1f27aaf4bSChristian Brunner /* 2f27aaf4bSChristian Brunner * QEMU Block driver for RADOS (Ceph) 3f27aaf4bSChristian Brunner * 4ad32e9c0SJosh Durgin * Copyright (C) 2010-2011 Christian Brunner <chb@muc.de>, 5ad32e9c0SJosh Durgin * Josh Durgin <josh.durgin@dreamhost.com> 6f27aaf4bSChristian Brunner * 7f27aaf4bSChristian Brunner * This work is licensed under the terms of the GNU GPL, version 2. See 8f27aaf4bSChristian Brunner * the COPYING file in the top-level directory. 9f27aaf4bSChristian Brunner * 106b620ca3SPaolo Bonzini * Contributions after 2012-01-13 are licensed under the terms of the 116b620ca3SPaolo Bonzini * GNU GPL, version 2 or (at your option) any later version. 12f27aaf4bSChristian Brunner */ 13f27aaf4bSChristian Brunner 1480c71a24SPeter Maydell #include "qemu/osdep.h" 15ad32e9c0SJosh Durgin 162836284dSMarkus Armbruster #include <rbd/librbd.h> 17da34e65cSMarkus Armbruster #include "qapi/error.h" 181de7afc9SPaolo Bonzini #include "qemu/error-report.h" 190b8fa32fSMarkus Armbruster #include "qemu/module.h" 20922a01a0SMarkus Armbruster #include "qemu/option.h" 21e2c1c34fSMarkus Armbruster #include "block/block-io.h" 22737e150eSPaolo Bonzini #include "block/block_int.h" 23609f45eaSMax Reitz #include "block/qdict.h" 2460390a21SDaniel P. Berrange #include "crypto/secret.h" 25f348b6d1SVeronia Bahaa #include "qemu/cutils.h" 26e4ec5ad4SPavel Dovgalyuk #include "sysemu/replay.h" 27c7cacb3eSJeff Cody #include "qapi/qmp/qstring.h" 28452fcdbcSMarkus Armbruster #include "qapi/qmp/qdict.h" 29e98c6961SEric Blake #include "qapi/qmp/qjson.h" 3047e6b297SMarkus Armbruster #include "qapi/qmp/qlist.h" 314bfb2741SKevin Wolf #include "qapi/qobject-input-visitor.h" 324bfb2741SKevin Wolf #include "qapi/qapi-visit-block-core.h" 33f27aaf4bSChristian Brunner 34f27aaf4bSChristian Brunner /* 35f27aaf4bSChristian Brunner * When specifying the image filename use: 36f27aaf4bSChristian Brunner * 37fab5cf59SJosh Durgin * rbd:poolname/devicename[@snapshotname][:option1=value1[:option2=value2...]] 38f27aaf4bSChristian Brunner * 399e1fbcdeSSage Weil * poolname must be the name of an existing rados pool. 40f27aaf4bSChristian Brunner * 419e1fbcdeSSage Weil * devicename is the name of the rbd image. 42f27aaf4bSChristian Brunner * 439e1fbcdeSSage Weil * Each option given is used to configure rados, and may be any valid 449e1fbcdeSSage Weil * Ceph option, "id", or "conf". 45fab5cf59SJosh Durgin * 469e1fbcdeSSage Weil * The "id" option indicates what user we should authenticate as to 479e1fbcdeSSage Weil * the Ceph cluster. If it is excluded we will use the Ceph default 489e1fbcdeSSage Weil * (normally 'admin'). 49f27aaf4bSChristian Brunner * 509e1fbcdeSSage Weil * The "conf" option specifies a Ceph configuration file to read. If 519e1fbcdeSSage Weil * it is not specified, we will read from the default Ceph locations 529e1fbcdeSSage Weil * (e.g., /etc/ceph/ceph.conf). To avoid reading _any_ configuration 539e1fbcdeSSage Weil * file, specify conf=/dev/null. 54f27aaf4bSChristian Brunner * 559e1fbcdeSSage Weil * Configuration values containing :, @, or = can be escaped with a 569e1fbcdeSSage Weil * leading "\". 57f27aaf4bSChristian Brunner */ 58f27aaf4bSChristian Brunner 59f27aaf4bSChristian Brunner #define OBJ_MAX_SIZE (1UL << OBJ_DEFAULT_OBJ_ORDER) 60f27aaf4bSChristian Brunner 61ad32e9c0SJosh Durgin #define RBD_MAX_SNAPS 100 62ad32e9c0SJosh Durgin 6342e4ac9eSOr Ozeri #define RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN 8 6442e4ac9eSOr Ozeri 6542e4ac9eSOr Ozeri static const char rbd_luks_header_verification[ 6642e4ac9eSOr Ozeri RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = { 6742e4ac9eSOr Ozeri 'L', 'U', 'K', 'S', 0xBA, 0xBE, 0, 1 6842e4ac9eSOr Ozeri }; 6942e4ac9eSOr Ozeri 7042e4ac9eSOr Ozeri static const char rbd_luks2_header_verification[ 7142e4ac9eSOr Ozeri RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = { 7242e4ac9eSOr Ozeri 'L', 'U', 'K', 'S', 0xBA, 0xBE, 0, 2 7342e4ac9eSOr Ozeri }; 7442e4ac9eSOr Ozeri 750f385a24SOr Ozeri static const char rbd_layered_luks_header_verification[ 760f385a24SOr Ozeri RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = { 770f385a24SOr Ozeri 'R', 'B', 'D', 'L', 0xBA, 0xBE, 0, 1 780f385a24SOr Ozeri }; 790f385a24SOr Ozeri 800f385a24SOr Ozeri static const char rbd_layered_luks2_header_verification[ 810f385a24SOr Ozeri RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = { 820f385a24SOr Ozeri 'R', 'B', 'D', 'L', 0xBA, 0xBE, 0, 2 830f385a24SOr Ozeri }; 840f385a24SOr Ozeri 85787f3133SJosh Durgin typedef enum { 86787f3133SJosh Durgin RBD_AIO_READ, 87787f3133SJosh Durgin RBD_AIO_WRITE, 88dc7588c1SJosh Durgin RBD_AIO_DISCARD, 89c56ac27dSPeter Lieven RBD_AIO_FLUSH, 90c56ac27dSPeter Lieven RBD_AIO_WRITE_ZEROES 91787f3133SJosh Durgin } RBDAIOCmd; 92787f3133SJosh Durgin 93f27aaf4bSChristian Brunner typedef struct BDRVRBDState { 94ad32e9c0SJosh Durgin rados_t cluster; 95ad32e9c0SJosh Durgin rados_ioctx_t io_ctx; 96ad32e9c0SJosh Durgin rbd_image_t image; 9780b61a27SJeff Cody char *image_name; 98ad32e9c0SJosh Durgin char *snap; 9919ae9ae0SFlorian Florensa char *namespace; 100d24f8023SStefano Garzarella uint64_t image_size; 101832a93dcSPeter Lieven uint64_t object_size; 102f27aaf4bSChristian Brunner } BDRVRBDState; 103f27aaf4bSChristian Brunner 104c3e5fac5SPeter Lieven typedef struct RBDTask { 105c3e5fac5SPeter Lieven BlockDriverState *bs; 106c3e5fac5SPeter Lieven Coroutine *co; 107c3e5fac5SPeter Lieven bool complete; 108c3e5fac5SPeter Lieven int64_t ret; 109c3e5fac5SPeter Lieven } RBDTask; 110c3e5fac5SPeter Lieven 1110347a8fdSPeter Lieven typedef struct RBDDiffIterateReq { 1120347a8fdSPeter Lieven uint64_t offs; 1130347a8fdSPeter Lieven uint64_t bytes; 1140347a8fdSPeter Lieven bool exists; 1150347a8fdSPeter Lieven } RBDDiffIterateReq; 1160347a8fdSPeter Lieven 117aa045c2dSKevin Wolf static int qemu_rbd_connect(rados_t *cluster, rados_ioctx_t *io_ctx, 118aa045c2dSKevin Wolf BlockdevOptionsRbd *opts, bool cache, 119aa045c2dSKevin Wolf const char *keypairs, const char *secretid, 120aa045c2dSKevin Wolf Error **errp); 121aa045c2dSKevin Wolf 1222b99cfceSConnor Kuehl static char *qemu_rbd_strchr(char *src, char delim) 1232b99cfceSConnor Kuehl { 1242b99cfceSConnor Kuehl char *p; 1252b99cfceSConnor Kuehl 1262b99cfceSConnor Kuehl for (p = src; *p; ++p) { 1272b99cfceSConnor Kuehl if (*p == delim) { 1282b99cfceSConnor Kuehl return p; 1292b99cfceSConnor Kuehl } 1302b99cfceSConnor Kuehl if (*p == '\\' && p[1] != '\0') { 1312b99cfceSConnor Kuehl ++p; 1322b99cfceSConnor Kuehl } 1332b99cfceSConnor Kuehl } 1342b99cfceSConnor Kuehl 1352b99cfceSConnor Kuehl return NULL; 1362b99cfceSConnor Kuehl } 1372b99cfceSConnor Kuehl 1382b99cfceSConnor Kuehl 139730b00bbSMarkus Armbruster static char *qemu_rbd_next_tok(char *src, char delim, char **p) 140f27aaf4bSChristian Brunner { 141f27aaf4bSChristian Brunner char *end; 142f27aaf4bSChristian Brunner 143f27aaf4bSChristian Brunner *p = NULL; 144f27aaf4bSChristian Brunner 1452b99cfceSConnor Kuehl end = qemu_rbd_strchr(src, delim); 1462b99cfceSConnor Kuehl if (end) { 147f27aaf4bSChristian Brunner *p = end + 1; 148f27aaf4bSChristian Brunner *end = '\0'; 149f27aaf4bSChristian Brunner } 1507830f909SJeff Cody return src; 151f27aaf4bSChristian Brunner } 152f27aaf4bSChristian Brunner 15316a06b24SSage Weil static void qemu_rbd_unescape(char *src) 15416a06b24SSage Weil { 15516a06b24SSage Weil char *p; 15616a06b24SSage Weil 15716a06b24SSage Weil for (p = src; *src; ++src, ++p) { 15816a06b24SSage Weil if (*src == '\\' && src[1] != '\0') { 15916a06b24SSage Weil src++; 16016a06b24SSage Weil } 16116a06b24SSage Weil *p = *src; 16216a06b24SSage Weil } 16316a06b24SSage Weil *p = '\0'; 16416a06b24SSage Weil } 16516a06b24SSage Weil 166c7cacb3eSJeff Cody static void qemu_rbd_parse_filename(const char *filename, QDict *options, 167d61563b2SMarkus Armbruster Error **errp) 168f27aaf4bSChristian Brunner { 169f27aaf4bSChristian Brunner const char *start; 170e98c6961SEric Blake char *p, *buf; 171e98c6961SEric Blake QList *keypairs = NULL; 17219ae9ae0SFlorian Florensa char *found_str, *image_name; 173f27aaf4bSChristian Brunner 174f27aaf4bSChristian Brunner if (!strstart(filename, "rbd:", &start)) { 175d61563b2SMarkus Armbruster error_setg(errp, "File name must start with 'rbd:'"); 176c7cacb3eSJeff Cody return; 177f27aaf4bSChristian Brunner } 178f27aaf4bSChristian Brunner 1797267c094SAnthony Liguori buf = g_strdup(start); 180f27aaf4bSChristian Brunner p = buf; 181f27aaf4bSChristian Brunner 182730b00bbSMarkus Armbruster found_str = qemu_rbd_next_tok(p, '/', &p); 1837830f909SJeff Cody if (!p) { 1847830f909SJeff Cody error_setg(errp, "Pool name is required"); 1857830f909SJeff Cody goto done; 1867830f909SJeff Cody } 1877830f909SJeff Cody qemu_rbd_unescape(found_str); 18846f5ac20SEric Blake qdict_put_str(options, "pool", found_str); 189fab5cf59SJosh Durgin 1902b99cfceSConnor Kuehl if (qemu_rbd_strchr(p, '@')) { 19119ae9ae0SFlorian Florensa image_name = qemu_rbd_next_tok(p, '@', &p); 1927830f909SJeff Cody 193730b00bbSMarkus Armbruster found_str = qemu_rbd_next_tok(p, ':', &p); 1947830f909SJeff Cody qemu_rbd_unescape(found_str); 19546f5ac20SEric Blake qdict_put_str(options, "snapshot", found_str); 1967830f909SJeff Cody } else { 19719ae9ae0SFlorian Florensa image_name = qemu_rbd_next_tok(p, ':', &p); 1987830f909SJeff Cody } 19919ae9ae0SFlorian Florensa /* Check for namespace in the image_name */ 2002b99cfceSConnor Kuehl if (qemu_rbd_strchr(image_name, '/')) { 20119ae9ae0SFlorian Florensa found_str = qemu_rbd_next_tok(image_name, '/', &image_name); 20219ae9ae0SFlorian Florensa qemu_rbd_unescape(found_str); 20319ae9ae0SFlorian Florensa qdict_put_str(options, "namespace", found_str); 20419ae9ae0SFlorian Florensa } else { 20519ae9ae0SFlorian Florensa qdict_put_str(options, "namespace", ""); 20619ae9ae0SFlorian Florensa } 20719ae9ae0SFlorian Florensa qemu_rbd_unescape(image_name); 20819ae9ae0SFlorian Florensa qdict_put_str(options, "image", image_name); 2097830f909SJeff Cody if (!p) { 210f27aaf4bSChristian Brunner goto done; 211f27aaf4bSChristian Brunner } 212f27aaf4bSChristian Brunner 213c7cacb3eSJeff Cody /* The following are essentially all key/value pairs, and we treat 214c7cacb3eSJeff Cody * 'id' and 'conf' a bit special. Key/value pairs may be in any order. */ 215c7cacb3eSJeff Cody while (p) { 216c7cacb3eSJeff Cody char *name, *value; 217730b00bbSMarkus Armbruster name = qemu_rbd_next_tok(p, '=', &p); 218c7cacb3eSJeff Cody if (!p) { 219c7cacb3eSJeff Cody error_setg(errp, "conf option %s has no value", name); 220c7cacb3eSJeff Cody break; 221c7cacb3eSJeff Cody } 222c7cacb3eSJeff Cody 223c7cacb3eSJeff Cody qemu_rbd_unescape(name); 224c7cacb3eSJeff Cody 225730b00bbSMarkus Armbruster value = qemu_rbd_next_tok(p, ':', &p); 226c7cacb3eSJeff Cody qemu_rbd_unescape(value); 227c7cacb3eSJeff Cody 228c7cacb3eSJeff Cody if (!strcmp(name, "conf")) { 22946f5ac20SEric Blake qdict_put_str(options, "conf", value); 230c7cacb3eSJeff Cody } else if (!strcmp(name, "id")) { 23146f5ac20SEric Blake qdict_put_str(options, "user", value); 232c7cacb3eSJeff Cody } else { 233e98c6961SEric Blake /* 234e98c6961SEric Blake * We pass these internally to qemu_rbd_set_keypairs(), so 235e98c6961SEric Blake * we can get away with the