1 /*************************************************
2 * Exim - an Internet mail transport agent *
3 *************************************************/
5 /* Copyright (c) University of Cambridge 1995 - 2015 */
6 /* See the file NOTICE for conditions of use and distribution. */
11 static void (*oldsignal)(int);
13 #if defined(SUPPORT_TLS) && defined(EXPERIMENTAL_REQUIRETLS)
14 static uschar tls_requiretls_copy = 0;
18 /*************************************************
19 * Ensure an fd has a given value *
20 *************************************************/
22 /* This function is called when we want to ensure that a certain fd has a
23 specific value (one of 0, 1, 2). If it hasn't got it already, close the value
24 we want, duplicate the fd, then close the old one.
34 force_fd(int oldfd, int newfd)
36 if (oldfd == newfd) return;
38 (void)dup2(oldfd, newfd);
44 /*************************************************
45 * Build argv list and optionally re-exec Exim *
46 *************************************************/
48 /* This function is called when Exim wants to re-exec (overlay) itself in the
49 current process. This is different to child_open_exim(), which runs another
50 Exim process in parallel (but it then calls this function). The function's
51 basic job is to build the argv list according to the values of current options
52 settings. There is a basic list that all calls require, and an additional list
53 that some do not require. Further additions can be given as additional
54 arguments. An option specifies whether the exec() is actually to happen, and if
55 so, what is to be done if it fails.
58 exec_type CEE_RETURN_ARGV => don't exec; return the argv list
59 CEE_EXEC_EXIT => just exit() on exec failure
60 CEE_EXEC_PANIC => panic-die on exec failure
61 kill_v if TRUE, don't pass on the D_v flag
62 pcount if not NULL, points to extra size of argv required, and if
63 CEE_RETURN_ARGV is specified, it is updated to give the
65 minimal TRUE if only minimal argv is required
66 acount number of additional arguments
67 ... further values to add to argv
69 Returns: if CEE_RETURN_ARGV is given, returns a pointer to argv;
70 otherwise, does not return
74 child_exec_exim(int exec_type, BOOL kill_v, int *pcount, BOOL minimal,
77 int first_special = -1;
79 int extra = pcount ? *pcount : 0;
82 #if defined(SUPPORT_TLS) && defined(EXPERIMENTAL_REQUIRETLS)
83 if (tls_requiretls) extra++;
86 argv = store_get((extra + acount + MAX_CLMACROS + 18) * sizeof(char *));
88 /* In all case, the list starts out with the path, any macros, and a changed
91 argv[n++] = exim_path;
92 if (clmacro_count > 0)
94 memcpy(argv + n, clmacros, clmacro_count * sizeof(uschar *));
100 argv[n++] = config_main_filename;
103 /* These values are added only for non-minimal cases. If debug_selector is
104 precisely D_v, we have to assume this was started by a non-admin user, and
105 we suppress the flag when requested. (This happens when passing on an SMTP
106 connection, and after ETRN.) If there's more debugging going on, an admin user
107 was involved, so we do pass it on. */
111 if (debug_selector == D_v)
113 if (!kill_v) argv[n++] = US"-v";
117 if (debug_selector != 0)
118 argv[n++] = string_sprintf("-d=0x%x", debug_selector);
120 if (f.dont_deliver) argv[n++] = US"-N";
121 if (f.queue_smtp) argv[n++] = US"-odqs";
122 if (f.synchronous_delivery) argv[n++] = US"-odi";
123 if (connection_max_messages >= 0)
124 argv[n++] = string_sprintf("-oB%d", connection_max_messages);
127 argv[n++] = US"-MCG";
128 argv[n++] = queue_name;
132 #if defined(SUPPORT_TLS) && defined(EXPERIMENTAL_REQUIRETLS)
133 if (tls_requiretls_copy & REQUIRETLS_MSG)
137 /* Now add in any others that are in the call. Remember which they were,
138 for more helpful diagnosis on failure. */
143 va_start(ap, acount);
146 argv[n++] = va_arg(ap, uschar *);
150 /* Terminate the list, and return it, if that is what is wanted. */
153 if (exec_type == CEE_RETURN_ARGV)
155 if (pcount != NULL) *pcount = n;
159 /* Otherwise, do the exec() here, and handle the consequences of an unexpected
160 failure. We know that there will always be at least one extra option in the
161 call when exec() is done here, so it can be used to add to the panic data. */
163 DEBUG(D_exec) debug_print_argv(CUSS argv);
164 exim_nullstd(); /* Make sure std{in,out,err} exist */
165 execv(CS argv[0], (char *const *)argv);
168 LOG_MAIN | ((exec_type == CEE_EXEC_EXIT)? LOG_PANIC : LOG_PANIC_DIE),
169 "re-exec of exim (%s) with %s failed: %s", exim_path, argv[first_special],
172 /* Get here if exec_type == CEE_EXEC_EXIT.
