blob: 0b863a9a941432eeff0607ac027d93fc12d9283a [file] [log] [blame]
David Brazdil49f8a4d2021-03-04 09:57:33 +00001/*
2 * Copyright (C) 2020 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Andrew Walbran3e73a092021-06-25 11:32:23 +000017#include <linux/kvm.h>
18#include <sys/ioctl.h>
David Brazdil49f8a4d2021-03-04 09:57:33 +000019#include <sys/socket.h>
20#include <unistd.h>
21
22// Needs to be included after sys/socket.h
23#include <linux/vm_sockets.h>
24
Jiyong Parkdd4720b2021-06-25 13:05:50 +090025#include <algorithm>
26#include <array>
David Brazdil49f8a4d2021-03-04 09:57:33 +000027#include <iostream>
Andrew Walbrana89fc132021-03-17 17:08:36 +000028#include <optional>
David Brazdil49f8a4d2021-03-04 09:57:33 +000029
30#include "android-base/file.h"
31#include "android-base/logging.h"
32#include "android-base/parseint.h"
33#include "android-base/unique_fd.h"
Andrew Walbranf6bf6862021-05-21 12:41:13 +000034#include "android/system/virtualizationservice/VirtualMachineConfig.h"
Jooyung Han21e9b922021-06-26 04:14:16 +090035#include "android/system/virtualizationservice/VirtualMachineRawConfig.h"
David Brazdil49f8a4d2021-03-04 09:57:33 +000036#include "virt/VirtualizationTest.h"
37
Andrew Walbran3e73a092021-06-25 11:32:23 +000038#define KVM_CAP_ARM_PROTECTED_VM 0xffbadab1
39
David Brazdil49f8a4d2021-03-04 09:57:33 +000040using namespace android::base;
Andrew Walbran06b5f5c2021-03-31 12:34:13 +000041using namespace android::os;
David Brazdil49f8a4d2021-03-04 09:57:33 +000042
43namespace virt {
44
45static constexpr int kGuestPort = 45678;
Andrew Walbran3a5a9212021-05-04 17:09:08 +000046static constexpr const char kVmKernelPath[] = "/data/local/tmp/virt-test/kernel";
47static constexpr const char kVmInitrdPath[] = "/data/local/tmp/virt-test/initramfs";
48static constexpr const char kVmParams[] = "rdinit=/bin/init bin/vsock_client 2 45678 HelloWorld";
David Brazdil49f8a4d2021-03-04 09:57:33 +000049static constexpr const char kTestMessage[] = "HelloWorld";
50
Andrew Walbran3e73a092021-06-25 11:32:23 +000051/** Returns true if the kernel supports Protected KVM. */
52bool isPkvmSupported() {
53 unique_fd kvm_fd(open("/dev/kvm", O_NONBLOCK | O_CLOEXEC));
54 return kvm_fd != 0 && ioctl(kvm_fd, KVM_CHECK_EXTENSION, KVM_CAP_ARM_PROTECTED_VM) == 1;
55}
Jiyong Parkdd4720b2021-06-25 13:05:50 +090056
Andrew Walbran3e73a092021-06-25 11:32:23 +000057void runTest(sp<IVirtualizationService> virtualization_service, bool protected_vm) {
Jiyong Parkaaf32f22021-08-30 19:11:19 +090058 if (protected_vm && !isPkvmSupported()) {
59 GTEST_SKIP() << "Skipping as pKVM is not supported on this device.";
60 }
61
David Brazdil49f8a4d2021-03-04 09:57:33 +000062 binder::Status status;
63
64 unique_fd server_fd(TEMP_FAILURE_RETRY(socket(AF_VSOCK, SOCK_STREAM, 0)));
65 ASSERT_GE(server_fd, 0) << strerror(errno);
66
67 struct sockaddr_vm server_sa = (struct sockaddr_vm){
68 .svm_family = AF_VSOCK,
69 .svm_port = kGuestPort,
70 .svm_cid = VMADDR_CID_ANY,
71 };
72
73 int ret = TEMP_FAILURE_RETRY(bind(server_fd, (struct sockaddr *)&server_sa, sizeof(server_sa)));
74 ASSERT_EQ(ret, 0) << strerror(errno);
75
76 LOG(INFO) << "Listening on port " << kGuestPort << "...";
77 ret = TEMP_FAILURE_RETRY(listen(server_fd, 1));
78 ASSERT_EQ(ret, 0) << strerror(errno);
79
Jooyung Han21e9b922021-06-26 04:14:16 +090080 VirtualMachineRawConfig raw_config;
81 raw_config.kernel = ParcelFileDescriptor(unique_fd(open(kVmKernelPath, O_RDONLY | O_CLOEXEC)));
82 raw_config.initrd = ParcelFileDescriptor(unique_fd(open(kVmInitrdPath, O_RDONLY | O_CLOEXEC)));
83 raw_config.params = kVmParams;
Andrew Walbrancc045902021-07-27 16:06:17 +000084 raw_config.protectedVm = protected_vm;
Andrew Walbran3a5a9212021-05-04 17:09:08 +000085
Jooyung Han21e9b922021-06-26 04:14:16 +090086 VirtualMachineConfig config(std::move(raw_config));
David Brazdil49f8a4d2021-03-04 09:57:33 +000087 sp<IVirtualMachine> vm;
Jiyong Parkb8182bb2021-10-26 22:53:08 +090088 status = virtualization_service->createVm(config, std::nullopt, std::nullopt, &vm);
Andrew Walbranf8d94112021-09-07 11:45:36 +000089 ASSERT_TRUE(status.isOk()) << "Error creating VM: " << status;
David Brazdil49f8a4d2021-03-04 09:57:33 +000090
91 int32_t cid;
92 status = vm->getCid(&cid);
93 ASSERT_TRUE(status.isOk()) << "Error getting CID: " << status;
94 LOG(INFO) << "VM starting with CID " << cid;
95
Andrew Walbranf8d94112021-09-07 11:45:36 +000096 status = vm->start();
97 ASSERT_TRUE(status.isOk()) << "Error starting VM: " << status;
98
David Brazdil49f8a4d2021-03-04 09:57:33 +000099 LOG(INFO) << "Accepting connection...";
100 struct sockaddr_vm client_sa;
101 socklen_t client_sa_len = sizeof(client_sa);
102 unique_fd client_fd(
103 TEMP_FAILURE_RETRY(accept(server_fd, (struct sockaddr *)&client_sa, &client_sa_len)));
104 ASSERT_GE(client_fd, 0) << strerror(errno);
105 LOG(INFO) << "Connection from CID " << client_sa.svm_cid << " on port " << client_sa.svm_port;
106
107 LOG(INFO) << "Reading message from the client...";
108 std::string msg;
109 ASSERT_TRUE(ReadFdToString(client_fd, &msg));
110
111 LOG(INFO) << "Received message: " << msg;
112 ASSERT_EQ(msg, kTestMessage);
113}
114
Andrew Walbran3e73a092021-06-25 11:32:23 +0000115TEST_F(VirtualizationTest, TestVsock) {
Andrew Walbran3e73a092021-06-25 11:32:23 +0000116 runTest(mVirtualizationService, false);
117}
118
119TEST_F(VirtualizationTest, TestVsockProtected) {
Andrew Walbran3e73a092021-06-25 11:32:23 +0000120 runTest(mVirtualizationService, true);
121}
122
David Brazdil49f8a4d2021-03-04 09:57:33 +0000123} // namespace virt