2009-02-11 18:21:54 +03:00
|
|
|
/*
|
2020-03-08 12:24:32 +03:00
|
|
|
* Blockdev HMP commands
|
2009-02-11 18:21:54 +03:00
|
|
|
*
|
2020-03-08 12:24:36 +03:00
|
|
|
* Authors:
|
|
|
|
* Anthony Liguori <aliguori@us.ibm.com>
|
|
|
|
*
|
2020-03-08 12:24:33 +03:00
|
|
|
* Copyright (c) 2003-2008 Fabrice Bellard
|
|
|
|
*
|
2020-03-08 12:24:36 +03:00
|
|
|
* This work is licensed under the terms of the GNU GPL, version 2.
|
|
|
|
* See the COPYING file in the top-level directory.
|
|
|
|
* Contributions after 2012-01-13 are licensed under the terms of the
|
|
|
|
* GNU GPL, version 2 or (at your option) any later version.
|
2020-03-08 12:24:33 +03:00
|
|
|
*
|
|
|
|
* This file incorporates work covered by the following copyright and
|
|
|
|
* permission notice:
|
|
|
|
*
|
|
|
|
* Copyright (c) 2003-2008 Fabrice Bellard
|
2009-02-11 18:21:54 +03:00
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
* of this software and associated documentation files (the "Software"), to deal
|
|
|
|
* in the Software without restriction, including without limitation the rights
|
|
|
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
* copies of the Software, and to permit persons to whom the Software is
|
|
|
|
* furnished to do so, subject to the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be included in
|
|
|
|
* all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
|
|
|
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
|
|
* THE SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
2016-01-29 20:50:05 +03:00
|
|
|
#include "qemu/osdep.h"
|
2013-02-04 20:20:47 +04:00
|
|
|
#include "hw/boards.h"
|
2014-10-07 15:59:09 +04:00
|
|
|
#include "sysemu/block-backend.h"
|
2012-12-17 21:20:04 +04:00
|
|
|
#include "sysemu/blockdev.h"
|
2020-03-08 12:24:33 +03:00
|
|
|
#include "qapi/qapi-commands-block.h"
|
2020-09-24 18:26:48 +03:00
|
|
|
#include "qapi/qapi-commands-block-export.h"
|
2018-02-01 14:18:39 +03:00
|
|
|
#include "qapi/qmp/qdict.h"
|
2018-10-17 11:26:57 +03:00
|
|
|
#include "qapi/error.h"
|
2020-03-08 12:24:34 +03:00
|
|
|
#include "qapi/qmp/qerror.h"
|
2012-12-17 21:20:00 +04:00
|
|
|
#include "qemu/config-file.h"
|
2018-02-01 14:18:46 +03:00
|
|
|
#include "qemu/option.h"
|
2020-03-08 12:24:37 +03:00
|
|
|
#include "qemu/sockets.h"
|
2020-03-08 12:24:39 +03:00
|
|
|
#include "qemu/cutils.h"
|
2023-03-15 20:43:13 +03:00
|
|
|
#include "qemu/error-report.h"
|
2012-12-17 21:20:04 +04:00
|
|
|
#include "sysemu/sysemu.h"
|
2012-12-17 21:19:49 +04:00
|
|
|
#include "monitor/monitor.h"
|
2020-03-08 12:24:34 +03:00
|
|
|
#include "monitor/hmp.h"
|
2020-03-08 12:24:37 +03:00
|
|
|
#include "block/nbd.h"
|
2020-03-08 12:24:39 +03:00
|
|
|
#include "block/qapi.h"
|
2016-02-23 19:33:24 +03:00
|
|
|
#include "block/block_int.h"
|
2020-03-08 12:24:32 +03:00
|
|
|
#include "block/block-hmp-cmds.h"
|
2020-03-08 12:24:38 +03:00
|
|
|
#include "qemu-io.h"
|
2009-02-11 18:21:54 +03:00
|
|
|
|
2020-03-08 12:24:40 +03:00
|
|
|
static void hmp_drive_add_node(Monitor *mon, const char *optstr)
|
|
|
|
{
|
|
|
|
QemuOpts *opts;
|
|
|
|
QDict *qdict;
|
|
|
|
Error *local_err = NULL;
|
|
|
|
|
|
|
|
opts = qemu_opts_parse_noisily(&qemu_drive_opts, optstr, false);
|
|
|
|
if (!opts) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
qdict = qemu_opts_to_qdict(opts, NULL);
|
|
|
|
|
|
|
|
if (!qdict_get_try_str(qdict, "node-name")) {
|
|
|
|
qobject_unref(qdict);
|
|
|
|
error_report("'node-name' needs to be specified");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
BlockDriverState *bs = bds_tree_init(qdict, &local_err);
|
|
|
|
if (!bs) {
|
|
|
|
error_report_err(local_err);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
bdrv_set_monitor_owned(bs);
|
|
|
|
out:
|
|
|
|
qemu_opts_del(opts);
|
|
|
|
}
|
|
|
|
|
2020-03-08 12:24:31 +03:00
|
|
|
void hmp_drive_add(Monitor *mon, const QDict *qdict)
|
2009-02-11 18:21:54 +03:00
|
|
|
{
|
2018-10-17 11:26:57 +03:00
|
|
|
Error *err = NULL;
|
2009-07-22 18:42:57 +04:00
|
|
|
DriveInfo *dinfo;
|
2009-07-22 18:43:04 +04:00
|
|
|
QemuOpts *opts;
|
2014-03-05 21:30:47 +04:00
|
|
|
MachineClass *mc;
|
2020-03-08 12:24:31 +03:00
|
|
|
const char *optstr = qdict_get_str(qdict, "opts");
|
|
|
|
bool node = qdict_get_try_bool(qdict, "node", false);
|
|
|
|
|
|
|
|
if (node) {
|
|
|
|
hmp_drive_add_node(mon, optstr);
|
|
|
|
return;
|
|
|
|
}
|
2009-02-11 18:21:54 +03:00
|
|
|
|
2021-12-15 15:11:39 +03:00
|
|
|
opts = qemu_opts_parse_noisily(qemu_find_opts("drive"), optstr, false);
|
2009-07-22 18:43:04 +04:00
|
|
|
if (!opts)
|
2020-03-08 12:24:31 +03:00
|
|
|
return;
|
2009-02-11 18:21:54 +03:00
|
|
|
|
2014-03-05 21:30:47 +04:00
|
|
|
mc = MACHINE_GET_CLASS(current_machine);
|
2018-10-17 11:26:57 +03:00
|
|
|
dinfo = drive_new(opts, mc->block_default_type, &err);
|
2019-04-08 18:30:03 +03:00
|
|
|
if (err) {
|
2018-10-17 11:26:57 +03:00
|
|
|
error_report_err(err);
|
2009-07-22 18:43:04 +04:00
|
|
|
qemu_opts_del(opts);
|
2020-03-08 12:24:31 +03:00
|
|
|
goto err;
|
2016-02-23 19:33:24 +03:00
|
|
|
}
|
2010-08-24 01:43:10 +04:00
|
|
|
|
|
|
|
if (!dinfo) {
|
2020-03-08 12:24:31 +03:00
|
|
|
return;
|
2010-08-24 01:43:10 +04:00
|
|
|
}
|
|
|
|
|
2012-11-22 18:16:36 +04:00
|
|
|
switch (dinfo->type) {
|
2010-08-24 01:43:10 +04:00
|
|
|
case IF_NONE:
|
|
|
|
monitor_printf(mon, "OK\n");
|
|
|
|
break;
|
|
|
|
default:
|
2015-02-26 19:21:13 +03:00
|
|
|
monitor_printf(mon, "Can't hot-add drive to type %d\n", dinfo->type);
|
|
|
|
goto err;
|
2010-08-24 01:43:10 +04:00
|
|
|
}
|
|
|
|
return;
|
|
|
|
|
|
|
|
err:
|
|
|
|
if (dinfo) {
|
2016-03-16 21:54:38 +03:00
|
|
|
BlockBackend *blk = blk_by_legacy_dinfo(dinfo);
|
|
|
|
monitor_remove_blk(blk);
|
|
|
|
blk_unref(blk);
|
2010-08-24 01:43:10 +04:00
|
|
|
}
|
|
|
|
}
|
2020-03-08 12:24:33 +03:00
|
|
|
|
|
|
|
void hmp_drive_del(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
const char *id = qdict_get_str(qdict, "id");
|
|
|
|
BlockBackend *blk;
|
|
|
|
BlockDriverState *bs;
|
|
|
|
Error *local_err = NULL;
|
|
|
|
|
2023-09-29 17:51:52 +03:00
|
|
|
GLOBAL_STATE_CODE();
|
|
|
|
GRAPH_RDLOCK_GUARD_MAINLOOP();
|
|
|
|
|
2020-03-08 12:24:33 +03:00
|
|
|
bs = bdrv_find_node(id);
|
|
|
|
if (bs) {
|
|
|
|
qmp_blockdev_del(id, &local_err);
|
|
|
|
if (local_err) {
|
|
|
|
error_report_err(local_err);
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
blk = blk_by_name(id);
|
|
|
|
if (!blk) {
|
|
|
|
error_report("Device '%s' not found", id);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!blk_legacy_dinfo(blk)) {
|
|
|
|
error_report("Deleting device added with blockdev-add"
|
|
|
|
" is not supported");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
bs = blk_bs(blk);
|
|
|
|
if (bs) {
|
|
|
|
if (bdrv_op_is_blocked(bs, BLOCK_OP_TYPE_DRIVE_DEL, &local_err)) {
|
|
|
|
error_report_err(local_err);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
blk_remove_bs(blk);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Make the BlockBackend and the attached BlockDriverState anonymous */
|
|
|
|
monitor_remove_blk(blk);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If this BlockBackend has a device attached to it, its refcount will be
|
|
|
|
* decremented when the device is removed; otherwise we have to do so here.
