qemu/qmp.c
<<
>>
Prefs
   1/*
   2 * QEMU Management Protocol
   3 *
   4 * Copyright IBM, Corp. 2011
   5 *
   6 * Authors:
   7 *  Anthony Liguori   <aliguori@us.ibm.com>
   8 *
   9 * This work is licensed under the terms of the GNU GPL, version 2.  See
  10 * the COPYING file in the top-level directory.
  11 *
  12 * Contributions after 2012-01-13 are licensed under the terms of the
  13 * GNU GPL, version 2 or (at your option) any later version.
  14 */
  15
  16#include "qemu-common.h"
  17#include "sysemu/sysemu.h"
  18#include "qmp-commands.h"
  19#include "sysemu/char.h"
  20#include "ui/qemu-spice.h"
  21#include "ui/vnc.h"
  22#include "sysemu/kvm.h"
  23#include "sysemu/arch_init.h"
  24#include "hw/qdev.h"
  25#include "sysemu/blockdev.h"
  26#include "qom/qom-qobject.h"
  27#include "hw/boards.h"
  28
  29NameInfo *qmp_query_name(Error **errp)
  30{
  31    NameInfo *info = g_malloc0(sizeof(*info));
  32
  33    if (qemu_name) {
  34        info->has_name = true;
  35        info->name = g_strdup(qemu_name);
  36    }
  37
  38    return info;
  39}
  40
  41VersionInfo *qmp_query_version(Error **err)
  42{
  43    VersionInfo *info = g_malloc0(sizeof(*info));
  44    const char *version = QEMU_VERSION;
  45    char *tmp;
  46
  47    info->qemu.major = strtol(version, &tmp, 10);
  48    tmp++;
  49    info->qemu.minor = strtol(tmp, &tmp, 10);
  50    tmp++;
  51    info->qemu.micro = strtol(tmp, &tmp, 10);
  52    info->package = g_strdup(QEMU_PKGVERSION);
  53
  54    return info;
  55}
  56
  57KvmInfo *qmp_query_kvm(Error **errp)
  58{
  59    KvmInfo *info = g_malloc0(sizeof(*info));
  60
  61    info->enabled = kvm_enabled();
  62    info->present = kvm_available();
  63
  64    return info;
  65}
  66
  67UuidInfo *qmp_query_uuid(Error **errp)
  68{
  69    UuidInfo *info = g_malloc0(sizeof(*info));
  70    char uuid[64];
  71
  72    snprintf(uuid, sizeof(uuid), UUID_FMT, qemu_uuid[0], qemu_uuid[1],
  73                   qemu_uuid[2], qemu_uuid[3], qemu_uuid[4], qemu_uuid[5],
  74                   qemu_uuid[6], qemu_uuid[7], qemu_uuid[8], qemu_uuid[9],
  75                   qemu_uuid[10], qemu_uuid[11], qemu_uuid[12], qemu_uuid[13],
  76                   qemu_uuid[14], qemu_uuid[15]);
  77
  78    info->UUID = g_strdup(uuid);
  79    return info;
  80}
  81
  82void qmp_quit(Error **err)
  83{
  84    no_shutdown = 0;
  85    qemu_system_shutdown_request();
  86}
  87
  88void qmp_stop(Error **errp)
  89{
  90    if (runstate_check(RUN_STATE_INMIGRATE)) {
  91        autostart = 0;
  92    } else {
  93        vm_stop(RUN_STATE_PAUSED);
  94    }
  95}
  96
  97void qmp_system_reset(Error **errp)
  98{
  99    qemu_system_reset_request();
 100}
 101
 102void qmp_system_powerdown(Error **erp)
 103{
 104    qemu_system_powerdown_request();
 105}
 106
 107void qmp_cpu(int64_t index, Error **errp)
 108{
 109    /* Just do nothing */
 110}
 111
 112void qmp_cpu_add(int64_t id, Error **errp)
 113{
 114    if (current_machine->hot_add_cpu) {
 115        current_machine->hot_add_cpu(id, errp);
 116    } else {
 117        error_setg(errp, "Not supported");
 118    }
 119}
 120
 121#ifndef CONFIG_VNC
 122/* If VNC support is enabled, the "true" query-vnc command is
 123   defined in the VNC subsystem */
 124VncInfo *qmp_query_vnc(Error **errp)
 125{
 126    error_set(errp, QERR_FEATURE_DISABLED, "vnc");
 127    return NULL;
 128};
 129#endif
 130
 131#ifndef CONFIG_SPICE
 132/* If SPICE support is enabled, the "true" query-spice command is
 133   defined in the SPICE subsystem. Also note that we use a small
 134   trick to maintain query-spice's original behavior, which is not
 135   to be available in the namespace if SPICE is not compiled in */
 136SpiceInfo *qmp_query_spice(Error **errp)
 137{
 138    error_set(errp, QERR_COMMAND_NOT_FOUND, "query-spice");
 139    return NULL;
 140};
 141#endif
 142
 143static void iostatus_bdrv_it(void *opaque, BlockDriverState *bs)
 144{
 145    bdrv_iostatus_reset(bs);
 146}
 147
 148static void encrypted_bdrv_it(void *opaque, BlockDriverState *bs)
