]>
Commit | Line | Data |
---|---|---|
6dd844db PB |
1 | /* |
2 | * Serving QEMU block devices via NBD | |
3 | * | |
4 | * Copyright (c) 2012 Red Hat, Inc. | |
5 | * | |
6 | * Author: Paolo Bonzini <[email protected]> | |
7 | * | |
8 | * This work is licensed under the terms of the GNU GPL, version 2 or | |
9 | * later. See the COPYING file in the top-level directory. | |
10 | */ | |
11 | ||
d38ea87a | 12 | #include "qemu/osdep.h" |
9c17d615 | 13 | #include "sysemu/blockdev.h" |
e140177d | 14 | #include "sysemu/block-backend.h" |
0d09e41a | 15 | #include "hw/block/block.h" |
e688df6b | 16 | #include "qapi/error.h" |
9af23989 | 17 | #include "qapi/qapi-commands-block.h" |
9c17d615 | 18 | #include "sysemu/sysemu.h" |
737e150e | 19 | #include "block/nbd.h" |
ae398278 | 20 | #include "io/channel-socket.h" |
862172f4 | 21 | #include "io/net-listener.h" |
6dd844db | 22 | |
ddffee39 | 23 | typedef struct NBDServerData { |
862172f4 | 24 | QIONetListener *listener; |
ddffee39 | 25 | QCryptoTLSCreds *tlscreds; |
00019455 | 26 | char *tlsauthz; |
ddffee39 DB |
27 | } NBDServerData; |
28 | ||
29 | static NBDServerData *nbd_server; | |
30 | ||
0c9390d9 EB |
31 | static void nbd_blockdev_client_closed(NBDClient *client, bool ignored) |
32 | { | |
33 | nbd_client_put(client); | |
34 | } | |
6dd844db | 35 | |
862172f4 DB |
36 | static void nbd_accept(QIONetListener *listener, QIOChannelSocket *cioc, |
37 | gpointer opaque) | |
6dd844db | 38 | { |
0d73f725 | 39 | qio_channel_set_name(QIO_CHANNEL(cioc), "nbd-server"); |
00019455 | 40 | nbd_client_new(cioc, nbd_server->tlscreds, nbd_server->tlsauthz, |
0c9390d9 | 41 | nbd_blockdev_client_closed); |
6dd844db PB |
42 | } |
43 | ||
ddffee39 DB |
44 | |
45 | static void nbd_server_free(NBDServerData *server) | |
6dd844db | 46 | { |
ddffee39 | 47 | if (!server) { |
6dd844db PB |
48 | return; |
49 | } | |
50 | ||
862172f4 DB |
51 | qio_net_listener_disconnect(server->listener); |
52 | object_unref(OBJECT(server->listener)); | |
ddffee39 DB |
53 | if (server->tlscreds) { |
54 | object_unref(OBJECT(server->tlscreds)); | |
55 | } | |
00019455 | 56 | g_free(server->tlsauthz); |
ddffee39 DB |
57 | |
58 | g_free(server); | |
59 | } | |
60 | ||
61 | static QCryptoTLSCreds *nbd_get_tls_creds(const char *id, Error **errp) | |
62 | { | |
63 | Object *obj; | |
64 | QCryptoTLSCreds *creds; | |
65 | ||
66 | obj = object_resolve_path_component( | |
67 | object_get_objects_root(), id); | |
68 | if (!obj) { | |
69 | error_setg(errp, "No TLS credentials with id '%s'", | |
70 | id); | |
71 | return NULL; | |
72 | } | |
73 | creds = (QCryptoTLSCreds *) | |
74 | object_dynamic_cast(obj, TYPE_QCRYPTO_TLS_CREDS); | |
75 | if (!creds) { | |
76 | error_setg(errp, "Object with id '%s' is not TLS credentials", | |
77 | id); | |
78 | return NULL; | |
79 | } | |
80 | ||
81 | if (creds->endpoint != QCRYPTO_TLS_CREDS_ENDPOINT_SERVER) { | |
82 | error_setg(errp, | |
83 | "Expecting TLS credentials with a server endpoint"); | |
84 | return NULL; | |
85 | } | |
86 | object_ref(obj); | |
87 | return creds; | |
88 | } | |
89 | ||
90 | ||
bd269ebc | 91 | void nbd_server_start(SocketAddress *addr, const char *tls_creds, |
00019455 | 92 | const char *tls_authz, Error **errp) |
ddffee39 DB |
93 | { |
94 | if (nbd_server) { | |
95 | error_setg(errp, "NBD server already running"); | |
ae398278 | 96 | return; |
6dd844db | 97 | } |
ae398278 | 98 | |
ddffee39 | 99 | nbd_server = g_new0(NBDServerData, 1); |
862172f4 DB |
100 | nbd_server->listener = qio_net_listener_new(); |
101 | ||
102 | qio_net_listener_set_name(nbd_server->listener, | |
103 | "nbd-listener"); | |
104 | ||
105 | if (qio_net_listener_open_sync(nbd_server->listener, addr, errp) < 0) { | |
ddffee39 DB |
106 | goto error; |
107 | } | |
108 | ||
bd269ebc | 109 | if (tls_creds) { |
ddffee39 DB |
110 | nbd_server->tlscreds = nbd_get_tls_creds(tls_creds, errp); |
111 | if (!nbd_server->tlscreds) { | |
112 | goto error; | |
113 | } | |
114 | ||
bd269ebc MA |
115 | /* TODO SOCKET_ADDRESS_TYPE_FD where fd has AF_INET or AF_INET6 */ |