|
|
|
|
*/
|
|
|
|
if (blk_get_attached_dev(blk)) {
|
|
|
|
/* Further I/O must not pause the guest */
|
|
|
|
blk_set_on_error(blk, BLOCKDEV_ON_ERROR_REPORT,
|
|
|
|
BLOCKDEV_ON_ERROR_REPORT);
|
|
|
|
} else {
|
|
|
|
blk_unref(blk);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_commit(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
BlockBackend *blk;
|
|
|
|
int ret;
|
|
|
|
|
2023-10-27 18:53:16 +03:00
|
|
|
GLOBAL_STATE_CODE();
|
|
|
|
GRAPH_RDLOCK_GUARD_MAINLOOP();
|
|
|
|
|
2020-03-08 12:24:33 +03:00
|
|
|
if (!strcmp(device, "all")) {
|
|
|
|
ret = blk_commit_all();
|
|
|
|
} else {
|
|
|
|
BlockDriverState *bs;
|
|
|
|
|
|
|
|
blk = blk_by_name(device);
|
|
|
|
if (!blk) {
|
|
|
|
error_report("Device '%s' not found", device);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-06-12 18:47:37 +03:00
|
|
|
bs = bdrv_skip_implicit_filters(blk_bs(blk));
|
2020-03-08 12:24:33 +03:00
|
|
|
|
2023-04-24 13:39:02 +03:00
|
|
|
if (!blk_is_available(blk)) {
|
|
|
|
error_report("Device '%s' has no medium", device);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-03-08 12:24:33 +03:00
|
|
|
ret = bdrv_commit(bs);
|
|
|
|
}
|
|
|
|
if (ret < 0) {
|
|
|
|
error_report("'commit' error for '%s': %s", device, strerror(-ret));
|
|
|
|
}
|
|
|
|
}
|
2020-03-08 12:24:34 +03:00
|
|
|
|
|
|
|
void hmp_drive_mirror(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
const char *filename = qdict_get_str(qdict, "target");
|
|
|
|
const char *format = qdict_get_try_str(qdict, "format");
|
|
|
|
bool reuse = qdict_get_try_bool(qdict, "reuse", false);
|
|
|
|
bool full = qdict_get_try_bool(qdict, "full", false);
|
|
|
|
Error *err = NULL;
|
|
|
|
DriveMirror mirror = {
|
|
|
|
.device = (char *)qdict_get_str(qdict, "device"),
|
|
|
|
.target = (char *)filename,
|
|
|
|
.format = (char *)format,
|
|
|
|
.sync = full ? MIRROR_SYNC_MODE_FULL : MIRROR_SYNC_MODE_TOP,
|
|
|
|
.has_mode = true,
|
|
|
|
.mode = reuse ? NEW_IMAGE_MODE_EXISTING : NEW_IMAGE_MODE_ABSOLUTE_PATHS,
|
|
|
|
.unmap = true,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (!filename) {
|
|
|
|
error_setg(&err, QERR_MISSING_PARAMETER, "target");
|
2021-08-02 09:25:07 +03:00
|
|
|
goto end;
|
2020-03-08 12:24:34 +03:00
|
|
|
}
|
|
|
|
qmp_drive_mirror(&mirror, &err);
|
2021-08-02 09:25:07 +03:00
|
|
|
end:
|
2020-03-08 12:24:34 +03:00
|
|
|
hmp_handle_error(mon, err);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_drive_backup(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
const char *filename = qdict_get_str(qdict, "target");
|
|
|
|
const char *format = qdict_get_try_str(qdict, "format");
|
|
|
|
bool reuse = qdict_get_try_bool(qdict, "reuse", false);
|
|
|
|
bool full = qdict_get_try_bool(qdict, "full", false);
|
|
|
|
bool compress = qdict_get_try_bool(qdict, "compress", false);
|
|
|
|
Error *err = NULL;
|
|
|
|
DriveBackup backup = {
|
|
|
|
.device = (char *)device,
|
|
|
|
.target = (char *)filename,
|
|
|
|
.format = (char *)format,
|
|
|
|
.sync = full ? MIRROR_SYNC_MODE_FULL : MIRROR_SYNC_MODE_TOP,
|
|
|
|
.has_mode = true,
|
|
|
|
.mode = reuse ? NEW_IMAGE_MODE_EXISTING : NEW_IMAGE_MODE_ABSOLUTE_PATHS,
|
|
|
|
.has_compress = !!compress,
|
|
|
|
.compress = compress,
|
|
|
|
};
|
|
|
|
|
|
|
|
if (!filename) {
|
|
|
|
error_setg(&err, QERR_MISSING_PARAMETER, "target");
|
2021-08-02 09:25:07 +03:00
|
|
|
goto end;
|
2020-03-08 12:24:34 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
qmp_drive_backup(&backup, &err);
|
2021-08-02 09:25:07 +03:00
|
|
|
end:
|
2020-03-08 12:24:34 +03:00
|
|
|
hmp_handle_error(mon, err);
|
|
|
|
}
|
2020-03-08 12:24:35 +03:00
|
|
|
|
|
|
|
void hmp_block_job_set_speed(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
Error *error = NULL;
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
int64_t value = qdict_get_int(qdict, "speed");
|
|
|
|
|
|
|
|
qmp_block_job_set_speed(device, value, &error);
|
|
|
|
|
|
|
|
hmp_handle_error(mon, error);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_block_job_cancel(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
Error *error = NULL;
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
bool force = qdict_get_try_bool(qdict, "force", false);
|
|
|
|
|
|
|
|
qmp_block_job_cancel(device, true, force, &error);
|
|
|
|
|
|
|
|
hmp_handle_error(mon, error);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_block_job_pause(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
Error *error = NULL;
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
|
|
|
|
qmp_block_job_pause(device, &error);
|
|
|
|
|
|
|
|
hmp_handle_error(mon, error);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_block_job_resume(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
Error *error = NULL;
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
|
|
|
|
qmp_block_job_resume(device, &error);
|
|
|
|
|
|
|
|
hmp_handle_error(mon, error);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_block_job_complete(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
Error *error = NULL;
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
|
|
|
|
qmp_block_job_complete(device, &error);
|
|
|
|
|
|
|
|
hmp_handle_error(mon, error);
|
|
|
|
}
|
2020-03-08 12:24:36 +03:00
|
|
|
|
|
|
|
void hmp_snapshot_blkdev(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
const char *filename = qdict_get_try_str(qdict, "snapshot-file");
|
|
|
|
const char *format = qdict_get_try_str(qdict, "format");
|
|
|
|
bool reuse = qdict_get_try_bool(qdict, "reuse", false);
|
|
|
|
enum NewImageMode mode;
|
|
|
|
Error *err = NULL;
|
|
|
|
|
|
|
|
if (!filename) {
|
|
|
|
/*
|
|
|
|
* In the future, if 'snapshot-file' is not specified, the snapshot
|
|
|
|
* will be taken internally. Today it's actually required.
