acpi unit-test: hook to rebuild expected aml files
[qemu/ar7.git] / qmp.c
blob0f46171aad09fefa4d20f7530ff01ff49869424a
1 /*
2 * QEMU Management Protocol
4 * Copyright IBM, Corp. 2011
6 * Authors:
7 * Anthony Liguori <aliguori@us.ibm.com>
9 * This work is licensed under the terms of the GNU GPL, version 2. See
10 * the COPYING file in the top-level directory.
12 * Contributions after 2012-01-13 are licensed under the terms of the
13 * GNU GPL, version 2 or (at your option) any later version.
16 #include "qemu-common.h"
17 #include "sysemu/sysemu.h"
18 #include "qmp-commands.h"
19 #include "sysemu/char.h"
20 #include "ui/qemu-spice.h"
21 #include "ui/vnc.h"
22 #include "sysemu/kvm.h"
23 #include "sysemu/arch_init.h"
24 #include "hw/qdev.h"
25 #include "sysemu/blockdev.h"
26 #include "qom/qom-qobject.h"
27 #include "qapi/qmp/qobject.h"
28 #include "qapi/qmp-input-visitor.h"
29 #include "hw/boards.h"
31 NameInfo *qmp_query_name(Error **errp)
33 NameInfo *info = g_malloc0(sizeof(*info));
35 if (qemu_name) {
36 info->has_name = true;
37 info->name = g_strdup(qemu_name);
40 return info;
43 VersionInfo *qmp_query_version(Error **err)
45 VersionInfo *info = g_malloc0(sizeof(*info));
46 const char *version = QEMU_VERSION;
47 char *tmp;
49 info->qemu.major = strtol(version, &tmp, 10);
50 tmp++;
51 info->qemu.minor = strtol(tmp, &tmp, 10);
52 tmp++;
53 info->qemu.micro = strtol(tmp, &tmp, 10);
54 info->package = g_strdup(QEMU_PKGVERSION);
56 return info;
59 KvmInfo *qmp_query_kvm(Error **errp)
61 KvmInfo *info = g_malloc0(sizeof(*info));
63 info->enabled = kvm_enabled();
64 info->present = kvm_available();
66 return info;
69 UuidInfo *qmp_query_uuid(Error **errp)
71 UuidInfo *info = g_malloc0(sizeof(*info));
72 char uuid[64];
74 snprintf(uuid, sizeof(uuid), UUID_FMT, qemu_uuid[0], qemu_uuid[1],
75 qemu_uuid[2], qemu_uuid[3], qemu_uuid[4], qemu_uuid[5],
76 qemu_uuid[6], qemu_uuid[7], qemu_uuid[8], qemu_uuid[9],
77 qemu_uuid[10], qemu_uuid[11], qemu_uuid[12], qemu_uuid[13],
78 qemu_uuid[14], qemu_uuid[15]);
80 info->UUID = g_strdup(uuid);
81 return info;
84 void qmp_quit(Error **err)
86 no_shutdown = 0;
87 qemu_system_shutdown_request();
90 void qmp_stop(Error **errp)
92 if (runstate_check(RUN_STATE_INMIGRATE)) {
93 autostart = 0;
94 } else {
95 vm_stop(RUN_STATE_PAUSED);
99 void qmp_system_reset(Error **errp)
101 qemu_system_reset_request();
104 void qmp_system_powerdown(Error **erp)
106 qemu_system_powerdown_request();
109 void qmp_cpu(int64_t index, Error **errp)
111 /* Just do nothing */
114 void qmp_cpu_add(int64_t id, Error **errp)
116 if (current_machine->hot_add_cpu) {
117 current_machine->hot_add_cpu(id, errp);
118 } else {
119 error_setg(errp, "Not supported");
123 #ifndef CONFIG_VNC
124 /* If VNC support is enabled, the "true" query-vnc command is
125 defined in the VNC subsystem */
126 VncInfo *qmp_query_vnc(Error **errp)
128 error_set(errp, QERR_FEATURE_DISABLED, "vnc");
129 return NULL;
131 #endif
133 #ifndef CONFIG_SPICE
134 /* If SPICE support is enabled, the "true" query-spice command is
135 defined in the SPICE subsystem. Also note that we use a small
136 trick to maintain query-spice's original behavior, which is not
137 to be available in the namespace if SPICE is not compiled in */
138 SpiceInfo *qmp_query_spice(Error **errp)
140 error_set(errp, QERR_COMMAND_NOT_FOUND, "query-spice");
141 return NULL;
143 #endif
145 static void iostatus_bdrv_it(void *opaque, BlockDriverState *bs)
147 bdrv_iostatus_reset(bs);
150 static void encrypted_bdrv_it(void *opaque, BlockDriverState *bs)
152 Error **err = opaque;
154 if (!error_is_set(err) && bdrv_key_required(bs)) {
155 error_set(err, QERR_DEVICE_ENCRYPTED, bdrv_get_device_name(bs),
