2021-03-08 04:14:07 +00:00
|
|
|
/*-*- mode:c;indent-tabs-mode:nil;c-basic-offset:2;tab-width:8;coding:utf-8 -*-│
|
|
|
|
│vi: set net ft=c ts=2 sts=2 sw=2 fenc=utf-8 :vi│
|
|
|
|
╞══════════════════════════════════════════════════════════════════════════════╡
|
|
|
|
│ Copyright 2021 Justine Alexandra Roberts Tunney │
|
|
|
|
│ │
|
|
|
|
│ Permission to use, copy, modify, and/or distribute this software for │
|
|
|
|
│ any purpose with or without fee is hereby granted, provided that the │
|
|
|
|
│ above copyright notice and this permission notice appear in all copies. │
|
|
|
|
│ │
|
|
|
|
│ THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL │
|
|
|
|
│ WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED │
|
|
|
|
│ WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE │
|
|
|
|
│ AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL │
|
|
|
|
│ DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR │
|
|
|
|
│ PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER │
|
|
|
|
│ TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR │
|
|
|
|
│ PERFORMANCE OF THIS SOFTWARE. │
|
|
|
|
╚─────────────────────────────────────────────────────────────────────────────*/
|
2023-04-27 03:45:01 +00:00
|
|
|
#include "libc/stdio/posix_spawn.h"
|
2023-08-20 09:13:02 +00:00
|
|
|
#include "libc/assert.h"
|
2023-09-12 15:58:57 +00:00
|
|
|
#include "libc/atomic.h"
|
2021-03-08 04:14:07 +00:00
|
|
|
#include "libc/calls/calls.h"
|
2023-08-20 09:13:02 +00:00
|
|
|
#include "libc/calls/internal.h"
|
|
|
|
#include "libc/calls/ntspawn.h"
|
2023-09-10 15:12:43 +00:00
|
|
|
#include "libc/calls/state.internal.h"
|
2023-08-20 09:13:02 +00:00
|
|
|
#include "libc/calls/struct/fd.internal.h"
|
2023-09-10 15:12:43 +00:00
|
|
|
#include "libc/calls/struct/rlimit.h"
|
2023-09-12 15:58:57 +00:00
|
|
|
#include "libc/calls/struct/rlimit.internal.h"
|
|
|
|
#include "libc/calls/struct/rusage.internal.h"
|
2021-03-08 04:14:07 +00:00
|
|
|
#include "libc/calls/struct/sigaction.h"
|
2022-10-12 12:26:58 +00:00
|
|
|
#include "libc/calls/struct/sigset.h"
|
2023-09-10 15:12:43 +00:00
|
|
|
#include "libc/calls/struct/sigset.internal.h"
|
|
|
|
#include "libc/calls/syscall-sysv.internal.h"
|
2023-09-12 15:58:57 +00:00
|
|
|
#include "libc/calls/syscall_support-nt.internal.h"
|
2023-08-20 09:13:02 +00:00
|
|
|
#include "libc/dce.h"
|
2021-03-08 04:14:07 +00:00
|
|
|
#include "libc/errno.h"
|
2023-08-20 09:13:02 +00:00
|
|
|
#include "libc/fmt/itoa.h"
|
|
|
|
#include "libc/fmt/magnumstrs.internal.h"
|
|
|
|
#include "libc/intrin/asan.internal.h"
|
2023-09-12 15:58:57 +00:00
|
|
|
#include "libc/intrin/atomic.h"
|
2023-08-20 09:13:02 +00:00
|
|
|
#include "libc/intrin/describeflags.internal.h"
|
2023-09-12 08:07:51 +00:00
|
|
|
#include "libc/intrin/handlock.internal.h"
|
2023-09-12 15:58:57 +00:00
|
|
|
#include "libc/intrin/kprintf.h"
|
2023-06-04 17:57:11 +00:00
|
|
|
#include "libc/intrin/strace.internal.h"
|
