##// END OF EJS Templates
chg: handle connect failure before errno gets overridden...
Jun Wu -
r30679:fe11f466 default
parent child Browse files
Show More
@@ -1,618 +1,619 b''
1 1 /*
2 2 * A command server client that uses Unix domain socket
3 3 *
4 4 * Copyright (c) 2011 Yuya Nishihara <yuya@tcha.org>
5 5 *
6 6 * This software may be used and distributed according to the terms of the
7 7 * GNU General Public License version 2 or any later version.
8 8 */
9 9
10 10 #include <arpa/inet.h> /* for ntohl(), htonl() */
11 11 #include <assert.h>
12 12 #include <ctype.h>
13 13 #include <errno.h>
14 14 #include <fcntl.h>
15 15 #include <signal.h>
16 16 #include <stdint.h>
17 17 #include <stdio.h>
18 18 #include <stdlib.h>
19 19 #include <string.h>
20 20 #include <sys/socket.h>
21 21 #include <sys/stat.h>
22 22 #include <sys/un.h>
23 23 #include <unistd.h>
24 24
25 25 #include "hgclient.h"
26 26 #include "util.h"
27 27
28 28 enum {
29 29 CAP_GETENCODING = 0x0001,
30 30 CAP_RUNCOMMAND = 0x0002,
31 31 /* cHg extension: */
32 32 CAP_ATTACHIO = 0x0100,
33 33 CAP_CHDIR = 0x0200,
34 34 CAP_GETPAGER = 0x0400,
35 35 CAP_SETENV = 0x0800,
36 36 CAP_SETUMASK = 0x1000,
37 37 CAP_VALIDATE = 0x2000,
38 38 };
39 39
40 40 typedef struct {
41 41 const char *name;
42 42 unsigned int flag;
43 43 } cappair_t;
44 44
45 45 static const cappair_t captable[] = {
46 46 {"getencoding", CAP_GETENCODING},
47 47 {"runcommand", CAP_RUNCOMMAND},
48 48 {"attachio", CAP_ATTACHIO},
49 49 {"chdir", CAP_CHDIR},
50 50 {"getpager", CAP_GETPAGER},
51 51 {"setenv", CAP_SETENV},
52 52 {"setumask", CAP_SETUMASK},
53 53 {"validate", CAP_VALIDATE},
54 54 {NULL, 0}, /* terminator */
55 55 };
56 56
57 57 typedef struct {
58 58 char ch;
59 59 char *data;
60 60 size_t maxdatasize;
61 61 size_t datasize;
62 62 } context_t;
63 63
64 64 struct hgclient_tag_ {
65 65 int sockfd;
66 66 pid_t pgid;
67 67 pid_t pid;
68 68 context_t ctx;
69 69 unsigned int capflags;
70 70 };
71 71
72 72 static const size_t defaultdatasize = 4096;
73 73
74 74 static void initcontext(context_t *ctx)
75 75 {
76 76 ctx->ch = '\0';
77 77 ctx->data = malloc(defaultdatasize);
78 78 ctx->maxdatasize = (ctx->data) ? defaultdatasize : 0;
79 79 ctx->datasize = 0;
80 80 debugmsg("initialize context buffer with size %zu", ctx->maxdatasize);
81 81 }
82 82
83 83 static void enlargecontext(context_t *ctx, size_t newsize)
84 84 {
85 85 if (newsize <= ctx->maxdatasize)
86 86 return;
87 87
88 88 newsize = defaultdatasize
89 89 * ((newsize + defaultdatasize - 1) / defaultdatasize);
90 90 ctx->data = reallocx(ctx->data, newsize);
91 91 ctx->maxdatasize = newsize;
92 92 debugmsg("enlarge context buffer to %zu", ctx->maxdatasize);
93 93 }
94 94
95 95 static void freecontext(context_t *ctx)
96 96 {
97 97 debugmsg("free context buffer");
98 98 free(ctx->data);
99 99 ctx->data = NULL;
100 100 ctx->maxdatasize = 0;
101 101 ctx->datasize = 0;
102 102 }
103 103
104 104 /* Read channeled response from cmdserver */
105 105 static void readchannel(hgclient_t *hgc)
106 106 {
107 107 assert(hgc);
108 108
109 109 ssize_t rsize = recv(hgc->sockfd, &hgc->ctx.ch, sizeof(hgc->ctx.ch), 0);
110 110 if (rsize != sizeof(hgc->ctx.ch)) {
111 111 /* server would have exception and traceback would be printed */
