1 /* 2 * GlusterFS backend for QEMU 3 * 4 * Copyright (C) 2012 Bharata B Rao <bharata@linux.vnet.ibm.com> 5 * 6 * This work is licensed under the terms of the GNU GPL, version 2 or later. 7 * See the COPYING file in the top-level directory. 8 * 9 */ 10 11 #include "qemu/osdep.h" 12 #include "qemu/units.h" 13 #include <glusterfs/api/glfs.h> 14 #include "block/block-io.h" 15 #include "block/block_int.h" 16 #include "block/qdict.h" 17 #include "qapi/error.h" 18 #include "qapi/qmp/qdict.h" 19 #include "qapi/qmp/qerror.h" 20 #include "qemu/error-report.h" 21 #include "qemu/module.h" 22 #include "qemu/option.h" 23 #include "qemu/cutils.h" 24 25 #ifdef CONFIG_GLUSTERFS_FTRUNCATE_HAS_STAT 26 # define glfs_ftruncate(fd, offset) glfs_ftruncate(fd, offset, NULL, NULL) 27 #endif 28 29 #define GLUSTER_OPT_FILENAME "filename" 30 #define GLUSTER_OPT_VOLUME "volume" 31 #define GLUSTER_OPT_PATH "path" 32 #define GLUSTER_OPT_TYPE "type" 33 #define GLUSTER_OPT_SERVER_PATTERN "server." 34 #define GLUSTER_OPT_HOST "host" 35 #define GLUSTER_OPT_PORT "port" 36 #define GLUSTER_OPT_TO "to" 37 #define GLUSTER_OPT_IPV4 "ipv4" 38 #define GLUSTER_OPT_IPV6 "ipv6" 39 #define GLUSTER_OPT_SOCKET "socket" 40 #define GLUSTER_OPT_DEBUG "debug" 41 #define GLUSTER_DEFAULT_PORT 24007 42 #define GLUSTER_DEBUG_DEFAULT 4 43 #define GLUSTER_DEBUG_MAX 9 44 #define GLUSTER_OPT_LOGFILE "logfile" 45 #define GLUSTER_LOGFILE_DEFAULT "-" /* handled in libgfapi as /dev/stderr */ 46 /* 47 * Several versions of GlusterFS (3.12? -> 6.0.1) fail when the transfer size 48 * is greater or equal to 1024 MiB, so we are limiting the transfer size to 512 49 * MiB to avoid this rare issue. 50 */ 51 #define GLUSTER_MAX_TRANSFER (512 * MiB) 52 53 #define GERR_INDEX_HINT "hint: check in 'server' array index '%d'\n" 54 55 typedef struct GlusterAIOCB { 56 int64_t size; 57 int ret; 58 Coroutine *coroutine; 59 AioContext *aio_context; 60 } GlusterAIOCB; 61 62 typedef struct BDRVGlusterState { 63 struct glfs *glfs; 64 struct glfs_fd *fd; 65 char *logfile; 66 bool supports_seek_data; 67 int debug; 68 } BDRVGlusterState; 69 70 typedef struct BDRVGlusterReopenState { 71 struct glfs *glfs; 72 struct glfs_fd *fd; 73 } BDRVGlusterReopenState; 74 75 76 typedef struct GlfsPreopened { 77 char *volume; 78 glfs_t *fs; 79 int ref; 80 } GlfsPreopened; 81 82 typedef struct ListElement { 83 QLIST_ENTRY(ListElement) list; 84 GlfsPreopened saved; 85 } ListElement; 86 87 static QLIST_HEAD(, ListElement) glfs_list; 88 89 static QemuOptsList qemu_gluster_create_opts = { 90 .name = "qemu-gluster-create-opts", 91 .head = QTAILQ_HEAD_INITIALIZER(qemu_gluster_create_opts.head), 92 .desc = { 93 { 94 .name = BLOCK_OPT_SIZE, 95 .type = QEMU_OPT_SIZE, 96 .help = "Virtual disk size" 97 }, 98 { 99 .name = BLOCK_OPT_PREALLOC, 100 .type = QEMU_OPT_STRING, 101 .help = "Preallocation mode (allowed values: off" 102 #ifdef CONFIG_GLUSTERFS_FALLOCATE 103 ", falloc" 104 #endif 105 #ifdef CONFIG_GLUSTERFS_ZEROFILL 106 ", full" 107 #endif 108 ")" 109 }, 110 { 111 .name = GLUSTER_OPT_DEBUG, 112 .type = QEMU_OPT_NUMBER, 113 .help = "Gluster log level, valid range is 0-9", 114 }, 115 { 116 .name = GLUSTER_OPT_LOGFILE, 117 .type = QEMU_OPT_STRING, 118 .help = "Logfile path of libgfapi", 119 }, 120 { /* end of list */ } 121 } 122 }; 123 124 static QemuOptsList runtime_opts = { 125 .name = "gluster", 126 .head = QTAILQ_HEAD_INITIALIZER(runtime_opts.head), 127 .desc = { 128 { 129 .name = GLUSTER_OPT_FILENAME, 130 .type = QEMU_OPT_STRING, 131 .help = "URL to the gluster image", 132 }, 133 { 134 .name = GLUSTER_OPT_DEBUG, 135 .type = QEMU_OPT_NUMBER, 136 .help = "Gluster log level, valid range is 0-9", 137 }, 138 { 139 .name = GLUSTER_OPT_LOGFILE, 140 .type = QEMU_OPT_STRING, 141 .help = "Logfile path of libgfapi", 142 }, 143 { /* end of list */ } 144 }, 145 }; 146 147 static QemuOptsList runtime_json_opts = { 148 .name = "gluster_json", 149 .head = QTAILQ_HEAD_INITIALIZER(runtime_json_opts.head), 150 .desc = { 151 { 152 .name = GLUSTER_OPT_VOLUME, 153 .type = QEMU_OPT_STRING, 154 .help = "name of gluster volume where VM image resides", 155 }, 156 { 157 .name = GLUSTER_OPT_PATH, 158 .type = QEMU_OPT_STRING, 159 .help = "absolute path to image file in gluster volume", 160 }, 161 { 162 .name = GLUSTER_OPT_DEBUG, 163 .type = QEMU_OPT_NUMBER, 164 .help = "Gluster log level, valid range is 0-9", 165 }, 166 { /* end of list */ } 167 }, 168 }; 169 170 static QemuOptsList runtime_type_opts = { 171 .name = "gluster_type", 172 .head = QTAILQ_HEAD_INITIALIZER(runtime_type_opts.head), 173 .desc = { 174 { 175 .name = GLUSTER_OPT_TYPE, 176 .type = QEMU_OPT_STRING, 177 .help = "inet|unix", 178 }, 179 { /* end of list */ } 180 }, 181 }; 182 183 static QemuOptsList runtime_unix_opts = { 184 .name = "gluster_unix", 185 .head = QTAILQ_HEAD_INITIALIZER(runtime_unix_opts.head), 186 .desc = { 187 { 188 .name = GLUSTER_OPT_SOCKET, 189 .type = QEMU_OPT_STRING, 190 .help = "socket file path (legacy)", 191 }, 192 { 193 .name = GLUSTER_OPT_PATH, 194 .type = QEMU_OPT_STRING, 195 .help = "socket file path (QAPI)", 196 }, 197 { /* end of list */ } 198 }, 199 }; 200 201 static QemuOptsList runtime_inet_opts = { 202 .name = "gluster_inet", 203 .head = QTAILQ_HEAD_INITIALIZER(runtime_inet_opts.head), 204 .desc = { 205 { 206 .name = GLUSTER_OPT_TYPE, 207 .type = QEMU_OPT_STRING, 208 .help = "inet|unix", 209 }, 210 { 211 .name = GLUSTER_OPT_HOST, 212 .type = QEMU_OPT_STRING, 213 .help = "host address (hostname/ipv4/ipv6 addresses)", 214 }, 215 { 216 .name = GLUSTER_OPT_PORT, 217 .type = QEMU_OPT_STRING, 218 .help = "port number on which glusterd is listening (default 24007)", 219 }, 220 { 221 .name = "to", 222 .type = QEMU_OPT_NUMBER, 223 .help = "max port number, not supported by gluster", 224 }, 225 { 226 .name = "ipv4", 227 .type = QEMU_OPT_BOOL, 228 .help = "ipv4 bool