2 * QEMU Management Protocol
4 * Copyright IBM, Corp. 2011
7 * Anthony Liguori <aliguori@us.ibm.com>
9 * This work is licensed under the terms of the GNU GPL, version 2. See
10 * the COPYING file in the top-level directory.
12 * Contributions after 2012-01-13 are licensed under the terms of the
13 * GNU GPL, version 2 or (at your option) any later version.
16 #include "qemu-common.h"
18 #include "qmp-commands.h"
19 #include "ui/qemu-spice.h"
22 #include "arch_init.h"
25 #include "qemu/qom-qobject.h"
27 NameInfo
*qmp_query_name(Error
**errp
)
29 NameInfo
*info
= g_malloc0(sizeof(*info
));
32 info
->has_name
= true;
33 info
->name
= g_strdup(qemu_name
);
39 VersionInfo
*qmp_query_version(Error
**err
)
41 VersionInfo
*info
= g_malloc0(sizeof(*info
));
42 const char *version
= QEMU_VERSION
;
45 info
->qemu
.major
= strtol(version
, &tmp
, 10);
47 info
->qemu
.minor
= strtol(tmp
, &tmp
, 10);
49 info
->qemu
.micro
= strtol(tmp
, &tmp
, 10);
50 info
->package
= g_strdup(QEMU_PKGVERSION
);
55 KvmInfo
*qmp_query_kvm(Error
**errp
)
57 KvmInfo
*info
= g_malloc0(sizeof(*info
));
59 info
->enabled
= kvm_enabled();
60 info
->present
= kvm_available();
65 UuidInfo
*qmp_query_uuid(Error
**errp
)
67 UuidInfo
*info
= g_malloc0(sizeof(*info
));
70 snprintf(uuid
, sizeof(uuid
), UUID_FMT
, qemu_uuid
[0], qemu_uuid
[1],
71 qemu_uuid
[2], qemu_uuid
[3], qemu_uuid
[4], qemu_uuid
[5],
72 qemu_uuid
[6], qemu_uuid
[7], qemu_uuid
[8], qemu_uuid
[9],
73 qemu_uuid
[10], qemu_uuid
[11], qemu_uuid
[12], qemu_uuid
[13],
74 qemu_uuid
[14], qemu_uuid
[15]);
76 info
->UUID
= g_strdup(uuid
);
80 void qmp_quit(Error
**err
)
83 qemu_system_shutdown_request();
86 void qmp_stop(Error
**errp
)
88 if (runstate_check(RUN_STATE_INMIGRATE
)) {
91 vm_stop(RUN_STATE_PAUSED
);
95 void qmp_system_reset(Error
**errp
)
97 qemu_system_reset_request();
100 void qmp_system_powerdown(Error
**erp
)
102 qemu_system_powerdown_request();
105 void qmp_cpu(int64_t index
, Error
**errp
)
107 /* Just do nothing */
111 /* If VNC support is enabled, the "true" query-vnc command is
112 defined in the VNC subsystem */
113 VncInfo
*qmp_query_vnc(Error
**errp
)
115 error_set(errp
, QERR_FEATURE_DISABLED
, "vnc");
121 /* If SPICE support is enabled, the "true" query-spice command is
122 defined in the SPICE subsystem. Also note that we use a small
123 trick to maintain query-spice's original behavior, which is not
124 to be available in the namespace if SPICE is not compiled in */
125 SpiceInfo
*qmp_query_spice(Error
**errp
)
127 error_set(errp
, QERR_COMMAND_NOT_FOUND
, "query-spice");
132 static void iostatus_bdrv_it(void *opaque
, BlockDriverState
*bs
)
134 bdrv_iostatus_reset(bs
);
137 static void encrypted_bdrv_it(void *opaque
, BlockDriverState
*bs
)
139 Error
**err
= opaque
;
141 if (!error_is_set(err
) && bdrv_key_required(bs
)) {
142 error_set(err
, QERR_DEVICE_ENCRYPTED
, bdrv_get_device_name(bs
),
143 bdrv_get_encrypted_filename(bs
));
147 void qmp_cont(Error
**errp
)
149 Error
*local_err
= NULL
;
151 if (runstate_check(RUN_STATE_INTERNAL_ERROR
) ||
152 runstate_check(RUN_STATE_SHUTDOWN
)) {
153 error_set(errp
, QERR_RESET_REQUIRED
);
155 } else if (runstate_check(RUN_STATE_SUSPENDED
)) {
159 bdrv_iterate(iostatus_bdrv_it
, NULL
);
160 bdrv_iterate(encrypted_bdrv_it
, &local_err
);
162 error_propagate(errp
, local_err
);
166 if (runstate_check(RUN_STATE_INMIGRATE
)) {
173 void qmp_system_wakeup(Error
**errp
)
175 qemu_system_wakeup_request(QEMU_WAKEUP_REASON_OTHER
);
178 ObjectPropertyInfoList
*qmp_qom_list(const char *path
, Error
**errp
)
181 bool ambiguous
