2000-02-18 03:38:33 +08:00
|
|
|
/* spawn.cc
|
|
|
|
|
2013-01-21 12:38:31 +08:00
|
|
|
Copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006,
|
2013-03-31 20:35:44 +08:00
|
|
|
2007, 2008, 2009, 2010, 2011, 2012, 2013 Red Hat, Inc.
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
|
|
|
|
2000-08-03 00:28:18 +08:00
|
|
|
#include "winsup.h"
|
2000-02-18 03:38:33 +08:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <unistd.h>
|
2012-02-08 01:15:07 +08:00
|
|
|
#include <process.h>
|
2000-02-18 03:38:33 +08:00
|
|
|
#include <sys/wait.h>
|
2000-07-28 01:30:51 +08:00
|
|
|
#include <wingdi.h>
|
|
|
|
#include <winuser.h>
|
2008-03-07 19:24:51 +08:00
|
|
|
#include <wchar.h>
|
2000-02-18 03:38:33 +08:00
|
|
|
#include <ctype.h>
|
2000-09-08 10:56:55 +08:00
|
|
|
#include <sys/cygwin.h>
|
2012-01-12 03:07:11 +08:00
|
|
|
#include "cygerrno.h"
|
2001-07-27 03:22:24 +08:00
|
|
|
#include "security.h"
|
2012-01-12 03:07:11 +08:00
|
|
|
#include "sigproc.h"
|
|
|
|
#include "pinfo.h"
|
2003-09-20 08:43:33 +08:00
|
|
|
#include "path.h"
|
* devices.cc: New file.
* devices.gperf: New file.
* devices.shilka: New file.
* cygwin-gperf: New file.
* cygwin-shilka: New file.
* fhandler_fifo.cc: New file.
* fhandler_nodevice.cc : New file. Reorganize headers so that path.h precedes
fhandler.h throughout. Remove device argument and unit arguments from fhandler
constructors throughout. Remove pc arguments to fhandler functions and use
internal pc element instead, throughout. Use dev element in pc throughout.
Use major/minor elements rather than units and device numbers previously in
fhandler class. Use correct methods for fhandler file names rather than
directly accessing file name variables, throughout.
* Makefile.in (DLL_OFILES): Add devices.o, fhandler_fifo.o
* dcrt0.cc (dll_crt0_1): Call device::init.
* devices.h: Renumber devices based on more Linux-like major/minor numbers.
Add more devices. Declare standard device storage.
(device): Declare struct.
* dir.cc (opendir): Use new 'build_fh_name' to construct a fhandler_* type.
* dtable.cc (dtable::get_debugger_info): Ditto.
(cygwin_attach_handle_to_fd): Ditto.
(dtable::release): Remove special FH_SOCKET case in favor of generic
"need_fixup_before" test.
(dtable::init_std_file_from_handle): Use either build_fh_dev or build_fh_name
to build standard fhandler.
(dtable::build_fh_name): Renamed from dtable::build_fhandler_from_name. Move
out of dtable class. Don't accept a path_conv argument. Just build it here
and pass it to:
(build_fh_pc): Renamed from dtable::build_fhandler. Move out of dtable class.
Use intrinsic device type in path_conv to create new fhandler.
(build_fh_dev): Renamed from dtable::build_fhandler. Move out of dtable class.
Simplify arguments to just take new 'device' type and a name. Just return
pointer to fhandler rather than trying to insert into dtable.
(dtable::dup_worker): Accommodate above build_fh name changes.
(dtable::find_fifo): New (currently broken) function.
(handle_to_fn): Use strechr for efficiency.
* dtable.h: Reflect above build_fh name changes and argument differences.
(fhandler_base *&operator []): Return self rather than copy of self.
* fhandler.cc (fhandler_base::operator =): Use pc element to set normalized
path.
(fhandler_base::set_name): Ditto.
(fhandler_base::raw_read): Use method to access name.
(fhandler_base::write): Correctly use get_output_handle rather than get_handle.
(handler_base::device_access_denied): New function.
(fhandler_base::open): Eliminate pc argument and use pc element of
fhandler_base throughout.
(fhandler_base::fstat): Detect if device is based in filesystem and use
fstat_fs to calculate stat, if so.
(fhandler_base::fhandler_base): Eliminate handling of file names and, instead,
just free appropriate component from pc.
(fhandler_base::opendir): Remove path_conv parameter.
* fhandler.h: Remove all device flags.
(fhandler_base::pc): New element.
(fhandler_base::set_name): Change argument to path_conv.
(fhandler_base::error): New function.
(fhandler_base::exists): New function.
(fhandler_base::pc_binmode): New function.
(fhandler_base::dev): New function.
(fhandler_base::open_fs): New function.
(fhandler_base::fstat_fs): New function.
(fhandler_base::fstat_by_name): New function.
(fhandler_base::fstat_by_handle): New function.
(fhandler_base::isfifo): New function.
(fhandler_base::is_slow): New function.
(fhandler_base::is_auto_device): New function.
(fhandler_base::is_fs_special): New function.
(fhandler_base::device_access_denied): New function.
(fhandler_base::operator DWORD&): New operator.
(fhandler_base::get_name): Return normalized path from pc.
(fhandler_base::get_win32_name): Return windows path from pc.
(fhandler_base::isdevice): Renamed from is_device.
(fhandler_base::get_native_name): Return device format.
(fhandler_fifo): New class.
(fhandler_nodevice): New class.
(select_stuff::device_specific): Remove array.
(select_stuff::device_specific_pipe): New class element.
(select_stuff::device_specific_socket): New class element.
(select_stuff::device_specific_serial): New class element.
(select_stuff::select_stuff): Initialize new elements.
* fhandler_disk_file.cc (fhandler_base::fstat_by_handle): Move to base class
from fhandler_disk_file.
(fhandler_base::fstat_by_name): Ditto.
(fhandler_base::fstat_by_name): Ditto.
(fhandler_disk_file::open): Move most functionality into
fhandler_base::open_fs.
(fhandler_base::open_fs): New function.
(fhandler_disk_file::close): Move most functionality into
fhandler_base::close_fs.
(fhandler_base::close_fs): New function.
* fhandler_mem.cc (fhandler_dev_mem::open): Use device name in debugging
output.
* fhandler_socket.cc (fhandler_socket::set_connect_secret): Copy standard
urandom device into appropriate place.
(fhandler_socket::accept): Reflect change in fdsock return value.
* fhandler_tty.cc: See "throughouts" above.
* net.cc: Accommodate fdsock change throughout.
(fdsock): Return success or failure, accept fd argument and device argument.
* path.cc (symlink_info::major): New element.
(symlink_info::minor): New element.
(symlink_info::parse_device): Declare new function.
(fs_info::update): Accommodate changes in path_conv class.
(path_conv::fillin): Ditto.
(path_conv::return_and_clear_normalized_path): Eliminate.
(path_conv::set_normalized_path): New function.
(path_conv::path_conv): Set info in dev element. Use path_conv methods Check
for FH_FS rather than FH_BAD to indicate when to fill in filesystem stuff.
where appropriate rather than direct access. Use set_normalized_path to set
normalized path.
(windows_device_names): Eliminate.
(get_dev): Ditto.
(get_raw_device_number): Ditto.
(get_device_number): Ditto.
(win32_device_name): Call new device name parser to do most of the heavy
lifting.
(mount_info::conv_to_win32_path): Fill in dev field as appropriate.
(symlink_worker): Handle new device files.
(symlink_info::check): Ditto.
(symlink_info::parse_device): Define new function.
* path.h (executable_states): Move here from fhandler.h.
(fs_info): Rename variables to *_storage and create methods for accessing same.
(path_conv): Add dev element, remove devn and unit and adjust inline methods to
accommodate.
(set_normalized_path): Declare new function.
* pinfo.cc (_pinfo::commune_recv): Add broken support for handling fifos.
(_pinfo::commune_send): Ditto.
* pipe.cc (fhandler_pipe::close): check for existence of handle before closing
it.
(handler_pipe::create): Rename from make_pipe. Change arguments to accept
fhandler_pipe array. Accommodate fifos.
(pipe): Rework to deal with fhandler_pipe::create changes.
(_pipe): Ditto.
* select.cc: Use individual device_specific types throughout rather than
indexing with obsolete device number.
(set_bits): Use is_socket call rather than checking device number.
* shared_info.h (CURR_MOUNT_MAGIC): Update.
(conv_to_win32_path): Reflect addition of device argument.
* syscalls.cc (mknod_worker): New function.
(open): Use build_fh_name to build fhandler.
(chown_worker): Detect if this is an 'auto' device rather than an on-filesystem
device and handle appropriately.
(chmod_device): New function.
(chmod): Detect if this is an 'auto' device rather than an on-filesystem device
and handle appropriately. Use chmod_device to set mode of in-filesystem
devices.
(stat_worker): Eliminate path_conv argument. Call build_fh_name to construct
fhandler. Use fh->error() rather than pc->error to detect errors in fhandler
construction.
(access_worker): New function pulled from access. Accommodate in-filesystem
devices.
(access): Use access_worker.
(fpathconf): Detect if this is an 'auto' device rather than an on-filesystem
device and handle appropriately.
(mknod_worker): New function.
(mknod32): New function.
(chroot): Free normalized path -- assuming it was actually cmalloced.
* tty.cc (create_tty_master): Tweak for new device class.
(tty::common_init): Ditto.
* winsup.h (stat_worker): Remove.
(symlink_worker): Declare.
* exceptions.cc (set_process_mask): Just call sig_dispatch_pending and don't
worry about pending_signals since sig_dispatch_pending should always do the
right thing now.
(sig_handle): Reorganize SIGCONT handling to more closely conform to SUSv3.
* pinfo.h: Move __SIG enum to sigproc.h.
(PICOM_FIFO): New enum element.
(_pinfo): Remove 'thread2signal' stuff throughout class.
(_pinfo::commune_send): Make varargs.
(_pinfo::sigtodo): Eliminate.
(_pinfo::thread2signal): Ditto.
* signal.cc (kill_worker): Eliminate call to setthread2signal.
* sigproc.cc (local_sigtodo): Eliminate.
(getlocal_sigtodo): Ditto.
(sigelem): New class.
(pending_signals): New class.
(sigqueue): New variable, start of sigqueue linked list.
(sigcatch_nonmain): Eliminate.
(sigcatch_main): Eliminate.
(sigcatch_nosync): Eliminate.
(sigcomplete_nonmain): Eliminate.
(pending_signals): Eliminate.
(sig_clear): Call signal thread to clear pending signals, unless already in
signal thread.
(sigpending): Call signal thread to get pending signals.
(sig_dispatch_pending): Eliminate use of pending_signals and just check
sigqueue.
(sigproc_terminate): Eliminate all of the obsolete semaphore stuff. Close
signal pipe handle.
(sig_send): Eliminate all of the obsolete semaphore stuff and use pipe to send
signals.
(getevent): Eliminate.
(pending_signals::add): New function.