value, not supported by gluster", 229 }, 230 { 231 .name = "ipv6", 232 .type = QEMU_OPT_BOOL, 233 .help = "ipv6 bool value, not supported by gluster", 234 }, 235 { /* end of list */ } 236 }, 237 }; 238 239 static void glfs_set_preopened(const char *volume, glfs_t *fs) 240 { 241 ListElement *entry = NULL; 242 243 entry = g_new(ListElement, 1); 244 245 entry->saved.volume = g_strdup(volume); 246 247 entry->saved.fs = fs; 248 entry->saved.ref = 1; 249 250 QLIST_INSERT_HEAD(&glfs_list, entry, list); 251 } 252 253 static glfs_t *glfs_find_preopened(const char *volume) 254 { 255 ListElement *entry = NULL; 256 257 QLIST_FOREACH(entry, &glfs_list, list) { 258 if (strcmp(entry->saved.volume, volume) == 0) { 259 entry->saved.ref++; 260 return entry->saved.fs; 261 } 262 } 263 264 return NULL; 265 } 266 267 static void glfs_clear_preopened(glfs_t *fs) 268 { 269 ListElement *entry = NULL; 270 ListElement *next; 271 272 if (fs == NULL) { 273 return; 274 } 275 276 QLIST_FOREACH_SAFE(entry, &glfs_list, list, next) { 277 if (entry->saved.fs == fs) { 278 if (--entry->saved.ref) { 279 return; 280 } 281 282 QLIST_REMOVE(entry, list); 283 284 glfs_fini(entry->saved.fs); 285 g_free(entry->saved.volume); 286 g_free(entry); 287 } 288 } 289 } 290 291 static int parse_volume_options(BlockdevOptionsGluster *gconf, const char *path) 292 { 293 const char *p, *q; 294 295 if (!path) { 296 return -EINVAL; 297 } 298 299 /* volume */ 300 p = q = path + strspn(path, "/"); 301 p += strcspn(p, "/"); 302 if (*p == '\0') { 303 return -EINVAL; 304 } 305 gconf->volume = g_strndup(q, p - q); 306 307 /* path */ 308 p += strspn(p, "/"); 309 if (*p == '\0') { 310 return -EINVAL; 311 } 312 gconf->path = g_strdup(p); 313 return 0; 314 } 315 316 /* 317 * file=gluster[+transport]://[host[:port]]/volume/path[?socket=...] 318 * 319 * 'gluster' is the protocol. 320 * 321 * 'transport' specifies the transport type used to connect to gluster 322 * management daemon (glusterd). Valid transport types are 323 * tcp or unix. If a transport type isn't specified, then tcp type is assumed. 324 * 325 * 'host' specifies the host where the volume file specification for 326 * the given volume resides. This can be either hostname or ipv4 address. 327 * If transport type is 'unix', then 'host' field should not be specified. 328 * The 'socket' field needs to be populated with the path to unix domain 329 * socket. 330 * 331 * 'port' is the port number on which glusterd is listening. This is optional 332 * and if not specified, QEMU will send 0 which will make gluster to use the 333 * default port. If the transport type is unix, then 'port' should not be 334 * specified. 335 * 336 * 'volume' is the name of the gluster volume which contains the VM image. 337 * 338 * 'path' is the path to the actual VM image that resides on gluster volume. 339 * 340 * Examples: 341 * 342 * file=gluster://1.2.3.4/testvol/a.img 343 * file=gluster+tcp://1.2.3.4/testvol/a.img 344 * file=gluster+tcp://1.2.3.4:24007/testvol/dir/a.img 345 * file=gluster+tcp://host.domain.com:24007/testvol/dir/a.img 346 * file=gluster+unix:///testvol/dir/a.img?socket=/tmp/glusterd.socket 347 */ 348 static int qemu_gluster_parse_uri(BlockdevOptionsGluster *gconf, 349 const char *filename) 350 { 351 g_autoptr(GUri) uri = g_uri_parse(filename, G_URI_FLAGS_NONE, NULL); 352 g_autoptr(GHashTable) qp = NULL; 353 SocketAddress *gsconf; 354 bool is_unix = false; 355 const char *uri_scheme, *uri_query, *uri_server; 356 int uri_port, ret; 357 358 if (!uri) { 359 return -EINVAL; 360 } 361 362 gsconf = g_new0(SocketAddress, 1); 363 QAPI_LIST_PREPEND(gconf->server, gsconf); 364 365 /* transport */ 366 uri_scheme = g_uri_get_scheme(uri); 367 if (!uri_scheme || !strcmp(uri_scheme, "gluster")) { 368 gsconf->type = SOCKET_ADDRESS_TYPE_INET; 369 } else if (!strcmp(uri_scheme, "gluster+tcp")) { 370 gsconf->type = SOCKET_ADDRESS_TYPE_INET; 371 } else if (!strcmp(uri_scheme, "gluster+unix")) { 372 gsconf->type = SOCKET_ADDRESS_TYPE_UNIX; 373 is_unix = true; 374 } else { 375 return -EINVAL; 376 } 377 378 ret = parse_volume_options(gconf, g_uri_get_path(uri)); 379 if (ret < 0) { 380 return ret; 381 } 382 383 uri_query = g_uri_get_query(uri); 384 if (uri_query) { 385 qp = g_uri_parse_params(uri_query, -1, "&", G_URI_PARAMS_NONE, NULL); 386 if (!qp) { 387 return -EINVAL; 388 } 389 ret = g_hash_table_size(qp); 390 if (ret > 1 || (is_unix && !ret) || (!is_unix && ret)) { 391 return -EINVAL; 392 } 393 } 394 395 uri_server = g_uri_get_host(uri); 396 uri_port = g_uri_get_port(uri); 397 398 if (is_unix) { 399 char *uri_socket = g_hash_table_lookup(qp, "socket"); 400 if (uri_server || uri_port != -1 || !uri_socket) { 401 return -EINVAL; 402 } 403 gsconf->u.q_unix.path = g_strdup(uri_socket); 404 } else { 405 gsconf->u.inet.host = g_strdup(uri_server ? uri_server : "localhost"); 406 if (uri_port > 0) { 407 gsconf->u.inet.port = g_strdup_printf("%d", uri_port); 408 } else { 409 gsconf->u.inet.port = g_strdup_printf("%d", GLUSTER_DEFAULT_PORT); 410 } 411 } 412 413 return 0; 414 } 415 416 static struct glfs *qemu_gluster_glfs_init(BlockdevOptionsGluster *gconf, 417 Error **errp) 418 { 419 struct glfs *glfs; 420 int ret; 421 int old_errno; 422 SocketAddressList *server; 423 uint64_t port; 424 425 glfs = glfs_find_preopened(gconf->volume); 426 if (glfs) { 427 return glfs; 428 } 429 430 glfs = glfs_new(gconf->volume); 431 if (!glfs) { 432 goto out; 433 } 434 435 glfs_set_preopened(gconf->volume, glfs); 436 437 for (server = gconf->server; server; server = server->next) { 438 switch (server->value->type) { 439 case SOCKET_ADDRESS_TYPE_UNIX: 440 ret = glfs_set_volfile_server(glfs, "unix", 441 server->value->u.q_unix.path, 0); 442 break; 443 case SOCKET_ADDRESS_TYPE_INET: 444 if (parse_uint_full(server->value->u.inet.port, 10, &port) < 0 || 445 port > 65535) { 446 error_setg(errp, "'%s' is