| /* |
| * Copyright (C) 2021 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include "host/commands/run_cvd/boot_state_machine.h" |
| |
| #include <poll.h> |
| |
| #include <memory> |
| #include <thread> |
| |
| #include <android-base/logging.h> |
| #include <gflags/gflags.h> |
| |
| #include "common/libs/fs/shared_fd.h" |
| #include "common/libs/utils/tee_logging.h" |
| #include "host/commands/kernel_log_monitor/kernel_log_server.h" |
| #include "host/commands/kernel_log_monitor/utils.h" |
| #include "host/commands/run_cvd/runner_defs.h" |
| #include "host/libs/config/feature.h" |
| |
| DEFINE_int32(reboot_notification_fd, -1, |
| "A file descriptor to notify when boot completes."); |
| |
| namespace cuttlefish { |
| namespace { |
| |
| // Forks and returns the write end of a pipe to the child process. The parent |
| // process waits for boot events to come through the pipe and exits accordingly. |
| SharedFD DaemonizeLauncher(const CuttlefishConfig& config) { |
| auto instance = config.ForDefaultInstance(); |
| SharedFD read_end, write_end; |
| if (!SharedFD::Pipe(&read_end, &write_end)) { |
| LOG(ERROR) << "Unable to create pipe"; |
| return {}; // a closed FD |
| } |
| auto pid = fork(); |
| if (pid) { |
| // Explicitly close here, otherwise we may end up reading forever if the |
| // child process dies. |
| write_end->Close(); |
| RunnerExitCodes exit_code; |
| auto bytes_read = read_end->Read(&exit_code, sizeof(exit_code)); |
| if (bytes_read != sizeof(exit_code)) { |
| LOG(ERROR) << "Failed to read a complete exit code, read " << bytes_read |
| << " bytes only instead of the expected " << sizeof(exit_code); |
| exit_code = RunnerExitCodes::kPipeIOError; |
| } else if (exit_code == RunnerExitCodes::kSuccess) { |
| LOG(INFO) << "Virtual device booted successfully"; |
| } else if (exit_code == RunnerExitCodes::kVirtualDeviceBootFailed) { |
| LOG(ERROR) << "Virtual device failed to boot"; |
| } else { |
| LOG(ERROR) << "Unexpected exit code: " << exit_code; |
| } |
| if (exit_code == RunnerExitCodes::kSuccess) { |
| LOG(INFO) << kBootCompletedMessage; |
| } else { |
| LOG(INFO) << kBootFailedMessage; |
| } |
| std::exit(exit_code); |
| } else { |
| // The child returns the write end of the pipe |
| if (daemon(/*nochdir*/ 1, /*noclose*/ 1) != 0) { |
| LOG(ERROR) << "Failed to daemonize child process: " << strerror(errno); |
| std::exit(RunnerExitCodes::kDaemonizationError); |
| } |
| // Redirect standard I/O |
| auto log_path = instance.launcher_log_path(); |
| auto log = SharedFD::Open(log_path.c_str(), O_CREAT | O_WRONLY | O_APPEND, |
| S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP); |
| if (!log->IsOpen()) { |
| LOG(ERROR) << "Failed to create launcher log file: " << log->StrError(); |
| std::exit(RunnerExitCodes::kDaemonizationError); |
| } |
| ::android::base::SetLogger( |
| TeeLogger({{LogFileSeverity(), log, MetadataLevel::FULL}})); |
| auto dev_null = SharedFD::Open("/dev/null", O_RDONLY); |
| if (!dev_null->IsOpen()) { |
| LOG(ERROR) << "Failed to open /dev/null: " << dev_null->StrError(); |
| std::exit(RunnerExitCodes::kDaemonizationError); |
| } |
| if (dev_null->UNMANAGED_Dup2(0) < 0) { |
| LOG(ERROR) << "Failed dup2 stdin: " << dev_null->StrError(); |
| std::exit(RunnerExitCodes::kDaemonizationError); |
| } |
| if (log->UNMANAGED_Dup2(1) < 0) { |
| LOG(ERROR) << "Failed dup2 stdout: " << log->StrError(); |
