| /* | 
 |  * Copyright (C) 2017 The Android Open Source Project | 
 |  * All rights reserved. | 
 |  * | 
 |  * Redistribution and use in source and binary forms, with or without | 
 |  * modification, are permitted provided that the following conditions | 
 |  * are met: | 
 |  *  * Redistributions of source code must retain the above copyright | 
 |  *    notice, this list of conditions and the following disclaimer. | 
 |  *  * Redistributions in binary form must reproduce the above copyright | 
 |  *    notice, this list of conditions and the following disclaimer in | 
 |  *    the documentation and/or other materials provided with the | 
 |  *    distribution. | 
 |  * | 
 |  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS | 
 |  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT | 
 |  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS | 
 |  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE | 
 |  * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, | 
 |  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, | 
 |  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS | 
 |  * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED | 
 |  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, | 
 |  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT | 
 |  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 
 |  * SUCH DAMAGE. | 
 |  */ | 
 |  | 
 | #include <spawn.h> | 
 |  | 
 | #include <errno.h> | 
 | #include <fcntl.h> | 
 | #include <linux/close_range.h> | 
 | #include <signal.h> | 
 | #include <stdlib.h> | 
 | #include <string.h> | 
 | #include <sys/resource.h> | 
 | #include <sys/syscall.h> | 
 | #include <unistd.h> | 
 |  | 
 | #include <android/fdsan.h> | 
 |  | 
 | #include "private/ScopedSignalBlocker.h" | 
 |  | 
 | static int set_cloexec(int i) { | 
 |   int v = fcntl(i, F_GETFD); | 
 |   if (v == -1) return -1;  // almost certainly: errno == EBADF | 
 |   return fcntl(i, F_SETFD, v | FD_CLOEXEC); | 
 | } | 
 |  | 
 | // mark all open fds except stdin/out/err as close-on-exec | 
 | static int cloexec_except_stdioe() { | 
 |   // requires 5.11+ or ACK 5.10-T kernel, otherwise returns ENOSYS or EINVAL | 
 |   if (!close_range(3, ~0U, CLOSE_RANGE_CLOEXEC)) return 0; | 
 |  | 
 |   // unfortunately getrlimit can lie: | 
 |   // - both soft and hard limits can be lowered to 0, with fds still open, so it can underestimate | 
 |   // - in practice it usually is some really large value (like 32K or more) | 
 |   //   even though only a handful of small fds are actually open (ie. < 500), | 
 |   //   this results in poor performance when trying to act on all possibly open fds | 
 |   struct rlimit m; | 
 |   int max = getrlimit(RLIMIT_NOFILE, &m) ? 1000000 : m.rlim_max; | 
 |   for (int i = 3; i < max; ++i) set_cloexec(i); | 
 |   return 0; | 
 | } | 
 |  | 
 | enum Action { | 
 |   kOpen, | 
 |   kClose, | 
 |   kDup2, | 
 |   kChdir, | 
 |   kFchdir, | 
 | }; | 
 |  | 
 | struct __posix_spawn_file_action { | 
 |   __posix_spawn_file_action* next; | 
 |  | 
 |   Action what; | 
 |   int fd; | 
 |   int new_fd; | 
 |   char* path; | 
 |   int flags; | 
 |   mode_t mode; | 
 |  | 
 |   void Do() { | 
 |     if (what == kOpen) { | 
 |       fd = open(path, flags, mode); | 
 |       if (fd == -1) _exit(127); | 
 |       // If it didn't land where we wanted it, move it. | 
 |       if (fd != new_fd) { | 
 |         if (dup2(fd, new_fd) == -1) _exit(127); | 
 |         close(fd); | 
 |       } | 
 |     } else if (what == kClose) { | 
 |       // Failure to close is ignored. | 
 |       close(fd); | 
 |     } else if (what == kChdir) { | 
 |       if (chdir(path) == -1) _exit(127); | 
 |     } else if (what == kFchdir) { | 
 |       if (fchdir(fd) == -1) _exit(127); | 
 |     } else { | 