simpler list of [ "key1", 236e98c6961SEric Blake * "value1", "key2", "value2" ] rather than a raw dict 237e98c6961SEric Blake * { "key1": "value1", "key2": "value2" } where we can't 238e98c6961SEric Blake * guarantee order, or even a more correct but complex 239e98c6961SEric Blake * [ { "key1": "value1" }, { "key2": "value2" } ] 240e98c6961SEric Blake */ 241e98c6961SEric Blake if (!keypairs) { 242e98c6961SEric Blake keypairs = qlist_new(); 243c7cacb3eSJeff Cody } 24446f5ac20SEric Blake qlist_append_str(keypairs, name); 24546f5ac20SEric Blake qlist_append_str(keypairs, value); 246c7cacb3eSJeff Cody } 247c7cacb3eSJeff Cody } 248c7cacb3eSJeff Cody 249e98c6961SEric Blake if (keypairs) { 250e98c6961SEric Blake qdict_put(options, "=keyvalue-pairs", 251eab3a467SMarkus Armbruster qstring_from_gstring(qobject_to_json(QOBJECT(keypairs)))); 252c7cacb3eSJeff Cody } 253c7cacb3eSJeff Cody 254f27aaf4bSChristian Brunner done: 2557267c094SAnthony Liguori g_free(buf); 256cb3e7f08SMarc-André Lureau qobject_unref(keypairs); 257c7cacb3eSJeff Cody return; 2587c7e9df0SSage Weil } 2597c7e9df0SSage Weil 260d083f954SMarkus Armbruster static int qemu_rbd_set_auth(rados_t cluster, BlockdevOptionsRbd *opts, 26160390a21SDaniel P. Berrange Error **errp) 26260390a21SDaniel P. Berrange { 263d083f954SMarkus Armbruster char *key, *acr; 264a3699de4SMarkus Armbruster int r; 265a3699de4SMarkus Armbruster GString *accu; 266a3699de4SMarkus Armbruster RbdAuthModeList *auth; 26760390a21SDaniel P. Berrange 268d083f954SMarkus Armbruster if (opts->key_secret) { 269d083f954SMarkus Armbruster key = qcrypto_secret_lookup_as_base64(opts->key_secret, errp); 270d083f954SMarkus Armbruster if (!key) { 271d083f954SMarkus Armbruster return -EIO; 27260390a21SDaniel P. Berrange } 273d083f954SMarkus Armbruster r = rados_conf_set(cluster, "key", key); 274d083f954SMarkus Armbruster g_free(key); 275d083f954SMarkus Armbruster if (r < 0) { 276d083f954SMarkus Armbruster error_setg_errno(errp, -r, "Could not set 'key'"); 277d083f954SMarkus Armbruster return r; 278d083f954SMarkus Armbruster } 279a3699de4SMarkus Armbruster } 280a3699de4SMarkus Armbruster 281a3699de4SMarkus Armbruster if (opts->has_auth_client_required) { 282a3699de4SMarkus Armbruster accu = g_string_new(""); 283a3699de4SMarkus Armbruster for (auth = opts->auth_client_required; auth; auth = auth->next) { 284a3699de4SMarkus Armbruster if (accu->str[0]) { 285a3699de4SMarkus Armbruster g_string_append_c(accu, ';'); 286a3699de4SMarkus Armbruster } 287a3699de4SMarkus Armbruster g_string_append(accu, RbdAuthMode_str(auth->value)); 288a3699de4SMarkus Armbruster } 289a3699de4SMarkus Armbruster acr = g_string_free(accu, FALSE); 290a3699de4SMarkus Armbruster r = rados_conf_set(cluster, "auth_client_required", acr); 291a3699de4SMarkus Armbruster g_free(acr); 292a3699de4SMarkus Armbruster if (r < 0) { 293a3699de4SMarkus Armbruster error_setg_errno(errp, -r, 294a3699de4SMarkus Armbruster "Could not set 'auth_client_required'"); 295a3699de4SMarkus Armbruster return r; 296a3699de4SMarkus Armbruster } 297a3699de4SMarkus Armbruster } 29860390a21SDaniel P. Berrange 29960390a21SDaniel P. Berrange return 0; 30060390a21SDaniel P. Berrange } 30160390a21SDaniel P. Berrange 302e98c6961SEric Blake static int qemu_rbd_set_keypairs(rados_t cluster, const char *keypairs_json, 303e34d8f29SJosh Durgin Error **errp) 304fab5cf59SJosh Durgin { 305e98c6961SEric Blake QList *keypairs; 306e98c6961SEric Blake QString *name; 307e98c6961SEric Blake QString *value; 308e98c6961SEric Blake const char *key; 309e98c6961SEric Blake size_t remaining; 310fab5cf59SJosh Durgin int ret = 0; 311fab5cf59SJosh Durgin 312e98c6961SEric Blake if (!keypairs_json) { 313e98c6961SEric Blake return ret; 314fab5cf59SJosh Durgin } 3157dc847ebSMax Reitz keypairs = qobject_to(QList, 3167dc847ebSMax Reitz qobject_from_json(keypairs_json, &error_abort)); 317e98c6961SEric Blake remaining = qlist_size(keypairs) / 2; 318e98c6961SEric Blake assert(remaining); 319fab5cf59SJosh Durgin 320e98c6961SEric Blake while (remaining--) { 3217dc847ebSMax Reitz name = qobject_to(QString, qlist_pop(keypairs)); 3227dc847ebSMax Reitz value = qobject_to(QString, qlist_pop(keypairs)); 323e98c6961SEric Blake assert(name && value); 324e98c6961SEric Blake key = qstring_get_str(name); 325fab5cf59SJosh Durgin 326e98c6961SEric Blake ret = rados_conf_set(cluster, key, qstring_get_str(value)); 327cb3e7f08SMarc-André Lureau qobject_unref(value); 328fab5cf59SJosh Durgin if (ret < 0) { 329e98c6961SEric Blake error_setg_errno(errp, -ret, "invalid conf option %s", key); 330cb3e7f08SMarc-André Lureau qobject_unref(name); 331fab5cf59SJosh Durgin ret = -EINVAL; 332fab5cf59SJosh Durgin break; 333fab5cf59SJosh Durgin } 334cb3e7f08SMarc-André Lureau qobject_unref(name); 335fab5cf59SJosh Durgin } 336fab5cf59SJosh Durgin 337cb3e7f08SMarc-André Lureau qobject_unref(keypairs); 338fab5cf59SJosh Durgin return ret; 339fab5cf59SJosh Durgin } 340fab5cf59SJosh Durgin 34142e4ac9eSOr Ozeri #ifdef LIBRBD_SUPPORTS_ENCRYPTION 34242e4ac9eSOr Ozeri static int qemu_rbd_convert_luks_options( 34342e4ac9eSOr Ozeri RbdEncryptionOptionsLUKSBase *luks_opts, 34442e4ac9eSOr Ozeri char **passphrase, 34542e4ac9eSOr Ozeri size_t *passphrase_len, 34642e4ac9eSOr Ozeri Error **errp) 34742e4ac9eSOr Ozeri { 34842e4ac9eSOr Ozeri return qcrypto_secret_lookup(luks_opts->key_secret, (uint8_t **)passphrase, 34942e4ac9eSOr Ozeri passphrase_len, errp); 35042e4ac9eSOr Ozeri } 35142e4ac9eSOr Ozeri 35242e4ac9eSOr Ozeri static int qemu_rbd_convert_luks_create_options( 35342e4ac9eSOr Ozeri RbdEncryptionCreateOptionsLUKSBase *luks_opts, 35442e4ac9eSOr Ozeri rbd_encryption_algorithm_t *alg, 35542e4ac9eSOr Ozeri char **passphrase, 35642e4ac9eSOr Ozeri size_t *passphrase_len, 35742e4ac9eSOr Ozeri Error **errp) 35842e4ac9eSOr Ozeri { 35942e4ac9eSOr Ozeri int r = 0; 36042e4ac9eSOr Ozeri 36142e4ac9eSOr Ozeri r = qemu_rbd_convert_luks_options( 36242e4ac9eSOr Ozeri qapi_RbdEncryptionCreateOptionsLUKSBase_base(luks_opts), 36342e4ac9eSOr Ozeri passphrase, passphrase_len, errp); 36442e4ac9eSOr Ozeri if (r < 0) { 36542e4ac9eSOr Ozeri return r; 36642e4ac9eSOr Ozeri } 36742e4ac9eSOr Ozeri 36842e4ac9eSOr Ozeri if (luks_opts->has_cipher_alg) { 36942e4ac9eSOr Ozeri switch (luks_opts->cipher_alg) { 37042e4ac9eSOr Ozeri case QCRYPTO_CIPHER_ALG_AES_128: { 37142e4ac9eSOr Ozeri *alg = RBD_ENCRYPTION_ALGORITHM_AES128; 37242e4ac9eSOr Ozeri break; 37342e4ac9eSOr Ozeri } 37442e4ac9eSOr Ozeri case QCRYPTO_CIPHER_ALG_AES_256: { 37542e4ac9eSOr Ozeri *alg = RBD_ENCRYPTION_ALGORITHM_AES256; 37642e4ac9eSOr Ozeri break; 37742e4ac9eSOr Ozeri } 37842e4ac9eSOr Ozeri default: { 37942e4ac9eSOr Ozeri r = -ENOTSUP; 38042e4ac9eSOr Ozeri error_setg_errno(errp, -r, "unknown encryption algorithm: %u", 38142e4ac9eSOr Ozeri luks_opts->cipher_alg); 38242e4ac9eSOr Ozeri return r; 38342e4ac9eSOr Ozeri } 38442e4ac9eSOr Ozeri } 38542e4ac9eSOr Ozeri } else { 38642e4ac9eSOr Ozeri /* default alg */ 38742e4ac9eSOr Ozeri *alg = RBD_ENCRYPTION_ALGORITHM_AES256; 38842e4ac9eSOr Ozeri } 38942e4ac9eSOr Ozeri 39042e4ac9eSOr Ozeri return 0; 39142e4ac9eSOr Ozeri } 39242e4ac9eSOr Ozeri 39342e4ac9eSOr Ozeri static int qemu_rbd_encryption_format(rbd_image_t image, 39442e4ac9eSOr Ozeri RbdEncryptionCreateOptions *encrypt, 39542e4ac9eSOr Ozeri Error **errp) 39642e4ac9eSOr Ozeri { 39742e4ac9eSOr Ozeri int r = 0; 39842e4ac9eSOr Ozeri g_autofree char *passphrase = NULL; 39942e4ac9eSOr Ozeri rbd_encryption_format_t format; 40042e4ac9eSOr Ozeri rbd_encryption_options_t opts; 40142e4ac9eSOr Ozeri rbd_encryption_luks1_format_options_t luks_opts; 40242e4ac9eSOr Ozeri rbd_encryption_luks2_format_options_t luks2_opts; 40342e4ac9eSOr Ozeri size_t opts_size; 40442e4ac9eSOr Ozeri uint64_t raw_size, effective_size; 40542e4ac9eSOr Ozeri 40642e4ac9eSOr Ozeri r = rbd_get_size(image, &raw_size); 40742e4ac9eSOr Ozeri if (r < 0) { 40842e4ac9eSOr Ozeri error_setg_errno(errp, -r, "cannot get raw image size"); 40942e4ac9eSOr Ozeri return r; 41042e4ac9eSOr Ozeri } 41142e4ac9eSOr Ozeri 41242e4ac9eSOr Ozeri switch (encrypt->format) { 41342e4ac9eSOr Ozeri case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS: { 41442e4ac9eSOr Ozeri memset(&luks_opts, 0, sizeof(luks_opts)); 41542e4ac9eSOr Ozeri format = RBD_ENCRYPTION_FORMAT_LUKS1; 41642e4ac9eSOr Ozeri opts = &luks_opts; 41742e4ac9eSOr Ozeri opts_size = sizeof(luks_opts); 41842e4ac9eSOr Ozeri r = qemu_rbd_convert_luks_create_options( 41942e4ac9eSOr Ozeri qapi_RbdEncryptionCreateOptionsLUKS_base(&encrypt->u.luks), 420a4ac51acSOr Ozeri &luks_opts.alg, &passphrase, &luks_opts.passphrase_size, 421a4ac51acSOr Ozeri errp); 42242e4ac9eSOr Ozeri if (r < 0) { 42342e4ac9eSOr Ozeri return r; 42442e4ac9eSOr Ozeri } 42542e4ac9eSOr Ozeri luks_opts.passphrase = passphrase; 42642e4ac9eSOr Ozeri break; 42742e4ac9eSOr Ozeri } 42842e4ac9eSOr Ozeri case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2: { 42942e4ac9eSOr Ozeri memset(&luks2_opts, 0, sizeof(luks2_opts)); 43042e4ac9eSOr Ozeri format = RBD_ENCRYPTION_FORMAT_LUKS2; 43142e4ac9eSOr Ozeri opts = &luks2_opts; 43242e4ac9eSOr Ozeri opts_size = sizeof(luks2_opts); 43342e4ac9eSOr Ozeri r = qemu_rbd_convert_luks_create_options( 43442e4ac9eSOr Ozeri qapi_RbdEncryptionCreateOptionsLUKS2_base( 43542e4ac9eSOr Ozeri &encrypt->u.luks2), 436a4ac51acSOr Ozeri &luks2_opts.alg, &passphrase, &luks2_opts.passphrase_size, 437a4ac51acSOr Ozeri errp); 43842e4ac9eSOr Ozeri if (r < 0) { 43942e4ac9eSOr Ozeri return r; 44042e4ac9eSOr Ozeri } 44142e4ac9eSOr Ozeri luks2_opts.passphrase = passphrase; 44242e4ac9eSOr Ozeri break; 44342e4ac9eSOr Ozeri } 44442e4ac9eSOr Ozeri default: { 44542e4ac9eSOr Ozeri r = -ENOTSUP; 44642e4ac9eSOr Ozeri error_setg_errno( 44742e4ac9eSOr Ozeri errp, -r, "unknown image encryption format: %u", 44842e4ac9eSOr Ozeri encrypt->format); 44942e4ac9eSOr Ozeri return r; 45042e4ac9eSOr Ozeri } 45142e4ac9eSOr Ozeri } 45242e4ac9eSOr Ozeri 45342e4ac9eSOr Ozeri r = rbd_encryption_format(image, format, opts, opts_size); 45442e4ac9eSOr Ozeri if (r < 0) { 45542e4ac9eSOr Ozeri error_setg_errno(errp, -r, "encryption format fail"); 45642e4ac9eSOr Ozeri return r; 45742e4ac9eSOr Ozeri } 45842e4ac9eSOr Ozeri 45942e4ac9eSOr Ozeri r = rbd_get_size(image, &effective_size); 46042e4ac9eSOr Ozeri if (r < 0) { 46142e4ac9eSOr Ozeri error_setg_errno(errp, -r, "cannot get effective image size"); 46242e4ac9eSOr Ozeri return r; 46342e4ac9eSOr Ozeri } 46442e4ac9eSOr Ozeri 46542e4ac9eSOr Ozeri r = rbd_resize(image, raw_size + (raw_size - effective_size)); 46642e4ac9eSOr Ozeri if (r < 0) { 46742e4ac9eSOr Ozeri error_setg_errno(errp, -r, "cannot resize image after format"); 46842e4ac9eSOr Ozeri return r; 46942e4ac9eSOr Ozeri } 47042e4ac9eSOr Ozeri 47142e4ac9eSOr Ozeri return 0; 47242e4ac9eSOr Ozeri } 47342e4ac9eSOr Ozeri 47442e4ac9eSOr Ozeri static int qemu_rbd_encryption_load(rbd_image_t image, 47542e4ac9eSOr Ozeri RbdEncryptionOptions *encrypt, 47642e4ac9eSOr Ozeri Error **errp) 47742e4ac9eSOr Ozeri { 47842e4ac9eSOr Ozeri int r = 0; 47942e4ac9eSOr Ozeri g_autofree char *passphrase = NULL; 48042e4ac9eSOr Ozeri rbd_encryption_luks1_format_options_t luks_opts; 48142e4ac9eSOr Ozeri rbd_encryption_luks2_format_options_t luks2_opts; 482b8f218efSOr Ozeri #ifdef LIBRBD_SUPPORTS_ENCRYPTION_LOAD2 