]> git.ipfire.org Git - thirdparty/bash.git/blame - trap.c
Bash-4.3 patch 7
[thirdparty/bash.git] / trap.c
CommitLineData
726f6388
JA
1/* trap.c -- Not the trap command, but useful functions for manipulating
2 those objects. The trap command is in builtins/trap.def. */
3
ac50fbac 4/* Copyright (C) 1987-2013 Free Software Foundation, Inc.
726f6388
JA
5
6 This file is part of GNU Bash, the Bourne Again SHell.
7
3185942a
JA
8 Bash is free software: you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation, either version 3 of the License, or
11 (at your option) any later version.
726f6388 12
3185942a
JA
13 Bash is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
726f6388 17
3185942a
JA
18 You should have received a copy of the GNU General Public License
19 along with Bash. If not, see <http://www.gnu.org/licenses/>.
20*/
726f6388 21
ccc6cda3
JA
22#include "config.h"
23
e8ce775d
JA
24#if defined (HAVE_UNISTD_H)
25# include <unistd.h>
26#endif
27
726f6388 28#include "bashtypes.h"
d166f048 29#include "bashansi.h"
726f6388 30
cce855bc 31#include <stdio.h>
bb70624e 32#include <errno.h>
cce855bc 33
b80f6443
JA
34#include "bashintl.h"
35
ac50fbac
CR
36#include <signal.h>
37
cce855bc
JA
38#include "trap.h"
39
726f6388 40#include "shell.h"
b80f6443 41#include "flags.h"
bb70624e 42#include "input.h" /* for save_token_state, restore_token_state */
3185942a 43#include "jobs.h"
726f6388 44#include "signames.h"
7117c2d2 45#include "builtins.h"
ccc6cda3 46#include "builtins/common.h"
7117c2d2 47#include "builtins/builtext.h"
726f6388 48
ac50fbac
CR
49#if defined (READLINE)
50# include <readline/readline.h>
51# include "bashline.h"
52#endif
53
bb70624e
JA
54#ifndef errno
55extern int errno;
56#endif
57
726f6388
JA
58/* Flags which describe the current handling state of a signal. */
59#define SIG_INHERITED 0x0 /* Value inherited from parent. */
60#define SIG_TRAPPED 0x1 /* Currently trapped. */
61#define SIG_HARD_IGNORE 0x2 /* Signal was ignored on shell entry. */
62#define SIG_SPECIAL 0x4 /* Treat this signal specially. */
63#define SIG_NO_TRAP 0x8 /* Signal cannot be trapped. */
ccc6cda3
JA
64#define SIG_INPROGRESS 0x10 /* Signal handler currently executing. */
65#define SIG_CHANGED 0x20 /* Trap value changed in trap handler. */
66#define SIG_IGNORED 0x40 /* The signal is currently being ignored. */
726f6388 67
b80f6443 68#define SPECIAL_TRAP(s) ((s) == EXIT_TRAP || (s) == DEBUG_TRAP || (s) == ERROR_TRAP || (s) == RETURN_TRAP)
f73dda09 69
726f6388 70/* An array of such flags, one for each signal, describing what the
ccc6cda3
JA
71 shell will do with a signal. DEBUG_TRAP == NSIG; some code below
72 assumes this. */
f73dda09
JA
73static int sigmodes[BASH_NSIG];
74
75static void free_trap_command __P((int));
76static void change_signal __P((int, char *));
77
b80f6443 78static int _run_trap_internal __P((int, char *));
726f6388 79
0001803f 80static void free_trap_string __P((int));
f73dda09
JA
81static void reset_signal __P((int));
82static void restore_signal __P((int));
83static void reset_or_restore_signal_handlers __P((sh_resetsig_func_t *));
726f6388
JA
84
85/* Variables used here but defined in other files. */
726f6388 86extern int last_command_exit_value;
d166f048 87extern int line_number;
726f6388 88
ac50fbac
CR
89extern int sigalrm_seen;
90extern procenv_t alrmbuf;
91
b80f6443 92extern char *this_command_name;
7117c2d2
JA
93extern sh_builtin_func_t *this_shell_builtin;
94extern procenv_t wait_intr_buf;
b80f6443
JA
95extern int return_catch_flag, return_catch_value;
96extern int subshell_level;
0001803f 97extern WORD_LIST *subst_assign_varlist;
7117c2d2 98
726f6388
JA
99/* The list of things to do originally, before we started trapping. */
100SigHandler *original_signals[NSIG];
101
102/* For each signal, a slot for a string, which is a command to be
ac50fbac 103 executed when that signal is received. The slot can also contain
726f6388
JA
104 DEFAULT_SIG, which means do whatever you were going to do before
105 you were so rudely interrupted, or IGNORE_SIG, which says ignore
106 this signal. */
f73dda09 107char *trap_list[BASH_NSIG];
726f6388
JA
108
109/* A bitmap of signals received for which we have trap handlers. */
110int pending_traps[NSIG];
111
ccc6cda3
JA
112/* Set to the number of the signal we're running the trap for + 1.
