5
0
mirror of git://git.proxmox.com/git/qemu-server.git synced 2025-01-08 21:18:03 +03:00
qemu-server/PVE/QemuServer.pm
Fabian Ebner 3ab0f9252a destroy VM: also check if unused volumes are base images
It's arguably not likely in practice that only an unused volume is still in use
as a base image, but do it for completeness sake.

Signed-off-by: Fabian Ebner <f.ebner@proxmox.com>
2021-05-28 12:12:50 +02:00

7728 lines
221 KiB
Perl

package PVE::QemuServer;
use strict;
use warnings;
use Cwd 'abs_path';
use Digest::SHA;
use Fcntl ':flock';
use Fcntl;
use File::Basename;
use File::Copy qw(copy);
use File::Path;
use File::stat;
use Getopt::Long;
use IO::Dir;
use IO::File;
use IO::Handle;
use IO::Select;
use IO::Socket::UNIX;
use IPC::Open3;
use JSON;
use MIME::Base64;
use POSIX;
use Storable qw(dclone);
use Time::HiRes qw(gettimeofday);
use URI::Escape;
use UUID;
use PVE::Cluster qw(cfs_register_file cfs_read_file cfs_write_file);
use PVE::CGroup;
use PVE::DataCenterConfig;
use PVE::Exception qw(raise raise_param_exc);
use PVE::Format qw(render_duration render_bytes);
use PVE::GuestHelpers qw(safe_string_ne safe_num_ne safe_boolean_ne);
use PVE::INotify;
use PVE::JSONSchema qw(get_standard_option parse_property_string);
use PVE::ProcFSTools;
use PVE::PBSClient;
use PVE::RPCEnvironment;
use PVE::Storage;
use PVE::SysFSTools;
use PVE::Systemd;
use PVE::Tools qw(run_command file_read_firstline file_get_contents dir_glob_foreach get_host_arch $IPV6RE);
use PVE::QMPClient;
use PVE::QemuConfig;
use PVE::QemuServer::Helpers qw(min_version config_aware_timeout);
use PVE::QemuServer::Cloudinit;
use PVE::QemuServer::CGroup;
use PVE::QemuServer::CPUConfig qw(print_cpu_device get_cpu_options);
use PVE::QemuServer::Drive qw(is_valid_drivename drive_is_cloudinit drive_is_cdrom parse_drive print_drive);
use PVE::QemuServer::Machine;
use PVE::QemuServer::Memory;
use PVE::QemuServer::Monitor qw(mon_cmd);
use PVE::QemuServer::PCI qw(print_pci_addr print_pcie_addr print_pcie_root_port parse_hostpci);
use PVE::QemuServer::USB qw(parse_usb_device);
my $have_sdn;
eval {
require PVE::Network::SDN::Zones;
$have_sdn = 1;
};
my $EDK2_FW_BASE = '/usr/share/pve-edk2-firmware/';
my $OVMF = {
x86_64 => [
"$EDK2_FW_BASE/OVMF_CODE.fd",
"$EDK2_FW_BASE/OVMF_VARS.fd"
],
aarch64 => [
"$EDK2_FW_BASE/AAVMF_CODE.fd",
"$EDK2_FW_BASE/AAVMF_VARS.fd"
],
};
my $cpuinfo = PVE::ProcFSTools::read_cpuinfo();
# Note about locking: we use flock on the config file protect
# against concurent actions.
# Aditionaly, we have a 'lock' setting in the config file. This
# can be set to 'migrate', 'backup', 'snapshot' or 'rollback'. Most actions are not
# allowed when such lock is set. But you can ignore this kind of
# lock with the --skiplock flag.
cfs_register_file('/qemu-server/',
\&parse_vm_config,
\&write_vm_config);
PVE::JSONSchema::register_standard_option('pve-qm-stateuri', {
description => "Some command save/restore state from this location.",
type => 'string',
maxLength => 128,
optional => 1,
});
PVE::JSONSchema::register_standard_option('pve-qemu-machine', {
description => "Specifies the Qemu machine type.",
type => 'string',
pattern => '(pc|pc(-i440fx)?-\d+(\.\d+)+(\+pve\d+)?(\.pxe)?|q35|pc-q35-\d+(\.\d+)+(\+pve\d+)?(\.pxe)?|virt(?:-\d+(\.\d+)+)?(\+pve\d+)?)',
maxLength => 40,
optional => 1,
});
sub map_storage {
my ($map, $source) = @_;
return $source if !defined($map);
return $map->{entries}->{$source}
if $map->{entries} && defined($map->{entries}->{$source});
return $map->{default} if $map->{default};
# identity (fallback)
return $source;
}
PVE::JSONSchema::register_standard_option('pve-targetstorage', {
description => "Mapping from source to target storages. Providing only a single storage ID maps all source storages to that storage. Providing the special value '1' will map each source storage to itself.",
type => 'string',
format => 'storagepair-list',
optional => 1,
});
#no warnings 'redefine';
my $nodename_cache;
sub nodename {
$nodename_cache //= PVE::INotify::nodename();
return $nodename_cache;
}
my $watchdog_fmt = {
model => {
default_key => 1,
type => 'string',
enum => [qw(i6300esb ib700)],
description => "Watchdog type to emulate.",
default => 'i6300esb',
optional => 1,
},
action => {
type => 'string',
enum => [qw(reset shutdown poweroff pause debug none)],
description => "The action to perform if after activation the guest fails to poll the watchdog in time.",
optional => 1,
},
};
PVE::JSONSchema::register_format('pve-qm-watchdog', $watchdog_fmt);
my $agent_fmt = {
enabled => {
description => "Enable/disable Qemu GuestAgent.",
type => 'boolean',
default => 0,
default_key => 1,
},
fstrim_cloned_disks => {
description => "Run fstrim after moving a disk or migrating the VM.",
type => 'boolean',
optional => 1,
default => 0
},
type => {
description => "Select the agent type",
type => 'string',
default => 'virtio',
optional => 1,
enum => [qw(virtio isa)],
},
};
my $vga_fmt = {
type => {
description => "Select the VGA type.",
type => 'string',
default => 'std',
optional => 1,
default_key => 1,
enum => [qw(cirrus qxl qxl2 qxl3 qxl4 none serial0 serial1 serial2 serial3 std virtio vmware)],
},
memory => {
description => "Sets the VGA memory (in MiB). Has no effect with serial display.",
type => 'integer',
optional => 1,
minimum => 4,
maximum => 512,
},
};
my $ivshmem_fmt = {
size => {
type => 'integer',
minimum => 1,
description => "The size of the file in MB.",
},
name => {
type => 'string',
pattern => '[a-zA-Z0-9\-]+',
optional => 1,
format_description => 'string',
description => "The name of the file. Will be prefixed with 'pve-shm-'. Default is the VMID. Will be deleted when the VM is stopped.",
},
};
my $audio_fmt = {
device => {
type => 'string',
enum => [qw(ich9-intel-hda intel-hda AC97)],
description => "Configure an audio device."
},
driver => {
type => 'string',
enum => ['spice', 'none'],
default => 'spice',
optional => 1,
description => "Driver backend for the audio device."
},
};
my $spice_enhancements_fmt = {
foldersharing => {
type => 'boolean',
optional => 1,
default => '0',
description => "Enable folder sharing via SPICE. Needs Spice-WebDAV daemon installed in the VM."
},
videostreaming => {
type => 'string',
enum => ['off', 'all', 'filter'],
default => 'off',
optional => 1,
description => "Enable video streaming. Uses compression for detected video streams."
},
};
my $rng_fmt = {
source => {
type => 'string',
enum => ['/dev/urandom', '/dev/random', '/dev/hwrng'],
default_key => 1,
description => "The file on the host to gather entropy from. In most"
. " cases /dev/urandom should be preferred over /dev/random"
. " to avoid entropy-starvation issues on the host. Using"
. " urandom does *not* decrease security in any meaningful"
. " way, as it's still seeded from real entropy, and the"
. " bytes provided will most likely be mixed with real"
. " entropy on the guest as well. /dev/hwrng can be used"
. " to pass through a hardware RNG from the host.",
},
max_bytes => {
type => 'integer',
description => "Maximum bytes of entropy injected into the guest every"
. " 'period' milliseconds. Prefer a lower value when using"
. " /dev/random as source. Use 0 to disable limiting"
. " (potentially dangerous!).",
optional => 1,
# default is 1 KiB/s, provides enough entropy to the guest to avoid
# boot-starvation issues (e.g. systemd etc...) while allowing no chance
# of overwhelming the host, provided we're reading from /dev/urandom
default => 1024,
},
period => {
type => 'integer',
description => "Every 'period' milliseconds the entropy-injection quota"
. " is reset, allowing the guest to retrieve another"
. " 'max_bytes' of entropy.",
optional => 1,
default => 1000,
},
};
my $confdesc = {
onboot => {
optional => 1,
type => 'boolean',
description => "Specifies whether a VM will be started during system bootup.",
default => 0,
},
autostart => {
optional => 1,
type => 'boolean',
description => "Automatic restart after crash (currently ignored).",
default => 0,
},
hotplug => {
optional => 1,
type => 'string', format => 'pve-hotplug-features',
description => "Selectively enable hotplug features. This is a comma separated list of hotplug features: 'network', 'disk', 'cpu', 'memory' and 'usb'. Use '0' to disable hotplug completely. Value '1' is an alias for the default 'network,disk,usb'.",
default => 'network,disk,usb',
},
reboot => {
optional => 1,
type => 'boolean',
description => "Allow reboot. If set to '0' the VM exit on reboot.",
default => 1,
},
lock => {
optional => 1,
type => 'string',
description => "Lock/unlock the VM.",
enum => [qw(backup clone create migrate rollback snapshot snapshot-delete suspending suspended)],
},
cpulimit => {
optional => 1,
type => 'number',
description => "Limit of CPU usage.",
verbose_description => "Limit of CPU usage.\n\nNOTE: If the computer has 2 CPUs, it has total of '2' CPU time. Value '0' indicates no CPU limit.",
minimum => 0,
maximum => 128,
default => 0,
},
cpuunits => {
optional => 1,
type => 'integer',
description => "CPU weight for a VM.",
verbose_description => "CPU weight for a VM. Argument is used in the kernel fair scheduler. The larger the number is, the more CPU time this VM gets. Number is relative to weights of all the other running VMs.",
minimum => 2,
maximum => 262144,
default => 1024,
},
memory => {
optional => 1,
type => 'integer',
description => "Amount of RAM for the VM in MB. This is the maximum available memory when you use the balloon device.",
minimum => 16,
default => 512,
},
balloon => {
optional => 1,
type => 'integer',
description => "Amount of target RAM for the VM in MB. Using zero disables the ballon driver.",
minimum => 0,
},
shares => {
optional => 1,
type => 'integer',
description => "Amount of memory shares for auto-ballooning. The larger the number is, the more memory this VM gets. Number is relative to weights of all other running VMs. Using zero disables auto-ballooning. Auto-ballooning is done by pvestatd.",
minimum => 0,
maximum => 50000,
default => 1000,
},
keyboard => {
optional => 1,
type => 'string',
description => "Keybord layout for vnc server. Default is read from the '/etc/pve/datacenter.cfg' configuration file.".
"It should not be necessary to set it.",
enum => PVE::Tools::kvmkeymaplist(),
default => undef,
},
name => {
optional => 1,
type => 'string', format => 'dns-name',
description => "Set a name for the VM. Only used on the configuration web interface.",
},
scsihw => {
optional => 1,
type => 'string',
description => "SCSI controller model",
enum => [qw(lsi lsi53c810 virtio-scsi-pci virtio-scsi-single megasas pvscsi)],
default => 'lsi',
},
description => {
optional => 1,
type => 'string',
description => "Description for the VM. Only used on the configuration web interface. This is saved as comment inside the configuration file.",
},
ostype => {
optional => 1,
type => 'string',
enum => [qw(other wxp w2k w2k3 w2k8 wvista win7 win8 win10 l24 l26 solaris)],
description => "Specify guest operating system.",
verbose_description => <<EODESC,
Specify guest operating system. This is used to enable special
optimization/features for specific operating systems:
[horizontal]
other;; unspecified OS
wxp;; Microsoft Windows XP
w2k;; Microsoft Windows 2000
w2k3;; Microsoft Windows 2003
w2k8;; Microsoft Windows 2008
wvista;; Microsoft Windows Vista
win7;; Microsoft Windows 7
win8;; Microsoft Windows 8/2012/2012r2
win10;; Microsoft Windows 10/2016/2019
l24;; Linux 2.4 Kernel
l26;; Linux 2.6 - 5.X Kernel
solaris;; Solaris/OpenSolaris/OpenIndiania kernel
EODESC
},
boot => {
optional => 1,
type => 'string', format => 'pve-qm-boot',
description => "Specify guest boot order. Use with 'order=', usage with"
. " no key or 'legacy=' is deprecated.",
},
bootdisk => {
optional => 1,
type => 'string', format => 'pve-qm-bootdisk',
description => "Enable booting from specified disk. Deprecated: Use 'boot: order=foo;bar' instead.",
pattern => '(ide|sata|scsi|virtio)\d+',
},
smp => {
optional => 1,
type => 'integer',
description => "The number of CPUs. Please use option -sockets instead.",
minimum => 1,
default => 1,
},
sockets => {
optional => 1,
type => 'integer',
description => "The number of CPU sockets.",
minimum => 1,
default => 1,
},
cores => {
optional => 1,
type => 'integer',
description => "The number of cores per socket.",
minimum => 1,
default => 1,
},
numa => {
optional => 1,
type => 'boolean',
description => "Enable/disable NUMA.",
default => 0,
},
hugepages => {
optional => 1,
type => 'string',
description => "Enable/disable hugepages memory.",
enum => [qw(any 2 1024)],
},
keephugepages => {
optional => 1,
type => 'boolean',
default => 0,
description => "Use together with hugepages. If enabled, hugepages will not not be deleted"
." after VM shutdown and can be used for subsequent starts.",
},
vcpus => {
optional => 1,
type => 'integer',
description => "Number of hotplugged vcpus.",
minimum => 1,
default => 0,
},
acpi => {
optional => 1,
type => 'boolean',
description => "Enable/disable ACPI.",
default => 1,
},
agent => {
optional => 1,
description => "Enable/disable Qemu GuestAgent and its properties.",
type => 'string',
format => $agent_fmt,
},
kvm => {
optional => 1,
type => 'boolean',
description => "Enable/disable KVM hardware virtualization.",
default => 1,
},
tdf => {
optional => 1,
type => 'boolean',
description => "Enable/disable time drift fix.",
default => 0,
},
localtime => {
optional => 1,
type => 'boolean',
description => "Set the real time clock to local time. This is enabled by default if ostype"
." indicates a Microsoft OS.",
},
freeze => {
optional => 1,
type => 'boolean',
description => "Freeze CPU at startup (use 'c' monitor command to start execution).",
},
vga => {
optional => 1,
type => 'string', format => $vga_fmt,
description => "Configure the VGA hardware.",
verbose_description => "Configure the VGA Hardware. If you want to use high resolution"
." modes (>= 1280x1024x16) you may need to increase the vga memory option. Since QEMU"
." 2.9 the default VGA display type is 'std' for all OS types besides some Windows"
." versions (XP and older) which use 'cirrus'. The 'qxl' option enables the SPICE"
." display server. For win* OS you can select how many independent displays you want,"
." Linux guests can add displays them self.\nYou can also run without any graphic card,"
." using a serial device as terminal.",
},
watchdog => {
optional => 1,
type => 'string', format => 'pve-qm-watchdog',
description => "Create a virtual hardware watchdog device.",
verbose_description => "Create a virtual hardware watchdog device. Once enabled (by a guest"
." action), the watchdog must be periodically polled by an agent inside the guest or"
." else the watchdog will reset the guest (or execute the respective action specified)",
},
startdate => {
optional => 1,
type => 'string',
typetext => "(now | YYYY-MM-DD | YYYY-MM-DDTHH:MM:SS)",
description => "Set the initial date of the real time clock. Valid format for date are:"
."'now' or '2006-06-17T16:01:21' or '2006-06-17'.",
pattern => '(now|\d{4}-\d{1,2}-\d{1,2}(T\d{1,2}:\d{1,2}:\d{1,2})?)',
default => 'now',
},
startup => get_standard_option('pve-startup-order'),
template => {
optional => 1,
type => 'boolean',
description => "Enable/disable Template.",
default => 0,
},
args => {
optional => 1,
type => 'string',
description => "Arbitrary arguments passed to kvm.",
verbose_description => <<EODESCR,
Arbitrary arguments passed to kvm, for example:
args: -no-reboot -no-hpet
NOTE: this option is for experts only.
EODESCR
},
tablet => {
optional => 1,
type => 'boolean',
default => 1,
description => "Enable/disable the USB tablet device.",
verbose_description => "Enable/disable the USB tablet device. This device is usually needed"
." to allow absolute mouse positioning with VNC. Else the mouse runs out of sync with"
." normal VNC clients. If you're running lots of console-only guests on one host, you"
." may consider disabling this to save some context switches. This is turned off by"
." default if you use spice (`qm set <vmid> --vga qxl`).",
},
migrate_speed => {
optional => 1,
type => 'integer',
description => "Set maximum speed (in MB/s) for migrations. Value 0 is no limit.",
minimum => 0,
default => 0,
},
migrate_downtime => {
optional => 1,
type => 'number',
description => "Set maximum tolerated downtime (in seconds) for migrations.",
minimum => 0,
default => 0.1,
},
cdrom => {
optional => 1,
type => 'string', format => 'pve-qm-ide',
typetext => '<volume>',
description => "This is an alias for option -ide2",
},
cpu => {
optional => 1,
description => "Emulated CPU type.",
type => 'string',
format => 'pve-vm-cpu-conf',
},
parent => get_standard_option('pve-snapshot-name', {
optional => 1,
description => "Parent snapshot name. This is used internally, and should not be modified.",
}),
snaptime => {
optional => 1,
description => "Timestamp for snapshots.",
type => 'integer',
minimum => 0,
},
vmstate => {
optional => 1,
type => 'string', format => 'pve-volume-id',
description => "Reference to a volume which stores the VM state. This is used internally"
." for snapshots.",
},
vmstatestorage => get_standard_option('pve-storage-id', {
description => "Default storage for VM state volumes/files.",
optional => 1,
}),
runningmachine => get_standard_option('pve-qemu-machine', {
description => "Specifies the QEMU machine type of the running vm. This is used internally"
." for snapshots.",
}),
runningcpu => {
description => "Specifies the QEMU '-cpu' parameter of the running vm. This is used"
." internally for snapshots.",
optional => 1,
type => 'string',
pattern => $PVE::QemuServer::CPUConfig::qemu_cmdline_cpu_re,
format_description => 'QEMU -cpu parameter'
},
machine => get_standard_option('pve-qemu-machine'),
arch => {
description => "Virtual processor architecture. Defaults to the host.",
optional => 1,
type => 'string',
enum => [qw(x86_64 aarch64)],
},
smbios1 => {
description => "Specify SMBIOS type 1 fields.",
type => 'string', format => 'pve-qm-smbios1',
maxLength => 512,
optional => 1,
},
protection => {
optional => 1,
type => 'boolean',
description => "Sets the protection flag of the VM. This will disable the remove VM and"
." remove disk operations.",
default => 0,
},
bios => {
optional => 1,
type => 'string',
enum => [ qw(seabios ovmf) ],
description => "Select BIOS implementation.",
default => 'seabios',
},
vmgenid => {
type => 'string',
pattern => '(?:[a-fA-F0-9]{8}(?:-[a-fA-F0-9]{4}){3}-[a-fA-F0-9]{12}|[01])',
format_description => 'UUID',
description => "Set VM Generation ID. Use '1' to autogenerate on create or update, pass '0'"
." to disable explicitly.",
verbose_description => "The VM generation ID (vmgenid) device exposes a 128-bit integer"
." value identifier to the guest OS. This allows to notify the guest operating system"
." when the virtual machine is executed with a different configuration (e.g. snapshot"
." execution or creation from a template). The guest operating system notices the"
." change, and is then able to react as appropriate by marking its copies of"
." distributed databases as dirty, re-initializing its random number generator, etc.\n"
."Note that auto-creation only works when done through API/CLI create or update methods"
.", but not when manually editing the config file.",
default => "1 (autogenerated)",
optional => 1,
},
hookscript => {
type => 'string',
format => 'pve-volume-id',
optional => 1,
description => "Script that will be executed during various steps in the vms lifetime.",
},
ivshmem => {
type => 'string',
format => $ivshmem_fmt,
description => "Inter-VM shared memory. Useful for direct communication between VMs, or to"
." the host.",
optional => 1,
},
audio0 => {
type => 'string',
format => $audio_fmt,
description => "Configure a audio device, useful in combination with QXL/Spice.",
optional => 1
},
spice_enhancements => {
type => 'string',
format => $spice_enhancements_fmt,
description => "Configure additional enhancements for SPICE.",
optional => 1
},
tags => {
type => 'string', format => 'pve-tag-list',
description => 'Tags of the VM. This is only meta information.',
optional => 1,
},
rng0 => {
type => 'string',
format => $rng_fmt,
description => "Configure a VirtIO-based Random Number Generator.",
optional => 1,
},
};
my $cicustom_fmt = {
meta => {
type => 'string',
optional => 1,
description => 'Specify a custom file containing all meta data passed to the VM via"
." cloud-init. This is provider specific meaning configdrive2 and nocloud differ.',
format => 'pve-volume-id',
format_description => 'volume',
},
network => {
type => 'string',
optional => 1,
description => 'Specify a custom file containing all network data passed to the VM via'
.' cloud-init.',
format => 'pve-volume-id',
format_description => 'volume',
},
user => {
type => 'string',
optional => 1,
description => 'Specify a custom file containing all user data passed to the VM via'
.' cloud-init.',
format => 'pve-volume-id',
format_description => 'volume',
},
};
PVE::JSONSchema::register_format('pve-qm-cicustom', $cicustom_fmt);
my $confdesc_cloudinit = {
citype => {
optional => 1,
type => 'string',
description => 'Specifies the cloud-init configuration format. The default depends on the'
.' configured operating system type (`ostype`. We use the `nocloud` format for Linux,'
.' and `configdrive2` for windows.',
enum => ['configdrive2', 'nocloud', 'opennebula'],
},
ciuser => {
optional => 1,
type => 'string',
description => "cloud-init: User name to change ssh keys and password for instead of the"
." image's configured default user.",
},
cipassword => {
optional => 1,
type => 'string',
description => 'cloud-init: Password to assign the user. Using this is generally not'
.' recommended. Use ssh keys instead. Also note that older cloud-init versions do not'
.' support hashed passwords.',
},
cicustom => {
optional => 1,
type => 'string',
description => 'cloud-init: Specify custom files to replace the automatically generated'
.' ones at start.',
format => 'pve-qm-cicustom',
},
searchdomain => {
optional => 1,
type => 'string',
description => "cloud-init: Sets DNS search domains for a container. Create will'
.' automatically use the setting from the host if neither searchdomain nor nameserver'
.' are set.",
},
nameserver => {
optional => 1,
type => 'string', format => 'address-list',
description => "cloud-init: Sets DNS server IP address for a container. Create will'
.' automatically use the setting from the host if neither searchdomain nor nameserver'
.' are set.",
},
sshkeys => {
optional => 1,
type => 'string',
format => 'urlencoded',
description => "cloud-init: Setup public SSH keys (one key per line, OpenSSH format).",
},
};
# what about other qemu settings ?
#cpu => 'string',
#machine => 'string',
#fda => 'file',
#fdb => 'file',
#mtdblock => 'file',
#sd => 'file',
#pflash => 'file',
#snapshot => 'bool',
#bootp => 'file',
##tftp => 'dir',
##smb => 'dir',
#kernel => 'file',
#append => 'string',
#initrd => 'file',
##soundhw => 'string',
while (my ($k, $v) = each %$confdesc) {
PVE::JSONSchema::register_standard_option("pve-qm-$k", $v);
}
my $MAX_USB_DEVICES = 5;
my $MAX_NETS = 32;
my $MAX_SERIAL_PORTS = 4;
my $MAX_PARALLEL_PORTS = 3;
my $MAX_NUMA = 8;
my $numa_fmt = {
cpus => {
type => "string",
pattern => qr/\d+(?:-\d+)?(?:;\d+(?:-\d+)?)*/,
description => "CPUs accessing this NUMA node.",
format_description => "id[-id];...",
},
memory => {
type => "number",
description => "Amount of memory this NUMA node provides.",
optional => 1,
},
hostnodes => {
type => "string",
pattern => qr/\d+(?:-\d+)?(?:;\d+(?:-\d+)?)*/,
description => "Host NUMA nodes to use.",
format_description => "id[-id];...",
optional => 1,
},
policy => {
type => 'string',
enum => [qw(preferred bind interleave)],
description => "NUMA allocation policy.",
optional => 1,
},
};
PVE::JSONSchema::register_format('pve-qm-numanode', $numa_fmt);
my $numadesc = {
optional => 1,
type => 'string', format => $numa_fmt,
description => "NUMA topology.",
};
PVE::JSONSchema::register_standard_option("pve-qm-numanode", $numadesc);
for (my $i = 0; $i < $MAX_NUMA; $i++) {
$confdesc->{"numa$i"} = $numadesc;
}
my $nic_model_list = ['rtl8139', 'ne2k_pci', 'e1000', 'pcnet', 'virtio',
'ne2k_isa', 'i82551', 'i82557b', 'i82559er', 'vmxnet3',
'e1000-82540em', 'e1000-82544gc', 'e1000-82545em'];
my $nic_model_list_txt = join(' ', sort @$nic_model_list);
my $net_fmt_bridge_descr = <<__EOD__;
Bridge to attach the network device to. The Proxmox VE standard bridge
is called 'vmbr0'.
If you do not specify a bridge, we create a kvm user (NATed) network
device, which provides DHCP and DNS services. The following addresses
are used:
10.0.2.2 Gateway
10.0.2.3 DNS Server
10.0.2.4 SMB Server
The DHCP server assign addresses to the guest starting from 10.0.2.15.
__EOD__
my $net_fmt = {
macaddr => get_standard_option('mac-addr', {
description => "MAC address. That address must be unique withing your network. This is"
." automatically generated if not specified.",
}),
model => {
type => 'string',
description => "Network Card Model. The 'virtio' model provides the best performance with"
." very low CPU overhead. If your guest does not support this driver, it is usually"
." best to use 'e1000'.",
enum => $nic_model_list,
default_key => 1,
},
(map { $_ => { keyAlias => 'model', alias => 'macaddr' }} @$nic_model_list),
bridge => {
type => 'string',
description => $net_fmt_bridge_descr,
format_description => 'bridge',
pattern => '[-_.\w\d]+',
optional => 1,
},
queues => {
type => 'integer',
minimum => 0, maximum => 16,
description => 'Number of packet queues to be used on the device.',
optional => 1,
},
rate => {
type => 'number',
minimum => 0,
description => "Rate limit in mbps (megabytes per second) as floating point number.",
optional => 1,
},
tag => {
type => 'integer',
minimum => 1, maximum => 4094,
description => 'VLAN tag to apply to packets on this interface.',
optional => 1,
},
trunks => {
type => 'string',
pattern => qr/\d+(?:-\d+)?(?:;\d+(?:-\d+)?)*/,
description => 'VLAN trunks to pass through this interface.',
format_description => 'vlanid[;vlanid...]',
optional => 1,
},
firewall => {
type => 'boolean',
description => 'Whether this interface should be protected by the firewall.',
optional => 1,
},
link_down => {
type => 'boolean',
description => 'Whether this interface should be disconnected (like pulling the plug).',
optional => 1,
},
mtu => {
type => 'integer',
minimum => 1, maximum => 65520,
description => "Force MTU, for VirtIO only. Set to '1' to use the bridge MTU",
optional => 1,
},
};
my $netdesc = {
optional => 1,
type => 'string', format => $net_fmt,
description => "Specify network devices.",
};
PVE::JSONSchema::register_standard_option("pve-qm-net", $netdesc);
my $ipconfig_fmt = {
ip => {
type => 'string',
format => 'pve-ipv4-config',
format_description => 'IPv4Format/CIDR',
description => 'IPv4 address in CIDR format.',
optional => 1,
default => 'dhcp',
},
gw => {
type => 'string',
format => 'ipv4',
format_description => 'GatewayIPv4',
description => 'Default gateway for IPv4 traffic.',
optional => 1,
requires => 'ip',
},
ip6 => {
type => 'string',
format => 'pve-ipv6-config',
format_description => 'IPv6Format/CIDR',
description => 'IPv6 address in CIDR format.',
optional => 1,
default => 'dhcp',
},
gw6 => {
type => 'string',
format => 'ipv6',
format_description => 'GatewayIPv6',
description => 'Default gateway for IPv6 traffic.',
optional => 1,
requires => 'ip6',
},
};
PVE::JSONSchema::register_format('pve-qm-ipconfig', $ipconfig_fmt);
my $ipconfigdesc = {
optional => 1,
type => 'string', format => 'pve-qm-ipconfig',
description => <<'EODESCR',
cloud-init: Specify IP addresses and gateways for the corresponding interface.
IP addresses use CIDR notation, gateways are optional but need an IP of the same type specified.
The special string 'dhcp' can be used for IP addresses to use DHCP, in which case no explicit
gateway should be provided.
For IPv6 the special string 'auto' can be used to use stateless autoconfiguration. This requires
cloud-init 19.4 or newer.
If cloud-init is enabled and neither an IPv4 nor an IPv6 address is specified, it defaults to using
dhcp on IPv4.
EODESCR
};
PVE::JSONSchema::register_standard_option("pve-qm-ipconfig", $netdesc);
for (my $i = 0; $i < $MAX_NETS; $i++) {
$confdesc->{"net$i"} = $netdesc;
$confdesc_cloudinit->{"ipconfig$i"} = $ipconfigdesc;
}
foreach my $key (keys %$confdesc_cloudinit) {
$confdesc->{$key} = $confdesc_cloudinit->{$key};
}
PVE::JSONSchema::register_format('pve-volume-id-or-qm-path', \&verify_volume_id_or_qm_path);
sub verify_volume_id_or_qm_path {
my ($volid, $noerr) = @_;
if ($volid eq 'none' || $volid eq 'cdrom' || $volid =~ m|^/|) {
return $volid;
}
# if its neither 'none' nor 'cdrom' nor a path, check if its a volume-id
$volid = eval { PVE::JSONSchema::check_format('pve-volume-id', $volid, '') };
if ($@) {
return if $noerr;
die $@;
}
return $volid;
}
my $usb_fmt = {
host => {
default_key => 1,
type => 'string', format => 'pve-qm-usb-device',
format_description => 'HOSTUSBDEVICE|spice',
description => <<EODESCR,
The Host USB device or port or the value 'spice'. HOSTUSBDEVICE syntax is:
'bus-port(.port)*' (decimal numbers) or
'vendor_id:product_id' (hexadeciaml numbers) or
'spice'
You can use the 'lsusb -t' command to list existing usb devices.
NOTE: This option allows direct access to host hardware. So it is no longer possible to migrate such
machines - use with special care.
The value 'spice' can be used to add a usb redirection devices for spice.
EODESCR
},
usb3 => {
optional => 1,
type => 'boolean',
description => "Specifies whether if given host option is a USB3 device or port.",
default => 0,
},
};
my $usbdesc = {
optional => 1,
type => 'string', format => $usb_fmt,
description => "Configure an USB device (n is 0 to 4).",
};
PVE::JSONSchema::register_standard_option("pve-qm-usb", $usbdesc);
my $serialdesc = {
optional => 1,
type => 'string',
pattern => '(/dev/.+|socket)',
description => "Create a serial device inside the VM (n is 0 to 3)",
verbose_description => <<EODESCR,
Create a serial device inside the VM (n is 0 to 3), and pass through a
host serial device (i.e. /dev/ttyS0), or create a unix socket on the
host side (use 'qm terminal' to open a terminal connection).
