1 package PVE
::QemuServer
;
11 use File
::Copy
qw(copy);
24 use Storable
qw(dclone);
25 use Time
::HiRes
qw(gettimeofday usleep);
29 use PVE
::Cluster
qw(cfs_register_file cfs_read_file cfs_write_file);
31 use PVE
::DataCenterConfig
;
32 use PVE
::Exception
qw(raise raise_param_exc);
33 use PVE
::Format
qw(render_duration render_bytes);
34 use PVE
::GuestHelpers
qw(safe_string_ne safe_num_ne safe_boolean_ne);
36 use PVE
::JSONSchema
qw(get_standard_option parse_property_string);
39 use PVE
::RPCEnvironment
;
43 use PVE
::Tools
qw(run_command file_read_firstline file_get_contents dir_glob_foreach get_host_arch $IPV6RE);
47 use PVE
::QemuServer
::Helpers
qw(min_version config_aware_timeout);
48 use PVE
::QemuServer
::Cloudinit
;
49 use PVE
::QemuServer
::CGroup
;
50 use PVE
::QemuServer
::CPUConfig
qw(print_cpu_device get_cpu_options);
51 use PVE
::QemuServer
::Drive
qw(is_valid_drivename drive_is_cloudinit drive_is_cdrom drive_is_read_only parse_drive print_drive);
52 use PVE
::QemuServer
::Machine
;
53 use PVE
::QemuServer
::Memory
;
54 use PVE
::QemuServer
::Monitor
qw(mon_cmd);
55 use PVE
::QemuServer
::PCI
qw(print_pci_addr print_pcie_addr print_pcie_root_port parse_hostpci);
56 use PVE
::QemuServer
::USB
qw(parse_usb_device);
60 require PVE
::Network
::SDN
::Zones
;
64 my $EDK2_FW_BASE = '/usr/share/pve-edk2-firmware/';
68 "$EDK2_FW_BASE/OVMF_CODE_4M.fd",
69 "$EDK2_FW_BASE/OVMF_VARS_4M.fd",
72 "$EDK2_FW_BASE/OVMF_CODE_4M.fd",
73 "$EDK2_FW_BASE/OVMF_VARS_4M.ms.fd",
76 "$EDK2_FW_BASE/OVMF_CODE_4M.secboot.fd",
77 "$EDK2_FW_BASE/OVMF_VARS_4M.fd",
80 "$EDK2_FW_BASE/OVMF_CODE_4M.secboot.fd",
81 "$EDK2_FW_BASE/OVMF_VARS_4M.ms.fd",
84 "$EDK2_FW_BASE/OVMF_CODE.fd",
85 "$EDK2_FW_BASE/OVMF_VARS.fd",
90 "$EDK2_FW_BASE/AAVMF_CODE.fd",
91 "$EDK2_FW_BASE/AAVMF_VARS.fd",
96 my $cpuinfo = PVE
::ProcFSTools
::read_cpuinfo
();
98 # Note about locking: we use flock on the config file protect against concurent actions.
99 # Aditionaly, we have a 'lock' setting in the config file. This can be set to 'migrate',
100 # 'backup', 'snapshot' or 'rollback'. Most actions are not allowed when such lock is set.
101 # But you can ignore this kind of lock with the --skiplock flag.
103 cfs_register_file
('/qemu-server/',
107 PVE
::JSONSchema
::register_standard_option
('pve-qm-stateuri', {
108 description
=> "Some command save/restore state from this location.",
114 PVE
::JSONSchema
::register_standard_option
('pve-qemu-machine', {
115 description
=> "Specifies the Qemu machine type.",
117 pattern
=> '(pc|pc(-i440fx)?-\d+(\.\d+)+(\+pve\d+)?(\.pxe)?|q35|pc-q35-\d+(\.\d+)+(\+pve\d+)?(\.pxe)?|virt(?:-\d+(\.\d+)+)?(\+pve\d+)?)',
122 PVE
::JSONSchema
::register_standard_option
('pve-targetstorage', {
123 description
=> "Mapping from source to target storages. Providing only a single storage ID maps all source storages to that storage. Providing the special value '1' will map each source storage to itself.",
125 format
=> 'storage-pair-list',
129 #no warnings 'redefine';
133 $nodename_cache //= PVE
::INotify
::nodename
();
134 return $nodename_cache;
141 enum
=> [qw(i6300esb ib700)],
142 description
=> "Watchdog type to emulate.",
143 default => 'i6300esb',
148 enum
=> [qw(reset shutdown poweroff pause debug none)],
149 description
=> "The action to perform if after activation the guest fails to poll the watchdog in time.",
153 PVE
::JSONSchema
::register_format
('pve-qm-watchdog', $watchdog_fmt);
157 description
=> "Enable/disable communication with a Qemu Guest Agent (QGA) running in the VM.",
162 fstrim_cloned_disks
=> {
163 description
=> "Run fstrim after moving a disk or migrating the VM.",
169 description
=> "Select the agent type",
173 enum
=> [qw(virtio isa)],
179 description
=> "Select the VGA type.",
184 enum
=> [qw(cirrus qxl qxl2 qxl3 qxl4 none serial0 serial1 serial2 serial3 std virtio vmware)],
187 description
=> "Sets the VGA memory (in MiB). Has no effect with serial display.",
199 description
=> "The size of the file in MB.",
203 pattern
=> '[a-zA-Z0-9\-]+',
205 format_description
=> 'string',
206 description
=> "The name of the file. Will be prefixed with 'pve-shm-'. Default is the VMID. Will be deleted when the VM is stopped.",
213 enum
=> [qw(ich9-intel-hda intel-hda AC97)],
214 description
=> "Configure an audio device."
218 enum
=> ['spice', 'none'],
221 description
=> "Driver backend for the audio device."
225 my $spice_enhancements_fmt = {
230 description
=> "Enable folder sharing via SPICE. Needs Spice-WebDAV daemon installed in the VM."
234 enum
=> ['off', 'all', 'filter'],
237 description
=> "Enable video streaming. Uses compression for detected video streams."
244 enum
=> ['/dev/urandom', '/dev/random', '/dev/hwrng'],
246 description
=> "The file on the host to gather entropy from. In most cases '/dev/urandom'"
247 ." should be preferred over '/dev/random' to avoid entropy-starvation issues on the"
248 ." host. Using urandom does *not* decrease security in any meaningful way, as it's"
249 ." still seeded from real entropy, and the bytes provided will most likely be mixed"
250 ." with real entropy on the guest as well. '/dev/hwrng' can be used to pass through"
251 ." a hardware RNG from the host.",
255 description
=> "Maximum bytes of entropy allowed to get injected into the guest every"
256 ." 'period' milliseconds. Prefer a lower value when using '/dev/random' as source. Use"
257 ." `0` to disable limiting (potentially dangerous!).",
260 # default is 1 KiB/s, provides enough entropy to the guest to avoid boot-starvation issues
261 # (e.g. systemd etc...) while allowing no chance of overwhelming the host, provided we're
262 # reading from /dev/urandom
267 description
=> "Every 'period' milliseconds the entropy-injection quota is reset, allowing"
268 ." the guest to retrieve another 'max_bytes' of entropy.",
274 my $meta_info_fmt = {
277 description
=> "The guest creation timestamp as UNIX epoch time",
283 description
=> "The QEMU (machine) version from the time this VM was created.",
284 pattern
=> '\d+(\.\d+)+',
293 description
=> "Specifies whether a VM will be started during system bootup.",
299 description
=> "Automatic restart after crash (currently ignored).",
304 type
=> 'string', format
=> 'pve-hotplug-features',
305 description
=> "Selectively enable hotplug features. This is a comma separated list of"
306 ." hotplug features: 'network', 'disk', 'cpu', 'memory' and 'usb'. Use '0' to disable"
307 ." hotplug completely. Using '1' as value is an alias for the default `network,disk,usb`.",
308 default => 'network,disk,usb',
313 description
=> "Allow reboot. If set to '0' the VM exit on reboot.",
319 description
=> "Lock/unlock the VM.",
320 enum
=> [qw(backup clone create migrate rollback snapshot snapshot-delete suspending suspended)],
325 description
=> "Limit of CPU usage.",
326 verbose_description
=> "Limit of CPU usage.\n\nNOTE: If the computer has 2 CPUs, it has"
327 ." total of '2' CPU time. Value '0' indicates no CPU limit.",
335 description
=> "CPU weight for a VM, will be clamped to [1, 10000] in cgroup v2.",
336 verbose_description
=> "CPU weight for a VM. Argument is used in the kernel fair scheduler."
337 ." The larger the number is, the more CPU time this VM gets. Number is relative to"
338 ." weights of all the other running VMs.",
341 default => 'cgroup v1: 1024, cgroup v2: 100',
346 description
=> "Amount of RAM for the VM in MB. This is the maximum available memory when"
347 ." you use the balloon device.",
354 description
=> "Amount of target RAM for the VM in MB. Using zero disables the ballon driver.",
360 description
=> "Amount of memory shares for auto-ballooning. The larger the number is, the"
361 ." more memory this VM gets. Number is relative to weights of all other running VMs."
362 ." Using zero disables auto-ballooning. Auto-ballooning is done by pvestatd.",
370 description
=> "Keyboard layout for VNC server. The default is read from the"
371 ."'/etc/pve/datacenter.cfg' configuration file. It should not be necessary to set it.",
372 enum
=> PVE
::Tools
::kvmkeymaplist
(),
377 type
=> 'string', format
=> 'dns-name',
378 description
=> "Set a name for the VM. Only used on the configuration web interface.",
383 description
=> "SCSI controller model",
384 enum
=> [qw(lsi lsi53c810 virtio-scsi-pci virtio-scsi-single megasas pvscsi)],
390 description
=> "Description for the VM. Shown in the web-interface VM's summary."
391 ." This is saved as comment inside the configuration file.",
392 maxLength
=> 1024 * 8,
397 enum
=> [qw(other wxp w2k w2k3 w2k8 wvista win7 win8 win10 win11 l24 l26 solaris)],
398 description
=> "Specify guest operating system.",
399 verbose_description
=> <<EODESC,
400 Specify guest operating system. This is used to enable special
401 optimization/features for specific operating systems:
404 other;; unspecified OS
405 wxp;; Microsoft Windows XP
406 w2k;; Microsoft Windows 2000
407 w2k3;; Microsoft Windows 2003
408 w2k8;; Microsoft Windows 2008
409 wvista;; Microsoft Windows Vista
410 win7;; Microsoft Windows 7
411 win8;; Microsoft Windows 8/2012/2012r2
412 win10;; Microsoft Windows 10/2016/2019
413 win11;; Microsoft Windows 11/2022
414 l24;; Linux 2.4 Kernel
415 l26;; Linux 2.6 - 5.X Kernel
416 solaris;; Solaris/OpenSolaris/OpenIndiania kernel
421 type
=> 'string', format
=> 'pve-qm-boot',
422 description
=> "Specify guest boot order. Use the 'order=' sub-property as usage with no"
423 ." key or 'legacy=' is deprecated.",
427 type
=> 'string', format
=> 'pve-qm-bootdisk',
428 description
=> "Enable booting from specified disk. Deprecated: Use 'boot: order=foo;bar' instead.",
429 pattern
=> '(ide|sata|scsi|virtio)\d+',
434 description
=> "The number of CPUs. Please use option -sockets instead.",
441 description
=> "The number of CPU sockets.",
448 description
=> "The number of cores per socket.",
455 description
=> "Enable/disable NUMA.",
461 description
=> "Enable/disable hugepages memory.",
462 enum
=> [qw(any 2 1024)],
468 description
=> "Use together with hugepages. If enabled, hugepages will not not be deleted"
469 ." after VM shutdown and can be used for subsequent starts.",
474 description
=> "Number of hotplugged vcpus.",
481 description
=> "Enable/disable ACPI.",
486 description
=> "Enable/disable communication with the Qemu Guest Agent and its properties.",
488 format
=> $agent_fmt,
493 description
=> "Enable/disable KVM hardware virtualization.",
499 description
=> "Enable/disable time drift fix.",
505 description
=> "Set the real time clock (RTC) to local time. This is enabled by default if"
506 ." the `ostype` indicates a Microsoft Windows OS.",
511 description
=> "Freeze CPU at startup (use 'c' monitor command to start execution).",
515 type
=> 'string', format
=> $vga_fmt,
516 description
=> "Configure the VGA hardware.",
517 verbose_description
=> "Configure the VGA Hardware. If you want to use high resolution"
518 ." modes (>= 1280x1024x16) you may need to increase the vga memory option. Since QEMU"
519 ." 2.9 the default VGA display type is 'std' for all OS types besides some Windows"
520 ." versions (XP and older) which use 'cirrus'. The 'qxl' option enables the SPICE"
521 ." display server. For win* OS you can select how many independent displays you want,"
522 ." Linux guests can add displays them self.\nYou can also run without any graphic card,"
523 ." using a serial device as terminal.",
527 type
=> 'string', format
=> 'pve-qm-watchdog',
528 description
=> "Create a virtual hardware watchdog device.",
529 verbose_description
=> "Create a virtual hardware watchdog device. Once enabled (by a guest"
530 ." action), the watchdog must be periodically polled by an agent inside the guest or"
531 ." else the watchdog will reset the guest (or execute the respective action specified)",
536 typetext
=> "(now | YYYY-MM-DD | YYYY-MM-DDTHH:MM:SS)",
537 description
=> "Set the initial date of the real time clock. Valid format for date are:"
538 ."'now' or '2006-06-17T16:01:21' or '2006-06-17'.",
539 pattern
=> '(now|\d{4}-\d{1,2}-\d{1,2}(T\d{1,2}:\d{1,2}:\d{1,2})?)',
542 startup
=> get_standard_option
('pve-startup-order'),
546 description
=> "Enable/disable Template.",
552 description
=> "Arbitrary arguments passed to kvm.",
553 verbose_description
=> <<EODESCR,
554 Arbitrary arguments passed to kvm, for example:
556 args: -no-reboot -no-hpet
558 NOTE: this option is for experts only.
565 description
=> "Enable/disable the USB tablet device.",
566 verbose_description
=> "Enable/disable the USB tablet device. This device is usually needed"
567 ." to allow absolute mouse positioning with VNC. Else the mouse runs out of sync with"
568 ." normal VNC clients. If you're running lots of console-only guests on one host, you"
569 ." may consider disabling this to save some context switches. This is turned off by"
570 ." default if you use spice (`qm set <vmid> --vga qxl`).",
575 description
=> "Set maximum speed (in MB/s) for migrations. Value 0 is no limit.",
579 migrate_downtime
=> {
582 description
=> "Set maximum tolerated downtime (in seconds) for migrations.",
588 type
=> 'string', format
=> 'pve-qm-ide',
589 typetext
=> '<volume>',
590 description
=> "This is an alias for option -ide2",
594 description
=> "Emulated CPU type.",
596 format
=> 'pve-vm-cpu-conf',
598 parent
=> get_standard_option
('pve-snapshot-name', {
600 description
=> "Parent snapshot name. This is used internally, and should not be modified.",
604 description
=> "Timestamp for snapshots.",
610 type
=> 'string', format
=> 'pve-volume-id',
611 description
=> "Reference to a volume which stores the VM state. This is used internally"
614 vmstatestorage
=> get_standard_option
('pve-storage-id', {
615 description
=> "Default storage for VM state volumes/files.",
618 runningmachine
=> get_standard_option
('pve-qemu-machine', {
619 description
=> "Specifies the QEMU machine type of the running vm. This is used internally"
623 description
=> "Specifies the QEMU '-cpu' parameter of the running vm. This is used"
624 ." internally for snapshots.",
627 pattern
=> $PVE::QemuServer
::CPUConfig
::qemu_cmdline_cpu_re
,
628 format_description
=> 'QEMU -cpu parameter'
630 machine
=> get_standard_option
('pve-qemu-machine'),
632 description
=> "Virtual processor architecture. Defaults to the host.",
635 enum
=> [qw(x86_64 aarch64)],
638 description
=> "Specify SMBIOS type 1 fields.",
639 type
=> 'string', format
=> 'pve-qm-smbios1',
646 description
=> "Sets the protection flag of the VM. This will disable the remove VM and"
647 ." remove disk operations.",
653 enum
=> [ qw(seabios ovmf) ],
654 description
=> "Select BIOS implementation.",
655 default => 'seabios',
659 pattern
=> '(?:[a-fA-F0-9]{8}(?:-[a-fA-F0-9]{4}){3}-[a-fA-F0-9]{12}|[01])',
660 format_description
=> 'UUID',
661 description
=> "Set VM Generation ID. Use '1' to autogenerate on create or update, pass '0'"
662 ." to disable explicitly.",
663 verbose_description
=> "The VM generation ID (vmgenid) device exposes a 128-bit integer"
664 ." value identifier to the guest OS. This allows to notify the guest operating system"
665 ." when the virtual machine is executed with a different configuration (e.g. snapshot"
666 ." execution or creation from a template). The guest operating system notices the"
667 ." change, and is then able to react as appropriate by marking its copies of"
668 ." distributed databases as dirty, re-initializing its random number generator, etc.\n"
669 ."Note that auto-creation only works when done through API/CLI create or update methods"
670 .", but not when manually editing the config file.",
671 default => "1 (autogenerated)",
676 format
=> 'pve-volume-id',
678 description
=> "Script that will be executed during various steps in the vms lifetime.",
682 format
=> $ivshmem_fmt,
683 description
=> "Inter-VM shared memory. Useful for direct communication between VMs, or to"
689 format
=> $audio_fmt,
690 description
=> "Configure a audio device, useful in combination with QXL/Spice.",
693 spice_enhancements
=> {
695 format
=> $spice_enhancements_fmt,
696 description
=> "Configure additional enhancements for SPICE.",
700 type
=> 'string', format
=> 'pve-tag-list',
701 description
=> 'Tags of the VM. This is only meta information.',
707 description
=> "Configure a VirtIO-based Random Number Generator.",
712 format
=> $meta_info_fmt,
713 description
=> "Some (read-only) meta-information about this guest.",
722 description
=> 'Specify a custom file containing all meta data passed to the VM via"
723 ." cloud-init. This is provider specific meaning configdrive2 and nocloud differ.',
724 format
=> 'pve-volume-id',
725 format_description
=> 'volume',
730 description
=> 'Specify a custom file containing all network data passed to the VM via'
732 format
=> 'pve-volume-id',
733 format_description
=> 'volume',
738 description
=> 'Specify a custom file containing all user data passed to the VM via'
740 format
=> 'pve-volume-id',
741 format_description
=> 'volume',
746 description
=> 'Specify a custom file containing all vendor data passed to the VM via'
748 format
=> 'pve-volume-id',
749 format_description
=> 'volume',
752 PVE
::JSONSchema
::register_format
('pve-qm-cicustom', $cicustom_fmt);
754 my $confdesc_cloudinit = {
758 description
=> 'Specifies the cloud-init configuration format. The default depends on the'
759 .' configured operating system type (`ostype`. We use the `nocloud` format for Linux,'
760 .' and `configdrive2` for windows.',
761 enum
=> ['configdrive2', 'nocloud', 'opennebula'],
766 description
=> "cloud-init: User name to change ssh keys and password for instead of the"
767 ." image's configured default user.",
772 description
=> 'cloud-init: Password to assign the user. Using this is generally not'
773 .' recommended. Use ssh keys instead. Also note that older cloud-init versions do not'
774 .' support hashed passwords.',
779 description
=> 'cloud-init: Specify custom files to replace the automatically generated'
781 format
=> 'pve-qm-cicustom',
786 description
=> "cloud-init: Sets DNS search domains for a container. Create will'
787 .' automatically use the setting from the host if neither searchdomain nor nameserver'
792 type
=> 'string', format
=> 'address-list',
793 description
=> "cloud-init: Sets DNS server IP address for a container. Create will'
794 .' automatically use the setting from the host if neither searchdomain nor nameserver'
800 format
=> 'urlencoded',
801 description
=> "cloud-init: Setup public SSH keys (one key per line, OpenSSH format).",
805 # what about other qemu settings ?
807 #machine => 'string',
820 ##soundhw => 'string',
822 while (my ($k, $v) = each %$confdesc) {
823 PVE
::JSONSchema
::register_standard_option
("pve-qm-$k", $v);
826 my $MAX_USB_DEVICES = 5;
828 my $MAX_SERIAL_PORTS = 4;
829 my $MAX_PARALLEL_PORTS = 3;
835 pattern
=> qr/\d+(?:-\d+)?(?:;\d+(?:-\d+)?)*/,
836 description
=> "CPUs accessing this NUMA node.",
837 format_description
=> "id[-id];...",
841 description
=> "Amount of memory this NUMA node provides.",
846 pattern
=> qr/\d+(?:-\d+)?(?:;\d+(?:-\d+)?)*/,
847 description
=> "Host NUMA nodes to use.",
848 format_description
=> "id[-id];...",
853 enum
=> [qw(preferred bind interleave)],
854 description
=> "NUMA allocation policy.",
858 PVE
::JSONSchema
::register_format
('pve-qm-numanode', $numa_fmt);
861 type
=> 'string', format
=> $numa_fmt,
862 description
=> "NUMA topology.",
864 PVE
::JSONSchema
::register_standard_option
("pve-qm-numanode", $numadesc);
866 for (my $i = 0; $i < $MAX_NUMA; $i++) {
867 $confdesc->{"numa$i"} = $numadesc;
870 my $nic_model_list = [
886 my $nic_model_list_txt = join(' ', sort @$nic_model_list);
888 my $net_fmt_bridge_descr = <<__EOD__;
889 Bridge to attach the network device to. The Proxmox VE standard bridge
892 If you do not specify a bridge, we create a kvm user (NATed) network
893 device, which provides DHCP and DNS services. The following addresses
900 The DHCP server assign addresses to the guest starting from 10.0.2.15.
904 macaddr
=> get_standard_option
('mac-addr', {
905 description
=> "MAC address. That address must be unique withing your network. This is"
906 ." automatically generated if not specified.",
910 description
=> "Network Card Model. The 'virtio' model provides the best performance with"
911 ." very low CPU overhead. If your guest does not support this driver, it is usually"
912 ." best to use 'e1000'.",
913 enum
=> $nic_model_list,
916 (map { $_ => { keyAlias
=> 'model', alias
=> 'macaddr' }} @$nic_model_list),
917 bridge
=> get_standard_option
('pve-bridge-id', {
918 description
=> $net_fmt_bridge_descr,
923 minimum
=> 0, maximum
=> 16,
924 description
=> 'Number of packet queues to be used on the device.',
930 description
=> "Rate limit in mbps (megabytes per second) as floating point number.",
935 minimum
=> 1, maximum
=> 4094,
936 description
=> 'VLAN tag to apply to packets on this interface.',
941 pattern
=> qr/\d+(?:-\d+)?(?:;\d+(?:-\d+)?)*/,
942 description
=> 'VLAN trunks to pass through this interface.',
943 format_description
=> 'vlanid[;vlanid...]',
948 description
=> 'Whether this interface should be protected by the firewall.',
953 description
=> 'Whether this interface should be disconnected (like pulling the plug).',
958 minimum
=> 1, maximum
=> 65520,
959 description
=> "Force MTU, for VirtIO only. Set to '1' to use the bridge MTU",
966 type
=> 'string', format
=> $net_fmt,
967 description
=> "Specify network devices.",
970 PVE
::JSONSchema
::register_standard_option
("pve-qm-net", $netdesc);
975 format
=> 'pve-ipv4-config',
976 format_description
=> 'IPv4Format/CIDR',
977 description
=> 'IPv4 address in CIDR format.',
984 format_description
=> 'GatewayIPv4',
985 description
=> 'Default gateway for IPv4 traffic.',
991 format
=> 'pve-ipv6-config',
992 format_description
=> 'IPv6Format/CIDR',
993 description
=> 'IPv6 address in CIDR format.',
1000 format_description
=> 'GatewayIPv6',
1001 description
=> 'Default gateway for IPv6 traffic.',
1006 PVE
::JSONSchema
::register_format
('pve-qm-ipconfig', $ipconfig_fmt);
1007 my $ipconfigdesc = {
1009 type
=> 'string', format
=> 'pve-qm-ipconfig',
1010 description
=> <<'EODESCR',
1011 cloud-init: Specify IP addresses and gateways for the corresponding interface.
1013 IP addresses use CIDR notation, gateways are optional but need an IP of the same type specified.
1015 The special string 'dhcp' can be used for IP addresses to use DHCP, in which case no explicit
1016 gateway should be provided.
1017 For IPv6 the special string 'auto' can be used to use stateless autoconfiguration. This requires
1018 cloud-init 19.4 or newer.
1020 If cloud-init is enabled and neither an IPv4 nor an IPv6 address is specified, it defaults to using
1024 PVE
::JSONSchema
::register_standard_option
("pve-qm-ipconfig", $netdesc);
1026 for (my $i = 0; $i < $MAX_NETS; $i++) {
1027 $confdesc->{"net$i"} = $netdesc;
1028 $confdesc_cloudinit->{"ipconfig$i"} = $ipconfigdesc;
1031 foreach my $key (keys %$confdesc_cloudinit) {
1032 $confdesc->{$key} = $confdesc_cloudinit->{$key};
1035 PVE
::JSONSchema
::register_format
('pve-volume-id-or-qm-path', \
&verify_volume_id_or_qm_path
);
1036 sub verify_volume_id_or_qm_path
{
1037 my ($volid, $noerr) = @_;
1039 return $volid if $volid eq 'none' || $volid eq 'cdrom';
1041 return verify_volume_id_or_absolute_path
($volid, $noerr);
1044 PVE
::JSONSchema
::register_format
('pve-volume-id-or-absolute-path', \
&verify_volume_id_or_absolute_path
);
1045 sub verify_volume_id_or_absolute_path
{
1046 my ($volid, $noerr) = @_;
1048 return $volid if $volid =~ m
|^/|;
1050 $volid = eval { PVE
::JSONSchema
::check_format
('pve-volume-id', $volid, '') };
1061 type
=> 'string', format
=> 'pve-qm-usb-device',
1062 format_description
=> 'HOSTUSBDEVICE|spice',
1063 description
=> <<EODESCR,
1064 The Host USB device or port or the value 'spice'. HOSTUSBDEVICE syntax is:
1066 'bus-port(.port)*' (decimal numbers) or
1067 'vendor_id:product_id' (hexadeciaml numbers) or
1070 You can use the 'lsusb -t' command to list existing usb devices.
1072 NOTE: This option allows direct access to host hardware. So it is no longer possible to migrate such
1073 machines - use with special care.
1075 The value 'spice' can be used to add a usb redirection devices for spice.
1081 description
=> "Specifies whether if given host option is a USB3 device or port.",
1088 type
=> 'string', format
=> $usb_fmt,
1089 description
=> "Configure an USB device (n is 0 to 4).",
1091 PVE
::JSONSchema
::register_standard_option
("pve-qm-usb", $usbdesc);
1096 pattern
=> '(/dev/.+|socket)',
1097 description
=> "Create a serial device inside the VM (n is 0 to 3)",
1098 verbose_description
=> <<EODESCR,
1099 Create a serial device inside the VM (n is 0 to 3), and pass through a
1100 host serial device (i.e. /dev/ttyS0), or create a unix socket on the
1101 host side (use 'qm terminal' to open a terminal connection).
1103 NOTE: If you pass through a host serial device, it is no longer possible to migrate such machines -
1104 use with special care.
1106 CAUTION: Experimental! User reported problems with this option.
1113 pattern
=> '/dev/parport\d+|/dev/usb/lp\d+',
1114 description
=> "Map host parallel devices (n is 0 to 2).",
1115 verbose_description
=> <<EODESCR,
1116 Map host parallel devices (n is 0 to 2).
1118 NOTE: This option allows direct access to host hardware. So it is no longer possible to migrate such
1119 machines - use with special care.
1121 CAUTION: Experimental! User reported problems with this option.
1125 for (my $i = 0; $i < $MAX_PARALLEL_PORTS; $i++) {
1126 $confdesc->{"parallel$i"} = $paralleldesc;
1129 for (my $i = 0; $i < $MAX_SERIAL_PORTS; $i++) {
1130 $confdesc->{"serial$i"} = $serialdesc;
1133 for (my $i = 0; $i < $PVE::QemuServer
::PCI
::MAX_HOSTPCI_DEVICES
; $i++) {
1134 $confdesc->{"hostpci$i"} = $PVE::QemuServer
::PCI
::hostpcidesc
;
1137 for my $key (keys %{$PVE::QemuServer
::Drive
::drivedesc_hash
}) {
1138 $confdesc->{$key} = $PVE::QemuServer
::Drive
::drivedesc_hash-
>{$key};
1141 for (my $i = 0; $i < $MAX_USB_DEVICES; $i++) {
1142 $confdesc->{"usb$i"} = $usbdesc;
1150 description
=> "Boot on floppy (a), hard disk (c), CD-ROM (d), or network (n)."
1151 . " Deprecated, use 'order=' instead.",
1152 pattern
=> '[acdn]{1,4}',
1153 format_description
=> "[acdn]{1,4}",
1155 # note: this is also the fallback if boot: is not given at all
1161 format
=> 'pve-qm-bootdev-list',
1162 format_description
=> "device[;device...]",
1163 description
=> <<EODESC,
1164 The guest will attempt to boot from devices in the order they appear here.
1166 Disks, optical drives and passed-through storage USB devices will be directly
1167 booted from, NICs will load PXE, and PCIe devices will either behave like disks
1168 (e.g. NVMe) or load an option ROM (e.g. RAID controller, hardware NIC).
1170 Note that only devices in this list will be marked as bootable and thus loaded
1171 by the guest firmware (BIOS/UEFI). If you require multiple disks for booting
1172 (e.g. software-raid), you need to specify all of them here.
1174 Overrides the deprecated 'legacy=[acdn]*' value when given.
1178 PVE
::JSONSchema
::register_format
('pve-qm-boot', $boot_fmt);
1180 PVE
::JSONSchema
::register_format
('pve-qm-bootdev', \
&verify_bootdev
);
1181 sub verify_bootdev
{
1182 my ($dev, $noerr) = @_;
1184 my $special = $dev =~ m/^efidisk/ || $dev =~ m/^tpmstate/;
1185 return $dev if PVE
::QemuServer
::Drive
::is_valid_drivename
($dev) && !$special;
1189 return 0 if $dev !~ m/^$base\d+$/;
1190 return 0 if !$confdesc->{$dev};
1194 return $dev if $check->("net");
1195 return $dev if $check->("usb");
1196 return $dev if $check->("hostpci");
1199 die "invalid boot device '$dev'\n";
1202 sub print_bootorder
{
1204 return "" if !@$devs;
1205 my $data = { order
=> join(';', @$devs) };
1206 return PVE
::JSONSchema
::print_property_string
($data, $boot_fmt);
1209 my $kvm_api_version = 0;
1212 return $kvm_api_version if $kvm_api_version;
1214 open my $fh, '<', '/dev/kvm' or return;
1216 # 0xae00 => KVM_GET_API_VERSION
1217 $kvm_api_version = ioctl($fh, 0xae00, 0);
1220 return $kvm_api_version;
1223 my $kvm_user_version = {};
1226 sub kvm_user_version
{
1229 $binary //= get_command_for_arch
(get_host_arch
()); # get the native arch by default
1230 my $st = stat($binary);
1232 my $cachedmtime = $kvm_mtime->{$binary} // -1;
1233 return $kvm_user_version->{$binary} if $kvm_user_version->{$binary} &&
1234 $cachedmtime == $st->mtime;
1236 $kvm_user_version->{$binary} = 'unknown';
1237 $kvm_mtime->{$binary} = $st->mtime;
1241 if ($line =~ m/^QEMU( PC)? emulator version (\d+\.\d+(\.\d+)?)(\.\d+)?[,\s]/) {
1242 $kvm_user_version->{$binary} = $2;
1246 eval { run_command
([$binary, '--version'], outfunc
=> $code); };
1249 return $kvm_user_version->{$binary};
1252 my sub extract_version
{
1253 my ($machine_type, $version) = @_;
1254 $version = kvm_user_version
() if !defined($version);
1255 return PVE
::QemuServer
::Machine
::extract_version
($machine_type, $version)
1258 sub kernel_has_vhost_net
{
1259 return -c
'/dev/vhost-net';
1264 return defined($confdesc->{$key});
1268 sub get_cdrom_path
{
1270 return $cdrom_path if $cdrom_path;
1272 return $cdrom_path = "/dev/cdrom" if -l
"/dev/cdrom";
1273 return $cdrom_path = "/dev/cdrom1" if -l
"/dev/cdrom1";
1274 return $cdrom_path = "/dev/cdrom2" if -l
"/dev/cdrom2";
1278 my ($storecfg, $vmid, $cdrom) = @_;
1280 if ($cdrom eq 'cdrom') {
1281 return get_cdrom_path
();
1282 } elsif ($cdrom eq 'none') {
1284 } elsif ($cdrom =~ m
|^/|) {
1287 return PVE
::Storage
::path
($storecfg, $cdrom);
1291 # try to convert old style file names to volume IDs
1292 sub filename_to_volume_id
{
1293 my ($vmid, $file, $media) = @_;
1295 if (!($file eq 'none' || $file eq 'cdrom' ||
1296 $file =~ m
|^/dev/.+| || $file =~ m/^([^:]+):(.+)$/)) {
1298 return if $file =~ m
|/|;
1300 if ($media && $media eq 'cdrom') {
1301 $file = "local:iso/$file";
1303 $file = "local:$vmid/$file";
1310 sub verify_media_type
{
1311 my ($opt, $vtype, $media) = @_;
1316 if ($media eq 'disk') {
1318 } elsif ($media eq 'cdrom') {
1321 die "internal error";
1324 return if ($vtype eq $etype);
1326 raise_param_exc
({ $opt => "unexpected media type ($vtype != $etype)" });
1329 sub cleanup_drive_path
{
1330 my ($opt, $storecfg, $drive) = @_;
1332 # try to convert filesystem paths to volume IDs
1334 if (($drive->{file
} !~ m/^(cdrom|none)$/) &&
1335 ($drive->{file
} !~ m
|^/dev/.+|) &&
1336 ($drive->{file
} !~ m/^([^:]+):(.+)$/) &&
1337 ($drive->{file
} !~ m/^\d+$/)) {
1338 my ($vtype, $volid) = PVE
::Storage
::path_to_volume_id
($storecfg, $drive->{file
});
1339 raise_param_exc
({ $opt => "unable to associate path '$drive->{file}' to any storage"})
1341 $drive->{media
} = 'cdrom' if !$drive->{media
} && $vtype eq 'iso';
1342 verify_media_type
($opt, $vtype, $drive->{media
});
1343 $drive->{file
} = $volid;
1346 $drive->{media
} = 'cdrom' if !$drive->{media
} && $drive->{file
} =~ m/^(cdrom|none)$/;
1349 sub parse_hotplug_features
{
1354 return $res if $data eq '0';
1356 $data = $confdesc->{hotplug
}->{default} if $data eq '1';
1358 foreach my $feature (PVE
::Tools
::split_list
($data)) {
1359 if ($feature =~ m/^(network|disk|cpu|memory|usb)$/) {
1362 die "invalid hotplug feature '$feature'\n";
1368 PVE
::JSONSchema
::register_format
('pve-hotplug-features', \
&pve_verify_hotplug_features
);
1369 sub pve_verify_hotplug_features
{
1370 my ($value, $noerr) = @_;
1372 return $value if parse_hotplug_features
($value);
1376 die "unable to parse hotplug option\n";
1380 my($fh, $noerr) = @_;
1383 my $SG_GET_VERSION_NUM = 0x2282;
1385 my $versionbuf = "\x00" x
8;
1386 my $ret = ioctl($fh, $SG_GET_VERSION_NUM, $versionbuf);
1388 die "scsi ioctl SG_GET_VERSION_NUM failoed - $!\n" if !$noerr;
1391 my $version = unpack("I", $versionbuf);
1392 if ($version < 30000) {
1393 die "scsi generic interface too old\n" if !$noerr;
1397 my $buf = "\x00" x
36;
1398 my $sensebuf = "\x00" x
8;
1399 my $cmd = pack("C x3 C x1", 0x12, 36);
1401 # see /usr/include/scsi/sg.h
1402 my $sg_io_hdr_t = "i i C C s I P P P I I i P C C C C S S i I I";
1405 $sg_io_hdr_t, ord('S'), -3, length($cmd), length($sensebuf), 0, length($buf), $buf, $cmd, $sensebuf, 6000
1408 $ret = ioctl($fh, $SG_IO, $packet);
1410 die "scsi ioctl SG_IO failed - $!\n" if !$noerr;
1414 my @res = unpack($sg_io_hdr_t, $packet);
1415 if ($res[17] || $res[18]) {
1416 die "scsi ioctl SG_IO status error - $!\n" if !$noerr;
1421 $res->@{qw(type removable vendor product revision)} = unpack("C C x6 A8 A16 A4", $buf);
1423 $res->{removable
} = $res->{removable
} & 128 ?
