1use crate::bpf::EbpfState;
6use crate::device::remote_block_device::RemoteBlockDeviceRegistry;
7use crate::device::{DeviceMode, DeviceRegistry};
8use crate::execution::CrashReporter;
9use crate::mm::{FutexTable, MappingSummary, MlockPinFlavor, SharedFutexKey};
10use crate::power::SuspendResumeManagerHandle;
11use crate::ptrace::StopState;
12use crate::security::{self, AuditLogger};
13use crate::task::container_namespace::ContainerNamespace;
14use crate::task::limits::SystemLimits;
15use crate::task::memory_attribution::MemoryAttributionManager;
16use crate::task::net::NetstackDevices;
17use crate::task::tracing::PidToKoidMap;
18use crate::task::{
19 AbstractUnixSocketNamespace, AbstractVsockSocketNamespace, CurrentTask, DelayedReleaser,
20 IpTables, KernelCgroups, KernelStats, KernelThreads, PidTable, SchedulerManager, Syslog,
21 ThreadGroup, UtsNamespace, UtsNamespaceHandle,
22};
23use crate::time::{HrTimerManager, HrTimerManagerHandle};
24use crate::vdso::vdso_loader::Vdso;
25use crate::vfs::fs_args::MountParams;
26use crate::vfs::socket::{
27 GenericMessage, GenericNetlink, NetlinkAccessControl, NetlinkContextImpl,
28 NetlinkToClientSender, SocketAddress, SocketTokensStore,
29};
30use crate::vfs::{CacheConfig, FileOps, FsNodeHandle, FsString, Mounts, NamespaceNode};
31use bstr::{BString, ByteSlice};
32use devicetree::types::Devicetree;
33use expando::Expando;
34use fidl::endpoints::{
35 ClientEnd, ControlHandle, DiscoverableProtocolMarker, ProtocolMarker, create_endpoints,
36};
37use fidl_fuchsia_component_runner::{ComponentControllerControlHandle, ComponentStopInfo};
38use fidl_fuchsia_feedback::CrashReporterProxy;
39use fidl_fuchsia_io as fio;
40use fidl_fuchsia_memory_attribution as fattribution;
41use fidl_fuchsia_time_external::AdjustSynchronousProxy;
42use fuchsia_async as fasync;
43use fuchsia_inspect::ArrayProperty;
44use futures::FutureExt;
45use netlink::interfaces::InterfacesHandler;
46use netlink::{NETLINK_LOG_TAG, Netlink};
47use once_cell::sync::OnceCell;
48use starnix_lifecycle::AtomicCounter;
49use starnix_logging::{SyscallLogFilter, log_debug, log_error, log_info, log_warn};
50use starnix_sync::{
51 FileOpsCore, KernelSwapFiles, LockEqualOrBefore, Locked, Mutex, OrderedMutex, RwLock,
52};
53use starnix_types::ownership::TempRef;
54use starnix_uapi::device_id::DeviceId;
55use starnix_uapi::errors::{Errno, errno};
56use starnix_uapi::open_flags::OpenFlags;
57use starnix_uapi::{VMADDR_CID_HOST, from_status_like_fdio};
58use std::borrow::Cow;
59use std::collections::{HashMap, HashSet};
60use std::num::NonZeroU64;
61use std::path::PathBuf;
62use std::sync::atomic::{AtomicBool, AtomicU8, AtomicU16, Ordering};
63use std::sync::{Arc, OnceLock, Weak};
64use zx::CpuFeatureFlags;
65
66#[derive(Debug, Default, Clone)]
69pub struct KernelFeatures {
70 pub bpf_v2: bool,
71
72 pub enable_suid: bool,
79
80 pub io_uring: bool,
84
85 pub error_on_failed_reboot: bool,
88
89 pub default_seclabel: Option<String>,
93
94 pub selinux_test_suite: bool,
99
100 pub default_ns_mount_options: Option<HashMap<String, String>>,
105
106 pub default_uid: u32,
110
111 pub mlock_always_onfault: bool,
113
114 pub mlock_pin_flavor: MlockPinFlavor,
116
117 pub crash_report_throttling: bool,
119
120 pub wifi: bool,
122
123 pub cached_zx_map_info_bytes: u32,
125
126 pub dirent_cache_size: u32,
128
129 pub fake_ion: bool,
132}
133
134impl KernelFeatures {
135 pub fn ns_mount_options(&self, ns_path: &str) -> Result<MountParams, Errno> {
