blob: 55e6579479bc2ba574c266f854e0bdce0469c227 [file] [log] [blame]
Cody Schuffelen147b88e2019-09-09 16:00:11 -07001#include "host/commands/assemble_cvd/flags.h"
Cody Schuffelen20ecaca2019-01-29 17:43:38 -08002
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -08003#include <dirent.h>
4#include <sys/types.h>
5#include <sys/stat.h>
Cody Schuffelen25c46432020-01-14 13:49:52 -08006#include <sys/statvfs.h>
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -08007#include <unistd.h>
Cody Schuffelen25c46432020-01-14 13:49:52 -08008
Jorge E. Moreirae049b792019-12-18 18:17:48 -08009#include <algorithm>
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080010#include <iostream>
Ram Muthiahaad97c52019-08-14 17:05:01 -070011#include <fstream>
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080012
Cody Schuffelenf4a1cdb2019-11-13 16:51:16 -080013#include <android-base/strings.h>
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080014#include <gflags/gflags.h>
15#include <glog/logging.h>
16
17#include "common/libs/utils/environment.h"
18#include "common/libs/utils/files.h"
Cody Schuffelen147b88e2019-09-09 16:00:11 -070019#include "host/commands/assemble_cvd/boot_image_unpacker.h"
20#include "host/commands/assemble_cvd/data_image.h"
21#include "host/commands/assemble_cvd/image_aggregator.h"
22#include "host/commands/assemble_cvd/assembler_defs.h"
Cody Schuffelenb737ef52019-09-25 14:54:38 -070023#include "host/commands/assemble_cvd/super_image_mixer.h"
Cody Schuffelen605e6852019-10-16 16:22:24 -070024#include "host/libs/config/fetcher_config.h"
Jorge E. Moreiraba626622019-01-28 17:47:50 -080025#include "host/libs/vm_manager/crosvm_manager.h"
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080026#include "host/libs/vm_manager/qemu_manager.h"
27#include "host/libs/vm_manager/vm_manager.h"
28
Cody Schuffelen47c57852019-12-13 13:50:50 -080029using vsoc::ForCurrentInstance;
Cody Schuffelene71fa352019-09-10 16:11:58 -070030using cvd::AssemblerExitCodes;
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080031
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080032DEFINE_string(cache_image, "", "Location of the cache partition image.");
Paul Trautrimba8f8e92019-03-12 17:55:48 +090033DEFINE_string(metadata_image, "", "Location of the metadata partition image "
34 "to be generated.");
35DEFINE_int32(blank_metadata_image_mb, 16,
36 "The size of the blank metadata image to generate, MB.");
Alistair Delva3bba6282020-05-14 13:52:00 -070037DEFINE_int32(blank_sdcard_image_mb, 2048,
38 "The size of the blank sdcard image to generate, MB.");
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080039DEFINE_int32(cpus, 2, "Virtual CPU count.");
40DEFINE_string(data_image, "", "Location of the data partition image.");
41DEFINE_string(data_policy, "use_existing", "How to handle userdata partition."
42 " Either 'use_existing', 'create_if_missing', 'resize_up_to', or "
43 "'always_create'.");
44DEFINE_int32(blank_data_image_mb, 0,
45 "The size of the blank data image to generate, MB.");
Alistair Delva4c70e262019-10-15 14:33:59 -070046DEFINE_string(blank_data_image_fmt, "f2fs",
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080047 "The fs format for the blank data image. Used with mkfs.");
48DEFINE_string(qemu_gdb, "",
Matthias Maennich454d7872019-02-06 16:35:17 +000049 "Debug flag to pass to qemu. e.g. -qemu_gdb=tcp::1234");
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080050
51DEFINE_int32(x_res, 720, "Width of the screen in pixels");
52DEFINE_int32(y_res, 1280, "Height of the screen in pixels");
53DEFINE_int32(dpi, 160, "Pixels per inch for the screen");
54DEFINE_int32(refresh_rate_hz, 60, "Screen refresh rate in Hertz");
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080055DEFINE_string(kernel_path, "",
56 "Path to the kernel. Overrides the one from the boot image");
Ram Muthiahaad97c52019-08-14 17:05:01 -070057DEFINE_string(initramfs_path, "", "Path to the initramfs");
Jorge E. Moreira80ddd7f2019-02-04 16:30:13 -080058DEFINE_bool(decompress_kernel, false,
Jorge E. Moreira36294042019-06-07 15:23:18 -070059 "Whether to decompress the kernel image.");
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080060DEFINE_string(extra_kernel_cmdline, "",
61 "Additional flags to put on the kernel command line");
62DEFINE_int32(loop_max_part, 7, "Maximum number of loop partitions");
Jorge E. Moreira300f97f2019-04-09 13:48:01 -070063DEFINE_bool(guest_enforce_security, true,
Cody Schuffelen79d4c192019-12-04 15:13:26 -080064 "Whether to run in enforcing mode (non permissive).");
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080065DEFINE_bool(guest_audit_security, true,
66 "Whether to log security audits.");
Alistair Delva33b861f2019-12-26 12:23:59 -080067DEFINE_bool(guest_force_normal_boot, true,
68 "Whether to force the boot sequence to skip recovery.");
Yifan Hong19d713e2019-05-01 14:12:07 -070069DEFINE_string(boot_image, "",
70 "Location of cuttlefish boot image. If empty it is assumed to be "
71 "boot.img in the directory specified by -system_image_dir.");
Ram Muthiah1aa02f82019-10-22 20:26:28 +000072DEFINE_string(vendor_boot_image, "",
73 "Location of cuttlefish vendor boot image. If empty it is assumed to "
74 "be vendor_boot.img in the directory specified by -system_image_dir.");
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080075DEFINE_int32(memory_mb, 2048,
76 "Total amount of memory available for guest, MB.");
Cody Schuffelen47c57852019-12-13 13:50:50 -080077DEFINE_string(serial_number, ForCurrentInstance("CUTTLEFISHCVD"),
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080078 "Serial number to use for the device");
Cody Schuffelenab6d3452019-12-13 15:54:27 -080079DEFINE_string(assembly_dir,
80 cvd::StringFromEnv("HOME", ".") + "/cuttlefish_assembly",
81 "A directory to put generated files common between instances");
82DEFINE_string(instance_dir,
83 cvd::StringFromEnv("HOME", ".") + "/cuttlefish_runtime",
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080084 "A directory to put all instance specific files");
85DEFINE_string(
Alistair Strachan5ab095c2019-05-23 20:41:20 +000086 vm_manager, vm_manager::CrosvmManager::name(),
Jorge E. Moreiraba626622019-01-28 17:47:50 -080087 "What virtual machine manager to use, one of {qemu_cli, crosvm}");
Greg Hartmana3c552d2019-03-28 18:20:48 -070088DEFINE_string(
Greg Hartmanbc1bed42019-04-05 20:02:00 -070089 gpu_mode, vsoc::kGpuModeGuestSwiftshader,
90 "What gpu configuration to use, one of {guest_swiftshader, drm_virgl}");
Greg Hartmana3c552d2019-03-28 18:20:48 -070091
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080092DEFINE_string(system_image_dir, vsoc::DefaultGuestImagePath(""),
93 "Location of the system partition images.");
Alistair Strachan050ca932018-11-27 12:41:19 -080094DEFINE_string(super_image, "", "Location of the super partition image.");
Yifan Hong19d713e2019-05-01 14:12:07 -070095DEFINE_string(misc_image, "",
96 "Location of the misc partition image. If the image does not "
97 "exist, a blank new misc partition image is created.");
Cody Schuffelen20ecaca2019-01-29 17:43:38 -080098
99DEFINE_bool(deprecated_boot_completed, false, "Log boot completed message to"
100 " host kernel. This is only used during transition of our clients."
