01QubesHVm.py 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519
  1. #!/usr/bin/python2
  2. #
  3. # The Qubes OS Project, http://www.qubes-os.org
  4. #
  5. # Copyright (C) 2010 Joanna Rutkowska <joanna@invisiblethingslab.com>
  6. # Copyright (C) 2013 Marek Marczykowski <marmarek@invisiblethingslab.com>
  7. #
  8. # This program is free software; you can redistribute it and/or
  9. # modify it under the terms of the GNU General Public License
  10. # as published by the Free Software Foundation; either version 2
  11. # of the License, or (at your option) any later version.
  12. #
  13. # This program is distributed in the hope that it will be useful,
  14. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. # GNU General Public License for more details.
  17. #
  18. # You should have received a copy of the GNU General Public License
  19. # along with this program; if not, write to the Free Software
  20. # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  21. #
  22. #
  23. import os
  24. import os.path
  25. import signal
  26. import subprocess
  27. import stat
  28. import sys
  29. import re
  30. from qubes.qubes import QubesVm,register_qubes_vm_class,xs,xc,dry_run
  31. from qubes.qubes import QubesException,QubesVmCollection
  32. from qubes.qubes import system_path,defaults
  33. system_path["config_template_hvm"] = '/usr/share/qubes/vm-template-hvm.conf'
  34. defaults["hvm_disk_size"] = 20*1024*1024*1024
  35. defaults["hvm_private_img_size"] = 2*1024*1024*1024
  36. defaults["hvm_memory"] = 512
  37. class QubesHVm(QubesVm):
  38. """
  39. A class that represents an HVM. A child of QubesVm.
  40. """
  41. # FIXME: logically should inherit after QubesAppVm, but none of its methods
  42. # are useful for HVM
  43. def get_attrs_config(self):
  44. attrs = super(QubesHVm, self).get_attrs_config()
  45. attrs.pop('kernel')
  46. attrs.pop('kernels_dir')
  47. attrs.pop('kernelopts')
  48. attrs.pop('uses_default_kernel')
  49. attrs.pop('uses_default_kernelopts')
  50. attrs['dir_path']['eval'] = 'value if value is not None else os.path.join(system_path["qubes_appvms_dir"], self.name)'
  51. attrs['config_file_template']['eval'] = 'system_path["config_template_hvm"]'
  52. attrs['drive'] = { 'attr': '_drive', 'save': 'str(self.drive)' }
  53. attrs['maxmem'].pop('save')
  54. attrs['timezone'] = { 'default': 'localtime', 'save': 'str(self.timezone)' }
  55. attrs['qrexec_installed'] = { 'default': False,
  56. 'attr': '_qrexec_installed',
  57. 'save': 'str(self._qrexec_installed)' }
  58. attrs['guiagent_installed'] = { 'default' : False,
  59. 'attr': '_guiagent_installed',
  60. 'save': 'str(self._guiagent_installed)' }
  61. attrs['_start_guid_first']['eval'] = 'True'
  62. attrs['services']['default'] = "{'meminfo-writer': False}"
  63. attrs['memory']['default'] = defaults["hvm_memory"]
  64. return attrs
  65. def __init__(self, **kwargs):
  66. super(QubesHVm, self).__init__(**kwargs)
  67. # Default for meminfo-writer have changed to (correct) False in the
  68. # same version as introduction of guiagent_installed, so for older VMs
  69. # with wrong setting, change is based on 'guiagent_installed' presence
  70. if "guiagent_installed" not in kwargs and \
  71. (not 'xml_element' in kwargs or kwargs['xml_element'].get('guiagent_installed') is None):
  72. self.services['meminfo-writer'] = False
  73. # HVM normally doesn't support dynamic memory management
  74. if not ('meminfo-writer' in self.services and self.services['meminfo-writer']):
  75. self.maxmem = self.memory
  76. self._stubdom_guid_process = None
  77. @property
  78. def type(self):
  79. return "HVM"
  80. def is_appvm(self):
  81. return True
  82. @classmethod
  83. def is_template_compatible(cls, template):
  84. if template and (not template.is_template() or template.type != "TemplateHVM"):
  85. return False
  86. return True
  87. def get_clone_attrs(self):
  88. attrs = super(QubesHVm, self).get_clone_attrs()
  89. attrs.remove('kernel')
  90. attrs.remove('uses_default_kernel')
  91. attrs.remove('kernelopts')
  92. attrs.remove('uses_default_kernelopts')
  93. attrs += [ 'timezone' ]
  94. attrs += [ 'qrexec_installed' ]
  95. attrs += [ 'guiagent_installed' ]