not a valid port number", 447 server->value->u.inet.port); 448 errno = EINVAL; 449 goto out; 450 } 451 ret = glfs_set_volfile_server(glfs, "tcp", 452 server->value->u.inet.host, 453 (int)port); 454 break; 455 case SOCKET_ADDRESS_TYPE_VSOCK: 456 case SOCKET_ADDRESS_TYPE_FD: 457 default: 458 abort(); 459 } 460 461 if (ret < 0) { 462 goto out; 463 } 464 } 465 466 ret = glfs_set_logging(glfs, gconf->logfile, gconf->debug); 467 if (ret < 0) { 468 goto out; 469 } 470 471 ret = glfs_init(glfs); 472 if (ret) { 473 error_setg(errp, "Gluster connection for volume %s, path %s failed" 474 " to connect", gconf->volume, gconf->path); 475 for (server = gconf->server; server; server = server->next) { 476 if (server->value->type == SOCKET_ADDRESS_TYPE_UNIX) { 477 error_append_hint(errp, "hint: failed on socket %s ", 478 server->value->u.q_unix.path); 479 } else { 480 error_append_hint(errp, "hint: failed on host %s and port %s ", 481 server->value->u.inet.host, 482 server->value->u.inet.port); 483 } 484 } 485 486 error_append_hint(errp, "Please refer to gluster logs for more info\n"); 487 488 /* glfs_init sometimes doesn't set errno although docs suggest that */ 489 if (errno == 0) { 490 errno = EINVAL; 491 } 492 493 goto out; 494 } 495 return glfs; 496 497 out: 498 if (glfs) { 499 old_errno = errno; 500 glfs_clear_preopened(glfs); 501 errno = old_errno; 502 } 503 return NULL; 504 } 505 506 /* 507 * Convert the json formatted command line into qapi. 508 */ 509 static int qemu_gluster_parse_json(BlockdevOptionsGluster *gconf, 510 QDict *options, Error **errp) 511 { 512 QemuOpts *opts; 513 SocketAddress *gsconf = NULL; 514 SocketAddressList **tail; 515 QDict *backing_options = NULL; 516 Error *local_err = NULL; 517 char *str = NULL; 518 const char *ptr; 519 int i, type, num_servers; 520 521 /* create opts info from runtime_json_opts list */ 522 opts = qemu_opts_create(&runtime_json_opts, NULL, 0, &error_abort); 523 if (!qemu_opts_absorb_qdict(opts, options, errp)) { 524 goto out; 525 } 526 527 num_servers = qdict_array_entries(options, GLUSTER_OPT_SERVER_PATTERN); 528 if (num_servers < 1) { 529 error_setg(&local_err, QERR_MISSING_PARAMETER, "server"); 530 goto out; 531 } 532 533 ptr = qemu_opt_get(opts, GLUSTER_OPT_VOLUME); 534 if (!ptr) { 535 error_setg(&local_err, QERR_MISSING_PARAMETER, GLUSTER_OPT_VOLUME); 536 goto out; 537 } 538 gconf->volume = g_strdup(ptr); 539 540 ptr = qemu_opt_get(opts, GLUSTER_OPT_PATH); 541 if (!ptr) { 542 error_setg(&local_err, QERR_MISSING_PARAMETER, GLUSTER_OPT_PATH); 543 goto out; 544 } 545 gconf->path = g_strdup(ptr); 546 qemu_opts_del(opts); 547 tail = &gconf->server; 548 549 for (i = 0; i < num_servers; i++) { 550 str = g_strdup_printf(GLUSTER_OPT_SERVER_PATTERN"%d.", i); 551 qdict_extract_subqdict(options, &backing_options, str); 552 553 /* create opts info from runtime_type_opts list */ 554 opts = qemu_opts_create(&runtime_type_opts, NULL, 0, &error_abort); 555 if (!qemu_opts_absorb_qdict(opts, backing_options, errp)) { 556 goto out; 557 } 558 559 ptr = qemu_opt_get(opts, GLUSTER_OPT_TYPE); 560 if (!ptr) { 561 error_setg(&local_err, QERR_MISSING_PARAMETER, GLUSTER_OPT_TYPE); 562 error_append_hint(&local_err, GERR_INDEX_HINT, i); 563 goto out; 564 565 } 566 gsconf = g_new0(SocketAddress, 1); 567 if (!strcmp(ptr, "tcp")) { 568 ptr = "inet"; /* accept legacy "tcp" */ 569 } 570 type = qapi_enum_parse(&SocketAddressType_lookup, ptr, -1, NULL); 571 if (type != SOCKET_ADDRESS_TYPE_INET 572 && type != SOCKET_ADDRESS_TYPE_UNIX) { 573 error_setg(&local_err, 574 "Parameter '%s' may be 'inet' or 'unix'", 575 GLUSTER_OPT_TYPE); 576 error_append_hint(&local_err, GERR_INDEX_HINT, i); 577 goto out; 578 } 579 gsconf->type = type; 580 qemu_opts_del(opts); 581 582 if (gsconf->type == SOCKET_ADDRESS_TYPE_INET) { 583 /* create opts info from runtime_inet_opts list */ 584 opts = qemu_opts_create(&runtime_inet_opts, NULL, 0, &error_abort); 585 if (!qemu_opts_absorb_qdict(opts, backing_options, errp)) { 586 goto out; 587 } 588 589 ptr = qemu_opt_get(opts, GLUSTER_OPT_HOST); 590 if (!ptr) { 591 error_setg(&local_err, QERR_MISSING_PARAMETER, 592 GLUSTER_OPT_HOST); 593 error_append_hint(&local_err, GERR_INDEX_HINT, i); 594 goto out; 595 } 596 gsconf->u.inet.host = g_strdup(ptr); 597 ptr = qemu_opt_get(opts, GLUSTER_OPT_PORT); 598 if (!ptr) { 599 error_setg(&local_err, QERR_MISSING_PARAMETER, 600 GLUSTER_OPT_PORT); 601 error_append_hint(&local_err, GERR_INDEX_HINT, i); 602 goto out; 603 } 604 gsconf->u.inet.port = g_strdup(ptr); 605 606 /* defend for unsupported fields in InetSocketAddress, 607 * i.e. @ipv4, @ipv6 and @to 608 */ 609 ptr = qemu_opt_get(opts, GLUSTER_OPT_TO); 610 if (ptr) { 611 gsconf->u.inet.has_to = true; 612 } 613 ptr = qemu_opt_get(opts, GLUSTER_OPT_IPV4); 614 if (ptr) { 615 gsconf->u.inet.has_ipv4 = true; 616 } 617 ptr = qemu_opt_get(opts, GLUSTER_OPT_IPV6); 618 if (ptr) { 619 gsconf->u.inet.has_ipv6 = true; 620 } 621 if (gsconf->u.inet.has_to) { 622 error_setg(&local_err, "Parameter 'to' not supported"); 623 goto out; 624 } 625 if (gsconf->u.inet.has_ipv4 || gsconf->u.inet.has_ipv6) { 626 error_setg(&local_err, "Parameters 'ipv4/ipv6' not supported"); 627 goto out; 628 } 629 qemu_opts_del(opts); 630 } else { 631 /* create opts info from runtime_unix_opts list */ 632 opts = qemu_opts_create(&runtime_unix_opts, NULL, 0, &error_abort); 633 if (!qemu_opts_absorb_qdict(opts, backing_options, errp)) { 634 goto out; 635 } 636 637 ptr = qemu_opt_get(opts, GLUSTER_OPT_PATH); 638 if (!ptr) { 639 ptr = qemu_opt_get(opts, GLUSTER_OPT_SOCKET); 640 } else if (qemu_opt_get(opts, GLUSTER_OPT_SOCKET)) { 641 error_setg(&local_err, 642 "Conflicting parameters 'path' and 'socket'"); 643 error_append_hint(&local_err, GERR_INDEX_HINT, i); 644 goto out; 645 } 646 if (!ptr) { 647 error_setg(&local_err, QERR_MISSING_PARAMETER, 648 