2022-10-13 22:38:31 +00:00
|
|
|
#include "libc/intrin/weaken.h"
|
2023-08-20 09:13:02 +00:00
|
|
|
#include "libc/mem/alloca.h"
|
2023-09-12 15:58:57 +00:00
|
|
|
#include "libc/nt/createfile.h"
|
2023-08-20 09:13:02 +00:00
|
|
|
#include "libc/nt/enum/processcreationflags.h"
|
|
|
|
#include "libc/nt/enum/startf.h"
|
2023-09-12 08:07:51 +00:00
|
|
|
#include "libc/nt/files.h"
|
2023-08-20 09:13:02 +00:00
|
|
|
#include "libc/nt/runtime.h"
|
|
|
|
#include "libc/nt/struct/processinformation.h"
|
|
|
|
#include "libc/nt/struct/startupinfo.h"
|
2022-10-12 04:06:27 +00:00
|
|
|
#include "libc/runtime/runtime.h"
|
2023-08-20 09:13:02 +00:00
|
|
|
#include "libc/sock/sock.h"
|
|
|
|
#include "libc/stdio/posix_spawn.h"
|
2022-10-12 12:26:58 +00:00
|
|
|
#include "libc/stdio/posix_spawn.internal.h"
|
2023-09-10 15:12:43 +00:00
|
|
|
#include "libc/stdio/stdio.h"
|
2023-08-20 09:13:02 +00:00
|
|
|
#include "libc/str/str.h"
|
2023-09-12 15:58:57 +00:00
|
|
|
#include "libc/sysv/consts/at.h"
|
|
|
|
#include "libc/sysv/consts/f.h"
|
|
|
|
#include "libc/sysv/consts/fd.h"
|
2023-09-10 15:12:43 +00:00
|
|
|
#include "libc/sysv/consts/limits.h"
|
2023-08-20 09:13:02 +00:00
|
|
|
#include "libc/sysv/consts/o.h"
|
2023-09-10 15:12:43 +00:00
|
|
|
#include "libc/sysv/consts/ok.h"
|
2022-10-16 19:05:08 +00:00
|
|
|
#include "libc/sysv/consts/sig.h"
|
2022-11-04 08:04:43 +00:00
|
|
|
#include "libc/thread/thread.h"
|
2022-10-13 22:38:31 +00:00
|
|
|
#include "libc/thread/tls.h"
|
2022-10-12 12:26:58 +00:00
|
|
|
|
2023-09-12 15:58:57 +00:00
|
|
|
#ifndef SYSDEBUG
|
|
|
|
#define read sys_read
|
|
|
|
#define write sys_write
|
|
|
|
#define close sys_close
|
|
|
|
#define pipe2 sys_pipe2
|
|
|
|
#define getgid sys_getgid
|
|
|
|
#define setgid sys_setgid
|
|
|
|
#define getuid sys_getuid
|
|
|
|
#define setuid sys_setuid
|
|
|
|
#define setsid sys_setsid
|
|
|
|
#define setpgid sys_setpgid
|
|
|
|
#define fcntl __sys_fcntl
|
|
|
|
#define wait4 __sys_wait4
|
|
|
|
#define openat __sys_openat
|
|
|
|
#define setrlimit sys_setrlimit
|
|
|
|
#define sigprocmask sys_sigprocmask
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static atomic_bool real_vfork; // i.e. not qemu/wsl/xnu/openbsd
|
|
|
|
|
|
|
|
static void posix_spawn_unhand(int64_t hands[3]) {
|
2023-08-20 09:13:02 +00:00
|
|
|
for (int i = 0; i < 3; ++i) {
|
2023-09-12 15:58:57 +00:00
|
|
|
if (hands[i] != -1) {
|
|
|
|
CloseHandle(hands[i]);
|
2023-08-20 09:13:02 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-12 08:07:51 +00:00
|
|
|
static void posix_spawn_inherit(int64_t hands[3], bool32 bInherit) {
|
|
|
|
for (int i = 0; i < 3; ++i) {
|
|
|
|
if (hands[i] != -1) {
|
|
|
|
SetHandleInformation(hands[i], kNtHandleFlagInherit, bInherit);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-20 09:13:02 +00:00
|
|
|
static textwindows errno_t posix_spawn_windows_impl(
|
|
|
|
int *pid, const char *path, const posix_spawn_file_actions_t *file_actions,
|
|
|
|
