blob: d39c0b20550147584ed0525db6e2f38200998e34 [file] [log] [blame]
Michael Rothd8ca6852012-01-19 22:04:34 -06001/*
2 * QEMU Guest Agent win32-specific command implementations
3 *
4 * Copyright IBM Corp. 2012
5 *
6 * Authors:
7 * Michael Roth <mdroth@linux.vnet.ibm.com>
Gal Hammeraa596372012-01-29 11:53:31 +02008 * Gal Hammer <ghammer@redhat.com>
Michael Rothd8ca6852012-01-19 22:04:34 -06009 *
10 * This work is licensed under the terms of the GNU GPL, version 2 or later.
11 * See the COPYING file in the top-level directory.
12 */
13
14#include <glib.h>
Gal Hammeraa596372012-01-29 11:53:31 +020015#include <wtypes.h>
16#include <powrprof.h>
Olga Krishtalfa193592015-02-06 20:59:55 +030017#include <stdio.h>
18#include <string.h>
Kirk Alland6c55282015-06-02 11:41:07 -060019#include <winsock2.h>
20#include <ws2tcpip.h>
21#include <iptypes.h>
22#include <iphlpapi.h>
Michael Rothd8ca6852012-01-19 22:04:34 -060023#include "qga/guest-agent-core.h"
Tomoki Sekiyama64c00312013-08-07 11:40:25 -040024#include "qga/vss-win32.h"
Michael Rothd8ca6852012-01-19 22:04:34 -060025#include "qga-qmp-commands.h"
Paolo Bonzini7b1b5d12012-12-17 18:19:43 +010026#include "qapi/qmp/qerror.h"
Olga Krishtalfa193592015-02-06 20:59:55 +030027#include "qemu/queue.h"
Kirk Alland6c55282015-06-02 11:41:07 -060028#include "qemu/host-utils.h"
Michael Rothd8ca6852012-01-19 22:04:34 -060029
Michael Roth546b60d2012-01-22 20:24:37 -060030#ifndef SHTDN_REASON_FLAG_PLANNED
31#define SHTDN_REASON_FLAG_PLANNED 0x80000000
32#endif
33
Lei Li3f2a6082013-03-15 17:29:04 +080034/* multiple of 100 nanoseconds elapsed between windows baseline
35 * (1/1/1601) and Unix Epoch (1/1/1970), accounting for leap years */
36#define W32_FT_OFFSET (10000000ULL * 60 * 60 * 24 * \
37 (365 * (1970 - 1601) + \
38 (1970 - 1601) / 4 - 3))
39
Olga Krishtalfa193592015-02-06 20:59:55 +030040#define INVALID_SET_FILE_POINTER ((DWORD)-1)
41
42typedef struct GuestFileHandle {
43 int64_t id;
44 HANDLE fh;
45 QTAILQ_ENTRY(GuestFileHandle) next;
46} GuestFileHandle;
47
48static struct {
49 QTAILQ_HEAD(, GuestFileHandle) filehandles;
50} guest_file_state;
51
52
53typedef struct OpenFlags {
54 const char *forms;
55 DWORD desired_access;
56 DWORD creation_disposition;
57} OpenFlags;
58static OpenFlags guest_file_open_modes[] = {
59 {"r", GENERIC_READ, OPEN_EXISTING},
60 {"rb", GENERIC_READ, OPEN_EXISTING},
61 {"w", GENERIC_WRITE, CREATE_ALWAYS},
62 {"wb", GENERIC_WRITE, CREATE_ALWAYS},
63 {"a", GENERIC_WRITE, OPEN_ALWAYS },
64 {"r+", GENERIC_WRITE|GENERIC_READ, OPEN_EXISTING},
65 {"rb+", GENERIC_WRITE|GENERIC_READ, OPEN_EXISTING},
66 {"r+b", GENERIC_WRITE|GENERIC_READ, OPEN_EXISTING},
67 {"w+", GENERIC_WRITE|GENERIC_READ, CREATE_ALWAYS},
68 {"wb+", GENERIC_WRITE|GENERIC_READ, CREATE_ALWAYS},
69 {"w+b", GENERIC_WRITE|GENERIC_READ, CREATE_ALWAYS},
70 {"a+", GENERIC_WRITE|GENERIC_READ, OPEN_ALWAYS },
71 {"ab+", GENERIC_WRITE|GENERIC_READ, OPEN_ALWAYS },
72 {"a+b", GENERIC_WRITE|GENERIC_READ, OPEN_ALWAYS }
73};
74
75static OpenFlags *find_open_flag(const char *mode_str)
76{
77 int mode;
78 Error **errp = NULL;
79
80 for (mode = 0; mode < ARRAY_SIZE(guest_file_open_modes); ++mode) {
81 OpenFlags *flags = guest_file_open_modes + mode;
82
83 if (strcmp(flags->forms, mode_str) == 0) {
84 return flags;
85 }
86 }
87
88 error_setg(errp, "invalid file open mode '%s'", mode_str);
89 return NULL;
90}
91
92static int64_t guest_file_handle_add(HANDLE fh, Error **errp)
93{
94 GuestFileHandle *gfh;
95 int64_t handle;
96
97 handle = ga_get_fd_handle(ga_state, errp);
98 if (handle < 0) {
99 return -1;
100 }
101 gfh = g_malloc0(sizeof(GuestFileHandle));
102 gfh->id = handle;
103 gfh->fh = fh;
104 QTAILQ_INSERT_TAIL(&guest_file_state.filehandles, gfh, next);
105
106 return handle;
107}
108
109static GuestFileHandle *guest_file_handle_find(int64_t id, Error **errp)
110{
111 GuestFileHandle *gfh;
112 QTAILQ_FOREACH(gfh, &guest_file_state.filehandles, next) {
113 if (gfh->id == id) {
114 return gfh;
115 }
116 }
117 error_setg(errp, "handle '%" PRId64 "' has not been found", id);
118 return NULL;
119}
120
121int64_t qmp_guest_file_open(const char *path, bool has_mode,
122 const char *mode, Error **errp)
123{
124 int64_t fd;
125 HANDLE fh;
126 HANDLE templ_file = NULL;
127 DWORD share_mode = FILE_SHARE_READ;
128 DWORD flags_and_attr = FILE_ATTRIBUTE_NORMAL;
129 LPSECURITY_ATTRIBUTES sa_attr = NULL;
130 OpenFlags *guest_flags;
131
132 if (!has_mode) {
133 mode = "r";
134 }
135 slog("guest-file-open called, filepath: %s, mode: %s", path, mode);
136 guest_flags = find_open_flag(mode);
137 if (guest_flags == NULL) {
138 error_setg(errp, "invalid file open mode");
139 return -1;
140 }
141
142 fh = CreateFile(path, guest_flags->desired_access, share_mode, sa_attr,
