blob: 9473f10ce800034e1ceb9f12d700569754fbbad3 [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2012 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
adlr@google.com3defe6a2009-12-04 20:57:17 +000016
Alex Deymo39910dc2015-11-09 17:04:30 -080017#include "update_engine/common/subprocess.h"
Darin Petkova0b9e772011-10-06 05:05:56 -070018
Alex Deymo29b81532015-07-09 11:51:49 -070019#include <fcntl.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000020#include <stdlib.h>
21#include <string.h>
Kenneth Watersa7fcafa2010-09-21 10:27:03 -070022#include <unistd.h>
Darin Petkova0b9e772011-10-06 05:05:56 -070023
Ben Chan02f7c1d2014-10-18 15:18:02 -070024#include <memory>
Darin Petkova0b9e772011-10-06 05:05:56 -070025#include <string>
adlr@google.com3defe6a2009-12-04 20:57:17 +000026#include <vector>
Darin Petkova0b9e772011-10-06 05:05:56 -070027
Alex Deymo29b81532015-07-09 11:51:49 -070028#include <base/bind.h>
Darin Petkova0b9e772011-10-06 05:05:56 -070029#include <base/logging.h>
Alex Deymo29b81532015-07-09 11:51:49 -070030#include <base/posix/eintr_wrapper.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070031#include <base/strings/string_util.h>
32#include <base/strings/stringprintf.h>
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070033#include <brillo/process.h>
34#include <brillo/secure_blob.h>
Alex Deymo20e39602016-04-04 19:09:22 -070035#ifdef __ANDROID__
36#include <selinux/selinux.h>
37#endif // __ANDROID__
adlr@google.com3defe6a2009-12-04 20:57:17 +000038
Alex Deymo0d298542016-03-30 18:31:49 -070039#include "update_engine/common/utils.h"
40
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070041using brillo::MessageLoop;
adlr@google.com3defe6a2009-12-04 20:57:17 +000042using std::string;
Ben Chan02f7c1d2014-10-18 15:18:02 -070043using std::unique_ptr;
adlr@google.com3defe6a2009-12-04 20:57:17 +000044using std::vector;
45
46namespace chromeos_update_engine {
47
Alex Deymo461b2592015-07-24 20:10:52 -070048namespace {
Darin Petkov6f03a3b2010-11-10 14:27:14 -080049
Alex Deymo20e39602016-04-04 19:09:22 -070050bool SetupChild(const std::map<string, string>& env,
51 uint32_t flags,
52 const char* se_domain) {
Alex Deymo461b2592015-07-24 20:10:52 -070053 // Setup the environment variables.
54 clearenv();
55 for (const auto& key_value : env) {
56 setenv(key_value.first.c_str(), key_value.second.c_str(), 0);
57 }
Darin Petkov6f03a3b2010-11-10 14:27:14 -080058
Alex Deymo461b2592015-07-24 20:10:52 -070059 if ((flags & Subprocess::kRedirectStderrToStdout) != 0) {
60 if (HANDLE_EINTR(dup2(STDOUT_FILENO, STDERR_FILENO)) != STDERR_FILENO)
61 return false;
Alex Deymo29b81532015-07-09 11:51:49 -070062 }
Andrew de los Reyesc1d5c932011-04-20 17:15:47 -070063
Alex Deymo461b2592015-07-24 20:10:52 -070064 int fd = HANDLE_EINTR(open("/dev/null", O_RDONLY));
65 if (fd < 0)
66 return false;
67 if (HANDLE_EINTR(dup2(fd, STDIN_FILENO)) != STDIN_FILENO)
68 return false;
69 IGNORE_EINTR(close(fd));
70
Alex Deymo20e39602016-04-04 19:09:22 -070071#ifdef __ANDROID__
72 // setexeccon(3) accepts a nullptr to indicate the default context policy.
73 if (setexeccon(se_domain) < 0) {
74 PLOG(ERROR) << "Error setting the SELinux domain to "
75 << (se_domain ? se_domain : "<nullptr>");
76 return false;
77 }
78#endif // __ANDROID__
79
Alex Deymo461b2592015-07-24 20:10:52 -070080 return true;
adlr@google.com3defe6a2009-12-04 20:57:17 +000081}
82
Alex Deymo461b2592015-07-24 20:10:52 -070083// Helper function to launch a process with the given Subprocess::Flags.
