qubes.py 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730
  1. #!/usr/bin/python2
  2. #
  3. # The Qubes OS Project, http://www.qubes-os.org
  4. #
  5. # Copyright (C) 2010 Joanna Rutkowska <joanna@invisiblethingslab.com>
  6. #
  7. # This program is free software; you can redistribute it and/or
  8. # modify it under the terms of the GNU General Public License
  9. # as published by the Free Software Foundation; either version 2
  10. # of the License, or (at your option) any later version.
  11. #
  12. # This program is distributed in the hope that it will be useful,
  13. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. # GNU General Public License for more details.
  16. #
  17. # You should have received a copy of the GNU General Public License
  18. # along with this program; if not, write to the Free Software
  19. # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  20. #
  21. #
  22. import sys
  23. import os
  24. import os.path
  25. import lxml.etree
  26. import xml.parsers.expat
  27. import fcntl
  28. import time
  29. import warnings
  30. # Do not use XenAPI or create/read any VM files
  31. # This is for testing only!
  32. dry_run = False
  33. #dry_run = True
  34. if not dry_run:
  35. import xen.lowlevel.xc
  36. import xen.lowlevel.xl
  37. import xen.lowlevel.xs
  38. qubes_base_dir = "/var/lib/qubes"
  39. system_path = {
  40. 'qubes_guid_path': '/usr/bin/qubes-guid',
  41. 'qrexec_daemon_path': '/usr/lib/qubes/qrexec-daemon',
  42. 'qrexec_client_path': '/usr/lib/qubes/qrexec-client',
  43. 'qubes_base_dir': qubes_base_dir,
  44. 'qubes_appvms_dir': qubes_base_dir + '/appvms',
  45. 'qubes_templates_dir': qubes_base_dir + '/vm-templates',
  46. 'qubes_servicevms_dir': qubes_base_dir + '/servicevms',
  47. 'qubes_store_filename': qubes_base_dir + '/qubes.xml',
  48. 'qubes_kernels_base_dir': qubes_base_dir + '/vm-kernels',
  49. 'qubes_icon_dir': '/usr/share/qubes/icons',
  50. 'config_template_pv': '/usr/share/qubes/vm-template.conf',
  51. 'qubes_pciback_cmd': '/usr/lib/qubes/unbind-pci-device.sh',
  52. 'prepare_volatile_img_cmd': '/usr/lib/qubes/prepare-volatile-img.sh',
  53. 'monitor_layout_notify_cmd': '/usr/bin/qubes-monitor-layout-notify',
  54. }
  55. vm_files = {
  56. 'root_img': 'root.img',
  57. 'rootcow_img': 'root-cow.img',
  58. 'volatile_img': 'volatile.img',
  59. 'clean_volatile_img': 'clean-volatile.img.tar',
  60. 'private_img': 'private.img',
  61. 'kernels_subdir': 'kernels',
  62. 'firewall_conf': 'firewall.xml',
  63. 'whitelisted_appmenus': 'whitelisted-appmenus.list',
  64. 'updates_stat_file': 'updates.stat',
  65. }
  66. defaults = {
  67. 'memory': 400,
  68. 'kernelopts': "",
  69. 'kernelopts_pcidevs': "iommu=soft swiotlb=4096",
  70. 'dom0_update_check_interval': 6*3600,
  71. # how long (in sec) to wait for VMs to shutdown,
  72. # before killing them (when used qvm-run with --wait option),
  73. 'shutdown_counter_max': 60,
  74. 'vm_default_netmask': "255.255.255.0",
  75. # Set later
  76. 'appvm_label': None,
  77. 'template_label': None,
  78. 'servicevm_label': None,
  79. }
  80. qubes_max_qid = 254
  81. qubes_max_netid = 254
  82. class QubesException (Exception):
  83. pass
  84. if not dry_run:
  85. xc = xen.lowlevel.xc.xc()
  86. xs = xen.lowlevel.xs.xs()
  87. xl_ctx = xen.lowlevel.xl.ctx()
  88. class QubesHost(object):
  89. def __init__(self):
  90. self.physinfo = xc.physinfo()
