libvirt/src/qemu/qemu_block.c
Peter Krempa 754ca45c45 qemu: block: Ensure that <dataStore> is in appropriate state
In contrast to normal backing chain members where qemu does honour the
'auto-read-only' property the 'data-file' nodes are not automatically
reopened by qemu. Libvirt now has the infrastructure to reopen them
explicitly so use it for all transitions of the 'commit' block job.

Signed-off-by: Peter Krempa <pkrempa@redhat.com>
Reviewed-by: Jiri Denemark <jdenemar@redhat.com>
2024-11-28 10:27:56 +01:00

3956 lines
127 KiB
C

/*
* qemu_block.c: helper functions for QEMU block subsystem
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library. If not, see
* <http://www.gnu.org/licenses/>.
*/
#include <config.h>
#include "qemu_block.h"
#include "qemu_command.h"
#include "qemu_domain.h"
#include "qemu_alias.h"
#include "qemu_security.h"
#include "qemu_process.h"
#include "qemu_chardev.h"
#include "storage_source.h"
#include "viralloc.h"
#include "virstring.h"
#include "virlog.h"
#define VIR_FROM_THIS VIR_FROM_QEMU
VIR_LOG_INIT("qemu.qemu_block");
/* qemu declares the buffer for node names as a 32 byte array */
static const size_t qemuBlockNodeNameBufSize = 32;
static int
qemuBlockNodeNameValidate(const char *nn)
{
if (!nn)
return 0;
if (strlen(nn) >= qemuBlockNodeNameBufSize) {
virReportError(VIR_ERR_INTERNAL_ERROR,
_("node-name '%1$s' too long for qemu"), nn);
return -1;
}
return 0;
}
/**
* qemuBlockStorageSourceSetStorageNodename:
* @src: virStorageSource to set the storage nodename
* @nodename: The node name to set (stolen)
*
* Sets @nodename as the storage node name of @src. Using NULL @nodename clears
* the nodename. @src takes ownership of @nodename.
*/
void
qemuBlockStorageSourceSetStorageNodename(virStorageSource *src,
char *nodename)
{
g_free(src->nodenamestorage);
src->nodenamestorage = nodename;
}
/**
* qemuBlockStorageSourceSetFormatNodename:
* @src: virStorageSource to set the format nodename
* @nodename: The node name to set (stolen)
*
* Sets @nodename as the format node name of @src. Using NULL @nodename clears
* the nodename. @src takes ownership of @nodename.
*/
void
qemuBlockStorageSourceSetFormatNodename(virStorageSource *src,
char *nodename)
{
g_free(src->nodenameformat);
src->nodenameformat = nodename;
}
/**
* qemuBlockStorageSourceGetEffectiveNodename:
* @src: virStorageSource to get the effective nodename of
*
* Gets the nodename that exposes the guest visible data. This function always
* returns a name.
*/
const char *
qemuBlockStorageSourceGetEffectiveNodename(virStorageSource *src)
{
if (src->nodenameformat)
return src->nodenameformat;
return qemuBlockStorageSourceGetEffectiveStorageNodename(src);
}
/**
* qemuBlockStorageSourceGetSliceNodename:
*
* Gets the nodename corresponding to the storage slice layer. Returns NULL
* when there is no explicit storage slice layer.
*/
const char *
qemuBlockStorageSourceGetSliceNodename(virStorageSource *src)
{
if (!src->sliceStorage)
return NULL;
return src->sliceStorage->nodename;
}
/**
* qemuBlockStorageSourceGetEffectiveStorageNodename:
* @src: virStorageSource to get the effective nodename of
*
* Gets the nodename that exposes the storage corresponding to @src, without
* the format driver applied. This function always returns a name.
