1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299 |
- #
- # The Qubes OS Project, https://www.qubes-os.org/
- #
- # Copyright (C) 2010-2015 Joanna Rutkowska <joanna@invisiblethingslab.com>
- # Copyright (C) 2013-2015 Marek Marczykowski-Górecki
- # <marmarek@invisiblethingslab.com>
- # Copyright (C) 2014-2015 Wojtek Porczyk <woju@invisiblethingslab.com>
- #
- # This library is free software; you can redistribute it and/or
- # modify it under the terms of the GNU Lesser General Public
- # License as published by the Free Software Foundation; either
- # version 2.1 of the License, or (at your option) any later version.
- #
- # This library is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- # Lesser General Public License for more details.
- #
- # You should have received a copy of the GNU Lesser General Public
- # License along with this library; if not, see <https://www.gnu.org/licenses/>.
- #
- import asyncio
- import base64
- import grp
- import re
- import os
- import os.path
- import shutil
- import string
- import subprocess
- import uuid
- import libvirt # pylint: disable=import-error
- import lxml
- import qubes
- import qubes.config
- import qubes.exc
- import qubes.storage
- import qubes.utils
- import qubes.vm
- import qubes.vm.mix.net
- qmemman_present = False
- try:
- import qubes.qmemman.client # pylint: disable=wrong-import-position
- qmemman_present = True
- except ImportError:
- pass
- # overhead of per-qube/per-vcpu Xen structures,
- # taken from OpenStack nova/virt/xenapi/driver.py
- # see https://wiki.openstack.org/wiki/XenServer/Overhead
- # add an extra MB because Nova rounds up to MBs
- MEM_OVERHEAD_BASE = (3 + 1) * 1024 * 1024
- MEM_OVERHEAD_PER_VCPU = 3 * 1024 * 1024 / 2
- def _setter_kernel(self, prop, value):
- """ Helper for setting the domain kernel and running sanity checks on it.
- """ # pylint: disable=unused-argument
- if not value:
- return ''
- value = str(value)
- if '/' in value:
- raise qubes.exc.QubesPropertyValueError(
- self, prop, value,
- 'Kernel name cannot contain \'/\'')
- return value
- def _setter_positive_int(self, prop, value):
- """ Helper for setting a positive int. Checks that the int is > 0 """
- # pylint: disable=unused-argument
- value = int(value)
- if value <= 0:
- raise ValueError('Value must be positive')
- return value
- def _setter_non_negative_int(self, prop, value):
- """ Helper for setting a positive int. Checks that the int is >= 0 """
- # pylint: disable=unused-argument
- value = int(value)
- if value < 0:
- raise ValueError('Value must be positive or zero')
- return value
- def _setter_default_user(self, prop, value):
- """ Helper for setting default user """
- value = str(value)
- # specifically forbid: ':', ' ', """, '"'
- allowed_chars = string.ascii_letters + string.digits + '_-+,.'
- if not all(c in allowed_chars for c in value):
- raise qubes.exc.QubesPropertyValueError(
- self, prop, value,
- 'Username can contain only those characters: ' + allowed_chars)
- return value
- def _setter_virt_mode(self, prop, value):
- value = str(value)
- value = value.lower()
- if value not in ('hvm', 'pv', 'pvh'):
- raise qubes.exc.QubesPropertyValueError(
- self, prop, value,
- 'Invalid virtualization mode, supported values: hvm, pv, pvh')
- if value == 'pvh' and list(self.devices['pci'].persistent()):
- raise qubes.exc.QubesPropertyValueError(
- self, prop, value,
- "pvh mode can't be set if pci devices are attached")
- return value
- def _setter_kbd_layout(self, prop, value):
- untrusted_xkb_layout = value.split('+')
- if len(untrusted_xkb_layout) != 3:
- raise qubes.exc.QubesPropertyValueError(
- self, prop, value, "invalid number of keyboard layout parameters")
- untrusted_layout = untrusted_xkb_layout[0]
- untrusted_variant = untrusted_xkb_layout[1]
- untrusted_options = untrusted_xkb_layout[2]
- re_variant = r'^[a-zA-Z0-9-_]*$'
- re_options = r'^[a-zA-Z0-9-_:,]*$'
- if not untrusted_layout.isalpha():
- raise qubes.exc.QubesPropertyValueError(
- self, prop, value, "Invalid keyboard layout provided")
- if not re.match(re_variant, untrusted_variant):
- raise qubes.exc.QubesPropertyValueError(
- self, prop, value, "Invalid layout variant provided")
- if not re.match(re_options, untrusted_options):
- raise qubes.exc.QubesPropertyValueError(
- self, prop, value, "Invalid layout options provided")
- return value
- def _default_virt_mode(self):
- if self.devices['pci'].persistent():
- return 'hvm'
- try:
- return self.template.virt_mode
- except AttributeError:
- return 'pvh'
- def _default_with_template(prop, default):
- """Return a callable for 'default' argument of a property. Use a value
- from a template (if any), otherwise *default*
- """
- def _func(self):
- try:
- return getattr(self.template, prop)
- except AttributeError:
- if callable(default):
- return default(self)
- return default
- return _func
- def _default_maxmem(self):
- # first check for any reason to _not_ enable qmemman
- if not self.is_memory_balancing_possible():
- return 0
- # Linux specific cap: max memory can't scale beyond 10.79*init_mem
- # see https://groups.google.com/forum/#!topic/qubes-devel/VRqkFj1IOtA
- if self.features.get('os', None) == 'Linux':
- default_maxmem = self.memory * 10
- else:
- default_maxmem = 4000
- # don't use default larger than half of physical ram
- default_maxmem = min(default_maxmem,
- int(self.app.host.memory_total / 1024 / 2))
- return _default_with_template('maxmem', default_maxmem)(self)
- def _default_kernelopts(self):
- """
- Return default kernel options for the given kernel. If kernel directory
- contains 'default-kernelopts-{pci,nopci}.txt' file, use that. Otherwise
- use built-in defaults.
- For qubes without PCI devices, kernelopts of qube's template are
- considered (for template-based qubes).
- """
- if not self.kernel:
- return ''
- if 'kernel' in self.volumes:
- kernels_dir = self.storage.kernels_dir
- else:
- kernels_dir = os.path.join(
- qubes.config.system_path['qubes_kernels_base_dir'],
- self.kernel)
- pci = bool(list(self.devices['pci'].persistent()))
- if pci:
- path = os.path.join(kernels_dir, 'default-kernelopts-pci.txt')
- else:
- try:
- return self.template.kernelopts
- except AttributeError:
- pass
- path = os.path.join(kernels_dir, 'default-kernelopts-nopci.txt')
- if os.path.exists(path):
- with open(path) as f_kernelopts:
- return f_kernelopts.read().strip()
- else:
- return (qubes.config.defaults['kernelopts_pcidevs'] if pci else
- qubes.config.defaults['kernelopts'])
- class QubesVM(qubes.vm.mix.net.NetVMMixin, qubes.vm.BaseVM):
- """Base functionality of Qubes VM shared between all VMs.
- The following events are raised on this class or its subclasses:
- .. event:: domain-init (subject, event)
- Fired at the end of class' constructor.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-init'``)
- .. event:: domain-load (subject, event)
- Fired after the qube was loaded from :file:`qubes.xml`
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-loaded'``)
- .. event:: domain-pre-start \
- (subject, event, start_guid, mem_required)
- Fired at the beginning of :py:meth:`start` method.
- Handler for this event can be asynchronous (a coroutine).
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-pre-start'``)
- *other arguments are as in :py:meth:`start`*
- .. event:: domain-spawn (subject, event, start_guid)
- Fired after creating libvirt domain.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-spawn'``)
- Handler for this event can be asynchronous (a coroutine).
- *other arguments are as in :py:meth:`start`*
- .. event:: domain-start (subject, event, start_guid)
- Fired at the end of :py:meth:`start` method.
- Handler for this event can be asynchronous (a coroutine).
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-start'``)
- *other arguments are as in :py:meth:`start`*
- .. event:: domain-start-failed (subject, event, reason)
- Fired when :py:meth:`start` method fails.
- *reason* argument is a textual error message.
- Handler for this event can be asynchronous (a coroutine).
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-start-failed'``)
- .. event:: domain-paused (subject, event)
- Fired when the domain has been paused.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-paused'``)
- .. event:: domain-unpaused (subject, event)
- Fired when the domain has been unpaused.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-unpaused'``)
- .. event:: domain-stopped (subject, event)
- Fired when domain has been stopped.
- This event is emitted before ``'domain-shutdown'`` and will trigger
- the cleanup in QubesVM. So if you require that the cleanup has
- already run use ``'domain-shutdown'``.
- Note that you can receive this event as soon as you received
- ``'domain-pre-start'``. This also can be emitted in case of a
- startup failure, before or after ``'domain-start-failed'``.
- Handler for this event can be asynchronous (a coroutine).
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-stopped'``)
- .. event:: domain-shutdown (subject, event)
- Fired when domain has been shut down. It is generated after
- ``'domain-stopped'``.
- Note that you can receive this event as soon as you received
- ``'domain-pre-start'``. This also can be emitted in case of a
- startup failure, before or after ``'domain-start-failed'``.
- Handler for this event can be asynchronous (a coroutine).
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-shutdown'``)
- .. event:: domain-pre-shutdown (subject, event, force)
- Fired at the beginning of :py:meth:`shutdown` method.
- Handler for this event can be asynchronous (a coroutine).
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-pre-shutdown'``)
- :param force: If the shutdown is to be forceful
- .. event:: domain-shutdown-failed (subject, event, reason)
- Fired when ``domain-pre-shutdown`` event was sent, but the actual
- shutdown operation failed. It can be caused by other
- ``domain-pre-shutdown`` handler blocking the operation with an
- exception, or a shutdown timeout.
- Handler for this event can be asynchronous (a coroutine).
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-shutdown-failed'``)
- :param reason: Error message
- .. event:: domain-cmd-pre-run (subject, event, start_guid)
- Fired at the beginning of :py:meth:`run_service` method.
- Handler for this event can be asynchronous (a coroutine).
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-cmd-pre-run'``)
- :param start_guid: If the gui daemon can be started
- .. event:: domain-create-on-disk (subject, event)
- Fired at the end of :py:meth:`create_on_disk` method.
- Handler for this event can be asynchronous (a coroutine).
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-create-on-disk'``)
- .. event:: domain-remove-from-disk (subject, event)
- Fired at the beginning of :py:meth:`remove_from_disk` method, before
- the qube directory is removed.
- Handler for this event can be asynchronous (a coroutine).
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-remove-from-disk'``)
- .. event:: domain-clone-files (subject, event, src)
- Fired at the end of :py:meth:`clone_disk_files` method.
- Handler for this event can be asynchronous (a coroutine).
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-clone-files'``)
- :param src: source qube
- .. event:: domain-verify-files (subject, event)
- Fired at the end of :py:meth:`clone_disk_files` method.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-verify-files'``)
- If you think some files are missing or damaged, raise an exception.
- .. event:: domain-is-fully-usable (subject, event)
- Fired at the end of :py:meth:`clone_disk_files` method.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-is-fully-usable'``)
- You may ``yield False`` from the handler if you think the qube is
- not fully usable. This will cause the domain to be in "transient"
- state in the domain lifecycle.
- .. event:: domain-qdb-create (subject, event)
- Fired at the end of :py:meth:`create_qdb_entries` method.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-qdb-create'``)
- This event is a good place to add your custom entries to the qdb.
- .. event:: domain-qdb-change:watched-path (subject, event, path)
- Fired when watched QubesDB entry is changed. See
- :py:meth:`watch_qdb_path`. *watched-path* part of event name is
- what path was registered for watching, *path* in event argument
- is what actually have changed (which may be different if watching a
- directory, i.e. a path with `/` at the end).
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-qdb-change'``)
- :param path: changed QubesDB path
- .. event:: backup-get-files (subject, event)
- Collects additional file to be included in a backup.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'backup-get-files'``)
- Handlers should yield paths of the files.
- .. event:: domain-restore (subject, event)
- Domain was just restored from backup, although the storage was not
- yet verified and the app object was not yet saved.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-restore'``)
- .. event:: domain-feature-pre-set:feature (subject, event, feature,
- value [, oldvalue])
- A feature will be changed. This event is fired before value is set.
- If any handler raises an exception, value will not be set.
- *oldvalue* is present only when there was any.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-feature-pre-set:' feature``)
- :param feature: feature name
- :param value: new value
- :param oldvalue: old value, if any
- .. event:: domain-feature-set:feature (subject, event, feature, value
- [, oldvalue])
- A feature was changed. This event is fired before bare
- `domain-feature-set` event.
- *oldvalue* is present only when there was any.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-feature-set:' feature``)
- :param feature: feature name
- :param value: new value
- :param oldvalue: old value, if any
- .. event:: domain-feature-delete:feature (subject, event, feature)
- A feature was removed. This event is fired before bare
- `domain-feature-delete` event.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-feature-delete:' feature``)
- :param feature: feature name
- .. event:: domain-feature-pre-delete:feature (subject, event, feature)
- A feature will be removed. This event is fired before feature is
- removed. If any handler raises an exception,feature will not be
- removed.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-feature-pre-delete:' feature``)
- :param feature: feature name
- .. event:: domain-tag-add:tag (subject, event, tag)
- A tag was added.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-tag-add:' tag``)
- :param tag: tag name
- .. event:: domain-tag-delete:tag (subject, event, tag)
- A feature was removed.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'domain-tag-delete:' tag``)
- :param tag: tag name
- .. event:: features-request (subject, event, *, untrusted_features)
- The domain is performing a features request.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'features-request'``)
- :param untrusted_features: :py:class:`dict` containing the feature \
- request
- The content of the `untrusted_features` variable is, as the name
- implies, **UNTRUSTED**. The remind this to programmer, the variable
- name has to be exactly as provided.
- It is up to the extensions to decide, what to do with request,
- ranging from plainly ignoring the request to verbatim copy into
- :py:attr:`features` with only minimal sanitisation.
- Handler for this event can be asynchronous (a coroutine).
- .. event:: firewall-changed (subject, event)
- Firewall was changed.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'firewall-changed'``)
- .. event:: net-domain-connect (subject, event, vm)
- Fired after connecting a domiain to this vm.
- :param subject: Event emitter (the qube object)
- :param event: Event name (``'net-domain-connect'``)
- :param vm: The domain that was just connected.
- On the `vm` object there was probably ``property-set:netvm`` fired
- earlier.
- .. event:: template-postinstall (subject, event)
- Fired on non-template-based domain (TemplateVM, StandaloneVM) when
- it first reports qrexec presence. This happens at the first
- domain startup just after its installation and is suitable for
- performing various post-installation setup.
- Handler for this event can be asynchronous (a coroutine).
- """
- #
- # per-class properties
- #
- #: directory in which domains of this class will reside
- dir_path_prefix = qubes.config.system_path['qubes_appvms_dir']
- #
- # properties loaded from XML
- #
- guivm = qubes.VMProperty('guivm', load_stage=4, allow_none=True,
- default=(lambda self: self.app.default_guivm),
- doc='VM used for Gui')
- audiovm = qubes.VMProperty('audiovm', load_stage=4, allow_none=True,
- default=(lambda self: self.app.default_audiovm),
- doc='VM used for Audio')
- virt_mode = qubes.property(
- 'virt_mode',
- type=str, setter=_setter_virt_mode,
- default=_default_virt_mode,
- doc="""Virtualisation mode: full virtualisation ("HVM"),
- or paravirtualisation ("PV"), or hybrid ("PVH").
- TemplateBasedVMs use its template\'s value by default.""")
- installed_by_rpm = qubes.property(
- 'installed_by_rpm',
- type=bool, setter=qubes.property.bool,
- default=False,
- doc="""If this domain's image was installed from package tracked by
- package manager.""")
- memory = qubes.property(
- 'memory', type=int,
- setter=_setter_positive_int,
- default=_default_with_template(
- 'memory',
- lambda self:
- qubes.config.defaults[
- 'hvm_memory' if self.virt_mode == 'hvm' else 'memory']),
- doc='Memory currently available for this VM. TemplateBasedVMs use its '
- 'template\'s value by default.')
- maxmem = qubes.property(
- 'maxmem', type=int,
- setter=_setter_non_negative_int,
- default=_default_maxmem,
- doc="""Maximum amount of memory available for this VM (for the purpose
- of the memory balancer). Set to 0 to disable memory balancing for
- this qube. TemplateBasedVMs use its template\'s value by default
- (unless memory balancing not supported for this qube).""")
- stubdom_mem = qubes.property(
- 'stubdom_mem', type=int,
- setter=_setter_positive_int,
- default=None,
- doc='Memory amount allocated for the stubdom')
- vcpus = qubes.property(
- 'vcpus',
- type=int,
- setter=_setter_positive_int,
- default=_default_with_template('vcpus', 2),
- doc='Number of virtual CPUs for a qube. TemplateBasedVMs use its '
- 'template\'s value by default.')
- # CORE2: swallowed uses_default_kernel
- kernel = qubes.property(
- 'kernel', type=str,
- setter=_setter_kernel,
- default=_default_with_template('kernel',
- lambda self: self.app.default_kernel),
- doc='Kernel used by this domain. TemplateBasedVMs use its '
- 'template\'s value by default.')
- # CORE2: swallowed uses_default_kernelopts
- # pylint: disable=no-member
- kernelopts = qubes.property(
- 'kernelopts', type=str, load_stage=4,
- default=_default_kernelopts,
- doc='Kernel command line passed to domain. TemplateBasedVMs use its '
- 'template\'s value by default.')
- debug = qubes.property(
- 'debug', type=bool, default=False,
- setter=qubes.property.bool,
- doc='Turns on debugging features.')
- # XXX what this exactly does?
- # XXX shouldn't this go to standalone VM and TemplateVM, and leave here
- # only plain property?
- default_user = qubes.property(
- 'default_user', type=str,
- # pylint: disable=no-member
- default=_default_with_template('default_user',
- 'user'),
- setter=_setter_default_user,
- doc='Default user to start applications as. TemplateBasedVMs use its '
- 'template\'s value by default.')
- qrexec_timeout = qubes.property(
- 'qrexec_timeout', type=int,
- default=_default_with_template(
- 'qrexec_timeout',
- lambda self: self.app.default_qrexec_timeout),
- setter=_setter_positive_int,
- doc="""Time in seconds after which qrexec connection attempt is deemed
- failed. Operating system inside VM should be able to boot in this
- time.""")
- shutdown_timeout = qubes.property(
- 'shutdown_timeout', type=int,
- default=_default_with_template(
- 'shutdown_timeout',
- lambda self: self.app.default_shutdown_timeout),
- setter=_setter_positive_int,
- doc="""Time in seconds for shutdown of the VM, after which VM may be
- forcefully powered off. Operating system inside VM should be
- able to fully shutdown in this time.""")
- autostart = qubes.property(
- 'autostart', default=False,
- type=bool, setter=qubes.property.bool,
- doc="""Setting this to `True` means that VM should be autostarted on
- dom0 boot.""")
- include_in_backups = qubes.property(
- 'include_in_backups',
- default=True,
- type=bool, setter=qubes.property.bool,
- doc='If this domain is to be included in default backup.')
- backup_timestamp = qubes.property(
- 'backup_timestamp', default=None,
- type=int,
- doc='Time of last backup of the qube, in seconds since unix epoch')
- default_dispvm = qubes.VMProperty(
- 'default_dispvm',
- load_stage=4,
- allow_none=True,
- default=(
- lambda self: self.app.default_dispvm),
- doc='Default VM to be used as Disposable VM for service calls.')
- management_dispvm = qubes.VMProperty(
- 'management_dispvm',
- load_stage=4,
- allow_none=True,
- default=_default_with_template(
- 'management_dispvm',
- (lambda self: self.app.management_dispvm)),
- doc='Default DVM template for Disposable VM for managing this VM.')
- updateable = qubes.property(
- 'updateable',
- default=(lambda self: not hasattr(self, 'template')),
- type=bool,
- setter=qubes.property.forbidden,
- doc='True if this machine may be updated on its own.')
- # for changes in keyboard_layout, see also the same property in AdminVM
- keyboard_layout = qubes.property(
- 'keyboard_layout',
- default=(lambda self: getattr(self.guivm, 'keyboard_layout', 'us++')),
- type=str,
- setter=_setter_kbd_layout,
- doc='Keyboard layout for this VM')
- #
- # static, class-wide properties
- #
- #
- # properties not loaded from XML, calculated at run-time
- #
- def __str__(self):
- return self.name
- # VMM-related
- @qubes.stateless_property
- def xid(self):
- """Xen ID.
- Or not Xen, but ID.
- """
- if self.libvirt_domain is None:
- return -1
- try:
- if self.is_running():
- return self.libvirt_domain.ID()
- return -1
- except libvirt.libvirtError as e:
- if e.get_error_code() == libvirt.VIR_ERR_NO_DOMAIN:
- return -1
- self.log.exception('libvirt error code: {!r}'.format(
- e.get_error_code()))
- raise
- @qubes.stateless_property
- def stubdom_xid(self):
- if not self.is_running():
- return -1
- if self.app.vmm.xs is None:
- return -1
- stubdom_xid_str = self.app.vmm.xs.read(
- '', '/local/domain/{}/image/device-model-domid'.format(
- self.xid))
- if stubdom_xid_str is None or not stubdom_xid_str.isdigit():
- return -1
- return int(stubdom_xid_str)
- @property
- def attached_volumes(self):
- result = []
- xml_desc = self.libvirt_domain.XMLDesc()
- xml = lxml.etree.fromstring(xml_desc)
- for disk in xml.xpath("//domain/devices/disk"):
- if disk.find('backenddomain') is not None:
- pool_name = 'p_%s' % disk.find('backenddomain').get('name')
- pool = self.app.pools[pool_name]
- vid = disk.find('source').get('dev').split('/dev/')[1]
- for volume in pool.volumes:
- if volume.vid == vid:
- result += [volume]
- break
- return result + list(self.volumes.values())
- @property
- def libvirt_domain(self):
- """Libvirt domain object from libvirt.
- May be :py:obj:`None`, if libvirt knows nothing about this domain.
- """
- if self._libvirt_domain is not None:
- return self._libvirt_domain
- if self.app.vmm.offline_mode:
- return None
- # XXX _update_libvirt_domain?
- try:
- self._libvirt_domain = self.app.vmm.libvirt_conn.lookupByUUID(
- self.uuid.bytes)
- except libvirt.libvirtError as e:
- if e.get_error_code() == libvirt.VIR_ERR_NO_DOMAIN:
- self._update_libvirt_domain()
- else:
- raise
- return self._libvirt_domain
- @property
- def block_devices(self):
- """ Return all :py:class:`qubes.storage.BlockDevice` for current domain
- for serialization in the libvirt XML template as <disk>.
- """
- for v in self.volumes.values():
- block_dev = v.block_device()
- if block_dev is not None:
- yield block_dev
- @property
- def untrusted_qdb(self):
- """QubesDB handle for this domain."""
- if self._qdb_connection is None:
- if self.is_running():
- import qubesdb # pylint: disable=import-error
- self._qdb_connection = qubesdb.QubesDB(self.name)
- return self._qdb_connection
- @property
- def dir_path(self):
- """Root directory for files related to this domain"""
- return os.path.join(
- qubes.config.qubes_base_dir,
- self.dir_path_prefix,
- self.name)
- @property
- def conf_file(self):
- return os.path.join(self.dir_path, 'libvirt.xml')
- # network-related
- #
- # constructor
- #
- def __init__(self, app, xml, volume_config=None, **kwargs):
- # migrate renamed properties
- if xml is not None:
- node_hvm = xml.find('./properties/property[@name=\'hvm\']')
- if node_hvm is not None:
- if qubes.property.bool(None, None, node_hvm.text):
- kwargs['virt_mode'] = 'hvm'
- else:
- kwargs['virt_mode'] = 'pv'
- node_hvm.getparent().remove(node_hvm)
- super().__init__(app, xml, **kwargs)
- if volume_config is None:
- volume_config = {}
- if hasattr(self, 'volume_config'):
- if xml is not None:
- for node in xml.xpath('volume-config/volume'):
- name = node.get('name')
- assert name
- for key, value in node.items():
- # pylint: disable=no-member
- if value == 'True':
- value = True
- try:
- self.volume_config[name][key] = value
- except KeyError:
- self.volume_config[name] = {key: value}
- for name, conf in volume_config.items():
- for key, value in conf.items():
- # pylint: disable=no-member
- try:
- self.volume_config[name][key] = value
- except KeyError:
- self.volume_config[name] = {key: value}
- elif volume_config:
- raise TypeError(
- 'volume_config specified, but {} did not expect that.'.format(
- self.__class__.__name__))
- # Init private attrs
- self._libvirt_domain = None
- self._qdb_connection = None
- # We assume a fully halted VM here. The 'domain-init' handler will
- # check if the VM is already running.
- self._domain_stopped_event_received = True
- self._domain_stopped_event_handled = True
- self._domain_stopped_future = None
- # Internal lock to ensure ordering between _domain_stopped_coro() and
- # start(). This should not be accessed anywhere else.
- self._domain_stopped_lock = asyncio.Lock()
- if xml is None:
- # we are creating new VM and attributes came through kwargs
- assert hasattr(self, 'qid')
- assert hasattr(self, 'name')
- if xml is None:
- # new qube, disable updates check if requested for new qubes
- # SEE: 1637 when features are done, migrate to plugin
- if not self.app.check_updates_vm:
- self.features['check-updates'] = False
- # will be initialized after loading all the properties
- #: operations which shouldn't happen simultaneously with qube startup
- # (including another startup of the same qube)
- self.startup_lock = asyncio.Lock()
- # fire hooks
- if xml is None:
- self.events_enabled = True
- self.fire_event('domain-init')
- def close(self):
- if self._qdb_connection is not None:
- self._qdb_connection.close()
- self._qdb_connection = None
- if self._libvirt_domain is not None:
- self._libvirt_domain = None
- super().close()
- def __hash__(self):
- return self.qid
- def __lt__(self, other):
- return self.name < other.name
- def __xml__(self):
- # pylint: disable=no-member
- element = super().__xml__()
- # pylint: enable=no-member
- if hasattr(self, 'volumes'):
- volume_config_node = lxml.etree.Element('volume-config')
- for volume in self.volumes.values():
- volume_config_node.append(volume.__xml__())
- element.append(volume_config_node)
- return element
- #
- # event handlers
- #
- @qubes.events.handler('domain-init', 'domain-load')
- def on_domain_init_loaded(self, event):
- # pylint: disable=unused-argument
- if not hasattr(self, 'uuid'):
- # pylint: disable=attribute-defined-outside-init
- self.uuid = uuid.uuid4()
- # Initialize VM image storage class;
- # it might be already initialized by a recursive call from a child VM
- if self.storage is None:
- self.storage = qubes.storage.Storage(self)
- if not self.app.vmm.offline_mode and self.is_running():
- self.start_qdb_watch()
- self._domain_stopped_event_received = False
- self._domain_stopped_event_handled = False
- @qubes.events.handler('property-set:label')
- def on_property_set_label(self, event, name, newvalue, oldvalue=None):
- # pylint: disable=unused-argument
- # icon is calculated based on label
- self.fire_event('property-reset:icon', name='icon')
- @qubes.events.handler('property-pre-set:kernel')
- def on_property_pre_set_kernel(self, event, name, newvalue, oldvalue=None):
- # pylint: disable=unused-argument
- if not newvalue:
- return
- dirname = os.path.join(
- qubes.config.qubes_base_dir,
- qubes.config.system_path['qubes_kernels_base_dir'],
- newvalue)
- if not os.path.exists(dirname):
- raise qubes.exc.QubesPropertyValueError(
- self, self.property_get_def(name), newvalue,
- 'Kernel {!r} not installed'.format(
- newvalue))
- for filename in ('vmlinuz', 'initramfs'):
- if not os.path.exists(os.path.join(dirname, filename)):
- raise qubes.exc.QubesPropertyValueError(
- self, self.property_get_def(name), newvalue,
- 'Kernel {!r} not properly installed: '
- 'missing {!r} file'.format(
- newvalue, filename))
- @qubes.events.handler('property-pre-set:autostart')
- def on_property_pre_set_autostart(self, event, name, newvalue,
- oldvalue=None):
- # pylint: disable=unused-argument
- # workaround https://bugzilla.redhat.com/show_bug.cgi?id=1181922
- if newvalue:
- retcode = subprocess.call(
- ["sudo", "ln", "-sf",
- "/usr/lib/systemd/system/qubes-vm@.service",
- "/etc/systemd/system/multi-user.target.wants/qubes-vm@"
- "{}.service".format(self.name)])
- else:
- retcode = subprocess.call(
- ['sudo', 'systemctl', 'disable',
- 'qubes-vm@{}.service'.format(self.name)])
- if retcode:
- raise qubes.exc.QubesException(
- 'Failed to set autostart for VM in systemd')
- @qubes.events.handler('property-pre-reset:autostart')
- def on_property_pre_reset_autostart(self, event, name, oldvalue=None):
- # pylint: disable=unused-argument
- if oldvalue:
- retcode = subprocess.call(
- ['sudo', 'systemctl', 'disable',
- 'qubes-vm@{}.service'.format(self.name)])
- if retcode:
- raise qubes.exc.QubesException(
- 'Failed to reset autostart for VM in systemd')
- @qubes.events.handler('domain-remove-from-disk')
- def on_remove_from_disk(self, event, **kwargs):
- # pylint: disable=unused-argument
- if self.autostart:
- subprocess.call(
- ['sudo', 'systemctl', 'disable',
- 'qubes-vm@{}.service'.format(self.name)])
- @qubes.events.handler('domain-create-on-disk')
- def on_create_on_disk(self, event, **kwargs):
- # pylint: disable=unused-argument
- if self.autostart:
- subprocess.call(
- ['sudo', 'systemctl', 'enable',
- 'qubes-vm@{}.service'.format(self.name)])
- #
- # methods for changing domain state
- #
- async def _ensure_shutdown_handled(self):
- """Make sure previous shutdown is fully handled.
- MUST NOT be called when domain is running.
- """
- async with self._domain_stopped_lock:
- # Don't accept any new stopped event's till a new VM has been
- # created. If we didn't received any stopped event or it wasn't
- # handled yet we will handle this in the next lines.
- self._domain_stopped_event_received = True
- if self._domain_stopped_future is not None:
- # Libvirt stopped event was already received, so cancel the
- # future. If it didn't generate the Qubes events yet we
- # will do it below.
- self._domain_stopped_future.cancel()
- self._domain_stopped_future = None
- if not self._domain_stopped_event_handled:
- # No Qubes domain-stopped events have been generated yet.
- # So do this now.
- # Set this immediately such that we don't generate events
- # twice if an exception gets thrown.
- self._domain_stopped_event_handled = True
- await self.fire_event_async('domain-stopped')
- await self.fire_event_async('domain-shutdown')
- async def start(self, start_guid=True, notify_function=None,
- mem_required=None):
- """Start domain
- :param bool start_guid: FIXME
- :param collections.abc.Callable notify_function: FIXME
- :param int mem_required: FIXME
- """
- async with self.startup_lock:
- # check if domain wasn't removed in the meantime
- if self not in self.app.domains:
- raise qubes.exc.QubesVMNotFoundError(self.name)
- # Intentionally not used is_running(): eliminate also "Paused",
- # "Crashed", "Halting"
- if self.get_power_state() != 'Halted':
- return self
- await self._ensure_shutdown_handled()
- self.log.info('Starting {}'.format(self.name))
- try:
- await self.fire_event_async('domain-pre-start',
- pre_event=True,
- start_guid=start_guid,
- mem_required=mem_required)
- except Exception as exc:
- self.log.error('Start failed: %s', str(exc))
- await self.fire_event_async('domain-start-failed',
- reason=str(exc))
- raise
- qmemman_client = None
- try:
- for devclass in self.devices:
- for dev in self.devices[devclass].persistent():
- if isinstance(dev, qubes.devices.UnknownDevice):
- raise qubes.exc.QubesException(
- '{} device {} not available'.format(
- devclass, dev))
- if self.virt_mode == 'pvh' and not self.kernel:
- raise qubes.exc.QubesException(
- 'virt_mode PVH require kernel to be set')
- await self.storage.verify()
- if self.netvm is not None:
- # pylint: disable = no-member
- if self.netvm.qid != 0:
- if not self.netvm.is_running():
- await self.netvm.start(
- start_guid=start_guid,
- notify_function=notify_function)
- qmemman_client = await asyncio.get_event_loop(). \
- run_in_executor(None, self.request_memory, mem_required)
- await self.storage.start()
- except Exception as exc:
- self.log.error('Start failed: %s', str(exc))
- # let anyone receiving domain-pre-start know that startup failed
- await self.fire_event_async('domain-start-failed',
- reason=str(exc))
- if qmemman_client:
- qmemman_client.close()
- raise
- try:
- self._update_libvirt_domain()
- self.libvirt_domain.createWithFlags(
- libvirt.VIR_DOMAIN_START_PAUSED)
- # the above allocates xid, lets announce that
- self.fire_event('property-reset:xid', name='xid')
- self.fire_event('property-reset:stubdom_xid',
- name='stubdom_xid')
- self.fire_event('property-reset:start_time', name='start_time')
- except libvirt.libvirtError as exc:
- # missing IOMMU?
- if self.virt_mode == 'hvm' and \
- list(self.devices['pci'].persistent()) and \
- not self.app.host.is_iommu_supported():
- exc = qubes.exc.QubesException(
- 'Failed to start an HVM qube with PCI devices assigned '
- '- hardware does not support IOMMU/VT-d/AMD-Vi')
- self.log.error('Start failed: %s', str(exc))
- await self.fire_event_async('domain-start-failed',
- reason=str(exc))
- await self.storage.stop()
- raise exc
- except Exception as exc:
- self.log.error('Start failed: %s', str(exc))
- # let anyone receiving domain-pre-start know that startup failed
- await self.fire_event_async('domain-start-failed',
- reason=str(exc))
- await self.storage.stop()
- raise
- finally:
- if qmemman_client:
- qmemman_client.close()
- self._domain_stopped_event_received = False
- self._domain_stopped_event_handled = False
- try:
- await self.fire_event_async('domain-spawn',
- start_guid=start_guid)
- self.log.info('Setting Qubes DB info for the VM')
- await self.start_qubesdb()
- self.create_qdb_entries()
- self.start_qdb_watch()
- self.log.warning('Activating the {} VM'.format(self.name))
- self.libvirt_domain.resume()
- await self.start_qrexec_daemon()
- await self.fire_event_async('domain-start',
- start_guid=start_guid)
- except Exception as exc: # pylint: disable=bare-except
- self.log.error('Start failed: %s', str(exc))
- # This avoids losing the exception if an exception is
- # raised in self._kill_locked(), because the vm is not
- # running or paused
- try:
- await self._kill_locked()
- except qubes.exc.QubesVMNotStartedError:
- pass
- # let anyone receiving domain-pre-start know that startup failed
- await self.fire_event_async('domain-start-failed',
- reason=str(exc))
- raise
- return self
- def on_libvirt_domain_stopped(self):
- """ Handle VIR_DOMAIN_EVENT_STOPPED events from libvirt.
- This is not a Qubes event handler. Instead we do some sanity checks
- and synchronization with start() and then emits Qubes events.
- """
- state = self.get_power_state()
- if state not in ['Halted', 'Crashed', 'Dying']:
- self.log.warning('Stopped event from libvirt received,'
- ' but domain is in state {}!'.format(state))
- # ignore this unexpected event
- return
- if self._domain_stopped_event_received:
- # ignore this event - already triggered by shutdown(), kill(),
- # or subsequent start()
- return
- self._domain_stopped_event_received = True
- self._domain_stopped_future = \
- asyncio.ensure_future(self._domain_stopped_coro())
- async def _domain_stopped_coro(self):
- async with self._domain_stopped_lock:
- assert not self._domain_stopped_event_handled
- # Set this immediately such that we don't generate events twice if
- # an exception gets thrown.
- self._domain_stopped_event_handled = True
- while self.get_power_state() == 'Dying':
- await asyncio.sleep(0.25)
- await self.fire_event_async('domain-stopped')
- await self.fire_event_async('domain-shutdown')
- @qubes.events.handler('domain-stopped')
- @asyncio.coroutine
- def on_domain_stopped(self, _event, **_kwargs):
- """Cleanup after domain was stopped"""
- try:
- yield from self.storage.stop()
- except qubes.storage.StoragePoolException:
- self.log.exception('Failed to stop storage for domain %s',
- self.name)
- self.fire_event('property-reset:xid', name='xid')
- self.fire_event('property-reset:stubdom_xid', name='stubdom_xid')
- self.fire_event('property-reset:start_time', name='start_time')
- async def shutdown(self, force=False, wait=False, timeout=None):
- """Shutdown domain.
- :param force: ignored
- :param wait: wait for shutdown to complete
- :param timeout: shutdown wait timeout (for *wait*=True), defaults to
- :py:attr:`shutdown_timeout`
- :raises qubes.exc.QubesVMNotStartedError: \
- when domain is already shut down.
- """
- if self.is_halted():
- raise qubes.exc.QubesVMNotStartedError(self)
- try:
- await self.fire_event_async('domain-pre-shutdown',
- pre_event=True, force=force)
- self.libvirt_domain.shutdown()
- if wait:
- if timeout is None:
- timeout = self.shutdown_timeout
- while timeout > 0 and not self.is_halted():
- await asyncio.sleep(0.25)
- timeout -= 0.25
- async with self.startup_lock:
- if self.is_halted():
- # make sure all shutdown tasks are completed
- await self._ensure_shutdown_handled()
- else:
- raise qubes.exc.QubesVMShutdownTimeoutError(self)
- except Exception as ex:
- await self.fire_event_async('domain-shutdown-failed',
- reason=str(ex))
- raise
- return self
- async def kill(self):
- """Forcefully shutdown (destroy) domain.
- :raises qubes.exc.QubesVMNotStartedError: \
- when domain is already shut down.
- """
- if not self.is_running() and not self.is_paused():
- raise qubes.exc.QubesVMNotStartedError(self)
- async with self.startup_lock:
- await self._kill_locked()
- return self
- @asyncio.coroutine
- def _kill_locked(self):
- """Forcefully shutdown (destroy) domain.
- This function needs to be called with self.startup_lock held."""
- try:
- self.libvirt_domain.destroy()
- except libvirt.libvirtError as e:
- if e.get_error_code() == libvirt.VIR_ERR_OPERATION_INVALID:
- raise qubes.exc.QubesVMNotStartedError(self)
- raise
- # make sure all shutdown tasks are completed
- yield from self._ensure_shutdown_handled()
- @asyncio.coroutine
- def suspend(self):
- """Suspend (pause) domain.
- :raises qubes.exc.QubesVMNotRunnignError: \
- when domain is already shut down.
- """
- if not self.is_running() and not self.is_paused():
- raise qubes.exc.QubesVMNotRunningError(self)
- if list(self.devices['pci'].attached()):
- if self.features.check_with_template('qrexec', False):
- yield from self.run_service_for_stdio('qubes.SuspendPre',
- user='root')
- self.libvirt_domain.pMSuspendForDuration(
- libvirt.VIR_NODE_SUSPEND_TARGET_MEM, 0, 0)
- else:
- self.libvirt_domain.suspend()
- return self
- @asyncio.coroutine
- def pause(self):
- """Pause (suspend) domain."""
- if not self.is_running():
- raise qubes.exc.QubesVMNotRunningError(self)
- self.libvirt_domain.suspend()
- return self
- @asyncio.coroutine
- def resume(self):
- """Resume suspended domain.
- :raises qubes.exc.QubesVMNotSuspendedError: when machine is not paused
- :raises qubes.exc.QubesVMError: when machine is suspended
- """
- # pylint: disable=not-an-iterable
- if self.get_power_state() == "Suspended":
- self.libvirt_domain.pMWakeup()
- if self.features.check_with_template('qrexec', False):
- yield from self.run_service_for_stdio('qubes.SuspendPost',
- user='root')
- else:
- yield from self.unpause()
- return self
- @asyncio.coroutine
- def unpause(self):
- """Resume (unpause) a domain"""
- if not self.is_paused():
- raise qubes.exc.QubesVMNotPausedError(self)
- self.libvirt_domain.resume()
- return self
- async def run_service(self, service, source=None, user=None,
- filter_esc=False, autostart=False, gui=False, **kwargs):
- """Run service on this VM
- :param str service: service name
- :param qubes.vm.qubesvm.QubesVM source: source domain as presented to
- this VM
- :param str user: username to run service as
- :param bool filter_esc: filter escape sequences to protect terminal \
- emulator
- :param bool autostart: if :py:obj:`True`, machine will be started if \
- it is not running
- :param bool gui: when autostarting, also start gui daemon
- :rtype: asyncio.subprocess.Process
- .. note::
- User ``root`` is redefined to ``SYSTEM`` in the Windows agent code
- """
- # UNSUPPORTED from previous incarnation:
- # localcmd, wait, passio*, notify_function, `-e` switch
- #
- # - passio* and friends depend on params to command (like in stdlib)
- # - the filter_esc is orthogonal to passio*
- # - input: see run_service_for_stdio
- # - wait has no purpose since this is asynchronous
- # - notify_function is gone
- source = 'dom0' if source is None else self.app.domains[source].name
- if user is None:
- user = self.default_user
- if self.is_paused():
- # XXX what about autostart?
- raise qubes.exc.QubesVMNotRunningError(
- self, 'Domain {!r} is paused'.format(self.name))
- if not self.is_running():
- if not autostart:
- raise qubes.exc.QubesVMNotRunningError(self)
- await self.start(start_guid=gui)
- if not self.is_qrexec_running():
- raise qubes.exc.QubesVMError(
- self, 'Domain {!r}: qrexec not connected'.format(self.name))
- await self.fire_event_async('domain-cmd-pre-run', pre_event=True,
- start_guid=gui)
- return await asyncio.create_subprocess_exec(
- qubes.config.system_path['qrexec_client_path'],
- '-d', str(self.name),
- *(('-t', '-T') if filter_esc else ()),
- '{}:QUBESRPC {} {}'.format(user, service, source),
- **kwargs)
- async def run_service_for_stdio(self, *args, input=None, **kwargs):
- """Run a service, pass an optional input and return (stdout, stderr).
- Raises an exception if return code != 0.
- *args* and *kwargs* are passed verbatim to :py:meth:`run_service`.
- .. warning::
- There are some combinations if stdio-related *kwargs*, which are
- not filtered for problems originating between the keyboard and the
- chair.
- """ # pylint: disable=redefined-builtin
- kwargs.setdefault('stdin', subprocess.PIPE)
- kwargs.setdefault('stdout', subprocess.PIPE)
- kwargs.setdefault('stderr', subprocess.PIPE)
- if kwargs['stdin'] == subprocess.PIPE and input is None:
- # workaround for https://bugs.python.org/issue39744
- input = b''
- p = await self.run_service(*args, **kwargs)
- # this one is actually a tuple, but there is no need to unpack it
- stdouterr = await p.communicate(input=input)
- if p.returncode:
- raise subprocess.CalledProcessError(p.returncode,
- args[0], *stdouterr)
- return stdouterr
- async def run(self, command, user=None, **kwargs):
- """Run a shell command inside the domain using qrexec.
- This method is a coroutine.
- """ # pylint: disable=redefined-builtin
- if user is None:
- user = self.default_user
- return await asyncio.create_subprocess_exec(
- qubes.config.system_path['qrexec_client_path'],
- '-d', str(self.name),
- '{}:{}'.format(user, command),
- **kwargs)
- async def run_for_stdio(self, *args, input=None, **kwargs):
- """Run a shell command inside the domain using qrexec.
- This method is a coroutine.
- """ # pylint: disable=redefined-builtin
- kwargs.setdefault('stdin', subprocess.PIPE)
- kwargs.setdefault('stdout', subprocess.PIPE)
- kwargs.setdefault('stderr', subprocess.PIPE)
- if kwargs['stdin'] == subprocess.PIPE and input is None:
- # workaround for https://bugs.python.org/issue39744
- input = b''
- p = await self.run(*args, **kwargs)
- stdouterr = await p.communicate(input=input)
- if p.returncode:
- raise subprocess.CalledProcessError(p.returncode,
- args[0], *stdouterr)
- return stdouterr
- def is_memory_balancing_possible(self):
- """Check if memory balancing can be enabled.
- Reasons to not enable it:
- - have PCI devices
- - balloon driver not present
- We don't have reliable way to detect the second point, but good
- heuristic is HVM virt_mode (PV and PVH require OS support and it does
- include balloon driver) and lack of qrexec/meminfo-writer service
- support (no qubes tools installed).
- """
- if list(self.devices['pci'].persistent()):
- return False
- if self.virt_mode == 'hvm':
- # if VM announce any supported service
- features_set = set(self.features)
- template = getattr(self, 'template', None)
- while template is not None:
- features_set.update(template.features)
- template = getattr(template, 'template', None)
- supported_services = any(f.startswith('supported-service.')
- for f in features_set)
- if (not self.features.check_with_template('qrexec', False) or
- (supported_services and
- not self.features.check_with_template(
- 'supported-service.meminfo-writer', False))):
- return False
- return True
- def request_memory(self, mem_required=None):
- if not qmemman_present:
- return None
- if mem_required is None:
- if self.virt_mode == 'hvm':
- if self.stubdom_mem:
- stubdom_mem = self.stubdom_mem
- else:
- if self.features.check_with_template('linux-stubdom', True):
- stubdom_mem = 128 # from libxl_create.c
- else:
- stubdom_mem = 28 # from libxl_create.c
- stubdom_mem += 16 # video ram
- else:
- stubdom_mem = 0
- initial_memory = self.memory
- mem_required = int(initial_memory + stubdom_mem) * 1024 * 1024
- qmemman_client = qubes.qmemman.client.QMemmanClient()
- try:
- mem_required_with_overhead = mem_required + MEM_OVERHEAD_BASE \
- + self.vcpus * MEM_OVERHEAD_PER_VCPU
- got_memory = qmemman_client.request_memory(
- mem_required_with_overhead)
- except IOError as e:
- raise IOError('Failed to connect to qmemman: {!s}'.format(e))
- if not got_memory:
- qmemman_client.close()
- raise qubes.exc.QubesMemoryError(self)
- return qmemman_client
- @staticmethod
- @asyncio.coroutine
- def start_daemon(*command, input=None, **kwargs):
- """Start a daemon for the VM
- This function take care to run it as appropriate user.
- :param command: command to run (array for
- :py:meth:`subprocess.check_call`)
- :param kwargs: args for :py:meth:`subprocess.check_call`
- :return: None
- """ # pylint: disable=redefined-builtin
- if os.getuid() == 0:
- # try to always have VM daemons running as normal user, otherwise
- # some files (like clipboard) may be created as root and cause
- # permission problems
- qubes_group = grp.getgrnam('qubes')
- command = ['runuser', '-u', qubes_group.gr_mem[0], '--'] + \
- list(command)
- p = yield from asyncio.create_subprocess_exec(*command, **kwargs)
- stdout, stderr = yield from p.communicate(input=input)
- if p.returncode:
- raise subprocess.CalledProcessError(p.returncode, command,
- output=stdout, stderr=stderr)
- @asyncio.coroutine
- def start_qrexec_daemon(self):
- """Start qrexec daemon.
- :raises OSError: when starting fails.
- """
- self.log.debug('Starting the qrexec daemon')
- qrexec_args = [str(self.xid), self.name, self.default_user]
- if not self.debug:
- qrexec_args.insert(0, "-q")
- qrexec_env = os.environ.copy()
- if not self.features.check_with_template('qrexec', False):
- self.log.debug(
- 'Starting the qrexec daemon in background, because of features')
- qrexec_env['QREXEC_STARTUP_NOWAIT'] = '1'
- else:
- qrexec_env['QREXEC_STARTUP_TIMEOUT'] = str(self.qrexec_timeout)
- try:
- yield from self.start_daemon(
- qubes.config.system_path['qrexec_daemon_path'], *qrexec_args,
- env=qrexec_env, stderr=subprocess.PIPE)
- except subprocess.CalledProcessError as err:
- if err.returncode == 3:
- raise qubes.exc.QubesVMError(
- self,
- 'Cannot connect to qrexec agent for {} seconds, '
- 'see /var/log/xen/console/guest-{}.log for details'.format(
- self.qrexec_timeout, self.name
- ))
- raise qubes.exc.QubesVMError(
- self, 'qrexec-daemon startup failed: ' + err.stderr.decode())
- @asyncio.coroutine
- def start_qubesdb(self):
- """Start QubesDB daemon.
- :raises OSError: when starting fails.
- """
- # drop old connection to QubesDB, if any
- self._qdb_connection = None
- self.log.info('Starting Qubes DB')
- try:
- yield from self.start_daemon(
- qubes.config.system_path['qubesdb_daemon_path'],
- str(self.xid),
- self.name)
- except subprocess.CalledProcessError:
- raise qubes.exc.QubesException('Cannot execute qubesdb-daemon')
- @asyncio.coroutine
- def create_on_disk(self, pool=None, pools=None):
- """Create files needed for VM.
- """
- self.log.info('Creating directory: {0}'.format(self.dir_path))
- os.makedirs(self.dir_path, mode=0o775, exist_ok=True)
- if pool or pools:
- # pylint: disable=attribute-defined-outside-init
- self.volume_config = _patch_volume_config(self.volume_config, pool,
- pools)
- self.storage = qubes.storage.Storage(self)
- try:
- yield from self.storage.create()
- except:
- try:
- yield from self.storage.remove()
- os.rmdir(self.dir_path)
- except: # pylint: disable=bare-except
- self.log.exception('failed to cleanup {} after failed VM '
- 'creation'.format(self.dir_path))
- raise
- # fire hooks
- yield from self.fire_event_async('domain-create-on-disk')
- @asyncio.coroutine
- def remove_from_disk(self):
- """Remove domain remnants from disk."""
- if not self.is_halted():
- raise qubes.exc.QubesVMNotHaltedError(
- "Can't remove VM {!s}, because it's in state {!r}.".format(
- self, self.get_power_state()))
- # make sure shutdown is handled before removing anything, but only if
- # handling is pending; if not, we may be called from within
- # domain-shutdown event (DispVM._auto_cleanup), which would deadlock
- if not self._domain_stopped_event_handled:
- yield from self._ensure_shutdown_handled()
- yield from self.fire_event_async('domain-remove-from-disk')
- try:
- yield from self.storage.remove()
- finally:
- try:
- # TODO: make it async?
- shutil.rmtree(self.dir_path)
- except FileNotFoundError:
- pass
- @asyncio.coroutine
- def clone_disk_files(self, src, pool=None, pools=None, ):
- """Clone files from other vm.
- :param qubes.vm.qubesvm.QubesVM src: source VM
- """
- # If the current vm name is not a part of `self.app.domains.keys()`,
- # then the current vm is in creation process. Calling
- # `self.is_halted()` at this point, would instantiate libvirt, we want
- # avoid that.
- if self.name in self.app.domains.keys() and not self.is_halted():
- raise qubes.exc.QubesVMNotHaltedError(
- self, 'Cannot clone a running domain {!r}'.format(self.name))
- msg = "Destination {!s} already exists".format(self.dir_path)
- assert not os.path.exists(self.dir_path), msg
- self.log.info('Creating directory: {0}'.format(self.dir_path))
- os.makedirs(self.dir_path, mode=0o775, exist_ok=True)
- if pool or pools:
- # pylint: disable=attribute-defined-outside-init
- self.volume_config = _patch_volume_config(self.volume_config, pool,
- pools)
- self.storage = qubes.storage.Storage(self)
- yield from self.storage.clone(src)
- self.storage.verify()
- assert self.volumes != {}
- # fire hooks
- yield from self.fire_event_async('domain-clone-files', src=src)
- #
- # methods for querying domain state
- #
- # state of the machine
- def get_power_state(self):
- """Return power state description string.
- Return value may be one of those:
- =============== ========================================================
- return value meaning
- =============== ========================================================
- ``'Halted'`` Machine is not active.
- ``'Transient'`` Machine is running, but does not have :program:`guid`
- or :program:`qrexec` available.
- ``'Running'`` Machine is ready and running.
- ``'Paused'`` Machine is paused.
- ``'Suspended'`` Machine is S3-suspended.
- ``'Halting'`` Machine is in process of shutting down.
- ``'Dying'`` Machine is still in process of shutting down.
- ``'Crashed'`` Machine crashed and is unusable, probably because of
- bug in dom0.
- ``'NA'`` Machine is in unknown state (most likely libvirt domain
- is undefined).
- =============== ========================================================
- FIXME: graph below may be incomplete and wrong. Click on method name to
- see its documentation.
- .. graphviz::
- digraph {
- node [fontname="sans-serif"];
- edge [fontname="mono"];
- Halted;
- NA;
- Dying;
- Crashed;
- Transient;
- Halting;
- Running;
- Paused [color=gray75 fontcolor=gray75];
- Suspended;
- NA -> Halted;
- Halted -> NA [constraint=false];
- Halted -> Transient
- [xlabel="start()" URL="#qubes.vm.qubesvm.QubesVM.start"];
- Transient -> Running;
- Running -> Halting
- [xlabel="shutdown()"
- URL="#qubes.vm.qubesvm.QubesVM.shutdown"
- constraint=false];
- Halting -> Dying -> Halted [constraint=false];
- /* cosmetic, invisible edges to put rank constraint */
- Dying -> Halting [style="invis"];
- Halting -> Transient [style="invis"];
- Running -> Halted
- [label="kill()"
- URL="#qubes.vm.qubesvm.QubesVM.kill"
- constraint=false];
- Running -> Crashed [constraint=false];
- Crashed -> Halted [constraint=false];
- Running -> Paused
- [label="pause()" URL="#qubes.vm.qubesvm.QubesVM.pause"
- color=gray75 fontcolor=gray75];
- Running -> Suspended
- [label="suspend()" URL="#qubes.vm.qubesvm.QubesVM.suspend"
- color=gray50 fontcolor=gray50];
- Paused -> Running
- [label="unpause()" URL="#qubes.vm.qubesvm.QubesVM.unpause"
- color=gray75 fontcolor=gray75];
- Suspended -> Running
- [label="resume()" URL="#qubes.vm.qubesvm.QubesVM.resume"
- color=gray50 fontcolor=gray50];
- Running -> Suspended
- [label="suspend()" URL="#qubes.vm.qubesvm.QubesVM.suspend"];
- Suspended -> Running
- [label="resume()" URL="#qubes.vm.qubesvm.QubesVM.resume"];
- { rank=source; Halted NA };
- { rank=same; Transient Halting };
- { rank=same; Crashed Dying };
- { rank=sink; Paused Suspended };
- }
- .. seealso::
- http://wiki.libvirt.org/page/VM_lifecycle
- Description of VM life cycle from the point of view of libvirt.
- https://libvirt.org/html/libvirt-libvirt-domain.html#virDomainState
- Libvirt's enum describing precise state of a domain.
- """ # pylint: disable=too-many-return-statements
- # don't try to define libvirt domain, if it isn't there, VM surely
- # isn't running
- # reason for this "if": allow vm.is_running() in PCI (or other
- # device) extension while constructing libvirt XML
- if self.app.vmm.offline_mode:
- return 'Halted'
- if self._libvirt_domain is None:
- try:
- self._libvirt_domain = self.app.vmm.libvirt_conn.lookupByUUID(
- self.uuid.bytes)
- except libvirt.libvirtError as e:
- if e.get_error_code() == libvirt.VIR_ERR_NO_DOMAIN:
- return 'Halted'
- raise
- libvirt_domain = self.libvirt_domain
- if libvirt_domain is None:
- return 'Halted'
- try:
- if libvirt_domain.isActive():
- # pylint: disable=line-too-long
- if libvirt_domain.state()[0] == libvirt.VIR_DOMAIN_PAUSED:
- return "Paused"
- if libvirt_domain.state()[0] == libvirt.VIR_DOMAIN_CRASHED:
- return "Crashed"
- if libvirt_domain.state()[0] == libvirt.VIR_DOMAIN_SHUTDOWN:
- return "Halting"
- if libvirt_domain.state()[0] == libvirt.VIR_DOMAIN_SHUTOFF:
- return "Dying"
- if libvirt_domain.state()[
- 0] == libvirt.VIR_DOMAIN_PMSUSPENDED: # nopep8
- return "Suspended"
- if not self.is_fully_usable():
- return "Transient"
- return "Running"
- return 'Halted'
- except libvirt.libvirtError as e:
- if e.get_error_code() == libvirt.VIR_ERR_NO_DOMAIN:
- return 'Halted'
- raise
- assert False
- def is_halted(self):
- """ Check whether this domain's state is 'Halted'
- :returns: :py:obj:`True` if this domain is halted, \
- :py:obj:`False` otherwise.
- :rtype: bool
- """
- return self.get_power_state() == 'Halted'
- def is_running(self):
- """Check whether this domain is running.
- :returns: :py:obj:`True` if this domain is started, \
- :py:obj:`False` otherwise.
- :rtype: bool
- """
- if self.app.vmm.offline_mode:
- return False
- # don't try to define libvirt domain, if it isn't there, VM surely
- # isn't running
- # reason for this "if": allow vm.is_running() in PCI (or other
- # device) extension while constructing libvirt XML
- if self._libvirt_domain is None:
- try:
- self._libvirt_domain = self.app.vmm.libvirt_conn.lookupByUUID(
- self.uuid.bytes)
- except libvirt.libvirtError as e:
- if e.get_error_code() == libvirt.VIR_ERR_NO_DOMAIN:
- return False
- raise
- return bool(self.libvirt_domain.isActive())
- def is_paused(self):
- """Check whether this domain is paused.
- :returns: :py:obj:`True` if this domain is paused, \
- :py:obj:`False` otherwise.
- :rtype: bool
- """
- return self.libvirt_domain \
- and self.libvirt_domain.state()[0] == libvirt.VIR_DOMAIN_PAUSED
- def is_qrexec_running(self):
- """Check whether qrexec for this domain is available.
- :returns: :py:obj:`True` if qrexec is running, \
- :py:obj:`False` otherwise.
- :rtype: bool
- """
- if self.xid < 0: # pylint: disable=comparison-with-callable
- return False
- return os.path.exists('/var/run/qubes/qrexec.%s' % self.name)
- def is_fully_usable(self):
- return all(self.fire_event('domain-is-fully-usable'))
- @qubes.events.handler('domain-is-fully-usable')
- def on_domain_is_fully_usable(self, event):
- """Check whether domain is running and sane.
- Currently this checks for running qrexec.
- """ # pylint: disable=unused-argument
- if self.features.check_with_template('qrexec', False):
- # Running gui-daemon implies also VM running
- yield self.is_qrexec_running()
- else:
- yield True
- # memory and disk
- def get_mem(self):
- """Get current memory usage from VM.
- :returns: Memory usage [FIXME unit].
- :rtype: FIXME
- """
- if self.libvirt_domain is None:
- return 0
- try:
- if not self.libvirt_domain.isActive():
- return 0
- return self.libvirt_domain.info()[1]
- except libvirt.libvirtError as e:
- if e.get_error_code() in (
- # qube no longer exists
- libvirt.VIR_ERR_NO_DOMAIN,
- # libxl_domain_info failed (race condition from isActive)
- libvirt.VIR_ERR_INTERNAL_ERROR):
- return 0
- self.log.exception(
- 'libvirt error code: {!r}'.format(e.get_error_code()))
- raise
- def get_mem_static_max(self):
- """Get maximum memory available to VM.
- :returns: Memory limit [FIXME unit].
