blob: 45dff9238fff9577dbc0bbcea1b236344e4a8a32 [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2012 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
adlr@google.com3defe6a2009-12-04 20:57:17 +000016
Alex Deymo39910dc2015-11-09 17:04:30 -080017#include "update_engine/common/subprocess.h"
Darin Petkova0b9e772011-10-06 05:05:56 -070018
Alex Deymo29b81532015-07-09 11:51:49 -070019#include <fcntl.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000020#include <stdlib.h>
21#include <string.h>
Kenneth Watersa7fcafa2010-09-21 10:27:03 -070022#include <unistd.h>
Darin Petkova0b9e772011-10-06 05:05:56 -070023
Ben Chan02f7c1d2014-10-18 15:18:02 -070024#include <memory>
Darin Petkova0b9e772011-10-06 05:05:56 -070025#include <string>
Amin Hassania8859542018-03-07 16:24:43 -080026#include <utility>
adlr@google.com3defe6a2009-12-04 20:57:17 +000027#include <vector>
Darin Petkova0b9e772011-10-06 05:05:56 -070028
Alex Deymo29b81532015-07-09 11:51:49 -070029#include <base/bind.h>
Darin Petkova0b9e772011-10-06 05:05:56 -070030#include <base/logging.h>
Alex Deymo29b81532015-07-09 11:51:49 -070031#include <base/posix/eintr_wrapper.h>
hscham00b6aa22020-02-20 12:32:06 +090032#include <base/stl_util.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070033#include <base/strings/string_util.h>
34#include <base/strings/stringprintf.h>
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070035#include <brillo/process.h>
36#include <brillo/secure_blob.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000037
Alex Deymo0d298542016-03-30 18:31:49 -070038#include "update_engine/common/utils.h"
39
adlr@google.com3defe6a2009-12-04 20:57:17 +000040using std::string;
Ben Chan02f7c1d2014-10-18 15:18:02 -070041using std::unique_ptr;
adlr@google.com3defe6a2009-12-04 20:57:17 +000042using std::vector;
43
44namespace chromeos_update_engine {
45
Alex Deymo461b2592015-07-24 20:10:52 -070046namespace {
Darin Petkov6f03a3b2010-11-10 14:27:14 -080047
Alex Deymo109c28d2016-04-05 23:00:52 +000048bool SetupChild(const std::map<string, string>& env, uint32_t flags) {
Alex Deymo461b2592015-07-24 20:10:52 -070049 // Setup the environment variables.
50 clearenv();
51 for (const auto& key_value : env) {
52 setenv(key_value.first.c_str(), key_value.second.c_str(), 0);
53 }
Darin Petkov6f03a3b2010-11-10 14:27:14 -080054
Alex Deymo461b2592015-07-24 20:10:52 -070055 if ((flags & Subprocess::kRedirectStderrToStdout) != 0) {
56 if (HANDLE_EINTR(dup2(STDOUT_FILENO, STDERR_FILENO)) != STDERR_FILENO)
57 return false;
Alex Deymo29b81532015-07-09 11:51:49 -070058 }
Andrew de los Reyesc1d5c932011-04-20 17:15:47 -070059
Alex Deymo461b2592015-07-24 20:10:52 -070060 int fd = HANDLE_EINTR(open("/dev/null", O_RDONLY));
61 if (fd < 0)
62 return false;
63 if (HANDLE_EINTR(dup2(fd, STDIN_FILENO)) != STDIN_FILENO)
64 return false;
65 IGNORE_EINTR(close(fd));
66
67 return true;
adlr@google.com3defe6a2009-12-04 20:57:17 +000068}
69
Alex Deymo461b2592015-07-24 20:10:52 -070070// Helper function to launch a process with the given Subprocess::Flags.
71// This function only sets up and starts the process according to the |flags|.
72// The caller is responsible for watching the termination of the subprocess.
73// Return whether the process was successfully launched and fills in the |proc|
74// Process.
75bool LaunchProcess(const vector<string>& cmd,
76 uint32_t flags,
Alex Deymoe384bb22016-03-29 17:23:33 -070077 const vector<int>& output_pipes,
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070078 brillo::Process* proc) {
Alex Deymo461b2592015-07-24 20:10:52 -070079 for (const string& arg : cmd)
80 proc->AddArg(arg);
81 proc->SetSearchPath((flags & Subprocess::kSearchPath) != 0);
82
83 // Create an environment for the child process with just the required PATHs.