173 Note: this must be _exit(), not exit(). */
175 _exit(EX_EXECFAILED);
177 return NULL; /* To keep compilers happy */
183 /*************************************************
184 * Create a child Exim process *
185 *************************************************/
187 /* This function is called when Exim wants to run a parallel instance of itself
188 in order to inject a message via the standard input. The function creates a
189 child process and runs Exim in it. It sets up a pipe to the standard input of
190 the new process, and returns that to the caller via fdptr. The function returns
191 the pid of the new process, or -1 if things go wrong. If debug_fd is
192 non-negative, it is passed as stderr.
194 This interface is now a just wrapper for the more complicated function
195 child_open_exim2(), which has additional arguments. The wrapper must continue
196 to exist, even if all calls from within Exim are changed, because it is
197 documented for use from local_scan().
199 Argument: fdptr pointer to int for the stdin fd
200 Returns: pid of the created process or -1 if anything has gone wrong
204 child_open_exim(int *fdptr)
206 return child_open_exim2(fdptr, US"<>", bounce_sender_authentication);
210 /* This is a more complicated function for creating a child Exim process, with
214 fdptr pointer to int for the stdin fd
215 sender for a sender address (data for -f)
216 sender_authentication authenticated sender address or NULL
218 Returns: pid of the created process or -1 if anything has gone wrong
222 child_open_exim2(int *fdptr, uschar *sender, uschar *sender_authentication)
228 /* Create the pipe and fork the process. Ensure that SIGCHLD is set to
229 SIG_DFL before forking, so that the child process can be waited for. We
230 sometimes get here with it set otherwise. Save the old state for resetting
233 if (pipe(pfd) != 0) return (pid_t)(-1);
234 oldsignal = signal(SIGCHLD, SIG_DFL);
237 /* Child process: make the reading end of the pipe into the standard input and
238 close the writing end. If debugging, pass debug_fd as stderr. Then re-exec
239 Exim with appropriate options. In the test harness, use -odi unless queue_only
240 is set, so that the bounce is fully delivered before returning. Failure is
241 signalled with EX_EXECFAILED (specified by CEE_EXEC_EXIT), but this shouldn't
246 #if defined(SUPPORT_TLS) && defined(EXPERIMENTAL_REQUIRETLS)
247 tls_requiretls_copy = tls_requiretls;
249 force_fd(pfd[pipe_read], 0);
250 (void)close(pfd[pipe_write]);
251 if (debug_fd > 0) force_fd(debug_fd, 2);
252 if (f.running_in_test_harness && !queue_only)
254 if (sender_authentication != NULL)
255 child_exec_exim(CEE_EXEC_EXIT, FALSE, NULL, FALSE, 9,
256 US "-odi", US"-t", US"-oem", US"-oi", US"-f", sender, US"-oMas",
257 sender_authentication, message_id_option);
259 child_exec_exim(CEE_EXEC_EXIT, FALSE, NULL, FALSE, 7,
260 US "-odi", US"-t", US"-oem", US"-oi", US"-f", sender,
262 /* Control does not return here. */
264 else /* Not test harness */
266 if (sender_authentication != NULL)
267 child_exec_exim(CEE_EXEC_EXIT, FALSE, NULL, FALSE, 8,
268 US"-t", US"-oem", US"-oi", US"-f", sender, US"-oMas",
269 sender_authentication, message_id_option);
271 child_exec_exim(CEE_EXEC_EXIT, FALSE, NULL, FALSE, 6,
272 US"-t", US"-oem", US"-oi", US"-f", sender, message_id_option);
273 /* Control does not return here. */
277 /* Parent process. Save fork() errno and close the reading end of the stdin
281 (void)close(pfd[pipe_read]);
287 *fdptr = pfd[pipe_write]; /* return writing end of stdin pipe */
288 return pid; /* and pid of new process */
293 (void)close(pfd[pipe_write]);
297 #endif /* STAND_ALONE */
301 /*************************************************
302 * Create a non-Exim child process *
303 *************************************************/
305 /* This function creates a child process and runs the given command in it. It
306 sets up pipes to the standard input and output of the new process, and returns
307 them to the caller. The standard error is cloned to the output. If there are
308 any file descriptors "in the way" in the new process, they are closed. A new
309 umask is supplied for the process, and an optional new uid and gid are also
310 available. These are used by the queryprogram router to set an unprivileged id.
311 SIGUSR1 is always disabled in the new process, as it is not going to be running
312 Exim (the function child_open_exim() is provided for that). This function
313 returns the pid of the new process, or -1 if things go wrong.
