core-admin/qubes/tests/integ/vm_qrexec_gui.py

864 lines
35 KiB
Python
Raw Normal View History

#
2015-02-05 15:46:40 +01:00
# The Qubes OS Project, https://www.qubes-os.org/
#
2015-02-05 15:46:40 +01:00
# Copyright (C) 2014-2015
# Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
# Copyright (C) 2015 Wojtek Porczyk <woju@invisiblethingslab.com>
#
# This library is free software; you can redistribute it and/or
# modify it under the terms of the GNU Lesser General Public
# License as published by the Free Software Foundation; either
# version 2.1 of the License, or (at your option) any later version.
#
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# Lesser General Public License for more details.
#
# You should have received a copy of the GNU Lesser General Public
# License along with this library; if not, see <https://www.gnu.org/licenses/>.
#
import asyncio
import os
import subprocess
import sys
import tempfile
import unittest
from distutils import spawn
import grp
2016-08-17 04:39:13 +02:00
import qubes.config
import qubes.devices
2015-02-05 15:46:40 +01:00
import qubes.tests
2016-08-17 04:39:13 +02:00
import qubes.vm.appvm
import qubes.vm.templatevm
import numpy as np
2016-08-17 04:39:13 +02:00
class TC_00_AppVMMixin(object):
def setUp(self):
super(TC_00_AppVMMixin, self).setUp()
2016-08-17 04:39:13 +02:00
self.init_default_template(self.template)
if self._testMethodName == 'test_210_time_sync':
self.init_networking()
self.testvm1 = self.app.add_new_vm(
qubes.vm.appvm.AppVM,
label='red',
2015-02-05 15:46:40 +01:00
name=self.make_vm_name('vm1'),
2016-08-17 04:39:13 +02:00
template=self.app.domains[self.template])
self.loop.run_until_complete(self.testvm1.create_on_disk())
2016-08-17 04:39:13 +02:00
self.testvm2 = self.app.add_new_vm(
qubes.vm.appvm.AppVM,
label='red',
2015-02-05 15:46:40 +01:00
name=self.make_vm_name('vm2'),
2016-08-17 04:39:13 +02:00
template=self.app.domains[self.template])
self.loop.run_until_complete(self.testvm2.create_on_disk())
2016-08-17 04:39:13 +02:00
self.app.save()
def test_000_start_shutdown(self):
# TODO: wait_for, timeout
self.loop.run_until_complete(self.testvm1.start())
self.assertEqual(self.testvm1.get_power_state(), "Running")
self.loop.run_until_complete(self.wait_for_session(self.testvm1))
self.loop.run_until_complete(self.testvm1.shutdown(wait=True))
self.assertEqual(self.testvm1.get_power_state(), "Halted")
@unittest.skipUnless(spawn.find_executable('xdotool'),
"xdotool not installed")
def test_010_run_xterm(self):
self.loop.run_until_complete(self.testvm1.start())
self.assertEqual(self.testvm1.get_power_state(), "Running")
self.loop.run_until_complete(self.wait_for_session(self.testvm1))
p = self.loop.run_until_complete(self.testvm1.run('xterm'))
try:
title = 'user@{}'.format(self.testvm1.name)
if self.template.count("whonix"):
title = 'user@host'
self.wait_for_window(title)
self.loop.run_until_complete(asyncio.sleep(0.5))
subprocess.check_call(
['xdotool', 'search', '--name', title,
'windowactivate', 'type', 'exit\n'])
self.wait_for_window(title, show=False)
finally:
try:
p.terminate()
self.loop.run_until_complete(p.wait())
except ProcessLookupError: # already dead
pass
@unittest.skipUnless(spawn.find_executable('xdotool'),
"xdotool not installed")
def test_011_run_gnome_terminal(self):
if "minimal" in self.template:
self.skipTest("Minimal template doesn't have 'gnome-terminal'")
if 'whonix' in self.template:
self.skipTest("Whonix template doesn't have 'gnome-terminal'")
self.loop.run_until_complete(self.testvm1.start())
self.assertEqual(self.testvm1.get_power_state(), "Running")
self.loop.run_until_complete(self.wait_for_session(self.testvm1))
p = self.loop.run_until_complete(self.testvm1.run('gnome-terminal'))
try:
title = 'user@{}'.format(self.testvm1.name)
if self.template.count("whonix"):
title = 'user@host'
self.wait_for_window(title)
self.loop.run_until_complete(asyncio.sleep(0.5))
subprocess.check_call(
['xdotool', 'search', '--name', title,
'windowactivate', '--sync', 'type', 'exit\n'])
wait_count = 0
while subprocess.call(['xdotool', 'search', '--name', title],
stdout=open(os.path.devnull, 'w'),
stderr=subprocess.STDOUT) == 0:
wait_count += 1
if wait_count > 100:
self.fail("Timeout while waiting for gnome-terminal "
"termination")
self.loop.run_until_complete(asyncio.sleep(0.1))
finally:
try:
p.terminate()
self.loop.run_until_complete(p.wait())
except ProcessLookupError: # already dead
pass
@unittest.skipUnless(spawn.find_executable('xdotool'),
"xdotool not installed")
def test_012_qubes_desktop_run(self):
self.loop.run_until_complete(self.testvm1.start())
self.assertEqual(self.testvm1.get_power_state(), "Running")
xterm_desktop_path = "/usr/share/applications/xterm.desktop"