  91. self.xen_total_mem = long(self.physinfo['total_memory'])
  92. self.xen_no_cpus = self.physinfo['nr_cpus']
  93. # print "QubesHost: total_mem = {0}B".format (self.xen_total_mem)
  94. # print "QubesHost: free_mem = {0}".format (self.get_free_xen_memory())
  95. # print "QubesHost: total_cpus = {0}".format (self.xen_no_cpus)
  96. @property
  97. def memory_total(self):
  98. return self.xen_total_mem
  99. @property
  100. def no_cpus(self):
  101. return self.xen_no_cpus
  102. def get_free_xen_memory(self):
  103. ret = self.physinfo['free_memory']
  104. return long(ret)
  105. def measure_cpu_usage(self, previous=None, previous_time = None,
  106. wait_time=1):
  107. """measure cpu usage for all domains at once"""
  108. if previous is None:
  109. previous_time = time.time()
  110. previous = {}
  111. info = xc.domain_getinfo(0, qubes_max_qid)
  112. for vm in info:
  113. previous[vm['domid']] = {}
  114. previous[vm['domid']]['cpu_time'] = (
  115. vm['cpu_time'] / vm['online_vcpus'])
  116. previous[vm['domid']]['cpu_usage'] = 0
  117. time.sleep(wait_time)
  118. current_time = time.time()
  119. current = {}
  120. info = xc.domain_getinfo(0, qubes_max_qid)
  121. for vm in info:
  122. current[vm['domid']] = {}
  123. current[vm['domid']]['cpu_time'] = (
  124. vm['cpu_time'] / max(vm['online_vcpus'], 1))
  125. if vm['domid'] in previous.keys():
  126. current[vm['domid']]['cpu_usage'] = (
  127. float(current[vm['domid']]['cpu_time'] -
  128. previous[vm['domid']]['cpu_time']) /
  129. long(1000**3) / (current_time-previous_time) * 100)
  130. if current[vm['domid']]['cpu_usage'] < 0:
  131. # VM has been rebooted
  132. current[vm['domid']]['cpu_usage'] = 0
  133. else:
  134. current[vm['domid']]['cpu_usage'] = 0
  135. return (current_time, current)
  136. class QubesVmLabel(object):
  137. def __init__(self, name, index, color = None, icon = None):
  138. self.name = name
  139. self.index = index
  140. self.color = color if color is not None else name
  141. self.icon = icon if icon is not None else name
  142. self.icon_path = os.path.join(
  143. system_path['qubes_icon_dir'], self.icon) + ".png"
  144. # Globally defined lables
  145. QubesVmLabels = {
  146. "red" : QubesVmLabel ("red", 1),
  147. "orange" : QubesVmLabel ("orange", 2),
  148. "yellow" : QubesVmLabel ("yellow", 3),
  149. "green" : QubesVmLabel ("green", 4, color="0x5fa05e"),
  150. "gray" : QubesVmLabel ("gray", 5),
  151. "blue" : QubesVmLabel ("blue", 6),
  152. "purple" : QubesVmLabel ("purple", 7, color="0xb83374"),
  153. "black" : QubesVmLabel ("black", 8),
  154. }
  155. QubesDispVmLabels = {
  156. "red" : QubesVmLabel ("red", 1, icon="dispvm-red"),
  157. "orange" : QubesVmLabel ("orange", 2, icon="dispvm-orange"),
  158. "yellow" : QubesVmLabel ("yellow", 3, icon="dispvm-yellow"),
  159. "green" : QubesVmLabel ("green", 4, color="0x5fa05e", icon="dispvm-green"),
  160. "gray" : QubesVmLabel ("gray", 5, icon="dispvm-gray"),
  161. "blue" : QubesVmLabel ("blue", 6, icon="dispvm-blue"),
  162. "purple" : QubesVmLabel ("purple", 7, color="0xb83374", icon="dispvm-purple"),
  163. "black" : QubesVmLabel ("black", 8, icon="dispvm-black"),
  164. }
  165. defaults["appvm_label"] = QubesVmLabels["red"]
  166. defaults["template_label"] = QubesVmLabels["black"]
  167. defaults["servicevm_label"] = QubesVmLabels["red"]
  168. QubesVmClasses = {}
  169. def register_qubes_vm_class(vm_class):
