blob: 967314b7f3db639c933a11beed067e9359faa142 [file] [log] [blame]
Andrew Walbranf395b822021-05-05 10:38:59 +00001// Copyright 2021, The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15//! Command to run a VM.
16
Jiyong Park48b354d2021-07-15 15:04:38 +090017use crate::create_partition::command_create_partition;
Jooyung Han21e9b922021-06-26 04:14:16 +090018use android_system_virtualizationservice::aidl::android::system::virtualizationservice::{
Alan Stokes0d1ef782022-09-27 13:46:35 +010019 IVirtualizationService::IVirtualizationService,
20 PartitionType::PartitionType,
21 VirtualMachineAppConfig::{DebugLevel::DebugLevel, Payload::Payload, VirtualMachineAppConfig},
22 VirtualMachineConfig::VirtualMachineConfig,
Andrew Walbranf8d94112021-09-07 11:45:36 +000023 VirtualMachineState::VirtualMachineState,
Jooyung Han21e9b922021-06-26 04:14:16 +090024};
Inseob Kima5a262f2021-11-17 19:41:03 +090025use anyhow::{bail, Context, Error};
Alan Stokes0e82b502022-08-08 14:44:48 +010026use binder::ParcelFileDescriptor;
Inseob Kima5a262f2021-11-17 19:41:03 +090027use microdroid_payload_config::VmPayloadConfig;
Andrew Walbranf395b822021-05-05 10:38:59 +000028use std::fs::File;
Jiyong Park8611a6c2021-07-09 18:17:44 +090029use std::io::{self, BufRead, BufReader};
Andrew Walbranf395b822021-05-05 10:38:59 +000030use std::os::unix::io::{AsRawFd, FromRawFd};
Inseob Kima5a262f2021-11-17 19:41:03 +090031use std::path::{Path, PathBuf};
Alan Stokes2bead0d2022-09-05 16:58:34 +010032use vmclient::{ErrorCode, VmInstance};
Jiyong Park48b354d2021-07-15 15:04:38 +090033use vmconfig::{open_parcel_file, VmConfig};
Inseob Kima5a262f2021-11-17 19:41:03 +090034use zip::ZipArchive;
Andrew Walbranf395b822021-05-05 10:38:59 +000035
Jooyung Han21e9b922021-06-26 04:14:16 +090036/// Run a VM from the given APK, idsig, and config.
Jiyong Park48b354d2021-07-15 15:04:38 +090037#[allow(clippy::too_many_arguments)]
Jooyung Han21e9b922021-06-26 04:14:16 +090038pub fn command_run_app(
Seungjae Yoo62085c02022-08-12 04:44:52 +000039 name: Option<String>,
Andrew Walbran616d13f2022-05-12 18:35:55 +000040 service: &dyn IVirtualizationService,
Jooyung Han21e9b922021-06-26 04:14:16 +090041 apk: &Path,
42 idsig: &Path,
Jiyong Park48b354d2021-07-15 15:04:38 +090043 instance: &Path,
Shikha Panwar22e70452022-10-10 18:32:55 +000044 storage: Option<&Path>,
45 storage_size: Option<u64>,
Jooyung Han21e9b922021-06-26 04:14:16 +090046 config_path: &str,
47 daemonize: bool,
Jiyong Parkb8182bb2021-10-26 22:53:08 +090048 console_path: Option<&Path>,