1 : 0;
1424 $res->{type
} &= 0x1F;
1432 my $fh = IO
::File-
>new("+<$path") || return;
1433 my $res = scsi_inquiry
($fh, 1);
1439 sub print_tabletdevice_full
{
1440 my ($conf, $arch) = @_;
1442 my $q35 = PVE
::QemuServer
::Machine
::machine_type_is_q35
($conf);
1444 # we use uhci for old VMs because tablet driver was buggy in older qemu
1446 if (PVE
::QemuServer
::Machine
::machine_type_is_q35
($conf) || $arch eq 'aarch64') {
1452 return "usb-tablet,id=tablet,bus=$usbbus.0,port=1";
1455 sub print_keyboarddevice_full
{
1456 my ($conf, $arch) = @_;
1458 return if $arch ne 'aarch64';
1460 return "usb-kbd,id=keyboard,bus=ehci.0,port=2";
1463 my sub get_drive_id
{
1465 return "$drive->{interface}$drive->{index}";
1468 sub print_drivedevice_full
{
1469 my ($storecfg, $conf, $vmid, $drive, $bridges, $arch, $machine_type) = @_;
1474 my $drive_id = get_drive_id
($drive);
1475 if ($drive->{interface
} eq 'virtio') {
1476 my $pciaddr = print_pci_addr
("$drive_id", $bridges, $arch, $machine_type);
1477 $device = "virtio-blk-pci,drive=drive-$drive_id,id=${drive_id}${pciaddr}";
1478 $device .= ",iothread=iothread-$drive_id" if $drive->{iothread
};
1479 } elsif ($drive->{interface
} eq 'scsi') {
1481 my ($maxdev, $controller, $controller_prefix) = scsihw_infos
($conf, $drive);
1482 my $unit = $drive->{index} % $maxdev;
1483 my $devicetype = 'hd';
1485 if (drive_is_cdrom
($drive)) {
1488 if ($drive->{file
} =~ m
|^/|) {
1489 $path = $drive->{file
};
1490 if (my $info = path_is_scsi
($path)) {
1491 if ($info->{type
} == 0 && $drive->{scsiblock
}) {
1492 $devicetype = 'block';
1493 } elsif ($info->{type
} == 1) { # tape
1494 $devicetype = 'generic';
1498 $path = PVE
::Storage
::path
($storecfg, $drive->{file
});
1501 # for compatibility only, we prefer scsi-hd (#2408, #2355, #2380)
1502 my $version = extract_version
($machine_type, kvm_user_version
());
1503 if ($path =~ m/^iscsi\:\/\
// &&
1504 !min_version
($version, 4, 1)) {
1505 $devicetype = 'generic';
1509 if (!$conf->{scsihw
} || $conf->{scsihw
} =~ m/^lsi/ || $conf->{scsihw
} eq 'pvscsi') {
1510 $device = "scsi-$devicetype,bus=$controller_prefix$controller.0,scsi-id=$unit";
1512 $device = "scsi-$devicetype,bus=$controller_prefix$controller.0,channel=0,scsi-id=0"
1513 .",lun=$drive->{index}";
1515 $device .= ",drive=drive-$drive_id,id=$drive_id";
1517 if ($drive->{ssd
} && ($devicetype eq 'block' || $devicetype eq 'hd')) {
1518 $device .= ",rotation_rate=1";
1520 $device .= ",wwn=$drive->{wwn}" if $drive->{wwn
};
1522 } elsif ($drive->{interface
} eq 'ide' || $drive->{interface
} eq 'sata') {
1523 my $maxdev = ($drive->{interface
} eq 'sata') ?
$PVE::QemuServer
::Drive
::MAX_SATA_DISKS
: 2;
1524 my $controller = int($drive->{index} / $maxdev);
1525 my $unit = $drive->{index} % $maxdev;
1526 my $devicetype = ($drive->{media
} && $drive->{media
} eq 'cdrom') ?
"cd" : "hd";
1528 $device = "ide-$devicetype";
1529 if ($drive->{interface
} eq 'ide') {
1530 $device .= ",bus=ide.$controller,unit=$unit";
1532 $device .= ",bus=ahci$controller.$unit";
1534 $device .= ",drive=drive-$drive_id,id=$drive_id";
1536 if ($devicetype eq 'hd') {
1537 if (my $model = $drive->{model
}) {
1538 $model = URI
::Escape
::uri_unescape
($model);
1539 $device .= ",model=$model";
1541 if ($drive->{ssd
}) {
1542 $device .= ",rotation_rate=1";
1545 $device .= ",wwn=$drive->{wwn}" if $drive->{wwn
};
1546 } elsif ($drive->{interface
} eq 'usb') {
1548 # -device ide-drive,bus=ide.1,unit=0,drive=drive-ide0-1-0,id=ide0-1-0
1550 die "unsupported interface type";
1553 $device .= ",bootindex=$drive->{bootindex}" if $drive->{bootindex
};
1555 if (my $serial = $drive->{serial
}) {
1556 $serial = URI
::Escape
::uri_unescape
($serial);
1557 $device .= ",serial=$serial";
1564 sub get_initiator_name
{
1567 my $fh = IO
::File-
>new('/etc/iscsi/initiatorname.iscsi') || return;
1568 while (defined(my $line = <$fh>)) {
1569 next if $line !~ m/^\s*InitiatorName\s*=\s*([\.\-:\w]+)/;
1578 sub print_drive_commandline_full
{
1579 my ($storecfg, $vmid, $drive, $pbs_name, $io_uring) = @_;
1582 my $volid = $drive->{file
};
1583 my $format = $drive->{format
};
1584 my $drive_id = get_drive_id
($drive);
1586 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($volid, 1);
1587 my $scfg = $storeid ? PVE
::Storage
::storage_config
($storecfg, $storeid) : undef;
1589 if (drive_is_cdrom
($drive)) {
1590 $path = get_iso_path
($storecfg, $vmid, $volid);
1591 die "$drive_id: cannot back cdrom drive with PBS snapshot\n" if $pbs_name;
1594 $path = PVE
::Storage
::path
($storecfg, $volid);
1595 $format //= qemu_img_format
($scfg, $volname);
1602 my $is_rbd = $path =~ m/^rbd:/;
1605 my @qemu_drive_options = qw(heads secs cyls trans media cache rerror werror aio discard);
1606 foreach my $o (@qemu_drive_options) {
1607 $opts .= ",$o=$drive->{$o}" if defined($drive->{$o});
1610 # snapshot only accepts on|off
1611 if (defined($drive->{snapshot
})) {
1612 my $v = $drive->{snapshot
} ?
'on' : 'off';
1613 $opts .= ",snapshot=$v";
1616 if (defined($drive->{ro
})) { # ro maps to QEMUs `readonly`, which accepts `on` or `off` only
1617 $opts .= ",readonly=" . ($drive->{ro
} ?
'on' : 'off');
1620 foreach my $type (['', '-total'], [_rd
=> '-read'], [_wr
=> '-write']) {
1621 my ($dir, $qmpname) = @$type;
1622 if (my $v = $drive->{"mbps$dir"}) {
1623 $opts .= ",throttling.bps$qmpname=".int($v*1024*1024);
1625 if (my $v = $drive->{"mbps${dir}_max"}) {
1626 $opts .= ",throttling.bps$qmpname-max=".int($v*1024*1024);
1628 if (my $v = $drive->{"bps${dir}_max_length"}) {
1629 $opts .= ",throttling.bps$qmpname-max-length=$v";
1631 if (my $v = $drive->{"iops${dir}"}) {
1632 $opts .= ",throttling.iops$qmpname=$v";
1634 if (my $v = $drive->{"iops${dir}_max"}) {
1635 $opts .= ",throttling.iops$qmpname-max=$v";
1637 if (my $v = $drive->{"iops${dir}_max_length"}) {
1638 $opts .= ",throttling.iops$qmpname-max-length=$v";
1643 $format = "rbd" if $is_rbd;
1644 die "$drive_id: Proxmox Backup Server backed drive cannot auto-detect the format\n"
1646 $opts .= ",format=alloc-track,file.driver=$format";
1648 $opts .= ",format=$format";
1651 my $cache_direct = 0;
1653 if (my $cache = $drive->{cache
}) {
1654 $cache_direct = $cache =~ /^(?:off|none|directsync)$/;
1655 } elsif (!drive_is_cdrom
($drive) && !($scfg && $scfg->{type
} eq 'btrfs' && !$scfg->{nocow
})) {
1656 $opts .= ",cache=none";
1660 # io_uring with cache mode writeback or writethrough on krbd will hang...
1661 my $rbd_no_io_uring = $scfg && $scfg->{type
} eq 'rbd' && $scfg->{krbd
} && !$cache_direct;
1663 # io_uring with cache mode writeback or writethrough on LVM will hang, without cache only
1664 # sometimes, just plain disable...
1665 my $lvm_no_io_uring = $scfg && $scfg->{type
} eq 'lvm';
1667 if (!$drive->{aio
}) {
1668 if ($io_uring && !$rbd_no_io_uring && !$lvm_no_io_uring) {
1669 # io_uring supports all cache modes
1670 $opts .= ",aio=io_uring";
1672 # aio native works only with O_DIRECT
1674 $opts .= ",aio=native";
1676 $opts .= ",aio=threads";
1681 if (!drive_is_cdrom
($drive)) {
1683 if (defined($drive->{detect_zeroes
}) && !$drive->{detect_zeroes
}) {
1684 $detectzeroes = 'off';
1685 } elsif ($drive->{discard
}) {
1686 $detectzeroes = $drive->{discard
} eq 'on' ?
'unmap' : 'on';
1688 # This used to be our default with discard not being specified:
1689 $detectzeroes = 'on';
1692 # note: 'detect-zeroes' works per blockdev and we want it to persist
1693 # after the alloc-track is removed, so put it on 'file' directly
1694 my $dz_param = $pbs_name ?
"file.detect-zeroes" : "detect-zeroes";
1695 $opts .= ",$dz_param=$detectzeroes" if $detectzeroes;
1699 $opts .= ",backing=$pbs_name";
1700 $opts .= ",auto-remove=on";
1703 # my $file_param = $pbs_name ? "file.file.filename" : "file";
1704 my $file_param = "file";
1706 # non-rbd drivers require the underlying file to be a seperate block
1707 # node, so add a second .file indirection
1708 $file_param .= ".file" if !$is_rbd;
1709 $file_param .= ".filename";
1711 my $pathinfo = $path ?
"$file_param=$path," : '';
1713 return "${pathinfo}if=none,id=drive-$drive->{interface}$drive->{index}$opts";
1716 sub print_pbs_blockdev
{
1717 my ($pbs_conf, $pbs_name) = @_;
1718 my $blockdev = "driver=pbs,node-name=$pbs_name,read-only=on";
1719 $blockdev .= ",repository=$pbs_conf->{repository}";
1720 $blockdev .= ",snapshot=$pbs_conf->{snapshot}";
1721 $blockdev .= ",archive=$pbs_conf->{archive}";
1722 $blockdev .= ",keyfile=$pbs_conf->{keyfile}" if $pbs_conf->{keyfile
};
1726 sub print_netdevice_full
{
1727 my ($vmid, $conf, $net, $netid, $bridges, $use_old_bios_files, $arch, $machine_type) = @_;
1729 my $device = $net->{model
};
1730 if ($net->{model
} eq 'virtio') {
1731 $device = 'virtio-net-pci';
1734 my $pciaddr = print_pci_addr
("$netid", $bridges, $arch, $machine_type);
1735 my $tmpstr = "$device,mac=$net->{macaddr},netdev=$netid$pciaddr,id=$netid";
1736 if ($net->{queues
} && $net->{queues
} > 1 && $net->{model
} eq 'virtio'){
1737 # Consider we have N queues, the number of vectors needed is 2 * N + 2, i.e., one per in
1738 # and out of each queue plus one config interrupt and control vector queue
1739 my $vectors = $net->{queues
} * 2 + 2;
1740 $tmpstr .= ",vectors=$vectors,mq=on";
1742 $tmpstr .= ",bootindex=$net->{bootindex}" if $net->{bootindex
} ;
1744 if (my $mtu = $net->{mtu
}) {
1745 if ($net->{model
} eq 'virtio' && $net->{bridge
}) {
1746 my $bridge_mtu = PVE
::Network
::read_bridge_mtu
($net->{bridge
});
1749 } elsif ($mtu < 576) {
1750 die "netdev $netid: MTU '$mtu' is smaller than the IP minimum MTU '576'\n";
1751 } elsif ($mtu > $bridge_mtu) {
1752 die "netdev $netid: MTU '$mtu' is bigger than the bridge MTU '$bridge_mtu'\n";
1754 $tmpstr .= ",host_mtu=$mtu";
1756 warn "WARN: netdev $netid: ignoring MTU '$mtu', not using VirtIO or no bridge configured.\n";
1760 if ($use_old_bios_files) {
1762 if ($device eq 'virtio-net-pci') {
1763 $romfile = 'pxe-virtio.rom';
1764 } elsif ($device eq 'e1000') {
1765 $romfile = 'pxe-e1000.rom';
1766 } elsif ($device eq 'e1000e') {
1767 $romfile = 'pxe-e1000e.rom';
1768 } elsif ($device eq 'ne2k') {
1769 $romfile = 'pxe-ne2k_pci.rom';
1770 } elsif ($device eq 'pcnet') {
1771 $romfile = 'pxe-pcnet.rom';
1772 } elsif ($device eq 'rtl8139') {
1773 $romfile = 'pxe-rtl8139.rom';
1775 $tmpstr .= ",romfile=$romfile" if $romfile;
1781 sub print_netdev_full
{
1782 my ($vmid, $conf, $arch, $net, $netid, $hotplug) = @_;
1785 if ($netid =~ m/^net(\d+)$/) {
1789 die "got strange net id '$i'\n" if $i >= ${MAX_NETS
};
1791 my $ifname = "tap${vmid}i$i";
1793 # kvm uses TUNSETIFF ioctl, and that limits ifname length
1794 die "interface name '$ifname' is too long (max 15 character)\n"
1795 if length($ifname) >= 16;
1797 my $vhostparam = '';
1798 if (is_native
($arch)) {
1799 $vhostparam = ',vhost=on' if kernel_has_vhost_net
() && $net->{model
} eq 'virtio';
1802 my $vmname = $conf->{name
} || "vm$vmid";
1805 my $script = $hotplug ?
"pve-bridge-hotplug" : "pve-bridge";
1807 if ($net->{bridge
}) {
1808 $netdev = "type=tap,id=$netid,ifname=${ifname},script=/var/lib/qemu-server/$script"
1809 .",downscript=/var/lib/qemu-server/pve-bridgedown$vhostparam";
1811 $netdev = "type=user,id=$netid,hostname=$vmname";
1814 $netdev .= ",queues=$net->{queues}" if ($net->{queues
} && $net->{model
} eq 'virtio');
1820 'cirrus' => 'cirrus-vga',
1822 'vmware' => 'vmware-svga',
1823 'virtio' => 'virtio-vga',
1826 sub print_vga_device
{
1827 my ($conf, $vga, $arch, $machine_version, $machine, $id, $qxlnum, $bridges) = @_;
1829 my $type = $vga_map->{$vga->{type
}};
1830 if ($arch eq 'aarch64' && defined($type) && $type eq 'virtio-vga') {
1831 $type = 'virtio-gpu';
1833 my $vgamem_mb = $vga->{memory
};
1835 my $max_outputs = '';
1837 $type = $id ?
'qxl' : 'qxl-vga';
1839 if (!$conf->{ostype
} || $conf->{ostype
} =~ m/^(?:l\d\d)|(?:other)$/) {
1840 # set max outputs so linux can have up to 4 qxl displays with one device
1841 if (min_version
($machine_version, 4, 1)) {
1842 $max_outputs = ",max_outputs=4";
1847 die "no devicetype for $vga->{type}\n" if !$type;
1851 if ($vga->{type
} eq 'virtio') {
1852 my $bytes = PVE
::Tools
::convert_size
($vgamem_mb, "mb" => "b");
1853 $memory = ",max_hostmem=$bytes";
1855 # from https://www.spice-space.org/multiple-monitors.html
1856 $memory = ",vgamem_mb=$vga->{memory}";
1857 my $ram = $vgamem_mb * 4;
1858 my $vram = $vgamem_mb * 2;
1859 $memory .= ",ram_size_mb=$ram,vram_size_mb=$vram";
1861 $memory = ",vgamem_mb=$vga->{memory}";
1863 } elsif ($qxlnum && $id) {
1864 $memory = ",ram_size=67108864,vram_size=33554432";
1868 if ($type eq 'VGA' && windows_version
($conf->{ostype
})) {
1869 $edidoff=",edid=off" if (!defined($conf->{bios
}) || $conf->{bios
} ne 'ovmf');
1872 my $q35 = PVE
::QemuServer
::Machine
::machine_type_is_q35
($conf);
1873 my $vgaid = "vga" . ($id // '');
1875 if ($q35 && $vgaid eq 'vga') {
1876 # the first display uses pcie.0 bus on q35 machines
1877 $pciaddr = print_pcie_addr
($vgaid, $bridges, $arch, $machine);
1879 $pciaddr = print_pci_addr
($vgaid, $bridges, $arch, $machine);
1882 return "$type,id=${vgaid}${memory}${max_outputs}${pciaddr}${edidoff}";
1885 sub parse_number_sets
{
1888 foreach my $part (split(/;/, $set)) {
1889 if ($part =~ /^\s*(\d+)(?:-(\d+))?\s*$/) {
1890 die "invalid range: $part ($2 < $1)\n" if defined($2) && $2 < $1;
1891 push @$res, [ $1, $2 ];
1893 die "invalid range: $part\n";
1902 my $res = parse_property_string
($numa_fmt, $data);
1903 $res->{cpus
} = parse_number_sets
($res->{cpus
}) if defined($res->{cpus
});
1904 $res->{hostnodes
} = parse_number_sets
($res->{hostnodes
}) if defined($res->{hostnodes
});
1908 # netX: e1000=XX:XX:XX:XX:XX:XX,bridge=vmbr0,rate=<mbps>
1912 my $res = eval { parse_property_string
($net_fmt, $data) };
1917 if (!defined($res->{macaddr
})) {
1918 my $dc = PVE
::Cluster
::cfs_read_file
('datacenter.cfg');
1919 $res->{macaddr
} = PVE
::Tools
::random_ether_addr
($dc->{mac_prefix
});
1924 # ipconfigX ip=cidr,gw=ip,ip6=cidr,gw6=ip
1925 sub parse_ipconfig
{
1928 my $res = eval { parse_property_string
($ipconfig_fmt, $data) };
1934 if ($res->{gw
} && !$res->{ip
}) {
1935 warn 'gateway specified without specifying an IP address';
1938 if ($res->{gw6
} && !$res->{ip6
}) {
1939 warn 'IPv6 gateway specified without specifying an IPv6 address';
1942 if ($res->{gw
} && $res->{ip
} eq 'dhcp') {
1943 warn 'gateway specified together with DHCP';
1946 if ($res->{gw6
} && $res->{ip6
} !~ /^$IPV6RE/) {
1948 warn "IPv6 gateway specified together with $res->{ip6} address";
1952 if (!$res->{ip
} && !$res->{ip6
}) {
1953 return { ip
=> 'dhcp', ip6
=> 'dhcp' };
1962 return PVE
::JSONSchema
::print_property_string
($net, $net_fmt);
1965 sub add_random_macs
{
1966 my ($settings) = @_;
1968 foreach my $opt (keys %$settings) {
1969 next if $opt !~ m/^net(\d+)$/;
1970 my $net = parse_net
($settings->{$opt});
1972 $settings->{$opt} = print_net
($net);
1976 sub vm_is_volid_owner
{
1977 my ($storecfg, $vmid, $volid) = @_;
1979 if ($volid !~ m
|^/|) {
1981 eval { ($path, $owner) = PVE
::Storage
::path
($storecfg, $volid); };
1982 if ($owner && ($owner == $vmid)) {
1990 sub vmconfig_register_unused_drive
{
1991 my ($storecfg, $vmid, $conf, $drive) = @_;
1993 if (drive_is_cloudinit
($drive)) {
1994 eval { PVE
::Storage
::vdisk_free
($storecfg, $drive->{file
}) };
1996 } elsif (!drive_is_cdrom
($drive)) {
1997 my $volid = $drive->{file
};
1998 if (vm_is_volid_owner
($storecfg, $vmid, $volid)) {
1999 PVE
::QemuConfig-
>add_unused_volume($conf, $volid, $vmid);
2004 # smbios: [manufacturer=str][,product=str][,version=str][,serial=str][,uuid=uuid][,sku=str][,family=str][,base64=bool]
2008 pattern
=> '[a-fA-F0-9]{8}(?:-[a-fA-F0-9]{4}){3}-[a-fA-F0-9]{12}',
2009 format_description
=> 'UUID',
2010 description
=> "Set SMBIOS1 UUID.",
2015 pattern
=> '[A-Za-z0-9+\/]+={0,2}',
2016 format_description
=> 'Base64 encoded string',
2017 description
=> "Set SMBIOS1 version.",
2022 pattern
=> '[A-Za-z0-9+\/]+={0,2}',
2023 format_description
=> 'Base64 encoded string',
2024 description
=> "Set SMBIOS1 serial number.",
2029 pattern
=> '[A-Za-z0-9+\/]+={0,2}',
2030 format_description
=> 'Base64 encoded string',
2031 description
=> "Set SMBIOS1 manufacturer.",
2036 pattern
=> '[A-Za-z0-9+\/]+={0,2}',
2037 format_description
=> 'Base64 encoded string',
2038 description
=> "Set SMBIOS1 product ID.",
2043 pattern
=> '[A-Za-z0-9+\/]+={0,2}',
2044 format_description
=> 'Base64 encoded string',
2045 description
=> "Set SMBIOS1 SKU string.",
2050 pattern
=> '[A-Za-z0-9+\/]+={0,2}',
2051 format_description
=> 'Base64 encoded string',
2052 description
=> "Set SMBIOS1 family string.",
2057 description
=> 'Flag to indicate that the SMBIOS values are base64 encoded',
2065 my $res = eval { parse_property_string
($smbios1_fmt, $data) };
2072 return PVE
::JSONSchema
::print_property_string
($smbios1, $smbios1_fmt);
2075 PVE
::JSONSchema
::register_format
('pve-qm-smbios1', $smbios1_fmt);
2077 sub parse_watchdog
{
2082 my $res = eval { parse_property_string
($watchdog_fmt, $value) };
2087 sub parse_guest_agent
{
2090 return {} if !defined($conf->{agent
});
2092 my $res = eval { parse_property_string
($agent_fmt, $conf->{agent
}) };
2095 # if the agent is disabled ignore the other potentially set properties
2096 return {} if !$res->{enabled
};
2101 my ($conf, $key) = @_;
2102 return undef if !defined($conf->{agent
});
2104 my $agent = parse_guest_agent
($conf);
2105 return $agent->{$key};
2111 return {} if !$value;
2112 my $res = eval { parse_property_string
($vga_fmt, $value) };
2122 my $res = eval { parse_property_string
($rng_fmt, $value) };
2127 sub parse_meta_info
{
2132 my $res = eval { parse_property_string
($meta_info_fmt, $value) };
2137 sub new_meta_info_string
{
2138 my () = @_; # for now do not allow to override any value
2140 return PVE
::JSONSchema
::print_property_string
(
2142 'creation-qemu' => kvm_user_version
(),
2143 ctime
=> "". int(time()),
2149 sub qemu_created_version_fixups
{
2150 my ($conf, $forcemachine, $kvmver) = @_;
2152 my $meta = parse_meta_info
($conf->{meta
}) // {};
2153 my $forced_vers = PVE
::QemuServer
::Machine
::extract_version
($forcemachine);
2155 # check if we need to apply some handling for VMs that always use the latest machine version but
2156 # had a machine version transition happen that affected HW such that, e.g., an OS config change
2157 # would be required (we do not want to pin machine version for non-windows OS type)
2159 (!defined($conf->{machine
}) || $conf->{machine
} =~ m/^(?:pc|q35|virt)$/) # non-versioned machine
2160 && (!defined($meta->{'creation-qemu'}) || !min_version
($meta->{'creation-qemu'}, 6, 1)) # created before 6.1
2161 && (!$forced_vers || min_version
($forced_vers, 6, 1)) # handle snapshot-rollback/migrations
2162 && min_version
($kvmver, 6, 1) # only need to apply the change since 6.1
2164 my $q35 = PVE
::QemuServer
::Machine
::machine_type_is_q35
($conf);
2165 if ($q35 && $conf->{ostype
} && $conf->{ostype
} eq 'l26') {
2166 # this changed to default-on in Q 6.1 for q35 machines, it will mess with PCI slot view
2167 # and thus with the predictable interface naming of systemd
2168 return ['-global', 'ICH9-LPC.acpi-pci-hotplug-with-bridge-support=off'];
2174 PVE
::JSONSchema
::register_format
('pve-qm-usb-device', \
&verify_usb_device
);
2175 sub verify_usb_device
{
2176 my ($value, $noerr) = @_;
2178 return $value if parse_usb_device
($value);
2182 die "unable to parse usb device\n";
2185 # add JSON properties for create and set function
2186 sub json_config_properties
{
2189 my $skip_json_config_opts = {
2193 runningmachine
=> 1,
2198 foreach my $opt (keys %$confdesc) {
2199 next if $skip_json_config_opts->{$opt};
2200 $prop->{$opt} = $confdesc->{$opt};
2206 # return copy of $confdesc_cloudinit to generate documentation
2207 sub cloudinit_config_properties
{
2209 return dclone
($confdesc_cloudinit);
2213 my ($key, $value) = @_;
2215 die "unknown setting '$key'\n" if !$confdesc->{$key};
2217 my $type = $confdesc->{$key}->{type
};
2219 if (!defined($value)) {
2220 die "got undefined value\n";
2223 if ($value =~ m/[\n\r]/) {
2224 die "property contains a line feed\n";
2227 if ($type eq 'boolean') {
2228 return 1 if ($value eq '1') || ($value =~ m/^(on|yes|true)$/i);
2229 return 0 if ($value eq '0') || ($value =~ m/^(off|no|false)$/i);
2230 die "type check ('boolean') failed - got '$value'\n";
2231 } elsif ($type eq 'integer') {
2232 return int($1) if $value =~ m/^(\d+)$/;
2233 die "type check ('integer') failed - got '$value'\n";
2234 } elsif ($type eq 'number') {
2235 return $value if $value =~ m/^(\d+)(\.\d+)?$/;
2236 die "type check ('number') failed - got '$value'\n";
2237 } elsif ($type eq 'string') {
2238 if (my $fmt = $confdesc->{$key}->{format
}) {
2239 PVE
::JSONSchema
::check_format
($fmt, $value);
2242 $value =~ s/^\"(.*)\"$/$1/;
2245 die "internal error"
2250 my ($storecfg, $vmid, $skiplock, $replacement_conf, $purge_unreferenced) = @_;
2252 my $conf = PVE
::QemuConfig-
>load_config($vmid);
2254 PVE
::QemuConfig-
>check_lock($conf) if !$skiplock;
2256 if ($conf->{template
}) {
2257 # check if any base image is still used by a linked clone
2258 PVE
::QemuConfig-
>foreach_volume_full($conf, { include_unused
=> 1 }, sub {
2259 my ($ds, $drive) = @_;
2260 return if drive_is_cdrom
($drive);
2262 my $volid = $drive->{file
};
2263 return if !$volid || $volid =~ m
|^/|;
2265 die "base volume '$volid' is still in use by linked cloned\n"
2266 if PVE
::Storage
::volume_is_base_and_used
($storecfg, $volid);
2272 my $remove_owned_drive = sub {
2273 my ($ds, $drive) = @_;
2274 return if drive_is_cdrom
($drive, 1);
2276 my $volid = $drive->{file
};
2277 return if !$volid || $volid =~ m
|^/|;
2278 return if $volids->{$volid};
2280 my ($path, $owner) = PVE
::Storage
::path
($storecfg, $volid);
2281 return if !$path || !$owner || ($owner != $vmid);
2283 $volids->{$volid} = 1;
2284 eval { PVE
::Storage
::vdisk_free
($storecfg, $volid) };
2285 warn "Could not remove disk '$volid', check manually: $@" if $@;
2288 # only remove disks owned by this VM (referenced in the config)
2289 my $include_opts = {
2290 include_unused
=> 1,
2291 extra_keys
=> ['vmstate'],
2293 PVE
::QemuConfig-
>foreach_volume_full($conf, $include_opts, $remove_owned_drive);
2295 for my $snap (values %{$conf->{snapshots
}}) {
2296 next if !defined($snap->{vmstate
});
2297 my $drive = PVE
::QemuConfig-
>parse_volume('vmstate', $snap->{vmstate
}, 1);
2298 next if !defined($drive);
2299 $remove_owned_drive->('vmstate', $drive);
2302 PVE
::QemuConfig-
>foreach_volume_full($conf->{pending
}, $include_opts, $remove_owned_drive);
2304 if ($purge_unreferenced) { # also remove unreferenced disk
2305 my $vmdisks = PVE
::Storage
::vdisk_list
($storecfg, undef, $vmid, undef, 'images');
2306 PVE
::Storage
::foreach_volid
($vmdisks, sub {
2307 my ($volid, $sid, $volname, $d) = @_;
2308 eval { PVE
::Storage
::vdisk_free
($storecfg, $volid) };
2313 if (defined $replacement_conf) {
2314 PVE
::QemuConfig-
>write_config($vmid, $replacement_conf);
2316 PVE
::QemuConfig-
>destroy_config($vmid);
2320 sub parse_vm_config
{
2321 my ($filename, $raw, $strict) = @_;
2323 return if !defined($raw);
2326 digest
=> Digest
::SHA
::sha1_hex
($raw),
2331 my $handle_error = sub {
2341 $filename =~ m
|/qemu-server/(\d
+)\
.conf
$|
2342 || die "got strange filename '$filename'";
2350 my @lines = split(/\n/, $raw);
2351 foreach my $line (@lines) {
2352 next if $line =~ m/^\s*$/;
2354 if ($line =~ m/^\[PENDING\]\s*$/i) {
2355 $section = 'pending';
2356 if (defined($descr)) {
2358 $conf->{description
} = $descr;
2361 $conf = $res->{$section} = {};
2364 } elsif ($line =~ m/^\[([a-z][a-z0-9_\-]+)\]\s*$/i) {
2366 if (defined($descr)) {
2368 $conf->{description
} = $descr;
2371 $conf = $res->{snapshots
}->{$section} = {};
2375 if ($line =~ m/^\#(.*)\s*$/) {
2376 $descr = '' if !defined($descr);
2377 $descr .= PVE
::Tools
::decode_text
($1) . "\n";
2381 if ($line =~ m/^(description):\s*(.*\S)\s*$/) {
2382 $descr = '' if !defined($descr);
2383 $descr .= PVE
::Tools
::decode_text
($2);
2384 } elsif ($line =~ m/snapstate:\s*(prepare|delete)\s*$/) {
2385 $conf->{snapstate
} = $1;
2386 } elsif ($line =~ m/^(args):\s*(.*\S)\s*$/) {
2389 $conf->{$key} = $value;
2390 } elsif ($line =~ m/^delete:\s*(.*\S)\s*$/) {
2392 if ($section eq 'pending') {
2393 $conf->{delete} = $value; # we parse this later
2395 $handle_error->("vm $vmid - property 'delete' is only allowed in [PENDING]\n");
2397 } elsif ($line =~ m/^([a-z][a-z_]*\d*):\s*(.+?)\s*$/) {
2400 eval { $value = check_type
($key, $value); };
2402 $handle_error->("vm $vmid - unable to parse value of '$key' - $@");
2404 $key = 'ide2' if $key eq 'cdrom';
2405 my $fmt = $confdesc->{$key}->{format
};
2406 if ($fmt && $fmt =~ /^pve-qm-(?:ide|scsi|virtio|sata)$/) {
2407 my $v = parse_drive
($key, $value);
2408 if (my $volid = filename_to_volume_id
($vmid, $v->{file
}, $v->{media
})) {
2409 $v->{file
} = $volid;
2410 $value = print_drive
($v);
2412 $handle_error->("vm $vmid - unable to parse value of '$key'\n");
2417 $conf->{$key} = $value;
2420 $handle_error->("vm $vmid - unable to parse config: $line\n");
2424 if (defined($descr)) {
2426 $conf->{description
} = $descr;
2428 delete $res->{snapstate
}; # just to be sure
2433 sub write_vm_config
{
2434 my ($filename, $conf) = @_;
2436 delete $conf->{snapstate
}; # just to be sure
2438 if ($conf->{cdrom
}) {
2439 die "option ide2 conflicts with cdrom\n" if $conf->{ide2
};
2440 $conf->{ide2
} = $conf->{cdrom
};
2441 delete $conf->{cdrom
};
2444 # we do not use 'smp' any longer
2445 if ($conf->{sockets
}) {
2446 delete $conf->{smp
};
2447 } elsif ($conf->{smp
}) {
2448 $conf->{sockets
} = $conf->{smp
};
2449 delete $conf->{cores
};
2450 delete $conf->{smp
};
2453 my $used_volids = {};
2455 my $cleanup_config = sub {
2456 my ($cref, $pending, $snapname) = @_;
2458 foreach my $key (keys %$cref) {
2459 next if $key eq 'digest' || $key eq 'description' || $key eq 'snapshots' ||
2460 $key eq 'snapstate' || $key eq 'pending';
2461 my $value = $cref->{$key};
2462 if ($key eq 'delete') {
2463 die "propertry 'delete' is only allowed in [PENDING]\n"
2465 # fixme: check syntax?
