quorum: Avoid bdrv_aio_writev() for rewrites
[qemu.git] / io / channel-tls.c
1 /*
2 * QEMU I/O channels TLS driver
3 *
4 * Copyright (c) 2015 Red Hat, Inc.
5 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2 of the License, or (at your option) any later version.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
18 *
19 */
20
21 #include "qemu/osdep.h"
22 #include "qapi/error.h"
23 #include "io/channel-tls.h"
24 #include "trace.h"
25
26
27 static ssize_t qio_channel_tls_write_handler(const char *buf,
28 size_t len,
29 void *opaque)
30 {
31 QIOChannelTLS *tioc = QIO_CHANNEL_TLS(opaque);
32 ssize_t ret;
33
34 ret = qio_channel_write(tioc->master, buf, len, NULL);
35 if (ret == QIO_CHANNEL_ERR_BLOCK) {
36 errno = EAGAIN;
37 return -1;
38 } else if (ret < 0) {
39 errno = EIO;
40 return -1;
41 }
42 return ret;
43 }
44
45 static ssize_t qio_channel_tls_read_handler(char *buf,
46 size_t len,
47 void *opaque)
48 {
49 QIOChannelTLS *tioc = QIO_CHANNEL_TLS(opaque);
50 ssize_t ret;
51
52 ret = qio_channel_read(tioc->master, buf, len, NULL);
53 if (ret == QIO_CHANNEL_ERR_BLOCK) {
54 errno = EAGAIN;
55 return -1;
56 } else if (ret < 0) {
57 errno = EIO;
58 return -1;
59 }
60 return ret;
61 }
62
63
64 QIOChannelTLS *
65 qio_channel_tls_new_server(QIOChannel *master,
66 QCryptoTLSCreds *creds,
67 const char *aclname,
68 Error **errp)
69 {
70 QIOChannelTLS *ioc;
71
72 ioc = QIO_CHANNEL_TLS(object_new(TYPE_QIO_CHANNEL_TLS));
73
74 ioc->master = master;
75 object_ref(OBJECT(master));
76
77 ioc->session = qcrypto_tls_session_new(
78 creds,
79 NULL,
80 aclname,
81 QCRYPTO_TLS_CREDS_ENDPOINT_SERVER,
82 errp);
83 if (!ioc->session) {
84 goto error;
85 }
86
87 qcrypto_tls_session_set_callbacks(
88 ioc->session,
89 qio_channel_tls_write_handler,
90 qio_channel_tls_read_handler,
91 ioc);
92
93 trace_qio_channel_tls_new_server(ioc, master, creds, aclname);
94 return ioc;
95
96 error:
97 object_unref(OBJECT(ioc));
98 return NULL;
99 }
100
101 QIOChannelTLS *
102 qio_channel_tls_new_client(QIOChannel *master,
103 QCryptoTLSCreds *creds,
104 const char *hostname,
105 Error **errp)
106 {
107 QIOChannelTLS *tioc;
108 QIOChannel *ioc;
109
110 tioc = QIO_CHANNEL_TLS(object_new(TYPE_QIO_CHANNEL_TLS));
111 ioc = QIO_CHANNEL(tioc);
112
113 tioc->master = master;
114 if (qio_channel_has_feature(master, QIO_CHANNEL_FEATURE_SHUTDOWN)) {
115 qio_channel_set_feature(ioc, QIO_CHANNEL_FEATURE_SHUTDOWN);
116 }
117 object_ref(OBJECT(master));
118
119 tioc->session = qcrypto_tls_session_new(
120 creds,
121 hostname,
122 NULL,
123 QCRYPTO_TLS_CREDS_ENDPOINT_CLIENT,
124 errp);
125 if (!tioc->session) {
126 goto error;
127 }
128
129 qcrypto_tls_session_set_callbacks(
130 tioc->session,
131 qio_channel_tls_write_handler,
132 qio_channel_tls_read_handler,
133 tioc);
134
135 trace_qio_channel_tls_new_client(tioc, master, creds, hostname);
136 return tioc;
137
138 error:
139 object_unref(OBJECT(tioc));
140 return NULL;
141 }
142
143
144 static gboolean qio_channel_tls_handshake_io(QIOChannel *ioc,
145 GIOCondition condition,
146 gpointer user_data);
147