# Debian has it different...
xterm_desktop_path_debian = \
"/usr/share/applications/debian-xterm.desktop"
try:
self.loop.run_until_complete(self.testvm1.run_for_stdio(
'test -r {}'.format(xterm_desktop_path_debian)))
except subprocess.CalledProcessError:
pass
else:
xterm_desktop_path = xterm_desktop_path_debian
self.loop.run_until_complete(self.wait_for_session(self.testvm1))
self.loop.run_until_complete(
self.testvm1.run('qubes-desktop-run {}'.format(xterm_desktop_path)))
title = 'user@{}'.format(self.testvm1.name)
if self.template.count("whonix"):
title = 'user@host'
self.wait_for_window(title)
self.loop.run_until_complete(asyncio.sleep(0.5))
subprocess.check_call(
['xdotool', 'search', '--name', title,
'windowactivate', '--sync', 'type', 'exit\n'])
self.wait_for_window(title, show=False)
def test_100_qrexec_filecopy(self):
self.loop.run_until_complete(asyncio.wait([
self.testvm1.start(),
self.testvm2.start()]))
self.loop.run_until_complete(self.testvm1.run_for_stdio(
'cp /etc/passwd /tmp/passwd'))
with self.qrexec_policy('qubes.Filecopy', self.testvm1, self.testvm2):
try:
self.loop.run_until_complete(
self.testvm1.run_for_stdio(
'qvm-copy-to-vm {} /tmp/passwd'.format(
self.testvm2.name)))
except subprocess.CalledProcessError as e:
self.fail('qvm-copy-to-vm failed: {}'.format(e.stderr))
try:
self.loop.run_until_complete(self.testvm2.run_for_stdio(
'diff /etc/passwd /home/user/QubesIncoming/{}/passwd'.format(
self.testvm1.name)))
except subprocess.CalledProcessError:
self.fail('file differs')
try:
self.loop.run_until_complete(self.testvm1.run_for_stdio(
'test -f /tmp/passwd'))
except subprocess.CalledProcessError:
self.fail('source file got removed')
2016-03-28 01:19:01 +02:00
def test_105_qrexec_filemove(self):
self.loop.run_until_complete(asyncio.wait([
self.testvm1.start(),
self.testvm2.start()]))
self.loop.run_until_complete(self.testvm1.run_for_stdio(
'cp /etc/passwd /tmp/passwd'))
with self.qrexec_policy('qubes.Filecopy', self.testvm1, self.testvm2):
try:
self.loop.run_until_complete(
self.testvm1.run_for_stdio(
'qvm-move-to-vm {} /tmp/passwd'.format(
self.testvm2.name)))
except subprocess.CalledProcessError as e:
self.fail('qvm-move-to-vm failed: {}'.format(e.stderr))
try:
self.loop.run_until_complete(self.testvm2.run_for_stdio(
'diff /etc/passwd /home/user/QubesIncoming/{}/passwd'.format(
self.testvm1.name)))
except subprocess.CalledProcessError:
self.fail('file differs')
with self.assertRaises(subprocess.CalledProcessError):
self.loop.run_until_complete(self.testvm1.run_for_stdio(
'test -f /tmp/passwd'))
2016-03-28 01:19:01 +02:00
def test_101_qrexec_filecopy_with_autostart(self):
self.loop.run_until_complete(self.testvm1.start())
with self.qrexec_policy('qubes.Filecopy', self.testvm1, self.testvm2):
try:
self.loop.run_until_complete(
self.testvm1.run_for_stdio(
'qvm-copy-to-vm {} /etc/passwd'.format(
self.testvm2.name)))
except subprocess.CalledProcessError as e:
self.fail('qvm-copy-to-vm failed: {}'.format(e.stderr))
# workaround for libvirt bug (domain ID isn't updated when is started
# from other application) - details in
# QubesOS/qubes-core-libvirt@63ede4dfb4485c4161dd6a2cc809e8fb45ca664f
# XXX is it still true with qubesd? --woju 20170523
self.testvm2._libvirt_domain = None
self.assertTrue(self.testvm2.is_running())
try:
self.loop.run_until_complete(self.testvm2.run_for_stdio(
'diff /etc/passwd /home/user/QubesIncoming/{}/passwd'.format(
self.testvm1.name)))
except subprocess.CalledProcessError:
self.fail('file differs')
try:
self.loop.run_until_complete(self.testvm1.run_for_stdio(
'test -f /etc/passwd'))
except subprocess.CalledProcessError:
self.fail('source file got removed')
def test_110_qrexec_filecopy_deny(self):
self.loop.run_until_complete(asyncio.wait([
self.testvm1.start(),
self.testvm2.start()]))
with self.qrexec_policy('qubes.Filecopy', self.testvm1, self.testvm2,
allow=False):
with self.assertRaises(subprocess.CalledProcessError):
self.loop.run_until_complete(
self.testvm1.run_for_stdio(
'qvm-copy-to-vm {} /etc/passwd'.format(
self.testvm2.name)))
with self.assertRaises(subprocess.CalledProcessError):
self.loop.run_until_complete(self.testvm1.run_for_stdio(
'test -d /home/user/QubesIncoming/{}'.format(
self.testvm1.name)))
def test_115_qrexec_filecopy_no_agent(self):