NOTE: If you pass through a host serial device, it is no longer possible to migrate such machines -
use with special care.
CAUTION: Experimental! User reported problems with this option.
EODESCR
};
my $paralleldesc= {
optional => 1,
type => 'string',
pattern => '/dev/parport\d+|/dev/usb/lp\d+',
description => "Map host parallel devices (n is 0 to 2).",
verbose_description => <<EODESCR,
Map host parallel devices (n is 0 to 2).
NOTE: This option allows direct access to host hardware. So it is no longer possible to migrate such
machines - use with special care.
CAUTION: Experimental! User reported problems with this option.
EODESCR
};
for (my $i = 0; $i < $MAX_PARALLEL_PORTS; $i++) {
$confdesc->{"parallel$i"} = $paralleldesc;
}
for (my $i = 0; $i < $MAX_SERIAL_PORTS; $i++) {
$confdesc->{"serial$i"} = $serialdesc;
}
for (my $i = 0; $i < $PVE::QemuServer::PCI::MAX_HOSTPCI_DEVICES; $i++) {
$confdesc->{"hostpci$i"} = $PVE::QemuServer::PCI::hostpcidesc;
}
for my $key (keys %{$PVE::QemuServer::Drive::drivedesc_hash}) {
$confdesc->{$key} = $PVE::QemuServer::Drive::drivedesc_hash->{$key};
}
for (my $i = 0; $i < $MAX_USB_DEVICES; $i++) {
$confdesc->{"usb$i"} = $usbdesc;
}
my $boot_fmt = {
legacy => {
optional => 1,
default_key => 1,
type => 'string',
description => "Boot on floppy (a), hard disk (c), CD-ROM (d), or network (n)."
. " Deprecated, use 'order=' instead.",
pattern => '[acdn]{1,4}',
format_description => "[acdn]{1,4}",
# note: this is also the fallback if boot: is not given at all
default => 'cdn',
},
order => {
optional => 1,
type => 'string',
format => 'pve-qm-bootdev-list',
format_description => "device[;device...]",
description => <<EODESC,
The guest will attempt to boot from devices in the order they appear here.
Disks, optical drives and passed-through storage USB devices will be directly
booted from, NICs will load PXE, and PCIe devices will either behave like disks
(e.g. NVMe) or load an option ROM (e.g. RAID controller, hardware NIC).
Note that only devices in this list will be marked as bootable and thus loaded
by the guest firmware (BIOS/UEFI). If you require multiple disks for booting
(e.g. software-raid), you need to specify all of them here.
Overrides the deprecated 'legacy=[acdn]*' value when given.
EODESC
},
};
PVE::JSONSchema::register_format('pve-qm-boot', $boot_fmt);
PVE::JSONSchema::register_format('pve-qm-bootdev', \&verify_bootdev);
sub verify_bootdev {
my ($dev, $noerr) = @_;
return $dev if PVE::QemuServer::Drive::is_valid_drivename($dev) && $dev !~ m/^efidisk/;
my $check = sub {
my ($base) = @_;
return 0 if $dev !~ m/^$base\d+$/;
return 0 if !$confdesc->{$dev};
return 1;
};
return $dev if $check->("net");
return $dev if $check->("usb");
return $dev if $check->("hostpci");
return if $noerr;
die "invalid boot device '$dev'\n";
}
sub print_bootorder {
my ($devs) = @_;
return "" if !@$devs;
my $data = { order => join(';', @$devs) };
return PVE::JSONSchema::print_property_string($data, $boot_fmt);
}
my $kvm_api_version = 0;
sub kvm_version {
return $kvm_api_version if $kvm_api_version;
open my $fh, '<', '/dev/kvm' or return;
# 0xae00 => KVM_GET_API_VERSION
$kvm_api_version = ioctl($fh, 0xae00, 0);
close($fh);
return $kvm_api_version;
}
my $kvm_user_version = {};
my $kvm_mtime = {};
sub kvm_user_version {
my ($binary) = @_;
$binary //= get_command_for_arch(get_host_arch()); # get the native arch by default
my $st = stat($binary);
my $cachedmtime = $kvm_mtime->{$binary} // -1;
return $kvm_user_version->{$binary} if $kvm_user_version->{$binary} &&
$cachedmtime == $st->mtime;
$kvm_user_version->{$binary} = 'unknown';
$kvm_mtime->{$binary} = $st->mtime;
my $code = sub {
my $line = shift;
if ($line =~ m/^QEMU( PC)? emulator version (\d+\.\d+(\.\d+)?)(\.\d+)?[,\s]/) {
$kvm_user_version->{$binary} = $2;
}
};
eval { run_command([$binary, '--version'], outfunc => $code); };
warn $@ if $@;
return $kvm_user_version->{$binary};
}
my sub extract_version {
my ($machine_type, $version) = @_;
$version = kvm_user_version() if !defined($version);
PVE::QemuServer::Machine::extract_version($machine_type, $version)
}
sub kernel_has_vhost_net {
return -c '/dev/vhost-net';
}
sub option_exists {
my $key = shift;
return defined($confdesc->{$key});
}
my $cdrom_path;
sub get_cdrom_path {
return $cdrom_path if $cdrom_path;
return $cdrom_path = "/dev/cdrom" if -l "/dev/cdrom";
return $cdrom_path = "/dev/cdrom1" if -l "/dev/cdrom1";
return $cdrom_path = "/dev/cdrom2" if -l "/dev/cdrom2";
}
sub get_iso_path {
my ($storecfg, $vmid, $cdrom) = @_;
if ($cdrom eq 'cdrom') {
return get_cdrom_path();
} elsif ($cdrom eq 'none') {
return '';
} elsif ($cdrom =~ m|^/|) {
return $cdrom;
} else {
return PVE::Storage::path($storecfg, $cdrom);
}
}
# try to convert old style file names to volume IDs
sub filename_to_volume_id {
my ($vmid, $file, $media) = @_;
if (!($file eq 'none' || $file eq 'cdrom' ||
$file =~ m|^/dev/.+| || $file =~ m/^([^:]+):(.+)$/)) {
return if $file =~ m|/|;
if ($media && $media eq 'cdrom') {
$file = "local:iso/$file";
} else {
$file = "local:$vmid/$file";
}
}
return $file;
}
sub verify_media_type {
my ($opt, $vtype, $media) = @_;
return if !$media;
my $etype;
if ($media eq 'disk') {
$etype = 'images';
} elsif ($media eq 'cdrom') {
$etype = 'iso';
} else {
die "internal error";
}
return if ($vtype eq $etype);
raise_param_exc({ $opt => "unexpected media type ($vtype != $etype)" });
}
sub cleanup_drive_path {
my ($opt, $storecfg, $drive) = @_;
# try to convert filesystem paths to volume IDs
if (($drive->{file} !~ m/^(cdrom|none)$/) &&
($drive->{file} !~ m|^/dev/.+|) &&
($drive->{file} !~ m/^([^:]+):(.+)$/) &&
($drive->{file} !~ m/^\d+$/)) {
my ($vtype, $volid) = PVE::Storage::path_to_volume_id($storecfg, $drive->{file});
raise_param_exc({ $opt => "unable to associate path '$drive->{file}' to any storage"})
if !$vtype;
$drive->{media} = 'cdrom' if !$drive->{media} && $vtype eq 'iso';
verify_media_type($opt, $vtype, $drive->{media});
$drive->{file} = $volid;
}
$drive->{media} = 'cdrom' if !$drive->{media} && $drive->{file} =~ m/^(cdrom|none)$/;
}
sub parse_hotplug_features {
my ($data) = @_;
my $res = {};
return $res if $data eq '0';
$data = $confdesc->{hotplug}->{default} if $data eq '1';
foreach my $feature (PVE::Tools::split_list($data)) {
if ($feature =~ m/^(network|disk|cpu|memory|usb)$/) {
$res->{$1} = 1;
} else {
die "invalid hotplug feature '$feature'\n";
}
}
return $res;
}
PVE::JSONSchema::register_format('pve-hotplug-features', \&pve_verify_hotplug_features);
sub pve_verify_hotplug_features {
my ($value, $noerr) = @_;
return $value if parse_hotplug_features($value);
return if $noerr;
die "unable to parse hotplug option\n";
}
sub scsi_inquiry {
my($fh, $noerr) = @_;
my $SG_IO = 0x2285;
my $SG_GET_VERSION_NUM = 0x2282;
my $versionbuf = "\x00" x 8;
my $ret = ioctl($fh, $SG_GET_VERSION_NUM, $versionbuf);
if (!$ret) {
die "scsi ioctl SG_GET_VERSION_NUM failoed - $!\n" if !$noerr;
return;
}
my $version = unpack("I", $versionbuf);
if ($version < 30000) {
die "scsi generic interface too old\n" if !$noerr;
return;
}
my $buf = "\x00" x 36;
my $sensebuf = "\x00" x 8;
my $cmd = pack("C x3 C x1", 0x12, 36);
# see /usr/include/scsi/sg.h
my $sg_io_hdr_t = "i i C C s I P P P I I i P C C C C S S i I I";
my $packet = pack($sg_io_hdr_t, ord('S'), -3, length($cmd),
length($sensebuf), 0, length($buf), $buf,
$cmd, $sensebuf, 6000);
$ret = ioctl($fh, $SG_IO, $packet);
if (!$ret) {
die "scsi ioctl SG_IO failed - $!\n" if !$noerr;
return;
}
my @res = unpack($sg_io_hdr_t, $packet);
if ($res[17] || $res[18]) {
die "scsi ioctl SG_IO status error - $!\n" if !$noerr;
return;
}
my $res = {};
(my $byte0, my $byte1, $res->{vendor},
$res->{product}, $res->{revision}) = unpack("C C x6 A8 A16 A4", $buf);
$res->{removable} = $byte1 & 128 ? 1 : 0;
$res->{type} = $byte0 & 31;
return $res;
}
sub path_is_scsi {
my ($path) = @_;
my $fh = IO::File->new("+<$path") || return;
my $res = scsi_inquiry($fh, 1);
close($fh);
return $res;
}
sub print_tabletdevice_full {
my ($conf, $arch) = @_;
my $q35 = PVE::QemuServer::Machine::machine_type_is_q35($conf);
# we use uhci for old VMs because tablet driver was buggy in older qemu
my $usbbus;
if (PVE::QemuServer::Machine::machine_type_is_q35($conf) || $arch eq 'aarch64') {
$usbbus = 'ehci';
} else {
$usbbus = 'uhci';
}
return "usb-tablet,id=tablet,bus=$usbbus.0,port=1";
}
sub print_keyboarddevice_full {
my ($conf, $arch, $machine) = @_;
return if $arch ne 'aarch64';
return "usb-kbd,id=keyboard,bus=ehci.0,port=2";
}
my sub get_drive_id {
my ($drive) = @_;
return "$drive->{interface}$drive->{index}";
}
sub print_drivedevice_full {
my ($storecfg, $conf, $vmid, $drive, $bridges, $arch, $machine_type) = @_;
my $device = '';
my $maxdev = 0;
my $drive_id = get_drive_id($drive);
if ($drive->{interface} eq 'virtio') {
my $pciaddr = print_pci_addr("$drive_id", $bridges, $arch, $machine_type);
$device = "virtio-blk-pci,drive=drive-$drive_id,id=${drive_id}${pciaddr}";
$device .= ",iothread=iothread-$drive_id" if $drive->{iothread};
} elsif ($drive->{interface} eq 'scsi') {
my ($maxdev, $controller, $controller_prefix) = scsihw_infos($conf, $drive);
my $unit = $drive->{index} % $maxdev;
my $devicetype = 'hd';
my $path = '';
if (drive_is_cdrom($drive)) {
$devicetype = 'cd';
} else {
if ($drive->{file} =~ m|^/|) {
$path = $drive->{file};
if (my $info = path_is_scsi($path)) {
if ($info->{type} == 0 && $drive->{scsiblock}) {
$devicetype = 'block';
} elsif ($info->{type} == 1) { # tape
$devicetype = 'generic';
}
}
} else {
$path = PVE::Storage::path($storecfg, $drive->{file});
}
# for compatibility only, we prefer scsi-hd (#2408, #2355, #2380)
my $version = extract_version($machine_type, kvm_user_version());
if ($path =~ m/^iscsi\:\/\// &&
!min_version($version, 4, 1)) {
$devicetype = 'generic';
}
}
if (!$conf->{scsihw} || ($conf->{scsihw} =~ m/^lsi/)){
$device = "scsi-$devicetype,bus=$controller_prefix$controller.0,scsi-id=$unit";
} else {
$device = "scsi-$devicetype,bus=$controller_prefix$controller.0,channel=0,scsi-id=0"
.",lun=$drive->{index}";
}
$device .= ",drive=drive-$drive_id,id=$drive_id";
if ($drive->{ssd} && ($devicetype eq 'block' || $devicetype eq 'hd')) {
$device .= ",rotation_rate=1";
}
$device .= ",wwn=$drive->{wwn}" if $drive->{wwn};
} elsif ($drive->{interface} eq 'ide' || $drive->{interface} eq 'sata') {
my $maxdev = ($drive->{interface} eq 'sata') ? $PVE::QemuServer::Drive::MAX_SATA_DISKS : 2;
my $controller = int($drive->{index} / $maxdev);
my $unit = $drive->{index} % $maxdev;
my $devicetype = ($drive->{media} && $drive->{media} eq 'cdrom') ? "cd" : "hd";
$device = "ide-$devicetype";
if ($drive->{interface} eq 'ide') {
$device .= ",bus=ide.$controller,unit=$unit";
} else {
$device .= ",bus=ahci$controller.$unit";
}
$device .= ",drive=drive-$drive_id,id=$drive_id";
if ($devicetype eq 'hd') {
if (my $model = $drive->{model}) {
$model = URI::Escape::uri_unescape($model);
$device .= ",model=$model";
}
if ($drive->{ssd}) {
$device .= ",rotation_rate=1";
}
}
$device .= ",wwn=$drive->{wwn}" if $drive->{wwn};
} elsif ($drive->{interface} eq 'usb') {
die "implement me";
# -device ide-drive,bus=ide.1,unit=0,drive=drive-ide0-1-0,id=ide0-1-0
} else {
die "unsupported interface type";
}
$device .= ",bootindex=$drive->{bootindex}" if $drive->{bootindex};
if (my $serial = $drive->{serial}) {
$serial = URI::Escape::uri_unescape($serial);
$device .= ",serial=$serial";
}
return $device;
}
sub get_initiator_name {
my $initiator;
my $fh = IO::File->new('/etc/iscsi/initiatorname.iscsi') || return;
while (defined(my $line = <$fh>)) {
next if $line !~ m/^\s*InitiatorName\s*=\s*([\.\-:\w]+)/;
$initiator = $1;
last;
}
$fh->close();
return $initiator;
}
sub print_drive_commandline_full {
my ($storecfg, $vmid, $drive, $pbs_name) = @_;
my $path;
my $volid = $drive->{file};
my $format = $drive->{format};
my $drive_id = get_drive_id($drive);
if (drive_is_cdrom($drive)) {
$path = get_iso_path($storecfg, $vmid, $volid);
die "$drive_id: cannot back cdrom drive with PBS snapshot\n" if $pbs_name;
} else {
my ($storeid, $volname) = PVE::Storage::parse_volume_id($volid, 1);
if ($storeid) {
$path = PVE::Storage::path($storecfg, $volid);
my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
$format //= qemu_img_format($scfg, $volname);
} else {
$path = $volid;
$format //= "raw";
}
}
my $is_rbd = $path =~ m/^rbd:/;
my $opts = '';
my @qemu_drive_options = qw(heads secs cyls trans media cache rerror werror aio discard);
foreach my $o (@qemu_drive_options) {
$opts .= ",$o=$drive->{$o}" if defined($drive->{$o});
}
# snapshot only accepts on|off
if (defined($drive->{snapshot})) {
my $v = $drive->{snapshot} ? 'on' : 'off';
$opts .= ",snapshot=$v";
}
foreach my $type (['', '-total'], [_rd => '-read'], [_wr => '-write']) {
my ($dir, $qmpname) = @$type;
if (my $v = $drive->{"mbps$dir"}) {
$opts .= ",throttling.bps$qmpname=".int($v*1024*1024);
}
if (my $v = $drive->{"mbps${dir}_max"}) {
$opts .= ",throttling.bps$qmpname-max=".int($v*1024*1024);
}
if (my $v = $drive->{"bps${dir}_max_length"}) {
$opts .= ",throttling.bps$qmpname-max-length=$v";
}
if (my $v = $drive->{"iops${dir}"}) {
$opts .= ",throttling.iops$qmpname=$v";
}
if (my $v = $drive->{"iops${dir}_max"}) {
$opts .= ",throttling.iops$qmpname-max=$v";
}
if (my $v = $drive->{"iops${dir}_max_length"}) {
$opts .= ",throttling.iops$qmpname-max-length=$v";
}
}
if ($pbs_name) {
$format = "rbd" if $is_rbd;
die "$drive_id: Proxmox Backup Server backed drive cannot auto-detect the format\n"
if !$format;
$opts .= ",format=alloc-track,file.driver=$format";
} elsif ($format) {
$opts .= ",format=$format";
}
my $cache_direct = 0;
if (my $cache = $drive->{cache}) {
$cache_direct = $cache =~ /^(?:off|none|directsync)$/;
} elsif (!drive_is_cdrom($drive)) {
$opts .= ",cache=none";
$cache_direct = 1;
}
# aio native works only with O_DIRECT
if (!$drive->{aio}) {
if($cache_direct) {
$opts .= ",aio=native";
} else {
$opts .= ",aio=threads";
}
}
if (!drive_is_cdrom($drive)) {
my $detectzeroes;
if (defined($drive->{detect_zeroes}) && !$drive->{detect_zeroes}) {
$detectzeroes = 'off';
} elsif ($drive->{discard}) {
$detectzeroes = $drive->{discard} eq 'on' ? 'unmap' : 'on';
} else {
# This used to be our default with discard not being specified:
$detectzeroes = 'on';
}
# note: 'detect-zeroes' works per blockdev and we want it to persist
# after the alloc-track is removed, so put it on 'file' directly
my $dz_param = $pbs_name ? "file.detect-zeroes" : "detect-zeroes";
$opts .= ",$dz_param=$detectzeroes" if $detectzeroes;
}
if ($pbs_name) {
$opts .= ",backing=$pbs_name";
$opts .= ",auto-remove=on";
}
# my $file_param = $pbs_name ? "file.file.filename" : "file";
my $file_param = "file";
if ($pbs_name) {
# non-rbd drivers require the underlying file to be a seperate block
# node, so add a second .file indirection
$file_param .= ".file" if !$is_rbd;
$file_param .= ".filename";
}
my $pathinfo = $path ? "$file_param=$path," : '';
return "${pathinfo}if=none,id=drive-$drive->{interface}$drive->{index}$opts";
}
sub print_pbs_blockdev {
my ($pbs_conf, $pbs_name) = @_;
my $blockdev = "driver=pbs,node-name=$pbs_name,read-only=on";
$blockdev .= ",repository=$pbs_conf->{repository}";
$blockdev .= ",snapshot=$pbs_conf->{snapshot}";
$blockdev .= ",archive=$pbs_conf->{archive}";
$blockdev .= ",keyfile=$pbs_conf->{keyfile}" if $pbs_conf->{keyfile};
return $blockdev;
}
sub print_netdevice_full {
my ($vmid, $conf, $net, $netid, $bridges, $use_old_bios_files, $arch, $machine_type) = @_;
my $device = $net->{model};
if ($net->{model} eq 'virtio') {
$device = 'virtio-net-pci';
};
my $pciaddr = print_pci_addr("$netid", $bridges, $arch, $machine_type);
my $tmpstr = "$device,mac=$net->{macaddr},netdev=$netid$pciaddr,id=$netid";
if ($net->{queues} && $net->{queues} > 1 && $net->{model} eq 'virtio'){
# Consider we have N queues, the number of vectors needed is 2 * N + 2, i.e., one per in
# and out of each queue plus one config interrupt and control vector queue
my $vectors = $net->{queues} * 2 + 2;
$tmpstr .= ",vectors=$vectors,mq=on";
}
$tmpstr .= ",bootindex=$net->{bootindex}" if $net->{bootindex} ;
if (my $mtu = $net->{mtu}) {
if ($net->{model} eq 'virtio' && $net->{bridge}) {
my $bridge_mtu = PVE::Network::read_bridge_mtu($net->{bridge});
if ($mtu == 1) {
$mtu = $bridge_mtu;
} elsif ($mtu < 576) {
die "netdev $netid: MTU '$mtu' is smaller than the IP minimum MTU '576'\n";
} elsif ($mtu > $bridge_mtu) {
die "netdev $netid: MTU '$mtu' is bigger than the bridge MTU '$bridge_mtu'\n";
}
$tmpstr .= ",host_mtu=$mtu";
} else {
warn "WARN: netdev $netid: ignoring MTU '$mtu', not using VirtIO or no bridge configured.\n";
}
}
if ($use_old_bios_files) {
my $romfile;
if ($device eq 'virtio-net-pci') {
$romfile = 'pxe-virtio.rom';
} elsif ($device eq 'e1000') {
$romfile = 'pxe-e1000.rom';
} elsif ($device eq 'ne2k') {
$romfile = 'pxe-ne2k_pci.rom';
} elsif ($device eq 'pcnet') {
$romfile = 'pxe-pcnet.rom';
} elsif ($device eq 'rtl8139') {
$romfile = 'pxe-rtl8139.rom';
}
$tmpstr .= ",romfile=$romfile" if $romfile;
}
return $tmpstr;
}
sub print_netdev_full {
my ($vmid, $conf, $arch, $net, $netid, $hotplug) = @_;
my $i = '';
if ($netid =~ m/^net(\d+)$/) {
$i = int($1);
}
die "got strange net id '$i'\n" if $i >= ${MAX_NETS};
my $ifname = "tap${vmid}i$i";
# kvm uses TUNSETIFF ioctl, and that limits ifname length
die "interface name '$ifname' is too long (max 15 character)\n"
if length($ifname) >= 16;
my $vhostparam = '';
if (is_native($arch)) {
$vhostparam = ',vhost=on' if kernel_has_vhost_net() && $net->{model} eq 'virtio';
}
my $vmname = $conf->{name} || "vm$vmid";
my $netdev = "";
my $script = $hotplug ? "pve-bridge-hotplug" : "pve-bridge";
if ($net->{bridge}) {
$netdev = "type=tap,id=$netid,ifname=${ifname},script=/var/lib/qemu-server/$script"
.",downscript=/var/lib/qemu-server/pve-bridgedown$vhostparam";
} else {
$netdev = "type=user,id=$netid,hostname=$vmname";
}
$netdev .= ",queues=$net->{queues}" if ($net->{queues} && $net->{model} eq 'virtio');
return $netdev;
}
my $vga_map = {
'cirrus' => 'cirrus-vga',
'std' => 'VGA',
'vmware' => 'vmware-svga',
'virtio' => 'virtio-vga',
};
sub print_vga_device {
my ($conf, $vga, $arch, $machine_version, $machine, $id, $qxlnum, $bridges) = @_;
my $type = $vga_map->{$vga->{type}};
if ($arch eq 'aarch64' && defined($type) && $type eq 'virtio-vga') {
$type = 'virtio-gpu';
}
my $vgamem_mb = $vga->{memory};
my $max_outputs = '';
if ($qxlnum) {
$type = $id ? 'qxl' : 'qxl-vga';
if (!$conf->{ostype} || $conf->{ostype} =~ m/^(?:l\d\d)|(?:other)$/) {
# set max outputs so linux can have up to 4 qxl displays with one device
if (min_version($machine_version, 4, 1)) {
$max_outputs = ",max_outputs=4";
}
}
}
die "no devicetype for $vga->{type}\n" if !$type;
my $memory = "";
if ($vgamem_mb) {
if ($vga->{type} eq 'virtio') {
my $bytes = PVE::Tools::convert_size($vgamem_mb, "mb" => "b");
$memory = ",max_hostmem=$bytes";
} elsif ($qxlnum) {
# from https://www.spice-space.org/multiple-monitors.html
$memory = ",vgamem_mb=$vga->{memory}";
my $ram = $vgamem_mb * 4;
my $vram = $vgamem_mb * 2;
$memory .= ",ram_size_mb=$ram,vram_size_mb=$vram";
} else {
$memory = ",vgamem_mb=$vga->{memory}";
}
} elsif ($qxlnum && $id) {
$memory = ",ram_size=67108864,vram_size=33554432";
}
my $edidoff = "";
if ($type eq 'VGA' && windows_version($conf->{ostype})) {
$edidoff=",edid=off" if (!defined($conf->{bios}) || $conf->{bios} ne 'ovmf');
}
my $q35 = PVE::QemuServer::Machine::machine_type_is_q35($conf);
my $vgaid = "vga" . ($id // '');
my $pciaddr;
if ($q35 && $vgaid eq 'vga') {
# the first display uses pcie.0 bus on q35 machines
$pciaddr = print_pcie_addr($vgaid, $bridges, $arch, $machine);
} else {
$pciaddr = print_pci_addr($vgaid, $bridges, $arch, $machine);
}
return "$type,id=${vgaid}${memory}${max_outputs}${pciaddr}${edidoff}";
}
sub parse_number_sets {
my ($set) = @_;
my $res = [];
foreach my $part (split(/;/, $set)) {
if ($part =~ /^\s*(\d+)(?:-(\d+))?\s*$/) {
die "invalid range: $part ($2 < $1)\n" if defined($2) && $2 < $1;
push @$res, [ $1, $2 ];
} else {
die "invalid range: $part\n";
}
}
return $res;
}
sub parse_numa {
my ($data) = @_;
my $res = parse_property_string($numa_fmt, $data);
$res->{cpus} = parse_number_sets($res->{cpus}) if defined($res->{cpus});
$res->{hostnodes} = parse_number_sets($res->{hostnodes}) if defined($res->{hostnodes});
return $res;
}
# netX: e1000=XX:XX:XX:XX:XX:XX,bridge=vmbr0,rate=<mbps>
sub parse_net {
my ($data) = @_;
my $res = eval { parse_property_string($net_fmt, $data) };
if ($@) {
warn $@;
return;
}
if (!defined($res->{macaddr})) {
my $dc = PVE::Cluster::cfs_read_file('datacenter.cfg');
$res->{macaddr} = PVE::Tools::random_ether_addr($dc->{mac_prefix});
}
return $res;
}
# ipconfigX ip=cidr,gw=ip,ip6=cidr,gw6=ip
sub parse_ipconfig {
my ($data) = @_;
my $res = eval { parse_property_string($ipconfig_fmt, $data) };
if ($@) {
warn $@;
return;
}
if ($res->{gw} && !$res->{ip}) {
warn 'gateway specified without specifying an IP address';
return;
}
if ($res->{gw6} && !$res->{ip6}) {
warn 'IPv6 gateway specified without specifying an IPv6 address';
return;
}
if ($res->{gw} && $res->{ip} eq 'dhcp') {
warn 'gateway specified together with DHCP';
return;
}
if ($res->{gw6} && $res->{ip6} !~ /^$IPV6RE/) {
# gw6 + auto/dhcp
warn "IPv6 gateway specified together with $res->{ip6} address";
return;
}
if (!$res->{ip} && !$res->{ip6}) {
return { ip => 'dhcp', ip6 => 'dhcp' };
}
return $res;
}
sub print_net {
my $net = shift;
return PVE::JSONSchema::print_property_string($net, $net_fmt);
}
sub add_random_macs {
my ($settings) = @_;
foreach my $opt (keys %$settings) {
next if $opt !~ m/^net(\d+)$/;
my $net = parse_net($settings->{$opt});
next if !$net;
$settings->{$opt} = print_net($net);
}
}
sub vm_is_volid_owner {
my ($storecfg, $vmid, $volid) = @_;
if ($volid !~ m|^/|) {
my ($path, $owner);
eval { ($path, $owner) = PVE::Storage::path($storecfg, $volid); };
if ($owner && ($owner == $vmid)) {
return 1;
}
}
return;
}
sub vmconfig_register_unused_drive {
my ($storecfg, $vmid, $conf, $drive) = @_;
if (drive_is_cloudinit($drive)) {
eval { PVE::Storage::vdisk_free($storecfg, $drive->{file}) };
warn $@ if $@;
} elsif (!drive_is_cdrom($drive)) {
my $volid = $drive->{file};
if (vm_is_volid_owner($storecfg, $vmid, $volid)) {
PVE::QemuConfig->add_unused_volume($conf, $volid, $vmid);
}
}
}
# smbios: [manufacturer=str][,product=str][,version=str][,serial=str][,uuid=uuid][,sku=str][,family=str][,base64=bool]
my $smbios1_fmt = {
uuid => {
type => 'string',
pattern => '[a-fA-F0-9]{8}(?:-[a-fA-F0-9]{4}){3}-[a-fA-F0-9]{12}',
format_description => 'UUID',
description => "Set SMBIOS1 UUID.",
optional => 1,
},
version => {
type => 'string',
pattern => '[A-Za-z0-9+\/]+={0,2}',
format_description => 'Base64 encoded string',
description => "Set SMBIOS1 version.",
optional => 1,
},
serial => {
type => 'string',
pattern => '[A-Za-z0-9+\/]+={0,2}',
format_description => 'Base64 encoded string',
description => "Set SMBIOS1 serial number.",
optional => 1,
},
manufacturer => {
type => 'string',
pattern => '[A-Za-z0-9+\/]+={0,2}',
format_description => 'Base64 encoded string',
description => "Set SMBIOS1 manufacturer.",
optional => 1,
},
product => {
type => 'string',
pattern => '[A-Za-z0-9+\/]+={0,2}',
format_description => 'Base64 encoded string',
description => "Set SMBIOS1 product ID.",
optional => 1,
},
sku => {
type => 'string',
pattern => '[A-Za-z0-9+\/]+={0,2}',
format_description => 'Base64 encoded string',
description => "Set SMBIOS1 SKU string.",
optional => 1,
},
family => {
type => 'string',
pattern => '[A-Za-z0-9+\/]+={0,2}',
format_description => 'Base64 encoded string',
description => "Set SMBIOS1 family string.",
optional => 1,
},
base64 => {
type => 'boolean',
description => 'Flag to indicate that the SMBIOS values are base64 encoded',
optional => 1,
},
};
sub parse_smbios1 {
my ($data) = @_;
my $res = eval { parse_property_string($smbios1_fmt, $data) };
warn $@ if $@;
return $res;
}
sub print_smbios1 {
my ($smbios1) = @_;
return PVE::JSONSchema::print_property_string($smbios1, $smbios1_fmt);
}
PVE::JSONSchema::register_format('pve-qm-smbios1', $smbios1_fmt);
sub parse_watchdog {
my ($value) = @_;
return if !$value;
my $res = eval { parse_property_string($watchdog_fmt, $value) };
warn $@ if $@;
return $res;
}
sub parse_guest_agent {
my ($conf) = @_;
return {} if !defined($conf->{agent});
my $res = eval { parse_property_string($agent_fmt, $conf->{agent}) };
warn $@ if $@;
# if the agent is disabled ignore the other potentially set properties
return {} if !$res->{enabled};
return $res;
}
sub get_qga_key {
my ($conf, $key) = @_;
return undef if !defined($conf->{agent});
my $agent = parse_guest_agent($conf);
return $agent->{$key};
}
sub parse_vga {
my ($value) = @_;
return {} if !$value;
my $res = eval { parse_property_string($vga_fmt, $value) };
warn $@ if $@;
return $res;
}
sub parse_rng {
my ($value) = @_;
return if !$value;
my $res = eval { parse_property_string($rng_fmt, $value) };
warn $@ if $@;
return $res;
}
PVE::JSONSchema::register_format('pve-qm-usb-device', \&verify_usb_device);
sub verify_usb_device {
my ($value, $noerr) = @_;
return $value if parse_usb_device($value);
return if $noerr;
die "unable to parse usb device\n";
}
# add JSON properties for create and set function
sub json_config_properties {
my $prop = shift;
foreach my $opt (keys %$confdesc) {
next if $opt eq 'parent' || $opt eq 'snaptime' || $opt eq 'vmstate' ||
$opt eq 'runningmachine' || $opt eq 'runningcpu';
$prop->{$opt} = $confdesc->{$opt};
}
return $prop;
}
# return copy of $confdesc_cloudinit to generate documentation
sub cloudinit_config_properties {
return dclone($confdesc_cloudinit);
}
sub check_type {
my ($key, $value) = @_;
die "unknown setting '$key'\n" if !$confdesc->{$key};
my $type = $confdesc->{$key}->{type};
if (!defined($value)) {
die "got undefined value\n";
}
if ($value =~ m/[\n\r]/) {
die "property contains a line feed\n";
}
if ($type eq 'boolean') {
return 1 if ($value eq '1') || ($value =~ m/^(on|yes|true)$/i);
return 0 if ($value eq '0') || ($value =~ m/^(off|no|false)$/i);
die "type check ('boolean') failed - got '$value'\n";
} elsif ($type eq 'integer') {
return int($1) if $value =~ m/^(\d+)$/;
die "type check ('integer') failed - got '$value'\n";
} elsif ($type eq 'number') {
return $value if $value =~ m/^(\d+)(\.\d+)?$/;
die "type check ('number') failed - got '$value'\n";
} elsif ($type eq 'string') {
if (my $fmt = $confdesc->{$key}->{format}) {
PVE::JSONSchema::check_format($fmt, $value);
return $value;
}
$value =~ s/^\"(.*)\"$/$1/;
return $value;
} else {
die "internal error"
}
}
sub destroy_vm {
my ($storecfg, $vmid, $skiplock, $replacement_conf, $purge_unreferenced) = @_;
my $conf = PVE::QemuConfig->load_config($vmid);
PVE::QemuConfig->check_lock($conf) if !$skiplock;
if ($conf->{template}) {
# check if any base image is still used by a linked clone
PVE::QemuConfig->foreach_volume_full($conf, { include_unused => 1 }, sub {
my ($ds, $drive) = @_;
return if drive_is_cdrom($drive);
my $volid = $drive->{file};
return if !$volid || $volid =~ m|^/|;
die "base volume '$volid' is still in use by linked cloned\n"
if PVE::Storage::volume_is_base_and_used($storecfg, $volid);
});
}
my $remove_owned_drive = sub {
my ($ds, $drive) = @_;
return if drive_is_cdrom($drive, 1);
my $volid = $drive->{file};
return if !$volid || $volid =~ m|^/|;
my ($path, $owner) = PVE::Storage::path($storecfg, $volid);
return if !$path || !$owner || ($owner != $vmid);
eval { PVE::Storage::vdisk_free($storecfg, $volid) };
warn "Could not remove disk '$volid', check manually: $@" if $@;
};
# only remove disks owned by this VM (referenced in the config)
my $include_opts = {
include_unused => 1,
extra_keys => ['vmstate'],
};
PVE::QemuConfig->foreach_volume_full($conf, $include_opts, $remove_owned_drive);
for my $snap (values %{$conf->{snapshots}}) {
next if !defined($snap->{vmstate});
my $drive = PVE::QemuConfig->parse_volume('vmstate', $snap->{vmstate}, 1);
next if !defined($drive);
$remove_owned_drive->('vmstate', $drive);
}
if ($purge_unreferenced) { # also remove unreferenced disk
my $vmdisks = PVE::Storage::vdisk_list($storecfg, undef, $vmid, undef, 'images');
PVE::Storage::foreach_volid($vmdisks, sub {
my ($volid, $sid, $volname, $d) = @_;
eval { PVE::Storage::vdisk_free($storecfg, $volid) };
warn $@ if $@;
});
}
if (defined $replacement_conf) {
PVE::QemuConfig->write_config($vmid, $replacement_conf);
} else {
PVE::QemuConfig->destroy_config($vmid);
}
}
sub parse_vm_config {
my ($filename, $raw) = @_;
return if !defined($raw);
my $res = {
digest => Digest::SHA::sha1_hex($raw),
snapshots => {},
pending => {},
};
$filename =~ m|/qemu-server/(\d+)\.conf$|
|| die "got strange filename '$filename'";
my $vmid = $1;
my $conf = $res;
my $descr;
my $section = '';
my @lines = split(/\n/, $raw);
foreach my $line (@lines) {
next if $line =~ m/^\s*$/;
if ($line =~ m/^\[PENDING\]\s*$/i) {
$section = 'pending';
if (defined($descr)) {
$descr =~ s/\s+$//;
$conf->{description} = $descr;
}
$descr = undef;
$conf = $res->{$section} = {};
next;
} elsif ($line =~ m/^\[([a-z][a-z0-9_\-]+)\]\s*$/i) {
$section = $1;
if (defined($descr)) {
$descr =~ s/\s+$//;
$conf->{description} = $descr;
}
$descr = undef;
$conf = $res->{snapshots}->{$section} = {};
next;
}
if ($line =~ m/^\#(.*)\s*$/) {
$descr = '' if !defined($descr);
$descr .= PVE::Tools::decode_text($1) . "\n";
next;
}
if ($line =~ m/^(description):\s*(.*\S)\s*$/) {
$descr = '' if !defined($descr);
$descr .= PVE::Tools::decode_text($2);
} elsif ($line =~ m/snapstate:\s*(prepare|delete)\s*$/) {
$conf->{snapstate} = $1;
} elsif ($line =~ m/^(args):\s*(.*\S)\s*$/) {
my $key = $1;
my $value = $2;
$conf->{$key} = $value;
} elsif ($line =~ m/^delete:\s*(.*\S)\s*$/) {
my $value = $1;
if ($section eq 'pending') {
$conf->{delete} = $value; # we parse this later
} else {
warn "vm $vmid - propertry 'delete' is only allowed in [PENDING]\n";
}
} elsif ($line =~ m/^([a-z][a-z_]*\d*):\s*(.+?)\s*$/) {
my $key = $1;
my $value = $2;
eval { $value = check_type($key, $value); };
if ($@) {
warn "vm $vmid - unable to parse value of '$key' - $@";
} else {
$key = 'ide2' if $key eq 'cdrom';
my $fmt = $confdesc->{$key}->{format};
if ($fmt && $fmt =~ /^pve-qm-(?:ide|scsi|virtio|sata)$/) {
my $v = parse_drive($key, $value);
if (my $volid = filename_to_volume_id($vmid, $v->{file}, $v->{media})) {
$v->{file} = $volid;
$value = print_drive($v);
} else {
warn "vm $vmid - unable to parse value of '$key'\n";
next;
}
}
$conf->{$key} = $value;
}
} else {
warn "vm $vmid - unable to parse config: $line\n";
}
}
if (defined($descr)) {
$descr =~ s/\s+$//;
$conf->{description} = $descr;
}
delete $res->{snapstate}; # just to be sure
return $res;
}
sub write_vm_config {
my ($filename, $conf) = @_;
delete $conf->{snapstate}; # just to be sure
if ($conf->{cdrom}) {
die "option ide2 conflicts with cdrom\n" if $conf->{ide2};
$conf->{ide2} = $conf->{cdrom};
delete $conf->{cdrom};
}
# we do not use 'smp' any longer
if ($conf->{sockets}) {
delete $conf->{smp};
} elsif ($conf->{smp}) {
$conf->{sockets} = $conf->{smp};
delete $conf->{cores};
delete $conf->{smp};
}
my $used_volids = {};
my $cleanup_config = sub {
my ($cref, $pending, $snapname) = @_;
foreach my $key (keys %$cref) {
next if $key eq 'digest' || $key eq 'description' || $key eq 'snapshots' ||
$key eq 'snapstate' || $key eq 'pending';
my $value = $cref->{$key};
if ($key eq 'delete') {
die "propertry 'delete' is only allowed in [PENDING]\n"
if !$pending;