 149{
 150    Error **err = opaque;
 151
 152    if (!error_is_set(err) && bdrv_key_required(bs)) {
 153        error_set(err, QERR_DEVICE_ENCRYPTED, bdrv_get_device_name(bs),
 154                  bdrv_get_encrypted_filename(bs));
 155    }
 156}
 157
 158void qmp_cont(Error **errp)
 159{
 160    Error *local_err = NULL;
 161
 162    if (runstate_needs_reset()) {
 163        error_set(errp, QERR_RESET_REQUIRED);
 164        return;
 165    } else if (runstate_check(RUN_STATE_SUSPENDED)) {
 166        return;
 167    }
 168
 169    bdrv_iterate(iostatus_bdrv_it, NULL);
 170    bdrv_iterate(encrypted_bdrv_it, &local_err);
 171    if (local_err) {
 172        error_propagate(errp, local_err);
 173        return;
 174    }
 175
 176    if (runstate_check(RUN_STATE_INMIGRATE)) {
 177        autostart = 1;
 178    } else {
 179        vm_start();
 180    }
 181}
 182
 183void qmp_system_wakeup(Error **errp)
 184{
 185    qemu_system_wakeup_request(QEMU_WAKEUP_REASON_OTHER);
 186}
 187
 188ObjectPropertyInfoList *qmp_qom_list(const char *path, Error **errp)
 189{
 190    Object *obj;
 191    bool ambiguous = false;
 192    ObjectPropertyInfoList *props = NULL;
 193    ObjectProperty *prop;
 194
 195    obj = object_resolve_path(path, &ambiguous);
 196    if (obj == NULL) {
 197        error_set(errp, QERR_DEVICE_NOT_FOUND, path);
 198        return NULL;
 199    }
 200
 201    QTAILQ_FOREACH(prop, &obj->properties, node) {
 202        ObjectPropertyInfoList *entry = g_malloc0(sizeof(*entry));
 203
 204        entry->value = g_malloc0(sizeof(ObjectPropertyInfo));
 205        entry->next = props;
 206        props = entry;
 207
 208        entry->value->name = g_strdup(prop->name);
 209        entry->value->type = g_strdup(prop->type);
 210    }
 211
 212    return props;
 213}
 214
 215/* FIXME: teach qapi about how to pass through Visitors */
 216int qmp_qom_set(Monitor *mon, const QDict *qdict, QObject **ret)
 217{
 218    const char *path = qdict_get_str(qdict, "path");
 219    const char *property = qdict_get_str(qdict, "property");
 220    QObject *value = qdict_get(qdict, "value");
 221    Error *local_err = NULL;
 222    Object *obj;
 223
 224    obj = object_resolve_path(path, NULL);
 225    if (!obj) {
 226        error_set(&local_err, QERR_DEVICE_NOT_FOUND, path);
 227        goto out;
 228    }
 229
 230    object_property_set_qobject(obj, value, property, &local_err);
 231
 232out:
 233    if (local_err) {
 234        qerror_report_err(local_err);
 235        error_free(local_err);
 236        return -1;
 237    }
 238
 239    return 0;
 240}
 241
 242int qmp_qom_get(Monitor *mon, const QDict *qdict, QObject **ret)
 243{
 244    const char *path = qdict_get_str(qdict, "path");
 245    const char *property = qdict_get_str(qdict, "property");
 246    Error *local_err = NULL;
 247    Object *obj;
 248
 249    obj = object_resolve_path(path, NULL);
 250    if (!obj) {
 251        error_set(&local_err, QERR_DEVICE_NOT_FOUND, path);
 252        goto out;
 253    }
 254
 255    *ret = object_property_get_qobject(obj, property, &local_err);
 256
 257out:
 258    if (local_err) {
 259        qerror_report_err(local_err);
 260        error_free(local_err);
 261        return -1;
 262    }
 263
 264    return 0;
 265}
 266
 267void qmp_set_password(const char *protocol, const char *password,
 268                      bool has_connected, const char *connected, Error **errp)
 269{
 270    int disconnect_if_connected = 0;
 271    int fail_if_connected = 0;
 272    int rc;
 273
 274    if (has_connected) {
 275        if (strcmp(connected, "fail") == 0) {
 276            fail_if_connected = 1;
 277        } else if (strcmp(connected, "disconnect") == 0) {
 278            disconnect_if_connected = 1;
 279        } else if (strcmp(connected, "keep") == 0) {
 280            /* nothing */
 281        } else {
 282            error_set(errp, QERR_INVALID_PARAMETER, "connected");
 283            return;
 284        }
 285    }
 286
 287    if (strcmp(protocol, "spice") == 0) {