156 bdrv_get_encrypted_filename(bs));
160 void qmp_cont(Error **errp)
162 Error *local_err = NULL;
164 if (runstate_needs_reset()) {
165 error_set(errp, QERR_RESET_REQUIRED);
166 return;
167 } else if (runstate_check(RUN_STATE_SUSPENDED)) {
168 return;
171 bdrv_iterate(iostatus_bdrv_it, NULL);
172 bdrv_iterate(encrypted_bdrv_it, &local_err);
173 if (local_err) {
174 error_propagate(errp, local_err);
175 return;
178 if (runstate_check(RUN_STATE_INMIGRATE)) {
179 autostart = 1;
180 } else {
181 vm_start();
185 void qmp_system_wakeup(Error **errp)
187 qemu_system_wakeup_request(QEMU_WAKEUP_REASON_OTHER);
190 ObjectPropertyInfoList *qmp_qom_list(const char *path, Error **errp)
192 Object *obj;
193 bool ambiguous = false;
194 ObjectPropertyInfoList *props = NULL;
195 ObjectProperty *prop;
197 obj = object_resolve_path(path, &ambiguous);
198 if (obj == NULL) {
199 error_set(errp, QERR_DEVICE_NOT_FOUND, path);
200 return NULL;
203 QTAILQ_FOREACH(prop, &obj->properties, node) {
204 ObjectPropertyInfoList *entry = g_malloc0(sizeof(*entry));
206 entry->value = g_malloc0(sizeof(ObjectPropertyInfo));
207 entry->next = props;
208 props = entry;
210 entry->value->name = g_strdup(prop->name);
211 entry->value->type = g_strdup(prop->type);
214 return props;
217 /* FIXME: teach qapi about how to pass through Visitors */
218 int qmp_qom_set(Monitor *mon, const QDict *qdict, QObject **ret)
220 const char *path = qdict_get_str(qdict, "path");
221 const char *property = qdict_get_str(qdict, "property");
222 QObject *value = qdict_get(qdict, "value");
223 Error *local_err = NULL;
224 Object *obj;
226 obj = object_resolve_path(path, NULL);
227 if (!obj) {
228 error_set(&local_err, QERR_DEVICE_NOT_FOUND, path);
229 goto out;
232 object_property_set_qobject(obj, value, property, &local_err);
234 out:
235 if (local_err) {
236 qerror_report_err(local_err);
237 error_free(local_err);
238 return -1;
241 return 0;
244 int qmp_qom_get(Monitor *mon, const QDict *qdict, QObject **ret)
246 const char *path = qdict_get_str(qdict, "path");
247 const char *property = qdict_get_str(qdict, "property");
248 Error *local_err = NULL;
249 Object *obj;
251 obj = object_resolve_path(path, NULL);
252 if (!obj) {
253 error_set(&local_err, QERR_DEVICE_NOT_FOUND, path);
254 goto out;
257 *ret = object_property_get_qobject(obj, property, &local_err);
259 out:
260 if (local_err) {
261 qerror_report_err(local_err);
262 error_free(local_err);
263 return -1;
266 return 0;
269 void qmp_set_password(const char *protocol, const char *password,
270 bool has_connected, const char *connected, Error **errp)
272 int disconnect_if_connected = 0;
273 int fail_if_connected = 0;
274 int rc;
276 if (has_connected) {
277 if (strcmp(connected, "fail") == 0) {
278 fail_if_connected = 1;
279 } else if (strcmp(connected, "disconnect") == 0) {
280 disconnect_if_connected = 1;
281 } else if (strcmp(connected, "keep") == 0) {
282 /* nothing */
283 } else {
284 error_set(errp, QERR_INVALID_PARAMETER, "connected");
285 return;
289 if (strcmp(protocol, "spice") == 0) {
290 if (!using_spice) {
291 /* correct one? spice isn't a device ,,, */
292 error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
293 return;
295 rc = qemu_spice_set_passwd(password, fail_if_connected,
296 disconnect_if_connected);
297 if (rc != 0) {
298 error_set(errp, QERR_SET_PASSWD_FAILED);
300 return;
303 if (strcmp(protocol, "vnc") == 0) {
304 if (fail_if_connected || disconnect_if_connected) {
305 /* vnc supports "connected=keep" only */
306 error_set(errp, QERR_INVALID_PARAMETER, "connected");
307 return;
309 /* Note that setting an empty password will not disable login through