148 static void qio_channel_tls_handshake_task(QIOChannelTLS *ioc,
149 QIOTask *task)
150 {
151 Error *err = NULL;
152 QCryptoTLSSessionHandshakeStatus status;
153
154 if (qcrypto_tls_session_handshake(ioc->session, &err) < 0) {
155 trace_qio_channel_tls_handshake_fail(ioc);
156 qio_task_abort(task, err);
157 goto cleanup;
158 }
159
160 status = qcrypto_tls_session_get_handshake_status(ioc->session);
161 if (status == QCRYPTO_TLS_HANDSHAKE_COMPLETE) {
162 trace_qio_channel_tls_handshake_complete(ioc);
163 if (qcrypto_tls_session_check_credentials(ioc->session,
164 &err) < 0) {
165 trace_qio_channel_tls_credentials_deny(ioc);
166 qio_task_abort(task, err);
167 goto cleanup;
168 }
169 trace_qio_channel_tls_credentials_allow(ioc);
170 qio_task_complete(task);
171 } else {
172 GIOCondition condition;
173 if (status == QCRYPTO_TLS_HANDSHAKE_SENDING) {
174 condition = G_IO_OUT;
175 } else {
176 condition = G_IO_IN;
177 }
178
179 trace_qio_channel_tls_handshake_pending(ioc, status);
180 qio_channel_add_watch(ioc->master,
181 condition,
182 qio_channel_tls_handshake_io,
183 task,
184 NULL);
185 }
186
187 cleanup:
188 error_free(err);
189 }
190
191
192 static gboolean qio_channel_tls_handshake_io(QIOChannel *ioc,
193 GIOCondition condition,
194 gpointer user_data)
195 {
196 QIOTask *task = user_data;
197 QIOChannelTLS *tioc = QIO_CHANNEL_TLS(
198 qio_task_get_source(task));
199
200 qio_channel_tls_handshake_task(
201 tioc, task);
202
203 object_unref(OBJECT(tioc));
204
205 return FALSE;
206 }
207
208 void qio_channel_tls_handshake(QIOChannelTLS *ioc,
209 QIOTaskFunc func,
210 gpointer opaque,
211 GDestroyNotify destroy)
212 {
213 QIOTask *task;
214
215 task = qio_task_new(OBJECT(ioc),
216 func, opaque, destroy);
217
218 trace_qio_channel_tls_handshake_start(ioc);
219 qio_channel_tls_handshake_task(ioc, task);
220 }
221
222
223 static void qio_channel_tls_init(Object *obj G_GNUC_UNUSED)
224 {
225 }
226
227
228 static void qio_channel_tls_finalize(Object *obj)
229 {
230 QIOChannelTLS *ioc = QIO_CHANNEL_TLS(obj);
231
232 object_unref(OBJECT(ioc->master));
233 qcrypto_tls_session_free(ioc->session);
234 }
235
236
237 static ssize_t qio_channel_tls_readv(QIOChannel *ioc,
238 const struct iovec *iov,
239 size_t niov,
240 int **fds,
241 size_t *nfds,
242 Error **errp)
243 {
244 QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
245 size_t i;
246 ssize_t got = 0;
247
248 for (i = 0 ; i < niov ; i++) {
249 ssize_t ret = qcrypto_tls_session_read(tioc->session,
250 iov[i].iov_base,
251 iov[i].iov_len);
252 if (ret < 0) {
253 if (errno == EAGAIN) {
254 if (got) {
255 return got;
256 } else {
257 return QIO_CHANNEL_ERR_BLOCK;
258 }
259 }
260
261 error_setg_errno(errp, errno,
262 "Cannot read from TLS channel");
263 return -1;
264 }
265 got += ret;
266 if (ret < iov[i].iov_len) {
267 break;
268 }
269 }
270 return got;
271 }
272
273
274 static ssize_t qio_channel_tls_writev(QIOChannel *ioc,
275 const struct iovec *iov,
276 size_t niov,
277 int *fds,
278 size_t nfds,
279 Error **errp)
280 {
281 QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
