2020-09-24 18:26:48 +03:00
|
|
|
# -*- Mode: Python -*-
|
|
|
|
# vim: filetype=python
|
|
|
|
|
|
|
|
##
|
|
|
|
# == Block device exports
|
|
|
|
##
|
|
|
|
|
|
|
|
{ 'include': 'sockets.json' }
|
qapi: nbd-export: allow select bitmaps by node/name pair
Hi all! Current logic of relying on search through backing chain is not
safe neither convenient.
Sometimes it leads to necessity of extra bitmap copying. Also, we are
going to add "snapshot-access" driver, to access some snapshot state
through NBD. And this driver is not formally a filter, and of course
it's not a COW format driver. So, searching through backing chain will
not work. Instead of widening the workaround of bitmap searching, let's
extend the interface so that user can select bitmap precisely.
Note, that checking for bitmap active status is not copied to the new
API, I don't see a reason for it, user should understand the risks. And
anyway, bitmap from other node is unrelated to this export being
read-only or read-write.
Signed-off-by: Vladimir Sementsov-Ogievskiy <vsementsov@openvz.org>
Message-Id: <20220314213226.362217-3-v.sementsov-og@mail.ru>
[eblake: Adjust S-o-b to Vladimir's new email, with permission]
Reviewed-by: Eric Blake <eblake@redhat.com>
Signed-off-by: Eric Blake <eblake@redhat.com>
2022-03-15 00:32:25 +03:00
|
|
|
{ 'include': 'block-core.json' }
|
2020-09-24 18:26:48 +03:00
|
|
|
|
|
|
|
##
|
|
|
|
# @NbdServerOptions:
|
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# Keep this type consistent with the nbd-server-start arguments. The
|
|
|
|
# only intended difference is using SocketAddress instead of
|
|
|
|
# SocketAddressLegacy.
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
|
|
|
# @addr: Address on which to listen.
|
2023-04-28 13:54:29 +03:00
|
|
|
#
|
2020-09-24 18:26:48 +03:00
|
|
|
# @tls-creds: ID of the TLS credentials object (since 2.6).
|
2023-04-28 13:54:29 +03:00
|
|
|
#
|
2020-09-24 18:26:48 +03:00
|
|
|
# @tls-authz: ID of the QAuthZ authorization object used to validate
|
2023-04-28 13:54:29 +03:00
|
|
|
# the client's x509 distinguished name. This object is is only
|
|
|
|
# resolved at time of use, so can be deleted and recreated on the
|
|
|
|
# fly while the NBD server is active. If missing, it will default
|
|
|
|
# to denying access (since 4.0).
|
|
|
|
#
|
|
|
|
# @max-connections: The maximum number of connections to allow at the
|
|
|
|
# same time, 0 for unlimited. Setting this to 1 also stops the
|
|
|
|
# server from advertising multiple client support (since 5.2;
|
nbd/server: CVE-2024-7409: Cap default max-connections to 100
Allowing an unlimited number of clients to any web service is a recipe
for a rudimentary denial of service attack: the client merely needs to
open lots of sockets without closing them, until qemu no longer has
any more fds available to allocate.
For qemu-nbd, we default to allowing only 1 connection unless more are
explicitly asked for (-e or --shared); this was historically picked as
a nice default (without an explicit -t, a non-persistent qemu-nbd goes
away after a client disconnects, without needing any additional
follow-up commands), and we are not going to change that interface now
(besides, someday we want to point people towards qemu-storage-daemon
instead of qemu-nbd).
But for qemu proper, and the newer qemu-storage-daemon, the QMP
nbd-server-start command has historically had a default of unlimited
number of connections, in part because unlike qemu-nbd it is
inherently persistent until nbd-server-stop. Allowing multiple client
sockets is particularly useful for clients that can take advantage of
MULTI_CONN (creating parallel sockets to increase throughput),
although known clients that do so (such as libnbd's nbdcopy) typically
use only 8 or 16 connections (the benefits of scaling diminish once
more sockets are competing for kernel attention). Picking a number
large enough for typical use cases, but not unlimited, makes it
slightly harder for a malicious client to perform a denial of service
merely by opening lots of connections withot progressing through the
handshake.
This change does not eliminate CVE-2024-7409 on its own, but reduces
the chance for fd exhaustion or unlimited memory usage as an attack
surface. On the other hand, by itself, it makes it more obvious that
with a finite limit, we have the problem of an unauthenticated client
holding 100 fds opened as a way to block out a legitimate client from
being able to connect; thus, later patches will further add timeouts
to reject clients that are not making progress.
This is an INTENTIONAL change in behavior, and will break any client
of nbd-server-start that was not passing an explicit max-connections
parameter, yet expects more than 100 simultaneous connections. We are
not aware of any such client (as stated above, most clients aware of
MULTI_CONN get by just fine on 8 or 16 connections, and probably cope
with later connections failing by relying on the earlier connections;
libvirt has not yet been passing max-connections, but generally
creates NBD servers with the intent for a single client for the sake
of live storage migration; meanwhile, the KubeSAN project anticipates
a large cluster sharing multiple clients [up to 8 per node, and up to
100 nodes in a cluster], but it currently uses qemu-nbd with an
explicit --shared=0 rather than qemu-storage-daemon with
nbd-server-start).
We considered using a deprecation period (declare that omitting
max-parameters is deprecated, and make it mandatory in 3 releases -
then we don't need to pick an arbitrary default); that has zero risk
of breaking any apps that accidentally depended on more than 100
connections, and where such breakage might not be noticed under unit
testing but only under the larger loads of production usage. But it
does not close the denial-of-service hole until far into the future,
and requires all apps to change to add the parameter even if 100 was
good enough. It also has a drawback that any app (like libvirt) that
is accidentally relying on an unlimited default should seriously
consider their own CVE now, at which point they are going to change to
pass explicit max-connections sooner than waiting for 3 qemu releases.
