// Copyright 2021, The Android Open Source Project // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. //! Implementation of the AIDL interface of the Virt Manager. use crate::config::VmConfig; use crate::crosvm::VmInstance; use crate::{Cid, FIRST_GUEST_CID}; use android_system_virtmanager::aidl::android::system::virtmanager::IVirtManager::IVirtManager; use android_system_virtmanager::aidl::android::system::virtmanager::IVirtualMachine::{ BnVirtualMachine, IVirtualMachine, }; use android_system_virtmanager::aidl::android::system::virtmanager::IVirtualMachineCallback::IVirtualMachineCallback; use android_system_virtmanager::aidl::android::system::virtmanager::VirtualMachineDebugInfo::VirtualMachineDebugInfo; use android_system_virtmanager::binder::{ self, BinderFeatures, Interface, ParcelFileDescriptor, StatusCode, Strong, ThreadState, }; use log::{debug, error}; use std::fs::File; use std::sync::{Arc, Mutex, Weak}; pub const BINDER_SERVICE_IDENTIFIER: &str = "android.system.virtmanager"; // TODO(qwandor): Use PermissionController once it is available to Rust. /// Only processes running with one of these UIDs are allowed to call debug methods. const DEBUG_ALLOWED_UIDS: [u32; 2] = [0, 2000]; /// Implementation of `IVirtManager`, the entry point of the AIDL service. #[derive(Debug, Default)] pub struct VirtManager { state: Mutex, } impl Interface for VirtManager {} impl IVirtManager for VirtManager { /// Create and start a new VM with the given configuration, assigning it the next available CID. /// /// Returns a binder `IVirtualMachine` object referring to it, as a handle for the client. fn startVm( &self, config_fd: &ParcelFileDescriptor, log_fd: Option<&ParcelFileDescriptor>, ) -> binder::Result> { let state = &mut *self.state.lock().unwrap(); let log_fd = log_fd .map(|fd| fd.as_ref().try_clone().map_err(|_| StatusCode::UNKNOWN_ERROR)) .transpose()?; let requester_uid = ThreadState::get_calling_uid(); let requester_sid = ThreadState::with_calling_sid(|sid| { if let Some(sid) = sid { match sid.to_str() { Ok(sid) => Ok(sid.to_owned()), Err(e) => { error!("SID was not valid UTF-8: {:?}", e); Err(StatusCode::BAD_VALUE) } } } else { error!("Missing SID on startVm"); Err(StatusCode::UNKNOWN_ERROR) } })?; let requester_debug_pid = ThreadState::get_calling_pid(); let cid = state.allocate_cid()?; let instance = start_vm( config_fd.as_ref(), cid, log_fd, requester_uid, requester_sid, requester_debug_pid, )?; state.add_vm(Arc::downgrade(&instance)); Ok(VirtualMachine::create(instance)) } /// Get a list of all currently running VMs. This method is only intended for debug purposes, /// and as such is only permitted from the shell user. fn debugListVms(&self) -> binder::Result> { if !debug_access_allowed() { return Err(StatusCode::PERMISSION_DENIED.into()); } let state = &mut *self.state.lock().unwrap(); let vms = state.vms(); let cids = vms .into_iter() .map(|vm| VirtualMachineDebugInfo { cid: vm.cid as i32, requesterUid: vm.requester_uid as i32, requesterSid: vm.requester_sid.clone(), requesterPid: vm.requester_debug_pid, running: vm.running(), }) .collect(); Ok(cids) } /// Hold a strong reference to a VM in Virt Manager. This method is only intended for debug /// purposes, and as such is only permitted from the shell user. fn debugHoldVmRef(&self, vmref: &Strong) -> binder::Result<()> { if !debug_access_allowed() { return Err(StatusCode::PERMISSION_DENIED.into()); } let state = &mut *self.state.lock().unwrap(); state.debug_hold_vm(vmref.clone()); Ok(()) } /// Drop reference to a VM that is being held by Virt Manager. Returns the reference if VM was /// found and None otherwise. This method is only intended for debug purposes, and as such is /// only permitted from the shell user. fn debugDropVmRef(&self, cid: i32) -> binder::Result>> { if !debug_access_allowed() { return Err(StatusCode::PERMISSION_DENIED.into()); } let state = &mut *self.state.lock().unwrap(); Ok(state.debug_drop_vm(cid)) } } /// Check whether the caller of the current Binder method is allowed to call debug methods. fn debug_access_allowed() -> bool { let uid = ThreadState::get_calling_uid(); log::trace!("Debug method call from UID {}.", uid); DEBUG_ALLOWED_UIDS.contains(&uid) } /// Implementation of the AIDL `IVirtualMachine` interface. Used as a handle to a VM. #[derive(Debug)] struct VirtualMachine { instance: Arc, } impl VirtualMachine { fn create(instance: Arc) -> Strong { let binder = VirtualMachine { instance }; BnVirtualMachine::new_binder(binder, BinderFeatures::default()) } } impl Interface for VirtualMachine {} impl IVirtualMachine for VirtualMachine { fn getCid(&self) -> binder::Result { Ok(self.instance.cid as i32) } fn isRunning(&self) -> binder::Result { Ok(self.instance.running()) } fn registerCallback( &self, callback: &Strong, ) -> binder::Result<()> { // TODO: Should this give an error if the VM is already dead? self.instance.callbacks.add(callback.clone()); Ok(()) } } impl Drop for VirtualMachine { fn drop(&mut self) { debug!("Dropping {:?}", self); self.instance.kill(); } } /// A set of Binders to be called back in response to various events on the VM, such as when it /// dies. #[derive(Debug, Default)] pub struct VirtualMachineCallbacks(Mutex>>); impl VirtualMachineCallbacks { /// Call all registered callbacks to say that the VM has died. pub fn callback_on_died(&self, cid: Cid) { let callbacks = &*self.0.lock().unwrap(); for callback in callbacks { if let Err(e) = callback.onDied(cid as i32) { error!("Error calling callback: {}", e); } } } /// Add a new callback to the set. fn add(&self, callback: Strong) { self.0.lock().unwrap().push(callback); } } /// The mutable state of the Virt Manager. There should only be one instance of this struct. #[derive(Debug)] struct State { /// The next available unused CID. next_cid: Cid, /// The VMs which have been started. When VMs are started a weak reference is added to this list /// while a strong reference is returned to the caller over Binder. Once all copies of the /// Binder client are dropped the weak reference here will become invalid, and will be removed /// from the list opportunistically the next time `add_vm` is called. vms: Vec>, /// Vector of strong VM references held on behalf of users that cannot hold them themselves. /// This is only used for debugging purposes. debug_held_vms: Vec>, } impl State { /// Get a list of VMs which still have Binder references to them. fn vms(&self) -> Vec> { // Attempt to upgrade the weak pointers to strong pointers. self.vms.iter().filter_map(Weak::upgrade).collect() } /// Add a new VM to the list. fn add_vm(&mut self, vm: Weak) { // Garbage collect any entries from the stored list which no longer exist. self.vms.retain(|vm| vm.strong_count() > 0); // Actually add the new VM. self.vms.push(vm); } /// Store a strong VM reference. fn debug_hold_vm(&mut self, vm: Strong) { self.debug_held_vms.push(vm); } /// Retrieve and remove a strong VM reference. fn debug_drop_vm(&mut self, cid: i32) -> Option> { let pos = self.debug_held_vms.iter().position(|vm| vm.getCid() == Ok(cid))?; Some(self.debug_held_vms.swap_remove(pos)) } /// Get the next available CID, or an error if we have run out. fn allocate_cid(&mut self) -> binder::Result { // TODO(qwandor): keep track of which CIDs are currently in use so that we can reuse them. let cid = self.next_cid; self.next_cid = self.next_cid.checked_add(1).ok_or(StatusCode::UNKNOWN_ERROR)?; Ok(cid) } } impl Default for State { fn default() -> Self { State { next_cid: FIRST_GUEST_CID, vms: vec![], debug_held_vms: vec![] } } } /// Start a new VM instance from the given VM config file. This assumes the VM is not already /// running. fn start_vm( config_file: &File, cid: Cid, log_fd: Option, requester_uid: u32, requester_sid: String, requester_debug_pid: i32, ) -> binder::Result> { let config = VmConfig::load(config_file).map_err(|e| { error!("Failed to load VM config from {:?}: {:?}", config_file, e); StatusCode::BAD_VALUE })?; Ok(VmInstance::start(&config, cid, log_fd, requester_uid, requester_sid, requester_debug_pid) .map_err(|e| { error!("Failed to start VM from {:?}: {:?}", config_file, e); StatusCode::UNKNOWN_ERROR })?) }