blob: e425bdf84ddb423a112c66f3a38f1bac3991108b [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2012 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
adlr@google.com3defe6a2009-12-04 20:57:17 +000016
17#include "update_engine/subprocess.h"
Darin Petkova0b9e772011-10-06 05:05:56 -070018
Alex Deymo29b81532015-07-09 11:51:49 -070019#include <fcntl.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000020#include <stdlib.h>
21#include <string.h>
Kenneth Watersa7fcafa2010-09-21 10:27:03 -070022#include <unistd.h>
Darin Petkova0b9e772011-10-06 05:05:56 -070023
Ben Chan02f7c1d2014-10-18 15:18:02 -070024#include <memory>
Darin Petkova0b9e772011-10-06 05:05:56 -070025#include <string>
adlr@google.com3defe6a2009-12-04 20:57:17 +000026#include <vector>
Darin Petkova0b9e772011-10-06 05:05:56 -070027
Alex Deymo29b81532015-07-09 11:51:49 -070028#include <base/bind.h>
Darin Petkova0b9e772011-10-06 05:05:56 -070029#include <base/logging.h>
Alex Deymo29b81532015-07-09 11:51:49 -070030#include <base/posix/eintr_wrapper.h>
Alex Vakulenko75039d72014-03-25 12:36:28 -070031#include <base/strings/string_util.h>
32#include <base/strings/stringprintf.h>
Alex Deymo461b2592015-07-24 20:10:52 -070033#include <chromeos/process.h>
34#include <chromeos/secure_blob.h>
adlr@google.com3defe6a2009-12-04 20:57:17 +000035
Alex Deymo29b81532015-07-09 11:51:49 -070036using chromeos::MessageLoop;
adlr@google.com3defe6a2009-12-04 20:57:17 +000037using std::string;
Ben Chan02f7c1d2014-10-18 15:18:02 -070038using std::unique_ptr;
adlr@google.com3defe6a2009-12-04 20:57:17 +000039using std::vector;
40
41namespace chromeos_update_engine {
42
Alex Deymo461b2592015-07-24 20:10:52 -070043namespace {
Darin Petkov6f03a3b2010-11-10 14:27:14 -080044
Alex Deymo461b2592015-07-24 20:10:52 -070045bool SetupChild(const std::map<string, string>& env, uint32_t flags) {
46 // Setup the environment variables.
47 clearenv();
48 for (const auto& key_value : env) {
49 setenv(key_value.first.c_str(), key_value.second.c_str(), 0);
50 }
Darin Petkov6f03a3b2010-11-10 14:27:14 -080051
Alex Deymo461b2592015-07-24 20:10:52 -070052 if ((flags & Subprocess::kRedirectStderrToStdout) != 0) {
53 if (HANDLE_EINTR(dup2(STDOUT_FILENO, STDERR_FILENO)) != STDERR_FILENO)
54 return false;
Alex Deymo29b81532015-07-09 11:51:49 -070055 }
Andrew de los Reyesc1d5c932011-04-20 17:15:47 -070056
Alex Deymo461b2592015-07-24 20:10:52 -070057 int fd = HANDLE_EINTR(open("/dev/null", O_RDONLY));
58 if (fd < 0)
59 return false;
60 if (HANDLE_EINTR(dup2(fd, STDIN_FILENO)) != STDIN_FILENO)
61 return false;
62 IGNORE_EINTR(close(fd));
63
64 return true;
adlr@google.com3defe6a2009-12-04 20:57:17 +000065}
66
Alex Deymo461b2592015-07-24 20:10:52 -070067// Helper function to launch a process with the given Subprocess::Flags.
68// This function only sets up and starts the process according to the |flags|.
69// The caller is responsible for watching the termination of the subprocess.
70// Return whether the process was successfully launched and fills in the |proc|
71// Process.
72bool LaunchProcess(const vector<string>& cmd,
73 uint32_t flags,
74 chromeos::Process* proc) {
75 for (const string& arg : cmd)
76 proc->AddArg(arg);
77 proc->SetSearchPath((flags & Subprocess::kSearchPath) != 0);
78
79 // Create an environment for the child process with just the required PATHs.
