1 // Copyright 2022, The Android Open Source Project
2 //
3 // Licensed under the Apache License, Version 2.0 (the "License");
4 // you may not use this file except in compliance with the License.
5 // You may obtain a copy of the License at
6 //
7 // http://www.apache.org/licenses/LICENSE-2.0
8 //
9 // Unless required by applicable law or agreed to in writing, software
10 // distributed under the License is distributed on an "AS IS" BASIS,
11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 // See the License for the specific language governing permissions and
13 // limitations under the License.
14
15 //! Client library for VirtualizationService.
16
17 mod death_reason;
18 mod error_code;
19 mod errors;
20 mod sync;
21
22 pub use crate::death_reason::DeathReason;
23 pub use crate::error_code::ErrorCode;
24 pub use crate::errors::VmWaitError;
25 use crate::sync::Monitor;
26 use android_system_virtualizationcommon::aidl::android::system::virtualizationcommon::{
27 DeathReason::DeathReason as AidlDeathReason, ErrorCode::ErrorCode as AidlErrorCode,
28 };
29 use android_system_virtualizationservice::{
30 aidl::android::system::virtualizationservice::{
31 IVirtualMachine::IVirtualMachine,
32 IVirtualMachineCallback::{BnVirtualMachineCallback, IVirtualMachineCallback},
33 IVirtualizationService::IVirtualizationService,
34 VirtualMachineConfig::VirtualMachineConfig,
35 VirtualMachineState::VirtualMachineState,
36 },
37 binder::{
38 BinderFeatures, DeathRecipient, FromIBinder, IBinder, Interface, ParcelFileDescriptor,
39 Result as BinderResult, StatusCode, Strong,
40 },
41 };
42 use command_fds::CommandFdExt;
43 use log::warn;
44 use rpcbinder::{FileDescriptorTransportMode, RpcSession};
45 use shared_child::SharedChild;
46 use std::ffi::{c_char, c_int, c_void, CString};
47 use std::io::{self, Read};
48 use std::os::fd::RawFd;
49 use std::process::Command;
50 use std::{
51 fmt::{self, Debug, Formatter},
52 fs::File,
53 os::unix::io::{AsFd, AsRawFd, IntoRawFd, OwnedFd},
54 sync::Arc,
55 time::Duration,
56 };
57
58 const EARLY_VIRTMGR_PATH: &str = "/apex/com.android.virt/bin/early_virtmgr";
59 const VIRTMGR_PATH: &str = "/apex/com.android.virt/bin/virtmgr";
60 const VIRTMGR_THREADS: usize = 2;
61
posix_pipe() -> Result<(OwnedFd, OwnedFd), io::Error>62 fn posix_pipe() -> Result<(OwnedFd, OwnedFd), io::Error> {
63 use nix::fcntl::OFlag;
64 use nix::unistd::pipe2;
65
66 // Create new POSIX pipe. Make it O_CLOEXEC to align with how Rust creates
67 // file descriptors (expected by SharedChild).
68 Ok(pipe2(OFlag::O_CLOEXEC)?)
69 }
70
posix_socketpair() -> Result<(OwnedFd, OwnedFd), io::Error>71 fn posix_socketpair() -> Result<(OwnedFd, OwnedFd), io::Error> {
72 use nix::sys::socket::{socketpair, AddressFamily, SockFlag, SockType};
73
74 // Create new POSIX socketpair, suitable for use with RpcBinder UDS bootstrap
75 // transport. Make it O_CLOEXEC to align with how Rust creates file
76 // descriptors (expected by SharedChild).
77 Ok(socketpair(AddressFamily::Unix, SockType::Stream, None, SockFlag::SOCK_CLOEXEC)?)
78 }
79
80 /// Error handling function for `get_virtualization_service`.
81 ///
82 /// # Safety
83 /// `message` shouldn't be used outside of the lifetime of the function. Management of `ctx` is
84 /// entirely up to the function.
