pci-host/prep: Set isa_mem_base in the PCI host bridge
[qemu/ar7.git] / qmp.c
blob4c149b33a459af7d3cb8da25c057298d9fd6fdcf
1 /*
2 * QEMU Management Protocol
4 * Copyright IBM, Corp. 2011
6 * Authors:
7 * Anthony Liguori <aliguori@us.ibm.com>
9 * This work is licensed under the terms of the GNU GPL, version 2. See
10 * the COPYING file in the top-level directory.
12 * Contributions after 2012-01-13 are licensed under the terms of the
13 * GNU GPL, version 2 or (at your option) any later version.
16 #include "qemu-common.h"
17 #include "sysemu/sysemu.h"
18 #include "qmp-commands.h"
19 #include "sysemu/char.h"
20 #include "ui/qemu-spice.h"
21 #include "ui/vnc.h"
22 #include "sysemu/kvm.h"
23 #include "sysemu/arch_init.h"
24 #include "hw/qdev.h"
25 #include "sysemu/blockdev.h"
26 #include "qom/qom-qobject.h"
27 #include "hw/boards.h"
29 NameInfo *qmp_query_name(Error **errp)
31 NameInfo *info = g_malloc0(sizeof(*info));
33 if (qemu_name) {
34 info->has_name = true;
35 info->name = g_strdup(qemu_name);
38 return info;
41 VersionInfo *qmp_query_version(Error **err)
43 VersionInfo *info = g_malloc0(sizeof(*info));
44 const char *version = QEMU_VERSION;
45 char *tmp;
47 info->qemu.major = strtol(version, &tmp, 10);
48 tmp++;
49 info->qemu.minor = strtol(tmp, &tmp, 10);
50 tmp++;
51 info->qemu.micro = strtol(tmp, &tmp, 10);
52 info->package = g_strdup(QEMU_PKGVERSION);
54 return info;
57 KvmInfo *qmp_query_kvm(Error **errp)
59 KvmInfo *info = g_malloc0(sizeof(*info));
61 info->enabled = kvm_enabled();
62 info->present = kvm_available();
64 return info;
67 UuidInfo *qmp_query_uuid(Error **errp)
69 UuidInfo *info = g_malloc0(sizeof(*info));
70 char uuid[64];
72 snprintf(uuid, sizeof(uuid), UUID_FMT, qemu_uuid[0], qemu_uuid[1],
73 qemu_uuid[2], qemu_uuid[3], qemu_uuid[4], qemu_uuid[5],
74 qemu_uuid[6], qemu_uuid[7], qemu_uuid[8], qemu_uuid[9],
75 qemu_uuid[10], qemu_uuid[11], qemu_uuid[12], qemu_uuid[13],
76 qemu_uuid[14], qemu_uuid[15]);
78 info->UUID = g_strdup(uuid);
79 return info;
82 void qmp_quit(Error **err)
84 no_shutdown = 0;
85 qemu_system_shutdown_request();
88 void qmp_stop(Error **errp)
90 if (runstate_check(RUN_STATE_INMIGRATE)) {
91 autostart = 0;
92 } else {
93 vm_stop(RUN_STATE_PAUSED);
97 void qmp_system_reset(Error **errp)
99 qemu_system_reset_request();
102 void qmp_system_powerdown(Error **erp)
104 qemu_system_powerdown_request();
107 void qmp_cpu(int64_t index, Error **errp)
109 /* Just do nothing */
112 void qmp_cpu_add(int64_t id, Error **errp)
114 if (current_machine->hot_add_cpu) {
115 current_machine->hot_add_cpu(id, errp);
116 } else {
117 error_setg(errp, "Not supported");
121 #ifndef CONFIG_VNC
122 /* If VNC support is enabled, the "true" query-vnc command is
123 defined in the VNC subsystem */
124 VncInfo *qmp_query_vnc(Error **errp)
126 error_set(errp, QERR_FEATURE_DISABLED, "vnc");
127 return NULL;
129 #endif
131 #ifndef CONFIG_SPICE
132 /* If SPICE support is enabled, the "true" query-spice command is
133 defined in the SPICE subsystem. Also note that we use a small
134 trick to maintain query-spice's original behavior, which is not
135 to be available in the namespace if SPICE is not compiled in */
