2013-01-17 19:32:13 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* apps/nshlib/nsh_fileapps.c
|
|
|
|
*
|
2020-05-07 22:07:08 +02:00
|
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
|
|
* this work for additional information regarding copyright ownership. The
|
|
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
|
|
* "License"); you may not use this file except in compliance with the
|
|
|
|
* License. You may obtain a copy of the License at
|
2013-01-17 19:32:13 +01:00
|
|
|
*
|
2020-05-07 22:07:08 +02:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2013-01-17 19:32:13 +01:00
|
|
|
*
|
2020-05-07 22:07:08 +02:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
* License for the specific language governing permissions and limitations
|
|
|
|
* under the License.
|
2013-01-17 19:32:13 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#ifdef CONFIG_SCHED_WAITPID
|
2018-08-26 15:48:38 +02:00
|
|
|
# include <sys/ioctl.h>
|
2013-01-17 19:32:13 +01:00
|
|
|
# include <sys/wait.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <stdbool.h>
|
|
|
|
#include <spawn.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include "nsh.h"
|
|
|
|
#include "nsh_console.h"
|
|
|
|
|
|
|
|
#ifdef CONFIG_NSH_FILE_APPS
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: nsh_fileapp
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Attempt to execute the application task whose name is 'cmd'
|
|
|
|
*
|
|
|
|
* Returned Value:
|
2016-06-09 16:13:42 +02:00
|
|
|
* <0 If posix_spawn() fails, then the negated errno value
|
2013-01-17 19:32:13 +01:00
|
|
|
* is returned.
|
|
|
|
* -1 (ERROR) if the application task corresponding to 'cmd' could not
|
|
|
|
* be started (possibly because it doesn not exist).
|
|
|
|
* 0 (OK) if the application task corresponding to 'cmd' was
|
|
|
|
* and successfully started. If CONFIG_SCHED_WAITPID is
|
|
|
|
* defined, this return value also indicates that the
|
|
|
|
* application returned successful status (EXIT_SUCCESS)
|
|
|
|
* 1 If CONFIG_SCHED_WAITPID is defined, then this return value
|
|
|
|
* indicates that the application task was spawned successfully
|
|
|
|
* but returned failure exit status.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int nsh_fileapp(FAR struct nsh_vtbl_s *vtbl, FAR const char *cmd,
|
|
|
|
FAR char **argv, FAR const char *redirfile, int oflags)
|
|
|
|
{
|
|
|
|
posix_spawn_file_actions_t file_actions;
|
|
|
|
posix_spawnattr_t attr;
|
|
|
|
pid_t pid;
|
2019-12-10 17:05:51 +01:00
|
|
|
int rc = 0;
|
2013-01-17 19:32:13 +01:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* Initialize the attributes file actions structure */
|
|
|
|
|
|
|
|
ret = posix_spawn_file_actions_init(&file_actions);
|
|
|
|
if (ret != 0)
|
|
|
|
{
|
|
|
|
/* posix_spawn_file_actions_init returns a positive errno value on
|
|
|
|
* failure.
|
|
|
|
*/
|
|
|
|
|
2018-12-09 01:53:54 +01:00
|
|
|
nsh_error(vtbl, g_fmtcmdfailed, cmd, "posix_spawn_file_actions_init",
|
2013-01-17 19:32:13 +01:00
|
|
|
NSH_ERRNO_OF(ret));
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = posix_spawnattr_init(&attr);
|
|
|
|
if (ret != 0)
|
|
|
|
{
|
|
|
|
/* posix_spawnattr_init returns a positive errno value on failure. */
|
|
|
|
|
2018-12-09 01:53:54 +01:00
|
|
|
nsh_error(vtbl, g_fmtcmdfailed, cmd, "posix_spawnattr_init",
|
|
|
|
NSH_ERRNO);
|
2013-01-17 19:32:13 +01:00
|
|
|
goto errout_with_actions;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Handle re-direction of output */
|
|
|
|
|
|
|
|
if (redirfile)
|
|
|
|
{
|
|
|
|
ret = posix_spawn_file_actions_addopen(&file_actions, 1, redirfile,
|
|
|
|
oflags, 0644);
|
|
|
|
if (ret != 0)
|
|
|
|
{
|
2020-05-02 15:30:54 +02:00
|
|
|
/* posix_spawn_file_actions_addopen returns a positive errno
|
|
|
|
* value on failure.
|
|
|
|
*/
|
2013-01-17 19:32:13 +01:00
|
|
|
|
2018-12-09 01:53:54 +01:00
|
|
|
nsh_error(vtbl, g_fmtcmdfailed, cmd,
|
2013-01-17 19:32:13 +01:00
|
|
|
"posix_spawn_file_actions_addopen",
|
|
|
|
NSH_ERRNO);
|
|
|
|
goto errout_with_attrs;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-01-17 21:25:32 +01:00
|
|
|
/* Lock the scheduler in an attempt to prevent the application from
|
|
|
|
* running until waitpid() has been called.