  170. QubesVmClasses[vm_class.__name__] = vm_class
  171. # register class as local for this module - to make it easy to import from
  172. # other modules
  173. setattr(sys.modules[__name__], vm_class.__name__, vm_class)
  174. class QubesVmCollection(dict):
  175. """
  176. A collection of Qubes VMs indexed by Qubes id (qid)
  177. """
  178. def __init__(self, store_filename=system_path["qubes_store_filename"]):
  179. super(QubesVmCollection, self).__init__()
  180. self.default_netvm_qid = None
  181. self.default_fw_netvm_qid = None
  182. self.default_template_qid = None
  183. self.default_kernel = None
  184. self.updatevm_qid = None
  185. self.qubes_store_filename = store_filename
  186. self.clockvm_qid = None
  187. self.qubes_store_file = None
  188. def values(self):
  189. for qid in self.keys():
  190. yield self[qid]
  191. def items(self):
  192. for qid in self.keys():
  193. yield (qid, self[qid])
  194. def __iter__(self):
  195. for qid in sorted(super(QubesVmCollection, self).keys()):
  196. yield qid
  197. keys = __iter__
  198. def __setitem__(self, key, value):
  199. if key not in self:
  200. return super(QubesVmCollection, self).__setitem__(key, value)
  201. else:
  202. assert False, "Attempt to add VM with qid that already exists in the collection!"
  203. def add_new_vm(self, vm_type, **kwargs):
  204. if vm_type not in QubesVmClasses.keys():
  205. raise ValueError("Unknown VM type: %s" % vm_type)
  206. qid = self.get_new_unused_qid()
  207. vm = QubesVmClasses[vm_type](qid=qid, collection=self, **kwargs)
  208. if not self.verify_new_vm(vm):
  209. raise QubesException("Wrong VM description!")
  210. self[vm.qid] = vm
  211. # make first created NetVM the default one
  212. if self.default_fw_netvm_qid is None and vm.is_netvm():
  213. self.set_default_fw_netvm(vm)
  214. if self.default_netvm_qid is None and vm.is_proxyvm():
  215. self.set_default_netvm(vm)
  216. # make first created TemplateVM the default one
  217. if self.default_template_qid is None and vm.is_template():
  218. self.set_default_template(vm)
  219. # make first created ProxyVM the UpdateVM
  220. if self.updatevm_qid is None and vm.is_proxyvm():
  221. self.set_updatevm_vm(vm)
  222. # by default ClockVM is the first NetVM
  223. if self.clockvm_qid is None and vm.is_netvm():
  224. self.set_clockvm_vm(vm)
  225. return vm
  226. def add_new_appvm(self, name, template,
  227. dir_path = None, conf_file = None,
  228. private_img = None,
  229. label = None):
  230. warnings.warn("Call to deprecated function, use add_new_vm instead",
  231. DeprecationWarning, stacklevel=2)
  232. return self.add_new_vm("QubesAppVm", name=name, template=template,
  233. dir_path=dir_path, conf_file=conf_file,
  234. private_img=private_img,
  235. netvm = self.get_default_netvm(),
  236. kernel = self.get_default_kernel(),
  237. uses_default_kernel = True,
  238. label=label)
  239. def add_new_hvm(self, name, label = None):
  240. warnings.warn("Call to deprecated function, use add_new_vm instead",
  241. DeprecationWarning, stacklevel=2)
  242. return self.add_new_vm("QubesHVm", name=name, label=label)
  243. def add_new_disposablevm(self, name, template, dispid,
  244. label = None, netvm = None):
  245. warnings.warn("Call to deprecated function, use add_new_vm instead",
  246. DeprecationWarning, stacklevel=2)
  247. return self.add_new_vm("QubesDisposableVm", name=name, template=template,
  248. netvm = netvm,
