blob: 24ba5382db03d6cba90efe75e9fac012721be1a9 [file] [log] [blame]
Paolo Bonzini6dd844d2012-08-22 16:43:07 +02001/*
2 * Serving QEMU block devices via NBD
3 *
4 * Copyright (c) 2012 Red Hat, Inc.
5 *
6 * Author: Paolo Bonzini <pbonzini@redhat.com>
7 *
8 * This work is licensed under the terms of the GNU GPL, version 2 or
9 * later. See the COPYING file in the top-level directory.
10 */
11
Peter Maydelld38ea872016-01-29 17:50:05 +000012#include "qemu/osdep.h"
Paolo Bonzini9c17d612012-12-17 18:20:04 +010013#include "sysemu/blockdev.h"
Max Reitze1401772014-11-18 12:21:17 +010014#include "sysemu/block-backend.h"
Paolo Bonzini0d09e412013-02-05 17:06:20 +010015#include "hw/block/block.h"
Markus Armbrustere688df62018-02-01 12:18:31 +010016#include "qapi/error.h"
Eric Blake8675cbd2020-10-27 00:05:48 -050017#include "qapi/clone-visitor.h"
18#include "qapi/qapi-visit-block-export.h"
Kevin Wolf5daa6bf2020-09-24 17:26:48 +020019#include "qapi/qapi-commands-block-export.h"
Paolo Bonzini737e1502012-12-17 18:19:44 +010020#include "block/nbd.h"
Daniel P. Berrangeae398272016-02-10 18:41:03 +000021#include "io/channel-socket.h"
Daniel P. Berrange862172f2017-12-18 10:16:42 +000022#include "io/net-listener.h"
Paolo Bonzini6dd844d2012-08-22 16:43:07 +020023
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000024typedef struct NBDServerData {
Daniel P. Berrange862172f2017-12-18 10:16:42 +000025 QIONetListener *listener;
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000026 QCryptoTLSCreds *tlscreds;
Daniel P. Berrange00019452019-02-27 16:20:34 +000027 char *tlsauthz;
Kevin Wolf1c8222b2020-09-24 17:26:54 +020028 uint32_t max_connections;
29 uint32_t connections;
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000030} NBDServerData;
31
32static NBDServerData *nbd_server;
Eric Blakea5fced42022-05-11 19:49:23 -050033static int qemu_nbd_connections = -1; /* Non-negative if this is qemu-nbd */
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000034
Kevin Wolf1c8222b2020-09-24 17:26:54 +020035static void nbd_update_server_watch(NBDServerData *s);
36
Eric Blakea5fced42022-05-11 19:49:23 -050037void nbd_server_is_qemu_nbd(int max_connections)
Kevin Wolf00917172020-09-24 17:26:57 +020038{
Eric Blakea5fced42022-05-11 19:49:23 -050039 qemu_nbd_connections = max_connections;
Kevin Wolf00917172020-09-24 17:26:57 +020040}
41
Kevin Wolf5b1cb492020-09-24 17:27:12 +020042bool nbd_server_is_running(void)
43{
Eric Blakea5fced42022-05-11 19:49:23 -050044 return nbd_server || qemu_nbd_connections >= 0;
Kevin Wolf5b1cb492020-09-24 17:27:12 +020045}
46
Eric Blake58a6fdc2022-05-11 19:49:24 -050047int nbd_server_max_connections(void)
48{
49 return nbd_server ? nbd_server->max_connections : qemu_nbd_connections;
50}
51
Eric Blake0c9390d2017-06-08 17:26:17 -050052static void nbd_blockdev_client_closed(NBDClient *client, bool ignored)
53{
54 nbd_client_put(client);
Kevin Wolf1c8222b2020-09-24 17:26:54 +020055 assert(nbd_server->connections > 0);
56 nbd_server->connections--;
57 nbd_update_server_watch(nbd_server);
Eric Blake0c9390d2017-06-08 17:26:17 -050058}
Paolo Bonzini6dd844d2012-08-22 16:43:07 +020059
Daniel P. Berrange862172f2017-12-18 10:16:42 +000060static void nbd_accept(QIONetListener *listener, QIOChannelSocket *cioc,
61 gpointer opaque)
Paolo Bonzini6dd844d2012-08-22 16:43:07 +020062{