483b8f218efSOr Ozeri rbd_encryption_luks_format_options_t luks_any_opts; 484b8f218efSOr Ozeri #endif 48542e4ac9eSOr Ozeri rbd_encryption_format_t format; 48642e4ac9eSOr Ozeri rbd_encryption_options_t opts; 48742e4ac9eSOr Ozeri size_t opts_size; 48842e4ac9eSOr Ozeri 48942e4ac9eSOr Ozeri switch (encrypt->format) { 49042e4ac9eSOr Ozeri case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS: { 49142e4ac9eSOr Ozeri memset(&luks_opts, 0, sizeof(luks_opts)); 49242e4ac9eSOr Ozeri format = RBD_ENCRYPTION_FORMAT_LUKS1; 49342e4ac9eSOr Ozeri opts = &luks_opts; 49442e4ac9eSOr Ozeri opts_size = sizeof(luks_opts); 49542e4ac9eSOr Ozeri r = qemu_rbd_convert_luks_options( 49642e4ac9eSOr Ozeri qapi_RbdEncryptionOptionsLUKS_base(&encrypt->u.luks), 497a4ac51acSOr Ozeri &passphrase, &luks_opts.passphrase_size, errp); 49842e4ac9eSOr Ozeri if (r < 0) { 49942e4ac9eSOr Ozeri return r; 50042e4ac9eSOr Ozeri } 50142e4ac9eSOr Ozeri luks_opts.passphrase = passphrase; 50242e4ac9eSOr Ozeri break; 50342e4ac9eSOr Ozeri } 50442e4ac9eSOr Ozeri case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2: { 50542e4ac9eSOr Ozeri memset(&luks2_opts, 0, sizeof(luks2_opts)); 50642e4ac9eSOr Ozeri format = RBD_ENCRYPTION_FORMAT_LUKS2; 50742e4ac9eSOr Ozeri opts = &luks2_opts; 50842e4ac9eSOr Ozeri opts_size = sizeof(luks2_opts); 50942e4ac9eSOr Ozeri r = qemu_rbd_convert_luks_options( 51042e4ac9eSOr Ozeri qapi_RbdEncryptionOptionsLUKS2_base(&encrypt->u.luks2), 511a4ac51acSOr Ozeri &passphrase, &luks2_opts.passphrase_size, errp); 51242e4ac9eSOr Ozeri if (r < 0) { 51342e4ac9eSOr Ozeri return r; 51442e4ac9eSOr Ozeri } 51542e4ac9eSOr Ozeri luks2_opts.passphrase = passphrase; 51642e4ac9eSOr Ozeri break; 51742e4ac9eSOr Ozeri } 518b8f218efSOr Ozeri #ifdef LIBRBD_SUPPORTS_ENCRYPTION_LOAD2 519b8f218efSOr Ozeri case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS_ANY: { 520b8f218efSOr Ozeri memset(&luks_any_opts, 0, sizeof(luks_any_opts)); 521b8f218efSOr Ozeri format = RBD_ENCRYPTION_FORMAT_LUKS; 522b8f218efSOr Ozeri opts = &luks_any_opts; 523b8f218efSOr Ozeri opts_size = sizeof(luks_any_opts); 524b8f218efSOr Ozeri r = qemu_rbd_convert_luks_options( 525b8f218efSOr Ozeri qapi_RbdEncryptionOptionsLUKSAny_base(&encrypt->u.luks_any), 526b8f218efSOr Ozeri &passphrase, &luks_any_opts.passphrase_size, errp); 527b8f218efSOr Ozeri if (r < 0) { 528b8f218efSOr Ozeri return r; 529b8f218efSOr Ozeri } 530b8f218efSOr Ozeri luks_any_opts.passphrase = passphrase; 531b8f218efSOr Ozeri break; 532b8f218efSOr Ozeri } 533b8f218efSOr Ozeri #endif 53442e4ac9eSOr Ozeri default: { 53542e4ac9eSOr Ozeri r = -ENOTSUP; 53642e4ac9eSOr Ozeri error_setg_errno( 53742e4ac9eSOr Ozeri errp, -r, "unknown image encryption format: %u", 53842e4ac9eSOr Ozeri encrypt->format); 53942e4ac9eSOr Ozeri return r; 54042e4ac9eSOr Ozeri } 54142e4ac9eSOr Ozeri } 54242e4ac9eSOr Ozeri 54342e4ac9eSOr Ozeri r = rbd_encryption_load(image, format, opts, opts_size); 54442e4ac9eSOr Ozeri if (r < 0) { 54542e4ac9eSOr Ozeri error_setg_errno(errp, -r, "encryption load fail"); 54642e4ac9eSOr Ozeri return r; 54742e4ac9eSOr Ozeri } 54842e4ac9eSOr Ozeri 54942e4ac9eSOr Ozeri return 0; 55042e4ac9eSOr Ozeri } 5510f385a24SOr Ozeri 5520f385a24SOr Ozeri #ifdef LIBRBD_SUPPORTS_ENCRYPTION_LOAD2 5530f385a24SOr Ozeri static int qemu_rbd_encryption_load2(rbd_image_t image, 5540f385a24SOr Ozeri RbdEncryptionOptions *encrypt, 5550f385a24SOr Ozeri Error **errp) 5560f385a24SOr Ozeri { 5570f385a24SOr Ozeri int r = 0; 5580f385a24SOr Ozeri int encrypt_count = 1; 5590f385a24SOr Ozeri int i; 5600f385a24SOr Ozeri RbdEncryptionOptions *curr_encrypt; 5610f385a24SOr Ozeri rbd_encryption_spec_t *specs; 5620f385a24SOr Ozeri rbd_encryption_luks1_format_options_t *luks_opts; 5630f385a24SOr Ozeri rbd_encryption_luks2_format_options_t *luks2_opts; 5640f385a24SOr Ozeri rbd_encryption_luks_format_options_t *luks_any_opts; 5650f385a24SOr Ozeri 5660f385a24SOr Ozeri /* count encryption options */ 5670f385a24SOr Ozeri for (curr_encrypt = encrypt->parent; curr_encrypt; 5680f385a24SOr Ozeri curr_encrypt = curr_encrypt->parent) { 5690f385a24SOr Ozeri ++encrypt_count; 5700f385a24SOr Ozeri } 5710f385a24SOr Ozeri 5720f385a24SOr Ozeri specs = g_new0(rbd_encryption_spec_t, encrypt_count); 5730f385a24SOr Ozeri 5740f385a24SOr Ozeri curr_encrypt = encrypt; 5750f385a24SOr Ozeri for (i = 0; i < encrypt_count; ++i) { 5760f385a24SOr Ozeri switch (curr_encrypt->format) { 5770f385a24SOr Ozeri case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS: { 5780f385a24SOr Ozeri specs[i].format = RBD_ENCRYPTION_FORMAT_LUKS1; 5790f385a24SOr Ozeri 5800f385a24SOr Ozeri luks_opts = g_new0(rbd_encryption_luks1_format_options_t, 1); 5810f385a24SOr Ozeri specs[i].opts = luks_opts; 5820f385a24SOr Ozeri specs[i].opts_size = sizeof(*luks_opts); 5830f385a24SOr Ozeri 5840f385a24SOr Ozeri r = qemu_rbd_convert_luks_options( 5850f385a24SOr Ozeri qapi_RbdEncryptionOptionsLUKS_base( 5860f385a24SOr Ozeri &curr_encrypt->u.luks), 5870f385a24SOr Ozeri (char **)&luks_opts->passphrase, 5880f385a24SOr Ozeri &luks_opts->passphrase_size, 5890f385a24SOr Ozeri errp); 5900f385a24SOr Ozeri break; 5910f385a24SOr Ozeri } 5920f385a24SOr Ozeri case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2: { 5930f385a24SOr Ozeri specs[i].format = RBD_ENCRYPTION_FORMAT_LUKS2; 5940f385a24SOr Ozeri 5950f385a24SOr Ozeri luks2_opts = g_new0(rbd_encryption_luks2_format_options_t, 1); 5960f385a24SOr Ozeri specs[i].opts = luks2_opts; 5970f385a24SOr Ozeri specs[i].opts_size = sizeof(*luks2_opts); 5980f385a24SOr Ozeri 5990f385a24SOr Ozeri r = qemu_rbd_convert_luks_options( 6000f385a24SOr Ozeri qapi_RbdEncryptionOptionsLUKS2_base( 6010f385a24SOr Ozeri &curr_encrypt->u.luks2), 6020f385a24SOr Ozeri (char **)&luks2_opts->passphrase, 6030f385a24SOr Ozeri &luks2_opts->passphrase_size, 6040f385a24SOr Ozeri errp); 6050f385a24SOr Ozeri break; 6060f385a24SOr Ozeri } 6070f385a24SOr Ozeri case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS_ANY: { 6080f385a24SOr Ozeri specs[i].format = RBD_ENCRYPTION_FORMAT_LUKS; 6090f385a24SOr Ozeri 6100f385a24SOr Ozeri luks_any_opts = g_new0(rbd_encryption_luks_format_options_t, 1); 6110f385a24SOr Ozeri specs[i].opts = luks_any_opts; 6120f385a24SOr Ozeri specs[i].opts_size = sizeof(*luks_any_opts); 6130f385a24SOr Ozeri 6140f385a24SOr Ozeri r = qemu_rbd_convert_luks_options( 6150f385a24SOr Ozeri qapi_RbdEncryptionOptionsLUKSAny_base( 6160f385a24SOr Ozeri &curr_encrypt->u.luks_any), 6170f385a24SOr Ozeri (char **)&luks_any_opts->passphrase, 6180f385a24SOr Ozeri &luks_any_opts->passphrase_size, 6190f385a24SOr Ozeri errp); 6200f385a24SOr Ozeri break; 6210f385a24SOr Ozeri } 6220f385a24SOr Ozeri default: { 6230f385a24SOr Ozeri r = -ENOTSUP; 6240f385a24SOr Ozeri error_setg_errno( 6250f385a24SOr Ozeri errp, -r, "unknown image encryption format: %u", 6260f385a24SOr Ozeri curr_encrypt->format); 6270f385a24SOr Ozeri } 6280f385a24SOr Ozeri } 6290f385a24SOr Ozeri 6300f385a24SOr Ozeri if (r < 0) { 6310f385a24SOr Ozeri goto exit; 6320f385a24SOr Ozeri } 6330f385a24SOr Ozeri 6340f385a24SOr Ozeri curr_encrypt = curr_encrypt->parent; 6350f385a24SOr Ozeri } 6360f385a24SOr Ozeri 6370f385a24SOr Ozeri r = rbd_encryption_load2(image, specs, encrypt_count); 6380f385a24SOr Ozeri if (r < 0) { 6390f385a24SOr Ozeri error_setg_errno(errp, -r, "layered encryption load fail"); 6400f385a24SOr Ozeri goto exit; 6410f385a24SOr Ozeri } 6420f385a24SOr Ozeri 6430f385a24SOr Ozeri exit: 6440f385a24SOr Ozeri for (i = 0; i < encrypt_count; ++i) { 6450f385a24SOr Ozeri if (!specs[i].opts) { 6460f385a24SOr Ozeri break; 6470f385a24SOr Ozeri } 6480f385a24SOr Ozeri 6490f385a24SOr Ozeri switch (specs[i].format) { 6500f385a24SOr Ozeri case RBD_ENCRYPTION_FORMAT_LUKS1: { 6510f385a24SOr Ozeri luks_opts = specs[i].opts; 6520f385a24SOr Ozeri g_free((void *)luks_opts->passphrase); 6530f385a24SOr Ozeri break; 6540f385a24SOr Ozeri } 6550f385a24SOr Ozeri case RBD_ENCRYPTION_FORMAT_LUKS2: { 6560f385a24SOr Ozeri luks2_opts = specs[i].opts; 6570f385a24SOr Ozeri g_free((void *)luks2_opts->passphrase); 6580f385a24SOr Ozeri break; 6590f385a24SOr Ozeri } 6600f385a24SOr Ozeri case RBD_ENCRYPTION_FORMAT_LUKS: { 6610f385a24SOr Ozeri luks_any_opts = specs[i].opts; 6620f385a24SOr Ozeri g_free((void *)luks_any_opts->passphrase); 6630f385a24SOr Ozeri break; 6640f385a24SOr Ozeri } 6650f385a24SOr Ozeri } 6660f385a24SOr Ozeri 6670f385a24SOr Ozeri g_free(specs[i].opts); 6680f385a24SOr Ozeri } 6690f385a24SOr Ozeri g_free(specs); 6700f385a24SOr Ozeri return r; 6710f385a24SOr Ozeri } 6720f385a24SOr Ozeri #endif 67342e4ac9eSOr Ozeri #endif 67442e4ac9eSOr Ozeri 675d083f954SMarkus Armbruster /* FIXME Deprecate and remove keypairs or make it available in QMP. */ 6761bebea37SKevin Wolf static int qemu_rbd_do_create(BlockdevCreateOptions *options, 6771bebea37SKevin Wolf const char *keypairs, const char *password_secret, 6781bebea37SKevin Wolf Error **errp) 6791bebea37SKevin Wolf { 6801bebea37SKevin Wolf BlockdevCreateOptionsRbd *opts = &options->u.rbd; 6811bebea37SKevin Wolf rados_t cluster; 6821bebea37SKevin Wolf rados_ioctx_t io_ctx; 6831bebea37SKevin Wolf int obj_order = 0; 6841bebea37SKevin Wolf int ret; 6851bebea37SKevin Wolf 6861bebea37SKevin Wolf assert(options->driver == BLOCKDEV_DRIVER_RBD); 68754fde4ffSMarkus Armbruster if (opts->location->snapshot) { 6881bebea37SKevin Wolf error_setg(errp, "Can't use snapshot name for image creation"); 6891bebea37SKevin Wolf return -EINVAL; 6901bebea37SKevin Wolf } 6911bebea37SKevin Wolf 69242e4ac9eSOr Ozeri #ifndef LIBRBD_SUPPORTS_ENCRYPTION 69354fde4ffSMarkus Armbruster if (opts->encrypt) { 69442e4ac9eSOr Ozeri error_setg(errp, "RBD library does not support image encryption"); 69542e4ac9eSOr Ozeri return -ENOTSUP; 69642e4ac9eSOr Ozeri } 69742e4ac9eSOr Ozeri #endif 69842e4ac9eSOr Ozeri 6991bebea37SKevin Wolf if (opts->has_cluster_size) { 7001bebea37SKevin Wolf int64_t objsize = opts->cluster_size; 7011bebea37SKevin Wolf if ((objsize - 1) & objsize) { /* not a power of 2? */ 7021bebea37SKevin Wolf error_setg(errp, "obj size needs to be power of 2"); 7031bebea37SKevin Wolf return -EINVAL; 7041bebea37SKevin Wolf } 7051bebea37SKevin Wolf if (objsize < 4096) { 7061bebea37SKevin Wolf error_setg(errp, "obj size too small"); 7071bebea37SKevin Wolf return -EINVAL; 7081bebea37SKevin Wolf } 7091bebea37SKevin Wolf obj_order = ctz32(objsize); 7101bebea37SKevin Wolf } 7111bebea37SKevin Wolf 712aa045c2dSKevin Wolf ret = qemu_rbd_connect(&cluster, &io_ctx, opts->location, false, keypairs, 713aa045c2dSKevin Wolf password_secret, errp); 7141bebea37SKevin Wolf if (ret < 0) { 7151bebea37SKevin Wolf return ret; 7161bebea37SKevin Wolf } 7171bebea37SKevin Wolf 7181bebea37SKevin Wolf ret = rbd_create(io_ctx, opts->location->image, opts->size, &obj_order); 7191bebea37SKevin Wolf if (ret < 0) { 7201bebea37SKevin Wolf error_setg_errno(errp, -ret, "error rbd create"); 721aa045c2dSKevin Wolf goto out; 7221bebea37SKevin Wolf } 7231bebea37SKevin Wolf 72442e4ac9eSOr Ozeri #ifdef LIBRBD_SUPPORTS_ENCRYPTION 72554fde4ffSMarkus Armbruster if (opts->encrypt) { 72642e4ac9eSOr Ozeri rbd_image_t image; 72742e4ac9eSOr Ozeri 72842e4ac9eSOr Ozeri ret = rbd_open(io_ctx, opts->location->image, &image, NULL); 72942e4ac9eSOr Ozeri if (ret < 0) { 73042e4ac9eSOr