112 112 debugmsg("failed to read channel");
113 113 exit(255);
114 114 }
115 115
116 116 uint32_t datasize_n;
117 117 rsize = recv(hgc->sockfd, &datasize_n, sizeof(datasize_n), 0);
118 118 if (rsize != sizeof(datasize_n))
119 119 abortmsg("failed to read data size");
120 120
121 121 /* datasize denotes the maximum size to write if input request */
122 122 hgc->ctx.datasize = ntohl(datasize_n);
123 123 enlargecontext(&hgc->ctx, hgc->ctx.datasize);
124 124
125 125 if (isupper(hgc->ctx.ch) && hgc->ctx.ch != 'S')
126 126 return; /* assumes input request */
127 127
128 128 size_t cursize = 0;
129 129 while (cursize < hgc->ctx.datasize) {
130 130 rsize = recv(hgc->sockfd, hgc->ctx.data + cursize,
131 131 hgc->ctx.datasize - cursize, 0);
132 132 if (rsize < 1)
133 133 abortmsg("failed to read data block");
134 134 cursize += rsize;
135 135 }
136 136 }
137 137
138 138 static void sendall(int sockfd, const void *data, size_t datasize)
139 139 {
140 140 const char *p = data;
141 141 const char *const endp = p + datasize;
142 142 while (p < endp) {
143 143 ssize_t r = send(sockfd, p, endp - p, 0);
144 144 if (r < 0)
145 145 abortmsgerrno("cannot communicate");
146 146 p += r;
147 147 }
148 148 }
149 149
150 150 /* Write lengh-data block to cmdserver */
151 151 static void writeblock(const hgclient_t *hgc)
152 152 {
153 153 assert(hgc);
154 154
155 155 const uint32_t datasize_n = htonl(hgc->ctx.datasize);
156 156 sendall(hgc->sockfd, &datasize_n, sizeof(datasize_n));
157 157
158 158 sendall(hgc->sockfd, hgc->ctx.data, hgc->ctx.datasize);
159 159 }
160 160
161 161 static void writeblockrequest(const hgclient_t *hgc, const char *chcmd)
162 162 {
163 163 debugmsg("request %s, block size %zu", chcmd, hgc->ctx.datasize);
164 164
165 165 char buf[strlen(chcmd) + 1];
166 166 memcpy(buf, chcmd, sizeof(buf) - 1);
167 167 buf[sizeof(buf) - 1] = '\n';
168 168 sendall(hgc->sockfd, buf, sizeof(buf));
169 169
170 170 writeblock(hgc);
171 171 }
172 172
173 173 /* Build '\0'-separated list of args. argsize < 0 denotes that args are
174 174 * terminated by NULL. */
175 175 static void packcmdargs(context_t *ctx, const char *const args[],
176 176 ssize_t argsize)
177 177 {
178 178 ctx->datasize = 0;
179 179 const char *const *const end = (argsize >= 0) ? args + argsize : NULL;
180 180 for (const char *const *it = args; it != end && *it; ++it) {
181 181 const size_t n = strlen(*it) + 1; /* include '\0' */
182 182 enlargecontext(ctx, ctx->datasize + n);
183 183 memcpy(ctx->data + ctx->datasize, *it, n);
184 184 ctx->datasize += n;
185 185 }
186 186
187 187 if (ctx->datasize > 0)
188 188 --ctx->datasize; /* strip last '\0' */
189 189 }
190 190
191 191 /* Extract '\0'-separated list of args to new buffer, terminated by NULL */
192 192 static const char **unpackcmdargsnul(const context_t *ctx)
193 193 {
194 194 const char **args = NULL;
195 195 size_t nargs = 0, maxnargs = 0;
196 196 const char *s = ctx->data;
197 197 const char *e = ctx->data + ctx->datasize;
198 198 for (;;) {
199 199 if (nargs + 1 >= maxnargs) { /* including last NULL */
200 200 maxnargs += 256;
201 201 args = reallocx(args, maxnargs * sizeof(args[0]));
202 202 }
203 203 args[nargs] = s;
204 204 nargs++;
205 205 s = memchr(s, '\0', e - s);
206 206 if (!s)
207 207 break;