143 guest_flags->creation_disposition, flags_and_attr,
144 templ_file);
145 if (fh == INVALID_HANDLE_VALUE) {
146 error_setg_win32(errp, GetLastError(), "failed to open file '%s'",
147 path);
148 return -1;
149 }
150
151 fd = guest_file_handle_add(fh, errp);
152 if (fd < 0) {
153 CloseHandle(&fh);
154 error_setg(errp, "failed to add handle to qmp handle table");
155 return -1;
156 }
157
158 slog("guest-file-open, handle: % " PRId64, fd);
159 return fd;
160}
161
162void qmp_guest_file_close(int64_t handle, Error **errp)
163{
164 bool ret;
165 GuestFileHandle *gfh = guest_file_handle_find(handle, errp);
166 slog("guest-file-close called, handle: %" PRId64, handle);
167 if (gfh == NULL) {
168 return;
169 }
170 ret = CloseHandle(gfh->fh);
171 if (!ret) {
172 error_setg_win32(errp, GetLastError(), "failed close handle");
173 return;
174 }
175
176 QTAILQ_REMOVE(&guest_file_state.filehandles, gfh, next);
177 g_free(gfh);
178}
179
Markus Armbruster77dbc812014-05-02 13:26:30 +0200180static void acquire_privilege(const char *name, Error **errp)
Michael Rothd8ca6852012-01-19 22:04:34 -0600181{
Gonglei374044f2014-05-19 15:26:03 +0800182 HANDLE token = NULL;
Michael Roth546b60d2012-01-22 20:24:37 -0600183 TOKEN_PRIVILEGES priv;
Gal Hammeraa596372012-01-29 11:53:31 +0200184 Error *local_err = NULL;
185
Gal Hammeraa596372012-01-29 11:53:31 +0200186 if (OpenProcessToken(GetCurrentProcess(),
187 TOKEN_ADJUST_PRIVILEGES|TOKEN_QUERY, &token))
188 {
189 if (!LookupPrivilegeValue(NULL, name, &priv.Privileges[0].Luid)) {
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100190 error_setg(&local_err, QERR_QGA_COMMAND_FAILED,
191 "no luid for requested privilege");
Gal Hammeraa596372012-01-29 11:53:31 +0200192 goto out;
193 }
194
195 priv.PrivilegeCount = 1;
196 priv.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
197
198 if (!AdjustTokenPrivileges(token, FALSE, &priv, 0, NULL, 0)) {
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100199 error_setg(&local_err, QERR_QGA_COMMAND_FAILED,
200 "unable to acquire requested privilege");
Gal Hammeraa596372012-01-29 11:53:31 +0200201 goto out;
202 }
203
Gal Hammeraa596372012-01-29 11:53:31 +0200204 } else {
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100205 error_setg(&local_err, QERR_QGA_COMMAND_FAILED,
206 "failed to open privilege token");
Gal Hammeraa596372012-01-29 11:53:31 +0200207 }
208
209out:
Gonglei374044f2014-05-19 15:26:03 +0800210 if (token) {
211 CloseHandle(token);
212 }
Gal Hammeraa596372012-01-29 11:53:31 +0200213 if (local_err) {
Markus Armbruster77dbc812014-05-02 13:26:30 +0200214 error_propagate(errp, local_err);
Gal Hammeraa596372012-01-29 11:53:31 +0200215 }
216}
217
Markus Armbruster77dbc812014-05-02 13:26:30 +0200218static void execute_async(DWORD WINAPI (*func)(LPVOID), LPVOID opaque,
219 Error **errp)
Gal Hammeraa596372012-01-29 11:53:31 +0200220{
221 Error *local_err = NULL;
222
Gal Hammeraa596372012-01-29 11:53:31 +0200223 HANDLE thread = CreateThread(NULL, 0, func, opaque, 0, NULL);
224 if (!thread) {
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100225 error_setg(&local_err, QERR_QGA_COMMAND_FAILED,
226 "failed to dispatch asynchronous command");
Markus Armbruster77dbc812014-05-02 13:26:30 +0200227 error_propagate(errp, local_err);
Gal Hammeraa596372012-01-29 11:53:31 +0200228 }
229}
230
Markus Armbruster77dbc812014-05-02 13:26:30 +0200231void qmp_guest_shutdown(bool has_mode, const char *mode, Error **errp)
Gal Hammeraa596372012-01-29 11:53:31 +0200232{
Markus Armbruster0f230bf2014-05-02 13:26:38 +0200233 Error *local_err = NULL;
Michael Roth546b60d2012-01-22 20:24:37 -0600234 UINT shutdown_flag = EWX_FORCE;
235
236 slog("guest-shutdown called, mode: %s", mode);
237
238 if (!has_mode || strcmp(mode, "powerdown") == 0) {
239 shutdown_flag |= EWX_POWEROFF;
240 } else if (strcmp(mode, "halt") == 0) {
241 shutdown_flag |= EWX_SHUTDOWN;
242 } else if (strcmp(mode, "reboot") == 0) {
243 shutdown_flag |= EWX_REBOOT;
244 } else {
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100245 error_setg(errp, QERR_INVALID_PARAMETER_VALUE, "mode",
246 "halt|powerdown|reboot");
Michael Roth546b60d2012-01-22 20:24:37 -0600247 return;
248 }
249
250 /* Request a shutdown privilege, but try to shut down the system
251 anyway. */
Markus Armbruster0f230bf2014-05-02 13:26:38 +0200252 acquire_privilege(SE_SHUTDOWN_NAME, &local_err);
253 if (local_err) {
254 error_propagate(errp, local_err);
Gal Hammeraa596372012-01-29 11:53:31 +0200255 return;
Michael Roth546b60d2012-01-22 20:24:37 -0600256 }
257
258 if (!ExitWindowsEx(shutdown_flag, SHTDN_REASON_FLAG_PLANNED)) {
Stefan Weil16f4e8f2013-11-25 20:54:17 +0100259 slog("guest-shutdown failed: %lu", GetLastError());