GLUSTER_OPT_PATH); 649 error_append_hint(&local_err, GERR_INDEX_HINT, i); 650 goto out; 651 } 652 gsconf->u.q_unix.path = g_strdup(ptr); 653 qemu_opts_del(opts); 654 } 655 656 QAPI_LIST_APPEND(tail, gsconf); 657 gsconf = NULL; 658 659 qobject_unref(backing_options); 660 backing_options = NULL; 661 g_free(str); 662 str = NULL; 663 } 664 665 return 0; 666 667 out: 668 error_propagate(errp, local_err); 669 qapi_free_SocketAddress(gsconf); 670 qemu_opts_del(opts); 671 g_free(str); 672 qobject_unref(backing_options); 673 errno = EINVAL; 674 return -errno; 675 } 676 677 /* Converts options given in @filename and the @options QDict into the QAPI 678 * object @gconf. */ 679 static int qemu_gluster_parse(BlockdevOptionsGluster *gconf, 680 const char *filename, 681 QDict *options, Error **errp) 682 { 683 int ret; 684 if (filename) { 685 ret = qemu_gluster_parse_uri(gconf, filename); 686 if (ret < 0) { 687 error_setg(errp, "invalid URI %s", filename); 688 error_append_hint(errp, "Usage: file=gluster[+transport]://" 689 "[host[:port]]volume/path[?socket=...]" 690 "[,file.debug=N]" 691 "[,file.logfile=/path/filename.log]\n"); 692 return ret; 693 } 694 } else { 695 ret = qemu_gluster_parse_json(gconf, options, errp); 696 if (ret < 0) { 697 error_append_hint(errp, "Usage: " 698 "-drive driver=qcow2,file.driver=gluster," 699 "file.volume=testvol,file.path=/path/a.qcow2" 700 "[,file.debug=9]" 701 "[,file.logfile=/path/filename.log]," 702 "file.server.0.type=inet," 703 "file.server.0.host=1.2.3.4," 704 "file.server.0.port=24007," 705 "file.server.1.transport=unix," 706 "file.server.1.path=/var/run/glusterd.socket ..." 707 "\n"); 708 return ret; 709 } 710 } 711 712 return 0; 713 } 714 715 static struct glfs *qemu_gluster_init(BlockdevOptionsGluster *gconf, 716 const char *filename, 717 QDict *options, Error **errp) 718 { 719 int ret; 720 721 ret = qemu_gluster_parse(gconf, filename, options, errp); 722 if (ret < 0) { 723 errno = -ret; 724 return NULL; 725 } 726 727 return qemu_gluster_glfs_init(gconf, errp); 728 } 729 730 /* 731 * AIO callback routine called from GlusterFS thread. 732 */ 733 static void gluster_finish_aiocb(struct glfs_fd *fd, ssize_t ret, 734 #ifdef CONFIG_GLUSTERFS_IOCB_HAS_STAT 735 struct glfs_stat *pre, struct glfs_stat *post, 736 #endif 737 void *arg) 738 { 739 GlusterAIOCB *acb = (GlusterAIOCB *)arg; 740 741 if (!ret || ret == acb->size) { 742 acb->ret = 0; /* Success */ 743 } else if (ret < 0) { 744 acb->ret = -errno; /* Read/Write failed */ 745 } else { 746 acb->ret = -EIO; /* Partial read/write - fail it */ 747 } 748 749 aio_co_schedule(acb->aio_context, acb->coroutine); 750 } 751 752 static void qemu_gluster_parse_flags(int bdrv_flags, int *open_flags) 753 { 754 assert(open_flags != NULL); 755 756 *open_flags |= O_BINARY; 757 758 if (bdrv_flags & BDRV_O_RDWR) { 759 *open_flags |= O_RDWR; 760 } else { 761 *open_flags |= O_RDONLY; 762 } 763 764 if ((bdrv_flags & BDRV_O_NOCACHE)) { 765 *open_flags |= O_DIRECT; 766 } 767 } 768 769 /* 770 * Do SEEK_DATA/HOLE to detect if it is functional. Older broken versions of 771 * gfapi incorrectly return the current offset when SEEK_DATA/HOLE is used. 772 * - Corrected versions return -1 and set errno to EINVAL. 773 * - Versions that support SEEK_DATA/HOLE correctly, will return -1 and set 774 * errno to ENXIO when SEEK_DATA is called with a position of EOF. 775 */ 776 static bool qemu_gluster_test_seek(struct glfs_fd *fd) 777 { 778 off_t ret = 0; 779 780 #if defined SEEK_HOLE && defined SEEK_DATA 781 off_t eof; 782 783 eof = glfs_lseek(fd, 0, SEEK_END); 784 if (eof < 0) { 785 /* this should never occur */ 786 return false; 787 } 788 789 /* this should always fail with ENXIO if SEEK_DATA is supported */ 790 ret = glfs_lseek(fd, eof, SEEK_DATA); 791 #endif 792 793 return (ret < 0) && (errno == ENXIO); 794 } 795 796 static int qemu_gluster_open(BlockDriverState *bs, QDict *options, 797 int bdrv_flags, Error **errp) 798 { 799 BDRVGlusterState *s = bs->opaque; 800 int open_flags = 0; 801 int ret = 0; 802 BlockdevOptionsGluster *gconf = NULL; 803 QemuOpts *opts; 804 const char *filename, *logfile; 805 806 opts = qemu_opts_create(&runtime_opts, NULL, 0, &error_abort); 807 if (!qemu_opts_absorb_qdict(opts, options, errp)) { 808 ret = -EINVAL; 809 goto out; 810 } 811 812 filename = qemu_opt_get(opts, GLUSTER_OPT_FILENAME); 813 814 s->debug = qemu_opt_get_number(opts, GLUSTER_OPT_DEBUG, 815 GLUSTER_DEBUG_DEFAULT); 816 if (s->debug < 0) { 817 s->debug = 0; 818 } else if (s->debug > GLUSTER_DEBUG_MAX) { 819 s->debug = GLUSTER_DEBUG_MAX; 820 } 821 822 gconf = g_new0(BlockdevOptionsGluster, 1); 823 gconf->debug = s->debug; 824 gconf->has_debug = true; 825 826 logfile = qemu_opt_get(opts, GLUSTER_OPT_LOGFILE); 827 s->logfile = g_strdup(logfile ? logfile : GLUSTER_LOGFILE_DEFAULT); 828 829 gconf->logfile = g_strdup(s->logfile); 830 831 s->glfs = qemu_gluster_init(gconf, filename, options, errp); 832 if (!s->glfs) { 833 ret = -errno; 834 goto out; 835 } 836 837 #ifdef CONFIG_GLUSTERFS_XLATOR_OPT 838 /* Without this, if fsync fails for a recoverable reason (for instance, 839 * ENOSPC), gluster will dump its cache, preventing retries. This means 840 * almost certain data loss. Not all gluster versions support the 841 * 'resync-failed-syncs-after-fsync' key value, but there is no way to 842 * discover during runtime if it is supported (this api returns success for 843 * unknown key/value pairs) */ 844 ret = glfs_set_xlator_option(s->glfs, "*-write-behind", 845 "resync-failed-syncs-after-fsync", 846 "on"); 847 if (ret < 0) { 848 error_setg_errno(errp, errno, "Unable to set xlator key/value pair"); 849 ret = -errno; 850 goto out; 851 } 852 #endif 853 854 qemu_gluster_parse_flags(bdrv_flags, &open_flags); 855 856 s->fd = glfs_open(s->glfs, gconf->path, open_flags); 857 ret = s->fd ? 