blob: 6096913e0fb1f40ca630030167b9f70ec6abff1e [file] [log] [blame]
Andrew Walbranf395b822021-05-05 10:38:59 +00001// Copyright 2021, The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15//! Command to run a VM.
16
Jiyong Park48b354d2021-07-15 15:04:38 +090017use crate::create_partition::command_create_partition;
Jooyung Han21e9b922021-06-26 04:14:16 +090018use android_system_virtualizationservice::aidl::android::system::virtualizationservice::{
Alan Stokes0d1ef782022-09-27 13:46:35 +010019 IVirtualizationService::IVirtualizationService,
20 PartitionType::PartitionType,
21 VirtualMachineAppConfig::{DebugLevel::DebugLevel, Payload::Payload, VirtualMachineAppConfig},
22 VirtualMachineConfig::VirtualMachineConfig,
Inseob Kim7b5f65c2022-11-15 14:27:04 +090023 VirtualMachinePayloadConfig::VirtualMachinePayloadConfig,
Andrew Walbranf8d94112021-09-07 11:45:36 +000024 VirtualMachineState::VirtualMachineState,
Jooyung Han21e9b922021-06-26 04:14:16 +090025};
Nikita Ioffeb0b67562022-11-22 15:48:06 +000026use anyhow::{anyhow, bail, Context, Error};
Alan Stokes0e82b502022-08-08 14:44:48 +010027use binder::ParcelFileDescriptor;
Inseob Kima5a262f2021-11-17 19:41:03 +090028use microdroid_payload_config::VmPayloadConfig;
Nikita Ioffeb0b67562022-11-22 15:48:06 +000029use rand::{distributions::Alphanumeric, Rng};
30use std::fs;
Andrew Walbranf395b822021-05-05 10:38:59 +000031use std::fs::File;
Alan Stokesf30982b2022-11-18 11:50:32 +000032use std::io;
Andrew Walbranf395b822021-05-05 10:38:59 +000033use std::os::unix::io::{AsRawFd, FromRawFd};
Inseob Kima5a262f2021-11-17 19:41:03 +090034use std::path::{Path, PathBuf};
Nikita Ioffeb0b67562022-11-22 15:48:06 +000035use std::process::Command;
Alan Stokes2bead0d2022-09-05 16:58:34 +010036use vmclient::{ErrorCode, VmInstance};
Jiyong Park48b354d2021-07-15 15:04:38 +090037use vmconfig::{open_parcel_file, VmConfig};
Inseob Kima5a262f2021-11-17 19:41:03 +090038use zip::ZipArchive;
Andrew Walbranf395b822021-05-05 10:38:59 +000039
Jooyung Han21e9b922021-06-26 04:14:16 +090040/// Run a VM from the given APK, idsig, and config.
Jiyong Park48b354d2021-07-15 15:04:38 +090041#[allow(clippy::too_many_arguments)]
Jooyung Han21e9b922021-06-26 04:14:16 +090042pub fn command_run_app(
Seungjae Yoo62085c02022-08-12 04:44:52 +000043 name: Option<String>,
Andrew Walbran616d13f2022-05-12 18:35:55 +000044 service: &dyn IVirtualizationService,
Jooyung Han21e9b922021-06-26 04:14:16 +090045 apk: &Path,
46 idsig: &Path,
Jiyong Park48b354d2021-07-15 15:04:38 +090047 instance: &Path,
Shikha Panwar22e70452022-10-10 18:32:55 +000048 storage: Option<&Path>,
49 storage_size: Option<u64>,
Inseob Kim7b5f65c2022-11-15 14:27:04 +090050 config_path: Option<String>,
51 payload_path: Option<String>,
Jooyung Han21e9b922021-06-26 04:14:16 +090052 daemonize: bool,
Jiyong Parkb8182bb2021-10-26 22:53:08 +090053 console_path: Option<&Path>,
Jooyung Han21e9b922021-06-26 04:14:16 +090054 log_path: Option<&Path>,
Jiyong Parkc2a49cc2021-10-15 00:02:12 +090055 debug_level: DebugLevel,
Andrew Walbran3994f002022-01-27 17:33:45 +000056 protected: bool,
Jiyong Parkd63cfff2021-09-27 20:10:17 +090057 mem: Option<u32>,
Jiyong Park032615f2022-01-10 13:55:34 +090058 cpus: Option<u32>,
Jiyong Parkdfe16d62022-04-20 17:32:12 +090059 task_profiles: Vec<String>,
Inseob Kima5a262f2021-11-17 19:41:03 +090060 extra_idsigs: &[PathBuf],
Jooyung Han21e9b922021-06-26 04:14:16 +090061) -> Result<(), Error> {
Steven Moreland6a55e2e2022-10-22 00:30:42 +000062 let apk_file = File::open(apk).context("Failed to open APK file")?;
63
Inseob Kim7b5f65c2022-11-15 14:27:04 +090064 let extra_apks = match config_path.as_deref() {
65 Some(path) => parse_extra_apk_list(apk, path)?,
66 None => vec![],
67 };
68
Inseob Kima5a262f2021-11-17 19:41:03 +090069 if extra_apks.len() != extra_idsigs.len() {
70 bail!(
71 "Found {} extra apks, but there are {} extra idsigs",
72 extra_apks.len(),
73 extra_idsigs.len()
74 )
75 }
76
77 for i in 0..extra_apks.len() {
78 let extra_apk_fd = ParcelFileDescriptor::new(File::open(&extra_apks[i])?);
79 let extra_idsig_fd = ParcelFileDescriptor::new(File::create(&extra_idsigs[i])?);
80 service.createOrUpdateIdsigFile(&extra_apk_fd, &extra_idsig_fd)?;
81 }
82
Jiyong Park0a248432021-08-20 23:32:39 +090083 let idsig_file = File::create(idsig).context("Failed to create idsig file")?;
84
85 let apk_fd = ParcelFileDescriptor::new(apk_file);
86 let idsig_fd = ParcelFileDescriptor::new(idsig_file);
87 service.createOrUpdateIdsigFile(&apk_fd, &idsig_fd)?;
88
Jooyung Han21e9b922021-06-26 04:14:16 +090089 let idsig_file = File::open(idsig).context("Failed to open idsig file")?;
Jiyong Park0a248432021-08-20 23:32:39 +090090 let idsig_fd = ParcelFileDescriptor::new(idsig_file);
Jiyong Park48b354d2021-07-15 15:04:38 +090091
92 if !instance.exists() {
93 const INSTANCE_FILE_SIZE: u64 = 10 * 1024 * 1024;
Jiyong Park9dd389e2021-08-23 20:42:59 +090094 command_create_partition(
Andrew Walbran616d13f2022-05-12 18:35:55 +000095 service,
Jiyong Park9dd389e2021-08-23 20:42:59 +090096 instance,
97 INSTANCE_FILE_SIZE,
98 PartitionType::ANDROID_VM_INSTANCE,
99 )?;
Jiyong Park48b354d2021-07-15 15:04:38 +0900100 }
101
Shikha Panwar22e70452022-10-10 18:32:55 +0000102 let storage = if let Some(path) = storage {
103 if !path.exists() {
104 command_create_partition(
105 service,
106 path,
107 storage_size.unwrap_or(10 * 1024 * 1024),
Shikha Panwar9fd198f2022-11-18 17:43:43 +0000108 PartitionType::ENCRYPTEDSTORE,
Shikha Panwar22e70452022-10-10 18:32:55 +0000109 )?;
110 }
111 Some(open_parcel_file(path, true)?)
112 } else {
113 None
114 };
115
Inseob Kima5a262f2021-11-17 19:41:03 +0900116 let extra_idsig_files: Result<Vec<File>, _> = extra_idsigs.iter().map(File::open).collect();
117 let extra_idsig_fds = extra_idsig_files?.into_iter().map(ParcelFileDescriptor::new).collect();
118
Inseob Kim7b5f65c2022-11-15 14:27:04 +0900119 let payload = if let Some(config_path) = config_path {
120 if payload_path.is_some() {
121 bail!("Only one of --config-path or --payload-path can be defined")
122 }
123 Payload::ConfigPath(config_path)
124 } else if let Some(payload_path) = payload_path {
125 Payload::PayloadConfig(VirtualMachinePayloadConfig { payloadPath: payload_path })
126 } else {
127 bail!("Either --config-path or --payload-path must be defined")
128 };
129
130 let payload_config_str = format!("{:?}!{:?}", apk, payload);
131
Jooyung Han21e9b922021-06-26 04:14:16 +0900132 let config = VirtualMachineConfig::AppConfig(VirtualMachineAppConfig {
Seungjae Yoo62085c02022-08-12 04:44:52 +0000133 name: name.unwrap_or_else(|| String::from("VmRunApp")),
Jiyong Park0a248432021-08-20 23:32:39 +0900134 apk: apk_fd.into(),
135 idsig: idsig_fd.into(),
Inseob Kima5a262f2021-11-17 19:41:03 +0900136 extraIdsigs: extra_idsig_fds,
Jiyong Park48b354d2021-07-15 15:04:38 +0900137 instanceImage: open_parcel_file(instance, true /* writable */)?.into(),
Shikha Panwar22e70452022-10-10 18:32:55 +0000138 encryptedStorageImage: storage,
Inseob Kim7b5f65c2022-11-15 14:27:04 +0900139 payload,
Jiyong Parkc2a49cc2021-10-15 00:02:12 +0900140 debugLevel: debug_level,
Andrew Walbran3994f002022-01-27 17:33:45 +0000141 protectedVm: protected,
Jiyong Parkd63cfff2021-09-27 20:10:17 +0900142 memoryMib: mem.unwrap_or(0) as i32, // 0 means use the VM default
Jiyong Park032615f2022-01-10 13:55:34 +0900143 numCpus: cpus.unwrap_or(1) as i32,
Jiyong Parkdfe16d62022-04-20 17:32:12 +0900144 taskProfiles: task_profiles,
Jooyung Han21e9b922021-06-26 04:14:16 +0900145 });
Alan Stokes3e98d292022-12-14 15:18:22 +0000146 run(service, &config, &payload_config_str, daemonize, console_path, log_path)
Jooyung Han21e9b922021-06-26 04:14:16 +0900147}
148
Nikita Ioffeb0b67562022-11-22 15:48:06 +0000149const EMPTY_PAYLOAD_APK: &str = "com.android.microdroid.empty_payload";
150
151fn find_empty_payload_apk_path() -> Result<PathBuf, Error> {
152 let output = Command::new("/system/bin/pm")
153 .arg("path")
154 .arg(EMPTY_PAYLOAD_APK)
155 .output()
156 .context("failed to execute pm path")?;
157 let output_str = String::from_utf8(output.stdout).context("failed to parse output")?;
158 match output_str.strip_prefix("package:") {
159 None => Err(anyhow!("Unexpected output {}", output_str)),
160 Some(apk_path) => Ok(PathBuf::from(apk_path.trim())),
161 }
162}
163
164fn create_work_dir() -> Result<PathBuf, Error> {
165 let s: String =
166 rand::thread_rng().sample_iter(&Alphanumeric).take(17).map(char::from).collect();
167 let work_dir = PathBuf::from("/data/local/tmp/microdroid").join(s);
168 println!("creating work dir {}", work_dir.display());
169 fs::create_dir_all(&work_dir).context("failed to mkdir")?;
170 Ok(work_dir)
171}
172
173/// Run a VM with Microdroid
174#[allow(clippy::too_many_arguments)]
175pub fn command_run_microdroid(
176 name: Option<String>,
177 service: &dyn IVirtualizationService,
178 work_dir: Option<PathBuf>,
179 storage: Option<&Path>,
180 storage_size: Option<u64>,
181 daemonize: bool,
182 console_path: Option<&Path>,
183 log_path: Option<&Path>,
Nikita Ioffeb0b67562022-11-22 15:48:06 +0000184 debug_level: DebugLevel,
185 protected: bool,
186 mem: Option<u32>,
187 cpus: Option<u32>,
188 task_profiles: Vec<String>,
189) -> Result<(), Error> {
190 let apk = find_empty_payload_apk_path()
191 .context(anyhow!("failed to find path for {} apk", EMPTY_PAYLOAD_APK))?;
192 println!("found path for {} apk: {}", EMPTY_PAYLOAD_APK, apk.display());
193
194 let work_dir = work_dir.unwrap_or(create_work_dir()?);
195 let idsig = work_dir.join("apk.idsig");
196 println!("apk.idsig path: {}", idsig.display());
197 let instance_img = work_dir.join("instance.img");
198 println!("instance.img path: {}", instance_img.display());
199
200 let payload_path = "MicrodroidEmptyPayloadJniLib.so";
201 let extra_sig = [];
202 command_run_app(
203 name,
204 service,
205 &apk,
206 &idsig,
207 &instance_img,
208 storage,
209 storage_size,
210 /* config_path= */ None,
211 Some(payload_path.to_owned()),
212 daemonize,
213 console_path,
214 log_path,
Nikita Ioffeb0b67562022-11-22 15:48:06 +0000215 debug_level,
216 protected,
217 mem,
218 cpus,
219 task_profiles,
220 &extra_sig,
221 )
222}
223
Andrew Walbranf395b822021-05-05 10:38:59 +0000224/// Run a VM from the given configuration file.