136 SpiceInfo *qmp_query_spice(Error **errp)
138 error_set(errp, QERR_COMMAND_NOT_FOUND, "query-spice");
139 return NULL;
141 #endif
143 static void iostatus_bdrv_it(void *opaque, BlockDriverState *bs)
145 bdrv_iostatus_reset(bs);
148 static void encrypted_bdrv_it(void *opaque, BlockDriverState *bs)
150 Error **err = opaque;
152 if (!error_is_set(err) && bdrv_key_required(bs)) {
153 error_set(err, QERR_DEVICE_ENCRYPTED, bdrv_get_device_name(bs),
154 bdrv_get_encrypted_filename(bs));
158 void qmp_cont(Error **errp)
160 Error *local_err = NULL;
162 if (runstate_needs_reset()) {
163 error_set(errp, QERR_RESET_REQUIRED);
164 return;
165 } else if (runstate_check(RUN_STATE_SUSPENDED)) {
166 return;
169 bdrv_iterate(iostatus_bdrv_it, NULL);
170 bdrv_iterate(encrypted_bdrv_it, &local_err);
171 if (local_err) {
172 error_propagate(errp, local_err);
173 return;
176 if (runstate_check(RUN_STATE_INMIGRATE)) {
177 autostart = 1;
178 } else {
179 vm_start();
183 void qmp_system_wakeup(Error **errp)
185 qemu_system_wakeup_request(QEMU_WAKEUP_REASON_OTHER);
188 ObjectPropertyInfoList *qmp_qom_list(const char *path, Error **errp)
190 Object *obj;
191 bool ambiguous = false;
192 ObjectPropertyInfoList *props = NULL;
193 ObjectProperty *prop;
195 obj = object_resolve_path(path, &ambiguous);
196 if (obj == NULL) {
197 error_set(errp, QERR_DEVICE_NOT_FOUND, path);
198 return NULL;
201 QTAILQ_FOREACH(prop, &obj->properties, node) {
202 ObjectPropertyInfoList *entry = g_malloc0(sizeof(*entry));
204 entry->value = g_malloc0(sizeof(ObjectPropertyInfo));
205 entry->next = props;
206 props = entry;
208 entry->value->name = g_strdup(prop->name);
209 entry->value->type = g_strdup(prop->type);
212 return props;
215 /* FIXME: teach qapi about how to pass through Visitors */
216 int qmp_qom_set(Monitor *mon, const QDict *qdict, QObject **ret)
218 const char *path = qdict_get_str(qdict, "path");
219 const char *property = qdict_get_str(qdict, "property");
220 QObject *value = qdict_get(qdict, "value");
221 Error *local_err = NULL;
222 Object *obj;
224 obj = object_resolve_path(path, NULL);
225 if (!obj) {
226 error_set(&local_err, QERR_DEVICE_NOT_FOUND, path);
227 goto out;
230 object_property_set_qobject(obj, value, property, &local_err);
232 out:
233 if (local_err) {
234 qerror_report_err(local_err);
235 error_free(local_err);
236 return -1;
239 return 0;
242 int qmp_qom_get(Monitor *mon, const QDict *qdict, QObject **ret)
244 const char *path = qdict_get_str(qdict, "path");
245 const char *property = qdict_get_str(qdict, "property");
246 Error *local_err = NULL;
247 Object *obj;
249 obj = object_resolve_path(path, NULL);
250 if (!obj) {
251 error_set(&local_err, QERR_DEVICE_NOT_FOUND, path);
252 goto out;
255 *ret = object_property_get_qobject(obj, property, &local_err);
257 out:
258 if (local_err) {
259 qerror_report_err(local_err);
260 error_free(local_err);
261 return -1;
264 return 0;
267 void qmp_set_password(const char *protocol, const char *password,
268 bool has_connected, const char *connected, Error **errp)
270 int disconnect_if_connected = 0;
271 int fail_if_connected = 0;
272 int rc;
274 if (has_connected) {
275 if (strcmp(connected, "fail") == 0) {
