blob: cee9134b12ebf80d4f5223f47ca3896821baea00 [file] [log] [blame]
Paolo Bonzini6dd844d2012-08-22 16:43:07 +02001/*
2 * Serving QEMU block devices via NBD
3 *
4 * Copyright (c) 2012 Red Hat, Inc.
5 *
6 * Author: Paolo Bonzini <pbonzini@redhat.com>
7 *
8 * This work is licensed under the terms of the GNU GPL, version 2 or
9 * later. See the COPYING file in the top-level directory.
10 */
11
Peter Maydelld38ea872016-01-29 17:50:05 +000012#include "qemu/osdep.h"
Paolo Bonzini9c17d612012-12-17 18:20:04 +010013#include "sysemu/blockdev.h"
Max Reitze1401772014-11-18 12:21:17 +010014#include "sysemu/block-backend.h"
Paolo Bonzini0d09e412013-02-05 17:06:20 +010015#include "hw/block/block.h"
Markus Armbrustere688df62018-02-01 12:18:31 +010016#include "qapi/error.h"
Eric Blake8675cbd2020-10-27 00:05:48 -050017#include "qapi/clone-visitor.h"
18#include "qapi/qapi-visit-block-export.h"
Kevin Wolf5daa6bf2020-09-24 17:26:48 +020019#include "qapi/qapi-commands-block-export.h"
Paolo Bonzini737e1502012-12-17 18:19:44 +010020#include "block/nbd.h"
Daniel P. Berrangeae398272016-02-10 18:41:03 +000021#include "io/channel-socket.h"
Daniel P. Berrange862172f2017-12-18 10:16:42 +000022#include "io/net-listener.h"
Paolo Bonzini6dd844d2012-08-22 16:43:07 +020023
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000024typedef struct NBDServerData {
Daniel P. Berrange862172f2017-12-18 10:16:42 +000025 QIONetListener *listener;
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000026 QCryptoTLSCreds *tlscreds;
Daniel P. Berrange00019452019-02-27 16:20:34 +000027 char *tlsauthz;
Kevin Wolf1c8222b2020-09-24 17:26:54 +020028 uint32_t max_connections;
29 uint32_t connections;
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000030} NBDServerData;
31
32static NBDServerData *nbd_server;
Kevin Wolf00917172020-09-24 17:26:57 +020033static bool is_qemu_nbd;
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000034
Kevin Wolf1c8222b2020-09-24 17:26:54 +020035static void nbd_update_server_watch(NBDServerData *s);
36
Kevin Wolf00917172020-09-24 17:26:57 +020037void nbd_server_is_qemu_nbd(bool value)
38{
39 is_qemu_nbd = value;
40}
41
Kevin Wolf5b1cb492020-09-24 17:27:12 +020042bool nbd_server_is_running(void)
43{
44 return nbd_server || is_qemu_nbd;
45}
46
Eric Blake0c9390d2017-06-08 17:26:17 -050047static void nbd_blockdev_client_closed(NBDClient *client, bool ignored)
48{
49 nbd_client_put(client);
Kevin Wolf1c8222b2020-09-24 17:26:54 +020050 assert(nbd_server->connections > 0);
51 nbd_server->connections--;
52 nbd_update_server_watch(nbd_server);
Eric Blake0c9390d2017-06-08 17:26:17 -050053}
Paolo Bonzini6dd844d2012-08-22 16:43:07 +020054
Daniel P. Berrange862172f2017-12-18 10:16:42 +000055static void nbd_accept(QIONetListener *listener, QIOChannelSocket *cioc,
56 gpointer opaque)
Paolo Bonzini6dd844d2012-08-22 16:43:07 +020057{
Kevin Wolf1c8222b2020-09-24 17:26:54 +020058 nbd_server->connections++;