84// This function only sets up and starts the process according to the |flags|.
85// The caller is responsible for watching the termination of the subprocess.
86// Return whether the process was successfully launched and fills in the |proc|
87// Process.
88bool LaunchProcess(const vector<string>& cmd,
89 uint32_t flags,
Alex Deymoe384bb22016-03-29 17:23:33 -070090 const vector<int>& output_pipes,
Alex Deymo20e39602016-04-04 19:09:22 -070091 const char* se_domain,
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070092 brillo::Process* proc) {
Alex Deymo461b2592015-07-24 20:10:52 -070093 for (const string& arg : cmd)
94 proc->AddArg(arg);
95 proc->SetSearchPath((flags & Subprocess::kSearchPath) != 0);
96
97 // Create an environment for the child process with just the required PATHs.
98 std::map<string, string> env;
99 for (const char* key : {"LD_LIBRARY_PATH", "PATH"}) {
100 const char* value = getenv(key);
101 if (value)
102 env.emplace(key, value);
103 }
104
Alex Deymoe384bb22016-03-29 17:23:33 -0700105 for (const int fd : output_pipes) {
106 proc->RedirectUsingPipe(fd, false);
107 }
108 proc->SetCloseUnusedFileDescriptors(true);
Alex Deymo461b2592015-07-24 20:10:52 -0700109 proc->RedirectUsingPipe(STDOUT_FILENO, false);
Alex Deymo20e39602016-04-04 19:09:22 -0700110 proc->SetPreExecCallback(base::Bind(&SetupChild, env, flags, se_domain));
Alex Deymo461b2592015-07-24 20:10:52 -0700111
112 return proc->Start();
113}
114
115} // namespace
116
Alex Deymob7ca0962014-10-01 17:58:07 -0700117void Subprocess::Init(
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700118 brillo::AsynchronousSignalHandlerInterface* async_signal_handler) {
Alex Deymo461b2592015-07-24 20:10:52 -0700119 if (subprocess_singleton_ == this)
120 return;
121 CHECK(subprocess_singleton_ == nullptr);
122 subprocess_singleton_ = this;
123
Alex Deymob7ca0962014-10-01 17:58:07 -0700124 process_reaper_.Register(async_signal_handler);
Alex Deymo461b2592015-07-24 20:10:52 -0700125}
126
127Subprocess::~Subprocess() {
128 if (subprocess_singleton_ == this)
129 subprocess_singleton_ = nullptr;
Kenneth Watersa7fcafa2010-09-21 10:27:03 -0700130}
131
Alex Deymo29b81532015-07-09 11:51:49 -0700132void Subprocess::OnStdoutReady(SubprocessRecord* record) {
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800133 char buf[1024];
Alex Deymo0d298542016-03-30 18:31:49 -0700134 size_t bytes_read;
Alex Deymo29b81532015-07-09 11:51:49 -0700135 do {
Alex Deymo0d298542016-03-30 18:31:49 -0700136 bytes_read = 0;
137 bool eof;
138 bool ok = utils::ReadAll(
139 record->stdout_fd, buf, arraysize(buf), &bytes_read, &eof);
140 record->stdout.append(buf, bytes_read);
141 if (!ok || eof) {
142 // There was either an error or an EOF condition, so we are done watching
143 // the file descriptor.
Alex Deymo461b2592015-07-24 20:10:52 -0700144 MessageLoop::current()->CancelTask(record->stdout_task_id);
145 record->stdout_task_id = MessageLoop::kTaskIdNull;
Alex Deymo0d298542016-03-30 18:31:49 -0700146 return;
Alex Deymo29b81532015-07-09 11:51:49 -0700147 }
Alex Deymo0d298542016-03-30 18:31:49 -0700148 } while (bytes_read);
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800149}
150
Alex Deymo461b2592015-07-24 20:10:52 -0700151void Subprocess::ChildExitedCallback(const siginfo_t& info) {
152 auto pid_record = subprocess_records_.find(info.si_pid);
153 if (pid_record == subprocess_records_.end())
154 return;
155 SubprocessRecord* record = pid_record->second.get();
156
157 // Make sure we read any remaining process output and then close the pipe.