(pending_signals::del): New function.
(pending_signals::next): New function.
(wait_sig): Eliminate all of the obsolete semaphore stuff. Use pipe to
communicate and maintain a linked list of signals.
* sigproc.h: Move __SIG defines here. Add __SIGPENDING.
(sig_dispatch_pending): Remove "C" specifier.
(sig_handle): Accept a mask argument.
* thread.cc: Remove signal handling considerations throughout.
2003-09-25 08:37:18 +08:00
|
|
|
#include "fhandler.h"
|
2000-08-12 13:35:42 +08:00
|
|
|
#include "dtable.h"
|
2000-09-07 05:03:10 +08:00
|
|
|
#include "cygheap.h"
|
2000-09-02 04:54:22 +08:00
|
|
|
#include "child_info.h"
|
2000-09-08 10:56:55 +08:00
|
|
|
#include "environ.h"
|
2005-07-17 08:51:03 +08:00
|
|
|
#include "cygtls.h"
|
2008-03-07 19:24:51 +08:00
|
|
|
#include "tls_pbuf.h"
|
2006-04-12 23:53:22 +08:00
|
|
|
#include "winf.h"
|
2007-07-19 16:36:32 +08:00
|
|
|
#include "ntdll.h"
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2013-04-23 17:44:36 +08:00
|
|
|
static const suffix_info exe_suffixes[] =
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2006-02-04 05:33:09 +08:00
|
|
|
suffix_info ("", 1),
|
|
|
|
suffix_info (".exe", 1),
|
2006-02-01 05:49:39 +08:00
|
|
|
suffix_info (".com"),
|
|
|
|
suffix_info (NULL)
|
|
|
|
};
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Add .exe to PROG if not already present and see if that exists.
|
|
|
|
If not, return PROG (converted from posix to win32 rules if necessary).
|
|
|
|
The result is always BUF.
|
|
|
|
|
|
|
|
Returns (possibly NULL) suffix */
|
|
|
|
|
|
|
|
static const char *
|
2006-02-01 05:49:39 +08:00
|
|
|
perhaps_suffix (const char *prog, path_conv& buf, int& err, unsigned opt)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2009-08-02 03:52:46 +08:00
|
|
|
const char *ext;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-08-25 02:26:14 +08:00
|
|
|
err = 0;
|
2000-02-18 03:38:33 +08:00
|
|
|
debug_printf ("prog '%s'", prog);
|
2006-02-01 05:49:39 +08:00
|
|
|
buf.check (prog, PC_SYM_FOLLOW | PC_NULLEMPTY,
|
2009-11-05 17:59:18 +08:00
|
|
|
(opt & FE_DLL) ? stat_suffixes : exe_suffixes);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-08-25 02:26:14 +08:00
|
|
|
if (buf.isdir ())
|
|
|
|
{
|
|
|
|
err = EACCES;
|
|
|
|
ext = NULL;
|
|
|
|
}
|
|
|
|
else if (!buf.exists ())
|
|
|
|
{
|
|
|
|
err = ENOENT;
|
|
|
|
ext = NULL;
|
|
|
|
}
|
2000-04-26 13:13:32 +08:00
|
|
|
else if (buf.known_suffix)
|
2007-08-16 23:07:42 +08:00
|
|
|
ext = buf.get_win32 () + (buf.known_suffix - buf.get_win32 ());
|
2000-02-18 03:38:33 +08:00
|
|
|
else
|
2007-08-16 23:07:42 +08:00
|
|
|
ext = strchr (buf.get_win32 (), '\0');
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2007-08-16 23:07:42 +08:00
|
|
|
debug_printf ("buf %s, suffix found '%s'", (char *) buf.get_win32 (), ext);
|
2000-02-18 03:38:33 +08:00
|
|
|
return ext;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Find an executable name, possibly by appending known executable
|
|
|
|
suffixes to it. The win32-translated name is placed in 'buf'.
|
|
|
|
Any found suffix is returned in known_suffix.
|
|
|
|
|
|
|
|
If the file is not found and !null_if_not_found then the win32 version
|
|
|
|
of name is placed in buf and returned. Otherwise the contents of buf
|
|
|
|
is undefined and NULL is returned. */
|
|
|
|
|
2013-05-01 09:20:37 +08:00
|
|
|
const char * __reg3
|
2000-04-26 13:13:32 +08:00
|
|
|
find_exec (const char *name, path_conv& buf, const char *mywinenv,
|
2001-10-31 08:55:32 +08:00
|
|
|
unsigned opt, const char **known_suffix)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
|
|
|
const char *suffix = "";
|
|
|
|
debug_printf ("find_exec (%s)", name);
|
2009-08-01 11:27:51 +08:00
|
|
|
const char *retval;
|
2008-03-11 21:26:40 +08:00
|
|
|
tmp_pathbuf tp;
|
|
|
|
char *tmp = tp.c_get ();
|
2001-10-31 08:55:32 +08:00
|
|
|
const char *posix = (opt & FE_NATIVE) ? NULL : name;
|
2010-03-30 01:15:51 +08:00
|
|
|
bool has_slash = !!strpbrk (name, "/\\");
|
2005-08-25 02:26:14 +08:00
|
|
|
int err;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
/* Check to see if file can be opened as is first.
|
|
|
|
Win32 systems always check . first, but PATH may not be set up to
|
|
|
|
do this. */
|
2001-10-31 08:55:32 +08:00
|
|
|
if ((has_slash || opt & FE_CWD)
|
2006-02-01 05:49:39 +08:00
|
|
|
&& (suffix = perhaps_suffix (name, buf, err, opt)) != NULL)
|
2001-10-31 08:55:32 +08:00
|
|
|
{
|
|
|
|
if (posix && !has_slash)
|
|
|
|
{
|
|
|
|
tmp[0] = '.';
|
|
|
|
tmp[1] = '/';
|
|
|
|
strcpy (tmp + 2, name);
|
|
|
|
posix = tmp;
|
|
|
|
}
|
2009-08-01 11:27:51 +08:00
|
|
|
retval = buf.get_win32 ();
|
2001-10-31 08:55:32 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
win_env *winpath;
|
|
|
|
const char *path;
|
2001-10-31 08:55:32 +08:00
|
|
|
const char *posix_path;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-05-22 11:54:29 +08:00
|
|
|
posix = (opt & FE_NATIVE) ? NULL : tmp;
|
|
|
|
|
|
|
|
if (strchr (mywinenv, '/'))
|
|
|
|
{
|
|
|
|
/* it's not really an environment variable at all */
|
2008-03-12 20:41:50 +08:00
|
|
|
int n = cygwin_conv_path_list (CCP_POSIX_TO_WIN_A, mywinenv, NULL, 0);
|
|
|
|
char *s = (char *) alloca (n);
|
|
|
|
if (cygwin_conv_path_list (CCP_POSIX_TO_WIN_A, mywinenv, s, n))
|
2005-05-22 11:54:29 +08:00
|
|
|
goto errout;
|
|
|
|
path = s;
|
|
|
|
posix_path = mywinenv - 1;
|
|
|
|
}
|
|
|
|
else if (has_slash || strchr (name, '\\') || isdrive (name)
|
2004-06-03 05:20:54 +08:00
|
|
|
|| !(winpath = getwinenv (mywinenv))
|
|
|
|
|| !(path = winpath->get_native ()) || *path == '\0')
|
2005-05-22 11:54:29 +08:00
|
|
|
/* Return the error condition if this is an absolute path or if there
|
|
|
|
is no PATH to search. */
|
2000-02-18 03:38:33 +08:00
|
|
|
goto errout;
|
2005-05-22 11:54:29 +08:00
|
|
|
else
|
|
|
|
posix_path = winpath->get_posix () - 1;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
debug_printf ("%s%s", mywinenv, path);
|
2006-02-16 06:11:13 +08:00
|
|
|
/* Iterate over the specified path, looking for the file with and without
|
|
|
|
executable extensions. */
|
2000-02-18 03:38:33 +08:00
|
|
|
do
|
|
|
|
{
|
2001-10-31 08:55:32 +08:00
|
|
|
posix_path++;
|
2000-02-18 03:38:33 +08:00
|
|
|
char *eotmp = strccpy (tmp, &path, ';');
|
|
|
|
/* An empty path or '.' means the current directory, but we've
|
|
|
|
already tried that. */
|
2001-10-31 08:55:32 +08:00
|
|
|
if (opt & FE_CWD && (tmp[0] == '\0' || (tmp[0] == '.' && tmp[1] == '\0')))
|
2000-02-18 03:38:33 +08:00
|
|
|
continue;
|
|
|
|
|
|
|
|
*eotmp++ = '\\';
|
|
|
|
strcpy (eotmp, name);
|
|
|
|
|
|
|
|
debug_printf ("trying %s", tmp);
|
|
|
|
|
2010-04-28 07:06:48 +08:00
|
|
|
int err1;
|
|
|
|
|
|
|
|
if ((suffix = perhaps_suffix (tmp, buf, err1, opt)) != NULL)
|
2001-10-31 08:55:32 +08:00
|
|
|
{
|
2009-09-25 21:44:45 +08:00
|
|
|
if (buf.has_acls () && check_file_access (buf, X_OK, true))
|
2006-02-01 05:09:43 +08:00
|
|
|
continue;
|
|
|
|
|
2001-10-31 08:55:32 +08:00
|
|
|
if (posix == tmp)
|
|
|
|
{
|
|
|
|
eotmp = strccpy (tmp, &posix_path, ':');
|
|
|
|
if (eotmp == tmp)
|
|
|
|
*eotmp++ = '.';
|
|
|
|
*eotmp++ = '/';
|
|
|
|
strcpy (eotmp, name);
|
|
|
|
}
|
2009-08-01 11:36:44 +08:00
|
|
|
retval = buf.get_win32 ();
|
2001-10-31 08:55:32 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2001-10-31 08:55:32 +08:00
|
|
|
while (*path && *++path && (posix_path = strchr (posix_path, ':')));
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-08-23 01:50:22 +08:00
|
|
|
errout:
|
2001-10-31 08:55:32 +08:00
|
|
|
posix = NULL;
|
2000-02-18 03:38:33 +08:00
|
|
|
/* Couldn't find anything in the given path.