84 std::map<string, string> env;
85 for (const char* key : {"LD_LIBRARY_PATH", "PATH"}) {
86 const char* value = getenv(key);
87 if (value)
88 env.emplace(key, value);
89 }
90
Alex Deymoe384bb22016-03-29 17:23:33 -070091 for (const int fd : output_pipes) {
92 proc->RedirectUsingPipe(fd, false);
93 }
94 proc->SetCloseUnusedFileDescriptors(true);
Alex Deymo461b2592015-07-24 20:10:52 -070095 proc->RedirectUsingPipe(STDOUT_FILENO, false);
Alex Deymo109c28d2016-04-05 23:00:52 +000096 proc->SetPreExecCallback(base::Bind(&SetupChild, env, flags));
Alex Deymo461b2592015-07-24 20:10:52 -070097
Amin Hassani3a4caa12019-11-06 11:12:28 -080098 LOG(INFO) << "Running \"" << base::JoinString(cmd, " ") << "\"";
Alex Deymo461b2592015-07-24 20:10:52 -070099 return proc->Start();
100}
101
102} // namespace
103
Alex Deymob7ca0962014-10-01 17:58:07 -0700104void Subprocess::Init(
Amin Hassanib2689592019-01-13 17:04:28 -0800105 brillo::AsynchronousSignalHandlerInterface* async_signal_handler) {
Alex Deymo461b2592015-07-24 20:10:52 -0700106 if (subprocess_singleton_ == this)
107 return;
108 CHECK(subprocess_singleton_ == nullptr);
109 subprocess_singleton_ = this;
110
Alex Deymob7ca0962014-10-01 17:58:07 -0700111 process_reaper_.Register(async_signal_handler);
Alex Deymo461b2592015-07-24 20:10:52 -0700112}
113
114Subprocess::~Subprocess() {
115 if (subprocess_singleton_ == this)
116 subprocess_singleton_ = nullptr;
Kenneth Watersa7fcafa2010-09-21 10:27:03 -0700117}
118
Alex Deymo29b81532015-07-09 11:51:49 -0700119void Subprocess::OnStdoutReady(SubprocessRecord* record) {
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800120 char buf[1024];
Alex Deymo0d298542016-03-30 18:31:49 -0700121 size_t bytes_read;
Alex Deymo29b81532015-07-09 11:51:49 -0700122 do {
Alex Deymo0d298542016-03-30 18:31:49 -0700123 bytes_read = 0;
124 bool eof;
125 bool ok = utils::ReadAll(
hscham00b6aa22020-02-20 12:32:06 +0900126 record->stdout_fd, buf, base::size(buf), &bytes_read, &eof);
Alex Deymo0d298542016-03-30 18:31:49 -0700127 record->stdout.append(buf, bytes_read);
128 if (!ok || eof) {
129 // There was either an error or an EOF condition, so we are done watching
130 // the file descriptor.
Hidehiko Abe493fecb2019-07-10 23:30:50 +0900131 record->stdout_controller.reset();
Alex Deymo0d298542016-03-30 18:31:49 -0700132 return;
Alex Deymo29b81532015-07-09 11:51:49 -0700133 }
Alex Deymo0d298542016-03-30 18:31:49 -0700134 } while (bytes_read);
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800135}
136
Alex Deymo461b2592015-07-24 20:10:52 -0700137void Subprocess::ChildExitedCallback(const siginfo_t& info) {
138 auto pid_record = subprocess_records_.find(info.si_pid);
139 if (pid_record == subprocess_records_.end())
140 return;
141 SubprocessRecord* record = pid_record->second.get();
142
143 // Make sure we read any remaining process output and then close the pipe.
144 OnStdoutReady(record);
145
Hidehiko Abe493fecb2019-07-10 23:30:50 +0900146 record->stdout_controller.reset();
Alex Deymo461b2592015-07-24 20:10:52 -0700147
Alex Deymo461b2592015-07-24 20:10:52 -0700148 // Don't print any log if the subprocess exited with exit code 0.
149 if (info.si_code != CLD_EXITED) {
150 LOG(INFO) << "Subprocess terminated with si_code " << info.si_code;
151 } else if (info.si_status != 0) {
152 LOG(INFO) << "Subprocess exited with si_status: " << info.si_status;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000153 }
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700154
Alex Deymo461b2592015-07-24 20:10:52 -0700155 if (!record->stdout.empty()) {
156 LOG(INFO) << "Subprocess output:\n" << record->stdout;
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700157 }
Alex Deymo461b2592015-07-24 20:10:52 -0700158 if (!record->callback.is_null()) {
159 record->callback.Run(info.si_status, record->stdout);
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700160 }
Alex Deymoe384bb22016-03-29 17:23:33 -0700161 // Release and close all the pipes after calling the callback so our
162 // redirected pipes are still alive. Releasing the process first makes
163 // Reset(0) not attempt to kill the process, which is already a zombie at this
164 // point.