Ozeri error_setg_errno(errp, -ret, 73142e4ac9eSOr Ozeri "error opening image '%s' for encryption format", 73242e4ac9eSOr Ozeri opts->location->image); 73342e4ac9eSOr Ozeri goto out; 73442e4ac9eSOr Ozeri } 73542e4ac9eSOr Ozeri 73642e4ac9eSOr Ozeri ret = qemu_rbd_encryption_format(image, opts->encrypt, errp); 73742e4ac9eSOr Ozeri rbd_close(image); 73842e4ac9eSOr Ozeri if (ret < 0) { 73942e4ac9eSOr Ozeri /* encryption format fail, try removing the image */ 74042e4ac9eSOr Ozeri rbd_remove(io_ctx, opts->location->image); 74142e4ac9eSOr Ozeri goto out; 74242e4ac9eSOr Ozeri } 74342e4ac9eSOr Ozeri } 74442e4ac9eSOr Ozeri #endif 74542e4ac9eSOr Ozeri 7461bebea37SKevin Wolf ret = 0; 747aa045c2dSKevin Wolf out: 748aa045c2dSKevin Wolf rados_ioctx_destroy(io_ctx); 7491bebea37SKevin Wolf rados_shutdown(cluster); 7501bebea37SKevin Wolf return ret; 7511bebea37SKevin Wolf } 7521bebea37SKevin Wolf 7531bebea37SKevin Wolf static int qemu_rbd_co_create(BlockdevCreateOptions *options, Error **errp) 7541bebea37SKevin Wolf { 7551bebea37SKevin Wolf return qemu_rbd_do_create(options, NULL, NULL, errp); 7561bebea37SKevin Wolf } 7571bebea37SKevin Wolf 75842e4ac9eSOr Ozeri static int qemu_rbd_extract_encryption_create_options( 75942e4ac9eSOr Ozeri QemuOpts *opts, 76042e4ac9eSOr Ozeri RbdEncryptionCreateOptions **spec, 76142e4ac9eSOr Ozeri Error **errp) 76242e4ac9eSOr Ozeri { 76342e4ac9eSOr Ozeri QDict *opts_qdict; 76442e4ac9eSOr Ozeri QDict *encrypt_qdict; 76542e4ac9eSOr Ozeri Visitor *v; 76642e4ac9eSOr Ozeri int ret = 0; 76742e4ac9eSOr Ozeri 76842e4ac9eSOr Ozeri opts_qdict = qemu_opts_to_qdict(opts, NULL); 76942e4ac9eSOr Ozeri qdict_extract_subqdict(opts_qdict, &encrypt_qdict, "encrypt."); 77042e4ac9eSOr Ozeri qobject_unref(opts_qdict); 77142e4ac9eSOr Ozeri if (!qdict_size(encrypt_qdict)) { 77242e4ac9eSOr Ozeri *spec = NULL; 77342e4ac9eSOr Ozeri goto exit; 77442e4ac9eSOr Ozeri } 77542e4ac9eSOr Ozeri 77642e4ac9eSOr Ozeri /* Convert options into a QAPI object */ 77742e4ac9eSOr Ozeri v = qobject_input_visitor_new_flat_confused(encrypt_qdict, errp); 77842e4ac9eSOr Ozeri if (!v) { 77942e4ac9eSOr Ozeri ret = -EINVAL; 78042e4ac9eSOr Ozeri goto exit; 78142e4ac9eSOr Ozeri } 78242e4ac9eSOr Ozeri 78342e4ac9eSOr Ozeri visit_type_RbdEncryptionCreateOptions(v, NULL, spec, errp); 78442e4ac9eSOr Ozeri visit_free(v); 78542e4ac9eSOr Ozeri if (!*spec) { 78642e4ac9eSOr Ozeri ret = -EINVAL; 78742e4ac9eSOr Ozeri goto exit; 78842e4ac9eSOr Ozeri } 78942e4ac9eSOr Ozeri 79042e4ac9eSOr Ozeri exit: 79142e4ac9eSOr Ozeri qobject_unref(encrypt_qdict); 79242e4ac9eSOr Ozeri return ret; 79342e4ac9eSOr Ozeri } 79442e4ac9eSOr Ozeri 795b92902dfSMaxim Levitsky static int coroutine_fn qemu_rbd_co_create_opts(BlockDriver *drv, 796b92902dfSMaxim Levitsky const char *filename, 797efc75e2aSStefan Hajnoczi QemuOpts *opts, 798efc75e2aSStefan Hajnoczi Error **errp) 799f27aaf4bSChristian Brunner { 8001bebea37SKevin Wolf BlockdevCreateOptions *create_options; 8011bebea37SKevin Wolf BlockdevCreateOptionsRbd *rbd_opts; 8021bebea37SKevin Wolf BlockdevOptionsRbd *loc; 80342e4ac9eSOr Ozeri RbdEncryptionCreateOptions *encrypt = NULL; 804d61563b2SMarkus Armbruster Error *local_err = NULL; 8051bebea37SKevin Wolf const char *keypairs, *password_secret; 806c7cacb3eSJeff Cody QDict *options = NULL; 807c7cacb3eSJeff Cody int ret = 0; 808f27aaf4bSChristian Brunner 8091bebea37SKevin Wolf create_options = g_new0(BlockdevCreateOptions, 1); 8101bebea37SKevin Wolf create_options->driver = BLOCKDEV_DRIVER_RBD; 8111bebea37SKevin Wolf rbd_opts = &create_options->u.rbd; 8121bebea37SKevin Wolf 8131bebea37SKevin Wolf rbd_opts->location = g_new0(BlockdevOptionsRbd, 1); 8141bebea37SKevin Wolf 8151bebea37SKevin Wolf password_secret = qemu_opt_get(opts, "password-secret"); 81660390a21SDaniel P. Berrange 817f27aaf4bSChristian Brunner /* Read out options */ 8181bebea37SKevin Wolf rbd_opts->size = ROUND_UP(qemu_opt_get_size_del(opts, BLOCK_OPT_SIZE, 0), 819c2eb918eSHu Tao BDRV_SECTOR_SIZE); 8201bebea37SKevin Wolf rbd_opts->cluster_size = qemu_opt_get_size_del(opts, 8211bebea37SKevin Wolf BLOCK_OPT_CLUSTER_SIZE, 0); 8221bebea37SKevin Wolf rbd_opts->has_cluster_size = (rbd_opts->cluster_size != 0); 823f27aaf4bSChristian Brunner 824c7cacb3eSJeff Cody options = qdict_new(); 825c7cacb3eSJeff Cody qemu_rbd_parse_filename(filename, options, &local_err); 826c7cacb3eSJeff Cody if (local_err) { 827c7cacb3eSJeff Cody ret = -EINVAL; 828c7cacb3eSJeff Cody error_propagate(errp, local_err); 829c7cacb3eSJeff Cody goto exit; 830c7cacb3eSJeff Cody } 831c7cacb3eSJeff Cody 83242e4ac9eSOr Ozeri ret = qemu_rbd_extract_encryption_create_options(opts, &encrypt, errp); 83342e4ac9eSOr Ozeri if (ret < 0) { 83442e4ac9eSOr Ozeri goto exit; 83542e4ac9eSOr Ozeri } 83642e4ac9eSOr Ozeri rbd_opts->encrypt = encrypt; 83742e4ac9eSOr Ozeri 838129c7d1cSMarkus Armbruster /* 839129c7d1cSMarkus Armbruster * Caution: while qdict_get_try_str() is fine, getting non-string 840129c7d1cSMarkus Armbruster * types would require more care. When @options come from -blockdev 841129c7d1cSMarkus Armbruster * or blockdev_add, its members are typed according to the QAPI 842129c7d1cSMarkus Armbruster * schema, but when they come from -drive, they're all QString. 843129c7d1cSMarkus Armbruster */ 8441bebea37SKevin Wolf loc = rbd_opts->location; 8451bebea37SKevin Wolf loc->pool = g_strdup(qdict_get_try_str(options, "pool")); 8461bebea37SKevin Wolf loc->conf = g_strdup(qdict_get_try_str(options, "conf")); 8471bebea37SKevin Wolf loc->user = g_strdup(qdict_get_try_str(options, "user")); 84819ae9ae0SFlorian Florensa loc->q_namespace = g_strdup(qdict_get_try_str(options, "namespace")); 8491bebea37SKevin Wolf loc->image = g_strdup(qdict_get_try_str(options, "image")); 85007846397SMarkus Armbruster keypairs = qdict_get_try_str(options, "=keyvalue-pairs"); 851c7cacb3eSJeff Cody 8521bebea37SKevin Wolf ret = qemu_rbd_do_create(create_options, keypairs, password_secret, errp); 85387cd3d20SVikhyat Umrao if (ret < 0) { 854c7cacb3eSJeff Cody goto exit; 855f27aaf4bSChristian Brunner } 856f27aaf4bSChristian Brunner 857c7cacb3eSJeff Cody exit: 858cb3e7f08SMarc-André Lureau qobject_unref(options); 8591bebea37SKevin Wolf qapi_free_BlockdevCreateOptions(create_options); 860f27aaf4bSChristian Brunner return ret; 861f27aaf4bSChristian Brunner } 862f27aaf4bSChristian Brunner 8634bfb2741SKevin Wolf static char *qemu_rbd_mon_host(BlockdevOptionsRbd *opts, Error **errp) 8640a55679bSJeff Cody { 8654bfb2741SKevin Wolf const char **vals; 8662836284dSMarkus Armbruster const char *host, *port; 8672836284dSMarkus Armbruster char *rados_str; 8684bfb2741SKevin Wolf InetSocketAddressBaseList *p; 8694bfb2741SKevin Wolf int i, cnt; 8700a55679bSJeff Cody 8714bfb2741SKevin Wolf if (!opts->has_server) { 8724bfb2741SKevin Wolf return NULL; 8730a55679bSJeff Cody } 8744bfb2741SKevin Wolf 8754bfb2741SKevin Wolf for (cnt = 0, p = opts->server; p; p = p->next) { 8764bfb2741SKevin Wolf cnt++; 8770a55679bSJeff Cody } 8780a55679bSJeff Cody 8794bfb2741SKevin Wolf vals = g_new(const char *, cnt + 1); 8804bfb2741SKevin Wolf 8814bfb2741SKevin Wolf for (i = 0, p = opts->server; p; p = p->next, i++) { 8824bfb2741SKevin Wolf host = p->value->host; 8834bfb2741SKevin Wolf port = p->value->port; 8844bfb2741SKevin Wolf 8850a55679bSJeff Cody if (strchr(host, ':')) { 8864bfb2741SKevin Wolf vals[i] = g_strdup_printf("[%s]:%s", host, port); 8870a55679bSJeff Cody } else { 8884bfb2741SKevin Wolf vals[i] = g_strdup_printf("%s:%s", host, port); 8890a55679bSJeff Cody } 8900a55679bSJeff Cody } 8912836284dSMarkus Armbruster vals[i] = NULL; 8920a55679bSJeff Cody 8932836284dSMarkus Armbruster rados_str = i ? g_strjoinv(";", (char **)vals) : NULL; 8942836284dSMarkus Armbruster g_strfreev((char **)vals); 8950a55679bSJeff Cody return rados_str; 8960a55679bSJeff Cody } 8970a55679bSJeff Cody 8983d9136f9SKevin Wolf static int qemu_rbd_connect(rados_t *cluster, rados_ioctx_t *io_ctx, 8994bfb2741SKevin Wolf BlockdevOptionsRbd *opts, bool cache, 9004ff45049SKevin Wolf const char *keypairs, const char *secretid, 9014ff45049SKevin Wolf Error **errp) 902f27aaf4bSChristian Brunner { 9030a55679bSJeff Cody char *mon_host = NULL; 9043d9136f9SKevin Wolf Error *local_err = NULL; 905f27aaf4bSChristian Brunner int r; 906f27aaf4bSChristian Brunner 907d083f954SMarkus Armbruster if (secretid) { 908d083f954SMarkus Armbruster if (opts->key_secret) { 909d083f954SMarkus Armbruster error_setg(errp, 910d083f954SMarkus Armbruster "Legacy 'password-secret' clashes with 'key-secret'"); 911d083f954SMarkus Armbruster return -EINVAL; 912d083f954SMarkus Armbruster } 913d083f954SMarkus Armbruster opts->key_secret = g_strdup(secretid); 914d083f954SMarkus Armbruster } 915d083f954SMarkus Armbruster 9164bfb2741SKevin Wolf mon_host = qemu_rbd_mon_host(opts, &local_err); 91784d18f06SMarkus Armbruster if (local_err) { 918d61563b2SMarkus Armbruster error_propagate(errp, local_err); 9192836284dSMarkus Armbruster r = -EINVAL; 920c1c1f6cfSStefano Garzarella goto out; 921a9ccedc3SKevin Wolf } 922a9ccedc3SKevin Wolf 9234bfb2741SKevin Wolf r = rados_create(cluster, opts->user); 924ad32e9c0SJosh Durgin if (r < 0) { 92587cd3d20SVikhyat Umrao error_setg_errno(errp, -r, "error initializing"); 926c1c1f6cfSStefano Garzarella goto out; 927f27aaf4bSChristian Brunner } 928f27aaf4bSChristian Brunner 929c7cacb3eSJeff Cody /* try default location when conf=NULL, but ignore failure */ 9304bfb2741SKevin Wolf r = rados_conf_read_file(*cluster, opts->conf); 93154fde4ffSMarkus Armbruster if (opts->conf && r < 0) { 9324bfb2741SKevin Wolf error_setg_errno(errp, -r, "error reading conf file %s", opts->conf); 933e34d8f29SJosh Durgin goto failed_shutdown; 934e34d8f29SJosh Durgin } 93599a3c89dSJosh Durgin 9363d9136f9SKevin Wolf r = qemu_rbd_set_keypairs(*cluster, keypairs, errp); 93799a3c89dSJosh Durgin if (r < 0) { 93899a3c89dSJosh Durgin goto failed_shutdown; 93999a3c89dSJosh Durgin } 94099a3c89dSJosh Durgin 9410a55679bSJeff Cody if (mon_host) { 9423d9136f9SKevin Wolf r = rados_conf_set(*cluster, "mon_host", mon_host); 9430a55679bSJeff Cody if (r < 0) { 9440a55679bSJeff Cody goto failed_shutdown; 9450a55679bSJeff Cody } 9460a55679bSJeff Cody } 9470a55679bSJeff Cody 948d083f954SMarkus Armbruster r = qemu_rbd_set_auth(*cluster, opts, errp); 949d083f954SMarkus Armbruster if (r < 0) { 95060390a21SDaniel P. Berrange goto failed_shutdown; 95160390a21SDaniel P. Berrange } 95260390a21SDaniel P. Berrange 953b11f38fcSJosh Durgin /* 954b11f38fcSJosh Durgin * Fallback to more conservative semantics if setting cache 955b11f38fcSJosh Durgin * options fails. Ignore errors from setting rbd_cache because the 956b11f38fcSJosh Durgin * only possible error is that the option does not exist, and 957b11f38fcSJosh Durgin * librbd defaults to no caching. If write through caching cannot 958b11f38fcSJosh Durgin * be set up, fall back to no caching. 