*/
const char *
qemuBlockStorageSourceGetEffectiveStorageNodename(virStorageSource *src)
{
const char *slice = qemuBlockStorageSourceGetSliceNodename(src);
if (slice)
return slice;
return src->nodenamestorage;
}
/**
* qemuBlockStorageSourceGetStorageNodename:
* @src: virStorageSource to get the effective nodename of
*
* Gets the nodename corresponding to the real backing storage format layer.
*/
const char *
qemuBlockStorageSourceGetStorageNodename(virStorageSource *src)
{
return src->nodenamestorage;
}
/**
* qemuBlockStorageSourceGetFormatNodename:
* @src: virStorageSource to get the effective nodename of
*
* Gets the nodename corresponding to the format layer. Useful when accessing
* format specific features. Returns NULL if there is no format layer.
*/
const char *
qemuBlockStorageSourceGetFormatNodename(virStorageSource *src)
{
return src->nodenameformat;
}
/**
* qemuBlockStorageSourceSupportsConcurrentAccess:
* @src: disk storage source
*
* Returns true if the given storage format supports concurrent access from two
* separate processes.
*/
bool
qemuBlockStorageSourceSupportsConcurrentAccess(virStorageSource *src)
{
/* no need to check in backing chain since only RAW storage supports this */
return qemuBlockStorageSourceIsRaw(src);
}
/**
* qemuBlockStorageSourceGetURI:
* @src: disk storage source
*
* Formats a URI from a virStorageSource.
*/
virURI *
qemuBlockStorageSourceGetURI(virStorageSource *src)
{
g_autoptr(virURI) uri = NULL;
if (src->nhosts != 1) {
virReportError(VIR_ERR_INTERNAL_ERROR,
_("protocol '%1$s' accepts only one host"),
virStorageNetProtocolTypeToString(src->protocol));
return NULL;
}
uri = g_new0(virURI, 1);
if (src->hosts->transport == VIR_STORAGE_NET_HOST_TRANS_TCP) {
uri->port = src->hosts->port;
uri->scheme = g_strdup(virStorageNetProtocolTypeToString(src->protocol));
} else {
uri->scheme = g_strdup_printf("%s+%s",
virStorageNetProtocolTypeToString(src->protocol),
virStorageNetHostTransportTypeToString(src->hosts->transport));
}
if (src->path) {
if (src->volume) {
uri->path = g_strdup_printf("/%s/%s", src->volume, src->path);
} else {
uri->path = g_strdup_printf("%s%s",
g_path_is_absolute(src->path) ? "" : "/",
src->path);
}
}
uri->query = g_strdup(src->query);
uri->server = g_strdup(src->hosts->name);
return g_steal_pointer(&uri);
}
/**
* qemuBlockStorageSourceBuildJSONSocketAddress
* @host: the virStorageNetHostDef * definition to build
*
* Formats @hosts into a json object conforming to the 'SocketAddress' type
* in qemu.
*
* Returns a virJSONValue * for a single server.
*/
static virJSONValue *
qemuBlockStorageSourceBuildJSONSocketAddress(virStorageNetHostDef *host)
{
g_autoptr(virJSONValue) server = NULL;
g_autofree char *port = NULL;
switch (host->transport) {
case VIR_STORAGE_NET_HOST_TRANS_TCP:
port = g_strdup_printf("%u", host->port);
if (virJSONValueObjectAdd(&server,
"s:type", "inet",
"s:host", host->name,
"s:port", port,
NULL) < 0)
return NULL;
break;
case VIR_STORAGE_NET_HOST_TRANS_UNIX:
if (virJSONValueObjectAdd(&server,
"s:type", "unix",
"s:path", host->socket,
NULL) < 0)
return NULL;
break;
case VIR_STORAGE_NET_HOST_TRANS_RDMA:
case VIR_STORAGE_NET_HOST_TRANS_LAST:
virReportError(VIR_ERR_INTERNAL_ERROR,
_("transport protocol '%1$s' is not yet supported"),
virStorageNetHostTransportTypeToString(host->transport));
return NULL;
}
return g_steal_pointer(&server);
}
/**
* qemuBlockStorageSourceBuildHostsJSONSocketAddress:
* @src: disk storage source
*
* Formats src->hosts into a json object conforming to the 'SocketAddress' type
* in qemu.
*/
static virJSONValue *
qemuBlockStorageSourceBuildHostsJSONSocketAddress(virStorageSource *src)
{
g_autoptr(virJSONValue) servers = NULL;
g_autoptr(virJSONValue) server = NULL;
virStorageNetHostDef *host;
size_t i;
servers = virJSONValueNewArray();
for (i = 0; i < src->nhosts; i++) {
host = src->hosts + i;
if (!(server = qemuBlockStorageSourceBuildJSONSocketAddress(host)))
return NULL;
if (virJSONValueArrayAppend(servers, &server) < 0)
return NULL;
}
return g_steal_pointer(&servers);
}
/**
* qemuBlockStorageSourceBuildJSONInetSocketAddress
* @host: the virStorageNetHostDef * definition to build
*
* Formats @hosts into a json object conforming to the 'InetSocketAddress' type
* in qemu.
*
* Returns a virJSONValue *for a single server.
*/
static virJSONValue *
qemuBlockStorageSourceBuildJSONInetSocketAddress(virStorageNetHostDef *host)
{
virJSONValue *ret = NULL;
g_autofree char *port = NULL;
if (host->transport != VIR_STORAGE_NET_HOST_TRANS_TCP) {
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
_("only TCP protocol can be converted to InetSocketAddress"));
return NULL;
}
port = g_strdup_printf("%u", host->port);
ignore_value(virJSONValueObjectAdd(&ret,
"s:host", host->name,
"s:port", port,
NULL));
return ret;
}
/**
* qemuBlockStorageSourceBuildJSONNFSServer(virStorageNetHostDef *host)
* @host: the virStorageNetHostDef * definition to build
*
* Formats @hosts into a json object conforming to the 'NFSServer' type
* in qemu.
*
* Returns a virJSONValue *for a single server.
*/
static virJSONValue *
qemuBlockStorageSourceBuildJSONNFSServer(virStorageNetHostDef *host)
{
virJSONValue *ret = NULL;
ignore_value(virJSONValueObjectAdd(&ret,
"s:host", host->name,
"s:type", "inet",
NULL));
return ret;
}
/**
* qemuBlockStorageSourceBuildHostsJSONInetSocketAddress:
* @src: disk storage source
*
* Formats src->hosts into a json object conforming to the 'InetSocketAddress'
* type in qemu.
*/
static virJSONValue *
qemuBlockStorageSourceBuildHostsJSONInetSocketAddress(virStorageSource *src)
{
g_autoptr(virJSONValue) servers = NULL;
g_autoptr(virJSONValue) server = NULL;
virStorageNetHostDef *host;
size_t i;
servers = virJSONValueNewArray();
for (i = 0; i < src->nhosts; i++) {
host = src->hosts + i;
if (!(server = qemuBlockStorageSourceBuildJSONInetSocketAddress(host)))
return NULL;
if (virJSONValueArrayAppend(servers, &server) < 0)
return NULL;
}
return g_steal_pointer(&servers);
}
static virJSONValue *
qemuBlockStorageSourceGetGlusterProps(virStorageSource *src,
bool onlytarget)
{
g_autoptr(virJSONValue) servers = NULL;
g_autoptr(virJSONValue) props = NULL;
if (!(servers = qemuBlockStorageSourceBuildHostsJSONSocketAddress(src)))
return NULL;
/* { driver:"gluster",
* volume:"testvol",
* path:"/a.img",
* server :[{type:"tcp", host:"1.2.3.4", port:24007},
* {type:"unix", socket:"/tmp/glusterd.socket"}, ...]}
*/
if (virJSONValueObjectAdd(&props,
"s:volume", src->volume,
"s:path", src->path,
"a:server", &servers, NULL) < 0)
return NULL;
if (!onlytarget &&
src->debug &&
virJSONValueObjectAdd(&props, "u:debug", src->debugLevel, NULL) < 0)
return NULL;
return g_steal_pointer(&props);
}
static virJSONValue *
qemuBlockStorageSourceGetVxHSProps(virStorageSource *src,
bool onlytarget)
{
g_autoptr(virJSONValue) server = NULL;
const char *tlsAlias = src->tlsAlias;
virJSONValue *ret = NULL;
if (src->nhosts != 1) {
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
_("VxHS protocol accepts only one host"));
return NULL;
}
if (!(server = qemuBlockStorageSourceBuildJSONInetSocketAddress(&src->hosts[0])))
return NULL;
if (onlytarget)
tlsAlias = NULL;
/* VxHS disk specification example:
* { driver:"vxhs",
* tls-creds:"objvirtio-disk0_tls0",
* vdisk-id:"eb90327c-8302-4725-4e85ed4dc251",
* server:{type:"tcp", host:"1.2.3.4", port:9999}}
*/
ignore_value(virJSONValueObjectAdd(&ret,
"S:tls-creds", tlsAlias,
"s:vdisk-id", src->path,
"a:server", &server, NULL));
return ret;
}
static virJSONValue *
qemuBlockStorageSourceGetNFSProps(virStorageSource *src)
{
g_autoptr(virJSONValue) server = NULL;
virJSONValue *ret = NULL;
if (!(server = qemuBlockStorageSourceBuildJSONNFSServer(&src->hosts[0])))
return NULL;
/* NFS disk specification example:
* { driver:"nfs",
* user: "0",
* group: "0",
* path: "/foo/bar/baz",
* server: {type:"tcp", host:"1.2.3.4"}}
*/
if (virJSONValueObjectAdd(&ret,
"a:server", &server,
"S:path", src->path, NULL) < 0)
return NULL;
if (src->nfs_uid != -1 &&
virJSONValueObjectAdd(&ret, "i:user", src->nfs_uid, NULL) < 0)
return NULL;
if (src->nfs_gid != -1 &&
virJSONValueObjectAdd(&ret, "i:group", src->nfs_gid, NULL) < 0)
return NULL;
return ret;
}
static virJSONValue *
qemuBlockStorageSourceGetCURLProps(virStorageSource *src,
bool onlytarget)
{
qemuDomainStorageSourcePrivate *srcPriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(src);
const char *passwordalias = NULL;
const char *cookiealias = NULL;
const char *username = NULL;
virJSONValue *ret = NULL;
g_autoptr(virURI) uri = NULL;
g_autofree char *uristr = NULL;
g_autofree char *cookiestr = NULL;
/**
* Common options:
* url, readahead, timeout, username, password-secret, proxy-username,
* proxy-password-secret
*
* Options for http transport:
* cookie, cookie-secret
*
* Options for secure transport (ftps, https):
* sslverify
*/
if (!(uri = qemuBlockStorageSourceGetURI(src)))
return NULL;
uristr = virURIFormat(uri);
if (!onlytarget) {
if (src->auth) {
username = src->auth->username;
passwordalias = srcPriv->secinfo->alias;
}
if (srcPriv &&
srcPriv->httpcookie)
cookiealias = srcPriv->httpcookie->alias;
} else {
/* format target string along with cookies */
cookiestr = qemuBlockStorageSourceGetCookieString(src);
}
ignore_value(virJSONValueObjectAdd(&ret,
"s:url", uristr,
"S:username", username,
"S:password-secret", passwordalias,
"T:sslverify", src->sslverify,
"S:cookie", cookiestr,
"S:cookie-secret", cookiealias,
"P:timeout", src->timeout,
"P:readahead", src->readahead,
NULL));
return ret;
}
static virJSONValue *
qemuBlockStorageSourceGetNbdkitProps(virStorageSource *src)
{
qemuDomainStorageSourcePrivate *srcPriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(src);
virJSONValue *ret = NULL;
