Improve ZIP filesystem and change its prefix
The ZIP filesystem has a breaking change. You now need to use /zip/ to
open() / opendir() / etc. assets within the ZIP structure of your APE
binary, instead of the previous convention of using zip: or zip! URIs.
This is needed because Python likes to use absolute paths, and having
ZIP paths encoded like URIs simply broke too many things.
Many more system calls have been updated to be able to operate on ZIP
files and file descriptors. In particular fcntl() and ioctl() since
Python would do things like ask if a ZIP file is a terminal and get
confused when the old implementation mistakenly said yes, because the
fastest way to guarantee native file descriptors is to dup(2). This
change also improves the async signal safety of zipos and ensures it
doesn't maintain any open file descriptors beyond that which the user
has opened.
This change makes a lot of progress towards adding magic numbers that
are specific to platforms other than Linux. The philosophy here is that,
if you use an operating system like FreeBSD, then you should be able to
take advantage of FreeBSD exclusive features, even if we don't polyfill
them on other platforms. For example, you can now open() a file with the
O_VERIFY flag. If your program runs on other platforms, then Cosmo will
automatically set O_VERIFY to zero. This lets you safely use it without
the need for #ifdef or ifstatements which detract from readability.
One of the blindspots of the ASAN memory hardening we use to offer Rust
like assurances has always been that memory passed to the kernel via
system calls (e.g. writev) can't be checked automatically since the
kernel wasn't built with MODE=asan. This change makes more progress
ensuring that each system call will verify the soundness of memory
before it's passed to the kernel. The code for doing these checks is
fast, particularly for buffers, where it can verify 64 bytes a cycle.
- Correct O_LOOP definition on NT
- Introduce program_executable_name
- Add ASAN guards to more system calls
- Improve termios compatibility with BSDs
- Fix bug in Windows auxiliary value encoding
- Add BSD and XNU specific errnos and open flags
- Add check to ensure build doesn't talk to internet
2021-08-22 08:04:18 +00:00
|
|
|
/*-*- mode:c;indent-tabs-mode:t;c-basic-offset:8;tab-width:8;coding:utf-8 -*-│
|
2023-12-17 04:07:10 +00:00
|
|
|
│ vi: set et ft=c ts=8 sw=8 fenc=utf-8 :vi │
|
2020-06-21 07:10:11 +00:00
|
|
|
╚──────────────────────────────────────────────────────────────────────────────╝
|
|
|
|
│ │
|
|
|
|
│ Musl Libc │
|
|
|
|
│ Copyright © 2005-2014 Rich Felker, et al. │
|
|
|
|
│ │
|
|
|
|
│ Permission is hereby granted, free of charge, to any person obtaining │
|
|
|
|
│ a copy of this software and associated documentation files (the │
|
|
|
|
│ "Software"), to deal in the Software without restriction, including │
|
|
|
|
│ without limitation the rights to use, copy, modify, merge, publish, │
|
|
|
|
│ distribute, sublicense, and/or sell copies of the Software, and to │
|
|
|
|
│ permit persons to whom the Software is furnished to do so, subject to │
|
|
|
|
│ the following conditions: │
|
|
|
|
│ │
|
|
|
|
│ The above copyright notice and this permission notice shall be │
|
|
|
|
│ included in all copies or substantial portions of the Software. │
|
|
|
|
│ │
|
|
|
|
│ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, │
|
|
|
|
│ EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF │
|
|
|
|
│ MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. │
|
|
|
|
│ IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY │
|
|
|
|
│ CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, │
|
|
|
|
│ TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE │
|
|
|
|
│ SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. │
|
|
|
|
│ │
|
|
|
|
╚─────────────────────────────────────────────────────────────────────────────*/
|
2023-09-02 03:49:13 +00:00
|
|
|
#include "third_party/musl/glob.h"
|
2020-06-21 07:10:11 +00:00
|
|
|
#include "libc/calls/calls.h"
|
|
|
|
#include "libc/calls/struct/dirent.h"
|
|
|
|
#include "libc/calls/struct/stat.h"
|
|
|
|
#include "libc/errno.h"
|
2023-09-02 03:49:13 +00:00
|
|
|
#include "libc/mem/alg.h"
|
2020-06-21 07:10:11 +00:00
|
|
|
#include "libc/mem/mem.h"
|
|
|
|
#include "libc/str/str.h"
|
|
|
|
#include "libc/sysv/consts/dt.h"
|
2022-06-09 03:01:28 +00:00
|
|
|
#include "libc/sysv/consts/s.h"
|
2024-07-30 16:14:57 +00:00
|
|
|
#include "libc/limits.h"
|
|
|
|
#include "libc/str/str.h"
|
|
|
|
#include "libc/runtime/runtime.h"
|
|
|
|
#include "third_party/musl/passwd.h"
|
2020-06-21 07:10:11 +00:00
|
|
|
#include "third_party/musl/fnmatch.h"
|
Release Cosmopolitan v3.3
This change upgrades to GCC 12.3 and GNU binutils 2.42. The GNU linker
appears to have changed things so that only a single de-duplicated str
table is present in the binary, and it gets placed wherever the linker
wants, regardless of what the linker script says. To cope with that we
need to stop using .ident to embed licenses. As such, this change does
significant work to revamp how third party licenses are defined in the
codebase, using `.section .notice,"aR",@progbits`.
This new GCC 12.3 toolchain has support for GNU indirect functions. It
lets us support __target_clones__ for the first time. This is used for
optimizing the performance of libc string functions such as strlen and
friends so far on x86, by ensuring AVX systems favor a second codepath
that uses VEX encoding. It shaves some latency off certain operations.
It's a useful feature to have for scientific computing for the reasons
explained by the test/libcxx/openmp_test.cc example which compiles for
fifteen different microarchitectures. Thanks to the upgrades, it's now
also possible to use newer instruction sets, such as AVX512FP16, VNNI.
Cosmo now uses the %gs register on x86 by default for TLS. Doing it is
helpful for any program that links `cosmo_dlopen()`. Such programs had
to recompile their binaries at startup to change the TLS instructions.
That's not great, since it means every page in the executable needs to
be faulted. The work of rewriting TLS-related x86 opcodes, is moved to
fixupobj.com instead. This is great news for MacOS x86 users, since we
previously needed to morph the binary every time for that platform but
now that's no longer necessary. The only platforms where we need fixup
of TLS x86 opcodes at runtime are now Windows, OpenBSD, and NetBSD. On
Windows we morph TLS to point deeper into the TIB, based on a TlsAlloc
assignment, and on OpenBSD/NetBSD we morph %gs back into %fs since the
kernels do not allow us to specify a value for the %gs register.
OpenBSD users are now required to use APE Loader to run Cosmo binaries
and assimilation is no longer possible. OpenBSD kernel needs to change
to allow programs to specify a value for the %gs register, or it needs
to stop marking executable pages loaded by the kernel as mimmutable().
This release fixes __constructor__, .ctor, .init_array, and lastly the
.preinit_array so they behave the exact same way as glibc.
We no longer use hex constants to define math.h symbols like M_PI.