 |       // It's a dup2. | 
 |       if (fd == new_fd) { | 
 |         // dup2(2) is a no-op if fd == new_fd, but POSIX suggests that we should | 
 |         // manually remove the O_CLOEXEC flag in that case (because otherwise | 
 |         // what use is the dup?). | 
 |         // See https://www.austingroupbugs.net/view.php?id=411 for details. | 
 |         int flags = fcntl(fd, F_GETFD, 0); | 
 |         if (flags == -1 || fcntl(fd, F_SETFD, flags & ~FD_CLOEXEC) == -1) _exit(127); | 
 |       } else { | 
 |         if (dup2(fd, new_fd) == -1) _exit(127); | 
 |       } | 
 |     } | 
 |   } | 
 | }; | 
 |  | 
 | struct __posix_spawn_file_actions { | 
 |   __posix_spawn_file_action* head; | 
 |   __posix_spawn_file_action* last; | 
 |  | 
 |   void Do() { | 
 |     for (__posix_spawn_file_action* action = head; action != nullptr; action = action->next) { | 
 |       action->Do(); | 
 |     } | 
 |   } | 
 | }; | 
 |  | 
 | struct __posix_spawnattr { | 
 |   short flags; | 
 |   pid_t pgroup; | 
 |   sched_param schedparam; | 
 |   int schedpolicy; | 
 |   union { | 
 |     sigset_t sigset; | 
 |     sigset64_t sigset64; | 
 |   } sigmask, sigdefault; | 
 | }; | 
 |  | 
 | static void ApplyAttrs(short flags, const posix_spawnattr_t* attr) { | 
 |   // POSIX: "If POSIX_SPAWN_SETSIGDEF is set ... signals in sigdefault ... | 
 |   // shall be set to their default actions in the child process." | 
 |   // POSIX: "Signals set to be caught by the calling process shall be | 
 |   // set to the default action in the child process." | 
 |   bool use_sigdefault = ((flags & POSIX_SPAWN_SETSIGDEF) != 0); | 
 |   const struct sigaction64 default_sa = { .sa_handler = SIG_DFL }; | 
 |   for (int s = 1; s < _NSIG; ++s) { | 
 |     bool reset = false; | 
 |     if (use_sigdefault && sigismember64(&(*attr)->sigdefault.sigset64, s)) { | 
 |       reset = true; | 
 |     } else { | 
 |       struct sigaction64 current; | 
 |       if (sigaction64(s, nullptr, ¤t) == -1) _exit(127); | 
 |       reset = (current.sa_handler != SIG_IGN && current.sa_handler != SIG_DFL); | 
 |     } | 
 |     if (reset && sigaction64(s, &default_sa, nullptr) == -1) _exit(127); | 
 |   } | 
 |  | 
 |   if ((flags & POSIX_SPAWN_SETPGROUP) != 0 && setpgid(0, (*attr)->pgroup) == -1) _exit(127); | 
 |   if ((flags & POSIX_SPAWN_SETSID) != 0 && setsid() == -1) _exit(127); | 
 |  | 
 |   // POSIX_SPAWN_SETSCHEDULER overrides POSIX_SPAWN_SETSCHEDPARAM, but it is not an error | 
 |   // to set both. | 
 |   if ((flags & POSIX_SPAWN_SETSCHEDULER) != 0) { | 
 |     if (sched_setscheduler(0, (*attr)->schedpolicy, &(*attr)->schedparam) == -1) _exit(127); | 
 |   } else if ((flags & POSIX_SPAWN_SETSCHEDPARAM) != 0) { | 
 |     if (sched_setparam(0, &(*attr)->schedparam) == -1) _exit(127); | 
 |   } | 
 |  | 
 |   if ((flags & POSIX_SPAWN_RESETIDS) != 0) { | 
 |     if (seteuid(getuid()) == -1 || setegid(getgid()) == -1) _exit(127); | 
 |   } | 
 |  | 
 |   if ((flags & POSIX_SPAWN_SETSIGMASK) != 0) { | 
 |     if (sigprocmask64(SIG_SETMASK, &(*attr)->sigmask.sigset64, nullptr)) _exit(127); | 
 |   } | 
 |  | 
 |   if ((flags & POSIX_SPAWN_CLOEXEC_DEFAULT) != 0) { | 
 |     if (cloexec_except_stdioe()) _exit(127); | 
 |   } | 
 | } | 
 |  | 
 | static int posix_spawn(pid_t* pid_ptr, | 
 |                        const char* path, | 
 |                        const posix_spawn_file_actions_t* actions, | 
 |                        const posix_spawnattr_t* attr, | 
 |                        char* const argv[], | 
 |                        char* const env[], | 
 |                        int exec_fn(const char* path, char* const argv[], char* const env[])) { | 
 |   // See https://man7.org/linux/man-pages/man3/posix_spawn.3.html | 
