2013-10-02 02:08:46 +08:00
|
|
|
/*-
|
|
|
|
* Copyright (c) 2008 Ed Schouten <ed@FreeBSD.org>
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
FUNCTION
|
|
|
|
<<posix_spawn>>, <<posix_spawnp>>---spawn a process
|
|
|
|
|
|
|
|
INDEX
|
|
|
|
posix_spawn
|
|
|
|
INDEX
|
|
|
|
posix_spawnp
|
|
|
|
|
2017-11-30 16:01:32 +08:00
|
|
|
SYNOPSIS
|
2013-10-02 02:08:46 +08:00
|
|
|
#include <spawn.h>
|
|
|
|
|
|
|
|
int posix_spawn(pid_t *<[pid]>, const char *<[path]>,
|
|
|
|
const posix_spawn_file_actions_t *<[file_actions]>,
|
|
|
|
const posix_spawnattr_t *<[attrp]>,
|
2022-01-06 05:30:16 +08:00
|
|
|
char *const <[argv]>[], char *const <[envp]>[]);
|
2013-10-02 02:08:46 +08:00
|
|
|
int posix_spawnp(pid_t *<[pid]>, const char *<[file]>,
|
|
|
|
const posix_spawn_file_actions_t *<[file_actions]>,
|
|
|
|
const posix_spawnattr_t *<[attrp]>,
|
2022-01-06 05:30:16 +08:00
|
|
|
char *const <[argv]>[], char *const <[envp]>[]);
|
2013-10-02 02:08:46 +08:00
|
|
|
|
|
|
|
DESCRIPTION
|
|
|
|
Use <<posix_spawn>> and <<posix_spawnp>> to create a new child process
|
|
|
|
from the specified process image file. <<argc>> is the argument count
|
|
|
|
and <<argv>> is an array of argument strings passed to the new program.
|
|
|
|
<<envp>> is an array of stings, which are passed as environment to the
|
|
|
|
new program.
|
|
|
|
|
|
|
|
The <<path>> argument to <<posix_spawn>> identifies the new process
|
|
|
|
image file to execute. The <<file>> argument to <<posix_spawnp>> is
|
|
|
|
used to construct a pathname that identifies the new process image
|
|
|
|
file by duplicating the actions of the shell in searching for an
|
|
|
|
executable file if the specified filename does not contain a `<</>>'
|
|
|
|
character. The <<file>> is sought in the colon-separated list of
|
|
|
|
directory pathnames specified in the <<PATH>> environment variable.
|
|
|
|
|
|
|
|
The file descriptors remain open across <<posix_spawn>> and
|
|
|
|
<<posix_spawnp>> except for those marked as close-on-exec. The open
|
|
|
|
file descriptors in the child process can be modified by the spawn file
|
|
|
|
actions object pointed to by <<file_actions>>.
|
|
|
|
|
|
|
|
The spawn attributes object type pointed to by <<attrp>> argument
|
|
|
|
may contain any of the attributes defined in <<spawn.h>>.
|
|
|
|
|
|
|
|
RETURNS
|
|
|
|
<<posix_spawn>> and <<posix_spawnp>> return the process ID of the newly
|
|
|
|
spawned child process in the variable pointed by a non-NULL <<*<[pid]>>>
|
|
|
|
argument and zero as the function return value upon successful
|
|
|
|
completion. Otherwise, <<posix_spawn>> and <<posix_spawnp>> return an
|
|
|
|
error number as the function return value to indicate the error; the
|
|
|
|
value stored into the variable pointed to by a non-NULL <<*<[pid]>>>
|
|
|
|
argument is unspecified.
|
|
|
|
|
|
|
|
PORTABILITY
|
|
|
|
POSIX.1-2008 requires <<posix_spawn>> and <<posix_spawnp>>.