2468 eval { $value = check_type
($key, $value); };
2469 die "unable to parse value of '$key' - $@" if $@;
2471 $cref->{$key} = $value;
2473 if (!$snapname && is_valid_drivename
($key)) {
2474 my $drive = parse_drive
($key, $value);
2475 $used_volids->{$drive->{file
}} = 1 if $drive && $drive->{file
};
2480 &$cleanup_config($conf);
2482 &$cleanup_config($conf->{pending
}, 1);
2484 foreach my $snapname (keys %{$conf->{snapshots
}}) {
2485 die "internal error: snapshot name '$snapname' is forbidden" if lc($snapname) eq 'pending';
2486 &$cleanup_config($conf->{snapshots
}->{$snapname}, undef, $snapname);
2489 # remove 'unusedX' settings if we re-add a volume
2490 foreach my $key (keys %$conf) {
2491 my $value = $conf->{$key};
2492 if ($key =~ m/^unused/ && $used_volids->{$value}) {
2493 delete $conf->{$key};
2497 my $generate_raw_config = sub {
2498 my ($conf, $pending) = @_;
2502 # add description as comment to top of file
2503 if (defined(my $descr = $conf->{description
})) {
2505 foreach my $cl (split(/\n/, $descr)) {
2506 $raw .= '#' . PVE
::Tools
::encode_text
($cl) . "\n";
2509 $raw .= "#\n" if $pending;
2513 foreach my $key (sort keys %$conf) {
2514 next if $key =~ /^(digest|description|pending|snapshots)$/;
2515 $raw .= "$key: $conf->{$key}\n";
2520 my $raw = &$generate_raw_config($conf);
2522 if (scalar(keys %{$conf->{pending
}})){
2523 $raw .= "\n[PENDING]\n";
2524 $raw .= &$generate_raw_config($conf->{pending
}, 1);
2527 foreach my $snapname (sort keys %{$conf->{snapshots
}}) {
2528 $raw .= "\n[$snapname]\n";
2529 $raw .= &$generate_raw_config($conf->{snapshots
}->{$snapname});
2539 # we use static defaults from our JSON schema configuration
2540 foreach my $key (keys %$confdesc) {
2541 if (defined(my $default = $confdesc->{$key}->{default})) {
2542 $res->{$key} = $default;
2550 my $vmlist = PVE
::Cluster
::get_vmlist
();
2552 return $res if !$vmlist || !$vmlist->{ids
};
2553 my $ids = $vmlist->{ids
};
2554 my $nodename = nodename
();
2556 foreach my $vmid (keys %$ids) {
2557 my $d = $ids->{$vmid};
2558 next if !$d->{node
} || $d->{node
} ne $nodename;
2559 next if !$d->{type
} || $d->{type
} ne 'qemu';
2560 $res->{$vmid}->{exists} = 1;
2565 # test if VM uses local resources (to prevent migration)
2566 sub check_local_resources
{
2567 my ($conf, $noerr) = @_;
2571 push @loc_res, "hostusb" if $conf->{hostusb
}; # old syntax
2572 push @loc_res, "hostpci" if $conf->{hostpci
}; # old syntax
2574 push @loc_res, "ivshmem" if $conf->{ivshmem
};
2576 foreach my $k (keys %$conf) {
2577 next if $k =~ m/^usb/ && ($conf->{$k} =~ m/^spice(?![^,])/);
2578 # sockets are safe: they will recreated be on the target side post-migrate
2579 next if $k =~ m/^serial/ && ($conf->{$k} eq 'socket');
2580 push @loc_res, $k if $k =~ m/^(usb|hostpci|serial|parallel)\d+$/;
2583 die "VM uses local resources\n" if scalar @loc_res && !$noerr;
2588 # check if used storages are available on all nodes (use by migrate)
2589 sub check_storage_availability
{
2590 my ($storecfg, $conf, $node) = @_;
2592 PVE
::QemuConfig-
>foreach_volume($conf, sub {
2593 my ($ds, $drive) = @_;
2595 my $volid = $drive->{file
};
2598 my ($sid, $volname) = PVE
::Storage
::parse_volume_id
($volid, 1);
2601 # check if storage is available on both nodes
2602 my $scfg = PVE
::Storage
::storage_check_enabled
($storecfg, $sid);
2603 PVE
::Storage
::storage_check_enabled
($storecfg, $sid, $node);
2605 my ($vtype) = PVE
::Storage
::parse_volname
($storecfg, $volid);
2607 die "$volid: content type '$vtype' is not available on storage '$sid'\n"
2608 if !$scfg->{content
}->{$vtype};
2612 # list nodes where all VM images are available (used by has_feature API)
2614 my ($conf, $storecfg) = @_;
2616 my $nodelist = PVE
::Cluster
::get_nodelist
();
2617 my $nodehash = { map { $_ => 1 } @$nodelist };
2618 my $nodename = nodename
();
2620 PVE
::QemuConfig-
>foreach_volume($conf, sub {
2621 my ($ds, $drive) = @_;
2623 my $volid = $drive->{file
};
2626 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($volid, 1);
2628 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
2629 if ($scfg->{disable
}) {
2631 } elsif (my $avail = $scfg->{nodes
}) {
2632 foreach my $node (keys %$nodehash) {
2633 delete $nodehash->{$node} if !$avail->{$node};
2635 } elsif (!$scfg->{shared
}) {
2636 foreach my $node (keys %$nodehash) {
2637 delete $nodehash->{$node} if $node ne $nodename
2646 sub check_local_storage_availability
{
2647 my ($conf, $storecfg) = @_;
2649 my $nodelist = PVE
::Cluster
::get_nodelist
();
2650 my $nodehash = { map { $_ => {} } @$nodelist };
2652 PVE
::QemuConfig-
>foreach_volume($conf, sub {
2653 my ($ds, $drive) = @_;
2655 my $volid = $drive->{file
};
2658 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($volid, 1);
2660 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
2662 if ($scfg->{disable
}) {
2663 foreach my $node (keys %$nodehash) {
2664 $nodehash->{$node}->{unavailable_storages
}->{$storeid} = 1;
2666 } elsif (my $avail = $scfg->{nodes
}) {
2667 foreach my $node (keys %$nodehash) {
2668 if (!$avail->{$node}) {
2669 $nodehash->{$node}->{unavailable_storages
}->{$storeid} = 1;
2676 foreach my $node (values %$nodehash) {
2677 if (my $unavail = $node->{unavailable_storages
}) {
2678 $node->{unavailable_storages
} = [ sort keys %$unavail ];
2685 # Compat only, use assert_config_exists_on_node and vm_running_locally where possible
2687 my ($vmid, $nocheck, $node) = @_;
2689 PVE
::QemuConfig
::assert_config_exists_on_node
($vmid, $node) if !$nocheck;
2690 return PVE
::QemuServer
::Helpers
::vm_running_locally
($vmid);
2695 my $vzlist = config_list
();
2697 my $fd = IO
::Dir-
>new($PVE::QemuServer
::Helpers
::var_run_tmpdir
) || return $vzlist;
2699 while (defined(my $de = $fd->read)) {
2700 next if $de !~ m/^(\d+)\.pid$/;
2702 next if !defined($vzlist->{$vmid});
2703 if (my $pid = check_running
($vmid)) {
2704 $vzlist->{$vmid}->{pid
} = $pid;
2711 our $vmstatus_return_properties = {
2712 vmid
=> get_standard_option
('pve-vmid'),
2714 description
=> "Qemu process status.",
2716 enum
=> ['stopped', 'running'],
2719 description
=> "Maximum memory in bytes.",
2722 renderer
=> 'bytes',
2725 description
=> "Root disk size in bytes.",
2728 renderer
=> 'bytes',
2731 description
=> "VM name.",
2736 description
=> "Qemu QMP agent status.",
2741 description
=> "PID of running qemu process.",
2746 description
=> "Uptime.",
2749 renderer
=> 'duration',
2752 description
=> "Maximum usable CPUs.",
2757 description
=> "The current config lock, if any.",
2762 description
=> "The current configured tags, if any",
2766 'running-machine' => {
2767 description
=> "The currently running machine type (if running).",
2772 description
=> "The currently running QEMU version (if running).",
2778 my $last_proc_pid_stat;
2780 # get VM status information
2781 # This must be fast and should not block ($full == false)
2782 # We only query KVM using QMP if $full == true (this can be slow)
2784 my ($opt_vmid, $full) = @_;
2788 my $storecfg = PVE
::Storage
::config
();
2790 my $list = vzlist
();
2791 my $defaults = load_defaults
();
2793 my ($uptime) = PVE
::ProcFSTools
::read_proc_uptime
(1);
2795 my $cpucount = $cpuinfo->{cpus
} || 1;
2797 foreach my $vmid (keys %$list) {
2798 next if $opt_vmid && ($vmid ne $opt_vmid);
2800 my $conf = PVE
::QemuConfig-
>load_config($vmid);
2802 my $d = { vmid
=> int($vmid) };
2803 $d->{pid
} = int($list->{$vmid}->{pid
}) if $list->{$vmid}->{pid
};
2805 # fixme: better status?
2806 $d->{status
} = $list->{$vmid}->{pid
} ?
'running' : 'stopped';
2808 my $size = PVE
::QemuServer
::Drive
::bootdisk_size
($storecfg, $conf);
2809 if (defined($size)) {
2810 $d->{disk
} = 0; # no info available
2811 $d->{maxdisk
} = $size;
2817 $d->{cpus
} = ($conf->{sockets
} || $defaults->{sockets
})
2818 * ($conf->{cores
} || $defaults->{cores
});
2819 $d->{cpus
} = $cpucount if $d->{cpus
} > $cpucount;
2820 $d->{cpus
} = $conf->{vcpus
} if $conf->{vcpus
};
2822 $d->{name
} = $conf->{name
} || "VM $vmid";
2823 $d->{maxmem
} = $conf->{memory
} ?
$conf->{memory
}*(1024*1024)
2824 : $defaults->{memory
}*(1024*1024);
2826 if ($conf->{balloon
}) {
2827 $d->{balloon_min
} = $conf->{balloon
}*(1024*1024);
2828 $d->{shares
} = defined($conf->{shares
}) ?
$conf->{shares
}
2829 : $defaults->{shares
};
2840 $d->{diskwrite
} = 0;
2842 $d->{template
} = 1 if PVE
::QemuConfig-
>is_template($conf);
2844 $d->{serial
} = 1 if conf_has_serial
($conf);
2845 $d->{lock} = $conf->{lock} if $conf->{lock};
2846 $d->{tags
} = $conf->{tags
} if defined($conf->{tags
});
2851 my $netdev = PVE
::ProcFSTools
::read_proc_net_dev
();
2852 foreach my $dev (keys %$netdev) {
2853 next if $dev !~ m/^tap([1-9]\d*)i/;
2855 my $d = $res->{$vmid};
2858 $d->{netout
} += $netdev->{$dev}->{receive
};
2859 $d->{netin
} += $netdev->{$dev}->{transmit
};
2862 $d->{nics
}->{$dev}->{netout
} = int($netdev->{$dev}->{receive
});
2863 $d->{nics
}->{$dev}->{netin
} = int($netdev->{$dev}->{transmit
});
2868 my $ctime = gettimeofday
;
2870 foreach my $vmid (keys %$list) {
2872 my $d = $res->{$vmid};
2873 my $pid = $d->{pid
};
2876 my $pstat = PVE
::ProcFSTools
::read_proc_pid_stat
($pid);
2877 next if !$pstat; # not running
2879 my $used = $pstat->{utime} + $pstat->{stime
};
2881 $d->{uptime
} = int(($uptime - $pstat->{starttime
})/$cpuinfo->{user_hz
});
2883 if ($pstat->{vsize
}) {
2884 $d->{mem
} = int(($pstat->{rss
}/$pstat->{vsize
})*$d->{maxmem
});
2887 my $old = $last_proc_pid_stat->{$pid};
2889 $last_proc_pid_stat->{$pid} = {
2897 my $dtime = ($ctime - $old->{time}) * $cpucount * $cpuinfo->{user_hz
};
2899 if ($dtime > 1000) {
2900 my $dutime = $used - $old->{used
};
2902 $d->{cpu
} = (($dutime/$dtime)* $cpucount) / $d->{cpus
};
2903 $last_proc_pid_stat->{$pid} = {
2909 $d->{cpu
} = $old->{cpu
};
2913 return $res if !$full;
2915 my $qmpclient = PVE
::QMPClient-
>new();
2917 my $ballooncb = sub {
2918 my ($vmid, $resp) = @_;
2920 my $info = $resp->{'return'};
2921 return if !$info->{max_mem
};
2923 my $d = $res->{$vmid};
2925 # use memory assigned to VM
2926 $d->{maxmem
} = $info->{max_mem
};
2927 $d->{balloon
} = $info->{actual
};
2929 if (defined($info->{total_mem
}) && defined($info->{free_mem
})) {
2930 $d->{mem
} = $info->{total_mem
} - $info->{free_mem
};
2931 $d->{freemem
} = $info->{free_mem
};
2934 $d->{ballooninfo
} = $info;
2937 my $blockstatscb = sub {
2938 my ($vmid, $resp) = @_;
2939 my $data = $resp->{'return'} || [];
2940 my $totalrdbytes = 0;
2941 my $totalwrbytes = 0;
2943 for my $blockstat (@$data) {
2944 $totalrdbytes = $totalrdbytes + $blockstat->{stats
}->{rd_bytes
};
2945 $totalwrbytes = $totalwrbytes + $blockstat->{stats
}->{wr_bytes
};
2947 $blockstat->{device
} =~ s/drive-//;
2948 $res->{$vmid}->{blockstat
}->{$blockstat->{device
}} = $blockstat->{stats
};
2950 $res->{$vmid}->{diskread
} = $totalrdbytes;
2951 $res->{$vmid}->{diskwrite
} = $totalwrbytes;
2954 my $machinecb = sub {
2955 my ($vmid, $resp) = @_;
2956 my $data = $resp->{'return'} || [];
2958 $res->{$vmid}->{'running-machine'} =
2959 PVE
::QemuServer
::Machine
::current_from_query_machines
($data);
2962 my $versioncb = sub {
2963 my ($vmid, $resp) = @_;
2964 my $data = $resp->{'return'} // {};
2965 my $version = 'unknown';
2967 if (my $v = $data->{qemu
}) {
2968 $version = $v->{major
} . "." . $v->{minor
} . "." . $v->{micro
};
2971 $res->{$vmid}->{'running-qemu'} = $version;
2974 my $statuscb = sub {
2975 my ($vmid, $resp) = @_;
2977 $qmpclient->queue_cmd($vmid, $blockstatscb, 'query-blockstats');
2978 $qmpclient->queue_cmd($vmid, $machinecb, 'query-machines');
2979 $qmpclient->queue_cmd($vmid, $versioncb, 'query-version');
2980 # this fails if ballon driver is not loaded, so this must be
2981 # the last commnand (following command are aborted if this fails).
2982 $qmpclient->queue_cmd($vmid, $ballooncb, 'query-balloon');
2984 my $status = 'unknown';
2985 if (!defined($status = $resp->{'return'}->{status
})) {
2986 warn "unable to get VM status\n";
2990 $res->{$vmid}->{qmpstatus
} = $resp->{'return'}->{status
};
2993 foreach my $vmid (keys %$list) {
2994 next if $opt_vmid && ($vmid ne $opt_vmid);
2995 next if !$res->{$vmid}->{pid
}; # not running
2996 $qmpclient->queue_cmd($vmid, $statuscb, 'query-status');
2999 $qmpclient->queue_execute(undef, 2);
3001 foreach my $vmid (keys %$list) {
3002 next if $opt_vmid && ($vmid ne $opt_vmid);
3003 next if !$res->{$vmid}->{pid
}; #not running
3005 # we can't use the $qmpclient since it might have already aborted on
3006 # 'query-balloon', but this might also fail for older versions...
3007 my $qemu_support = eval { mon_cmd
($vmid, "query-proxmox-support") };
3008 $res->{$vmid}->{'proxmox-support'} = $qemu_support // {};
3011 foreach my $vmid (keys %$list) {
3012 next if $opt_vmid && ($vmid ne $opt_vmid);
3013 $res->{$vmid}->{qmpstatus
} = $res->{$vmid}->{status
} if !$res->{$vmid}->{qmpstatus
};
3019 sub conf_has_serial
{
3022 for (my $i = 0; $i < $MAX_SERIAL_PORTS; $i++) {
3023 if ($conf->{"serial$i"}) {
3031 sub conf_has_audio
{
3032 my ($conf, $id) = @_;
3035 my $audio = $conf->{"audio$id"};
3036 return if !defined($audio);
3038 my $audioproperties = parse_property_string
($audio_fmt, $audio);
3039 my $audiodriver = $audioproperties->{driver
} // 'spice';
3042 dev
=> $audioproperties->{device
},
3043 dev_id
=> "audiodev$id",
3044 backend
=> $audiodriver,
3045 backend_id
=> "$audiodriver-backend${id}",
3050 my ($audio, $audiopciaddr, $machine_version) = @_;
3054 my $id = $audio->{dev_id
};
3056 if (min_version
($machine_version, 4, 2)) {
3057 $audiodev = ",audiodev=$audio->{backend_id}";
3060 if ($audio->{dev
} eq 'AC97') {
3061 push @$devs, '-device', "AC97,id=${id}${audiopciaddr}$audiodev";
3062 } elsif ($audio->{dev
} =~ /intel\-hda$/) {
3063 push @$devs, '-device', "$audio->{dev},id=${id}${audiopciaddr}";
3064 push @$devs, '-device', "hda-micro,id=${id}-codec0,bus=${id}.0,cad=0$audiodev";
3065 push @$devs, '-device', "hda-duplex,id=${id}-codec1,bus=${id}.0,cad=1$audiodev";
3067 die "unkown audio device '$audio->{dev}', implement me!";
3070 push @$devs, '-audiodev', "$audio->{backend},id=$audio->{backend_id}";
3078 socket => "/var/run/qemu-server/$vmid.swtpm",
3079 pid
=> "/var/run/qemu-server/$vmid.swtpm.pid",
3083 sub add_tpm_device
{
3084 my ($vmid, $devices, $conf) = @_;
3086 return if !$conf->{tpmstate0
};
3088 my $paths = get_tpm_paths
($vmid);
3090 push @$devices, "-chardev", "socket,id=tpmchar,path=$paths->{socket}";
3091 push @$devices, "-tpmdev", "emulator,id=tpmdev,chardev=tpmchar";
3092 push @$devices, "-device", "tpm-tis,tpmdev=tpmdev";
3096 my ($storecfg, $vmid, $tpmdrive, $migration) = @_;
3098 return if !$tpmdrive;
3101 my $tpm = parse_drive
("tpmstate0", $tpmdrive);
3102 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($tpm->{file
}, 1);
3104 $state = PVE
::Storage
::map_volume
($storecfg, $tpm->{file
});
3106 $state = $tpm->{file
};
3109 my $paths = get_tpm_paths
($vmid);
3111 # during migration, we will get state from remote
3114 # run swtpm_setup to create a new TPM state if it doesn't exist yet
3121 "--create-platform-cert",
3124 "/etc/swtpm_setup.conf", # do not use XDG configs
3126 "0", # force creation as root, error if not possible
3127 "--not-overwrite", # ignore existing state, do not modify
3130 push @$setup_cmd, "--tpm2" if $tpm->{version
} eq 'v2.0';
3131 # TPM 2.0 supports ECC crypto, use if possible
3132 push @$setup_cmd, "--ecc" if $tpm->{version
} eq 'v2.0';
3134 run_command
($setup_cmd, outfunc
=> sub {
3135 print "swtpm_setup: $1\n";
3139 my $emulator_cmd = [
3143 "backend-uri=file://$state,mode=0600",
3145 "type=unixio,path=$paths->{socket},mode=0600",
3147 "file=$paths->{pid}",
3148 "--terminate", # terminate on QEMU disconnect
3151 push @$emulator_cmd, "--tpm2" if $tpm->{version
} eq 'v2.0';
3152 run_command
($emulator_cmd, outfunc
=> sub { print $1; });
3154 my $tries = 100; # swtpm may take a bit to start before daemonizing, wait up to 5s for pid
3155 while (! -e
$paths->{pid
}) {
3156 die "failed to start swtpm: pid file '$paths->{pid}' wasn't created.\n" if --$tries == 0;
3160 # return untainted PID of swtpm daemon so it can be killed on error
3161 file_read_firstline
($paths->{pid
}) =~ m/(\d+)/;
3165 sub vga_conf_has_spice
{
3168 my $vgaconf = parse_vga
($vga);
3169 my $vgatype = $vgaconf->{type
};
3170 return 0 if !$vgatype || $vgatype !~ m/^qxl([234])?$/;
3177 return get_host_arch
() eq $arch;
3182 return $conf->{arch
} // get_host_arch
();
3185 my $default_machines = {
3190 sub get_installed_machine_version
{
3191 my ($kvmversion) = @_;
3192 $kvmversion = kvm_user_version
() if !defined($kvmversion);
3193 $kvmversion =~ m/^(\d+\.\d+)/;
3197 sub windows_get_pinned_machine_version
{
3198 my ($machine, $base_version, $kvmversion) = @_;
3200 my $pin_version = $base_version;
3201 if (!defined($base_version) ||
3202 !PVE
::QemuServer
::Machine
::can_run_pve_machine_version
($base_version, $kvmversion)
3204 $pin_version = get_installed_machine_version
($kvmversion);
3206 if (!$machine || $machine eq 'pc') {
3207 $machine = "pc-i440fx-$pin_version";
3208 } elsif ($machine eq 'q35') {
3209 $machine = "pc-q35-$pin_version";
3210 } elsif ($machine eq 'virt') {
3211 $machine = "virt-$pin_version";
3213 warn "unknown machine type '$machine', not touching that!\n";
3219 sub get_vm_machine
{
3220 my ($conf, $forcemachine, $arch, $add_pve_version, $kvmversion) = @_;
3222 my $machine = $forcemachine || $conf->{machine
};
3224 if (!$machine || $machine =~ m/^(?:pc|q35|virt)$/) {
3225 $kvmversion //= kvm_user_version
();
3226 # we must pin Windows VMs without a specific version to 5.1, as 5.2 fixed a bug in ACPI
3227 # layout which confuses windows quite a bit and may result in various regressions..
3228 # see: https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg08484.html
3229 if (windows_version
($conf->{ostype
})) {
3230 $machine = windows_get_pinned_machine_version
($machine, '5.1', $kvmversion);
3233 $machine ||= $default_machines->{$arch};
3234 if ($add_pve_version) {
3235 my $pvever = PVE
::QemuServer
::Machine
::get_pve_version
($kvmversion);
3236 $machine .= "+pve$pvever";
3240 if ($add_pve_version && $machine !~ m/\+pve\d+?(?:\.pxe)?$/) {
3241 my $is_pxe = $machine =~ m/^(.*?)\.pxe$/;
3242 $machine = $1 if $is_pxe;
3244 # for version-pinned machines that do not include a pve-version (e.g.
3245 # pc-q35-4.1), we assume 0 to keep them stable in case we bump
3246 $machine .= '+pve0';
3248 $machine .= '.pxe' if $is_pxe;
3254 sub get_ovmf_files
($$$) {
3255 my ($arch, $efidisk, $smm) = @_;
3257 my $types = $OVMF->{$arch}
3258 or die "no OVMF images known for architecture '$arch'\n";
3260 my $type = 'default';
3261 if (defined($efidisk->{efitype
}) && $efidisk->{efitype
} eq '4m') {
3262 $type = $smm ?
"4m" : "4m-no-smm";
3263 $type .= '-ms' if $efidisk->{'pre-enrolled-keys'};
3266 return $types->{$type}->@*;
3270 aarch64
=> '/usr/bin/qemu-system-aarch64',
3271 x86_64
=> '/usr/bin/qemu-system-x86_64',
3273 sub get_command_for_arch
($) {
3275 return '/usr/bin/kvm' if is_native
($arch);
3277 my $cmd = $Arch2Qemu->{$arch}
3278 or die "don't know how to emulate architecture '$arch'\n";
3282 # To use query_supported_cpu_flags and query_understood_cpu_flags to get flags
3283 # to use in a QEMU command line (-cpu element), first array_intersect the result
3284 # of query_supported_ with query_understood_. This is necessary because:
3286 # a) query_understood_ returns flags the host cannot use and
3287 # b) query_supported_ (rather the QMP call) doesn't actually return CPU
3288 # flags, but CPU settings - with most of them being flags. Those settings
3289 # (and some flags, curiously) cannot be specified as a "-cpu" argument.
3291 # query_supported_ needs to start up to 2 temporary VMs and is therefore rather
3292 # expensive. If you need the value returned from this, you can get it much
3293 # cheaper from pmxcfs using PVE::Cluster::get_node_kv('cpuflags-$accel') with
3294 # $accel being 'kvm' or 'tcg'.
3296 # pvestatd calls this function on startup and whenever the QEMU/KVM version
3297 # changes, automatically populating pmxcfs.
3299 # Returns: { kvm => [ flagX, flagY, ... ], tcg => [ flag1, flag2, ... ] }
3300 # since kvm and tcg machines support different flags
3302 sub query_supported_cpu_flags
{
3305 $arch //= get_host_arch
();
3306 my $default_machine = $default_machines->{$arch};
3310 # FIXME: Once this is merged, the code below should work for ARM as well:
3311 # https://lists.nongnu.org/archive/html/qemu-devel/2019-06/msg04947.html
3312 die "QEMU/KVM cannot detect CPU flags on ARM (aarch64)\n" if
3315 my $kvm_supported = defined(kvm_version
());
3316 my $qemu_cmd = get_command_for_arch
($arch);
3318 my $pidfile = PVE
::QemuServer
::Helpers
::pidfile_name
($fakevmid);
3320 # Start a temporary (frozen) VM with vmid -1 to allow sending a QMP command
3321 my $query_supported_run_qemu = sub {
3327 '-machine', $default_machine,
3329 '-chardev', "socket,id=qmp,path=/var/run/qemu-server/$fakevmid.qmp,server=on,wait=off",
3330 '-mon', 'chardev=qmp,mode=control',
3331 '-pidfile', $pidfile,
3336 push @$cmd, '-accel', 'tcg';
3339 my $rc = run_command
($cmd, noerr
=> 1, quiet
=> 0);
3340 die "QEMU flag querying VM exited with code " . $rc if $rc;
3343 my $cmd_result = mon_cmd
(
3345 'query-cpu-model-expansion',
3347 model
=> { name
=> 'host' }
3350 my $props = $cmd_result->{model
}->{props
};
3351 foreach my $prop (keys %$props) {
3352 next if $props->{$prop} ne '1';
3353 # QEMU returns some flags multiple times, with '_', '.' or '-'
3354 # (e.g. lahf_lm and lahf-lm; sse4.2, sse4-2 and sse4_2; ...).
3355 # We only keep those with underscores, to match /proc/cpuinfo
3356 $prop =~ s/\.|-/_/g;
3357 $flags->{$prop} = 1;
3362 # force stop with 10 sec timeout and 'nocheck', always stop, even if QMP failed
3363 vm_stop
(undef, $fakevmid, 1, 1, 10, 0, 1);
3367 return [ sort keys %$flags ];
3370 # We need to query QEMU twice, since KVM and TCG have different supported flags
3371 PVE
::QemuConfig-
>lock_config($fakevmid, sub {
3372 $flags->{tcg
} = eval { $query_supported_run_qemu->(0) };
3373 warn "warning: failed querying supported tcg flags: $@\n" if $@;
3375 if ($kvm_supported) {
3376 $flags->{kvm
} = eval { $query_supported_run_qemu->(1) };
3377 warn "warning: failed querying supported kvm flags: $@\n" if $@;
3384 # Understood CPU flags are written to a file at 'pve-qemu' compile time
3385 my $understood_cpu_flag_dir = "/usr/share/kvm";
3386 sub query_understood_cpu_flags
{
3387 my $arch = get_host_arch
();
3388 my $filepath = "$understood_cpu_flag_dir/recognized-CPUID-flags-$arch";
3390 die "Cannot query understood QEMU CPU flags for architecture: $arch (file not found)\n"
3393 my $raw = file_get_contents
($filepath);
3394 $raw =~ s/^\s+|\s+$//g;
3395 my @flags = split(/\s+/, $raw);
3400 my sub get_cpuunits
{
3402 my $is_cgroupv2 = PVE
::CGroup
::cgroup_mode
() == 2;
3404 my $cpuunits = $conf->{cpuunits
};
3405 return $is_cgroupv2 ?
100 : 1024 if !defined($cpuunits);
3408 $cpuunits = 10000 if $cpuunits >= 10000; # v1 can be higher, so clamp v2 there
3410 $cpuunits = 2 if $cpuunits < 2; # v2 can be lower, so clamp v1 there
3415 # Since commit 277d33454f77ec1d1e0bc04e37621e4dd2424b67 in pve-qemu, smm is not off by default
3416 # anymore. But smm=off seems to be required when using SeaBIOS and serial display.
3417 my sub should_disable_smm
{
3418 my ($conf, $vga) = @_;
3420 return (!defined($conf->{bios
}) || $conf->{bios
} eq 'seabios') &&
3421 $vga->{type
} && $vga->{type
} =~ m/^(serial\d+|none)$/;
3424 sub config_to_command
{
3425 my ($storecfg, $vmid, $conf, $defaults, $forcemachine, $forcecpu,
3429 my ($globalFlags, $machineFlags, $rtcFlags) = ([], [], []);
3432 my $ostype = $conf->{ostype
};
3433 my $winversion = windows_version
($ostype);
3434 my $kvm = $conf->{kvm
};
3435 my $nodename = nodename
();
3437 my $arch = get_vm_arch
($conf);
3438 my $kvm_binary = get_command_for_arch
($arch);
3439 my $kvmver = kvm_user_version
($kvm_binary);
3441 if (!$kvmver || $kvmver !~ m/^(\d+)\.(\d+)/ || $1 < 3) {
3442 $kvmver //= "undefined";
3443 die "Detected old QEMU binary ('$kvmver', at least 3.0 is required)\n";
3446 my $add_pve_version = min_version
($kvmver, 4, 1);
3448 my $machine_type = get_vm_machine
($conf, $forcemachine, $arch, $add_pve_version);
3449 my $machine_version = extract_version
($machine_type, $kvmver);
3450 $kvm //= 1 if is_native
($arch);
3452 $machine_version =~ m/(\d+)\.(\d+)/;
3453 my ($machine_major, $machine_minor) = ($1, $2);
3455 if ($kvmver =~ m/^\d+\.\d+\.(\d+)/ && $1 >= 90) {
3456 warn "warning: Installed QEMU version ($kvmver) is a release candidate, ignoring version checks\n";
3457 } elsif (!min_version
($kvmver, $machine_major, $machine_minor)) {
3458 die "Installed QEMU version '$kvmver' is too old to run machine type '$machine_type',"
3459 ." please upgrade node '$nodename'\n"
3460 } elsif (!PVE
::QemuServer
::Machine
::can_run_pve_machine_version
($machine_version, $kvmver)) {
3461 my $max_pve_version = PVE
::QemuServer
::Machine
::get_pve_version
($machine_version);
3462 die "Installed qemu-server (max feature level for $machine_major.$machine_minor is"
3463 ." pve$max_pve_version) is too old to run machine type '$machine_type', please upgrade"
3464 ." node '$nodename'\n";
3467 # if a specific +pve version is required for a feature, use $version_guard
3468 # instead of min_version to allow machines to be run with the minimum
3470 my $required_pve_version = 0;
3471 my $version_guard = sub {
3472 my ($major, $minor, $pve) = @_;
3473 return 0 if !min_version
($machine_version, $major, $minor, $pve);
3474 my $max_pve = PVE
::QemuServer
::Machine
::get_pve_version
("$major.$minor");
3475 return 1 if min_version
($machine_version, $major, $minor, $max_pve+1);
3476 $required_pve_version = $pve if $pve && $pve > $required_pve_version;
3480 if ($kvm && !defined kvm_version
()) {
3481 die "KVM virtualisation configured, but not available. Either disable in VM configuration"
3482 ." or enable in BIOS.\n";
3485 my $q35 = PVE
::QemuServer
::Machine
::machine_type_is_q35
($conf);
3486 my $hotplug_features = parse_hotplug_features
(defined($conf->{hotplug
}) ?
