tag for qga-pull-2015-02-16-v2
v2: * generalized QAPI function definition for guest-memory-block-size to guest-memory-block-info for future extensibility (Eric) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAABAgAGBQJU48JYAAoJEDNTyc7xCLWEK+AH/R6b+ycKU3LKG3ZKcGE/vV45 szTtE6SKRQmANs1GwQy2qMubBtEFnmfsJSiWQNmPArmP20rZK0Yyy4PaLm7UrTYs mpfNee6mlc8PnaMjdzlgBJInwJIx3hgV0UNl4e1h+DM6Xe6GqC6NGc8vdfuIW6is zHCtH5mAId7ykC03KCVAtTTWFJlJyujrytsNd2jP3zkZlwcCOS08JG1U0SMaBjTq WCZAxbDPuODUqrwimevST1IFstg50cnsW9wq2oLLCp/ZnsYtCdeSZQGIVDkjL8zR stJRDKukY4ByU0zLjcDrBpdzTwOb6ndZp929ti6y+3dQUX3oTOhqgE8JT/kR+Qo= =KpkU -----END PGP SIGNATURE----- Merge remote-tracking branch 'remotes/mdroth/tags/qga-pull-2015-02-16-v2-tag' into staging tag for qga-pull-2015-02-16-v2 v2: * generalized QAPI function definition for guest-memory-block-size to guest-memory-block-info for future extensibility (Eric) # gpg: Signature made Tue Feb 17 22:36:08 2015 GMT using RSA key ID F108B584 # gpg: Good signature from "Michael Roth <flukshun@gmail.com>" # gpg: aka "Michael Roth <mdroth@utexas.edu>" # gpg: aka "Michael Roth <mdroth@linux.vnet.ibm.com>" # gpg: WARNING: This key is not certified with a trusted signature! # gpg: There is no indication that the signature belongs to the owner. # Primary key fingerprint: CEAC C9E1 5534 EBAB B82D 3FA0 3353 C9CE F108 B584 * remotes/mdroth/tags/qga-pull-2015-02-16-v2-tag: qemu-ga-win: Fail loudly on bare 'set-time' qga: add memory block command that unsupported qga: implement qmp_guest_get_memory_block_info() for Linux with sysfs qga: implement qmp_guest_set_memory_blocks() for Linux with sysfs qga: implement qmp_guest_get_memory_blocks() for Linux with sysfs qga: introduce three guest memory block commmands with stubs qga: implement file commands for Windows guest guest agent: guest-file-open: refactoring utils: drop strtok_r from envlist_parse qga: add guest-set-user-password command Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
This commit is contained in:
commit
c28d4869ea
@ -81,7 +81,6 @@ struct tm *gmtime_r(const time_t *timep, struct tm *result);
|
||||
#undef localtime_r
|
||||
struct tm *localtime_r(const time_t *timep, struct tm *result);
|
||||
|
||||
char *strtok_r(char *str, const char *delim, char **saveptr);
|
||||
|
||||
static inline void os_setup_signal_handling(void) {}
|
||||
static inline void os_daemonize(void) {}
|
||||
|
@ -376,13 +376,33 @@ safe_open_or_create(const char *path, const char *mode, Error **errp)
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static int guest_file_toggle_flags(int fd, int flags, bool set, Error **err)
|
||||
{
|
||||
int ret, old_flags;
|
||||
|
||||
old_flags = fcntl(fd, F_GETFL);
|
||||
if (old_flags == -1) {
|
||||
error_set_errno(err, errno, QERR_QGA_COMMAND_FAILED,
|
||||
"failed to fetch filehandle flags");
|
||||
return -1;
|
||||
}
|
||||
|
||||
ret = fcntl(fd, F_SETFL, set ? (old_flags | flags) : (old_flags & ~flags));
|
||||
if (ret == -1) {
|
||||
error_set_errno(err, errno, QERR_QGA_COMMAND_FAILED,
|
||||
"failed to set filehandle flags");
|
||||
return -1;
|
||||
}
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
int64_t qmp_guest_file_open(const char *path, bool has_mode, const char *mode,
|
||||
Error **errp)
|
||||
{
|
||||
FILE *fh;
|
||||
Error *local_err = NULL;
|
||||
int fd;
|
||||
int64_t ret = -1, handle;
|
||||
int64_t handle;
|
||||
|
||||
if (!has_mode) {
|
||||
mode = "r";
|
||||
@ -397,12 +417,7 @@ int64_t qmp_guest_file_open(const char *path, bool has_mode, const char *mode,
|
||||
/* set fd non-blocking to avoid common use cases (like reading from a
|
||||
* named pipe) from hanging the agent
|
||||
*/
|
||||
fd = fileno(fh);
|
||||
ret = fcntl(fd, F_GETFL);
|
||||
ret = fcntl(fd, F_SETFL, ret | O_NONBLOCK);
|
||||
if (ret == -1) {
|
||||
error_setg_errno(errp, errno, "failed to make file '%s' non-blocking",
|
||||
path);
|
||||
if (guest_file_toggle_flags(fileno(fh), O_NONBLOCK, true, errp) < 0) {
|
||||
fclose(fh);
|
||||
return -1;
|
||||
}
|
||||
@ -1875,6 +1890,413 @@ int64_t qmp_guest_set_vcpus(GuestLogicalProcessorList *vcpus, Error **errp)
|
||||
return processed;
|
||||
}
|
||||
|
||||
void qmp_guest_set_user_password(const char *username,
|
||||
const char *password,
|
||||
bool crypted,
|
||||
Error **errp)
|
||||
{
|
||||
Error *local_err = NULL;
|
||||
char *passwd_path = NULL;
|
||||
pid_t pid;
|
||||
int status;
|
||||
int datafd[2] = { -1, -1 };
|
||||
char *rawpasswddata = NULL;
|
||||
size_t rawpasswdlen;
|
||||
char *chpasswddata = NULL;
|
||||
size_t chpasswdlen;
|
||||
|
||||
rawpasswddata = (char *)g_base64_decode(password, &rawpasswdlen);
|
||||
rawpasswddata = g_renew(char, rawpasswddata, rawpasswdlen + 1);
|
||||
rawpasswddata[rawpasswdlen] = '\0';
|
||||
|
||||
if (strchr(rawpasswddata, '\n')) {
|
||||
error_setg(errp, "forbidden characters in raw password");
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (strchr(username, '\n') ||
|
||||
strchr(username, ':')) {
|
||||
error_setg(errp, "forbidden characters in username");
|
||||
goto out;
|
||||
}
|
||||
|
||||
chpasswddata = g_strdup_printf("%s:%s\n", username, rawpasswddata);
|
||||
chpasswdlen = strlen(chpasswddata);
|
||||
|
||||
passwd_path = g_find_program_in_path("chpasswd");
|
||||
|
||||
if (!passwd_path) {
|
||||
error_setg(errp, "cannot find 'passwd' program in PATH");
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (pipe(datafd) < 0) {
|
||||
error_setg(errp, "cannot create pipe FDs");
|
||||
goto out;
|
||||
}
|
||||
|
||||
pid = fork();
|
||||
if (pid == 0) {
|
||||
close(datafd[1]);
|
||||
/* child */
|
||||
setsid();
|
||||
dup2(datafd[0], 0);
|
||||
reopen_fd_to_null(1);
|
||||
reopen_fd_to_null(2);
|
||||
|
||||
if (crypted) {
|
||||
execle(passwd_path, "chpasswd", "-e", NULL, environ);
|
||||
} else {
|
||||
execle(passwd_path, "chpasswd", NULL, environ);
|
||||
}
|
||||
_exit(EXIT_FAILURE);
|
||||
} else if (pid < 0) {
|
||||
error_setg_errno(errp, errno, "failed to create child process");
|
||||
goto out;
|
||||
}
|
||||
close(datafd[0]);
|
||||
datafd[0] = -1;
|
||||
|
||||
if (qemu_write_full(datafd[1], chpasswddata, chpasswdlen) != chpasswdlen) {
|
||||
error_setg_errno(errp, errno, "cannot write new account password");
|
||||
goto out;
|
||||
}
|
||||
close(datafd[1]);
|
||||
datafd[1] = -1;
|
||||
|
||||
ga_wait_child(pid, &status, &local_err);
|
||||
if (local_err) {
|
||||
error_propagate(errp, local_err);
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (!WIFEXITED(status)) {
|
||||
error_setg(errp, "child process has terminated abnormally");
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (WEXITSTATUS(status)) {
|
||||
error_setg(errp, "child process has failed to set user password");
|
||||
goto out;
|
||||
}
|
||||
|
||||
out:
|
||||
g_free(chpasswddata);
|
||||
g_free(rawpasswddata);
|
||||
g_free(passwd_path);
|
||||
if (datafd[0] != -1) {
|
||||
close(datafd[0]);
|
||||
}
|
||||
if (datafd[1] != -1) {
|
||||
close(datafd[1]);
|
||||
}
|
||||
}
|
||||
|
||||
static void ga_read_sysfs_file(int dirfd, const char *pathname, char *buf,
|
||||
int size, Error **errp)
|
||||
{
|
||||
int fd;
|
||||
int res;
|
||||
|
||||
errno = 0;
|
||||
fd = openat(dirfd, pathname, O_RDONLY);
|
||||
if (fd == -1) {
|
||||
error_setg_errno(errp, errno, "open sysfs file \"%s\"", pathname);
|
||||
return;
|
||||
}
|
||||
|
||||
res = pread(fd, buf, size, 0);
|
||||
if (res == -1) {
|
||||
error_setg_errno(errp, errno, "pread sysfs file \"%s\"", pathname);
|
||||
} else if (res == 0) {
|
||||
error_setg(errp, "pread sysfs file \"%s\": unexpected EOF", pathname);
|
||||
}
|
||||
close(fd);
|
||||
}
|
||||
|
||||
static void ga_write_sysfs_file(int dirfd, const char *pathname,
|
||||
const char *buf, int size, Error **errp)
|
||||
{
|
||||
int fd;
|
||||
|
||||
errno = 0;
|
||||
fd = openat(dirfd, pathname, O_WRONLY);
|
||||
if (fd == -1) {
|
||||
error_setg_errno(errp, errno, "open sysfs file \"%s\"", pathname);
|
||||
return;
|
||||
}
|
||||
|
||||
if (pwrite(fd, buf, size, 0) == -1) {
|
||||
error_setg_errno(errp, errno, "pwrite sysfs file \"%s\"", pathname);
|
||||
}
|
||||
|
||||
close(fd);
|
||||
}
|
||||
|
||||
/* Transfer online/offline status between @mem_blk and the guest system.
|
||||
*
|
||||
* On input either @errp or *@errp must be NULL.
|
||||
*
|
||||
* In system-to-@mem_blk direction, the following @mem_blk fields are accessed:
|
||||
* - R: mem_blk->phys_index
|
||||
* - W: mem_blk->online
|
||||
* - W: mem_blk->can_offline
|
||||
*
|
||||
* In @mem_blk-to-system direction, the following @mem_blk fields are accessed:
|
||||
* - R: mem_blk->phys_index
|
||||
* - R: mem_blk->online
|
||||
*- R: mem_blk->can_offline
|
||||
* Written members remain unmodified on error.
|
||||
*/
|
||||
static void transfer_memory_block(GuestMemoryBlock *mem_blk, bool sys2memblk,
|
||||
GuestMemoryBlockResponse *result,
|
||||
Error **errp)
|
||||
{
|
||||
char *dirpath;
|
||||
int dirfd;
|
||||
char *status;
|
||||
Error *local_err = NULL;
|
||||
|
||||
if (!sys2memblk) {
|
||||
DIR *dp;
|
||||
|
||||
if (!result) {
|
||||
error_setg(errp, "Internal error, 'result' should not be NULL");
|
||||
return;
|
||||
}
|
||||
errno = 0;
|
||||
dp = opendir("/sys/devices/system/memory/");
|
||||
/* if there is no 'memory' directory in sysfs,
|
||||
* we think this VM does not support online/offline memory block,
|
||||
* any other solution?
|
||||
*/
|
||||
if (!dp && errno == ENOENT) {
|
||||
result->response =
|
||||
GUEST_MEMORY_BLOCK_RESPONSE_TYPE_OPERATION_NOT_SUPPORTED;
|
||||
goto out1;
|
||||
}
|
||||
closedir(dp);
|
||||
}
|
||||
|
||||
dirpath = g_strdup_printf("/sys/devices/system/memory/memory%" PRId64 "/",
|
||||
mem_blk->phys_index);
|
||||
dirfd = open(dirpath, O_RDONLY | O_DIRECTORY);
|
||||
if (dirfd == -1) {
|
||||
if (sys2memblk) {
|
||||
error_setg_errno(errp, errno, "open(\"%s\")", dirpath);
|
||||
} else {
|
||||
if (errno == ENOENT) {
|
||||
result->response = GUEST_MEMORY_BLOCK_RESPONSE_TYPE_NOT_FOUND;
|
||||
} else {
|
||||
result->response =
|
||||
GUEST_MEMORY_BLOCK_RESPONSE_TYPE_OPERATION_FAILED;
|
||||
}
|
||||
}
|
||||
g_free(dirpath);
|
||||
goto out1;
|
||||
}
|
||||
g_free(dirpath);
|
||||
|
||||
status = g_malloc0(10);
|
||||
ga_read_sysfs_file(dirfd, "state", status, 10, &local_err);
|
||||
if (local_err) {
|
||||
/* treat with sysfs file that not exist in old kernel */
|
||||
if (errno == ENOENT) {
|
||||
error_free(local_err);
|
||||
if (sys2memblk) {
|
||||
mem_blk->online = true;
|
||||
mem_blk->can_offline = false;
|
||||
} else if (!mem_blk->online) {
|
||||
result->response =
|
||||
GUEST_MEMORY_BLOCK_RESPONSE_TYPE_OPERATION_NOT_SUPPORTED;
|
||||
}
|
||||
} else {
|
||||
if (sys2memblk) {
|
||||
error_propagate(errp, local_err);
|
||||
} else {
|
||||
result->response =
|
||||
GUEST_MEMORY_BLOCK_RESPONSE_TYPE_OPERATION_FAILED;
|
||||
}
|
||||
}
|
||||
goto out2;
|
||||
}
|
||||
|
||||
if (sys2memblk) {
|
||||
char removable = '0';
|
||||
|
||||
mem_blk->online = (strncmp(status, "online", 6) == 0);
|
||||
|
||||
ga_read_sysfs_file(dirfd, "removable", &removable, 1, &local_err);
|
||||
if (local_err) {
|
||||
/* if no 'removable' file, it does't support offline mem blk */
|
||||
if (errno == ENOENT) {
|
||||
error_free(local_err);
|
||||
mem_blk->can_offline = false;
|
||||
} else {
|
||||
error_propagate(errp, local_err);
|
||||
}
|
||||
} else {
|
||||
mem_blk->can_offline = (removable != '0');
|
||||
}
|
||||
} else {
|
||||
if (mem_blk->online != (strncmp(status, "online", 6) == 0)) {
|
||||
char *new_state = mem_blk->online ? g_strdup("online") :
|
||||
g_strdup("offline");
|
||||
|
||||
ga_write_sysfs_file(dirfd, "state", new_state, strlen(new_state),
|
||||
&local_err);
|
||||
g_free(new_state);
|
||||
if (local_err) {
|
||||
error_free(local_err);
|
||||
result->response =
|
||||
GUEST_MEMORY_BLOCK_RESPONSE_TYPE_OPERATION_FAILED;
|
||||
goto out2;
|
||||
}
|
||||
|
||||
result->response = GUEST_MEMORY_BLOCK_RESPONSE_TYPE_SUCCESS;
|
||||
result->has_error_code = false;
|
||||
} /* otherwise pretend successful re-(on|off)-lining */
|
||||
}
|
||||
g_free(status);
|
||||
close(dirfd);
|
||||
return;
|
||||
|
||||
out2:
|
||||
g_free(status);
|
||||
close(dirfd);
|
||||
out1:
|
||||
if (!sys2memblk) {
|
||||
result->has_error_code = true;
|
||||
result->error_code = errno;
|
||||
}
|
||||
}
|
||||
|
||||
GuestMemoryBlockList *qmp_guest_get_memory_blocks(Error **errp)
|
||||
{
|
||||
GuestMemoryBlockList *head, **link;
|
||||
Error *local_err = NULL;
|
||||
struct dirent *de;
|
||||
DIR *dp;
|
||||
|
||||
head = NULL;
|
||||
link = &head;
|
||||
|
||||
dp = opendir("/sys/devices/system/memory/");
|
||||
if (!dp) {
|
||||
error_setg_errno(errp, errno, "Can't open directory"
|
||||
"\"/sys/devices/system/memory/\"\n");
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/* Note: the phys_index of memory block may be discontinuous,
|
||||
* this is because a memblk is the unit of the Sparse Memory design, which
|
||||
* allows discontinuous memory ranges (ex. NUMA), so here we should
|
||||
* traverse the memory block directory.
|
||||
*/
|
||||
while ((de = readdir(dp)) != NULL) {
|
||||
GuestMemoryBlock *mem_blk;
|
||||
GuestMemoryBlockList *entry;
|
||||
|
||||
if ((strncmp(de->d_name, "memory", 6) != 0) ||
|
||||
!(de->d_type & DT_DIR)) {
|
||||
continue;
|
||||
}
|
||||
|
||||
mem_blk = g_malloc0(sizeof *mem_blk);
|
||||
/* The d_name is "memoryXXX", phys_index is block id, same as XXX */
|
||||
mem_blk->phys_index = strtoul(&de->d_name[6], NULL, 10);
|
||||
mem_blk->has_can_offline = true; /* lolspeak ftw */
|
||||
transfer_memory_block(mem_blk, true, NULL, &local_err);
|
||||
|
||||
entry = g_malloc0(sizeof *entry);
|
||||
entry->value = mem_blk;
|
||||
|
||||
*link = entry;
|
||||
link = &entry->next;
|
||||
}
|
||||
|
||||
closedir(dp);
|
||||
if (local_err == NULL) {
|
||||
/* there's no guest with zero memory blocks */
|
||||
if (head == NULL) {
|
||||
error_setg(errp, "guest reported zero memory blocks!");
|
||||
}
|
||||
return head;
|
||||
}
|
||||
|
||||
qapi_free_GuestMemoryBlockList(head);
|
||||
error_propagate(errp, local_err);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
GuestMemoryBlockResponseList *
|
||||
qmp_guest_set_memory_blocks(GuestMemoryBlockList *mem_blks, Error **errp)
|
||||
{
|
||||
GuestMemoryBlockResponseList *head, **link;
|
||||
Error *local_err = NULL;
|
||||
|
||||
head = NULL;
|
||||
link = &head;
|
||||
|
||||
while (mem_blks != NULL) {
|
||||
GuestMemoryBlockResponse *result;
|
||||
GuestMemoryBlockResponseList *entry;
|
||||
GuestMemoryBlock *current_mem_blk = mem_blks->value;
|
||||
|
||||
result = g_malloc0(sizeof(*result));
|
||||
result->phys_index = current_mem_blk->phys_index;
|
||||
transfer_memory_block(current_mem_blk, false, result, &local_err);
|
||||
if (local_err) { /* should never happen */
|
||||
goto err;
|
||||
}
|
||||
entry = g_malloc0(sizeof *entry);
|
||||
entry->value = result;
|
||||
|
||||
*link = entry;
|
||||
link = &entry->next;
|
||||
mem_blks = mem_blks->next;
|
||||
}
|
||||
|
||||
return head;
|
||||
err:
|
||||
qapi_free_GuestMemoryBlockResponseList(head);
|
||||
error_propagate(errp, local_err);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
GuestMemoryBlockInfo *qmp_guest_get_memory_block_info(Error **errp)
|
||||
{
|
||||
Error *local_err = NULL;
|
||||
char *dirpath;
|
||||
int dirfd;
|
||||
char *buf;
|
||||
GuestMemoryBlockInfo *info;
|
||||
|
||||
dirpath = g_strdup_printf("/sys/devices/system/memory/");
|
||||
dirfd = open(dirpath, O_RDONLY | O_DIRECTORY);
|
||||
if (dirfd == -1) {
|
||||
error_setg_errno(errp, errno, "open(\"%s\")", dirpath);
|
||||
g_free(dirpath);
|
||||
return NULL;
|
||||
}
|
||||
g_free(dirpath);
|
||||
|
||||
buf = g_malloc0(20);
|
||||
ga_read_sysfs_file(dirfd, "block_size_bytes", buf, 20, &local_err);
|
||||
if (local_err) {
|
||||
g_free(buf);
|
||||
error_propagate(errp, local_err);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
info = g_new0(GuestMemoryBlockInfo, 1);
|
||||
info->size = strtol(buf, NULL, 16); /* the unit is bytes */
|
||||
|
||||
g_free(buf);
|
||||
|
||||
return info;
|
||||
}
|
||||
|
||||
#else /* defined(__linux__) */
|
||||
|
||||
void qmp_guest_suspend_disk(Error **errp)
|
||||
@ -1910,6 +2332,33 @@ int64_t qmp_guest_set_vcpus(GuestLogicalProcessorList *vcpus, Error **errp)
|
||||
return -1;
|
||||
}
|
||||
|
||||
void qmp_guest_set_user_password(const char *username,
|
||||
const char *password,
|
||||
bool crypted,
|
||||
Error **errp)
|
||||
{
|
||||
error_set(errp, QERR_UNSUPPORTED);
|
||||
}
|
||||
|
||||
GuestMemoryBlockList *qmp_guest_get_memory_blocks(Error **errp)
|
||||
{
|
||||
error_set(errp, QERR_UNSUPPORTED);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
GuestMemoryBlockResponseList *
|
||||
qmp_guest_set_memory_blocks(GuestMemoryBlockList *mem_blks, Error **errp)
|
||||
{
|
||||
error_set(errp, QERR_UNSUPPORTED);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
GuestMemoryBlockInfo *qmp_guest_get_memory_block_info(Error **errp)
|
||||
{
|
||||
error_set(errp, QERR_UNSUPPORTED);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
#endif
|
||||
|
||||
#if !defined(CONFIG_FSFREEZE)
|
||||
@ -1966,7 +2415,9 @@ GList *ga_command_blacklist_init(GList *blacklist)
|
||||
const char *list[] = {
|
||||
"guest-suspend-disk", "guest-suspend-ram",
|
||||
"guest-suspend-hybrid", "guest-network-get-interfaces",
|
||||
"guest-get-vcpus", "guest-set-vcpus", NULL};
|
||||
"guest-get-vcpus", "guest-set-vcpus",
|
||||
"guest-get-memory-blocks", "guest-set-memory-blocks",
|
||||
"guest-get-memory-block-size", NULL};
|
||||
char **p = (char **)list;
|
||||
|
||||
while (*p) {
|
||||
|
@ -14,10 +14,13 @@
|
||||
#include <glib.h>
|
||||
#include <wtypes.h>
|
||||
#include <powrprof.h>
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include "qga/guest-agent-core.h"
|
||||
#include "qga/vss-win32.h"
|
||||
#include "qga-qmp-commands.h"
|
||||
#include "qapi/qmp/qerror.h"
|
||||
#include "qemu/queue.h"
|
||||
|
||||
#ifndef SHTDN_REASON_FLAG_PLANNED
|
||||
#define SHTDN_REASON_FLAG_PLANNED 0x80000000
|
||||
@ -29,6 +32,146 @@
|
||||
(365 * (1970 - 1601) + \
|
||||
(1970 - 1601) / 4 - 3))
|
||||
|
||||
#define INVALID_SET_FILE_POINTER ((DWORD)-1)
|
||||
|
||||
typedef struct GuestFileHandle {
|
||||
int64_t id;
|
||||
HANDLE fh;
|
||||
QTAILQ_ENTRY(GuestFileHandle) next;
|
||||
} GuestFileHandle;
|
||||
|
||||
static struct {
|
||||
QTAILQ_HEAD(, GuestFileHandle) filehandles;
|
||||
} guest_file_state;
|
||||
|
||||
|
||||
typedef struct OpenFlags {
|
||||
const char *forms;
|
||||
DWORD desired_access;
|
||||
DWORD creation_disposition;
|
||||
} OpenFlags;
|
||||
static OpenFlags guest_file_open_modes[] = {
|
||||
{"r", GENERIC_READ, OPEN_EXISTING},
|
||||
{"rb", GENERIC_READ, OPEN_EXISTING},
|
||||
{"w", GENERIC_WRITE, CREATE_ALWAYS},
|
||||
{"wb", GENERIC_WRITE, CREATE_ALWAYS},
|
||||
{"a", GENERIC_WRITE, OPEN_ALWAYS },
|
||||
{"r+", GENERIC_WRITE|GENERIC_READ, OPEN_EXISTING},
|
||||
{"rb+", GENERIC_WRITE|GENERIC_READ, OPEN_EXISTING},
|
||||
{"r+b", GENERIC_WRITE|GENERIC_READ, OPEN_EXISTING},
|
||||
{"w+", GENERIC_WRITE|GENERIC_READ, CREATE_ALWAYS},
|
||||
{"wb+", GENERIC_WRITE|GENERIC_READ, CREATE_ALWAYS},
|
||||
{"w+b", GENERIC_WRITE|GENERIC_READ, CREATE_ALWAYS},
|
||||
{"a+", GENERIC_WRITE|GENERIC_READ, OPEN_ALWAYS },
|
||||
{"ab+", GENERIC_WRITE|GENERIC_READ, OPEN_ALWAYS },
|
||||
{"a+b", GENERIC_WRITE|GENERIC_READ, OPEN_ALWAYS }
|
||||
};
|
||||
|
||||
static OpenFlags *find_open_flag(const char *mode_str)
|
||||
{
|
||||
int mode;
|
||||
Error **errp = NULL;
|
||||
|
||||
for (mode = 0; mode < ARRAY_SIZE(guest_file_open_modes); ++mode) {
|
||||
OpenFlags *flags = guest_file_open_modes + mode;
|
||||
|
||||
if (strcmp(flags->forms, mode_str) == 0) {
|
||||
return flags;
|
||||
}
|
||||
}
|
||||
|
||||
error_setg(errp, "invalid file open mode '%s'", mode_str);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static int64_t guest_file_handle_add(HANDLE fh, Error **errp)
|
||||
{
|
||||
GuestFileHandle *gfh;
|
||||
int64_t handle;
|
||||
|
||||
handle = ga_get_fd_handle(ga_state, errp);
|
||||
if (handle < 0) {
|
||||
return -1;
|
||||
}
|
||||
gfh = g_malloc0(sizeof(GuestFileHandle));
|
||||
gfh->id = handle;
|
||||
gfh->fh = fh;
|
||||
QTAILQ_INSERT_TAIL(&guest_file_state.filehandles, gfh, next);
|
||||
|
||||
return handle;
|
||||
}
|
||||
|
||||
static GuestFileHandle *guest_file_handle_find(int64_t id, Error **errp)
|
||||
{
|
||||
GuestFileHandle *gfh;
|
||||
QTAILQ_FOREACH(gfh, &guest_file_state.filehandles, next) {
|
||||
if (gfh->id == id) {
|
||||
return gfh;
|
||||
}
|
||||
}
|
||||
error_setg(errp, "handle '%" PRId64 "' has not been found", id);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
int64_t qmp_guest_file_open(const char *path, bool has_mode,
|
||||
const char *mode, Error **errp)
|
||||
{
|
||||
int64_t fd;
|
||||
HANDLE fh;
|
||||
HANDLE templ_file = NULL;
|
||||
DWORD share_mode = FILE_SHARE_READ;
|
||||
DWORD flags_and_attr = FILE_ATTRIBUTE_NORMAL;
|
||||
LPSECURITY_ATTRIBUTES sa_attr = NULL;
|
||||
OpenFlags *guest_flags;
|
||||
|
||||
if (!has_mode) {
|
||||
mode = "r";
|
||||
}
|
||||
slog("guest-file-open called, filepath: %s, mode: %s", path, mode);
|
||||
guest_flags = find_open_flag(mode);
|
||||
if (guest_flags == NULL) {
|
||||
error_setg(errp, "invalid file open mode");
|
||||
return -1;
|
||||
}
|
||||
|
||||
fh = CreateFile(path, guest_flags->desired_access, share_mode, sa_attr,
|
||||
guest_flags->creation_disposition, flags_and_attr,
|
||||
templ_file);
|
||||
if (fh == INVALID_HANDLE_VALUE) {
|
||||
error_setg_win32(errp, GetLastError(), "failed to open file '%s'",
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
||||
fd = guest_file_handle_add(fh, errp);
|
||||
if (fd < 0) {
|
||||
CloseHandle(&fh);
|
||||
error_setg(errp, "failed to add handle to qmp handle table");
|
||||
return -1;
|
||||
}
|
||||
|
||||
slog("guest-file-open, handle: % " PRId64, fd);
|
||||
return fd;
|
||||
}
|
||||
|
||||
void qmp_guest_file_close(int64_t handle, Error **errp)
|
||||
{
|
||||
bool ret;
|
||||
GuestFileHandle *gfh = guest_file_handle_find(handle, errp);
|
||||
slog("guest-file-close called, handle: %" PRId64, handle);
|
||||
if (gfh == NULL) {
|
||||
return;
|
||||
}
|
||||
ret = CloseHandle(gfh->fh);
|
||||
if (!ret) {
|
||||
error_setg_win32(errp, GetLastError(), "failed close handle");
|
||||
return;
|
||||
}
|
||||
|
||||
QTAILQ_REMOVE(&guest_file_state.filehandles, gfh, next);
|
||||
g_free(gfh);
|
||||
}
|
||||
|
||||
static void acquire_privilege(const char *name, Error **errp)
|
||||
{
|
||||
HANDLE token = NULL;
|
||||
@ -113,43 +256,130 @@ void qmp_guest_shutdown(bool has_mode, const char *mode, Error **errp)
|
||||
}
|
||||
}
|
||||
|
||||
int64_t qmp_guest_file_open(const char *path, bool has_mode, const char *mode,
|
||||
Error **errp)
|
||||
{
|
||||
error_set(errp, QERR_UNSUPPORTED);
|
||||
return 0;
|
||||
}
|
||||
|
||||
