1f27aaf4bSChristian Brunner /* 2f27aaf4bSChristian Brunner * QEMU Block driver for RADOS (Ceph) 3f27aaf4bSChristian Brunner * 4ad32e9c0SJosh Durgin * Copyright (C) 2010-2011 Christian Brunner <chb@muc.de>, 5ad32e9c0SJosh Durgin * Josh Durgin <josh.durgin@dreamhost.com> 6f27aaf4bSChristian Brunner * 7f27aaf4bSChristian Brunner * This work is licensed under the terms of the GNU GPL, version 2. See 8f27aaf4bSChristian Brunner * the COPYING file in the top-level directory. 9f27aaf4bSChristian Brunner * 106b620ca3SPaolo Bonzini * Contributions after 2012-01-13 are licensed under the terms of the 116b620ca3SPaolo Bonzini * GNU GPL, version 2 or (at your option) any later version. 12f27aaf4bSChristian Brunner */ 13f27aaf4bSChristian Brunner 1480c71a24SPeter Maydell #include "qemu/osdep.h" 15ad32e9c0SJosh Durgin 162836284dSMarkus Armbruster #include <rbd/librbd.h> 17da34e65cSMarkus Armbruster #include "qapi/error.h" 181de7afc9SPaolo Bonzini #include "qemu/error-report.h" 190b8fa32fSMarkus Armbruster #include "qemu/module.h" 20922a01a0SMarkus Armbruster #include "qemu/option.h" 21737e150eSPaolo Bonzini #include "block/block_int.h" 22609f45eaSMax Reitz #include "block/qdict.h" 2360390a21SDaniel P. Berrange #include "crypto/secret.h" 24f348b6d1SVeronia Bahaa #include "qemu/cutils.h" 25e4ec5ad4SPavel Dovgalyuk #include "sysemu/replay.h" 26c7cacb3eSJeff Cody #include "qapi/qmp/qstring.h" 27452fcdbcSMarkus Armbruster #include "qapi/qmp/qdict.h" 28e98c6961SEric Blake #include "qapi/qmp/qjson.h" 2947e6b297SMarkus Armbruster #include "qapi/qmp/qlist.h" 304bfb2741SKevin Wolf #include "qapi/qobject-input-visitor.h" 314bfb2741SKevin Wolf #include "qapi/qapi-visit-block-core.h" 32f27aaf4bSChristian Brunner 33f27aaf4bSChristian Brunner /* 34f27aaf4bSChristian Brunner * When specifying the image filename use: 35f27aaf4bSChristian Brunner * 36fab5cf59SJosh Durgin * rbd:poolname/devicename[@snapshotname][:option1=value1[:option2=value2...]] 37f27aaf4bSChristian Brunner * 389e1fbcdeSSage Weil * poolname must be the name of an existing rados pool. 39f27aaf4bSChristian Brunner * 409e1fbcdeSSage Weil * devicename is the name of the rbd image. 41f27aaf4bSChristian Brunner * 429e1fbcdeSSage Weil * Each option given is used to configure rados, and may be any valid 439e1fbcdeSSage Weil * Ceph option, "id", or "conf". 44fab5cf59SJosh Durgin * 459e1fbcdeSSage Weil * The "id" option indicates what user we should authenticate as to 469e1fbcdeSSage Weil * the Ceph cluster. If it is excluded we will use the Ceph default 479e1fbcdeSSage Weil * (normally 'admin'). 48f27aaf4bSChristian Brunner * 499e1fbcdeSSage Weil * The "conf" option specifies a Ceph configuration file to read. If 509e1fbcdeSSage Weil * it is not specified, we will read from the default Ceph locations 519e1fbcdeSSage Weil * (e.g., /etc/ceph/ceph.conf). To avoid reading _any_ configuration 529e1fbcdeSSage Weil * file, specify conf=/dev/null. 53f27aaf4bSChristian Brunner * 549e1fbcdeSSage Weil * Configuration values containing :, @, or = can be escaped with a 559e1fbcdeSSage Weil * leading "\". 56f27aaf4bSChristian Brunner */ 57f27aaf4bSChristian Brunner 58787f3133SJosh Durgin /* rbd_aio_discard added in 0.1.2 */ 59787f3133SJosh Durgin #if LIBRBD_VERSION_CODE >= LIBRBD_VERSION(0, 1, 2) 60787f3133SJosh Durgin #define LIBRBD_SUPPORTS_DISCARD 61787f3133SJosh Durgin #else 62787f3133SJosh Durgin #undef LIBRBD_SUPPORTS_DISCARD 63787f3133SJosh Durgin #endif 64787f3133SJosh Durgin 65f27aaf4bSChristian Brunner #define OBJ_MAX_SIZE (1UL << OBJ_DEFAULT_OBJ_ORDER) 66f27aaf4bSChristian Brunner 67ad32e9c0SJosh Durgin #define RBD_MAX_SNAPS 100 68ad32e9c0SJosh Durgin 691d393bdeStianqing /* The LIBRBD_SUPPORTS_IOVEC is defined in librbd.h */ 701d393bdeStianqing #ifdef LIBRBD_SUPPORTS_IOVEC 711d393bdeStianqing #define LIBRBD_USE_IOVEC 1 721d393bdeStianqing #else 731d393bdeStianqing #define LIBRBD_USE_IOVEC 0 741d393bdeStianqing #endif 751d393bdeStianqing 76*42e4ac9eSOr Ozeri #define RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN 8 77*42e4ac9eSOr Ozeri 78*42e4ac9eSOr Ozeri static const char rbd_luks_header_verification[ 79*42e4ac9eSOr Ozeri RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = { 80*42e4ac9eSOr Ozeri 'L', 'U', 'K', 'S', 0xBA, 0xBE, 0, 1 81*42e4ac9eSOr Ozeri }; 82*42e4ac9eSOr Ozeri 83*42e4ac9eSOr Ozeri static const char rbd_luks2_header_verification[ 84*42e4ac9eSOr Ozeri RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = { 85*42e4ac9eSOr Ozeri 'L', 'U', 'K', 'S', 0xBA, 0xBE, 0, 2 86*42e4ac9eSOr Ozeri }; 87*42e4ac9eSOr Ozeri 88787f3133SJosh Durgin typedef enum { 89787f3133SJosh Durgin RBD_AIO_READ, 90787f3133SJosh Durgin RBD_AIO_WRITE, 91dc7588c1SJosh Durgin RBD_AIO_DISCARD, 92dc7588c1SJosh Durgin RBD_AIO_FLUSH 93787f3133SJosh Durgin } RBDAIOCmd; 94787f3133SJosh Durgin 95f27aaf4bSChristian Brunner typedef struct RBDAIOCB { 967c84b1b8SMarkus Armbruster BlockAIOCB common; 9708448d51SStefan Priebe int64_t ret; 98f27aaf4bSChristian Brunner QEMUIOVector *qiov; 99f27aaf4bSChristian Brunner char *bounce; 100787f3133SJosh Durgin RBDAIOCmd cmd; 101f27aaf4bSChristian Brunner int error; 102f27aaf4bSChristian Brunner struct BDRVRBDState *s; 103f27aaf4bSChristian Brunner } RBDAIOCB; 104f27aaf4bSChristian Brunner 105f27aaf4bSChristian Brunner typedef struct RADOSCB { 106f27aaf4bSChristian Brunner RBDAIOCB *acb; 107f27aaf4bSChristian Brunner struct BDRVRBDState *s; 108ad32e9c0SJosh Durgin int64_t size; 109f27aaf4bSChristian Brunner char *buf; 11008448d51SStefan Priebe int64_t ret; 111f27aaf4bSChristian Brunner } RADOSCB; 112f27aaf4bSChristian Brunner 113f27aaf4bSChristian Brunner typedef struct BDRVRBDState { 114ad32e9c0SJosh Durgin rados_t cluster; 115ad32e9c0SJosh Durgin rados_ioctx_t io_ctx; 116ad32e9c0SJosh Durgin rbd_image_t image; 11780b61a27SJeff Cody char *image_name; 118ad32e9c0SJosh Durgin char *snap; 11919ae9ae0SFlorian Florensa char *namespace; 120d24f8023SStefano Garzarella uint64_t image_size; 121f27aaf4bSChristian Brunner } BDRVRBDState; 122f27aaf4bSChristian Brunner 123aa045c2dSKevin Wolf static int qemu_rbd_connect(rados_t *cluster, rados_ioctx_t *io_ctx, 124aa045c2dSKevin Wolf BlockdevOptionsRbd *opts, bool cache, 125aa045c2dSKevin Wolf const char *keypairs, const char *secretid, 126aa045c2dSKevin Wolf Error **errp); 127aa045c2dSKevin Wolf 1282b99cfceSConnor Kuehl static char *qemu_rbd_strchr(char *src, char delim) 1292b99cfceSConnor Kuehl { 1302b99cfceSConnor Kuehl char *p; 1312b99cfceSConnor Kuehl 1322b99cfceSConnor Kuehl for (p = src; *p; ++p) { 1332b99cfceSConnor Kuehl if (*p == delim) { 1342b99cfceSConnor Kuehl return p; 1352b99cfceSConnor Kuehl } 1362b99cfceSConnor Kuehl if (*p == '\\' && p[1] != '\0') { 1372b99cfceSConnor Kuehl ++p; 1382b99cfceSConnor Kuehl } 1392b99cfceSConnor Kuehl } 1402b99cfceSConnor Kuehl 1412b99cfceSConnor Kuehl return NULL; 1422b99cfceSConnor Kuehl } 1432b99cfceSConnor Kuehl 1442b99cfceSConnor Kuehl 145730b00bbSMarkus Armbruster static char *qemu_rbd_next_tok(char *src, char delim, char **p) 146f27aaf4bSChristian Brunner { 147f27aaf4bSChristian Brunner char *end; 148f27aaf4bSChristian Brunner 149f27aaf4bSChristian Brunner *p = NULL; 150f27aaf4bSChristian Brunner 1512b99cfceSConnor Kuehl end = qemu_rbd_strchr(src, delim); 1522b99cfceSConnor Kuehl if (end) { 153f27aaf4bSChristian Brunner *p = end + 1; 154f27aaf4bSChristian Brunner *end = '\0'; 155f27aaf4bSChristian Brunner } 1567830f909SJeff Cody return src; 157f27aaf4bSChristian Brunner } 158f27aaf4bSChristian Brunner 15916a06b24SSage Weil static void qemu_rbd_unescape(char *src) 16016a06b24SSage Weil { 16116a06b24SSage Weil char *p; 16216a06b24SSage Weil 16316a06b24SSage Weil for (p = src; *src; ++src, ++p) { 16416a06b24SSage Weil if (*src == '\\' && src[1] != '\0') { 16516a06b24SSage Weil src++; 16616a06b24SSage Weil } 16716a06b24SSage Weil *p = *src; 16816a06b24SSage Weil } 16916a06b24SSage Weil *p = '\0'; 17016a06b24SSage Weil } 17116a06b24SSage Weil 172c7cacb3eSJeff Cody static void qemu_rbd_parse_filename(const char *filename, QDict *options, 173d61563b2SMarkus Armbruster Error **errp) 174f27aaf4bSChristian Brunner { 175f27aaf4bSChristian Brunner const char *start; 176e98c6961SEric Blake char *p, *buf; 177e98c6961SEric Blake QList *keypairs = NULL; 17819ae9ae0SFlorian Florensa char *found_str, *image_name; 179f27aaf4bSChristian Brunner 180f27aaf4bSChristian Brunner if (!strstart(filename, "rbd:", &start)) { 181d61563b2SMarkus Armbruster error_setg(errp, "File name must start with 'rbd:'"); 182c7cacb3eSJeff Cody return; 183f27aaf4bSChristian Brunner } 184f27aaf4bSChristian Brunner 1857267c094SAnthony Liguori buf = g_strdup(start); 186f27aaf4bSChristian Brunner p = buf; 187f27aaf4bSChristian Brunner 188730b00bbSMarkus Armbruster found_str = qemu_rbd_next_tok(p, '/', &p); 1897830f909SJeff Cody if (!p) { 1907830f909SJeff Cody error_setg(errp, "Pool name is required"); 1917830f909SJeff Cody goto done; 1927830f909SJeff Cody } 1937830f909SJeff Cody qemu_rbd_unescape(found_str); 19446f5ac20SEric Blake qdict_put_str(options, "pool", found_str); 195fab5cf59SJosh Durgin 1962b99cfceSConnor Kuehl if (qemu_rbd_strchr(p, '@')) { 19719ae9ae0SFlorian Florensa image_name = qemu_rbd_next_tok(p, '@', &p); 1987830f909SJeff Cody 199730b00bbSMarkus Armbruster found_str = qemu_rbd_next_tok(p, ':', &p); 2007830f909SJeff Cody qemu_rbd_unescape(found_str); 20146f5ac20SEric Blake qdict_put_str(options, "snapshot", found_str); 2027830f909SJeff Cody } else { 20319ae9ae0SFlorian Florensa image_name = qemu_rbd_next_tok(p, ':', &p); 2047830f909SJeff Cody } 20519ae9ae0SFlorian Florensa /* Check for namespace in the image_name */ 2062b99cfceSConnor Kuehl if (qemu_rbd_strchr(image_name, '/')) { 20719ae9ae0SFlorian Florensa found_str = qemu_rbd_next_tok(image_name, '/', &image_name); 20819ae9ae0SFlorian Florensa qemu_rbd_unescape(found_str); 20919ae9ae0SFlorian Florensa qdict_put_str(options, "namespace", found_str); 21019ae9ae0SFlorian