276 fail_if_connected = 1;
277 } else if (strcmp(connected, "disconnect") == 0) {
278 disconnect_if_connected = 1;
279 } else if (strcmp(connected, "keep") == 0) {
280 /* nothing */
281 } else {
282 error_set(errp, QERR_INVALID_PARAMETER, "connected");
283 return;
287 if (strcmp(protocol, "spice") == 0) {
288 if (!using_spice) {
289 /* correct one? spice isn't a device ,,, */
290 error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
291 return;
293 rc = qemu_spice_set_passwd(password, fail_if_connected,
294 disconnect_if_connected);
295 if (rc != 0) {
296 error_set(errp, QERR_SET_PASSWD_FAILED);
298 return;
301 if (strcmp(protocol, "vnc") == 0) {
302 if (fail_if_connected || disconnect_if_connected) {
303 /* vnc supports "connected=keep" only */
304 error_set(errp, QERR_INVALID_PARAMETER, "connected");
305 return;
307 /* Note that setting an empty password will not disable login through
308 * this interface. */
309 rc = vnc_display_password(NULL, password);
310 if (rc < 0) {
311 error_set(errp, QERR_SET_PASSWD_FAILED);
313 return;
316 error_set(errp, QERR_INVALID_PARAMETER, "protocol");
319 void qmp_expire_password(const char *protocol, const char *whenstr,
320 Error **errp)
322 time_t when;
323 int rc;
325 if (strcmp(whenstr, "now") == 0) {
326 when = 0;
327 } else if (strcmp(whenstr, "never") == 0) {
328 when = TIME_MAX;
329 } else if (whenstr[0] == '+') {
330 when = time(NULL) + strtoull(whenstr+1, NULL, 10);
331 } else {
332 when = strtoull(whenstr, NULL, 10);
335 if (strcmp(protocol, "spice") == 0) {
336 if (!using_spice) {
337 /* correct one? spice isn't a device ,,, */
338 error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
339 return;
341 rc = qemu_spice_set_pw_expire(when);
342 if (rc != 0) {
343 error_set(errp, QERR_SET_PASSWD_FAILED);
345 return;
348 if (strcmp(protocol, "vnc") == 0) {
349 rc = vnc_display_pw_expire(NULL, when);
350 if (rc != 0) {
351 error_set(errp, QERR_SET_PASSWD_FAILED);
353 return;
356 error_set(errp, QERR_INVALID_PARAMETER, "protocol");
359 #ifdef CONFIG_VNC
360 void qmp_change_vnc_password(const char *password, Error **errp)
362 if (vnc_display_password(NULL, password) < 0) {
363 error_set(errp, QERR_SET_PASSWD_FAILED);
367 static void qmp_change_vnc_listen(const char *target, Error **errp)
369 vnc_display_open(NULL, target, errp);
372 static void qmp_change_vnc(const char *target, bool has_arg, const char *arg,
373 Error **errp)
375 if (strcmp(target, "passwd") == 0 || strcmp(target, "password") == 0) {
376 if (!has_arg) {
377 error_set(errp, QERR_MISSING_PARAMETER, "password");
378 } else {
379 qmp_change_vnc_password(arg, errp);
381 } else {
382 qmp_change_vnc_listen(target, errp);
385 #else
386 void qmp_change_vnc_password(const char *password, Error **errp)
388 error_set(errp, QERR_FEATURE_DISABLED, "vnc");
390 static void qmp_change_vnc(const char *target, bool has_arg, const char *arg,
391 Error **errp)
393 error_set(errp, QERR_FEATURE_DISABLED, "vnc");
395 #endif /* !CONFIG_VNC */
397 void qmp_change(const char *device, const char *target,
398 bool has_arg, const char *arg, Error **err)
400 if (strcmp(device, "vnc") == 0) {
401 qmp_change_vnc(target, has_arg, arg, err);
