123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339 |
- #!/usr/bin/python2
- #
- # The Qubes OS Project, http://www.qubes-os.org
- #
- # Copyright (C) 2010 Joanna Rutkowska <joanna@invisiblethingslab.com>
- # Copyright (C) 2013 Marek Marczykowski <marmarek@invisiblethingslab.com>
- #
- # This program is free software; you can redistribute it and/or
- # modify it under the terms of the GNU General Public License
- # as published by the Free Software Foundation; either version 2
- # of the License, or (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU General Public License for more details.
- #
- # You should have received a copy of the GNU General Public License
- # along with this program; if not, write to the Free Software
- # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
- #
- #
- import os
- import os.path
- import subprocess
- import sys
- import re
- from qubes.qubes import QubesVm,register_qubes_vm_class,xs,xc,dry_run
- from qubes.qubes import QubesException
- from qubes.qubes import system_path,defaults
- system_path["config_template_hvm"] = '/usr/share/qubes/vm-template-hvm.conf'
- defaults["hvm_disk_size"] = 20*1024*1024*1024
- defaults["hvm_private_img_size"] = 2*1024*1024*1024
- defaults["hvm_memory"] = 512
- class QubesHVm(QubesVm):
- """
- A class that represents an HVM. A child of QubesVm.
- """
- # FIXME: logically should inherit after QubesAppVm, but none of its methods
- # are useful for HVM
- def get_attrs_config(self):
- attrs = super(QubesHVm, self).get_attrs_config()
- attrs.pop('kernel')
- attrs.pop('kernels_dir')
- attrs.pop('kernelopts')
- attrs.pop('uses_default_kernel')
- attrs.pop('uses_default_kernelopts')
- attrs['dir_path']['eval'] = 'value if value is not None else os.path.join(system_path["qubes_appvms_dir"], self.name)'
- attrs['volatile_img']['eval'] = 'None'
- attrs['config_file_template']['eval'] = 'system_path["config_template_hvm"]'
- attrs['drive'] = { 'save': 'str(self.drive)' }
- attrs['maxmem'].pop('save')
- attrs['timezone'] = { 'default': 'localtime', 'save': 'str(self.timezone)' }
- attrs['qrexec_installed'] = { 'default': False, 'save': 'str(self.qrexec_installed)' }
- attrs['guiagent_installed'] = { 'default' : False, 'save': 'str(self.guiagent_installed)' }
- attrs['_start_guid_first']['eval'] = 'True'
- attrs['services']['default'] = "{'meminfo-writer': False}"
- # only standalone HVM supported for now
- attrs['template']['eval'] = 'None'
- attrs['memory']['default'] = defaults["hvm_memory"]
- return attrs
- def __init__(self, **kwargs):
- super(QubesHVm, self).__init__(**kwargs)
- # Default for meminfo-writer have changed to (correct) False in the
- # same version as introduction of guiagent_installed, so for older VMs
- # with wrong setting, change is based on 'guiagent_installed' presence
- if "guiagent_installed" not in kwargs and \
- (not 'xml_element' in kwargs or kwargs['xml_element'].get('guiagent_installed') is None):
- self.services['meminfo-writer'] = False
- # HVM normally doesn't support dynamic memory management
- if not ('meminfo-writer' in self.services and self.services['meminfo-writer']):
- self.maxmem = self.memory
- # Disable qemu GUID if the user installed qubes gui agent
- if self.guiagent_installed:
- self._start_guid_first = False
- @property
- def type(self):
- return "HVM"
- def is_appvm(self):
- return True
- def get_clone_attrs(self):
- attrs = super(QubesHVm, self).get_clone_attrs()
- attrs.remove('kernel')
- attrs.remove('uses_default_kernel')
- attrs.remove('kernelopts')
- attrs.remove('uses_default_kernelopts')
- attrs += [ 'timezone' ]
- attrs += [ 'qrexec_installed' ]
- attrs += [ 'guiagent_installed' ]
- return attrs
- def create_on_disk(self, verbose, source_template = None):
- if dry_run:
- return
- if verbose:
- print >> sys.stderr, "--> Creating directory: {0}".format(self.dir_path)
- os.mkdir (self.dir_path)
- if verbose:
- print >> sys.stderr, "--> Creating icon symlink: {0} -> {1}".format(self.icon_path, self.label.icon_path)
- os.symlink (self.label.icon_path, self.icon_path)
- self.create_config_file()
- # create empty disk
- f_root = open(self.root_img, "w")
- f_root.truncate(defaults["hvm_disk_size"])
- f_root.close()
- # create empty private.img
- f_private = open(self.private_img, "w")
- f_private.truncate(defaults["hvm_private_img_size"])
- f_root.close()
- # fire hooks
- for hook in self.hooks_create_on_disk:
- hook(self, verbose, source_template=source_template)
- def get_disk_utilization_private_img(self):
- return 0
- def get_private_img_sz(self):
- return 0
- def resize_private_img(self, size):
- raise NotImplementedError("HVM has no private.img")
- def get_config_params(self, source_template=None):
- params = super(QubesHVm, self).get_config_params(source_template=source_template)
- params['volatiledev'] = ''
- if self.drive:
- type_mode = ":cdrom,r"
- drive_path = self.drive
- # leave empty to use standard syntax in case of dom0
- backend_domain = ""
- if drive_path.startswith("hd:"):
- type_mode = ",w"
- drive_path = drive_path[3:]
- elif drive_path.startswith("cdrom:"):
- type_mode = ":cdrom,r"
- drive_path = drive_path[6:]
- backend_split = re.match(r"^([a-zA-Z0-9-]*):(.*)", drive_path)
- if backend_split:
- backend_domain = "," + backend_split.group(1)
- drive_path = backend_split.group(2)
- # FIXME: os.stat will work only when backend in dom0...