  96. return attrs
  97. @property
  98. def qrexec_installed(self):
  99. return self._qrexec_installed or \
  100. bool(self.template and self.template.qrexec_installed)
  101. @qrexec_installed.setter
  102. def qrexec_installed(self, value):
  103. if self.template and self.template.qrexec_installed and not value:
  104. print >>sys.stderr, "WARNING: When qrexec_installed set in template, it will be propagated to the VM"
  105. self._qrexec_installed = value
  106. @property
  107. def guiagent_installed(self):
  108. return self._guiagent_installed or \
  109. bool(self.template and self.template.guiagent_installed)
  110. @guiagent_installed.setter
  111. def guiagent_installed(self, value):
  112. if self.template and self.template.guiagent_installed and not value:
  113. print >>sys.stderr, "WARNING: When guiagent_installed set in template, it will be propagated to the VM"
  114. self._guiagent_installed = value
  115. @property
  116. def drive(self):
  117. return self._drive
  118. @drive.setter
  119. def drive(self, value):
  120. if value is None:
  121. self._drive = None
  122. return
  123. # strip type for a moment
  124. drv_type = "cdrom"
  125. if value.startswith("hd:") or value.startswith("cdrom:"):
  126. (drv_type, unused, value) = value.partition(":")
  127. drv_type = drv_type.lower()
  128. # sanity check
  129. if drv_type not in ['hd', 'cdrom']:
  130. raise QubesException("Unsupported drive type: %s" % type)
  131. if value.count(":") == 0:
  132. value = "dom0:" + value
  133. if value.count(":/") == 0:
  134. # FIXME: when Windows backend will be supported, improve this
  135. raise QubesException("Drive path must be absolute")
  136. self._drive = drv_type + ":" + value
  137. def create_on_disk(self, verbose, source_template = None):
  138. if dry_run:
  139. return
  140. if verbose:
  141. print >> sys.stderr, "--> Creating directory: {0}".format(self.dir_path)
  142. os.mkdir (self.dir_path)
  143. if verbose:
  144. print >> sys.stderr, "--> Creating icon symlink: {0} -> {1}".format(self.icon_path, self.label.icon_path)
  145. os.symlink (self.label.icon_path, self.icon_path)
  146. self.create_config_file()
  147. # create empty disk
  148. if self.template is None:
  149. if verbose:
  150. print >> sys.stderr, "--> Creating root image: {0}".\
  151. format(self.root_img)
  152. f_root = open(self.root_img, "w")
  153. f_root.truncate(defaults["hvm_disk_size"])
  154. f_root.close()
  155. if self.template is None:
  156. # create empty private.img
  157. if verbose:
  158. print >> sys.stderr, "--> Creating private image: {0}".\
  159. format(self.private_img)
  160. f_private = open(self.private_img, "w")
  161. f_private.truncate(defaults["hvm_private_img_size"])
  162. f_private.close()
  163. else:
  164. # copy template private.img
  165. template_priv = self.template.private_img
  166. if verbose:
  167. print >> sys.stderr, "--> Copying the template's private image: {0}".\
  168. format(template_priv)
  169. # We prefer to use Linux's cp, because it nicely handles sparse files
  170. retcode = subprocess.call (["cp", template_priv, self.private_img])
  171. if retcode != 0:
  172. raise IOError ("Error while copying {0} to {1}".\
  173. format(template_priv, self.private_img))
  174. # fire hooks
  175. for hook in self.hooks_create_on_disk:
  176. hook(self, verbose, source_template=source_template)
  177. def get_disk_utilization_private_img(self):
  178. return self.get_disk_usage(self.private_img)
  179. def get_private_img_sz(self):
  180. if not os.path.exists(self.private_img):
  181. return 0
  182. return os.path.getsize(self.private_img)
  183. def resize_private_img(self, size):
  184. assert size >= self.get_private_img_sz(), "Cannot shrink private.img"
  185. if self.is_running():
  186. raise NotImplementedError("Online resize of HVM's private.img not implemented, shutdown the VM first")
  187. f_private = open (self.private_img, "a+b")
  188. f_private.truncate (size)
  189. f_private.close ()
  190. def resize_root_img(self, size):
  191. if self.template:
  192. raise QubesException("Cannot resize root.img of template-based VM"
  193. ". Resize the root.img of the template "
  194. "instead.")