Florensa } else { 21119ae9ae0SFlorian Florensa qdict_put_str(options, "namespace", ""); 21219ae9ae0SFlorian Florensa } 21319ae9ae0SFlorian Florensa qemu_rbd_unescape(image_name); 21419ae9ae0SFlorian Florensa qdict_put_str(options, "image", image_name); 2157830f909SJeff Cody if (!p) { 216f27aaf4bSChristian Brunner goto done; 217f27aaf4bSChristian Brunner } 218f27aaf4bSChristian Brunner 219c7cacb3eSJeff Cody /* The following are essentially all key/value pairs, and we treat 220c7cacb3eSJeff Cody * 'id' and 'conf' a bit special. Key/value pairs may be in any order. */ 221c7cacb3eSJeff Cody while (p) { 222c7cacb3eSJeff Cody char *name, *value; 223730b00bbSMarkus Armbruster name = qemu_rbd_next_tok(p, '=', &p); 224c7cacb3eSJeff Cody if (!p) { 225c7cacb3eSJeff Cody error_setg(errp, "conf option %s has no value", name); 226c7cacb3eSJeff Cody break; 227c7cacb3eSJeff Cody } 228c7cacb3eSJeff Cody 229c7cacb3eSJeff Cody qemu_rbd_unescape(name); 230c7cacb3eSJeff Cody 231730b00bbSMarkus Armbruster value = qemu_rbd_next_tok(p, ':', &p); 232c7cacb3eSJeff Cody qemu_rbd_unescape(value); 233c7cacb3eSJeff Cody 234c7cacb3eSJeff Cody if (!strcmp(name, "conf")) { 23546f5ac20SEric Blake qdict_put_str(options, "conf", value); 236c7cacb3eSJeff Cody } else if (!strcmp(name, "id")) { 23746f5ac20SEric Blake qdict_put_str(options, "user", value); 238c7cacb3eSJeff Cody } else { 239e98c6961SEric Blake /* 240e98c6961SEric Blake * We pass these internally to qemu_rbd_set_keypairs(), so 241e98c6961SEric Blake * we can get away with the simpler list of [ "key1", 242e98c6961SEric Blake * "value1", "key2", "value2" ] rather than a raw dict 243e98c6961SEric Blake * { "key1": "value1", "key2": "value2" } where we can't 244e98c6961SEric Blake * guarantee order, or even a more correct but complex 245e98c6961SEric Blake * [ { "key1": "value1" }, { "key2": "value2" } ] 246e98c6961SEric Blake */ 247e98c6961SEric Blake if (!keypairs) { 248e98c6961SEric Blake keypairs = qlist_new(); 249c7cacb3eSJeff Cody } 25046f5ac20SEric Blake qlist_append_str(keypairs, name); 25146f5ac20SEric Blake qlist_append_str(keypairs, value); 252c7cacb3eSJeff Cody } 253c7cacb3eSJeff Cody } 254c7cacb3eSJeff Cody 255e98c6961SEric Blake if (keypairs) { 256e98c6961SEric Blake qdict_put(options, "=keyvalue-pairs", 257eab3a467SMarkus Armbruster qstring_from_gstring(qobject_to_json(QOBJECT(keypairs)))); 258c7cacb3eSJeff Cody } 259c7cacb3eSJeff Cody 260f27aaf4bSChristian Brunner done: 2617267c094SAnthony Liguori g_free(buf); 262cb3e7f08SMarc-André Lureau qobject_unref(keypairs); 263c7cacb3eSJeff Cody return; 2647c7e9df0SSage Weil } 2657c7e9df0SSage Weil 26660390a21SDaniel P. Berrange 267e8e16d4bSEric Blake static void qemu_rbd_refresh_limits(BlockDriverState *bs, Error **errp) 268e8e16d4bSEric Blake { 269e8e16d4bSEric Blake /* XXX Does RBD support AIO on less than 512-byte alignment? */ 270e8e16d4bSEric Blake bs->bl.request_alignment = 512; 271e8e16d4bSEric Blake } 272e8e16d4bSEric Blake 273e8e16d4bSEric Blake 274d083f954SMarkus Armbruster static int qemu_rbd_set_auth(rados_t cluster, BlockdevOptionsRbd *opts, 27560390a21SDaniel P. Berrange Error **errp) 27660390a21SDaniel P. Berrange { 277d083f954SMarkus Armbruster char *key, *acr; 278a3699de4SMarkus Armbruster int r; 279a3699de4SMarkus Armbruster GString *accu; 280a3699de4SMarkus Armbruster RbdAuthModeList *auth; 28160390a21SDaniel P. Berrange 282d083f954SMarkus Armbruster if (opts->key_secret) { 283d083f954SMarkus Armbruster key = qcrypto_secret_lookup_as_base64(opts->key_secret, errp); 284d083f954SMarkus Armbruster if (!key) { 285d083f954SMarkus Armbruster return -EIO; 28660390a21SDaniel P. Berrange } 287d083f954SMarkus Armbruster r = rados_conf_set(cluster, "key", key); 288d083f954SMarkus Armbruster g_free(key); 289d083f954SMarkus Armbruster if (r < 0) { 290d083f954SMarkus Armbruster error_setg_errno(errp, -r, "Could not set 'key'"); 291d083f954SMarkus Armbruster return r; 292d083f954SMarkus Armbruster } 293a3699de4SMarkus Armbruster } 294a3699de4SMarkus Armbruster 295a3699de4SMarkus Armbruster if (opts->has_auth_client_required) { 296a3699de4SMarkus Armbruster accu = g_string_new(""); 297a3699de4SMarkus Armbruster for (auth = opts->auth_client_required; auth; auth = auth->next) { 298a3699de4SMarkus Armbruster if (accu->str[0]) { 299a3699de4SMarkus Armbruster g_string_append_c(accu, ';'); 300a3699de4SMarkus Armbruster } 301a3699de4SMarkus Armbruster g_string_append(accu, RbdAuthMode_str(auth->value)); 302a3699de4SMarkus Armbruster } 303a3699de4SMarkus Armbruster acr = g_string_free(accu, FALSE); 304a3699de4SMarkus Armbruster r = rados_conf_set(cluster, "auth_client_required", acr); 305a3699de4SMarkus Armbruster g_free(acr); 306a3699de4SMarkus Armbruster if (r < 0) { 307a3699de4SMarkus Armbruster error_setg_errno(errp, -r, 308a3699de4SMarkus Armbruster "Could not set 'auth_client_required'"); 309a3699de4SMarkus Armbruster return r; 310a3699de4SMarkus Armbruster } 311a3699de4SMarkus Armbruster } 31260390a21SDaniel P. Berrange 31360390a21SDaniel P. Berrange return 0; 31460390a21SDaniel P. Berrange } 31560390a21SDaniel P. Berrange 316e98c6961SEric Blake static int qemu_rbd_set_keypairs(rados_t cluster, const char *keypairs_json, 317e34d8f29SJosh Durgin Error **errp) 318fab5cf59SJosh Durgin { 319e98c6961SEric Blake QList *keypairs; 320e98c6961SEric Blake QString *name; 321e98c6961SEric Blake QString *value; 322e98c6961SEric Blake const char *key; 323e98c6961SEric Blake size_t remaining; 324fab5cf59SJosh Durgin int ret = 0; 325fab5cf59SJosh Durgin 326e98c6961SEric Blake if (!keypairs_json) { 327e98c6961SEric Blake return ret; 328fab5cf59SJosh Durgin } 3297dc847ebSMax Reitz keypairs = qobject_to(QList, 3307dc847ebSMax Reitz qobject_from_json(keypairs_json, &error_abort)); 331e98c6961SEric Blake remaining = qlist_size(keypairs) / 2; 332e98c6961SEric Blake assert(remaining); 333fab5cf59SJosh Durgin 334e98c6961SEric Blake while (remaining--) { 3357dc847ebSMax Reitz name = qobject_to(QString, qlist_pop(keypairs)); 3367dc847ebSMax Reitz value = qobject_to(QString, qlist_pop(keypairs)); 337e98c6961SEric Blake assert(name && value); 338e98c6961SEric Blake key = qstring_get_str(name); 339fab5cf59SJosh Durgin 340e98c6961SEric Blake ret = rados_conf_set(cluster, key, qstring_get_str(value)); 341cb3e7f08SMarc-André Lureau qobject_unref(value); 342fab5cf59SJosh Durgin if (ret < 0) { 343e98c6961SEric Blake error_setg_errno(errp, -ret, "invalid conf option %s", key); 344cb3e7f08SMarc-André Lureau qobject_unref(name); 345fab5cf59SJosh Durgin ret = -EINVAL; 346fab5cf59SJosh Durgin break; 347fab5cf59SJosh Durgin } 348cb3e7f08SMarc-André Lureau qobject_unref(name); 349fab5cf59SJosh Durgin } 350fab5cf59SJosh Durgin 351cb3e7f08SMarc-André Lureau qobject_unref(keypairs); 352fab5cf59SJosh Durgin return ret; 353fab5cf59SJosh Durgin } 354fab5cf59SJosh Durgin 3551d393bdeStianqing static void qemu_rbd_memset(RADOSCB *rcb, int64_t offs) 3561d393bdeStianqing { 3571d393bdeStianqing if (LIBRBD_USE_IOVEC) { 3581d393bdeStianqing RBDAIOCB *acb = rcb->acb; 3591d393bdeStianqing iov_memset(acb->qiov->iov, acb->qiov->niov, offs, 0, 3601d393bdeStianqing acb->qiov->size - offs); 3611d393bdeStianqing } else { 3621d393bdeStianqing memset(rcb->buf + offs, 0, rcb->size - offs); 3631d393bdeStianqing } 3641d393bdeStianqing } 3651d393bdeStianqing 366*42e4ac9eSOr Ozeri #ifdef LIBRBD_SUPPORTS_ENCRYPTION 367*42e4ac9eSOr Ozeri static int qemu_rbd_convert_luks_options( 368*42e4ac9eSOr Ozeri RbdEncryptionOptionsLUKSBase *luks_opts, 369*42e4ac9eSOr Ozeri char **passphrase, 370*42e4ac9eSOr Ozeri size_t *passphrase_len, 371*42e4ac9eSOr Ozeri Error **errp) 372*42e4ac9eSOr Ozeri { 373*42e4ac9eSOr Ozeri return qcrypto_secret_lookup(luks_opts->key_secret, (uint8_t **)passphrase, 374*42e4ac9eSOr Ozeri passphrase_len, errp); 375*42e4ac9eSOr Ozeri } 376*42e4ac9eSOr Ozeri 377*42e4ac9eSOr Ozeri static int qemu_rbd_convert_luks_create_options( 378*42e4ac9eSOr Ozeri RbdEncryptionCreateOptionsLUKSBase *luks_opts, 379*42e4ac9eSOr Ozeri rbd_encryption_algorithm_t *alg, 380*42e4ac9eSOr Ozeri char **passphrase, 381*42e4ac9eSOr Ozeri size_t *passphrase_len, 382*42e4ac9eSOr Ozeri Error **errp) 383*42e4ac9eSOr Ozeri { 384*42e4ac9eSOr Ozeri int r = 0; 385*42e4ac9eSOr Ozeri 386*42e4ac9eSOr Ozeri r = qemu_rbd_convert_luks_options( 387*42e4ac9eSOr Ozeri qapi_RbdEncryptionCreateOptionsLUKSBase_base(luks_opts), 388*42e4ac9eSOr Ozeri passphrase, passphrase_len, errp); 389*42e4ac9eSOr Ozeri if (r < 0) { 390*42e4ac9eSOr Ozeri return r; 391*42e4ac9eSOr Ozeri } 392*42e4ac9eSOr Ozeri 393*42e4ac9eSOr Ozeri if (luks_opts->has_cipher_alg) { 394*42e4ac9eSOr Ozeri switch (luks_opts->cipher_alg) { 395*42e4ac9eSOr Ozeri case QCRYPTO_CIPHER_ALG_AES_128: { 396*42e4ac9eSOr Ozeri *alg = RBD_ENCRYPTION_ALGORITHM_AES128; 397*42e4ac9eSOr Ozeri break; 398*42e4ac9eSOr Ozeri } 399*42e4ac9eSOr Ozeri case QCRYPTO_CIPHER_ALG_AES_256: { 400*42e4ac9eSOr Ozeri *alg = RBD_ENCRYPTION_ALGORITHM_AES256; 401*42e4ac9eSOr Ozeri break; 402*42e4ac9eSOr Ozeri } 403*42e4ac9eSOr Ozeri default: { 404*42e4ac9eSOr Ozeri r = -ENOTSUP; 405*42e4ac9eSOr Ozeri error_setg_errno(errp, -r, "unknown encryption algorithm: %u", 406*42e4ac9eSOr Ozeri luks_opts->cipher_alg); 407*42e4ac9eSOr Ozeri return r; 408*42e4ac9eSOr Ozeri } 409*42e4ac9eSOr Ozeri } 410*42e4ac9eSOr Ozeri } else { 411*42e4ac9eSOr Ozeri /* default alg */ 412*42e4ac9eSOr Ozeri *alg = RBD_ENCRYPTION_ALGORITHM_AES256; 413*42e4ac9eSOr Ozeri } 414*42e4ac9eSOr Ozeri 415*42e4ac9eSOr Ozeri return 0; 416*42e4ac9eSOr Ozeri } 417*42e4ac9eSOr Ozeri 418*42e4ac9eSOr Ozeri static int qemu_rbd_encryption_format(rbd_image_t image, 419*42e4ac9eSOr Ozeri RbdEncryptionCreateOptions *encrypt, 420*42e4ac9eSOr Ozeri Error **errp) 421*42e4ac9eSOr Ozeri { 422*42e4ac9eSOr Ozeri int r = 0; 423*42e4ac9eSOr Ozeri g_autofree char *passphrase = NULL; 424*42e4ac9eSOr Ozeri size_t passphrase_len; 425*42e4ac9eSOr Ozeri rbd_encryption_format_t