116 | if (addr->type != SOCKET_ADDRESS_TYPE_INET) { | |
ddffee39 DB |
117 | error_setg(errp, "TLS is only supported with IPv4/IPv6"); |
118 | goto error; | |
119 | } | |
120 | } | |
121 | ||
00019455 DB |
122 | nbd_server->tlsauthz = g_strdup(tls_authz); |
123 | ||
862172f4 DB |
124 | qio_net_listener_set_client_func(nbd_server->listener, |
125 | nbd_accept, | |
126 | NULL, | |
127 | NULL); | |
ddffee39 DB |
128 | |
129 | return; | |
130 | ||
131 | error: | |
132 | nbd_server_free(nbd_server); | |
133 | nbd_server = NULL; | |
6dd844db PB |
134 | } |
135 | ||
bd269ebc MA |
136 | void qmp_nbd_server_start(SocketAddressLegacy *addr, |
137 | bool has_tls_creds, const char *tls_creds, | |
00019455 | 138 | bool has_tls_authz, const char *tls_authz, |
bd269ebc MA |
139 | Error **errp) |
140 | { | |
141 | SocketAddress *addr_flat = socket_address_flatten(addr); | |
142 | ||
00019455 | 143 | nbd_server_start(addr_flat, tls_creds, tls_authz, errp); |
bd269ebc MA |
144 | qapi_free_SocketAddress(addr_flat); |
145 | } | |
146 | ||
902a1f94 | 147 | void qmp_nbd_server_add(const char *device, bool has_name, const char *name, |
5fcbeb06 EB |
148 | bool has_writable, bool writable, |
149 | bool has_bitmap, const char *bitmap, Error **errp) | |
6dd844db | 150 | { |
094138d0 KW |
151 | BlockDriverState *bs = NULL; |
152 | BlockBackend *on_eject_blk; | |
6dd844db | 153 | NBDExport *exp; |
7596bbb3 | 154 | int64_t len; |
6dd844db | 155 | |
ddffee39 | 156 | if (!nbd_server) { |
17b6be4a PB |
157 | error_setg(errp, "NBD server not running"); |
158 | return; | |
159 | } | |
160 | ||
902a1f94 VSO |
161 | if (!has_name) { |
162 | name = device; | |
163 | } | |
164 | ||
165 | if (nbd_export_find(name)) { | |
166 | error_setg(errp, "NBD server already has export named '%s'", name); | |
6dd844db PB |
167 | return; |
168 | } | |
169 | ||
094138d0 KW |
170 | on_eject_blk = blk_by_name(device); |
171 | ||
172 | bs = bdrv_lookup_bs(device, device, errp); | |
173 | if (!bs) { | |
60fe4fac HB |
174 | return; |
175 | } | |
6dd844db | 176 | |
7596bbb3 EB |
177 | len = bdrv_getlength(bs); |
178 | if (len < 0) { | |
179 | error_setg_errno(errp, -len, | |
180 | "Failed to determine the NBD export's length"); | |
181 | return; | |
182 | } | |
183 | ||
e6444734 | 184 | if (!has_writable) { |
f3313d23 | 185 | writable = false; |
e6444734 | 186 | } |
094138d0 | 187 | if (bdrv_is_read_only(bs)) { |
e6444734 PB |
188 | writable = false; |
189 | } | |
190 | ||
7596bbb3 | 191 | exp = nbd_export_new(bs, 0, len, name, NULL, bitmap, |
3fa4c765 | 192 | writable ? 0 : NBD_FLAG_READ_ONLY, |
094138d0 | 193 | NULL, false, on_eject_blk, errp); |
98f44bbe HR |
194 | if (!exp) { |
195 | return; | |
196 | } | |
6dd844db | 197 | |
741cc431 HR |
198 | /* The list of named exports has a strong reference to this export now and |
199 | * our only way of accessing it is through nbd_export_find(), so we can drop | |
200 | * the strong reference that is @exp. */ | |
201 | nbd_export_put(exp); | |
6dd844db PB |
202 | } |
203 | ||
a3b0dc75 VSO |
204 | void qmp_nbd_server_remove(const char *name, |
205 | bool has_mode, NbdServerRemoveMode mode, | |
206 | Error **errp) | |
207 | { | |
208 | NBDExport *exp; | |
209 | ||
210 | if (!nbd_server) { | |
211 | error_setg(errp, "NBD server not running"); | |
212 | return; | |
213 | } | |
214 | ||
215 | exp = nbd_export_find(name); | |
216 | if (exp == NULL) { | |
217 | error_setg(errp, "Export '%s' is not found", name); | |
218 | return; | |
219 | } | |
220 | ||
221 | if (!has_mode) { | |
222 | mode = NBD_SERVER_REMOVE_MODE_SAFE; | |
223 | } | |
224 | ||
225 | nbd_export_remove(exp, mode, errp); | |
226 | } | |
227 | ||
6dd844db PB |
228 | void qmp_nbd_server_stop(Error **errp) |
229 | { | |
7801c3a7 EB |
230 | if (!nbd_server) { |
231 | error_setg(errp, "NBD server not running"); | |
232 | return; | |
233 | } | |
234 | ||
741cc431 | 235 | nbd_export_close_all(); |
6dd844db | 236 | |
ddffee39 DB |
237 | nbd_server_free(nbd_server); |
238 | nbd_server = NULL; | |
6dd844db | 239 | } |