  249. label=label, dispid=dispid)
  250. def add_new_templatevm(self, name,
  251. dir_path = None, conf_file = None,
  252. root_img = None, private_img = None,
  253. installed_by_rpm = True):
  254. warnings.warn("Call to deprecated function, use add_new_vm instead",
  255. DeprecationWarning, stacklevel=2)
  256. return self.add_new_vm("QubesTemplateVm", name=name,
  257. dir_path=dir_path, conf_file=conf_file,
  258. root_img=root_img, private_img=private_img,
  259. installed_by_rpm=installed_by_rpm,
  260. netvm = self.get_default_netvm(),
  261. kernel = self.get_default_kernel(),
  262. uses_default_kernel = True)
  263. def add_new_netvm(self, name, template,
  264. dir_path = None, conf_file = None,
  265. private_img = None, installed_by_rpm = False,
  266. label = None):
  267. warnings.warn("Call to deprecated function, use add_new_vm instead",
  268. DeprecationWarning, stacklevel=2)
  269. return self.add_new_vm("QubesNetVm", name=name, template=template,
  270. label=label,
  271. private_img=private_img, installed_by_rpm=installed_by_rpm,
  272. uses_default_kernel = True,
  273. dir_path=dir_path, conf_file=conf_file)
  274. def add_new_proxyvm(self, name, template,
  275. dir_path = None, conf_file = None,
  276. private_img = None, installed_by_rpm = False,
  277. label = None):
  278. warnings.warn("Call to deprecated function, use add_new_vm instead",
  279. DeprecationWarning, stacklevel=2)
  280. return self.add_new_vm("QubesProxyVm", name=name, template=template,
  281. label=label,
  282. private_img=private_img, installed_by_rpm=installed_by_rpm,
  283. dir_path=dir_path, conf_file=conf_file,
  284. uses_default_kernel = True,
  285. netvm = self.get_default_fw_netvm())
  286. def set_default_template(self, vm):
  287. assert vm.is_template(), "VM {0} is not a TemplateVM!".format(vm.name)
  288. self.default_template_qid = vm.qid
  289. def get_default_template(self):
  290. if self.default_template_qid is None:
  291. return None
  292. else:
  293. return self[self.default_template_qid]
  294. def set_default_netvm(self, vm):
  295. assert vm.is_netvm(), "VM {0} does not provide network!".format(vm.name)
  296. self.default_netvm_qid = vm.qid
  297. def get_default_netvm(self):
  298. if self.default_netvm_qid is None:
  299. return None
  300. else:
  301. return self[self.default_netvm_qid]
  302. def set_default_kernel(self, kernel):
  303. assert os.path.exists(
  304. os.path.join(system_path["qubes_kernels_base_dir"], kernel)), \
  305. "Kerel {0} not installed!".format(kernel)
  306. self.default_kernel = kernel
  307. def get_default_kernel(self):
  308. return self.default_kernel
  309. def set_default_fw_netvm(self, vm):
  310. assert vm.is_netvm(), "VM {0} does not provide network!".format(vm.name)
  311. self.default_fw_netvm_qid = vm.qid
  312. def get_default_fw_netvm(self):
  313. if self.default_fw_netvm_qid is None:
  314. return None
  315. else:
  316. return self[self.default_fw_netvm_qid]
  317. def set_updatevm_vm(self, vm):
  318. self.updatevm_qid = vm.qid
  319. def get_updatevm_vm(self):
  320. if self.updatevm_qid is None:
  321. return None
  322. else:
  323. return self[self.updatevm_qid]
  324. def set_clockvm_vm(self, vm):
  325. self.clockvm_qid = vm.qid
  326. def get_clockvm_vm(self):
  327. if self.clockvm_qid is None:
  328. return None
  329. else:
  330. return self[self.clockvm_qid]
  331. def get_vm_by_name(self, name):
