On Mon, 2017-09-11 at 10:52 +0200, Svante Signell wrote:
> On Sat, 2017-09-09 at 22:04 +0200, Samuel Thibault wrote:
> > Svante Signell, on sam. 09 sept. 2017 10:51:36 +0200, wrote:
> > > 
> > Which programs do you run?
> > 
> > execv/spawn are called from the parent, so the program that needs
> > LD_LIBRARY_PATH is the parent of the program to be observed in
> > /proc/pid/exe

With the updated patch things works fine:

sh -c "./test_readlink /proc/self/exe"
bufsize = 40
'/proc/self/exe' points to '/home/srs/DEBs/test_cases/test_readlink'

sh -c "test_readlink /proc/self/exe"
sh: 1: test_readlink: not found

export PATH=$PATH:$PWD
sh -c "test_readlink /proc/self/exe"
bufsize = 40
'/proc/self/exe' points to '/home/srs/DEBs/test_cases/test_readlink'

Found a test case also for spawni.c, test_posix_spawn.c is attached.

./test_posix_spawn ./test_readlink /proc/self/exe
PID of child: 18389
bufsize = 40
'/proc/self/exe' points to '/home/srs/DEBs/test_cases/test_readlink'
Child status: exited, status=0

./test_posix_spawn test_readlink /proc/self/exe
posix_spawn: No such file or directory

export PATH=$PATH:$PWD
PID of child: 16152
bufsize = 40
'/proc/self/exe' points to '/home/srs/DEBs/test_cases/test_readlink'
Child status: exited, status=0

Attached is a new diff of submitted-exec_filename.diff: submitted-
exec_filename.diff.diff. Since that diff seems to be wrong here:

---- a/sysdeps/mach/hurd/fexecve.c
-+++ b/sysdeps/mach/hurd/fexecve.c
+ 
++  free (filename);
+   return __hurd_fail (err);
+ }
+ 
+Index: glibc-2.24-17.2/sysdeps/mach/hurd/fexecve.c
+===================================================================
+--- glibc-2.24-17.2.orig/sysdeps/mach/hurd/fexecve.c
++++ glibc-2.24-17.2/sysdeps/mach/hurd/fexecve.c

I attach the full diff file too.

--- a/debian/patches/hurd-i386/submitted-exec_filename.diff.orig	2017-08-20 13:48:36.000000000 +0200
+++ b/debian/patches/hurd-i386/submitted-exec_filename.diff		2017-09-14 13:45:51.000000000 +0200
@@ -33,8 +33,10 @@
  sysdeps/mach/hurd/spawni.c  |   59 ++++++++++++++++++++++++++------------------
  8 files changed, 102 insertions(+), 43 deletions(-)
 
---- a/hurd/Versions
-+++ b/hurd/Versions
+Index: glibc-2.24-17.2/hurd/Versions
+===================================================================
+--- glibc-2.24-17.2.orig/hurd/Versions
++++ glibc-2.24-17.2/hurd/Versions
 @@ -140,6 +140,14 @@ libc {
      _hurd_sigstate_unlock;
      _hurd_sigstate_delete;
@@ -50,8 +52,10 @@
  
    HURD_CTHREADS_0.3 {
      # weak refs to libthreads functions that libc calls iff libthreads in use
---- a/hurd/Makefile
-+++ b/hurd/Makefile
+Index: glibc-2.24-17.2/hurd/Makefile
+===================================================================
+--- glibc-2.24-17.2.orig/hurd/Makefile
++++ glibc-2.24-17.2/hurd/Makefile
 @@ -32,8 +32,8 @@ user-interfaces		:= $(addprefix hurd/,\
  				       auth auth_request auth_reply startup \
  				       process process_request \
@@ -63,9 +67,11 @@
  				       login password pfinet \
  				       )
  server-interfaces	:= hurd/msg faultexc
---- a/hurd/hurd.h
-+++ b/hurd/hurd.h
-@@ -245,12 +245,20 @@ extern FILE *fopenport (io_t port, const
+Index: glibc-2.24-17.2/hurd/hurd.h
+===================================================================
+--- glibc-2.24-17.2.orig/hurd/hurd.h
++++ glibc-2.24-17.2/hurd/hurd.h
+@@ -241,12 +241,20 @@ extern FILE *fopenport (io_t port, const
  extern FILE *__fopenport (io_t port, const char *mode);
  