  195. if self.is_running():
  196. raise QubesException("Cannot resize root.img of running HVM")
  197. if size < self.get_root_img_sz():
  198. raise QubesException(
  199. "For your own safety shringing of root.img is disabled. If "
  200. "you really know what you are doing, use 'truncate' manually.")
  201. f_root = open (self.root_img, "a+b")
  202. f_root.truncate (size)
  203. f_root.close ()
  204. def get_rootdev(self, source_template=None):
  205. if self.template:
  206. return "'script:snapshot:{template_root}:{volatile},xvda,w',".format(
  207. template_root=self.template.root_img,
  208. volatile=self.volatile_img)
  209. else:
  210. return "'script:file:{root_img},xvda,w',".format(root_img=self.root_img)
  211. def get_config_params(self, source_template=None):
  212. params = super(QubesHVm, self).get_config_params(source_template=source_template)
  213. params['volatiledev'] = ''
  214. if self.drive:
  215. type_mode = ":cdrom,r"
  216. (drive_type, drive_domain, drive_path) = self.drive.split(":")
  217. if drive_type == "hd":
  218. type_mode = ",w"
  219. elif drive_type == "cdrom":
  220. type_mode = ":cdrom,r"
  221. # leave empty to use standard syntax in case of dom0
  222. if drive_domain.lower() == "dom0":
  223. backend_domain = ""
  224. else:
  225. backend_domain = "," + drive_domain
  226. # FIXME: os.stat will work only when backend in dom0...
  227. stat_res = None
  228. if backend_domain == "":
  229. stat_res = os.stat(drive_path)
  230. if stat_res and stat.S_ISBLK(stat_res.st_mode):
  231. params['otherdevs'] = "'phy:%s,xvdc%s%s'," % (
  232. drive_path, type_mode, backend_domain)
  233. else:
  234. params['otherdevs'] = "'script:file:%s,xvdc%s%s'," % (
  235. drive_path, type_mode, backend_domain)
  236. else:
  237. params['otherdevs'] = ''
  238. if self.timezone.lower() == 'localtime':
  239. params['localtime'] = '1'
  240. params['timeoffset'] = '0'
  241. elif self.timezone.isdigit():
  242. params['localtime'] = '0'
  243. params['timeoffset'] = self.timezone
  244. else:
  245. print >>sys.stderr, "WARNING: invalid 'timezone' value: %s" % self.timezone
  246. params['localtime'] = '0'
  247. params['timeoffset'] = '0'
  248. return params
  249. def verify_files(self):
  250. if dry_run:
  251. return
  252. if not os.path.exists (self.dir_path):
  253. raise QubesException (
  254. "VM directory doesn't exist: {0}".\
  255. format(self.dir_path))
  256. if self.is_updateable() and not os.path.exists (self.root_img):
  257. raise QubesException (
  258. "VM root image file doesn't exist: {0}".\
  259. format(self.root_img))
  260. if not os.path.exists (self.private_img):
  261. print >>sys.stderr, "WARNING: Creating empty VM private image file: {0}".\
  262. format(self.private_img)
  263. f_private = open(self.private_img, "w")
  264. f_private.truncate(defaults["hvm_private_img_size"])
  265. f_private.close()
  266. # fire hooks
  267. for hook in self.hooks_verify_files:
  268. hook(self)
  269. return True
  270. def reset_volatile_storage(self, **kwargs):
  271. assert not self.is_running(), "Attempt to clean volatile image of running VM!"
