On Fri, 2016-06-03 at 19:04 +0200, Marcel Lorenz wrote: > Am 2016-06-03 17:20, schrieb Michael Tremer: > > > > On Thu, 2016-06-02 at 19:43 +0200, Marcel Lorenz wrote: > > > > > > Old bash patches are removed > > Why? We need those. > ok, for what? The bash-4.3.30-upstream_fixes-3.patch is new... Well, have a look at the patches... Loading bashrc for sessions over SSH and such things... I didn't see that that was replaced by the upstream fixes patch. -Michael > > Marcel > > > > > > > > > > > > > Signed-off-by: Marcel Lorenz > > > --- > > >  config/rootfiles/common/bash                   |  12 + > > >  lfs/bash                                       |  20 +- > > >  src/patches/bash-3.2-ssh_source_bash.patch     |  12 - > > >  src/patches/bash-4.0-paths-1.patch             |  11 - > > >  src/patches/bash-4.0-profile-1.patch           |  12 - > > >  src/patches/bash-4.3.30-upstream_fixes-3.patch | 488 > > > +++++++++++++++++++++++++ > > >  6 files changed, 505 insertions(+), 50 deletions(-) > > >  delete mode 100644 src/patches/bash-3.2-ssh_source_bash.patch > > >  delete mode 100644 src/patches/bash-4.0-paths-1.patch > > >  delete mode 100644 src/patches/bash-4.0-profile-1.patch > > >  create mode 100644 src/patches/bash-4.3.30-upstream_fixes-3.patch > > > > > > diff --git a/config/rootfiles/common/bash  > > > b/config/rootfiles/common/bash > > > index 84f587f..743a71a 100644 > > > --- a/config/rootfiles/common/bash > > > +++ b/config/rootfiles/common/bash > > > @@ -57,3 +57,15 @@ bin/bash > > >  #usr/share/locale/zh_TW/LC_MESSAGES/bash.mo > > >  #usr/share/man/man1/bash.1 > > >  #usr/share/man/man1/bashbug.1 > > > +#usr/share/doc/bash-4.3.30 > > > +#usr/share/doc/bash-4.3.30/CHANGES > > > +#usr/share/doc/bash-4.3.30/COMPAT > > > +#usr/share/doc/bash-4.3.30/FAQ > > > +#usr/share/doc/bash-4.3.30/INTRO > > > +#usr/share/doc/bash-4.3.30/NEWS > > > +#usr/share/doc/bash-4.3.30/POSIX > > > +#usr/share/doc/bash-4.3.30/RBASH > > > +#usr/share/doc/bash-4.3.30/README > > > +#usr/share/doc/bash-4.3.30/bash.html > > > +#usr/share/doc/bash-4.3.30/bashref.html > > > + > > > diff --git a/lfs/bash b/lfs/bash > > > index c215b5a..416b382 100644 > > > --- a/lfs/bash > > > +++ b/lfs/bash > > > @@ -24,7 +24,7 @@ > > >   > > >  include Config > > >   > > > -VER        = 4.3 > > > +VER        = 4.3.30 > > >   > > >  THISAPP    = bash-$(VER) > > >  DL_FILE    = $(THISAPP).tar.gz > > > @@ -43,7 +43,8 @@ else > > >  endif > > >   > > >  CONFIGURE_OPTIONS += \ > > > - --without-bash-malloc > > > + --without-bash-malloc \ > > > + --docdir=/usr/share/doc/bash-4.3.30 > > >   > > >  ######################################################################### > > > #### > > > ## > > >  # Top-level Rules > > > @@ -53,7 +54,7 @@ objects = $(DL_FILE) > > >   > > >  $(DL_FILE)             = $(DL_FROM)/$(DL_FILE) > > >   > > > -$(DL_FILE)_MD5         = 81348932d5da294953e15d4814c74dd1 > > > +$(DL_FILE)_MD5         = a27b3ee9be83bd3ba448c0ff52b28447 > > >   > > >  install : $(TARGET) > > >   > > > @@ -83,18 +84,7 @@ $(subst %,%_MD5,$(objects)) : > > >  $(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects)) > > >   @$(PREBUILD) > > >   @rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar zaxf > > > $(DIR_DL)/$(DL_FILE) > > > - > > > - sed -e "s/filename, RTLD_LAZY/filename, RTLD_NOW/" \ > > > - -i $(DIR_APP)/builtins/enable.def > > > - > > > - for i in $$(seq 1 30); do \ > > > - cd $(DIR_APP) && patch -Np0 < > > > $(DIR_SRC)/src/patches/bash/bash43-$$(printf "%03d" "$${i}") || exit  > > > 1; \ > > > - done > > > - > > > - cd $(DIR_APP) && patch -Np1 < $(DIR_SRC)/src/patches/bash-4.0- > > > paths- > > > 1.patch > > > - cd $(DIR_APP) && patch -Np1 < $(DIR_SRC)/src/patches/bash-4.0- > > > profile-1.patch > > > - cd $(DIR_APP) && patch -Np1 < $(DIR_SRC)/src/patches/bash-3.2- > > > ssh_source_bash.patch > > > - > > > + cd $(DIR_APP) && patch -Np1 < $(DIR_SRC)/src/patches/bash-4.3.30- > > > upstream_fixes-3.patch > > >   cd $(DIR_APP) && ./configure $(CONFIGURE_OPTIONS) > > >   cd $(DIR_APP) && make $(MAKETUNING) > > >   cd $(DIR_APP) && make install > > > diff --git a/src/patches/bash-3.2-ssh_source_bash.patch  > > > b/src/patches/bash- > > > 3.2-ssh_source_bash.patch > > > deleted file mode 100644 > > > index 5bd19ce..0000000 > > > --- a/src/patches/bash-3.2-ssh_source_bash.patch > > > +++ /dev/null > > > @@ -1,12 +0,0 @@ > > > -diff -up bash-4.0/config-top.h.ssh_source_bash bash-4.0/config-top.h > > > ---- bash-4.0/config-top.h.ssh_source_bash 2009-01-21 > > > 15:20:06.000000000 +0100 > > > -+++ bash-4.0/config-top.h 2009-01-21 15:25:46.000000000 +0100 > > > -@@ -90,7 +90,7 @@ > > > -    sshd and source the .bashrc if so (like the rshd behavior).  This  > > > checks > > > -    for the presence of SSH_CLIENT or SSH2_CLIENT in the initial  > > > environment, > > > -    which can be fooled under certain not-uncommon circumstances. */ > > > --/* #define SSH_SOURCE_BASHRC */ > > > -+#define SSH_SOURCE_BASHRC > > > -  > > > - /* Define if you want the case-capitalizing operators (~[~]) and the > > > -    `capcase' variable attribute (declare -c). */ > > > diff --git a/src/patches/bash-4.0-paths-1.patch  > > > b/src/patches/bash-4.0-paths- > > > 1.patch > > > deleted file mode 100644 > > > index 24ec5cc..0000000 > > > --- a/src/patches/bash-4.0-paths-1.patch > > > +++ /dev/null > > > @@ -1,11 +0,0 @@ > > > ---- bash-3.0/config-top.h.paths 2003-08-05 15:36:12.000000000 > > > +0100 > > > -+++ bash-3.0/config-top.h 2004-07-28 09:36:27.117205637 +0100 > > > -@@ -66,7 +66,7 @@ > > > -    the Posix.2 confstr () function, or CS_PATH define are not  > > > present. */ > > > - #ifndef STANDARD_UTILS_PATH > > > - #define STANDARD_UTILS_PATH \ > > > --  "/bin:/usr/bin:/sbin:/usr/sbin:/etc:/usr/etc" > > > -+  "/bin:/usr/bin:/usr/sbin:/sbin" > > > - #endif > > > -  > > > - /* Default primary and secondary prompt strings. */ > > > diff --git a/src/patches/bash-4.0-profile-1.patch  > > > b/src/patches/bash-4.0- > > > profile-1.patch > > > deleted file mode 100644 > > > index ba3344b..0000000 > > > --- a/src/patches/bash-4.0-profile-1.patch > > > +++ /dev/null > > > @@ -1,12 +0,0 @@ > > > -diff -up bash-3.2/config-top.h.profile bash-3.2/config-top.h > > > ---- bash-3.2/config-top.h.profile 2008-07-17 13:35:39.000000000 > > > +0200 > > > -+++ bash-3.2/config-top.h 2008-07-17 13:42:18.000000000 +0200 > > > -@@ -26,6 +26,8 @@ > > > -    what POSIX.2 specifies. */ > > > - #define