blob: dfc1c5c4945688f68f9ba1e2864822ad7d5a6765 [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2012 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
adlr@google.com3defe6a2009-12-04 20:57:17 +000016
Alex Deymo39910dc2015-11-09 17:04:30 -080017#include "update_engine/common/subprocess.h"
Darin Petkova0b9e772011-10-06 05:05:56 -070018
Alex Deymo29b81532015-07-09 11:51:49 -070019#include <fcntl.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000020#include <stdlib.h>
21#include <string.h>
Kenneth Watersa7fcafa2010-09-21 10:27:03 -070022#include <unistd.h>
Darin Petkova0b9e772011-10-06 05:05:56 -070023
Kelvin Zhang866d4702023-10-24 12:37:35 -070024#include <chrono>
Ben Chan02f7c1d2014-10-18 15:18:02 -070025#include <memory>
Darin Petkova0b9e772011-10-06 05:05:56 -070026#include <string>
Amin Hassania8859542018-03-07 16:24:43 -080027#include <utility>
adlr@google.com3defe6a2009-12-04 20:57:17 +000028#include <vector>
Darin Petkova0b9e772011-10-06 05:05:56 -070029
Alex Deymo29b81532015-07-09 11:51:49 -070030#include <base/bind.h>
Darin Petkova0b9e772011-10-06 05:05:56 -070031#include <base/logging.h>
Alex Deymo29b81532015-07-09 11:51:49 -070032#include <base/posix/eintr_wrapper.h>
Kelvin Zhangb9a9aa22024-10-15 10:38:35 -070033#include <android-base/stringprintf.h>
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070034#include <brillo/secure_blob.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000035
Alex Deymo0d298542016-03-30 18:31:49 -070036#include "update_engine/common/utils.h"
37
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070038using brillo::MessageLoop;
adlr@google.com3defe6a2009-12-04 20:57:17 +000039using std::string;
Ben Chan02f7c1d2014-10-18 15:18:02 -070040using std::unique_ptr;
adlr@google.com3defe6a2009-12-04 20:57:17 +000041using std::vector;
42
43namespace chromeos_update_engine {
44
Alex Deymo461b2592015-07-24 20:10:52 -070045namespace {
Darin Petkov6f03a3b2010-11-10 14:27:14 -080046
Alex Deymo109c28d2016-04-05 23:00:52 +000047bool SetupChild(const std::map<string, string>& env, uint32_t flags) {
Alex Deymo461b2592015-07-24 20:10:52 -070048 // Setup the environment variables.
49 clearenv();
Kelvin Zhang866d4702023-10-24 12:37:35 -070050 if (setpgid(0, 0) != 0) {
51 PLOG(ERROR) << "Failed to setpgid on subprocess " << getpid();
52 return false;
53 }
Alex Deymo461b2592015-07-24 20:10:52 -070054 for (const auto& key_value : env) {
55 setenv(key_value.first.c_str(), key_value.second.c_str(), 0);
56 }
Darin Petkov6f03a3b2010-11-10 14:27:14 -080057
Alex Deymo461b2592015-07-24 20:10:52 -070058 if ((flags & Subprocess::kRedirectStderrToStdout) != 0) {
59 if (HANDLE_EINTR(dup2(STDOUT_FILENO, STDERR_FILENO)) != STDERR_FILENO)
60 return false;
Alex Deymo29b81532015-07-09 11:51:49 -070061 }
Andrew de los Reyesc1d5c932011-04-20 17:15:47 -070062
Alex Deymo461b2592015-07-24 20:10:52 -070063 int fd = HANDLE_EINTR(open("/dev/null", O_RDONLY));
64 if (fd < 0)
65 return false;
66 if (HANDLE_EINTR(dup2(fd, STDIN_FILENO)) != STDIN_FILENO)
67 return false;
68 IGNORE_EINTR(close(fd));
69
70 return true;
adlr@google.com3defe6a2009-12-04 20:57:17 +000071}
72
Alex Deymo461b2592015-07-24 20:10:52 -070073// Helper function to launch a process with the given Subprocess::Flags.
74// This function only sets up and starts the process according to the |flags|.
75// The caller is responsible for watching the termination of the subprocess.
76// Return whether the process was successfully launched and fills in the |proc|
77// Process.