959b11f38fcSJosh Durgin */ 9603d9136f9SKevin Wolf if (cache) { 9613d9136f9SKevin Wolf rados_conf_set(*cluster, "rbd_cache", "true"); 962b11f38fcSJosh Durgin } else { 9633d9136f9SKevin Wolf rados_conf_set(*cluster, "rbd_cache", "false"); 964b11f38fcSJosh Durgin } 965b11f38fcSJosh Durgin 9663d9136f9SKevin Wolf r = rados_connect(*cluster); 967ad32e9c0SJosh Durgin if (r < 0) { 96887cd3d20SVikhyat Umrao error_setg_errno(errp, -r, "error connecting"); 969eb93d5d9SSage Weil goto failed_shutdown; 970ad32e9c0SJosh Durgin } 971ad32e9c0SJosh Durgin 9724bfb2741SKevin Wolf r = rados_ioctx_create(*cluster, opts->pool, io_ctx); 973ad32e9c0SJosh Durgin if (r < 0) { 9744bfb2741SKevin Wolf error_setg_errno(errp, -r, "error opening pool %s", opts->pool); 975eb93d5d9SSage Weil goto failed_shutdown; 976ad32e9c0SJosh Durgin } 97766dc5f96SStefano Garzarella 97866dc5f96SStefano Garzarella #ifdef HAVE_RBD_NAMESPACE_EXISTS 97954fde4ffSMarkus Armbruster if (opts->q_namespace && strlen(opts->q_namespace) > 0) { 98066dc5f96SStefano Garzarella bool exists; 98166dc5f96SStefano Garzarella 98266dc5f96SStefano Garzarella r = rbd_namespace_exists(*io_ctx, opts->q_namespace, &exists); 98366dc5f96SStefano Garzarella if (r < 0) { 98466dc5f96SStefano Garzarella error_setg_errno(errp, -r, "error checking namespace"); 98566dc5f96SStefano Garzarella goto failed_ioctx_destroy; 98666dc5f96SStefano Garzarella } 98766dc5f96SStefano Garzarella 98866dc5f96SStefano Garzarella if (!exists) { 98966dc5f96SStefano Garzarella error_setg(errp, "namespace '%s' does not exist", 99066dc5f96SStefano Garzarella opts->q_namespace); 99166dc5f96SStefano Garzarella r = -ENOENT; 99266dc5f96SStefano Garzarella goto failed_ioctx_destroy; 99366dc5f96SStefano Garzarella } 99466dc5f96SStefano Garzarella } 99566dc5f96SStefano Garzarella #endif 99666dc5f96SStefano Garzarella 99719ae9ae0SFlorian Florensa /* 99819ae9ae0SFlorian Florensa * Set the namespace after opening the io context on the pool, 99919ae9ae0SFlorian Florensa * if nspace == NULL or if nspace == "", it is just as we did nothing 100019ae9ae0SFlorian Florensa */ 100119ae9ae0SFlorian Florensa rados_ioctx_set_namespace(*io_ctx, opts->q_namespace); 1002ad32e9c0SJosh Durgin 1003c1c1f6cfSStefano Garzarella r = 0; 1004c1c1f6cfSStefano Garzarella goto out; 10053d9136f9SKevin Wolf 100666dc5f96SStefano Garzarella #ifdef HAVE_RBD_NAMESPACE_EXISTS 100766dc5f96SStefano Garzarella failed_ioctx_destroy: 100866dc5f96SStefano Garzarella rados_ioctx_destroy(*io_ctx); 100966dc5f96SStefano Garzarella #endif 10103d9136f9SKevin Wolf failed_shutdown: 10113d9136f9SKevin Wolf rados_shutdown(*cluster); 1012c1c1f6cfSStefano Garzarella out: 10133d9136f9SKevin Wolf g_free(mon_host); 10143d9136f9SKevin Wolf return r; 10153d9136f9SKevin Wolf } 10163d9136f9SKevin Wolf 1017f24b03b5SJeff Cody static int qemu_rbd_convert_options(QDict *options, BlockdevOptionsRbd **opts, 1018f24b03b5SJeff Cody Error **errp) 1019f24b03b5SJeff Cody { 1020f24b03b5SJeff Cody Visitor *v; 1021f24b03b5SJeff Cody 1022f24b03b5SJeff Cody /* Convert the remaining options into a QAPI object */ 1023f24b03b5SJeff Cody v = qobject_input_visitor_new_flat_confused(options, errp); 1024f24b03b5SJeff Cody if (!v) { 1025f24b03b5SJeff Cody return -EINVAL; 1026f24b03b5SJeff Cody } 1027f24b03b5SJeff Cody 1028b11a093cSMarkus Armbruster visit_type_BlockdevOptionsRbd(v, NULL, opts, errp); 1029f24b03b5SJeff Cody visit_free(v); 1030b11a093cSMarkus Armbruster if (!opts) { 1031f24b03b5SJeff Cody return -EINVAL; 1032f24b03b5SJeff Cody } 1033f24b03b5SJeff Cody 1034f24b03b5SJeff Cody return 0; 1035f24b03b5SJeff Cody } 1036f24b03b5SJeff Cody 1037084d1d13SJeff Cody static int qemu_rbd_attempt_legacy_options(QDict *options, 1038084d1d13SJeff Cody BlockdevOptionsRbd **opts, 1039084d1d13SJeff Cody char **keypairs) 1040084d1d13SJeff Cody { 1041084d1d13SJeff Cody char *filename; 1042084d1d13SJeff Cody int r; 1043084d1d13SJeff Cody 1044084d1d13SJeff Cody filename = g_strdup(qdict_get_try_str(options, "filename")); 1045084d1d13SJeff Cody if (!filename) { 1046084d1d13SJeff Cody return -EINVAL; 1047084d1d13SJeff Cody } 1048084d1d13SJeff Cody qdict_del(options, "filename"); 1049084d1d13SJeff Cody 1050084d1d13SJeff Cody qemu_rbd_parse_filename(filename, options, NULL); 1051084d1d13SJeff Cody 1052084d1d13SJeff Cody /* keypairs freed by caller */ 1053084d1d13SJeff Cody *keypairs = g_strdup(qdict_get_try_str(options, "=keyvalue-pairs")); 1054084d1d13SJeff Cody if (*keypairs) { 1055084d1d13SJeff Cody qdict_del(options, "=keyvalue-pairs"); 1056084d1d13SJeff Cody } 1057084d1d13SJeff Cody 1058084d1d13SJeff Cody r = qemu_rbd_convert_options(options, opts, NULL); 1059084d1d13SJeff Cody 1060084d1d13SJeff Cody g_free(filename); 1061084d1d13SJeff Cody return r; 1062084d1d13SJeff Cody } 1063084d1d13SJeff Cody 10643d9136f9SKevin Wolf static int qemu_rbd_open(BlockDriverState *bs, QDict *options, int flags, 10653d9136f9SKevin Wolf Error **errp) 10663d9136f9SKevin Wolf { 10673d9136f9SKevin Wolf BDRVRBDState *s = bs->opaque; 10684bfb2741SKevin Wolf BlockdevOptionsRbd *opts = NULL; 1069bfb15b4bSJeff Cody const QDictEntry *e; 10703d9136f9SKevin Wolf Error *local_err = NULL; 10714ff45049SKevin Wolf char *keypairs, *secretid; 1072832a93dcSPeter Lieven rbd_image_info_t info; 10733d9136f9SKevin Wolf int r; 10743d9136f9SKevin Wolf 10754ff45049SKevin Wolf keypairs = g_strdup(qdict_get_try_str(options, "=keyvalue-pairs")); 10764ff45049SKevin Wolf if (keypairs) { 10774ff45049SKevin Wolf qdict_del(options, "=keyvalue-pairs"); 10784ff45049SKevin Wolf } 10794ff45049SKevin Wolf 10804ff45049SKevin Wolf secretid = g_strdup(qdict_get_try_str(options, "password-secret")); 10814ff45049SKevin Wolf if (secretid) { 10824ff45049SKevin Wolf qdict_del(options, "password-secret"); 10834ff45049SKevin Wolf } 10844ff45049SKevin Wolf 1085f24b03b5SJeff Cody r = qemu_rbd_convert_options(options, &opts, &local_err); 10864bfb2741SKevin Wolf if (local_err) { 1087084d1d13SJeff Cody /* If keypairs are present, that means some options are present in 1088084d1d13SJeff Cody * the modern option format. Don't attempt to parse legacy option 1089084d1d13SJeff Cody * formats, as we won't support mixed usage. */ 1090084d1d13SJeff Cody if (keypairs) { 10914bfb2741SKevin Wolf error_propagate(errp, local_err); 10924bfb2741SKevin Wolf goto out; 10934bfb2741SKevin Wolf } 10944bfb2741SKevin Wolf 1095084d1d13SJeff Cody /* If the initial attempt to convert and process the options failed, 1096084d1d13SJeff Cody * we may be attempting to open an image file that has the rbd options 1097084d1d13SJeff Cody * specified in the older format consisting of all key/value pairs 1098084d1d13SJeff Cody * encoded in the filename. Go ahead and attempt to parse the 1099084d1d13SJeff Cody * filename, and see if we can pull out the required options. */ 1100084d1d13SJeff Cody r = qemu_rbd_attempt_legacy_options(options, &opts, &keypairs); 1101084d1d13SJeff Cody if (r < 0) { 1102084d1d13SJeff Cody /* Propagate the original error, not the legacy parsing fallback 1103084d1d13SJeff Cody * error, as the latter was just a best-effort attempt. */ 1104084d1d13SJeff Cody error_propagate(errp, local_err); 1105084d1d13SJeff Cody goto out; 1106084d1d13SJeff Cody } 1107084d1d13SJeff Cody /* Take care whenever deciding to actually deprecate; once this ability 1108084d1d13SJeff Cody * is removed, we will not be able to open any images with legacy-styled 1109084d1d13SJeff Cody * backing image strings. */ 11105197f445SMarkus Armbruster warn_report("RBD options encoded in the filename as keyvalue pairs " 1111084d1d13SJeff Cody "is deprecated"); 1112084d1d13SJeff Cody } 1113084d1d13SJeff Cody 1114bfb15b4bSJeff Cody /* Remove the processed options from the QDict (the visitor processes 1115bfb15b4bSJeff Cody * _all_ options in the QDict) */ 1116bfb15b4bSJeff Cody while ((e = qdict_first(options))) { 1117bfb15b4bSJeff Cody qdict_del(options, e->key); 1118bfb15b4bSJeff Cody } 1119bfb15b4bSJeff Cody 1120d41a5588SKevin Wolf r = qemu_rbd_connect(&s->cluster, &s->io_ctx, opts, 1121d41a5588SKevin Wolf !(flags & BDRV_O_NOCACHE), keypairs, secretid, errp); 11223d9136f9SKevin Wolf if (r < 0) { 11234ff45049SKevin Wolf goto out; 11243d9136f9SKevin Wolf } 11253d9136f9SKevin Wolf 1126d41a5588SKevin Wolf s->snap = g_strdup(opts->snapshot); 1127d41a5588SKevin Wolf s->image_name = g_strdup(opts->image); 1128d41a5588SKevin Wolf 1129e2b8247aSJeff Cody /* rbd_open is always r/w */ 113080b61a27SJeff Cody r = rbd_open(s->io_ctx, s->image_name, &s->image, s->snap); 1131ad32e9c0SJosh Durgin if (r < 0) { 113280b61a27SJeff Cody error_setg_errno(errp, -r, "error reading header from %s", 113380b61a27SJeff Cody s->image_name); 1134eb93d5d9SSage Weil goto failed_open; 1135ad32e9c0SJosh Durgin } 1136ad32e9c0SJosh Durgin 113754fde4ffSMarkus Armbruster if (opts->encrypt) { 113842e4ac9eSOr Ozeri #ifdef LIBRBD_SUPPORTS_ENCRYPTION 11390f385a24SOr Ozeri if (opts->encrypt->parent) { 11400f385a24SOr Ozeri #ifdef LIBRBD_SUPPORTS_ENCRYPTION_LOAD2 11410f385a24SOr Ozeri r = qemu_rbd_encryption_load2(s->image, opts->encrypt, errp); 11420f385a24SOr Ozeri #else 11430f385a24SOr Ozeri r = -ENOTSUP; 11440f385a24SOr Ozeri error_setg(errp, "RBD library does not support layered encryption"); 11450f385a24SOr Ozeri #endif 11460f385a24SOr Ozeri } else { 114742e4ac9eSOr Ozeri r = qemu_rbd_encryption_load(s->image, opts->encrypt, errp); 11480f385a24SOr Ozeri } 114942e4ac9eSOr Ozeri if (r < 0) { 115042e4ac9eSOr Ozeri goto failed_post_open; 115142e4ac9eSOr Ozeri } 115242e4ac9eSOr Ozeri #else 115342e4ac9eSOr Ozeri r = -ENOTSUP; 115442e4ac9eSOr Ozeri error_setg(errp, "RBD library does not support image encryption"); 115542e4ac9eSOr Ozeri goto failed_post_open; 115642e4ac9eSOr Ozeri #endif 115742e4ac9eSOr Ozeri } 115842e4ac9eSOr Ozeri 1159832a93dcSPeter Lieven r = rbd_stat(s->image, &info, sizeof(info)); 1160d24f8023SStefano Garzarella if (r < 0) { 1161832a93dcSPeter Lieven error_setg_errno(errp, -r, "error getting image info from %s", 1162d24f8023SStefano Garzarella s->image_name); 116342e4ac9eSOr Ozeri goto failed_post_open; 1164d24f8023SStefano Garzarella } 1165832a93dcSPeter Lieven s->image_size = info.size; 1166832a93dcSPeter Lieven s->object_size = info.obj_size; 1167d24f8023SStefano Garzarella 1168e2b8247aSJeff Cody /* If we are using an rbd snapshot, we must be r/o, otherwise 1169e2b8247aSJeff Cody * leave as-is */ 1170e2b8247aSJeff Cody if (s->snap != NULL) { 1171eaa2410fSKevin Wolf r = bdrv_apply_auto_read_only(bs, "rbd snapshots are read-only", errp); 1172e2b8247aSJeff Cody if (r < 0) { 117342e4ac9eSOr Ozeri goto failed_post_open; 1174e2b8247aSJeff Cody } 1175e2b8247aSJeff Cody } 1176f27aaf4bSChristian Brunner 1177c56ac27dSPeter Lieven #ifdef LIBRBD_SUPPORTS_WRITE_ZEROES 1178c56ac27dSPeter Lieven bs->supported_zero_flags = BDRV_REQ_MAY_UNMAP | BDRV_REQ_NO_FALLBACK; 1179c56ac27dSPeter Lieven #endif 1180c56ac27dSPeter Lieven 11812f98910dSEric Blake /* When extending regular files, we get zeros from the OS */ 11822f98910dSEric Blake bs->supported_truncate_flags = BDRV_REQ_ZERO_WRITE; 11832f98910dSEric Blake 11844ff45049SKevin Wolf r = 0; 11854ff45049SKevin Wolf goto out; 1186f27aaf4bSChristian Brunner 118742e4ac9eSOr Ozeri failed_post_open: 118842e4ac9eSOr Ozeri rbd_close(s->image); 1189eb93d5d9SSage Weil failed_open: 1190ad32e9c0SJosh Durgin rados_ioctx_destroy(s->io_ctx); 1191eb93d5d9SSage Weil g_free(s->snap); 119280b61a27SJeff Cody g_free(s->image_name); 11933d9136f9SKevin Wolf rados_shutdown(s->cluster); 11944ff45049SKevin Wolf out: 11954bfb2741SKevin Wolf qapi_free_BlockdevOptionsRbd(opts); 11964ff45049SKevin Wolf g_free(keypairs); 