jtc dbteste_error(te, offset, msg)
1658 1.1 jtc Test_env *te;
1659 1.1 jtc int offset;
1660 1.1 jtc const char *msg;
1661 1.1 jtc {
1662 1.1 jtc te->flags |= TEF_ERROR;
1663 1.1 jtc internal_errorf(0, "dbteste_error: %s (offset %d)", msg, offset);
1664 1.1 jtc }
1665 1.1 jtc #endif /* KSH */
1666