1 | /* Copyright (C) 1993-2023 Free Software Foundation, Inc. |
2 | This file is part of the GNU C Library. |
3 | |
4 | The GNU C Library is free software; you can redistribute it and/or |
5 | modify it under the terms of the GNU Lesser General Public |
6 | License as published by the Free Software Foundation; either |
7 | version 2.1 of the License, or (at your option) any later version. |
8 | |
9 | The GNU C Library is distributed in the hope that it will be useful, |
10 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
11 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
12 | Lesser General Public License for more details. |
13 | |
14 | You should have received a copy of the GNU Lesser General Public |
15 | License along with the GNU C Library; if not, see |
16 | <https://www.gnu.org/licenses/>. |
17 | |
18 | As a special exception, if you link the code in this file with |
19 | files compiled with a GNU compiler to produce an executable, |
20 | that does not cause the resulting executable to be covered by |
21 | the GNU Lesser General Public License. This exception does not |
22 | however invalidate any other reasons why the executable file |
23 | might be covered by the GNU Lesser General Public License. |
24 | This exception applies to code released by its copyright holders |
25 | in files containing the exception. */ |
26 | |
27 | #include "libioP.h" |
28 | #include <fcntl.h> |
29 | #include <signal.h> |
30 | #include <unistd.h> |
31 | #include <stdlib.h> |
32 | #include <shlib-compat.h> |
33 | #include <not-cancel.h> |
34 | #include <sys/types.h> |
35 | #include <sys/wait.h> |
36 | #include <spawn.h> |
37 | #include <paths.h> |
38 | |
39 | struct _IO_proc_file |
40 | { |
41 | struct _IO_FILE_plus file; |
42 | /* Following fields must match those in class procbuf (procbuf.h) */ |
43 | pid_t pid; |
44 | struct _IO_proc_file *next; |
45 | }; |
46 | typedef struct _IO_proc_file _IO_proc_file; |
47 | |
48 | static const struct _IO_jump_t _IO_proc_jumps; |
49 | |
50 | static struct _IO_proc_file *proc_file_chain; |
51 | |
52 | #ifdef _IO_MTSAFE_IO |
53 | static _IO_lock_t proc_file_chain_lock = _IO_lock_initializer; |
54 | |
55 | static void |
56 | unlock (void *not_used) |
57 | { |
58 | _IO_lock_unlock (proc_file_chain_lock); |
59 | } |
60 | #endif |
61 | |
62 | /* POSIX states popen shall ensure that any streams from previous popen() |
63 | calls that remain open in the parent process should be closed in the new |
64 | child process. |
65 | To avoid a race-condition between checking which file descriptors need to |
66 | be close (by transversing the proc_file_chain list) and the insertion of a |
67 | new one after a successful posix_spawn this function should be called |
68 | with proc_file_chain_lock acquired. */ |
69 | static bool |
70 | spawn_process (posix_spawn_file_actions_t *fa, FILE *fp, const char *command, |
71 | int do_cloexec, int pipe_fds[2], int parent_end, int child_end, |
72 | int child_pipe_fd) |
73 | { |
74 | |
75 | for (struct _IO_proc_file *p = proc_file_chain; p; p = p->next) |
76 | { |
77 | int fd = _IO_fileno ((FILE *) p); |
78 | |
79 | /* If any stream from previous popen() calls has fileno |
80 | child_pipe_fd, it has been already closed by the adddup2 action |
81 | above. */ |
82 | if (fd != child_pipe_fd |
83 | && __posix_spawn_file_actions_addclose (fa, fd) != 0) |
84 | return false; |
85 | } |
86 | |
87 | if (__posix_spawn (&((_IO_proc_file *) fp)->pid, _PATH_BSHELL, fa, 0, |
88 | (char *const[]){ (char*) "sh" , (char*) "-c" , |
89 | (char *) command, NULL }, __environ) != 0) |
90 | return false; |
91 | |
92 | __close_nocancel (pipe_fds[child_end]); |
93 | |
94 | if (!do_cloexec) |
95 | /* Undo the effects of the pipe2 call which set the |