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100260 error_setg(errp, QERR_UNDEFINED_ERROR);
Michael Roth546b60d2012-01-22 20:24:37 -0600261 }
Michael Rothd8ca6852012-01-19 22:04:34 -0600262}
263
Michael Rothd8ca6852012-01-19 22:04:34 -0600264GuestFileRead *qmp_guest_file_read(int64_t handle, bool has_count,
Markus Armbruster77dbc812014-05-02 13:26:30 +0200265 int64_t count, Error **errp)
Michael Rothd8ca6852012-01-19 22:04:34 -0600266{
Olga Krishtalfa193592015-02-06 20:59:55 +0300267 GuestFileRead *read_data = NULL;
268 guchar *buf;
269 HANDLE fh;
270 bool is_ok;
271 DWORD read_count;
272 GuestFileHandle *gfh = guest_file_handle_find(handle, errp);
273
274 if (!gfh) {
275 return NULL;
276 }
277 if (!has_count) {
278 count = QGA_READ_COUNT_DEFAULT;
279 } else if (count < 0) {
280 error_setg(errp, "value '%" PRId64
281 "' is invalid for argument count", count);
282 return NULL;
283 }
284
285 fh = gfh->fh;
286 buf = g_malloc0(count+1);
287 is_ok = ReadFile(fh, buf, count, &read_count, NULL);
288 if (!is_ok) {
289 error_setg_win32(errp, GetLastError(), "failed to read file");
290 slog("guest-file-read failed, handle %" PRId64, handle);
291 } else {
292 buf[read_count] = 0;
293 read_data = g_malloc0(sizeof(GuestFileRead));
294 read_data->count = (size_t)read_count;
295 read_data->eof = read_count == 0;
296
297 if (read_count != 0) {
298 read_data->buf_b64 = g_base64_encode(buf, read_count);
299 }
300 }
301 g_free(buf);
302
303 return read_data;
Michael Rothd8ca6852012-01-19 22:04:34 -0600304}
305
306GuestFileWrite *qmp_guest_file_write(int64_t handle, const char *buf_b64,
Markus Armbruster77dbc812014-05-02 13:26:30 +0200307 bool has_count, int64_t count,
308 Error **errp)
Michael Rothd8ca6852012-01-19 22:04:34 -0600309{
Olga Krishtalfa193592015-02-06 20:59:55 +0300310 GuestFileWrite *write_data = NULL;
311 guchar *buf;
312 gsize buf_len;
313 bool is_ok;
314 DWORD write_count;
315 GuestFileHandle *gfh = guest_file_handle_find(handle, errp);
316 HANDLE fh;
317
318 if (!gfh) {
319 return NULL;
320 }
321 fh = gfh->fh;
322 buf = g_base64_decode(buf_b64, &buf_len);
323
324 if (!has_count) {
325 count = buf_len;
326 } else if (count < 0 || count > buf_len) {
327 error_setg(errp, "value '%" PRId64
328 "' is invalid for argument count", count);
329 goto done;
330 }
331
332 is_ok = WriteFile(fh, buf, count, &write_count, NULL);
333 if (!is_ok) {
334 error_setg_win32(errp, GetLastError(), "failed to write to file");
335 slog("guest-file-write-failed, handle: %" PRId64, handle);
336 } else {
337 write_data = g_malloc0(sizeof(GuestFileWrite));
338 write_data->count = (size_t) write_count;
339 }
340
341done:
342 g_free(buf);
343 return write_data;
Michael Rothd8ca6852012-01-19 22:04:34 -0600344}
345
346GuestFileSeek *qmp_guest_file_seek(int64_t handle, int64_t offset,
Markus Armbruster77dbc812014-05-02 13:26:30 +0200347 int64_t whence, Error **errp)
Michael Rothd8ca6852012-01-19 22:04:34 -0600348{
Olga Krishtalfa193592015-02-06 20:59:55 +0300349 GuestFileHandle *gfh;
350 GuestFileSeek *seek_data;
351 HANDLE fh;
352 LARGE_INTEGER new_pos, off_pos;
353 off_pos.QuadPart = offset;
354 BOOL res;
355 gfh = guest_file_handle_find(handle, errp);
356 if (!gfh) {
357 return NULL;
358 }
359
360 fh = gfh->fh;
361 res = SetFilePointerEx(fh, off_pos, &new_pos, whence);
362 if (!res) {
363 error_setg_win32(errp, GetLastError(), "failed to seek file");
364 return NULL;
365 }
366 seek_data = g_new0(GuestFileSeek, 1);
367 seek_data->position = new_pos.QuadPart;
368 return seek_data;
Michael Rothd8ca6852012-01-19 22:04:34 -0600369}
370
Markus Armbruster77dbc812014-05-02 13:26:30 +0200371void qmp_guest_file_flush(int64_t handle, Error **errp)
Michael Rothd8ca6852012-01-19 22:04:34 -0600372{
Olga Krishtalfa193592015-02-06 20:59:55 +0300373 HANDLE fh;
374 GuestFileHandle *gfh = guest_file_handle_find(handle, errp);
375 if (!gfh) {
376 return;
377 }
378
379 fh = gfh->fh;
380 if (!FlushFileBuffers(fh)) {
381 error_setg_win32(errp, GetLastError(), "failed to flush file");
382 }
383}
384
385static void guest_file_init(void)
386{
387 QTAILQ_INIT(&guest_file_state.filehandles);
Michael Rothd8ca6852012-01-19 22:04:34 -0600388}
389
Olga Krishtald2b3f392015-06-30 13:25:21 +0300390static GuestFilesystemInfo *build_guest_fsinfo(char *guid, Error **errp)
391{
392 DWORD info_size;
393 char mnt, *mnt_point;
394 char fs_name[32];
395 char vol_info[MAX_PATH+1];
396 size_t len;
397 GuestFilesystemInfo *fs = NULL;
398
399 GetVolumePathNamesForVolumeName(guid, (LPCH)&mnt, 0, &info_size);
400 if (GetLastError() != ERROR_MORE_DATA) {
401 error_setg_win32(errp, GetLastError(), "failed to get volume name");
402 return NULL;
403 }
404
405 mnt_point = g_malloc(info_size + 1);
