From mboxrd@z Thu Jan 1 00:00:00 1970 From: peter.mueller@ipfire.org To: development@lists.ipfire.org Subject: [PATCH 4/7] bash: add patches 001 - 011 for 5.0 version Date: Mon, 07 Oct 2019 18:18:00 +0000 Message-ID: <1c9a3727-c220-2d75-2957-7b0e48b6604c@ipfire.org> In-Reply-To: <3543dab0-7713-89bc-ea57-30e5f348d1e6@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============5974211086322843802==" List-Id: --===============5974211086322843802== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Signed-off-by: Peter M=C3=BCller --- src/patches/bash/bash50-001 | 166 ++++++++++++++++++++++++++++++ src/patches/bash/bash50-002 | 113 +++++++++++++++++++++ src/patches/bash/bash50-003 | 239 ++++++++++++++++++++++++++++++++++++++++++= ++ src/patches/bash/bash50-004 | 53 ++++++++++ src/patches/bash/bash50-005 | 110 ++++++++++++++++++++ src/patches/bash/bash50-006 | 47 +++++++++ src/patches/bash/bash50-007 | 62 ++++++++++++ src/patches/bash/bash50-008 | 68 +++++++++++++ src/patches/bash/bash50-009 | 42 ++++++++ src/patches/bash/bash50-010 | 172 +++++++++++++++++++++++++++++++ src/patches/bash/bash50-011 | 59 +++++++++++ 11 files changed, 1131 insertions(+) create mode 100644 src/patches/bash/bash50-001 create mode 100644 src/patches/bash/bash50-002 create mode 100644 src/patches/bash/bash50-003 create mode 100644 src/patches/bash/bash50-004 create mode 100644 src/patches/bash/bash50-005 create mode 100644 src/patches/bash/bash50-006 create mode 100644 src/patches/bash/bash50-007 create mode 100644 src/patches/bash/bash50-008 create mode 100644 src/patches/bash/bash50-009 create mode 100644 src/patches/bash/bash50-010 create mode 100644 src/patches/bash/bash50-011 diff --git a/src/patches/bash/bash50-001 b/src/patches/bash/bash50-001 new file mode 100644 index 000000000..169317ded --- /dev/null +++ b/src/patches/bash/bash50-001 @@ -0,0 +1,166 @@ + BASH PATCH REPORT + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +Bash-Release: 5.0 +Patch-ID: bash50-001 + +Bug-Reported-by: axel(a)freakout.de +Bug-Reference-ID: <201901082050.x08KoShS006731(a)bongo.freakout.de> +Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2019-01/msg000= 79.html + +Bug-Description: + +Under certain circumstances, the glob expansion code did not remove +backslashes escaping characters in directory names (or portions of a +pattern preceding a slash). + +Patch (apply with `patch -p0'): + +*** ../bash-5.0/bashline.c 2018-11-27 13:20:16.000000000 -0500 +--- bashline.c 2019-01-16 16:06:03.000000000 -0500 +*************** +*** 232,235 **** +--- 232,236 ---- + static int bash_possible_command_completions __P((int, int)); + =20 ++ static int completion_glob_pattern __P((char *)); + static char *glob_complete_word __P((const char *, int)); + static int bash_glob_completion_internal __P((int)); +*************** +*** 1742,1746 **** + /* This could be a globbing pattern, so try to expand it using pathname + expansion. */ +! if (!matches && glob_pattern_p (text)) + { + matches =3D rl_completion_matches (text, glob_complete_word); +--- 1743,1747 ---- + /* This could be a globbing pattern, so try to expand it using pathname + expansion. */ +! if (!matches && completion_glob_pattern ((char *)text)) + { + matches =3D rl_completion_matches (text, glob_complete_word); +*************** +*** 1851,1855 **** + } + =20 +! globpat =3D glob_pattern_p (hint_text); + =20 + /* If this is an absolute program name, do not check it against +--- 1852,1856 ---- + } + =20 +! globpat =3D completion_glob_pattern ((char *)hint_text); + =20 + /* If this is an absolute program name, do not check it against +*************** +*** 3714,3717 **** +--- 3715,3773 ---- + } + =20 ++ static int ++ completion_glob_pattern (string) ++ char *string; ++ { ++ register int c; ++ char *send; ++ int open; ++=20 ++ DECLARE_MBSTATE; ++=20 ++ open =3D 0; ++ send =3D string + strlen (string); ++=20 ++ while (c =3D *string++) ++ { ++ switch (c) ++ { ++ case '?': ++ case '*': ++ return (1); ++=20 ++ case '[': ++ open++; ++ continue; ++=20 ++ case ']': ++ if (open) ++ return (1); ++ continue; ++=20 ++ case '+': ++ case '@': ++ case '!': ++ if (*string =3D=3D '(') /*)*/ ++ return (1); ++ continue; ++=20 ++ case '\\': ++ if (*string =3D=3D 0) ++ return (0); =20 ++ } ++=20 ++ /* Advance one fewer byte than an entire multibyte character to ++ account for the auto-increment in the loop above. */ ++ #ifdef HANDLE_MULTIBYTE ++ string--; ++ ADVANCE_CHAR_P (string, send - string); ++ string++; ++ #else ++ ADVANCE_CHAR_P (string, send - string); ++ #endif ++ } ++ return (0); ++ } ++=20 + static char *globtext; + static