1 /* vi: set sw=4 ts=4: */
3 * Rexec program for system have fork() as vfork() with foreground option
5 * Copyright (C) Vladimir N. Oleynik <dzo@simtreas.ru>
6 * Copyright (C) 2003 Russ Dill <Russ.Dill@asu.edu>
8 * daemon() portion taken from uClibc:
10 * Copyright (c) 1991, 1993
11 * The Regents of the University of California. All rights reserved.
13 * Modified for uClibc by Erik Andersen <andersee@debian.org>
15 * Licensed under GPLv2 or later, see file LICENSE in this source tree.
18 #include "busybox.h" /* uses applet tables */
20 /* This does a fork/exec in one call, using vfork(). Returns PID of new child,
21 * -1 for failure. Runs argv[0], searching path if that has no / in it. */
22 pid_t FAST_FUNC
spawn(char **argv
)
24 /* Compiler should not optimize stores here */
30 /* Be nice to nommu machines. */
33 if (pid
< 0) /* error */
35 if (!pid
) { /* child */
36 /* This macro is ok - it doesn't do NOEXEC/NOFORK tricks */
37 BB_EXECVP(argv
[0], argv
);
39 /* We are (maybe) sharing a stack with blocked parent,
40 * let parent know we failed and then exit to unblock parent
41 * (but don't run atexit() stuff, which would screw up parent.)
44 /* mount, for example, does not want the message */
45 /*bb_perror_msg("can't execute '%s'", argv[0]);*/
49 /* Unfortunately, this is not reliable: according to standards
50 * vfork() can be equivalent to fork() and we won't see value
52 * Interested party can wait on pid and learn exit code.
53 * If 111 - then it (most probably) failed to exec */
55 safe_waitpid(pid
, NULL
, 0); /* prevent zombie */
62 /* Die with an error message if we can't spawn a child process. */
63 pid_t FAST_FUNC
xspawn(char **argv
)
65 pid_t pid
= spawn(argv
);
67 bb_simple_perror_msg_and_die(*argv
);
71 #if ENABLE_FEATURE_PREFER_APPLETS
72 struct nofork_save_area
{
74 const char *applet_name
;
75 uint32_t option_mask32
;
77 uint8_t xfunc_error_retval
;
79 static void save_nofork_data(struct nofork_save_area
*save
)
81 memcpy(&save
->die_jmp
, &die_jmp
, sizeof(die_jmp
));
82 save
->applet_name
= applet_name
;
83 save
->xfunc_error_retval
= xfunc_error_retval
;
84 save
->option_mask32
= option_mask32
;
85 save
->die_sleep
= die_sleep
;
87 static void restore_nofork_data(struct nofork_save_area
*save
)
89 memcpy(&die_jmp
, &save
->die_jmp
, sizeof(die_jmp
));
90 applet_name
= save
->applet_name
;
91 xfunc_error_retval
= save
->xfunc_error_retval
;
92 option_mask32
= save
->option_mask32
;
93 die_sleep
= save
->die_sleep
;
96 int FAST_FUNC
run_nofork_applet(int applet_no
, char **argv
)
99 struct nofork_save_area old
;
101 save_nofork_data(&old
);
103 applet_name
= APPLET_NAME(applet_no
);
105 xfunc_error_retval
= EXIT_FAILURE
;
107 /* In case getopt() or getopt32() was already called:
108 * reset the libc getopt() function, which keeps internal state.
110 * BSD-derived getopt() functions require that optind be set to 1 in
111 * order to reset getopt() state. This used to be generally accepted
112 * way of resetting getopt(). However, glibc's getopt()
113 * has additional getopt() state beyond optind, and requires that
114 * optind be set to zero to reset its state. So the unfortunate state of
115 * affairs is that BSD-derived versions of getopt() misbehave if
116 * optind is set to 0 in order to reset getopt(), and glibc's getopt()
117 * will core dump if optind is set 1 in order to reset getopt().
119 * More modern versions of BSD require that optreset be set to 1 in
120 * order to reset getopt(). Sigh. Standards, anyone?