|
|
|
|
|
2013-11-26 21:48:00 +08:00
|
|
|
Supporting OS subroutines required: <<_close>>, <<dup2>>, <<_fcntl>>,
|
|
|
|
<<_execve>>, <<execvpe>>, <<_exit>>, <<_open>>, <<sigaction>>,
|
|
|
|
<<sigprocmask>>, <<waitpid>>, <<sched_setscheduler>>,
|
2013-10-02 02:08:46 +08:00
|
|
|
<<sched_setparam>>, <<setegid>>, <<seteuid>>, <<setpgid>>, <<vfork>>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _NO_POSIX_SPAWN
|
|
|
|
|
|
|
|
#include <sys/cdefs.h>
|
|
|
|
|
|
|
|
#include <sys/signal.h>
|
|
|
|
#include <sys/queue.h>
|
|
|
|
#include <sys/wait.h>
|
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <sched.h>
|
|
|
|
#include <spawn.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
/* Only deal with a pointer to environ, to work around subtle bugs with shared
|
|
|
|
libraries and/or small data systems where the user declares his own
|
|
|
|
'environ'. */
|
|
|
|
static char ***p_environ = &environ;
|
|
|
|
|
|
|
|
struct __posix_spawnattr {
|
|
|
|
short sa_flags;
|
|
|
|
pid_t sa_pgroup;
|
|
|
|
struct sched_param sa_schedparam;
|
|
|
|
int sa_schedpolicy;
|
|
|
|
sigset_t sa_sigdefault;
|
|
|
|
sigset_t sa_sigmask;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct __posix_spawn_file_actions {
|
|
|
|
STAILQ_HEAD(, __posix_spawn_file_actions_entry) fa_list;
|
|
|
|
};
|
|
|
|
|
|
|
|
typedef struct __posix_spawn_file_actions_entry {
|
|
|
|
STAILQ_ENTRY(__posix_spawn_file_actions_entry) fae_list;
|
2023-04-19 05:47:28 +08:00
|
|
|
enum {
|
|
|
|
FAE_OPEN,
|
|
|
|
FAE_DUP2,
|
|
|
|
FAE_CLOSE,
|
|
|
|
FAE_CHDIR,
|
|
|
|
FAE_FCHDIR
|
|
|
|
} fae_action;
|
2013-10-02 02:08:46 +08:00
|
|
|
|
|
|
|
int fae_fildes;
|
|
|
|
union {
|
|
|
|
struct {
|
|
|
|
char *path;
|
|
|
|
#define fae_path fae_data.open.path
|
|
|
|
int oflag;
|
|
|
|
#define fae_oflag fae_data.open.oflag
|
|
|
|
mode_t mode;
|
|
|
|
#define fae_mode fae_data.open.mode
|
|
|
|
} open;
|
|
|
|
struct {
|
|
|
|
int newfildes;
|
|
|
|
#define fae_newfildes fae_data.dup2.newfildes
|
|
|
|
} dup2;
|
2023-04-19 05:47:28 +08:00
|
|
|
char *dir;
|
|
|
|
#define fae_dir fae_data.dir
|
|
|
|
int dirfd;
|
|
|
|
#define fae_dirfd fae_data.dirfd
|
2013-10-02 02:08:46 +08:00
|
|
|
} fae_data;
|
|
|
|
} posix_spawn_file_actions_entry_t;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Spawn routines
|
|
|
|
*/
|
|
|
|
|
|
|
|
static int
|
2017-12-04 10:25:16 +08:00
|
|
|
process_spawnattr(const posix_spawnattr_t sa)
|
2013-10-02 02:08:46 +08:00
|
|
|
{
|
|
|
|
struct sigaction sigact = { .sa_flags = 0, .sa_handler = SIG_DFL };
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* POSIX doesn't really describe in which order everything
|
|
|
|
* should be set. We'll just set them in the order in which they
|
|
|
|
* are mentioned.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Set process group */
|
|
|
|
if (sa->sa_flags & POSIX_SPAWN_SETPGROUP) {
|
|
|
|
if (setpgid(0, sa->sa_pgroup) != 0)
|
|
|
|
return (errno);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set scheduler policy */
|
|
|
|
if (sa->sa_flags & POSIX_SPAWN_SETSCHEDULER) {
|
|
|
|
if (sched_setscheduler(0, sa->sa_schedpolicy,
|
|
|
|
&sa->sa_schedparam) != 0)
|
|
|
|
return (errno);