Finally, if our changed default breaks an app, that app can always
pass in an explicit max-parameters with a larger value.
It is also intentional that the HMP interface to nbd-server-start is
not changed to expose max-connections (any client needing to fine-tune
things should be using QMP).
Suggested-by: Daniel P. Berrangé <berrange@redhat.com>
Signed-off-by: Eric Blake <eblake@redhat.com>
Message-ID: <20240807174943.771624-12-eblake@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
[ericb: Expand commit message to summarize Dan's argument for why we
break corner-case back-compat behavior without a deprecation period]
Signed-off-by: Eric Blake <eblake@redhat.com>
2024-08-06 21:53:00 +03:00
|
|
|
# default: 100)
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
|
|
|
# Since: 4.2
|
|
|
|
##
|
|
|
|
{ 'struct': 'NbdServerOptions',
|
|
|
|
'data': { 'addr': 'SocketAddress',
|
|
|
|
'*tls-creds': 'str',
|
2020-09-24 18:26:54 +03:00
|
|
|
'*tls-authz': 'str',
|
|
|
|
'*max-connections': 'uint32' } }
|
2020-09-24 18:26:48 +03:00
|
|
|
|
|
|
|
##
|
|
|
|
# @nbd-server-start:
|
|
|
|
#
|
|
|
|
# Start an NBD server listening on the given host and port. Block
|
2023-04-28 13:54:29 +03:00
|
|
|
# devices can then be exported using @nbd-server-add. The NBD server
|
|
|
|
# will present them as named exports; for example, another QEMU
|
|
|
|
# instance could refer to them as "nbd:HOST:PORT:exportname=NAME".
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# Keep this type consistent with the NbdServerOptions type. The only
|
|
|
|
# intended difference is using SocketAddressLegacy instead of
|
|
|
|
# SocketAddress.
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
|
|
|
# @addr: Address on which to listen.
|
2023-04-28 13:54:29 +03:00
|
|
|
#
|
2020-09-24 18:26:48 +03:00
|
|
|
# @tls-creds: ID of the TLS credentials object (since 2.6).
|
2023-04-28 13:54:29 +03:00
|
|
|
#
|
2020-09-24 18:26:48 +03:00
|
|
|
# @tls-authz: ID of the QAuthZ authorization object used to validate
|
2023-04-28 13:54:29 +03:00
|
|
|
# the client's x509 distinguished name. This object is is only
|
|
|
|
# resolved at time of use, so can be deleted and recreated on the
|
|
|
|
# fly while the NBD server is active. If missing, it will default
|
|
|
|
# to denying access (since 4.0).
|
|
|
|
#
|
|
|
|
# @max-connections: The maximum number of connections to allow at the
|
|
|
|
# same time, 0 for unlimited. Setting this to 1 also stops the
|
|
|
|
# server from advertising multiple client support (since 5.2;
|
nbd/server: CVE-2024-7409: Cap default max-connections to 100
Allowing an unlimited number of clients to any web service is a recipe
for a rudimentary denial of service attack: the client merely needs to
open lots of sockets without closing them, until qemu no longer has
any more fds available to allocate.
For qemu-nbd, we default to allowing only 1 connection unless more are
explicitly asked for (-e or --shared); this was historically picked as
a nice default (without an explicit -t, a non-persistent qemu-nbd goes
away after a client disconnects, without needing any additional
follow-up commands), and we are not going to change that interface now
(besides, someday we want to point people towards qemu-storage-daemon
instead of qemu-nbd).
But for qemu proper, and the newer qemu-storage-daemon, the QMP
nbd-server-start command has historically had a default of unlimited
number of connections, in part because unlike qemu-nbd it is
inherently persistent until nbd-server-stop. Allowing multiple client
sockets is particularly useful for clients that can take advantage of
MULTI_CONN (creating parallel sockets to increase throughput),
although known clients that do so (such as libnbd's nbdcopy) typically
use only 8 or 16 connections (the benefits of scaling diminish once
more sockets are competing for kernel attention). Picking a number
large enough for typical use cases, but not unlimited, makes it
slightly harder for a malicious client to perform a denial of service
merely by opening lots of connections withot progressing through the
handshake.
This change does not eliminate CVE-2024-7409 on its own, but reduces
the chance for fd exhaustion or unlimited memory usage as an attack
surface. On the other hand, by itself, it makes it more obvious that
with a finite limit, we have the problem of an unauthenticated client
holding 100 fds opened as a way to block out a legitimate client from
being able to connect; thus, later patches will further add timeouts
to reject clients that are not making progress.
This is an INTENTIONAL change in behavior, and will break any client
of nbd-server-start that was not passing an explicit max-connections
parameter, yet expects more than 100 simultaneous connections. We are
not aware of any such client (as stated above, most clients aware of
MULTI_CONN get by just fine on 8 or 16 connections, and probably cope
with later connections failing by relying on the earlier connections;
libvirt has not yet been passing max-connections, but generally
creates NBD servers with the intent for a single client for the sake
of live storage migration; meanwhile, the KubeSAN project anticipates
a large cluster sharing multiple clients [up to 8 per node, and up to
100 nodes in a cluster], but it currently uses qemu-nbd with an
explicit --shared=0 rather than qemu-storage-daemon with
nbd-server-start).
We considered using a deprecation period (declare that omitting
max-parameters is deprecated, and make it mandatory in 3 releases -
then we don't need to pick an arbitrary default); that has zero risk
of breaking any apps that accidentally depended on more than 100
connections, and where such breakage might not be noticed under unit
testing but only under the larger loads of production usage. But it
does not close the denial-of-service hole until far into the future,
and requires all apps to change to add the parameter even if 100 was
good enough. It also has a drawback that any app (like libvirt) that
is accidentally relying on an unlimited default should seriously
consider their own CVE now, at which point they are going to change to
pass explicit max-connections sooner than waiting for 3 qemu releases.
