summaryrefslogtreecommitdiff
path: root/lib/libc/unistd/execvp.c
blob: 9865aa1bb1fd51e650f042f15636c9f029463f07 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
#include "stddef.h" // for NULL

#include <errno.h>  // for errno, ENAMETOOLONG, ENOENT
#include <limits.h> // for PATH_MAX
#include <stdio.h>  // for snprintf
#include <stdlib.h> // for getenv
#include <string.h> // for strchr, strlen, strstr
#include <unistd.h> // for execv, execvp

extern char **environ;

int execvp(const char *file, char *const argv[])
{
	if (*file == '\0') {
		errno = ENOENT;
		return -1;
	}

	if (strchr(file, '/') != NULL) {
		return execv(file, argv);
	} else {
		char *ptr;
		char *path = getenv("PATH");

		if (path == NULL || *path == '\0') {
			path = "/bin";
		}

		do {
			char buf[PATH_MAX];

			ptr = strchr(path, ':');
			if (ptr == NULL) {
				if (snprintf(buf, PATH_MAX, "%s/%s", path, file) >= PATH_MAX) {
					errno = ENAMETOOLONG;
					return -1;
				}

				/* Validate path doesn't contain dangerous
				 * characters */
				if (strstr(buf, "..") == NULL && strchr(buf, '\0') == buf + strlen(buf)) {
					execv(buf, argv);
				}
				break;
			}

			if (snprintf(buf, PATH_MAX, "%.*s/%s", (int)(ptr - path), path, file) >= PATH_MAX) {
				errno = ENAMETOOLONG;
				return -1;
			}

			/* Validate path doesn't contain dangerous characters */
			if (strstr(buf, "..") == NULL && strchr(buf, '\0') == buf + strlen(buf)) {
				execv(buf, argv);
			}
			path = ptr + 1;
		} while (*ptr != '\0');

		errno = ENOENT;
		return -1;
	}

	return 0;
}