80 std::map<string, string> env;
81 for (const char* key : {"LD_LIBRARY_PATH", "PATH"}) {
82 const char* value = getenv(key);
83 if (value)
84 env.emplace(key, value);
85 }
86
87 proc->RedirectUsingPipe(STDOUT_FILENO, false);
88 proc->SetPreExecCallback(base::Bind(&SetupChild, env, flags));
89
90 return proc->Start();
91}
92
93} // namespace
94
Alex Deymob7ca0962014-10-01 17:58:07 -070095void Subprocess::Init(
96 chromeos::AsynchronousSignalHandlerInterface* async_signal_handler) {
Alex Deymo461b2592015-07-24 20:10:52 -070097 if (subprocess_singleton_ == this)
98 return;
99 CHECK(subprocess_singleton_ == nullptr);
100 subprocess_singleton_ = this;
101
Alex Deymob7ca0962014-10-01 17:58:07 -0700102 process_reaper_.Register(async_signal_handler);
Alex Deymo461b2592015-07-24 20:10:52 -0700103}
104
105Subprocess::~Subprocess() {
106 if (subprocess_singleton_ == this)
107 subprocess_singleton_ = nullptr;
Kenneth Watersa7fcafa2010-09-21 10:27:03 -0700108}
109
Alex Deymo29b81532015-07-09 11:51:49 -0700110void Subprocess::OnStdoutReady(SubprocessRecord* record) {
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800111 char buf[1024];
Alex Deymo29b81532015-07-09 11:51:49 -0700112 ssize_t rc = 0;
113 do {
114 rc = HANDLE_EINTR(read(record->stdout_fd, buf, arraysize(buf)));
115 if (rc < 0) {
116 // EAGAIN and EWOULDBLOCK are normal return values when there's no more
117 // input as we are in non-blocking mode.
118 if (errno != EWOULDBLOCK && errno != EAGAIN) {
119 PLOG(ERROR) << "Error reading fd " << record->stdout_fd;
Alex Deymo461b2592015-07-24 20:10:52 -0700120 MessageLoop::current()->CancelTask(record->stdout_task_id);
121 record->stdout_task_id = MessageLoop::kTaskIdNull;
Alex Deymo29b81532015-07-09 11:51:49 -0700122 }
Alex Deymo957cf4d2015-07-14 23:18:33 -0700123 } else if (rc == 0) {
124 // A value of 0 means that the child closed its end of the pipe and there
125 // is nothing else to read from stdout.
Alex Deymo461b2592015-07-24 20:10:52 -0700126 MessageLoop::current()->CancelTask(record->stdout_task_id);
127 record->stdout_task_id = MessageLoop::kTaskIdNull;
Alex Deymo29b81532015-07-09 11:51:49 -0700128 } else {
129 record->stdout.append(buf, rc);
130 }
131 } while (rc > 0);
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800132}
133
Alex Deymo461b2592015-07-24 20:10:52 -0700134void Subprocess::ChildExitedCallback(const siginfo_t& info) {
135 auto pid_record = subprocess_records_.find(info.si_pid);
136 if (pid_record == subprocess_records_.end())
137 return;
138 SubprocessRecord* record = pid_record->second.get();
139
140 // Make sure we read any remaining process output and then close the pipe.
141 OnStdoutReady(record);
142
143 MessageLoop::current()->CancelTask(record->stdout_task_id);
144 record->stdout_task_id = MessageLoop::kTaskIdNull;
145
146 // Release and close all the pipes now.
147 record->proc.Release();
148 record->proc.Reset(0);
149
150 // Don't print any log if the subprocess exited with exit code 0.
151 if (info.si_code != CLD_EXITED) {
152 LOG(INFO) << "Subprocess terminated with si_code " << info.si_code;
153 } else if (info.si_status != 0) {
154 LOG(INFO) << "Subprocess exited with si_status: " << info.si_status;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000155 }
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700156
Alex Deymo461b2592015-07-24 20:10:52 -0700157 if (!record->stdout.empty()) {
158 LOG(INFO) << "Subprocess output:\n" << record->stdout;
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700159 }
Alex Deymo461b2592015-07-24 20:10:52 -0700160 if (!record->callback.is_null()) {
161 record->callback.Run(info.si_status, record->stdout);
Andrew de los Reyes3270f742010-07-15 22:28:14 -0700162 }
Alex Deymo461b2592015-07-24 20:10:52 -0700163 subprocess_records_.erase(pid_record);
Alex Deymo29b81532015-07-09 11:51:49 -0700164}
165
Alex Deymo461b2592015-07-24 20:10:52 -0700166pid_t Subprocess::Exec(const vector<string>& cmd,
167 const ExecCallback& callback) {
168 return ExecFlags(cmd, kRedirectStderrToStdout, callback);
169}
Andrew de los Reyes08c4e272010-04-15 14:02:17 -0700170
Alex Deymo461b2592015-07-24 20:10:52 -0700171pid_t Subprocess::ExecFlags(const vector<string>& cmd,
172 uint32_t flags,
173 const ExecCallback& callback) {
174 unique_ptr<SubprocessRecord> record(new SubprocessRecord(callback));
175
176 if (!LaunchProcess(cmd, flags, &record->proc)) {
177 LOG(ERROR) << "Failed to launch subprocess";
Chris Masonec6c57a52010-09-23 13:06:14 -0700178 return 0;
179 }
adlr@google.com3defe6a2009-12-04 20:57:17 +0000180
Alex Deymo461b2592015-07-24 20:10:52 -0700181 pid_t pid = record->proc.pid();
182 CHECK(process_reaper_.WatchForChild(FROM_HERE, pid, base::Bind(
183 &Subprocess::ChildExitedCallback,
184 base::Unretained(this))));
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800185
Alex Deymo461b2592015-07-24 20:10:52 -0700186 record->stdout_fd = record->proc.GetPipe(STDOUT_FILENO);
Alex Deymo29b81532015-07-09 11:51:49 -0700187 // Capture the subprocess output. Make our end of the pipe non-blocking.