format; 426*42e4ac9eSOr Ozeri rbd_encryption_options_t opts; 427*42e4ac9eSOr Ozeri rbd_encryption_luks1_format_options_t luks_opts; 428*42e4ac9eSOr Ozeri rbd_encryption_luks2_format_options_t luks2_opts; 429*42e4ac9eSOr Ozeri size_t opts_size; 430*42e4ac9eSOr Ozeri uint64_t raw_size, effective_size; 431*42e4ac9eSOr Ozeri 432*42e4ac9eSOr Ozeri r = rbd_get_size(image, &raw_size); 433*42e4ac9eSOr Ozeri if (r < 0) { 434*42e4ac9eSOr Ozeri error_setg_errno(errp, -r, "cannot get raw image size"); 435*42e4ac9eSOr Ozeri return r; 436*42e4ac9eSOr Ozeri } 437*42e4ac9eSOr Ozeri 438*42e4ac9eSOr Ozeri switch (encrypt->format) { 439*42e4ac9eSOr Ozeri case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS: { 440*42e4ac9eSOr Ozeri memset(&luks_opts, 0, sizeof(luks_opts)); 441*42e4ac9eSOr Ozeri format = RBD_ENCRYPTION_FORMAT_LUKS1; 442*42e4ac9eSOr Ozeri opts = &luks_opts; 443*42e4ac9eSOr Ozeri opts_size = sizeof(luks_opts); 444*42e4ac9eSOr Ozeri r = qemu_rbd_convert_luks_create_options( 445*42e4ac9eSOr Ozeri qapi_RbdEncryptionCreateOptionsLUKS_base(&encrypt->u.luks), 446*42e4ac9eSOr Ozeri &luks_opts.alg, &passphrase, &passphrase_len, errp); 447*42e4ac9eSOr Ozeri if (r < 0) { 448*42e4ac9eSOr Ozeri return r; 449*42e4ac9eSOr Ozeri } 450*42e4ac9eSOr Ozeri luks_opts.passphrase = passphrase; 451*42e4ac9eSOr Ozeri luks_opts.passphrase_size = passphrase_len; 452*42e4ac9eSOr Ozeri break; 453*42e4ac9eSOr Ozeri } 454*42e4ac9eSOr Ozeri case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2: { 455*42e4ac9eSOr Ozeri memset(&luks2_opts, 0, sizeof(luks2_opts)); 456*42e4ac9eSOr Ozeri format = RBD_ENCRYPTION_FORMAT_LUKS2; 457*42e4ac9eSOr Ozeri opts = &luks2_opts; 458*42e4ac9eSOr Ozeri opts_size = sizeof(luks2_opts); 459*42e4ac9eSOr Ozeri r = qemu_rbd_convert_luks_create_options( 460*42e4ac9eSOr Ozeri qapi_RbdEncryptionCreateOptionsLUKS2_base( 461*42e4ac9eSOr Ozeri &encrypt->u.luks2), 462*42e4ac9eSOr Ozeri &luks2_opts.alg, &passphrase, &passphrase_len, errp); 463*42e4ac9eSOr Ozeri if (r < 0) { 464*42e4ac9eSOr Ozeri return r; 465*42e4ac9eSOr Ozeri } 466*42e4ac9eSOr Ozeri luks2_opts.passphrase = passphrase; 467*42e4ac9eSOr Ozeri luks2_opts.passphrase_size = passphrase_len; 468*42e4ac9eSOr Ozeri break; 469*42e4ac9eSOr Ozeri } 470*42e4ac9eSOr Ozeri default: { 471*42e4ac9eSOr Ozeri r = -ENOTSUP; 472*42e4ac9eSOr Ozeri error_setg_errno( 473*42e4ac9eSOr Ozeri errp, -r, "unknown image encryption format: %u", 474*42e4ac9eSOr Ozeri encrypt->format); 475*42e4ac9eSOr Ozeri return r; 476*42e4ac9eSOr Ozeri } 477*42e4ac9eSOr Ozeri } 478*42e4ac9eSOr Ozeri 479*42e4ac9eSOr Ozeri r = rbd_encryption_format(image, format, opts, opts_size); 480*42e4ac9eSOr Ozeri if (r < 0) { 481*42e4ac9eSOr Ozeri error_setg_errno(errp, -r, "encryption format fail"); 482*42e4ac9eSOr Ozeri return r; 483*42e4ac9eSOr Ozeri } 484*42e4ac9eSOr Ozeri 485*42e4ac9eSOr Ozeri r = rbd_get_size(image, &effective_size); 486*42e4ac9eSOr Ozeri if (r < 0) { 487*42e4ac9eSOr Ozeri error_setg_errno(errp, -r, "cannot get effective image size"); 488*42e4ac9eSOr Ozeri return r; 489*42e4ac9eSOr Ozeri } 490*42e4ac9eSOr Ozeri 491*42e4ac9eSOr Ozeri r = rbd_resize(image, raw_size + (raw_size - effective_size)); 492*42e4ac9eSOr Ozeri if (r < 0) { 493*42e4ac9eSOr Ozeri error_setg_errno(errp, -r, "cannot resize image after format"); 494*42e4ac9eSOr Ozeri return r; 495*42e4ac9eSOr Ozeri } 496*42e4ac9eSOr Ozeri 497*42e4ac9eSOr Ozeri return 0; 498*42e4ac9eSOr Ozeri } 499*42e4ac9eSOr Ozeri 500*42e4ac9eSOr Ozeri static int qemu_rbd_encryption_load(rbd_image_t image, 501*42e4ac9eSOr Ozeri RbdEncryptionOptions *encrypt, 502*42e4ac9eSOr Ozeri Error **errp) 503*42e4ac9eSOr Ozeri { 504*42e4ac9eSOr Ozeri int r = 0; 505*42e4ac9eSOr Ozeri g_autofree char *passphrase = NULL; 506*42e4ac9eSOr Ozeri size_t passphrase_len; 507*42e4ac9eSOr Ozeri rbd_encryption_luks1_format_options_t luks_opts; 508*42e4ac9eSOr Ozeri rbd_encryption_luks2_format_options_t luks2_opts; 509*42e4ac9eSOr Ozeri rbd_encryption_format_t format; 510*42e4ac9eSOr Ozeri rbd_encryption_options_t opts; 511*42e4ac9eSOr Ozeri size_t opts_size; 512*42e4ac9eSOr Ozeri 513*42e4ac9eSOr Ozeri switch (encrypt->format) { 514*42e4ac9eSOr Ozeri case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS: { 515*42e4ac9eSOr Ozeri memset(&luks_opts, 0, sizeof(luks_opts)); 516*42e4ac9eSOr Ozeri format = RBD_ENCRYPTION_FORMAT_LUKS1; 517*42e4ac9eSOr Ozeri opts = &luks_opts; 518*42e4ac9eSOr Ozeri opts_size = sizeof(luks_opts); 519*42e4ac9eSOr Ozeri r = qemu_rbd_convert_luks_options( 520*42e4ac9eSOr Ozeri qapi_RbdEncryptionOptionsLUKS_base(&encrypt->u.luks), 521*42e4ac9eSOr Ozeri &passphrase, &passphrase_len, errp); 522*42e4ac9eSOr Ozeri if (r < 0) { 523*42e4ac9eSOr Ozeri return r; 524*42e4ac9eSOr Ozeri } 525*42e4ac9eSOr Ozeri luks_opts.passphrase = passphrase; 526*42e4ac9eSOr Ozeri luks_opts.passphrase_size = passphrase_len; 527*42e4ac9eSOr Ozeri break; 528*42e4ac9eSOr Ozeri } 529*42e4ac9eSOr Ozeri case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2: { 530*42e4ac9eSOr Ozeri memset(&luks2_opts, 0, sizeof(luks2_opts)); 531*42e4ac9eSOr Ozeri format = RBD_ENCRYPTION_FORMAT_LUKS2; 532*42e4ac9eSOr Ozeri opts = &luks2_opts; 533*42e4ac9eSOr Ozeri opts_size = sizeof(luks2_opts); 534*42e4ac9eSOr Ozeri r = qemu_rbd_convert_luks_options( 535*42e4ac9eSOr Ozeri qapi_RbdEncryptionOptionsLUKS2_base(&encrypt->u.luks2), 536*42e4ac9eSOr Ozeri &passphrase, &passphrase_len, errp); 537*42e4ac9eSOr Ozeri if (r < 0) { 538*42e4ac9eSOr Ozeri return r; 539*42e4ac9eSOr Ozeri } 540*42e4ac9eSOr Ozeri luks2_opts.passphrase = passphrase; 541*42e4ac9eSOr Ozeri luks2_opts.passphrase_size = passphrase_len; 542*42e4ac9eSOr Ozeri break; 543*42e4ac9eSOr Ozeri } 544*42e4ac9eSOr Ozeri default: { 545*42e4ac9eSOr Ozeri r = -ENOTSUP; 546*42e4ac9eSOr Ozeri error_setg_errno( 547*42e4ac9eSOr Ozeri errp, -r, "unknown image encryption format: %u", 548*42e4ac9eSOr Ozeri encrypt->format); 549*42e4ac9eSOr Ozeri return r; 550*42e4ac9eSOr Ozeri } 551*42e4ac9eSOr Ozeri } 552*42e4ac9eSOr Ozeri 553*42e4ac9eSOr Ozeri r = rbd_encryption_load(image, format, opts, opts_size); 554*42e4ac9eSOr Ozeri if (r < 0) { 555*42e4ac9eSOr Ozeri error_setg_errno(errp, -r, "encryption load fail"); 556*42e4ac9eSOr Ozeri return r; 557*42e4ac9eSOr Ozeri } 558*42e4ac9eSOr Ozeri 559*42e4ac9eSOr Ozeri return 0; 560*42e4ac9eSOr Ozeri } 561*42e4ac9eSOr Ozeri #endif 562*42e4ac9eSOr Ozeri 563d083f954SMarkus Armbruster /* FIXME Deprecate and remove keypairs or make it available in QMP. */ 5641bebea37SKevin Wolf static int qemu_rbd_do_create(BlockdevCreateOptions *options, 5651bebea37SKevin Wolf const char *keypairs, const char *password_secret, 5661bebea37SKevin Wolf Error **errp) 5671bebea37SKevin Wolf { 5681bebea37SKevin Wolf BlockdevCreateOptionsRbd *opts = &options->u.rbd; 5691bebea37SKevin Wolf rados_t cluster; 5701bebea37SKevin Wolf rados_ioctx_t io_ctx; 5711bebea37SKevin Wolf int obj_order = 0; 5721bebea37SKevin Wolf int ret; 5731bebea37SKevin Wolf 5741bebea37SKevin Wolf assert(options->driver == BLOCKDEV_DRIVER_RBD); 5751bebea37SKevin Wolf if (opts->location->has_snapshot) { 5761bebea37SKevin Wolf error_setg(errp, "Can't use snapshot name for image creation"); 5771bebea37SKevin Wolf return -EINVAL; 5781bebea37SKevin Wolf } 5791bebea37SKevin Wolf 580*42e4ac9eSOr Ozeri #ifndef LIBRBD_SUPPORTS_ENCRYPTION 581*42e4ac9eSOr Ozeri if (opts->has_encrypt) { 582*42e4ac9eSOr Ozeri error_setg(errp, "RBD library does not support image encryption"); 583*42e4ac9eSOr Ozeri return -ENOTSUP; 584*42e4ac9eSOr Ozeri } 585*42e4ac9eSOr Ozeri #endif 586*42e4ac9eSOr Ozeri 5871bebea37SKevin Wolf if (opts->has_cluster_size) { 5881bebea37SKevin Wolf int64_t objsize = opts->cluster_size; 5891bebea37SKevin Wolf if ((objsize - 1) & objsize) { /* not a power of 2? */ 5901bebea37SKevin Wolf error_setg(errp, "obj size needs to be power of 2"); 5911bebea37SKevin Wolf return -EINVAL; 5921bebea37SKevin Wolf } 5931bebea37SKevin Wolf if (objsize < 4096) { 5941bebea37SKevin Wolf error_setg(errp, "obj size too small"); 5951bebea37SKevin Wolf return -EINVAL; 5961bebea37SKevin Wolf } 5971bebea37SKevin Wolf obj_order = ctz32(objsize); 5981bebea37SKevin Wolf } 5991bebea37SKevin Wolf 600aa045c2dSKevin Wolf ret = qemu_rbd_connect(&cluster, &io_ctx, opts->location, false, keypairs, 601aa045c2dSKevin Wolf password_secret, errp); 6021bebea37SKevin Wolf if (ret < 0) { 6031bebea37SKevin Wolf return ret; 6041bebea37SKevin Wolf } 6051bebea37SKevin Wolf 6061bebea37SKevin Wolf ret = rbd_create(io_ctx, opts->location->image, opts->size, &obj_order); 6071bebea37SKevin Wolf if (ret < 0) { 6081bebea37SKevin Wolf error_setg_errno(errp, -ret, "error rbd create"); 609aa045c2dSKevin Wolf goto out; 6101bebea37SKevin Wolf } 6111bebea37SKevin Wolf 612*42e4ac9eSOr Ozeri #ifdef LIBRBD_SUPPORTS_ENCRYPTION 613*42e4ac9eSOr Ozeri if (opts->has_encrypt) { 614*42e4ac9eSOr Ozeri rbd_image_t image; 615*42e4ac9eSOr Ozeri 616*42e4ac9eSOr Ozeri ret = rbd_open(io_ctx, opts->location->image, &image, NULL); 617*42e4ac9eSOr Ozeri if (ret < 0) { 618*42e4ac9eSOr Ozeri error_setg_errno(errp, -ret, 619*42e4ac9eSOr Ozeri "error opening image '%s' for encryption format", 620*42e4ac9eSOr Ozeri opts->location->image); 621*42e4ac9eSOr Ozeri goto out; 622*42e4ac9eSOr Ozeri } 623*42e4ac9eSOr Ozeri 624*42e4ac9eSOr Ozeri ret = qemu_rbd_encryption_format(image, opts->encrypt, errp); 625*42e4ac9eSOr Ozeri rbd_close(image); 626*42e4ac9eSOr Ozeri if (ret < 0) { 627*42e4ac9eSOr Ozeri /* encryption format fail, try removing the image */ 628*42e4ac9eSOr Ozeri rbd_remove(io_ctx, opts->location->image); 629*42e4ac9eSOr Ozeri goto out; 630*42e4ac9eSOr Ozeri } 631*42e4ac9eSOr Ozeri } 632*42e4ac9eSOr Ozeri #endif 633*42e4ac9eSOr Ozeri 6341bebea37SKevin Wolf ret = 0; 635aa045c2dSKevin Wolf out: 636aa045c2dSKevin Wolf rados_ioctx_destroy(io_ctx); 6371bebea37SKevin Wolf rados_shutdown(cluster); 6381bebea37SKevin Wolf return ret; 6391bebea37SKevin Wolf } 6401bebea37SKevin Wolf 6411bebea37SKevin Wolf static int qemu_rbd_co_create(BlockdevCreateOptions *options, Error **errp) 6421bebea37SKevin Wolf { 6431bebea37SKevin Wolf return qemu_rbd_do_create(options, NULL, NULL, errp); 6441bebea37SKevin Wolf } 6451bebea37SKevin Wolf 646*42e4ac9eSOr Ozeri static int qemu_rbd_extract_encryption_create_options( 647*42e4ac9eSOr Ozeri QemuOpts *opts, 648*42e4ac9eSOr Ozeri RbdEncryptionCreateOptions **spec, 649*42e4ac9eSOr Ozeri Error **errp) 650*42e4ac9eSOr Ozeri { 651*42e4ac9eSOr Ozeri QDict *opts_qdict; 652*42e4ac9eSOr Ozeri QDict *encrypt_qdict; 653*42e4ac9eSOr Ozeri Visitor *v; 654*42e4ac9eSOr Ozeri int ret = 0; 655*42e4ac9eSOr Ozeri 656*42e4ac9eSOr Ozeri opts_qdict = qemu_opts_to_qdict(opts, NULL); 657*42e4ac9eSOr Ozeri qdict_extract_subqdict(opts_qdict, &encrypt_qdict, "encrypt."); 658*42e4ac9eSOr Ozeri qobject_unref(opts_qdict); 659*42e4ac9eSOr Ozeri if (!qdict_size(encrypt_qdict)) { 660*42e4ac9eSOr Ozeri *spec = NULL; 661*42e4ac9eSOr Ozeri goto exit; 662*42e4ac9eSOr Ozeri } 663*42e4ac9eSOr Ozeri 664*42e4ac9eSOr Ozeri /* Convert options into a QAPI object */ 665*42e4ac9eSOr Ozeri v = qobject_input_visitor_new_flat_confused(encrypt_qdict, errp); 666*42e4ac9eSOr Ozeri if (!v) { 667*42e4ac9eSOr Ozeri ret = -EINVAL; 668*42e4ac9eSOr Ozeri goto exit; 669*42e4ac9eSOr Ozeri } 670*42e4ac9eSOr Ozeri 671*42e4ac9eSOr Ozeri visit_type_RbdEncryptionCreateOptions(v, NULL, spec, errp); 672*42e4ac9eSOr Ozeri visit_free(v); 673*42e4ac9eSOr Ozeri if (!