113 Used in execute_cmd.c and builtins/common.c to clean up when
114 parse_and_execute does not return normally after executing the
115 trap command (e.g., when `return' is executed in the trap command). */
116int running_trap;
117
b80f6443
JA
118/* Set to last_command_exit_value before running a trap. */
119int trap_saved_exit_value;
d166f048 120
7117c2d2
JA
121/* The (trapped) signal received while executing in the `wait' builtin */
122int wait_signal_received;
123
ac50fbac
CR
124int trapped_signal_received;
125
0628567a
JA
126#define GETORIGSIG(sig) \
127 do { \
128 original_signals[sig] = (SigHandler *)set_signal_handler (sig, SIG_DFL); \
129 set_signal_handler (sig, original_signals[sig]); \
130 if (original_signals[sig] == SIG_IGN) \
131 sigmodes[sig] |= SIG_HARD_IGNORE; \
132 } while (0)
133
495aee44
CR
134#define SETORIGSIG(sig,handler) \
135 do { \
136 original_signals[sig] = handler; \
137 if (original_signals[sig] == SIG_IGN) \
138 sigmodes[sig] |= SIG_HARD_IGNORE; \
139 } while (0)
140
0628567a
JA
141#define GET_ORIGINAL_SIGNAL(sig) \
142 if (sig && sig < NSIG && original_signals[sig] == IMPOSSIBLE_TRAP_HANDLER) \
143 GETORIGSIG(sig)
144
726f6388
JA
145void
146initialize_traps ()
147{
148 register int i;
149
0628567a
JA
150 initialize_signames();
151
b80f6443
JA
152 trap_list[EXIT_TRAP] = trap_list[DEBUG_TRAP] = trap_list[ERROR_TRAP] = trap_list[RETURN_TRAP] = (char *)NULL;
153 sigmodes[EXIT_TRAP] = sigmodes[DEBUG_TRAP] = sigmodes[ERROR_TRAP] = sigmodes[RETURN_TRAP] = SIG_INHERITED;
ccc6cda3 154 original_signals[EXIT_TRAP] = IMPOSSIBLE_TRAP_HANDLER;
726f6388
JA
155
156 for (i = 1; i < NSIG; i++)
157 {
158 pending_traps[i] = 0;
159 trap_list[i] = (char *)DEFAULT_SIG;
495aee44 160 sigmodes[i] = SIG_INHERITED; /* XXX - only set, not used */
726f6388
JA
161 original_signals[i] = IMPOSSIBLE_TRAP_HANDLER;
162 }
163
164 /* Show which signals are treated specially by the shell. */
165#if defined (SIGCHLD)
0628567a 166 GETORIGSIG (SIGCHLD);
726f6388
JA
167 sigmodes[SIGCHLD] |= (SIG_SPECIAL | SIG_NO_TRAP);
168#endif /* SIGCHLD */
169
0628567a 170 GETORIGSIG (SIGINT);
726f6388
JA
171 sigmodes[SIGINT] |= SIG_SPECIAL;
172
b72432fd
JA
173#if defined (__BEOS__)
174 /* BeOS sets SIGINT to SIG_IGN! */
175 original_signals[SIGINT] = SIG_DFL;
0628567a 176 sigmodes[SIGINT] &= ~SIG_HARD_IGNORE;
b72432fd
JA
177#endif
178
0628567a 179 GETORIGSIG (SIGQUIT);
726f6388
JA
180 sigmodes[SIGQUIT] |= SIG_SPECIAL;
181
182 if (interactive)
183 {
0628567a 184 GETORIGSIG (SIGTERM);
726f6388
JA
185 sigmodes[SIGTERM] |= SIG_SPECIAL;
186 }
187}
188
ac50fbac 189#ifdef DEBUG
bb70624e
JA
190/* Return a printable representation of the trap handler for SIG. */
191static char *
192trap_handler_string (sig)
193 int sig;
194{
195 if (trap_list[sig] == (char *)DEFAULT_SIG)
196 return "DEFAULT_SIG";
197 else if (trap_list[sig] == (char *)IGNORE_SIG)
198 return "IGNORE_SIG";
199 else if (trap_list[sig] == (char *)IMPOSSIBLE_TRAP_HANDLER)
200 return "IMPOSSIBLE_TRAP_HANDLER";
201 else if (trap_list[sig])
202 return trap_list[sig];
203 else
204 return "NULL";
205}
206#endif
207
726f6388
JA
208/* Return the print name of this signal. */
209char *
210signal_name (sig)
211 int sig;
212{
cce855bc
JA
213 char *ret;
214
215 /* on cygwin32, signal_names[sig] could be null */
b80f6443
JA
216 ret = (sig >= BASH_NSIG || sig < 0 || signal_names[sig] == NULL)
217 ? _("invalid signal number")
218 : signal_names[sig];
219
cce855bc 220 return ret;
726f6388
JA
221}
222
223/* Turn a string into a signal number, or a number into
224 a signal number. If STRING is "2", "SIGINT", or "INT",
225 then (int)2 is returned. Return NO_SIG if STRING doesn't
226 contain a valid signal descriptor. */
227int
b80f6443 228decode_signal (string, flags)
726f6388 229 char *string;
b80f6443 230 int flags;
726f6388 231{
7117c2d2 232 intmax_t sig;
b80f6443 233 char *name;
726f6388 234
ccc6cda3 235 if (legal_number (string, &sig))
f73dda09 236 return ((sig >= 0 && sig < NSIG) ? (int)sig : NO_SIG);
726f6388 237
e8ce775d 238 /* A leading `SIG' may be omitted. */
f73dda09 239 for (sig = 0; sig < BASH_NSIG; sig++)
b72432fd 240 {
b80f6443
JA
241 name = signal_names[sig];
242 if (name == 0 || name[0] == '\0')
b72432fd 243 continue;
b80f6443 244
ac50fbac 245 /* Check name without the SIG prefix first case sensitively or
b80f6443
JA
246 insensitively depending on whether flags includes DSIG_NOCASE */
247 if (STREQN (name, "SIG", 3))
248 {
249 name += 3;
250
251 if ((flags & DSIG_NOCASE) && strcasecmp (string, name) == 0)
252 return ((int)sig);
253 else if ((flags & DSIG_NOCASE) == 0 && strcmp (string, name) == 0)
254 return ((int)sig);
255 /* If we can't use the `SIG' prefix to match, punt on this
256 name now. */
257 else if ((flags & DSIG_SIGPREFIX) == 0)
258 continue;
259 }
260
261 /* Check name with SIG prefix case sensitively or insensitively
262 depending on whether flags includes DSIG_NOCASE */
263 name = signal_names[sig];
264 if ((flags & DSIG_NOCASE) && strcasecmp (string, name) == 0)
265 return ((int)sig);
266 else if ((flags & DSIG_NOCASE) == 0 && strcmp (string, name) == 0)
b72432fd
JA
267 return ((int)sig);
268 }
726f6388
JA
269
270 return (NO_SIG);
271}
272
273/* Non-zero when we catch a trapped signal. */
ccc6cda3 274static int catch_flag;
726f6388
JA
275
276void
277run_pending_traps ()
278{
279 register int sig;
ac50fbac 280 int old_exit_value;
0001803f 281 WORD_LIST *save_subst_varlist;
ac50fbac 282 sh_parser_state_t pstate;
495aee44
CR
283#if defined (ARRAY_VARS)
284 ARRAY *ps;
285#endif
726f6388
JA
286
287 if (catch_flag == 0) /* simple optimization */
288 return;
289
ac50fbac
CR
290 if (running_trap > 0)
291 {
292#if defined (DEBUG)