  332. for vm in self.values():
  333. if (vm.name == name):
  334. return vm
  335. return None
  336. def get_qid_by_name(self, name):
  337. vm = self.get_vm_by_name(name)
  338. return vm.qid if vm is not None else None
  339. def get_vms_based_on(self, template_qid):
  340. vms = set([vm for vm in self.values()
  341. if (vm.template and vm.template.qid == template_qid)])
  342. return vms
  343. def get_vms_connected_to(self, netvm_qid):
  344. new_vms = [ netvm_qid ]
  345. dependend_vms_qid = []
  346. # Dependency resolving only makes sense on NetVM (or derivative)
  347. if not self[netvm_qid].is_netvm():
  348. return set([])
  349. while len(new_vms) > 0:
  350. cur_vm = new_vms.pop()
  351. for vm in self[cur_vm].connected_vms.values():
  352. if vm.qid not in dependend_vms_qid:
  353. dependend_vms_qid.append(vm.qid)
  354. if vm.is_netvm():
  355. new_vms.append(vm.qid)
  356. vms = [vm for vm in self.values() if vm.qid in dependend_vms_qid]
  357. return vms
  358. def verify_new_vm(self, new_vm):
  359. # Verify that qid is unique
  360. for vm in self.values():
  361. if vm.qid == new_vm.qid:
  362. print >> sys.stderr, "ERROR: The qid={0} is already used by VM '{1}'!".\
  363. format(vm.qid, vm.name)
  364. return False
  365. # Verify that name is unique
  366. for vm in self.values():
  367. if vm.name == new_vm.name:
  368. print >> sys.stderr, \
  369. "ERROR: The name={0} is already used by other VM with qid='{1}'!".\
  370. format(vm.name, vm.qid)
  371. return False
  372. return True
  373. def get_new_unused_qid(self):
  374. used_ids = set([vm.qid for vm in self.values()])
  375. for id in range (1, qubes_max_qid):
  376. if id not in used_ids:
  377. return id
  378. raise LookupError ("Cannot find unused qid!")
  379. def get_new_unused_netid(self):
  380. used_ids = set([vm.netid for vm in self.values() if vm.is_netvm()])
  381. for id in range (1, qubes_max_netid):
  382. if id not in used_ids:
  383. return id
  384. raise LookupError ("Cannot find unused netid!")
  385. def check_if_storage_exists(self):
  386. try:
  387. f = open (self.qubes_store_filename, 'r')
  388. except IOError:
  389. return False
  390. f.close()
  391. return True
  392. def create_empty_storage(self):
  393. self.qubes_store_file = open (self.qubes_store_filename, 'w')
  394. self.clear()
  395. self.save()
  396. def lock_db_for_reading(self):
  397. self.qubes_store_file = open (self.qubes_store_filename, 'r')
  398. fcntl.lockf (self.qubes_store_file, fcntl.LOCK_SH)
  399. def lock_db_for_writing(self):
  400. self.qubes_store_file = open (self.qubes_store_filename, 'r+')
  401. fcntl.lockf (self.qubes_store_file, fcntl.LOCK_EX)
  402. def unlock_db(self):
  403. # intentionally do not call explicit unlock to not unlock the file
  404. # before all buffers are flushed
  405. self.qubes_store_file.close()
  406. def save(self):
  407. root = lxml.etree.Element(
  408. "QubesVmCollection",
  409. default_template=str(self.default_template_qid) \
  410. if self.default_template_qid is not None else "None",
  411. default_netvm=str(self.default_netvm_qid) \
  412. if self.default_netvm_qid is not None else "None",
  413. default_fw_netvm=str(self.default_fw_netvm_qid) \
  414. if self.default_fw_netvm_qid is not None else "None",
  415. updatevm=str(self.updatevm_qid) \
  416. if self.updatevm_qid is not None else "None",
  417. clockvm=str(self.clockvm_qid) \
  418. if self.clockvm_qid is not None else "None",