*spec) { 674*42e4ac9eSOr Ozeri ret = -EINVAL; 675*42e4ac9eSOr Ozeri goto exit; 676*42e4ac9eSOr Ozeri } 677*42e4ac9eSOr Ozeri 678*42e4ac9eSOr Ozeri exit: 679*42e4ac9eSOr Ozeri qobject_unref(encrypt_qdict); 680*42e4ac9eSOr Ozeri return ret; 681*42e4ac9eSOr Ozeri } 682*42e4ac9eSOr Ozeri 683b92902dfSMaxim Levitsky static int coroutine_fn qemu_rbd_co_create_opts(BlockDriver *drv, 684b92902dfSMaxim Levitsky const char *filename, 685efc75e2aSStefan Hajnoczi QemuOpts *opts, 686efc75e2aSStefan Hajnoczi Error **errp) 687f27aaf4bSChristian Brunner { 6881bebea37SKevin Wolf BlockdevCreateOptions *create_options; 6891bebea37SKevin Wolf BlockdevCreateOptionsRbd *rbd_opts; 6901bebea37SKevin Wolf BlockdevOptionsRbd *loc; 691*42e4ac9eSOr Ozeri RbdEncryptionCreateOptions *encrypt = NULL; 692d61563b2SMarkus Armbruster Error *local_err = NULL; 6931bebea37SKevin Wolf const char *keypairs, *password_secret; 694c7cacb3eSJeff Cody QDict *options = NULL; 695c7cacb3eSJeff Cody int ret = 0; 696f27aaf4bSChristian Brunner 6971bebea37SKevin Wolf create_options = g_new0(BlockdevCreateOptions, 1); 6981bebea37SKevin Wolf create_options->driver = BLOCKDEV_DRIVER_RBD; 6991bebea37SKevin Wolf rbd_opts = &create_options->u.rbd; 7001bebea37SKevin Wolf 7011bebea37SKevin Wolf rbd_opts->location = g_new0(BlockdevOptionsRbd, 1); 7021bebea37SKevin Wolf 7031bebea37SKevin Wolf password_secret = qemu_opt_get(opts, "password-secret"); 70460390a21SDaniel P. Berrange 705f27aaf4bSChristian Brunner /* Read out options */ 7061bebea37SKevin Wolf rbd_opts->size = ROUND_UP(qemu_opt_get_size_del(opts, BLOCK_OPT_SIZE, 0), 707c2eb918eSHu Tao BDRV_SECTOR_SIZE); 7081bebea37SKevin Wolf rbd_opts->cluster_size = qemu_opt_get_size_del(opts, 7091bebea37SKevin Wolf BLOCK_OPT_CLUSTER_SIZE, 0); 7101bebea37SKevin Wolf rbd_opts->has_cluster_size = (rbd_opts->cluster_size != 0); 711f27aaf4bSChristian Brunner 712c7cacb3eSJeff Cody options = qdict_new(); 713c7cacb3eSJeff Cody qemu_rbd_parse_filename(filename, options, &local_err); 714c7cacb3eSJeff Cody if (local_err) { 715c7cacb3eSJeff Cody ret = -EINVAL; 716c7cacb3eSJeff Cody error_propagate(errp, local_err); 717c7cacb3eSJeff Cody goto exit; 718c7cacb3eSJeff Cody } 719c7cacb3eSJeff Cody 720*42e4ac9eSOr Ozeri ret = qemu_rbd_extract_encryption_create_options(opts, &encrypt, errp); 721*42e4ac9eSOr Ozeri if (ret < 0) { 722*42e4ac9eSOr Ozeri goto exit; 723*42e4ac9eSOr Ozeri } 724*42e4ac9eSOr Ozeri rbd_opts->encrypt = encrypt; 725*42e4ac9eSOr Ozeri rbd_opts->has_encrypt = !!encrypt; 726*42e4ac9eSOr Ozeri 727129c7d1cSMarkus Armbruster /* 728129c7d1cSMarkus Armbruster * Caution: while qdict_get_try_str() is fine, getting non-string 729129c7d1cSMarkus Armbruster * types would require more care. When @options come from -blockdev 730129c7d1cSMarkus Armbruster * or blockdev_add, its members are typed according to the QAPI 731129c7d1cSMarkus Armbruster * schema, but when they come from -drive, they're all QString. 732129c7d1cSMarkus Armbruster */ 7331bebea37SKevin Wolf loc = rbd_opts->location; 7341bebea37SKevin Wolf loc->pool = g_strdup(qdict_get_try_str(options, "pool")); 7351bebea37SKevin Wolf loc->conf = g_strdup(qdict_get_try_str(options, "conf")); 7361bebea37SKevin Wolf loc->has_conf = !!loc->conf; 7371bebea37SKevin Wolf loc->user = g_strdup(qdict_get_try_str(options, "user")); 7381bebea37SKevin Wolf loc->has_user = !!loc->user; 73919ae9ae0SFlorian Florensa loc->q_namespace = g_strdup(qdict_get_try_str(options, "namespace")); 740b084b420SStefano Garzarella loc->has_q_namespace = !!loc->q_namespace; 7411bebea37SKevin Wolf loc->image = g_strdup(qdict_get_try_str(options, "image")); 74207846397SMarkus Armbruster keypairs = qdict_get_try_str(options, "=keyvalue-pairs"); 743c7cacb3eSJeff Cody 7441bebea37SKevin Wolf ret = qemu_rbd_do_create(create_options, keypairs, password_secret, errp); 74587cd3d20SVikhyat Umrao if (ret < 0) { 746c7cacb3eSJeff Cody goto exit; 747f27aaf4bSChristian Brunner } 748f27aaf4bSChristian Brunner 749c7cacb3eSJeff Cody exit: 750cb3e7f08SMarc-André Lureau qobject_unref(options); 7511bebea37SKevin Wolf qapi_free_BlockdevCreateOptions(create_options); 752f27aaf4bSChristian Brunner return ret; 753f27aaf4bSChristian Brunner } 754f27aaf4bSChristian Brunner 755f27aaf4bSChristian Brunner /* 756e04fb07fSStefan Hajnoczi * This aio completion is being called from rbd_finish_bh() and runs in qemu 757e04fb07fSStefan Hajnoczi * BH context. 758f27aaf4bSChristian Brunner */ 759ad32e9c0SJosh Durgin static void qemu_rbd_complete_aio(RADOSCB *rcb) 760f27aaf4bSChristian Brunner { 761f27aaf4bSChristian Brunner RBDAIOCB *acb = rcb->acb; 762f27aaf4bSChristian Brunner int64_t r; 763f27aaf4bSChristian Brunner 764f27aaf4bSChristian Brunner r = rcb->ret; 765f27aaf4bSChristian Brunner 766dc7588c1SJosh Durgin if (acb->cmd != RBD_AIO_READ) { 767f27aaf4bSChristian Brunner if (r < 0) { 768f27aaf4bSChristian Brunner acb->ret = r; 769f27aaf4bSChristian Brunner acb->error = 1; 770f27aaf4bSChristian Brunner } else if (!acb->error) { 771ad32e9c0SJosh Durgin acb->ret = rcb->size; 772f27aaf4bSChristian Brunner } 773f27aaf4bSChristian Brunner } else { 774ad32e9c0SJosh Durgin if (r < 0) { 7751d393bdeStianqing qemu_rbd_memset(rcb, 0); 776f27aaf4bSChristian Brunner acb->ret = r; 777f27aaf4bSChristian Brunner acb->error = 1; 778ad32e9c0SJosh Durgin } else if (r < rcb->size) { 7791d393bdeStianqing qemu_rbd_memset(rcb, r); 780f27aaf4bSChristian Brunner if (!acb->error) { 781ad32e9c0SJosh Durgin acb->ret = rcb->size; 782f27aaf4bSChristian Brunner } 783f27aaf4bSChristian Brunner } else if (!acb->error) { 784ad32e9c0SJosh Durgin acb->ret = r; 785f27aaf4bSChristian Brunner } 786f27aaf4bSChristian Brunner } 787e04fb07fSStefan Hajnoczi 7887267c094SAnthony Liguori g_free(rcb); 789e04fb07fSStefan Hajnoczi 7901d393bdeStianqing if (!LIBRBD_USE_IOVEC) { 791e04fb07fSStefan Hajnoczi if (acb->cmd == RBD_AIO_READ) { 792e04fb07fSStefan Hajnoczi qemu_iovec_from_buf(acb->qiov, 0, acb->bounce, acb->qiov->size); 793f27aaf4bSChristian Brunner } 794e04fb07fSStefan Hajnoczi qemu_vfree(acb->bounce); 7951d393bdeStianqing } 7961d393bdeStianqing 797e04fb07fSStefan Hajnoczi acb->common.cb(acb->common.opaque, (acb->ret > 0 ? 0 : acb->ret)); 798f27aaf4bSChristian Brunner 7998007429aSFam Zheng qemu_aio_unref(acb); 800f27aaf4bSChristian Brunner } 801f27aaf4bSChristian Brunner 8024bfb2741SKevin Wolf static char *qemu_rbd_mon_host(BlockdevOptionsRbd *opts, Error **errp) 8030a55679bSJeff Cody { 8044bfb2741SKevin Wolf const char **vals; 8052836284dSMarkus Armbruster const char *host, *port; 8062836284dSMarkus Armbruster char *rados_str; 8074bfb2741SKevin Wolf InetSocketAddressBaseList *p; 8084bfb2741SKevin Wolf int i, cnt; 8090a55679bSJeff Cody 8104bfb2741SKevin Wolf if (!opts->has_server) { 8114bfb2741SKevin Wolf return NULL; 8120a55679bSJeff Cody } 8134bfb2741SKevin Wolf 8144bfb2741SKevin Wolf for (cnt = 0, p = opts->server; p; p = p->next) { 8154bfb2741SKevin Wolf cnt++; 8160a55679bSJeff Cody } 8170a55679bSJeff Cody 8184bfb2741SKevin Wolf vals = g_new(const char *, cnt + 1); 8194bfb2741SKevin Wolf 8204bfb2741SKevin Wolf for (i = 0, p = opts->server; p; p = p->next, i++) { 8214bfb2741SKevin Wolf host = p->value->host; 8224bfb2741SKevin Wolf port = p->value->port; 8234bfb2741SKevin Wolf 8240a55679bSJeff Cody if (strchr(host, ':')) { 8254bfb2741SKevin Wolf vals[i] = g_strdup_printf("[%s]:%s", host, port); 8260a55679bSJeff Cody } else { 8274bfb2741SKevin Wolf vals[i] = g_strdup_printf("%s:%s", host, port); 8280a55679bSJeff Cody } 8290a55679bSJeff Cody } 8302836284dSMarkus Armbruster vals[i] = NULL; 8310a55679bSJeff Cody 8322836284dSMarkus Armbruster rados_str = i ? g_strjoinv(";", (char **)vals) : NULL; 8332836284dSMarkus Armbruster g_strfreev((char **)vals); 8340a55679bSJeff Cody return rados_str; 8350a55679bSJeff Cody } 8360a55679bSJeff Cody 8373d9136f9SKevin Wolf static int qemu_rbd_connect(rados_t *cluster, rados_ioctx_t *io_ctx, 8384bfb2741SKevin Wolf BlockdevOptionsRbd *opts, bool cache, 8394ff45049SKevin Wolf const char *keypairs, const char *secretid, 8404ff45049SKevin Wolf Error **errp) 841f27aaf4bSChristian Brunner { 8420a55679bSJeff Cody char *mon_host = NULL; 8433d9136f9SKevin Wolf Error *local_err = NULL; 844f27aaf4bSChristian Brunner int r; 845f27aaf4bSChristian Brunner 846d083f954SMarkus Armbruster if (secretid) { 847d083f954SMarkus Armbruster if (opts->key_secret) { 848d083f954SMarkus Armbruster error_setg(errp, 849d083f954SMarkus Armbruster "Legacy 