2024-02-20 19:12:09 +00:00
|
|
|
__static_yoink("musl_libc_notice");
|
2020-06-21 07:10:11 +00:00
|
|
|
|
2024-07-30 16:14:57 +00:00
|
|
|
#pragma GCC diagnostic ignored "-Wparentheses"
|
2021-09-28 05:58:51 +00:00
|
|
|
|
2024-07-30 16:14:57 +00:00
|
|
|
struct match
|
|
|
|
{
|
|
|
|
struct match *next;
|
|
|
|
char name[];
|
2020-06-21 07:10:11 +00:00
|
|
|
};
|
|
|
|
|
2024-07-30 16:14:57 +00:00
|
|
|
static int append(struct match **tail, const char *name, size_t len, int mark)
|
|
|
|
{
|
|
|
|
struct match *new = malloc(sizeof(struct match) + len + 2);
|
|
|
|
if (!new) return -1;
|
|
|
|
(*tail)->next = new;
|
|
|
|
new->next = NULL;
|
|
|
|
memcpy(new->name, name, len+1);
|
|
|
|
if (mark && len && name[len-1]!='/') {
|
|
|
|
new->name[len] = '/';
|
|
|
|
new->name[len+1] = 0;
|
|
|
|
}
|
|
|
|
*tail = new;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int do_glob(char *buf, size_t pos, int type, char *pat, int flags, int (*errfunc)(const char *path, int err), struct match **tail)
|
|
|
|
{
|
|
|
|
/* If GLOB_MARK is unused, we don't care about type. */
|
|
|
|
if (!type && !(flags & GLOB_MARK)) type = DT_REG;
|
|
|
|
|
|
|
|
/* Special-case the remaining pattern being all slashes, in
|
|
|
|
* which case we can use caller-passed type if it's a dir. */
|
|
|
|
if (*pat && type!=DT_DIR) type = 0;
|
|
|
|
while (pos+1 < PATH_MAX && *pat=='/') buf[pos++] = *pat++;
|
|
|
|
|
|
|
|
/* Consume maximal [escaped-]literal prefix of pattern, copying
|
|
|
|
* and un-escaping it to the running buffer as we go. */
|
|
|
|
ptrdiff_t i=0, j=0;
|
|
|
|
int in_bracket = 0, overflow = 0;
|
|
|
|
for (; pat[i]!='*' && pat[i]!='?' && (!in_bracket || pat[i]!=']'); i++) {
|
|
|
|
if (!pat[i]) {
|
|
|
|
if (overflow) return 0;
|
|
|
|
pat += i;
|
|
|
|
pos += j;
|
|
|
|
i = j = 0;
|
|
|
|
break;
|
|
|
|
} else if (pat[i] == '[') {
|
|
|
|
in_bracket = 1;
|
|
|
|
} else if (pat[i] == '\\' && !(flags & GLOB_NOESCAPE)) {
|
|
|
|
/* Backslashes inside a bracket are (at least by
|
|
|
|
* our interpretation) non-special, so if next
|
|
|
|
* char is ']' we have a complete expression. */
|
|
|
|
if (in_bracket && pat[i+1]==']') break;
|
|
|
|
/* Unpaired final backslash never matches. */
|
|
|
|
if (!pat[i+1]) return 0;
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
if (pat[i] == '/') {
|
|
|
|
if (overflow) return 0;
|
|
|
|
in_bracket = 0;
|
|
|
|
pat += i+1;
|
|
|
|
i = -1;
|
|
|
|
pos += j+1;
|
|
|
|
j = -1;
|
|
|
|
}
|
|
|
|
/* Only store a character if it fits in the buffer, but if
|
|
|
|
* a potential bracket expression is open, the overflow
|
|
|
|
* must be remembered and handled later only if the bracket
|
|
|
|
* is unterminated (and thereby a literal), so as not to
|
|
|
|
* disallow long bracket expressions with short matches. */
|
|
|
|
if (pos+(j+1) < PATH_MAX) {
|
|
|
|
buf[pos+j++] = pat[i];
|
|
|
|
} else if (in_bracket) {
|
|
|
|
overflow = 1;
|
|
|
|
} else {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* If we consume any new components, the caller-passed type
|
|
|
|
* or dummy type from above is no longer valid. */
|
|
|
|
type = 0;
|
|
|
|
}
|
|
|
|
buf[pos] = 0;
|
|
|
|
if (!*pat) {
|
|
|
|
/* If we consumed any components above, or if GLOB_MARK is
|
|
|
|
* requested and we don't yet know if the match is a dir,
|
|
|
|
* we must confirm the file exists and/or determine its type.