  272. source_template = kwargs.get("source_template", self.template)
  273. if source_template is None:
  274. # Nothing to do on non-template based VM
  275. return
  276. if os.path.exists (self.volatile_img):
  277. if self.debug:
  278. if os.path.getmtime(self.template.root_img) > os.path.getmtime(self.volatile_img):
  279. if kwargs.get("verbose", False):
  280. print >>sys.stderr, "--> WARNING: template have changed, resetting root.img"
  281. else:
  282. if kwargs.get("verbose", False):
  283. print >>sys.stderr, "--> Debug mode: not resetting root.img"
  284. print >>sys.stderr, "--> Debug mode: if you want to force root.img reset, either update template VM, or remove volatile.img file"
  285. return
  286. os.remove (self.volatile_img)
  287. f_volatile = open (self.volatile_img, "w")
  288. f_root = open (self.template.root_img, "r")
  289. f_root.seek(0, os.SEEK_END)
  290. f_volatile.truncate (f_root.tell()) # make empty sparse file of the same size as root.img
  291. f_volatile.close ()
  292. f_root.close()
  293. @property
  294. def vif(self):
  295. if self.xid < 0:
  296. return None
  297. if self.netvm is None:
  298. return None
  299. return "vif{0}.+".format(self.stubdom_xid)
  300. @property
  301. def mac(self):
  302. if self._mac is not None:
  303. return self._mac
  304. elif self.template is not None:
  305. return self.template.mac
  306. else:
  307. return "00:16:3E:5E:6C:{qid:02X}".format(qid=self.qid)
  308. @mac.setter
  309. def mac(self, value):
  310. self._mac = value
  311. def run(self, command, **kwargs):
  312. if self.qrexec_installed:
  313. if 'gui' in kwargs and kwargs['gui']==False:
  314. command = "nogui:" + command
  315. return super(QubesHVm, self).run(command, **kwargs)
  316. else:
  317. raise QubesException("Needs qrexec agent installed in VM to use this function. See also qvm-prefs.")
  318. @property
  319. def stubdom_xid(self):
  320. if self.xid < 0:
  321. return -1
  322. stubdom_xid_str = xs.read('', '/local/domain/%d/image/device-model-domid' % self.xid)
  323. if stubdom_xid_str is not None:
  324. return int(stubdom_xid_str)
  325. else:
  326. return -1
  327. def start(self, *args, **kwargs):
  328. if self.template and self.template.is_running():
  329. raise QubesException("Cannot start the HVM while its template is running")
  330. try:
  331. return super(QubesHVm, self).start(*args, **kwargs)
  332. except QubesException as e:
  333. if xc.physinfo()['virt_caps'].count('hvm') == 0:
  334. raise QubesException("Cannot start HVM without VT-x/AMD-v enabled")
  335. else:
  336. raise
  337. def start_stubdom_guid(self):
  338. cmdline = [system_path["qubes_guid_path"],
  339. "-d", str(self.stubdom_xid),
  340. "-c", self.label.color,
  341. "-i", self.label.icon_path,
  342. "-l", str(self.label.index)]
  343. retcode = subprocess.call (cmdline)
  344. if (retcode != 0) :
  345. raise QubesException("Cannot start qubes-guid!")
  346. def start_guid(self, verbose = True, notify_function = None,
  347. before_qrexec=False, **kwargs):
  348. # If user force the guiagent, start_guid will mimic a standard QubesVM
  349. if not before_qrexec and self.guiagent_installed:
  350. super(QubesHVm, self).start_guid(verbose, notify_function, extra_guid_args=["-Q"], **kwargs)
  351. stubdom_guid_pidfile = '/var/run/qubes/guid-running.%d' % self.stubdom_xid
  352. if os.path.exists(stubdom_guid_pidfile):
  353. try:
  354. stubdom_guid_pid = int(open(stubdom_guid_pidfile, 'r').read())
  355. os.kill(stubdom_guid_pid, signal.SIGTERM)
  356. except Exception as ex:
  357. print >> sys.stderr, "WARNING: Failed to kill stubdom gui daemon: %s" % str(ex)
  358. elif before_qrexec and (not self.guiagent_installed or self.debug):
  359. if verbose:
  360. print >> sys.stderr, "--> Starting Qubes GUId (full screen)..."
  361. self.start_stubdom_guid()
  362. def start_qrexec_daemon(self, **kwargs):
  363. if not self.qrexec_installed:
  364. if kwargs.get('verbose', False):
  365. print >> sys.stderr, "--> Starting the qrexec daemon..."
  366. xid = self.get_xid()
  367. qrexec_env = os.environ
  368. qrexec_env['QREXEC_STARTUP_NOWAIT'] = '1'
  369. retcode = subprocess.call ([system_path["qrexec_daemon_path"], str(xid), self.name, self.default_user], env=qrexec_env)
  370. if (retcode != 0) :
  371. self.force_shutdown(xid=xid)
  372. raise OSError ("ERROR: Cannot execute qrexec-daemon!")
  373. else:
  374. super(QubesHVm, self).start_qrexec_daemon(**kwargs)
  375. if self._start_guid_first:
  376. if kwargs.get('verbose'):
  377. print >> sys.stderr, "--> Waiting for user '%s' login..." % self.default_user
  378. self.wait_for_session(notify_function=kwargs.get('notify_function', None))
  379. def create_xenstore_entries(self, xid = None):
  380. if dry_run:
  381. return
  382. super(QubesHVm, self).create_xenstore_entries(xid)
  383. if xid is None:
  384. xid = self.xid
  385. domain_path = xs.get_domain_path(xid)
  386. # Prepare xenstore directory for tools advertise
  387. xs.write('',
  388. "{0}/qubes-tools".format(domain_path),
  389. '')
  390. # Allow VM writes there
  391. xs.set_permissions('', '{0}/qubes-tools'.format(domain_path),
  392. [{ 'dom': xid }])
  393. def suspend(self):
  394. if dry_run:
  395. return
  396. if not self.is_running() and not self.is_paused():
  397. raise QubesException ("VM not running!")
  398. self.pause()
  399. def pause(self):
  400. if dry_run:
  401. return
  402. xc.domain_pause(self.stubdom_xid)
  403. super(QubesHVm, self).pause()
  404. def unpause(self):
  405. if dry_run:
  406. return
  407. xc.domain_unpause(self.stubdom_xid)
  408. super(QubesHVm, self).unpause()
  409. def is_guid_running(self):
  410. # If user force the guiagent, is_guid_running will mimic a standard QubesVM
  411. if self.guiagent_installed:
  412. return super(QubesHVm, self).is_guid_running()
  413. else:
  414. xid = self.stubdom_xid
  415. if xid < 0:
  416. return False
  417. if not os.path.exists('/var/run/qubes/guid-running.%d' % xid):
  418. return False
  419. return True
  420. def is_fully_usable(self):
  421. # Running gui-daemon implies also VM running
  422. if not self.is_guid_running():
  423. return False
  424. if self.qrexec_installed and not self.is_qrexec_running():
  425. return False
  426. return True
  427. register_qubes_vm_class(QubesHVm)