# fixme: check syntax?
next;
}
eval { $value = check_type($key, $value); };
die "unable to parse value of '$key' - $@" if $@;
$cref->{$key} = $value;
if (!$snapname && is_valid_drivename($key)) {
my $drive = parse_drive($key, $value);
$used_volids->{$drive->{file}} = 1 if $drive && $drive->{file};
}
}
};
&$cleanup_config($conf);
&$cleanup_config($conf->{pending}, 1);
foreach my $snapname (keys %{$conf->{snapshots}}) {
die "internal error: snapshot name '$snapname' is forbidden" if lc($snapname) eq 'pending';
&$cleanup_config($conf->{snapshots}->{$snapname}, undef, $snapname);
}
# remove 'unusedX' settings if we re-add a volume
foreach my $key (keys %$conf) {
my $value = $conf->{$key};
if ($key =~ m/^unused/ && $used_volids->{$value}) {
delete $conf->{$key};
}
}
my $generate_raw_config = sub {
my ($conf, $pending) = @_;
my $raw = '';
# add description as comment to top of file
if (defined(my $descr = $conf->{description})) {
if ($descr) {
foreach my $cl (split(/\n/, $descr)) {
$raw .= '#' . PVE::Tools::encode_text($cl) . "\n";
}
} else {
$raw .= "#\n" if $pending;
}
}
foreach my $key (sort keys %$conf) {
next if $key =~ /^(digest|description|pending|snapshots)$/;
$raw .= "$key: $conf->{$key}\n";
}
return $raw;
};
my $raw = &$generate_raw_config($conf);
if (scalar(keys %{$conf->{pending}})){
$raw .= "\n[PENDING]\n";
$raw .= &$generate_raw_config($conf->{pending}, 1);
}
foreach my $snapname (sort keys %{$conf->{snapshots}}) {
$raw .= "\n[$snapname]\n";
$raw .= &$generate_raw_config($conf->{snapshots}->{$snapname});
}
return $raw;
}
sub load_defaults {
my $res = {};
# we use static defaults from our JSON schema configuration
foreach my $key (keys %$confdesc) {
if (defined(my $default = $confdesc->{$key}->{default})) {
$res->{$key} = $default;
}
}
return $res;
}
sub config_list {
my $vmlist = PVE::Cluster::get_vmlist();
my $res = {};
return $res if !$vmlist || !$vmlist->{ids};
my $ids = $vmlist->{ids};
my $nodename = nodename();
foreach my $vmid (keys %$ids) {
my $d = $ids->{$vmid};
next if !$d->{node} || $d->{node} ne $nodename;
next if !$d->{type} || $d->{type} ne 'qemu';
$res->{$vmid}->{exists} = 1;
}
return $res;
}
# test if VM uses local resources (to prevent migration)
sub check_local_resources {
my ($conf, $noerr) = @_;
my @loc_res = ();
push @loc_res, "hostusb" if $conf->{hostusb}; # old syntax
push @loc_res, "hostpci" if $conf->{hostpci}; # old syntax
push @loc_res, "ivshmem" if $conf->{ivshmem};
foreach my $k (keys %$conf) {
next if $k =~ m/^usb/ && ($conf->{$k} =~ m/^spice(?![^,])/);
# sockets are safe: they will recreated be on the target side post-migrate
next if $k =~ m/^serial/ && ($conf->{$k} eq 'socket');
push @loc_res, $k if $k =~ m/^(usb|hostpci|serial|parallel)\d+$/;
}
die "VM uses local resources\n" if scalar @loc_res && !$noerr;
return \@loc_res;
}
# check if used storages are available on all nodes (use by migrate)
sub check_storage_availability {
my ($storecfg, $conf, $node) = @_;
PVE::QemuConfig->foreach_volume($conf, sub {
my ($ds, $drive) = @_;
my $volid = $drive->{file};
return if !$volid;
my ($sid, $volname) = PVE::Storage::parse_volume_id($volid, 1);
return if !$sid;
# check if storage is available on both nodes
my $scfg = PVE::Storage::storage_check_node($storecfg, $sid);
PVE::Storage::storage_check_node($storecfg, $sid, $node);
});
}
# list nodes where all VM images are available (used by has_feature API)
sub shared_nodes {
my ($conf, $storecfg) = @_;
my $nodelist = PVE::Cluster::get_nodelist();
my $nodehash = { map { $_ => 1 } @$nodelist };
my $nodename = nodename();
PVE::QemuConfig->foreach_volume($conf, sub {
my ($ds, $drive) = @_;
my $volid = $drive->{file};
return if !$volid;
my ($storeid, $volname) = PVE::Storage::parse_volume_id($volid, 1);
if ($storeid) {
my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
if ($scfg->{disable}) {
$nodehash = {};
} elsif (my $avail = $scfg->{nodes}) {
foreach my $node (keys %$nodehash) {
delete $nodehash->{$node} if !$avail->{$node};
}
} elsif (!$scfg->{shared}) {
foreach my $node (keys %$nodehash) {
delete $nodehash->{$node} if $node ne $nodename
}
}
}
});
return $nodehash
}
sub check_local_storage_availability {
my ($conf, $storecfg) = @_;
my $nodelist = PVE::Cluster::get_nodelist();
my $nodehash = { map { $_ => {} } @$nodelist };
PVE::QemuConfig->foreach_volume($conf, sub {
my ($ds, $drive) = @_;
my $volid = $drive->{file};
return if !$volid;
my ($storeid, $volname) = PVE::Storage::parse_volume_id($volid, 1);
if ($storeid) {
my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
if ($scfg->{disable}) {
foreach my $node (keys %$nodehash) {
$nodehash->{$node}->{unavailable_storages}->{$storeid} = 1;
}
} elsif (my $avail = $scfg->{nodes}) {
foreach my $node (keys %$nodehash) {
if (!$avail->{$node}) {
$nodehash->{$node}->{unavailable_storages}->{$storeid} = 1;
}
}
}
}
});
foreach my $node (values %$nodehash) {
if (my $unavail = $node->{unavailable_storages}) {
$node->{unavailable_storages} = [ sort keys %$unavail ];
}
}
return $nodehash
}
# Compat only, use assert_config_exists_on_node and vm_running_locally where possible
sub check_running {
my ($vmid, $nocheck, $node) = @_;
PVE::QemuConfig::assert_config_exists_on_node($vmid, $node) if !$nocheck;
return PVE::QemuServer::Helpers::vm_running_locally($vmid);
}
sub vzlist {
my $vzlist = config_list();
my $fd = IO::Dir->new($PVE::QemuServer::Helpers::var_run_tmpdir) || return $vzlist;
while (defined(my $de = $fd->read)) {
next if $de !~ m/^(\d+)\.pid$/;
my $vmid = $1;
next if !defined($vzlist->{$vmid});
if (my $pid = check_running($vmid)) {
$vzlist->{$vmid}->{pid} = $pid;
}
}
return $vzlist;
}
our $vmstatus_return_properties = {
vmid => get_standard_option('pve-vmid'),
status => {
description => "Qemu process status.",
type => 'string',
enum => ['stopped', 'running'],
},
maxmem => {
description => "Maximum memory in bytes.",
type => 'integer',
optional => 1,
renderer => 'bytes',
},
maxdisk => {
description => "Root disk size in bytes.",
type => 'integer',
optional => 1,
renderer => 'bytes',
},
name => {
description => "VM name.",
type => 'string',
optional => 1,
},
qmpstatus => {
description => "Qemu QMP agent status.",
type => 'string',
optional => 1,
},
pid => {
description => "PID of running qemu process.",
type => 'integer',
optional => 1,
},
uptime => {
description => "Uptime.",
type => 'integer',
optional => 1,
renderer => 'duration',
},
cpus => {
description => "Maximum usable CPUs.",
type => 'number',
optional => 1,
},
lock => {
description => "The current config lock, if any.",
type => 'string',
optional => 1,
},
tags => {
description => "The current configured tags, if any",
type => 'string',
optional => 1,
},
'running-machine' => {
description => "The currently running machine type (if running).",
type => 'string',
optional => 1,
},
'running-qemu' => {
description => "The currently running QEMU version (if running).",
type => 'string',
optional => 1,
},
};
my $last_proc_pid_stat;
# get VM status information
# This must be fast and should not block ($full == false)
# We only query KVM using QMP if $full == true (this can be slow)
sub vmstatus {
my ($opt_vmid, $full) = @_;
my $res = {};
my $storecfg = PVE::Storage::config();
my $list = vzlist();
my $defaults = load_defaults();
my ($uptime) = PVE::ProcFSTools::read_proc_uptime(1);
my $cpucount = $cpuinfo->{cpus} || 1;
foreach my $vmid (keys %$list) {
next if $opt_vmid && ($vmid ne $opt_vmid);
my $conf = PVE::QemuConfig->load_config($vmid);
my $d = { vmid => $vmid };
$d->{pid} = $list->{$vmid}->{pid};
# fixme: better status?
$d->{status} = $list->{$vmid}->{pid} ? 'running' : 'stopped';
my $size = PVE::QemuServer::Drive::bootdisk_size($storecfg, $conf);
if (defined($size)) {
$d->{disk} = 0; # no info available
$d->{maxdisk} = $size;
} else {
$d->{disk} = 0;
$d->{maxdisk} = 0;
}
$d->{cpus} = ($conf->{sockets} || $defaults->{sockets})
* ($conf->{cores} || $defaults->{cores});
$d->{cpus} = $cpucount if $d->{cpus} > $cpucount;
$d->{cpus} = $conf->{vcpus} if $conf->{vcpus};
$d->{name} = $conf->{name} || "VM $vmid";
$d->{maxmem} = $conf->{memory} ? $conf->{memory}*(1024*1024)
: $defaults->{memory}*(1024*1024);
if ($conf->{balloon}) {
$d->{balloon_min} = $conf->{balloon}*(1024*1024);
$d->{shares} = defined($conf->{shares}) ? $conf->{shares}
: $defaults->{shares};
}
$d->{uptime} = 0;
$d->{cpu} = 0;
$d->{mem} = 0;
$d->{netout} = 0;
$d->{netin} = 0;
$d->{diskread} = 0;
$d->{diskwrite} = 0;
$d->{template} = 1 if PVE::QemuConfig->is_template($conf);
$d->{serial} = 1 if conf_has_serial($conf);
$d->{lock} = $conf->{lock} if $conf->{lock};
$d->{tags} = $conf->{tags} if defined($conf->{tags});
$res->{$vmid} = $d;
}
my $netdev = PVE::ProcFSTools::read_proc_net_dev();
foreach my $dev (keys %$netdev) {
next if $dev !~ m/^tap([1-9]\d*)i/;
my $vmid = $1;
my $d = $res->{$vmid};
next if !$d;
$d->{netout} += $netdev->{$dev}->{receive};
$d->{netin} += $netdev->{$dev}->{transmit};
if ($full) {
$d->{nics}->{$dev}->{netout} = $netdev->{$dev}->{receive};
$d->{nics}->{$dev}->{netin} = $netdev->{$dev}->{transmit};
}
}
my $ctime = gettimeofday;
foreach my $vmid (keys %$list) {
my $d = $res->{$vmid};
my $pid = $d->{pid};
next if !$pid;
my $pstat = PVE::ProcFSTools::read_proc_pid_stat($pid);
next if !$pstat; # not running
my $used = $pstat->{utime} + $pstat->{stime};
$d->{uptime} = int(($uptime - $pstat->{starttime})/$cpuinfo->{user_hz});
if ($pstat->{vsize}) {
$d->{mem} = int(($pstat->{rss}/$pstat->{vsize})*$d->{maxmem});
}
my $old = $last_proc_pid_stat->{$pid};
if (!$old) {
$last_proc_pid_stat->{$pid} = {
time => $ctime,
used => $used,
cpu => 0,
};
next;
}
my $dtime = ($ctime - $old->{time}) * $cpucount * $cpuinfo->{user_hz};
if ($dtime > 1000) {
my $dutime = $used - $old->{used};
$d->{cpu} = (($dutime/$dtime)* $cpucount) / $d->{cpus};
$last_proc_pid_stat->{$pid} = {
time => $ctime,
used => $used,
cpu => $d->{cpu},
};
} else {
$d->{cpu} = $old->{cpu};
}
}
return $res if !$full;
my $qmpclient = PVE::QMPClient->new();
my $ballooncb = sub {
my ($vmid, $resp) = @_;
my $info = $resp->{'return'};
return if !$info->{max_mem};
my $d = $res->{$vmid};
# use memory assigned to VM
$d->{maxmem} = $info->{max_mem};
$d->{balloon} = $info->{actual};
if (defined($info->{total_mem}) && defined($info->{free_mem})) {
$d->{mem} = $info->{total_mem} - $info->{free_mem};
$d->{freemem} = $info->{free_mem};
}
$d->{ballooninfo} = $info;
};
my $blockstatscb = sub {
my ($vmid, $resp) = @_;
my $data = $resp->{'return'} || [];
my $totalrdbytes = 0;
my $totalwrbytes = 0;
for my $blockstat (@$data) {
$totalrdbytes = $totalrdbytes + $blockstat->{stats}->{rd_bytes};
$totalwrbytes = $totalwrbytes + $blockstat->{stats}->{wr_bytes};
$blockstat->{device} =~ s/drive-//;
$res->{$vmid}->{blockstat}->{$blockstat->{device}} = $blockstat->{stats};
}
$res->{$vmid}->{diskread} = $totalrdbytes;
$res->{$vmid}->{diskwrite} = $totalwrbytes;
};
my $machinecb = sub {
my ($vmid, $resp) = @_;
my $data = $resp->{'return'} || [];
$res->{$vmid}->{'running-machine'} =
PVE::QemuServer::Machine::current_from_query_machines($data);
};
my $versioncb = sub {
my ($vmid, $resp) = @_;
my $data = $resp->{'return'} // {};
my $version = 'unknown';
if (my $v = $data->{qemu}) {
$version = $v->{major} . "." . $v->{minor} . "." . $v->{micro};
}
$res->{$vmid}->{'running-qemu'} = $version;
};
my $statuscb = sub {
my ($vmid, $resp) = @_;
$qmpclient->queue_cmd($vmid, $blockstatscb, 'query-blockstats');
$qmpclient->queue_cmd($vmid, $machinecb, 'query-machines');
$qmpclient->queue_cmd($vmid, $versioncb, 'query-version');
# this fails if ballon driver is not loaded, so this must be
# the last commnand (following command are aborted if this fails).
$qmpclient->queue_cmd($vmid, $ballooncb, 'query-balloon');
my $status = 'unknown';
if (!defined($status = $resp->{'return'}->{status})) {
warn "unable to get VM status\n";
return;
}
$res->{$vmid}->{qmpstatus} = $resp->{'return'}->{status};
};
foreach my $vmid (keys %$list) {
next if $opt_vmid && ($vmid ne $opt_vmid);
next if !$res->{$vmid}->{pid}; # not running
$qmpclient->queue_cmd($vmid, $statuscb, 'query-status');
}
$qmpclient->queue_execute(undef, 2);
foreach my $vmid (keys %$list) {
next if $opt_vmid && ($vmid ne $opt_vmid);
next if !$res->{$vmid}->{pid}; #not running
# we can't use the $qmpclient since it might have already aborted on
# 'query-balloon', but this might also fail for older versions...
my $qemu_support = eval { mon_cmd($vmid, "query-proxmox-support") };
$res->{$vmid}->{'proxmox-support'} = $qemu_support // {};
}
foreach my $vmid (keys %$list) {
next if $opt_vmid && ($vmid ne $opt_vmid);
$res->{$vmid}->{qmpstatus} = $res->{$vmid}->{status} if !$res->{$vmid}->{qmpstatus};
}
return $res;
}
sub conf_has_serial {
my ($conf) = @_;
for (my $i = 0; $i < $MAX_SERIAL_PORTS; $i++) {
if ($conf->{"serial$i"}) {
return 1;
}
}
return 0;
}
sub conf_has_audio {
my ($conf, $id) = @_;
$id //= 0;
my $audio = $conf->{"audio$id"};
return if !defined($audio);
my $audioproperties = parse_property_string($audio_fmt, $audio);
my $audiodriver = $audioproperties->{driver} // 'spice';
return {
dev => $audioproperties->{device},
dev_id => "audiodev$id",
backend => $audiodriver,
backend_id => "$audiodriver-backend${id}",
};
}
sub audio_devs {
my ($audio, $audiopciaddr, $machine_version) = @_;
my $devs = [];
my $id = $audio->{dev_id};
my $audiodev = "";
if (min_version($machine_version, 4, 2)) {
$audiodev = ",audiodev=$audio->{backend_id}";
}
if ($audio->{dev} eq 'AC97') {
push @$devs, '-device', "AC97,id=${id}${audiopciaddr}$audiodev";
} elsif ($audio->{dev} =~ /intel\-hda$/) {
push @$devs, '-device', "$audio->{dev},id=${id}${audiopciaddr}";
push @$devs, '-device', "hda-micro,id=${id}-codec0,bus=${id}.0,cad=0$audiodev";
push @$devs, '-device', "hda-duplex,id=${id}-codec1,bus=${id}.0,cad=1$audiodev";
} else {
die "unkown audio device '$audio->{dev}', implement me!";
}
push @$devs, '-audiodev', "$audio->{backend},id=$audio->{backend_id}";
return $devs;
}
sub vga_conf_has_spice {
my ($vga) = @_;
my $vgaconf = parse_vga($vga);
my $vgatype = $vgaconf->{type};
return 0 if !$vgatype || $vgatype !~ m/^qxl([234])?$/;
return $1 || 1;
}
sub is_native($) {
my ($arch) = @_;
return get_host_arch() eq $arch;
}
sub get_vm_arch {
my ($conf) = @_;
return $conf->{arch} // get_host_arch();
}
my $default_machines = {
x86_64 => 'pc',
aarch64 => 'virt',
};
sub get_installed_machine_version {
my ($kvmversion) = @_;
$kvmversion = kvm_user_version() if !defined($kvmversion);
$kvmversion =~ m/^(\d+\.\d+)/;
return $1;
}
sub windows_get_pinned_machine_version {
my ($machine, $base_version, $kvmversion) = @_;
my $pin_version = $base_version;
if (!defined($base_version) ||
!PVE::QemuServer::Machine::can_run_pve_machine_version($base_version, $kvmversion)
) {
$pin_version = get_installed_machine_version($kvmversion);
}
if (!$machine || $machine eq 'pc') {
$machine = "pc-i440fx-$pin_version";
} elsif ($machine eq 'q35') {
$machine = "pc-q35-$pin_version";
} elsif ($machine eq 'virt') {
$machine = "virt-$pin_version";
} else {
warn "unknown machine type '$machine', not touching that!\n";
}
return $machine;
}
sub get_vm_machine {
my ($conf, $forcemachine, $arch, $add_pve_version, $kvmversion) = @_;
my $machine = $forcemachine || $conf->{machine};
if (!$machine || $machine =~ m/^(?:pc|q35|virt)$/) {
$kvmversion //= kvm_user_version();
# we must pin Windows VMs without a specific version to 5.1, as 5.2 fixed a bug in ACPI
# layout which confuses windows quite a bit and may result in various regressions..
# see: https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg08484.html
if (windows_version($conf->{ostype})) {
$machine = windows_get_pinned_machine_version($machine, '5.1', $kvmversion);
}
$arch //= 'x86_64';
$machine ||= $default_machines->{$arch};
if ($add_pve_version) {
my $pvever = PVE::QemuServer::Machine::get_pve_version($kvmversion);
$machine .= "+pve$pvever";
}
}
if ($add_pve_version && $machine !~ m/\+pve\d+?(?:\.pxe)?$/) {
my $is_pxe = $machine =~ m/^(.*?)\.pxe$/;
$machine = $1 if $is_pxe;
# for version-pinned machines that do not include a pve-version (e.g.
# pc-q35-4.1), we assume 0 to keep them stable in case we bump
$machine .= '+pve0';
$machine .= '.pxe' if $is_pxe;
}
return $machine;
}
sub get_ovmf_files($) {
my ($arch) = @_;
my $ovmf = $OVMF->{$arch}
or die "no OVMF images known for architecture '$arch'\n";
return @$ovmf;
}
my $Arch2Qemu = {
aarch64 => '/usr/bin/qemu-system-aarch64',
x86_64 => '/usr/bin/qemu-system-x86_64',
};
sub get_command_for_arch($) {
my ($arch) = @_;
return '/usr/bin/kvm' if is_native($arch);
my $cmd = $Arch2Qemu->{$arch}
or die "don't know how to emulate architecture '$arch'\n";
return $cmd;
}
# To use query_supported_cpu_flags and query_understood_cpu_flags to get flags
# to use in a QEMU command line (-cpu element), first array_intersect the result
# of query_supported_ with query_understood_. This is necessary because:
#
# a) query_understood_ returns flags the host cannot use and
# b) query_supported_ (rather the QMP call) doesn't actually return CPU
# flags, but CPU settings - with most of them being flags. Those settings
# (and some flags, curiously) cannot be specified as a "-cpu" argument.
#
# query_supported_ needs to start up to 2 temporary VMs and is therefore rather
# expensive. If you need the value returned from this, you can get it much
# cheaper from pmxcfs using PVE::Cluster::get_node_kv('cpuflags-$accel') with
# $accel being 'kvm' or 'tcg'.
#
# pvestatd calls this function on startup and whenever the QEMU/KVM version
# changes, automatically populating pmxcfs.
#
# Returns: { kvm => [ flagX, flagY, ... ], tcg => [ flag1, flag2, ... ] }
# since kvm and tcg machines support different flags
#
sub query_supported_cpu_flags {
my ($arch) = @_;
$arch //= get_host_arch();
my $default_machine = $default_machines->{$arch};
my $flags = {};
# FIXME: Once this is merged, the code below should work for ARM as well:
# https://lists.nongnu.org/archive/html/qemu-devel/2019-06/msg04947.html
die "QEMU/KVM cannot detect CPU flags on ARM (aarch64)\n" if
$arch eq "aarch64";
my $kvm_supported = defined(kvm_version());
my $qemu_cmd = get_command_for_arch($arch);
my $fakevmid = -1;
my $pidfile = PVE::QemuServer::Helpers::pidfile_name($fakevmid);
# Start a temporary (frozen) VM with vmid -1 to allow sending a QMP command
my $query_supported_run_qemu = sub {
my ($kvm) = @_;
my $flags = {};
my $cmd = [
$qemu_cmd,
'-machine', $default_machine,
'-display', 'none',
'-chardev', "socket,id=qmp,path=/var/run/qemu-server/$fakevmid.qmp,server=on,wait=off",
'-mon', 'chardev=qmp,mode=control',
'-pidfile', $pidfile,
'-S', '-daemonize'
];
if (!$kvm) {
push @$cmd, '-accel', 'tcg';
}
my $rc = run_command($cmd, noerr => 1, quiet => 0);
die "QEMU flag querying VM exited with code " . $rc if $rc;
eval {
my $cmd_result = mon_cmd(
$fakevmid,
'query-cpu-model-expansion',
type => 'full',
model => { name => 'host' }
);
my $props = $cmd_result->{model}->{props};
foreach my $prop (keys %$props) {
next if $props->{$prop} ne '1';
# QEMU returns some flags multiple times, with '_', '.' or '-'
# (e.g. lahf_lm and lahf-lm; sse4.2, sse4-2 and sse4_2; ...).
# We only keep those with underscores, to match /proc/cpuinfo
$prop =~ s/\.|-/_/g;
$flags->{$prop} = 1;
}
};
my $err = $@;
# force stop with 10 sec timeout and 'nocheck'
# always stop, even if QMP failed
vm_stop(undef, $fakevmid, 1, 1, 10, 0, 1);
die $err if $err;
return [ sort keys %$flags ];
};
# We need to query QEMU twice, since KVM and TCG have different supported flags
PVE::QemuConfig->lock_config($fakevmid, sub {
$flags->{tcg} = eval { $query_supported_run_qemu->(0) };
warn "warning: failed querying supported tcg flags: $@\n" if $@;
if ($kvm_supported) {
$flags->{kvm} = eval { $query_supported_run_qemu->(1) };
warn "warning: failed querying supported kvm flags: $@\n" if $@;
}
});
return $flags;
}
# Understood CPU flags are written to a file at 'pve-qemu' compile time
my $understood_cpu_flag_dir = "/usr/share/kvm";
sub query_understood_cpu_flags {
my $arch = get_host_arch();
my $filepath = "$understood_cpu_flag_dir/recognized-CPUID-flags-$arch";
die "Cannot query understood QEMU CPU flags for architecture: $arch (file not found)\n"
if ! -e $filepath;
my $raw = file_get_contents($filepath);
$raw =~ s/^\s+|\s+$//g;
my @flags = split(/\s+/, $raw);
return \@flags;
}
sub config_to_command {
my ($storecfg, $vmid, $conf, $defaults, $forcemachine, $forcecpu,
$pbs_backing) = @_;
my $cmd = [];
my $globalFlags = [];
my $machineFlags = [];
my $rtcFlags = [];
my $devices = [];
my $pciaddr = '';
my $bridges = {};
my $ostype = $conf->{ostype};
my $winversion = windows_version($ostype);
my $kvm = $conf->{kvm};
my $nodename = nodename();
my $arch = get_vm_arch($conf);
my $kvm_binary = get_command_for_arch($arch);
my $kvmver = kvm_user_version($kvm_binary);
if (!$kvmver || $kvmver !~ m/^(\d+)\.(\d+)/ || $1 < 3) {
$kvmver //= "undefined";
die "Detected old QEMU binary ('$kvmver', at least 3.0 is required)\n";
}
my $add_pve_version = min_version($kvmver, 4, 1);
my $machine_type = get_vm_machine($conf, $forcemachine, $arch, $add_pve_version);
my $machine_version = extract_version($machine_type, $kvmver);
$kvm //= 1 if is_native($arch);
$machine_version =~ m/(\d+)\.(\d+)/;
my ($machine_major, $machine_minor) = ($1, $2);
if ($kvmver =~ m/^\d+\.\d+\.(\d+)/ && $1 >= 90) {
warn "warning: Installed QEMU version ($kvmver) is a release candidate, ignoring version checks\n";
} elsif (!min_version($kvmver, $machine_major, $machine_minor)) {
die "Installed QEMU version '$kvmver' is too old to run machine type '$machine_type',"
." please upgrade node '$nodename'\n"
} elsif (!PVE::QemuServer::Machine::can_run_pve_machine_version($machine_version, $kvmver)) {
my $max_pve_version = PVE::QemuServer::Machine::get_pve_version($machine_version);
die "Installed qemu-server (max feature level for $machine_major.$machine_minor is"
." pve$max_pve_version) is too old to run machine type '$machine_type', please upgrade"
." node '$nodename'\n";
}
# if a specific +pve version is required for a feature, use $version_guard
# instead of min_version to allow machines to be run with the minimum
# required version
my $required_pve_version = 0;
my $version_guard = sub {
my ($major, $minor, $pve) = @_;
return 0 if !min_version($machine_version, $major, $minor, $pve);
my $max_pve = PVE::QemuServer::Machine::get_pve_version("$major.$minor");
return 1 if min_version($machine_version, $major, $minor, $max_pve+1);
$required_pve_version = $pve if $pve && $pve > $required_pve_version;
return 1;
};
if ($kvm && !defined kvm_version()) {
die "KVM virtualisation configured, but not available. Either disable in VM configuration"
." or enable in BIOS.\n";
}
my $q35 = PVE::QemuServer::Machine::machine_type_is_q35($conf);
my $hotplug_features = parse_hotplug_features(defined($conf->{hotplug}) ? $conf->{hotplug} : '1');
my $use_old_bios_files = undef;
($use_old_bios_files, $machine_type) = qemu_use_old_bios_files($machine_type);
my $cpuunits = defined($conf->{cpuunits}) ?
