target-arm: Add checks that cpreg raw accesses are handled
[qemu/ar7.git] / qmp.c
blob7f2d25a4928d1d5299337b3cc9eb3aea10603e9f
1 /*
2 * QEMU Management Protocol
4 * Copyright IBM, Corp. 2011
6 * Authors:
7 * Anthony Liguori <aliguori@us.ibm.com>
9 * This work is licensed under the terms of the GNU GPL, version 2. See
10 * the COPYING file in the top-level directory.
12 * Contributions after 2012-01-13 are licensed under the terms of the
13 * GNU GPL, version 2 or (at your option) any later version.
16 #include "qemu-common.h"
17 #include "sysemu/sysemu.h"
18 #include "qmp-commands.h"
19 #include "sysemu/char.h"
20 #include "ui/qemu-spice.h"
21 #include "ui/vnc.h"
22 #include "sysemu/kvm.h"
23 #include "sysemu/arch_init.h"
24 #include "hw/qdev.h"
25 #include "sysemu/blockdev.h"
26 #include "qom/qom-qobject.h"
27 #include "qapi/qmp/qobject.h"
28 #include "qapi/qmp-input-visitor.h"
29 #include "hw/boards.h"
30 #include "qom/object_interfaces.h"
31 #include "hw/mem/pc-dimm.h"
32 #include "hw/acpi/acpi_dev_interface.h"
34 NameInfo *qmp_query_name(Error **errp)
36 NameInfo *info = g_malloc0(sizeof(*info));
38 if (qemu_name) {
39 info->has_name = true;
40 info->name = g_strdup(qemu_name);
43 return info;
46 VersionInfo *qmp_query_version(Error **errp)
48 VersionInfo *info = g_malloc0(sizeof(*info));
49 const char *version = QEMU_VERSION;
50 char *tmp;
52 info->qemu.major = strtol(version, &tmp, 10);
53 tmp++;
54 info->qemu.minor = strtol(tmp, &tmp, 10);
55 tmp++;
56 info->qemu.micro = strtol(tmp, &tmp, 10);
57 info->package = g_strdup(QEMU_PKGVERSION);
59 return info;
62 KvmInfo *qmp_query_kvm(Error **errp)
64 KvmInfo *info = g_malloc0(sizeof(*info));
66 info->enabled = kvm_enabled();
67 info->present = kvm_available();
69 return info;
72 UuidInfo *qmp_query_uuid(Error **errp)
74 UuidInfo *info = g_malloc0(sizeof(*info));
75 char uuid[64];
77 snprintf(uuid, sizeof(uuid), UUID_FMT, qemu_uuid[0], qemu_uuid[1],
78 qemu_uuid[2], qemu_uuid[3], qemu_uuid[4], qemu_uuid[5],
79 qemu_uuid[6], qemu_uuid[7], qemu_uuid[8], qemu_uuid[9],
80 qemu_uuid[10], qemu_uuid[11], qemu_uuid[12], qemu_uuid[13],
81 qemu_uuid[14], qemu_uuid[15]);
83 info->UUID = g_strdup(uuid);
84 return info;
87 void qmp_quit(Error **errp)
89 no_shutdown = 0;
90 qemu_system_shutdown_request();
93 void qmp_stop(Error **errp)
95 if (runstate_check(RUN_STATE_INMIGRATE)) {
96 autostart = 0;
97 } else {
98 vm_stop(RUN_STATE_PAUSED);
102 void qmp_system_reset(Error **errp)
104 qemu_system_reset_request();
107 void qmp_system_powerdown(Error **erp)
109 qemu_system_powerdown_request();
112 void qmp_cpu(int64_t index, Error **errp)
114 /* Just do nothing */
117 void qmp_cpu_add(int64_t id, Error **errp)
119 MachineClass *mc;
121 mc = MACHINE_GET_CLASS(current_machine);
122 if (mc->hot_add_cpu) {
123 mc->hot_add_cpu(id, errp);
124 } else {
125 error_setg(errp, "Not supported");
129 #ifndef CONFIG_VNC
130 /* If VNC support is enabled, the "true" query-vnc command is
131 defined in the VNC subsystem */
132 VncInfo *qmp_query_vnc(Error **errp)
134 error_set(errp, QERR_FEATURE_DISABLED, "vnc");
135 return NULL;
137 #endif
139 #ifndef CONFIG_SPICE
141 * qmp-commands.hx ensures that QMP command query-spice exists only
142 * #ifdef CONFIG_SPICE. Necessary for an accurate query-commands
143 * result. However, the QAPI schema is blissfully unaware of that,
144 * and the QAPI code generator happily generates a dead
145 * qmp_marshal_input_query_spice() that calls qmp_query_spice().