165 record->proc.Release();
166 record->proc.Reset(0);
167
Alex Deymo461b2592015-07-24 20:10:52 -0700168 subprocess_records_.erase(pid_record);
Alex Deymo29b81532015-07-09 11:51:49 -0700169}
170
Alex Deymo461b2592015-07-24 20:10:52 -0700171pid_t Subprocess::Exec(const vector<string>& cmd,
172 const ExecCallback& callback) {
Alex Deymo109c28d2016-04-05 23:00:52 +0000173 return ExecFlags(cmd, kRedirectStderrToStdout, {}, callback);
Alex Deymo461b2592015-07-24 20:10:52 -0700174}
Andrew de los Reyes08c4e272010-04-15 14:02:17 -0700175
Alex Deymo461b2592015-07-24 20:10:52 -0700176pid_t Subprocess::ExecFlags(const vector<string>& cmd,
177 uint32_t flags,
Alex Deymoe384bb22016-03-29 17:23:33 -0700178 const vector<int>& output_pipes,
Alex Deymo461b2592015-07-24 20:10:52 -0700179 const ExecCallback& callback) {
180 unique_ptr<SubprocessRecord> record(new SubprocessRecord(callback));
181
Alex Deymo109c28d2016-04-05 23:00:52 +0000182 if (!LaunchProcess(cmd, flags, output_pipes, &record->proc)) {
Alex Deymo461b2592015-07-24 20:10:52 -0700183 LOG(ERROR) << "Failed to launch subprocess";
Chris Masonec6c57a52010-09-23 13:06:14 -0700184 return 0;
185 }
adlr@google.com3defe6a2009-12-04 20:57:17 +0000186
Alex Deymo461b2592015-07-24 20:10:52 -0700187 pid_t pid = record->proc.pid();
Amin Hassanib2689592019-01-13 17:04:28 -0800188 CHECK(process_reaper_.WatchForChild(
189 FROM_HERE,
190 pid,
191 base::Bind(&Subprocess::ChildExitedCallback, base::Unretained(this))));
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800192
Alex Deymo461b2592015-07-24 20:10:52 -0700193 record->stdout_fd = record->proc.GetPipe(STDOUT_FILENO);
Alex Deymo29b81532015-07-09 11:51:49 -0700194 // Capture the subprocess output. Make our end of the pipe non-blocking.
Alex Deymo461b2592015-07-24 20:10:52 -0700195 int fd_flags = fcntl(record->stdout_fd, F_GETFL, 0) | O_NONBLOCK;
Alex Deymo29b81532015-07-09 11:51:49 -0700196 if (HANDLE_EINTR(fcntl(record->stdout_fd, F_SETFL, fd_flags)) < 0) {
197 LOG(ERROR) << "Unable to set non-blocking I/O mode on fd "
198 << record->stdout_fd << ".";
199 }
200
Hidehiko Abe493fecb2019-07-10 23:30:50 +0900201 record->stdout_controller = base::FileDescriptorWatcher::WatchReadable(
Alex Deymo29b81532015-07-09 11:51:49 -0700202 record->stdout_fd,
Hidehiko Abe493fecb2019-07-10 23:30:50 +0900203 base::BindRepeating(&Subprocess::OnStdoutReady, record.get()));
Alex Deymo29b81532015-07-09 11:51:49 -0700204
Alex Vakulenkoce8c8ee2016-04-08 08:59:26 -0700205 subprocess_records_[pid] = std::move(record);
Alex Deymo461b2592015-07-24 20:10:52 -0700206 return pid;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000207}
208
Alex Deymo461b2592015-07-24 20:10:52 -0700209void Subprocess::KillExec(pid_t pid) {
210 auto pid_record = subprocess_records_.find(pid);
211 if (pid_record == subprocess_records_.end())
Alex Deymo29b81532015-07-09 11:51:49 -0700212 return;
Alex Deymo461b2592015-07-24 20:10:52 -0700213 pid_record->second->callback.Reset();
Sen Jiang1d3b8632016-05-13 12:32:10 -0700214 // We don't care about output/return code, so we use SIGKILL here to ensure it
215 // will be killed, SIGTERM might lead to leaked subprocess.
216 if (kill(pid, SIGKILL) != 0) {
217 PLOG(WARNING) << "Error sending SIGKILL to " << pid;
Alex Deymod15c5462016-03-09 18:11:12 -0800218 }
219 // Release the pid now so we don't try to kill it if Subprocess is destroyed
220 // before the corresponding ChildExitedCallback() is called.