158 OnStdoutReady(record);
159
160 MessageLoop::current()->CancelTask(record->stdout_task_id);
161 record->stdout_task_id = MessageLoop::kTaskIdNull;
162
Alex Deymo461b2592015-07-24 20:10:52 -0700163 // Don't print any log if the subprocess exited with exit code 0.
164 if (info.si_code != CLD_EXITED) {
165 LOG(INFO) << "Subprocess terminated with si_code " << info.si_code;
166 } else if (info.si_status != 0) {
167 LOG(INFO) << "Subprocess exited with si_status: " << info.si_status;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000168 }
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700169
Alex Deymo461b2592015-07-24 20:10:52 -0700170 if (!record->stdout.empty()) {
171 LOG(INFO) << "Subprocess output:\n" << record->stdout;
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700172 }
Alex Deymo461b2592015-07-24 20:10:52 -0700173 if (!record->callback.is_null()) {
174 record->callback.Run(info.si_status, record->stdout);
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700175 }
Alex Deymoe384bb22016-03-29 17:23:33 -0700176 // Release and close all the pipes after calling the callback so our
177 // redirected pipes are still alive. Releasing the process first makes
178 // Reset(0) not attempt to kill the process, which is already a zombie at this
179 // point.
180 record->proc.Release();
181 record->proc.Reset(0);
182
Alex Deymo461b2592015-07-24 20:10:52 -0700183 subprocess_records_.erase(pid_record);
Alex Deymo29b81532015-07-09 11:51:49 -0700184}
185
Alex Deymo461b2592015-07-24 20:10:52 -0700186pid_t Subprocess::Exec(const vector<string>& cmd,
187 const ExecCallback& callback) {
Alex Deymo20e39602016-04-04 19:09:22 -0700188 return ExecFlags(cmd, kRedirectStderrToStdout, {}, nullptr, callback);
Alex Deymo461b2592015-07-24 20:10:52 -0700189}
Andrew de los Reyes08c4e272010-04-15 14:02:17 -0700190
Alex Deymo461b2592015-07-24 20:10:52 -0700191pid_t Subprocess::ExecFlags(const vector<string>& cmd,
192 uint32_t flags,
Alex Deymoe384bb22016-03-29 17:23:33 -0700193 const vector<int>& output_pipes,
Alex Deymo20e39602016-04-04 19:09:22 -0700194 const char* se_domain,
Alex Deymo461b2592015-07-24 20:10:52 -0700195 const ExecCallback& callback) {
196 unique_ptr<SubprocessRecord> record(new SubprocessRecord(callback));
197
Alex Deymo20e39602016-04-04 19:09:22 -0700198 if (!LaunchProcess(cmd, flags, output_pipes, se_domain, &record->proc)) {
Alex Deymo461b2592015-07-24 20:10:52 -0700199 LOG(ERROR) << "Failed to launch subprocess";
Chris Masonec6c57a52010-09-23 13:06:14 -0700200 return 0;
201 }
adlr@google.com3defe6a2009-12-04 20:57:17 +0000202
Alex Deymo461b2592015-07-24 20:10:52 -0700203 pid_t pid = record->proc.pid();
204 CHECK(process_reaper_.WatchForChild(FROM_HERE, pid, base::Bind(
205 &Subprocess::ChildExitedCallback,
206 base::Unretained(this))));
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800207
Alex Deymo461b2592015-07-24 20:10:52 -0700208 record->stdout_fd = record->proc.GetPipe(STDOUT_FILENO);
Alex Deymo29b81532015-07-09 11:51:49 -0700209 // Capture the subprocess output. Make our end of the pipe non-blocking.