char *globorig; +*************** +*** 3878,3882 **** + } =20 + =20 +! if (t && glob_pattern_p (t) =3D=3D 0) + rl_explicit_arg =3D 1; /* XXX - force glob_complete_word to append `*'= */ + FREE (t); +--- 3934,3938 ---- + } =20 + =20 +! if (t && completion_glob_pattern (t) =3D=3D 0) + rl_explicit_arg =3D 1; /* XXX - force glob_complete_word to append `*'= */ + FREE (t); +*** ../bash-5.0/lib/glob/glob_loop.c 2018-12-31 13:35:15.000000000 -0500 +--- lib/glob/glob_loop.c 2019-01-09 09:44:36.000000000 -0500 +*************** +*** 55,59 **** + =20 + case L('\\'): +- #if 0 + /* Don't let the pattern end in a backslash (GMATCH returns no match + if the pattern ends in a backslash anyway), but otherwise return 1, +--- 55,58 ---- +*************** +*** 61,69 **** + and it can be removed. */ + return (*p !=3D L('\0')); +- #else +- /* The pattern may not end with a backslash. */ +- if (*p++ =3D=3D L('\0')) +- return 0; +- #endif + } + =20 +--- 60,63 ---- +*** ../bash-5.0/patchlevel.h 2016-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2016-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 0 + =20 + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 1 + =20 + #endif /* _PATCHLEVEL_H_ */ diff --git a/src/patches/bash/bash50-002 b/src/patches/bash/bash50-002 new file mode 100644 index 000000000..3fc8272f8 --- /dev/null +++ b/src/patches/bash/bash50-002 @@ -0,0 +1,113 @@ + BASH PATCH REPORT + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +Bash-Release: 5.0 +Patch-ID: bash50-002 + +Bug-Reported-by: Ante Peric +Bug-Reference-ID: +Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2019-01/msg000= 95.html + +Bug-Description: + +When an alias value ends with an unquoted literal tab (not part of a quoted +string or comment), alias expansion cannot correctly detect the end of the +alias value after expanding it. + +Patch (apply with `patch -p0'): + +*** ../bash-5.0/parser.h 2018-12-28 19:11:18.000000000 -0500 +--- parser.h 2019-01-11 15:13:03.000000000 -0500 +*************** +*** 48,51 **** +--- 48,52 ---- + #define PST_REDIRLIST 0x080000 /* parsing a list of redirections preceding= a simple command name */ + #define PST_COMMENT 0x100000 /* parsing a shell comment; used by aliases */ ++ #define PST_ENDALIAS 0x200000 /* just finished expanding and consuming an = alias */ + =20 + /* Definition of the delimiter stack. Needed by parse.y and bashhist.c. */ +*** ../bash-5.0/parse.y 2019-01-02 13:57:34.000000000 -0500 +--- parse.y 2019-01-14 08:23:31.000000000 -0500 +*************** +*** 2558,2567 **** + pushed_string_list->flags !=3D PSH_DPAREN && + (parser_state & PST_COMMENT) =3D=3D 0 && + shell_input_line_index > 0 && +! shell_input_line[shell_input_line_index-1] !=3D ' ' && + shell_input_line[shell_input_line_index-1] !=3D '\n' && + shellmeta (shell_input_line[shell_input_line_index-1]) =3D=3D 0 && + (current_delimiter (dstack) !=3D '\'' && current_delimiter (dstack) = !=3D '"')) + { + return ' '; /* END_ALIAS */ + } +--- 2558,2569 ---- + pushed_string_list->flags !=3D PSH_DPAREN && + (parser_state & PST_COMMENT) =3D=3D 0 && ++ (parser_state & PST_ENDALIAS) =3D=3D 0 && /* only once */ + shell_input_line_index > 0 && +! shellblank (shell_input_line[shell_input_line_index-1]) =3D=3D 0 && + shell_input_line[shell_input_line_index-1] !=3D '\n' && + shellmeta (shell_input_line[shell_input_line_index-1]) =3D=3D 0 && + (current_delimiter (dstack) !=3D '\'' && current_delimiter (dstack) = !=3D '"')) + { ++ parser_state |=3D PST_ENDALIAS; + return ' '; /* END_ALIAS */ + } +*************** +*** 2572,2575 **** +--- 2574,2578 ---- + if (uc =3D=3D 0 && pushed_string_list && pushed_string_list->flags !=3D = PSH_SOURCE) + { ++ parser_state &=3D ~PST_ENDALIAS; + pop_string (); + uc =3D shell_input_line[shell_input_line_index]; +*** ../bash-5.0/y.tab.c 2019-01-02 13:57:43.000000000 -0500 +--- y.tab.c 2019-01-14 08:39:23.000000000 -0500 +*************** +*** 4874,4883 **** + pushed_string_list->flags !=3D PSH_DPAREN && + (parser_state & PST_COMMENT) =3D=3D 0 && + shell_input_line_index > 0 && +! shell_input_line[shell_input_line_index-1] !=3D ' ' && + shell_input_line[shell_input_line_index-1] !=3D '\n' && + shellmeta (shell_input_line[shell_input_line_index-1]) =3D=3D 0 && + (current_delimiter (dstack) !=3D '\'' && current_delimiter (dstack) = !=3D '"')) + { + return ' '; /* END_ALIAS */ + } +--- 4874,4885 ---- + pushed_string_list->flags !=3D PSH_DPAREN && + (parser_state & PST_COMMENT) =3D=3D 0 && ++ (parser_state & PST_ENDALIAS) =3D=3D 0 && /* only once */ + shell_input_line_index > 0 && +! shellblank (shell_input_line[shell_input_line_index-1]) =3D=3D 0 && + shell_input_line[shell_input_line_index-1] !