blob: 34a2b0b4e19b909eac45827cc666db2a54133e05 [file] [log] [blame]
Andrew Walbran94bbf2f2022-05-12 18:35:42 +00001// Copyright 2022, The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15//! Integration test for VM bootloader.
16
17use android_system_virtualizationservice::{
18 aidl::android::system::virtualizationservice::{
David Brazdil7d1e5ec2023-02-06 17:56:29 +000019 CpuTopology::CpuTopology, DiskImage::DiskImage, VirtualMachineConfig::VirtualMachineConfig,
Andrew Walbran94bbf2f2022-05-12 18:35:42 +000020 VirtualMachineRawConfig::VirtualMachineRawConfig,
21 },
22 binder::{ParcelFileDescriptor, ProcessState},
23};
24use anyhow::{Context, Error};
25use log::info;
26use std::{
Jakob Vukalovicef996292023-04-13 14:28:34 +000027 collections::{HashSet, VecDeque},
Andrew Walbran94bbf2f2022-05-12 18:35:42 +000028 fs::File,
Andrew Walbran8d05dae2023-03-22 16:42:55 +000029 io::{self, BufRead, BufReader, Read, Write},
Pierre-Clément Tosi0d1aed02022-11-17 17:06:28 +000030 panic, thread,
Andrew Walbran94bbf2f2022-05-12 18:35:42 +000031};
32use vmclient::{DeathReason, VmInstance};
33
Pierre-Clément Tosi48ac6a92024-08-14 00:42:05 +010034const VMBASE_EXAMPLE_KERNEL_PATH: &str = "vmbase_example_kernel.bin";
Pierre-Clément Tosie0d68402024-08-14 00:27:47 +010035const VMBASE_EXAMPLE_BIOS_PATH: &str = "vmbase_example_bios.bin";
Nikita Putikhincf9c24e2024-07-16 12:42:14 +020036const TEST_DISK_IMAGE_PATH: &str = "test_disk.img";
37const EMPTY_DISK_IMAGE_PATH: &str = "empty_disk.img";
Andrew Walbran94bbf2f2022-05-12 18:35:42 +000038
Pierre-Clément Tosi48ac6a92024-08-14 00:42:05 +010039/// Runs the vmbase_example VM as an unprotected VM kernel via VirtualizationService.
40#[test]
41fn test_run_example_kernel_vm() -> Result<(), Error> {
42 run_test(Some(open_payload(VMBASE_EXAMPLE_KERNEL_PATH)?), None)
43}
44
Pierre-Clément Tosie0d68402024-08-14 00:27:47 +010045/// Runs the vmbase_example VM as an unprotected VM BIOS via VirtualizationService.
Andrew Walbran94bbf2f2022-05-12 18:35:42 +000046#[test]
Pierre-Clément Tosie0d68402024-08-14 00:27:47 +010047fn test_run_example_bios_vm() -> Result<(), Error> {
Pierre-Clément Tosi48ac6a92024-08-14 00:42:05 +010048 run_test(None, Some(open_payload(VMBASE_EXAMPLE_BIOS_PATH)?))
Pierre-Clément Tosie0d68402024-08-14 00:27:47 +010049}
50
Pierre-Clément Tosi48ac6a92024-08-14 00:42:05 +010051fn run_test(
52 kernel: Option<ParcelFileDescriptor>,
53 bootloader: Option<ParcelFileDescriptor>,
54) -> Result<(), Error> {
Pierre-Clément Tosi0d1aed02022-11-17 17:06:28 +000055 android_logger::init_once(
Jeff Vander Stoepd9dda0c2024-02-07 14:27:06 +010056 android_logger::Config::default()
57 .with_tag("vmbase")
58 .with_max_level(log::LevelFilter::Debug),
Pierre-Clément Tosi0d1aed02022-11-17 17:06:28 +000059 );
60
61 // Redirect panic messages to logcat.
62 panic::set_hook(Box::new(|panic_info| {
63 log::error!("{}", panic_info);
64 }));
Andrew Walbran94bbf2f2022-05-12 18:35:42 +000065
66 // We need to start the thread pool for Binder to work properly, especially link_to_death.