0 : -errno; 858 859 if (ret == -EACCES || ret == -EROFS) { 860 /* Try to degrade to read-only, but if it doesn't work, still use the 861 * normal error message. */ 862 bdrv_graph_rdlock_main_loop(); 863 if (bdrv_apply_auto_read_only(bs, NULL, NULL) == 0) { 864 open_flags = (open_flags & ~O_RDWR) | O_RDONLY; 865 s->fd = glfs_open(s->glfs, gconf->path, open_flags); 866 ret = s->fd ? 0 : -errno; 867 } 868 bdrv_graph_rdunlock_main_loop(); 869 } 870 871 s->supports_seek_data = qemu_gluster_test_seek(s->fd); 872 873 out: 874 qemu_opts_del(opts); 875 qapi_free_BlockdevOptionsGluster(gconf); 876 if (!ret) { 877 return ret; 878 } 879 g_free(s->logfile); 880 if (s->fd) { 881 glfs_close(s->fd); 882 } 883 884 glfs_clear_preopened(s->glfs); 885 886 return ret; 887 } 888 889 static void qemu_gluster_refresh_limits(BlockDriverState *bs, Error **errp) 890 { 891 bs->bl.max_transfer = GLUSTER_MAX_TRANSFER; 892 bs->bl.max_pdiscard = MIN(SIZE_MAX, INT64_MAX); 893 } 894 895 static int qemu_gluster_reopen_prepare(BDRVReopenState *state, 896 BlockReopenQueue *queue, Error **errp) 897 { 898 int ret = 0; 899 BDRVGlusterState *s; 900 BDRVGlusterReopenState *reop_s; 901 BlockdevOptionsGluster *gconf; 902 int open_flags = 0; 903 904 assert(state != NULL); 905 assert(state->bs != NULL); 906 907 s = state->bs->opaque; 908 909 state->opaque = g_new0(BDRVGlusterReopenState, 1); 910 reop_s = state->opaque; 911 912 qemu_gluster_parse_flags(state->flags, &open_flags); 913 914 gconf = g_new0(BlockdevOptionsGluster, 1); 915 gconf->debug = s->debug; 916 gconf->has_debug = true; 917 gconf->logfile = g_strdup(s->logfile); 918 919 /* 920 * If 'state->bs->exact_filename' is empty, 'state->options' should contain 921 * the JSON parameters already parsed. 922 */ 923 if (state->bs->exact_filename[0] != '\0') { 924 reop_s->glfs = qemu_gluster_init(gconf, state->bs->exact_filename, NULL, 925 errp); 926 } else { 927 reop_s->glfs = qemu_gluster_init(gconf, NULL, state->options, errp); 928 } 929 if (reop_s->glfs == NULL) { 930 ret = -errno; 931 goto exit; 932 } 933 934 #ifdef CONFIG_GLUSTERFS_XLATOR_OPT 935 ret = glfs_set_xlator_option(reop_s->glfs, "*-write-behind", 936 "resync-failed-syncs-after-fsync", "on"); 937 if (ret < 0) { 938 error_setg_errno(errp, errno, "Unable to set xlator key/value pair"); 939 ret = -errno; 940 goto exit; 941 } 942 #endif 943 944 reop_s->fd = glfs_open(reop_s->glfs, gconf->path, open_flags); 945 if (reop_s->fd == NULL) { 946 /* reops->glfs will be cleaned up in _abort */ 947 ret = -errno; 948 goto exit; 949 } 950 951 exit: 952 /* state->opaque will be freed in either the _abort or _commit */ 953 qapi_free_BlockdevOptionsGluster(gconf); 954 return ret; 955 } 956 957 static void qemu_gluster_reopen_commit(BDRVReopenState *state) 958 { 959 BDRVGlusterReopenState *reop_s = state->opaque; 960 BDRVGlusterState *s = state->bs->opaque; 961 962 963 /* close the old */ 964 if (s->fd) { 965 glfs_close(s->fd); 966 } 967 968 glfs_clear_preopened(s->glfs); 969 970 /* use the newly opened image / connection */ 971 s->fd = reop_s->fd; 972 s->glfs = reop_s->glfs; 973 974 g_free(state->opaque); 975 state->opaque = NULL; 976 977 return; 978 } 979 980 981 static void qemu_gluster_reopen_abort(BDRVReopenState *state) 982 { 983 BDRVGlusterReopenState *reop_s = state->opaque; 984 985 if (reop_s == NULL) { 986 return; 987 } 988 989 if (reop_s->fd) { 990 glfs_close(reop_s->fd); 991 } 992 993 glfs_clear_preopened(reop_s->glfs); 994 995 g_free(state->opaque); 996 state->opaque = NULL; 997 998 return; 999 } 1000 1001 #ifdef CONFIG_GLUSTERFS_ZEROFILL 1002 static coroutine_fn int qemu_gluster_co_pwrite_zeroes(BlockDriverState *bs, 1003 int64_t offset, 1004 int64_t bytes, 1005 BdrvRequestFlags flags) 1006 { 1007 int ret; 1008 GlusterAIOCB acb; 1009 BDRVGlusterState *s = bs->opaque; 1010 1011 acb.size = bytes; 1012 acb.ret = 0; 1013 acb.coroutine = qemu_coroutine_self(); 1014 acb.aio_context = bdrv_get_aio_context(bs); 1015 1016 ret = glfs_zerofill_async(s->fd, offset, bytes, gluster_finish_aiocb, &acb); 1017 if (ret < 0) { 1018 return -errno; 1019 } 1020 1021 qemu_coroutine_yield(); 1022 return acb.ret; 1023 } 1024 #endif 1025 1026 static int qemu_gluster_do_truncate(struct glfs_fd *fd, int64_t offset, 1027 PreallocMode prealloc, Error **errp) 1028 { 1029 int64_t current_length; 1030 1031 current_length = glfs_lseek(fd, 0, SEEK_END); 1032 if (current_length < 0) { 1033 error_setg_errno(errp, errno, "Failed to determine current size"); 1034 return -errno; 1035 } 1036 1037 if (current_length > offset && prealloc != PREALLOC_MODE_OFF) { 1038 error_setg(errp, "Cannot use preallocation for shrinking files"); 1039 return -ENOTSUP; 1040 } 1041 1042 if (current_length == offset) { 1043 return 0; 1044 } 1045 1046 switch (prealloc) { 1047 #ifdef CONFIG_GLUSTERFS_FALLOCATE 1048 case PREALLOC_MODE_FALLOC: 1049 if (glfs_fallocate(fd, 0, current_length, offset - current_length)) { 1050 error_setg_errno(errp, errno, "Could not preallocate data"); 1051 return -errno; 1052 } 1053 break; 1054 #endif /* CONFIG_GLUSTERFS_FALLOCATE */ 1055 #ifdef CONFIG_GLUSTERFS_ZEROFILL 1056 case PREALLOC_MODE_FULL: 1057 if (glfs_ftruncate(fd, offset)) { 1058 error_setg_errno(errp, errno, "Could not resize file"); 1059 return -errno; 1060 } 1061 if (glfs_zerofill(fd, current_length, offset - current_length)) { 1062 error_setg_errno(errp, errno, "Could not zerofill the new area"); 1063 return -errno; 1064 } 1065 break; 1066 #endif /* CONFIG_GLUSTERFS_ZEROFILL */ 1067 case PREALLOC_MODE_OFF: 1068 if (glfs_ftruncate(fd, offset)) { 1069 error_setg_errno(errp, errno, "Could not resize file"); 1070 return -errno; 1071 } 1072 break; 1073 default: 1074 error_setg(errp, "Unsupported preallocation mode: %s", 1075 PreallocMode_str(prealloc)); 1076 return -EINVAL; 1077 } 1078 1079 return 0; 1080 } 1081 1082 static int qemu_gluster_co_create(BlockdevCreateOptions *options, 1083 Error **errp) 1084 { 1085 BlockdevCreateOptionsGluster *opts = &options->u.gluster; 1086 struct glfs *glfs; 1087 struct glfs_fd *fd = NULL; 1088 int ret = 0; 1089 1090 assert(options->driver == BLOCKDEV_DRIVER_GLUSTER); 1091 1092 glfs = qemu_gluster_glfs_init(opts->location, errp); 1093 if (!glfs) { 1094 ret = -errno; 1095 goto out; 1096 } 1097 1098 fd = glfs_creat(glfs, opts->location->path, 1099 O_WRONLY | O_CREAT | O_TRUNC | O_BINARY, S_IRUSR | S_IWUSR); 1100 if (!fd) { 1101 ret = -errno; 1102 goto out; 1103 } 1104 1105 ret = qemu_gluster_do_truncate(fd, opts->size, opts->preallocation, errp); 1106 1107 out: 1108 if (fd) { 1109 if (glfs_close(fd) != 0 && ret == 0) { 1110 ret = -errno; 1111 } 1112 } 1113 glfs_clear_preopened(glfs); 1114 return ret; 1115 } 1116 1117 static int coroutine_fn qemu_gluster_co_create_opts(BlockDriver *drv, 1118 const char *filename, 1119 QemuOpts *opts, 1120 Error **errp) 1121 { 1122 BlockdevCreateOptions *options; 1123 BlockdevCreateOptionsGluster *gopts; 1124 BlockdevOptionsGluster *gconf; 1125 char *tmp = NULL; 1126 Error *local_err = NULL; 1127 int ret; 1128 1129 options = g_new0(BlockdevCreateOptions, 1); 1130 options->driver = BLOCKDEV_DRIVER_GLUSTER; 1131 gopts = &options->u.gluster; 1132 1133 gconf = g_new0(BlockdevOptionsGluster, 1); 1134 gopts->location = gconf; 1135 1136 gopts->size = ROUND_UP(qemu_opt_get_size_del(opts, BLOCK_OPT_SIZE, 0), 1137 BDRV_SECTOR_SIZE); 1138 1139 tmp = qemu_opt_get_del(opts, BLOCK_OPT_PREALLOC); 1140 gopts->preallocation = qapi_enum_parse(&PreallocMode_lookup, tmp, 1141 PREALLOC_MODE_OFF, &local_err); 1142 g_free(tmp); 1143 if (local_err) { 1144 error_propagate(errp, local_err); 1145 ret = -EINVAL; 1146 goto fail; 1147 } 1148 1149 gconf->debug = qemu_opt_get_number_del(opts, GLUSTER_OPT_DEBUG, 1150 GLUSTER_DEBUG_DEFAULT); 1151 if (gconf->debug < 0) { 1152 gconf->debug = 0; 1153 } else if (gconf->debug > GLUSTER_DEBUG_MAX) { 1154 gconf->debug = GLUSTER_DEBUG_MAX; 1155 } 1156 gconf->has_debug = true; 1157 1158 gconf->logfile = qemu_opt_get_del(opts, GLUSTER_OPT_LOGFILE); 1159 if (!gconf->logfile) { 1160 gconf->logfile = g_strdup(GLUSTER_LOGFILE_DEFAULT); 1161 } 1162 1163 ret = qemu_gluster_parse(gconf, filename, NULL, errp); 1164 if (ret < 0) { 1165 goto fail; 1166 } 1167 1168 ret = qemu_gluster_co_create(options, errp); 1169 if (ret < 0) { 1170 goto fail; 1171 } 1172 1173 ret = 0; 1174 fail: 1175 qapi_free_BlockdevCreateOptions(options); 1176 return ret; 1177 } 1178 1179 static coroutine_fn int qemu_gluster_co_rw(BlockDriverState *bs, 1180 int64_t sector_num, int nb_sectors, 1181 QEMUIOVector *qiov, int write) 1182 { 1183 int ret; 1184 GlusterAIOCB acb; 1185 BDRVGlusterState *s = bs->opaque; 1186 size_t size = nb_sectors * BDRV_SECTOR_SIZE; 1187 off_t offset = sector_num * BDRV_SECTOR_SIZE; 1188 1189 acb.size = size; 1190 acb.ret = 0; 1191 acb.coroutine = qemu_coroutine_self(); 1192 acb.aio_context = bdrv_get_aio_context(bs); 1193 1194 if (write) { 1195 ret = glfs_pwritev_async(s->fd, qiov->iov, qiov->niov, offset, 0, 1196 gluster_finish_aiocb, &acb); 1197 } else { 1198 ret = glfs_preadv_async(s->fd, qiov->iov, qiov->niov, offset, 0, 1199 gluster_finish_aiocb, &acb); 1200 } 1201 1202 if (ret < 0) { 1203 return -errno; 1204 } 1205 1206 qemu_coroutine_yield(); 1207 return acb.ret; 1208 } 1209 1210 static coroutine_fn int qemu_gluster_co_truncate(BlockDriverState *bs, 1211 int64_t offset, 1212 bool exact, 1213 PreallocMode prealloc, 1214 BdrvRequestFlags flags, 1215 Error **errp) 1216 { 1217 BDRVGlusterState *s = bs->opaque; 1218 return qemu_gluster_do_truncate(s->fd, offset, prealloc, errp); 1219 } 1220 1221 static coroutine_fn int qemu_gluster_co_readv(BlockDriverState *bs, 1222 int64_t sector_num, 1223 int nb_sectors, 1224 QEMUIOVector *qiov) 1225 { 1226 return qemu_gluster_co_rw(bs, sector_num, nb_sectors, qiov, 0); 1227 } 1228 1229 static coroutine_fn int qemu_gluster_co_writev(BlockDriverState *bs, 1230 int64_t sector_num, 1231 int nb_sectors, 1232 QEMUIOVector *qiov, 1233 int flags) 1234 { 1235 return qemu_gluster_co_rw(bs, sector_num, nb_sectors, qiov, 1); 1236 } 1237 1238 static void qemu_gluster_close(BlockDriverState *bs) 1239 { 1240 BDRVGlusterState *s = bs->opaque; 1241 1242 g_free(s->logfile); 1243 if (s->fd) { 1244 glfs_close(s->fd); 1245 s->fd = NULL; 1246 } 1247 glfs_clear_preopened(s->glfs); 1248 } 1249 1250 static coroutine_fn int qemu_gluster_co_flush_to_disk(BlockDriverState *bs) 1251 { 1252 int ret; 1253 GlusterAIOCB acb; 1254 BDRVGlusterState *s = bs->opaque; 1255 1256 acb.size = 0; 1257 acb.ret = 0; 1258 acb.coroutine = qemu_coroutine_self(); 1259 acb.aio_context = bdrv_get_aio_context(bs); 1260 1261 ret = glfs_fsync_async(s->fd, gluster_finish_aiocb, &acb); 1262 if (ret < 0) { 1263 ret = -errno; 1264 goto error; 1265 } 1266 1267 qemu_coroutine_yield(); 1268 if (acb.ret < 0) { 1269 ret = acb.ret; 1270 goto error; 1271 } 1272 1273 return acb.ret; 1274 1275 error: 1276 /* Some versions of Gluster (3.5.6 -> 3.5.8?) will not retain its cache 1277 * after a fsync failure, so we have no way of allowing the guest to safely 1278 * continue. Gluster versions prior to 3.5.6 don't retain the cache 1279 * either, but will invalidate the fd on error, so this is again our only 1280 * option. 1281 * 1282 * The 'resync-failed-syncs-after-fsync' xlator option for the 1283 * write-behind cache will cause later gluster versions to retain its 1284 * cache after error, so long as the fd remains open. However, we 1285 * currently have no way of knowing if this option is supported. 