|
|
|
|
*/
|
|
|
|
error_setg(&err, QERR_MISSING_PARAMETER, "snapshot-file");
|
2021-08-02 09:25:07 +03:00
|
|
|
goto end;
|
2020-03-08 12:24:36 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
mode = reuse ? NEW_IMAGE_MODE_EXISTING : NEW_IMAGE_MODE_ABSOLUTE_PATHS;
|
2022-11-04 19:06:52 +03:00
|
|
|
qmp_blockdev_snapshot_sync(device, NULL, filename, NULL, format,
|
2020-03-08 12:24:36 +03:00
|
|
|
true, mode, &err);
|
2021-08-02 09:25:07 +03:00
|
|
|
end:
|
2020-03-08 12:24:36 +03:00
|
|
|
hmp_handle_error(mon, err);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_snapshot_blkdev_internal(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
const char *name = qdict_get_str(qdict, "name");
|
|
|
|
Error *err = NULL;
|
|
|
|
|
|
|
|
qmp_blockdev_snapshot_internal_sync(device, name, &err);
|
|
|
|
hmp_handle_error(mon, err);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_snapshot_delete_blkdev_internal(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
const char *name = qdict_get_str(qdict, "name");
|
|
|
|
const char *id = qdict_get_try_str(qdict, "id");
|
|
|
|
Error *err = NULL;
|
|
|
|
|
2022-11-04 19:06:52 +03:00
|
|
|
qmp_blockdev_snapshot_delete_internal_sync(device, id, name, &err);
|
2020-03-08 12:24:36 +03:00
|
|
|
hmp_handle_error(mon, err);
|
|
|
|
}
|
2020-03-08 12:24:37 +03:00
|
|
|
|
|
|
|
void hmp_nbd_server_start(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
const char *uri = qdict_get_str(qdict, "uri");
|
|
|
|
bool writable = qdict_get_try_bool(qdict, "writable", false);
|
|
|
|
bool all = qdict_get_try_bool(qdict, "all", false);
|
|
|
|
Error *local_err = NULL;
|
|
|
|
BlockInfoList *block_list, *info;
|
|
|
|
SocketAddress *addr;
|
2020-09-24 18:27:01 +03:00
|
|
|
NbdServerAddOptions export;
|
2020-03-08 12:24:37 +03:00
|
|
|
|
|
|
|
if (writable && !all) {
|
|
|
|
error_setg(&local_err, "-w only valid together with -a");
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* First check if the address is valid and start the server. */
|
|
|
|
addr = socket_parse(uri, &local_err);
|
|
|
|
if (local_err != NULL) {
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
nbd/server: CVE-2024-7409: Cap default max-connections to 100
Allowing an unlimited number of clients to any web service is a recipe
for a rudimentary denial of service attack: the client merely needs to
open lots of sockets without closing them, until qemu no longer has
any more fds available to allocate.
For qemu-nbd, we default to allowing only 1 connection unless more are
explicitly asked for (-e or --shared); this was historically picked as
a nice default (without an explicit -t, a non-persistent qemu-nbd goes
away after a client disconnects, without needing any additional
follow-up commands), and we are not going to change that interface now
(besides, someday we want to point people towards qemu-storage-daemon
instead of qemu-nbd).
But for qemu proper, and the newer qemu-storage-daemon, the QMP
nbd-server-start command has historically had a default of unlimited
number of connections, in part because unlike qemu-nbd it is
inherently persistent until nbd-server-stop. Allowing multiple client
sockets is particularly useful for clients that can take advantage of
MULTI_CONN (creating parallel sockets to increase throughput),
although known clients that do so (such as libnbd's nbdcopy) typically
use only 8 or 16 connections (the benefits of scaling diminish once
more sockets are competing for kernel attention). Picking a number
large enough for typical use cases, but not unlimited, makes it
slightly harder for a malicious client to perform a denial of service
merely by opening lots of connections withot progressing through the
handshake.
This change does not eliminate CVE-2024-7409 on its own, but reduces
the chance for fd exhaustion or unlimited memory usage as an attack
surface. On the other hand, by itself, it makes it more obvious that
with a finite limit, we have the problem of an unauthenticated client
holding 100 fds opened as a way to block out a legitimate client from
being able to connect; thus, later patches will further add timeouts
to reject clients that are not making progress.
This is an INTENTIONAL change in behavior, and will break any client
of nbd-server-start that was not passing an explicit max-connections
parameter, yet expects more than 100 simultaneous connections. We are
not aware of any such client (as stated above, most clients aware of
MULTI_CONN get by just fine on 8 or 16 connections, and probably cope
with later connections failing by relying on the earlier connections;
libvirt has not yet been passing max-connections, but generally
creates NBD servers with the intent for a single client for the sake
of live storage migration; meanwhile, the KubeSAN project anticipates
a large cluster sharing multiple clients [up to 8 per node, and up to
100 nodes in a cluster], but it currently uses qemu-nbd with an
explicit --shared=0 rather than qemu-storage-daemon with
nbd-server-start).
We considered using a deprecation period (declare that omitting
max-parameters is deprecated, and make it mandatory in 3 releases -
then we don't need to pick an arbitrary default); that has zero risk
of breaking any apps that accidentally depended on more than 100
connections, and where such breakage might not be noticed under unit
testing but only under the larger loads of production usage. But it
does not close the denial-of-service hole until far into the future,
and requires all apps to change to add the parameter even if 100 was
good enough. It also has a drawback that any app (like libvirt) that
is accidentally relying on an unlimited default should seriously
consider their own CVE now, at which point they are going to change to
pass explicit max-connections sooner than waiting for 3 qemu releases.
Finally, if our changed default breaks an app, that app can always
pass in an explicit max-parameters with a larger value.
It is also intentional that the HMP interface to nbd-server-start is
not changed to expose max-connections (any client needing to fine-tune
things should be using QMP).