|
|
|
|
} else if (sa->sa_flags & POSIX_SPAWN_SETSCHEDPARAM) {
|
|
|
|
if (sched_setparam(0, &sa->sa_schedparam) != 0)
|
|
|
|
return (errno);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Reset user ID's */
|
|
|
|
if (sa->sa_flags & POSIX_SPAWN_RESETIDS) {
|
|
|
|
if (setegid(getgid()) != 0)
|
|
|
|
return (errno);
|
|
|
|
if (seteuid(getuid()) != 0)
|
|
|
|
return (errno);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set signal masks/defaults */
|
|
|
|
if (sa->sa_flags & POSIX_SPAWN_SETSIGMASK) {
|
2013-11-26 21:48:00 +08:00
|
|
|
sigprocmask(SIG_SETMASK, &sa->sa_sigmask, NULL);
|
2013-10-02 02:08:46 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (sa->sa_flags & POSIX_SPAWN_SETSIGDEF) {
|
|
|
|
for (i = 1; i < NSIG; i++) {
|
|
|
|
if (sigismember(&sa->sa_sigdefault, i))
|
2013-11-26 21:48:00 +08:00
|
|
|
if (sigaction(i, &sigact, NULL) != 0)
|
2013-10-02 02:08:46 +08:00
|
|
|
return (errno);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
process_file_actions_entry(posix_spawn_file_actions_entry_t *fae)
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
switch (fae->fae_action) {
|
|
|
|
case FAE_OPEN:
|
|
|
|
/* Perform an open(), make it use the right fd */
|
|
|
|
fd = _open(fae->fae_path, fae->fae_oflag, fae->fae_mode);
|
|
|
|
if (fd < 0)
|
|
|
|
return (errno);
|
|
|
|
if (fd != fae->fae_fildes) {
|
2013-11-26 21:48:00 +08:00
|
|
|
if (dup2(fd, fae->fae_fildes) == -1)
|
2013-10-02 02:08:46 +08:00
|
|
|
return (errno);
|
|
|
|
if (_close(fd) != 0) {
|
|
|
|
if (errno == EBADF)
|
|
|
|
return (EBADF);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#ifdef HAVE_FCNTL
|
|
|
|
if (_fcntl(fae->fae_fildes, F_SETFD, 0) == -1)
|
|
|
|
return (errno);
|
|
|
|
#endif /* HAVE_FCNTL */
|
|
|
|
break;
|
|
|
|
case FAE_DUP2:
|
|
|
|
/* Perform a dup2() */
|
2013-11-26 21:48:00 +08:00
|
|
|
if (dup2(fae->fae_fildes, fae->fae_newfildes) == -1)
|
2013-10-02 02:08:46 +08:00
|
|
|
return (errno);
|
|
|
|
#ifdef HAVE_FCNTL
|
|
|
|
if (_fcntl(fae->fae_newfildes, F_SETFD, 0) == -1)
|
|
|
|
return (errno);
|
|
|
|
#endif /* HAVE_FCNTL */
|
|
|
|
break;
|
|
|
|
case FAE_CLOSE:
|
|
|
|
/* Perform a close(), do not fail if already closed */
|
|
|
|
(void)_close(fae->fae_fildes);
|
|
|
|
break;
|
2023-04-19 05:47:28 +08:00
|
|
|
#ifdef HAVE_CHDIR
|
|
|
|
case FAE_CHDIR:
|
|
|
|
/* Perform a chdir. */
|
|
|
|
if (chdir (fae->fae_dir) == -1)
|
|
|
|
return (errno);
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_FCHDIR
|
|
|
|
case FAE_FCHDIR:
|
|
|
|
/* Perform a chdir. */
|
|
|
|
if (fchdir (fae->fae_dirfd) == -1)
|
|
|
|
return (errno);
|
|
|
|
break;
|
2013-10-02 02:08:46 +08:00
|
|
|
}
|
2023-04-19 05:47:28 +08:00
|
|
|
#endif
|
2013-10-02 02:08:46 +08:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2017-12-04 10:25:16 +08:00
|
|
|
process_file_actions(const posix_spawn_file_actions_t fa)
|
2013-10-02 02:08:46 +08:00
|
|
|
{
|
|
|
|
posix_spawn_file_actions_entry_t *fae;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
/* Replay all file descriptor modifications */
|
|
|
|
STAILQ_FOREACH(fae, &fa->fa_list, fae_list) {
|
|
|
|
error = process_file_actions_entry(fae);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2020-08-02 03:35:58 +08:00