1286 * 1287 * TODO: Once gluster provides a way for us to determine if the option 1288 * is supported, bypass the closure and setting drv to NULL. */ 1289 qemu_gluster_close(bs); 1290 bs->drv = NULL; 1291 return ret; 1292 } 1293 1294 #ifdef CONFIG_GLUSTERFS_DISCARD 1295 static coroutine_fn int qemu_gluster_co_pdiscard(BlockDriverState *bs, 1296 int64_t offset, int64_t bytes) 1297 { 1298 int ret; 1299 GlusterAIOCB acb; 1300 BDRVGlusterState *s = bs->opaque; 1301 1302 assert(bytes <= SIZE_MAX); /* rely on max_pdiscard */ 1303 1304 acb.size = 0; 1305 acb.ret = 0; 1306 acb.coroutine = qemu_coroutine_self(); 1307 acb.aio_context = bdrv_get_aio_context(bs); 1308 1309 ret = glfs_discard_async(s->fd, offset, bytes, gluster_finish_aiocb, &acb); 1310 if (ret < 0) { 1311 return -errno; 1312 } 1313 1314 qemu_coroutine_yield(); 1315 return acb.ret; 1316 } 1317 #endif 1318 1319 static int64_t coroutine_fn qemu_gluster_co_getlength(BlockDriverState *bs) 1320 { 1321 BDRVGlusterState *s = bs->opaque; 1322 int64_t ret; 1323 1324 ret = glfs_lseek(s->fd, 0, SEEK_END); 1325 if (ret < 0) { 1326 return -errno; 1327 } else { 1328 return ret; 1329 } 1330 } 1331 1332 static int64_t coroutine_fn 1333 qemu_gluster_co_get_allocated_file_size(BlockDriverState *bs) 1334 { 1335 BDRVGlusterState *s = bs->opaque; 1336 struct stat st; 1337 int ret; 1338 1339 ret = glfs_fstat(s->fd, &st); 1340 if (ret < 0) { 1341 return -errno; 1342 } else { 1343 return st.st_blocks * 512; 1344 } 1345 } 1346 1347 /* 1348 * Find allocation range in @bs around offset @start. 1349 * May change underlying file descriptor's file offset. 1350 * If @start is not in a hole, store @start in @data, and the 1351 * beginning of the next hole in @hole, and return 0. 1352 * If @start is in a non-trailing hole, store @start in @hole and the 1353 * beginning of the next non-hole in @data, and return 0. 1354 * If @start is in a trailing hole or beyond EOF, return -ENXIO. 1355 * If we can't find out, return a negative errno other than -ENXIO. 1356 * 1357 * (Shamefully copied from file-posix.c, only minuscule adaptions.) 1358 */ 1359 static int find_allocation(BlockDriverState *bs, off_t start, 1360 off_t *data, off_t *hole) 1361 { 1362 BDRVGlusterState *s = bs->opaque; 1363 1364 if (!s->supports_seek_data) { 1365 goto exit; 1366 } 1367 1368 #if defined SEEK_HOLE && defined SEEK_DATA 1369 off_t offs; 1370 1371 /* 1372 * SEEK_DATA cases: 1373 * D1. offs == start: start is in data 1374 * D2. offs > start: start is in a hole, next data at offs 1375 * D3. offs < 0, errno = ENXIO: either start is in a trailing hole 1376 * or start is beyond EOF 1377 * If the latter happens, the file has been truncated behind 1378 * our back since we opened it. All bets are off then. 1379 * Treating like a trailing hole is simplest. 1380 * D4. offs < 0, errno != ENXIO: we learned nothing 1381 */ 1382 offs = glfs_lseek(s->fd, start, SEEK_DATA); 1383 if (offs < 0) { 1384 return -errno; /* D3 or D4 */ 1385 } 1386 1387 if (offs < start) { 1388 /* This is not a valid return by lseek(). We are safe to just return 1389 * -EIO in this case, and we'll treat it like D4. Unfortunately some 1390 * versions of gluster server will return offs < start, so an assert 1391 * here will unnecessarily abort QEMU. */ 1392 return -EIO; 1393 } 1394 1395 if (offs > start) { 1396 /* D2: in hole, next data at offs */ 1397 *hole = start; 1398 *data = offs; 1399 return 0; 1400 } 1401 1402 /* D1: in data, end not yet known */ 1403 1404 /* 1405 * SEEK_HOLE cases: 1406 * H1. offs == start: start is in a hole 1407 * If this happens here, a hole has been dug behind our back 1408 * since the previous lseek(). 1409 * H2. offs > start: either start is in data, next hole at offs, 1410 * or start is in trailing hole, EOF at offs 1411 * Linux treats trailing holes like any other hole: offs == 1412 * start. Solaris seeks to EOF instead: offs > start (blech). 1413 * If that happens here, a hole has been dug behind our back 1414 * since the previous lseek(). 1415 * H3. offs < 0, errno = ENXIO: start is beyond EOF 1416 * If this happens, the file has been truncated behind our 1417 * back since we opened it. Treat it like a trailing hole. 1418 * H4. offs < 0, errno != ENXIO: we learned nothing 1419 * Pretend we know nothing at all, i.e. "forget" about D1. 1420 */ 1421 offs = glfs_lseek(s->fd, start, SEEK_HOLE); 1422 if (offs < 0) { 1423 return -errno; /* D1 and (H3 or H4) */ 1424 } 1425 1426 if (offs < start) { 1427 /* This is not a valid return by lseek(). We are safe to just return 1428 * -EIO in this case, and we'll treat it like H4. Unfortunately some 1429 * versions of gluster server will return offs < start, so an assert 1430 * here will unnecessarily abort QEMU. */ 1431 return -EIO; 1432 } 1433 1434 if (offs > start) { 1435 /* 1436 * D1 and H2: either in data, next hole at offs, or it was in 1437 * data but is now in a trailing hole. In the latter case, 1438 * all bets are off. Treating it as if it there was data all 1439 * the way to EOF is safe, so simply do that. 1440 */ 1441 *data = start; 1442 *hole = offs; 1443 return 0; 1444 } 1445 1446 /* D1 and H1 */ 1447 return -EBUSY; 1448 #endif 1449 1450 exit: 1451 return -ENOTSUP; 1452 } 1453 1454 /* 1455 * Returns the allocation status of the specified offset. 1456 * 1457 * The block layer guarantees 'offset' and 'bytes' are within bounds. 1458 * 1459 * 'pnum' is set to the number of bytes (including and immediately following 1460 * the specified offset) that are known to be in the same 1461 * allocated/unallocated state. 