$conf->{cpuunits} : $defaults->{cpuunits};
push @$cmd, $kvm_binary;
push @$cmd, '-id', $vmid;
my $vmname = $conf->{name} || "vm$vmid";
push @$cmd, '-name', $vmname;
push @$cmd, '-no-shutdown';
my $use_virtio = 0;
my $qmpsocket = PVE::QemuServer::Helpers::qmp_socket($vmid);
push @$cmd, '-chardev', "socket,id=qmp,path=$qmpsocket,server=on,wait=off";
push @$cmd, '-mon', "chardev=qmp,mode=control";
if (min_version($machine_version, 2, 12)) {
push @$cmd, '-chardev', "socket,id=qmp-event,path=/var/run/qmeventd.sock,reconnect=5";
push @$cmd, '-mon', "chardev=qmp-event,mode=control";
}
push @$cmd, '-pidfile' , PVE::QemuServer::Helpers::pidfile_name($vmid);
push @$cmd, '-daemonize';
if ($conf->{smbios1}) {
my $smbios_conf = parse_smbios1($conf->{smbios1});
if ($smbios_conf->{base64}) {
# Do not pass base64 flag to qemu
delete $smbios_conf->{base64};
my $smbios_string = "";
foreach my $key (keys %$smbios_conf) {
my $value;
if ($key eq "uuid") {
$value = $smbios_conf->{uuid}
} else {
$value = decode_base64($smbios_conf->{$key});
}
# qemu accepts any binary data, only commas need escaping by double comma
$value =~ s/,/,,/g;
$smbios_string .= "," . $key . "=" . $value if $value;
}
push @$cmd, '-smbios', "type=1" . $smbios_string;
} else {
push @$cmd, '-smbios', "type=1,$conf->{smbios1}";
}
}
if ($conf->{bios} && $conf->{bios} eq 'ovmf') {
my ($ovmf_code, $ovmf_vars) = get_ovmf_files($arch);
die "uefi base image '$ovmf_code' not found\n" if ! -f $ovmf_code;
my ($path, $format);
if (my $efidisk = $conf->{efidisk0}) {
my $d = parse_drive('efidisk0', $efidisk);
my ($storeid, $volname) = PVE::Storage::parse_volume_id($d->{file}, 1);
$format = $d->{format};
if ($storeid) {
$path = PVE::Storage::path($storecfg, $d->{file});
if (!defined($format)) {
my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
$format = qemu_img_format($scfg, $volname);
}
} else {
$path = $d->{file};
die "efidisk format must be specified\n"
if !defined($format);
}
} else {
warn "no efidisk configured! Using temporary efivars disk.\n";
$path = "/tmp/$vmid-ovmf.fd";
PVE::Tools::file_copy($ovmf_vars, $path, -s $ovmf_vars);
$format = 'raw';
}
my $size_str = "";
if ($format eq 'raw' && $version_guard->(4, 1, 2)) {
$size_str = ",size=" . (-s $ovmf_vars);
}
push @$cmd, '-drive', "if=pflash,unit=0,format=raw,readonly=on,file=$ovmf_code";
push @$cmd, '-drive', "if=pflash,unit=1,format=$format,id=drive-efidisk0$size_str,file=$path";
}
# load q35 config
if ($q35) {
# we use different pcie-port hardware for qemu >= 4.0 for passthrough
if (min_version($machine_version, 4, 0)) {
push @$devices, '-readconfig', '/usr/share/qemu-server/pve-q35-4.0.cfg';
} else {
push @$devices, '-readconfig', '/usr/share/qemu-server/pve-q35.cfg';
}
}
if ($conf->{vmgenid}) {
push @$devices, '-device', 'vmgenid,guid='.$conf->{vmgenid};
}
# add usb controllers
my @usbcontrollers = PVE::QemuServer::USB::get_usb_controllers(
$conf, $bridges, $arch, $machine_type, $usbdesc->{format}, $MAX_USB_DEVICES);
push @$devices, @usbcontrollers if @usbcontrollers;
my $vga = parse_vga($conf->{vga});
my $qxlnum = vga_conf_has_spice($conf->{vga});
$vga->{type} = 'qxl' if $qxlnum;
if (!$vga->{type}) {
if ($arch eq 'aarch64') {
$vga->{type} = 'virtio';
} elsif (min_version($machine_version, 2, 9)) {
$vga->{type} = (!$winversion || $winversion >= 6) ? 'std' : 'cirrus';
} else {
$vga->{type} = ($winversion >= 6) ? 'std' : 'cirrus';
}
}
# enable absolute mouse coordinates (needed by vnc)
my $tablet;
if (defined($conf->{tablet})) {
$tablet = $conf->{tablet};
} else {
$tablet = $defaults->{tablet};
$tablet = 0 if $qxlnum; # disable for spice because it is not needed
$tablet = 0 if $vga->{type} =~ m/^serial\d+$/; # disable if we use serial terminal (no vga card)
}
if ($tablet) {
push @$devices, '-device', print_tabletdevice_full($conf, $arch) if $tablet;
my $kbd = print_keyboarddevice_full($conf, $arch);
push @$devices, '-device', $kbd if defined($kbd);
}
my $bootorder = device_bootorder($conf);
# host pci device passthrough
my ($kvm_off, $gpu_passthrough, $legacy_igd) = PVE::QemuServer::PCI::print_hostpci_devices(
$vmid, $conf, $devices, $vga, $winversion, $q35, $bridges, $arch, $machine_type, $bootorder);
# usb devices
my $usb_dev_features = {};
$usb_dev_features->{spice_usb3} = 1 if min_version($machine_version, 4, 0);
my @usbdevices = PVE::QemuServer::USB::get_usb_devices(
$conf, $usbdesc->{format}, $MAX_USB_DEVICES, $usb_dev_features, $bootorder);
push @$devices, @usbdevices if @usbdevices;
# serial devices
for (my $i = 0; $i < $MAX_SERIAL_PORTS; $i++) {
if (my $path = $conf->{"serial$i"}) {
if ($path eq 'socket') {
my $socket = "/var/run/qemu-server/${vmid}.serial$i";
push @$devices, '-chardev', "socket,id=serial$i,path=$socket,server=on,wait=off";
# On aarch64, serial0 is the UART device. Qemu only allows
# connecting UART devices via the '-serial' command line, as
# the device has a fixed slot on the hardware...
if ($arch eq 'aarch64' && $i == 0) {
push @$devices, '-serial', "chardev:serial$i";
} else {
push @$devices, '-device', "isa-serial,chardev=serial$i";
}
} else {
die "no such serial device\n" if ! -c $path;
push @$devices, '-chardev', "tty,id=serial$i,path=$path";
push @$devices, '-device', "isa-serial,chardev=serial$i";
}
}
}
# parallel devices
for (my $i = 0; $i < $MAX_PARALLEL_PORTS; $i++) {
if (my $path = $conf->{"parallel$i"}) {
die "no such parallel device\n" if ! -c $path;
my $devtype = $path =~ m!^/dev/usb/lp! ? 'tty' : 'parport';
push @$devices, '-chardev', "$devtype,id=parallel$i,path=$path";
push @$devices, '-device', "isa-parallel,chardev=parallel$i";
}
}
if (min_version($machine_version, 4, 0) && (my $audio = conf_has_audio($conf))) {
my $audiopciaddr = print_pci_addr("audio0", $bridges, $arch, $machine_type);
my $audio_devs = audio_devs($audio, $audiopciaddr, $machine_version);
push @$devices, @$audio_devs;
}
my $sockets = 1;
$sockets = $conf->{smp} if $conf->{smp}; # old style - no longer iused
$sockets = $conf->{sockets} if $conf->{sockets};
my $cores = $conf->{cores} || 1;
my $maxcpus = $sockets * $cores;
my $vcpus = $conf->{vcpus} ? $conf->{vcpus} : $maxcpus;
my $allowed_vcpus = $cpuinfo->{cpus};
die "MAX $allowed_vcpus vcpus allowed per VM on this node\n"
if ($allowed_vcpus < $maxcpus);
if($hotplug_features->{cpu} && min_version($machine_version, 2, 7)) {
push @$cmd, '-smp', "1,sockets=$sockets,cores=$cores,maxcpus=$maxcpus";
for (my $i = 2; $i <= $vcpus; $i++) {
my $cpustr = print_cpu_device($conf,$i);
push @$cmd, '-device', $cpustr;
}
} else {
push @$cmd, '-smp', "$vcpus,sockets=$sockets,cores=$cores,maxcpus=$maxcpus";
}
push @$cmd, '-nodefaults';
push @$cmd, '-boot', "menu=on,strict=on,reboot-timeout=1000,splash=/usr/share/qemu-server/bootsplash.jpg";
push @$cmd, '-no-acpi' if defined($conf->{acpi}) && $conf->{acpi} == 0;
push @$cmd, '-no-reboot' if defined($conf->{reboot}) && $conf->{reboot} == 0;
if ($vga->{type} && $vga->{type} !~ m/^serial\d+$/ && $vga->{type} ne 'none'){
push @$devices, '-device', print_vga_device(
$conf, $vga, $arch, $machine_version, $machine_type, undef, $qxlnum, $bridges);
my $socket = PVE::QemuServer::Helpers::vnc_socket($vmid);
push @$cmd, '-vnc', "unix:$socket,password=on";
} else {
push @$cmd, '-vga', 'none' if $vga->{type} eq 'none';
push @$cmd, '-nographic';
}
# time drift fix
my $tdf = defined($conf->{tdf}) ? $conf->{tdf} : $defaults->{tdf};
my $useLocaltime = $conf->{localtime};
if ($winversion >= 5) { # windows
$useLocaltime = 1 if !defined($conf->{localtime});
# use time drift fix when acpi is enabled
if (!(defined($conf->{acpi}) && $conf->{acpi} == 0)) {
$tdf = 1 if !defined($conf->{tdf});
}
}
if ($winversion >= 6) {
push @$globalFlags, 'kvm-pit.lost_tick_policy=discard';
push @$cmd, '-no-hpet';
}
push @$rtcFlags, 'driftfix=slew' if $tdf;
if ($conf->{startdate} && $conf->{startdate} ne 'now') {
push @$rtcFlags, "base=$conf->{startdate}";
} elsif ($useLocaltime) {
push @$rtcFlags, 'base=localtime';
}
if ($forcecpu) {
push @$cmd, '-cpu', $forcecpu;
} else {
push @$cmd, get_cpu_options($conf, $arch, $kvm, $kvm_off, $machine_version, $winversion, $gpu_passthrough);
}
PVE::QemuServer::Memory::config($conf, $vmid, $sockets, $cores, $defaults, $hotplug_features, $cmd);
push @$cmd, '-S' if $conf->{freeze};
push @$cmd, '-k', $conf->{keyboard} if defined($conf->{keyboard});
my $guest_agent = parse_guest_agent($conf);
if ($guest_agent->{enabled}) {
my $qgasocket = PVE::QemuServer::Helpers::qmp_socket($vmid, 1);
push @$devices, '-chardev', "socket,path=$qgasocket,server=on,wait=off,id=qga0";
if (!$guest_agent->{type} || $guest_agent->{type} eq 'virtio') {
my $pciaddr = print_pci_addr("qga0", $bridges, $arch, $machine_type);
push @$devices, '-device', "virtio-serial,id=qga0$pciaddr";
push @$devices, '-device', 'virtserialport,chardev=qga0,name=org.qemu.guest_agent.0';
} elsif ($guest_agent->{type} eq 'isa') {
push @$devices, '-device', "isa-serial,chardev=qga0";
}
}
my $rng = $conf->{rng0} ? parse_rng($conf->{rng0}) : undef;
if ($rng && $version_guard->(4, 1, 2)) {
check_rng_source($rng->{source});
my $max_bytes = $rng->{max_bytes} // $rng_fmt->{max_bytes}->{default};
my $period = $rng->{period} // $rng_fmt->{period}->{default};
my $limiter_str = "";
if ($max_bytes) {
$limiter_str = ",max-bytes=$max_bytes,period=$period";
}
my $rng_addr = print_pci_addr("rng0", $bridges, $arch, $machine_type);
push @$devices, '-object', "rng-random,filename=$rng->{source},id=rng0";
push @$devices, '-device', "virtio-rng-pci,rng=rng0$limiter_str$rng_addr";
}
my $spice_port;
if ($qxlnum) {
if ($qxlnum > 1) {
if ($winversion){
for (my $i = 1; $i < $qxlnum; $i++){
push @$devices, '-device', print_vga_device(
$conf, $vga, $arch, $machine_version, $machine_type, $i, $qxlnum, $bridges);
}
} else {
# assume other OS works like Linux
my ($ram, $vram) = ("134217728", "67108864");
if ($vga->{memory}) {
$ram = PVE::Tools::convert_size($qxlnum*4*$vga->{memory}, 'mb' => 'b');
$vram = PVE::Tools::convert_size($qxlnum*2*$vga->{memory}, 'mb' => 'b');
}
push @$cmd, '-global', "qxl-vga.ram_size=$ram";
push @$cmd, '-global', "qxl-vga.vram_size=$vram";
}
}
my $pciaddr = print_pci_addr("spice", $bridges, $arch, $machine_type);
my $pfamily = PVE::Tools::get_host_address_family($nodename);
my @nodeaddrs = PVE::Tools::getaddrinfo_all('localhost', family => $pfamily);
die "failed to get an ip address of type $pfamily for 'localhost'\n" if !@nodeaddrs;
push @$devices, '-device', "virtio-serial,id=spice$pciaddr";
push @$devices, '-chardev', "spicevmc,id=vdagent,name=vdagent";
push @$devices, '-device', "virtserialport,chardev=vdagent,name=com.redhat.spice.0";
my $localhost = PVE::Network::addr_to_ip($nodeaddrs[0]->{addr});
$spice_port = PVE::Tools::next_spice_port($pfamily, $localhost);
my $spice_enhancement_str = $conf->{spice_enhancements} // '';
my $spice_enhancement = parse_property_string($spice_enhancements_fmt, $spice_enhancement_str);
if ($spice_enhancement->{foldersharing}) {
push @$devices, '-chardev', "spiceport,id=foldershare,name=org.spice-space.webdav.0";
push @$devices, '-device', "virtserialport,chardev=foldershare,name=org.spice-space.webdav.0";
}
my $spice_opts = "tls-port=${spice_port},addr=$localhost,tls-ciphers=HIGH,seamless-migration=on";
$spice_opts .= ",streaming-video=$spice_enhancement->{videostreaming}"
if $spice_enhancement->{videostreaming};
push @$devices, '-spice', "$spice_opts";
}
# enable balloon by default, unless explicitly disabled
if (!defined($conf->{balloon}) || $conf->{balloon}) {
$pciaddr = print_pci_addr("balloon0", $bridges, $arch, $machine_type);
push @$devices, '-device', "virtio-balloon-pci,id=balloon0$pciaddr";
}
if ($conf->{watchdog}) {
my $wdopts = parse_watchdog($conf->{watchdog});
$pciaddr = print_pci_addr("watchdog", $bridges, $arch, $machine_type);
my $watchdog = $wdopts->{model} || 'i6300esb';
push @$devices, '-device', "$watchdog$pciaddr";
push @$devices, '-watchdog-action', $wdopts->{action} if $wdopts->{action};
}
my $vollist = [];
my $scsicontroller = {};
my $ahcicontroller = {};
my $scsihw = defined($conf->{scsihw}) ? $conf->{scsihw} : $defaults->{scsihw};
# Add iscsi initiator name if available
if (my $initiator = get_initiator_name()) {
push @$devices, '-iscsi', "initiator-name=$initiator";
}
PVE::QemuConfig->foreach_volume($conf, sub {
my ($ds, $drive) = @_;
if (PVE::Storage::parse_volume_id($drive->{file}, 1)) {
push @$vollist, $drive->{file};
}
# ignore efidisk here, already added in bios/fw handling code above
return if $drive->{interface} eq 'efidisk';
$use_virtio = 1 if $ds =~ m/^virtio/;
$drive->{bootindex} = $bootorder->{$ds} if $bootorder->{$ds};
if ($drive->{interface} eq 'virtio'){
push @$cmd, '-object', "iothread,id=iothread-$ds" if $drive->{iothread};
}
if ($drive->{interface} eq 'scsi') {
my ($maxdev, $controller, $controller_prefix) = scsihw_infos($conf, $drive);
die "scsi$drive->{index}: machine version 4.1~pve2 or higher is required to use more than 14 SCSI disks\n"
if $drive->{index} > 13 && !&$version_guard(4, 1, 2);
$pciaddr = print_pci_addr("$controller_prefix$controller", $bridges, $arch, $machine_type);
my $scsihw_type = $scsihw =~ m/^virtio-scsi-single/ ? "virtio-scsi-pci" : $scsihw;
my $iothread = '';
if($conf->{scsihw} && $conf->{scsihw} eq "virtio-scsi-single" && $drive->{iothread}){
$iothread .= ",iothread=iothread-$controller_prefix$controller";
push @$cmd, '-object', "iothread,id=iothread-$controller_prefix$controller";
} elsif ($drive->{iothread}) {
warn "iothread is only valid with virtio disk or virtio-scsi-single controller, ignoring\n";
}
my $queues = '';
if($conf->{scsihw} && $conf->{scsihw} eq "virtio-scsi-single" && $drive->{queues}){
$queues = ",num_queues=$drive->{queues}";
}
push @$devices, '-device', "$scsihw_type,id=$controller_prefix$controller$pciaddr$iothread$queues"
if !$scsicontroller->{$controller};
$scsicontroller->{$controller}=1;
}
if ($drive->{interface} eq 'sata') {
my $controller = int($drive->{index} / $PVE::QemuServer::Drive::MAX_SATA_DISKS);
$pciaddr = print_pci_addr("ahci$controller", $bridges, $arch, $machine_type);
push @$devices, '-device', "ahci,id=ahci$controller,multifunction=on$pciaddr"
if !$ahcicontroller->{$controller};
$ahcicontroller->{$controller}=1;
}
my $pbs_conf = $pbs_backing->{$ds};
my $pbs_name = undef;
if ($pbs_conf) {
$pbs_name = "drive-$ds-pbs";
push @$devices, '-blockdev', print_pbs_blockdev($pbs_conf, $pbs_name);
}
my $drive_cmd = print_drive_commandline_full($storecfg, $vmid, $drive, $pbs_name);
# extra protection for templates, but SATA and IDE don't support it..
my $read_only = PVE::QemuConfig->is_template($conf)
&& $drive->{interface} ne 'sata'
&& $drive->{interface} ne 'ide';
$drive_cmd .= ',readonly=on' if $read_only;
push @$devices, '-drive',$drive_cmd;
push @$devices, '-device', print_drivedevice_full(
$storecfg, $conf, $vmid, $drive, $bridges, $arch, $machine_type);
});
for (my $i = 0; $i < $MAX_NETS; $i++) {
my $netname = "net$i";
next if !$conf->{$netname};
my $d = parse_net($conf->{$netname});
next if !$d;
$use_virtio = 1 if $d->{model} eq 'virtio';
$d->{bootindex} = $bootorder->{$netname} if $bootorder->{$netname};
my $netdevfull = print_netdev_full($vmid, $conf, $arch, $d, $netname);
push @$devices, '-netdev', $netdevfull;
my $netdevicefull = print_netdevice_full(
$vmid, $conf, $d, $netname, $bridges, $use_old_bios_files, $arch, $machine_type);
push @$devices, '-device', $netdevicefull;
}
if ($conf->{ivshmem}) {
my $ivshmem = parse_property_string($ivshmem_fmt, $conf->{ivshmem});
my $bus;
if ($q35) {
$bus = print_pcie_addr("ivshmem");
} else {
$bus = print_pci_addr("ivshmem", $bridges, $arch, $machine_type);
}
my $ivshmem_name = $ivshmem->{name} // $vmid;
my $path = '/dev/shm/pve-shm-' . $ivshmem_name;
push @$devices, '-device', "ivshmem-plain,memdev=ivshmem$bus,";
push @$devices, '-object', "memory-backend-file,id=ivshmem,share=on,mem-path=$path"
.",size=$ivshmem->{size}M";
}
# pci.4 is nested in pci.1
$bridges->{1} = 1 if $bridges->{4};
if (!$q35) {
# add pci bridges
if (min_version($machine_version, 2, 3)) {
$bridges->{1} = 1;
$bridges->{2} = 1;
}
$bridges->{3} = 1 if $scsihw =~ m/^virtio-scsi-single/;
}
for my $k (sort {$b cmp $a} keys %$bridges) {
next if $q35 && $k < 4; # q35.cfg already includes bridges up to 3
my $k_name = $k;
if ($k == 2 && $legacy_igd) {
$k_name = "$k-igd";
}
$pciaddr = print_pci_addr("pci.$k_name", undef, $arch, $machine_type);
my $devstr = "pci-bridge,id=pci.$k,chassis_nr=$k$pciaddr";
if ($q35) {
# add after -readconfig pve-q35.cfg
splice @$devices, 2, 0, '-device', $devstr;
} else {
unshift @$devices, '-device', $devstr if $k > 0;
}
}
if (!$kvm) {
push @$machineFlags, 'accel=tcg';
}
my $machine_type_min = $machine_type;
if ($add_pve_version) {
$machine_type_min =~ s/\+pve\d+$//;
$machine_type_min .= "+pve$required_pve_version";
}
push @$machineFlags, "type=${machine_type_min}";
push @$cmd, @$devices;
push @$cmd, '-rtc', join(',', @$rtcFlags) if scalar(@$rtcFlags);
push @$cmd, '-machine', join(',', @$machineFlags) if scalar(@$machineFlags);
push @$cmd, '-global', join(',', @$globalFlags) if scalar(@$globalFlags);
if (my $vmstate = $conf->{vmstate}) {
my $statepath = PVE::Storage::path($storecfg, $vmstate);
push @$vollist, $vmstate;
push @$cmd, '-loadstate', $statepath;
print "activating and using '$vmstate' as vmstate\n";
}
# add custom args
if ($conf->{args}) {
my $aa = PVE::Tools::split_args($conf->{args});
push @$cmd, @$aa;
}
return wantarray ? ($cmd, $vollist, $spice_port) : $cmd;
}
sub check_rng_source {
my ($source) = @_;
# mostly relevant for /dev/hwrng, but doesn't hurt to check others too
die "cannot create VirtIO RNG device: source file '$source' doesn't exist\n"
if ! -e $source;
my $rng_current = '/sys/devices/virtual/misc/hw_random/rng_current';
if ($source eq '/dev/hwrng' && file_read_firstline($rng_current) eq 'none') {
# Needs to abort, otherwise QEMU crashes on first rng access. Note that rng_current cannot
# be changed to 'none' manually, so once the VM is past this point, it's no longer an issue.
die "Cannot start VM with passed-through RNG device: '/dev/hwrng' exists, but"
." '$rng_current' is set to 'none'. Ensure that a compatible hardware-RNG is attached"
." to the host.\n";
}
}
sub spice_port {
my ($vmid) = @_;
my $res = mon_cmd($vmid, 'query-spice');
return $res->{'tls-port'} || $res->{'port'} || die "no spice port\n";
}
sub vm_devices_list {
my ($vmid) = @_;
my $res = mon_cmd($vmid, 'query-pci');
my $devices_to_check = [];
my $devices = {};
foreach my $pcibus (@$res) {
push @$devices_to_check, @{$pcibus->{devices}},
}
while (@$devices_to_check) {
my $to_check = [];
for my $d (@$devices_to_check) {
$devices->{$d->{'qdev_id'}} = 1 if $d->{'qdev_id'};
next if !$d->{'pci_bridge'};
$devices->{$d->{'qdev_id'}} += scalar(@{$d->{'pci_bridge'}->{devices}});
push @$to_check, @{$d->{'pci_bridge'}->{devices}};
}
$devices_to_check = $to_check;
}
my $resblock = mon_cmd($vmid, 'query-block');
foreach my $block (@$resblock) {
if($block->{device} =~ m/^drive-(\S+)/){
$devices->{$1} = 1;
}
}
my $resmice = mon_cmd($vmid, 'query-mice');
foreach my $mice (@$resmice) {
if ($mice->{name} eq 'QEMU HID Tablet') {
$devices->{tablet} = 1;
last;
}
}
# for usb devices there is no query-usb
# but we can iterate over the entries in
# qom-list path=/machine/peripheral
my $resperipheral = mon_cmd($vmid, 'qom-list', path => '/machine/peripheral');
foreach my $per (@$resperipheral) {
if ($per->{name} =~ m/^usb\d+$/) {
$devices->{$per->{name}} = 1;
}
}
return $devices;
}
sub vm_deviceplug {
my ($storecfg, $conf, $vmid, $deviceid, $device, $arch, $machine_type) = @_;
my $q35 = PVE::QemuServer::Machine::machine_type_is_q35($conf);
my $devices_list = vm_devices_list($vmid);
return 1 if defined($devices_list->{$deviceid});
# add PCI bridge if we need it for the device
qemu_add_pci_bridge($storecfg, $conf, $vmid, $deviceid, $arch, $machine_type);
if ($deviceid eq 'tablet') {
qemu_deviceadd($vmid, print_tabletdevice_full($conf, $arch));
} elsif ($deviceid eq 'keyboard') {
qemu_deviceadd($vmid, print_keyboarddevice_full($conf, $arch));
} elsif ($deviceid =~ m/^usb(\d+)$/) {
die "usb hotplug currently not reliable\n";
# since we can't reliably hot unplug all added usb devices and usb
# passthrough breaks live migration we disable usb hotplugging for now
#qemu_deviceadd($vmid, PVE::QemuServer::USB::print_usbdevice_full($conf, $deviceid, $device));
} elsif ($deviceid =~ m/^(virtio)(\d+)$/) {
qemu_iothread_add($vmid, $deviceid, $device);
qemu_driveadd($storecfg, $vmid, $device);
my $devicefull = print_drivedevice_full($storecfg, $conf, $vmid, $device, undef, $arch, $machine_type);
qemu_deviceadd($vmid, $devicefull);
eval { qemu_deviceaddverify($vmid, $deviceid); };
if (my $err = $@) {
eval { qemu_drivedel($vmid, $deviceid); };
warn $@ if $@;
die $err;
}
} elsif ($deviceid =~ m/^(virtioscsi|scsihw)(\d+)$/) {
my $scsihw = defined($conf->{scsihw}) ? $conf->{scsihw} : "lsi";
my $pciaddr = print_pci_addr($deviceid, undef, $arch, $machine_type);
my $scsihw_type = $scsihw eq 'virtio-scsi-single' ? "virtio-scsi-pci" : $scsihw;
my $devicefull = "$scsihw_type,id=$deviceid$pciaddr";
if($deviceid =~ m/^virtioscsi(\d+)$/ && $device->{iothread}) {
qemu_iothread_add($vmid, $deviceid, $device);
$devicefull .= ",iothread=iothread-$deviceid";
}
if($deviceid =~ m/^virtioscsi(\d+)$/ && $device->{queues}) {
$devicefull .= ",num_queues=$device->{queues}";
}
qemu_deviceadd($vmid, $devicefull);
qemu_deviceaddverify($vmid, $deviceid);
} elsif ($deviceid =~ m/^(scsi)(\d+)$/) {
qemu_findorcreatescsihw($storecfg,$conf, $vmid, $device, $arch, $machine_type);
qemu_driveadd($storecfg, $vmid, $device);
my $devicefull = print_drivedevice_full($storecfg, $conf, $vmid, $device, undef, $arch, $machine_type);
eval { qemu_deviceadd($vmid, $devicefull); };
if (my $err = $@) {
eval { qemu_drivedel($vmid, $deviceid); };
warn $@ if $@;
die $err;
}
} elsif ($deviceid =~ m/^(net)(\d+)$/) {
return if !qemu_netdevadd($vmid, $conf, $arch, $device, $deviceid);
my $machine_type = PVE::QemuServer::Machine::qemu_machine_pxe($vmid, $conf);
my $use_old_bios_files = undef;
($use_old_bios_files, $machine_type) = qemu_use_old_bios_files($machine_type);
my $netdevicefull = print_netdevice_full(
$vmid, $conf, $device, $deviceid, undef, $use_old_bios_files, $arch, $machine_type);
qemu_deviceadd($vmid, $netdevicefull);
eval {
qemu_deviceaddverify($vmid, $deviceid);
qemu_set_link_status($vmid, $deviceid, !$device->{link_down});
};
if (my $err = $@) {
eval { qemu_netdevdel($vmid, $deviceid); };
warn $@ if $@;
die $err;
}
} elsif (!$q35 && $deviceid =~ m/^(pci\.)(\d+)$/) {
my $bridgeid = $2;
my $pciaddr = print_pci_addr($deviceid, undef, $arch, $machine_type);
my $devicefull = "pci-bridge,id=pci.$bridgeid,chassis_nr=$bridgeid$pciaddr";
qemu_deviceadd($vmid, $devicefull);
qemu_deviceaddverify($vmid, $deviceid);
} else {
die "can't hotplug device '$deviceid'\n";
}
return 1;
