2013-03-16 02:39:30 +01:00
|
|
|
#!/usr/bin/python2
|
2014-05-18 21:01:21 +02:00
|
|
|
# -*- coding: utf-8 -*-
|
2013-03-16 02:39:30 +01:00
|
|
|
#
|
|
|
|
# The Qubes OS Project, http://www.qubes-os.org
|
|
|
|
#
|
|
|
|
# Copyright (C) 2010 Joanna Rutkowska <joanna@invisiblethingslab.com>
|
|
|
|
# Copyright (C) 2013 Marek Marczykowski <marmarek@invisiblethingslab.com>
|
|
|
|
#
|
|
|
|
# This program is free software; you can redistribute it and/or
|
|
|
|
# modify it under the terms of the GNU General Public License
|
|
|
|
# as published by the Free Software Foundation; either version 2
|
|
|
|
# of the License, or (at your option) any later version.
|
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with this program; if not, write to the Free Software
|
|
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
#
|
|
|
|
#
|
|
|
|
|
|
|
|
import os
|
2013-03-16 20:07:11 +01:00
|
|
|
import os.path
|
2013-12-03 06:18:23 +01:00
|
|
|
import signal
|
2013-03-16 20:07:11 +01:00
|
|
|
import subprocess
|
2013-11-01 02:25:04 +01:00
|
|
|
import stat
|
2013-03-16 20:07:11 +01:00
|
|
|
import sys
|
2013-06-07 05:40:13 +02:00
|
|
|
import re
|
2013-07-30 11:27:46 +02:00
|
|
|
import shutil
|
2013-05-04 04:49:45 +02:00
|
|
|
import stat
|
2013-05-17 04:06:29 +02:00
|
|
|
|
|
|
|
from qubes.qubes import QubesVm,register_qubes_vm_class,vmm,dry_run
|
2013-03-16 02:39:30 +01:00
|
|
|
from qubes.qubes import system_path,defaults
|
2013-05-04 04:49:45 +02:00
|
|
|
from qubes.qubes import QubesException
|
2013-03-16 02:39:30 +01:00
|
|
|
|
2013-05-04 04:49:45 +02:00
|
|
|
system_path["config_template_hvm"] = '/usr/share/qubes/vm-template-hvm.xml'
|
2013-03-16 02:39:30 +01:00
|
|
|
|
|
|
|
defaults["hvm_disk_size"] = 20*1024*1024*1024
|
|
|
|
defaults["hvm_private_img_size"] = 2*1024*1024*1024
|
|
|
|
defaults["hvm_memory"] = 512
|
|
|
|
|
|
|
|
|
|
|
|
class QubesHVm(QubesVm):
|
|
|
|
"""
|
|
|
|
A class that represents an HVM. A child of QubesVm.
|
|
|
|
"""
|
|
|
|
|
|
|
|
# FIXME: logically should inherit after QubesAppVm, but none of its methods
|
|
|
|
# are useful for HVM
|
|
|
|
|
2013-03-16 15:28:18 +01:00
|
|
|
def get_attrs_config(self):
|
|
|
|
attrs = super(QubesHVm, self).get_attrs_config()
|
2013-03-16 02:39:30 +01:00
|
|
|
attrs.pop('kernel')
|
|
|
|
attrs.pop('kernels_dir')
|
|
|
|
attrs.pop('kernelopts')
|
|
|
|
attrs.pop('uses_default_kernel')
|
|
|
|
attrs.pop('uses_default_kernelopts')
|
2014-03-26 04:41:28 +01:00
|
|
|
attrs['dir_path']['func'] = lambda value: value if value is not None \
|
|
|
|
else os.path.join(system_path["qubes_appvms_dir"], self.name)
|
|
|
|
attrs['config_file_template']['func'] = \
|
|
|
|
lambda x: system_path["config_template_hvm"]
|
|
|
|
attrs['drive'] = { 'attr': '_drive',
|
|
|
|
'save': lambda: str(self.drive) }
|
2013-05-18 03:51:30 +02:00
|
|
|
# Remove this two lines when HVM will get qmemman support
|
2013-03-16 02:39:30 +01:00
|
|
|
attrs['maxmem'].pop('save')
|
2013-05-18 03:51:30 +02:00
|
|
|
attrs['maxmem']['func'] = lambda x: self.memory
|
2014-03-26 04:41:28 +01:00
|
|
|
attrs['timezone'] = { 'default': 'localtime',
|
|
|
|
'save': lambda: str(self.timezone) }
|
2013-12-13 22:47:20 +01:00
|
|
|
attrs['qrexec_installed'] = { 'default': False,
|
|
|
|
'attr': '_qrexec_installed',
|
2014-03-26 04:41:28 +01:00
|
|
|
'save': lambda: str(self._qrexec_installed) }
|