Kevin Wolf1c8222b2020-09-24 17:26:54 +020063 nbd_server->connections++;
64 nbd_update_server_watch(nbd_server);
65
Daniel P. Berrange0d73f722016-09-30 11:57:14 +010066 qio_channel_set_name(QIO_CHANNEL(cioc), "nbd-server");
Eric Blakefb1c2aa2024-08-07 08:50:01 -050067 /* TODO - expose handshake timeout as QMP option */
68 nbd_client_new(cioc, NBD_DEFAULT_HANDSHAKE_MAX_SECS,
69 nbd_server->tlscreds, nbd_server->tlsauthz,
70 nbd_blockdev_client_closed, NULL);
Paolo Bonzini6dd844d2012-08-22 16:43:07 +020071}
72
Kevin Wolf1c8222b2020-09-24 17:26:54 +020073static void nbd_update_server_watch(NBDServerData *s)
74{
75 if (!s->max_connections || s->connections < s->max_connections) {
76 qio_net_listener_set_client_func(s->listener, nbd_accept, NULL, NULL);
77 } else {
78 qio_net_listener_set_client_func(s->listener, NULL, NULL, NULL);
79 }
80}
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000081
82static void nbd_server_free(NBDServerData *server)
Paolo Bonzini6dd844d2012-08-22 16:43:07 +020083{
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000084 if (!server) {
85 return;
86 }
87
Daniel P. Berrange862172f2017-12-18 10:16:42 +000088 qio_net_listener_disconnect(server->listener);
89 object_unref(OBJECT(server->listener));
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000090 if (server->tlscreds) {
91 object_unref(OBJECT(server->tlscreds));
92 }
Daniel P. Berrange00019452019-02-27 16:20:34 +000093 g_free(server->tlsauthz);
Daniel P. Berrangeddffee32016-02-10 18:41:14 +000094
95 g_free(server);
96}
97
98static QCryptoTLSCreds *nbd_get_tls_creds(const char *id, Error **errp)
99{
100 Object *obj;
101 QCryptoTLSCreds *creds;
102
103 obj = object_resolve_path_component(
104 object_get_objects_root(), id);
105 if (!obj) {
106 error_setg(errp, "No TLS credentials with id '%s'",
107 id);
108 return NULL;
109 }
110 creds = (QCryptoTLSCreds *)
111 object_dynamic_cast(obj, TYPE_QCRYPTO_TLS_CREDS);
112 if (!creds) {
113 error_setg(errp, "Object with id '%s' is not TLS credentials",
114 id);
115 return NULL;
116 }
117
Philippe Mathieu-Daudé7b3b6162021-06-28 18:09:09 +0200118 if (!qcrypto_tls_creds_check_endpoint(creds,
119 QCRYPTO_TLS_CREDS_ENDPOINT_SERVER,
120 errp)) {
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000121 return NULL;
122 }
123 object_ref(obj);
124 return creds;
125}
126
127
Markus Armbrusterbd269eb2017-04-26 09:36:41 +0200128void nbd_server_start(SocketAddress *addr, const char *tls_creds,
Kevin Wolf1c8222b2020-09-24 17:26:54 +0200129 const char *tls_authz, uint32_t max_connections,
130 Error **errp)
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000131{
132 if (nbd_server) {
Paolo Bonzini6dd844d2012-08-22 16:43:07 +0200133 error_setg(errp, "NBD server already running");
134 return;
135 }
136
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000137 nbd_server = g_new0(NBDServerData, 1);
Kevin Wolf1c8222b2020-09-24 17:26:54 +0200138 nbd_server->max_connections = max_connections;
Daniel P. Berrange862172f2017-12-18 10:16:42 +0000139 nbd_server->listener = qio_net_listener_new();
140
141 qio_net_listener_set_name(nbd_server->listener,
142 "nbd-listener");
143
Eric Blake582d4212021-02-09 09:27:58 -0600144 /*
145 * Because this server is persistent, a backlog of SOMAXCONN is
146 * better than trying to size it to max_connections.