CONTINUE_AFTER_KILL_ERROR > > > -  > > > -+#define NON_INTERACTIVE_LOGIN_SHELLS > > > -+ > > > - /* Define BREAK_COMPLAINS if you want the non-standard, but useful > > > -    error messages about `break' and `continue' out of context. */ > > > - #define BREAK_COMPLAINS > > > diff --git a/src/patches/bash-4.3.30-upstream_fixes-3.patch > > > b/src/patches/bash-4.3.30-upstream_fixes-3.patch > > > new file mode 100644 > > > index 0000000..459ce26 > > > --- /dev/null > > > +++ b/src/patches/bash-4.3.30-upstream_fixes-3.patch > > > @@ -0,0 +1,488 @@ > > > +Submitted By:            Armin K. > > > +Date:                    2016-02-16 > > > +Initial Package Version: 4.3 > > > +Upstream Status:         Already in upstream patch repo > > > +Origin:                  Upstream > > > +Description:             This patch contains upstream patch numbers  > > > 031 thru > > > 042 > > > + > > > +--- a/arrayfunc.c 2014-10-01 18:57:35.000000000 +0200 > > > ++++ b/arrayfunc.c 2015-09-06 22:57:56.328941059 +0200 > > > +@@ -404,6 +404,9 @@ > > > +       (*var->assign_func) (var, l->word->word, i, 0); > > > +     else > > > +       array_insert (a, i, l->word->word); > > > ++ > > > ++  VUNSETATTR (var, att_invisible); /* no longer invisible */ > > > ++ > > > +   return var; > > > + } > > > +  > > > +@@ -634,6 +637,10 @@ > > > +  > > > +   if (nlist) > > > +     dispose_words (nlist); > > > ++ > > > ++  if (var) > > > ++    VUNSETATTR (var, att_invisible); /* no longer invisible */ > > > ++ > > > +   return (var); > > > + } > > > +  > > > +--- a/assoc.c 2011-11-05 21:39:05.000000000 +0100 > > > ++++ b/assoc.c 2015-09-06 22:57:56.328941059 +0200 > > > +@@ -436,6 +436,8 @@ > > > + #if 1 > > > +  if (sh_contains_shell_metas (tlist->key)) > > > +    istr = sh_double_quote (tlist->key); > > > ++ else if (ALL_ELEMENT_SUB (tlist->key[0]) && tlist->key[1] == > > > '\0') > > > ++   istr = sh_double_quote (tlist->key); > > > +  else > > > +    istr = tlist->key; > > > + #else > > > +--- a/bashline.c 2014-10-01 18:57:30.000000000 +0200 > > > ++++ b/bashline.c 2015-09-06 22:58:34.711768943 +0200 > > > +@@ -202,6 +202,7 @@ > > > + extern int last_command_exit_value; > > > + extern int array_needs_making; > > > + extern int posixly_correct, no_symbolic_links; > > > ++extern int sigalrm_seen; > > > + extern char *current_prompt_string, *ps1_prompt; > > > + extern STRING_INT_ALIST word_token_alist[]; > > > + extern sh_builtin_func_t *last_shell_builtin, *this_shell_builtin; > > > +@@ -1467,10 +1468,23 @@ > > > +  > > > +       os = start; > > > +       n = 0; > > > ++      was_assignment = 0; > > > +       s = find_cmd_start (os); > > > +       e = find_cmd_end (end); > > > +       do > > > +  { > > > ++   /* Don't read past the end of rl_line_buffer */ > > > ++   if (s > rl_end) > > > ++     { > > > ++       s1 = s = e1; > > > ++       break; > > > ++     } > > > ++   /* Or past point if point is within an assignment statement */ > > > ++   else if (was_assignment && s > rl_point) > > > ++     { > > > ++       s1 = s = e1; > > > ++       break; > > > ++     } > > > +    /* Skip over assignment statements preceding a command > > > name.  If > > > we > > > +       don't find a command name at all, we can perform command > > > name > > > +       completion.  