| std::exit(RunnerExitCodes::kDaemonizationError); |
| } |
| if (log->UNMANAGED_Dup2(2) < 0) { |
| LOG(ERROR) << "Failed dup2 seterr: " << log->StrError(); |
| std::exit(RunnerExitCodes::kDaemonizationError); |
| } |
| |
| read_end->Close(); |
| return write_end; |
| } |
| } |
| |
| class ProcessLeader : public SetupFeature { |
| public: |
| INJECT(ProcessLeader(const CuttlefishConfig& config)) : config_(config) {} |
| |
| SharedFD ForegroundLauncherPipe() { return foreground_launcher_pipe_; } |
| |
| // SetupFeature |
| std::string Name() const override { return "ProcessLeader"; } |
| bool Enabled() const override { return true; } |
| |
| private: |
| std::unordered_set<SetupFeature*> Dependencies() const override { return {}; } |
| bool Setup() override { |
| /* These two paths result in pretty different process state, but both |
| * achieve the same goal of making the current process the leader of a |
| * process group, and are therefore grouped together. */ |
| if (config_.run_as_daemon()) { |
| foreground_launcher_pipe_ = DaemonizeLauncher(config_); |
| if (!foreground_launcher_pipe_->IsOpen()) { |
| return false; |
| } |
| } else { |
| // Make sure the launcher runs in its own process group even when running |
| // in the foreground |
| if (getsid(0) != getpid()) { |
| int retval = setpgid(0, 0); |
| if (retval) { |
| PLOG(ERROR) << "Failed to create new process group: "; |
| return false; |
| } |
| } |
| } |
| return true; |
| } |
| |
| const CuttlefishConfig& config_; |
| SharedFD foreground_launcher_pipe_; |
| }; |
| |
| // Maintains the state of the boot process, once a final state is reached |
| // (success or failure) it sends the appropriate exit code to the foreground |
| // launcher process |
| class CvdBootStateMachine : public SetupFeature { |
| public: |
| INJECT(CvdBootStateMachine(ProcessLeader& process_leader, |
| KernelLogPipeProvider& kernel_log_pipe_provider)) |
| : process_leader_(process_leader), |
| kernel_log_pipe_provider_(kernel_log_pipe_provider), |
| state_(kBootStarted) {} |
| |
| ~CvdBootStateMachine() { |
| if (interrupt_fd_->IsOpen()) { |
| CHECK(interrupt_fd_->EventfdWrite(1) >= 0); |
| } |
| if (boot_event_handler_.joinable()) { |
| boot_event_handler_.join(); |
| } |
| } |
| |
| // SetupFeature |
| std::string Name() const override { return "CvdBootStateMachine"; } |
| bool Enabled() const override { return true; } |
| |
| private: |
| std::unordered_set<SetupFeature*> Dependencies() const { |
| return { |
| static_cast<SetupFeature*>(&process_leader_), |
| static_cast<SetupFeature*>(&kernel_log_pipe_provider_), |
| }; |
| } |
| bool Setup() override { |
| interrupt_fd_ = SharedFD::Event(); |
| if (!interrupt_fd_->IsOpen()) { |
| LOG(ERROR) << "Failed to open eventfd: " << interrupt_fd_->StrError(); |
| return false; |
| } |
| fg_launcher_pipe_ = process_leader_.ForegroundLauncherPipe(); |
| if (FLAGS_reboot_notification_fd >= 0) { |
| reboot_notification_ = SharedFD::Dup(FLAGS_reboot_notification_fd); |
| if (!reboot_notification_->IsOpen()) { |
| LOG(ERROR) << "Could not dup fd given for reboot_notification_fd"; |
| return false; |
| } |
| close(FLAGS_reboot_notification_fd); |
| } |
| SharedFD boot_events_pipe = kernel_log_pipe_provider_.KernelLogPipe(); |
| if (!boot_events_pipe->IsOpen()) { |
| LOG(ERROR) << "Could not get boot events pipe"; |
| return false; |
| } |