293 internal_warning ("run_pending_traps: recursive invocation while running trap for signal %d", running_trap-1);
294#endif
295#if 0
296 return; /* no recursive trap invocations */
297#else
298 ;
299#endif
300 }
301
302 catch_flag = trapped_signal_received = 0;
726f6388
JA
303
304 /* Preserve $? when running trap. */
305 old_exit_value = last_command_exit_value;
495aee44
CR
306#if defined (ARRAY_VARS)
307 ps = save_pipestatus_array ();
308#endif
726f6388
JA
309
310 for (sig = 1; sig < NSIG; sig++)
311 {
312 /* XXX this could be made into a counter by using
28ef6c31 313 while (pending_traps[sig]--) instead of the if statement. */
726f6388
JA
314 if (pending_traps[sig])
315 {
ac50fbac
CR
316 if (running_trap == sig+1)
317 /*continue*/;
726f6388 318
ac50fbac 319 running_trap = sig + 1;
726f6388
JA
320
321 if (sig == SIGINT)
322 {
ac50fbac 323 pending_traps[sig] = 0; /* XXX */
726f6388 324 run_interrupt_trap ();
ccc6cda3 325 CLRINTERRUPT;
726f6388 326 }
3185942a
JA
327#if defined (JOB_CONTROL) && defined (SIGCHLD)
328 else if (sig == SIGCHLD &&
329 trap_list[SIGCHLD] != (char *)IMPOSSIBLE_TRAP_HANDLER &&
330 (sigmodes[SIGCHLD] & SIG_INPROGRESS) == 0)
331 {
ac50fbac 332 sigmodes[SIGCHLD] |= SIG_INPROGRESS;
3185942a 333 run_sigchld_trap (pending_traps[sig]); /* use as counter */
ac50fbac
CR
334 sigmodes[SIGCHLD] &= ~SIG_INPROGRESS;
335 }
336 else if (sig == SIGCHLD &&
337 trap_list[SIGCHLD] == (char *)IMPOSSIBLE_TRAP_HANDLER &&
338 (sigmodes[SIGCHLD] & SIG_INPROGRESS) != 0)
339 {
340 /* This can happen when run_pending_traps is called while
341 running a SIGCHLD trap handler. */
342 running_trap = 0;
343 /* want to leave pending_traps[SIGCHLD] alone here */
344 continue; /* XXX */
345 }
346 else if (sig == SIGCHLD && (sigmodes[SIGCHLD] & SIG_INPROGRESS))
347 {
348 /* whoops -- print warning? */
349 running_trap = 0; /* XXX */
350 /* want to leave pending_traps[SIGCHLD] alone here */
351 continue;
3185942a
JA
352 }
353#endif
bb70624e
JA
354 else if (trap_list[sig] == (char *)DEFAULT_SIG ||
355 trap_list[sig] == (char *)IGNORE_SIG ||
356 trap_list[sig] == (char *)IMPOSSIBLE_TRAP_HANDLER)
357 {
358 /* This is possible due to a race condition. Say a bash
359 process has SIGTERM trapped. A subshell is spawned
360 using { list; } & and the parent does something and kills
361 the subshell with SIGTERM. It's possible for the subshell
362 to set pending_traps[SIGTERM] to 1 before the code in
363 execute_cmd.c eventually calls restore_original_signals
364 to reset the SIGTERM signal handler in the subshell. The
365 next time run_pending_traps is called, pending_traps[SIGTERM]
366 will be 1, but the trap handler in trap_list[SIGTERM] will
367 be invalid (probably DEFAULT_SIG, but it could be IGNORE_SIG).
368 Unless we catch this, the subshell will dump core when
369 trap_list[SIGTERM] == DEFAULT_SIG, because DEFAULT_SIG is
370 usually 0x0. */
b80f6443 371 internal_warning (_("run_pending_traps: bad value in trap_list[%d]: %p"),
f73dda09 372 sig, trap_list[sig]);
bb70624e
JA
373 if (trap_list[sig] == (char *)DEFAULT_SIG)
374 {
b80f6443 375 internal_warning (_("run_pending_traps: signal handler is SIG_DFL, resending %d (%s) to myself"), sig, signal_name (sig));
bb70624e
JA
376 kill (getpid (), sig);
377 }
378 }
726f6388 379 else
bb70624e 380 {
ac50fbac
CR
381 /* XXX - should we use save_parser_state/restore_parser_state? */
382 save_parser_state (&pstate);
0001803f
CR
383 save_subst_varlist = subst_assign_varlist;
384 subst_assign_varlist = 0;
385
ac50fbac
CR
386#if defined (JOB_CONTROL)
387 save_pipeline (1); /* XXX only provides one save level */
388#endif
389 /* XXX - set pending_traps[sig] = 0 here? */
390 pending_traps[sig] = 0;
391 evalstring (savestring (trap_list[sig]), "trap", SEVAL_NONINT|SEVAL_NOHIST|SEVAL_RESETLINE);
392#if defined (JOB_CONTROL)
393 restore_pipeline (1);
394#endif
0001803f
CR
395
396 subst_assign_varlist = save_subst_varlist;
ac50fbac 397 restore_parser_state (&pstate);
bb70624e 398 }
726f6388 399
ac50fbac
CR
400 pending_traps[sig] = 0; /* XXX - move before evalstring? */
401 running_trap = 0;
726f6388
JA
402 }
403 }
404
495aee44
CR
405#if defined (ARRAY_VARS)
406 restore_pipestatus_array (ps);
407#endif
726f6388
JA
408 last_command_exit_value = old_exit_value;
409}
410
411sighandler
412trap_handler (sig)
413 int sig;
414{
bb70624e
JA
415 int oerrno;
416
3185942a
JA
417 if ((sigmodes[sig] & SIG_TRAPPED) == 0)
418 {
419#if defined (DEBUG)
420 internal_warning ("trap_handler: signal %d: signal not trapped", sig);
421#endif
422 SIGRETURN (0);
423 }
424
726f6388
JA
425 if ((sig >= NSIG) ||
426 (trap_list[sig] == (char *)DEFAULT_SIG) ||
427 (trap_list[sig] == (char *)IGNORE_SIG))
b80f6443 428 programming_error (_("trap_handler: bad signal %d"), sig);
726f6388
JA
429 else
430 {
28ef6c31 431 oerrno = errno;
ccc6cda3 432#if defined (MUST_REINSTALL_SIGHANDLERS)
3185942a
JA
433# if defined (JOB_CONTROL) && defined (SIGCHLD)
434 if (sig != SIGCHLD)
435# endif /* JOB_CONTROL && SIGCHLD */
726f6388 436 set_signal_handler (sig, trap_handler);
ccc6cda3 437#endif /* MUST_REINSTALL_SIGHANDLERS */
726f6388
JA
438
439 catch_flag = 1;
440 pending_traps[sig]++;
441
ac50fbac
CR
442 trapped_signal_received = sig;
443
444 if (this_shell_builtin && (this_shell_builtin == wait_builtin))
7117c2d2
JA
445 {
446 wait_signal_received = sig;
ac50fbac
CR
447 if (interrupt_immediately)
448 longjmp (wait_intr_buf, 1);
7117c2d2
JA
449 }
450
ac50fbac
CR
451#if defined (READLINE)
452 /* Set the event hook so readline will call it after the signal handlers
453 finish executing, so if this interrupted character input we can get
454 quick response. */
455 if (RL_ISSTATE (RL_STATE_SIGHANDLER) && interrupt_immediately == 0)