208 208 s++;
209 209 }
210 210 args[nargs] = NULL;
211 211 return args;
212 212 }
213 213
214 214 static void handlereadrequest(hgclient_t *hgc)
215 215 {
216 216 context_t *ctx = &hgc->ctx;
217 217 size_t r = fread(ctx->data, sizeof(ctx->data[0]), ctx->datasize, stdin);
218 218 ctx->datasize = r;
219 219 writeblock(hgc);
220 220 }
221 221
222 222 /* Read single-line */
223 223 static void handlereadlinerequest(hgclient_t *hgc)
224 224 {
225 225 context_t *ctx = &hgc->ctx;
226 226 if (!fgets(ctx->data, ctx->datasize, stdin))
227 227 ctx->data[0] = '\0';
228 228 ctx->datasize = strlen(ctx->data);
229 229 writeblock(hgc);
230 230 }
231 231
232 232 /* Execute the requested command and write exit code */
233 233 static void handlesystemrequest(hgclient_t *hgc)
234 234 {
235 235 context_t *ctx = &hgc->ctx;
236 236 enlargecontext(ctx, ctx->datasize + 1);
237 237 ctx->data[ctx->datasize] = '\0'; /* terminate last string */
238 238
239 239 const char **args = unpackcmdargsnul(ctx);
240 240 if (!args[0] || !args[1])
241 241 abortmsg("missing command or cwd in system request");
242 242 debugmsg("run '%s' at '%s'", args[0], args[1]);
243 243 int32_t r = runshellcmd(args[0], args + 2, args[1]);
244 244 free(args);
245 245
246 246 uint32_t r_n = htonl(r);
247 247 memcpy(ctx->data, &r_n, sizeof(r_n));
248 248 ctx->datasize = sizeof(r_n);
249 249 writeblock(hgc);
250 250 }
251 251
252 252 /* Read response of command execution until receiving 'r'-esult */
253 253 static void handleresponse(hgclient_t *hgc)
254 254 {
255 255 for (;;) {
256 256 readchannel(hgc);
257 257 context_t *ctx = &hgc->ctx;
258 258 debugmsg("response read from channel %c, size %zu",
259 259 ctx->ch, ctx->datasize);
260 260 switch (ctx->ch) {
261 261 case 'o':
262 262 fwrite(ctx->data, sizeof(ctx->data[0]), ctx->datasize,
263 263 stdout);
264 264 break;
265 265 case 'e':
266 266 fwrite(ctx->data, sizeof(ctx->data[0]), ctx->datasize,
267 267 stderr);
268 268 break;
269 269 case 'd':
270 270 /* assumes last char is '\n' */
271 271 ctx->data[ctx->datasize - 1] = '\0';
272 272 debugmsg("server: %s", ctx->data);
273 273 break;
274 274 case 'r':
275 275 return;
276 276 case 'I':
277 277 handlereadrequest(hgc);
278 278 break;
279 279 case 'L':
280 280 handlereadlinerequest(hgc);
281 281 break;
282 282 case 'S':
283 283 handlesystemrequest(hgc);
284 284 break;
285 285 default:
286 286 if (isupper(ctx->ch))
287 287 abortmsg("cannot handle response (ch = %c)",
288 288 ctx->ch);
289 289 }
290 290 }
291 291 }
292 292
293 293 static unsigned int parsecapabilities(const char *s, const char *e)
294 294 {
295 295 unsigned int flags = 0;
296 296 while (s < e) {
297 297 const char *t = strchr(s, ' ');
298 298 if (!t || t > e)
299 299 t = e;
300 300 const cappair_t *cap;
301 301 for (cap = captable; cap->flag; ++cap) {
302 302 size_t n = t - s;
303 303 if (strncmp(s, cap->name, n) == 0 &&
304 304 strlen(cap->name) == n) {
305 305 flags |= cap->flag;
306 306 break;
307 307 }
308 308 }
309 309 s = t + 1;
310 310 }
311 311 return flags;
312 312 }
313 313
314 314 static void readhello(hgclient_t *hgc)
315 315 {
316 316 readchannel(hgc);
317 317 context_t *ctx = &hgc->ctx;
318 318 if (ctx->ch != 'o') {
319 319 char ch = ctx->ch;
320 320 if (ch == 'e') {