 288        if (!using_spice) {
 289            /* correct one? spice isn't a device ,,, */
 290            error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
 291            return;
 292        }
 293        rc = qemu_spice_set_passwd(password, fail_if_connected,
 294                                   disconnect_if_connected);
 295        if (rc != 0) {
 296            error_set(errp, QERR_SET_PASSWD_FAILED);
 297        }
 298        return;
 299    }
 300
 301    if (strcmp(protocol, "vnc") == 0) {
 302        if (fail_if_connected || disconnect_if_connected) {
 303            /* vnc supports "connected=keep" only */
 304            error_set(errp, QERR_INVALID_PARAMETER, "connected");
 305            return;
 306        }
 307        /* Note that setting an empty password will not disable login through
 308         * this interface. */
 309        rc = vnc_display_password(NULL, password);
 310        if (rc < 0) {
 311            error_set(errp, QERR_SET_PASSWD_FAILED);
 312        }
 313        return;
 314    }
 315
 316    error_set(errp, QERR_INVALID_PARAMETER, "protocol");
 317}
 318
 319void qmp_expire_password(const char *protocol, const char *whenstr,
 320                         Error **errp)
 321{
 322    time_t when;
 323    int rc;
 324
 325    if (strcmp(whenstr, "now") == 0) {
 326        when = 0;
 327    } else if (strcmp(whenstr, "never") == 0) {
 328        when = TIME_MAX;
 329    } else if (whenstr[0] == '+') {
 330        when = time(NULL) + strtoull(whenstr+1, NULL, 10);
 331    } else {
 332        when = strtoull(whenstr, NULL, 10);
 333    }
 334
 335    if (strcmp(protocol, "spice") == 0) {
 336        if (!using_spice) {
 337            /* correct one? spice isn't a device ,,, */
 338            error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
 339            return;
 340        }
 341        rc = qemu_spice_set_pw_expire(when);
 342        if (rc != 0) {
 343            error_set(errp, QERR_SET_PASSWD_FAILED);
 344        }
 345        return;
 346    }
 347
 348    if (strcmp(protocol, "vnc") == 0) {
 349        rc = vnc_display_pw_expire(NULL, when);
 350        if (rc != 0) {
 351            error_set(errp, QERR_SET_PASSWD_FAILED);
 352        }
 353        return;
 354    }
 355
 356    error_set(errp, QERR_INVALID_PARAMETER, "protocol");
 357}
 358
 359#ifdef CONFIG_VNC
 360void qmp_change_vnc_password(const char *password, Error **errp)
 361{
 362    if (vnc_display_password(NULL, password) < 0) {
 363        error_set(errp, QERR_SET_PASSWD_FAILED);
 364    }
 365}
 366
 367static void qmp_change_vnc_listen(const char *target, Error **errp)
 368{
 369    vnc_display_open(NULL, target, errp);
 370}
 371
 372static void qmp_change_vnc(const char *target, bool has_arg, const char *arg,
 373                           Error **errp)
 374{
 375    if (strcmp(target, "passwd") == 0 || strcmp(target, "password") == 0) {
 376        if (!has_arg) {
 377            error_set(errp, QERR_MISSING_PARAMETER, "password");
 378        } else {
 379            qmp_change_vnc_password(arg, errp);
 380        }
 381    } else {
 382        qmp_change_vnc_listen(target, errp);
 383    }
 384}
 385#else
 386void qmp_change_vnc_password(const char *password, Error **errp)
 387{
 388    error_set(errp, QERR_FEATURE_DISABLED, "vnc");
 389}
 390static void qmp_change_vnc(const char *target, bool has_arg, const char *arg,
 391                           Error **errp)
 392{
 393    error_set(errp, QERR_FEATURE_DISABLED, "vnc");
 394}
 395#endif /* !CONFIG_VNC */
 396
 397void qmp_change(const char *device, const char *target,
 398                bool has_arg, const char *arg, Error **err)
 399{
 400    if (strcmp(device, "vnc") == 0) {
 401        qmp_change_vnc(target, has_arg, arg, err);
 402    } else {
 403        qmp_change_blockdev(device, target, has_arg, arg, err);
 404    }
 405}
 406
 407static void qom_list_types_tramp(ObjectClass *klass, void *data)
 408{
 409    ObjectTypeInfoList *e, **pret = data;
 410    ObjectTypeInfo *info;
 411
 412    info = g_malloc0(sizeof(*info));