|
|
|
|
Take the appropriate action based on null_if_not_found. */
|
2001-10-31 08:55:32 +08:00
|
|
|
if (opt & FE_NNF)
|
2000-02-18 03:38:33 +08:00
|
|
|
retval = NULL;
|
2009-08-01 11:27:51 +08:00
|
|
|
else if (!(opt & FE_NATIVE))
|
2002-03-22 11:24:30 +08:00
|
|
|
retval = name;
|
2009-08-01 11:27:51 +08:00
|
|
|
else
|
|
|
|
{
|
|
|
|
buf.check (name);
|
|
|
|
retval = buf.get_win32 ();
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-08-23 01:50:22 +08:00
|
|
|
out:
|
2001-10-31 08:55:32 +08:00
|
|
|
if (posix)
|
2009-08-02 01:55:58 +08:00
|
|
|
retval = buf.set_path (posix);
|
2007-08-16 23:07:42 +08:00
|
|
|
debug_printf ("%s = find_exec (%s)", (char *) buf.get_win32 (), name);
|
2000-02-18 03:38:33 +08:00
|
|
|
if (known_suffix)
|
2007-08-16 23:07:42 +08:00
|
|
|
*known_suffix = suffix ?: strchr (buf.get_win32 (), '\0');
|
2005-08-25 02:26:14 +08:00
|
|
|
if (!retval && err)
|
|
|
|
set_errno (err);
|
2000-02-18 03:38:33 +08:00
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2011-11-14 09:29:49 +08:00
|
|
|
/* Utility for child_info_spawn::worker. */
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
static HANDLE
|
2006-12-12 02:55:29 +08:00
|
|
|
handle (int fd, bool writing)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2005-12-19 12:34:13 +08:00
|
|
|
HANDLE h;
|
|
|
|
cygheap_fdget cfd (fd);
|
|
|
|
|
|
|
|
if (cfd < 0)
|
|
|
|
h = INVALID_HANDLE_VALUE;
|
|
|
|
else if (cfd->close_on_exec ())
|
|
|
|
h = INVALID_HANDLE_VALUE;
|
2006-12-12 02:55:29 +08:00
|
|
|
else if (!writing)
|
2005-12-19 12:34:13 +08:00
|
|
|
h = cfd->get_handle ();
|
|
|
|
else
|
|
|
|
h = cfd->get_output_handle ();
|
2006-12-12 02:55:29 +08:00
|
|
|
|
2005-12-19 12:34:13 +08:00
|
|
|
return h;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
iscmd (const char *argv0, const char *what)
|
|
|
|
{
|
|
|
|
int n;
|
|
|
|
n = strlen (argv0) - strlen (what);
|
|
|
|
if (n >= 2 && argv0[1] != ':')
|
|
|
|
return 0;
|
2000-07-02 01:30:35 +08:00
|
|
|
return n >= 0 && strcasematch (argv0 + n, what) &&
|
2000-02-18 03:38:33 +08:00
|
|
|
(n == 0 || isdirsep (argv0[n - 1]));
|
|
|
|
}
|
|
|
|
|
2013-05-04 03:39:01 +08:00
|
|
|
#define ILLEGAL_SIG_FUNC_PTR ((_sig_func_ptr) (-2))
|
|
|
|
struct system_call_handle
|
2003-09-21 03:51:48 +08:00
|
|
|
{
|
|
|
|
_sig_func_ptr oldint;
|
|
|
|
_sig_func_ptr oldquit;
|
|
|
|
sigset_t oldmask;
|
2013-05-04 03:39:01 +08:00
|
|
|
bool is_system_call ()
|
|
|
|
{
|
|
|
|
return oldint != ILLEGAL_SIG_FUNC_PTR;
|
|
|
|
}
|
|
|
|
system_call_handle (bool issystem)
|
2013-05-01 07:51:08 +08:00
|
|
|
{
|
|
|
|
if (!issystem)
|
2013-05-04 03:39:01 +08:00
|
|
|
oldint = ILLEGAL_SIG_FUNC_PTR;
|
2013-05-01 07:51:08 +08:00
|
|
|
else
|
2013-05-04 03:39:01 +08:00
|
|
|
{
|
|
|
|
sig_send (NULL, __SIGHOLD);
|
|
|
|
oldint = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
void arm()
|
|
|
|
{
|
|
|
|
if (is_system_call ())
|
2013-05-01 07:51:08 +08:00
|
|
|
{
|
|
|
|
sigset_t child_block;
|
|
|
|
oldint = signal (SIGINT, SIG_IGN);
|
|
|
|
oldquit = signal (SIGQUIT, SIG_IGN);
|
|
|
|
sigemptyset (&child_block);
|
|
|
|
sigaddset (&child_block, SIGCHLD);
|
|
|
|
sigprocmask (SIG_BLOCK, &child_block, &oldmask);
|
|
|
|
sig_send (NULL, __SIGNOHOLD);
|
|
|
|
}
|
|
|
|
}
|
2013-05-04 03:39:01 +08:00
|
|
|
~system_call_handle ()
|
2013-05-01 07:51:08 +08:00
|
|
|
{
|
2013-05-04 03:39:01 +08:00
|
|
|
if (is_system_call ())
|
2013-05-01 07:51:08 +08:00
|
|
|
{
|
|
|
|
signal (SIGINT, oldint);
|
|
|
|
signal (SIGQUIT, oldquit);
|
|
|
|
sigprocmask (SIG_SETMASK, &oldmask, NULL);
|
|
|
|
}
|
|
|
|
}
|
2003-09-21 03:51:48 +08:00
|
|
|
# undef cleanup
|
2013-05-01 07:51:08 +08:00
|
|
|
};
|
2003-09-21 03:51:48 +08:00
|
|
|
|
2012-01-08 14:24:17 +08:00
|
|
|
child_info_spawn NO_COPY ch_spawn;
|
2003-09-21 03:51:48 +08:00
|
|
|
|
2009-01-03 13:12:22 +08:00
|
|
|
int
|
2011-11-14 09:29:49 +08:00
|
|
|
child_info_spawn::worker (const char *prog_arg, const char *const *argv,
|
|
|
|
const char *const envp[], int mode,
|
|
|
|
int in__stdin, int in__stdout)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2003-12-08 06:37:12 +08:00
|
|
|
bool rc;
|
2000-07-30 00:24:59 +08:00
|
|
|
pid_t cygpid;
|
2005-08-12 00:13:30 +08:00
|
|
|
int res = -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2011-01-19 17:15:17 +08:00
|
|
|
/* Check if we have been called from exec{lv}p or spawn{lv}p and mask
|
|
|
|
mode to keep only the spawn mode. */
|
|
|
|
bool p_type_exec = !!(mode & _P_PATH_TYPE_EXEC);
|
|
|
|
mode = _P_MODE (mode);
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
if (prog_arg == NULL)
|
|
|
|
{
|
|
|
|
syscall_printf ("prog_arg is NULL");
|
2009-12-21 23:16:28 +08:00
|
|
|
set_errno (EFAULT); /* As on Linux. */
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (!prog_arg[0])
|
|
|
|
{
|
|
|
|
syscall_printf ("prog_arg is empty");
|
|
|
|
set_errno (ENOENT); /* Per POSIX */
|
2000-02-18 03:38:33 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-11-14 09:29:49 +08:00
|
|
|
syscall_printf ("mode = %d, prog_arg = %.9500s", mode, prog_arg);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2009-12-21 23:16:28 +08:00
|
|
|
/* FIXME: This is no error condition on Linux. */
|
2000-02-18 03:38:33 +08:00
|
|
|
if (argv == NULL)
|
|
|
|
{
|
|
|
|
syscall_printf ("argv is NULL");
|
2001-03-19 04:58:18 +08:00
|
|
|
set_errno (EINVAL);
|
2002-10-09 12:08:05 +08:00
|
|
|
return -1;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2005-08-12 00:13:30 +08:00
|
|
|
av newargv;
|
2013-07-20 01:28:34 +08:00
|
|
|
linebuf cmd;
|
2008-03-07 19:24:51 +08:00
|
|
|
PWCHAR envblock = NULL;
|
2005-08-12 00:13:30 +08:00
|
|
|
path_conv real_path;
|
|
|
|
bool reset_sendsig = false;
|
2000-09-03 12:16:35 +08:00
|
|
|
|
2008-03-07 19:24:51 +08:00
|
|
|
tmp_pathbuf tp;
|
|
|
|
PWCHAR runpath = tp.w_get ();
|
2006-07-18 03:30:30 +08:00
|
|
|
int c_flags;
|
|
|
|
|
2005-08-12 00:13:30 +08:00
|
|
|
bool null_app_name = false;
|
2009-01-09 13:18:02 +08:00
|
|
|
STARTUPINFOW si = {};
|
2006-03-19 03:17:21 +08:00
|
|
|
int looped = 0;
|
2000-09-03 12:16:35 +08:00
|
|
|
|
2005-08-12 00:13:30 +08:00
|
|
|
myfault efault;
|
2013-05-04 03:39:01 +08:00
|
|
|
system_call_handle system_call (mode == _P_SYSTEM);
|
2005-09-15 07:03:44 +08:00
|
|
|
if (efault.faulted ())
|
2005-08-12 00:13:30 +08:00
|
|
|
{
|
2005-09-15 07:03:44 +08:00
|
|
|
if (get_errno () == ENOMEM)
|
|
|
|
set_errno (E2BIG);
|
|
|
|
else
|
|
|
|
set_errno (EFAULT);
|
2005-08-12 00:13:30 +08:00
|
|
|
res = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2004-12-06 03:41:26 +08:00
|
|
|
child_info_types chtype;
|
2012-03-17 04:20:29 +08:00
|
|
|
if (mode == _P_OVERLAY)
|
2011-11-14 09:29:49 +08:00
|
|
|
chtype = _CH_EXEC;
|
2012-03-17 04:20:29 +08:00
|
|
|
else
|
2012-03-20 23:07:30 +08:00
|
|
|
chtype = _CH_SPAWN;
|
2000-10-14 13:52:38 +08:00
|
|
|
|
2011-11-16 12:09:33 +08:00
|
|
|
moreinfo = cygheap_exec_info::alloc ();
|
2000-09-03 12:16:35 +08:00
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
/* CreateProcess takes one long string that is the command line (sigh).