=3D '\n' && + shellmeta (shell_input_line[shell_input_line_index-1]) =3D=3D 0 && + (current_delimiter (dstack) !=3D '\'' && current_delimiter (dstack) = !=3D '"')) + { ++ parser_state |=3D PST_ENDALIAS; + return ' '; /* END_ALIAS */ + } +*************** +*** 4888,4891 **** +--- 4890,4894 ---- + if (uc =3D=3D 0 && pushed_string_list && pushed_string_list->flags !=3D = PSH_SOURCE) + { ++ parser_state &=3D ~PST_ENDALIAS; + pop_string (); + uc =3D shell_input_line[shell_input_line_index]; +*** ../bash-5.0/patchlevel.h 2016-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2016-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 1 + =20 + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 2 + =20 + #endif /* _PATCHLEVEL_H_ */ diff --git a/src/patches/bash/bash50-003 b/src/patches/bash/bash50-003 new file mode 100644 index 000000000..f7e5677e5 --- /dev/null +++ b/src/patches/bash/bash50-003 @@ -0,0 +1,239 @@ + BASH PATCH REPORT + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +Bash-Release: 5.0 +Patch-ID: bash50-003 + +Bug-Reported-by: Andrew Church +Bug-Reference-ID: <5c534aa2.04371(a)msgid.achurch.org> +Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2019-01/msg002= 76.html + +Bug-Description: + +There are several incompatibilities in how bash-5.0 processes pathname +expansion (globbing) of filename arguments that have backslashes in the +directory portion. + +Patch (apply with `patch -p0'): + +*** ../bash-5.0-patched/lib/glob/glob_loop.c 2019-01-16 16:13:21.000000000 -= 0500 +--- lib/glob/glob_loop.c 2019-02-01 09:45:11.000000000 -0500 +*************** +*** 27,34 **** + register const GCHAR *p; + register GCHAR c; +! int bopen; + =20 + p =3D pattern; +! bopen =3D 0; + =20 + while ((c =3D *p++) !=3D L('\0')) +--- 27,34 ---- + register const GCHAR *p; + register GCHAR c; +! int bopen, bsquote; + =20 + p =3D pattern; +! bopen =3D bsquote =3D 0; + =20 + while ((c =3D *p++) !=3D L('\0')) +*************** +*** 56,66 **** + case L('\\'): + /* Don't let the pattern end in a backslash (GMATCH returns no match +! if the pattern ends in a backslash anyway), but otherwise return 1, +! since the matching engine uses backslash as an escape character +! and it can be removed. */ +! return (*p !=3D L('\0')); + } + =20 +! return 0; + } + =20 +--- 56,75 ---- + case L('\\'): + /* Don't let the pattern end in a backslash (GMATCH returns no match +! if the pattern ends in a backslash anyway), but otherwise note that=20 +! we have seen this, since the matching engine uses backslash as an +! escape character and it can be removed. We return 2 later if we +! have seen only backslash-escaped characters, so interested callers +! know they can shortcut and just dequote the pathname. */ +! if (*p !=3D L('\0')) +! { +! p++; +! bsquote =3D 1; +! continue; +! } +! else /* (*p =3D=3D L('\0')) */ +! return 0; + } + =20 +! return bsquote ? 2 : 0; + } + =20 +*** ../bash-5.0-patched/lib/glob/glob.h 2013-10-28 14:46:12.000000000 -0400 +--- lib/glob/glob.h 2019-03-07 11:06:47.000000000 -0500 +*************** +*** 31,34 **** +--- 31,35 ---- + #define GX_ADDCURDIR 0x200 /* internal -- add passed directory name */ + #define GX_GLOBSTAR 0x400 /* turn on special handling of ** */ ++ #define GX_RECURSE 0x800 /* internal -- glob_filename called recursively */ + =20 + extern int glob_pattern_p __P((const char *)); +*** ../bash-5.0-patched/lib/glob/glob.c 2018-09-20 10:53:23.000000000 -0400 +--- lib/glob/glob.c 2019-03-07 14:23:43.000000000 -0500 +*************** +*** 1062,1066 **** + unsigned int directory_len; + int free_dirname; /* flag */ +! int dflags; + =20 + result =3D (char **) malloc (sizeof (char *)); +--- 1078,1082 ---- + unsigned int directory_len; + int free_dirname; /* flag */ +! int dflags, hasglob; + =20 + result =3D (char **) malloc (sizeof (char *)); +*************** +*** 1111,1117 **** + } + =20 + /* If directory_name contains globbing characters, then we +! have to expand the previous levels. Just recurse. */ +! if (directory_len > 0 && glob_pattern_p (directory_name)) + { + char **directories, *d, *p; +--- 1127,1136 ---- + } + =20 ++ hasglob =3D 0; + /* If directory_name contains globbing characters, then we +! have to expand the previous levels. Just recurse. +! If glob_pattern_p returns !