From patchwork Sat Sep 15 15:16:20 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adhemerval Zanella X-Patchwork-Id: 146777 Delivered-To: patch@linaro.org Received: by 2002:a2e:1648:0:0:0:0:0 with SMTP id 8-v6csp1892501ljw; Sat, 15 Sep 2018 08:18:20 -0700 (PDT) X-Google-Smtp-Source: ANB0VdbSjre4ONUXM9fLTE3h9QhlOnvlKjftcc0HFuRAHhQvIJ17YKxLISKmDFwJeF3A9+Kadu0U X-Received: by 2002:a65:4d42:: with SMTP id j2-v6mr16186726pgt.232.1537024700541; Sat, 15 Sep 2018 08:18:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537024700; cv=none; d=google.com; s=arc-20160816; b=byMGv8pdHRn07ovggL24EG54h+fpUjok6xUH3jGyGPZoByzwX02DRYcYmD+BdlRCLH 4jmZRt2kvBErNB9n+/TpS/SbZeF5aVEWHGwUuRa3XzrZP8vN5jgqgV0uzBFNaFYsgluL a3ubAqjGT2DKXAQ2uOt4tuEsjzhags7LTLY8NLI8q9EywmmadoV3XKKYVSQrMvW2GIoe sXL8VSBq6iEVHiA85wKw2RsMcAxNFft03GhXsvixXdAw+3+gpK1jtd7mMULfgR5yYozt qSFbueI42TABIUsxCHzWjNwnQ+rB2cdZx57cA+8vsxlMRahKxZkd+BGrFCH1t3CQQdjI +pdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=message-id:date:subject:to:from:dkim-signature:delivered-to:sender :list-help:list-post:list-archive:list-subscribe:list-unsubscribe :list-id:precedence:mailing-list:dkim-signature:domainkey-signature; bh=lR7VB5qhzYZD6omRXeaqcyqB7PBTkc3xa6SA+usFC+I=; b=ZkiG5OuzjL0jzDxDmCpGEmiADzHyhRS5j9ausW+4NqAzBg5nXpglUImHW/MLJgePS8 RfpaFwNlPVce/ne4Apg9MWsLmgRDXJyfWkYcdtOu/rk3inZlgNoJI5UL41DseYSpvR6W xhesL+i/nPK+NWVEORhBZP25jwoXx9NYZG5181zctljisTgtWwU0YhRLvE87xD/Vk+TH Wi0wQk5MlIT8bcIwz5vU8CHGRectv9YEUAhDJB1ErRKOpSaa46l3+EwbRepmpQj+/ycr eamyMnT/GeXz75+sH/isIIUY2slglgVjtKPyCKCA2WZkleyuDB/GDmMSr2Z/EJTlo7/k CWFw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sourceware.org header.s=default header.b=DXXWpzXW; dkim=pass header.i=@linaro.org header.s=google header.b=f3Tc5Ebb; spf=pass (google.com: domain of libc-alpha-return-95850-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) smtp.mailfrom="libc-alpha-return-95850-patch=linaro.org@sourceware.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from sourceware.org (server1.sourceware.org. [209.132.180.131]) by mx.google.com with ESMTPS id g3-v6si9776548pgu.248.2018.09.15.08.18.20 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 15 Sep 2018 08:18:20 -0700 (PDT) Received-SPF: pass (google.com: domain of libc-alpha-return-95850-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) client-ip=209.132.180.131; Authentication-Results: mx.google.com; dkim=pass header.i=@sourceware.org header.s=default header.b=DXXWpzXW; dkim=pass header.i=@linaro.org header.s=google header.b=f3Tc5Ebb; spf=pass (google.com: domain of libc-alpha-return-95850-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) smtp.mailfrom="libc-alpha-return-95850-patch=linaro.org@sourceware.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:subject:date:message-id; q=dns; s= default; b=vCiRhPWVU2Dv0wdD6gKZpneqJ3oz1T31fPNjKmAbvSUGGCLvmLoxo +lHqszI+aWLk2PYjulaN6vyUFdq80alfj5+e6ExBJKQ4VzBcg8Jm3h5MEnQ6lOX5 4WF+tzhd3BTkTg1BKZq1O8nge1D0IDZjQtbYsxC6PGa8+DIhrZU+N0= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:subject:date:message-id; s=default; bh=qSowf9raUoLMWSfufBflgZN+vqM=; b=DXXWpzXW8/DRY3SoTOct+ZVDKObW /wVm/dy5DrtowqVpCpsIF1eEqNT6Iw0Rw5pKLkaF1tlMsQBC1VkqKXjCBdgYN3xh GDUpUFQhF/MlWsati1BV+fJYfcRnzWh3Pi2k5z3kJZ4E56dc+xdYDxCB+Fa8ud3s jDHmE2ADkGGN0rU= Received: (qmail 88678 invoked by alias); 15 Sep 2018 15:18:10 -0000 Mailing-List: contact libc-alpha-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: libc-alpha-owner@sourceware.org Delivered-To: mailing list libc-alpha@sourceware.org Received: (qmail 88652 invoked by uid 89); 15 Sep 2018 15:18:08 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-25.7 required=5.0 tests=AWL, BAYES_00, GIT_PATCH_0, GIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, RCVD_IN_DNSWL_NONE, SPF_PASS autolearn=ham version=3.3.2 spammy=Simply, actions X-HELO: mail-qt0-f193.google.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:subject:date:message-id; bh=lR7VB5qhzYZD6omRXeaqcyqB7PBTkc3xa6SA+usFC+I=; b=f3Tc5EbbrGCrrjqgz/mAW2FFv6D62yBi3Eb0W7cZ4Qctbeu8Uce3gjM7a3MVO709PM cDm+hwkJEeRy9q6CYYkb4CPOyo9IuhMzDVadKcgJ/GhtLv7f8lNZINDyMGWFd5QcfNe7 cT40D4Obz+EGu4suqoUuP3PcF084vDv7t+hIo= Return-Path: From: Adhemerval Zanella To: libc-alpha@sourceware.org Subject: [PATCH 1/3] posix: Add internal symbols for posix_spawn interface Date: Sat, 15 Sep 2018 12:16:20 -0300 Message-Id: <20180915151622.17789-1-adhemerval.zanella@linaro.org> This patch adds internal hidden definition for mostly of the posix_spawn function so it can be used internally on both popen and system implementations. Checked on x86_64-linux-gnu. * include/spawn.h (__posix_spawn, posix_spawn_file_actions_addclose, __posix_spawn_file_actions_adddup2, __posix_spawn_file_actions_destroy, __posix_spawn_file_actions_init, __posix_spawnattr_init, __posix_spawnattr_destroy, __posix_spawnattr_setflags, __posix_spawnattr_setsigdefault, __posix_spawnattr_setsigmask): New prototype. * posix/spawn.c (__posix_spawn): Add libc_hidden_def. * posix/spawn_faction_addclose.c (__posix_spawn_file_actions_addclose): Add hidden definition. * posix/spawn_faction_adddup2.c (__posix_spawn_file_actions_adddup2): Likewise. * posix/spawn_faction_destroy.c (__posix_spawn_file_actions_destroy): Likewise. * posix/spawn_faction_init.c (__posix_spawn_file_actions_init): Likewise. * posix/spawnattr_destroy.c (__posix_spawnattr_destroy): Likewise. * posix/spawnattr_init.c (__posix_spawnattr_init): Likewise. * posix/spawnattr_setdefault.c (__posix_spawnattr_setsigdefault): Likewise. * posix/spawnattr_setflags.c (__posix_spawnattr_setflags): Likewise. * posix/spawnattr_setsigmask.c (__posix_spawnattr_setsigmask): Likewise. --- ChangeLog | 25 ++++++++++++++++++++++++ include/spawn.h | 35 ++++++++++++++++++++++++++++++++++ posix/spawn.c | 1 + posix/spawn_faction_addclose.c | 6 ++++-- posix/spawn_faction_adddup2.c | 6 ++++-- posix/spawn_faction_destroy.c | 4 +++- posix/spawn_faction_init.c | 3 ++- posix/spawnattr_destroy.c | 3 ++- posix/spawnattr_init.c | 3 ++- posix/spawnattr_setdefault.c | 5 +++-- posix/spawnattr_setflags.c | 3 ++- posix/spawnattr_setsigmask.c | 3 ++- 12 files changed, 85 insertions(+), 12 deletions(-) -- 2.17.1 diff --git a/include/spawn.h b/include/spawn.h index a6c7a8adc3..7fdd965bd7 100644 --- a/include/spawn.h +++ b/include/spawn.h @@ -1 +1,36 @@ +#ifndef _SPAWN_H #include + +# ifndef _ISOMAC +__typeof (posix_spawn) __posix_spawn; +libc_hidden_proto (__posix_spawn) + +__typeof (posix_spawn_file_actions_addclose) + __posix_spawn_file_actions_addclose attribute_hidden; + +__typeof (posix_spawn_file_actions_adddup2) + __posix_spawn_file_actions_adddup2 attribute_hidden; + +__typeof (posix_spawn_file_actions_destroy) + __posix_spawn_file_actions_destroy attribute_hidden; + +__typeof (posix_spawn_file_actions_init) __posix_spawn_file_actions_init + attribute_hidden; + +__typeof (posix_spawnattr_init) __posix_spawnattr_init + attribute_hidden; + +__typeof (posix_spawnattr_destroy) __posix_spawnattr_destroy + attribute_hidden; + +__typeof (posix_spawnattr_setflags) __posix_spawnattr_setflags + attribute_hidden; + +__typeof (posix_spawnattr_setsigdefault) __posix_spawnattr_setsigdefault + attribute_hidden; + +__typeof (posix_spawnattr_setsigmask) __posix_spawnattr_setsigmask + attribute_hidden; + +# endif /* !_ISOMAC */ +#endif /* spawn.h */ diff --git a/posix/spawn.c b/posix/spawn.c index 51f67b2755..a82f1c84e2 100644 --- a/posix/spawn.c +++ b/posix/spawn.c @@ -30,6 +30,7 @@ __posix_spawn (pid_t *pid, const char *path, return __spawni (pid, path, file_actions, attrp, argv, envp, 0); } versioned_symbol (libc, __posix_spawn, posix_spawn, GLIBC_2_15); +libc_hidden_def (__posix_spawn) #if SHLIB_COMPAT (libc, GLIBC_2_2, GLIBC_2_15) diff --git a/posix/spawn_faction_addclose.c b/posix/spawn_faction_addclose.c index 21081e19b5..e1fafe438c 100644 --- a/posix/spawn_faction_addclose.c +++ b/posix/spawn_faction_addclose.c @@ -24,8 +24,8 @@ /* Add an action to FILE-ACTIONS which tells the implementation to call `close' for the given file descriptor during the `spawn' call. */ int -posix_spawn_file_actions_addclose (posix_spawn_file_actions_t *file_actions, - int fd) +__posix_spawn_file_actions_addclose (posix_spawn_file_actions_t *file_actions, + int fd) { struct __spawn_action *rec; @@ -48,3 +48,5 @@ posix_spawn_file_actions_addclose (posix_spawn_file_actions_t *file_actions, return 0; } +weak_alias (__posix_spawn_file_actions_addclose, + posix_spawn_file_actions_addclose) diff --git a/posix/spawn_faction_adddup2.c b/posix/spawn_faction_adddup2.c index 363bc29ae5..371b1de3e6 100644 --- a/posix/spawn_faction_adddup2.c +++ b/posix/spawn_faction_adddup2.c @@ -24,8 +24,8 @@ /* Add an action to FILE-ACTIONS which tells the implementation to call `dup2' for the given file descriptors during the `spawn' call. */ int -posix_spawn_file_actions_adddup2 (posix_spawn_file_actions_t *file_actions, - int fd, int newfd) +__posix_spawn_file_actions_adddup2 (posix_spawn_file_actions_t *file_actions, + int fd, int newfd) { struct __spawn_action *rec; @@ -49,3 +49,5 @@ posix_spawn_file_actions_adddup2 (posix_spawn_file_actions_t *file_actions, return 0; } +weak_alias (__posix_spawn_file_actions_adddup2, + posix_spawn_file_actions_adddup2) diff --git a/posix/spawn_faction_destroy.c b/posix/spawn_faction_destroy.c index 46061ee347..2a2de4e41d 100644 --- a/posix/spawn_faction_destroy.c +++ b/posix/spawn_faction_destroy.c @@ -22,7 +22,7 @@ /* Deallocate the file actions. */ int -posix_spawn_file_actions_destroy (posix_spawn_file_actions_t *file_actions) +__posix_spawn_file_actions_destroy (posix_spawn_file_actions_t *file_actions) { /* Free the paths in the open actions. */ for (int i = 0; i < file_actions->__used; ++i) @@ -44,3 +44,5 @@ posix_spawn_file_actions_destroy (posix_spawn_file_actions_t *file_actions) free (file_actions->__actions); return 0; } +weak_alias (__posix_spawn_file_actions_destroy, + posix_spawn_file_actions_destroy) diff --git a/posix/spawn_faction_init.c b/posix/spawn_faction_init.c index ddb42e6a77..98432067c6 100644 --- a/posix/spawn_faction_init.c +++ b/posix/spawn_faction_init.c @@ -45,9 +45,10 @@ __posix_spawn_file_actions_realloc (posix_spawn_file_actions_t *file_actions) /* Initialize data structure for file attribute for `spawn' call. */ int -posix_spawn_file_actions_init (posix_spawn_file_actions_t *file_actions) +__posix_spawn_file_actions_init (posix_spawn_file_actions_t *file_actions) { /* Simply clear all the elements. */ memset (file_actions, '\0', sizeof (*file_actions)); return 0; } +weak_alias (__posix_spawn_file_actions_init, posix_spawn_file_actions_init) diff --git a/posix/spawnattr_destroy.c b/posix/spawnattr_destroy.c index 603e00fffe..0433867785 100644 --- a/posix/spawnattr_destroy.c +++ b/posix/spawnattr_destroy.c @@ -19,8 +19,9 @@ /* Initialize data structure for file attribute for `spawn' call. */ int -posix_spawnattr_destroy (posix_spawnattr_t *attr) +__posix_spawnattr_destroy (posix_spawnattr_t *attr) { /* Nothing to do in the moment. */ return 0; } +weak_alias (__posix_spawnattr_destroy, posix_spawnattr_destroy) diff --git a/posix/spawnattr_init.c b/posix/spawnattr_init.c index bab464e62b..4e1218ab44 100644 --- a/posix/spawnattr_init.c +++ b/posix/spawnattr_init.c @@ -20,7 +20,7 @@ /* Initialize data structure for file attribute for `spawn' call. */ int -posix_spawnattr_init (posix_spawnattr_t *attr) +__posix_spawnattr_init (posix_spawnattr_t *attr) { /* All elements have to be initialized to the default values which is generally zero. */ @@ -28,3 +28,4 @@ posix_spawnattr_init (posix_spawnattr_t *attr) return 0; } +weak_alias (__posix_spawnattr_init, posix_spawnattr_init) diff --git a/posix/spawnattr_setdefault.c b/posix/spawnattr_setdefault.c