 413    info->name = g_strdup(object_class_get_name(klass));
 414
 415    e = g_malloc0(sizeof(*e));
 416    e->value = info;
 417    e->next = *pret;
 418    *pret = e;
 419}
 420
 421ObjectTypeInfoList *qmp_qom_list_types(bool has_implements,
 422                                       const char *implements,
 423                                       bool has_abstract,
 424                                       bool abstract,
 425                                       Error **errp)
 426{
 427    ObjectTypeInfoList *ret = NULL;
 428
 429    object_class_foreach(qom_list_types_tramp, implements, abstract, &ret);
 430
 431    return ret;
 432}
 433
 434DevicePropertyInfoList *qmp_device_list_properties(const char *typename,
 435                                                   Error **errp)
 436{
 437    ObjectClass *klass;
 438    Property *prop;
 439    DevicePropertyInfoList *prop_list = NULL;
 440
 441    klass = object_class_by_name(typename);
 442    if (klass == NULL) {
 443        error_set(errp, QERR_DEVICE_NOT_FOUND, typename);
 444        return NULL;
 445    }
 446
 447    klass = object_class_dynamic_cast(klass, TYPE_DEVICE);
 448    if (klass == NULL) {
 449        error_set(errp, QERR_INVALID_PARAMETER_VALUE,
 450                  "name", TYPE_DEVICE);
 451        return NULL;
 452    }
 453
 454    do {
 455        for (prop = DEVICE_CLASS(klass)->props; prop && prop->name; prop++) {
 456            DevicePropertyInfoList *entry;
 457            DevicePropertyInfo *info;
 458
 459            /*
 460             * TODO Properties without a parser are just for dirty hacks.
 461             * qdev_prop_ptr is the only such PropertyInfo.  It's marked
 462             * for removal.  This conditional should be removed along with
 463             * it.
 464             */
 465            if (!prop->info->set) {
 466                continue;           /* no way to set it, don't show */
 467            }
 468
 469            info = g_malloc0(sizeof(*info));
 470            info->name = g_strdup(prop->name);
 471            info->type = g_strdup(prop->info->legacy_name ?: prop->info->name);
 472
 473            entry = g_malloc0(sizeof(*entry));
 474            entry->value = info;
 475            entry->next = prop_list;
 476            prop_list = entry;
 477        }
 478        klass = object_class_get_parent(klass);
 479    } while (klass != object_class_by_name(TYPE_DEVICE));
 480
 481    return prop_list;
 482}
 483
 484CpuDefinitionInfoList *qmp_query_cpu_definitions(Error **errp)
 485{
 486    return arch_query_cpu_definitions(errp);
 487}
 488
 489void qmp_add_client(const char *protocol, const char *fdname,
 490                    bool has_skipauth, bool skipauth, bool has_tls, bool tls,
 491                    Error **errp)
 492{
 493    CharDriverState *s;
 494    int fd;
 495
 496    fd = monitor_get_fd(cur_mon, fdname, errp);
 497    if (fd < 0) {
 498        return;
 499    }
 500
 501    if (strcmp(protocol, "spice") == 0) {
 502        if (!using_spice) {
 503            error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
 504            close(fd);
 505            return;
 506        }
 507        skipauth = has_skipauth ? skipauth : false;
 508        tls = has_tls ? tls : false;
 509        if (qemu_spice_display_add_client(fd, skipauth, tls) < 0) {
 510            error_setg(errp, "spice failed to add client");
 511            close(fd);
 512        }
 513        return;
 514#ifdef CONFIG_VNC
 515    } else if (strcmp(protocol, "vnc") == 0) {
 516        skipauth = has_skipauth ? skipauth : false;
 517        vnc_display_add_client(NULL, fd, skipauth);
 518        return;
 519#endif
 520    } else if ((s = qemu_chr_find(protocol)) != NULL) {
 521        if (qemu_chr_add_client(s, fd) < 0) {
 522            error_setg(errp, "failed to add client");
 523            close(fd);
 524            return;
 525        }
 526        return;
 527    }
 528
 529    error_setg(errp, "protocol '%s' is invalid", protocol);
 530    close(fd);
 531}
 532