Jooyung Han21e9b922021-06-26 04:14:16 +090049 log_path: Option<&Path>,
Jiyong Parke558ab12022-07-07 20:18:55 +090050 ramdump_path: Option<&Path>,
Jiyong Parkc2a49cc2021-10-15 00:02:12 +090051 debug_level: DebugLevel,
Andrew Walbran3994f002022-01-27 17:33:45 +000052 protected: bool,
Jiyong Parkd63cfff2021-09-27 20:10:17 +090053 mem: Option<u32>,
Jiyong Park032615f2022-01-10 13:55:34 +090054 cpus: Option<u32>,
Jiyong Parkdfe16d62022-04-20 17:32:12 +090055 task_profiles: Vec<String>,
Inseob Kima5a262f2021-11-17 19:41:03 +090056 extra_idsigs: &[PathBuf],
Jooyung Han21e9b922021-06-26 04:14:16 +090057) -> Result<(), Error> {
Inseob Kima5a262f2021-11-17 19:41:03 +090058 let extra_apks = parse_extra_apk_list(apk, config_path)?;
59 if extra_apks.len() != extra_idsigs.len() {
60 bail!(
61 "Found {} extra apks, but there are {} extra idsigs",
62 extra_apks.len(),
63 extra_idsigs.len()
64 )
65 }
66
67 for i in 0..extra_apks.len() {
68 let extra_apk_fd = ParcelFileDescriptor::new(File::open(&extra_apks[i])?);
69 let extra_idsig_fd = ParcelFileDescriptor::new(File::create(&extra_idsigs[i])?);
70 service.createOrUpdateIdsigFile(&extra_apk_fd, &extra_idsig_fd)?;
71 }
72
Jooyung Han21e9b922021-06-26 04:14:16 +090073 let apk_file = File::open(apk).context("Failed to open APK file")?;
Jiyong Park0a248432021-08-20 23:32:39 +090074 let idsig_file = File::create(idsig).context("Failed to create idsig file")?;
75
76 let apk_fd = ParcelFileDescriptor::new(apk_file);
77 let idsig_fd = ParcelFileDescriptor::new(idsig_file);
78 service.createOrUpdateIdsigFile(&apk_fd, &idsig_fd)?;
79
Jooyung Han21e9b922021-06-26 04:14:16 +090080 let idsig_file = File::open(idsig).context("Failed to open idsig file")?;
Jiyong Park0a248432021-08-20 23:32:39 +090081 let idsig_fd = ParcelFileDescriptor::new(idsig_file);
Jiyong Park48b354d2021-07-15 15:04:38 +090082
83 if !instance.exists() {
84 const INSTANCE_FILE_SIZE: u64 = 10 * 1024 * 1024;
Jiyong Park9dd389e2021-08-23 20:42:59 +090085 command_create_partition(
Andrew Walbran616d13f2022-05-12 18:35:55 +000086 service,
Jiyong Park9dd389e2021-08-23 20:42:59 +090087 instance,
88 INSTANCE_FILE_SIZE,
89 PartitionType::ANDROID_VM_INSTANCE,
90 )?;
Jiyong Park48b354d2021-07-15 15:04:38 +090091 }
92
Shikha Panwar22e70452022-10-10 18:32:55 +000093 let storage = if let Some(path) = storage {
94 if !path.exists() {
95 command_create_partition(
96 service,
97 path,
98 storage_size.unwrap_or(10 * 1024 * 1024),
99 PartitionType::RAW,
100 )?;
