xref: /openbmc/qemu/qga/commands-posix.c (revision e8f62689)
1 /*
2  * QEMU Guest Agent POSIX-specific command implementations
3  *
4  * Copyright IBM Corp. 2011
5  *
6  * Authors:
7  *  Michael Roth      <mdroth@linux.vnet.ibm.com>
8  *  Michal Privoznik  <mprivozn@redhat.com>
9  *
10  * This work is licensed under the terms of the GNU GPL, version 2 or later.
11  * See the COPYING file in the top-level directory.
12  */
13 
14 #include "qemu/osdep.h"
15 #include <sys/ioctl.h>
16 #include <sys/utsname.h>
17 #include <sys/wait.h>
18 #include <dirent.h>
19 #include "qga-qapi-commands.h"
20 #include "qapi/error.h"
21 #include "qapi/qmp/qerror.h"
22 #include "qemu/host-utils.h"
23 #include "qemu/sockets.h"
24 #include "qemu/base64.h"
25 #include "qemu/cutils.h"
26 #include "commands-common.h"
27 #include "block/nvme.h"
28 #include "cutils.h"
29 
30 #ifdef HAVE_UTMPX
31 #include <utmpx.h>
32 #endif
33 
34 #if defined(__linux__)
35 #include <mntent.h>
36 #include <sys/statvfs.h>
37 #include <linux/nvme_ioctl.h>
38 
39 #ifdef CONFIG_LIBUDEV
40 #include <libudev.h>
41 #endif
42 #endif
43 
44 #ifdef HAVE_GETIFADDRS
45 #include <arpa/inet.h>
46 #include <sys/socket.h>
47 #include <net/if.h>
48 #if defined(__NetBSD__) || defined(__OpenBSD__) || defined(CONFIG_SOLARIS)
49 #include <net/if_arp.h>
50 #include <netinet/if_ether.h>
51 #if !defined(ETHER_ADDR_LEN) && defined(ETHERADDRL)
52 #define ETHER_ADDR_LEN ETHERADDRL
53 #endif
54 #else
55 #include <net/ethernet.h>
56 #endif
57 #ifdef CONFIG_SOLARIS
58 #include <sys/sockio.h>
59 #endif
60 #endif
61 
62 static void ga_wait_child(pid_t pid, int *status, Error **errp)
63 {
64     pid_t rpid;
65 
66     *status = 0;
67 
68     rpid = RETRY_ON_EINTR(waitpid(pid, status, 0));
69 
70     if (rpid == -1) {
71         error_setg_errno(errp, errno, "failed to wait for child (pid: %d)",
72                          pid);
73         return;
74     }
75 
76     g_assert(rpid == pid);
77 }
78 
79 static ssize_t ga_pipe_read_str(int fd[2], char **str)
80 {
81     ssize_t n, len = 0;
82     char buf[1024];
83 
84     close(fd[1]);
85     fd[1] = -1;
86     while ((n = read(fd[0], buf, sizeof(buf))) != 0) {
87         if (n < 0) {
88             if (errno == EINTR) {
89                 continue;
90             } else {
91                 len = -errno;
92                 break;
93             }
94         }
95         *str = g_realloc(*str, len + n + 1);
96         memcpy(*str + len, buf, n);
97         len += n;
98         *str[len] = '\0';
99     }
100     close(fd[0]);
101     fd[0] = -1;
102 
103     return len;
104 }
105 
106 /*
107  * Helper to run command with input/output redirection,
108  * sending string to stdin and taking error message from
109  * stdout/err.
110  */
111 static int ga_run_command(const char *argv[], const char *in_str,
112                           const char *action, Error **errp)
113 {
114     pid_t pid;
115     int status;
116     int retcode = -1;
117     int infd[2] = { -1, -1 };
118     int outfd[2] = { -1, -1 };
119     char *str = NULL;
120     ssize_t len = 0;
121 
122     if ((in_str && !g_unix_open_pipe(infd, FD_CLOEXEC, NULL)) ||
123         !g_unix_open_pipe(outfd, FD_CLOEXEC, NULL)) {
124         error_setg(errp, "cannot create pipe FDs");
125         goto out;
126     }
127 
128     pid = fork();
129     if (pid == 0) {
130         char *cherr = NULL;
131 
132         setsid();
133 
134         if (in_str) {
135             /* Redirect stdin to infd. */
136             close(infd[1]);
137             dup2(infd[0], 0);
138             close(infd[0]);
139         } else {
140             reopen_fd_to_null(0);
141         }
142 
143         /* Redirect stdout/stderr to outfd. */
144         close(outfd[0]);
145         dup2(outfd[1], 1);
146         dup2(outfd[1], 2);
147         close(outfd[1]);
148 
149         execvp(argv[0], (char *const *)argv);
150 
151         /* Write the cause of failed exec to pipe for the parent to read it. */
152         cherr = g_strdup_printf("failed to exec '%s'", argv[0]);
153         perror(cherr);
154         g_free(cherr);
155         _exit(EXIT_FAILURE);
156     } else if (pid < 0) {
157         error_setg_errno(errp, errno, "failed to create child process");
158         goto out;
159     }
160 
161     if (in_str) {
162         close(infd[0]);
163         infd[0] = -1;
164         if (qemu_write_full(infd[1], in_str, strlen(in_str)) !=
165                 strlen(in_str)) {
166             error_setg_errno(errp, errno, "%s: cannot write to stdin pipe",
167                              action);
168             goto out;
169         }
170         close(infd[1]);
171         infd[1] = -1;
172     }
173 
174     len = ga_pipe_read_str(outfd, &str);
175     if (len < 0) {
176         error_setg_errno(errp, -len, "%s: cannot read from stdout/stderr pipe",
177                          action);
178         goto out;
179     }
180 
181     ga_wait_child(pid, &status, errp);
182     if (*errp) {
183         goto out;
184     }
185 
186     if (!WIFEXITED(status)) {
187         if (len) {
188             error_setg(errp, "child process has terminated abnormally: %s",
189                        str);
190         } else {
191             error_setg(errp, "child process has terminated abnormally");
192         }
193         goto out;
194     }
195 
196     retcode = WEXITSTATUS(status);
197 
198     if (WEXITSTATUS(status)) {
199         if (len) {
200             error_setg(errp, "child process has failed to %s: %s",
201                        action, str);
202         } else {
203             error_setg(errp, "child process has failed to %s: exit status %d",
204                        action, WEXITSTATUS(status));
205         }
206         goto out;
207     }
208 
209 out:
210     g_free(str);
211 
212     if (infd[0] != -1) {
213         close(infd[0]);
214     }
215     if (infd[1] != -1) {
216         close(infd[1]);
217     }
218     if (outfd[0] != -1) {
219         close(outfd[0]);
220     }
221     if (outfd[1] != -1) {
222         close(outfd[1]);
223     }
224 
225     return retcode;
226 }
227 
228 void qmp_guest_shutdown(const char *mode, Error **errp)
229 {
230     const char *shutdown_flag;
231     Error *local_err = NULL;
232 
233 #ifdef CONFIG_SOLARIS
234     const char *powerdown_flag = "-i5";
235     const char *halt_flag = "-i0";
236     const char *reboot_flag = "-i6";
237 #elif defined(CONFIG_BSD)
238     const char *powerdown_flag = "-p";
239     const char *halt_flag = "-h";
240     const char *reboot_flag = "-r";
241 #else
242     const char *powerdown_flag = "-P";
243     const char *halt_flag = "-H";
244     const char *reboot_flag = "-r";
245 #endif
246 
247     slog("guest-shutdown called, mode: %s", mode);
248     if (!mode || strcmp(mode, "powerdown") == 0) {
249         shutdown_flag = powerdown_flag;
250     } else if (strcmp(mode, "halt") == 0) {
251         shutdown_flag = halt_flag;
252     } else if (strcmp(mode, "reboot") == 0) {
253         shutdown_flag = reboot_flag;
254     } else {
255         error_setg(errp,
256                    "mode is invalid (valid values are: halt|powerdown|reboot");
257         return;
258     }
259 
260     const char *argv[] = {"/sbin/shutdown",
261 #ifdef CONFIG_SOLARIS
262                           shutdown_flag, "-g0", "-y",
263 #elif defined(CONFIG_BSD)
264                           shutdown_flag, "+0",
265 #else
266                           "-h", shutdown_flag, "+0",
267 #endif
268                           "hypervisor initiated shutdown", (char *) NULL};
269 
270     ga_run_command(argv, NULL, "shutdown", &local_err);
271     if (local_err) {
272         error_propagate(errp, local_err);
273         return;
274     }
275 
276     /* succeeded */
277 }
278 
279 void qmp_guest_set_time(bool has_time, int64_t time_ns, Error **errp)
280 {
281     int ret;
282     Error *local_err = NULL;
283     struct timeval tv;
284     const char *argv[] = {"/sbin/hwclock", has_time ? "-w" : "-s", NULL};
285 
286     /* If user has passed a time, validate and set it. */
287     if (has_time) {
288         GDate date = { 0, };
289 
290         /* year-2038 will overflow in case time_t is 32bit */
291         if (time_ns / 1000000000 != (time_t)(time_ns / 1000000000)) {
292             error_setg(errp, "Time %" PRId64 " is too large", time_ns);
293             return;
294         }
295 
296         tv.tv_sec = time_ns / 1000000000;
297         tv.tv_usec = (time_ns % 1000000000) / 1000;
298         g_date_set_time_t(&date, tv.tv_sec);
299         if (date.year < 1970 || date.year >= 2070) {
300             error_setg_errno(errp, errno, "Invalid time");
301             return;
302         }
303 
304         ret = settimeofday(&tv, NULL);
305         if (ret < 0) {
306             error_setg_errno(errp, errno, "Failed to set time to guest");
307             return;
308         }
309     }
310 
311     /* Now, if user has passed a time to set and the system time is set, we
312      * just need to synchronize the hardware clock. However, if no time was
313      * passed, user is requesting the opposite: set the system time from the
314      * hardware clock (RTC). */
315     ga_run_command(argv, NULL, "set hardware clock to system time",
316                    &local_err);
317     if (local_err) {
318         error_propagate(errp, local_err);
319         return;
320     }
321 }
322 
323 typedef enum {
324     RW_STATE_NEW,
325     RW_STATE_READING,
326     RW_STATE_WRITING,
327 } RwState;
328 
329 struct GuestFileHandle {
330     uint64_t id;
331     FILE *fh;
332     RwState state;
333     QTAILQ_ENTRY(GuestFileHandle) next;
334 };
335 
336 static struct {
337     QTAILQ_HEAD(, GuestFileHandle) filehandles;
338 } guest_file_state = {
339     .filehandles = QTAILQ_HEAD_INITIALIZER(guest_file_state.filehandles),
340 };
341 
342 static int64_t guest_file_handle_add(FILE *fh, Error **errp)
343 {
344     GuestFileHandle *gfh;
345     int64_t handle;
346 
347     handle = ga_get_fd_handle(ga_state, errp);
348     if (handle < 0) {
349         return -1;
350     }
351 
352     gfh = g_new0(GuestFileHandle, 1);
353     gfh->id = handle;
354     gfh->fh = fh;
355     QTAILQ_INSERT_TAIL(&guest_file_state.filehandles, gfh, next);
356 
357     return handle;
358 }
359 
360 GuestFileHandle *guest_file_handle_find(int64_t id, Error **errp)
361 {
362     GuestFileHandle *gfh;
363 
364     QTAILQ_FOREACH(gfh, &guest_file_state.filehandles, next)
365     {
366         if (gfh->id == id) {
367             return gfh;
368         }
369     }
370 
371     error_setg(errp, "handle '%" PRId64 "' has not been found", id);
372     return NULL;
373 }
374 
375 typedef const char * const ccpc;
376 
377 #ifndef O_BINARY
378 #define O_BINARY 0
379 #endif
380 
381 /* http://pubs.opengroup.org/onlinepubs/9699919799/functions/fopen.html */
382 static const struct {
383     ccpc *forms;
384     int oflag_base;
385 } guest_file_open_modes[] = {
386     { (ccpc[]){ "r",          NULL }, O_RDONLY                                 },
387     { (ccpc[]){ "rb",         NULL }, O_RDONLY                      | O_BINARY },
388     { (ccpc[]){ "w",          NULL }, O_WRONLY | O_CREAT | O_TRUNC             },
389     { (ccpc[]){ "wb",         NULL }, O_WRONLY | O_CREAT | O_TRUNC  | O_BINARY },
390     { (ccpc[]){ "a",          NULL }, O_WRONLY | O_CREAT | O_APPEND            },
391     { (ccpc[]){ "ab",         NULL }, O_WRONLY | O_CREAT | O_APPEND | O_BINARY },
392     { (ccpc[]){ "r+",         NULL }, O_RDWR                                   },
393     { (ccpc[]){ "rb+", "r+b", NULL }, O_RDWR                        | O_BINARY },
394     { (ccpc[]){ "w+",         NULL }, O_RDWR   | O_CREAT | O_TRUNC             },
395     { (ccpc[]){ "wb+", "w+b", NULL }, O_RDWR   | O_CREAT | O_TRUNC  | O_BINARY },
396     { (ccpc[]){ "a+",         NULL }, O_RDWR   | O_CREAT | O_APPEND            },
397     { (ccpc[]){ "ab+", "a+b", NULL }, O_RDWR   | O_CREAT | O_APPEND | O_BINARY }
398 };
399 
400 static int
401 find_open_flag(const char *mode_str, Error **errp)
402 {
403     unsigned mode;
404 
405     for (mode = 0; mode < ARRAY_SIZE(guest_file_open_modes); ++mode) {
406         ccpc *form;
407 
408         form = guest_file_open_modes[mode].forms;
409         while (*form != NULL && strcmp(*form, mode_str) != 0) {
410             ++form;
411         }
412         if (*form != NULL) {
413             break;
414         }
415     }
416 
417     if (mode == ARRAY_SIZE(guest_file_open_modes)) {
418         error_setg(errp, "invalid file open mode '%s'", mode_str);
419         return -1;
420     }
421     return guest_file_open_modes[mode].oflag_base | O_NOCTTY | O_NONBLOCK;
422 }
423 
424 #define DEFAULT_NEW_FILE_MODE (S_IRUSR | S_IWUSR | \
425                                S_IRGRP | S_IWGRP | \
426                                S_IROTH | S_IWOTH)
427 
428 static FILE *
429 safe_open_or_create(const char *path, const char *mode, Error **errp)
430 {
431     int oflag;
432     int fd = -1;
433     FILE *f = NULL;
434 
435     oflag = find_open_flag(mode, errp);
436     if (oflag < 0) {
437         goto end;
438     }
439 
440     /* If the caller wants / allows creation of a new file, we implement it
441      * with a two step process: open() + (open() / fchmod()).
442      *
443      * First we insist on creating the file exclusively as a new file. If
444      * that succeeds, we're free to set any file-mode bits on it. (The
445      * motivation is that we want to set those file-mode bits independently
446      * of the current umask.)
447      *
448      * If the exclusive creation fails because the file already exists
449      * (EEXIST is not possible for any other reason), we just attempt to
450      * open the file, but in this case we won't be allowed to change the
451      * file-mode bits on the preexistent file.
452      *
453      * The pathname should never disappear between the two open()s in
454      * practice. If it happens, then someone very likely tried to race us.
455      * In this case just go ahead and report the ENOENT from the second
456      * open() to the caller.