|
|
|
#ifdef __CYGWIN__
|
|
|
|
/* Cygwin's vfork does not follow BSD vfork semantics. Rather it's equivalent
|
|
|
|
to fork. While that's POSIX compliant, the below FreeBSD implementation
|
|
|
|
relying on BSD vfork semantics doesn't work as expected on Cygwin. The
|
|
|
|
following Cygwin-specific code handles the synchronization FreeBSD gets
|
|
|
|
for free by using vfork. */
|
|
|
|
|
|
|
|
extern int __posix_spawn_sem_create (void **semp);
|
|
|
|
extern void __posix_spawn_sem_release (void *sem, int error);
|
|
|
|
extern int __posix_spawn_sem_wait_and_close (void *sem, void *proc);
|
|
|
|
extern int __posix_spawn_fork (void **proc);
|
|
|
|
extern int __posix_spawn_execvpe (const char *path, char * const *argv,
|
|
|
|
char *const *envp, void *sem,
|
|
|
|
int use_env_path);
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
do_posix_spawn(pid_t *pid, const char *path,
|
|
|
|
const posix_spawn_file_actions_t *fa,
|
|
|
|
const posix_spawnattr_t *sa,
|
|
|
|
char * const argv[], char * const envp[], int use_env_path)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
void *sem, *proc;
|
|
|
|
pid_t p;
|
|
|
|
|
|
|
|
error = __posix_spawn_sem_create(&sem);
|
|
|
|
if (error)
|
|
|
|
return error;
|
|
|
|
|
|
|
|
p = __posix_spawn_fork(&proc);
|
|
|
|
switch (p) {
|
|
|
|
case -1:
|
|
|
|
return (errno);
|
|
|
|
case 0:
|
|
|
|
if (sa != NULL) {
|
|
|
|
error = process_spawnattr(*sa);
|
|
|
|
if (error) {
|
|
|
|
__posix_spawn_sem_release(sem, error);
|
|
|
|
_exit(127);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (fa != NULL) {
|
|
|
|
error = process_file_actions(*fa);
|
|
|
|
if (error) {
|
|
|
|
__posix_spawn_sem_release(sem, error);
|
|
|
|
_exit(127);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
__posix_spawn_execvpe(path, argv,
|
|
|
|
envp != NULL ? envp : *p_environ,
|
|
|
|
sem, use_env_path);
|
|
|
|
_exit(127);
|
|
|
|
default:
|
|
|
|
error = __posix_spawn_sem_wait_and_close(sem, proc);
|
|
|
|
if (error != 0)
|
|
|
|
waitpid(p, NULL, WNOHANG);
|
|
|
|
else if (pid != NULL)
|
|
|
|
*pid = p;
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#else
|
2013-10-02 02:08:46 +08:00
|
|
|
static int
|
2017-12-04 10:25:16 +08:00
|
|
|
do_posix_spawn(pid_t *pid, const char *path,
|
|
|
|
const posix_spawn_file_actions_t *fa,
|
|
|
|
const posix_spawnattr_t *sa,
|
|
|
|
char * const argv[], char * const envp[], int use_env_path)
|
2013-10-02 02:08:46 +08:00
|
|
|
{
|
|
|
|
pid_t p;
|
|
|
|
volatile int error = 0;
|
|
|
|
|
|
|
|
p = vfork();
|
|
|
|
switch (p) {
|
|
|
|
case -1:
|
|
|
|
return (errno);
|
|
|
|
case 0:
|
|
|
|
if (sa != NULL) {
|
|
|
|
error = process_spawnattr(*sa);
|
|
|
|
if (error)
|
|
|
|
_exit(127);
|
|
|
|
}
|
|
|
|
if (fa != NULL) {
|
|
|
|
error = process_file_actions(*fa);
|
|
|
|
if (error)
|
|
|
|
_exit(127);
|
|
|
|
}
|
|
|
|
if (use_env_path)
|
2013-11-26 21:48:00 +08:00
|
|
|
execvpe(path, argv, envp != NULL ? envp : *p_environ);
|
2013-10-02 02:08:46 +08:00
|
|
|
else
|
|
|
|
_execve(path, argv, envp != NULL ? envp : *p_environ);
|
|
|
|
error = errno;
|
|
|
|
_exit(127);
|
|
|
|
default:
|
|
|
|