2013-12-13 22:47:20 +01:00
|
|
|
attrs['guiagent_installed'] = { 'default' : False,
|
|
|
|
'attr': '_guiagent_installed',
|
2014-03-26 04:41:28 +01:00
|
|
|
'save': lambda: str(self._guiagent_installed) }
|
2014-04-01 01:10:35 +02:00
|
|
|
attrs['seamless_gui_mode'] = { 'default': False,
|
|
|
|
'attr': '_seamless_gui_mode',
|
|
|
|
'save': lambda: str(self._seamless_gui_mode) }
|
2014-03-26 04:41:28 +01:00
|
|
|
attrs['_start_guid_first']['func'] = lambda x: True
|
2013-03-16 02:39:30 +01:00
|
|
|
attrs['services']['default'] = "{'meminfo-writer': False}"
|
|
|
|
|
|
|
|
attrs['memory']['default'] = defaults["hvm_memory"]
|
|
|
|
|
|
|
|
return attrs
|
|
|
|
|
|
|
|
def __init__(self, **kwargs):
|
|
|
|
|
|
|
|
super(QubesHVm, self).__init__(**kwargs)
|
|
|
|
|
|
|
|
# Default for meminfo-writer have changed to (correct) False in the
|
|
|
|
# same version as introduction of guiagent_installed, so for older VMs
|
|
|
|
# with wrong setting, change is based on 'guiagent_installed' presence
|
|
|
|
if "guiagent_installed" not in kwargs and \
|
|
|
|
(not 'xml_element' in kwargs or kwargs['xml_element'].get('guiagent_installed') is None):
|
|
|
|
self.services['meminfo-writer'] = False
|
|
|
|
|
2013-05-18 03:51:30 +02:00
|
|
|
# Disable qemu GUID if the user installed qubes gui agent
|
|
|
|
if self.guiagent_installed:
|
|
|
|
self._start_guid_first = False
|
2013-03-16 02:39:30 +01:00
|
|
|
|
|
|
|
@property
|
|
|
|
def type(self):
|
|
|
|
return "HVM"
|
|
|
|
|
|
|
|
def is_appvm(self):
|
|
|
|
return True
|
|
|
|
|
2013-11-21 03:39:08 +01:00
|
|
|
@classmethod
|
|
|
|
def is_template_compatible(cls, template):
|
2013-11-25 07:14:06 +01:00
|
|
|
if template and (not template.is_template() or template.type != "TemplateHVM"):
|
2013-11-21 03:39:08 +01:00
|
|
|
return False
|
|
|
|
return True
|
2013-11-19 18:42:59 +01:00
|
|
|
|
2013-03-16 02:39:30 +01:00
|
|
|
def get_clone_attrs(self):
|
|
|
|
attrs = super(QubesHVm, self).get_clone_attrs()
|
|
|
|
attrs.remove('kernel')
|
|
|
|
attrs.remove('uses_default_kernel')
|
|
|
|
attrs.remove('kernelopts')
|
|
|
|
attrs.remove('uses_default_kernelopts')
|
|
|
|
attrs += [ 'timezone' ]
|
|
|
|
attrs += [ 'qrexec_installed' ]
|
|
|
|
attrs += [ 'guiagent_installed' ]
|
|
|
|
return attrs
|
|
|
|
|
2013-12-13 22:47:20 +01:00
|
|
|
@property
|
|
|
|
def qrexec_installed(self):
|
|
|
|
return self._qrexec_installed or \
|
|
|
|
bool(self.template and self.template.qrexec_installed)
|
|
|
|
|
|
|
|
@qrexec_installed.setter
|
|
|
|
def qrexec_installed(self, value):
|
|
|
|
if self.template and self.template.qrexec_installed and not value:
|
|
|
|
print >>sys.stderr, "WARNING: When qrexec_installed set in template, it will be propagated to the VM"
|
|
|
|
self._qrexec_installed = value
|
|
|
|
|
|
|
|
@property
|
|
|
|
def guiagent_installed(self):
|
|
|
|
return self._guiagent_installed or \
|
|
|
|
bool(self.template and self.template.guiagent_installed)
|
|
|
|
|
|
|
|
@guiagent_installed.setter
|
|
|
|
def guiagent_installed(self, value):
|
|
|
|
if self.template and self.template.guiagent_installed and not value:
|
|
|
|
print >>sys.stderr, "WARNING: When guiagent_installed set in template, it will be propagated to the VM"
|
|
|
|
self._guiagent_installed = value
|
|
|
|
|
2014-04-01 01:10:35 +02:00
|
|
|
@property
|
|
|
|
def seamless_gui_mode(self):
|
|
|
|
if not self.guiagent_installed:
|