const posix_spawnattr_t *attrp, char *const argv[], char *const envp[]) {
|
|
|
|
int i;
|
|
|
|
|
|
|
|
// create file descriptor work area
|
|
|
|
char stdio_kind[3] = {kFdEmpty, kFdEmpty, kFdEmpty};
|
|
|
|
intptr_t stdio_handle[3] = {-1, -1, -1};
|
|
|
|
for (i = 0; i < 3; ++i) {
|
|
|
|
if (g_fds.p[i].kind != kFdEmpty && !(g_fds.p[i].flags & O_CLOEXEC)) {
|
|
|
|
stdio_kind[i] = g_fds.p[i].kind;
|
|
|
|
stdio_handle[i] = g_fds.p[i].handle;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// reserve a fake pid for this spawn
|
|
|
|
int child = __reservefd(-1);
|
|
|
|
|
|
|
|
// apply user file actions
|
2023-09-12 15:58:57 +00:00
|
|
|
intptr_t close_handle[3] = {-1, -1, -1};
|
2023-08-20 09:13:02 +00:00
|
|
|
if (file_actions) {
|
|
|
|
int err = 0;
|
|
|
|
for (struct _posix_faction *a = *file_actions; a && !err; a = a->next) {
|
|
|
|
switch (a->action) {
|
|
|
|
case _POSIX_SPAWN_CLOSE:
|
|
|
|
unassert(a->fildes < 3u);
|
|
|
|
stdio_kind[a->fildes] = kFdEmpty;
|
|
|
|
stdio_handle[a->fildes] = -1;
|
|
|
|
break;
|
|
|
|
case _POSIX_SPAWN_DUP2:
|
|
|
|
unassert(a->newfildes < 3u);
|
|
|
|
if (__isfdopen(a->fildes)) {
|
|
|
|
stdio_kind[a->newfildes] = g_fds.p[a->fildes].kind;
|
|
|
|
stdio_handle[a->newfildes] = g_fds.p[a->fildes].handle;
|
|
|
|
} else {
|
|
|
|
err = EBADF;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case _POSIX_SPAWN_OPEN: {
|
2023-09-12 15:58:57 +00:00
|
|
|
int64_t hand;
|
|
|
|
int e = errno;
|
|
|
|
char16_t path16[PATH_MAX];
|
|
|
|
uint32_t perm, share, disp, attr;
|
2023-08-20 09:13:02 +00:00
|
|
|
unassert(a->fildes < 3u);
|
2023-09-12 15:58:57 +00:00
|
|
|
if (__mkntpathat(AT_FDCWD, a->path, 0, path16) != -1 &&
|
|
|
|
GetNtOpenFlags(a->oflag, a->mode, //
|
|
|
|
&perm, &share, &disp, &attr) != -1 &&
|
|
|
|
(hand = CreateFile(path16, perm, share, 0, disp, attr, 0))) {
|
|
|
|
stdio_kind[a->fildes] = kFdFile;
|
|
|
|
close_handle[a->fildes] = hand;
|
|
|
|
stdio_handle[a->fildes] = hand;
|
2023-08-20 09:13:02 +00:00
|
|
|
} else {
|
|
|
|
err = errno;
|
|
|
|
errno = e;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
__builtin_unreachable();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (err) {
|
2023-09-12 15:58:57 +00:00
|
|
|
posix_spawn_unhand(close_handle);
|
2023-08-20 09:13:02 +00:00
|
|
|
__releasefd(child);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// create the windows process start info
|
|
|
|
int bits;
|
|
|
|
char buf[32], *v = 0;
|
|
|
|
if (_weaken(socket)) {
|
|
|
|
for (bits = i = 0; i < 3; ++i) {
|
|
|
|
if (stdio_kind[i] == kFdSocket) {
|
|
|
|
bits |= 1 << i;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
FormatInt32(stpcpy(buf, "__STDIO_SOCKETS="), bits);
|
|
|
|
v = buf;
|
|
|
|
}
|
|
|
|
struct NtStartupInfo startinfo = {
|
|
|
|
.cb = sizeof(struct NtStartupInfo),
|
|
|
|
.dwFlags = kNtStartfUsestdhandles,
|
|
|
|
.hStdInput = stdio_handle[0],
|
|
|
|
.hStdOutput = stdio_handle[1],
|
|
|
|
.hStdError = stdio_handle[2],
