| Alex Deymo | aea4c1c | 2015-08-19 20:24:43 -0700 | [diff] [blame] | 1 | // | 
|  | 2 | // Copyright (C) 2012 The Android Open Source Project | 
|  | 3 | // | 
|  | 4 | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | 5 | // you may not use this file except in compliance with the License. | 
|  | 6 | // You may obtain a copy of the License at | 
|  | 7 | // | 
|  | 8 | //      http://www.apache.org/licenses/LICENSE-2.0 | 
|  | 9 | // | 
|  | 10 | // Unless required by applicable law or agreed to in writing, software | 
|  | 11 | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | 12 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | 13 | // See the License for the specific language governing permissions and | 
|  | 14 | // limitations under the License. | 
|  | 15 | // | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 16 |  | 
| Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 17 | #include "update_engine/common/subprocess.h" | 
| Darin Petkov | a0b9e77 | 2011-10-06 05:05:56 -0700 | [diff] [blame] | 18 |  | 
| Alex Deymo | 29b8153 | 2015-07-09 11:51:49 -0700 | [diff] [blame] | 19 | #include <fcntl.h> | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 20 | #include <stdlib.h> | 
|  | 21 | #include <string.h> | 
| Kenneth Waters | a7fcafa | 2010-09-21 10:27:03 -0700 | [diff] [blame] | 22 | #include <unistd.h> | 
| Darin Petkov | a0b9e77 | 2011-10-06 05:05:56 -0700 | [diff] [blame] | 23 |  | 
| Ben Chan | 02f7c1d | 2014-10-18 15:18:02 -0700 | [diff] [blame] | 24 | #include <memory> | 
| Darin Petkov | a0b9e77 | 2011-10-06 05:05:56 -0700 | [diff] [blame] | 25 | #include <string> | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 26 | #include <vector> | 
| Darin Petkov | a0b9e77 | 2011-10-06 05:05:56 -0700 | [diff] [blame] | 27 |  | 
| Alex Deymo | 29b8153 | 2015-07-09 11:51:49 -0700 | [diff] [blame] | 28 | #include <base/bind.h> | 
| Darin Petkov | a0b9e77 | 2011-10-06 05:05:56 -0700 | [diff] [blame] | 29 | #include <base/logging.h> | 
| Alex Deymo | 29b8153 | 2015-07-09 11:51:49 -0700 | [diff] [blame] | 30 | #include <base/posix/eintr_wrapper.h> | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 31 | #include <base/strings/string_util.h> | 
|  | 32 | #include <base/strings/stringprintf.h> | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 33 | #include <brillo/process.h> | 
|  | 34 | #include <brillo/secure_blob.h> | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 35 |  | 
| Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 36 | #include "update_engine/common/utils.h" | 
|  | 37 |  | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 38 | using brillo::MessageLoop; | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 39 | using std::string; | 
| Ben Chan | 02f7c1d | 2014-10-18 15:18:02 -0700 | [diff] [blame] | 40 | using std::unique_ptr; | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 41 | using std::vector; | 
|  | 42 |  | 
|  | 43 | namespace chromeos_update_engine { | 
|  | 44 |  | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 45 | namespace { | 
| Darin Petkov | 6f03a3b | 2010-11-10 14:27:14 -0800 | [diff] [blame] | 46 |  | 
| Alex Deymo | 109c28d | 2016-04-05 23:00:52 +0000 | [diff] [blame] | 47 | bool SetupChild(const std::map<string, string>& env, uint32_t flags) { | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 48 | // Setup the environment variables. | 
|  | 49 | clearenv(); | 
|  | 50 | for (const auto& key_value : env) { | 
|  | 51 | setenv(key_value.first.c_str(), key_value.second.c_str(), 0); | 
|  | 52 | } | 
| Darin Petkov | 6f03a3b | 2010-11-10 14:27:14 -0800 | [diff] [blame] | 53 |  | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 54 | if ((flags & Subprocess::kRedirectStderrToStdout) != 0) { | 
