2013-02-03 16:42:40 -05:00
|
|
|
#define _GNU_SOURCE
|
2011-05-28 18:36:30 -04:00
|
|
|
#include <spawn.h>
|
2013-02-03 16:42:40 -05:00
|
|
|
#include <sched.h>
|
2011-05-28 18:36:30 -04:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <signal.h>
|
2011-05-28 23:30:47 -04:00
|
|
|
#include <fcntl.h>
|
2013-02-03 16:42:40 -05:00
|
|
|
#include <sys/wait.h>
|
2011-05-28 18:36:30 -04:00
|
|
|
#include "syscall.h"
|
2012-10-18 15:58:23 -04:00
|
|
|
#include "pthread_impl.h"
|
2011-05-28 23:30:47 -04:00
|
|
|
#include "fdop.h"
|
2012-10-15 11:42:46 -04:00
|
|
|
#include "libc.h"
|
2011-05-28 18:36:30 -04:00
|
|
|
|
2012-10-15 11:42:46 -04:00
|
|
|
static void dummy_0()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
weak_alias(dummy_0, __acquire_ptc);
|
|
|
|
weak_alias(dummy_0, __release_ptc);
|
|
|
|
|
2013-02-03 16:42:40 -05:00
|
|
|
struct args {
|
|
|
|
int p[2];
|
2011-05-28 18:36:30 -04:00
|
|
|
sigset_t oldmask;
|
2013-02-03 16:42:40 -05:00
|
|
|
const char *path;
|
|
|
|
int (*exec)(const char *, char *const *, char *const *);
|
|
|
|
const posix_spawn_file_actions_t *fa;
|
|
|
|
const posix_spawnattr_t *restrict attr;
|
|
|
|
char *const *argv, *const *envp;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int child(void *args_vp)
|
|
|
|
{
|
|
|
|
int i, ret;
|
|
|
|
struct sigaction sa;
|
|
|
|
struct args *args = args_vp;
|
|
|
|
int p = args->p[1];
|
|
|
|
const posix_spawn_file_actions_t *fa = args->fa;
|
|
|
|
const posix_spawnattr_t *restrict attr = args->attr;
|
|
|
|
|
|
|
|
close(args->p[0]);
|
|
|
|
|
|
|
|
/* All signal dispositions must be either SIG_DFL or SIG_IGN
|
|
|
|
* before signals are unblocked. Otherwise a signal handler
|
|
|
|
* from the parent might get run in the child while sharing
|
|
|
|
* memory, with unpredictable and dangerous results. */
|
|
|
|
for (i=1; i<_NSIG; i++) {
|
2012-10-18 15:58:23 -04:00
|
|
|
__libc_sigaction(i, 0, &sa);
|
|
|
|
if (sa.sa_handler!=SIG_DFL && (sa.sa_handler!=SIG_IGN ||
|
2011-05-28 18:39:43 -04:00
|
|
|
((attr->__flags & POSIX_SPAWN_SETSIGDEF)
|
2012-10-18 15:58:23 -04:00
|
|
|
&& sigismember(&attr->__def, i) ))) {
|
2011-05-28 18:36:30 -04:00
|
|
|
sa.sa_handler = SIG_DFL;
|
2012-10-18 15:58:23 -04:00
|
|
|
__libc_sigaction(i, &sa, 0);
|
2011-05-28 18:36:30 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-03 16:42:40 -05:00
|
|
|
if (attr->__flags & POSIX_SPAWN_SETPGROUP)
|
|
|
|
if ((ret=__syscall(SYS_setpgid, 0, attr->__pgrp)))
|
|
|
|
goto fail;
|
2011-05-28 18:36:30 -04:00
|
|
|
|
2013-02-03 16:42:40 -05:00
|
|
|
/* Use syscalls directly because pthread state because the
|
|
|
|
* library functions attempt to do a multi-threaded synchronized
|
|
|
|
* id-change, which would trash the parent's state. */
|
|
|
|
if (attr->__flags & POSIX_SPAWN_RESETIDS)
|
|
|
|
if ((ret=__syscall(SYS_setgid, __syscall(SYS_getgid))) ||
|
|
|
|
(ret=__syscall(SYS_setuid, __syscall(SYS_getuid))) )
|
|
|
|
goto fail;
|
2011-05-28 18:36:30 -04:00
|
|
|
|
2011-05-29 12:58:02 -04:00
|
|
|
if (fa && fa->__actions) {
|
2011-05-28 23:30:47 -04:00
|
|
|
struct fdop *op;
|
2013-02-03 16:42:40 -05:00
|
|
|
int fd;
|
2011-05-29 12:58:02 -04:00
|
|
|
for (op = fa->__actions; op->next; op = op->next);
|
|
|
|
for (; op; op = op->prev) {
|
2013-02-03 16:42:40 -05:00
|
|
|
/* It's possible that a file operation would clobber
|
|
|
|
* the pipe fd used for synchronizing with the
|
|
|
|
* parent. To avoid that, we dup the pipe onto
|
|
|
|
* an unoccupied fd. */
|
|
|
|
if (op->fd == p) {
|
|
|
|
ret = __syscall(SYS_dup, p);
|
|
|
|
if (ret < 0) goto fail;
|
|
|
|
__syscall(SYS_close, p);
|
|
|
|
p = ret;
|
|
|
|
}
|
2011-05-28 23:30:47 -04:00
|
|
|
switch(op->cmd) {
|
|
|
|
case FDOP_CLOSE:
|
2013-02-03 16:42:40 -05:00
|
|
|
if ((ret=__syscall(SYS_close, op->fd)))
|
|
|
|
goto fail;
|
2011-05-28 23:30:47 -04:00
