1 /* 2 * QEMU Block driver for RADOS (Ceph) 3 * 4 * Copyright (C) 2010-2011 Christian Brunner <chb@muc.de>, 5 * Josh Durgin <josh.durgin@dreamhost.com> 6 * 7 * This work is licensed under the terms of the GNU GPL, version 2. See 8 * the COPYING file in the top-level directory. 9 * 10 * Contributions after 2012-01-13 are licensed under the terms of the 11 * GNU GPL, version 2 or (at your option) any later version. 12 */ 13 14 #include "qemu/osdep.h" 15 16 #include <rbd/librbd.h> 17 #include "qapi/error.h" 18 #include "qemu/error-report.h" 19 #include "qemu/module.h" 20 #include "qemu/option.h" 21 #include "block/block-io.h" 22 #include "block/block_int.h" 23 #include "block/qdict.h" 24 #include "crypto/secret.h" 25 #include "qemu/cutils.h" 26 #include "sysemu/replay.h" 27 #include "qapi/qmp/qstring.h" 28 #include "qapi/qmp/qdict.h" 29 #include "qapi/qmp/qjson.h" 30 #include "qapi/qmp/qlist.h" 31 #include "qapi/qobject-input-visitor.h" 32 #include "qapi/qapi-visit-block-core.h" 33 34 /* 35 * When specifying the image filename use: 36 * 37 * rbd:poolname/devicename[@snapshotname][:option1=value1[:option2=value2...]] 38 * 39 * poolname must be the name of an existing rados pool. 40 * 41 * devicename is the name of the rbd image. 42 * 43 * Each option given is used to configure rados, and may be any valid 44 * Ceph option, "id", or "conf". 45 * 46 * The "id" option indicates what user we should authenticate as to 47 * the Ceph cluster. If it is excluded we will use the Ceph default 48 * (normally 'admin'). 49 * 50 * The "conf" option specifies a Ceph configuration file to read. If 51 * it is not specified, we will read from the default Ceph locations 52 * (e.g., /etc/ceph/ceph.conf). To avoid reading _any_ configuration 53 * file, specify conf=/dev/null. 54 * 55 * Configuration values containing :, @, or = can be escaped with a 56 * leading "\". 57 */ 58 59 #define OBJ_MAX_SIZE (1UL << OBJ_DEFAULT_OBJ_ORDER) 60 61 #define RBD_MAX_SNAPS 100 62 63 #define RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN 8 64 65 static const char rbd_luks_header_verification[ 66 RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = { 67 'L', 'U', 'K', 'S', 0xBA, 0xBE, 0, 1 68 }; 69 70 static const char rbd_luks2_header_verification[ 71 RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = { 72 'L', 'U', 'K', 'S', 0xBA, 0xBE, 0, 2 73 }; 74 75 static const char rbd_layered_luks_header_verification[ 76 RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = { 77 'R', 'B', 'D', 'L', 0xBA, 0xBE, 0, 1 78 }; 79 80 static const char rbd_layered_luks2_header_verification[ 81 RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = { 82 'R', 'B', 'D', 'L', 0xBA, 0xBE, 0, 2 83 }; 84 85 typedef enum { 86 RBD_AIO_READ, 87 RBD_AIO_WRITE, 88 RBD_AIO_DISCARD, 89 RBD_AIO_FLUSH, 90 RBD_AIO_WRITE_ZEROES 91 } RBDAIOCmd; 92 93 typedef struct BDRVRBDState { 94 rados_t cluster; 95 rados_ioctx_t io_ctx; 96 rbd_image_t image; 97 char *image_name; 98 char *snap; 99 char *namespace; 100 uint64_t image_size; 101 uint64_t object_size; 102 } BDRVRBDState; 103 104 typedef struct RBDTask { 105 BlockDriverState *bs; 106 Coroutine *co; 107 bool complete; 108 int64_t ret; 109 } RBDTask; 110 111 typedef struct RBDDiffIterateReq { 112 uint64_t offs; 113 uint64_t bytes; 114 bool exists; 115 } RBDDiffIterateReq; 116 117 static int qemu_rbd_connect(rados_t *cluster, rados_ioctx_t *io_ctx, 118 BlockdevOptionsRbd *opts, bool cache, 119 const char *keypairs, const char *secretid, 120 Error **errp); 121 122 static char *qemu_rbd_strchr(char *src, char delim) 123 { 124 char *p; 125 126 for (p = src; *p; ++p) { 127 if (*p == delim) { 128 return p; 129 } 130 if (*p == '\\' && p[1] != '\0') { 131 ++p; 132 } 133 } 134 135 return NULL; 136 } 137 138 139 static char *qemu_rbd_next_tok(char *src, char delim, char **p) 140 { 141 char *end; 142 143 *p = NULL; 144 145 end = qemu_rbd_strchr(src, delim); 146 if (end) { 147 *p = end + 1; 148 *end = '\0'; 149 } 150 return src; 151 } 152 153 static void qemu_rbd_unescape(char *src) 154 { 155 char *p; 156 157 for (p = src; *src; ++src, ++p) { 158 if (*src == '\\' && src[1] != '\0') { 159 src++; 160 } 161 *p = *src; 162 } 163 *p = '\0'; 164 } 165 166 static void qemu_rbd_parse_filename(const char *filename, QDict *options, 167 Error **errp) 168 { 169 const char *start; 170 char *p, *buf; 171 QList *keypairs = NULL; 172 char *found_str, *image_name; 173 174 if (!strstart(filename, "rbd:", &start)) { 175 error_setg(errp, "File name must start with 'rbd:'"); 176 return; 177 } 178 179 buf = g_strdup(start); 180 p = buf; 181 182 found_str = qemu_rbd_next_tok(p, '/', &p); 183 if (!p) { 184 error_setg(errp, "Pool name is required"); 185 goto done; 186 } 187 qemu_rbd_unescape(found_str); 188 qdict_put_str(options, "pool", found_str); 189 190 if (qemu_rbd_strchr(p, '@')) { 191 image_name = qemu_rbd_next_tok(p, '@', &p); 192 193 found_str = qemu_rbd_next_tok(p, ':', &p); 194 qemu_rbd_unescape(found_str); 195 qdict_put_str(options, "snapshot", found_str); 196 } else { 197 image_name = qemu_rbd_next_tok(p, ':', &p); 198 } 199 /* Check for namespace in the image_name */ 200 if (qemu_rbd_strchr(image_name, '/')) { 201 found_str = qemu_rbd_next_tok(image_name, '/', &image_name); 202 qemu_rbd_unescape(found_str); 203 qdict_put_str(options, "namespace", found_str); 204 } else { 205 qdict_put_str(options, "namespace", ""); 206 } 207 qemu_rbd_unescape(image_name); 208 qdict_put_str(options, "image", image_name); 209 if (!p) { 210 goto done; 211 } 212 213 /* The following are essentially all key/value pairs, and we treat 214 * 'id' and 'conf' a bit special. Key/value pairs may be in any order. */ 215 while (p) { 216 char *name, *value; 217 name = qemu_rbd_next_tok(p, '=', &p); 218 if (!p) { 219 error_setg(errp, "conf option %s has no value", name); 220 break; 221 } 222 223 qemu_rbd_unescape(name); 224 225 value = qemu_rbd_next_tok(p, ':', &p); 226 qemu_rbd_unescape(value); 227 228 if (!strcmp(name, "conf")) { 229 qdict_put_str(options, "conf", value); 230 } else if (!strcmp(name, "id")) { 231 qdict_put_str(options, "user", value); 232 } else { 233 /* 234 * We pass these internally to qemu_rbd_set_keypairs(), so 235 * we can get away with the simpler list of [ "key1", 236 * "value1", "key2", "value2" ] rather than a raw dict 237 * { "key1": "value1", "key2": "value2" } where we can't 238 * guarantee order, or even a more correct but complex 239 * [ { "key1": "value1" }, { "key2": "value2" } ] 240 */ 241 if (!keypairs) { 242 keypairs = qlist_new(); 243 } 244 qlist_append_str(keypairs, name); 245 qlist_append_str(keypairs, value); 246 } 247 } 248 249 if (keypairs) { 250 qdict_put(options, "=keyvalue-pairs", 251 qstring_from_gstring(qobject_to_json(QOBJECT(keypairs)))); 252 } 253 254 done: 255 g_free(buf); 256 qobject_unref(keypairs); 257 return; 258 } 259 260 static int qemu_rbd_set_auth(rados_t cluster, BlockdevOptionsRbd *opts, 261 Error **errp) 262 { 263 char *key, *acr; 264 int r; 265 GString *accu; 266 RbdAuthModeList *auth; 267 268 if (opts->key_secret) { 269 key = qcrypto_secret_lookup_as_base64(opts->key_secret, errp); 270 if (!key) { 271 return -EIO; 272 } 273 r = rados_conf_set(cluster, "key", key); 274 g_free(key); 275 if (r < 0) { 276 error_setg_errno(errp, -r, "Could not set 'key'"); 277 return r; 278 } 279 } 280 281 if (opts->has_auth_client_required) { 282 accu = g_string_new(""); 283 for (auth = opts->auth_client_required; auth; auth = auth->next) { 284 if (accu->str[0]) { 285 g_string_append_c(accu, ';'); 286 } 287 g_string_append(accu, RbdAuthMode_str(auth->value)); 288 } 289 acr = g_string_free(accu, FALSE); 290 r = rados_conf_set(cluster, "auth_client_required", acr); 291 g_free(acr); 292 if (r < 0) { 293 error_setg_errno(errp, -r, 294 "Could not set 'auth_client_required'"); 295 return r; 296 } 297 } 298 299 return 0; 300 } 301 302 static int qemu_rbd_set_keypairs(rados_t cluster, const char *keypairs_json, 303 Error **errp) 304 { 305 QList *keypairs; 306 QString *name; 307 QString *value; 308 const char *key; 309 size_t remaining; 310 int ret = 0; 311 312 if (!keypairs_json) { 313 return ret; 314 } 315 keypairs = qobject_to(QList, 316 qobject_from_json(keypairs_json, &error_abort)); 317 remaining = qlist_size(keypairs) / 2; 318 assert(remaining); 319 320 while (remaining--) { 321 name = qobject_to(QString, qlist_pop(keypairs)); 322 value = qobject_to(QString, qlist_pop(keypairs)); 323 assert(name && value); 324 key = qstring_get_str(name); 325 326 ret = rados_conf_set(cluster, key, qstring_get_str(value)); 327 qobject_unref(value); 328 if (ret < 0) { 329 error_setg_errno(errp, -ret, "invalid conf option %s", key); 330 qobject_unref(name); 331 ret = -EINVAL; 332 break; 333 } 334 qobject_unref(name); 335 } 336 337 qobject_unref(keypairs); 338 return ret; 339 } 340 341 #ifdef LIBRBD_SUPPORTS_ENCRYPTION 342 static int qemu_rbd_convert_luks_options( 343 RbdEncryptionOptionsLUKSBase *luks_opts, 344 char **passphrase, 345 size_t *passphrase_len, 346 Error **errp) 347 { 348 return qcrypto_secret_lookup(luks_opts->key_secret, (uint8_t **)passphrase, 349 passphrase_len, errp); 350 } 351 352 static int qemu_rbd_convert_luks_create_options( 353 RbdEncryptionCreateOptionsLUKSBase *luks_opts, 354 rbd_encryption_algorithm_t *alg, 355 char **passphrase, 356 size_t *passphrase_len, 357 Error **errp) 358 { 359 int r = 0; 360 361 r = qemu_rbd_convert_luks_options( 362 qapi_RbdEncryptionCreateOptionsLUKSBase_base(luks_opts), 363 passphrase, passphrase_len, errp); 364 if (r < 0) { 365 return r; 366 } 367 368 if (luks_opts->has_cipher_alg) { 369 switch (luks_opts->cipher_alg) { 370 case QCRYPTO_CIPHER_ALGO_AES_128: { 371 *alg = RBD_ENCRYPTION_ALGORITHM_AES128; 372 break; 373 } 374 case QCRYPTO_CIPHER_ALGO_AES_256: { 375 *alg = RBD_ENCRYPTION_ALGORITHM_AES256; 376 break; 377 } 378 default: { 379 r = -ENOTSUP; 380 error_setg_errno(errp, -r, "unknown encryption algorithm: %u", 381 luks_opts->cipher_alg); 382 return r; 383 } 384 } 385 } else { 386 /* default alg */ 387 *alg = RBD_ENCRYPTION_ALGORITHM_AES256; 388 } 389 390 return 0; 391 } 392 393 static int qemu_rbd_encryption_format(rbd_image_t image, 394 RbdEncryptionCreateOptions *encrypt, 395 Error **errp) 396 { 397 int r = 0; 398 g_autofree char *passphrase = NULL; 399 rbd_encryption_format_t format; 400 rbd_encryption_options_t opts; 401 rbd_encryption_luks1_format_options_t luks_opts; 402 rbd_encryption_luks2_format_options_t luks2_opts; 403 size_t opts_size; 404 uint64_t raw_size, effective_size; 405 406 r = rbd_get_size(image, &raw_size); 407 if (r < 0) { 408 error_setg_errno(errp, -r, "cannot get raw image size"); 409 return r; 410 } 411 412 switch (encrypt->format) { 413 case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS: { 414 memset(&luks_opts, 0, sizeof(luks_opts)); 415 format = RBD_ENCRYPTION_FORMAT_LUKS1; 416 opts = &luks_opts; 417 opts_size = sizeof(luks_opts); 418 r = qemu_rbd_convert_luks_create_options( 419 qapi_RbdEncryptionCreateOptionsLUKS_base(&encrypt->u.luks), 420 &luks_opts.alg, &passphrase, &luks_opts.passphrase_size, 421 errp); 422 if (r < 0) { 423 return r; 424 } 425 luks_opts.passphrase = passphrase; 426 break; 427 } 428 case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2: { 429 memset(&luks2_opts, 0, sizeof(luks2_opts)); 430 format = RBD_ENCRYPTION_FORMAT_LUKS2; 431 opts = &luks2_opts; 432 opts_size = sizeof(luks2_opts); 433 r = qemu_rbd_convert_luks_create_options( 434 qapi_RbdEncryptionCreateOptionsLUKS2_base( 435 &encrypt->u.luks2), 436 &luks2_opts.alg, &passphrase, &luks2_opts.passphrase_size, 437 errp); 438 if (r < 0) { 439 return r; 440 } 441 luks2_opts.passphrase = passphrase; 442 break; 443 } 444 default: { 445 r = -ENOTSUP; 446 error_setg_errno( 447 errp, -r, "unknown image encryption format: %u", 448 encrypt->format); 449 return r; 450 } 451 } 452 453 r = rbd_encryption_format(image, format, opts, opts_size); 454 if (r < 0) { 455 error_setg_errno(errp, -r, "encryption format fail"); 456 return r; 457 } 458 459 r = rbd_get_size(image, &effective_size); 460 if (r < 0) { 461 error_setg_errno(errp, -r, "cannot get effective image size"); 462 return r; 463 } 464 465 r = rbd_resize(image, raw_size + (raw_size - effective_size)); 466 if (r < 0) { 467 error_setg_errno(errp, -r, "cannot resize image after format"); 468 return r; 469 } 470 471 return 0; 472 } 473 474 static int qemu_rbd_encryption_load(rbd_image_t image, 475 RbdEncryptionOptions *encrypt, 476 Error **errp) 477 { 478 int r = 0; 479 g_autofree char *passphrase = NULL; 480 rbd_encryption_luks1_format_options_t luks_opts; 481 rbd_encryption_luks2_format_options_t luks2_opts; 482 #ifdef LIBRBD_SUPPORTS_ENCRYPTION_LOAD2 483 rbd_encryption_luks_format_options_t luks_any_opts; 484 #endif 485 rbd_encryption_format_t format; 486 rbd_encryption_options_t opts; 487 size_t opts_size; 488 489 switch (encrypt->format) { 490 case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS: { 491 memset(&luks_opts, 0, sizeof(luks_opts)); 492 format = RBD_ENCRYPTION_FORMAT_LUKS1; 493 opts = &luks_opts; 494 opts_size = sizeof(luks_opts); 495 r = qemu_rbd_convert_luks_options( 496 qapi_RbdEncryptionOptionsLUKS_base(&encrypt->u.luks), 497 &passphrase, &luks_opts.passphrase_size, errp); 498 if (r < 0) { 499 return r; 500 } 501 luks_opts.passphrase = passphrase; 502 break; 503 } 504 case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2: { 505 memset(&luks2_opts, 0, sizeof(luks2_opts)); 506 format = RBD_ENCRYPTION_FORMAT_LUKS2; 507 opts = &luks2_opts; 508 opts_size = sizeof(luks2_opts); 509 r = qemu_rbd_convert_luks_options( 510 qapi_RbdEncryptionOptionsLUKS2_base(&encrypt->u.luks2), 511 &passphrase, &luks2_opts.passphrase_size, errp); 512 if (r < 0) { 513 return r; 514 } 515 luks2_opts.passphrase = passphrase; 516 break; 517 } 518 #ifdef LIBRBD_SUPPORTS_ENCRYPTION_LOAD2 519 case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS_ANY: { 520 memset(&luks_any_opts, 0, sizeof(luks_any_opts)); 521 format = RBD_ENCRYPTION_FORMAT_LUKS; 522 opts = &luks_any_opts; 523 opts_size = sizeof(luks_any_opts); 524 r = qemu_rbd_convert_luks_options( 525 qapi_RbdEncryptionOptionsLUKSAny_base(&encrypt->u.luks_any), 526 &passphrase, &luks_any_opts.passphrase_size, errp); 527 if (r < 0) { 528 return r; 529 } 530 luks_any_opts.passphrase = passphrase; 531 break; 532 } 533 #endif 534 default: { 535 r = -ENOTSUP; 536 error_setg_errno( 537 errp, -r, "unknown image encryption format: %u", 538 encrypt->format); 539 return r; 540 } 541 } 542 543 r = rbd_encryption_load(image, format, opts, opts_size); 544 if (r < 0) { 545 error_setg_errno(errp, -r, "encryption load fail"); 546 return r; 547 } 548 549 return 0; 550 } 551 552 #ifdef LIBRBD_SUPPORTS_ENCRYPTION_LOAD2 553 static int qemu_rbd_encryption_load2(rbd_image_t image, 554 RbdEncryptionOptions *encrypt, 555 Error **errp) 556 { 557 int r = 0; 558 int encrypt_count = 1; 559 int i; 560 RbdEncryptionOptions *curr_encrypt; 561 rbd_encryption_spec_t *specs; 562 rbd_encryption_luks1_format_options_t *luks_opts; 563 rbd_encryption_luks2_format_options_t *luks2_opts; 564 rbd_encryption_luks_format_options_t *luks_any_opts; 565 566 /* count encryption options */ 567 for (curr_encrypt = encrypt->parent; curr_encrypt; 568 curr_encrypt = curr_encrypt->parent) { 569 ++encrypt_count; 570 } 571 572 specs = g_new0(rbd_encryption_spec_t, encrypt_count); 573 574 curr_encrypt = encrypt; 575 for (i = 0; i < encrypt_count; ++i) { 576 switch (curr_encrypt->format) { 577 case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS: { 578 specs[i].format = RBD_ENCRYPTION_FORMAT_LUKS1; 579 580 luks_opts = g_new0(rbd_encryption_luks1_format_options_t, 1); 581 specs[i].opts = luks_opts; 582 specs[i].opts_size = sizeof(*luks_opts); 583 584 r = qemu_rbd_convert_luks_options( 585 qapi_RbdEncryptionOptionsLUKS_base( 586 &curr_encrypt->u.luks), 587 (char **)&luks_opts->passphrase, 588 &luks_opts->passphrase_size, 589 errp); 590 break; 591 } 592 case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2: { 593 specs[i].format = RBD_ENCRYPTION_FORMAT_LUKS2; 594 595 luks2_opts = g_new0(rbd_encryption_luks2_format_options_t, 1); 596 specs[i].opts = luks2_opts; 597 specs[i].opts_size = sizeof(*luks2_opts); 598 599 r = qemu_rbd_convert_luks_options( 600 qapi_RbdEncryptionOptionsLUKS2_base( 601 &curr_encrypt->u.luks2), 602 (char **)&luks2_opts->passphrase, 603 &luks2_opts->passphrase_size, 604 errp); 605 break; 606 } 607 case RBD_IMAGE_ENCRYPTION_FORMAT_LUKS_ANY: { 608 specs[i].format = RBD_ENCRYPTION_FORMAT_LUKS; 609 610 luks_any_opts = g_new0(rbd_encryption_luks_format_options_t, 1); 611 specs[i].opts = luks_any_opts; 612 specs[i].opts_size = sizeof(*luks_any_opts); 613 614 r = qemu_rbd_convert_luks_options( 615 qapi_RbdEncryptionOptionsLUKSAny_base( 616 &curr_encrypt->u.luks_any), 617 (char **)&luks_any_opts->passphrase, 618 &luks_any_opts->passphrase_size, 619 errp); 620 break; 621 } 622 default: { 623 r = -ENOTSUP; 624 error_setg_errno( 625 errp, -r, "unknown image encryption format: %u", 626 curr_encrypt->format); 627 } 628 } 629 630 if (r < 0) { 631 goto exit; 632 } 633 634 curr_encrypt = curr_encrypt->parent; 635 } 636 637 r = rbd_encryption_load2(image, specs, encrypt_count); 638 if (r < 0) { 639 error_setg_errno(errp, -r, "layered encryption load fail"); 640 goto exit; 641 } 642 643 exit: 644 for (i = 0; i < encrypt_count; ++i) { 645 if (!specs[i].opts) { 646 break; 647 } 648 649 switch (specs[i].format) { 650 case RBD_ENCRYPTION_FORMAT_LUKS1: { 651 luks_opts = specs[i].opts; 652 g_free((void *)luks_opts->passphrase); 653 break; 654 } 655 case RBD_ENCRYPTION_FORMAT_LUKS2: { 656 luks2_opts = specs[i].opts; 657 g_free((void *)luks2_opts->passphrase); 658 break; 659 } 660 case RBD_ENCRYPTION_FORMAT_LUKS: { 661 luks_any_opts = specs[i].opts; 662 g_free((void *)luks_any_opts->passphrase); 663 break; 664 } 665 } 666 667 g_free(specs[i].opts); 668 } 669 g_free(specs); 670 return r; 671 } 672 #endif 673 #endif 674 675 /* FIXME Deprecate and remove keypairs or make it available in QMP. */ 676 static int qemu_rbd_do_create(BlockdevCreateOptions *options, 677 const char *keypairs, const char *password_secret, 678 Error **errp) 679 { 680 BlockdevCreateOptionsRbd *opts = &options->u.rbd; 681 rados_t cluster; 682 rados_ioctx_t io_ctx; 683 int obj_order = 0; 684 int ret; 685 686 assert(options->driver == BLOCKDEV_DRIVER_RBD); 687 if (opts->location->snapshot) { 688 error_setg(errp, "Can't use snapshot name for image creation"); 689 return -EINVAL; 690 } 691 692 #ifndef LIBRBD_SUPPORTS_ENCRYPTION 693 if (opts->encrypt) { 694 error_setg(errp, "RBD library does not support image encryption"); 695 return -ENOTSUP; 696 } 697 #endif 698 699 if (opts->has_cluster_size) { 700 int64_t objsize = opts->cluster_size; 701 if ((objsize - 1) & objsize) { /* not a power of 2? */ 702 error_setg(errp, "obj size needs to be power of 2"); 703 return -EINVAL; 704 } 705 if (objsize < 4096) { 706 error_setg(errp, "obj size too small"); 707 return -EINVAL; 708 } 709 obj_order = ctz32(objsize); 710 } 711 712 ret = qemu_rbd_connect(&cluster, &io_ctx, opts->location, false, keypairs, 713 password_secret, errp); 714 if (ret < 0) { 715 return ret; 716 } 717 718 ret = rbd_create(io_ctx, opts->location->image, opts->size, &obj_order); 719 if (ret < 0) { 720 error_setg_errno(errp, -ret, "error rbd create"); 721 goto out; 722 } 723 724 #ifdef LIBRBD_SUPPORTS_ENCRYPTION 725 if (opts->encrypt) { 726 rbd_image_t image; 727 728 ret = rbd_open(io_ctx, opts->location->image, &image, NULL); 729 if (ret < 0) { 730 error_setg_errno(errp, -ret, 731 "error opening image '%s' for encryption format", 732 opts->location->image); 733 goto out; 734 } 735 736 ret = qemu_rbd_encryption_format(image, opts->encrypt, errp); 737 rbd_close(image); 738 if (ret < 0) { 739 /* encryption format fail, try removing the image */ 740 rbd_remove(io_ctx, opts->location->image); 741 goto out; 742 } 743 } 744 #endif 745 746 ret = 0; 747 out: 748 rados_ioctx_destroy(io_ctx); 749 rados_shutdown(cluster); 750 return ret; 751 } 752 753 static int qemu_rbd_co_create(BlockdevCreateOptions *options, Error **errp) 754 { 755 return qemu_rbd_do_create(options, NULL, NULL, errp); 756 } 757 758 static int qemu_rbd_extract_encryption_create_options( 759 QemuOpts *opts, 760 RbdEncryptionCreateOptions **spec, 761 Error **errp) 762 { 763 QDict *opts_qdict; 764 QDict *encrypt_qdict; 765 Visitor *v; 766 int ret = 0; 767 768 opts_qdict = qemu_opts_to_qdict(opts, NULL); 769 qdict_extract_subqdict(opts_qdict, &encrypt_qdict, "encrypt."); 770 qobject_unref(opts_qdict); 771 if (!qdict_size(encrypt_qdict)) { 772 *spec = NULL; 773 goto exit; 774 } 775 776 /* Convert options into a QAPI object */ 777 v = qobject_input_visitor_new_flat_confused(encrypt_qdict, errp); 778 if (!v) { 779 ret = -EINVAL; 780 goto exit; 781 } 782 783 visit_type_RbdEncryptionCreateOptions(v, NULL, spec, errp); 784 visit_free(v); 785 if (!*spec) { 786 ret = -EINVAL; 787 goto exit; 788 } 789 790 exit: 791 qobject_unref(encrypt_qdict); 792 return ret; 793 } 794 795 static int coroutine_fn qemu_rbd_co_create_opts(BlockDriver *drv, 796 const char *filename, 797 QemuOpts *opts, 798 Error **errp) 799 { 800 BlockdevCreateOptions *create_options; 801 BlockdevCreateOptionsRbd *rbd_opts; 802 BlockdevOptionsRbd *loc; 803 RbdEncryptionCreateOptions *encrypt = NULL; 804 Error *local_err = NULL; 805 const char *keypairs, *password_secret; 806 QDict *options = NULL; 807 int ret = 0; 808 809 create_options = g_new0(BlockdevCreateOptions, 1); 810 create_options->driver = BLOCKDEV_DRIVER_RBD; 811 rbd_opts = &create_options->u.rbd; 812 813 rbd_opts->location = g_new0(BlockdevOptionsRbd, 1); 814 815 password_secret = qemu_opt_get(opts, "password-secret"); 816 817 /* Read out options */ 818 rbd_opts->size = ROUND_UP(qemu_opt_get_size_del(opts, BLOCK_OPT_SIZE, 0), 819 BDRV_SECTOR_SIZE); 820 rbd_opts->cluster_size = qemu_opt_get_size_del(opts, 821 BLOCK_OPT_CLUSTER_SIZE, 0); 822 rbd_opts->has_cluster_size = (rbd_opts->cluster_size != 0); 823 824 options = qdict_new(); 825 qemu_rbd_parse_filename(filename, options, &local_err); 826 if (local_err) { 827 ret = -EINVAL; 828 error_propagate(errp, local_err); 829 goto exit; 830 } 831 832 ret = qemu_rbd_extract_encryption_create_options(opts, &encrypt, errp); 833 if (ret < 0) { 834 goto exit; 835 } 836 rbd_opts->encrypt = encrypt; 837 838 /* 839 * Caution: while qdict_get_try_str() is fine, getting non-string 840 * types would require more care. When @options come from -blockdev 841 * or blockdev_add, its members are typed according to the QAPI 842 * schema, but when they come from -drive, they're all QString. 843 */ 844 loc = rbd_opts->location; 845 loc->pool = g_strdup(qdict_get_try_str(options, "pool")); 846 loc->conf = g_strdup(qdict_get_try_str(options, "conf")); 847 loc->user = g_strdup(qdict_get_try_str(options, "user")); 848 loc->q_namespace = g_strdup(qdict_get_try_str(options, "namespace")); 849 loc->image = g_strdup(qdict_get_try_str(options, "image")); 850 keypairs = qdict_get_try_str(options, "=keyvalue-pairs"); 851 852 ret = qemu_rbd_do_create(create_options, keypairs, password_secret, errp); 853 if (ret < 0) { 854 goto exit; 855 } 856 857 exit: 858 qobject_unref(options); 859 qapi_free_BlockdevCreateOptions(create_options); 860 return ret; 861 } 862 863 static char *qemu_rbd_mon_host(BlockdevOptionsRbd *opts, Error **errp) 864 { 865 const char **vals; 866 const char *host, *port; 867 char *rados_str; 868 InetSocketAddressBaseList *p; 869 int i, cnt; 870 871 if (!opts->has_server) { 872 return NULL; 873 } 874 875 for (cnt = 0, p = opts->server; p; p = p->next) { 876 cnt++; 877 } 878 879 vals = g_new(const char *, cnt + 1); 880 881 for (i = 0, p = opts->server; p; p = p->next, i++) { 882 host = p->value->host; 883 port = p->value->port; 884 885 if (strchr(host, ':')) { 886 vals[i] = g_strdup_printf("[%s]:%s", host, port); 887 } else { 888 vals[i] = g_strdup_printf("%s:%s", host, port); 889 } 890 } 891 vals[i] = NULL; 892 893 rados_str = i ? g_strjoinv(";", (char **)vals) : NULL; 894 g_strfreev((char **)vals); 895 return rados_str; 896 } 897 898 static int qemu_rbd_connect(rados_t *cluster, rados_ioctx_t *io_ctx, 899 BlockdevOptionsRbd *opts, bool cache, 900 const char *keypairs, const char *secretid, 901 Error **errp) 902 { 903 char *mon_host = NULL; 904 Error *local_err = NULL; 905 int r; 906 907 if (secretid) { 908 if (opts->key_secret) { 909 error_setg(errp, 910 "Legacy 'password-secret' clashes with 'key-secret'"); 911 return -EINVAL; 912 } 913 opts->key_secret = g_strdup(secretid); 914 } 915 916 mon_host = qemu_rbd_mon_host(opts, &local_err); 917 if (local_err) { 918 error_propagate(errp, local_err); 919 r = -EINVAL; 920 goto out; 921 } 922 923 r = rados_create(cluster, opts->user); 924 if (r < 0) { 925 error_setg_errno(errp, -r, "error initializing"); 926 goto out; 927 } 928 929 /* try default location when conf=NULL, but ignore failure */ 930 r = rados_conf_read_file(*cluster, opts->conf); 931 if (opts->conf && r < 0) { 932 error_setg_errno(errp, -r, "error reading conf file %s", opts->conf); 933 goto failed_shutdown; 934 } 935 936 r = qemu_rbd_set_keypairs(*cluster, keypairs, errp); 937 if (r < 0) { 938 goto failed_shutdown; 939 } 940 941 if (mon_host) { 942 r = rados_conf_set(*cluster, "mon_host", mon_host); 943 if (r < 0) { 944 goto failed_shutdown; 945 } 946 } 947 948 r = qemu_rbd_set_auth(*cluster, opts, errp); 949 if (r < 0) { 950 goto failed_shutdown; 951 } 952 953 /* 954 * Fallback to more conservative semantics if setting cache 955 * options fails. Ignore errors from setting rbd_cache because the 956 * only possible error is that the option does not exist, and 957 * librbd defaults to no caching. If write through caching cannot 958 * be set up, fall back to no caching. 959 */ 960 if (cache) { 961 rados_conf_set(*cluster, "rbd_cache", "true"); 962 } else { 963 rados_conf_set(*cluster, "rbd_cache", "false"); 964 } 965 966 r = rados_connect(*cluster); 967 if (r < 0) { 968 error_setg_errno(errp, -r, "error connecting"); 969 goto failed_shutdown; 970 } 971 972 r = rados_ioctx_create(*cluster, opts->pool, io_ctx); 973 if (r < 0) { 974 error_setg_errno(errp, -r, "error opening pool %s", opts->pool); 975 goto failed_shutdown; 976 } 977 978 #ifdef HAVE_RBD_NAMESPACE_EXISTS 979 if (opts->q_namespace && strlen(opts->q_namespace) > 0) { 980 bool exists; 981 982 r = rbd_namespace_exists(*io_ctx, opts->q_namespace, &exists); 983 if (r < 0) { 984 error_setg_errno(errp, -r, "error checking namespace"); 985 goto failed_ioctx_destroy; 986 } 987 988 if (!exists) { 989 error_setg(errp, "namespace '%s' does not exist", 990 opts->q_namespace); 991 r = -ENOENT; 992 goto failed_ioctx_destroy; 993 } 994 } 995 #endif 996 997 /* 998 * Set the namespace after opening the io context on the pool, 999 * if nspace == NULL or if nspace == "", it is just as we did nothing 1000 */ 1001 rados_ioctx_set_namespace(*io_ctx, opts->q_namespace); 1002 1003 r = 0; 1004 goto out; 1005 1006 #ifdef HAVE_RBD_NAMESPACE_EXISTS 1007 failed_ioctx_destroy: 1008 rados_ioctx_destroy(*io_ctx); 1009 #endif 1010 failed_shutdown: 1011 rados_shutdown(*cluster); 1012 out: 1013 g_free(mon_host); 1014 return r; 1015 } 1016 1017 static int qemu_rbd_convert_options(QDict *options, BlockdevOptionsRbd **opts, 1018 Error **errp) 1019 { 1020 Visitor *v; 1021 1022 /* Convert the remaining options into a QAPI object */ 1023 v = qobject_input_visitor_new_flat_confused(options, errp); 1024 if (!v) { 1025 return -EINVAL; 1026 } 1027 1028 visit_type_BlockdevOptionsRbd(v, NULL, opts, errp); 1029 visit_free(v); 1030 if (!opts) { 1031 return -EINVAL; 1032 } 1033 1034 return 0; 1035 } 1036 1037 static int qemu_rbd_attempt_legacy_options(QDict *options, 1038 BlockdevOptionsRbd **opts, 1039 char **keypairs) 1040 { 1041 char *filename; 1042 int r; 1043 1044 filename = g_strdup(qdict_get_try_str(options, "filename")); 1045 if (!filename) { 1046 return -EINVAL; 1047 } 1048 qdict_del(options, "filename"); 1049 1050 qemu_rbd_parse_filename(filename, options, NULL); 1051 1052 /* keypairs freed by caller */ 1053 *keypairs = g_strdup(qdict_get_try_str(options, "=keyvalue-pairs")); 1054 if (*keypairs) { 1055 qdict_del(options, "=keyvalue-pairs"); 1056 } 1057 1058 r = qemu_rbd_convert_options(options, opts, NULL); 1059 1060 g_free(filename); 1061 return r; 1062 } 1063 1064 static int qemu_rbd_open(BlockDriverState *bs, QDict *options, int flags, 1065 Error **errp) 1066 { 1067 BDRVRBDState *s = bs->opaque; 1068 BlockdevOptionsRbd *opts = NULL; 1069 const QDictEntry *e; 1070 Error *local_err = NULL; 1071 char *keypairs, *secretid; 1072 rbd_image_info_t info; 1073 int r; 1074 1075 keypairs = g_strdup(qdict_get_try_str(options, "=keyvalue-pairs")); 1076 if (keypairs) { 1077 qdict_del(options, "=keyvalue-pairs"); 1078 } 1079 1080 secretid = g_strdup(qdict_get_try_str(options, "password-secret")); 1081 if (secretid) { 1082 qdict_del(options, "password-secret"); 1083 } 1084 1085 r = qemu_rbd_convert_options(options, &opts, &local_err); 1086 if (local_err) { 1087 /* If keypairs are present, that means some options are present in 1088 * the modern option format. Don't attempt to parse legacy option 1089 * formats, as we won't support mixed usage. */ 1090 if (keypairs) { 1091 error_propagate(errp, local_err); 1092 goto out; 1093 } 1094 1095 /* If the initial attempt to convert and process the options failed, 1096 * we may be attempting to open an image file that has the rbd options 1097 * specified in the older format consisting of all key/value pairs 1098 * encoded in the filename. Go ahead and attempt to parse the 1099 * filename, and see if we can pull out the required options. */ 1100 r = qemu_rbd_attempt_legacy_options(options, &opts, &keypairs); 1101 if (r < 0) { 1102 /* Propagate the original error, not the legacy parsing fallback 1103 * error, as the latter was just a best-effort attempt. */ 1104 error_propagate(errp, local_err); 1105 goto out; 1106 } 1107 /* Take care whenever deciding to actually deprecate; once this ability 1108 * is removed, we will not be able to open any images with legacy-styled 1109 * backing image strings. */ 1110 warn_report("RBD options encoded in the filename as keyvalue pairs " 1111 "is deprecated"); 1112 } 1113 1114 /* Remove the processed options from the QDict (the visitor processes 1115 * _all_ options in the QDict) */ 1116 while ((e = qdict_first(options))) { 1117 qdict_del(options, e->key); 1118 } 1119 1120 r = qemu_rbd_connect(&s->cluster, &s->io_ctx, opts, 1121 !(flags & BDRV_O_NOCACHE), keypairs, secretid, errp); 1122 if (r < 0) { 1123 goto out; 1124 } 1125 1126 s->snap = g_strdup(opts->snapshot); 1127 s->image_name = g_strdup(opts->image); 1128 1129 /* rbd_open is always r/w */ 1130 r = rbd_open(s->io_ctx, s->image_name, &s->image, s->snap); 1131 if (r < 0) { 1132 error_setg_errno(errp, -r, "error reading header from %s", 1133 s->image_name); 1134 goto failed_open; 1135 } 1136 1137 if (opts->encrypt) { 1138 #ifdef LIBRBD_SUPPORTS_ENCRYPTION 1139 if (opts->encrypt->parent) { 1140 #ifdef LIBRBD_SUPPORTS_ENCRYPTION_LOAD2 1141 r = qemu_rbd_encryption_load2(s->image, opts->encrypt, errp); 1142 #else 1143 r = -ENOTSUP; 1144 error_setg(errp, "RBD library does not support layered encryption"); 1145 #endif 1146 } else { 1147 r = qemu_rbd_encryption_load(s->image, opts->encrypt, errp); 1148 } 1149 if (r < 0) { 1150 goto failed_post_open; 1151 } 1152 #else 1153 r = -ENOTSUP; 1154 error_setg(errp, "RBD library does not support image encryption"); 1155 goto failed_post_open; 1156 #endif 1157 } 1158 1159 r = rbd_stat(s->image, &info, sizeof(info)); 1160 if (r < 0) { 1161 error_setg_errno(errp, -r, "error getting image info from %s", 1162 s->image_name); 1163 goto failed_post_open; 1164 } 1165 s->image_size = info.size; 1166 s->object_size = info.obj_size; 1167 1168 /* If we are using an rbd snapshot, we must be r/o, otherwise 1169 * leave as-is */ 1170 if (s->snap != NULL) { 1171 bdrv_graph_rdlock_main_loop(); 1172 r = bdrv_apply_auto_read_only(bs, "rbd snapshots are read-only", errp); 1173 bdrv_graph_rdunlock_main_loop(); 1174 if (r < 0) { 1175 goto failed_post_open; 1176 } 1177 } 1178 1179 #ifdef LIBRBD_SUPPORTS_WRITE_ZEROES 1180 bs->supported_zero_flags = BDRV_REQ_MAY_UNMAP | BDRV_REQ_NO_FALLBACK; 1181 #endif 1182 1183 /* When extending regular files, we get zeros from the OS */ 1184 bs->supported_truncate_flags = BDRV_REQ_ZERO_WRITE; 1185 1186 r = 0; 1187 goto out; 1188 1189 failed_post_open: 1190 rbd_close(s->image); 1191 failed_open: 1192 rados_ioctx_destroy(s->io_ctx); 1193 g_free(s->snap); 1194 g_free(s->image_name); 1195 rados_shutdown(s->cluster); 1196 out: 1197 qapi_free_BlockdevOptionsRbd(opts); 1198 g_free(keypairs); 1199 g_free(secretid); 1200 return r; 1201 } 1202 1203 1204 /* Since RBD is currently always opened R/W via the API, 1205 * we just need to check if we are using a snapshot or not, in 1206 * order to determine if we will allow it to be R/W */ 1207 static int qemu_rbd_reopen_prepare(BDRVReopenState *state, 1208 BlockReopenQueue *queue, Error **errp) 1209 { 1210 BDRVRBDState *s = state->bs->opaque; 1211 int ret = 0; 1212 1213 GRAPH_RDLOCK_GUARD_MAINLOOP(); 1214 1215 if (s->snap && state->flags & BDRV_O_RDWR) { 1216 error_setg(errp, 1217 "Cannot change node '%s' to r/w when using RBD snapshot", 1218 bdrv_get_device_or_node_name(state->bs)); 1219 ret = -EINVAL; 1220 } 1221 1222 return ret; 1223 } 1224 1225 static void qemu_rbd_close(BlockDriverState *bs) 1226 { 1227 BDRVRBDState *s = bs->opaque; 1228 1229 rbd_close(s->image); 1230 rados_ioctx_destroy(s->io_ctx); 1231 g_free(s->snap); 1232 g_free(s->image_name); 1233 rados_shutdown(s->cluster); 1234 } 1235 1236 /* Resize the RBD image and update the 'image_size' with the current size */ 1237 static int qemu_rbd_resize(BlockDriverState *bs, uint64_t size) 1238 { 1239 BDRVRBDState *s = bs->opaque; 1240 int r; 1241 1242 r = rbd_resize(s->image, size); 1243 if (r < 0) { 1244 return r; 1245 } 1246 1247 s->image_size = size; 1248 1249 return 0; 1250 } 1251 1252 static void qemu_rbd_finish_bh(void *opaque) 1253 { 1254 RBDTask *task = opaque; 1255 task->complete = true; 1256 aio_co_wake(task->co); 1257 } 1258 1259 /* 1260 * This is the completion callback function for all rbd aio calls 1261 * started from qemu_rbd_start_co(). 1262 * 1263 * Note: this function is being called from a non qemu thread so 1264 * we need to be careful about what we do here. Generally we only 1265 * schedule a BH, and do the rest of the io completion handling 1266 * from qemu_rbd_finish_bh() which runs in a qemu context. 1267 */ 1268 static void qemu_rbd_completion_cb(rbd_completion_t c, RBDTask *task) 1269 { 1270 task->ret = rbd_aio_get_return_value(c); 1271 rbd_aio_release(c); 1272 aio_bh_schedule_oneshot(bdrv_get_aio_context(task->bs), 1273 qemu_rbd_finish_bh, task); 1274 } 1275 1276 static int coroutine_fn qemu_rbd_start_co(BlockDriverState *bs, 1277 uint64_t offset, 1278 uint64_t bytes, 1279 QEMUIOVector *qiov, 1280 int flags, 1281 RBDAIOCmd cmd) 1282 { 1283 BDRVRBDState *s = bs->opaque; 1284 RBDTask task = { .bs = bs, .co = qemu_coroutine_self() }; 1285 rbd_completion_t c; 1286 int r; 1287 1288 assert(!qiov || qiov->size == bytes); 1289 1290 if (cmd == RBD_AIO_WRITE || cmd == RBD_AIO_WRITE_ZEROES) { 1291 /* 1292 * RBD APIs don't allow us to write more than actual size, so in order 1293 * to support growing images, we resize the image before write 1294 * operations that exceed the current size. 1295 */ 1296 if (offset + bytes > s->image_size) { 1297 r = qemu_rbd_resize(bs, offset + bytes); 1298 if (r < 0) { 1299 return r; 1300 } 1301 } 1302 } 1303 1304 r = rbd_aio_create_completion(&task, 1305 (rbd_callback_t) qemu_rbd_completion_cb, &c); 1306 if (r < 0) { 1307 return r; 1308 } 1309 1310 switch (cmd) { 1311 case RBD_AIO_READ: 1312 r = rbd_aio_readv(s->image, qiov->iov, qiov->niov, offset, c); 1313 break; 1314 case RBD_AIO_WRITE: 1315 r = rbd_aio_writev(s->image, qiov->iov, qiov->niov, offset, c); 1316 break; 1317 case RBD_AIO_DISCARD: 1318 r = rbd_aio_discard(s->image, offset, bytes, c); 1319 break; 1320 case RBD_AIO_FLUSH: 1321 r = rbd_aio_flush(s->image, c); 1322 break; 1323 #ifdef LIBRBD_SUPPORTS_WRITE_ZEROES 1324 case RBD_AIO_WRITE_ZEROES: { 1325 int zero_flags = 0; 1326 #ifdef RBD_WRITE_ZEROES_FLAG_THICK_PROVISION 1327 if (!(flags & BDRV_REQ_MAY_UNMAP)) { 1328 zero_flags = RBD_WRITE_ZEROES_FLAG_THICK_PROVISION; 1329 } 1330 #endif 1331 r = rbd_aio_write_zeroes(s->image, offset, bytes, c, zero_flags, 0); 1332 break; 1333 } 1334 #endif 1335 default: 1336 r = -EINVAL; 1337 } 1338 1339 if (r < 0) { 1340 error_report("rbd request failed early: cmd %d offset %" PRIu64 1341 " bytes %" PRIu64 " flags %d r %d (%s)", cmd, offset, 1342 bytes, flags, r, strerror(-r)); 1343 rbd_aio_release(c); 1344 return r; 1345 } 1346 1347 while (!task.complete) { 1348 qemu_coroutine_yield(); 1349 } 1350 1351 if (task.ret < 0) { 1352 error_report("rbd request failed: cmd %d offset %" PRIu64 " bytes %" 1353 PRIu64 " flags %d task.ret %" PRIi64 " (%s)", cmd, offset, 1354 bytes, flags, task.ret, strerror(-task.ret)); 1355 return task.ret; 1356 } 1357 1358 /* zero pad short reads */ 1359 if (cmd == RBD_AIO_READ && task.ret < qiov->size) { 1360 qemu_iovec_memset(qiov, task.ret, 0, qiov->size - task.ret); 1361 } 1362 1363 return 0; 1364 } 1365 1366 static int 1367 coroutine_fn qemu_rbd_co_preadv(BlockDriverState *bs, int64_t offset, 1368 int64_t bytes, QEMUIOVector *qiov, 1369 BdrvRequestFlags flags) 1370 { 1371 return qemu_rbd_start_co(bs, offset, bytes, qiov, flags, RBD_AIO_READ); 1372 } 1373 1374 static int 1375 coroutine_fn qemu_rbd_co_pwritev(BlockDriverState *bs, int64_t offset, 1376 int64_t bytes, QEMUIOVector *qiov, 1377 BdrvRequestFlags flags) 1378 { 1379 return qemu_rbd_start_co(bs, offset, bytes, qiov, flags, RBD_AIO_WRITE); 1380 } 1381 1382 static int coroutine_fn qemu_rbd_co_flush(BlockDriverState *bs) 1383 { 1384 return qemu_rbd_start_co(bs, 0, 0, NULL, 0, RBD_AIO_FLUSH); 1385 } 1386 1387 static int coroutine_fn qemu_rbd_co_pdiscard(BlockDriverState *bs, 1388 int64_t offset, int64_t bytes) 1389 { 1390 return qemu_rbd_start_co(bs, offset, bytes, NULL, 0, RBD_AIO_DISCARD); 1391 } 1392 1393 #ifdef LIBRBD_SUPPORTS_WRITE_ZEROES 1394 static int 1395 coroutine_fn qemu_rbd_co_pwrite_zeroes(BlockDriverState *bs, int64_t offset, 1396 int64_t bytes, BdrvRequestFlags flags) 1397 { 1398 return qemu_rbd_start_co(bs, offset, bytes, NULL, flags, 1399 RBD_AIO_WRITE_ZEROES); 1400 } 1401 #endif 1402 1403 static int coroutine_fn 1404 qemu_rbd_co_get_info(BlockDriverState *bs, BlockDriverInfo *bdi) 1405 { 1406 BDRVRBDState *s = bs->opaque; 1407 bdi->cluster_size = s->object_size; 1408 return 0; 1409 } 1410 1411 static ImageInfoSpecific *qemu_rbd_get_specific_info(BlockDriverState *bs, 1412 Error **errp) 1413 { 1414 BDRVRBDState *s = bs->opaque; 1415 ImageInfoSpecific *spec_info; 1416 char buf[RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN] = {0}; 1417 int r; 1418 1419 if (s->image_size >= RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) { 1420 r = rbd_read(s->image, 0, 1421 RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN, buf); 1422 if (r < 0) { 1423 error_setg_errno(errp, -r, "cannot read image start for probe"); 1424 return NULL; 1425 } 1426 } 1427 1428 spec_info = g_new(ImageInfoSpecific, 1); 1429 *spec_info = (ImageInfoSpecific){ 1430 .type = IMAGE_INFO_SPECIFIC_KIND_RBD, 1431 .u.rbd.data = g_new0(ImageInfoSpecificRbd, 1), 1432 }; 1433 1434 if (memcmp(buf, rbd_luks_header_verification, 1435 RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) == 0) { 1436 spec_info->u.rbd.data->encryption_format = 1437 RBD_IMAGE_ENCRYPTION_FORMAT_LUKS; 1438 spec_info->u.rbd.data->has_encryption_format = true; 1439 } else if (memcmp(buf, rbd_luks2_header_verification, 1440 RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) == 0) { 1441 spec_info->u.rbd.data->encryption_format = 1442 RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2; 1443 spec_info->u.rbd.data->has_encryption_format = true; 1444 } else if (memcmp(buf, rbd_layered_luks_header_verification, 1445 RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) == 0) { 1446 spec_info->u.rbd.data->encryption_format = 1447 RBD_IMAGE_ENCRYPTION_FORMAT_LUKS; 1448 spec_info->u.rbd.data->has_encryption_format = true; 1449 } else if (memcmp(buf, rbd_layered_luks2_header_verification, 1450 RBD_ENCRYPTION_LUKS_HEADER_VERIFICATION_LEN) == 0) { 1451 spec_info->u.rbd.data->encryption_format = 1452 RBD_IMAGE_ENCRYPTION_FORMAT_LUKS2; 1453 spec_info->u.rbd.data->has_encryption_format = true; 1454 } else { 1455 spec_info->u.rbd.data->has_encryption_format = false; 1456 } 1457 1458 return spec_info; 1459 } 1460 1461 /* 1462 * rbd_diff_iterate2 allows to interrupt the exection by returning a negative 1463 * value in the callback routine. Choose a value that does not conflict with 1464 * an existing exitcode and return it if we want to prematurely stop the 1465 * execution because we detected a change in the allocation status. 1466 */ 1467 #define QEMU_RBD_EXIT_DIFF_ITERATE2 -9000 1468 1469 static int qemu_rbd_diff_iterate_cb(uint64_t offs, size_t len, 1470 int exists, void *opaque) 1471 { 1472 RBDDiffIterateReq *req = opaque; 1473 1474 assert(req->offs + req->bytes <= offs); 1475 1476 /* treat a hole like an unallocated area and bail out */ 1477 if (!exists) { 1478 return 0; 1479 } 1480 1481 if (!req->exists && offs > req->offs) { 1482 /* 1483 * we started in an unallocated area and hit the first allocated 1484 * block. req->bytes must be set to the length of the unallocated area 1485 * before the allocated area. stop further processing. 1486 */ 1487 req->bytes = offs - req->offs; 1488 return QEMU_RBD_EXIT_DIFF_ITERATE2; 1489 } 1490 1491 if (req->exists && offs > req->offs + req->bytes) { 1492 /* 1493 * we started in an allocated area and jumped over an unallocated area, 1494 * req->bytes contains the length of the allocated area before the 1495 * unallocated area. stop further processing. 1496 */ 1497 return QEMU_RBD_EXIT_DIFF_ITERATE2; 1498 } 1499 1500 req->bytes += len; 1501 req->exists = true; 1502 1503 return 0; 1504 } 1505 1506 static int coroutine_fn qemu_rbd_co_block_status(BlockDriverState *bs, 1507 bool want_zero, int64_t offset, 1508 int64_t bytes, int64_t *pnum, 1509 int64_t *map, 1510 BlockDriverState **file) 1511 { 1512 BDRVRBDState *s = bs->opaque; 1513 int status, r; 1514 RBDDiffIterateReq req = { .offs = offset }; 1515 uint64_t features, flags; 1516 uint64_t head = 0; 1517 1518 assert(offset + bytes <= s->image_size); 1519 1520 /* default to all sectors allocated */ 1521 status = BDRV_BLOCK_DATA | BDRV_BLOCK_OFFSET_VALID; 1522 *map = offset; 1523 *file = bs; 1524 *pnum = bytes; 1525 1526 /* check if RBD image supports fast-diff */ 1527 r = rbd_get_features(s->image, &features); 1528 if (r < 0) { 1529 return status; 1530 } 1531 if (!(features & RBD_FEATURE_FAST_DIFF)) { 1532 return status; 1533 } 1534 1535 /* check if RBD fast-diff result is valid */ 1536 r = rbd_get_flags(s->image, &flags); 1537 if (r < 0) { 1538 return status; 1539 } 1540 if (flags & RBD_FLAG_FAST_DIFF_INVALID) { 1541 return status; 1542 } 1543 1544 #if LIBRBD_VERSION_CODE < LIBRBD_VERSION(1, 17, 0) 1545 /* 1546 * librbd had a bug until early 2022 that affected all versions of ceph that 1547 * supported fast-diff. This bug results in reporting of incorrect offsets 1548 * if the offset parameter to rbd_diff_iterate2 is not object aligned. 1549 * Work around this bug by rounding down the offset to object boundaries. 1550 * This is OK because we call rbd_diff_iterate2 with whole_object = true. 1551 * However, this workaround only works for non cloned images with default 1552 * striping. 1553 * 1554 * See: https://tracker.ceph.com/issues/53784 1555 */ 1556 1557 /* check if RBD image has non-default striping enabled */ 1558 if (features & RBD_FEATURE_STRIPINGV2) { 1559 return status; 1560 } 1561 1562 #pragma GCC diagnostic push 1563 #pragma GCC diagnostic ignored "-Wdeprecated-declarations" 1564 /* 1565 * check if RBD image is a clone (= has a parent). 1566 * 1567 * rbd_get_parent_info is deprecated from Nautilus onwards, but the 1568 * replacement rbd_get_parent is not present in Luminous and Mimic. 1569 */ 1570 if (rbd_get_parent_info(s->image, NULL, 0, NULL, 0, NULL, 0) != -ENOENT) { 1571 return status; 1572 } 1573 #pragma GCC diagnostic pop 1574 1575 head = req.offs & (s->object_size - 1); 1576 req.offs -= head; 1577 bytes += head; 1578 #endif 1579 1580 r = rbd_diff_iterate2(s->image, NULL, req.offs, bytes, true, true, 1581 qemu_rbd_diff_iterate_cb, &req); 1582 if (r < 0 && r != QEMU_RBD_EXIT_DIFF_ITERATE2) { 1583 return status; 1584 } 1585 assert(req.bytes <= bytes); 1586 if (!req.exists) { 1587 if (r == 0) { 1588 /* 1589 * rbd_diff_iterate2 does not invoke callbacks for unallocated 1590 * areas. This here catches the case where no callback was 1591 * invoked at all (req.bytes == 0). 1592 */ 1593 assert(req.bytes == 0); 1594 req.bytes = bytes; 1595 } 1596 status = BDRV_BLOCK_ZERO | BDRV_BLOCK_OFFSET_VALID; 1597 } 1598 1599 assert(req.bytes > head); 1600 *pnum = req.bytes - head; 1601 return status; 1602 } 1603 1604 static int64_t coroutine_fn qemu_rbd_co_getlength(BlockDriverState *bs) 1605 { 1606 BDRVRBDState *s = bs->opaque; 1607 int r; 1608 1609 r = rbd_get_size(s->image, &s->image_size); 1610 if (r < 0) { 1611 return r; 1612 } 1613 1614 return s->image_size; 1615 } 1616 1617 static int coroutine_fn qemu_rbd_co_truncate(BlockDriverState *bs, 1618 int64_t offset, 1619 bool exact, 1620 PreallocMode prealloc, 1621 BdrvRequestFlags flags, 1622 Error **errp) 1623 { 1624 int r; 1625 1626 if (prealloc != PREALLOC_MODE_OFF) { 1627 error_setg(errp, "Unsupported preallocation mode '%s'", 1628 PreallocMode_str(prealloc)); 1629 return -ENOTSUP; 1630 } 1631 1632 r = qemu_rbd_resize(bs, offset); 1633 if (r < 0) { 1634 error_setg_errno(errp, -r, "Failed to resize file"); 1635 return r; 1636 } 1637 1638 return 0; 1639 } 1640 1641 static int qemu_rbd_snap_create(BlockDriverState *bs, 1642 QEMUSnapshotInfo *sn_info) 1643 { 1644 BDRVRBDState *s = bs->opaque; 1645 int r; 1646 1647 if (sn_info->name[0] == '\0') { 1648 return -EINVAL; /* we need a name for rbd snapshots */ 1649 } 1650 1651 /* 1652 * rbd snapshots are using the name as the user controlled unique identifier 1653 * we can't use the rbd snapid for that purpose, as it can't be set 1654 */ 1655 if (sn_info->id_str[0] != '\0' && 1656 strcmp(sn_info->id_str, sn_info->name) != 0) { 1657 return -EINVAL; 1658 } 1659 1660 if (strlen(sn_info->name) >= sizeof(sn_info->id_str)) { 1661 return -ERANGE; 1662 } 1663 1664 r = rbd_snap_create(s->image, sn_info->name); 1665 if (r < 0) { 1666 error_report("failed to create snap: %s", strerror(-r)); 1667 return r; 1668 } 1669 1670 return 0; 1671 } 1672 1673 static int qemu_rbd_snap_remove(BlockDriverState *bs, 1674 const char *snapshot_id, 1675 const char *snapshot_name, 1676 Error **errp) 1677 { 1678 BDRVRBDState *s = bs->opaque; 1679 int r; 1680 1681 if (!snapshot_name) { 1682 error_setg(errp, "rbd need a valid snapshot name"); 1683 return -EINVAL; 1684 } 1685 1686 /* If snapshot_id is specified, it must be equal to name, see 1687 qemu_rbd_snap_list() */ 1688 if (snapshot_id && strcmp(snapshot_id, snapshot_name)) { 1689 error_setg(errp, 1690 "rbd do not support snapshot id, it should be NULL or " 1691 "equal to snapshot name"); 1692 return -EINVAL; 1693 } 1694 1695 r = rbd_snap_remove(s->image, snapshot_name); 1696 if (r < 0) { 1697 error_setg_errno(errp, -r, "Failed to remove the snapshot"); 1698 } 1699 return r; 1700 } 1701 1702 static int qemu_rbd_snap_rollback(BlockDriverState *bs, 1703 const char *snapshot_name) 1704 { 1705 BDRVRBDState *s = bs->opaque; 1706 1707 return rbd_snap_rollback(s->image, snapshot_name); 1708 } 1709 1710 static int qemu_rbd_snap_list(BlockDriverState *bs, 1711 QEMUSnapshotInfo **psn_tab) 1712 { 1713 BDRVRBDState *s = bs->opaque; 1714 QEMUSnapshotInfo *sn_info, *sn_tab = NULL; 1715 int i, snap_count; 1716 rbd_snap_info_t *snaps; 1717 int max_snaps = RBD_MAX_SNAPS; 1718 1719 do { 1720 snaps = g_new(rbd_snap_info_t, max_snaps); 1721 snap_count = rbd_snap_list(s->image, snaps, &max_snaps); 1722 if (snap_count <= 0) { 1723 g_free(snaps); 1724 } 1725 } while (snap_count == -ERANGE); 1726 1727 if (snap_count <= 0) { 1728 goto done; 1729 } 1730 1731 sn_tab = g_new0(QEMUSnapshotInfo, snap_count); 1732 1733 for (i = 0; i < snap_count; i++) { 1734 const char *snap_name = snaps[i].name; 1735 1736 sn_info = sn_tab + i; 1737 pstrcpy(sn_info->id_str, sizeof(sn_info->id_str), snap_name); 1738 pstrcpy(sn_info->name, sizeof(sn_info->name), snap_name); 1739 1740 sn_info->vm_state_size = snaps[i].size; 1741 sn_info->date_sec = 0; 1742 sn_info->date_nsec = 0; 1743 sn_info->vm_clock_nsec = 0; 1744 } 1745 rbd_snap_list_end(snaps); 1746 g_free(snaps); 1747 1748 done: 1749 *psn_tab = sn_tab; 1750 return snap_count; 1751 } 1752 1753 static void coroutine_fn qemu_rbd_co_invalidate_cache(BlockDriverState *bs, 1754 Error **errp) 1755 { 1756 BDRVRBDState *s = bs->opaque; 1757 int r = rbd_invalidate_cache(s->image); 1758 if (r < 0) { 1759 error_setg_errno(errp, -r, "Failed to invalidate the cache"); 1760 } 1761 } 1762 1763 static QemuOptsList qemu_rbd_create_opts = { 1764 .name = "rbd-create-opts", 1765 .head = QTAILQ_HEAD_INITIALIZER(qemu_rbd_create_opts.head), 1766 .desc = { 1767 { 1768 .name = BLOCK_OPT_SIZE, 1769 .type = QEMU_OPT_SIZE, 1770 .help = "Virtual disk size" 1771 }, 1772 { 1773 .name = BLOCK_OPT_CLUSTER_SIZE, 1774 .type = QEMU_OPT_SIZE, 1775 .help = "RBD object size" 1776 }, 1777 { 1778 .name = "password-secret", 1779 .type = QEMU_OPT_STRING, 1780 .help = "ID of secret providing the password", 1781 }, 1782 { 1783 .name = "encrypt.format", 1784 .type = QEMU_OPT_STRING, 1785 .help = "Encrypt the image, format choices: 'luks', 'luks2'", 1786 }, 1787 { 1788 .name = "encrypt.cipher-alg", 1789 .type = QEMU_OPT_STRING, 1790 .help = "Name of encryption cipher algorithm" 1791 " (allowed values: aes-128, aes-256)", 1792 }, 1793 { 1794 .name = "encrypt.key-secret", 1795 .type = QEMU_OPT_STRING, 1796 .help = "ID of secret providing LUKS passphrase", 1797 }, 1798 { /* end of list */ } 1799 } 1800 }; 1801 1802 static const char *const qemu_rbd_strong_runtime_opts[] = { 1803 "pool", 1804 "namespace", 1805 "image", 1806 "conf", 1807 "snapshot", 1808 "user", 1809 "server.", 1810 "password-secret", 1811 1812 NULL 1813 }; 1814 1815 static BlockDriver bdrv_rbd = { 1816 .format_name = "rbd", 1817 .instance_size = sizeof(BDRVRBDState), 1818 1819 .bdrv_parse_filename = qemu_rbd_parse_filename, 1820 .bdrv_open = qemu_rbd_open, 1821 .bdrv_close = qemu_rbd_close, 1822 .bdrv_reopen_prepare = qemu_rbd_reopen_prepare, 1823 .bdrv_co_create = qemu_rbd_co_create, 1824 .bdrv_co_create_opts = qemu_rbd_co_create_opts, 1825 .bdrv_has_zero_init = bdrv_has_zero_init_1, 1826 .bdrv_co_get_info = qemu_rbd_co_get_info, 1827 .bdrv_get_specific_info = qemu_rbd_get_specific_info, 1828 .create_opts = &qemu_rbd_create_opts, 1829 .bdrv_co_getlength = qemu_rbd_co_getlength, 1830 .bdrv_co_truncate = qemu_rbd_co_truncate, 1831 .protocol_name = "rbd", 1832 1833 .bdrv_co_preadv = qemu_rbd_co_preadv, 1834 .bdrv_co_pwritev = qemu_rbd_co_pwritev, 1835 .bdrv_co_flush_to_disk = qemu_rbd_co_flush, 1836 .bdrv_co_pdiscard = qemu_rbd_co_pdiscard, 1837 #ifdef LIBRBD_SUPPORTS_WRITE_ZEROES 1838 .bdrv_co_pwrite_zeroes = qemu_rbd_co_pwrite_zeroes, 1839 #endif 1840 .bdrv_co_block_status = qemu_rbd_co_block_status, 1841 1842 .bdrv_snapshot_create = qemu_rbd_snap_create, 1843 .bdrv_snapshot_delete = qemu_rbd_snap_remove, 1844 .bdrv_snapshot_list = qemu_rbd_snap_list, 1845 .bdrv_snapshot_goto = qemu_rbd_snap_rollback, 1846 .bdrv_co_invalidate_cache = qemu_rbd_co_invalidate_cache, 1847 1848 .strong_runtime_opts = qemu_rbd_strong_runtime_opts, 1849 }; 1850 1851 static void bdrv_rbd_init(void) 1852 { 1853 bdrv_register(&bdrv_rbd); 1854 } 1855 1856 block_init(bdrv_rbd_init); 1857