Suggested-by: Daniel P. Berrangé <berrange@redhat.com>
Signed-off-by: Eric Blake <eblake@redhat.com>
Message-ID: <20240807174943.771624-12-eblake@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
[ericb: Expand commit message to summarize Dan's argument for why we
break corner-case back-compat behavior without a deprecation period]
Signed-off-by: Eric Blake <eblake@redhat.com>
2024-08-06 21:53:00 +03:00
|
|
|
nbd_server_start(addr, NULL, NULL, NBD_DEFAULT_MAX_CONNECTIONS,
|
|
|
|
&local_err);
|
2020-03-08 12:24:37 +03:00
|
|
|
qapi_free_SocketAddress(addr);
|
|
|
|
if (local_err != NULL) {
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!all) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Then try adding all block devices. If one fails, close all and
|
|
|
|
* exit.
|
|
|
|
*/
|
|
|
|
block_list = qmp_query_block(NULL);
|
|
|
|
|
|
|
|
for (info = block_list; info; info = info->next) {
|
2022-11-04 19:06:52 +03:00
|
|
|
if (!info->value->inserted) {
|
2020-03-08 12:24:37 +03:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2020-09-24 18:27:01 +03:00
|
|
|
export = (NbdServerAddOptions) {
|
2020-03-08 12:24:37 +03:00
|
|
|
.device = info->value->device,
|
|
|
|
.has_writable = true,
|
|
|
|
.writable = writable,
|
|
|
|
};
|
|
|
|
|
|
|
|
qmp_nbd_server_add(&export, &local_err);
|
|
|
|
|
|
|
|
if (local_err != NULL) {
|
|
|
|
qmp_nbd_server_stop(NULL);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
qapi_free_BlockInfoList(block_list);
|
|
|
|
|
|
|
|
exit:
|
|
|
|
hmp_handle_error(mon, local_err);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_nbd_server_add(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
const char *name = qdict_get_try_str(qdict, "name");
|
|
|
|
bool writable = qdict_get_try_bool(qdict, "writable", false);
|
|
|
|
Error *local_err = NULL;
|
|
|
|
|
2020-09-24 18:27:01 +03:00
|
|
|
NbdServerAddOptions export = {
|
2020-03-08 12:24:37 +03:00
|
|
|
.device = (char *) device,
|
|
|
|
.name = (char *) name,
|
|
|
|
.has_writable = true,
|
|
|
|
.writable = writable,
|
|
|
|
};
|
|
|
|
|
|
|
|
qmp_nbd_server_add(&export, &local_err);
|
|
|
|
hmp_handle_error(mon, local_err);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_nbd_server_remove(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
const char *name = qdict_get_str(qdict, "name");
|
|
|
|
bool force = qdict_get_try_bool(qdict, "force", false);
|
|
|
|
Error *err = NULL;
|
|
|
|
|
2020-09-24 18:27:06 +03:00
|
|
|
/* Rely on BLOCK_EXPORT_REMOVE_MODE_SAFE being the default */
|
|
|
|
qmp_nbd_server_remove(name, force, BLOCK_EXPORT_REMOVE_MODE_HARD, &err);
|
2020-03-08 12:24:37 +03:00
|
|
|
hmp_handle_error(mon, err);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_nbd_server_stop(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
Error *err = NULL;
|
|
|
|
|
|
|
|
qmp_nbd_server_stop(&err);
|
|
|
|
hmp_handle_error(mon, err);
|
|
|
|
}
|
2020-03-08 12:24:38 +03:00
|
|
|
|
2022-10-13 15:36:50 +03:00
|
|
|
void coroutine_fn hmp_block_resize(Monitor *mon, const QDict *qdict)
|
2020-03-08 12:24:38 +03:00
|
|
|
{
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
int64_t size = qdict_get_int(qdict, "size");
|
|
|
|
Error *err = NULL;
|
|
|
|
|
2022-11-04 19:06:52 +03:00
|
|
|
qmp_block_resize(device, NULL, size, &err);
|
2020-03-08 12:24:38 +03:00
|
|
|
hmp_handle_error(mon, err);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_block_stream(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
Error *error = NULL;
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
const char *base = qdict_get_try_str(qdict, "base");
|
|
|
|
int64_t speed = qdict_get_try_int(qdict, "speed", 0);
|
|
|
|
|
2023-12-05 20:14:42 +03:00
|
|
|
qmp_block_stream(device, device, base, NULL, NULL, false, false, NULL,
|
2022-11-04 19:06:52 +03:00
|
|
|
qdict_haskey(qdict, "speed"), speed,
|
|
|
|
true, BLOCKDEV_ON_ERROR_REPORT, NULL,
|
|
|
|
false, false, false, false, &error);
|
2020-03-08 12:24:38 +03:00
|
|
|
|
|
|
|
hmp_handle_error(mon, error);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_block_set_io_throttle(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
Error *err = NULL;
|
|
|
|
char *device = (char *) qdict_get_str(qdict, "device");
|
|
|
|
BlockIOThrottle throttle = {
|
|
|
|
.bps = qdict_get_int(qdict, "bps"),
|
|
|
|
.bps_rd = qdict_get_int(qdict, "bps_rd"),
|
|
|
|
.bps_wr = qdict_get_int(qdict, "bps_wr"),
|
|
|
|
.iops = qdict_get_int(qdict, "iops"),
|
|
|
|
.iops_rd = qdict_get_int(qdict, "iops_rd"),
|
|
|
|
.iops_wr = qdict_get_int(qdict, "iops_wr"),
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* qmp_block_set_io_throttle has separate parameters for the
|
|
|
|
* (deprecated) block device name and the qdev ID but the HMP
|
|
|
|
* version has only one, so we must decide which one to pass.
|
|
|
|
*/
|
|
|
|
if (blk_by_name(device)) {
|
|
|
|
throttle.device = device;
|
|
|
|
} else {
|
|
|
|
throttle.id = device;
|
|
|
|
}
|
|
|
|
|
|
|
|
qmp_block_set_io_throttle(&throttle, &err);
|
|
|
|
hmp_handle_error(mon, err);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_eject(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
bool force = qdict_get_try_bool(qdict, "force", false);
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
Error *err = NULL;
|
|
|
|
|
2022-11-04 19:06:52 +03:00
|
|
|
qmp_eject(device, NULL, true, force, &err);
|
2020-03-08 12:24:38 +03:00
|
|
|
hmp_handle_error(mon, err);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_qemu_io(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
monitor: hmp_qemu_io: acquire aio contex, fix crash
Max reported the following bug:
$ ./qemu-img create -f raw src.img 1G
$ ./qemu-img create -f raw dst.img 1G
$ (echo '
{"execute":"qmp_capabilities"}
{"execute":"blockdev-mirror",
"arguments":{"job-id":"mirror",
"device":"source",
"target":"target",
"sync":"full",
"filter-node-name":"mirror-top"}}
'; sleep 3; echo '
{"execute":"human-monitor-command",
"arguments":{"command-line":
"qemu-io mirror-top \"write 0 1G\""}}') \
| x86_64-softmmu/qemu-system-x86_64 \
-qmp stdio \
-blockdev file,node-name=source,filename=src.img \
-blockdev file,node-name=target,filename=dst.img \
-object iothread,id=iothr0 \
-device virtio-blk,drive=source,iothread=iothr0
crashes:
0 raise () at /usr/lib/libc.so.6
1 abort () at /usr/lib/libc.so.6
2 error_exit
(err=<optimized out>,
msg=msg@entry=0x55fbb1634790 <__func__.27> "qemu_mutex_unlock_impl")
at ../util/qemu-thread-posix.c:37
3 qemu_mutex_unlock_impl
(mutex=mutex@entry=0x55fbb25ab6e0,
file=file@entry=0x55fbb1636957 "../util/async.c",
line=line@entry=650)
at ../util/qemu-thread-posix.c:109
4 aio_context_release (ctx=ctx@entry=0x55fbb25ab680) at ../util/async.c:650
5 bdrv_do_drained_begin
(bs=bs@entry=0x55fbb3a87000, recursive=recursive@entry=false,
parent=parent@entry=0x0,
ignore_bds_parents=ignore_bds_parents@entry=false,
poll=poll@entry=true) at ../block/io.c:441
6 bdrv_do_drained_begin
(poll=true, ignore_bds_parents=false, parent=0x0, recursive=false,
bs=0x55fbb3a87000) at ../block/io.c:448
7 blk_drain (blk=0x55fbb26c5a00) at ../block/block-backend.c:1718
8 blk_unref (blk=0x55fbb26c5a00) at ../block/block-backend.c:498
9 blk_unref (blk=0x55fbb26c5a00) at ../block/block-backend.c:491
10 hmp_qemu_io (mon=0x7fffaf3fc7d0, qdict=<optimized out>)
at ../block/monitor/block-hmp-cmds.c:628
man pthread_mutex_unlock
...