Alex Deymo461b2592015-07-24 20:10:52 -0700188 int fd_flags = fcntl(record->stdout_fd, F_GETFL, 0) | O_NONBLOCK;
Alex Deymo29b81532015-07-09 11:51:49 -0700189 if (HANDLE_EINTR(fcntl(record->stdout_fd, F_SETFL, fd_flags)) < 0) {
190 LOG(ERROR) << "Unable to set non-blocking I/O mode on fd "
191 << record->stdout_fd << ".";
192 }
193
Alex Deymo461b2592015-07-24 20:10:52 -0700194 record->stdout_task_id = MessageLoop::current()->WatchFileDescriptor(
Alex Deymo29b81532015-07-09 11:51:49 -0700195 FROM_HERE,
196 record->stdout_fd,
197 MessageLoop::WatchMode::kWatchRead,
198 true,
199 base::Bind(&Subprocess::OnStdoutReady, record.get()));
200
Alex Deymo461b2592015-07-24 20:10:52 -0700201 subprocess_records_[pid].reset(record.release());
202 return pid;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000203}
204
Alex Deymo461b2592015-07-24 20:10:52 -0700205void Subprocess::KillExec(pid_t pid) {
206 auto pid_record = subprocess_records_.find(pid);
207 if (pid_record == subprocess_records_.end())
Alex Deymo29b81532015-07-09 11:51:49 -0700208 return;
Alex Deymo461b2592015-07-24 20:10:52 -0700209 pid_record->second->callback.Reset();
210 kill(pid, SIGTERM);
adlr@google.com3defe6a2009-12-04 20:57:17 +0000211}
212
Alex Deymof329b932014-10-30 01:37:48 -0700213bool Subprocess::SynchronousExec(const vector<string>& cmd,
Darin Petkov85d02b72011-05-17 13:25:51 -0700214 int* return_code,
Alex Deymof329b932014-10-30 01:37:48 -0700215 string* stdout) {
Alex Deymo461b2592015-07-24 20:10:52 -0700216 // The default for SynchronousExec is to use kSearchPath since the code relies
217 // on that.
218 return SynchronousExecFlags(
219 cmd,
220 kRedirectStderrToStdout | kSearchPath,
221 return_code,
222 stdout);
223}
224
225bool Subprocess::SynchronousExecFlags(const vector<string>& cmd,
226 uint32_t flags,
227 int* return_code,
228 string* stdout) {
229 chromeos::ProcessImpl proc;
230 if (!LaunchProcess(cmd, flags, &proc)) {
231 LOG(ERROR) << "Failed to launch subprocess";
232 return false;
233 }
234
235 if (stdout) {
236 stdout->clear();
237 }
238
239 int fd = proc.GetPipe(STDOUT_FILENO);
240 vector<char> buffer(32 * 1024);
241 while (true) {
242 int rc = HANDLE_EINTR(read(fd, buffer.data(), buffer.size()));
243 if (rc < 0) {
244 PLOG(ERROR) << "Reading from child's output";
245 break;
246 } else if (rc == 0) {
247 break;
248 } else {
249 if (stdout)
250 stdout->append(buffer.data(), rc);
251 }
252 }
253 // At this point, the subprocess already closed the output, so we only need to
254 // wait for it to finish.
255 int proc_return_code = proc.Wait();
256 if (return_code)
257 *return_code = proc_return_code;
258 return proc_return_code != chromeos::Process::kErrorExitStatus;
Darin Petkov85d02b72011-05-17 13:25:51 -0700259}
260
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800261bool Subprocess::SubprocessInFlight() {
Alex Deymo461b2592015-07-24 20:10:52 -0700262 for (const auto& pid_record : subprocess_records_) {
263 if (!pid_record.second->callback.is_null())
Darin Petkov6f03a3b2010-11-10 14:27:14 -0800264 return true;
265 }
266 return false;
267}
268
Alex Vakulenko88b591f2014-08-28 16:48:57 -0700269Subprocess* Subprocess::subprocess_singleton_ = nullptr;
adlr@google.com3defe6a2009-12-04 20:57:17 +0000270
271} // namespace chromeos_update_engine