59 nbd_update_server_watch(nbd_server);
60
Daniel P. Berrange0d73f722016-09-30 11:57:14 +010061 qio_channel_set_name(QIO_CHANNEL(cioc), "nbd-server");
Daniel P. Berrange00019452019-02-27 16:20:34 +000062 nbd_client_new(cioc, nbd_server->tlscreds, nbd_server->tlsauthz,
Eric Blake0c9390d2017-06-08 17:26:17 -050063 nbd_blockdev_client_closed);
Paolo Bonzini6dd844d2012-08-22 16:43:07 +020064}
65
Kevin Wolf1c8222b2020-09-24 17:26:54 +020066static void nbd_update_server_watch(NBDServerData *s)
67{
68 if (!s->max_connections || s->connections < s->max_connections) {
69 qio_net_listener_set_client_func(s->listener, nbd_accept, NULL, NULL);
70 } else {
71 qio_net_listener_set_client_func(s->listener, NULL, NULL, NULL);
72 }
73}
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000074
75static void nbd_server_free(NBDServerData *server)
Paolo Bonzini6dd844d2012-08-22 16:43:07 +020076{
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000077 if (!server) {
78 return;
79 }
80
Daniel P. Berrange862172f2017-12-18 10:16:42 +000081 qio_net_listener_disconnect(server->listener);
82 object_unref(OBJECT(server->listener));
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000083 if (server->tlscreds) {
84 object_unref(OBJECT(server->tlscreds));
85 }
Daniel P. Berrange00019452019-02-27 16:20:34 +000086 g_free(server->tlsauthz);
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000087
88 g_free(server);
89}
90
91static QCryptoTLSCreds *nbd_get_tls_creds(const char *id, Error **errp)
92{
93 Object *obj;
94 QCryptoTLSCreds *creds;
95
96 obj = object_resolve_path_component(
97 object_get_objects_root(), id);
98 if (!obj) {
99 error_setg(errp, "No TLS credentials with id '%s'",
100 id);
101 return NULL;
102 }
103 creds = (QCryptoTLSCreds *)
104 object_dynamic_cast(obj, TYPE_QCRYPTO_TLS_CREDS);
105 if (!creds) {
106 error_setg(errp, "Object with id '%s' is not TLS credentials",
107 id);
108 return NULL;
109 }
110
111 if (creds->endpoint != QCRYPTO_TLS_CREDS_ENDPOINT_SERVER) {
112 error_setg(errp,
113 "Expecting TLS credentials with a server endpoint");
114 return NULL;
115 }
116 object_ref(obj);
117 return creds;
118}
119
120
Markus Armbrusterbd269eb2017-04-26 09:36:41 +0200121void nbd_server_start(SocketAddress *addr, const char *tls_creds,
Kevin Wolf1c8222b2020-09-24 17:26:54 +0200122 const char *tls_authz, uint32_t max_connections,
123 Error **errp)
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000124{
125 if (nbd_server) {
Paolo Bonzini6dd844d2012-08-22 16:43:07 +0200126 error_setg(errp, "NBD server already running");
127 return;
128 }
129
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000130 nbd_server = g_new0(NBDServerData, 1);
Kevin Wolf1c8222b2020-09-24 17:26:54 +0200131 nbd_server->max_connections = max_connections;
Daniel P. Berrange862172f2017-12-18 10:16:42 +0000132 nbd_server->listener = qio_net_listener_new();
133
134 qio_net_listener_set_name(nbd_server->listener,
135 "nbd-listener");
136