146 * Provide it one, or else linking fails.
147 * FIXME Educate the QAPI schema on CONFIG_SPICE.
149 SpiceInfo *qmp_query_spice(Error **errp)
151 abort();
153 #endif
155 void qmp_cont(Error **errp)
157 BlockDriverState *bs;
159 if (runstate_needs_reset()) {
160 error_setg(errp, "Resetting the Virtual Machine is required");
161 return;
162 } else if (runstate_check(RUN_STATE_SUSPENDED)) {
163 return;
166 for (bs = bdrv_next(NULL); bs; bs = bdrv_next(bs)) {
167 bdrv_iostatus_reset(bs);
169 for (bs = bdrv_next(NULL); bs; bs = bdrv_next(bs)) {
170 if (bdrv_key_required(bs)) {
171 error_set(errp, QERR_DEVICE_ENCRYPTED,
172 bdrv_get_device_name(bs),
173 bdrv_get_encrypted_filename(bs));
174 return;
178 if (runstate_check(RUN_STATE_INMIGRATE)) {
179 autostart = 1;
180 } else {
181 vm_start();
185 void qmp_system_wakeup(Error **errp)
187 qemu_system_wakeup_request(QEMU_WAKEUP_REASON_OTHER);
190 ObjectPropertyInfoList *qmp_qom_list(const char *path, Error **errp)
192 Object *obj;
193 bool ambiguous = false;
194 ObjectPropertyInfoList *props = NULL;
195 ObjectProperty *prop;
197 obj = object_resolve_path(path, &ambiguous);
198 if (obj == NULL) {
199 if (ambiguous) {
200 error_setg(errp, "Path '%s' is ambiguous", path);
201 } else {
202 error_set(errp, QERR_DEVICE_NOT_FOUND, path);
204 return NULL;
207 QTAILQ_FOREACH(prop, &obj->properties, node) {
208 ObjectPropertyInfoList *entry = g_malloc0(sizeof(*entry));
210 entry->value = g_malloc0(sizeof(ObjectPropertyInfo));
211 entry->next = props;
212 props = entry;
214 entry->value->name = g_strdup(prop->name);
215 entry->value->type = g_strdup(prop->type);
218 return props;
221 /* FIXME: teach qapi about how to pass through Visitors */
222 int qmp_qom_set(Monitor *mon, const QDict *qdict, QObject **ret)
224 const char *path = qdict_get_str(qdict, "path");
225 const char *property = qdict_get_str(qdict, "property");
226 QObject *value = qdict_get(qdict, "value");
227 Error *local_err = NULL;
228 Object *obj;
230 obj = object_resolve_path(path, NULL);
231 if (!obj) {
232 error_set(&local_err, QERR_DEVICE_NOT_FOUND, path);
233 goto out;
236 object_property_set_qobject(obj, value, property, &local_err);
238 out:
239 if (local_err) {
240 qerror_report_err(local_err);
241 error_free(local_err);
242 return -1;
245 return 0;
248 int qmp_qom_get(Monitor *mon, const QDict *qdict, QObject **ret)
250 const char *path = qdict_get_str(qdict, "path");
251 const char *property = qdict_get_str(qdict, "property");
252 Error *local_err = NULL;
253 Object *obj;
255 obj = object_resolve_path(path, NULL);
256 if (!obj) {
257 error_set(&local_err, QERR_DEVICE_NOT_FOUND, path);
258 goto out;
261 *ret = object_property_get_qobject(obj, property, &local_err);
263 out:
264 if (local_err) {
265 qerror_report_err(local_err);
266 error_free(local_err);
267 return -1;
270 return 0;
273 void qmp_set_password(const char *protocol, const char *password,
274 bool has_connected, const char *connected, Error **errp)
276 int disconnect_if_connected = 0;
277 int fail_if_connected = 0;
278 int rc;
280 if (has_connected) {
281 if (strcmp(connected, "fail") == 0) {
282 fail_if_connected = 1;
283 } else if (strcmp(connected, "disconnect") == 0) {
284 disconnect_if_connected = 1;
285 } else if (strcmp(connected, "keep") == 0) {
286 /* nothing */
287 } else {
288 error_set(errp, QERR_INVALID_PARAMETER, "connected");
289 return;
293 if (strcmp(protocol, "spice") == 0) {
294 if (!qemu_using_spice(errp)) {
295 return;
297 rc = qemu_spice_set_passwd(password, fail_if_connected,
298 disconnect_if_connected);