}
# fixme: this should raise exceptions on error!
sub vm_deviceunplug {
my ($vmid, $conf, $deviceid) = @_;
my $devices_list = vm_devices_list($vmid);
return 1 if !defined($devices_list->{$deviceid});
my $bootdisks = PVE::QemuServer::Drive::get_bootdisks($conf);
die "can't unplug bootdisk '$deviceid'\n" if grep {$_ eq $deviceid} @$bootdisks;
if ($deviceid eq 'tablet' || $deviceid eq 'keyboard') {
qemu_devicedel($vmid, $deviceid);
} elsif ($deviceid =~ m/^usb\d+$/) {
die "usb hotplug currently not reliable\n";
# when unplugging usb devices this way, there may be remaining usb
# controllers/hubs so we disable it for now
#qemu_devicedel($vmid, $deviceid);
#qemu_devicedelverify($vmid, $deviceid);
} elsif ($deviceid =~ m/^(virtio)(\d+)$/) {
qemu_devicedel($vmid, $deviceid);
qemu_devicedelverify($vmid, $deviceid);
qemu_drivedel($vmid, $deviceid);
qemu_iothread_del($conf, $vmid, $deviceid);
} elsif ($deviceid =~ m/^(virtioscsi|scsihw)(\d+)$/) {
qemu_devicedel($vmid, $deviceid);
qemu_devicedelverify($vmid, $deviceid);
qemu_iothread_del($conf, $vmid, $deviceid);
} elsif ($deviceid =~ m/^(scsi)(\d+)$/) {
qemu_devicedel($vmid, $deviceid);
qemu_drivedel($vmid, $deviceid);
qemu_deletescsihw($conf, $vmid, $deviceid);
} elsif ($deviceid =~ m/^(net)(\d+)$/) {
qemu_devicedel($vmid, $deviceid);
qemu_devicedelverify($vmid, $deviceid);
qemu_netdevdel($vmid, $deviceid);
} else {
die "can't unplug device '$deviceid'\n";
}
return 1;
}
sub qemu_deviceadd {
my ($vmid, $devicefull) = @_;
$devicefull = "driver=".$devicefull;
my %options = split(/[=,]/, $devicefull);
mon_cmd($vmid, "device_add" , %options);
}
sub qemu_devicedel {
my ($vmid, $deviceid) = @_;
my $ret = mon_cmd($vmid, "device_del", id => $deviceid);
}
sub qemu_iothread_add {
my($vmid, $deviceid, $device) = @_;
if ($device->{iothread}) {
my $iothreads = vm_iothreads_list($vmid);
qemu_objectadd($vmid, "iothread-$deviceid", "iothread") if !$iothreads->{"iothread-$deviceid"};
}
}
sub qemu_iothread_del {
my($conf, $vmid, $deviceid) = @_;
my $confid = $deviceid;
if ($deviceid =~ m/^(?:virtioscsi|scsihw)(\d+)$/) {
$confid = 'scsi' . $1;
}
my $device = parse_drive($confid, $conf->{$confid});
if ($device->{iothread}) {
my $iothreads = vm_iothreads_list($vmid);
qemu_objectdel($vmid, "iothread-$deviceid") if $iothreads->{"iothread-$deviceid"};
}
}
sub qemu_objectadd {
my($vmid, $objectid, $qomtype) = @_;
mon_cmd($vmid, "object-add", id => $objectid, "qom-type" => $qomtype);
return 1;
}
sub qemu_objectdel {
my($vmid, $objectid) = @_;
mon_cmd($vmid, "object-del", id => $objectid);
return 1;
}
sub qemu_driveadd {
my ($storecfg, $vmid, $device) = @_;
my $drive = print_drive_commandline_full($storecfg, $vmid, $device);
$drive =~ s/\\/\\\\/g;
my $ret = PVE::QemuServer::Monitor::hmp_cmd($vmid, "drive_add auto \"$drive\"");
# If the command succeeds qemu prints: "OK"
return 1 if $ret =~ m/OK/s;
die "adding drive failed: $ret\n";
}
sub qemu_drivedel {
my($vmid, $deviceid) = @_;
my $ret = PVE::QemuServer::Monitor::hmp_cmd($vmid, "drive_del drive-$deviceid");
$ret =~ s/^\s+//;
return 1 if $ret eq "";
# NB: device not found errors mean the drive was auto-deleted and we ignore the error
return 1 if $ret =~ m/Device \'.*?\' not found/s;
die "deleting drive $deviceid failed : $ret\n";
}
sub qemu_deviceaddverify {
my ($vmid, $deviceid) = @_;
for (my $i = 0; $i <= 5; $i++) {
my $devices_list = vm_devices_list($vmid);
return 1 if defined($devices_list->{$deviceid});
sleep 1;
}
die "error on hotplug device '$deviceid'\n";
}
sub qemu_devicedelverify {
my ($vmid, $deviceid) = @_;
# need to verify that the device is correctly removed as device_del
# is async and empty return is not reliable
for (my $i = 0; $i <= 5; $i++) {
my $devices_list = vm_devices_list($vmid);
return 1 if !defined($devices_list->{$deviceid});
sleep 1;
}
die "error on hot-unplugging device '$deviceid'\n";
}
sub qemu_findorcreatescsihw {
my ($storecfg, $conf, $vmid, $device, $arch, $machine_type) = @_;
my ($maxdev, $controller, $controller_prefix) = scsihw_infos($conf, $device);
my $scsihwid="$controller_prefix$controller";
my $devices_list = vm_devices_list($vmid);
if(!defined($devices_list->{$scsihwid})) {
vm_deviceplug($storecfg, $conf, $vmid, $scsihwid, $device, $arch, $machine_type);
}
return 1;
}
sub qemu_deletescsihw {
my ($conf, $vmid, $opt) = @_;
my $device = parse_drive($opt, $conf->{$opt});
if ($conf->{scsihw} && ($conf->{scsihw} eq 'virtio-scsi-single')) {
vm_deviceunplug($vmid, $conf, "virtioscsi$device->{index}");
return 1;
}
my ($maxdev, $controller, $controller_prefix) = scsihw_infos($conf, $device);
my $devices_list = vm_devices_list($vmid);
foreach my $opt (keys %{$devices_list}) {
if (is_valid_drivename($opt)) {
my $drive = parse_drive($opt, $conf->{$opt});
if($drive->{interface} eq 'scsi' && $drive->{index} < (($maxdev-1)*($controller+1))) {
return 1;
}
}
}
my $scsihwid="scsihw$controller";
vm_deviceunplug($vmid, $conf, $scsihwid);
return 1;
}
sub qemu_add_pci_bridge {
my ($storecfg, $conf, $vmid, $device, $arch, $machine_type) = @_;
my $bridges = {};
my $bridgeid;
print_pci_addr($device, $bridges, $arch, $machine_type);
while (my ($k, $v) = each %$bridges) {
$bridgeid = $k;
}
return 1 if !defined($bridgeid) || $bridgeid < 1;
my $bridge = "pci.$bridgeid";
my $devices_list = vm_devices_list($vmid);
if (!defined($devices_list->{$bridge})) {
vm_deviceplug($storecfg, $conf, $vmid, $bridge, $arch, $machine_type);
}
return 1;
}
sub qemu_set_link_status {
my ($vmid, $device, $up) = @_;
mon_cmd($vmid, "set_link", name => $device,
up => $up ? JSON::true : JSON::false);
}
sub qemu_netdevadd {
my ($vmid, $conf, $arch, $device, $deviceid) = @_;
my $netdev = print_netdev_full($vmid, $conf, $arch, $device, $deviceid, 1);
my %options = split(/[=,]/, $netdev);
if (defined(my $vhost = $options{vhost})) {
$options{vhost} = JSON::boolean(PVE::JSONSchema::parse_boolean($vhost));
}
if (defined(my $queues = $options{queues})) {
$options{queues} = $queues + 0;
}
mon_cmd($vmid, "netdev_add", %options);
return 1;
}
sub qemu_netdevdel {
my ($vmid, $deviceid) = @_;
mon_cmd($vmid, "netdev_del", id => $deviceid);
}
sub qemu_usb_hotplug {
my ($storecfg, $conf, $vmid, $deviceid, $device, $arch, $machine_type) = @_;
return if !$device;
# remove the old one first
vm_deviceunplug($vmid, $conf, $deviceid);
# check if xhci controller is necessary and available
if ($device->{usb3}) {
my $devicelist = vm_devices_list($vmid);
if (!$devicelist->{xhci}) {
my $pciaddr = print_pci_addr("xhci", undef, $arch, $machine_type);
qemu_deviceadd($vmid, "nec-usb-xhci,id=xhci$pciaddr");
}
}
my $d = parse_usb_device($device->{host});
$d->{usb3} = $device->{usb3};
# add the new one
vm_deviceplug($storecfg, $conf, $vmid, $deviceid, $d, $arch, $machine_type);
}
sub qemu_cpu_hotplug {
my ($vmid, $conf, $vcpus) = @_;
my $machine_type = PVE::QemuServer::Machine::get_current_qemu_machine($vmid);
my $sockets = 1;
$sockets = $conf->{smp} if $conf->{smp}; # old style - no longer iused
$sockets = $conf->{sockets} if $conf->{sockets};
my $cores = $conf->{cores} || 1;
my $maxcpus = $sockets * $cores;
$vcpus = $maxcpus if !$vcpus;
die "you can't add more vcpus than maxcpus\n"
if $vcpus > $maxcpus;
my $currentvcpus = $conf->{vcpus} || $maxcpus;
if ($vcpus < $currentvcpus) {
if (PVE::QemuServer::Machine::machine_version($machine_type, 2, 7)) {
for (my $i = $currentvcpus; $i > $vcpus; $i--) {
qemu_devicedel($vmid, "cpu$i");
my $retry = 0;
my $currentrunningvcpus = undef;
while (1) {
$currentrunningvcpus = mon_cmd($vmid, "query-cpus-fast");
last if scalar(@{$currentrunningvcpus}) == $i-1;
raise_param_exc({ vcpus => "error unplugging cpu$i" }) if $retry > 5;
$retry++;
sleep 1;
}
#update conf after each succesfull cpu unplug
$conf->{vcpus} = scalar(@{$currentrunningvcpus});
PVE::QemuConfig->write_config($vmid, $conf);
}
} else {
die "cpu hot-unplugging requires qemu version 2.7 or higher\n";
}
return;
}
my $currentrunningvcpus = mon_cmd($vmid, "query-cpus-fast");
die "vcpus in running vm does not match its configuration\n"
if scalar(@{$currentrunningvcpus}) != $currentvcpus;
if (PVE::QemuServer::Machine::machine_version($machine_type, 2, 7)) {
for (my $i = $currentvcpus+1; $i <= $vcpus; $i++) {
my $cpustr = print_cpu_device($conf, $i);
qemu_deviceadd($vmid, $cpustr);
my $retry = 0;
my $currentrunningvcpus = undef;
while (1) {
$currentrunningvcpus = mon_cmd($vmid, "query-cpus-fast");
last if scalar(@{$currentrunningvcpus}) == $i;
raise_param_exc({ vcpus => "error hotplugging cpu$i" }) if $retry > 10;
sleep 1;
$retry++;
}
#update conf after each succesfull cpu hotplug
$conf->{vcpus} = scalar(@{$currentrunningvcpus});
PVE::QemuConfig->write_config($vmid, $conf);
}
} else {
for (my $i = $currentvcpus; $i < $vcpus; $i++) {
mon_cmd($vmid, "cpu-add", id => int($i));
}
}
}
sub qemu_block_set_io_throttle {
my ($vmid, $deviceid,
$bps, $bps_rd, $bps_wr, $iops, $iops_rd, $iops_wr,
$bps_max, $bps_rd_max, $bps_wr_max, $iops_max, $iops_rd_max, $iops_wr_max,
$bps_max_length, $bps_rd_max_length, $bps_wr_max_length,
$iops_max_length, $iops_rd_max_length, $iops_wr_max_length) = @_;
return if !check_running($vmid) ;
mon_cmd($vmid, "block_set_io_throttle", device => $deviceid,
bps => int($bps),
bps_rd => int($bps_rd),
bps_wr => int($bps_wr),
iops => int($iops),
iops_rd => int($iops_rd),
iops_wr => int($iops_wr),
bps_max => int($bps_max),
bps_rd_max => int($bps_rd_max),
bps_wr_max => int($bps_wr_max),
iops_max => int($iops_max),
iops_rd_max => int($iops_rd_max),
iops_wr_max => int($iops_wr_max),
bps_max_length => int($bps_max_length),
bps_rd_max_length => int($bps_rd_max_length),
bps_wr_max_length => int($bps_wr_max_length),
iops_max_length => int($iops_max_length),
iops_rd_max_length => int($iops_rd_max_length),
iops_wr_max_length => int($iops_wr_max_length),
);
}
sub qemu_block_resize {
my ($vmid, $deviceid, $storecfg, $volid, $size) = @_;
my $running = check_running($vmid);
$size = 0 if !PVE::Storage::volume_resize($storecfg, $volid, $size, $running);
return if !$running;
my $padding = (1024 - $size % 1024) % 1024;
$size = $size + $padding;
mon_cmd(
$vmid,
"block_resize",
device => $deviceid,
size => int($size),
timeout => 60,
);
}
sub qemu_volume_snapshot {
my ($vmid, $deviceid, $storecfg, $volid, $snap) = @_;
my $running = check_running($vmid);
if ($running && do_snapshots_with_qemu($storecfg, $volid)){
mon_cmd($vmid, 'blockdev-snapshot-internal-sync', device => $deviceid, name => $snap);
} else {
PVE::Storage::volume_snapshot($storecfg, $volid, $snap);
}
}
sub qemu_volume_snapshot_delete {
my ($vmid, $deviceid, $storecfg, $volid, $snap) = @_;
my $running = check_running($vmid);
if($running) {
$running = undef;
my $conf = PVE::QemuConfig->load_config($vmid);
PVE::QemuConfig->foreach_volume($conf, sub {
my ($ds, $drive) = @_;
$running = 1 if $drive->{file} eq $volid;
});
}
if ($running && do_snapshots_with_qemu($storecfg, $volid)){
mon_cmd($vmid, 'blockdev-snapshot-delete-internal-sync', device => $deviceid, name => $snap);
} else {
PVE::Storage::volume_snapshot_delete($storecfg, $volid, $snap, $running);
}
}
sub set_migration_caps {
my ($vmid, $savevm) = @_;
my $qemu_support = eval { mon_cmd($vmid, "query-proxmox-support") };
my $bitmap_prop = $savevm ? 'pbs-dirty-bitmap-savevm' : 'pbs-dirty-bitmap-migration';
my $dirty_bitmaps = $qemu_support->{$bitmap_prop} ? 1 : 0;
my $cap_ref = [];
my $enabled_cap = {
"auto-converge" => 1,
"xbzrle" => 1,
"x-rdma-pin-all" => 0,
"zero-blocks" => 0,
"compress" => 0,
"dirty-bitmaps" => $dirty_bitmaps,
};
my $supported_capabilities = mon_cmd($vmid, "query-migrate-capabilities");
for my $supported_capability (@$supported_capabilities) {
push @$cap_ref, {
capability => $supported_capability->{capability},
state => $enabled_cap->{$supported_capability->{capability}} ? JSON::true : JSON::false,
};
}
mon_cmd($vmid, "migrate-set-capabilities", capabilities => $cap_ref);
}
sub foreach_volid {
my ($conf, $func, @param) = @_;
my $volhash = {};
my $test_volid = sub {
my ($key, $drive, $snapname) = @_;
my $volid = $drive->{file};
return if !$volid;
$volhash->{$volid}->{cdrom} //= 1;
$volhash->{$volid}->{cdrom} = 0 if !drive_is_cdrom($drive);
my $replicate = $drive->{replicate} // 1;
$volhash->{$volid}->{replicate} //= 0;
$volhash->{$volid}->{replicate} = 1 if $replicate;
$volhash->{$volid}->{shared} //= 0;
$volhash->{$volid}->{shared} = 1 if $drive->{shared};
$volhash->{$volid}->{referenced_in_config} //= 0;
$volhash->{$volid}->{referenced_in_config} = 1 if !defined($snapname);
$volhash->{$volid}->{referenced_in_snapshot}->{$snapname} = 1
if defined($snapname);
my $size = $drive->{size};
$volhash->{$volid}->{size} //= $size if $size;
$volhash->{$volid}->{is_vmstate} //= 0;
$volhash->{$volid}->{is_vmstate} = 1 if $key eq 'vmstate';
$volhash->{$volid}->{is_unused} //= 0;
$volhash->{$volid}->{is_unused} = 1 if $key =~ /^unused\d+$/;
$volhash->{$volid}->{drivename} = $key if is_valid_drivename($key);
};
my $include_opts = {
extra_keys => ['vmstate'],
include_unused => 1,
};
PVE::QemuConfig->foreach_volume_full($conf, $include_opts, $test_volid);
foreach my $snapname (keys %{$conf->{snapshots}}) {
my $snap = $conf->{snapshots}->{$snapname};
PVE::QemuConfig->foreach_volume_full($snap, $include_opts, $test_volid, $snapname);
}
foreach my $volid (keys %$volhash) {
&$func($volid, $volhash->{$volid}, @param);
}
}
my $fast_plug_option = {
'lock' => 1,
'name' => 1,
'onboot' => 1,
'shares' => 1,
'startup' => 1,
'description' => 1,
'protection' => 1,
'vmstatestorage' => 1,
'hookscript' => 1,
'tags' => 1,
};
# hotplug changes in [PENDING]
# $selection hash can be used to only apply specified options, for
# example: { cores => 1 } (only apply changed 'cores')
# $errors ref is used to return error messages
sub vmconfig_hotplug_pending {
my ($vmid, $conf, $storecfg, $selection, $errors) = @_;
my $defaults = load_defaults();
my $arch = get_vm_arch($conf);
my $machine_type = get_vm_machine($conf, undef, $arch);
# commit values which do not have any impact on running VM first
# Note: those option cannot raise errors, we we do not care about
# $selection and always apply them.
my $add_error = sub {
my ($opt, $msg) = @_;
$errors->{$opt} = "hotplug problem - $msg";
};
my $changes = 0;
foreach my $opt (keys %{$conf->{pending}}) { # add/change
if ($fast_plug_option->{$opt}) {
$conf->{$opt} = $conf->{pending}->{$opt};
delete $conf->{pending}->{$opt};
$changes = 1;
}
}
if ($changes) {
PVE::QemuConfig->write_config($vmid, $conf);
}
my $hotplug_features = parse_hotplug_features(defined($conf->{hotplug}) ? $conf->{hotplug} : '1');
my $cgroup = PVE::QemuServer::CGroup->new($vmid);
my $pending_delete_hash = PVE::QemuConfig->parse_pending_delete($conf->{pending}->{delete});
foreach my $opt (sort keys %$pending_delete_hash) {
next if $selection && !$selection->{$opt};
my $force = $pending_delete_hash->{$opt}->{force};
eval {
if ($opt eq 'hotplug') {
die "skip\n" if ($conf->{hotplug} =~ /memory/);
} elsif ($opt eq 'tablet') {
die "skip\n" if !$hotplug_features->{usb};
if ($defaults->{tablet}) {
vm_deviceplug($storecfg, $conf, $vmid, 'tablet', $arch, $machine_type);
vm_deviceplug($storecfg, $conf, $vmid, 'keyboard', $arch, $machine_type)
if $arch eq 'aarch64';
} else {
vm_deviceunplug($vmid, $conf, 'tablet');
vm_deviceunplug($vmid, $conf, 'keyboard') if $arch eq 'aarch64';
}
} elsif ($opt =~ m/^usb\d+/) {
die "skip\n";
# since we cannot reliably hot unplug usb devices we are disabling it
#die "skip\n" if !$hotplug_features->{usb} || $conf->{$opt} =~ m/spice/i;
#vm_deviceunplug($vmid, $conf, $opt);
} elsif ($opt eq 'vcpus') {
die "skip\n" if !$hotplug_features->{cpu};
qemu_cpu_hotplug($vmid, $conf, undef);
} elsif ($opt eq 'balloon') {
# enable balloon device is not hotpluggable
die "skip\n" if defined($conf->{balloon}) && $conf->{balloon} == 0;
# here we reset the ballooning value to memory
my $balloon = $conf->{memory} || $defaults->{memory};
mon_cmd($vmid, "balloon", value => $balloon*1024*1024);
} elsif ($fast_plug_option->{$opt}) {
# do nothing
} elsif ($opt =~ m/^net(\d+)$/) {
die "skip\n" if !$hotplug_features->{network};
vm_deviceunplug($vmid, $conf, $opt);
} elsif (is_valid_drivename($opt)) {
die "skip\n" if !$hotplug_features->{disk} || $opt =~ m/(ide|sata)(\d+)/;
vm_deviceunplug($vmid, $conf, $opt);
vmconfig_delete_or_detach_drive($vmid, $storecfg, $conf, $opt, $force);
} elsif ($opt =~ m/^memory$/) {
die "skip\n" if !$hotplug_features->{memory};
PVE::QemuServer::Memory::qemu_memory_hotplug($vmid, $conf, $defaults, $opt);
} elsif ($opt eq 'cpuunits') {
$cgroup->change_cpu_shares(undef, $defaults->{cpuunits});
} elsif ($opt eq 'cpulimit') {
$cgroup->change_cpu_quota(-1, 100000);
} else {
die "skip\n";
}
};
if (my $err = $@) {
&$add_error($opt, $err) if $err ne "skip\n";
} else {
delete $conf->{$opt};
PVE::QemuConfig->remove_from_pending_delete($conf, $opt);
}
}
my ($apply_pending_cloudinit, $apply_pending_cloudinit_done);
$apply_pending_cloudinit = sub {
return if $apply_pending_cloudinit_done; # once is enough
$apply_pending_cloudinit_done = 1; # once is enough
my ($key, $value) = @_;
my @cloudinit_opts = keys %$confdesc_cloudinit;
foreach my $opt (keys %{$conf->{pending}}) {
next if !grep { $_ eq $opt } @cloudinit_opts;
$conf->{$opt} = delete $conf->{pending}->{$opt};
}
my $pending_delete_hash = PVE::QemuConfig->parse_pending_delete($conf->{pending}->{delete});
foreach my $opt (sort keys %$pending_delete_hash) {
next if !grep { $_ eq $opt } @cloudinit_opts;
PVE::QemuConfig->remove_from_pending_delete($conf, $opt);
delete $conf->{$opt};
}
my $new_conf = { %$conf };
$new_conf->{$key} = $value;
PVE::QemuServer::Cloudinit::generate_cloudinitconfig($new_conf, $vmid);
};
foreach my $opt (keys %{$conf->{pending}}) {
next if $selection && !$selection->{$opt};
my $value = $conf->{pending}->{$opt};
eval {
if ($opt eq 'hotplug') {
die "skip\n" if ($value =~ /memory/) || ($value !~ /memory/ && $conf->{hotplug} =~ /memory/);
} elsif ($opt eq 'tablet') {
die "skip\n" if !$hotplug_features->{usb};
if ($value == 1) {
vm_deviceplug($storecfg, $conf, $vmid, 'tablet', $arch, $machine_type);
vm_deviceplug($storecfg, $conf, $vmid, 'keyboard', $arch, $machine_type)
if $arch eq 'aarch64';
} elsif ($value == 0) {
vm_deviceunplug($vmid, $conf, 'tablet');
vm_deviceunplug($vmid, $conf, 'keyboard') if $arch eq 'aarch64';
}
} elsif ($opt =~ m/^usb\d+$/) {
die "skip\n";
# since we cannot reliably hot unplug usb devices we disable it for now
#die "skip\n" if !$hotplug_features->{usb} || $value =~ m/spice/i;
#my $d = eval { parse_property_string($usbdesc->{format}, $value) };
#die "skip\n" if !$d;
#qemu_usb_hotplug($storecfg, $conf, $vmid, $opt, $d, $arch, $machine_type);
} elsif ($opt eq 'vcpus') {
die "skip\n" if !$hotplug_features->{cpu};
qemu_cpu_hotplug($vmid, $conf, $value);
} elsif ($opt eq 'balloon') {
# enable/disable balloning device is not hotpluggable
my $old_balloon_enabled = !!(!defined($conf->{balloon}) || $conf->{balloon});
my $new_balloon_enabled = !!(!defined($conf->{pending}->{balloon}) || $conf->{pending}->{balloon});
die "skip\n" if $old_balloon_enabled != $new_balloon_enabled;
# allow manual ballooning if shares is set to zero
if ((defined($conf->{shares}) && ($conf->{shares} == 0))) {
my $balloon = $conf->{pending}->{balloon} || $conf->{memory} || $defaults->{memory};
mon_cmd($vmid, "balloon", value => $balloon*1024*1024);
}
} elsif ($opt =~ m/^net(\d+)$/) {
# some changes can be done without hotplug
vmconfig_update_net($storecfg, $conf, $hotplug_features->{network},
$vmid, $opt, $value, $arch, $machine_type);
} elsif (is_valid_drivename($opt)) {
die "skip\n" if $opt eq 'efidisk0';
# some changes can be done without hotplug
my $drive = parse_drive($opt, $value);
if (drive_is_cloudinit($drive)) {
&$apply_pending_cloudinit($opt, $value);
}
vmconfig_update_disk($storecfg, $conf, $hotplug_features->{disk},
$vmid, $opt, $value, $arch, $machine_type);
} elsif ($opt =~ m/^memory$/) { #dimms
die "skip\n" if !$hotplug_features->{memory};
$value = PVE::QemuServer::Memory::qemu_memory_hotplug($vmid, $conf, $defaults, $opt, $value);
} elsif ($opt eq 'cpuunits') {
$cgroup->change_cpu_shares($conf->{pending}->{$opt}, $defaults->{cpuunits});
} elsif ($opt eq 'cpulimit') {
my $cpulimit = $conf->{pending}->{$opt} == 0 ? -1 : int($conf->{pending}->{$opt} * 100000);
$cgroup->change_cpu_quota($cpulimit, 100000);
} else {
die "skip\n"; # skip non-hot-pluggable options
}
};
if (my $err = $@) {
&$add_error($opt, $err) if $err ne "skip\n";
} else {
$conf->{$opt} = $value;
delete $conf->{pending}->{$opt};
}
}
PVE::QemuConfig->write_config($vmid, $conf);
}
sub try_deallocate_drive {
my ($storecfg, $vmid, $conf, $key, $drive, $rpcenv, $authuser, $force) = @_;
if (($force || $key =~ /^unused/) && !drive_is_cdrom($drive, 1)) {
my $volid = $drive->{file};
if (vm_is_volid_owner($storecfg, $vmid, $volid)) {
my $sid = PVE::Storage::parse_volume_id($volid);
$rpcenv->check($authuser, "/storage/$sid", ['Datastore.AllocateSpace']);
# check if the disk is really unused
die "unable to delete '$volid' - volume is still in use (snapshot?)\n"
if PVE::QemuServer::Drive::is_volume_in_use($storecfg, $conf, $key, $volid);
PVE::Storage::vdisk_free($storecfg, $volid);
return 1;
} else {
# If vm is not owner of this disk remove from config
return 1;
}
}
return;
}
sub vmconfig_delete_or_detach_drive {
my ($vmid, $storecfg, $conf, $opt, $force) = @_;
my $drive = parse_drive($opt, $conf->{$opt});
my $rpcenv = PVE::RPCEnvironment::get();
my $authuser = $rpcenv->get_user();
if ($force) {
$rpcenv->check_vm_perm($authuser, $vmid, undef, ['VM.Config.Disk']);
try_deallocate_drive($storecfg, $vmid, $conf, $opt, $drive, $rpcenv, $authuser, $force);
} else {
vmconfig_register_unused_drive($storecfg, $vmid, $conf, $drive);
}
}
sub vmconfig_apply_pending {
my ($vmid, $conf, $storecfg, $errors) = @_;
my $add_apply_error = sub {
my ($opt, $msg) = @_;
my $err_msg = "unable to apply pending change $opt : $msg";
$errors->{$opt} = $err_msg;
warn $err_msg;
};
# cold plug
my $pending_delete_hash = PVE::QemuConfig->parse_pending_delete($conf->{pending}->{delete});
foreach my $opt (sort keys %$pending_delete_hash) {
my $force = $pending_delete_hash->{$opt}->{force};
eval {
if ($opt =~ m/^unused/) {
die "internal error";
} elsif (defined($conf->{$opt}) && is_valid_drivename($opt)) {
vmconfig_delete_or_detach_drive($vmid, $storecfg, $conf, $opt, $force);
}
};
if (my $err = $@) {
$add_apply_error->($opt, $err);
} else {
PVE::QemuConfig->remove_from_pending_delete($conf, $opt);
delete $conf->{$opt};
}
}
PVE::QemuConfig->cleanup_pending($conf);
foreach my $opt (keys %{$conf->{pending}}) { # add/change
next if $opt eq 'delete'; # just to be sure
eval {
if (defined($conf->{$opt}) && is_valid_drivename($opt)) {
vmconfig_register_unused_drive($storecfg, $vmid, $conf, parse_drive($opt, $conf->{$opt}))
}
};
if (my $err = $@) {
$add_apply_error->($opt, $err);
} else {
$conf->{$opt} = delete $conf->{pending}->{$opt};
}
}
# write all changes at once to avoid unnecessary i/o
PVE::QemuConfig->write_config($vmid, $conf);
}
sub vmconfig_update_net {
my ($storecfg, $conf, $hotplug, $vmid, $opt, $value, $arch, $machine_type) = @_;
my $newnet = parse_net($value);
if ($conf->{$opt}) {
my $oldnet = parse_net($conf->{$opt});
if (safe_string_ne($oldnet->{model}, $newnet->{model}) ||
safe_string_ne($oldnet->{macaddr}, $newnet->{macaddr}) ||
safe_num_ne($oldnet->{queues}, $newnet->{queues}) ||
!($newnet->{bridge} && $oldnet->{bridge})) { # bridge/nat mode change
# for non online change, we try to hot-unplug
die "skip\n" if !$hotplug;
vm_deviceunplug($vmid, $conf, $opt);
} else {
die "internal error" if $opt !~ m/net(\d+)/;
my $iface = "tap${vmid}i$1";
if (safe_string_ne($oldnet->{bridge}, $newnet->{bridge}) ||
safe_num_ne($oldnet->{tag}, $newnet->{tag}) ||
safe_string_ne($oldnet->{trunks}, $newnet->{trunks}) ||
safe_num_ne($oldnet->{firewall}, $newnet->{firewall})) {
PVE::Network::tap_unplug($iface);
if ($have_sdn) {
PVE::Network::SDN::Zones::tap_plug($iface, $newnet->{bridge}, $newnet->{tag}, $newnet->{firewall}, $newnet->{trunks}, $newnet->{rate});
} else {
PVE::Network::tap_plug($iface, $newnet->{bridge}, $newnet->{tag}, $newnet->{firewall}, $newnet->{trunks}, $newnet->{rate});