|
2013-01-17 19:32:13 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
sched_lock();
|
|
|
|
|
|
|
|
/* Execute the program. posix_spawnp returns a positive errno value on
|
|
|
|
* failure.
|
|
|
|
*/
|
|
|
|
|
2021-06-13 08:10:24 +02:00
|
|
|
ret = posix_spawnp(&pid, cmd, &file_actions, &attr, argv, NULL);
|
2013-01-17 19:32:13 +01:00
|
|
|
if (ret == OK)
|
|
|
|
{
|
|
|
|
/* The application was successfully started with pre-emption disabled.
|
|
|
|
* In the simplest cases, the application will not have run because the
|
2020-05-02 15:30:54 +02:00
|
|
|
* the scheduler is locked. But in the case where I/O was redirected,
|
|
|
|
* a proxy task ran and broke our lock. As result, the application may
|
2013-01-18 02:52:42 +01:00
|
|
|
* have aso ran if its priority was higher than than the priority of
|
|
|
|
* this thread.
|
2013-01-17 19:32:13 +01:00
|
|
|
*
|
2013-01-18 02:52:42 +01:00
|
|
|
* If the application did not run to completion and if the application
|
|
|
|
* was not backgrounded, then we need to wait here for the application
|
|
|
|
* to exit. This only works works with the following options:
|
2013-01-17 19:32:13 +01:00
|
|
|
*
|
|
|
|
* - CONFIG_NSH_DISABLEBG - Do not run commands in background
|
|
|
|
* - CONFIG_SCHED_WAITPID - Required to run external commands in
|
|
|
|
* foreground
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef CONFIG_SCHED_WAITPID
|
|
|
|
/* CONFIG_SCHED_WAITPID is selected, so we may run the command in
|
|
|
|
* foreground unless we were specifically requested to run the command
|
|
|
|
* in background (and running commands in background is enabled).
|
|
|
|
*/
|
|
|
|
|
|
|
|
# ifndef CONFIG_NSH_DISABLEBG
|
|
|
|
if (vtbl->np.np_bg == false)
|
|
|
|
# endif /* CONFIG_NSH_DISABLEBG */
|
|
|
|
{
|
2018-08-28 20:02:06 +02:00
|
|
|
/* Setup up to receive SIGINT if control-C entered. The return
|
2018-08-26 15:48:38 +02:00
|
|
|
* value is ignored because this console device may not support
|
2018-08-28 20:02:06 +02:00
|
|
|
* SIGINT.
|
2018-08-26 15:48:38 +02:00
|
|
|
*/
|
|
|
|
|
2020-01-02 13:09:50 +01:00
|
|
|
ioctl(stdout->fs_fd, TIOCSCTTY, pid);
|
2018-08-26 15:48:38 +02:00
|
|
|
|
2013-01-18 02:52:42 +01:00
|
|
|
/* Wait for the application to exit. We did lock the scheduler
|
2013-01-17 21:25:32 +01:00
|
|
|
* above, but that does not guarantee that the application did not
|
2013-01-18 02:52:42 +01:00
|
|
|
* already run to completion in the case where I/O was redirected.
|
|
|
|
* Here the scheduler will be unlocked while waitpid is waiting
|
|
|
|
* and if the application has not yet run, it will now be able to
|
|
|
|
* do so.
|
2018-09-02 22:19:30 +02:00
|
|
|
*
|
|
|
|
* NOTE: WUNTRACED does nothing in the default case, but in the
|
|
|
|
* case the where CONFIG_SIG_SIGSTOP_ACTION=y, the file app
|
|
|
|
* may also be stopped. In that case WUNTRACED will force
|
|
|
|
* waitpid() to return with ECHILD.
|
2013-01-17 19:32:13 +01:00
|
|
|
*/
|
|
|
|
|
2018-09-02 22:19:30 +02:00
|
|
|
ret = waitpid(pid, &rc, WUNTRACED);
|
2013-01-17 21:25:32 +01:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
2020-05-02 15:30:54 +02:00
|
|
|
/* If the child thread doesn't exist, waitpid() will return the
|
|
|
|
* error ECHLD. Since we know that the task was successfully
|
2013-01-17 21:25:32 +01:00
|
|
|
* started, this must be one of the cases described above; we
|
|
|
|
* have to assume that the task already exit'ed. In this case,
|
|
|
|
* we have no idea if the application ran successfully or not
|
|
|
|
* (because NuttX does not retain exit status of child tasks).