406 if (!GetVolumePathNamesForVolumeName(guid, mnt_point, info_size,
407 &info_size)) {
408 error_setg_win32(errp, GetLastError(), "failed to get volume name");
409 goto free;
410 }
411
412 len = strlen(mnt_point);
413 mnt_point[len] = '\\';
414 mnt_point[len+1] = 0;
415 if (!GetVolumeInformation(mnt_point, vol_info, sizeof(vol_info), NULL, NULL,
416 NULL, (LPSTR)&fs_name, sizeof(fs_name))) {
417 if (GetLastError() != ERROR_NOT_READY) {
418 error_setg_win32(errp, GetLastError(), "failed to get volume info");
419 }
420 goto free;
421 }
422
423 fs_name[sizeof(fs_name) - 1] = 0;
424 fs = g_malloc(sizeof(*fs));
425 fs->name = g_strdup(guid);
426 if (len == 0) {
427 fs->mountpoint = g_strdup("System Reserved");
428 } else {
429 fs->mountpoint = g_strndup(mnt_point, len);
430 }
431 fs->type = g_strdup(fs_name);
432 fs->disk = NULL;
433free:
434 g_free(mnt_point);
435 return fs;
436}
437
Tomoki Sekiyama46d4c572014-06-30 17:51:34 -0400438GuestFilesystemInfoList *qmp_guest_get_fsinfo(Error **errp)
439{
Olga Krishtalef0a03f2015-06-30 13:25:20 +0300440 HANDLE vol_h;
441 GuestFilesystemInfoList *new, *ret = NULL;
442 char guid[256];
443
444 vol_h = FindFirstVolume(guid, sizeof(guid));
445 if (vol_h == INVALID_HANDLE_VALUE) {
446 error_setg_win32(errp, GetLastError(), "failed to find any volume");
447 return NULL;
448 }
449
450 do {
Olga Krishtald2b3f392015-06-30 13:25:21 +0300451 GuestFilesystemInfo *info = build_guest_fsinfo(guid, errp);
452 if (info == NULL) {
453 continue;
454 }
Olga Krishtalef0a03f2015-06-30 13:25:20 +0300455 new = g_malloc(sizeof(*ret));
Olga Krishtald2b3f392015-06-30 13:25:21 +0300456 new->value = info;
Olga Krishtalef0a03f2015-06-30 13:25:20 +0300457 new->next = ret;
458 ret = new;
459 } while (FindNextVolume(vol_h, guid, sizeof(guid)));
460
461 if (GetLastError() != ERROR_NO_MORE_FILES) {
462 error_setg_win32(errp, GetLastError(), "failed to find next volume");
463 }
464
465 FindVolumeClose(vol_h);
466 return ret;
Tomoki Sekiyama46d4c572014-06-30 17:51:34 -0400467}
468
Michael Rothd8ca6852012-01-19 22:04:34 -0600469/*
470 * Return status of freeze/thaw
471 */
Markus Armbruster77dbc812014-05-02 13:26:30 +0200472GuestFsfreezeStatus qmp_guest_fsfreeze_status(Error **errp)
Michael Rothd8ca6852012-01-19 22:04:34 -0600473{
Tomoki Sekiyama64c00312013-08-07 11:40:25 -0400474 if (!vss_initialized()) {
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100475 error_setg(errp, QERR_UNSUPPORTED);
Tomoki Sekiyama64c00312013-08-07 11:40:25 -0400476 return 0;
477 }
478
479 if (ga_is_frozen(ga_state)) {
480 return GUEST_FSFREEZE_STATUS_FROZEN;
481 }
482
483 return GUEST_FSFREEZE_STATUS_THAWED;
Michael Rothd8ca6852012-01-19 22:04:34 -0600484}
485
486/*
Tomoki Sekiyama64c00312013-08-07 11:40:25 -0400487 * Freeze local file systems using Volume Shadow-copy Service.
488 * The frozen state is limited for up to 10 seconds by VSS.
Michael Rothd8ca6852012-01-19 22:04:34 -0600489 */
Markus Armbruster77dbc812014-05-02 13:26:30 +0200490int64_t qmp_guest_fsfreeze_freeze(Error **errp)
Michael Rothd8ca6852012-01-19 22:04:34 -0600491{
Tomoki Sekiyama64c00312013-08-07 11:40:25 -0400492 int i;
493 Error *local_err = NULL;
494
495 if (!vss_initialized()) {
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100496 error_setg(errp, QERR_UNSUPPORTED);
Tomoki Sekiyama64c00312013-08-07 11:40:25 -0400497 return 0;
498 }
499
500 slog("guest-fsfreeze called");
501
502 /* cannot risk guest agent blocking itself on a write in this state */
503 ga_set_frozen(ga_state);
504
Markus Armbruster0f230bf2014-05-02 13:26:38 +0200505 qga_vss_fsfreeze(&i, &local_err, true);
506 if (local_err) {
507 error_propagate(errp, local_err);
Tomoki Sekiyama64c00312013-08-07 11:40:25 -0400508 goto error;
509 }
510
511 return i;
512
513error:
Markus Armbruster0f230bf2014-05-02 13:26:38 +0200514 local_err = NULL;
Tomoki Sekiyama64c00312013-08-07 11:40:25 -0400515 qmp_guest_fsfreeze_thaw(&local_err);
Markus Armbruster84d18f02014-01-30 15:07:28 +0100516 if (local_err) {
Tomoki Sekiyama64c00312013-08-07 11:40:25 -0400517 g_debug("cleanup thaw: %s", error_get_pretty(local_err));
518 error_free(local_err);
519 }
Michael Rothd8ca6852012-01-19 22:04:34 -0600520 return 0;
521}
522
Tomoki Sekiyamae99bce22014-06-30 17:51:27 -0400523int64_t qmp_guest_fsfreeze_freeze_list(bool has_mountpoints,
524 strList *mountpoints,
525 Error **errp)
526{
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100527 error_setg(errp, QERR_UNSUPPORTED);
Tomoki Sekiyamae99bce22014-06-30 17:51:27 -0400528
529 return 0;
530}
531
Michael Rothd8ca6852012-01-19 22:04:34 -0600532/*
Tomoki Sekiyama64c00312013-08-07 11:40:25 -0400533 * Thaw local file systems using Volume Shadow-copy Service.