85 pub type ErrorCallback =
86 unsafe extern "C" fn(code: c_int, message: *const c_char, ctx: *mut c_void);
87
88 /// Spawns a new instance of virtmgr and rerturns a file descriptor for the socket connection to
89 /// the service. When error occurs, it is reported via the ErrorCallback function along with the
90 /// error message and any context that is set by the client.
91 ///
92 /// # Safety
93 /// `cb` should be null or a valid function pointer of type `ErrorCallback`
94 #[no_mangle]
get_virtualization_service( cb: Option<ErrorCallback>, ctx: *mut c_void, ) -> RawFd95 pub unsafe extern "C" fn get_virtualization_service(
96 cb: Option<ErrorCallback>,
97 ctx: *mut c_void,
98 ) -> RawFd {
99 match VirtualizationService::new() {
100 Ok(vs) => vs.client_fd.into_raw_fd(),
101 Err(e) => {
102 if let Some(cb) = cb {
103 let code = e.raw_os_error().unwrap_or(-1);
104 let msg = CString::new(e.to_string()).unwrap();
105 // SAFETY: `cb` doesn't use `msg` outside of the lifetime of the function.
106 // msg's lifetime is longer than `cb` as it is bound to a local variable.
107 unsafe { cb(code, msg.as_ptr(), ctx) };
108 }
109 -1
110 }
111 }
112 }
113
114 /// A running instance of virtmgr which is hosting a VirtualizationService
115 /// RpcBinder server.
116 pub struct VirtualizationService {
117 /// Client FD for UDS connection to virtmgr's RpcBinder server. Closing it
118 /// will make virtmgr shut down.
119 client_fd: OwnedFd,
120 }
121
122 impl VirtualizationService {
123 /// Spawns a new instance of virtmgr, a child process that will host
124 /// the VirtualizationService AIDL service.
new() -> Result<VirtualizationService, io::Error>125 pub fn new() -> Result<VirtualizationService, io::Error> {
126 Self::new_with_path(VIRTMGR_PATH)
127 }
128
129 /// Spawns a new instance of early_virtmgr, a child process that will host
130 /// the VirtualizationService AIDL service for early VMs.
new_early() -> Result<VirtualizationService, io::Error>131 pub fn new_early() -> Result<VirtualizationService, io::Error> {
132 Self::new_with_path(EARLY_VIRTMGR_PATH)
133 }
134
new_with_path(virtmgr_path: &str) -> Result<VirtualizationService, io::Error>135 fn new_with_path(virtmgr_path: &str) -> Result<VirtualizationService, io::Error> {
136 let (wait_fd, ready_fd) = posix_pipe()?;
137 let (client_fd, server_fd) = posix_socketpair()?;
138
139 let mut command = Command::new(virtmgr_path);
140 // Can't use BorrowedFd as it doesn't implement Display
141 command.arg("--rpc-server-fd").arg(format!("{}", server_fd.as_raw_fd()));
142 command.arg("--ready-fd").arg(format!("{}", ready_fd.as_raw_fd()));
143 command.preserved_fds(vec![server_fd, ready_fd]);
144
145 SharedChild::spawn(&mut command)?;
146
147 // Wait for the child to signal that the RpcBinder server is read by closing its end of the
148 // pipe. Failing to read (especially EACCESS or EPERM) can happen if the client lacks the
149 // MANAGE_VIRTUAL_MACHINE permission. Therefore, such errors are propagated instead of
150 // being ignored.
151 let _ = File::from(wait_fd).read(&mut [0])?;
152 Ok(VirtualizationService { client_fd })
153 }
154
155 /// Connects to the VirtualizationService AIDL service.
connect(&self) -> Result<Strong<dyn IVirtualizationService>, io::Error>156 pub fn connect(&self) -> Result<Strong<dyn IVirtualizationService>, io::Error> {
157 let session = RpcSession::new();
158 session.set_file_descriptor_transport_mode(FileDescriptorTransportMode::Unix);
159 session.set_max_incoming_threads(VIRTMGR_THREADS);
160 session
161 .setup_unix_domain_bootstrap_client(self.client_fd.as_fd())
162 .map_err(|_| io::Error::from(io::ErrorKind::ConnectionRefused))
163 }
164 }
165
166 /// A virtual machine which has been started by the VirtualizationService.