|
|
|
|
We need to quote any argument that has whitespace or embedded "'s. */
|
|
|
|
|
2000-09-03 12:16:35 +08:00
|
|
|
int ac;
|
|
|
|
for (ac = 0; argv[ac]; ac++)
|
2000-02-18 03:38:33 +08:00
|
|
|
/* nothing */;
|
|
|
|
|
2006-01-10 10:39:22 +08:00
|
|
|
int err;
|
|
|
|
const char *ext;
|
2006-02-01 05:49:39 +08:00
|
|
|
if ((ext = perhaps_suffix (prog_arg, real_path, err, FE_NADA)) == NULL)
|
2006-01-10 10:39:22 +08:00
|
|
|
{
|
|
|
|
set_errno (err);
|
|
|
|
res = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2013-06-20 00:00:43 +08:00
|
|
|
res = newargv.setup (prog_arg, real_path, ext, ac, argv, p_type_exec);
|
2008-11-27 01:21:04 +08:00
|
|
|
|
2009-06-22 23:40:59 +08:00
|
|
|
if (res)
|
|
|
|
goto out;
|
|
|
|
|
2011-11-14 09:29:49 +08:00
|
|
|
if (!real_path.iscygexec () && ::cygheap->cwd.get_error ())
|
2008-03-11 20:34:08 +08:00
|
|
|
{
|
2010-08-13 19:51:54 +08:00
|
|
|
small_printf ("Error: Current working directory %s.\n"
|
2008-03-11 20:34:08 +08:00
|
|
|
"Can't start native Windows application from here.\n\n",
|
2011-11-14 09:29:49 +08:00
|
|
|
::cygheap->cwd.get_error_desc ());
|
|
|
|
set_errno (::cygheap->cwd.get_error ());
|
2008-03-11 20:34:08 +08:00
|
|
|
res = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
2006-01-10 10:39:22 +08:00
|
|
|
|
2012-11-30 15:11:19 +08:00
|
|
|
if (ac == 3 && argv[1][0] == '/' && tolower (argv[1][1]) == 'c' &&
|
2000-02-18 03:38:33 +08:00
|
|
|
(iscmd (argv[0], "command.com") || iscmd (argv[0], "cmd.exe")))
|
|
|
|
{
|
2000-10-20 12:20:21 +08:00
|
|
|
real_path.check (prog_arg);
|
2013-07-20 01:28:34 +08:00
|
|
|
cmd.add ("\"");
|
2000-10-20 12:20:21 +08:00
|
|
|
if (!real_path.error)
|
2013-07-20 01:28:34 +08:00
|
|
|
cmd.add (real_path.get_win32 ());
|
2000-10-20 12:20:21 +08:00
|
|
|
else
|
2013-07-20 01:28:34 +08:00
|
|
|
cmd.add (argv[0]);
|
|
|
|
cmd.add ("\"");
|
|
|
|
cmd.add (" ");
|
|
|
|
cmd.add (argv[1]);
|
|
|
|
cmd.add (" ");
|
|
|
|
cmd.add (argv[2]);
|
2009-08-02 01:55:58 +08:00
|
|
|
real_path.set_path (argv[0]);
|
2005-08-12 00:13:30 +08:00
|
|
|
null_app_name = true;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2000-09-03 12:16:35 +08:00
|
|
|
else
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2013-06-19 22:39:00 +08:00
|
|
|
if (real_path.iscygexec ())
|
2013-06-20 00:00:43 +08:00
|
|
|
{
|
|
|
|
moreinfo->argc = newargv.argc;
|
|
|
|
moreinfo->argv = newargv;
|
|
|
|
}
|
2013-07-27 01:28:00 +08:00
|
|
|
if ((wincmdln || !real_path.iscygexec ())
|
|
|
|
&& !cmd.fromargv (newargv, real_path.get_win32 (),
|
|
|
|
real_path.iscygexec ()))
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2006-04-12 23:53:22 +08:00
|
|
|
res = -1;
|
|
|
|
goto out;
|
2003-09-26 16:45:24 +08:00
|
|
|
}
|
2000-09-14 03:57:00 +08:00
|
|
|
|
2006-04-12 23:53:22 +08:00
|
|
|
|
2012-05-08 23:06:43 +08:00
|
|
|
if (mode != _P_OVERLAY || !real_path.iscygexec ()
|
|
|
|
|| !DuplicateHandle (GetCurrentProcess (), myself.shared_handle (),
|
|
|
|
GetCurrentProcess (), &moreinfo->myself_pinfo,
|
|
|
|
0, TRUE, DUPLICATE_SAME_ACCESS))
|
2006-01-10 10:39:22 +08:00
|
|
|
moreinfo->myself_pinfo = NULL;
|
|
|
|
else
|
|
|
|
VerifyHandle (moreinfo->myself_pinfo);
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-08-12 00:13:30 +08:00
|
|
|
PROCESS_INFORMATION pi;
|
|
|
|
pi.hProcess = pi.hThread = NULL;
|
|
|
|
pi.dwProcessId = pi.dwThreadId = 0;
|
2006-12-12 02:55:29 +08:00
|
|
|
|
|
|
|
/* Set up needed handles for stdio */
|
2000-02-18 03:38:33 +08:00
|
|
|
si.dwFlags = STARTF_USESTDHANDLES;
|
2011-11-14 09:29:49 +08:00
|
|
|
si.hStdInput = handle ((in__stdin < 0 ? 0 : in__stdin), false);
|
|
|
|
si.hStdOutput = handle ((in__stdout < 0 ? 1 : in__stdout), true);
|
2006-12-12 02:55:29 +08:00
|
|
|
si.hStdError = handle (2, true);
|
|
|
|
|
2000-02-18 03:38:33 +08:00
|
|
|
si.cb = sizeof (si);
|
|
|
|
|
2009-12-19 04:32:04 +08:00
|
|
|
c_flags = GetPriorityClass (GetCurrentProcess ());
|
2006-03-27 11:52:24 +08:00
|
|
|
sigproc_printf ("priority class %d", c_flags);
|
2011-12-22 22:33:08 +08:00
|
|
|
|
|
|
|
c_flags |= CREATE_SEPARATE_WOW_VDM | CREATE_UNICODE_ENVIRONMENT;
|
|
|
|
|
2012-04-16 01:51:22 +08:00
|
|
|
if (wincap.has_program_compatibility_assistant ())
|
2011-12-22 22:33:08 +08:00
|
|
|
{
|
2012-02-17 22:26:18 +08:00
|
|
|
/* We're adding the CREATE_BREAKAWAY_FROM_JOB flag here to workaround
|
|
|
|
issues with the "Program Compatibility Assistant (PCA) Service"
|
|
|
|
starting with Windows Vista. For some reason, when starting long
|
|
|
|
running sessions from mintty(*), the affected svchost.exe process
|
|
|
|
takes more and more memory and at one point takes over the CPU. At
|
|
|
|
this point the machine becomes unresponsive. The only way to get
|
|
|
|
back to normal is to stop the entire mintty session, or to stop the
|
|
|
|
PCA service. However, a process which is controlled by PCA is part
|
|
|
|
of a compatibility job, which allows child processes to break away
|
|
|
|
from the job. This helps to avoid this issue.
|
2012-08-17 07:34:45 +08:00
|
|
|
|
2013-04-23 17:44:36 +08:00
|
|
|
First we call IsProcessInJob. It fetches the information whether or
|
|
|
|
not we're part of a job 20 times faster than QueryInformationJobObject.
|
|
|
|
|
2012-02-17 22:26:18 +08:00
|
|
|
(*) Note that this is not mintty's fault. It has just been observed
|
|
|
|
with mintty in the first place. See the archives for more info:
|
|
|
|
http://cygwin.com/ml/cygwin-developers/2012-02/msg00018.html */
|
|
|
|
|
|
|
|
JOBOBJECT_BASIC_LIMIT_INFORMATION jobinfo;
|
2013-04-23 17:44:36 +08:00
|
|
|
BOOL is_in_job;
|
2012-02-17 22:26:18 +08:00
|
|
|
|
2013-04-23 17:44:36 +08:00
|
|
|
if (IsProcessInJob (GetCurrentProcess (), NULL, &is_in_job)
|
|
|
|
&& is_in_job
|
2012-02-17 22:26:18 +08:00
|
|
|
&& QueryInformationJobObject (NULL, JobObjectBasicLimitInformation,
|
|
|
|
&jobinfo, sizeof jobinfo, NULL)
|
|
|
|
&& (jobinfo.LimitFlags & (JOB_OBJECT_LIMIT_BREAKAWAY_OK
|
|
|
|
| JOB_OBJECT_LIMIT_SILENT_BREAKAWAY_OK)))
|
|
|
|
{
|
|
|
|
debug_printf ("Add CREATE_BREAKAWAY_FROM_JOB");
|
|
|
|
c_flags |= CREATE_BREAKAWAY_FROM_JOB;
|
|
|
|
}
|
2011-12-22 22:33:08 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-12-19 12:34:13 +08:00
|
|
|
if (mode == _P_DETACH)
|
2006-03-27 11:52:24 +08:00
|
|
|
c_flags |= DETACHED_PROCESS;
|
2008-06-17 23:38:17 +08:00
|
|
|
else
|
|
|
|
fhandler_console::need_invisible ();
|
2004-11-26 12:15:10 +08:00
|
|
|
|
2000-10-17 07:55:58 +08:00
|
|
|
if (mode != _P_OVERLAY)
|
2004-12-06 03:41:26 +08:00
|
|
|
myself->exec_sendsig = NULL;
|
2004-09-12 11:47:57 +08:00
|
|
|
else
|
2004-11-26 12:15:10 +08:00
|
|
|
{
|
|
|
|
/* Reset sendsig so that any process which wants to send a signal
|
|
|
|
to this pid will wait for the new process to become active.
|
|
|
|
Save the old value in case the exec fails. */
|
2004-12-06 03:41:26 +08:00
|
|
|
if (!myself->exec_sendsig)
|
|
|
|
{
|
|
|
|
myself->exec_sendsig = myself->sendsig;
|
|
|
|
myself->exec_dwProcessId = myself->dwProcessId;
|
|
|
|
myself->sendsig = NULL;
|
|
|
|
reset_sendsig = true;
|
|
|
|
}
|
2004-11-26 12:15:10 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2011-02-15 23:25:59 +08:00
|
|
|
if (null_app_name)
|
|
|
|
runpath = NULL;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
USHORT len = real_path.get_nt_native_path ()->Length / sizeof (WCHAR);
|
|
|
|
if (RtlEqualUnicodePathPrefix (real_path.get_nt_native_path (),
|
|
|
|
&ro_u_natp, FALSE))
|
2010-01-25 19:21:56 +08:00
|
|
|
{
|
2011-02-15 23:25:59 +08:00
|
|
|
runpath = real_path.get_wide_win32_path (runpath);
|
|
|
|
/* If the executable path length is < MAX_PATH, make sure the long
|
|
|
|
path win32 prefix is removed from the path to make subsequent
|
|
|
|
not long path aware native Win32 child processes happy. */
|
|
|
|
if (len < MAX_PATH + 4)
|
|
|
|
{
|
|
|
|
if (runpath[5] == ':')
|
|
|
|
runpath += 4;
|
|
|
|
else if (len < MAX_PATH + 6)
|
|
|
|
*(runpath += 6) = L'\\';
|
|
|
|
}
|
2010-01-25 19:21:56 +08:00
|
|
|
}
|
2011-02-15 23:25:59 +08:00
|
|
|
else if (len < NT_MAX_PATH - ro_u_globalroot.Length / sizeof (WCHAR))
|
|
|
|
{
|
|
|
|
UNICODE_STRING rpath;
|
2000-10-20 12:20:21 +08:00
|
|
|
|
2011-02-15 23:25:59 +08:00
|
|
|
RtlInitEmptyUnicodeString (&rpath, runpath,
|
|
|
|
(NT_MAX_PATH - 1) * sizeof (WCHAR));
|
|
|
|
RtlCopyUnicodeString (&rpath, &ro_u_globalroot);
|
|
|
|
RtlAppendUnicodeStringToString (&rpath,
|
|
|
|
real_path.get_nt_native_path ());
|
|
|
|
}
|
|
|
|
else
|
2011-06-06 13:02:13 +08:00
|
|
|
{
|
2011-02-15 23:25:59 +08:00
|
|
|
set_errno (ENAMETOOLONG);
|
|
|
|
res = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2000-10-20 12:20:21 +08:00
|
|
|
|
2011-11-14 09:29:49 +08:00
|
|
|
cygbench ("spawn-worker");
|
2002-06-15 02:01:21 +08:00
|
|
|
|
2007-12-14 19:32:40 +08:00
|
|
|
if (!real_path.iscygexec())
|
2011-11-14 09:29:49 +08:00
|
|
|
::cygheap->fdtab.set_file_pointers_for_exec ();
|
2004-09-12 11:47:57 +08:00
|
|
|
|
2008-03-07 19:24:51 +08:00
|
|
|
moreinfo->envp = build_env (envp, envblock, moreinfo->envc,
|
|
|
|
real_path.iscygexec ());
|
2005-09-17 03:58:12 +08:00
|
|
|
if (!moreinfo->envp || !envblock)
|
|
|
|
{
|
|
|
|
set_errno (E2BIG);
|
2005-09-17 04:12:12 +08:00
|
|
|
res = -1;
|
2005-09-17 03:58:12 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2011-11-14 09:29:49 +08:00
|
|
|
set (chtype, real_path.iscygexec ());
|
|
|
|
__stdin = in__stdin;
|
|
|
|
__stdout = in__stdout;
|
|
|
|
record_children ();
|
2005-06-01 11:46:56 +08:00
|
|
|
|
2013-08-24 02:19:46 +08:00
|
|
|
si.lpReserved2 = (LPBYTE) this;
|
|
|
|
si.cbReserved2 = sizeof (*this);
|
2005-06-01 11:46:56 +08:00
|
|
|
|
2011-11-14 09:29:49 +08:00
|
|
|
/* Depends on set call above.