|
|
|
|
};
|
|
|
|
|
|
|
|
// figure out the flags
|
2023-09-10 15:12:43 +00:00
|
|
|
short flags = 0;
|
2023-08-20 09:13:02 +00:00
|
|
|
bool bInheritHandles = false;
|
|
|
|
uint32_t dwCreationFlags = 0;
|
|
|
|
for (i = 0; i < 3; ++i) {
|
|
|
|
bInheritHandles |= stdio_handle[i] != -1;
|
|
|
|
}
|
2023-09-10 15:12:43 +00:00
|
|
|
if (attrp && *attrp) {
|
|
|
|
flags = (*attrp)->flags;
|
2023-08-20 09:13:02 +00:00
|
|
|
if (flags & POSIX_SPAWN_SETSID) {
|
|
|
|
dwCreationFlags |= kNtDetachedProcess;
|
|
|
|
}
|
|
|
|
if (flags & POSIX_SPAWN_SETPGROUP) {
|
|
|
|
dwCreationFlags |= kNtCreateNewProcessGroup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// launch the process
|
|
|
|
int rc, e = errno;
|
|
|
|
struct NtProcessInformation procinfo;
|
|
|
|
if (!envp) envp = environ;
|
2023-09-12 08:07:51 +00:00
|
|
|
__hand_rlock();
|
|
|
|
posix_spawn_inherit(stdio_handle, true);
|
2023-08-20 09:13:02 +00:00
|
|
|
rc = ntspawn(path, argv, envp, v, 0, 0, bInheritHandles, dwCreationFlags, 0,
|
|
|
|
&startinfo, &procinfo);
|
2023-09-12 08:07:51 +00:00
|
|
|
posix_spawn_inherit(stdio_handle, false);
|
2023-09-12 15:58:57 +00:00
|
|
|
posix_spawn_unhand(close_handle);
|
2023-09-12 08:07:51 +00:00
|
|
|
__hand_runlock();
|
2023-08-20 09:13:02 +00:00
|
|
|
if (rc == -1) {
|
|
|
|
int err = errno;
|
|
|
|
__releasefd(child);
|
|
|
|
errno = e;
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
// track the process
|
|
|
|
CloseHandle(procinfo.hThread);
|
|
|
|
g_fds.p[child].kind = kFdProcess;
|
|
|
|
g_fds.p[child].handle = procinfo.hProcess;
|
|
|
|
g_fds.p[child].flags = O_CLOEXEC;
|
|
|
|
g_fds.p[child].zombie = false;
|
|
|
|
|
|
|
|
// return the result
|
|
|
|
if (pid) *pid = child;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2023-09-12 15:58:57 +00:00
|
|
|
static const char *DescribePid(char buf[12], int err, int *pid) {
|
|
|
|
if (err) return "n/a";
|
|
|
|
if (!pid) return "NULL";
|
|
|
|
FormatInt32(buf, *pid);
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
2023-08-20 09:13:02 +00:00
|
|
|
static textwindows dontinline errno_t posix_spawn_windows(
|
|
|
|
int *pid, const char *path, const posix_spawn_file_actions_t *file_actions,
|
|
|
|
const posix_spawnattr_t *attrp, char *const argv[], char *const envp[]) {
|
|
|
|
int err;
|
|
|
|
if (!path || !argv ||
|
|
|
|
(IsAsan() && (!__asan_is_valid_str(path) || //
|
|
|
|
!__asan_is_valid_strlist(argv) || //
|
|
|
|
(envp && !__asan_is_valid_strlist(envp))))) {
|
|
|
|
err = EFAULT;
|
|
|
|
} else {
|
|
|
|
err = posix_spawn_windows_impl(pid, path, file_actions, attrp, argv, envp);
|
|
|
|
}
|
|
|
|
STRACE("posix_spawn([%s], %#s, %s, %s) → %s",
|
|
|
|
DescribePid(alloca(12), err, pid), path, DescribeStringList(argv),
|
|
|
|
DescribeStringList(envp), !err ? "0" : _strerrno(err));
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2021-03-08 04:14:07 +00:00
|
|
|
/**
|
2022-10-16 19:05:08 +00:00
|
|
|
* Spawns process, the POSIX way.