101 }
102 Some(open_parcel_file(path, true)?)
103 } else {
104 None
105 };
106
Inseob Kima5a262f2021-11-17 19:41:03 +0900107 let extra_idsig_files: Result<Vec<File>, _> = extra_idsigs.iter().map(File::open).collect();
108 let extra_idsig_fds = extra_idsig_files?.into_iter().map(ParcelFileDescriptor::new).collect();
109
Jooyung Han21e9b922021-06-26 04:14:16 +0900110 let config = VirtualMachineConfig::AppConfig(VirtualMachineAppConfig {
Seungjae Yoo62085c02022-08-12 04:44:52 +0000111 name: name.unwrap_or_else(|| String::from("VmRunApp")),
Jiyong Park0a248432021-08-20 23:32:39 +0900112 apk: apk_fd.into(),
113 idsig: idsig_fd.into(),
Inseob Kima5a262f2021-11-17 19:41:03 +0900114 extraIdsigs: extra_idsig_fds,
Jiyong Park48b354d2021-07-15 15:04:38 +0900115 instanceImage: open_parcel_file(instance, true /* writable */)?.into(),
Shikha Panwar22e70452022-10-10 18:32:55 +0000116 encryptedStorageImage: storage,
Alan Stokes0d1ef782022-09-27 13:46:35 +0100117 payload: Payload::ConfigPath(config_path.to_owned()),
Jiyong Parkc2a49cc2021-10-15 00:02:12 +0900118 debugLevel: debug_level,
Andrew Walbran3994f002022-01-27 17:33:45 +0000119 protectedVm: protected,
Jiyong Parkd63cfff2021-09-27 20:10:17 +0900120 memoryMib: mem.unwrap_or(0) as i32, // 0 means use the VM default
Jiyong Park032615f2022-01-10 13:55:34 +0900121 numCpus: cpus.unwrap_or(1) as i32,
Jiyong Parkdfe16d62022-04-20 17:32:12 +0900122 taskProfiles: task_profiles,
Jooyung Han21e9b922021-06-26 04:14:16 +0900123 });
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900124 run(
125 service,
126 &config,
127 &format!("{:?}!{:?}", apk, config_path),
128 daemonize,
129 console_path,
130 log_path,
Jiyong Parke558ab12022-07-07 20:18:55 +0900131 ramdump_path,
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900132 )
Jooyung Han21e9b922021-06-26 04:14:16 +0900133}
134
Andrew Walbranf395b822021-05-05 10:38:59 +0000135/// Run a VM from the given configuration file.
Jooyung Hanb7983a22022-02-22 05:21:27 +0900136#[allow(clippy::too_many_arguments)]
Andrew Walbranf395b822021-05-05 10:38:59 +0000137pub fn command_run(
Seungjae Yoo62085c02022-08-12 04:44:52 +0000138 name: Option<String>,
Andrew Walbran616d13f2022-05-12 18:35:55 +0000139 service: &dyn IVirtualizationService,
Andrew Walbranf395b822021-05-05 10:38:59 +0000140 config_path: &Path,
141 daemonize: bool,
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900142 console_path: Option<&Path>,
Jooyung Hanb7983a22022-02-22 05:21:27 +0900143 log_path: Option<&Path>,
Jiyong Parkd63cfff2021-09-27 20:10:17 +0900144 mem: Option<u32>,
Jiyong Park032615f2022-01-10 13:55:34 +0900145 cpus: Option<u32>,
Jiyong Parkdfe16d62022-04-20 17:32:12 +0900146 task_profiles: Vec<String>,
Andrew Walbranf395b822021-05-05 10:38:59 +0000147) -> Result<(), Error> {
Andrew Walbran3a5a9212021-05-04 17:09:08 +0000148 let config_file = File::open(config_path).context("Failed to open config file")?;
Jiyong Parkd63cfff2021-09-27 20:10:17 +0900149 let mut config =
Andrew Walbran3a5a9212021-05-04 17:09:08 +0000150 VmConfig::load(&config_file).context("Failed to parse config file")?.to_parcelable()?;
Jiyong Parkd63cfff2021-09-27 20:10:17 +0900151 if let Some(mem) = mem {
152 config.memoryMib = mem as i32;
153 }
Jiyong Park032615f2022-01-10 13:55:34 +0900154 if let Some(cpus) = cpus {
155 config.numCpus = cpus as i32;
156 }
Seungjae Yoo62085c02022-08-12 04:44:52 +0000157 if let Some(name) = name {
158 config.name = name;
159 } else {
160 config.name = String::from("VmRun");
161 }
Jiyong Parkdfe16d62022-04-20 17:32:12 +0900162 config.taskProfiles = task_profiles;
Jooyung Han21e9b922021-06-26 04:14:16 +0900163 run(
164 service,
165 &VirtualMachineConfig::RawConfig(config),
166 &format!("{:?}", config_path),
167 daemonize,
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900168 console_path,
Jooyung Hanb7983a22022-02-22 05:21:27 +0900169 log_path,
Jiyong Parke558ab12022-07-07 20:18:55 +0900170 /* ramdump_path */ None,
Jooyung Han21e9b922021-06-26 04:14:16 +0900171 )
172}
173
Andrew Walbranf8d94112021-09-07 11:45:36 +0000174fn state_to_str(vm_state: VirtualMachineState) -> &'static str {
175 match vm_state {
176 VirtualMachineState::NOT_STARTED => "NOT_STARTED",
177 VirtualMachineState::STARTING => "STARTING",
178 VirtualMachineState::STARTED => "STARTED",
179 VirtualMachineState::READY => "READY",
180 VirtualMachineState::FINISHED => "FINISHED",
181 VirtualMachineState::DEAD => "DEAD",
182 _ => "(invalid state)",
183 }
184}
185
Jooyung Han21e9b922021-06-26 04:14:16 +0900186fn run(
Andrew Walbran616d13f2022-05-12 18:35:55 +0000187 service: &dyn IVirtualizationService,
Jooyung Han21e9b922021-06-26 04:14:16 +0900188 config: &VirtualMachineConfig,
189 config_path: &str,
190 daemonize: bool,
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900191 console_path: Option<&Path>,
Jooyung Han21e9b922021-06-26 04:14:16 +0900192 log_path: Option<&Path>,
Jiyong Parke558ab12022-07-07 20:18:55 +0900193 ramdump_path: Option<&Path>,
Jooyung Han21e9b922021-06-26 04:14:16 +0900194) -> Result<(), Error> {
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900195 let console = if let Some(console_path) = console_path {
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000196 Some(
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900197 File::create(console_path)
198 .with_context(|| format!("Failed to open console file {:?}", console_path))?,
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000199 )
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900200 } else if daemonize {
201 None
202 } else {
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000203 Some(duplicate_stdout()?)
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900204 };
205 let log = if let Some(log_path) = log_path {
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000206 Some(
Andrew Walbranbe429242021-06-28 12:22:54 +0000207 File::create(log_path)
208 .with_context(|| format!("Failed to open log file {:?}", log_path))?,
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000209 )
Andrew Walbranbe429242021-06-28 12:22:54 +0000210 } else if daemonize {
211 None
212 } else {
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000213 Some(duplicate_stdout()?)
Andrew Walbranbe429242021-06-28 12:22:54 +0000214 };
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900215
Alan Stokes0e82b502022-08-08 14:44:48 +0100216 let callback = Box::new(Callback {});
217 let vm = VmInstance::create(service, config, console, log, Some(callback))
218 .context("Failed to create VM")?;
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000219 vm.start().context("Failed to start VM")?;
Andrew Walbranf395b822021-05-05 10:38:59 +0000220
Andrew Walbranf8d94112021-09-07 11:45:36 +0000221 println!(
222 "Created VM from {} with CID {}, state is {}.",
223 config_path,
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000224 vm.cid(),
225 state_to_str(vm.state()?)
Andrew Walbranf8d94112021-09-07 11:45:36 +0000226 );
Andrew Walbranf395b822021-05-05 10:38:59 +0000227
228 if daemonize {
Andrew Walbranf6bf6862021-05-21 12:41:13 +0000229 // Pass the VM reference back to VirtualizationService and have it hold it in the
230 // background.
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000231 service.debugHoldVmRef(&vm.vm).context("Failed to pass VM to VirtualizationService")?;
Andrew Walbranf395b822021-05-05 10:38:59 +0000232 } else {
Andrew Walbranf6bf6862021-05-21 12:41:13 +0000233 // Wait until the VM or VirtualizationService dies. If we just returned immediately then the
Andrew Walbranf395b822021-05-05 10:38:59 +0000234 // IVirtualMachine Binder object would be dropped and the VM would be killed.