|
2008-04-27 02:01:42 +08:00
|
|
|
Some file types might need extra effort in the parent after CreateProcess
|
|
|
|
and before copying the datastructures to the child. So we have to start
|
|
|
|
the child in suspend state, unfortunately, to avoid a race condition. */
|
|
|
|
if (!newargv.win16_exe
|
2011-11-14 09:29:49 +08:00
|
|
|
&& (!iscygwin () || mode != _P_OVERLAY
|
|
|
|
|| ::cygheap->fdtab.need_fixup_before ()))
|
2008-04-27 02:01:42 +08:00
|
|
|
c_flags |= CREATE_SUSPENDED;
|
2012-08-03 22:48:59 +08:00
|
|
|
/* If a native application should be spawned, we test here if the spawning
|
|
|
|
process is running in a console and, if so, if it's a foreground or
|
|
|
|
background process. If it's a background process, we start the native
|
|
|
|
process with the CREATE_NEW_PROCESS_GROUP flag set. This lets the native
|
|
|
|
process ignore Ctrl-C by default. If we don't do that, pressing Ctrl-C
|
|
|
|
in a console will break native processes running in the background,
|
|
|
|
because the Ctrl-C event is sent to all processes in the console, unless
|
|
|
|
they ignore it explicitely. CREATE_NEW_PROCESS_GROUP does that for us. */
|
|
|
|
if (!iscygwin () && fhandler_console::exists ()
|
|
|
|
&& fhandler_console::tc_getpgid () != myself->pgid)
|
2011-10-07 21:52:20 +08:00
|
|
|
c_flags |= CREATE_NEW_PROCESS_GROUP;
|
2011-11-14 09:29:49 +08:00
|
|
|
refresh_cygheap ();
|
2012-03-20 23:07:30 +08:00
|
|
|
|
2012-03-21 13:23:13 +08:00
|
|
|
if (mode == _P_DETACH)
|
|
|
|
/* all set */;
|
2012-03-21 23:54:50 +08:00
|
|
|
else if (mode != _P_OVERLAY || !my_wr_proc_pipe)
|
2012-03-20 23:07:30 +08:00
|
|
|
prefork ();
|
2012-03-21 13:23:13 +08:00
|
|
|
else
|
|
|
|
wr_proc_pipe = my_wr_proc_pipe;
|
2012-03-20 23:07:30 +08:00
|
|
|
|
2012-05-07 23:05:56 +08:00
|
|
|
/* Don't allow child to inherit these handles if it's not a Cygwin program.
|
|
|
|
wr_proc_pipe will be injected later. parent won't be used by the child
|
|
|
|
so there is no reason for the child to have it open as it can confuse
|
|
|
|
ps into thinking that children of windows processes are all part of
|
|
|
|
the same "execed" process.
|
|
|
|
FIXME: Someday, make it so that parent is never created when starting
|
|
|
|
non-Cygwin processes. */
|
|
|
|
if (!iscygwin ())
|
|
|
|
{
|
|
|
|
SetHandleInformation (wr_proc_pipe, HANDLE_FLAG_INHERIT, 0);
|
|
|
|
SetHandleInformation (parent, HANDLE_FLAG_INHERIT, 0);
|
|
|
|
}
|
2013-03-09 08:11:31 +08:00
|
|
|
/* FIXME: racy */
|
|
|
|
if (mode != _P_OVERLAY)
|
|
|
|
SetHandleInformation (my_wr_proc_pipe, HANDLE_FLAG_INHERIT, 0);
|
2012-05-15 06:42:56 +08:00
|
|
|
parent_winpid = GetCurrentProcessId ();
|
2012-05-07 23:05:56 +08:00
|
|
|
|
2013-05-04 03:39:01 +08:00
|
|
|
loop:
|
2003-06-09 21:29:12 +08:00
|
|
|
/* When ruid != euid we create the new process under the current original
|
|
|
|
account and impersonate in child, this way maintaining the different
|
|
|
|
effective vs. real ids.
|
2003-09-16 17:24:52 +08:00
|
|
|
FIXME: If ruid != euid and ruid != saved_uid we currently give
|
2003-06-09 21:29:12 +08:00
|
|
|
up on ruid. The new process will have ruid == euid. */
|
2011-11-14 09:29:49 +08:00
|
|
|
::cygheap->user.deimpersonate ();
|
2006-03-19 03:17:21 +08:00
|
|
|
|
2011-02-16 02:11:50 +08:00
|
|
|
if (!real_path.iscygexec () && mode == _P_OVERLAY)
|
2011-02-15 23:25:59 +08:00
|
|
|
myself->process_state |= PID_NOTCYGWIN;
|
2010-08-13 19:51:54 +08:00
|
|
|
|
2013-07-20 06:44:02 +08:00
|
|
|
wchar_t wcmd[(size_t) cmd];
|
2011-11-14 09:29:49 +08:00
|
|
|
if (!::cygheap->user.issetuid ()
|
|
|
|
|| (::cygheap->user.saved_uid == ::cygheap->user.real_uid
|
|
|
|
&& ::cygheap->user.saved_gid == ::cygheap->user.real_gid
|
|
|
|
&& !::cygheap->user.groups.issetgroups ()
|
|
|
|
&& !::cygheap->user.setuid_to_restricted))
|
2000-10-17 07:55:58 +08:00
|
|
|
{
|
2008-03-07 19:24:51 +08:00
|
|
|
rc = CreateProcessW (runpath, /* image name - with full path */
|
2013-07-20 06:44:02 +08:00
|
|
|
cmd.wcs (wcmd),/* what was passed to exec */
|
2008-03-07 19:24:51 +08:00
|
|
|
&sec_none_nih, /* process security attrs */
|
|
|
|
&sec_none_nih, /* thread security attrs */
|
|
|
|
TRUE, /* inherit handles from parent */
|
|
|
|
c_flags,
|
|
|
|
envblock, /* environment */
|
2011-02-15 23:25:59 +08:00
|
|
|
NULL,
|
2008-03-07 19:24:51 +08:00
|
|
|
&si,
|
|
|
|
&pi);
|
2000-10-17 07:55:58 +08:00
|
|
|
}
|
|
|
|
else
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2003-09-27 09:58:23 +08:00
|
|
|
/* Give access to myself */
|
|
|
|
if (mode == _P_OVERLAY)
|
|
|
|
myself.set_acl();
|
2002-06-15 02:01:21 +08:00
|
|
|
|
2008-03-07 19:24:51 +08:00
|
|
|
WCHAR wstname[1024] = { L'\0' };
|
2007-08-18 03:58:57 +08:00
|
|
|
HWINSTA hwst_orig = NULL, hwst = NULL;
|
|
|
|
HDESK hdsk_orig = NULL, hdsk = NULL;
|
|
|
|
PSECURITY_ATTRIBUTES sa;
|
2000-02-18 03:38:33 +08:00
|
|
|
DWORD n;
|
2007-08-18 03:58:57 +08:00
|
|
|
|
|
|
|
hwst_orig = GetProcessWindowStation ();
|
|
|
|
hdsk_orig = GetThreadDesktop (GetCurrentThreadId ());
|
2008-03-07 19:24:51 +08:00
|
|
|
GetUserObjectInformationW (hwst_orig, UOI_NAME, wstname, 1024, &n);
|
2007-08-18 03:58:57 +08:00
|
|
|
/* Prior to Vista it was possible to start a service with the
|
|
|
|
"Interact with desktop" flag. This started the service in the
|
|
|
|
interactive window station of the console. A big security
|
|
|
|
risk, but we don't want to disable this behaviour for older
|
|
|
|
OSes because it's still heavily used by some users. They have
|
|
|
|
been warned. */
|
2011-11-14 09:29:49 +08:00
|
|
|
if (!::cygheap->user.setuid_to_restricted
|
2009-10-13 18:23:31 +08:00
|
|
|
&& wcscasecmp (wstname, L"WinSta0") != 0)
|
2007-08-18 03:58:57 +08:00
|
|
|
{
|
2008-03-07 19:24:51 +08:00
|
|
|
WCHAR sid[128];
|
2007-08-18 03:58:57 +08:00
|
|
|
|
|
|
|
sa = sec_user ((PSECURITY_ATTRIBUTES) alloca (1024),
|
2011-11-14 09:29:49 +08:00
|
|
|
::cygheap->user.sid ());
|
2007-08-18 04:22:24 +08:00
|
|
|
/* We're creating a window station per user, not per logon session.