# The operation should not hang when qrexec-agent is down on target
# machine, see QubesOS/qubes-issues#5347.
self.loop.run_until_complete(asyncio.wait([
self.testvm1.start(),
self.testvm2.start()]))
with self.qrexec_policy('qubes.Filecopy', self.testvm1, self.testvm2):
try:
self.loop.run_until_complete(
self.testvm2.run_for_stdio(
'systemctl stop qubes-qrexec-agent.service', user='root'))
except subprocess.CalledProcessError:
# A failure is normal here, because we're killing the qrexec
# process that is handling the command.
pass
with self.assertRaises(subprocess.CalledProcessError):
self.loop.run_until_complete(
asyncio.wait_for(
self.testvm1.run_for_stdio(
'qvm-copy-to-vm {} /etc/passwd'.format(
self.testvm2.name)),
timeout=30))
tests: disable qrexec_filecopy_self test When vchan connection is established back to the source domain, gntalloc crashes with this message: [ 9.937990] BUG: Bad page map in process qrexec-agent pte:80000000f9d41167 pmd:131c3067 [ 9.938010] page:ffffea00036a6638 count:1 mapcount:-1 mapping: (null) index:0xffffffffffffffff [ 9.938018] page flags: 0x4000000000000c14(referenced|dirty|reserved|private) [ 9.938033] addr:00007fa856d47000 vm_flags:140400fb anon_vma: (null) mapping:ffff880011efe940 index:11 [ 9.938042] vma->vm_ops->fault: (null) [ 9.938057] vma->vm_file->f_op->mmap: gntalloc_mmap+0x0/0x1c0 [xen_gntalloc] [ 9.938066] CPU: 0 PID: 1108 Comm: qrexec-agent Tainted: G O 3.12.23-1.pvops.qubes.x86_64 #1 [ 9.938074] ffff8800131f3818 ffff88001316fc78 ffffffff814db550 00007fa856d47000 [ 9.938085] ffff88001316fcb8 ffffffff81139413 ffff880011efe940 ffff8800131c3a38 [ 9.938096] ffffea00036a6638 00007fa856d47000 00007fa856d57000 ffff88001316fe18 [ 9.938107] Call Trace: [ 9.938117] [<ffffffff814db550>] dump_stack+0x45/0x56 [ 9.938126] [<ffffffff81139413>] print_bad_pte+0x1a3/0x240 [ 9.938133] [<ffffffff8113ac9e>] unmap_page_range+0x6ee/0x7d0 [ 9.938142] [<ffffffff8113adf6>] unmap_single_vma+0x76/0xa0 [ 9.938149] [<ffffffff8113be09>] unmap_vmas+0x49/0x90 [ 9.938157] [<ffffffff8114443c>] exit_mmap+0x9c/0x170 [ 9.938166] [<ffffffff8105950c>] mmput+0x5c/0x110 [ 9.938175] [<ffffffff8105d74c>] do_exit+0x27c/0xa20 [ 9.938184] [<ffffffff810908ef>] ? vtime_account_user+0x4f/0x60 [ 9.938194] [<ffffffff81116502>] ? context_tracking_user_exit+0x52/0xc0 [ 9.938203] [<ffffffff8105ed2a>] do_group_exit+0x3a/0xa0 [ 9.938211] [<ffffffff8105ed9f>] SyS_exit_group+0xf/0x10 [ 9.938220] [<ffffffff814ea907>] tracesys+0xdd/0xe2
2015-02-09 22:09:15 +01:00
@unittest.skip("Xen gntalloc driver crashes when page is mapped in the "
"same domain")
def test_120_qrexec_filecopy_self(self):
self.testvm1.start()
self.qrexec_policy('qubes.Filecopy', self.testvm1.name,
self.testvm1.name)
p = self.testvm1.run("qvm-copy-to-vm %s /etc/passwd" %
self.testvm1.name, passio_popen=True,
passio_stderr=True)
p.wait()
self.assertEqual(p.returncode, 0, "qvm-copy-to-vm failed: %s" %
p.stderr.read())
retcode = self.testvm1.run(
"diff /etc/passwd /home/user/QubesIncoming/{}/passwd".format(
self.testvm1.name),
wait=True)
self.assertEqual(retcode, 0, "file differs")
@unittest.skipUnless(spawn.find_executable('xdotool'),
"xdotool not installed")
def test_130_qrexec_filemove_disk_full(self):
self.loop.run_until_complete(asyncio.wait([
self.testvm1.start(),
self.testvm2.start()]))
self.loop.run_until_complete(self.wait_for_session(self.testvm1))
# Prepare test file
2017-06-05 14:34:06 +02:00
self.loop.run_until_complete(self.testvm1.run_for_stdio(
'yes teststring | dd of=/tmp/testfile bs=1M count=50 '
'iflag=fullblock'))
# Prepare target directory with limited size
2017-06-01 00:33:53 +02:00