$conf->{hotplug
} : '1');
3487 my $use_old_bios_files = undef;
3488 ($use_old_bios_files, $machine_type) = qemu_use_old_bios_files
($machine_type);
3490 push @$cmd, $kvm_binary;
3492 push @$cmd, '-id', $vmid;
3494 my $vmname = $conf->{name
} || "vm$vmid";
3496 push @$cmd, '-name', $vmname;
3498 push @$cmd, '-no-shutdown';
3502 my $qmpsocket = PVE
::QemuServer
::Helpers
::qmp_socket
($vmid);
3503 push @$cmd, '-chardev', "socket,id=qmp,path=$qmpsocket,server=on,wait=off";
3504 push @$cmd, '-mon', "chardev=qmp,mode=control";
3506 if (min_version
($machine_version, 2, 12)) {
3507 push @$cmd, '-chardev', "socket,id=qmp-event,path=/var/run/qmeventd.sock,reconnect=5";
3508 push @$cmd, '-mon', "chardev=qmp-event,mode=control";
3511 push @$cmd, '-pidfile' , PVE
::QemuServer
::Helpers
::pidfile_name
($vmid);
3513 push @$cmd, '-daemonize';
3515 if ($conf->{smbios1
}) {
3516 my $smbios_conf = parse_smbios1
($conf->{smbios1
});
3517 if ($smbios_conf->{base64
}) {
3518 # Do not pass base64 flag to qemu
3519 delete $smbios_conf->{base64
};
3520 my $smbios_string = "";
3521 foreach my $key (keys %$smbios_conf) {
3523 if ($key eq "uuid") {
3524 $value = $smbios_conf->{uuid
}
3526 $value = decode_base64
($smbios_conf->{$key});
3528 # qemu accepts any binary data, only commas need escaping by double comma
3530 $smbios_string .= "," . $key . "=" . $value if $value;
3532 push @$cmd, '-smbios', "type=1" . $smbios_string;
3534 push @$cmd, '-smbios', "type=1,$conf->{smbios1}";
3538 if ($conf->{bios
} && $conf->{bios
} eq 'ovmf') {
3540 if (my $efidisk = $conf->{efidisk0
}) {
3541 $d = parse_drive
('efidisk0', $efidisk);
3544 my ($ovmf_code, $ovmf_vars) = get_ovmf_files
($arch, $d, $q35);
3545 die "uefi base image '$ovmf_code' not found\n" if ! -f
$ovmf_code;
3547 my ($path, $format);
3548 my $read_only_str = '';
3550 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($d->{file
}, 1);
3551 $format = $d->{format
};
3553 $path = PVE
::Storage
::path
($storecfg, $d->{file
});
3554 if (!defined($format)) {
3555 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
3556 $format = qemu_img_format
($scfg, $volname);
3560 die "efidisk format must be specified\n"
3561 if !defined($format);
3564 $read_only_str = ',readonly=on' if drive_is_read_only
($conf, $d);
3566 warn "no efidisk configured! Using temporary efivars disk.\n";
3567 $path = "/tmp/$vmid-ovmf.fd";
3568 PVE
::Tools
::file_copy
($ovmf_vars, $path, -s
$ovmf_vars);
3574 if ($format eq 'raw' && $version_guard->(4, 1, 2)) {
3575 $size_str = ",size=" . (-s
$ovmf_vars);
3578 # SPI flash does lots of read-modify-write OPs, without writeback this gets really slow #3329
3580 if ($path =~ m/^rbd:/) {
3581 $cache = ',cache=writeback';
3582 $path .= ':rbd_cache_policy=writeback'; # avoid write-around, we *need* to cache writes too
3585 push @$cmd, '-drive', "if=pflash,unit=0,format=raw,readonly=on,file=$ovmf_code";
3586 push @$cmd, '-drive', "if=pflash,unit=1$cache,format=$format,id=drive-efidisk0$size_str,file=${path}${read_only_str}";
3589 if ($q35) { # tell QEMU to load q35 config early
3590 # we use different pcie-port hardware for qemu >= 4.0 for passthrough
3591 if (min_version
($machine_version, 4, 0)) {
3592 push @$devices, '-readconfig', '/usr/share/qemu-server/pve-q35-4.0.cfg';
3594 push @$devices, '-readconfig', '/usr/share/qemu-server/pve-q35.cfg';
3598 if (defined(my $fixups = qemu_created_version_fixups
($conf, $forcemachine, $kvmver))) {
3599 push @$cmd, $fixups->@*;
3602 if ($conf->{vmgenid
}) {
3603 push @$devices, '-device', 'vmgenid,guid='.$conf->{vmgenid
};
3606 # add usb controllers
3607 my @usbcontrollers = PVE
::QemuServer
::USB
::get_usb_controllers
(
3608 $conf, $bridges, $arch, $machine_type, $usbdesc->{format
}, $MAX_USB_DEVICES);
3609 push @$devices, @usbcontrollers if @usbcontrollers;
3610 my $vga = parse_vga
($conf->{vga
});
3612 my $qxlnum = vga_conf_has_spice
($conf->{vga
});
3613 $vga->{type
} = 'qxl' if $qxlnum;
3615 if (!$vga->{type
}) {
3616 if ($arch eq 'aarch64') {
3617 $vga->{type
} = 'virtio';
3618 } elsif (min_version
($machine_version, 2, 9)) {
3619 $vga->{type
} = (!$winversion || $winversion >= 6) ?
'std' : 'cirrus';
3621 $vga->{type
} = ($winversion >= 6) ?
'std' : 'cirrus';
3625 # enable absolute mouse coordinates (needed by vnc)
3626 my $tablet = $conf->{tablet
};
3627 if (!defined($tablet)) {
3628 $tablet = $defaults->{tablet
};
3629 $tablet = 0 if $qxlnum; # disable for spice because it is not needed
3630 $tablet = 0 if $vga->{type
} =~ m/^serial\d+$/; # disable if we use serial terminal (no vga card)
3634 push @$devices, '-device', print_tabletdevice_full
($conf, $arch) if $tablet;
3635 my $kbd = print_keyboarddevice_full
($conf, $arch);
3636 push @$devices, '-device', $kbd if defined($kbd);
3639 my $bootorder = device_bootorder
($conf);
3641 # host pci device passthrough
3642 my ($kvm_off, $gpu_passthrough, $legacy_igd) = PVE
::QemuServer
::PCI
::print_hostpci_devices
(
3643 $vmid, $conf, $devices, $vga, $winversion, $q35, $bridges, $arch, $machine_type, $bootorder);
3646 my $usb_dev_features = {};
3647 $usb_dev_features->{spice_usb3
} = 1 if min_version
($machine_version, 4, 0);
3649 my @usbdevices = PVE
::QemuServer
::USB
::get_usb_devices
(
3650 $conf, $usbdesc->{format
}, $MAX_USB_DEVICES, $usb_dev_features, $bootorder);
3651 push @$devices, @usbdevices if @usbdevices;
3654 for (my $i = 0; $i < $MAX_SERIAL_PORTS; $i++) {
3655 my $path = $conf->{"serial$i"} or next;
3656 if ($path eq 'socket') {
3657 my $socket = "/var/run/qemu-server/${vmid}.serial$i";
3658 push @$devices, '-chardev', "socket,id=serial$i,path=$socket,server=on,wait=off";
3659 # On aarch64, serial0 is the UART device. Qemu only allows
3660 # connecting UART devices via the '-serial' command line, as
3661 # the device has a fixed slot on the hardware...
3662 if ($arch eq 'aarch64' && $i == 0) {
3663 push @$devices, '-serial', "chardev:serial$i";
3665 push @$devices, '-device', "isa-serial,chardev=serial$i";
3668 die "no such serial device\n" if ! -c
$path;
3669 push @$devices, '-chardev', "tty,id=serial$i,path=$path";
3670 push @$devices, '-device', "isa-serial,chardev=serial$i";
3675 for (my $i = 0; $i < $MAX_PARALLEL_PORTS; $i++) {
3676 if (my $path = $conf->{"parallel$i"}) {
3677 die "no such parallel device\n" if ! -c
$path;
3678 my $devtype = $path =~ m!^/dev/usb/lp! ?
'tty' : 'parport';
3679 push @$devices, '-chardev', "$devtype,id=parallel$i,path=$path";
3680 push @$devices, '-device', "isa-parallel,chardev=parallel$i";
3684 if (min_version
($machine_version, 4, 0) && (my $audio = conf_has_audio
($conf))) {
3685 my $audiopciaddr = print_pci_addr
("audio0", $bridges, $arch, $machine_type);
3686 my $audio_devs = audio_devs
($audio, $audiopciaddr, $machine_version);
3687 push @$devices, @$audio_devs;
3690 add_tpm_device
($vmid, $devices, $conf);
3693 $sockets = $conf->{smp
} if $conf->{smp
}; # old style - no longer iused
3694 $sockets = $conf->{sockets
} if $conf->{sockets
};
3696 my $cores = $conf->{cores
} || 1;
3698 my $maxcpus = $sockets * $cores;
3700 my $vcpus = $conf->{vcpus
} ?
$conf->{vcpus
} : $maxcpus;
3702 my $allowed_vcpus = $cpuinfo->{cpus
};
3704 die "MAX $allowed_vcpus vcpus allowed per VM on this node\n" if ($allowed_vcpus < $maxcpus);
3706 if ($hotplug_features->{cpu
} && min_version
($machine_version, 2, 7)) {
3707 push @$cmd, '-smp', "1,sockets=$sockets,cores=$cores,maxcpus=$maxcpus";
3708 for (my $i = 2; $i <= $vcpus; $i++) {
3709 my $cpustr = print_cpu_device
($conf,$i);
3710 push @$cmd, '-device', $cpustr;
3715 push @$cmd, '-smp', "$vcpus,sockets=$sockets,cores=$cores,maxcpus=$maxcpus";
3717 push @$cmd, '-nodefaults';
3719 push @$cmd, '-boot', "menu=on,strict=on,reboot-timeout=1000,splash=/usr/share/qemu-server/bootsplash.jpg";
3721 push @$cmd, '-no-acpi' if defined($conf->{acpi
}) && $conf->{acpi
} == 0;
3723 push @$cmd, '-no-reboot' if defined($conf->{reboot
}) && $conf->{reboot
} == 0;
3725 if ($vga->{type
} && $vga->{type
} !~ m/^serial\d+$/ && $vga->{type
} ne 'none'){
3726 push @$devices, '-device', print_vga_device
(
3727 $conf, $vga, $arch, $machine_version, $machine_type, undef, $qxlnum, $bridges);
3728 my $socket = PVE
::QemuServer
::Helpers
::vnc_socket
($vmid);
3729 push @$cmd, '-vnc', "unix:$socket,password=on";
3731 push @$cmd, '-vga', 'none' if $vga->{type
} eq 'none';
3732 push @$cmd, '-nographic';
3736 my $tdf = defined($conf->{tdf
}) ?
$conf->{tdf
} : $defaults->{tdf
};
3737 my $useLocaltime = $conf->{localtime};
3739 if ($winversion >= 5) { # windows
3740 $useLocaltime = 1 if !defined($conf->{localtime});
3742 # use time drift fix when acpi is enabled
3743 if (!(defined($conf->{acpi
}) && $conf->{acpi
} == 0)) {
3744 $tdf = 1 if !defined($conf->{tdf
});
3748 if ($winversion >= 6) {
3749 push @$globalFlags, 'kvm-pit.lost_tick_policy=discard';
3750 push @$cmd, '-no-hpet';
3753 push @$rtcFlags, 'driftfix=slew' if $tdf;
3755 if ($conf->{startdate
} && $conf->{startdate
} ne 'now') {
3756 push @$rtcFlags, "base=$conf->{startdate}";
3757 } elsif ($useLocaltime) {
3758 push @$rtcFlags, 'base=localtime';
3762 push @$cmd, '-cpu', $forcecpu;
3764 push @$cmd, get_cpu_options
($conf, $arch, $kvm, $kvm_off, $machine_version, $winversion, $gpu_passthrough);
3767 PVE
::QemuServer
::Memory
::config
($conf, $vmid, $sockets, $cores, $defaults, $hotplug_features, $cmd);
3769 push @$cmd, '-S' if $conf->{freeze
};
3771 push @$cmd, '-k', $conf->{keyboard
} if defined($conf->{keyboard
});
3773 my $guest_agent = parse_guest_agent
($conf);
3775 if ($guest_agent->{enabled
}) {
3776 my $qgasocket = PVE
::QemuServer
::Helpers
::qmp_socket
($vmid, 1);
3777 push @$devices, '-chardev', "socket,path=$qgasocket,server=on,wait=off,id=qga0";
3779 if (!$guest_agent->{type
} || $guest_agent->{type
} eq 'virtio') {
3780 my $pciaddr = print_pci_addr
("qga0", $bridges, $arch, $machine_type);
3781 push @$devices, '-device', "virtio-serial,id=qga0$pciaddr";
3782 push @$devices, '-device', 'virtserialport,chardev=qga0,name=org.qemu.guest_agent.0';
3783 } elsif ($guest_agent->{type
} eq 'isa') {
3784 push @$devices, '-device', "isa-serial,chardev=qga0";
3788 my $rng = $conf->{rng0
} ? parse_rng
($conf->{rng0
}) : undef;
3789 if ($rng && $version_guard->(4, 1, 2)) {
3790 check_rng_source
($rng->{source
});
3792 my $max_bytes = $rng->{max_bytes
} // $rng_fmt->{max_bytes
}->{default};
3793 my $period = $rng->{period
} // $rng_fmt->{period
}->{default};
3794 my $limiter_str = "";
3796 $limiter_str = ",max-bytes=$max_bytes,period=$period";
3799 my $rng_addr = print_pci_addr
("rng0", $bridges, $arch, $machine_type);
3800 push @$devices, '-object', "rng-random,filename=$rng->{source},id=rng0";
3801 push @$devices, '-device', "virtio-rng-pci,rng=rng0$limiter_str$rng_addr";
3809 for (my $i = 1; $i < $qxlnum; $i++){
3810 push @$devices, '-device', print_vga_device
(
3811 $conf, $vga, $arch, $machine_version, $machine_type, $i, $qxlnum, $bridges);
3814 # assume other OS works like Linux
3815 my ($ram, $vram) = ("134217728", "67108864");
3816 if ($vga->{memory
}) {
3817 $ram = PVE
::Tools
::convert_size
($qxlnum*4*$vga->{memory
}, 'mb' => 'b');
3818 $vram = PVE
::Tools
::convert_size
($qxlnum*2*$vga->{memory
}, 'mb' => 'b');
3820 push @$cmd, '-global', "qxl-vga.ram_size=$ram";
3821 push @$cmd, '-global', "qxl-vga.vram_size=$vram";
3825 my $pciaddr = print_pci_addr
("spice", $bridges, $arch, $machine_type);
3827 my $pfamily = PVE
::Tools
::get_host_address_family
($nodename);
3828 my @nodeaddrs = PVE
::Tools
::getaddrinfo_all
('localhost', family
=> $pfamily);
3829 die "failed to get an ip address of type $pfamily for 'localhost'\n" if !@nodeaddrs;
3831 push @$devices, '-device', "virtio-serial,id=spice$pciaddr";
3832 push @$devices, '-chardev', "spicevmc,id=vdagent,name=vdagent";
3833 push @$devices, '-device', "virtserialport,chardev=vdagent,name=com.redhat.spice.0";
3835 my $localhost = PVE
::Network
::addr_to_ip
($nodeaddrs[0]->{addr
});
3836 $spice_port = PVE
::Tools
::next_spice_port
($pfamily, $localhost);
3838 my $spice_enhancement_str = $conf->{spice_enhancements
} // '';
3839 my $spice_enhancement = parse_property_string
($spice_enhancements_fmt, $spice_enhancement_str);
3840 if ($spice_enhancement->{foldersharing
}) {
3841 push @$devices, '-chardev', "spiceport,id=foldershare,name=org.spice-space.webdav.0";
3842 push @$devices, '-device', "virtserialport,chardev=foldershare,name=org.spice-space.webdav.0";
3845 my $spice_opts = "tls-port=${spice_port},addr=$localhost,tls-ciphers=HIGH,seamless-migration=on";
3846 $spice_opts .= ",streaming-video=$spice_enhancement->{videostreaming}"
3847 if $spice_enhancement->{videostreaming
};
3849 push @$devices, '-spice', "$spice_opts";
3852 # enable balloon by default, unless explicitly disabled
3853 if (!defined($conf->{balloon
}) || $conf->{balloon
}) {
3854 my $pciaddr = print_pci_addr
("balloon0", $bridges, $arch, $machine_type);
3855 push @$devices, '-device', "virtio-balloon-pci,id=balloon0$pciaddr";
3858 if ($conf->{watchdog
}) {
3859 my $wdopts = parse_watchdog
($conf->{watchdog
});
3860 my $pciaddr = print_pci_addr
("watchdog", $bridges, $arch, $machine_type);
3861 my $watchdog = $wdopts->{model
} || 'i6300esb';
3862 push @$devices, '-device', "$watchdog$pciaddr";
3863 push @$devices, '-watchdog-action', $wdopts->{action
} if $wdopts->{action
};
3867 my $scsicontroller = {};
3868 my $ahcicontroller = {};
3869 my $scsihw = defined($conf->{scsihw
}) ?
$conf->{scsihw
} : $defaults->{scsihw
};
3871 # Add iscsi initiator name if available
3872 if (my $initiator = get_initiator_name
()) {
3873 push @$devices, '-iscsi', "initiator-name=$initiator";
3876 PVE
::QemuConfig-
>foreach_volume($conf, sub {
3877 my ($ds, $drive) = @_;
3879 if (PVE
::Storage
::parse_volume_id
($drive->{file
}, 1)) {
3880 check_volume_storage_type
($storecfg, $drive->{file
});
3881 push @$vollist, $drive->{file
};
3884 # ignore efidisk here, already added in bios/fw handling code above
3885 return if $drive->{interface
} eq 'efidisk';
3887 return if $drive->{interface
} eq 'tpmstate';
3889 $use_virtio = 1 if $ds =~ m/^virtio/;
3891 $drive->{bootindex
} = $bootorder->{$ds} if $bootorder->{$ds};
3893 if ($drive->{interface
} eq 'virtio'){
3894 push @$cmd, '-object', "iothread,id=iothread-$ds" if $drive->{iothread
};
3897 if ($drive->{interface
} eq 'scsi') {
3899 my ($maxdev, $controller, $controller_prefix) = scsihw_infos
($conf, $drive);
3901 die "scsi$drive->{index}: machine version 4.1~pve2 or higher is required to use more than 14 SCSI disks\n"
3902 if $drive->{index} > 13 && !&$version_guard(4, 1, 2);
3904 my $pciaddr = print_pci_addr
("$controller_prefix$controller", $bridges, $arch, $machine_type);
3905 my $scsihw_type = $scsihw =~ m/^virtio-scsi-single/ ?
"virtio-scsi-pci" : $scsihw;
3908 if($conf->{scsihw
} && $conf->{scsihw
} eq "virtio-scsi-single" && $drive->{iothread
}){
3909 $iothread .= ",iothread=iothread-$controller_prefix$controller";
3910 push @$cmd, '-object', "iothread,id=iothread-$controller_prefix$controller";
3911 } elsif ($drive->{iothread
}) {
3912 warn "iothread is only valid with virtio disk or virtio-scsi-single controller, ignoring\n";
3916 if($conf->{scsihw
} && $conf->{scsihw
} eq "virtio-scsi-single" && $drive->{queues
}){
3917 $queues = ",num_queues=$drive->{queues}";
3920 push @$devices, '-device', "$scsihw_type,id=$controller_prefix$controller$pciaddr$iothread$queues"
3921 if !$scsicontroller->{$controller};
3922 $scsicontroller->{$controller}=1;
3925 if ($drive->{interface
} eq 'sata') {
3926 my $controller = int($drive->{index} / $PVE::QemuServer
::Drive
::MAX_SATA_DISKS
);
3927 my $pciaddr = print_pci_addr
("ahci$controller", $bridges, $arch, $machine_type);
3928 push @$devices, '-device', "ahci,id=ahci$controller,multifunction=on$pciaddr"
3929 if !$ahcicontroller->{$controller};
3930 $ahcicontroller->{$controller}=1;
3933 my $pbs_conf = $pbs_backing->{$ds};
3934 my $pbs_name = undef;
3936 $pbs_name = "drive-$ds-pbs";
3937 push @$devices, '-blockdev', print_pbs_blockdev
($pbs_conf, $pbs_name);
3940 my $drive_cmd = print_drive_commandline_full
(
3941 $storecfg, $vmid, $drive, $pbs_name, min_version
($kvmver, 6, 0));
3943 # extra protection for templates, but SATA and IDE don't support it..
3944 $drive_cmd .= ',readonly=on' if drive_is_read_only
($conf, $drive);
3946 push @$devices, '-drive',$drive_cmd;
3947 push @$devices, '-device', print_drivedevice_full
(
3948 $storecfg, $conf, $vmid, $drive, $bridges, $arch, $machine_type);
3951 for (my $i = 0; $i < $MAX_NETS; $i++) {
3952 my $netname = "net$i";
3954 next if !$conf->{$netname};
3955 my $d = parse_net
($conf->{$netname});
3958 $use_virtio = 1 if $d->{model
} eq 'virtio';
3960 $d->{bootindex
} = $bootorder->{$netname} if $bootorder->{$netname};
3962 my $netdevfull = print_netdev_full
($vmid, $conf, $arch, $d, $netname);
3963 push @$devices, '-netdev', $netdevfull;
3965 my $netdevicefull = print_netdevice_full
(
3966 $vmid, $conf, $d, $netname, $bridges, $use_old_bios_files, $arch, $machine_type);
3968 push @$devices, '-device', $netdevicefull;
3971 if ($conf->{ivshmem
}) {
3972 my $ivshmem = parse_property_string
($ivshmem_fmt, $conf->{ivshmem
});
3976 $bus = print_pcie_addr
("ivshmem");
3978 $bus = print_pci_addr
("ivshmem", $bridges, $arch, $machine_type);
3981 my $ivshmem_name = $ivshmem->{name
} // $vmid;
3982 my $path = '/dev/shm/pve-shm-' . $ivshmem_name;
3984 push @$devices, '-device', "ivshmem-plain,memdev=ivshmem$bus,";
3985 push @$devices, '-object', "memory-backend-file,id=ivshmem,share=on,mem-path=$path"
3986 .",size=$ivshmem->{size}M";
3989 # pci.4 is nested in pci.1
3990 $bridges->{1} = 1 if $bridges->{4};
3992 if (!$q35) { # add pci bridges
3993 if (min_version
($machine_version, 2, 3)) {
3997 $bridges->{3} = 1 if $scsihw =~ m/^virtio-scsi-single/;
4000 for my $k (sort {$b cmp $a} keys %$bridges) {
4001 next if $q35 && $k < 4; # q35.cfg already includes bridges up to 3
4004 if ($k == 2 && $legacy_igd) {
4007 my $pciaddr = print_pci_addr
("pci.$k_name", undef, $arch, $machine_type);
4008 my $devstr = "pci-bridge,id=pci.$k,chassis_nr=$k$pciaddr";
4010 if ($q35) { # add after -readconfig pve-q35.cfg
4011 splice @$devices, 2, 0, '-device', $devstr;
4013 unshift @$devices, '-device', $devstr if $k > 0;
4018 push @$machineFlags, 'accel=tcg';
4021 push @$machineFlags, 'smm=off' if should_disable_smm
($conf, $vga);
4023 my $machine_type_min = $machine_type;
4024 if ($add_pve_version) {
4025 $machine_type_min =~ s/\+pve\d+$//;
4026 $machine_type_min .= "+pve$required_pve_version";
4028 push @$machineFlags, "type=${machine_type_min}";
4030 push @$cmd, @$devices;
4031 push @$cmd, '-rtc', join(',', @$rtcFlags) if scalar(@$rtcFlags);
4032 push @$cmd, '-machine', join(',', @$machineFlags) if scalar(@$machineFlags);
4033 push @$cmd, '-global', join(',', @$globalFlags) if scalar(@$globalFlags);
4035 if (my $vmstate = $conf->{vmstate
}) {
4036 my $statepath = PVE
::Storage
::path
($storecfg, $vmstate);
4037 push @$vollist, $vmstate;
4038 push @$cmd, '-loadstate', $statepath;
4039 print "activating and using '$vmstate' as vmstate\n";
4042 if (PVE
::QemuConfig-
>is_template($conf)) {
4043 # needed to workaround base volumes being read-only
4044 push @$cmd, '-snapshot';
4048 if ($conf->{args
}) {
4049 my $aa = PVE
::Tools
::split_args
($conf->{args
});
4053 return wantarray ?
($cmd, $vollist, $spice_port) : $cmd;
4056 sub check_rng_source
{
4059 # mostly relevant for /dev/hwrng, but doesn't hurt to check others too
4060 die "cannot create VirtIO RNG device: source file '$source' doesn't exist\n"
4063 my $rng_current = '/sys/devices/virtual/misc/hw_random/rng_current';
4064 if ($source eq '/dev/hwrng' && file_read_firstline
($rng_current) eq 'none') {
4065 # Needs to abort, otherwise QEMU crashes on first rng access. Note that rng_current cannot
4066 # be changed to 'none' manually, so once the VM is past this point, it's no longer an issue.
4067 die "Cannot start VM with passed-through RNG device: '/dev/hwrng' exists, but"
4068 ." '$rng_current' is set to 'none'. Ensure that a compatible hardware-RNG is attached"
4076 my $res = mon_cmd
($vmid, 'query-spice');
4078 return $res->{'tls-port'} || $res->{'port'} || die "no spice port\n";
4081 sub vm_devices_list
{
4084 my $res = mon_cmd
($vmid, 'query-pci');
4085 my $devices_to_check = [];
4087 foreach my $pcibus (@$res) {
4088 push @$devices_to_check, @{$pcibus->{devices
}},
4091 while (@$devices_to_check) {
4093 for my $d (@$devices_to_check) {
4094 $devices->{$d->{'qdev_id'}} = 1 if $d->{'qdev_id'};
4095 next if !$d->{'pci_bridge'};
4097 $devices->{$d->{'qdev_id'}} += scalar(@{$d->{'pci_bridge'}->{devices
}});
4098 push @$to_check, @{$d->{'pci_bridge'}->{devices
}};
4100 $devices_to_check = $to_check;
4103 my $resblock = mon_cmd
($vmid, 'query-block');
4104 foreach my $block (@$resblock) {
4105 if($block->{device
} =~ m/^drive-(\S+)/){
4110 my $resmice = mon_cmd
($vmid, 'query-mice');
4111 foreach my $mice (@$resmice) {
4112 if ($mice->{name
} eq 'QEMU HID Tablet') {
4113 $devices->{tablet
} = 1;
4118 # for usb devices there is no query-usb
4119 # but we can iterate over the entries in
4120 # qom-list path=/machine/peripheral
4121 my $resperipheral = mon_cmd
($vmid, 'qom-list', path
=> '/machine/peripheral');
4122 foreach my $per (@$resperipheral) {
4123 if ($per->{name
} =~ m/^usb\d+$/) {
4124 $devices->{$per->{name
}} = 1;
4132 my ($storecfg, $conf, $vmid, $deviceid, $device, $arch, $machine_type) = @_;
4134 my $q35 = PVE
::QemuServer
::Machine
::machine_type_is_q35
($conf);
4136 my $devices_list = vm_devices_list
($vmid);
4137 return 1 if defined($devices_list->{$deviceid});
4139 # add PCI bridge if we need it for the device
4140 qemu_add_pci_bridge
($storecfg, $conf, $vmid, $deviceid, $arch, $machine_type);
4142 if ($deviceid eq 'tablet') {
4143 qemu_deviceadd
($vmid, print_tabletdevice_full
($conf, $arch));
4144 } elsif ($deviceid eq 'keyboard') {
4145 qemu_deviceadd
($vmid, print_keyboarddevice_full
($conf, $arch));
4146 } elsif ($deviceid =~ m/^usb(\d+)$/) {
4147 die "usb hotplug currently not reliable\n";
4148 # since we can't reliably hot unplug all added usb devices and usb
4149 # passthrough breaks live migration we disable usb hotplugging for now
4150 #qemu_deviceadd($vmid, PVE::QemuServer::USB::print_usbdevice_full($conf, $deviceid, $device));
4151 } elsif ($deviceid =~ m/^(virtio)(\d+)$/) {
4152 qemu_iothread_add
($vmid, $deviceid, $device);
4154 qemu_driveadd
($storecfg, $vmid, $device);
4155 my $devicefull = print_drivedevice_full
($storecfg, $conf, $vmid, $device, undef, $arch, $machine_type);
4157 qemu_deviceadd
($vmid, $devicefull);
4158 eval { qemu_deviceaddverify
($vmid, $deviceid); };
4160 eval { qemu_drivedel
($vmid, $deviceid); };
4164 } elsif ($deviceid =~ m/^(virtioscsi|scsihw)(\d+)$/) {
4165 my $scsihw = defined($conf->{scsihw
}) ?
$conf->{scsihw
} : "lsi";
4166 my $pciaddr = print_pci_addr
($deviceid, undef, $arch, $machine_type);
4167 my $scsihw_type = $scsihw eq 'virtio-scsi-single' ?
"virtio-scsi-pci" : $scsihw;
4169 my $devicefull = "$scsihw_type,id=$deviceid$pciaddr";
4171 if($deviceid =~ m/^virtioscsi(\d+)$/ && $device->{iothread
}) {
4172 qemu_iothread_add
($vmid, $deviceid, $device);
4173 $devicefull .= ",iothread=iothread-$deviceid";
4176 if($deviceid =~ m/^virtioscsi(\d+)$/ && $device->{queues
}) {
4177 $devicefull .= ",num_queues=$device->{queues}";
4180 qemu_deviceadd
($vmid, $devicefull);
4181 qemu_deviceaddverify
($vmid, $deviceid);
4182 } elsif ($deviceid =~ m/^(scsi)(\d+)$/) {
4183 qemu_findorcreatescsihw
($storecfg,$conf, $vmid, $device, $arch, $machine_type);
4184 qemu_driveadd
($storecfg, $vmid, $device);
4186 my $devicefull = print_drivedevice_full
($storecfg, $conf, $vmid, $device, undef, $arch, $machine_type);
4187 eval { qemu_deviceadd
($vmid, $devicefull); };
4189 eval { qemu_drivedel
($vmid, $deviceid); };
4193 } elsif ($deviceid =~ m/^(net)(\d+)$/) {
4194 return if !qemu_netdevadd
($vmid, $conf, $arch, $device, $deviceid);
4196 my $machine_type = PVE
::QemuServer
::Machine
::qemu_machine_pxe
($vmid, $conf);
4197 my $use_old_bios_files = undef;
4198 ($use_old_bios_files, $machine_type) = qemu_use_old_bios_files
($machine_type);
4200 my $netdevicefull = print_netdevice_full
(
4201 $vmid, $conf, $device, $deviceid, undef, $use_old_bios_files, $arch, $machine_type);
4202 qemu_deviceadd
($vmid, $netdevicefull);
4204 qemu_deviceaddverify
($vmid, $deviceid);
4205 qemu_set_link_status
($vmid, $deviceid, !$device->{link_down
});
4208 eval { qemu_netdevdel
($vmid, $deviceid); };
4212 } elsif (!$q35 && $deviceid =~ m/^(pci\.)(\d+)$/) {
4214 my $pciaddr = print_pci_addr
($deviceid, undef, $arch, $machine_type);
4215 my $devicefull = "pci-bridge,id=pci.$bridgeid,chassis_nr=$bridgeid$pciaddr";
4217 qemu_deviceadd
($vmid, $devicefull);
4218 qemu_deviceaddverify
($vmid, $deviceid);
4220 die "can't hotplug device '$deviceid'\n";
4226 # fixme: this should raise exceptions on error!