11974ff45049SKevin Wolf g_free(secretid); 1198f27aaf4bSChristian Brunner return r; 1199f27aaf4bSChristian Brunner } 1200f27aaf4bSChristian Brunner 120156e7cf8dSJeff Cody 120256e7cf8dSJeff Cody /* Since RBD is currently always opened R/W via the API, 120356e7cf8dSJeff Cody * we just need to check if we are using a snapshot or not, in 120456e7cf8dSJeff Cody * order to determine if we will allow it to be R/W */ 120556e7cf8dSJeff Cody static int qemu_rbd_reopen_prepare(BDRVReopenState *state, 120656e7cf8dSJeff Cody BlockReopenQueue *queue, Error **errp) 120756e7cf8dSJeff Cody { 120856e7cf8dSJeff Cody BDRVRBDState *s = state->bs->opaque; 120956e7cf8dSJeff Cody int ret = 0; 121056e7cf8dSJeff Cody 1211*4026f1c4SKevin Wolf GRAPH_RDLOCK_GUARD_MAINLOOP(); 1212*4026f1c4SKevin Wolf 121356e7cf8dSJeff Cody if (s->snap && state->flags & BDRV_O_RDWR) { 121456e7cf8dSJeff Cody error_setg(errp, 121556e7cf8dSJeff Cody "Cannot change node '%s' to r/w when using RBD snapshot", 121656e7cf8dSJeff Cody bdrv_get_device_or_node_name(state->bs)); 121756e7cf8dSJeff Cody ret = -EINVAL; 121856e7cf8dSJeff Cody } 121956e7cf8dSJeff Cody 122056e7cf8dSJeff Cody return ret; 122156e7cf8dSJeff Cody } 122256e7cf8dSJeff Cody 1223ad32e9c0SJosh Durgin static void qemu_rbd_close(BlockDriverState *bs) 1224f27aaf4bSChristian Brunner { 1225f27aaf4bSChristian Brunner BDRVRBDState *s = bs->opaque; 1226f27aaf4bSChristian Brunner 1227ad32e9c0SJosh Durgin rbd_close(s->image); 1228ad32e9c0SJosh Durgin rados_ioctx_destroy(s->io_ctx); 12297267c094SAnthony Liguori g_free(s->snap); 123080b61a27SJeff Cody g_free(s->image_name); 1231ad32e9c0SJosh Durgin rados_shutdown(s->cluster); 1232f27aaf4bSChristian Brunner } 1233f27aaf4bSChristian Brunner 1234d24f8023SStefano Garzarella /* Resize the RBD image and update the 'image_size' with the current size */ 1235d24f8023SStefano Garzarella static int qemu_rbd_resize(BlockDriverState *bs, uint64_t size) 1236d24f8023SStefano Garzarella { 1237d24f8023SStefano Garzarella BDRVRBDState *s = bs->opaque; 1238d24f8023SStefano Garzarella int r; 1239d24f8023SStefano Garzarella 1240d24f8023SStefano Garzarella r = rbd_resize(s->image, size); 1241d24f8023SStefano Garzarella if (r < 0) { 1242d24f8023SStefano Garzarella return r; 1243d24f8023SStefano Garzarella } 1244d24f8023SStefano Garzarella 1245d24f8023SStefano Garzarella s->image_size = size; 1246d24f8023SStefano Garzarella 1247d24f8023SStefano Garzarella return 0; 1248d24f8023SStefano Garzarella } 1249d24f8023SStefano Garzarella 1250c3e5fac5SPeter Lieven static void qemu_rbd_finish_bh(void *opaque) 1251f27aaf4bSChristian Brunner { 1252c3e5fac5SPeter Lieven RBDTask *task = opaque; 125364cc845bSPeter Lieven task->complete = true; 1254c3e5fac5SPeter Lieven aio_co_wake(task->co); 1255ad32e9c0SJosh Durgin } 1256ad32e9c0SJosh Durgin 1257ad32e9c0SJosh Durgin /* 1258c3e5fac5SPeter Lieven * This is the completion callback function for all rbd aio calls 1259c3e5fac5SPeter Lieven * started from qemu_rbd_start_co(). 1260ad32e9c0SJosh Durgin * 1261ad32e9c0SJosh Durgin * Note: this function is being called from a non qemu thread so 1262ad32e9c0SJosh Durgin * we need to be careful about what we do here. Generally we only 1263e04fb07fSStefan Hajnoczi * schedule a BH, and do the rest of the io completion handling 1264c3e5fac5SPeter Lieven * from qemu_rbd_finish_bh() which runs in a qemu context. 1265ad32e9c0SJosh Durgin */ 1266c3e5fac5SPeter Lieven static void qemu_rbd_completion_cb(rbd_completion_t c, RBDTask *task) 1267ad32e9c0SJosh Durgin { 1268c3e5fac5SPeter Lieven task->ret = rbd_aio_get_return_value(c); 1269ad32e9c0SJosh Durgin rbd_aio_release(c); 1270c3e5fac5SPeter Lieven aio_bh_schedule_oneshot(bdrv_get_aio_context(task->bs), 1271c3e5fac5SPeter Lieven qemu_rbd_finish_bh, task); 1272473c7f02SStefan Priebe } 1273f27aaf4bSChristian Brunner 1274c3e5fac5SPeter Lieven static int coroutine_fn qemu_rbd_start_co(BlockDriverState *bs, 1275c3e5fac5SPeter Lieven uint64_t offset, 1276c3e5fac5SPeter Lieven uint64_t bytes, 1277f27aaf4bSChristian Brunner QEMUIOVector *qiov, 1278c3e5fac5SPeter Lieven int flags, 1279787f3133SJosh Durgin RBDAIOCmd cmd) 1280f27aaf4bSChristian Brunner { 1281c3e5fac5SPeter Lieven BDRVRBDState *s = bs->opaque; 1282c3e5fac5SPeter Lieven RBDTask task = { .bs = bs, .co = qemu_coroutine_self() }; 1283ad32e9c0SJosh Durgin rbd_completion_t c; 128451a13528SJosh Durgin int r; 1285f27aaf4bSChristian Brunner 1286c3e5fac5SPeter Lieven assert(!qiov || qiov->size == bytes); 1287f27aaf4bSChristian Brunner 1288cc5387a5SStefano Garzarella if (cmd == RBD_AIO_WRITE || cmd == RBD_AIO_WRITE_ZEROES) { 1289cc5387a5SStefano Garzarella /* 1290cc5387a5SStefano Garzarella * RBD APIs don't allow us to write more than actual size, so in order 1291cc5387a5SStefano Garzarella * to support growing images, we resize the image before write 1292cc5387a5SStefano Garzarella * operations that exceed the current size. 1293cc5387a5SStefano Garzarella */ 1294cc5387a5SStefano Garzarella if (offset + bytes > s->image_size) { 1295fb2575f9SMarkus Armbruster r = qemu_rbd_resize(bs, offset + bytes); 1296cc5387a5SStefano Garzarella if (r < 0) { 1297cc5387a5SStefano Garzarella return r; 1298cc5387a5SStefano Garzarella } 1299cc5387a5SStefano Garzarella } 1300cc5387a5SStefano Garzarella } 1301cc5387a5SStefano Garzarella 1302c3e5fac5SPeter Lieven r = rbd_aio_create_completion(&task, 1303c3e5fac5SPeter Lieven (rbd_callback_t) qemu_rbd_completion_cb, &c); 130451a13528SJosh Durgin if (r < 0) { 1305c3e5fac5SPeter Lieven return r; 130651a13528SJosh Durgin } 1307f27aaf4bSChristian Brunner 1308787f3133SJosh Durgin switch (cmd) { 1309787f3133SJosh Durgin case RBD_AIO_READ: 1310c3e5fac5SPeter Lieven r = rbd_aio_readv(s->image, qiov->iov, qiov->niov, offset, c); 1311c3e5fac5SPeter Lieven break; 1312c3e5fac5SPeter Lieven case RBD_AIO_WRITE: 1313c3e5fac5SPeter Lieven r = rbd_aio_writev(s->image, qiov->iov, qiov->niov, offset, c); 1314787f3133SJosh Durgin break; 1315787f3133SJosh Durgin case RBD_AIO_DISCARD: 1316c3e5fac5SPeter Lieven r = rbd_aio_discard(s->image, offset, bytes, c); 1317787f3133SJosh Durgin break; 1318dc7588c1SJosh Durgin case RBD_AIO_FLUSH: 131948672ac0SPeter Lieven r = rbd_aio_flush(s->image, c); 1320dc7588c1SJosh Durgin break; 1321c56ac27dSPeter Lieven #ifdef LIBRBD_SUPPORTS_WRITE_ZEROES 1322c56ac27dSPeter Lieven case RBD_AIO_WRITE_ZEROES: { 1323c56ac27dSPeter Lieven int zero_flags = 0; 1324c56ac27dSPeter Lieven #ifdef RBD_WRITE_ZEROES_FLAG_THICK_PROVISION 1325c56ac27dSPeter Lieven if (!(flags & BDRV_REQ_MAY_UNMAP)) { 1326c56ac27dSPeter Lieven zero_flags = RBD_WRITE_ZEROES_FLAG_THICK_PROVISION; 1327c56ac27dSPeter Lieven } 1328c56ac27dSPeter Lieven #endif 1329c56ac27dSPeter Lieven r = rbd_aio_write_zeroes(s->image, offset, bytes, c, zero_flags, 0); 1330c56ac27dSPeter Lieven break; 1331c56ac27dSPeter Lieven } 1332c56ac27dSPeter Lieven #endif 1333787f3133SJosh Durgin default: 1334787f3133SJosh Durgin r = -EINVAL; 133551a13528SJosh Durgin } 133651a13528SJosh Durgin 133751a13528SJosh Durgin if (r < 0) { 1338c3e5fac5SPeter Lieven error_report("rbd request failed early: cmd %d offset %" PRIu64 1339c3e5fac5SPeter Lieven " bytes %" PRIu64 " flags %d r %d (%s)", cmd, offset, 1340c3e5fac5SPeter Lieven bytes, flags, r, strerror(-r)); 1341405a2764SKevin Wolf rbd_aio_release(c); 1342c3e5fac5SPeter Lieven return r; 1343f27aaf4bSChristian Brunner } 1344f27aaf4bSChristian Brunner 1345c3e5fac5SPeter Lieven while (!task.complete) { 1346c3e5fac5SPeter Lieven qemu_coroutine_yield(); 1347f27aaf4bSChristian Brunner } 1348f27aaf4bSChristian Brunner 1349c3e5fac5SPeter Lieven if (task.ret < 0) { 1350c3e5fac5SPeter Lieven error_report("rbd request failed: cmd %d offset %" PRIu64 " bytes %" 1351c3e5fac5SPeter Lieven PRIu64 " flags %d task.ret %" PRIi64 " (%s)", cmd, offset, 1352c3e5fac5SPeter Lieven bytes, flags, task.ret, strerror(-task.ret)); 1353c3e5fac5SPeter Lieven return task.ret; 1354f27aaf4bSChristian Brunner } 1355f27aaf4bSChristian Brunner 1356c3e5fac5SPeter Lieven /* zero pad short reads */ 1357c3e5fac5SPeter Lieven if (cmd == RBD_AIO_READ && task.ret < qiov->size) { 1358c3e5fac5SPeter Lieven qemu_iovec_memset(qiov, task.ret, 0, qiov->size - task.ret); 1359c3e5fac5SPeter Lieven } 1360c3e5fac5SPeter Lieven 1361c3e5fac5SPeter Lieven return 0; 1362c3e5fac5SPeter Lieven } 1363c3e5fac5SPeter Lieven 1364c3e5fac5SPeter Lieven static int 1365f7ef38ddSVladimir Sementsov-Ogievskiy coroutine_fn qemu_rbd_co_preadv(BlockDriverState *bs, int64_t offset, 1366f7ef38ddSVladimir Sementsov-Ogievskiy int64_t bytes, QEMUIOVector *qiov, 1367f7ef38ddSVladimir Sementsov-Ogievskiy BdrvRequestFlags flags) 1368dc7588c1SJosh Durgin { 1369c3e5fac5SPeter Lieven return qemu_rbd_start_co(bs, offset, bytes, qiov, flags, RBD_AIO_READ); 1370c3e5fac5SPeter Lieven } 1371c3e5fac5SPeter Lieven 1372c3e5fac5SPeter Lieven static int 1373e75abedaSVladimir Sementsov-Ogievskiy coroutine_fn qemu_rbd_co_pwritev(BlockDriverState *bs, int64_t offset, 1374e75abedaSVladimir Sementsov-Ogievskiy int64_t bytes, QEMUIOVector *qiov, 1375e75abedaSVladimir Sementsov-Ogievskiy BdrvRequestFlags flags) 1376c3e5fac5SPeter Lieven { 1377c3e5fac5SPeter Lieven return qemu_rbd_start_co(bs, offset, bytes, qiov, flags, RBD_AIO_WRITE); 1378c3e5fac5SPeter Lieven } 1379c3e5fac5SPeter Lieven 1380c3e5fac5SPeter Lieven static int coroutine_fn qemu_rbd_co_flush(BlockDriverState *bs) 1381c3e5fac5SPeter Lieven { 1382c3e5fac5SPeter Lieven return qemu_rbd_start_co(bs, 0, 0, NULL, 0, RBD_AIO_FLUSH); 1383c3e5fac5SPeter Lieven } 1384c3e5fac5SPeter Lieven 1385c3e5fac5SPeter Lieven static int coroutine_fn qemu_rbd_co_pdiscard(BlockDriverState *bs, 13860c802287SVladimir Sementsov-Ogievskiy int64_t offset, int64_t bytes) 1387c3e5fac5SPeter Lieven { 13880c802287SVladimir Sementsov-Ogievskiy return qemu_rbd_start_co(bs, offset, bytes, NULL, 0, RBD_AIO_DISCARD); 1389dc7588c1SJosh Durgin } 1390dc7588c1SJosh Durgin 1391c56ac27dSPeter Lieven #ifdef LIBRBD_SUPPORTS_WRITE_ZEROES 1392c56ac27dSPeter Lieven static int 1393c56ac27dSPeter Lieven coroutine_fn qemu_rbd_co_pwrite_zeroes(BlockDriverState *bs, int64_t offset, 1394f34b2bcfSVladimir Sementsov-Ogievskiy int64_t bytes, BdrvRequestFlags flags) 1395c56ac27dSPeter Lieven { 1396f34b2bcfSVladimir Sementsov-Ogievskiy return qemu_rbd_start_co(bs, offset, bytes, NULL, flags, 1397c56ac27dSPeter Lieven RBD_AIO_WRITE_ZEROES); 1398c56ac27dSPeter Lieven } 1399c56ac27dSPeter Lieven #endif 1400c56ac27dSPeter Lieven 14013d47eb0aSEmanuele Giuseppe Esposito static int coroutine_fn 14023d47eb0aSEmanuele Giuseppe Esposito qemu_rbd_co_get_info(BlockDriverState *bs, BlockDriverInfo *bdi) 1403f27aaf4bSChristian Brunner { 1404f27aaf4bSChristian Brunner BDRVRBDState *s = bs->opaque; 1405832a93dcSPeter Lieven bdi->cluster_size = s->object_size; 1406f27aaf4bSChristian Brunner return 0; 1407f27aaf4bSChristian Brunner } 1408f27aaf4bSChristian Brunner 140942e4ac9eSOr Ozeri static ImageInfoSpecific *qemu_rbd_get_specific_info(BlockDriverState *bs, 141042e4ac9eSOr Ozeri Error **errp) 141142e4ac9eSOr Ozeri { 141242e4ac9eSOr Ozeri BDRVRBDState *s = bs->opaque; 141342e4ac9eSOr Ozeri ImageInfoSpecific *spec_info; 141442e4ac9eSOr Ozeri char buf[RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = {0}; 