78bool LaunchProcess(const vector<string>& cmd,
79 uint32_t flags,
Alex Deymoe384bb22016-03-29 17:23:33 -070080 const vector<int>& output_pipes,
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -070081 brillo::Process* proc) {
Alex Deymo461b2592015-07-24 20:10:52 -070082 for (const string& arg : cmd)
83 proc->AddArg(arg);
84 proc->SetSearchPath((flags & Subprocess::kSearchPath) != 0);
85
86 // Create an environment for the child process with just the required PATHs.
87 std::map<string, string> env;
88 for (const char* key : {"LD_LIBRARY_PATH", "PATH"}) {
89 const char* value = getenv(key);
90 if (value)
91 env.emplace(key, value);
92 }
93
Alex Deymoe384bb22016-03-29 17:23:33 -070094 for (const int fd : output_pipes) {
95 proc->RedirectUsingPipe(fd, false);
96 }
97 proc->SetCloseUnusedFileDescriptors(true);
Alex Deymo461b2592015-07-24 20:10:52 -070098 proc->RedirectUsingPipe(STDOUT_FILENO, false);
Alex Deymo109c28d2016-04-05 23:00:52 +000099 proc->SetPreExecCallback(base::Bind(&SetupChild, env, flags));
Alex Deymo461b2592015-07-24 20:10:52 -0700100
Kelvin Zhang0c184242024-10-25 11:19:27 -0700101 LOG(INFO) << "Running \"" << android::base::Join(cmd, " ") << "\"";
Alex Deymo461b2592015-07-24 20:10:52 -0700102 return proc->Start();
103}
104
105} // namespace
106
Alex Deymob7ca0962014-10-01 17:58:07 -0700107void Subprocess::Init(
Amin Hassanib2689592019-01-13 17:04:28 -0800108 brillo::AsynchronousSignalHandlerInterface* async_signal_handler) {
Alex Deymo461b2592015-07-24 20:10:52 -0700109 if (subprocess_singleton_ == this)
110 return;
111 CHECK(subprocess_singleton_ == nullptr);
112 subprocess_singleton_ = this;
113
Alex Deymob7ca0962014-10-01 17:58:07 -0700114 process_reaper_.Register(async_signal_handler);
Alex Deymo461b2592015-07-24 20:10:52 -0700115}
116
117Subprocess::~Subprocess() {
118 if (subprocess_singleton_ == this)
119 subprocess_singleton_ = nullptr;
Kenneth Watersa7fcafa2010-09-21 10:27:03 -0700120}
121
Alex Deymo29b81532015-07-09 11:51:49 -0700122void Subprocess::OnStdoutReady(SubprocessRecord* record) {
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800123 char buf[1024];
Alex Deymo0d298542016-03-30 18:31:49 -0700124 size_t bytes_read;
Alex Deymo29b81532015-07-09 11:51:49 -0700125 do {
Alex Deymo0d298542016-03-30 18:31:49 -0700126 bytes_read = 0;
127 bool eof;
128 bool ok = utils::ReadAll(
Kokoa Matsuda91aa2172024-10-16 16:01:04 +0900129 record->stdout_fd, buf, std::size(buf), &bytes_read, &eof);
Colin Crossd76a8ac2021-12-21 13:08:20 -0800130 record->stdout_str.append(buf, bytes_read);
Alex Deymo0d298542016-03-30 18:31:49 -0700131 if (!ok || eof) {
132 // There was either an error or an EOF condition, so we are done watching
133 // the file descriptor.
Hidehiko Abe493fecb2019-07-10 23:30:50 +0900134 record->stdout_controller.reset();
Alex Deymo0d298542016-03-30 18:31:49 -0700135 return;
Alex Deymo29b81532015-07-09 11:51:49 -0700136 }
Alex Deymo0d298542016-03-30 18:31:49 -0700137 } while (bytes_read);
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800138}
139
Alex Deymo461b2592015-07-24 20:10:52 -0700140void Subprocess::ChildExitedCallback(const siginfo_t& info) {
141 auto pid_record = subprocess_records_.find(info.si_pid);
142 if (pid_record == subprocess_records_.end())
143 return;
144 SubprocessRecord* record = pid_record->second.get();
145
146 // Make sure we read any remaining process output and then close the pipe.
147 OnStdoutReady(record);
148
Hidehiko Abe493fecb2019-07-10 23:30:50 +0900149 record->stdout_controller.reset();
Alex Deymo461b2592015-07-24 20:10:52 -0700150
Alex Deymo461b2592015-07-24 20:10:52 -0700151 // Don't print any log if the subprocess exited with exit code 0.