67 ProcessState::start_thread_pool();
68
David Brazdil4b4c5102022-12-19 22:56:20 +000069 let virtmgr =
70 vmclient::VirtualizationService::new().context("Failed to spawn VirtualizationService")?;
71 let service = virtmgr.connect().context("Failed to connect to VirtualizationService")?;
Andrew Walbran94bbf2f2022-05-12 18:35:42 +000072
Andrew Walbranb713baa2022-12-07 14:34:49 +000073 // Make file for test disk image.
74 let mut test_image = File::options()
75 .create(true)
76 .read(true)
77 .write(true)
78 .truncate(true)
79 .open(TEST_DISK_IMAGE_PATH)
80 .with_context(|| format!("Failed to open test disk image {}", TEST_DISK_IMAGE_PATH))?;
81 // Write 4 sectors worth of 4-byte numbers counting up.
82 for i in 0u32..512 {
83 test_image.write_all(&i.to_le_bytes())?;
84 }
85 let test_image = ParcelFileDescriptor::new(test_image);
86 let disk_image = DiskImage { image: Some(test_image), writable: false, partitions: vec![] };
87
Andrew Walbran6ac174e2023-06-23 14:58:51 +000088 // Make file for empty test disk image.
89 let empty_image = File::options()
90 .create(true)
91 .read(true)
92 .write(true)
93 .truncate(true)
94 .open(EMPTY_DISK_IMAGE_PATH)
95 .with_context(|| format!("Failed to open empty disk image {}", EMPTY_DISK_IMAGE_PATH))?;
96 let empty_image = ParcelFileDescriptor::new(empty_image);
97 let empty_disk_image =
98 DiskImage { image: Some(empty_image), writable: false, partitions: vec![] };
99
Andrew Walbran94bbf2f2022-05-12 18:35:42 +0000100 let config = VirtualMachineConfig::RawConfig(VirtualMachineRawConfig {
Seungjae Yoo62085c02022-08-12 04:44:52 +0000101 name: String::from("VmBaseTest"),
Pierre-Clément Tosi48ac6a92024-08-14 00:42:05 +0100102 kernel,
Andrew Walbran94bbf2f2022-05-12 18:35:42 +0000103 initrd: None,
104 params: None,
Pierre-Clément Tosie0d68402024-08-14 00:27:47 +0100105 bootloader,
Andrew Walbran6ac174e2023-06-23 14:58:51 +0000106 disks: vec![disk_image, empty_disk_image],
Andrew Walbran94bbf2f2022-05-12 18:35:42 +0000107 protectedVm: false,
108 memoryMib: 300,
David Brazdil7d1e5ec2023-02-06 17:56:29 +0000109 cpuTopology: CpuTopology::ONE_CPU,
Andrew Walbran94bbf2f2022-05-12 18:35:42 +0000110 platformVersion: "~1.0".to_string(),
Nikita Ioffe5776f082023-02-10 21:38:26 +0000111 gdbPort: 0, // no gdb
Inseob Kim6ef80972023-07-20 17:23:36 +0900112 ..Default::default()
Andrew Walbran94bbf2f2022-05-12 18:35:42 +0000113 });
Jakob Vukalovicef996292023-04-13 14:28:34 +0000114 let (handle, console) = android_log_fd()?;
Andrew Walbran8d05dae2023-03-22 16:42:55 +0000115 let (mut log_reader, log_writer) = pipe()?;
Jiyong Parke6fb1672023-06-26 16:45:55 +0900116 let vm = VmInstance::create(
117 service.as_ref(),
118 &config,
119 Some(console),
120 /* consoleIn */ None,
121 Some(log_writer),
Elie Kheirallah5c807a22024-09-23 20:40:42 +0000122 /* dump_dt */ None,
Jiyong Parke6fb1672023-06-26 16:45:55 +0900123 None,
124 )
125 .context("Failed to create VM")?;
Andrew Walbran94bbf2f2022-05-12 18:35:42 +0000126 vm.start().context("Failed to start VM")?;
127 info!("Started example VM.");
128
129 // Wait for VM to finish, and check that it shut down cleanly.