|
2007-08-18 03:58:57 +08:00
|
|
|
First of all we might not have a valid logon session for
|
|
|
|
the user (logon by create_token), and second, it doesn't
|
|
|
|
make sense in terms of security to create a new window
|
|
|
|
station for every logon of the same user. It just fills up
|
|
|
|
the system with window stations for no good reason. */
|
2011-11-14 09:29:49 +08:00
|
|
|
hwst = CreateWindowStationW (::cygheap->user.get_windows_id (sid), 0,
|
2007-08-18 03:58:57 +08:00
|
|
|
GENERIC_READ | GENERIC_WRITE, sa);
|
|
|
|
if (!hwst)
|
|
|
|
system_printf ("CreateWindowStation failed, %E");
|
|
|
|
else if (!SetProcessWindowStation (hwst))
|
|
|
|
system_printf ("SetProcessWindowStation failed, %E");
|
2008-03-07 19:24:51 +08:00
|
|
|
else if (!(hdsk = CreateDesktopW (L"Default", NULL, NULL, 0,
|
2007-08-18 03:58:57 +08:00
|
|
|
GENERIC_ALL, sa)))
|
|
|
|
system_printf ("CreateDesktop failed, %E");
|
|
|
|
else
|
|
|
|
{
|
2008-03-07 19:24:51 +08:00
|
|
|
wcpcpy (wcpcpy (wstname, sid), L"\\Default");
|
2007-08-18 03:58:57 +08:00
|
|
|
si.lpDesktop = wstname;
|
2008-03-07 19:24:51 +08:00
|
|
|
debug_printf ("Desktop: %W", si.lpDesktop);
|
2007-08-18 03:58:57 +08:00
|
|
|
}
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2011-11-14 09:29:49 +08:00
|
|
|
rc = CreateProcessAsUserW (::cygheap->user.primary_token (),
|
2008-03-07 19:24:51 +08:00
|
|
|
runpath, /* image name - with full path */
|
2013-07-20 06:44:02 +08:00
|
|
|
cmd.wcs (wcmd),/* what was passed to exec */
|
2008-03-07 19:24:51 +08:00
|
|
|
&sec_none_nih, /* process security attrs */
|
|
|
|
&sec_none_nih, /* thread security attrs */
|
|
|
|
TRUE, /* inherit handles from parent */
|
|
|
|
c_flags,
|
|
|
|
envblock, /* environment */
|
2011-02-15 23:25:59 +08:00
|
|
|
NULL,
|
2008-03-07 19:24:51 +08:00
|
|
|
&si,
|
|
|
|
&pi);
|
2007-08-18 03:58:57 +08:00
|
|
|
if (hwst)
|
|
|
|
{
|
|
|
|
SetProcessWindowStation (hwst_orig);
|
|
|
|
CloseWindowStation (hwst);
|
|
|
|
}
|
|
|
|
if (hdsk)
|
|
|
|
{
|
|
|
|
SetThreadDesktop (hdsk_orig);
|
|
|
|
CloseDesktop (hdsk);
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2003-09-20 08:31:13 +08:00
|
|
|
|
2013-03-09 08:11:31 +08:00
|
|
|
if (mode != _P_OVERLAY)
|
|
|
|
SetHandleInformation (my_wr_proc_pipe, HANDLE_FLAG_INHERIT,
|
|
|
|
HANDLE_FLAG_INHERIT);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
/* Set errno now so that debugging messages from it appear before our
|
|
|
|
final debugging message [this is a general rule for debugging
|
|
|
|
messages]. */
|
2000-08-03 11:02:41 +08:00
|
|
|
if (!rc)
|
|
|
|
{
|
|
|
|
__seterrno ();
|
|
|
|
syscall_printf ("CreateProcess failed, %E");
|
2004-11-26 12:15:10 +08:00
|
|
|
/* If this was a failed exec, restore the saved sendsig. */
|
2004-12-06 03:41:26 +08:00
|
|
|
if (reset_sendsig)
|
|
|
|
{
|
|
|
|
myself->sendsig = myself->exec_sendsig;
|
|
|
|
myself->exec_sendsig = NULL;
|
|
|
|
}
|
2011-02-16 02:11:50 +08:00
|
|
|
myself->process_state &= ~PID_NOTCYGWIN;
|
2012-05-07 23:05:56 +08:00
|
|
|
/* Reset handle inheritance to default when the execution of a non-Cygwin
|
|
|
|
process fails. Only need to do this for _P_OVERLAY since the handle will
|
|
|
|
be closed otherwise. Don't need to do this for 'parent' since it will
|
2012-08-17 07:34:45 +08:00
|
|
|
be closed in every case. See FIXME above. */
|
2012-05-08 23:06:43 +08:00
|
|
|
if (!iscygwin () && mode == _P_OVERLAY)
|
2013-03-09 08:11:31 +08:00
|
|
|
SetHandleInformation (wr_proc_pipe, HANDLE_FLAG_INHERIT,
|
|
|
|
HANDLE_FLAG_INHERIT);
|
2012-03-20 23:07:30 +08:00
|
|
|
if (wr_proc_pipe == my_wr_proc_pipe)
|
|
|
|
wr_proc_pipe = NULL; /* We still own it: don't nuke in destructor */
|
2013-03-09 08:11:31 +08:00
|
|
|
|
|
|
|
/* Restore impersonation. In case of _P_OVERLAY this isn't
|
|
|
|
allowed since it would overwrite child data. */
|
|
|
|
if (mode != _P_OVERLAY)
|
|
|
|
::cygheap->user.reimpersonate ();
|
|
|
|
|
2005-10-24 23:17:54 +08:00
|
|
|
res = -1;
|
|
|
|
goto out;
|
2000-08-03 11:02:41 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2011-11-24 10:17:55 +08:00
|
|
|
/* The CREATE_SUSPENDED case is handled below */
|
2011-11-25 05:36:53 +08:00
|
|
|
if (iscygwin () && !(c_flags & CREATE_SUSPENDED))
|
|
|
|
strace.write_childpid (pi.dwProcessId);
|
2005-12-30 04:46:34 +08:00
|
|
|
|
2009-11-17 18:43:01 +08:00
|
|
|
/* Fixup the parent data structures if needed and resume the child's
|
|
|
|
main thread. */
|
2011-11-14 09:29:49 +08:00
|
|
|
if (::cygheap->fdtab.need_fixup_before ())
|
|
|
|
::cygheap->fdtab.fixup_before_exec (pi.dwProcessId);
|
2009-11-17 18:43:01 +08:00
|
|
|
|
2002-10-14 02:16:33 +08:00
|
|
|
if (mode != _P_OVERLAY)
|
2000-07-30 00:24:59 +08:00
|
|
|
cygpid = cygwin_pid (pi.dwProcessId);
|
2002-10-14 02:16:33 +08:00
|
|
|
else
|
|
|
|
cygpid = myself->pid;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
/* We print the original program name here so the user can see that too. */
|
2012-05-07 23:05:56 +08:00
|
|
|
syscall_printf ("pid %d, prog_arg %s, cmd line %.9500s)",
|
2013-07-20 01:28:34 +08:00
|
|
|
rc ? cygpid : (unsigned int) -1, prog_arg, (const char *) cmd);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2000-07-30 00:24:59 +08:00
|
|
|
/* Name the handle similarly to proc_subproc. */
|
2004-12-06 08:29:41 +08:00
|
|
|
ProtectHandle1 (pi.hProcess, childhProc);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
if (mode == _P_OVERLAY)
|
|
|
|
{
|
2006-05-22 12:50:54 +08:00
|
|
|
myself->dwProcessId = pi.dwProcessId;
|
2000-10-24 10:25:27 +08:00
|
|
|
strace.execing = 1;
|
2004-12-06 03:41:26 +08:00
|
|
|
myself.hProcess = hExeced = pi.hProcess;
|
2010-06-29 18:37:23 +08:00
|
|
|
real_path.get_wide_win32_path (myself->progname); // FIXME: race?
|
2010-06-29 18:28:40 +08:00
|
|
|
sigproc_printf ("new process name %W", myself->progname);
|
2011-11-14 09:29:49 +08:00
|
|
|
if (!iscygwin ())
|
2006-03-27 11:52:24 +08:00
|
|
|
close_all_files ();
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2000-10-25 11:54:50 +08:00
|
|
|
myself->set_has_pgid_children ();
|
2000-10-17 07:55:58 +08:00
|
|
|
ProtectHandle (pi.hThread);
|
2010-09-21 06:28:57 +08:00
|
|
|
pinfo child (cygpid,
|
|
|
|
PID_IN_USE | (real_path.iscygexec () ? 0 : PID_NOTCYGWIN));
|
2000-07-30 00:24:59 +08:00
|
|
|
if (!child)
|
|
|
|
{
|
2003-09-26 10:23:34 +08:00
|
|
|
syscall_printf ("pinfo failed");
|
2003-09-26 11:20:30 +08:00
|
|
|
if (get_errno () != ENOMEM)
|
|
|
|
set_errno (EAGAIN);
|
2003-09-26 10:23:34 +08:00
|
|
|
res = -1;
|
|
|
|
goto out;
|
2000-07-30 00:24:59 +08:00
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
child->dwProcessId = pi.dwProcessId;
|
2004-11-26 12:15:10 +08:00
|
|
|
child.hProcess = pi.hProcess;
|
2003-09-26 10:23:34 +08:00
|
|
|
|
2010-06-29 18:28:40 +08:00
|
|
|
real_path.get_wide_win32_path (child->progname);
|
2001-10-04 10:34:20 +08:00
|
|
|
/* FIXME: This introduces an unreferenced, open handle into the child.
|
2001-11-05 14:09:15 +08:00
|
|
|
The purpose is to keep the pid shared memory open so that all of
|
2001-10-04 10:34:20 +08:00
|
|
|
the fields filled out by child.remember do not disappear and so there
|
|
|
|
is not a brief period during which the pid is not available.