96 | close-on-exec flag. */ |
97 | __fcntl (pipe_fds[parent_end], F_SETFD, 0); |
98 | |
99 | _IO_fileno (fp) = pipe_fds[parent_end]; |
100 | |
101 | ((_IO_proc_file *) fp)->next = proc_file_chain; |
102 | proc_file_chain = (_IO_proc_file *) fp; |
103 | |
104 | return true; |
105 | } |
106 | |
107 | FILE * |
108 | _IO_new_proc_open (FILE *fp, const char *command, const char *mode) |
109 | { |
110 | int read_or_write; |
111 | /* These are indexes for pipe_fds. */ |
112 | int parent_end, child_end; |
113 | int pipe_fds[2]; |
114 | int child_pipe_fd; |
115 | bool spawn_ok; |
116 | |
117 | int do_read = 0; |
118 | int do_write = 0; |
119 | int do_cloexec = 0; |
120 | while (*mode != '\0') |
121 | switch (*mode++) |
122 | { |
123 | case 'r': |
124 | do_read = 1; |
125 | break; |
126 | case 'w': |
127 | do_write = 1; |
128 | break; |
129 | case 'e': |
130 | do_cloexec = 1; |
131 | break; |
132 | default: |
133 | errout: |
134 | __set_errno (EINVAL); |
135 | return NULL; |
136 | } |
137 | |
138 | if ((do_read ^ do_write) == 0) |
139 | goto errout; |
140 | |
141 | if (_IO_file_is_open (fp)) |
142 | return NULL; |
143 | |
144 | /* Atomically set the O_CLOEXEC flag for the pipe end used by the |
145 | child process (to avoid leaking the file descriptor in case of a |
146 | concurrent fork). This is later reverted in the child process. |
147 | When popen returns, the parent pipe end can be O_CLOEXEC or not, |
148 | depending on the 'e' open mode, but there is only one flag which |
149 | controls both descriptors. The parent end is adjusted below, |
150 | after creating the child process. (In the child process, the |
151 | parent end should be closed on execve, so O_CLOEXEC remains set |
152 | there.) */ |
153 | if (__pipe2 (pipe_fds, O_CLOEXEC) < 0) |
154 | return NULL; |
155 | |
156 | if (do_read) |
157 | { |
158 | parent_end = 0; |
159 | child_end = 1; |
160 | read_or_write = _IO_NO_WRITES; |
161 | child_pipe_fd = 1; |
162 | } |
163 | else |
164 | { |
165 | parent_end = 1; |
166 | child_end = 0; |
167 | read_or_write = _IO_NO_READS; |
168 | child_pipe_fd = 0; |
169 | } |
170 | |
171 | posix_spawn_file_actions_t fa; |
172 | /* posix_spawn_file_actions_init does not fail. */ |
173 | __posix_spawn_file_actions_init (&fa); |
174 | |
175 | /* The descriptor is already the one the child will use. In this case |
176 | it must be moved to another one otherwise, there is no safe way to |
177 | remove the close-on-exec flag in the child without creating a FD leak |
178 | race in the parent. */ |
179 | if (pipe_fds[child_end] == child_pipe_fd) |
180 | { |
181 | int tmp = __fcntl (child_pipe_fd, F_DUPFD_CLOEXEC, 0); |
182 | if (tmp < 0) |
183 | goto spawn_failure; |
184 | __close_nocancel (pipe_fds[child_end]); |
185 | pipe_fds[child_end] = tmp; |
186 | } |
187 | |
188 | if (__posix_spawn_file_actions_adddup2 (&fa, pipe_fds[child_end], |
189 | child_pipe_fd) != 0) |
190 | goto spawn_failure; |
191 | |
192 | #ifdef _IO_MTSAFE_IO |
193 | _IO_cleanup_region_start_noarg (unlock); |
194 | _IO_lock_lock (proc_file_chain_lock); |
195 | #endif |
196 | spawn_ok = spawn_process (&fa, fp, command, do_cloexec, pipe_fds, |
197 | parent_end, child_end, child_pipe_fd); |
198 | #ifdef _IO_MTSAFE_IO |
199 | _IO_lock_unlock (proc_file_chain_lock); |
200 | _IO_cleanup_region_end (0); |
201 | #endif |
202 | |
203 | __posix_spawn_file_actions_destroy (&fa); |
204 | |
205 | if (!spawn_ok) |
206 | { |
207 | spawn_failure: |
208 | __close_nocancel (pipe_fds[child_end]); |
209 | __close_nocancel (pipe_fds[parent_end]); |
210 | __set_errno (ENOMEM); |
211 | return NULL; |
212 | } |
213 | |
214 | _IO_mask_flags (fp, read_or_write, _IO_NO_READS|_IO_NO_WRITES); |
215 | return fp; |
216 | } |
217 | |
218 | FILE * |