|
|
|
|
* Let's assume that is did run successfully.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int errcode = errno;
|
|
|
|
if (errcode == ECHILD)
|
|
|
|
{
|
|
|
|
ret = OK;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2018-12-09 01:53:54 +01:00
|
|
|
nsh_error(vtbl, g_fmtcmdfailed, cmd, "waitpid",
|
2013-01-17 21:25:32 +01:00
|
|
|
NSH_ERRNO_OF(errcode));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Waitpid completed the wait successfully */
|
|
|
|
|
|
|
|
else
|
2013-01-17 19:32:13 +01:00
|
|
|
{
|
2019-12-10 17:05:51 +01:00
|
|
|
/* Ignore the returned child pid */
|
2013-01-17 19:32:13 +01:00
|
|
|
|
2019-12-10 17:05:51 +01:00
|
|
|
ret = OK;
|
2013-01-17 19:32:13 +01:00
|
|
|
|
2020-05-02 15:30:54 +02:00
|
|
|
/* TODO: Set the environment variable '?' to a string
|
|
|
|
* corresponding to WEXITSTATUS(rc) so that $? will expand
|
|
|
|
* to the exit status of the most recently executed task.
|
2019-12-10 17:05:51 +01:00
|
|
|
*/
|
2013-01-17 19:32:13 +01:00
|
|
|
}
|
2018-08-26 15:48:38 +02:00
|
|
|
|
2020-01-02 13:09:50 +01:00
|
|
|
ioctl(stdout->fs_fd, TIOCSCTTY, -1);
|
2013-01-17 19:32:13 +01:00
|
|
|
}
|
|
|
|
# ifndef CONFIG_NSH_DISABLEBG
|
|
|
|
else
|
|
|
|
# endif /* CONFIG_NSH_DISABLEBG */
|
|
|
|
#endif /* CONFIG_SCHED_WAITPID */
|
|
|
|
|
|
|
|
/* We get here if either:
|
|
|
|
*
|
|
|
|
* - CONFIG_SCHED_WAITPID is not selected meaning that all commands
|
|
|
|
* have to be run in background, or
|
2020-05-02 15:30:54 +02:00
|
|
|
* - CONFIG_SCHED_WAITPID and CONFIG_NSH_DISABLEBG are both selected,
|
|
|
|
* but the user requested to run the command in background.
|
2013-01-17 19:32:13 +01:00
|
|
|
*
|
|
|
|
* NOTE that the case of a) CONFIG_SCHED_WAITPID is not selected and
|
2020-05-02 15:30:54 +02:00
|
|
|
* b) CONFIG_NSH_DISABLEBG selected cannot be supported. In that event,
|
|
|
|
* all commands will have to run in background. The waitpid() API must
|
|
|
|
* be available to support running the command in foreground.
|
2013-01-17 19:32:13 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
#if !defined(CONFIG_SCHED_WAITPID) || !defined(CONFIG_NSH_DISABLEBG)
|
|
|
|
{
|
|
|
|
struct sched_param param;
|
|
|
|
sched_getparam(ret, ¶m);
|
|
|
|
nsh_output(vtbl, "%s [%d:%d]\n", cmd, ret, param.sched_priority);
|
|
|
|
|
|
|
|
/* Backgrounded commands always 'succeed' as long as we can start
|
|
|
|
* them.
|
|
|
|
*/
|
|
|
|
|
|
|
|
ret = OK;
|
|
|
|
}
|
|
|
|
#endif /* !CONFIG_SCHED_WAITPID || !CONFIG_NSH_DISABLEBG */
|
|
|
|
}
|
|
|
|
|
|
|
|
sched_unlock();
|
|
|
|
|
2020-02-23 05:51:44 +01:00
|
|
|
/* Free attributes and file actions. Ignoring return values in the case
|
2013-01-17 19:32:13 +01:00
|
|
|
* of an error.
|
|
|
|
*/
|
|
|
|
|
|
|
|
errout_with_actions:
|
2020-01-02 13:09:50 +01:00
|
|
|
posix_spawn_file_actions_destroy(&file_actions);
|
2013-01-17 19:32:13 +01:00
|
|
|
|
|
|
|
errout_with_attrs:
|
2020-01-02 13:09:50 +01:00
|
|
|
posix_spawnattr_destroy(&attr);
|
2013-01-17 19:32:13 +01:00
|
|
|
|
|
|
|
errout:
|
|
|
|
/* Most posix_spawn interfaces return a positive errno value on failure
|
|
|
|
* and do not set the errno variable.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (ret > 0)
|
|
|
|
{
|
|
|
|
/* Set the errno value and return -1 */
|
|
|
|
|
2020-05-07 22:07:08 +02:00
|
|
|
errno = ret;
|
2013-01-17 19:32:13 +01:00
|
|
|
ret = ERROR;
|
|
|
|
}
|
|
|
|
else if (ret < 0)
|
|
|
|
{
|
|
|
|
/* Return -1 on failure. errno should have been set. */
|
|
|
|
|
|
|
|
ret = ERROR;
|
|
|
|
}
|
2019-12-10 17:05:51 +01:00
|
|
|
else if (rc != 0)
|
|
|
|
{
|
|
|
|
/* We can't return the exact status (nsh has nowhere to put it)
|
|
|
|
* so just pass back zero/nonzero in a fashion that doesn't look
|
|
|
|
* like an error.
|
|
|
|
*/
|
|
|
|
|
|
|
|
ret = 1;
|
|
|
|
}
|
2013-01-17 19:32:13 +01:00
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_NSH_FILE_APPS */
|