xref: /openbmc/qemu/block/rbd.c (revision 42e4ac9ef5a65f1714dd6f332de160eb63e0d6a4)
1f27aaf4bSChristian Brunner /*
2f27aaf4bSChristian Brunner  * QEMU Block driver for RADOS (Ceph)
3f27aaf4bSChristian Brunner  *
4ad32e9c0SJosh Durgin  * Copyright (C) 2010-2011 Christian Brunner <chb@muc.de>,
5ad32e9c0SJosh Durgin  *                         Josh Durgin <josh.durgin@dreamhost.com>
6f27aaf4bSChristian Brunner  *
7f27aaf4bSChristian Brunner  * This work is licensed under the terms of the GNU GPL, version 2.  See
8f27aaf4bSChristian Brunner  * the COPYING file in the top-level directory.
9f27aaf4bSChristian Brunner  *
106b620ca3SPaolo Bonzini  * Contributions after 2012-01-13 are licensed under the terms of the
116b620ca3SPaolo Bonzini  * GNU GPL, version 2 or (at your option) any later version.
12f27aaf4bSChristian Brunner  */
13f27aaf4bSChristian Brunner 
1480c71a24SPeter Maydell #include "qemu/osdep.h"
15ad32e9c0SJosh Durgin 
162836284dSMarkus Armbruster #include <rbd/librbd.h>
17da34e65cSMarkus Armbruster #include "qapi/error.h"
181de7afc9SPaolo Bonzini #include "qemu/error-report.h"
190b8fa32fSMarkus Armbruster #include "qemu/module.h"
20922a01a0SMarkus Armbruster #include "qemu/option.h"
21737e150eSPaolo Bonzini #include "block/block_int.h"
22609f45eaSMax Reitz #include "block/qdict.h"
2360390a21SDaniel P. Berrange #include "crypto/secret.h"
24f348b6d1SVeronia Bahaa #include "qemu/cutils.h"
25e4ec5ad4SPavel Dovgalyuk #include "sysemu/replay.h"
26c7cacb3eSJeff Cody #include "qapi/qmp/qstring.h"
27452fcdbcSMarkus Armbruster #include "qapi/qmp/qdict.h"
28e98c6961SEric Blake #include "qapi/qmp/qjson.h"
2947e6b297SMarkus Armbruster #include "qapi/qmp/qlist.h"
304bfb2741SKevin Wolf #include "qapi/qobject-input-visitor.h"
314bfb2741SKevin Wolf #include "qapi/qapi-visit-block-core.h"
32f27aaf4bSChristian Brunner 
33f27aaf4bSChristian Brunner /*
34f27aaf4bSChristian Brunner  * When specifying the image filename use:
35f27aaf4bSChristian Brunner  *
36fab5cf59SJosh Durgin  * rbd:poolname/devicename[@snapshotname][:option1=value1[:option2=value2...]]
37f27aaf4bSChristian Brunner  *
389e1fbcdeSSage Weil  * poolname must be the name of an existing rados pool.
39f27aaf4bSChristian Brunner  *
409e1fbcdeSSage Weil  * devicename is the name of the rbd image.
41f27aaf4bSChristian Brunner  *
429e1fbcdeSSage Weil  * Each option given is used to configure rados, and may be any valid
439e1fbcdeSSage Weil  * Ceph option, "id", or "conf".
44fab5cf59SJosh Durgin  *
459e1fbcdeSSage Weil  * The "id" option indicates what user we should authenticate as to
469e1fbcdeSSage Weil  * the Ceph cluster.  If it is excluded we will use the Ceph default
479e1fbcdeSSage Weil  * (normally 'admin').
48f27aaf4bSChristian Brunner  *
499e1fbcdeSSage Weil  * The "conf" option specifies a Ceph configuration file to read.  If
509e1fbcdeSSage Weil  * it is not specified, we will read from the default Ceph locations
519e1fbcdeSSage Weil  * (e.g., /etc/ceph/ceph.conf).  To avoid reading _any_ configuration
529e1fbcdeSSage Weil  * file, specify conf=/dev/null.
53f27aaf4bSChristian Brunner  *
549e1fbcdeSSage Weil  * Configuration values containing :, @, or = can be escaped with a
559e1fbcdeSSage Weil  * leading "\".
56f27aaf4bSChristian Brunner  */
57f27aaf4bSChristian Brunner 
58787f3133SJosh Durgin /* rbd_aio_discard added in 0.1.2 */
59787f3133SJosh Durgin #if LIBRBD_VERSION_CODE >= LIBRBD_VERSION(0, 1, 2)
60787f3133SJosh Durgin #define LIBRBD_SUPPORTS_DISCARD
61787f3133SJosh Durgin #else
62787f3133SJosh Durgin #undef LIBRBD_SUPPORTS_DISCARD
63787f3133SJosh Durgin #endif
64787f3133SJosh Durgin 
65f27aaf4bSChristian Brunner #define OBJ_MAX_SIZE (1UL << OBJ_DEFAULT_OBJ_ORDER)
66f27aaf4bSChristian Brunner 
67ad32e9c0SJosh Durgin #define RBD_MAX_SNAPS 100
68ad32e9c0SJosh Durgin 
691d393bdeStianqing /* The LIBRBD_SUPPORTS_IOVEC is defined in librbd.h */
701d393bdeStianqing #ifdef LIBRBD_SUPPORTS_IOVEC
711d393bdeStianqing #define LIBRBD_USE_IOVEC 1
721d393bdeStianqing #else
731d393bdeStianqing #define LIBRBD_USE_IOVEC 0
741d393bdeStianqing #endif
751d393bdeStianqing 
76*42e4ac9eSOr Ozeri #define RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN 8
77*42e4ac9eSOr Ozeri 
78*42e4ac9eSOr Ozeri static const char rbd_luks_header_verification[
79*42e4ac9eSOr Ozeri         RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = {
80*42e4ac9eSOr Ozeri     'L', 'U', 'K', 'S', 0xBA, 0xBE, 0, 1
81*42e4ac9eSOr Ozeri };
82*42e4ac9eSOr Ozeri 
83*42e4ac9eSOr Ozeri static const char rbd_luks2_header_verification[
84*42e4ac9eSOr Ozeri         RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = {
85*42e4ac9eSOr Ozeri     'L', 'U', 'K', 'S', 0xBA, 0xBE, 0, 2
86*42e4ac9eSOr Ozeri };
87*42e4ac9eSOr Ozeri 
88787f3133SJosh Durgin typedef enum {
89787f3133SJosh Durgin     RBD_AIO_READ,
90787f3133SJosh Durgin     RBD_AIO_WRITE,
91dc7588c1SJosh Durgin     RBD_AIO_DISCARD,
92dc7588c1SJosh Durgin     RBD_AIO_FLUSH
93787f3133SJosh Durgin } RBDAIOCmd;
94787f3133SJosh Durgin 
95f27aaf4bSChristian Brunner typedef struct RBDAIOCB {
967c84b1b8SMarkus Armbruster     BlockAIOCB common;
9708448d51SStefan Priebe     int64_t ret;
98f27aaf4bSChristian Brunner     QEMUIOVector *qiov;
99f27aaf4bSChristian Brunner     char *bounce;
100787f3133SJosh Durgin     RBDAIOCmd cmd;
101f27aaf4bSChristian Brunner     int error;
102f27aaf4bSChristian Brunner     struct BDRVRBDState *s;
103f27aaf4bSChristian Brunner } RBDAIOCB;
104f27aaf4bSChristian Brunner 
105f27aaf4bSChristian Brunner typedef struct RADOSCB {
106f27aaf4bSChristian Brunner     RBDAIOCB *acb;
107f27aaf4bSChristian Brunner     struct BDRVRBDState *s;
108ad32e9c0SJosh Durgin     int64_t size;
109f27aaf4bSChristian Brunner     char *buf;
11008448d51SStefan Priebe     int64_t ret;
111f27aaf4bSChristian Brunner } RADOSCB;
112f27aaf4bSChristian Brunner 
113f27aaf4bSChristian Brunner typedef struct BDRVRBDState {
114ad32e9c0SJosh Durgin     rados_t cluster;
115ad32e9c0SJosh Durgin     rados_ioctx_t io_ctx;
116ad32e9c0SJosh Durgin     rbd_image_t image;
11780b61a27SJeff Cody     char *image_name;
118ad32e9c0SJosh Durgin     char *snap;
11919ae9ae0SFlorian Florensa     char *namespace;
120d24f8023SStefano Garzarella     uint64_t image_size;
121f27aaf4bSChristian Brunner } BDRVRBDState;
122f27aaf4bSChristian Brunner 
123aa045c2dSKevin Wolf static int qemu_rbd_connect(rados_t *cluster, rados_ioctx_t *io_ctx,
124aa045c2dSKevin Wolf                             BlockdevOptionsRbd *opts, bool cache,
125aa045c2dSKevin Wolf                             const char *keypairs, const char *secretid,
126aa045c2dSKevin Wolf                             Error **errp);
127aa045c2dSKevin Wolf 
1282b99cfceSConnor Kuehl static char *qemu_rbd_strchr(char *src, char delim)
1292b99cfceSConnor Kuehl {
1302b99cfceSConnor Kuehl     char *p;
1312b99cfceSConnor Kuehl 
1322b99cfceSConnor Kuehl     for (p = src; *p; ++p) {
1332b99cfceSConnor Kuehl         if (*p == delim) {
1342b99cfceSConnor Kuehl             return p;
1352b99cfceSConnor Kuehl         }
1362b99cfceSConnor Kuehl         if (*p == '\\' && p[1] != '\0') {
1372b99cfceSConnor Kuehl             ++p;
1382b99cfceSConnor Kuehl         }
1392b99cfceSConnor Kuehl     }
1402b99cfceSConnor Kuehl 
1412b99cfceSConnor Kuehl     return NULL;
1422b99cfceSConnor Kuehl }
1432b99cfceSConnor Kuehl 
1442b99cfceSConnor Kuehl 
145730b00bbSMarkus Armbruster static char *qemu_rbd_next_tok(char *src, char delim, char **p)
146f27aaf4bSChristian Brunner {
147f27aaf4bSChristian Brunner     char *end;
148f27aaf4bSChristian Brunner 
149f27aaf4bSChristian Brunner     *p = NULL;
150f27aaf4bSChristian Brunner 
1512b99cfceSConnor Kuehl     end = qemu_rbd_strchr(src, delim);
1522b99cfceSConnor Kuehl     if (end) {
153f27aaf4bSChristian Brunner         *p = end + 1;
154f27aaf4bSChristian Brunner         *end = '\0';
155f27aaf4bSChristian Brunner     }
1567830f909SJeff Cody     return src;
157f27aaf4bSChristian Brunner }
158f27aaf4bSChristian Brunner 
15916a06b24SSage Weil static void qemu_rbd_unescape(char *src)
16016a06b24SSage Weil {
16116a06b24SSage Weil     char *p;
16216a06b24SSage Weil 
16316a06b24SSage Weil     for (p = src; *src; ++src, ++p) {
16416a06b24SSage Weil         if (*src == '\\' && src[1] != '\0') {
16516a06b24SSage Weil             src++;
16616a06b24SSage Weil         }
16716a06b24SSage Weil         *p = *src;
16816a06b24SSage Weil     }
16916a06b24SSage Weil     *p = '\0';
17016a06b24SSage Weil }
17116a06b24SSage Weil 
172c7cacb3eSJeff Cody static void qemu_rbd_parse_filename(const char *filename, QDict *options,
173d61563b2SMarkus Armbruster                                     Error **errp)
174f27aaf4bSChristian Brunner {
175f27aaf4bSChristian Brunner     const char *start;
176e98c6961SEric Blake     char *p, *buf;
177e98c6961SEric Blake     QList *keypairs = NULL;
17819ae9ae0SFlorian Florensa     char *found_str, *image_name;
179f27aaf4bSChristian Brunner 
180f27aaf4bSChristian Brunner     if (!strstart(filename, "rbd:", &start)) {
181d61563b2SMarkus Armbruster         error_setg(errp, "File name must start with 'rbd:'");
182c7cacb3eSJeff Cody         return;
183f27aaf4bSChristian Brunner     }
184f27aaf4bSChristian Brunner 
1857267c094SAnthony Liguori     buf = g_strdup(start);
186f27aaf4bSChristian Brunner     p = buf;
187f27aaf4bSChristian Brunner 
188730b00bbSMarkus Armbruster     found_str = qemu_rbd_next_tok(p, '/', &p);
1897830f909SJeff Cody     if (!p) {
1907830f909SJeff Cody         error_setg(errp, "Pool name is required");
1917830f909SJeff Cody         goto done;
1927830f909SJeff Cody     }
1937830f909SJeff Cody     qemu_rbd_unescape(found_str);
19446f5ac20SEric Blake     qdict_put_str(options, "pool", found_str);
195fab5cf59SJosh Durgin 
1962b99cfceSConnor Kuehl     if (qemu_rbd_strchr(p, '@')) {
19719ae9ae0SFlorian Florensa         image_name = qemu_rbd_next_tok(p, '@', &p);
1987830f909SJeff Cody 
199730b00bbSMarkus Armbruster         found_str = qemu_rbd_next_tok(p, ':', &p);
2007830f909SJeff Cody         qemu_rbd_unescape(found_str);
20146f5ac20SEric Blake         qdict_put_str(options, "snapshot", found_str);
2027830f909SJeff Cody     } else {
20319ae9ae0SFlorian Florensa         image_name = qemu_rbd_next_tok(p, ':', &p);
2047830f909SJeff Cody     }
20519ae9ae0SFlorian Florensa     /* Check for namespace in the image_name */
2062b99cfceSConnor Kuehl     if (qemu_rbd_strchr(image_name, '/')) {
20719ae9ae0SFlorian Florensa         found_str = qemu_rbd_next_tok(image_name, '/', &image_name);
20819ae9ae0SFlorian Florensa         qemu_rbd_unescape(found_str);
20919ae9ae0SFlorian Florensa         qdict_put_str(options, "namespace", found_str);
21019ae9ae0SFlorian Florensa     } else {
21119ae9ae0SFlorian Florensa         qdict_put_str(options, "namespace", "");
21219ae9ae0SFlorian Florensa     }
21319ae9ae0SFlorian Florensa     qemu_rbd_unescape(image_name);
21419ae9ae0SFlorian Florensa     qdict_put_str(options, "image", image_name);
2157830f909SJeff Cody     if (!p) {
216f27aaf4bSChristian Brunner         goto done;
217f27aaf4bSChristian Brunner     }
218f27aaf4bSChristian Brunner 
219c7cacb3eSJeff Cody     /* The following are essentially all key/value pairs, and we treat
220c7cacb3eSJeff Cody      * 'id' and 'conf' a bit special.  Key/value pairs may be in any order. */
221c7cacb3eSJeff Cody     while (p) {
222c7cacb3eSJeff Cody         char *name, *value;
223730b00bbSMarkus Armbruster         name = qemu_rbd_next_tok(p, '=', &p);
224c7cacb3eSJeff Cody         if (!p) {
225c7cacb3eSJeff Cody             error_setg(errp, "conf option %s has no value", name);
226c7cacb3eSJeff Cody             break;
227c7cacb3eSJeff Cody         }
228c7cacb3eSJeff Cody 
229c7cacb3eSJeff Cody         qemu_rbd_unescape(name);
230c7cacb3eSJeff Cody 
231730b00bbSMarkus Armbruster         value = qemu_rbd_next_tok(p, ':', &p);
232c7cacb3eSJeff Cody         qemu_rbd_unescape(value);
233c7cacb3eSJeff Cody 