|
|
|
|
However, we should try to find another way to do this eventually. */
|
2009-12-19 04:32:04 +08:00
|
|
|
DuplicateHandle (GetCurrentProcess (), child.shared_handle (),
|
|
|
|
pi.hProcess, NULL, 0, 0, DUPLICATE_SAME_ACCESS);
|
2004-12-06 03:41:26 +08:00
|
|
|
child->start_time = time (NULL); /* Register child's starting time. */
|
2005-01-26 06:45:11 +08:00
|
|
|
child->nice = myself->nice;
|
2012-03-21 23:54:50 +08:00
|
|
|
postfork (child);
|
2004-12-23 22:57:08 +08:00
|
|
|
if (!child.remember (mode == _P_DETACH))
|
|
|
|
{
|
|
|
|
/* FIXME: Child in strange state now */
|
|
|
|
CloseHandle (pi.hProcess);
|
|
|
|
ForceCloseHandle (pi.hThread);
|
|
|
|
res = -1;
|
|
|
|
goto out;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2005-01-11 23:31:04 +08:00
|
|
|
/* Start the child running */
|
2006-03-27 11:52:24 +08:00
|
|
|
if (c_flags & CREATE_SUSPENDED)
|
2005-12-30 04:46:34 +08:00
|
|
|
{
|
2012-05-07 23:05:56 +08:00
|
|
|
/* Inject a non-inheritable wr_proc_pipe handle into child so that we
|
|
|
|
can accurately track when the child exits without keeping this
|
|
|
|
process waiting around for it to exit. */
|
|
|
|
if (!iscygwin ())
|
|
|
|
DuplicateHandle (GetCurrentProcess (), wr_proc_pipe, pi.hProcess, NULL,
|
|
|
|
0, false, DUPLICATE_SAME_ACCESS);
|
2005-12-30 04:46:34 +08:00
|
|
|
ResumeThread (pi.hThread);
|
2011-11-25 05:36:53 +08:00
|
|
|
if (iscygwin ())
|
|
|
|
strace.write_childpid (pi.dwProcessId);
|
2005-12-30 04:46:34 +08:00
|
|
|
}
|
2005-01-11 23:31:04 +08:00
|
|
|
ForceCloseHandle (pi.hThread);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-01-11 23:31:04 +08:00
|
|
|
sigproc_printf ("spawned windows pid %d", pi.dwProcessId);
|
2000-10-17 07:55:58 +08:00
|
|
|
|
2012-03-21 23:54:50 +08:00
|
|
|
bool synced;
|
2011-11-14 09:29:49 +08:00
|
|
|
if ((mode == _P_DETACH || mode == _P_NOWAIT) && !iscygwin ())
|
2007-01-02 03:37:19 +08:00
|
|
|
synced = false;
|
|
|
|
else
|
2012-05-07 23:05:56 +08:00
|
|
|
/* Just mark a non-cygwin process as 'synced'. We will still eventually
|
|
|
|
wait for it to exit in maybe_set_exit_code_from_windows(). */
|
|
|
|
synced = iscygwin () ? sync (pi.dwProcessId, pi.hProcess, INFINITE) : true;
|
2001-06-27 05:03:08 +08:00
|
|
|
|
2005-01-11 23:31:04 +08:00
|
|
|
switch (mode)
|
|
|
|
{
|
|
|
|
case _P_OVERLAY:
|
2005-10-18 23:13:13 +08:00
|
|
|
myself.hProcess = pi.hProcess;
|
2006-03-19 03:17:21 +08:00
|
|
|
if (!synced)
|
|
|
|
{
|
2011-11-14 09:29:49 +08:00
|
|
|
if (!proc_retry (pi.hProcess))
|
2006-03-19 03:17:21 +08:00
|
|
|
{
|
|
|
|
looped++;
|
|
|
|
goto loop;
|
|
|
|
}
|
2006-03-22 11:20:28 +08:00
|
|
|
close_all_files (true);
|
2006-03-19 03:17:21 +08:00
|
|
|
}
|
2006-03-22 11:20:28 +08:00
|
|
|
else
|
2005-01-11 23:31:04 +08:00
|
|
|
{
|
2012-09-14 11:32:52 +08:00
|
|
|
if (iscygwin ())
|
|
|
|
close_all_files (true);
|
2012-03-20 23:07:30 +08:00
|
|
|
if (!my_wr_proc_pipe
|
2006-03-22 11:20:28 +08:00
|
|
|
&& WaitForSingleObject (pi.hProcess, 0) == WAIT_TIMEOUT)
|
2012-03-21 13:23:13 +08:00
|
|
|
wait_for_myself ();
|
2005-01-11 23:31:04 +08:00
|
|
|
}
|
2005-01-17 01:00:27 +08:00
|
|
|
myself.exit (EXITCODE_NOSET);
|
2005-01-11 23:31:04 +08:00
|
|
|
break;
|
|
|
|
case _P_WAIT:
|
|
|
|
case _P_SYSTEM:
|
2013-05-04 03:39:01 +08:00
|
|
|
system_call.arm ();
|
2005-01-11 23:31:04 +08:00
|
|
|
if (waitpid (cygpid, &res, 0) != cygpid)
|
|
|
|
res = -1;
|
|
|
|
break;
|
|
|
|
case _P_DETACH:
|
|
|
|
res = 0; /* Lost all memory of this child. */
|
|
|
|
break;
|
|
|
|
case _P_NOWAIT:
|
|
|
|
case _P_NOWAITO:
|
|
|
|
case _P_VFORK:
|
|
|
|
res = cygpid;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2003-09-26 10:23:34 +08:00
|
|
|
out:
|
2011-11-14 09:29:49 +08:00
|
|
|
this->cleanup ();
|
2006-03-19 03:17:21 +08:00
|
|
|
if (envblock)
|
|
|
|
free (envblock);
|
2005-01-11 23:31:04 +08:00
|
|
|
return (int) res;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-08-23 01:50:22 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
cwait (int *result, int pid, int)
|
|
|
|
{
|
2005-07-17 06:01:50 +08:00
|
|
|
return waitpid (pid, result, 0);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2004-12-06 03:41:26 +08:00
|
|
|
* Helper function for spawn runtime calls.
|
|
|
|
* Doesn't search the path.
|
|
|
|
*/
|
2000-02-18 03:38:33 +08:00
|
|
|
|
|
|
|
extern "C" int
|
2002-06-11 10:08:00 +08:00
|
|
|
spawnve (int mode, const char *path, const char *const *argv,
|
2004-12-06 03:41:26 +08:00
|
|
|
const char *const *envp)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2011-01-19 18:28:39 +08:00
|
|
|
static char *const empty_env[] = { NULL };
|
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
int ret;
|
2004-01-24 07:05:33 +08:00
|
|
|
#ifdef NEWVFORK
|
2005-07-17 06:01:50 +08:00
|
|
|
vfork_save *vf = vfork_storage.val ();
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
if (vf != NULL && (vf->pid < 0) && mode == _P_OVERLAY)
|
|
|
|
mode = _P_NOWAIT;
|
|
|
|
else
|
|
|
|
vf = NULL;
|
2004-01-24 07:05:33 +08:00
|
|
|
#endif
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2013-04-23 17:44:36 +08:00
|
|
|
syscall_printf ("spawnve (%s, %s, %p)", path, argv[0], envp);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2011-01-19 18:28:39 +08:00
|
|
|
if (!envp)
|
|
|
|
envp = empty_env;
|
|
|
|
|
2011-01-19 17:15:17 +08:00
|
|
|
switch (_P_MODE (mode))
|
2005-07-17 06:01:50 +08:00
|
|
|
{
|
|
|
|
case _P_OVERLAY:
|
2011-11-14 09:29:49 +08:00
|
|
|
ch_spawn.worker (path, argv, envp, mode);
|
|
|
|
/* Errno should be set by worker. */
|
2005-07-17 06:01:50 +08:00
|
|
|
ret = -1;
|
|
|
|
break;
|
|
|
|
case _P_VFORK:
|
|
|
|
case _P_NOWAIT:
|
|
|
|
case _P_NOWAITO:
|
|
|
|
case _P_WAIT:
|
|
|
|
case _P_DETACH:
|
|
|
|
case _P_SYSTEM:
|
2011-11-14 09:29:49 +08:00
|
|
|
ret = ch_spawn.worker (path, argv, envp, mode);
|
2004-01-24 07:05:33 +08:00
|
|
|
#ifdef NEWVFORK
|
2005-07-17 06:01:50 +08:00
|
|
|
if (vf)
|
|
|
|
{
|
|
|
|
if (ret > 0)
|
|
|
|
{
|
|
|
|
debug_printf ("longjmping due to vfork");
|
|
|
|
vf->restore_pid (ret);
|
|
|
|
}
|
|
|
|
}
|
2004-01-24 07:05:33 +08:00
|
|
|
#endif
|
2005-07-17 06:01:50 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
set_errno (EINVAL);
|
|
|
|
ret = -1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return ret;
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2004-12-06 03:41:26 +08:00
|
|
|
* spawn functions as implemented in the MS runtime library.
|
|
|
|
* Most of these based on (and copied from) newlib/libc/posix/execXX.c
|
|
|
|
*/
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2001-08-23 01:50:22 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
spawnl (int mode, const char *path, const char *arg0, ...)
|
|
|
|
{
|
2005-07-17 06:01:50 +08:00
|
|
|
int i;
|
|
|
|
va_list args;
|
|
|
|
const char *argv[256];
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
va_start (args, arg0);
|
|
|
|
argv[0] = arg0;
|
|
|
|
i = 1;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
do
|
|
|
|
argv[i] = va_arg (args, const char *);
|
|
|
|
while (argv[i++] != NULL);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
va_end (args);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
return spawnve (mode, path, (char * const *) argv, cur_environ ());
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-08-23 01:50:22 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
spawnle (int mode, const char *path, const char *arg0, ...)