299 if (rc != 0) {
300 error_set(errp, QERR_SET_PASSWD_FAILED);
302 return;
305 if (strcmp(protocol, "vnc") == 0) {
306 if (fail_if_connected || disconnect_if_connected) {
307 /* vnc supports "connected=keep" only */
308 error_set(errp, QERR_INVALID_PARAMETER, "connected");
309 return;
311 /* Note that setting an empty password will not disable login through
312 * this interface. */
313 rc = vnc_display_password(NULL, password);
314 if (rc < 0) {
315 error_set(errp, QERR_SET_PASSWD_FAILED);
317 return;
320 error_set(errp, QERR_INVALID_PARAMETER, "protocol");
323 void qmp_expire_password(const char *protocol, const char *whenstr,
324 Error **errp)
326 time_t when;
327 int rc;
329 if (strcmp(whenstr, "now") == 0) {
330 when = 0;
331 } else if (strcmp(whenstr, "never") == 0) {
332 when = TIME_MAX;
333 } else if (whenstr[0] == '+') {
334 when = time(NULL) + strtoull(whenstr+1, NULL, 10);
335 } else {
336 when = strtoull(whenstr, NULL, 10);
339 if (strcmp(protocol, "spice") == 0) {
340 if (!qemu_using_spice(errp)) {
341 return;
343 rc = qemu_spice_set_pw_expire(when);
344 if (rc != 0) {
345 error_set(errp, QERR_SET_PASSWD_FAILED);
347 return;
350 if (strcmp(protocol, "vnc") == 0) {
351 rc = vnc_display_pw_expire(NULL, when);
352 if (rc != 0) {
353 error_set(errp, QERR_SET_PASSWD_FAILED);
355 return;
358 error_set(errp, QERR_INVALID_PARAMETER, "protocol");
361 #ifdef CONFIG_VNC
362 void qmp_change_vnc_password(const char *password, Error **errp)
364 if (vnc_display_password(NULL, password) < 0) {
365 error_set(errp, QERR_SET_PASSWD_FAILED);
369 static void qmp_change_vnc_listen(const char *target, Error **errp)
371 QemuOptsList *olist = qemu_find_opts("vnc");
372 QemuOpts *opts;
374 if (strstr(target, "id=")) {
375 error_setg(errp, "id not supported");
376 return;
379 opts = qemu_opts_find(olist, "default");
380 if (opts) {
381 qemu_opts_del(opts);
383 opts = vnc_parse_func(target);
384 vnc_display_open("default", errp);
387 static void qmp_change_vnc(const char *target, bool has_arg, const char *arg,
388 Error **errp)
390 if (strcmp(target, "passwd") == 0 || strcmp(target, "password") == 0) {
391 if (!has_arg) {
392 error_set(errp, QERR_MISSING_PARAMETER, "password");
393 } else {
394 qmp_change_vnc_password(arg, errp);
396 } else {
397 qmp_change_vnc_listen(target, errp);
400 #else
401 void qmp_change_vnc_password(const char *password, Error **errp)
403 error_set(errp, QERR_FEATURE_DISABLED, "vnc");
405 static void qmp_change_vnc(const char *target, bool has_arg, const char *arg,
406 Error **errp)
408 error_set(errp, QERR_FEATURE_DISABLED, "vnc");
410 #endif /* !CONFIG_VNC */
412 void qmp_change(const char *device, const char *target,
413 bool has_arg, const char *arg, Error **errp)
415 if (strcmp(device, "vnc") == 0) {
416 qmp_change_vnc(target, has_arg, arg, errp);
417 } else {
418 qmp_change_blockdev(device, target, arg, errp);
422 static void qom_list_types_tramp(ObjectClass *klass, void *data)
424 ObjectTypeInfoList *e, **pret = data;
425 ObjectTypeInfo *info;
427 info = g_malloc0(sizeof(*info));
428 info->name = g_strdup(object_class_get_name(klass));
430 e = g_malloc0(sizeof(*e));
431 e->value = info;
432 e->next = *pret;
433 *pret = e;
436 ObjectTypeInfoList *qmp_qom_list_types(bool has_implements,
437 const char *implements,
438 bool has_abstract,
439 bool abstract,
440 Error **errp)
442 ObjectTypeInfoList *ret = NULL;
444 object_class_foreach(qom_list_types_tramp, implements, abstract, &ret);
446 return ret;
449 /* Return a DevicePropertyInfo for a qdev property.
