1 /* Copyright (C) 2000, 2011 Free Software Foundation, Inc.
2 This file is part of the GNU C Library.
4 The GNU C Library is free software; you can redistribute it and/or
5 modify it under the terms of the GNU Lesser General Public
6 License as published by the Free Software Foundation; either
7 version 2.1 of the License, or (at your option) any later version.
9 The GNU C Library is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 Lesser General Public License for more details.
14 You should have received a copy of the GNU Lesser General Public
15 License along with the GNU C Library; if not, see
16 <http://www.gnu.org/licenses/>. */
23 #include <sys/syscall.h>
26 #include <sys/resource.h>
27 #include <not-cancel.h>
28 #include <internal-signals.h>
31 #include "spawn_int.h"
33 /* The Unix standard contains a long explanation of the way to signal
34 an error after the fork() was successful. Since no new wait status
35 was wanted there is no way to signal an error using one of the
36 available methods. The committee chose to signal an error by a
37 normal program exit with the exit code 127. */
38 #define SPAWN_ERROR 127
40 /* Execute file actions.
41 * Returns true on error.
43 inline static bool execute_file_actions(const posix_spawn_file_actions_t
*fa
)
45 struct rlimit64 fdlimit
;
46 bool have_fdlimit
= false;
49 for (cnt
= 0; cnt
< fa
->__used
; ++cnt
) {
50 struct __spawn_action
*action
= &fa
->__actions
[cnt
];
52 switch (action
->tag
) {
54 if (close_not_cancel(action
->action
.close_action
.fd
) != 0) {
56 getrlimit64(RLIMIT_NOFILE
, &fdlimit
);
60 /* Only signal errors for file descriptors out of range. */
61 if (0 > action
->action
.close_action
.fd
62 || action
->action
.close_action
.fd
>= fdlimit
.rlim_cur
)
63 /* Signal the error. */
69 int new_fd
= open_not_cancel(action
->action
.open_action
.path
,
70 action
->action
.open_action
.oflag
72 action
->action
.open_action
.mode
);
77 /* Make sure the desired file descriptor is used. */
78 if (new_fd
!= action
->action
.open_action
.fd
) {
79 if (dup2(new_fd
, action
->action
.open_action
.fd
)
80 != action
->action
.open_action
.fd
)
83 if (close_not_cancel(new_fd
) != 0)
89 if (dup2(action
->action
.dup2_action
.fd
,
90 action
->action
.dup2_action
.newfd
)
91 != action
->action
.dup2_action
.newfd
)
100 #define DANGEROUS (POSIX_SPAWN_SETSIGMASK \
101 | POSIX_SPAWN_SETSIGDEF \
102 | POSIX_SPAWN_SETSCHEDPARAM \
103 | POSIX_SPAWN_SETSCHEDULER \
104 | POSIX_SPAWN_SETPGROUP \
105 | POSIX_SPAWN_RESETIDS)
106 inline static bool is_vfork_safe(short int flags
)
108 return ((flags
& POSIX_SPAWN_USEVFORK
) || !(flags
& DANGEROUS
));
112 /* Spawn a new process executing PATH with the attributes describes in *ATTRP.
113 Before running the process perform the actions described in FILE-ACTIONS. */
115 __spawni(pid_t
*pid
, const char *file
,
116 const posix_spawn_file_actions_t
*fa
,
117 const posix_spawnattr_t
*attrp
, char *const argv
[],
118 char *const envp
[], const char *path
)
120 short int flags
= attrp
? attrp
->__flags
: 0;
123 if (is_vfork_safe(flags
) && !fa
)
126 #ifdef __ARCH_USE_MMU__
143 if (flags
& POSIX_SPAWN_SETSIGMASK
) {
144 if (sigprocmask(SIG_SETMASK
, &attrp
->__ss
, NULL
) != 0)
148 if (flags
& POSIX_SPAWN_SETSIGDEF
) {
149 /* We have to iterate over all signals. This could possibly be
150 done better but it requires system specific solutions since
151 the sigset_t data type can be very different on different
156 memset(&sa
, 0, sizeof(sa
));
159 sigprocmask (SIG_BLOCK
, 0, &hset
);
161 for (sig
= 1; sig
< _NSIG
; ++sig
) {
162 if ((flags
& POSIX_SPAWN_SETSIGDEF
)
163 && sigismember (&attrp
->__sd
, sig
))
165 sa
.sa_handler
= SIG_DFL
;
167 else if (sigismember (&hset
, sig
))
169 if (__is_internal_signal (sig
))
170 sa
.sa_handler
= SIG_IGN
;
173 __libc_sigaction (sig
, 0, &sa
);
174 if (sa
.sa_handler
== SIG_IGN
)
176 sa
.sa_handler
= SIG_DFL
;
182 __libc_sigaction (sig
, &sa
, 0);
186 if (flags
& POSIX_SPAWN_SETSCHEDULER
) {
187 if (sched_setscheduler(0, attrp
->__policy
, &attrp
->__sp
) == -1)
189 } else if (flags
& POSIX_SPAWN_SETSCHEDPARAM
) {
190 if (sched_setparam(0, &attrp
->__sp
) == -1)
194 if (flags
& POSIX_SPAWN_SETPGROUP
) {
195 if (setpgid(0, attrp
->__pgrp
) != 0)
199 if (flags
& POSIX_SPAWN_RESETIDS
) {
200 if (seteuid(getuid()) || setegid(getgid()))
204 if (fa
&& execute_file_actions(fa
))
207 if (!path
|| strchr(file
, '/')) {
208 execve(file
, argv
, envp
);
215 size_t filelen
= strlen(file
) + 1;
216 size_t pathlen
= strlen(path
) + 1;
217 name
= alloca(pathlen
+ filelen
);
219 /* Copy the file name at the top. */
220 name
= (char *) memcpy(name
+ pathlen
, file
, filelen
);
222 /* And add the slash. */
226 char *p
= (char *)path
;
230 p
= strchrnul(path
, ':');
232 /* Two adjacent colons, or a colon at the beginning or the end
233 of `PATH' means to search the current directory. */
237 startp
= (char *) memcpy(name
- (p
- path
), path
, p
- path
);
239 execve(startp
, argv
, envp
);
246 /* Those errors indicate the file is missing or not
247 executable by us, in which case we want to just try
248 the next path directory. */
251 /* Some other error means we found an executable file,
252 but something went wrong executing it; return the
253 error to our caller. */
257 } while (*p
++ != '\0');
263 /* Spawn a new process executing PATH with the attributes describes in *ATTRP.
264 Before running the process perform the actions described in FILE-ACTIONS. */
265 int posix_spawn (pid_t
*pid
, const char *path
,
266 const posix_spawn_file_actions_t
*fa
,
267 const posix_spawnattr_t
*attrp
, char *const argv
[],
270 return __spawni(pid
, path
, fa
, attrp
, argv
, envp
, NULL
);
273 /* Spawn a new process executing FILE with the attributes describes in *ATTRP.
274 Before running the process perform the actions described in FILE-ACTIONS. */
276 posix_spawnp(pid_t
*pid
, const char *file
,
277 const posix_spawn_file_actions_t
*fa
,
278 const posix_spawnattr_t
*attrp
, char *const argv
[],
281 const char *path
= getenv("PATH");
284 path
= ":/bin:/usr/bin";
286 return __spawni(pid
, file
, fa
, attrp
, argv
, envp
, path
);