hush/shell
Denys Vlasenko 5ae8f1cdbe hush: fix hush -c 'echo $0' - was showing empty string
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
2010-05-22 06:32:11 +02:00
..
ash_test ash: fix var_leak.tests so that it actually catches the NOFORK bug 2010-05-18 16:13:56 +02:00
hush_test hush: fix segfault in ${?:N:M} 2010-05-22 06:20:26 +02:00
msh_test whitespace fixes 2010-01-25 13:39:24 +01:00
ash_doc.txt
ash_ptr_hack.c
ash.c ash: eliminate 16 bytes in bss 2010-05-20 12:50:42 +02:00
bbsh.c *: remove some uses of argc 2010-01-04 14:15:38 +01:00
brace.txt hush: wait for cmd to complete, and immediately store its exitcode in $? 2009-11-15 19:58:19 +01:00
builtin_read.c shell/read: check that variable names are sane 2010-01-13 18:22:35 +01:00
builtin_read.h hush: use ash's read builtin 2010-01-12 23:29:57 +01:00
builtin_ulimit.c shell/ulimit: code shrink by 10 bytes 2010-03-08 23:28:30 +01:00
builtin_ulimit.h hush: use ash's ulimit builtin; make it more more bash0like while at it 2010-03-06 20:12:00 +01:00
Config.in shell: make it possible to alias one of shells to "bash" 2010-05-20 02:09:45 +02:00
cttyhack.c cttyhack: don't do anything if ctty is already available 2010-05-14 04:08:20 +02:00
hush_doc.txt
hush_leaktool.sh
hush.c hush: fix hush -c 'echo $0' - was showing empty string 2010-05-22 06:32:11 +02:00
Kbuild hush: use ash's ulimit builtin; make it more more bash0like while at it 2010-03-06 20:12:00 +01:00
lash_unused.c *: style fixes. no code changes (verified with objdump) 2010-01-28 02:24:24 +01:00
match.c shell: split read builtin from ash 2010-01-12 22:11:24 +01:00
match.h hush: use ash's read builtin 2010-01-12 23:29:57 +01:00
math.c hush: use ash's read builtin 2010-01-12 23:29:57 +01:00
math.h hush: use ash's read builtin 2010-01-12 23:29:57 +01:00
msh_unused.c style fixes, no code changes 2010-01-28 12:30:24 +01:00
random.c ash,hush: fix $RANDOM in children being repeated 2009-10-12 15:25:01 +02:00
random.h shell: split read builtin from ash 2010-01-12 22:11:24 +01:00
README update shell/README 2010-05-20 12:56:14 +02:00
README.job
shell_common.c shell/read: check that variable names are sane 2010-01-13 18:22:35 +01:00
shell_common.h shell/read: check that variable names are sane 2010-01-13 18:22:35 +01:00

http://www.opengroup.org/onlinepubs/9699919799/
Open Group Base Specifications Issue 7


http://www.opengroup.org/onlinepubs/9699919799/utilities/V3_chap01.html
Shell & Utilities

It says that any of the standard utilities may be implemented
as a regular shell built-in. It gives a list of utilities which
are usually implemented that way (and some of them can only
be implemented as built-ins, like "alias"):

alias
bg
cd
command
false
fc
fg
getopts
jobs
kill
newgrp
pwd
read
true
umask
unalias
wait


http://www.opengroup.org/onlinepubs/9699919799/utilities/V3_chap02.html
Shell Command Language

It says that shell must implement special built-ins. Special built-ins
differ from regular ones by the fact that variable assignments
done on special builtin are *PRESERVED*. That is,

VAR=VAL special_builtin; echo $VAR

should print VAL.

(Another distinction is that an error in special built-in should
abort the shell, but this is not such a critical difference,
and moreover, at least bash's "set" does not follow this rule,
which is even codified in autoconf configure logic now...)

List of special builtins:

. file
: [argument...]
break [n]
continue [n]
eval [argument...]
exec [command [argument...]]
exit [n]
export name[=word]...
export -p
readonly name[=word]...
readonly -p
return [n]
set [-abCefhmnuvx] [-o option] [argument...]
set [+abCefhmnuvx] [+o option] [argument...]
set -- [argument...]
set -o
set +o
shift [n]
times
trap n [condition...]
trap [action condition...]
unset [-fv] name...

In practice, no one uses this obscure feature - none of these builtins
gives any special reasons to play such dirty tricks.

However. This section also says that *function invocation* should act
similar to special built-in. That is, variable assignments
done on function invocation should be preserved after function invocation.

This is significant: it is not unthinkable to want to run a function
with some variables set to special values. But because of the above,
it does not work: variable will "leak" out of the function.