xref: /aosp_15_r20/external/musl/src/process/posix_spawn.c (revision c9945492fdd68bbe62686c5b452b4dc1be3f8453)
1*c9945492SAndroid Build Coastguard Worker #define _GNU_SOURCE
2*c9945492SAndroid Build Coastguard Worker #include <spawn.h>
3*c9945492SAndroid Build Coastguard Worker #include <sched.h>
4*c9945492SAndroid Build Coastguard Worker #include <unistd.h>
5*c9945492SAndroid Build Coastguard Worker #include <signal.h>
6*c9945492SAndroid Build Coastguard Worker #include <fcntl.h>
7*c9945492SAndroid Build Coastguard Worker #include <errno.h>
8*c9945492SAndroid Build Coastguard Worker #include <sys/wait.h>
9*c9945492SAndroid Build Coastguard Worker #include "syscall.h"
10*c9945492SAndroid Build Coastguard Worker #include "lock.h"
11*c9945492SAndroid Build Coastguard Worker #include "pthread_impl.h"
12*c9945492SAndroid Build Coastguard Worker #include "fdop.h"
13*c9945492SAndroid Build Coastguard Worker 
14*c9945492SAndroid Build Coastguard Worker struct args {
15*c9945492SAndroid Build Coastguard Worker 	int p[2];
16*c9945492SAndroid Build Coastguard Worker 	sigset_t oldmask;
17*c9945492SAndroid Build Coastguard Worker 	const char *path;
18*c9945492SAndroid Build Coastguard Worker 	const posix_spawn_file_actions_t *fa;
19*c9945492SAndroid Build Coastguard Worker 	const posix_spawnattr_t *restrict attr;
20*c9945492SAndroid Build Coastguard Worker 	char *const *argv, *const *envp;
21*c9945492SAndroid Build Coastguard Worker };
22*c9945492SAndroid Build Coastguard Worker 
__sys_dup2(int old,int new)23*c9945492SAndroid Build Coastguard Worker static int __sys_dup2(int old, int new)
24*c9945492SAndroid Build Coastguard Worker {
25*c9945492SAndroid Build Coastguard Worker #ifdef SYS_dup2
26*c9945492SAndroid Build Coastguard Worker 	return __syscall(SYS_dup2, old, new);
27*c9945492SAndroid Build Coastguard Worker #else
28*c9945492SAndroid Build Coastguard Worker 	return __syscall(SYS_dup3, old, new, 0);
29*c9945492SAndroid Build Coastguard Worker #endif
30*c9945492SAndroid Build Coastguard Worker }
31*c9945492SAndroid Build Coastguard Worker 
child(void * args_vp)32*c9945492SAndroid Build Coastguard Worker static int child(void *args_vp)
33*c9945492SAndroid Build Coastguard Worker {
34*c9945492SAndroid Build Coastguard Worker 	int i, ret;
35*c9945492SAndroid Build Coastguard Worker 	struct sigaction sa = {0};
36*c9945492SAndroid Build Coastguard Worker 	struct args *args = args_vp;
37*c9945492SAndroid Build Coastguard Worker 	int p = args->p[1];
38*c9945492SAndroid Build Coastguard Worker 	const posix_spawn_file_actions_t *fa = args->fa;
39*c9945492SAndroid Build Coastguard Worker 	const posix_spawnattr_t *restrict attr = args->attr;
40*c9945492SAndroid Build Coastguard Worker 	sigset_t hset;
41*c9945492SAndroid Build Coastguard Worker 
42*c9945492SAndroid Build Coastguard Worker 	close(args->p[0]);
43*c9945492SAndroid Build Coastguard Worker 
44*c9945492SAndroid Build Coastguard Worker 	/* All signal dispositions must be either SIG_DFL or SIG_IGN
45*c9945492SAndroid Build Coastguard Worker 	 * before signals are unblocked. Otherwise a signal handler