| boot_event_handler_ = std::thread( |
| [this, boot_events_pipe]() { ThreadLoop(boot_events_pipe); }); |
| return true; |
| } |
| |
| void ThreadLoop(SharedFD boot_events_pipe) { |
| while (true) { |
| std::vector<PollSharedFd> poll_shared_fd = { |
| { |
| .fd = boot_events_pipe, |
| .events = POLLIN | POLLHUP, |
| }, |
| { |
| .fd = interrupt_fd_, |
| .events = POLLIN | POLLHUP, |
| }}; |
| int result = SharedFD::Poll(poll_shared_fd, -1); |
| if (poll_shared_fd[1].revents & POLLIN) { |
| return; |
| } |
| if (result < 0) { |
| PLOG(FATAL) << "Failed to call Select"; |
| return; |
| } |
| if (poll_shared_fd[0].revents & POLLHUP) { |
| LOG(ERROR) << "Failed to read a complete kernel log boot event."; |
| state_ |= kGuestBootFailed; |
| if (MaybeWriteNotification()) { |
| break; |
| } |
| } |
| if (!(poll_shared_fd[0].revents & POLLIN)) { |
| continue; |
| } |
| auto sent_code = OnBootEvtReceived(boot_events_pipe); |
| if (sent_code) { |
| break; |
| } |
| } |
| } |
| |
| // Returns true if the machine is left in a final state |
| bool OnBootEvtReceived(SharedFD boot_events_pipe) { |
| std::optional<monitor::ReadEventResult> read_result = |
| monitor::ReadEvent(boot_events_pipe); |
| if (!read_result) { |
| LOG(ERROR) << "Failed to read a complete kernel log boot event."; |
| state_ |= kGuestBootFailed; |
| return MaybeWriteNotification(); |
| } |
| |
| if (read_result->event == monitor::Event::BootCompleted) { |
| LOG(INFO) << "Virtual device booted successfully"; |
| state_ |= kGuestBootCompleted; |
| } else if (read_result->event == monitor::Event::BootFailed) { |
| LOG(ERROR) << "Virtual device failed to boot"; |
| state_ |= kGuestBootFailed; |
| } // Ignore the other signals |
| |
| return MaybeWriteNotification(); |
| } |
| bool BootCompleted() const { return state_ & kGuestBootCompleted; } |
| bool BootFailed() const { return state_ & kGuestBootFailed; } |
| |
| void SendExitCode(RunnerExitCodes exit_code, SharedFD fd) { |
| fd->Write(&exit_code, sizeof(exit_code)); |
| // The foreground process will exit after receiving the exit code, if we try |
| // to write again we'll get a SIGPIPE |
| fd->Close(); |
| } |
| bool MaybeWriteNotification() { |
| std::vector<SharedFD> fds = {reboot_notification_, fg_launcher_pipe_}; |
| for (auto& fd : fds) { |
| if (fd->IsOpen()) { |
| if (BootCompleted()) { |
| SendExitCode(RunnerExitCodes::kSuccess, fd); |
| } else if (state_ & kGuestBootFailed) { |
| SendExitCode(RunnerExitCodes::kVirtualDeviceBootFailed, fd); |
| } |
| } |
| } |
| // Either we sent the code before or just sent it, in any case the state is |
| // final |
| return BootCompleted() || (state_ & kGuestBootFailed); |
| } |
| |
| ProcessLeader& process_leader_; |
| KernelLogPipeProvider& kernel_log_pipe_provider_; |
| |
| std::thread boot_event_handler_; |
| SharedFD fg_launcher_pipe_; |
| SharedFD reboot_notification_; |
| SharedFD interrupt_fd_; |
| int state_; |
| static const int kBootStarted = 0; |
| static const int kGuestBootCompleted = 1 << 0; |
| static const int kGuestBootFailed = 1 << 1; |
| }; |
| |
| } // namespace |
| |
| fruit::Component<fruit::Required<const CuttlefishConfig, KernelLogPipeProvider>> |
| bootStateMachineComponent() { |
| return fruit::createComponent() |
| .addMultibinding<SetupFeature, ProcessLeader>() |
| .addMultibinding<SetupFeature, CvdBootStateMachine>(); |
| } |
| |
| } // namespace cuttlefish |