456 bashline_set_event_hook ();
457#endif
458
726f6388
JA
459 if (interrupt_immediately)
460 run_pending_traps ();
bb70624e
JA
461
462 errno = oerrno;
726f6388 463 }
ccc6cda3
JA
464
465 SIGRETURN (0);
726f6388
JA
466}
467
ac50fbac
CR
468int
469first_pending_trap ()
470{
471 register int i;
472
473 for (i = 1; i < NSIG; i++)
474 if (pending_traps[i])
475 return i;
476 return -1;
477}
478
479int
480any_signals_trapped ()
481{
482 register int i;
483
484 for (i = 1; i < NSIG; i++)
485 if (sigmodes[i] & SIG_TRAPPED)
486 return i;
487 return -1;
488}
489
490void
491check_signals ()
492{
493 CHECK_ALRM; /* set by the read builtin */
494 QUIT;
495}
496
497/* Convenience functions the rest of the shell can use */
498void
499check_signals_and_traps ()
500{
501 check_signals ();
502
503 run_pending_traps ();
504}
505
726f6388 506#if defined (JOB_CONTROL) && defined (SIGCHLD)
cce855bc
JA
507
508#ifdef INCLUDE_UNUSED
726f6388
JA
509/* Make COMMAND_STRING be executed when SIGCHLD is caught. */
510void
511set_sigchld_trap (command_string)
512 char *command_string;
513{
726f6388
JA
514 set_signal (SIGCHLD, command_string);
515}
cce855bc 516#endif
726f6388 517
95732b49 518/* Make COMMAND_STRING be executed when SIGCHLD is caught iff SIGCHLD
3185942a
JA
519 is not already trapped. IMPOSSIBLE_TRAP_HANDLER is used as a sentinel
520 to make sure that a SIGCHLD trap handler run via run_sigchld_trap can
521 reset the disposition to the default and not have the original signal
522 accidentally restored, undoing the user's command. */
726f6388
JA
523void
524maybe_set_sigchld_trap (command_string)
525 char *command_string;
526{
3185942a 527 if ((sigmodes[SIGCHLD] & SIG_TRAPPED) == 0 && trap_list[SIGCHLD] == (char *)IMPOSSIBLE_TRAP_HANDLER)
726f6388
JA
528 set_signal (SIGCHLD, command_string);
529}
3185942a
JA
530
531/* Temporarily set the SIGCHLD trap string to IMPOSSIBLE_TRAP_HANDLER. Used
532 as a sentinel in run_sigchld_trap and maybe_set_sigchld_trap to see whether
533 or not a SIGCHLD trap handler reset SIGCHLD disposition to the default. */
534void
535set_impossible_sigchld_trap ()
536{
537 restore_default_signal (SIGCHLD);
538 change_signal (SIGCHLD, (char *)IMPOSSIBLE_TRAP_HANDLER);
539 sigmodes[SIGCHLD] &= ~SIG_TRAPPED; /* maybe_set_sigchld_trap checks this */
540}
ac50fbac
CR
541
542/* Act as if we received SIGCHLD NCHILD times and increment
543 pending_traps[SIGCHLD] by that amount. This allows us to still run the
544 SIGCHLD trap once for each exited child. */
545void
546queue_sigchld_trap (nchild)
547 int nchild;
548{
549 if (nchild > 0)
550 {
551 catch_flag = 1;
552 pending_traps[SIGCHLD] += nchild;
553 trapped_signal_received = SIGCHLD;
554 }
555}
726f6388
JA
556#endif /* JOB_CONTROL && SIGCHLD */
557
ccc6cda3
JA
558void
559set_debug_trap (command)
726f6388
JA
560 char *command;
561{
ccc6cda3
JA
562 set_signal (DEBUG_TRAP, command);
563}
726f6388 564
f73dda09
JA
565void
566set_error_trap (command)
567 char *command;
568{
569 set_signal (ERROR_TRAP, command);
570}
571
b80f6443
JA
572void
573set_return_trap (command)
574 char *command;
575{
576 set_signal (RETURN_TRAP, command);
577}
578
cce855bc 579#ifdef INCLUDE_UNUSED
ccc6cda3
JA
580void
581set_sigint_trap (command)
582 char *command;
583{
726f6388
JA
584 set_signal (SIGINT, command);
585}
cce855bc 586#endif
726f6388
JA
587
588/* Reset the SIGINT handler so that subshells that are doing `shellsy'
589 things, like waiting for command substitution or executing commands
590 in explicit subshells ( ( cmd ) ), can catch interrupts properly. */
591SigHandler *
592set_sigint_handler ()
593{
594 if (sigmodes[SIGINT] & SIG_HARD_IGNORE)
595 return ((SigHandler *)SIG_IGN);
596
597 else if (sigmodes[SIGINT] & SIG_IGNORED)
ccc6cda3
JA
598 return ((SigHandler *)set_signal_handler (SIGINT, SIG_IGN)); /* XXX */
599
726f6388
JA
600 else if (sigmodes[SIGINT] & SIG_TRAPPED)
601 return ((SigHandler *)set_signal_handler (SIGINT, trap_handler));
602
603 /* The signal is not trapped, so set the handler to the shell's special
604 interrupt handler. */
605 else if (interactive) /* XXX - was interactive_shell */
606 return (set_signal_handler (SIGINT, sigint_sighandler));
607 else
0628567a 608 return (set_signal_handler (SIGINT, termsig_sighandler));
726f6388
JA
609}
610
e8ce775d
JA
611/* Return the correct handler for signal SIG according to the values in
612 sigmodes[SIG]. */
613SigHandler *
614trap_to_sighandler (sig)
615 int sig;
616{
617 if (sigmodes[sig] & (SIG_IGNORED|SIG_HARD_IGNORE))
618 return (SIG_IGN);
619 else if (sigmodes[sig] & SIG_TRAPPED)
620 return (trap_handler);
621 else
622 return (SIG_DFL);
623}
624
726f6388
JA
625/* Set SIG to call STRING as a command. */
626void
627set_signal (sig, string)
628 int sig;
629 char *string;
630{
ac50fbac
CR
631 sigset_t set, oset;
632
f73dda09 633 if (SPECIAL_TRAP (sig))
ccc6cda3
JA
634 {
635 change_signal (sig, savestring (string));
d166f048
JA
636 if (sig == EXIT_TRAP && interactive == 0)
637 initialize_terminating_signals ();
ccc6cda3
JA
638 return;
639 }
640
726f6388
JA
641 /* A signal ignored on entry to the shell cannot be trapped or reset, but
642 no error is reported when attempting to do so. -- Posix.2 */
643 if (sigmodes[sig] & SIG_HARD_IGNORE)
644 return;
645
646 /* Make sure we have original_signals[sig] if the signal has not yet
647 been trapped. */
648 if ((sigmodes[sig] & SIG_TRAPPED) == 0)
649 {
650 /* If we aren't sure of the original value, check it. */
651 if (original_signals[sig] == IMPOSSIBLE_TRAP_HANDLER)
0628567a 652 GETORIGSIG (sig);
726f6388 653 if (original_signals[sig] == SIG_IGN)
0628567a 654 return;
726f6388
JA
655 }
656
657 /* Only change the system signal handler if SIG_NO_TRAP is not set.