46*c9945492SAndroid Build Coastguard Worker 	 * from the parent might get run in the child while sharing
47*c9945492SAndroid Build Coastguard Worker 	 * memory, with unpredictable and dangerous results. To
48*c9945492SAndroid Build Coastguard Worker 	 * reduce overhead, sigaction has tracked for us which signals
49*c9945492SAndroid Build Coastguard Worker 	 * potentially have a signal handler. */
50*c9945492SAndroid Build Coastguard Worker 	__get_handler_set(&hset);
51*c9945492SAndroid Build Coastguard Worker 	for (i=1; i<_NSIG; i++) {
52*c9945492SAndroid Build Coastguard Worker 		if ((attr->__flags & POSIX_SPAWN_SETSIGDEF)
53*c9945492SAndroid Build Coastguard Worker 		     && sigismember(&attr->__def, i)) {
54*c9945492SAndroid Build Coastguard Worker 			sa.sa_handler = SIG_DFL;
55*c9945492SAndroid Build Coastguard Worker 		} else if (sigismember(&hset, i)) {
56*c9945492SAndroid Build Coastguard Worker 			if (i-32<3U) {
57*c9945492SAndroid Build Coastguard Worker 				sa.sa_handler = SIG_IGN;
58*c9945492SAndroid Build Coastguard Worker 			} else {
59*c9945492SAndroid Build Coastguard Worker 				__libc_sigaction(i, 0, &sa);
60*c9945492SAndroid Build Coastguard Worker 				if (sa.sa_handler==SIG_IGN) continue;
61*c9945492SAndroid Build Coastguard Worker 				sa.sa_handler = SIG_DFL;
62*c9945492SAndroid Build Coastguard Worker 			}
63*c9945492SAndroid Build Coastguard Worker 		} else {
64*c9945492SAndroid Build Coastguard Worker 			continue;
65*c9945492SAndroid Build Coastguard Worker 		}
66*c9945492SAndroid Build Coastguard Worker 		__libc_sigaction(i, &sa, 0);
67*c9945492SAndroid Build Coastguard Worker 	}
68*c9945492SAndroid Build Coastguard Worker 
69*c9945492SAndroid Build Coastguard Worker 	if (attr->__flags & POSIX_SPAWN_SETSID)
70*c9945492SAndroid Build Coastguard Worker 		if ((ret=__syscall(SYS_setsid)) < 0)
71*c9945492SAndroid Build Coastguard Worker 			goto fail;
72*c9945492SAndroid Build Coastguard Worker 
73*c9945492SAndroid Build Coastguard Worker 	if (attr->__flags & POSIX_SPAWN_SETPGROUP)
74*c9945492SAndroid Build Coastguard Worker 		if ((ret=__syscall(SYS_setpgid, 0, attr->__pgrp)))
75*c9945492SAndroid Build Coastguard Worker 			goto fail;
76*c9945492SAndroid Build Coastguard Worker 
77*c9945492SAndroid Build Coastguard Worker 	/* Use syscalls directly because the library functions attempt
78*c9945492SAndroid Build Coastguard Worker 	 * to do a multi-threaded synchronized id-change, which would
79*c9945492SAndroid Build Coastguard Worker 	 * trash the parent's state. */
80*c9945492SAndroid Build Coastguard Worker 	if (attr->__flags & POSIX_SPAWN_RESETIDS)
81*c9945492SAndroid Build Coastguard Worker 		if ((ret=__syscall(SYS_setgid, __syscall(SYS_getgid))) ||
82*c9945492SAndroid Build Coastguard Worker 		    (ret=__syscall(SYS_setuid, __syscall(SYS_getuid))) )
83*c9945492SAndroid Build Coastguard Worker 			goto fail;
84*c9945492SAndroid Build Coastguard Worker 
85*c9945492SAndroid Build Coastguard Worker 	if (fa && fa->__actions) {
86*c9945492SAndroid Build Coastguard Worker 		struct fdop *op;
87*c9945492SAndroid Build Coastguard Worker 		int fd;