=3D [0,1] we have a pattern that has backs= lash +! quotes but no unquoted glob pattern characters. We dequote it below. = */ +! if (directory_len > 0 && (hasglob =3D glob_pattern_p (directory_name)) = =3D=3D 1) + { + char **directories, *d, *p; +*************** +*** 1176,1180 **** + d[directory_len - 1] =3D '\0'; + =20 +! directories =3D glob_filename (d, dflags); + =20 + if (free_dirname) +--- 1195,1199 ---- + d[directory_len - 1] =3D '\0'; + =20 +! directories =3D glob_filename (d, dflags|GX_RECURSE); + =20 + if (free_dirname) +*************** +*** 1333,1336 **** +--- 1352,1369 ---- + return (NULL); + } ++ /* If we have a directory name with quoted characters, and we are ++ being called recursively to glob the directory portion of a pathname, ++ we need to dequote the directory name before returning it so the ++ caller can read the directory */ ++ if (directory_len > 0 && hasglob =3D=3D 2 && (flags & GX_RECURSE) != =3D 0) ++ { ++ dequote_pathname (directory_name); ++ directory_len =3D strlen (directory_name); ++ } ++=20 ++ /* We could check whether or not the dequoted directory_name is a ++ directory and return it here, returning the original directory_name ++ if not, but we don't do that yet. I'm not sure it matters. */ ++=20 + /* Handle GX_MARKDIRS here. */ + result[0] =3D (char *) malloc (directory_len + 1); +*** ../bash-5.0-patched/pathexp.c 2018-04-29 17:44:48.000000000 -0400 +--- pathexp.c 2019-01-31 20:19:41.000000000 -0500 +*************** +*** 66,74 **** + register int c; + char *send; +! int open; + =20 + DECLARE_MBSTATE; + =20 +! open =3D 0; + send =3D string + strlen (string); + =20 +--- 66,74 ---- + register int c; + char *send; +! int open, bsquote; + =20 + DECLARE_MBSTATE; + =20 +! open =3D bsquote =3D 0; + send =3D string + strlen (string); + =20 +*************** +*** 101,105 **** + globbing. */ + case '\\': +! return (*string !=3D 0); + =20 + case CTLESC: +--- 101,112 ---- + globbing. */ + case '\\': +! if (*string !=3D '\0' && *string !=3D '/') +! { +! bsquote =3D 1; +! string++; +! continue; +! } +! else if (*string =3D=3D 0) +! return (0); + =20 + case CTLESC: +*************** +*** 118,122 **** + #endif + } +! return (0); + } + =20 +--- 125,130 ---- + #endif + } +!=20 +! return (bsquote ? 2 : 0); + } + =20 +*** ../bash-5.0-patched/bashline.c 2019-01-16 16:13:21.000000000 -0500 +--- bashline.c 2019-02-22 09:29:08.000000000 -0500 +*************** +*** 3753,3757 **** + =20 + case '\\': +! if (*string =3D=3D 0) + return (0); =20 + } +--- 3766,3770 ---- + =20 + case '\\': +! if (*string++ =3D=3D 0) + return (0); =20 + } +*** ../bash-5.0/patchlevel.h 2016-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2016-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 2 + =20 + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 3 + =20 + #endif /* _PATCHLEVEL_H_ */ diff --git a/src/patches/bash/bash50-004 b/src/patches/bash/bash50-004 new file mode 100644 index 000000000..fe3c764bd --- /dev/null +++ b/src/patches/bash/bash50-004 @@ -0,0 +1,53 @@ + BASH PATCH REPORT + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +Bash-Release: 5.0 +Patch-ID: bash50-004 + +Bug-Reported-by: Daniel Kahn Gillmor +Bug-Reference-ID: <87lg0g8aiw.fsf(a)fifthhorseman.net> +Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2019-04/msg000= 76.html + +Bug-Description: + +In bash-5.0, the `wait' builtin without arguments waits for all children of = the +shell. This includes children it `inherited' at shell invocation time. This +patch modifies the behavior to not wait for these inherited children, some +of which might be long-lived. + +Patch (apply with `patch -p0'): + +*** ../bash-5.0-patched/jobs.c 2018-12-06 11:44:34.000000000 -0500 +--- jobs.c 2019-04-12 15:15:10.000000000 -0400 +*************** +*** 2489,2496 **** + wait_procsubs (); + reap_procsubs (); +! #if 1 + /* We don't want to wait indefinitely if we have stopped children. */ +- /* XXX - should add a loop that goes through the list of process +- substitutions and waits for each proc in turn before this code. */ + if (any_stopped =3D=3D 0) + { +--- 2490,2495 ---- + wait_procsubs (); + reap_procsubs (); +! #if 0 + /* We don't want to wait indefinitely if we have stopped children. */ + if (any_stopped =3D=3D 0) + { +*** ../bash-5.0/patchlevel.h 2016-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2016-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 3 + =20 + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 4 + =20 + #endif /* _PATCHLEVEL_H_ */ diff --git a/src/patches/bash/bash50-005 b/src/patches/bash/bash50-005 new file mode 100644 index 000000000..9b1cd75b0 --- /dev/null +++ b/src/patches/bash/bash50-005 @@ -0,0 +1,110 @@ + BASH PATCH REPORT + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +Bash-Release: 5.0 +Patch-ID: bash50-005 + +Bug-Reported-by: Brad Spencer +Bug-Reference-ID: <1b993ff2-ce4f-662a-6be4-393457362e47(a)blackberry.com> +Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2019-01/msg002= 50.html + +Bug-Description: + +In certain cases, bash optimizes out a fork() call too early and prevents +traps from running. + +Patch (apply with `patch -p0'): + +*** ../bash-5.0-patched/command.h 2018-07-20 21:16:31.000000000 -0400 +--- command.h 2019-02-20 11:09:36.000000000 -0500 +*************** +*** 187,190 **** +--- 188,192 ---- + #define CMD_LASTPIPE 0x2000 + #define CMD_STDPATH 0x4000 /* use standard path for command lookup */ ++ #define CMD_TRY_OPTIMIZING 0x8000 /* try to optimize this simple command = */ + =20 + /* What a command looks like. */ +*** ../bash-5.0-patched/builtins/evalstring.c 2018-12-26 11:19:21.000000000 = -0500 +--- builtins/evalstring.c 2019-01-29 14:15:19.000000000 -0500 +*************** +*** 101,104 **** +--- 101,113 ---- + } + =20 ++ int ++ can_optimize_connection (command) ++ COMMAND *command; ++ { ++ return (*bash_input.location.string =3D=3D '\0' && ++ (command->value.Connection->connector =3D=3D AND_AND || command->value.= Connection->connector =3D=3D OR_OR || command->value.Connection->connector = =3D=3D ';') && ++ command->value.Connection->second->type =3D=3D cm_simple); ++ } ++=20 + void + optimize_fork (command) +*************** +*** 106,110 **** + { + if (command->type =3D=3D cm_connection && +! (command->value.Connection->connector =3D=3D AND_AND || command->val= ue.Connection->connector =3D=3D OR_OR) && + should_suppress_fork (command->value.Connection->second)) + { +--- 115,120 ---- + { + if (command->type =3D=3D cm_connection && +! (command->value.Connection->connector =3D=3D AND_AND || command->val= ue.Connection->connector =3D=3D OR_OR || command->value.Connection->connector= =3D=3D ';') && +! (command->value.Connection->second->flags & CMD_TRY_OPTIMIZING) && + should_suppress_fork (command->value.Connection->second)) + { +*************** +*** 413,418 **** + command->value.Simple->flags |=3D CMD_NO_FORK; + } +! else if (command->type =3D=3D cm_connection) +! optimize_fork (command); + #endif /* ONESHOT */ + =20 +--- 423,438 ---- + command->value.Simple->flags |=3D CMD_NO_FORK; + } +!=20 +! /* Can't optimize forks out here execept for simple commands. +! This knows that the parser sets up commands as left-side heavy +! (&& and || are left-associative) and after the single parse, +! if we are at the end of the command string, the last in a +! series of connection commands is +! command->value.Connection->second. */ +! else if (command->type =3D=3D cm_connection && can_optimize_connect= ion (command)) +! { +! command->value.Connection->second->flags |=3D CMD_TRY_OPTIMIZING; +! command->value.Connection->second->value.Simple->flags |=3D CMD_TRY_OP= TIMIZING; +! } + #endif /* ONESHOT */ + =20 +*** ../bash-5.0-patched/execute_cmd.c 2018-12-05 09:05:14.000000000 -0500 +--- execute_cmd.c 2019-01-25 15:59:00.000000000 -0500 +*************** +*** 2768,2771 **** +--- 2768,2773 ---- + (exec_result !=3D EXECUTION_SUCCESS))) + { ++ optimize_fork (command); ++=20 + second =3D command->value.Connection->second; + if (ignore_return && second) +*** ../bash-5.0/patchlevel.h 2016-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2016-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 4 + =20 + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 5 + =20 + #endif /* _PATCHLEVEL_H_ */ diff --git a/src/patches/bash/bash50-006 b/src/patches/bash/bash50-006 new file mode 100644 index 000000000..2ad1cd200 --- /dev/null +++ b/src/patches/bash/bash50-006 @@ -0,0 +1,47 @@ + BASH PATCH REPORT + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +Bash-Release: 5.0 +Patch-ID: bash50-006 + +Bug-Reported-by: Tomas Mozes +Bug-Reference-ID: +Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2019-03/msg000= 37.html + +Bug-Description: + +Bash-5.0 did not build successfully if SYSLOG_HISTORY was defined without +also defining SYSLOG_SHOPT. + +Patch (apply with `patch -p0'): + +*** ../bash-5.0-patched/builtins/shopt.def 2018-10-05 14:49:02.000000000 -04= 00 +--- builtins/shopt.def 2019-01-23 09:55:22.000000000 -0500 +*************** +*** 123,127 **** + #endif + =20 +! #if defined (SYSLOG_HISTORY) && defined (SYSLOG_SHOPT) + extern int syslog_history; + #endif +--- 123,127 ---- + #endif + =20 +! #if defined (SYSLOG_HISTORY) + extern int syslog_history; + #endif +*** ../bash-5.0/patchlevel.h 2016-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2016-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 5 + =20 + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 6 + =20 + #endif /* _PATCHLEVEL_H_ */ diff --git a/src/patches/bash/bash50-007 b/src/patches/bash/bash50-007 new file mode 100644 index 000000000..b9eb4150a --- /dev/null +++ b/src/patches/bash/bash50-007 @@ -0,0 +1,62 @@ + BASH PATCH REPORT + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +Bash-Release: 5.0 +Patch-ID: bash50-007 + +Bug-Reported-by: Grisha Levit +Bug-Reference-ID: +Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2019-02/msg000= 67.html + +Bug-Description: + +Running `exec' when job control was disabled, even temporarily, but after it +had been initialized, could leave the terminal in the wrong process group for +the executed process. + +Patch (apply with `patch -p0'): + +*** ../bash-5.0-patched/jobs.c 2018-12-06 11:44:34.000000000 -0500 +--- jobs.c 2019-04-12 15:15:10.000000000 -0400 +*************** +*** 4838,4850 **** + { + if (job_control) +! { +! terminate_stopped_jobs (); + =20 +! if (original_pgrp >=3D 0) +! give_terminal_to (original_pgrp, 1); +! } + =20 +! if (original_pgrp >=3D 0) +! setpgid (0, original_pgrp); + } + =20 +--- 4838,4848 ---- + { + if (job_control) +! terminate_stopped_jobs (); + =20 +! if (original_pgrp >=3D 0 && terminal_pgrp !=3D original_pgrp) +! give_terminal_to (original_pgrp, 1); + =20 +! if (original_pgrp >=3D 0 && setpgid (0, original_pgrp) =3D=3D 0) +! shell_pgrp =3D original_pgrp; + } + =20 +*** ../bash-5.0/patchlevel.h 2016-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2016-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 6 + =20 + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 7 + =20 + #endif /* _PATCHLEVEL_H_ */ diff --git a/src/patches/bash/bash50-008 b/src/patches/bash/bash50-008 new file mode 100644 index 000000000..b09d6b33a --- /dev/null +++ b/src/patches/bash/bash50-008 @@ -0,0 +1,68 @@ + BASH PATCH REPORT + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +Bash-Release: 5.0 +Patch-ID: bash50-008 + +Bug-Reported-by: Michael Albinus +Bug-Reference-ID: <87bm36k3kz.fsf(a)gmx.de> +Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2019-02/msg00= 111.html + +Bug-Description: + +When HISTSIZE is set to 0, history expansion can leave the history length +set to an incorrect value, leading to subsequent attempts to access invalid +memory. + +Patch (apply with `patch -p0'): + +*** ../bash-5.0-patched/bashhist.c 2018-07-05 22:41:14.000000000 -0400 +--- bashhist.c 2019-02-20 16:20:04.000000000 -0500 +*************** +*** 561,573 **** + if (!history_expansion_inhibited && history_expansion && history_expansi= on_p (line)) + { + /* If we are expanding the second or later line of a multi-line + command, decrease history_length so references to history expansions + in these lines refer to the previous history entry and not the + current command. */ + if (history_length > 0 && command_oriented_history && current_comman= d_first_line_saved && current_command_line_count > 1) + history_length--; + expanded =3D history_expand (line, &history_value); + if (history_length >=3D 0 && command_oriented_history && current_com= mand_first_line_saved && current_command_line_count > 1) +! history_length++; + =20 + if (expanded) +--- 561,576 ---- + if (!history_expansion_inhibited && history_expansion && history_expansi= on_p (line)) + { ++ int old_len; ++=20 + /* If we are expanding the second or later line of a multi-line + command, decrease history_length so references to history expansions + in these lines refer to the previous history entry and not the + current command. */ ++ old_len =3D history_length; + if (history_length > 0 && command_oriented_history && current_comman= d_first_line_saved && current_command_line_count > 1) + history_length--; + expanded =3D history_expand (line, &history_value); + if (history_length >=3D 0 && command_oriented_history && current_com= mand_first_line_saved && current_command_line_count > 1) +! history_length =3D old_len; + =20 + if (expanded) + +*** ../bash-5.0/patchlevel.h 2016-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2016-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 7 + =20 + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 8 + =20 + #endif /* _PATCHLEVEL_H_ */ diff --git a/src/patches/bash/bash50-009 b/src/patches/bash/bash50-009 new file mode 100644 index 000000000..aef4ce7b5 --- /dev/null +++ b/src/patches/bash/bash50-009 @@ -0,0 +1,42 @@ + BASH PATCH REPORT + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +Bash-Release: 5.0 +Patch-ID: bash50-009 + +Bug-Reported-by: chet.ramey(a)case.edu +Bug-Reference-ID: +Bug-Reference-URL: + +Bug-Description: + +The history file reading code doesn't close the file