658 The trap command string is changed in either case. The shell signal
659 handlers for SIGINT and SIGCHLD run the user specified traps in an
660 environment in which it is safe to do so. */
661 if ((sigmodes[sig] & SIG_NO_TRAP) == 0)
662 {
ac50fbac 663 BLOCK_SIGNAL (sig, set, oset);
726f6388
JA
664 change_signal (sig, savestring (string));
665 set_signal_handler (sig, trap_handler);
ac50fbac 666 UNBLOCK_SIGNAL (oset);
726f6388
JA
667 }
668 else
669 change_signal (sig, savestring (string));
670}
671
672static void
673free_trap_command (sig)
674 int sig;
675{
676 if ((sigmodes[sig] & SIG_TRAPPED) && trap_list[sig] &&
677 (trap_list[sig] != (char *)IGNORE_SIG) &&
678 (trap_list[sig] != (char *)DEFAULT_SIG) &&
679 (trap_list[sig] != (char *)IMPOSSIBLE_TRAP_HANDLER))
680 free (trap_list[sig]);
681}
ccc6cda3 682
726f6388
JA
683/* If SIG has a string assigned to it, get rid of it. Then give it
684 VALUE. */
685static void
686change_signal (sig, value)
687 int sig;
688 char *value;
689{
d166f048
JA
690 if ((sigmodes[sig] & SIG_INPROGRESS) == 0)
691 free_trap_command (sig);
726f6388
JA
692 trap_list[sig] = value;
693
694 sigmodes[sig] |= SIG_TRAPPED;
695 if (value == (char *)IGNORE_SIG)
696 sigmodes[sig] |= SIG_IGNORED;
697 else
698 sigmodes[sig] &= ~SIG_IGNORED;
699 if (sigmodes[sig] & SIG_INPROGRESS)
700 sigmodes[sig] |= SIG_CHANGED;
701}
702
ac50fbac 703void
726f6388
JA
704get_original_signal (sig)
705 int sig;
706{
707 /* If we aren't sure the of the original value, then get it. */
0001803f 708 if (sig > 0 && sig < NSIG && original_signals[sig] == (SigHandler *)IMPOSSIBLE_TRAP_HANDLER)
0628567a 709 GETORIGSIG (sig);
726f6388
JA
710}
711
495aee44
CR
712void
713get_all_original_signals ()
714{
715 register int i;
716
717 for (i = 1; i < NSIG; i++)
718 GET_ORIGINAL_SIGNAL (i);
719}
720
721void
722set_original_signal (sig, handler)
723 int sig;
724 SigHandler *handler;
725{
726 if (sig > 0 && sig < NSIG && original_signals[sig] == (SigHandler *)IMPOSSIBLE_TRAP_HANDLER)
727 SETORIGSIG (sig, handler);
728}
729
726f6388
JA
730/* Restore the default action for SIG; i.e., the action the shell
731 would have taken before you used the trap command. This is called
732 from trap_builtin (), which takes care to restore the handlers for
733 the signals the shell treats specially. */
734void
735restore_default_signal (sig)
736 int sig;
737{
f73dda09 738 if (SPECIAL_TRAP (sig))
726f6388 739 {
b80f6443
JA
740 if ((sig != DEBUG_TRAP && sig != ERROR_TRAP && sig != RETURN_TRAP) ||
741 (sigmodes[sig] & SIG_INPROGRESS) == 0)
d166f048 742 free_trap_command (sig);
726f6388
JA
743 trap_list[sig] = (char *)NULL;
744 sigmodes[sig] &= ~SIG_TRAPPED;
d166f048
JA
745 if (sigmodes[sig] & SIG_INPROGRESS)
746 sigmodes[sig] |= SIG_CHANGED;
726f6388
JA
747 return;
748 }
749
750 GET_ORIGINAL_SIGNAL (sig);
751
752 /* A signal ignored on entry to the shell cannot be trapped or reset, but
753 no error is reported when attempting to do so. Thanks Posix.2. */
754 if (sigmodes[sig] & SIG_HARD_IGNORE)
755 return;
756
757 /* If we aren't trapping this signal, don't bother doing anything else. */
ac50fbac
CR
758 /* We special-case SIGCHLD and IMPOSSIBLE_TRAP_HANDLER (see above) as a
759 sentinel to determine whether or not disposition is reset to the default
760 while the trap handler is executing. */
761 if (((sigmodes[sig] & SIG_TRAPPED) == 0) &&
762 (sig != SIGCHLD || (sigmodes[sig] & SIG_INPROGRESS) == 0 || trap_list[sig] != (char *)IMPOSSIBLE_TRAP_HANDLER))
726f6388
JA
763 return;
764
765 /* Only change the signal handler for SIG if it allows it. */
ccc6cda3 766 if ((sigmodes[sig] & SIG_NO_TRAP) == 0)
726f6388
JA
767 set_signal_handler (sig, original_signals[sig]);
768
769 /* Change the trap command in either case. */
770 change_signal (sig, (char *)DEFAULT_SIG);
771
772 /* Mark the signal as no longer trapped. */
773 sigmodes[sig] &= ~SIG_TRAPPED;
774}
775
776/* Make this signal be ignored. */
777void
778ignore_signal (sig)
779 int sig;
780{
f73dda09 781 if (SPECIAL_TRAP (sig) && ((sigmodes[sig] & SIG_IGNORED) == 0))
ccc6cda3
JA
782 {
783 change_signal (sig, (char *)IGNORE_SIG);
784 return;
785 }
786
726f6388
JA
787 GET_ORIGINAL_SIGNAL (sig);
788
789 /* A signal ignored on entry to the shell cannot be trapped or reset.