Juan Quintelafc8135c2019-08-19 18:08:21 +0200137 if (qio_net_listener_open_sync(nbd_server->listener, addr, 1, errp) < 0) {
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000138 goto error;
Paolo Bonzini6dd844d2012-08-22 16:43:07 +0200139 }
Daniel P. Berrangeae398272016-02-10 18:41:03 +0000140
Markus Armbrusterbd269eb2017-04-26 09:36:41 +0200141 if (tls_creds) {
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000142 nbd_server->tlscreds = nbd_get_tls_creds(tls_creds, errp);
143 if (!nbd_server->tlscreds) {
144 goto error;
145 }
146
Markus Armbrusterbd269eb2017-04-26 09:36:41 +0200147 /* TODO SOCKET_ADDRESS_TYPE_FD where fd has AF_INET or AF_INET6 */
148 if (addr->type != SOCKET_ADDRESS_TYPE_INET) {
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000149 error_setg(errp, "TLS is only supported with IPv4/IPv6");
150 goto error;
151 }
152 }
153
Daniel P. Berrange00019452019-02-27 16:20:34 +0000154 nbd_server->tlsauthz = g_strdup(tls_authz);
155
Kevin Wolf1c8222b2020-09-24 17:26:54 +0200156 nbd_update_server_watch(nbd_server);
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000157
158 return;
159
160 error:
161 nbd_server_free(nbd_server);
162 nbd_server = NULL;
Paolo Bonzini6dd844d2012-08-22 16:43:07 +0200163}
164
Kevin Wolfeed8b692020-02-24 15:29:57 +0100165void nbd_server_start_options(NbdServerOptions *arg, Error **errp)
166{
Kevin Wolf1c8222b2020-09-24 17:26:54 +0200167 nbd_server_start(arg->addr, arg->tls_creds, arg->tls_authz,
168 arg->max_connections, errp);
Kevin Wolfeed8b692020-02-24 15:29:57 +0100169}
170
Markus Armbrusterbd269eb2017-04-26 09:36:41 +0200171void qmp_nbd_server_start(SocketAddressLegacy *addr,
172 bool has_tls_creds, const char *tls_creds,
Daniel P. Berrange00019452019-02-27 16:20:34 +0000173 bool has_tls_authz, const char *tls_authz,
Kevin Wolf1c8222b2020-09-24 17:26:54 +0200174 bool has_max_connections, uint32_t max_connections,
Markus Armbrusterbd269eb2017-04-26 09:36:41 +0200175 Error **errp)
176{
177 SocketAddress *addr_flat = socket_address_flatten(addr);
178
Kevin Wolf1c8222b2020-09-24 17:26:54 +0200179 nbd_server_start(addr_flat, tls_creds, tls_authz, max_connections, errp);
Markus Armbrusterbd269eb2017-04-26 09:36:41 +0200180 qapi_free_SocketAddress(addr_flat);
181}
182
Kevin Wolfb6076af2020-09-24 17:27:01 +0200183void qmp_nbd_server_add(NbdServerAddOptions *arg, Error **errp)
Kevin Wolf56ee8622020-09-24 17:26:50 +0200184{
Kevin Wolf9b562c62020-09-24 17:26:53 +0200185 BlockExport *export;
186 BlockDriverState *bs;
187 BlockBackend *on_eject_blk;
Kevin Wolfb6076af2020-09-24 17:27:01 +0200188 BlockExportOptions *export_opts;
Kevin Wolf9b562c62020-09-24 17:26:53 +0200189
190 bs = bdrv_lookup_bs(arg->device, arg->device, errp);
191 if (!bs) {
192 return;
193 }
194
Kevin Wolfb6076af2020-09-24 17:27:01 +0200195 /*
196 * block-export-add would default to the node-name, but we may have to use
197 * the device name as a default here for compatibility.
