blob: 823546f8691d525036f629f4eb1108a26b12a693 [file] [log] [blame]
// Copyright 2021, The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//! Command to run a VM.
use crate::create_partition::command_create_partition;
use crate::{get_service, RunAppConfig, RunCustomVmConfig, RunMicrodroidConfig};
use android_system_virtualizationservice::aidl::android::system::virtualizationservice::{
IVirtualizationService::IVirtualizationService,
PartitionType::PartitionType,
VirtualMachineAppConfig::{
CustomConfig::CustomConfig, DebugLevel::DebugLevel, Payload::Payload,
VirtualMachineAppConfig,
},
VirtualMachineConfig::VirtualMachineConfig,
VirtualMachinePayloadConfig::VirtualMachinePayloadConfig,
VirtualMachineState::VirtualMachineState,
};
use anyhow::{anyhow, bail, Context, Error};
use binder::ParcelFileDescriptor;
use glob::glob;
use microdroid_payload_config::VmPayloadConfig;
use rand::{distributions::Alphanumeric, Rng};
use std::fs;
use std::fs::File;
use std::io;
use std::io::{Read, Write};
use std::os::fd::AsFd;
use std::path::{Path, PathBuf};
use vmclient::{ErrorCode, VmInstance};
use vmconfig::{get_debug_level, open_parcel_file, VmConfig};
use zip::ZipArchive;
/// Run a VM from the given APK, idsig, and config.
pub fn command_run_app(config: RunAppConfig) -> Result<(), Error> {
let service = get_service()?;
let apk = File::open(&config.apk).context("Failed to open APK file")?;
let extra_apks = match config.config_path.as_deref() {
Some(path) => parse_extra_apk_list(&config.apk, path)?,
None => config.extra_apks().to_vec(),
};
if extra_apks.len() != config.extra_idsigs.len() {
bail!(
"Found {} extra apks, but there are {} extra idsigs",
extra_apks.len(),
config.extra_idsigs.len()
)
}
for (i, extra_apk) in extra_apks.iter().enumerate() {
let extra_apk_fd = ParcelFileDescriptor::new(File::open(extra_apk)?);
let extra_idsig_fd = ParcelFileDescriptor::new(File::create(&config.extra_idsigs[i])?);
service.createOrUpdateIdsigFile(&extra_apk_fd, &extra_idsig_fd)?;
}
let idsig = File::create(&config.idsig).context("Failed to create idsig file")?;
let apk_fd = ParcelFileDescriptor::new(apk);
let idsig_fd = ParcelFileDescriptor::new(idsig);
service.createOrUpdateIdsigFile(&apk_fd, &idsig_fd)?;
let idsig = File::open(&config.idsig).context("Failed to open idsig file")?;
let idsig_fd = ParcelFileDescriptor::new(idsig);
if !config.instance.exists() {
const INSTANCE_FILE_SIZE: u64 = 10 * 1024 * 1024;
command_create_partition(
service.as_ref(),
&config.instance,
INSTANCE_FILE_SIZE,
PartitionType::ANDROID_VM_INSTANCE,
)?;
}
let instance_id = if cfg!(llpvm_changes) {
let id_file = config.instance_id()?;
if id_file.exists() {
let mut id = [0u8; 64];
let mut instance_id_file = File::open(id_file)?;
instance_id_file.read_exact(&mut id)?;
id
} else {
let id = service.allocateInstanceId().context("Failed to allocate instance_id")?;
let mut instance_id_file = File::create(id_file)?;
instance_id_file.write_all(&id)?;
id
}
} else {
// if llpvm feature flag is disabled, instance_id is not used.
[0u8; 64]
};
let storage = if let Some(ref path) = config.microdroid.storage {
if !path.exists() {
command_create_partition(
service.as_ref(),
path,
config.microdroid.storage_size.unwrap_or(10 * 1024 * 1024),
PartitionType::ENCRYPTEDSTORE,
)?;
}
Some(open_parcel_file(path, true)?)
} else {
None
};
let vendor =
config.microdroid.vendor().as_ref().map(|p| open_parcel_file(p, false)).transpose()?;
let extra_idsig_files: Result<Vec<_>, _> = config.extra_idsigs.iter().map(File::open).collect();
let extra_idsig_fds = extra_idsig_files?.into_iter().map(ParcelFileDescriptor::new).collect();
let payload = if let Some(config_path) = config.config_path {
if config.payload_binary_name.is_some() {
bail!("Only one of --config-path or --payload-binary-name can be defined")
}
Payload::ConfigPath(config_path)
} else if let Some(payload_binary_name) = config.payload_binary_name {
let extra_apk_files: Result<Vec<_>, _> = extra_apks.iter().map(File::open).collect();
let extra_apk_fds = extra_apk_files?.into_iter().map(ParcelFileDescriptor::new).collect();
Payload::PayloadConfig(VirtualMachinePayloadConfig {
payloadBinaryName: payload_binary_name,
extraApks: extra_apk_fds,
})
} else {
bail!("Either --config-path or --payload-binary-name must be defined")
};
let os_name = if let Some(ver) = config.microdroid.gki() {
format!("microdroid_gki-{ver}")
} else {
"microdroid".to_owned()
};
let payload_config_str = format!("{:?}!{:?}", config.apk, payload);
let mut custom_config = CustomConfig {
gdbPort: config.debug.gdb.map(u16::from).unwrap_or(0) as i32, // 0 means no gdb
vendorImage: vendor,
devices: config
.microdroid
.devices()
.iter()
.map(|x| {
x.to_str().map(String::from).ok_or(anyhow!("Failed to convert {x:?} to String"))
})
.collect::<Result<_, _>>()?,
networkSupported: config.common.network_supported(),
..Default::default()
};
if config.debug.enable_earlycon() {
if config.debug.debug != DebugLevel::FULL {
bail!("earlycon is only supported for debuggable VMs")
}
if cfg!(target_arch = "aarch64") {
custom_config
.extraKernelCmdlineParams
.push(String::from("earlycon=uart8250,mmio,0x3f8"));
} else if cfg!(target_arch = "x86_64") {
custom_config.extraKernelCmdlineParams.push(String::from("earlycon=uart8250,io,0x3f8"));
} else {
bail!("unexpected architecture!");
}
}
let vm_config = VirtualMachineConfig::AppConfig(VirtualMachineAppConfig {
name: config.common.name.unwrap_or_else(|| String::from("VmRunApp")),
apk: apk_fd.into(),
idsig: idsig_fd.into(),
extraIdsigs: extra_idsig_fds,
instanceImage: open_parcel_file(&config.instance, true /* writable */)?.into(),
instanceId: instance_id,
encryptedStorageImage: storage,
payload,
debugLevel: config.debug.debug,
protectedVm: config.common.protected,
memoryMib: config.common.mem.unwrap_or(0) as i32, // 0 means use the VM default
cpuTopology: config.common.cpu_topology,
customConfig: Some(custom_config),
osName: os_name,
hugePages: config.common.hugepages,
boostUclamp: config.common.boost_uclamp,
});
run(
service.as_ref(),
&vm_config,
&payload_config_str,
config.debug.console.as_ref().map(|p| p.as_ref()),
config.debug.console_in.as_ref().map(|p| p.as_ref()),
config.debug.log.as_ref().map(|p| p.as_ref()),
)
}
fn find_empty_payload_apk_path() -> Result<PathBuf, Error> {
const GLOB_PATTERN: &str = "/apex/com.android.virt/app/**/EmptyPayloadApp*.apk";
let mut entries: Vec<PathBuf> =
glob(GLOB_PATTERN).context("failed to glob")?.filter_map(|e| e.ok()).collect();
if entries.len() > 1 {
return Err(anyhow!("Found more than one apk matching {}", GLOB_PATTERN));
}
match entries.pop() {
Some(path) => Ok(path),
None => Err(anyhow!("No apks match {}", GLOB_PATTERN)),
}
}
fn create_work_dir() -> Result<PathBuf, Error> {
let s: String =
rand::thread_rng().sample_iter(&Alphanumeric).take(17).map(char::from).collect();
let work_dir = PathBuf::from("/data/local/tmp/microdroid").join(s);
println!("creating work dir {}", work_dir.display());
fs::create_dir_all(&work_dir).context("failed to mkdir")?;
Ok(work_dir)
}
/// Run a VM with Microdroid
pub fn command_run_microdroid(config: RunMicrodroidConfig) -> Result<(), Error> {
let apk = find_empty_payload_apk_path()?;
println!("found path {}", apk.display());
let work_dir = config.work_dir.unwrap_or(create_work_dir()?);
let idsig = work_dir.join("apk.idsig");
println!("apk.idsig path: {}", idsig.display());
let instance_img = work_dir.join("instance.img");
println!("instance.img path: {}", instance_img.display());
let mut app_config = RunAppConfig {
common: config.common,
debug: config.debug,
microdroid: config.microdroid,
apk,
idsig,
instance: instance_img,
payload_binary_name: Some("MicrodroidEmptyPayloadJniLib.so".to_owned()),
..Default::default()
};
if cfg!(llpvm_changes) {
app_config.set_instance_id(work_dir.join("instance_id"))?;
println!("instance_id file path: {}", app_config.instance_id()?.display());
}
command_run_app(app_config)
}
/// Run a VM from the given configuration file.
pub fn command_run(config: RunCustomVmConfig) -> Result<(), Error> {
let config_file = File::open(&config.config).context("Failed to open config file")?;
let mut vm_config =
VmConfig::load(&config_file).context("Failed to parse config file")?.to_parcelable()?;
if let Some(mem) = config.common.mem {
vm_config.memoryMib = mem as i32;
}
if let Some(name) = config.common.name {
vm_config.name = name;
} else {
vm_config.name = String::from("VmRun");
}
if let Some(gdb) = config.debug.gdb {
vm_config.gdbPort = gdb.get() as i32;
}
vm_config.cpuTopology = config.common.cpu_topology;
vm_config.hugePages = config.common.hugepages;
vm_config.boostUclamp = config.common.boost_uclamp;
run(
get_service()?.as_ref(),
&VirtualMachineConfig::RawConfig(vm_config),
&format!("{:?}", &config.config),
config.debug.console.as_ref().map(|p| p.as_ref()),
config.debug.console_in.as_ref().map(|p| p.as_ref()),
config.debug.log.as_ref().map(|p| p.as_ref()),
)
}
fn state_to_str(vm_state: VirtualMachineState) -> &'static str {
match vm_state {
VirtualMachineState::NOT_STARTED => "NOT_STARTED",
VirtualMachineState::STARTING => "STARTING",
VirtualMachineState::STARTED => "STARTED",
VirtualMachineState::READY => "READY",
VirtualMachineState::FINISHED => "FINISHED",
VirtualMachineState::DEAD => "DEAD",
_ => "(invalid state)",
}
}
fn run(
service: &dyn IVirtualizationService,
config: &VirtualMachineConfig,
payload_config: &str,
console_out_path: Option<&Path>,
console_in_path: Option<&Path>,
log_path: Option<&Path>,
) -> Result<(), Error> {
let console_out = if let Some(console_out_path) = console_out_path {
Some(File::create(console_out_path).with_context(|| {
format!("Failed to open console output file {:?}", console_out_path)
})?)
} else {
Some(duplicate_fd(io::stdout())?)
};
let console_in =
if let Some(console_in_path) = console_in_path {
Some(File::open(console_in_path).with_context(|| {
format!("Failed to open console input file {:?}", console_in_path)
})?)
} else {
Some(duplicate_fd(io::stdin())?)
};
let log = if let Some(log_path) = log_path {
Some(
File::create(log_path)
.with_context(|| format!("Failed to open log file {:?}", log_path))?,
)
} else {
Some(duplicate_fd(io::stdout())?)
};
let callback = Box::new(Callback {});
let vm = VmInstance::create(service, config, console_out, console_in, log, Some(callback))
.context("Failed to create VM")?;
vm.start().context("Failed to start VM")?;
let debug_level = get_debug_level(config).unwrap_or(DebugLevel::NONE);
println!(
"Created {} from {} with CID {}, state is {}.",
if debug_level == DebugLevel::FULL { "debuggable VM" } else { "VM" },
payload_config,
vm.cid(),
state_to_str(vm.state()?)
);
// Wait until the VM or VirtualizationService dies. If we just returned immediately then the
// IVirtualMachine Binder object would be dropped and the VM would be killed.
let death_reason = vm.wait_for_death();
println!("VM ended: {:?}", death_reason);
Ok(())
}
fn parse_extra_apk_list(apk: &Path, config_path: &str) -> Result<Vec<PathBuf>, Error> {
let mut archive = ZipArchive::new(File::open(apk)?)?;
let config_file = archive.by_name(config_path)?;
let config: VmPayloadConfig = serde_json::from_reader(config_file)?;
Ok(config.extra_apks.into_iter().map(|x| x.path.into()).collect())
}
struct Callback {}
impl vmclient::VmCallback for Callback {
fn on_payload_started(&self, _cid: i32) {
eprintln!("payload started");
}
fn on_payload_ready(&self, _cid: i32) {
eprintln!("payload is ready");
}
fn on_payload_finished(&self, _cid: i32, exit_code: i32) {
eprintln!("payload finished with exit code {}", exit_code);
}
fn on_error(&self, _cid: i32, error_code: ErrorCode, message: &str) {
eprintln!("VM encountered an error: code={:?}, message={}", error_code, message);
}
}
/// Safely duplicate the file descriptor.
fn duplicate_fd<T: AsFd>(file: T) -> io::Result<File> {
Ok(file.as_fd().try_clone_to_owned()?.into())
}