147 */
148 if (qio_net_listener_open_sync(nbd_server->listener, addr, SOMAXCONN,
149 errp) < 0) {
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000150 goto error;
Paolo Bonzini6dd844d2012-08-22 16:43:07 +0200151 }
Daniel P. Berrangeae398272016-02-10 18:41:03 +0000152
Markus Armbrusterbd269eb2017-04-26 09:36:41 +0200153 if (tls_creds) {
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000154 nbd_server->tlscreds = nbd_get_tls_creds(tls_creds, errp);
155 if (!nbd_server->tlscreds) {
156 goto error;
157 }
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000158 }
159
Daniel P. Berrange00019452019-02-27 16:20:34 +0000160 nbd_server->tlsauthz = g_strdup(tls_authz);
161
Kevin Wolf1c8222b2020-09-24 17:26:54 +0200162 nbd_update_server_watch(nbd_server);
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000163
164 return;
165
166 error:
167 nbd_server_free(nbd_server);
168 nbd_server = NULL;
Paolo Bonzini6dd844d2012-08-22 16:43:07 +0200169}
170
Kevin Wolfeed8b692020-02-24 15:29:57 +0100171void nbd_server_start_options(NbdServerOptions *arg, Error **errp)
172{
Eric Blakec8a76db2024-08-06 13:53:00 -0500173 if (!arg->has_max_connections) {
174 arg->max_connections = NBD_DEFAULT_MAX_CONNECTIONS;
175 }
176
Kevin Wolf1c8222b2020-09-24 17:26:54 +0200177 nbd_server_start(arg->addr, arg->tls_creds, arg->tls_authz,
178 arg->max_connections, errp);
Kevin Wolfeed8b692020-02-24 15:29:57 +0100179}
180
Markus Armbrusterbd269eb2017-04-26 09:36:41 +0200181void qmp_nbd_server_start(SocketAddressLegacy *addr,
Markus Armbruster54fde4f2022-11-04 17:06:52 +0100182 const char *tls_creds,
183 const char *tls_authz,
Kevin Wolf1c8222b2020-09-24 17:26:54 +0200184 bool has_max_connections, uint32_t max_connections,
Markus Armbrusterbd269eb2017-04-26 09:36:41 +0200185 Error **errp)
186{
187 SocketAddress *addr_flat = socket_address_flatten(addr);
188
Eric Blakec8a76db2024-08-06 13:53:00 -0500189 if (!has_max_connections) {
190 max_connections = NBD_DEFAULT_MAX_CONNECTIONS;
191 }
192
Kevin Wolf1c8222b2020-09-24 17:26:54 +0200193 nbd_server_start(addr_flat, tls_creds, tls_authz, max_connections, errp);
Markus Armbrusterbd269eb2017-04-26 09:36:41 +0200194 qapi_free_SocketAddress(addr_flat);
195}
196
Kevin Wolfb6076af2020-09-24 17:27:01 +0200197void qmp_nbd_server_add(NbdServerAddOptions *arg, Error **errp)
Kevin Wolf56ee8622020-09-24 17:26:50 +0200198{
Kevin Wolf9b562c62020-09-24 17:26:53 +0200199 BlockExport *export;
200 BlockDriverState *bs;
201 BlockBackend *on_eject_blk;
Kevin Wolfb6076af2020-09-24 17:27:01 +0200202 BlockExportOptions *export_opts;
Kevin Wolf9b562c62020-09-24 17:26:53 +0200203
204 bs = bdrv_lookup_bs(arg->device, arg->device, errp);
205 if (!bs) {
206 return;
207 }
208
Kevin Wolfb6076af2020-09-24 17:27:01 +0200209 /*
210 * block-export-add would default to the node-name, but we may have to use
211 * the device name as a default here for compatibility.
212 */
Markus Armbruster54fde4f2022-11-04 17:06:52 +0100213 if (!arg->name) {
Eric Blake8675cbd2020-10-27 00:05:48 -0500214 arg->name = g_strdup(arg->device);
Kevin Wolfb6076af2020-09-24 17:27:01 +0200215 }
216
217 export_opts = g_new(BlockExportOptions, 1);
218 *export_opts = (BlockExportOptions) {
219 .type = BLOCK_EXPORT_TYPE_NBD,
Kevin Wolfd53be9c2020-09-24 17:27:04 +0200220 .id = g_strdup(arg->name),
Kevin Wolfb6076af2020-09-24 17:27:01 +0200221 .node_name = g_strdup(bdrv_get_node_name(bs)),
Kevin Wolf30dbc812020-09-24 17:27:11 +0200222 .has_writable = arg->has_writable,
223 .writable = arg->writable,
Kevin Wolf56ee8622020-09-24 17:26:50 +0200224 };
Eric Blakecbad81c2020-10-27 00:05:49 -0500225 QAPI_CLONE_MEMBERS(BlockExportOptionsNbdBase, &export_opts->u.nbd,
Eric Blake8675cbd2020-10-27 00:05:48 -0500226 qapi_NbdServerAddOptions_base(arg));
Markus Armbruster54fde4f2022-11-04 17:06:52 +0100227 if (arg->bitmap) {
Vladimir Sementsov-Ogievskiye5fb29d2022-03-15 00:32:25 +0300228 BlockDirtyBitmapOrStr *el = g_new(BlockDirtyBitmapOrStr, 1);
229
230 *el = (BlockDirtyBitmapOrStr) {
231 .type = QTYPE_QSTRING,
232 .u.local = g_strdup(arg->bitmap),
233 };
Eric Blakecbad81c2020-10-27 00:05:49 -0500234 export_opts->u.nbd.has_bitmaps = true;
Vladimir Sementsov-Ogievskiye5fb29d2022-03-15 00:32:25 +0300235 QAPI_LIST_PREPEND(export_opts->u.nbd.bitmaps, el);
Eric Blakecbad81c2020-10-27 00:05:49 -0500236 }
Kevin Wolf9b562c62020-09-24 17:26:53 +0200237
238 /*
239 * nbd-server-add doesn't complain when a read-only device should be
240 * exported as writable, but simply downgrades it. This is an error with
241 * block-export-add.