139 if let Some(all_options) = &self.default_ns_mount_options {
140 if let Some(options) = all_options.get(ns_path) {
141 return MountParams::parse(options.as_bytes().into());
142 }
143 }
144 Ok(MountParams::default())
145 }
146}
147
148pub struct ArgNameAndValue<'a> {
150 pub name: &'a str,
151 pub value: Option<&'a str>,
152}
153
154pub struct Kernel {
164 pub weak_self: Weak<Kernel>,
166
167 pub kthreads: KernelThreads,
169
170 pub features: KernelFeatures,
172
173 pub pids: RwLock<PidTable>,
175
176 pub pid_to_koid_mapping: Arc<RwLock<Option<PidToKoidMap>>>,
178
179 pub expando: Expando,
184
185 pub default_abstract_socket_namespace: Arc<AbstractUnixSocketNamespace>,
191
192 pub default_abstract_vsock_namespace: Arc<AbstractVsockSocketNamespace>,
194
195 pub cmdline: BString,
197
198 pub device_tree: Option<Devicetree>,
199
200 pub security_state: security::KernelState,
202
203 pub device_registry: DeviceRegistry,
205
206 pub container_namespace: ContainerNamespace,
210
211 pub remote_block_device_registry: Arc<RemoteBlockDeviceRegistry>,
213
214 iptables: OnceLock<IpTables>,
216
217 pub shared_futexes: Arc<FutexTable<SharedFutexKey>>,
219
220 pub root_uts_ns: UtsNamespaceHandle,
225
226 pub vdso: Vdso,
228
229 pub vdso_arch32: Option<Vdso>,
233
234 pub netstack_devices: Arc<NetstackDevices>,
237
238 pub swap_files: OrderedMutex<Vec<FsNodeHandle>, KernelSwapFiles>,
242
243 generic_netlink: OnceLock<GenericNetlink<NetlinkToClientSender<GenericMessage>>>,
245
246 network_netlink: OnceLock<Netlink<NetlinkContextImpl>>,
248
249 pub inspect_node: fuchsia_inspect::Node,
251
252 pub actions_logged: AtomicU16,
259
260 pub suspend_resume_manager: SuspendResumeManagerHandle,
262
263 pub next_mount_id: AtomicCounter<u64>,
265 pub next_peer_group_id: AtomicCounter<u64>,
266 pub next_namespace_id: AtomicCounter<u64>,
267
268 pub next_file_object_id: AtomicCounter<u64>,
270
271 pub next_inotify_cookie: AtomicCounter<u32>,
273
274 pub ptrace_scope: AtomicU8,
276
277 pub build_version: OnceCell<String>,
279
280 pub stats: Arc<KernelStats>,
281
282 pub system_limits: SystemLimits,
284
285 pub delayed_releaser: DelayedReleaser,
289
290 pub scheduler: SchedulerManager,
292
293 pub syslog: Syslog,
295
296 pub mounts: Mounts,
298
299 pub hrtimer_manager: HrTimerManagerHandle,
301
302 pub memory_attribution_manager: MemoryAttributionManager,
304
305 pub crash_reporter: CrashReporter,
307
308 shutting_down: AtomicBool,
310
311 pub restrict_dmesg: AtomicBool,
314
315 pub disable_unprivileged_bpf: AtomicU8,
320
321 pub container_control_handle: Mutex<Option<ComponentControllerControlHandle>>,
323
324 pub ebpf_state: EbpfState,
326
327 pub cgroups: KernelCgroups,
329
330 pub time_adjustment_proxy: Option<AdjustSynchronousProxy>,
333
334 pub socket_tokens_store: SocketTokensStore,
336
337 pub hwcaps: HwCaps,
339
340 pub syscall_log_filters: Mutex<Vec<SyscallLogFilter>>,
343}
344
345#[derive(Debug, Clone, Copy, Default)]
347pub struct HwCap {
348 pub hwcap: u32,
350 pub hwcap2: u32,
352}
353
354#[derive(Debug, Clone, Copy, Default)]
356pub struct HwCaps {
357 #[cfg(target_arch = "aarch64")]
359 pub arch32: HwCap,
360 pub arch64: HwCap,
362}
363
364struct InterfacesHandlerImpl(Weak<Kernel>);
371
372impl InterfacesHandlerImpl {
373 fn kernel(&self) -> Option<Arc<Kernel>> {
374 self.0.upgrade()
375 }
376}
377
378impl InterfacesHandler for InterfacesHandlerImpl {
379 fn handle_new_link(&mut self, name: &str, interface_id: NonZeroU64) {
380 if let Some(kernel) = self.kernel() {
381 kernel.netstack_devices.add_device(&kernel, name.into(), interface_id);
382 }
383 }
384
385 fn handle_deleted_link(&mut self, name: &str) {
386 if let Some(kernel) = self.kernel() {
387 kernel.netstack_devices.remove_device(&kernel, name.into());
388 }
389 }
390
391 fn handle_idle_event(&mut self) {
392 let Some(kernel) = self.kernel() else {
393 log_error!("kernel went away while netlink is initializing");
394 return;
395 };
396 let (initialized, wq) = &kernel.netstack_devices.initialized_and_wq;
397 if initialized.swap(true, Ordering::SeqCst) {
398 log_error!("netlink initial devices should only be reported once");
399 return;
400 }
401 wq.notify_all()
402 }
403}
404
405impl Kernel {
406 pub fn new(
407 cmdline: BString,
408 features: KernelFeatures,
409 system_limits: SystemLimits,
410 container_namespace: ContainerNamespace,
411 scheduler: SchedulerManager,
412 crash_reporter_proxy: Option<CrashReporterProxy>,
413 inspect_node: fuchsia_inspect::Node,
414 security_state: security::KernelState,
415 time_adjustment_proxy: Option<AdjustSynchronousProxy>,
416 device_tree: Option<Devicetree>,
417 ) -> Result<Arc<Kernel>, zx::Status> {
418 let unix_address_maker =
419 Box::new(|x: FsString| -> SocketAddress { SocketAddress::Unix(x) });
420 let vsock_address_maker = Box::new(|x: u32| -> SocketAddress {
421 SocketAddress::Vsock { port: x, cid: VMADDR_CID_HOST }
422 });
423
424 let crash_reporter = CrashReporter::new(
425 &inspect_node,
426 crash_reporter_proxy,
427 zx::Duration::from_minutes(8),
428 features.crash_report_throttling,
429 );
430 let hrtimer_manager = HrTimerManager::new(&inspect_node);
431
432 let cpu_feature_flags =
433 zx::system_get_feature_flags::<CpuFeatureFlags>().unwrap_or_else(|e| {
434 log_debug!("CPU feature flags are only supported on ARM64: {}, reporting 0", e);
435 CpuFeatureFlags::empty()
436 });
437 let hwcaps = HwCaps::from_cpu_feature_flags(cpu_feature_flags);
438
439 let this = Arc::new_cyclic(|kernel| Kernel {
440 weak_self: kernel.clone(),
441 kthreads: KernelThreads::new(kernel.clone()),
442 features,
443 pids: Default::default(),
444 pid_to_koid_mapping: Arc::new(RwLock::new(None)),
445 expando: Default::default(),
446 default_abstract_socket_namespace: AbstractUnixSocketNamespace::new(unix_address_maker),
447 default_abstract_vsock_namespace: AbstractVsockSocketNamespace::new(
448 vsock_address_maker,
449 ),
450 cmdline,
451 device_tree,
452 security_state,
453 device_registry: Default::default(),
454 container_namespace,
455 remote_block_device_registry: Default::default(),
456 iptables: OnceLock::new(),
457 shared_futexes: Arc::<FutexTable<SharedFutexKey>>::default(),
458 root_uts_ns: Arc::new(RwLock::new(UtsNamespace::default())),
459 vdso: Vdso::new(),
460 vdso_arch32: Vdso::new_arch32(),
461 netstack_devices: Arc::default(),
462 swap_files: Default::default(),
463 generic_netlink: OnceLock::new(),
464 network_netlink: OnceLock::new(),
465 inspect_node,
466 actions_logged: AtomicU16::new(0),
467 suspend_resume_manager: Default::default(),
468 next_mount_id: AtomicCounter::<u64>::new(1),
469 next_peer_group_id: AtomicCounter::<u64>::new(1),
470 next_namespace_id: AtomicCounter::<u64>::new(1),
471 next_inotify_cookie: AtomicCounter::<u32>::new(1),
472 next_file_object_id: Default::default(),
473 system_limits,
474 ptrace_scope: AtomicU8::new(0), restrict_dmesg: AtomicBool::new(false),
476 disable_unprivileged_bpf: AtomicU8::new(0), build_version: OnceCell::new(),
478 stats: Arc::new(KernelStats::default()),
479 delayed_releaser: Default::default(),
480 scheduler,
481 syslog: Default::default(),
482 mounts: Mounts::new(),
483 hrtimer_manager,
484 memory_attribution_manager: MemoryAttributionManager::new(kernel.clone()),
485 crash_reporter,
486 shutting_down: AtomicBool::new(false),
487 container_control_handle: Mutex::new(None),
488 ebpf_state: Default::default(),
489 cgroups: Default::default(),
490 time_adjustment_proxy,
491 socket_tokens_store: Default::default(),
492 hwcaps,
493 syscall_log_filters: Default::default(),
494 });
495
496 this.device_registry.objects.init(&mut this.kthreads.unlocked_for_async(), &this);
500
501 let kernel = Arc::downgrade(&this);
504 this.inspect_node.record_lazy_child("thread_groups", move || {
505 if let Some(kernel) = kernel.upgrade() {
506 let inspector = kernel.get_thread_groups_inspect();
507 async move { Ok(inspector) }.boxed()
508 } else {
509 async move { Err(anyhow::format_err!("kernel was dropped")) }.boxed()
510 }
511 });
512
513 let kernel = Arc::downgrade(&this);
514 this.inspect_node.record_lazy_child("cgroupv2", move || {
515 if let Some(kernel) = kernel.upgrade() {
516 async move { Ok(kernel.cgroups.cgroup2.get_cgroup_inspect()) }.boxed()
517 } else {
518 async move { Err(anyhow::format_err!("kernel was dropped")) }.boxed()
519 }
520 });
521
522 Ok(this)
523 }
524
525 pub fn shut_down(self: &Arc<Self>) {
528 self.kthreads.spawn_future(
531 {
532 let kernel = self.clone();
533 move || async move {
534 kernel.run_shutdown().await;
535 }
536 },
537 "run_shutdown",
538 );
539 }
540
541 async fn run_shutdown(&self) {
561 const INIT_PID: i32 = 1;
562 const SYSTEM_TASK_PID: i32 = 2;
563
564 if self
567 .shutting_down
568 .compare_exchange(false, true, Ordering::AcqRel, Ordering::Acquire)
569 .is_err()
570 {
571 log_info!("Additional thread tried to initiate shutdown while already in-progress.");
572 return;
573 }
574
575 log_info!("Shutting down Starnix kernel.");
576
577 loop {
580 let tgs = {
581 self.pids
584 .read()
585 .get_thread_groups()
586 .filter(|tg| tg.leader != SYSTEM_TASK_PID && tg.leader != INIT_PID)
587 .collect::<Vec<_>>()
588 };
589 if tgs.is_empty() {
590 log_info!("pid table is empty except init and system task");
591 break;
592 }
593
594 log_info!(tgs:?; "shutting down thread groups");
595 let mut tasks = vec![];
596 for tg in tgs {
597 let task = fasync::Task::local(ThreadGroup::shut_down(Arc::downgrade(&tg)));
598 tasks.push(task);
599 }
600 futures::future::join_all(tasks).await;
601 }
602
603 let maybe_init = {
605 self.pids.read().get_thread_group(1).map(|tg| Arc::downgrade(&tg))
608 };
609 if let Some(init) = maybe_init {
610 log_info!("shutting down init");
611 ThreadGroup::shut_down(init).await;
612 } else {
613 log_info!("init already terminated");
614 }
615
616 log_info!("cleaning up pinned memory");
618 self.expando.remove::<crate::mm::InfoCacheShadowProcess>();
619 self.expando.remove::<crate::mm::MlockShadowProcess>();
620
621 let kernel_job = fuchsia_runtime::job_default();
628 assert_eq!(kernel_job.children().unwrap(), &[], "starnix does not create any child jobs");
629 let own_koid = fuchsia_runtime::process_self().koid().unwrap();
630
631 log_info!("waiting for this to be the only process in the job");
632 loop {
633 let mut remaining_processes = kernel_job
634 .processes()
635 .unwrap()
636 .into_iter()
637 .filter(|pid| pid != &own_koid)
639 .peekable();
640 if remaining_processes.peek().is_none() {
641 log_info!("No stray Zircon processes.");
642 break;
643 }
644
645 let mut terminated_signals = vec![];
646 for pid in remaining_processes {
647 let handle = match kernel_job
648 .get_child(&pid, zx::Rights::BASIC | zx::Rights::PROPERTY | zx::Rights::DESTROY)
649 {
650 Ok(h) => h,
651 Err(e) => {
652 log_info!(pid:?, e:?; "failed to get child process from job");
653 continue;
654 }
655 };
656 log_info!(
657 pid:?,
658 name:? = handle.get_name();
659 "waiting on process terminated signal"
660 );
661 terminated_signals
662 .push(fuchsia_async::OnSignals::new(handle, zx::Signals::PROCESS_TERMINATED));
663 }
664 log_info!("waiting on process terminated signals");
665 futures::future::join_all(terminated_signals).await;
666 }
667
668 log_info!("clearing mounts");
670 self.mounts.clear();
671
672 log_info!("all non-root processes killed, notifying CF container is stopped");
674 if let Some(control_handle) = self.container_control_handle.lock().take() {
675 log_info!("Notifying CF that the container has stopped.");
676 control_handle
677 .send_on_stop(ComponentStopInfo {
678 termination_status: Some(zx::Status::OK.into_raw()),
679 exit_code: Some(0),
680 ..ComponentStopInfo::default()
681 })
682 .unwrap();
683 control_handle.shutdown_with_epitaph(zx::Status::OK);
684 } else {
685 log_warn!("Shutdown invoked without a container controller control handle.");
686 }
687
688 log_info!("All tasks killed, exiting Starnix kernel root process.");
690 zx::Process::exit(0);
698 }
699
700 pub fn is_shutting_down(&self) -> bool {
701 self.shutting_down.load(Ordering::Acquire)
702 }
703
704 pub fn allow_unprivileged_bpf(&self) -> bool {
705 self.disable_unprivileged_bpf.load(Ordering::Relaxed) == 0
706 }
707
708 pub fn open_device<L>(
710 &self,
711 locked: &mut Locked<L>,
712 current_task: &CurrentTask,
713 node: &NamespaceNode,
714 flags: OpenFlags,
715 dev: DeviceId,
716 mode: DeviceMode,
717 ) -> Result<Box<dyn FileOps>, Errno>
718 where
719 L: LockEqualOrBefore<FileOpsCore>,
720 {
721 self.device_registry.open_device(locked, current_task, node, flags, dev, mode)
722 }
723
724 pub fn audit_logger(&self) -> Arc<AuditLogger> {
728 self.expando.get_or_init(|| AuditLogger::new(self))
729 }
730
731 pub fn generic_netlink(&self) -> &GenericNetlink<NetlinkToClientSender<GenericMessage>> {
736 self.generic_netlink.get_or_init(|| {
737 let (generic_netlink, worker_params) = GenericNetlink::new();
738 let enable_nl80211 = self.features.wifi;
739 self.kthreads.spawn_future(
740 move || async move {
741 crate::vfs::socket::run_generic_netlink_worker(worker_params, enable_nl80211)
742 .await;
743 log_error!("Generic Netlink future unexpectedly exited");
744 },
745 "generic_netlink_worker",
746 );
747 generic_netlink
748 })
749 }
750
751 pub fn network_netlink(self: &Arc<Self>) -> &Netlink<NetlinkContextImpl> {
756 self.network_netlink.get_or_init(|| {
757 let (network_netlink, worker_params) =
758 Netlink::new(InterfacesHandlerImpl(self.weak_self.clone()));
759
760 let kernel = self.clone();
761 self.kthreads.spawn_future(
762 move || async move {
763 netlink::run_netlink_worker(
764 worker_params,
765 NetlinkAccessControl::new(kernel.kthreads.system_task()),
766 )
767 .await;
768 log_error!(tag = NETLINK_LOG_TAG; "Netlink async worker unexpectedly exited");
769 },
770 "network_netlink_worker",
771 );
772 network_netlink
773 })
774 }
775
776 pub fn iptables(&self) -> &IpTables {
777 self.iptables.get_or_init(|| IpTables::new())
778 }
779
780 #[allow(unused)]
782 pub fn connect_to_named_protocol_at_container_svc<P: ProtocolMarker>(
783 &self,
784 filename: &str,
785 ) -> Result<ClientEnd<P>, Errno> {
786 match self.container_namespace.get_namespace_channel("/svc") {
787 Ok(channel) => {
788 let (client_end, server_end) = create_endpoints::<P>();
789 fdio::service_connect_at(channel.as_ref(), filename, server_end.into_channel())
790 .map_err(|status| from_status_like_fdio!(status))?;
791 Ok(client_end)
792 }
793 Err(err) => {
794 log_error!("Unable to get /svc namespace channel! {}", err);
795 Err(errno!(ENOENT))
796 }
797 }
798 }
799
800 pub fn connect_to_protocol_at_container_svc<P: DiscoverableProtocolMarker>(
802 &self,
803 ) -> Result<ClientEnd<P>, Errno> {
804 self.connect_to_named_protocol_at_container_svc::<P>(P::PROTOCOL_NAME)
805 }
806
807 pub fn add_syscall_log_filter(&self, name: &str) {
808 let filter = SyscallLogFilter::new(name.to_string());
809 {
810 let mut filters = self.syscall_log_filters.lock();
811 if filters.contains(&filter) {
812 return;
813 }
814 filters.push(filter);
815 }
816 for headers in self.pids.read().get_thread_groups() {
817 headers.sync_syscall_log_level();
818 }
819 }
820
821 pub fn clear_syscall_log_filters(&self) {
822 {
823 let mut filters = self.syscall_log_filters.lock();
824 if filters.is_empty() {
825 return;
826 }
827 filters.clear();
828 }
829 for headers in self.pids.read().get_thread_groups() {
830 headers.sync_syscall_log_level();
831 }
832 }
833
834 fn get_thread_groups_inspect(&self) -> fuchsia_inspect::Inspector {
835 let inspector = fuchsia_inspect::Inspector::default();
836
837 let thread_groups = inspector.root();
838 let mut mm_summary = MappingSummary::default();
839 let mut mms_summarized = HashSet::new();
840
841 let all_thread_groups = {
843 let pid_table = self.pids.read();
844 pid_table.get_thread_groups().collect::<Vec<_>>()
845 };
846 for thread_group in all_thread_groups {
847 let (ppid, tasks) = {
849 let tg = thread_group.read();
850 (tg.get_ppid() as i64, tg.tasks().map(TempRef::into_static).collect::<Vec<_>>())
851 };
852
853 let tg_node = thread_groups.create_child(format!("{}", thread_group.leader));
854 if let Ok(koid) = &thread_group.process.koid() {
855 tg_node.record_int("koid", koid.raw_koid() as i64);
856 }
857 tg_node.record_int("pid", thread_group.leader as i64);
858 tg_node.record_int("ppid", ppid);
859 tg_node.record_bool("stopped", thread_group.load_stopped() == StopState::GroupStopped);
860
861 let tasks_node = tg_node.create_child("tasks");
862 for task in tasks {
863 if let Ok(mm) = task.mm() {
864 if mms_summarized.insert(Arc::as_ptr(&mm) as usize) {
865 mm.summarize(&mut mm_summary);
866 }
867 }
868 let set_properties = |node: &fuchsia_inspect::Node| {
869 node.record_string("command", task.command().to_string());
870
871 let scheduler_state = task.read().scheduler_state;
872 if !scheduler_state.is_default() {
873 node.record_child("sched", |node| {
874 node.record_string(
875 "role_name",
876 self.scheduler
877 .role_name(&task)
878 .map(|n| Cow::Borrowed(n))
879 .unwrap_or_else(|e| Cow::Owned(e.to_string())),
880 );
881 node.record_string("state", format!("{scheduler_state:?}"));
882 });
883 }
884 };
885 if task.tid == thread_group.leader {
886 let mut argv = task.read_argv(256).unwrap_or_default();
887
888 argv.retain(|arg| !arg.is_empty());
891
892 let inspect_argv = tg_node.create_string_array("argv", argv.len());
893 for (i, arg) in argv.iter().enumerate() {
894 inspect_argv.set(i, arg.to_string());
895 }
896 tg_node.record(inspect_argv);
897
898 set_properties(&tg_node);
899 } else {
900 tasks_node.record_child(task.tid.to_string(), |task_node| {
901 set_properties(task_node);
902 });
903 };
904 }
905 tg_node.record(tasks_node);
906 thread_groups.record(tg_node);
907 }
908
909 thread_groups.record_child("memory_managers", |node| mm_summary.record(node));
910
911 inspector
912 }
913
914 pub fn new_memory_attribution_observer(
915 &self,
916 control_handle: fattribution::ProviderControlHandle,
917 ) -> attribution_server::Observer {
918 self.memory_attribution_manager.new_observer(control_handle)
919 }
920
921 pub fn open_ns_dir(
933 &self,
934 path: &str,
935 open_flags: fio::Flags,
936 ) -> Result<(fio::DirectorySynchronousProxy, String), Errno> {
937 let ns_path = PathBuf::from(path);
938 match self.container_namespace.find_closest_channel(&ns_path) {
939 Ok((root_channel, remaining_subdir)) => {
940 let (_, server_end) = create_endpoints::<fio::DirectoryMarker>();
941 fdio::open_at(
942 &root_channel,
943 &remaining_subdir,
944 open_flags,
945 server_end.into_channel(),
946 )
947 .map_err(|e| {
948 log_error!("Failed to intialize the subdirs: {}", e);
949 errno!(EIO)
950 })?;
951
952 Ok((fio::DirectorySynchronousProxy::new(root_channel), remaining_subdir))
953 }
954 Err(err) => {
955 log_error!(
956 "Unable to find a channel for {}. Received error: {}",
957 ns_path.display(),
958 err
959 );
960 Err(errno!(ENOENT))
961 }
962 }
963 }
964
965 pub fn cmdline_args_iter(&self) -> impl Iterator<Item = ArgNameAndValue<'_>> {
967 parse_cmdline(self.cmdline.to_str().unwrap_or_default()).filter_map(|arg| {
968 arg.split_once('=')
969 .map(|(name, value)| ArgNameAndValue { name: name, value: Some(value) })
970 .or(Some(ArgNameAndValue { name: arg, value: None }))
971 })
972 }
973
974 pub fn fs_cache_config(&self) -> CacheConfig {
976 CacheConfig { capacity: self.features.dirent_cache_size as usize }
977 }
978}
979
980pub fn parse_cmdline(cmdline: &str) -> impl Iterator<Item = &str> {
981 let mut args = Vec::new();
982 let mut arg_start: Option<usize> = None;
983 let mut in_quotes = false;
984 let mut previous_char = ' ';
985
986 for (i, c) in cmdline.char_indices() {
987 if let Some(start) = arg_start {
988 match c {
989 ' ' if !in_quotes => {
990 args.push(&cmdline[start..i]);
991 arg_start = None;
992 }
993 '"' if previous_char != '\\' => {
994 in_quotes = !in_quotes;
995 }
996 _ => {}
997 }
998 } else if c != ' ' {
999 arg_start = Some(i);
1000 if c == '"' {
1001 in_quotes = true;
1002 }
1003 }
1004 previous_char = c;
1005 }
1006 if let Some(start) = arg_start {
1007 args.push(&cmdline[start..]);
1008 }
1009 args.into_iter()
1010}
1011
1012impl std::fmt::Debug for Kernel {
1013 fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
1014 f.debug_struct("Kernel").finish()
1015 }
1016}
1017
1018#[cfg(target_arch = "aarch64")]
1020fn arm32_hwcap(cpu_feature_flags: CpuFeatureFlags) -> HwCap {
1021 use starnix_uapi::arch32;
1022 const COMPAT_ARM32_ELF_HWCAP: u32 = arch32::HWCAP_HALF
1023 | arch32::HWCAP_THUMB
1024 | arch32::HWCAP_FAST_MULT
1025 | arch32::HWCAP_EDSP
1026 | arch32::HWCAP_TLS
1027 | arch32::HWCAP_IDIV | arch32::HWCAP_LPAE
1029 | arch32::HWCAP_EVTSTRM;
1030
1031 let mut hwcap = COMPAT_ARM32_ELF_HWCAP;
1032 let mut hwcap2 = 0;
1033 for feature in cpu_feature_flags.iter() {
1034 match feature {
1035 CpuFeatureFlags::ARM64_FEATURE_ISA_ASIMD => hwcap |= arch32::HWCAP_NEON,
1036 CpuFeatureFlags::ARM64_FEATURE_ISA_AES => hwcap2 |= arch32::HWCAP2_AES,
1037 CpuFeatureFlags::ARM64_FEATURE_ISA_PMULL => hwcap2 |= arch32::HWCAP2_PMULL,
1038 CpuFeatureFlags::ARM64_FEATURE_ISA_SHA1 => hwcap2 |= arch32::HWCAP2_SHA1,
1039 CpuFeatureFlags::ARM64_FEATURE_ISA_SHA256 => hwcap2 |= arch32::HWCAP2_SHA2,
1040 CpuFeatureFlags::ARM64_FEATURE_ISA_CRC32 => hwcap2 |= arch32::HWCAP2_CRC32,
1041 CpuFeatureFlags::ARM64_FEATURE_ISA_I8MM => hwcap |= arch32::HWCAP_I8MM,
1042 CpuFeatureFlags::ARM64_FEATURE_ISA_FHM => hwcap |= arch32::HWCAP_ASIMDFHM,
1043 CpuFeatureFlags::ARM64_FEATURE_ISA_DP => hwcap |= arch32::HWCAP_ASIMDDP,
1044 CpuFeatureFlags::ARM64_FEATURE_ISA_FP => {
1045 hwcap |= arch32::HWCAP_VFP | arch32::HWCAP_VFPv3 | arch32::HWCAP_VFPv4
1046 }
1047 _ => {}
1048 }
1049 }
1050 HwCap { hwcap, hwcap2 }
1051}
1052
1053#[cfg(target_arch = "aarch64")]
1054fn arm64_hwcap(cpu_feature_flags: CpuFeatureFlags) -> HwCap {
1055 use starnix_uapi;
1057 let mut hwcap = 0;
1058 let mut hwcap2 = 0;
1059
1060 for feature in cpu_feature_flags.iter() {
1061 match feature {
1062 CpuFeatureFlags::ARM64_FEATURE_ISA_FP => hwcap |= starnix_uapi::HWCAP_FP,
1063 CpuFeatureFlags::ARM64_FEATURE_ISA_ASIMD => hwcap |= starnix_uapi::HWCAP_ASIMD,
1064 CpuFeatureFlags::ARM64_FEATURE_ISA_AES => hwcap |= starnix_uapi::HWCAP_AES,
1065 CpuFeatureFlags::ARM64_FEATURE_ISA_PMULL => hwcap |= starnix_uapi::HWCAP_PMULL,
1066 CpuFeatureFlags::ARM64_FEATURE_ISA_SHA1 => hwcap |= starnix_uapi::HWCAP_SHA1,
1067 CpuFeatureFlags::ARM64_FEATURE_ISA_SHA256 => hwcap |= starnix_uapi::HWCAP_SHA2,
1068 CpuFeatureFlags::ARM64_FEATURE_ISA_CRC32 => hwcap |= starnix_uapi::HWCAP_CRC32,
1069 CpuFeatureFlags::ARM64_FEATURE_ISA_I8MM => hwcap2 |= starnix_uapi::HWCAP2_I8MM,
1070 CpuFeatureFlags::ARM64_FEATURE_ISA_FHM => hwcap |= starnix_uapi::HWCAP_ASIMDFHM,
1071 CpuFeatureFlags::ARM64_FEATURE_ISA_DP => hwcap |= starnix_uapi::HWCAP_ASIMDDP,
1072 CpuFeatureFlags::ARM64_FEATURE_ISA_SM3 => hwcap |= starnix_uapi::HWCAP_SM3,
1073 CpuFeatureFlags::ARM64_FEATURE_ISA_SM4 => hwcap |= starnix_uapi::HWCAP_SM4,
1074 CpuFeatureFlags::ARM64_FEATURE_ISA_SHA3 => hwcap |= starnix_uapi::HWCAP_SHA3,
1075 CpuFeatureFlags::ARM64_FEATURE_ISA_SHA512 => hwcap |= starnix_uapi::HWCAP_SHA512,
1076 CpuFeatureFlags::ARM64_FEATURE_ISA_ATOMICS => hwcap |= starnix_uapi::HWCAP_ATOMICS,
1077 CpuFeatureFlags::ARM64_FEATURE_ISA_RDM => hwcap |= starnix_uapi::HWCAP_ASIMDRDM,
1078 CpuFeatureFlags::ARM64_FEATURE_ISA_TS => hwcap |= starnix_uapi::HWCAP_FLAGM,
1079 CpuFeatureFlags::ARM64_FEATURE_ISA_DPB => hwcap |= starnix_uapi::HWCAP_DCPOP,
1080 CpuFeatureFlags::ARM64_FEATURE_ISA_RNDR => hwcap2 |= starnix_uapi::HWCAP2_RNG,
1081 _ => {}
1082 }
1083 }
1084 HwCap { hwcap, hwcap2 }
1085}
1086
1087impl HwCaps {
1088 #[cfg(target_arch = "aarch64")]
1089 pub fn from_cpu_feature_flags(cpu_feature_flags: CpuFeatureFlags) -> Self {
1090 Self { arch32: arm32_hwcap(cpu_feature_flags), arch64: arm64_hwcap(cpu_feature_flags) }
1091 }
1092
1093 #[cfg(not(target_arch = "aarch64"))]
1094 pub fn from_cpu_feature_flags(_cpu_feature_flags: CpuFeatureFlags) -> Self {
1095 Self { arch64: HwCap::default() }
1096 }
1097}
1098
1099#[cfg(test)]
1100mod test {
1101 use super::parse_cmdline;
1102
1103 #[test]
1104 fn test_parse_cmdline() {
1105 let cmdline =
1106 r#"first second=third "fourth fifth" sixth="seventh eighth" "ninth\" tenth" eleventh"#;
1107 let expected = vec![
1108 "first",
1109 "second=third",
1110 "\"fourth fifth\"",
1111 "sixth=\"seventh eighth\"",
1112 "\"ninth\\\" tenth\"",
1113 "eleventh",
1114 ];
1115 assert_eq!(parse_cmdline(cmdline).collect::<Vec<_>>(), expected);
1116 }
1117}