 |   // and https://pubs.opengroup.org/onlinepubs/9799919799.2024edition/functions/posix_spawn.html | 
 |  | 
 |   ScopedSignalBlocker ssb; | 
 |  | 
 |   short flags = attr ? (*attr)->flags : 0; | 
 |   bool use_vfork = ((flags & POSIX_SPAWN_USEVFORK) != 0) || (actions == nullptr && flags == 0); | 
 |  | 
 |   pid_t pid = use_vfork ? vfork() : fork(); | 
 |   if (pid == -1) return errno; | 
 |  | 
 |   if (pid == 0) { | 
 |     // Child. | 
 |     ApplyAttrs(flags, attr); | 
 |     if (actions) (*actions)->Do(); | 
 |     if ((flags & POSIX_SPAWN_SETSIGMASK) == 0) ssb.reset(); | 
 |     exec_fn(path, argv, env ? env : environ); | 
 |     _exit(127); | 
 |   } | 
 |  | 
 |   // Parent. | 
 |   if (pid_ptr) *pid_ptr = pid; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawn(pid_t* pid, const char* path, const posix_spawn_file_actions_t* actions, | 
 |                 const posix_spawnattr_t* attr, char* const argv[], char* const env[]) { | 
 |   return posix_spawn(pid, path, actions, attr, argv, env, execve); | 
 | } | 
 |  | 
 | int posix_spawnp(pid_t* pid, const char* file, const posix_spawn_file_actions_t* actions, | 
 |                  const posix_spawnattr_t* attr, char* const argv[], char* const env[]) { | 
 |   return posix_spawn(pid, file, actions, attr, argv, env, execvpe); | 
 | } | 
 |  | 
 | int posix_spawnattr_init(posix_spawnattr_t* attr) { | 
 |   *attr = reinterpret_cast<__posix_spawnattr*>(calloc(1, sizeof(__posix_spawnattr))); | 
 |   return (*attr == nullptr) ? errno : 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_destroy(posix_spawnattr_t* attr) { | 
 |   free(*attr); | 
 |   *attr = nullptr; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_setflags(posix_spawnattr_t* attr, short flags) { | 
 |   if ((flags & ~(POSIX_SPAWN_RESETIDS | POSIX_SPAWN_SETPGROUP | POSIX_SPAWN_SETSIGDEF | | 
 |                  POSIX_SPAWN_SETSIGMASK | POSIX_SPAWN_SETSCHEDPARAM | POSIX_SPAWN_SETSCHEDULER | | 
 |                  POSIX_SPAWN_USEVFORK | POSIX_SPAWN_SETSID | POSIX_SPAWN_CLOEXEC_DEFAULT)) != 0) { | 
 |     return EINVAL; | 
 |   } | 
 |   (*attr)->flags = flags; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_getflags(const posix_spawnattr_t* attr, short* flags) { | 
 |   *flags = (*attr)->flags; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_setpgroup(posix_spawnattr_t* attr, pid_t pgroup) { | 
 |   (*attr)->pgroup = pgroup; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_getpgroup(const posix_spawnattr_t* attr, pid_t* pgroup) { | 
 |   *pgroup = (*attr)->pgroup; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_setsigmask(posix_spawnattr_t* attr, const sigset_t* mask) { | 
 |   (*attr)->sigmask.sigset = *mask; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_setsigmask64(posix_spawnattr_t* attr, const sigset64_t* mask) { | 
 |   (*attr)->sigmask.sigset64 = *mask; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_getsigmask(const posix_spawnattr_t* attr, sigset_t* mask) { | 
 |   *mask = (*attr)->sigmask.sigset; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_getsigmask64(const posix_spawnattr_t* attr, sigset64_t* mask) { | 
 |   *mask = (*attr)->sigmask.sigset64; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_setsigdefault(posix_spawnattr_t* attr, const sigset_t* mask) { | 
 |   (*attr)->sigdefault.sigset = *mask; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_setsigdefault64(posix_spawnattr_t* attr, const sigset64_t* mask) { | 
 |   (*attr)->sigdefault.sigset64 = *mask; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_getsigdefault(const posix_spawnattr_t* attr, sigset_t* mask) { | 
 |   *mask = (*attr)->sigdefault.sigset; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_getsigdefault64(const posix_spawnattr_t* attr, sigset64_t* mask) { | 
 |   *mask = (*attr)->sigdefault.sigset64; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_setschedparam(posix_spawnattr_t* attr, const struct sched_param* param) { | 
 |   (*attr)->schedparam = *param; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_getschedparam(const posix_spawnattr_t* attr, struct sched_param* param) { | 
 |   *param = (*attr)->schedparam; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_setschedpolicy(posix_spawnattr_t* attr, int policy) { | 
 |   (*attr)->schedpolicy = policy; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawnattr_getschedpolicy(const posix_spawnattr_t* attr, int* policy) { | 
 |   *policy = (*attr)->schedpolicy; | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawn_file_actions_init(posix_spawn_file_actions_t* actions) { | 
 |   *actions = reinterpret_cast<__posix_spawn_file_actions*>(calloc(1, sizeof(**actions))); | 
 |   return (*actions == nullptr) ? errno : 0; | 
 | } | 
 |  | 
 | int posix_spawn_file_actions_destroy(posix_spawn_file_actions_t* actions) { | 
 |   __posix_spawn_file_action* a = (*actions)->head; | 
 |   while (a) { | 
 |     __posix_spawn_file_action* last = a; | 
 |     a = a->next; | 
 |     free(last->path); | 
 |     free(last); | 
 |   } | 
 |   free(*actions); | 
 |   *actions = nullptr; | 
 |   return 0; | 
 | } | 
 |  | 
 | static int posix_spawn_add_file_action(posix_spawn_file_actions_t* actions, | 
 |                                        Action what, | 
 |                                        int fd, | 
 |                                        int new_fd, | 
 |                                        const char* path, | 
 |                                        int flags, | 
 |                                        mode_t mode) { | 
 |   __posix_spawn_file_action* action = | 
 |       reinterpret_cast<__posix_spawn_file_action*>(malloc(sizeof(*action))); | 
 |   if (action == nullptr) return errno; | 
 |  | 
 |   action->next = nullptr; | 
 |   if (what == kOpen || what == kChdir) { | 
 |     action->path = strdup(path); | 
 |     if (action->path == nullptr) { | 
 |       free(action); | 
 |       return errno; | 
 |     } | 
 |   } else { | 
 |     action->path = nullptr; | 
 |   } | 
 |   action->what = what; | 
 |   action->fd = fd; | 
 |   action->new_fd = new_fd; | 
 |   action->flags = flags; | 
 |   action->mode = mode; | 
 |  | 
 |   if ((*actions)->head == nullptr) { | 
 |     (*actions)->head = (*actions)->last = action; | 
 |   } else { | 
 |     (*actions)->last->next = action; | 
 |     (*actions)->last = action; | 
 |   } | 
 |  | 
 |   return 0; | 
 | } | 
 |  | 
 | int posix_spawn_file_actions_addopen(posix_spawn_file_actions_t* actions, | 
 |                                      int fd, const char* path, int flags, mode_t mode) { | 
 |   if (fd < 0) return EBADF; | 
 |   return posix_spawn_add_file_action(actions, kOpen, -1, fd, path, flags, mode); | 
 | } | 
 |  | 
 | int posix_spawn_file_actions_addclose(posix_spawn_file_actions_t* actions, int fd) { | 
 |   if (fd < 0) return EBADF; | 
 |   return posix_spawn_add_file_action(actions, kClose, fd, -1, nullptr, 0, 0); | 
 | } | 
 |  | 
 | int posix_spawn_file_actions_adddup2(posix_spawn_file_actions_t* actions, int fd, int new_fd) { | 
 |   if (fd < 0 || new_fd < 0) return EBADF; | 
 |   return posix_spawn_add_file_action(actions, kDup2, fd, new_fd, nullptr, 0, 0); | 
 | } | 
 |  | 
 | int posix_spawn_file_actions_addchdir_np(posix_spawn_file_actions_t* actions, const char* path) { | 
 |   return posix_spawn_add_file_action(actions, kChdir, -1, -1, path, 0, 0); | 
 | } | 
 |  | 
 | int posix_spawn_file_actions_addfchdir_np(posix_spawn_file_actions_t* actions, int fd) { | 
 |   if (fd < 0) return EBADF; | 
 |   return posix_spawn_add_file_action(actions, kFchdir, fd, -1, nullptr, 0, 0); | 
 | } |