int * stderrfd,
char ** my_argv)
{
- int argc;
pid_t pid;
int i, inpipe[2], outpipe[2], errpipe[2], passwdpipe[2];
char number[NUM_STR_SIZE];
passwdvar = *my_argv++;
passwdfd = (int *)*my_argv++;
}
- g_debug("pipespawnv: stdoutfd is %d", *stdoutfd);
memset(inpipe, -1, SIZEOF(inpipe));
memset(outpipe, -1, SIZEOF(outpipe));
memset(errpipe, -1, SIZEOF(errpipe));
memset(passwdpipe, -1, SIZEOF(passwdpipe));
- argc = 0;
cmdline = stralloc(prog);
for(arg = my_argv; *arg != NULL; arg++) {
if (*arg != skip_argument) {
- argc++;
quoted = quote_string(*arg);
cmdline = vstrextend(&cmdline, " ", quoted, NULL);
amfree(quoted);
}
break;
case 0: /* child process */
+ debug_dup_stderr_to_debug();
if ((pipedef & STDIN_PIPE) != 0) {
aclose(inpipe[1]); /* close output side of pipe */
} else {
* Shift the pipes to the standard file descriptors as requested.
*/
if(dup2(inpipe[0], 0) == -1) {
- error(_("error [spawn %s: dup2 in: %s]"), prog, strerror(errno));
+ g_fprintf(stderr, "error [spawn %s: dup2 in: %s]", prog, strerror(errno));
+ exit(1);
/*NOTREACHED*/
}
if(dup2(outpipe[1], 1) == -1) {
- error(_("error [spawn %s: dup2 out: %s]"), prog, strerror(errno));
+ g_fprintf(stderr, "error [spawn %s: dup2 out: %s]", prog, strerror(errno));
+ exit(1);
/*NOTREACHED*/
}
if(dup2(errpipe[1], 2) == -1) {
- error(_("error [spawn %s: dup2 err: %s]"), prog, strerror(errno));
+ g_fprintf(stderr, "error [spawn %s: dup2 err: %s]", prog, strerror(errno));
+ exit(1);
/*NOTREACHED*/
}
safe_fd(-1, 0);
}
- if (need_root)
+ if (need_root) {
become_root();
+ } else {
+ /* if our real userid is zero, the child shouldn't inherit
+ * that, so drop privs permanently */
+ if (getuid() == 0 && !set_root_privs(-1)) {
+ error(_("could not drop root privileges"));
+ }
+ }
+
execve(prog, my_argv, env);
e = strerror(errno);
error(_("error [exec %s: %s]"), prog, e);