index c77cda59be..174bcfa423 100644 --- a/posix/spawnattr_setdefault.c +++ b/posix/spawnattr_setdefault.c @@ -20,11 +20,12 @@ /* Set signal mask for signals with default handling in ATTR to SIGDEFAULT. */ int -posix_spawnattr_setsigdefault (posix_spawnattr_t *attr, - const sigset_t *sigdefault) +__posix_spawnattr_setsigdefault (posix_spawnattr_t *attr, + const sigset_t *sigdefault) { /* Copy the sigset_t data to the user buffer. */ memcpy (&attr->__sd, sigdefault, sizeof (sigset_t)); return 0; } +weak_alias (__posix_spawnattr_setsigdefault, posix_spawnattr_setsigdefault) diff --git a/posix/spawnattr_setflags.c b/posix/spawnattr_setflags.c index cf9a60181d..0a42e94770 100644 --- a/posix/spawnattr_setflags.c +++ b/posix/spawnattr_setflags.c @@ -30,7 +30,7 @@ /* Store flags in the attribute structure. */ int -posix_spawnattr_setflags (posix_spawnattr_t *attr, short int flags) +__posix_spawnattr_setflags (posix_spawnattr_t *attr, short int flags) { /* Check no invalid bits are set. */ if (flags & ~ALL_FLAGS) @@ -41,3 +41,4 @@ posix_spawnattr_setflags (posix_spawnattr_t *attr, short int flags) return 0; } +weak_alias (__posix_spawnattr_setflags, posix_spawnattr_setflags) diff --git a/posix/spawnattr_setsigmask.c b/posix/spawnattr_setsigmask.c index 7ae81ad470..12c0111af4 100644 --- a/posix/spawnattr_setsigmask.c +++ b/posix/spawnattr_setsigmask.c @@ -20,7 +20,7 @@ /* Set signal mask for the new process in ATTR to SIGMASK. */ int -posix_spawnattr_setsigmask (posix_spawnattr_t *attr, +__posix_spawnattr_setsigmask (posix_spawnattr_t *attr, const sigset_t *sigmask) { /* Copy the sigset_t data to the user buffer. */ @@ -28,3 +28,4 @@ posix_spawnattr_setsigmask (posix_spawnattr_t *attr, return 0; } +weak_alias (__posix_spawnattr_setsigmask, posix_spawnattr_setsigmask) From patchwork Sat Sep 15 15:16:21 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adhemerval Zanella X-Patchwork-Id: 146776 Delivered-To: patch@linaro.org Received: by 2002:a2e:1648:0:0:0:0:0 with SMTP id 8-v6csp1891367ljw; Sat, 15 Sep 2018 08:16:49 -0700 (PDT) X-Google-Smtp-Source: ANB0VdbODdHcm0NneyR6h+FcER8CSHs8ZLwMDWDofFRW77Rm3yJgi8SyBVLTTf91JWXE38RbMBLe X-Received: by 2002:aa7:8087:: with SMTP id v7-v6mr17777336pff.38.1537024609574; Sat, 15 Sep 2018 08:16:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537024609; cv=none; d=google.com; s=arc-20160816; b=TxOVHvesz68TDAQLwU++G4por48D/YAtmyF2mBJFYkD+XULc6sSLWIJnurOqxjDhP/ u8FwwSkS3gSZWtHVp7Zdlv9YedC1LxAnIUBYXG4Rtsq8JGEi+QWMPHmf6hRP7QzvOOPL Ahn67g6f9+MvzfeLDbKAXFrEJoVnFWqsAgIE7TnzjIHltI/R+yLj3lDbK5ktpSqprenl PWnnE+XmSXO5Yj8o6CfTxIa7xu4jAUyhK1YtTc1oQbOZaEYjAzrIIFhgcvLoK7xfMAtQ hfNdq20Q2rOyeNzOyqSpBOBdUB9ig1jNOijgCokpwJ5ZXqXinzwc5OMky4ncSVM5/vC4 ctIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=references:in-reply-to:message-id:date:subject:to:from :dkim-signature:delivered-to:sender:list-help:list-post:list-archive :list-subscribe:list-unsubscribe:list-id:precedence:mailing-list :dkim-signature:domainkey-signature; bh=k6eL6Rv/0zIIl2zSPg7G/W/YtsKUxDPXQWlAD1rAeX0=; b=zoc3pKCST0XWHngD0ADe++j9ILlU8yVf5JTvt2e42djU9X+/QyHlPpbyr6ps8VLY/v e+/nyINmT7D6Puyktzy7gzz32yKIRc4e7bXnxtwmzk2UZk3N35NwjB7pMo8m+oyQiN2q PNC34TBoTxSRjCUlT53N+L4HGJwItdjCu9hSzpO7sr3/sjykif5hHWUqOO9BKAo2QzJG GnZtpyQ9mlwDM2xWdT2XbIwP/0hEXR6XTMn/GaGDnV0yh74BR+BrAZctDSE5UbkWm8DK RZ2tWHPkMBoo+PSajzXWfVirdEa2A6n+jGbuYiIKh/RsL41SMoUzi3822rALUi+c0OdD ypLQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sourceware.org header.s=default header.b=ousNA7wb; dkim=pass header.i=@linaro.org header.s=google header.b=BxlDvGui; spf=pass (google.com: domain of libc-alpha-return-95849-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) smtp.mailfrom="libc-alpha-return-95849-patch=linaro.org@sourceware.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from sourceware.org (server1.sourceware.org. [209.132.180.131]) by mx.google.com with ESMTPS id t89-v6si10315482pfe.59.2018.09.15.08.16.49 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 15 Sep 2018 08:16:49 -0700 (PDT) Received-SPF: pass (google.com: domain of libc-alpha-return-95849-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) client-ip=209.132.180.131; Authentication-Results: mx.google.com; dkim=pass header.i=@sourceware.org header.s=default header.b=ousNA7wb; dkim=pass header.i=@linaro.org header.s=google header.b=BxlDvGui; spf=pass (google.com: domain of libc-alpha-return-95849-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) smtp.mailfrom="libc-alpha-return-95849-patch=linaro.org@sourceware.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:subject:date:message-id:in-reply-to :references; q=dns; s=default; b=TmTkOFDip+qeeDsYyNqyp0Vq/HbePKJ HZ7Q+U2Wr6kdMGIBHBgCcJa9P3Ei3nReRy+TYHv5wejmy9vrecgxrsTLHNByGBCb WiXP5L9Ew3L7EUY3T3YUxRUdDq/rkGD23vsD0ui1sCsiiGuXX5N++WQ45CaR8RdP AY5U17ZtKbFg= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:subject:date:message-id:in-reply-to :references; s=default; bh=q8LT6dOryFbVieLAvh7WLO7v/f0=; b=ousNA 7wbkk2oNTUzJpJ3gI5jfgRydNKFEHIVWopY2zELjM740GfxLhgJWfK9pVxTNUZGQ aeGIxDtztW5rTDBVX18dHOu+YII7s1esK6ELg90yV6zde5daR+xOuk/E6kff9ieP NMXR9rSnegPtdYpSadxdzHWY4Czfn1fL3HlkeY= Received: (qmail 86935 invoked by alias); 15 Sep 2018 15:16:39 -0000 Mailing-List: contact libc-alpha-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: libc-alpha-owner@sourceware.org Delivered-To: mailing list libc-alpha@sourceware.org Received: (qmail 86922 invoked by uid 89); 15 Sep 2018 15:16:39 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-25.7 required=5.0 tests=AWL, BAYES_00, GIT_PATCH_0, GIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, RCVD_IN_DNSWL_NONE, SPF_PASS autolearn=ham version=3.3.2 spammy=_exit X-HELO: mail-qt0-f174.google.