|  | 55 | if (HANDLE_EINTR(dup2(STDOUT_FILENO, STDERR_FILENO)) != STDERR_FILENO) | 
|  | 56 | return false; | 
| Alex Deymo | 29b8153 | 2015-07-09 11:51:49 -0700 | [diff] [blame] | 57 | } | 
| Andrew de los Reyes | c1d5c93 | 2011-04-20 17:15:47 -0700 | [diff] [blame] | 58 |  | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 59 | int fd = HANDLE_EINTR(open("/dev/null", O_RDONLY)); | 
|  | 60 | if (fd < 0) | 
|  | 61 | return false; | 
|  | 62 | if (HANDLE_EINTR(dup2(fd, STDIN_FILENO)) != STDIN_FILENO) | 
|  | 63 | return false; | 
|  | 64 | IGNORE_EINTR(close(fd)); | 
|  | 65 |  | 
|  | 66 | return true; | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 67 | } | 
|  | 68 |  | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 69 | // Helper function to launch a process with the given Subprocess::Flags. | 
|  | 70 | // This function only sets up and starts the process according to the |flags|. | 
|  | 71 | // The caller is responsible for watching the termination of the subprocess. | 
|  | 72 | // Return whether the process was successfully launched and fills in the |proc| | 
|  | 73 | // Process. | 
|  | 74 | bool LaunchProcess(const vector<string>& cmd, | 
|  | 75 | uint32_t flags, | 
| Alex Deymo | e384bb2 | 2016-03-29 17:23:33 -0700 | [diff] [blame] | 76 | const vector<int>& output_pipes, | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 77 | brillo::Process* proc) { | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 78 | for (const string& arg : cmd) | 
|  | 79 | proc->AddArg(arg); | 
|  | 80 | proc->SetSearchPath((flags & Subprocess::kSearchPath) != 0); | 
|  | 81 |  | 
|  | 82 | // Create an environment for the child process with just the required PATHs. | 
|  | 83 | std::map<string, string> env; | 
|  | 84 | for (const char* key : {"LD_LIBRARY_PATH", "PATH"}) { | 
|  | 85 | const char* value = getenv(key); | 
|  | 86 | if (value) | 
|  | 87 | env.emplace(key, value); | 
|  | 88 | } | 
|  | 89 |  | 
| Alex Deymo | e384bb2 | 2016-03-29 17:23:33 -0700 | [diff] [blame] | 90 | for (const int fd : output_pipes) { | 
|  | 91 | proc->RedirectUsingPipe(fd, false); | 
|  | 92 | } | 
|  | 93 | proc->SetCloseUnusedFileDescriptors(true); | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 94 | proc->RedirectUsingPipe(STDOUT_FILENO, false); | 
| Alex Deymo | 109c28d | 2016-04-05 23:00:52 +0000 | [diff] [blame] | 95 | proc->SetPreExecCallback(base::Bind(&SetupChild, env, flags)); | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 96 |  | 
|  | 97 | return proc->Start(); | 
|  | 98 | } | 
|  | 99 |  | 
|  | 100 | }  // namespace | 
|  | 101 |  | 
| Alex Deymo | b7ca096 | 2014-10-01 17:58:07 -0700 | [diff] [blame] | 102 | void Subprocess::Init( | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 103 | brillo::AsynchronousSignalHandlerInterface* async_signal_handler) { | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 104 | if (subprocess_singleton_ == this) | 
|  | 105 | return; | 
|  | 106 | CHECK(subprocess_singleton_ == nullptr); | 
|  | 107 | subprocess_singleton_ = this; | 
|  | 108 |  | 
| Alex Deymo | b7ca096 | 2014-10-01 17:58:07 -0700 | [diff] [blame] | 109 | process_reaper_.Register(async_signal_handler); | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 110 | } | 
|  | 111 |  | 
|  | 112 | Subprocess::~Subprocess() { | 
|  | 113 | if (subprocess_singleton_ == this) | 
|  | 114 | subprocess_singleton_ = nullptr; | 
| Kenneth Waters | a7fcafa | 2010-09-21 10:27:03 -0700 | [diff] [blame] | 115 | } | 
|  | 116 |  | 
| Alex Deymo | 29b8153 | 2015-07-09 11:51:49 -0700 | [diff] [blame] | 117 | void Subprocess::OnStdoutReady(SubprocessRecord* record) { | 
| Darin Petkov | 6f03a3b | 2010-11-10 14:27:14 -0800 | [diff] [blame] | 118 | char buf[1024]; | 
| Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 119 | size_t bytes_read; | 
| Alex Deymo | 29b8153 | 2015-07-09 11:51:49 -0700 | [diff] [blame] | 120 | do { | 
| Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 121 | bytes_read = 0; | 
|  | 122 | bool eof; | 
|  | 123 | bool ok = utils::ReadAll( | 
|  | 124 | record->stdout_fd, buf, arraysize(buf), &bytes_read, &eof); | 
|  | 125 | record->stdout.append(buf, bytes_read); | 
|  | 126 | if (!ok || eof) { | 
|  | 127 | // There was either an error or an EOF condition, so we are done watching | 
|  | 128 | // the file descriptor. | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 129 | MessageLoop::current()->CancelTask(record->stdout_task_id); | 
|  | 130 | record->stdout_task_id = MessageLoop::kTaskIdNull; | 
| Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 131 | return; | 
| Alex Deymo | 29b8153 | 2015-07-09 11:51:49 -0700 | [diff] [blame] | 132 | } | 
| Alex Deymo | 0d29854 | 2016-03-30 18:31:49 -0700 | [diff] [blame] | 133 | } while (bytes_read); | 
| Darin Petkov | 6f03a3b | 2010-11-10 14:27:14 -0800 | [diff] [blame] | 134 | } | 
|  | 135 |  | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 136 | void Subprocess::ChildExitedCallback(const siginfo_t& info) { | 
|  | 137 | auto pid_record = subprocess_records_.find(info.si_pid); | 
|  | 138 | if (pid_record == subprocess_records_.end()) | 
|  | 139 | return; | 
|  | 140 | SubprocessRecord* record = pid_record->second.get(); | 
|  | 141 |  | 
|  | 142 | // Make sure we read any remaining process output and then close the pipe. | 
|  | 143 | OnStdoutReady(record); | 
|  | 144 |  | 
|  | 145 | MessageLoop::current()->CancelTask(record->stdout_task_id); | 
|  | 146 | record->stdout_task_id = MessageLoop::kTaskIdNull; | 
|  | 147 |  | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 148 | // Don't print any log if the subprocess exited with exit code 0. | 
|  | 149 | if (info.si_code != CLD_EXITED) { | 
|  | 150 | LOG(INFO) << "Subprocess terminated with si_code " << info.si_code; | 
|  | 151 | } else if (info.si_status != 0) { | 
|  | 152 | LOG(INFO) << "Subprocess exited with si_status: " << info.si_status; | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 153 | } | 
| Andrew de los Reyes | 3270f74 | 2010-07-15 22:28:14 -0700 | [diff] [blame] | 154 |  | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 155 | if (!record->stdout.empty()) { | 
|  | 156 | LOG(INFO) << "Subprocess output:\n" << record->stdout; | 
| Andrew de los Reyes | 3270f74 | 2010-07-15 22:28:14 -0700 | [diff] [blame] | 157 | } | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 158 | if (!record->callback.is_null()) { | 
|  | 159 | record->callback.Run(info.si_status, record->stdout); | 
| Andrew de los Reyes | 3270f74 | 2010-07-15 22:28:14 -0700 | [diff] [blame] | 160 | } | 
| Alex Deymo | e384bb2 | 2016-03-29 17:23:33 -0700 | [diff] [blame] | 161 | // Release and close all the pipes after calling the callback so our | 
|  | 162 | // redirected pipes are still alive. Releasing the process first makes | 
|  | 163 | // Reset(0) not attempt to kill the process, which is already a zombie at this | 
|  | 164 | // point. | 
|  | 165 | record->proc.Release(); | 
|  | 166 | record->proc.Reset(0); | 
|  | 167 |  | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 168 | subprocess_records_.erase(pid_record); | 
| Alex Deymo | 29b8153 | 2015-07-09 11:51:49 -0700 | [diff] [blame] | 169 | } | 
|  | 170 |  | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 171 | pid_t Subprocess::Exec(const vector<string>& cmd, | 
|  | 172 | const ExecCallback& callback) { | 
| Alex Deymo | 109c28d | 2016-04-05 23:00:52 +0000 | [diff] [blame] | 173 | return ExecFlags(cmd, kRedirectStderrToStdout, {}, callback); | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 174 | } | 