}
} elsif (safe_num_ne($oldnet->{rate}, $newnet->{rate})) {
# Rate can be applied on its own but any change above needs to
# include the rate in tap_plug since OVS resets everything.
PVE::Network::tap_rate_limit($iface, $newnet->{rate});
}
if (safe_string_ne($oldnet->{link_down}, $newnet->{link_down})) {
qemu_set_link_status($vmid, $opt, !$newnet->{link_down});
}
return 1;
}
}
if ($hotplug) {
vm_deviceplug($storecfg, $conf, $vmid, $opt, $newnet, $arch, $machine_type);
} else {
die "skip\n";
}
}
sub vmconfig_update_disk {
my ($storecfg, $conf, $hotplug, $vmid, $opt, $value, $arch, $machine_type) = @_;
my $drive = parse_drive($opt, $value);
if ($conf->{$opt} && (my $old_drive = parse_drive($opt, $conf->{$opt}))) {
my $media = $drive->{media} || 'disk';
my $oldmedia = $old_drive->{media} || 'disk';
die "unable to change media type\n" if $media ne $oldmedia;
if (!drive_is_cdrom($old_drive)) {
if ($drive->{file} ne $old_drive->{file}) {
die "skip\n" if !$hotplug;
# unplug and register as unused
vm_deviceunplug($vmid, $conf, $opt);
vmconfig_register_unused_drive($storecfg, $vmid, $conf, $old_drive)
} else {
# update existing disk
# skip non hotpluggable value
if (safe_string_ne($drive->{discard}, $old_drive->{discard}) ||
safe_string_ne($drive->{iothread}, $old_drive->{iothread}) ||
safe_string_ne($drive->{queues}, $old_drive->{queues}) ||
safe_string_ne($drive->{cache}, $old_drive->{cache}) ||
safe_string_ne($drive->{ssd}, $old_drive->{ssd})) {
die "skip\n";
}
# apply throttle
if (safe_num_ne($drive->{mbps}, $old_drive->{mbps}) ||
safe_num_ne($drive->{mbps_rd}, $old_drive->{mbps_rd}) ||
safe_num_ne($drive->{mbps_wr}, $old_drive->{mbps_wr}) ||
safe_num_ne($drive->{iops}, $old_drive->{iops}) ||
safe_num_ne($drive->{iops_rd}, $old_drive->{iops_rd}) ||
safe_num_ne($drive->{iops_wr}, $old_drive->{iops_wr}) ||
safe_num_ne($drive->{mbps_max}, $old_drive->{mbps_max}) ||
safe_num_ne($drive->{mbps_rd_max}, $old_drive->{mbps_rd_max}) ||
safe_num_ne($drive->{mbps_wr_max}, $old_drive->{mbps_wr_max}) ||
safe_num_ne($drive->{iops_max}, $old_drive->{iops_max}) ||
safe_num_ne($drive->{iops_rd_max}, $old_drive->{iops_rd_max}) ||
safe_num_ne($drive->{iops_wr_max}, $old_drive->{iops_wr_max}) ||
safe_num_ne($drive->{bps_max_length}, $old_drive->{bps_max_length}) ||
safe_num_ne($drive->{bps_rd_max_length}, $old_drive->{bps_rd_max_length}) ||
safe_num_ne($drive->{bps_wr_max_length}, $old_drive->{bps_wr_max_length}) ||
safe_num_ne($drive->{iops_max_length}, $old_drive->{iops_max_length}) ||
safe_num_ne($drive->{iops_rd_max_length}, $old_drive->{iops_rd_max_length}) ||
safe_num_ne($drive->{iops_wr_max_length}, $old_drive->{iops_wr_max_length})) {
qemu_block_set_io_throttle(
$vmid,"drive-$opt",
($drive->{mbps} || 0)*1024*1024,
($drive->{mbps_rd} || 0)*1024*1024,
($drive->{mbps_wr} || 0)*1024*1024,
$drive->{iops} || 0,
$drive->{iops_rd} || 0,
$drive->{iops_wr} || 0,
($drive->{mbps_max} || 0)*1024*1024,
($drive->{mbps_rd_max} || 0)*1024*1024,
($drive->{mbps_wr_max} || 0)*1024*1024,
$drive->{iops_max} || 0,
$drive->{iops_rd_max} || 0,
$drive->{iops_wr_max} || 0,
$drive->{bps_max_length} || 1,
$drive->{bps_rd_max_length} || 1,
$drive->{bps_wr_max_length} || 1,
$drive->{iops_max_length} || 1,
$drive->{iops_rd_max_length} || 1,
$drive->{iops_wr_max_length} || 1,
);
}
return 1;
}
} else { # cdrom
if ($drive->{file} eq 'none') {
mon_cmd($vmid, "eject", force => JSON::true, id => "$opt");
if (drive_is_cloudinit($old_drive)) {
vmconfig_register_unused_drive($storecfg, $vmid, $conf, $old_drive);
}
} else {
my $path = get_iso_path($storecfg, $vmid, $drive->{file});
# force eject if locked
mon_cmd($vmid, "eject", force => JSON::true, id => "$opt");
if ($path) {
mon_cmd($vmid, "blockdev-change-medium",
id => "$opt", filename => "$path");
}
}
return 1;
}
}
die "skip\n" if !$hotplug || $opt =~ m/(ide|sata)(\d+)/;
# hotplug new disks
PVE::Storage::activate_volumes($storecfg, [$drive->{file}]) if $drive->{file} !~ m|^/dev/.+|;
vm_deviceplug($storecfg, $conf, $vmid, $opt, $drive, $arch, $machine_type);
}
# called in locked context by incoming migration
sub vm_migrate_get_nbd_disks {
my ($storecfg, $conf, $replicated_volumes) = @_;
my $local_volumes = {};
PVE::QemuConfig->foreach_volume($conf, sub {
my ($ds, $drive) = @_;
return if drive_is_cdrom($drive);
my $volid = $drive->{file};
return if !$volid;
my ($storeid, $volname) = PVE::Storage::parse_volume_id($volid);
my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
return if $scfg->{shared};
# replicated disks re-use existing state via bitmap
my $use_existing = $replicated_volumes->{$volid} ? 1 : 0;
$local_volumes->{$ds} = [$volid, $storeid, $volname, $drive, $use_existing];
});
return $local_volumes;
}
# called in locked context by incoming migration
sub vm_migrate_alloc_nbd_disks {
my ($storecfg, $vmid, $source_volumes, $storagemap) = @_;
my $format = undef;
my $nbd = {};
foreach my $opt (sort keys %$source_volumes) {
my ($volid, $storeid, $volname, $drive, $use_existing) = @{$source_volumes->{$opt}};
if ($use_existing) {
$nbd->{$opt}->{drivestr} = print_drive($drive);
$nbd->{$opt}->{volid} = $volid;
$nbd->{$opt}->{replicated} = 1;
next;
}
# If a remote storage is specified and the format of the original
# volume is not available there, fall back to the default format.
# Otherwise use the same format as the original.
if (!$storagemap->{identity}) {
$storeid = map_storage($storagemap, $storeid);
my ($defFormat, $validFormats) = PVE::Storage::storage_default_format($storecfg, $storeid);
my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
my $fileFormat = qemu_img_format($scfg, $volname);
$format = (grep {$fileFormat eq $_} @{$validFormats}) ? $fileFormat : $defFormat;
} else {
my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
$format = qemu_img_format($scfg, $volname);
}
my $size = $drive->{size} / 1024;
my $newvolid = PVE::Storage::vdisk_alloc($storecfg, $storeid, $vmid, $format, undef, $size);
my $newdrive = $drive;
$newdrive->{format} = $format;
$newdrive->{file} = $newvolid;
my $drivestr = print_drive($newdrive);
$nbd->{$opt}->{drivestr} = $drivestr;
$nbd->{$opt}->{volid} = $newvolid;
}
return $nbd;
}
# see vm_start_nolock for parameters, additionally:
# migrate_opts:
# storagemap = parsed storage map for allocating NBD disks
sub vm_start {
my ($storecfg, $vmid, $params, $migrate_opts) = @_;
return PVE::QemuConfig->lock_config($vmid, sub {
my $conf = PVE::QemuConfig->load_config($vmid, $migrate_opts->{migratedfrom});
die "you can't start a vm if it's a template\n"
if !$params->{skiptemplate} && PVE::QemuConfig->is_template($conf);
my $has_suspended_lock = PVE::QemuConfig->has_lock($conf, 'suspended');
my $has_backup_lock = PVE::QemuConfig->has_lock($conf, 'backup');
my $running = check_running($vmid, undef, $migrate_opts->{migratedfrom});
if ($has_backup_lock && $running) {
# a backup is currently running, attempt to start the guest in the
# existing QEMU instance
return vm_resume($vmid);
}
PVE::QemuConfig->check_lock($conf)
if !($params->{skiplock} || $has_suspended_lock);
$params->{resume} = $has_suspended_lock || defined($conf->{vmstate});
die "VM $vmid already running\n" if $running;
if (my $storagemap = $migrate_opts->{storagemap}) {
my $replicated = $migrate_opts->{replicated_volumes};
my $disks = vm_migrate_get_nbd_disks($storecfg, $conf, $replicated);
$migrate_opts->{nbd} = vm_migrate_alloc_nbd_disks($storecfg, $vmid, $disks, $storagemap);
foreach my $opt (keys %{$migrate_opts->{nbd}}) {
$conf->{$opt} = $migrate_opts->{nbd}->{$opt}->{drivestr};
}
}
return vm_start_nolock($storecfg, $vmid, $conf, $params, $migrate_opts);
});
}
# params:
# statefile => 'tcp', 'unix' for migration or path/volid for RAM state
# skiplock => 0/1, skip checking for config lock
# skiptemplate => 0/1, skip checking whether VM is template
# forcemachine => to force Qemu machine (rollback/migration)
# forcecpu => a QEMU '-cpu' argument string to override get_cpu_options
# timeout => in seconds
# paused => start VM in paused state (backup)
# resume => resume from hibernation
# pbs-backing => {
# sata0 => {
# repository
# snapshot
# keyfile
# archive
# },
# virtio2 => ...
# }
# migrate_opts:
# nbd => volumes for NBD exports (vm_migrate_alloc_nbd_disks)
# migratedfrom => source node
# spice_ticket => used for spice migration, passed via tunnel/stdin
# network => CIDR of migration network
# type => secure/insecure - tunnel over encrypted connection or plain-text
# nbd_proto_version => int, 0 for TCP, 1 for UNIX
# replicated_volumes = which volids should be re-used with bitmaps for nbd migration
sub vm_start_nolock {
my ($storecfg, $vmid, $conf, $params, $migrate_opts) = @_;
my $statefile = $params->{statefile};
my $resume = $params->{resume};
my $migratedfrom = $migrate_opts->{migratedfrom};
my $migration_type = $migrate_opts->{type};
my $res = {};
# clean up leftover reboot request files
eval { clear_reboot_request($vmid); };
warn $@ if $@;
if (!$statefile && scalar(keys %{$conf->{pending}})) {
vmconfig_apply_pending($vmid, $conf, $storecfg);
$conf = PVE::QemuConfig->load_config($vmid); # update/reload
}
PVE::QemuServer::Cloudinit::generate_cloudinitconfig($conf, $vmid);
my $defaults = load_defaults();
# set environment variable useful inside network script
$ENV{PVE_MIGRATED_FROM} = $migratedfrom if $migratedfrom;
PVE::GuestHelpers::exec_hookscript($conf, $vmid, 'pre-start', 1);
my $forcemachine = $params->{forcemachine};
my $forcecpu = $params->{forcecpu};
if ($resume) {
# enforce machine and CPU type on suspended vm to ensure HW compatibility
$forcemachine = $conf->{runningmachine};
$forcecpu = $conf->{runningcpu};
print "Resuming suspended VM\n";
}
my ($cmd, $vollist, $spice_port) = config_to_command($storecfg, $vmid,
$conf, $defaults, $forcemachine, $forcecpu, $params->{'pbs-backing'});
my $migration_ip;
my $get_migration_ip = sub {
my ($nodename) = @_;
return $migration_ip if defined($migration_ip);
my $cidr = $migrate_opts->{network};
if (!defined($cidr)) {
my $dc_conf = PVE::Cluster::cfs_read_file('datacenter.cfg');
$cidr = $dc_conf->{migration}->{network};
}
if (defined($cidr)) {
my $ips = PVE::Network::get_local_ip_from_cidr($cidr);
die "could not get IP: no address configured on local " .
"node for network '$cidr'\n" if scalar(@$ips) == 0;
die "could not get IP: multiple addresses configured on local " .
"node for network '$cidr'\n" if scalar(@$ips) > 1;
$migration_ip = @$ips[0];
}
$migration_ip = PVE::Cluster::remote_node_ip($nodename, 1)
if !defined($migration_ip);
return $migration_ip;
};
my $migrate_uri;
if ($statefile) {
if ($statefile eq 'tcp') {
my $localip = "localhost";
my $datacenterconf = PVE::Cluster::cfs_read_file('datacenter.cfg');
my $nodename = nodename();
if (!defined($migration_type)) {
if (defined($datacenterconf->{migration}->{type})) {
$migration_type = $datacenterconf->{migration}->{type};
} else {
$migration_type = 'secure';
}
}
if ($migration_type eq 'insecure') {
$localip = $get_migration_ip->($nodename);
$localip = "[$localip]" if Net::IP::ip_is_ipv6($localip);
}
my $pfamily = PVE::Tools::get_host_address_family($nodename);
my $migrate_port = PVE::Tools::next_migrate_port($pfamily);
$migrate_uri = "tcp:${localip}:${migrate_port}";
push @$cmd, '-incoming', $migrate_uri;
push @$cmd, '-S';
} elsif ($statefile eq 'unix') {
# should be default for secure migrations as a ssh TCP forward
# tunnel is not deterministic reliable ready and fails regurarly
# to set up in time, so use UNIX socket forwards
my $socket_addr = "/run/qemu-server/$vmid.migrate";
unlink $socket_addr;
$migrate_uri = "unix:$socket_addr";
push @$cmd, '-incoming', $migrate_uri;
push @$cmd, '-S';
} elsif (-e $statefile) {
push @$cmd, '-loadstate', $statefile;
} else {
my $statepath = PVE::Storage::path($storecfg, $statefile);
push @$vollist, $statefile;
push @$cmd, '-loadstate', $statepath;
}
} elsif ($params->{paused}) {
push @$cmd, '-S';
}
# host pci devices
for (my $i = 0; $i < $PVE::QemuServer::PCI::MAX_HOSTPCI_DEVICES; $i++) {
my $d = parse_hostpci($conf->{"hostpci$i"});
next if !$d;
my $pcidevices = $d->{pciid};
foreach my $pcidevice (@$pcidevices) {
my $pciid = $pcidevice->{id};
my $info = PVE::SysFSTools::pci_device_info("$pciid");
die "IOMMU not present\n" if !PVE::SysFSTools::check_iommu_support();
die "no pci device info for device '$pciid'\n" if !$info;
if ($d->{mdev}) {
my $uuid = PVE::SysFSTools::generate_mdev_uuid($vmid, $i);
PVE::SysFSTools::pci_create_mdev_device($pciid, $uuid, $d->{mdev});
} else {
die "can't unbind/bind PCI group to VFIO '$pciid'\n"
if !PVE::SysFSTools::pci_dev_group_bind_to_vfio($pciid);
die "can't reset PCI device '$pciid'\n"
if $info->{has_fl_reset} && !PVE::SysFSTools::pci_dev_reset($info);
}
}
}
PVE::Storage::activate_volumes($storecfg, $vollist);
eval {
run_command(['/bin/systemctl', 'stop', "$vmid.scope"],
outfunc => sub {}, errfunc => sub {});
};
# Issues with the above 'stop' not being fully completed are extremely rare, a very low
# timeout should be more than enough here...
PVE::Systemd::wait_for_unit_removed("$vmid.scope", 5);
my $cpuunits = defined($conf->{cpuunits}) ? $conf->{cpuunits}
: $defaults->{cpuunits};
my $start_timeout = $params->{timeout} // config_aware_timeout($conf, $resume);
my %run_params = (
timeout => $statefile ? undef : $start_timeout,
umask => 0077,
noerr => 1,
);
# when migrating, prefix QEMU output so other side can pick up any
# errors that might occur and show the user
if ($migratedfrom) {
$run_params{quiet} = 1;
$run_params{logfunc} = sub { print "QEMU: $_[0]\n" };
}
my %properties = (
Slice => 'qemu.slice',
KillMode => 'none'
);
if (PVE::CGroup::cgroup_mode() == 2) {
$properties{CPUWeight} = $cpuunits;
} else {
$properties{CPUShares} = $cpuunits;
}
if (my $cpulimit = $conf->{cpulimit}) {
$properties{CPUQuota} = int($cpulimit * 100);
}
$properties{timeout} = 10 if $statefile; # setting up the scope shoul be quick
my $run_qemu = sub {
PVE::Tools::run_fork sub {
PVE::Systemd::enter_systemd_scope($vmid, "Proxmox VE VM $vmid", %properties);
my $exitcode = run_command($cmd, %run_params);
die "QEMU exited with code $exitcode\n" if $exitcode;
};
};
if ($conf->{hugepages}) {
my $code = sub {
my $hugepages_topology = PVE::QemuServer::Memory::hugepages_topology($conf);
my $hugepages_host_topology = PVE::QemuServer::Memory::hugepages_host_topology();
PVE::QemuServer::Memory::hugepages_mount();
PVE::QemuServer::Memory::hugepages_allocate($hugepages_topology, $hugepages_host_topology);
eval { $run_qemu->() };
if (my $err = $@) {
PVE::QemuServer::Memory::hugepages_reset($hugepages_host_topology)
if !$conf->{keephugepages};
die $err;
}
PVE::QemuServer::Memory::hugepages_pre_deallocate($hugepages_topology)
if !$conf->{keephugepages};
};
eval { PVE::QemuServer::Memory::hugepages_update_locked($code); };
} else {
eval { $run_qemu->() };
}
if (my $err = $@) {
# deactivate volumes if start fails
eval { PVE::Storage::deactivate_volumes($storecfg, $vollist); };
die "start failed: $err";
}
print "migration listens on $migrate_uri\n" if $migrate_uri;
$res->{migrate_uri} = $migrate_uri;
if ($statefile && $statefile ne 'tcp' && $statefile ne 'unix') {
eval { mon_cmd($vmid, "cont"); };
warn $@ if $@;
}
#start nbd server for storage migration
if (my $nbd = $migrate_opts->{nbd}) {
my $nbd_protocol_version = $migrate_opts->{nbd_proto_version} // 0;
my $migrate_storage_uri;
# nbd_protocol_version > 0 for unix socket support
if ($nbd_protocol_version > 0 && $migration_type eq 'secure') {
my $socket_path = "/run/qemu-server/$vmid\_nbd.migrate";
mon_cmd($vmid, "nbd-server-start", addr => { type => 'unix', data => { path => $socket_path } } );
$migrate_storage_uri = "nbd:unix:$socket_path";
} else {
my $nodename = nodename();
my $localip = $get_migration_ip->($nodename);
my $pfamily = PVE::Tools::get_host_address_family($nodename);
my $storage_migrate_port = PVE::Tools::next_migrate_port($pfamily);
mon_cmd($vmid, "nbd-server-start", addr => {
type => 'inet',
data => {
host => "${localip}",
port => "${storage_migrate_port}",
},
});
$localip = "[$localip]" if Net::IP::ip_is_ipv6($localip);
$migrate_storage_uri = "nbd:${localip}:${storage_migrate_port}";
}
$res->{migrate_storage_uri} = $migrate_storage_uri;
foreach my $opt (sort keys %$nbd) {
my $drivestr = $nbd->{$opt}->{drivestr};
my $volid = $nbd->{$opt}->{volid};
mon_cmd($vmid, "nbd-server-add", device => "drive-$opt", writable => JSON::true );
my $nbd_uri = "$migrate_storage_uri:exportname=drive-$opt";
print "storage migration listens on $nbd_uri volume:$drivestr\n";
print "re-using replicated volume: $opt - $volid\n"
if $nbd->{$opt}->{replicated};
$res->{drives}->{$opt} = $nbd->{$opt};
$res->{drives}->{$opt}->{nbd_uri} = $nbd_uri;
}
}
if ($migratedfrom) {
eval {
set_migration_caps($vmid);
};
warn $@ if $@;
if ($spice_port) {
print "spice listens on port $spice_port\n";
$res->{spice_port} = $spice_port;
if ($migrate_opts->{spice_ticket}) {
mon_cmd($vmid, "set_password", protocol => 'spice', password =>
$migrate_opts->{spice_ticket});
mon_cmd($vmid, "expire_password", protocol => 'spice', time => "+30");
}
}
} else {
mon_cmd($vmid, "balloon", value => $conf->{balloon}*1024*1024)
if !$statefile && $conf->{balloon};
foreach my $opt (keys %$conf) {
next if $opt !~ m/^net\d+$/;
my $nicconf = parse_net($conf->{$opt});
qemu_set_link_status($vmid, $opt, 0) if $nicconf->{link_down};
}
}
mon_cmd($vmid, 'qom-set',
path => "machine/peripheral/balloon0",
property => "guest-stats-polling-interval",
value => 2) if (!defined($conf->{balloon}) || $conf->{balloon});
if ($resume) {
print "Resumed VM, removing state\n";
if (my $vmstate = $conf->{vmstate}) {
PVE::Storage::deactivate_volumes($storecfg, [$vmstate]);
PVE::Storage::vdisk_free($storecfg, $vmstate);
}
delete $conf->@{qw(lock vmstate runningmachine runningcpu)};
PVE::QemuConfig->write_config($vmid, $conf);
}
PVE::GuestHelpers::exec_hookscript($conf, $vmid, 'post-start');
return $res;
}
sub vm_commandline {
my ($storecfg, $vmid, $snapname) = @_;
my $conf = PVE::QemuConfig->load_config($vmid);
my $forcemachine;
my $forcecpu;
if ($snapname) {
my $snapshot = $conf->{snapshots}->{$snapname};
die "snapshot '$snapname' does not exist\n" if !defined($snapshot);
# check for machine or CPU overrides in snapshot
$forcemachine = $snapshot->{runningmachine};
$forcecpu = $snapshot->{runningcpu};
$snapshot->{digest} = $conf->{digest}; # keep file digest for API
$conf = $snapshot;
}
my $defaults = load_defaults();
my $cmd = config_to_command($storecfg, $vmid, $conf, $defaults,
$forcemachine, $forcecpu);
return PVE::Tools::cmd2string($cmd);
}
sub vm_reset {
my ($vmid, $skiplock) = @_;
PVE::QemuConfig->lock_config($vmid, sub {
my $conf = PVE::QemuConfig->load_config($vmid);
PVE::QemuConfig->check_lock($conf) if !$skiplock;
mon_cmd($vmid, "system_reset");
});
}
sub get_vm_volumes {
my ($conf) = @_;
my $vollist = [];
foreach_volid($conf, sub {
my ($volid, $attr) = @_;
return if $volid =~ m|^/|;
my ($sid, $volname) = PVE::Storage::parse_volume_id($volid, 1);
return if !$sid;
push @$vollist, $volid;
});
return $vollist;
}
sub vm_stop_cleanup {
my ($storecfg, $vmid, $conf, $keepActive, $apply_pending_changes) = @_;
eval {
if (!$keepActive) {
my $vollist = get_vm_volumes($conf);
PVE::Storage::deactivate_volumes($storecfg, $vollist);
}
foreach my $ext (qw(mon qmp pid vnc qga)) {
unlink "/var/run/qemu-server/${vmid}.$ext";
}
if ($conf->{ivshmem}) {
my $ivshmem = parse_property_string($ivshmem_fmt, $conf->{ivshmem});
# just delete it for now, VMs which have this already open do not
# are affected, but new VMs will get a separated one. If this
# becomes an issue we either add some sort of ref-counting or just
# add a "don't delete on stop" flag to the ivshmem format.
unlink '/dev/shm/pve-shm-' . ($ivshmem->{name} // $vmid);
}
foreach my $key (keys %$conf) {
next if $key !~ m/^hostpci(\d+)$/;
my $hostpciindex = $1;
my $d = parse_hostpci($conf->{$key});
my $uuid = PVE::SysFSTools::generate_mdev_uuid($vmid, $hostpciindex);
foreach my $pci (@{$d->{pciid}}) {
my $pciid = $pci->{id};
PVE::SysFSTools::pci_cleanup_mdev_device($pciid, $uuid);
}
}
vmconfig_apply_pending($vmid, $conf, $storecfg) if $apply_pending_changes;
};
warn $@ if $@; # avoid errors - just warn
}
# call only in locked context
sub _do_vm_stop {
my ($storecfg, $vmid, $skiplock, $nocheck, $timeout, $shutdown, $force, $keepActive) = @_;
my $pid = check_running($vmid, $nocheck);
return if !$pid;
my $conf;
if (!$nocheck) {
$conf = PVE::QemuConfig->load_config($vmid);
PVE::QemuConfig->check_lock($conf) if !$skiplock;
if (!defined($timeout) && $shutdown && $conf->{startup}) {
my $opts = PVE::JSONSchema::pve_parse_startup_order($conf->{startup});
$timeout = $opts->{down} if $opts->{down};
}
PVE::GuestHelpers::exec_hookscript($conf, $vmid, 'pre-stop');
}
eval {
if ($shutdown) {
if (defined($conf) && get_qga_key($conf, 'enabled')) {
mon_cmd($vmid, "guest-shutdown", timeout => $timeout);
} else {
mon_cmd($vmid, "system_powerdown");
}
} else {
mon_cmd($vmid, "quit");
}
};
my $err = $@;
if (!$err) {
$timeout = 60 if !defined($timeout);
my $count = 0;
while (($count < $timeout) && check_running($vmid, $nocheck)) {
$count++;
sleep 1;
}
if ($count >= $timeout) {
if ($force) {
warn "VM still running - terminating now with SIGTERM\n";
kill 15, $pid;
} else {
die "VM quit/powerdown failed - got timeout\n";
}
} else {
vm_stop_cleanup($storecfg, $vmid, $conf, $keepActive, 1) if $conf;
return;
}
} else {
if (!check_running($vmid, $nocheck)) {
warn "Unexpected: VM shutdown command failed, but VM not running anymore..\n";
return;
}
if ($force) {
warn "VM quit/powerdown failed - terminating now with SIGTERM\n";
kill 15, $pid;
} else {
die "VM quit/powerdown failed\n";
}
}
# wait again
$timeout = 10;
my $count = 0;
while (($count < $timeout) && check_running($vmid, $nocheck)) {
$count++;
sleep 1;
}
if ($count >= $timeout) {
warn "VM still running - terminating now with SIGKILL\n";
kill 9, $pid;
sleep 1;
}
vm_stop_cleanup($storecfg, $vmid, $conf, $keepActive, 1) if $conf;