219 | _IO_new_popen (const char *command, const char *mode) |
220 | { |
221 | struct locked_FILE |
222 | { |
223 | struct _IO_proc_file fpx; |
224 | #ifdef _IO_MTSAFE_IO |
225 | _IO_lock_t lock; |
226 | #endif |
227 | } *new_f; |
228 | FILE *fp; |
229 | |
230 | new_f = (struct locked_FILE *) malloc (sizeof (struct locked_FILE)); |
231 | if (new_f == NULL) |
232 | return NULL; |
233 | #ifdef _IO_MTSAFE_IO |
234 | new_f->fpx.file.file._lock = &new_f->lock; |
235 | #endif |
236 | fp = &new_f->fpx.file.file; |
237 | _IO_init_internal (fp, 0); |
238 | _IO_JUMPS (&new_f->fpx.file) = &_IO_proc_jumps; |
239 | _IO_new_file_init_internal (&new_f->fpx.file); |
240 | if (_IO_new_proc_open (fp, command, mode) != NULL) |
241 | return (FILE *) &new_f->fpx.file; |
242 | _IO_un_link (&new_f->fpx.file); |
243 | free (new_f); |
244 | return NULL; |
245 | } |
246 | |
247 | int |
248 | _IO_new_proc_close (FILE *fp) |
249 | { |
250 | /* This is not name-space clean. FIXME! */ |
251 | int wstatus; |
252 | _IO_proc_file **ptr = &proc_file_chain; |
253 | pid_t wait_pid; |
254 | int status = -1; |
255 | |
256 | /* Unlink from proc_file_chain. */ |
257 | #ifdef _IO_MTSAFE_IO |
258 | _IO_cleanup_region_start_noarg (unlock); |
259 | _IO_lock_lock (proc_file_chain_lock); |
260 | #endif |
261 | for ( ; *ptr != NULL; ptr = &(*ptr)->next) |
262 | { |
263 | if (*ptr == (_IO_proc_file *) fp) |
264 | { |
265 | *ptr = (*ptr)->next; |
266 | status = 0; |
267 | break; |
268 | } |
269 | } |
270 | #ifdef _IO_MTSAFE_IO |
271 | _IO_lock_unlock (proc_file_chain_lock); |
272 | _IO_cleanup_region_end (0); |
273 | #endif |
274 | |
275 | if (status < 0 || __close_nocancel (_IO_fileno(fp)) < 0) |
276 | return -1; |
277 | /* POSIX.2 Rationale: "Some historical implementations either block |
278 | or ignore the signals SIGINT, SIGQUIT, and SIGHUP while waiting |
279 | for the child process to terminate. Since this behavior is not |
280 | described in POSIX.2, such implementations are not conforming." */ |
281 | do |
282 | { |
283 | int state; |
284 | __pthread_setcancelstate (PTHREAD_CANCEL_DISABLE, &state); |
285 | wait_pid = __waitpid (((_IO_proc_file *) fp)->pid, &wstatus, 0); |
286 | __pthread_setcancelstate (state, NULL); |
287 | } |
288 | while (wait_pid == -1 && errno == EINTR); |
289 | if (wait_pid == -1) |
290 | return -1; |
291 | return wstatus; |
292 | } |
293 | |
294 | static const struct _IO_jump_t _IO_proc_jumps libio_vtable = { |
295 | JUMP_INIT_DUMMY, |
296 | JUMP_INIT(finish, _IO_new_file_finish), |
297 | JUMP_INIT(overflow, _IO_new_file_overflow), |
298 | JUMP_INIT(underflow, _IO_new_file_underflow), |
299 | JUMP_INIT(uflow, _IO_default_uflow), |
300 | JUMP_INIT(pbackfail, _IO_default_pbackfail), |
301 | JUMP_INIT(xsputn, _IO_new_file_xsputn), |
302 | JUMP_INIT(xsgetn, _IO_default_xsgetn), |
303 | JUMP_INIT(seekoff, _IO_new_file_seekoff), |
304 | JUMP_INIT(seekpos, _IO_default_seekpos), |
305 | JUMP_INIT(setbuf, _IO_new_file_setbuf), |
306 | JUMP_INIT(sync, _IO_new_file_sync), |
307 | JUMP_INIT(doallocate, _IO_file_doallocate), |
308 | JUMP_INIT(read, _IO_file_read), |
309 | JUMP_INIT(write, _IO_new_file_write), |
310 | JUMP_INIT(seek, _IO_file_seek), |
311 | JUMP_INIT(close, _IO_new_proc_close), |
312 | JUMP_INIT(stat, _IO_file_stat), |
313 | JUMP_INIT(showmanyc, _IO_default_showmanyc), |
314 | JUMP_INIT(imbue, _IO_default_imbue) |
315 | }; |
316 | |
317 | strong_alias (_IO_new_popen, __new_popen) |
318 | versioned_symbol (libc, _IO_new_popen, _IO_popen, GLIBC_2_1); |
319 | versioned_symbol (libc, __new_popen, popen, GLIBC_2_1); |
320 | versioned_symbol (libc, _IO_new_proc_open, _IO_proc_open, GLIBC_2_1); |
321 | versioned_symbol (libc, _IO_new_proc_close, _IO_proc_close, GLIBC_2_1); |
322 | |