198 */
199 if (!arg->has_name) {
Eric Blake8675cbd2020-10-27 00:05:48 -0500200 arg->has_name = true;
201 arg->name = g_strdup(arg->device);
Kevin Wolfb6076af2020-09-24 17:27:01 +0200202 }
203
204 export_opts = g_new(BlockExportOptions, 1);
205 *export_opts = (BlockExportOptions) {
206 .type = BLOCK_EXPORT_TYPE_NBD,
Kevin Wolfd53be9c2020-09-24 17:27:04 +0200207 .id = g_strdup(arg->name),
Kevin Wolfb6076af2020-09-24 17:27:01 +0200208 .node_name = g_strdup(bdrv_get_node_name(bs)),
Kevin Wolf30dbc812020-09-24 17:27:11 +0200209 .has_writable = arg->has_writable,
210 .writable = arg->writable,
Kevin Wolf56ee8622020-09-24 17:26:50 +0200211 };
Eric Blake8675cbd2020-10-27 00:05:48 -0500212 QAPI_CLONE_MEMBERS(BlockExportOptionsNbd, &export_opts->u.nbd,
213 qapi_NbdServerAddOptions_base(arg));
Kevin Wolf9b562c62020-09-24 17:26:53 +0200214
215 /*
216 * nbd-server-add doesn't complain when a read-only device should be
217 * exported as writable, but simply downgrades it. This is an error with
218 * block-export-add.
219 */
220 if (bdrv_is_read_only(bs)) {
Kevin Wolf30dbc812020-09-24 17:27:11 +0200221 export_opts->has_writable = true;
222 export_opts->writable = false;
Kevin Wolf9b562c62020-09-24 17:26:53 +0200223 }
224
Kevin Wolfb6076af2020-09-24 17:27:01 +0200225 export = blk_exp_add(export_opts, errp);
Kevin Wolf9b562c62020-09-24 17:26:53 +0200226 if (!export) {
Kevin Wolfb6076af2020-09-24 17:27:01 +0200227 goto fail;
Kevin Wolf9b562c62020-09-24 17:26:53 +0200228 }
229
230 /*
231 * nbd-server-add removes the export when the named BlockBackend used for
232 * @device goes away.
233 */
234 on_eject_blk = blk_by_name(arg->device);
235 if (on_eject_blk) {
236 nbd_export_set_on_eject_blk(export, on_eject_blk);
237 }
Kevin Wolfb6076af2020-09-24 17:27:01 +0200238
239fail:
240 qapi_free_BlockExportOptions(export_opts);
Paolo Bonzini6dd844d2012-08-22 16:43:07 +0200241}
242
Vladimir Sementsov-Ogievskiya3b0dc72018-01-19 16:57:16 +0300243void qmp_nbd_server_remove(const char *name,
Kevin Wolf3c3bc462020-09-24 17:27:06 +0200244 bool has_mode, BlockExportRemoveMode mode,
Vladimir Sementsov-Ogievskiya3b0dc72018-01-19 16:57:16 +0300245 Error **errp)
246{
Kevin Wolf3c3bc462020-09-24 17:27:06 +0200247 BlockExport *exp;
Vladimir Sementsov-Ogievskiya3b0dc72018-01-19 16:57:16 +0300248
Kevin Wolf3c3bc462020-09-24 17:27:06 +0200249 exp = blk_exp_find(name);
250 if (exp && exp->drv->type != BLOCK_EXPORT_TYPE_NBD) {
251 error_setg(errp, "Block export '%s' is not an NBD export", name);
Vladimir Sementsov-Ogievskiya3b0dc72018-01-19 16:57:16 +0300252 return;
253 }
254
Kevin Wolf3c3bc462020-09-24 17:27:06 +0200255 qmp_block_export_del(name, has_mode, mode, errp);
Vladimir Sementsov-Ogievskiya3b0dc72018-01-19 16:57:16 +0300256}
257
Paolo Bonzini6dd844d2012-08-22 16:43:07 +0200258void qmp_nbd_server_stop(Error **errp)
259{
Eric Blake7801c3a2019-01-11 13:47:14 -0600260 if (!nbd_server) {
261 error_setg(errp, "NBD server not running");
262 return;
263 }
264
Kevin Wolfbc4ee652020-09-24 17:27:03 +0200265 blk_exp_close_all_type(BLOCK_EXPORT_TYPE_NBD);
Paolo Bonzini6dd844d2012-08-22 16:43:07 +0200266
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000267 nbd_server_free(nbd_server);
268 nbd_server = NULL;
Paolo Bonzini6dd844d2012-08-22 16:43:07 +0200269}