88*c9945492SAndroid Build Coastguard Worker 		for (op = fa->__actions; op->next; op = op->next);
89*c9945492SAndroid Build Coastguard Worker 		for (; op; op = op->prev) {
90*c9945492SAndroid Build Coastguard Worker 			/* It's possible that a file operation would clobber
91*c9945492SAndroid Build Coastguard Worker 			 * the pipe fd used for synchronizing with the
92*c9945492SAndroid Build Coastguard Worker 			 * parent. To avoid that, we dup the pipe onto
93*c9945492SAndroid Build Coastguard Worker 			 * an unoccupied fd. */
94*c9945492SAndroid Build Coastguard Worker 			if (op->fd == p) {
95*c9945492SAndroid Build Coastguard Worker 				ret = __syscall(SYS_dup, p);
96*c9945492SAndroid Build Coastguard Worker 				if (ret < 0) goto fail;
97*c9945492SAndroid Build Coastguard Worker 				__syscall(SYS_close, p);
98*c9945492SAndroid Build Coastguard Worker 				p = ret;
99*c9945492SAndroid Build Coastguard Worker 			}
100*c9945492SAndroid Build Coastguard Worker 			switch(op->cmd) {
101*c9945492SAndroid Build Coastguard Worker 			case FDOP_CLOSE:
102*c9945492SAndroid Build Coastguard Worker 				__syscall(SYS_close, op->fd);
103*c9945492SAndroid Build Coastguard Worker 				break;
104*c9945492SAndroid Build Coastguard Worker 			case FDOP_DUP2:
105*c9945492SAndroid Build Coastguard Worker 				fd = op->srcfd;
106*c9945492SAndroid Build Coastguard Worker 				if (fd == p) {
107*c9945492SAndroid Build Coastguard Worker 					ret = -EBADF;
108*c9945492SAndroid Build Coastguard Worker 					goto fail;
109*c9945492SAndroid Build Coastguard Worker 				}
110*c9945492SAndroid Build Coastguard Worker 				if (fd != op->fd) {
111*c9945492SAndroid Build Coastguard Worker 					if ((ret=__sys_dup2(fd, op->fd))<0)
112*c9945492SAndroid Build Coastguard Worker 						goto fail;
113*c9945492SAndroid Build Coastguard Worker 				} else {
114*c9945492SAndroid Build Coastguard Worker 					ret = __syscall(SYS_fcntl, fd, F_GETFD);
115*c9945492SAndroid Build Coastguard Worker 					ret = __syscall(SYS_fcntl, fd, F_SETFD,
116*c9945492SAndroid Build Coastguard Worker 					                ret & ~FD_CLOEXEC);
117*c9945492SAndroid Build Coastguard Worker 					if (ret<0)
118*c9945492SAndroid Build Coastguard Worker 						goto fail;
119*c9945492SAndroid Build Coastguard Worker 				}
120*c9945492SAndroid Build Coastguard Worker 				break;
121*c9945492SAndroid Build Coastguard Worker 			case FDOP_OPEN:
122*c9945492SAndroid Build Coastguard Worker 				fd = __sys_open(op->path, op->oflag, op->mode);
123*c9945492SAndroid Build Coastguard Worker 				if ((ret=fd) < 0) goto fail;
124*c9945492SAndroid Build Coastguard Worker 				if (fd != op->fd) {
125*c9945492SAndroid Build Coastguard Worker 					if ((ret=__sys_dup2(fd, op->fd))<0)
126*c9945492SAndroid Build Coastguard Worker 						goto fail;
127*c9945492SAndroid Build Coastguard Worker 					__syscall(SYS_close, fd);
128*c9945492SAndroid Build Coastguard Worker 				}
129*c9945492SAndroid Build Coastguard Worker 				break;
130*c9945492SAndroid Build Coastguard Worker 			case FDOP_CHDIR:
131*c9945492SAndroid Build Coastguard Worker 				ret = __syscall(SYS_chdir, op->path);