|
|
|
return False
|
|
|
|
return self._seamless_gui_mode
|
|
|
|
|
|
|
|
@seamless_gui_mode.setter
|
|
|
|
def seamless_gui_mode(self, value):
|
|
|
|
if self._seamless_gui_mode == value:
|
|
|
|
return
|
|
|
|
if not self.guiagent_installed and value:
|
|
|
|
raise ValueError("Seamless GUI mode requires GUI agent installed")
|
|
|
|
|
|
|
|
self._seamless_gui_mode = value
|
|
|
|
if self.is_running():
|
|
|
|
self.send_gui_mode()
|
|
|
|
|
2014-02-17 00:55:59 +01:00
|
|
|
@property
|
|
|
|
def drive(self):
|
|
|
|
return self._drive
|
|
|
|
|
|
|
|
@drive.setter
|
|
|
|
def drive(self, value):
|
|
|
|
if value is None:
|
|
|
|
self._drive = None
|
|
|
|
return
|
|
|
|
|
|
|
|
# strip type for a moment
|
|
|
|
drv_type = "cdrom"
|
|
|
|
if value.startswith("hd:") or value.startswith("cdrom:"):
|
|
|
|
(drv_type, unused, value) = value.partition(":")
|
|
|
|
drv_type = drv_type.lower()
|
|
|
|
|
|
|
|
# sanity check
|
2014-03-01 15:17:17 +01:00
|
|
|
if drv_type not in ['hd', 'cdrom']:
|
2014-02-17 00:55:59 +01:00
|
|
|
raise QubesException("Unsupported drive type: %s" % type)
|
|
|
|
|
|
|
|
if value.count(":") == 0:
|
|
|
|
value = "dom0:" + value
|
|
|
|
if value.count(":/") == 0:
|
|
|
|
# FIXME: when Windows backend will be supported, improve this
|
|
|
|
raise QubesException("Drive path must be absolute")
|
|
|
|
|
|
|
|
self._drive = drv_type + ":" + value
|
|
|
|
|
2013-03-16 02:39:30 +01:00
|
|
|
def create_on_disk(self, verbose, source_template = None):
|
|
|
|
if dry_run:
|
|
|
|
return
|
|
|
|
|
|
|
|
# create empty disk
|
2013-07-30 11:33:10 +02:00
|
|
|
self.storage.private_img_size = defaults["hvm_private_img_size"]
|
|
|
|
self.storage.root_img_size = defaults["hvm_disk_size"]
|
|
|
|
self.storage.create_on_disk(verbose, source_template)
|
|
|
|
|
2013-07-30 11:27:46 +02:00
|
|
|
if verbose:
|
|
|
|
print >> sys.stderr, "--> Creating icon symlink: {0} -> {1}".format(self.icon_path, self.label.icon_path)
|
|
|
|
|
|
|
|
try:
|
|
|
|
if hasattr(os, "symlink"):
|
|
|
|
os.symlink (self.label.icon_path, self.icon_path)
|
|
|
|
else:
|
|
|
|
shutil.copy(self.label.icon_path, self.icon_path)
|
|
|
|
except Exception as e:
|
|
|
|
print >> sys.stderr, "WARNING: Failed to set VM icon: %s" % str(e)
|
2013-03-16 02:39:30 +01:00
|
|
|
|
2013-03-16 16:09:31 +01:00
|
|
|
# fire hooks
|
|
|
|
for hook in self.hooks_create_on_disk:
|
|
|
|
hook(self, verbose, source_template=source_template)
|
|
|
|
|
2013-03-16 02:39:30 +01:00
|
|
|
def get_private_img_sz(self):
|
2013-11-19 18:35:10 +01:00
|
|
|
if not os.path.exists(self.private_img):
|
|
|
|
return 0
|
|
|
|
|
|
|
|
return os.path.getsize(self.private_img)
|
2013-03-16 02:39:30 +01:00
|
|
|
|
|
|
|
def resize_private_img(self, size):
|
2013-11-19 18:35:10 +01:00
|
|
|
assert size >= self.get_private_img_sz(), "Cannot shrink private.img"
|
|
|
|
|
|
|
|
if self.is_running():
|
|
|
|
raise NotImplementedError("Online resize of HVM's private.img not implemented, shutdown the VM first")
|
|
|
|
|
|
|
|
f_private = open (self.private_img, "a+b")
|
|
|
|
f_private.truncate (size)
|
|
|
|
f_private.close ()
|
2013-03-16 02:39:30 +01:00
|
|
|
|
2014-03-21 18:43:13 +01:00
|
|
|
def resize_root_img(self, size):
|
|
|
|
if self.template:
|
|
|
|
raise QubesException("Cannot resize root.img of template-based VM"
|
|
|
|
". Resize the root.img of the template "
|
|
|
|
"instead.")