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:subject:date:message-id:in-reply-to:references; bh=k6eL6Rv/0zIIl2zSPg7G/W/YtsKUxDPXQWlAD1rAeX0=; b=BxlDvGuifnSZbCWK5r4JTO+pGSgH3vAnJw4cRSi7I6zmfBOatkW95yo7JWS6dLOiyB wyc8Fx2HYUC43OFgm6sz3cGvHXzfrDPw9PzLI/XxKC/e+NJy+GkLV8DWD3XeyiZVkmX+ F5f8BzDfmO2hHKVmyGRZ5rdklq2NjdO21W2Zg= Return-Path: From: Adhemerval Zanella To: libc-alpha@sourceware.org Subject: [PATCH 2/3] posix: Use posix_spawn on popen Date: Sat, 15 Sep 2018 12:16:21 -0300 Message-Id: <20180915151622.17789-2-adhemerval.zanella@linaro.org> In-Reply-To: <20180915151622.17789-1-adhemerval.zanella@linaro.org> References: <20180915151622.17789-1-adhemerval.zanella@linaro.org> This patch uses posix_spawn on popen instead of fork and execl. On Linux this has the advantage of much lower memory consumption (usually 32 Kb minimum for the mmap stack area). Checked on x86_64-linux-gnu and i686-linux-gnu. * libio/iopopen.c (_IO_new_proc_open): use posix_spawn instead of fork and execl. --- ChangeLog | 3 ++ libio/iopopen.c | 97 +++++++++++++++++++++++++++++-------------------- 2 files changed, 61 insertions(+), 39 deletions(-) -- 2.17.1 diff --git a/libio/iopopen.c b/libio/iopopen.c index 2eff45b4c8..3cce2e5596 100644 --- a/libio/iopopen.c +++ b/libio/iopopen.c @@ -34,7 +34,8 @@ #include #include #include -#include +#include +#include struct _IO_proc_file { @@ -63,9 +64,8 @@ FILE * _IO_new_proc_open (FILE *fp, const char *command, const char *mode) { int read_or_write; - int parent_end, child_end; int pipe_fds[2]; - pid_t child_pid; + int op; int do_read = 0; int do_write = 0; @@ -108,59 +108,78 @@ _IO_new_proc_open (FILE *fp, const char *command, const char *mode) if (do_read) { - parent_end = pipe_fds[0]; - child_end = pipe_fds[1]; + op = 0; read_or_write = _IO_NO_WRITES; } else { - parent_end = pipe_fds[1]; - child_end = pipe_fds[0]; + op = 1; read_or_write = _IO_NO_READS; } - ((_IO_proc_file *) fp)->pid = child_pid = __fork (); - if (child_pid == 0) - { - int child_std_end = do_read ? 1 : 0; - struct _IO_proc_file *p; - - if (child_end != child_std_end) - __dup2 (child_end, child_std_end); - else - /* The descriptor is already the one we will use. But it must - not be marked close-on-exec. Undo the effects. */ - __fcntl (child_end, F_SETFD, 0); - /* POSIX.2: "popen() shall ensure that any streams from previous - popen() calls that remain open in the parent process are closed - in the new child process." */ - for (p = proc_file_chain; p; p = p->next) - { - int fd = _IO_fileno ((FILE *) p); + { + posix_spawn_file_actions_t fa; + /* posix_spawn_file_actions_init does not fail. */ + __posix_spawn_file_actions_init (&fa); - /* If any stream from previous popen() calls has fileno - child_std_end, it has been already closed by the dup2 syscall - above. */ - if (fd != child_std_end) - __close_nocancel (fd); - } + /* The descriptor is already in the one the child will use. In this case + it must be moved to another one, otherwise there is no safe way to + remove the close-on-exec flag in the child without creating a FD leak + race in the parent. */ + if (pipe_fds[1 - op] == 1 - op) + { + int tmp = __fcntl (1 - op, F_DUPFD_CLOEXEC, 0); + if (tmp < 0) + goto spawn_failure; + __close_nocancel (pipe_fds[1 - op]); + pipe_fds[1 - op] = tmp; + } - execl ("/bin/sh", "sh", "-c", command, (char *) 0); - _exit (127); - } - __close_nocancel (child_end); - if (child_pid < 0) + if (__posix_spawn_file_actions_adddup2 (&fa, pipe_fds[1 - op], 1 - op) + != 0) + goto spawn_failure; + + /* POSIX.2: "popen() shall ensure that any streams from previous popen() + calls that remain open in the parent process are closed in the new + child process." */ + for (struct _IO_proc_file *p = proc_file_chain; p; p = p->next) + { + int fd = _IO_fileno ((FILE *) p); + + /* If any stream from previous popen() calls has fileno + child_send, it has been already closed by the dup2 syscall + above. */ + if (fd != 1 - op + && __posix_spawn_file_actions_addclose (&fa, fd) != 0) + goto spawn_failure; + } + + if (__posix_spawn (&((_IO_proc_file *) fp)->pid, _PATH_BSHELL, &fa, 0, + (char *const[]){ (char*) "sh", (char*) "-c", + (char *) command, NULL }, __environ) != 0) + { + spawn_failure: + __posix_spawn_file_actions_destroy (&fa); + __close_nocancel (pipe_fds[1 - op]); + __set_errno (ENOMEM); + return NULL; + } + + __posix_spawn_file_actions_destroy (&fa); + } + __close_nocancel (pipe_fds[1 - op]); + if (((_IO_proc_file *) fp)->pid < 0) { - __close_nocancel (parent_end); + __close_nocancel (pipe_fds[op]); return NULL; } if (!do_cloexec) /* Undo the effects of the pipe2 call which set the close-on-exec flag. */ - __fcntl (parent_end, F_SETFD, 0); + __fcntl (pipe_fds[op], F_SETFD, 0); - _IO_fileno (fp) = parent_end; + _IO_fileno (fp) = pipe_fds[op]; /* Link into proc_file_chain. */ #ifdef _IO_MTSAFE_IO From patchwork Sat Sep 15 15:16:22 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adhemerval Zanella X-Patchwork-Id: 146778 Delivered-To: patch@linaro.org Received: by 2002:a2e:1648:0:0:0:0:0 with SMTP id 8-v6csp1892663ljw; Sat, 15 Sep 2018 08:18:30 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZisIzx/AogQmffbTalIj0/jo4aX1GJBe5Rcrl5U05Daejare8qB/osmhyLzJKIrD/VyA7d X-Received: by 2002:a63:4860:: with SMTP id x32-v6mr16451539pgk.375.1537024710553; Sat, 15 Sep 2018 08:18:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537024710; cv=none; d=google.com; s=arc-20160816; b=oo1iIb61QBIR5s2DcH5p7r5UTiNH2XNrMChdWymXumy7gVpwoqi4yV+OtP+sF7ltKE ETIV4jiuhzODP8lCcu1y44B/Qhd+f6WSpVFdVGDSQ8zGrY9Gdv6A+AEh4npxO+vVOLKR HgK8733ZMs4wIbNb1xRZ2y5RVEcqd3/E6jDIQMyQKxr8lOlFe8jpoNReWWA+QEioJwIS AQ4FNcXOajmkYUgcKbWD6/kantsIcy1SeD9LPvJDxMdRZ+86bl6K/vLzzB592gXz8gSe NiS358ub3on+d1CIDg0FxVF1vCJjdOV26bCHVWy3mMFV6XOaYl2ajk8wso5/wsCSDHJK AZGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=references:in-reply-to:message-id:date:subject:to:from :dkim-signature:delivered-to:sender:list-help:list-post:list-archive :list-subscribe:list-unsubscribe:list-id:precedence:mailing-list :dkim-signature:domainkey-signature; bh=wR40sY2mhwxfQnaH7oOln3+5CWSVRJERK21mmnIySQk=; b=kV+q0H4nO1MY72rPMGrjzzIUtJ/sSiVE94E4CuKUbMSzj0qAlZJogaccz2CUaVbs3g LSKEcFsMnKMX9HDzrnsWZr56iBVaEBgxcyYv0RoQwArYPdfh56F9cVxKRfxYntTdeGUg kPJwwqZFYadPW90Nv29SziCUvB9H9bcgQKA0O0wKZoDpkimn6xc2ujGywpwPyqlmB6es HgCwhza4VoHL0db0p1pH23S7Z4Kf+E4fNa+glwdz6nDAFYGkIQhKPeWHmF0tIOm0QL1D xW4Kl2UGGSToAkRcdGtuKk8fq/9SndB7pF8sc9re3XCFSLDnmimpilWc5z4Ugbw90m/X VT4w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sourceware.org header.s=default header.b=QF13sHrW; dkim=pass header.i=@linaro.org header.s=google header.b=gnEldoLe; spf=pass (google.com: domain of libc-alpha-return-95851-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) smtp.mailfrom="libc-alpha-return-95851-patch=linaro.org@sourceware.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from sourceware.org (server1.sourceware.org. [209.132.180.131]) by mx.google.com with ESMTPS id f7-v6si10350464pfj.284.2018.09.15.08.18.30 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 15 Sep 2018 08:18:30 -0700 (PDT) Received-SPF: pass (google.com: domain of libc-alpha-return-95851-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) client-ip=209.132.180.131; Authentication-Results: mx.google.com; dkim=pass header.i=@sourceware.org header.s=default header.b=QF13sHrW; dkim=pass header.i=@linaro.org header.s=google header.b=gnEldoLe; spf=pass (google.com: domain of libc-alpha-return-95851-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) smtp.mailfrom="libc-alpha-return-95851-patch=linaro.org@sourceware.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:subject:date:message-id:in-reply-to :references; q=dns; s=default; b=J19jVq7+DC9swZPVQEeqHsomTKMvdUX nRIqOLffsVDHaN8OSSWHfkdaY8Y7hISXPkmYj5U5/tRY2orgrzEQlS2OBaXPWTkP xpp3YHwLH/gtQ+hYy6KXHgVVO90eFJaTEf0d6IsjTPDG+1jexVCTnfySVaAVJ9n9 zhDscaF+w6Y8= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:subject:date:message-id:in-reply-to :references; s=default; bh=941eNsoGyb2jVmqgCBMNGs6S/B4=; b=QF13s HrWdl1Fi8eS8OAWbA/mB3Y1Ei+4fcg/BzuuWBuxUrtIRa+/Hz1OTpY3WaRides3N DbhL9XdxB16xn37GLPxvtu0+Z98eRs+8KK/FbqzKSVu1DunJGWjOQorkjMTGOEz5 +Z03Y3XJestQcKiaYTgwUT/3vWOuBL7+9fSxMA= Received: (qmail 88689 invoked by alias); 15 Sep 2018 15:18:10 -0000 Mailing-List: contact libc-alpha-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: libc-alpha-owner@sourceware.org Delivered-To: mailing list libc-alpha@sourceware.org Received: (qmail 88663 invoked by uid 89); 15 Sep 2018 15:18:10 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-25.7 required=5.0 tests=AWL, BAYES_00, GIT_PATCH_0, GIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, KAM_SHORT, RCVD_IN_DNSWL_NONE, SPF_PASS autolearn=ham version=3.3.2 spammy=deleted, stdio.h, handler, 989 X-HELO: mail-qt0-f173.google.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:subject:date:message-id:in-reply-to:references; bh=wR40sY2mhwxfQnaH7oOln3+5CWSVRJERK21mmnIySQk=; b=gnEldoLeSZehMeirO8h2iTyP83nYDgb3NKKo5SEE+gXeoa5hBos5gMroV8QJCAHYbB Sk0gdKvDrJ51clWUqYoCUx37pTrNl3+LP42xqA/pXPXhg0vK4DgE07hGHSPzZVM79Cjq EijNA7kKY5j0c+xrW1/BxVrmz9+Buklni8B/E= Return-Path: From: Adhemerval Zanella To: libc-alpha@sourceware.org Subject: [PATCH 3/3] posix: Use posix_spawn on system Date: Sat, 15 Sep 2018 12:16:22 -0300 Message-Id: <20180915151622.17789-3-adhemerval.zanella@linaro.org> In-Reply-To: <20180915151622.17789-1-adhemerval.zanella@linaro.org> References: <20180915151622.17789-1-adhemerval.zanella@linaro.org> This patch uses posix_spawn on system implementation. On Linux this has the advantage of much lower memory consumption (usually 32 Kb minimum for the mmap stack area). Although POSIX does not require, glibc system implementation aims to be thread and cancellation safe. While reentracy handling does not require any direct change of current strategy, cancellation requires a posix_spawn to be cancellable. This is done by adding an internal __posix_spawn_cancellable which does not disable cancellation neither change process signal mask. The cancellation code is also moved to generic implementation and enabled only if SIGCANCEL is defined (similar on how the cancellation handler is enabled on nptl-init.c). Checked on x86_64-linux-gnu and i686-linux-gnu. * include/spawn.h (__posix_spawn_cancellable): New prototype. * posix/spawn.c (__posix_spawn_cancellable): New function. * posix/spawn_int.h (SPAWN_XFLAGS_ENABLE_CANCEL): New define. * sysdeps/generic/not-errno.h (__kill_noerrno): New prototype. * sysdeps/unix/sysv/linux/not-errno.h (__kill_noerrno): New implementation. * sysdeps/posix/spawni.c (__spawnix): Disable cancellation for !SPAWN_XFLAGS_ENABLE_CANCEL. * sysdeps/unix/sysv/linux/spawni.c (__spawnix): Likewise. * sysdeps/posix/system.c [_LIBC_REENTRANT && SIGCANCEL] (cancel_handler): New function. (CLEANUP_HANDLER, CLEANUP_RESET): Likewise. (do_system): Use posix_spawn instead of fork and execl. * sysdeps/unix/sysv/linux/ia64/system.c: Remove file. * sysdeps/unix/sysv/linux/s390/system.c: Likewise. * sysdeps/unix/sysv/linux/sparc/system.c: Likewise. * sysdeps/unix/sysv/linux/system.c: Likewise. --- ChangeLog | 18 ++++ include/spawn.h | 2 + posix/spawn.c | 14 +++ posix/spawn_int.h | 1 + sysdeps/generic/not-errno.h | 2 + sysdeps/posix/spawni.c | 8 +- sysdeps/posix/system.c | 132 ++++++++++++++----------- sysdeps/unix/sysv/linux/ia64/system.c | 30 ------ sysdeps/unix/sysv/linux/not-errno.h | 14 +++ sysdeps/unix/sysv/linux/s390/system.c | 29 ------ sysdeps/unix/sysv/linux/sparc/system.c | 29 ------ sysdeps/unix/sysv/linux/spawni.c | 24 +++-- sysdeps/unix/sysv/linux/system.c | 76 -------------- 13 files changed, 147 insertions(+), 232 deletions(-) delete mode 100644 sysdeps/unix/sysv/linux/ia64/system.c delete mode 100644 sysdeps/unix/sysv/linux/s390/system.c delete mode 100644 sysdeps/unix/sysv/linux/sparc/system.c