234c7cacb3eSJeff Cody         if (!strcmp(name, "conf")) {
23546f5ac20SEric Blake             qdict_put_str(options, "conf", value);
236c7cacb3eSJeff Cody         } else if (!strcmp(name, "id")) {
23746f5ac20SEric Blake             qdict_put_str(options, "user", value);
238c7cacb3eSJeff Cody         } else {
239e98c6961SEric Blake             /*
240e98c6961SEric Blake              * We pass these internally to qemu_rbd_set_keypairs(), so
241e98c6961SEric Blake              * we can get away with the simpler list of [ "key1",
242e98c6961SEric Blake              * "value1", "key2", "value2" ] rather than a raw dict
243e98c6961SEric Blake              * { "key1": "value1", "key2": "value2" } where we can't
244e98c6961SEric Blake              * guarantee order, or even a more correct but complex
245e98c6961SEric Blake              * [ { "key1": "value1" }, { "key2": "value2" } ]
246e98c6961SEric Blake              */
247e98c6961SEric Blake             if (!keypairs) {
248e98c6961SEric Blake                 keypairs = qlist_new();
249c7cacb3eSJeff Cody             }
25046f5ac20SEric Blake             qlist_append_str(keypairs, name);
25146f5ac20SEric Blake             qlist_append_str(keypairs, value);
252c7cacb3eSJeff Cody         }
253c7cacb3eSJeff Cody     }
254c7cacb3eSJeff Cody 
255e98c6961SEric Blake     if (keypairs) {
256e98c6961SEric Blake         qdict_put(options, "=keyvalue-pairs",
257eab3a467SMarkus Armbruster                   qstring_from_gstring(qobject_to_json(QOBJECT(keypairs))));
258c7cacb3eSJeff Cody     }
259c7cacb3eSJeff Cody 
260f27aaf4bSChristian Brunner done:
2617267c094SAnthony Liguori     g_free(buf);
262cb3e7f08SMarc-André Lureau     qobject_unref(keypairs);
263c7cacb3eSJeff Cody     return;
2647c7e9df0SSage Weil }
2657c7e9df0SSage Weil 
26660390a21SDaniel P. Berrange 
267e8e16d4bSEric Blake static void qemu_rbd_refresh_limits(BlockDriverState *bs, Error **errp)
268e8e16d4bSEric Blake {
269e8e16d4bSEric Blake     /* XXX Does RBD support AIO on less than 512-byte alignment? */
270e8e16d4bSEric Blake     bs->bl.request_alignment = 512;
271e8e16d4bSEric Blake }
272e8e16d4bSEric Blake 
273e8e16d4bSEric Blake 
274d083f954SMarkus Armbruster static int qemu_rbd_set_auth(rados_t cluster, BlockdevOptionsRbd *opts,
27560390a21SDaniel P. Berrange                              Error **errp)
27660390a21SDaniel P. Berrange {
277d083f954SMarkus Armbruster     char *key, *acr;
278a3699de4SMarkus Armbruster     int r;
279a3699de4SMarkus Armbruster     GString *accu;
280a3699de4SMarkus Armbruster     RbdAuthModeList *auth;
28160390a21SDaniel P. Berrange 
282d083f954SMarkus Armbruster     if (opts->key_secret) {
283d083f954SMarkus Armbruster         key = qcrypto_secret_lookup_as_base64(opts->key_secret, errp);
284d083f954SMarkus Armbruster         if (!key) {
285d083f954SMarkus Armbruster             return -EIO;
28660390a21SDaniel P. Berrange         }
287d083f954SMarkus Armbruster         r = rados_conf_set(cluster, "key", key);
288d083f954SMarkus Armbruster         g_free(key);
289d083f954SMarkus Armbruster         if (r < 0) {
290d083f954SMarkus Armbruster             error_setg_errno(errp, -r, "Could not set 'key'");
291d083f954SMarkus Armbruster             return r;
292d083f954SMarkus Armbruster         }
293a3699de4SMarkus Armbruster     }
294a3699de4SMarkus Armbruster 
295a3699de4SMarkus Armbruster     if (opts->has_auth_client_required) {
296a3699de4SMarkus Armbruster         accu = g_string_new("");
297a3699de4SMarkus Armbruster         for (auth = opts->auth_client_required; auth; auth = auth->next) {
298a3699de4SMarkus Armbruster             if (accu->str[0]) {
299a3699de4SMarkus Armbruster                 g_string_append_c(accu, ';');
300a3699de4SMarkus Armbruster             }
301a3699de4SMarkus Armbruster             g_string_append(accu, RbdAuthMode_str(auth->value));
302a3699de4SMarkus Armbruster         }
303a3699de4SMarkus Armbruster         acr = g_string_free(accu, FALSE);
304a3699de4SMarkus Armbruster         r = rados_conf_set(cluster, "auth_client_required", acr);
305a3699de4SMarkus Armbruster         g_free(acr);
306a3699de4SMarkus Armbruster         if (r < 0) {
307a3699de4SMarkus Armbruster             error_setg_errno(errp, -r,
308a3699de4SMarkus Armbruster                              "Could not set 'auth_client_required'");
309a3699de4SMarkus Armbruster             return r;
310a3699de4SMarkus Armbruster         }
311a3699de4SMarkus Armbruster     }
31260390a21SDaniel P. Berrange 
31360390a21SDaniel P. Berrange     return 0;
31460390a21SDaniel P. Berrange }
31560390a21SDaniel P. Berrange 
316e98c6961SEric Blake static int qemu_rbd_set_keypairs(rados_t cluster, const char *keypairs_json,
317e34d8f29SJosh Durgin                                  Error **errp)
318fab5cf59SJosh Durgin {
319e98c6961SEric Blake     QList *keypairs;
320e98c6961SEric Blake     QString *name;
321e98c6961SEric Blake     QString *value;
322e98c6961SEric Blake     const char *key;
323e98c6961SEric Blake     size_t remaining;
324fab5cf59SJosh Durgin     int ret = 0;
325fab5cf59SJosh Durgin 
326e98c6961SEric Blake     if (!keypairs_json) {
327e98c6961SEric Blake         return ret;
328fab5cf59SJosh Durgin     }
3297dc847ebSMax Reitz     keypairs = qobject_to(QList,
3307dc847ebSMax Reitz                           qobject_from_json(keypairs_json, &error_abort));
331e98c6961SEric Blake     remaining = qlist_size(keypairs) / 2;
332e98c6961SEric Blake     assert(remaining);
333fab5cf59SJosh Durgin 
334e98c6961SEric Blake     while (remaining--) {
3357dc847ebSMax Reitz         name = qobject_to(QString, qlist_pop(keypairs));
3367dc847ebSMax Reitz         value = qobject_to(QString, qlist_pop(keypairs));
337e98c6961SEric Blake         assert(name && value);
338e98c6961SEric Blake         key = qstring_get_str(name);
339fab5cf59SJosh Durgin 
340e98c6961SEric Blake         ret = rados_conf_set(cluster, key, qstring_get_str(value));
341cb3e7f08SMarc-André Lureau         qobject_unref(value);
342fab5cf59SJosh Durgin         if (ret < 0) {
343e98c6961SEric Blake             error_setg_errno(errp, -ret, "invalid conf option %s", key);
344cb3e7f08SMarc-André Lureau             qobject_unref(name);
345fab5cf59SJosh Durgin             ret = -EINVAL;
346fab5cf59SJosh Durgin             break;
347fab5cf59SJosh Durgin         }
348cb3e7f08SMarc-André Lureau         qobject_unref(name);
349fab5cf59SJosh Durgin     }
350fab5cf59SJosh Durgin 
351cb3e7f08SMarc-André Lureau     qobject_unref(keypairs);
352fab5cf59SJosh Durgin     return ret;
353fab5cf59SJosh Durgin }
354fab5cf59SJosh Durgin 
3551d393bdeStianqing static void qemu_rbd_memset(RADOSCB *rcb, int64_t offs)
3561d393bdeStianqing {
3571d393bdeStianqing     if (LIBRBD_USE_IOVEC) {
3581d393bdeStianqing         RBDAIOCB *acb = rcb->acb;
3591d393bdeStianqing         iov_memset(acb->qiov->iov, acb->qiov->niov, offs, 0,
3601d393bdeStianqing                    acb->qiov->size - offs);
3611d393bdeStianqing     } else {
3621d393bdeStianqing         memset(rcb->buf + offs, 0, rcb->size - offs);
3631d393bdeStianqing     }
3641d393bdeStianqing }
3651d393bdeStianqing 
366*42e4ac9eSOr Ozeri #ifdef LIBRBD_SUPPORTS_ENCRYPTION
367*42e4ac9eSOr Ozeri static int qemu_rbd_convert_luks_options(
368*42e4ac9eSOr Ozeri         RbdEncryptionOptionsLUKSBase *luks_opts,
369*42e4ac9eSOr Ozeri         char **passphrase,
370*42e4ac9eSOr Ozeri         size_t *passphrase_len,
371*42e4ac9eSOr Ozeri         Error **errp)
372*42e4ac9eSOr Ozeri {
373*42e4ac9eSOr Ozeri     return qcrypto_secret_lookup(luks_opts->key_secret, (uint8_t **)passphrase,
374*42e4ac9eSOr Ozeri                                  passphrase_len, errp);
375*42e4ac9eSOr Ozeri }
376*42e4ac9eSOr Ozeri 
377*42e4ac9eSOr Ozeri static int qemu_rbd_convert_luks_create_options(
378*42e4ac9eSOr Ozeri         RbdEncryptionCreateOptionsLUKSBase *luks_opts,
379*42e4ac9eSOr Ozeri         rbd_encryption_algorithm_t *alg,
380*42e4ac9eSOr Ozeri         char **passphrase,
381*42e4ac9eSOr Ozeri         size_t *passphrase_len,
382*42e4ac9eSOr Ozeri         Error **errp)
383*42e4ac9eSOr Ozeri {
384*42e4ac9eSOr Ozeri     int r = 0;
385*42e4ac9eSOr Ozeri 
386*42e4ac9eSOr Ozeri     r = qemu_rbd_convert_luks_options(
387*42e4ac9eSOr Ozeri             qapi_RbdEncryptionCreateOptionsLUKSBase_base(luks_opts),
388*42e4ac9eSOr Ozeri             passphrase, passphrase_len, errp);
389*42e4ac9eSOr Ozeri     if (r < 0) {
390*42e4ac9eSOr Ozeri         return r;
391*42e4ac9eSOr Ozeri     }
392*42e4ac9eSOr Ozeri 
393*42e4ac9eSOr Ozeri     if (luks_opts->has_cipher_alg) {
394*42e4ac9eSOr Ozeri         switch (luks_opts->cipher_alg) {
395*42e4ac9eSOr Ozeri             case QCRYPTO_CIPHER_ALG_AES_128: {
396*42e4ac9eSOr Ozeri                 *alg = RBD_ENCRYPTION_ALGORITHM_AES128;
397*42e4ac9eSOr Ozeri                 break;
398*42e4ac9eSOr Ozeri             }
399*42e4ac9eSOr Ozeri             case QCRYPTO_CIPHER_ALG_AES_256: {
400*42e4ac9eSOr Ozeri                 *alg = RBD_ENCRYPTION_ALGORITHM_AES256;
401*42e4ac9eSOr Ozeri                 break;
402*42e4ac9eSOr Ozeri             }
403*42e4ac9eSOr Ozeri             default: {
404*42e4ac9eSOr Ozeri                 r = -ENOTSUP;
405*42e4ac9eSOr Ozeri                 error_setg_errno(errp, -r, "unknown encryption algorithm: %u",
406*42e4ac9eSOr Ozeri                                  luks_opts->cipher_alg);
407*42e4ac9eSOr Ozeri                 return r;
408*42e4ac9eSOr Ozeri             }
409*42e4ac9eSOr Ozeri         }
410*42e4ac9eSOr Ozeri     } else {
411*42e4ac9eSOr Ozeri         /* default alg */
412*42e4ac9eSOr Ozeri         *alg = RBD_ENCRYPTION_ALGORITHM_AES256;
413*42e4ac9eSOr Ozeri     }
414*42e4ac9eSOr Ozeri 
415*42e4ac9eSOr Ozeri     return 0;
416*42e4ac9eSOr Ozeri }
417*42e4ac9eSOr Ozeri 
418*42e4ac9eSOr Ozeri static int qemu_rbd_encryption_format(rbd_image_t image,
419*42e4ac9eSOr Ozeri                                       RbdEncryptionCreateOptions *encrypt,
420*42e4ac9eSOr Ozeri                                       Error **errp)
421*42e4ac9eSOr Ozeri {
422*42e4ac9eSOr Ozeri     int r = 0;
423*42e4ac9eSOr Ozeri     g_autofree char *passphrase = NULL;
424*42e4ac9eSOr Ozeri     size_t passphrase_len;
425*42e4ac9eSOr Ozeri     rbd_encryption_format_t format;
426*42e4ac9eSOr Ozeri     rbd_encryption_options_t opts;
427*42e4ac9eSOr Ozeri     rbd_encryption_luks1_format_options_t luks_opts;
428*42e4ac9eSOr Ozeri     rbd_encryption_luks2_format_options_t luks2_opts;
429*42e4ac9eSOr Ozeri     size_t opts_size;
430*42e4ac9eSOr Ozeri     uint64_t raw_size, effective_size;
431*42e4ac9eSOr Ozeri 
432*42e4ac9eSOr Ozeri     r = rbd_get_size(image, &raw_size);
433*42e4ac9eSOr Ozeri     if (r < 0) {
434*42e4ac9eSOr Ozeri         error_setg_errno(errp, -r, "cannot get raw image size");
435*42e4ac9eSOr Ozeri         return r;
436*42e4ac9eSOr Ozeri     }
437*42e4ac9eSOr Ozeri 
438*42e4ac9eSOr Ozeri     switch (encrypt->format) {
439*42e4ac9eSOr Ozeri         case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS: {
440*42e4ac9eSOr Ozeri             memset(&luks_opts, 0, sizeof(luks_opts));
441*42e4ac9eSOr Ozeri             format = RBD_ENCRYPTION_FORMAT_LUKS1;
442*42e4ac9eSOr Ozeri             opts = &luks_opts;
443*42e4ac9eSOr Ozeri             opts_size = sizeof(luks_opts);
444*42e4ac9eSOr Ozeri             r = qemu_rbd_convert_luks_create_options(
445*42e4ac9eSOr Ozeri                     qapi_RbdEncryptionCreateOptionsLUKS_base(&encrypt->u.luks),
446*42e4ac9eSOr Ozeri                     &luks_opts.alg, &passphrase, &passphrase_len, errp);
447*42e4ac9eSOr Ozeri             if (r < 0) {
448*42e4ac9eSOr Ozeri                 return r;
449*42e4ac9eSOr Ozeri             }
450*42e4ac9eSOr Ozeri             luks_opts.passphrase = passphrase;
451*42e4ac9eSOr Ozeri             luks_opts.passphrase_size = passphrase_len;
452*42e4ac9eSOr Ozeri             break;
453*42e4ac9eSOr Ozeri         }
454*42e4ac9eSOr Ozeri         case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2: {