124 #else /* BSD style */
128 /* optarg = NULL; opterr = 1; optopt = 63; - do we need this too? */
129 /* (values above are what they initialized to in glibc and uclibc) */
130 /* option_mask32 = 0; - not needed, no applet depends on it being 0 */
136 /* Special flag for xfunc_die(). If xfunc will "die"
137 * in NOFORK applet, xfunc_die() sees negative
138 * die_sleep and longjmp here instead. */
141 rc
= setjmp(die_jmp
);
143 /* Some callers (xargs)
144 * need argv untouched because they free argv[i]! */
145 char *tmp_argv
[argc
+1];
146 memcpy(tmp_argv
, argv
, (argc
+1) * sizeof(tmp_argv
[0]));
147 /* Finally we can call NOFORK applet's main() */
148 rc
= applet_main
[applet_no
](argc
, tmp_argv
);
149 } else { /* xfunc died in NOFORK applet */
150 /* in case they meant to return 0... */
155 /* Restoring some globals */
156 restore_nofork_data(&old
);
158 /* Other globals can be simply reset to defaults */
161 #else /* BSD style */
165 return rc
& 0xff; /* don't confuse people with "exitcodes" >255 */
167 #endif /* FEATURE_PREFER_APPLETS */
169 int FAST_FUNC
spawn_and_wait(char **argv
)
172 #if ENABLE_FEATURE_PREFER_APPLETS
173 int a
= find_applet_by_name(argv
[0]);
175 if (a
>= 0 && (APPLET_IS_NOFORK(a
)
177 || APPLET_IS_NOEXEC(a
) /* NOEXEC trick needs fork() */
181 if (APPLET_IS_NOFORK(a
))
184 return run_nofork_applet(a
, argv
);
188 /* a->noexec is true */
190 if (rc
) /* parent or error */
193 xfunc_error_retval
= EXIT_FAILURE
;
194 run_applet_no_and_exit(a
, argv
);
197 #endif /* FEATURE_PREFER_APPLETS */
203 void FAST_FUNC
re_exec(char **argv
)
205 /* high-order bit of first char in argv[0] is a hidden
206 * "we have (already) re-execed, don't do it again" flag */
208 execv(bb_busybox_exec_path
, argv
);
209 bb_perror_msg_and_die("can't execute '%s'", bb_busybox_exec_path
);
212 pid_t FAST_FUNC
fork_or_rexec(char **argv
)
215 /* Maybe we are already re-execed and come here again? */
219 if (pid
) /* parent */
221 /* child - re-exec ourself */
226 /* Due to a #define in libbb.h on MMU systems we actually have 1 argument -
227 * char **argv "vanishes" */
228 void FAST_FUNC
bb_daemonize_or_rexec(int flags
, char **argv
)
232 if (flags
& DAEMON_CHDIR_ROOT
)
235 if (flags
& DAEMON_DEVNULL_STDIO
) {
241 fd
= open(bb_dev_null
, O_RDWR
);
243 /* NB: we can be called as bb_sanitize_stdio() from init
244 * or mdev, and there /dev/null may legitimately not (yet) exist!
245 * Do not use xopen above, but obtain _ANY_ open descriptor,
246 * even bogus one as below. */
247 fd
= xopen("/", O_RDONLY
); /* don't believe this can fail */
250 while ((unsigned)fd
< 2)
251 fd
= dup(fd
); /* have 0,1,2 open at least to /dev/null */
253 if (!(flags
& DAEMON_ONLY_SANITIZE
)) {
254 if (fork_or_rexec(argv
))
255 exit(EXIT_SUCCESS
); /* parent */
256 /* if daemonizing, detach from stdio & ctty */
261 if (flags
& DAEMON_DOUBLE_FORK
) {
262 /* On Linux, session leader can acquire ctty
263 * unknowingly, by opening a tty.
264 * Prevent this: stop being a session leader.
266 if (fork_or_rexec(argv
))
267 exit(EXIT_SUCCESS
); /* parent */
272 if (!(flags
& DAEMON_CLOSE_EXTRA_FDS
))
274 /* else close everything after fd#2 */
278 void FAST_FUNC
bb_sanitize_stdio(void)
280 bb_daemonize_or_rexec(DAEMON_ONLY_SANITIZE
, NULL
);