141542e4ac9eSOr Ozeri int r; 141642e4ac9eSOr Ozeri 141742e4ac9eSOr Ozeri if (s->image_size >= RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) { 141842e4ac9eSOr Ozeri r = rbd_read(s->image, 0, 141942e4ac9eSOr Ozeri RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN, buf); 142042e4ac9eSOr Ozeri if (r < 0) { 142142e4ac9eSOr Ozeri error_setg_errno(errp, -r, "cannot read image start for probe"); 142242e4ac9eSOr Ozeri return NULL; 142342e4ac9eSOr Ozeri } 142442e4ac9eSOr Ozeri } 142542e4ac9eSOr Ozeri 142642e4ac9eSOr Ozeri spec_info = g_new(ImageInfoSpecific, 1); 142742e4ac9eSOr Ozeri *spec_info = (ImageInfoSpecific){ 142842e4ac9eSOr Ozeri .type = IMAGE_INFO_SPECIFIC_KIND_RBD, 142942e4ac9eSOr Ozeri .u.rbd.data = g_new0(ImageInfoSpecificRbd, 1), 143042e4ac9eSOr Ozeri }; 143142e4ac9eSOr Ozeri 143242e4ac9eSOr Ozeri if (memcmp(buf, rbd_luks_header_verification, 143342e4ac9eSOr Ozeri RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) == 0) { 143442e4ac9eSOr Ozeri spec_info->u.rbd.data->encryption_format = 143542e4ac9eSOr Ozeri RBD_IMAGE_ENCRYPTION_FORMAT_LUKS; 143642e4ac9eSOr Ozeri spec_info->u.rbd.data->has_encryption_format = true; 143742e4ac9eSOr Ozeri } else if (memcmp(buf, rbd_luks2_header_verification, 143842e4ac9eSOr Ozeri RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) == 0) { 143942e4ac9eSOr Ozeri spec_info->u.rbd.data->encryption_format = 144042e4ac9eSOr Ozeri RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2; 144142e4ac9eSOr Ozeri spec_info->u.rbd.data->has_encryption_format = true; 14420f385a24SOr Ozeri } else if (memcmp(buf, rbd_layered_luks_header_verification, 14430f385a24SOr Ozeri RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) == 0) { 14440f385a24SOr Ozeri spec_info->u.rbd.data->encryption_format = 14450f385a24SOr Ozeri RBD_IMAGE_ENCRYPTION_FORMAT_LUKS; 14460f385a24SOr Ozeri spec_info->u.rbd.data->has_encryption_format = true; 14470f385a24SOr Ozeri } else if (memcmp(buf, rbd_layered_luks2_header_verification, 14480f385a24SOr Ozeri RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) == 0) { 14490f385a24SOr Ozeri spec_info->u.rbd.data->encryption_format = 14500f385a24SOr Ozeri RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2; 14510f385a24SOr Ozeri spec_info->u.rbd.data->has_encryption_format = true; 145242e4ac9eSOr Ozeri } else { 145342e4ac9eSOr Ozeri spec_info->u.rbd.data->has_encryption_format = false; 145442e4ac9eSOr Ozeri } 145542e4ac9eSOr Ozeri 145642e4ac9eSOr Ozeri return spec_info; 145742e4ac9eSOr Ozeri } 145842e4ac9eSOr Ozeri 14590347a8fdSPeter Lieven /* 14600347a8fdSPeter Lieven * rbd_diff_iterate2 allows to interrupt the exection by returning a negative 14610347a8fdSPeter Lieven * value in the callback routine. Choose a value that does not conflict with 14620347a8fdSPeter Lieven * an existing exitcode and return it if we want to prematurely stop the 14630347a8fdSPeter Lieven * execution because we detected a change in the allocation status. 14640347a8fdSPeter Lieven */ 14650347a8fdSPeter Lieven #define QEMU_RBD_EXIT_DIFF_ITERATE2 -9000 14660347a8fdSPeter Lieven 14670347a8fdSPeter Lieven static int qemu_rbd_diff_iterate_cb(uint64_t offs, size_t len, 14680347a8fdSPeter Lieven int exists, void *opaque) 14690347a8fdSPeter Lieven { 14700347a8fdSPeter Lieven RBDDiffIterateReq *req = opaque; 14710347a8fdSPeter Lieven 14720347a8fdSPeter Lieven assert(req->offs + req->bytes <= offs); 14739e302f64SPeter Lieven 14749e302f64SPeter Lieven /* treat a hole like an unallocated area and bail out */ 14759e302f64SPeter Lieven if (!exists) { 14769e302f64SPeter Lieven return 0; 14779e302f64SPeter Lieven } 14780347a8fdSPeter Lieven 14790347a8fdSPeter Lieven if (!req->exists && offs > req->offs) { 14800347a8fdSPeter Lieven /* 14810347a8fdSPeter Lieven * we started in an unallocated area and hit the first allocated 14820347a8fdSPeter Lieven * block. req->bytes must be set to the length of the unallocated area 14830347a8fdSPeter Lieven * before the allocated area. stop further processing. 14840347a8fdSPeter Lieven */ 14850347a8fdSPeter Lieven req->bytes = offs - req->offs; 14860347a8fdSPeter Lieven return QEMU_RBD_EXIT_DIFF_ITERATE2; 14870347a8fdSPeter Lieven } 14880347a8fdSPeter Lieven 14890347a8fdSPeter Lieven if (req->exists && offs > req->offs + req->bytes) { 14900347a8fdSPeter Lieven /* 14910347a8fdSPeter Lieven * we started in an allocated area and jumped over an unallocated area, 14920347a8fdSPeter Lieven * req->bytes contains the length of the allocated area before the 14930347a8fdSPeter Lieven * unallocated area. stop further processing. 14940347a8fdSPeter Lieven */ 14950347a8fdSPeter Lieven return QEMU_RBD_EXIT_DIFF_ITERATE2; 14960347a8fdSPeter Lieven } 14970347a8fdSPeter Lieven 14980347a8fdSPeter Lieven req->bytes += len; 14990347a8fdSPeter Lieven req->exists = true; 15000347a8fdSPeter Lieven 15010347a8fdSPeter Lieven return 0; 15020347a8fdSPeter Lieven } 15030347a8fdSPeter Lieven 15040347a8fdSPeter Lieven static int coroutine_fn qemu_rbd_co_block_status(BlockDriverState *bs, 15050347a8fdSPeter Lieven bool want_zero, int64_t offset, 15060347a8fdSPeter Lieven int64_t bytes, int64_t *pnum, 15070347a8fdSPeter Lieven int64_t *map, 15080347a8fdSPeter Lieven BlockDriverState **file) 15090347a8fdSPeter Lieven { 15100347a8fdSPeter Lieven BDRVRBDState *s = bs->opaque; 15110347a8fdSPeter Lieven int status, r; 15120347a8fdSPeter Lieven RBDDiffIterateReq req = { .offs = offset }; 15130347a8fdSPeter Lieven uint64_t features, flags; 1514fc176116SPeter Lieven uint64_t head = 0; 15150347a8fdSPeter Lieven 15160347a8fdSPeter Lieven assert(offset + bytes <= s->image_size); 15170347a8fdSPeter Lieven 15180347a8fdSPeter Lieven /* default to all sectors allocated */ 15190347a8fdSPeter Lieven status = BDRV_BLOCK_DATA | BDRV_BLOCK_OFFSET_VALID; 15200347a8fdSPeter Lieven *map = offset; 15210347a8fdSPeter Lieven *file = bs; 15220347a8fdSPeter Lieven *pnum = bytes; 15230347a8fdSPeter Lieven 15240347a8fdSPeter Lieven /* check if RBD image supports fast-diff */ 15250347a8fdSPeter Lieven r = rbd_get_features(s->image, &features); 15260347a8fdSPeter Lieven if (r < 0) { 15270347a8fdSPeter Lieven return status; 15280347a8fdSPeter Lieven } 15290347a8fdSPeter Lieven if (!(features & RBD_FEATURE_FAST_DIFF)) { 15300347a8fdSPeter Lieven return status; 15310347a8fdSPeter Lieven } 15320347a8fdSPeter Lieven 15330347a8fdSPeter Lieven /* check if RBD fast-diff result is valid */ 15340347a8fdSPeter Lieven r = rbd_get_flags(s->image, &flags); 15350347a8fdSPeter Lieven if (r < 0) { 15360347a8fdSPeter Lieven return status; 15370347a8fdSPeter Lieven } 15380347a8fdSPeter Lieven if (flags & RBD_FLAG_FAST_DIFF_INVALID) { 15390347a8fdSPeter Lieven return status; 15400347a8fdSPeter Lieven } 15410347a8fdSPeter Lieven 1542fc176116SPeter Lieven #if LIBRBD_VERSION_CODE < LIBRBD_VERSION(1, 17, 0) 1543fc176116SPeter Lieven /* 1544fc176116SPeter Lieven * librbd had a bug until early 2022 that affected all versions of ceph that 1545fc176116SPeter Lieven * supported fast-diff. This bug results in reporting of incorrect offsets 1546fc176116SPeter Lieven * if the offset parameter to rbd_diff_iterate2 is not object aligned. 1547fc176116SPeter Lieven * Work around this bug by rounding down the offset to object boundaries. 1548fc176116SPeter Lieven * This is OK because we call rbd_diff_iterate2 with whole_object = true. 1549fc176116SPeter Lieven * However, this workaround only works for non cloned images with default 1550fc176116SPeter Lieven * striping. 1551fc176116SPeter Lieven * 1552fc176116SPeter Lieven * See: https://tracker.ceph.com/issues/53784 1553fc176116SPeter Lieven */ 1554fc176116SPeter Lieven 1555fc176116SPeter Lieven /* check if RBD image has non-default striping enabled */ 1556fc176116SPeter Lieven if (features & RBD_FEATURE_STRIPINGV2) { 1557fc176116SPeter Lieven return status; 1558fc176116SPeter Lieven } 1559fc176116SPeter Lieven 1560fc176116SPeter Lieven #pragma GCC diagnostic push 1561fc176116SPeter Lieven #pragma GCC diagnostic ignored "-Wdeprecated-declarations" 1562fc176116SPeter Lieven /* 1563fc176116SPeter Lieven * check if RBD image is a clone (= has a parent). 1564fc176116SPeter Lieven * 1565fc176116SPeter Lieven * rbd_get_parent_info is deprecated from Nautilus onwards, but the 1566fc176116SPeter Lieven * replacement rbd_get_parent is not present in Luminous and Mimic. 1567fc176116SPeter Lieven */ 1568fc176116SPeter Lieven if (rbd_get_parent_info(s->image, NULL, 0, NULL, 0, NULL, 0) != -ENOENT) { 1569fc176116SPeter Lieven return status; 1570fc176116SPeter Lieven } 1571fc176116SPeter Lieven #pragma GCC diagnostic pop 1572fc176116SPeter Lieven 1573fc176116SPeter Lieven head = req.offs & (s->object_size - 1); 1574fc176116SPeter Lieven req.offs -= head; 1575fc176116SPeter Lieven bytes += head; 1576fc176116SPeter Lieven #endif 1577fc176116SPeter Lieven 1578fc176116SPeter Lieven r = rbd_diff_iterate2(s->image, NULL, req.offs, bytes, true, true, 15790347a8fdSPeter Lieven qemu_rbd_diff_iterate_cb, &req); 15800347a8fdSPeter Lieven if (r < 0 && r != QEMU_RBD_EXIT_DIFF_ITERATE2) { 15810347a8fdSPeter Lieven return status; 15820347a8fdSPeter Lieven } 15830347a8fdSPeter Lieven assert(req.bytes <= bytes); 15840347a8fdSPeter Lieven if (!req.exists) { 15850347a8fdSPeter Lieven if (r == 0) { 15860347a8fdSPeter Lieven /* 15870347a8fdSPeter Lieven * rbd_diff_iterate2 does not invoke callbacks for unallocated 15880347a8fdSPeter Lieven * areas. This here catches the case where no callback was 15890347a8fdSPeter Lieven * invoked at all (req.bytes == 0). 15900347a8fdSPeter Lieven */ 15910347a8fdSPeter Lieven assert(req.bytes == 0); 15920347a8fdSPeter Lieven req.bytes = bytes; 15930347a8fdSPeter Lieven } 15940347a8fdSPeter Lieven status = BDRV_BLOCK_ZERO | BDRV_BLOCK_OFFSET_VALID; 15950347a8fdSPeter Lieven } 15960347a8fdSPeter Lieven 1597fc176116SPeter Lieven assert(req.bytes > head); 1598fc176116SPeter Lieven *pnum = req.bytes - head; 15990347a8fdSPeter Lieven return status; 16000347a8fdSPeter Lieven } 16010347a8fdSPeter Lieven 1602c86422c5SEmanuele Giuseppe Esposito static int64_t coroutine_fn qemu_rbd_co_getlength(BlockDriverState *bs) 1603f27aaf4bSChristian Brunner { 1604f27aaf4bSChristian Brunner BDRVRBDState *s = bs->opaque; 1605ad32e9c0SJosh Durgin int r; 1606f27aaf4bSChristian Brunner 16076d921418SPeter Lieven r = rbd_get_size(s->image, &s->image_size); 1608ad32e9c0SJosh Durgin if (r < 0) { 1609ad32e9c0SJosh Durgin return r; 1610f27aaf4bSChristian Brunner } 1611f27aaf4bSChristian Brunner 16126d921418SPeter Lieven return s->image_size; 1613ad32e9c0SJosh Durgin } 1614ad32e9c0SJosh Durgin 1615061ca8a3SKevin Wolf static int coroutine_fn qemu_rbd_co_truncate(BlockDriverState *bs, 1616061ca8a3SKevin Wolf int64_t offset, 1617c80d8b06SMax Reitz bool exact, 1618061ca8a3SKevin Wolf PreallocMode prealloc, 161992b92799SKevin Wolf BdrvRequestFlags flags, 1620061ca8a3SKevin Wolf Error **errp) 162130cdc48cSJosh Durgin { 162230cdc48cSJosh Durgin int r; 162330cdc48cSJosh Durgin 16248243ccb7SMax Reitz if (prealloc != PREALLOC_MODE_OFF) { 16258243ccb7SMax Reitz error_setg(errp, "Unsupported preallocation mode '%s'", 1626977c736fSMarkus Armbruster PreallocMode_str(prealloc)); 16278243ccb7SMax Reitz return -ENOTSUP; 