455*42e4ac9eSOr Ozeri             memset(&luks2_opts, 0, sizeof(luks2_opts));
456*42e4ac9eSOr Ozeri             format = RBD_ENCRYPTION_FORMAT_LUKS2;
457*42e4ac9eSOr Ozeri             opts = &luks2_opts;
458*42e4ac9eSOr Ozeri             opts_size = sizeof(luks2_opts);
459*42e4ac9eSOr Ozeri             r = qemu_rbd_convert_luks_create_options(
460*42e4ac9eSOr Ozeri                     qapi_RbdEncryptionCreateOptionsLUKS2_base(
461*42e4ac9eSOr Ozeri                             &encrypt->u.luks2),
462*42e4ac9eSOr Ozeri                     &luks2_opts.alg, &passphrase, &passphrase_len, errp);
463*42e4ac9eSOr Ozeri             if (r < 0) {
464*42e4ac9eSOr Ozeri                 return r;
465*42e4ac9eSOr Ozeri             }
466*42e4ac9eSOr Ozeri             luks2_opts.passphrase = passphrase;
467*42e4ac9eSOr Ozeri             luks2_opts.passphrase_size = passphrase_len;
468*42e4ac9eSOr Ozeri             break;
469*42e4ac9eSOr Ozeri         }
470*42e4ac9eSOr Ozeri         default: {
471*42e4ac9eSOr Ozeri             r = -ENOTSUP;
472*42e4ac9eSOr Ozeri             error_setg_errno(
473*42e4ac9eSOr Ozeri                     errp, -r, "unknown image encryption format: %u",
474*42e4ac9eSOr Ozeri                     encrypt->format);
475*42e4ac9eSOr Ozeri             return r;
476*42e4ac9eSOr Ozeri         }
477*42e4ac9eSOr Ozeri     }
478*42e4ac9eSOr Ozeri 
479*42e4ac9eSOr Ozeri     r = rbd_encryption_format(image, format, opts, opts_size);
480*42e4ac9eSOr Ozeri     if (r < 0) {
481*42e4ac9eSOr Ozeri         error_setg_errno(errp, -r, "encryption format fail");
482*42e4ac9eSOr Ozeri         return r;
483*42e4ac9eSOr Ozeri     }
484*42e4ac9eSOr Ozeri 
485*42e4ac9eSOr Ozeri     r = rbd_get_size(image, &effective_size);
486*42e4ac9eSOr Ozeri     if (r < 0) {
487*42e4ac9eSOr Ozeri         error_setg_errno(errp, -r, "cannot get effective image size");
488*42e4ac9eSOr Ozeri         return r;
489*42e4ac9eSOr Ozeri     }
490*42e4ac9eSOr Ozeri 
491*42e4ac9eSOr Ozeri     r = rbd_resize(image, raw_size + (raw_size - effective_size));
492*42e4ac9eSOr Ozeri     if (r < 0) {
493*42e4ac9eSOr Ozeri         error_setg_errno(errp, -r, "cannot resize image after format");
494*42e4ac9eSOr Ozeri         return r;
495*42e4ac9eSOr Ozeri     }
496*42e4ac9eSOr Ozeri 
497*42e4ac9eSOr Ozeri     return 0;
498*42e4ac9eSOr Ozeri }
499*42e4ac9eSOr Ozeri 
500*42e4ac9eSOr Ozeri static int qemu_rbd_encryption_load(rbd_image_t image,
501*42e4ac9eSOr Ozeri                                     RbdEncryptionOptions *encrypt,
502*42e4ac9eSOr Ozeri                                     Error **errp)
503*42e4ac9eSOr Ozeri {
504*42e4ac9eSOr Ozeri     int r = 0;
505*42e4ac9eSOr Ozeri     g_autofree char *passphrase = NULL;
506*42e4ac9eSOr Ozeri     size_t passphrase_len;
507*42e4ac9eSOr Ozeri     rbd_encryption_luks1_format_options_t luks_opts;
508*42e4ac9eSOr Ozeri     rbd_encryption_luks2_format_options_t luks2_opts;
509*42e4ac9eSOr Ozeri     rbd_encryption_format_t format;
510*42e4ac9eSOr Ozeri     rbd_encryption_options_t opts;
511*42e4ac9eSOr Ozeri     size_t opts_size;
512*42e4ac9eSOr Ozeri 
513*42e4ac9eSOr Ozeri     switch (encrypt->format) {
514*42e4ac9eSOr Ozeri         case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS: {
515*42e4ac9eSOr Ozeri             memset(&luks_opts, 0, sizeof(luks_opts));
516*42e4ac9eSOr Ozeri             format = RBD_ENCRYPTION_FORMAT_LUKS1;
517*42e4ac9eSOr Ozeri             opts = &luks_opts;
518*42e4ac9eSOr Ozeri             opts_size = sizeof(luks_opts);
519*42e4ac9eSOr Ozeri             r = qemu_rbd_convert_luks_options(
520*42e4ac9eSOr Ozeri                     qapi_RbdEncryptionOptionsLUKS_base(&encrypt->u.luks),
521*42e4ac9eSOr Ozeri                     &passphrase, &passphrase_len, errp);
522*42e4ac9eSOr Ozeri             if (r < 0) {
523*42e4ac9eSOr Ozeri                 return r;
524*42e4ac9eSOr Ozeri             }
525*42e4ac9eSOr Ozeri             luks_opts.passphrase = passphrase;
526*42e4ac9eSOr Ozeri             luks_opts.passphrase_size = passphrase_len;
527*42e4ac9eSOr Ozeri             break;
528*42e4ac9eSOr Ozeri         }
529*42e4ac9eSOr Ozeri         case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2: {
530*42e4ac9eSOr Ozeri             memset(&luks2_opts, 0, sizeof(luks2_opts));
531*42e4ac9eSOr Ozeri             format = RBD_ENCRYPTION_FORMAT_LUKS2;
532*42e4ac9eSOr Ozeri             opts = &luks2_opts;
533*42e4ac9eSOr Ozeri             opts_size = sizeof(luks2_opts);
534*42e4ac9eSOr Ozeri             r = qemu_rbd_convert_luks_options(
535*42e4ac9eSOr Ozeri                     qapi_RbdEncryptionOptionsLUKS2_base(&encrypt->u.luks2),
536*42e4ac9eSOr Ozeri                     &passphrase, &passphrase_len, errp);
537*42e4ac9eSOr Ozeri             if (r < 0) {
538*42e4ac9eSOr Ozeri                 return r;
539*42e4ac9eSOr Ozeri             }
540*42e4ac9eSOr Ozeri             luks2_opts.passphrase = passphrase;
541*42e4ac9eSOr Ozeri             luks2_opts.passphrase_size = passphrase_len;
542*42e4ac9eSOr Ozeri             break;
543*42e4ac9eSOr Ozeri         }
544*42e4ac9eSOr Ozeri         default: {
545*42e4ac9eSOr Ozeri             r = -ENOTSUP;
546*42e4ac9eSOr Ozeri             error_setg_errno(
547*42e4ac9eSOr Ozeri                     errp, -r, "unknown image encryption format: %u",
548*42e4ac9eSOr Ozeri                     encrypt->format);
549*42e4ac9eSOr Ozeri             return r;
550*42e4ac9eSOr Ozeri         }
551*42e4ac9eSOr Ozeri     }
552*42e4ac9eSOr Ozeri 
553*42e4ac9eSOr Ozeri     r = rbd_encryption_load(image, format, opts, opts_size);
554*42e4ac9eSOr Ozeri     if (r < 0) {
555*42e4ac9eSOr Ozeri         error_setg_errno(errp, -r, "encryption load fail");
556*42e4ac9eSOr Ozeri         return r;
557*42e4ac9eSOr Ozeri     }
558*42e4ac9eSOr Ozeri 
559*42e4ac9eSOr Ozeri     return 0;
560*42e4ac9eSOr Ozeri }
561*42e4ac9eSOr Ozeri #endif
562*42e4ac9eSOr Ozeri 
563d083f954SMarkus Armbruster /* FIXME Deprecate and remove keypairs or make it available in QMP. */
5641bebea37SKevin Wolf static int qemu_rbd_do_create(BlockdevCreateOptions *options,
5651bebea37SKevin Wolf                               const char *keypairs, const char *password_secret,
5661bebea37SKevin Wolf                               Error **errp)
5671bebea37SKevin Wolf {
5681bebea37SKevin Wolf     BlockdevCreateOptionsRbd *opts = &options->u.rbd;
5691bebea37SKevin Wolf     rados_t cluster;
5701bebea37SKevin Wolf     rados_ioctx_t io_ctx;
5711bebea37SKevin Wolf     int obj_order = 0;
5721bebea37SKevin Wolf     int ret;
5731bebea37SKevin Wolf 
5741bebea37SKevin Wolf     assert(options->driver == BLOCKDEV_DRIVER_RBD);
5751bebea37SKevin Wolf     if (opts->location->has_snapshot) {
5761bebea37SKevin Wolf         error_setg(errp, "Can't use snapshot name for image creation");
5771bebea37SKevin Wolf         return -EINVAL;
5781bebea37SKevin Wolf     }
5791bebea37SKevin Wolf 
580*42e4ac9eSOr Ozeri #ifndef LIBRBD_SUPPORTS_ENCRYPTION
581*42e4ac9eSOr Ozeri     if (opts->has_encrypt) {
582*42e4ac9eSOr Ozeri         error_setg(errp, "RBD library does not support image encryption");
583*42e4ac9eSOr Ozeri         return -ENOTSUP;
584*42e4ac9eSOr Ozeri     }
585*42e4ac9eSOr Ozeri #endif
586*42e4ac9eSOr Ozeri 
5871bebea37SKevin Wolf     if (opts->has_cluster_size) {
5881bebea37SKevin Wolf         int64_t objsize = opts->cluster_size;
5891bebea37SKevin Wolf         if ((objsize - 1) & objsize) {    /* not a power of 2? */
5901bebea37SKevin Wolf             error_setg(errp, "obj size needs to be power of 2");
5911bebea37SKevin Wolf             return -EINVAL;
5921bebea37SKevin Wolf         }
5931bebea37SKevin Wolf         if (objsize < 4096) {
5941bebea37SKevin Wolf             error_setg(errp, "obj size too small");
5951bebea37SKevin Wolf             return -EINVAL;
5961bebea37SKevin Wolf         }
5971bebea37SKevin Wolf         obj_order = ctz32(objsize);
5981bebea37SKevin Wolf     }
5991bebea37SKevin Wolf 
600aa045c2dSKevin Wolf     ret = qemu_rbd_connect(&cluster, &io_ctx, opts->location, false, keypairs,
601aa045c2dSKevin Wolf                            password_secret, errp);
6021bebea37SKevin Wolf     if (ret < 0) {
6031bebea37SKevin Wolf         return ret;
6041bebea37SKevin Wolf     }
6051bebea37SKevin Wolf 
6061bebea37SKevin Wolf     ret = rbd_create(io_ctx, opts->location->image, opts->size, &obj_order);
6071bebea37SKevin Wolf     if (ret < 0) {
6081bebea37SKevin Wolf         error_setg_errno(errp, -ret, "error rbd create");
609aa045c2dSKevin Wolf         goto out;
6101bebea37SKevin Wolf     }
6111bebea37SKevin Wolf 
612*42e4ac9eSOr Ozeri #ifdef LIBRBD_SUPPORTS_ENCRYPTION
613*42e4ac9eSOr Ozeri     if (opts->has_encrypt) {
614*42e4ac9eSOr Ozeri         rbd_image_t image;
615*42e4ac9eSOr Ozeri 
616*42e4ac9eSOr Ozeri         ret = rbd_open(io_ctx, opts->location->image, &image, NULL);
617*42e4ac9eSOr Ozeri         if (ret < 0) {
618*42e4ac9eSOr Ozeri             error_setg_errno(errp, -ret,
619*42e4ac9eSOr Ozeri                              "error opening image '%s' for encryption format",
620*42e4ac9eSOr Ozeri                              opts->location->image);
621*42e4ac9eSOr Ozeri             goto out;
622*42e4ac9eSOr Ozeri         }
623*42e4ac9eSOr Ozeri 
624*42e4ac9eSOr Ozeri         ret = qemu_rbd_encryption_format(image, opts->encrypt, errp);
625*42e4ac9eSOr Ozeri         rbd_close(image);
626*42e4ac9eSOr Ozeri         if (ret < 0) {
627*42e4ac9eSOr Ozeri             /* encryption format fail, try removing the image */
628*42e4ac9eSOr Ozeri             rbd_remove(io_ctx, opts->location->image);
629*42e4ac9eSOr Ozeri             goto out;
630*42e4ac9eSOr Ozeri         }
631*42e4ac9eSOr Ozeri     }
632*42e4ac9eSOr Ozeri #endif
633*42e4ac9eSOr Ozeri 
6341bebea37SKevin Wolf     ret = 0;
635aa045c2dSKevin Wolf out:
636aa045c2dSKevin Wolf     rados_ioctx_destroy(io_ctx);
6371bebea37SKevin Wolf     rados_shutdown(cluster);
6381bebea37SKevin Wolf     return ret;
6391bebea37SKevin Wolf }
6401bebea37SKevin Wolf 
6411bebea37SKevin Wolf static int qemu_rbd_co_create(BlockdevCreateOptions *options, Error **errp)
6421bebea37SKevin Wolf {
6431bebea37SKevin Wolf     return qemu_rbd_do_create(options, NULL, NULL, errp);
6441bebea37SKevin Wolf }
6451bebea37SKevin Wolf 
646*42e4ac9eSOr Ozeri static int qemu_rbd_extract_encryption_create_options(
647*42e4ac9eSOr Ozeri         QemuOpts *opts,
648*42e4ac9eSOr Ozeri         RbdEncryptionCreateOptions **spec,
649*42e4ac9eSOr Ozeri         Error **errp)
650*42e4ac9eSOr Ozeri {
651*42e4ac9eSOr Ozeri     QDict *opts_qdict;
652*42e4ac9eSOr Ozeri     QDict *encrypt_qdict;
653*42e4ac9eSOr Ozeri     Visitor *v;
654*42e4ac9eSOr Ozeri     int ret = 0;
655*42e4ac9eSOr Ozeri 
656*42e4ac9eSOr Ozeri     opts_qdict = qemu_opts_to_qdict(opts, NULL);
657*42e4ac9eSOr Ozeri     qdict_extract_subqdict(opts_qdict, &encrypt_qdict, "encrypt.");
658*42e4ac9eSOr Ozeri     qobject_unref(opts_qdict);
659*42e4ac9eSOr Ozeri     if (!qdict_size(encrypt_qdict)) {
660*42e4ac9eSOr Ozeri         *spec = NULL;
661*42e4ac9eSOr Ozeri         goto exit;
662*42e4ac9eSOr Ozeri     }
663*42e4ac9eSOr Ozeri 
664*42e4ac9eSOr Ozeri     /* Convert options into a QAPI object */
665*42e4ac9eSOr Ozeri     v = qobject_input_visitor_new_flat_confused(encrypt_qdict, errp);
666*42e4ac9eSOr Ozeri     if (!v) {
667*42e4ac9eSOr Ozeri         ret = -EINVAL;
668*42e4ac9eSOr Ozeri         goto exit;
669*42e4ac9eSOr Ozeri     }
670*42e4ac9eSOr Ozeri 
671*42e4ac9eSOr Ozeri     visit_type_RbdEncryptionCreateOptions(v, NULL, spec, errp);
672*42e4ac9eSOr Ozeri     visit_free(v);
673*42e4ac9eSOr Ozeri     if (!*spec) {
674*42e4ac9eSOr Ozeri         ret = -EINVAL;
675*42e4ac9eSOr Ozeri         goto exit;
676*42e4ac9eSOr Ozeri     }
677*42e4ac9eSOr Ozeri 
678*42e4ac9eSOr Ozeri exit:
679*42e4ac9eSOr Ozeri     qobject_unref(encrypt_qdict);
680*42e4ac9eSOr Ozeri     return ret;
681*42e4ac9eSOr Ozeri }
682*42e4ac9eSOr Ozeri 