|
|
|
|
*
|
2023-09-10 15:12:43 +00:00
|
|
|
* This provides superior process creation performance across systems
|
2023-08-20 09:13:02 +00:00
|
|
|
* Processes are normally spawned by calling fork() and execve(), but
|
|
|
|
* that goes slow on Windows if the caller has allocated a nontrivial
|
|
|
|
* number of memory mappings, all of which need to be copied into the
|
|
|
|
* forked child, only to be destroyed a moment later. On UNIX systems
|
|
|
|
* fork() bears a similar cost that's 100x less bad, which is copying
|
|
|
|
* the page tables. So what this implementation does is on Windows it
|
|
|
|
* calls CreateProcess() directly and on UNIX it uses vfork() if it's
|
2023-09-10 15:12:43 +00:00
|
|
|
* possible (XNU and OpenBSD don't have it). On UNIX this API has the
|
|
|
|
* benefit of avoiding the footguns of using vfork() directly because
|
|
|
|
* this implementation will ensure signal handlers can't be called in
|
|
|
|
* the child process since that'd likely corrupt the parent's memory.
|
2023-08-20 09:13:02 +00:00
|
|
|
*
|
2022-10-12 12:26:58 +00:00
|
|
|
* @param pid if non-null shall be set to child pid on success
|
|
|
|
* @param path is resolved path of program which is not `$PATH` searched
|
|
|
|
* @param file_actions specifies close(), dup2(), and open() operations
|
|
|
|
* @param attrp specifies signal masks, user ids, scheduling, etc.
|
|
|
|
* @param envp is environment variables, or `environ` if null
|
2021-03-08 04:14:07 +00:00
|
|
|
* @return 0 on success or error number on failure
|
2022-10-12 12:26:58 +00:00
|
|
|
* @see posix_spawnp() for `$PATH` searching
|
2023-07-24 15:31:54 +00:00
|
|
|
* @returnserrno
|
2022-10-16 19:05:08 +00:00
|
|
|
* @tlsrequired
|
|
|
|
* @threadsafe
|
2021-03-08 04:14:07 +00:00
|
|
|
*/
|
2023-07-24 15:31:54 +00:00
|
|
|
errno_t posix_spawn(int *pid, const char *path,
|
|
|
|
const posix_spawn_file_actions_t *file_actions,
|
|
|
|
const posix_spawnattr_t *attrp, char *const argv[],
|
|
|
|
char *const envp[]) {
|
2023-08-20 09:13:02 +00:00
|
|
|
if (IsWindows()) {
|
|
|
|
return posix_spawn_windows(pid, path, file_actions, attrp, argv, envp);
|
|
|
|
}
|
2023-09-12 15:58:57 +00:00
|
|
|
int pfds[2];
|
|
|
|
bool use_pipe;
|
|
|
|
volatile int status = 0;
|
2023-09-10 15:12:43 +00:00
|
|
|
sigset_t blockall, oldmask;
|
|
|
|
int child, res, cs, e = errno;
|
2023-09-12 15:58:57 +00:00
|
|
|
volatile bool can_clobber = false;
|
2023-09-10 15:12:43 +00:00
|
|
|
sigfillset(&blockall);
|
2023-09-12 15:58:57 +00:00
|
|
|
sigprocmask(SIG_SETMASK, &blockall, &oldmask);
|
2023-09-10 15:12:43 +00:00
|
|
|
pthread_setcancelstate(PTHREAD_CANCEL_DISABLE, &cs);
|
2023-09-12 15:58:57 +00:00
|
|