| Andrew de los Reyes | 08c4e27 | 2010-04-15 14:02:17 -0700 | [diff] [blame] | 175 |  | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 176 | pid_t Subprocess::ExecFlags(const vector<string>& cmd, | 
|  | 177 | uint32_t flags, | 
| Alex Deymo | e384bb2 | 2016-03-29 17:23:33 -0700 | [diff] [blame] | 178 | const vector<int>& output_pipes, | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 179 | const ExecCallback& callback) { | 
|  | 180 | unique_ptr<SubprocessRecord> record(new SubprocessRecord(callback)); | 
|  | 181 |  | 
| Alex Deymo | 109c28d | 2016-04-05 23:00:52 +0000 | [diff] [blame] | 182 | if (!LaunchProcess(cmd, flags, output_pipes, &record->proc)) { | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 183 | LOG(ERROR) << "Failed to launch subprocess"; | 
| Chris Masone | c6c57a5 | 2010-09-23 13:06:14 -0700 | [diff] [blame] | 184 | return 0; | 
|  | 185 | } | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 186 |  | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 187 | pid_t pid = record->proc.pid(); | 
|  | 188 | CHECK(process_reaper_.WatchForChild(FROM_HERE, pid, base::Bind( | 
|  | 189 | &Subprocess::ChildExitedCallback, | 
|  | 190 | base::Unretained(this)))); | 
| Darin Petkov | 6f03a3b | 2010-11-10 14:27:14 -0800 | [diff] [blame] | 191 |  | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 192 | record->stdout_fd = record->proc.GetPipe(STDOUT_FILENO); | 
| Alex Deymo | 29b8153 | 2015-07-09 11:51:49 -0700 | [diff] [blame] | 193 | // Capture the subprocess output. Make our end of the pipe non-blocking. | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 194 | int fd_flags = fcntl(record->stdout_fd, F_GETFL, 0) | O_NONBLOCK; | 
| Alex Deymo | 29b8153 | 2015-07-09 11:51:49 -0700 | [diff] [blame] | 195 | if (HANDLE_EINTR(fcntl(record->stdout_fd, F_SETFL, fd_flags)) < 0) { | 
|  | 196 | LOG(ERROR) << "Unable to set non-blocking I/O mode on fd " | 
|  | 197 | << record->stdout_fd << "."; | 
|  | 198 | } | 
|  | 199 |  | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 200 | record->stdout_task_id = MessageLoop::current()->WatchFileDescriptor( | 
| Alex Deymo | 29b8153 | 2015-07-09 11:51:49 -0700 | [diff] [blame] | 201 | FROM_HERE, | 
|  | 202 | record->stdout_fd, | 
|  | 203 | MessageLoop::WatchMode::kWatchRead, | 
|  | 204 | true, | 
|  | 205 | base::Bind(&Subprocess::OnStdoutReady, record.get())); | 
|  | 206 |  | 
| Alex Vakulenko | ce8c8ee | 2016-04-08 08:59:26 -0700 | [diff] [blame] | 207 | subprocess_records_[pid] = std::move(record); | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 208 | return pid; | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 209 | } | 
|  | 210 |  | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 211 | void Subprocess::KillExec(pid_t pid) { | 
|  | 212 | auto pid_record = subprocess_records_.find(pid); | 
|  | 213 | if (pid_record == subprocess_records_.end()) | 
| Alex Deymo | 29b8153 | 2015-07-09 11:51:49 -0700 | [diff] [blame] | 214 | return; | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 215 | pid_record->second->callback.Reset(); | 
| Sen Jiang | 1d3b863 | 2016-05-13 12:32:10 -0700 | [diff] [blame] | 216 | // We don't care about output/return code, so we use SIGKILL here to ensure it | 
|  | 217 | // will be killed, SIGTERM might lead to leaked subprocess. | 
|  | 218 | if (kill(pid, SIGKILL) != 0) { | 
|  | 219 | PLOG(WARNING) << "Error sending SIGKILL to " << pid; | 
| Alex Deymo | d15c546 | 2016-03-09 18:11:12 -0800 | [diff] [blame] | 220 | } | 
|  | 221 | // Release the pid now so we don't try to kill it if Subprocess is destroyed | 
|  | 222 | // before the corresponding ChildExitedCallback() is called. | 