130 let death_reason = vm.wait_for_death();
131 assert_eq!(death_reason, DeathReason::Shutdown);
Jakob Vukalovicef996292023-04-13 14:28:34 +0000132 handle.join().unwrap();
Andrew Walbran94bbf2f2022-05-12 18:35:42 +0000133
Andrew Walbran8d05dae2023-03-22 16:42:55 +0000134 // Check that the expected string was written to the log VirtIO console device.
135 let expected = "Hello VirtIO console\n";
136 let mut log_output = String::new();
137 assert_eq!(log_reader.read_to_string(&mut log_output)?, expected.len());
138 assert_eq!(log_output, expected);
139
Andrew Walbran94bbf2f2022-05-12 18:35:42 +0000140 Ok(())
141}
142
Jakob Vukalovicef996292023-04-13 14:28:34 +0000143fn android_log_fd() -> Result<(thread::JoinHandle<()>, File), io::Error> {
Andrew Walbran8d05dae2023-03-22 16:42:55 +0000144 let (reader, writer) = pipe()?;
Jakob Vukalovicef996292023-04-13 14:28:34 +0000145 let handle = thread::spawn(|| VmLogProcessor::new(reader).run().unwrap());
146 Ok((handle, writer))
Andrew Walbran94bbf2f2022-05-12 18:35:42 +0000147}
Andrew Walbran8d05dae2023-03-22 16:42:55 +0000148
149fn pipe() -> io::Result<(File, File)> {
150 let (reader_fd, writer_fd) = nix::unistd::pipe()?;
Frederick Maylefbbcfcd2024-04-08 16:31:54 -0700151 Ok((reader_fd.into(), writer_fd.into()))
Andrew Walbran8d05dae2023-03-22 16:42:55 +0000152}
Jakob Vukalovicef996292023-04-13 14:28:34 +0000153
Pierre-Clément Tosie0d68402024-08-14 00:27:47 +0100154fn open_payload(path: &str) -> Result<ParcelFileDescriptor, Error> {
155 let file = File::open(path).with_context(|| format!("Failed to open VM image {path}"))?;
156 Ok(ParcelFileDescriptor::new(file))
157}
158
Jakob Vukalovicef996292023-04-13 14:28:34 +0000159struct VmLogProcessor {
160 reader: Option<File>,
161 expected: VecDeque<String>,
162 unexpected: HashSet<String>,
163 had_unexpected: bool,
164}
165
166impl VmLogProcessor {
167 fn messages() -> (VecDeque<String>, HashSet<String>) {
168 let mut expected = VecDeque::new();
169 let mut unexpected = HashSet::new();
170 for log_lvl in ["[ERROR]", "[WARN]", "[INFO]", "[DEBUG]"] {
171 expected.push_back(format!("{log_lvl} Unsuppressed message"));
172 unexpected.insert(format!("{log_lvl} Suppressed message"));
173 }
174 (expected, unexpected)
175 }
176
177 fn new(reader: File) -> Self {
178 let (expected, unexpected) = Self::messages();
179 Self { reader: Some(reader), expected, unexpected, had_unexpected: false }
180 }
181
182 fn verify(&mut self, msg: &str) {
183 if self.expected.front() == Some(&msg.to_owned()) {
184 self.expected.pop_front();
185 }
186 if !self.had_unexpected && self.unexpected.contains(msg) {
187 self.had_unexpected = true;
188 }
189 }
190
191 fn run(mut self) -> Result<(), &'static str> {
192 for line in BufReader::new(self.reader.take().unwrap()).lines() {
193 let msg = line.unwrap();
194 info!("{msg}");
195 self.verify(&msg);
196 }
197 if !self.expected.is_empty() {
198 Err("missing expected log message")
199 } else if self.had_unexpected {
200 Err("unexpected log message")
201 } else {
202 Ok(())
203 }
204 }
205}