Finally, if our changed default breaks an app, that app can always
pass in an explicit max-parameters with a larger value.
It is also intentional that the HMP interface to nbd-server-start is
not changed to expose max-connections (any client needing to fine-tune
things should be using QMP).
Suggested-by: Daniel P. Berrangé <berrange@redhat.com>
Signed-off-by: Eric Blake <eblake@redhat.com>
Message-ID: <20240807174943.771624-12-eblake@redhat.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
[ericb: Expand commit message to summarize Dan's argument for why we
break corner-case back-compat behavior without a deprecation period]
Signed-off-by: Eric Blake <eblake@redhat.com>
2024-08-06 21:53:00 +03:00
|
|
|
# default: 100).
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2024-02-27 14:39:12 +03:00
|
|
|
# Errors:
|
|
|
|
# - if the server is already running
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2020-11-18 09:41:58 +03:00
|
|
|
# Since: 1.3
|
2020-09-24 18:26:48 +03:00
|
|
|
##
|
|
|
|
{ 'command': 'nbd-server-start',
|
|
|
|
'data': { 'addr': 'SocketAddressLegacy',
|
|
|
|
'*tls-creds': 'str',
|
2020-09-24 18:26:54 +03:00
|
|
|
'*tls-authz': 'str',
|
2020-11-03 12:37:20 +03:00
|
|
|
'*max-connections': 'uint32' },
|
|
|
|
'allow-preconfig': true }
|
2020-09-24 18:26:48 +03:00
|
|
|
|
|
|
|
##
|
2020-10-27 08:05:49 +03:00
|
|
|
# @BlockExportOptionsNbdBase:
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# An NBD block export (common options shared between nbd-server-add
|
|
|
|
# and the NBD branch of block-export-add).
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# @name: Export name. If unspecified, the @device parameter is used
|
|
|
|
# as the export name. (Since 2.12)
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
|
|
|
# @description: Free-form description of the export, up to 4096 bytes.
|
2023-04-28 13:54:29 +03:00
|
|
|
# (Since 5.0)
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
|
|
|
# Since: 5.0
|
|
|
|
##
|
2020-10-27 08:05:49 +03:00
|
|
|
{ 'struct': 'BlockExportOptionsNbdBase',
|
|
|
|
'data': { '*name': 'str', '*description': 'str' } }
|
|
|
|
|
|
|
|
##
|
|
|
|
# @BlockExportOptionsNbd:
|
|
|
|
#
|
|
|
|
# An NBD block export (distinct options used in the NBD branch of
|
|
|
|
# block-export-add).
|
|
|
|
#
|
|
|
|
# @bitmaps: Also export each of the named dirty bitmaps reachable from
|
2023-04-28 13:54:29 +03:00
|
|
|
# @device, so the NBD client can use NBD_OPT_SET_META_CONTEXT with
|
|
|
|
# the metadata context name "qemu:dirty-bitmap:BITMAP" to inspect
|
|
|
|
# each bitmap. Since 7.1 bitmap may be specified by node/name
|
|
|
|
# pair.
|
2020-10-27 08:05:49 +03:00
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# @allocation-depth: Also export the allocation depth map for @device,
|
|
|
|
# so the NBD client can use NBD_OPT_SET_META_CONTEXT with the
|
|
|
|
# metadata context name "qemu:allocation-depth" to inspect
|
|
|
|
# allocation details. (since 5.2)
|
2020-10-27 08:05:55 +03:00
|
|
|
#
|
2020-10-27 08:05:49 +03:00
|
|
|
# Since: 5.2
|
|
|
|
##
|
2020-09-24 18:26:49 +03:00
|
|
|
{ 'struct': 'BlockExportOptionsNbd',
|
2020-10-27 08:05:49 +03:00
|
|
|
'base': 'BlockExportOptionsNbdBase',
|
qapi: nbd-export: allow select bitmaps by node/name pair
Hi all! Current logic of relying on search through backing chain is not
safe neither convenient.
Sometimes it leads to necessity of extra bitmap copying. Also, we are
going to add "snapshot-access" driver, to access some snapshot state
through NBD. And this driver is not formally a filter, and of course
it's not a COW format driver. So, searching through backing chain will
not work. Instead of widening the workaround of bitmap searching, let's
extend the interface so that user can select bitmap precisely.
Note, that checking for bitmap active status is not copied to the new
API, I don't see a reason for it, user should understand the risks. And
anyway, bitmap from other node is unrelated to this export being
read-only or read-write.
Signed-off-by: Vladimir Sementsov-Ogievskiy <vsementsov@openvz.org>
Message-Id: <20220314213226.362217-3-v.sementsov-og@mail.ru>
[eblake: Adjust S-o-b to Vladimir's new email, with permission]
Reviewed-by: Eric Blake <eblake@redhat.com>
Signed-off-by: Eric Blake <eblake@redhat.com>
2022-03-15 00:32:25 +03:00
|
|
|
'data': { '*bitmaps': ['BlockDirtyBitmapOrStr'],
|
|
|
|
'*allocation-depth': 'bool' } }
|
2020-09-24 18:27:01 +03:00
|
|
|
|
2020-09-24 18:15:47 +03:00
|
|
|
##
|
|
|
|
# @BlockExportOptionsVhostUserBlk:
|
|
|
|
#
|
|
|
|
# A vhost-user-blk block export.
|
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# @addr: The vhost-user socket on which to listen. Both 'unix' and