= false;
182 ObjectPropertyInfoList
*props
= NULL
;
183 ObjectProperty
*prop
;
185 obj
= object_resolve_path(path
, &ambiguous
);
187 error_set(errp
, QERR_DEVICE_NOT_FOUND
, path
);
191 QTAILQ_FOREACH(prop
, &obj
->properties
, node
) {
192 ObjectPropertyInfoList
*entry
= g_malloc0(sizeof(*entry
));
194 entry
->value
= g_malloc0(sizeof(ObjectPropertyInfo
));
198 entry
->value
->name
= g_strdup(prop
->name
);
199 entry
->value
->type
= g_strdup(prop
->type
);
205 /* FIXME: teach qapi about how to pass through Visitors */
206 int qmp_qom_set(Monitor
*mon
, const QDict
*qdict
, QObject
**ret
)
208 const char *path
= qdict_get_str(qdict
, "path");
209 const char *property
= qdict_get_str(qdict
, "property");
210 QObject
*value
= qdict_get(qdict
, "value");
211 Error
*local_err
= NULL
;
214 obj
= object_resolve_path(path
, NULL
);
216 error_set(&local_err
, QERR_DEVICE_NOT_FOUND
, path
);
220 object_property_set_qobject(obj
, value
, property
, &local_err
);
224 qerror_report_err(local_err
);
225 error_free(local_err
);
232 int qmp_qom_get(Monitor
*mon
, const QDict
*qdict
, QObject
**ret
)
234 const char *path
= qdict_get_str(qdict
, "path");
235 const char *property
= qdict_get_str(qdict
, "property");
236 Error
*local_err
= NULL
;
239 obj
= object_resolve_path(path
, NULL
);
241 error_set(&local_err
, QERR_DEVICE_NOT_FOUND
, path
);
245 *ret
= object_property_get_qobject(obj
, property
, &local_err
);
249 qerror_report_err(local_err
);
250 error_free(local_err
);
257 void qmp_set_password(const char *protocol
, const char *password
,
258 bool has_connected
, const char *connected
, Error
**errp
)
260 int disconnect_if_connected
= 0;
261 int fail_if_connected
= 0;
265 if (strcmp(connected
, "fail") == 0) {
266 fail_if_connected
= 1;
267 } else if (strcmp(connected
, "disconnect") == 0) {
268 disconnect_if_connected
= 1;
269 } else if (strcmp(connected
, "keep") == 0) {
272 error_set(errp
, QERR_INVALID_PARAMETER
, "connected");
277 if (strcmp(protocol
, "spice") == 0) {
279 /* correct one? spice isn't a device ,,, */
280 error_set(errp
, QERR_DEVICE_NOT_ACTIVE
, "spice");
283 rc
= qemu_spice_set_passwd(password
, fail_if_connected
,
284 disconnect_if_connected
);
286 error_set(errp
, QERR_SET_PASSWD_FAILED
);
291 if (strcmp(protocol
, "vnc") == 0) {
292 if (fail_if_connected
|| disconnect_if_connected
) {
293 /* vnc supports "connected=keep" only */
294 error_set(errp
, QERR_INVALID_PARAMETER
, "connected");
297 /* Note that setting an empty password will not disable login through
299 rc
= vnc_display_password(NULL
, password
);
301 error_set(errp
, QERR_SET_PASSWD_FAILED
);
306 error_set(errp
, QERR_INVALID_PARAMETER
, "protocol");
309 void qmp_expire_password(const char *protocol
, const char *whenstr
,
315 if (strcmp(whenstr
, "now") == 0) {
317 } else if (strcmp(whenstr
, "never") == 0) {
319 } else if (whenstr
[0] == '+') {
320 when
= time(NULL
) + strtoull(whenstr
+1, NULL
, 10);
322 when
= strtoull(whenstr
, NULL
, 10);
325 if (strcmp(protocol
, "spice") == 0) {
327 /* correct one? spice isn't a device ,,, */
328 error_set(errp
, QERR_DEVICE_NOT_ACTIVE
, "spice");
331 rc
= qemu_spice_set_pw_expire(when
);
333 error_set(errp
, QERR_SET_PASSWD_FAILED
);
338 if (strcmp(protocol
, "vnc") == 0) {
339 rc
= vnc_display_pw_expire(NULL
, when
);
341 error_set(errp
, QERR_SET_PASSWD_FAILED
);
346 error_set(errp
, QERR_INVALID_PARAMETER
, "protocol");
350 void qmp_change_vnc_password(const char *password
, Error
**errp
)
352 if (vnc_display_password(NULL
, password
) < 0) {
353 error_set(errp