101 " Will be deprecated soon.");
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800102DEFINE_bool(start_vnc_server, false, "Whether to start the vnc server process. "
103 "The VNC server runs at port 6443 + i for "
104 "the vsoc-i user or CUTTLEFISH_INSTANCE=i, "
105 "starting from 1.");
Jorge E. Moreirae049b792019-12-18 18:17:48 -0800106
Jorge E. Moreira692ca662020-02-19 15:36:26 -0800107DEFINE_bool(start_webrtc, false, "[Experimental] Whether to start the webrtc process.");
Jorge E. Moreirae049b792019-12-18 18:17:48 -0800108
109DEFINE_string(
110 webrtc_assets_dir,
Jorge E. Moreira1f65a4a2019-11-08 15:23:32 -0800111 vsoc::DefaultHostArtifactsPath("usr/share/webrtc/assets"),
Jorge E. Moreira692ca662020-02-19 15:36:26 -0800112 "[Experimental] Path to WebRTC webpage assets.");
Jorge E. Moreirae049b792019-12-18 18:17:48 -0800113
114DEFINE_string(
115 webrtc_certs_dir,
Jorge E. Moreira1f65a4a2019-11-08 15:23:32 -0800116 vsoc::DefaultHostArtifactsPath("usr/share/webrtc/certs"),
Jorge E. Moreira692ca662020-02-19 15:36:26 -0800117 "[Experimental] Path to WebRTC certificates directory.");
Jorge E. Moreirae049b792019-12-18 18:17:48 -0800118
119DEFINE_string(
120 webrtc_public_ip,
Jorge E. Moreira1f65a4a2019-11-08 15:23:32 -0800121 "127.0.0.1",
Jorge E. Moreira692ca662020-02-19 15:36:26 -0800122 "[Experimental] Public IPv4 address of your server, a.b.c.d format");
Jorge E. Moreirae049b792019-12-18 18:17:48 -0800123
124DEFINE_bool(
125 webrtc_enable_adb_websocket,
126 false,
Jorge E. Moreira692ca662020-02-19 15:36:26 -0800127 "[Experimental] If enabled, exposes local adb service through a websocket.");
Jorge E. Moreirae049b792019-12-18 18:17:48 -0800128
Cody Schuffelen10743332019-04-15 16:50:49 -0700129DEFINE_string(adb_mode, "vsock_half_tunnel",
Cody Schuffelen3c35fd82019-12-11 18:39:46 -0800130 "Mode for ADB connection."
Cody Schuffelen63d10052019-02-26 12:21:53 -0800131 "'vsock_tunnel' for a TCP connection tunneled through vsock, "
132 "'native_vsock' for a direct connection to the guest ADB over "
133 "vsock, 'vsock_half_tunnel' for a TCP connection forwarded to "
134 "the guest ADB server, or a comma separated list of types as in "
Cody Schuffelen3c35fd82019-12-11 18:39:46 -0800135 "'native_vsock,vsock_half_tunnel'");
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800136DEFINE_bool(run_adb_connector, true,
137 "Maintain adb connection by sending 'adb connect' commands to the "
Matthias Maennich454d7872019-02-06 16:35:17 +0000138 "server. Only relevant with -adb_mode=tunnel or vsock_tunnel");
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800139
Cody Schuffelen47c57852019-12-13 13:50:50 -0800140DEFINE_string(uuid, vsoc::ForCurrentInstance(vsoc::kDefaultUuidPrefix),
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800141 "UUID to use for the device. Random if not specified");
142DEFINE_bool(daemon, false,
143 "Run cuttlefish in background, the launcher exits on boot "
144 "completed/failed");
145
146DEFINE_string(device_title, "", "Human readable name for the instance, "
147 "used by the vnc_server for its server title");
148DEFINE_string(setupwizard_mode, "DISABLED",
149 "One of DISABLED,OPTIONAL,REQUIRED");
150
151DEFINE_string(qemu_binary,
152 "/usr/bin/qemu-system-x86_64",
153 "The qemu binary to use");
Jorge E. Moreiraba626622019-01-28 17:47:50 -0800154DEFINE_string(crosvm_binary,
155 vsoc::DefaultHostArtifactsPath("bin/crosvm"),
156 "The Crosvm binary to use");
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800157DEFINE_bool(restart_subprocesses, true, "Restart any crashed host process");
Jorge E. Moreirafd10cae2019-02-19 15:35:42 -0800158DEFINE_string(logcat_mode, "", "How to send android's log messages from "
159 "guest to host. One of [serial, vsock]");
Ram Muthiah6e9c98c2019-05-28 15:18:27 -0700160DEFINE_bool(enable_tombstone_receiver, true, "Enables the tombstone logger on "
Ram Muthiah792e2ad2019-04-19 11:19:46 -0700161 "both the guest and the host");
Cody Schuffelen1300f122019-05-28 18:24:34 -0700162DEFINE_bool(use_bootloader, false, "Boots the device using a bootloader");
163DEFINE_string(bootloader, "", "Bootloader binary path");
David Anderson637bfd62019-09-26 13:23:21 -0700164DEFINE_string(boot_slot, "", "Force booting into the given slot. If empty, "
165 "the slot will be chosen based on the misc partition if using a "
166 "bootloader. It will default to 'a' if empty and not using a "
167 "bootloader.");
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800168DEFINE_int32(num_instances, 1, "Number of Android guests to launch");
169DEFINE_bool(resume, true, "Resume using the disk from the last session, if "
170 "possible. i.e., if --noresume is passed, the disk "
171 "will be reset to the state it was initially launched "
172 "in. This flag is ignored if the underlying partition "
173 "images have been updated since the first launch.");
Yifan Hong19d713e2019-05-01 14:12:07 -0700174
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800175namespace {
176
Cody Schuffelencd3563a2019-10-29 16:35:06 -0700177const std::string kKernelDefaultPath = "kernel";
178const std::string kInitramfsImg = "initramfs.img";
179const std::string kRamdiskConcatExt = ".concat";
Cody Schuffelen9fd95472019-10-04 13:49:57 -0700180
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800181bool ResolveInstanceFiles() {
182 if (FLAGS_system_image_dir.empty()) {
183 LOG(ERROR) << "--system_image_dir must be specified.";
184 return false;
185 }
186
187 // If user did not specify location of either of these files, expect them to
188 // be placed in --system_image_dir location.