  419. default_kernel=str(self.default_kernel) \
  420. if self.default_kernel is not None else "None",
  421. )
  422. for vm in self.values():
  423. element = vm.create_xml_element()
  424. if element is not None:
  425. root.append(element)
  426. tree = lxml.etree.ElementTree(root)
  427. try:
  428. # We need to manually truncate the file, as we open the
  429. # file as "r+" in the lock_db_for_writing() function
  430. self.qubes_store_file.seek (0, os.SEEK_SET)
  431. self.qubes_store_file.truncate()
  432. tree.write(self.qubes_store_file, encoding="UTF-8", pretty_print=True)
  433. except EnvironmentError as err:
  434. print("{0}: export error: {1}".format(
  435. os.path.basename(sys.argv[0]), err))
  436. return False
  437. return True
  438. def set_netvm_dependency(self, element):
  439. kwargs = {}
  440. attr_list = ("qid", "uses_default_netvm", "netvm_qid")
  441. for attribute in attr_list:
  442. kwargs[attribute] = element.get(attribute)
  443. vm = self[int(kwargs["qid"])]
  444. if "uses_default_netvm" not in kwargs:
  445. vm.uses_default_netvm = True
  446. else:
  447. vm.uses_default_netvm = (
  448. True if kwargs["uses_default_netvm"] == "True" else False)
  449. if vm.uses_default_netvm is True:
  450. if vm.is_proxyvm():
  451. netvm = self.get_default_fw_netvm()
  452. else:
  453. netvm = self.get_default_netvm()
  454. kwargs.pop("netvm_qid")
  455. else:
  456. if kwargs["netvm_qid"] == "none" or kwargs["netvm_qid"] is None:
  457. netvm = None
  458. kwargs.pop("netvm_qid")
  459. else:
  460. netvm_qid = int(kwargs.pop("netvm_qid"))
  461. if netvm_qid not in self:
  462. netvm = None
  463. else:
  464. netvm = self[netvm_qid]
  465. # directly set internal attr to not call setters...
  466. vm._netvm = netvm
  467. if netvm:
  468. netvm.connected_vms[vm.qid] = vm
  469. def load_globals(self, element):
  470. default_template = element.get("default_template")
  471. self.default_template_qid = int(default_template) \
  472. if default_template.lower() != "none" else None
  473. default_netvm = element.get("default_netvm")
  474. if default_netvm is not None:
  475. self.default_netvm_qid = int(default_netvm) \
  476. if default_netvm != "None" else None
  477. #assert self.default_netvm_qid is not None
  478. default_fw_netvm = element.get("default_fw_netvm")
  479. if default_fw_netvm is not None:
  480. self.default_fw_netvm_qid = int(default_fw_netvm) \
  481. if default_fw_netvm != "None" else None
  482. #assert self.default_netvm_qid is not None
  483. updatevm = element.get("updatevm")
  484. if updatevm is not None:
  485. self.updatevm_qid = int(updatevm) \
  486. if updatevm != "None" else None
  487. #assert self.default_netvm_qid is not None
  488. clockvm = element.get("clockvm")
  489. if clockvm is not None:
  490. self.clockvm_qid = int(clockvm) \
  491. if clockvm != "None" else None
  492. self.default_kernel = element.get("default_kernel")
  493. def load(self):
  494. self.clear()
  495. dom0vm = QubesDom0NetVm (collection=self)
  496. self[dom0vm.qid] = dom0vm
  497. self.default_netvm_qid = 0
  498. try:
  499. tree = lxml.etree.parse(self.qubes_store_file)
  500. except (EnvironmentError,
  501. xml.parsers.expat.ExpatError) as err:
  502. print("{0}: import error: {1}".format(
  503. os.path.basename(sys.argv[0]), err))
  504. return False
  505. self.load_globals(tree.getroot())
  506. for (vm_class_name, vm_class) in sorted(QubesVmClasses.items(),