- :rtype: FIXME
- """
- if self.libvirt_domain is None:
- return 0
- try:
- return self.libvirt_domain.maxMemory()
- except libvirt.libvirtError as e:
- if e.get_error_code() in (
- # qube no longer exists
- libvirt.VIR_ERR_NO_DOMAIN,
- # libxl_domain_info failed (race condition from isActive)
- libvirt.VIR_ERR_INTERNAL_ERROR):
- return 0
- self.log.exception(
- 'libvirt error code: {!r}'.format(e.get_error_code()))
- raise
- def get_cputime(self):
- """Get total CPU time burned by this domain since start.
- :returns: CPU time usage [FIXME unit].
- :rtype: FIXME
- """
- if self.libvirt_domain is None:
- return 0
- if self.libvirt_domain is None:
- return 0
- if not self.libvirt_domain.isActive():
- return 0
- try:
- if not self.libvirt_domain.isActive():
- return 0
- # this does not work, because libvirt
- # return self.libvirt_domain.getCPUStats(
- # libvirt.VIR_NODE_CPU_STATS_ALL_CPUS, 0)[0]['cpu_time']/10**9
- return self.libvirt_domain.info()[4]
- except libvirt.libvirtError as e:
- if e.get_error_code() in (
- # qube no longer exists
- libvirt.VIR_ERR_NO_DOMAIN,
- # libxl_domain_info failed (race condition from isActive)
- libvirt.VIR_ERR_INTERNAL_ERROR):
- return 0
- self.log.exception(
- 'libvirt error code: {!r}'.format(e.get_error_code()))
- raise
- # miscellanous
- @qubes.stateless_property
- def start_time(self):
- """Tell when machine was started.
- :rtype: float or None
- """
- if not self.is_running():
- return None
- # TODO shouldn't this be qubesdb?
- start_time = self.app.vmm.xs.read('',
- '/vm/{}/start_time'.format(self.uuid))
- if start_time != '':
- return float(start_time)
- return None
- @qubes.stateless_property
- def icon(self):
- """freedesktop icon name, suitable for use in
- :py:meth:`PyQt4.QtGui.QIcon.fromTheme`"""
- # pylint: disable=comparison-with-callable
- raw_icon_name = self.label.name
- if self.klass == 'TemplateVM':
- return 'templatevm-' + raw_icon_name
- if self.klass == 'DispVM':
- return 'dispvm-' + raw_icon_name
- if self.features.get('servicevm', False):
- return 'servicevm-' + raw_icon_name
- return 'appvm-' + raw_icon_name
- @property
- def kernelopts_common(self):
- """Kernel options which should be used in addition to *kernelopts*
- property.
- This is specific to kernel (and initrd if any)
- """
- if not self.kernel:
- return ''
- kernels_dir = self.storage.kernels_dir
- kernelopts_path = os.path.join(kernels_dir,
- 'default-kernelopts-common.txt')
- if os.path.exists(kernelopts_path):
- with open(kernelopts_path) as f_kernelopts:
- return f_kernelopts.read().rstrip('\n\r')
- else:
- return qubes.config.defaults['kernelopts_common']
- #
- # helper methods
- #
- def relative_path(self, path):
- """Return path relative to py:attr:`dir_path`.
- :param str path: Path in question.
- :returns: Relative path.
- """
- return os.path.relpath(path, self.dir_path)
- def create_qdb_entries(self):
- """Create entries in Qubes DB.
- """
- # pylint: disable=no-member
- self.untrusted_qdb.write('/name', self.name)
- self.untrusted_qdb.write('/type', self.__class__.__name__)
- self.untrusted_qdb.write('/default-user', self.default_user)
- self.untrusted_qdb.write('/qubes-vm-updateable', str(self.updateable))
- self.untrusted_qdb.write('/qubes-vm-persistence',
- 'full' if self.updateable else 'rw-only')
- self.untrusted_qdb.write('/qubes-debug-mode', str(int(self.debug)))
- try:
- self.untrusted_qdb.write('/qubes-base-template', self.template.name)
- except AttributeError:
- self.untrusted_qdb.write('/qubes-base-template', '')
- self.untrusted_qdb.write('/qubes-random-seed',
- base64.b64encode(qubes.utils.urandom(64)))
- if self.provides_network:
- # '/qubes-netvm-network' value is only checked for being non empty
- self.untrusted_qdb.write('/qubes-netvm-network', str(self.gateway))
- self.untrusted_qdb.write('/qubes-netvm-gateway', str(self.gateway))
- if self.gateway6: # pylint: disable=using-constant-test
- self.untrusted_qdb.write('/qubes-netvm-gateway6',
- str(self.gateway6))
- self.untrusted_qdb.write('/qubes-netvm-netmask', str(self.netmask))
- for i, addr in zip(('primary', 'secondary'), self.dns):
- self.untrusted_qdb.write('/qubes-netvm-{}-dns'.format(i), addr)
- if self.netvm is not None:
- self.untrusted_qdb.write('/qubes-mac', str(self.mac))
- self.untrusted_qdb.write('/qubes-ip', str(self.visible_ip))
- self.untrusted_qdb.write('/qubes-netmask',
- str(self.visible_netmask))
- self.untrusted_qdb.write('/qubes-gateway',
- str(self.visible_gateway))
- for i, addr in zip(('primary', 'secondary'), self.dns):
- self.untrusted_qdb.write('/qubes-{}-dns'.format(i), str(addr))
- if self.visible_ip6: # pylint: disable=using-constant-test
- self.untrusted_qdb.write('/qubes-ip6', str(self.visible_ip6))
- if self.visible_gateway6: # pylint: disable=using-constant-test
- self.untrusted_qdb.write('/qubes-gateway6',
- str(self.visible_gateway6))
- tzname = qubes.utils.get_timezone()
- if tzname:
- self.untrusted_qdb.write('/qubes-timezone', tzname)
- self.untrusted_qdb.write('/qubes-block-devices', '')
- self.untrusted_qdb.write('/qubes-usb-devices', '')
- # TODO: Currently the whole qmemman is quite Xen-specific, so stay with
- # xenstore for it until decided otherwise
- if qmemman_present:
- self.app.vmm.xs.set_permissions('',
- '/local/domain/{}/memory'.format(
- self.xid),
- [{'dom': self.xid}])
- self.fire_event('domain-qdb-create')
- # TODO async; update this in constructor
- def _update_libvirt_domain(self):
- """Re-initialise :py:attr:`libvirt_domain`."""
- domain_config = self.create_config_file()
- try:
- self._libvirt_domain = self.app.vmm.libvirt_conn.defineXML(
- domain_config)
- except libvirt.libvirtError as e:
- if e.get_error_code() == libvirt.VIR_ERR_OS_TYPE \
- and e.get_str2() == 'hvm':
- raise qubes.exc.QubesVMError(
- self,
- 'HVM qubes are not supported on this machine. '
- 'Check BIOS settings for VT-x/AMD-V extensions.')
- raise
- #
- # workshop -- those are to be reworked later
- #
- def get_prefmem(self):
- # TODO: qmemman is still xen specific
- untrusted_meminfo_key = self.app.vmm.xs.read(
- '', '/local/domain/{}/memory/meminfo'.format(self.xid))
- if untrusted_meminfo_key is None or untrusted_meminfo_key == '':
- return 0
- domain = qubes.qmemman.DomainState(self.xid)
- qubes.qmemman.algo.refresh_meminfo_for_domain(
- domain, untrusted_meminfo_key)
- if domain.mem_used is None:
- # apparently invalid xenstore content
- return 0
- domain.memory_maximum = self.get_mem_static_max() * 1024
- return qubes.qmemman.algo.prefmem(domain) / 1024
- def _clean_volume_config(config):
- common_attributes = ['name', 'pool', 'size',
- 'rw', 'snap_on_start',
- 'save_on_stop', 'source']
- return {k: v for k, v in config.items() if k in common_attributes}
- def _patch_pool_config(config, pool=None, pools=None):
- assert pool is not None or pools is not None
- is_snapshot = config['snap_on_start']
- is_rw = config['rw']
- name = config['name']
- if pool and not is_snapshot and is_rw:
- config['pool'] = str(pool)
- elif pool:
- pass
- elif pools and name in pools.keys():
- if not is_snapshot:
- config['pool'] = str(pools[name])
- else:
- msg = "Snapshot volume {0!s} must be in the same pool as its " \
- "origin ({0!s} volume of template)," \
- "cannot move to pool {1!s} " \
- .format(name, pools[name])
- raise qubes.exc.QubesException(msg)
- return config
- def _patch_volume_config(volume_config, pool=None, pools=None):
- assert not (pool and pools), \
- 'You can not pass pool & pools parameter at same time'
- assert pool or pools
- result = {}
- for name, config in volume_config.items():
- # copy only the subset of volume_config key/values
- dst_config = _clean_volume_config(config)
- if pool is not None or pools is not None:
- dst_config = _patch_pool_config(dst_config, pool, pools)
- result[name] = dst_config
- return result
|