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800189 std::string default_boot_image = FLAGS_system_image_dir + "/boot.img";
190 SetCommandLineOptionWithMode("boot_image", default_boot_image.c_str(),
191 google::FlagSettingMode::SET_FLAGS_DEFAULT);
192 std::string default_cache_image = FLAGS_system_image_dir + "/cache.img";
193 SetCommandLineOptionWithMode("cache_image", default_cache_image.c_str(),
194 google::FlagSettingMode::SET_FLAGS_DEFAULT);
195 std::string default_data_image = FLAGS_system_image_dir + "/userdata.img";
196 SetCommandLineOptionWithMode("data_image", default_data_image.c_str(),
197 google::FlagSettingMode::SET_FLAGS_DEFAULT);
Paul Trautrimba8f8e92019-03-12 17:55:48 +0900198 std::string default_metadata_image = FLAGS_system_image_dir + "/metadata.img";
199 SetCommandLineOptionWithMode("metadata_image", default_metadata_image.c_str(),
200 google::FlagSettingMode::SET_FLAGS_DEFAULT);
Alistair Strachan050ca932018-11-27 12:41:19 -0800201 std::string default_super_image = FLAGS_system_image_dir + "/super.img";
202 SetCommandLineOptionWithMode("super_image", default_super_image.c_str(),
203 google::FlagSettingMode::SET_FLAGS_DEFAULT);
Yifan Hong19d713e2019-05-01 14:12:07 -0700204 std::string default_misc_image = FLAGS_system_image_dir + "/misc.img";
205 SetCommandLineOptionWithMode("misc_image", default_misc_image.c_str(),
206 google::FlagSettingMode::SET_FLAGS_DEFAULT);
Ram Muthiah1aa02f82019-10-22 20:26:28 +0000207 std::string default_vendor_boot_image = FLAGS_system_image_dir
208 + "/vendor_boot.img";
209 SetCommandLineOptionWithMode("vendor_boot_image",
210 default_vendor_boot_image.c_str(),
211 google::FlagSettingMode::SET_FLAGS_DEFAULT);
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800212
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800213 return true;
214}
215
216std::string GetCuttlefishEnvPath() {
217 return cvd::StringFromEnv("HOME", ".") + "/.cuttlefish.sh";
218}
219
Cody Schuffelen2168c242019-12-13 16:15:27 -0800220std::string GetLegacyConfigFilePath(const vsoc::CuttlefishConfig& config) {
221 return config.ForDefaultInstance().PerInstancePath("cuttlefish_config.json");
222}
223
Jorge E. Moreirae049b792019-12-18 18:17:48 -0800224int NumStreamers() {
225 auto start_flags = {FLAGS_start_vnc_server, FLAGS_start_webrtc};
226 return std::count(start_flags.begin(), start_flags.end(), true);
227}
228
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800229std::string StrForInstance(const std::string& prefix, int num) {
230 std::ostringstream stream;
231 stream << prefix << std::setfill('0') << std::setw(2) << num;
232 return stream.str();
233}
234
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800235// Initializes the config object and saves it to file. It doesn't return it, all
236// further uses of the config should happen through the singleton
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800237vsoc::CuttlefishConfig InitializeCuttlefishConfiguration(
Cody Schuffelencd3563a2019-10-29 16:35:06 -0700238 const cvd::BootImageUnpacker& boot_image_unpacker,
239 const cvd::FetcherConfig& fetcher_config) {
Jorge E. Moreirae049b792019-12-18 18:17:48 -0800240 // At most one streamer can be started.
241 CHECK(NumStreamers() <= 1);
242
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800243 vsoc::CuttlefishConfig tmp_config_obj;
Cody Schuffelenab6d3452019-12-13 15:54:27 -0800244 tmp_config_obj.set_assembly_dir(FLAGS_assembly_dir);
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800245 if (!vm_manager::VmManager::IsValidName(FLAGS_vm_manager)) {
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800246 LOG(FATAL) << "Invalid vm_manager: " << FLAGS_vm_manager;
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800247 }
Greg Hartmana3c552d2019-03-28 18:20:48 -0700248 if (!vm_manager::VmManager::IsValidName(FLAGS_vm_manager)) {
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800249 LOG(FATAL) << "Invalid vm_manager: " << FLAGS_vm_manager;
Greg Hartmana3c552d2019-03-28 18:20:48 -0700250 }
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800251 tmp_config_obj.set_vm_manager(FLAGS_vm_manager);
Greg Hartmana3c552d2019-03-28 18:20:48 -0700252 tmp_config_obj.set_gpu_mode(FLAGS_gpu_mode);
Cody Schuffelen2de6ead2019-12-04 16:16:47 -0800253 if (vm_manager::VmManager::ConfigureGpuMode(tmp_config_obj.vm_manager(),
254 tmp_config_obj.gpu_mode()).empty()) {
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800255 LOG(FATAL) << "Invalid gpu_mode=" << FLAGS_gpu_mode <<
Greg Hartmana3c552d2019-03-28 18:20:48 -0700256 " does not work with vm_manager=" << FLAGS_vm_manager;
Greg Hartmana3c552d2019-03-28 18:20:48 -0700257 }
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800258
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800259 tmp_config_obj.set_cpus(FLAGS_cpus);
260 tmp_config_obj.set_memory_mb(FLAGS_memory_mb);
261
262 tmp_config_obj.set_dpi(FLAGS_dpi);
263 tmp_config_obj.set_setupwizard_mode(FLAGS_setupwizard_mode);
264 tmp_config_obj.set_x_res(FLAGS_x_res);
265 tmp_config_obj.set_y_res(FLAGS_y_res);
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800266 tmp_config_obj.set_refresh_rate_hz(FLAGS_refresh_rate_hz);
267 tmp_config_obj.set_gdb_flag(FLAGS_qemu_gdb);
Cody Schuffelenf4a1cdb2019-11-13 16:51:16 -0800268 std::vector<std::string> adb = android::base::Split(FLAGS_adb_mode, ",");
Cody Schuffelen90b2fb22019-02-28 18:55:21 -0800269 tmp_config_obj.set_adb_mode(std::set<std::string>(adb.begin(), adb.end()));
Cody Schuffelencd3563a2019-10-29 16:35:06 -0700270 std::string discovered_kernel = fetcher_config.FindCvdFileWithSuffix(kKernelDefaultPath);
271 std::string foreign_kernel = FLAGS_kernel_path.size() ? FLAGS_kernel_path : discovered_kernel;
272 if (foreign_kernel.size()) {
273 tmp_config_obj.set_kernel_image_path(foreign_kernel);
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800274 tmp_config_obj.set_use_unpacked_kernel(false);
275 } else {
276 tmp_config_obj.set_kernel_image_path(
Cody Schuffelenf53ded12019-12-13 16:05:22 -0800277 tmp_config_obj.AssemblyPath(kKernelDefaultPath.c_str()));
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800278 tmp_config_obj.set_use_unpacked_kernel(true);
279 }
Alistair Delva3aac3e12020-05-13 12:17:02 -0700280
Jorge E. Moreira80ddd7f2019-02-04 16:30:13 -0800281 tmp_config_obj.set_decompress_kernel(FLAGS_decompress_kernel);
Alistair Delva3aac3e12020-05-13 12:17:02 -0700282 if (tmp_config_obj.decompress_kernel()) {
Jorge E. Moreira80ddd7f2019-02-04 16:30:13 -0800283 tmp_config_obj.set_decompressed_kernel_image_path(
Cody Schuffelenf53ded12019-12-13 16:05:22 -0800284 tmp_config_obj.AssemblyPath("vmlinux"));
Jorge E. Moreira80ddd7f2019-02-04 16:30:13 -0800285 }
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800286
Cody Schuffelenf53ded12019-12-13 16:05:22 -0800287 auto ramdisk_path = tmp_config_obj.AssemblyPath("ramdisk.img");
288 auto vendor_ramdisk_path = tmp_config_obj.AssemblyPath("vendor_ramdisk.img");
Cody Schuffelen1e645542019-11-19 15:44:22 -0800289 if (!boot_image_unpacker.HasRamdiskImage()) {
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800290 LOG(FATAL) << "A ramdisk is required, but the boot image did not have one.";
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800291 }
292
Cody Schuffelen2de6ead2019-12-04 16:16:47 -0800293 tmp_config_obj.set_boot_image_kernel_cmdline(boot_image_unpacker.kernel_cmdline());
294 tmp_config_obj.set_loop_max_part(FLAGS_loop_max_part);
295 tmp_config_obj.set_guest_enforce_security(FLAGS_guest_enforce_security);
296 tmp_config_obj.set_guest_audit_security(FLAGS_guest_audit_security);
Alistair Delva33b861f2019-12-26 12:23:59 -0800297 tmp_config_obj.set_guest_force_normal_boot(FLAGS_guest_force_normal_boot);
Cody Schuffelen2de6ead2019-12-04 16:16:47 -0800298 tmp_config_obj.set_extra_kernel_cmdline(FLAGS_extra_kernel_cmdline);
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800299
300 tmp_config_obj.set_ramdisk_image_path(ramdisk_path);
Ram Muthiahd512c132019-10-23 17:20:45 -0700301 tmp_config_obj.set_vendor_ramdisk_image_path(vendor_ramdisk_path);
302
Cody Schuffelencd3563a2019-10-29 16:35:06 -0700303 std::string discovered_ramdisk = fetcher_config.FindCvdFileWithSuffix(kInitramfsImg);
304 std::string foreign_ramdisk = FLAGS_initramfs_path.size () ? FLAGS_initramfs_path : discovered_ramdisk;
305 if (foreign_kernel.size() && !foreign_ramdisk.size()) {
Ram Muthiahd512c132019-10-23 17:20:45 -0700306 // If there's a kernel that's passed in without an initramfs, that implies
307 // user error or a kernel built with no modules. In either case, let's
308 // choose to avoid loading the modules from the vendor ramdisk which are
309 // built for the default cf kernel. Once boot occurs, user error will
310 // become obvious.