delete mode 100644 sysdeps/unix/sysv/linux/system.c -- 2.17.1 diff --git a/include/spawn.h b/include/spawn.h index 7fdd965bd7..995ab9a8f4 100644 --- a/include/spawn.h +++ b/include/spawn.h @@ -5,6 +5,8 @@ __typeof (posix_spawn) __posix_spawn; libc_hidden_proto (__posix_spawn) +__typeof (posix_spawn) __posix_spawn_cancellable attribute_hidden; + __typeof (posix_spawn_file_actions_addclose) __posix_spawn_file_actions_addclose attribute_hidden; diff --git a/posix/spawn.c b/posix/spawn.c index a82f1c84e2..24a416f53c 100644 --- a/posix/spawn.c +++ b/posix/spawn.c @@ -33,6 +33,20 @@ versioned_symbol (libc, __posix_spawn, posix_spawn, GLIBC_2_15); libc_hidden_def (__posix_spawn) +/* Same as __posix_spawn but allows asynchronous cancellation. It is used + internally on SYSTEM implementation to avoid leak a process ID through + a cancellation handler. */ +int +__posix_spawn_cancellable (pid_t *pid, const char *path, + const posix_spawn_file_actions_t *file_actions, + const posix_spawnattr_t *attrp, char *const argv[], + char *const envp[]) +{ + return __spawni (pid, path, file_actions, attrp, argv, envp, + SPAWN_XFLAGS_ENABLE_CANCEL); +} + + #if SHLIB_COMPAT (libc, GLIBC_2_2, GLIBC_2_15) int attribute_compat_text_section diff --git a/posix/spawn_int.h b/posix/spawn_int.h index 171f67c649..5cb8ce49b3 100644 --- a/posix/spawn_int.h +++ b/posix/spawn_int.h @@ -55,6 +55,7 @@ struct __spawn_action #define SPAWN_XFLAGS_USE_PATH 0x1 #define SPAWN_XFLAGS_TRY_SHELL 0x2 +#define SPAWN_XFLAGS_ENABLE_CANCEL 0x3 extern int __posix_spawn_file_actions_realloc (posix_spawn_file_actions_t * file_actions) diff --git a/sysdeps/generic/not-errno.h b/sysdeps/generic/not-errno.h index 93617a3266..0fd66b5c5e 100644 --- a/sysdeps/generic/not-errno.h +++ b/sysdeps/generic/not-errno.h @@ -17,3 +17,5 @@ . */ extern __typeof (__access) __access_noerrno attribute_hidden; + +extern __typeof (__kill) __kill_noerrno attribute_hidden; diff --git a/sysdeps/posix/spawni.c b/sysdeps/posix/spawni.c index b138ab4393..e1a391659b 100644 --- a/sysdeps/posix/spawni.c +++ b/sysdeps/posix/spawni.c @@ -256,8 +256,9 @@ __spawnix (pid_t *pid, const char *file, /* Disable asynchronous cancellation. */ int state; - __libc_ptf_call (__pthread_setcancelstate, - (PTHREAD_CANCEL_DISABLE, &state), 0); + if ((xflags & SPAWN_XFLAGS_ENABLE_CANCEL) == 0) + __libc_ptf_call (__pthread_setcancelstate, + (PTHREAD_CANCEL_DISABLE, &state), 0); ptrdiff_t argc = 0; ptrdiff_t limit = INT_MAX - 1; @@ -299,7 +300,8 @@ __spawnix (pid_t *pid, const char *file, if ((ec == 0) && (pid != NULL)) *pid = new_pid; - __libc_ptf_call (__pthread_setcancelstate, (state, NULL), 0); + if ((xflags & SPAWN_XFLAGS_ENABLE_CANCEL) == 0) + __libc_ptf_call (__pthread_setcancelstate, (state, NULL), 0); return ec; } diff --git a/sysdeps/posix/system.c b/sysdeps/posix/system.c index d7594436ed..38d5e28ca2 100644 --- a/sysdeps/posix/system.c +++ b/sysdeps/posix/system.c @@ -17,20 +17,22 @@ #include #include -#include #include #include +#include +#include +#include #include #include -#include -#include -#include +#include +#include +#include +#include #define SHELL_PATH "/bin/sh" /* Path of the shell. */ #define SHELL_NAME "sh" /* Name to give it. */ - #ifdef _LIBC_REENTRANT static struct sigaction intr, quit; static int sa_refcntr; @@ -38,17 +40,53 @@ __libc_lock_define_initialized (static, lock); # define DO_LOCK() __libc_lock_lock (lock) # define DO_UNLOCK() __libc_lock_unlock (lock) -# define INIT_LOCK() ({ __libc_lock_init (lock); sa_refcntr = 0; }) # define ADD_REF() sa_refcntr++ # define SUB_REF() --sa_refcntr + #else # define DO_LOCK() # define DO_UNLOCK() -# define INIT_LOCK() # define ADD_REF() 0 # define SUB_REF() 0 #endif +/* We have to and actually can handle cancelable system(). The big + problem: we have to kill the child process if necessary. To do + this a cleanup handler has to be registered and is has to be able + to find the PID of the child. The main problem is to reliable have + the PID when needed. It is not necessary for the parent thread to + return. It might still be in the kernel when the cancellation + request comes. Therefore we have to use the clone() calls ability + to have the kernel write the PID into the user-level variable. */ + +#if defined(_LIBC_REENTRANT) && defined(SIGCANCEL) +static void cancel_handler (void *arg) +{ + pid_t child = *(pid_t *) arg; + + __kill_noerrno (child, SIGKILL); + + TEMP_FAILURE_RETRY (__waitpid (child, NULL, 0)); + + DO_LOCK (); + + if (SUB_REF () == 0) + { + __sigaction (SIGQUIT, &quit, NULL); + __sigaction (SIGINT, &intr, NULL); + } + + DO_UNLOCK (); +} +# define CLEANUP_HANDLER() \ + __libc_cleanup_region_start (1, cancel_handler, &pid) +# define CLEANUP_RESET() \ + __libc_cleanup_region_end (0) +#else +# define CLEANUP_HANDLER() +# define CLEANUP_RESET() +#endif + /* Execute LINE as a shell command, returning its status. */ static int @@ -60,7 +98,9 @@ do_system (const char *line) #ifndef _LIBC_REENTRANT struct sigaction intr, quit; #endif + struct sigaction oldintr, oldquit; sigset_t omask; + sigset_t reset; sa.sa_handler = SIG_IGN; sa.sa_flags = 0; @@ -98,9 +138,9 @@ do_system (const char *line) if (SUB_REF () == 0) { save = errno; - (void) __sigaction (SIGQUIT, &quit, (struct sigaction *) NULL); + __sigaction (SIGQUIT, &quit, &oldquit); out_restore_sigint: - (void) __sigaction (SIGINT, &intr, (struct sigaction *) NULL); + __sigaction (SIGINT, &intr, &oldintr); __set_errno (save); } out: @@ -109,39 +149,30 @@ do_system (const char *line) } } -#ifdef CLEANUP_HANDLER - CLEANUP_HANDLER; -#endif - -#ifdef FORK - pid = FORK (); -#else - pid = __fork (); -#endif - if (pid == (pid_t) 0) - { - /* Child side. */ - const char *new_argv[4]; - new_argv[0] = SHELL_NAME; - new_argv[1] = "-c"; - new_argv[2] = line; - new_argv[3] = NULL; - - /* Restore the signals. */ - (void) __sigaction (SIGINT, &intr, (struct sigaction *) NULL); - (void) __sigaction (SIGQUIT, &quit, (struct sigaction *) NULL); - (void) __sigprocmask (SIG_SETMASK, &omask, (sigset_t *) NULL); - INIT_LOCK (); - - /* Exec the shell. */ - (void) __execve (SHELL_PATH, (char *const *) new_argv, __environ); - _exit (127); - } - else if (pid < (pid_t) 0) - /* The fork failed. */ - status = -1; - else - /* Parent side. */ + __sigemptyset (&reset); + if (oldintr.sa_handler != SIG_IGN) + __sigaddset(&reset, SIGINT); + if (oldquit.sa_handler != SIG_IGN) + __sigaddset(&reset, SIGQUIT); + + posix_spawnattr_t spawn_attr; + /* None of the posix_spawnattr_* function returns, including + posix_spawnattr_setflags for the follow specific usage (using valid + flags). */ + __posix_spawnattr_init (&spawn_attr); + __posix_spawnattr_setsigmask (&spawn_attr, &omask); + __posix_spawnattr_setsigdefault (&spawn_attr, &reset); + __posix_spawnattr_setflags (&spawn_attr, + POSIX_SPAWN_SETSIGDEF | POSIX_SPAWN_SETSIGMASK); + + CLEANUP_HANDLER (); + status = __posix_spawn_cancellable (&pid, SHELL_PATH, 0, &spawn_attr, + (char *const[]){ (char*) SHELL_NAME, + (char*) "-c", + (char *) line, NULL }, + __environ); + __posix_spawnattr_destroy (&spawn_attr); + if (status == 0) { /* Note the system() is a cancellation point. But since we call waitpid() which itself is a cancellation point we do not @@ -149,25 +180,16 @@ do_system (const char *line) if (TEMP_FAILURE_RETRY (__waitpid (pid, &status, 0)) != pid) status = -1; } - -#ifdef CLEANUP_HANDLER - CLEANUP_RESET; -#endif + CLEANUP_RESET (); save = errno; DO_LOCK (); if ((SUB_REF () == 0 - && (__sigaction (SIGINT, &intr, (struct sigaction *) NULL) - | __sigaction (SIGQUIT, &quit, (struct sigaction *) NULL)) != 0) + && (__sigaction (SIGINT, &intr, NULL) + | __sigaction (SIGQUIT, &quit, NULL)) != 0) || __sigprocmask (SIG_SETMASK, &omask, (sigset_t *) NULL) != 0) { -#ifndef _LIBC - /* glibc cannot be used on systems without waitpid. */ - if (errno == ENOSYS) - __set_errno (save); - else -#endif - status = -1; + status = -1; } DO_UNLOCK (); diff --git a/sysdeps/unix/sysv/linux/ia64/system.c b/sysdeps/unix/sysv/linux/ia64/system.c deleted file mode 100644 index d09fefefe6..0000000000 --- a/sysdeps/unix/sysv/linux/ia64/system.c +++ /dev/null @@ -1,30 +0,0 @@ -/* Copyright (C) 2002-2018 Free Software Foundation, Inc. - This file is part of the GNU C Library. - - The GNU C Library is free software; you can redistribute it and/or - modify it under the terms of the GNU Lesser General Public - License as published by the Free Software Foundation; either - version 2.1 of the License, or (at your option) any later version. - - The GNU C Library is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU - Lesser General Public License for more details. - - You should have received a copy of the GNU Lesser General Public - License along with the GNU C Library; if not, see - . */ - -/* We have to and actually can handle cancelable system(). The big - problem: we have to kill the child process if necessary. To do - this a cleanup handler has to be registered and is has to be able - to find the PID of the child. The main problem is to reliable have - the PID when needed. It is not necessary for the parent thread to - return. It might still be in the kernel when the cancellation - request comes. Therefore we have to use the clone() calls ability - to have the kernel write the PID into the user-level variable. */ -#define FORK() \ - INLINE_SYSCALL (clone2, 6, CLONE_PARENT_SETTID | SIGCHLD, NULL, 0, \ - &pid, NULL, NULL) - -#include diff --git a/sysdeps/unix/sysv/linux/not-errno.h b/sysdeps/unix/sysv/linux/not-errno.h index 106ba5c72e..b2f72cfb3d 100644 --- a/sysdeps/unix/sysv/linux/not-errno.h +++ b/sysdeps/unix/sysv/linux/not-errno.h @@ -16,6 +16,9 @@ License along with the GNU C Library; if not, see . */ +#include +#include + /* This function is used on maybe_enable_malloc_check (elf/dl-tunables.c) and to avoid having to build/use multiple versions if stack protection in enabled it is defined as inline. */ @@ -33,3 +36,14 @@ __access_noerrno (const char *pathname, int mode) return INTERNAL_SYSCALL_ERRNO (res, err); return 0; } + +static inline int +__kill_noerrno (pid_t pid, int sig) +{ + int res; + INTERNAL_SYSCALL_DECL (err); + res = INTERNAL_SYSCALL_CALL (kill, err, pid, sig); + if (INTERNAL_SYSCALL_ERROR_P (res, err)) + return INTERNAL_SYSCALL_ERRNO (res, err); + return 0; +} diff --git a/sysdeps/unix/sysv/linux/s390/system.c b/sysdeps/unix/sysv/linux/s390/system.c deleted file mode 100644 index d8ef461334..0000000000 --- a/sysdeps/unix/sysv/linux/s390/system.c +++ /dev/null @@ -1,29 +0,0 @@ -/* Copyright (C) 2003-2018 Free Software Foundation, Inc. - This file is part of the GNU C Library. - - The GNU C Library is free software; you can redistribute it and/or - modify it under the terms of the GNU Lesser General Public - License as published by the Free Software Foundation; either - version 2.1 of the License, or (at your option) any later version. - - The GNU C Library is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU - Lesser General Public License for more details. - - You should have received a copy of the GNU Lesser General Public - License along with the GNU C Library; if not, see - . */ - -/* We have to and actually can handle cancelable system(). The big - problem: we have to kill the child process if necessary. To do - this a cleanup handler has to be registered and is has to be able - to find the PID of the child. The main problem is to reliable have - the PID when needed. It is not necessary for the parent thread to - return. It might still be in the kernel when the cancellation - request comes. Therefore we have to use the clone() calls ability - to have the kernel write the PID into the user-level variable. */ -#define FORK() \ - INLINE_SYSCALL (clone, 3, 0, CLONE_PARENT_SETTID | SIGCHLD, &pid) - -#include "../system.c" diff --git a/sysdeps/unix/sysv/linux/sparc/system.c b/sysdeps/unix/sysv/linux/sparc/system.c deleted file mode 100644 index 1f65c83399..0000000000 --- a/sysdeps/unix/sysv/linux/sparc/system.c +++ /dev/null @@ -1,29 +0,0 @@ -/* Copyright (C) 2003-2018 Free Software Foundation, Inc. - This file is part of the GNU C Library. - - The GNU C Library is free software; you can redistribute it and/or - modify it under the terms of the GNU Lesser General Public - License as published by the Free Software Foundation; either - version 2.1 of the License, or (at your option) any later version. - - The GNU C Library is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU - Lesser General Public License for more details. - - You should have received a copy of the GNU Lesser General Public - License along with the GNU C Library; if not, see - . */ - -/* We have to and actually can handle cancelable system(). The big - problem: we have to kill the child process if necessary. To do - this a cleanup handler has to be registered and is has to be able - to find the PID of the child. The main problem is to reliable have - the PID when needed. It is not necessary for the parent thread to - return. It might still be in the kernel when the cancellation - request comes. Therefore we have to use the clone() calls ability - to have the kernel write the PID into the user-level variable. */ -#define FORK() \ - INLINE_CLONE_SYSCALL (CLONE_PARENT_SETTID | SIGCHLD, 0, &pid, NULL, NULL) - -#include "../system.c" diff --git a/sysdeps/unix/sysv/linux/spawni.c b/sysdeps/unix/sysv/linux/spawni.c index 85239cedbf..ed5c613e42 100644 --- a/sysdeps/unix/sysv/linux/spawni.c +++ b/sysdeps/unix/sysv/linux/spawni.c @@ -138,11 +138,11 @@ __spawni_child (void *arguments) for (int sig = 1; sig < _NSIG; ++sig) { if ((attr->__flags & POSIX_SPAWN_SETSIGDEF) - && sigismember (&attr->__sd, sig)) + && __sigismember (&attr->__sd, sig)) { sa.sa_handler = SIG_DFL; } - else if (sigismember (&hset, sig)) + else if (__sigismember (&hset, sig)) { if (__is_internal_signal (sig)) sa.sa_handler = SIG_IGN; @@ -330,10 +330,14 @@ __spawnix (pid_t * pid, const char *file, if (__glibc_unlikely (stack == MAP_FAILED)) return errno; - /* Disable asynchronous cancellation. */ int state; - __libc_ptf_call (__pthread_setcancelstate, - (PTHREAD_CANCEL_DISABLE, &state), 0); + if ((xflags & SPAWN_XFLAGS_ENABLE_CANCEL) == 0) + { + /* Disable asynchronous cancellation. */ + __libc_ptf_call (__pthread_setcancelstate, + (PTHREAD_CANCEL_DISABLE, &state), 0); + __libc_signal_block_all (&args.oldmask); + } /* Child must set args.err to something non-negative - we rely on the parent and child sharing VM. */ @@ -347,8 +351,6 @@ __spawnix (pid_t * pid, const char *file, args.envp = envp; args.xflags = xflags; - __libc_signal_block_all (&args.oldmask); - /* The clone flags used will create a new child that will run in the same memory space (CLONE_VM) and the execution of calling thread will be suspend until the child calls execve or _exit. @@ -389,9 +391,11 @@ __spawnix (pid_t * pid, const char *file, if ((ec == 0) && (pid != NULL)) *pid = new_pid; - __libc_signal_restore_set (&args.oldmask); - - __libc_ptf_call (__pthread_setcancelstate, (state, NULL), 0); + if ((xflags & SPAWN_XFLAGS_ENABLE_CANCEL) == 0) + { + __libc_signal_restore_set (&args.oldmask); + __libc_ptf_call (__pthread_setcancelstate, (state, NULL), 0); + } return ec; } diff --git a/sysdeps/unix/sysv/linux/system.c b/sysdeps/unix/sysv/linux/system.c deleted file mode 100644 index 7cc68a1528..0000000000 --- a/sysdeps/unix/sysv/linux/system.c +++ /dev/null @@ -1,76 +0,0 @@ -/* Copyright (C) 2002-2018 Free Software Foundation, Inc. - This file is part of the GNU C Library. - - The GNU C Library is free software; you can redistribute it and/or - modify it under the terms of the GNU Lesser General Public - License as published by the Free Software Foundation; either - version 2.1 of the License, or (at your option) any later version. - - The GNU C Library is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU - Lesser General Public License for more details. - - You should have received a copy of the GNU Lesser General Public - License along with the GNU C Library; if not, see - . */ - -#include -#include -#include /* For the real memset prototype. */ -#include -#include -#include -#include - -/* We have to and actually can handle cancelable system(). The big - problem: we have to kill the child process if necessary. To do - this a cleanup handler has to be registered and is has to be able - to find the PID of the child. The main problem is to reliable have - the PID when needed. It is not necessary for the parent thread to - return. It might still be in the kernel when the cancellation - request comes. Therefore we have to use the clone() calls ability - to have the kernel write the PID into the user-level variable. */ -#ifndef FORK -# define FORK() \ - INLINE_SYSCALL (clone, 3, CLONE_PARENT_SETTID | SIGCHLD, 0, &pid) -#endif - -#ifdef _LIBC_REENTRANT -static void cancel_handler (void *arg); - -# define CLEANUP_HANDLER \ - __libc_cleanup_region_start (1, cancel_handler, &pid) - -# define CLEANUP_RESET \ - __libc_cleanup_region_end (0) -#endif - - -/* Linux has waitpid(), so override the generic unix version. */ -#include - - -#ifdef _LIBC_REENTRANT -/* The cancellation handler. */ -static void -cancel_handler (void *arg) -{ - pid_t child = *(pid_t *) arg; - - INTERNAL_SYSCALL_DECL (err); - INTERNAL_SYSCALL (kill, err, 2, child, SIGKILL); - - TEMP_FAILURE_RETRY (__waitpid (child, NULL, 0)); - - DO_LOCK (); - - if (SUB_REF () == 0) - { - (void) __sigaction (SIGQUIT, &quit, (struct sigaction *) NULL); - (void) __sigaction (SIGINT, &intr, (struct sigaction *) NULL); - } - - DO_UNLOCK (); -} -#endif