310 * this interface. */
311 rc = vnc_display_password(NULL, password);
312 if (rc < 0) {
313 error_set(errp, QERR_SET_PASSWD_FAILED);
315 return;
318 error_set(errp, QERR_INVALID_PARAMETER, "protocol");
321 void qmp_expire_password(const char *protocol, const char *whenstr,
322 Error **errp)
324 time_t when;
325 int rc;
327 if (strcmp(whenstr, "now") == 0) {
328 when = 0;
329 } else if (strcmp(whenstr, "never") == 0) {
330 when = TIME_MAX;
331 } else if (whenstr[0] == '+') {
332 when = time(NULL) + strtoull(whenstr+1, NULL, 10);
333 } else {
334 when = strtoull(whenstr, NULL, 10);
337 if (strcmp(protocol, "spice") == 0) {
338 if (!using_spice) {
339 /* correct one? spice isn't a device ,,, */
340 error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
341 return;
343 rc = qemu_spice_set_pw_expire(when);
344 if (rc != 0) {
345 error_set(errp, QERR_SET_PASSWD_FAILED);
347 return;
350 if (strcmp(protocol, "vnc") == 0) {
351 rc = vnc_display_pw_expire(NULL, when);
352 if (rc != 0) {
353 error_set(errp, QERR_SET_PASSWD_FAILED);
355 return;
358 error_set(errp, QERR_INVALID_PARAMETER, "protocol");
361 #ifdef CONFIG_VNC
362 void qmp_change_vnc_password(const char *password, Error **errp)
364 if (vnc_display_password(NULL, password) < 0) {
365 error_set(errp, QERR_SET_PASSWD_FAILED);
369 static void qmp_change_vnc_listen(const char *target, Error **errp)
371 vnc_display_open(NULL, target, errp);
374 static void qmp_change_vnc(const char *target, bool has_arg, const char *arg,
375 Error **errp)
377 if (strcmp(target, "passwd") == 0 || strcmp(target, "password") == 0) {
378 if (!has_arg) {
379 error_set(errp, QERR_MISSING_PARAMETER, "password");
380 } else {
381 qmp_change_vnc_password(arg, errp);
383 } else {
384 qmp_change_vnc_listen(target, errp);
387 #else
388 void qmp_change_vnc_password(const char *password, Error **errp)
390 error_set(errp, QERR_FEATURE_DISABLED, "vnc");
392 static void qmp_change_vnc(const char *target, bool has_arg, const char *arg,
393 Error **errp)
395 error_set(errp, QERR_FEATURE_DISABLED, "vnc");
397 #endif /* !CONFIG_VNC */
399 void qmp_change(const char *device, const char *target,
400 bool has_arg, const char *arg, Error **err)
402 if (strcmp(device, "vnc") == 0) {
403 qmp_change_vnc(target, has_arg, arg, err);
404 } else {
405 qmp_change_blockdev(device, target, arg, err);
409 static void qom_list_types_tramp(ObjectClass *klass, void *data)
411 ObjectTypeInfoList *e, **pret = data;
412 ObjectTypeInfo *info;
414 info = g_malloc0(sizeof(*info));
415 info->name = g_strdup(object_class_get_name(klass));
417 e = g_malloc0(sizeof(*e));
418 e->value = info;
419 e->next = *pret;
420 *pret = e;
423 ObjectTypeInfoList *qmp_qom_list_types(bool has_implements,
424 const char *implements,
425 bool has_abstract,
426 bool abstract,
427 Error **errp)
429 ObjectTypeInfoList *ret = NULL;
431 object_class_foreach(qom_list_types_tramp, implements, abstract, &ret);
433 return ret;
436 DevicePropertyInfoList *qmp_device_list_properties(const char *typename,
437 Error **errp)
439 ObjectClass *klass;
440 Property *prop;
441 DevicePropertyInfoList *prop_list = NULL;
443 klass = object_class_by_name(typename);
444 if (klass == NULL) {
445 error_set(errp, QERR_DEVICE_NOT_FOUND, typename);
446 return NULL;
449 klass = object_class_dynamic_cast(klass, TYPE_DEVICE);
450 if (klass == NULL) {
451 error_set(errp, QERR_INVALID_PARAMETER_VALUE,
452 "name", TYPE_DEVICE);
453 return NULL;
456 do {
457 for (prop = DEVICE_CLASS(klass)->props; prop && prop->name; prop++) {
458 DevicePropertyInfoList *entry;
459 DevicePropertyInfo *info;
462 * TODO Properties without a parser are just for dirty hacks.