311 tmp_config_obj.set_final_ramdisk_path(ramdisk_path);
312 } else {
313 tmp_config_obj.set_final_ramdisk_path(ramdisk_path + kRamdiskConcatExt);
Cody Schuffelencd3563a2019-10-29 16:35:06 -0700314 if(foreign_ramdisk.size()) {
315 tmp_config_obj.set_initramfs_path(foreign_ramdisk);
Ram Muthiahd512c132019-10-23 17:20:45 -0700316 }
Cody Schuffelen9fd95472019-10-04 13:49:57 -0700317 }
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800318
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800319 tmp_config_obj.set_deprecated_boot_completed(FLAGS_deprecated_boot_completed);
Cody Schuffelen3dff6982019-12-05 16:24:12 -0800320 tmp_config_obj.set_logcat_receiver_binary(
321 vsoc::DefaultHostArtifactsPath("bin/logcat_receiver"));
322 tmp_config_obj.set_config_server_binary(
323 vsoc::DefaultHostArtifactsPath("bin/config_server"));
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800324
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800325 tmp_config_obj.set_qemu_binary(FLAGS_qemu_binary);
Jorge E. Moreiraba626622019-01-28 17:47:50 -0800326 tmp_config_obj.set_crosvm_binary(FLAGS_crosvm_binary);
Cody Schuffelen3dff6982019-12-05 16:24:12 -0800327 tmp_config_obj.set_console_forwarder_binary(
328 vsoc::DefaultHostArtifactsPath("bin/console_forwarder"));
329 tmp_config_obj.set_kernel_log_monitor_binary(
330 vsoc::DefaultHostArtifactsPath("bin/kernel_log_monitor"));
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800331
332 tmp_config_obj.set_enable_vnc_server(FLAGS_start_vnc_server);
Cody Schuffelen3dff6982019-12-05 16:24:12 -0800333 tmp_config_obj.set_vnc_server_binary(
334 vsoc::DefaultHostArtifactsPath("bin/vnc_server"));
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800335
Jorge E. Moreirae049b792019-12-18 18:17:48 -0800336 tmp_config_obj.set_enable_webrtc(FLAGS_start_webrtc);
337 tmp_config_obj.set_webrtc_binary(
338 vsoc::DefaultHostArtifactsPath("bin/webRTC"));
339 tmp_config_obj.set_webrtc_assets_dir(FLAGS_webrtc_assets_dir);
340 tmp_config_obj.set_webrtc_public_ip(FLAGS_webrtc_public_ip);
341 tmp_config_obj.set_webrtc_certs_dir(FLAGS_webrtc_certs_dir);
342
343 tmp_config_obj.set_webrtc_enable_adb_websocket(
344 FLAGS_webrtc_enable_adb_websocket);
345
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800346 tmp_config_obj.set_restart_subprocesses(FLAGS_restart_subprocesses);
347 tmp_config_obj.set_run_adb_connector(FLAGS_run_adb_connector);
Cody Schuffelen3dff6982019-12-05 16:24:12 -0800348 tmp_config_obj.set_adb_connector_binary(
349 vsoc::DefaultHostArtifactsPath("bin/adb_connector"));
Cody Schuffelen3dff6982019-12-05 16:24:12 -0800350 tmp_config_obj.set_socket_vsock_proxy_binary(
351 vsoc::DefaultHostArtifactsPath("bin/socket_vsock_proxy"));
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800352 tmp_config_obj.set_run_as_daemon(FLAGS_daemon);
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800353
Cody Schuffelen2b51bab2019-01-29 18:14:48 -0800354 tmp_config_obj.set_data_policy(FLAGS_data_policy);
355 tmp_config_obj.set_blank_data_image_mb(FLAGS_blank_data_image_mb);
356 tmp_config_obj.set_blank_data_image_fmt(FLAGS_blank_data_image_fmt);
357
Jorge E. Moreirafd10cae2019-02-19 15:35:42 -0800358 tmp_config_obj.set_logcat_mode(FLAGS_logcat_mode);
Jorge E. Moreirafd10cae2019-02-19 15:35:42 -0800359
Ram Muthiah792e2ad2019-04-19 11:19:46 -0700360 tmp_config_obj.set_enable_tombstone_receiver(FLAGS_enable_tombstone_receiver);
Cody Schuffelen3dff6982019-12-05 16:24:12 -0800361 tmp_config_obj.set_tombstone_receiver_binary(
362 vsoc::DefaultHostArtifactsPath("bin/tombstone_receiver"));
Ram Muthiah792e2ad2019-04-19 11:19:46 -0700363
Cody Schuffelen1300f122019-05-28 18:24:34 -0700364 tmp_config_obj.set_use_bootloader(FLAGS_use_bootloader);
365 tmp_config_obj.set_bootloader(FLAGS_bootloader);
366
David Anderson637bfd62019-09-26 13:23:21 -0700367 if (!FLAGS_boot_slot.empty()) {
368 tmp_config_obj.set_boot_slot(FLAGS_boot_slot);
369 }
370
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800371 tmp_config_obj.set_cuttlefish_env_path(GetCuttlefishEnvPath());
372
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800373 std::vector<int> instance_nums;
374 for (int i = 0; i < FLAGS_num_instances; i++) {
375 instance_nums.push_back(vsoc::GetInstance() + i);
376 }
377
378 for (const auto& num : instance_nums) {
379 auto instance = tmp_config_obj.ForInstance(num);
380 auto const_instance = const_cast<const vsoc::CuttlefishConfig&>(tmp_config_obj)
381 .ForInstance(num);
382 // Set this first so that calls to PerInstancePath below are correct
383 instance.set_instance_dir(FLAGS_instance_dir + "." + std::to_string(num));
384 instance.set_serial_number(FLAGS_serial_number + std::to_string(num));
385
386 instance.set_mobile_bridge_name(StrForInstance("cvd-mbr-", num));
387 instance.set_mobile_tap_name(StrForInstance("cvd-mtap-", num));
388
389 instance.set_wifi_tap_name(StrForInstance("cvd-wtap-", num));
390
391 instance.set_vsock_guest_cid(3 + num - 1);
392
393 instance.set_uuid(FLAGS_uuid);
394
395 instance.set_vnc_server_port(6444 + num - 1);
396 instance.set_host_port(6520 + num - 1);
397 instance.set_adb_ip_and_port("127.0.0.1:" + std::to_string(6520 + num - 1));
398
399 instance.set_device_title(FLAGS_device_title);
400
Alistair Delva3bba6282020-05-14 13:52:00 -0700401 instance.set_virtual_disk_paths({
402 const_instance.PerInstancePath("overlay.img"),
403 const_instance.sdcard_path(),
404 });
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800405 }
406
407 return tmp_config_obj;
408}
409
410bool SaveConfig(const vsoc::CuttlefishConfig& tmp_config_obj) {
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800411 auto config_file = GetConfigFilePath(tmp_config_obj);
412 auto config_link = vsoc::GetGlobalConfigFileLink();
413 // Save the config object before starting any host process
414 if (!tmp_config_obj.SaveToFile(config_file)) {
415 LOG(ERROR) << "Unable to save config object";
416 return false;
417 }
Cody Schuffelen2168c242019-12-13 16:15:27 -0800418 auto legacy_config_file = GetLegacyConfigFilePath(tmp_config_obj);
419 if (!tmp_config_obj.SaveToFile(legacy_config_file)) {
420 LOG(ERROR) << "Unable to save legacy config object";
421 return false;
422 }
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800423 setenv(vsoc::kCuttlefishConfigEnvVarName, config_file.c_str(), true);
424 if (symlink(config_file.c_str(), config_link.c_str()) != 0) {
425 LOG(ERROR) << "Failed to create symlink to config file at " << config_link
426 << ": " << strerror(errno);
427 return false;
428 }
429
430 return true;
431}
432
433void SetDefaultFlagsForQemu() {
Cody Schuffelen038d4d92019-11-04 15:09:03 -0800434 // TODO(b/144119457) Use the serial port.