  
@@ -88,8 +94,10 @@
  
  
  /* Inform the proc server we have exited with STATUS, and kill the
---- a/hurd/hurdexec.c
-+++ b/hurd/hurdexec.c
+Index: glibc-2.24-17.2/hurd/hurdexec.c
+===================================================================
+--- glibc-2.24-17.2.orig/hurd/hurdexec.c
++++ glibc-2.24-17.2/hurd/hurdexec.c
 @@ -25,16 +25,37 @@
  #include <hurd/fd.h>
  #include <hurd/signal.h>
@@ -187,20 +195,56 @@
 +}
 +compat_symbol (libc, __hurd_exec_file_name_2_13, _hurd_exec_file_name, GLIBC_2_13_DEBIAN_33);
 +#endif
---- a/sysdeps/mach/hurd/execve.c
-+++ b/sysdeps/mach/hurd/execve.c
-@@ -31,7 +31,8 @@ __execve (const char *file_name, char *c
+Index: glibc-2.24-17.2/sysdeps/mach/hurd/execve.c
+===================================================================
+--- glibc-2.24-17.2.orig/sysdeps/mach/hurd/execve.c
++++ glibc-2.24-17.2/sysdeps/mach/hurd/execve.c
+@@ -18,24 +18,36 @@
+ #include <unistd.h>
+ #include <hurd.h>
+ #include <fcntl.h>
++#include <stdlib.h>
+ 
+-/* Replace the current process, executing FILE_NAME with arguments ARGV and
+-   environment ENVP.  ARGV and ENVP are terminated by NULL pointers.  */
++/* Replace the current process, executing FILENAME, a canonicalized
++   absolute path name of FILE_NAME, with arguments ARGV and
++   environment ENVP.  ARGV and ENVP are terminated by NULL
++   pointers.  */
+ int
+ __execve (const char *file_name, char *const argv[], char *const envp[])
+ {
+   error_t err;
+-  file_t file = __file_name_lookup (file_name, O_EXEC, 0);
+ 
+-  if (file == MACH_PORT_NULL)
++  char *filename = realpath (file_name, NULL);
++  if (filename == NULL)
      return -1;
  
++  file_t file = __file_name_lookup (filename, O_EXEC, 0);
++  if (file == MACH_PORT_NULL)
++    {
++      free (filename);
++      return -1;
++    }
++
    /* Hopefully this will not return.  */
 -  err = _hurd_exec (__mach_task_self (), file, argv, envp);
 +  err = _hurd_exec_file_name (__mach_task_self (), file,
-+			      file_name, argv, envp);
++			      filename, argv, envp);
  
    /* Oh well.  Might as well be tidy.  */
    __mach_port_deallocate (__mach_task_self (), file);
---- a/sysdeps/mach/hurd/fexecve.c
-+++ b/sysdeps/mach/hurd/fexecve.c
+ 
++  free (filename);
+   return __hurd_fail (err);
+ }
+ 
+Index: glibc-2.24-17.2/sysdeps/mach/hurd/fexecve.c
+===================================================================
+--- glibc-2.24-17.2.orig/sysdeps/mach/hurd/fexecve.c
++++ glibc-2.24-17.2/sysdeps/mach/hurd/fexecve.c
 @@ -25,8 +25,9 @@
  int
  fexecve (int fd, char *const argv[], char *const envp[])
@@ -213,8 +257,10 @@
    if (! err)
      err = EGRATUITOUS;
    return __hurd_fail (err);
---- a/sysdeps/mach/hurd/spawni.c
-+++ b/sysdeps/mach/hurd/spawni.c
+Index: glibc-2.24-17.2/sysdeps/mach/hurd/spawni.c
+===================================================================
+--- glibc-2.24-17.2.orig/sysdeps/mach/hurd/spawni.c
++++ glibc-2.24-17.2/sysdeps/mach/hurd/spawni.c
 @@ -29,6 +29,7 @@
  #include <hurd/id.h>
  #include <hurd/lookup.h>
@@ -227,7 +273,7 @@
  {
    pid_t new_pid;
    char *path, *p, *name;
-+  const char *filename;
++  const char *filename, *file_name;
    size_t len;
    size_t pathlen;
    short int flags;
@@ -254,16 +300,23 @@
       except that all errors will be detected here (in the parent process)
       and return proper errno codes rather than the child dying with 127.
  