|
if ((use_pipe = !atomic_load_explicit(&real_vfork, memory_order_acquire))) {
|
|
|
|
if (pipe2(pfds, O_CLOEXEC)) {
|
|
|
|
res = errno;
|
|
|
|
goto ParentFailed;
|
|
|
|
}
|
|
|
|
}
|
2022-10-16 19:05:08 +00:00
|
|
|
if (!(child = vfork())) {
|
2023-09-12 15:58:57 +00:00
|
|
|
can_clobber = true;
|
2023-09-10 15:12:43 +00:00
|
|
|
sigset_t *childmask;
|
2023-09-12 15:58:57 +00:00
|
|
|
bool lost_cloexec = 0;
|
2023-09-10 15:12:43 +00:00
|
|
|
struct sigaction dfl = {0};
|
|
|
|
short flags = attrp && *attrp ? (*attrp)->flags : 0;
|
2023-09-12 15:58:57 +00:00
|
|
|
if (use_pipe) close(pfds[0]);
|
2023-09-10 15:12:43 +00:00
|
|
|
for (int sig = 1; sig < _NSIG; sig++) {
|
|
|
|
if (__sighandrvas[sig] != (long)SIG_DFL &&
|
|
|
|
(__sighandrvas[sig] != (long)SIG_IGN ||
|
|
|
|
((flags & POSIX_SPAWN_SETSIGDEF) &&
|
2023-09-12 15:58:57 +00:00
|
|
|
sigismember(&(*attrp)->sigdefault, sig) == 1))) {
|
2023-09-10 15:12:43 +00:00
|
|
|
sigaction(sig, &dfl, 0);
|
2021-03-08 04:14:07 +00:00
|
|
|
}
|
|
|
|
}
|
2023-09-10 15:12:43 +00:00
|
|
|
if (flags & POSIX_SPAWN_SETSID) {
|
|
|
|
setsid();
|
|
|
|
}
|
|
|
|
if ((flags & POSIX_SPAWN_SETPGROUP) && setpgid(0, (*attrp)->pgroup)) {
|
2023-09-12 15:58:57 +00:00
|
|
|
goto ChildFailed;
|
2023-09-10 15:12:43 +00:00
|
|
|
}
|
|
|
|
if ((flags & POSIX_SPAWN_RESETIDS) && setgid(getgid())) {
|
2023-09-12 15:58:57 +00:00
|
|
|
goto ChildFailed;
|
2023-09-10 15:12:43 +00:00
|
|
|
}
|
2023-09-12 15:58:57 +00:00
|
|
|
if ((flags & POSIX_SPAWN_RESETIDS) && setuid(getuid())) {
|
|
|
|
goto ChildFailed;
|
2023-09-10 15:12:43 +00:00
|
|
|
}
|
2021-03-08 04:14:07 +00:00
|
|
|
if (file_actions) {
|
2023-09-12 15:58:57 +00:00
|
|
|
struct _posix_faction *a;
|
|
|
|
for (a = *file_actions; a; a = a->next) {
|
|
|
|
if (use_pipe && pfds[1] == a->fildes) {
|
|
|
|
int p2;
|
|
|
|
if ((p2 = dup(pfds[1])) == -1) {
|
|
|
|
goto ChildFailed;
|
|
|
|
}
|
|
|
|
lost_cloexec = true;
|
|
|
|
close(pfds[1]);
|
|
|
|
pfds[1] = p2;
|
|
|
|
}
|
|
|
|
switch (a->action) {
|
|
|
|
case _POSIX_SPAWN_CLOSE:
|
|
|
|
if (close(a->fildes)) {
|
|
|
|
goto ChildFailed;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case _POSIX_SPAWN_DUP2:
|
|
|
|
if (dup2(a->fildes, a->newfildes) == -1) {
|
|
|
|
goto ChildFailed;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case _POSIX_SPAWN_OPEN: {
|
|
|
|
int t;
|
|
|
|
if ((t = openat(AT_FDCWD, a->path, a->oflag, a->mode)) == -1) {
|
|
|
|
goto ChildFailed;
|
|
|
|
}
|
|
|
|
if (t != a->fildes) {
|
|
|
|
if (dup2(t, a->fildes) == -1) {
|
|
|
|
close(t);
|
|
|
|
goto ChildFailed;
|
|
|
|
}
|
|
|
|
if (close(t)) {
|
|
|
|
goto ChildFailed;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
