Statistics
| Branch: | Revision:

root / qmp.c @ 314f7ea7

History | View | Annotate | Download (13.7 kB)

1
/*
2
 * QEMU Management Protocol
3
 *
4
 * Copyright IBM, Corp. 2011
5
 *
6
 * Authors:
7
 *  Anthony Liguori   <aliguori@us.ibm.com>
8
 *
9
 * This work is licensed under the terms of the GNU GPL, version 2.  See
10
 * the COPYING file in the top-level directory.
11
 *
12
 * Contributions after 2012-01-13 are licensed under the terms of the
13
 * GNU GPL, version 2 or (at your option) any later version.
14
 */
15

    
16
#include "qemu-common.h"
17
#include "sysemu/sysemu.h"
18
#include "qmp-commands.h"
19
#include "sysemu/char.h"
20
#include "ui/qemu-spice.h"
21
#include "ui/vnc.h"
22
#include "sysemu/kvm.h"
23
#include "sysemu/arch_init.h"
24
#include "hw/qdev.h"
25
#include "sysemu/blockdev.h"
26
#include "qom/qom-qobject.h"
27
#include "hw/boards.h"
28

    
29
NameInfo *qmp_query_name(Error **errp)
30
{
31
    NameInfo *info = g_malloc0(sizeof(*info));
32

    
33
    if (qemu_name) {
34
        info->has_name = true;
35
        info->name = g_strdup(qemu_name);
36
    }
37

    
38
    return info;
39
}
40

    
41
VersionInfo *qmp_query_version(Error **err)
42
{
43
    VersionInfo *info = g_malloc0(sizeof(*info));
44
    const char *version = QEMU_VERSION;
45
    char *tmp;
46

    
47
    info->qemu.major = strtol(version, &tmp, 10);
48
    tmp++;
49
    info->qemu.minor = strtol(tmp, &tmp, 10);
50
    tmp++;
51
    info->qemu.micro = strtol(tmp, &tmp, 10);
52
    info->package = g_strdup(QEMU_PKGVERSION);
53

    
54
    return info;
55
}
56

    
57
KvmInfo *qmp_query_kvm(Error **errp)
58
{
59
    KvmInfo *info = g_malloc0(sizeof(*info));
60

    
61
    info->enabled = kvm_enabled();
62
    info->present = kvm_available();
63

    
64
    return info;
65
}
66

    
67
UuidInfo *qmp_query_uuid(Error **errp)
68
{
69
    UuidInfo *info = g_malloc0(sizeof(*info));
70
    char uuid[64];
71

    
72
    snprintf(uuid, sizeof(uuid), UUID_FMT, qemu_uuid[0], qemu_uuid[1],
73
                   qemu_uuid[2], qemu_uuid[3], qemu_uuid[4], qemu_uuid[5],
74
                   qemu_uuid[6], qemu_uuid[7], qemu_uuid[8], qemu_uuid[9],
75
                   qemu_uuid[10], qemu_uuid[11], qemu_uuid[12], qemu_uuid[13],
76
                   qemu_uuid[14], qemu_uuid[15]);
77

    
78
    info->UUID = g_strdup(uuid);
79
    return info;
80
}
81

    
82
void qmp_quit(Error **err)
83
{
84
    no_shutdown = 0;
85
    qemu_system_shutdown_request();
86
}
87

    
88
void qmp_stop(Error **errp)
89
{
90
    if (runstate_check(RUN_STATE_INMIGRATE)) {
91
        autostart = 0;
92
    } else {
93
        vm_stop(RUN_STATE_PAUSED);
94
    }
95
}
96

    
97
void qmp_system_reset(Error **errp)
98
{
99
    qemu_system_reset_request();
100
}
101

    
102
void qmp_system_powerdown(Error **erp)
103
{
104
    qemu_system_powerdown_request();
105
}
106

    
107
void qmp_cpu(int64_t index, Error **errp)
108
{
109
    /* Just do nothing */
110
}
111

    
112
void qmp_cpu_add(int64_t id, Error **errp)
113
{
114
    if (current_machine->hot_add_cpu) {
115
        current_machine->hot_add_cpu(id, errp);
116
    } else {
117
        error_setg(errp, "Not supported");
118
    }
119
}
120

    
121
#ifndef CONFIG_VNC
122
/* If VNC support is enabled, the "true" query-vnc command is
123
   defined in the VNC subsystem */
124
VncInfo *qmp_query_vnc(Error **errp)
125
{
126
    error_set(errp, QERR_FEATURE_DISABLED, "vnc");
127
    return NULL;
128
};
129
#endif
130

    
131
#ifndef CONFIG_SPICE
132
/* If SPICE support is enabled, the "true" query-spice command is
133
   defined in the SPICE subsystem. Also note that we use a small
134
   trick to maintain query-spice's original behavior, which is not
135
   to be available in the namespace if SPICE is not compiled in */
136
SpiceInfo *qmp_query_spice(Error **errp)
137
{
138
    error_set(errp, QERR_COMMAND_NOT_FOUND, "query-spice");
139
    return NULL;
140
};
141
#endif
142

    
143
static void iostatus_bdrv_it(void *opaque, BlockDriverState *bs)
144
{
145
    bdrv_iostatus_reset(bs);
146
}
147

    
148
static void encrypted_bdrv_it(void *opaque, BlockDriverState *bs)
149
{
150
    Error **err = opaque;
151

    
152
    if (!error_is_set(err) && bdrv_key_required(bs)) {
153
        error_set(err, QERR_DEVICE_ENCRYPTED, bdrv_get_device_name(bs),
154
                  bdrv_get_encrypted_filename(bs));
155
    }
156
}
157

    
158
void qmp_cont(Error **errp)
159
{
160
    Error *local_err = NULL;
161

    
162
    if (runstate_needs_reset()) {
163
        error_set(errp, QERR_RESET_REQUIRED);
164
        return;
165
    } else if (runstate_check(RUN_STATE_SUSPENDED)) {
166
        return;
167
    }
168

    
169
    bdrv_iterate(iostatus_bdrv_it, NULL);
170
    bdrv_iterate(encrypted_bdrv_it, &local_err);
171
    if (local_err) {
172
        error_propagate(errp, local_err);
173
        return;
174
    }
175

    
176
    if (runstate_check(RUN_STATE_INMIGRATE)) {
177
        autostart = 1;
178
    } else {
179
        vm_start();
180
    }
181
}
182

    
183
void qmp_system_wakeup(Error **errp)
184
{
185
    qemu_system_wakeup_request(QEMU_WAKEUP_REASON_OTHER);
186
}
187

    
188
ObjectPropertyInfoList *qmp_qom_list(const char *path, Error **errp)
189
{
190
    Object *obj;
191
    bool ambiguous = false;
192
    ObjectPropertyInfoList *props = NULL;
193
    ObjectProperty *prop;
194

    
195
    obj = object_resolve_path(path, &ambiguous);
196
    if (obj == NULL) {
197
        error_set(errp, QERR_DEVICE_NOT_FOUND, path);
198
        return NULL;
199
    }
200

    
201
    QTAILQ_FOREACH(prop, &obj->properties, node) {
202
        ObjectPropertyInfoList *entry = g_malloc0(sizeof(*entry));
203

    
204
        entry->value = g_malloc0(sizeof(ObjectPropertyInfo));
205
        entry->next = props;
206
        props = entry;
207

    
208
        entry->value->name = g_strdup(prop->name);
209
        entry->value->type = g_strdup(prop->type);
210
    }
211

    
212
    return props;
213
}
214

    
215
/* FIXME: teach qapi about how to pass through Visitors */
216
int qmp_qom_set(Monitor *mon, const QDict *qdict, QObject **ret)
217
{
218
    const char *path = qdict_get_str(qdict, "path");
219
    const char *property = qdict_get_str(qdict, "property");
220
    QObject *value = qdict_get(qdict, "value");
221
    Error *local_err = NULL;
222
    Object *obj;
223

    
224
    obj = object_resolve_path(path, NULL);
225
    if (!obj) {
226
        error_set(&local_err, QERR_DEVICE_NOT_FOUND, path);
227
        goto out;
228
    }
229

    
230
    object_property_set_qobject(obj, value, property, &local_err);
231

    
232
out:
233
    if (local_err) {
234
        qerror_report_err(local_err);
235
        error_free(local_err);
236
        return -1;
237
    }
238

    
239
    return 0;
240
}
241

    
242
int qmp_qom_get(Monitor *mon, const QDict *qdict, QObject **ret)
243
{
244
    const char *path = qdict_get_str(qdict, "path");
245
    const char *property = qdict_get_str(qdict, "property");
246
    Error *local_err = NULL;
247
    Object *obj;
248

    
249
    obj = object_resolve_path(path, NULL);
250
    if (!obj) {
251
        error_set(&local_err, QERR_DEVICE_NOT_FOUND, path);
252
        goto out;
253
    }
254

    
255
    *ret = object_property_get_qobject(obj, property, &local_err);
256

    
257
out:
258
    if (local_err) {
259
        qerror_report_err(local_err);
260
        error_free(local_err);
261
        return -1;
262
    }
263

    
264
    return 0;
265
}
266

    
267
void qmp_set_password(const char *protocol, const char *password,
268
                      bool has_connected, const char *connected, Error **errp)
269
{
270
    int disconnect_if_connected = 0;
271
    int fail_if_connected = 0;
272
    int rc;
273

    
274
    if (has_connected) {
275
        if (strcmp(connected, "fail") == 0) {
276
            fail_if_connected = 1;
277
        } else if (strcmp(connected, "disconnect") == 0) {
278
            disconnect_if_connected = 1;
279
        } else if (strcmp(connected, "keep") == 0) {
280
            /* nothing */
281
        } else {
282
            error_set(errp, QERR_INVALID_PARAMETER, "connected");
283
            return;
284
        }
285
    }
286

    
287
    if (strcmp(protocol, "spice") == 0) {
288
        if (!using_spice) {
289
            /* correct one? spice isn't a device ,,, */
290
            error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
291
            return;
292
        }
293
        rc = qemu_spice_set_passwd(password, fail_if_connected,
294
                                   disconnect_if_connected);
295
        if (rc != 0) {
296
            error_set(errp, QERR_SET_PASSWD_FAILED);
297
        }
298
        return;
299
    }
300

    
301
    if (strcmp(protocol, "vnc") == 0) {
302
        if (fail_if_connected || disconnect_if_connected) {
303
            /* vnc supports "connected=keep" only */
304
            error_set(errp, QERR_INVALID_PARAMETER, "connected");
305
            return;
306
        }
307
        /* Note that setting an empty password will not disable login through
308
         * this interface. */
309
        rc = vnc_display_password(NULL, password);
310
        if (rc < 0) {
311
            error_set(errp, QERR_SET_PASSWD_FAILED);
312
        }
313
        return;
314
    }
315

    
316
    error_set(errp, QERR_INVALID_PARAMETER, "protocol");
317
}
318

    
319
void qmp_expire_password(const char *protocol, const char *whenstr,
320
                         Error **errp)
321
{
322
    time_t when;
323
    int rc;
324

    
325
    if (strcmp(whenstr, "now") == 0) {
326
        when = 0;
327
    } else if (strcmp(whenstr, "never") == 0) {
328
        when = TIME_MAX;
329
    } else if (whenstr[0] == '+') {
330
        when = time(NULL) + strtoull(whenstr+1, NULL, 10);
331
    } else {
332
        when = strtoull(whenstr, NULL, 10);
333
    }
334

    
335
    if (strcmp(protocol, "spice") == 0) {
336
        if (!using_spice) {
337
            /* correct one? spice isn't a device ,,, */
338
            error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
339
            return;
340
        }
341
        rc = qemu_spice_set_pw_expire(when);
342
        if (rc != 0) {
343
            error_set(errp, QERR_SET_PASSWD_FAILED);
344
        }
345
        return;
346
    }
347

    
348
    if (strcmp(protocol, "vnc") == 0) {
349
        rc = vnc_display_pw_expire(NULL, when);
350
        if (rc != 0) {
351
            error_set(errp, QERR_SET_PASSWD_FAILED);
352
        }
353
        return;
354
    }
355

    
356
    error_set(errp, QERR_INVALID_PARAMETER, "protocol");
357
}
358

    
359
#ifdef CONFIG_VNC
360
void qmp_change_vnc_password(const char *password, Error **errp)
361
{
362
    if (vnc_display_password(NULL, password) < 0) {
363
        error_set(errp, QERR_SET_PASSWD_FAILED);
364
    }
365
}
366

    
367
static void qmp_change_vnc_listen(const char *target, Error **errp)
368
{
369
    vnc_display_open(NULL, target, errp);
370
}
371

    
372
static void qmp_change_vnc(const char *target, bool has_arg, const char *arg,
373
                           Error **errp)
374
{
375
    if (strcmp(target, "passwd") == 0 || strcmp(target, "password") == 0) {
376
        if (!has_arg) {
377
            error_set(errp, QERR_MISSING_PARAMETER, "password");
378
        } else {
379
            qmp_change_vnc_password(arg, errp);
380
        }
381
    } else {
382
        qmp_change_vnc_listen(target, errp);
383
    }
384
}
385
#else
386
void qmp_change_vnc_password(const char *password, Error **errp)
387
{
388
    error_set(errp, QERR_FEATURE_DISABLED, "vnc");
389
}
390
static void qmp_change_vnc(const char *target, bool has_arg, const char *arg,
391
                           Error **errp)
392
{
393
    error_set(errp, QERR_FEATURE_DISABLED, "vnc");
394
}
395
#endif /* !CONFIG_VNC */
396

    
397
void qmp_change(const char *device, const char *target,
398
                bool has_arg, const char *arg, Error **err)
399
{
400
    if (strcmp(device, "vnc") == 0) {
401
        qmp_change_vnc(target, has_arg, arg, err);
402
    } else {
403
        qmp_change_blockdev(device, target, arg, err);
404
    }
405
}
406

    
407
static void qom_list_types_tramp(ObjectClass *klass, void *data)
408
{
409
    ObjectTypeInfoList *e, **pret = data;
410
    ObjectTypeInfo *info;
411

    
412
    info = g_malloc0(sizeof(*info));
413
    info->name = g_strdup(object_class_get_name(klass));
414

    
415
    e = g_malloc0(sizeof(*e));
416
    e->value = info;
417
    e->next = *pret;
418
    *pret = e;
419
}
420

    
421
ObjectTypeInfoList *qmp_qom_list_types(bool has_implements,
422
                                       const char *implements,
423
                                       bool has_abstract,
424
                                       bool abstract,
425
                                       Error **errp)
426
{
427
    ObjectTypeInfoList *ret = NULL;
428

    
429
    object_class_foreach(qom_list_types_tramp, implements, abstract, &ret);
430

    
431
    return ret;
432
}
433

    
434
DevicePropertyInfoList *qmp_device_list_properties(const char *typename,
435
                                                   Error **errp)
436
{
437
    ObjectClass *klass;
438
    Property *prop;
439
    DevicePropertyInfoList *prop_list = NULL;
440

    
441
    klass = object_class_by_name(typename);
442
    if (klass == NULL) {
443
        error_set(errp, QERR_DEVICE_NOT_FOUND, typename);
444
        return NULL;
445
    }
446

    
447
    klass = object_class_dynamic_cast(klass, TYPE_DEVICE);
448
    if (klass == NULL) {
449
        error_set(errp, QERR_INVALID_PARAMETER_VALUE,
450
                  "name", TYPE_DEVICE);
451
        return NULL;
452
    }
453

    
454
    do {
455
        for (prop = DEVICE_CLASS(klass)->props; prop && prop->name; prop++) {
456
            DevicePropertyInfoList *entry;
457
            DevicePropertyInfo *info;
458

    
459
            /*
460
             * TODO Properties without a parser are just for dirty hacks.
461
             * qdev_prop_ptr is the only such PropertyInfo.  It's marked
462
             * for removal.  This conditional should be removed along with
463
             * it.
464
             */
465
            if (!prop->info->set) {
466
                continue;           /* no way to set it, don't show */
467
            }
468

    
469
            info = g_malloc0(sizeof(*info));
470
            info->name = g_strdup(prop->name);
471
            info->type = g_strdup(prop->info->legacy_name ?: prop->info->name);
472

    
473
            entry = g_malloc0(sizeof(*entry));
474
            entry->value = info;
475
            entry->next = prop_list;
476
            prop_list = entry;
477
        }
478
        klass = object_class_get_parent(klass);
479
    } while (klass != object_class_by_name(TYPE_DEVICE));
480

    
481
    return prop_list;
482
}
483

    
484
CpuDefinitionInfoList *qmp_query_cpu_definitions(Error **errp)
485
{
486
    return arch_query_cpu_definitions(errp);
487
}
488

    
489
void qmp_add_client(const char *protocol, const char *fdname,
490
                    bool has_skipauth, bool skipauth, bool has_tls, bool tls,
491
                    Error **errp)
492
{
493
    CharDriverState *s;
494
    int fd;
495

    
496
    fd = monitor_get_fd(cur_mon, fdname, errp);
497
    if (fd < 0) {
498
        return;
499
    }
500

    
501
    if (strcmp(protocol, "spice") == 0) {
502
        if (!using_spice) {
503
            error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
504
            close(fd);
505
            return;
506
        }
507
        skipauth = has_skipauth ? skipauth : false;
508
        tls = has_tls ? tls : false;
509
        if (qemu_spice_display_add_client(fd, skipauth, tls) < 0) {
510
            error_setg(errp, "spice failed to add client");
511
            close(fd);
512
        }
513
        return;
514
#ifdef CONFIG_VNC
515
    } else if (strcmp(protocol, "vnc") == 0) {
516
        skipauth = has_skipauth ? skipauth : false;
517
        vnc_display_add_client(NULL, fd, skipauth);
518
        return;
519
#endif
520
    } else if ((s = qemu_chr_find(protocol)) != NULL) {
521
        if (qemu_chr_add_client(s, fd) < 0) {
522
            error_setg(errp, "failed to add client");
523
            close(fd);
524
            return;
525
        }
526
        return;
527
    }
528

    
529
    error_setg(errp, "protocol '%s' is invalid", protocol);
530
    close(fd);
531
}