-@@ -546,7 +548,7 @@ __spawni (pid_t *pid, const char *file,
+@@ -545,8 +547,13 @@ __spawni (pid_t *pid, const char *file,
+      etc) can be observed before what errors.  */
  
    if ((xflags & SPAWN_XFLAGS_USE_PATH) == 0 || strchr (file, '/') != NULL)
-     /* The FILE parameter is actually a path.  */
+-    /* The FILE parameter is actually a path.  */
 -    err = child_lookup (file, O_EXEC, 0, &execfile);
-+    err = child_lookup (filename = file, O_EXEC, 0, &execfile);
++    {
++      /* The FILE parameter is actually a path.  */
++      file_name = realpath (file, NULL);
++      if (file_name == NULL)
++	goto out;
++      err = child_lookup (filename = file_name, O_EXEC, 0, &execfile);
++    }
    else
      {
        /* We have to search for FILE on the path.  */
-@@ -573,20 +575,18 @@ __spawni (pid_t *pid, const char *file,
+@@ -573,20 +580,18 @@ __spawni (pid_t *pid, const char *file,
        p = path;
        do
  	{
@@ -287,7 +340,7 @@
  	  switch (err)
  	    {
  	    case EACCES:
-@@ -623,14 +623,27 @@ __spawni (pid_t *pid, const char *file,
+@@ -623,14 +628,27 @@ __spawni (pid_t *pid, const char *file,
  
      inline error_t exec (file_t file)
        {
2.13-33 dates when this was added

TODO: _DEBIAN_ in versions however pose problem. Remove the _DEBIAN_ version
once packages are rebuilt against 2.21.

2010-08-04  Emilio Pozuelo Monfort  <poch...@gmail.com>
	* hurd/hurdexec.c (_hurd_exec): Deprecate it.
	(_hurd_exec_file_name): New function.
	* hurd/hurd.h (_hurd_exec): Deprecate it.
	(_hurd_exec_file_name): Declare it.
	* hurd/Versions: Export it.
	* sysdeps/mach/hurd/execve.c: Use it.
	* sysdeps/mach/hurd/fexecve.c: Likewise.
	* sysdeps/mach/hurd/spawni.c: Likewise.



From d1793416cf8bf6fccd42679a8ec30b0058823ab8 Mon Sep 17 00:00:00 2001
From: Emilio Pozuelo Monfort <poch...@gmail.com>
Date: Sat, 22 May 2010 18:26:29 +0200
Subject: [PATCH] Use the new file_exec_file_name RPC

Pass the file name of executable to the exec server, which it needs to
execute #!-scripts.  Currently, the exec server tries to guess the name
from argv[0] but argv[0] only contains the executable name by convention.
---
 hurd/Makefile               |    4 +-
 hurd/Versions               |    4 ++
 hurd/hurd.h                 |   14 ++++++++--
 hurd/hurdexec.c             |   50 ++++++++++++++++++++++++++++++-------
 sysdeps/mach/hurd/execve.c  |    6 ++--
 sysdeps/mach/hurd/fexecve.c |    7 ++---
 sysdeps/mach/hurd/spawni.c  |   59 ++++++++++++++++++++++++++------------------
 8 files changed, 102 insertions(+), 43 deletions(-)