|
|
|
|
# 'fd' SocketAddress types are supported. Passed fds must be UNIX
|
|
|
|
# domain sockets.
|
|
|
|
#
|
|
|
|
# @logical-block-size: Logical block size in bytes. Defaults to 512
|
|
|
|
# bytes.
|
|
|
|
#
|
|
|
|
# @num-queues: Number of request virtqueues. Must be greater than 0.
|
|
|
|
# Defaults to 1.
|
2020-09-24 18:15:47 +03:00
|
|
|
#
|
|
|
|
# Since: 5.2
|
|
|
|
##
|
|
|
|
{ 'struct': 'BlockExportOptionsVhostUserBlk',
|
2020-10-01 17:46:03 +03:00
|
|
|
'data': { 'addr': 'SocketAddress',
|
|
|
|
'*logical-block-size': 'size',
|
|
|
|
'*num-queues': 'uint16'} }
|
2020-09-24 18:15:47 +03:00
|
|
|
|
export/fuse: Add allow-other option
Without the allow_other mount option, no user (not even root) but the
one who started qemu/the storage daemon can access the export. Allow
users to configure the export such that such accesses are possible.
While allow_other is probably what users want, we cannot make it an
unconditional default, because passing it is only possible (for non-root
users) if the global fuse.conf configuration file allows it. Thus, the
default is an 'auto' mode, in which we first try with allow_other, and
then fall back to without.
FuseExport.allow_other reports whether allow_other was actually used as
a mount option or not. Currently, this information is not used, but a
future patch will let this field decide whether e.g. an export's UID and
GID can be changed through chmod.
One notable thing about 'auto' mode is that libfuse may print error
messages directly to stderr, and so may fusermount (which it executes).
Our export code cannot really filter or hide them. Therefore, if 'auto'
fails its first attempt and has to fall back, fusermount will print an
error message that mounting with allow_other failed.
This behavior necessitates a change to iotest 308, namely we need to
filter out this error message (because if the first attempt at mounting
with allow_other succeeds, there will be no such message).
Furthermore, common.rc's _make_test_img should use allow-other=off for
FUSE exports, because iotests generally do not need to access images
from other users, so allow-other=on or allow-other=auto have no
advantage. OTOH, allow-other=on will not work on systems where
user_allow_other is disabled, and with allow-other=auto, we get said
error message that we would need to filter out again. Just disabling
allow-other is simplest.
Signed-off-by: Max Reitz <mreitz@redhat.com>
Message-Id: <20210625142317.271673-3-mreitz@redhat.com>
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
2021-06-25 17:23:13 +03:00
|
|
|
##
|
|
|
|
# @FuseExportAllowOther:
|
|
|
|
#
|
|
|
|
# Possible allow_other modes for FUSE exports.
|
|
|
|
#
|
|
|
|
# @off: Do not pass allow_other as a mount option.
|
|
|
|
#
|
|
|
|
# @on: Pass allow_other as a mount option.
|
|
|
|
#
|
|
|
|
# @auto: Try mounting with allow_other first, and if that fails, retry
|
2023-04-28 13:54:29 +03:00
|
|
|
# without allow_other.
|
export/fuse: Add allow-other option
Without the allow_other mount option, no user (not even root) but the
one who started qemu/the storage daemon can access the export. Allow
users to configure the export such that such accesses are possible.
While allow_other is probably what users want, we cannot make it an
unconditional default, because passing it is only possible (for non-root
users) if the global fuse.conf configuration file allows it. Thus, the
default is an 'auto' mode, in which we first try with allow_other, and
then fall back to without.
FuseExport.allow_other reports whether allow_other was actually used as
a mount option or not. Currently, this information is not used, but a
future patch will let this field decide whether e.g. an export's UID and
GID can be changed through chmod.
One notable thing about 'auto' mode is that libfuse may print error
messages directly to stderr, and so may fusermount (which it executes).
Our export code cannot really filter or hide them. Therefore, if 'auto'
fails its first attempt and has to fall back, fusermount will print an
error message that mounting with allow_other failed.
This behavior necessitates a change to iotest 308, namely we need to
filter out this error message (because if the first attempt at mounting
with allow_other succeeds, there will be no such message).
Furthermore, common.rc's _make_test_img should use allow-other=off for
FUSE exports, because iotests generally do not need to access images
from other users, so allow-other=on or allow-other=auto have no
advantage. OTOH, allow-other=on will not work on systems where
user_allow_other is disabled, and with allow-other=auto, we get said
error message that we would need to filter out again. Just disabling
allow-other is simplest.
Signed-off-by: Max Reitz <mreitz@redhat.com>
Message-Id: <20210625142317.271673-3-mreitz@redhat.com>
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
2021-06-25 17:23:13 +03:00
|
|
|
#
|
|
|
|
# Since: 6.1
|
|
|
|
##
|
|
|
|
{ 'enum': 'FuseExportAllowOther',
|
|
|
|
'data': ['off', 'on', 'auto'] }
|
|
|
|
|
2020-10-27 22:05:42 +03:00
|
|
|
##
|
|
|
|
# @BlockExportOptionsFuse:
|
|
|
|
#
|
|
|
|
# Options for exporting a block graph node on some (file) mountpoint
|
|
|
|
# as a raw image.
|
|
|
|
#
|
2024-07-29 09:52:20 +03:00
|
|
|
# @mountpoint: Path on which to export the block device via FUSE.
|
|
|
|
# This must point to an existing regular file.
|
2020-10-27 22:05:42 +03:00
|
|
|
#
|
2020-10-27 22:05:44 +03:00
|
|
|
# @growable: Whether writes beyond the EOF should grow the block node
|
2023-04-28 13:54:29 +03:00
|
|
|
# accordingly. (default: false)
|
2020-10-27 22:05:44 +03:00
|
|
|
#
|
export/fuse: Add allow-other option
Without the allow_other mount option, no user (not even root) but the
one who started qemu/the storage daemon can access the export. Allow
users to configure the export such that such accesses are possible.