|
|
|
|
|
|
|
|
if self.is_running():
|
|
|
|
raise QubesException("Cannot resize root.img of running HVM")
|
|
|
|
|
|
|
|
if size < self.get_root_img_sz():
|
|
|
|
raise QubesException(
|
|
|
|
"For your own safety shringing of root.img is disabled. If "
|
|
|
|
"you really know what you are doing, use 'truncate' manually.")
|
|
|
|
|
|
|
|
f_root = open (self.root_img, "a+b")
|
|
|
|
f_root.truncate (size)
|
|
|
|
f_root.close ()
|
|
|
|
|
2013-11-19 18:42:59 +01:00
|
|
|
def get_rootdev(self, source_template=None):
|
|
|
|
if self.template:
|
|
|
|
return "'script:snapshot:{template_root}:{volatile},xvda,w',".format(
|
|
|
|
template_root=self.template.root_img,
|
|
|
|
volatile=self.volatile_img)
|
|
|
|
else:
|
|
|
|
return "'script:file:{root_img},xvda,w',".format(root_img=self.root_img)
|
|
|
|
|
2013-05-22 05:43:26 +02:00
|
|
|
def get_config_params(self):
|
2013-03-16 02:39:30 +01:00
|
|
|
|
2013-05-22 05:43:26 +02:00
|
|
|
params = super(QubesHVm, self).get_config_params()
|
2013-03-16 02:39:30 +01:00
|
|
|
|
2013-07-30 11:33:10 +02:00
|
|
|
self.storage.drive = self.drive
|
|
|
|
params.update(self.storage.get_config_params())
|
2013-03-16 02:39:30 +01:00
|
|
|
params['volatiledev'] = ''
|
|
|
|
|
|
|
|
if self.timezone.lower() == 'localtime':
|
2013-05-04 04:49:45 +02:00
|
|
|
params['time_basis'] = 'localtime'
|
2013-03-16 02:39:30 +01:00
|
|
|
params['timeoffset'] = '0'
|
|
|
|
elif self.timezone.isdigit():
|
2013-05-04 04:49:45 +02:00
|
|
|
params['time_basis'] = 'UTC'
|
2013-03-16 02:39:30 +01:00
|
|
|
params['timeoffset'] = self.timezone
|
|
|
|
else:
|
|
|
|
print >>sys.stderr, "WARNING: invalid 'timezone' value: %s" % self.timezone
|
2013-05-04 04:49:45 +02:00
|
|
|
params['time_basis'] = 'UTC'
|
2013-03-16 02:39:30 +01:00
|
|
|
params['timeoffset'] = '0'
|
|
|
|
return params
|
|
|
|
|
|
|
|
def verify_files(self):
|
|
|
|
if dry_run:
|
|
|
|
return
|
|
|
|
|
2013-07-30 11:33:10 +02:00
|
|
|
self.storage.verify_files()
|
2013-03-16 02:39:30 +01:00
|
|
|
if not os.path.exists (self.private_img):
|
|
|
|
print >>sys.stderr, "WARNING: Creating empty VM private image file: {0}".\
|
|
|
|
format(self.private_img)
|
2013-07-30 11:33:10 +02:00
|
|
|
self.storage.create_on_disk_private_img(verbose=False)
|
2013-03-16 02:39:30 +01:00
|
|
|
|
2013-03-16 16:09:31 +01:00
|
|
|
# fire hooks
|
|
|
|
for hook in self.hooks_verify_files:
|
|
|
|
hook(self)
|
|
|
|
|
2013-03-16 02:39:30 +01:00
|
|
|
return True
|
|
|
|
|
|
|
|
def reset_volatile_storage(self, **kwargs):
|
2013-11-19 18:42:59 +01:00
|
|
|
assert not self.is_running(), "Attempt to clean volatile image of running VM!"