if (error != 0)
|
2013-11-26 21:48:00 +08:00
|
|
|
waitpid(p, NULL, WNOHANG);
|
2013-10-02 02:08:46 +08:00
|
|
|
else if (pid != NULL)
|
|
|
|
*pid = p;
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
}
|
2020-08-02 03:35:58 +08:00
|
|
|
#endif
|
2013-10-02 02:08:46 +08:00
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawn (pid_t *pid,
|
2017-12-04 10:25:16 +08:00
|
|
|
const char *path,
|
|
|
|
const posix_spawn_file_actions_t *fa,
|
|
|
|
const posix_spawnattr_t *sa,
|
|
|
|
char * const argv[],
|
|
|
|
char * const envp[])
|
2013-10-02 02:08:46 +08:00
|
|
|
{
|
|
|
|
return do_posix_spawn(pid, path, fa, sa, argv, envp, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnp (pid_t *pid,
|
2017-12-04 10:25:16 +08:00
|
|
|
const char *path,
|
|
|
|
const posix_spawn_file_actions_t *fa,
|
|
|
|
const posix_spawnattr_t *sa,
|
|
|
|
char * const argv[],
|
|
|
|
char * const envp[])
|
2013-10-02 02:08:46 +08:00
|
|
|
{
|
|
|
|
return do_posix_spawn(pid, path, fa, sa, argv, envp, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* File descriptor actions
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawn_file_actions_init (posix_spawn_file_actions_t *ret)
|
2013-10-02 02:08:46 +08:00
|
|
|
{
|
|
|
|
posix_spawn_file_actions_t fa;
|
|
|
|
|
|
|
|
fa = malloc(sizeof(struct __posix_spawn_file_actions));
|
|
|
|
if (fa == NULL)
|
|
|
|
return (-1);
|
|
|
|
|
|
|
|
STAILQ_INIT(&fa->fa_list);
|
|
|
|
*ret = fa;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawn_file_actions_destroy (posix_spawn_file_actions_t *fa)
|
2013-10-02 02:08:46 +08:00
|
|
|
{
|
|
|
|
posix_spawn_file_actions_entry_t *fae;
|
|
|
|
|
|
|
|
while ((fae = STAILQ_FIRST(&(*fa)->fa_list)) != NULL) {
|
|
|
|
/* Remove file action entry from the queue */
|
|
|
|
STAILQ_REMOVE_HEAD(&(*fa)->fa_list, fae_list);
|
|
|
|
|
|
|
|
/* Deallocate file action entry */
|
2023-04-19 05:47:28 +08:00
|
|
|
switch (fae->fae_action) {
|
|
|
|
case FAE_OPEN:
|
2013-10-02 02:08:46 +08:00
|
|
|
free(fae->fae_path);
|
2023-04-19 05:47:28 +08:00
|
|
|
break;
|
|
|
|
#ifdef HAVE_CHDIR
|
|
|
|
case FAE_CHDIR:
|
|
|
|
free(fae->fae_dir);
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2013-10-02 02:08:46 +08:00
|
|
|
free(fae);
|
|
|
|
}
|
|
|
|
|
|
|
|
free(*fa);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawn_file_actions_addopen (posix_spawn_file_actions_t * __restrict fa,
|
2017-12-04 09:31:41 +08:00
|
|
|
int fildes,
|
2017-12-04 10:25:16 +08:00
|
|
|
const char * __restrict path,
|
2017-12-04 09:31:41 +08:00
|
|
|
int oflag,
|
2013-10-02 02:08:46 +08:00
|
|
|
mode_t mode)
|
|
|
|
{
|
|
|
|
posix_spawn_file_actions_entry_t *fae;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
if (fildes < 0)
|
|
|
|
return (EBADF);
|
|
|
|
|
|
|
|
/* Allocate object */
|
|
|
|
fae = malloc(sizeof(posix_spawn_file_actions_entry_t));
|
|
|
|
if (fae == NULL)
|
|
|
|
return (errno);
|
|
|
|
|
|
|
|
/* Set values and store in queue */
|
|
|
|
fae->fae_action = FAE_OPEN;
|
|
|
|
fae->fae_path = strdup(path);
|
|
|
|
if (fae->fae_path == NULL) {
|
|
|
|
error = errno;
|
|
|
|
free(fae);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
fae->fae_fildes = fildes;
|
|
|
|