402 } else {
403 qmp_change_blockdev(device, target, has_arg, arg, err);
407 static void qom_list_types_tramp(ObjectClass *klass, void *data)
409 ObjectTypeInfoList *e, **pret = data;
410 ObjectTypeInfo *info;
412 info = g_malloc0(sizeof(*info));
413 info->name = g_strdup(object_class_get_name(klass));
415 e = g_malloc0(sizeof(*e));
416 e->value = info;
417 e->next = *pret;
418 *pret = e;
421 ObjectTypeInfoList *qmp_qom_list_types(bool has_implements,
422 const char *implements,
423 bool has_abstract,
424 bool abstract,
425 Error **errp)
427 ObjectTypeInfoList *ret = NULL;
429 object_class_foreach(qom_list_types_tramp, implements, abstract, &ret);
431 return ret;
434 DevicePropertyInfoList *qmp_device_list_properties(const char *typename,
435 Error **errp)
437 ObjectClass *klass;
438 Property *prop;
439 DevicePropertyInfoList *prop_list = NULL;
441 klass = object_class_by_name(typename);
442 if (klass == NULL) {
443 error_set(errp, QERR_DEVICE_NOT_FOUND, typename);
444 return NULL;
447 klass = object_class_dynamic_cast(klass, TYPE_DEVICE);
448 if (klass == NULL) {
449 error_set(errp, QERR_INVALID_PARAMETER_VALUE,
450 "name", TYPE_DEVICE);
451 return NULL;
454 do {
455 for (prop = DEVICE_CLASS(klass)->props; prop && prop->name; prop++) {
456 DevicePropertyInfoList *entry;
457 DevicePropertyInfo *info;
460 * TODO Properties without a parser are just for dirty hacks.
461 * qdev_prop_ptr is the only such PropertyInfo. It's marked
462 * for removal. This conditional should be removed along with
463 * it.
465 if (!prop->info->set) {
466 continue; /* no way to set it, don't show */
469 info = g_malloc0(sizeof(*info));
470 info->name = g_strdup(prop->name);
471 info->type = g_strdup(prop->info->legacy_name ?: prop->info->name);
473 entry = g_malloc0(sizeof(*entry));
474 entry->value = info;
475 entry->next = prop_list;
476 prop_list = entry;
478 klass = object_class_get_parent(klass);
479 } while (klass != object_class_by_name(TYPE_DEVICE));
481 return prop_list;
484 CpuDefinitionInfoList *qmp_query_cpu_definitions(Error **errp)
486 return arch_query_cpu_definitions(errp);
489 void qmp_add_client(const char *protocol, const char *fdname,
490 bool has_skipauth, bool skipauth, bool has_tls, bool tls,
491 Error **errp)
493 CharDriverState *s;
494 int fd;
496 fd = monitor_get_fd(cur_mon, fdname, errp);
497 if (fd < 0) {
498 return;
501 if (strcmp(protocol, "spice") == 0) {
502 if (!using_spice) {
503 error_set(errp, QERR_DEVICE_NOT_ACTIVE, "spice");
504 close(fd);
505 return;
507 skipauth = has_skipauth ? skipauth : false;
508 tls = has_tls ? tls : false;
509 if (qemu_spice_display_add_client(fd, skipauth, tls) < 0) {
510 error_setg(errp, "spice failed to add client");
511 close(fd);
513 return;
514 #ifdef CONFIG_VNC
515 } else if (strcmp(protocol, "vnc") == 0) {
516 skipauth = has_skipauth ? skipauth : false;
517 vnc_display_add_client(NULL, fd, skipauth);
518 return;
519 #endif
520 } else if ((s = qemu_chr_find(protocol)) != NULL) {
521 if (qemu_chr_add_client(s, fd) < 0) {
522 error_setg(errp, "failed to add client");
523 close(fd);
524 return;
526 return;
529 error_setg(errp, "protocol '%s' is invalid", protocol);
530 close(fd);