- stat_res = None
- if backend_domain == "":
- stat_res = os.stat(drive_path)
- if stat_res and stat.S_ISBLK(stat_res.st_mode):
- params['otherdevs'] = "'phy:%s,xvdc%s%s'," % (drive_path, type_mode, backend_domain)
- else:
- params['otherdevs'] = "'script:file:%s,xvdc%s%s'," % (drive_path, type_mode, backend_domain)
- else:
- params['otherdevs'] = ''
- # Disable currently unused private.img - to be enabled when TemplateHVm done
- params['privatedev'] = ''
- if self.timezone.lower() == 'localtime':
- params['localtime'] = '1'
- params['timeoffset'] = '0'
- elif self.timezone.isdigit():
- params['localtime'] = '0'
- params['timeoffset'] = self.timezone
- else:
- print >>sys.stderr, "WARNING: invalid 'timezone' value: %s" % self.timezone
- params['localtime'] = '0'
- params['timeoffset'] = '0'
- return params
- def verify_files(self):
- if dry_run:
- return
- if not os.path.exists (self.dir_path):
- raise QubesException (
- "VM directory doesn't exist: {0}".\
- format(self.dir_path))
- if self.is_updateable() and not os.path.exists (self.root_img):
- raise QubesException (
- "VM root image file doesn't exist: {0}".\
- format(self.root_img))
- if not os.path.exists (self.private_img):
- print >>sys.stderr, "WARNING: Creating empty VM private image file: {0}".\
- format(self.private_img)
- f_private = open(self.private_img, "w")
- f_private.truncate(defaults["hvm_private_img_size"])
- f_private.close()
- # fire hooks
- for hook in self.hooks_verify_files:
- hook(self)
- return True
- def reset_volatile_storage(self, **kwargs):
- pass
- @property
- def vif(self):
- if self.xid < 0:
- return None
- if self.netvm is None:
- return None
- return "vif{0}.+".format(self.stubdom_xid)
- def run(self, command, **kwargs):
- if self.qrexec_installed:
- if 'gui' in kwargs and kwargs['gui']==False:
- command = "nogui:" + command
- return super(QubesHVm, self).run(command, **kwargs)
- else:
- raise QubesException("Needs qrexec agent installed in VM to use this function. See also qvm-prefs.")
- @property
- def stubdom_xid(self):
- if self.xid < 0:
- return -1
- stubdom_xid_str = xs.read('', '/local/domain/%d/image/device-model-domid' % self.xid)
- if stubdom_xid_str is not None:
- return int(stubdom_xid_str)
- else:
- return -1
- def start_guid(self, verbose = True, notify_function = None):
- # If user force the guiagent, start_guid will mimic a standard QubesVM
- if self.guiagent_installed:
- super(QubesHVm, self).start_guid(verbose, notify_function)
- else:
- if verbose:
- print >> sys.stderr, "--> Starting Qubes GUId..."
- retcode = subprocess.call ([system_path["qubes_guid_path"], "-d", str(self.stubdom_xid), "-c", self.label.color, "-i", self.label.icon_path, "-l", str(self.label.index)])
- if (retcode != 0) :
- raise QubesException("Cannot start qubes-guid!")
- def start_qrexec_daemon(self, **kwargs):
- if not self.qrexec_installed:
- if kwargs.get('verbose', False):
- print >> sys.stderr, "--> Starting the qrexec daemon..."
- xid = self.get_xid()
- qrexec_env = os.environ
- qrexec_env['QREXEC_STARTUP_NOWAIT'] = '1'
- retcode = subprocess.call ([system_path["qrexec_daemon_path"], str(xid), self.name, self.default_user], env=qrexec_env)
- if (retcode != 0) :
- self.force_shutdown(xid=xid)
- raise OSError ("ERROR: Cannot execute qrexec-daemon!")
- else:
- super(QubesHVm, self).start_qrexec_daemon(**kwargs)
- if self._start_guid_first:
- if kwargs.get('verbose'):
- print >> sys.stderr, "--> Waiting for user '%s' login..." % self.default_user
- self.wait_for_session(notify_function=kwargs.get('notify_function', None))
- def create_xenstore_entries(self, xid = None):
- if dry_run:
- return
- super(QubesHVm, self).create_xenstore_entries(xid)
- if xid is None:
- xid = self.xid
- domain_path = xs.get_domain_path(xid)
- # Prepare xenstore directory for tools advertise
- xs.write('',
- "{0}/qubes-tools".format(domain_path),
- '')
- # Allow VM writes there
- xs.set_permissions('', '{0}/qubes-tools'.format(domain_path),
- [{ 'dom': xid }])
- def suspend(self):
- if dry_run:
- return
- if not self.is_running() and not self.is_paused():
- raise QubesException ("VM not running!")
- self.pause()
- def pause(self):
- if dry_run:
- return
- xc.domain_pause(self.stubdom_xid)
- super(QubesHVm, self).pause()
- def unpause(self):
- if dry_run:
- return
- xc.domain_unpause(self.stubdom_xid)
- super(QubesHVm, self).unpause()
- def is_guid_running(self):
- # If user force the guiagent, is_guid_running will mimic a standard QubesVM
- if self.guiagent_installed:
- return super(QubesHVm, self).is_guid_running()
- else:
- xid = self.stubdom_xid
- if xid < 0:
- return False
- if not os.path.exists('/var/run/qubes/guid-running.%d' % xid):
- return False
- return True
- register_qubes_vm_class(QubesHVm)
|