__builtin_unreachable();
|
|
|
|
}
|
|
|
|
}
|
2021-03-08 04:14:07 +00:00
|
|
|
}
|
2023-09-10 15:12:43 +00:00
|
|
|
if (IsLinux() || IsFreebsd() || IsNetbsd()) {
|
2022-10-16 19:05:08 +00:00
|
|
|
if (flags & POSIX_SPAWN_SETSCHEDULER) {
|
2023-09-10 15:12:43 +00:00
|
|
|
if (sched_setscheduler(0, (*attrp)->schedpolicy,
|
|
|
|
&(*attrp)->schedparam) == -1) {
|
2023-09-12 15:58:57 +00:00
|
|
|
goto ChildFailed;
|
2021-03-08 04:14:07 +00:00
|
|
|
}
|
|
|
|
}
|
2022-10-16 19:05:08 +00:00
|
|
|
if (flags & POSIX_SPAWN_SETSCHEDPARAM) {
|
2023-09-10 15:12:43 +00:00
|
|
|
if (sched_setparam(0, &(*attrp)->schedparam)) {
|
2023-09-12 15:58:57 +00:00
|
|
|
goto ChildFailed;
|
2021-03-08 04:14:07 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-09-10 15:12:43 +00:00
|
|
|
if (flags & POSIX_SPAWN_SETRLIMIT) {
|
|
|
|
for (int rez = 0; rez <= ARRAYLEN((*attrp)->rlim); ++rez) {
|
|
|
|
if ((*attrp)->rlimset & (1u << rez)) {
|
|
|
|
if (setrlimit(rez, (*attrp)->rlim + rez)) {
|
2023-09-12 15:58:57 +00:00
|
|
|
goto ChildFailed;
|
2023-09-10 15:12:43 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-09-12 15:58:57 +00:00
|
|
|
if (lost_cloexec) {
|
|
|
|
fcntl(pfds[1], F_SETFD, FD_CLOEXEC);
|
|
|
|
}
|
|
|
|
if (flags & POSIX_SPAWN_SETSIGMASK) {
|
|
|
|
childmask = &(*attrp)->sigmask;
|
|
|
|
} else {
|
|
|
|
childmask = &oldmask;
|
|
|
|
}
|
|
|
|
sigprocmask(SIG_SETMASK, childmask, 0);
|
2022-10-12 04:06:27 +00:00
|
|
|
if (!envp) envp = environ;
|
2021-03-08 04:14:07 +00:00
|
|
|
execve(path, argv, envp);
|
2023-09-12 15:58:57 +00:00
|
|
|
ChildFailed:
|
|
|
|
res = errno;
|
|
|
|
if (!use_pipe) {
|
|
|
|
status = res;
|
|
|
|
} else {
|
|
|
|
write(pfds[1], &res, sizeof(res));
|
2023-09-10 15:12:43 +00:00
|
|
|
}
|
2023-09-12 15:58:57 +00:00
|
|
|
_Exit(127);
|
|
|
|
}
|
|
|
|
if (use_pipe) {
|
|
|
|
close(pfds[1]);
|
2023-09-10 15:12:43 +00:00
|
|
|
}
|
|
|
|
if (child != -1) {
|
2023-09-12 15:58:57 +00:00
|
|
|
if (!use_pipe) {
|
|
|
|
res = status;
|
|
|
|
} else {
|
|
|
|
if (can_clobber) {
|
|
|
|
atomic_store_explicit(&real_vfork, true, memory_order_release);
|
|
|
|
}
|
|
|
|
res = 0;
|
|
|
|
read(pfds[0], &res, sizeof(res));
|
|
|
|
}
|
|
|
|
if (!res) {
|
|
|
|
if (pid) *pid = child;
|
|
|
|
} else {
|
|
|
|
wait4(child, 0, 0, 0);
|
|
|
|
}
|
2022-10-12 12:26:58 +00:00
|
|
|
} else {
|
2023-09-12 15:58:57 +00:00
|
|
|
res = errno;
|
2021-03-08 04:14:07 +00:00
|
|
|
}
|
2023-09-12 15:58:57 +00:00
|
|
|
if (use_pipe) {
|
|
|
|
close(pfds[0]);
|
|
|
|
}
|
|
|
|
ParentFailed:
|
|
|
|
sigprocmask(SIG_SETMASK, &oldmask, 0);
|
|
|
|
pthread_setcancelstate(cs, 0);
|
|
|
|
errno = e;
|
|
|
|
return res;
|
2021-03-08 04:14:07 +00:00
|
|
|
}
|