]> git.ipfire.org Git - thirdparty/qemu.git/blame - blockdev-nbd.c
tcg: Implement gvec support for rotate by immediate
[thirdparty/qemu.git] / blockdev-nbd.c
CommitLineData
6dd844db
PB
1/*
2 * Serving QEMU block devices via NBD
3 *
4 * Copyright (c) 2012 Red Hat, Inc.
5 *
6 * Author: Paolo Bonzini <pbonzini@redhat.com>
7 *
8 * This work is licensed under the terms of the GNU GPL, version 2 or
9 * later. See the COPYING file in the top-level directory.
10 */
11
d38ea87a 12#include "qemu/osdep.h"
9c17d615 13#include "sysemu/blockdev.h"
e140177d 14#include "sysemu/block-backend.h"
0d09e41a 15#include "hw/block/block.h"
e688df6b 16#include "qapi/error.h"
9af23989 17#include "qapi/qapi-commands-block.h"
737e150e 18#include "block/nbd.h"
ae398278 19#include "io/channel-socket.h"
862172f4 20#include "io/net-listener.h"
6dd844db 21
ddffee39 22typedef struct NBDServerData {
862172f4 23 QIONetListener *listener;
ddffee39 24 QCryptoTLSCreds *tlscreds;
00019455 25 char *tlsauthz;
ddffee39
DB
26} NBDServerData;
27
28static NBDServerData *nbd_server;
29
0c9390d9
EB
30static void nbd_blockdev_client_closed(NBDClient *client, bool ignored)
31{
32 nbd_client_put(client);
33}
6dd844db 34
862172f4
DB
35static void nbd_accept(QIONetListener *listener, QIOChannelSocket *cioc,
36 gpointer opaque)
6dd844db 37{
0d73f725 38 qio_channel_set_name(QIO_CHANNEL(cioc), "nbd-server");
00019455 39 nbd_client_new(cioc, nbd_server->tlscreds, nbd_server->tlsauthz,
0c9390d9 40 nbd_blockdev_client_closed);
6dd844db
PB
41}
42
ddffee39
DB
43
44static void nbd_server_free(NBDServerData *server)
6dd844db 45{
ddffee39 46 if (!server) {
6dd844db
PB
47 return;
48 }
49
862172f4
DB
50 qio_net_listener_disconnect(server->listener);
51 object_unref(OBJECT(server->listener));
ddffee39
DB
52 if (server->tlscreds) {
53 object_unref(OBJECT(server->tlscreds));
54 }
00019455 55 g_free(server->tlsauthz);
ddffee39
DB
56
57 g_free(server);
58}
59
60static QCryptoTLSCreds *nbd_get_tls_creds(const char *id, Error **errp)
61{
62 Object *obj;
63 QCryptoTLSCreds *creds;
64
65 obj = object_resolve_path_component(
66 object_get_objects_root(), id);
67 if (!obj) {
68 error_setg(errp, "No TLS credentials with id '%s'",
69 id);
70 return NULL;
71 }
72 creds = (QCryptoTLSCreds *)
73 object_dynamic_cast(obj, TYPE_QCRYPTO_TLS_CREDS);
74 if (!creds) {
75 error_setg(errp, "Object with id '%s' is not TLS credentials",
76 id);
77 return NULL;
78 }
79
80 if (creds->endpoint != QCRYPTO_TLS_CREDS_ENDPOINT_SERVER) {
81 error_setg(errp,
82 "Expecting TLS credentials with a server endpoint");
83 return NULL;
84 }
85 object_ref(obj);
86 return creds;
87}
88
89
bd269ebc 90void nbd_server_start(SocketAddress *addr, const char *tls_creds,
00019455 91 const char *tls_authz, Error **errp)
ddffee39
DB
92{
93 if (nbd_server) {
94 error_setg(errp, "NBD server already running");
ae398278 95 return;
6dd844db 96 }
ae398278 97
ddffee39 98 nbd_server = g_new0(NBDServerData, 1);
862172f4
DB
99 nbd_server->listener = qio_net_listener_new();
100
101 qio_net_listener_set_name(nbd_server->listener,
102 "nbd-listener");
103
fc8135c6 104 if (qio_net_listener_open_sync(nbd_server->listener, addr, 1, errp) < 0) {
ddffee39
DB
105 goto error;
106 }
107
bd269ebc 108 if (tls_creds) {
ddffee39
DB
109 nbd_server->tlscreds = nbd_get_tls_creds(tls_creds, errp);
110 if (!nbd_server->tlscreds) {
111 goto error;
112 }
113
bd269ebc
MA
114 /* TODO SOCKET_ADDRESS_TYPE_FD where fd has AF_INET or AF_INET6 */
115 if (addr->type != SOCKET_ADDRESS_TYPE_INET) {
ddffee39
DB
116 error_setg(errp, "TLS is only supported with IPv4/IPv6");
117 goto error;
118 }
119 }
120
00019455
DB
121 nbd_server->tlsauthz = g_strdup(tls_authz);
122
862172f4
DB
123 qio_net_listener_set_client_func(nbd_server->listener,
124 nbd_accept,
125 NULL,
126 NULL);
ddffee39
DB
127
128 return;
129
130 error:
131 nbd_server_free(nbd_server);
