Andrew Walbran | f395b82 | 2021-05-05 10:38:59 +0000 | [diff] [blame] | 1 | // Copyright 2021, The Android Open Source Project |
| 2 | // |
| 3 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 4 | // you may not use this file except in compliance with the License. |
| 5 | // You may obtain a copy of the License at |
| 6 | // |
| 7 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 8 | // |
| 9 | // Unless required by applicable law or agreed to in writing, software |
| 10 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 11 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 12 | // See the License for the specific language governing permissions and |
| 13 | // limitations under the License. |
| 14 | |
| 15 | //! Command to run a VM. |
| 16 | |
Andrew Walbran | 3a5a921 | 2021-05-04 17:09:08 +0000 | [diff] [blame^] | 17 | use crate::config::VmConfig; |
Andrew Walbran | f395b82 | 2021-05-05 10:38:59 +0000 | [diff] [blame] | 18 | use crate::sync::AtomicFlag; |
| 19 | use android_system_virtmanager::aidl::android::system::virtmanager::IVirtManager::IVirtManager; |
| 20 | use android_system_virtmanager::aidl::android::system::virtmanager::IVirtualMachine::IVirtualMachine; |
| 21 | use android_system_virtmanager::aidl::android::system::virtmanager::IVirtualMachineCallback::{ |
| 22 | BnVirtualMachineCallback, IVirtualMachineCallback, |
| 23 | }; |
| 24 | use android_system_virtmanager::binder::{ |
| 25 | BinderFeatures, DeathRecipient, IBinder, ParcelFileDescriptor, Strong, |
| 26 | }; |
| 27 | use android_system_virtmanager::binder::{Interface, Result as BinderResult}; |
| 28 | use anyhow::{Context, Error}; |
| 29 | use std::fs::File; |
| 30 | use std::io; |
| 31 | use std::os::unix::io::{AsRawFd, FromRawFd}; |
| 32 | use std::path::Path; |
| 33 | |
| 34 | /// Run a VM from the given configuration file. |
| 35 | pub fn command_run( |
| 36 | virt_manager: Strong<dyn IVirtManager>, |
| 37 | config_path: &Path, |
| 38 | daemonize: bool, |
| 39 | ) -> Result<(), Error> { |
Andrew Walbran | 3a5a921 | 2021-05-04 17:09:08 +0000 | [diff] [blame^] | 40 | let config_file = File::open(config_path).context("Failed to open config file")?; |
| 41 | let config = |
| 42 | VmConfig::load(&config_file).context("Failed to parse config file")?.to_parcelable()?; |
| 43 | let stdout = |
| 44 | if daemonize { None } else { Some(ParcelFileDescriptor::new(duplicate_stdout()?)) }; |
| 45 | let vm = virt_manager.startVm(&config, stdout.as_ref()).context("Failed to start VM")?; |
Andrew Walbran | f395b82 | 2021-05-05 10:38:59 +0000 | [diff] [blame] | 46 | |
| 47 | let cid = vm.getCid().context("Failed to get CID")?; |
Andrew Walbran | 3a5a921 | 2021-05-04 17:09:08 +0000 | [diff] [blame^] | 48 | println!("Started VM from {:?} with CID {}.", config_path, cid); |
Andrew Walbran | f395b82 | 2021-05-05 10:38:59 +0000 | [diff] [blame] | 49 | |
| 50 | if daemonize { |
| 51 | // Pass the VM reference back to Virt Manager and have it hold it in the background. |
| 52 | virt_manager.debugHoldVmRef(&vm).context("Failed to pass VM to Virt Manager") |
| 53 | } else { |
| 54 | // Wait until the VM or VirtManager dies. If we just returned immediately then the |
| 55 | // IVirtualMachine Binder object would be dropped and the VM would be killed. |
| 56 | wait_for_vm(vm) |
| 57 | } |
| 58 | } |
| 59 | |
| 60 | /// Wait until the given VM or the VirtManager itself dies. |
| 61 | fn wait_for_vm(vm: Strong<dyn IVirtualMachine>) -> Result<(), Error> { |
| 62 | let dead = AtomicFlag::default(); |
| 63 | let callback = BnVirtualMachineCallback::new_binder( |
| 64 | VirtualMachineCallback { dead: dead.clone() }, |
| 65 | BinderFeatures::default(), |
| 66 | ); |
| 67 | vm.registerCallback(&callback)?; |
| 68 | let death_recipient = wait_for_death(&mut vm.as_binder(), dead.clone())?; |
| 69 | dead.wait(); |
| 70 | // Ensure that death_recipient isn't dropped before we wait on the flag, as it is removed |
| 71 | // from the Binder when it's dropped. |
| 72 | drop(death_recipient); |
| 73 | Ok(()) |
| 74 | } |
| 75 | |
| 76 | /// Raise the given flag when the given Binder object dies. |
| 77 | /// |
| 78 | /// If the returned DeathRecipient is dropped then this will no longer do anything. |
| 79 | fn wait_for_death(binder: &mut impl IBinder, dead: AtomicFlag) -> Result<DeathRecipient, Error> { |
| 80 | let mut death_recipient = DeathRecipient::new(move || { |
| 81 | println!("VirtManager died"); |
| 82 | dead.raise(); |
| 83 | }); |
| 84 | binder.link_to_death(&mut death_recipient)?; |
| 85 | Ok(death_recipient) |
| 86 | } |
| 87 | |
| 88 | #[derive(Debug)] |
| 89 | struct VirtualMachineCallback { |
| 90 | dead: AtomicFlag, |
| 91 | } |
| 92 | |
| 93 | impl Interface for VirtualMachineCallback {} |
| 94 | |
| 95 | impl IVirtualMachineCallback for VirtualMachineCallback { |
| 96 | fn onDied(&self, _cid: i32) -> BinderResult<()> { |
| 97 | println!("VM died"); |
| 98 | self.dead.raise(); |
| 99 | Ok(()) |
| 100 | } |
| 101 | } |
| 102 | |
| 103 | /// Safely duplicate the standard output file descriptor. |
| 104 | fn duplicate_stdout() -> io::Result<File> { |
| 105 | let stdout_fd = io::stdout().as_raw_fd(); |
| 106 | // Safe because this just duplicates a file descriptor which we know to be valid, and we check |
| 107 | // for an error. |
| 108 | let dup_fd = unsafe { libc::dup(stdout_fd) }; |
| 109 | if dup_fd < 0 { |
| 110 | Err(io::Error::last_os_error()) |
| 111 | } else { |
| 112 | // Safe because we have just duplicated the file descriptor so we own it, and `from_raw_fd` |
| 113 | // takes ownership of it. |
| 114 | Ok(unsafe { File::from_raw_fd(dup_fd) }) |
| 115 | } |
| 116 | } |