descriptor open to +the history file when it encounters a zero-length file. + +Patch (apply with `patch -p0'): + +*** ../bash-5.0-patched/lib/readline/histfile.c 2018-06-11 09:14:52.00000000= 0 -0400 +--- lib/readline/histfile.c 2019-05-16 15:55:57.000000000 -0400 +*************** +*** 306,309 **** +--- 312,316 ---- + { + free (input); ++ close (file); + return 0; /* don't waste time if we don't have to */ + } +*** ../bash-5.0/patchlevel.h 2016-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2016-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 8 + =20 + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 9 + =20 + #endif /* _PATCHLEVEL_H_ */ diff --git a/src/patches/bash/bash50-010 b/src/patches/bash/bash50-010 new file mode 100644 index 000000000..bac7aa925 --- /dev/null +++ b/src/patches/bash/bash50-010 @@ -0,0 +1,172 @@ + BASH PATCH REPORT + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +Bash-Release: 5.0 +Patch-ID: bash50-010 + +Bug-Reported-by: Thorsten Glaser +Bug-Reference-ID: <156622962831.19438.16374961114836556294.reportbug(a)tglas= e.lan.tarent.de> +Bug-Reference-URL: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=3D935115 + +Bug-Description: + +Bash-5.0 changed the way assignment statements preceding special builtins +and shell functions were handled in posix mode. They automatically created +or modified global variables instead of modifying existing local variables +as in bash-4.4. + +The bash-4.4 posix-mode semantics were buggy, and resulted in creating +local variables where they were not intended and modifying global variables +and local variables simultaneously. + +The bash-5.0 changes were intended to fix this issue, but did not preserve +enough backwards compatibility. The posix standard also changed what it +required in these cases, so bash-5.0 is not bound by the strict conformance +requirements that existed in previous issues of the standard. + +This patch modifies the bash-5.0 posix mode behavior in an effort to restore +some backwards compatibility and rationalize the behavior in the presence of +local variables. It + +1. Changes the assignment semantics to be more similar to standalone assignm= ent + statements: assignments preceding a function call or special builtin while + executing in a shell function will modify the value of a local variable + with the same name for the duration of the function's execution; + +2. Changes assignments preceding shell function calls or special builtins + from within a shell function to no longer create or modify global variabl= es + in the presence of a local variable with the same name; + +3. Assignment statements preceding a shell function call or special builtin + at the global scope continue to modify the (global) calling environment, + but are unaffected by assignments preceding function calls or special + builtins within a function, as described in item 2. This is also similar + to the behavior of a standalone assignment statement. + +Patch (apply with `patch -p0'): + +*** ../bash-5.0-patched/variables.c 2018-12-18 11:07:21.000000000 -0500 +--- variables.c 2019-08-22 10:53:44.000000000 -0400 +*************** +*** 4461,4467 **** + =20 + /* Take a variable from an assignment statement preceding a posix special +! builtin (including `return') and create a global variable from it. This +! is called from merge_temporary_env, which is only called when in posix +! mode. */ + static void + push_posix_temp_var (data) +--- 4461,4467 ---- + =20 + /* Take a variable from an assignment statement preceding a posix special +! builtin (including `return') and create a variable from it as if a +! standalone assignment statement had been performed. This is called from +! merge_temporary_env, which is only called when in posix mode. */ + static void + push_posix_temp_var (data) +*************** +*** 4473,4486 **** + var =3D (SHELL_VAR *)data; + =20 +! binding_table =3D global_variables->table; +! if (binding_table =3D=3D 0) +! binding_table =3D global_variables->table =3D hash_create (VARIABLES_H= ASH_BUCKETS); +!=20 +! v =3D bind_variable_internal (var->name, value_cell (var), binding_table= , 0, ASS_FORCE|ASS_NOLONGJMP); + =20 + /* global variables are no longer temporary and don't need propagating. = */ +! var->attributes &=3D ~(att_tempvar|att_propagate); + if (v) +! v->attributes |=3D var->attributes; + =20 + if (find_special_var (var->name) >=3D 0) +--- 4473,4497 ---- + var =3D (SHELL_VAR *)data; + =20 +! /* Just like do_assignment_internal(). This makes assignments preceding +! special builtins act like standalone assignment statements when in +! posix mode, satisfying the posix requirement that this affect the +! "current execution environment." */ +! v =3D bind_variable (var->name, value_cell (var), ASS_FORCE|ASS_NOLONGJM= P); +!