|  | 223 | pid_record->second->proc.Release(); | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 224 | } | 
|  | 225 |  | 
| Alex Deymo | e384bb2 | 2016-03-29 17:23:33 -0700 | [diff] [blame] | 226 | int Subprocess::GetPipeFd(pid_t pid, int fd) const { | 
|  | 227 | auto pid_record = subprocess_records_.find(pid); | 
|  | 228 | if (pid_record == subprocess_records_.end()) | 
|  | 229 | return -1; | 
|  | 230 | return pid_record->second->proc.GetPipe(fd); | 
|  | 231 | } | 
|  | 232 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 233 | bool Subprocess::SynchronousExec(const vector<string>& cmd, | 
| Darin Petkov | 85d02b7 | 2011-05-17 13:25:51 -0700 | [diff] [blame] | 234 | int* return_code, | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 235 | string* stdout) { | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 236 | // The default for SynchronousExec is to use kSearchPath since the code relies | 
|  | 237 | // on that. | 
|  | 238 | return SynchronousExecFlags( | 
|  | 239 | cmd, | 
|  | 240 | kRedirectStderrToStdout | kSearchPath, | 
|  | 241 | return_code, | 
|  | 242 | stdout); | 
|  | 243 | } | 
|  | 244 |  | 
|  | 245 | bool Subprocess::SynchronousExecFlags(const vector<string>& cmd, | 
|  | 246 | uint32_t flags, | 
|  | 247 | int* return_code, | 
|  | 248 | string* stdout) { | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 249 | brillo::ProcessImpl proc; | 
| Alex Deymo | e384bb2 | 2016-03-29 17:23:33 -0700 | [diff] [blame] | 250 | // It doesn't make sense to redirect some pipes in the synchronous case | 
|  | 251 | // because we won't be reading on our end, so we don't expose the output_pipes | 
|  | 252 | // in this case. | 
| Alex Deymo | 109c28d | 2016-04-05 23:00:52 +0000 | [diff] [blame] | 253 | if (!LaunchProcess(cmd, flags, {}, &proc)) { | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 254 | LOG(ERROR) << "Failed to launch subprocess"; | 
|  | 255 | return false; | 
|  | 256 | } | 
|  | 257 |  | 
|  | 258 | if (stdout) { | 
|  | 259 | stdout->clear(); | 
|  | 260 | } | 
|  | 261 |  | 
|  | 262 | int fd = proc.GetPipe(STDOUT_FILENO); | 
|  | 263 | vector<char> buffer(32 * 1024); | 
|  | 264 | while (true) { | 
|  | 265 | int rc = HANDLE_EINTR(read(fd, buffer.data(), buffer.size())); | 
|  | 266 | if (rc < 0) { | 
|  | 267 | PLOG(ERROR) << "Reading from child's output"; | 
|  | 268 | break; | 
|  | 269 | } else if (rc == 0) { | 
|  | 270 | break; | 
|  | 271 | } else { | 
|  | 272 | if (stdout) | 
|  | 273 | stdout->append(buffer.data(), rc); | 
|  | 274 | } | 
|  | 275 | } | 
|  | 276 | // At this point, the subprocess already closed the output, so we only need to | 
|  | 277 | // wait for it to finish. | 
|  | 278 | int proc_return_code = proc.Wait(); | 
|  | 279 | if (return_code) | 
|  | 280 | *return_code = proc_return_code; | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 281 | return proc_return_code != brillo::Process::kErrorExitStatus; | 
| Darin Petkov | 85d02b7 | 2011-05-17 13:25:51 -0700 | [diff] [blame] | 282 | } | 
|  | 283 |  | 
| Darin Petkov | 6f03a3b | 2010-11-10 14:27:14 -0800 | [diff] [blame] | 284 | bool Subprocess::SubprocessInFlight() { | 
| Alex Deymo | 461b259 | 2015-07-24 20:10:52 -0700 | [diff] [blame] | 285 | for (const auto& pid_record : subprocess_records_) { | 
|  | 286 | if (!pid_record.second->callback.is_null()) | 
| Darin Petkov | 6f03a3b | 2010-11-10 14:27:14 -0800 | [diff] [blame] | 287 | return true; | 
|  | 288 | } | 
|  | 289 | return false; | 
|  | 290 | } | 
|  | 291 |  | 
| Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 292 | Subprocess* Subprocess::subprocess_singleton_ = nullptr; | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 293 |  | 
|  | 294 | }  // namespace chromeos_update_engine |