, QERR_SET_PASSWD_FAILED
);
357 static void qmp_change_vnc_listen(const char *target
, Error
**errp
)
359 vnc_display_open(NULL
, target
, errp
);
362 static void qmp_change_vnc(const char *target
, bool has_arg
, const char *arg
,
365 if (strcmp(target
, "passwd") == 0 || strcmp(target
, "password") == 0) {
367 error_set(errp
, QERR_MISSING_PARAMETER
, "password");
369 qmp_change_vnc_password(arg
, errp
);
372 qmp_change_vnc_listen(target
, errp
);
376 void qmp_change_vnc_password(const char *password
, Error
**errp
)
378 error_set(errp
, QERR_FEATURE_DISABLED
, "vnc");
380 static void qmp_change_vnc(const char *target
, bool has_arg
, const char *arg
,
383 error_set(errp
, QERR_FEATURE_DISABLED
, "vnc");
385 #endif /* !CONFIG_VNC */
387 void qmp_change(const char *device
, const char *target
,
388 bool has_arg
, const char *arg
, Error
**err
)
390 if (strcmp(device
, "vnc") == 0) {
391 qmp_change_vnc(target
, has_arg
, arg
, err
);
393 qmp_change_blockdev(device
, target
, has_arg
, arg
, err
);
397 static void qom_list_types_tramp(ObjectClass
*klass
, void *data
)
399 ObjectTypeInfoList
*e
, **pret
= data
;
400 ObjectTypeInfo
*info
;
402 info
= g_malloc0(sizeof(*info
));
403 info
->name
= g_strdup(object_class_get_name(klass
));
405 e
= g_malloc0(sizeof(*e
));
411 ObjectTypeInfoList
*qmp_qom_list_types(bool has_implements
,
412 const char *implements
,
417 ObjectTypeInfoList
*ret
= NULL
;
419 object_class_foreach(qom_list_types_tramp
, implements
, abstract
, &ret
);
424 DevicePropertyInfoList
*qmp_device_list_properties(const char *typename
,
429 DevicePropertyInfoList
*prop_list
= NULL
;
431 klass
= object_class_by_name(typename
);
433 error_set(errp
, QERR_DEVICE_NOT_FOUND
, typename
);
437 klass
= object_class_dynamic_cast(klass
, TYPE_DEVICE
);
439 error_set(errp
, QERR_INVALID_PARAMETER_VALUE
,
440 "name", TYPE_DEVICE
);
445 for (prop
= DEVICE_CLASS(klass
)->props
; prop
&& prop
->name
; prop
++) {
446 DevicePropertyInfoList
*entry
;
447 DevicePropertyInfo
*info
;
450 * TODO Properties without a parser are just for dirty hacks.
451 * qdev_prop_ptr is the only such PropertyInfo. It's marked
452 * for removal. This conditional should be removed along with
455 if (!prop
->info
->set
) {
456 continue; /* no way to set it, don't show */
459 info
= g_malloc0(sizeof(*info
));
460 info
->name
= g_strdup(prop
->name
);
461 info
->type
= g_strdup(prop
->info
->legacy_name
?: prop
->info
->name
);
463 entry
= g_malloc0(sizeof(*entry
));
465 entry
->next
= prop_list
;
468 klass
= object_class_get_parent(klass
);
469 } while (klass
!= object_class_by_name(TYPE_DEVICE
));
474 CpuDefinitionInfoList
*qmp_query_cpu_definitions(Error
**errp
)
476 return arch_query_cpu_definitions(errp
);
479 void qmp_add_client(const char *protocol
, const char *fdname
,
480 bool has_skipauth
, bool skipauth
, bool has_tls
, bool tls
,
486 fd
= monitor_get_fd(cur_mon
, fdname
, errp
);
491 if (strcmp(protocol
, "spice") == 0) {
493 error_set(errp
, QERR_DEVICE_NOT_ACTIVE
, "spice");
497 skipauth
= has_skipauth
? skipauth
: false;
498 tls
= has_tls
? tls
: false;
499 if (qemu_spice_display_add_client(fd
, skipauth
, tls
) < 0) {
500 error_setg(errp
, "spice failed to add client");
505 } else if (strcmp(protocol
, "vnc") == 0) {
506 skipauth
= has_skipauth
? skipauth
: false;
507 vnc_display_add_client(NULL
, fd
, skipauth
);
510 } else if ((s
= qemu_chr_find(protocol
)) != NULL
) {
511 if (qemu_chr_add_client(s
, fd
) < 0) {
512 error_setg(errp
, "failed to add client");
519 error_setg(errp
, "protocol '%s' is invalid", protocol
);