321 321 /* write early error and will exit */
322 322 fwrite(ctx->data, sizeof(ctx->data[0]), ctx->datasize,
323 323 stderr);
324 324 handleresponse(hgc);
325 325 }
326 326 abortmsg("unexpected channel of hello message (ch = %c)", ch);
327 327 }
328 328 enlargecontext(ctx, ctx->datasize + 1);
329 329 ctx->data[ctx->datasize] = '\0';
330 330 debugmsg("hello received: %s (size = %zu)", ctx->data, ctx->datasize);
331 331
332 332 const char *s = ctx->data;
333 333 const char *const dataend = ctx->data + ctx->datasize;
334 334 while (s < dataend) {
335 335 const char *t = strchr(s, ':');
336 336 if (!t || t[1] != ' ')
337 337 break;
338 338 const char *u = strchr(t + 2, '\n');
339 339 if (!u)
340 340 u = dataend;
341 341 if (strncmp(s, "capabilities:", t - s + 1) == 0) {
342 342 hgc->capflags = parsecapabilities(t + 2, u);
343 343 } else if (strncmp(s, "pgid:", t - s + 1) == 0) {
344 344 hgc->pgid = strtol(t + 2, NULL, 10);
345 345 } else if (strncmp(s, "pid:", t - s + 1) == 0) {
346 346 hgc->pid = strtol(t + 2, NULL, 10);
347 347 }
348 348 s = u + 1;
349 349 }
350 350 debugmsg("capflags=0x%04x, pid=%d", hgc->capflags, hgc->pid);
351 351 }
352 352
353 353 static void attachio(hgclient_t *hgc)
354 354 {
355 355 debugmsg("request attachio");
356 356 static const char chcmd[] = "attachio\n";
357 357 sendall(hgc->sockfd, chcmd, sizeof(chcmd) - 1);
358 358 readchannel(hgc);
359 359 context_t *ctx = &hgc->ctx;
360 360 if (ctx->ch != 'I')
361 361 abortmsg("unexpected response for attachio (ch = %c)", ctx->ch);
362 362
363 363 static const int fds[3] = {STDIN_FILENO, STDOUT_FILENO, STDERR_FILENO};
364 364 struct msghdr msgh;
365 365 memset(&msgh, 0, sizeof(msgh));
366 366 struct iovec iov = {ctx->data, ctx->datasize}; /* dummy payload */
367 367 msgh.msg_iov = &iov;
368 368 msgh.msg_iovlen = 1;
369 369 char fdbuf[CMSG_SPACE(sizeof(fds))];
370 370 msgh.msg_control = fdbuf;
371 371 msgh.msg_controllen = sizeof(fdbuf);
372 372 struct cmsghdr *cmsg = CMSG_FIRSTHDR(&msgh);
373 373 cmsg->cmsg_level = SOL_SOCKET;
374 374 cmsg->cmsg_type = SCM_RIGHTS;
375 375 cmsg->cmsg_len = CMSG_LEN(sizeof(fds));
376 376 memcpy(CMSG_DATA(cmsg), fds, sizeof(fds));
377 377 msgh.msg_controllen = cmsg->cmsg_len;
378 378 ssize_t r = sendmsg(hgc->sockfd, &msgh, 0);
379 379 if (r < 0)
380 380 abortmsgerrno("sendmsg failed");
381 381
382 382 handleresponse(hgc);
383 383 int32_t n;
384 384 if (ctx->datasize != sizeof(n))
385 385 abortmsg("unexpected size of attachio result");
386 386 memcpy(&n, ctx->data, sizeof(n));
387 387 n = ntohl(n);
388 388 if (n != sizeof(fds) / sizeof(fds[0]))
389 389 abortmsg("failed to send fds (n = %d)", n);
390 390 }
391 391
392 392 static void chdirtocwd(hgclient_t *hgc)
393 393 {
394 394 if (!getcwd(hgc->ctx.data, hgc->ctx.maxdatasize))
395 395 abortmsgerrno("failed to getcwd");
396 396 hgc->ctx.datasize = strlen(hgc->ctx.data);
397 397 writeblockrequest(hgc, "chdir");
398 398 }
399 399
400 400 static void forwardumask(hgclient_t *hgc)
401 401 {
402 402 mode_t mask = umask(0);
403 403 umask(mask);
404 404
405 405 static const char command[] = "setumask\n";
406 406 sendall(hgc->sockfd, command, sizeof(command) - 1);
407 407 uint32_t data = htonl(mask);
408 408 sendall(hgc->sockfd, &data, sizeof(data));
409 409 }
410 410
411 411 /*!