167 pub struct VmInstance {
168 /// The `IVirtualMachine` Binder object representing the VM.
169 pub vm: Strong<dyn IVirtualMachine>,
170 cid: i32,
171 state: Arc<Monitor<VmState>>,
172 // Ensure that the DeathRecipient isn't dropped while someone might call wait_for_death, as it
173 // is removed from the Binder when it's dropped.
174 _death_recipient: DeathRecipient,
175 }
176
177 /// A trait to be implemented by clients to handle notification of significant changes to the VM
178 /// state. Default implementations of all functions are provided so clients only need to handle the
179 /// notifications they are interested in.
180 #[allow(unused_variables)]
181 pub trait VmCallback {
182 /// Called when the payload has been started within the VM. If present, `stream` is connected
183 /// to the stdin/stdout of the payload.
on_payload_started(&self, cid: i32)184 fn on_payload_started(&self, cid: i32) {}
185
186 /// Callend when the payload has notified Virtualization Service that it is ready to serve
187 /// clients.
on_payload_ready(&self, cid: i32)188 fn on_payload_ready(&self, cid: i32) {}
189
190 /// Called when the payload has exited in the VM. `exit_code` is the exit code of the payload
191 /// process.
on_payload_finished(&self, cid: i32, exit_code: i32)192 fn on_payload_finished(&self, cid: i32, exit_code: i32) {}
193
194 /// Called when an error has occurred in the VM. The `error_code` and `message` may give
195 /// further details.
on_error(&self, cid: i32, error_code: ErrorCode, message: &str)196 fn on_error(&self, cid: i32, error_code: ErrorCode, message: &str) {}
197
198 /// Called when the VM has exited, all resources have been freed, and any logs have been
199 /// written. `death_reason` gives an indication why the VM exited.
on_died(&self, cid: i32, death_reason: DeathReason)200 fn on_died(&self, cid: i32, death_reason: DeathReason) {}
201 }
202
203 impl VmInstance {
204 /// Creates (but doesn't start) a new VM with the given configuration.
create( service: &dyn IVirtualizationService, config: &VirtualMachineConfig, console_out: Option<File>, console_in: Option<File>, log: Option<File>, dump_dt: Option<File>, callback: Option<Box<dyn VmCallback + Send + Sync>>, ) -> BinderResult<Self>205 pub fn create(
206 service: &dyn IVirtualizationService,
207 config: &VirtualMachineConfig,
208 console_out: Option<File>,
209 console_in: Option<File>,
210 log: Option<File>,
211 dump_dt: Option<File>,
212 callback: Option<Box<dyn VmCallback + Send + Sync>>,
213 ) -> BinderResult<Self> {
214 let console_out = console_out.map(ParcelFileDescriptor::new);
215 let console_in = console_in.map(ParcelFileDescriptor::new);
216 let log = log.map(ParcelFileDescriptor::new);
217 let dump_dt = dump_dt.map(ParcelFileDescriptor::new);
218
219 let vm = service.createVm(
220 config,
221 console_out.as_ref(),
222 console_in.as_ref(),
223 log.as_ref(),
224 dump_dt.as_ref(),
225 )?;
226
227 let cid = vm.getCid()?;
228
229 // Register callback before starting VM, in case it dies immediately.