457      *
458      * If the caller wants to open a preexistent file, then the first
459      * open() is decisive and its third argument is ignored, and the second
460      * open() and the fchmod() are never called.
461      */
462     fd = qga_open_cloexec(path, oflag | ((oflag & O_CREAT) ? O_EXCL : 0), 0);
463     if (fd == -1 && errno == EEXIST) {
464         oflag &= ~(unsigned)O_CREAT;
465         fd = qga_open_cloexec(path, oflag, 0);
466     }
467     if (fd == -1) {
468         error_setg_errno(errp, errno,
469                          "failed to open file '%s' (mode: '%s')",
470                          path, mode);
471         goto end;
472     }
473 
474     if ((oflag & O_CREAT) && fchmod(fd, DEFAULT_NEW_FILE_MODE) == -1) {
475         error_setg_errno(errp, errno, "failed to set permission "
476                          "0%03o on new file '%s' (mode: '%s')",
477                          (unsigned)DEFAULT_NEW_FILE_MODE, path, mode);
478         goto end;
479     }
480 
481     f = fdopen(fd, mode);
482     if (f == NULL) {
483         error_setg_errno(errp, errno, "failed to associate stdio stream with "
484                          "file descriptor %d, file '%s' (mode: '%s')",
485                          fd, path, mode);
486     }
487 
488 end:
489     if (f == NULL && fd != -1) {
490         close(fd);
491         if (oflag & O_CREAT) {
492             unlink(path);
493         }
494     }
495     return f;
496 }
497 
498 int64_t qmp_guest_file_open(const char *path, const char *mode,
499                             Error **errp)
500 {
501     FILE *fh;
502     Error *local_err = NULL;
503     int64_t handle;
504 
505     if (!mode) {
506         mode = "r";
507     }
508     slog("guest-file-open called, filepath: %s, mode: %s", path, mode);
509     fh = safe_open_or_create(path, mode, &local_err);
510     if (local_err != NULL) {
511         error_propagate(errp, local_err);
512         return -1;
513     }
514 
515     /* set fd non-blocking to avoid common use cases (like reading from a
516      * named pipe) from hanging the agent
517      */
518     if (!g_unix_set_fd_nonblocking(fileno(fh), true, NULL)) {
519         fclose(fh);
520         error_setg_errno(errp, errno, "Failed to set FD nonblocking");
521         return -1;
522     }
523 
524     handle = guest_file_handle_add(fh, errp);
525     if (handle < 0) {
526         fclose(fh);
527         return -1;
528     }
529 
530     slog("guest-file-open, handle: %" PRId64, handle);
531     return handle;
532 }
533 
534 void qmp_guest_file_close(int64_t handle, Error **errp)
535 {
536     GuestFileHandle *gfh = guest_file_handle_find(handle, errp);
537     int ret;
538 
539     slog("guest-file-close called, handle: %" PRId64, handle);
540     if (!gfh) {
541         return;
542     }
543 
544     ret = fclose(gfh->fh);
545     if (ret == EOF) {
546         error_setg_errno(errp, errno, "failed to close handle");
547         return;
548     }
549 
550     QTAILQ_REMOVE(&guest_file_state.filehandles, gfh, next);
551     g_free(gfh);
552 }
553 
554 GuestFileRead *guest_file_read_unsafe(GuestFileHandle *gfh,
555                                       int64_t count, Error **errp)
556 {
557     GuestFileRead *read_data = NULL;
558     guchar *buf;
559     FILE *fh = gfh->fh;
560     size_t read_count;
561 
562     /* explicitly flush when switching from writing to reading */
563     if (gfh->state == RW_STATE_WRITING) {
564         int ret = fflush(fh);
565         if (ret == EOF) {
566             error_setg_errno(errp, errno, "failed to flush file");
567             return NULL;
568         }
569         gfh->state = RW_STATE_NEW;
570     }
571 
572     buf = g_malloc0(count + 1);
573     read_count = fread(buf, 1, count, fh);
574     if (ferror(fh)) {
575         error_setg_errno(errp, errno, "failed to read file");
576     } else {
577         buf[read_count] = 0;
578         read_data = g_new0(GuestFileRead, 1);
579         read_data->count = read_count;
580         read_data->eof = feof(fh);
581         if (read_count) {
582             read_data->buf_b64 = g_base64_encode(buf, read_count);
583         }
584         gfh->state = RW_STATE_READING;
585     }
586     g_free(buf);
587     clearerr(fh);
588 
589     return read_data;
590 }
591 
592 GuestFileWrite *qmp_guest_file_write(int64_t handle, const char *buf_b64,
593                                      bool has_count, int64_t count,
594                                      Error **errp)
595 {
596     GuestFileWrite *write_data = NULL;
597     guchar *buf;
598     gsize buf_len;
599     int write_count;
600     GuestFileHandle *gfh = guest_file_handle_find(handle, errp);
601     FILE *fh;
602 
603     if (!gfh) {
604         return NULL;
605     }
606 
607     fh = gfh->fh;
608 
609     if (gfh->state == RW_STATE_READING) {
610         int ret = fseek(fh, 0, SEEK_CUR);
611         if (ret == -1) {
612             error_setg_errno(errp, errno, "failed to seek file");
613             return NULL;
614         }
615         gfh->state = RW_STATE_NEW;
616     }
617 
618     buf = qbase64_decode(buf_b64, -1, &buf_len, errp);
619     if (!buf) {
620         return NULL;
621     }
622 
623     if (!has_count) {
624         count = buf_len;
625     } else if (count < 0 || count > buf_len) {
626         error_setg(errp, "value '%" PRId64 "' is invalid for argument count",
627                    count);
628         g_free(buf);
629         return NULL;
630     }
631 
632     write_count = fwrite(buf, 1, count, fh);
633     if (ferror(fh)) {
634         error_setg_errno(errp, errno, "failed to write to file");
635         slog("guest-file-write failed, handle: %" PRId64, handle);
636     } else {
637         write_data = g_new0(GuestFileWrite, 1);
638         write_data->count = write_count;
639         write_data->eof = feof(fh);
640         gfh->state = RW_STATE_WRITING;
641     }
642     g_free(buf);
643     clearerr(fh);
644 
645     return write_data;
646 }
647 
648 struct GuestFileSeek *qmp_guest_file_seek(int64_t handle, int64_t offset,
649                                           GuestFileWhence *whence_code,
650                                           Error **errp)
651 {
652     GuestFileHandle *gfh = guest_file_handle_find(handle, errp);
653     GuestFileSeek *seek_data = NULL;
654     FILE *fh;
655     int ret;
656     int whence;
657     Error *err = NULL;
658 
659     if (!gfh) {
660         return NULL;
661     }
662 
663     /* We stupidly exposed 'whence':'int' in our qapi */
664     whence = ga_parse_whence(whence_code, &err);
665     if (err) {
666         error_propagate(errp, err);
667         return NULL;
668     }
669 
670     fh = gfh->fh;
671     ret = fseek(fh, offset, whence);
672     if (ret == -1) {
673         error_setg_errno(errp, errno, "failed to seek file");
674         if (errno == ESPIPE) {
675             /* file is non-seekable, stdio shouldn't be buffering anyways */
676             gfh->state = RW_STATE_NEW;
677         }
678     } else {
679         seek_data = g_new0(GuestFileSeek, 1);
680         seek_data->position = ftell(fh);
681         seek_data->eof = feof(fh);
682         gfh->state = RW_STATE_NEW;
683     }
684     clearerr(fh);
685 
686     return seek_data;
687 }
688 
689 void qmp_guest_file_flush(int64_t handle, Error **errp)
690 {
691     GuestFileHandle *gfh = guest_file_handle_find(handle, errp);
692     FILE *fh;
693     int ret;
694 
695     if (!gfh) {
696         return;
697     }
698 
699     fh = gfh->fh;
700     ret = fflush(fh);
701     if (ret == EOF) {
702         error_setg_errno(errp, errno, "failed to flush file");
703     } else {
704         gfh->state = RW_STATE_NEW;
705     }
706 }
707 
708 #if defined(CONFIG_FSFREEZE) || defined(CONFIG_FSTRIM)
709 void free_fs_mount_list(FsMountList *mounts)
710 {
711      FsMount *mount, *temp;
712 
713      if (!mounts) {
714          return;
715      }
716 
717      QTAILQ_FOREACH_SAFE(mount, mounts, next, temp) {
718          QTAILQ_REMOVE(mounts, mount, next);
719          g_free(mount->dirname);
720          g_free(mount->devtype);
721          g_free(mount);
722      }
723 }
724 #endif
725 
726 #if defined(CONFIG_FSFREEZE)
727 typedef enum {
728     FSFREEZE_HOOK_THAW = 0,
729     FSFREEZE_HOOK_FREEZE,
730 } FsfreezeHookArg;
731 
732 static const char *fsfreeze_hook_arg_string[] = {
733     "thaw",
734     "freeze",
735 };
736 
737 static void execute_fsfreeze_hook(FsfreezeHookArg arg, Error **errp)
738 {
739     const char *hook;
740     const char *arg_str = fsfreeze_hook_arg_string[arg];
741     Error *local_err = NULL;
742 
743     hook = ga_fsfreeze_hook(ga_state);
744     if (!hook) {
745         return;
746     }
747 
748     const char *argv[] = {hook, arg_str, NULL};
749 
750     slog("executing fsfreeze hook with arg '%s'", arg_str);
751     ga_run_command(argv, NULL, "execute fsfreeze hook", &local_err);
752     if (local_err) {
753         error_propagate(errp, local_err);
754         return;
755     }
756 }
757 
758 /*
759  * Return status of freeze/thaw
760  */
761 GuestFsfreezeStatus qmp_guest_fsfreeze_status(Error **errp)
762 {
763     if (ga_is_frozen(ga_state)) {
764         return GUEST_FSFREEZE_STATUS_FROZEN;
765     }
766 
767     return GUEST_FSFREEZE_STATUS_THAWED;
768 }
769 
770 int64_t qmp_guest_fsfreeze_freeze(Error **errp)
771 {
772     return qmp_guest_fsfreeze_freeze_list(false, NULL, errp);
773 }
774 
775 int64_t qmp_guest_fsfreeze_freeze_list(bool has_mountpoints,
776                                        strList *mountpoints,
777                                        Error **errp)
778 {
779     int ret;
780     FsMountList mounts;
781     Error *local_err = NULL;
782 
783     slog("guest-fsfreeze called");
784 
785     execute_fsfreeze_hook(FSFREEZE_HOOK_FREEZE, &local_err);
786     if (local_err) {
787         error_propagate(errp, local_err);
788         return -1;
789     }
790 
791     QTAILQ_INIT(&mounts);
792     if (!build_fs_mount_list(&mounts, &local_err)) {
793         error_propagate(errp, local_err);
794         return -1;
795     }
796 
797     /* cannot risk guest agent blocking itself on a write in this state */
798     ga_set_frozen(ga_state);
799 
800     ret = qmp_guest_fsfreeze_do_freeze_list(has_mountpoints, mountpoints,
801                                             mounts, errp);
802 
803     free_fs_mount_list(&mounts);
804     /* We may not issue any FIFREEZE here.
805      * Just unset ga_state here and ready for the next call.
806      */
807     if (ret == 0) {
808         ga_unset_frozen(ga_state);
809     } else if (ret < 0) {
810         qmp_guest_fsfreeze_thaw(NULL);
811     }
812     return ret;
813 }
814 
815 int64_t qmp_guest_fsfreeze_thaw(Error **errp)
816 {
817     int ret;
818 
819     ret = qmp_guest_fsfreeze_do_thaw(errp);
820     if (ret >= 0) {
821         ga_unset_frozen(ga_state);
822         execute_fsfreeze_hook(FSFREEZE_HOOK_THAW, errp);
823     } else {
824         ret = 0;
825     }
826 
827     return ret;
828 }
829 
830 static void guest_fsfreeze_cleanup(void)
831 {
832     Error *err = NULL;
833 
834     if (ga_is_frozen(ga_state) == GUEST_FSFREEZE_STATUS_FROZEN) {
835         qmp_guest_fsfreeze_thaw(&err);
836         if (err) {
837             slog("failed to clean up frozen filesystems: %s",
838                  error_get_pretty(err));
839             error_free(err);
840         }
841     }
842 }
843 #endif
844 
845 /* linux-specific implementations. avoid this if at all possible. */
846 #if defined(__linux__)
847 #if defined(CONFIG_FSFREEZE)
848 
849 static char *get_pci_driver(char const *syspath, int pathlen, Error **errp)
850 {
851     char *path;
852     char *dpath;
853     char *driver = NULL;
854     char buf[PATH_MAX];
855     ssize_t len;
856 
857     path = g_strndup(syspath, pathlen);
858     dpath = g_strdup_printf("%s/driver", path);
859     len = readlink(dpath, buf, sizeof(buf) - 1);
860     if (len != -1) {
861         buf[len] = 0;
862         driver = g_path_get_basename(buf);
863     }
864     g_free(dpath);
865     g_free(path);
866     return driver;
867 }
868 
869 static int compare_uint(const void *_a, const void *_b)
870 {
871     unsigned int a = *(unsigned int *)_a;
872     unsigned int b = *(unsigned int *)_b;
873 
874     return a < b ? -1 : a > b ? 1 : 0;
875 }
876 
877 /* Walk the specified sysfs and build a sorted list of host or ata numbers */
878 static int build_hosts(char const *syspath, char const *host, bool ata,
879                        unsigned int *hosts, int hosts_max, Error **errp)
880 {
881     char *path;
882     DIR *dir;
883     struct dirent *entry;
884     int i = 0;
885 
886     path = g_strndup(syspath, host - syspath);
887     dir = opendir(path);
888     if (!dir) {
889         error_setg_errno(errp, errno, "opendir(\"%s\")", path);
890         g_free(path);
891         return -1;
892     }
893 
894     while (i < hosts_max) {
895         entry = readdir(dir);
896         if (!entry) {
897             break;
898         }
899         if (ata && sscanf(entry->d_name, "ata%d", hosts + i) == 1) {
900             ++i;
901         } else if (!ata && sscanf(entry->d_name, "host%d", hosts + i) == 1) {
902             ++i;
903         }
904     }
905 
906     qsort(hosts, i, sizeof(hosts[0]), compare_uint);
907 
908     g_free(path);
909     closedir(dir);
910     return i;
911 }
912 
913 /*
914  * Store disk device info for devices on the PCI bus.
915  * Returns true if information has been stored, or false for failure.
916  */
917 static bool build_guest_fsinfo_for_pci_dev(char const *syspath,
918                                            GuestDiskAddress *disk,
919                                            Error **errp)
920 {
921     unsigned int pci[4], host, hosts[8], tgt[3];
922     int i, nhosts = 0, pcilen;
923     GuestPCIAddress *pciaddr = disk->pci_controller;
924     bool has_ata = false, has_host = false, has_tgt = false;
925     char *p, *q, *driver = NULL;
926     bool ret = false;
927 
928     p = strstr(syspath, "/devices/pci");
929     if (!p || sscanf(p + 12, "%*x:%*x/%x:%x:%x.%x%n",
930                      pci, pci + 1, pci + 2, pci + 3, &pcilen) < 4) {
931         g_debug("only pci device is supported: sysfs path '%s'", syspath);
932         return false;
933     }
934 
935     p += 12 + pcilen;
936     while (true) {
937         driver = get_pci_driver(syspath, p - syspath, errp);
938         if (driver && (g_str_equal(driver, "ata_piix") ||
939                        g_str_equal(driver, "sym53c8xx") ||
940                        g_str_equal(driver, "virtio-pci") ||
941                        g_str_equal(driver, "ahci") ||
942                        g_str_equal(driver, "nvme") ||
943                        g_str_equal(driver, "xhci_hcd") ||
944                        g_str_equal(driver, "ehci-pci"))) {
945             break;
946         }
947 
948         g_free(driver);
949         if (sscanf(p, "/%x:%x:%x.%x%n",
950                           pci, pci + 1, pci + 2, pci + 3, &pcilen) == 4) {
951             p += pcilen;
952             continue;
953         }
954 
955         g_debug("unsupported driver or sysfs path '%s'", syspath);
956         return false;
957     }
958 
959     p = strstr(syspath, "/target");
960     if (p && sscanf(p + 7, "%*u:%*u:%*u/%*u:%u:%u:%u",
961                     tgt, tgt + 1, tgt + 2) == 3) {
962         has_tgt = true;
963     }
964 
965     p = strstr(syspath, "/ata");
966     if (p) {
967         q = p + 4;
968         has_ata = true;
969     } else {
970         p = strstr(syspath, "/host");
971         q = p + 5;
972     }
973     if (p && sscanf(q, "%u", &host) == 1) {
974         has_host = true;
975         nhosts = build_hosts(syspath, p, has_ata, hosts,
976                              ARRAY_SIZE(hosts), errp);
977         if (nhosts < 0) {
978             goto cleanup;
979         }
980     }
981 
982     pciaddr->domain = pci[0];
983     pciaddr->bus = pci[1];
984     pciaddr->slot = pci[2];
985     pciaddr->function = pci[3];
986 
987     if (strcmp(driver, "ata_piix") == 0) {
988         /* a host per ide bus, target*:0:<unit>:0 */
989         if (!has_host || !has_tgt) {
990             g_debug("invalid sysfs path '%s' (driver '%s')", syspath, driver);
991             goto cleanup;
992         }
993         for (i = 0; i < nhosts; i++) {
994             if (host == hosts[i]) {
995                 disk->bus_type = GUEST_DISK_BUS_TYPE_IDE;
996                 disk->bus = i;
997                 disk->unit = tgt[1];
998                 break;
999             }
1000         }
1001         if (i >= nhosts) {
1002             g_debug("no host for '%s' (driver '%s')", syspath, driver);
1003             goto cleanup;
1004         }
1005     } else if (strcmp(driver, "sym53c8xx") == 0) {
1006         /* scsi(LSI Logic): target*:0:<unit>:0 */
1007         if (!has_tgt) {
1008             g_debug("invalid sysfs path '%s' (driver '%s')", syspath, driver);
1009             goto cleanup;
1010         }
1011         disk->bus_type = GUEST_DISK_BUS_TYPE_SCSI;
1012         disk->unit = tgt[1];
1013     } else if (strcmp(driver, "virtio-pci") == 0) {
1014         if (has_tgt) {
1015             /* virtio-scsi: target*:0:0:<unit> */
1016             disk->bus_type = GUEST_DISK_BUS_TYPE_SCSI;
1017             disk->unit = tgt[2];
1018         } else {
1019             /* virtio-blk: 1 disk per 1 device */
1020             disk->bus_type = GUEST_DISK_BUS_TYPE_VIRTIO;
1021         }
1022     } else if (strcmp(driver, "ahci") == 0) {
1023         /* ahci: 1 host per 1 unit */
1024         if (!has_host || !has_tgt) {
1025             g_debug("invalid sysfs path '%s' (driver '%s')", syspath, driver);
1026             goto cleanup;
1027         }
1028         for (i = 0; i < nhosts; i++) {
1029             if (host == hosts[i]) {
1030                 disk->unit = i;
1031                 disk->bus_type = GUEST_DISK_BUS_TYPE_SATA;
1032                 break;
1033             }
1034         }
1035         if (i >= nhosts) {
1036             g_debug("no host for '%s' (driver '%s')", syspath, driver);
1037             goto cleanup;
1038         }
1039     } else if (strcmp(driver, "nvme") == 0) {
1040         disk->bus_type = GUEST_DISK_BUS_TYPE_NVME;
1041     } else if (strcmp(driver, "ehci-pci") == 0 || strcmp(driver, "xhci_hcd") == 0) {
1042         disk->bus_type = GUEST_DISK_BUS_TYPE_USB;
1043     } else {
1044         g_debug("unknown driver '%s' (sysfs path '%s')", driver, syspath);
1045         goto cleanup;
1046     }
1047 
1048     ret = true;
1049 
1050 cleanup:
1051     g_free(driver);
1052     return ret;
1053 }
1054 
1055 /*
1056  * Store disk device info for non-PCI virtio devices (for example s390x
1057  * channel I/O devices). Returns true if information has been stored, or
1058  * false for failure.
1059  */
1060 static bool build_guest_fsinfo_for_nonpci_virtio(char const *syspath,
1061                                                  GuestDiskAddress *disk,
1062                                                  Error **errp)
1063 {
1064     unsigned int tgt[3];
1065     char *p;
1066 
1067     if (!strstr(syspath, "/virtio") || !strstr(syspath, "/block")) {
1068         g_debug("Unsupported virtio device '%s'", syspath);
1069         return false;
1070     }
1071 
1072     p = strstr(syspath, "/target");
1073     if (p && sscanf(p + 7, "%*u:%*u:%*u/%*u:%u:%u:%u",
1074                     &tgt[0], &tgt[1], &tgt[2]) == 3) {
1075         /* virtio-scsi: target*:0:<target>:<unit> */
1076         disk->bus_type = GUEST_DISK_BUS_TYPE_SCSI;
1077         disk->bus = tgt[0];
1078         disk->target = tgt[1];
1079         disk->unit = tgt[2];
1080     } else {
1081         /* virtio-blk: 1 disk per 1 device */
1082         disk->bus_type = GUEST_DISK_BUS_TYPE_VIRTIO;
1083     }
1084 
1085     return true;
1086 }
1087 
1088 /*
1089  * Store disk device info for CCW devices (s390x channel I/O devices).
1090  * Returns true if information has been stored, or false for failure.
1091  */
1092 static bool build_guest_fsinfo_for_ccw_dev(char const *syspath,
1093                                            GuestDiskAddress *disk,
1094                                            Error **errp)
1095 {
1096     unsigned int cssid, ssid, subchno, devno;
1097     char *p;
1098 
1099     p = strstr(syspath, "/devices/css");
1100     if (!p || sscanf(p + 12, "%*x/%x.%x.%x/%*x.%*x.%x/",
1101                      &cssid, &ssid, &subchno, &devno) < 4) {
1102         g_debug("could not parse ccw device sysfs path: %s", syspath);
1103         return false;
1104     }
1105 
1106     disk->ccw_address = g_new0(GuestCCWAddress, 1);
1107     disk->ccw_address->cssid = cssid;
1108     disk->ccw_address->ssid = ssid;
1109     disk->ccw_address->subchno = subchno;
1110     disk->ccw_address->devno = devno;
1111 
1112     if (strstr(p, "/virtio")) {
1113         build_guest_fsinfo_for_nonpci_virtio(syspath, disk, errp);
1114     }
1115 
1116     return true;
1117 }
1118 
1119 /* Store disk device info specified by @sysfs into @fs */
1120 static void build_guest_fsinfo_for_real_device(char const *syspath,
1121                                                GuestFilesystemInfo *fs,
1122                                                Error **errp)
1123 {
1124     GuestDiskAddress *disk;
1125     GuestPCIAddress *pciaddr;
1126     bool has_hwinf;
1127 #ifdef CONFIG_LIBUDEV
1128     struct udev *udev = NULL;
1129     struct udev_device *udevice = NULL;
1130 #endif
1131 
1132     pciaddr = g_new0(GuestPCIAddress, 1);
1133     pciaddr->domain = -1;                       /* -1 means field is invalid */
1134     pciaddr->bus = -1;
1135     pciaddr->slot = -1;
1136     pciaddr->function = -1;
1137 
1138     disk = g_new0(GuestDiskAddress, 1);
1139     disk->pci_controller = pciaddr;
1140     disk->bus_type = GUEST_DISK_BUS_TYPE_UNKNOWN;
1141 
1142 #ifdef CONFIG_LIBUDEV
1143     udev = udev_new();
1144     udevice = udev_device_new_from_syspath(udev, syspath);
1145     if (udev == NULL || udevice == NULL) {
1146         g_debug("failed to query udev");
1147     } else {
1148         const char *devnode, *serial;
1149         devnode = udev_device_get_devnode(udevice);
1150         if (devnode != NULL) {
1151             disk->dev = g_strdup(devnode);
1152         }
1153         serial = udev_device_get_property_value(udevice, "ID_SERIAL");
1154         if (serial != NULL && *serial != 0) {
1155             disk->serial = g_strdup(serial);
1156         }
1157     }
1158 
1159     udev_unref(udev);
1160     udev_device_unref(udevice);
1161 #endif
1162 
1163     if (strstr(syspath, "/devices/pci")) {
1164         has_hwinf = build_guest_fsinfo_for_pci_dev(syspath, disk, errp);
1165     } else if (strstr(syspath, "/devices/css")) {
1166         has_hwinf = build_guest_fsinfo_for_ccw_dev(syspath, disk, errp);
1167     } else if (strstr(syspath, "/virtio")) {
1168         has_hwinf = build_guest_fsinfo_for_nonpci_virtio(syspath, disk, errp);
1169     } else {
1170         g_debug("Unsupported device type for '%s'", syspath);
1171         has_hwinf = false;
1172     }
1173 
1174     if (has_hwinf || disk->dev || disk->serial) {
1175         QAPI_LIST_PREPEND(fs->disk, disk);
1176     } else {
1177         qapi_free_GuestDiskAddress(disk);
1178     }
1179 }
1180 
1181 static void build_guest_fsinfo_for_device(char const *devpath,
1182                                           GuestFilesystemInfo *fs,
1183                                           Error **errp);
1184 
1185 /* Store a list of slave devices of virtual volume specified by @syspath into
1186  * @fs */
1187 static void build_guest_fsinfo_for_virtual_device(char const *syspath,
1188                                                   GuestFilesystemInfo *fs,
1189                                                   Error **errp)
1190 {
1191     Error *err = NULL;
1192     DIR *dir;
1193     char *dirpath;
1194     struct dirent *entry;
1195 
1196     dirpath = g_strdup_printf("%s/slaves", syspath);
1197     dir = opendir(dirpath);
1198     if (!dir) {
1199         if (errno != ENOENT) {
1200             error_setg_errno(errp, errno, "opendir(\"%s\")", dirpath);
1201         }
1202         g_free(dirpath);
1203         return;
1204     }
1205 
1206     for (;;) {
1207         errno = 0;
1208         entry = readdir(dir);
1209         if (entry == NULL) {
1210             if (errno) {
1211                 error_setg_errno(errp, errno, "readdir(\"%s\")", dirpath);
1212             }
1213             break;
1214         }
1215 
1216         if (entry->d_type == DT_LNK) {
1217             char *path;
1218 
1219             g_debug(" slave device '%s'", entry->d_name);
1220             path = g_strdup_printf("%s/slaves/%s", syspath, entry->d_name);
1221             build_guest_fsinfo_for_device(path, fs, &err);
1222             g_free(path);
1223 
1224             if (err) {
1225                 error_propagate(errp, err);
1226                 break;
1227             }
1228         }
1229     }
1230 
1231     g_free(dirpath);
1232     closedir(dir);
1233 }
1234 
1235 static bool is_disk_virtual(const char *devpath, Error **errp)
1236 {
1237     g_autofree char *syspath = realpath(devpath, NULL);
1238 
1239     if (!syspath) {
1240         error_setg_errno(errp, errno, "realpath(\"%s\")", devpath);
1241         return false;
1242     }
1243     return strstr(syspath, "/devices/virtual/block/") != NULL;
1244 }
1245 
1246 /* Dispatch to functions for virtual/real device */
1247 static void build_guest_fsinfo_for_device(char const *devpath,
1248                                           GuestFilesystemInfo *fs,
1249                                           Error **errp)
1250 {
1251     ERRP_GUARD();
1252     g_autofree char *syspath = NULL;
1253     bool is_virtual = false;
1254 
1255     syspath = realpath(devpath, NULL);
1256     if (!syspath) {
1257         if (errno != ENOENT) {
1258             error_setg_errno(errp, errno, "realpath(\"%s\")", devpath);
1259             return;
1260         }
1261 
1262         /* ENOENT: This devpath may not exist because of container config */
1263         if (!fs->name) {
1264             fs->name = g_path_get_basename(devpath);
1265         }
1266         return;
1267     }
1268 
1269     if (!fs->name) {
1270         fs->name = g_path_get_basename(syspath);
1271     }
1272 
1273     g_debug("  parse sysfs path '%s'", syspath);
1274     is_virtual = is_disk_virtual(syspath, errp);
1275     if (*errp != NULL) {
1276         return;
1277     }
1278     if (is_virtual) {
1279         build_guest_fsinfo_for_virtual_device(syspath, fs, errp);
1280     } else {
1281         build_guest_fsinfo_for_real_device(syspath, fs, errp);
1282     }
1283 }
1284 
1285 #ifdef CONFIG_LIBUDEV
1286 
1287 /*
1288  * Wrapper around build_guest_fsinfo_for_device() for getting just
1289  * the disk address.
1290  */
1291 static GuestDiskAddress *get_disk_address(const char *syspath, Error **errp)
1292 {
1293     g_autoptr(GuestFilesystemInfo) fs = NULL;
1294 
1295     fs = g_new0(GuestFilesystemInfo, 1);
1296     build_guest_fsinfo_for_device(syspath, fs, errp);
1297     if (fs->disk != NULL) {
1298         return g_steal_pointer(&fs->disk->value);
1299     }
1300     return NULL;
1301 }
1302 
1303 static char *get_alias_for_syspath(const char *syspath)
1304 {
1305     struct udev *udev = NULL;
1306     struct udev_device *udevice = NULL;
1307     char *ret = NULL;
1308 
1309     udev = udev_new();
1310     if (udev == NULL) {
1311         g_debug("failed to query udev");
1312         goto out;
1313     }
1314     udevice = udev_device_new_from_syspath(udev, syspath);
1315     if (udevice == NULL) {
1316         g_debug("failed to query udev for path: %s", syspath);
1317         goto out;
1318     } else {
1319         const char *alias = udev_device_get_property_value(
1320             udevice, "DM_NAME");
1321         /*
1322          * NULL means there was an error and empty string means there is no
1323          * alias. In case of no alias we return NULL instead of empty string.
1324          */
1325         if (alias == NULL) {
1326             g_debug("failed to query udev for device alias for: %s",
1327                 syspath);
1328         } else if (*alias != 0) {
1329             ret = g_strdup(alias);
1330         }
1331     }
1332 
1333 out:
1334     udev_unref(udev);
1335     udev_device_unref(udevice);
1336     return ret;
1337 }
1338 
1339 static char *get_device_for_syspath(const char *syspath)
1340 {
1341     struct udev *udev = NULL;
1342     struct udev_device *udevice = NULL;
1343     char *ret = NULL;
1344 
1345     udev = udev_new();
1346     if (udev == NULL) {
1347         g_debug("failed to query udev");
1348         goto out;
1349     }
1350     udevice = udev_device_new_from_syspath(udev, syspath);
1351     if (udevice == NULL) {
1352         g_debug("failed to query udev for path: %s", syspath);
1353         goto out;
1354     } else {
1355         ret = g_strdup(udev_device_get_devnode(udevice));
1356     }
1357 
1358 out:
1359     udev_unref(udev);
1360     udev_device_unref(udevice);
1361     return ret;
1362 }
1363 
1364 static void get_disk_deps(const char *disk_dir, GuestDiskInfo *disk)
1365 {
1366     g_autofree char *deps_dir = NULL;
1367     const gchar *dep;
1368     GDir *dp_deps = NULL;
1369 
1370     /* List dependent disks */
1371     deps_dir = g_strdup_printf("%s/slaves", disk_dir);
1372     g_debug("  listing entries in: %s", deps_dir);
1373     dp_deps = g_dir_open(deps_dir, 0, NULL);
1374     if (dp_deps == NULL) {
1375         g_debug("failed to list entries in %s", deps_dir);
1376         return;
1377     }
1378     disk->has_dependencies = true;
1379     while ((dep = g_dir_read_name(dp_deps)) != NULL) {
1380         g_autofree char *dep_dir = NULL;
1381         char *dev_name;
1382 
1383         /* Add dependent disks */
1384         dep_dir = g_strdup_printf("%s/%s", deps_dir, dep);
1385         dev_name = get_device_for_syspath(dep_dir);
1386         if (dev_name != NULL) {
1387             g_debug("  adding dependent device: %s", dev_name);
1388             QAPI_LIST_PREPEND(disk->dependencies, dev_name);
1389         }
1390     }
1391     g_dir_close(dp_deps);
1392 }
1393 
1394 /*
1395  * Detect partitions subdirectory, name is "<disk_name><number>" or
1396  * "<disk_name>p<number>"
1397  *
1398  * @disk_name -- last component of /sys path (e.g. sda)
1399  * @disk_dir -- sys path of the disk (e.g. /sys/block/sda)
1400  * @disk_dev -- device node of the disk (e.g. /dev/sda)
1401  */
1402 static GuestDiskInfoList *get_disk_partitions(
1403     GuestDiskInfoList *list,
1404     const char *disk_name, const char *disk_dir,
1405     const char *disk_dev)
1406 {
1407     GuestDiskInfoList *ret = list;
1408     struct dirent *de_disk;
1409     DIR *dp_disk = NULL;
1410     size_t len = strlen(disk_name);
1411 
1412     dp_disk = opendir(disk_dir);
1413     while ((de_disk = readdir(dp_disk)) != NULL) {
1414         g_autofree char *partition_dir = NULL;
1415         char *dev_name;
1416         GuestDiskInfo *partition;
1417 
1418         if (!(de_disk->d_type & DT_DIR)) {
1419             continue;
1420         }
1421 
1422         if (!(strncmp(disk_name, de_disk->d_name, len) == 0 &&
1423             ((*(de_disk->d_name + len) == 'p' &&
1424             isdigit(*(de_disk->d_name + len + 1))) ||
1425                 isdigit(*(de_disk->d_name + len))))) {
1426             continue;
1427         }
1428 
1429         partition_dir = g_strdup_printf("%s/%s",
1430             disk_dir, de_disk->d_name);
1431         dev_name = get_device_for_syspath(partition_dir);
1432         if (dev_name == NULL) {
1433             g_debug("Failed to get device name for syspath: %s",
1434                 disk_dir);
1435             continue;
1436         }
1437         partition = g_new0(GuestDiskInfo, 1);
1438         partition->name = dev_name;
1439         partition->partition = true;
1440         partition->has_dependencies = true;
1441         /* Add parent disk as dependent for easier tracking of hierarchy */
1442         QAPI_LIST_PREPEND(partition->dependencies, g_strdup(disk_dev));
1443 
1444         QAPI_LIST_PREPEND(ret, partition);
1445     }
1446     closedir(dp_disk);
1447 
1448     return ret;
1449 }
1450 
1451 static void get_nvme_smart(GuestDiskInfo *disk)
1452 {
1453     int fd;
1454     GuestNVMeSmart *smart;
1455     NvmeSmartLog log = {0};
1456     struct nvme_admin_cmd cmd = {
1457         .opcode = NVME_ADM_CMD_GET_LOG_PAGE,
1458         .nsid = NVME_NSID_BROADCAST,
1459         .addr = (uintptr_t)&log,
1460         .data_len = sizeof(log),
1461         .cdw10 = NVME_LOG_SMART_INFO | (1 << 15) /* RAE bit */
1462                  | (((sizeof(log) >> 2) - 1) << 16)
1463     };
1464 
1465     fd = qga_open_cloexec(disk->name, O_RDONLY, 0);
1466     if (fd == -1) {
1467         g_debug("Failed to open device: %s: %s", disk->name, g_strerror(errno));
1468         return;
1469     }
1470 
1471     if (ioctl(fd, NVME_IOCTL_ADMIN_CMD, &cmd)) {
1472         g_debug("Failed to get smart: %s: %s", disk->name, g_strerror(errno));
1473         close(fd);
1474         return;
1475     }
1476 
1477     disk->smart = g_new0(GuestDiskSmart, 1);
1478     disk->smart->type = GUEST_DISK_BUS_TYPE_NVME;
1479 
1480     smart = &disk->smart->u.nvme;
1481     smart->critical_warning = log.critical_warning;
1482     smart->temperature = lduw_le_p(&log.temperature); /* unaligned field */
1483     smart->available_spare = log.available_spare;
1484     smart->available_spare_threshold = log.available_spare_threshold;
1485     smart->percentage_used = log.percentage_used;
1486     smart->data_units_read_lo = le64_to_cpu(log.data_units_read[0]);
1487     smart->data_units_read_hi = le64_to_cpu(log.data_units_read[1]);
1488     smart->data_units_written_lo = le64_to_cpu(log.data_units_written[0]);
1489     smart->data_units_written_hi = le64_to_cpu(log.data_units_written[1]);
1490     smart->host_read_commands_lo = le64_to_cpu(log.host_read_commands[0]);
1491     smart->host_read_commands_hi = le64_to_cpu(log.host_read_commands[1]);
1492     smart->host_write_commands_lo = le64_to_cpu(log.host_write_commands[0]);
1493     smart->host_write_commands_hi = le64_to_cpu(log.host_write_commands[1]);
1494     smart->controller_busy_time_lo = le64_to_cpu(log.controller_busy_time[0]);
1495     smart->controller_busy_time_hi = le64_to_cpu(log.controller_busy_time[1]);
1496     smart->power_cycles_lo = le64_to_cpu(log.power_cycles[0]);
1497     smart->power_cycles_hi = le64_to_cpu(log.power_cycles[1]);
1498     smart->power_on_hours_lo = le64_to_cpu(log.power_on_hours[0]);
1499     smart->power_on_hours_hi = le64_to_cpu(log.power_on_hours[1]);
1500     smart->unsafe_shutdowns_lo = le64_to_cpu(log.unsafe_shutdowns[0]);
1501     smart->unsafe_shutdowns_hi = le64_to_cpu(log.unsafe_shutdowns[1]);
1502     smart->media_errors_lo = le64_to_cpu(log.media_errors[0]);
1503     smart->media_errors_hi = le64_to_cpu(log.media_errors[1]);
1504     smart->number_of_error_log_entries_lo =
1505         le64_to_cpu(log.number_of_error_log_entries[0]);
1506     smart->number_of_error_log_entries_hi =
1507         le64_to_cpu(log.number_of_error_log_entries[1]);
1508 
1509     close(fd);
1510 }
1511 
1512 static void get_disk_smart(GuestDiskInfo *disk)
1513 {
1514     if (disk->address
1515         && (disk->address->bus_type == GUEST_DISK_BUS_TYPE_NVME)) {
1516         get_nvme_smart(disk);
1517     }
1518 }
1519 
1520 GuestDiskInfoList *qmp_guest_get_disks(Error **errp)
1521 {
1522     GuestDiskInfoList *ret = NULL;
1523     GuestDiskInfo *disk;
1524     DIR *dp = NULL;
1525     struct dirent *de = NULL;
1526 
1527     g_debug("listing /sys/block directory");
1528     dp = opendir("/sys/block");
1529     if (dp == NULL) {
1530         error_setg_errno(errp, errno, "Can't open directory \"/sys/block\"");
1531         return NULL;
1532     }
1533     while ((de = readdir(dp)) != NULL) {
1534         g_autofree char *disk_dir = NULL, *line = NULL,
1535             *size_path = NULL;
1536         char *dev_name;
1537         Error *local_err = NULL;
1538         if (de->d_type != DT_LNK) {
1539             g_debug("  skipping entry: %s", de->d_name);
1540             continue;
1541         }
1542 
1543         /* Check size and skip zero-sized disks */
1544         g_debug("  checking disk size");
1545         size_path = g_strdup_printf("/sys/block/%s/size", de->d_name);
1546         if (!g_file_get_contents(size_path, &line, NULL, NULL)) {
1547             g_debug("  failed to read disk size");
1548             continue;
1549         }
1550         if (g_strcmp0(line, "0\n") == 0) {
1551             g_debug("  skipping zero-sized disk");
1552             continue;
1553         }
1554 
1555         g_debug("  adding %s", de->d_name);
1556         disk_dir = g_strdup_printf("/sys/block/%s", de->d_name);
1557         dev_name = get_device_for_syspath(disk_dir);
1558         if (dev_name == NULL) {
1559             g_debug("Failed to get device name for syspath: %s",
1560                 disk_dir);
1561             continue;
1562         }
1563         disk = g_new0(GuestDiskInfo, 1);
1564         disk->name = dev_name;
1565         disk->partition = false;
1566         disk->alias = get_alias_for_syspath(disk_dir);
1567         QAPI_LIST_PREPEND(ret, disk);
1568 
1569         /* Get address for non-virtual devices */
1570         bool is_virtual = is_disk_virtual(disk_dir, &local_err);
1571         if (local_err != NULL) {
1572             g_debug("  failed to check disk path, ignoring error: %s",
1573                 error_get_pretty(local_err));
1574             error_free(local_err);
1575             local_err = NULL;
1576             /* Don't try to get the address */
1577             is_virtual = true;
1578         }
1579         if (!is_virtual) {
1580             disk->address = get_disk_address(disk_dir, &local_err);
1581             if (local_err != NULL) {
1582                 g_debug("  failed to get device info, ignoring error: %s",
1583                     error_get_pretty(local_err));
1584                 error_free(local_err);
1585                 local_err = NULL;
1586             }
1587         }
1588 
1589         get_disk_deps(disk_dir, disk);
1590         get_disk_smart(disk);
1591         ret = get_disk_partitions(ret, de->d_name, disk_dir, dev_name);
1592     }
1593 
1594     closedir(dp);
1595 
1596     return ret;
1597 }
1598 
1599 #else
1600 
1601 GuestDiskInfoList *qmp_guest_get_disks(Error **errp)
1602 {
1603     error_setg(errp, QERR_UNSUPPORTED);
1604     return NULL;
1605 }
1606 
1607 #endif
1608 
1609 /* Return a list of the disk device(s)' info which @mount lies on */
1610 static GuestFilesystemInfo *build_guest_fsinfo(struct FsMount *mount,
1611                                                Error **errp)
1612 {
1613     GuestFilesystemInfo *fs = g_malloc0(sizeof(*fs));
1614     struct statvfs buf;
1615     unsigned long used, nonroot_total, fr_size;
1616     char *devpath = g_strdup_printf("/sys/dev/block/%u:%u",
1617                                     mount->devmajor, mount->devminor);
1618 
1619     fs->mountpoint = g_strdup(mount->dirname);
1620     fs->type = g_strdup(mount->devtype);
1621     build_guest_fsinfo_for_device(devpath, fs, errp);
1622 
1623     if (statvfs(fs->mountpoint, &buf) == 0) {
1624         fr_size = buf.f_frsize;
1625         used = buf.f_blocks - buf.f_bfree;
1626         nonroot_total = used + buf.f_bavail;
1627         fs->used_bytes = used * fr_size;
1628         fs->total_bytes = nonroot_total * fr_size;
1629         fs->total_bytes_privileged = buf.f_blocks * fr_size;
1630 
1631         fs->has_total_bytes = true;
1632         fs->has_total_bytes_privileged = true;
1633         fs->has_used_bytes = true;
1634     }
1635 
1636     g_free(devpath);
1637 
1638     return fs;
1639 }
1640 
1641 GuestFilesystemInfoList *qmp_guest_get_fsinfo(Error **errp)
1642 {
1643     FsMountList mounts;
1644     struct FsMount *mount;
1645     GuestFilesystemInfoList *ret = NULL;
1646     Error *local_err = NULL;
1647 
1648     QTAILQ_INIT(&mounts);
1649     if (!build_fs_mount_list(&mounts, &local_err)) {
1650         error_propagate(errp, local_err);
1651         return NULL;
1652     }
1653 
1654     QTAILQ_FOREACH(mount, &mounts, next) {
1655         g_debug("Building guest fsinfo for '%s'", mount->dirname);
1656 
1657         QAPI_LIST_PREPEND(ret, build_guest_fsinfo(mount, &local_err));
1658         if (local_err) {
1659             error_propagate(errp, local_err);
1660             qapi_free_GuestFilesystemInfoList(ret);
1661             ret = NULL;
1662             break;
1663         }
1664     }
1665 
1666     free_fs_mount_list(&mounts);
1667     return ret;
1668 }
1669 #endif /* CONFIG_FSFREEZE */
1670 
1671 #if defined(CONFIG_FSTRIM)
1672 /*
1673  * Walk list of mounted file systems in the guest, and trim them.
1674  */
1675 GuestFilesystemTrimResponse *
1676 qmp_guest_fstrim(bool has_minimum, int64_t minimum, Error **errp)
1677 {
1678     GuestFilesystemTrimResponse *response;
1679     GuestFilesystemTrimResult *result;
1680     int ret = 0;
1681     FsMountList mounts;
1682     struct FsMount *mount;
1683     int fd;
1684     struct fstrim_range r;
1685 
1686     slog("guest-fstrim called");
1687 
1688     QTAILQ_INIT(&mounts);
1689     if (!build_fs_mount_list(&mounts, errp)) {
1690         return NULL;
1691     }
1692 
1693     response = g_malloc0(sizeof(*response));
1694 
1695     QTAILQ_FOREACH(mount, &mounts, next) {
1696         result = g_malloc0(sizeof(*result));
1697         result->path = g_strdup(mount->dirname);
1698 
1699         QAPI_LIST_PREPEND(response->paths, result);
1700 
1701         fd = qga_open_cloexec(mount->dirname, O_RDONLY, 0);
1702         if (fd == -1) {
1703             result->error = g_strdup_printf("failed to open: %s",
1704                                             strerror(errno));
1705             continue;
1706         }
1707 
1708         /* We try to cull filesystems we know won't work in advance, but other
1709          * filesystems may not implement fstrim for less obvious reasons.
1710          * These will report EOPNOTSUPP; while in some other cases ENOTTY
1711          * will be reported (e.g. CD-ROMs).
1712          * Any other error means an unexpected error.
1713          */
1714         r.start = 0;
1715         r.len = -1;
1716         r.minlen = has_minimum ? minimum : 0;
1717         ret = ioctl(fd, FITRIM, &r);
1718         if (ret == -1) {
1719             if (errno == ENOTTY || errno == EOPNOTSUPP) {
1720                 result->error = g_strdup("trim not supported");
1721             } else {
1722                 result->error = g_strdup_printf("failed to trim: %s",
1723                                                 strerror(errno));
1724             }
1725             close(fd);
1726             continue;
1727         }
1728 
1729         result->has_minimum = true;
1730         result->minimum = r.minlen;
1731         result->has_trimmed = true;
1732         result->trimmed = r.len;
1733         close(fd);
1734     }
1735 
1736     free_fs_mount_list(&mounts);
1737     return response;
1738 }
1739 #endif /* CONFIG_FSTRIM */
1740 
1741 
1742 #define LINUX_SYS_STATE_FILE "/sys/power/state"
1743 #define SUSPEND_SUPPORTED 0
1744 #define SUSPEND_NOT_SUPPORTED 1
1745 
1746 typedef enum {
1747     SUSPEND_MODE_DISK = 0,
1748     SUSPEND_MODE_RAM = 1,
1749     SUSPEND_MODE_HYBRID = 2,
1750 } SuspendMode;
1751 
1752 /*
1753  * Executes a command in a child process using g_spawn_sync,
1754  * returning an int >= 0 representing the exit status of the
1755  * process.
1756  *
1757  * If the program wasn't found in path, returns -1.
1758  *
1759  * If a problem happened when creating the child process,
1760  * returns -1 and errp is set.
1761  */
1762 static int run_process_child(const char *command[], Error **errp)
1763 {
1764     int exit_status, spawn_flag;
1765     GError *g_err = NULL;
1766     bool success;
1767 
1768     spawn_flag = G_SPAWN_SEARCH_PATH | G_SPAWN_STDOUT_TO_DEV_NULL |
1769                  G_SPAWN_STDERR_TO_DEV_NULL;
1770 
1771     success =  g_spawn_sync(NULL, (char **)command, NULL, spawn_flag,
1772                             NULL, NULL, NULL, NULL,
1773                             &exit_status, &g_err);
1774 
1775     if (success) {
1776         return WEXITSTATUS(exit_status);
1777     }
1778 
1779     if (g_err && (g_err->code != G_SPAWN_ERROR_NOENT)) {
1780         error_setg(errp, "failed to create child process, error '%s'",
1781                    g_err->message);
1782     }
1783 
1784     g_error_free(g_err);
1785     return -1;
1786 }
1787 
1788 static bool systemd_supports_mode(SuspendMode mode, Error **errp)
1789 {
1790     const char *systemctl_args[3] = {"systemd-hibernate", "systemd-suspend",
1791                                      "systemd-hybrid-sleep"};
1792     const char *cmd[4] = {"systemctl", "status", systemctl_args[mode], NULL};
1793     int status;
1794 
1795     status = run_process_child(cmd, errp);
1796 
1797     /*
1798      * systemctl status uses LSB return codes so we can expect
1799      * status > 0 and be ok. To assert if the guest has support
1800      * for the selected suspend mode, status should be < 4. 4 is
1801      * the code for unknown service status, the return value when
1802      * the service does not exist. A common value is status = 3
1803      * (program is not running).
1804      */
1805     if (status > 0 && status < 4) {
1806         return true;
1807     }
1808 
1809     return false;
1810 }
1811 
1812 static void systemd_suspend(SuspendMode mode, Error **errp)
1813 {
1814     Error *local_err = NULL;
1815     const char *systemctl_args[3] = {"hibernate", "suspend", "hybrid-sleep"};
1816     const char *cmd[3] = {"systemctl", systemctl_args[mode], NULL};
1817     int status;
1818 
1819     status = run_process_child(cmd, &local_err);
1820 
1821     if (status == 0) {
1822         return;
1823     }
1824 
1825     if ((status == -1) && !local_err) {
1826         error_setg(errp, "the helper program 'systemctl %s' was not found",
1827                    systemctl_args[mode]);
1828         return;
1829     }
1830 
1831     if (local_err) {
1832         error_propagate(errp, local_err);
1833     } else {
1834         error_setg(errp, "the helper program 'systemctl %s' returned an "
1835                    "unexpected exit status code (%d)",
1836                    systemctl_args[mode], status);
1837     }
1838 }
1839 
1840 static bool pmutils_supports_mode(SuspendMode mode, Error **errp)
1841 {
1842     Error *local_err = NULL;
1843     const char *pmutils_args[3] = {"--hibernate", "--suspend",
1844                                    "--suspend-hybrid"};
1845     const char *cmd[3] = {"pm-is-supported", pmutils_args[mode], NULL};
1846     int status;
1847 
1848     status = run_process_child(cmd, &local_err);
1849 
1850     if (status == SUSPEND_SUPPORTED) {
1851         return true;
1852     }
1853 
1854     if ((status == -1) && !local_err) {
1855         return false;
1856     }
1857 
1858     if (local_err) {
1859         error_propagate(errp, local_err);
1860     } else {
1861         error_setg(errp,
1862                    "the helper program '%s' returned an unexpected exit"
1863                    " status code (%d)", "pm-is-supported", status);
1864     }
1865 
1866     return false;
1867 }
1868 
1869 static void pmutils_suspend(SuspendMode mode, Error **errp)
1870 {
1871     Error *local_err = NULL;
1872     const char *pmutils_binaries[3] = {"pm-hibernate", "pm-suspend",
1873                                        "pm-suspend-hybrid"};
1874     const char *cmd[2] = {pmutils_binaries[mode], NULL};
1875     int status;
1876 
1877     status = run_process_child(cmd, &local_err);
1878 
1879     if (status == 0) {
1880         return;
1881     }
1882 
1883     if ((status == -1) && !local_err) {
1884         error_setg(errp, "the helper program '%s' was not found",
1885                    pmutils_binaries[mode]);
1886         return;
1887     }
1888 
1889     if (local_err) {
1890         error_propagate(errp, local_err);
1891     } else {
1892         error_setg(errp,
1893                    "the helper program '%s' returned an unexpected exit"
1894                    " status code (%d)", pmutils_binaries[mode], status);
1895     }
1896 }
1897 
1898 static bool linux_sys_state_supports_mode(SuspendMode mode, Error **errp)
1899 {
1900     const char *sysfile_strs[3] = {"disk", "mem", NULL};
1901     const char *sysfile_str = sysfile_strs[mode];
1902     char buf[32]; /* hopefully big enough */
1903     int fd;
1904     ssize_t ret;
1905 
1906     if (!sysfile_str) {
1907         error_setg(errp, "unknown guest suspend mode");
1908         return false;
1909     }
1910 
1911     fd = open(LINUX_SYS_STATE_FILE, O_RDONLY);
1912     if (fd < 0) {
1913         return false;
1914     }
1915 
1916     ret = read(fd, buf, sizeof(buf) - 1);
1917     close(fd);
1918     if (ret <= 0) {
1919         return false;
1920     }
1921     buf[ret] = '\0';
1922 
1923     if (strstr(buf, sysfile_str)) {
1924         return true;
1925     }
1926     return false;
1927 }
1928 
1929 static void linux_sys_state_suspend(SuspendMode mode, Error **errp)
1930 {
1931     g_autoptr(GError) local_gerr = NULL;
1932     const char *sysfile_strs[3] = {"disk", "mem", NULL};
1933     const char *sysfile_str = sysfile_strs[mode];
1934 
1935     if (!sysfile_str) {
1936         error_setg(errp, "unknown guest suspend mode");
1937         return;
1938     }
1939 
1940     if (!g_file_set_contents(LINUX_SYS_STATE_FILE, sysfile_str,
1941                              -1, &local_gerr)) {
1942         error_setg(errp, "suspend: cannot write to '%s': %s",
1943                    LINUX_SYS_STATE_FILE, local_gerr->message);
1944         return;
1945     }
1946 }
1947 
1948 static void guest_suspend(SuspendMode mode, Error **errp)
1949 {
1950     Error *local_err = NULL;
1951     bool mode_supported = false;
1952 
1953     if (systemd_supports_mode(mode, &local_err)) {
1954         mode_supported = true;
1955         systemd_suspend(mode, &local_err);
1956 
1957         if (!local_err) {
1958             return;
1959         }
1960     }
1961 
1962     error_free(local_err);
1963     local_err = NULL;
1964 
1965     if (pmutils_supports_mode(mode, &local_err)) {
1966         mode_supported = true;
1967         pmutils_suspend(mode, &local_err);
1968 
1969         if (!local_err) {
1970             return;
1971         }
1972     }
1973 
1974     error_free(local_err);
1975     local_err = NULL;
1976 
1977     if (linux_sys_state_supports_mode(mode, &local_err)) {
1978         mode_supported = true;
1979         linux_sys_state_suspend(mode, &local_err);
1980     }
1981 
1982     if (!mode_supported) {
1983         error_free(local_err);
1984         error_setg(errp,
1985                    "the requested suspend mode is not supported by the guest");
1986     } else {
1987         error_propagate(errp, local_err);
1988     }
1989 }
1990 
1991 void qmp_guest_suspend_disk(Error **errp)
1992 {
1993     guest_suspend(SUSPEND_MODE_DISK, errp);
1994 }
1995 
1996 void qmp_guest_suspend_ram(Error **errp)
1997 {
1998     guest_suspend(SUSPEND_MODE_RAM, errp);
1999 }
2000 
2001 void qmp_guest_suspend_hybrid(Error **errp)
2002 {
2003     guest_suspend(SUSPEND_MODE_HYBRID, errp);
2004 }
2005 
2006 /* Transfer online/offline status between @vcpu and the guest system.
2007  *
2008  * On input either @errp or *@errp must be NULL.
2009  *
2010  * In system-to-@vcpu direction, the following @vcpu fields are accessed:
2011  * - R: vcpu->logical_id
2012  * - W: vcpu->online
2013  * - W: vcpu->can_offline
2014  *
2015  * In @vcpu-to-system direction, the following @vcpu fields are accessed:
2016  * - R: vcpu->logical_id
2017  * - R: vcpu->online
2018  *
2019  * Written members remain unmodified on error.
2020  */
2021 static void transfer_vcpu(GuestLogicalProcessor *vcpu, bool sys2vcpu,
2022                           char *dirpath, Error **errp)
2023 {
2024     int fd;
2025     int res;
2026     int dirfd;
2027     static const char fn[] = "online";
2028 
2029     dirfd = open(dirpath, O_RDONLY | O_DIRECTORY);
2030     if (dirfd == -1) {
2031         error_setg_errno(errp, errno, "open(\"%s\")", dirpath);
2032         return;
2033     }
2034 
2035     fd = openat(dirfd, fn, sys2vcpu ? O_RDONLY : O_RDWR);
2036     if (fd == -1) {
2037         if (errno != ENOENT) {
2038             error_setg_errno(errp, errno, "open(\"%s/%s\")", dirpath, fn);
2039         } else if (sys2vcpu) {
2040             vcpu->online = true;
2041             vcpu->can_offline = false;
2042         } else if (!vcpu->online) {
2043             error_setg(errp, "logical processor #%" PRId64 " can't be "
2044                        "offlined", vcpu->logical_id);
2045         } /* otherwise pretend successful re-onlining */
2046     } else {
2047         unsigned char status;
2048 
2049         res = pread(fd, &status, 1, 0);
2050         if (res == -1) {
2051             error_setg_errno(errp, errno, "pread(\"%s/%s\")", dirpath, fn);
2052         } else if (res == 0) {
2053             error_setg(errp, "pread(\"%s/%s\"): unexpected EOF", dirpath,
2054                        fn);
2055         } else if (sys2vcpu) {
2056             vcpu->online = (status != '0');
2057             vcpu->can_offline = true;
2058         } else if (vcpu->online != (status != '0')) {
2059             status = '0' + vcpu->online;
2060             if (pwrite(fd, &status, 1, 0) == -1) {
2061                 error_setg_errno(errp, errno, "pwrite(\"%s/%s\")", dirpath,
2062                                  fn);
2063             }
2064         } /* otherwise pretend successful re-(on|off)-lining */
2065 
2066         res = close(fd);
2067         g_assert(res == 0);
2068     }
2069 
2070     res = close(dirfd);
2071     g_assert(res == 0);
2072 }
2073 
2074 GuestLogicalProcessorList *qmp_guest_get_vcpus(Error **errp)
2075 {
2076     GuestLogicalProcessorList *head, **tail;
2077     const char *cpu_dir = "/sys/devices/system/cpu";
2078     const gchar *line;
2079     g_autoptr(GDir) cpu_gdir = NULL;
2080     Error *local_err = NULL;
2081 
2082     head = NULL;
2083     tail = &head;
2084     cpu_gdir = g_dir_open(cpu_dir, 0, NULL);
2085 
2086     if (cpu_gdir == NULL) {
2087         error_setg_errno(errp, errno, "failed to list entries: %s", cpu_dir);
2088         return NULL;
2089     }
2090 
2091     while (local_err == NULL && (line = g_dir_read_name(cpu_gdir)) != NULL) {
2092         GuestLogicalProcessor *vcpu;
2093         int64_t id;
2094         if (sscanf(line, "cpu%" PRId64, &id)) {
2095             g_autofree char *path = g_strdup_printf("/sys/devices/system/cpu/"
2096                                                     "cpu%" PRId64 "/", id);
2097             vcpu = g_malloc0(sizeof *vcpu);
2098             vcpu->logical_id = id;
2099             vcpu->has_can_offline = true; /* lolspeak ftw */
2100             transfer_vcpu(vcpu, true, path, &local_err);
2101             QAPI_LIST_APPEND(tail, vcpu);
2102         }
2103     }
2104 
2105     if (local_err == NULL) {
2106         /* there's no guest with zero VCPUs */
2107         g_assert(head != NULL);
2108         return head;
2109     }
2110 
2111     qapi_free_GuestLogicalProcessorList(head);
2112     error_propagate(errp, local_err);
2113     return NULL;
2114 }
2115 
2116 int64_t qmp_guest_set_vcpus(GuestLogicalProcessorList *vcpus, Error **errp)
2117 {
2118     int64_t processed;
2119     Error *local_err = NULL;
2120 
2121     processed = 0;
2122     while (vcpus != NULL) {
2123         char *path = g_strdup_printf("/sys/devices/system/cpu/cpu%" PRId64 "/",
2124                                      vcpus->value->logical_id);
2125 
2126         transfer_vcpu(vcpus->value, false, path, &local_err);
2127         g_free(path);
2128         if (local_err != NULL) {
2129             break;
2130         }
2131         ++processed;
2132         vcpus = vcpus->next;
2133     }
2134 
2135     if (local_err != NULL) {
2136         if (processed == 0) {
2137             error_propagate(errp, local_err);
2138         } else {
2139             error_free(local_err);
2140         }
2141     }
2142 
2143     return processed;
2144 }
2145 #endif /* __linux__ */
2146 
2147 #if defined(__linux__) || defined(__FreeBSD__)
2148 void qmp_guest_set_user_password(const char *username,
2149                                  const char *password,
2150                                  bool crypted,
2151                                  Error **errp)
2152 {
2153     Error *local_err = NULL;
2154     g_autofree char *rawpasswddata = NULL;
2155     size_t rawpasswdlen;
2156 
2157     rawpasswddata = (char *)qbase64_decode(password, -1, &rawpasswdlen, errp);
2158     if (!rawpasswddata) {
2159         return;
2160     }
2161     rawpasswddata = g_renew(char, rawpasswddata, rawpasswdlen + 1);
2162     rawpasswddata[rawpasswdlen] = '\0';
2163 
2164     if (strchr(rawpasswddata, '\n')) {
2165         error_setg(errp, "forbidden characters in raw password");
2166         return;
2167     }
2168 
2169     if (strchr(username, '\n') ||
2170         strchr(username, ':')) {
2171         error_setg(errp, "forbidden characters in username");
2172         return;
2173     }
2174 
2175 #ifdef __FreeBSD__
2176     g_autofree char *chpasswddata = g_strdup(rawpasswddata);
2177     const char *crypt_flag = crypted ? "-H" : "-h";
2178     const char *argv[] = {"pw", "usermod", "-n", username,
2179                           crypt_flag, "0", NULL};
2180 #else
2181     g_autofree char *chpasswddata = g_strdup_printf("%s:%s\n", username,
2182                                                     rawpasswddata);
2183     const char *crypt_flag = crypted ? "-e" : NULL;
2184     const char *argv[] = {"chpasswd", crypt_flag, NULL};
2185 #endif
2186 
2187     ga_run_command(argv, chpasswddata, "set user password", &local_err);
2188     if (local_err) {
2189         error_propagate(errp, local_err);
2190         return;
2191     }
2192 }
2193 #else /* __linux__ || __FreeBSD__ */
2194 void qmp_guest_set_user_password(const char *username,
2195                                  const char *password,
2196                                  bool crypted,
2197                                  Error **errp)
2198 {
2199     error_setg(errp, QERR_UNSUPPORTED);
2200 }
2201 #endif /* __linux__ || __FreeBSD__ */
2202 
2203 #ifdef __linux__
2204 static void ga_read_sysfs_file(int dirfd, const char *pathname, char *buf,
2205                                int size, Error **errp)
2206 {
2207     int fd;
2208     int res;
2209 
2210     errno = 0;
2211     fd = openat(dirfd, pathname, O_RDONLY);
2212     if (fd == -1) {
2213         error_setg_errno(errp, errno, "open sysfs file \"%s\"", pathname);
2214         return;
2215     }
2216 
2217     res = pread(fd, buf, size, 0);
2218     if (res == -1) {
2219         error_setg_errno(errp, errno, "pread sysfs file \"%s\"", pathname);
2220     } else if (res == 0) {
2221         error_setg(errp, "pread sysfs file \"%s\": unexpected EOF", pathname);
2222     }
2223     close(fd);
2224 }
2225 
2226 static void ga_write_sysfs_file(int dirfd, const char *pathname,
2227                                 const char *buf, int size, Error **errp)
2228 {
2229     int fd;
2230 
2231     errno = 0;
2232     fd = openat(dirfd, pathname, O_WRONLY);
2233     if (fd == -1) {
2234         error_setg_errno(errp, errno, "open sysfs file \"%s\"", pathname);
2235         return;
2236     }
2237 
2238     if (pwrite(fd, buf, size, 0) == -1) {
2239         error_setg_errno(errp, errno, "pwrite sysfs file \"%s\"", pathname);
2240     }
2241 
2242     close(fd);
2243 }
2244 
2245 /* Transfer online/offline status between @mem_blk and the guest system.
2246  *
2247  * On input either @errp or *@errp must be NULL.
2248  *
2249  * In system-to-@mem_blk direction, the following @mem_blk fields are accessed:
2250  * - R: mem_blk->phys_index
2251  * - W: mem_blk->online
2252  * - W: mem_blk->can_offline
2253  *
2254  * In @mem_blk-to-system direction, the following @mem_blk fields are accessed:
2255  * - R: mem_blk->phys_index
2256  * - R: mem_blk->online
2257  *-  R: mem_blk->can_offline
2258  * Written members remain unmodified on error.
2259  */
2260 static void transfer_memory_block(GuestMemoryBlock *mem_blk, bool sys2memblk,
2261                                   GuestMemoryBlockResponse *result,
2262                                   Error **errp)
2263 {
2264     char *dirpath;
2265     int dirfd;
2266     char *status;
2267     Error *local_err = NULL;
2268 
2269     if (!sys2memblk) {
2270         DIR *dp;
2271 
2272         if (!result) {
2273             error_setg(errp, "Internal error, 'result' should not be NULL");
2274             return;
2275         }
2276         errno = 0;
2277         dp = opendir("/sys/devices/system/memory/");
2278          /* if there is no 'memory' directory in sysfs,
2279          * we think this VM does not support online/offline memory block,
2280          * any other solution?
2281          */
2282         if (!dp) {
2283             if (errno == ENOENT) {
2284                 result->response =
2285                     GUEST_MEMORY_BLOCK_RESPONSE_TYPE_OPERATION_NOT_SUPPORTED;
2286             }
2287             goto out1;
2288         }
2289         closedir(dp);
2290     }
2291 
2292     dirpath = g_strdup_printf("/sys/devices/system/memory/memory%" PRId64 "/",
2293                               mem_blk->phys_index);
2294     dirfd = open(dirpath, O_RDONLY | O_DIRECTORY);
2295     if (dirfd == -1) {
2296         if (sys2memblk) {
2297             error_setg_errno(errp, errno, "open(\"%s\")", dirpath);
2298         } else {
2299             if (errno == ENOENT) {
2300                 result->response = GUEST_MEMORY_BLOCK_RESPONSE_TYPE_NOT_FOUND;
2301             } else {
2302                 result->response =
2303                     GUEST_MEMORY_BLOCK_RESPONSE_TYPE_OPERATION_FAILED;
2304             }
2305         }
2306         g_free(dirpath);
2307         goto out1;
2308     }
2309     g_free(dirpath);
2310 
2311     status = g_malloc0(10);
2312     ga_read_sysfs_file(dirfd, "state", status, 10, &local_err);
2313     if (local_err) {
2314         /* treat with sysfs file that not exist in old kernel */
2315         if (errno == ENOENT) {
2316             error_free(local_err);
2317             if (sys2memblk) {
2318                 mem_blk->online = true;
2319                 mem_blk->can_offline = false;
2320             } else if (!mem_blk->online) {
2321                 result->response =
2322                     GUEST_MEMORY_BLOCK_RESPONSE_TYPE_OPERATION_NOT_SUPPORTED;
2323             }
2324         } else {
2325             if (sys2memblk) {
2326                 error_propagate(errp, local_err);
2327             } else {
2328                 error_free(local_err);
2329                 result->response =
2330                     GUEST_MEMORY_BLOCK_RESPONSE_TYPE_OPERATION_FAILED;
2331             }
2332         }
2333         goto out2;
2334     }
2335 
2336     if (sys2memblk) {
2337         char removable = '0';
2338 
2339         mem_blk->online = (strncmp(status, "online", 6) == 0);
2340 
2341         ga_read_sysfs_file(dirfd, "removable", &removable, 1, &local_err);
2342         if (local_err) {
2343             /* if no 'removable' file, it doesn't support offline mem blk */
2344             if (errno == ENOENT) {
2345                 error_free(local_err);
2346                 mem_blk->can_offline = false;
2347             } else {
2348                 error_propagate(errp, local_err);
2349             }
2350         } else {
2351             mem_blk->can_offline = (removable != '0');
2352         }
2353     } else {
2354         if (mem_blk->online != (strncmp(status, "online", 6) == 0)) {
2355             const char *new_state = mem_blk->online ? "online" : "offline";
2356 
2357             ga_write_sysfs_file(dirfd, "state", new_state, strlen(new_state),
2358                                 &local_err);
2359             if (local_err) {
2360                 error_free(local_err);
2361                 result->response =
2362                     GUEST_MEMORY_BLOCK_RESPONSE_TYPE_OPERATION_FAILED;
2363                 goto out2;
2364             }
2365 
2366             result->response = GUEST_MEMORY_BLOCK_RESPONSE_TYPE_SUCCESS;
2367             result->has_error_code = false;
2368         } /* otherwise pretend successful re-(on|off)-lining */
2369     }
2370     g_free(status);
2371     close(dirfd);
2372     return;
2373 
2374 out2:
2375     g_free(status);
2376     close(dirfd);
2377 out1:
2378     if (!sys2memblk) {
2379         result->has_error_code = true;
2380         result->error_code = errno;
2381     }
2382 }
2383 
2384 GuestMemoryBlockList *qmp_guest_get_memory_blocks(Error **errp)
2385 {
2386     GuestMemoryBlockList *head, **tail;
2387     Error *local_err = NULL;
2388     struct dirent *de;
2389     DIR *dp;
2390 
2391     head = NULL;
2392     tail = &head;
2393 
2394     dp = opendir("/sys/devices/system/memory/");
2395     if (!dp) {
2396         /* it's ok if this happens to be a system that doesn't expose
2397          * memory blocks via sysfs, but otherwise we should report
2398          * an error
2399          */
2400         if (errno != ENOENT) {
2401             error_setg_errno(errp, errno, "Can't open directory"
2402                              "\"/sys/devices/system/memory/\"");
2403         }
2404         return NULL;
2405     }
2406 
2407     /* Note: the phys_index of memory block may be discontinuous,
2408      * this is because a memblk is the unit of the Sparse Memory design, which
2409      * allows discontinuous memory ranges (ex. NUMA), so here we should
2410      * traverse the memory block directory.
2411      */
2412     while ((de = readdir(dp)) != NULL) {
2413         GuestMemoryBlock *mem_blk;
2414 
2415         if ((strncmp(de->d_name, "memory", 6) != 0) ||
2416             !(de->d_type & DT_DIR)) {
2417             continue;
2418         }
2419 
2420         mem_blk = g_malloc0(sizeof *mem_blk);
2421         /* The d_name is "memoryXXX",  phys_index is block id, same as XXX */
2422         mem_blk->phys_index = strtoul(&de->d_name[6], NULL, 10);
2423         mem_blk->has_can_offline = true; /* lolspeak ftw */
2424         transfer_memory_block(mem_blk, true, NULL, &local_err);
2425         if (local_err) {
2426             break;
2427         }
2428 
2429         QAPI_LIST_APPEND(tail, mem_blk);
2430     }
2431 
2432     closedir(dp);
2433     if (local_err == NULL) {
2434         /* there's no guest with zero memory blocks */
2435         if (head == NULL) {
2436             error_setg(errp, "guest reported zero memory blocks!");
2437         }
2438         return head;
2439     }
2440 
2441     qapi_free_GuestMemoryBlockList(head);
2442     error_propagate(errp, local_err);
2443     return NULL;
2444 }
2445 
2446 GuestMemoryBlockResponseList *
2447 qmp_guest_set_memory_blocks(GuestMemoryBlockList *mem_blks, Error **errp)
2448 {
2449     GuestMemoryBlockResponseList *head, **tail;
2450     Error *local_err = NULL;
2451 
2452     head = NULL;
2453     tail = &head;
2454 
2455     while (mem_blks != NULL) {
2456         GuestMemoryBlockResponse *result;
2457         GuestMemoryBlock *current_mem_blk = mem_blks->value;
2458 
2459         result = g_malloc0(sizeof(*result));
2460         result->phys_index = current_mem_blk->phys_index;
2461         transfer_memory_block(current_mem_blk, false, result, &local_err);
2462         if (local_err) { /* should never happen */
2463             goto err;
2464         }
2465 
2466         QAPI_LIST_APPEND(tail, result);
2467         mem_blks = mem_blks->next;
2468     }
2469 
2470     return head;
2471 err:
2472     qapi_free_GuestMemoryBlockResponseList(head);
2473     error_propagate(errp, local_err);
2474     return NULL;
2475 }
2476 
2477 GuestMemoryBlockInfo *qmp_guest_get_memory_block_info(Error **errp)
2478 {
2479     Error *local_err = NULL;
2480     char *dirpath;
2481     int dirfd;
2482     char *buf;
2483     GuestMemoryBlockInfo *info;
2484 
2485     dirpath = g_strdup_printf("/sys/devices/system/memory/");
2486     dirfd = open(dirpath, O_RDONLY | O_DIRECTORY);
2487     if (dirfd == -1) {
2488         error_setg_errno(errp, errno, "open(\"%s\")", dirpath);
2489         g_free(dirpath);
2490         return NULL;
2491     }
2492     g_free(dirpath);
2493 
2494     buf = g_malloc0(20);
2495     ga_read_sysfs_file(dirfd, "block_size_bytes", buf, 20, &local_err);
2496     close(dirfd);
2497     if (local_err) {
2498         g_free(buf);
2499         error_propagate(errp, local_err);
2500         return NULL;
2501     }
2502 
2503     info = g_new0(GuestMemoryBlockInfo, 1);
2504     info->size = strtol(buf, NULL, 16); /* the unit is bytes */
2505 
2506     g_free(buf);
2507 
2508     return info;
2509 }
2510 
2511 #define MAX_NAME_LEN 128
2512 static GuestDiskStatsInfoList *guest_get_diskstats(Error **errp)
2513 {
2514 #ifdef CONFIG_LINUX
2515     GuestDiskStatsInfoList *head = NULL, **tail = &head;
2516     const char *diskstats = "/proc/diskstats";
2517     FILE *fp;
2518     size_t n;
2519     char *line = NULL;
2520 
2521     fp = fopen(diskstats, "r");
2522     if (fp  == NULL) {
2523         error_setg_errno(errp, errno, "open(\"%s\")", diskstats);
2524         return NULL;
2525     }
2526 
2527     while (getline(&line, &n, fp) != -1) {
2528         g_autofree GuestDiskStatsInfo *diskstatinfo = NULL;
2529         g_autofree GuestDiskStats *diskstat = NULL;
2530         char dev_name[MAX_NAME_LEN];
2531         unsigned int ios_pgr, tot_ticks, rq_ticks, wr_ticks, dc_ticks, fl_ticks;
2532         unsigned long rd_ios, rd_merges_or_rd_sec, rd_ticks_or_wr_sec, wr_ios;
2533         unsigned long wr_merges, rd_sec_or_wr_ios, wr_sec;
2534         unsigned long dc_ios, dc_merges, dc_sec, fl_ios;
2535         unsigned int major, minor;
2536         int i;
2537 
2538         i = sscanf(line, "%u %u %s %lu %lu %lu"
2539                    "%lu %lu %lu %lu %u %u %u %u"
2540                    "%lu %lu %lu %u %lu %u",
2541                    &major, &minor, dev_name,
2542                    &rd_ios, &rd_merges_or_rd_sec, &rd_sec_or_wr_ios,
2543                    &rd_ticks_or_wr_sec, &wr_ios, &wr_merges, &wr_sec,
2544                    &wr_ticks, &ios_pgr, &tot_ticks, &rq_ticks,
2545                    &dc_ios, &dc_merges, &dc_sec, &dc_ticks,
2546                    &fl_ios, &fl_ticks);
2547 
2548         if (i < 7) {
2549             continue;
2550         }
2551 
2552         diskstatinfo = g_new0(GuestDiskStatsInfo, 1);
2553         diskstatinfo->name = g_strdup(dev_name);
2554         diskstatinfo->major = major;
2555         diskstatinfo->minor = minor;
2556 
2557         diskstat = g_new0(GuestDiskStats, 1);
2558         if (i == 7) {
2559             diskstat->has_read_ios = true;
2560             diskstat->read_ios = rd_ios;
2561             diskstat->has_read_sectors = true;
2562             diskstat->read_sectors = rd_merges_or_rd_sec;
2563             diskstat->has_write_ios = true;
2564             diskstat->write_ios = rd_sec_or_wr_ios;
2565             diskstat->has_write_sectors = true;
2566             diskstat->write_sectors = rd_ticks_or_wr_sec;
2567         }
2568         if (i >= 14) {
2569             diskstat->has_read_ios = true;
2570             diskstat->read_ios = rd_ios;
2571             diskstat->has_read_sectors = true;
2572             diskstat->read_sectors = rd_sec_or_wr_ios;
2573             diskstat->has_read_merges = true;
2574             diskstat->read_merges = rd_merges_or_rd_sec;
2575             diskstat->has_read_ticks = true;
2576             diskstat->read_ticks = rd_ticks_or_wr_sec;
2577             diskstat->has_write_ios = true;
2578             diskstat->write_ios = wr_ios;
2579             diskstat->has_write_sectors = true;
2580             diskstat->write_sectors = wr_sec;
2581             diskstat->has_write_merges = true;
2582             diskstat->write_merges = wr_merges;
2583             diskstat->has_write_ticks = true;
2584             diskstat->write_ticks = wr_ticks;
2585             diskstat->has_ios_pgr = true;
2586             diskstat->ios_pgr = ios_pgr;
2587             diskstat->has_total_ticks = true;
2588             diskstat->total_ticks = tot_ticks;
2589             diskstat->has_weight_ticks = true;
2590             diskstat->weight_ticks = rq_ticks;
2591         }
2592         if (i >= 18) {
2593             diskstat->has_discard_ios = true;
2594             diskstat->discard_ios = dc_ios;
2595             diskstat->has_discard_merges = true;
2596             diskstat->discard_merges = dc_merges;
2597             diskstat->has_discard_sectors = true;
2598             diskstat->discard_sectors = dc_sec;
2599             diskstat->has_discard_ticks = true;
2600             diskstat->discard_ticks = dc_ticks;
2601         }
2602         if (i >= 20) {
2603             diskstat->has_flush_ios = true;
2604             diskstat->flush_ios = fl_ios;
2605             diskstat->has_flush_ticks = true;
2606             diskstat->flush_ticks = fl_ticks;
2607         }
2608 
2609         diskstatinfo->stats = g_steal_pointer(&diskstat);
2610         QAPI_LIST_APPEND(tail, diskstatinfo);
2611         diskstatinfo = NULL;
2612     }
2613     free(line);
2614     fclose(fp);
2615     return head;
2616 #else
2617     g_debug("disk stats reporting available only for Linux");
2618     return NULL;
2619 #endif
2620 }
2621 
2622 GuestDiskStatsInfoList *qmp_guest_get_diskstats(Error **errp)
2623 {
2624     return guest_get_diskstats(errp);
2625 }
2626 
2627 GuestCpuStatsList *qmp_guest_get_cpustats(Error **errp)
2628 {
2629     GuestCpuStatsList *head = NULL, **tail = &head;
2630     const char *cpustats = "/proc/stat";
2631     int clk_tck = sysconf(_SC_CLK_TCK);
2632     FILE *fp;
2633     size_t n;
2634     char *line = NULL;
2635 
2636     fp = fopen(cpustats, "r");
2637     if (fp  == NULL) {
2638         error_setg_errno(errp, errno, "open(\"%s\")", cpustats);
2639         return NULL;
2640     }
2641 
2642     while (getline(&line, &n, fp) != -1) {
2643         GuestCpuStats *cpustat = NULL;
2644         GuestLinuxCpuStats *linuxcpustat;
2645         int i;
2646         unsigned long user, system, idle, iowait, irq, softirq, steal, guest;
2647         unsigned long nice, guest_nice;
2648         char name[64];
2649 
2650         i = sscanf(line, "%s %lu %lu %lu %lu %lu %lu %lu %lu %lu %lu",
2651                    name, &user, &nice, &system, &idle, &iowait, &irq, &softirq,
2652                    &steal, &guest, &guest_nice);
2653 
2654         /* drop "cpu 1 2 3 ...", get "cpuX 1 2 3 ..." only */
2655         if ((i == EOF) || strncmp(name, "cpu", 3) || (name[3] == '\0')) {
2656             continue;
2657         }
2658 
2659         if (i < 5) {
2660             slog("Parsing cpu stat from %s failed, see \"man proc\"", cpustats);
2661             break;
2662         }
2663 
2664         cpustat = g_new0(GuestCpuStats, 1);
2665         cpustat->type = GUEST_CPU_STATS_TYPE_LINUX;
2666 
2667         linuxcpustat = &cpustat->u.q_linux;
2668         linuxcpustat->cpu = atoi(&name[3]);
2669         linuxcpustat->user = user * 1000 / clk_tck;
2670         linuxcpustat->nice = nice * 1000 / clk_tck;
2671         linuxcpustat->system = system * 1000 / clk_tck;
2672         linuxcpustat->idle = idle * 1000 / clk_tck;
2673 
2674         if (i > 5) {
2675             linuxcpustat->has_iowait = true;
2676             linuxcpustat->iowait = iowait * 1000 / clk_tck;
2677         }
2678 
2679         if (i > 6) {
2680             linuxcpustat->has_irq = true;
2681             linuxcpustat->irq = irq * 1000 / clk_tck;
2682             linuxcpustat->has_softirq = true;
2683             linuxcpustat->softirq = softirq * 1000 / clk_tck;
2684         }
2685 
2686         if (i > 8) {
2687             linuxcpustat->has_steal = true;
2688             linuxcpustat->steal = steal * 1000 / clk_tck;
2689         }
2690 
2691         if (i > 9) {
2692             linuxcpustat->has_guest = true;
2693             linuxcpustat->guest = guest * 1000 / clk_tck;
2694         }
2695 
2696         if (i > 10) {
2697             linuxcpustat->has_guest = true;
2698             linuxcpustat->guest = guest * 1000 / clk_tck;
2699             linuxcpustat->has_guestnice = true;
2700             linuxcpustat->guestnice = guest_nice * 1000 / clk_tck;
2701         }
2702 
2703         QAPI_LIST_APPEND(tail, cpustat);
2704     }
2705 
2706     free(line);
2707     fclose(fp);
2708     return head;
2709 }
2710 
2711 #else /* defined(__linux__) */
2712 
2713 void qmp_guest_suspend_disk(Error **errp)
2714 {
2715     error_setg(errp, QERR_UNSUPPORTED);
2716 }
2717 
2718 void qmp_guest_suspend_ram(Error **errp)
2719 {
2720     error_setg(errp, QERR_UNSUPPORTED);
2721 }
2722 
2723 void qmp_guest_suspend_hybrid(Error **errp)
2724 {
2725     error_setg(errp, QERR_UNSUPPORTED);
2726 }
2727 
2728 GuestLogicalProcessorList *qmp_guest_get_vcpus(Error **errp)
2729 {
2730     error_setg(errp, QERR_UNSUPPORTED);
2731     return NULL;
2732 }
2733 
2734 int64_t qmp_guest_set_vcpus(GuestLogicalProcessorList *vcpus, Error **errp)
2735 {
2736     error_setg(errp, QERR_UNSUPPORTED);
2737     return -1;
2738 }
2739 
2740 GuestMemoryBlockList *qmp_guest_get_memory_blocks(Error **errp)
2741 {
2742     error_setg(errp, QERR_UNSUPPORTED);
2743     return NULL;
2744 }
2745 
2746 GuestMemoryBlockResponseList *
2747 qmp_guest_set_memory_blocks(GuestMemoryBlockList *mem_blks, Error **errp)
2748 {
2749     error_setg(errp, QERR_UNSUPPORTED);
2750     return NULL;
2751 }
2752 
2753 GuestMemoryBlockInfo *qmp_guest_get_memory_block_info(Error **errp)
2754 {
2755     error_setg(errp, QERR_UNSUPPORTED);
2756     return NULL;
2757 }
2758 
2759 #endif
2760 
2761 #ifdef HAVE_GETIFADDRS
2762 static GuestNetworkInterface *
2763 guest_find_interface(GuestNetworkInterfaceList *head,
2764                      const char *name)
2765 {
2766     for (; head; head = head->next) {
2767         if (strcmp(head->value->name, name) == 0) {
2768             return head->value;
2769         }
2770     }
2771 
2772     return NULL;
2773 }
2774 
2775 static int guest_get_network_stats(const char *name,
2776                        GuestNetworkInterfaceStat *stats)
2777 {
2778 #ifdef CONFIG_LINUX
2779     int name_len;
2780     char const *devinfo = "/proc/net/dev";
2781     FILE *fp;
2782     char *line = NULL, *colon;
2783     size_t n = 0;
2784     fp = fopen(devinfo, "r");
2785     if (!fp) {
2786         g_debug("failed to open network stats %s: %s", devinfo,
2787                 g_strerror(errno));
2788         return -1;
2789     }
2790     name_len = strlen(name);
2791     while (getline(&line, &n, fp) != -1) {
2792         long long dummy;
2793         long long rx_bytes;
2794         long long rx_packets;
2795         long long rx_errs;
2796         long long rx_dropped;
2797         long long tx_bytes;
2798         long long tx_packets;
2799         long long tx_errs;
2800         long long tx_dropped;
2801         char *trim_line;
2802         trim_line = g_strchug(line);
2803         if (trim_line[0] == '\0') {
2804             continue;
2805         }
2806         colon = strchr(trim_line, ':');
2807         if (!colon) {
2808             continue;
2809         }
2810         if (colon - name_len  == trim_line &&
2811            strncmp(trim_line, name, name_len) == 0) {
2812             if (sscanf(colon + 1,
2813                 "%lld %lld %lld %lld %lld %lld %lld %lld %lld %lld %lld %lld %lld %lld %lld %lld",
2814                   &rx_bytes, &rx_packets, &rx_errs, &rx_dropped,
2815                   &dummy, &dummy, &dummy, &dummy,
2816                   &tx_bytes, &tx_packets, &tx_errs, &tx_dropped,
2817                   &dummy, &dummy, &dummy, &dummy) != 16) {
2818                 continue;
2819             }
2820             stats->rx_bytes = rx_bytes;
2821             stats->rx_packets = rx_packets;
2822             stats->rx_errs = rx_errs;
2823             stats->rx_dropped = rx_dropped;
2824             stats->tx_bytes = tx_bytes;
2825             stats->tx_packets = tx_packets;
2826             stats->tx_errs = tx_errs;
2827             stats->tx_dropped = tx_dropped;
2828             fclose(fp);
2829             g_free(line);
2830             return 0;
2831         }
2832     }
2833     fclose(fp);
2834     g_free(line);
2835     g_debug("/proc/net/dev: Interface '%s' not found", name);
2836 #else /* !CONFIG_LINUX */
2837     g_debug("Network stats reporting available only for Linux");
2838 #endif /* !CONFIG_LINUX */
2839     return -1;
2840 }
2841 
2842 #ifndef CONFIG_BSD
2843 /*
2844  * Fill "buf" with MAC address by ifaddrs. Pointer buf must point to a
2845  * buffer with ETHER_ADDR_LEN length at least.
2846  *
2847  * Returns false in case of an error, otherwise true. "obtained" argument
2848  * is true if a MAC address was obtained successful, otherwise false.
2849  */
2850 bool guest_get_hw_addr(struct ifaddrs *ifa, unsigned char *buf,
2851                        bool *obtained, Error **errp)
2852 {
2853     struct ifreq ifr;
2854     int sock;
2855 
2856     *obtained = false;
2857 
2858     /* we haven't obtained HW address yet */
2859     sock = socket(PF_INET, SOCK_STREAM, 0);
2860     if (sock == -1) {
2861         error_setg_errno(errp, errno, "failed to create socket");
2862         return false;
2863     }
2864 
2865     memset(&ifr, 0, sizeof(ifr));
2866     pstrcpy(ifr.ifr_name, IF_NAMESIZE, ifa->ifa_name);
2867     if (ioctl(sock, SIOCGIFHWADDR, &ifr) == -1) {
2868         /*
2869          * We can't get the hw addr of this interface, but that's not a
2870          * fatal error.
2871          */
2872         if (errno == EADDRNOTAVAIL) {
2873             /* The interface doesn't have a hw addr (e.g. loopback). */
2874             g_debug("failed to get MAC address of %s: %s",
2875                     ifa->ifa_name, strerror(errno));
2876         } else{
2877             g_warning("failed to get MAC address of %s: %s",
2878                       ifa->ifa_name, strerror(errno));
2879         }
2880     } else {
2881 #ifdef CONFIG_SOLARIS
2882         memcpy(buf, &ifr.ifr_addr.sa_data, ETHER_ADDR_LEN);
2883 #else
2884         memcpy(buf, &ifr.ifr_hwaddr.sa_data, ETHER_ADDR_LEN);
2885 #endif
2886         *obtained = true;
2887     }
2888     close(sock);
2889     return true;
2890 }
2891 #endif /* CONFIG_BSD */
2892 
2893 /*
2894  * Build information about guest interfaces
2895  */
2896 GuestNetworkInterfaceList *qmp_guest_network_get_interfaces(Error **errp)
2897 {
2898     GuestNetworkInterfaceList *head = NULL, **tail = &head;
2899     struct ifaddrs *ifap, *ifa;
2900 
2901     if (getifaddrs(&ifap) < 0) {
2902         error_setg_errno(errp, errno, "getifaddrs failed");
2903         goto error;
2904     }
2905 
2906     for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
2907         GuestNetworkInterface *info;
2908         GuestIpAddressList **address_tail;
2909         GuestIpAddress *address_item = NULL;
2910         GuestNetworkInterfaceStat *interface_stat = NULL;
2911         char addr4[INET_ADDRSTRLEN];
2912         char addr6[INET6_ADDRSTRLEN];
2913         unsigned char mac_addr[ETHER_ADDR_LEN];
2914         bool obtained;
2915         void *p;
2916 
2917         g_debug("Processing %s interface", ifa->ifa_name);
2918 
2919         info = guest_find_interface(head, ifa->ifa_name);
2920 
2921         if (!info) {
2922             info = g_malloc0(sizeof(*info));
2923             info->name = g_strdup(ifa->ifa_name);
2924 
2925             QAPI_LIST_APPEND(tail, info);
2926         }
2927 
2928         if (!info->hardware_address) {
2929             if (!guest_get_hw_addr(ifa, mac_addr, &obtained, errp)) {
2930                 goto error;
2931             }
2932             if (obtained) {
2933                 info->hardware_address =
2934                     g_strdup_printf("%02x:%02x:%02x:%02x:%02x:%02x",
2935                                     (int) mac_addr[0], (int) mac_addr[1],
2936                                     (int) mac_addr[2], (int) mac_addr[3],
2937                                     (int) mac_addr[4], (int) mac_addr[5]);
2938             }
2939         }
2940 
2941         if (ifa->ifa_addr &&
2942             ifa->ifa_addr->sa_family == AF_INET) {
2943             /* interface with IPv4 address */
2944             p = &((struct sockaddr_in *)ifa->ifa_addr)->sin_addr;
2945             if (!inet_ntop(AF_INET, p, addr4, sizeof(addr4))) {
2946                 error_setg_errno(errp, errno, "inet_ntop failed");
2947                 goto error;
2948             }
2949 
2950             address_item = g_malloc0(sizeof(*address_item));
2951             address_item->ip_address = g_strdup(addr4);
2952             address_item->ip_address_type = GUEST_IP_ADDRESS_TYPE_IPV4;
2953 
2954             if (ifa->ifa_netmask) {
2955                 /* Count the number of set bits in netmask.
2956                  * This is safe as '1' and '0' cannot be shuffled in netmask. */
2957                 p = &((struct sockaddr_in *)ifa->ifa_netmask)->sin_addr;
2958                 address_item->prefix = ctpop32(((uint32_t *) p)[0]);
2959             }
2960         } else if (ifa->ifa_addr &&
2961                    ifa->ifa_addr->sa_family == AF_INET6) {
2962             /* interface with IPv6 address */
2963             p = &((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_addr;
2964             if (!inet_ntop(AF_INET6, p, addr6, sizeof(addr6))) {
2965                 error_setg_errno(errp, errno, "inet_ntop failed");
2966                 goto error;
2967             }
2968 
2969             address_item = g_malloc0(sizeof(*address_item));
2970             address_item->ip_address = g_strdup(addr6);
2971             address_item->ip_address_type = GUEST_IP_ADDRESS_TYPE_IPV6;
2972 
2973             if (ifa->ifa_netmask) {
2974                 /* Count the number of set bits in netmask.
2975                  * This is safe as '1' and '0' cannot be shuffled in netmask. */
2976                 p = &((struct sockaddr_in6 *)ifa->ifa_netmask)->sin6_addr;
2977                 address_item->prefix =
2978                     ctpop32(((uint32_t *) p)[0]) +
2979                     ctpop32(((uint32_t *) p)[1]) +
2980                     ctpop32(((uint32_t *) p)[2]) +
2981                     ctpop32(((uint32_t *) p)[3]);
2982             }
2983         }
2984 
2985         if (!address_item) {
2986             continue;
2987         }
2988 
2989         address_tail = &info->ip_addresses;
2990         while (*address_tail) {
2991             address_tail = &(*address_tail)->next;
2992         }
2993         QAPI_LIST_APPEND(address_tail, address_item);
2994 
2995         info->has_ip_addresses = true;
2996 
2997         if (!info->statistics) {
2998             interface_stat = g_malloc0(sizeof(*interface_stat));
2999             if (guest_get_network_stats(info->name, interface_stat) == -1) {
3000                 g_free(interface_stat);
3001             } else {
3002                 info->statistics = interface_stat;
3003             }
3004         }
3005     }
3006 
3007     freeifaddrs(ifap);
3008     return head;
3009 
3010 error:
3011     freeifaddrs(ifap);
3012     qapi_free_GuestNetworkInterfaceList(head);
3013     return NULL;
3014 }
3015 
3016 #else
3017 
3018 GuestNetworkInterfaceList *qmp_guest_network_get_interfaces(Error **errp)
3019 {
3020     error_setg(errp, QERR_UNSUPPORTED);
3021     return NULL;
3022 }
3023 
3024 #endif /* HAVE_GETIFADDRS */
3025 
3026 #if !defined(CONFIG_FSFREEZE)
3027 
3028 GuestFilesystemInfoList *qmp_guest_get_fsinfo(Error **errp)
3029 {
3030     error_setg(errp, QERR_UNSUPPORTED);
3031     return NULL;
3032 }
3033 
3034 GuestFsfreezeStatus qmp_guest_fsfreeze_status(Error **errp)
3035 {
3036     error_setg(errp, QERR_UNSUPPORTED);
3037 
3038     return 0;
3039 }
3040 
3041 int64_t qmp_guest_fsfreeze_freeze(Error **errp)
3042 {
3043     error_setg(errp, QERR_UNSUPPORTED);
3044 
3045     return 0;
3046 }
3047 
3048 int64_t qmp_guest_fsfreeze_freeze_list(bool has_mountpoints,
3049                                        strList *mountpoints,
3050                                        Error **errp)
3051 {
3052     error_setg(errp, QERR_UNSUPPORTED);
3053 
3054     return 0;
3055 }
3056 
3057 int64_t qmp_guest_fsfreeze_thaw(Error **errp)
3058 {
3059     error_setg(errp, QERR_UNSUPPORTED);
3060 
3061     return 0;
3062 }
3063 
3064 GuestDiskInfoList *qmp_guest_get_disks(Error **errp)
3065 {
3066     error_setg(errp, QERR_UNSUPPORTED);
3067     return NULL;
3068 }
3069 
3070 GuestDiskStatsInfoList *qmp_guest_get_diskstats(Error **errp)
3071 {
3072     error_setg(errp, QERR_UNSUPPORTED);
3073     return NULL;
3074 }
3075 
3076 GuestCpuStatsList *qmp_guest_get_cpustats(Error **errp)
3077 {
3078     error_setg(errp, QERR_UNSUPPORTED);
3079     return NULL;
3080 }
3081 
3082 #endif /* CONFIG_FSFREEZE */
3083 
3084 #if !defined(CONFIG_FSTRIM)
3085 GuestFilesystemTrimResponse *
3086 qmp_guest_fstrim(bool has_minimum, int64_t minimum, Error **errp)
3087 {
3088     error_setg(errp, QERR_UNSUPPORTED);
3089     return NULL;
3090 }
3091 #endif
3092 
3093 /* add unsupported commands to the list of blocked RPCs */
3094 GList *ga_command_init_blockedrpcs(GList *blockedrpcs)
3095 {
3096 #if !defined(__linux__)
3097     {
3098         const char *list[] = {
3099             "guest-suspend-disk", "guest-suspend-ram",
3100             "guest-suspend-hybrid", "guest-get-vcpus", "guest-set-vcpus",
3101             "guest-get-memory-blocks", "guest-set-memory-blocks",
3102             "guest-get-memory-block-size", "guest-get-memory-block-info",
3103             NULL};
3104         char **p = (char **)list;
3105 
3106         while (*p) {
3107             blockedrpcs = g_list_append(blockedrpcs, g_strdup(*p++));
3108         }
3109     }
3110 #endif
3111 
3112 #if !defined(HAVE_GETIFADDRS)
3113     blockedrpcs = g_list_append(blockedrpcs,
3114                               g_strdup("guest-network-get-interfaces"));
3115 #endif
3116 
3117 #if !defined(CONFIG_FSFREEZE)
3118     {
3119         const char *list[] = {
3120             "guest-get-fsinfo", "guest-fsfreeze-status",
3121             "guest-fsfreeze-freeze", "guest-fsfreeze-freeze-list",
3122             "guest-fsfreeze-thaw", "guest-get-fsinfo",
3123             "guest-get-disks", NULL};
3124         char **p = (char **)list;
3125 
3126         while (*p) {
3127             blockedrpcs = g_list_append(blockedrpcs, g_strdup(*p++));
3128         }
3129     }
3130 #endif
3131 
3132 #if !defined(CONFIG_FSTRIM)
3133     blockedrpcs = g_list_append(blockedrpcs, g_strdup("guest-fstrim"));
3134 #endif
3135 
3136     blockedrpcs = g_list_append(blockedrpcs, g_strdup("guest-get-devices"));
3137 
3138     return blockedrpcs;
3139 }
3140 
3141 /* register init/cleanup routines for stateful command groups */
3142 void ga_command_state_init(GAState *s, GACommandState *cs)
3143 {
3144 #if defined(CONFIG_FSFREEZE)
3145     ga_command_state_add(cs, NULL, guest_fsfreeze_cleanup);
3146 #endif
3147 }
3148 
3149 #ifdef HAVE_UTMPX
3150 
3151 #define QGA_MICRO_SECOND_TO_SECOND 1000000
3152 
3153 static double ga_get_login_time(struct utmpx *user_info)
3154 {
3155     double seconds = (double)user_info->ut_tv.tv_sec;
3156     double useconds = (double)user_info->ut_tv.tv_usec;
3157     useconds /= QGA_MICRO_SECOND_TO_SECOND;
3158     return seconds + useconds;
3159 }
3160 
3161 GuestUserList *qmp_guest_get_users(Error **errp)
3162 {
3163     GHashTable *cache = NULL;
3164     GuestUserList *head = NULL, **tail = &head;
3165     struct utmpx *user_info = NULL;
3166     gpointer value = NULL;
3167     GuestUser *user = NULL;
3168     double login_time = 0;
3169 
3170     cache = g_hash_table_new(g_str_hash, g_str_equal);
3171     setutxent();
3172 
3173     for (;;) {
3174         user_info = getutxent();
3175         if (user_info == NULL) {
3176             break;
3177         } else if (user_info->ut_type != USER_PROCESS) {
3178             continue;
3179         } else if (g_hash_table_contains(cache, user_info->ut_user)) {
3180             value = g_hash_table_lookup(cache, user_info->ut_user);
3181             user = (GuestUser *)value;
3182             login_time = ga_get_login_time(user_info);
3183             /* We're ensuring the earliest login time to be sent */
3184             if (login_time < user->login_time) {
3185                 user->login_time = login_time;
3186             }
3187             continue;
3188         }
3189 
3190         user = g_new0(GuestUser, 1);
3191         user->user = g_strdup(user_info->ut_user);
3192         user->login_time = ga_get_login_time(user_info);
3193 
3194         g_hash_table_insert(cache, user->user, user);
3195 
3196         QAPI_LIST_APPEND(tail, user);
3197     }
3198     endutxent();
3199     g_hash_table_destroy(cache);
3200     return head;
3201 }
3202 
3203 #else
3204 
3205 GuestUserList *qmp_guest_get_users(Error **errp)
3206 {
3207     error_setg(errp, QERR_UNSUPPORTED);
3208     return NULL;
3209 }
3210 
3211 #endif
3212 
3213 /* Replace escaped special characters with their real values. The replacement
3214  * is done in place -- returned value is in the original string.
3215  */
3216 static void ga_osrelease_replace_special(gchar *value)
3217 {
3218     gchar *p, *p2, quote;
3219 
3220     /* Trim the string at first space or semicolon if it is not enclosed in
3221      * single or double quotes. */
3222     if ((value[0] != '"') || (value[0] == '\'')) {
3223         p = strchr(value, ' ');
3224         if (p != NULL) {
3225             *p = 0;
3226         }
3227         p = strchr(value, ';');
3228         if (p != NULL) {
3229             *p = 0;
3230         }
3231         return;
3232     }
3233 
3234     quote = value[0];
3235     p2 = value;
3236     p = value + 1;
3237     while (*p != 0) {
3238         if (*p == '\\') {
3239             p++;
3240             switch (*p) {
3241             case '$':
3242             case '\'':
3243             case '"':
3244             case '\\':
3245             case '`':
3246                 break;
3247             default:
3248                 /* Keep literal backslash followed by whatever is there */
3249                 p--;
3250                 break;
3251             }
3252         } else if (*p == quote) {
3253             *p2 = 0;
3254             break;
3255         }
3256         *(p2++) = *(p++);
3257     }
3258 }
3259 
3260 static GKeyFile *ga_parse_osrelease(const char *fname)
3261 {
3262     gchar *content = NULL;
3263     gchar *content2 = NULL;
3264     GError *err = NULL;
3265     GKeyFile *keys = g_key_file_new();
3266     const char *group = "[os-release]\n";
3267 
3268     if (!g_file_get_contents(fname, &content, NULL, &err)) {
3269         slog("failed to read '%s', error: %s", fname, err->message);
3270         goto fail;
3271     }
3272 
3273     if (!g_utf8_validate(content, -1, NULL)) {
3274         slog("file is not utf-8 encoded: %s", fname);
3275         goto fail;
3276     }
3277     content2 = g_strdup_printf("%s%s", group, content);
3278 
3279     if (!g_key_file_load_from_data(keys, content2, -1, G_KEY_FILE_NONE,
3280                                    &err)) {
3281         slog("failed to parse file '%s', error: %s", fname, err->message);
3282         goto fail;
3283     }
3284 
3285     g_free(content);
3286     g_free(content2);
3287     return keys;
3288 
3289 fail:
3290     g_error_free(err);
3291     g_free(content);
3292     g_free(content2);
3293     g_key_file_free(keys);
3294     return NULL;
3295 }
3296 
3297 GuestOSInfo *qmp_guest_get_osinfo(Error **errp)
3298 {
3299     GuestOSInfo *info = NULL;
3300     struct utsname kinfo;
3301     GKeyFile *osrelease = NULL;
3302     const char *qga_os_release = g_getenv("QGA_OS_RELEASE");
3303 
3304     info = g_new0(GuestOSInfo, 1);
3305 
3306     if (uname(&kinfo) != 0) {
3307         error_setg_errno(errp, errno, "uname failed");
3308     } else {
3309         info->kernel_version = g_strdup(kinfo.version);
3310         info->kernel_release = g_strdup(kinfo.release);
3311         info->machine = g_strdup(kinfo.machine);
3312     }
3313 
3314     if (qga_os_release != NULL) {
3315         osrelease = ga_parse_osrelease(qga_os_release);
3316     } else {
3317         osrelease = ga_parse_osrelease("/etc/os-release");
3318         if (osrelease == NULL) {
3319             osrelease = ga_parse_osrelease("/usr/lib/os-release");
3320         }
3321     }
3322 
3323     if (osrelease != NULL) {
3324         char *value;
3325 
3326 #define GET_FIELD(field, osfield) do { \
3327     value = g_key_file_get_value(osrelease, "os-release", osfield, NULL); \
3328     if (value != NULL) { \
3329         ga_osrelease_replace_special(value); \
3330         info->field = value; \
3331     } \
3332 } while (0)
3333         GET_FIELD(id, "ID");
3334         GET_FIELD(name, "NAME");
3335         GET_FIELD(pretty_name, "PRETTY_NAME");
3336         GET_FIELD(version, "VERSION");
3337         GET_FIELD(version_id, "VERSION_ID");
3338         GET_FIELD(variant, "VARIANT");
3339         GET_FIELD(variant_id, "VARIANT_ID");
3340 #undef GET_FIELD
3341 
3342         g_key_file_free(osrelease);
3343     }
3344 
3345     return info;
3346 }
3347 
3348 GuestDeviceInfoList *qmp_guest_get_devices(Error **errp)
3349 {
3350     error_setg(errp, QERR_UNSUPPORTED);
3351 
3352     return NULL;
3353 }
3354 
3355 #ifndef HOST_NAME_MAX
3356 # ifdef _POSIX_HOST_NAME_MAX
3357 #  define HOST_NAME_MAX _POSIX_HOST_NAME_MAX
3358 # else
3359 #  define HOST_NAME_MAX 255
3360 # endif
3361 #endif
3362 
3363 char *qga_get_host_name(Error **errp)
3364 {
3365     long len = -1;
3366     g_autofree char *hostname = NULL;
3367 
3368 #ifdef _SC_HOST_NAME_MAX
3369     len = sysconf(_SC_HOST_NAME_MAX);
3370 #endif /* _SC_HOST_NAME_MAX */
3371 
3372     if (len < 0) {
3373         len = HOST_NAME_MAX;
3374     }
3375 
3376     /* Unfortunately, gethostname() below does not guarantee a
3377      * NULL terminated string. Therefore, allocate one byte more
3378      * to be sure. */
3379     hostname = g_new0(char, len + 1);
3380 
3381     if (gethostname(hostname, len) < 0) {
3382         error_setg_errno(errp, errno,
3383                          "cannot get hostname");
3384         return NULL;
3385     }
3386 
3387     return g_steal_pointer(&hostname);
3388 }
3389