|
|
|
|
*
|
|
|
|
* If marking dirs, symlink type is inconclusive; we need the
|
|
|
|
* type for the symlink target, and therefore must try stat
|
|
|
|
* first unless type is known not to be a symlink. Otherwise,
|
|
|
|
* or if that fails, use lstat for determining existence to
|
|
|
|
* avoid false negatives in the case of broken symlinks. */
|
|
|
|
struct stat st;
|
|
|
|
if ((flags & GLOB_MARK) && (!type||type==DT_LNK) && !stat(buf, &st)) {
|
|
|
|
if (S_ISDIR(st.st_mode)) type = DT_DIR;
|
|
|
|
else type = DT_REG;
|
|
|
|
}
|
|
|
|
if (!type && lstat(buf, &st)) {
|
|
|
|
if (errno!=ENOENT && (errfunc(buf, errno) || (flags & GLOB_ERR)))
|
|
|
|
return GLOB_ABORTED;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (append(tail, buf, pos, (flags & GLOB_MARK) && type==DT_DIR))
|
|
|
|
return GLOB_NOSPACE;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
char *p2 = strchr(pat, '/'), saved_sep = '/';
|
|
|
|
/* Check if the '/' was escaped and, if so, remove the escape char
|
|
|
|
* so that it will not be unpaired when passed to fnmatch. */
|
|
|
|
if (p2 && !(flags & GLOB_NOESCAPE)) {
|
|
|
|
char *p;
|
|
|
|
for (p=p2; p>pat && p[-1]=='\\'; p--);
|
|
|
|
if ((p2-p)%2) {
|
|
|
|
p2--;
|
|
|
|
saved_sep = '\\';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
DIR *dir = opendir(pos ? buf : ".");
|
|
|
|
if (!dir) {
|
|
|
|
if (errfunc(buf, errno) || (flags & GLOB_ERR))
|
|
|
|
return GLOB_ABORTED;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
int old_errno = errno;
|
|
|
|
struct dirent *de;
|
|
|
|
while (errno=0, de=readdir(dir)) {
|
|
|
|
/* Quickly skip non-directories when there's pattern left. */
|
|
|
|
if (p2 && de->d_type && de->d_type!=DT_DIR && de->d_type!=DT_LNK)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
size_t l = strlen(de->d_name);
|
|
|
|
if (l >= PATH_MAX-pos) continue;
|
|
|
|
|
|
|
|
if (p2) *p2 = 0;
|
|
|
|
|
|
|
|
int fnm_flags= ((flags & GLOB_NOESCAPE) ? FNM_NOESCAPE : 0)
|
|
|
|
| ((!(flags & GLOB_PERIOD)) ? FNM_PERIOD : 0);
|
|
|
|
|
|
|
|
if (fnmatch(pat, de->d_name, fnm_flags))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* With GLOB_PERIOD, don't allow matching . or .. unless
|
|
|
|
* fnmatch would match them with FNM_PERIOD rules in effect. */
|
|
|
|
if (p2 && (flags & GLOB_PERIOD) && de->d_name[0]=='.'