230 let state = Arc::new(Monitor::new(VmState::default()));
231 let callback = BnVirtualMachineCallback::new_binder(
232 VirtualMachineCallback { state: state.clone(), client_callback: callback },
233 BinderFeatures::default(),
234 );
235 vm.registerCallback(&callback)?;
236 let death_recipient = wait_for_binder_death(&mut vm.as_binder(), state.clone())?;
237
238 Ok(Self { vm, cid, state, _death_recipient: death_recipient })
239 }
240
241 /// Starts the VM.
start(&self) -> BinderResult<()>242 pub fn start(&self) -> BinderResult<()> {
243 self.vm.start()
244 }
245
246 /// Stops the VM.
stop(&self) -> BinderResult<()>247 pub fn stop(&self) -> BinderResult<()> {
248 self.vm.stop()
249 }
250
251 /// Returns the CID used for vsock connections to the VM.
cid(&self) -> i32252 pub fn cid(&self) -> i32 {
253 self.cid
254 }
255
256 /// Returns the current lifecycle state of the VM.
state(&self) -> BinderResult<VirtualMachineState>257 pub fn state(&self) -> BinderResult<VirtualMachineState> {
258 self.vm.getState()
259 }
260
261 /// Blocks until the VM or the VirtualizationService itself dies, and then returns the reason
262 /// why it died.
wait_for_death(&self) -> DeathReason263 pub fn wait_for_death(&self) -> DeathReason {
264 self.state.wait_while(|state| state.death_reason.is_none()).unwrap().death_reason.unwrap()
265 }
266
267 /// Blocks until the VM or the VirtualizationService itself dies, or the given timeout expires.
268 /// Returns the reason why it died if it did so.
wait_for_death_with_timeout(&self, timeout: Duration) -> Option<DeathReason>269 pub fn wait_for_death_with_timeout(&self, timeout: Duration) -> Option<DeathReason> {
270 let (state, _timeout_result) =
271 self.state.wait_timeout_while(timeout, |state| state.death_reason.is_none()).unwrap();
272 // We don't care if it timed out - we just return the reason if there now is one
273 state.death_reason
274 }
275
276 /// Waits until the VM reports that it is ready.
277 ///
278 /// Returns an error if the VM dies first, or the `timeout` elapses before the VM is ready.
wait_until_ready(&self, timeout: Duration) -> Result<(), VmWaitError>279 pub fn wait_until_ready(&self, timeout: Duration) -> Result<(), VmWaitError> {
280 let (state, timeout_result) = self
281 .state
282 .wait_timeout_while(timeout, |state| {
283 state.reported_state < VirtualMachineState::READY && state.death_reason.is_none()
284 })
285 .unwrap();
286 if timeout_result.timed_out() {
287 Err(VmWaitError::TimedOut)
288 } else if let Some(reason) = state.death_reason {
289 Err(VmWaitError::Died { reason })
290 } else if state.reported_state != VirtualMachineState::READY {
291 Err(VmWaitError::Finished)
292 } else {
293 Ok(())
294 }
295 }
296
297 /// Tries to connect to an RPC Binder service provided by the VM on the given vsock port.
connect_service<T: FromIBinder + ?Sized>( &self, port: u32, ) -> Result<Strong<T>, StatusCode>298 pub fn connect_service<T: FromIBinder + ?Sized>(
299 &self,
300 port: u32,
301 ) -> Result<Strong<T>, StatusCode> {
302 RpcSession::new().setup_preconnected_client(|| {
303 match self.vm.connectVsock(port as i32) {
304 Ok(vsock) => {
305 // Ownership of the fd is transferred to binder
306 Some(vsock.into_raw_fd())
307 }
308 Err(e) => {
309 warn!("Vsock connection failed: {}", e);
310 None
311 }
312 }
313 })
314 }
315 }
316
317 impl Debug for VmInstance {
fmt(&self, f: &mut Formatter) -> fmt::Result318 fn fmt(&self, f: &mut Formatter) -> fmt::Result {
319 f.debug_struct("VmInstance").field("cid", &self.cid).field("state", &self.state).finish()
320 }
321 }
322
323 /// Notify the VmState when the given Binder object dies.