If we find a partial command name, we should > > > perform > > > +@@ -4208,8 +4222,9 @@ > > > + { > > > +   /* If we're going to longjmp to top_level, make sure we clean up  > > > readline. > > > +      check_signals will call QUIT, which will eventually longjmp to > > > top_level, > > > +-     calling run_interrupt_trap along the way. */ > > > +-  if (interrupt_state) > > > ++     calling run_interrupt_trap along the way.  The check for  > > > sigalrm_seen > > > is > > > ++     to clean up the read builtin's state. */ > > > ++  if (terminating_signal || interrupt_state || sigalrm_seen) > > > +     rl_cleanup_after_signal (); > > > +   bashline_reset_event_hook (); > > > +   check_signals_and_traps (); /* XXX */ > > > +--- a/builtins/common.h 2014-10-01 18:57:47.000000000 +0200 > > > ++++ b/builtins/common.h 2015-09-06 22:57:56.330941103 +0200 > > > +@@ -122,6 +122,10 @@ > > > + /* Functions from getopts.def */ > > > + extern void getopts_reset __P((int)); > > > +  > > > ++/* Functions from read.def */ > > > ++extern void read_tty_cleanup __P((void)); > > > ++extern int read_tty_modified __P((void)); > > > ++ > > > + /* Functions from set.def */ > > > + extern int minus_o_option_value __P((char *)); > > > + extern void list_minus_o_opts __P((int, int)); > > > +--- a/builtins/read.def 2014-10-01 18:57:38.000000000 +0200 > > > ++++ b/builtins/read.def 2015-09-06 22:57:56.335941212 +0200 > > > +@@ -140,10 +140,12 @@ > > > + procenv_t alrmbuf; > > > + int sigalrm_seen; > > > +  > > > +-static int reading; > > > ++static int reading, tty_modified; > > > + static SigHandler *old_alrm; > > > + static unsigned char delim; > > > +  > > > ++static struct ttsave termsave; > > > ++ > > > + /* In all cases, SIGALRM just sets a flag that we check  > > > periodically.  This > > > +    avoids problems with the semi-tricky stuff we do with the xfree  > > > of > > > +    input_string at the top of the unwind-protect list (see below).  > > > */ > > > +@@ -188,7 +190,6 @@ > > > +   struct stat tsb; > > > +   SHELL_VAR *var; > > > +   TTYSTRUCT ttattrs, ttset; > > > +-  struct ttsave termsave; > > > + #if defined (ARRAY_VARS) > > > +   WORD_LIST *alist; > > > + #endif > > > +@@ -221,7 +222,7 @@ > > > +   USE_VAR(ps2); > > > +   USE_VAR(lastsig); > > > +  > > > +-  sigalrm_seen = reading = 0; > > > ++  sigalrm_seen = reading = tty_modified = 0; > > > +  > > > +   i = 0; /* Index into the string that we are reading. */ > > > +   raw = edit = 0; /* Not reading raw input by default. */ > > > +@@ -438,6 +439,8 @@ > > > +    retval = 128+SIGALRM; > > > +    goto assign_vars; > > > +  } > > > ++      if (interactive_shell == 0) > > > ++ initialize_terminating_signals (); > > > +       old_alrm = set_signal_handler (SIGALRM, sigalrm); > > > +       add_unwind_protect (reset_alarm, (char *)NULL); > > > + #if defined (READLINE) > > > +@@ -482,7 +485,10 @@ > > > +    i = silent ? ttfd_cbreak (fd, &ttset) : ttfd_onechar (fd,  > > > &ttset); > > > +    if (i < 0) > > > +      sh_ttyerror (1); > > > ++   tty_modified = 1; > > > +    add_unwind_protect ((Function *)ttyrestore, (char > > > *)&termsave); > > > ++   if (interactive_shell == 