ccc6cda3 790 No error is reported when the user attempts to do so. */
726f6388
JA
791 if (sigmodes[sig] & SIG_HARD_IGNORE)
792 return;
793
794 /* If already trapped and ignored, no change necessary. */
ccc6cda3 795 if (sigmodes[sig] & SIG_IGNORED)
726f6388
JA
796 return;
797
798 /* Only change the signal handler for SIG if it allows it. */
ccc6cda3 799 if ((sigmodes[sig] & SIG_NO_TRAP) == 0)
726f6388
JA
800 set_signal_handler (sig, SIG_IGN);
801
802 /* Change the trap command in either case. */
803 change_signal (sig, (char *)IGNORE_SIG);
804}
805
806/* Handle the calling of "trap 0". The only sticky situation is when
807 the command to be executed includes an "exit". This is why we have
808 to provide our own place for top_level to jump to. */
809int
810run_exit_trap ()
811{
ccc6cda3 812 char *trap_command;
b80f6443 813 int code, function_code, retval;
495aee44
CR
814#if defined (ARRAY_VARS)
815 ARRAY *ps;
816#endif
726f6388 817
b80f6443 818 trap_saved_exit_value = last_command_exit_value;
495aee44
CR
819#if defined (ARRAY_VARS)
820 ps = save_pipestatus_array ();
821#endif
b80f6443 822 function_code = 0;
726f6388 823
ccc6cda3
JA
824 /* Run the trap only if signal 0 is trapped and not ignored, and we are not
825 currently running in the trap handler (call to exit in the list of
826 commands given to trap 0). */
827 if ((sigmodes[EXIT_TRAP] & SIG_TRAPPED) &&
828 (sigmodes[EXIT_TRAP] & (SIG_IGNORED|SIG_INPROGRESS)) == 0)
726f6388 829 {
ccc6cda3
JA
830 trap_command = savestring (trap_list[EXIT_TRAP]);
831 sigmodes[EXIT_TRAP] &= ~SIG_TRAPPED;
832 sigmodes[EXIT_TRAP] |= SIG_INPROGRESS;
726f6388 833
b80f6443
JA
834 retval = trap_saved_exit_value;
835 running_trap = 1;
836
ac50fbac 837 code = setjmp_nosigs (top_level);
726f6388 838
b80f6443
JA
839 /* If we're in a function, make sure return longjmps come here, too. */
840 if (return_catch_flag)
ac50fbac 841 function_code = setjmp_nosigs (return_catch);
b80f6443
JA
842
843 if (code == 0 && function_code == 0)
cce855bc
JA
844 {
845 reset_parser ();
17345e5a 846 parse_and_execute (trap_command, "exit trap", SEVAL_NONINT|SEVAL_NOHIST|SEVAL_RESETLINE);
cce855bc 847 }
b80f6443
JA
848 else if (code == ERREXIT)
849 retval = last_command_exit_value;
726f6388 850 else if (code == EXITPROG)
b80f6443
JA
851 retval = last_command_exit_value;
852 else if (function_code != 0)
853 retval = return_catch_value;
726f6388 854 else
b80f6443
JA
855 retval = trap_saved_exit_value;
856
857 running_trap = 0;
858 return retval;
726f6388
JA
859 }
860
495aee44
CR
861#if defined (ARRAY_VARS)
862 restore_pipestatus_array (ps);
863#endif
b80f6443 864 return (trap_saved_exit_value);
726f6388
JA
865}
866
ccc6cda3
JA
867void
868run_trap_cleanup (sig)
869 int sig;
870{
871 sigmodes[sig] &= ~(SIG_INPROGRESS|SIG_CHANGED);
872}
873
ac50fbac
CR
874#define RECURSIVE_SIG(s) (SPECIAL_TRAP(s) == 0)
875
ccc6cda3 876/* Run a trap command for SIG. SIG is one of the signals the shell treats
b80f6443
JA
877 specially. Returns the exit status of the executed trap command list. */
878static int
ccc6cda3 879_run_trap_internal (sig, tag)
726f6388 880 int sig;
ccc6cda3 881 char *tag;
726f6388 882{
ccc6cda3 883 char *trap_command, *old_trap;
b80f6443 884 int trap_exit_value, *token_state;
ac50fbac
CR
885 volatile int save_return_catch_flag, function_code;
886 int flags;
b80f6443 887 procenv_t save_return_catch;
0001803f 888 WORD_LIST *save_subst_varlist;
ac50fbac 889 sh_parser_state_t pstate;
495aee44
CR
890#if defined (ARRAY_VARS)
891 ARRAY *ps;
892#endif
ccc6cda3 893
b80f6443 894 trap_exit_value = function_code = 0;
ccc6cda3
JA
895 /* Run the trap only if SIG is trapped and not ignored, and we are not
896 currently executing in the trap handler. */
897 if ((sigmodes[sig] & SIG_TRAPPED) && ((sigmodes[sig] & SIG_IGNORED) == 0) &&
898 (trap_list[sig] != (char *)IMPOSSIBLE_TRAP_HANDLER) &&
ac50fbac
CR
899#if 0
900 /* Uncomment this to allow some special signals to recursively execute
901 trap handlers. */
902 (RECURSIVE_SIG (sig) || (sigmodes[sig] & SIG_INPROGRESS) == 0))
903#else
ccc6cda3 904 ((sigmodes[sig] & SIG_INPROGRESS) == 0))
ac50fbac 905#endif
ccc6cda3
JA
906 {
907 old_trap = trap_list[sig];
908 sigmodes[sig] |= SIG_INPROGRESS;
909 sigmodes[sig] &= ~SIG_CHANGED; /* just to be sure */
910 trap_command = savestring (old_trap);
911
912 running_trap = sig + 1;
ac50fbac 913
495aee44
CR
914#if defined (ARRAY_VARS)
915 ps = save_pipestatus_array ();
916#endif
bb70624e 917
ac50fbac 918 save_parser_state (&pstate);
0001803f
CR
919 save_subst_varlist = subst_assign_varlist;
920 subst_assign_varlist = 0;
b80f6443 921
ac50fbac 922#if defined (JOB_CONTROL)
7f89f4cd
CR
923 if (sig != DEBUG_TRAP) /* run_debug_trap does this */
924 save_pipeline (1); /* XXX only provides one save level */
ac50fbac
CR
925#endif
926
b80f6443
JA
927 /* If we're in a function, make sure return longjmps come here, too. */
928 save_return_catch_flag = return_catch_flag;
929 if (return_catch_flag)
930 {
931 COPY_PROCENV (return_catch, save_return_catch);