'password-secret' clashes with 'key-secret'"); 850d083f954SMarkus Armbruster return -EINVAL; 851d083f954SMarkus Armbruster } 852d083f954SMarkus Armbruster opts->key_secret = g_strdup(secretid); 853d083f954SMarkus Armbruster opts->has_key_secret = true; 854d083f954SMarkus Armbruster } 855d083f954SMarkus Armbruster 8564bfb2741SKevin Wolf mon_host = qemu_rbd_mon_host(opts, &local_err); 85784d18f06SMarkus Armbruster if (local_err) { 858d61563b2SMarkus Armbruster error_propagate(errp, local_err); 8592836284dSMarkus Armbruster r = -EINVAL; 860c1c1f6cfSStefano Garzarella goto out; 861a9ccedc3SKevin Wolf } 862a9ccedc3SKevin Wolf 8634bfb2741SKevin Wolf r = rados_create(cluster, opts->user); 864ad32e9c0SJosh Durgin if (r < 0) { 86587cd3d20SVikhyat Umrao error_setg_errno(errp, -r, "error initializing"); 866c1c1f6cfSStefano Garzarella goto out; 867f27aaf4bSChristian Brunner } 868f27aaf4bSChristian Brunner 869c7cacb3eSJeff Cody /* try default location when conf=NULL, but ignore failure */ 8704bfb2741SKevin Wolf r = rados_conf_read_file(*cluster, opts->conf); 8714bfb2741SKevin Wolf if (opts->has_conf && r < 0) { 8724bfb2741SKevin Wolf error_setg_errno(errp, -r, "error reading conf file %s", opts->conf); 873e34d8f29SJosh Durgin goto failed_shutdown; 874e34d8f29SJosh Durgin } 87599a3c89dSJosh Durgin 8763d9136f9SKevin Wolf r = qemu_rbd_set_keypairs(*cluster, keypairs, errp); 87799a3c89dSJosh Durgin if (r < 0) { 87899a3c89dSJosh Durgin goto failed_shutdown; 87999a3c89dSJosh Durgin } 88099a3c89dSJosh Durgin 8810a55679bSJeff Cody if (mon_host) { 8823d9136f9SKevin Wolf r = rados_conf_set(*cluster, "mon_host", mon_host); 8830a55679bSJeff Cody if (r < 0) { 8840a55679bSJeff Cody goto failed_shutdown; 8850a55679bSJeff Cody } 8860a55679bSJeff Cody } 8870a55679bSJeff Cody 888d083f954SMarkus Armbruster r = qemu_rbd_set_auth(*cluster, opts, errp); 889d083f954SMarkus Armbruster if (r < 0) { 89060390a21SDaniel P. Berrange goto failed_shutdown; 89160390a21SDaniel P. Berrange } 89260390a21SDaniel P. Berrange 893b11f38fcSJosh Durgin /* 894b11f38fcSJosh Durgin * Fallback to more conservative semantics if setting cache 895b11f38fcSJosh Durgin * options fails. Ignore errors from setting rbd_cache because the 896b11f38fcSJosh Durgin * only possible error is that the option does not exist, and 897b11f38fcSJosh Durgin * librbd defaults to no caching. If write through caching cannot 898b11f38fcSJosh Durgin * be set up, fall back to no caching. 899b11f38fcSJosh Durgin */ 9003d9136f9SKevin Wolf if (cache) { 9013d9136f9SKevin Wolf rados_conf_set(*cluster, "rbd_cache", "true"); 902b11f38fcSJosh Durgin } else { 9033d9136f9SKevin Wolf rados_conf_set(*cluster, "rbd_cache", "false"); 904b11f38fcSJosh Durgin } 905b11f38fcSJosh Durgin 9063d9136f9SKevin Wolf r = rados_connect(*cluster); 907ad32e9c0SJosh Durgin if (r < 0) { 90887cd3d20SVikhyat Umrao error_setg_errno(errp, -r, "error connecting"); 909eb93d5d9SSage Weil goto failed_shutdown; 910ad32e9c0SJosh Durgin } 911ad32e9c0SJosh Durgin 9124bfb2741SKevin Wolf r = rados_ioctx_create(*cluster, opts->pool, io_ctx); 913ad32e9c0SJosh Durgin if (r < 0) { 9144bfb2741SKevin Wolf error_setg_errno(errp, -r, "error opening pool %s", opts->pool); 915eb93d5d9SSage Weil goto failed_shutdown; 916ad32e9c0SJosh Durgin } 91719ae9ae0SFlorian Florensa /* 91819ae9ae0SFlorian Florensa * Set the namespace after opening the io context on the pool, 91919ae9ae0SFlorian Florensa * if nspace == NULL or if nspace == "", it is just as we did nothing 92019ae9ae0SFlorian Florensa */ 92119ae9ae0SFlorian Florensa rados_ioctx_set_namespace(*io_ctx, opts->q_namespace); 922ad32e9c0SJosh Durgin 923c1c1f6cfSStefano Garzarella r = 0; 924c1c1f6cfSStefano Garzarella goto out; 9253d9136f9SKevin Wolf 9263d9136f9SKevin Wolf failed_shutdown: 9273d9136f9SKevin Wolf rados_shutdown(*cluster); 928c1c1f6cfSStefano Garzarella out: 9293d9136f9SKevin Wolf g_free(mon_host); 9303d9136f9SKevin Wolf return r; 9313d9136f9SKevin Wolf } 9323d9136f9SKevin Wolf 933f24b03b5SJeff Cody static int qemu_rbd_convert_options(QDict *options, BlockdevOptionsRbd **opts, 934f24b03b5SJeff Cody Error **errp) 935f24b03b5SJeff Cody { 936f24b03b5SJeff Cody Visitor *v; 937f24b03b5SJeff Cody 938f24b03b5SJeff Cody /* Convert the remaining options into a QAPI object */ 939f24b03b5SJeff Cody v = qobject_input_visitor_new_flat_confused(options, errp); 940f24b03b5SJeff Cody if (!v) { 941f24b03b5SJeff Cody return -EINVAL; 942f24b03b5SJeff Cody } 943f24b03b5SJeff Cody 944b11a093cSMarkus Armbruster visit_type_BlockdevOptionsRbd(v, NULL, opts, errp); 945f24b03b5SJeff Cody visit_free(v); 946b11a093cSMarkus Armbruster if (!opts) { 947f24b03b5SJeff Cody return -EINVAL; 948f24b03b5SJeff Cody } 949f24b03b5SJeff Cody 950f24b03b5SJeff Cody return 0; 951f24b03b5SJeff Cody } 952f24b03b5SJeff Cody 953084d1d13SJeff Cody static int qemu_rbd_attempt_legacy_options(QDict *options, 954084d1d13SJeff Cody BlockdevOptionsRbd **opts, 955084d1d13SJeff Cody char **keypairs) 956084d1d13SJeff Cody { 957084d1d13SJeff Cody char *filename; 958084d1d13SJeff Cody int r; 959084d1d13SJeff Cody 960084d1d13SJeff Cody filename = g_strdup(qdict_get_try_str(options, "filename")); 961084d1d13SJeff Cody if (!filename) { 962084d1d13SJeff Cody return -EINVAL; 963084d1d13SJeff Cody } 964084d1d13SJeff Cody qdict_del(options, "filename"); 965084d1d13SJeff Cody 966084d1d13SJeff Cody qemu_rbd_parse_filename(filename, options, NULL); 967084d1d13SJeff Cody 968084d1d13SJeff Cody /* keypairs freed by caller */ 969084d1d13SJeff Cody *keypairs = g_strdup(qdict_get_try_str(options, "=keyvalue-pairs")); 970084d1d13SJeff Cody if (*keypairs) { 971084d1d13SJeff Cody qdict_del(options, "=keyvalue-pairs"); 972084d1d13SJeff Cody } 973084d1d13SJeff Cody 974084d1d13SJeff Cody r = qemu_rbd_convert_options(options, opts, NULL); 975084d1d13SJeff Cody 976084d1d13SJeff Cody g_free(filename); 977084d1d13SJeff Cody return r; 978084d1d13SJeff Cody } 979084d1d13SJeff Cody 9803d9136f9SKevin Wolf static int qemu_rbd_open(BlockDriverState *bs, QDict *options, int flags, 9813d9136f9SKevin Wolf Error **errp) 9823d9136f9SKevin Wolf { 9833d9136f9SKevin Wolf BDRVRBDState *s = bs->opaque; 9844bfb2741SKevin Wolf BlockdevOptionsRbd *opts = NULL; 985bfb15b4bSJeff Cody const QDictEntry *e; 9863d9136f9SKevin Wolf Error *local_err = NULL; 9874ff45049SKevin Wolf char *keypairs, *secretid; 9883d9136f9SKevin Wolf int r; 9893d9136f9SKevin Wolf 9904ff45049SKevin Wolf keypairs = g_strdup(qdict_get_try_str(options, "=keyvalue-pairs")); 9914ff45049SKevin Wolf if (keypairs) { 9924ff45049SKevin Wolf qdict_del(options, "=keyvalue-pairs"); 9934ff45049SKevin Wolf } 9944ff45049SKevin Wolf 9954ff45049SKevin Wolf secretid = g_strdup(qdict_get_try_str(options, "password-secret")); 9964ff45049SKevin Wolf if (secretid) { 9974ff45049SKevin Wolf qdict_del(options, "password-secret"); 9984ff45049SKevin Wolf } 9994ff45049SKevin Wolf 1000f24b03b5SJeff Cody r = qemu_rbd_convert_options(options, &opts, &local_err); 10014bfb2741SKevin Wolf if (local_err) { 1002084d1d13SJeff Cody /* If keypairs are present, that means some options are present in 1003084d1d13SJeff Cody * the modern option format. Don't attempt to parse legacy option 1004084d1d13SJeff Cody * formats, as we won't support mixed usage. */ 1005084d1d13SJeff Cody if (keypairs) { 10064bfb2741SKevin Wolf error_propagate(errp, local_err); 10074bfb2741SKevin Wolf goto out; 10084bfb2741SKevin Wolf } 10094bfb2741SKevin Wolf 1010084d1d13SJeff Cody /* If the initial attempt to convert and process the options failed, 1011084d1d13SJeff Cody * we may be attempting to open an image file that has the rbd options 1012084d1d13SJeff Cody * specified in the older format consisting of all key/value pairs 1013084d1d13SJeff Cody * encoded in the filename. Go ahead and attempt to parse the 1014084d1d13SJeff Cody * filename, and see if we can pull out the required options. */ 1015084d1d13SJeff Cody r = qemu_rbd_attempt_legacy_options(options, &opts, &keypairs); 1016084d1d13SJeff Cody if (r < 0) { 1017084d1d13SJeff Cody /* Propagate the original error, not the legacy parsing fallback 1018084d1d13SJeff Cody * error, as the latter was just a best-effort attempt. */ 1019084d1d13SJeff Cody error_propagate(errp, local_err); 1020084d1d13SJeff Cody goto out; 1021084d1d13SJeff Cody } 1022084d1d13SJeff Cody /* Take care whenever deciding to actually deprecate; once this ability 1023084d1d13SJeff Cody * is removed, we will not be able to open any images with legacy-styled 1024084d1d13SJeff Cody * backing image strings. */ 10255197f445SMarkus Armbruster warn_report("RBD options encoded in the filename as keyvalue pairs " 1026084d1d13SJeff Cody "is deprecated"); 1027084d1d13SJeff Cody } 1028084d1d13SJeff Cody 1029bfb15b4bSJeff Cody /* Remove the processed options from the QDict (the visitor processes 1030bfb15b4bSJeff Cody * _all_ options in the QDict) */ 1031bfb15b4bSJeff Cody while ((e = qdict_first(options))) { 1032bfb15b4bSJeff Cody qdict_del(options, e->key); 1033bfb15b4bSJeff Cody } 1034bfb15b4bSJeff Cody 1035d41a5588SKevin Wolf r = qemu_rbd_connect(&s->cluster, &s->io_ctx, opts, 1036d41a5588SKevin Wolf !