435 SetCommandLineOptionWithMode("logcat_mode", cvd::kLogcatVsockMode,
Jorge E. Moreirafd10cae2019-02-19 15:35:42 -0800436 google::FlagSettingMode::SET_FLAGS_DEFAULT);
Jorge E. Moreiraba626622019-01-28 17:47:50 -0800437}
438
439void SetDefaultFlagsForCrosvm() {
Jorge E. Moreirafd10cae2019-02-19 15:35:42 -0800440 SetCommandLineOptionWithMode("logcat_mode", cvd::kLogcatVsockMode,
441 google::FlagSettingMode::SET_FLAGS_DEFAULT);
Alistair Delva3aac3e12020-05-13 12:17:02 -0700442
443 // Crosvm requires a specific setting for kernel decompression; it must be
444 // on for aarch64 and off for x86, no other mode is supported.
445 bool decompress_kernel = false;
446 if (cvd::HostArch() == "aarch64") {
447 decompress_kernel = true;
448 }
449 SetCommandLineOptionWithMode("decompress_kernel",
450 (decompress_kernel ? "true" : "false"),
451 google::FlagSettingMode::SET_FLAGS_DEFAULT);
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800452}
453
454bool ParseCommandLineFlags(int* argc, char*** argv) {
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800455 google::ParseCommandLineNonHelpFlags(argc, argv, true);
456 bool invalid_manager = false;
457 if (FLAGS_vm_manager == vm_manager::QemuManager::name()) {
458 SetDefaultFlagsForQemu();
Jorge E. Moreiraba626622019-01-28 17:47:50 -0800459 } else if (FLAGS_vm_manager == vm_manager::CrosvmManager::name()) {
460 SetDefaultFlagsForCrosvm();
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800461 } else {
462 std::cerr << "Unknown Virtual Machine Manager: " << FLAGS_vm_manager
463 << std::endl;
464 invalid_manager = true;
465 }
Jorge E. Moreira1f65a4a2019-11-08 15:23:32 -0800466 if (NumStreamers() == 0) {
467 // This makes the vnc server the default streamer unless the user requests
468 // another via a --star_<streamer> flag, while at the same time it's
469 // possible to run without any streamer by setting --start_vnc_server=false.
470 SetCommandLineOptionWithMode("start_vnc_server", "true",
471 google::FlagSettingMode::SET_FLAGS_DEFAULT);
472 }
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800473 google::HandleCommandLineHelpFlags();
474 if (invalid_manager) {
475 return false;
476 }
477 // Set the env variable to empty (in case the caller passed a value for it).
478 unsetenv(vsoc::kCuttlefishConfigEnvVarName);
479
480 return ResolveInstanceFiles();
481}
482
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800483std::string cpp_basename(const std::string& str) {
484 char* copy = strdup(str.c_str()); // basename may modify its argument
485 std::string ret(basename(copy));
486 free(copy);
487 return ret;
488}
489
490bool CleanPriorFiles(const std::string& path, const std::set<std::string>& preserving) {
491 if (preserving.count(cpp_basename(path))) {
492 LOG(INFO) << "Preserving: " << path;
493 return true;
494 }
495 struct stat statbuf;
496 if (lstat(path.c_str(), &statbuf) < 0) {
497 int error_num = errno;
498 if (error_num == ENOENT) {
499 return true;
500 } else {
501 LOG(ERROR) << "Could not stat \"" << path << "\": " << strerror(error_num);
502 return false;
503 }
504 }
505 if ((statbuf.st_mode & S_IFMT) != S_IFDIR) {
506 LOG(INFO) << "Deleting: " << path;
507 if (unlink(path.c_str()) < 0) {
508 int error_num = errno;
509 LOG(ERROR) << "Could not unlink \"" << path << "\", error was " << strerror(error_num);
510 return false;
511 }
512 return true;
513 }
514 std::unique_ptr<DIR, int(*)(DIR*)> dir(opendir(path.c_str()), closedir);
515 if (!dir) {
516 int error_num = errno;
517 LOG(ERROR) << "Could not clean \"" << path << "\": error was " << strerror(error_num);
518 return false;
519 }
520 for (auto entity = readdir(dir.get()); entity != nullptr; entity = readdir(dir.get())) {
521 std::string entity_name(entity->d_name);
522 if (entity_name == "." || entity_name == "..") {
523 continue;
524 }
525 std::string entity_path = path + "/" + entity_name;
526 if (!CleanPriorFiles(entity_path.c_str(), preserving)) {
527 return false;
528 }
529 }
530 if (rmdir(path.c_str()) < 0) {
531 if (!(errno == EEXIST || errno == ENOTEMPTY)) {
532 // If EEXIST or ENOTEMPTY, probably because a file was preserved
533 int error_num = errno;
534 LOG(ERROR) << "Could not rmdir \"" << path << "\", error was " << strerror(error_num);
535 return false;
536 }
537 }
538 return true;
539}
540
541bool CleanPriorFiles(const std::vector<std::string>& paths, const std::set<std::string>& preserving) {
542 std::string prior_files;
543 for (auto path : paths) {
544 struct stat statbuf;
545 if (stat(path.c_str(), &statbuf) < 0 && errno != ENOENT) {
546 // If ENOENT, it doesn't exist yet, so there is no work to do'
547 int error_num = errno;
548 LOG(ERROR) << "Could not stat \"" << path << "\": " << strerror(error_num);
549 return false;
550 }
551 bool is_directory = (statbuf.st_mode & S_IFMT) == S_IFDIR;
552 prior_files += (is_directory ? (path + "/*") : path) + " ";
553 }
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800554 LOG(INFO) << "Assuming prior files of " << prior_files;
Alistair Delva7f09b732020-01-30 18:18:12 -0800555 std::string lsof_cmd = "lsof -t " + prior_files + " >/dev/null 2>&1";
556 int rval = std::system(lsof_cmd.c_str());
557 // lsof returns 0 if any of the files are open
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800558 if (WEXITSTATUS(rval) == 0) {
559 LOG(ERROR) << "Clean aborted: files are in use";
560 return false;
561 }
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800562 for (const auto& path : paths) {
563 if (!CleanPriorFiles(path, preserving)) {
564 LOG(ERROR) << "Remove of file under \"" << path << "\" failed";
565 return false;
566 }
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800567 }
568 return true;
569}
Jorge E. Moreira80ddd7f2019-02-04 16:30:13 -0800570
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800571bool CleanPriorFiles(const vsoc::CuttlefishConfig& config, const std::set<std::string>& preserving) {
572 std::vector<std::string> paths = {
573 // Everything in the assembly directory
574 FLAGS_assembly_dir,
575 // The environment file
576 GetCuttlefishEnvPath(),
577 // The global link to the config file
578 vsoc::GetGlobalConfigFileLink(),
579 };
580 for (const auto& instance : config.Instances()) {
581 paths.push_back(instance.instance_dir());
582 }
583 paths.push_back(FLAGS_instance_dir);
584 return CleanPriorFiles(paths, preserving);
585}
586
Jorge E. Moreira80ddd7f2019-02-04 16:30:13 -0800587bool DecompressKernel(const std::string& src, const std::string& dst) {
Cody Schuffelen3dff6982019-12-05 16:24:12 -0800588 cvd::Command decomp_cmd(vsoc::DefaultHostArtifactsPath("bin/extract-vmlinux"));