683b92902dfSMaxim Levitsky static int coroutine_fn qemu_rbd_co_create_opts(BlockDriver *drv,
684b92902dfSMaxim Levitsky                                                 const char *filename,
685efc75e2aSStefan Hajnoczi                                                 QemuOpts *opts,
686efc75e2aSStefan Hajnoczi                                                 Error **errp)
687f27aaf4bSChristian Brunner {
6881bebea37SKevin Wolf     BlockdevCreateOptions *create_options;
6891bebea37SKevin Wolf     BlockdevCreateOptionsRbd *rbd_opts;
6901bebea37SKevin Wolf     BlockdevOptionsRbd *loc;
691*42e4ac9eSOr Ozeri     RbdEncryptionCreateOptions *encrypt = NULL;
692d61563b2SMarkus Armbruster     Error *local_err = NULL;
6931bebea37SKevin Wolf     const char *keypairs, *password_secret;
694c7cacb3eSJeff Cody     QDict *options = NULL;
695c7cacb3eSJeff Cody     int ret = 0;
696f27aaf4bSChristian Brunner 
6971bebea37SKevin Wolf     create_options = g_new0(BlockdevCreateOptions, 1);
6981bebea37SKevin Wolf     create_options->driver = BLOCKDEV_DRIVER_RBD;
6991bebea37SKevin Wolf     rbd_opts = &create_options->u.rbd;
7001bebea37SKevin Wolf 
7011bebea37SKevin Wolf     rbd_opts->location = g_new0(BlockdevOptionsRbd, 1);
7021bebea37SKevin Wolf 
7031bebea37SKevin Wolf     password_secret = qemu_opt_get(opts, "password-secret");
70460390a21SDaniel P. Berrange 
705f27aaf4bSChristian Brunner     /* Read out options */
7061bebea37SKevin Wolf     rbd_opts->size = ROUND_UP(qemu_opt_get_size_del(opts, BLOCK_OPT_SIZE, 0),
707c2eb918eSHu Tao                               BDRV_SECTOR_SIZE);
7081bebea37SKevin Wolf     rbd_opts->cluster_size = qemu_opt_get_size_del(opts,
7091bebea37SKevin Wolf                                                    BLOCK_OPT_CLUSTER_SIZE, 0);
7101bebea37SKevin Wolf     rbd_opts->has_cluster_size = (rbd_opts->cluster_size != 0);
711f27aaf4bSChristian Brunner 
712c7cacb3eSJeff Cody     options = qdict_new();
713c7cacb3eSJeff Cody     qemu_rbd_parse_filename(filename, options, &local_err);
714c7cacb3eSJeff Cody     if (local_err) {
715c7cacb3eSJeff Cody         ret = -EINVAL;
716c7cacb3eSJeff Cody         error_propagate(errp, local_err);
717c7cacb3eSJeff Cody         goto exit;
718c7cacb3eSJeff Cody     }
719c7cacb3eSJeff Cody 
720*42e4ac9eSOr Ozeri     ret = qemu_rbd_extract_encryption_create_options(opts, &encrypt, errp);
721*42e4ac9eSOr Ozeri     if (ret < 0) {
722*42e4ac9eSOr Ozeri         goto exit;
723*42e4ac9eSOr Ozeri     }
724*42e4ac9eSOr Ozeri     rbd_opts->encrypt     = encrypt;
725*42e4ac9eSOr Ozeri     rbd_opts->has_encrypt = !!encrypt;
726*42e4ac9eSOr Ozeri 
727129c7d1cSMarkus Armbruster     /*
728129c7d1cSMarkus Armbruster      * Caution: while qdict_get_try_str() is fine, getting non-string
729129c7d1cSMarkus Armbruster      * types would require more care.  When @options come from -blockdev
730129c7d1cSMarkus Armbruster      * or blockdev_add, its members are typed according to the QAPI
731129c7d1cSMarkus Armbruster      * schema, but when they come from -drive, they're all QString.
732129c7d1cSMarkus Armbruster      */
7331bebea37SKevin Wolf     loc = rbd_opts->location;
7341bebea37SKevin Wolf     loc->pool        = g_strdup(qdict_get_try_str(options, "pool"));
7351bebea37SKevin Wolf     loc->conf        = g_strdup(qdict_get_try_str(options, "conf"));
7361bebea37SKevin Wolf     loc->has_conf    = !!loc->conf;
7371bebea37SKevin Wolf     loc->user        = g_strdup(qdict_get_try_str(options, "user"));
7381bebea37SKevin Wolf     loc->has_user    = !!loc->user;
73919ae9ae0SFlorian Florensa     loc->q_namespace = g_strdup(qdict_get_try_str(options, "namespace"));
740b084b420SStefano Garzarella     loc->has_q_namespace = !!loc->q_namespace;
7411bebea37SKevin Wolf     loc->image       = g_strdup(qdict_get_try_str(options, "image"));
74207846397SMarkus Armbruster     keypairs         = qdict_get_try_str(options, "=keyvalue-pairs");
743c7cacb3eSJeff Cody 
7441bebea37SKevin Wolf     ret = qemu_rbd_do_create(create_options, keypairs, password_secret, errp);
74587cd3d20SVikhyat Umrao     if (ret < 0) {
746c7cacb3eSJeff Cody         goto exit;
747f27aaf4bSChristian Brunner     }
748f27aaf4bSChristian Brunner 
749c7cacb3eSJeff Cody exit:
750cb3e7f08SMarc-André Lureau     qobject_unref(options);
7511bebea37SKevin Wolf     qapi_free_BlockdevCreateOptions(create_options);
752f27aaf4bSChristian Brunner     return ret;
753f27aaf4bSChristian Brunner }
754f27aaf4bSChristian Brunner 
755f27aaf4bSChristian Brunner /*
756e04fb07fSStefan Hajnoczi  * This aio completion is being called from rbd_finish_bh() and runs in qemu
757e04fb07fSStefan Hajnoczi  * BH context.
758f27aaf4bSChristian Brunner  */
759ad32e9c0SJosh Durgin static void qemu_rbd_complete_aio(RADOSCB *rcb)
760f27aaf4bSChristian Brunner {
761f27aaf4bSChristian Brunner     RBDAIOCB *acb = rcb->acb;
762f27aaf4bSChristian Brunner     int64_t r;
763f27aaf4bSChristian Brunner 
764f27aaf4bSChristian Brunner     r = rcb->ret;
765f27aaf4bSChristian Brunner 
766dc7588c1SJosh Durgin     if (acb->cmd != RBD_AIO_READ) {
767f27aaf4bSChristian Brunner         if (r < 0) {
768f27aaf4bSChristian Brunner             acb->ret = r;
769f27aaf4bSChristian Brunner             acb->error = 1;
770f27aaf4bSChristian Brunner         } else if (!acb->error) {
771ad32e9c0SJosh Durgin             acb->ret = rcb->size;
772f27aaf4bSChristian Brunner         }
773f27aaf4bSChristian Brunner     } else {
774ad32e9c0SJosh Durgin         if (r < 0) {
7751d393bdeStianqing             qemu_rbd_memset(rcb, 0);
776f27aaf4bSChristian Brunner             acb->ret = r;
777f27aaf4bSChristian Brunner             acb->error = 1;
778ad32e9c0SJosh Durgin         } else if (r < rcb->size) {
7791d393bdeStianqing             qemu_rbd_memset(rcb, r);
780f27aaf4bSChristian Brunner             if (!acb->error) {
781ad32e9c0SJosh Durgin                 acb->ret = rcb->size;
782f27aaf4bSChristian Brunner             }
783f27aaf4bSChristian Brunner         } else if (!acb->error) {
784ad32e9c0SJosh Durgin             acb->ret = r;
785f27aaf4bSChristian Brunner         }
786f27aaf4bSChristian Brunner     }
787e04fb07fSStefan Hajnoczi 
7887267c094SAnthony Liguori     g_free(rcb);
789e04fb07fSStefan Hajnoczi 
7901d393bdeStianqing     if (!LIBRBD_USE_IOVEC) {
791e04fb07fSStefan Hajnoczi         if (acb->cmd == RBD_AIO_READ) {
792e04fb07fSStefan Hajnoczi             qemu_iovec_from_buf(acb->qiov, 0, acb->bounce, acb->qiov->size);
793f27aaf4bSChristian Brunner         }
794e04fb07fSStefan Hajnoczi         qemu_vfree(acb->bounce);
7951d393bdeStianqing     }
7961d393bdeStianqing 
797e04fb07fSStefan Hajnoczi     acb->common.cb(acb->common.opaque, (acb->ret > 0 ? 0 : acb->ret));
798f27aaf4bSChristian Brunner 
7998007429aSFam Zheng     qemu_aio_unref(acb);
800f27aaf4bSChristian Brunner }
801f27aaf4bSChristian Brunner 
8024bfb2741SKevin Wolf static char *qemu_rbd_mon_host(BlockdevOptionsRbd *opts, Error **errp)
8030a55679bSJeff Cody {
8044bfb2741SKevin Wolf     const char **vals;
8052836284dSMarkus Armbruster     const char *host, *port;
8062836284dSMarkus Armbruster     char *rados_str;
8074bfb2741SKevin Wolf     InetSocketAddressBaseList *p;
8084bfb2741SKevin Wolf     int i, cnt;
8090a55679bSJeff Cody 
8104bfb2741SKevin Wolf     if (!opts->has_server) {
8114bfb2741SKevin Wolf         return NULL;
8120a55679bSJeff Cody     }
8134bfb2741SKevin Wolf 
8144bfb2741SKevin Wolf     for (cnt = 0, p = opts->server; p; p = p->next) {
8154bfb2741SKevin Wolf         cnt++;
8160a55679bSJeff Cody     }
8170a55679bSJeff Cody 
8184bfb2741SKevin Wolf     vals = g_new(const char *, cnt + 1);
8194bfb2741SKevin Wolf 
8204bfb2741SKevin Wolf     for (i = 0, p = opts->server; p; p = p->next, i++) {
8214bfb2741SKevin Wolf         host = p->value->host;
8224bfb2741SKevin Wolf         port = p->value->port;
8234bfb2741SKevin Wolf 
8240a55679bSJeff Cody         if (strchr(host, ':')) {
8254bfb2741SKevin Wolf             vals[i] = g_strdup_printf("[%s]:%s", host, port);
8260a55679bSJeff Cody         } else {
8274bfb2741SKevin Wolf             vals[i] = g_strdup_printf("%s:%s", host, port);
8280a55679bSJeff Cody         }
8290a55679bSJeff Cody     }
8302836284dSMarkus Armbruster     vals[i] = NULL;
8310a55679bSJeff Cody 
8322836284dSMarkus Armbruster     rados_str = i ? g_strjoinv(";", (char **)vals) : NULL;
8332836284dSMarkus Armbruster     g_strfreev((char **)vals);
8340a55679bSJeff Cody     return rados_str;
8350a55679bSJeff Cody }
8360a55679bSJeff Cody 
8373d9136f9SKevin Wolf static int qemu_rbd_connect(rados_t *cluster, rados_ioctx_t *io_ctx,
8384bfb2741SKevin Wolf                             BlockdevOptionsRbd *opts, bool cache,
8394ff45049SKevin Wolf                             const char *keypairs, const char *secretid,
8404ff45049SKevin Wolf                             Error **errp)
841f27aaf4bSChristian Brunner {
8420a55679bSJeff Cody     char *mon_host = NULL;
8433d9136f9SKevin Wolf     Error *local_err = NULL;
844f27aaf4bSChristian Brunner     int r;
845f27aaf4bSChristian Brunner 
846d083f954SMarkus Armbruster     if (secretid) {
847d083f954SMarkus Armbruster         if (opts->key_secret) {
848d083f954SMarkus Armbruster             error_setg(errp,
849d083f954SMarkus Armbruster                        "Legacy 'password-secret' clashes with 'key-secret'");
850d083f954SMarkus Armbruster             return -EINVAL;
851d083f954SMarkus Armbruster         }
852d083f954SMarkus Armbruster         opts->key_secret = g_strdup(secretid);
853d083f954SMarkus Armbruster         opts->has_key_secret = true;
854d083f954SMarkus Armbruster     }
855d083f954SMarkus Armbruster 
8564bfb2741SKevin Wolf     mon_host = qemu_rbd_mon_host(opts, &local_err);
85784d18f06SMarkus Armbruster     if (local_err) {
858d61563b2SMarkus Armbruster         error_propagate(errp, local_err);
8592836284dSMarkus Armbruster         r = -EINVAL;
860c1c1f6cfSStefano Garzarella         goto out;
861a9ccedc3SKevin Wolf     }
862a9ccedc3SKevin Wolf 
8634bfb2741SKevin Wolf     r = rados_create(cluster, opts->user);
864ad32e9c0SJosh Durgin     if (r < 0) {
86587cd3d20SVikhyat Umrao         error_setg_errno(errp, -r, "error initializing");
866c1c1f6cfSStefano Garzarella         goto out;
867f27aaf4bSChristian Brunner     }
868f27aaf4bSChristian Brunner 
869c7cacb3eSJeff Cody     /* try default location when conf=NULL, but ignore failure */
8704bfb2741SKevin Wolf     r = rados_conf_read_file(*cluster, opts->conf);
8714bfb2741SKevin Wolf     if (opts->has_conf && r < 0) {
8724bfb2741SKevin Wolf         error_setg_errno(errp, -r, "error reading conf file %s", opts->conf);
873e34d8f29SJosh Durgin         goto failed_shutdown;
874e34d8f29SJosh Durgin     }
87599a3c89dSJosh Durgin 
8763d9136f9SKevin Wolf     r = qemu_rbd_set_keypairs(*cluster, keypairs, errp);
87799a3c89dSJosh Durgin     if (r < 0) {
87899a3c89dSJosh Durgin         goto failed_shutdown;
87999a3c89dSJosh Durgin     }
88099a3c89dSJosh Durgin 
8810a55679bSJeff Cody     if (mon_host) {
8823d9136f9SKevin Wolf         r = rados_conf_set(*cluster, "mon_host", mon_host);
8830a55679bSJeff Cody         if (r < 0) {
8840a55679bSJeff Cody             goto failed_shutdown;
8850a55679bSJeff Cody         }
8860a55679bSJeff Cody     }
8870a55679bSJeff Cody 
888d083f954SMarkus Armbruster     r = qemu_rbd_set_auth(*cluster, opts, errp);
889d083f954SMarkus Armbruster     if (r < 0) {
89060390a21SDaniel P. Berrange         goto failed_shutdown;
89160390a21SDaniel P. Berrange     }
89260390a21SDaniel P. Berrange 
893b11f38fcSJosh Durgin     /*
894b11f38fcSJosh Durgin      * Fallback to more conservative semantics if setting cache
895b11f38fcSJosh Durgin      * options fails. Ignore errors from setting rbd_cache because the
896b11f38fcSJosh Durgin      * only possible error is that the option does not exist, and
897b11f38fcSJosh Durgin      * librbd defaults to no caching. If write through caching cannot
898b11f38fcSJosh Durgin      * be set up, fall back to no caching.