Jooyung Hanb7983a22022-02-22 05:21:27 +0900225#[allow(clippy::too_many_arguments)]
Andrew Walbranf395b822021-05-05 10:38:59 +0000226pub fn command_run(
Seungjae Yoo62085c02022-08-12 04:44:52 +0000227 name: Option<String>,
Andrew Walbran616d13f2022-05-12 18:35:55 +0000228 service: &dyn IVirtualizationService,
Andrew Walbranf395b822021-05-05 10:38:59 +0000229 config_path: &Path,
230 daemonize: bool,
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900231 console_path: Option<&Path>,
Jooyung Hanb7983a22022-02-22 05:21:27 +0900232 log_path: Option<&Path>,
Jiyong Parkd63cfff2021-09-27 20:10:17 +0900233 mem: Option<u32>,
Jiyong Park032615f2022-01-10 13:55:34 +0900234 cpus: Option<u32>,
Jiyong Parkdfe16d62022-04-20 17:32:12 +0900235 task_profiles: Vec<String>,
Andrew Walbranf395b822021-05-05 10:38:59 +0000236) -> Result<(), Error> {
Andrew Walbran3a5a9212021-05-04 17:09:08 +0000237 let config_file = File::open(config_path).context("Failed to open config file")?;
Jiyong Parkd63cfff2021-09-27 20:10:17 +0900238 let mut config =
Andrew Walbran3a5a9212021-05-04 17:09:08 +0000239 VmConfig::load(&config_file).context("Failed to parse config file")?.to_parcelable()?;
Jiyong Parkd63cfff2021-09-27 20:10:17 +0900240 if let Some(mem) = mem {
241 config.memoryMib = mem as i32;
242 }
Jiyong Park032615f2022-01-10 13:55:34 +0900243 if let Some(cpus) = cpus {
244 config.numCpus = cpus as i32;
245 }
Seungjae Yoo62085c02022-08-12 04:44:52 +0000246 if let Some(name) = name {
247 config.name = name;
248 } else {
249 config.name = String::from("VmRun");
250 }
Jiyong Parkdfe16d62022-04-20 17:32:12 +0900251 config.taskProfiles = task_profiles;
Jooyung Han21e9b922021-06-26 04:14:16 +0900252 run(
253 service,
254 &VirtualMachineConfig::RawConfig(config),
255 &format!("{:?}", config_path),
256 daemonize,
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900257 console_path,
Jooyung Hanb7983a22022-02-22 05:21:27 +0900258 log_path,
Jooyung Han21e9b922021-06-26 04:14:16 +0900259 )
260}
261
Andrew Walbranf8d94112021-09-07 11:45:36 +0000262fn state_to_str(vm_state: VirtualMachineState) -> &'static str {
263 match vm_state {
264 VirtualMachineState::NOT_STARTED => "NOT_STARTED",
265 VirtualMachineState::STARTING => "STARTING",
266 VirtualMachineState::STARTED => "STARTED",
267 VirtualMachineState::READY => "READY",
268 VirtualMachineState::FINISHED => "FINISHED",
269 VirtualMachineState::DEAD => "DEAD",
270 _ => "(invalid state)",
271 }
272}
273
Jooyung Han21e9b922021-06-26 04:14:16 +0900274fn run(
Andrew Walbran616d13f2022-05-12 18:35:55 +0000275 service: &dyn IVirtualizationService,
Jooyung Han21e9b922021-06-26 04:14:16 +0900276 config: &VirtualMachineConfig,
Inseob Kim7b5f65c2022-11-15 14:27:04 +0900277 payload_config: &str,
Jooyung Han21e9b922021-06-26 04:14:16 +0900278 daemonize: bool,
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900279 console_path: Option<&Path>,
Jooyung Han21e9b922021-06-26 04:14:16 +0900280 log_path: Option<&Path>,
281) -> Result<(), Error> {
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900282 let console = if let Some(console_path) = console_path {
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000283 Some(
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900284 File::create(console_path)
285 .with_context(|| format!("Failed to open console file {:?}", console_path))?,
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000286 )
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900287 } else if daemonize {
288 None
289 } else {
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000290 Some(duplicate_stdout()?)
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900291 };
292 let log = if let Some(log_path) = log_path {
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000293 Some(
Andrew Walbranbe429242021-06-28 12:22:54 +0000294 File::create(log_path)
295 .with_context(|| format!("Failed to open log file {:?}", log_path))?,
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000296 )
Andrew Walbranbe429242021-06-28 12:22:54 +0000297 } else if daemonize {
298 None
299 } else {
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000300 Some(duplicate_stdout()?)