Jorge E. Moreira80ddd7f2019-02-04 16:30:13 -0800589 decomp_cmd.AddParameter(src);
590 auto output_file = cvd::SharedFD::Creat(dst.c_str(), 0666);
591 if (!output_file->IsOpen()) {
592 LOG(ERROR) << "Unable to create decompressed image file: "
593 << output_file->StrError();
594 return false;
595 }
596 decomp_cmd.RedirectStdIO(cvd::Subprocess::StdIOChannel::kStdOut, output_file);
Cody Schuffelene5670872019-12-10 15:04:59 -0800597 auto decomp_proc = decomp_cmd.Start();
Jorge E. Moreira80ddd7f2019-02-04 16:30:13 -0800598 return decomp_proc.Started() && decomp_proc.Wait() == 0;
599}
Cody Schuffelen78824ed2019-09-06 17:43:15 -0700600
601void ValidateAdbModeFlag(const vsoc::CuttlefishConfig& config) {
602 auto adb_modes = config.adb_mode();
603 adb_modes.erase(vsoc::AdbMode::Unknown);
604 if (adb_modes.size() < 1) {
605 LOG(INFO) << "ADB not enabled";
606 }
607}
608
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800609} // namespace
610
Cody Schuffelen3c99f5b2019-06-14 17:26:01 -0700611namespace {
612
613std::vector<ImagePartition> disk_config() {
614 std::vector<ImagePartition> partitions;
Cody Schuffelen4f7e4412019-08-30 16:10:59 -0700615 partitions.push_back(ImagePartition {
Alistair Delvaaf8ad622020-04-24 17:38:12 -0700616 .label = "misc",
617 .image_file_path = FLAGS_misc_image,
618 });
619 partitions.push_back(ImagePartition {
620 .label = "boot_a",
621 .image_file_path = FLAGS_boot_image,
622 });
623 partitions.push_back(ImagePartition {
624 .label = "boot_b",
625 .image_file_path = FLAGS_boot_image,
626 });
627 partitions.push_back(ImagePartition {
628 .label = "vendor_boot_a",
629 .image_file_path = FLAGS_vendor_boot_image,
630 });
631 partitions.push_back(ImagePartition {
632 .label = "vendor_boot_b",
633 .image_file_path = FLAGS_vendor_boot_image,
634 });
635 partitions.push_back(ImagePartition {
Cody Schuffelen4f7e4412019-08-30 16:10:59 -0700636 .label = "super",
637 .image_file_path = FLAGS_super_image,
638 });
Cody Schuffelen3c99f5b2019-06-14 17:26:01 -0700639 partitions.push_back(ImagePartition {
640 .label = "userdata",
641 .image_file_path = FLAGS_data_image,
642 });
643 partitions.push_back(ImagePartition {
644 .label = "cache",
645 .image_file_path = FLAGS_cache_image,
646 });
647 partitions.push_back(ImagePartition {
648 .label = "metadata",
649 .image_file_path = FLAGS_metadata_image,
650 });
Cody Schuffelen3c99f5b2019-06-14 17:26:01 -0700651 return partitions;
652}
653
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800654std::chrono::system_clock::time_point LastUpdatedInputDisk() {
655 std::chrono::system_clock::time_point ret;
Cody Schuffelen3c99f5b2019-06-14 17:26:01 -0700656 for (auto& partition : disk_config()) {
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800657 auto partition_mod_time = cvd::FileModificationTime(partition.image_file_path);
658 if (partition_mod_time > ret) {
659 ret = partition_mod_time;
Cody Schuffelen3c99f5b2019-06-14 17:26:01 -0700660 }
661 }
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800662 return ret;
663}
664
A. Cody Schuffelen4c287132020-02-07 17:04:23 -0800665bool ShouldCreateCompositeDisk(const vsoc::CuttlefishConfig& config) {
666 if (!cvd::FileExists(config.composite_disk_path())) {
667 return true;
668 }
669 auto composite_age = cvd::FileModificationTime(config.composite_disk_path());
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800670 return composite_age < LastUpdatedInputDisk();
Cody Schuffelen3c99f5b2019-06-14 17:26:01 -0700671}
672
Ram Muthiah3db0a562019-08-26 13:35:19 -0700673bool ConcatRamdisks(const std::string& new_ramdisk_path, const std::string& ramdisk_a_path,
674 const std::string& ramdisk_b_path) {
675 // clear out file of any pre-existing content
676 std::ofstream new_ramdisk(new_ramdisk_path, std::ios_base::binary | std::ios_base::trunc);
677 std::ifstream ramdisk_a(ramdisk_a_path, std::ios_base::binary);
678 std::ifstream ramdisk_b(ramdisk_b_path, std::ios_base::binary);
Ram Muthiahaad97c52019-08-14 17:05:01 -0700679
Ram Muthiah3db0a562019-08-26 13:35:19 -0700680 if(!new_ramdisk.is_open() || !ramdisk_a.is_open() || !ramdisk_b.is_open()) {
Ram Muthiahaad97c52019-08-14 17:05:01 -0700681 return false;
682 }
683
Ram Muthiah3db0a562019-08-26 13:35:19 -0700684 new_ramdisk << ramdisk_a.rdbuf() << ramdisk_b.rdbuf();
Ram Muthiahaad97c52019-08-14 17:05:01 -0700685 return true;
686}
687
Cody Schuffelen25c46432020-01-14 13:49:52 -0800688off_t AvailableSpaceAtPath(const std::string& path) {
689 struct statvfs vfs;
690 if (statvfs(path.c_str(), &vfs) != 0) {
691 int error_num = errno;
692 LOG(ERROR) << "Could not find space available at " << path << ", error was "
693 << strerror(error_num);
694 return 0;
695 }
696 return vfs.f_bsize * vfs.f_bavail; // block size * free blocks for unprivileged users
697}
698
699off_t USERDATA_IMAGE_RESERVED = 4l * (1l << 30l); // 4 GiB
700off_t AGGREGATE_IMAGE_RESERVED = 12l * (1l << 30l); // 12 GiB
701
702bool CreateCompositeDisk(const vsoc::CuttlefishConfig& config) {
A. Cody Schuffelen4c287132020-02-07 17:04:23 -0800703 if (!cvd::SharedFD::Open(config.composite_disk_path().c_str(), O_WRONLY | O_CREAT, 0644)->IsOpen()) {
704 LOG(ERROR) << "Could not ensure " << config.composite_disk_path() << " exists";
Cody Schuffelen25c46432020-01-14 13:49:52 -0800705 return false;
Cody Schuffelen3c99f5b2019-06-14 17:26:01 -0700706 }
Cody Schuffelenc3fd6e52019-08-30 15:14:07 -0700707 if (FLAGS_vm_manager == vm_manager::CrosvmManager::name()) {
Cody Schuffelen25c46432020-01-14 13:49:52 -0800708 auto existing_size = cvd::FileSize(FLAGS_data_image);
709 auto available_space = AvailableSpaceAtPath(FLAGS_data_image);
710 if (available_space < USERDATA_IMAGE_RESERVED - existing_size) {
711 // TODO(schuffelen): Duplicate this check in run_cvd when it can run on a separate machine
712 LOG(ERROR) << "Not enough space in fs containing " << FLAGS_data_image;
713 LOG(ERROR) << "Wanted " << (USERDATA_IMAGE_RESERVED - existing_size);
714 LOG(ERROR) << "Got " << available_space;
715 return false;
716 }
Cody Schuffelena08d9dd2019-12-16 17:55:40 -0800717 std::string header_path = config.AssemblyPath("gpt_header.img");
718 std::string footer_path = config.AssemblyPath("gpt_footer.img");
A. Cody Schuffelen4c287132020-02-07 17:04:23 -0800719 CreateCompositeDisk(disk_config(), header_path, footer_path, config.composite_disk_path());
Cody Schuffelenc3fd6e52019-08-30 15:14:07 -0700720 } else {
A. Cody Schuffelen4c287132020-02-07 17:04:23 -0800721 auto existing_size = cvd::FileSize(config.composite_disk_path());
722 auto available_space = AvailableSpaceAtPath(config.composite_disk_path());