132 nbd_server = NULL;
6dd844db
PB
133}
134
eed8b691
KW
135void nbd_server_start_options(NbdServerOptions *arg, Error **errp)
136{
137 nbd_server_start(arg->addr, arg->tls_creds, arg->tls_authz, errp);
138}
139
bd269ebc
MA
140void qmp_nbd_server_start(SocketAddressLegacy *addr,
141 bool has_tls_creds, const char *tls_creds,
00019455 142 bool has_tls_authz, const char *tls_authz,
bd269ebc
MA
143 Error **errp)
144{
145 SocketAddress *addr_flat = socket_address_flatten(addr);
146
00019455 147 nbd_server_start(addr_flat, tls_creds, tls_authz, errp);
bd269ebc
MA
148 qapi_free_SocketAddress(addr_flat);
149}
150
c62d24e9 151void qmp_nbd_server_add(BlockExportNbd *arg, Error **errp)
6dd844db 152{
094138d0
KW
153 BlockDriverState *bs = NULL;
154 BlockBackend *on_eject_blk;
6dd844db 155 NBDExport *exp;
7596bbb3 156 int64_t len;
61bc846d 157 AioContext *aio_context;
6dd844db 158
ddffee39 159 if (!nbd_server) {
17b6be4a
PB
160 error_setg(errp, "NBD server not running");
161 return;
162 }
163
c62d24e9
KW
164 if (!arg->has_name) {
165 arg->name = arg->device;
902a1f94
VSO
166 }
167
c62d24e9
KW
168 if (strlen(arg->name) > NBD_MAX_STRING_SIZE) {
169 error_setg(errp, "export name '%s' too long", arg->name);
93676c88
EB
170 return;
171 }
172
c62d24e9
KW
173 if (arg->description && strlen(arg->description) > NBD_MAX_STRING_SIZE) {
174 error_setg(errp, "description '%s' too long", arg->description);
deb6ccb0
EB
175 return;
176 }
177
c62d24e9
KW
178 if (nbd_export_find(arg->name)) {
179 error_setg(errp, "NBD server already has export named '%s'", arg->name);
6dd844db
PB
180 return;
181 }
182
c62d24e9 183 on_eject_blk = blk_by_name(arg->device);
094138d0 184
c62d24e9 185 bs = bdrv_lookup_bs(arg->device, arg->device, errp);
094138d0 186 if (!bs) {
60fe4fac
HB
187 return;
188 }
6dd844db 189
61bc846d
EB
190 aio_context = bdrv_get_aio_context(bs);
191 aio_context_acquire(aio_context);
7596bbb3
EB
192 len = bdrv_getlength(bs);
193 if (len < 0) {
194 error_setg_errno(errp, -len,
195 "Failed to determine the NBD export's length");
61bc846d 196 goto out;
7596bbb3
EB
197 }
198
c62d24e9
KW
199 if (!arg->has_writable) {
200 arg->writable = false;
e6444734 201 }
094138d0 202 if (bdrv_is_read_only(bs)) {
c62d24e9 203 arg->writable = false;
e6444734
PB
204 }
205
c62d24e9
KW
206 exp = nbd_export_new(bs, 0, len, arg->name, arg->description, arg->bitmap,
207 !arg->writable, !arg->writable,
094138d0 208 NULL, false, on_eject_blk, errp);
98f44bbe 209 if (!exp) {
61bc846d 210 goto out;
98f44bbe 211 }
6dd844db 212
741cc431
HR
213 /* The list of named exports has a strong reference to this export now and
214 * our only way of accessing it is through nbd_export_find(), so we can drop
215 * the strong reference that is @exp. */
216 nbd_export_put(exp);
61bc846d
EB
217
218 out:
219 aio_context_release(aio_context);
6dd844db
PB
220}
221
a3b0dc75
VSO
222void qmp_nbd_server_remove(const char *name,
223 bool has_mode, NbdServerRemoveMode mode,
224 Error **errp)
225{
226 NBDExport *exp;
61bc846d 227 AioContext *aio_context;
a3b0dc75
VSO
228
229 if (!nbd_server) {
230 error_setg(errp, "NBD server not running");
231 return;
232 }
233
234 exp = nbd_export_find(name);
235 if (exp == NULL) {
236 error_setg(errp, "Export '%s' is not found", name);
237 return;
238 }
239
240 if (!has_mode) {
241 mode = NBD_SERVER_REMOVE_MODE_SAFE;
242 }
243
61bc846d
EB
244 aio_context = nbd_export_aio_context(exp);
245 aio_context_acquire(aio_context);
a3b0dc75 246 nbd_export_remove(exp, mode, errp);
61bc846d 247 aio_context_release(aio_context);
a3b0dc75
VSO
248}
249
6dd844db
PB
250void qmp_nbd_server_stop(Error **errp)
251{
7801c3a7
EB
252 if (!nbd_server) {
253 error_setg(errp, "NBD server not running");
254 return;
255 }
256
741cc431 257 nbd_export_close_all();
6dd844db 258
ddffee39
DB
259 nbd_server_free(nbd_server);
260 nbd_server = NULL;
6dd844db 261}