aboutsummaryrefslogtreecommitdiff
path: root/libio
diff options
context:
space:
mode:
authorAdhemerval Zanella <adhemerval.zanella@linaro.org>2022-12-06 13:28:40 -0300
committerAdhemerval Zanella <adhemerval.zanella@linaro.org>2023-02-14 15:30:35 -0300
commite7223fa1e8e0673440cc62364b67d55afc78123a (patch)
treeb2becf2159c4af2b0d9bcaa887c06af2c3ddb420 /libio
parentupdate auto-libm-test-out-hypot (diff)
downloadglibc-e7223fa1e8e0673440cc62364b67d55afc78123a.tar.gz
glibc-e7223fa1e8e0673440cc62364b67d55afc78123a.tar.bz2
glibc-e7223fa1e8e0673440cc62364b67d55afc78123a.zip
stdio: Do not ignore posix_spawn error on popen (BZ #29016)
To correctly return error in case of default shell is not present. Checked on x86_64-linux-gnu.
Diffstat (limited to 'libio')
-rw-r--r--libio/iopopen.c38
1 files changed, 22 insertions, 16 deletions
diff --git a/libio/iopopen.c b/libio/iopopen.c
index 10b0503c23..d0545ad5ea 100644
--- a/libio/iopopen.c
+++ b/libio/iopopen.c
@@ -66,11 +66,12 @@ unlock (void *not_used)
be close (by transversing the proc_file_chain list) and the insertion of a
new one after a successful posix_spawn this function should be called
with proc_file_chain_lock acquired. */
-static bool
+static int
spawn_process (posix_spawn_file_actions_t *fa, FILE *fp, const char *command,
int do_cloexec, int pipe_fds[2], int parent_end, int child_end,
int child_pipe_fd)
{
+ int err = 0;
for (struct _IO_proc_file *p = proc_file_chain; p; p = p->next)
{
@@ -79,15 +80,19 @@ spawn_process (posix_spawn_file_actions_t *fa, FILE *fp, const char *command,
/* If any stream from previous popen() calls has fileno
child_pipe_fd, it has been already closed by the adddup2 action
above. */
- if (fd != child_pipe_fd
- && __posix_spawn_file_actions_addclose (fa, fd) != 0)
- return false;
+ if (fd != child_pipe_fd)
+ {
+ err = __posix_spawn_file_actions_addclose (fa, fd);
+ if (err != 0)
+ return err;
+ }
}
- if (__posix_spawn (&((_IO_proc_file *) fp)->pid, _PATH_BSHELL, fa, 0,
- (char *const[]){ (char*) "sh", (char*) "-c",
- (char *) command, NULL }, __environ) != 0)
- return false;
+ err = __posix_spawn (&((_IO_proc_file *) fp)->pid, _PATH_BSHELL, fa, 0,
+ (char *const[]){ (char*) "sh", (char*) "-c",
+ (char *) command, NULL }, __environ);
+ if (err != 0)
+ return err;
__close_nocancel (pipe_fds[child_end]);
@@ -101,7 +106,7 @@ spawn_process (posix_spawn_file_actions_t *fa, FILE *fp, const char *command,
((_IO_proc_file *) fp)->next = proc_file_chain;
proc_file_chain = (_IO_proc_file *) fp;
- return true;
+ return 0;
}
FILE *
@@ -112,7 +117,7 @@ _IO_new_proc_open (FILE *fp, const char *command, const char *mode)
int parent_end, child_end;
int pipe_fds[2];
int child_pipe_fd;
- bool spawn_ok;
+ int err;
int do_read = 0;
int do_write = 0;
@@ -185,16 +190,17 @@ _IO_new_proc_open (FILE *fp, const char *command, const char *mode)
pipe_fds[child_end] = tmp;
}
- if (__posix_spawn_file_actions_adddup2 (&fa, pipe_fds[child_end],
- child_pipe_fd) != 0)
+ err = __posix_spawn_file_actions_adddup2 (&fa, pipe_fds[child_end],
+ child_pipe_fd);
+ if (err != 0)
goto spawn_failure;
#ifdef _IO_MTSAFE_IO
_IO_cleanup_region_start_noarg (unlock);
_IO_lock_lock (proc_file_chain_lock);
#endif
- spawn_ok = spawn_process (&fa, fp, command, do_cloexec, pipe_fds,
- parent_end, child_end, child_pipe_fd);
+ err = spawn_process (&fa, fp, command, do_cloexec, pipe_fds, parent_end,
+ child_end, child_pipe_fd);
#ifdef _IO_MTSAFE_IO
_IO_lock_unlock (proc_file_chain_lock);
_IO_cleanup_region_end (0);
@@ -202,12 +208,12 @@ _IO_new_proc_open (FILE *fp, const char *command, const char *mode)
__posix_spawn_file_actions_destroy (&fa);
- if (!spawn_ok)
+ if (err != 0)
{
+ __set_errno (err);
spawn_failure:
__close_nocancel (pipe_fds[child_end]);
__close_nocancel (pipe_fds[parent_end]);
- __set_errno (ENOMEM);
return NULL;
}