self.loop.run_until_complete(self.testvm2.run_for_stdio(
'mkdir -p /home/user/QubesIncoming && '
'chown user /home/user/QubesIncoming && '
'mount -t tmpfs none /home/user/QubesIncoming -o size=48M',
user='root'))
with self.qrexec_policy('qubes.Filecopy', self.testvm1, self.testvm2):
p = self.loop.run_until_complete(self.testvm1.run(
'qvm-move-to-vm {} /tmp/testfile'.format(
self.testvm2.name)))
# Close GUI error message
try:
self.enter_keys_in_window('Error', ['Return'])
except subprocess.CalledProcessError:
pass
self.loop.run_until_complete(p.wait())
self.assertNotEqual(p.returncode, 0)
# the file shouldn't be removed in source vm
self.loop.run_until_complete(self.testvm1.run_for_stdio(
'test -f /tmp/testfile'))
def test_200_timezone(self):
"""Test whether timezone setting is properly propagated to the VM"""
if "whonix" in self.template:
self.skipTest("Timezone propagation disabled on Whonix templates")
self.loop.run_until_complete(self.testvm1.start())
vm_tz, _ = self.loop.run_until_complete(self.testvm1.run_for_stdio(
'date +%Z'))
dom0_tz = subprocess.check_output(['date', '+%Z'])
self.assertEqual(vm_tz.strip(), dom0_tz.strip())
# Check if reverting back to UTC works
vm_tz, _ = self.loop.run_until_complete(self.testvm1.run_for_stdio(
'TZ=UTC date +%Z'))
self.assertEqual(vm_tz.strip(), b'UTC')
2015-07-08 01:21:13 +02:00
def test_210_time_sync(self):
"""Test time synchronization mechanism"""
if self.template.startswith('whonix-'):
self.skipTest('qvm-sync-clock disabled for Whonix VMs')
self.loop.run_until_complete(asyncio.wait([
self.testvm1.start(),
self.testvm2.start(),]))
start_time = subprocess.check_output(['date', '-u', '+%s'])
2015-07-08 01:21:13 +02:00
try:
2016-08-17 04:39:13 +02:00
self.app.clockvm = self.testvm1
self.app.save()
2015-07-08 01:21:13 +02:00
# break vm and dom0 time, to check if qvm-sync-clock would fix it
subprocess.check_call(['sudo', 'date', '-s', '2001-01-01T12:34:56'],
stdout=subprocess.DEVNULL)
self.loop.run_until_complete(
self.testvm2.run_for_stdio('date -s 2001-01-01T12:34:56',
user='root'))
self.loop.run_until_complete(
self.testvm2.run_for_stdio('qvm-sync-clock',
user='root'))
p = self.loop.run_until_complete(
asyncio.create_subprocess_exec('sudo', 'qvm-sync-clock',
stdout=asyncio.subprocess.DEVNULL))
self.loop.run_until_complete(p.wait())
self.assertEqual(p.returncode, 0)
vm_time, _ = self.loop.run_until_complete(
self.testvm2.run_for_stdio('date -u +%s'))
self.assertAlmostEquals(int(vm_time), int(start_time), delta=30)
dom0_time = subprocess.check_output(['date', '-u', '+%s'])
self.assertAlmostEquals(int(dom0_time), int(start_time), delta=30)
2015-07-08 01:21:13 +02:00
except:
# reset time to some approximation of the real time
2017-02-23 00:17:25 +01:00
subprocess.Popen(
["sudo", "date", "-u", "-s", "@" + start_time.decode()])
2015-07-08 01:21:13 +02:00
raise
finally:
self.app.clockvm = None
2015-07-08 01:21:13 +02:00
def wait_for_pulseaudio_startup(self, vm):
self.loop.run_until_complete(
self.wait_for_session(self.testvm1))
try:
self.loop.run_until_complete(vm.run_for_stdio(
"timeout 30s sh -c 'while ! pactl info; do sleep 1; done'"
))
except subprocess.CalledProcessError as e:
self.fail('Timeout waiting for pulseaudio start in {}: {}{}'.format(
vm.name, e.stdout, e.stderr))
# then wait for the stream to appear in dom0
local_user = grp.getgrnam('qubes').gr_mem[0]
p = self.loop.run_until_complete(asyncio.create_subprocess_shell(
"sudo -E -u {} timeout 60s sh -c '"
"while ! pactl list sink-inputs | grep -q :{}; do sleep 1; done'"
.format(local_user, vm.name)))
self.loop.run_until_complete(p.wait())