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000235 let death_reason = vm.wait_for_death();
Jiyong Parke558ab12022-07-07 20:18:55 +0900236
237 if let Some(path) = ramdump_path {
238 save_ramdump_if_available(path, &vm)?;
239 }
Alan Stokes2bead0d2022-09-05 16:58:34 +0100240 println!("VM ended: {:?}", death_reason);
Andrew Walbranf395b822021-05-05 10:38:59 +0000241 }
Andrew Walbranf395b822021-05-05 10:38:59 +0000242
Andrew Walbranf395b822021-05-05 10:38:59 +0000243 Ok(())
244}
245
Jiyong Parke558ab12022-07-07 20:18:55 +0900246fn save_ramdump_if_available(path: &Path, vm: &VmInstance) -> Result<(), Error> {
247 if let Some(mut ramdump) = vm.get_ramdump() {
248 let mut file =
249 File::create(path).context(format!("Failed to create ramdump file {:?}", path))?;
250 let size = std::io::copy(&mut ramdump, &mut file)
251 .context(format!("Failed to save ramdump to file {:?}", path))?;
252 eprintln!("Ramdump ({} bytes) saved to {:?}", size, path);
253 }
254 Ok(())
255}
256
Inseob Kima5a262f2021-11-17 19:41:03 +0900257fn parse_extra_apk_list(apk: &Path, config_path: &str) -> Result<Vec<String>, Error> {
258 let mut archive = ZipArchive::new(File::open(apk)?)?;
259 let config_file = archive.by_name(config_path)?;
260 let config: VmPayloadConfig = serde_json::from_reader(config_file)?;
261 Ok(config.extra_apks.into_iter().map(|x| x.path).collect())
262}
263
Alan Stokes0e82b502022-08-08 14:44:48 +0100264struct Callback {}
Andrew Walbranf395b822021-05-05 10:38:59 +0000265
Alan Stokes0e82b502022-08-08 14:44:48 +0100266impl vmclient::VmCallback for Callback {
267 fn on_payload_started(&self, _cid: i32, stream: Option<&File>) {
Inseob Kim7f61fe72021-08-20 20:50:47 +0900268 // Show the output of the payload
269 if let Some(stream) = stream {
Jiyong Parke39c7652022-09-02 16:45:57 +0900270 let mut reader = BufReader::new(stream.try_clone().unwrap());
271 std::thread::spawn(move || loop {
Inseob Kim7f61fe72021-08-20 20:50:47 +0900272 let mut s = String::new();
273 match reader.read_line(&mut s) {
274 Ok(0) => break,
275 Ok(_) => print!("{}", s),
276 Err(e) => eprintln!("error reading from virtual machine: {}", e),
277 };
Jiyong Parke39c7652022-09-02 16:45:57 +0900278 });
Jiyong Park8611a6c2021-07-09 18:17:44 +0900279 }
Jiyong Park8611a6c2021-07-09 18:17:44 +0900280 }
281
Alan Stokes0e82b502022-08-08 14:44:48 +0100282 fn on_payload_ready(&self, _cid: i32) {
Inseob Kim8dbc3222021-09-01 21:50:23 +0900283 eprintln!("payload is ready");
Inseob Kim14cb8692021-08-31 21:50:39 +0900284 }
285
Alan Stokes0e82b502022-08-08 14:44:48 +0100286 fn on_payload_finished(&self, _cid: i32, exit_code: i32) {
Inseob Kim8dbc3222021-09-01 21:50:23 +0900287 eprintln!("payload finished with exit code {}", exit_code);
Inseob Kim2444af92021-08-31 01:22:50 +0900288 }
289
Alan Stokes2bead0d2022-09-05 16:58:34 +0100290 fn on_error(&self, _cid: i32, error_code: ErrorCode, message: &str) {
291 eprintln!("VM encountered an error: code={:?}, message={}", error_code, message);
Andrew Walbranf395b822021-05-05 10:38:59 +0000292 }
293}
294
295/// Safely duplicate the standard output file descriptor.
296fn duplicate_stdout() -> io::Result<File> {
297 let stdout_fd = io::stdout().as_raw_fd();
298 // Safe because this just duplicates a file descriptor which we know to be valid, and we check
299 // for an error.
300 let dup_fd = unsafe { libc::dup(stdout_fd) };
301 if dup_fd < 0 {
302 Err(io::Error::last_os_error())
303 } else {
304 // Safe because we have just duplicated the file descriptor so we own it, and `from_raw_fd`
305 // takes ownership of it.
306 Ok(unsafe { File::from_raw_fd(dup_fd) })
307 }
308}