EPERM The mutex type is PTHREAD_MUTEX_ERRORCHECK or
PTHREAD_MUTEX_RECURSIVE, or the mutex is a robust mutex, and the
current thread does not own the mutex.
So, thread doesn't own the mutex. And we have iothread here.
Next, note that AIO_WAIT_WHILE() documents that ctx must be acquired
exactly once by caller. But where is it acquired in the call stack?
Seems nowhere.
qemuio_command do acquire aio context.. But we need context acquired
around blk_unref() as well and actually around blk_insert_bs() too.
Let's refactor qemuio_command so that it doesn't acquire aio context
but callers do that instead. This way we can cleanly acquire aio
context in hmp_qemu_io() around all three calls.
Reported-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
Message-Id: <20210423134233.51495-1-vsementsov@virtuozzo.com>
[mreitz: Fixed comment]
Signed-off-by: Max Reitz <mreitz@redhat.com>
2021-04-23 16:42:33 +03:00
|
|
|
BlockBackend *blk = NULL;
|
|
|
|
BlockDriverState *bs = NULL;
|
2020-03-08 12:24:38 +03:00
|
|
|
BlockBackend *local_blk = NULL;
|
|
|
|
bool qdev = qdict_get_try_bool(qdict, "qdev", false);
|
|
|
|
const char *device = qdict_get_str(qdict, "device");
|
|
|
|
const char *command = qdict_get_str(qdict, "command");
|
|
|
|
Error *err = NULL;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (qdev) {
|
|
|
|
blk = blk_by_qdev_id(device, &err);
|
|
|
|
if (!blk) {
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
blk = blk_by_name(device);
|
|
|
|
if (!blk) {
|
monitor: hmp_qemu_io: acquire aio contex, fix crash
Max reported the following bug:
$ ./qemu-img create -f raw src.img 1G
$ ./qemu-img create -f raw dst.img 1G
$ (echo '
{"execute":"qmp_capabilities"}
{"execute":"blockdev-mirror",
"arguments":{"job-id":"mirror",
"device":"source",
"target":"target",
"sync":"full",
"filter-node-name":"mirror-top"}}
'; sleep 3; echo '
{"execute":"human-monitor-command",
"arguments":{"command-line":
"qemu-io mirror-top \"write 0 1G\""}}') \
| x86_64-softmmu/qemu-system-x86_64 \
-qmp stdio \
-blockdev file,node-name=source,filename=src.img \
-blockdev file,node-name=target,filename=dst.img \
-object iothread,id=iothr0 \
-device virtio-blk,drive=source,iothread=iothr0
crashes:
0 raise () at /usr/lib/libc.so.6
1 abort () at /usr/lib/libc.so.6
2 error_exit
(err=<optimized out>,
msg=msg@entry=0x55fbb1634790 <__func__.27> "qemu_mutex_unlock_impl")
at ../util/qemu-thread-posix.c:37
3 qemu_mutex_unlock_impl
(mutex=mutex@entry=0x55fbb25ab6e0,
file=file@entry=0x55fbb1636957 "../util/async.c",
line=line@entry=650)
at ../util/qemu-thread-posix.c:109
4 aio_context_release (ctx=ctx@entry=0x55fbb25ab680) at ../util/async.c:650
5 bdrv_do_drained_begin
(bs=bs@entry=0x55fbb3a87000, recursive=recursive@entry=false,
parent=parent@entry=0x0,
ignore_bds_parents=ignore_bds_parents@entry=false,
poll=poll@entry=true) at ../block/io.c:441
6 bdrv_do_drained_begin
(poll=true, ignore_bds_parents=false, parent=0x0, recursive=false,
bs=0x55fbb3a87000) at ../block/io.c:448
7 blk_drain (blk=0x55fbb26c5a00) at ../block/block-backend.c:1718
8 blk_unref (blk=0x55fbb26c5a00) at ../block/block-backend.c:498
9 blk_unref (blk=0x55fbb26c5a00) at ../block/block-backend.c:491
10 hmp_qemu_io (mon=0x7fffaf3fc7d0, qdict=<optimized out>)
at ../block/monitor/block-hmp-cmds.c:628
man pthread_mutex_unlock
...
EPERM The mutex type is PTHREAD_MUTEX_ERRORCHECK or
PTHREAD_MUTEX_RECURSIVE, or the mutex is a robust mutex, and the
current thread does not own the mutex.
So, thread doesn't own the mutex. And we have iothread here.
Next, note that AIO_WAIT_WHILE() documents that ctx must be acquired
exactly once by caller. But where is it acquired in the call stack?
Seems nowhere.
qemuio_command do acquire aio context.. But we need context acquired
around blk_unref() as well and actually around blk_insert_bs() too.
Let's refactor qemuio_command so that it doesn't acquire aio context
but callers do that instead. This way we can cleanly acquire aio
context in hmp_qemu_io() around all three calls.
Reported-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
Message-Id: <20210423134233.51495-1-vsementsov@virtuozzo.com>
[mreitz: Fixed comment]
Signed-off-by: Max Reitz <mreitz@redhat.com>
2021-04-23 16:42:33 +03:00
|
|
|
bs = bdrv_lookup_bs(NULL, device, &err);
|
|
|
|
if (!bs) {
|
2020-03-08 12:24:38 +03:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
monitor: hmp_qemu_io: acquire aio contex, fix crash
Max reported the following bug:
$ ./qemu-img create -f raw src.img 1G
$ ./qemu-img create -f raw dst.img 1G
$ (echo '
{"execute":"qmp_capabilities"}
{"execute":"blockdev-mirror",
"arguments":{"job-id":"mirror",
"device":"source",
"target":"target",
"sync":"full",
"filter-node-name":"mirror-top"}}
'; sleep 3; echo '
{"execute":"human-monitor-command",
"arguments":{"command-line":
"qemu-io mirror-top \"write 0 1G\""}}') \
| x86_64-softmmu/qemu-system-x86_64 \
-qmp stdio \
-blockdev file,node-name=source,filename=src.img \
-blockdev file,node-name=target,filename=dst.img \
-object iothread,id=iothr0 \
-device virtio-blk,drive=source,iothread=iothr0
crashes:
0 raise () at /usr/lib/libc.so.6
1 abort () at /usr/lib/libc.so.6
2 error_exit
(err=<optimized out>,
msg=msg@entry=0x55fbb1634790 <__func__.27> "qemu_mutex_unlock_impl")
at ../util/qemu-thread-posix.c:37
3 qemu_mutex_unlock_impl
(mutex=mutex@entry=0x55fbb25ab6e0,
file=file@entry=0x55fbb1636957 "../util/async.c",
line=line@entry=650)
at ../util/qemu-thread-posix.c:109
4 aio_context_release (ctx=ctx@entry=0x55fbb25ab680) at ../util/async.c:650
5 bdrv_do_drained_begin
(bs=bs@entry=0x55fbb3a87000, recursive=recursive@entry=false,
parent=parent@entry=0x0,
ignore_bds_parents=ignore_bds_parents@entry=false,
poll=poll@entry=true) at ../block/io.c:441
6 bdrv_do_drained_begin
(poll=true, ignore_bds_parents=false, parent=0x0, recursive=false,
bs=0x55fbb3a87000) at ../block/io.c:448
7 blk_drain (blk=0x55fbb26c5a00) at ../block/block-backend.c:1718
8 blk_unref (blk=0x55fbb26c5a00) at ../block/block-backend.c:498
9 blk_unref (blk=0x55fbb26c5a00) at ../block/block-backend.c:491
10 hmp_qemu_io (mon=0x7fffaf3fc7d0, qdict=<optimized out>)
at ../block/monitor/block-hmp-cmds.c:628
man pthread_mutex_unlock
...
