shells: do not allow bare "read" in non-bash compat configs
On Sat, Feb 9, 2019 Cristian Ionescu-Idbohrn wrote: > In my case (at work), I have to watch and prevent people from doing > unportable things. For me, that's a burden. Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
This commit is contained in:
parent
a1b0d3856d
commit
457825f77a
4 changed files with 22 additions and 8 deletions
|
@ -59,7 +59,7 @@ shell_builtin_read(struct builtin_read_params *params)
|
|||
while (*pp) {
|
||||
if (endofname(*pp)[0] != '\0') {
|
||||
/* Mimic bash message */
|
||||
bb_error_msg("read: '%s': not a valid identifier", *pp);
|
||||
bb_error_msg("read: '%s': bad variable name", *pp);
|
||||
return (const char *)(uintptr_t)1;
|
||||
}
|
||||
pp++;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue