]> git.proxmox.com Git - qemu.git/blob - qmp.c
Merge remote-tracking branch 'afaerber/qom-cpu' into staging
[qemu.git] / qmp.c
1 /*
2 * QEMU Management Protocol
3 *
4 * Copyright IBM, Corp. 2011
5 *
6 * Authors:
7 * Anthony Liguori <aliguori@us.ibm.com>
8 *
9 * This work is licensed under the terms of the GNU GPL, version 2. See
10 * the COPYING file in the top-level directory.
11 *
12 * Contributions after 2012-01-13 are licensed under the terms of the
13 * GNU GPL, version 2 or (at your option) any later version.
14 */
15
16 #include "qemu-common.h"
17 #include "sysemu/sysemu.h"
18 #include "qmp-commands.h"
19 #include "char/char.h"
20 #include "ui/qemu-spice.h"
21 #include "ui/vnc.h"
22 #include "sysemu/kvm.h"
23 #include "sysemu/arch_init.h"
24 #include "hw/qdev.h"
25 #include "sysemu/blockdev.h"
26 #include "qom/qom-qobject.h"
27
28 NameInfo *qmp_query_name(Error **errp)
29 {
30 NameInfo *info = g_malloc0(sizeof(*info));
31
32 if (qemu_name) {
33 info->has_name = true;
34 info->name = g_strdup(qemu_name);
35 }
36
37 return info;
38 }
39
40 VersionInfo *qmp_query_version(Error **err)
41 {
42 VersionInfo *info = g_malloc0(sizeof(*info));
43 const char *version = QEMU_VERSION;
44 char *tmp;
45
46 info->qemu.major = strtol(version, &tmp, 10);
47 tmp++;
48 info->qemu.minor = strtol(tmp, &tmp, 10);
49 tmp++;
50 info->qemu.micro = strtol(tmp, &tmp, 10);
51 info->package = g_strdup(QEMU_PKGVERSION);
52
53 return info;
54 }
55
56 KvmInfo *qmp_query_kvm(Error **errp)
57 {
58 KvmInfo *info = g_malloc0(sizeof(*info));
59
60 info->enabled = kvm_enabled();
61 info->present = kvm_available();
62
63 return info;
64 }
65
66 UuidInfo *qmp_query_uuid(Error **errp)
67 {
68 UuidInfo *info = g_malloc0(sizeof(*info));
69 char uuid[64];
70
71 snprintf(uuid, sizeof(uuid), UUID_FMT, qemu_uuid[0], qemu_uuid[1],
72 qemu_uuid[2], qemu_uuid[3], qemu_uuid[4], qemu_uuid[5],
73 qemu_uuid[6], qemu_uuid[7], qemu_uuid[8], qemu_uuid[9],
74 qemu_uuid[10], qemu_uuid[11], qemu_uuid[12], qemu_uuid[13],
75 qemu_uuid[14], qemu_uuid[15]);
76
77 info->UUID = g_strdup(uuid);
78 return info;
79 }
80
81 void qmp_quit(Error **err)
82 {
83 no_shutdown = 0;
84 qemu_system_shutdown_request();
85 }
86
87 void qmp_stop(Error **errp)
88 {
89 if (runstate_check(RUN_STATE_INMIGRATE)) {
90 autostart = 0;
91 } else {
92 vm_stop(RUN_STATE_PAUSED);
93 }
94 }
95
96 void qmp_system_reset(Error **errp)
97 {
98 qemu_system_reset_request();
99 }
100
101 void qmp_system_powerdown(Error **erp)
102 {
103 qemu_system_powerdown_request();
104 }
105
106 void qmp_cpu(int64_t index, Error **errp)
107 {
108 /* Just do nothing */
109 }
110
111 #ifndef CONFIG_VNC
112 /* If VNC support is enabled, the "true" query-vnc command is
113 defined in the VNC subsystem */
114 VncInfo *qmp_query_vnc(Error **errp)
115 {
116 error_set(errp, QERR_FEATURE_DISABLED, "vnc");
117 return NULL;
118 };
119 #endif
120
121 #ifndef CONFIG_SPICE
122 /* If SPICE support is enabled, the "true" query-spice command is
123 defined in the SPICE subsystem. Also note that we use a small
124 trick to maintain query-spice's original behavior, which is not
125 to be available in the namespace if SPICE is not compiled in */
126 SpiceInfo *qmp_query_spice(Error **errp)
127 {
128 error_set(errp, QERR_COMMAND_NOT_FOUND, "query-spice");
129 return NULL;
130 };
131 #endif
132
133 static void iostatus_bdrv_it(void *opaque, BlockDriverState *bs)
134 {
135 bdrv_iostatus_reset(bs);
136 }
137
138 static void encrypted_bdrv_it(void *opaque, BlockDriverState *bs)
139 {
140 Error **err = opaque;
141
142 if (!error_is_set(err) && bdrv_key_required(bs)) {
143 error_set(err, QERR_DEVICE_ENCRYPTED, bdrv_get_device_name(bs),
144 bdrv_get_encrypted_filename(bs));
145 }
146 }
147
148 void qmp_cont(Error **errp)
149 {
150 Error *local_err = NULL;
151
152 if (runstate_check(RUN_STATE_INTERNAL_ERROR) ||
153 runstate_check(RUN_STATE_SHUTDOWN)) {
154 error_set(errp, QERR_RESET_REQUIRED);
155 return;
156 } else if (runstate_check(RUN_STATE_SUSPENDED)) {
157 return;
158 }
159
160 bdrv_iterate(iostatus_bdrv_it, NULL);
161 bdrv_iterate(encrypted_bdrv_it, &local_err);
162 if (local_err) {
163 error_propagate(errp, local_err);
164 return;
165 }
166
167 if (runstate_check(RUN_STATE_INMIGRATE)) {
168 autostart = 1;
169 } else {
170 vm_start();
171 }
172 }
173
174 void qmp_system_wakeup(Error **errp)
175 {
176 qemu_system_wakeup_request(QEMU_WAKEUP_REASON_OTHER);
177 }
178
179 ObjectPropertyInfoList *qmp_qom_list(const char *path, Error **errp)
180 {
181 Object *obj;
182 bool ambiguous = false;
183 ObjectPropertyInfoList *props = NULL;
184 ObjectProperty *prop;
185
186 obj = object_resolve_path(path, &ambiguous);
187 if (obj == NULL) {
188 error_set(errp, QERR_DEVICE_NOT_FOUND, path);
189 return NULL;
190 }
191
192 QTAILQ_FOREACH(prop, &obj->properties, node) {
193 ObjectPropertyInfoList *entry = g_malloc0(sizeof(*entry));
194
195 entry->value = g_malloc0(sizeof(ObjectPropertyInfo));
196 entry->next = props;
197 props = entry;
198
199 entry->value->name = g_strdup(prop->name);
200 entry->value->type = g_strdup(prop->type);
201 }
202
203 return props;
204 }
205
206 /* FIXME: teach qapi about how to pass through Visitors */
207 int qmp_qom_set(Monitor *mon, const QDict *qdict, QObject **ret)
208 {
209 const char *path = qdict_get_str(qdict, "path");
210 const char *property = qdict_get_str(qdict, "property");
211 QObject *value = qdict_get(qdict, "value");
212 Error *local_err = NULL;
213 Object *obj;
214
215 obj = object_resolve_path(path, NULL);
216 if (!obj) {
217 error_set(&local_err, QERR_DEVICE_NOT_FOUND, path);
218 goto out;
219 }
220
221 object_property_set_qobject(obj, value, property, &local_err);
222
223 out:
224 if (local_err) {
225 qerror_report_err(local_err);
226 error_free(local_err);
227 return -1;
228 }
229
230 return 0;
231 }
232
233 int qmp_qom_get(Monitor *mon, const QDict *qdict, QObject **ret)
234 {
235 const char *path = qdict_get_str(qdict, "path");
236 const char *property = qdict_get_str(qdict, "property");
237 Error *local_err = NULL;
238 Object *obj;
239
240 obj = object_resolve_path(path, NULL);
241 if (!obj) {
242 error_set(&local_err, QERR_DEVICE_NOT_FOUND, path);
243 goto out;
244 }
245
246 *ret = object_property_get_qobject(obj, property, &local_err);
247
248 out:
249 if (local_err) {
250 qerror_report_err(local_err);
251 error_free(local_err);
252 return -1;
253 }
254
255 return 0;
256 }
257
258 void qmp_set_password(const char *protocol, const char *password,
259 bool has_connected, const char *connected, Error **errp)
260 {
261 int disconnect_if_connected = 0;
262 int fail_if_connected = 0;
263 int rc;
264
265 if (has_connected) {
266 if (strcmp(connected, "fail") == 0) {
267 fail_if_connected = 1;
268 } else if (strcmp(connected, "disconnect") == 0) {
269 disconnect_if_connected = 1;
270 } else if (strcmp(connected, "keep") == 0) {
271 /* nothing */
272 } else {
273 error_set(errp, QERR_INVALID_PARAMETER, "connected");
274 return;
275 }
276 }
277
278 if (strcmp(protocol, "spice") == 0) {
279 if (!using_spice) {
280 /* correct one? spice isn't a device ,,, */
281 error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
282 return;
283 }
284 rc = qemu_spice_set_passwd(password, fail_if_connected,
285 disconnect_if_connected);
286 if (rc != 0) {
287 error_set(errp, QERR_SET_PASSWD_FAILED);
288 }
289 return;
290 }
291
292 if (strcmp(protocol, "vnc") == 0) {
293 if (fail_if_connected || disconnect_if_connected) {
294 /* vnc supports "connected=keep" only */
295 error_set(errp, QERR_INVALID_PARAMETER, "connected");
296 return;
297 }
298 /* Note that setting an empty password will not disable login through
299 * this interface. */
300 rc = vnc_display_password(NULL, password);
301 if (rc < 0) {
302 error_set(errp, QERR_SET_PASSWD_FAILED);
303 }
304 return;
305 }
306
307 error_set(errp, QERR_INVALID_PARAMETER, "protocol");
308 }
309
310 void qmp_expire_password(const char *protocol, const char *whenstr,
311 Error **errp)
312 {
313 time_t when;
314 int rc;
315
316 if (strcmp(whenstr, "now") == 0) {
317 when = 0;
318 } else if (strcmp(whenstr, "never") == 0) {
319 when = TIME_MAX;
320 } else if (whenstr[0] == '+') {
321 when = time(NULL) + strtoull(whenstr+1, NULL, 10);
322 } else {
323 when = strtoull(whenstr, NULL, 10);
324 }
325
326 if (strcmp(protocol, "spice") == 0) {
327 if (!using_spice) {
328 /* correct one? spice isn't a device ,,, */
329 error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
330 return;
331 }
332 rc = qemu_spice_set_pw_expire(when);
333 if (rc != 0) {
334 error_set(errp, QERR_SET_PASSWD_FAILED);
335 }
336 return;
337 }
338
339 if (strcmp(protocol, "vnc") == 0) {
340 rc = vnc_display_pw_expire(NULL, when);
341 if (rc != 0) {
342 error_set(errp, QERR_SET_PASSWD_FAILED);
343 }
344 return;
345 }
346
347 error_set(errp, QERR_INVALID_PARAMETER, "protocol");
348 }
349
350 #ifdef CONFIG_VNC
351 void qmp_change_vnc_password(const char *password, Error **errp)
352 {
353 if (vnc_display_password(NULL, password) < 0) {
354 error_set(errp, QERR_SET_PASSWD_FAILED);
355 }
356 }
357
358 static void qmp_change_vnc_listen(const char *target, Error **errp)
359 {
360 vnc_display_open(NULL, target, errp);
361 }
362
363 static void qmp_change_vnc(const char *target, bool has_arg, const char *arg,
364 Error **errp)
365 {
366 if (strcmp(target, "passwd") == 0 || strcmp(target, "password") == 0) {
367 if (!has_arg) {
368 error_set(errp, QERR_MISSING_PARAMETER, "password");
369 } else {
370 qmp_change_vnc_password(arg, errp);
371 }
372 } else {
373 qmp_change_vnc_listen(target, errp);
374 }
375 }
376 #else
377 void qmp_change_vnc_password(const char *password, Error **errp)
378 {
379 error_set(errp, QERR_FEATURE_DISABLED, "vnc");
380 }
381 static void qmp_change_vnc(const char *target, bool has_arg, const char *arg,
382 Error **errp)
383 {
384 error_set(errp, QERR_FEATURE_DISABLED, "vnc");
385 }
386 #endif /* !CONFIG_VNC */
387
388 void qmp_change(const char *device, const char *target,
389 bool has_arg, const char *arg, Error **err)
390 {
391 if (strcmp(device, "vnc") == 0) {
392 qmp_change_vnc(target, has_arg, arg, err);
393 } else {