Michael Rothd8ca6852012-01-19 22:04:34 -0600534 */
Markus Armbruster77dbc812014-05-02 13:26:30 +0200535int64_t qmp_guest_fsfreeze_thaw(Error **errp)
Michael Rothd8ca6852012-01-19 22:04:34 -0600536{
Tomoki Sekiyama64c00312013-08-07 11:40:25 -0400537 int i;
538
539 if (!vss_initialized()) {
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100540 error_setg(errp, QERR_UNSUPPORTED);
Tomoki Sekiyama64c00312013-08-07 11:40:25 -0400541 return 0;
542 }
543
Markus Armbruster77dbc812014-05-02 13:26:30 +0200544 qga_vss_fsfreeze(&i, errp, false);
Tomoki Sekiyama64c00312013-08-07 11:40:25 -0400545
546 ga_unset_frozen(ga_state);
547 return i;
548}
549
550static void guest_fsfreeze_cleanup(void)
551{
552 Error *err = NULL;
553
554 if (!vss_initialized()) {
555 return;
556 }
557
558 if (ga_is_frozen(ga_state) == GUEST_FSFREEZE_STATUS_FROZEN) {
559 qmp_guest_fsfreeze_thaw(&err);
560 if (err) {
561 slog("failed to clean up frozen filesystems: %s",
562 error_get_pretty(err));
563 error_free(err);
564 }
565 }
566
567 vss_deinit(true);
Michael Rothd8ca6852012-01-19 22:04:34 -0600568}
569
Paolo Bonzinieab5fd52012-06-13 07:41:28 +0200570/*
571 * Walk list of mounted file systems in the guest, and discard unused
572 * areas.
573 */
Justin Ossevoorte82855d2015-05-11 08:58:45 +0200574GuestFilesystemTrimResponse *
575qmp_guest_fstrim(bool has_minimum, int64_t minimum, Error **errp)
Paolo Bonzinieab5fd52012-06-13 07:41:28 +0200576{
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100577 error_setg(errp, QERR_UNSUPPORTED);
Justin Ossevoorte82855d2015-05-11 08:58:45 +0200578 return NULL;
Paolo Bonzinieab5fd52012-06-13 07:41:28 +0200579}
580
Gal Hammeraa596372012-01-29 11:53:31 +0200581typedef enum {
Michael Rothf54603b2012-03-12 12:50:02 -0500582 GUEST_SUSPEND_MODE_DISK,
583 GUEST_SUSPEND_MODE_RAM
Gal Hammeraa596372012-01-29 11:53:31 +0200584} GuestSuspendMode;
585
Markus Armbruster77dbc812014-05-02 13:26:30 +0200586static void check_suspend_mode(GuestSuspendMode mode, Error **errp)
Gal Hammeraa596372012-01-29 11:53:31 +0200587{
588 SYSTEM_POWER_CAPABILITIES sys_pwr_caps;
589 Error *local_err = NULL;
590
Gal Hammeraa596372012-01-29 11:53:31 +0200591 ZeroMemory(&sys_pwr_caps, sizeof(sys_pwr_caps));
592 if (!GetPwrCapabilities(&sys_pwr_caps)) {
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100593 error_setg(&local_err, QERR_QGA_COMMAND_FAILED,
594 "failed to determine guest suspend capabilities");
Gal Hammeraa596372012-01-29 11:53:31 +0200595 goto out;
596 }
597
Michael Rothf54603b2012-03-12 12:50:02 -0500598 switch (mode) {
599 case GUEST_SUSPEND_MODE_DISK:
600 if (!sys_pwr_caps.SystemS4) {
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100601 error_setg(&local_err, QERR_QGA_COMMAND_FAILED,
602 "suspend-to-disk not supported by OS");
Gal Hammeraa596372012-01-29 11:53:31 +0200603 }
Michael Rothf54603b2012-03-12 12:50:02 -0500604 break;
605 case GUEST_SUSPEND_MODE_RAM:
606 if (!sys_pwr_caps.SystemS3) {
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100607 error_setg(&local_err, QERR_QGA_COMMAND_FAILED,
608 "suspend-to-ram not supported by OS");
Michael Rothf54603b2012-03-12 12:50:02 -0500609 }
610 break;
611 default:
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100612 error_setg(&local_err, QERR_INVALID_PARAMETER_VALUE, "mode",
613 "GuestSuspendMode");
Gal Hammeraa596372012-01-29 11:53:31 +0200614 }
615
Gal Hammeraa596372012-01-29 11:53:31 +0200616out:
617 if (local_err) {
Markus Armbruster77dbc812014-05-02 13:26:30 +0200618 error_propagate(errp, local_err);
Gal Hammeraa596372012-01-29 11:53:31 +0200619 }
620}
621
622static DWORD WINAPI do_suspend(LPVOID opaque)
623{
624 GuestSuspendMode *mode = opaque;
625 DWORD ret = 0;
626
627 if (!SetSuspendState(*mode == GUEST_SUSPEND_MODE_DISK, TRUE, TRUE)) {
Stefan Weil16f4e8f2013-11-25 20:54:17 +0100628 slog("failed to suspend guest, %lu", GetLastError());
Gal Hammeraa596372012-01-29 11:53:31 +0200629 ret = -1;
630 }
631 g_free(mode);
632 return ret;
633}
634
Markus Armbruster77dbc812014-05-02 13:26:30 +0200635void qmp_guest_suspend_disk(Error **errp)
Luiz Capitulino11d0f122012-02-28 11:03:03 -0300636{
Markus Armbruster0f230bf2014-05-02 13:26:38 +0200637 Error *local_err = NULL;
Gal Hammeraa596372012-01-29 11:53:31 +0200638 GuestSuspendMode *mode = g_malloc(sizeof(GuestSuspendMode));
639
640 *mode = GUEST_SUSPEND_MODE_DISK;
Markus Armbruster0f230bf2014-05-02 13:26:38 +0200641 check_suspend_mode(*mode, &local_err);
642 acquire_privilege(SE_SHUTDOWN_NAME, &local_err);
643 execute_async(do_suspend, mode, &local_err);
Gal Hammeraa596372012-01-29 11:53:31 +0200644
Markus Armbruster0f230bf2014-05-02 13:26:38 +0200645 if (local_err) {
646 error_propagate(errp, local_err);
Gal Hammeraa596372012-01-29 11:53:31 +0200647 g_free(mode);
648 }
Luiz Capitulino11d0f122012-02-28 11:03:03 -0300649}
650
Markus Armbruster77dbc812014-05-02 13:26:30 +0200651void qmp_guest_suspend_ram(Error **errp)
Luiz Capitulinofbf42212012-02-28 11:03:04 -0300652{
Markus Armbruster0f230bf2014-05-02 13:26:38 +0200653 Error *local_err = NULL;
Michael Rothf54603b2012-03-12 12:50:02 -0500654 GuestSuspendMode *mode = g_malloc(sizeof(GuestSuspendMode));
655
656 *mode = GUEST_SUSPEND_MODE_RAM;
Markus Armbruster0f230bf2014-05-02 13:26:38 +0200657 check_suspend_mode(*mode, &local_err);
658 acquire_privilege(SE_SHUTDOWN_NAME, &local_err);
659 execute_async(do_suspend, mode, &local_err);
Michael Rothf54603b2012-03-12 12:50:02 -0500660
Markus Armbruster0f230bf2014-05-02 13:26:38 +0200661 if (local_err) {
662 error_propagate(errp, local_err);
Michael Rothf54603b2012-03-12 12:50:02 -0500663 g_free(mode);
664 }
Luiz Capitulinofbf42212012-02-28 11:03:04 -0300665}
666
Markus Armbruster77dbc812014-05-02 13:26:30 +0200667void qmp_guest_suspend_hybrid(Error **errp)
Luiz Capitulino95f4f402012-02-28 11:03:05 -0300668{
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100669 error_setg(errp, QERR_UNSUPPORTED);
Luiz Capitulino95f4f402012-02-28 11:03:05 -0300670}
671
Kirk Alland6c55282015-06-02 11:41:07 -0600672static IP_ADAPTER_ADDRESSES *guest_get_adapters_addresses(Error **errp)
673{
674 IP_ADAPTER_ADDRESSES *adptr_addrs = NULL;
675 ULONG adptr_addrs_len = 0;
676 DWORD ret;
677
678 /* Call the first time to get the adptr_addrs_len. */
679 GetAdaptersAddresses(AF_UNSPEC, GAA_FLAG_INCLUDE_PREFIX,
680 NULL, adptr_addrs, &adptr_addrs_len);
681
682 adptr_addrs = g_malloc(adptr_addrs_len);
683 ret = GetAdaptersAddresses(AF_UNSPEC, GAA_FLAG_INCLUDE_PREFIX,
684 NULL, adptr_addrs, &adptr_addrs_len);
685 if (ret != ERROR_SUCCESS) {
686 error_setg_win32(errp, ret, "failed to get adapters addresses");
687 g_free(adptr_addrs);
688 adptr_addrs = NULL;
689 }
690 return adptr_addrs;
691}
692
693static char *guest_wctomb_dup(WCHAR *wstr)
694{
695 char *str;
696 size_t i;
697
698 i = wcslen(wstr) + 1;
699 str = g_malloc(i);
700 WideCharToMultiByte(CP_ACP, WC_COMPOSITECHECK,
701 wstr, -1, str, i, NULL, NULL);
702 return str;
703}
704
705static char *guest_addr_to_str(IP_ADAPTER_UNICAST_ADDRESS *ip_addr,
706 Error **errp)
707{
708 char addr_str[INET6_ADDRSTRLEN + INET_ADDRSTRLEN];
709 DWORD len;
710 int ret;
711
712 if (ip_addr->Address.lpSockaddr->sa_family == AF_INET ||
713 ip_addr->Address.lpSockaddr->sa_family == AF_INET6) {
714 len = sizeof(addr_str);
715 ret = WSAAddressToString(ip_addr->Address.lpSockaddr,
716 ip_addr->Address.iSockaddrLength,
717 NULL,
718 addr_str,
719 &len);
720 if (ret != 0) {
721 error_setg_win32(errp, WSAGetLastError(),
722 "failed address presentation form conversion");
723 return NULL;
724 }
725 return g_strdup(addr_str);
726 }
727 return NULL;
728}
729
730#if (_WIN32_WINNT >= 0x0600)
731static int64_t guest_ip_prefix(IP_ADAPTER_UNICAST_ADDRESS *ip_addr)
732{
733 /* For Windows Vista/2008 and newer, use the OnLinkPrefixLength
734 * field to obtain the prefix.
735 */
736 return ip_addr->OnLinkPrefixLength;
737}
738#else
739/* When using the Windows XP and 2003 build environment, do the best we can to
740 * figure out the prefix.
741 */
742static IP_ADAPTER_INFO *guest_get_adapters_info(void)
743{
744 IP_ADAPTER_INFO *adptr_info = NULL;
745 ULONG adptr_info_len = 0;
746 DWORD ret;
747
748 /* Call the first time to get the adptr_info_len. */
749 GetAdaptersInfo(adptr_info, &adptr_info_len);
750
751 adptr_info = g_malloc(adptr_info_len);
752 ret = GetAdaptersInfo(adptr_info, &adptr_info_len);
753 if (ret != ERROR_SUCCESS) {
754 g_free(adptr_info);
755 adptr_info = NULL;
756 }
757 return adptr_info;
758}
759
760static int64_t guest_ip_prefix(IP_ADAPTER_UNICAST_ADDRESS *ip_addr)
761{
762 int64_t prefix = -1; /* Use for AF_INET6 and unknown/undetermined values. */
763 IP_ADAPTER_INFO *adptr_info, *info;
764 IP_ADDR_STRING *ip;
765 struct in_addr *p;
766
767 if (ip_addr->Address.lpSockaddr->sa_family != AF_INET) {
768 return prefix;
769 }
770 adptr_info = guest_get_adapters_info();
771 if (adptr_info == NULL) {
772 return prefix;
773 }
774
775 /* Match up the passed in ip_addr with one found in adaptr_info.
776 * The matching one in adptr_info will have the netmask.
777 */
778 p = &((struct sockaddr_in *)ip_addr->Address.lpSockaddr)->sin_addr;
779 for (info = adptr_info; info; info = info->Next) {
780 for (ip = &info->IpAddressList; ip; ip = ip->Next) {
781 if (p->S_un.S_addr == inet_addr(ip->IpAddress.String)) {
782 prefix = ctpop32(inet_addr(ip->IpMask.String));
783 goto out;
784 }
785 }
786 }
787out:
788 g_free(adptr_info);
789 return prefix;
790}
791#endif
792
Markus Armbruster77dbc812014-05-02 13:26:30 +0200793GuestNetworkInterfaceList *qmp_guest_network_get_interfaces(Error **errp)
Michal Privoznik3424fc92012-02-29 17:02:23 +0100794{
Kirk Alland6c55282015-06-02 11:41:07 -0600795 IP_ADAPTER_ADDRESSES *adptr_addrs, *addr;
796 IP_ADAPTER_UNICAST_ADDRESS *ip_addr = NULL;
797 GuestNetworkInterfaceList *head = NULL, *cur_item = NULL;
798 GuestIpAddressList *head_addr, *cur_addr;
799 GuestNetworkInterfaceList *info;
800 GuestIpAddressList *address_item = NULL;
801 unsigned char *mac_addr;
802 char *addr_str;
803 WORD wsa_version;
804 WSADATA wsa_data;
805 int ret;
806
807 adptr_addrs = guest_get_adapters_addresses(errp);
808 if (adptr_addrs == NULL) {
809 return NULL;
810 }
811
812 /* Make WSA APIs available. */
813 wsa_version = MAKEWORD(2, 2);
814 ret = WSAStartup(wsa_version, &wsa_data);
815 if (ret != 0) {
816 error_setg_win32(errp, ret, "failed socket startup");
817 goto out;
818 }
819
820 for (addr = adptr_addrs; addr; addr = addr->Next) {
821 info = g_malloc0(sizeof(*info));
822
823 if (cur_item == NULL) {
824 head = cur_item = info;
825 } else {
826 cur_item->next = info;
827 cur_item = info;
828 }
829
830 info->value = g_malloc0(sizeof(*info->value));
831 info->value->name = guest_wctomb_dup(addr->FriendlyName);
832
833 if (addr->PhysicalAddressLength != 0) {
834 mac_addr = addr->PhysicalAddress;
835
836 info->value->hardware_address =
837 g_strdup_printf("%02x:%02x:%02x:%02x:%02x:%02x",
838 (int) mac_addr[0], (int) mac_addr[1],
839 (int) mac_addr[2], (int) mac_addr[3],
840 (int) mac_addr[4], (int) mac_addr[5]);
841
842 info->value->has_hardware_address = true;
843 }
844
845 head_addr = NULL;
846 cur_addr = NULL;
847 for (ip_addr = addr->FirstUnicastAddress;
848 ip_addr;
849 ip_addr = ip_addr->Next) {
850 addr_str = guest_addr_to_str(ip_addr, errp);
851 if (addr_str == NULL) {
852 continue;
853 }
854
855 address_item = g_malloc0(sizeof(*address_item));
856
857 if (!cur_addr) {
858 head_addr = cur_addr = address_item;
859 } else {
860 cur_addr->next = address_item;
861 cur_addr = address_item;
862 }
863
864 address_item->value = g_malloc0(sizeof(*address_item->value));
865 address_item->value->ip_address = addr_str;
866 address_item->value->prefix = guest_ip_prefix(ip_addr);
867 if (ip_addr->Address.lpSockaddr->sa_family == AF_INET) {
868 address_item->value->ip_address_type =
869 GUEST_IP_ADDRESS_TYPE_IPV4;
870 } else if (ip_addr->Address.lpSockaddr->sa_family == AF_INET6) {
871 address_item->value->ip_address_type =
872 GUEST_IP_ADDRESS_TYPE_IPV6;
873 }
874 }
875 if (head_addr) {
876 info->value->has_ip_addresses = true;
877 info->value->ip_addresses = head_addr;
878 }
879 }
880 WSACleanup();
881out:
882 g_free(adptr_addrs);
883 return head;
Michal Privoznik3424fc92012-02-29 17:02:23 +0100884}
885
Lei Li6912e6a2013-03-05 17:39:11 +0800886int64_t qmp_guest_get_time(Error **errp)
887{
Lei Li3f2a6082013-03-15 17:29:04 +0800888 SYSTEMTIME ts = {0};
889 int64_t time_ns;
890 FILETIME tf;
891
892 GetSystemTime(&ts);
893 if (ts.wYear < 1601 || ts.wYear > 30827) {
894 error_setg(errp, "Failed to get time");
895 return -1;
896 }
897
898 if (!SystemTimeToFileTime(&ts, &tf)) {
899 error_setg(errp, "Failed to convert system time: %d", (int)GetLastError());
900 return -1;
901 }
902
903 time_ns = ((((int64_t)tf.dwHighDateTime << 32) | tf.dwLowDateTime)
904 - W32_FT_OFFSET) * 100;
905
906 return time_ns;
Lei Li6912e6a2013-03-05 17:39:11 +0800907}
908
Michal Privoznik2c958922014-01-31 11:29:51 +0100909void qmp_guest_set_time(bool has_time, int64_t time_ns, Error **errp)
Lei Lia1bca572013-03-05 17:39:12 +0800910{
Markus Armbruster0f230bf2014-05-02 13:26:38 +0200911 Error *local_err = NULL;
Lei Lib8f954f2013-03-15 17:29:05 +0800912 SYSTEMTIME ts;
913 FILETIME tf;
914 LONGLONG time;
915
Michal Privoznikee17cbd2015-01-21 12:09:50 +0100916 if (!has_time) {
917 /* Unfortunately, Windows libraries don't provide an easy way to access
918 * RTC yet:
919 *
920 * https://msdn.microsoft.com/en-us/library/aa908981.aspx
921 */
922 error_setg(errp, "Time argument is required on this platform");
923 return;
924 }
Lei Lib8f954f2013-03-15 17:29:05 +0800925