899b11f38fcSJosh Durgin      */
9003d9136f9SKevin Wolf     if (cache) {
9013d9136f9SKevin Wolf         rados_conf_set(*cluster, "rbd_cache", "true");
902b11f38fcSJosh Durgin     } else {
9033d9136f9SKevin Wolf         rados_conf_set(*cluster, "rbd_cache", "false");
904b11f38fcSJosh Durgin     }
905b11f38fcSJosh Durgin 
9063d9136f9SKevin Wolf     r = rados_connect(*cluster);
907ad32e9c0SJosh Durgin     if (r < 0) {
90887cd3d20SVikhyat Umrao         error_setg_errno(errp, -r, "error connecting");
909eb93d5d9SSage Weil         goto failed_shutdown;
910ad32e9c0SJosh Durgin     }
911ad32e9c0SJosh Durgin 
9124bfb2741SKevin Wolf     r = rados_ioctx_create(*cluster, opts->pool, io_ctx);
913ad32e9c0SJosh Durgin     if (r < 0) {
9144bfb2741SKevin Wolf         error_setg_errno(errp, -r, "error opening pool %s", opts->pool);
915eb93d5d9SSage Weil         goto failed_shutdown;
916ad32e9c0SJosh Durgin     }
91719ae9ae0SFlorian Florensa     /*
91819ae9ae0SFlorian Florensa      * Set the namespace after opening the io context on the pool,
91919ae9ae0SFlorian Florensa      * if nspace == NULL or if nspace == "", it is just as we did nothing
92019ae9ae0SFlorian Florensa      */
92119ae9ae0SFlorian Florensa     rados_ioctx_set_namespace(*io_ctx, opts->q_namespace);
922ad32e9c0SJosh Durgin 
923c1c1f6cfSStefano Garzarella     r = 0;
924c1c1f6cfSStefano Garzarella     goto out;
9253d9136f9SKevin Wolf 
9263d9136f9SKevin Wolf failed_shutdown:
9273d9136f9SKevin Wolf     rados_shutdown(*cluster);
928c1c1f6cfSStefano Garzarella out:
9293d9136f9SKevin Wolf     g_free(mon_host);
9303d9136f9SKevin Wolf     return r;
9313d9136f9SKevin Wolf }
9323d9136f9SKevin Wolf 
933f24b03b5SJeff Cody static int qemu_rbd_convert_options(QDict *options, BlockdevOptionsRbd **opts,
934f24b03b5SJeff Cody                                     Error **errp)
935f24b03b5SJeff Cody {
936f24b03b5SJeff Cody     Visitor *v;
937f24b03b5SJeff Cody 
938f24b03b5SJeff Cody     /* Convert the remaining options into a QAPI object */
939f24b03b5SJeff Cody     v = qobject_input_visitor_new_flat_confused(options, errp);
940f24b03b5SJeff Cody     if (!v) {
941f24b03b5SJeff Cody         return -EINVAL;
942f24b03b5SJeff Cody     }
943f24b03b5SJeff Cody 
944b11a093cSMarkus Armbruster     visit_type_BlockdevOptionsRbd(v, NULL, opts, errp);
945f24b03b5SJeff Cody     visit_free(v);
946b11a093cSMarkus Armbruster     if (!opts) {
947f24b03b5SJeff Cody         return -EINVAL;
948f24b03b5SJeff Cody     }
949f24b03b5SJeff Cody 
950f24b03b5SJeff Cody     return 0;
951f24b03b5SJeff Cody }
952f24b03b5SJeff Cody 
953084d1d13SJeff Cody static int qemu_rbd_attempt_legacy_options(QDict *options,
954084d1d13SJeff Cody                                            BlockdevOptionsRbd **opts,
955084d1d13SJeff Cody                                            char **keypairs)
956084d1d13SJeff Cody {
957084d1d13SJeff Cody     char *filename;
958084d1d13SJeff Cody     int r;
959084d1d13SJeff Cody 
960084d1d13SJeff Cody     filename = g_strdup(qdict_get_try_str(options, "filename"));
961084d1d13SJeff Cody     if (!filename) {
962084d1d13SJeff Cody         return -EINVAL;
963084d1d13SJeff Cody     }
964084d1d13SJeff Cody     qdict_del(options, "filename");
965084d1d13SJeff Cody 
966084d1d13SJeff Cody     qemu_rbd_parse_filename(filename, options, NULL);
967084d1d13SJeff Cody 
968084d1d13SJeff Cody     /* keypairs freed by caller */
969084d1d13SJeff Cody     *keypairs = g_strdup(qdict_get_try_str(options, "=keyvalue-pairs"));
970084d1d13SJeff Cody     if (*keypairs) {
971084d1d13SJeff Cody         qdict_del(options, "=keyvalue-pairs");
972084d1d13SJeff Cody     }
973084d1d13SJeff Cody 
974084d1d13SJeff Cody     r = qemu_rbd_convert_options(options, opts, NULL);
975084d1d13SJeff Cody 
976084d1d13SJeff Cody     g_free(filename);
977084d1d13SJeff Cody     return r;
978084d1d13SJeff Cody }
979084d1d13SJeff Cody 
9803d9136f9SKevin Wolf static int qemu_rbd_open(BlockDriverState *bs, QDict *options, int flags,
9813d9136f9SKevin Wolf                          Error **errp)
9823d9136f9SKevin Wolf {
9833d9136f9SKevin Wolf     BDRVRBDState *s = bs->opaque;
9844bfb2741SKevin Wolf     BlockdevOptionsRbd *opts = NULL;
985bfb15b4bSJeff Cody     const QDictEntry *e;
9863d9136f9SKevin Wolf     Error *local_err = NULL;
9874ff45049SKevin Wolf     char *keypairs, *secretid;
9883d9136f9SKevin Wolf     int r;
9893d9136f9SKevin Wolf 
9904ff45049SKevin Wolf     keypairs = g_strdup(qdict_get_try_str(options, "=keyvalue-pairs"));
9914ff45049SKevin Wolf     if (keypairs) {
9924ff45049SKevin Wolf         qdict_del(options, "=keyvalue-pairs");
9934ff45049SKevin Wolf     }
9944ff45049SKevin Wolf 
9954ff45049SKevin Wolf     secretid = g_strdup(qdict_get_try_str(options, "password-secret"));
9964ff45049SKevin Wolf     if (secretid) {
9974ff45049SKevin Wolf         qdict_del(options, "password-secret");
9984ff45049SKevin Wolf     }
9994ff45049SKevin Wolf 
1000f24b03b5SJeff Cody     r = qemu_rbd_convert_options(options, &opts, &local_err);
10014bfb2741SKevin Wolf     if (local_err) {
1002084d1d13SJeff Cody         /* If keypairs are present, that means some options are present in
1003084d1d13SJeff Cody          * the modern option format.  Don't attempt to parse legacy option
1004084d1d13SJeff Cody          * formats, as we won't support mixed usage. */
1005084d1d13SJeff Cody         if (keypairs) {
10064bfb2741SKevin Wolf             error_propagate(errp, local_err);
10074bfb2741SKevin Wolf             goto out;
10084bfb2741SKevin Wolf         }
10094bfb2741SKevin Wolf 
1010084d1d13SJeff Cody         /* If the initial attempt to convert and process the options failed,
1011084d1d13SJeff Cody          * we may be attempting to open an image file that has the rbd options
1012084d1d13SJeff Cody          * specified in the older format consisting of all key/value pairs
1013084d1d13SJeff Cody          * encoded in the filename.  Go ahead and attempt to parse the
1014084d1d13SJeff Cody          * filename, and see if we can pull out the required options. */
1015084d1d13SJeff Cody         r = qemu_rbd_attempt_legacy_options(options, &opts, &keypairs);
1016084d1d13SJeff Cody         if (r < 0) {
1017084d1d13SJeff Cody             /* Propagate the original error, not the legacy parsing fallback
1018084d1d13SJeff Cody              * error, as the latter was just a best-effort attempt. */
1019084d1d13SJeff Cody             error_propagate(errp, local_err);
1020084d1d13SJeff Cody             goto out;
1021084d1d13SJeff Cody         }
1022084d1d13SJeff Cody         /* Take care whenever deciding to actually deprecate; once this ability
1023084d1d13SJeff Cody          * is removed, we will not be able to open any images with legacy-styled
1024084d1d13SJeff Cody          * backing image strings. */
10255197f445SMarkus Armbruster         warn_report("RBD options encoded in the filename as keyvalue pairs "
1026084d1d13SJeff Cody                     "is deprecated");
1027084d1d13SJeff Cody     }
1028084d1d13SJeff Cody 
1029bfb15b4bSJeff Cody     /* Remove the processed options from the QDict (the visitor processes
1030bfb15b4bSJeff Cody      * _all_ options in the QDict) */
1031bfb15b4bSJeff Cody     while ((e = qdict_first(options))) {
1032bfb15b4bSJeff Cody         qdict_del(options, e->key);
1033bfb15b4bSJeff Cody     }
1034bfb15b4bSJeff Cody 
1035d41a5588SKevin Wolf     r = qemu_rbd_connect(&s->cluster, &s->io_ctx, opts,
1036d41a5588SKevin Wolf                          !(flags & BDRV_O_NOCACHE), keypairs, secretid, errp);
10373d9136f9SKevin Wolf     if (r < 0) {
10384ff45049SKevin Wolf         goto out;
10393d9136f9SKevin Wolf     }
10403d9136f9SKevin Wolf 
1041d41a5588SKevin Wolf     s->snap = g_strdup(opts->snapshot);
1042d41a5588SKevin Wolf     s->image_name = g_strdup(opts->image);
1043d41a5588SKevin Wolf 
1044e2b8247aSJeff Cody     /* rbd_open is always r/w */
104580b61a27SJeff Cody     r = rbd_open(s->io_ctx, s->image_name, &s->image, s->snap);
1046ad32e9c0SJosh Durgin     if (r < 0) {
104780b61a27SJeff Cody         error_setg_errno(errp, -r, "error reading header from %s",
104880b61a27SJeff Cody                          s->image_name);
1049eb93d5d9SSage Weil         goto failed_open;
1050ad32e9c0SJosh Durgin     }
1051ad32e9c0SJosh Durgin 
1052*42e4ac9eSOr Ozeri     if (opts->has_encrypt) {
1053*42e4ac9eSOr Ozeri #ifdef LIBRBD_SUPPORTS_ENCRYPTION
1054*42e4ac9eSOr Ozeri         r = qemu_rbd_encryption_load(s->image, opts->encrypt, errp);
1055*42e4ac9eSOr Ozeri         if (r < 0) {
1056*42e4ac9eSOr Ozeri             goto failed_post_open;
1057*42e4ac9eSOr Ozeri         }
1058*42e4ac9eSOr Ozeri #else
1059*42e4ac9eSOr Ozeri         r = -ENOTSUP;
1060*42e4ac9eSOr Ozeri         error_setg(errp, "RBD library does not support image encryption");
1061*42e4ac9eSOr Ozeri         goto failed_post_open;
1062*42e4ac9eSOr Ozeri #endif
1063*42e4ac9eSOr Ozeri     }
1064*42e4ac9eSOr Ozeri 
1065d24f8023SStefano Garzarella     r = rbd_get_size(s->image, &s->image_size);
1066d24f8023SStefano Garzarella     if (r < 0) {
1067d24f8023SStefano Garzarella         error_setg_errno(errp, -r, "error getting image size from %s",
1068d24f8023SStefano Garzarella                          s->image_name);
1069*42e4ac9eSOr Ozeri         goto failed_post_open;
1070d24f8023SStefano Garzarella     }
1071d24f8023SStefano Garzarella 
1072e2b8247aSJeff Cody     /* If we are using an rbd snapshot, we must be r/o, otherwise
1073e2b8247aSJeff Cody      * leave as-is */