|
|
|
|
|
|
|
|
source_template = kwargs.get("source_template", self.template)
|
|
|
|
|
|
|
|
if source_template is None:
|
|
|
|
# Nothing to do on non-template based VM
|
|
|
|
return
|
|
|
|
|
|
|
|
if os.path.exists (self.volatile_img):
|
2013-11-21 04:36:53 +01:00
|
|
|
if self.debug:
|
|
|
|
if os.path.getmtime(self.template.root_img) > os.path.getmtime(self.volatile_img):
|
|
|
|
if kwargs.get("verbose", False):
|
|
|
|
print >>sys.stderr, "--> WARNING: template have changed, resetting root.img"
|
|
|
|
else:
|
|
|
|
if kwargs.get("verbose", False):
|
|
|
|
print >>sys.stderr, "--> Debug mode: not resetting root.img"
|
|
|
|
print >>sys.stderr, "--> Debug mode: if you want to force root.img reset, either update template VM, or remove volatile.img file"
|
|
|
|
return
|
|
|
|
os.remove (self.volatile_img)
|
2013-11-19 18:42:59 +01:00
|
|
|
|
|
|
|
f_volatile = open (self.volatile_img, "w")
|
|
|
|
f_root = open (self.template.root_img, "r")
|
|
|
|
f_root.seek(0, os.SEEK_END)
|
|
|
|
f_volatile.truncate (f_root.tell()) # make empty sparse file of the same size as root.img
|
|
|
|
f_volatile.close ()
|
|
|
|
f_root.close()
|
2013-03-16 02:39:30 +01:00
|
|
|
|
|
|
|
@property
|
|
|
|
def vif(self):
|
|
|
|
if self.xid < 0:
|
|
|
|
return None
|
|
|
|
if self.netvm is None:
|
|
|
|
return None
|
|
|
|
return "vif{0}.+".format(self.stubdom_xid)
|
|
|
|
|
2013-11-21 14:49:42 +01:00
|
|
|
@property
|
|
|
|
def mac(self):
|
|
|
|
if self._mac is not None:
|
|
|
|
return self._mac
|
|
|
|
elif self.template is not None:
|
|
|
|
return self.template.mac
|
|
|
|
else:
|
|
|
|
return "00:16:3E:5E:6C:{qid:02X}".format(qid=self.qid)
|
|
|
|
|
|
|
|
@mac.setter
|
|
|
|
def mac(self, value):
|
|
|
|
self._mac = value
|
|
|
|
|
2013-03-16 02:39:30 +01:00
|
|
|
def run(self, command, **kwargs):
|
|
|
|
if self.qrexec_installed:
|
|
|
|
if 'gui' in kwargs and kwargs['gui']==False:
|
|
|
|
command = "nogui:" + command
|
|
|
|
return super(QubesHVm, self).run(command, **kwargs)
|
|
|
|
else:
|
|
|
|
raise QubesException("Needs qrexec agent installed in VM to use this function. See also qvm-prefs.")