132*c9945492SAndroid Build Coastguard Worker 				if (ret<0) goto fail;
133*c9945492SAndroid Build Coastguard Worker 				break;
134*c9945492SAndroid Build Coastguard Worker 			case FDOP_FCHDIR:
135*c9945492SAndroid Build Coastguard Worker 				ret = __syscall(SYS_fchdir, op->fd);
136*c9945492SAndroid Build Coastguard Worker 				if (ret<0) goto fail;
137*c9945492SAndroid Build Coastguard Worker 				break;
138*c9945492SAndroid Build Coastguard Worker 			}
139*c9945492SAndroid Build Coastguard Worker 		}
140*c9945492SAndroid Build Coastguard Worker 	}
141*c9945492SAndroid Build Coastguard Worker 
142*c9945492SAndroid Build Coastguard Worker 	/* Close-on-exec flag may have been lost if we moved the pipe
143*c9945492SAndroid Build Coastguard Worker 	 * to a different fd. We don't use F_DUPFD_CLOEXEC above because
144*c9945492SAndroid Build Coastguard Worker 	 * it would fail on older kernels and atomicity is not needed --
145*c9945492SAndroid Build Coastguard Worker 	 * in this process there are no threads or signal handlers. */
146*c9945492SAndroid Build Coastguard Worker 	__syscall(SYS_fcntl, p, F_SETFD, FD_CLOEXEC);
147*c9945492SAndroid Build Coastguard Worker 
148*c9945492SAndroid Build Coastguard Worker 	pthread_sigmask(SIG_SETMASK, (attr->__flags & POSIX_SPAWN_SETSIGMASK)
149*c9945492SAndroid Build Coastguard Worker 		? &attr->__mask : &args->oldmask, 0);
150*c9945492SAndroid Build Coastguard Worker 
151*c9945492SAndroid Build Coastguard Worker 	int (*exec)(const char *, char *const *, char *const *) =
152*c9945492SAndroid Build Coastguard Worker 		attr->__fn ? (int (*)())attr->__fn : execve;
153*c9945492SAndroid Build Coastguard Worker 
154*c9945492SAndroid Build Coastguard Worker 	exec(args->path, args->argv, args->envp);
155*c9945492SAndroid Build Coastguard Worker 	ret = -errno;
156*c9945492SAndroid Build Coastguard Worker 
157*c9945492SAndroid Build Coastguard Worker fail:
158*c9945492SAndroid Build Coastguard Worker 	/* Since sizeof errno < PIPE_BUF, the write is atomic. */
159*c9945492SAndroid Build Coastguard Worker 	ret = -ret;
160*c9945492SAndroid Build Coastguard Worker 	if (ret) {
161*c9945492SAndroid Build Coastguard Worker 		int r;
162*c9945492SAndroid Build Coastguard Worker 		do r = __syscall(SYS_write, p, &ret, sizeof ret);
163*c9945492SAndroid Build Coastguard Worker 		while (r<0 && r!=-EPIPE);
164*c9945492SAndroid Build Coastguard Worker 	}
165*c9945492SAndroid Build Coastguard Worker 	_exit(127);
166*c9945492SAndroid Build Coastguard Worker }
167*c9945492SAndroid Build Coastguard Worker 
168*c9945492SAndroid Build Coastguard Worker 
posix_spawn(pid_t * restrict res,const char * restrict path,const posix_spawn_file_actions_t * fa,const posix_spawnattr_t * restrict attr,char * const argv[restrict],char * const envp[restrict])169*c9945492SAndroid Build Coastguard Worker int posix_spawn(pid_t *restrict res, const char *restrict path,
170*c9945492SAndroid Build Coastguard Worker 	const posix_spawn_file_actions_t *fa,
171*c9945492SAndroid Build Coastguard Worker 	const posix_spawnattr_t *restrict attr,
172*c9945492SAndroid Build Coastguard Worker 	char *const argv[restrict], char *const envp[restrict])
