mirror of https://gitee.com/openkylin/libvirt.git
command: avoid double close
Previously, the parent process opened 'null' to /dev/null, then the child process closes 'null' as well as 'childout'. But if childout was set to be null, then this is a double close. At least the double close was confined to the child process after a fork, and therefore there is no risk of another thread opening an fd of the same value to be bitten by the double close, but it is always better to avoid double-close to begin with. Additionally, if all three fds were specified, then opening 'null' was wasted. This patch fixes things to lazily open null on the first use, then guarantees it gets closed exactly once. * src/util/command.c (getDevNull): New helper function. (virExecWithHook): Use it to avoid spurious opens and double close.
This commit is contained in:
parent
c668c89778
commit
f3d6754415
|
@ -257,6 +257,23 @@ cleanup:
|
|||
return ret;
|
||||
}
|
||||
|
||||
/*
|
||||
* Ensure that *null is an fd visiting /dev/null. Return 0 on
|
||||
* success, -1 on failure. Allows for lazy opening of shared
|
||||
* /dev/null fd only as required.
|
||||
*/
|
||||
static int
|
||||
getDevNull(int *null)
|
||||
{
|
||||
if (*null == -1 && (*null = open("/dev/null", O_RDWR)) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("cannot open %s"),
|
||||
"/dev/null");
|
||||
return -1;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
/*
|
||||
* @argv argv to exec
|
||||
* @envp optional environment to use for exec
|
||||
|
@ -288,7 +305,7 @@ virExecWithHook(const char *const*argv,
|
|||
char *pidfile)
|
||||
{
|
||||
pid_t pid;
|
||||
int null, i, openmax;
|
||||
int null = -1, i, openmax;
|
||||
int pipeout[2] = {-1,-1};
|
||||
int pipeerr[2] = {-1,-1};
|
||||
int childout = -1;
|
||||
|
@ -308,11 +325,10 @@ virExecWithHook(const char *const*argv,
|
|||
binary = argv[0];
|
||||
}
|
||||
|
||||
if ((null = open("/dev/null", O_RDWR)) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("cannot open %s"),
|
||||
"/dev/null");
|
||||
goto cleanup;
|
||||
if (infd < 0) {
|
||||
if (getDevNull(&null) < 0)
|
||||
goto cleanup;
|
||||
infd = null;
|
||||
}
|
||||
|
||||
if (outfd != NULL) {
|
||||
|
@ -341,6 +357,8 @@ virExecWithHook(const char *const*argv,
|
|||
childout = *outfd;
|
||||
}
|
||||
} else {
|
||||
if (getDevNull(&null) < 0)
|
||||
goto cleanup;
|
||||
childout = null;
|
||||
}
|
||||
|
||||
|
@ -370,6 +388,8 @@ virExecWithHook(const char *const*argv,
|
|||
childerr = *errfd;
|
||||
}
|
||||
} else {
|
||||
if (getDevNull(&null) < 0)
|
||||
goto cleanup;
|
||||
childerr = null;
|
||||
}
|
||||
|
||||
|
@ -414,7 +434,6 @@ virExecWithHook(const char *const*argv,
|
|||
openmax = sysconf(_SC_OPEN_MAX);
|
||||
for (i = 3; i < openmax; i++)
|
||||
if (i != infd &&
|
||||
i != null &&
|
||||
i != childout &&
|
||||
i != childerr &&
|
||||
(!keepfd || i >= FD_SETSIZE || !FD_ISSET(i, keepfd))) {
|
||||
|
@ -422,7 +441,7 @@ virExecWithHook(const char *const*argv,
|
|||
VIR_FORCE_CLOSE(tmpfd);
|
||||
}
|
||||
|
||||
if (dup2(infd >= 0 ? infd : null, STDIN_FILENO) < 0) {
|
||||
if (dup2(infd, STDIN_FILENO) < 0) {
|
||||
virReportSystemError(errno,
|
||||
"%s", _("failed to setup stdin file handle"));
|
||||
goto fork_error;
|
||||
|
@ -440,17 +459,18 @@ virExecWithHook(const char *const*argv,
|
|||
goto fork_error;
|
||||
}
|
||||
|
||||
if (infd != STDIN_FILENO)
|
||||
if (infd != STDIN_FILENO && infd != null)
|
||||
VIR_FORCE_CLOSE(infd);
|
||||
VIR_FORCE_CLOSE(null);
|
||||
if (childout > STDERR_FILENO) {
|
||||
if (childout > STDERR_FILENO && childout != null) {
|
||||
tmpfd = childout; /* preserve childout value */
|
||||
VIR_FORCE_CLOSE(tmpfd);
|
||||
}
|
||||
if (childerr > STDERR_FILENO &&
|
||||
childerr != childout) {
|
||||
childerr != childout &&
|
||||
childerr != null) {
|
||||
VIR_FORCE_CLOSE(childerr);
|
||||
}
|
||||
VIR_FORCE_CLOSE(null);
|
||||
|
||||
/* Initialize full logging for a while */
|
||||
virLogSetFromEnv();
|
||||
|
|
Loading…
Reference in New Issue