Index: glibc-2.24-17.2/hurd/Versions
===================================================================
--- glibc-2.24-17.2.orig/hurd/Versions
+++ glibc-2.24-17.2/hurd/Versions
@@ -140,6 +140,14 @@ libc {
     _hurd_sigstate_unlock;
     _hurd_sigstate_delete;
   }
+  GLIBC_2.13_DEBIAN_33 {
+    # "quasi-internal" functions
+    _hurd_exec_file_name;
+  }
+  GLIBC_2.21 {
+    # "quasi-internal" functions
+    _hurd_exec_file_name;
+  }
 
   HURD_CTHREADS_0.3 {
     # weak refs to libthreads functions that libc calls iff libthreads in use
Index: glibc-2.24-17.2/hurd/Makefile
===================================================================
--- glibc-2.24-17.2.orig/hurd/Makefile
+++ glibc-2.24-17.2/hurd/Makefile
@@ -32,8 +32,8 @@ user-interfaces		:= $(addprefix hurd/,\
 				       auth auth_request auth_reply startup \
 				       process process_request \
 				       msg msg_reply msg_request \
-				       exec exec_startup crash interrupt \
-				       fs fsys io term tioctl socket ifsock \
+				       exec exec_experimental exec_startup crash interrupt \
+				       fs fs_experimental fsys io term tioctl socket ifsock \
 				       login password pfinet \
 				       )
 server-interfaces	:= hurd/msg faultexc
Index: glibc-2.24-17.2/hurd/hurd.h
===================================================================
--- glibc-2.24-17.2.orig/hurd/hurd.h
+++ glibc-2.24-17.2/hurd/hurd.h
@@ -241,12 +241,20 @@ extern FILE *fopenport (io_t port, const
 extern FILE *__fopenport (io_t port, const char *mode);
 
 
-/* Execute a file, replacing TASK's current program image.  */
+/* Deprecated: use _hurd_exec_file_name instead.  */
 
 extern error_t _hurd_exec (task_t task,
 			   file_t file,
 			   char *const argv[],
-			   char *const envp[]);
+			   char *const envp[]) __attribute_deprecated__;
+
+/* Execute a file, replacing TASK's current program image.  */
+
+extern error_t _hurd_exec_file_name (task_t task,
+				     file_t file,
+				     const char *filename,
+				     char *const argv[],
+				     char *const envp[]);
 
 
 /* Inform the proc server we have exited with STATUS, and kill the
Index: glibc-2.24-17.2/hurd/hurdexec.c
===================================================================
--- glibc-2.24-17.2.orig/hurd/hurdexec.c
+++ glibc-2.24-17.2/hurd/hurdexec.c
@@ -25,16 +25,37 @@
 #include <hurd/fd.h>
 #include <hurd/signal.h>
 #include <hurd/id.h>
+#include <hurd/fs_experimental.h>
 #include <assert.h>
 #include <argz.h>
 
+#include <shlib-compat.h>
+
 /* Overlay TASK, executing FILE with arguments ARGV and environment ENVP.
    If TASK == mach_task_self (), some ports are dealloc'd by the exec server.
-   ARGV and ENVP are terminated by NULL pointers.  */
+   ARGV and ENVP are terminated by NULL pointers.
+   Deprecated: use _hurd_exec_file_name instead.  */
 error_t
 _hurd_exec (task_t task, file_t file,
 	    char *const argv[], char *const envp[])
 {
+  return _hurd_exec_file_name (task, file, NULL, argv, envp);
+}
+
+link_warning (_hurd_exec,
+	      "_hurd_exec is deprecated, use _hurd_exec_file_name instead");
+
+/* Overlay TASK, executing FILE with arguments ARGV and environment ENVP.
+   If TASK == mach_task_self (), some ports are dealloc'd by the exec server.
+   ARGV and ENVP are terminated by NULL pointers.  FILENAME is the path
+   (either absolute or relative) to FILE.  Passing NULL, though possible,
+   should be avoided, since then the exec server may not know the path to
+   FILE if FILE is a script, and will then pass /dev/fd/N to the
+   interpreter.  */
+error_t
+__hurd_exec_file_name (task_t task, file_t file, const char *filename,
+		      char *const argv[], char *const envp[])
+{
   error_t err;
   char *args, *env;
   size_t argslen, envlen;
@@ -216,7 +237,7 @@ _hurd_exec (task_t task, file_t file,
       /* We have euid != svuid or egid != svgid.  POSIX.1 says that exec
 	 sets svuid = euid and svgid = egid.  So we must get a new auth
 	 port and reauthenticate everything with it.  We'll pass the new
-	 ports in file_exec instead of our own ports.  */
+	 ports in file_exec_file_name instead of our own ports.  */
 
