FreeCalypso > hg > freecalypso-tools
view rvinterf/libasync/ttymagic.c @ 465:003e48f8ebe1
rvinterf/etmsync/fsnew.c: cast 0 to (char *) for execl sentinel
I generally don't use NULL and use plain 0 instead, based on a "NULL
considered harmful" discussion on the classiccmp mailing list many aeons
ago (I couldn't find it, and I reason that it must have been 2005 or
earlier), but a recent complaint by a packager sent me searching, and I
found this:
https://ewontfix.com/11/
While I don't give a @#$% about "modern" systems and code-nazi tools,
I realized that passing a plain 0 as a pointer sentinel in execl is wrong
because it will break on systems where pointers are longer than the plain
int type. Again, I don't give a @#$% about the abomination of x86_64 and
the like, but if anyone ever manages to port my code to something like a
PDP-11 (16-bit int, 32-bit long and pointers), then passing a plain 0
as a function argument where a pointer is expected most definitely won't
work: if the most natural stack slot and SP alignment unit is 16 bits,
fitting an int, with longs and pointers taking up two such slots, then
the call stack will be totally wrong with a plain 0 passed for a pointer.
Casting the 0 to (char *) ought to be the most kosher solution for the
most retro systems possible.
author | Mychaela Falconia <falcon@freecalypso.org> |
---|---|
date | Mon, 11 Feb 2019 00:00:19 +0000 |
parents | 09b4fd9b3827 |
children |
line wrap: on
line source
/* * This module contains the tty "magic" code for fc-shell and fc-tmsh. */ #include <sys/types.h> #include <stdio.h> #include <string.h> #include <strings.h> #include <stdlib.h> #include <unistd.h> #include <termios.h> extern int ttyhacks; struct termios orig_termios, our_termios; #define MAX_USER_CMD 78 char usercmd[MAX_USER_CMD+1]; int usercmd_len; void tty_init() { if (!ttyhacks) return; tcgetattr(0, &orig_termios); bcopy(&orig_termios, &our_termios, sizeof(struct termios)); our_termios.c_oflag &= ~(OCRNL | ONOCR | ONLRET); our_termios.c_lflag &= ~(ICANON | ECHO); our_termios.c_cc[VMIN] = 1; our_termios.c_cc[VTIME] = 0; tcsetattr(0, TCSAFLUSH, &our_termios); putchar('>'); fflush(stdout); } void tty_cleanup() { if (!ttyhacks) return; tcsetattr(0, TCSAFLUSH, &orig_termios); } void handle_tty_input() { char buf[256]; int i, c, cc; cc = read(0, buf, sizeof buf); if (cc <= 0) { tty_cleanup(); exit(0); } for (i = 0; i < cc; i++) { c = buf[i]; if (c >= ' ' && c <= '~') { if (usercmd_len >= MAX_USER_CMD) continue; usercmd[usercmd_len++] = c; if (ttyhacks) putchar(c); /* echo */ continue; } switch (c) { case '\b': case 0x7F: if (!usercmd_len) continue; usercmd_len--; if (ttyhacks) { putchar('\b'); putchar(' '); putchar('\b'); } continue; case '\n': case '\r': usercmd[usercmd_len] = '\0'; if (ttyhacks) putchar('\n'); /* echo */ dispatch_user_cmd(); usercmd_len = 0; if (ttyhacks) putchar('>'); /* new prompt */ } } } void async_msg_output(msg) char *msg; { int msglen, i; msglen = strlen(msg); if (ttyhacks) putchar('\r'); fputs(msg, stdout); if (ttyhacks) for (i = msglen; i < usercmd_len + 1; i++) putchar(' '); putchar('\n'); if (!ttyhacks) return; /* reprint the input line */ putchar('>'); if (!usercmd_len) return; fwrite(usercmd, 1, usercmd_len, stdout); }