412 412 * Open connection to per-user cmdserver
413 413 *
414 414 * If no background server running, returns NULL.
415 415 */
416 416 hgclient_t *hgc_open(const char *sockname)
417 417 {
418 418 int fd = socket(AF_UNIX, SOCK_STREAM, 0);
419 419 if (fd < 0)
420 420 abortmsgerrno("cannot create socket");
421 421
422 422 /* don't keep fd on fork(), so that it can be closed when the parent
423 423 * process get terminated. */
424 424 fsetcloexec(fd);
425 425
426 426 struct sockaddr_un addr;
427 427 addr.sun_family = AF_UNIX;
428 428
429 429 /* use chdir to workaround small sizeof(sun_path) */
430 430 int bakfd = -1;
431 431 const char *basename = sockname;
432 432 {
433 433 const char *split = strrchr(sockname, '/');
434 434 if (split && split != sockname) {
435 435 if (split[1] == '\0')
436 436 abortmsg("sockname cannot end with a slash");
437 437 size_t len = split - sockname;
438 438 char sockdir[len + 1];
439 439 memcpy(sockdir, sockname, len);
440 440 sockdir[len] = '\0';
441 441
442 442 bakfd = open(".", O_DIRECTORY);
443 443 if (bakfd == -1)
444 444 abortmsgerrno("cannot open cwd");
445 445
446 446 int r = chdir(sockdir);
447 447 if (r != 0)
448 448 abortmsgerrno("cannot chdir %s", sockdir);
449 449
450 450 basename = split + 1;
451 451 }
452 452 }
453 453 if (strlen(basename) >= sizeof(addr.sun_path))
454 454 abortmsg("sockname is too long: %s", basename);
455 455 strncpy(addr.sun_path, basename, sizeof(addr.sun_path));
456 456 addr.sun_path[sizeof(addr.sun_path) - 1] = '\0';
457 457
458 458 /* real connect */
459 459 int r = connect(fd, (struct sockaddr *)&addr, sizeof(addr));
460 if (r < 0) {
461 if (errno != ENOENT && errno != ECONNREFUSED)
462 abortmsgerrno("cannot connect to %s", sockname);
463 }
460 464 if (bakfd != -1) {
461 465 fchdirx(bakfd);
462 466 close(bakfd);
463 467 }
464
465 468 if (r < 0) {
466 469 close(fd);
467 if (errno == ENOENT || errno == ECONNREFUSED)
468 return NULL;
469 abortmsgerrno("cannot connect to %s", addr.sun_path);
470 return NULL;
470 471 }
471 472 debugmsg("connected to %s", addr.sun_path);
472 473
473 474 hgclient_t *hgc = mallocx(sizeof(hgclient_t));
474 475 memset(hgc, 0, sizeof(*hgc));
475 476 hgc->sockfd = fd;
476 477 initcontext(&hgc->ctx);
477 478
478 479 readhello(hgc);
479 480 if (!(hgc->capflags & CAP_RUNCOMMAND))
480 481 abortmsg("insufficient capability: runcommand");
481 482 if (hgc->capflags & CAP_ATTACHIO)
482 483 attachio(hgc);
483 484 if (hgc->capflags & CAP_CHDIR)
484 485 chdirtocwd(hgc);
485 486 if (hgc->capflags & CAP_SETUMASK)
486 487 forwardumask(hgc);
487 488
488 489 return hgc;
489 490 }
490 491
491 492 /*!
492 493 * Close connection and free allocated memory
493 494 */
494 495 void hgc_close(hgclient_t *hgc)
495 496 {
496 497 assert(hgc);
497 498 freecontext(&hgc->ctx);
498 499 close(hgc->sockfd);
499 500 free(hgc);
500 501 }
501 502
502 503 pid_t hgc_peerpgid(const hgclient_t *hgc)
503 504 {
504 505 assert(hgc);
505 506 return hgc->pgid;
506 507 }
507 508
508 509 pid_t hgc_peerpid(const hgclient_t *hgc)
509 510 {
510 511 assert(hgc);
511 512 return hgc->pid;
512 513 }
513 514
514 515 /*!