  507. key=lambda _x: _x[1].load_order):
  508. for element in tree.findall(vm_class_name):
  509. try:
  510. vm = vm_class(xml_element=element, collection=self)
  511. self[vm.qid] = vm
  512. except (ValueError, LookupError) as err:
  513. print("{0}: import error ({1}): {2}".format(
  514. os.path.basename(sys.argv[0]), vm_class_name, err))
  515. raise
  516. return False
  517. # After importing all VMs, set netvm references, in the same order
  518. for (vm_class_name, vm_class) in sorted(QubesVmClasses.items(),
  519. key=lambda _x: _x[1].load_order):
  520. for element in tree.findall(vm_class_name):
  521. try:
  522. self.set_netvm_dependency(element)
  523. except (ValueError, LookupError) as err:
  524. print("{0}: import error2 ({}): {}".format(
  525. os.path.basename(sys.argv[0]), vm_class_name, err))
  526. return False
  527. # if there was no clockvm entry in qubes.xml, try to determine default:
  528. # root of default NetVM chain
  529. if tree.getroot().get("clockvm") is None:
  530. if self.default_netvm_qid is not None:
  531. clockvm = self[self.default_netvm_qid]
  532. # Find root of netvm chain
  533. while clockvm.netvm is not None:
  534. clockvm = clockvm.netvm
  535. self.clockvm_qid = clockvm.qid
  536. # Disable ntpd in ClockVM - to not conflict with ntpdate (both are
  537. # using 123/udp port)
  538. if self.clockvm_qid is not None:
  539. self[self.clockvm_qid].services['ntpd'] = False
  540. return True
  541. def pop(self, qid):
  542. if self.default_netvm_qid == qid:
  543. self.default_netvm_qid = None
  544. if self.default_fw_netvm_qid == qid:
  545. self.default_fw_netvm_qid = None
  546. if self.clockvm_qid == qid:
  547. self.clockvm_qid = None
  548. if self.updatevm_qid == qid:
  549. self.updatevm_qid = None
  550. if self.default_template_qid == qid:
  551. self.default_template_qid = None
  552. return super(QubesVmCollection, self).pop(qid)
  553. class QubesDaemonPidfile(object):
  554. def __init__(self, name):
  555. self.name = name
  556. self.path = "/var/run/qubes/" + name + ".pid"
  557. def create_pidfile(self):
  558. f = open (self.path, 'w')
  559. f.write(str(os.getpid()))
  560. f.close()
  561. def pidfile_exists(self):
  562. return os.path.exists(self.path)
  563. def read_pid(self):
  564. f = open (self.path)
  565. pid = f.read ().strip()
  566. f.close()
  567. return int(pid)
  568. def pidfile_is_stale(self):
  569. if not self.pidfile_exists():
  570. return False
  571. # check if the pid file is valid...
  572. proc_path = "/proc/" + str(self.read_pid()) + "/cmdline"
  573. if not os.path.exists (proc_path):
  574. print >> sys.stderr, \
  575. "Path {0} doesn't exist, assuming stale pidfile.".\
  576. format(proc_path)
  577. return True
  578. return False # It's a good pidfile
  579. def remove_pidfile(self):
  580. os.remove (self.path)
  581. def __enter__ (self):
  582. # assumes the pidfile doesn't exist -- you should ensure it before opening the context
  583. self.create_pidfile()
  584. def __exit__ (self, exc_type, exc_val, exc_tb):
  585. self.remove_pidfile()
  586. return False
  587. modules_dir = os.path.join(os.path.dirname(__file__), 'modules')
  588. for module_file in sorted(os.listdir(modules_dir)):
  589. if not module_file.endswith(".py") or module_file == "__init__.py":
  590. continue
  591. __import__('qubes.modules.%s' % module_file[:-3])
  592. # vim:sw=4:et: