]>
Commit | Line | Data |
---|---|---|
6dd844db PB |
1 | /* |
2 | * Serving QEMU block devices via NBD | |
3 | * | |
4 | * Copyright (c) 2012 Red Hat, Inc. | |
5 | * | |
6 | * Author: Paolo Bonzini <pbonzini@redhat.com> | |
7 | * | |
8 | * This work is licensed under the terms of the GNU GPL, version 2 or | |
9 | * later. See the COPYING file in the top-level directory. | |
10 | */ | |
11 | ||
d38ea87a | 12 | #include "qemu/osdep.h" |
9c17d615 | 13 | #include "sysemu/blockdev.h" |
e140177d | 14 | #include "sysemu/block-backend.h" |
0d09e41a | 15 | #include "hw/block/block.h" |
e688df6b | 16 | #include "qapi/error.h" |
9af23989 | 17 | #include "qapi/qapi-commands-block.h" |
737e150e | 18 | #include "block/nbd.h" |
ae398278 | 19 | #include "io/channel-socket.h" |
862172f4 | 20 | #include "io/net-listener.h" |
6dd844db | 21 | |
ddffee39 | 22 | typedef struct NBDServerData { |
862172f4 | 23 | QIONetListener *listener; |
ddffee39 | 24 | QCryptoTLSCreds *tlscreds; |
00019455 | 25 | char *tlsauthz; |
ddffee39 DB |
26 | } NBDServerData; |
27 | ||
28 | static NBDServerData *nbd_server; | |
29 | ||
0c9390d9 EB |
30 | static void nbd_blockdev_client_closed(NBDClient *client, bool ignored) |
31 | { | |
32 | nbd_client_put(client); | |
33 | } | |
6dd844db | 34 | |
862172f4 DB |
35 | static void nbd_accept(QIONetListener *listener, QIOChannelSocket *cioc, |
36 | gpointer opaque) | |
6dd844db | 37 | { |
0d73f725 | 38 | qio_channel_set_name(QIO_CHANNEL(cioc), "nbd-server"); |
00019455 | 39 | nbd_client_new(cioc, nbd_server->tlscreds, nbd_server->tlsauthz, |
0c9390d9 | 40 | nbd_blockdev_client_closed); |
6dd844db PB |
41 | } |
42 | ||
ddffee39 DB |
43 | |
44 | static void nbd_server_free(NBDServerData *server) | |
6dd844db | 45 | { |
ddffee39 | 46 | if (!server) { |
6dd844db PB |
47 | return; |
48 | } | |
49 | ||
862172f4 DB |
50 | qio_net_listener_disconnect(server->listener); |
51 | object_unref(OBJECT(server->listener)); | |
ddffee39 DB |
52 | if (server->tlscreds) { |
53 | object_unref(OBJECT(server->tlscreds)); | |
54 | } | |
00019455 | 55 | g_free(server->tlsauthz); |
ddffee39 DB |
56 | |
57 | g_free(server); | |
58 | } | |
59 | ||
60 | static QCryptoTLSCreds *nbd_get_tls_creds(const char *id, Error **errp) | |
61 | { | |
62 | Object *obj; | |
63 | QCryptoTLSCreds *creds; | |
64 | ||
65 | obj = object_resolve_path_component( | |
66 | object_get_objects_root(), id); | |
67 | if (!obj) { | |
68 | error_setg(errp, "No TLS credentials with id '%s'", | |
69 | id); | |
70 | return NULL; | |
71 | } | |
72 | creds = (QCryptoTLSCreds *) | |
73 | object_dynamic_cast(obj, TYPE_QCRYPTO_TLS_CREDS); | |
74 | if (!creds) { | |
75 | error_setg(errp, "Object with id '%s' is not TLS credentials", | |
76 | id); | |
77 | return NULL; | |
78 | } | |
79 | ||
80 | if (creds->endpoint != QCRYPTO_TLS_CREDS_ENDPOINT_SERVER) { | |
81 | error_setg(errp, | |
82 | "Expecting TLS credentials with a server endpoint"); | |
83 | return NULL; | |
84 | } | |
85 | object_ref(obj); | |
86 | return creds; | |
87 | } | |
88 | ||
89 | ||
bd269ebc | 90 | void nbd_server_start(SocketAddress *addr, const char *tls_creds, |
00019455 | 91 | const char *tls_authz, Error **errp) |
ddffee39 DB |
92 | { |
93 | if (nbd_server) { | |
94 | error_setg(errp, "NBD server already running"); | |
ae398278 | 95 | return; |
6dd844db | 96 | } |
ae398278 | 97 | |
ddffee39 | 98 | nbd_server = g_new0(NBDServerData, 1); |
862172f4 DB |
99 | nbd_server->listener = qio_net_listener_new(); |
100 | ||
101 | qio_net_listener_set_name(nbd_server->listener, | |
102 | "nbd-listener"); | |
103 | ||
104 | if (qio_net_listener_open_sync(nbd_server->listener, addr, errp) < 0) { | |
ddffee39 DB |
105 | goto error; |
106 | } | |
107 | ||
bd269ebc | 108 | if (tls_creds) { |
ddffee39 DB |
109 | nbd_server->tlscreds = nbd_get_tls_creds(tls_creds, errp); |
110 | if (!nbd_server->tlscreds) { | |
111 | goto error; | |
112 | } | |
113 | ||
bd269ebc MA |
114 | /* TODO SOCKET_ADDRESS_TYPE_FD where fd has AF_INET or AF_INET6 */ |
115 | if (addr->type != SOCKET_ADDRESS_TYPE_INET) { | |
ddffee39 DB |
116 | error_setg(errp, "TLS is only supported with IPv4/IPv6"); |
117 | goto error; | |
118 | } | |
119 | } | |
120 | ||
00019455 DB |
121 | nbd_server->tlsauthz = g_strdup(tls_authz); |
122 | ||
862172f4 DB |
123 | qio_net_listener_set_client_func(nbd_server->listener, |
124 | nbd_accept, | |
125 | NULL, | |
126 | NULL); | |
ddffee39 DB |
127 | |
128 | return; | |
129 | ||
130 | error: | |
131 | nbd_server_free(nbd_server); | |
132 | nbd_server = NULL; | |
6dd844db PB |
133 | } |
134 | ||
bd269ebc MA |
135 | void qmp_nbd_server_start(SocketAddressLegacy *addr, |
136 | bool has_tls_creds, const char *tls_creds, | |
00019455 | 137 | bool has_tls_authz, const char *tls_authz, |
bd269ebc MA |
138 | Error **errp) |
139 | { | |
140 | SocketAddress *addr_flat = socket_address_flatten(addr); | |
141 | ||
00019455 | 142 | nbd_server_start(addr_flat, tls_creds, tls_authz, errp); |
bd269ebc MA |
143 | qapi_free_SocketAddress(addr_flat); |
144 | } | |
145 | ||
902a1f94 | 146 | void qmp_nbd_server_add(const char *device, bool has_name, const char *name, |
5fcbeb06 EB |
147 | bool has_writable, bool writable, |
148 | bool has_bitmap, const char *bitmap, Error **errp) | |
6dd844db | 149 | { |
094138d0 KW |
150 | BlockDriverState *bs = NULL; |
151 | BlockBackend *on_eject_blk; | |
6dd844db | 152 | NBDExport *exp; |
7596bbb3 | 153 | int64_t len; |
6dd844db | 154 | |
ddffee39 | 155 | if (!nbd_server) { |
17b6be4a PB |
156 | error_setg(errp, "NBD server not running"); |
157 | return; | |
158 | } | |
159 | ||
902a1f94 VSO |
160 | if (!has_name) { |
161 | name = device; | |
162 | } | |
163 | ||
164 | if (nbd_export_find(name)) { | |
165 | error_setg(errp, "NBD server already has export named '%s'", name); | |
6dd844db PB |
166 | return; |
167 | } | |
168 | ||
094138d0 KW |
169 | on_eject_blk = blk_by_name(device); |
170 | ||
171 | bs = bdrv_lookup_bs(device, device, errp); | |
172 | if (!bs) { | |
60fe4fac HB |
173 | return; |
174 | } | |
6dd844db | 175 | |
7596bbb3 EB |
176 | len = bdrv_getlength(bs); |
177 | if (len < 0) { | |
178 | error_setg_errno(errp, -len, | |
179 | "Failed to determine the NBD export's length"); | |
180 | return; | |
181 | } | |
182 | ||
e6444734 | 183 | if (!has_writable) { |
f3313d23 | 184 | writable = false; |
e6444734 | 185 | } |
094138d0 | 186 | if (bdrv_is_read_only(bs)) { |
e6444734 PB |
187 | writable = false; |
188 | } | |
189 | ||
7596bbb3 | 190 | exp = nbd_export_new(bs, 0, len, name, NULL, bitmap, |
3fa4c765 | 191 | writable ? 0 : NBD_FLAG_READ_ONLY, |
094138d0 | 192 | NULL, false, on_eject_blk, errp); |
98f44bbe HR |
193 | if (!exp) { |
194 | return; | |
195 | } | |
6dd844db | 196 | |
741cc431 HR |
197 | /* The list of named exports has a strong reference to this export now and |
198 | * our only way of accessing it is through nbd_export_find(), so we can drop | |
199 | * the strong reference that is @exp. */ | |
200 | nbd_export_put(exp); | |
6dd844db PB |
201 | } |
202 | ||
a3b0dc75 VSO |
203 | void qmp_nbd_server_remove(const char *name, |
204 | bool has_mode, NbdServerRemoveMode mode, | |
205 | Error **errp) | |
206 | { | |
207 | NBDExport *exp; | |
208 | ||
209 | if (!nbd_server) { | |
210 | error_setg(errp, "NBD server not running"); | |
211 | return; | |
212 | } | |
213 | ||
214 | exp = nbd_export_find(name); | |
215 | if (exp == NULL) { | |
216 | error_setg(errp, "Export '%s' is not found", name); | |
217 | return; | |
218 | } | |
219 | ||
220 | if (!has_mode) { | |
221 | mode = NBD_SERVER_REMOVE_MODE_SAFE; | |
222 | } | |
223 | ||
224 | nbd_export_remove(exp, mode, errp); | |
225 | } | |
226 | ||
6dd844db PB |
227 | void qmp_nbd_server_stop(Error **errp) |
228 | { | |
7801c3a7 EB |
229 | if (!nbd_server) { |
230 | error_setg(errp, "NBD server not running"); | |
231 | return; | |
232 | } | |
233 | ||
741cc431 | 234 | nbd_export_close_all(); |
6dd844db | 235 | |
ddffee39 DB |
236 | nbd_server_free(nbd_server); |
237 | nbd_server = NULL; | |
6dd844db | 238 | } |