EPERM The mutex type is PTHREAD_MUTEX_ERRORCHECK or
PTHREAD_MUTEX_RECURSIVE, or the mutex is a robust mutex, and the
current thread does not own the mutex.
So, thread doesn't own the mutex. And we have iothread here.
Next, note that AIO_WAIT_WHILE() documents that ctx must be acquired
exactly once by caller. But where is it acquired in the call stack?
Seems nowhere.
qemuio_command do acquire aio context.. But we need context acquired
around blk_unref() as well and actually around blk_insert_bs() too.
Let's refactor qemuio_command so that it doesn't acquire aio context
but callers do that instead. This way we can cleanly acquire aio
context in hmp_qemu_io() around all three calls.
Reported-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
Message-Id: <20210423134233.51495-1-vsementsov@virtuozzo.com>
[mreitz: Fixed comment]
Signed-off-by: Max Reitz <mreitz@redhat.com>
2021-04-23 16:42:33 +03:00
|
|
|
if (bs) {
|
|
|
|
blk = local_blk = blk_new(bdrv_get_aio_context(bs), 0, BLK_PERM_ALL);
|
|
|
|
ret = blk_insert_bs(blk, bs, &err);
|
|
|
|
if (ret < 0) {
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-08 12:24:38 +03:00
|
|
|
/*
|
|
|
|
* Notably absent: Proper permission management. This is sad, but it seems
|
|
|
|
* almost impossible to achieve without changing the semantics and thereby
|
|
|
|
* limiting the use cases of the qemu-io HMP command.
|
|
|
|
*
|
|
|
|
* In an ideal world we would unconditionally create a new BlockBackend for
|
|
|
|
* qemuio_command(), but we have commands like 'reopen' and want them to
|
|
|
|
* take effect on the exact BlockBackend whose name the user passed instead
|
|
|
|
* of just on a temporary copy of it.
|
|
|
|
*
|
|
|
|
* Another problem is that deleting the temporary BlockBackend involves
|
|
|
|
* draining all requests on it first, but some qemu-iotests cases want to
|
|
|
|
* issue multiple aio_read/write requests and expect them to complete in
|
|
|
|
* the background while the monitor has already returned.
|
|
|
|
*
|
|
|
|
* This is also what prevents us from saving the original permissions and
|
|
|
|
* restoring them later: We can't revoke permissions until all requests
|
|
|
|
* have completed, and we don't know when that is nor can we really let
|
|
|
|
* anything else run before we have revoken them to avoid race conditions.
|
|
|
|
*
|
|
|
|
* What happens now is that command() in qemu-io-cmds.c can extend the
|
|
|
|
* permissions if necessary for the qemu-io command. And they simply stay
|
|
|
|
* extended, possibly resulting in a read-only guest device keeping write
|
|
|
|
* permissions. Ugly, but it appears to be the lesser evil.
|
|
|
|
*/
|
|
|
|
qemuio_command(blk, command);
|
|
|
|
|
|
|
|
fail:
|
|
|
|
blk_unref(local_blk);
|
|
|
|
hmp_handle_error(mon, err);
|
|
|
|
}
|
2020-03-08 12:24:39 +03:00
|
|
|
|
|
|
|
static void print_block_info(Monitor *mon, BlockInfo *info,
|
|
|
|
BlockDeviceInfo *inserted, bool verbose)
|
|
|
|
{
|
|
|
|
ImageInfo *image_info;
|
|
|
|
|
2022-11-04 19:06:52 +03:00
|
|
|
assert(!info || !info->inserted || info->inserted == inserted);
|
2020-03-08 12:24:39 +03:00
|
|
|
|
|
|
|
if (info && *info->device) {
|
2022-09-29 14:42:12 +03:00
|
|
|
monitor_puts(mon, info->device);
|
2022-11-04 19:06:52 +03:00
|
|
|
if (inserted && inserted->node_name) {
|
2020-03-08 12:24:39 +03:00
|
|
|
monitor_printf(mon, " (%s)", inserted->node_name);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
assert(info || inserted);
|
2022-09-29 14:42:12 +03:00
|
|
|
monitor_puts(mon,
|
2022-11-04 19:06:52 +03:00
|
|
|
inserted && inserted->node_name ? inserted->node_name
|
|
|
|
: info && info->qdev ? info->qdev
|
2022-09-29 14:42:12 +03:00
|
|
|
: "<anonymous>");
|
2020-03-08 12:24:39 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (inserted) {
|
|
|
|
monitor_printf(mon, ": %s (%s%s%s)\n",
|
|
|
|
inserted->file,
|
|
|
|
inserted->drv,
|
|
|
|
inserted->ro ? ", read-only" : "",
|
|
|
|
inserted->encrypted ? ", encrypted" : "");
|
|
|
|
} else {
|
|
|
|
monitor_printf(mon, ": [not inserted]\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (info) {
|
2022-11-04 19:06:52 +03:00
|
|
|
if (info->qdev) {
|
2020-03-08 12:24:39 +03:00
|
|
|
monitor_printf(mon, " Attached to: %s\n", info->qdev);
|
|
|
|
}
|
|
|
|
if (info->has_io_status && info->io_status != BLOCK_DEVICE_IO_STATUS_OK) {
|
|
|
|
monitor_printf(mon, " I/O status: %s\n",
|
|
|
|
BlockDeviceIoStatus_str(info->io_status));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (info->removable) {
|
|
|
|
monitor_printf(mon, " Removable device: %slocked, tray %s\n",
|
|
|
|
info->locked ? "" : "not ",
|
|
|
|
info->tray_open ? "open" : "closed");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if (!inserted) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
monitor_printf(mon, " Cache mode: %s%s%s\n",
|
|
|
|
inserted->cache->writeback ? "writeback" : "writethrough",
|
|
|
|
inserted->cache->direct ? ", direct" : "",
|
|
|
|
inserted->cache->no_flush ? ", ignore flushes" : "");
|
|
|
|
|
2022-11-04 19:06:52 +03:00
|
|
|
if (inserted->backing_file) {
|
2020-03-08 12:24:39 +03:00
|
|
|
monitor_printf(mon,
|
|
|
|
" Backing file: %s "
|
|
|
|
"(chain depth: %" PRId64 ")\n",
|
|
|
|
inserted->backing_file,
|
|
|
|
inserted->backing_file_depth);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (inserted->detect_zeroes != BLOCKDEV_DETECT_ZEROES_OPTIONS_OFF) {
|
|
|
|
monitor_printf(mon, " Detect zeroes: %s\n",
|
|
|
|
BlockdevDetectZeroesOptions_str(inserted->detect_zeroes));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (inserted->bps || inserted->bps_rd || inserted->bps_wr ||