451 * If a qdev property with the given name does not exist, use the given default
452 * type. If the qdev property info should not be shown, return NULL.
454 * The caller must free the return value.
456 static DevicePropertyInfo *make_device_property_info(ObjectClass *klass,
457 const char *name,
458 const char *default_type,
459 const char *description)
461 DevicePropertyInfo *info;
462 Property *prop;
464 do {
465 for (prop = DEVICE_CLASS(klass)->props; prop && prop->name; prop++) {
466 if (strcmp(name, prop->name) != 0) {
467 continue;
471 * TODO Properties without a parser are just for dirty hacks.
472 * qdev_prop_ptr is the only such PropertyInfo. It's marked
473 * for removal. This conditional should be removed along with
474 * it.
476 if (!prop->info->set) {
477 return NULL; /* no way to set it, don't show */
480 info = g_malloc0(sizeof(*info));
481 info->name = g_strdup(prop->name);
482 info->type = g_strdup(prop->info->name);
483 info->has_description = !!prop->info->description;
484 info->description = g_strdup(prop->info->description);
485 return info;
487 klass = object_class_get_parent(klass);
488 } while (klass != object_class_by_name(TYPE_DEVICE));
490 /* Not a qdev property, use the default type */
491 info = g_malloc0(sizeof(*info));
492 info->name = g_strdup(name);
493 info->type = g_strdup(default_type);
494 info->has_description = !!description;
495 info->description = g_strdup(description);
497 return info;
500 DevicePropertyInfoList *qmp_device_list_properties(const char *typename,
501 Error **errp)
503 ObjectClass *klass;
504 Object *obj;
505 ObjectProperty *prop;
506 DevicePropertyInfoList *prop_list = NULL;
508 klass = object_class_by_name(typename);
509 if (klass == NULL) {
510 error_set(errp, QERR_DEVICE_NOT_FOUND, typename);
511 return NULL;
514 klass = object_class_dynamic_cast(klass, TYPE_DEVICE);
515 if (klass == NULL) {
516 error_set(errp, QERR_INVALID_PARAMETER_VALUE,
517 "name", TYPE_DEVICE);
518 return NULL;
521 obj = object_new(typename);
523 QTAILQ_FOREACH(prop, &obj->properties, node) {
524 DevicePropertyInfo *info;
525 DevicePropertyInfoList *entry;
527 /* Skip Object and DeviceState properties */
528 if (strcmp(prop->name, "type") == 0 ||
529 strcmp(prop->name, "realized") == 0 ||
530 strcmp(prop->name, "hotpluggable") == 0 ||
531 strcmp(prop->name, "hotplugged") == 0 ||
532 strcmp(prop->name, "parent_bus") == 0) {
533 continue;
536 /* Skip legacy properties since they are just string versions of
537 * properties that we already list.