394 qmp_change_blockdev(device, target, has_arg, arg, err);
395 }
396 }
397
398 static void qom_list_types_tramp(ObjectClass *klass, void *data)
399 {
400 ObjectTypeInfoList *e, **pret = data;
401 ObjectTypeInfo *info;
402
403 info = g_malloc0(sizeof(*info));
404 info->name = g_strdup(object_class_get_name(klass));
405
406 e = g_malloc0(sizeof(*e));
407 e->value = info;
408 e->next = *pret;
409 *pret = e;
410 }
411
412 ObjectTypeInfoList *qmp_qom_list_types(bool has_implements,
413 const char *implements,
414 bool has_abstract,
415 bool abstract,
416 Error **errp)
417 {
418 ObjectTypeInfoList *ret = NULL;
419
420 object_class_foreach(qom_list_types_tramp, implements, abstract, &ret);
421
422 return ret;
423 }
424
425 DevicePropertyInfoList *qmp_device_list_properties(const char *typename,
426 Error **errp)
427 {
428 ObjectClass *klass;
429 Property *prop;
430 DevicePropertyInfoList *prop_list = NULL;
431
432 klass = object_class_by_name(typename);
433 if (klass == NULL) {
434 error_set(errp, QERR_DEVICE_NOT_FOUND, typename);
435 return NULL;
436 }
437
438 klass = object_class_dynamic_cast(klass, TYPE_DEVICE);
439 if (klass == NULL) {
440 error_set(errp, QERR_INVALID_PARAMETER_VALUE,
441 "name", TYPE_DEVICE);
442 return NULL;
443 }
444
445 do {
446 for (prop = DEVICE_CLASS(klass)->props; prop && prop->name; prop++) {
447 DevicePropertyInfoList *entry;
448 DevicePropertyInfo *info;
449
450 /*
451 * TODO Properties without a parser are just for dirty hacks.
452 * qdev_prop_ptr is the only such PropertyInfo. It's marked
453 * for removal. This conditional should be removed along with
454 * it.
455 */
456 if (!prop->info->set) {
457 continue; /* no way to set it, don't show */
458 }
459
460 info = g_malloc0(sizeof(*info));
461 info->name = g_strdup(prop->name);
462 info->type = g_strdup(prop->info->legacy_name ?: prop->info->name);
463
464 entry = g_malloc0(sizeof(*entry));
465 entry->value = info;
466 entry->next = prop_list;
467 prop_list = entry;
468 }
469 klass = object_class_get_parent(klass);
470 } while (klass != object_class_by_name(TYPE_DEVICE));
471
472 return prop_list;
473 }
474
475 CpuDefinitionInfoList *qmp_query_cpu_definitions(Error **errp)
476 {
477 return arch_query_cpu_definitions(errp);
478 }
479
480 void qmp_add_client(const char *protocol, const char *fdname,
481 bool has_skipauth, bool skipauth, bool has_tls, bool tls,
482 Error **errp)
483 {
484 CharDriverState *s;
485 int fd;
486
487 fd = monitor_get_fd(cur_mon, fdname, errp);
488 if (fd < 0) {
489 return;
490 }
491
492 if (strcmp(protocol, "spice") == 0) {
493 if (!using_spice) {
494 error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
495 close(fd);
496 return;
497 }
498 skipauth = has_skipauth ? skipauth : false;
499 tls = has_tls ? tls : false;
500 if (qemu_spice_display_add_client(fd, skipauth, tls) < 0) {
501 error_setg(errp, "spice failed to add client");
502 close(fd);
503 }
504 return;
505 #ifdef CONFIG_VNC
506 } else if (strcmp(protocol, "vnc") == 0) {
507 skipauth = has_skipauth ? skipauth : false;
508 vnc_display_add_client(NULL, fd, skipauth);
509 return;
510 #endif
511 } else if ((s = qemu_chr_find(protocol)) != NULL) {
512 if (qemu_chr_add_client(s, fd) < 0) {
513 error_setg(errp, "failed to add client");
514 close(fd);
515 return;
516 }
517 return;
518 }
519
520 error_setg(errp, "protocol '%s' is invalid", protocol);
521 close(fd);
522 }