|
|
|
|
&& (!de->d_name[1] || de->d_name[1]=='.' && !de->d_name[2])
|
|
|
|
&& fnmatch(pat, de->d_name, fnm_flags | FNM_PERIOD))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
memcpy(buf+pos, de->d_name, l+1);
|
|
|
|
if (p2) *p2 = saved_sep;
|
|
|
|
int r = do_glob(buf, pos+l, de->d_type, p2 ? p2 : "", flags, errfunc, tail);
|
|
|
|
if (r) {
|
|
|
|
closedir(dir);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
int readerr = errno;
|
|
|
|
if (p2) *p2 = saved_sep;
|
|
|
|
closedir(dir);
|
|
|
|
if (readerr && (errfunc(buf, errno) || (flags & GLOB_ERR)))
|
|
|
|
return GLOB_ABORTED;
|
|
|
|
errno = old_errno;
|
|
|
|
return 0;
|
2020-06-21 07:10:11 +00:00
|
|
|
}
|
|
|
|
|
2024-07-30 16:14:57 +00:00
|
|
|
static int ignore_err(const char *path, int err)
|
|
|
|
{
|
|
|
|
return 0;
|
2020-06-21 07:10:11 +00:00
|
|
|
}
|
|
|
|
|
2024-07-30 16:14:57 +00:00
|
|
|
static void freelist(struct match *head)
|
|
|
|
{
|
|
|
|
struct match *match, *next;
|
|
|
|
for (match=head->next; match; match=next) {
|
|
|
|
next = match->next;
|
|
|
|
free(match);
|
|
|
|
}
|
2020-06-21 07:10:11 +00:00
|
|
|
}
|
|
|
|
|
2024-07-30 16:14:57 +00:00
|
|
|
static int sort(const void *a, const void *b)
|
|
|
|
{
|
|
|
|
return strcmp(*(const char **)a, *(const char **)b);
|
2020-06-21 07:10:11 +00:00
|
|
|
}
|
|
|
|
|
2024-07-30 16:14:57 +00:00
|
|
|
static int expand_tilde(char **pat, char *buf, size_t *pos)
|
|
|
|
{
|
|
|
|
char *p = *pat + 1;
|
|
|
|
size_t i = 0;
|
|
|
|
|
|
|
|
char delim, *name_end = strchrnul(p, '/');
|
|
|
|
if ((delim = *name_end)) *name_end++ = 0;
|
|
|
|
*pat = name_end;
|
|
|
|
|
|
|
|
char *home = *p ? NULL : getenv("HOME");
|
|
|
|
if (!home) {
|
|
|
|
struct passwd pw, *res;
|
|
|
|
int e = *p ? getpwnam_r(p, &pw, buf, PATH_MAX, &res)
|
|
|
|
: getpwuid_r(getuid(), &pw, buf, PATH_MAX, &res);
|
|
|
|
if (e == ENOMEM) {
|
|
|
|
return GLOB_NOSPACE;
|
|
|
|
} else if (e == 0) {
|
|
|
|
if (!res)
|
|
|
|
return GLOB_NOMATCH;
|
|
|
|
} else {
|
|
|
|
return GLOB_NOMATCH;
|
|
|
|
}
|
|
|
|
home = pw.pw_dir;
|
|
|
|
}
|
|
|
|
while (i < PATH_MAX - 2 && *home)
|
|
|
|
buf[i++] = *home++;
|
|
|
|
if (*home)
|
|
|
|
return GLOB_NOMATCH;
|
|
|
|
if ((buf[i] = delim))
|
|
|
|
buf[++i] = 0;
|
|
|
|
*pos = i;
|
|
|
|
return 0;
|
2020-06-21 07:10:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Finds pathnames matching pattern.
|
|
|
|
*
|
|
|
|
* For example:
|
|
|
|
*
|
2020-12-26 10:09:07 +00:00
|
|
|
* glob_t g = {.gl_offs = 2};
|
|
|
|
* glob("*.*", GLOB_DOOFFS, NULL, &g);
|
|
|
|
* glob("../.*", GLOB_DOOFFS | GLOB_APPEND, NULL, &g);
|
|
|
|
* g.gl_pathv[0] = "ls";
|
|
|
|
* g.gl_pathv[1] = "-l";
|
|
|
|
* execvp("ls", &g.gl_pathv[0]);
|
|
|
|
* globfree(g);
|
2020-06-21 07:10:11 +00:00
|
|
|
*
|
|
|
|
* @param pat can have star wildcard see fnmatch()
|
|
|
|