void qmp_guest_file_close(int64_t handle, Error **errp)
|
||||
{
|
||||
error_set(errp, QERR_UNSUPPORTED);
|
||||
}
|
||||
|
||||
GuestFileRead *qmp_guest_file_read(int64_t handle, bool has_count,
|
||||
int64_t count, Error **errp)
|
||||
{
|
||||
error_set(errp, QERR_UNSUPPORTED);
|
||||
return 0;
|
||||
GuestFileRead *read_data = NULL;
|
||||
guchar *buf;
|
||||
HANDLE fh;
|
||||
bool is_ok;
|
||||
DWORD read_count;
|
||||
GuestFileHandle *gfh = guest_file_handle_find(handle, errp);
|
||||
|
||||
if (!gfh) {
|
||||
return NULL;
|
||||
}
|
||||
if (!has_count) {
|
||||
count = QGA_READ_COUNT_DEFAULT;
|
||||
} else if (count < 0) {
|
||||
error_setg(errp, "value '%" PRId64
|
||||
"' is invalid for argument count", count);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
fh = gfh->fh;
|
||||
buf = g_malloc0(count+1);
|
||||
is_ok = ReadFile(fh, buf, count, &read_count, NULL);
|
||||
if (!is_ok) {
|
||||
error_setg_win32(errp, GetLastError(), "failed to read file");
|
||||
slog("guest-file-read failed, handle %" PRId64, handle);
|
||||
} else {
|
||||
buf[read_count] = 0;
|
||||
read_data = g_malloc0(sizeof(GuestFileRead));
|
||||
read_data->count = (size_t)read_count;
|
||||
read_data->eof = read_count == 0;
|
||||
|
||||
if (read_count != 0) {
|
||||
read_data->buf_b64 = g_base64_encode(buf, read_count);
|
||||
}
|
||||
}
|
||||
g_free(buf);
|
||||
|
||||
return read_data;
|
||||
}
|
||||
|
||||
GuestFileWrite *qmp_guest_file_write(int64_t handle, const char *buf_b64,
|
||||
bool has_count, int64_t count,
|
||||
Error **errp)
|
||||
{
|
||||
error_set(errp, QERR_UNSUPPORTED);
|
||||
return 0;
|
||||
GuestFileWrite *write_data = NULL;
|
||||
guchar *buf;
|
||||
gsize buf_len;
|
||||
bool is_ok;
|
||||
DWORD write_count;
|
||||
GuestFileHandle *gfh = guest_file_handle_find(handle, errp);
|
||||
HANDLE fh;
|
||||
|
||||
if (!gfh) {
|
||||
return NULL;
|
||||
}
|
||||
fh = gfh->fh;
|
||||
buf = g_base64_decode(buf_b64, &buf_len);
|
||||
|
||||
if (!has_count) {
|
||||
count = buf_len;
|
||||
} else if (count < 0 || count > buf_len) {
|
||||
error_setg(errp, "value '%" PRId64
|
||||
"' is invalid for argument count", count);
|
||||
goto done;
|
||||
}
|
||||
|
||||
is_ok = WriteFile(fh, buf, count, &write_count, NULL);
|
||||
if (!is_ok) {
|
||||
error_setg_win32(errp, GetLastError(), "failed to write to file");
|
||||
slog("guest-file-write-failed, handle: %" PRId64, handle);
|
||||
} else {
|
||||
write_data = g_malloc0(sizeof(GuestFileWrite));
|
||||
write_data->count = (size_t) write_count;
|
||||
}
|
||||
|
||||
done:
|
||||
g_free(buf);
|
||||
return write_data;
|
||||
}
|
||||
|
||||
GuestFileSeek *qmp_guest_file_seek(int64_t handle, int64_t offset,
|
||||
int64_t whence, Error **errp)
|
||||
{
|
||||
error_set(errp, QERR_UNSUPPORTED);
|
||||
return 0;
|
||||
GuestFileHandle *gfh;
|
||||
GuestFileSeek *seek_data;
|
||||
HANDLE fh;
|
||||
LARGE_INTEGER new_pos, off_pos;
|
||||
off_pos.QuadPart = offset;
|
||||
BOOL res;
|
||||
gfh = guest_file_handle_find(handle, errp);
|
||||
if (!gfh) {
|
||||
return NULL;
|
||||
}
|
||||
|
||||
fh = gfh->fh;
|
||||
res = SetFilePointerEx(fh, off_pos, &new_pos, whence);
|
||||
if (!res) {
|
||||
error_setg_win32(errp, GetLastError(), "failed to seek file");
|
||||
return NULL;
|
||||
}
|
||||
seek_data = g_new0(GuestFileSeek, 1);
|
||||
seek_data->position = new_pos.QuadPart;
|
||||
return seek_data;
|
||||
}
|
||||
|
||||
void qmp_guest_file_flush(int64_t handle, Error **errp)
|
||||
{
|
||||
error_set(errp, QERR_UNSUPPORTED);
|
||||
HANDLE fh;
|
||||
GuestFileHandle *gfh = guest_file_handle_find(handle, errp);
|
||||
if (!gfh) {
|
||||
return;
|
||||
}
|
||||
|
||||
fh = gfh->fh;
|
||||
if (!FlushFileBuffers(fh)) {
|
||||
error_setg_win32(errp, GetLastError(), "failed to flush file");
|
||||
}
|
||||
}
|
||||
|
||||
static void guest_file_init(void)
|
||||
{
|
||||
QTAILQ_INIT(&guest_file_state.filehandles);
|
||||
}
|
||||
|
||||
GuestFilesystemInfoList *qmp_guest_get_fsinfo(Error **errp)
|
||||
@ -395,8 +625,17 @@ void qmp_guest_set_time(bool has_time, int64_t time_ns, Error **errp)
|
||||
FILETIME tf;
|
||||
LONGLONG time;
|
||||
|
||||
if (has_time) {
|
||||
/* Okay, user passed a time to set. Validate it. */
|
||||
if (!has_time) {
|
||||
/* Unfortunately, Windows libraries don't provide an easy way to access
|
||||
* RTC yet:
|
||||
*
|
||||
* https://msdn.microsoft.com/en-us/library/aa908981.aspx
|
||||
*/
|
||||
error_setg(errp, "Time argument is required on this platform");
|
||||
return;
|
||||
}
|
||||
|
||||
/* Validate time passed by user. */
|
||||
if (time_ns < 0 || time_ns / 100 > INT64_MAX - W32_FT_OFFSET) {
|
||||
error_setg(errp, "Time %" PRId64 "is invalid", time_ns);
|
||||
return;
|
||||
@ -412,15 +651,6 @@ void qmp_guest_set_time(bool has_time, int64_t time_ns, Error **errp)
|
||||
(int)GetLastError());
|
||||
return;
|
||||
}
|
||||
} else {
|
||||
/* Otherwise read the time from RTC which contains the correct value.
|
||||
* Hopefully. */
|
||||
GetSystemTime(&ts);
|
||||
if (ts.wYear < 1601 || ts.wYear > 30827) {
|
||||
error_setg(errp, "Failed to get time");
|
||||
return;
|
||||
}
|
||||
}
|
||||
|
||||
acquire_privilege(SE_SYSTEMTIME_NAME, &local_err);
|
||||
if (local_err) {
|
||||
@ -446,14 +676,42 @@ int64_t qmp_guest_set_vcpus(GuestLogicalProcessorList *vcpus, Error **errp)
|
||||
return -1;
|
||||
}
|
||||
|
||||
void qmp_guest_set_user_password(const char *username,
|
||||
const char *password,
|
||||
bool crypted,
|
||||
Error **errp)
|
||||
{
|
||||
error_set(errp, QERR_UNSUPPORTED);
|
||||
}
|
||||
|
||||
GuestMemoryBlockList *qmp_guest_get_memory_blocks(Error **errp)
|
||||
{
|
||||
error_set(errp, QERR_UNSUPPORTED);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
GuestMemoryBlockResponseList *
|
||||
qmp_guest_set_memory_blocks(GuestMemoryBlockList *mem_blks, Error **errp)
|
||||
{
|
||||
error_set(errp, QERR_UNSUPPORTED);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
GuestMemoryBlockInfo *qmp_guest_get_memory_block_info(Error **errp)
|
||||
{
|
||||
error_set(errp, QERR_UNSUPPORTED);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/* add unsupported commands to the blacklist */
|
||||
GList *ga_command_blacklist_init(GList *blacklist)
|
||||
{
|
||||
const char *list_unsupported[] = {
|
||||
"guest-file-open", "guest-file-close", "guest-file-read",
|
||||
"guest-file-write", "guest-file-seek", "guest-file-flush",
|
||||
"guest-suspend-hybrid", "guest-network-get-interfaces",
|
||||
"guest-get-vcpus", "guest-set-vcpus",
|
||||
"guest-set-user-password",
|
||||
"guest-get-memory-blocks", "guest-set-memory-blocks",
|
||||
"guest-get-memory-block-size",
|
||||
"guest-fsfreeze-freeze-list", "guest-get-fsinfo",
|
||||
"guest-fstrim", NULL};
|
||||
char **p = (char **)list_unsupported;
|
||||
@ -482,4 +740,5 @@ void ga_command_state_init(GAState *s, GACommandState *cs)
|
||||
if (!vss_initialized()) {
|
||||
ga_command_state_add(cs, NULL, guest_fsfreeze_cleanup);
|
||||
}
|
||||
ga_command_state_add(cs, guest_file_init, NULL);
|
||||
}
|
||||
|
@ -121,7 +121,10 @@
|
||||
# given value, then sets the Hardware Clock (RTC) to the
|
||||
# current System Time. This will make it easier for a guest
|
||||
# to resynchronize without waiting for NTP. If no @time is
|
||||
# specified, then the time to set is read from RTC.
|
||||
# specified, then the time to set is read from RTC. However,
|
||||
# this may not be supported on all platforms (i.e. Windows).
|
||||
# If that's the case users are advised to always pass a
|
||||
# value.
|
||||
#
|
||||
# @time: #optional time of nanoseconds, relative to the Epoch
|
||||
# of 1970-01-01 in UTC.
|
||||
@ -738,3 +741,153 @@
|
||||
##
|
||||
{ 'command': 'guest-get-fsinfo',
|
||||
'returns': ['GuestFilesystemInfo'] }
|
||||
|
||||
##
|
||||
# @guest-set-user-password
|
||||
#
|
||||
# @username: the user account whose password to change
|
||||
# @password: the new password entry string, base64 encoded
|
||||
# @crypted: true if password is already crypt()d, false if raw
|
||||
#
|
||||
# If the @crypted flag is true, it is the caller's responsibility
|
||||
# to ensure the correct crypt() encryption scheme is used. This
|
||||
# command does not attempt to interpret or report on the encryption
|
||||
# scheme. Refer to the documentation of the guest operating system
|
||||
# in question to determine what is supported.
|
||||
#
|
||||
# Note all guest operating systems will support use of the
|
||||
# @crypted flag, as they may require the clear-text password
|
||||
#
|
||||
# The @password parameter must always be base64 encoded before
|
||||
# transmission, even if already crypt()d, to ensure it is 8-bit
|
||||
# safe when passed as JSON.
|
||||
#
|
||||
# Returns: Nothing on success.
|
||||
#
|
||||
# Since 2.3
|
||||
##
|
||||
{ 'command': 'guest-set-user-password',
|
||||
'data': { 'username': 'str', 'password': 'str', 'crypted': 'bool' } }
|
||||
|
||||
# @GuestMemoryBlock:
|
||||
#
|
||||
# @phys-index: Arbitrary guest-specific unique identifier of the MEMORY BLOCK.
|
||||
#
|
||||
# @online: Whether the MEMORY BLOCK is enabled in guest.
|
||||
#
|
||||
# @can-offline: #optional Whether offlining the MEMORY BLOCK is possible.
|
||||
# This member is always filled in by the guest agent when the
|
||||
# structure is returned, and always ignored on input (hence it
|
||||
# can be omitted then).
|
||||
#
|
||||
# Since: 2.3
|
||||
##
|
||||
{ 'type': 'GuestMemoryBlock',
|
||||
'data': {'phys-index': 'uint64',
|
||||
'online': 'bool',
|
||||
'*can-offline': 'bool'} }
|
||||
|
||||
##
|
||||
# @guest-get-memory-blocks:
|
||||
#
|
||||
# Retrieve the list of the guest's memory blocks.
|
||||
#
|
||||
# This is a read-only operation.
|
||||
#
|
||||
# Returns: The list of all memory blocks the guest knows about.
|
||||
# Each memory block is put on the list exactly once, but their order
|
||||
# is unspecified.
|
||||
#
|
||||
# Since: 2.3
|
||||
##
|
||||
{ 'command': 'guest-get-memory-blocks',
|
||||
'returns': ['GuestMemoryBlock'] }
|
||||
|
||||
##
|
||||
# @GuestMemoryBlockResponseType
|
||||
#
|
||||
# An enumeration of memory block operation result.
|
||||
#
|
||||
# @sucess: the operation of online/offline memory block is successful.
|
||||
# @not-found: can't find the corresponding memoryXXX directory in sysfs.
|
||||
# @operation-not-supported: for some old kernels, it does not support
|
||||
# online or offline memory block.
|
||||
# @operation-failed: the operation of online/offline memory block fails,
|
||||
# because of some errors happen.
|
||||
#
|
||||
# Since: 2.3
|
||||
##
|
||||
{ 'enum': 'GuestMemoryBlockResponseType',
|
||||
'data': ['success', 'not-found', 'operation-not-supported',
|
||||
'operation-failed'] }
|
||||
|
||||
##
|
||||
# @GuestMemoryBlockResponse:
|
||||
#
|
||||
# @phys-index: same with the 'phys-index' member of @GuestMemoryBlock.
|
||||
#
|
||||
# @response: the result of memory block operation.
|
||||
#
|
||||
# @error-code: #optional the error number.
|
||||
# When memory block operation fails, we assign the value of
|
||||
# 'errno' to this member, it indicates what goes wrong.
|
||||
# When the operation succeeds, it will be omitted.
|
||||
#
|
||||
# Since: 2.3
|
||||
##
|
||||
{ 'type': 'GuestMemoryBlockResponse',
|
||||
'data': { 'phys-index': 'uint64',
|
||||
'response': 'GuestMemoryBlockResponseType',
|
||||
'*error-code': 'int' }}
|
||||
|
||||
##
|
||||
# @guest-set-memory-blocks:
|
||||
#
|
||||
# Attempt to reconfigure (currently: enable/disable) state of memory blocks
|
||||
# inside the guest.
|
||||
#
|
||||
# The input list is processed node by node in order. In each node @phys-index
|
||||
# is used to look up the guest MEMORY BLOCK, for which @online specifies the
|
||||
# requested state. The set of distinct @phys-index's is only required to be a
|
||||
# subset of the guest-supported identifiers. There's no restriction on list
|
||||
# length or on repeating the same @phys-index (with possibly different @online
|
||||
# field).
|
||||
# Preferably the input list should describe a modified subset of
|
||||
# @guest-get-memory-blocks' return value.
|
||||
#
|
||||
# Returns: The operation results, it is a list of @GuestMemoryBlockResponse,
|
||||
# which is corresponding to the input list.
|
||||
#
|
||||
# Note: it will return NULL if the @mem-blks list was empty on input,
|
||||
# or there is an error, and in this case, guest state will not be
|
||||
# changed.
|
||||
#
|
||||
# Since: 2.3
|
||||
##
|
||||
{ 'command': 'guest-set-memory-blocks',
|
||||
'data': {'mem-blks': ['GuestMemoryBlock'] },
|
||||
'returns': ['GuestMemoryBlockResponse'] }
|
||||
|
||||
# @GuestMemoryBlockInfo:
|
||||
#
|
||||
# @size: the size (in bytes) of the guest memory blocks,
|
||||
# which are the minimal units of memory block online/offline
|
||||
# operations (also called Logical Memory Hotplug).
|
||||
#
|
||||
# Since: 2.3
|
||||
##
|
||||
{ 'type': 'GuestMemoryBlockInfo',
|
||||
'data': {'size': 'uint64'} }
|
||||
|
||||
##
|
||||
# @guest-get-memory-block-info:
|
||||
#
|
||||
# Get information relating to guest memory blocks.
|
||||
#
|
||||
# Returns: memory block size in bytes.
|
||||
# Returns: @GuestMemoryBlockInfo
|
||||
#
|
||||
# Since 2.3
|
||||
##
|
||||
{ 'command': 'guest-get-memory-block-info',
|
||||
'returns': 'GuestMemoryBlockInfo' }
|
||||
|
@ -94,30 +94,30 @@ envlist_parse(envlist_t *envlist, const char *env,
|
||||
{
|
||||
char *tmpenv, *envvar;
|
||||
char *envsave = NULL;
|
||||
|
||||
int ret = 0;
|
||||
assert(callback != NULL);
|
||||
|
||||
if ((envlist == NULL) || (env == NULL))
|
||||
return (EINVAL);
|
||||
|
||||
/*
|
||||
* We need to make temporary copy of the env string
|
||||
* as strtok_r(3) modifies it while it tokenizes.
|
||||
*/
|
||||
if ((tmpenv = strdup(env)) == NULL)
|
||||
return (errno);
|
||||
envsave = tmpenv;
|
||||
|
||||
envvar = strtok_r(tmpenv, ",", &envsave);
|
||||
while (envvar != NULL) {
|
||||
if ((*callback)(envlist, envvar) != 0) {
|
||||
free(tmpenv);
|
||||
return (errno);
|
||||
do {
|
||||
envvar = strchr(tmpenv, ',');
|
||||
if (envvar != NULL) {
|
||||
*envvar = '\0';
|
||||
}
|
||||
envvar = strtok_r(NULL, ",", &envsave);
|
||||
if ((*callback)(envlist, tmpenv) != 0) {
|
||||
ret = errno;
|
||||
break;
|
||||
}
|
||||
tmpenv = envvar + 1;
|
||||
} while (envvar != NULL);
|
||||
|
||||
free(tmpenv);
|
||||
return (0);
|
||||
free(envsave);
|
||||
return ret;
|
||||
}
|
||||
|
||||
/*
|
||||
|
Loading…
Reference in New Issue
Block a user