|
|
|
|
inserted->iops || inserted->iops_rd || inserted->iops_wr)
|
|
|
|
{
|
|
|
|
monitor_printf(mon, " I/O throttling: bps=%" PRId64
|
|
|
|
" bps_rd=%" PRId64 " bps_wr=%" PRId64
|
|
|
|
" bps_max=%" PRId64
|
|
|
|
" bps_rd_max=%" PRId64
|
|
|
|
" bps_wr_max=%" PRId64
|
|
|
|
" iops=%" PRId64 " iops_rd=%" PRId64
|
|
|
|
" iops_wr=%" PRId64
|
|
|
|
" iops_max=%" PRId64
|
|
|
|
" iops_rd_max=%" PRId64
|
|
|
|
" iops_wr_max=%" PRId64
|
|
|
|
" iops_size=%" PRId64
|
|
|
|
" group=%s\n",
|
|
|
|
inserted->bps,
|
|
|
|
inserted->bps_rd,
|
|
|
|
inserted->bps_wr,
|
|
|
|
inserted->bps_max,
|
|
|
|
inserted->bps_rd_max,
|
|
|
|
inserted->bps_wr_max,
|
|
|
|
inserted->iops,
|
|
|
|
inserted->iops_rd,
|
|
|
|
inserted->iops_wr,
|
|
|
|
inserted->iops_max,
|
|
|
|
inserted->iops_rd_max,
|
|
|
|
inserted->iops_wr_max,
|
|
|
|
inserted->iops_size,
|
|
|
|
inserted->group);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (verbose) {
|
|
|
|
monitor_printf(mon, "\nImages:\n");
|
|
|
|
image_info = inserted->image;
|
|
|
|
while (1) {
|
2022-06-20 19:27:04 +03:00
|
|
|
bdrv_node_info_dump(qapi_ImageInfo_base(image_info), 0, false);
|
2022-11-04 19:06:52 +03:00
|
|
|
if (image_info->backing_image) {
|
2020-03-08 12:24:39 +03:00
|
|
|
image_info = image_info->backing_image;
|
|
|
|
} else {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_info_block(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
BlockInfoList *block_list, *info;
|
|
|
|
BlockDeviceInfoList *blockdev_list, *blockdev;
|
|
|
|
const char *device = qdict_get_try_str(qdict, "device");
|
|
|
|
bool verbose = qdict_get_try_bool(qdict, "verbose", false);
|
|
|
|
bool nodes = qdict_get_try_bool(qdict, "nodes", false);
|
|
|
|
bool printed = false;
|
|
|
|
|
|
|
|
/* Print BlockBackend information */
|
|
|
|
if (!nodes) {
|
|
|
|
block_list = qmp_query_block(NULL);
|
|
|
|
} else {
|
|
|
|
block_list = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (info = block_list; info; info = info->next) {
|
|
|
|
if (device && strcmp(device, info->value->device)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (info != block_list) {
|
|
|
|
monitor_printf(mon, "\n");
|
|
|
|
}
|
|
|
|
|
2022-11-04 19:06:52 +03:00
|
|
|
print_block_info(mon, info->value, info->value->inserted,
|
2020-03-08 12:24:39 +03:00
|
|
|
verbose);
|
|
|
|
printed = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
qapi_free_BlockInfoList(block_list);
|
|
|
|
|
|
|
|
if ((!device && !nodes) || printed) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Print node information */
|
|
|
|
blockdev_list = qmp_query_named_block_nodes(false, false, NULL);
|
|
|
|
for (blockdev = blockdev_list; blockdev; blockdev = blockdev->next) {
|
2022-11-04 19:06:52 +03:00
|
|
|
assert(blockdev->value->node_name);
|
2020-03-08 12:24:39 +03:00
|
|
|
if (device && strcmp(device, blockdev->value->node_name)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (blockdev != blockdev_list) {
|
|
|
|
monitor_printf(mon, "\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
print_block_info(mon, NULL, blockdev->value, verbose);
|
|
|
|
}
|
|
|
|
qapi_free_BlockDeviceInfoList(blockdev_list);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_info_blockstats(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
BlockStatsList *stats_list, *stats;
|
|
|
|
|
|
|
|
stats_list = qmp_query_blockstats(false, false, NULL);
|
|
|
|
|
|
|
|
for (stats = stats_list; stats; stats = stats->next) {
|
2022-11-04 19:06:52 +03:00
|
|
|
if (!stats->value->device) {
|
2020-03-08 12:24:39 +03:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
monitor_printf(mon, "%s:", stats->value->device);
|
|
|
|
monitor_printf(mon, " rd_bytes=%" PRId64
|
|
|
|
" wr_bytes=%" PRId64
|
|
|
|
" rd_operations=%" PRId64
|
|
|
|
" wr_operations=%" PRId64
|
|
|
|
" flush_operations=%" PRId64
|
|
|
|
" wr_total_time_ns=%" PRId64
|
|
|
|
" rd_total_time_ns=%" PRId64
|
|
|
|
" flush_total_time_ns=%" PRId64
|
|
|
|
" rd_merged=%" PRId64
|
|
|
|
" wr_merged=%" PRId64
|
|
|
|
" idle_time_ns=%" PRId64
|
|
|
|
"\n",
|
|
|
|
stats->value->stats->rd_bytes,
|
|
|
|
stats->value->stats->wr_bytes,
|
|
|
|
stats->value->stats->rd_operations,
|
|
|
|
stats->value->stats->wr_operations,
|
|
|
|
stats->value->stats->flush_operations,
|
|
|
|
stats->value->stats->wr_total_time_ns,
|
|
|
|
stats->value->stats->rd_total_time_ns,
|
|
|
|
stats->value->stats->flush_total_time_ns,
|
|
|
|
stats->value->stats->rd_merged,
|
|
|
|
stats->value->stats->wr_merged,
|
|
|
|
stats->value->stats->idle_time_ns);
|
|
|
|
}
|
|
|
|
|
|
|
|
qapi_free_BlockStatsList(stats_list);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_info_block_jobs(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
BlockJobInfoList *list;
|
|
|
|
|
2020-03-13 20:05:15 +03:00
|
|
|
list = qmp_query_block_jobs(&error_abort);
|
2020-03-08 12:24:39 +03:00
|
|
|
|
|
|
|
if (!list) {
|
|
|
|
monitor_printf(mon, "No active jobs\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (list) {
|
2023-10-31 16:54:27 +03:00
|
|
|
if (list->value->type == JOB_TYPE_STREAM) {
|
2020-03-08 12:24:39 +03:00
|
|
|
monitor_printf(mon, "Streaming device %s: Completed %" PRId64
|
|
|
|
" of %" PRId64 " bytes, speed limit %" PRId64
|
|
|
|
" bytes/s\n",
|
|
|
|
list->value->device,
|
|
|
|
list->value->offset,
|
|
|
|
list->value->len,
|
|
|
|
list->value->speed);
|
|
|
|
} else {
|
|
|
|
monitor_printf(mon, "Type %s, device %s: Completed %" PRId64
|
|
|
|
" of %" PRId64 " bytes, speed limit %" PRId64
|
|
|
|