282 size_t i;
283 ssize_t done = 0;
284
285 for (i = 0 ; i < niov ; i++) {
286 ssize_t ret = qcrypto_tls_session_write(tioc->session,
287 iov[i].iov_base,
288 iov[i].iov_len);
289 if (ret <= 0) {
290 if (errno == EAGAIN) {
291 if (done) {
292 return done;
293 } else {
294 return QIO_CHANNEL_ERR_BLOCK;
295 }
296 }
297
298 error_setg_errno(errp, errno,
299 "Cannot write to TLS channel");
300 return -1;
301 }
302 done += ret;
303 if (ret < iov[i].iov_len) {
304 break;
305 }
306 }
307 return done;
308 }
309
310 static int qio_channel_tls_set_blocking(QIOChannel *ioc,
311 bool enabled,
312 Error **errp)
313 {
314 QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
315
316 return qio_channel_set_blocking(tioc->master, enabled, errp);
317 }
318
319 static void qio_channel_tls_set_delay(QIOChannel *ioc,
320 bool enabled)
321 {
322 QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
323
324 qio_channel_set_delay(tioc->master, enabled);
325 }
326
327 static void qio_channel_tls_set_cork(QIOChannel *ioc,
328 bool enabled)
329 {
330 QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
331
332 qio_channel_set_cork(tioc->master, enabled);
333 }
334
335 static int qio_channel_tls_shutdown(QIOChannel *ioc,
336 QIOChannelShutdown how,
337 Error **errp)
338 {
339 QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
340
341 return qio_channel_shutdown(tioc->master, how, errp);
342 }
343
344 static int qio_channel_tls_close(QIOChannel *ioc,
345 Error **errp)
346 {
347 QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
348
349 return qio_channel_close(tioc->master, errp);
350 }
351
352 static GSource *qio_channel_tls_create_watch(QIOChannel *ioc,
353 GIOCondition condition)
354 {
355 QIOChannelTLS *tioc = QIO_CHANNEL_TLS(ioc);
356
357 return qio_channel_create_watch(tioc->master, condition);
358 }
359
360 QCryptoTLSSession *
361 qio_channel_tls_get_session(QIOChannelTLS *ioc)
362 {
363 return ioc->session;
364 }
365
366 static void qio_channel_tls_class_init(ObjectClass *klass,
367 void *class_data G_GNUC_UNUSED)
368 {
369 QIOChannelClass *ioc_klass = QIO_CHANNEL_CLASS(klass);
370
371 ioc_klass->io_writev = qio_channel_tls_writev;
372 ioc_klass->io_readv = qio_channel_tls_readv;
373 ioc_klass->io_set_blocking = qio_channel_tls_set_blocking;
374 ioc_klass->io_set_delay = qio_channel_tls_set_delay;
375 ioc_klass->io_set_cork = qio_channel_tls_set_cork;
376 ioc_klass->io_close = qio_channel_tls_close;
377 ioc_klass->io_shutdown = qio_channel_tls_shutdown;
378 ioc_klass->io_create_watch = qio_channel_tls_create_watch;
379 }
380
381 static const TypeInfo qio_channel_tls_info = {
382 .parent = TYPE_QIO_CHANNEL,
383 .name = TYPE_QIO_CHANNEL_TLS,
384 .instance_size = sizeof(QIOChannelTLS),
385 .instance_init = qio_channel_tls_init,
386 .instance_finalize = qio_channel_tls_finalize,
387 .class_init = qio_channel_tls_class_init,
388 };
389
390 static void qio_channel_tls_register_types(void)
391 {
392 type_register_static(&qio_channel_tls_info);
393 }
394
395 type_init(qio_channel_tls_register_types);