0) > > > ++     initialize_terminating_signals (); > > > +  } > > > +     } > > > +   else if (silent) /* turn off echo but leave term in canonical > > > mode > > > */ > > > +@@ -497,7 +503,10 @@ > > > +       if (i < 0) > > > +  sh_ttyerror (1); > > > +  > > > ++      tty_modified = 1; > > > +       add_unwind_protect ((Function *)ttyrestore, (char  > > > *)&termsave); > > > ++      if (interactive_shell == 0) > > > ++ initialize_terminating_signals (); > > > +     } > > > +  > > > +   /* This *must* be the top unwind-protect on the stack, so the  > > > manipulation > > > +@@ -588,6 +597,8 @@ > > > +      } > > > +    else > > > +      lastsig = 0; > > > ++   if (terminating_signal && tty_modified) > > > ++     ttyrestore (&termsave); /* fix terminal before > > > exiting */ > > > +    CHECK_TERMSIG; > > > +    eof = 1; > > > +    break; > > > +@@ -978,6 +989,20 @@ > > > +      struct ttsave *ttp; > > > + { > > > +   ttsetattr (ttp->fd, ttp->attrs); > > > ++  tty_modified = 0; > > > ++} > > > ++ > > > ++void > > > ++read_tty_cleanup () > > > ++{ > > > ++  if (tty_modified) > > > ++    ttyrestore (&termsave); > > > ++} > > > ++ > > > ++int > > > ++read_tty_modified () > > > ++{ > > > ++  return (tty_modified); > > > + } > > > +  > > > + #if defined (READLINE) > > > +--- a/builtins/set.def 2013-04-19 13:20:34.000000000 +0200 > > > ++++ b/builtins/set.def 2015-09-06 22:57:56.336941234 +0200 > > > +@@ -751,9 +751,11 @@ > > > +   WORD_LIST *list; > > > + { > > > +   int unset_function, unset_variable, unset_array, opt, nameref,  > > > any_failed; > > > ++  int global_unset_func, global_unset_var; > > > +   char *name; > > > +  > > > +   unset_function = unset_variable = unset_array = nameref =  > > > any_failed = 0; > > > ++  global_unset_func = global_unset_var = 0; > > > +  > > > +   reset_internal_getopt (); > > > +   while ((opt = internal_getopt (list, "fnv")) != -1) > > > +@@ -761,10 +763,10 @@ > > > +       switch (opt) > > > +  { > > > +  case 'f': > > > +-   unset_function = 1; > > > ++   global_unset_func = 1; > > > +    break; > > > +  case 'v': > > > +-   unset_variable = 1; > > > ++   global_unset_var = 1; > > > +    break; > > > +  case 'n': > > > +    nameref = 1; > > > +@@ -777,7 +779,7 @@ > > > +  > > > +   list = loptend; > > > +  > > > +-  if (unset_function && unset_variable) > > > ++  if (global_unset_func && global_unset_var) > > > +     { > > > +       builtin_error (_("cannot simultaneously unset a function and a > > > variable")); > > > +       return (EXECUTION_FAILURE); > > > +@@ -795,6 +797,9 @@ > > > +  > > > +       name = list->word->word; > > > +  > > > ++      unset_function = global_unset_func; > > > ++      unset_variable = global_unset_var; > > > ++ > > > + #if defined (ARRAY_VARS) > > > +       unset_array = 0; > > > +       if (!unset_function && valid_array_reference (name)) > > > +--- a/jobs.c 2014-10-01 18:57:26.000000000 +0200 > > > ++++ b/jobs.c 2015-09-06 22:57:56.340941321 +0200 > > > +@@ -3339,7 +3339,9 @@ > > > +       if (posixly_correct && this_shell_builtin &&  > > > this_shell_builtin == > > > wait_builtin) > > > +  { > > > +    interrupt_immediately = 0; > > > +-   trap_handler (SIGCHLD); /* set pending_traps[SIGCHLD] > > > */ > > > ++   /* This was trap_handler (SIGCHLD) but that can lose traps if > > > ++      children_exited > 1 */ > > > ++   queue_sigchld_trap (children_exited); > > > +    wait_signal_received = SIGCHLD; > > > +    /* If we're in a signal handler, let CHECK_WAIT_INTR pick it > > > up; > > > +       run_pending_traps will call run_sigchld_trap later  */ > > > +--- a/lib/readline/complete.c 2013-10-14 15:27:10.000000000 +0200 > > > ++++ b/lib/readline/complete.c 2015-09-06 22:58:34.712768964 +0200 > > > +@@ -689,6 +689,8 @@ > > > +  > > > +   if (temp == 0 || *temp == '\0') > > > +     return (pathname); > > > ++  else if (temp[1] == 0 && temp == pathname) > > > ++    return (pathname); > > > +   /* If the basename is NULL, we might have a pathname like  > > > '/usr/src/'. > > > +      Look for a previous slash and, if one is found, return the  > > > portion > > > +      following that slash.  If there's no previous slash, just  > > > return the > > > +--- a/lib/sh/unicode.c 2014-01-30 22:47:19.000000000 +0100 > > > ++++ b/lib/sh/unicode.c 2015-09-06 22:57:56.341941343 +0200 > > > +@@ -78,13 +78,15 @@ > > > +   s = strrchr (locale, '.'); > > > +   if (s) > > > +     { > > > +-      strcpy (charsetbuf, s+1); > > > ++      strncpy (charsetbuf, s+1, sizeof (charsetbuf) - 1); > > > ++      charsetbuf[sizeof (charsetbuf) - 1] = '\0'; > > > +       t = strchr (charsetbuf, '@'); > > > +       if (t) > > > +  *t = 0; > > > +       return charsetbuf; > > > +     } > > > +-  strcpy (charsetbuf, locale); > > > ++  strncpy (charsetbuf, locale, sizeof (charsetbuf) - 1); > > > ++  charsetbuf[sizeof (charsetbuf) - 1] = '\0'; > > > +   return charsetbuf; > > > + } > > > + #endif > > > +--- a/parse.y 2014-10-05 19:52:50.000000000 +0200 > > > ++++ b/parse.y 2015-09-06 22:58:35.245780313 +0200 > > > +@@ -2818,11 +2818,16 @@ > > > +     case AND_AND: > > > +     case OR_OR: > > > +     case '&': > > > ++    case WHILE: > > > +     case DO: > > > ++    case UNTIL: > > > ++    case IF: > > > +     case THEN: > > > ++    case ELIF: > > > +     case ELSE: > > > +     case '{': /* } */ > > > +-    case '(': /* ) */ > > > ++    case '(': /* )( */ > > > ++    case ')': /* only valid in case statement */ > > > +     case BANG: /* ! time pipeline */ > > > +     case TIME: /* time time pipeline */ > > > +     case TIMEOPT: /* time -p time pipeline */ > > > +@@ -3703,6 +3708,8 @@ > > > + /*itrace("parse_comsub:%d: lex_inword -> 1 ch = `%c' (%d)",  > > > line_number, ch, > > > __LINE__);*/ > > > +        tflags |= LEX_INWORD; > > > +        lex_wlen = 0; > > > ++       if (tflags & LEX_RESWDOK) > > > ++ lex_rwlen = 0; > > > +      } > > > +  } > > > +  > > > +--- a/patchlevel.h 2014-10-05 19:52:50.000000000 +0200 > > > ++++ b/patchlevel.h 2015-09-06 22:58:35.248780377 +0200 > > > +@@ -25,6 +25,6 @@ > > > +    regexp `^#define[  ]*PATCHLEVEL', since that's what > > > support/mkversion.sh > > > +    looks for to find the patch level (for the sccs version string).  > > > */ > > > +  > > > +-#define PATCHLEVEL 30 > > > ++#define PATCHLEVEL 42 > > > +  > > > + #endif /* _PATCHLEVEL_H_ */ > > > +--- a/shell.c 2014-01-14 14:04:32.000000000 +0100 > > > ++++ b/shell.c 2015-09-06 22:57:56.343941387 +0200 > > > +@@ -73,6 +73,7 @@ > > > + #endif > > > +  > > > + #if defined (READLINE) > > > ++#  include > > > + #  include "bashline.h" > > > + #endif > > > +  > > > +@@ -909,6 +910,14 @@ > > > +   fflush (stdout); /* XXX */ > > > +   fflush (stderr); > > > +  > > > ++  /* Clean up the terminal if we are in a state where it's been  > > > modified. */ > > > ++#if defined (READLINE) > > > ++  if (RL_ISSTATE (RL_STATE_TERMPREPPED) && rl_deprep_term_function) > > > ++    (*rl_deprep_term_function) (); > > > ++#endif > > > ++  if (read_tty_modified ()) > > > ++    read_tty_cleanup (); > > > ++ > > > +   /* Do trap[0] if defined.  Allow it to override the exit status > > > +      passed to us. */ > > > +   if (signal_is_trapped (0)) > > > +--- a/sig.c 2014-01-10 21:06:06.000000000 +0100 > > > ++++ b/sig.c 2015-09-06 22:57:56.344941408 +0200 > > > +@@ -532,8 +532,10 @@ > > > + #if defined (READLINE) > > > +   /* Set the event hook so readline will call it after the signal  > > > handlers > > > +      finish executing, so if this interrupted character input we can  > > > get > > > +-     quick response. */ > > > +-  if (interactive_shell && interactive && no_line_editing == 0) > > > ++     quick response.  If readline is active or has modified the  > > > terminal we > > > ++     need to set this no matter what the signal is, though the check  > > > for > > > ++     RL_STATE_TERMPREPPED is possibly redundant. */ > > > ++  if (RL_ISSTATE (RL_STATE_SIGHANDLER) || RL_ISSTATE  > > > (RL_STATE_TERMPREPPED)) > > > +     bashline_set_event_hook (); > > > + #endif > > > +  > > > +--- a/subst.c 2014-10-01 18:57:47.000000000 +0200 > > > ++++ b/subst.c 2015-09-06 22:58:34.177757570 +0200 > > > +@@ -5782,7 +5782,7 @@ > > > +       /* XXX - does this leak if name[@] or name[*]? */ > > > +       if (pflags & PF_ASSIGNRHS) > > > +         { > > > +-          temp = array_variable_name (name, &tt, (int *)0); > > > ++          var = array_variable_part (name, &tt, (int *)0); > > > +           if (ALL_ELEMENT_SUB (tt[0]) && tt[1] == ']') > > > +      temp = array_value (name, quoted|Q_DOUBLE_QUOTES, 0, &atype, > > > &ind); > > > +    else > > > +--- a/subst.h 2014-10-01 18:57:43.000000000 +0200 > > > ++++ b/subst.h 2015-09-06 22:57:56.344941408 +0200 > > > +@@ -47,6 +47,7 @@ > > > + #define ASS_MKASSOC 0x0004 > > > + #define ASS_MKGLOBAL 0x0008 /* force global assignment */ > > > + #define ASS_NAMEREF 0x0010 /* assigning to nameref > > > variable */ > > > ++#define ASS_FROMREF 0x0020 /* assigning from value of > > > nameref > > > variable */ > > > +  > > > + /* Flags for the string extraction functions. */ > > > + #define SX_NOALLOC 0x0001 /* just skip; don't return > > > substring > > > */ > > > +--- a/variables.c 2014-10-01 18:57:51.000000000 +0200 > > > ++++ b/variables.c 2015-09-06 22:57:56.345941430 +0200 > > > +@@ -2516,10 +2516,27 @@ > > > +      HASH_TABLE *table; > > > +      int hflags, aflags; > > > + { > > > +-  char *newval; > > > ++  char *newname, *newval; > > > +   SHELL_VAR *entry; > > > ++#if defined (ARRAY_VARS) > > > ++  arrayind_t ind; > > > ++  char *subp; > > > ++  int sublen; > > > ++#endif > > > +  > > > ++  newname = 0; > > > ++#if defined (ARRAY_VARS) > > > ++  