ac50fbac 932 function_code = setjmp_nosigs (return_catch);
b80f6443
JA
933 }
934
17345e5a 935 flags = SEVAL_NONINT|SEVAL_NOHIST;
89a92869 936 if (sig != DEBUG_TRAP && sig != RETURN_TRAP && sig != ERROR_TRAP)
17345e5a 937 flags |= SEVAL_RESETLINE;
b80f6443 938 if (function_code == 0)
17345e5a 939 parse_and_execute (trap_command, tag, flags);
b80f6443 940
ac50fbac
CR
941 trap_exit_value = last_command_exit_value;
942
943#if defined (JOB_CONTROL)
7f89f4cd
CR
944 if (sig != DEBUG_TRAP) /* run_debug_trap does this */
945 restore_pipeline (1);
ac50fbac 946#endif
bb70624e 947
0001803f 948 subst_assign_varlist = save_subst_varlist;
ac50fbac 949 restore_parser_state (&pstate);
0001803f 950
495aee44
CR
951#if defined (ARRAY_VARS)
952 restore_pipestatus_array (ps);
953#endif
ccc6cda3
JA
954 running_trap = 0;
955
956 sigmodes[sig] &= ~SIG_INPROGRESS;
957
958 if (sigmodes[sig] & SIG_CHANGED)
959 {
b80f6443
JA
960#if 0
961 /* Special traps like EXIT, DEBUG, RETURN are handled explicitly in
962 the places where they can be changed using unwind-protects. For
963 example, look at execute_cmd.c:execute_function(). */
964 if (SPECIAL_TRAP (sig) == 0)
965#endif
966 free (old_trap);
ccc6cda3
JA
967 sigmodes[sig] &= ~SIG_CHANGED;
968 }
b80f6443
JA
969
970 if (save_return_catch_flag)
971 {
972 return_catch_flag = save_return_catch_flag;
973 return_catch_value = trap_exit_value;
974 COPY_PROCENV (save_return_catch, return_catch);
975 if (function_code)
976 longjmp (return_catch, 1);
977 }
ccc6cda3 978 }
b80f6443
JA
979
980 return trap_exit_value;
ccc6cda3
JA
981}
982
b80f6443 983int
ccc6cda3
JA
984run_debug_trap ()
985{
b80f6443 986 int trap_exit_value;
89a92869
CR
987 pid_t save_pgrp;
988 int save_pipe[2];
b80f6443
JA
989
990 /* XXX - question: should the DEBUG trap inherit the RETURN trap? */
991 trap_exit_value = 0;
992 if ((sigmodes[DEBUG_TRAP] & SIG_TRAPPED) && ((sigmodes[DEBUG_TRAP] & SIG_IGNORED) == 0) && ((sigmodes[DEBUG_TRAP] & SIG_INPROGRESS) == 0))
993 {
89a92869
CR
994#if defined (JOB_CONTROL)
995 save_pgrp = pipeline_pgrp;
996 pipeline_pgrp = 0;
997 save_pipeline (1);
998# if defined (PGRP_PIPE)
999 save_pgrp_pipe (save_pipe, 1);
1000# endif
1001 stop_making_children ();
1002#endif
1003
b80f6443 1004 trap_exit_value = _run_trap_internal (DEBUG_TRAP, "debug trap");
89a92869
CR
1005
1006#if defined (JOB_CONTROL)
1007 pipeline_pgrp = save_pgrp;
1008 restore_pipeline (1);
1009# if defined (PGRP_PIPE)
1010 close_pgrp_pipe ();
1011 restore_pgrp_pipe (save_pipe);
1012# endif
1013 if (pipeline_pgrp > 0)
1014 give_terminal_to (pipeline_pgrp, 1);
1015 notify_and_cleanup ();
1016#endif
b80f6443
JA
1017
1018#if defined (DEBUGGER)
1019 /* If we're in the debugger and the DEBUG trap returns 2 while we're in
1020 a function or sourced script, we force a `return'. */
1021 if (debugging_mode && trap_exit_value == 2 && return_catch_flag)
1022 {
1023 return_catch_value = trap_exit_value;
1024 longjmp (return_catch, 1);
1025 }
1026#endif
1027 }
1028 return trap_exit_value;
ccc6cda3
JA
1029}
1030
f73dda09
JA
1031void
1032run_error_trap ()
1033{
b80f6443 1034 if ((sigmodes[ERROR_TRAP] & SIG_TRAPPED) && ((sigmodes[ERROR_TRAP] & SIG_IGNORED) == 0) && (sigmodes[ERROR_TRAP] & SIG_INPROGRESS) == 0)
f73dda09
JA
1035 _run_trap_internal (ERROR_TRAP, "error trap");
1036}
1037
b80f6443
JA
1038void
1039run_return_trap ()
1040{
1041 int old_exit_value;
1042
95732b49
JA
1043#if 0
1044 if ((sigmodes[DEBUG_TRAP] & SIG_TRAPPED) && (sigmodes[DEBUG_TRAP] & SIG_INPROGRESS))
1045 return;
1046#endif
1047
b80f6443
JA
1048 if ((sigmodes[RETURN_TRAP] & SIG_TRAPPED) && ((sigmodes[RETURN_TRAP] & SIG_IGNORED) == 0) && (sigmodes[RETURN_TRAP] & SIG_INPROGRESS) == 0)
1049 {
1050 old_exit_value = last_command_exit_value;
1051 _run_trap_internal (RETURN_TRAP, "return trap");
1052 last_command_exit_value = old_exit_value;
1053 }
1054}
1055
ccc6cda3
JA
1056/* Run a trap set on SIGINT. This is called from throw_to_top_level (), and
1057 declared here to localize the trap functions. */
1058void
1059run_interrupt_trap ()
1060{
1061 _run_trap_internal (SIGINT, "interrupt trap");
726f6388
JA
1062}
1063
1064/* Free all the allocated strings in the list of traps and reset the trap
0001803f
CR
1065 values to the default. Intended to be called from subshells that want
1066 to complete work done by reset_signal_handlers upon execution of a
ac50fbac
CR
1067 subsequent `trap' command that changes a signal's disposition. We need
1068 to make sure that we duplicate the behavior of
1069 reset_or_restore_signal_handlers and not change the disposition of signals
1070 that are set to be ignored. */
726f6388
JA
1071void
1072free_trap_strings ()
1073{
1074 register int i;
1075
f73dda09 1076 for (i = 0; i < BASH_NSIG; i++)
ac50fbac
CR
1077 {
1078 if (trap_list[i] != (char *)IGNORE_SIG)
1079 free_trap_string (i);
1080 }
b80f6443 1081 trap_list[DEBUG_TRAP] = trap_list[EXIT_TRAP] = trap_list[ERROR_TRAP] = trap_list[RETURN_TRAP] = (char *)NULL;
726f6388 1082}
0001803f
CR
1083