4227 sub vm_deviceunplug
{
4228 my ($vmid, $conf, $deviceid) = @_;
4230 my $devices_list = vm_devices_list
($vmid);
4231 return 1 if !defined($devices_list->{$deviceid});
4233 my $bootdisks = PVE
::QemuServer
::Drive
::get_bootdisks
($conf);
4234 die "can't unplug bootdisk '$deviceid'\n" if grep {$_ eq $deviceid} @$bootdisks;
4236 if ($deviceid eq 'tablet' || $deviceid eq 'keyboard') {
4237 qemu_devicedel
($vmid, $deviceid);
4238 } elsif ($deviceid =~ m/^usb\d+$/) {
4239 die "usb hotplug currently not reliable\n";
4240 # when unplugging usb devices this way, there may be remaining usb
4241 # controllers/hubs so we disable it for now
4242 #qemu_devicedel($vmid, $deviceid);
4243 #qemu_devicedelverify($vmid, $deviceid);
4244 } elsif ($deviceid =~ m/^(virtio)(\d+)$/) {
4245 my $device = parse_drive
($deviceid, $conf->{$deviceid});
4247 qemu_devicedel
($vmid, $deviceid);
4248 qemu_devicedelverify
($vmid, $deviceid);
4249 qemu_drivedel
($vmid, $deviceid);
4250 qemu_iothread_del
($vmid, $deviceid, $device);
4251 } elsif ($deviceid =~ m/^(virtioscsi|scsihw)(\d+)$/) {
4252 qemu_devicedel
($vmid, $deviceid);
4253 qemu_devicedelverify
($vmid, $deviceid);
4254 } elsif ($deviceid =~ m/^(scsi)(\d+)$/) {
4255 my $device = parse_drive
($deviceid, $conf->{$deviceid});
4257 qemu_devicedel
($vmid, $deviceid);
4258 qemu_devicedelverify
($vmid, $deviceid);
4259 qemu_drivedel
($vmid, $deviceid);
4260 qemu_deletescsihw
($conf, $vmid, $deviceid);
4262 qemu_iothread_del
($vmid, "virtioscsi$device->{index}", $device)
4263 if $conf->{scsihw
} && ($conf->{scsihw
} eq 'virtio-scsi-single');
4264 } elsif ($deviceid =~ m/^(net)(\d+)$/) {
4265 qemu_devicedel
($vmid, $deviceid);
4266 qemu_devicedelverify
($vmid, $deviceid);
4267 qemu_netdevdel
($vmid, $deviceid);
4269 die "can't unplug device '$deviceid'\n";
4275 sub qemu_deviceadd
{
4276 my ($vmid, $devicefull) = @_;
4278 $devicefull = "driver=".$devicefull;
4279 my %options = split(/[=,]/, $devicefull);
4281 mon_cmd
($vmid, "device_add" , %options);
4284 sub qemu_devicedel
{
4285 my ($vmid, $deviceid) = @_;
4287 my $ret = mon_cmd
($vmid, "device_del", id
=> $deviceid);
4290 sub qemu_iothread_add
{
4291 my ($vmid, $deviceid, $device) = @_;
4293 if ($device->{iothread
}) {
4294 my $iothreads = vm_iothreads_list
($vmid);
4295 qemu_objectadd
($vmid, "iothread-$deviceid", "iothread") if !$iothreads->{"iothread-$deviceid"};
4299 sub qemu_iothread_del
{
4300 my ($vmid, $deviceid, $device) = @_;
4302 if ($device->{iothread
}) {
4303 my $iothreads = vm_iothreads_list
($vmid);
4304 qemu_objectdel
($vmid, "iothread-$deviceid") if $iothreads->{"iothread-$deviceid"};
4308 sub qemu_objectadd
{
4309 my ($vmid, $objectid, $qomtype) = @_;
4311 mon_cmd
($vmid, "object-add", id
=> $objectid, "qom-type" => $qomtype);
4316 sub qemu_objectdel
{
4317 my ($vmid, $objectid) = @_;
4319 mon_cmd
($vmid, "object-del", id
=> $objectid);
4325 my ($storecfg, $vmid, $device) = @_;
4327 my $kvmver = get_running_qemu_version
($vmid);
4328 my $io_uring = min_version
($kvmver, 6, 0);
4329 my $drive = print_drive_commandline_full
($storecfg, $vmid, $device, undef, $io_uring);
4330 $drive =~ s/\\/\\\\/g;
4331 my $ret = PVE
::QemuServer
::Monitor
::hmp_cmd
($vmid, "drive_add auto \"$drive\"");
4333 # If the command succeeds qemu prints: "OK
"
4334 return 1 if $ret =~ m/OK/s;
4336 die "adding drive failed
: $ret\n";
4340 my ($vmid, $deviceid) = @_;
4342 my $ret = PVE::QemuServer::Monitor::hmp_cmd($vmid, "drive_del drive-
$deviceid");
4345 return 1 if $ret eq "";
4347 # NB: device not found errors mean the drive was auto-deleted and we ignore the error
4348 return 1 if $ret =~ m/Device \'.*?\' not found/s;
4350 die "deleting drive
$deviceid failed
: $ret\n";
4353 sub qemu_deviceaddverify {
4354 my ($vmid, $deviceid) = @_;
4356 for (my $i = 0; $i <= 5; $i++) {
4357 my $devices_list = vm_devices_list($vmid);
4358 return 1 if defined($devices_list->{$deviceid});
4362 die "error on hotplug device
'$deviceid'\n";
4366 sub qemu_devicedelverify {
4367 my ($vmid, $deviceid) = @_;
4369 # need to verify that the device is correctly removed as device_del
4370 # is async and empty return is not reliable
4372 for (my $i = 0; $i <= 5; $i++) {
4373 my $devices_list = vm_devices_list($vmid);
4374 return 1 if !defined($devices_list->{$deviceid});
4378 die "error on hot-unplugging device
'$deviceid'\n";
4381 sub qemu_findorcreatescsihw {
4382 my ($storecfg, $conf, $vmid, $device, $arch, $machine_type) = @_;
4384 my ($maxdev, $controller, $controller_prefix) = scsihw_infos($conf, $device);
4386 my $scsihwid="$controller_prefix$controller";
4387 my $devices_list = vm_devices_list($vmid);
4389 if (!defined($devices_list->{$scsihwid})) {
4390 vm_deviceplug($storecfg, $conf, $vmid, $scsihwid, $device, $arch, $machine_type);
4396 sub qemu_deletescsihw {
4397 my ($conf, $vmid, $opt) = @_;
4399 my $device = parse_drive($opt, $conf->{$opt});
4401 if ($conf->{scsihw} && ($conf->{scsihw} eq 'virtio-scsi-single')) {
4402 vm_deviceunplug($vmid, $conf, "virtioscsi
$device->{index}");
4406 my ($maxdev, $controller, $controller_prefix) = scsihw_infos($conf, $device);
4408 my $devices_list = vm_devices_list($vmid);
4409 foreach my $opt (keys %{$devices_list}) {
4410 if (is_valid_drivename($opt)) {
4411 my $drive = parse_drive($opt, $conf->{$opt});
4412 if ($drive->{interface} eq 'scsi' && $drive->{index} < (($maxdev-1)*($controller+1))) {
4418 my $scsihwid="scsihw
$controller";
4420 vm_deviceunplug($vmid, $conf, $scsihwid);
4425 sub qemu_add_pci_bridge {
4426 my ($storecfg, $conf, $vmid, $device, $arch, $machine_type) = @_;
4432 print_pci_addr($device, $bridges, $arch, $machine_type);
4434 while (my ($k, $v) = each %$bridges) {
4437 return 1 if !defined($bridgeid) || $bridgeid < 1;
4439 my $bridge = "pci
.$bridgeid";
4440 my $devices_list = vm_devices_list($vmid);
4442 if (!defined($devices_list->{$bridge})) {
4443 vm_deviceplug($storecfg, $conf, $vmid, $bridge, $arch, $machine_type);
4449 sub qemu_set_link_status {
4450 my ($vmid, $device, $up) = @_;
4452 mon_cmd($vmid, "set_link
", name => $device,
4453 up => $up ? JSON::true : JSON::false);
4456 sub qemu_netdevadd {
4457 my ($vmid, $conf, $arch, $device, $deviceid) = @_;
4459 my $netdev = print_netdev_full($vmid, $conf, $arch, $device, $deviceid, 1);
4460 my %options = split(/[=,]/, $netdev);
4462 if (defined(my $vhost = $options{vhost})) {
4463 $options{vhost} = JSON::boolean(PVE::JSONSchema::parse_boolean($vhost));
4466 if (defined(my $queues = $options{queues})) {
4467 $options{queues} = $queues + 0;
4470 mon_cmd($vmid, "netdev_add
", %options);
4474 sub qemu_netdevdel {
4475 my ($vmid, $deviceid) = @_;
4477 mon_cmd($vmid, "netdev_del
", id => $deviceid);
4480 sub qemu_usb_hotplug {
4481 my ($storecfg, $conf, $vmid, $deviceid, $device, $arch, $machine_type) = @_;
4485 # remove the old one first
4486 vm_deviceunplug($vmid, $conf, $deviceid);
4488 # check if xhci controller is necessary and available
4489 if ($device->{usb3}) {
4491 my $devicelist = vm_devices_list($vmid);
4493 if (!$devicelist->{xhci}) {
4494 my $pciaddr = print_pci_addr("xhci
", undef, $arch, $machine_type);
4495 qemu_deviceadd($vmid, "nec-usb-xhci
,id
=xhci
$pciaddr");
4498 my $d = parse_usb_device($device->{host});
4499 $d->{usb3} = $device->{usb3};
4502 vm_deviceplug($storecfg, $conf, $vmid, $deviceid, $d, $arch, $machine_type);
4505 sub qemu_cpu_hotplug {
4506 my ($vmid, $conf, $vcpus) = @_;
4508 my $machine_type = PVE::QemuServer::Machine::get_current_qemu_machine($vmid);
4511 $sockets = $conf->{smp} if $conf->{smp}; # old style - no longer iused
4512 $sockets = $conf->{sockets} if $conf->{sockets};
4513 my $cores = $conf->{cores} || 1;
4514 my $maxcpus = $sockets * $cores;
4516 $vcpus = $maxcpus if !$vcpus;
4518 die "you can
't add more vcpus than maxcpus\n"
4519 if $vcpus > $maxcpus;
4521 my $currentvcpus = $conf->{vcpus} || $maxcpus;
4523 if ($vcpus < $currentvcpus) {
4525 if (PVE::QemuServer::Machine::machine_version($machine_type, 2, 7)) {
4527 for (my $i = $currentvcpus; $i > $vcpus; $i--) {
4528 qemu_devicedel($vmid, "cpu$i");
4530 my $currentrunningvcpus = undef;
4532 $currentrunningvcpus = mon_cmd($vmid, "query-cpus-fast");
4533 last if scalar(@{$currentrunningvcpus}) == $i-1;
4534 raise_param_exc({ vcpus => "error unplugging cpu$i" }) if $retry > 5;
4538 #update conf after each succesfull cpu unplug
4539 $conf->{vcpus} = scalar(@{$currentrunningvcpus});
4540 PVE::QemuConfig->write_config($vmid, $conf);
4543 die "cpu hot-unplugging requires qemu version 2.7 or higher\n";
4549 my $currentrunningvcpus = mon_cmd($vmid, "query-cpus-fast");
4550 die "vcpus in running vm does not match its configuration\n"
4551 if scalar(@{$currentrunningvcpus}) != $currentvcpus;
4553 if (PVE::QemuServer::Machine::machine_version($machine_type, 2, 7)) {
4555 for (my $i = $currentvcpus+1; $i <= $vcpus; $i++) {
4556 my $cpustr = print_cpu_device($conf, $i);
4557 qemu_deviceadd($vmid, $cpustr);
4560 my $currentrunningvcpus = undef;
4562 $currentrunningvcpus = mon_cmd($vmid, "query-cpus-fast");
4563 last if scalar(@{$currentrunningvcpus}) == $i;
4564 raise_param_exc({ vcpus => "error hotplugging cpu$i" }) if $retry > 10;
4568 #update conf after each succesfull cpu hotplug
4569 $conf->{vcpus} = scalar(@{$currentrunningvcpus});
4570 PVE::QemuConfig->write_config($vmid, $conf);
4574 for (my $i = $currentvcpus; $i < $vcpus; $i++) {
4575 mon_cmd($vmid, "cpu-add", id => int($i));
4580 sub qemu_block_set_io_throttle {
4581 my ($vmid, $deviceid,
4582 $bps, $bps_rd, $bps_wr, $iops, $iops_rd, $iops_wr,
4583 $bps_max, $bps_rd_max, $bps_wr_max, $iops_max, $iops_rd_max, $iops_wr_max,
4584 $bps_max_length, $bps_rd_max_length, $bps_wr_max_length,
4585 $iops_max_length, $iops_rd_max_length, $iops_wr_max_length) = @_;
4587 return if !check_running($vmid) ;
4589 mon_cmd($vmid, "block_set_io_throttle", device => $deviceid,
4591 bps_rd => int($bps_rd),
4592 bps_wr => int($bps_wr),
4594 iops_rd => int($iops_rd),
4595 iops_wr => int($iops_wr),
4596 bps_max => int($bps_max),
4597 bps_rd_max => int($bps_rd_max),
4598 bps_wr_max => int($bps_wr_max),
4599 iops_max => int($iops_max),
4600 iops_rd_max => int($iops_rd_max),
4601 iops_wr_max => int($iops_wr_max),
4602 bps_max_length => int($bps_max_length),
4603 bps_rd_max_length => int($bps_rd_max_length),
4604 bps_wr_max_length => int($bps_wr_max_length),
4605 iops_max_length => int($iops_max_length),
4606 iops_rd_max_length => int($iops_rd_max_length),
4607 iops_wr_max_length => int($iops_wr_max_length),
4612 sub qemu_block_resize {
4613 my ($vmid, $deviceid, $storecfg, $volid, $size) = @_;
4615 my $running = check_running($vmid);
4617 $size = 0 if !PVE::Storage::volume_resize($storecfg, $volid, $size, $running);
4619 return if !$running;
4621 my $padding = (1024 - $size % 1024) % 1024;
4622 $size = $size + $padding;
4627 device => $deviceid,
4633 sub qemu_volume_snapshot {
4634 my ($vmid, $deviceid, $storecfg, $volid, $snap) = @_;
4636 my $running = check_running($vmid);
4638 if ($running && do_snapshots_with_qemu($storecfg, $volid, $deviceid)) {
4639 mon_cmd($vmid, 'blockdev-snapshot-internal-sync
', device => $deviceid, name => $snap);
4641 PVE::Storage::volume_snapshot($storecfg, $volid, $snap);
4645 sub qemu_volume_snapshot_delete {
4646 my ($vmid, $deviceid, $storecfg, $volid, $snap) = @_;
4648 my $running = check_running($vmid);
4653 my $conf = PVE::QemuConfig->load_config($vmid);
4654 PVE::QemuConfig->foreach_volume($conf, sub {
4655 my ($ds, $drive) = @_;
4656 $running = 1 if $drive->{file} eq $volid;
4660 if ($running && do_snapshots_with_qemu($storecfg, $volid, $deviceid)) {
4661 mon_cmd($vmid, 'blockdev-snapshot-delete-internal-sync
', device => $deviceid, name => $snap);
4663 PVE::Storage::volume_snapshot_delete($storecfg, $volid, $snap, $running);
4667 sub set_migration_caps {
4668 my ($vmid, $savevm) = @_;
4670 my $qemu_support = eval { mon_cmd($vmid, "query-proxmox-support") };
4672 my $bitmap_prop = $savevm ? 'pbs-dirty-bitmap-savevm
' : 'pbs-dirty-bitmap-migration
';
4673 my $dirty_bitmaps = $qemu_support->{$bitmap_prop} ? 1 : 0;
4678 "auto-converge" => 1,
4680 "x-rdma-pin-all" => 0,
4683 "dirty-bitmaps" => $dirty_bitmaps,
4686 my $supported_capabilities = mon_cmd($vmid, "query-migrate-capabilities");
4688 for my $supported_capability (@$supported_capabilities) {
4690 capability => $supported_capability->{capability},
4691 state => $enabled_cap->{$supported_capability->{capability}} ? JSON::true : JSON::false,
4695 mon_cmd($vmid, "migrate-set-capabilities", capabilities => $cap_ref);
4699 my ($conf, $func, @param) = @_;
4703 my $test_volid = sub {
4704 my ($key, $drive, $snapname) = @_;
4706 my $volid = $drive->{file};
4709 $volhash->{$volid}->{cdrom} //= 1;
4710 $volhash->{$volid}->{cdrom} = 0 if !drive_is_cdrom($drive);
4712 my $replicate = $drive->{replicate} // 1;
4713 $volhash->{$volid}->{replicate} //= 0;
4714 $volhash->{$volid}->{replicate} = 1 if $replicate;
4716 $volhash->{$volid}->{shared} //= 0;
4717 $volhash->{$volid}->{shared} = 1 if $drive->{shared};
4719 $volhash->{$volid}->{referenced_in_config} //= 0;
4720 $volhash->{$volid}->{referenced_in_config} = 1 if !defined($snapname);
4722 $volhash->{$volid}->{referenced_in_snapshot}->{$snapname} = 1
4723 if defined($snapname);
4725 my $size = $drive->{size};
4726 $volhash->{$volid}->{size} //= $size if $size;
4728 $volhash->{$volid}->{is_vmstate} //= 0;
4729 $volhash->{$volid}->{is_vmstate} = 1 if $key eq 'vmstate
';
4731 $volhash->{$volid}->{is_tpmstate} //= 0;
4732 $volhash->{$volid}->{is_tpmstate} = 1 if $key eq 'tpmstate0
';
4734 $volhash->{$volid}->{is_unused} //= 0;
4735 $volhash->{$volid}->{is_unused} = 1 if $key =~ /^unused\d+$/;
4737 $volhash->{$volid}->{drivename} = $key if is_valid_drivename($key);
4740 my $include_opts = {
4741 extra_keys => ['vmstate
'],
4742 include_unused => 1,
4745 PVE::QemuConfig->foreach_volume_full($conf, $include_opts, $test_volid);
4746 foreach my $snapname (keys %{$conf->{snapshots}}) {
4747 my $snap = $conf->{snapshots}->{$snapname};
4748 PVE::QemuConfig->foreach_volume_full($snap, $include_opts, $test_volid, $snapname);
4751 foreach my $volid (keys %$volhash) {
4752 &$func($volid, $volhash->{$volid}, @param);
4756 my $fast_plug_option = {
4764 'vmstatestorage
' => 1,
4769 # hotplug changes in [PENDING]
4770 # $selection hash can be used to only apply specified options, for
4771 # example: { cores => 1 } (only apply changed 'cores
')
4772 # $errors ref is used to return error messages
4773 sub vmconfig_hotplug_pending {
4774 my ($vmid, $conf, $storecfg, $selection, $errors) = @_;
4776 my $defaults = load_defaults();
4777 my $arch = get_vm_arch($conf);
4778 my $machine_type = get_vm_machine($conf, undef, $arch);
4780 # commit values which do not have any impact on running VM first
4781 # Note: those option cannot raise errors, we we do not care about
4782 # $selection and always apply them.
4784 my $add_error = sub {
4785 my ($opt, $msg) = @_;
4786 $errors->{$opt} = "hotplug problem - $msg";
4790 foreach my $opt (keys %{$conf->{pending}}) { # add/change
4791 if ($fast_plug_option->{$opt}) {
4792 $conf->{$opt} = $conf->{pending}->{$opt};
4793 delete $conf->{pending}->{$opt};
4799 PVE::QemuConfig->write_config($vmid, $conf);
4802 my $hotplug_features = parse_hotplug_features(defined($conf->{hotplug}) ? $conf->{hotplug} : '1');
4804 my $cgroup = PVE::QemuServer::CGroup->new($vmid);
4805 my $pending_delete_hash = PVE::QemuConfig->parse_pending_delete($conf->{pending}->{delete});
4806 foreach my $opt (sort keys %$pending_delete_hash) {
4807 next if $selection && !$selection->{$opt};
4808 my $force = $pending_delete_hash->{$opt}->{force};
4810 if ($opt eq 'hotplug
') {
4811 die "skip\n" if ($conf->{hotplug} =~ /memory/);
4812 } elsif ($opt eq 'tablet
') {
4813 die "skip\n" if !$hotplug_features->{usb};
4814 if ($defaults->{tablet}) {
4815 vm_deviceplug($storecfg, $conf, $vmid, 'tablet
', $arch, $machine_type);
4816 vm_deviceplug($storecfg, $conf, $vmid, 'keyboard
', $arch, $machine_type)
4817 if $arch eq 'aarch64
';
4819 vm_deviceunplug($vmid, $conf, 'tablet
');
4820 vm_deviceunplug($vmid, $conf, 'keyboard
') if $arch eq 'aarch64
';
4822 } elsif ($opt =~ m/^usb\d+/) {
4824 # since we cannot reliably hot unplug usb devices we are disabling it
4825 #die "skip\n" if !$hotplug_features->{usb} || $conf->{$opt} =~ m/spice/i;
4826 #vm_deviceunplug($vmid, $conf, $opt);
4827 } elsif ($opt eq 'vcpus
') {
4828 die "skip\n" if !$hotplug_features->{cpu};
4829 qemu_cpu_hotplug($vmid, $conf, undef);
4830 } elsif ($opt eq 'balloon
') {
4831 # enable balloon device is not hotpluggable
4832 die "skip\n" if defined($conf->{balloon}) && $conf->{balloon} == 0;
4833 # here we reset the ballooning value to memory
4834 my $balloon = $conf->{memory} || $defaults->{memory};
4835 mon_cmd($vmid, "balloon", value => $balloon*1024*1024);
4836 } elsif ($fast_plug_option->{$opt}) {
4838 } elsif ($opt =~ m/^net(\d+)$/) {
4839 die "skip\n" if !$hotplug_features->{network};
4840 vm_deviceunplug($vmid, $conf, $opt);
4841 } elsif (is_valid_drivename($opt)) {
4842 die "skip\n" if !$hotplug_features->{disk} || $opt =~ m/(ide|sata)(\d+)/;
4843 vm_deviceunplug($vmid, $conf, $opt);
4844 vmconfig_delete_or_detach_drive($vmid, $storecfg, $conf, $opt, $force);
4845 } elsif ($opt =~ m/^memory$/) {
4846 die "skip\n" if !$hotplug_features->{memory};
4847 PVE::QemuServer::Memory::qemu_memory_hotplug($vmid, $conf, $defaults, $opt);
4848 } elsif ($opt eq 'cpuunits
') {
4849 $cgroup->change_cpu_shares(undef, 1024);
4850 } elsif ($opt eq 'cpulimit
') {
4851 $cgroup->change_cpu_quota(undef, undef); # reset, cgroup module can better decide values
4857 &$add_error($opt, $err) if $err ne "skip\n";
4859 delete $conf->{$opt};
4860 PVE::QemuConfig->remove_from_pending_delete($conf, $opt);
4864 my ($apply_pending_cloudinit, $apply_pending_cloudinit_done);
4865 $apply_pending_cloudinit = sub {
4866 return if $apply_pending_cloudinit_done; # once is enough
4867 $apply_pending_cloudinit_done = 1; # once is enough
4869 my ($key, $value) = @_;
4871 my @cloudinit_opts = keys %$confdesc_cloudinit;
4872 foreach my $opt (keys %{$conf->{pending}}) {
4873 next if !grep { $_ eq $opt } @cloudinit_opts;
4874 $conf->{$opt} = delete $conf->{pending}->{$opt};
4877 my $pending_delete_hash = PVE::QemuConfig->parse_pending_delete($conf->{pending}->{delete});
4878 foreach my $opt (sort keys %$pending_delete_hash) {
4879 next if !grep { $_ eq $opt } @cloudinit_opts;
4880 PVE::QemuConfig->remove_from_pending_delete($conf, $opt);
4881 delete $conf->{$opt};
4884 my $new_conf = { %$conf };
4885 $new_conf->{$key} = $value;
4886 PVE::QemuServer::Cloudinit::generate_cloudinitconfig($new_conf, $vmid);
4889 foreach my $opt (keys %{$conf->{pending}}) {
4890 next if $selection && !$selection->{$opt};
4891 my $value = $conf->{pending}->{$opt};
4893 if ($opt eq 'hotplug
') {
4894 die "skip\n" if ($value =~ /memory/) || ($value !~ /memory/ && $conf->{hotplug} =~ /memory/);
4895 } elsif ($opt eq 'tablet
') {
4896 die "skip\n" if !$hotplug_features->{usb};
4898 vm_deviceplug($storecfg, $conf, $vmid, 'tablet
', $arch, $machine_type);
4899 vm_deviceplug($storecfg, $conf, $vmid, 'keyboard
', $arch, $machine_type)
4900 if $arch eq 'aarch64
';
4901 } elsif ($value == 0) {
4902 vm_deviceunplug($vmid, $conf, 'tablet
');
4903 vm_deviceunplug($vmid, $conf, 'keyboard
') if $arch eq 'aarch64
';
4905 } elsif ($opt =~ m/^usb\d+$/) {
4907 # since we cannot reliably hot unplug usb devices we disable it for now
4908 #die "skip\n" if !$hotplug_features->{usb} || $value =~ m/spice/i;
4909 #my $d = eval { parse_property_string($usbdesc->{format}, $value) };
4910 #die "skip\n" if !$d;
4911 #qemu_usb_hotplug($storecfg, $conf, $vmid, $opt, $d, $arch, $machine_type);
4912 } elsif ($opt eq 'vcpus
') {
4913 die "skip\n" if !$hotplug_features->{cpu};
4914 qemu_cpu_hotplug($vmid, $conf, $value);
4915 } elsif ($opt eq 'balloon
') {
4916 # enable/disable balloning device is not hotpluggable
4917 my $old_balloon_enabled = !!(!defined($conf->{balloon}) || $conf->{balloon});
4918 my $new_balloon_enabled = !!(!defined($conf->{pending}->{balloon}) || $conf->{pending}->{balloon});
4919 die "skip\n" if $old_balloon_enabled != $new_balloon_enabled;
4921 # allow manual ballooning if shares is set to zero
4922 if ((defined($conf->{shares}) && ($conf->{shares} == 0))) {
4923 my $balloon = $conf->{pending}->{balloon} || $conf->{memory} || $defaults->{memory};
4924 mon_cmd($vmid, "balloon", value => $balloon*1024*1024);
4926 } elsif ($opt =~ m/^net(\d+)$/) {
4927 # some changes can be done without hotplug
4928 vmconfig_update_net($storecfg, $conf, $hotplug_features->{network},
4929 $vmid, $opt, $value, $arch, $machine_type);
4930 } elsif (is_valid_drivename($opt)) {
4931 die "skip\n" if $opt eq 'efidisk0
' || $opt eq 'tpmstate0
';
4932 # some changes can be done without hotplug
4933 my $drive = parse_drive($opt, $value);
4934 if (drive_is_cloudinit($drive)) {
4935 &$apply_pending_cloudinit($opt, $value);
4937 vmconfig_update_disk($storecfg, $conf, $hotplug_features->{disk},
4938 $vmid, $opt, $value, $arch, $machine_type);
4939 } elsif ($opt =~ m/^memory$/) { #dimms
4940 die "skip\n" if !$hotplug_features->{memory};
4941 $value = PVE::QemuServer::Memory::qemu_memory_hotplug($vmid, $conf, $defaults, $opt, $value);
4942 } elsif ($opt eq 'cpuunits
') {
4943 my $new_cpuunits = get_cpuunits({ $opt => $conf->{pending}->{$opt} }); # to clamp
4944 $cgroup->change_cpu_shares($new_cpuunits, 1024);
4945 } elsif ($opt eq 'cpulimit
') {
4946 my $cpulimit = $conf->{pending}->{$opt} == 0 ? -1 : int($conf->{pending}->{$opt} * 100000);
4947 $cgroup->change_cpu_quota($cpulimit, 100000);
4948 } elsif ($opt eq 'agent
') {
4949 vmconfig_update_agent($conf, $opt, $value);
4951 die "skip\n"; # skip non-hot-pluggable options
4955 &$add_error($opt, $err) if $err ne "skip\n";
4957 $conf->{$opt} = $value;
4958 delete $conf->{pending}->{$opt};
4962 PVE::QemuConfig->write_config($vmid, $conf);
4965 sub try_deallocate_drive {
4966 my ($storecfg, $vmid, $conf, $key, $drive, $rpcenv, $authuser, $force) = @_;
4968 if (($force || $key =~ /^unused/) && !drive_is_cdrom($drive, 1)) {
4969 my $volid = $drive->{file};
4970 if (vm_is_volid_owner($storecfg, $vmid, $volid)) {
4971 my $sid = PVE::Storage::parse_volume_id($volid);
4972 $rpcenv->check($authuser, "/storage/$sid", ['Datastore
.AllocateSpace
']);
4974 # check if the disk is really unused
4975 die "unable to delete '$volid' - volume is still in use (snapshot?)\n"
4976 if PVE::QemuServer::Drive::is_volume_in_use($storecfg, $conf, $key, $volid);
4977 PVE::Storage::vdisk_free($storecfg, $volid);
4980 # If vm is not owner of this disk remove from config
4988 sub vmconfig_delete_or_detach_drive {
4989 my ($vmid, $storecfg, $conf, $opt, $force) = @_;
4991 my $drive = parse_drive($opt, $conf->{$opt});
4993 my $rpcenv = PVE::RPCEnvironment::get();
4994 my $authuser = $rpcenv->get_user();
4997 $rpcenv->check_vm_perm($authuser, $vmid, undef, ['VM
.Config
.Disk
']);
4998 try_deallocate_drive($storecfg, $vmid, $conf, $opt, $drive, $rpcenv, $authuser, $force);
5000 vmconfig_register_unused_drive($storecfg, $vmid, $conf, $drive);
5006 sub vmconfig_apply_pending {
5007 my ($vmid, $conf, $storecfg, $errors) = @_;
5009 return if !scalar(keys %{$conf->{pending}});
5011 my $add_apply_error = sub {
5012 my ($opt, $msg) = @_;
5013 my $err_msg = "unable to apply pending change $opt : $msg";
5014 $errors->{$opt} = $err_msg;
5020 my $pending_delete_hash = PVE::QemuConfig->parse_pending_delete($conf->{pending}->{delete});
5021 foreach my $opt (sort keys %$pending_delete_hash) {
5022 my $force = $pending_delete_hash->{$opt}->{force};
5024 if ($opt =~ m/^unused/) {
5025 die "internal error";
5026 } elsif (defined($conf->{$opt}) && is_valid_drivename($opt)) {
5027 vmconfig_delete_or_detach_drive($vmid, $storecfg, $conf, $opt, $force);
5031 $add_apply_error->($opt, $err);
5033 PVE::QemuConfig->remove_from_pending_delete($conf, $opt);
5034 delete $conf->{$opt};
5038 PVE::QemuConfig->cleanup_pending($conf);
5040 foreach my $opt (keys %{$conf->{pending}}) { # add/change
5041 next if $opt eq 'delete'; # just to be sure
5043 if (defined($conf->{$opt}) && is_valid_drivename($opt)) {
5044 vmconfig_register_unused_drive($storecfg, $vmid, $conf, parse_drive($opt, $conf->{$opt}))
5048 $add_apply_error->($opt, $err);
5050 $conf->{$opt} = delete $conf->{pending}->{$opt};
5054 # write all changes at once to avoid unnecessary i/o
5055 PVE::QemuConfig->write_config($vmid, $conf);
5058 sub vmconfig_update_net {
5059 my ($storecfg, $conf, $hotplug, $vmid, $opt, $value, $arch, $machine_type) = @_;
5061 my $newnet = parse_net($value);
5063 if ($conf->{$opt}) {
5064 my $oldnet = parse_net($conf->{$opt});
5066 if (safe_string_ne($oldnet->{model}, $newnet->{model}) ||
5067 safe_string_ne($oldnet->{macaddr}, $newnet->{macaddr}) ||
5068 safe_num_ne($oldnet->{queues}, $newnet->{queues}) ||
5069 !($newnet->{bridge} && $oldnet->{bridge})) { # bridge/nat mode change
5071 # for non online change, we try to hot-unplug
5072 die "skip\n" if !$hotplug;
5073 vm_deviceunplug($vmid, $conf, $opt);
5076 die "internal error" if $opt !~ m/net(\d+)/;
5077 my $iface = "tap${vmid}i$1";
5079 if (safe_string_ne($oldnet->{bridge}, $newnet->{bridge}) ||
5080 safe_num_ne($oldnet->{tag}, $newnet->{tag}) ||
5081 safe_string_ne($oldnet->{trunks}, $newnet->{trunks}) ||
5082 safe_num_ne($oldnet->{firewall}, $newnet->{firewall})) {
5083 PVE::Network::tap_unplug($iface);
5086 PVE::Network::SDN::Zones::tap_plug($iface, $newnet->{bridge}, $newnet->{tag}, $newnet->{firewall}, $newnet->{trunks}, $newnet->{rate});
5088 PVE::Network::tap_plug($iface, $newnet->{bridge}, $newnet->{tag}, $newnet->{firewall}, $newnet->{trunks}, $newnet->{rate});
5090 } elsif (safe_num_ne($oldnet->{rate}, $newnet->{rate})) {
5091 # Rate can be applied on its own but any change above needs to
5092 # include the rate in tap_plug since OVS resets everything.