|
|
|
|
{
|
2005-07-17 06:01:50 +08:00
|
|
|
int i;
|
|
|
|
va_list args;
|
|
|
|
const char * const *envp;
|
|
|
|
const char *argv[256];
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
va_start (args, arg0);
|
|
|
|
argv[0] = arg0;
|
|
|
|
i = 1;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
do
|
|
|
|
argv[i] = va_arg (args, const char *);
|
|
|
|
while (argv[i++] != NULL);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
envp = va_arg (args, const char * const *);
|
|
|
|
va_end (args);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
return spawnve (mode, path, (char * const *) argv, (char * const *) envp);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-08-23 01:50:22 +08:00
|
|
|
extern "C" int
|
2011-01-19 18:28:39 +08:00
|
|
|
spawnlp (int mode, const char *file, const char *arg0, ...)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2005-07-17 06:01:50 +08:00
|
|
|
int i;
|
|
|
|
va_list args;
|
|
|
|
const char *argv[256];
|
2011-01-19 18:28:39 +08:00
|
|
|
path_conv buf;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
va_start (args, arg0);
|
|
|
|
argv[0] = arg0;
|
|
|
|
i = 1;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
do
|
|
|
|
argv[i] = va_arg (args, const char *);
|
|
|
|
while (argv[i++] != NULL);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
va_end (args);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2011-01-20 19:09:21 +08:00
|
|
|
return spawnve (mode | _P_PATH_TYPE_EXEC, find_exec (file, buf),
|
|
|
|
(char * const *) argv, cur_environ ());
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-08-23 01:50:22 +08:00
|
|
|
extern "C" int
|
2011-01-19 18:28:39 +08:00
|
|
|
spawnlpe (int mode, const char *file, const char *arg0, ...)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2005-07-17 06:01:50 +08:00
|
|
|
int i;
|
|
|
|
va_list args;
|
|
|
|
const char * const *envp;
|
|
|
|
const char *argv[256];
|
2011-01-19 18:28:39 +08:00
|
|
|
path_conv buf;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
va_start (args, arg0);
|
|
|
|
argv[0] = arg0;
|
|
|
|
i = 1;
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
do
|
|
|
|
argv[i] = va_arg (args, const char *);
|
|
|
|
while (argv[i++] != NULL);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2005-07-17 06:01:50 +08:00
|
|
|
envp = va_arg (args, const char * const *);
|
|
|
|
va_end (args);
|
2000-02-18 03:38:33 +08:00
|
|
|
|
2011-01-20 19:09:21 +08:00
|
|
|
return spawnve (mode | _P_PATH_TYPE_EXEC, find_exec (file, buf),
|
|
|
|
(char * const *) argv, envp);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-08-23 01:50:22 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
spawnv (int mode, const char *path, const char * const *argv)
|
|
|
|
{
|
2005-07-17 06:01:50 +08:00
|
|
|
return spawnve (mode, path, argv, cur_environ ());
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-08-23 01:50:22 +08:00
|
|
|
extern "C" int
|
2011-01-19 18:28:39 +08:00
|
|
|
spawnvp (int mode, const char *file, const char * const *argv)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2011-01-19 18:28:39 +08:00
|
|
|
path_conv buf;
|
2011-01-20 19:09:21 +08:00
|
|
|
return spawnve (mode | _P_PATH_TYPE_EXEC, find_exec (file, buf), argv,
|
|
|
|
cur_environ ());
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
|
|
|
|
2001-08-23 01:50:22 +08:00
|
|
|
extern "C" int
|
2000-02-18 03:38:33 +08:00
|
|
|
spawnvpe (int mode, const char *file, const char * const *argv,
|
2011-01-19 18:28:39 +08:00
|
|
|
const char * const *envp)
|
2000-02-18 03:38:33 +08:00
|
|
|
{
|
2005-07-17 06:01:50 +08:00
|
|
|
path_conv buf;
|
2011-01-19 17:15:17 +08:00
|
|
|
return spawnve (mode | _P_PATH_TYPE_EXEC, find_exec (file, buf), argv, envp);
|
2000-02-18 03:38:33 +08:00
|
|
|
}
|
2005-07-17 08:51:03 +08:00
|
|
|
|
|
|
|
int
|
2013-06-20 00:00:43 +08:00
|
|
|
av::setup (const char *prog_arg, path_conv& real_path, const char *ext,
|
|
|
|
int argc, const char *const *argv, bool p_type_exec)
|
2005-07-17 08:51:03 +08:00
|
|
|
{
|
2006-02-21 00:15:51 +08:00
|
|
|
const char *p;
|
2008-02-01 20:37:51 +08:00
|
|
|
bool exeext = ascii_strcasematch (ext, ".exe");
|
2013-06-20 00:00:43 +08:00
|
|
|
new (this) av (argc, argv);
|
|
|
|
if ((exeext && real_path.iscygexec ()) || ascii_strcasematch (ext, ".bat")
|
|
|
|
|| (!*ext && ((p = ext - 4) > real_path.get_win32 ())
|
|
|
|
&& (ascii_strcasematch (p, ".bat") || ascii_strcasematch (p, ".cmd")
|
|
|
|
|| ascii_strcasematch (p, ".btm"))))
|
|
|
|
/* no extra checks needed */;
|
|
|
|
else
|
|
|
|
while (1)
|
2005-09-15 08:31:42 +08:00
|
|
|
{
|
2013-06-20 00:00:43 +08:00
|
|
|
char *pgm = NULL;
|
|
|
|
char *arg1 = NULL;
|
|
|
|
char *ptr, *buf;
|
|
|
|
OBJECT_ATTRIBUTES attr;
|
|
|
|
IO_STATUS_BLOCK io;
|
|
|
|
HANDLE h;
|
|
|
|
NTSTATUS status;
|
|
|
|
LARGE_INTEGER size;
|
|
|
|
|
|
|
|
status = NtOpenFile (&h, SYNCHRONIZE | GENERIC_READ,
|
|
|
|
real_path.get_object_attr (attr, sec_none_nih),
|
|
|
|
&io, FILE_SHARE_VALID_FLAGS,
|
|
|
|
FILE_SYNCHRONOUS_IO_NONALERT
|
|
|
|
| FILE_OPEN_FOR_BACKUP_INTENT
|
|
|
|
| FILE_NON_DIRECTORY_FILE);
|
|
|
|
if (!NT_SUCCESS (status))
|
2005-09-15 08:31:42 +08:00
|
|
|
{
|
2013-06-20 00:00:43 +08:00
|
|
|
/* File is not readable? Doesn't mean it's not executable.
|
|
|
|
Test for executability and if so, just assume the file is
|
|
|
|
a cygwin executable and go ahead. */
|
|
|
|
if (status == STATUS_ACCESS_DENIED && real_path.has_acls ()
|
|
|
|
&& check_file_access (real_path, X_OK, true) == 0)
|
|
|
|
{
|
|
|
|
real_path.set_cygexec (true);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
goto err;
|
2005-09-15 08:31:42 +08:00
|
|
|
}
|
2013-06-20 00:00:43 +08:00
|
|
|
if (!GetFileSizeEx (h, &size))
|
2005-09-15 08:31:42 +08:00
|
|
|
{
|
2013-06-20 00:00:43 +08:00
|
|
|
NtClose (h);
|
|
|
|
goto err;
|
2005-09-15 08:31:42 +08:00
|
|
|
}
|
2013-06-20 00:00:43 +08:00
|
|
|
if (size.QuadPart > (LONGLONG) wincap.allocation_granularity ())
|
|
|
|
size.LowPart = wincap.allocation_granularity ();
|
2005-07-17 08:51:03 +08:00
|
|
|
|
2013-06-20 00:00:43 +08:00
|
|
|
HANDLE hm = CreateFileMapping (h, &sec_none_nih, PAGE_READONLY,
|
|
|
|
0, 0, NULL);
|
|
|
|
NtClose (h);
|
|
|
|
if (!hm)
|
|
|
|
{
|
|
|
|
/* ERROR_FILE_INVALID indicates very likely an empty file. */
|
|
|
|
if (GetLastError () == ERROR_FILE_INVALID)
|
|
|
|
{
|
|
|
|
debug_printf ("zero length file, treat as script.");
|
|
|
|
goto just_shell;
|
|
|
|
}
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
/* Try to map the first 64K of the image. That's enough for the local
|
|
|
|
tests, and it's enough for hook_or_detect_cygwin to compute the IAT
|
|
|
|
address. */
|
|
|
|
buf = (char *) MapViewOfFile (hm, FILE_MAP_READ, 0, 0, size.LowPart);
|
|
|
|
if (!buf)
|
|
|
|
{
|
|
|
|
CloseHandle (hm);
|
|
|
|
goto err;
|
|
|
|
}
|
2005-07-17 08:51:03 +08:00
|
|
|
|
|
|
|
{
|
2013-06-20 00:00:43 +08:00
|
|
|
myfault efault;
|
|
|
|
if (efault.faulted ())
|
2005-07-17 08:51:03 +08:00
|
|
|
{
|
2013-06-20 00:00:43 +08:00
|
|
|
UnmapViewOfFile (buf);
|
|
|
|
CloseHandle (hm);
|
|
|
|
real_path.set_cygexec (false);
|
|
|
|
break;
|
2005-07-17 08:51:03 +08:00
|
|
|
}
|
2013-06-20 00:00:43 +08:00
|
|
|
if (buf[0] == 'M' && buf[1] == 'Z')
|
2011-01-19 22:59:10 +08:00
|
|
|
{
|
2013-06-20 00:00:43 +08:00
|
|
|
WORD subsys;
|
|
|
|
unsigned off = (unsigned char) buf[0x18] | (((unsigned char) buf[0x19]) << 8);
|
|
|
|
win16_exe = off < sizeof (IMAGE_DOS_HEADER);
|
|
|
|
if (!win16_exe)
|
|
|
|
real_path.set_cygexec (hook_or_detect_cygwin (buf, NULL,
|
|
|
|
subsys, hm));
|
|
|
|
else
|
|
|
|
real_path.set_cygexec (false);
|
|
|
|
UnmapViewOfFile (buf);
|
|
|
|
CloseHandle (hm);
|
|
|
|
break;
|
2011-01-19 22:59:10 +08:00
|
|
|
}
|
2005-07-17 08:51:03 +08:00
|
|
|
}
|
2013-06-20 00:00:43 +08:00
|
|
|
CloseHandle (hm);
|
2005-07-17 08:51:03 +08:00
|
|
|
|
2013-06-20 00:00:43 +08:00
|
|
|
debug_printf ("%s is possibly a script", real_path.get_win32 ());
|
|
|
|
|
|
|
|
ptr = buf;
|
|
|
|
if (*ptr++ == '#' && *ptr++ == '!')
|
|
|
|
{
|
|
|
|
ptr += strspn (ptr, " \t");
|
|
|
|
size_t len = strcspn (ptr, "\r\n");
|
|
|
|
if (len)
|
|
|
|
{
|
|
|
|
char *namebuf = (char *) alloca (len + 1);
|
|
|
|
memcpy (namebuf, ptr, len);
|
|
|
|
namebuf[len] = '\0';
|
|
|
|
for (ptr = pgm = namebuf; *ptr; ptr++)
|
|
|
|
if (!arg1 && (*ptr == ' ' || *ptr == '\t'))
|
|
|
|
{
|
|
|
|
/* Null terminate the initial command and step over any
|
|
|
|
additional white space. If we've hit the end of the
|
|
|
|
line, exit the loop. Otherwise, we've found the first
|
|
|
|
argument. Position the current pointer on the last known
|
|
|
|
white space. */
|
|
|
|
*ptr = '\0';
|
|
|
|
char *newptr = ptr + 1;
|
|
|
|
newptr += strspn (newptr, " \t");
|
|
|
|
if (!*newptr)
|
|
|
|
break;
|
|
|
|
arg1 = newptr;
|
|
|
|
ptr = newptr - 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
UnmapViewOfFile (buf);
|
|
|
|
just_shell:
|
|
|
|
if (!pgm)
|
|
|
|
{
|
|
|
|
if (!p_type_exec)
|
|
|
|
{
|
|
|
|
/* Not called from exec[lv]p. Don't try to treat as script. */
|
|
|
|
debug_printf ("%s is not a valid executable",
|
|
|
|
real_path.get_win32 ());
|
|
|
|
set_errno (ENOEXEC);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (ascii_strcasematch (ext, ".com"))
|
|
|
|
break;
|
|
|
|
pgm = (char *) "/bin/sh";
|
|
|
|
arg1 = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if script is executable. Otherwise we start non-executable
|
|
|
|
scripts successfully, which is incorrect behaviour. */
|
|
|
|
if (real_path.has_acls ()
|
|
|
|
&& check_file_access (real_path, X_OK, true) < 0)
|
|
|
|
return -1; /* errno is already set. */
|
|
|
|
|
|
|
|
/* Replace argv[0] with the full path to the script if this is the
|
|
|
|
first time through the loop. */
|
|
|
|
replace0_maybe (prog_arg);
|
|
|
|
|
|
|
|
/* pointers:
|
|
|
|
* pgm interpreter name
|
|
|
|
* arg1 optional string
|
|
|
|
*/
|
|
|
|
if (arg1)
|
|
|
|
unshift (arg1);
|
|
|
|
|
|
|
|
/* FIXME: This should not be using FE_NATIVE. It should be putting
|
|
|
|
the posix path on the argv list. */
|
|
|
|
find_exec (pgm, real_path, "PATH=", FE_NATIVE, &ext);
|
|
|
|
unshift (real_path.get_win32 (), 1);
|
|
|
|
}
|
|
|
|
if (real_path.iscygexec ())
|
|
|
|
dup_all ();
|
2005-07-17 08:51:03 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
err:
|
|
|
|
__seterrno ();
|
|
|
|
return -1;
|
|
|
|
}
|