# and some more...
self.loop.run_until_complete(asyncio.sleep(1))
2020-06-24 13:57:37 +02:00
def prepare_audio_vm(self):
if 'whonix-gw' in self.template:
self.skipTest('whonix-gw have no audio')
self.loop.run_until_complete(self.testvm1.start())
try:
self.loop.run_until_complete(
self.testvm1.run_for_stdio('which parecord'))
except subprocess.CalledProcessError:
self.skipTest('pulseaudio-utils not installed in VM')
2020-06-24 13:57:37 +02:00
self.wait_for_pulseaudio_startup(self.testvm1)
2020-06-24 14:03:10 +02:00
def check_audio_sample(self, sample, sfreq):
rec = np.fromstring(sample, dtype=np.float32)
# determine sample size using silence threshold
threshold = 10**-3
rec_size = np.count_nonzero((rec > threshold) | (rec < -threshold))
if not rec_size:
self.fail('only silence detected, no useful audio data')
# find zero crossings
crossings = np.nonzero((rec[1:] > threshold) &
(rec[:-1] < -threshold))[0]
np.seterr('raise')
# compare against sine wave frequency
rec_freq = rec_size/np.mean(np.diff(crossings))
if not sfreq*0.8 < rec_freq < sfreq*1.2:
self.fail('frequency {} not in specified range'
.format(rec_freq))
def common_audio_playback(self):
# sine frequency
sfreq = 4400
# generate signal
audio_in = np.sin(2*np.pi*np.arange(44100)*sfreq/44100)
self.loop.run_until_complete(
self.testvm1.run_for_stdio('cat > audio_in.raw',
input=audio_in.astype(np.float32).tobytes()))
local_user = grp.getgrnam('qubes').gr_mem[0]
with tempfile.NamedTemporaryFile() as recorded_audio:
os.chmod(recorded_audio.name, 0o666)
# FIXME: -d 0 assumes only one audio device
p = subprocess.Popen(['sudo', '-E', '-u', local_user,
'parecord', '-d', '0', '--raw',
'--format=float32le', '--rate=44100', '--channels=1',
recorded_audio.name], stdout=subprocess.PIPE)
2019-09-29 06:06:10 +02:00
try:
self.loop.run_until_complete(
self.testvm1.run_for_stdio(
'paplay --format=float32le --rate=44100 \
--channels=1 --raw audio_in.raw'))
2019-09-29 06:06:10 +02:00
except subprocess.CalledProcessError as err:
self.fail('{} stderr: {}'.format(str(err), err.stderr))
# wait for possible parecord buffering
self.loop.run_until_complete(asyncio.sleep(1))
p.terminate()
# for some reason sudo do not relay SIGTERM sent above
subprocess.check_call(['pkill', 'parecord'])
p.wait()
2020-06-24 14:03:10 +02:00
self.check_audio_sample(recorded_audio.file.read(), sfreq)
def _configure_audio_recording(self, vm):
'''Connect VM's output-source to sink monitor instead of mic'''
local_user = grp.getgrnam('qubes').gr_mem[0]
sudo = ['sudo', '-E', '-u', local_user]
source_outputs = subprocess.check_output(
sudo + ['pacmd', 'list-source-outputs']).decode()
last_index = None
found = False
for line in source_outputs.splitlines():
if line.startswith(' index: '):
last_index = line.split(':')[1].strip()
elif line.startswith('\t\tapplication.name = '):
app_name = line.split('=')[1].strip('" ')
if vm.name == app_name:
found = True
break
if not found:
self.fail('source-output for VM {} not found'.format(vm.name))
subprocess.check_call(sudo +
['pacmd', 'move-source-output', last_index, '0'])
def common_audio_record_muted(self):
# connect VM's recording source output monitor (instead of mic)
self._configure_audio_recording(self.testvm1)
# generate some "audio" data
audio_in = b'\x20' * 44100
local_user = grp.getgrnam('qubes').gr_mem[0]
record = self.loop.run_until_complete(
self.testvm1.run('parecord --raw audio_rec.raw'))
# give it time to start recording
self.loop.run_until_complete(asyncio.sleep(0.5))
p = subprocess.Popen(['sudo', '-E', '-u', local_user,
'paplay', '--raw'],
stdin=subprocess.PIPE)
p.communicate(audio_in)
# wait for possible parecord buffering
self.loop.run_until_complete(asyncio.sleep(1))