152 if (info.si_code != CLD_EXITED) {
Kelvin Zhang866d4702023-10-24 12:37:35 -0700153 LOG(INFO) << "Subprocess " << info.si_pid << " terminated with si_code "
154 << info.si_code;
Alex Deymo461b2592015-07-24 20:10:52 -0700155 } else if (info.si_status != 0) {
Kelvin Zhang866d4702023-10-24 12:37:35 -0700156 LOG(INFO) << "Subprocess " << info.si_pid
157 << " exited with si_status: " << info.si_status;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000158 }
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700159
Colin Crossd76a8ac2021-12-21 13:08:20 -0800160 if (!record->stdout_str.empty()) {
161 LOG(INFO) << "Subprocess output:\n" << record->stdout_str;
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700162 }
Alex Deymo461b2592015-07-24 20:10:52 -0700163 if (!record->callback.is_null()) {
Colin Crossd76a8ac2021-12-21 13:08:20 -0800164 record->callback.Run(info.si_status, record->stdout_str);
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700165 }
Alex Deymoe384bb22016-03-29 17:23:33 -0700166 // Release and close all the pipes after calling the callback so our
167 // redirected pipes are still alive. Releasing the process first makes
168 // Reset(0) not attempt to kill the process, which is already a zombie at this
169 // point.
170 record->proc.Release();
171 record->proc.Reset(0);
172
Alex Deymo461b2592015-07-24 20:10:52 -0700173 subprocess_records_.erase(pid_record);
Alex Deymo29b81532015-07-09 11:51:49 -0700174}
175
Alex Deymo461b2592015-07-24 20:10:52 -0700176pid_t Subprocess::Exec(const vector<string>& cmd,
177 const ExecCallback& callback) {
Alex Deymo109c28d2016-04-05 23:00:52 +0000178 return ExecFlags(cmd, kRedirectStderrToStdout, {}, callback);
Alex Deymo461b2592015-07-24 20:10:52 -0700179}
Andrew de los Reyes08c4e272010-04-15 14:02:17 -0700180
Alex Deymo461b2592015-07-24 20:10:52 -0700181pid_t Subprocess::ExecFlags(const vector<string>& cmd,
182 uint32_t flags,
Alex Deymoe384bb22016-03-29 17:23:33 -0700183 const vector<int>& output_pipes,
Alex Deymo461b2592015-07-24 20:10:52 -0700184 const ExecCallback& callback) {
185 unique_ptr<SubprocessRecord> record(new SubprocessRecord(callback));
186
Alex Deymo109c28d2016-04-05 23:00:52 +0000187 if (!LaunchProcess(cmd, flags, output_pipes, &record->proc)) {
Alex Deymo461b2592015-07-24 20:10:52 -0700188 LOG(ERROR) << "Failed to launch subprocess";
Chris Masonec6c57a52010-09-23 13:06:14 -0700189 return 0;
190 }
adlr@google.com3defe6a2009-12-04 20:57:17 +0000191
Alex Deymo461b2592015-07-24 20:10:52 -0700192 pid_t pid = record->proc.pid();
Amin Hassanib2689592019-01-13 17:04:28 -0800193 CHECK(process_reaper_.WatchForChild(
194 FROM_HERE,
195 pid,
196 base::Bind(&Subprocess::ChildExitedCallback, base::Unretained(this))));
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800197
Alex Deymo461b2592015-07-24 20:10:52 -0700198 record->stdout_fd = record->proc.GetPipe(STDOUT_FILENO);
Alex Deymo29b81532015-07-09 11:51:49 -0700199 // Capture the subprocess output. Make our end of the pipe non-blocking.