242 */
243 if (bdrv_is_read_only(bs)) {
Kevin Wolf30dbc812020-09-24 17:27:11 +0200244 export_opts->has_writable = true;
245 export_opts->writable = false;
Kevin Wolf9b562c62020-09-24 17:26:53 +0200246 }
247
Kevin Wolfb6076af2020-09-24 17:27:01 +0200248 export = blk_exp_add(export_opts, errp);
Kevin Wolf9b562c62020-09-24 17:26:53 +0200249 if (!export) {
Kevin Wolfb6076af2020-09-24 17:27:01 +0200250 goto fail;
Kevin Wolf9b562c62020-09-24 17:26:53 +0200251 }
252
253 /*
254 * nbd-server-add removes the export when the named BlockBackend used for
255 * @device goes away.
256 */
257 on_eject_blk = blk_by_name(arg->device);
258 if (on_eject_blk) {
259 nbd_export_set_on_eject_blk(export, on_eject_blk);
260 }
Kevin Wolfb6076af2020-09-24 17:27:01 +0200261
262fail:
263 qapi_free_BlockExportOptions(export_opts);
Paolo Bonzini6dd844d2012-08-22 16:43:07 +0200264}
265
Vladimir Sementsov-Ogievskiya3b0dc72018-01-19 16:57:16 +0300266void qmp_nbd_server_remove(const char *name,
Kevin Wolf3c3bc462020-09-24 17:27:06 +0200267 bool has_mode, BlockExportRemoveMode mode,
Vladimir Sementsov-Ogievskiya3b0dc72018-01-19 16:57:16 +0300268 Error **errp)
269{
Kevin Wolf3c3bc462020-09-24 17:27:06 +0200270 BlockExport *exp;
Vladimir Sementsov-Ogievskiya3b0dc72018-01-19 16:57:16 +0300271
Kevin Wolf3c3bc462020-09-24 17:27:06 +0200272 exp = blk_exp_find(name);
273 if (exp && exp->drv->type != BLOCK_EXPORT_TYPE_NBD) {
274 error_setg(errp, "Block export '%s' is not an NBD export", name);
Vladimir Sementsov-Ogievskiya3b0dc72018-01-19 16:57:16 +0300275 return;
276 }
277
Kevin Wolf3c3bc462020-09-24 17:27:06 +0200278 qmp_block_export_del(name, has_mode, mode, errp);
Vladimir Sementsov-Ogievskiya3b0dc72018-01-19 16:57:16 +0300279}
280
Paolo Bonzini6dd844d2012-08-22 16:43:07 +0200281void qmp_nbd_server_stop(Error **errp)
282{
Eric Blake7801c3a2019-01-11 13:47:14 -0600283 if (!nbd_server) {
284 error_setg(errp, "NBD server not running");
285 return;
286 }
287
Kevin Wolfbc4ee652020-09-24 17:27:03 +0200288 blk_exp_close_all_type(BLOCK_EXPORT_TYPE_NBD);
Paolo Bonzini6dd844d2012-08-22 16:43:07 +0200289
Daniel P. Berrangeddffee32016-02-10 18:41:14 +0000290 nbd_server_free(nbd_server);
291 nbd_server = NULL;
Paolo Bonzini6dd844d2012-08-22 16:43:07 +0200292}