While allow_other is probably what users want, we cannot make it an
unconditional default, because passing it is only possible (for non-root
users) if the global fuse.conf configuration file allows it. Thus, the
default is an 'auto' mode, in which we first try with allow_other, and
then fall back to without.
FuseExport.allow_other reports whether allow_other was actually used as
a mount option or not. Currently, this information is not used, but a
future patch will let this field decide whether e.g. an export's UID and
GID can be changed through chmod.
One notable thing about 'auto' mode is that libfuse may print error
messages directly to stderr, and so may fusermount (which it executes).
Our export code cannot really filter or hide them. Therefore, if 'auto'
fails its first attempt and has to fall back, fusermount will print an
error message that mounting with allow_other failed.
This behavior necessitates a change to iotest 308, namely we need to
filter out this error message (because if the first attempt at mounting
with allow_other succeeds, there will be no such message).
Furthermore, common.rc's _make_test_img should use allow-other=off for
FUSE exports, because iotests generally do not need to access images
from other users, so allow-other=on or allow-other=auto have no
advantage. OTOH, allow-other=on will not work on systems where
user_allow_other is disabled, and with allow-other=auto, we get said
error message that we would need to filter out again. Just disabling
allow-other is simplest.
Signed-off-by: Max Reitz <mreitz@redhat.com>
Message-Id: <20210625142317.271673-3-mreitz@redhat.com>
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
2021-06-25 17:23:13 +03:00
|
|
|
# @allow-other: If this is off, only qemu's user is allowed access to
|
2023-04-28 13:54:29 +03:00
|
|
|
# this export. That cannot be changed even with chmod or chown.
|
|
|
|
# Enabling this option will allow other users access to the export
|
2024-07-29 09:52:20 +03:00
|
|
|
# with the FUSE mount option "allow_other". Note that using
|
2023-04-28 13:54:29 +03:00
|
|
|
# allow_other as a non-root user requires user_allow_other to be
|
|
|
|
# enabled in the global fuse.conf configuration file. In auto
|
|
|
|
# mode (the default), the FUSE export driver will first attempt to
|
|
|
|
# mount the export with allow_other, and if that fails, try again
|
|
|
|
# without. (since 6.1; default: auto)
|
export/fuse: Add allow-other option
Without the allow_other mount option, no user (not even root) but the
one who started qemu/the storage daemon can access the export. Allow
users to configure the export such that such accesses are possible.
While allow_other is probably what users want, we cannot make it an
unconditional default, because passing it is only possible (for non-root
users) if the global fuse.conf configuration file allows it. Thus, the
default is an 'auto' mode, in which we first try with allow_other, and
then fall back to without.
FuseExport.allow_other reports whether allow_other was actually used as
a mount option or not. Currently, this information is not used, but a
future patch will let this field decide whether e.g. an export's UID and
GID can be changed through chmod.
One notable thing about 'auto' mode is that libfuse may print error
messages directly to stderr, and so may fusermount (which it executes).
Our export code cannot really filter or hide them. Therefore, if 'auto'
fails its first attempt and has to fall back, fusermount will print an
error message that mounting with allow_other failed.
This behavior necessitates a change to iotest 308, namely we need to
filter out this error message (because if the first attempt at mounting
with allow_other succeeds, there will be no such message).
Furthermore, common.rc's _make_test_img should use allow-other=off for
FUSE exports, because iotests generally do not need to access images
from other users, so allow-other=on or allow-other=auto have no
advantage. OTOH, allow-other=on will not work on systems where
user_allow_other is disabled, and with allow-other=auto, we get said
error message that we would need to filter out again. Just disabling
allow-other is simplest.
Signed-off-by: Max Reitz <mreitz@redhat.com>
Message-Id: <20210625142317.271673-3-mreitz@redhat.com>
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
2021-06-25 17:23:13 +03:00
|
|
|
#
|
2020-10-27 22:05:42 +03:00
|
|
|
# Since: 6.0
|
|
|
|
##
|
|
|
|
{ 'struct': 'BlockExportOptionsFuse',
|
2020-10-27 22:05:44 +03:00
|
|
|
'data': { 'mountpoint': 'str',
|
export/fuse: Add allow-other option
Without the allow_other mount option, no user (not even root) but the
one who started qemu/the storage daemon can access the export. Allow
users to configure the export such that such accesses are possible.
While allow_other is probably what users want, we cannot make it an
unconditional default, because passing it is only possible (for non-root
users) if the global fuse.conf configuration file allows it. Thus, the
default is an 'auto' mode, in which we first try with allow_other, and
then fall back to without.
FuseExport.allow_other reports whether allow_other was actually used as
a mount option or not. Currently, this information is not used, but a
future patch will let this field decide whether e.g. an export's UID and
GID can be changed through chmod.
One notable thing about 'auto' mode is that libfuse may print error
messages directly to stderr, and so may fusermount (which it executes).
Our export code cannot really filter or hide them. Therefore, if 'auto'
fails its first attempt and has to fall back, fusermount will print an
error message that mounting with allow_other failed.
This behavior necessitates a change to iotest 308, namely we need to
filter out this error message (because if the first attempt at mounting
with allow_other succeeds, there will be no such message).
Furthermore, common.rc's _make_test_img should use allow-other=off for
FUSE exports, because iotests generally do not need to access images
from other users, so allow-other=on or allow-other=auto have no
advantage. OTOH, allow-other=on will not work on systems where
user_allow_other is disabled, and with allow-other=auto, we get said
error message that we would need to filter out again. Just disabling
allow-other is simplest.