221 pid_record->second->proc.Release();
adlr@google.com3defe6a2009-12-04 20:57:17 +0000222}
223
Alex Deymoe384bb22016-03-29 17:23:33 -0700224int Subprocess::GetPipeFd(pid_t pid, int fd) const {
225 auto pid_record = subprocess_records_.find(pid);
226 if (pid_record == subprocess_records_.end())
227 return -1;
228 return pid_record->second->proc.GetPipe(fd);
229}
230
Alex Deymof329b932014-10-30 01:37:48 -0700231bool Subprocess::SynchronousExec(const vector<string>& cmd,
Darin Petkov85d02b72011-05-17 13:25:51 -0700232 int* return_code,
Amin Hassani3a4caa12019-11-06 11:12:28 -0800233 string* stdout,
234 string* stderr) {
235 // The default for |SynchronousExec| is to use |kSearchPath| since the code
236 // relies on that.
237 return SynchronousExecFlags(cmd, kSearchPath, return_code, stdout, stderr);
Alex Deymo461b2592015-07-24 20:10:52 -0700238}
239
240bool Subprocess::SynchronousExecFlags(const vector<string>& cmd,
241 uint32_t flags,
242 int* return_code,
Amin Hassani3a4caa12019-11-06 11:12:28 -0800243 string* stdout,
244 string* stderr) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700245 brillo::ProcessImpl proc;
Amin Hassani3a4caa12019-11-06 11:12:28 -0800246 if (!LaunchProcess(cmd, flags, {STDERR_FILENO}, &proc)) {
Alex Deymo461b2592015-07-24 20:10:52 -0700247 LOG(ERROR) << "Failed to launch subprocess";
248 return false;
249 }
250
251 if (stdout) {
252 stdout->clear();
253 }
Amin Hassani3a4caa12019-11-06 11:12:28 -0800254 if (stderr) {
255 stderr->clear();
256 }
Alex Deymo461b2592015-07-24 20:10:52 -0700257
Amin Hassani3a4caa12019-11-06 11:12:28 -0800258 // Read from both stdout and stderr individually.
259 int stdout_fd = proc.GetPipe(STDOUT_FILENO);
260 int stderr_fd = proc.GetPipe(STDERR_FILENO);
Alex Deymo461b2592015-07-24 20:10:52 -0700261 vector<char> buffer(32 * 1024);
Amin Hassani3a4caa12019-11-06 11:12:28 -0800262 bool stdout_closed = false, stderr_closed = false;
263 while (!stdout_closed || !stderr_closed) {
264 if (!stdout_closed) {
265 int rc = HANDLE_EINTR(read(stdout_fd, buffer.data(), buffer.size()));
266 if (rc <= 0) {
267 stdout_closed = true;
268 if (rc < 0)
269 PLOG(ERROR) << "Reading from child's stdout";
270 } else if (stdout != nullptr) {
Alex Deymo461b2592015-07-24 20:10:52 -0700271 stdout->append(buffer.data(), rc);
Amin Hassani3a4caa12019-11-06 11:12:28 -0800272 }
273 }
274
275 if (!stderr_closed) {
276 int rc = HANDLE_EINTR(read(stderr_fd, buffer.data(), buffer.size()));
277 if (rc <= 0) {
278 stderr_closed = true;
279 if (rc < 0)
280 PLOG(ERROR) << "Reading from child's stderr";
281 } else if (stderr != nullptr) {
282 stderr->append(buffer.data(), rc);
283 }
Alex Deymo461b2592015-07-24 20:10:52 -0700284 }
285 }
Amin Hassani3a4caa12019-11-06 11:12:28 -0800286
Alex Deymo461b2592015-07-24 20:10:52 -0700287 // At this point, the subprocess already closed the output, so we only need to
288 // wait for it to finish.
289 int proc_return_code = proc.Wait();
290 if (return_code)
291 *return_code = proc_return_code;
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700292 return proc_return_code != brillo::Process::kErrorExitStatus;
Darin Petkov85d02b72011-05-17 13:25:51 -0700293}
294
Amin Hassania8859542018-03-07 16:24:43 -0800295void Subprocess::FlushBufferedLogsAtExit() {
296 if (!subprocess_records_.empty()) {
297 LOG(INFO) << "We are exiting, but there are still in flight subprocesses!";
298 for (auto& pid_record : subprocess_records_) {
299 SubprocessRecord* record = pid_record.second.get();
300 // Make sure we read any remaining process output.
301 OnStdoutReady(record);
302 if (!record->stdout.empty()) {
303 LOG(INFO) << "Subprocess(" << pid_record.first << ") output:\n"
304 << record->stdout;
305 }
306 }
307 }
308}
309
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700310Subprocess* Subprocess::subprocess_singleton_ = nullptr;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000311
312} // namespace chromeos_update_engine