Michal Privoznikee17cbd2015-01-21 12:09:50 +0100926 /* Validate time passed by user. */
927 if (time_ns < 0 || time_ns / 100 > INT64_MAX - W32_FT_OFFSET) {
928 error_setg(errp, "Time %" PRId64 "is invalid", time_ns);
929 return;
930 }
Lei Lib8f954f2013-03-15 17:29:05 +0800931
Michal Privoznikee17cbd2015-01-21 12:09:50 +0100932 time = time_ns / 100 + W32_FT_OFFSET;
Lei Lib8f954f2013-03-15 17:29:05 +0800933
Michal Privoznikee17cbd2015-01-21 12:09:50 +0100934 tf.dwLowDateTime = (DWORD) time;
935 tf.dwHighDateTime = (DWORD) (time >> 32);
936
937 if (!FileTimeToSystemTime(&tf, &ts)) {
938 error_setg(errp, "Failed to convert system time %d",
939 (int)GetLastError());
940 return;
Lei Lib8f954f2013-03-15 17:29:05 +0800941 }
942
Markus Armbruster0f230bf2014-05-02 13:26:38 +0200943 acquire_privilege(SE_SYSTEMTIME_NAME, &local_err);
944 if (local_err) {
945 error_propagate(errp, local_err);
Lei Lib8f954f2013-03-15 17:29:05 +0800946 return;
947 }
948
949 if (!SetSystemTime(&ts)) {
950 error_setg(errp, "Failed to set time to guest: %d", (int)GetLastError());
951 return;
952 }
Lei Lia1bca572013-03-05 17:39:12 +0800953}
954
Laszlo Ersek70e133a2013-03-06 22:59:29 +0100955GuestLogicalProcessorList *qmp_guest_get_vcpus(Error **errp)
956{
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100957 error_setg(errp, QERR_UNSUPPORTED);
Laszlo Ersek70e133a2013-03-06 22:59:29 +0100958 return NULL;
959}
960
961int64_t qmp_guest_set_vcpus(GuestLogicalProcessorList *vcpus, Error **errp)
962{
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100963 error_setg(errp, QERR_UNSUPPORTED);
Laszlo Ersek70e133a2013-03-06 22:59:29 +0100964 return -1;
965}
966
Daniel P. Berrange215a2772015-02-11 11:26:12 +0000967void qmp_guest_set_user_password(const char *username,
968 const char *password,
969 bool crypted,
970 Error **errp)
971{
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100972 error_setg(errp, QERR_UNSUPPORTED);
Daniel P. Berrange215a2772015-02-11 11:26:12 +0000973}
974
zhanghailianga065aaa2015-01-22 10:40:02 +0800975GuestMemoryBlockList *qmp_guest_get_memory_blocks(Error **errp)
976{
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100977 error_setg(errp, QERR_UNSUPPORTED);
zhanghailianga065aaa2015-01-22 10:40:02 +0800978 return NULL;
979}
980
981GuestMemoryBlockResponseList *
982qmp_guest_set_memory_blocks(GuestMemoryBlockList *mem_blks, Error **errp)
983{
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100984 error_setg(errp, QERR_UNSUPPORTED);
zhanghailianga065aaa2015-01-22 10:40:02 +0800985 return NULL;
986}
987
988GuestMemoryBlockInfo *qmp_guest_get_memory_block_info(Error **errp)
989{
Markus Armbrusterc6bd8c72015-03-17 11:54:50 +0100990 error_setg(errp, QERR_UNSUPPORTED);
zhanghailianga065aaa2015-01-22 10:40:02 +0800991 return NULL;
992}
993
Tomoki Sekiyama1281c082014-06-30 17:51:40 -0400994/* add unsupported commands to the blacklist */
995GList *ga_command_blacklist_init(GList *blacklist)
996{
997 const char *list_unsupported[] = {
Kirk Alland6c55282015-06-02 11:41:07 -0600998 "guest-suspend-hybrid",
Tomoki Sekiyama1281c082014-06-30 17:51:40 -0400999 "guest-get-vcpus", "guest-set-vcpus",
Daniel P. Berrange215a2772015-02-11 11:26:12 +00001000 "guest-set-user-password",
zhanghailiang0dd38a02015-01-22 10:40:06 +08001001 "guest-get-memory-blocks", "guest-set-memory-blocks",
1002 "guest-get-memory-block-size",
Olga Krishtalef0a03f2015-06-30 13:25:20 +03001003 "guest-fsfreeze-freeze-list",
Tomoki Sekiyama1281c082014-06-30 17:51:40 -04001004 "guest-fstrim", NULL};
1005 char **p = (char **)list_unsupported;
1006
1007 while (*p) {
1008 blacklist = g_list_append(blacklist, *p++);
1009 }
1010
1011 if (!vss_init(true)) {
Yossi Hindinc69403f2015-05-06 14:57:38 +03001012 g_debug("vss_init failed, vss commands are going to be disabled");
Tomoki Sekiyama1281c082014-06-30 17:51:40 -04001013 const char *list[] = {
1014 "guest-get-fsinfo", "guest-fsfreeze-status",
1015 "guest-fsfreeze-freeze", "guest-fsfreeze-thaw", NULL};
1016 p = (char **)list;
1017
1018 while (*p) {
1019 blacklist = g_list_append(blacklist, *p++);
1020 }
1021 }
1022
1023 return blacklist;
1024}
1025
Michael Rothd8ca6852012-01-19 22:04:34 -06001026/* register init/cleanup routines for stateful command groups */
1027void ga_command_state_init(GAState *s, GACommandState *cs)
1028{
Tomoki Sekiyama1281c082014-06-30 17:51:40 -04001029 if (!vss_initialized()) {
Tomoki Sekiyama64c00312013-08-07 11:40:25 -04001030 ga_command_state_add(cs, NULL, guest_fsfreeze_cleanup);
1031 }
Olga Krishtalfa193592015-02-06 20:59:55 +03001032 ga_command_state_add(cs, guest_file_init, NULL);
Michael Rothd8ca6852012-01-19 22:04:34 -06001033}