       auth_t newauth;
 
@@ -360,13 +381,27 @@ _hurd_exec (task_t task, file_t file,
       if (__sigismember (&_hurdsig_traced, SIGKILL))
 	flags |= EXEC_SIGTRAP;
 #endif
-      err = __file_exec (file, task, flags,
-			 args, argslen, env, envlen,
-			 dtable, MACH_MSG_TYPE_COPY_SEND, dtablesize,
-			 ports, MACH_MSG_TYPE_COPY_SEND, _hurd_nports,
-			 ints, INIT_INT_MAX,
-			 please_dealloc, pdp - please_dealloc,
-			 &_hurd_msgport, task == __mach_task_self () ? 1 : 0);
+      err = __file_exec_file_name (file, task, flags,
+				   filename ? filename : "",
+				   args, argslen, env, envlen,
+				   dtable, MACH_MSG_TYPE_COPY_SEND, dtablesize,
+				   ports, MACH_MSG_TYPE_COPY_SEND,
+				   _hurd_nports,
+				   ints, INIT_INT_MAX,
+				   please_dealloc, pdp - please_dealloc,
+				   &_hurd_msgport,
+				   task == __mach_task_self () ? 1 : 0);
+      /* Fall back for backwards compatibility.  This can just be removed
+         when __file_exec goes away.  */
+      if (err == MIG_BAD_ID)
+	err = __file_exec (file, task, flags,
+			   args, argslen, env, envlen,
+			   dtable, MACH_MSG_TYPE_COPY_SEND, dtablesize,
+			   ports, MACH_MSG_TYPE_COPY_SEND, _hurd_nports,
+			   ints, INIT_INT_MAX,
+			   please_dealloc, pdp - please_dealloc,
+			   &_hurd_msgport,
+			   task == __mach_task_self () ? 1 : 0);
     }
 
   /* Release references to the standard ports.  */
@@ -401,3 +436,13 @@ _hurd_exec (task_t task, file_t file,
   free (env);
   return err;
 }
+versioned_symbol (libc, __hurd_exec_file_name, _hurd_exec_file_name, GLIBC_2_21);
+#if SHLIB_COMPAT (libc, GLIBC_2_13, GLIBC_2_21)
+error_t
+__hurd_exec_file_name_2_13 (task_t task, file_t file, const char *filename,
+		      char *const argv[], char *const envp[])
+{
+  return __hurd_exec_file_name (task, file, filename, argv, envp);
+}
+compat_symbol (libc, __hurd_exec_file_name_2_13, _hurd_exec_file_name, GLIBC_2_13_DEBIAN_33);
+#endif
Index: glibc-2.24-17.2/sysdeps/mach/hurd/execve.c
===================================================================
--- glibc-2.24-17.2.orig/sysdeps/mach/hurd/execve.c
+++ glibc-2.24-17.2/sysdeps/mach/hurd/execve.c
@@ -18,24 +18,36 @@
 #include <unistd.h>
 #include <hurd.h>
 #include <fcntl.h>
+#include <stdlib.h>
 