|
|
|
break;
|
|
|
|
case FDOP_DUP2:
|
2013-02-03 16:42:40 -05:00
|
|
|
if ((ret=__syscall(SYS_dup2, op->srcfd, op->fd))<0)
|
|
|
|
goto fail;
|
2011-05-28 23:30:47 -04:00
|
|
|
break;
|
|
|
|
case FDOP_OPEN:
|
|
|
|
fd = __syscall(SYS_open, op->path,
|
|
|
|
op->oflag | O_LARGEFILE, op->mode);
|
2013-02-03 16:42:40 -05:00
|
|
|
if ((ret=fd) < 0) goto fail;
|
|
|
|
if (fd != op->fd) {
|
|
|
|
if ((ret=__syscall(SYS_dup2, fd, op->fd))<0)
|
|
|
|
goto fail;
|
2011-05-28 23:30:47 -04:00
|
|
|
__syscall(SYS_close, fd);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-02-03 16:42:40 -05:00
|
|
|
/* Close-on-exec flag may have been lost if we moved the pipe
|
|
|
|
* to a different fd. We don't use F_DUPFD_CLOEXEC above because
|
|
|
|
* it would fail on older kernels and atomicity is not needed --
|
|
|
|
* in this process there are no threads or signal handlers. */
|
|
|
|
__syscall(SYS_fcntl, p, F_SETFD, FD_CLOEXEC);
|
2011-05-28 18:36:30 -04:00
|
|
|
|
2013-02-03 16:42:40 -05:00
|
|
|
pthread_sigmask(SIG_SETMASK, (attr->__flags & POSIX_SPAWN_SETSIGMASK)
|
|
|
|
? &attr->__mask : &args->oldmask, 0);
|
|
|
|
|
|
|
|
args->exec(args->path, args->argv, args->envp);
|
|
|
|
|
|
|
|
fail:
|
|
|
|
/* Since sizeof errno < PIPE_BUF, the write is atomic. */
|
|
|
|
ret = -ret;
|
|
|
|
if (ret) while (write(p, &ret, sizeof ret) < 0);
|
2011-05-28 18:36:30 -04:00
|
|
|
_exit(127);
|
2013-02-03 16:42:40 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int __posix_spawnx(pid_t *restrict res, const char *restrict path,
|
|
|
|
int (*exec)(const char *, char *const *, char *const *),
|
|
|
|
const posix_spawn_file_actions_t *fa,
|
|
|
|
const posix_spawnattr_t *restrict attr,
|
|
|
|
char *const argv[restrict], char *const envp[restrict])
|
|
|
|
{
|
|
|
|
pid_t pid;
|
|
|
|
char stack[1024];
|
|
|
|
int ec=0, cs;
|
|
|
|
struct args args;
|
|
|
|
|
|
|
|
if (pipe2(args.p, O_CLOEXEC))
|
|
|
|
return errno;
|
|
|
|
|
|
|
|
pthread_setcancelstate(PTHREAD_CANCEL_DISABLE, &cs);
|
|
|
|
|
|
|
|
args.path = path;
|
|
|
|
args.exec = exec;
|
|
|
|
args.fa = fa;
|
|
|
|
args.attr = attr ? attr : &(const posix_spawnattr_t){0};
|
|
|
|
args.argv = argv;
|
|
|
|
args.envp = envp;
|
|
|
|
pthread_sigmask(SIG_BLOCK, SIGALL_SET, &args.oldmask);
|
|
|
|
|
|
|
|
/* This lock prevents setuid/setgid operations while the parent
|
|
|
|
* is sharing memory with the child. Situations where processes
|
|
|
|
* with different permissions share VM are fundamentally unsafe. */
|
|
|
|
__acquire_ptc();
|
|
|
|
pid = __clone(child, stack+sizeof stack, CLONE_VM|SIGCHLD, &args);
|
|
|
|
close(args.p[1]);
|
|
|
|
|
|
|
|
if (pid > 0) {
|
2013-02-03 17:09:47 -05:00
|
|
|
if (read(args.p[0], &ec, sizeof ec) != sizeof ec) ec = 0;
|
2013-02-03 16:42:40 -05:00
|
|
|
else waitpid(pid, &(int){0}, 0);
|
|
|
|
} else {
|
|
|
|
ec = -pid;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* At this point, the child has either exited or successfully
|
|
|
|
* performed exec, so the lock may be released. */
|
|
|
|
__release_ptc();
|
|
|
|
close(args.p[0]);
|
|
|
|
|
|
|
|
if (!ec) *res = pid;
|
|
|
|
|
|
|
|
pthread_sigmask(SIG_SETMASK, &args.oldmask, 0);
|
|
|
|
pthread_setcancelstate(cs, 0);
|
2011-05-28 18:36:30 -04:00
|
|
|
|
2013-02-03 16:42:40 -05:00
|
|
|
return ec;
|
2011-05-28 18:36:30 -04:00
|
|
|
}
|
|
|
|
|
2012-09-06 22:44:55 -04:00
|
|
|
int posix_spawn(pid_t *restrict res, const char *restrict path,
|
2011-05-28 18:36:30 -04:00
|
|
|
const posix_spawn_file_actions_t *fa,
|
2012-09-06 22:44:55 -04:00
|
|
|
const posix_spawnattr_t *restrict attr,
|
|
|
|
char *const argv[restrict], char *const envp[restrict])
|
2011-05-28 18:36:30 -04:00
|
|
|
{
|
2012-10-18 16:41:27 -04:00
|
|
|
return __posix_spawnx(res, path, execve, fa, attr, argv, envp);
|
2011-05-28 18:36:30 -04:00
|
|
|
}
|