324 ///
325 /// If the returned DeathRecipient is dropped then this will no longer do anything.
wait_for_binder_death( binder: &mut impl IBinder, state: Arc<Monitor<VmState>>, ) -> BinderResult<DeathRecipient>326 fn wait_for_binder_death(
327 binder: &mut impl IBinder,
328 state: Arc<Monitor<VmState>>,
329 ) -> BinderResult<DeathRecipient> {
330 let mut death_recipient = DeathRecipient::new(move || {
331 warn!("VirtualizationService unexpectedly died");
332 state.notify_death(DeathReason::VirtualizationServiceDied);
333 });
334 binder.link_to_death(&mut death_recipient)?;
335 Ok(death_recipient)
336 }
337
338 #[derive(Debug, Default)]
339 struct VmState {
340 death_reason: Option<DeathReason>,
341 reported_state: VirtualMachineState,
342 }
343
344 impl Monitor<VmState> {
notify_death(&self, reason: DeathReason)345 fn notify_death(&self, reason: DeathReason) {
346 let state = &mut *self.state.lock().unwrap();
347 // In case this method is called more than once, ignore subsequent calls.
348 if state.death_reason.is_none() {
349 state.death_reason.replace(reason);
350 self.cv.notify_all();
351 }
352 }
353
notify_state(&self, state: VirtualMachineState)354 fn notify_state(&self, state: VirtualMachineState) {
355 self.state.lock().unwrap().reported_state = state;
356 self.cv.notify_all();
357 }
358 }
359
360 struct VirtualMachineCallback {
361 state: Arc<Monitor<VmState>>,
362 client_callback: Option<Box<dyn VmCallback + Send + Sync>>,
363 }
364
365 impl Debug for VirtualMachineCallback {
fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result366 fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result {
367 fmt.debug_struct("VirtualMachineCallback")
368 .field("state", &self.state)
369 .field(
370 "client_callback",
371 &if self.client_callback.is_some() { "Some(...)" } else { "None" },
372 )
373 .finish()
374 }
375 }
376
377 impl Interface for VirtualMachineCallback {}
378
379 impl IVirtualMachineCallback for VirtualMachineCallback {
onPayloadStarted(&self, cid: i32) -> BinderResult<()>380 fn onPayloadStarted(&self, cid: i32) -> BinderResult<()> {
381 self.state.notify_state(VirtualMachineState::STARTED);
382 if let Some(ref callback) = self.client_callback {
383 callback.on_payload_started(cid);
384 }
385 Ok(())
386 }
387
onPayloadReady(&self, cid: i32) -> BinderResult<()>388 fn onPayloadReady(&self, cid: i32) -> BinderResult<()> {
389 self.state.notify_state(VirtualMachineState::READY);
390 if let Some(ref callback) = self.client_callback {
391 callback.on_payload_ready(cid);
392 }
393 Ok(())
394 }
395
onPayloadFinished(&self, cid: i32, exit_code: i32) -> BinderResult<()>396 fn onPayloadFinished(&self, cid: i32, exit_code: i32) -> BinderResult<()> {
397 self.state.notify_state(VirtualMachineState::FINISHED);
398 if let Some(ref callback) = self.client_callback {
399 callback.on_payload_finished(cid, exit_code);
400 }
401 Ok(())
402 }
403
onError(&self, cid: i32, error_code: AidlErrorCode, message: &str) -> BinderResult<()>404 fn onError(&self, cid: i32, error_code: AidlErrorCode, message: &str) -> BinderResult<()> {
405 self.state.notify_state(VirtualMachineState::FINISHED);
406 if let Some(ref callback) = self.client_callback {
407 let error_code = error_code.into();
408 callback.on_error(cid, error_code, message);
409 }
410 Ok(())
411 }
412
onDied(&self, cid: i32, reason: AidlDeathReason) -> BinderResult<()>413 fn onDied(&self, cid: i32, reason: AidlDeathReason) -> BinderResult<()> {
414 let reason = reason.into();
415 self.state.notify_death(reason);
416 if let Some(ref callback) = self.client_callback {
417 callback.on_died(cid, reason);
418 }
419 Ok(())
420 }
421 }
422