316 argv the argv for exec in the new process
317 envp the envp for exec in the new process
318 newumask umask to set in the new process
319 newuid point to uid for the new process or NULL for no change
320 newgid point to gid for the new process or NULL for no change
321 infdptr pointer to int into which the fd of the stdin of the new process
323 outfdptr pointer to int into which the fd of the stdout/stderr of the new
325 wd if not NULL, a path to be handed to chdir() in the new process
326 make_leader if TRUE, make the new process a process group leader
328 Returns: the pid of the created process or -1 if anything has gone wrong
332 child_open_uid(const uschar **argv, const uschar **envp, int newumask,
333 uid_t *newuid, gid_t *newgid, int *infdptr, int *outfdptr, uschar *wd,
337 int inpfd[2], outpfd[2];
340 /* Create the pipes. */
342 if (pipe(inpfd) != 0) return (pid_t)(-1);
343 if (pipe(outpfd) != 0)
345 (void)close(inpfd[pipe_read]);
346 (void)close(inpfd[pipe_write]);
350 /* Fork the process. Ensure that SIGCHLD is set to SIG_DFL before forking, so
351 that the child process can be waited for. We sometimes get here with it set
352 otherwise. Save the old state for resetting on the wait. */
354 oldsignal = signal(SIGCHLD, SIG_DFL);
357 /* Handle the child process. First, set the required environment. We must do
358 this before messing with the pipes, in order to be able to write debugging
359 output when things go wrong. */
363 signal(SIGUSR1, SIG_IGN);
364 signal(SIGPIPE, SIG_DFL);
366 if (newgid != NULL && setgid(*newgid) < 0)
368 DEBUG(D_any) debug_printf("failed to set gid=%ld in subprocess: %s\n",
369 (long int)(*newgid), strerror(errno));
373 if (newuid != NULL && setuid(*newuid) < 0)
375 DEBUG(D_any) debug_printf("failed to set uid=%ld in subprocess: %s\n",
376 (long int)(*newuid), strerror(errno));
380 (void)umask(newumask);
382 if (wd != NULL && Uchdir(wd) < 0)
384 DEBUG(D_any) debug_printf("failed to chdir to %s: %s\n", wd,
389 /* Becomes a process group leader if requested, and then organize the pipes.
390 Any unexpected failure is signalled with EX_EXECFAILED; these are all "should
391 never occur" failures, except for exec failing because the command doesn't
394 if (make_leader && setpgid(0,0) < 0)
396 DEBUG(D_any) debug_printf("failed to set group leader in subprocess: %s\n",
401 (void)close(inpfd[pipe_write]);
402 force_fd(inpfd[pipe_read], 0);
404 (void)close(outpfd[pipe_read]);
405 force_fd(outpfd[pipe_write], 1);
410 /* Now do the exec */
412 if (envp == NULL) execv(CS argv[0], (char *const *)argv);
413 else execve(CS argv[0], (char *const *)argv, (char *const *)envp);
415 /* Failed to execv. Signal this failure using EX_EXECFAILED. We are
416 losing the actual errno we got back, because there is no way to return
420 _exit(EX_EXECFAILED); /* Note: must be _exit(), NOT exit() */
423 /* Parent process. Save any fork failure code, and close the reading end of the
424 stdin pipe, and the writing end of the stdout pipe. */
427 (void)close(inpfd[pipe_read]);
428 (void)close(outpfd[pipe_write]);
430 /* Fork succeeded; return the input/output pipes and the pid */
434 *infdptr = inpfd[pipe_write];
435 *outfdptr = outpfd[pipe_read];
439 /* Fork failed; reset fork errno before returning */
441 (void)close(inpfd[pipe_write]);
442 (void)close(outpfd[pipe_read]);
450 /*************************************************
451 * Create child process without uid change *
452 *************************************************/
454 /* This function is a wrapper for child_open_uid() that doesn't have the uid,
455 gid and working directory changing arguments. The function is provided so as to
456 have a clean interface for use from local_scan(), but also saves writing NULL
457 arguments several calls that would otherwise use child_open_uid().
460 argv the argv for exec in the new process
461 envp the envp for exec in the new process
462 newumask umask to set in the new process
463 infdptr pointer to int into which the fd of the stdin of the new process
465 outfdptr pointer to int into which the fd of the stdout/stderr of the new
467 make_leader if TRUE, make the new process a process group leader
469 Returns: the pid of the created process or -1 if anything has gone wrong
473 child_open(uschar **argv, uschar **envp, int newumask, int *infdptr,
474 int *outfdptr, BOOL make_leader)
476 return child_open_uid(CUSS argv, CUSS envp, newumask, NULL, NULL,
477 infdptr, outfdptr, NULL, make_leader);
483 /*************************************************
484 * Close down child process *
485 *************************************************/
487 /* Wait for the given process to finish, with optional timeout.
490 pid: the pid to wait for
491 timeout: maximum time to wait; 0 means for as long as it takes
493 Returns: >= 0 process terminated by exiting; value is process
494 ending status; if an execve() failed, the value
495 is typically 127 (defined as EX_EXECFAILED)
496 < 0 & > -256 process was terminated by a signal; value is the
497 negation of the signal number
499 -257 other error in wait(); errno still set
503 child_close(pid_t pid, int timeout)
509 sigalrm_seen = FALSE;
516 pid_t rc = waitpid(pid, &status, 0);
519 int lowbyte = status & 255;
520 yield = lowbyte == 0 ? (status >> 8) & 255 : -lowbyte;
525 /* This "shouldn't happen" test does happen on MacOS: for some reason
526 I do not understand we seems to get an alarm signal despite not having
527 an active alarm set. There seems to be only one, so just go round again. */
529 if (errno == EINTR && sigalrm_seen && timeout <= 0) continue;
531 yield = (errno == EINTR && sigalrm_seen) ? -256 : -257;
536 if (timeout > 0) ALARM_CLR(0);
538 signal(SIGCHLD, oldsignal); /* restore */