" bytes/s\n",
|
2023-10-31 16:54:27 +03:00
|
|
|
JobType_str(list->value->type),
|
2020-03-08 12:24:39 +03:00
|
|
|
list->value->device,
|
|
|
|
list->value->offset,
|
|
|
|
list->value->len,
|
|
|
|
list->value->speed);
|
|
|
|
}
|
|
|
|
list = list->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
qapi_free_BlockJobInfoList(list);
|
|
|
|
}
|
|
|
|
|
|
|
|
void hmp_info_snapshots(Monitor *mon, const QDict *qdict)
|
|
|
|
{
|
|
|
|
BlockDriverState *bs, *bs1;
|
|
|
|
BdrvNextIterator it1;
|
|
|
|
QEMUSnapshotInfo *sn_tab, *sn;
|
|
|
|
bool no_snapshot = true;
|
|
|
|
int nb_sns, i;
|
|
|
|
int total;
|
|
|
|
int *global_snapshots;
|
|
|
|
|
|
|
|
typedef struct SnapshotEntry {
|
|
|
|
QEMUSnapshotInfo sn;
|
|
|
|
QTAILQ_ENTRY(SnapshotEntry) next;
|
|
|
|
} SnapshotEntry;
|
|
|
|
|
|
|
|
typedef struct ImageEntry {
|
|
|
|
const char *imagename;
|
|
|
|
QTAILQ_ENTRY(ImageEntry) next;
|
|
|
|
QTAILQ_HEAD(, SnapshotEntry) snapshots;
|
|
|
|
} ImageEntry;
|
|
|
|
|
|
|
|
QTAILQ_HEAD(, ImageEntry) image_list =
|
|
|
|
QTAILQ_HEAD_INITIALIZER(image_list);
|
|
|
|
|
|
|
|
ImageEntry *image_entry, *next_ie;
|
|
|
|
SnapshotEntry *snapshot_entry;
|
2021-02-04 15:48:23 +03:00
|
|
|
Error *err = NULL;
|
2020-03-08 12:24:39 +03:00
|
|
|
|
2023-09-29 17:51:39 +03:00
|
|
|
GRAPH_RDLOCK_GUARD_MAINLOOP();
|
|
|
|
|
2021-02-04 15:48:27 +03:00
|
|
|
bs = bdrv_all_find_vmstate_bs(NULL, false, NULL, &err);
|
2020-03-08 12:24:39 +03:00
|
|
|
if (!bs) {
|
2021-02-04 15:48:23 +03:00
|
|
|
error_report_err(err);
|
2020-03-08 12:24:39 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nb_sns = bdrv_snapshot_list(bs, &sn_tab);
|
|
|
|
|
|
|
|
if (nb_sns < 0) {
|
|
|
|
monitor_printf(mon, "bdrv_snapshot_list: error %d\n", nb_sns);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (bs1 = bdrv_first(&it1); bs1; bs1 = bdrv_next(&it1)) {
|
|
|
|
int bs1_nb_sns = 0;
|
|
|
|
ImageEntry *ie;
|
|
|
|
SnapshotEntry *se;
|
|
|
|
|
|
|
|
if (bdrv_can_snapshot(bs1)) {
|
|
|
|
sn = NULL;
|
|
|
|
bs1_nb_sns = bdrv_snapshot_list(bs1, &sn);
|
|
|
|
if (bs1_nb_sns > 0) {
|
|
|
|
no_snapshot = false;
|
|
|
|
ie = g_new0(ImageEntry, 1);
|
|
|
|
ie->imagename = bdrv_get_device_name(bs1);
|
|
|
|
QTAILQ_INIT(&ie->snapshots);
|
|
|
|
QTAILQ_INSERT_TAIL(&image_list, ie, next);
|
|
|
|
for (i = 0; i < bs1_nb_sns; i++) {
|
|
|
|
se = g_new0(SnapshotEntry, 1);
|
|
|
|
se->sn = sn[i];
|
|
|
|
QTAILQ_INSERT_TAIL(&ie->snapshots, se, next);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
g_free(sn);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (no_snapshot) {
|
|
|
|
monitor_printf(mon, "There is no snapshot available.\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
global_snapshots = g_new0(int, nb_sns);
|
|
|
|
total = 0;
|
|
|
|
for (i = 0; i < nb_sns; i++) {
|
|
|
|
SnapshotEntry *next_sn;
|
2021-02-04 15:48:28 +03:00
|
|
|
if (bdrv_all_has_snapshot(sn_tab[i].name, false, NULL, NULL) == 1) {
|
2020-03-08 12:24:39 +03:00
|
|
|
global_snapshots[total] = i;
|
|
|
|
total++;
|
|
|
|
QTAILQ_FOREACH(image_entry, &image_list, next) {
|
|
|
|
QTAILQ_FOREACH_SAFE(snapshot_entry, &image_entry->snapshots,
|
|
|
|
next, next_sn) {
|
|
|
|
if (!strcmp(sn_tab[i].name, snapshot_entry->sn.name)) {
|
|
|
|
QTAILQ_REMOVE(&image_entry->snapshots, snapshot_entry,
|
|
|
|
next);
|
|
|
|
g_free(snapshot_entry);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
monitor_printf(mon, "List of snapshots present on all disks:\n");
|
|
|
|
|
|
|
|
if (total > 0) {
|
|
|
|
bdrv_snapshot_dump(NULL);
|
|
|
|
monitor_printf(mon, "\n");
|
|
|
|
for (i = 0; i < total; i++) {
|
|
|
|
sn = &sn_tab[global_snapshots[i]];
|
|
|
|
/*
|
|
|
|
* The ID is not guaranteed to be the same on all images, so
|
|
|
|
* overwrite it.
|
|
|
|
*/
|
|
|
|
pstrcpy(sn->id_str, sizeof(sn->id_str), "--");
|
|
|
|
bdrv_snapshot_dump(sn);
|
|
|
|
monitor_printf(mon, "\n");
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
monitor_printf(mon, "None\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
QTAILQ_FOREACH(image_entry, &image_list, next) {
|
|
|
|
if (QTAILQ_EMPTY(&image_entry->snapshots)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
monitor_printf(mon,
|
|
|
|
"\nList of partial (non-loadable) snapshots on '%s':\n",
|
|
|
|
image_entry->imagename);
|
|
|
|
bdrv_snapshot_dump(NULL);
|
|
|
|
monitor_printf(mon, "\n");
|
|
|
|
QTAILQ_FOREACH(snapshot_entry, &image_entry->snapshots, next) {
|
|
|
|
bdrv_snapshot_dump(&snapshot_entry->sn);
|
|
|
|
monitor_printf(mon, "\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
QTAILQ_FOREACH_SAFE(image_entry, &image_list, next, next_ie) {
|
|
|
|
SnapshotEntry *next_sn;
|
|
|
|
QTAILQ_FOREACH_SAFE(snapshot_entry, &image_entry->snapshots, next,
|
|
|
|
next_sn) {
|
|
|
|
g_free(snapshot_entry);
|
|
|
|
}
|
|
|
|
g_free(image_entry);
|
|
|
|
}
|
|
|
|
g_free(sn_tab);
|
|
|
|
g_free(global_snapshots);
|
|
|
|
}
|
2023-01-24 15:19:26 +03:00
|
|
|
|
|
|
|
void hmp_change_medium(Monitor *mon, const char *device, const char *target,
|
|
|
|
const char *arg, const char *read_only, bool force,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
ERRP_GUARD();
|
|
|
|
BlockdevChangeReadOnlyMode read_only_mode = 0;
|
|
|
|
|
|
|
|
if (read_only) {
|
|
|
|
read_only_mode =
|
|
|
|
qapi_enum_parse(&BlockdevChangeReadOnlyMode_lookup,
|
|
|
|
read_only,
|
|
|
|
BLOCKDEV_CHANGE_READ_ONLY_MODE_RETAIN, errp);
|
|
|
|
if (*errp) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
qmp_blockdev_change_medium(device, NULL, target, arg, true, force,
|
|
|
|
!!read_only, read_only_mode, errp);
|
|
|
|
}
|