=20 +! /* If this modifies an existing local variable, v->context will be non-z= ero. +! If it comes back with v->context =3D=3D 0, we bound at the global con= text. +! Set binding_table appropriately. It doesn't matter whether it's corre= ct +! if the variable is local, only that it's not global_variables->table = */ +! binding_table =3D v->context ? shell_variables->table : global_variables= ->table; + =20 + /* global variables are no longer temporary and don't need propagating. = */ +! if (binding_table =3D=3D global_variables->table) +! var->attributes &=3D ~(att_tempvar|att_propagate); +!=20 + if (v) +! { +! v->attributes |=3D var->attributes; +! v->attributes &=3D ~att_tempvar; /* not a temp var now */ +! } + =20 + if (find_special_var (var->name) >=3D 0) +*************** +*** 4576,4587 **** + { + int i; + =20 + tempvar_list =3D strvec_create (HASH_ENTRIES (temporary_env) + 1); + tempvar_list[tvlist_ind =3D 0] =3D 0; +! =20 +! hash_flush (temporary_env, pushf); +! hash_dispose (temporary_env); + temporary_env =3D (HASH_TABLE *)NULL; + =20 + tempvar_list[tvlist_ind] =3D 0; + =20 +--- 4587,4601 ---- + { + int i; ++ HASH_TABLE *disposer; + =20 + tempvar_list =3D strvec_create (HASH_ENTRIES (temporary_env) + 1); + tempvar_list[tvlist_ind =3D 0] =3D 0; +!=20 +! disposer =3D temporary_env; + temporary_env =3D (HASH_TABLE *)NULL; + =20 ++ hash_flush (disposer, pushf); ++ hash_dispose (disposer); ++=20 + tempvar_list[tvlist_ind] =3D 0; + =20 +*** ../bash-5.0-patched/tests/varenv.right 2018-12-17 15:39:48.000000000 -05= 00 +--- tests/varenv.right 2019-08-22 16:05:25.000000000 -0400 +*************** +*** 147,153 **** + outside: declare -- var=3D"one" + inside: declare -x var=3D"value" +! outside: declare -x var=3D"value" +! inside: declare -- var=3D"local" +! outside: declare -x var=3D"global" + foo=3D environment foo=3D + foo=3Dfoo environment foo=3Dfoo +--- 147,153 ---- + outside: declare -- var=3D"one" + inside: declare -x var=3D"value" +! outside: declare -- var=3D"outside" +! inside: declare -x var=3D"global" +! outside: declare -- var=3D"outside" + foo=3D environment foo=3D + foo=3Dfoo environment foo=3Dfoo +*** ../bash-5.0/patchlevel.h 2016-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2016-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 9 + =20 + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 10 + =20 + #endif /* _PATCHLEVEL_H_ */ diff --git a/src/patches/bash/bash50-011 b/src/patches/bash/bash50-011 new file mode 100644 index 000000000..a9ae690e0 --- /dev/null +++ b/src/patches/bash/bash50-011 @@ -0,0 +1,59 @@ + BASH PATCH REPORT + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D + +Bash-Release: 5.0 +Patch-ID: bash50-011 + +Bug-Reported-by: Matt Whitlock +Bug-Reference-ID:=09 +Bug-Reference-URL: https://savannah.gnu.org/support/?109671 + +Bug-Description: + +The conditional command did not perform appropriate quoted null character +removal on its arguments, causing syntax errors and attempts to stat +invalid pathnames. + +Patch (apply with `patch -p0'): + +*** ../bash-5.0-patched/subst.c 2018-12-22 17:43:37.000000000 -0500 +--- subst.c 2019-04-14 13:25:41.000000000 -0400 +*************** +*** 3626,3630 **** + SPECIAL is 2, this is an rhs argument for the =3D~ operator, and should + be quoted appropriately for regcomp/regexec. The caller is responsible +! for removing the backslashes if the unquoted word is needed later. */ = =20 + char * + cond_expand_word (w, special) +--- 3642,3648 ---- + SPECIAL is 2, this is an rhs argument for the =3D~ operator, and should + be quoted appropriately for regcomp/regexec. The caller is responsible +! for removing the backslashes if the unquoted word is needed later. In +! any case, since we don't perform word splitting, we need to do quoted +! null character removal. */ + char * + cond_expand_word (w, special) +*************** +*** 3647,3650 **** +--- 3665,3670 ---- + if (special =3D=3D 0) /* LHS */ + { ++ if (l->word) ++ word_list_remove_quoted_nulls (l); + dequote_list (l); + r =3D string_list (l); +*** ../bash-5.0/patchlevel.h 2016-06-22 14:51:03.000000000 -0400 +--- patchlevel.h 2016-10-01 11:01:28.000000000 -0400 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 10 + =20 + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + =20 +! #define PATCHLEVEL 11 + =20 + #endif /* _PATCHLEVEL_H_ */ --=20 2.16.4 --===============5974211086322843802==--