Cody Schuffelen25c46432020-01-14 13:49:52 -0800723 if (available_space < AGGREGATE_IMAGE_RESERVED - existing_size) {
A. Cody Schuffelen4c287132020-02-07 17:04:23 -0800724 LOG(ERROR) << "Not enough space to create " << config.composite_disk_path();
Cody Schuffelen25c46432020-01-14 13:49:52 -0800725 LOG(ERROR) << "Wanted " << (AGGREGATE_IMAGE_RESERVED - existing_size);
726 LOG(ERROR) << "Got " << available_space;
727 return false;
728 }
A. Cody Schuffelen4c287132020-02-07 17:04:23 -0800729 AggregateImage(disk_config(), config.composite_disk_path());
Cody Schuffelenc3fd6e52019-08-30 15:14:07 -0700730 }
Cody Schuffelen25c46432020-01-14 13:49:52 -0800731 return true;
Cody Schuffelen3c99f5b2019-06-14 17:26:01 -0700732}
733
734} // namespace
735
Cody Schuffelen605e6852019-10-16 16:22:24 -0700736const vsoc::CuttlefishConfig* InitFilesystemAndCreateConfig(
Cody Schuffelenb737ef52019-09-25 14:54:38 -0700737 int* argc, char*** argv, cvd::FetcherConfig fetcher_config) {
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800738 if (!ParseCommandLineFlags(argc, argv)) {
739 LOG(ERROR) << "Failed to parse command arguments";
Cody Schuffelene71fa352019-09-10 16:11:58 -0700740 exit(AssemblerExitCodes::kArgumentParsingError);
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800741 }
742
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800743 auto boot_img_unpacker =
744 cvd::BootImageUnpacker::FromImages(FLAGS_boot_image,
745 FLAGS_vendor_boot_image);
746 {
747 // The config object is created here, but only exists in memory until the
748 // SaveConfig line below. Don't launch cuttlefish subprocesses between these
749 // two operations, as those will assume they can read the config object from
750 // disk.
751 auto config = InitializeCuttlefishConfiguration(*boot_img_unpacker, fetcher_config);
752 std::set<std::string> preserving;
A. Cody Schuffelen4c287132020-02-07 17:04:23 -0800753 if (FLAGS_resume && ShouldCreateCompositeDisk(config)) {
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800754 LOG(WARNING) << "Requested resuming a previous session (the default behavior) "
755 << "but the base images have changed under the overlay, making the "
756 << "overlay incompatible. Wiping the overlay files.";
A. Cody Schuffelen4c287132020-02-07 17:04:23 -0800757 } else if (FLAGS_resume && !ShouldCreateCompositeDisk(config)) {
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800758 preserving.insert("overlay.img");
759 preserving.insert("gpt_header.img");
760 preserving.insert("gpt_footer.img");
761 preserving.insert("composite.img");
Alistair Delva3bba6282020-05-14 13:52:00 -0700762 preserving.insert("sdcard.img");
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800763 preserving.insert("access-kregistry");
A. Cody Schuffelenc17acda2020-01-23 15:54:40 -0800764 }
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800765 if (!CleanPriorFiles(config, preserving)) {
766 LOG(ERROR) << "Failed to clean prior files";
767 exit(AssemblerExitCodes::kPrioFilesCleanupError);
768 }
769 // Create assembly directory if it doesn't exist.
770 if (!cvd::DirectoryExists(FLAGS_assembly_dir.c_str())) {
771 LOG(INFO) << "Setting up " << FLAGS_assembly_dir;
772 if (mkdir(FLAGS_assembly_dir.c_str(), S_IRWXU | S_IRWXG | S_IROTH | S_IXOTH) < 0
773 && errno != EEXIST) {
774 LOG(ERROR) << "Failed to create assembly directory: "
775 << FLAGS_assembly_dir << ". Error: " << errno;
776 exit(AssemblerExitCodes::kAssemblyDirCreationError);
777 }
778 }
779 for (const auto& instance : config.Instances()) {
780 // Create instance directory if it doesn't exist.
781 if (!cvd::DirectoryExists(instance.instance_dir().c_str())) {
782 LOG(INFO) << "Setting up " << FLAGS_instance_dir << ".N";
783 if (mkdir(instance.instance_dir().c_str(), S_IRWXU | S_IRWXG | S_IROTH | S_IXOTH) < 0
784 && errno != EEXIST) {
785 LOG(ERROR) << "Failed to create instance directory: "
786 << FLAGS_instance_dir << ". Error: " << errno;
787 exit(AssemblerExitCodes::kInstanceDirCreationError);
788 }
789 }
790 auto internal_dir = instance.instance_dir() + "/" + vsoc::kInternalDirName;
791 if (!cvd::DirectoryExists(internal_dir)) {
792 if (mkdir(internal_dir.c_str(), S_IRWXU | S_IRWXG | S_IROTH | S_IXOTH) < 0
793 && errno != EEXIST) {
794 LOG(ERROR) << "Failed to create internal instance directory: "
795 << internal_dir << ". Error: " << errno;
796 exit(AssemblerExitCodes::kInstanceDirCreationError);
797 }
798 }
799 }
800 if (!SaveConfig(config)) {
801 LOG(ERROR) << "Failed to initialize configuration";
802 exit(AssemblerExitCodes::kCuttlefishConfigurationInitError);
Jorge E. Moreira1e8e2f12019-10-07 18:09:49 -0700803 }
804 }
805
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800806 std::string first_instance = FLAGS_instance_dir + "." + std::to_string(vsoc::GetInstance());
807 if (symlink(first_instance.c_str(), FLAGS_instance_dir.c_str()) < 0) {
808 LOG(ERROR) << "Could not symlink \"" << first_instance << "\" to \"" << FLAGS_instance_dir << "\"";
809 exit(cvd::kCuttlefishConfigurationInitError);
A. Cody Schuffelen3a60a872020-01-23 19:03:50 -0800810 }
811
Cody Schuffelen2b51bab2019-01-29 18:14:48 -0800812 if (!cvd::FileHasContent(FLAGS_boot_image)) {
813 LOG(ERROR) << "File not found: " << FLAGS_boot_image;
814 exit(cvd::kCuttlefishConfigurationInitError);
815 }
816
Ram Muthiah1aa02f82019-10-22 20:26:28 +0000817 if (!cvd::FileHasContent(FLAGS_vendor_boot_image)) {
818 LOG(ERROR) << "File not found: " << FLAGS_vendor_boot_image;
819 exit(cvd::kCuttlefishConfigurationInitError);
820 }
821
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800822 // Do this early so that the config object is ready for anything that needs it
823 auto config = vsoc::CuttlefishConfig::Get();
824 if (!config) {
825 LOG(ERROR) << "Failed to obtain config singleton";
Cody Schuffelene71fa352019-09-10 16:11:58 -0700826 exit(AssemblerExitCodes::kCuttlefishConfigurationInitError);
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800827 }
828
829 if (!boot_img_unpacker->Unpack(config->ramdisk_image_path(),
Ram Muthiah1aa02f82019-10-22 20:26:28 +0000830 config->vendor_ramdisk_image_path(),
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800831 config->use_unpacked_kernel()
832 ? config->kernel_image_path()
833 : "")) {
834 LOG(ERROR) << "Failed to unpack boot image";
Cody Schuffelene71fa352019-09-10 16:11:58 -0700835 exit(AssemblerExitCodes::kBootImageUnpackError);
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800836 }
837
Ram Muthiah1aa02f82019-10-22 20:26:28 +0000838 // TODO(134522463) as part of the bootloader refactor, repack the vendor boot
839 // image and use the bootloader to load both the boot and vendor ramdisk.
