1 package PVE
::QemuServer
;
11 use File
::Copy
qw(copy);
24 use Storable
qw(dclone);
25 use Time
::HiRes
qw(gettimeofday);
29 use PVE
::Cluster
qw(cfs_register_file cfs_read_file cfs_write_file);
31 use PVE
::DataCenterConfig
;
32 use PVE
::Exception
qw(raise raise_param_exc);
33 use PVE
::Format
qw(render_duration render_bytes);
34 use PVE
::GuestHelpers
qw(safe_string_ne safe_num_ne safe_boolean_ne);
36 use PVE
::JSONSchema
qw(get_standard_option parse_property_string);
39 use PVE
::RPCEnvironment
;
43 use PVE
::Tools
qw(run_command file_read_firstline file_get_contents dir_glob_foreach get_host_arch $IPV6RE);
47 use PVE
::QemuServer
::Helpers
qw(min_version config_aware_timeout);
48 use PVE
::QemuServer
::Cloudinit
;
49 use PVE
::QemuServer
::CGroup
;
50 use PVE
::QemuServer
::CPUConfig
qw(print_cpu_device get_cpu_options);
51 use PVE
::QemuServer
::Drive
qw(is_valid_drivename drive_is_cloudinit drive_is_cdrom parse_drive print_drive);
52 use PVE
::QemuServer
::Machine
;
53 use PVE
::QemuServer
::Memory
;
54 use PVE
::QemuServer
::Monitor
qw(mon_cmd);
55 use PVE
::QemuServer
::PCI
qw(print_pci_addr print_pcie_addr print_pcie_root_port parse_hostpci);
56 use PVE
::QemuServer
::USB
qw(parse_usb_device);
60 require PVE
::Network
::SDN
::Zones
;
64 my $EDK2_FW_BASE = '/usr/share/pve-edk2-firmware/';
67 "$EDK2_FW_BASE/OVMF_CODE.fd",
68 "$EDK2_FW_BASE/OVMF_VARS.fd"
71 "$EDK2_FW_BASE/AAVMF_CODE.fd",
72 "$EDK2_FW_BASE/AAVMF_VARS.fd"
76 my $cpuinfo = PVE
::ProcFSTools
::read_cpuinfo
();
78 # Note about locking: we use flock on the config file protect
79 # against concurent actions.
80 # Aditionaly, we have a 'lock' setting in the config file. This
81 # can be set to 'migrate', 'backup', 'snapshot' or 'rollback'. Most actions are not
82 # allowed when such lock is set. But you can ignore this kind of
83 # lock with the --skiplock flag.
85 cfs_register_file
('/qemu-server/',
89 PVE
::JSONSchema
::register_standard_option
('pve-qm-stateuri', {
90 description
=> "Some command save/restore state from this location.",
96 PVE
::JSONSchema
::register_standard_option
('pve-qemu-machine', {
97 description
=> "Specifies the Qemu machine type.",
99 pattern
=> '(pc|pc(-i440fx)?-\d+(\.\d+)+(\+pve\d+)?(\.pxe)?|q35|pc-q35-\d+(\.\d+)+(\+pve\d+)?(\.pxe)?|virt(?:-\d+(\.\d+)+)?(\+pve\d+)?)',
106 my ($map, $source) = @_;
108 return $source if !defined($map);
110 return $map->{entries
}->{$source}
111 if $map->{entries
} && defined($map->{entries
}->{$source});
113 return $map->{default} if $map->{default};
115 # identity (fallback)
119 PVE
::JSONSchema
::register_standard_option
('pve-targetstorage', {
120 description
=> "Mapping from source to target storages. Providing only a single storage ID maps all source storages to that storage. Providing the special value '1' will map each source storage to itself.",
122 format
=> 'storagepair-list',
126 #no warnings 'redefine';
130 $nodename_cache //= PVE
::INotify
::nodename
();
131 return $nodename_cache;
138 enum
=> [qw(i6300esb ib700)],
139 description
=> "Watchdog type to emulate.",
140 default => 'i6300esb',
145 enum
=> [qw(reset shutdown poweroff pause debug none)],
146 description
=> "The action to perform if after activation the guest fails to poll the watchdog in time.",
150 PVE
::JSONSchema
::register_format
('pve-qm-watchdog', $watchdog_fmt);
154 description
=> "Enable/disable Qemu GuestAgent.",
159 fstrim_cloned_disks
=> {
160 description
=> "Run fstrim after moving a disk or migrating the VM.",
166 description
=> "Select the agent type",
170 enum
=> [qw(virtio isa)],
176 description
=> "Select the VGA type.",
181 enum
=> [qw(cirrus qxl qxl2 qxl3 qxl4 none serial0 serial1 serial2 serial3 std virtio vmware)],
184 description
=> "Sets the VGA memory (in MiB). Has no effect with serial display.",
196 description
=> "The size of the file in MB.",
200 pattern
=> '[a-zA-Z0-9\-]+',
202 format_description
=> 'string',
203 description
=> "The name of the file. Will be prefixed with 'pve-shm-'. Default is the VMID. Will be deleted when the VM is stopped.",
210 enum
=> [qw(ich9-intel-hda intel-hda AC97)],
211 description
=> "Configure an audio device."
215 enum
=> ['spice', 'none'],
218 description
=> "Driver backend for the audio device."
222 my $spice_enhancements_fmt = {
227 description
=> "Enable folder sharing via SPICE. Needs Spice-WebDAV daemon installed in the VM."
231 enum
=> ['off', 'all', 'filter'],
234 description
=> "Enable video streaming. Uses compression for detected video streams."
241 enum
=> ['/dev/urandom', '/dev/random', '/dev/hwrng'],
243 description
=> "The file on the host to gather entropy from. In most"
244 . " cases /dev/urandom should be preferred over /dev/random"
245 . " to avoid entropy-starvation issues on the host. Using"
246 . " urandom does *not* decrease security in any meaningful"
247 . " way, as it's still seeded from real entropy, and the"
248 . " bytes provided will most likely be mixed with real"
249 . " entropy on the guest as well. /dev/hwrng can be used"
250 . " to pass through a hardware RNG from the host.",
254 description
=> "Maximum bytes of entropy injected into the guest every"
255 . " 'period' milliseconds. Prefer a lower value when using"
256 . " /dev/random as source. Use 0 to disable limiting"
257 . " (potentially dangerous!).",
260 # default is 1 KiB/s, provides enough entropy to the guest to avoid
261 # boot-starvation issues (e.g. systemd etc...) while allowing no chance
262 # of overwhelming the host, provided we're reading from /dev/urandom
267 description
=> "Every 'period' milliseconds the entropy-injection quota"
268 . " is reset, allowing the guest to retrieve another"
269 . " 'max_bytes' of entropy.",
279 description
=> "Specifies whether a VM will be started during system bootup.",
285 description
=> "Automatic restart after crash (currently ignored).",
290 type
=> 'string', format
=> 'pve-hotplug-features',
291 description
=> "Selectively enable hotplug features. This is a comma separated list of hotplug features: 'network', 'disk', 'cpu', 'memory' and 'usb'. Use '0' to disable hotplug completely. Value '1' is an alias for the default 'network,disk,usb'.",
292 default => 'network,disk,usb',
297 description
=> "Allow reboot. If set to '0' the VM exit on reboot.",
303 description
=> "Lock/unlock the VM.",
304 enum
=> [qw(backup clone create migrate rollback snapshot snapshot-delete suspending suspended)],
309 description
=> "Limit of CPU usage.",
310 verbose_description
=> "Limit of CPU usage.\n\nNOTE: If the computer has 2 CPUs, it has total of '2' CPU time. Value '0' indicates no CPU limit.",
318 description
=> "CPU weight for a VM.",
319 verbose_description
=> "CPU weight for a VM. Argument is used in the kernel fair scheduler. The larger the number is, the more CPU time this VM gets. Number is relative to weights of all the other running VMs.",
327 description
=> "Amount of RAM for the VM in MB. This is the maximum available memory when you use the balloon device.",
334 description
=> "Amount of target RAM for the VM in MB. Using zero disables the ballon driver.",
340 description
=> "Amount of memory shares for auto-ballooning. The larger the number is, the more memory this VM gets. Number is relative to weights of all other running VMs. Using zero disables auto-ballooning. Auto-ballooning is done by pvestatd.",
348 description
=> "Keybord layout for vnc server. Default is read from the '/etc/pve/datacenter.cfg' configuration file.".
349 "It should not be necessary to set it.",
350 enum
=> PVE
::Tools
::kvmkeymaplist
(),
355 type
=> 'string', format
=> 'dns-name',
356 description
=> "Set a name for the VM. Only used on the configuration web interface.",
361 description
=> "SCSI controller model",
362 enum
=> [qw(lsi lsi53c810 virtio-scsi-pci virtio-scsi-single megasas pvscsi)],
368 description
=> "Description for the VM. Shown in the web-interface VM's summary."
369 ." This is saved as comment inside the configuration file.",
370 maxLength
=> 1024 * 8,
375 enum
=> [qw(other wxp w2k w2k3 w2k8 wvista win7 win8 win10 l24 l26 solaris)],
376 description
=> "Specify guest operating system.",
377 verbose_description
=> <<EODESC,
378 Specify guest operating system. This is used to enable special
379 optimization/features for specific operating systems:
382 other;; unspecified OS
383 wxp;; Microsoft Windows XP
384 w2k;; Microsoft Windows 2000
385 w2k3;; Microsoft Windows 2003
386 w2k8;; Microsoft Windows 2008
387 wvista;; Microsoft Windows Vista
388 win7;; Microsoft Windows 7
389 win8;; Microsoft Windows 8/2012/2012r2
390 win10;; Microsoft Windows 10/2016/2019
391 l24;; Linux 2.4 Kernel
392 l26;; Linux 2.6 - 5.X Kernel
393 solaris;; Solaris/OpenSolaris/OpenIndiania kernel
398 type
=> 'string', format
=> 'pve-qm-boot',
399 description
=> "Specify guest boot order. Use with 'order=', usage with"
400 . " no key or 'legacy=' is deprecated.",
404 type
=> 'string', format
=> 'pve-qm-bootdisk',
405 description
=> "Enable booting from specified disk. Deprecated: Use 'boot: order=foo;bar' instead.",
406 pattern
=> '(ide|sata|scsi|virtio)\d+',
411 description
=> "The number of CPUs. Please use option -sockets instead.",
418 description
=> "The number of CPU sockets.",
425 description
=> "The number of cores per socket.",
432 description
=> "Enable/disable NUMA.",
438 description
=> "Enable/disable hugepages memory.",
439 enum
=> [qw(any 2 1024)],
445 description
=> "Use together with hugepages. If enabled, hugepages will not not be deleted"
446 ." after VM shutdown and can be used for subsequent starts.",
451 description
=> "Number of hotplugged vcpus.",
458 description
=> "Enable/disable ACPI.",
463 description
=> "Enable/disable Qemu GuestAgent and its properties.",
465 format
=> $agent_fmt,
470 description
=> "Enable/disable KVM hardware virtualization.",
476 description
=> "Enable/disable time drift fix.",
482 description
=> "Set the real time clock to local time. This is enabled by default if ostype"
483 ." indicates a Microsoft OS.",
488 description
=> "Freeze CPU at startup (use 'c' monitor command to start execution).",
492 type
=> 'string', format
=> $vga_fmt,
493 description
=> "Configure the VGA hardware.",
494 verbose_description
=> "Configure the VGA Hardware. If you want to use high resolution"
495 ." modes (>= 1280x1024x16) you may need to increase the vga memory option. Since QEMU"
496 ." 2.9 the default VGA display type is 'std' for all OS types besides some Windows"
497 ." versions (XP and older) which use 'cirrus'. The 'qxl' option enables the SPICE"
498 ." display server. For win* OS you can select how many independent displays you want,"
499 ." Linux guests can add displays them self.\nYou can also run without any graphic card,"
500 ." using a serial device as terminal.",
504 type
=> 'string', format
=> 'pve-qm-watchdog',
505 description
=> "Create a virtual hardware watchdog device.",
506 verbose_description
=> "Create a virtual hardware watchdog device. Once enabled (by a guest"
507 ." action), the watchdog must be periodically polled by an agent inside the guest or"
508 ." else the watchdog will reset the guest (or execute the respective action specified)",
513 typetext
=> "(now | YYYY-MM-DD | YYYY-MM-DDTHH:MM:SS)",
514 description
=> "Set the initial date of the real time clock. Valid format for date are:"
515 ."'now' or '2006-06-17T16:01:21' or '2006-06-17'.",
516 pattern
=> '(now|\d{4}-\d{1,2}-\d{1,2}(T\d{1,2}:\d{1,2}:\d{1,2})?)',
519 startup
=> get_standard_option
('pve-startup-order'),
523 description
=> "Enable/disable Template.",
529 description
=> "Arbitrary arguments passed to kvm.",
530 verbose_description
=> <<EODESCR,
531 Arbitrary arguments passed to kvm, for example:
533 args: -no-reboot -no-hpet
535 NOTE: this option is for experts only.
542 description
=> "Enable/disable the USB tablet device.",
543 verbose_description
=> "Enable/disable the USB tablet device. This device is usually needed"
544 ." to allow absolute mouse positioning with VNC. Else the mouse runs out of sync with"
545 ." normal VNC clients. If you're running lots of console-only guests on one host, you"
546 ." may consider disabling this to save some context switches. This is turned off by"
547 ." default if you use spice (`qm set <vmid> --vga qxl`).",
552 description
=> "Set maximum speed (in MB/s) for migrations. Value 0 is no limit.",
556 migrate_downtime
=> {
559 description
=> "Set maximum tolerated downtime (in seconds) for migrations.",
565 type
=> 'string', format
=> 'pve-qm-ide',
566 typetext
=> '<volume>',
567 description
=> "This is an alias for option -ide2",
571 description
=> "Emulated CPU type.",
573 format
=> 'pve-vm-cpu-conf',
575 parent
=> get_standard_option
('pve-snapshot-name', {
577 description
=> "Parent snapshot name. This is used internally, and should not be modified.",
581 description
=> "Timestamp for snapshots.",
587 type
=> 'string', format
=> 'pve-volume-id',
588 description
=> "Reference to a volume which stores the VM state. This is used internally"
591 vmstatestorage
=> get_standard_option
('pve-storage-id', {
592 description
=> "Default storage for VM state volumes/files.",
595 runningmachine
=> get_standard_option
('pve-qemu-machine', {
596 description
=> "Specifies the QEMU machine type of the running vm. This is used internally"
600 description
=> "Specifies the QEMU '-cpu' parameter of the running vm. This is used"
601 ." internally for snapshots.",
604 pattern
=> $PVE::QemuServer
::CPUConfig
::qemu_cmdline_cpu_re
,
605 format_description
=> 'QEMU -cpu parameter'
607 machine
=> get_standard_option
('pve-qemu-machine'),
609 description
=> "Virtual processor architecture. Defaults to the host.",
612 enum
=> [qw(x86_64 aarch64)],
615 description
=> "Specify SMBIOS type 1 fields.",
616 type
=> 'string', format
=> 'pve-qm-smbios1',
623 description
=> "Sets the protection flag of the VM. This will disable the remove VM and"
624 ." remove disk operations.",
630 enum
=> [ qw(seabios ovmf) ],
631 description
=> "Select BIOS implementation.",
632 default => 'seabios',
636 pattern
=> '(?:[a-fA-F0-9]{8}(?:-[a-fA-F0-9]{4}){3}-[a-fA-F0-9]{12}|[01])',
637 format_description
=> 'UUID',
638 description
=> "Set VM Generation ID. Use '1' to autogenerate on create or update, pass '0'"
639 ." to disable explicitly.",
640 verbose_description
=> "The VM generation ID (vmgenid) device exposes a 128-bit integer"
641 ." value identifier to the guest OS. This allows to notify the guest operating system"
642 ." when the virtual machine is executed with a different configuration (e.g. snapshot"
643 ." execution or creation from a template). The guest operating system notices the"
644 ." change, and is then able to react as appropriate by marking its copies of"
645 ." distributed databases as dirty, re-initializing its random number generator, etc.\n"
646 ."Note that auto-creation only works when done through API/CLI create or update methods"
647 .", but not when manually editing the config file.",
648 default => "1 (autogenerated)",
653 format
=> 'pve-volume-id',
655 description
=> "Script that will be executed during various steps in the vms lifetime.",
659 format
=> $ivshmem_fmt,
660 description
=> "Inter-VM shared memory. Useful for direct communication between VMs, or to"
666 format
=> $audio_fmt,
667 description
=> "Configure a audio device, useful in combination with QXL/Spice.",
670 spice_enhancements
=> {
672 format
=> $spice_enhancements_fmt,
673 description
=> "Configure additional enhancements for SPICE.",
677 type
=> 'string', format
=> 'pve-tag-list',
678 description
=> 'Tags of the VM. This is only meta information.',
684 description
=> "Configure a VirtIO-based Random Number Generator.",
693 description
=> 'Specify a custom file containing all meta data passed to the VM via"
694 ." cloud-init. This is provider specific meaning configdrive2 and nocloud differ.',
695 format
=> 'pve-volume-id',
696 format_description
=> 'volume',
701 description
=> 'Specify a custom file containing all network data passed to the VM via'
703 format
=> 'pve-volume-id',
704 format_description
=> 'volume',
709 description
=> 'Specify a custom file containing all user data passed to the VM via'
711 format
=> 'pve-volume-id',
712 format_description
=> 'volume',
715 PVE
::JSONSchema
::register_format
('pve-qm-cicustom', $cicustom_fmt);
717 my $confdesc_cloudinit = {
721 description
=> 'Specifies the cloud-init configuration format. The default depends on the'
722 .' configured operating system type (`ostype`. We use the `nocloud` format for Linux,'
723 .' and `configdrive2` for windows.',
724 enum
=> ['configdrive2', 'nocloud', 'opennebula'],
729 description
=> "cloud-init: User name to change ssh keys and password for instead of the"
730 ." image's configured default user.",
735 description
=> 'cloud-init: Password to assign the user. Using this is generally not'
736 .' recommended. Use ssh keys instead. Also note that older cloud-init versions do not'
737 .' support hashed passwords.',
742 description
=> 'cloud-init: Specify custom files to replace the automatically generated'
744 format
=> 'pve-qm-cicustom',
749 description
=> "cloud-init: Sets DNS search domains for a container. Create will'
750 .' automatically use the setting from the host if neither searchdomain nor nameserver'
755 type
=> 'string', format
=> 'address-list',
756 description
=> "cloud-init: Sets DNS server IP address for a container. Create will'
757 .' automatically use the setting from the host if neither searchdomain nor nameserver'
763 format
=> 'urlencoded',
764 description
=> "cloud-init: Setup public SSH keys (one key per line, OpenSSH format).",
768 # what about other qemu settings ?
770 #machine => 'string',
783 ##soundhw => 'string',
785 while (my ($k, $v) = each %$confdesc) {
786 PVE
::JSONSchema
::register_standard_option
("pve-qm-$k", $v);
789 my $MAX_USB_DEVICES = 5;
791 my $MAX_SERIAL_PORTS = 4;
792 my $MAX_PARALLEL_PORTS = 3;
798 pattern
=> qr/\d+(?:-\d+)?(?:;\d+(?:-\d+)?)*/,
799 description
=> "CPUs accessing this NUMA node.",
800 format_description
=> "id[-id];...",
804 description
=> "Amount of memory this NUMA node provides.",
809 pattern
=> qr/\d+(?:-\d+)?(?:;\d+(?:-\d+)?)*/,
810 description
=> "Host NUMA nodes to use.",
811 format_description
=> "id[-id];...",
816 enum
=> [qw(preferred bind interleave)],
817 description
=> "NUMA allocation policy.",
821 PVE
::JSONSchema
::register_format
('pve-qm-numanode', $numa_fmt);
824 type
=> 'string', format
=> $numa_fmt,
825 description
=> "NUMA topology.",
827 PVE
::JSONSchema
::register_standard_option
("pve-qm-numanode", $numadesc);
829 for (my $i = 0; $i < $MAX_NUMA; $i++) {
830 $confdesc->{"numa$i"} = $numadesc;
833 my $nic_model_list = ['rtl8139', 'ne2k_pci', 'e1000', 'pcnet', 'virtio',
834 'ne2k_isa', 'i82551', 'i82557b', 'i82559er', 'vmxnet3',
835 'e1000-82540em', 'e1000-82544gc', 'e1000-82545em'];
836 my $nic_model_list_txt = join(' ', sort @$nic_model_list);
838 my $net_fmt_bridge_descr = <<__EOD__;
839 Bridge to attach the network device to. The Proxmox VE standard bridge
842 If you do not specify a bridge, we create a kvm user (NATed) network
843 device, which provides DHCP and DNS services. The following addresses
850 The DHCP server assign addresses to the guest starting from 10.0.2.15.
854 macaddr
=> get_standard_option
('mac-addr', {
855 description
=> "MAC address. That address must be unique withing your network. This is"
856 ." automatically generated if not specified.",
860 description
=> "Network Card Model. The 'virtio' model provides the best performance with"
861 ." very low CPU overhead. If your guest does not support this driver, it is usually"
862 ." best to use 'e1000'.",
863 enum
=> $nic_model_list,
866 (map { $_ => { keyAlias
=> 'model', alias
=> 'macaddr' }} @$nic_model_list),
869 description
=> $net_fmt_bridge_descr,
870 format_description
=> 'bridge',
871 pattern
=> '[-_.\w\d]+',
876 minimum
=> 0, maximum
=> 16,
877 description
=> 'Number of packet queues to be used on the device.',
883 description
=> "Rate limit in mbps (megabytes per second) as floating point number.",
888 minimum
=> 1, maximum
=> 4094,
889 description
=> 'VLAN tag to apply to packets on this interface.',
894 pattern
=> qr/\d+(?:-\d+)?(?:;\d+(?:-\d+)?)*/,
895 description
=> 'VLAN trunks to pass through this interface.',
896 format_description
=> 'vlanid[;vlanid...]',
901 description
=> 'Whether this interface should be protected by the firewall.',
906 description
=> 'Whether this interface should be disconnected (like pulling the plug).',
911 minimum
=> 1, maximum
=> 65520,
912 description
=> "Force MTU, for VirtIO only. Set to '1' to use the bridge MTU",
919 type
=> 'string', format
=> $net_fmt,
920 description
=> "Specify network devices.",
923 PVE
::JSONSchema
::register_standard_option
("pve-qm-net", $netdesc);
928 format
=> 'pve-ipv4-config',
929 format_description
=> 'IPv4Format/CIDR',
930 description
=> 'IPv4 address in CIDR format.',
937 format_description
=> 'GatewayIPv4',
938 description
=> 'Default gateway for IPv4 traffic.',
944 format
=> 'pve-ipv6-config',
945 format_description
=> 'IPv6Format/CIDR',
946 description
=> 'IPv6 address in CIDR format.',
953 format_description
=> 'GatewayIPv6',
954 description
=> 'Default gateway for IPv6 traffic.',
959 PVE
::JSONSchema
::register_format
('pve-qm-ipconfig', $ipconfig_fmt);
962 type
=> 'string', format
=> 'pve-qm-ipconfig',
963 description
=> <<'EODESCR',
964 cloud-init: Specify IP addresses and gateways for the corresponding interface.
966 IP addresses use CIDR notation, gateways are optional but need an IP of the same type specified.
968 The special string 'dhcp' can be used for IP addresses to use DHCP, in which case no explicit
969 gateway should be provided.
970 For IPv6 the special string 'auto' can be used to use stateless autoconfiguration. This requires
971 cloud-init 19.4 or newer.
973 If cloud-init is enabled and neither an IPv4 nor an IPv6 address is specified, it defaults to using
977 PVE
::JSONSchema
::register_standard_option
("pve-qm-ipconfig", $netdesc);
979 for (my $i = 0; $i < $MAX_NETS; $i++) {
980 $confdesc->{"net$i"} = $netdesc;
981 $confdesc_cloudinit->{"ipconfig$i"} = $ipconfigdesc;
984 foreach my $key (keys %$confdesc_cloudinit) {
985 $confdesc->{$key} = $confdesc_cloudinit->{$key};
988 PVE
::JSONSchema
::register_format
('pve-volume-id-or-qm-path', \
&verify_volume_id_or_qm_path
);
989 sub verify_volume_id_or_qm_path
{
990 my ($volid, $noerr) = @_;
992 if ($volid eq 'none' || $volid eq 'cdrom' || $volid =~ m
|^/|) {
996 # if its neither 'none' nor 'cdrom' nor a path, check if its a volume-id
997 $volid = eval { PVE
::JSONSchema
::check_format
('pve-volume-id', $volid, '') };
1008 type
=> 'string', format
=> 'pve-qm-usb-device',
1009 format_description
=> 'HOSTUSBDEVICE|spice',
1010 description
=> <<EODESCR,
1011 The Host USB device or port or the value 'spice'. HOSTUSBDEVICE syntax is:
1013 'bus-port(.port)*' (decimal numbers) or
1014 'vendor_id:product_id' (hexadeciaml numbers) or
1017 You can use the 'lsusb -t' command to list existing usb devices.
1019 NOTE: This option allows direct access to host hardware. So it is no longer possible to migrate such
1020 machines - use with special care.
1022 The value 'spice' can be used to add a usb redirection devices for spice.
1028 description
=> "Specifies whether if given host option is a USB3 device or port.",
1035 type
=> 'string', format
=> $usb_fmt,
1036 description
=> "Configure an USB device (n is 0 to 4).",
1038 PVE
::JSONSchema
::register_standard_option
("pve-qm-usb", $usbdesc);
1043 pattern
=> '(/dev/.+|socket)',
1044 description
=> "Create a serial device inside the VM (n is 0 to 3)",
1045 verbose_description
=> <<EODESCR,
1046 Create a serial device inside the VM (n is 0 to 3), and pass through a
1047 host serial device (i.e. /dev/ttyS0), or create a unix socket on the
1048 host side (use 'qm terminal' to open a terminal connection).
1050 NOTE: If you pass through a host serial device, it is no longer possible to migrate such machines -
1051 use with special care.
1053 CAUTION: Experimental! User reported problems with this option.
1060 pattern
=> '/dev/parport\d+|/dev/usb/lp\d+',
1061 description
=> "Map host parallel devices (n is 0 to 2).",
1062 verbose_description
=> <<EODESCR,
1063 Map host parallel devices (n is 0 to 2).
1065 NOTE: This option allows direct access to host hardware. So it is no longer possible to migrate such
1066 machines - use with special care.
1068 CAUTION: Experimental! User reported problems with this option.
1072 for (my $i = 0; $i < $MAX_PARALLEL_PORTS; $i++) {
1073 $confdesc->{"parallel$i"} = $paralleldesc;
1076 for (my $i = 0; $i < $MAX_SERIAL_PORTS; $i++) {
1077 $confdesc->{"serial$i"} = $serialdesc;
1080 for (my $i = 0; $i < $PVE::QemuServer
::PCI
::MAX_HOSTPCI_DEVICES
; $i++) {
1081 $confdesc->{"hostpci$i"} = $PVE::QemuServer
::PCI
::hostpcidesc
;
1084 for my $key (keys %{$PVE::QemuServer
::Drive
::drivedesc_hash
}) {
1085 $confdesc->{$key} = $PVE::QemuServer
::Drive
::drivedesc_hash-
>{$key};
1088 for (my $i = 0; $i < $MAX_USB_DEVICES; $i++) {
1089 $confdesc->{"usb$i"} = $usbdesc;
1097 description
=> "Boot on floppy (a), hard disk (c), CD-ROM (d), or network (n)."
1098 . " Deprecated, use 'order=' instead.",
1099 pattern
=> '[acdn]{1,4}',
1100 format_description
=> "[acdn]{1,4}",
1102 # note: this is also the fallback if boot: is not given at all
1108 format
=> 'pve-qm-bootdev-list',
1109 format_description
=> "device[;device...]",
1110 description
=> <<EODESC,
1111 The guest will attempt to boot from devices in the order they appear here.
1113 Disks, optical drives and passed-through storage USB devices will be directly
1114 booted from, NICs will load PXE, and PCIe devices will either behave like disks
1115 (e.g. NVMe) or load an option ROM (e.g. RAID controller, hardware NIC).
1117 Note that only devices in this list will be marked as bootable and thus loaded
1118 by the guest firmware (BIOS/UEFI). If you require multiple disks for booting
1119 (e.g. software-raid), you need to specify all of them here.
1121 Overrides the deprecated 'legacy=[acdn]*' value when given.
1125 PVE
::JSONSchema
::register_format
('pve-qm-boot', $boot_fmt);
1127 PVE
::JSONSchema
::register_format
('pve-qm-bootdev', \
&verify_bootdev
);
1128 sub verify_bootdev
{
1129 my ($dev, $noerr) = @_;
1131 return $dev if PVE
::QemuServer
::Drive
::is_valid_drivename
($dev) && $dev !~ m/^efidisk/;
1135 return 0 if $dev !~ m/^$base\d+$/;
1136 return 0 if !$confdesc->{$dev};
1140 return $dev if $check->("net");
1141 return $dev if $check->("usb");
1142 return $dev if $check->("hostpci");
1145 die "invalid boot device '$dev'\n";
1148 sub print_bootorder
{
1150 return "" if !@$devs;
1151 my $data = { order
=> join(';', @$devs) };
1152 return PVE
::JSONSchema
::print_property_string
($data, $boot_fmt);
1155 my $kvm_api_version = 0;
1158 return $kvm_api_version if $kvm_api_version;
1160 open my $fh, '<', '/dev/kvm' or return;
1162 # 0xae00 => KVM_GET_API_VERSION
1163 $kvm_api_version = ioctl($fh, 0xae00, 0);
1166 return $kvm_api_version;
1169 my $kvm_user_version = {};
1172 sub kvm_user_version
{
1175 $binary //= get_command_for_arch
(get_host_arch
()); # get the native arch by default
1176 my $st = stat($binary);
1178 my $cachedmtime = $kvm_mtime->{$binary} // -1;
1179 return $kvm_user_version->{$binary} if $kvm_user_version->{$binary} &&
1180 $cachedmtime == $st->mtime;
1182 $kvm_user_version->{$binary} = 'unknown';
1183 $kvm_mtime->{$binary} = $st->mtime;
1187 if ($line =~ m/^QEMU( PC)? emulator version (\d+\.\d+(\.\d+)?)(\.\d+)?[,\s]/) {
1188 $kvm_user_version->{$binary} = $2;
1192 eval { run_command
([$binary, '--version'], outfunc
=> $code); };
1195 return $kvm_user_version->{$binary};
1198 my sub extract_version
{
1199 my ($machine_type, $version) = @_;
1200 $version = kvm_user_version
() if !defined($version);
1201 PVE
::QemuServer
::Machine
::extract_version
($machine_type, $version)
1204 sub kernel_has_vhost_net
{
1205 return -c
'/dev/vhost-net';
1210 return defined($confdesc->{$key});
1214 sub get_cdrom_path
{
1216 return $cdrom_path if $cdrom_path;
1218 return $cdrom_path = "/dev/cdrom" if -l
"/dev/cdrom";
1219 return $cdrom_path = "/dev/cdrom1" if -l
"/dev/cdrom1";
1220 return $cdrom_path = "/dev/cdrom2" if -l
"/dev/cdrom2";
1224 my ($storecfg, $vmid, $cdrom) = @_;
1226 if ($cdrom eq 'cdrom') {
1227 return get_cdrom_path
();
1228 } elsif ($cdrom eq 'none') {
1230 } elsif ($cdrom =~ m
|^/|) {
1233 return PVE
::Storage
::path
($storecfg, $cdrom);
1237 # try to convert old style file names to volume IDs
1238 sub filename_to_volume_id
{
1239 my ($vmid, $file, $media) = @_;
1241 if (!($file eq 'none' || $file eq 'cdrom' ||
1242 $file =~ m
|^/dev/.+| || $file =~ m/^([^:]+):(.+)$/)) {
1244 return if $file =~ m
|/|;
1246 if ($media && $media eq 'cdrom') {
1247 $file = "local:iso/$file";
1249 $file = "local:$vmid/$file";
1256 sub verify_media_type
{
1257 my ($opt, $vtype, $media) = @_;
1262 if ($media eq 'disk') {
1264 } elsif ($media eq 'cdrom') {
1267 die "internal error";
1270 return if ($vtype eq $etype);
1272 raise_param_exc
({ $opt => "unexpected media type ($vtype != $etype)" });
1275 sub cleanup_drive_path
{
1276 my ($opt, $storecfg, $drive) = @_;
1278 # try to convert filesystem paths to volume IDs
1280 if (($drive->{file
} !~ m/^(cdrom|none)$/) &&
1281 ($drive->{file
} !~ m
|^/dev/.+|) &&
1282 ($drive->{file
} !~ m/^([^:]+):(.+)$/) &&
1283 ($drive->{file
} !~ m/^\d+$/)) {
1284 my ($vtype, $volid) = PVE
::Storage
::path_to_volume_id
($storecfg, $drive->{file
});
1285 raise_param_exc
({ $opt => "unable to associate path '$drive->{file}' to any storage"})
1287 $drive->{media
} = 'cdrom' if !$drive->{media
} && $vtype eq 'iso';
1288 verify_media_type
($opt, $vtype, $drive->{media
});
1289 $drive->{file
} = $volid;
1292 $drive->{media
} = 'cdrom' if !$drive->{media
} && $drive->{file
} =~ m/^(cdrom|none)$/;
1295 sub parse_hotplug_features
{
1300 return $res if $data eq '0';
1302 $data = $confdesc->{hotplug
}->{default} if $data eq '1';
1304 foreach my $feature (PVE
::Tools
::split_list
($data)) {
1305 if ($feature =~ m/^(network|disk|cpu|memory|usb)$/) {
1308 die "invalid hotplug feature '$feature'\n";
1314 PVE
::JSONSchema
::register_format
('pve-hotplug-features', \
&pve_verify_hotplug_features
);
1315 sub pve_verify_hotplug_features
{
1316 my ($value, $noerr) = @_;
1318 return $value if parse_hotplug_features
($value);
1322 die "unable to parse hotplug option\n";
1326 my($fh, $noerr) = @_;
1329 my $SG_GET_VERSION_NUM = 0x2282;
1331 my $versionbuf = "\x00" x
8;
1332 my $ret = ioctl($fh, $SG_GET_VERSION_NUM, $versionbuf);
1334 die "scsi ioctl SG_GET_VERSION_NUM failoed - $!\n" if !$noerr;
1337 my $version = unpack("I", $versionbuf);
1338 if ($version < 30000) {
1339 die "scsi generic interface too old\n" if !$noerr;
1343 my $buf = "\x00" x
36;
1344 my $sensebuf = "\x00" x
8;
1345 my $cmd = pack("C x3 C x1", 0x12, 36);
1347 # see /usr/include/scsi/sg.h
1348 my $sg_io_hdr_t = "i i C C s I P P P I I i P C C C C S S i I I";
1350 my $packet = pack($sg_io_hdr_t, ord('S'), -3, length($cmd),
1351 length($sensebuf), 0, length($buf), $buf,
1352 $cmd, $sensebuf, 6000);
1354 $ret = ioctl($fh, $SG_IO, $packet);
1356 die "scsi ioctl SG_IO failed - $!\n" if !$noerr;
1360 my @res = unpack($sg_io_hdr_t, $packet);
1361 if ($res[17] || $res[18]) {
1362 die "scsi ioctl SG_IO status error - $!\n" if !$noerr;
1367 (my $byte0, my $byte1, $res->{vendor
},
1368 $res->{product
}, $res->{revision
}) = unpack("C C x6 A8 A16 A4", $buf);
1370 $res->{removable
} = $byte1 & 128 ?
1 : 0;
1371 $res->{type
} = $byte0 & 31;
1379 my $fh = IO
::File-
>new("+<$path") || return;
1380 my $res = scsi_inquiry
($fh, 1);
1386 sub print_tabletdevice_full
{
1387 my ($conf, $arch) = @_;
1389 my $q35 = PVE
::QemuServer
::Machine
::machine_type_is_q35
($conf);
1391 # we use uhci for old VMs because tablet driver was buggy in older qemu
1393 if (PVE
::QemuServer
::Machine
::machine_type_is_q35
($conf) || $arch eq 'aarch64') {
1399 return "usb-tablet,id=tablet,bus=$usbbus.0,port=1";
1402 sub print_keyboarddevice_full
{
1403 my ($conf, $arch, $machine) = @_;
1405 return if $arch ne 'aarch64';
1407 return "usb-kbd,id=keyboard,bus=ehci.0,port=2";
1410 my sub get_drive_id
{
1412 return "$drive->{interface}$drive->{index}";
1415 sub print_drivedevice_full
{
1416 my ($storecfg, $conf, $vmid, $drive, $bridges, $arch, $machine_type) = @_;
1421 my $drive_id = get_drive_id
($drive);
1422 if ($drive->{interface
} eq 'virtio') {
1423 my $pciaddr = print_pci_addr
("$drive_id", $bridges, $arch, $machine_type);
1424 $device = "virtio-blk-pci,drive=drive-$drive_id,id=${drive_id}${pciaddr}";
1425 $device .= ",iothread=iothread-$drive_id" if $drive->{iothread
};
1426 } elsif ($drive->{interface
} eq 'scsi') {
1428 my ($maxdev, $controller, $controller_prefix) = scsihw_infos
($conf, $drive);
1429 my $unit = $drive->{index} % $maxdev;
1430 my $devicetype = 'hd';
1432 if (drive_is_cdrom
($drive)) {
1435 if ($drive->{file
} =~ m
|^/|) {
1436 $path = $drive->{file
};
1437 if (my $info = path_is_scsi
($path)) {
1438 if ($info->{type
} == 0 && $drive->{scsiblock
}) {
1439 $devicetype = 'block';
1440 } elsif ($info->{type
} == 1) { # tape
1441 $devicetype = 'generic';
1445 $path = PVE
::Storage
::path
($storecfg, $drive->{file
});
1448 # for compatibility only, we prefer scsi-hd (#2408, #2355, #2380)
1449 my $version = extract_version
($machine_type, kvm_user_version
());
1450 if ($path =~ m/^iscsi\:\/\
// &&
1451 !min_version
($version, 4, 1)) {
1452 $devicetype = 'generic';
1456 if (!$conf->{scsihw
} || $conf->{scsihw
} =~ m/^lsi/ || $conf->{scsihw
} eq 'pvscsi') {
1457 $device = "scsi-$devicetype,bus=$controller_prefix$controller.0,scsi-id=$unit";
1459 $device = "scsi-$devicetype,bus=$controller_prefix$controller.0,channel=0,scsi-id=0"
1460 .",lun=$drive->{index}";
1462 $device .= ",drive=drive-$drive_id,id=$drive_id";
1464 if ($drive->{ssd
} && ($devicetype eq 'block' || $devicetype eq 'hd')) {
1465 $device .= ",rotation_rate=1";
1467 $device .= ",wwn=$drive->{wwn}" if $drive->{wwn
};
1469 } elsif ($drive->{interface
} eq 'ide' || $drive->{interface
} eq 'sata') {
1470 my $maxdev = ($drive->{interface
} eq 'sata') ?
$PVE::QemuServer
::Drive
::MAX_SATA_DISKS
: 2;
1471 my $controller = int($drive->{index} / $maxdev);
1472 my $unit = $drive->{index} % $maxdev;
1473 my $devicetype = ($drive->{media
} && $drive->{media
} eq 'cdrom') ?
"cd" : "hd";
1475 $device = "ide-$devicetype";
1476 if ($drive->{interface
} eq 'ide') {
1477 $device .= ",bus=ide.$controller,unit=$unit";
1479 $device .= ",bus=ahci$controller.$unit";
1481 $device .= ",drive=drive-$drive_id,id=$drive_id";
1483 if ($devicetype eq 'hd') {
1484 if (my $model = $drive->{model
}) {
1485 $model = URI
::Escape
::uri_unescape
($model);
1486 $device .= ",model=$model";
1488 if ($drive->{ssd
}) {
1489 $device .= ",rotation_rate=1";
1492 $device .= ",wwn=$drive->{wwn}" if $drive->{wwn
};
1493 } elsif ($drive->{interface
} eq 'usb') {
1495 # -device ide-drive,bus=ide.1,unit=0,drive=drive-ide0-1-0,id=ide0-1-0
1497 die "unsupported interface type";
1500 $device .= ",bootindex=$drive->{bootindex}" if $drive->{bootindex
};
1502 if (my $serial = $drive->{serial
}) {
1503 $serial = URI
::Escape
::uri_unescape
($serial);
1504 $device .= ",serial=$serial";
1511 sub get_initiator_name
{
1514 my $fh = IO
::File-
>new('/etc/iscsi/initiatorname.iscsi') || return;
1515 while (defined(my $line = <$fh>)) {
1516 next if $line !~ m/^\s*InitiatorName\s*=\s*([\.\-:\w]+)/;
1525 sub print_drive_commandline_full
{
1526 my ($storecfg, $vmid, $drive, $pbs_name) = @_;
1529 my $volid = $drive->{file
};
1530 my $format = $drive->{format
};
1531 my $drive_id = get_drive_id
($drive);
1533 if (drive_is_cdrom
($drive)) {
1534 $path = get_iso_path
($storecfg, $vmid, $volid);
1535 die "$drive_id: cannot back cdrom drive with PBS snapshot\n" if $pbs_name;
1537 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($volid, 1);
1539 $path = PVE
::Storage
::path
($storecfg, $volid);
1540 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
1541 $format //= qemu_img_format
($scfg, $volname);
1548 my $is_rbd = $path =~ m/^rbd:/;
1551 my @qemu_drive_options = qw(heads secs cyls trans media cache rerror werror aio discard);
1552 foreach my $o (@qemu_drive_options) {
1553 $opts .= ",$o=$drive->{$o}" if defined($drive->{$o});
1556 # snapshot only accepts on|off
1557 if (defined($drive->{snapshot
})) {
1558 my $v = $drive->{snapshot
} ?
'on' : 'off';
1559 $opts .= ",snapshot=$v";
1562 foreach my $type (['', '-total'], [_rd
=> '-read'], [_wr
=> '-write']) {
1563 my ($dir, $qmpname) = @$type;
1564 if (my $v = $drive->{"mbps$dir"}) {
1565 $opts .= ",throttling.bps$qmpname=".int($v*1024*1024);
1567 if (my $v = $drive->{"mbps${dir}_max"}) {
1568 $opts .= ",throttling.bps$qmpname-max=".int($v*1024*1024);
1570 if (my $v = $drive->{"bps${dir}_max_length"}) {
1571 $opts .= ",throttling.bps$qmpname-max-length=$v";
1573 if (my $v = $drive->{"iops${dir}"}) {
1574 $opts .= ",throttling.iops$qmpname=$v";
1576 if (my $v = $drive->{"iops${dir}_max"}) {
1577 $opts .= ",throttling.iops$qmpname-max=$v";
1579 if (my $v = $drive->{"iops${dir}_max_length"}) {
1580 $opts .= ",throttling.iops$qmpname-max-length=$v";
1585 $format = "rbd" if $is_rbd;
1586 die "$drive_id: Proxmox Backup Server backed drive cannot auto-detect the format\n"
1588 $opts .= ",format=alloc-track,file.driver=$format";
1590 $opts .= ",format=$format";
1593 my $cache_direct = 0;
1595 if (my $cache = $drive->{cache
}) {
1596 $cache_direct = $cache =~ /^(?:off|none|directsync)$/;
1597 } elsif (!drive_is_cdrom
($drive)) {
1598 $opts .= ",cache=none";
1602 # aio native works only with O_DIRECT
1603 if (!$drive->{aio
}) {
1605 $opts .= ",aio=native";
1607 $opts .= ",aio=threads";
1611 if (!drive_is_cdrom
($drive)) {
1613 if (defined($drive->{detect_zeroes
}) && !$drive->{detect_zeroes
}) {
1614 $detectzeroes = 'off';
1615 } elsif ($drive->{discard
}) {
1616 $detectzeroes = $drive->{discard
} eq 'on' ?
'unmap' : 'on';
1618 # This used to be our default with discard not being specified:
1619 $detectzeroes = 'on';
1622 # note: 'detect-zeroes' works per blockdev and we want it to persist
1623 # after the alloc-track is removed, so put it on 'file' directly
1624 my $dz_param = $pbs_name ?
"file.detect-zeroes" : "detect-zeroes";
1625 $opts .= ",$dz_param=$detectzeroes" if $detectzeroes;
1629 $opts .= ",backing=$pbs_name";
1630 $opts .= ",auto-remove=on";
1633 # my $file_param = $pbs_name ? "file.file.filename" : "file";
1634 my $file_param = "file";
1636 # non-rbd drivers require the underlying file to be a seperate block
1637 # node, so add a second .file indirection
1638 $file_param .= ".file" if !$is_rbd;
1639 $file_param .= ".filename";
1641 my $pathinfo = $path ?
"$file_param=$path," : '';
1643 return "${pathinfo}if=none,id=drive-$drive->{interface}$drive->{index}$opts";
1646 sub print_pbs_blockdev
{
1647 my ($pbs_conf, $pbs_name) = @_;
1648 my $blockdev = "driver=pbs,node-name=$pbs_name,read-only=on";
1649 $blockdev .= ",repository=$pbs_conf->{repository}";
1650 $blockdev .= ",snapshot=$pbs_conf->{snapshot}";
1651 $blockdev .= ",archive=$pbs_conf->{archive}";
1652 $blockdev .= ",keyfile=$pbs_conf->{keyfile}" if $pbs_conf->{keyfile
};
1656 sub print_netdevice_full
{
1657 my ($vmid, $conf, $net, $netid, $bridges, $use_old_bios_files, $arch, $machine_type) = @_;
1659 my $device = $net->{model
};
1660 if ($net->{model
} eq 'virtio') {
1661 $device = 'virtio-net-pci';
1664 my $pciaddr = print_pci_addr
("$netid", $bridges, $arch, $machine_type);
1665 my $tmpstr = "$device,mac=$net->{macaddr},netdev=$netid$pciaddr,id=$netid";
1666 if ($net->{queues
} && $net->{queues
} > 1 && $net->{model
} eq 'virtio'){
1667 # Consider we have N queues, the number of vectors needed is 2 * N + 2, i.e., one per in
1668 # and out of each queue plus one config interrupt and control vector queue
1669 my $vectors = $net->{queues
} * 2 + 2;
1670 $tmpstr .= ",vectors=$vectors,mq=on";
1672 $tmpstr .= ",bootindex=$net->{bootindex}" if $net->{bootindex
} ;
1674 if (my $mtu = $net->{mtu
}) {
1675 if ($net->{model
} eq 'virtio' && $net->{bridge
}) {
1676 my $bridge_mtu = PVE
::Network
::read_bridge_mtu
($net->{bridge
});
1679 } elsif ($mtu < 576) {
1680 die "netdev $netid: MTU '$mtu' is smaller than the IP minimum MTU '576'\n";
1681 } elsif ($mtu > $bridge_mtu) {
1682 die "netdev $netid: MTU '$mtu' is bigger than the bridge MTU '$bridge_mtu'\n";
1684 $tmpstr .= ",host_mtu=$mtu";
1686 warn "WARN: netdev $netid: ignoring MTU '$mtu', not using VirtIO or no bridge configured.\n";
1690 if ($use_old_bios_files) {
1692 if ($device eq 'virtio-net-pci') {
1693 $romfile = 'pxe-virtio.rom';
1694 } elsif ($device eq 'e1000') {
1695 $romfile = 'pxe-e1000.rom';
1696 } elsif ($device eq 'ne2k') {
1697 $romfile = 'pxe-ne2k_pci.rom';
1698 } elsif ($device eq 'pcnet') {
1699 $romfile = 'pxe-pcnet.rom';
1700 } elsif ($device eq 'rtl8139') {
1701 $romfile = 'pxe-rtl8139.rom';
1703 $tmpstr .= ",romfile=$romfile" if $romfile;
1709 sub print_netdev_full
{
1710 my ($vmid, $conf, $arch, $net, $netid, $hotplug) = @_;
1713 if ($netid =~ m/^net(\d+)$/) {
1717 die "got strange net id '$i'\n" if $i >= ${MAX_NETS
};
1719 my $ifname = "tap${vmid}i$i";
1721 # kvm uses TUNSETIFF ioctl, and that limits ifname length
1722 die "interface name '$ifname' is too long (max 15 character)\n"
1723 if length($ifname) >= 16;
1725 my $vhostparam = '';
1726 if (is_native
($arch)) {
1727 $vhostparam = ',vhost=on' if kernel_has_vhost_net
() && $net->{model
} eq 'virtio';
1730 my $vmname = $conf->{name
} || "vm$vmid";
1733 my $script = $hotplug ?
"pve-bridge-hotplug" : "pve-bridge";
1735 if ($net->{bridge
}) {
1736 $netdev = "type=tap,id=$netid,ifname=${ifname},script=/var/lib/qemu-server/$script"
1737 .",downscript=/var/lib/qemu-server/pve-bridgedown$vhostparam";
1739 $netdev = "type=user,id=$netid,hostname=$vmname";
1742 $netdev .= ",queues=$net->{queues}" if ($net->{queues
} && $net->{model
} eq 'virtio');
1748 'cirrus' => 'cirrus-vga',
1750 'vmware' => 'vmware-svga',
1751 'virtio' => 'virtio-vga',
1754 sub print_vga_device
{
1755 my ($conf, $vga, $arch, $machine_version, $machine, $id, $qxlnum, $bridges) = @_;
1757 my $type = $vga_map->{$vga->{type
}};
1758 if ($arch eq 'aarch64' && defined($type) && $type eq 'virtio-vga') {
1759 $type = 'virtio-gpu';
1761 my $vgamem_mb = $vga->{memory
};
1763 my $max_outputs = '';
1765 $type = $id ?
'qxl' : 'qxl-vga';
1767 if (!$conf->{ostype
} || $conf->{ostype
} =~ m/^(?:l\d\d)|(?:other)$/) {
1768 # set max outputs so linux can have up to 4 qxl displays with one device
1769 if (min_version
($machine_version, 4, 1)) {
1770 $max_outputs = ",max_outputs=4";
1775 die "no devicetype for $vga->{type}\n" if !$type;
1779 if ($vga->{type
} eq 'virtio') {
1780 my $bytes = PVE
::Tools
::convert_size
($vgamem_mb, "mb" => "b");
1781 $memory = ",max_hostmem=$bytes";
1783 # from https://www.spice-space.org/multiple-monitors.html
1784 $memory = ",vgamem_mb=$vga->{memory}";
1785 my $ram = $vgamem_mb * 4;
1786 my $vram = $vgamem_mb * 2;
1787 $memory .= ",ram_size_mb=$ram,vram_size_mb=$vram";
1789 $memory = ",vgamem_mb=$vga->{memory}";
1791 } elsif ($qxlnum && $id) {
1792 $memory = ",ram_size=67108864,vram_size=33554432";
1796 if ($type eq 'VGA' && windows_version
($conf->{ostype
})) {
1797 $edidoff=",edid=off" if (!defined($conf->{bios
}) || $conf->{bios
} ne 'ovmf');
1800 my $q35 = PVE
::QemuServer
::Machine
::machine_type_is_q35
($conf);
1801 my $vgaid = "vga" . ($id // '');
1804 if ($q35 && $vgaid eq 'vga') {
1805 # the first display uses pcie.0 bus on q35 machines
1806 $pciaddr = print_pcie_addr
($vgaid, $bridges, $arch, $machine);
1808 $pciaddr = print_pci_addr
($vgaid, $bridges, $arch, $machine);
1811 return "$type,id=${vgaid}${memory}${max_outputs}${pciaddr}${edidoff}";
1814 sub parse_number_sets
{
1817 foreach my $part (split(/;/, $set)) {
1818 if ($part =~ /^\s*(\d+)(?:-(\d+))?\s*$/) {
1819 die "invalid range: $part ($2 < $1)\n" if defined($2) && $2 < $1;
1820 push @$res, [ $1, $2 ];
1822 die "invalid range: $part\n";
1831 my $res = parse_property_string
($numa_fmt, $data);
1832 $res->{cpus
} = parse_number_sets
($res->{cpus
}) if defined($res->{cpus
});
1833 $res->{hostnodes
} = parse_number_sets
($res->{hostnodes
}) if defined($res->{hostnodes
});
1837 # netX: e1000=XX:XX:XX:XX:XX:XX,bridge=vmbr0,rate=<mbps>
1841 my $res = eval { parse_property_string
($net_fmt, $data) };
1846 if (!defined($res->{macaddr
})) {
1847 my $dc = PVE
::Cluster
::cfs_read_file
('datacenter.cfg');
1848 $res->{macaddr
} = PVE
::Tools
::random_ether_addr
($dc->{mac_prefix
});
1853 # ipconfigX ip=cidr,gw=ip,ip6=cidr,gw6=ip
1854 sub parse_ipconfig
{
1857 my $res = eval { parse_property_string
($ipconfig_fmt, $data) };
1863 if ($res->{gw
} && !$res->{ip
}) {
1864 warn 'gateway specified without specifying an IP address';
1867 if ($res->{gw6
} && !$res->{ip6
}) {
1868 warn 'IPv6 gateway specified without specifying an IPv6 address';
1871 if ($res->{gw
} && $res->{ip
} eq 'dhcp') {
1872 warn 'gateway specified together with DHCP';
1875 if ($res->{gw6
} && $res->{ip6
} !~ /^$IPV6RE/) {
1877 warn "IPv6 gateway specified together with $res->{ip6} address";
1881 if (!$res->{ip
} && !$res->{ip6
}) {
1882 return { ip
=> 'dhcp', ip6
=> 'dhcp' };
1891 return PVE
::JSONSchema
::print_property_string
($net, $net_fmt);
1894 sub add_random_macs
{
1895 my ($settings) = @_;
1897 foreach my $opt (keys %$settings) {
1898 next if $opt !~ m/^net(\d+)$/;
1899 my $net = parse_net
($settings->{$opt});
1901 $settings->{$opt} = print_net
($net);
1905 sub vm_is_volid_owner
{
1906 my ($storecfg, $vmid, $volid) = @_;
1908 if ($volid !~ m
|^/|) {
1910 eval { ($path, $owner) = PVE
::Storage
::path
($storecfg, $volid); };
1911 if ($owner && ($owner == $vmid)) {
1919 sub vmconfig_register_unused_drive
{
1920 my ($storecfg, $vmid, $conf, $drive) = @_;
1922 if (drive_is_cloudinit
($drive)) {
1923 eval { PVE
::Storage
::vdisk_free
($storecfg, $drive->{file
}) };
1925 } elsif (!drive_is_cdrom
($drive)) {
1926 my $volid = $drive->{file
};
1927 if (vm_is_volid_owner
($storecfg, $vmid, $volid)) {
1928 PVE
::QemuConfig-
>add_unused_volume($conf, $volid, $vmid);
1933 # smbios: [manufacturer=str][,product=str][,version=str][,serial=str][,uuid=uuid][,sku=str][,family=str][,base64=bool]
1937 pattern
=> '[a-fA-F0-9]{8}(?:-[a-fA-F0-9]{4}){3}-[a-fA-F0-9]{12}',
1938 format_description
=> 'UUID',
1939 description
=> "Set SMBIOS1 UUID.",
1944 pattern
=> '[A-Za-z0-9+\/]+={0,2}',
1945 format_description
=> 'Base64 encoded string',
1946 description
=> "Set SMBIOS1 version.",
1951 pattern
=> '[A-Za-z0-9+\/]+={0,2}',
1952 format_description
=> 'Base64 encoded string',
1953 description
=> "Set SMBIOS1 serial number.",
1958 pattern
=> '[A-Za-z0-9+\/]+={0,2}',
1959 format_description
=> 'Base64 encoded string',
1960 description
=> "Set SMBIOS1 manufacturer.",
1965 pattern
=> '[A-Za-z0-9+\/]+={0,2}',
1966 format_description
=> 'Base64 encoded string',
1967 description
=> "Set SMBIOS1 product ID.",
1972 pattern
=> '[A-Za-z0-9+\/]+={0,2}',
1973 format_description
=> 'Base64 encoded string',
1974 description
=> "Set SMBIOS1 SKU string.",
1979 pattern
=> '[A-Za-z0-9+\/]+={0,2}',
1980 format_description
=> 'Base64 encoded string',
1981 description
=> "Set SMBIOS1 family string.",
1986 description
=> 'Flag to indicate that the SMBIOS values are base64 encoded',
1994 my $res = eval { parse_property_string
($smbios1_fmt, $data) };
2001 return PVE
::JSONSchema
::print_property_string
($smbios1, $smbios1_fmt);
2004 PVE
::JSONSchema
::register_format
('pve-qm-smbios1', $smbios1_fmt);
2006 sub parse_watchdog
{
2011 my $res = eval { parse_property_string
($watchdog_fmt, $value) };
2016 sub parse_guest_agent
{
2019 return {} if !defined($conf->{agent
});
2021 my $res = eval { parse_property_string
($agent_fmt, $conf->{agent
}) };
2024 # if the agent is disabled ignore the other potentially set properties
2025 return {} if !$res->{enabled
};
2030 my ($conf, $key) = @_;
2031 return undef if !defined($conf->{agent
});
2033 my $agent = parse_guest_agent
($conf);
2034 return $agent->{$key};
2040 return {} if !$value;
2041 my $res = eval { parse_property_string
($vga_fmt, $value) };
2051 my $res = eval { parse_property_string
($rng_fmt, $value) };
2056 PVE
::JSONSchema
::register_format
('pve-qm-usb-device', \
&verify_usb_device
);
2057 sub verify_usb_device
{
2058 my ($value, $noerr) = @_;
2060 return $value if parse_usb_device
($value);
2064 die "unable to parse usb device\n";
2067 # add JSON properties for create and set function
2068 sub json_config_properties
{
2071 foreach my $opt (keys %$confdesc) {
2072 next if $opt eq 'parent' || $opt eq 'snaptime' || $opt eq 'vmstate' ||
2073 $opt eq 'runningmachine' || $opt eq 'runningcpu';
2074 $prop->{$opt} = $confdesc->{$opt};
2080 # return copy of $confdesc_cloudinit to generate documentation
2081 sub cloudinit_config_properties
{
2083 return dclone
($confdesc_cloudinit);
2087 my ($key, $value) = @_;
2089 die "unknown setting '$key'\n" if !$confdesc->{$key};
2091 my $type = $confdesc->{$key}->{type
};
2093 if (!defined($value)) {
2094 die "got undefined value\n";
2097 if ($value =~ m/[\n\r]/) {
2098 die "property contains a line feed\n";
2101 if ($type eq 'boolean') {
2102 return 1 if ($value eq '1') || ($value =~ m/^(on|yes|true)$/i);
2103 return 0 if ($value eq '0') || ($value =~ m/^(off|no|false)$/i);
2104 die "type check ('boolean') failed - got '$value'\n";
2105 } elsif ($type eq 'integer') {
2106 return int($1) if $value =~ m/^(\d+)$/;
2107 die "type check ('integer') failed - got '$value'\n";
2108 } elsif ($type eq 'number') {
2109 return $value if $value =~ m/^(\d+)(\.\d+)?$/;
2110 die "type check ('number') failed - got '$value'\n";
2111 } elsif ($type eq 'string') {
2112 if (my $fmt = $confdesc->{$key}->{format
}) {
2113 PVE
::JSONSchema
::check_format
($fmt, $value);
2116 $value =~ s/^\"(.*)\"$/$1/;
2119 die "internal error"
2124 my ($storecfg, $vmid, $skiplock, $replacement_conf, $purge_unreferenced) = @_;
2126 my $conf = PVE
::QemuConfig-
>load_config($vmid);
2128 PVE
::QemuConfig-
>check_lock($conf) if !$skiplock;
2130 if ($conf->{template
}) {
2131 # check if any base image is still used by a linked clone
2132 PVE
::QemuConfig-
>foreach_volume_full($conf, { include_unused
=> 1 }, sub {
2133 my ($ds, $drive) = @_;
2134 return if drive_is_cdrom
($drive);
2136 my $volid = $drive->{file
};
2137 return if !$volid || $volid =~ m
|^/|;
2139 die "base volume '$volid' is still in use by linked cloned\n"
2140 if PVE
::Storage
::volume_is_base_and_used
($storecfg, $volid);
2145 my $remove_owned_drive = sub {
2146 my ($ds, $drive) = @_;
2147 return if drive_is_cdrom
($drive, 1);
2149 my $volid = $drive->{file
};
2150 return if !$volid || $volid =~ m
|^/|;
2152 my ($path, $owner) = PVE
::Storage
::path
($storecfg, $volid);
2153 return if !$path || !$owner || ($owner != $vmid);
2155 eval { PVE
::Storage
::vdisk_free
($storecfg, $volid) };
2156 warn "Could not remove disk '$volid', check manually: $@" if $@;
2159 # only remove disks owned by this VM (referenced in the config)
2160 my $include_opts = {
2161 include_unused
=> 1,
2162 extra_keys
=> ['vmstate'],
2164 PVE
::QemuConfig-
>foreach_volume_full($conf, $include_opts, $remove_owned_drive);
2166 for my $snap (values %{$conf->{snapshots
}}) {
2167 next if !defined($snap->{vmstate
});
2168 my $drive = PVE
::QemuConfig-
>parse_volume('vmstate', $snap->{vmstate
}, 1);
2169 next if !defined($drive);
2170 $remove_owned_drive->('vmstate', $drive);
2173 if ($purge_unreferenced) { # also remove unreferenced disk
2174 my $vmdisks = PVE
::Storage
::vdisk_list
($storecfg, undef, $vmid, undef, 'images');
2175 PVE
::Storage
::foreach_volid
($vmdisks, sub {
2176 my ($volid, $sid, $volname, $d) = @_;
2177 eval { PVE
::Storage
::vdisk_free
($storecfg, $volid) };
2182 if (defined $replacement_conf) {
2183 PVE
::QemuConfig-
>write_config($vmid, $replacement_conf);
2185 PVE
::QemuConfig-
>destroy_config($vmid);
2189 sub parse_vm_config
{
2190 my ($filename, $raw) = @_;
2192 return if !defined($raw);
2195 digest
=> Digest
::SHA
::sha1_hex
($raw),
2200 $filename =~ m
|/qemu-server/(\d
+)\
.conf
$|
2201 || die "got strange filename '$filename'";
2209 my @lines = split(/\n/, $raw);
2210 foreach my $line (@lines) {
2211 next if $line =~ m/^\s*$/;
2213 if ($line =~ m/^\[PENDING\]\s*$/i) {
2214 $section = 'pending';
2215 if (defined($descr)) {
2217 $conf->{description
} = $descr;
2220 $conf = $res->{$section} = {};
2223 } elsif ($line =~ m/^\[([a-z][a-z0-9_\-]+)\]\s*$/i) {
2225 if (defined($descr)) {
2227 $conf->{description
} = $descr;
2230 $conf = $res->{snapshots
}->{$section} = {};
2234 if ($line =~ m/^\#(.*)\s*$/) {
2235 $descr = '' if !defined($descr);
2236 $descr .= PVE
::Tools
::decode_text
($1) . "\n";
2240 if ($line =~ m/^(description):\s*(.*\S)\s*$/) {
2241 $descr = '' if !defined($descr);
2242 $descr .= PVE
::Tools
::decode_text
($2);
2243 } elsif ($line =~ m/snapstate:\s*(prepare|delete)\s*$/) {
2244 $conf->{snapstate
} = $1;
2245 } elsif ($line =~ m/^(args):\s*(.*\S)\s*$/) {
2248 $conf->{$key} = $value;
2249 } elsif ($line =~ m/^delete:\s*(.*\S)\s*$/) {
2251 if ($section eq 'pending') {
2252 $conf->{delete} = $value; # we parse this later
2254 warn "vm $vmid - propertry 'delete' is only allowed in [PENDING]\n";
2256 } elsif ($line =~ m/^([a-z][a-z_]*\d*):\s*(.+?)\s*$/) {
2259 eval { $value = check_type
($key, $value); };
2261 warn "vm $vmid - unable to parse value of '$key' - $@";
2263 $key = 'ide2' if $key eq 'cdrom';
2264 my $fmt = $confdesc->{$key}->{format
};
2265 if ($fmt && $fmt =~ /^pve-qm-(?:ide|scsi|virtio|sata)$/) {
2266 my $v = parse_drive
($key, $value);
2267 if (my $volid = filename_to_volume_id
($vmid, $v->{file
}, $v->{media
})) {
2268 $v->{file
} = $volid;
2269 $value = print_drive
($v);
2271 warn "vm $vmid - unable to parse value of '$key'\n";
2276 $conf->{$key} = $value;
2279 warn "vm $vmid - unable to parse config: $line\n";
2283 if (defined($descr)) {
2285 $conf->{description
} = $descr;
2287 delete $res->{snapstate
}; # just to be sure
2292 sub write_vm_config
{
2293 my ($filename, $conf) = @_;
2295 delete $conf->{snapstate
}; # just to be sure
2297 if ($conf->{cdrom
}) {
2298 die "option ide2 conflicts with cdrom\n" if $conf->{ide2
};
2299 $conf->{ide2
} = $conf->{cdrom
};
2300 delete $conf->{cdrom
};
2303 # we do not use 'smp' any longer
2304 if ($conf->{sockets
}) {
2305 delete $conf->{smp
};
2306 } elsif ($conf->{smp
}) {
2307 $conf->{sockets
} = $conf->{smp
};
2308 delete $conf->{cores
};
2309 delete $conf->{smp
};
2312 my $used_volids = {};
2314 my $cleanup_config = sub {
2315 my ($cref, $pending, $snapname) = @_;
2317 foreach my $key (keys %$cref) {
2318 next if $key eq 'digest' || $key eq 'description' || $key eq 'snapshots' ||
2319 $key eq 'snapstate' || $key eq 'pending';
2320 my $value = $cref->{$key};
2321 if ($key eq 'delete') {
2322 die "propertry 'delete' is only allowed in [PENDING]\n"
2324 # fixme: check syntax?
2327 eval { $value = check_type
($key, $value); };
2328 die "unable to parse value of '$key' - $@" if $@;
2330 $cref->{$key} = $value;
2332 if (!$snapname && is_valid_drivename
($key)) {
2333 my $drive = parse_drive
($key, $value);
2334 $used_volids->{$drive->{file
}} = 1 if $drive && $drive->{file
};
2339 &$cleanup_config($conf);
2341 &$cleanup_config($conf->{pending
}, 1);
2343 foreach my $snapname (keys %{$conf->{snapshots
}}) {
2344 die "internal error: snapshot name '$snapname' is forbidden" if lc($snapname) eq 'pending';
2345 &$cleanup_config($conf->{snapshots
}->{$snapname}, undef, $snapname);
2348 # remove 'unusedX' settings if we re-add a volume
2349 foreach my $key (keys %$conf) {
2350 my $value = $conf->{$key};
2351 if ($key =~ m/^unused/ && $used_volids->{$value}) {
2352 delete $conf->{$key};
2356 my $generate_raw_config = sub {
2357 my ($conf, $pending) = @_;
2361 # add description as comment to top of file
2362 if (defined(my $descr = $conf->{description
})) {
2364 foreach my $cl (split(/\n/, $descr)) {
2365 $raw .= '#' . PVE
::Tools
::encode_text
($cl) . "\n";
2368 $raw .= "#\n" if $pending;
2372 foreach my $key (sort keys %$conf) {
2373 next if $key =~ /^(digest|description|pending|snapshots)$/;
2374 $raw .= "$key: $conf->{$key}\n";
2379 my $raw = &$generate_raw_config($conf);
2381 if (scalar(keys %{$conf->{pending
}})){
2382 $raw .= "\n[PENDING]\n";
2383 $raw .= &$generate_raw_config($conf->{pending
}, 1);
2386 foreach my $snapname (sort keys %{$conf->{snapshots
}}) {
2387 $raw .= "\n[$snapname]\n";
2388 $raw .= &$generate_raw_config($conf->{snapshots
}->{$snapname});
2398 # we use static defaults from our JSON schema configuration
2399 foreach my $key (keys %$confdesc) {
2400 if (defined(my $default = $confdesc->{$key}->{default})) {
2401 $res->{$key} = $default;
2409 my $vmlist = PVE
::Cluster
::get_vmlist
();
2411 return $res if !$vmlist || !$vmlist->{ids
};
2412 my $ids = $vmlist->{ids
};
2413 my $nodename = nodename
();
2415 foreach my $vmid (keys %$ids) {
2416 my $d = $ids->{$vmid};
2417 next if !$d->{node
} || $d->{node
} ne $nodename;
2418 next if !$d->{type
} || $d->{type
} ne 'qemu';
2419 $res->{$vmid}->{exists} = 1;
2424 # test if VM uses local resources (to prevent migration)
2425 sub check_local_resources
{
2426 my ($conf, $noerr) = @_;
2430 push @loc_res, "hostusb" if $conf->{hostusb
}; # old syntax
2431 push @loc_res, "hostpci" if $conf->{hostpci
}; # old syntax
2433 push @loc_res, "ivshmem" if $conf->{ivshmem
};
2435 foreach my $k (keys %$conf) {
2436 next if $k =~ m/^usb/ && ($conf->{$k} =~ m/^spice(?![^,])/);
2437 # sockets are safe: they will recreated be on the target side post-migrate
2438 next if $k =~ m/^serial/ && ($conf->{$k} eq 'socket');
2439 push @loc_res, $k if $k =~ m/^(usb|hostpci|serial|parallel)\d+$/;
2442 die "VM uses local resources\n" if scalar @loc_res && !$noerr;
2447 # check if used storages are available on all nodes (use by migrate)
2448 sub check_storage_availability
{
2449 my ($storecfg, $conf, $node) = @_;
2451 PVE
::QemuConfig-
>foreach_volume($conf, sub {
2452 my ($ds, $drive) = @_;
2454 my $volid = $drive->{file
};
2457 my ($sid, $volname) = PVE
::Storage
::parse_volume_id
($volid, 1);
2460 # check if storage is available on both nodes
2461 my $scfg = PVE
::Storage
::storage_check_node
($storecfg, $sid);
2462 PVE
::Storage
::storage_check_node
($storecfg, $sid, $node);
2466 # list nodes where all VM images are available (used by has_feature API)
2468 my ($conf, $storecfg) = @_;
2470 my $nodelist = PVE
::Cluster
::get_nodelist
();
2471 my $nodehash = { map { $_ => 1 } @$nodelist };
2472 my $nodename = nodename
();
2474 PVE
::QemuConfig-
>foreach_volume($conf, sub {
2475 my ($ds, $drive) = @_;
2477 my $volid = $drive->{file
};
2480 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($volid, 1);
2482 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
2483 if ($scfg->{disable
}) {
2485 } elsif (my $avail = $scfg->{nodes
}) {
2486 foreach my $node (keys %$nodehash) {
2487 delete $nodehash->{$node} if !$avail->{$node};
2489 } elsif (!$scfg->{shared
}) {
2490 foreach my $node (keys %$nodehash) {
2491 delete $nodehash->{$node} if $node ne $nodename
2500 sub check_local_storage_availability
{
2501 my ($conf, $storecfg) = @_;
2503 my $nodelist = PVE
::Cluster
::get_nodelist
();
2504 my $nodehash = { map { $_ => {} } @$nodelist };
2506 PVE
::QemuConfig-
>foreach_volume($conf, sub {
2507 my ($ds, $drive) = @_;
2509 my $volid = $drive->{file
};
2512 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($volid, 1);
2514 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
2516 if ($scfg->{disable
}) {
2517 foreach my $node (keys %$nodehash) {
2518 $nodehash->{$node}->{unavailable_storages
}->{$storeid} = 1;
2520 } elsif (my $avail = $scfg->{nodes
}) {
2521 foreach my $node (keys %$nodehash) {
2522 if (!$avail->{$node}) {
2523 $nodehash->{$node}->{unavailable_storages
}->{$storeid} = 1;
2530 foreach my $node (values %$nodehash) {
2531 if (my $unavail = $node->{unavailable_storages
}) {
2532 $node->{unavailable_storages
} = [ sort keys %$unavail ];
2539 # Compat only, use assert_config_exists_on_node and vm_running_locally where possible
2541 my ($vmid, $nocheck, $node) = @_;
2543 PVE
::QemuConfig
::assert_config_exists_on_node
($vmid, $node) if !$nocheck;
2544 return PVE
::QemuServer
::Helpers
::vm_running_locally
($vmid);
2549 my $vzlist = config_list
();
2551 my $fd = IO
::Dir-
>new($PVE::QemuServer
::Helpers
::var_run_tmpdir
) || return $vzlist;
2553 while (defined(my $de = $fd->read)) {
2554 next if $de !~ m/^(\d+)\.pid$/;
2556 next if !defined($vzlist->{$vmid});
2557 if (my $pid = check_running
($vmid)) {
2558 $vzlist->{$vmid}->{pid
} = $pid;
2565 our $vmstatus_return_properties = {
2566 vmid
=> get_standard_option
('pve-vmid'),
2568 description
=> "Qemu process status.",
2570 enum
=> ['stopped', 'running'],
2573 description
=> "Maximum memory in bytes.",
2576 renderer
=> 'bytes',
2579 description
=> "Root disk size in bytes.",
2582 renderer
=> 'bytes',
2585 description
=> "VM name.",
2590 description
=> "Qemu QMP agent status.",
2595 description
=> "PID of running qemu process.",
2600 description
=> "Uptime.",
2603 renderer
=> 'duration',
2606 description
=> "Maximum usable CPUs.",
2611 description
=> "The current config lock, if any.",
2616 description
=> "The current configured tags, if any",
2620 'running-machine' => {
2621 description
=> "The currently running machine type (if running).",
2626 description
=> "The currently running QEMU version (if running).",
2632 my $last_proc_pid_stat;
2634 # get VM status information
2635 # This must be fast and should not block ($full == false)
2636 # We only query KVM using QMP if $full == true (this can be slow)
2638 my ($opt_vmid, $full) = @_;
2642 my $storecfg = PVE
::Storage
::config
();
2644 my $list = vzlist
();
2645 my $defaults = load_defaults
();
2647 my ($uptime) = PVE
::ProcFSTools
::read_proc_uptime
(1);
2649 my $cpucount = $cpuinfo->{cpus
} || 1;
2651 foreach my $vmid (keys %$list) {
2652 next if $opt_vmid && ($vmid ne $opt_vmid);
2654 my $conf = PVE
::QemuConfig-
>load_config($vmid);
2656 my $d = { vmid
=> int($vmid) };
2657 $d->{pid
} = int($list->{$vmid}->{pid
});
2659 # fixme: better status?
2660 $d->{status
} = $list->{$vmid}->{pid
} ?
'running' : 'stopped';
2662 my $size = PVE
::QemuServer
::Drive
::bootdisk_size
($storecfg, $conf);
2663 if (defined($size)) {
2664 $d->{disk
} = 0; # no info available
2665 $d->{maxdisk
} = $size;
2671 $d->{cpus
} = ($conf->{sockets
} || $defaults->{sockets
})
2672 * ($conf->{cores
} || $defaults->{cores
});
2673 $d->{cpus
} = $cpucount if $d->{cpus
} > $cpucount;
2674 $d->{cpus
} = $conf->{vcpus
} if $conf->{vcpus
};
2676 $d->{name
} = $conf->{name
} || "VM $vmid";
2677 $d->{maxmem
} = $conf->{memory
} ?
$conf->{memory
}*(1024*1024)
2678 : $defaults->{memory
}*(1024*1024);
2680 if ($conf->{balloon
}) {
2681 $d->{balloon_min
} = $conf->{balloon
}*(1024*1024);
2682 $d->{shares
} = defined($conf->{shares
}) ?
$conf->{shares
}
2683 : $defaults->{shares
};
2694 $d->{diskwrite
} = 0;
2696 $d->{template
} = 1 if PVE
::QemuConfig-
>is_template($conf);
2698 $d->{serial
} = 1 if conf_has_serial
($conf);
2699 $d->{lock} = $conf->{lock} if $conf->{lock};
2700 $d->{tags
} = $conf->{tags
} if defined($conf->{tags
});
2705 my $netdev = PVE
::ProcFSTools
::read_proc_net_dev
();
2706 foreach my $dev (keys %$netdev) {
2707 next if $dev !~ m/^tap([1-9]\d*)i/;
2709 my $d = $res->{$vmid};
2712 $d->{netout
} += $netdev->{$dev}->{receive
};
2713 $d->{netin
} += $netdev->{$dev}->{transmit
};
2716 $d->{nics
}->{$dev}->{netout
} = int($netdev->{$dev}->{receive
});
2717 $d->{nics
}->{$dev}->{netin
} = int($netdev->{$dev}->{transmit
});
2722 my $ctime = gettimeofday
;
2724 foreach my $vmid (keys %$list) {
2726 my $d = $res->{$vmid};
2727 my $pid = $d->{pid
};
2730 my $pstat = PVE
::ProcFSTools
::read_proc_pid_stat
($pid);
2731 next if !$pstat; # not running
2733 my $used = $pstat->{utime} + $pstat->{stime
};
2735 $d->{uptime
} = int(($uptime - $pstat->{starttime
})/$cpuinfo->{user_hz
});
2737 if ($pstat->{vsize
}) {
2738 $d->{mem
} = int(($pstat->{rss
}/$pstat->{vsize
})*$d->{maxmem
});
2741 my $old = $last_proc_pid_stat->{$pid};
2743 $last_proc_pid_stat->{$pid} = {
2751 my $dtime = ($ctime - $old->{time}) * $cpucount * $cpuinfo->{user_hz
};
2753 if ($dtime > 1000) {
2754 my $dutime = $used - $old->{used
};
2756 $d->{cpu
} = (($dutime/$dtime)* $cpucount) / $d->{cpus
};
2757 $last_proc_pid_stat->{$pid} = {
2763 $d->{cpu
} = $old->{cpu
};
2767 return $res if !$full;
2769 my $qmpclient = PVE
::QMPClient-
>new();
2771 my $ballooncb = sub {
2772 my ($vmid, $resp) = @_;
2774 my $info = $resp->{'return'};
2775 return if !$info->{max_mem
};
2777 my $d = $res->{$vmid};
2779 # use memory assigned to VM
2780 $d->{maxmem
} = $info->{max_mem
};
2781 $d->{balloon
} = $info->{actual
};
2783 if (defined($info->{total_mem
}) && defined($info->{free_mem
})) {
2784 $d->{mem
} = $info->{total_mem
} - $info->{free_mem
};
2785 $d->{freemem
} = $info->{free_mem
};
2788 $d->{ballooninfo
} = $info;
2791 my $blockstatscb = sub {
2792 my ($vmid, $resp) = @_;
2793 my $data = $resp->{'return'} || [];
2794 my $totalrdbytes = 0;
2795 my $totalwrbytes = 0;
2797 for my $blockstat (@$data) {
2798 $totalrdbytes = $totalrdbytes + $blockstat->{stats
}->{rd_bytes
};
2799 $totalwrbytes = $totalwrbytes + $blockstat->{stats
}->{wr_bytes
};
2801 $blockstat->{device
} =~ s/drive-//;
2802 $res->{$vmid}->{blockstat
}->{$blockstat->{device
}} = $blockstat->{stats
};
2804 $res->{$vmid}->{diskread
} = $totalrdbytes;
2805 $res->{$vmid}->{diskwrite
} = $totalwrbytes;
2808 my $machinecb = sub {
2809 my ($vmid, $resp) = @_;
2810 my $data = $resp->{'return'} || [];
2812 $res->{$vmid}->{'running-machine'} =
2813 PVE
::QemuServer
::Machine
::current_from_query_machines
($data);
2816 my $versioncb = sub {
2817 my ($vmid, $resp) = @_;
2818 my $data = $resp->{'return'} // {};
2819 my $version = 'unknown';
2821 if (my $v = $data->{qemu
}) {
2822 $version = $v->{major
} . "." . $v->{minor
} . "." . $v->{micro
};
2825 $res->{$vmid}->{'running-qemu'} = $version;
2828 my $statuscb = sub {
2829 my ($vmid, $resp) = @_;
2831 $qmpclient->queue_cmd($vmid, $blockstatscb, 'query-blockstats');
2832 $qmpclient->queue_cmd($vmid, $machinecb, 'query-machines');
2833 $qmpclient->queue_cmd($vmid, $versioncb, 'query-version');
2834 # this fails if ballon driver is not loaded, so this must be
2835 # the last commnand (following command are aborted if this fails).
2836 $qmpclient->queue_cmd($vmid, $ballooncb, 'query-balloon');
2838 my $status = 'unknown';
2839 if (!defined($status = $resp->{'return'}->{status
})) {
2840 warn "unable to get VM status\n";
2844 $res->{$vmid}->{qmpstatus
} = $resp->{'return'}->{status
};
2847 foreach my $vmid (keys %$list) {
2848 next if $opt_vmid && ($vmid ne $opt_vmid);
2849 next if !$res->{$vmid}->{pid
}; # not running
2850 $qmpclient->queue_cmd($vmid, $statuscb, 'query-status');
2853 $qmpclient->queue_execute(undef, 2);
2855 foreach my $vmid (keys %$list) {
2856 next if $opt_vmid && ($vmid ne $opt_vmid);
2857 next if !$res->{$vmid}->{pid
}; #not running
2859 # we can't use the $qmpclient since it might have already aborted on
2860 # 'query-balloon', but this might also fail for older versions...
2861 my $qemu_support = eval { mon_cmd
($vmid, "query-proxmox-support") };
2862 $res->{$vmid}->{'proxmox-support'} = $qemu_support // {};
2865 foreach my $vmid (keys %$list) {
2866 next if $opt_vmid && ($vmid ne $opt_vmid);
2867 $res->{$vmid}->{qmpstatus
} = $res->{$vmid}->{status
} if !$res->{$vmid}->{qmpstatus
};
2873 sub conf_has_serial
{
2876 for (my $i = 0; $i < $MAX_SERIAL_PORTS; $i++) {
2877 if ($conf->{"serial$i"}) {
2885 sub conf_has_audio
{
2886 my ($conf, $id) = @_;
2889 my $audio = $conf->{"audio$id"};
2890 return if !defined($audio);
2892 my $audioproperties = parse_property_string
($audio_fmt, $audio);
2893 my $audiodriver = $audioproperties->{driver
} // 'spice';
2896 dev
=> $audioproperties->{device
},
2897 dev_id
=> "audiodev$id",
2898 backend
=> $audiodriver,
2899 backend_id
=> "$audiodriver-backend${id}",
2904 my ($audio, $audiopciaddr, $machine_version) = @_;
2908 my $id = $audio->{dev_id
};
2910 if (min_version
($machine_version, 4, 2)) {
2911 $audiodev = ",audiodev=$audio->{backend_id}";
2914 if ($audio->{dev
} eq 'AC97') {
2915 push @$devs, '-device', "AC97,id=${id}${audiopciaddr}$audiodev";
2916 } elsif ($audio->{dev
} =~ /intel\-hda$/) {
2917 push @$devs, '-device', "$audio->{dev},id=${id}${audiopciaddr}";
2918 push @$devs, '-device', "hda-micro,id=${id}-codec0,bus=${id}.0,cad=0$audiodev";
2919 push @$devs, '-device', "hda-duplex,id=${id}-codec1,bus=${id}.0,cad=1$audiodev";
2921 die "unkown audio device '$audio->{dev}', implement me!";
2924 push @$devs, '-audiodev', "$audio->{backend},id=$audio->{backend_id}";
2929 sub vga_conf_has_spice
{
2932 my $vgaconf = parse_vga
($vga);
2933 my $vgatype = $vgaconf->{type
};
2934 return 0 if !$vgatype || $vgatype !~ m/^qxl([234])?$/;
2941 return get_host_arch
() eq $arch;
2946 return $conf->{arch
} // get_host_arch
();
2949 my $default_machines = {
2954 sub get_installed_machine_version
{
2955 my ($kvmversion) = @_;
2956 $kvmversion = kvm_user_version
() if !defined($kvmversion);
2957 $kvmversion =~ m/^(\d+\.\d+)/;
2961 sub windows_get_pinned_machine_version
{
2962 my ($machine, $base_version, $kvmversion) = @_;
2964 my $pin_version = $base_version;
2965 if (!defined($base_version) ||
2966 !PVE
::QemuServer
::Machine
::can_run_pve_machine_version
($base_version, $kvmversion)
2968 $pin_version = get_installed_machine_version
($kvmversion);
2970 if (!$machine || $machine eq 'pc') {
2971 $machine = "pc-i440fx-$pin_version";
2972 } elsif ($machine eq 'q35') {
2973 $machine = "pc-q35-$pin_version";
2974 } elsif ($machine eq 'virt') {
2975 $machine = "virt-$pin_version";
2977 warn "unknown machine type '$machine', not touching that!\n";
2983 sub get_vm_machine
{
2984 my ($conf, $forcemachine, $arch, $add_pve_version, $kvmversion) = @_;
2986 my $machine = $forcemachine || $conf->{machine
};
2988 if (!$machine || $machine =~ m/^(?:pc|q35|virt)$/) {
2989 $kvmversion //= kvm_user_version
();
2990 # we must pin Windows VMs without a specific version to 5.1, as 5.2 fixed a bug in ACPI
2991 # layout which confuses windows quite a bit and may result in various regressions..
2992 # see: https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg08484.html
2993 if (windows_version
($conf->{ostype
})) {
2994 $machine = windows_get_pinned_machine_version
($machine, '5.1', $kvmversion);
2997 $machine ||= $default_machines->{$arch};
2998 if ($add_pve_version) {
2999 my $pvever = PVE
::QemuServer
::Machine
::get_pve_version
($kvmversion);
3000 $machine .= "+pve$pvever";
3004 if ($add_pve_version && $machine !~ m/\+pve\d+?(?:\.pxe)?$/) {
3005 my $is_pxe = $machine =~ m/^(.*?)\.pxe$/;
3006 $machine = $1 if $is_pxe;
3008 # for version-pinned machines that do not include a pve-version (e.g.
3009 # pc-q35-4.1), we assume 0 to keep them stable in case we bump
3010 $machine .= '+pve0';
3012 $machine .= '.pxe' if $is_pxe;
3018 sub get_ovmf_files
($) {
3021 my $ovmf = $OVMF->{$arch}
3022 or die "no OVMF images known for architecture '$arch'\n";
3028 aarch64
=> '/usr/bin/qemu-system-aarch64',
3029 x86_64
=> '/usr/bin/qemu-system-x86_64',
3031 sub get_command_for_arch
($) {
3033 return '/usr/bin/kvm' if is_native
($arch);
3035 my $cmd = $Arch2Qemu->{$arch}
3036 or die "don't know how to emulate architecture '$arch'\n";
3040 # To use query_supported_cpu_flags and query_understood_cpu_flags to get flags
3041 # to use in a QEMU command line (-cpu element), first array_intersect the result
3042 # of query_supported_ with query_understood_. This is necessary because:
3044 # a) query_understood_ returns flags the host cannot use and
3045 # b) query_supported_ (rather the QMP call) doesn't actually return CPU
3046 # flags, but CPU settings - with most of them being flags. Those settings
3047 # (and some flags, curiously) cannot be specified as a "-cpu" argument.
3049 # query_supported_ needs to start up to 2 temporary VMs and is therefore rather
3050 # expensive. If you need the value returned from this, you can get it much
3051 # cheaper from pmxcfs using PVE::Cluster::get_node_kv('cpuflags-$accel') with
3052 # $accel being 'kvm' or 'tcg'.
3054 # pvestatd calls this function on startup and whenever the QEMU/KVM version
3055 # changes, automatically populating pmxcfs.
3057 # Returns: { kvm => [ flagX, flagY, ... ], tcg => [ flag1, flag2, ... ] }
3058 # since kvm and tcg machines support different flags
3060 sub query_supported_cpu_flags
{
3063 $arch //= get_host_arch
();
3064 my $default_machine = $default_machines->{$arch};
3068 # FIXME: Once this is merged, the code below should work for ARM as well:
3069 # https://lists.nongnu.org/archive/html/qemu-devel/2019-06/msg04947.html
3070 die "QEMU/KVM cannot detect CPU flags on ARM (aarch64)\n" if
3073 my $kvm_supported = defined(kvm_version
());
3074 my $qemu_cmd = get_command_for_arch
($arch);
3076 my $pidfile = PVE
::QemuServer
::Helpers
::pidfile_name
($fakevmid);
3078 # Start a temporary (frozen) VM with vmid -1 to allow sending a QMP command
3079 my $query_supported_run_qemu = sub {
3085 '-machine', $default_machine,
3087 '-chardev', "socket,id=qmp,path=/var/run/qemu-server/$fakevmid.qmp,server=on,wait=off",
3088 '-mon', 'chardev=qmp,mode=control',
3089 '-pidfile', $pidfile,
3094 push @$cmd, '-accel', 'tcg';
3097 my $rc = run_command
($cmd, noerr
=> 1, quiet
=> 0);
3098 die "QEMU flag querying VM exited with code " . $rc if $rc;
3101 my $cmd_result = mon_cmd
(
3103 'query-cpu-model-expansion',
3105 model
=> { name
=> 'host' }
3108 my $props = $cmd_result->{model
}->{props
};
3109 foreach my $prop (keys %$props) {
3110 next if $props->{$prop} ne '1';
3111 # QEMU returns some flags multiple times, with '_', '.' or '-'
3112 # (e.g. lahf_lm and lahf-lm; sse4.2, sse4-2 and sse4_2; ...).
3113 # We only keep those with underscores, to match /proc/cpuinfo
3114 $prop =~ s/\.|-/_/g;
3115 $flags->{$prop} = 1;
3120 # force stop with 10 sec timeout and 'nocheck'
3121 # always stop, even if QMP failed
3122 vm_stop
(undef, $fakevmid, 1, 1, 10, 0, 1);
3126 return [ sort keys %$flags ];
3129 # We need to query QEMU twice, since KVM and TCG have different supported flags
3130 PVE
::QemuConfig-
>lock_config($fakevmid, sub {
3131 $flags->{tcg
} = eval { $query_supported_run_qemu->(0) };
3132 warn "warning: failed querying supported tcg flags: $@\n" if $@;
3134 if ($kvm_supported) {
3135 $flags->{kvm
} = eval { $query_supported_run_qemu->(1) };
3136 warn "warning: failed querying supported kvm flags: $@\n" if $@;
3143 # Understood CPU flags are written to a file at 'pve-qemu' compile time
3144 my $understood_cpu_flag_dir = "/usr/share/kvm";
3145 sub query_understood_cpu_flags
{
3146 my $arch = get_host_arch
();
3147 my $filepath = "$understood_cpu_flag_dir/recognized-CPUID-flags-$arch";
3149 die "Cannot query understood QEMU CPU flags for architecture: $arch (file not found)\n"
3152 my $raw = file_get_contents
($filepath);
3153 $raw =~ s/^\s+|\s+$//g;
3154 my @flags = split(/\s+/, $raw);
3159 sub config_to_command
{
3160 my ($storecfg, $vmid, $conf, $defaults, $forcemachine, $forcecpu,
3164 my $globalFlags = [];
3165 my $machineFlags = [];
3170 my $ostype = $conf->{ostype
};
3171 my $winversion = windows_version
($ostype);
3172 my $kvm = $conf->{kvm
};
3173 my $nodename = nodename
();
3175 my $arch = get_vm_arch
($conf);
3176 my $kvm_binary = get_command_for_arch
($arch);
3177 my $kvmver = kvm_user_version
($kvm_binary);
3179 if (!$kvmver || $kvmver !~ m/^(\d+)\.(\d+)/ || $1 < 3) {
3180 $kvmver //= "undefined";
3181 die "Detected old QEMU binary ('$kvmver', at least 3.0 is required)\n";
3184 my $add_pve_version = min_version
($kvmver, 4, 1);
3186 my $machine_type = get_vm_machine
($conf, $forcemachine, $arch, $add_pve_version);
3187 my $machine_version = extract_version
($machine_type, $kvmver);
3188 $kvm //= 1 if is_native
($arch);
3190 $machine_version =~ m/(\d+)\.(\d+)/;
3191 my ($machine_major, $machine_minor) = ($1, $2);
3193 if ($kvmver =~ m/^\d+\.\d+\.(\d+)/ && $1 >= 90) {
3194 warn "warning: Installed QEMU version ($kvmver) is a release candidate, ignoring version checks\n";
3195 } elsif (!min_version
($kvmver, $machine_major, $machine_minor)) {
3196 die "Installed QEMU version '$kvmver' is too old to run machine type '$machine_type',"
3197 ." please upgrade node '$nodename'\n"
3198 } elsif (!PVE
::QemuServer
::Machine
::can_run_pve_machine_version
($machine_version, $kvmver)) {
3199 my $max_pve_version = PVE
::QemuServer
::Machine
::get_pve_version
($machine_version);
3200 die "Installed qemu-server (max feature level for $machine_major.$machine_minor is"
3201 ." pve$max_pve_version) is too old to run machine type '$machine_type', please upgrade"
3202 ." node '$nodename'\n";
3205 # if a specific +pve version is required for a feature, use $version_guard
3206 # instead of min_version to allow machines to be run with the minimum
3208 my $required_pve_version = 0;
3209 my $version_guard = sub {
3210 my ($major, $minor, $pve) = @_;
3211 return 0 if !min_version
($machine_version, $major, $minor, $pve);
3212 my $max_pve = PVE
::QemuServer
::Machine
::get_pve_version
("$major.$minor");
3213 return 1 if min_version
($machine_version, $major, $minor, $max_pve+1);
3214 $required_pve_version = $pve if $pve && $pve > $required_pve_version;
3218 if ($kvm && !defined kvm_version
()) {
3219 die "KVM virtualisation configured, but not available. Either disable in VM configuration"
3220 ." or enable in BIOS.\n";
3223 my $q35 = PVE
::QemuServer
::Machine
::machine_type_is_q35
($conf);
3224 my $hotplug_features = parse_hotplug_features
(defined($conf->{hotplug
}) ?
$conf->{hotplug
} : '1');
3225 my $use_old_bios_files = undef;
3226 ($use_old_bios_files, $machine_type) = qemu_use_old_bios_files
($machine_type);
3228 my $cpuunits = defined($conf->{cpuunits
}) ?
3229 $conf->{cpuunits
} : $defaults->{cpuunits
};
3231 push @$cmd, $kvm_binary;
3233 push @$cmd, '-id', $vmid;
3235 my $vmname = $conf->{name
} || "vm$vmid";
3237 push @$cmd, '-name', $vmname;
3239 push @$cmd, '-no-shutdown';
3243 my $qmpsocket = PVE
::QemuServer
::Helpers
::qmp_socket
($vmid);
3244 push @$cmd, '-chardev', "socket,id=qmp,path=$qmpsocket,server=on,wait=off";
3245 push @$cmd, '-mon', "chardev=qmp,mode=control";
3247 if (min_version
($machine_version, 2, 12)) {
3248 push @$cmd, '-chardev', "socket,id=qmp-event,path=/var/run/qmeventd.sock,reconnect=5";
3249 push @$cmd, '-mon', "chardev=qmp-event,mode=control";
3252 push @$cmd, '-pidfile' , PVE
::QemuServer
::Helpers
::pidfile_name
($vmid);
3254 push @$cmd, '-daemonize';
3256 if ($conf->{smbios1
}) {
3257 my $smbios_conf = parse_smbios1
($conf->{smbios1
});
3258 if ($smbios_conf->{base64
}) {
3259 # Do not pass base64 flag to qemu
3260 delete $smbios_conf->{base64
};
3261 my $smbios_string = "";
3262 foreach my $key (keys %$smbios_conf) {
3264 if ($key eq "uuid") {
3265 $value = $smbios_conf->{uuid
}
3267 $value = decode_base64
($smbios_conf->{$key});
3269 # qemu accepts any binary data, only commas need escaping by double comma
3271 $smbios_string .= "," . $key . "=" . $value if $value;
3273 push @$cmd, '-smbios', "type=1" . $smbios_string;
3275 push @$cmd, '-smbios', "type=1,$conf->{smbios1}";
3279 if ($conf->{bios
} && $conf->{bios
} eq 'ovmf') {
3280 my ($ovmf_code, $ovmf_vars) = get_ovmf_files
($arch);
3281 die "uefi base image '$ovmf_code' not found\n" if ! -f
$ovmf_code;
3283 my ($path, $format);
3284 if (my $efidisk = $conf->{efidisk0
}) {
3285 my $d = parse_drive
('efidisk0', $efidisk);
3286 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($d->{file
}, 1);
3287 $format = $d->{format
};
3289 $path = PVE
::Storage
::path
($storecfg, $d->{file
});
3290 if (!defined($format)) {
3291 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
3292 $format = qemu_img_format
($scfg, $volname);
3296 die "efidisk format must be specified\n"
3297 if !defined($format);
3300 warn "no efidisk configured! Using temporary efivars disk.\n";
3301 $path = "/tmp/$vmid-ovmf.fd";
3302 PVE
::Tools
::file_copy
($ovmf_vars, $path, -s
$ovmf_vars);
3308 if ($format eq 'raw' && $version_guard->(4, 1, 2)) {
3309 $size_str = ",size=" . (-s
$ovmf_vars);
3312 # on slower ceph clusters, booting without cache on efidisk can take a while, see #3329
3313 my $cache = $path =~ m/^rbd:/ ?
',cache=writeback' : '';
3315 push @$cmd, '-drive', "if=pflash,unit=0,format=raw,readonly=on,file=$ovmf_code";
3316 push @$cmd, '-drive', "if=pflash,unit=1$cache,format=$format,id=drive-efidisk0$size_str,file=$path";
3321 # we use different pcie-port hardware for qemu >= 4.0 for passthrough
3322 if (min_version
($machine_version, 4, 0)) {
3323 push @$devices, '-readconfig', '/usr/share/qemu-server/pve-q35-4.0.cfg';
3325 push @$devices, '-readconfig', '/usr/share/qemu-server/pve-q35.cfg';
3329 if ($conf->{vmgenid
}) {
3330 push @$devices, '-device', 'vmgenid,guid='.$conf->{vmgenid
};
3333 # add usb controllers
3334 my @usbcontrollers = PVE
::QemuServer
::USB
::get_usb_controllers
(
3335 $conf, $bridges, $arch, $machine_type, $usbdesc->{format
}, $MAX_USB_DEVICES);
3336 push @$devices, @usbcontrollers if @usbcontrollers;
3337 my $vga = parse_vga
($conf->{vga
});
3339 my $qxlnum = vga_conf_has_spice
($conf->{vga
});
3340 $vga->{type
} = 'qxl' if $qxlnum;
3342 if (!$vga->{type
}) {
3343 if ($arch eq 'aarch64') {
3344 $vga->{type
} = 'virtio';
3345 } elsif (min_version
($machine_version, 2, 9)) {
3346 $vga->{type
} = (!$winversion || $winversion >= 6) ?
'std' : 'cirrus';
3348 $vga->{type
} = ($winversion >= 6) ?
'std' : 'cirrus';
3352 # enable absolute mouse coordinates (needed by vnc)
3354 if (defined($conf->{tablet
})) {
3355 $tablet = $conf->{tablet
};
3357 $tablet = $defaults->{tablet
};
3358 $tablet = 0 if $qxlnum; # disable for spice because it is not needed
3359 $tablet = 0 if $vga->{type
} =~ m/^serial\d+$/; # disable if we use serial terminal (no vga card)
3363 push @$devices, '-device', print_tabletdevice_full
($conf, $arch) if $tablet;
3364 my $kbd = print_keyboarddevice_full
($conf, $arch);
3365 push @$devices, '-device', $kbd if defined($kbd);
3368 my $bootorder = device_bootorder
($conf);
3370 # host pci device passthrough
3371 my ($kvm_off, $gpu_passthrough, $legacy_igd) = PVE
::QemuServer
::PCI
::print_hostpci_devices
(
3372 $vmid, $conf, $devices, $vga, $winversion, $q35, $bridges, $arch, $machine_type, $bootorder);
3375 my $usb_dev_features = {};
3376 $usb_dev_features->{spice_usb3
} = 1 if min_version
($machine_version, 4, 0);
3378 my @usbdevices = PVE
::QemuServer
::USB
::get_usb_devices
(
3379 $conf, $usbdesc->{format
}, $MAX_USB_DEVICES, $usb_dev_features, $bootorder);
3380 push @$devices, @usbdevices if @usbdevices;
3383 for (my $i = 0; $i < $MAX_SERIAL_PORTS; $i++) {
3384 if (my $path = $conf->{"serial$i"}) {
3385 if ($path eq 'socket') {
3386 my $socket = "/var/run/qemu-server/${vmid}.serial$i";
3387 push @$devices, '-chardev', "socket,id=serial$i,path=$socket,server=on,wait=off";
3388 # On aarch64, serial0 is the UART device. Qemu only allows
3389 # connecting UART devices via the '-serial' command line, as
3390 # the device has a fixed slot on the hardware...
3391 if ($arch eq 'aarch64' && $i == 0) {
3392 push @$devices, '-serial', "chardev:serial$i";
3394 push @$devices, '-device', "isa-serial,chardev=serial$i";
3397 die "no such serial device\n" if ! -c
$path;
3398 push @$devices, '-chardev', "tty,id=serial$i,path=$path";
3399 push @$devices, '-device', "isa-serial,chardev=serial$i";
3405 for (my $i = 0; $i < $MAX_PARALLEL_PORTS; $i++) {
3406 if (my $path = $conf->{"parallel$i"}) {
3407 die "no such parallel device\n" if ! -c
$path;
3408 my $devtype = $path =~ m!^/dev/usb/lp! ?
'tty' : 'parport';
3409 push @$devices, '-chardev', "$devtype,id=parallel$i,path=$path";
3410 push @$devices, '-device', "isa-parallel,chardev=parallel$i";
3414 if (min_version
($machine_version, 4, 0) && (my $audio = conf_has_audio
($conf))) {
3415 my $audiopciaddr = print_pci_addr
("audio0", $bridges, $arch, $machine_type);
3416 my $audio_devs = audio_devs
($audio, $audiopciaddr, $machine_version);
3417 push @$devices, @$audio_devs;
3421 $sockets = $conf->{smp
} if $conf->{smp
}; # old style - no longer iused
3422 $sockets = $conf->{sockets
} if $conf->{sockets
};
3424 my $cores = $conf->{cores
} || 1;
3426 my $maxcpus = $sockets * $cores;
3428 my $vcpus = $conf->{vcpus
} ?
$conf->{vcpus
} : $maxcpus;
3430 my $allowed_vcpus = $cpuinfo->{cpus
};
3432 die "MAX $allowed_vcpus vcpus allowed per VM on this node\n"
3433 if ($allowed_vcpus < $maxcpus);
3435 if($hotplug_features->{cpu
} && min_version
($machine_version, 2, 7)) {
3437 push @$cmd, '-smp', "1,sockets=$sockets,cores=$cores,maxcpus=$maxcpus";
3438 for (my $i = 2; $i <= $vcpus; $i++) {
3439 my $cpustr = print_cpu_device
($conf,$i);
3440 push @$cmd, '-device', $cpustr;
3445 push @$cmd, '-smp', "$vcpus,sockets=$sockets,cores=$cores,maxcpus=$maxcpus";
3447 push @$cmd, '-nodefaults';
3449 push @$cmd, '-boot', "menu=on,strict=on,reboot-timeout=1000,splash=/usr/share/qemu-server/bootsplash.jpg";
3451 push @$cmd, '-no-acpi' if defined($conf->{acpi
}) && $conf->{acpi
} == 0;
3453 push @$cmd, '-no-reboot' if defined($conf->{reboot
}) && $conf->{reboot
} == 0;
3455 if ($vga->{type
} && $vga->{type
} !~ m/^serial\d+$/ && $vga->{type
} ne 'none'){
3456 push @$devices, '-device', print_vga_device
(
3457 $conf, $vga, $arch, $machine_version, $machine_type, undef, $qxlnum, $bridges);
3458 my $socket = PVE
::QemuServer
::Helpers
::vnc_socket
($vmid);
3459 push @$cmd, '-vnc', "unix:$socket,password=on";
3461 push @$cmd, '-vga', 'none' if $vga->{type
} eq 'none';
3462 push @$cmd, '-nographic';
3466 my $tdf = defined($conf->{tdf
}) ?
$conf->{tdf
} : $defaults->{tdf
};
3467 my $useLocaltime = $conf->{localtime};
3469 if ($winversion >= 5) { # windows
3470 $useLocaltime = 1 if !defined($conf->{localtime});
3472 # use time drift fix when acpi is enabled
3473 if (!(defined($conf->{acpi
}) && $conf->{acpi
} == 0)) {
3474 $tdf = 1 if !defined($conf->{tdf
});
3478 if ($winversion >= 6) {
3479 push @$globalFlags, 'kvm-pit.lost_tick_policy=discard';
3480 push @$cmd, '-no-hpet';
3483 push @$rtcFlags, 'driftfix=slew' if $tdf;
3485 if ($conf->{startdate
} && $conf->{startdate
} ne 'now') {
3486 push @$rtcFlags, "base=$conf->{startdate}";
3487 } elsif ($useLocaltime) {
3488 push @$rtcFlags, 'base=localtime';
3492 push @$cmd, '-cpu', $forcecpu;
3494 push @$cmd, get_cpu_options
($conf, $arch, $kvm, $kvm_off, $machine_version, $winversion, $gpu_passthrough);
3497 PVE
::QemuServer
::Memory
::config
($conf, $vmid, $sockets, $cores, $defaults, $hotplug_features, $cmd);
3499 push @$cmd, '-S' if $conf->{freeze
};
3501 push @$cmd, '-k', $conf->{keyboard
} if defined($conf->{keyboard
});
3503 my $guest_agent = parse_guest_agent
($conf);
3505 if ($guest_agent->{enabled
}) {
3506 my $qgasocket = PVE
::QemuServer
::Helpers
::qmp_socket
($vmid, 1);
3507 push @$devices, '-chardev', "socket,path=$qgasocket,server=on,wait=off,id=qga0";
3509 if (!$guest_agent->{type
} || $guest_agent->{type
} eq 'virtio') {
3510 my $pciaddr = print_pci_addr
("qga0", $bridges, $arch, $machine_type);
3511 push @$devices, '-device', "virtio-serial,id=qga0$pciaddr";
3512 push @$devices, '-device', 'virtserialport,chardev=qga0,name=org.qemu.guest_agent.0';
3513 } elsif ($guest_agent->{type
} eq 'isa') {
3514 push @$devices, '-device', "isa-serial,chardev=qga0";
3518 my $rng = $conf->{rng0
} ? parse_rng
($conf->{rng0
}) : undef;
3519 if ($rng && $version_guard->(4, 1, 2)) {
3520 check_rng_source
($rng->{source
});
3522 my $max_bytes = $rng->{max_bytes
} // $rng_fmt->{max_bytes
}->{default};
3523 my $period = $rng->{period
} // $rng_fmt->{period
}->{default};
3524 my $limiter_str = "";
3526 $limiter_str = ",max-bytes=$max_bytes,period=$period";
3529 my $rng_addr = print_pci_addr
("rng0", $bridges, $arch, $machine_type);
3530 push @$devices, '-object', "rng-random,filename=$rng->{source},id=rng0";
3531 push @$devices, '-device', "virtio-rng-pci,rng=rng0$limiter_str$rng_addr";
3539 for (my $i = 1; $i < $qxlnum; $i++){
3540 push @$devices, '-device', print_vga_device
(
3541 $conf, $vga, $arch, $machine_version, $machine_type, $i, $qxlnum, $bridges);
3544 # assume other OS works like Linux
3545 my ($ram, $vram) = ("134217728", "67108864");
3546 if ($vga->{memory
}) {
3547 $ram = PVE
::Tools
::convert_size
($qxlnum*4*$vga->{memory
}, 'mb' => 'b');
3548 $vram = PVE
::Tools
::convert_size
($qxlnum*2*$vga->{memory
}, 'mb' => 'b');
3550 push @$cmd, '-global', "qxl-vga.ram_size=$ram";
3551 push @$cmd, '-global', "qxl-vga.vram_size=$vram";
3555 my $pciaddr = print_pci_addr
("spice", $bridges, $arch, $machine_type);
3557 my $pfamily = PVE
::Tools
::get_host_address_family
($nodename);
3558 my @nodeaddrs = PVE
::Tools
::getaddrinfo_all
('localhost', family
=> $pfamily);
3559 die "failed to get an ip address of type $pfamily for 'localhost'\n" if !@nodeaddrs;
3561 push @$devices, '-device', "virtio-serial,id=spice$pciaddr";
3562 push @$devices, '-chardev', "spicevmc,id=vdagent,name=vdagent";
3563 push @$devices, '-device', "virtserialport,chardev=vdagent,name=com.redhat.spice.0";
3565 my $localhost = PVE
::Network
::addr_to_ip
($nodeaddrs[0]->{addr
});
3566 $spice_port = PVE
::Tools
::next_spice_port
($pfamily, $localhost);
3568 my $spice_enhancement_str = $conf->{spice_enhancements
} // '';
3569 my $spice_enhancement = parse_property_string
($spice_enhancements_fmt, $spice_enhancement_str);
3570 if ($spice_enhancement->{foldersharing
}) {
3571 push @$devices, '-chardev', "spiceport,id=foldershare,name=org.spice-space.webdav.0";
3572 push @$devices, '-device', "virtserialport,chardev=foldershare,name=org.spice-space.webdav.0";
3575 my $spice_opts = "tls-port=${spice_port},addr=$localhost,tls-ciphers=HIGH,seamless-migration=on";
3576 $spice_opts .= ",streaming-video=$spice_enhancement->{videostreaming}"
3577 if $spice_enhancement->{videostreaming
};
3579 push @$devices, '-spice', "$spice_opts";
3582 # enable balloon by default, unless explicitly disabled
3583 if (!defined($conf->{balloon
}) || $conf->{balloon
}) {
3584 $pciaddr = print_pci_addr
("balloon0", $bridges, $arch, $machine_type);
3585 push @$devices, '-device', "virtio-balloon-pci,id=balloon0$pciaddr";
3588 if ($conf->{watchdog
}) {
3589 my $wdopts = parse_watchdog
($conf->{watchdog
});
3590 $pciaddr = print_pci_addr
("watchdog", $bridges, $arch, $machine_type);
3591 my $watchdog = $wdopts->{model
} || 'i6300esb';
3592 push @$devices, '-device', "$watchdog$pciaddr";
3593 push @$devices, '-watchdog-action', $wdopts->{action
} if $wdopts->{action
};
3597 my $scsicontroller = {};
3598 my $ahcicontroller = {};
3599 my $scsihw = defined($conf->{scsihw
}) ?
$conf->{scsihw
} : $defaults->{scsihw
};
3601 # Add iscsi initiator name if available
3602 if (my $initiator = get_initiator_name
()) {
3603 push @$devices, '-iscsi', "initiator-name=$initiator";
3606 PVE
::QemuConfig-
>foreach_volume($conf, sub {
3607 my ($ds, $drive) = @_;
3609 if (PVE
::Storage
::parse_volume_id
($drive->{file
}, 1)) {
3610 push @$vollist, $drive->{file
};
3613 # ignore efidisk here, already added in bios/fw handling code above
3614 return if $drive->{interface
} eq 'efidisk';
3616 $use_virtio = 1 if $ds =~ m/^virtio/;
3618 $drive->{bootindex
} = $bootorder->{$ds} if $bootorder->{$ds};
3620 if ($drive->{interface
} eq 'virtio'){
3621 push @$cmd, '-object', "iothread,id=iothread-$ds" if $drive->{iothread
};
3624 if ($drive->{interface
} eq 'scsi') {
3626 my ($maxdev, $controller, $controller_prefix) = scsihw_infos
($conf, $drive);
3628 die "scsi$drive->{index}: machine version 4.1~pve2 or higher is required to use more than 14 SCSI disks\n"
3629 if $drive->{index} > 13 && !&$version_guard(4, 1, 2);
3631 $pciaddr = print_pci_addr
("$controller_prefix$controller", $bridges, $arch, $machine_type);
3632 my $scsihw_type = $scsihw =~ m/^virtio-scsi-single/ ?
"virtio-scsi-pci" : $scsihw;
3635 if($conf->{scsihw
} && $conf->{scsihw
} eq "virtio-scsi-single" && $drive->{iothread
}){
3636 $iothread .= ",iothread=iothread-$controller_prefix$controller";
3637 push @$cmd, '-object', "iothread,id=iothread-$controller_prefix$controller";
3638 } elsif ($drive->{iothread
}) {
3639 warn "iothread is only valid with virtio disk or virtio-scsi-single controller, ignoring\n";
3643 if($conf->{scsihw
} && $conf->{scsihw
} eq "virtio-scsi-single" && $drive->{queues
}){
3644 $queues = ",num_queues=$drive->{queues}";
3647 push @$devices, '-device', "$scsihw_type,id=$controller_prefix$controller$pciaddr$iothread$queues"
3648 if !$scsicontroller->{$controller};
3649 $scsicontroller->{$controller}=1;
3652 if ($drive->{interface
} eq 'sata') {
3653 my $controller = int($drive->{index} / $PVE::QemuServer
::Drive
::MAX_SATA_DISKS
);
3654 $pciaddr = print_pci_addr
("ahci$controller", $bridges, $arch, $machine_type);
3655 push @$devices, '-device', "ahci,id=ahci$controller,multifunction=on$pciaddr"
3656 if !$ahcicontroller->{$controller};
3657 $ahcicontroller->{$controller}=1;
3660 my $pbs_conf = $pbs_backing->{$ds};
3661 my $pbs_name = undef;
3663 $pbs_name = "drive-$ds-pbs";
3664 push @$devices, '-blockdev', print_pbs_blockdev
($pbs_conf, $pbs_name);
3667 my $drive_cmd = print_drive_commandline_full
($storecfg, $vmid, $drive, $pbs_name);
3669 # extra protection for templates, but SATA and IDE don't support it..
3670 my $read_only = PVE
::QemuConfig-
>is_template($conf)
3671 && $drive->{interface
} ne 'sata'
3672 && $drive->{interface
} ne 'ide';
3674 $drive_cmd .= ',readonly=on' if $read_only;
3676 push @$devices, '-drive',$drive_cmd;
3677 push @$devices, '-device', print_drivedevice_full
(
3678 $storecfg, $conf, $vmid, $drive, $bridges, $arch, $machine_type);
3681 for (my $i = 0; $i < $MAX_NETS; $i++) {
3682 my $netname = "net$i";
3684 next if !$conf->{$netname};
3685 my $d = parse_net
($conf->{$netname});
3688 $use_virtio = 1 if $d->{model
} eq 'virtio';
3690 $d->{bootindex
} = $bootorder->{$netname} if $bootorder->{$netname};
3692 my $netdevfull = print_netdev_full
($vmid, $conf, $arch, $d, $netname);
3693 push @$devices, '-netdev', $netdevfull;
3695 my $netdevicefull = print_netdevice_full
(
3696 $vmid, $conf, $d, $netname, $bridges, $use_old_bios_files, $arch, $machine_type);
3698 push @$devices, '-device', $netdevicefull;
3701 if ($conf->{ivshmem
}) {
3702 my $ivshmem = parse_property_string
($ivshmem_fmt, $conf->{ivshmem
});
3706 $bus = print_pcie_addr
("ivshmem");
3708 $bus = print_pci_addr
("ivshmem", $bridges, $arch, $machine_type);
3711 my $ivshmem_name = $ivshmem->{name
} // $vmid;
3712 my $path = '/dev/shm/pve-shm-' . $ivshmem_name;
3714 push @$devices, '-device', "ivshmem-plain,memdev=ivshmem$bus,";
3715 push @$devices, '-object', "memory-backend-file,id=ivshmem,share=on,mem-path=$path"
3716 .",size=$ivshmem->{size}M";
3719 # pci.4 is nested in pci.1
3720 $bridges->{1} = 1 if $bridges->{4};
3724 if (min_version
($machine_version, 2, 3)) {
3729 $bridges->{3} = 1 if $scsihw =~ m/^virtio-scsi-single/;
3733 for my $k (sort {$b cmp $a} keys %$bridges) {
3734 next if $q35 && $k < 4; # q35.cfg already includes bridges up to 3
3737 if ($k == 2 && $legacy_igd) {
3740 $pciaddr = print_pci_addr
("pci.$k_name", undef, $arch, $machine_type);
3742 my $devstr = "pci-bridge,id=pci.$k,chassis_nr=$k$pciaddr";
3744 # add after -readconfig pve-q35.cfg
3745 splice @$devices, 2, 0, '-device', $devstr;
3747 unshift @$devices, '-device', $devstr if $k > 0;
3752 push @$machineFlags, 'accel=tcg';
3755 my $machine_type_min = $machine_type;
3756 if ($add_pve_version) {
3757 $machine_type_min =~ s/\+pve\d+$//;
3758 $machine_type_min .= "+pve$required_pve_version";
3760 push @$machineFlags, "type=${machine_type_min}";
3762 push @$cmd, @$devices;
3763 push @$cmd, '-rtc', join(',', @$rtcFlags) if scalar(@$rtcFlags);
3764 push @$cmd, '-machine', join(',', @$machineFlags) if scalar(@$machineFlags);
3765 push @$cmd, '-global', join(',', @$globalFlags) if scalar(@$globalFlags);
3767 if (my $vmstate = $conf->{vmstate
}) {
3768 my $statepath = PVE
::Storage
::path
($storecfg, $vmstate);
3769 push @$vollist, $vmstate;
3770 push @$cmd, '-loadstate', $statepath;
3771 print "activating and using '$vmstate' as vmstate\n";
3775 if ($conf->{args
}) {
3776 my $aa = PVE
::Tools
::split_args
($conf->{args
});
3780 return wantarray ?
($cmd, $vollist, $spice_port) : $cmd;
3783 sub check_rng_source
{
3786 # mostly relevant for /dev/hwrng, but doesn't hurt to check others too
3787 die "cannot create VirtIO RNG device: source file '$source' doesn't exist\n"
3790 my $rng_current = '/sys/devices/virtual/misc/hw_random/rng_current';
3791 if ($source eq '/dev/hwrng' && file_read_firstline
($rng_current) eq 'none') {
3792 # Needs to abort, otherwise QEMU crashes on first rng access. Note that rng_current cannot
3793 # be changed to 'none' manually, so once the VM is past this point, it's no longer an issue.
3794 die "Cannot start VM with passed-through RNG device: '/dev/hwrng' exists, but"
3795 ." '$rng_current' is set to 'none'. Ensure that a compatible hardware-RNG is attached"
3803 my $res = mon_cmd
($vmid, 'query-spice');
3805 return $res->{'tls-port'} || $res->{'port'} || die "no spice port\n";
3808 sub vm_devices_list
{
3811 my $res = mon_cmd
($vmid, 'query-pci');
3812 my $devices_to_check = [];
3814 foreach my $pcibus (@$res) {
3815 push @$devices_to_check, @{$pcibus->{devices
}},
3818 while (@$devices_to_check) {
3820 for my $d (@$devices_to_check) {
3821 $devices->{$d->{'qdev_id'}} = 1 if $d->{'qdev_id'};
3822 next if !$d->{'pci_bridge'};
3824 $devices->{$d->{'qdev_id'}} += scalar(@{$d->{'pci_bridge'}->{devices
}});
3825 push @$to_check, @{$d->{'pci_bridge'}->{devices
}};
3827 $devices_to_check = $to_check;
3830 my $resblock = mon_cmd
($vmid, 'query-block');
3831 foreach my $block (@$resblock) {
3832 if($block->{device
} =~ m/^drive-(\S+)/){
3837 my $resmice = mon_cmd
($vmid, 'query-mice');
3838 foreach my $mice (@$resmice) {
3839 if ($mice->{name
} eq 'QEMU HID Tablet') {
3840 $devices->{tablet
} = 1;
3845 # for usb devices there is no query-usb
3846 # but we can iterate over the entries in
3847 # qom-list path=/machine/peripheral
3848 my $resperipheral = mon_cmd
($vmid, 'qom-list', path
=> '/machine/peripheral');
3849 foreach my $per (@$resperipheral) {
3850 if ($per->{name
} =~ m/^usb\d+$/) {
3851 $devices->{$per->{name
}} = 1;
3859 my ($storecfg, $conf, $vmid, $deviceid, $device, $arch, $machine_type) = @_;
3861 my $q35 = PVE
::QemuServer
::Machine
::machine_type_is_q35
($conf);
3863 my $devices_list = vm_devices_list
($vmid);
3864 return 1 if defined($devices_list->{$deviceid});
3866 # add PCI bridge if we need it for the device
3867 qemu_add_pci_bridge
($storecfg, $conf, $vmid, $deviceid, $arch, $machine_type);
3869 if ($deviceid eq 'tablet') {
3871 qemu_deviceadd
($vmid, print_tabletdevice_full
($conf, $arch));
3873 } elsif ($deviceid eq 'keyboard') {
3875 qemu_deviceadd
($vmid, print_keyboarddevice_full
($conf, $arch));
3877 } elsif ($deviceid =~ m/^usb(\d+)$/) {
3879 die "usb hotplug currently not reliable\n";
3880 # since we can't reliably hot unplug all added usb devices and usb
3881 # passthrough breaks live migration we disable usb hotplugging for now
3882 #qemu_deviceadd($vmid, PVE::QemuServer::USB::print_usbdevice_full($conf, $deviceid, $device));
3884 } elsif ($deviceid =~ m/^(virtio)(\d+)$/) {
3886 qemu_iothread_add
($vmid, $deviceid, $device);
3888 qemu_driveadd
($storecfg, $vmid, $device);
3889 my $devicefull = print_drivedevice_full
($storecfg, $conf, $vmid, $device, undef, $arch, $machine_type);
3891 qemu_deviceadd
($vmid, $devicefull);
3892 eval { qemu_deviceaddverify
($vmid, $deviceid); };
3894 eval { qemu_drivedel
($vmid, $deviceid); };
3899 } elsif ($deviceid =~ m/^(virtioscsi|scsihw)(\d+)$/) {
3902 my $scsihw = defined($conf->{scsihw
}) ?
$conf->{scsihw
} : "lsi";
3903 my $pciaddr = print_pci_addr
($deviceid, undef, $arch, $machine_type);
3904 my $scsihw_type = $scsihw eq 'virtio-scsi-single' ?
"virtio-scsi-pci" : $scsihw;
3906 my $devicefull = "$scsihw_type,id=$deviceid$pciaddr";
3908 if($deviceid =~ m/^virtioscsi(\d+)$/ && $device->{iothread
}) {
3909 qemu_iothread_add
($vmid, $deviceid, $device);
3910 $devicefull .= ",iothread=iothread-$deviceid";
3913 if($deviceid =~ m/^virtioscsi(\d+)$/ && $device->{queues
}) {
3914 $devicefull .= ",num_queues=$device->{queues}";
3917 qemu_deviceadd
($vmid, $devicefull);
3918 qemu_deviceaddverify
($vmid, $deviceid);
3920 } elsif ($deviceid =~ m/^(scsi)(\d+)$/) {
3922 qemu_findorcreatescsihw
($storecfg,$conf, $vmid, $device, $arch, $machine_type);
3923 qemu_driveadd
($storecfg, $vmid, $device);
3925 my $devicefull = print_drivedevice_full
($storecfg, $conf, $vmid, $device, undef, $arch, $machine_type);
3926 eval { qemu_deviceadd
($vmid, $devicefull); };
3928 eval { qemu_drivedel
($vmid, $deviceid); };
3933 } elsif ($deviceid =~ m/^(net)(\d+)$/) {
3935 return if !qemu_netdevadd
($vmid, $conf, $arch, $device, $deviceid);
3937 my $machine_type = PVE
::QemuServer
::Machine
::qemu_machine_pxe
($vmid, $conf);
3938 my $use_old_bios_files = undef;
3939 ($use_old_bios_files, $machine_type) = qemu_use_old_bios_files
($machine_type);
3941 my $netdevicefull = print_netdevice_full
(
3942 $vmid, $conf, $device, $deviceid, undef, $use_old_bios_files, $arch, $machine_type);
3943 qemu_deviceadd
($vmid, $netdevicefull);
3945 qemu_deviceaddverify
($vmid, $deviceid);
3946 qemu_set_link_status
($vmid, $deviceid, !$device->{link_down
});
3949 eval { qemu_netdevdel
($vmid, $deviceid); };
3954 } elsif (!$q35 && $deviceid =~ m/^(pci\.)(\d+)$/) {
3957 my $pciaddr = print_pci_addr
($deviceid, undef, $arch, $machine_type);
3958 my $devicefull = "pci-bridge,id=pci.$bridgeid,chassis_nr=$bridgeid$pciaddr";
3960 qemu_deviceadd
($vmid, $devicefull);
3961 qemu_deviceaddverify
($vmid, $deviceid);
3964 die "can't hotplug device '$deviceid'\n";
3970 # fixme: this should raise exceptions on error!
3971 sub vm_deviceunplug
{
3972 my ($vmid, $conf, $deviceid) = @_;
3974 my $devices_list = vm_devices_list
($vmid);
3975 return 1 if !defined($devices_list->{$deviceid});
3977 my $bootdisks = PVE
::QemuServer
::Drive
::get_bootdisks
($conf);
3978 die "can't unplug bootdisk '$deviceid'\n" if grep {$_ eq $deviceid} @$bootdisks;
3980 if ($deviceid eq 'tablet' || $deviceid eq 'keyboard') {
3982 qemu_devicedel
($vmid, $deviceid);
3984 } elsif ($deviceid =~ m/^usb\d+$/) {
3986 die "usb hotplug currently not reliable\n";
3987 # when unplugging usb devices this way, there may be remaining usb
3988 # controllers/hubs so we disable it for now
3989 #qemu_devicedel($vmid, $deviceid);
3990 #qemu_devicedelverify($vmid, $deviceid);
3992 } elsif ($deviceid =~ m/^(virtio)(\d+)$/) {
3994 qemu_devicedel
($vmid, $deviceid);
3995 qemu_devicedelverify
($vmid, $deviceid);
3996 qemu_drivedel
($vmid, $deviceid);
3997 qemu_iothread_del
($conf, $vmid, $deviceid);
3999 } elsif ($deviceid =~ m/^(virtioscsi|scsihw)(\d+)$/) {
4001 qemu_devicedel
($vmid, $deviceid);
4002 qemu_devicedelverify
($vmid, $deviceid);
4003 qemu_iothread_del
($conf, $vmid, $deviceid);
4005 } elsif ($deviceid =~ m/^(scsi)(\d+)$/) {
4007 qemu_devicedel
($vmid, $deviceid);
4008 qemu_drivedel
($vmid, $deviceid);
4009 qemu_deletescsihw
($conf, $vmid, $deviceid);
4011 } elsif ($deviceid =~ m/^(net)(\d+)$/) {
4013 qemu_devicedel
($vmid, $deviceid);
4014 qemu_devicedelverify
($vmid, $deviceid);
4015 qemu_netdevdel
($vmid, $deviceid);
4018 die "can't unplug device '$deviceid'\n";
4024 sub qemu_deviceadd
{
4025 my ($vmid, $devicefull) = @_;
4027 $devicefull = "driver=".$devicefull;
4028 my %options = split(/[=,]/, $devicefull);
4030 mon_cmd
($vmid, "device_add" , %options);
4033 sub qemu_devicedel
{
4034 my ($vmid, $deviceid) = @_;
4036 my $ret = mon_cmd
($vmid, "device_del", id
=> $deviceid);
4039 sub qemu_iothread_add
{
4040 my($vmid, $deviceid, $device) = @_;
4042 if ($device->{iothread
}) {
4043 my $iothreads = vm_iothreads_list
($vmid);
4044 qemu_objectadd
($vmid, "iothread-$deviceid", "iothread") if !$iothreads->{"iothread-$deviceid"};
4048 sub qemu_iothread_del
{
4049 my($conf, $vmid, $deviceid) = @_;
4051 my $confid = $deviceid;
4052 if ($deviceid =~ m/^(?:virtioscsi|scsihw)(\d+)$/) {
4053 $confid = 'scsi' . $1;
4055 my $device = parse_drive
($confid, $conf->{$confid});
4056 if ($device->{iothread
}) {
4057 my $iothreads = vm_iothreads_list
($vmid);
4058 qemu_objectdel
($vmid, "iothread-$deviceid") if $iothreads->{"iothread-$deviceid"};
4062 sub qemu_objectadd
{
4063 my($vmid, $objectid, $qomtype) = @_;
4065 mon_cmd
($vmid, "object-add", id
=> $objectid, "qom-type" => $qomtype);
4070 sub qemu_objectdel
{
4071 my($vmid, $objectid) = @_;
4073 mon_cmd
($vmid, "object-del", id
=> $objectid);
4079 my ($storecfg, $vmid, $device) = @_;
4081 my $drive = print_drive_commandline_full
($storecfg, $vmid, $device);
4082 $drive =~ s/\\/\\\\/g;
4083 my $ret = PVE
::QemuServer
::Monitor
::hmp_cmd
($vmid, "drive_add auto \"$drive\"");
4085 # If the command succeeds qemu prints: "OK
"
4086 return 1 if $ret =~ m/OK/s;
4088 die "adding drive failed
: $ret\n";
4092 my($vmid, $deviceid) = @_;
4094 my $ret = PVE::QemuServer::Monitor::hmp_cmd($vmid, "drive_del drive-
$deviceid");
4097 return 1 if $ret eq "";
4099 # NB: device not found errors mean the drive was auto-deleted and we ignore the error
4100 return 1 if $ret =~ m/Device \'.*?\' not found/s;
4102 die "deleting drive
$deviceid failed
: $ret\n";
4105 sub qemu_deviceaddverify {
4106 my ($vmid, $deviceid) = @_;
4108 for (my $i = 0; $i <= 5; $i++) {
4109 my $devices_list = vm_devices_list($vmid);
4110 return 1 if defined($devices_list->{$deviceid});
4114 die "error on hotplug device
'$deviceid'\n";
4118 sub qemu_devicedelverify {
4119 my ($vmid, $deviceid) = @_;
4121 # need to verify that the device is correctly removed as device_del
4122 # is async and empty return is not reliable
4124 for (my $i = 0; $i <= 5; $i++) {
4125 my $devices_list = vm_devices_list($vmid);
4126 return 1 if !defined($devices_list->{$deviceid});
4130 die "error on hot-unplugging device
'$deviceid'\n";
4133 sub qemu_findorcreatescsihw {
4134 my ($storecfg, $conf, $vmid, $device, $arch, $machine_type) = @_;
4136 my ($maxdev, $controller, $controller_prefix) = scsihw_infos($conf, $device);
4138 my $scsihwid="$controller_prefix$controller";
4139 my $devices_list = vm_devices_list($vmid);
4141 if(!defined($devices_list->{$scsihwid})) {
4142 vm_deviceplug($storecfg, $conf, $vmid, $scsihwid, $device, $arch, $machine_type);
4148 sub qemu_deletescsihw {
4149 my ($conf, $vmid, $opt) = @_;
4151 my $device = parse_drive($opt, $conf->{$opt});
4153 if ($conf->{scsihw} && ($conf->{scsihw} eq 'virtio-scsi-single')) {
4154 vm_deviceunplug($vmid, $conf, "virtioscsi
$device->{index}");
4158 my ($maxdev, $controller, $controller_prefix) = scsihw_infos($conf, $device);
4160 my $devices_list = vm_devices_list($vmid);
4161 foreach my $opt (keys %{$devices_list}) {
4162 if (is_valid_drivename($opt)) {
4163 my $drive = parse_drive($opt, $conf->{$opt});
4164 if($drive->{interface} eq 'scsi' && $drive->{index} < (($maxdev-1)*($controller+1))) {
4170 my $scsihwid="scsihw
$controller";
4172 vm_deviceunplug($vmid, $conf, $scsihwid);
4177 sub qemu_add_pci_bridge {
4178 my ($storecfg, $conf, $vmid, $device, $arch, $machine_type) = @_;
4184 print_pci_addr($device, $bridges, $arch, $machine_type);
4186 while (my ($k, $v) = each %$bridges) {
4189 return 1 if !defined($bridgeid) || $bridgeid < 1;
4191 my $bridge = "pci
.$bridgeid";
4192 my $devices_list = vm_devices_list($vmid);
4194 if (!defined($devices_list->{$bridge})) {
4195 vm_deviceplug($storecfg, $conf, $vmid, $bridge, $arch, $machine_type);
4201 sub qemu_set_link_status {
4202 my ($vmid, $device, $up) = @_;
4204 mon_cmd($vmid, "set_link
", name => $device,
4205 up => $up ? JSON::true : JSON::false);
4208 sub qemu_netdevadd {
4209 my ($vmid, $conf, $arch, $device, $deviceid) = @_;
4211 my $netdev = print_netdev_full($vmid, $conf, $arch, $device, $deviceid, 1);
4212 my %options = split(/[=,]/, $netdev);
4214 if (defined(my $vhost = $options{vhost})) {
4215 $options{vhost} = JSON::boolean(PVE::JSONSchema::parse_boolean($vhost));
4218 if (defined(my $queues = $options{queues})) {
4219 $options{queues} = $queues + 0;
4222 mon_cmd($vmid, "netdev_add
", %options);
4226 sub qemu_netdevdel {
4227 my ($vmid, $deviceid) = @_;
4229 mon_cmd($vmid, "netdev_del
", id => $deviceid);
4232 sub qemu_usb_hotplug {
4233 my ($storecfg, $conf, $vmid, $deviceid, $device, $arch, $machine_type) = @_;
4237 # remove the old one first
4238 vm_deviceunplug($vmid, $conf, $deviceid);
4240 # check if xhci controller is necessary and available
4241 if ($device->{usb3}) {
4243 my $devicelist = vm_devices_list($vmid);
4245 if (!$devicelist->{xhci}) {
4246 my $pciaddr = print_pci_addr("xhci
", undef, $arch, $machine_type);
4247 qemu_deviceadd($vmid, "nec-usb-xhci
,id
=xhci
$pciaddr");
4250 my $d = parse_usb_device($device->{host});
4251 $d->{usb3} = $device->{usb3};
4254 vm_deviceplug($storecfg, $conf, $vmid, $deviceid, $d, $arch, $machine_type);
4257 sub qemu_cpu_hotplug {
4258 my ($vmid, $conf, $vcpus) = @_;
4260 my $machine_type = PVE::QemuServer::Machine::get_current_qemu_machine($vmid);
4263 $sockets = $conf->{smp} if $conf->{smp}; # old style - no longer iused
4264 $sockets = $conf->{sockets} if $conf->{sockets};
4265 my $cores = $conf->{cores} || 1;
4266 my $maxcpus = $sockets * $cores;
4268 $vcpus = $maxcpus if !$vcpus;
4270 die "you can
't add more vcpus than maxcpus\n"
4271 if $vcpus > $maxcpus;
4273 my $currentvcpus = $conf->{vcpus} || $maxcpus;
4275 if ($vcpus < $currentvcpus) {
4277 if (PVE::QemuServer::Machine::machine_version($machine_type, 2, 7)) {
4279 for (my $i = $currentvcpus; $i > $vcpus; $i--) {
4280 qemu_devicedel($vmid, "cpu$i");
4282 my $currentrunningvcpus = undef;
4284 $currentrunningvcpus = mon_cmd($vmid, "query-cpus-fast");
4285 last if scalar(@{$currentrunningvcpus}) == $i-1;
4286 raise_param_exc({ vcpus => "error unplugging cpu$i" }) if $retry > 5;
4290 #update conf after each succesfull cpu unplug
4291 $conf->{vcpus} = scalar(@{$currentrunningvcpus});
4292 PVE::QemuConfig->write_config($vmid, $conf);
4295 die "cpu hot-unplugging requires qemu version 2.7 or higher\n";
4301 my $currentrunningvcpus = mon_cmd($vmid, "query-cpus-fast");
4302 die "vcpus in running vm does not match its configuration\n"
4303 if scalar(@{$currentrunningvcpus}) != $currentvcpus;
4305 if (PVE::QemuServer::Machine::machine_version($machine_type, 2, 7)) {
4307 for (my $i = $currentvcpus+1; $i <= $vcpus; $i++) {
4308 my $cpustr = print_cpu_device($conf, $i);
4309 qemu_deviceadd($vmid, $cpustr);
4312 my $currentrunningvcpus = undef;
4314 $currentrunningvcpus = mon_cmd($vmid, "query-cpus-fast");
4315 last if scalar(@{$currentrunningvcpus}) == $i;
4316 raise_param_exc({ vcpus => "error hotplugging cpu$i" }) if $retry > 10;
4320 #update conf after each succesfull cpu hotplug
4321 $conf->{vcpus} = scalar(@{$currentrunningvcpus});
4322 PVE::QemuConfig->write_config($vmid, $conf);
4326 for (my $i = $currentvcpus; $i < $vcpus; $i++) {
4327 mon_cmd($vmid, "cpu-add", id => int($i));
4332 sub qemu_block_set_io_throttle {
4333 my ($vmid, $deviceid,
4334 $bps, $bps_rd, $bps_wr, $iops, $iops_rd, $iops_wr,
4335 $bps_max, $bps_rd_max, $bps_wr_max, $iops_max, $iops_rd_max, $iops_wr_max,
4336 $bps_max_length, $bps_rd_max_length, $bps_wr_max_length,
4337 $iops_max_length, $iops_rd_max_length, $iops_wr_max_length) = @_;
4339 return if !check_running($vmid) ;
4341 mon_cmd($vmid, "block_set_io_throttle", device => $deviceid,
4343 bps_rd => int($bps_rd),
4344 bps_wr => int($bps_wr),
4346 iops_rd => int($iops_rd),
4347 iops_wr => int($iops_wr),
4348 bps_max => int($bps_max),
4349 bps_rd_max => int($bps_rd_max),
4350 bps_wr_max => int($bps_wr_max),
4351 iops_max => int($iops_max),
4352 iops_rd_max => int($iops_rd_max),
4353 iops_wr_max => int($iops_wr_max),
4354 bps_max_length => int($bps_max_length),
4355 bps_rd_max_length => int($bps_rd_max_length),
4356 bps_wr_max_length => int($bps_wr_max_length),
4357 iops_max_length => int($iops_max_length),
4358 iops_rd_max_length => int($iops_rd_max_length),
4359 iops_wr_max_length => int($iops_wr_max_length),
4364 sub qemu_block_resize {
4365 my ($vmid, $deviceid, $storecfg, $volid, $size) = @_;
4367 my $running = check_running($vmid);
4369 $size = 0 if !PVE::Storage::volume_resize($storecfg, $volid, $size, $running);
4371 return if !$running;
4373 my $padding = (1024 - $size % 1024) % 1024;
4374 $size = $size + $padding;
4379 device => $deviceid,
4385 sub qemu_volume_snapshot {
4386 my ($vmid, $deviceid, $storecfg, $volid, $snap) = @_;
4388 my $running = check_running($vmid);
4390 if ($running && do_snapshots_with_qemu($storecfg, $volid)){
4391 mon_cmd($vmid, 'blockdev-snapshot-internal-sync
', device => $deviceid, name => $snap);
4393 PVE::Storage::volume_snapshot($storecfg, $volid, $snap);
4397 sub qemu_volume_snapshot_delete {
4398 my ($vmid, $deviceid, $storecfg, $volid, $snap) = @_;
4400 my $running = check_running($vmid);
4405 my $conf = PVE::QemuConfig->load_config($vmid);
4406 PVE::QemuConfig->foreach_volume($conf, sub {
4407 my ($ds, $drive) = @_;
4408 $running = 1 if $drive->{file} eq $volid;
4412 if ($running && do_snapshots_with_qemu($storecfg, $volid)){
4413 mon_cmd($vmid, 'blockdev-snapshot-delete-internal-sync
', device => $deviceid, name => $snap);
4415 PVE::Storage::volume_snapshot_delete($storecfg, $volid, $snap, $running);
4419 sub set_migration_caps {
4420 my ($vmid, $savevm) = @_;
4422 my $qemu_support = eval { mon_cmd($vmid, "query-proxmox-support") };
4424 my $bitmap_prop = $savevm ? 'pbs-dirty-bitmap-savevm
' : 'pbs-dirty-bitmap-migration
';
4425 my $dirty_bitmaps = $qemu_support->{$bitmap_prop} ? 1 : 0;
4430 "auto-converge" => 1,
4432 "x-rdma-pin-all" => 0,
4435 "dirty-bitmaps" => $dirty_bitmaps,
4438 my $supported_capabilities = mon_cmd($vmid, "query-migrate-capabilities");
4440 for my $supported_capability (@$supported_capabilities) {
4442 capability => $supported_capability->{capability},
4443 state => $enabled_cap->{$supported_capability->{capability}} ? JSON::true : JSON::false,
4447 mon_cmd($vmid, "migrate-set-capabilities", capabilities => $cap_ref);
4451 my ($conf, $func, @param) = @_;
4455 my $test_volid = sub {
4456 my ($key, $drive, $snapname) = @_;
4458 my $volid = $drive->{file};
4461 $volhash->{$volid}->{cdrom} //= 1;
4462 $volhash->{$volid}->{cdrom} = 0 if !drive_is_cdrom($drive);
4464 my $replicate = $drive->{replicate} // 1;
4465 $volhash->{$volid}->{replicate} //= 0;
4466 $volhash->{$volid}->{replicate} = 1 if $replicate;
4468 $volhash->{$volid}->{shared} //= 0;
4469 $volhash->{$volid}->{shared} = 1 if $drive->{shared};
4471 $volhash->{$volid}->{referenced_in_config} //= 0;
4472 $volhash->{$volid}->{referenced_in_config} = 1 if !defined($snapname);
4474 $volhash->{$volid}->{referenced_in_snapshot}->{$snapname} = 1
4475 if defined($snapname);
4477 my $size = $drive->{size};
4478 $volhash->{$volid}->{size} //= $size if $size;
4480 $volhash->{$volid}->{is_vmstate} //= 0;
4481 $volhash->{$volid}->{is_vmstate} = 1 if $key eq 'vmstate
';
4483 $volhash->{$volid}->{is_unused} //= 0;
4484 $volhash->{$volid}->{is_unused} = 1 if $key =~ /^unused\d+$/;
4486 $volhash->{$volid}->{drivename} = $key if is_valid_drivename($key);
4489 my $include_opts = {
4490 extra_keys => ['vmstate
'],
4491 include_unused => 1,
4494 PVE::QemuConfig->foreach_volume_full($conf, $include_opts, $test_volid);
4495 foreach my $snapname (keys %{$conf->{snapshots}}) {
4496 my $snap = $conf->{snapshots}->{$snapname};
4497 PVE::QemuConfig->foreach_volume_full($snap, $include_opts, $test_volid, $snapname);
4500 foreach my $volid (keys %$volhash) {
4501 &$func($volid, $volhash->{$volid}, @param);
4505 my $fast_plug_option = {
4513 'vmstatestorage
' => 1,
4518 # hotplug changes in [PENDING]
4519 # $selection hash can be used to only apply specified options, for
4520 # example: { cores => 1 } (only apply changed 'cores
')
4521 # $errors ref is used to return error messages
4522 sub vmconfig_hotplug_pending {
4523 my ($vmid, $conf, $storecfg, $selection, $errors) = @_;
4525 my $defaults = load_defaults();
4526 my $arch = get_vm_arch($conf);
4527 my $machine_type = get_vm_machine($conf, undef, $arch);
4529 # commit values which do not have any impact on running VM first
4530 # Note: those option cannot raise errors, we we do not care about
4531 # $selection and always apply them.
4533 my $add_error = sub {
4534 my ($opt, $msg) = @_;
4535 $errors->{$opt} = "hotplug problem - $msg";
4539 foreach my $opt (keys %{$conf->{pending}}) { # add/change
4540 if ($fast_plug_option->{$opt}) {
4541 $conf->{$opt} = $conf->{pending}->{$opt};
4542 delete $conf->{pending}->{$opt};
4548 PVE::QemuConfig->write_config($vmid, $conf);
4551 my $hotplug_features = parse_hotplug_features(defined($conf->{hotplug}) ? $conf->{hotplug} : '1');
4553 my $cgroup = PVE::QemuServer::CGroup->new($vmid);
4554 my $pending_delete_hash = PVE::QemuConfig->parse_pending_delete($conf->{pending}->{delete});
4555 foreach my $opt (sort keys %$pending_delete_hash) {
4556 next if $selection && !$selection->{$opt};
4557 my $force = $pending_delete_hash->{$opt}->{force};
4559 if ($opt eq 'hotplug
') {
4560 die "skip\n" if ($conf->{hotplug} =~ /memory/);
4561 } elsif ($opt eq 'tablet
') {
4562 die "skip\n" if !$hotplug_features->{usb};
4563 if ($defaults->{tablet}) {
4564 vm_deviceplug($storecfg, $conf, $vmid, 'tablet
', $arch, $machine_type);
4565 vm_deviceplug($storecfg, $conf, $vmid, 'keyboard
', $arch, $machine_type)
4566 if $arch eq 'aarch64
';
4568 vm_deviceunplug($vmid, $conf, 'tablet
');
4569 vm_deviceunplug($vmid, $conf, 'keyboard
') if $arch eq 'aarch64
';
4571 } elsif ($opt =~ m/^usb\d+/) {
4573 # since we cannot reliably hot unplug usb devices we are disabling it
4574 #die "skip\n" if !$hotplug_features->{usb} || $conf->{$opt} =~ m/spice/i;
4575 #vm_deviceunplug($vmid, $conf, $opt);
4576 } elsif ($opt eq 'vcpus
') {
4577 die "skip\n" if !$hotplug_features->{cpu};
4578 qemu_cpu_hotplug($vmid, $conf, undef);
4579 } elsif ($opt eq 'balloon
') {
4580 # enable balloon device is not hotpluggable
4581 die "skip\n" if defined($conf->{balloon}) && $conf->{balloon} == 0;
4582 # here we reset the ballooning value to memory
4583 my $balloon = $conf->{memory} || $defaults->{memory};
4584 mon_cmd($vmid, "balloon", value => $balloon*1024*1024);
4585 } elsif ($fast_plug_option->{$opt}) {
4587 } elsif ($opt =~ m/^net(\d+)$/) {
4588 die "skip\n" if !$hotplug_features->{network};
4589 vm_deviceunplug($vmid, $conf, $opt);
4590 } elsif (is_valid_drivename($opt)) {
4591 die "skip\n" if !$hotplug_features->{disk} || $opt =~ m/(ide|sata)(\d+)/;
4592 vm_deviceunplug($vmid, $conf, $opt);
4593 vmconfig_delete_or_detach_drive($vmid, $storecfg, $conf, $opt, $force);
4594 } elsif ($opt =~ m/^memory$/) {
4595 die "skip\n" if !$hotplug_features->{memory};
4596 PVE::QemuServer::Memory::qemu_memory_hotplug($vmid, $conf, $defaults, $opt);
4597 } elsif ($opt eq 'cpuunits
') {
4598 $cgroup->change_cpu_shares(undef, $defaults->{cpuunits});
4599 } elsif ($opt eq 'cpulimit
') {
4600 $cgroup->change_cpu_quota(-1, 100000);
4606 &$add_error($opt, $err) if $err ne "skip\n";
4608 delete $conf->{$opt};
4609 PVE::QemuConfig->remove_from_pending_delete($conf, $opt);
4613 my ($apply_pending_cloudinit, $apply_pending_cloudinit_done);
4614 $apply_pending_cloudinit = sub {
4615 return if $apply_pending_cloudinit_done; # once is enough
4616 $apply_pending_cloudinit_done = 1; # once is enough
4618 my ($key, $value) = @_;
4620 my @cloudinit_opts = keys %$confdesc_cloudinit;
4621 foreach my $opt (keys %{$conf->{pending}}) {
4622 next if !grep { $_ eq $opt } @cloudinit_opts;
4623 $conf->{$opt} = delete $conf->{pending}->{$opt};
4626 my $pending_delete_hash = PVE::QemuConfig->parse_pending_delete($conf->{pending}->{delete});
4627 foreach my $opt (sort keys %$pending_delete_hash) {
4628 next if !grep { $_ eq $opt } @cloudinit_opts;
4629 PVE::QemuConfig->remove_from_pending_delete($conf, $opt);
4630 delete $conf->{$opt};
4633 my $new_conf = { %$conf };
4634 $new_conf->{$key} = $value;
4635 PVE::QemuServer::Cloudinit::generate_cloudinitconfig($new_conf, $vmid);
4638 foreach my $opt (keys %{$conf->{pending}}) {
4639 next if $selection && !$selection->{$opt};
4640 my $value = $conf->{pending}->{$opt};
4642 if ($opt eq 'hotplug
') {
4643 die "skip\n" if ($value =~ /memory/) || ($value !~ /memory/ && $conf->{hotplug} =~ /memory/);
4644 } elsif ($opt eq 'tablet
') {
4645 die "skip\n" if !$hotplug_features->{usb};
4647 vm_deviceplug($storecfg, $conf, $vmid, 'tablet
', $arch, $machine_type);
4648 vm_deviceplug($storecfg, $conf, $vmid, 'keyboard
', $arch, $machine_type)
4649 if $arch eq 'aarch64
';
4650 } elsif ($value == 0) {
4651 vm_deviceunplug($vmid, $conf, 'tablet
');
4652 vm_deviceunplug($vmid, $conf, 'keyboard
') if $arch eq 'aarch64
';
4654 } elsif ($opt =~ m/^usb\d+$/) {
4656 # since we cannot reliably hot unplug usb devices we disable it for now
4657 #die "skip\n" if !$hotplug_features->{usb} || $value =~ m/spice/i;
4658 #my $d = eval { parse_property_string($usbdesc->{format}, $value) };
4659 #die "skip\n" if !$d;
4660 #qemu_usb_hotplug($storecfg, $conf, $vmid, $opt, $d, $arch, $machine_type);
4661 } elsif ($opt eq 'vcpus
') {
4662 die "skip\n" if !$hotplug_features->{cpu};
4663 qemu_cpu_hotplug($vmid, $conf, $value);
4664 } elsif ($opt eq 'balloon
') {
4665 # enable/disable balloning device is not hotpluggable
4666 my $old_balloon_enabled = !!(!defined($conf->{balloon}) || $conf->{balloon});
4667 my $new_balloon_enabled = !!(!defined($conf->{pending}->{balloon}) || $conf->{pending}->{balloon});
4668 die "skip\n" if $old_balloon_enabled != $new_balloon_enabled;
4670 # allow manual ballooning if shares is set to zero
4671 if ((defined($conf->{shares}) && ($conf->{shares} == 0))) {
4672 my $balloon = $conf->{pending}->{balloon} || $conf->{memory} || $defaults->{memory};
4673 mon_cmd($vmid, "balloon", value => $balloon*1024*1024);
4675 } elsif ($opt =~ m/^net(\d+)$/) {
4676 # some changes can be done without hotplug
4677 vmconfig_update_net($storecfg, $conf, $hotplug_features->{network},
4678 $vmid, $opt, $value, $arch, $machine_type);
4679 } elsif (is_valid_drivename($opt)) {
4680 die "skip\n" if $opt eq 'efidisk0
';
4681 # some changes can be done without hotplug
4682 my $drive = parse_drive($opt, $value);
4683 if (drive_is_cloudinit($drive)) {
4684 &$apply_pending_cloudinit($opt, $value);
4686 vmconfig_update_disk($storecfg, $conf, $hotplug_features->{disk},
4687 $vmid, $opt, $value, $arch, $machine_type);
4688 } elsif ($opt =~ m/^memory$/) { #dimms
4689 die "skip\n" if !$hotplug_features->{memory};
4690 $value = PVE::QemuServer::Memory::qemu_memory_hotplug($vmid, $conf, $defaults, $opt, $value);
4691 } elsif ($opt eq 'cpuunits
') {
4692 $cgroup->change_cpu_shares($conf->{pending}->{$opt}, $defaults->{cpuunits});
4693 } elsif ($opt eq 'cpulimit
') {
4694 my $cpulimit = $conf->{pending}->{$opt} == 0 ? -1 : int($conf->{pending}->{$opt} * 100000);
4695 $cgroup->change_cpu_quota($cpulimit, 100000);
4697 die "skip\n"; # skip non-hot-pluggable options
4701 &$add_error($opt, $err) if $err ne "skip\n";
4703 $conf->{$opt} = $value;
4704 delete $conf->{pending}->{$opt};
4708 PVE::QemuConfig->write_config($vmid, $conf);
4711 sub try_deallocate_drive {
4712 my ($storecfg, $vmid, $conf, $key, $drive, $rpcenv, $authuser, $force) = @_;
4714 if (($force || $key =~ /^unused/) && !drive_is_cdrom($drive, 1)) {
4715 my $volid = $drive->{file};
4716 if (vm_is_volid_owner($storecfg, $vmid, $volid)) {
4717 my $sid = PVE::Storage::parse_volume_id($volid);
4718 $rpcenv->check($authuser, "/storage/$sid", ['Datastore
.AllocateSpace
']);
4720 # check if the disk is really unused
4721 die "unable to delete '$volid' - volume is still in use (snapshot?)\n"
4722 if PVE::QemuServer::Drive::is_volume_in_use($storecfg, $conf, $key, $volid);
4723 PVE::Storage::vdisk_free($storecfg, $volid);
4726 # If vm is not owner of this disk remove from config
4734 sub vmconfig_delete_or_detach_drive {
4735 my ($vmid, $storecfg, $conf, $opt, $force) = @_;
4737 my $drive = parse_drive($opt, $conf->{$opt});
4739 my $rpcenv = PVE::RPCEnvironment::get();
4740 my $authuser = $rpcenv->get_user();
4743 $rpcenv->check_vm_perm($authuser, $vmid, undef, ['VM
.Config
.Disk
']);
4744 try_deallocate_drive($storecfg, $vmid, $conf, $opt, $drive, $rpcenv, $authuser, $force);
4746 vmconfig_register_unused_drive($storecfg, $vmid, $conf, $drive);
4752 sub vmconfig_apply_pending {
4753 my ($vmid, $conf, $storecfg, $errors) = @_;
4755 my $add_apply_error = sub {
4756 my ($opt, $msg) = @_;
4757 my $err_msg = "unable to apply pending change $opt : $msg";
4758 $errors->{$opt} = $err_msg;
4764 my $pending_delete_hash = PVE::QemuConfig->parse_pending_delete($conf->{pending}->{delete});
4765 foreach my $opt (sort keys %$pending_delete_hash) {
4766 my $force = $pending_delete_hash->{$opt}->{force};
4768 if ($opt =~ m/^unused/) {
4769 die "internal error";
4770 } elsif (defined($conf->{$opt}) && is_valid_drivename($opt)) {
4771 vmconfig_delete_or_detach_drive($vmid, $storecfg, $conf, $opt, $force);
4775 $add_apply_error->($opt, $err);
4777 PVE::QemuConfig->remove_from_pending_delete($conf, $opt);
4778 delete $conf->{$opt};
4782 PVE::QemuConfig->cleanup_pending($conf);
4784 foreach my $opt (keys %{$conf->{pending}}) { # add/change
4785 next if $opt eq 'delete'; # just to be sure
4787 if (defined($conf->{$opt}) && is_valid_drivename($opt)) {
4788 vmconfig_register_unused_drive($storecfg, $vmid, $conf, parse_drive($opt, $conf->{$opt}))
4792 $add_apply_error->($opt, $err);
4794 $conf->{$opt} = delete $conf->{pending}->{$opt};
4798 # write all changes at once to avoid unnecessary i/o
4799 PVE::QemuConfig->write_config($vmid, $conf);
4802 sub vmconfig_update_net {
4803 my ($storecfg, $conf, $hotplug, $vmid, $opt, $value, $arch, $machine_type) = @_;
4805 my $newnet = parse_net($value);
4807 if ($conf->{$opt}) {
4808 my $oldnet = parse_net($conf->{$opt});
4810 if (safe_string_ne($oldnet->{model}, $newnet->{model}) ||
4811 safe_string_ne($oldnet->{macaddr}, $newnet->{macaddr}) ||
4812 safe_num_ne($oldnet->{queues}, $newnet->{queues}) ||
4813 !($newnet->{bridge} && $oldnet->{bridge})) { # bridge/nat mode change
4815 # for non online change, we try to hot-unplug
4816 die "skip\n" if !$hotplug;
4817 vm_deviceunplug($vmid, $conf, $opt);
4820 die "internal error" if $opt !~ m/net(\d+)/;
4821 my $iface = "tap${vmid}i$1";
4823 if (safe_string_ne($oldnet->{bridge}, $newnet->{bridge}) ||
4824 safe_num_ne($oldnet->{tag}, $newnet->{tag}) ||
4825 safe_string_ne($oldnet->{trunks}, $newnet->{trunks}) ||
4826 safe_num_ne($oldnet->{firewall}, $newnet->{firewall})) {
4827 PVE::Network::tap_unplug($iface);
4830 PVE::Network::SDN::Zones::tap_plug($iface, $newnet->{bridge}, $newnet->{tag}, $newnet->{firewall}, $newnet->{trunks}, $newnet->{rate});
4832 PVE::Network::tap_plug($iface, $newnet->{bridge}, $newnet->{tag}, $newnet->{firewall}, $newnet->{trunks}, $newnet->{rate});
4834 } elsif (safe_num_ne($oldnet->{rate}, $newnet->{rate})) {
4835 # Rate can be applied on its own but any change above needs to
4836 # include the rate in tap_plug since OVS resets everything.
4837 PVE::Network::tap_rate_limit($iface, $newnet->{rate});
4840 if (safe_string_ne($oldnet->{link_down}, $newnet->{link_down})) {
4841 qemu_set_link_status($vmid, $opt, !$newnet->{link_down});
4849 vm_deviceplug($storecfg, $conf, $vmid, $opt, $newnet, $arch, $machine_type);
4855 sub vmconfig_update_disk {
4856 my ($storecfg, $conf, $hotplug, $vmid, $opt, $value, $arch, $machine_type) = @_;
4858 my $drive = parse_drive($opt, $value);
4860 if ($conf->{$opt} && (my $old_drive = parse_drive($opt, $conf->{$opt}))) {
4861 my $media = $drive->{media} || 'disk
';
4862 my $oldmedia = $old_drive->{media} || 'disk
';
4863 die "unable to change media type\n" if $media ne $oldmedia;
4865 if (!drive_is_cdrom($old_drive)) {
4867 if ($drive->{file} ne $old_drive->{file}) {
4869 die "skip\n" if !$hotplug;
4871 # unplug and register as unused
4872 vm_deviceunplug($vmid, $conf, $opt);
4873 vmconfig_register_unused_drive($storecfg, $vmid, $conf, $old_drive)
4876 # update existing disk
4878 # skip non hotpluggable value
4879 if (safe_string_ne($drive->{discard}, $old_drive->{discard}) ||
4880 safe_string_ne($drive->{iothread}, $old_drive->{iothread}) ||
4881 safe_string_ne($drive->{queues}, $old_drive->{queues}) ||
4882 safe_string_ne($drive->{cache}, $old_drive->{cache}) ||
4883 safe_string_ne($drive->{ssd}, $old_drive->{ssd})) {
4888 if (safe_num_ne($drive->{mbps}, $old_drive->{mbps}) ||
4889 safe_num_ne($drive->{mbps_rd}, $old_drive->{mbps_rd}) ||
4890 safe_num_ne($drive->{mbps_wr}, $old_drive->{mbps_wr}) ||
4891 safe_num_ne($drive->{iops}, $old_drive->{iops}) ||
4892 safe_num_ne($drive->{iops_rd}, $old_drive->{iops_rd}) ||
4893 safe_num_ne($drive->{iops_wr}, $old_drive->{iops_wr}) ||
4894 safe_num_ne($drive->{mbps_max}, $old_drive->{mbps_max}) ||
4895 safe_num_ne($drive->{mbps_rd_max}, $old_drive->{mbps_rd_max}) ||
4896 safe_num_ne($drive->{mbps_wr_max}, $old_drive->{mbps_wr_max}) ||
4897 safe_num_ne($drive->{iops_max}, $old_drive->{iops_max}) ||
4898 safe_num_ne($drive->{iops_rd_max}, $old_drive->{iops_rd_max}) ||
4899 safe_num_ne($drive->{iops_wr_max}, $old_drive->{iops_wr_max}) ||
4900 safe_num_ne($drive->{bps_max_length}, $old_drive->{bps_max_length}) ||
4901 safe_num_ne($drive->{bps_rd_max_length}, $old_drive->{bps_rd_max_length}) ||
4902 safe_num_ne($drive->{bps_wr_max_length}, $old_drive->{bps_wr_max_length}) ||
4903 safe_num_ne($drive->{iops_max_length}, $old_drive->{iops_max_length}) ||
4904 safe_num_ne($drive->{iops_rd_max_length}, $old_drive->{iops_rd_max_length}) ||
4905 safe_num_ne($drive->{iops_wr_max_length}, $old_drive->{iops_wr_max_length})) {
4907 qemu_block_set_io_throttle(
4909 ($drive->{mbps} || 0)*1024*1024,
4910 ($drive->{mbps_rd} || 0)*1024*1024,
4911 ($drive->{mbps_wr} || 0)*1024*1024,
4912 $drive->{iops} || 0,
4913 $drive->{iops_rd} || 0,
4914 $drive->{iops_wr} || 0,
4915 ($drive->{mbps_max} || 0)*1024*1024,
4916 ($drive->{mbps_rd_max} || 0)*1024*1024,
4917 ($drive->{mbps_wr_max} || 0)*1024*1024,
4918 $drive->{iops_max} || 0,
4919 $drive->{iops_rd_max} || 0,
4920 $drive->{iops_wr_max} || 0,
4921 $drive->{bps_max_length} || 1,
4922 $drive->{bps_rd_max_length} || 1,
4923 $drive->{bps_wr_max_length} || 1,
4924 $drive->{iops_max_length} || 1,
4925 $drive->{iops_rd_max_length} || 1,
4926 $drive->{iops_wr_max_length} || 1,
4936 if ($drive->{file} eq 'none
') {
4937 mon_cmd($vmid, "eject", force => JSON::true, id => "$opt");
4938 if (drive_is_cloudinit($old_drive)) {
4939 vmconfig_register_unused_drive($storecfg, $vmid, $conf, $old_drive);
4942 my $path = get_iso_path($storecfg, $vmid, $drive->{file});
4944 # force eject if locked
4945 mon_cmd($vmid, "eject", force => JSON::true, id => "$opt");
4948 mon_cmd($vmid, "blockdev-change-medium",
4949 id => "$opt", filename => "$path");
4957 die "skip\n" if !$hotplug || $opt =~ m/(ide|sata)(\d+)/;
4959 PVE::Storage::activate_volumes($storecfg, [$drive->{file}]) if $drive->{file} !~ m|^/dev/.+|;
4960 vm_deviceplug($storecfg, $conf, $vmid, $opt, $drive, $arch, $machine_type);
4963 # called in locked context by incoming migration
4964 sub vm_migrate_get_nbd_disks {
4965 my ($storecfg, $conf, $replicated_volumes) = @_;
4967 my $local_volumes = {};
4968 PVE::QemuConfig->foreach_volume($conf, sub {
4969 my ($ds, $drive) = @_;
4971 return if drive_is_cdrom($drive);
4973 my $volid = $drive->{file};
4977 my ($storeid, $volname) = PVE::Storage::parse_volume_id($volid);
4979 my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
4980 return if $scfg->{shared};
4982 # replicated disks re-use existing state via bitmap
4983 my $use_existing = $replicated_volumes->{$volid} ? 1 : 0;
4984 $local_volumes->{$ds} = [$volid, $storeid, $volname, $drive, $use_existing];
4986 return $local_volumes;
4989 # called in locked context by incoming migration
4990 sub vm_migrate_alloc_nbd_disks {
4991 my ($storecfg, $vmid, $source_volumes, $storagemap) = @_;
4996 foreach my $opt (sort keys %$source_volumes) {
4997 my ($volid, $storeid, $volname, $drive, $use_existing) = @{$source_volumes->{$opt}};
4999 if ($use_existing) {
5000 $nbd->{$opt}->{drivestr} = print_drive($drive);
5001 $nbd->{$opt}->{volid} = $volid;
5002 $nbd->{$opt}->{replicated} = 1;
5006 # If a remote storage is specified and the format of the original
5007 # volume is not available there, fall back to the default format.
5008 # Otherwise use the same format as the original.
5009 if (!$storagemap->{identity}) {
5010 $storeid = map_storage($storagemap, $storeid);
5011 my ($defFormat, $validFormats) = PVE::Storage::storage_default_format($storecfg, $storeid);
5012 my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
5013 my $fileFormat = qemu_img_format($scfg, $volname);
5014 $format = (grep {$fileFormat eq $_} @{$validFormats}) ? $fileFormat : $defFormat;
5016 my $scfg = PVE::Storage::storage_config($storecfg, $storeid);
5017 $format = qemu_img_format($scfg, $volname);
5020 my $size = $drive->{size} / 1024;
5021 my $newvolid = PVE::Storage::vdisk_alloc($storecfg, $storeid, $vmid, $format, undef, $size);
5022 my $newdrive = $drive;
5023 $newdrive->{format} = $format;
5024 $newdrive->{file} = $newvolid;
5025 my $drivestr = print_drive($newdrive);
5026 $nbd->{$opt}->{drivestr} = $drivestr;
5027 $nbd->{$opt}->{volid} = $newvolid;
5033 # see vm_start_nolock for parameters, additionally:
5035 # storagemap = parsed storage map for allocating NBD disks
5037 my ($storecfg, $vmid, $params, $migrate_opts) = @_;
5039 return PVE::QemuConfig->lock_config($vmid, sub {
5040 my $conf = PVE::QemuConfig->load_config($vmid, $migrate_opts->{migratedfrom});
5042 die "you can't start a vm
if it
's a template\n"
5043 if !$params->{skiptemplate} && PVE::QemuConfig->is_template($conf);
5045 my $has_suspended_lock = PVE::QemuConfig->has_lock($conf, 'suspended
');
5046 my $has_backup_lock = PVE::QemuConfig->has_lock($conf, 'backup
');
5048 my $running = check_running($vmid, undef, $migrate_opts->{migratedfrom});
5050 if ($has_backup_lock && $running) {
5051 # a backup is currently running, attempt to start the guest in the
5052 # existing QEMU instance
5053 return vm_resume($vmid);
5056 PVE::QemuConfig->check_lock($conf)
5057 if !($params->{skiplock} || $has_suspended_lock);
5059 $params->{resume} = $has_suspended_lock || defined($conf->{vmstate});
5061 die "VM $vmid already running\n" if $running;
5063 if (my $storagemap = $migrate_opts->{storagemap}) {
5064 my $replicated = $migrate_opts->{replicated_volumes};
5065 my $disks = vm_migrate_get_nbd_disks($storecfg, $conf, $replicated);
5066 $migrate_opts->{nbd} = vm_migrate_alloc_nbd_disks($storecfg, $vmid, $disks, $storagemap);
5068 foreach my $opt (keys %{$migrate_opts->{nbd}}) {
5069 $conf->{$opt} = $migrate_opts->{nbd}->{$opt}->{drivestr};
5073 return vm_start_nolock($storecfg, $vmid, $conf, $params, $migrate_opts);
5079 # statefile => 'tcp
', 'unix
' for migration or path/volid for RAM state
5080 # skiplock => 0/1, skip checking for config lock
5081 # skiptemplate => 0/1, skip checking whether VM is template
5082 # forcemachine => to force Qemu machine (rollback/migration)
5083 # forcecpu => a QEMU '-cpu
' argument string to override get_cpu_options
5084 # timeout => in seconds
5085 # paused => start VM in paused state (backup)
5086 # resume => resume from hibernation
5097 # nbd => volumes for NBD exports (vm_migrate_alloc_nbd_disks)
5098 # migratedfrom => source node
5099 # spice_ticket => used for spice migration, passed via tunnel/stdin
5100 # network => CIDR of migration network
5101 # type => secure/insecure - tunnel over encrypted connection or plain-text
5102 # nbd_proto_version => int, 0 for TCP, 1 for UNIX
5103 # replicated_volumes = which volids should be re-used with bitmaps for nbd migration
5104 sub vm_start_nolock {
5105 my ($storecfg, $vmid, $conf, $params, $migrate_opts) = @_;
5107 my $statefile = $params->{statefile};
5108 my $resume = $params->{resume};
5110 my $migratedfrom = $migrate_opts->{migratedfrom};
5111 my $migration_type = $migrate_opts->{type};
5115 # clean up leftover reboot request files
5116 eval { clear_reboot_request($vmid); };
5119 if (!$statefile && scalar(keys %{$conf->{pending}})) {
5120 vmconfig_apply_pending($vmid, $conf, $storecfg);
5121 $conf = PVE::QemuConfig->load_config($vmid); # update/reload
5124 PVE::QemuServer::Cloudinit::generate_cloudinitconfig($conf, $vmid);
5126 my $defaults = load_defaults();
5128 # set environment variable useful inside network script
5129 $ENV{PVE_MIGRATED_FROM} = $migratedfrom if $migratedfrom;
5131 PVE::GuestHelpers::exec_hookscript($conf, $vmid, 'pre-start
', 1);
5133 my $forcemachine = $params->{forcemachine};
5134 my $forcecpu = $params->{forcecpu};
5136 # enforce machine and CPU type on suspended vm to ensure HW compatibility
5137 $forcemachine = $conf->{runningmachine};
5138 $forcecpu = $conf->{runningcpu};
5139 print "Resuming suspended VM\n";
5142 my ($cmd, $vollist, $spice_port) = config_to_command($storecfg, $vmid,
5143 $conf, $defaults, $forcemachine, $forcecpu, $params->{'pbs-backing
'});
5146 my $get_migration_ip = sub {
5147 my ($nodename) = @_;
5149 return $migration_ip if defined($migration_ip);
5151 my $cidr = $migrate_opts->{network};
5153 if (!defined($cidr)) {
5154 my $dc_conf = PVE::Cluster::cfs_read_file('datacenter
.cfg
');
5155 $cidr = $dc_conf->{migration}->{network};
5158 if (defined($cidr)) {
5159 my $ips = PVE::Network::get_local_ip_from_cidr($cidr);
5161 die "could not get IP: no address configured on local " .
5162 "node for network '$cidr'\n" if scalar(@$ips) == 0;
5164 die "could not get IP: multiple addresses configured on local " .
5165 "node for network '$cidr'\n" if scalar(@$ips) > 1;
5167 $migration_ip = @$ips[0];
5170 $migration_ip = PVE::Cluster::remote_node_ip($nodename, 1)
5171 if !defined($migration_ip);
5173 return $migration_ip;
5178 if ($statefile eq 'tcp
') {
5179 my $localip = "localhost";
5180 my $datacenterconf = PVE::Cluster::cfs_read_file('datacenter
.cfg
');
5181 my $nodename = nodename();
5183 if (!defined($migration_type)) {
5184 if (defined($datacenterconf->{migration}->{type})) {
5185 $migration_type = $datacenterconf->{migration}->{type};
5187 $migration_type = 'secure
';
5191 if ($migration_type eq 'insecure
') {
5192 $localip = $get_migration_ip->($nodename);
5193 $localip = "[$localip]" if Net::IP::ip_is_ipv6($localip);
5196 my $pfamily = PVE::Tools::get_host_address_family($nodename);
5197 my $migrate_port = PVE::Tools::next_migrate_port($pfamily);
5198 $migrate_uri = "tcp:${localip}:${migrate_port}";
5199 push @$cmd, '-incoming
', $migrate_uri;
5202 } elsif ($statefile eq 'unix
') {
5203 # should be default for secure migrations as a ssh TCP forward
5204 # tunnel is not deterministic reliable ready and fails regurarly
5205 # to set up in time, so use UNIX socket forwards
5206 my $socket_addr = "/run/qemu-server/$vmid.migrate";
5207 unlink $socket_addr;
5209 $migrate_uri = "unix:$socket_addr";
5211 push @$cmd, '-incoming
', $migrate_uri;
5214 } elsif (-e $statefile) {
5215 push @$cmd, '-loadstate
', $statefile;
5217 my $statepath = PVE::Storage::path($storecfg, $statefile);
5218 push @$vollist, $statefile;
5219 push @$cmd, '-loadstate
', $statepath;
5221 } elsif ($params->{paused}) {
5226 for (my $i = 0; $i < $PVE::QemuServer::PCI::MAX_HOSTPCI_DEVICES; $i++) {
5227 my $d = parse_hostpci($conf->{"hostpci$i"});
5229 my $pcidevices = $d->{pciid};
5230 foreach my $pcidevice (@$pcidevices) {
5231 my $pciid = $pcidevice->{id};
5233 my $info = PVE::SysFSTools::pci_device_info("$pciid");
5234 die "IOMMU not present\n" if !PVE::SysFSTools::check_iommu_support();
5235 die "no pci device info for device '$pciid'\n" if !$info;
5238 my $uuid = PVE::SysFSTools::generate_mdev_uuid($vmid, $i);
5239 PVE::SysFSTools::pci_create_mdev_device($pciid, $uuid, $d->{mdev});
5241 die "can't unbind
/bind PCI group to VFIO
'$pciid'\n"
5242 if !PVE::SysFSTools::pci_dev_group_bind_to_vfio($pciid);
5243 die "can
't reset PCI device '$pciid'\n"
5244 if $info->{has_fl_reset} && !PVE::SysFSTools::pci_dev_reset($info);
5249 PVE::Storage::activate_volumes($storecfg, $vollist);
5252 run_command(['/bin/systemctl
', 'stop
', "$vmid.scope"],
5253 outfunc => sub {}, errfunc => sub {});
5255 # Issues with the above 'stop
' not being fully completed are extremely rare, a very low
5256 # timeout should be more than enough here...
5257 PVE::Systemd::wait_for_unit_removed("$vmid.scope", 5);
5259 my $cpuunits = defined($conf->{cpuunits}) ? $conf->{cpuunits}
5260 : $defaults->{cpuunits};
5262 my $start_timeout = $params->{timeout} // config_aware_timeout($conf, $resume);
5264 timeout => $statefile ? undef : $start_timeout,
5269 # when migrating, prefix QEMU output so other side can pick up any
5270 # errors that might occur and show the user
5271 if ($migratedfrom) {
5272 $run_params{quiet} = 1;
5273 $run_params{logfunc} = sub { print "QEMU: $_[0]\n" };
5277 Slice => 'qemu
.slice
',
5281 if (PVE::CGroup::cgroup_mode() == 2) {
5282 $properties{CPUWeight} = $cpuunits;
5284 $properties{CPUShares} = $cpuunits;
5287 if (my $cpulimit = $conf->{cpulimit}) {
5288 $properties{CPUQuota} = int($cpulimit * 100);
5290 $properties{timeout} = 10 if $statefile; # setting up the scope shoul be quick
5292 my $run_qemu = sub {
5293 PVE::Tools::run_fork sub {
5294 PVE::Systemd::enter_systemd_scope($vmid, "Proxmox VE VM $vmid", %properties);
5296 my $exitcode = run_command($cmd, %run_params);
5297 die "QEMU exited with code $exitcode\n" if $exitcode;
5301 if ($conf->{hugepages}) {
5304 my $hugepages_topology = PVE::QemuServer::Memory::hugepages_topology($conf);
5305 my $hugepages_host_topology = PVE::QemuServer::Memory::hugepages_host_topology();
5307 PVE::QemuServer::Memory::hugepages_mount();
5308 PVE::QemuServer::Memory::hugepages_allocate($hugepages_topology, $hugepages_host_topology);
5310 eval { $run_qemu->() };
5312 PVE::QemuServer::Memory::hugepages_reset($hugepages_host_topology)
5313 if !$conf->{keephugepages};
5317 PVE::QemuServer::Memory::hugepages_pre_deallocate($hugepages_topology)
5318 if !$conf->{keephugepages};
5320 eval { PVE::QemuServer::Memory::hugepages_update_locked($code); };
5323 eval { $run_qemu->() };
5327 # deactivate volumes if start fails
5328 eval { PVE::Storage::deactivate_volumes($storecfg, $vollist); };
5329 die "start failed: $err";
5332 print "migration listens on $migrate_uri\n" if $migrate_uri;
5333 $res->{migrate_uri} = $migrate_uri;
5335 if ($statefile && $statefile ne 'tcp
' && $statefile ne 'unix
') {
5336 eval { mon_cmd($vmid, "cont"); };
5340 #start nbd server for storage migration
5341 if (my $nbd = $migrate_opts->{nbd}) {
5342 my $nbd_protocol_version = $migrate_opts->{nbd_proto_version} // 0;
5344 my $migrate_storage_uri;
5345 # nbd_protocol_version > 0 for unix socket support
5346 if ($nbd_protocol_version > 0 && $migration_type eq 'secure
') {
5347 my $socket_path = "/run/qemu-server/$vmid\_nbd.migrate";
5348 mon_cmd($vmid, "nbd-server-start", addr => { type => 'unix
', data => { path => $socket_path } } );
5349 $migrate_storage_uri = "nbd:unix:$socket_path";
5351 my $nodename = nodename();
5352 my $localip = $get_migration_ip->($nodename);
5353 my $pfamily = PVE::Tools::get_host_address_family($nodename);
5354 my $storage_migrate_port = PVE::Tools::next_migrate_port($pfamily);
5356 mon_cmd($vmid, "nbd-server-start", addr => {
5359 host => "${localip}",
5360 port => "${storage_migrate_port}",
5363 $localip = "[$localip]" if Net::IP::ip_is_ipv6($localip);
5364 $migrate_storage_uri = "nbd:${localip}:${storage_migrate_port}";
5367 $res->{migrate_storage_uri} = $migrate_storage_uri;
5369 foreach my $opt (sort keys %$nbd) {
5370 my $drivestr = $nbd->{$opt}->{drivestr};
5371 my $volid = $nbd->{$opt}->{volid};
5372 mon_cmd($vmid, "nbd-server-add", device => "drive-$opt", writable => JSON::true );
5373 my $nbd_uri = "$migrate_storage_uri:exportname=drive-$opt";
5374 print "storage migration listens on $nbd_uri volume:$drivestr\n";
5375 print "re-using replicated volume: $opt - $volid\n"
5376 if $nbd->{$opt}->{replicated};
5378 $res->{drives}->{$opt} = $nbd->{$opt};
5379 $res->{drives}->{$opt}->{nbd_uri} = $nbd_uri;
5383 if ($migratedfrom) {
5385 set_migration_caps($vmid);
5390 print "spice listens on port $spice_port\n";
5391 $res->{spice_port} = $spice_port;
5392 if ($migrate_opts->{spice_ticket}) {
5393 mon_cmd($vmid, "set_password", protocol => 'spice
', password =>
5394 $migrate_opts->{spice_ticket});
5395 mon_cmd($vmid, "expire_password", protocol => 'spice
', time => "+30");
5400 mon_cmd($vmid, "balloon", value => $conf->{balloon}*1024*1024)
5401 if !$statefile && $conf->{balloon};
5403 foreach my $opt (keys %$conf) {
5404 next if $opt !~ m/^net\d+$/;
5405 my $nicconf = parse_net($conf->{$opt});
5406 qemu_set_link_status($vmid, $opt, 0) if $nicconf->{link_down};
5410 mon_cmd($vmid, 'qom-set
',
5411 path => "machine/peripheral/balloon0",
5412 property => "guest-stats-polling-interval",
5413 value => 2) if (!defined($conf->{balloon}) || $conf->{balloon});
5416 print "Resumed VM, removing state\n";
5417 if (my $vmstate = $conf->{vmstate}) {
5418 PVE::Storage::deactivate_volumes($storecfg, [$vmstate]);
5419 PVE::Storage::vdisk_free($storecfg, $vmstate);
5421 delete $conf->@{qw(lock vmstate runningmachine runningcpu)};
5422 PVE
::QemuConfig-
>write_config($vmid, $conf);
5425 PVE
::GuestHelpers
::exec_hookscript
($conf, $vmid, 'post-start');
5430 sub vm_commandline
{
5431 my ($storecfg, $vmid, $snapname) = @_;
5433 my $conf = PVE
::QemuConfig-
>load_config($vmid);
5438 my $snapshot = $conf->{snapshots
}->{$snapname};
5439 die "snapshot '$snapname' does not exist\n" if !defined($snapshot);
5441 # check for machine or CPU overrides in snapshot
5442 $forcemachine = $snapshot->{runningmachine
};
5443 $forcecpu = $snapshot->{runningcpu
};
5445 $snapshot->{digest
} = $conf->{digest
}; # keep file digest for API
5450 my $defaults = load_defaults
();
5452 my $cmd = config_to_command
($storecfg, $vmid, $conf, $defaults,
5453 $forcemachine, $forcecpu);
5455 return PVE
::Tools
::cmd2string
($cmd);
5459 my ($vmid, $skiplock) = @_;
5461 PVE
::QemuConfig-
>lock_config($vmid, sub {
5463 my $conf = PVE
::QemuConfig-
>load_config($vmid);
5465 PVE
::QemuConfig-
>check_lock($conf) if !$skiplock;
5467 mon_cmd
($vmid, "system_reset");
5471 sub get_vm_volumes
{
5475 foreach_volid
($conf, sub {
5476 my ($volid, $attr) = @_;
5478 return if $volid =~ m
|^/|;
5480 my ($sid, $volname) = PVE
::Storage
::parse_volume_id
($volid, 1);
5483 push @$vollist, $volid;
5489 sub vm_stop_cleanup
{
5490 my ($storecfg, $vmid, $conf, $keepActive, $apply_pending_changes) = @_;
5495 my $vollist = get_vm_volumes
($conf);
5496 PVE
::Storage
::deactivate_volumes
($storecfg, $vollist);
5499 foreach my $ext (qw(mon qmp pid vnc qga)) {
5500 unlink "/var/run/qemu-server/${vmid}.$ext";
5503 if ($conf->{ivshmem
}) {
5504 my $ivshmem = parse_property_string
($ivshmem_fmt, $conf->{ivshmem
});
5505 # just delete it for now, VMs which have this already open do not
5506 # are affected, but new VMs will get a separated one. If this
5507 # becomes an issue we either add some sort of ref-counting or just
5508 # add a "don't delete on stop" flag to the ivshmem format.
5509 unlink '/dev/shm/pve-shm-' . ($ivshmem->{name
} // $vmid);
5512 foreach my $key (keys %$conf) {
5513 next if $key !~ m/^hostpci(\d+)$/;
5514 my $hostpciindex = $1;
5515 my $d = parse_hostpci
($conf->{$key});
5516 my $uuid = PVE
::SysFSTools
::generate_mdev_uuid
($vmid, $hostpciindex);
5518 foreach my $pci (@{$d->{pciid
}}) {
5519 my $pciid = $pci->{id
};
5520 PVE
::SysFSTools
::pci_cleanup_mdev_device
($pciid, $uuid);
5524 vmconfig_apply_pending
($vmid, $conf, $storecfg) if $apply_pending_changes;
5526 warn $@ if $@; # avoid errors - just warn
5529 # call only in locked context
5531 my ($storecfg, $vmid, $skiplock, $nocheck, $timeout, $shutdown, $force, $keepActive) = @_;
5533 my $pid = check_running
($vmid, $nocheck);
5538 $conf = PVE
::QemuConfig-
>load_config($vmid);
5539 PVE
::QemuConfig-
>check_lock($conf) if !$skiplock;
5540 if (!defined($timeout) && $shutdown && $conf->{startup
}) {
5541 my $opts = PVE
::JSONSchema
::pve_parse_startup_order
($conf->{startup
});
5542 $timeout = $opts->{down
} if $opts->{down
};
5544 PVE
::GuestHelpers
::exec_hookscript
($conf, $vmid, 'pre-stop');
5549 if (defined($conf) && get_qga_key
($conf, 'enabled')) {
5550 mon_cmd
($vmid, "guest-shutdown", timeout
=> $timeout);
5552 mon_cmd
($vmid, "system_powerdown");
5555 mon_cmd
($vmid, "quit");
5561 $timeout = 60 if !defined($timeout);
5564 while (($count < $timeout) && check_running
($vmid, $nocheck)) {
5569 if ($count >= $timeout) {
5571 warn "VM still running - terminating now with SIGTERM\n";
5574 die "VM quit/powerdown failed - got timeout\n";
5577 vm_stop_cleanup
($storecfg, $vmid, $conf, $keepActive, 1) if $conf;
5581 if (!check_running
($vmid, $nocheck)) {
5582 warn "Unexpected: VM shutdown command failed, but VM not running anymore..\n";
5586 warn "VM quit/powerdown failed - terminating now with SIGTERM\n";
5589 die "VM quit/powerdown failed\n";
5597 while (($count < $timeout) && check_running
($vmid, $nocheck)) {
5602 if ($count >= $timeout) {
5603 warn "VM still running - terminating now with SIGKILL\n";
5608 vm_stop_cleanup
($storecfg, $vmid, $conf, $keepActive, 1) if $conf;
5611 # Note: use $nocheck to skip tests if VM configuration file exists.
5612 # We need that when migration VMs to other nodes (files already moved)
5613 # Note: we set $keepActive in vzdump stop mode - volumes need to stay active
5615 my ($storecfg, $vmid, $skiplock, $nocheck, $timeout, $shutdown, $force, $keepActive, $migratedfrom) = @_;
5617 $force = 1 if !defined($force) && !$shutdown;
5620 my $pid = check_running
($vmid, $nocheck, $migratedfrom);
5621 kill 15, $pid if $pid;
5622 my $conf = PVE
::QemuConfig-
>load_config($vmid, $migratedfrom);
5623 vm_stop_cleanup
($storecfg, $vmid, $conf, $keepActive, 0);
5627 PVE
::QemuConfig-
>lock_config($vmid, sub {
5628 _do_vm_stop
($storecfg, $vmid, $skiplock, $nocheck, $timeout, $shutdown, $force, $keepActive);
5633 my ($vmid, $timeout) = @_;
5635 PVE
::QemuConfig-
>lock_config($vmid, sub {
5638 # only reboot if running, as qmeventd starts it again on a stop event
5639 return if !check_running
($vmid);
5641 create_reboot_request
($vmid);
5643 my $storecfg = PVE
::Storage
::config
();
5644 _do_vm_stop
($storecfg, $vmid, undef, undef, $timeout, 1);
5648 # avoid that the next normal shutdown will be confused for a reboot
5649 clear_reboot_request
($vmid);
5655 # note: if using the statestorage parameter, the caller has to check privileges
5657 my ($vmid, $skiplock, $includestate, $statestorage) = @_;
5664 PVE
::QemuConfig-
>lock_config($vmid, sub {
5666 $conf = PVE
::QemuConfig-
>load_config($vmid);
5668 my $is_backing_up = PVE
::QemuConfig-
>has_lock($conf, 'backup');
5669 PVE
::QemuConfig-
>check_lock($conf)
5670 if !($skiplock || $is_backing_up);
5672 die "cannot suspend to disk during backup\n"
5673 if $is_backing_up && $includestate;
5675 if ($includestate) {
5676 $conf->{lock} = 'suspending';
5677 my $date = strftime
("%Y-%m-%d", localtime(time()));
5678 $storecfg = PVE
::Storage
::config
();
5679 if (!$statestorage) {
5680 $statestorage = find_vmstate_storage
($conf, $storecfg);
5681 # check permissions for the storage
5682 my $rpcenv = PVE
::RPCEnvironment
::get
();
5683 if ($rpcenv->{type
} ne 'cli') {
5684 my $authuser = $rpcenv->get_user();
5685 $rpcenv->check($authuser, "/storage/$statestorage", ['Datastore.AllocateSpace']);
5690 $vmstate = PVE
::QemuConfig-
>__snapshot_save_vmstate(
5691 $vmid, $conf, "suspend-$date", $storecfg, $statestorage, 1);
5692 $path = PVE
::Storage
::path
($storecfg, $vmstate);
5693 PVE
::QemuConfig-
>write_config($vmid, $conf);
5695 mon_cmd
($vmid, "stop");
5699 if ($includestate) {
5701 PVE
::Storage
::activate_volumes
($storecfg, [$vmstate]);
5704 set_migration_caps
($vmid, 1);
5705 mon_cmd
($vmid, "savevm-start", statefile
=> $path);
5707 my $state = mon_cmd
($vmid, "query-savevm");
5708 if (!$state->{status
}) {
5709 die "savevm not active\n";
5710 } elsif ($state->{status
} eq 'active') {
5713 } elsif ($state->{status
} eq 'completed') {
5714 print "State saved, quitting\n";
5716 } elsif ($state->{status
} eq 'failed' && $state->{error
}) {
5717 die "query-savevm failed with error '$state->{error}'\n"
5719 die "query-savevm returned status '$state->{status}'\n";
5725 PVE
::QemuConfig-
>lock_config($vmid, sub {
5726 $conf = PVE
::QemuConfig-
>load_config($vmid);
5728 # cleanup, but leave suspending lock, to indicate something went wrong
5730 mon_cmd
($vmid, "savevm-end");
5731 PVE
::Storage
::deactivate_volumes
($storecfg, [$vmstate]);
5732 PVE
::Storage
::vdisk_free
($storecfg, $vmstate);
5733 delete $conf->@{qw(vmstate runningmachine runningcpu)};
5734 PVE
::QemuConfig-
>write_config($vmid, $conf);
5740 die "lock changed unexpectedly\n"
5741 if !PVE
::QemuConfig-
>has_lock($conf, 'suspending');
5743 mon_cmd
($vmid, "quit");
5744 $conf->{lock} = 'suspended';
5745 PVE
::QemuConfig-
>write_config($vmid, $conf);
5751 my ($vmid, $skiplock, $nocheck) = @_;
5753 PVE
::QemuConfig-
>lock_config($vmid, sub {
5754 my $res = mon_cmd
($vmid, 'query-status');
5755 my $resume_cmd = 'cont';
5758 if ($res->{status
}) {
5759 return if $res->{status
} eq 'running'; # job done, go home
5760 $resume_cmd = 'system_wakeup' if $res->{status
} eq 'suspended';
5761 $reset = 1 if $res->{status
} eq 'shutdown';
5766 my $conf = PVE
::QemuConfig-
>load_config($vmid);
5768 PVE
::QemuConfig-
>check_lock($conf)
5769 if !($skiplock || PVE
::QemuConfig-
>has_lock($conf, 'backup'));
5773 # required if a VM shuts down during a backup and we get a resume
5774 # request before the backup finishes for example
5775 mon_cmd
($vmid, "system_reset");
5777 mon_cmd
($vmid, $resume_cmd);
5782 my ($vmid, $skiplock, $key) = @_;
5784 PVE
::QemuConfig-
>lock_config($vmid, sub {
5786 my $conf = PVE
::QemuConfig-
>load_config($vmid);
5788 # there is no qmp command, so we use the human monitor command
5789 my $res = PVE
::QemuServer
::Monitor
::hmp_cmd
($vmid, "sendkey $key");
5790 die $res if $res ne '';
5794 # vzdump restore implementaion
5796 sub tar_archive_read_firstfile
{
5797 my $archive = shift;
5799 die "ERROR: file '$archive' does not exist\n" if ! -f
$archive;
5801 # try to detect archive type first
5802 my $pid = open (my $fh, '-|', 'tar', 'tf', $archive) ||
5803 die "unable to open file '$archive'\n";
5804 my $firstfile = <$fh>;
5808 die "ERROR: archive contaions no data\n" if !$firstfile;
5814 sub tar_restore_cleanup
{
5815 my ($storecfg, $statfile) = @_;
5817 print STDERR
"starting cleanup\n";
5819 if (my $fd = IO
::File-
>new($statfile, "r")) {
5820 while (defined(my $line = <$fd>)) {
5821 if ($line =~ m/vzdump:([^\s:]*):(\S+)$/) {
5824 if ($volid =~ m
|^/|) {
5825 unlink $volid || die 'unlink failed\n';
5827 PVE
::Storage
::vdisk_free
($storecfg, $volid);
5829 print STDERR
"temporary volume '$volid' sucessfuly removed\n";
5831 print STDERR
"unable to cleanup '$volid' - $@" if $@;
5833 print STDERR
"unable to parse line in statfile - $line";
5840 sub restore_file_archive
{
5841 my ($archive, $vmid, $user, $opts) = @_;
5843 return restore_vma_archive
($archive, $vmid, $user, $opts)
5846 my $info = PVE
::Storage
::archive_info
($archive);
5847 my $format = $opts->{format
} // $info->{format
};
5848 my $comp = $info->{compression
};
5850 # try to detect archive format
5851 if ($format eq 'tar') {
5852 return restore_tar_archive
($archive, $vmid, $user, $opts);
5854 return restore_vma_archive
($archive, $vmid, $user, $opts, $comp);
5858 # hepler to remove disks that will not be used after restore
5859 my $restore_cleanup_oldconf = sub {
5860 my ($storecfg, $vmid, $oldconf, $virtdev_hash) = @_;
5862 PVE
::QemuConfig-
>foreach_volume($oldconf, sub {
5863 my ($ds, $drive) = @_;
5865 return if drive_is_cdrom
($drive, 1);
5867 my $volid = $drive->{file
};
5868 return if !$volid || $volid =~ m
|^/|;
5870 my ($path, $owner) = PVE
::Storage
::path
($storecfg, $volid);
5871 return if !$path || !$owner || ($owner != $vmid);
5873 # Note: only delete disk we want to restore
5874 # other volumes will become unused
5875 if ($virtdev_hash->{$ds}) {
5876 eval { PVE
::Storage
::vdisk_free
($storecfg, $volid); };
5883 # delete vmstate files, after the restore we have no snapshots anymore
5884 foreach my $snapname (keys %{$oldconf->{snapshots
}}) {
5885 my $snap = $oldconf->{snapshots
}->{$snapname};
5886 if ($snap->{vmstate
}) {
5887 eval { PVE
::Storage
::vdisk_free
($storecfg, $snap->{vmstate
}); };
5895 # Helper to parse vzdump backup device hints
5897 # $rpcenv: Environment, used to ckeck storage permissions
5898 # $user: User ID, to check storage permissions
5899 # $storecfg: Storage configuration
5900 # $fh: the file handle for reading the configuration
5901 # $devinfo: should contain device sizes for all backu-up'ed devices
5902 # $options: backup options (pool, default storage)
5904 # Return: $virtdev_hash, updates $devinfo (add devname, virtdev, format, storeid)
5905 my $parse_backup_hints = sub {
5906 my ($rpcenv, $user, $storecfg, $fh, $devinfo, $options) = @_;
5908 my $virtdev_hash = {};
5910 while (defined(my $line = <$fh>)) {
5911 if ($line =~ m/^\#qmdump\#map:(\S+):(\S+):(\S*):(\S*):$/) {
5912 my ($virtdev, $devname, $storeid, $format) = ($1, $2, $3, $4);
5913 die "archive does not contain data for drive '$virtdev'\n"
5914 if !$devinfo->{$devname};
5916 if (defined($options->{storage
})) {
5917 $storeid = $options->{storage
} || 'local';
5918 } elsif (!$storeid) {
5921 $format = 'raw' if !$format;
5922 $devinfo->{$devname}->{devname
} = $devname;
5923 $devinfo->{$devname}->{virtdev
} = $virtdev;
5924 $devinfo->{$devname}->{format
} = $format;
5925 $devinfo->{$devname}->{storeid
} = $storeid;
5927 # check permission on storage
5928 my $pool = $options->{pool
}; # todo: do we need that?
5929 if ($user ne 'root@pam') {
5930 $rpcenv->check($user, "/storage/$storeid", ['Datastore.AllocateSpace']);
5933 $virtdev_hash->{$virtdev} = $devinfo->{$devname};
5934 } elsif ($line =~ m/^((?:ide|sata|scsi)\d+):\s*(.*)\s*$/) {
5936 my $drive = parse_drive
($virtdev, $2);
5937 if (drive_is_cloudinit
($drive)) {
5938 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($drive->{file
});
5939 $storeid = $options->{storage
} if defined ($options->{storage
});
5940 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
5941 my $format = qemu_img_format
($scfg, $volname); # has 'raw' fallback
5943 $virtdev_hash->{$virtdev} = {
5945 storeid
=> $storeid,
5946 size
=> PVE
::QemuServer
::Cloudinit
::CLOUDINIT_DISK_SIZE
,
5953 return $virtdev_hash;
5956 # Helper to allocate and activate all volumes required for a restore
5958 # $storecfg: Storage configuration
5959 # $virtdev_hash: as returned by parse_backup_hints()
5961 # Returns: { $virtdev => $volid }
5962 my $restore_allocate_devices = sub {
5963 my ($storecfg, $virtdev_hash, $vmid) = @_;
5966 foreach my $virtdev (sort keys %$virtdev_hash) {
5967 my $d = $virtdev_hash->{$virtdev};
5968 my $alloc_size = int(($d->{size
} + 1024 - 1)/1024);
5969 my $storeid = $d->{storeid
};
5970 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
5972 # test if requested format is supported
5973 my ($defFormat, $validFormats) = PVE
::Storage
::storage_default_format
($storecfg, $storeid);
5974 my $supported = grep { $_ eq $d->{format
} } @$validFormats;
5975 $d->{format
} = $defFormat if !$supported;
5978 if ($d->{is_cloudinit
}) {
5979 $name = "vm-$vmid-cloudinit";
5980 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
5981 if ($scfg->{path
}) {
5982 $name .= ".$d->{format}";
5986 my $volid = PVE
::Storage
::vdisk_alloc
(
5987 $storecfg, $storeid, $vmid, $d->{format
}, $name, $alloc_size);
5989 print STDERR
"new volume ID is '$volid'\n";
5990 $d->{volid
} = $volid;
5992 PVE
::Storage
::activate_volumes
($storecfg, [$volid]);
5994 $map->{$virtdev} = $volid;
6000 sub restore_update_config_line
{
6001 my ($cookie, $map, $line, $unique) = @_;
6003 return '' if $line =~ m/^\#qmdump\#/;
6004 return '' if $line =~ m/^\#vzdump\#/;
6005 return '' if $line =~ m/^lock:/;
6006 return '' if $line =~ m/^unused\d+:/;
6007 return '' if $line =~ m/^parent:/;
6011 my $dc = PVE
::Cluster
::cfs_read_file
('datacenter.cfg');
6012 if (($line =~ m/^(vlan(\d+)):\s*(\S+)\s*$/)) {
6013 # try to convert old 1.X settings
6014 my ($id, $ind, $ethcfg) = ($1, $2, $3);
6015 foreach my $devconfig (PVE
::Tools
::split_list
($ethcfg)) {
6016 my ($model, $macaddr) = split(/\=/, $devconfig);
6017 $macaddr = PVE
::Tools
::random_ether_addr
($dc->{mac_prefix
}) if !$macaddr || $unique;
6020 bridge
=> "vmbr$ind",
6021 macaddr
=> $macaddr,
6023 my $netstr = print_net
($net);
6025 $res .= "net$cookie->{netcount}: $netstr\n";
6026 $cookie->{netcount
}++;
6028 } elsif (($line =~ m/^(net\d+):\s*(\S+)\s*$/) && $unique) {
6029 my ($id, $netstr) = ($1, $2);
6030 my $net = parse_net
($netstr);
6031 $net->{macaddr
} = PVE
::Tools
::random_ether_addr
($dc->{mac_prefix
}) if $net->{macaddr
};
6032 $netstr = print_net
($net);
6033 $res .= "$id: $netstr\n";
6034 } elsif ($line =~ m/^((ide|scsi|virtio|sata|efidisk)\d+):\s*(\S+)\s*$/) {
6037 my $di = parse_drive
($virtdev, $value);
6038 if (defined($di->{backup
}) && !$di->{backup
}) {
6040 } elsif ($map->{$virtdev}) {
6041 delete $di->{format
}; # format can change on restore
6042 $di->{file
} = $map->{$virtdev};
6043 $value = print_drive
($di);
6044 $res .= "$virtdev: $value\n";
6048 } elsif (($line =~ m/^vmgenid: (.*)/)) {
6050 if ($vmgenid ne '0') {
6051 # always generate a new vmgenid if there was a valid one setup
6052 $vmgenid = generate_uuid
();
6054 $res .= "vmgenid: $vmgenid\n";
6055 } elsif (($line =~ m/^(smbios1: )(.*)/) && $unique) {
6056 my ($uuid, $uuid_str);
6057 UUID
::generate
($uuid);
6058 UUID
::unparse
($uuid, $uuid_str);
6059 my $smbios1 = parse_smbios1
($2);
6060 $smbios1->{uuid
} = $uuid_str;
6061 $res .= $1.print_smbios1
($smbios1)."\n";
6069 my $restore_deactivate_volumes = sub {
6070 my ($storecfg, $devinfo) = @_;
6073 foreach my $devname (keys %$devinfo) {
6074 my $volid = $devinfo->{$devname}->{volid
};
6075 push @$vollist, $volid if $volid;
6078 PVE
::Storage
::deactivate_volumes
($storecfg, $vollist);
6081 my $restore_destroy_volumes = sub {
6082 my ($storecfg, $devinfo) = @_;
6084 foreach my $devname (keys %$devinfo) {
6085 my $volid = $devinfo->{$devname}->{volid
};
6088 if ($volid =~ m
|^/|) {
6089 unlink $volid || die 'unlink failed\n';
6091 PVE
::Storage
::vdisk_free
($storecfg, $volid);
6093 print STDERR
"temporary volume '$volid' sucessfuly removed\n";
6095 print STDERR
"unable to cleanup '$volid' - $@" if $@;
6100 my ($cfg, $vmid) = @_;
6102 my $info = PVE
::Storage
::vdisk_list
($cfg, undef, $vmid, undef, 'images');
6104 my $volid_hash = {};
6105 foreach my $storeid (keys %$info) {
6106 foreach my $item (@{$info->{$storeid}}) {
6107 next if !($item->{volid
} && $item->{size
});
6108 $item->{path
} = PVE
::Storage
::path
($cfg, $item->{volid
});
6109 $volid_hash->{$item->{volid
}} = $item;
6116 sub update_disk_config
{
6117 my ($vmid, $conf, $volid_hash) = @_;
6120 my $prefix = "VM $vmid";
6122 # used and unused disks
6123 my $referenced = {};
6125 # Note: it is allowed to define multiple storages with same path (alias), so
6126 # we need to check both 'volid' and real 'path' (two different volid can point
6127 # to the same path).
6129 my $referencedpath = {};
6132 PVE
::QemuConfig-
>foreach_volume($conf, sub {
6133 my ($opt, $drive) = @_;
6135 my $volid = $drive->{file
};
6137 my $volume = $volid_hash->{$volid};
6139 # mark volid as "in-use" for next step
6140 $referenced->{$volid} = 1;
6141 if ($volume && (my $path = $volume->{path
})) {
6142 $referencedpath->{$path} = 1;
6145 return if drive_is_cdrom
($drive);
6148 my ($updated, $msg) = PVE
::QemuServer
::Drive
::update_disksize
($drive, $volume->{size
});
6149 if (defined($updated)) {
6151 $conf->{$opt} = print_drive
($updated);
6152 print "$prefix ($opt): $msg\n";
6156 # remove 'unusedX' entry if volume is used
6157 PVE
::QemuConfig-
>foreach_unused_volume($conf, sub {
6158 my ($opt, $drive) = @_;
6160 my $volid = $drive->{file
};
6164 $path = $volid_hash->{$volid}->{path
} if $volid_hash->{$volid};
6165 if ($referenced->{$volid} || ($path && $referencedpath->{$path})) {
6166 print "$prefix remove entry '$opt', its volume '$volid' is in use\n";
6168 delete $conf->{$opt};
6171 $referenced->{$volid} = 1;
6172 $referencedpath->{$path} = 1 if $path;
6175 foreach my $volid (sort keys %$volid_hash) {
6176 next if $volid =~ m/vm-$vmid-state-/;
6177 next if $referenced->{$volid};
6178 my $path = $volid_hash->{$volid}->{path
};
6179 next if !$path; # just to be sure
6180 next if $referencedpath->{$path};
6182 my $key = PVE
::QemuConfig-
>add_unused_volume($conf, $volid);
6183 print "$prefix add unreferenced volume '$volid' as '$key' to config\n";
6184 $referencedpath->{$path} = 1; # avoid to add more than once (aliases)
6191 my ($vmid, $nolock, $dryrun) = @_;
6193 my $cfg = PVE
::Storage
::config
();
6195 print "rescan volumes...\n";
6196 my $volid_hash = scan_volids
($cfg, $vmid);
6198 my $updatefn = sub {
6201 my $conf = PVE
::QemuConfig-
>load_config($vmid);
6203 PVE
::QemuConfig-
>check_lock($conf);
6206 foreach my $volid (keys %$volid_hash) {
6207 my $info = $volid_hash->{$volid};
6208 $vm_volids->{$volid} = $info if $info->{vmid
} && $info->{vmid
} == $vmid;
6211 my $changes = update_disk_config
($vmid, $conf, $vm_volids);
6213 PVE
::QemuConfig-
>write_config($vmid, $conf) if $changes && !$dryrun;
6216 if (defined($vmid)) {
6220 PVE
::QemuConfig-
>lock_config($vmid, $updatefn, $vmid);
6223 my $vmlist = config_list
();
6224 foreach my $vmid (keys %$vmlist) {
6228 PVE
::QemuConfig-
>lock_config($vmid, $updatefn, $vmid);
6234 sub restore_proxmox_backup_archive
{
6235 my ($archive, $vmid, $user, $options) = @_;
6237 my $storecfg = PVE
::Storage
::config
();
6239 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($archive);
6240 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
6242 my $fingerprint = $scfg->{fingerprint
};
6243 my $keyfile = PVE
::Storage
::PBSPlugin
::pbs_encryption_key_file_name
($storecfg, $storeid);
6245 my $repo = PVE
::PBSClient
::get_repository
($scfg);
6247 # This is only used for `pbs-restore` and the QEMU PBS driver (live-restore)
6248 my $password = PVE
::Storage
::PBSPlugin
::pbs_get_password
($scfg, $storeid);
6249 local $ENV{PBS_PASSWORD
} = $password;
6250 local $ENV{PBS_FINGERPRINT
} = $fingerprint if defined($fingerprint);
6252 my ($vtype, $pbs_backup_name, undef, undef, undef, undef, $format) =
6253 PVE
::Storage
::parse_volname
($storecfg, $archive);
6255 die "got unexpected vtype '$vtype'\n" if $vtype ne 'backup';
6257 die "got unexpected backup format '$format'\n" if $format ne 'pbs-vm';
6259 my $tmpdir = "/var/tmp/vzdumptmp$$";
6263 my $conffile = PVE
::QemuConfig-
>config_file($vmid);
6264 # disable interrupts (always do cleanups)
6268 local $SIG{HUP
} = sub { print STDERR
"got interrupt - ignored\n"; };
6270 # Note: $oldconf is undef if VM does not exists
6271 my $cfs_path = PVE
::QemuConfig-
>cfs_config_path($vmid);
6272 my $oldconf = PVE
::Cluster
::cfs_read_file
($cfs_path);
6273 my $new_conf_raw = '';
6275 my $rpcenv = PVE
::RPCEnvironment
::get
();
6284 local $SIG{PIPE
} = sub { die "interrupted by signal\n"; };
6286 my $cfgfn = "$tmpdir/qemu-server.conf";
6287 my $firewall_config_fn = "$tmpdir/fw.conf";
6288 my $index_fn = "$tmpdir/index.json";
6290 my $cmd = "restore";
6292 my $param = [$pbs_backup_name, "index.json", $index_fn];
6293 PVE
::Storage
::PBSPlugin
::run_raw_client_cmd
($scfg, $storeid, $cmd, $param);
6294 my $index = PVE
::Tools
::file_get_contents
($index_fn);
6295 $index = decode_json
($index);
6297 # print Dumper($index);
6298 foreach my $info (@{$index->{files
}}) {
6299 if ($info->{filename
} =~ m/^(drive-\S+).img.fidx$/) {
6301 if ($info->{size
} =~ m/^(\d+)$/) { # untaint size
6302 $devinfo->{$devname}->{size
} = $1;
6304 die "unable to parse file size in 'index.json' - got '$info->{size}'\n";
6309 my $is_qemu_server_backup = scalar(
6310 grep { $_->{filename
} eq 'qemu-server.conf.blob' } @{$index->{files
}}
6312 if (!$is_qemu_server_backup) {
6313 die "backup does not look like a qemu-server backup (missing 'qemu-server.conf' file)\n";
6315 my $has_firewall_config = scalar(grep { $_->{filename
} eq 'fw.conf.blob' } @{$index->{files
}});
6317 $param = [$pbs_backup_name, "qemu-server.conf", $cfgfn];
6318 PVE
::Storage
::PBSPlugin
::run_raw_client_cmd
($scfg, $storeid, $cmd, $param);
6320 if ($has_firewall_config) {
6321 $param = [$pbs_backup_name, "fw.conf", $firewall_config_fn];
6322 PVE
::Storage
::PBSPlugin
::run_raw_client_cmd
($scfg, $storeid, $cmd, $param);
6324 my $pve_firewall_dir = '/etc/pve/firewall';
6325 mkdir $pve_firewall_dir; # make sure the dir exists
6326 PVE
::Tools
::file_copy
($firewall_config_fn, "${pve_firewall_dir}/$vmid.fw");
6329 my $fh = IO
::File-
>new($cfgfn, "r") ||
6330 die "unable to read qemu-server.conf - $!\n";
6332 my $virtdev_hash = $parse_backup_hints->($rpcenv, $user, $storecfg, $fh, $devinfo, $options);
6334 # fixme: rate limit?
6336 # create empty/temp config
6337 PVE
::Tools
::file_set_contents
($conffile, "memory: 128\nlock: create");
6339 $restore_cleanup_oldconf->($storecfg, $vmid, $oldconf, $virtdev_hash) if $oldconf;
6342 my $map = $restore_allocate_devices->($storecfg, $virtdev_hash, $vmid);
6344 if (!$options->{live
}) {
6345 foreach my $virtdev (sort keys %$virtdev_hash) {
6346 my $d = $virtdev_hash->{$virtdev};
6347 next if $d->{is_cloudinit
}; # no need to restore cloudinit
6349 my $volid = $d->{volid
};
6351 my $path = PVE
::Storage
::path
($storecfg, $volid);
6353 my $pbs_restore_cmd = [
6354 '/usr/bin/pbs-restore',
6355 '--repository', $repo,
6357 "$d->{devname}.img.fidx",
6362 push @$pbs_restore_cmd, '--format', $d->{format
} if $d->{format
};
6363 push @$pbs_restore_cmd, '--keyfile', $keyfile if -e
$keyfile;
6365 if (PVE
::Storage
::volume_has_feature
($storecfg, 'sparseinit', $volid)) {
6366 push @$pbs_restore_cmd, '--skip-zero';
6369 my $dbg_cmdstring = PVE
::Tools
::cmd2string
($pbs_restore_cmd);
6370 print "restore proxmox backup image: $dbg_cmdstring\n";
6371 run_command
($pbs_restore_cmd);
6375 $fh->seek(0, 0) || die "seek failed - $!\n";
6377 my $cookie = { netcount
=> 0 };
6378 while (defined(my $line = <$fh>)) {
6379 $new_conf_raw .= restore_update_config_line
(
6391 if ($err || !$options->{live
}) {
6392 $restore_deactivate_volumes->($storecfg, $devinfo);
6398 $restore_destroy_volumes->($storecfg, $devinfo);
6402 if ($options->{live
}) {
6403 # keep lock during live-restore
6404 $new_conf_raw .= "\nlock: create";
6407 PVE
::Tools
::file_set_contents
($conffile, $new_conf_raw);
6409 PVE
::Cluster
::cfs_update
(); # make sure we read new file
6411 eval { rescan
($vmid, 1); };
6414 PVE
::AccessControl
::add_vm_to_pool
($vmid, $options->{pool
}) if $options->{pool
};
6416 if ($options->{live
}) {
6422 local $SIG{PIPE
} = sub { die "got signal ($!) - abort\n"; };
6424 my $conf = PVE
::QemuConfig-
>load_config($vmid);
6425 die "cannot do live-restore for template\n" if PVE
::QemuConfig-
>is_template($conf);
6427 pbs_live_restore
($vmid, $conf, $storecfg, $devinfo, $repo, $keyfile, $pbs_backup_name);
6429 PVE
::QemuConfig-
>remove_lock($vmid, "create");
6433 sub pbs_live_restore
{
6434 my ($vmid, $conf, $storecfg, $restored_disks, $repo, $keyfile, $snap) = @_;
6436 print "starting VM for live-restore\n";
6437 print "repository: '$repo', snapshot: '$snap'\n";
6439 my $pbs_backing = {};
6440 for my $ds (keys %$restored_disks) {
6441 $ds =~ m/^drive-(.*)$/;
6443 $pbs_backing->{$confname} = {
6444 repository
=> $repo,
6446 archive
=> "$ds.img.fidx",
6448 $pbs_backing->{$confname}->{keyfile
} = $keyfile if -e
$keyfile;
6450 my $drive = parse_drive
($confname, $conf->{$confname});
6451 print "restoring '$ds' to '$drive->{file}'\n";
6454 my $drives_streamed = 0;
6456 # make sure HA doesn't interrupt our restore by stopping the VM
6457 if (PVE
::HA
::Config
::vm_is_ha_managed
($vmid)) {
6458 run_command
(['ha-manager', 'set', "vm:$vmid", '--state', 'started']);
6461 # start VM with backing chain pointing to PBS backup, environment vars for PBS driver
6462 # in QEMU (PBS_PASSWORD and PBS_FINGERPRINT) are already set by our caller
6463 vm_start_nolock
($storecfg, $vmid, $conf, {paused
=> 1, 'pbs-backing' => $pbs_backing}, {});
6465 my $qmeventd_fd = register_qmeventd_handle
($vmid);
6467 # begin streaming, i.e. data copy from PBS to target disk for every vol,
6468 # this will effectively collapse the backing image chain consisting of
6469 # [target <- alloc-track -> PBS snapshot] to just [target] (alloc-track
6470 # removes itself once all backing images vanish with 'auto-remove=on')
6472 for my $ds (sort keys %$restored_disks) {
6473 my $job_id = "restore-$ds";
6474 mon_cmd
($vmid, 'block-stream',
6475 'job-id' => $job_id,
6478 $jobs->{$job_id} = {};
6481 mon_cmd
($vmid, 'cont');
6482 qemu_drive_mirror_monitor
($vmid, undef, $jobs, 'auto', 0, 'stream');
6484 print "restore-drive jobs finished successfully, removing all tracking block devices"
6485 ." to disconnect from Proxmox Backup Server\n";
6487 for my $ds (sort keys %$restored_disks) {
6488 mon_cmd
($vmid, 'blockdev-del', 'node-name' => "$ds-pbs");
6491 close($qmeventd_fd);
6497 warn "An error occured during live-restore: $err\n";
6498 _do_vm_stop
($storecfg, $vmid, 1, 1, 10, 0, 1);
6499 die "live-restore failed\n";
6503 sub restore_vma_archive
{
6504 my ($archive, $vmid, $user, $opts, $comp) = @_;
6506 my $readfrom = $archive;
6508 my $cfg = PVE
::Storage
::config
();
6510 my $bwlimit = $opts->{bwlimit
};
6512 my $dbg_cmdstring = '';
6513 my $add_pipe = sub {
6515 push @$commands, $cmd;
6516 $dbg_cmdstring .= ' | ' if length($dbg_cmdstring);
6517 $dbg_cmdstring .= PVE
::Tools
::cmd2string
($cmd);
6522 if ($archive eq '-') {
6525 # If we use a backup from a PVE defined storage we also consider that
6526 # storage's rate limit:
6527 my (undef, $volid) = PVE
::Storage
::path_to_volume_id
($cfg, $archive);
6528 if (defined($volid)) {
6529 my ($sid, undef) = PVE
::Storage
::parse_volume_id
($volid);
6530 my $readlimit = PVE
::Storage
::get_bandwidth_limit
('restore', [$sid], $bwlimit);
6532 print STDERR
"applying read rate limit: $readlimit\n";
6533 my $cstream = ['cstream', '-t', $readlimit*1024, '--', $readfrom];
6534 $add_pipe->($cstream);
6540 my $info = PVE
::Storage
::decompressor_info
('vma', $comp);
6541 my $cmd = $info->{decompressor
};
6542 push @$cmd, $readfrom;
6546 my $tmpdir = "/var/tmp/vzdumptmp$$";
6549 # disable interrupts (always do cleanups)
6553 local $SIG{HUP
} = sub { warn "got interrupt - ignored\n"; };
6555 my $mapfifo = "/var/tmp/vzdumptmp$$.fifo";
6556 POSIX
::mkfifo
($mapfifo, 0600);
6558 my $openfifo = sub { open($fifofh, '>', $mapfifo) or die $! };
6560 $add_pipe->(['vma', 'extract', '-v', '-r', $mapfifo, $readfrom, $tmpdir]);
6567 my $rpcenv = PVE
::RPCEnvironment
::get
();
6569 my $conffile = PVE
::QemuConfig-
>config_file($vmid);
6571 # Note: $oldconf is undef if VM does not exist
6572 my $cfs_path = PVE
::QemuConfig-
>cfs_config_path($vmid);
6573 my $oldconf = PVE
::Cluster
::cfs_read_file
($cfs_path);
6574 my $new_conf_raw = '';
6578 my $print_devmap = sub {
6579 my $cfgfn = "$tmpdir/qemu-server.conf";
6581 # we can read the config - that is already extracted
6582 my $fh = IO
::File-
>new($cfgfn, "r") ||
6583 die "unable to read qemu-server.conf - $!\n";
6585 my $fwcfgfn = "$tmpdir/qemu-server.fw";
6587 my $pve_firewall_dir = '/etc/pve/firewall';
6588 mkdir $pve_firewall_dir; # make sure the dir exists
6589 PVE
::Tools
::file_copy
($fwcfgfn, "${pve_firewall_dir}/$vmid.fw");
6592 my $virtdev_hash = $parse_backup_hints->($rpcenv, $user, $cfg, $fh, $devinfo, $opts);
6594 foreach my $info (values %{$virtdev_hash}) {
6595 my $storeid = $info->{storeid
};
6596 next if defined($storage_limits{$storeid});
6598 my $limit = PVE
::Storage
::get_bandwidth_limit
('restore', [$storeid], $bwlimit) // 0;
6599 print STDERR
"rate limit for storage $storeid: $limit KiB/s\n" if $limit;
6600 $storage_limits{$storeid} = $limit * 1024;
6603 foreach my $devname (keys %$devinfo) {
6604 die "found no device mapping information for device '$devname'\n"
6605 if !$devinfo->{$devname}->{virtdev
};
6608 # create empty/temp config
6610 PVE
::Tools
::file_set_contents
($conffile, "memory: 128\n");
6611 $restore_cleanup_oldconf->($cfg, $vmid, $oldconf, $virtdev_hash);
6615 my $map = $restore_allocate_devices->($cfg, $virtdev_hash, $vmid);
6617 # print restore information to $fifofh
6618 foreach my $virtdev (sort keys %$virtdev_hash) {
6619 my $d = $virtdev_hash->{$virtdev};
6620 next if $d->{is_cloudinit
}; # no need to restore cloudinit
6622 my $storeid = $d->{storeid
};
6623 my $volid = $d->{volid
};
6626 if (my $limit = $storage_limits{$storeid}) {
6627 $map_opts .= "throttling.bps=$limit:throttling.group=$storeid:";
6630 my $write_zeros = 1;
6631 if (PVE
::Storage
::volume_has_feature
($cfg, 'sparseinit', $volid)) {
6635 my $path = PVE
::Storage
::path
($cfg, $volid);
6637 print $fifofh "${map_opts}format=$d->{format}:${write_zeros}:$d->{devname}=$path\n";
6639 print "map '$d->{devname}' to '$path' (write zeros = ${write_zeros})\n";
6642 $fh->seek(0, 0) || die "seek failed - $!\n";
6644 my $cookie = { netcount
=> 0 };
6645 while (defined(my $line = <$fh>)) {
6646 $new_conf_raw .= restore_update_config_line
(
6663 local $SIG{PIPE
} = sub { die "interrupted by signal\n"; };
6664 local $SIG{ALRM
} = sub { die "got timeout\n"; };
6666 $oldtimeout = alarm($timeout);
6673 if ($line =~ m/^DEV:\sdev_id=(\d+)\ssize:\s(\d+)\sdevname:\s(\S+)$/) {
6674 my ($dev_id, $size, $devname) = ($1, $2, $3);
6675 $devinfo->{$devname} = { size
=> $size, dev_id
=> $dev_id };
6676 } elsif ($line =~ m/^CTIME: /) {
6677 # we correctly received the vma config, so we can disable
6678 # the timeout now for disk allocation (set to 10 minutes, so
6679 # that we always timeout if something goes wrong)
6682 print $fifofh "done\n";
6683 my $tmp = $oldtimeout || 0;
6684 $oldtimeout = undef;
6691 print "restore vma archive: $dbg_cmdstring\n";
6692 run_command
($commands, input
=> $input, outfunc
=> $parser, afterfork
=> $openfifo);
6696 alarm($oldtimeout) if $oldtimeout;
6698 $restore_deactivate_volumes->($cfg, $devinfo);
6700 close($fifofh) if $fifofh;
6705 $restore_destroy_volumes->($cfg, $devinfo);
6709 PVE
::Tools
::file_set_contents
($conffile, $new_conf_raw);
6711 PVE
::Cluster
::cfs_update
(); # make sure we read new file
6713 eval { rescan
($vmid, 1); };
6716 PVE
::AccessControl
::add_vm_to_pool
($vmid, $opts->{pool
}) if $opts->{pool
};
6719 sub restore_tar_archive
{
6720 my ($archive, $vmid, $user, $opts) = @_;
6722 if ($archive ne '-') {
6723 my $firstfile = tar_archive_read_firstfile
($archive);
6724 die "ERROR: file '$archive' does not look like a QemuServer vzdump backup\n"
6725 if $firstfile ne 'qemu-server.conf';
6728 my $storecfg = PVE
::Storage
::config
();
6730 # avoid zombie disks when restoring over an existing VM -> cleanup first
6731 # pass keep_empty_config=1 to keep the config (thus VMID) reserved for us
6732 # skiplock=1 because qmrestore has set the 'create' lock itself already
6733 my $vmcfgfn = PVE
::QemuConfig-
>config_file($vmid);
6734 destroy_vm
($storecfg, $vmid, 1, { lock => 'restore' }) if -f
$vmcfgfn;
6736 my $tocmd = "/usr/lib/qemu-server/qmextract";
6738 $tocmd .= " --storage " . PVE
::Tools
::shellquote
($opts->{storage
}) if $opts->{storage
};
6739 $tocmd .= " --pool " . PVE
::Tools
::shellquote
($opts->{pool
}) if $opts->{pool
};
6740 $tocmd .= ' --prealloc' if $opts->{prealloc
};
6741 $tocmd .= ' --info' if $opts->{info
};
6743 # tar option "xf" does not autodetect compression when read from STDIN,
6744 # so we pipe to zcat
6745 my $cmd = "zcat -f|tar xf " . PVE
::Tools
::shellquote
($archive) . " " .
6746 PVE
::Tools
::shellquote
("--to-command=$tocmd");
6748 my $tmpdir = "/var/tmp/vzdumptmp$$";
6751 local $ENV{VZDUMP_TMPDIR
} = $tmpdir;
6752 local $ENV{VZDUMP_VMID
} = $vmid;
6753 local $ENV{VZDUMP_USER
} = $user;
6755 my $conffile = PVE
::QemuConfig-
>config_file($vmid);
6756 my $new_conf_raw = '';
6758 # disable interrupts (always do cleanups)
6762 local $SIG{HUP
} = sub { print STDERR
"got interrupt - ignored\n"; };
6770 local $SIG{PIPE
} = sub { die "interrupted by signal\n"; };
6772 if ($archive eq '-') {
6773 print "extracting archive from STDIN\n";
6774 run_command
($cmd, input
=> "<&STDIN");
6776 print "extracting archive '$archive'\n";
6780 return if $opts->{info
};
6784 my $statfile = "$tmpdir/qmrestore.stat";
6785 if (my $fd = IO
::File-
>new($statfile, "r")) {
6786 while (defined (my $line = <$fd>)) {
6787 if ($line =~ m/vzdump:([^\s:]*):(\S+)$/) {
6788 $map->{$1} = $2 if $1;
6790 print STDERR
"unable to parse line in statfile - $line\n";
6796 my $confsrc = "$tmpdir/qemu-server.conf";
6798 my $srcfd = IO
::File-
>new($confsrc, "r") || die "unable to open file '$confsrc'\n";
6800 my $cookie = { netcount
=> 0 };
6801 while (defined (my $line = <$srcfd>)) {
6802 $new_conf_raw .= restore_update_config_line
(
6813 tar_restore_cleanup
($storecfg, "$tmpdir/qmrestore.stat") if !$opts->{info
};
6819 PVE
::Tools
::file_set_contents
($conffile, $new_conf_raw);
6821 PVE
::Cluster
::cfs_update
(); # make sure we read new file
6823 eval { rescan
($vmid, 1); };
6827 sub foreach_storage_used_by_vm
{
6828 my ($conf, $func) = @_;
6832 PVE
::QemuConfig-
>foreach_volume($conf, sub {
6833 my ($ds, $drive) = @_;
6834 return if drive_is_cdrom
($drive);
6836 my $volid = $drive->{file
};
6838 my ($sid, $volname) = PVE
::Storage
::parse_volume_id
($volid, 1);
6839 $sidhash->{$sid} = $sid if $sid;
6842 foreach my $sid (sort keys %$sidhash) {
6847 my $qemu_snap_storage = {
6850 sub do_snapshots_with_qemu
{
6851 my ($storecfg, $volid) = @_;
6853 my $storage_name = PVE
::Storage
::parse_volume_id
($volid);
6854 my $scfg = $storecfg->{ids
}->{$storage_name};
6855 die "could not find storage '$storage_name'\n" if !defined($scfg);
6857 if ($qemu_snap_storage->{$scfg->{type
}} && !$scfg->{krbd
}){
6861 if ($volid =~ m/\.(qcow2|qed)$/){
6868 sub qga_check_running
{
6869 my ($vmid, $nowarn) = @_;
6871 eval { mon_cmd
($vmid, "guest-ping", timeout
=> 3); };
6873 warn "Qemu Guest Agent is not running - $@" if !$nowarn;
6879 sub template_create
{
6880 my ($vmid, $conf, $disk) = @_;
6882 my $storecfg = PVE
::Storage
::config
();
6884 PVE
::QemuConfig-
>foreach_volume($conf, sub {
6885 my ($ds, $drive) = @_;
6887 return if drive_is_cdrom
($drive);
6888 return if $disk && $ds ne $disk;
6890 my $volid = $drive->{file
};
6891 return if !PVE
::Storage
::volume_has_feature
($storecfg, 'template', $volid);
6893 my $voliddst = PVE
::Storage
::vdisk_create_base
($storecfg, $volid);
6894 $drive->{file
} = $voliddst;
6895 $conf->{$ds} = print_drive
($drive);
6896 PVE
::QemuConfig-
>write_config($vmid, $conf);
6900 sub convert_iscsi_path
{
6903 if ($path =~ m
|^iscsi
://([^/]+)/([^/]+)/(.+)$|) {
6908 my $initiator_name = get_initiator_name
();
6910 return "file.driver=iscsi,file.transport=tcp,file.initiator-name=$initiator_name,".
6911 "file.portal=$portal,file.target=$target,file.lun=$lun,driver=raw";
6914 die "cannot convert iscsi path '$path', unkown format\n";
6917 sub qemu_img_convert
{
6918 my ($src_volid, $dst_volid, $size, $snapname, $is_zero_initialized) = @_;
6920 my $storecfg = PVE
::Storage
::config
();
6921 my ($src_storeid, $src_volname) = PVE
::Storage
::parse_volume_id
($src_volid, 1);
6922 my ($dst_storeid, $dst_volname) = PVE
::Storage
::parse_volume_id
($dst_volid, 1);
6924 die "destination '$dst_volid' is not a valid volid form qemu-img convert\n" if !$dst_storeid;
6928 my $src_is_iscsi = 0;
6932 PVE
::Storage
::activate_volumes
($storecfg, [$src_volid], $snapname);
6933 my $src_scfg = PVE
::Storage
::storage_config
($storecfg, $src_storeid);
6934 $src_format = qemu_img_format
($src_scfg, $src_volname);
6935 $src_path = PVE
::Storage
::path
($storecfg, $src_volid, $snapname);
6936 $src_is_iscsi = ($src_path =~ m
|^iscsi
://|);
6937 $cachemode = 'none' if $src_scfg->{type
} eq 'zfspool';
6938 } elsif (-f
$src_volid) {
6939 $src_path = $src_volid;
6940 if ($src_path =~ m/\.($PVE::QemuServer::Drive::QEMU_FORMAT_RE)$/) {
6945 die "source '$src_volid' is not a valid volid nor path for qemu-img convert\n" if !$src_path;
6947 my $dst_scfg = PVE
::Storage
::storage_config
($storecfg, $dst_storeid);
6948 my $dst_format = qemu_img_format
($dst_scfg, $dst_volname);
6949 my $dst_path = PVE
::Storage
::path
($storecfg, $dst_volid);
6950 my $dst_is_iscsi = ($dst_path =~ m
|^iscsi
://|);
6953 push @$cmd, '/usr/bin/qemu-img', 'convert', '-p', '-n';
6954 push @$cmd, '-l', "snapshot.name=$snapname"
6955 if $snapname && $src_format && $src_format eq "qcow2";
6956 push @$cmd, '-t', 'none' if $dst_scfg->{type
} eq 'zfspool';
6957 push @$cmd, '-T', $cachemode if defined($cachemode);
6959 if ($src_is_iscsi) {
6960 push @$cmd, '--image-opts';
6961 $src_path = convert_iscsi_path
($src_path);
6962 } elsif ($src_format) {
6963 push @$cmd, '-f', $src_format;
6966 if ($dst_is_iscsi) {
6967 push @$cmd, '--target-image-opts';
6968 $dst_path = convert_iscsi_path
($dst_path);
6970 push @$cmd, '-O', $dst_format;
6973 push @$cmd, $src_path;
6975 if (!$dst_is_iscsi && $is_zero_initialized) {
6976 push @$cmd, "zeroinit:$dst_path";
6978 push @$cmd, $dst_path;
6983 if($line =~ m/\((\S+)\/100\
%\)/){
6985 my $transferred = int($size * $percent / 100);
6986 my $total_h = render_bytes
($size, 1);
6987 my $transferred_h = render_bytes
($transferred, 1);
6989 print "transferred $transferred_h of $total_h ($percent%)\n";
6994 eval { run_command
($cmd, timeout
=> undef, outfunc
=> $parser); };
6996 die "copy failed: $err" if $err;
6999 sub qemu_img_format
{
7000 my ($scfg, $volname) = @_;
7002 if ($scfg->{path
} && $volname =~ m/\.($PVE::QemuServer::Drive::QEMU_FORMAT_RE)$/) {
7009 sub qemu_drive_mirror
{
7010 my ($vmid, $drive, $dst_volid, $vmiddst, $is_zero_initialized, $jobs, $completion, $qga, $bwlimit, $src_bitmap) = @_;
7012 $jobs = {} if !$jobs;
7016 $jobs->{"drive-$drive"} = {};
7018 if ($dst_volid =~ /^nbd:/) {
7019 $qemu_target = $dst_volid;
7022 my $storecfg = PVE
::Storage
::config
();
7023 my ($dst_storeid, $dst_volname) = PVE
::Storage
::parse_volume_id
($dst_volid);
7025 my $dst_scfg = PVE
::Storage
::storage_config
($storecfg, $dst_storeid);
7027 $format = qemu_img_format
($dst_scfg, $dst_volname);
7029 my $dst_path = PVE
::Storage
::path
($storecfg, $dst_volid);
7031 $qemu_target = $is_zero_initialized ?
"zeroinit:$dst_path" : $dst_path;
7034 my $opts = { timeout
=> 10, device
=> "drive-$drive", mode
=> "existing", sync
=> "full", target
=> $qemu_target };
7035 $opts->{format
} = $format if $format;
7037 if (defined($src_bitmap)) {
7038 $opts->{sync
} = 'incremental';
7039 $opts->{bitmap
} = $src_bitmap;
7040 print "drive mirror re-using dirty bitmap '$src_bitmap'\n";
7043 if (defined($bwlimit)) {
7044 $opts->{speed
} = $bwlimit * 1024;
7045 print "drive mirror is starting for drive-$drive with bandwidth limit: ${bwlimit} KB/s\n";
7047 print "drive mirror is starting for drive-$drive\n";
7050 # if a job already runs for this device we get an error, catch it for cleanup
7051 eval { mon_cmd
($vmid, "drive-mirror", %$opts); };
7053 eval { PVE
::QemuServer
::qemu_blockjobs_cancel
($vmid, $jobs) };
7055 die "mirroring error: $err\n";
7058 qemu_drive_mirror_monitor
($vmid, $vmiddst, $jobs, $completion, $qga);
7061 # $completion can be either
7062 # 'complete': wait until all jobs are ready, block-job-complete them (default)
7063 # 'cancel': wait until all jobs are ready, block-job-cancel them
7064 # 'skip': wait until all jobs are ready, return with block jobs in ready state
7065 # 'auto': wait until all jobs disappear, only use for jobs which complete automatically
7066 sub qemu_drive_mirror_monitor
{
7067 my ($vmid, $vmiddst, $jobs, $completion, $qga, $op) = @_;
7069 $completion //= 'complete';
7073 my $err_complete = 0;
7075 my $starttime = time ();
7077 die "block job ('$op') timed out\n" if $err_complete > 300;
7079 my $stats = mon_cmd
($vmid, "query-block-jobs");
7082 my $running_jobs = {};
7083 for my $stat (@$stats) {
7084 next if $stat->{type
} ne $op;
7085 $running_jobs->{$stat->{device
}} = $stat;
7088 my $readycounter = 0;
7090 for my $job_id (sort keys %$jobs) {
7091 my $job = $running_jobs->{$job_id};
7093 my $vanished = !defined($job);
7094 my $complete = defined($jobs->{$job_id}->{complete
}) && $vanished;
7095 if($complete || ($vanished && $completion eq 'auto')) {
7096 print "$job_id: $op-job finished\n";
7097 delete $jobs->{$job_id};
7101 die "$job_id: '$op' has been cancelled\n" if !defined($job);
7103 my $busy = $job->{busy
};
7104 my $ready = $job->{ready
};
7105 if (my $total = $job->{len
}) {
7106 my $transferred = $job->{offset
} || 0;
7107 my $remaining = $total - $transferred;
7108 my $percent = sprintf "%.2f", ($transferred * 100 / $total);
7110 my $duration = $ctime - $starttime;
7111 my $total_h = render_bytes
($total, 1);
7112 my $transferred_h = render_bytes
($transferred, 1);
7114 my $status = sprintf(
7115 "transferred $transferred_h of $total_h ($percent%%) in %s",
7116 render_duration
($duration),
7121 $status .= ", still busy"; # shouldn't even happen? but mirror is weird
7123 $status .= ", ready";
7126 print "$job_id: $status\n" if !$jobs->{$job_id}->{ready
};
7127 $jobs->{$job_id}->{ready
} = $ready;
7130 $readycounter++ if $job->{ready
};
7133 last if scalar(keys %$jobs) == 0;
7135 if ($readycounter == scalar(keys %$jobs)) {
7136 print "all '$op' jobs are ready\n";
7138 # do the complete later (or has already been done)
7139 last if $completion eq 'skip' || $completion eq 'auto';
7141 if ($vmiddst && $vmiddst != $vmid) {
7142 my $agent_running = $qga && qga_check_running
($vmid);
7143 if ($agent_running) {
7144 print "freeze filesystem\n";
7145 eval { mon_cmd
($vmid, "guest-fsfreeze-freeze"); };
7147 print "suspend vm\n";
7148 eval { PVE
::QemuServer
::vm_suspend
($vmid, 1); };
7151 # if we clone a disk for a new target vm, we don't switch the disk
7152 PVE
::QemuServer
::qemu_blockjobs_cancel
($vmid, $jobs);
7154 if ($agent_running) {
7155 print "unfreeze filesystem\n";
7156 eval { mon_cmd
($vmid, "guest-fsfreeze-thaw"); };
7158 print "resume vm\n";
7159 eval { PVE
::QemuServer
::vm_resume
($vmid, 1, 1); };
7165 for my $job_id (sort keys %$jobs) {
7166 # try to switch the disk if source and destination are on the same guest
7167 print "$job_id: Completing block job_id...\n";
7170 if ($completion eq 'complete') {
7171 $op = 'block-job-complete';
7172 } elsif ($completion eq 'cancel') {
7173 $op = 'block-job-cancel';
7175 die "invalid completion value: $completion\n";
7177 eval { mon_cmd
($vmid, $op, device
=> $job_id) };
7178 if ($@ =~ m/cannot be completed/) {
7179 print "$job_id: block job cannot be completed, trying again.\n";
7182 print "$job_id: Completed successfully.\n";
7183 $jobs->{$job_id}->{complete
} = 1;
7194 eval { PVE
::QemuServer
::qemu_blockjobs_cancel
($vmid, $jobs) };
7195 die "block job ($op) error: $err";
7199 sub qemu_blockjobs_cancel
{
7200 my ($vmid, $jobs) = @_;
7202 foreach my $job (keys %$jobs) {
7203 print "$job: Cancelling block job\n";
7204 eval { mon_cmd
($vmid, "block-job-cancel", device
=> $job); };
7205 $jobs->{$job}->{cancel
} = 1;
7209 my $stats = mon_cmd
($vmid, "query-block-jobs");
7211 my $running_jobs = {};
7212 foreach my $stat (@$stats) {
7213 $running_jobs->{$stat->{device
}} = $stat;
7216 foreach my $job (keys %$jobs) {
7218 if (defined($jobs->{$job}->{cancel
}) && !defined($running_jobs->{$job})) {
7219 print "$job: Done.\n";
7220 delete $jobs->{$job};
7224 last if scalar(keys %$jobs) == 0;
7231 my ($storecfg, $vmid, $running, $drivename, $drive, $snapname,
7232 $newvmid, $storage, $format, $full, $newvollist, $jobs, $completion, $qga, $bwlimit, $conf) = @_;
7237 print "create linked clone of drive $drivename ($drive->{file})\n";
7238 $newvolid = PVE
::Storage
::vdisk_clone
($storecfg, $drive->{file
}, $newvmid, $snapname);
7239 push @$newvollist, $newvolid;
7242 my ($storeid, $volname) = PVE
::Storage
::parse_volume_id
($drive->{file
});
7243 $storeid = $storage if $storage;
7245 my $dst_format = resolve_dst_disk_format
($storecfg, $storeid, $volname, $format);
7247 print "create full clone of drive $drivename ($drive->{file})\n";
7250 if (drive_is_cloudinit
($drive)) {
7251 $name = "vm-$newvmid-cloudinit";
7252 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
7253 if ($scfg->{path
}) {
7254 $name .= ".$dst_format";
7257 $size = PVE
::QemuServer
::Cloudinit
::CLOUDINIT_DISK_SIZE
;
7258 } elsif ($drivename eq 'efidisk0') {
7259 $size = get_efivars_size
($conf);
7261 ($size) = PVE
::Storage
::volume_size_info
($storecfg, $drive->{file
}, 10);
7263 $newvolid = PVE
::Storage
::vdisk_alloc
(
7264 $storecfg, $storeid, $newvmid, $dst_format, $name, ($size/1024)
7266 push @$newvollist, $newvolid;
7268 PVE
::Storage
::activate_volumes
($storecfg, [$newvolid]);
7270 if (drive_is_cloudinit
($drive)) {
7271 # when cloning multiple disks (e.g. during clone_vm) it might be the last disk
7272 # if this is the case, we have to complete any block-jobs still there from
7273 # previous drive-mirrors
7274 if (($completion eq 'complete') && (scalar(keys %$jobs) > 0)) {
7275 qemu_drive_mirror_monitor
($vmid, $newvmid, $jobs, $completion, $qga);
7280 my $sparseinit = PVE
::Storage
::volume_has_feature
($storecfg, 'sparseinit', $newvolid);
7281 if (!$running || $snapname) {
7282 # TODO: handle bwlimits
7283 if ($drivename eq 'efidisk0') {
7284 # the relevant data on the efidisk may be smaller than the source
7285 # e.g. on RBD/ZFS, so we use dd to copy only the amount
7286 # that is given by the OVMF_VARS.fd
7287 my $src_path = PVE
::Storage
::path
($storecfg, $drive->{file
});
7288 my $dst_path = PVE
::Storage
::path
($storecfg, $newvolid);
7290 # better for Ceph if block size is not too small, see bug #3324
7293 run_command
(['qemu-img', 'dd', '-n', '-O', $dst_format, "bs=$bs", "osize=$size",
7294 "if=$src_path", "of=$dst_path"]);
7296 qemu_img_convert
($drive->{file
}, $newvolid, $size, $snapname, $sparseinit);
7300 my $kvmver = get_running_qemu_version
($vmid);
7301 if (!min_version
($kvmver, 2, 7)) {
7302 die "drive-mirror with iothread requires qemu version 2.7 or higher\n"
7303 if $drive->{iothread
};
7306 qemu_drive_mirror
($vmid, $drivename, $newvolid, $newvmid, $sparseinit, $jobs,
7307 $completion, $qga, $bwlimit);
7312 my ($size) = eval { PVE
::Storage
::volume_size_info
($storecfg, $newvolid, 10) };
7315 $disk->{format
} = undef;
7316 $disk->{file
} = $newvolid;
7317 $disk->{size
} = $size if defined($size);
7322 sub get_running_qemu_version
{
7324 my $res = mon_cmd
($vmid, "query-version");
7325 return "$res->{qemu}->{major}.$res->{qemu}->{minor}";
7328 sub qemu_use_old_bios_files
{
7329 my ($machine_type) = @_;
7331 return if !$machine_type;
7333 my $use_old_bios_files = undef;
7335 if ($machine_type =~ m/^(\S+)\.pxe$/) {
7337 $use_old_bios_files = 1;
7339 my $version = extract_version
($machine_type, kvm_user_version
());
7340 # Note: kvm version < 2.4 use non-efi pxe files, and have problems when we
7341 # load new efi bios files on migration. So this hack is required to allow
7342 # live migration from qemu-2.2 to qemu-2.4, which is sometimes used when
7343 # updrading from proxmox-ve-3.X to proxmox-ve 4.0
7344 $use_old_bios_files = !min_version
($version, 2, 4);
7347 return ($use_old_bios_files, $machine_type);
7350 sub get_efivars_size
{
7352 my $arch = get_vm_arch
($conf);
7353 my (undef, $ovmf_vars) = get_ovmf_files
($arch);
7354 die "uefi vars image '$ovmf_vars' not found\n" if ! -f
$ovmf_vars;
7355 return -s
$ovmf_vars;
7358 sub update_efidisk_size
{
7361 return if !defined($conf->{efidisk0
});
7363 my $disk = PVE
::QemuServer
::parse_drive
('efidisk0', $conf->{efidisk0
});
7364 $disk->{size
} = get_efivars_size
($conf);
7365 $conf->{efidisk0
} = print_drive
($disk);
7370 sub create_efidisk
($$$$$) {
7371 my ($storecfg, $storeid, $vmid, $fmt, $arch) = @_;
7373 my (undef, $ovmf_vars) = get_ovmf_files
($arch);
7374 die "EFI vars default image not found\n" if ! -f
$ovmf_vars;
7376 my $vars_size_b = -s
$ovmf_vars;
7377 my $vars_size = PVE
::Tools
::convert_size
($vars_size_b, 'b' => 'kb');
7378 my $volid = PVE
::Storage
::vdisk_alloc
($storecfg, $storeid, $vmid, $fmt, undef, $vars_size);
7379 PVE
::Storage
::activate_volumes
($storecfg, [$volid]);
7381 qemu_img_convert
($ovmf_vars, $volid, $vars_size_b, undef, 0);
7382 my ($size) = PVE
::Storage
::volume_size_info
($storecfg, $volid, 3);
7384 return ($volid, $size/1024);
7387 sub vm_iothreads_list
{
7390 my $res = mon_cmd
($vmid, 'query-iothreads');
7393 foreach my $iothread (@$res) {
7394 $iothreads->{ $iothread->{id
} } = $iothread->{"thread-id"};
7401 my ($conf, $drive) = @_;
7405 if (!$conf->{scsihw
} || ($conf->{scsihw
} =~ m/^lsi/)) {
7407 } elsif ($conf->{scsihw
} && ($conf->{scsihw
} eq 'virtio-scsi-single')) {
7413 my $controller = int($drive->{index} / $maxdev);
7414 my $controller_prefix = ($conf->{scsihw
} && $conf->{scsihw
} eq 'virtio-scsi-single')
7418 return ($maxdev, $controller, $controller_prefix);
7421 sub windows_version
{
7424 return 0 if !$ostype;
7428 if($ostype eq 'wxp' || $ostype eq 'w2k3' || $ostype eq 'w2k') {
7430 } elsif($ostype eq 'w2k8' || $ostype eq 'wvista') {
7432 } elsif ($ostype =~ m/^win(\d+)$/) {
7439 sub resolve_dst_disk_format
{
7440 my ($storecfg, $storeid, $src_volname, $format) = @_;
7441 my ($defFormat, $validFormats) = PVE
::Storage
::storage_default_format
($storecfg, $storeid);
7444 # if no target format is specified, use the source disk format as hint
7446 my $scfg = PVE
::Storage
::storage_config
($storecfg, $storeid);
7447 $format = qemu_img_format
($scfg, $src_volname);
7453 # test if requested format is supported - else use default
7454 my $supported = grep { $_ eq $format } @$validFormats;
7455 $format = $defFormat if !$supported;
7459 # NOTE: if this logic changes, please update docs & possibly gui logic
7460 sub find_vmstate_storage
{
7461 my ($conf, $storecfg) = @_;
7463 # first, return storage from conf if set
7464 return $conf->{vmstatestorage
} if $conf->{vmstatestorage
};
7466 my ($target, $shared, $local);
7468 foreach_storage_used_by_vm
($conf, sub {
7470 my $scfg = PVE
::Storage
::storage_config
($storecfg, $sid);
7471 my $dst = $scfg->{shared
} ? \
$shared : \
$local;
7472 $$dst = $sid if !$$dst || $scfg->{path
}; # prefer file based storage
7475 # second, use shared storage where VM has at least one disk
7476 # third, use local storage where VM has at least one disk
7477 # fall back to local storage
7478 $target = $shared // $local // 'local';
7484 my ($uuid, $uuid_str);
7485 UUID
::generate
($uuid);
7486 UUID
::unparse
($uuid, $uuid_str);
7490 sub generate_smbios1_uuid
{
7491 return "uuid=".generate_uuid
();
7497 mon_cmd
($vmid, 'nbd-server-stop');
7500 sub create_reboot_request
{
7502 open(my $fh, '>', "/run/qemu-server/$vmid.reboot")
7503 or die "failed to create reboot trigger file: $!\n";
7507 sub clear_reboot_request
{
7509 my $path = "/run/qemu-server/$vmid.reboot";
7512 $res = unlink($path);
7513 die "could not remove reboot request for $vmid: $!"
7514 if !$res && $! != POSIX
::ENOENT
;
7519 sub bootorder_from_legacy
{
7520 my ($conf, $bootcfg) = @_;
7522 my $boot = $bootcfg->{legacy
} || $boot_fmt->{legacy
}->{default};
7523 my $bootindex_hash = {};
7525 foreach my $o (split(//, $boot)) {
7526 $bootindex_hash->{$o} = $i*100;
7532 PVE
::QemuConfig-
>foreach_volume($conf, sub {
7533 my ($ds, $drive) = @_;
7535 if (drive_is_cdrom
($drive, 1)) {
7536 if ($bootindex_hash->{d
}) {
7537 $bootorder->{$ds} = $bootindex_hash->{d
};
7538 $bootindex_hash->{d
} += 1;
7540 } elsif ($bootindex_hash->{c
}) {
7541 $bootorder->{$ds} = $bootindex_hash->{c
}
7542 if $conf->{bootdisk
} && $conf->{bootdisk
} eq $ds;
7543 $bootindex_hash->{c
} += 1;
7547 if ($bootindex_hash->{n
}) {
7548 for (my $i = 0; $i < $MAX_NETS; $i++) {
7549 my $netname = "net$i";
7550 next if !$conf->{$netname};
7551 $bootorder->{$netname} = $bootindex_hash->{n
};
7552 $bootindex_hash->{n
} += 1;
7559 # Generate default device list for 'boot: order=' property. Matches legacy
7560 # default boot order, but with explicit device names. This is important, since
7561 # the fallback for when neither 'order' nor the old format is specified relies
7562 # on 'bootorder_from_legacy' above, and it would be confusing if this diverges.
7563 sub get_default_bootdevices
{
7569 my $first = PVE
::QemuServer
::Drive
::resolve_first_disk
($conf, 0);
7570 push @ret, $first if $first;
7573 $first = PVE
::QemuServer
::Drive
::resolve_first_disk
($conf, 1);
7574 push @ret, $first if $first;
7577 for (my $i = 0; $i < $MAX_NETS; $i++) {
7578 my $netname = "net$i";
7579 next if !$conf->{$netname};
7580 push @ret, $netname;
7587 sub device_bootorder
{
7590 return bootorder_from_legacy
($conf) if !defined($conf->{boot
});
7592 my $boot = parse_property_string
($boot_fmt, $conf->{boot
});
7595 if (!defined($boot) || $boot->{legacy
}) {
7596 $bootorder = bootorder_from_legacy
($conf, $boot);
7597 } elsif ($boot->{order
}) {
7598 my $i = 100; # start at 100 to allow user to insert devices before us with -args
7599 for my $dev (PVE
::Tools
::split_list
($boot->{order
})) {
7600 $bootorder->{$dev} = $i++;
7607 sub register_qmeventd_handle
{
7611 my $peer = "/var/run/qmeventd.sock";
7616 $fh = IO
::Socket
::UNIX-
>new(Peer
=> $peer, Blocking
=> 0, Timeout
=> 1);
7618 if ($! != EINTR
&& $! != EAGAIN
) {
7619 die "unable to connect to qmeventd socket (vmid: $vmid) - $!\n";
7622 die "unable to connect to qmeventd socket (vmid: $vmid) - timeout "
7623 . "after $count retries\n";
7628 # send handshake to mark VM as backing up
7629 print $fh to_json
({vzdump
=> {vmid
=> "$vmid"}});
7631 # return handle to be closed later when inhibit is no longer required
7635 # bash completion helper
7637 sub complete_backup_archives
{
7638 my ($cmdname, $pname, $cvalue) = @_;
7640 my $cfg = PVE
::Storage
::config
();
7644 if ($cvalue =~ m/^([^:]+):/) {
7648 my $data = PVE
::Storage
::template_list
($cfg, $storeid, 'backup');
7651 foreach my $id (keys %$data) {
7652 foreach my $item (@{$data->{$id}}) {
7653 next if $item->{format
} !~ m/^vma\.(${\PVE::Storage::Plugin::COMPRESSOR_RE})$/;
7654 push @$res, $item->{volid
} if defined($item->{volid
});
7661 my $complete_vmid_full = sub {
7664 my $idlist = vmstatus
();
7668 foreach my $id (keys %$idlist) {
7669 my $d = $idlist->{$id};
7670 if (defined($running)) {
7671 next if $d->{template
};
7672 next if $running && $d->{status
} ne 'running';
7673 next if !$running && $d->{status
} eq 'running';
7682 return &$complete_vmid_full();
7685 sub complete_vmid_stopped
{
7686 return &$complete_vmid_full(0);
7689 sub complete_vmid_running
{
7690 return &$complete_vmid_full(1);
7693 sub complete_storage
{
7695 my $cfg = PVE
::Storage
::config
();
7696 my $ids = $cfg->{ids
};
7699 foreach my $sid (keys %$ids) {
7700 next if !PVE
::Storage
::storage_check_enabled
($cfg, $sid, undef, 1);
7701 next if !$ids->{$sid}->{content
}->{images
};
7708 sub complete_migration_storage
{
7709 my ($cmd, $param, $current_value, $all_args) = @_;
7711 my $targetnode = @$all_args[1];
7713 my $cfg = PVE
::Storage
::config
();
7714 my $ids = $cfg->{ids
};
7717 foreach my $sid (keys %$ids) {
7718 next if !PVE
::Storage
::storage_check_enabled
($cfg, $sid, $targetnode, 1);
7719 next if !$ids->{$sid}->{content
}->{images
};
7728 my $qmpstatus = eval {
7729 PVE
::QemuConfig
::assert_config_exists_on_node
($vmid);
7730 mon_cmd
($vmid, "query-status");
7733 return $qmpstatus && $qmpstatus->{status
} eq "paused";