1462 * 1463 * 'bytes' is a soft cap for 'pnum'. If the information is free, 'pnum' may 1464 * well exceed it. 1465 * 1466 * (Based on raw_co_block_status() from file-posix.c.) 1467 */ 1468 static int coroutine_fn qemu_gluster_co_block_status(BlockDriverState *bs, 1469 bool want_zero, 1470 int64_t offset, 1471 int64_t bytes, 1472 int64_t *pnum, 1473 int64_t *map, 1474 BlockDriverState **file) 1475 { 1476 BDRVGlusterState *s = bs->opaque; 1477 off_t data = 0, hole = 0; 1478 int ret = -EINVAL; 1479 1480 assert(QEMU_IS_ALIGNED(offset | bytes, bs->bl.request_alignment)); 1481 1482 if (!s->fd) { 1483 return ret; 1484 } 1485 1486 if (!want_zero) { 1487 *pnum = bytes; 1488 *map = offset; 1489 *file = bs; 1490 return BDRV_BLOCK_DATA | BDRV_BLOCK_OFFSET_VALID; 1491 } 1492 1493 ret = find_allocation(bs, offset, &data, &hole); 1494 if (ret == -ENXIO) { 1495 /* Trailing hole */ 1496 *pnum = bytes; 1497 ret = BDRV_BLOCK_ZERO; 1498 } else if (ret < 0) { 1499 /* No info available, so pretend there are no holes */ 1500 *pnum = bytes; 1501 ret = BDRV_BLOCK_DATA; 1502 } else if (data == offset) { 1503 /* On a data extent, compute bytes to the end of the extent, 1504 * possibly including a partial sector at EOF. */ 1505 *pnum = hole - offset; 1506 1507 /* 1508 * We are not allowed to return partial sectors, though, so 1509 * round up if necessary. 1510 */ 1511 if (!QEMU_IS_ALIGNED(*pnum, bs->bl.request_alignment)) { 1512 int64_t file_length = qemu_gluster_co_getlength(bs); 1513 if (file_length > 0) { 1514 /* Ignore errors, this is just a safeguard */ 1515 assert(hole == file_length); 1516 } 1517 *pnum = ROUND_UP(*pnum, bs->bl.request_alignment); 1518 } 1519 1520 ret = BDRV_BLOCK_DATA; 1521 } else { 1522 /* On a hole, compute bytes to the beginning of the next extent. */ 1523 assert(hole == offset); 1524 *pnum = data - offset; 1525 ret = BDRV_BLOCK_ZERO; 1526 } 1527 1528 *map = offset; 1529 *file = bs; 1530 1531 return ret | BDRV_BLOCK_OFFSET_VALID; 1532 } 1533 1534 1535 static const char *const gluster_strong_open_opts[] = { 1536 GLUSTER_OPT_VOLUME, 1537 GLUSTER_OPT_PATH, 1538 GLUSTER_OPT_TYPE, 1539 GLUSTER_OPT_SERVER_PATTERN, 1540 GLUSTER_OPT_HOST, 1541 GLUSTER_OPT_PORT, 1542 GLUSTER_OPT_TO, 1543 GLUSTER_OPT_IPV4, 1544 GLUSTER_OPT_IPV6, 1545 GLUSTER_OPT_SOCKET, 1546 1547 NULL 1548 }; 1549 1550 static BlockDriver bdrv_gluster = { 1551 .format_name = "gluster", 1552 .protocol_name = "gluster", 1553 .instance_size = sizeof(BDRVGlusterState), 1554 .bdrv_open = qemu_gluster_open, 1555 .bdrv_reopen_prepare = qemu_gluster_reopen_prepare, 1556 .bdrv_reopen_commit = qemu_gluster_reopen_commit, 1557 .bdrv_reopen_abort = qemu_gluster_reopen_abort, 1558 .bdrv_close = qemu_gluster_close, 1559 .bdrv_co_create = qemu_gluster_co_create, 1560 .bdrv_co_create_opts = qemu_gluster_co_create_opts, 1561 .bdrv_co_getlength = qemu_gluster_co_getlength, 1562 .bdrv_co_get_allocated_file_size = qemu_gluster_co_get_allocated_file_size, 1563 .bdrv_co_truncate = qemu_gluster_co_truncate, 1564 .bdrv_co_readv = qemu_gluster_co_readv, 1565 .bdrv_co_writev = qemu_gluster_co_writev, 1566 .bdrv_co_flush_to_disk = qemu_gluster_co_flush_to_disk, 1567 #ifdef CONFIG_GLUSTERFS_DISCARD 1568 .bdrv_co_pdiscard = qemu_gluster_co_pdiscard, 1569 #endif 1570 #ifdef CONFIG_GLUSTERFS_ZEROFILL 1571 .bdrv_co_pwrite_zeroes = qemu_gluster_co_pwrite_zeroes, 1572 #endif 1573 .bdrv_co_block_status = qemu_gluster_co_block_status, 1574 .bdrv_refresh_limits = qemu_gluster_refresh_limits, 1575 .create_opts = &qemu_gluster_create_opts, 1576 .strong_runtime_opts = gluster_strong_open_opts, 1577 }; 1578 1579 static BlockDriver bdrv_gluster_tcp = { 1580 .format_name = "gluster", 1581 .protocol_name = "gluster+tcp", 1582 .instance_size = sizeof(BDRVGlusterState), 1583 .bdrv_open = qemu_gluster_open, 1584 .bdrv_reopen_prepare = qemu_gluster_reopen_prepare, 1585 .bdrv_reopen_commit = qemu_gluster_reopen_commit, 1586 .bdrv_reopen_abort = qemu_gluster_reopen_abort, 1587 .bdrv_close = qemu_gluster_close, 1588 .bdrv_co_create = qemu_gluster_co_create, 1589 .bdrv_co_create_opts = qemu_gluster_co_create_opts, 1590 .bdrv_co_getlength = qemu_gluster_co_getlength, 1591 .bdrv_co_get_allocated_file_size = qemu_gluster_co_get_allocated_file_size, 1592 .bdrv_co_truncate = qemu_gluster_co_truncate, 1593 .bdrv_co_readv = qemu_gluster_co_readv, 1594 .bdrv_co_writev = qemu_gluster_co_writev, 1595 .bdrv_co_flush_to_disk = qemu_gluster_co_flush_to_disk, 1596 #ifdef CONFIG_GLUSTERFS_DISCARD 1597 .bdrv_co_pdiscard = qemu_gluster_co_pdiscard, 1598 #endif 1599 #ifdef CONFIG_GLUSTERFS_ZEROFILL 1600 .bdrv_co_pwrite_zeroes = qemu_gluster_co_pwrite_zeroes, 1601 #endif 1602 .bdrv_co_block_status = qemu_gluster_co_block_status, 1603 .bdrv_refresh_limits = qemu_gluster_refresh_limits, 1604 .create_opts = &qemu_gluster_create_opts, 1605 .strong_runtime_opts = gluster_strong_open_opts, 1606 }; 1607 1608 static BlockDriver bdrv_gluster_unix = { 1609 .format_name = "gluster", 1610 .protocol_name = "gluster+unix", 1611 .instance_size = sizeof(BDRVGlusterState), 1612 .bdrv_open = qemu_gluster_open, 1613 .bdrv_reopen_prepare = qemu_gluster_reopen_prepare, 1614 .bdrv_reopen_commit = qemu_gluster_reopen_commit, 1615 .bdrv_reopen_abort = qemu_gluster_reopen_abort, 1616 .bdrv_close = qemu_gluster_close, 1617 .bdrv_co_create = qemu_gluster_co_create, 1618 .bdrv_co_create_opts = qemu_gluster_co_create_opts, 1619 .bdrv_co_getlength = qemu_gluster_co_getlength, 1620 .bdrv_co_get_allocated_file_size = qemu_gluster_co_get_allocated_file_size, 1621 .bdrv_co_truncate = qemu_gluster_co_truncate, 1622 .bdrv_co_readv = qemu_gluster_co_readv, 1623 .bdrv_co_writev = qemu_gluster_co_writev, 1624 .bdrv_co_flush_to_disk = qemu_gluster_co_flush_to_disk, 1625 #ifdef CONFIG_GLUSTERFS_DISCARD 1626 .bdrv_co_pdiscard = qemu_gluster_co_pdiscard, 1627 #endif 1628 #ifdef CONFIG_GLUSTERFS_ZEROFILL 1629 .bdrv_co_pwrite_zeroes = qemu_gluster_co_pwrite_zeroes, 1630 #endif 1631 .bdrv_co_block_status = qemu_gluster_co_block_status, 1632 .bdrv_refresh_limits = qemu_gluster_refresh_limits, 1633 .create_opts = &qemu_gluster_create_opts, 1634 .strong_runtime_opts = gluster_strong_open_opts, 1635 }; 1636 1637 static void bdrv_gluster_init(void) 1638 { 1639 bdrv_register(&bdrv_gluster_unix); 1640 bdrv_register(&bdrv_gluster_tcp); 1641 bdrv_register(&bdrv_gluster); 1642 } 1643 1644 block_init(bdrv_gluster_init); 1645