463 * qdev_prop_ptr is the only such PropertyInfo. It's marked
464 * for removal. This conditional should be removed along with
465 * it.
467 if (!prop->info->set) {
468 continue; /* no way to set it, don't show */
471 info = g_malloc0(sizeof(*info));
472 info->name = g_strdup(prop->name);
473 info->type = g_strdup(prop->info->legacy_name ?: prop->info->name);
475 entry = g_malloc0(sizeof(*entry));
476 entry->value = info;
477 entry->next = prop_list;
478 prop_list = entry;
480 klass = object_class_get_parent(klass);
481 } while (klass != object_class_by_name(TYPE_DEVICE));
483 return prop_list;
486 CpuDefinitionInfoList *qmp_query_cpu_definitions(Error **errp)
488 return arch_query_cpu_definitions(errp);
491 void qmp_add_client(const char *protocol, const char *fdname,
492 bool has_skipauth, bool skipauth, bool has_tls, bool tls,
493 Error **errp)
495 CharDriverState *s;
496 int fd;
498 fd = monitor_get_fd(cur_mon, fdname, errp);
499 if (fd < 0) {
500 return;
503 if (strcmp(protocol, "spice") == 0) {
504 if (!using_spice) {
505 error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
506 close(fd);
507 return;
509 skipauth = has_skipauth ? skipauth : false;
510 tls = has_tls ? tls : false;
511 if (qemu_spice_display_add_client(fd, skipauth, tls) < 0) {
512 error_setg(errp, "spice failed to add client");
513 close(fd);
515 return;
516 #ifdef CONFIG_VNC
517 } else if (strcmp(protocol, "vnc") == 0) {
518 skipauth = has_skipauth ? skipauth : false;
519 vnc_display_add_client(NULL, fd, skipauth);
520 return;
521 #endif
522 } else if ((s = qemu_chr_find(protocol)) != NULL) {
523 if (qemu_chr_add_client(s, fd) < 0) {
524 error_setg(errp, "failed to add client");
525 close(fd);
526 return;
528 return;
531 error_setg(errp, "protocol '%s' is invalid", protocol);
532 close(fd);
535 void object_add(const char *type, const char *id, const QDict *qdict,
536 Visitor *v, Error **errp)
538 Object *obj;
539 const QDictEntry *e;
540 Error *local_err = NULL;
542 if (!object_class_by_name(type)) {
543 error_setg(errp, "invalid class name");
544 return;
547 obj = object_new(type);
548 if (qdict) {
549 for (e = qdict_first(qdict); e; e = qdict_next(qdict, e)) {
550 object_property_set(obj, v, e->key, &local_err);
551 if (local_err) {
552 error_propagate(errp, local_err);
553 object_unref(obj);
554 return;
559 object_property_add_child(container_get(object_get_root(), "/objects"),
560 id, obj, errp);
561 object_unref(obj);
564 int qmp_object_add(Monitor *mon, const QDict *qdict, QObject **ret)
566 const char *type = qdict_get_str(qdict, "qom-type");
567 const char *id = qdict_get_str(qdict, "id");
568 QObject *props = qdict_get(qdict, "props");
569 const QDict *pdict = NULL;
570 Error *local_err = NULL;
571 QmpInputVisitor *qiv;
573 if (props) {
574 pdict = qobject_to_qdict(props);
575 if (!pdict) {
576 error_set(&local_err, QERR_INVALID_PARAMETER_TYPE, "props", "dict");
577 goto out;
581 qiv = qmp_input_visitor_new(props);
582 object_add(type, id, pdict, qmp_input_get_visitor(qiv), &local_err);
583 qmp_input_visitor_cleanup(qiv);
585 out:
586 if (local_err) {
587 qerror_report_err(local_err);
588 error_free(local_err);
589 return -1;
592 return 0;
595 void qmp_object_del(const char *id, Error **errp)
597 Object *container;
598 Object *obj;
600 container = container_get(object_get_root(), "/objects");
601 obj = object_resolve_path_component(container, id);
602 if (!obj) {
603 error_setg(errp, "object id not found");
604 return;
606 object_unparent(obj);