-/* Replace the current process, executing FILE_NAME with arguments ARGV and
-   environment ENVP.  ARGV and ENVP are terminated by NULL pointers.  */
+/* Replace the current process, executing FILENAME, a canonicalized
+   absolute path name of FILE_NAME, with arguments ARGV and
+   environment ENVP.  ARGV and ENVP are terminated by NULL
+   pointers.  */
 int
 __execve (const char *file_name, char *const argv[], char *const envp[])
 {
   error_t err;
-  file_t file = __file_name_lookup (file_name, O_EXEC, 0);
 
-  if (file == MACH_PORT_NULL)
+  char *filename = realpath (file_name, NULL);
+  if (filename == NULL)
     return -1;
 
+  file_t file = __file_name_lookup (filename, O_EXEC, 0);
+  if (file == MACH_PORT_NULL)
+    {
+      free (filename);
+      return -1;
+    }
+
   /* Hopefully this will not return.  */
-  err = _hurd_exec (__mach_task_self (), file, argv, envp);
+  err = _hurd_exec_file_name (__mach_task_self (), file,
+			      filename, argv, envp);
 
   /* Oh well.  Might as well be tidy.  */
   __mach_port_deallocate (__mach_task_self (), file);
 
+  free (filename);
   return __hurd_fail (err);
 }
 
Index: glibc-2.24-17.2/sysdeps/mach/hurd/fexecve.c
===================================================================
--- glibc-2.24-17.2.orig/sysdeps/mach/hurd/fexecve.c
+++ glibc-2.24-17.2/sysdeps/mach/hurd/fexecve.c
@@ -25,8 +25,9 @@
 int
 fexecve (int fd, char *const argv[], char *const envp[])
 {
-  error_t err = HURD_DPORT_USE (fd, _hurd_exec (__mach_task_self (), port,
-						argv, envp));
+  error_t err = HURD_DPORT_USE (fd, _hurd_exec_file_name (__mach_task_self (),
+							  port, NULL,
+							  argv, envp));
   if (! err)
     err = EGRATUITOUS;
   return __hurd_fail (err);
Index: glibc-2.24-17.2/sysdeps/mach/hurd/spawni.c
===================================================================
--- glibc-2.24-17.2.orig/sysdeps/mach/hurd/spawni.c
+++ glibc-2.24-17.2/sysdeps/mach/hurd/spawni.c
@@ -29,6 +29,7 @@
 #include <hurd/id.h>
 #include <hurd/lookup.h>
 #include <hurd/resource.h>
+#include <hurd/fs_experimental.h>
 #include <assert.h>
 #include <argz.h>
 #include "spawn_int.h"
@@ -44,6 +45,7 @@ __spawni (pid_t *pid, const char *file,
 {
   pid_t new_pid;
   char *path, *p, *name;
+  const char *filename, *file_name;
   size_t len;
   size_t pathlen;
   short int flags;
@@ -59,14 +61,14 @@ __spawni (pid_t *pid, const char *file,
      that remains visible after an exec is registration with the proc
      server, and the inheritance of various values and ports.  All those
      inherited values and ports are what get collected up and passed in the
-     file_exec RPC by an exec call.  So we do the proc server registration
-     here, following the model of fork (see fork.c).  We then collect up
-     the inherited values and ports from this (parent) process following
-     the model of exec (see hurd/hurdexec.c), modify or replace each value
-     that fork would (plus the specific changes demanded by ATTRP and
-     FILE_ACTIONS), and make the file_exec RPC on the requested executable
-     file with the child process's task port rather than our own.  This
-     should be indistinguishable from the fork + exec implementation,
+     file_exec_file_name RPC by an exec call.  So we do the proc server
+     registration here, following the model of fork (see fork.c).  We then
+     collect up the inherited values and ports from this (parent) process
+     following the model of exec (see hurd/hurdexec.c), modify or replace each
+     value that fork would (plus the specific changes demanded by ATTRP and
+     FILE_ACTIONS), and make the file_exec_file_name RPC on the requested
+     executable file with the child process's task port rather than our own.
+     This should be indistinguishable from the fork + exec implementation,
      except that all errors will be detected here (in the parent process)
      and return proper errno codes rather than the child dying with 127.
 
