/* Open a stream to a sub-process.
Copyright (C) 2009-2023 Free Software Foundation, Inc.
This file is free software: you can redistribute it and/or modify
it under the terms of the GNU Lesser General Public License as
published by the Free Software Foundation, either version 3 of the
License, or (at your option) any later version.
This file is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with this program. If not, see . */
/* Written by Eric Blake , 2009. */
#include
/* Specification. */
#include
#if defined _WIN32 && ! defined __CYGWIN__
/* Native Windows API. */
# include
FILE *
popen (const char *filename, const char *mode)
{
/* Use binary mode by default. */
if (strcmp (mode, "r") == 0)
mode = "rb";
else if (strcmp (mode, "w") == 0)
mode = "wb";
return _popen (filename, mode);
}
#else
# include
# include
# include
# include
# undef popen
FILE *
rpl_popen (const char *filename, const char *mode)
{
/* All other platforms have popen and fcntl.
The bug of the child clobbering its own file descriptors if stdin
or stdout was closed in the parent can be worked around by
opening those two fds as close-on-exec to begin with. */
/* Cygwin 1.5.x also has a bug where the popen fd is improperly
marked close-on-exec, and if the application undoes this, then
the fd leaks into subsequent popen calls. We could work around
this by maintaining a list of all fd's opened by popen, and
temporarily marking them cloexec around the real popen call, but
we would also have to override pclose, and the bookkeeping seems
extreme given that cygwin 1.7 no longer has the bug. */
FILE *result;
int cloexec0 = fcntl (STDIN_FILENO, F_GETFD);
int cloexec1 = fcntl (STDOUT_FILENO, F_GETFD);
int saved_errno;
/* If either stdin or stdout was closed (that is, fcntl failed),
then we open a dummy close-on-exec fd to occupy that slot. That
way, popen's internal use of pipe() will not contain either fd 0
or 1, overcoming the fact that the child process blindly calls
close() on the parent's end of the pipe without first checking
whether it is clobbering the fd just placed there via dup2(); the
exec will get rid of the dummy fd's in the child. Fortunately,
closed stderr in the parent does not cause problems in the
child. */
if (cloexec0 < 0)
{
if (open ("/dev/null", O_RDONLY) != STDIN_FILENO
|| fcntl (STDIN_FILENO, F_SETFD,
fcntl (STDIN_FILENO, F_GETFD) | FD_CLOEXEC) == -1)
abort ();
}
if (cloexec1 < 0)
{
if (open ("/dev/null", O_RDONLY) != STDOUT_FILENO
|| fcntl (STDOUT_FILENO, F_SETFD,
fcntl (STDOUT_FILENO, F_GETFD) | FD_CLOEXEC) == -1)
abort ();
}
result = popen (filename, mode);
/* Now, close any dummy fd's created in the parent. */
saved_errno = errno;
if (cloexec0 < 0)
close (STDIN_FILENO);
if (cloexec1 < 0)
close (STDOUT_FILENO);
errno = saved_errno;
return result;
}
#endif