Signed-off-by: Max Reitz <mreitz@redhat.com>
Message-Id: <20210625142317.271673-3-mreitz@redhat.com>
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
2021-06-25 17:23:13 +03:00
|
|
|
'*growable': 'bool',
|
|
|
|
'*allow-other': 'FuseExportAllowOther' },
|
2021-08-04 11:31:05 +03:00
|
|
|
'if': 'CONFIG_FUSE' }
|
2020-10-27 22:05:42 +03:00
|
|
|
|
2022-05-23 11:46:09 +03:00
|
|
|
##
|
|
|
|
# @BlockExportOptionsVduseBlk:
|
|
|
|
#
|
|
|
|
# A vduse-blk block export.
|
|
|
|
#
|
2022-06-14 08:15:32 +03:00
|
|
|
# @name: the name of VDUSE device (must be unique across the host).
|
2023-04-28 13:54:29 +03:00
|
|
|
#
|
|
|
|
# @num-queues: the number of virtqueues. Defaults to 1.
|
|
|
|
#
|
|
|
|
# @queue-size: the size of virtqueue. Defaults to 256.
|
|
|
|
#
|
|
|
|
# @logical-block-size: Logical block size in bytes. Range [512,
|
2024-07-29 09:52:20 +03:00
|
|
|
# PAGE_SIZE] and must be power of 2. Defaults to 512 bytes.
|
2023-04-28 13:54:29 +03:00
|
|
|
#
|
|
|
|
# @serial: the serial number of virtio block device. Defaults to
|
|
|
|
# empty string.
|
2022-05-23 11:46:09 +03:00
|
|
|
#
|
|
|
|
# Since: 7.1
|
|
|
|
##
|
|
|
|
{ 'struct': 'BlockExportOptionsVduseBlk',
|
2022-06-14 08:15:32 +03:00
|
|
|
'data': { 'name': 'str',
|
|
|
|
'*num-queues': 'uint16',
|
2022-05-23 11:46:09 +03:00
|
|
|
'*queue-size': 'uint16',
|
2022-06-14 08:15:31 +03:00
|
|
|
'*logical-block-size': 'size',
|
|
|
|
'*serial': 'str' } }
|
2022-05-23 11:46:09 +03:00
|
|
|
|
2020-09-24 18:27:01 +03:00
|
|
|
##
|
|
|
|
# @NbdServerAddOptions:
|
|
|
|
#
|
2020-10-27 08:05:49 +03:00
|
|
|
# An NBD block export, per legacy nbd-server-add command.
|
2020-09-24 18:27:01 +03:00
|
|
|
#
|
|
|
|
# @device: The device name or node name of the node to be exported
|
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# @writable: Whether clients should be able to write to the device via
|
|
|
|
# the NBD connection (default false).
|
2020-09-24 18:27:11 +03:00
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# @bitmap: Also export a single dirty bitmap reachable from @device,
|
|
|
|
# so the NBD client can use NBD_OPT_SET_META_CONTEXT with the
|
|
|
|
# metadata context name "qemu:dirty-bitmap:BITMAP" to inspect the
|
|
|
|
# bitmap (since 4.0).
|
2020-10-27 08:05:49 +03:00
|
|
|
#
|
2020-09-24 18:27:01 +03:00
|
|
|
# Since: 5.0
|
|
|
|
##
|
|
|
|
{ 'struct': 'NbdServerAddOptions',
|
2020-10-27 08:05:49 +03:00
|
|
|
'base': 'BlockExportOptionsNbdBase',
|
2020-09-24 18:27:11 +03:00
|
|
|
'data': { 'device': 'str',
|
2020-10-27 08:05:49 +03:00
|
|
|
'*writable': 'bool', '*bitmap': 'str' } }
|
2020-09-24 18:26:48 +03:00
|
|
|
|
|
|
|
##
|
|
|
|
# @nbd-server-add:
|
|
|
|
#
|
|
|
|
# Export a block node to QEMU's embedded NBD server.
|
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# The export name will be used as the id for the resulting block
|
|
|
|
# export.
|
2020-09-24 18:27:04 +03:00
|
|
|
#
|
2020-09-24 18:27:13 +03:00
|
|
|
# Features:
|
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# @deprecated: This command is deprecated. Use @block-export-add
|
|
|
|
# instead.
|
|
|
|
#
|
2024-02-27 14:39:12 +03:00
|
|
|
# Errors:
|
|
|
|
# - if the server is not running
|
|
|
|
# - if an export with the same name already exists
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2020-11-18 09:41:58 +03:00
|
|
|
# Since: 1.3
|
2020-09-24 18:26:48 +03:00
|
|
|
##
|
|
|
|
{ 'command': 'nbd-server-add',
|
2020-11-03 12:37:20 +03:00
|
|
|
'data': 'NbdServerAddOptions', 'boxed': true, 'features': ['deprecated'],
|
|
|
|
'allow-preconfig': true }
|
2020-09-24 18:26:48 +03:00
|
|
|
|
|
|
|
##
|
2020-09-24 18:27:06 +03:00
|
|
|
# @BlockExportRemoveMode:
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2020-09-24 18:27:06 +03:00
|
|
|
# Mode for removing a block export.
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# @safe: Remove export if there are no existing connections, fail