if ((aflags & ASS_FROMREF) && (hflags & HASH_NOSRCH) == 0 && > > > valid_array_reference (name)) > > > ++    { > > > ++      newname = array_variable_name (name, &subp, &sublen); > > > ++      if (newname == 0) > > > ++ return (SHELL_VAR *)NULL; /* XXX */ > > > ++      entry = hash_lookup (newname, table); > > > ++    } > > > ++  else > > > ++#endif > > > +   entry = (hflags & HASH_NOSRCH) ? (SHELL_VAR *)NULL : hash_lookup  > > > (name, > > > table); > > > ++ > > > +   /* Follow the nameref chain here if this is the global variables  > > > table */ > > > +   if (entry && nameref_p (entry) && (invisible_p (entry) == 0) &&  > > > table == > > > global_variables->table) > > > +     { > > > +@@ -2550,6 +2567,16 @@ > > > +       var_setvalue (entry, make_variable_value (entry, value, 0)); > > > +       } > > > +     } > > > ++#if defined (ARRAY_VARS) > > > ++  else if (entry == 0 && newname) > > > ++    { > > > ++      entry = make_new_array_variable (newname); /* indexed array > > > by > > > default */ > > > ++      if (entry == 0) > > > ++ return entry; > > > ++      ind = array_expand_index (name, subp, sublen); > > > ++      bind_array_element (entry, ind, value, aflags); > > > ++    } > > > ++#endif > > > +   else if (entry == 0) > > > +     { > > > +       entry = make_new_variable (name, table); > > > +@@ -2670,7 +2697,8 @@ > > > +   normal. */ > > > +        if (nameref_cell (nv) == 0) > > > +  return (bind_variable_internal (nv->name, value, > > > nvc->table, 0, flags)); > > > +-       return (bind_variable_internal (nameref_cell (nv), > > > value, nvc->table, 0, flags)); > > > ++       /* XXX - bug here with ref=array[index] */ > > > ++       return (bind_variable_internal (nameref_cell (nv), > > > value, nvc->table, 0, flags|ASS_FROMREF)); > > > +      } > > > +    else > > > +      v = nv; > > > +@@ -2805,10 +2833,12 @@ > > > + #endif > > > +     v = bind_variable (lhs, rhs, 0); > > > +  > > > +-  if (v && isint) > > > +-    VSETATTR (v, att_integer); > > > +- > > > +-  VUNSETATTR (v, att_invisible); > > > ++  if (v) > > > ++    { > > > ++      if (isint) > > > ++ VSETATTR (v, att_integer); > > > ++      VUNSETATTR (v, att_invisible); > > > ++    } > > > +  > > > +   return (v); > > > + } > > > +--- a/y.tab.c 2014-10-05 19:52:50.000000000 +0200 > > > ++++ b/y.tab.c 2015-09-06 22:58:35.247780356 +0200 > > > +@@ -5130,11 +5130,16 @@ > > > +     case AND_AND: > > > +     case OR_OR: > > > +     case '&': > > > ++    case WHILE: > > > +     case DO: > > > ++    case UNTIL: > > > ++    case IF: > > > +     case THEN: > > > ++    case ELIF: > > > +     case ELSE: > > > +     case '{': /* } */ > > > +-    case '(': /* ) */ > > > ++    case '(': /* )( */ > > > ++    case ')': /* only valid in case statement */ > > > +     case BANG: /* ! time pipeline */ > > > +     case TIME: /* time time pipeline */ > > > +     case TIMEOPT: /* time -p time pipeline */ > > > +@@ -6015,6 +6020,8 @@ > > > + /*itrace("parse_comsub:%d: lex_inword -> 1 ch = `%c' (%d)",  > > > line_number, ch, > > > __LINE__);*/ > > > +        tflags |= LEX_INWORD; > > > +        lex_wlen = 0; > > > ++       if (tflags & LEX_RESWDOK) > > > ++ lex_rwlen = 0; > > > +      } > > > +  } > > > +