515 516 * Send command line arguments to let the server load the repo config and check
516 517 * whether it can process our request directly or not.
517 518 * Make sure hgc_setenv is called before calling this.
518 519 *
519 520 * @return - NULL, the server believes it can handle our request, or does not
520 521 * support "validate" command.
521 522 * - a list of strings, the server probably cannot handle our request
522 523 * and it sent instructions telling us what to do next. See
523 524 * chgserver.py for possible instruction formats.
524 525 * the list should be freed by the caller.
525 526 * the last string is guaranteed to be NULL.
526 527 */
527 528 const char **hgc_validate(hgclient_t *hgc, const char *const args[],
528 529 size_t argsize)
529 530 {
530 531 assert(hgc);
531 532 if (!(hgc->capflags & CAP_VALIDATE))
532 533 return NULL;
533 534
534 535 packcmdargs(&hgc->ctx, args, argsize);
535 536 writeblockrequest(hgc, "validate");
536 537 handleresponse(hgc);
537 538
538 539 /* the server returns '\0' if it can handle our request */
539 540 if (hgc->ctx.datasize <= 1)
540 541 return NULL;
541 542
542 543 /* make sure the buffer is '\0' terminated */
543 544 enlargecontext(&hgc->ctx, hgc->ctx.datasize + 1);
544 545 hgc->ctx.data[hgc->ctx.datasize] = '\0';
545 546 return unpackcmdargsnul(&hgc->ctx);
546 547 }
547 548
548 549 /*!
549 550 * Execute the specified Mercurial command
550 551 *
551 552 * @return result code
552 553 */
553 554 int hgc_runcommand(hgclient_t *hgc, const char *const args[], size_t argsize)
554 555 {
555 556 assert(hgc);
556 557
557 558 packcmdargs(&hgc->ctx, args, argsize);
558 559 writeblockrequest(hgc, "runcommand");
559 560 handleresponse(hgc);
560 561
561 562 int32_t exitcode_n;
562 563 if (hgc->ctx.datasize != sizeof(exitcode_n)) {
563 564 abortmsg("unexpected size of exitcode");
564 565 }
565 566 memcpy(&exitcode_n, hgc->ctx.data, sizeof(exitcode_n));
566 567 return ntohl(exitcode_n);
567 568 }
568 569
569 570 /*!
570 571 * (Re-)send client's stdio channels so that the server can access to tty
571 572 */
572 573 void hgc_attachio(hgclient_t *hgc)
573 574 {
574 575 assert(hgc);
575 576 if (!(hgc->capflags & CAP_ATTACHIO))
576 577 return;
577 578 attachio(hgc);
578 579 }
579 580
580 581 /*!
581 582 * Get pager command for the given Mercurial command args
582 583 *
583 584 * If no pager enabled, returns NULL. The return value becomes invalid
584 585 * once you run another request to hgc.
585 586 */
586 587 const char *hgc_getpager(hgclient_t *hgc, const char *const args[],
587 588 size_t argsize)
588 589 {
589 590 assert(hgc);
590 591
591 592 if (!(hgc->capflags & CAP_GETPAGER))
592 593 return NULL;
593 594
594 595 packcmdargs(&hgc->ctx, args, argsize);
595 596 writeblockrequest(hgc, "getpager");
596 597 handleresponse(hgc);
597 598
598 599 if (hgc->ctx.datasize < 1 || hgc->ctx.data[0] == '\0')
599 600 return NULL;
600 601 enlargecontext(&hgc->ctx, hgc->ctx.datasize + 1);
601 602 hgc->ctx.data[hgc->ctx.datasize] = '\0';
602 603 return hgc->ctx.data;
603 604 }
604 605
605 606 /*!
606 607 * Update server's environment variables
607 608 *
608 609 * @param envp list of environment variables in "NAME=VALUE" format,
609 610 * terminated by NULL.
610 611 */
611 612 void hgc_setenv(hgclient_t *hgc, const char *const envp[])
612 613 {
613 614 assert(hgc && envp);
614 615 if (!(hgc->capflags & CAP_SETENV))
615 616 return;
616 617 packcmdargs(&hgc->ctx, envp, /*argsize*/ -1);
617 618 writeblockrequest(hgc, "setenv");
618 619 }
General Comments 0
You need to be logged in to leave comments. Login now