Alex Deymo461b2592015-07-24 20:10:52 -0700200 int fd_flags = fcntl(record->stdout_fd, F_GETFL, 0) | O_NONBLOCK;
Alex Deymo29b81532015-07-09 11:51:49 -0700201 if (HANDLE_EINTR(fcntl(record->stdout_fd, F_SETFL, fd_flags)) < 0) {
202 LOG(ERROR) << "Unable to set non-blocking I/O mode on fd "
203 << record->stdout_fd << ".";
204 }
205
Hidehiko Abe493fecb2019-07-10 23:30:50 +0900206 record->stdout_controller = base::FileDescriptorWatcher::WatchReadable(
Alex Deymo29b81532015-07-09 11:51:49 -0700207 record->stdout_fd,
Hidehiko Abe493fecb2019-07-10 23:30:50 +0900208 base::BindRepeating(&Subprocess::OnStdoutReady, record.get()));
Alex Deymo29b81532015-07-09 11:51:49 -0700209
Alex Vakulenkoce8c8ee2016-04-08 08:59:26 -0700210 subprocess_records_[pid] = std::move(record);
Alex Deymo461b2592015-07-24 20:10:52 -0700211 return pid;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000212}
213
Kelvin Zhang866d4702023-10-24 12:37:35 -0700214bool WaitForProcessGroup(pid_t pid, std::chrono::milliseconds timeout) {
215 using std::chrono::system_clock;
216 auto start = system_clock::now();
217 do {
218 pid_t w = waitpid(-pid, nullptr, WNOHANG);
219 if (w < 0) {
220 // When all of the child process with this process group ID exits, waitpid
221 // will return ECHILD. Until that point, keep callilng waitpid() as there
222 // might be multiple child processes with the same process group id.
223 if (errno == ECHILD) {
224 LOG(INFO) << "All processes with process group id " << pid << " exited";
225 return true;
226 }
227 PLOG(ERROR) << "Waitpid returned " << w;
228 return false;
229 }
230 usleep(100);
231 } while ((system_clock::now() - start) <= timeout);
232 LOG(INFO) << "process group " << pid << " did not exit in " << timeout.count()
233 << " milliseconds";
234 return false;
235}
236
Alex Deymo461b2592015-07-24 20:10:52 -0700237void Subprocess::KillExec(pid_t pid) {
Kelvin Zhang866d4702023-10-24 12:37:35 -0700238 using namespace std::chrono_literals;
Alex Deymo461b2592015-07-24 20:10:52 -0700239 auto pid_record = subprocess_records_.find(pid);
240 if (pid_record == subprocess_records_.end())
Alex Deymo29b81532015-07-09 11:51:49 -0700241 return;
Alex Deymo461b2592015-07-24 20:10:52 -0700242 pid_record->second->callback.Reset();
Sen Jiang1d3b8632016-05-13 12:32:10 -0700243 // We don't care about output/return code, so we use SIGKILL here to ensure it
244 // will be killed, SIGTERM might lead to leaked subprocess.
Kelvin Zhang1e926312023-09-27 18:10:25 -0700245 CHECK_EQ(pid_record->second->proc.pid(), pid);
Kelvin Zhang866d4702023-10-24 12:37:35 -0700246 if (kill(-pid, SIGKILL) != 0) {
247 PLOG(WARNING) << "Failed to kill subprocess group " << pid;
Alex Deymod15c5462016-03-09 18:11:12 -0800248 }
Kelvin Zhang866d4702023-10-24 12:37:35 -0700249 WaitForProcessGroup(pid, 5000ms);
Alex Deymod15c5462016-03-09 18:11:12 -0800250 // Release the pid now so we don't try to kill it if Subprocess is destroyed
251 // before the corresponding ChildExitedCallback() is called.
252 pid_record->second->proc.Release();
Kelvin Zhang1e926312023-09-27 18:10:25 -0700253 if (subprocess_records_.count(pid)) {
254 siginfo_t info;
255 info.si_code = CLD_KILLED;
256 info.si_status = SIGKILL;
257 info.si_pid = pid;
258 ChildExitedCallback(info);
259 }
adlr@google.com3defe6a2009-12-04 20:57:17 +0000260}
261
Alex Deymoe384bb22016-03-29 17:23:33 -0700262int Subprocess::GetPipeFd(pid_t pid, int fd) const {
263 auto pid_record = subprocess_records_.find(pid);
264 if (pid_record == subprocess_records_.end())
265 return -1;
266 return pid_record->second->proc.GetPipe(fd);
267}
268
Alex Deymof329b932014-10-30 01:37:48 -0700269bool Subprocess::SynchronousExec(const vector<string>& cmd,
Darin Petkov85d02b72011-05-17 13:25:51 -0700270 int* return_code,
Colin Crossd76a8ac2021-12-21 13:08:20 -0800271 string* stdout_str,
272 string* stderr_str) {
Amin Hassani3a4caa12019-11-06 11:12:28 -0800273 // The default for |SynchronousExec| is to use |kSearchPath| since the code
274 // relies on that.