|
|
|
|
|
|
|
|
@property
|
|
|
|
def stubdom_xid(self):
|
|
|
|
if self.xid < 0:
|
|
|
|
return -1
|
|
|
|
|
2013-05-17 04:06:29 +02:00
|
|
|
stubdom_xid_str = vmm.xs.read('', '/local/domain/%d/image/device-model-domid' % self.xid)
|
2013-03-16 02:39:30 +01:00
|
|
|
if stubdom_xid_str is not None:
|
|
|
|
return int(stubdom_xid_str)
|
|
|
|
else:
|
|
|
|
return -1
|
|
|
|
|
2013-11-09 23:48:49 +01:00
|
|
|
def start(self, *args, **kwargs):
|
2013-11-19 18:42:59 +01:00
|
|
|
if self.template and self.template.is_running():
|
|
|
|
raise QubesException("Cannot start the HVM while its template is running")
|
2013-11-09 23:48:49 +01:00
|
|
|
try:
|
2014-09-16 01:18:55 +02:00
|
|
|
if 'mem_required' not in kwargs:
|
|
|
|
# Reserve 32MB for stubdomain
|
|
|
|
kwargs['mem_required'] = (self.memory + 32) * 1024 * 1024
|
2013-12-17 23:59:05 +01:00
|
|
|
return super(QubesHVm, self).start(*args, **kwargs)
|
2013-11-09 23:48:49 +01:00
|
|
|
except QubesException as e:
|
|
|
|
if xc.physinfo()['virt_caps'].count('hvm') == 0:
|
|
|
|
raise QubesException("Cannot start HVM without VT-x/AMD-v enabled")
|
|
|
|
else:
|
|
|
|
raise
|
|
|
|
|
2013-12-03 06:18:23 +01:00
|
|
|
def start_stubdom_guid(self):
|
|
|
|
cmdline = [system_path["qubes_guid_path"],
|
|
|
|
"-d", str(self.stubdom_xid),
|
2013-05-04 04:49:45 +02:00
|
|
|
"-t", str(self.xid),
|
2013-05-04 05:19:48 +02:00
|
|
|
"-N", self.name,
|
2013-12-03 06:18:23 +01:00
|
|
|
"-c", self.label.color,
|
|
|
|
"-i", self.label.icon_path,
|
|
|
|
"-l", str(self.label.index)]
|
|
|
|
retcode = subprocess.call (cmdline)
|
|
|
|
if (retcode != 0) :
|
|
|
|
raise QubesException("Cannot start qubes-guid!")
|
|
|
|
|
|
|
|
def start_guid(self, verbose = True, notify_function = None,
|
|
|
|
before_qrexec=False, **kwargs):
|
2013-03-16 02:39:30 +01:00
|
|
|
# If user force the guiagent, start_guid will mimic a standard QubesVM
|
2013-12-09 19:10:25 +01:00
|
|
|
if not before_qrexec and self.guiagent_installed:
|
2013-12-02 03:30:26 +01:00
|
|
|
super(QubesHVm, self).start_guid(verbose, notify_function, extra_guid_args=["-Q"], **kwargs)
|
2013-12-03 06:18:23 +01:00
|
|
|
stubdom_guid_pidfile = '/var/run/qubes/guid-running.%d' % self.stubdom_xid
|
2014-04-16 12:54:24 +02:00
|
|
|
if os.path.exists(stubdom_guid_pidfile) and not self.debug:
|
2013-12-03 06:18:23 +01:00
|
|
|
try:
|
|
|
|
stubdom_guid_pid = int(open(stubdom_guid_pidfile, 'r').read())
|
|
|
|
os.kill(stubdom_guid_pid, signal.SIGTERM)
|
|
|
|
except Exception as ex:
|
|
|
|
print >> sys.stderr, "WARNING: Failed to kill stubdom gui daemon: %s" % str(ex)
|
2013-12-09 19:10:25 +01:00
|
|
|
elif before_qrexec and (not self.guiagent_installed or self.debug):
|
2013-03-16 02:39:30 +01:00
|
|
|
if verbose:
|
2013-12-03 06:18:23 +01:00
|
|
|
print >> sys.stderr, "--> Starting Qubes GUId (full screen)..."
|
|
|
|
self.start_stubdom_guid()
|
2013-03-16 02:39:30 +01:00
|
|
|
|
|
|
|
def start_qrexec_daemon(self, **kwargs):
|
2013-10-28 05:08:28 +01:00
|
|
|
if not self.qrexec_installed:
|
|
|
|
if kwargs.get('verbose', False):
|
|
|
|
print >> sys.stderr, "--> Starting the qrexec daemon..."
|
|
|
|
xid = self.get_xid()
|
2014-04-01 01:07:57 +02:00
|
|
|
qrexec_env = os.environ.copy()
|
2013-10-28 05:08:28 +01:00
|
|
|
qrexec_env['QREXEC_STARTUP_NOWAIT'] = '1'
|
|
|
|
retcode = subprocess.call ([system_path["qrexec_daemon_path"], str(xid), self.name, self.default_user], env=qrexec_env)
|
|
|
|
if (retcode != 0) :
|
|
|
|
self.force_shutdown(xid=xid)
|
|
|
|
raise OSError ("ERROR: Cannot execute qrexec-daemon!")