(flags & BDRV_O_NOCACHE), keypairs, secretid, errp); 10373d9136f9SKevin Wolf if (r < 0) { 10384ff45049SKevin Wolf goto out; 10393d9136f9SKevin Wolf } 10403d9136f9SKevin Wolf 1041d41a5588SKevin Wolf s->snap = g_strdup(opts->snapshot); 1042d41a5588SKevin Wolf s->image_name = g_strdup(opts->image); 1043d41a5588SKevin Wolf 1044e2b8247aSJeff Cody /* rbd_open is always r/w */ 104580b61a27SJeff Cody r = rbd_open(s->io_ctx, s->image_name, &s->image, s->snap); 1046ad32e9c0SJosh Durgin if (r < 0) { 104780b61a27SJeff Cody error_setg_errno(errp, -r, "error reading header from %s", 104880b61a27SJeff Cody s->image_name); 1049eb93d5d9SSage Weil goto failed_open; 1050ad32e9c0SJosh Durgin } 1051ad32e9c0SJosh Durgin 1052*42e4ac9eSOr Ozeri if (opts->has_encrypt) { 1053*42e4ac9eSOr Ozeri #ifdef LIBRBD_SUPPORTS_ENCRYPTION 1054*42e4ac9eSOr Ozeri r = qemu_rbd_encryption_load(s->image, opts->encrypt, errp); 1055*42e4ac9eSOr Ozeri if (r < 0) { 1056*42e4ac9eSOr Ozeri goto failed_post_open; 1057*42e4ac9eSOr Ozeri } 1058*42e4ac9eSOr Ozeri #else 1059*42e4ac9eSOr Ozeri r = -ENOTSUP; 1060*42e4ac9eSOr Ozeri error_setg(errp, "RBD library does not support image encryption"); 1061*42e4ac9eSOr Ozeri goto failed_post_open; 1062*42e4ac9eSOr Ozeri #endif 1063*42e4ac9eSOr Ozeri } 1064*42e4ac9eSOr Ozeri 1065d24f8023SStefano Garzarella r = rbd_get_size(s->image, &s->image_size); 1066d24f8023SStefano Garzarella if (r < 0) { 1067d24f8023SStefano Garzarella error_setg_errno(errp, -r, "error getting image size from %s", 1068d24f8023SStefano Garzarella s->image_name); 1069*42e4ac9eSOr Ozeri goto failed_post_open; 1070d24f8023SStefano Garzarella } 1071d24f8023SStefano Garzarella 1072e2b8247aSJeff Cody /* If we are using an rbd snapshot, we must be r/o, otherwise 1073e2b8247aSJeff Cody * leave as-is */ 1074e2b8247aSJeff Cody if (s->snap != NULL) { 1075eaa2410fSKevin Wolf r = bdrv_apply_auto_read_only(bs, "rbd snapshots are read-only", errp); 1076e2b8247aSJeff Cody if (r < 0) { 1077*42e4ac9eSOr Ozeri goto failed_post_open; 1078e2b8247aSJeff Cody } 1079e2b8247aSJeff Cody } 1080f27aaf4bSChristian Brunner 10812f98910dSEric Blake /* When extending regular files, we get zeros from the OS */ 10822f98910dSEric Blake bs->supported_truncate_flags = BDRV_REQ_ZERO_WRITE; 10832f98910dSEric Blake 10844ff45049SKevin Wolf r = 0; 10854ff45049SKevin Wolf goto out; 1086f27aaf4bSChristian Brunner 1087*42e4ac9eSOr Ozeri failed_post_open: 1088*42e4ac9eSOr Ozeri rbd_close(s->image); 1089eb93d5d9SSage Weil failed_open: 1090ad32e9c0SJosh Durgin rados_ioctx_destroy(s->io_ctx); 1091eb93d5d9SSage Weil g_free(s->snap); 109280b61a27SJeff Cody g_free(s->image_name); 10933d9136f9SKevin Wolf rados_shutdown(s->cluster); 10944ff45049SKevin Wolf out: 10954bfb2741SKevin Wolf qapi_free_BlockdevOptionsRbd(opts); 10964ff45049SKevin Wolf g_free(keypairs); 10974ff45049SKevin Wolf g_free(secretid); 1098f27aaf4bSChristian Brunner return r; 1099f27aaf4bSChristian Brunner } 1100f27aaf4bSChristian Brunner 110156e7cf8dSJeff Cody 110256e7cf8dSJeff Cody /* Since RBD is currently always opened R/W via the API, 110356e7cf8dSJeff Cody * we just need to check if we are using a snapshot or not, in 110456e7cf8dSJeff Cody * order to determine if we will allow it to be R/W */ 110556e7cf8dSJeff Cody static int qemu_rbd_reopen_prepare(BDRVReopenState *state, 110656e7cf8dSJeff Cody BlockReopenQueue *queue, Error **errp) 110756e7cf8dSJeff Cody { 110856e7cf8dSJeff Cody BDRVRBDState *s = state->bs->opaque; 110956e7cf8dSJeff Cody int ret = 0; 111056e7cf8dSJeff Cody 111156e7cf8dSJeff Cody if (s->snap && state->flags & BDRV_O_RDWR) { 111256e7cf8dSJeff Cody error_setg(errp, 111356e7cf8dSJeff Cody "Cannot change node '%s' to r/w when using RBD snapshot", 111456e7cf8dSJeff Cody bdrv_get_device_or_node_name(state->bs)); 111556e7cf8dSJeff Cody ret = -EINVAL; 111656e7cf8dSJeff Cody } 111756e7cf8dSJeff Cody 111856e7cf8dSJeff Cody return ret; 111956e7cf8dSJeff Cody } 112056e7cf8dSJeff Cody 1121ad32e9c0SJosh Durgin static void qemu_rbd_close(BlockDriverState *bs) 1122f27aaf4bSChristian Brunner { 1123f27aaf4bSChristian Brunner BDRVRBDState *s = bs->opaque; 1124f27aaf4bSChristian Brunner 1125ad32e9c0SJosh Durgin rbd_close(s->image); 1126ad32e9c0SJosh Durgin rados_ioctx_destroy(s->io_ctx); 11277267c094SAnthony Liguori g_free(s->snap); 112880b61a27SJeff Cody g_free(s->image_name); 1129ad32e9c0SJosh Durgin rados_shutdown(s->cluster); 1130f27aaf4bSChristian Brunner } 1131f27aaf4bSChristian Brunner 1132d24f8023SStefano Garzarella /* Resize the RBD image and update the 'image_size' with the current size */ 1133d24f8023SStefano Garzarella static int qemu_rbd_resize(BlockDriverState *bs, uint64_t size) 1134d24f8023SStefano Garzarella { 1135d24f8023SStefano Garzarella BDRVRBDState *s = bs->opaque; 1136d24f8023SStefano Garzarella int r; 1137d24f8023SStefano Garzarella 1138d24f8023SStefano Garzarella r = rbd_resize(s->image, size); 1139d24f8023SStefano Garzarella if (r < 0) { 1140d24f8023SStefano Garzarella return r; 1141d24f8023SStefano Garzarella } 1142d24f8023SStefano Garzarella 1143d24f8023SStefano Garzarella s->image_size = size; 1144d24f8023SStefano Garzarella 1145d24f8023SStefano Garzarella return 0; 1146d24f8023SStefano Garzarella } 1147d24f8023SStefano Garzarella 1148d7331bedSStefan Hajnoczi static const AIOCBInfo rbd_aiocb_info = { 1149f27aaf4bSChristian Brunner .aiocb_size = sizeof(RBDAIOCB), 1150f27aaf4bSChristian Brunner }; 1151f27aaf4bSChristian Brunner 1152e04fb07fSStefan Hajnoczi static void rbd_finish_bh(void *opaque) 1153f27aaf4bSChristian Brunner { 1154e04fb07fSStefan Hajnoczi RADOSCB *rcb = opaque; 1155e04fb07fSStefan Hajnoczi qemu_rbd_complete_aio(rcb); 1156ad32e9c0SJosh Durgin } 1157ad32e9c0SJosh Durgin 1158ad32e9c0SJosh Durgin /* 1159ad32e9c0SJosh Durgin * This is the callback function for rbd_aio_read and _write 1160ad32e9c0SJosh Durgin * 1161ad32e9c0SJosh Durgin * Note: this function is being called from a non qemu thread so 1162ad32e9c0SJosh Durgin * we need to be careful about what we do here. Generally we only 1163e04fb07fSStefan Hajnoczi * schedule a BH, and do the rest of the io completion handling 1164e04fb07fSStefan Hajnoczi * from rbd_finish_bh() which runs in a qemu context. 1165ad32e9c0SJosh Durgin */ 1166ad32e9c0SJosh Durgin static void rbd_finish_aiocb(rbd_completion_t c, RADOSCB *rcb) 1167ad32e9c0SJosh Durgin { 1168e04fb07fSStefan Hajnoczi RBDAIOCB *acb = rcb->acb; 1169e04fb07fSStefan Hajnoczi 1170ad32e9c0SJosh Durgin rcb->ret = rbd_aio_get_return_value(c); 1171ad32e9c0SJosh Durgin rbd_aio_release(c); 1172f27aaf4bSChristian Brunner 1173e4ec5ad4SPavel Dovgalyuk replay_bh_schedule_oneshot_event(bdrv_get_aio_context(acb->common.bs), 1174ea800191SStefan Hajnoczi rbd_finish_bh, rcb); 1175473c7f02SStefan Priebe } 1176f27aaf4bSChristian Brunner 1177787f3133SJosh Durgin static int rbd_aio_discard_wrapper(rbd_image_t image, 1178787f3133SJosh Durgin uint64_t off, 1179787f3133SJosh Durgin uint64_t len, 1180787f3133SJosh Durgin rbd_completion_t comp) 1181787f3133SJosh Durgin { 1182787f3133SJosh Durgin #ifdef LIBRBD_SUPPORTS_DISCARD 1183787f3133SJosh Durgin return rbd_aio_discard(image, off, len, comp); 1184787f3133SJosh Durgin #else 1185787f3133SJosh Durgin return -ENOTSUP; 1186787f3133SJosh Durgin #endif 1187787f3133SJosh Durgin } 1188787f3133SJosh Durgin 1189dc7588c1SJosh Durgin static int rbd_aio_flush_wrapper(rbd_image_t image, 1190dc7588c1SJosh Durgin rbd_completion_t comp) 1191dc7588c1SJosh Durgin { 1192dc7588c1SJosh Durgin #ifdef LIBRBD_SUPPORTS_AIO_FLUSH 1193dc7588c1SJosh Durgin return rbd_aio_flush(image, comp); 1194dc7588c1SJosh Durgin #else 1195dc7588c1SJosh Durgin return -ENOTSUP; 1196dc7588c1SJosh Durgin #endif 1197dc7588c1SJosh Durgin } 1198dc7588c1SJosh Durgin 11997c84b1b8SMarkus Armbruster static BlockAIOCB *rbd_start_aio(BlockDriverState *bs, 12007bbca9e2SEric Blake int64_t off, 1201f27aaf4bSChristian Brunner QEMUIOVector *qiov, 12027bbca9e2SEric Blake int64_t size, 1203097310b5SMarkus Armbruster BlockCompletionFunc *cb, 1204787f3133SJosh Durgin void *opaque, 1205787f3133SJosh Durgin RBDAIOCmd cmd) 1206f27aaf4bSChristian Brunner { 1207f27aaf4bSChristian Brunner RBDAIOCB *acb; 12080f7a0237SKevin Wolf RADOSCB *rcb = NULL; 1209ad32e9c0SJosh Durgin rbd_completion_t c; 121051a13528SJosh Durgin int r; 1211f27aaf4bSChristian Brunner 1212f27aaf4bSChristian Brunner BDRVRBDState *s = bs->opaque; 1213f27aaf4bSChristian Brunner 1214d7331bedSStefan Hajnoczi acb = qemu_aio_get(&rbd_aiocb_info, bs, cb, opaque); 1215787f3133SJosh Durgin acb->cmd = cmd; 1216f27aaf4bSChristian Brunner acb->qiov = qiov; 12177bbca9e2SEric Blake assert(!qiov || qiov->size == size); 12181d393bdeStianqing 12191d393bdeStianqing rcb = g_new(RADOSCB, 1); 12201d393bdeStianqing 12211d393bdeStianqing if (!LIBRBD_USE_IOVEC) { 1222dc7588c1SJosh Durgin if (cmd == RBD_AIO_DISCARD || cmd == RBD_AIO_FLUSH) { 1223787f3133SJosh Durgin acb->bounce = NULL; 1224787f3133SJosh Durgin } else { 12250f7a0237SKevin Wolf acb->bounce = qemu_try_blockalign(bs, qiov->size); 12260f7a0237SKevin Wolf if (acb->bounce == NULL) { 12270f7a0237SKevin Wolf goto failed; 12280f7a0237SKevin Wolf } 1229787f3133SJosh Durgin } 12301d393bdeStianqing if (cmd == RBD_AIO_WRITE) { 12311d393bdeStianqing qemu_iovec_to_buf(acb->qiov, 0, acb->bounce, qiov->size); 12321d393bdeStianqing } 12331d393bdeStianqing rcb->buf = acb->bounce; 12341d393bdeStianqing } 12351d393bdeStianqing 1236f27aaf4bSChristian Brunner acb->ret = 0; 1237f27aaf4bSChristian Brunner acb->error = 0; 1238f27aaf4bSChristian Brunner acb->s = s; 1239f27aaf4bSChristian Brunner 1240f27aaf4bSChristian Brunner rcb->acb = acb; 1241f27aaf4bSChristian Brunner rcb->s = acb->s; 1242ad32e9c0SJosh Durgin rcb->size = size; 124351a13528SJosh Durgin r = rbd_aio_create_completion(rcb, (rbd_callback_t) rbd_finish_aiocb, &c); 124451a13528SJosh Durgin if (r < 0) { 124551a13528SJosh Durgin goto failed; 124651a13528SJosh Durgin } 1247f27aaf4bSChristian Brunner 1248787f3133SJosh Durgin switch (cmd) { 1249d24f8023SStefano Garzarella case RBD_AIO_WRITE: { 1250d24f8023SStefano Garzarella /* 1251d24f8023SStefano Garzarella * RBD APIs don't allow us to write more than actual size, so in order 1252d24f8023SStefano Garzarella * to support growing images, we resize the image before write 1253d24f8023SStefano Garzarella * operations that exceed the current size. 1254d24f8023SStefano Garzarella */ 1255d24f8023SStefano Garzarella if (off + size > s->image_size) { 1256d24f8023SStefano Garzarella r = qemu_rbd_resize(bs, off + size); 1257d24f8023SStefano Garzarella if (r < 0) { 1258d24f8023SStefano Garzarella goto failed_completion; 1259d24f8023SStefano Garzarella } 1260d24f8023SStefano Garzarella } 12611d393bdeStianqing #ifdef LIBRBD_SUPPORTS_IOVEC 