1084/* Free a trap command string associated with SIG without changing signal
1085 disposition. Intended to be called from free_trap_strings() */
1086static void
1087free_trap_string (sig)
1088 int sig;
1089{
1090 change_signal (sig, (char *)DEFAULT_SIG);
1091 sigmodes[sig] &= ~SIG_TRAPPED;
1092}
726f6388 1093
495aee44
CR
1094/* Reset the handler for SIG to the original value but leave the trap string
1095 in place. */
726f6388
JA
1096static void
1097reset_signal (sig)
1098 int sig;
1099{
1100 set_signal_handler (sig, original_signals[sig]);
7117c2d2 1101 sigmodes[sig] &= ~SIG_TRAPPED;
726f6388
JA
1102}
1103
ccc6cda3
JA
1104/* Set the handler signal SIG to the original and free any trap
1105 command associated with it. */
1106static void
1107restore_signal (sig)
1108 int sig;
726f6388 1109{
ccc6cda3
JA
1110 set_signal_handler (sig, original_signals[sig]);
1111 change_signal (sig, (char *)DEFAULT_SIG);
1112 sigmodes[sig] &= ~SIG_TRAPPED;
726f6388
JA
1113}
1114
ccc6cda3
JA
1115static void
1116reset_or_restore_signal_handlers (reset)
f73dda09 1117 sh_resetsig_func_t *reset;
726f6388
JA
1118{
1119 register int i;
1120
ccc6cda3
JA
1121 /* Take care of the exit trap first */
1122 if (sigmodes[EXIT_TRAP] & SIG_TRAPPED)
726f6388 1123 {
ccc6cda3 1124 sigmodes[EXIT_TRAP] &= ~SIG_TRAPPED;
95732b49
JA
1125 if (reset != reset_signal)
1126 {
1127 free_trap_command (EXIT_TRAP);
1128 trap_list[EXIT_TRAP] = (char *)NULL;
1129 }
726f6388 1130 }
b80f6443 1131
726f6388
JA
1132 for (i = 1; i < NSIG; i++)
1133 {
ccc6cda3 1134 if (sigmodes[i] & SIG_TRAPPED)
726f6388
JA
1135 {
1136 if (trap_list[i] == (char *)IGNORE_SIG)
1137 set_signal_handler (i, SIG_IGN);
1138 else
ccc6cda3 1139 (*reset) (i);
726f6388 1140 }
ccc6cda3
JA
1141 else if (sigmodes[i] & SIG_SPECIAL)
1142 (*reset) (i);
726f6388 1143 }
f73dda09
JA
1144
1145 /* Command substitution and other child processes don't inherit the
b80f6443
JA
1146 debug, error, or return traps. If we're in the debugger, and the
1147 `functrace' or `errtrace' options have been set, then let command
1148 substitutions inherit them. Let command substitution inherit the
1149 RETURN trap if we're in the debugger and tracing functions. */
0628567a
JA
1150 if (function_trace_mode == 0)
1151 {
1152 sigmodes[DEBUG_TRAP] &= ~SIG_TRAPPED;
1153 sigmodes[RETURN_TRAP] &= ~SIG_TRAPPED;
1154 }
1155 if (error_trace_mode == 0)
b80f6443 1156 sigmodes[ERROR_TRAP] &= ~SIG_TRAPPED;
726f6388
JA
1157}
1158
f73dda09 1159/* Reset trapped signals to their original values, but don't free the
495aee44
CR
1160 trap strings. Called by the command substitution code and other places
1161 that create a "subshell environment". */
726f6388 1162void
ccc6cda3 1163reset_signal_handlers ()
726f6388 1164{
ccc6cda3
JA
1165 reset_or_restore_signal_handlers (reset_signal);
1166}
726f6388 1167
ccc6cda3
JA
1168/* Reset all trapped signals to their original values. Signals set to be
1169 ignored with trap '' SIGNAL should be ignored, so we make sure that they
1170 are. Called by child processes after they are forked. */
1171void
1172restore_original_signals ()
1173{
1174 reset_or_restore_signal_handlers (restore_signal);
726f6388
JA
1175}
1176
1177/* If a trap handler exists for signal SIG, then call it; otherwise just
ac50fbac 1178 return failure. Returns 1 if it called the trap handler. */
726f6388
JA
1179int
1180maybe_call_trap_handler (sig)
1181 int sig;
1182{
1183 /* Call the trap handler for SIG if the signal is trapped and not ignored. */
ccc6cda3 1184 if ((sigmodes[sig] & SIG_TRAPPED) && ((sigmodes[sig] & SIG_IGNORED) == 0))
726f6388
JA
1185 {
1186 switch (sig)
1187 {
1188 case SIGINT:
1189 run_interrupt_trap ();
1190 break;
ccc6cda3 1191 case EXIT_TRAP:
726f6388
JA
1192 run_exit_trap ();
1193 break;
ccc6cda3
JA
1194 case DEBUG_TRAP:
1195 run_debug_trap ();
1196 break;
f73dda09
JA
1197 case ERROR_TRAP:
1198 run_error_trap ();
1199 break;
726f6388
JA
1200 default:
1201 trap_handler (sig);
1202 break;
1203 }
1204 return (1);
1205 }
1206 else
1207 return (0);
1208}
1209
1210int
1211signal_is_trapped (sig)
1212 int sig;
1213{
1214 return (sigmodes[sig] & SIG_TRAPPED);
1215}
1216
ac50fbac
CR
1217int
1218signal_is_pending (sig)
1219 int sig;
1220{
1221 return (pending_traps[sig]);
1222}
1223
726f6388
JA
1224int
1225signal_is_special (sig)
1226 int sig;
1227{
1228 return (sigmodes[sig] & SIG_SPECIAL);
1229}
1230
1231int
1232signal_is_ignored (sig)
1233 int sig;
1234{
1235 return (sigmodes[sig] & SIG_IGNORED);
1236}
1237
495aee44
CR
1238int
1239signal_is_hard_ignored (sig)
1240 int sig;
1241{
1242 return (sigmodes[sig] & SIG_HARD_IGNORE);
1243}
1244
726f6388 1245void
ac50fbac 1246set_signal_hard_ignored (sig)
726f6388
JA
1247 int sig;
1248{
1249 sigmodes[sig] |= SIG_HARD_IGNORE;
ccc6cda3 1250 original_signals[sig] = SIG_IGN;
726f6388 1251}
95732b49 1252
ac50fbac
CR
1253void
1254set_signal_ignored (sig)
1255 int sig;
1256{
1257 original_signals[sig] = SIG_IGN;
1258}
1259
95732b49
JA
1260int
1261signal_in_progress (sig)
1262 int sig;
1263{
1264 return (sigmodes[sig] & SIG_INPROGRESS);
1265}