fae->fae_oflag = oflag;
|
|
|
|
fae->fae_mode = mode;
|
|
|
|
|
|
|
|
STAILQ_INSERT_TAIL(&(*fa)->fa_list, fae, fae_list);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawn_file_actions_adddup2 (posix_spawn_file_actions_t *fa,
|
2017-12-04 09:31:41 +08:00
|
|
|
int fildes,
|
2013-10-02 02:08:46 +08:00
|
|
|
int newfildes)
|
|
|
|
{
|
|
|
|
posix_spawn_file_actions_entry_t *fae;
|
|
|
|
|
|
|
|
if (fildes < 0 || newfildes < 0)
|
|
|
|
return (EBADF);
|
|
|
|
|
|
|
|
/* Allocate object */
|
|
|
|
fae = malloc(sizeof(posix_spawn_file_actions_entry_t));
|
|
|
|
if (fae == NULL)
|
|
|
|
return (errno);
|
|
|
|
|
|
|
|
/* Set values and store in queue */
|
|
|
|
fae->fae_action = FAE_DUP2;
|
|
|
|
fae->fae_fildes = fildes;
|
|
|
|
fae->fae_newfildes = newfildes;
|
|
|
|
|
|
|
|
STAILQ_INSERT_TAIL(&(*fa)->fa_list, fae, fae_list);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawn_file_actions_addclose (posix_spawn_file_actions_t *fa,
|
2013-10-02 02:08:46 +08:00
|
|
|
int fildes)
|
|
|
|
{
|
|
|
|
posix_spawn_file_actions_entry_t *fae;
|
|
|
|
|
|
|
|
if (fildes < 0)
|
|
|
|
return (EBADF);
|
|
|
|
|
|
|
|
/* Allocate object */
|
|
|
|
fae = malloc(sizeof(posix_spawn_file_actions_entry_t));
|
|
|
|
if (fae == NULL)
|
|
|
|
return (errno);
|
|
|
|
|
|
|
|
/* Set values and store in queue */
|
|
|
|
fae->fae_action = FAE_CLOSE;
|
|
|
|
fae->fae_fildes = fildes;
|
|
|
|
|
|
|
|
STAILQ_INSERT_TAIL(&(*fa)->fa_list, fae, fae_list);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2023-04-19 05:47:28 +08:00
|
|
|
#ifdef HAVE_CHDIR
|
|
|
|
int
|
|
|
|
posix_spawn_file_actions_addchdir_np (
|
|
|
|
posix_spawn_file_actions_t * __restrict fa,
|
|
|
|
const char * __restrict path)
|
|
|
|
{
|
|
|
|
posix_spawn_file_actions_entry_t *fae;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
/* Allocate object */
|
|
|
|
fae = malloc(sizeof(posix_spawn_file_actions_entry_t));
|
|
|
|
if (fae == NULL)
|
|
|
|
return (errno);
|
|
|
|
|
|
|
|
/* Set values and store in queue */
|
|
|
|
fae->fae_action = FAE_CHDIR;
|
|
|
|
fae->fae_dir = strdup(path);
|
|
|
|
if (fae->fae_dir == NULL) {
|
|
|
|
error = errno;
|
|
|
|
free(fae);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
STAILQ_INSERT_TAIL(&(*fa)->fa_list, fae, fae_list);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef HAVE_FCHDIR
|
|
|
|
int
|
|
|
|
posix_spawn_file_actions_addfchdir_np (
|
|
|
|
posix_spawn_file_actions_t * __restrict fa,
|
|
|
|
int fd)
|
|
|
|
{
|
|
|
|
posix_spawn_file_actions_entry_t *fae;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
/* Allocate object */
|
|
|
|
fae = malloc(sizeof(posix_spawn_file_actions_entry_t));
|
|
|
|
if (fae == NULL)
|
|
|
|
return (errno);
|
|
|
|
|
|
|
|
/* Set values and store in queue */
|
|
|
|
fae->fae_action = FAE_FCHDIR;
|
|
|
|
fae->fae_dirfd = fd;
|
|
|
|
|
|
|
|
STAILQ_INSERT_TAIL(&(*fa)->fa_list, fae, fae_list);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2013-10-02 02:08:46 +08:00
|
|
|
/*
|
|
|
|
* Spawn attributes
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnattr_init (posix_spawnattr_t *ret)
|
2013-10-02 02:08:46 +08:00
|
|
|
{
|
|
|
|
posix_spawnattr_t sa;
|
|
|
|
|
|
|
|