|
|
|
|
else:
|
2013-03-16 02:39:30 +01:00
|
|
|
super(QubesHVm, self).start_qrexec_daemon(**kwargs)
|
|
|
|
|
|
|
|
if self._start_guid_first:
|
|
|
|
if kwargs.get('verbose'):
|
|
|
|
print >> sys.stderr, "--> Waiting for user '%s' login..." % self.default_user
|
|
|
|
|
|
|
|
self.wait_for_session(notify_function=kwargs.get('notify_function', None))
|
2014-04-01 01:10:35 +02:00
|
|
|
self.send_gui_mode()
|
|
|
|
|
|
|
|
def send_gui_mode(self):
|
|
|
|
if self.seamless_gui_mode:
|
|
|
|
service_input = "SEAMLESS"
|
|
|
|
else:
|
|
|
|
service_input = "FULLSCREEN"
|
|
|
|
|
|
|
|
self.run_service("qubes.SetGuiMode", input=service_input)
|
2013-03-16 02:39:30 +01:00
|
|
|
|
2013-10-28 05:09:54 +01:00
|
|
|
def create_xenstore_entries(self, xid = None):
|
|
|
|
if dry_run:
|
|
|
|
return
|
|
|
|
|
|
|
|
super(QubesHVm, self).create_xenstore_entries(xid)
|
|
|
|
|
|
|
|
if xid is None:
|
|
|
|
xid = self.xid
|
|
|
|
|
|
|
|
domain_path = xs.get_domain_path(xid)
|
|
|
|
|
|
|
|
# Prepare xenstore directory for tools advertise
|
|
|
|
xs.write('',
|
|
|
|
"{0}/qubes-tools".format(domain_path),
|
|
|
|
'')
|
|
|
|
|
|
|
|
# Allow VM writes there
|
|
|
|
xs.set_permissions('', '{0}/qubes-tools'.format(domain_path),
|
|
|
|
[{ 'dom': xid }])
|
|
|
|
|
2014-05-10 21:23:04 +02:00
|
|
|
def _cleanup_zombie_domains(self):
|
|
|
|
super(QubesHVm, self)._cleanup_zombie_domains()
|
|
|
|
if not self.is_running():
|
|
|
|
xc_stubdom = self.get_xc_dominfo(name=self.name+'-dm')
|
|
|
|
if xc_stubdom is not None:
|
|
|
|
if xc_stubdom['paused'] == 1:
|
|
|
|
subprocess.call(['xl', 'destroy', str(xc_stubdom['domid'])])
|
|
|
|
if xc_stubdom['dying'] == 1:
|
|
|
|
# GUID still running?
|
|
|
|
guid_pidfile = \
|
|
|
|
'/var/run/qubes/guid-running.%d' % xc_stubdom['domid']
|
|
|
|
if os.path.exists(guid_pidfile):
|
|
|
|
guid_pid = open(guid_pidfile).read().strip()
|
|
|
|
os.kill(int(guid_pid), 15)
|
|
|
|
|
|
|
|
|
2013-10-23 21:56:50 +02:00
|
|
|
def suspend(self):
|
|
|
|
if dry_run:
|
|
|
|
return
|
|
|
|
|
|
|
|
if not self.is_running() and not self.is_paused():
|
|
|
|
raise QubesException ("VM not running!")
|
|
|
|
|
|
|
|
self.pause()
|
|
|
|
|
2013-03-16 02:39:30 +01:00
|
|
|
def is_guid_running(self):
|
|
|
|
# If user force the guiagent, is_guid_running will mimic a standard QubesVM
|
|
|
|
if self.guiagent_installed:
|
|
|
|
return super(QubesHVm, self).is_guid_running()
|
|
|
|
else:
|
|
|
|
xid = self.stubdom_xid
|
|
|
|
if xid < 0:
|
|
|
|
return False
|
|
|
|
if not os.path.exists('/var/run/qubes/guid-running.%d' % xid):
|
|
|
|
return False
|
|
|
|
return True
|
|
|
|
|
2014-03-01 15:17:41 +01:00
|
|
|
def is_fully_usable(self):
|
|
|
|
# Running gui-daemon implies also VM running
|
|
|
|
if not self.is_guid_running():
|
|
|
|
return False
|
|
|
|
if self.qrexec_installed and not self.is_qrexec_running():
|
|
|
|
return False
|
|
|
|
return True
|
2013-03-16 02:39:30 +01:00
|
|
|
|
|
|
|
register_qubes_vm_class(QubesHVm)
|