insane amounts of stack. Testsuite updated.
extern ssize_t full_read(int fd, void *buf, size_t count);
extern void xread(int fd, void *buf, size_t count);
extern unsigned char xread_char(int fd);
+// Read one line a-la fgets. Uses one read(), works only on seekable streams
extern char *reads(int fd, char *buf, size_t count);
+// Read one line a-la fgets. Reads byte-by-byte.
+// Useful when it is important to not read ahead.
+extern char *xmalloc_reads(int fd, char *pfx);
extern ssize_t read_close(int fd, void *buf, size_t count);
extern ssize_t open_read_close(const char *filename, void *buf, size_t count);
extern void *xmalloc_open_read_close(const char *filename, size_t *sizep);
if (cc < 0)
return cc; /* read() returns -1 on failure. */
-
if (cc == 0)
break;
-
buf = ((char *)buf) + cc;
total += cc;
len -= cc;
unsigned char xread_char(int fd)
{
char tmp;
-
xread(fd, &tmp, 1);
-
return tmp;
}
return buffer;
}
+// Read one line a-la fgets. Reads byte-by-byte.
+// Useful when it is important to not read ahead.
+char *xmalloc_reads(int fd, char *buf)
+{
+ char *p;
+ int sz = buf ? strlen(buf) : 0;
+
+ goto jump_in;
+ while (1) {
+ if (p - buf == sz) {
+ jump_in:
+ buf = xrealloc(buf, sz + 128);
+ p = buf + sz;
+ sz += 128;
+ }
+ if (safe_read(fd, p, 1) != 1) { /* EOF/error */
+ if (p == buf) {
+ /* we read nothing [and buf was NULL initially] */
+ free(buf);
+ return NULL;
+ }
+ break;
+ }
+ if (*p == '\n')
+ break;
+ p++;
+ }
+ *p++ = '\0';
+ return xrealloc(buf, p - buf);
+}
+
ssize_t read_close(int fd, void *buf, size_t size)
{
int e;
return read_close(fd, buf, size);
}
+// Read (potentially big) files in one go. File size is estimated by
+// lseek to end.
void *xmalloc_open_read_close(const char *filename, size_t *sizep)
{
char *buf;
size_t size = sizep ? *sizep : INT_MAX;
- int fd = xopen(filename, O_RDONLY);
+ int fd;
+ off_t len;
+
+ fd = xopen(filename, O_RDONLY);
/* /proc/N/stat files report len 0 here */
/* In order to make such files readable, we add small const */
- off_t len = xlseek(fd, 0, SEEK_END) + 256;
+ len = xlseek(fd, 0, SEEK_END) | 0x3ff; /* + up to 1k */
xlseek(fd, 0, SEEK_SET);
-
- if (len > size)
- bb_error_msg_and_die("file '%s' is too big", filename);
- size = len;
+ if (len < size)
+ size = len;
buf = xmalloc(size + 1);
size = read_close(fd, buf, size);
if ((ssize_t)size < 0)
bb_perror_msg_and_die("'%s'", filename);
xrealloc(buf, size + 1);
buf[size] = '\0';
- if (sizep) *sizep = size;
+ if (sizep)
+ *sizep = size;
return buf;
}
{
long ret;
size_t len;
+ int optlen;
void *map;
char *filename, *options;
bb_show_usage();
/* Rest is options */
- options = xstrdup("");
+ options = xzalloc(1);
+ optlen = 0;
while (*++argv) {
- int optlen = strlen(options);
options = xrealloc(options, optlen + 2 + strlen(*argv) + 2);
/* Spaces handled by "" pairs, but no way of escaping quotes */
- sprintf(options + optlen, (strchr(*argv,' ') ? "\"%s\" " : "%s "), *argv);
+ optlen += sprintf(options + optlen, (strchr(*argv,' ') ? "\"%s\" " : "%s "), *argv);
}
#if 0
{
int continuation_line = 0;
- // alias parsing is not 100% correct (no correct handling of continuation lines within an alias) !
+ // alias parsing is not 100% correct (no correct handling of continuation lines within an alias)!
while (reads(fd, buffer, buflen)) {
int l;
Various bits of what is known about busybox shells, in no particular order.
+2007-06-13
+hush: exec <"$1" doesn't do parameter subst
+
2007-05-24
hush: environment-related memory leak plugged, with net code size
decrease.
#endif
#if ENABLE_ASH_READ_TIMEOUT
if (ts.tv_sec || ts.tv_usec) {
- FD_ZERO (&set);
- FD_SET (0, &set);
+ FD_ZERO(&set);
+ FD_SET(0, &set);
i = select(FD_SETSIZE, &set, NULL, NULL, &ts);
if (!i) {
/* built-in 'read VAR' handler */
static int builtin_read(char **argv)
{
- char string[BUFSIZ];
- char *p;
+ char *string;
const char *name = argv[1] ? argv[1] : "REPLY";
- int name_len = strlen(name);
- if (name_len >= sizeof(string) - 2)
- return EXIT_FAILURE;
- strcpy(string, name);
- p = string + name_len;
- *p++ = '=';
- *p = '\0'; /* In case stdin has only EOF */
- /* read string. name_len+1 chars are already used by 'name=' */
- fgets(p, sizeof(string) - 1 - name_len, stdin);
- chomp(p);
- return set_local_var(xstrdup(string), 0);
+ string = xmalloc_reads(STDIN_FILENO, xasprintf("%s=", name));
+ return set_local_var(string, 0);
}
/* built-in 'set [VAR=value]' handler */
--- /dev/null
+read
+cat
+echo "REPLY=$REPLY"
+REPLY=exec <read.tests
--- /dev/null
+exec <read.tests
+read
+cat
+echo "REPLY=$REPLY"
/*
* Use an fd for the profiling buffer, to skip stdio overhead
*/
- len = INT_MAX;
+ len = MAXINT(ssize_t);
buf = xmalloc_open_read_close(proFile, &len);
if (!optNative) {
int entries = len/sizeof(*buf);