@@ -545,8 +547,13 @@ __spawni (pid_t *pid, const char *file,
      etc) can be observed before what errors.  */
 
   if ((xflags & SPAWN_XFLAGS_USE_PATH) == 0 || strchr (file, '/') != NULL)
-    /* The FILE parameter is actually a path.  */
-    err = child_lookup (file, O_EXEC, 0, &execfile);
+    {
+      /* The FILE parameter is actually a path.  */
+      file_name = realpath (file, NULL);
+      if (file_name == NULL)
+	goto out;
+      err = child_lookup (filename = file_name, O_EXEC, 0, &execfile);
+    }
   else
     {
       /* We have to search for FILE on the path.  */
@@ -573,20 +580,18 @@ __spawni (pid_t *pid, const char *file,
       p = path;
       do
 	{
-	  char *startp;
-
 	  path = p;
 	  p = __strchrnul (path, ':');
 
 	  if (p == path)
 	    /* Two adjacent colons, or a colon at the beginning or the end
 	       of `PATH' means to search the current directory.  */
-	    startp = name + 1;
+	    filename = name + 1;
 	  else
-	    startp = (char *) memcpy (name - (p - path), path, p - path);
+	    filename = (char *) memcpy (name - (p - path), path, p - path);
 
 	  /* Try to open this file name.  */
-	  err = child_lookup (startp, O_EXEC, 0, &execfile);
+	  err = child_lookup (filename, O_EXEC, 0, &execfile);
 	  switch (err)
 	    {
 	    case EACCES:
@@ -623,14 +628,27 @@ __spawni (pid_t *pid, const char *file,
 
     inline error_t exec (file_t file)
       {
-	return __file_exec (file, task,
-			    (__sigismember (&_hurdsig_traced, SIGKILL)
-			     ? EXEC_SIGTRAP : 0),
-			    args, argslen, env, envlen,
-			    dtable, MACH_MSG_TYPE_COPY_SEND, dtablesize,
-			    ports, MACH_MSG_TYPE_COPY_SEND, _hurd_nports,
-			    ints, INIT_INT_MAX,
-			    NULL, 0, NULL, 0);
+	error_t err = __file_exec_file_name
+	  (file, task,
+	   __sigismember (&_hurdsig_traced, SIGKILL) ? EXEC_SIGTRAP : 0,
+	   filename, args, argslen, env, envlen,
+	   dtable, MACH_MSG_TYPE_COPY_SEND, dtablesize,
+	   ports, MACH_MSG_TYPE_COPY_SEND, _hurd_nports,
+	   ints, INIT_INT_MAX, NULL, 0, NULL, 0);
+
+	/* Fallback for backwards compatibility.  This can just be removed
+	   when __file_exec goes away.  */
+	if (err == MIG_BAD_ID)
+	  return __file_exec (file, task,
+			      (__sigismember (&_hurdsig_traced, SIGKILL)
+			      ? EXEC_SIGTRAP : 0),
+			      args, argslen, env, envlen,
+			      dtable, MACH_MSG_TYPE_COPY_SEND, dtablesize,
+			      ports, MACH_MSG_TYPE_COPY_SEND, _hurd_nports,
+			      ints, INIT_INT_MAX,
+			      NULL, 0, NULL, 0);
+
+	return err;
       }
 
     /* Now we are out of things that can fail before the file_exec RPC,
/*
man posix_spawn(3)

gcc -g -Wall -o test_posix_spawn test_posix_spawn.c

$ ./a.out date
PID of child: 7634
Tue Feb  1 19:47:50 CEST 2011
Child status: exited, status=0

$ ./a.out -c date
PID of child: 7636
date: write error: Bad file descriptor
Child status: exited, status=1

$ ./a.out -s sleep 60 &
[1] 7637
$ PID of child: 7638
$ kill 7638
$ kill -KILL 7638
$ Child status: killed by signal 9
[1]+  Done                    ./a.out -s sleep 60