Andrew Walbranbe429242021-06-28 12:22:54 +0000301 };
Jiyong Parkb8182bb2021-10-26 22:53:08 +0900302
Alan Stokes0e82b502022-08-08 14:44:48 +0100303 let callback = Box::new(Callback {});
304 let vm = VmInstance::create(service, config, console, log, Some(callback))
305 .context("Failed to create VM")?;
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000306 vm.start().context("Failed to start VM")?;
Andrew Walbranf395b822021-05-05 10:38:59 +0000307
Andrew Walbranf8d94112021-09-07 11:45:36 +0000308 println!(
309 "Created VM from {} with CID {}, state is {}.",
Inseob Kim7b5f65c2022-11-15 14:27:04 +0900310 payload_config,
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000311 vm.cid(),
312 state_to_str(vm.state()?)
Andrew Walbranf8d94112021-09-07 11:45:36 +0000313 );
Andrew Walbranf395b822021-05-05 10:38:59 +0000314
315 if daemonize {
Andrew Walbranf6bf6862021-05-21 12:41:13 +0000316 // Pass the VM reference back to VirtualizationService and have it hold it in the
317 // background.
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000318 service.debugHoldVmRef(&vm.vm).context("Failed to pass VM to VirtualizationService")?;
Andrew Walbranf395b822021-05-05 10:38:59 +0000319 } else {
Andrew Walbranf6bf6862021-05-21 12:41:13 +0000320 // Wait until the VM or VirtualizationService dies. If we just returned immediately then the
Andrew Walbranf395b822021-05-05 10:38:59 +0000321 // IVirtualMachine Binder object would be dropped and the VM would be killed.
Andrew Walbrand0ef4002022-05-16 16:14:10 +0000322 let death_reason = vm.wait_for_death();
Alan Stokes2bead0d2022-09-05 16:58:34 +0100323 println!("VM ended: {:?}", death_reason);
Andrew Walbranf395b822021-05-05 10:38:59 +0000324 }
Andrew Walbranf395b822021-05-05 10:38:59 +0000325
Andrew Walbranf395b822021-05-05 10:38:59 +0000326 Ok(())
327}
328
Inseob Kima5a262f2021-11-17 19:41:03 +0900329fn parse_extra_apk_list(apk: &Path, config_path: &str) -> Result<Vec<String>, Error> {
330 let mut archive = ZipArchive::new(File::open(apk)?)?;
331 let config_file = archive.by_name(config_path)?;
332 let config: VmPayloadConfig = serde_json::from_reader(config_file)?;
333 Ok(config.extra_apks.into_iter().map(|x| x.path).collect())
334}
335
Alan Stokes0e82b502022-08-08 14:44:48 +0100336struct Callback {}
Andrew Walbranf395b822021-05-05 10:38:59 +0000337
Alan Stokes0e82b502022-08-08 14:44:48 +0100338impl vmclient::VmCallback for Callback {
David Brazdil451cc962022-10-14 14:08:12 +0100339 fn on_payload_started(&self, _cid: i32) {
340 eprintln!("payload started");
341 }
342
Alan Stokes0e82b502022-08-08 14:44:48 +0100343 fn on_payload_ready(&self, _cid: i32) {
Inseob Kim8dbc3222021-09-01 21:50:23 +0900344 eprintln!("payload is ready");
Inseob Kim14cb8692021-08-31 21:50:39 +0900345 }
346
Alan Stokes0e82b502022-08-08 14:44:48 +0100347 fn on_payload_finished(&self, _cid: i32, exit_code: i32) {
Inseob Kim8dbc3222021-09-01 21:50:23 +0900348 eprintln!("payload finished with exit code {}", exit_code);
Inseob Kim2444af92021-08-31 01:22:50 +0900349 }
350
Alan Stokes2bead0d2022-09-05 16:58:34 +0100351 fn on_error(&self, _cid: i32, error_code: ErrorCode, message: &str) {
352 eprintln!("VM encountered an error: code={:?}, message={}", error_code, message);
Andrew Walbranf395b822021-05-05 10:38:59 +0000353 }
354}
355
356/// Safely duplicate the standard output file descriptor.
357fn duplicate_stdout() -> io::Result<File> {
358 let stdout_fd = io::stdout().as_raw_fd();
359 // Safe because this just duplicates a file descriptor which we know to be valid, and we check
360 // for an error.
361 let dup_fd = unsafe { libc::dup(stdout_fd) };
362 if dup_fd < 0 {
363 Err(io::Error::last_os_error())
364 } else {
365 // Safe because we have just duplicated the file descriptor so we own it, and `from_raw_fd`
366 // takes ownership of it.
367 Ok(unsafe { File::from_raw_fd(dup_fd) })
368 }
369}