5093 PVE::Network::tap_rate_limit($iface, $newnet->{rate});
5096 if (safe_string_ne($oldnet->{link_down}, $newnet->{link_down})) {
5097 qemu_set_link_status($vmid, $opt, !$newnet->{link_down});
5105 vm_deviceplug($storecfg, $conf, $vmid, $opt, $newnet, $arch, $machine_type);
5111 sub vmconfig_update_agent {
5112 my ($conf, $opt, $value) = @_;
5114 die "skip\n" if !$conf->{$opt};
5116 my $hotplug_options = { fstrim_cloned_disks => 1 };
5118 my $old_agent = parse_guest_agent($conf);
5119 my $agent = parse_guest_agent({$opt => $value});
5121 for my $option (keys %$agent) { # added/changed options
5122 next if defined($hotplug_options->{$option});
5123 die "skip\n" if safe_string_ne($agent->{$option}, $old_agent->{$option});
5126 for my $option (keys %$old_agent) { # removed options
5127 next if defined($hotplug_options->{$option});
5128 die "skip\n" if safe_string_ne($old_agent->{$option}, $agent->{$option});
5131 return; # either no actual change (e.g., format string reordered) or just hotpluggable changes
5134 sub vmconfig_update_disk {
5135 my ($storecfg, $conf, $hotplug, $vmid, $opt, $value, $arch, $machine_type) = @_;
5137 my $drive = parse_drive($opt, $value);
5139 if ($conf->{$opt} && (my $old_drive = parse_drive($opt, $conf->{$opt}))) {
5140 my $media = $drive->{media} || 'disk
';
5141 my $oldmedia = $old_drive->{media} || 'disk
';
5142 die "unable to change media type\n" if $media ne $oldmedia;
5144 if (!drive_is_cdrom($old_drive)) {
5146 if ($drive->{file} ne $old_drive->{file}) {
5148 die "skip\n" if !$hotplug;
5150 # unplug and register as unused
5151 vm_deviceunplug($vmid, $conf, $opt);
5152 vmconfig_register_unused_drive($storecfg, $vmid, $conf, $old_drive)
5155 # update existing disk
5157 # skip non hotpluggable value
5158 if (safe_string_ne($drive->{discard}, $old_drive->{discard}) ||
5159 safe_string_ne($drive->{iothread}, $old_drive->{iothread}) ||
5160 safe_string_ne($drive->{queues}, $old_drive->{queues}) ||
5161 safe_string_ne($drive->{cache}, $old_drive->{cache}) ||
5162 safe_string_ne($drive->{ssd}, $old_drive->{ssd})) {
5167 if (safe_num_ne($drive->{mbps}, $old_drive->{mbps}) ||
5168 safe_num_ne($drive->{mbps_rd}, $old_drive->{mbps_rd}) ||
5169 safe_num_ne($drive->{mbps_wr}, $old_drive->{mbps_wr}) ||
5170 safe_num_ne($drive->{iops}, $old_drive->{iops}) ||
5171 safe_num_ne($drive->{iops_rd}, $old_drive->{iops_rd}) ||
5172 safe_num_ne($drive->{iops_wr}, $old_drive->{iops_wr}) ||
5173 safe_num_ne($drive->{mbps_max}, $old_drive->{mbps_max}) ||
5174 safe_num_ne($drive->{mbps_rd_max}, $old_drive->{mbps_rd_max}) ||
5175 safe_num_ne($drive->{mbps_wr_max}, $old_drive->{mbps_wr_max}) ||
5176 safe_num_ne($drive->{iops_max}, $old_drive->{iops_max}) ||
5177 safe_num_ne($drive->{iops_rd_max}, $old_drive->{iops_rd_max}) ||
5178 safe_num_ne($drive->{iops_wr_max}, $old_drive->{iops_wr_max}) ||
5179 safe_num_ne($drive->{bps_max_length}, $old_drive->{bps_max_length}) ||
5180 safe_num_ne($drive->{bps_rd_max_length}, $old_drive->{bps_rd_max_length}) ||
5181 safe_num_ne($drive->{bps_wr_max_length}, $old_drive->{bps_wr_max_length}) ||
5182 safe_num_ne($drive->{iops_max_length}, $old_drive->{iops_max_length}) ||
5183 safe_num_ne($drive->{iops_rd_max_length}, $old_drive->{iops_rd_max_length}) ||
5184 safe_num_ne($drive->{iops_wr_max_length}, $old_drive->{iops_wr_max_length})) {
5186 qemu_block_set_io_throttle(
5188 ($drive->{mbps} || 0)*1024*1024,
5189 ($drive->{mbps_rd} || 0)*1024*1024,
5190 ($drive->{mbps_wr} || 0)*1024*1024,
5191 $drive->{iops} || 0,
5192 $drive->{iops_rd} || 0,
5193 $drive->{iops_wr} || 0,
5194 ($drive->{mbps_max} || 0)*1024*1024,
5195 ($drive->{mbps_rd_max} || 0)*1024*1024,
5196 ($drive->{mbps_wr_max} || 0)*1024*1024,
5197 $drive->{iops_max} || 0,
5198 $drive->{iops_rd_max} || 0,
5199 $drive->{iops_wr_max} || 0,
5200 $drive->{bps_max_length} || 1,
5201 $drive->{bps_rd_max_length} || 1,
5202 $drive->{bps_wr_max_length} || 1,
5203 $drive->{iops_max_length} || 1,
5204 $drive->{iops_rd_max_length} || 1,
5205 $drive->{iops_wr_max_length} || 1,
5215 if ($drive->{file} eq 'none
') {
5216 mon_cmd($vmid, "eject", force => JSON::true, id => "$opt");
5217 if (drive_is_cloudinit($old_drive)) {
5218 vmconfig_register_unused_drive($storecfg, $vmid, $conf, $old_drive);
5221 my $path = get_iso_path($storecfg, $vmid, $drive->{file});
5223 # force eject if locked
5224 mon_cmd($vmid, "eject", force => JSON::true, id => "$opt");
5227 mon_cmd($vmid, "blockdev-change-medium",
5228 id => "$opt", filename => "$path");
5236 die "skip\n" if !$hotplug || $opt =~ m/(ide|sata)(\d+)/;
5238 PVE::Storage::activate_volumes($storecfg, [$drive->{file}]) if $drive->{file} !~ m|^/dev/.+|;
5239 vm_deviceplug($storecfg, $conf, $vmid, $opt, $drive, $arch, $machine_type);
5242 # called in locked context by incoming migration
5243 sub vm_migrate_get_nbd_disks {
5244 my ($storecfg, $conf, $replicated_volumes) = @_;
5246 my $local_volumes = {};
5247 PVE::QemuConfig->foreach_volume($conf, sub {
5248 my ($ds, $drive) = @_;
5250 return if drive_is_cdrom($drive);
5251 return if $ds eq 'tpmstate0
';
5253 my $volid = $drive->{file};
5257 my ($storeid, $volname) = PVE::Storage::parse_volume_id($volid);
5259 my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
5260 return if $scfg->{shared};
5262 # replicated disks re-use existing state via bitmap
5263 my $use_existing = $replicated_volumes->{$volid} ? 1 : 0;
5264 $local_volumes->{$ds} = [$volid, $storeid, $volname, $drive, $use_existing];
5266 return $local_volumes;
5269 # called in locked context by incoming migration
5270 sub vm_migrate_alloc_nbd_disks {
5271 my ($storecfg, $vmid, $source_volumes, $storagemap) = @_;
5274 foreach my $opt (sort keys %$source_volumes) {
5275 my ($volid, $storeid, $volname, $drive, $use_existing, $format) = @{$source_volumes->{$opt}};
5277 if ($use_existing) {
5278 $nbd->{$opt}->{drivestr} = print_drive($drive);
5279 $nbd->{$opt}->{volid} = $volid;
5280 $nbd->{$opt}->{replicated} = 1;
5284 # storage mapping + volname = regular migration
5285 # storage mapping + format = remote migration
5286 # order of precedence, filtered by whether storage supports it:
5287 # 1. explicit requested format
5288 # 2. format of current volume
5289 # 3. default format of storage
5290 if (!$storagemap->{identity}) {
5291 $storeid = PVE::JSONSchema::map_id($storagemap, $storeid);
5292 my ($defFormat, $validFormats) = PVE::Storage::storage_default_format($storecfg, $storeid);
5293 if (!$format || !grep { $format eq $_ } @$validFormats) {
5295 my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
5296 my $fileFormat = qemu_img_format($scfg, $volname);
5297 $format = $fileFormat
5298 if grep { $fileFormat eq $_ } @$validFormats;
5300 $format //= $defFormat;
5303 # can't happen
for remote migration
, so
$volname is always
defined
5304 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
5305 $format = qemu_img_format
($scfg, $volname);
5308 my $size = $drive->{size
} / 1024;
5309 my $newvolid = PVE
::Storage
::vdisk_alloc
($storecfg, $storeid, $vmid, $format, undef, $size);
5310 my $newdrive = $drive;
5311 $newdrive->{format
} = $format;
5312 $newdrive->{file
} = $newvolid;
5313 my $drivestr = print_drive
($newdrive);
5314 $nbd->{$opt}->{drivestr
} = $drivestr;
5315 $nbd->{$opt}->{volid
} = $newvolid;
5321 # see vm_start_nolock for parameters, additionally:
5323 # storagemap = parsed storage map for allocating NBD disks
5325 my ($storecfg, $vmid, $params, $migrate_opts) = @_;
5327 return PVE
::QemuConfig-
>lock_config($vmid, sub {
5328 my $conf = PVE
::QemuConfig-
>load_config($vmid, $migrate_opts->{migratedfrom
});
5330 die "you can't start a vm if it's a template\n"
5331 if !$params->{skiptemplate
} && PVE
::QemuConfig-
>is_template($conf);
5333 my $has_suspended_lock = PVE
::QemuConfig-
>has_lock($conf, 'suspended');
5334 my $has_backup_lock = PVE
::QemuConfig-
>has_lock($conf, 'backup');
5336 my $running = check_running
($vmid, undef, $migrate_opts->{migratedfrom
});
5338 if ($has_backup_lock && $running) {
5339 # a backup is currently running, attempt to start the guest in the
5340 # existing QEMU instance
5341 return vm_resume
($vmid);
5344 PVE
::QemuConfig-
>check_lock($conf)
5345 if !($params->{skiplock
} || $has_suspended_lock);
5347 $params->{resume
} = $has_suspended_lock || defined($conf->{vmstate
});
5349 die "VM $vmid already running\n" if $running;
5351 if (my $storagemap = $migrate_opts->{storagemap
}) {
5352 my $replicated = $migrate_opts->{replicated_volumes
};
5353 my $disks = vm_migrate_get_nbd_disks
($storecfg, $conf, $replicated);
5354 $migrate_opts->{nbd
} = vm_migrate_alloc_nbd_disks
($storecfg, $vmid, $disks, $storagemap);
5356 foreach my $opt (keys %{$migrate_opts->{nbd
}}) {
5357 $conf->{$opt} = $migrate_opts->{nbd
}->{$opt}->{drivestr
};
5361 return vm_start_nolock
($storecfg, $vmid, $conf, $params, $migrate_opts);
5367 # statefile => 'tcp', 'unix' for migration or path/volid for RAM state
5368 # skiplock => 0/1, skip checking for config lock
5369 # skiptemplate => 0/1, skip checking whether VM is template
5370 # forcemachine => to force Qemu machine (rollback/migration)
5371 # forcecpu => a QEMU '-cpu' argument string to override get_cpu_options
5372 # timeout => in seconds
5373 # paused => start VM in paused state (backup)
5374 # resume => resume from hibernation
5385 # nbd => volumes for NBD exports (vm_migrate_alloc_nbd_disks)
5386 # migratedfrom => source node
5387 # spice_ticket => used for spice migration, passed via tunnel/stdin
5388 # network => CIDR of migration network
5389 # type => secure/insecure - tunnel over encrypted connection or plain-text
5390 # nbd_proto_version => int, 0 for TCP, 1 for UNIX
5391 # replicated_volumes => which volids should be re-used with bitmaps for nbd migration
5392 # tpmstate_vol => new volid of tpmstate0, not yet contained in config
5393 sub vm_start_nolock
{
5394 my ($storecfg, $vmid, $conf, $params, $migrate_opts) = @_;
5396 my $statefile = $params->{statefile
};
5397 my $resume = $params->{resume
};
5399 my $migratedfrom = $migrate_opts->{migratedfrom
};
5400 my $migration_type = $migrate_opts->{type
};
5404 # clean up leftover reboot request files
5405 eval { clear_reboot_request
($vmid); };
5408 if (!$statefile && scalar(keys %{$conf->{pending
}})) {
5409 vmconfig_apply_pending
($vmid, $conf, $storecfg);
5410 $conf = PVE
::QemuConfig-
>load_config($vmid); # update/reload
5413 # don't regenerate the ISO if the VM is started as part of a live migration
5414 # this way we can reuse the old ISO with the correct config
5415 PVE
::QemuServer
::Cloudinit
::generate_cloudinitconfig
($conf, $vmid) if !$migratedfrom;
5417 # override TPM state vol if migrated, conf is out of date still
5418 if (my $tpmvol = $migrate_opts->{tpmstate_vol
}) {
5419 my $parsed = parse_drive
("tpmstate0", $conf->{tpmstate0
});
5420 $parsed->{file
} = $tpmvol;
5421 $conf->{tpmstate0
} = print_drive
($parsed);
5424 my $defaults = load_defaults
();
5426 # set environment variable useful inside network script
5427 $ENV{PVE_MIGRATED_FROM
} = $migratedfrom if $migratedfrom;
5429 PVE
::GuestHelpers
::exec_hookscript
($conf, $vmid, 'pre-start', 1);
5431 my $forcemachine = $params->{forcemachine
};
5432 my $forcecpu = $params->{forcecpu
};
5434 # enforce machine and CPU type on suspended vm to ensure HW compatibility
5435 $forcemachine = $conf->{runningmachine
};
5436 $forcecpu = $conf->{runningcpu
};
5437 print "Resuming suspended VM\n";
5440 my ($cmd, $vollist, $spice_port) = config_to_command
($storecfg, $vmid,
5441 $conf, $defaults, $forcemachine, $forcecpu, $params->{'pbs-backing'});
5444 my $get_migration_ip = sub {
5445 my ($nodename) = @_;
5447 return $migration_ip if defined($migration_ip);
5449 my $cidr = $migrate_opts->{network
};
5451 if (!defined($cidr)) {
5452 my $dc_conf = PVE
::Cluster
::cfs_read_file
('datacenter.cfg');
5453 $cidr = $dc_conf->{migration
}->{network
};
5456 if (defined($cidr)) {
5457 my $ips = PVE
::Network
::get_local_ip_from_cidr
($cidr);
5459 die "could not get IP: no address configured on local " .
5460 "node for network '$cidr'\n" if scalar(@$ips) == 0;
5462 die "could not get IP: multiple addresses configured on local " .
5463 "node for network '$cidr'\n" if scalar(@$ips) > 1;
5465 $migration_ip = @$ips[0];
5468 $migration_ip = PVE
::Cluster
::remote_node_ip
($nodename, 1)
5469 if !defined($migration_ip);
5471 return $migration_ip;
5476 if ($statefile eq 'tcp') {
5477 my $localip = "localhost";
5478 my $datacenterconf = PVE
::Cluster
::cfs_read_file
('datacenter.cfg');
5479 my $nodename = nodename
();
5481 if (!defined($migration_type)) {
5482 if (defined($datacenterconf->{migration
}->{type
})) {
5483 $migration_type = $datacenterconf->{migration
}->{type
};
5485 $migration_type = 'secure';
5489 if ($migration_type eq 'insecure') {
5490 $localip = $get_migration_ip->($nodename);
5491 $localip = "[$localip]" if Net
::IP
::ip_is_ipv6
($localip);
5494 my $pfamily = PVE
::Tools
::get_host_address_family
($nodename);
5495 my $migrate_port = PVE
::Tools
::next_migrate_port
($pfamily);
5496 $migrate_uri = "tcp:${localip}:${migrate_port}";
5497 push @$cmd, '-incoming', $migrate_uri;
5500 } elsif ($statefile eq 'unix') {
5501 # should be default for secure migrations as a ssh TCP forward
5502 # tunnel is not deterministic reliable ready and fails regurarly
5503 # to set up in time, so use UNIX socket forwards
5504 my $socket_addr = "/run/qemu-server/$vmid.migrate";
5505 unlink $socket_addr;
5507 $migrate_uri = "unix:$socket_addr";
5509 push @$cmd, '-incoming', $migrate_uri;
5512 } elsif (-e
$statefile) {
5513 push @$cmd, '-loadstate', $statefile;
5515 my $statepath = PVE
::Storage
::path
($storecfg, $statefile);
5516 push @$vollist, $statefile;
5517 push @$cmd, '-loadstate', $statepath;
5519 } elsif ($params->{paused
}) {
5523 my $start_timeout = $params->{timeout
} // config_aware_timeout
($conf, $resume);
5525 my $pci_devices = {}; # host pci devices
5526 for (my $i = 0; $i < $PVE::QemuServer
::PCI
::MAX_HOSTPCI_DEVICES
; $i++) {
5527 my $dev = $conf->{"hostpci$i"} or next;
5528 $pci_devices->{$i} = parse_hostpci
($dev);
5531 # do not reserve pciid for mediated devices, sysfs will error out for duplicate assignment
5532 my $real_pci_devices = [ grep { !(defined($_->{mdev
}) && scalar($_->{pciid
}->@*) == 1) } values $pci_devices->%* ];
5534 # map to a flat list of pci ids
5535 my $pci_id_list = [ map { $_->{id
} } map { $_->{pciid
}->@* } $real_pci_devices->@* ];
5537 # reserve all PCI IDs before actually doing anything with them
5538 PVE
::QemuServer
::PCI
::reserve_pci_usage
($pci_id_list, $vmid, $start_timeout);
5541 for my $id (sort keys %$pci_devices) {
5542 my $d = $pci_devices->{$id};
5543 for my $dev ($d->{pciid
}->@*) {
5544 PVE
::QemuServer
::PCI
::prepare_pci_device
($vmid, $dev->{id
}, $id, $d->{mdev
});
5549 eval { PVE
::QemuServer
::PCI
::remove_pci_reservation
($pci_id_list) };
5554 PVE
::Storage
::activate_volumes
($storecfg, $vollist);
5557 run_command
(['/bin/systemctl', 'stop', "$vmid.scope"], outfunc
=> sub{}, errfunc
=> sub{});
5559 # Issues with the above 'stop' not being fully completed are extremely rare, a very low
5560 # timeout should be more than enough here...
5561 PVE
::Systemd
::wait_for_unit_removed
("$vmid.scope", 20);
5563 my $cpuunits = get_cpuunits
($conf);
5566 timeout
=> $statefile ?
undef : $start_timeout,
5571 # when migrating, prefix QEMU output so other side can pick up any
5572 # errors that might occur and show the user
5573 if ($migratedfrom) {
5574 $run_params{quiet
} = 1;
5575 $run_params{logfunc
} = sub { print "QEMU: $_[0]\n" };
5578 my %systemd_properties = (
5579 Slice
=> 'qemu.slice',
5580 KillMode
=> 'process',
5582 TimeoutStopUSec
=> ULONG_MAX
, # infinity
5585 if (PVE
::CGroup
::cgroup_mode
() == 2) {
5586 $systemd_properties{CPUWeight
} = $cpuunits;
5588 $systemd_properties{CPUShares
} = $cpuunits;
5591 if (my $cpulimit = $conf->{cpulimit
}) {
5592 $systemd_properties{CPUQuota
} = int($cpulimit * 100);
5594 $systemd_properties{timeout
} = 10 if $statefile; # setting up the scope shoul be quick
5596 my $run_qemu = sub {
5597 PVE
::Tools
::run_fork
sub {
5598 PVE
::Systemd
::enter_systemd_scope
($vmid, "Proxmox VE VM $vmid", %systemd_properties);
5601 if (my $tpm = $conf->{tpmstate0
}) {
5602 # start the TPM emulator so QEMU can connect on start
5603 $tpmpid = start_swtpm
($storecfg, $vmid, $tpm, $migratedfrom);
5606 my $exitcode = run_command
($cmd, %run_params);
5609 warn "stopping swtpm instance (pid $tpmpid) due to QEMU startup error\n";
5610 kill 'TERM', $tpmpid;
5612 die "QEMU exited with code $exitcode\n";
5617 if ($conf->{hugepages
}) {
5620 my $hugepages_topology = PVE
::QemuServer
::Memory
::hugepages_topology
($conf);
5621 my $hugepages_host_topology = PVE
::QemuServer
::Memory
::hugepages_host_topology
();
5623 PVE
::QemuServer
::Memory
::hugepages_mount
();
5624 PVE
::QemuServer
::Memory
::hugepages_allocate
($hugepages_topology, $hugepages_host_topology);
5626 eval { $run_qemu->() };
5628 PVE
::QemuServer
::Memory
::hugepages_reset
($hugepages_host_topology)
5629 if !$conf->{keephugepages
};
5633 PVE
::QemuServer
::Memory
::hugepages_pre_deallocate
($hugepages_topology)
5634 if !$conf->{keephugepages
};
5636 eval { PVE
::QemuServer
::Memory
::hugepages_update_locked
($code); };
5639 eval { $run_qemu->() };
5643 # deactivate volumes if start fails
5644 eval { PVE
::Storage
::deactivate_volumes
($storecfg, $vollist); };
5645 eval { PVE
::QemuServer
::PCI
::remove_pci_reservation
($pci_id_list) };
5647 die "start failed: $err";
5650 # re-reserve all PCI IDs now that we can know the actual VM PID
5651 my $pid = PVE
::QemuServer
::Helpers
::vm_running_locally
($vmid);
5652 eval { PVE
::QemuServer
::PCI
::reserve_pci_usage
($pci_id_list, $vmid, undef, $pid) };
5655 print "migration listens on $migrate_uri\n" if $migrate_uri;
5656 $res->{migrate_uri
} = $migrate_uri;
5658 if ($statefile && $statefile ne 'tcp' && $statefile ne 'unix') {
5659 eval { mon_cmd
($vmid, "cont"); };
5663 #start nbd server for storage migration
5664 if (my $nbd = $migrate_opts->{nbd
}) {
5665 my $nbd_protocol_version = $migrate_opts->{nbd_proto_version
} // 0;
5667 my $migrate_storage_uri;
5668 # nbd_protocol_version > 0 for unix socket support
5669 if ($nbd_protocol_version > 0 && $migration_type eq 'secure') {
5670 my $socket_path = "/run/qemu-server/$vmid\_nbd.migrate";
5671 mon_cmd
($vmid, "nbd-server-start", addr
=> { type
=> 'unix', data
=> { path
=> $socket_path } } );
5672 $migrate_storage_uri = "nbd:unix:$socket_path";
5674 my $nodename = nodename
();
5675 my $localip = $get_migration_ip->($nodename);
5676 my $pfamily = PVE
::Tools
::get_host_address_family
($nodename);
5677 my $storage_migrate_port = PVE
::Tools
::next_migrate_port
($pfamily);
5679 mon_cmd
($vmid, "nbd-server-start", addr
=> {
5682 host
=> "${localip}",
5683 port
=> "${storage_migrate_port}",
5686 $localip = "[$localip]" if Net
::IP
::ip_is_ipv6
($localip);
5687 $migrate_storage_uri = "nbd:${localip}:${storage_migrate_port}";
5690 $res->{migrate_storage_uri
} = $migrate_storage_uri;
5692 foreach my $opt (sort keys %$nbd) {
5693 my $drivestr = $nbd->{$opt}->{drivestr
};
5694 my $volid = $nbd->{$opt}->{volid
};
5695 mon_cmd
($vmid, "nbd-server-add", device
=> "drive-$opt", writable
=> JSON
::true
);
5696 my $nbd_uri = "$migrate_storage_uri:exportname=drive-$opt";
5697 print "storage migration listens on $nbd_uri volume:$drivestr\n";
5698 print "re-using replicated volume: $opt - $volid\n"
5699 if $nbd->{$opt}->{replicated
};
5701 $res->{drives
}->{$opt} = $nbd->{$opt};
5702 $res->{drives
}->{$opt}->{nbd_uri
} = $nbd_uri;
5706 if ($migratedfrom) {
5708 set_migration_caps
($vmid);
5713 print "spice listens on port $spice_port\n";
5714 $res->{spice_port
} = $spice_port;
5715 if ($migrate_opts->{spice_ticket
}) {
5716 mon_cmd
($vmid, "set_password", protocol
=> 'spice', password
=>
5717 $migrate_opts->{spice_ticket
});
5718 mon_cmd
($vmid, "expire_password", protocol
=> 'spice', time => "+30");
5723 mon_cmd
($vmid, "balloon", value
=> $conf->{balloon
}*1024*1024)
5724 if !$statefile && $conf->{balloon
};
5726 foreach my $opt (keys %$conf) {
5727 next if $opt !~ m/^net\d+$/;
5728 my $nicconf = parse_net
($conf->{$opt});
5729 qemu_set_link_status
($vmid, $opt, 0) if $nicconf->{link_down
};
5733 mon_cmd
($vmid, 'qom-set',
5734 path
=> "machine/peripheral/balloon0",
5735 property
=> "guest-stats-polling-interval",
5736 value
=> 2) if (!defined($conf->{balloon
}) || $conf->{balloon
});
5739 print "Resumed VM, removing state\n";
5740 if (my $vmstate = $conf->{vmstate
}) {
5741 PVE
::Storage
::deactivate_volumes
($storecfg, [$vmstate]);
5742 PVE
::Storage
::vdisk_free
($storecfg, $vmstate);
5744 delete $conf->@{qw(lock vmstate runningmachine runningcpu)};
5745 PVE
::QemuConfig-
>write_config($vmid, $conf);
5748 PVE
::GuestHelpers
::exec_hookscript
($conf, $vmid, 'post-start');
5753 sub vm_commandline
{
5754 my ($storecfg, $vmid, $snapname) = @_;
5756 my $conf = PVE
::QemuConfig-
>load_config($vmid);
5758 my ($forcemachine, $forcecpu);
5760 my $snapshot = $conf->{snapshots
}->{$snapname};
5761 die "snapshot '$snapname' does not exist\n" if !defined($snapshot);
5763 # check for machine or CPU overrides in snapshot
5764 $forcemachine = $snapshot->{runningmachine
};
5765 $forcecpu = $snapshot->{runningcpu
};
5767 $snapshot->{digest
} = $conf->{digest
}; # keep file digest for API
5772 my $defaults = load_defaults
();
5774 my $cmd = config_to_command
($storecfg, $vmid, $conf, $defaults, $forcemachine, $forcecpu);
5776 return PVE
::Tools
::cmd2string
($cmd);
5780 my ($vmid, $skiplock) = @_;
5782 PVE
::QemuConfig-
>lock_config($vmid, sub {
5784 my $conf = PVE
::QemuConfig-
>load_config($vmid);
5786 PVE
::QemuConfig-
>check_lock($conf) if !$skiplock;
5788 mon_cmd
($vmid, "system_reset");
5792 sub get_vm_volumes
{
5796 foreach_volid
($conf, sub {
5797 my ($volid, $attr) = @_;
5799 return if $volid =~ m
|^/|;
5801 my ($sid, $volname) = PVE
::Storage
::parse_volume_id
($volid, 1);
5804 push @$vollist, $volid;
5810 sub vm_stop_cleanup
{
5811 my ($storecfg, $vmid, $conf, $keepActive, $apply_pending_changes) = @_;
5816 my $vollist = get_vm_volumes
($conf);
5817 PVE
::Storage
::deactivate_volumes
($storecfg, $vollist);
5819 if (my $tpmdrive = $conf->{tpmstate0
}) {
5820 my $tpm = parse_drive
("tpmstate0", $tpmdrive);
5821 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($tpm->{file
}, 1);
5823 PVE
::Storage
::unmap_volume
($storecfg, $tpm->{file
});
5828 foreach my $ext (qw(mon qmp pid vnc qga)) {
5829 unlink "/var/run/qemu-server/${vmid}.$ext";
5832 if ($conf->{ivshmem
}) {
5833 my $ivshmem = parse_property_string
($ivshmem_fmt, $conf->{ivshmem
});
5834 # just delete it for now, VMs which have this already open do not
5835 # are affected, but new VMs will get a separated one. If this
5836 # becomes an issue we either add some sort of ref-counting or just
5837 # add a "don't delete on stop" flag to the ivshmem format.
5838 unlink '/dev/shm/pve-shm-' . ($ivshmem->{name
} // $vmid);
5842 foreach my $key (keys %$conf) {
5843 next if $key !~ m/^hostpci(\d+)$/;
5844 my $hostpciindex = $1;
5845 my $d = parse_hostpci
($conf->{$key});
5846 my $uuid = PVE
::SysFSTools
::generate_mdev_uuid
($vmid, $hostpciindex);
5848 foreach my $pci (@{$d->{pciid
}}) {
5849 my $pciid = $pci->{id
};
5850 push @$ids, $pci->{id
};
5851 PVE
::SysFSTools
::pci_cleanup_mdev_device
($pciid, $uuid);
5854 PVE
::QemuServer
::PCI
::remove_pci_reservation
($ids);
5856 vmconfig_apply_pending
($vmid, $conf, $storecfg) if $apply_pending_changes;
5858 warn $@ if $@; # avoid errors - just warn
5861 # call only in locked context
5863 my ($storecfg, $vmid, $skiplock, $nocheck, $timeout, $shutdown, $force, $keepActive) = @_;
5865 my $pid = check_running
($vmid, $nocheck);
5870 $conf = PVE
::QemuConfig-
>load_config($vmid);
5871 PVE
::QemuConfig-
>check_lock($conf) if !$skiplock;
5872 if (!defined($timeout) && $shutdown && $conf->{startup
}) {
5873 my $opts = PVE
::JSONSchema
::pve_parse_startup_order
($conf->{startup
});
5874 $timeout = $opts->{down
} if $opts->{down
};
5876 PVE
::GuestHelpers
::exec_hookscript
($conf, $vmid, 'pre-stop');
5881 if (defined($conf) && get_qga_key
($conf, 'enabled')) {
5882 mon_cmd
($vmid, "guest-shutdown", timeout
=> $timeout);
5884 mon_cmd
($vmid, "system_powerdown");
5887 mon_cmd
($vmid, "quit");
5893 $timeout = 60 if !defined($timeout);
5896 while (($count < $timeout) && check_running
($vmid, $nocheck)) {
5901 if ($count >= $timeout) {
5903 warn "VM still running - terminating now with SIGTERM\n";
5906 die "VM quit/powerdown failed - got timeout\n";
5909 vm_stop_cleanup
($storecfg, $vmid, $conf, $keepActive, 1) if $conf;
5913 if (!check_running
($vmid, $nocheck)) {
5914 warn "Unexpected: VM shutdown command failed, but VM not running anymore..\n";
5918 warn "VM quit/powerdown failed - terminating now with SIGTERM\n";
5921 die "VM quit/powerdown failed\n";
5929 while (($count < $timeout) && check_running
($vmid, $nocheck)) {
5934 if ($count >= $timeout) {
5935 warn "VM still running - terminating now with SIGKILL\n";
5940 vm_stop_cleanup
($storecfg, $vmid, $conf, $keepActive, 1) if $conf;
5943 # Note: use $nocheck to skip tests if VM configuration file exists.