sa = calloc(1, sizeof(struct __posix_spawnattr));
|
|
|
|
if (sa == NULL)
|
|
|
|
return (errno);
|
|
|
|
|
|
|
|
/* Set defaults as specified by POSIX, cleared above */
|
|
|
|
*ret = sa;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnattr_destroy (posix_spawnattr_t *sa)
|
2013-10-02 02:08:46 +08:00
|
|
|
{
|
|
|
|
free(*sa);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnattr_getflags (const posix_spawnattr_t * __restrict sa,
|
2013-10-02 02:08:46 +08:00
|
|
|
short * __restrict flags)
|
|
|
|
{
|
|
|
|
*flags = (*sa)->sa_flags;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnattr_getpgroup (const posix_spawnattr_t * __restrict sa,
|
2013-10-02 02:08:46 +08:00
|
|
|
pid_t * __restrict pgroup)
|
|
|
|
{
|
|
|
|
*pgroup = (*sa)->sa_pgroup;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnattr_getschedparam (const posix_spawnattr_t * __restrict sa,
|
2013-10-02 02:08:46 +08:00
|
|
|
struct sched_param * __restrict schedparam)
|
|
|
|
{
|
|
|
|
*schedparam = (*sa)->sa_schedparam;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnattr_getschedpolicy (const posix_spawnattr_t * __restrict sa,
|
2013-10-02 02:08:46 +08:00
|
|
|
int * __restrict schedpolicy)
|
|
|
|
{
|
|
|
|
*schedpolicy = (*sa)->sa_schedpolicy;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnattr_getsigdefault (const posix_spawnattr_t * __restrict sa,
|
2013-10-02 02:08:46 +08:00
|
|
|
sigset_t * __restrict sigdefault)
|
|
|
|
{
|
|
|
|
*sigdefault = (*sa)->sa_sigdefault;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnattr_getsigmask (const posix_spawnattr_t * __restrict sa,
|
2013-10-02 02:08:46 +08:00
|
|
|
sigset_t * __restrict sigmask)
|
|
|
|
{
|
|
|
|
*sigmask = (*sa)->sa_sigmask;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnattr_setflags (posix_spawnattr_t *sa,
|
2013-10-02 02:08:46 +08:00
|
|
|
short flags)
|
|
|
|
{
|
|
|
|
(*sa)->sa_flags = flags;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnattr_setpgroup (posix_spawnattr_t *sa,
|
2013-10-02 02:08:46 +08:00
|
|
|
pid_t pgroup)
|
|
|
|
{
|
|
|
|
(*sa)->sa_pgroup = pgroup;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnattr_setschedparam (posix_spawnattr_t * __restrict sa,
|
2017-12-04 10:25:16 +08:00
|
|
|
const struct sched_param * __restrict schedparam)
|
2013-10-02 02:08:46 +08:00
|
|
|
{
|
|
|
|
(*sa)->sa_schedparam = *schedparam;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnattr_setschedpolicy (posix_spawnattr_t *sa,
|
2013-10-02 02:08:46 +08:00
|
|
|
int schedpolicy)
|
|
|
|
{
|
|
|
|
(*sa)->sa_schedpolicy = schedpolicy;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnattr_setsigdefault (posix_spawnattr_t * __restrict sa,
|
2017-12-04 10:25:16 +08:00
|
|
|
const sigset_t * __restrict sigdefault)
|
2013-10-02 02:08:46 +08:00
|
|
|
{
|
|
|
|
(*sa)->sa_sigdefault = *sigdefault;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2017-12-04 11:43:30 +08:00
|
|
|
posix_spawnattr_setsigmask (posix_spawnattr_t * __restrict sa,
|
2017-12-04 10:25:16 +08:00
|
|
|
const sigset_t * __restrict sigmask)
|
2013-10-02 02:08:46 +08:00
|
|
|
{
|
|
|
|
(*sa)->sa_sigmask = *sigmask;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* !_NO_POSIX_SPAWN */
|