840 // Until then, this hack to get gki modules into cuttlefish will suffice.
841
842 // If a vendor ramdisk comes in via this mechanism, let it supercede the one
843 // in the vendor boot image. This flag is what kernel presubmit testing uses
844 // to pass in the kernel ramdisk.
Ram Muthiahd512c132019-10-23 17:20:45 -0700845
846 // If no kernel is passed in or an initramfs is made available, the default
847 // vendor boot ramdisk or the initramfs provided should be appended to the
848 // boot ramdisk. If a kernel IS provided with no initramfs, it is safe to
849 // safe to assume that the kernel was built with no modules and expects no
850 // modules for cf to run properly.
Cody Schuffelencd3563a2019-10-29 16:35:06 -0700851 std::string discovered_kernel = fetcher_config.FindCvdFileWithSuffix(kKernelDefaultPath);
852 std::string foreign_kernel = FLAGS_kernel_path.size() ? FLAGS_kernel_path : discovered_kernel;
853 std::string discovered_ramdisk = fetcher_config.FindCvdFileWithSuffix(kInitramfsImg);
854 std::string foreign_ramdisk = FLAGS_initramfs_path.size () ? FLAGS_initramfs_path : discovered_ramdisk;
855 if(!foreign_kernel.size() || foreign_ramdisk.size()) {
Ram Muthiahd512c132019-10-23 17:20:45 -0700856 const std::string& vendor_ramdisk_path =
857 config->initramfs_path().size() ? config->initramfs_path()
858 : config->vendor_ramdisk_image_path();
859 if(!ConcatRamdisks(config->final_ramdisk_path(),
860 config->ramdisk_image_path(), vendor_ramdisk_path)) {
861 LOG(ERROR) << "Failed to concatenate ramdisk and vendor ramdisk";
862 exit(AssemblerExitCodes::kInitRamFsConcatError);
863 }
Ram Muthiahaad97c52019-08-14 17:05:01 -0700864 }
865
Jorge E. Moreira80ddd7f2019-02-04 16:30:13 -0800866 if (config->decompress_kernel()) {
867 if (!DecompressKernel(config->kernel_image_path(),
868 config->decompressed_kernel_image_path())) {
869 LOG(ERROR) << "Failed to decompress kernel";
Cody Schuffelene71fa352019-09-10 16:11:58 -0700870 exit(AssemblerExitCodes::kKernelDecompressError);
Jorge E. Moreira80ddd7f2019-02-04 16:30:13 -0800871 }
872 }
873
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800874 ValidateAdbModeFlag(*config);
875
Yifan Hong19d713e2019-05-01 14:12:07 -0700876 // Create misc if necessary
877 if (!InitializeMiscImage(FLAGS_misc_image)) {
878 exit(cvd::kCuttlefishConfigurationInitError);
879 }
880
Cody Schuffelen2b51bab2019-01-29 18:14:48 -0800881 // Create data if necessary
Cody Schuffelen3c99f5b2019-06-14 17:26:01 -0700882 if (!ApplyDataImagePolicy(*config, FLAGS_data_image)) {
Cody Schuffelen2b51bab2019-01-29 18:14:48 -0800883 exit(cvd::kCuttlefishConfigurationInitError);
884 }
885
Cody Schuffelen69c19592019-05-31 16:00:30 -0700886 if (!cvd::FileExists(FLAGS_metadata_image)) {
887 CreateBlankImage(FLAGS_metadata_image, FLAGS_blank_metadata_image_mb, "none");
888 }
Paul Trautrimba8f8e92019-03-12 17:55:48 +0900889
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800890 for (const auto& instance : config->Instances()) {
891 if (!cvd::FileExists(instance.access_kregistry_path())) {
Alistair Delva2df23d62020-05-14 11:26:02 -0700892 CreateBlankImage(instance.access_kregistry_path(), 2 /* mb */, "none");
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800893 }
Alistair Delva3bba6282020-05-14 13:52:00 -0700894
895 if (!cvd::FileExists(instance.sdcard_path())) {
896 CreateBlankImage(instance.sdcard_path(),
897 FLAGS_blank_sdcard_image_mb, "sdcard");
898 }
Kenny Root1f50ee62020-01-24 12:06:19 -0800899 }
900
Cody Schuffelenb737ef52019-09-25 14:54:38 -0700901 if (SuperImageNeedsRebuilding(fetcher_config, *config)) {
902 if (!RebuildSuperImage(fetcher_config, *config, FLAGS_super_image)) {
903 LOG(ERROR) << "Super image rebuilding requested but could not be completed.";
904 exit(cvd::kCuttlefishConfigurationInitError);
905 }
906 }
907
A. Cody Schuffelen4c287132020-02-07 17:04:23 -0800908 if (ShouldCreateCompositeDisk(*config)) {
Cody Schuffelen25c46432020-01-14 13:49:52 -0800909 if (!CreateCompositeDisk(*config)) {
910 exit(cvd::kDiskSpaceError);
911 }
Cody Schuffelen3c99f5b2019-06-14 17:26:01 -0700912 }
913
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800914 for (auto instance : config->Instances()) {
915 auto overlay_path = instance.PerInstancePath("overlay.img");
A. Cody Schuffelen4c287132020-02-07 17:04:23 -0800916 if (!cvd::FileExists(overlay_path) || ShouldCreateCompositeDisk(*config) || !FLAGS_resume
917 || cvd::FileModificationTime(overlay_path) < cvd::FileModificationTime(config->composite_disk_path())) {
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800918 if (FLAGS_resume) {
919 LOG(WARNING) << "Requested to continue an existing session, but the overlay was "
920 << "newer than its underlying composite disk. Wiping the overlay.";
921 }
A. Cody Schuffelen4c287132020-02-07 17:04:23 -0800922 CreateQcowOverlay(config->crosvm_binary(), config->composite_disk_path(), overlay_path);
Alistair Delva2df23d62020-05-14 11:26:02 -0700923 CreateBlankImage(instance.access_kregistry_path(), 2 /* mb */, "none");
A. Cody Schuffelen9e2f73e2020-02-04 17:19:54 -0800924 }
925 }
926
927 for (auto instance : config->Instances()) {
928 // Check that the files exist
929 for (const auto& file : instance.virtual_disk_paths()) {
930 if (!file.empty() && !cvd::FileHasContent(file.c_str())) {
931 LOG(ERROR) << "File not found: " << file;
932 exit(cvd::kCuttlefishConfigurationInitError);
933 }
Cody Schuffelen2b51bab2019-01-29 18:14:48 -0800934 }
935 }
936
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800937 return config;
938}
939
940std::string GetConfigFilePath(const vsoc::CuttlefishConfig& config) {
Cody Schuffelen2168c242019-12-13 16:15:27 -0800941 return config.AssemblyPath("cuttlefish_config.json");
Cody Schuffelen20ecaca2019-01-29 17:43:38 -0800942}