|
|
|
|
# otherwise.
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
|
|
|
# @hard: Drop all connections immediately and remove export.
|
|
|
|
#
|
2024-01-29 14:50:06 +03:00
|
|
|
# TODO: Potential additional modes to be added in the future:
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2024-01-29 14:50:06 +03:00
|
|
|
# - hide: Just hide export from new clients, leave existing
|
|
|
|
# connections as is. Remove export after all clients are
|
|
|
|
# disconnected.
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2024-01-29 14:50:06 +03:00
|
|
|
# - soft: Hide export from new clients, answer with ESHUTDOWN for
|
|
|
|
# all further requests from existing clients.
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
|
|
|
# Since: 2.12
|
|
|
|
##
|
2020-09-24 18:27:06 +03:00
|
|
|
{'enum': 'BlockExportRemoveMode', 'data': ['safe', 'hard']}
|
2020-09-24 18:26:48 +03:00
|
|
|
|
|
|
|
##
|
|
|
|
# @nbd-server-remove:
|
|
|
|
#
|
|
|
|
# Remove NBD export by name.
|
|
|
|
#
|
2020-09-24 18:27:06 +03:00
|
|
|
# @name: Block export id.
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# @mode: Mode of command operation. See @BlockExportRemoveMode
|
|
|
|
# description. Default is 'safe'.
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2020-09-24 18:27:13 +03:00
|
|
|
# Features:
|
2023-04-28 13:54:29 +03:00
|
|
|
#
|
|
|
|
# @deprecated: This command is deprecated. Use @block-export-del
|
|
|
|
# instead.
|
2020-09-24 18:27:13 +03:00
|
|
|
#
|
2024-02-27 14:39:12 +03:00
|
|
|
# Errors:
|
|
|
|
# - if the server is not running
|
|
|
|
# - if export is not found
|
|
|
|
# - if mode is 'safe' and there are existing connections
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
|
|
|
# Since: 2.12
|
|
|
|
##
|
|
|
|
{ 'command': 'nbd-server-remove',
|
2020-09-24 18:27:13 +03:00
|
|
|
'data': {'name': 'str', '*mode': 'BlockExportRemoveMode'},
|
2020-11-03 12:37:20 +03:00
|
|
|
'features': ['deprecated'],
|
|
|
|
'allow-preconfig': true }
|
2020-09-24 18:26:48 +03:00
|
|
|
|
|
|
|
##
|
|
|
|
# @nbd-server-stop:
|
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# Stop QEMU's embedded NBD server, and unregister all devices
|
|
|
|
# previously added via @nbd-server-add.
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2020-11-18 09:41:58 +03:00
|
|
|
# Since: 1.3
|
2020-09-24 18:26:48 +03:00
|
|
|
##
|
2020-11-03 12:37:20 +03:00
|
|
|
{ 'command': 'nbd-server-stop',
|
|
|
|
'allow-preconfig': true }
|
2020-09-24 18:26:48 +03:00
|
|
|
|
|
|
|
##
|
|
|
|
# @BlockExportType:
|
|
|
|
#
|
|
|
|
# An enumeration of block export types
|
|
|
|
#
|
|
|
|
# @nbd: NBD export
|
2023-04-28 13:54:29 +03:00
|
|
|
#
|
2020-09-24 18:15:47 +03:00
|
|
|
# @vhost-user-blk: vhost-user-blk export (since 5.2)
|
2023-04-28 13:54:29 +03:00
|
|
|
#
|
2020-10-27 22:05:42 +03:00
|
|
|
# @fuse: FUSE export (since: 6.0)
|
2023-04-28 13:54:29 +03:00
|
|
|
#
|
2022-05-23 11:46:09 +03:00
|
|
|
# @vduse-blk: vduse-blk export (since 7.1)
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
|
|
|
# Since: 4.2
|
|
|
|
##
|
|
|
|
{ 'enum': 'BlockExportType',
|
2022-01-07 13:54:20 +03:00
|
|
|
'data': [ 'nbd',
|
2022-01-19 15:14:39 +03:00
|
|
|
{ 'name': 'vhost-user-blk',
|
|
|
|
'if': 'CONFIG_VHOST_USER_BLK_SERVER' },
|
2022-05-23 11:46:09 +03:00
|
|
|
{ 'name': 'fuse', 'if': 'CONFIG_FUSE' },
|
|
|
|
{ 'name': 'vduse-blk', 'if': 'CONFIG_VDUSE_BLK_EXPORT' } ] }
|
2020-09-24 18:26:48 +03:00
|
|
|
|
|
|
|
##
|
2020-09-24 18:26:49 +03:00
|
|
|
# @BlockExportOptions:
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# Describes a block export, i.e. how single node should be exported on
|
|
|
|
# an external interface.
|
2020-09-24 18:26:48 +03:00
|
|
|
#
|
2024-02-05 10:47:09 +03:00
|
|
|
# @type: Block export type
|
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# @id: A unique identifier for the block export (across all export
|
|
|
|
# types)
|
2020-09-24 18:27:04 +03:00
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# @node-name: The node name of the block node to be exported
|
|
|
|
# (since: 5.2)
|
2020-09-24 18:27:01 +03:00
|
|
|
#
|
2020-09-24 18:27:11 +03:00
|
|
|
# @writable: True if clients should be able to write to the export
|
2023-04-28 13:54:29 +03:00
|
|
|
# (default false)
|
2020-09-24 18:27:11 +03:00
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# @writethrough: If true, caches are flushed after every write request
|
|
|
|
# to the export before completion is signalled. (since: 5.2;
|
|
|
|
# default: false)
|
2020-09-24 18:26:55 +03:00
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# @iothread: The name of the iothread object where the export will
|
|
|
|
# run. The default is to use the thread currently associated with
|
|
|
|
# the block node. (since: 5.2)
|
2020-09-29 15:55:16 +03:00
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# @fixed-iothread: True prevents the block node from being moved to