12621d393bdeStianqing r = rbd_aio_writev(s->image, qiov->iov, qiov->niov, off, c); 12631d393bdeStianqing #else 12641d393bdeStianqing r = rbd_aio_write(s->image, off, size, rcb->buf, c); 12651d393bdeStianqing #endif 1266787f3133SJosh Durgin break; 1267d24f8023SStefano Garzarella } 1268787f3133SJosh Durgin case RBD_AIO_READ: 12691d393bdeStianqing #ifdef LIBRBD_SUPPORTS_IOVEC 12701d393bdeStianqing r = rbd_aio_readv(s->image, qiov->iov, qiov->niov, off, c); 12711d393bdeStianqing #else 12721d393bdeStianqing r = rbd_aio_read(s->image, off, size, rcb->buf, c); 12731d393bdeStianqing #endif 1274787f3133SJosh Durgin break; 1275787f3133SJosh Durgin case RBD_AIO_DISCARD: 1276787f3133SJosh Durgin r = rbd_aio_discard_wrapper(s->image, off, size, c); 1277787f3133SJosh Durgin break; 1278dc7588c1SJosh Durgin case RBD_AIO_FLUSH: 1279dc7588c1SJosh Durgin r = rbd_aio_flush_wrapper(s->image, c); 1280dc7588c1SJosh Durgin break; 1281787f3133SJosh Durgin default: 1282787f3133SJosh Durgin r = -EINVAL; 128351a13528SJosh Durgin } 128451a13528SJosh Durgin 128551a13528SJosh Durgin if (r < 0) { 1286405a2764SKevin Wolf goto failed_completion; 1287f27aaf4bSChristian Brunner } 1288f27aaf4bSChristian Brunner return &acb->common; 128951a13528SJosh Durgin 1290405a2764SKevin Wolf failed_completion: 1291405a2764SKevin Wolf rbd_aio_release(c); 129251a13528SJosh Durgin failed: 12937267c094SAnthony Liguori g_free(rcb); 12941d393bdeStianqing if (!LIBRBD_USE_IOVEC) { 1295405a2764SKevin Wolf qemu_vfree(acb->bounce); 12961d393bdeStianqing } 12971d393bdeStianqing 12988007429aSFam Zheng qemu_aio_unref(acb); 129951a13528SJosh Durgin return NULL; 1300f27aaf4bSChristian Brunner } 1301f27aaf4bSChristian Brunner 1302e8e16d4bSEric Blake static BlockAIOCB *qemu_rbd_aio_preadv(BlockDriverState *bs, 1303e8e16d4bSEric Blake uint64_t offset, uint64_t bytes, 1304e8e16d4bSEric Blake QEMUIOVector *qiov, int flags, 1305097310b5SMarkus Armbruster BlockCompletionFunc *cb, 1306f27aaf4bSChristian Brunner void *opaque) 1307f27aaf4bSChristian Brunner { 1308e8e16d4bSEric Blake return rbd_start_aio(bs, offset, qiov, bytes, cb, opaque, 1309787f3133SJosh Durgin RBD_AIO_READ); 1310f27aaf4bSChristian Brunner } 1311f27aaf4bSChristian Brunner 1312e8e16d4bSEric Blake static BlockAIOCB *qemu_rbd_aio_pwritev(BlockDriverState *bs, 1313e8e16d4bSEric Blake uint64_t offset, uint64_t bytes, 1314e8e16d4bSEric Blake QEMUIOVector *qiov, int flags, 1315097310b5SMarkus Armbruster BlockCompletionFunc *cb, 1316f27aaf4bSChristian Brunner void *opaque) 1317f27aaf4bSChristian Brunner { 1318e8e16d4bSEric Blake return rbd_start_aio(bs, offset, qiov, bytes, cb, opaque, 1319787f3133SJosh Durgin RBD_AIO_WRITE); 1320f27aaf4bSChristian Brunner } 1321f27aaf4bSChristian Brunner 1322dc7588c1SJosh Durgin #ifdef LIBRBD_SUPPORTS_AIO_FLUSH 13237c84b1b8SMarkus Armbruster static BlockAIOCB *qemu_rbd_aio_flush(BlockDriverState *bs, 1324097310b5SMarkus Armbruster BlockCompletionFunc *cb, 1325dc7588c1SJosh Durgin void *opaque) 1326dc7588c1SJosh Durgin { 1327dc7588c1SJosh Durgin return rbd_start_aio(bs, 0, NULL, 0, cb, opaque, RBD_AIO_FLUSH); 1328dc7588c1SJosh Durgin } 1329dc7588c1SJosh Durgin 1330dc7588c1SJosh Durgin #else 1331dc7588c1SJosh Durgin 13328b94ff85SPaolo Bonzini static int qemu_rbd_co_flush(BlockDriverState *bs) 13337a3f5fe9SSage Weil { 13347a3f5fe9SSage Weil #if LIBRBD_VERSION_CODE >= LIBRBD_VERSION(0, 1, 1) 13357a3f5fe9SSage Weil /* rbd_flush added in 0.1.1 */ 13367a3f5fe9SSage Weil BDRVRBDState *s = bs->opaque; 13377a3f5fe9SSage Weil return rbd_flush(s->image); 13387a3f5fe9SSage Weil #else 13397a3f5fe9SSage Weil return 0; 13407a3f5fe9SSage Weil #endif 13417a3f5fe9SSage Weil } 1342dc7588c1SJosh Durgin #endif 13437a3f5fe9SSage Weil 1344ad32e9c0SJosh Durgin static int qemu_rbd_getinfo(BlockDriverState *bs, BlockDriverInfo *bdi) 1345f27aaf4bSChristian Brunner { 1346f27aaf4bSChristian Brunner BDRVRBDState *s = bs->opaque; 1347ad32e9c0SJosh Durgin rbd_image_info_t info; 1348ad32e9c0SJosh Durgin int r; 1349ad32e9c0SJosh Durgin 1350ad32e9c0SJosh Durgin r = rbd_stat(s->image, &info, sizeof(info)); 1351ad32e9c0SJosh Durgin if (r < 0) { 1352ad32e9c0SJosh Durgin return r; 1353ad32e9c0SJosh Durgin } 1354ad32e9c0SJosh Durgin 1355ad32e9c0SJosh Durgin bdi->cluster_size = info.obj_size; 1356f27aaf4bSChristian Brunner return 0; 1357f27aaf4bSChristian Brunner } 1358f27aaf4bSChristian Brunner 1359*42e4ac9eSOr Ozeri static ImageInfoSpecific *qemu_rbd_get_specific_info(BlockDriverState *bs, 1360*42e4ac9eSOr Ozeri Error **errp) 1361*42e4ac9eSOr Ozeri { 1362*42e4ac9eSOr Ozeri BDRVRBDState *s = bs->opaque; 1363*42e4ac9eSOr Ozeri ImageInfoSpecific *spec_info; 1364*42e4ac9eSOr Ozeri char buf[RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = {0}; 1365*42e4ac9eSOr Ozeri int r; 1366*42e4ac9eSOr Ozeri 1367*42e4ac9eSOr Ozeri if (s->image_size >= RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) { 1368*42e4ac9eSOr Ozeri r = rbd_read(s->image, 0, 1369*42e4ac9eSOr Ozeri RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN, buf); 1370*42e4ac9eSOr Ozeri if (r < 0) { 1371*42e4ac9eSOr Ozeri error_setg_errno(errp, -r, "cannot read image start for probe"); 1372*42e4ac9eSOr Ozeri return NULL; 1373*42e4ac9eSOr Ozeri } 1374*42e4ac9eSOr Ozeri } 1375*42e4ac9eSOr Ozeri 1376*42e4ac9eSOr Ozeri spec_info = g_new(ImageInfoSpecific, 1); 1377*42e4ac9eSOr Ozeri *spec_info = (ImageInfoSpecific){ 1378*42e4ac9eSOr Ozeri .type = IMAGE_INFO_SPECIFIC_KIND_RBD, 1379*42e4ac9eSOr Ozeri .u.rbd.data = g_new0(ImageInfoSpecificRbd, 1), 1380*42e4ac9eSOr Ozeri }; 1381*42e4ac9eSOr Ozeri 1382*42e4ac9eSOr Ozeri if (memcmp(buf, rbd_luks_header_verification, 1383*42e4ac9eSOr Ozeri RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) == 0) { 1384*42e4ac9eSOr Ozeri spec_info->u.rbd.data->encryption_format = 1385*42e4ac9eSOr Ozeri RBD_IMAGE_ENCRYPTION_FORMAT_LUKS; 1386*42e4ac9eSOr Ozeri spec_info->u.rbd.data->has_encryption_format = true; 1387*42e4ac9eSOr Ozeri } else if (memcmp(buf, rbd_luks2_header_verification, 1388*42e4ac9eSOr Ozeri RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) == 0) { 1389*42e4ac9eSOr Ozeri spec_info->u.rbd.data->encryption_format = 1390*42e4ac9eSOr Ozeri RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2; 1391*42e4ac9eSOr Ozeri spec_info->u.rbd.data->has_encryption_format = true; 1392*42e4ac9eSOr Ozeri } else { 1393*42e4ac9eSOr Ozeri spec_info->u.rbd.data->has_encryption_format = false; 1394*42e4ac9eSOr Ozeri } 1395*42e4ac9eSOr Ozeri 1396*42e4ac9eSOr Ozeri return spec_info; 1397*42e4ac9eSOr Ozeri } 1398*42e4ac9eSOr Ozeri 1399ad32e9c0SJosh Durgin static int64_t qemu_rbd_getlength(BlockDriverState *bs) 1400f27aaf4bSChristian Brunner { 1401f27aaf4bSChristian Brunner BDRVRBDState *s = bs->opaque; 1402ad32e9c0SJosh Durgin rbd_image_info_t info; 1403ad32e9c0SJosh Durgin int r; 1404f27aaf4bSChristian Brunner 1405ad32e9c0SJosh Durgin r = rbd_stat(s->image, &info, sizeof(info)); 1406ad32e9c0SJosh Durgin if (r < 0) { 1407ad32e9c0SJosh Durgin return r; 1408f27aaf4bSChristian Brunner } 1409f27aaf4bSChristian Brunner 1410ad32e9c0SJosh Durgin return info.size; 1411ad32e9c0SJosh Durgin } 1412ad32e9c0SJosh Durgin 1413061ca8a3SKevin Wolf static int coroutine_fn qemu_rbd_co_truncate(BlockDriverState *bs, 1414061ca8a3SKevin Wolf int64_t offset, 1415c80d8b06SMax Reitz bool exact, 1416061ca8a3SKevin Wolf PreallocMode prealloc, 141792b92799SKevin Wolf BdrvRequestFlags flags, 1418061ca8a3SKevin Wolf Error **errp) 141930cdc48cSJosh Durgin { 142030cdc48cSJosh Durgin int r; 142130cdc48cSJosh Durgin 14228243ccb7SMax Reitz if (prealloc != PREALLOC_MODE_OFF) { 14238243ccb7SMax Reitz error_setg(errp, "Unsupported preallocation mode '%s'", 1424977c736fSMarkus Armbruster PreallocMode_str(prealloc)); 14258243ccb7SMax Reitz return -ENOTSUP; 14268243ccb7SMax Reitz } 14278243ccb7SMax Reitz 1428d24f8023SStefano Garzarella r = qemu_rbd_resize(bs, offset); 142930cdc48cSJosh Durgin if (r < 0) { 1430f59adb32SMax Reitz error_setg_errno(errp, -r, "Failed to resize file"); 143130cdc48cSJosh Durgin return r; 143230cdc48cSJosh Durgin } 143330cdc48cSJosh Durgin 143430cdc48cSJosh Durgin return 0; 143530cdc48cSJosh Durgin } 143630cdc48cSJosh Durgin 1437ad32e9c0SJosh Durgin static int qemu_rbd_snap_create(BlockDriverState *bs, 1438ad32e9c0SJosh Durgin QEMUSnapshotInfo *sn_info) 1439f27aaf4bSChristian Brunner { 1440f27aaf4bSChristian Brunner BDRVRBDState *s = bs->opaque; 1441f27aaf4bSChristian Brunner int r; 1442f27aaf4bSChristian Brunner 1443f27aaf4bSChristian Brunner if (sn_info->name[0] == '\0') { 1444f27aaf4bSChristian Brunner return -EINVAL; /* we need a name for rbd snapshots */ 1445f27aaf4bSChristian Brunner } 1446f27aaf4bSChristian Brunner 1447f27aaf4bSChristian Brunner /* 1448f27aaf4bSChristian Brunner * rbd snapshots are using the name as the user controlled unique identifier 1449f27aaf4bSChristian Brunner * we can't use the rbd snapid for that purpose, as it can't be set 1450f27aaf4bSChristian Brunner */ 1451f27aaf4bSChristian Brunner if (sn_info->id_str[0] != '\0' && 1452f27aaf4bSChristian Brunner strcmp(sn_info->id_str, sn_info->name) != 0) { 1453f27aaf4bSChristian Brunner return -EINVAL; 1454f27aaf4bSChristian Brunner } 1455f27aaf4bSChristian Brunner 1456f27aaf4bSChristian Brunner if (strlen(sn_info->name) >= sizeof(sn_info->id_str)) { 1457f27aaf4bSChristian Brunner return -ERANGE; 1458f27aaf4bSChristian Brunner } 1459f27aaf4bSChristian Brunner 1460ad32e9c0SJosh Durgin r = rbd_snap_create(s->image, sn_info->name); 1461f27aaf4bSChristian Brunner if (r < 0) { 1462ad32e9c0SJosh Durgin error_report("failed to create snap: %s", strerror(-r)); 1463f27aaf4bSChristian Brunner return r; 1464f27aaf4bSChristian Brunner } 1465f27aaf4bSChristian Brunner 1466f27aaf4bSChristian Brunner return 0; 1467f27aaf4bSChristian Brunner } 1468f27aaf4bSChristian Brunner 1469bd603247SGregory Farnum static int qemu_rbd_snap_remove(BlockDriverState *bs, 1470a89d89d3SWenchao Xia const char *snapshot_id, 