}
# Note: use $nocheck to skip tests if VM configuration file exists.
# We need that when migration VMs to other nodes (files already moved)
# Note: we set $keepActive in vzdump stop mode - volumes need to stay active
sub vm_stop {
my ($storecfg, $vmid, $skiplock, $nocheck, $timeout, $shutdown, $force, $keepActive, $migratedfrom) = @_;
$force = 1 if !defined($force) && !$shutdown;
if ($migratedfrom){
my $pid = check_running($vmid, $nocheck, $migratedfrom);
kill 15, $pid if $pid;
my $conf = PVE::QemuConfig->load_config($vmid, $migratedfrom);
vm_stop_cleanup($storecfg, $vmid, $conf, $keepActive, 0);
return;
}
PVE::QemuConfig->lock_config($vmid, sub {
_do_vm_stop($storecfg, $vmid, $skiplock, $nocheck, $timeout, $shutdown, $force, $keepActive);
});
}
sub vm_reboot {
my ($vmid, $timeout) = @_;
PVE::QemuConfig->lock_config($vmid, sub {
eval {
# only reboot if running, as qmeventd starts it again on a stop event
return if !check_running($vmid);
create_reboot_request($vmid);
my $storecfg = PVE::Storage::config();
_do_vm_stop($storecfg, $vmid, undef, undef, $timeout, 1);
};
if (my $err = $@) {
# avoid that the next normal shutdown will be confused for a reboot
clear_reboot_request($vmid);
die $err;
}
});
}
# note: if using the statestorage parameter, the caller has to check privileges
sub vm_suspend {
my ($vmid, $skiplock, $includestate, $statestorage) = @_;
my $conf;
my $path;
my $storecfg;
my $vmstate;
PVE::QemuConfig->lock_config($vmid, sub {
$conf = PVE::QemuConfig->load_config($vmid);
my $is_backing_up = PVE::QemuConfig->has_lock($conf, 'backup');
PVE::QemuConfig->check_lock($conf)
if !($skiplock || $is_backing_up);
die "cannot suspend to disk during backup\n"
if $is_backing_up && $includestate;
if ($includestate) {
$conf->{lock} = 'suspending';
my $date = strftime("%Y-%m-%d", localtime(time()));
$storecfg = PVE::Storage::config();
if (!$statestorage) {
$statestorage = find_vmstate_storage($conf, $storecfg);
# check permissions for the storage
my $rpcenv = PVE::RPCEnvironment::get();
if ($rpcenv->{type} ne 'cli') {
my $authuser = $rpcenv->get_user();
$rpcenv->check($authuser, "/storage/$statestorage", ['Datastore.AllocateSpace']);
}
}
$vmstate = PVE::QemuConfig->__snapshot_save_vmstate(
$vmid, $conf, "suspend-$date", $storecfg, $statestorage, 1);
$path = PVE::Storage::path($storecfg, $vmstate);
PVE::QemuConfig->write_config($vmid, $conf);
} else {
mon_cmd($vmid, "stop");
}
});
if ($includestate) {
# save vm state
PVE::Storage::activate_volumes($storecfg, [$vmstate]);
eval {
set_migration_caps($vmid, 1);
mon_cmd($vmid, "savevm-start", statefile => $path);
for(;;) {
my $state = mon_cmd($vmid, "query-savevm");
if (!$state->{status}) {
die "savevm not active\n";
} elsif ($state->{status} eq 'active') {
sleep(1);
next;
} elsif ($state->{status} eq 'completed') {
print "State saved, quitting\n";
last;
} elsif ($state->{status} eq 'failed' && $state->{error}) {
die "query-savevm failed with error '$state->{error}'\n"
} else {
die "query-savevm returned status '$state->{status}'\n";
}
}
};
my $err = $@;
PVE::QemuConfig->lock_config($vmid, sub {
$conf = PVE::QemuConfig->load_config($vmid);
if ($err) {
# cleanup, but leave suspending lock, to indicate something went wrong
eval {
mon_cmd($vmid, "savevm-end");
PVE::Storage::deactivate_volumes($storecfg, [$vmstate]);
PVE::Storage::vdisk_free($storecfg, $vmstate);
delete $conf->@{qw(vmstate runningmachine runningcpu)};
PVE::QemuConfig->write_config($vmid, $conf);
};
warn $@ if $@;
die $err;
}
die "lock changed unexpectedly\n"
if !PVE::QemuConfig->has_lock($conf, 'suspending');
mon_cmd($vmid, "quit");
$conf->{lock} = 'suspended';
PVE::QemuConfig->write_config($vmid, $conf);
});
}
}
sub vm_resume {
my ($vmid, $skiplock, $nocheck) = @_;
PVE::QemuConfig->lock_config($vmid, sub {
my $res = mon_cmd($vmid, 'query-status');
my $resume_cmd = 'cont';
my $reset = 0;
if ($res->{status}) {
return if $res->{status} eq 'running'; # job done, go home
$resume_cmd = 'system_wakeup' if $res->{status} eq 'suspended';
$reset = 1 if $res->{status} eq 'shutdown';
}
if (!$nocheck) {
my $conf = PVE::QemuConfig->load_config($vmid);
PVE::QemuConfig->check_lock($conf)
if !($skiplock || PVE::QemuConfig->has_lock($conf, 'backup'));
}
if ($reset) {
# required if a VM shuts down during a backup and we get a resume
# request before the backup finishes for example
mon_cmd($vmid, "system_reset");
}
mon_cmd($vmid, $resume_cmd);
});
}
sub vm_sendkey {
my ($vmid, $skiplock, $key) = @_;
PVE::QemuConfig->lock_config($vmid, sub {
my $conf = PVE::QemuConfig->load_config($vmid);
# there is no qmp command, so we use the human monitor command
my $res = PVE::QemuServer::Monitor::hmp_cmd($vmid, "sendkey $key");
die $res if $res ne '';
});
}
# vzdump restore implementaion
sub tar_archive_read_firstfile {
my $archive = shift;
die "ERROR: file '$archive' does not exist\n" if ! -f $archive;
# try to detect archive type first
my $pid = open (my $fh, '-|', 'tar', 'tf', $archive) ||
die "unable to open file '$archive'\n";
my $firstfile = <$fh>;
kill 15, $pid;
close $fh;
die "ERROR: archive contaions no data\n" if !$firstfile;
chomp $firstfile;
return $firstfile;
}
sub tar_restore_cleanup {
my ($storecfg, $statfile) = @_;
print STDERR "starting cleanup\n";
if (my $fd = IO::File->new($statfile, "r")) {
while (defined(my $line = <$fd>)) {
if ($line =~ m/vzdump:([^\s:]*):(\S+)$/) {
my $volid = $2;
eval {
if ($volid =~ m|^/|) {
unlink $volid || die 'unlink failed\n';
} else {
PVE::Storage::vdisk_free($storecfg, $volid);
}
print STDERR "temporary volume '$volid' sucessfuly removed\n";
};
print STDERR "unable to cleanup '$volid' - $@" if $@;
} else {
print STDERR "unable to parse line in statfile - $line";
}
}
$fd->close();
}
}
sub restore_file_archive {
my ($archive, $vmid, $user, $opts) = @_;
return restore_vma_archive($archive, $vmid, $user, $opts)
if $archive eq '-';
my $info = PVE::Storage::archive_info($archive);
my $format = $opts->{format} // $info->{format};
my $comp = $info->{compression};
# try to detect archive format
if ($format eq 'tar') {
return restore_tar_archive($archive, $vmid, $user, $opts);
} else {
return restore_vma_archive($archive, $vmid, $user, $opts, $comp);
}
}
# hepler to remove disks that will not be used after restore
my $restore_cleanup_oldconf = sub {
my ($storecfg, $vmid, $oldconf, $virtdev_hash) = @_;
PVE::QemuConfig->foreach_volume($oldconf, sub {
my ($ds, $drive) = @_;
return if drive_is_cdrom($drive, 1);
my $volid = $drive->{file};
return if !$volid || $volid =~ m|^/|;
my ($path, $owner) = PVE::Storage::path($storecfg, $volid);
return if !$path || !$owner || ($owner != $vmid);
# Note: only delete disk we want to restore
# other volumes will become unused
if ($virtdev_hash->{$ds}) {
eval { PVE::Storage::vdisk_free($storecfg, $volid); };
if (my $err = $@) {
warn $err;
}
}
});
# delete vmstate files, after the restore we have no snapshots anymore
foreach my $snapname (keys %{$oldconf->{snapshots}}) {
my $snap = $oldconf->{snapshots}->{$snapname};
if ($snap->{vmstate}) {
eval { PVE::Storage::vdisk_free($storecfg, $snap->{vmstate}); };
if (my $err = $@) {
warn $err;
}
}
}
};
# Helper to parse vzdump backup device hints
#
# $rpcenv: Environment, used to ckeck storage permissions
# $user: User ID, to check storage permissions
# $storecfg: Storage configuration
# $fh: the file handle for reading the configuration
# $devinfo: should contain device sizes for all backu-up'ed devices
# $options: backup options (pool, default storage)
#
# Return: $virtdev_hash, updates $devinfo (add devname, virtdev, format, storeid)
my $parse_backup_hints = sub {
my ($rpcenv, $user, $storecfg, $fh, $devinfo, $options) = @_;
my $virtdev_hash = {};
while (defined(my $line = <$fh>)) {
if ($line =~ m/^\#qmdump\#map:(\S+):(\S+):(\S*):(\S*):$/) {
my ($virtdev, $devname, $storeid, $format) = ($1, $2, $3, $4);
die "archive does not contain data for drive '$virtdev'\n"
if !$devinfo->{$devname};
if (defined($options->{storage})) {
$storeid = $options->{storage} || 'local';
} elsif (!$storeid) {
$storeid = 'local';
}
$format = 'raw' if !$format;
$devinfo->{$devname}->{devname} = $devname;
$devinfo->{$devname}->{virtdev} = $virtdev;
$devinfo->{$devname}->{format} = $format;
$devinfo->{$devname}->{storeid} = $storeid;
# check permission on storage
my $pool = $options->{pool}; # todo: do we need that?
if ($user ne 'root@pam') {
$rpcenv->check($user, "/storage/$storeid", ['Datastore.AllocateSpace']);
}
$virtdev_hash->{$virtdev} = $devinfo->{$devname};
} elsif ($line =~ m/^((?:ide|sata|scsi)\d+):\s*(.*)\s*$/) {
my $virtdev = $1;
my $drive = parse_drive($virtdev, $2);
if (drive_is_cloudinit($drive)) {
my ($storeid, $volname) = PVE::Storage::parse_volume_id($drive->{file});
$storeid = $options->{storage} if defined ($options->{storage});
my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
my $format = qemu_img_format($scfg, $volname); # has 'raw' fallback
$virtdev_hash->{$virtdev} = {
format => $format,
storeid => $storeid,
size => PVE::QemuServer::Cloudinit::CLOUDINIT_DISK_SIZE,
is_cloudinit => 1,
};
}
}
}
return $virtdev_hash;
};
# Helper to allocate and activate all volumes required for a restore
#
# $storecfg: Storage configuration
# $virtdev_hash: as returned by parse_backup_hints()
#
# Returns: { $virtdev => $volid }
my $restore_allocate_devices = sub {
my ($storecfg, $virtdev_hash, $vmid) = @_;
my $map = {};
foreach my $virtdev (sort keys %$virtdev_hash) {
my $d = $virtdev_hash->{$virtdev};
my $alloc_size = int(($d->{size} + 1024 - 1)/1024);
my $storeid = $d->{storeid};
my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
# test if requested format is supported
my ($defFormat, $validFormats) = PVE::Storage::storage_default_format($storecfg, $storeid);
my $supported = grep { $_ eq $d->{format} } @$validFormats;
$d->{format} = $defFormat if !$supported;
my $name;
if ($d->{is_cloudinit}) {
$name = "vm-$vmid-cloudinit";
my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
if ($scfg->{path}) {
$name .= ".$d->{format}";
}
}
my $volid = PVE::Storage::vdisk_alloc(
$storecfg, $storeid, $vmid, $d->{format}, $name, $alloc_size);
print STDERR "new volume ID is '$volid'\n";
$d->{volid} = $volid;
PVE::Storage::activate_volumes($storecfg, [$volid]);
$map->{$virtdev} = $volid;
}
return $map;
};
sub restore_update_config_line {
my ($cookie, $map, $line, $unique) = @_;
return '' if $line =~ m/^\#qmdump\#/;
return '' if $line =~ m/^\#vzdump\#/;
return '' if $line =~ m/^lock:/;
return '' if $line =~ m/^unused\d+:/;
return '' if $line =~ m/^parent:/;
my $res = '';
my $dc = PVE::Cluster::cfs_read_file('datacenter.cfg');
if (($line =~ m/^(vlan(\d+)):\s*(\S+)\s*$/)) {
# try to convert old 1.X settings
my ($id, $ind, $ethcfg) = ($1, $2, $3);
foreach my $devconfig (PVE::Tools::split_list($ethcfg)) {
my ($model, $macaddr) = split(/\=/, $devconfig);
$macaddr = PVE::Tools::random_ether_addr($dc->{mac_prefix}) if !$macaddr || $unique;
my $net = {
model => $model,
bridge => "vmbr$ind",
macaddr => $macaddr,
};
my $netstr = print_net($net);
$res .= "net$cookie->{netcount}: $netstr\n";
$cookie->{netcount}++;
}
} elsif (($line =~ m/^(net\d+):\s*(\S+)\s*$/) && $unique) {
my ($id, $netstr) = ($1, $2);
my $net = parse_net($netstr);
$net->{macaddr} = PVE::Tools::random_ether_addr($dc->{mac_prefix}) if $net->{macaddr};
$netstr = print_net($net);
$res .= "$id: $netstr\n";
} elsif ($line =~ m/^((ide|scsi|virtio|sata|efidisk)\d+):\s*(\S+)\s*$/) {
my $virtdev = $1;
my $value = $3;
my $di = parse_drive($virtdev, $value);
if (defined($di->{backup}) && !$di->{backup}) {
$res .= "#$line";
} elsif ($map->{$virtdev}) {
delete $di->{format}; # format can change on restore
$di->{file} = $map->{$virtdev};
$value = print_drive($di);
$res .= "$virtdev: $value\n";
} else {
$res .= $line;
}
} elsif (($line =~ m/^vmgenid: (.*)/)) {
my $vmgenid = $1;
if ($vmgenid ne '0') {
# always generate a new vmgenid if there was a valid one setup
$vmgenid = generate_uuid();
}
$res .= "vmgenid: $vmgenid\n";
} elsif (($line =~ m/^(smbios1: )(.*)/) && $unique) {
my ($uuid, $uuid_str);
UUID::generate($uuid);
UUID::unparse($uuid, $uuid_str);
my $smbios1 = parse_smbios1($2);
$smbios1->{uuid} = $uuid_str;
$res .= $1.print_smbios1($smbios1)."\n";
} else {
$res .= $line;
}
return $res;
}
my $restore_deactivate_volumes = sub {
my ($storecfg, $devinfo) = @_;
my $vollist = [];
foreach my $devname (keys %$devinfo) {
my $volid = $devinfo->{$devname}->{volid};
push @$vollist, $volid if $volid;
}
PVE::Storage::deactivate_volumes($storecfg, $vollist);
};
my $restore_destroy_volumes = sub {
my ($storecfg, $devinfo) = @_;
foreach my $devname (keys %$devinfo) {
my $volid = $devinfo->{$devname}->{volid};
next if !$volid;
eval {
if ($volid =~ m|^/|) {
unlink $volid || die 'unlink failed\n';
} else {
PVE::Storage::vdisk_free($storecfg, $volid);
}
print STDERR "temporary volume '$volid' sucessfuly removed\n";
};
print STDERR "unable to cleanup '$volid' - $@" if $@;
}
};
# FIXME For PVE 7.0, remove $content_type and always use 'images'
sub scan_volids {
my ($cfg, $vmid, $content_type) = @_;
my $info = PVE::Storage::vdisk_list($cfg, undef, $vmid, undef, $content_type);
my $volid_hash = {};
foreach my $storeid (keys %$info) {
foreach my $item (@{$info->{$storeid}}) {
next if !($item->{volid} && $item->{size});
$item->{path} = PVE::Storage::path($cfg, $item->{volid});
$volid_hash->{$item->{volid}} = $item;
}
}
return $volid_hash;
}
sub update_disk_config {
my ($vmid, $conf, $volid_hash) = @_;
my $changes;
my $prefix = "VM $vmid";
# used and unused disks
my $referenced = {};
# Note: it is allowed to define multiple storages with same path (alias), so
# we need to check both 'volid' and real 'path' (two different volid can point
# to the same path).
my $referencedpath = {};
# update size info
PVE::QemuConfig->foreach_volume($conf, sub {
my ($opt, $drive) = @_;
my $volid = $drive->{file};
return if !$volid;
my $volume = $volid_hash->{$volid};
# mark volid as "in-use" for next step
$referenced->{$volid} = 1;
if ($volume && (my $path = $volume->{path})) {
$referencedpath->{$path} = 1;
}
return if drive_is_cdrom($drive);
return if !$volume;
my ($updated, $msg) = PVE::QemuServer::Drive::update_disksize($drive, $volume->{size});
if (defined($updated)) {
$changes = 1;
$conf->{$opt} = print_drive($updated);
print "$prefix ($opt): $msg\n";
}
});
# remove 'unusedX' entry if volume is used
PVE::QemuConfig->foreach_unused_volume($conf, sub {
my ($opt, $drive) = @_;
my $volid = $drive->{file};
return if !$volid;
my $path;
$path = $volid_hash->{$volid}->{path} if $volid_hash->{$volid};
if ($referenced->{$volid} || ($path && $referencedpath->{$path})) {
print "$prefix remove entry '$opt', its volume '$volid' is in use\n";
$changes = 1;
delete $conf->{$opt};
}
$referenced->{$volid} = 1;
$referencedpath->{$path} = 1 if $path;
});
foreach my $volid (sort keys %$volid_hash) {
next if $volid =~ m/vm-$vmid-state-/;
next if $referenced->{$volid};
my $path = $volid_hash->{$volid}->{path};
next if !$path; # just to be sure
next if $referencedpath->{$path};
$changes = 1;
my $key = PVE::QemuConfig->add_unused_volume($conf, $volid);
print "$prefix add unreferenced volume '$volid' as '$key' to config\n";
$referencedpath->{$path} = 1; # avoid to add more than once (aliases)
}
return $changes;
}
sub rescan {
my ($vmid, $nolock, $dryrun) = @_;
my $cfg = PVE::Storage::config();
print "rescan volumes...\n";
my $volid_hash = scan_volids($cfg, $vmid, 'images');
my $updatefn = sub {
my ($vmid) = @_;
my $conf = PVE::QemuConfig->load_config($vmid);
PVE::QemuConfig->check_lock($conf);
my $vm_volids = {};
foreach my $volid (keys %$volid_hash) {
my $info = $volid_hash->{$volid};
$vm_volids->{$volid} = $info if $info->{vmid} && $info->{vmid} == $vmid;
}
my $changes = update_disk_config($vmid, $conf, $vm_volids);
PVE::QemuConfig->write_config($vmid, $conf) if $changes && !$dryrun;
};
if (defined($vmid)) {
if ($nolock) {
&$updatefn($vmid);
} else {
PVE::QemuConfig->lock_config($vmid, $updatefn, $vmid);
}
} else {
my $vmlist = config_list();
foreach my $vmid (keys %$vmlist) {
if ($nolock) {
&$updatefn($vmid);
} else {
PVE::QemuConfig->lock_config($vmid, $updatefn, $vmid);
}
}
}
}
sub restore_proxmox_backup_archive {
my ($archive, $vmid, $user, $options) = @_;
my $storecfg = PVE::Storage::config();
my ($storeid, $volname) = PVE::Storage::parse_volume_id($archive);
my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
my $fingerprint = $scfg->{fingerprint};
my $keyfile = PVE::Storage::PBSPlugin::pbs_encryption_key_file_name($storecfg, $storeid);
my $repo = PVE::PBSClient::get_repository($scfg);
# This is only used for `pbs-restore` and the QEMU PBS driver (live-restore)
my $password = PVE::Storage::PBSPlugin::pbs_get_password($scfg, $storeid);
local $ENV{PBS_PASSWORD} = $password;
local $ENV{PBS_FINGERPRINT} = $fingerprint if defined($fingerprint);
my ($vtype, $pbs_backup_name, undef, undef, undef, undef, $format) =
PVE::Storage::parse_volname($storecfg, $archive);
die "got unexpected vtype '$vtype'\n" if $vtype ne 'backup';
die "got unexpected backup format '$format'\n" if $format ne 'pbs-vm';
my $tmpdir = "/var/tmp/vzdumptmp$$";
rmtree $tmpdir;
mkpath $tmpdir;
my $conffile = PVE::QemuConfig->config_file($vmid);
# disable interrupts (always do cleanups)
local $SIG{INT} =
local $SIG{TERM} =
local $SIG{QUIT} =
local $SIG{HUP} = sub { print STDERR "got interrupt - ignored\n"; };
# Note: $oldconf is undef if VM does not exists
my $cfs_path = PVE::QemuConfig->cfs_config_path($vmid);
my $oldconf = PVE::Cluster::cfs_read_file($cfs_path);
my $new_conf_raw = '';
my $rpcenv = PVE::RPCEnvironment::get();
my $devinfo = {};
eval {
# enable interrupts
local $SIG{INT} =
local $SIG{TERM} =
local $SIG{QUIT} =
local $SIG{HUP} =
local $SIG{PIPE} = sub { die "interrupted by signal\n"; };
my $cfgfn = "$tmpdir/qemu-server.conf";
my $firewall_config_fn = "$tmpdir/fw.conf";
my $index_fn = "$tmpdir/index.json";
my $cmd = "restore";
my $param = [$pbs_backup_name, "index.json", $index_fn];
PVE::Storage::PBSPlugin::run_raw_client_cmd($scfg, $storeid, $cmd, $param);
my $index = PVE::Tools::file_get_contents($index_fn);
$index = decode_json($index);
# print Dumper($index);
foreach my $info (@{$index->{files}}) {
if ($info->{filename} =~ m/^(drive-\S+).img.fidx$/) {
my $devname = $1;
if ($info->{size} =~ m/^(\d+)$/) { # untaint size
$devinfo->{$devname}->{size} = $1;
} else {
die "unable to parse file size in 'index.json' - got '$info->{size}'\n";
}
}
}
my $is_qemu_server_backup = scalar(
grep { $_->{filename} eq 'qemu-server.conf.blob' } @{$index->{files}}
);
if (!$is_qemu_server_backup) {
die "backup does not look like a qemu-server backup (missing 'qemu-server.conf' file)\n";
}
my $has_firewall_config = scalar(grep { $_->{filename} eq 'fw.conf.blob' } @{$index->{files}});
$param = [$pbs_backup_name, "qemu-server.conf", $cfgfn];
PVE::Storage::PBSPlugin::run_raw_client_cmd($scfg, $storeid, $cmd, $param);
if ($has_firewall_config) {
$param = [$pbs_backup_name, "fw.conf", $firewall_config_fn];
PVE::Storage::PBSPlugin::run_raw_client_cmd($scfg, $storeid, $cmd, $param);
my $pve_firewall_dir = '/etc/pve/firewall';
mkdir $pve_firewall_dir; # make sure the dir exists
PVE::Tools::file_copy($firewall_config_fn, "${pve_firewall_dir}/$vmid.fw");
}
my $fh = IO::File->new($cfgfn, "r") ||
die "unable to read qemu-server.conf - $!\n";
my $virtdev_hash = $parse_backup_hints->($rpcenv, $user, $storecfg, $fh, $devinfo, $options);
# fixme: rate limit?
# create empty/temp config
PVE::Tools::file_set_contents($conffile, "memory: 128\nlock: create");
$restore_cleanup_oldconf->($storecfg, $vmid, $oldconf, $virtdev_hash) if $oldconf;
# allocate volumes
my $map = $restore_allocate_devices->($storecfg, $virtdev_hash, $vmid);
if (!$options->{live}) {
foreach my $virtdev (sort keys %$virtdev_hash) {
my $d = $virtdev_hash->{$virtdev};
next if $d->{is_cloudinit}; # no need to restore cloudinit
my $volid = $d->{volid};
my $path = PVE::Storage::path($storecfg, $volid);
my $pbs_restore_cmd = [
'/usr/bin/pbs-restore',
'--repository', $repo,
$pbs_backup_name,
"$d->{devname}.img.fidx",
$path,
'--verbose',
];
push @$pbs_restore_cmd, '--format', $d->{format} if $d->{format};
push @$pbs_restore_cmd, '--keyfile', $keyfile if -e $keyfile;
if (PVE::Storage::volume_has_feature($storecfg, 'sparseinit', $volid)) {
push @$pbs_restore_cmd, '--skip-zero';
}
my $dbg_cmdstring = PVE::Tools::cmd2string($pbs_restore_cmd);
print "restore proxmox backup image: $dbg_cmdstring\n";
run_command($pbs_restore_cmd);
}
}
$fh->seek(0, 0) || die "seek failed - $!\n";
my $cookie = { netcount => 0 };
while (defined(my $line = <$fh>)) {
$new_conf_raw .= restore_update_config_line(
$cookie,
$map,
$line,
$options->{unique},
);
}
$fh->close();
};
my $err = $@;
if ($err || !$options->{live}) {
$restore_deactivate_volumes->($storecfg, $devinfo);
}
rmtree $tmpdir;
if ($err) {
$restore_destroy_volumes->($storecfg, $devinfo);
die $err;
}
if ($options->{live}) {
# keep lock during live-restore
$new_conf_raw .= "\nlock: create";
}
PVE::Tools::file_set_contents($conffile, $new_conf_raw);
PVE::Cluster::cfs_update(); # make sure we read new file
eval { rescan($vmid, 1); };
warn $@ if $@;
PVE::AccessControl::add_vm_to_pool($vmid, $options->{pool}) if $options->{pool};
if ($options->{live}) {
# enable interrupts
local $SIG{INT} =
local $SIG{TERM} =
local $SIG{QUIT} =
local $SIG{HUP} =
local $SIG{PIPE} = sub { die "got signal ($!) - abort\n"; };
my $conf = PVE::QemuConfig->load_config($vmid);
die "cannot do live-restore for template\n" if PVE::QemuConfig->is_template($conf);
pbs_live_restore($vmid, $conf, $storecfg, $devinfo, $repo, $keyfile, $pbs_backup_name);
PVE::QemuConfig->remove_lock($vmid, "create");
}
}
sub pbs_live_restore {
my ($vmid, $conf, $storecfg, $restored_disks, $repo, $keyfile, $snap) = @_;
print "Starting VM for live-restore\n";
my $pbs_backing = {};
for my $ds (keys %$restored_disks) {
$ds =~ m/^drive-(.*)$/;
$pbs_backing->{$1} = {
repository => $repo,
snapshot => $snap,
archive => "$ds.img.fidx",
};
$pbs_backing->{$1}->{keyfile} = $keyfile if -e $keyfile;
}
my $drives_streamed = 0;
eval {
# make sure HA doesn't interrupt our restore by stopping the VM
if (PVE::HA::Config::vm_is_ha_managed($vmid)) {
run_command(['ha-manager', 'set', "vm:$vmid", '--state', 'started']);
}
# start VM with backing chain pointing to PBS backup, environment vars for PBS driver
# in QEMU (PBS_PASSWORD and PBS_FINGERPRINT) are already set by our caller
vm_start_nolock($storecfg, $vmid, $conf, {paused => 1, 'pbs-backing' => $pbs_backing}, {});
my $qmeventd_fd = register_qmeventd_handle($vmid);
# begin streaming, i.e. data copy from PBS to target disk for every vol,
# this will effectively collapse the backing image chain consisting of
# [target <- alloc-track -> PBS snapshot] to just [target] (alloc-track
# removes itself once all backing images vanish with 'auto-remove=on')
my $jobs = {};
for my $ds (sort keys %$restored_disks) {
my $job_id = "restore-$ds";
mon_cmd($vmid, 'block-stream',
'job-id' => $job_id,
device => "$ds",
);
$jobs->{$job_id} = {};
}
mon_cmd($vmid, 'cont');
qemu_drive_mirror_monitor($vmid, undef, $jobs, 'auto', 0, 'stream');
print "restore-drive jobs finished successfully, removing all tracking block devices"
." to disconnect from Proxmox Backup Server\n";
for my $ds (sort keys %$restored_disks) {
mon_cmd($vmid, 'blockdev-del', 'node-name' => "$ds-pbs");
}
close($qmeventd_fd);
};
my $err = $@;
if ($err) {
warn "An error occured during live-restore: $err\n";
_do_vm_stop($storecfg, $vmid, 1, 1, 10, 0, 1);
die "live-restore failed\n";
}
}
sub restore_vma_archive {
my ($archive, $vmid, $user, $opts, $comp) = @_;
my $readfrom = $archive;
my $cfg = PVE::Storage::config();
my $commands = [];
my $bwlimit = $opts->{bwlimit};
my $dbg_cmdstring = '';
my $add_pipe = sub {
my ($cmd) = @_;
push @$commands, $cmd;
$dbg_cmdstring .= ' | ' if length($dbg_cmdstring);
$dbg_cmdstring .= PVE::Tools::cmd2string($cmd);
$readfrom = '-';
};
my $input = undef;
if ($archive eq '-') {
$input = '<&STDIN';
} else {
# If we use a backup from a PVE defined storage we also consider that
# storage's rate limit:
my (undef, $volid) = PVE::Storage::path_to_volume_id($cfg, $archive);
if (defined($volid)) {
my ($sid, undef) = PVE::Storage::parse_volume_id($volid);
my $readlimit = PVE::Storage::get_bandwidth_limit('restore', [$sid], $bwlimit);
if ($readlimit) {
print STDERR "applying read rate limit: $readlimit\n";
my $cstream = ['cstream', '-t', $readlimit*1024, '--', $readfrom];
$add_pipe->($cstream);
}
}
}
if ($comp) {
my $info = PVE::Storage::decompressor_info('vma', $comp);
my $cmd = $info->{decompressor};
push @$cmd, $readfrom;
$add_pipe->($cmd);
}
my $tmpdir = "/var/tmp/vzdumptmp$$";
rmtree $tmpdir;
# disable interrupts (always do cleanups)
local $SIG{INT} =
local $SIG{TERM} =
local $SIG{QUIT} =
local $SIG{HUP} = sub { warn "got interrupt - ignored\n"; };
my $mapfifo = "/var/tmp/vzdumptmp$$.fifo";
POSIX::mkfifo($mapfifo, 0600);
my $fifofh;
my $openfifo = sub { open($fifofh, '>', $mapfifo) or die $! };
$add_pipe->(['vma', 'extract', '-v', '-r', $mapfifo, $readfrom, $tmpdir]);
my $oldtimeout;
my $timeout = 5;
my $devinfo = {};
my $rpcenv = PVE::RPCEnvironment::get();
my $conffile = PVE::QemuConfig->config_file($vmid);
# Note: $oldconf is undef if VM does not exist
my $cfs_path = PVE::QemuConfig->cfs_config_path($vmid);
my $oldconf = PVE::Cluster::cfs_read_file($cfs_path);
my $new_conf_raw = '';
my %storage_limits;
my $print_devmap = sub {
my $cfgfn = "$tmpdir/qemu-server.conf";
# we can read the config - that is already extracted
my $fh = IO::File->new($cfgfn, "r") ||
die "unable to read qemu-server.conf - $!\n";
my $fwcfgfn = "$tmpdir/qemu-server.fw";
if (-f $fwcfgfn) {
my $pve_firewall_dir = '/etc/pve/firewall';
mkdir $pve_firewall_dir; # make sure the dir exists
PVE::Tools::file_copy($fwcfgfn, "${pve_firewall_dir}/$vmid.fw");
}
my $virtdev_hash = $parse_backup_hints->($rpcenv, $user, $cfg, $fh, $devinfo, $opts);
foreach my $info (values %{$virtdev_hash}) {
my $storeid = $info->{storeid};
next if defined($storage_limits{$storeid});
my $limit = PVE::Storage::get_bandwidth_limit('restore', [$storeid], $bwlimit) // 0;
print STDERR "rate limit for storage $storeid: $limit KiB/s\n" if $limit;
$storage_limits{$storeid} = $limit * 1024;
}
foreach my $devname (keys %$devinfo) {
die "found no device mapping information for device '$devname'\n"
if !$devinfo->{$devname}->{virtdev};
}
# create empty/temp config
if ($oldconf) {
PVE::Tools::file_set_contents($conffile, "memory: 128\n");
$restore_cleanup_oldconf->($cfg, $vmid, $oldconf, $virtdev_hash);
}
# allocate volumes
my $map = $restore_allocate_devices->($cfg, $virtdev_hash, $vmid);
# print restore information to $fifofh
foreach my $virtdev (sort keys %$virtdev_hash) {
my $d = $virtdev_hash->{$virtdev};
next if $d->{is_cloudinit}; # no need to restore cloudinit
my $storeid = $d->{storeid};
my $volid = $d->{volid};
my $map_opts = '';
if (my $limit = $storage_limits{$storeid}) {
$map_opts .= "throttling.bps=$limit:throttling.group=$storeid:";
}
my $write_zeros = 1;
if (PVE::Storage::volume_has_feature($cfg, 'sparseinit', $volid)) {
$write_zeros = 0;
}
my $path = PVE::Storage::path($cfg, $volid);
print $fifofh "${map_opts}format=$d->{format}:${write_zeros}:$d->{devname}=$path\n";
print "map '$d->{devname}' to '$path' (write zeros = ${write_zeros})\n";
}
$fh->seek(0, 0) || die "seek failed - $!\n";
my $cookie = { netcount => 0 };
while (defined(my $line = <$fh>)) {
$new_conf_raw .= restore_update_config_line(
$cookie,
$map,
$line,
$opts->{unique},
);
}
$fh->close();
};
eval {
# enable interrupts
local $SIG{INT} =
local $SIG{TERM} =
local $SIG{QUIT} =
local $SIG{HUP} =
local $SIG{PIPE} = sub { die "interrupted by signal\n"; };
local $SIG{ALRM} = sub { die "got timeout\n"; };
$oldtimeout = alarm($timeout);
my $parser = sub {
my $line = shift;
print "$line\n";
if ($line =~ m/^DEV:\sdev_id=(\d+)\ssize:\s(\d+)\sdevname:\s(\S+)$/) {
my ($dev_id, $size, $devname) = ($1, $2, $3);
$devinfo->{$devname} = { size => $size, dev_id => $dev_id };
} elsif ($line =~ m/^CTIME: /) {
# we correctly received the vma config, so we can disable
# the timeout now for disk allocation (set to 10 minutes, so
# that we always timeout if something goes wrong)
alarm(600);
&$print_devmap();
print $fifofh "done\n";
my $tmp = $oldtimeout || 0;
$oldtimeout = undef;
alarm($tmp);
close($fifofh);
$fifofh = undef;
}
};
print "restore vma archive: $dbg_cmdstring\n";
run_command($commands, input => $input, outfunc => $parser, afterfork => $openfifo);
};
my $err = $@;
alarm($oldtimeout) if $oldtimeout;
$restore_deactivate_volumes->($cfg, $devinfo);
close($fifofh) if $fifofh;
unlink $mapfifo;
rmtree $tmpdir;
if ($err) {
$restore_destroy_volumes->($cfg, $devinfo);
die $err;
}
PVE::Tools::file_set_contents($conffile, $new_conf_raw);
PVE::Cluster::cfs_update(); # make sure we read new file
eval { rescan($vmid, 1); };
warn $@ if $@;
PVE::AccessControl::add_vm_to_pool($vmid, $opts->{pool}) if $opts->{pool};
}
sub restore_tar_archive {
my ($archive, $vmid, $user, $opts) = @_;
if ($archive ne '-') {
my $firstfile = tar_archive_read_firstfile($archive);
die "ERROR: file '$archive' does not look like a QemuServer vzdump backup\n"
if $firstfile ne 'qemu-server.conf';
}
my $storecfg = PVE::Storage::config();
# avoid zombie disks when restoring over an existing VM -> cleanup first
# pass keep_empty_config=1 to keep the config (thus VMID) reserved for us
# skiplock=1 because qmrestore has set the 'create' lock itself already
my $vmcfgfn = PVE::QemuConfig->config_file($vmid);
destroy_vm($storecfg, $vmid, 1, { lock => 'restore' }) if -f $vmcfgfn;
my $tocmd = "/usr/lib/qemu-server/qmextract";
$tocmd .= " --storage " . PVE::Tools::shellquote($opts->{storage}) if $opts->{storage};
$tocmd .= " --pool " . PVE::Tools::shellquote($opts->{pool}) if $opts->{pool};
$tocmd .= ' --prealloc' if $opts->{prealloc};
$tocmd .= ' --info' if $opts->{info};
# tar option "xf" does not autodetect compression when read from STDIN,
# so we pipe to zcat
my $cmd = "zcat -f|tar xf " . PVE::Tools::shellquote($archive) . " " .
