1 /*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #include <sys/types.h>
18
19 #include <cinttypes>
20 #include <csignal>
21 #include <cstdio>
22 #include <cstdlib>
23 #include <iostream>
24 #include <string>
25 #include <vector>
26
27 #include <android-base/strings.h>
28 #include <android-base/logging.h>
29
30 #include "common/libs/fs/shared_fd.h"
31 #include "common/libs/utils/files.h"
32 #include "common/libs/utils/flag_parser.h"
33 #include "common/libs/utils/result.h"
34 #include "host/commands/run_cvd/runner_defs.h"
35 #include "host/libs/allocd/request.h"
36 #include "host/libs/allocd/utils.h"
37 #include "host/libs/command_util/util.h"
38 #include "host/libs/config/cuttlefish_config.h"
39
40 namespace cuttlefish {
41 namespace {
42
FallbackDirs()43 std::set<std::string> FallbackDirs() {
44 std::set<std::string> paths;
45 std::string parent_path = StringFromEnv("HOME", ".");
46 paths.insert(parent_path + "/cuttlefish_assembly");
47
48 std::unique_ptr<DIR, int(*)(DIR*)> dir(opendir(parent_path.c_str()), closedir);
49 for (auto entity = readdir(dir.get()); entity != nullptr; entity = readdir(dir.get())) {
50 std::string subdir(entity->d_name);
51 if (!android::base::StartsWith(subdir, "cuttlefish_runtime.")) {
52 continue;
53 }
54 paths.insert(parent_path + "/" + subdir);
55 }
56 return paths;
57 }
58
DirsForInstance(const CuttlefishConfig & config,const CuttlefishConfig::InstanceSpecific instance)59 std::set<std::string> DirsForInstance(
60 const CuttlefishConfig& config,
61 const CuttlefishConfig::InstanceSpecific instance) {
62 return {
63 config.assembly_dir(),
64 instance.instance_dir(),
65 instance.instance_uds_dir(),
66 };
67 }
68
69 // Gets a set of the possible process groups of a previous launch
GetCandidateProcessGroups(const std::set<std::string> & dirs)70 std::set<pid_t> GetCandidateProcessGroups(const std::set<std::string>& dirs) {
71 std::stringstream cmd;
72 cmd << "lsof -t 2>/dev/null";
73 for (const auto& dir : dirs) {
74 cmd << " +D " << dir;
75 }
76 std::string cmd_str = cmd.str();
77 std::shared_ptr<FILE> cmd_out(popen(cmd_str.c_str(), "r"), pclose);
78 if (!cmd_out) {
79 LOG(ERROR) << "Unable to execute '" << cmd_str << "': " << strerror(errno);
80 return {};
81 }
82 int64_t pid;
83 std::set<pid_t> ret{};
84 while(fscanf(cmd_out.get(), "%" PRId64, &pid) != EOF) {
85 pid_t pgid = getpgid(static_cast<pid_t>(pid));
86 if (pgid < 0) {
87 LOG(ERROR) << "Unable to get process group of " << pid << ": "
88 << strerror(errno);
89 continue;
90 }
91 ret.insert(pgid);
92 }
93 // The process group of stop_cvd should not be killed
94 ret.erase(getpgrp());
95 return ret;
96 }
97
FallBackStop(const std::set<std::string> & dirs)98 int FallBackStop(const std::set<std::string>& dirs) {
99 auto exit_code = 1; // Having to fallback is an error
100
101 auto process_groups = GetCandidateProcessGroups(dirs);
102 for (auto pgid: process_groups) {
103 LOG(INFO) << "Sending SIGKILL to process group " << pgid;
104 auto retval = killpg(pgid, SIGKILL);
105 if (retval < 0) {
106 LOG(ERROR) << "Failed to kill process group " << pgid << ": "
107 << strerror(errno);
108 exit_code |= 4;
109 }
110 }
111
112 return exit_code;
113 }
114
CleanStopInstance(const CuttlefishConfig::InstanceSpecific & instance_config,const std::int32_t wait_for_launcher)115 Result<void> CleanStopInstance(
116 const CuttlefishConfig::InstanceSpecific& instance_config,
117 const std::int32_t wait_for_launcher) {
118 SharedFD monitor_socket = CF_EXPECT(
119 GetLauncherMonitorFromInstance(instance_config, wait_for_launcher));
120
121 LOG(INFO) << "Requesting stop";
122 CF_EXPECT(WriteLauncherAction(monitor_socket, LauncherAction::kStop));
123 CF_EXPECT(WaitForRead(monitor_socket, wait_for_launcher));
124 LauncherResponse stop_response =
125 CF_EXPECT(ReadLauncherResponse(monitor_socket));
126 CF_EXPECT(
127 stop_response == LauncherResponse::kSuccess,
128 "Received `" << static_cast<char>(stop_response)
129 << "` response from launcher monitor for status request");
130
131 LOG(INFO) << "Successfully stopped device " << instance_config.instance_name()
132 << ": " << instance_config.adb_ip_and_port();
133 return {};
134 }
135
StopInstance(const CuttlefishConfig & config,const CuttlefishConfig::InstanceSpecific & instance,const std::int32_t wait_for_launcher)136 int StopInstance(const CuttlefishConfig& config,
137 const CuttlefishConfig::InstanceSpecific& instance,
138 const std::int32_t wait_for_launcher) {
139 auto result = CleanStopInstance(instance, wait_for_launcher);
140 if (!result.ok()) {
141 LOG(ERROR) << "Clean stop failed: " << result.error().Message();
142 LOG(DEBUG) << "Clean stop failed: " << result.error().Trace();
143 return FallBackStop(DirsForInstance(config, instance));
144 }
145 return 0;
146 }
147
148 /// Send a StopSession request to allocd
ReleaseAllocdResources(SharedFD allocd_sock,uint32_t session_id)149 void ReleaseAllocdResources(SharedFD allocd_sock, uint32_t session_id) {
150 if (!allocd_sock->IsOpen() || session_id == -1) {
151 return;
152 }
153 Json::Value config;
154 Json::Value request_list;
155 Json::Value req;
156 req["request_type"] =
157 ReqTyToStr(RequestType::StopSession);
158 req["session_id"] = session_id;
159 request_list.append(req);
160 config["config_request"]["request_list"] = request_list;
161 SendJsonMsg(allocd_sock, config);
162 auto resp_opt = RecvJsonMsg(allocd_sock);
163 if (!resp_opt.has_value()) {
164 LOG(ERROR) << "Bad response from allocd";
165 return;
166 }
167 auto resp = resp_opt.value();
168 LOG(INFO) << "Stop Session operation: " << resp["config_status"];
169 }
170
171 struct FlagVaules {
172 std::int32_t wait_for_launcher;
173 bool clear_instance_dirs;
174 bool helpxml;
175 };
176
GetFlagValues(int argc,char ** argv)177 FlagVaules GetFlagValues(int argc, char** argv) {
178 std::int32_t wait_for_launcher = 5;
179 bool clear_instance_dirs = false;
180 std::vector<Flag> flags;
181 flags.emplace_back(
182 GflagsCompatFlag("wait_for_launcher", wait_for_launcher)
183 .Help("How many seconds to wait for the launcher to respond to the "
184 "status command. A value of zero means wait indefinitely"));
185 flags.emplace_back(
186 GflagsCompatFlag("clear_instance_dirs", clear_instance_dirs)
187 .Help("If provided, deletes the instance dir after attempting to "
188 "stop each instance."));
189 flags.emplace_back(HelpFlag(flags));
190 bool helpxml = false;
191 flags.emplace_back(HelpXmlFlag(flags, std::cout, helpxml));
192 flags.emplace_back(UnexpectedArgumentGuard());
193 std::vector<std::string> args =
194 ArgsToVec(argc - 1, argv + 1); // Skip argv[0]
195 auto parse_result = ParseFlags(flags, args);
196 CHECK(parse_result || helpxml) << "Could not process command line flags.";
197
198 return {wait_for_launcher, clear_instance_dirs, helpxml};
199 }
200
StopCvdMain(const std::int32_t wait_for_launcher,const bool clear_instance_dirs)201 int StopCvdMain(const std::int32_t wait_for_launcher,
202 const bool clear_instance_dirs) {
203 auto config = CuttlefishConfig::Get();
204 if (!config) {
205 LOG(ERROR) << "Failed to obtain config object";
206 return FallBackStop(FallbackDirs());
207 }
208
209 int exit_code = 0;
210 for (const auto& instance : config->Instances()) {
211 auto session_id = instance.session_id();
212 int exit_status = StopInstance(*config, instance, wait_for_launcher);
213 if (exit_status == 0 && instance.use_allocd()) {
214 // only release session resources if the instance was stopped
215 SharedFD allocd_sock =
216 SharedFD::SocketLocalClient(kDefaultLocation, false, SOCK_STREAM);
217 if (!allocd_sock->IsOpen()) {
218 LOG(ERROR) << "Unable to connect to allocd on "
219 << kDefaultLocation << ": "
220 << allocd_sock->StrError();
221 }
222 ReleaseAllocdResources(allocd_sock, session_id);
223 }
224
225 if (clear_instance_dirs && DirectoryExists(instance.instance_dir())) {
226 LOG(INFO) << "Deleting instance dir " << instance.instance_dir();
227 if (!RecursivelyRemoveDirectory(instance.instance_dir())) {
228 LOG(ERROR) << "Unable to rmdir " << instance.instance_dir();
229 }
230 }
231 exit_code |= exit_status;
232 }
233 return exit_code;
234 }
235
236 } // namespace
237 } // namespace cuttlefish
238
main(int argc,char ** argv)239 int main(int argc, char** argv) {
240 ::android::base::InitLogging(argv, android::base::StderrLogger);
241
242 const auto [wait_for_launcher, clear_instance_dirs, helpxml] =
243 cuttlefish::GetFlagValues(argc, argv);
244
245 if (helpxml) {
246 /*
247 * b/269925398
248 *
249 * CHECK(false) should not be executed if --helpxml is given.
250 * The return code does not have to be the same. It is good if
251 * CHECK(false) and --helpxml return the same return code.
252 */
253 return 134;
254 }
255 return cuttlefish::StopCvdMain(wait_for_launcher, clear_instance_dirs);
256 }
257