* @param g will receive matching entries and needs globfree()
|
|
|
|
* @return 0 on success or GLOB_NOMATCH, GLOB_NOSPACE on OOM, or
|
|
|
|
* GLOB_ABORTED on read error
|
|
|
|
*/
|
2024-07-30 16:14:57 +00:00
|
|
|
int glob(const char *restrict pat, int flags, int (*errfunc)(const char *path, int err), glob_t *restrict g)
|
|
|
|
{
|
|
|
|
struct match head = { .next = NULL }, *tail = &head;
|
|
|
|
size_t cnt, i;
|
|
|
|
size_t offs = (flags & GLOB_DOOFFS) ? g->gl_offs : 0;
|
|
|
|
int error = 0;
|
|
|
|
char buf[PATH_MAX];
|
|
|
|
|
|
|
|
if (!errfunc) errfunc = ignore_err;
|
|
|
|
|
|
|
|
if (!(flags & GLOB_APPEND)) {
|
|
|
|
g->gl_offs = offs;
|
|
|
|
g->gl_pathc = 0;
|
|
|
|
g->gl_pathv = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*pat) {
|
|
|
|
char *p = strdup(pat);
|
|
|
|
if (!p) return GLOB_NOSPACE;
|
|
|
|
buf[0] = 0;
|
|
|
|
size_t pos = 0;
|
|
|
|
char *s = p;
|
|
|
|
if ((flags & (GLOB_TILDE | GLOB_TILDE_CHECK)) && *p == '~')
|
|
|
|
error = expand_tilde(&s, buf, &pos);
|
|
|
|
if (!error)
|
|
|
|
error = do_glob(buf, pos, 0, s, flags, errfunc, &tail);
|
|
|
|
free(p);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (error == GLOB_NOSPACE) {
|
|
|
|
freelist(&head);
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (cnt=0, tail=head.next; tail; tail=tail->next, cnt++);
|
|
|
|
if (!cnt) {
|
|
|
|
if (flags & GLOB_NOCHECK) {
|
|
|
|
tail = &head;
|
|
|
|
if (append(&tail, pat, strlen(pat), 0))
|
|
|
|
return GLOB_NOSPACE;
|
|
|
|
cnt++;
|
|
|
|
} else if (!error)
|
|
|
|
return GLOB_NOMATCH;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (flags & GLOB_APPEND) {
|
|
|
|
char **pathv = realloc(g->gl_pathv, (offs + g->gl_pathc + cnt + 1) * sizeof(char *));
|
|
|
|
if (!pathv) {
|
|
|
|
freelist(&head);
|
|
|
|
return GLOB_NOSPACE;
|
|
|
|
}
|
|
|
|
g->gl_pathv = pathv;
|
|
|
|
offs += g->gl_pathc;
|
|
|
|
} else {
|
|
|
|
g->gl_pathv = malloc((offs + cnt + 1) * sizeof(char *));
|
|
|
|
if (!g->gl_pathv) {
|
|
|
|
freelist(&head);
|
|
|
|
return GLOB_NOSPACE;
|
|
|
|
}
|
|
|
|
for (i=0; i<offs; i++)
|
|
|
|
g->gl_pathv[i] = NULL;
|
|
|
|
}
|
|
|
|
for (i=0, tail=head.next; i<cnt; tail=tail->next, i++)
|
|
|
|
g->gl_pathv[offs + i] = tail->name;
|
|
|
|
g->gl_pathv[offs + i] = NULL;
|
|
|
|
g->gl_pathc += cnt;
|
|
|
|
|
|
|
|
if (!(flags & GLOB_NOSORT))
|
|
|
|
qsort(g->gl_pathv+offs, cnt, sizeof(char *), sort);
|
|
|
|
|
|
|
|
return error;
|
2020-06-21 07:10:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Frees entries allocated by glob().
|
|
|
|
*/
|
2024-07-30 16:14:57 +00:00
|
|
|
void globfree(glob_t *g)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
for (i=0; i<g->gl_pathc; i++)
|
|
|
|
free(g->gl_pathv[g->gl_offs + i] - offsetof(struct match, name));
|
|
|
|
free(g->gl_pathv);
|
|
|
|
g->gl_pathc = 0;
|
|
|
|
g->gl_pathv = NULL;
|
2020-06-21 07:10:11 +00:00
|
|
|
}
|