1074e2b8247aSJeff Cody     if (s->snap != NULL) {
1075eaa2410fSKevin Wolf         r = bdrv_apply_auto_read_only(bs, "rbd snapshots are read-only", errp);
1076e2b8247aSJeff Cody         if (r < 0) {
1077*42e4ac9eSOr Ozeri             goto failed_post_open;
1078e2b8247aSJeff Cody         }
1079e2b8247aSJeff Cody     }
1080f27aaf4bSChristian Brunner 
10812f98910dSEric Blake     /* When extending regular files, we get zeros from the OS */
10822f98910dSEric Blake     bs->supported_truncate_flags = BDRV_REQ_ZERO_WRITE;
10832f98910dSEric Blake 
10844ff45049SKevin Wolf     r = 0;
10854ff45049SKevin Wolf     goto out;
1086f27aaf4bSChristian Brunner 
1087*42e4ac9eSOr Ozeri failed_post_open:
1088*42e4ac9eSOr Ozeri     rbd_close(s->image);
1089eb93d5d9SSage Weil failed_open:
1090ad32e9c0SJosh Durgin     rados_ioctx_destroy(s->io_ctx);
1091eb93d5d9SSage Weil     g_free(s->snap);
109280b61a27SJeff Cody     g_free(s->image_name);
10933d9136f9SKevin Wolf     rados_shutdown(s->cluster);
10944ff45049SKevin Wolf out:
10954bfb2741SKevin Wolf     qapi_free_BlockdevOptionsRbd(opts);
10964ff45049SKevin Wolf     g_free(keypairs);
10974ff45049SKevin Wolf     g_free(secretid);
1098f27aaf4bSChristian Brunner     return r;
1099f27aaf4bSChristian Brunner }
1100f27aaf4bSChristian Brunner 
110156e7cf8dSJeff Cody 
110256e7cf8dSJeff Cody /* Since RBD is currently always opened R/W via the API,
110356e7cf8dSJeff Cody  * we just need to check if we are using a snapshot or not, in
110456e7cf8dSJeff Cody  * order to determine if we will allow it to be R/W */
110556e7cf8dSJeff Cody static int qemu_rbd_reopen_prepare(BDRVReopenState *state,
110656e7cf8dSJeff Cody                                    BlockReopenQueue *queue, Error **errp)
110756e7cf8dSJeff Cody {
110856e7cf8dSJeff Cody     BDRVRBDState *s = state->bs->opaque;
110956e7cf8dSJeff Cody     int ret = 0;
111056e7cf8dSJeff Cody 
111156e7cf8dSJeff Cody     if (s->snap && state->flags & BDRV_O_RDWR) {
111256e7cf8dSJeff Cody         error_setg(errp,
111356e7cf8dSJeff Cody                    "Cannot change node '%s' to r/w when using RBD snapshot",
111456e7cf8dSJeff Cody                    bdrv_get_device_or_node_name(state->bs));
111556e7cf8dSJeff Cody         ret = -EINVAL;
111656e7cf8dSJeff Cody     }
111756e7cf8dSJeff Cody 
111856e7cf8dSJeff Cody     return ret;
111956e7cf8dSJeff Cody }
112056e7cf8dSJeff Cody 
1121ad32e9c0SJosh Durgin static void qemu_rbd_close(BlockDriverState *bs)
1122f27aaf4bSChristian Brunner {
1123f27aaf4bSChristian Brunner     BDRVRBDState *s = bs->opaque;
1124f27aaf4bSChristian Brunner 
1125ad32e9c0SJosh Durgin     rbd_close(s->image);
1126ad32e9c0SJosh Durgin     rados_ioctx_destroy(s->io_ctx);
11277267c094SAnthony Liguori     g_free(s->snap);
112880b61a27SJeff Cody     g_free(s->image_name);
1129ad32e9c0SJosh Durgin     rados_shutdown(s->cluster);
1130f27aaf4bSChristian Brunner }
1131f27aaf4bSChristian Brunner 
1132d24f8023SStefano Garzarella /* Resize the RBD image and update the 'image_size' with the current size */
1133d24f8023SStefano Garzarella static int qemu_rbd_resize(BlockDriverState *bs, uint64_t size)
1134d24f8023SStefano Garzarella {
1135d24f8023SStefano Garzarella     BDRVRBDState *s = bs->opaque;
1136d24f8023SStefano Garzarella     int r;
1137d24f8023SStefano Garzarella 
1138d24f8023SStefano Garzarella     r = rbd_resize(s->image, size);
1139d24f8023SStefano Garzarella     if (r < 0) {
1140d24f8023SStefano Garzarella         return r;
1141d24f8023SStefano Garzarella     }
1142d24f8023SStefano Garzarella 
1143d24f8023SStefano Garzarella     s->image_size = size;
1144d24f8023SStefano Garzarella 
1145d24f8023SStefano Garzarella     return 0;
1146d24f8023SStefano Garzarella }
1147d24f8023SStefano Garzarella 
1148d7331bedSStefan Hajnoczi static const AIOCBInfo rbd_aiocb_info = {
1149f27aaf4bSChristian Brunner     .aiocb_size = sizeof(RBDAIOCB),
1150f27aaf4bSChristian Brunner };
1151f27aaf4bSChristian Brunner 
1152e04fb07fSStefan Hajnoczi static void rbd_finish_bh(void *opaque)
1153f27aaf4bSChristian Brunner {
1154e04fb07fSStefan Hajnoczi     RADOSCB *rcb = opaque;
1155e04fb07fSStefan Hajnoczi     qemu_rbd_complete_aio(rcb);
1156ad32e9c0SJosh Durgin }
1157ad32e9c0SJosh Durgin 
1158ad32e9c0SJosh Durgin /*
1159ad32e9c0SJosh Durgin  * This is the callback function for rbd_aio_read and _write
1160ad32e9c0SJosh Durgin  *
1161ad32e9c0SJosh Durgin  * Note: this function is being called from a non qemu thread so
1162ad32e9c0SJosh Durgin  * we need to be careful about what we do here. Generally we only
1163e04fb07fSStefan Hajnoczi  * schedule a BH, and do the rest of the io completion handling
1164e04fb07fSStefan Hajnoczi  * from rbd_finish_bh() which runs in a qemu context.
1165ad32e9c0SJosh Durgin  */
1166ad32e9c0SJosh Durgin static void rbd_finish_aiocb(rbd_completion_t c, RADOSCB *rcb)
1167ad32e9c0SJosh Durgin {
1168e04fb07fSStefan Hajnoczi     RBDAIOCB *acb = rcb->acb;
1169e04fb07fSStefan Hajnoczi 
1170ad32e9c0SJosh Durgin     rcb->ret = rbd_aio_get_return_value(c);
1171ad32e9c0SJosh Durgin     rbd_aio_release(c);
1172f27aaf4bSChristian Brunner 
1173e4ec5ad4SPavel Dovgalyuk     replay_bh_schedule_oneshot_event(bdrv_get_aio_context(acb->common.bs),
1174ea800191SStefan Hajnoczi                                      rbd_finish_bh, rcb);
1175473c7f02SStefan Priebe }
1176f27aaf4bSChristian Brunner 
1177787f3133SJosh Durgin static int rbd_aio_discard_wrapper(rbd_image_t image,
1178787f3133SJosh Durgin                                    uint64_t off,
1179787f3133SJosh Durgin                                    uint64_t len,
1180787f3133SJosh Durgin                                    rbd_completion_t comp)
1181787f3133SJosh Durgin {
1182787f3133SJosh Durgin #ifdef LIBRBD_SUPPORTS_DISCARD
1183787f3133SJosh Durgin     return rbd_aio_discard(image, off, len, comp);
1184787f3133SJosh Durgin #else
1185787f3133SJosh Durgin     return -ENOTSUP;
1186787f3133SJosh Durgin #endif
1187787f3133SJosh Durgin }
1188787f3133SJosh Durgin 
1189dc7588c1SJosh Durgin static int rbd_aio_flush_wrapper(rbd_image_t image,
1190dc7588c1SJosh Durgin                                  rbd_completion_t comp)
1191dc7588c1SJosh Durgin {
1192dc7588c1SJosh Durgin #ifdef LIBRBD_SUPPORTS_AIO_FLUSH
1193dc7588c1SJosh Durgin     return rbd_aio_flush(image, comp);
1194dc7588c1SJosh Durgin #else
1195dc7588c1SJosh Durgin     return -ENOTSUP;
1196dc7588c1SJosh Durgin #endif
1197dc7588c1SJosh Durgin }
1198dc7588c1SJosh Durgin 
11997c84b1b8SMarkus Armbruster static BlockAIOCB *rbd_start_aio(BlockDriverState *bs,
12007bbca9e2SEric Blake                                  int64_t off,
1201f27aaf4bSChristian Brunner                                  QEMUIOVector *qiov,
12027bbca9e2SEric Blake                                  int64_t size,
1203097310b5SMarkus Armbruster                                  BlockCompletionFunc *cb,
1204787f3133SJosh Durgin                                  void *opaque,
1205787f3133SJosh Durgin                                  RBDAIOCmd cmd)
1206f27aaf4bSChristian Brunner {
1207f27aaf4bSChristian Brunner     RBDAIOCB *acb;
12080f7a0237SKevin Wolf     RADOSCB *rcb = NULL;
1209ad32e9c0SJosh Durgin     rbd_completion_t c;
121051a13528SJosh Durgin     int r;
1211f27aaf4bSChristian Brunner 
1212f27aaf4bSChristian Brunner     BDRVRBDState *s = bs->opaque;
1213f27aaf4bSChristian Brunner 
1214d7331bedSStefan Hajnoczi     acb = qemu_aio_get(&rbd_aiocb_info, bs, cb, opaque);
1215787f3133SJosh Durgin     acb->cmd = cmd;
1216f27aaf4bSChristian Brunner     acb->qiov = qiov;
12177bbca9e2SEric Blake     assert(!qiov || qiov->size == size);
12181d393bdeStianqing 
12191d393bdeStianqing     rcb = g_new(RADOSCB, 1);
12201d393bdeStianqing 
12211d393bdeStianqing     if (!LIBRBD_USE_IOVEC) {
1222dc7588c1SJosh Durgin         if (cmd == RBD_AIO_DISCARD || cmd == RBD_AIO_FLUSH) {
1223787f3133SJosh Durgin             acb->bounce = NULL;
1224787f3133SJosh Durgin         } else {
12250f7a0237SKevin Wolf             acb->bounce = qemu_try_blockalign(bs, qiov->size);
12260f7a0237SKevin Wolf             if (acb->bounce == NULL) {
12270f7a0237SKevin Wolf                 goto failed;
12280f7a0237SKevin Wolf             }
1229787f3133SJosh Durgin         }
12301d393bdeStianqing         if (cmd == RBD_AIO_WRITE) {
12311d393bdeStianqing             qemu_iovec_to_buf(acb->qiov, 0, acb->bounce, qiov->size);
12321d393bdeStianqing         }
12331d393bdeStianqing         rcb->buf = acb->bounce;
12341d393bdeStianqing     }
12351d393bdeStianqing 
1236f27aaf4bSChristian Brunner     acb->ret = 0;
1237f27aaf4bSChristian Brunner     acb->error = 0;
1238f27aaf4bSChristian Brunner     acb->s = s;
1239f27aaf4bSChristian Brunner 
1240f27aaf4bSChristian Brunner     rcb->acb = acb;
1241f27aaf4bSChristian Brunner     rcb->s = acb->s;
1242ad32e9c0SJosh Durgin     rcb->size = size;
124351a13528SJosh Durgin     r = rbd_aio_create_completion(rcb, (rbd_callback_t) rbd_finish_aiocb, &c);
124451a13528SJosh Durgin     if (r < 0) {
124551a13528SJosh Durgin         goto failed;
124651a13528SJosh Durgin     }
1247f27aaf4bSChristian Brunner 
1248787f3133SJosh Durgin     switch (cmd) {
1249d24f8023SStefano Garzarella     case RBD_AIO_WRITE: {
1250d24f8023SStefano Garzarella         /*
1251d24f8023SStefano Garzarella          * RBD APIs don't allow us to write more than actual size, so in order
1252d24f8023SStefano Garzarella          * to support growing images, we resize the image before write
1253d24f8023SStefano Garzarella          * operations that exceed the current size.