|
|
|
|
# another thread while the export is active. If true and
|
|
|
|
# @iothread is given, export creation fails if the block node
|
|
|
|
# cannot be moved to the iothread. The default is false.
|
|
|
|
# (since: 5.2)
|
2020-09-29 15:55:16 +03:00
|
|
|
#
|
2020-09-24 18:26:48 +03:00
|
|
|
# Since: 4.2
|
|
|
|
##
|
2020-09-24 18:26:49 +03:00
|
|
|
{ 'union': 'BlockExportOptions',
|
2020-09-24 18:26:55 +03:00
|
|
|
'base': { 'type': 'BlockExportType',
|
2020-09-24 18:27:04 +03:00
|
|
|
'id': 'str',
|
2020-10-01 17:46:03 +03:00
|
|
|
'*fixed-iothread': 'bool',
|
|
|
|
'*iothread': 'str',
|
2020-09-24 18:27:01 +03:00
|
|
|
'node-name': 'str',
|
2020-09-24 18:27:11 +03:00
|
|
|
'*writable': 'bool',
|
2020-09-24 18:26:55 +03:00
|
|
|
'*writethrough': 'bool' },
|
2020-09-24 18:26:48 +03:00
|
|
|
'discriminator': 'type',
|
|
|
|
'data': {
|
2020-09-24 18:15:47 +03:00
|
|
|
'nbd': 'BlockExportOptionsNbd',
|
2022-01-07 13:54:20 +03:00
|
|
|
'vhost-user-blk': { 'type': 'BlockExportOptionsVhostUserBlk',
|
|
|
|
'if': 'CONFIG_VHOST_USER_BLK_SERVER' },
|
2020-10-27 22:05:42 +03:00
|
|
|
'fuse': { 'type': 'BlockExportOptionsFuse',
|
2022-05-23 11:46:09 +03:00
|
|
|
'if': 'CONFIG_FUSE' },
|
|
|
|
'vduse-blk': { 'type': 'BlockExportOptionsVduseBlk',
|
|
|
|
'if': 'CONFIG_VDUSE_BLK_EXPORT' }
|
2020-09-24 18:26:48 +03:00
|
|
|
} }
|
2020-09-24 18:26:50 +03:00
|
|
|
|
|
|
|
##
|
|
|
|
# @block-export-add:
|
|
|
|
#
|
|
|
|
# Creates a new block export.
|
|
|
|
#
|
|
|
|
# Since: 5.2
|
|
|
|
##
|
|
|
|
{ 'command': 'block-export-add',
|
2020-11-03 12:37:20 +03:00
|
|
|
'data': 'BlockExportOptions', 'boxed': true,
|
|
|
|
'allow-preconfig': true }
|
2020-09-24 18:27:06 +03:00
|
|
|
|
|
|
|
##
|
|
|
|
# @block-export-del:
|
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# Request to remove a block export. This drops the user's reference
|
|
|
|
# to the export, but the export may still stay around after this
|
|
|
|
# command returns until the shutdown of the export has completed.
|
2020-09-24 18:27:06 +03:00
|
|
|
#
|
|
|
|
# @id: Block export id.
|
|
|
|
#
|
2023-04-28 13:54:29 +03:00
|
|
|
# @mode: Mode of command operation. See @BlockExportRemoveMode
|
|
|
|
# description. Default is 'safe'.
|
2020-09-24 18:27:06 +03:00
|
|
|
#
|
2024-02-27 14:39:12 +03:00
|
|
|
# Errors:
|
|
|
|
# - if the export is not found
|
|
|
|
# - if @mode is 'safe' and the export is still in use (e.g. by
|
|
|
|
# existing client connections)
|
2020-09-24 18:27:06 +03:00
|
|
|
#
|
|
|
|
# Since: 5.2
|
|
|
|
##
|
|
|
|
{ 'command': 'block-export-del',
|
2020-11-03 12:37:20 +03:00
|
|
|
'data': { 'id': 'str', '*mode': 'BlockExportRemoveMode' },
|
|
|
|
'allow-preconfig': true }
|
2020-09-24 18:27:07 +03:00
|
|
|
|
|
|
|
##
|
|
|
|
# @BLOCK_EXPORT_DELETED:
|
|
|
|
#
|
|
|
|
# Emitted when a block export is removed and its id can be reused.
|
|
|
|
#
|
|
|
|
# @id: Block export id.
|
|
|
|
#
|
|
|
|
# Since: 5.2
|
|
|
|
##
|
|
|
|
{ 'event': 'BLOCK_EXPORT_DELETED',
|
|
|
|
'data': { 'id': 'str' } }
|
2020-09-24 18:27:10 +03:00
|
|
|
|
|
|
|
##
|
|
|
|
# @BlockExportInfo:
|
|
|
|
#
|
|
|
|
# Information about a single block export.
|
|
|
|
#
|
|
|
|
# @id: The unique identifier for the block export
|
|
|
|
#
|
|
|
|
# @type: The block export type
|
|
|
|
#
|
|
|
|
# @node-name: The node name of the block node that is exported
|
|
|
|
#
|
|
|
|
# @shutting-down: True if the export is shutting down (e.g. after a
|
2023-04-28 13:54:29 +03:00
|
|
|
# block-export-del command, but before the shutdown has completed)
|
2020-09-24 18:27:10 +03:00
|
|
|
#
|
2022-05-03 10:37:35 +03:00
|
|
|
# Since: 5.2
|
2020-09-24 18:27:10 +03:00
|
|
|
##
|
|
|
|
{ 'struct': 'BlockExportInfo',
|
|
|
|
'data': { 'id': 'str',
|
|
|
|
'type': 'BlockExportType',
|
|
|
|
'node-name': 'str',
|
|
|
|
'shutting-down': 'bool' } }
|
|
|
|
|
|
|
|
##
|
|
|
|
# @query-block-exports:
|
|
|
|
#
|
|
|
|
# Returns: A list of BlockExportInfo describing all block exports
|
|
|
|
#
|
|
|
|
# Since: 5.2
|
|
|
|
##
|
2020-11-03 12:37:20 +03:00
|
|
|
{ 'command': 'query-block-exports', 'returns': ['BlockExportInfo'],
|
|
|
|
'allow-preconfig': true }
|