5944 # We need that when migration VMs to other nodes (files already moved)
5945 # Note: we set $keepActive in vzdump stop mode - volumes need to stay active
5947 my ($storecfg, $vmid, $skiplock, $nocheck, $timeout, $shutdown, $force, $keepActive, $migratedfrom) = @_;
5949 $force = 1 if !defined($force) && !$shutdown;
5952 my $pid = check_running
($vmid, $nocheck, $migratedfrom);
5953 kill 15, $pid if $pid;
5954 my $conf = PVE
::QemuConfig-
>load_config($vmid, $migratedfrom);
5955 vm_stop_cleanup
($storecfg, $vmid, $conf, $keepActive, 0);
5959 PVE
::QemuConfig-
>lock_config($vmid, sub {
5960 _do_vm_stop
($storecfg, $vmid, $skiplock, $nocheck, $timeout, $shutdown, $force, $keepActive);
5965 my ($vmid, $timeout) = @_;
5967 PVE
::QemuConfig-
>lock_config($vmid, sub {
5970 # only reboot if running, as qmeventd starts it again on a stop event
5971 return if !check_running
($vmid);
5973 create_reboot_request
($vmid);
5975 my $storecfg = PVE
::Storage
::config
();
5976 _do_vm_stop
($storecfg, $vmid, undef, undef, $timeout, 1);
5980 # avoid that the next normal shutdown will be confused for a reboot
5981 clear_reboot_request
($vmid);
5987 # note: if using the statestorage parameter, the caller has to check privileges
5989 my ($vmid, $skiplock, $includestate, $statestorage) = @_;
5996 PVE
::QemuConfig-
>lock_config($vmid, sub {
5998 $conf = PVE
::QemuConfig-
>load_config($vmid);
6000 my $is_backing_up = PVE
::QemuConfig-
>has_lock($conf, 'backup');
6001 PVE
::QemuConfig-
>check_lock($conf)
6002 if !($skiplock || $is_backing_up);
6004 die "cannot suspend to disk during backup\n"
6005 if $is_backing_up && $includestate;
6007 if ($includestate) {
6008 $conf->{lock} = 'suspending';
6009 my $date = strftime
("%Y-%m-%d", localtime(time()));
6010 $storecfg = PVE
::Storage
::config
();
6011 if (!$statestorage) {
6012 $statestorage = find_vmstate_storage
($conf, $storecfg);
6013 # check permissions for the storage
6014 my $rpcenv = PVE
::RPCEnvironment
::get
();
6015 if ($rpcenv->{type
} ne 'cli') {
6016 my $authuser = $rpcenv->get_user();
6017 $rpcenv->check($authuser, "/storage/$statestorage", ['Datastore.AllocateSpace']);
6022 $vmstate = PVE
::QemuConfig-
>__snapshot_save_vmstate(
6023 $vmid, $conf, "suspend-$date", $storecfg, $statestorage, 1);
6024 $path = PVE
::Storage
::path
($storecfg, $vmstate);
6025 PVE
::QemuConfig-
>write_config($vmid, $conf);
6027 mon_cmd
($vmid, "stop");
6031 if ($includestate) {
6033 PVE
::Storage
::activate_volumes
($storecfg, [$vmstate]);
6036 set_migration_caps
($vmid, 1);
6037 mon_cmd
($vmid, "savevm-start", statefile
=> $path);
6039 my $state = mon_cmd
($vmid, "query-savevm");
6040 if (!$state->{status
}) {
6041 die "savevm not active\n";
6042 } elsif ($state->{status
} eq 'active') {
6045 } elsif ($state->{status
} eq 'completed') {
6046 print "State saved, quitting\n";
6048 } elsif ($state->{status
} eq 'failed' && $state->{error
}) {
6049 die "query-savevm failed with error '$state->{error}'\n"
6051 die "query-savevm returned status '$state->{status}'\n";
6057 PVE
::QemuConfig-
>lock_config($vmid, sub {
6058 $conf = PVE
::QemuConfig-
>load_config($vmid);
6060 # cleanup, but leave suspending lock, to indicate something went wrong
6062 mon_cmd
($vmid, "savevm-end");
6063 PVE
::Storage
::deactivate_volumes
($storecfg, [$vmstate]);
6064 PVE
::Storage
::vdisk_free
($storecfg, $vmstate);
6065 delete $conf->@{qw(vmstate runningmachine runningcpu)};
6066 PVE
::QemuConfig-
>write_config($vmid, $conf);
6072 die "lock changed unexpectedly\n"
6073 if !PVE
::QemuConfig-
>has_lock($conf, 'suspending');
6075 mon_cmd
($vmid, "quit");
6076 $conf->{lock} = 'suspended';
6077 PVE
::QemuConfig-
>write_config($vmid, $conf);
6083 my ($vmid, $skiplock, $nocheck) = @_;
6085 PVE
::QemuConfig-
>lock_config($vmid, sub {
6086 my $res = mon_cmd
($vmid, 'query-status');
6087 my $resume_cmd = 'cont';
6090 if ($res->{status
}) {
6091 return if $res->{status
} eq 'running'; # job done, go home
6092 $resume_cmd = 'system_wakeup' if $res->{status
} eq 'suspended';
6093 $reset = 1 if $res->{status
} eq 'shutdown';
6098 my $conf = PVE
::QemuConfig-
>load_config($vmid);
6100 PVE
::QemuConfig-
>check_lock($conf)
6101 if !($skiplock || PVE
::QemuConfig-
>has_lock($conf, 'backup'));
6105 # required if a VM shuts down during a backup and we get a resume
6106 # request before the backup finishes for example
6107 mon_cmd
($vmid, "system_reset");
6109 mon_cmd
($vmid, $resume_cmd);
6114 my ($vmid, $skiplock, $key) = @_;
6116 PVE
::QemuConfig-
>lock_config($vmid, sub {
6118 my $conf = PVE
::QemuConfig-
>load_config($vmid);
6120 # there is no qmp command, so we use the human monitor command
6121 my $res = PVE
::QemuServer
::Monitor
::hmp_cmd
($vmid, "sendkey $key");
6122 die $res if $res ne '';
6126 # vzdump restore implementaion
6128 sub tar_archive_read_firstfile
{
6129 my $archive = shift;
6131 die "ERROR: file '$archive' does not exist\n" if ! -f
$archive;
6133 # try to detect archive type first
6134 my $pid = open (my $fh, '-|', 'tar', 'tf', $archive) ||
6135 die "unable to open file '$archive'\n";
6136 my $firstfile = <$fh>;
6140 die "ERROR: archive contaions no data\n" if !$firstfile;
6146 sub tar_restore_cleanup
{
6147 my ($storecfg, $statfile) = @_;
6149 print STDERR
"starting cleanup\n";
6151 if (my $fd = IO
::File-
>new($statfile, "r")) {
6152 while (defined(my $line = <$fd>)) {
6153 if ($line =~ m/vzdump:([^\s:]*):(\S+)$/) {
6156 if ($volid =~ m
|^/|) {
6157 unlink $volid || die 'unlink failed\n';
6159 PVE
::Storage
::vdisk_free
($storecfg, $volid);
6161 print STDERR
"temporary volume '$volid' sucessfuly removed\n";
6163 print STDERR
"unable to cleanup '$volid' - $@" if $@;
6165 print STDERR
"unable to parse line in statfile - $line";
6172 sub restore_file_archive
{
6173 my ($archive, $vmid, $user, $opts) = @_;
6175 return restore_vma_archive
($archive, $vmid, $user, $opts)
6178 my $info = PVE
::Storage
::archive_info
($archive);
6179 my $format = $opts->{format
} // $info->{format
};
6180 my $comp = $info->{compression
};
6182 # try to detect archive format
6183 if ($format eq 'tar') {
6184 return restore_tar_archive
($archive, $vmid, $user, $opts);
6186 return restore_vma_archive
($archive, $vmid, $user, $opts, $comp);
6190 # hepler to remove disks that will not be used after restore
6191 my $restore_cleanup_oldconf = sub {
6192 my ($storecfg, $vmid, $oldconf, $virtdev_hash) = @_;
6194 PVE
::QemuConfig-
>foreach_volume($oldconf, sub {
6195 my ($ds, $drive) = @_;
6197 return if drive_is_cdrom
($drive, 1);
6199 my $volid = $drive->{file
};
6200 return if !$volid || $volid =~ m
|^/|;
6202 my ($path, $owner) = PVE
::Storage
::path
($storecfg, $volid);
6203 return if !$path || !$owner || ($owner != $vmid);
6205 # Note: only delete disk we want to restore
6206 # other volumes will become unused
6207 if ($virtdev_hash->{$ds}) {
6208 eval { PVE
::Storage
::vdisk_free
($storecfg, $volid); };
6215 # delete vmstate files, after the restore we have no snapshots anymore
6216 foreach my $snapname (keys %{$oldconf->{snapshots
}}) {
6217 my $snap = $oldconf->{snapshots
}->{$snapname};
6218 if ($snap->{vmstate
}) {
6219 eval { PVE
::Storage
::vdisk_free
($storecfg, $snap->{vmstate
}); };
6227 # Helper to parse vzdump backup device hints
6229 # $rpcenv: Environment, used to ckeck storage permissions
6230 # $user: User ID, to check storage permissions
6231 # $storecfg: Storage configuration
6232 # $fh: the file handle for reading the configuration
6233 # $devinfo: should contain device sizes for all backu-up'ed devices
6234 # $options: backup options (pool, default storage)
6236 # Return: $virtdev_hash, updates $devinfo (add devname, virtdev, format, storeid)
6237 my $parse_backup_hints = sub {
6238 my ($rpcenv, $user, $storecfg, $fh, $devinfo, $options) = @_;
6240 my $check_storage = sub { # assert if an image can be allocate
6241 my ($storeid, $scfg) = @_;
6242 die "Content type 'images' is not available on storage '$storeid'\n"
6243 if !$scfg->{content
}->{images
};
6244 $rpcenv->check($user, "/storage/$storeid", ['Datastore.AllocateSpace'])
6245 if $user ne 'root@pam';
6248 my $virtdev_hash = {};
6249 while (defined(my $line = <$fh>)) {
6250 if ($line =~ m/^\#qmdump\#map:(\S+):(\S+):(\S*):(\S*):$/) {
6251 my ($virtdev, $devname, $storeid, $format) = ($1, $2, $3, $4);
6252 die "archive does not contain data for drive '$virtdev'\n"
6253 if !$devinfo->{$devname};
6255 if (defined($options->{storage
})) {
6256 $storeid = $options->{storage
} || 'local';
6257 } elsif (!$storeid) {
6260 $format = 'raw' if !$format;
6261 $devinfo->{$devname}->{devname
} = $devname;
6262 $devinfo->{$devname}->{virtdev
} = $virtdev;
6263 $devinfo->{$devname}->{format
} = $format;
6264 $devinfo->{$devname}->{storeid
} = $storeid;
6266 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
6267 $check_storage->($storeid, $scfg); # permission and content type check
6269 $virtdev_hash->{$virtdev} = $devinfo->{$devname};
6270 } elsif ($line =~ m/^((?:ide|sata|scsi)\d+):\s*(.*)\s*$/) {
6272 my $drive = parse_drive
($virtdev, $2);
6274 if (drive_is_cloudinit
($drive)) {
6275 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($drive->{file
});
6276 $storeid = $options->{storage
} if defined ($options->{storage
});
6277 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
6278 my $format = qemu_img_format
($scfg, $volname); # has 'raw' fallback
6280 $check_storage->($storeid, $scfg); # permission and content type check
6282 $virtdev_hash->{$virtdev} = {
6284 storeid
=> $storeid,
6285 size
=> PVE
::QemuServer
::Cloudinit
::CLOUDINIT_DISK_SIZE
,
6292 return $virtdev_hash;
6295 # Helper to allocate and activate all volumes required for a restore
6297 # $storecfg: Storage configuration
6298 # $virtdev_hash: as returned by parse_backup_hints()
6300 # Returns: { $virtdev => $volid }
6301 my $restore_allocate_devices = sub {
6302 my ($storecfg, $virtdev_hash, $vmid) = @_;
6305 foreach my $virtdev (sort keys %$virtdev_hash) {
6306 my $d = $virtdev_hash->{$virtdev};
6307 my $alloc_size = int(($d->{size
} + 1024 - 1)/1024);
6308 my $storeid = $d->{storeid
};
6309 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
6311 # test if requested format is supported
6312 my ($defFormat, $validFormats) = PVE
::Storage
::storage_default_format
($storecfg, $storeid);
6313 my $supported = grep { $_ eq $d->{format
} } @$validFormats;
6314 $d->{format
} = $defFormat if !$supported;
6317 if ($d->{is_cloudinit
}) {
6318 $name = "vm-$vmid-cloudinit";
6319 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
6320 if ($scfg->{path
}) {
6321 $name .= ".$d->{format}";
6325 my $volid = PVE
::Storage
::vdisk_alloc
(
6326 $storecfg, $storeid, $vmid, $d->{format
}, $name, $alloc_size);
6328 print STDERR
"new volume ID is '$volid'\n";
6329 $d->{volid
} = $volid;
6331 PVE
::Storage
::activate_volumes
($storecfg, [$volid]);
6333 $map->{$virtdev} = $volid;
6339 sub restore_update_config_line
{
6340 my ($cookie, $map, $line, $unique) = @_;
6342 return '' if $line =~ m/^\#qmdump\#/;
6343 return '' if $line =~ m/^\#vzdump\#/;
6344 return '' if $line =~ m/^lock:/;
6345 return '' if $line =~ m/^unused\d+:/;
6346 return '' if $line =~ m/^parent:/;
6350 my $dc = PVE
::Cluster
::cfs_read_file
('datacenter.cfg');
6351 if (($line =~ m/^(vlan(\d+)):\s*(\S+)\s*$/)) {
6352 # try to convert old 1.X settings
6353 my ($id, $ind, $ethcfg) = ($1, $2, $3);
6354 foreach my $devconfig (PVE
::Tools
::split_list
($ethcfg)) {
6355 my ($model, $macaddr) = split(/\=/, $devconfig);
6356 $macaddr = PVE
::Tools
::random_ether_addr
($dc->{mac_prefix
}) if !$macaddr || $unique;
6359 bridge
=> "vmbr$ind",
6360 macaddr
=> $macaddr,
6362 my $netstr = print_net
($net);
6364 $res .= "net$cookie->{netcount}: $netstr\n";
6365 $cookie->{netcount
}++;
6367 } elsif (($line =~ m/^(net\d+):\s*(\S+)\s*$/) && $unique) {
6368 my ($id, $netstr) = ($1, $2);
6369 my $net = parse_net
($netstr);
6370 $net->{macaddr
} = PVE
::Tools
::random_ether_addr
($dc->{mac_prefix
}) if $net->{macaddr
};
6371 $netstr = print_net
($net);
6372 $res .= "$id: $netstr\n";
6373 } elsif ($line =~ m/^((ide|scsi|virtio|sata|efidisk|tpmstate)\d+):\s*(\S+)\s*$/) {
6376 my $di = parse_drive
($virtdev, $value);
6377 if (defined($di->{backup
}) && !$di->{backup
}) {
6379 } elsif ($map->{$virtdev}) {
6380 delete $di->{format
}; # format can change on restore
6381 $di->{file
} = $map->{$virtdev};
6382 $value = print_drive
($di);
6383 $res .= "$virtdev: $value\n";
6387 } elsif (($line =~ m/^vmgenid: (.*)/)) {
6389 if ($vmgenid ne '0') {
6390 # always generate a new vmgenid if there was a valid one setup
6391 $vmgenid = generate_uuid
();
6393 $res .= "vmgenid: $vmgenid\n";
6394 } elsif (($line =~ m/^(smbios1: )(.*)/) && $unique) {
6395 my ($uuid, $uuid_str);
6396 UUID
::generate
($uuid);
6397 UUID
::unparse
($uuid, $uuid_str);
6398 my $smbios1 = parse_smbios1
($2);
6399 $smbios1->{uuid
} = $uuid_str;
6400 $res .= $1.print_smbios1
($smbios1)."\n";
6408 my $restore_deactivate_volumes = sub {
6409 my ($storecfg, $devinfo) = @_;
6412 foreach my $devname (keys %$devinfo) {
6413 my $volid = $devinfo->{$devname}->{volid
};
6414 push @$vollist, $volid if $volid;
6417 PVE
::Storage
::deactivate_volumes
($storecfg, $vollist);
6420 my $restore_destroy_volumes = sub {
6421 my ($storecfg, $devinfo) = @_;
6423 foreach my $devname (keys %$devinfo) {
6424 my $volid = $devinfo->{$devname}->{volid
};
6427 if ($volid =~ m
|^/|) {
6428 unlink $volid || die 'unlink failed\n';
6430 PVE
::Storage
::vdisk_free
($storecfg, $volid);
6432 print STDERR
"temporary volume '$volid' sucessfuly removed\n";
6434 print STDERR
"unable to cleanup '$volid' - $@" if $@;
6439 my ($cfg, $vmid) = @_;
6441 my $info = PVE
::Storage
::vdisk_list
($cfg, undef, $vmid, undef, 'images');
6443 my $volid_hash = {};
6444 foreach my $storeid (keys %$info) {
6445 foreach my $item (@{$info->{$storeid}}) {
6446 next if !($item->{volid
} && $item->{size
});
6447 $item->{path
} = PVE
::Storage
::path
($cfg, $item->{volid
});
6448 $volid_hash->{$item->{volid
}} = $item;
6455 sub update_disk_config
{
6456 my ($vmid, $conf, $volid_hash) = @_;
6459 my $prefix = "VM $vmid";
6461 # used and unused disks
6462 my $referenced = {};
6464 # Note: it is allowed to define multiple storages with same path (alias), so
6465 # we need to check both 'volid' and real 'path' (two different volid can point
6466 # to the same path).
6468 my $referencedpath = {};
6471 PVE
::QemuConfig-
>foreach_volume($conf, sub {
6472 my ($opt, $drive) = @_;
6474 my $volid = $drive->{file
};
6476 my $volume = $volid_hash->{$volid};
6478 # mark volid as "in-use" for next step
6479 $referenced->{$volid} = 1;
6480 if ($volume && (my $path = $volume->{path
})) {
6481 $referencedpath->{$path} = 1;
6484 return if drive_is_cdrom
($drive);
6487 my ($updated, $msg) = PVE
::QemuServer
::Drive
::update_disksize
($drive, $volume->{size
});
6488 if (defined($updated)) {
6490 $conf->{$opt} = print_drive
($updated);
6491 print "$prefix ($opt): $msg\n";
6495 # remove 'unusedX' entry if volume is used
6496 PVE
::QemuConfig-
>foreach_unused_volume($conf, sub {
6497 my ($opt, $drive) = @_;
6499 my $volid = $drive->{file
};
6503 $path = $volid_hash->{$volid}->{path
} if $volid_hash->{$volid};
6504 if ($referenced->{$volid} || ($path && $referencedpath->{$path})) {
6505 print "$prefix remove entry '$opt', its volume '$volid' is in use\n";
6507 delete $conf->{$opt};
6510 $referenced->{$volid} = 1;
6511 $referencedpath->{$path} = 1 if $path;
6514 foreach my $volid (sort keys %$volid_hash) {
6515 next if $volid =~ m/vm-$vmid-state-/;
6516 next if $referenced->{$volid};
6517 my $path = $volid_hash->{$volid}->{path
};
6518 next if !$path; # just to be sure
6519 next if $referencedpath->{$path};
6521 my $key = PVE
::QemuConfig-
>add_unused_volume($conf, $volid);
6522 print "$prefix add unreferenced volume '$volid' as '$key' to config\n";
6523 $referencedpath->{$path} = 1; # avoid to add more than once (aliases)
6530 my ($vmid, $nolock, $dryrun) = @_;
6532 my $cfg = PVE
::Storage
::config
();
6534 print "rescan volumes...\n";
6535 my $volid_hash = scan_volids
($cfg, $vmid);
6537 my $updatefn = sub {
6540 my $conf = PVE
::QemuConfig-
>load_config($vmid);
6542 PVE
::QemuConfig-
>check_lock($conf);
6545 foreach my $volid (keys %$volid_hash) {
6546 my $info = $volid_hash->{$volid};
6547 $vm_volids->{$volid} = $info if $info->{vmid
} && $info->{vmid
} == $vmid;
6550 my $changes = update_disk_config
($vmid, $conf, $vm_volids);
6552 PVE
::QemuConfig-
>write_config($vmid, $conf) if $changes && !$dryrun;
6555 if (defined($vmid)) {
6559 PVE
::QemuConfig-
>lock_config($vmid, $updatefn, $vmid);
6562 my $vmlist = config_list
();
6563 foreach my $vmid (keys %$vmlist) {
6567 PVE
::QemuConfig-
>lock_config($vmid, $updatefn, $vmid);
6573 sub restore_proxmox_backup_archive
{
6574 my ($archive, $vmid, $user, $options) = @_;
6576 my $storecfg = PVE
::Storage
::config
();
6578 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($archive);
6579 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
6581 my $fingerprint = $scfg->{fingerprint
};
6582 my $keyfile = PVE
::Storage
::PBSPlugin
::pbs_encryption_key_file_name
($storecfg, $storeid);
6584 my $repo = PVE
::PBSClient
::get_repository
($scfg);
6586 # This is only used for `pbs-restore` and the QEMU PBS driver (live-restore)
6587 my $password = PVE
::Storage
::PBSPlugin
::pbs_get_password
($scfg, $storeid);
6588 local $ENV{PBS_PASSWORD
} = $password;
6589 local $ENV{PBS_FINGERPRINT
} = $fingerprint if defined($fingerprint);
6591 my ($vtype, $pbs_backup_name, undef, undef, undef, undef, $format) =
6592 PVE
::Storage
::parse_volname
($storecfg, $archive);
6594 die "got unexpected vtype '$vtype'\n" if $vtype ne 'backup';
6596 die "got unexpected backup format '$format'\n" if $format ne 'pbs-vm';
6598 my $tmpdir = "/var/tmp/vzdumptmp$$";
6602 my $conffile = PVE
::QemuConfig-
>config_file($vmid);
6603 # disable interrupts (always do cleanups)
6607 local $SIG{HUP
} = sub { print STDERR
"got interrupt - ignored\n"; };
6609 # Note: $oldconf is undef if VM does not exists
6610 my $cfs_path = PVE
::QemuConfig-
>cfs_config_path($vmid);
6611 my $oldconf = PVE
::Cluster
::cfs_read_file
($cfs_path);
6612 my $new_conf_raw = '';
6614 my $rpcenv = PVE
::RPCEnvironment
::get
();
6623 local $SIG{PIPE
} = sub { die "interrupted by signal\n"; };
6625 my $cfgfn = "$tmpdir/qemu-server.conf";
6626 my $firewall_config_fn = "$tmpdir/fw.conf";
6627 my $index_fn = "$tmpdir/index.json";
6629 my $cmd = "restore";
6631 my $param = [$pbs_backup_name, "index.json", $index_fn];
6632 PVE
::Storage
::PBSPlugin
::run_raw_client_cmd
($scfg, $storeid, $cmd, $param);
6633 my $index = PVE
::Tools
::file_get_contents
($index_fn);
6634 $index = decode_json
($index);
6636 # print Dumper($index);
6637 foreach my $info (@{$index->{files
}}) {
6638 if ($info->{filename
} =~ m/^(drive-\S+).img.fidx$/) {
6640 if ($info->{size
} =~ m/^(\d+)$/) { # untaint size
6641 $devinfo->{$devname}->{size
} = $1;
6643 die "unable to parse file size in 'index.json' - got '$info->{size}'\n";
6648 my $is_qemu_server_backup = scalar(
6649 grep { $_->{filename
} eq 'qemu-server.conf.blob' } @{$index->{files
}}
6651 if (!$is_qemu_server_backup) {
6652 die "backup does not look like a qemu-server backup (missing 'qemu-server.conf' file)\n";
6654 my $has_firewall_config = scalar(grep { $_->{filename
} eq 'fw.conf.blob' } @{$index->{files
}});
6656 $param = [$pbs_backup_name, "qemu-server.conf", $cfgfn];
6657 PVE
::Storage
::PBSPlugin
::run_raw_client_cmd
($scfg, $storeid, $cmd, $param);
6659 if ($has_firewall_config) {
6660 $param = [$pbs_backup_name, "fw.conf", $firewall_config_fn];
6661 PVE
::Storage
::PBSPlugin
::run_raw_client_cmd
($scfg, $storeid, $cmd, $param);
6663 my $pve_firewall_dir = '/etc/pve/firewall';
6664 mkdir $pve_firewall_dir; # make sure the dir exists
6665 PVE
::Tools
::file_copy
($firewall_config_fn, "${pve_firewall_dir}/$vmid.fw");
6668 my $fh = IO
::File-
>new($cfgfn, "r") ||
6669 die "unable to read qemu-server.conf - $!\n";
6671 my $virtdev_hash = $parse_backup_hints->($rpcenv, $user, $storecfg, $fh, $devinfo, $options);
6673 # fixme: rate limit?
6675 # create empty/temp config
6676 PVE
::Tools
::file_set_contents
($conffile, "memory: 128\nlock: create");
6678 $restore_cleanup_oldconf->($storecfg, $vmid, $oldconf, $virtdev_hash) if $oldconf;
6681 my $map = $restore_allocate_devices->($storecfg, $virtdev_hash, $vmid);
6683 foreach my $virtdev (sort keys %$virtdev_hash) {
6684 my $d = $virtdev_hash->{$virtdev};
6685 next if $d->{is_cloudinit
}; # no need to restore cloudinit
6687 # this fails if storage is unavailable
6688 my $volid = $d->{volid
};
6689 my $path = PVE
::Storage
::path
($storecfg, $volid);
6691 # for live-restore we only want to preload the efidisk and TPM state
6692 next if $options->{live
} && $virtdev ne 'efidisk0' && $virtdev ne 'tpmstate0';
6694 my $pbs_restore_cmd = [
6695 '/usr/bin/pbs-restore',
6696 '--repository', $repo,
6698 "$d->{devname}.img.fidx",
6703 push @$pbs_restore_cmd, '--format', $d->{format
} if $d->{format
};
6704 push @$pbs_restore_cmd, '--keyfile', $keyfile if -e
$keyfile;
6706 if (PVE
::Storage
::volume_has_feature
($storecfg, 'sparseinit', $volid)) {
6707 push @$pbs_restore_cmd, '--skip-zero';
6710 my $dbg_cmdstring = PVE
::Tools
::cmd2string
($pbs_restore_cmd);
6711 print "restore proxmox backup image: $dbg_cmdstring\n";
6712 run_command
($pbs_restore_cmd);
6715 $fh->seek(0, 0) || die "seek failed - $!\n";
6717 my $cookie = { netcount
=> 0 };
6718 while (defined(my $line = <$fh>)) {
6719 $new_conf_raw .= restore_update_config_line
(
6731 if ($err || !$options->{live
}) {
6732 $restore_deactivate_volumes->($storecfg, $devinfo);
6738 $restore_destroy_volumes->($storecfg, $devinfo);
6742 if ($options->{live
}) {
6743 # keep lock during live-restore
6744 $new_conf_raw .= "\nlock: create";
6747 PVE
::Tools
::file_set_contents
($conffile, $new_conf_raw);
6749 PVE
::Cluster
::cfs_update
(); # make sure we read new file
6751 eval { rescan
($vmid, 1); };
6754 PVE
::AccessControl
::add_vm_to_pool
($vmid, $options->{pool
}) if $options->{pool
};
6756 if ($options->{live
}) {
6762 local $SIG{PIPE
} = sub { die "got signal ($!) - abort\n"; };
6764 my $conf = PVE
::QemuConfig-
>load_config($vmid);
6765 die "cannot do live-restore for template\n" if PVE
::QemuConfig-
>is_template($conf);
6767 # these special drives are already restored before start
6768 delete $devinfo->{'drive-efidisk0'};
6769 delete $devinfo->{'drive-tpmstate0-backup'};
6770 pbs_live_restore
($vmid, $conf, $storecfg, $devinfo, $repo, $keyfile, $pbs_backup_name);
6772 PVE
::QemuConfig-
>remove_lock($vmid, "create");
6776 sub pbs_live_restore
{
6777 my ($vmid, $conf, $storecfg, $restored_disks, $repo, $keyfile, $snap) = @_;
6779 print "starting VM for live-restore\n";
6780 print "repository: '$repo', snapshot: '$snap'\n";
6782 my $pbs_backing = {};
6783 for my $ds (keys %$restored_disks) {
6784 $ds =~ m/^drive-(.*)$/;
6786 $pbs_backing->{$confname} = {
6787 repository
=> $repo,
6789 archive
=> "$ds.img.fidx",
6791 $pbs_backing->{$confname}->{keyfile
} = $keyfile if -e
$keyfile;
6793 my $drive = parse_drive
($confname, $conf->{$confname});
6794 print "restoring '$ds' to '$drive->{file}'\n";
6797 my $drives_streamed = 0;
6799 # make sure HA doesn't interrupt our restore by stopping the VM
6800 if (PVE
::HA
::Config
::vm_is_ha_managed
($vmid)) {
6801 run_command
(['ha-manager', 'set', "vm:$vmid", '--state', 'started']);
6804 # start VM with backing chain pointing to PBS backup, environment vars for PBS driver
6805 # in QEMU (PBS_PASSWORD and PBS_FINGERPRINT) are already set by our caller
6806 vm_start_nolock
($storecfg, $vmid, $conf, {paused
=> 1, 'pbs-backing' => $pbs_backing}, {});
6808 my $qmeventd_fd = register_qmeventd_handle
($vmid);
6810 # begin streaming, i.e. data copy from PBS to target disk for every vol,
6811 # this will effectively collapse the backing image chain consisting of
6812 # [target <- alloc-track -> PBS snapshot] to just [target] (alloc-track
6813 # removes itself once all backing images vanish with 'auto-remove=on')
6815 for my $ds (sort keys %$restored_disks) {
6816 my $job_id = "restore-$ds";
6817 mon_cmd
($vmid, 'block-stream',
6818 'job-id' => $job_id,
6821 $jobs->{$job_id} = {};
6824 mon_cmd
($vmid, 'cont');
6825 qemu_drive_mirror_monitor
($vmid, undef, $jobs, 'auto', 0, 'stream');
6827 print "restore-drive jobs finished successfully, removing all tracking block devices"
6828 ." to disconnect from Proxmox Backup Server\n";
6830 for my $ds (sort keys %$restored_disks) {
6831 mon_cmd
($vmid, 'blockdev-del', 'node-name' => "$ds-pbs");
6834 close($qmeventd_fd);
6840 warn "An error occurred during live-restore: $err\n";
6841 _do_vm_stop
($storecfg, $vmid, 1, 1, 10, 0, 1);
6842 die "live-restore failed\n";
6846 sub restore_vma_archive
{
6847 my ($archive, $vmid, $user, $opts, $comp) = @_;
6849 my $readfrom = $archive;
6851 my $cfg = PVE
::Storage
::config
();
6853 my $bwlimit = $opts->{bwlimit
};
6855 my $dbg_cmdstring = '';
6856 my $add_pipe = sub {
6858 push @$commands, $cmd;
6859 $dbg_cmdstring .= ' | ' if length($dbg_cmdstring);
6860 $dbg_cmdstring .= PVE
::Tools
::cmd2string
($cmd);
6865 if ($archive eq '-') {
6868 # If we use a backup from a PVE defined storage we also consider that
6869 # storage's rate limit:
6870 my (undef, $volid) = PVE
::Storage
::path_to_volume_id
($cfg, $archive);
6871 if (defined($volid)) {
6872 my ($sid, undef) = PVE
::Storage
::parse_volume_id
($volid);
6873 my $readlimit = PVE
::Storage
::get_bandwidth_limit
('restore', [$sid], $bwlimit);
6875 print STDERR
"applying read rate limit: $readlimit\n";
6876 my $cstream = ['cstream', '-t', $readlimit*1024, '--', $readfrom];
6877 $add_pipe->($cstream);
6883 my $info = PVE
::Storage
::decompressor_info
('vma', $comp);
6884 my $cmd = $info->{decompressor
};
6885 push @$cmd, $readfrom;
6889 my $tmpdir = "/var/tmp/vzdumptmp$$";
6892 # disable interrupts (always do cleanups)
6896 local $SIG{HUP
} = sub { warn "got interrupt - ignored\n"; };
6898 my $mapfifo = "/var/tmp/vzdumptmp$$.fifo";
6899 POSIX
::mkfifo
($mapfifo, 0600);
6901 my $openfifo = sub { open($fifofh, '>', $mapfifo) or die $! };
6903 $add_pipe->(['vma', 'extract', '-v', '-r', $mapfifo, $readfrom, $tmpdir]);
6910 my $rpcenv = PVE
::RPCEnvironment
::get
();
6912 my $conffile = PVE
::QemuConfig-
>config_file($vmid);
6914 # Note: $oldconf is undef if VM does not exist
6915 my $cfs_path = PVE
::QemuConfig-
>cfs_config_path($vmid);
6916 my $oldconf = PVE
::Cluster
::cfs_read_file
($cfs_path);
6917 my $new_conf_raw = '';
6921 my $print_devmap = sub {
6922 my $cfgfn = "$tmpdir/qemu-server.conf";
6924 # we can read the config - that is already extracted
6925 my $fh = IO
::File-
>new($cfgfn, "r") ||
6926 die "unable to read qemu-server.conf - $!\n";
6928 my $fwcfgfn = "$tmpdir/qemu-server.fw";
6930 my $pve_firewall_dir = '/etc/pve/firewall';
6931 mkdir $pve_firewall_dir; # make sure the dir exists
6932 PVE
::Tools
::file_copy
($fwcfgfn, "${pve_firewall_dir}/$vmid.fw");
6935 my $virtdev_hash = $parse_backup_hints->($rpcenv, $user, $cfg, $fh, $devinfo, $opts);
6937 foreach my $info (values %{$virtdev_hash}) {
6938 my $storeid = $info->{storeid
};
6939 next if defined($storage_limits{$storeid});
6941 my $limit = PVE
::Storage
::get_bandwidth_limit
('restore', [$storeid], $bwlimit) // 0;
6942 print STDERR
"rate limit for storage $storeid: $limit KiB/s\n" if $limit;
6943 $storage_limits{$storeid} = $limit * 1024;
6946 foreach my $devname (keys %$devinfo) {
6947 die "found no device mapping information for device '$devname'\n"
6948 if !$devinfo->{$devname}->{virtdev
};
6951 # create empty/temp config
6953 PVE
::Tools
::file_set_contents
($conffile, "memory: 128\n");
6954 $restore_cleanup_oldconf->($cfg, $vmid, $oldconf, $virtdev_hash);
6958 my $map = $restore_allocate_devices->($cfg, $virtdev_hash, $vmid);
6960 # print restore information to $fifofh
6961 foreach my $virtdev (sort keys %$virtdev_hash) {
6962 my $d = $virtdev_hash->{$virtdev};
6963 next if $d->{is_cloudinit
}; # no need to restore cloudinit
6965 my $storeid = $d->{storeid
};
6966 my $volid = $d->{volid
};
6969 if (my $limit = $storage_limits{$storeid}) {
6970 $map_opts .= "throttling.bps=$limit:throttling.group=$storeid:";
6973 my $write_zeros = 1;
6974 if (PVE
::Storage
::volume_has_feature
($cfg, 'sparseinit', $volid)) {
6978 my $path = PVE
::Storage
::path
($cfg, $volid);
6980 print $fifofh "${map_opts}format=$d->{format}:${write_zeros}:$d->{devname}=$path\n";
6982 print "map '$d->{devname}' to '$path' (write zeros = ${write_zeros})\n";
6985 $fh->seek(0, 0) || die "seek failed - $!\n";
6987 my $cookie = { netcount
=> 0 };
6988 while (defined(my $line = <$fh>)) {
6989 $new_conf_raw .= restore_update_config_line
(
7006 local $SIG{PIPE
} = sub { die "interrupted by signal\n"; };
7007 local $SIG{ALRM
} = sub { die "got timeout\n"; };
7009 $oldtimeout = alarm($timeout);
7016 if ($line =~ m/^DEV:\sdev_id=(\d+)\ssize:\s(\d+)\sdevname:\s(\S+)$/) {
7017 my ($dev_id, $size, $devname) = ($1, $2, $3);
7018 $devinfo->{$devname} = { size
=> $size, dev_id
=> $dev_id };
7019 } elsif ($line =~ m/^CTIME: /) {
7020 # we correctly received the vma config, so we can disable
7021 # the timeout now for disk allocation (set to 10 minutes, so
7022 # that we always timeout if something goes wrong)
7025 print $fifofh "done\n";
7026 my $tmp = $oldtimeout || 0;
7027 $oldtimeout = undef;
7034 print "restore vma archive: $dbg_cmdstring\n";
7035 run_command
($commands, input
=> $input, outfunc
=> $parser, afterfork
=> $openfifo);
7039 alarm($oldtimeout) if $oldtimeout;
7041 $restore_deactivate_volumes->($cfg, $devinfo);
7043 close($fifofh) if $fifofh;
7048 $restore_destroy_volumes->($cfg, $devinfo);
7052 PVE
::Tools
::file_set_contents
($conffile, $new_conf_raw);
7054 PVE
::Cluster
::cfs_update
(); # make sure we read new file
7056 eval { rescan
($vmid, 1); };
7059 PVE
::AccessControl
::add_vm_to_pool
($vmid, $opts->{pool
}) if $opts->{pool
};
7062 sub restore_tar_archive
{
7063 my ($archive, $vmid, $user, $opts) = @_;
7065 if ($archive ne '-') {
7066 my $firstfile = tar_archive_read_firstfile
($archive);
7067 die "ERROR: file '$archive' does not look like a QemuServer vzdump backup\n"
7068 if $firstfile ne 'qemu-server.conf';
7071 my $storecfg = PVE
::Storage
::config
();
7073 # avoid zombie disks when restoring over an existing VM -> cleanup first
7074 # pass keep_empty_config=1 to keep the config (thus VMID) reserved for us
7075 # skiplock=1 because qmrestore has set the 'create' lock itself already
7076 my $vmcfgfn = PVE
::QemuConfig-
>config_file($vmid);
7077 destroy_vm
($storecfg, $vmid, 1, { lock => 'restore' }) if -f
$vmcfgfn;
7079 my $tocmd = "/usr/lib/qemu-server/qmextract";
7081 $tocmd .= " --storage " . PVE
::Tools
::shellquote
($opts->{storage
}) if $opts->{storage
};
7082 $tocmd .= " --pool " . PVE
::Tools
::shellquote
($opts->{pool
}) if $opts->{pool
};
7083 $tocmd .= ' --prealloc' if $opts->{prealloc
};
7084 $tocmd .= ' --info' if $opts->{info
};
7086 # tar option "xf" does not autodetect compression when read from STDIN,
7087 # so we pipe to zcat
7088 my $cmd = "zcat -f|tar xf " . PVE
::Tools
::shellquote
($archive) . " " .