Alex Deymo461b2592015-07-24 20:10:52 -0700210 int fd_flags = fcntl(record->stdout_fd, F_GETFL, 0) | O_NONBLOCK;
Alex Deymo29b81532015-07-09 11:51:49 -0700211 if (HANDLE_EINTR(fcntl(record->stdout_fd, F_SETFL, fd_flags)) < 0) {
212 LOG(ERROR) << "Unable to set non-blocking I/O mode on fd "
213 << record->stdout_fd << ".";
214 }
215
Alex Deymo461b2592015-07-24 20:10:52 -0700216 record->stdout_task_id = MessageLoop::current()->WatchFileDescriptor(
Alex Deymo29b81532015-07-09 11:51:49 -0700217 FROM_HERE,
218 record->stdout_fd,
219 MessageLoop::WatchMode::kWatchRead,
220 true,
221 base::Bind(&Subprocess::OnStdoutReady, record.get()));
222
Alex Deymo461b2592015-07-24 20:10:52 -0700223 subprocess_records_[pid].reset(record.release());
224 return pid;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000225}
226
Alex Deymo461b2592015-07-24 20:10:52 -0700227void Subprocess::KillExec(pid_t pid) {
228 auto pid_record = subprocess_records_.find(pid);
229 if (pid_record == subprocess_records_.end())
Alex Deymo29b81532015-07-09 11:51:49 -0700230 return;
Alex Deymo461b2592015-07-24 20:10:52 -0700231 pid_record->second->callback.Reset();
Alex Deymod15c5462016-03-09 18:11:12 -0800232 if (kill(pid, SIGTERM) != 0) {
233 PLOG(WARNING) << "Error sending SIGTERM to " << pid;
234 }
235 // Release the pid now so we don't try to kill it if Subprocess is destroyed
236 // before the corresponding ChildExitedCallback() is called.
237 pid_record->second->proc.Release();
adlr@google.com3defe6a2009-12-04 20:57:17 +0000238}
239
Alex Deymoe384bb22016-03-29 17:23:33 -0700240int Subprocess::GetPipeFd(pid_t pid, int fd) const {
241 auto pid_record = subprocess_records_.find(pid);
242 if (pid_record == subprocess_records_.end())
243 return -1;
244 return pid_record->second->proc.GetPipe(fd);
245}
246
Alex Deymof329b932014-10-30 01:37:48 -0700247bool Subprocess::SynchronousExec(const vector<string>& cmd,
Darin Petkov85d02b72011-05-17 13:25:51 -0700248 int* return_code,
Alex Deymof329b932014-10-30 01:37:48 -0700249 string* stdout) {
Alex Deymo461b2592015-07-24 20:10:52 -0700250 // The default for SynchronousExec is to use kSearchPath since the code relies
251 // on that.
252 return SynchronousExecFlags(
253 cmd,
254 kRedirectStderrToStdout | kSearchPath,
255 return_code,
256 stdout);
257}
258
259bool Subprocess::SynchronousExecFlags(const vector<string>& cmd,
260 uint32_t flags,
261 int* return_code,
262 string* stdout) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700263 brillo::ProcessImpl proc;
Alex Deymoe384bb22016-03-29 17:23:33 -0700264 // It doesn't make sense to redirect some pipes in the synchronous case
265 // because we won't be reading on our end, so we don't expose the output_pipes
266 // in this case.
Alex Deymo20e39602016-04-04 19:09:22 -0700267 if (!LaunchProcess(cmd, flags, {}, nullptr, &proc)) {
Alex Deymo461b2592015-07-24 20:10:52 -0700268 LOG(ERROR) << "Failed to launch subprocess";
269 return false;
270 }
271
272 if (stdout) {
273 stdout->clear();
274 }
275
276 int fd = proc.GetPipe(STDOUT_FILENO);
277 vector<char> buffer(32 * 1024);
278 while (true) {
279 int rc = HANDLE_EINTR(read(fd, buffer.data(), buffer.size()));
280 if (rc < 0) {
281 PLOG(ERROR) << "Reading from child's output";
282 break;
283 } else if (rc == 0) {
284 break;
285 } else {
286 if (stdout)
287 stdout->append(buffer.data(), rc);
288 }
289 }
290 // At this point, the subprocess already closed the output, so we only need to
291 // wait for it to finish.
292 int proc_return_code = proc.Wait();
293 if (return_code)
294 *return_code = proc_return_code;
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700295 return proc_return_code != brillo::Process::kErrorExitStatus;
Darin Petkov85d02b72011-05-17 13:25:51 -0700296}
297
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800298bool Subprocess::SubprocessInFlight() {
Alex Deymo461b2592015-07-24 20:10:52 -0700299 for (const auto& pid_record : subprocess_records_) {
300 if (!pid_record.second->callback.is_null())
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800301 return true;
302 }
303 return false;
304}
305
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700306Subprocess* Subprocess::subprocess_singleton_ = nullptr;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000307
308} // namespace chromeos_update_engine