self.loop.run_until_complete(
self.testvm1.run_for_stdio('pkill parecord'))
self.loop.run_until_complete(record.wait())
recorded_audio, _ = self.loop.run_until_complete(
self.testvm1.run_for_stdio('cat audio_rec.raw'))
# should be empty or silence, so check just a little fragment
if audio_in[:32] in recorded_audio:
self.fail('VM recorded something, even though mic disabled')
def common_audio_record_unmuted(self):
deva = qubes.devices.DeviceAssignment(self.app.domains[0], 'mic')
self.loop.run_until_complete(
self.testvm1.devices['mic'].attach(deva))
# connect VM's recording source output monitor (instead of mic)
self._configure_audio_recording(self.testvm1)
sfreq = 4400
audio_in = np.sin(2*np.pi*np.arange(44100)*sfreq/44100)
local_user = grp.getgrnam('qubes').gr_mem[0]
record = self.loop.run_until_complete(self.testvm1.run(
'parecord --raw --format=float32le --rate=44100 \
--channels=1 audio_rec.raw'))
# give it time to start recording
self.loop.run_until_complete(asyncio.sleep(0.5))
p = subprocess.Popen(['sudo', '-E', '-u', local_user,
'paplay', '--raw', '--format=float32le',
'--rate=44100', '--channels=1'],
stdin=subprocess.PIPE)
p.communicate(audio_in.astype(np.float32).tobytes())
# wait for possible parecord buffering
self.loop.run_until_complete(asyncio.sleep(1))
self.loop.run_until_complete(
self.testvm1.run_for_stdio('pkill parecord || :'))
_, record_stderr = self.loop.run_until_complete(record.communicate())
if record_stderr:
self.fail('parecord printed something on stderr: {}'.format(
record_stderr))
recorded_audio, _ = self.loop.run_until_complete(
self.testvm1.run_for_stdio('cat audio_rec.raw'))
2020-06-24 14:03:10 +02:00
self.check_audio_sample(recorded_audio, sfreq)
@unittest.skipUnless(spawn.find_executable('parecord'),
"pulseaudio-utils not installed in dom0")
def test_220_audio_play(self):
2020-06-24 13:57:37 +02:00
self.prepare_audio_vm()
self.common_audio_playback()
@unittest.skipUnless(spawn.find_executable('parecord'),
"pulseaudio-utils not installed in dom0")
def test_221_audio_rec_muted(self):
2020-06-24 13:57:37 +02:00
self.prepare_audio_vm()
self.common_audio_record_muted()
@unittest.skipUnless(spawn.find_executable('parecord'),
"pulseaudio-utils not installed in dom0")
def test_222_audio_rec_unmuted(self):
2020-06-24 13:57:37 +02:00
self.prepare_audio_vm()
self.common_audio_record_unmuted()
@unittest.skipUnless(spawn.find_executable('parecord'),
"pulseaudio-utils not installed in dom0")
def test_223_audio_play_hvm(self):
self.testvm1.virt_mode = 'hvm'
self.testvm1.features['audio-model'] = 'ich6'
2020-06-24 13:57:37 +02:00
self.prepare_audio_vm()
self.loop.run_until_complete(
self.testvm1.run_for_stdio('pacmd unload-module module-vchan-sink'))
self.common_audio_playback()
@unittest.skipUnless(spawn.find_executable('parecord'),
"pulseaudio-utils not installed in dom0")
def test_224_audio_rec_muted_hvm(self):
self.testvm1.virt_mode = 'hvm'
self.testvm1.features['audio-model'] = 'ich6'
2020-06-24 13:57:37 +02:00
self.prepare_audio_vm()
self.loop.run_until_complete(
self.testvm1.run_for_stdio('pacmd unload-module module-vchan-sink'))
self.common_audio_record_muted()
@unittest.skipUnless(spawn.find_executable('parecord'),
"pulseaudio-utils not installed in dom0")
def test_225_audio_rec_unmuted_hvm(self):
self.testvm1.virt_mode = 'hvm'
self.testvm1.features['audio-model'] = 'ich6'
2020-06-24 13:57:37 +02:00
self.prepare_audio_vm()
self.loop.run_until_complete(
self.testvm1.run_for_stdio('pacmd unload-module module-vchan-sink'))
self.common_audio_record_unmuted()
def test_250_resize_private_img(self):
"""