16288243ccb7SMax Reitz } 16298243ccb7SMax Reitz 1630d24f8023SStefano Garzarella r = qemu_rbd_resize(bs, offset); 163130cdc48cSJosh Durgin if (r < 0) { 1632f59adb32SMax Reitz error_setg_errno(errp, -r, "Failed to resize file"); 163330cdc48cSJosh Durgin return r; 163430cdc48cSJosh Durgin } 163530cdc48cSJosh Durgin 163630cdc48cSJosh Durgin return 0; 163730cdc48cSJosh Durgin } 163830cdc48cSJosh Durgin 1639ad32e9c0SJosh Durgin static int qemu_rbd_snap_create(BlockDriverState *bs, 1640ad32e9c0SJosh Durgin QEMUSnapshotInfo *sn_info) 1641f27aaf4bSChristian Brunner { 1642f27aaf4bSChristian Brunner BDRVRBDState *s = bs->opaque; 1643f27aaf4bSChristian Brunner int r; 1644f27aaf4bSChristian Brunner 1645f27aaf4bSChristian Brunner if (sn_info->name[0] == '\0') { 1646f27aaf4bSChristian Brunner return -EINVAL; /* we need a name for rbd snapshots */ 1647f27aaf4bSChristian Brunner } 1648f27aaf4bSChristian Brunner 1649f27aaf4bSChristian Brunner /* 1650f27aaf4bSChristian Brunner * rbd snapshots are using the name as the user controlled unique identifier 1651f27aaf4bSChristian Brunner * we can't use the rbd snapid for that purpose, as it can't be set 1652f27aaf4bSChristian Brunner */ 1653f27aaf4bSChristian Brunner if (sn_info->id_str[0] != '\0' && 1654f27aaf4bSChristian Brunner strcmp(sn_info->id_str, sn_info->name) != 0) { 1655f27aaf4bSChristian Brunner return -EINVAL; 1656f27aaf4bSChristian Brunner } 1657f27aaf4bSChristian Brunner 1658f27aaf4bSChristian Brunner if (strlen(sn_info->name) >= sizeof(sn_info->id_str)) { 1659f27aaf4bSChristian Brunner return -ERANGE; 1660f27aaf4bSChristian Brunner } 1661f27aaf4bSChristian Brunner 1662ad32e9c0SJosh Durgin r = rbd_snap_create(s->image, sn_info->name); 1663f27aaf4bSChristian Brunner if (r < 0) { 1664ad32e9c0SJosh Durgin error_report("failed to create snap: %s", strerror(-r)); 1665f27aaf4bSChristian Brunner return r; 1666f27aaf4bSChristian Brunner } 1667f27aaf4bSChristian Brunner 1668f27aaf4bSChristian Brunner return 0; 1669f27aaf4bSChristian Brunner } 1670f27aaf4bSChristian Brunner 1671bd603247SGregory Farnum static int qemu_rbd_snap_remove(BlockDriverState *bs, 1672a89d89d3SWenchao Xia const char *snapshot_id, 1673a89d89d3SWenchao Xia const char *snapshot_name, 1674a89d89d3SWenchao Xia Error **errp) 1675bd603247SGregory Farnum { 1676bd603247SGregory Farnum BDRVRBDState *s = bs->opaque; 1677bd603247SGregory Farnum int r; 1678bd603247SGregory Farnum 1679a89d89d3SWenchao Xia if (!snapshot_name) { 1680a89d89d3SWenchao Xia error_setg(errp, "rbd need a valid snapshot name"); 1681a89d89d3SWenchao Xia return -EINVAL; 1682a89d89d3SWenchao Xia } 1683a89d89d3SWenchao Xia 1684a89d89d3SWenchao Xia /* If snapshot_id is specified, it must be equal to name, see 1685a89d89d3SWenchao Xia qemu_rbd_snap_list() */ 1686a89d89d3SWenchao Xia if (snapshot_id && strcmp(snapshot_id, snapshot_name)) { 1687a89d89d3SWenchao Xia error_setg(errp, 1688a89d89d3SWenchao Xia "rbd do not support snapshot id, it should be NULL or " 1689a89d89d3SWenchao Xia "equal to snapshot name"); 1690a89d89d3SWenchao Xia return -EINVAL; 1691a89d89d3SWenchao Xia } 1692a89d89d3SWenchao Xia 1693bd603247SGregory Farnum r = rbd_snap_remove(s->image, snapshot_name); 1694a89d89d3SWenchao Xia if (r < 0) { 1695a89d89d3SWenchao Xia error_setg_errno(errp, -r, "Failed to remove the snapshot"); 1696a89d89d3SWenchao Xia } 1697bd603247SGregory Farnum return r; 1698bd603247SGregory Farnum } 1699bd603247SGregory Farnum 1700bd603247SGregory Farnum static int qemu_rbd_snap_rollback(BlockDriverState *bs, 1701bd603247SGregory Farnum const char *snapshot_name) 1702bd603247SGregory Farnum { 1703bd603247SGregory Farnum BDRVRBDState *s = bs->opaque; 1704bd603247SGregory Farnum 17059be38598SEduardo Habkost return rbd_snap_rollback(s->image, snapshot_name); 1706bd603247SGregory Farnum } 1707bd603247SGregory Farnum 1708ad32e9c0SJosh Durgin static int qemu_rbd_snap_list(BlockDriverState *bs, 1709ad32e9c0SJosh Durgin QEMUSnapshotInfo **psn_tab) 1710f27aaf4bSChristian Brunner { 1711f27aaf4bSChristian Brunner BDRVRBDState *s = bs->opaque; 1712f27aaf4bSChristian Brunner QEMUSnapshotInfo *sn_info, *sn_tab = NULL; 1713ad32e9c0SJosh Durgin int i, snap_count; 1714ad32e9c0SJosh Durgin rbd_snap_info_t *snaps; 1715ad32e9c0SJosh Durgin int max_snaps = RBD_MAX_SNAPS; 1716f27aaf4bSChristian Brunner 1717ad32e9c0SJosh Durgin do { 171802c4f26bSMarkus Armbruster snaps = g_new(rbd_snap_info_t, max_snaps); 1719ad32e9c0SJosh Durgin snap_count = rbd_snap_list(s->image, snaps, &max_snaps); 17209e6337d0SStefan Hajnoczi if (snap_count <= 0) { 17217267c094SAnthony Liguori g_free(snaps); 1722f27aaf4bSChristian Brunner } 1723ad32e9c0SJosh Durgin } while (snap_count == -ERANGE); 1724f27aaf4bSChristian Brunner 1725ad32e9c0SJosh Durgin if (snap_count <= 0) { 1726b9c53290SJosh Durgin goto done; 1727f27aaf4bSChristian Brunner } 1728f27aaf4bSChristian Brunner 17295839e53bSMarkus Armbruster sn_tab = g_new0(QEMUSnapshotInfo, snap_count); 1730f27aaf4bSChristian Brunner 1731ad32e9c0SJosh Durgin for (i = 0; i < snap_count; i++) { 1732ad32e9c0SJosh Durgin const char *snap_name = snaps[i].name; 1733f27aaf4bSChristian Brunner 1734f27aaf4bSChristian Brunner sn_info = sn_tab + i; 1735f27aaf4bSChristian Brunner pstrcpy(sn_info->id_str, sizeof(sn_info->id_str), snap_name); 1736f27aaf4bSChristian Brunner pstrcpy(sn_info->name, sizeof(sn_info->name), snap_name); 1737f27aaf4bSChristian Brunner 1738ad32e9c0SJosh Durgin sn_info->vm_state_size = snaps[i].size; 1739f27aaf4bSChristian Brunner sn_info->date_sec = 0; 1740f27aaf4bSChristian Brunner sn_info->date_nsec = 0; 1741f27aaf4bSChristian Brunner sn_info->vm_clock_nsec = 0; 1742f27aaf4bSChristian Brunner } 1743ad32e9c0SJosh Durgin rbd_snap_list_end(snaps); 17449e6337d0SStefan Hajnoczi g_free(snaps); 1745ad32e9c0SJosh Durgin 1746b9c53290SJosh Durgin done: 1747f27aaf4bSChristian Brunner *psn_tab = sn_tab; 1748f27aaf4bSChristian Brunner return snap_count; 1749f27aaf4bSChristian Brunner } 1750f27aaf4bSChristian Brunner 17512b148f39SPaolo Bonzini static void coroutine_fn qemu_rbd_co_invalidate_cache(BlockDriverState *bs, 1752be217884SAdam Crume Error **errp) 1753be217884SAdam Crume { 1754be217884SAdam Crume BDRVRBDState *s = bs->opaque; 1755be217884SAdam Crume int r = rbd_invalidate_cache(s->image); 1756be217884SAdam Crume if (r < 0) { 1757be217884SAdam Crume error_setg_errno(errp, -r, "Failed to invalidate the cache"); 1758be217884SAdam Crume } 1759be217884SAdam Crume } 1760be217884SAdam Crume 1761bd0cf596SChunyan Liu static QemuOptsList qemu_rbd_create_opts = { 1762bd0cf596SChunyan Liu .name = "rbd-create-opts", 1763bd0cf596SChunyan Liu .head = QTAILQ_HEAD_INITIALIZER(qemu_rbd_create_opts.head), 1764bd0cf596SChunyan Liu .desc = { 1765f27aaf4bSChristian Brunner { 1766f27aaf4bSChristian Brunner .name = BLOCK_OPT_SIZE, 1767bd0cf596SChunyan Liu .type = QEMU_OPT_SIZE, 1768f27aaf4bSChristian Brunner .help = "Virtual disk size" 1769f27aaf4bSChristian Brunner }, 1770f27aaf4bSChristian Brunner { 1771f27aaf4bSChristian Brunner .name = BLOCK_OPT_CLUSTER_SIZE, 1772bd0cf596SChunyan Liu .type = QEMU_OPT_SIZE, 1773f27aaf4bSChristian Brunner .help = "RBD object size" 1774f27aaf4bSChristian Brunner }, 177560390a21SDaniel P. Berrange { 177660390a21SDaniel P. Berrange .name = "password-secret", 177760390a21SDaniel P. Berrange .type = QEMU_OPT_STRING, 177860390a21SDaniel P. Berrange .help = "ID of secret providing the password", 177960390a21SDaniel P. Berrange }, 178042e4ac9eSOr Ozeri { 178142e4ac9eSOr Ozeri .name = "encrypt.format", 178242e4ac9eSOr Ozeri .type = QEMU_OPT_STRING, 178342e4ac9eSOr Ozeri .help = "Encrypt the image, format choices: 'luks', 'luks2'", 178442e4ac9eSOr Ozeri }, 178542e4ac9eSOr Ozeri { 178642e4ac9eSOr Ozeri .name = "encrypt.cipher-alg", 178742e4ac9eSOr Ozeri .type = QEMU_OPT_STRING, 178842e4ac9eSOr Ozeri .help = "Name of encryption cipher algorithm" 178942e4ac9eSOr Ozeri " (allowed values: aes-128, aes-256)", 179042e4ac9eSOr Ozeri }, 179142e4ac9eSOr Ozeri { 179242e4ac9eSOr Ozeri .name = "encrypt.key-secret", 179342e4ac9eSOr Ozeri .type = QEMU_OPT_STRING, 179442e4ac9eSOr Ozeri .help = "ID of secret providing LUKS passphrase", 179542e4ac9eSOr Ozeri }, 1796bd0cf596SChunyan Liu { /* end of list */ } 1797bd0cf596SChunyan Liu } 1798f27aaf4bSChristian Brunner }; 1799f27aaf4bSChristian Brunner 18002654267cSMax Reitz static const char *const qemu_rbd_strong_runtime_opts[] = { 18012654267cSMax Reitz "pool", 18027bae7c80SStefano Garzarella "namespace", 18032654267cSMax Reitz "image", 18042654267cSMax Reitz "conf", 18052654267cSMax Reitz "snapshot", 18062654267cSMax Reitz "user", 18072654267cSMax Reitz "server.", 18082654267cSMax Reitz "password-secret", 18092654267cSMax Reitz 18102654267cSMax Reitz NULL 18112654267cSMax Reitz }; 18122654267cSMax Reitz 1813f27aaf4bSChristian Brunner static BlockDriver bdrv_rbd = { 1814f27aaf4bSChristian Brunner .format_name = "rbd", 1815f27aaf4bSChristian Brunner .instance_size = sizeof(BDRVRBDState), 1816c7cacb3eSJeff Cody .bdrv_parse_filename = qemu_rbd_parse_filename, 1817ad32e9c0SJosh Durgin .bdrv_file_open = qemu_rbd_open, 1818ad32e9c0SJosh Durgin .bdrv_close = qemu_rbd_close, 181956e7cf8dSJeff Cody .bdrv_reopen_prepare = qemu_rbd_reopen_prepare, 18201bebea37SKevin Wolf .bdrv_co_create = qemu_rbd_co_create, 1821efc75e2aSStefan Hajnoczi .bdrv_co_create_opts = qemu_rbd_co_create_opts, 18223ac21627SPeter Lieven .bdrv_has_zero_init = bdrv_has_zero_init_1, 18233d47eb0aSEmanuele Giuseppe Esposito .bdrv_co_get_info = qemu_rbd_co_get_info, 182442e4ac9eSOr Ozeri .bdrv_get_specific_info = qemu_rbd_get_specific_info, 1825bd0cf596SChunyan Liu .create_opts = &qemu_rbd_create_opts, 1826c86422c5SEmanuele Giuseppe Esposito .bdrv_co_getlength = qemu_rbd_co_getlength, 1827061ca8a3SKevin Wolf .bdrv_co_truncate = qemu_rbd_co_truncate, 1828f27aaf4bSChristian Brunner .protocol_name = "rbd", 1829f27aaf4bSChristian Brunner 1830c3e5fac5SPeter Lieven .bdrv_co_preadv = qemu_rbd_co_preadv, 1831c3e5fac5SPeter Lieven .bdrv_co_pwritev = qemu_rbd_co_pwritev, 1832c3e5fac5SPeter Lieven .bdrv_co_flush_to_disk = qemu_rbd_co_flush, 1833c3e5fac5SPeter Lieven .bdrv_co_pdiscard = qemu_rbd_co_pdiscard, 1834c56ac27dSPeter Lieven #ifdef LIBRBD_SUPPORTS_WRITE_ZEROES 1835c56ac27dSPeter Lieven .bdrv_co_pwrite_zeroes = qemu_rbd_co_pwrite_zeroes, 1836c56ac27dSPeter Lieven #endif 18370347a8fdSPeter Lieven .bdrv_co_block_status = qemu_rbd_co_block_status, 1838787f3133SJosh Durgin 1839ad32e9c0SJosh Durgin .bdrv_snapshot_create = qemu_rbd_snap_create, 1840bd603247SGregory Farnum .bdrv_snapshot_delete = qemu_rbd_snap_remove, 1841ad32e9c0SJosh Durgin .bdrv_snapshot_list = qemu_rbd_snap_list, 1842bd603247SGregory Farnum .bdrv_snapshot_goto = qemu_rbd_snap_rollback, 18432b148f39SPaolo Bonzini .bdrv_co_invalidate_cache = qemu_rbd_co_invalidate_cache, 18442654267cSMax Reitz 18452654267cSMax Reitz .strong_runtime_opts = qemu_rbd_strong_runtime_opts, 1846f27aaf4bSChristian Brunner }; 1847f27aaf4bSChristian Brunner 1848f27aaf4bSChristian Brunner static void bdrv_rbd_init(void) 1849f27aaf4bSChristian Brunner { 1850f27aaf4bSChristian Brunner bdrv_register(&bdrv_rbd); 1851f27aaf4bSChristian Brunner } 1852f27aaf4bSChristian Brunner 1853f27aaf4bSChristian Brunner block_init(bdrv_rbd_init); 1854