1471a89d89d3SWenchao Xia const char *snapshot_name, 1472a89d89d3SWenchao Xia Error **errp) 1473bd603247SGregory Farnum { 1474bd603247SGregory Farnum BDRVRBDState *s = bs->opaque; 1475bd603247SGregory Farnum int r; 1476bd603247SGregory Farnum 1477a89d89d3SWenchao Xia if (!snapshot_name) { 1478a89d89d3SWenchao Xia error_setg(errp, "rbd need a valid snapshot name"); 1479a89d89d3SWenchao Xia return -EINVAL; 1480a89d89d3SWenchao Xia } 1481a89d89d3SWenchao Xia 1482a89d89d3SWenchao Xia /* If snapshot_id is specified, it must be equal to name, see 1483a89d89d3SWenchao Xia qemu_rbd_snap_list() */ 1484a89d89d3SWenchao Xia if (snapshot_id && strcmp(snapshot_id, snapshot_name)) { 1485a89d89d3SWenchao Xia error_setg(errp, 1486a89d89d3SWenchao Xia "rbd do not support snapshot id, it should be NULL or " 1487a89d89d3SWenchao Xia "equal to snapshot name"); 1488a89d89d3SWenchao Xia return -EINVAL; 1489a89d89d3SWenchao Xia } 1490a89d89d3SWenchao Xia 1491bd603247SGregory Farnum r = rbd_snap_remove(s->image, snapshot_name); 1492a89d89d3SWenchao Xia if (r < 0) { 1493a89d89d3SWenchao Xia error_setg_errno(errp, -r, "Failed to remove the snapshot"); 1494a89d89d3SWenchao Xia } 1495bd603247SGregory Farnum return r; 1496bd603247SGregory Farnum } 1497bd603247SGregory Farnum 1498bd603247SGregory Farnum static int qemu_rbd_snap_rollback(BlockDriverState *bs, 1499bd603247SGregory Farnum const char *snapshot_name) 1500bd603247SGregory Farnum { 1501bd603247SGregory Farnum BDRVRBDState *s = bs->opaque; 1502bd603247SGregory Farnum 15039be38598SEduardo Habkost return rbd_snap_rollback(s->image, snapshot_name); 1504bd603247SGregory Farnum } 1505bd603247SGregory Farnum 1506ad32e9c0SJosh Durgin static int qemu_rbd_snap_list(BlockDriverState *bs, 1507ad32e9c0SJosh Durgin QEMUSnapshotInfo **psn_tab) 1508f27aaf4bSChristian Brunner { 1509f27aaf4bSChristian Brunner BDRVRBDState *s = bs->opaque; 1510f27aaf4bSChristian Brunner QEMUSnapshotInfo *sn_info, *sn_tab = NULL; 1511ad32e9c0SJosh Durgin int i, snap_count; 1512ad32e9c0SJosh Durgin rbd_snap_info_t *snaps; 1513ad32e9c0SJosh Durgin int max_snaps = RBD_MAX_SNAPS; 1514f27aaf4bSChristian Brunner 1515ad32e9c0SJosh Durgin do { 151602c4f26bSMarkus Armbruster snaps = g_new(rbd_snap_info_t, max_snaps); 1517ad32e9c0SJosh Durgin snap_count = rbd_snap_list(s->image, snaps, &max_snaps); 15189e6337d0SStefan Hajnoczi if (snap_count <= 0) { 15197267c094SAnthony Liguori g_free(snaps); 1520f27aaf4bSChristian Brunner } 1521ad32e9c0SJosh Durgin } while (snap_count == -ERANGE); 1522f27aaf4bSChristian Brunner 1523ad32e9c0SJosh Durgin if (snap_count <= 0) { 1524b9c53290SJosh Durgin goto done; 1525f27aaf4bSChristian Brunner } 1526f27aaf4bSChristian Brunner 15275839e53bSMarkus Armbruster sn_tab = g_new0(QEMUSnapshotInfo, snap_count); 1528f27aaf4bSChristian Brunner 1529ad32e9c0SJosh Durgin for (i = 0; i < snap_count; i++) { 1530ad32e9c0SJosh Durgin const char *snap_name = snaps[i].name; 1531f27aaf4bSChristian Brunner 1532f27aaf4bSChristian Brunner sn_info = sn_tab + i; 1533f27aaf4bSChristian Brunner pstrcpy(sn_info->id_str, sizeof(sn_info->id_str), snap_name); 1534f27aaf4bSChristian Brunner pstrcpy(sn_info->name, sizeof(sn_info->name), snap_name); 1535f27aaf4bSChristian Brunner 1536ad32e9c0SJosh Durgin sn_info->vm_state_size = snaps[i].size; 1537f27aaf4bSChristian Brunner sn_info->date_sec = 0; 1538f27aaf4bSChristian Brunner sn_info->date_nsec = 0; 1539f27aaf4bSChristian Brunner sn_info->vm_clock_nsec = 0; 1540f27aaf4bSChristian Brunner } 1541ad32e9c0SJosh Durgin rbd_snap_list_end(snaps); 15429e6337d0SStefan Hajnoczi g_free(snaps); 1543ad32e9c0SJosh Durgin 1544b9c53290SJosh Durgin done: 1545f27aaf4bSChristian Brunner *psn_tab = sn_tab; 1546f27aaf4bSChristian Brunner return snap_count; 1547f27aaf4bSChristian Brunner } 1548f27aaf4bSChristian Brunner 1549787f3133SJosh Durgin #ifdef LIBRBD_SUPPORTS_DISCARD 15504da444a0SEric Blake static BlockAIOCB *qemu_rbd_aio_pdiscard(BlockDriverState *bs, 15514da444a0SEric Blake int64_t offset, 1552f5a5ca79SManos Pitsidianakis int bytes, 1553097310b5SMarkus Armbruster BlockCompletionFunc *cb, 1554787f3133SJosh Durgin void *opaque) 1555787f3133SJosh Durgin { 1556f5a5ca79SManos Pitsidianakis return rbd_start_aio(bs, offset, NULL, bytes, cb, opaque, 1557787f3133SJosh Durgin RBD_AIO_DISCARD); 1558787f3133SJosh Durgin } 1559787f3133SJosh Durgin #endif 1560787f3133SJosh Durgin 1561be217884SAdam Crume #ifdef LIBRBD_SUPPORTS_INVALIDATE 15622b148f39SPaolo Bonzini static void coroutine_fn qemu_rbd_co_invalidate_cache(BlockDriverState *bs, 1563be217884SAdam Crume Error **errp) 1564be217884SAdam Crume { 1565be217884SAdam Crume BDRVRBDState *s = bs->opaque; 1566be217884SAdam Crume int r = rbd_invalidate_cache(s->image); 1567be217884SAdam Crume if (r < 0) { 1568be217884SAdam Crume error_setg_errno(errp, -r, "Failed to invalidate the cache"); 1569be217884SAdam Crume } 1570be217884SAdam Crume } 1571be217884SAdam Crume #endif 1572be217884SAdam Crume 1573bd0cf596SChunyan Liu static QemuOptsList qemu_rbd_create_opts = { 1574bd0cf596SChunyan Liu .name = "rbd-create-opts", 1575bd0cf596SChunyan Liu .head = QTAILQ_HEAD_INITIALIZER(qemu_rbd_create_opts.head), 1576bd0cf596SChunyan Liu .desc = { 1577f27aaf4bSChristian Brunner { 1578f27aaf4bSChristian Brunner .name = BLOCK_OPT_SIZE, 1579bd0cf596SChunyan Liu .type = QEMU_OPT_SIZE, 1580f27aaf4bSChristian Brunner .help = "Virtual disk size" 1581f27aaf4bSChristian Brunner }, 1582f27aaf4bSChristian Brunner { 1583f27aaf4bSChristian Brunner .name = BLOCK_OPT_CLUSTER_SIZE, 1584bd0cf596SChunyan Liu .type = QEMU_OPT_SIZE, 1585f27aaf4bSChristian Brunner .help = "RBD object size" 1586f27aaf4bSChristian Brunner }, 158760390a21SDaniel P. Berrange { 158860390a21SDaniel P. Berrange .name = "password-secret", 158960390a21SDaniel P. Berrange .type = QEMU_OPT_STRING, 159060390a21SDaniel P. Berrange .help = "ID of secret providing the password", 159160390a21SDaniel P. Berrange }, 1592*42e4ac9eSOr Ozeri { 1593*42e4ac9eSOr Ozeri .name = "encrypt.format", 1594*42e4ac9eSOr Ozeri .type = QEMU_OPT_STRING, 1595*42e4ac9eSOr Ozeri .help = "Encrypt the image, format choices: 'luks', 'luks2'", 1596*42e4ac9eSOr Ozeri }, 1597*42e4ac9eSOr Ozeri { 1598*42e4ac9eSOr Ozeri .name = "encrypt.cipher-alg", 1599*42e4ac9eSOr Ozeri .type = QEMU_OPT_STRING, 1600*42e4ac9eSOr Ozeri .help = "Name of encryption cipher algorithm" 1601*42e4ac9eSOr Ozeri " (allowed values: aes-128, aes-256)", 1602*42e4ac9eSOr Ozeri }, 1603*42e4ac9eSOr Ozeri { 1604*42e4ac9eSOr Ozeri .name = "encrypt.key-secret", 1605*42e4ac9eSOr Ozeri .type = QEMU_OPT_STRING, 1606*42e4ac9eSOr Ozeri .help = "ID of secret providing LUKS passphrase", 1607*42e4ac9eSOr Ozeri }, 1608bd0cf596SChunyan Liu { /* end of list */ } 1609bd0cf596SChunyan Liu } 1610f27aaf4bSChristian Brunner }; 1611f27aaf4bSChristian Brunner 16122654267cSMax Reitz static const char *const qemu_rbd_strong_runtime_opts[] = { 16132654267cSMax Reitz "pool", 16147bae7c80SStefano Garzarella "namespace", 16152654267cSMax Reitz "image", 16162654267cSMax Reitz "conf", 16172654267cSMax Reitz "snapshot", 16182654267cSMax Reitz "user", 16192654267cSMax Reitz "server.", 16202654267cSMax Reitz "password-secret", 16212654267cSMax Reitz 16222654267cSMax Reitz NULL 16232654267cSMax Reitz }; 16242654267cSMax Reitz 1625f27aaf4bSChristian Brunner static BlockDriver bdrv_rbd = { 1626f27aaf4bSChristian Brunner .format_name = "rbd", 1627f27aaf4bSChristian Brunner .instance_size = sizeof(BDRVRBDState), 1628c7cacb3eSJeff Cody .bdrv_parse_filename = qemu_rbd_parse_filename, 1629e8e16d4bSEric Blake .bdrv_refresh_limits = qemu_rbd_refresh_limits, 1630ad32e9c0SJosh Durgin .bdrv_file_open = qemu_rbd_open, 1631ad32e9c0SJosh Durgin .bdrv_close = qemu_rbd_close, 163256e7cf8dSJeff Cody .bdrv_reopen_prepare = qemu_rbd_reopen_prepare, 16331bebea37SKevin Wolf .bdrv_co_create = qemu_rbd_co_create, 1634efc75e2aSStefan Hajnoczi .bdrv_co_create_opts = qemu_rbd_co_create_opts, 16353ac21627SPeter Lieven .bdrv_has_zero_init = bdrv_has_zero_init_1, 1636ad32e9c0SJosh Durgin .bdrv_get_info = qemu_rbd_getinfo, 1637*42e4ac9eSOr Ozeri .bdrv_get_specific_info = qemu_rbd_get_specific_info, 1638bd0cf596SChunyan Liu .create_opts = &qemu_rbd_create_opts, 1639ad32e9c0SJosh Durgin .bdrv_getlength = qemu_rbd_getlength, 1640061ca8a3SKevin Wolf .bdrv_co_truncate = qemu_rbd_co_truncate, 1641f27aaf4bSChristian Brunner .protocol_name = "rbd", 1642f27aaf4bSChristian Brunner 1643e8e16d4bSEric Blake .bdrv_aio_preadv = qemu_rbd_aio_preadv, 1644e8e16d4bSEric Blake .bdrv_aio_pwritev = qemu_rbd_aio_pwritev, 1645dc7588c1SJosh Durgin 1646dc7588c1SJosh Durgin #ifdef LIBRBD_SUPPORTS_AIO_FLUSH 1647dc7588c1SJosh Durgin .bdrv_aio_flush = qemu_rbd_aio_flush, 1648dc7588c1SJosh Durgin #else 1649c68b89acSKevin Wolf .bdrv_co_flush_to_disk = qemu_rbd_co_flush, 1650dc7588c1SJosh Durgin #endif 1651f27aaf4bSChristian Brunner 1652787f3133SJosh Durgin #ifdef LIBRBD_SUPPORTS_DISCARD 16534da444a0SEric Blake .bdrv_aio_pdiscard = qemu_rbd_aio_pdiscard, 1654787f3133SJosh Durgin #endif 1655787f3133SJosh Durgin 1656ad32e9c0SJosh Durgin .bdrv_snapshot_create = qemu_rbd_snap_create, 1657bd603247SGregory Farnum .bdrv_snapshot_delete = qemu_rbd_snap_remove, 1658ad32e9c0SJosh Durgin .bdrv_snapshot_list = qemu_rbd_snap_list, 1659bd603247SGregory Farnum .bdrv_snapshot_goto = qemu_rbd_snap_rollback, 1660be217884SAdam Crume #ifdef LIBRBD_SUPPORTS_INVALIDATE 16612b148f39SPaolo Bonzini .bdrv_co_invalidate_cache = qemu_rbd_co_invalidate_cache, 1662be217884SAdam Crume #endif 16632654267cSMax Reitz 16642654267cSMax Reitz .strong_runtime_opts = qemu_rbd_strong_runtime_opts, 1665f27aaf4bSChristian Brunner }; 1666f27aaf4bSChristian Brunner 1667f27aaf4bSChristian Brunner static void bdrv_rbd_init(void) 1668f27aaf4bSChristian Brunner { 1669f27aaf4bSChristian Brunner bdrv_register(&bdrv_rbd); 1670f27aaf4bSChristian Brunner } 1671f27aaf4bSChristian Brunner 1672f27aaf4bSChristian Brunner block_init(bdrv_rbd_init); 1673