1254d24f8023SStefano Garzarella          */
1255d24f8023SStefano Garzarella         if (off + size > s->image_size) {
1256d24f8023SStefano Garzarella             r = qemu_rbd_resize(bs, off + size);
1257d24f8023SStefano Garzarella             if (r < 0) {
1258d24f8023SStefano Garzarella                 goto failed_completion;
1259d24f8023SStefano Garzarella             }
1260d24f8023SStefano Garzarella         }
12611d393bdeStianqing #ifdef LIBRBD_SUPPORTS_IOVEC
12621d393bdeStianqing             r = rbd_aio_writev(s->image, qiov->iov, qiov->niov, off, c);
12631d393bdeStianqing #else
12641d393bdeStianqing             r = rbd_aio_write(s->image, off, size, rcb->buf, c);
12651d393bdeStianqing #endif
1266787f3133SJosh Durgin         break;
1267d24f8023SStefano Garzarella     }
1268787f3133SJosh Durgin     case RBD_AIO_READ:
12691d393bdeStianqing #ifdef LIBRBD_SUPPORTS_IOVEC
12701d393bdeStianqing             r = rbd_aio_readv(s->image, qiov->iov, qiov->niov, off, c);
12711d393bdeStianqing #else
12721d393bdeStianqing             r = rbd_aio_read(s->image, off, size, rcb->buf, c);
12731d393bdeStianqing #endif
1274787f3133SJosh Durgin         break;
1275787f3133SJosh Durgin     case RBD_AIO_DISCARD:
1276787f3133SJosh Durgin         r = rbd_aio_discard_wrapper(s->image, off, size, c);
1277787f3133SJosh Durgin         break;
1278dc7588c1SJosh Durgin     case RBD_AIO_FLUSH:
1279dc7588c1SJosh Durgin         r = rbd_aio_flush_wrapper(s->image, c);
1280dc7588c1SJosh Durgin         break;
1281787f3133SJosh Durgin     default:
1282787f3133SJosh Durgin         r = -EINVAL;
128351a13528SJosh Durgin     }
128451a13528SJosh Durgin 
128551a13528SJosh Durgin     if (r < 0) {
1286405a2764SKevin Wolf         goto failed_completion;
1287f27aaf4bSChristian Brunner     }
1288f27aaf4bSChristian Brunner     return &acb->common;
128951a13528SJosh Durgin 
1290405a2764SKevin Wolf failed_completion:
1291405a2764SKevin Wolf     rbd_aio_release(c);
129251a13528SJosh Durgin failed:
12937267c094SAnthony Liguori     g_free(rcb);
12941d393bdeStianqing     if (!LIBRBD_USE_IOVEC) {
1295405a2764SKevin Wolf         qemu_vfree(acb->bounce);
12961d393bdeStianqing     }
12971d393bdeStianqing 
12988007429aSFam Zheng     qemu_aio_unref(acb);
129951a13528SJosh Durgin     return NULL;
1300f27aaf4bSChristian Brunner }
1301f27aaf4bSChristian Brunner 
1302e8e16d4bSEric Blake static BlockAIOCB *qemu_rbd_aio_preadv(BlockDriverState *bs,
1303e8e16d4bSEric Blake                                        uint64_t offset, uint64_t bytes,
1304e8e16d4bSEric Blake                                        QEMUIOVector *qiov, int flags,
1305097310b5SMarkus Armbruster                                        BlockCompletionFunc *cb,
1306f27aaf4bSChristian Brunner                                        void *opaque)
1307f27aaf4bSChristian Brunner {
1308e8e16d4bSEric Blake     return rbd_start_aio(bs, offset, qiov, bytes, cb, opaque,
1309787f3133SJosh Durgin                          RBD_AIO_READ);
1310f27aaf4bSChristian Brunner }
1311f27aaf4bSChristian Brunner 
1312e8e16d4bSEric Blake static BlockAIOCB *qemu_rbd_aio_pwritev(BlockDriverState *bs,
1313e8e16d4bSEric Blake                                         uint64_t offset, uint64_t bytes,
1314e8e16d4bSEric Blake                                         QEMUIOVector *qiov, int flags,
1315097310b5SMarkus Armbruster                                         BlockCompletionFunc *cb,
1316f27aaf4bSChristian Brunner                                         void *opaque)
1317f27aaf4bSChristian Brunner {
1318e8e16d4bSEric Blake     return rbd_start_aio(bs, offset, qiov, bytes, cb, opaque,
1319787f3133SJosh Durgin                          RBD_AIO_WRITE);
1320f27aaf4bSChristian Brunner }
1321f27aaf4bSChristian Brunner 
1322dc7588c1SJosh Durgin #ifdef LIBRBD_SUPPORTS_AIO_FLUSH
13237c84b1b8SMarkus Armbruster static BlockAIOCB *qemu_rbd_aio_flush(BlockDriverState *bs,
1324097310b5SMarkus Armbruster                                       BlockCompletionFunc *cb,
1325dc7588c1SJosh Durgin                                       void *opaque)
1326dc7588c1SJosh Durgin {
1327dc7588c1SJosh Durgin     return rbd_start_aio(bs, 0, NULL, 0, cb, opaque, RBD_AIO_FLUSH);
1328dc7588c1SJosh Durgin }
1329dc7588c1SJosh Durgin 
1330dc7588c1SJosh Durgin #else
1331dc7588c1SJosh Durgin 
13328b94ff85SPaolo Bonzini static int qemu_rbd_co_flush(BlockDriverState *bs)
13337a3f5fe9SSage Weil {
13347a3f5fe9SSage Weil #if LIBRBD_VERSION_CODE >= LIBRBD_VERSION(0, 1, 1)
13357a3f5fe9SSage Weil     /* rbd_flush added in 0.1.1 */
13367a3f5fe9SSage Weil     BDRVRBDState *s = bs->opaque;
13377a3f5fe9SSage Weil     return rbd_flush(s->image);
13387a3f5fe9SSage Weil #else
13397a3f5fe9SSage Weil     return 0;
13407a3f5fe9SSage Weil #endif
13417a3f5fe9SSage Weil }
1342dc7588c1SJosh Durgin #endif
13437a3f5fe9SSage Weil 
1344ad32e9c0SJosh Durgin static int qemu_rbd_getinfo(BlockDriverState *bs, BlockDriverInfo *bdi)
1345f27aaf4bSChristian Brunner {
1346f27aaf4bSChristian Brunner     BDRVRBDState *s = bs->opaque;
1347ad32e9c0SJosh Durgin     rbd_image_info_t info;
1348ad32e9c0SJosh Durgin     int r;
1349ad32e9c0SJosh Durgin 
1350ad32e9c0SJosh Durgin     r = rbd_stat(s->image, &info, sizeof(info));
1351ad32e9c0SJosh Durgin     if (r < 0) {
1352ad32e9c0SJosh Durgin         return r;
1353ad32e9c0SJosh Durgin     }
1354ad32e9c0SJosh Durgin 
1355ad32e9c0SJosh Durgin     bdi->cluster_size = info.obj_size;
1356f27aaf4bSChristian Brunner     return 0;
1357f27aaf4bSChristian Brunner }
1358f27aaf4bSChristian Brunner 
1359*42e4ac9eSOr Ozeri static ImageInfoSpecific *qemu_rbd_get_specific_info(BlockDriverState *bs,
1360*42e4ac9eSOr Ozeri                                                      Error **errp)
1361*42e4ac9eSOr Ozeri {
1362*42e4ac9eSOr Ozeri     BDRVRBDState *s = bs->opaque;
1363*42e4ac9eSOr Ozeri     ImageInfoSpecific *spec_info;
1364*42e4ac9eSOr Ozeri     char buf[RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = {0};
1365*42e4ac9eSOr Ozeri     int r;
1366*42e4ac9eSOr Ozeri 
1367*42e4ac9eSOr Ozeri     if (s->image_size >= RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) {
1368*42e4ac9eSOr Ozeri         r = rbd_read(s->image, 0,
1369*42e4ac9eSOr Ozeri                      RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN, buf);
1370*42e4ac9eSOr Ozeri         if (r < 0) {
1371*42e4ac9eSOr Ozeri             error_setg_errno(errp, -r, "cannot read image start for probe");
1372*42e4ac9eSOr Ozeri             return NULL;
1373*42e4ac9eSOr Ozeri         }
1374*42e4ac9eSOr Ozeri     }
1375*42e4ac9eSOr Ozeri 
1376*42e4ac9eSOr Ozeri     spec_info = g_new(ImageInfoSpecific, 1);
1377*42e4ac9eSOr Ozeri     *spec_info = (ImageInfoSpecific){
1378*42e4ac9eSOr Ozeri         .type  = IMAGE_INFO_SPECIFIC_KIND_RBD,
1379*42e4ac9eSOr Ozeri         .u.rbd.data = g_new0(ImageInfoSpecificRbd, 1),
1380*42e4ac9eSOr Ozeri     };
1381*42e4ac9eSOr Ozeri 
1382*42e4ac9eSOr Ozeri     if (memcmp(buf, rbd_luks_header_verification,
1383*42e4ac9eSOr Ozeri                RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) == 0) {
1384*42e4ac9eSOr Ozeri         spec_info->u.rbd.data->encryption_format =
1385*42e4ac9eSOr Ozeri                 RBD_IMAGE_ENCRYPTION_FORMAT_LUKS;
1386*42e4ac9eSOr Ozeri         spec_info->u.rbd.data->has_encryption_format = true;
1387*42e4ac9eSOr Ozeri     } else if (memcmp(buf, rbd_luks2_header_verification,
1388*42e4ac9eSOr Ozeri                RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) == 0) {
1389*42e4ac9eSOr Ozeri         spec_info->u.rbd.data->encryption_format =
1390*42e4ac9eSOr Ozeri                 RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2;
1391*42e4ac9eSOr Ozeri         spec_info->u.rbd.data->has_encryption_format = true;
1392*42e4ac9eSOr Ozeri     } else {
1393*42e4ac9eSOr Ozeri         spec_info->u.rbd.data->has_encryption_format = false;
1394*42e4ac9eSOr Ozeri     }
1395*42e4ac9eSOr Ozeri 
1396*42e4ac9eSOr Ozeri     return spec_info;
1397*42e4ac9eSOr Ozeri }
1398*42e4ac9eSOr Ozeri 
1399ad32e9c0SJosh Durgin static int64_t qemu_rbd_getlength(BlockDriverState *bs)
1400f27aaf4bSChristian Brunner {
1401f27aaf4bSChristian Brunner     BDRVRBDState *s = bs->opaque;
1402ad32e9c0SJosh Durgin     rbd_image_info_t info;
1403ad32e9c0SJosh Durgin     int r;
1404f27aaf4bSChristian Brunner 
1405ad32e9c0SJosh Durgin     r = rbd_stat(s->image, &info, sizeof(info));
1406ad32e9c0SJosh Durgin     if (r < 0) {
1407ad32e9c0SJosh Durgin         return r;
1408f27aaf4bSChristian Brunner     }
1409f27aaf4bSChristian Brunner 
1410ad32e9c0SJosh Durgin     return info.size;
1411ad32e9c0SJosh Durgin }
1412ad32e9c0SJosh Durgin 
1413061ca8a3SKevin Wolf static int coroutine_fn qemu_rbd_co_truncate(BlockDriverState *bs,
1414061ca8a3SKevin Wolf                                              int64_t offset,
1415c80d8b06SMax Reitz                                              bool exact,
1416061ca8a3SKevin Wolf                                              PreallocMode prealloc,
141792b92799SKevin Wolf                                              BdrvRequestFlags flags,
1418061ca8a3SKevin Wolf                                              Error **errp)
141930cdc48cSJosh Durgin {
142030cdc48cSJosh Durgin     int r;
142130cdc48cSJosh Durgin 
14228243ccb7SMax Reitz     if (prealloc != PREALLOC_MODE_OFF) {
14238243ccb7SMax Reitz         error_setg(errp, "Unsupported preallocation mode '%s'",
1424977c736fSMarkus Armbruster                    PreallocMode_str(prealloc));
14258243ccb7SMax Reitz         return -ENOTSUP;
14268243ccb7SMax Reitz     }
14278243ccb7SMax Reitz 
1428d24f8023SStefano Garzarella     r = qemu_rbd_resize(bs, offset);
142930cdc48cSJosh Durgin     if (r < 0) {
1430f59adb32SMax Reitz         error_setg_errno(errp, -r, "Failed to resize file");
143130cdc48cSJosh Durgin         return r;
143230cdc48cSJosh Durgin     }
143330cdc48cSJosh Durgin 
143430cdc48cSJosh Durgin     return 0;
143530cdc48cSJosh Durgin }
143630cdc48cSJosh Durgin 
1437ad32e9c0SJosh Durgin static int qemu_rbd_snap_create(BlockDriverState *bs,
1438ad32e9c0SJosh Durgin                                 QEMUSnapshotInfo *sn_info)
1439f27aaf4bSChristian Brunner {
1440f27aaf4bSChristian Brunner     BDRVRBDState *s = bs->opaque;
1441f27aaf4bSChristian Brunner     int r;
1442f27aaf4bSChristian Brunner 
1443f27aaf4bSChristian Brunner     if (sn_info->name[0] == '\0') {
1444f27aaf4bSChristian Brunner         return -EINVAL; /* we need a name for rbd snapshots */
1445f27aaf4bSChristian Brunner     }
1446f27aaf4bSChristian Brunner 
1447f27aaf4bSChristian Brunner     /*
1448f27aaf4bSChristian Brunner      * rbd snapshots are using the name as the user controlled unique identifier
1449f27aaf4bSChristian Brunner      * we can't use the rbd snapid for that purpose, as it can't be set
1450f27aaf4bSChristian Brunner      */
1451f27aaf4bSChristian Brunner     if (sn_info->id_str[0] != '\0' &&
1452f27aaf4bSChristian Brunner         strcmp(sn_info->id_str, sn_info->name) != 0) {
1453f27aaf4bSChristian Brunner         return -EINVAL;
1454f27aaf4bSChristian Brunner     }
1455f27aaf4bSChristian Brunner 
1456f27aaf4bSChristian Brunner     if (strlen(sn_info->name) >= sizeof(sn_info->id_str)) {
1457f27aaf4bSChristian Brunner         return -ERANGE;
1458f27aaf4bSChristian Brunner     }
1459f27aaf4bSChristian Brunner 
1460ad32e9c0SJosh Durgin     r = rbd_snap_create(s->image, sn_info->name);
1461f27aaf4bSChristian Brunner     if (r < 0) {
1462ad32e9c0SJosh Durgin         error_report("failed to create snap: %s", strerror(-r));
1463f27aaf4bSChristian Brunner         return r;
1464f27aaf4bSChristian Brunner     }