$ ./a.out xxxxx
PID of child: 10190
Child status: exited, status=127

Hurd:
./test_posix_spawn xxxx
posix_spawn: No such file or directory

*/

#include <spawn.h>
#include <stdio.h>
#include <unistd.h>
#include <stdlib.h>
#include <string.h>
#include <wait.h>
#include <errno.h>

#define errExit(msg)    do { perror(msg);	\
    exit(EXIT_FAILURE); } while (0)

#define errExitEN(en, msg)			\
  do { errno = en; perror(msg);			\
    exit(EXIT_FAILURE); } while (0)

char **environ;

int
main(int argc, char *argv[])
{
  pid_t child_pid;
  int s, opt, status;
  sigset_t mask;
  posix_spawnattr_t attr;
  posix_spawnattr_t *attrp;
  posix_spawn_file_actions_t file_actions;
  posix_spawn_file_actions_t *file_actionsp;

  /* Parse command-line options, which can be used to specify an
     attributes object and file actions object for the child. */

  attrp = NULL;
  file_actionsp = NULL;

  while ((opt = getopt(argc, argv, "sc")) != -1) {
    switch (opt) {
    case 'c':       /* -c: close standard output in child */

      /* Create a file actions object and add a "close"
	 action to it */

      s = posix_spawn_file_actions_init(&file_actions);
      if (s != 0)
	errExitEN(s, "posix_spawn_file_actions_init");

      s = posix_spawn_file_actions_addclose(&file_actions,
					    STDOUT_FILENO);
      if (s != 0)
	errExitEN(s, "posix_spawn_file_actions_addclose");

      file_actionsp = &file_actions;
      break;

    case 's':       /* -s: block all signals in child */

      /* Create an attributes object and add a "set signal mask"
	 action to it */

      s = posix_spawnattr_init(&attr);
      if (s != 0)
	errExitEN(s, "posix_spawnattr_init");
      s = posix_spawnattr_setflags(&attr, POSIX_SPAWN_SETSIGMASK);
      if (s != 0)
	errExitEN(s, "posix_spawnattr_setflags");

      sigfillset(&mask);
      s = posix_spawnattr_setsigmask(&attr, &mask);
      if (s != 0)
	errExitEN(s, "posix_spawnattr_setsigmask");

      attrp = &attr;
      break;
    }
  }

  /* Spawn the child. The name of the program to execute and the
     command-line arguments are taken from the command-line arguments
     of this program. The environment of the program execed in the
     child is made the same as the parent's environment. */

    s = posix_spawnp(&child_pid, argv[optind], file_actionsp, attrp,
		   &argv[optind], environ);
  if (s != 0)
    errExitEN(s, "posix_spawn");

  /* Destroy any objects that we created earlier */

  if (attrp != NULL) {
    s = posix_spawnattr_destroy(attrp);
    if (s != 0)
      errExitEN(s, "posix_spawnattr_destroy");
  }

  if (file_actionsp != NULL) {
    s = posix_spawn_file_actions_destroy(file_actionsp);
    if (s != 0)
      errExitEN(s, "posix_spawn_file_actions_destroy");
  }

  printf("PID of child: %ld\n", (long) child_pid);

  /* Monitor status of the child until it terminates */

  do {
#ifndef __GNU__
    s = waitpid(child_pid, &status, WUNTRACED | WCONTINUED);
#else
    s = waitpid(child_pid, &status, WUNTRACED);
#endif
    if (s == -1)
      errExit("waitpid");

    printf("Child status: ");
    if (WIFEXITED(status)) {
      printf("exited, status=%d\n", WEXITSTATUS(status));
    } else if (WIFSIGNALED(status)) {
      printf("killed by signal %d\n", WTERMSIG(status));
    } else if (WIFSTOPPED(status)) {
      printf("stopped by signal %d\n", WSTOPSIG(status));
#ifndef __GNU__
    } else if (WIFCONTINUED(status)) {
      printf("continued\n");
#endif
    }
  } while (!WIFEXITED(status) && !WIFSIGNALED(status));

  exit(EXIT_SUCCESS);
}

Reply via email to