7089 PVE
::Tools
::shellquote
("--to-command=$tocmd");
7091 my $tmpdir = "/var/tmp/vzdumptmp$$";
7094 local $ENV{VZDUMP_TMPDIR
} = $tmpdir;
7095 local $ENV{VZDUMP_VMID
} = $vmid;
7096 local $ENV{VZDUMP_USER
} = $user;
7098 my $conffile = PVE
::QemuConfig-
>config_file($vmid);
7099 my $new_conf_raw = '';
7101 # disable interrupts (always do cleanups)
7105 local $SIG{HUP
} = sub { print STDERR
"got interrupt - ignored\n"; };
7113 local $SIG{PIPE
} = sub { die "interrupted by signal\n"; };
7115 if ($archive eq '-') {
7116 print "extracting archive from STDIN\n";
7117 run_command
($cmd, input
=> "<&STDIN");
7119 print "extracting archive '$archive'\n";
7123 return if $opts->{info
};
7127 my $statfile = "$tmpdir/qmrestore.stat";
7128 if (my $fd = IO
::File-
>new($statfile, "r")) {
7129 while (defined (my $line = <$fd>)) {
7130 if ($line =~ m/vzdump:([^\s:]*):(\S+)$/) {
7131 $map->{$1} = $2 if $1;
7133 print STDERR
"unable to parse line in statfile - $line\n";
7139 my $confsrc = "$tmpdir/qemu-server.conf";
7141 my $srcfd = IO
::File-
>new($confsrc, "r") || die "unable to open file '$confsrc'\n";
7143 my $cookie = { netcount
=> 0 };
7144 while (defined (my $line = <$srcfd>)) {
7145 $new_conf_raw .= restore_update_config_line
(
7156 tar_restore_cleanup
($storecfg, "$tmpdir/qmrestore.stat") if !$opts->{info
};
7162 PVE
::Tools
::file_set_contents
($conffile, $new_conf_raw);
7164 PVE
::Cluster
::cfs_update
(); # make sure we read new file
7166 eval { rescan
($vmid, 1); };
7170 sub foreach_storage_used_by_vm
{
7171 my ($conf, $func) = @_;
7175 PVE
::QemuConfig-
>foreach_volume($conf, sub {
7176 my ($ds, $drive) = @_;
7177 return if drive_is_cdrom
($drive);
7179 my $volid = $drive->{file
};
7181 my ($sid, $volname) = PVE
::Storage
::parse_volume_id
($volid, 1);
7182 $sidhash->{$sid} = $sid if $sid;
7185 foreach my $sid (sort keys %$sidhash) {
7190 my $qemu_snap_storage = {
7193 sub do_snapshots_with_qemu
{
7194 my ($storecfg, $volid, $deviceid) = @_;
7196 return if $deviceid =~ m/tpmstate0/;
7198 my $storage_name = PVE
::Storage
::parse_volume_id
($volid);
7199 my $scfg = $storecfg->{ids
}->{$storage_name};
7200 die "could not find storage '$storage_name'\n" if !defined($scfg);
7202 if ($qemu_snap_storage->{$scfg->{type
}} && !$scfg->{krbd
}){
7206 if ($volid =~ m/\.(qcow2|qed)$/){
7213 sub qga_check_running
{
7214 my ($vmid, $nowarn) = @_;
7216 eval { mon_cmd
($vmid, "guest-ping", timeout
=> 3); };
7218 warn "Qemu Guest Agent is not running - $@" if !$nowarn;
7224 sub template_create
{
7225 my ($vmid, $conf, $disk) = @_;
7227 my $storecfg = PVE
::Storage
::config
();
7229 PVE
::QemuConfig-
>foreach_volume($conf, sub {
7230 my ($ds, $drive) = @_;
7232 return if drive_is_cdrom
($drive);
7233 return if $disk && $ds ne $disk;
7235 my $volid = $drive->{file
};
7236 return if !PVE
::Storage
::volume_has_feature
($storecfg, 'template', $volid);
7238 my $voliddst = PVE
::Storage
::vdisk_create_base
($storecfg, $volid);
7239 $drive->{file
} = $voliddst;
7240 $conf->{$ds} = print_drive
($drive);
7241 PVE
::QemuConfig-
>write_config($vmid, $conf);
7245 sub convert_iscsi_path
{
7248 if ($path =~ m
|^iscsi
://([^/]+)/([^/]+)/(.+)$|) {
7253 my $initiator_name = get_initiator_name
();
7255 return "file.driver=iscsi,file.transport=tcp,file.initiator-name=$initiator_name,".
7256 "file.portal=$portal,file.target=$target,file.lun=$lun,driver=raw";
7259 die "cannot convert iscsi path '$path', unkown format\n";
7262 sub qemu_img_convert
{
7263 my ($src_volid, $dst_volid, $size, $snapname, $is_zero_initialized) = @_;
7265 my $storecfg = PVE
::Storage
::config
();
7266 my ($src_storeid, $src_volname) = PVE
::Storage
::parse_volume_id
($src_volid, 1);
7267 my ($dst_storeid, $dst_volname) = PVE
::Storage
::parse_volume_id
($dst_volid, 1);
7269 die "destination '$dst_volid' is not a valid volid form qemu-img convert\n" if !$dst_storeid;
7273 my $src_is_iscsi = 0;
7277 PVE
::Storage
::activate_volumes
($storecfg, [$src_volid], $snapname);
7278 my $src_scfg = PVE
::Storage
::storage_config
($storecfg, $src_storeid);
7279 $src_format = qemu_img_format
($src_scfg, $src_volname);
7280 $src_path = PVE
::Storage
::path
($storecfg, $src_volid, $snapname);
7281 $src_is_iscsi = ($src_path =~ m
|^iscsi
://|);
7282 $cachemode = 'none' if $src_scfg->{type
} eq 'zfspool';
7283 } elsif (-f
$src_volid || -b
$src_volid) {
7284 $src_path = $src_volid;
7285 if ($src_path =~ m/\.($PVE::QemuServer::Drive::QEMU_FORMAT_RE)$/) {
7290 die "source '$src_volid' is not a valid volid nor path for qemu-img convert\n" if !$src_path;
7292 my $dst_scfg = PVE
::Storage
::storage_config
($storecfg, $dst_storeid);
7293 my $dst_format = qemu_img_format
($dst_scfg, $dst_volname);
7294 my $dst_path = PVE
::Storage
::path
($storecfg, $dst_volid);
7295 my $dst_is_iscsi = ($dst_path =~ m
|^iscsi
://|);
7298 push @$cmd, '/usr/bin/qemu-img', 'convert', '-p', '-n';
7299 push @$cmd, '-l', "snapshot.name=$snapname"
7300 if $snapname && $src_format && $src_format eq "qcow2";
7301 push @$cmd, '-t', 'none' if $dst_scfg->{type
} eq 'zfspool';
7302 push @$cmd, '-T', $cachemode if defined($cachemode);
7304 if ($src_is_iscsi) {
7305 push @$cmd, '--image-opts';
7306 $src_path = convert_iscsi_path
($src_path);
7307 } elsif ($src_format) {
7308 push @$cmd, '-f', $src_format;
7311 if ($dst_is_iscsi) {
7312 push @$cmd, '--target-image-opts';
7313 $dst_path = convert_iscsi_path
($dst_path);
7315 push @$cmd, '-O', $dst_format;
7318 push @$cmd, $src_path;
7320 if (!$dst_is_iscsi && $is_zero_initialized) {
7321 push @$cmd, "zeroinit:$dst_path";
7323 push @$cmd, $dst_path;
7328 if($line =~ m/\((\S+)\/100\
%\)/){
7330 my $transferred = int($size * $percent / 100);
7331 my $total_h = render_bytes
($size, 1);
7332 my $transferred_h = render_bytes
($transferred, 1);
7334 print "transferred $transferred_h of $total_h ($percent%)\n";
7339 eval { run_command
($cmd, timeout
=> undef, outfunc
=> $parser); };
7341 die "copy failed: $err" if $err;
7344 sub qemu_img_format
{
7345 my ($scfg, $volname) = @_;
7347 if ($scfg->{path
} && $volname =~ m/\.($PVE::QemuServer::Drive::QEMU_FORMAT_RE)$/) {
7354 sub qemu_drive_mirror
{
7355 my ($vmid, $drive, $dst_volid, $vmiddst, $is_zero_initialized, $jobs, $completion, $qga, $bwlimit, $src_bitmap) = @_;
7357 $jobs = {} if !$jobs;
7361 $jobs->{"drive-$drive"} = {};
7363 if ($dst_volid =~ /^nbd:/) {
7364 $qemu_target = $dst_volid;
7367 my $storecfg = PVE
::Storage
::config
();
7368 my ($dst_storeid, $dst_volname) = PVE
::Storage
::parse_volume_id
($dst_volid);
7370 my $dst_scfg = PVE
::Storage
::storage_config
($storecfg, $dst_storeid);
7372 $format = qemu_img_format
($dst_scfg, $dst_volname);
7374 my $dst_path = PVE
::Storage
::path
($storecfg, $dst_volid);
7376 $qemu_target = $is_zero_initialized ?
"zeroinit:$dst_path" : $dst_path;
7379 my $opts = { timeout
=> 10, device
=> "drive-$drive", mode
=> "existing", sync
=> "full", target
=> $qemu_target };
7380 $opts->{format
} = $format if $format;
7382 if (defined($src_bitmap)) {
7383 $opts->{sync
} = 'incremental';
7384 $opts->{bitmap
} = $src_bitmap;
7385 print "drive mirror re-using dirty bitmap '$src_bitmap'\n";
7388 if (defined($bwlimit)) {
7389 $opts->{speed
} = $bwlimit * 1024;
7390 print "drive mirror is starting for drive-$drive with bandwidth limit: ${bwlimit} KB/s\n";
7392 print "drive mirror is starting for drive-$drive\n";
7395 # if a job already runs for this device we get an error, catch it for cleanup
7396 eval { mon_cmd
($vmid, "drive-mirror", %$opts); };
7398 eval { PVE
::QemuServer
::qemu_blockjobs_cancel
($vmid, $jobs) };
7400 die "mirroring error: $err\n";
7403 qemu_drive_mirror_monitor
($vmid, $vmiddst, $jobs, $completion, $qga);
7406 # $completion can be either
7407 # 'complete': wait until all jobs are ready, block-job-complete them (default)
7408 # 'cancel': wait until all jobs are ready, block-job-cancel them
7409 # 'skip': wait until all jobs are ready, return with block jobs in ready state
7410 # 'auto': wait until all jobs disappear, only use for jobs which complete automatically
7411 sub qemu_drive_mirror_monitor
{
7412 my ($vmid, $vmiddst, $jobs, $completion, $qga, $op) = @_;
7414 $completion //= 'complete';
7418 my $err_complete = 0;
7420 my $starttime = time ();
7422 die "block job ('$op') timed out\n" if $err_complete > 300;
7424 my $stats = mon_cmd
($vmid, "query-block-jobs");
7427 my $running_jobs = {};
7428 for my $stat (@$stats) {
7429 next if $stat->{type
} ne $op;
7430 $running_jobs->{$stat->{device
}} = $stat;
7433 my $readycounter = 0;
7435 for my $job_id (sort keys %$jobs) {
7436 my $job = $running_jobs->{$job_id};
7438 my $vanished = !defined($job);
7439 my $complete = defined($jobs->{$job_id}->{complete
}) && $vanished;
7440 if($complete || ($vanished && $completion eq 'auto')) {
7441 print "$job_id: $op-job finished\n";
7442 delete $jobs->{$job_id};
7446 die "$job_id: '$op' has been cancelled\n" if !defined($job);
7448 my $busy = $job->{busy
};
7449 my $ready = $job->{ready
};
7450 if (my $total = $job->{len
}) {
7451 my $transferred = $job->{offset
} || 0;
7452 my $remaining = $total - $transferred;
7453 my $percent = sprintf "%.2f", ($transferred * 100 / $total);
7455 my $duration = $ctime - $starttime;
7456 my $total_h = render_bytes
($total, 1);
7457 my $transferred_h = render_bytes
($transferred, 1);
7459 my $status = sprintf(
7460 "transferred $transferred_h of $total_h ($percent%%) in %s",
7461 render_duration
($duration),
7466 $status .= ", still busy"; # shouldn't even happen? but mirror is weird
7468 $status .= ", ready";
7471 print "$job_id: $status\n" if !$jobs->{$job_id}->{ready
};
7472 $jobs->{$job_id}->{ready
} = $ready;
7475 $readycounter++ if $job->{ready
};
7478 last if scalar(keys %$jobs) == 0;
7480 if ($readycounter == scalar(keys %$jobs)) {
7481 print "all '$op' jobs are ready\n";
7483 # do the complete later (or has already been done)
7484 last if $completion eq 'skip' || $completion eq 'auto';
7486 if ($vmiddst && $vmiddst != $vmid) {
7487 my $agent_running = $qga && qga_check_running
($vmid);
7488 if ($agent_running) {
7489 print "freeze filesystem\n";
7490 eval { mon_cmd
($vmid, "guest-fsfreeze-freeze"); };
7493 print "suspend vm\n";
7494 eval { PVE
::QemuServer
::vm_suspend
($vmid, 1); };
7498 # if we clone a disk for a new target vm, we don't switch the disk
7499 PVE
::QemuServer
::qemu_blockjobs_cancel
($vmid, $jobs);
7501 if ($agent_running) {
7502 print "unfreeze filesystem\n";
7503 eval { mon_cmd
($vmid, "guest-fsfreeze-thaw"); };
7506 print "resume vm\n";
7507 eval { PVE
::QemuServer
::vm_resume
($vmid, 1, 1); };
7514 for my $job_id (sort keys %$jobs) {
7515 # try to switch the disk if source and destination are on the same guest
7516 print "$job_id: Completing block job_id...\n";
7519 if ($completion eq 'complete') {
7520 $op = 'block-job-complete';
7521 } elsif ($completion eq 'cancel') {
7522 $op = 'block-job-cancel';
7524 die "invalid completion value: $completion\n";
7526 eval { mon_cmd
($vmid, $op, device
=> $job_id) };
7527 if ($@ =~ m/cannot be completed/) {
7528 print "$job_id: block job cannot be completed, trying again.\n";
7531 print "$job_id: Completed successfully.\n";
7532 $jobs->{$job_id}->{complete
} = 1;
7543 eval { PVE
::QemuServer
::qemu_blockjobs_cancel
($vmid, $jobs) };
7544 die "block job ($op) error: $err";
7548 sub qemu_blockjobs_cancel
{
7549 my ($vmid, $jobs) = @_;
7551 foreach my $job (keys %$jobs) {
7552 print "$job: Cancelling block job\n";
7553 eval { mon_cmd
($vmid, "block-job-cancel", device
=> $job); };
7554 $jobs->{$job}->{cancel
} = 1;
7558 my $stats = mon_cmd
($vmid, "query-block-jobs");
7560 my $running_jobs = {};
7561 foreach my $stat (@$stats) {
7562 $running_jobs->{$stat->{device
}} = $stat;
7565 foreach my $job (keys %$jobs) {
7567 if (defined($jobs->{$job}->{cancel
}) && !defined($running_jobs->{$job})) {
7568 print "$job: Done.\n";
7569 delete $jobs->{$job};
7573 last if scalar(keys %$jobs) == 0;
7580 my ($storecfg, $source, $dest, $full, $newvollist, $jobs, $completion, $qga, $bwlimit) = @_;
7582 my ($vmid, $running) = $source->@{qw(vmid running)};
7583 my ($src_drivename, $drive, $snapname) = $source->@{qw(drivename drive snapname)};
7585 my ($newvmid, $dst_drivename, $efisize) = $dest->@{qw(vmid drivename efisize)};
7586 my ($storage, $format) = $dest->@{qw(storage format)};
7588 my $use_drive_mirror = $full && $running && $src_drivename && !$snapname;
7590 if ($src_drivename && $dst_drivename && $src_drivename ne $dst_drivename) {
7591 die "cloning from/to EFI disk requires EFI disk\n"
7592 if $src_drivename eq 'efidisk0' || $dst_drivename eq 'efidisk0';
7593 die "cloning from/to TPM state requires TPM state\n"
7594 if $src_drivename eq 'tpmstate0' || $dst_drivename eq 'tpmstate0';
7596 # This would lead to two device nodes in QEMU pointing to the same backing image!
7597 die "cannot change drive name when cloning disk from/to the same VM\n"
7598 if $use_drive_mirror && $vmid == $newvmid;
7601 die "cannot move TPM state while VM is running\n"
7602 if $use_drive_mirror && $src_drivename eq 'tpmstate0';
7606 print "create " . ($full ?
'full' : 'linked') . " clone of drive ";
7607 print "$src_drivename " if $src_drivename;
7608 print "($drive->{file})\n";
7611 $newvolid = PVE
::Storage
::vdisk_clone
($storecfg, $drive->{file
}, $newvmid, $snapname);
7612 push @$newvollist, $newvolid;
7615 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($drive->{file
});
7616 $storeid = $storage if $storage;
7618 my $dst_format = resolve_dst_disk_format
($storecfg, $storeid, $volname, $format);
7622 if (drive_is_cloudinit
($drive)) {
7623 $name = "vm-$newvmid-cloudinit";
7624 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
7625 if ($scfg->{path
}) {
7626 $name .= ".$dst_format";
7629 $size = PVE
::QemuServer
::Cloudinit
::CLOUDINIT_DISK_SIZE
;
7630 } elsif ($dst_drivename eq 'efidisk0') {
7631 $size = $efisize or die "internal error - need to specify EFI disk size\n";
7632 } elsif ($dst_drivename eq 'tpmstate0') {
7633 $dst_format = 'raw';
7634 $size = PVE
::QemuServer
::Drive
::TPMSTATE_DISK_SIZE
;
7636 ($size) = PVE
::Storage
::volume_size_info
($storecfg, $drive->{file
}, 10);
7638 $newvolid = PVE
::Storage
::vdisk_alloc
(
7639 $storecfg, $storeid, $newvmid, $dst_format, $name, ($size/1024)
7641 push @$newvollist, $newvolid;
7643 PVE
::Storage
::activate_volumes
($storecfg, [$newvolid]);
7645 if (drive_is_cloudinit
($drive)) {
7646 # when cloning multiple disks (e.g. during clone_vm) it might be the last disk
7647 # if this is the case, we have to complete any block-jobs still there from
7648 # previous drive-mirrors
7649 if (($completion eq 'complete') && (scalar(keys %$jobs) > 0)) {
7650 qemu_drive_mirror_monitor
($vmid, $newvmid, $jobs, $completion, $qga);
7655 my $sparseinit = PVE
::Storage
::volume_has_feature
($storecfg, 'sparseinit', $newvolid);
7656 if ($use_drive_mirror) {
7657 qemu_drive_mirror
($vmid, $src_drivename, $newvolid, $newvmid, $sparseinit, $jobs,
7658 $completion, $qga, $bwlimit);
7660 # TODO: handle bwlimits
7661 if ($dst_drivename eq 'efidisk0') {
7662 # the relevant data on the efidisk may be smaller than the source
7663 # e.g. on RBD/ZFS, so we use dd to copy only the amount
7664 # that is given by the OVMF_VARS.fd
7665 my $src_path = PVE
::Storage
::path
($storecfg, $drive->{file
});
7666 my $dst_path = PVE
::Storage
::path
($storecfg, $newvolid);
7668 # better for Ceph if block size is not too small, see bug #3324
7671 run_command
(['qemu-img', 'dd', '-n', '-O', $dst_format, "bs=$bs", "osize=$size",
7672 "if=$src_path", "of=$dst_path"]);
7674 qemu_img_convert
($drive->{file
}, $newvolid, $size, $snapname, $sparseinit);
7680 my ($size) = eval { PVE
::Storage
::volume_size_info
($storecfg, $newvolid, 10) };
7682 my $disk = dclone
($drive);
7683 delete $disk->{format
};
7684 $disk->{file
} = $newvolid;
7685 $disk->{size
} = $size if defined($size);
7690 sub get_running_qemu_version
{
7692 my $res = mon_cmd
($vmid, "query-version");
7693 return "$res->{qemu}->{major}.$res->{qemu}->{minor}";
7696 sub qemu_use_old_bios_files
{
7697 my ($machine_type) = @_;
7699 return if !$machine_type;
7701 my $use_old_bios_files = undef;
7703 if ($machine_type =~ m/^(\S+)\.pxe$/) {
7705 $use_old_bios_files = 1;
7707 my $version = extract_version
($machine_type, kvm_user_version
());
7708 # Note: kvm version < 2.4 use non-efi pxe files, and have problems when we
7709 # load new efi bios files on migration. So this hack is required to allow
7710 # live migration from qemu-2.2 to qemu-2.4, which is sometimes used when
7711 # updrading from proxmox-ve-3.X to proxmox-ve 4.0
7712 $use_old_bios_files = !min_version
($version, 2, 4);
7715 return ($use_old_bios_files, $machine_type);
7718 sub get_efivars_size
{
7719 my ($conf, $efidisk) = @_;
7721 my $arch = get_vm_arch
($conf);
7722 $efidisk //= $conf->{efidisk0
} ? parse_drive
('efidisk0', $conf->{efidisk0
}) : undef;
7723 my $smm = PVE
::QemuServer
::Machine
::machine_type_is_q35
($conf);
7724 my (undef, $ovmf_vars) = get_ovmf_files
($arch, $efidisk, $smm);
7725 die "uefi vars image '$ovmf_vars' not found\n" if ! -f
$ovmf_vars;
7726 return -s
$ovmf_vars;
7729 sub update_efidisk_size
{
7732 return if !defined($conf->{efidisk0
});
7734 my $disk = PVE
::QemuServer
::parse_drive
('efidisk0', $conf->{efidisk0
});
7735 $disk->{size
} = get_efivars_size
($conf);
7736 $conf->{efidisk0
} = print_drive
($disk);
7741 sub update_tpmstate_size
{
7744 my $disk = PVE
::QemuServer
::parse_drive
('tpmstate0', $conf->{tpmstate0
});
7745 $disk->{size
} = PVE
::QemuServer
::Drive
::TPMSTATE_DISK_SIZE
;
7746 $conf->{tpmstate0
} = print_drive
($disk);
7749 sub create_efidisk
($$$$$$$) {
7750 my ($storecfg, $storeid, $vmid, $fmt, $arch, $efidisk, $smm) = @_;
7752 my (undef, $ovmf_vars) = get_ovmf_files
($arch, $efidisk, $smm);
7753 die "EFI vars default image not found\n" if ! -f
$ovmf_vars;
7755 my $vars_size_b = -s
$ovmf_vars;
7756 my $vars_size = PVE
::Tools
::convert_size
($vars_size_b, 'b' => 'kb');
7757 my $volid = PVE
::Storage
::vdisk_alloc
($storecfg, $storeid, $vmid, $fmt, undef, $vars_size);
7758 PVE
::Storage
::activate_volumes
($storecfg, [$volid]);
7760 qemu_img_convert
($ovmf_vars, $volid, $vars_size_b, undef, 0);
7761 my ($size) = PVE
::Storage
::volume_size_info
($storecfg, $volid, 3);
7763 return ($volid, $size/1024);
7766 sub vm_iothreads_list
{
7769 my $res = mon_cmd
($vmid, 'query-iothreads');
7772 foreach my $iothread (@$res) {
7773 $iothreads->{ $iothread->{id
} } = $iothread->{"thread-id"};
7780 my ($conf, $drive) = @_;
7784 if (!$conf->{scsihw
} || ($conf->{scsihw
} =~ m/^lsi/)) {
7786 } elsif ($conf->{scsihw
} && ($conf->{scsihw
} eq 'virtio-scsi-single')) {
7792 my $controller = int($drive->{index} / $maxdev);
7793 my $controller_prefix = ($conf->{scsihw
} && $conf->{scsihw
} eq 'virtio-scsi-single')
7797 return ($maxdev, $controller, $controller_prefix);
7800 sub windows_version
{
7803 return 0 if !$ostype;
7807 if($ostype eq 'wxp' || $ostype eq 'w2k3' || $ostype eq 'w2k') {
7809 } elsif($ostype eq 'w2k8' || $ostype eq 'wvista') {
7811 } elsif ($ostype =~ m/^win(\d+)$/) {
7818 sub resolve_dst_disk_format
{
7819 my ($storecfg, $storeid, $src_volname, $format) = @_;
7820 my ($defFormat, $validFormats) = PVE
::Storage
::storage_default_format
($storecfg, $storeid);
7823 # if no target format is specified, use the source disk format as hint
7825 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
7826 $format = qemu_img_format
($scfg, $src_volname);
7832 # test if requested format is supported - else use default
7833 my $supported = grep { $_ eq $format } @$validFormats;
7834 $format = $defFormat if !$supported;
7838 # NOTE: if this logic changes, please update docs & possibly gui logic
7839 sub find_vmstate_storage
{
7840 my ($conf, $storecfg) = @_;
7842 # first, return storage from conf if set
7843 return $conf->{vmstatestorage
} if $conf->{vmstatestorage
};
7845 my ($target, $shared, $local);
7847 foreach_storage_used_by_vm
($conf, sub {
7849 my $scfg = PVE
::Storage
::storage_config
($storecfg, $sid);
7850 my $dst = $scfg->{shared
} ? \
$shared : \
$local;
7851 $$dst = $sid if !$$dst || $scfg->{path
}; # prefer file based storage
7854 # second, use shared storage where VM has at least one disk
7855 # third, use local storage where VM has at least one disk
7856 # fall back to local storage
7857 $target = $shared // $local // 'local';
7863 my ($uuid, $uuid_str);
7864 UUID
::generate
($uuid);
7865 UUID
::unparse
($uuid, $uuid_str);
7869 sub generate_smbios1_uuid
{
7870 return "uuid=".generate_uuid
();
7876 mon_cmd
($vmid, 'nbd-server-stop');
7879 sub create_reboot_request
{
7881 open(my $fh, '>', "/run/qemu-server/$vmid.reboot")
7882 or die "failed to create reboot trigger file: $!\n";
7886 sub clear_reboot_request
{
7888 my $path = "/run/qemu-server/$vmid.reboot";
7891 $res = unlink($path);
7892 die "could not remove reboot request for $vmid: $!"
7893 if !$res && $! != POSIX
::ENOENT
;
7898 sub bootorder_from_legacy
{
7899 my ($conf, $bootcfg) = @_;
7901 my $boot = $bootcfg->{legacy
} || $boot_fmt->{legacy
}->{default};
7902 my $bootindex_hash = {};
7904 foreach my $o (split(//, $boot)) {
7905 $bootindex_hash->{$o} = $i*100;
7911 PVE
::QemuConfig-
>foreach_volume($conf, sub {
7912 my ($ds, $drive) = @_;
7914 if (drive_is_cdrom
($drive, 1)) {
7915 if ($bootindex_hash->{d
}) {
7916 $bootorder->{$ds} = $bootindex_hash->{d
};
7917 $bootindex_hash->{d
} += 1;
7919 } elsif ($bootindex_hash->{c
}) {
7920 $bootorder->{$ds} = $bootindex_hash->{c
}
7921 if $conf->{bootdisk
} && $conf->{bootdisk
} eq $ds;
7922 $bootindex_hash->{c
} += 1;
7926 if ($bootindex_hash->{n
}) {
7927 for (my $i = 0; $i < $MAX_NETS; $i++) {
7928 my $netname = "net$i";
7929 next if !$conf->{$netname};
7930 $bootorder->{$netname} = $bootindex_hash->{n
};
7931 $bootindex_hash->{n
} += 1;
7938 # Generate default device list for 'boot: order=' property. Matches legacy
7939 # default boot order, but with explicit device names. This is important, since
7940 # the fallback for when neither 'order' nor the old format is specified relies
7941 # on 'bootorder_from_legacy' above, and it would be confusing if this diverges.
7942 sub get_default_bootdevices
{
7948 my $first = PVE
::QemuServer
::Drive
::resolve_first_disk
($conf, 0);
7949 push @ret, $first if $first;
7952 $first = PVE
::QemuServer
::Drive
::resolve_first_disk
($conf, 1);
7953 push @ret, $first if $first;
7956 for (my $i = 0; $i < $MAX_NETS; $i++) {
7957 my $netname = "net$i";
7958 next if !$conf->{$netname};
7959 push @ret, $netname;
7966 sub device_bootorder
{
7969 return bootorder_from_legacy
($conf) if !defined($conf->{boot
});
7971 my $boot = parse_property_string
($boot_fmt, $conf->{boot
});
7974 if (!defined($boot) || $boot->{legacy
}) {
7975 $bootorder = bootorder_from_legacy
($conf, $boot);
7976 } elsif ($boot->{order
}) {
7977 my $i = 100; # start at 100 to allow user to insert devices before us with -args
7978 for my $dev (PVE
::Tools
::split_list
($boot->{order
})) {
7979 $bootorder->{$dev} = $i++;
7986 sub register_qmeventd_handle
{
7990 my $peer = "/var/run/qmeventd.sock";
7995 $fh = IO
::Socket
::UNIX-
>new(Peer
=> $peer, Blocking
=> 0, Timeout
=> 1);
7997 if ($! != EINTR
&& $! != EAGAIN
) {
7998 die "unable to connect to qmeventd socket (vmid: $vmid) - $!\n";
8001 die "unable to connect to qmeventd socket (vmid: $vmid) - timeout "
8002 . "after $count retries\n";
8007 # send handshake to mark VM as backing up
8008 print $fh to_json
({vzdump
=> {vmid
=> "$vmid"}});
8010 # return handle to be closed later when inhibit is no longer required
8014 # bash completion helper
8016 sub complete_backup_archives
{
8017 my ($cmdname, $pname, $cvalue) = @_;
8019 my $cfg = PVE
::Storage
::config
();
8023 if ($cvalue =~ m/^([^:]+):/) {
8027 my $data = PVE
::Storage
::template_list
($cfg, $storeid, 'backup');
8030 foreach my $id (keys %$data) {
8031 foreach my $item (@{$data->{$id}}) {
8032 next if $item->{format
} !~ m/^vma\.(${\PVE::Storage::Plugin::COMPRESSOR_RE})$/;
8033 push @$res, $item->{volid
} if defined($item->{volid
});
8040 my $complete_vmid_full = sub {
8043 my $idlist = vmstatus
();
8047 foreach my $id (keys %$idlist) {
8048 my $d = $idlist->{$id};
8049 if (defined($running)) {
8050 next if $d->{template
};
8051 next if $running && $d->{status
} ne 'running';
8052 next if !$running && $d->{status
} eq 'running';
8061 return &$complete_vmid_full();
8064 sub complete_vmid_stopped
{
8065 return &$complete_vmid_full(0);
8068 sub complete_vmid_running
{
8069 return &$complete_vmid_full(1);
8072 sub complete_storage
{
8074 my $cfg = PVE
::Storage
::config
();
8075 my $ids = $cfg->{ids
};
8078 foreach my $sid (keys %$ids) {
8079 next if !PVE
::Storage
::storage_check_enabled
($cfg, $sid, undef, 1);
8080 next if !$ids->{$sid}->{content
}->{images
};
8087 sub complete_migration_storage
{
8088 my ($cmd, $param, $current_value, $all_args) = @_;
8090 my $targetnode = @$all_args[1];
8092 my $cfg = PVE
::Storage
::config
();
8093 my $ids = $cfg->{ids
};
8096 foreach my $sid (keys %$ids) {
8097 next if !PVE
::Storage
::storage_check_enabled
($cfg, $sid, $targetnode, 1);
8098 next if !$ids->{$sid}->{content
}->{images
};
8107 my $qmpstatus = eval {
8108 PVE
::QemuConfig
::assert_config_exists_on_node
($vmid);
8109 mon_cmd
($vmid, "query-status");
8112 return $qmpstatus && $qmpstatus->{status
} eq "paused";
8115 sub check_volume_storage_type
{
8116 my ($storecfg, $vol) = @_;
8118 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($vol);
8119 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
8120 my ($vtype) = PVE
::Storage
::parse_volname
($storecfg, $vol);
8122 die "storage '$storeid' does not support content-type '$vtype'\n"
8123 if !$scfg->{content
}->{$vtype};