1465f27aaf4bSChristian Brunner 
1466f27aaf4bSChristian Brunner     return 0;
1467f27aaf4bSChristian Brunner }
1468f27aaf4bSChristian Brunner 
1469bd603247SGregory Farnum static int qemu_rbd_snap_remove(BlockDriverState *bs,
1470a89d89d3SWenchao Xia                                 const char *snapshot_id,
1471a89d89d3SWenchao Xia                                 const char *snapshot_name,
1472a89d89d3SWenchao Xia                                 Error **errp)
1473bd603247SGregory Farnum {
1474bd603247SGregory Farnum     BDRVRBDState *s = bs->opaque;
1475bd603247SGregory Farnum     int r;
1476bd603247SGregory Farnum 
1477a89d89d3SWenchao Xia     if (!snapshot_name) {
1478a89d89d3SWenchao Xia         error_setg(errp, "rbd need a valid snapshot name");
1479a89d89d3SWenchao Xia         return -EINVAL;
1480a89d89d3SWenchao Xia     }
1481a89d89d3SWenchao Xia 
1482a89d89d3SWenchao Xia     /* If snapshot_id is specified, it must be equal to name, see
1483a89d89d3SWenchao Xia        qemu_rbd_snap_list() */
1484a89d89d3SWenchao Xia     if (snapshot_id && strcmp(snapshot_id, snapshot_name)) {
1485a89d89d3SWenchao Xia         error_setg(errp,
1486a89d89d3SWenchao Xia                    "rbd do not support snapshot id, it should be NULL or "
1487a89d89d3SWenchao Xia                    "equal to snapshot name");
1488a89d89d3SWenchao Xia         return -EINVAL;
1489a89d89d3SWenchao Xia     }
1490a89d89d3SWenchao Xia 
1491bd603247SGregory Farnum     r = rbd_snap_remove(s->image, snapshot_name);
1492a89d89d3SWenchao Xia     if (r < 0) {
1493a89d89d3SWenchao Xia         error_setg_errno(errp, -r, "Failed to remove the snapshot");
1494a89d89d3SWenchao Xia     }
1495bd603247SGregory Farnum     return r;
1496bd603247SGregory Farnum }
1497bd603247SGregory Farnum 
1498bd603247SGregory Farnum static int qemu_rbd_snap_rollback(BlockDriverState *bs,
1499bd603247SGregory Farnum                                   const char *snapshot_name)
1500bd603247SGregory Farnum {
1501bd603247SGregory Farnum     BDRVRBDState *s = bs->opaque;
1502bd603247SGregory Farnum 
15039be38598SEduardo Habkost     return rbd_snap_rollback(s->image, snapshot_name);
1504bd603247SGregory Farnum }
1505bd603247SGregory Farnum 
1506ad32e9c0SJosh Durgin static int qemu_rbd_snap_list(BlockDriverState *bs,
1507ad32e9c0SJosh Durgin                               QEMUSnapshotInfo **psn_tab)
1508f27aaf4bSChristian Brunner {
1509f27aaf4bSChristian Brunner     BDRVRBDState *s = bs->opaque;
1510f27aaf4bSChristian Brunner     QEMUSnapshotInfo *sn_info, *sn_tab = NULL;
1511ad32e9c0SJosh Durgin     int i, snap_count;
1512ad32e9c0SJosh Durgin     rbd_snap_info_t *snaps;
1513ad32e9c0SJosh Durgin     int max_snaps = RBD_MAX_SNAPS;
1514f27aaf4bSChristian Brunner 
1515ad32e9c0SJosh Durgin     do {
151602c4f26bSMarkus Armbruster         snaps = g_new(rbd_snap_info_t, max_snaps);
1517ad32e9c0SJosh Durgin         snap_count = rbd_snap_list(s->image, snaps, &max_snaps);
15189e6337d0SStefan Hajnoczi         if (snap_count <= 0) {
15197267c094SAnthony Liguori             g_free(snaps);
1520f27aaf4bSChristian Brunner         }
1521ad32e9c0SJosh Durgin     } while (snap_count == -ERANGE);
1522f27aaf4bSChristian Brunner 
1523ad32e9c0SJosh Durgin     if (snap_count <= 0) {
1524b9c53290SJosh Durgin         goto done;
1525f27aaf4bSChristian Brunner     }
1526f27aaf4bSChristian Brunner 
15275839e53bSMarkus Armbruster     sn_tab = g_new0(QEMUSnapshotInfo, snap_count);
1528f27aaf4bSChristian Brunner 
1529ad32e9c0SJosh Durgin     for (i = 0; i < snap_count; i++) {
1530ad32e9c0SJosh Durgin         const char *snap_name = snaps[i].name;
1531f27aaf4bSChristian Brunner 
1532f27aaf4bSChristian Brunner         sn_info = sn_tab + i;
1533f27aaf4bSChristian Brunner         pstrcpy(sn_info->id_str, sizeof(sn_info->id_str), snap_name);
1534f27aaf4bSChristian Brunner         pstrcpy(sn_info->name, sizeof(sn_info->name), snap_name);
1535f27aaf4bSChristian Brunner 
1536ad32e9c0SJosh Durgin         sn_info->vm_state_size = snaps[i].size;
1537f27aaf4bSChristian Brunner         sn_info->date_sec = 0;
1538f27aaf4bSChristian Brunner         sn_info->date_nsec = 0;
1539f27aaf4bSChristian Brunner         sn_info->vm_clock_nsec = 0;
1540f27aaf4bSChristian Brunner     }
1541ad32e9c0SJosh Durgin     rbd_snap_list_end(snaps);
15429e6337d0SStefan Hajnoczi     g_free(snaps);
1543ad32e9c0SJosh Durgin 
1544b9c53290SJosh Durgin  done:
1545f27aaf4bSChristian Brunner     *psn_tab = sn_tab;
1546f27aaf4bSChristian Brunner     return snap_count;
1547f27aaf4bSChristian Brunner }
1548f27aaf4bSChristian Brunner 
1549787f3133SJosh Durgin #ifdef LIBRBD_SUPPORTS_DISCARD
15504da444a0SEric Blake static BlockAIOCB *qemu_rbd_aio_pdiscard(BlockDriverState *bs,
15514da444a0SEric Blake                                          int64_t offset,
1552f5a5ca79SManos Pitsidianakis                                          int bytes,
1553097310b5SMarkus Armbruster                                          BlockCompletionFunc *cb,
1554787f3133SJosh Durgin                                          void *opaque)
1555787f3133SJosh Durgin {
1556f5a5ca79SManos Pitsidianakis     return rbd_start_aio(bs, offset, NULL, bytes, cb, opaque,
1557787f3133SJosh Durgin                          RBD_AIO_DISCARD);
1558787f3133SJosh Durgin }
1559787f3133SJosh Durgin #endif
1560787f3133SJosh Durgin 
1561be217884SAdam Crume #ifdef LIBRBD_SUPPORTS_INVALIDATE
15622b148f39SPaolo Bonzini static void coroutine_fn qemu_rbd_co_invalidate_cache(BlockDriverState *bs,
1563be217884SAdam Crume                                                       Error **errp)
1564be217884SAdam Crume {
1565be217884SAdam Crume     BDRVRBDState *s = bs->opaque;
1566be217884SAdam Crume     int r = rbd_invalidate_cache(s->image);
1567be217884SAdam Crume     if (r < 0) {
1568be217884SAdam Crume         error_setg_errno(errp, -r, "Failed to invalidate the cache");
1569be217884SAdam Crume     }
1570be217884SAdam Crume }
1571be217884SAdam Crume #endif
1572be217884SAdam Crume 
1573bd0cf596SChunyan Liu static QemuOptsList qemu_rbd_create_opts = {
1574bd0cf596SChunyan Liu     .name = "rbd-create-opts",
1575bd0cf596SChunyan Liu     .head = QTAILQ_HEAD_INITIALIZER(qemu_rbd_create_opts.head),
1576bd0cf596SChunyan Liu     .desc = {
1577f27aaf4bSChristian Brunner         {
1578f27aaf4bSChristian Brunner             .name = BLOCK_OPT_SIZE,
1579bd0cf596SChunyan Liu             .type = QEMU_OPT_SIZE,
1580f27aaf4bSChristian Brunner             .help = "Virtual disk size"
1581f27aaf4bSChristian Brunner         },
1582f27aaf4bSChristian Brunner         {
1583f27aaf4bSChristian Brunner             .name = BLOCK_OPT_CLUSTER_SIZE,
1584bd0cf596SChunyan Liu             .type = QEMU_OPT_SIZE,
1585f27aaf4bSChristian Brunner             .help = "RBD object size"
1586f27aaf4bSChristian Brunner         },
158760390a21SDaniel P. Berrange         {
158860390a21SDaniel P. Berrange             .name = "password-secret",
158960390a21SDaniel P. Berrange             .type = QEMU_OPT_STRING,
159060390a21SDaniel P. Berrange             .help = "ID of secret providing the password",
159160390a21SDaniel P. Berrange         },
1592*42e4ac9eSOr Ozeri         {
1593*42e4ac9eSOr Ozeri             .name = "encrypt.format",
1594*42e4ac9eSOr Ozeri             .type = QEMU_OPT_STRING,
1595*42e4ac9eSOr Ozeri             .help = "Encrypt the image, format choices: 'luks', 'luks2'",
1596*42e4ac9eSOr Ozeri         },
1597*42e4ac9eSOr Ozeri         {
1598*42e4ac9eSOr Ozeri             .name = "encrypt.cipher-alg",
1599*42e4ac9eSOr Ozeri             .type = QEMU_OPT_STRING,
1600*42e4ac9eSOr Ozeri             .help = "Name of encryption cipher algorithm"
1601*42e4ac9eSOr Ozeri                     " (allowed values: aes-128, aes-256)",
1602*42e4ac9eSOr Ozeri         },
1603*42e4ac9eSOr Ozeri         {
1604*42e4ac9eSOr Ozeri             .name = "encrypt.key-secret",
1605*42e4ac9eSOr Ozeri             .type = QEMU_OPT_STRING,
1606*42e4ac9eSOr Ozeri             .help = "ID of secret providing LUKS passphrase",
1607*42e4ac9eSOr Ozeri         },
1608bd0cf596SChunyan Liu         { /* end of list */ }
1609bd0cf596SChunyan Liu     }
1610f27aaf4bSChristian Brunner };
1611f27aaf4bSChristian Brunner 
16122654267cSMax Reitz static const char *const qemu_rbd_strong_runtime_opts[] = {
16132654267cSMax Reitz     "pool",
16147bae7c80SStefano Garzarella     "namespace",
16152654267cSMax Reitz     "image",
16162654267cSMax Reitz     "conf",
16172654267cSMax Reitz     "snapshot",
16182654267cSMax Reitz     "user",
16192654267cSMax Reitz     "server.",
16202654267cSMax Reitz     "password-secret",
16212654267cSMax Reitz 
16222654267cSMax Reitz     NULL
16232654267cSMax Reitz };
16242654267cSMax Reitz 
1625f27aaf4bSChristian Brunner static BlockDriver bdrv_rbd = {
1626f27aaf4bSChristian Brunner     .format_name            = "rbd",
1627f27aaf4bSChristian Brunner     .instance_size          = sizeof(BDRVRBDState),
1628c7cacb3eSJeff Cody     .bdrv_parse_filename    = qemu_rbd_parse_filename,
1629e8e16d4bSEric Blake     .bdrv_refresh_limits    = qemu_rbd_refresh_limits,
1630ad32e9c0SJosh Durgin     .bdrv_file_open         = qemu_rbd_open,
1631ad32e9c0SJosh Durgin     .bdrv_close             = qemu_rbd_close,
163256e7cf8dSJeff Cody     .bdrv_reopen_prepare    = qemu_rbd_reopen_prepare,
16331bebea37SKevin Wolf     .bdrv_co_create         = qemu_rbd_co_create,
1634efc75e2aSStefan Hajnoczi     .bdrv_co_create_opts    = qemu_rbd_co_create_opts,
16353ac21627SPeter Lieven     .bdrv_has_zero_init     = bdrv_has_zero_init_1,
1636ad32e9c0SJosh Durgin     .bdrv_get_info          = qemu_rbd_getinfo,
1637*42e4ac9eSOr Ozeri     .bdrv_get_specific_info = qemu_rbd_get_specific_info,
1638bd0cf596SChunyan Liu     .create_opts            = &qemu_rbd_create_opts,
1639ad32e9c0SJosh Durgin     .bdrv_getlength         = qemu_rbd_getlength,
1640061ca8a3SKevin Wolf     .bdrv_co_truncate       = qemu_rbd_co_truncate,
1641f27aaf4bSChristian Brunner     .protocol_name          = "rbd",
1642f27aaf4bSChristian Brunner 
1643e8e16d4bSEric Blake     .bdrv_aio_preadv        = qemu_rbd_aio_preadv,
1644e8e16d4bSEric Blake     .bdrv_aio_pwritev       = qemu_rbd_aio_pwritev,
1645dc7588c1SJosh Durgin 
1646dc7588c1SJosh Durgin #ifdef LIBRBD_SUPPORTS_AIO_FLUSH
1647dc7588c1SJosh Durgin     .bdrv_aio_flush         = qemu_rbd_aio_flush,
1648dc7588c1SJosh Durgin #else
1649c68b89acSKevin Wolf     .bdrv_co_flush_to_disk  = qemu_rbd_co_flush,
1650dc7588c1SJosh Durgin #endif
1651f27aaf4bSChristian Brunner 
1652787f3133SJosh Durgin #ifdef LIBRBD_SUPPORTS_DISCARD
16534da444a0SEric Blake     .bdrv_aio_pdiscard      = qemu_rbd_aio_pdiscard,
1654787f3133SJosh Durgin #endif
1655787f3133SJosh Durgin 
1656ad32e9c0SJosh Durgin     .bdrv_snapshot_create   = qemu_rbd_snap_create,
1657bd603247SGregory Farnum     .bdrv_snapshot_delete   = qemu_rbd_snap_remove,
1658ad32e9c0SJosh Durgin     .bdrv_snapshot_list     = qemu_rbd_snap_list,
1659bd603247SGregory Farnum     .bdrv_snapshot_goto     = qemu_rbd_snap_rollback,
1660be217884SAdam Crume #ifdef LIBRBD_SUPPORTS_INVALIDATE
16612b148f39SPaolo Bonzini     .bdrv_co_invalidate_cache = qemu_rbd_co_invalidate_cache,
1662be217884SAdam Crume #endif
16632654267cSMax Reitz 
16642654267cSMax Reitz     .strong_runtime_opts    = qemu_rbd_strong_runtime_opts,
1665f27aaf4bSChristian Brunner };
1666f27aaf4bSChristian Brunner 
1667f27aaf4bSChristian Brunner static void bdrv_rbd_init(void)
1668f27aaf4bSChristian Brunner {
1669f27aaf4bSChristian Brunner     bdrv_register(&bdrv_rbd);
1670f27aaf4bSChristian Brunner }
1671f27aaf4bSChristian Brunner 
1672f27aaf4bSChristian Brunner block_init(bdrv_rbd_init);
1673