Colin Crossd76a8ac2021-12-21 13:08:20 -0800275 return SynchronousExecFlags(
276 cmd, kSearchPath, return_code, stdout_str, stderr_str);
Alex Deymo461b2592015-07-24 20:10:52 -0700277}
278
279bool Subprocess::SynchronousExecFlags(const vector<string>& cmd,
280 uint32_t flags,
281 int* return_code,
Colin Crossd76a8ac2021-12-21 13:08:20 -0800282 string* stdout_str,
283 string* stderr_str) {
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700284 brillo::ProcessImpl proc;
Amin Hassani3a4caa12019-11-06 11:12:28 -0800285 if (!LaunchProcess(cmd, flags, {STDERR_FILENO}, &proc)) {
Alex Deymo461b2592015-07-24 20:10:52 -0700286 LOG(ERROR) << "Failed to launch subprocess";
287 return false;
288 }
289
Colin Crossd76a8ac2021-12-21 13:08:20 -0800290 if (stdout_str) {
291 stdout_str->clear();
Alex Deymo461b2592015-07-24 20:10:52 -0700292 }
Colin Crossd76a8ac2021-12-21 13:08:20 -0800293 if (stderr_str) {
294 stderr_str->clear();
Amin Hassani3a4caa12019-11-06 11:12:28 -0800295 }
Alex Deymo461b2592015-07-24 20:10:52 -0700296
Amin Hassani3a4caa12019-11-06 11:12:28 -0800297 // Read from both stdout and stderr individually.
298 int stdout_fd = proc.GetPipe(STDOUT_FILENO);
299 int stderr_fd = proc.GetPipe(STDERR_FILENO);
Alex Deymo461b2592015-07-24 20:10:52 -0700300 vector<char> buffer(32 * 1024);
Amin Hassani3a4caa12019-11-06 11:12:28 -0800301 bool stdout_closed = false, stderr_closed = false;
302 while (!stdout_closed || !stderr_closed) {
303 if (!stdout_closed) {
304 int rc = HANDLE_EINTR(read(stdout_fd, buffer.data(), buffer.size()));
305 if (rc <= 0) {
306 stdout_closed = true;
307 if (rc < 0)
308 PLOG(ERROR) << "Reading from child's stdout";
Colin Crossd76a8ac2021-12-21 13:08:20 -0800309 } else if (stdout_str != nullptr) {
310 stdout_str->append(buffer.data(), rc);
Amin Hassani3a4caa12019-11-06 11:12:28 -0800311 }
312 }
313
314 if (!stderr_closed) {
315 int rc = HANDLE_EINTR(read(stderr_fd, buffer.data(), buffer.size()));
316 if (rc <= 0) {
317 stderr_closed = true;
318 if (rc < 0)
319 PLOG(ERROR) << "Reading from child's stderr";
Colin Crossd76a8ac2021-12-21 13:08:20 -0800320 } else if (stderr_str != nullptr) {
321 stderr_str->append(buffer.data(), rc);
Amin Hassani3a4caa12019-11-06 11:12:28 -0800322 }
Alex Deymo461b2592015-07-24 20:10:52 -0700323 }
324 }
Amin Hassani3a4caa12019-11-06 11:12:28 -0800325
Alex Deymo461b2592015-07-24 20:10:52 -0700326 // At this point, the subprocess already closed the output, so we only need to
327 // wait for it to finish.
328 int proc_return_code = proc.Wait();
329 if (return_code)
330 *return_code = proc_return_code;
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700331 return proc_return_code != brillo::Process::kErrorExitStatus;
Darin Petkov85d02b72011-05-17 13:25:51 -0700332}
333
Amin Hassania8859542018-03-07 16:24:43 -0800334void Subprocess::FlushBufferedLogsAtExit() {
335 if (!subprocess_records_.empty()) {
336 LOG(INFO) << "We are exiting, but there are still in flight subprocesses!";
337 for (auto& pid_record : subprocess_records_) {
338 SubprocessRecord* record = pid_record.second.get();
339 // Make sure we read any remaining process output.
340 OnStdoutReady(record);
Colin Crossd76a8ac2021-12-21 13:08:20 -0800341 if (!record->stdout_str.empty()) {
Amin Hassania8859542018-03-07 16:24:43 -0800342 LOG(INFO) << "Subprocess(" << pid_record.first << ") output:\n"
Colin Crossd76a8ac2021-12-21 13:08:20 -0800343 << record->stdout_str;
Amin Hassania8859542018-03-07 16:24:43 -0800344 }
345 }
346 }
347}
348
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700349Subprocess* Subprocess::subprocess_singleton_ = nullptr;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000350
351} // namespace chromeos_update_engine