Test private.img resize, both offline and online
:return:
"""
# First offline test
self.loop.run_until_complete(
self.testvm1.storage.resize('private', 4*1024**3))
self.loop.run_until_complete(self.testvm1.start())
df_cmd = '( df --output=size /rw || df /rw | awk \'{print $2}\' )|' \
'tail -n 1'
# new_size in 1k-blocks
new_size, _ = self.loop.run_until_complete(
self.testvm1.run_for_stdio(df_cmd))
# some safety margin for FS metadata
self.assertGreater(int(new_size.strip()), 3.8*1024**2)
# Then online test
self.loop.run_until_complete(
self.testvm1.storage.resize('private', 6*1024**3))
# new_size in 1k-blocks
new_size, _ = self.loop.run_until_complete(
self.testvm1.run_for_stdio(df_cmd))
# some safety margin for FS metadata
self.assertGreater(int(new_size.strip()), 5.7*1024**2)
@unittest.skipUnless(spawn.find_executable('xdotool'),
"xdotool not installed")
def test_300_bug_1028_gui_memory_pinning(self):
"""
If VM window composition buffers are relocated in memory, GUI will
still use old pointers and will display old pages
:return:
"""
# this test does too much asynchronous operations,
# so let's rewrite it as a coroutine and call it as such
return self.loop.run_until_complete(
self._test_300_bug_1028_gui_memory_pinning())
@asyncio.coroutine
def _test_300_bug_1028_gui_memory_pinning(self):
self.testvm1.memory = 800
self.testvm1.maxmem = 800
# exclude from memory balancing
self.testvm1.features['service.meminfo-writer'] = False
yield from self.testvm1.start()
yield from self.wait_for_session(self.testvm1)
# and allow large map count
yield from self.testvm1.run('echo 256000 > /proc/sys/vm/max_map_count',
user="root")
allocator_c = '''
#include <sys/mman.h>
#include <stdlib.h>
#include <stdio.h>
int main(int argc, char **argv) {
int total_pages;
char *addr, *iter;
total_pages = atoi(argv[1]);
addr = mmap(NULL, total_pages * 0x1000, PROT_READ | PROT_WRITE,
MAP_ANONYMOUS | MAP_PRIVATE | MAP_POPULATE, -1, 0);
if (addr == MAP_FAILED) {
perror("mmap");
exit(1);
}
printf("Stage1\\n");
fflush(stdout);
getchar();
for (iter = addr; iter < addr + total_pages*0x1000; iter += 0x2000) {
if (mlock(iter, 0x1000) == -1) {
perror("mlock");
fprintf(stderr, "%d of %d\\n", (iter-addr)/0x1000, total_pages);
exit(1);
}
}
printf("Stage2\\n");
fflush(stdout);
for (iter = addr+0x1000; iter < addr + total_pages*0x1000; iter += 0x2000) {
if (munmap(iter, 0x1000) == -1) {
perror(\"munmap\");
exit(1);
}
}
printf("Stage3\\n");
fflush(stdout);
fclose(stdout);
getchar();
return 0;
}
'''
yield from self.testvm1.run_for_stdio('cat > allocator.c',
input=allocator_c.encode())
try:
yield from self.testvm1.run_for_stdio(
'gcc allocator.c -o allocator')
except subprocess.CalledProcessError as e:
self.skipTest('allocator compile failed: {}'.format(e.stderr))
# drop caches to have even more memory pressure
2017-06-05 14:34:06 +02:00
yield from self.testvm1.run_for_stdio(
'echo 3 > /proc/sys/vm/drop_caches', user='root')
# now fragment all free memory
stdout, _ = yield from self.testvm1.run_for_stdio(
"grep ^MemFree: /proc/meminfo|awk '{print $2}'")
memory_pages = int(stdout) // 4 # 4k pages
alloc1 = yield from self.testvm1.run(
'ulimit -l unlimited; exec /home/user/allocator {}'.format(
memory_pages),
user="root",
stdin=subprocess.PIPE, stdout=subprocess.PIPE,
stderr=subprocess.PIPE)
# wait for memory being allocated; can't use just .read(), because EOF
# passing is unreliable while the process is still running
alloc1.stdin.write(b'\n')
yield from alloc1.stdin.drain()
try:
alloc_out = yield from alloc1.stdout.readexactly(
len('Stage1\nStage2\nStage3\n'))
except asyncio.IncompleteReadError as e:
alloc_out = e.partial
if b'Stage3' not in alloc_out:
2017-06-01 00:33:53 +02:00
# read stderr only in case of failed assert (), but still have nice
# failure message (don't use self.fail() directly)
#
2017-06-01 00:33:53 +02:00
# stderr isn't always read, because on not-failed run, the process
# is still running, so stderr.read() will wait (indefinitely).
self.assertIn(b'Stage3', alloc_out,
(yield from alloc1.stderr.read()))
# now, launch some window - it should get fragmented composition buffer
# it is important to have some changing content there, to generate
# content update events (aka damage notify)
proc = yield from self.testvm1.run(
'xterm -maximized -e top')
if proc.returncode is not None:
self.fail('xterm failed to start')
# get window ID
winid = yield from self.wait_for_window_coro(
self.testvm1.name + ':xterm',
search_class=True)
xprop = yield from asyncio.get_event_loop().run_in_executor(None,
subprocess.check_output,
['xprop', '-notype', '-id', winid, '_QUBES_VMWINDOWID'])
vm_winid = xprop.decode().strip().split(' ')[4]
# now free the fragmented memory and trigger compaction
alloc1.stdin.write(b'\n')
yield from alloc1.stdin.drain()
yield from alloc1.wait()
yield from self.testvm1.run_for_stdio(
'echo 1 > /proc/sys/vm/compact_memory', user='root')
# now window may be already "broken"; to be sure, allocate (=zero)
# some memory
alloc2 = yield from self.testvm1.run(
'ulimit -l unlimited; /home/user/allocator {}'.format(memory_pages),
user='root', stdout=subprocess.PIPE)
yield from alloc2.stdout.read(len('Stage1\n'))
# wait for damage notify - top updates every 3 sec by default
yield from asyncio.sleep(6)
# stop changing the window content
subprocess.check_call(['xdotool', 'key', '--window', winid, 'd'])
# now take screenshot of the window, from dom0 and VM
# choose pnm format, as it doesn't have any useless metadata - easy
# to compare
vm_image, _ = yield from self.testvm1.run_for_stdio(
'import -window {} pnm:-'.format(vm_winid))
dom0_image = yield from asyncio.get_event_loop().run_in_executor(None,
subprocess.check_output, ['import', '-window', winid, 'pnm:-'])
if vm_image != dom0_image:
self.fail("Dom0 window doesn't match VM window content")
class TC_10_Generic(qubes.tests.SystemTestCase):
def setUp(self):
super(TC_10_Generic, self).setUp()
2017-02-23 00:30:35 +01:00
self.init_default_template()
self.vm = self.app.add_new_vm(
qubes.vm.appvm.AppVM,
name=self.make_vm_name('vm'),
2017-02-23 00:30:35 +01:00
label='red',
template=self.app.default_template)
self.loop.run_until_complete(self.vm.create_on_disk())
self.app.save()
self.vm = self.app.domains[self.vm.qid]
def test_000_anyvm_deny_dom0(self):
'''$anyvm in policy should not match dom0'''
policy = open("/etc/qubes-rpc/policy/test.AnyvmDeny", "w")
policy.write("%s $anyvm allow" % (self.vm.name,))
policy.close()
self.addCleanup(os.unlink, "/etc/qubes-rpc/policy/test.AnyvmDeny")
flagfile = '/tmp/test-anyvmdeny-flag'
if os.path.exists(flagfile):
os.remove(flagfile)
self.create_local_file('/etc/qubes-rpc/test.AnyvmDeny',
'touch {}\necho service output\n'.format(flagfile))
self.loop.run_until_complete(self.vm.start())
with self.qrexec_policy('test.AnyvmDeny', self.vm, '$anyvm'):
2017-06-01 00:33:53 +02:00
with self.assertRaises(subprocess.CalledProcessError,
msg='$anyvm matched dom0') as e:
self.loop.run_until_complete(
self.vm.run_for_stdio(
'/usr/lib/qubes/qrexec-client-vm dom0 test.AnyvmDeny'))
stdout = e.exception.output
stderr = e.exception.stderr
self.assertFalse(os.path.exists(flagfile),
'Flag file created (service was run) even though should be denied,'
' qrexec-client-vm output: {} {}'.format(stdout, stderr))
def create_testcases_for_templates():
return qubes.tests.create_testcases_for_templates('TC_00_AppVM',
TC_00_AppVMMixin, qubes.tests.SystemTestCase,
module=sys.modules[__name__])
def load_tests(loader, tests, pattern):
tests.addTests(loader.loadTestsFromNames(
create_testcases_for_templates()))
2015-06-21 01:12:47 +02:00
return tests
qubes.tests.maybe_create_testcases_on_import(create_testcases_for_templates)