PVE::Tools::shellquote("--to-command=$tocmd");
my $tmpdir = "/var/tmp/vzdumptmp$$";
mkpath $tmpdir;
local $ENV{VZDUMP_TMPDIR} = $tmpdir;
local $ENV{VZDUMP_VMID} = $vmid;
local $ENV{VZDUMP_USER} = $user;
my $conffile = PVE::QemuConfig->config_file($vmid);
my $new_conf_raw = '';
# disable interrupts (always do cleanups)
local $SIG{INT} =
local $SIG{TERM} =
local $SIG{QUIT} =
local $SIG{HUP} = sub { print STDERR "got interrupt - ignored\n"; };
eval {
# enable interrupts
local $SIG{INT} =
local $SIG{TERM} =
local $SIG{QUIT} =
local $SIG{HUP} =
local $SIG{PIPE} = sub { die "interrupted by signal\n"; };
if ($archive eq '-') {
print "extracting archive from STDIN\n";
run_command($cmd, input => "<&STDIN");
} else {
print "extracting archive '$archive'\n";
run_command($cmd);
}
return if $opts->{info};
# read new mapping
my $map = {};
my $statfile = "$tmpdir/qmrestore.stat";
if (my $fd = IO::File->new($statfile, "r")) {
while (defined (my $line = <$fd>)) {
if ($line =~ m/vzdump:([^\s:]*):(\S+)$/) {
$map->{$1} = $2 if $1;
} else {
print STDERR "unable to parse line in statfile - $line\n";
}
}
$fd->close();
}
my $confsrc = "$tmpdir/qemu-server.conf";
my $srcfd = IO::File->new($confsrc, "r") || die "unable to open file '$confsrc'\n";
my $cookie = { netcount => 0 };
while (defined (my $line = <$srcfd>)) {
$new_conf_raw .= restore_update_config_line(
$cookie,
$map,
$line,
$opts->{unique},
);
}
$srcfd->close();
};
if (my $err = $@) {
tar_restore_cleanup($storecfg, "$tmpdir/qmrestore.stat") if !$opts->{info};
die $err;
}
rmtree $tmpdir;
PVE::Tools::file_set_contents($conffile, $new_conf_raw);
PVE::Cluster::cfs_update(); # make sure we read new file
eval { rescan($vmid, 1); };
warn $@ if $@;
};
sub foreach_storage_used_by_vm {
my ($conf, $func) = @_;
my $sidhash = {};
PVE::QemuConfig->foreach_volume($conf, sub {
my ($ds, $drive) = @_;
return if drive_is_cdrom($drive);
my $volid = $drive->{file};
my ($sid, $volname) = PVE::Storage::parse_volume_id($volid, 1);
$sidhash->{$sid} = $sid if $sid;
});
foreach my $sid (sort keys %$sidhash) {
&$func($sid);
}
}
my $qemu_snap_storage = {
rbd => 1,
};
sub do_snapshots_with_qemu {
my ($storecfg, $volid) = @_;
my $storage_name = PVE::Storage::parse_volume_id($volid);
my $scfg = $storecfg->{ids}->{$storage_name};
die "could not find storage '$storage_name'\n" if !defined($scfg);
if ($qemu_snap_storage->{$scfg->{type}} && !$scfg->{krbd}){
return 1;
}
if ($volid =~ m/\.(qcow2|qed)$/){
return 1;
}
return;
}
sub qga_check_running {
my ($vmid, $nowarn) = @_;
eval { mon_cmd($vmid, "guest-ping", timeout => 3); };
if ($@) {
warn "Qemu Guest Agent is not running - $@" if !$nowarn;
return 0;
}
return 1;
}
sub template_create {
my ($vmid, $conf, $disk) = @_;
my $storecfg = PVE::Storage::config();
PVE::QemuConfig->foreach_volume($conf, sub {
my ($ds, $drive) = @_;
return if drive_is_cdrom($drive);
return if $disk && $ds ne $disk;
my $volid = $drive->{file};
return if !PVE::Storage::volume_has_feature($storecfg, 'template', $volid);
my $voliddst = PVE::Storage::vdisk_create_base($storecfg, $volid);
$drive->{file} = $voliddst;
$conf->{$ds} = print_drive($drive);
PVE::QemuConfig->write_config($vmid, $conf);
});
}
sub convert_iscsi_path {
my ($path) = @_;
if ($path =~ m|^iscsi://([^/]+)/([^/]+)/(.+)$|) {
my $portal = $1;
my $target = $2;
my $lun = $3;
my $initiator_name = get_initiator_name();
return "file.driver=iscsi,file.transport=tcp,file.initiator-name=$initiator_name,".
"file.portal=$portal,file.target=$target,file.lun=$lun,driver=raw";
}
die "cannot convert iscsi path '$path', unkown format\n";
}
sub qemu_img_convert {
my ($src_volid, $dst_volid, $size, $snapname, $is_zero_initialized) = @_;
my $storecfg = PVE::Storage::config();
my ($src_storeid, $src_volname) = PVE::Storage::parse_volume_id($src_volid, 1);
my ($dst_storeid, $dst_volname) = PVE::Storage::parse_volume_id($dst_volid, 1);
die "destination '$dst_volid' is not a valid volid form qemu-img convert\n" if !$dst_storeid;
my $cachemode;
my $src_path;
my $src_is_iscsi = 0;
my $src_format;
if ($src_storeid) {
PVE::Storage::activate_volumes($storecfg, [$src_volid], $snapname);
my $src_scfg = PVE::Storage::storage_config($storecfg, $src_storeid);
$src_format = qemu_img_format($src_scfg, $src_volname);
$src_path = PVE::Storage::path($storecfg, $src_volid, $snapname);
$src_is_iscsi = ($src_path =~ m|^iscsi://|);
$cachemode = 'none' if $src_scfg->{type} eq 'zfspool';
} elsif (-f $src_volid) {
$src_path = $src_volid;
if ($src_path =~ m/\.($PVE::QemuServer::Drive::QEMU_FORMAT_RE)$/) {
$src_format = $1;
}
}
die "source '$src_volid' is not a valid volid nor path for qemu-img convert\n" if !$src_path;
my $dst_scfg = PVE::Storage::storage_config($storecfg, $dst_storeid);
my $dst_format = qemu_img_format($dst_scfg, $dst_volname);
my $dst_path = PVE::Storage::path($storecfg, $dst_volid);
my $dst_is_iscsi = ($dst_path =~ m|^iscsi://|);
my $cmd = [];
push @$cmd, '/usr/bin/qemu-img', 'convert', '-p', '-n';
push @$cmd, '-l', "snapshot.name=$snapname"
if $snapname && $src_format && $src_format eq "qcow2";
push @$cmd, '-t', 'none' if $dst_scfg->{type} eq 'zfspool';
push @$cmd, '-T', $cachemode if defined($cachemode);
if ($src_is_iscsi) {
push @$cmd, '--image-opts';
$src_path = convert_iscsi_path($src_path);
} elsif ($src_format) {
push @$cmd, '-f', $src_format;
}
if ($dst_is_iscsi) {
push @$cmd, '--target-image-opts';
$dst_path = convert_iscsi_path($dst_path);
} else {
push @$cmd, '-O', $dst_format;
}
push @$cmd, $src_path;
if (!$dst_is_iscsi && $is_zero_initialized) {
push @$cmd, "zeroinit:$dst_path";
} else {
push @$cmd, $dst_path;
}
my $parser = sub {
my $line = shift;
if($line =~ m/\((\S+)\/100\%\)/){
my $percent = $1;
my $transferred = int($size * $percent / 100);
my $total_h = render_bytes($size, 1);
my $transferred_h = render_bytes($transferred, 1);
print "transferred $transferred_h of $total_h ($percent%)\n";
}
};
eval { run_command($cmd, timeout => undef, outfunc => $parser); };
my $err = $@;
die "copy failed: $err" if $err;
}
sub qemu_img_format {
my ($scfg, $volname) = @_;
if ($scfg->{path} && $volname =~ m/\.($PVE::QemuServer::Drive::QEMU_FORMAT_RE)$/) {
return $1;
} else {
return "raw";
}
}
sub qemu_drive_mirror {
my ($vmid, $drive, $dst_volid, $vmiddst, $is_zero_initialized, $jobs, $completion, $qga, $bwlimit, $src_bitmap) = @_;
$jobs = {} if !$jobs;
my $qemu_target;
my $format;
$jobs->{"drive-$drive"} = {};
if ($dst_volid =~ /^nbd:/) {
$qemu_target = $dst_volid;
$format = "nbd";
} else {
my $storecfg = PVE::Storage::config();
my ($dst_storeid, $dst_volname) = PVE::Storage::parse_volume_id($dst_volid);
my $dst_scfg = PVE::Storage::storage_config($storecfg, $dst_storeid);
$format = qemu_img_format($dst_scfg, $dst_volname);
my $dst_path = PVE::Storage::path($storecfg, $dst_volid);
$qemu_target = $is_zero_initialized ? "zeroinit:$dst_path" : $dst_path;
}
my $opts = { timeout => 10, device => "drive-$drive", mode => "existing", sync => "full", target => $qemu_target };
$opts->{format} = $format if $format;
if (defined($src_bitmap)) {
$opts->{sync} = 'incremental';
$opts->{bitmap} = $src_bitmap;
print "drive mirror re-using dirty bitmap '$src_bitmap'\n";
}
if (defined($bwlimit)) {
$opts->{speed} = $bwlimit * 1024;
print "drive mirror is starting for drive-$drive with bandwidth limit: ${bwlimit} KB/s\n";
} else {
print "drive mirror is starting for drive-$drive\n";
}
# if a job already runs for this device we get an error, catch it for cleanup
eval { mon_cmd($vmid, "drive-mirror", %$opts); };
if (my $err = $@) {
eval { PVE::QemuServer::qemu_blockjobs_cancel($vmid, $jobs) };
warn "$@\n" if $@;
die "mirroring error: $err\n";
}
qemu_drive_mirror_monitor ($vmid, $vmiddst, $jobs, $completion, $qga);
}
# $completion can be either
# 'complete': wait until all jobs are ready, block-job-complete them (default)
# 'cancel': wait until all jobs are ready, block-job-cancel them
# 'skip': wait until all jobs are ready, return with block jobs in ready state
# 'auto': wait until all jobs disappear, only use for jobs which complete automatically
sub qemu_drive_mirror_monitor {
my ($vmid, $vmiddst, $jobs, $completion, $qga, $op) = @_;
$completion //= 'complete';
$op //= "mirror";
eval {
my $err_complete = 0;
my $starttime = time ();
while (1) {
die "block job ('$op') timed out\n" if $err_complete > 300;
my $stats = mon_cmd($vmid, "query-block-jobs");
my $ctime = time();
my $running_jobs = {};
for my $stat (@$stats) {
next if $stat->{type} ne $op;
$running_jobs->{$stat->{device}} = $stat;
}
my $readycounter = 0;
for my $job_id (sort keys %$jobs) {
my $job = $running_jobs->{$job_id};
my $vanished = !defined($job);
my $complete = defined($jobs->{$job_id}->{complete}) && $vanished;
if($complete || ($vanished && $completion eq 'auto')) {
print "$job_id: $op-job finished\n";
delete $jobs->{$job_id};
next;
}
die "$job_id: '$op' has been cancelled\n" if !defined($job);
my $busy = $job->{busy};
my $ready = $job->{ready};
if (my $total = $job->{len}) {
my $transferred = $job->{offset} || 0;
my $remaining = $total - $transferred;
my $percent = sprintf "%.2f", ($transferred * 100 / $total);
my $duration = $ctime - $starttime;
my $total_h = render_bytes($total, 1);
my $transferred_h = render_bytes($transferred, 1);
my $status = sprintf(
"transferred $transferred_h of $total_h ($percent%%) in %s",
render_duration($duration),
);
if ($ready) {
if ($busy) {
$status .= ", still busy"; # shouldn't even happen? but mirror is weird
} else {
$status .= ", ready";
}
}
print "$job_id: $status\n" if !$jobs->{$job_id}->{ready};
$jobs->{$job_id}->{ready} = $ready;
}
$readycounter++ if $job->{ready};
}
last if scalar(keys %$jobs) == 0;
if ($readycounter == scalar(keys %$jobs)) {
print "all '$op' jobs are ready\n";
# do the complete later (or has already been done)
last if $completion eq 'skip' || $completion eq 'auto';
if ($vmiddst && $vmiddst != $vmid) {
my $agent_running = $qga && qga_check_running($vmid);
if ($agent_running) {
print "freeze filesystem\n";
eval { mon_cmd($vmid, "guest-fsfreeze-freeze"); };
} else {
print "suspend vm\n";
eval { PVE::QemuServer::vm_suspend($vmid, 1); };
}
# if we clone a disk for a new target vm, we don't switch the disk
PVE::QemuServer::qemu_blockjobs_cancel($vmid, $jobs);
if ($agent_running) {
print "unfreeze filesystem\n";
eval { mon_cmd($vmid, "guest-fsfreeze-thaw"); };
} else {
print "resume vm\n";
eval { PVE::QemuServer::vm_resume($vmid, 1, 1); };
}
last;
} else {
for my $job_id (sort keys %$jobs) {
# try to switch the disk if source and destination are on the same guest
print "$job_id: Completing block job_id...\n";
my $op;
if ($completion eq 'complete') {
$op = 'block-job-complete';
} elsif ($completion eq 'cancel') {
$op = 'block-job-cancel';
} else {
die "invalid completion value: $completion\n";
}
eval { mon_cmd($vmid, $op, device => $job_id) };
if ($@ =~ m/cannot be completed/) {
print "$job_id: block job cannot be completed, trying again.\n";
$err_complete++;
}else {
print "$job_id: Completed successfully.\n";
$jobs->{$job_id}->{complete} = 1;
}
}
}
}
sleep 1;
}
};
my $err = $@;
if ($err) {
eval { PVE::QemuServer::qemu_blockjobs_cancel($vmid, $jobs) };
die "block job ($op) error: $err";
}
}
sub qemu_blockjobs_cancel {
my ($vmid, $jobs) = @_;
foreach my $job (keys %$jobs) {
print "$job: Cancelling block job\n";
eval { mon_cmd($vmid, "block-job-cancel", device => $job); };
$jobs->{$job}->{cancel} = 1;
}
while (1) {
my $stats = mon_cmd($vmid, "query-block-jobs");
my $running_jobs = {};
foreach my $stat (@$stats) {
$running_jobs->{$stat->{device}} = $stat;
}
foreach my $job (keys %$jobs) {
if (defined($jobs->{$job}->{cancel}) && !defined($running_jobs->{$job})) {
print "$job: Done.\n";
delete $jobs->{$job};
}
}
last if scalar(keys %$jobs) == 0;
sleep 1;
}
}
sub clone_disk {
my ($storecfg, $vmid, $running, $drivename, $drive, $snapname,
$newvmid, $storage, $format, $full, $newvollist, $jobs, $completion, $qga, $bwlimit, $conf) = @_;
my $newvolid;
if (!$full) {
print "create linked clone of drive $drivename ($drive->{file})\n";
$newvolid = PVE::Storage::vdisk_clone($storecfg, $drive->{file}, $newvmid, $snapname);
push @$newvollist, $newvolid;
} else {
my ($storeid, $volname) = PVE::Storage::parse_volume_id($drive->{file});
$storeid = $storage if $storage;
my $dst_format = resolve_dst_disk_format($storecfg, $storeid, $volname, $format);
print "create full clone of drive $drivename ($drive->{file})\n";
my $name = undef;
my $size = undef;
if (drive_is_cloudinit($drive)) {
$name = "vm-$newvmid-cloudinit";
my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
if ($scfg->{path}) {
$name .= ".$dst_format";
}
$snapname = undef;
$size = PVE::QemuServer::Cloudinit::CLOUDINIT_DISK_SIZE;
} elsif ($drivename eq 'efidisk0') {
$size = get_efivars_size($conf);
} else {
($size) = PVE::Storage::volume_size_info($storecfg, $drive->{file}, 10);
}
$newvolid = PVE::Storage::vdisk_alloc(
$storecfg, $storeid, $newvmid, $dst_format, $name, ($size/1024)
);
push @$newvollist, $newvolid;
PVE::Storage::activate_volumes($storecfg, [$newvolid]);
if (drive_is_cloudinit($drive)) {
# when cloning multiple disks (e.g. during clone_vm) it might be the last disk
# if this is the case, we have to complete any block-jobs still there from
# previous drive-mirrors
if (($completion eq 'complete') && (scalar(keys %$jobs) > 0)) {
qemu_drive_mirror_monitor($vmid, $newvmid, $jobs, $completion, $qga);
}
goto no_data_clone;
}
my $sparseinit = PVE::Storage::volume_has_feature($storecfg, 'sparseinit', $newvolid);
if (!$running || $snapname) {
# TODO: handle bwlimits
if ($drivename eq 'efidisk0') {
# the relevant data on the efidisk may be smaller than the source
# e.g. on RBD/ZFS, so we use dd to copy only the amount
# that is given by the OVMF_VARS.fd
my $src_path = PVE::Storage::path($storecfg, $drive->{file});
my $dst_path = PVE::Storage::path($storecfg, $newvolid);
# better for Ceph if block size is not too small, see bug #3324
my $bs = 1024*1024;
run_command(['qemu-img', 'dd', '-n', '-O', $dst_format, "bs=$bs", "osize=$size",
"if=$src_path", "of=$dst_path"]);
} else {
qemu_img_convert($drive->{file}, $newvolid, $size, $snapname, $sparseinit);
}
} else {
my $kvmver = get_running_qemu_version ($vmid);
if (!min_version($kvmver, 2, 7)) {
die "drive-mirror with iothread requires qemu version 2.7 or higher\n"
if $drive->{iothread};
}
qemu_drive_mirror($vmid, $drivename, $newvolid, $newvmid, $sparseinit, $jobs,
$completion, $qga, $bwlimit);
}
}
no_data_clone:
my ($size) = eval { PVE::Storage::volume_size_info($storecfg, $newvolid, 10) };
my $disk = $drive;
$disk->{format} = undef;
$disk->{file} = $newvolid;
$disk->{size} = $size if defined($size);
return $disk;
}
sub get_running_qemu_version {
my ($vmid) = @_;
my $res = mon_cmd($vmid, "query-version");
return "$res->{qemu}->{major}.$res->{qemu}->{minor}";
}
sub qemu_use_old_bios_files {
my ($machine_type) = @_;
return if !$machine_type;
my $use_old_bios_files = undef;
if ($machine_type =~ m/^(\S+)\.pxe$/) {
$machine_type = $1;
$use_old_bios_files = 1;
} else {
my $version = extract_version($machine_type, kvm_user_version());
# Note: kvm version < 2.4 use non-efi pxe files, and have problems when we
# load new efi bios files on migration. So this hack is required to allow
# live migration from qemu-2.2 to qemu-2.4, which is sometimes used when
# updrading from proxmox-ve-3.X to proxmox-ve 4.0
$use_old_bios_files = !min_version($version, 2, 4);
}
return ($use_old_bios_files, $machine_type);
}
sub get_efivars_size {
my ($conf) = @_;
my $arch = get_vm_arch($conf);
my (undef, $ovmf_vars) = get_ovmf_files($arch);
die "uefi vars image '$ovmf_vars' not found\n" if ! -f $ovmf_vars;
return -s $ovmf_vars;
}
sub update_efidisk_size {
my ($conf) = @_;
return if !defined($conf->{efidisk0});
my $disk = PVE::QemuServer::parse_drive('efidisk0', $conf->{efidisk0});
$disk->{size} = get_efivars_size($conf);
$conf->{efidisk0} = print_drive($disk);
return;
}
sub create_efidisk($$$$$) {
my ($storecfg, $storeid, $vmid, $fmt, $arch) = @_;
my (undef, $ovmf_vars) = get_ovmf_files($arch);
die "EFI vars default image not found\n" if ! -f $ovmf_vars;
my $vars_size_b = -s $ovmf_vars;
my $vars_size = PVE::Tools::convert_size($vars_size_b, 'b' => 'kb');
my $volid = PVE::Storage::vdisk_alloc($storecfg, $storeid, $vmid, $fmt, undef, $vars_size);
PVE::Storage::activate_volumes($storecfg, [$volid]);
qemu_img_convert($ovmf_vars, $volid, $vars_size_b, undef, 0);
my ($size) = PVE::Storage::volume_size_info($storecfg, $volid, 3);
return ($volid, $size/1024);
}
sub vm_iothreads_list {
my ($vmid) = @_;
my $res = mon_cmd($vmid, 'query-iothreads');
my $iothreads = {};
foreach my $iothread (@$res) {
$iothreads->{ $iothread->{id} } = $iothread->{"thread-id"};
}
return $iothreads;
}
sub scsihw_infos {
my ($conf, $drive) = @_;
my $maxdev = 0;
if (!$conf->{scsihw} || ($conf->{scsihw} =~ m/^lsi/)) {
$maxdev = 7;
} elsif ($conf->{scsihw} && ($conf->{scsihw} eq 'virtio-scsi-single')) {
$maxdev = 1;
} else {
$maxdev = 256;
}
my $controller = int($drive->{index} / $maxdev);
my $controller_prefix = ($conf->{scsihw} && $conf->{scsihw} eq 'virtio-scsi-single')
? "virtioscsi"
: "scsihw";
return ($maxdev, $controller, $controller_prefix);
}
sub windows_version {
my ($ostype) = @_;
return 0 if !$ostype;
my $winversion = 0;
if($ostype eq 'wxp' || $ostype eq 'w2k3' || $ostype eq 'w2k') {
$winversion = 5;
} elsif($ostype eq 'w2k8' || $ostype eq 'wvista') {
$winversion = 6;
} elsif ($ostype =~ m/^win(\d+)$/) {
$winversion = $1;
}
return $winversion;
}
sub resolve_dst_disk_format {
my ($storecfg, $storeid, $src_volname, $format) = @_;
my ($defFormat, $validFormats) = PVE::Storage::storage_default_format($storecfg, $storeid);
if (!$format) {
# if no target format is specified, use the source disk format as hint
if ($src_volname) {
my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
$format = qemu_img_format($scfg, $src_volname);
} else {
return $defFormat;
}
}
# test if requested format is supported - else use default
my $supported = grep { $_ eq $format } @$validFormats;
$format = $defFormat if !$supported;
return $format;
}
# NOTE: if this logic changes, please update docs & possibly gui logic
sub find_vmstate_storage {
my ($conf, $storecfg) = @_;
# first, return storage from conf if set
return $conf->{vmstatestorage} if $conf->{vmstatestorage};
my ($target, $shared, $local);
foreach_storage_used_by_vm($conf, sub {
my ($sid) = @_;
my $scfg = PVE::Storage::storage_config($storecfg, $sid);
my $dst = $scfg->{shared} ? \$shared : \$local;
$$dst = $sid if !$$dst || $scfg->{path}; # prefer file based storage
});
# second, use shared storage where VM has at least one disk
# third, use local storage where VM has at least one disk
# fall back to local storage
$target = $shared // $local // 'local';
return $target;
}
sub generate_uuid {
my ($uuid, $uuid_str);
UUID::generate($uuid);
UUID::unparse($uuid, $uuid_str);
return $uuid_str;
}
sub generate_smbios1_uuid {
return "uuid=".generate_uuid();
}
sub nbd_stop {
my ($vmid) = @_;
mon_cmd($vmid, 'nbd-server-stop');
}
sub create_reboot_request {
my ($vmid) = @_;
open(my $fh, '>', "/run/qemu-server/$vmid.reboot")
or die "failed to create reboot trigger file: $!\n";
close($fh);
}
sub clear_reboot_request {
my ($vmid) = @_;
my $path = "/run/qemu-server/$vmid.reboot";
my $res = 0;
$res = unlink($path);
die "could not remove reboot request for $vmid: $!"
if !$res && $! != POSIX::ENOENT;
return $res;
}
sub bootorder_from_legacy {
my ($conf, $bootcfg) = @_;
my $boot = $bootcfg->{legacy} || $boot_fmt->{legacy}->{default};
my $bootindex_hash = {};
my $i = 1;
foreach my $o (split(//, $boot)) {
$bootindex_hash->{$o} = $i*100;
$i++;
}
my $bootorder = {};
PVE::QemuConfig->foreach_volume($conf, sub {
my ($ds, $drive) = @_;
if (drive_is_cdrom ($drive, 1)) {
if ($bootindex_hash->{d}) {
$bootorder->{$ds} = $bootindex_hash->{d};
$bootindex_hash->{d} += 1;
}
} elsif ($bootindex_hash->{c}) {
$bootorder->{$ds} = $bootindex_hash->{c}
if $conf->{bootdisk} && $conf->{bootdisk} eq $ds;
$bootindex_hash->{c} += 1;
}
});
if ($bootindex_hash->{n}) {
for (my $i = 0; $i < $MAX_NETS; $i++) {
my $netname = "net$i";
next if !$conf->{$netname};
$bootorder->{$netname} = $bootindex_hash->{n};
$bootindex_hash->{n} += 1;
}
}
return $bootorder;
}
# Generate default device list for 'boot: order=' property. Matches legacy
# default boot order, but with explicit device names. This is important, since
# the fallback for when neither 'order' nor the old format is specified relies
# on 'bootorder_from_legacy' above, and it would be confusing if this diverges.
sub get_default_bootdevices {
my ($conf) = @_;
my @ret = ();
# harddisk
my $first = PVE::QemuServer::Drive::resolve_first_disk($conf, 0);
push @ret, $first if $first;
# cdrom
$first = PVE::QemuServer::Drive::resolve_first_disk($conf, 1);
push @ret, $first if $first;
# network
for (my $i = 0; $i < $MAX_NETS; $i++) {
my $netname = "net$i";
next if !$conf->{$netname};
push @ret, $netname;
last;
}
return \@ret;
}
sub device_bootorder {
my ($conf) = @_;
return bootorder_from_legacy($conf) if !defined($conf->{boot});
my $boot = parse_property_string($boot_fmt, $conf->{boot});
my $bootorder = {};
if (!defined($boot) || $boot->{legacy}) {
$bootorder = bootorder_from_legacy($conf, $boot);
} elsif ($boot->{order}) {
my $i = 100; # start at 100 to allow user to insert devices before us with -args
for my $dev (PVE::Tools::split_list($boot->{order})) {
$bootorder->{$dev} = $i++;
}
}
return $bootorder;
}
sub register_qmeventd_handle {
my ($vmid) = @_;
my $fh;
my $peer = "/var/run/qmeventd.sock";
my $count = 0;
for (;;) {
$count++;
$fh = IO::Socket::UNIX->new(Peer => $peer, Blocking => 0, Timeout => 1);
last if $fh;
if ($! != EINTR && $! != EAGAIN) {
die "unable to connect to qmeventd socket (vmid: $vmid) - $!\n";
}
if ($count > 4) {
die "unable to connect to qmeventd socket (vmid: $vmid) - timeout "
. "after $count retries\n";
}
usleep(25000);
}
# send handshake to mark VM as backing up
print $fh to_json({vzdump => {vmid => "$vmid"}});
# return handle to be closed later when inhibit is no longer required
return $fh;
}
# bash completion helper
sub complete_backup_archives {
my ($cmdname, $pname, $cvalue) = @_;
my $cfg = PVE::Storage::config();
my $storeid;
if ($cvalue =~ m/^([^:]+):/) {
$storeid = $1;
}
my $data = PVE::Storage::template_list($cfg, $storeid, 'backup');
my $res = [];
foreach my $id (keys %$data) {
foreach my $item (@{$data->{$id}}) {
next if $item->{format} !~ m/^vma\.(${\PVE::Storage::Plugin::COMPRESSOR_RE})$/;
push @$res, $item->{volid} if defined($item->{volid});
}
}
return $res;
}
my $complete_vmid_full = sub {
my ($running) = @_;
my $idlist = vmstatus();
my $res = [];
foreach my $id (keys %$idlist) {
my $d = $idlist->{$id};
if (defined($running)) {
next if $d->{template};
next if $running && $d->{status} ne 'running';
next if !$running && $d->{status} eq 'running';
}
push @$res, $id;
}
return $res;
};
sub complete_vmid {
return &$complete_vmid_full();
}
sub complete_vmid_stopped {
return &$complete_vmid_full(0);
}
sub complete_vmid_running {
return &$complete_vmid_full(1);
}
sub complete_storage {
my $cfg = PVE::Storage::config();
my $ids = $cfg->{ids};
my $res = [];
foreach my $sid (keys %$ids) {
next if !PVE::Storage::storage_check_enabled($cfg, $sid, undef, 1);
next if !$ids->{$sid}->{content}->{images};
push @$res, $sid;
}
return $res;
}
sub complete_migration_storage {
my ($cmd, $param, $current_value, $all_args) = @_;
my $targetnode = @$all_args[1];
my $cfg = PVE::Storage::config();
my $ids = $cfg->{ids};
my $res = [];
foreach my $sid (keys %$ids) {
next if !PVE::Storage::storage_check_enabled($cfg, $sid, $targetnode, 1);
next if !$ids->{$sid}->{content}->{images};
push @$res, $sid;
}
return $res;
}
sub vm_is_paused {
my ($vmid) = @_;
my $qmpstatus = eval {
PVE::QemuConfig::assert_config_exists_on_node($vmid);
mon_cmd($vmid, "query-status");
};
warn "$@\n" if $@;
return $qmpstatus && $qmpstatus->{status} eq "paused";
}
1;