173*c9945492SAndroid Build Coastguard Worker {
174*c9945492SAndroid Build Coastguard Worker 	pid_t pid;
175*c9945492SAndroid Build Coastguard Worker 	char stack[1024+PATH_MAX];
176*c9945492SAndroid Build Coastguard Worker 	int ec=0, cs;
177*c9945492SAndroid Build Coastguard Worker 	struct args args;
178*c9945492SAndroid Build Coastguard Worker 
179*c9945492SAndroid Build Coastguard Worker 	pthread_setcancelstate(PTHREAD_CANCEL_DISABLE, &cs);
180*c9945492SAndroid Build Coastguard Worker 
181*c9945492SAndroid Build Coastguard Worker 	args.path = path;
182*c9945492SAndroid Build Coastguard Worker 	args.fa = fa;
183*c9945492SAndroid Build Coastguard Worker 	args.attr = attr ? attr : &(const posix_spawnattr_t){0};
184*c9945492SAndroid Build Coastguard Worker 	args.argv = argv;
185*c9945492SAndroid Build Coastguard Worker 	args.envp = envp;
186*c9945492SAndroid Build Coastguard Worker 	pthread_sigmask(SIG_BLOCK, SIGALL_SET, &args.oldmask);
187*c9945492SAndroid Build Coastguard Worker 
188*c9945492SAndroid Build Coastguard Worker 	/* The lock guards both against seeing a SIGABRT disposition change
189*c9945492SAndroid Build Coastguard Worker 	 * by abort and against leaking the pipe fd to fork-without-exec. */
190*c9945492SAndroid Build Coastguard Worker 	LOCK(__abort_lock);
191*c9945492SAndroid Build Coastguard Worker 
192*c9945492SAndroid Build Coastguard Worker 	if (pipe2(args.p, O_CLOEXEC)) {
193*c9945492SAndroid Build Coastguard Worker 		UNLOCK(__abort_lock);
194*c9945492SAndroid Build Coastguard Worker 		ec = errno;
195*c9945492SAndroid Build Coastguard Worker 		goto fail;
196*c9945492SAndroid Build Coastguard Worker 	}
197*c9945492SAndroid Build Coastguard Worker 
198*c9945492SAndroid Build Coastguard Worker 	pid = __clone(child, stack+sizeof stack,
199*c9945492SAndroid Build Coastguard Worker 		CLONE_VM|CLONE_VFORK|SIGCHLD, &args);
200*c9945492SAndroid Build Coastguard Worker 	close(args.p[1]);
201*c9945492SAndroid Build Coastguard Worker 	UNLOCK(__abort_lock);
202*c9945492SAndroid Build Coastguard Worker 
203*c9945492SAndroid Build Coastguard Worker 	if (pid > 0) {
204*c9945492SAndroid Build Coastguard Worker 		if (read(args.p[0], &ec, sizeof ec) != sizeof ec) ec = 0;
205*c9945492SAndroid Build Coastguard Worker 		else waitpid(pid, &(int){0}, 0);
206*c9945492SAndroid Build Coastguard Worker 	} else {
207*c9945492SAndroid Build Coastguard Worker 		ec = -pid;
208*c9945492SAndroid Build Coastguard Worker 	}
209*c9945492SAndroid Build Coastguard Worker 
210*c9945492SAndroid Build Coastguard Worker 	close(args.p[0]);
211*c9945492SAndroid Build Coastguard Worker 
212*c9945492SAndroid Build Coastguard Worker 	if (!ec && res) *res = pid;
213*c9945492SAndroid Build Coastguard Worker 
214*c9945492SAndroid Build Coastguard Worker fail:
215*c9945492SAndroid Build Coastguard Worker 	pthread_sigmask(SIG_SETMASK, &args.oldmask, 0);
216*c9945492SAndroid Build Coastguard Worker 	pthread_setcancelstate(cs, 0);
217*c9945492SAndroid Build Coastguard Worker 
218*c9945492SAndroid Build Coastguard Worker 	return ec;
219*c9945492SAndroid Build Coastguard Worker }
220