539 if (strstart(prop->name, "legacy-", NULL)) {
540 continue;
543 info = make_device_property_info(klass, prop->name, prop->type,
544 prop->description);
545 if (!info) {
546 continue;
549 entry = g_malloc0(sizeof(*entry));
550 entry->value = info;
551 entry->next = prop_list;
552 prop_list = entry;
555 object_unref(obj);
557 return prop_list;
560 CpuDefinitionInfoList *qmp_query_cpu_definitions(Error **errp)
562 return arch_query_cpu_definitions(errp);
565 void qmp_add_client(const char *protocol, const char *fdname,
566 bool has_skipauth, bool skipauth, bool has_tls, bool tls,
567 Error **errp)
569 CharDriverState *s;
570 int fd;
572 fd = monitor_get_fd(cur_mon, fdname, errp);
573 if (fd < 0) {
574 return;
577 if (strcmp(protocol, "spice") == 0) {
578 if (!qemu_using_spice(errp)) {
579 close(fd);
580 return;
582 skipauth = has_skipauth ? skipauth : false;
583 tls = has_tls ? tls : false;
584 if (qemu_spice_display_add_client(fd, skipauth, tls) < 0) {
585 error_setg(errp, "spice failed to add client");
586 close(fd);
588 return;
589 #ifdef CONFIG_VNC
590 } else if (strcmp(protocol, "vnc") == 0) {
591 skipauth = has_skipauth ? skipauth : false;
592 vnc_display_add_client(NULL, fd, skipauth);
593 return;
594 #endif
595 } else if ((s = qemu_chr_find(protocol)) != NULL) {
596 if (qemu_chr_add_client(s, fd) < 0) {
597 error_setg(errp, "failed to add client");
598 close(fd);
599 return;
601 return;
604 error_setg(errp, "protocol '%s' is invalid", protocol);
605 close(fd);
608 void object_add(const char *type, const char *id, const QDict *qdict,
609 Visitor *v, Error **errp)
611 Object *obj;
612 ObjectClass *klass;
613 const QDictEntry *e;
614 Error *local_err = NULL;
616 klass = object_class_by_name(type);
617 if (!klass) {
618 error_setg(errp, "invalid object type: %s", type);
619 return;
622 if (!object_class_dynamic_cast(klass, TYPE_USER_CREATABLE)) {
623 error_setg(errp, "object type '%s' isn't supported by object-add",
624 type);
625 return;
628 if (object_class_is_abstract(klass)) {
629 error_setg(errp, "object type '%s' is abstract", type);
630 return;
633 obj = object_new(type);
634 if (qdict) {
635 for (e = qdict_first(qdict); e; e = qdict_next(qdict, e)) {
636 object_property_set(obj, v, e->key, &local_err);
637 if (local_err) {
638 goto out;
643 object_property_add_child(container_get(object_get_root(), "/objects"),
644 id, obj, &local_err);
645 if (local_err) {
646 goto out;
649 user_creatable_complete(obj, &local_err);
650 if (local_err) {
651 object_property_del(container_get(object_get_root(), "/objects"),
652 id, &error_abort);
653 goto out;
655 out:
656 if (local_err) {
657 error_propagate(errp, local_err);
659 object_unref(obj);
662 int qmp_object_add(Monitor *mon, const QDict *qdict, QObject **ret)
664 const char *type = qdict_get_str(qdict, "qom-type");
665 const char *id = qdict_get_str(qdict, "id");
666 QObject *props = qdict_get(qdict, "props");
667 const QDict *pdict = NULL;
668 Error *local_err = NULL;
669 QmpInputVisitor *qiv;
671 if (props) {
672 pdict = qobject_to_qdict(props);
673 if (!pdict) {
674 error_set(&local_err, QERR_INVALID_PARAMETER_TYPE, "props", "dict");
675 goto out;
679 qiv = qmp_input_visitor_new(props);
680 object_add(type, id, pdict, qmp_input_get_visitor(qiv), &local_err);
681 qmp_input_visitor_cleanup(qiv);
683 out:
684 if (local_err) {
685 qerror_report_err(local_err);
686 error_free(local_err);
687 return -1;
690 return 0;
693 void qmp_object_del(const char *id, Error **errp)
695 Object *container;
696 Object *obj;
698 container = container_get(object_get_root(), "/objects");
699 obj = object_resolve_path_component(container, id);
700 if (!obj) {
701 error_setg(errp, "object id not found");
702 return;
704 object_unparent(obj);
707 MemoryDeviceInfoList *qmp_query_memory_devices(Error **errp)
709 MemoryDeviceInfoList *head = NULL;
710 MemoryDeviceInfoList **prev = &head;
712 qmp_pc_dimm_device_list(qdev_get_machine(), &prev);
714 return head;
717 ACPIOSTInfoList *qmp_query_acpi_ospm_status(Error **errp)
719 bool ambig;
720 ACPIOSTInfoList *head = NULL;
721 ACPIOSTInfoList **prev = &head;
722 Object *obj = object_resolve_path_type("", TYPE_ACPI_DEVICE_IF, &ambig);
724 if (obj) {
725 AcpiDeviceIfClass *adevc = ACPI_DEVICE_IF_GET_CLASS(obj);
726 AcpiDeviceIf *adev = ACPI_DEVICE_IF(obj);
728 adevc->ospm_status(adev, &prev);
729 } else {
730 error_setg(errp, "command is not supported, missing ACPI device");
733 return head;