g_autoptr(virJSONValue) serverprops = NULL;
virStorageNetHostDef host = { .transport = VIR_STORAGE_NET_HOST_TRANS_UNIX };
/* srcPriv->nbdkitProcess will already be initialized if we can use nbdkit
* to proxy this storage source */
if (!(srcPriv && srcPriv->nbdkitProcess))
return NULL;
host.socket = srcPriv->nbdkitProcess->socketfile;
serverprops = qemuBlockStorageSourceBuildJSONSocketAddress(&host);
if (!serverprops)
return NULL;
if (virJSONValueObjectAdd(&ret, "a:server", &serverprops, NULL) < 0)
return NULL;
return ret;
}
static virJSONValue *
qemuBlockStorageSourceGetISCSIProps(virStorageSource *src,
bool onlytarget)
{
qemuDomainStorageSourcePrivate *srcPriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(src);
g_autofree char *target = NULL;
char *lunStr = NULL;
char *username = NULL;
char *objalias = NULL;
g_autofree char *portal = NULL;
unsigned int lun = 0;
virJSONValue *ret = NULL;
/* { driver:"iscsi",
* transport:"tcp", ("iser" also possible)
* portal:"example.com",
* target:"iqn.2017-04.com.example:iscsi-disks",
* lun:1,
* user:"username",
* password-secret:"secret-alias",
* initiator-name:"iqn.2017-04.com.example:client"
* }
*/
if (src->nhosts != 1) {
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
_("iSCSI protocol accepts only one host"));
return NULL;
}
target = g_strdup(src->path);
/* Separate the target and lun */
if ((lunStr = strchr(target, '/'))) {
*(lunStr++) = '\0';
if (virStrToLong_ui(lunStr, NULL, 10, &lun) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
_("cannot parse target for lunStr '%1$s'"),
target);
return NULL;
}
}
/* combine host and port into portal */
if (virSocketAddrNumericFamily(src->hosts[0].name) == AF_INET6) {
portal = g_strdup_printf("[%s]:%u", src->hosts[0].name,
src->hosts[0].port);
} else {
portal = g_strdup_printf("%s:%u", src->hosts[0].name, src->hosts[0].port);
}
if (!onlytarget && src->auth) {
username = src->auth->username;
objalias = srcPriv->secinfo->alias;
}
ignore_value(virJSONValueObjectAdd(&ret,
"s:portal", portal,
"s:target", target,
"u:lun", lun,
"s:transport", "tcp",
"S:user", username,
"S:password-secret", objalias,
"S:initiator-name", src->initiator.iqn,
NULL));
return ret;
}
static virJSONValue *
qemuBlockStorageSourceGetNBDProps(virStorageSource *src,
bool onlytarget)
{
g_autoptr(virJSONValue) serverprops = NULL;
const char *tlsAlias = src->tlsAlias;
const char *tlsHostname = src->tlsHostname;
virJSONValue *ret = NULL;
if (src->nhosts != 1) {
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
_("nbd protocol accepts only one host"));
return NULL;
}
if (!(serverprops = qemuBlockStorageSourceBuildJSONSocketAddress(&src->hosts[0])))
return NULL;
if (onlytarget) {
tlsAlias = NULL;
tlsHostname = NULL;
}
if (virJSONValueObjectAdd(&ret,
"a:server", &serverprops,
"S:export", src->path,
"S:tls-creds", tlsAlias,
"S:tls-hostname", tlsHostname,
"p:reconnect-delay", src->reconnectDelay,
NULL) < 0)
return NULL;
return ret;
}
static virJSONValue *
qemuBlockStorageSourceGetRBDProps(virStorageSource *src,
bool onlytarget)
{
qemuDomainStorageSourcePrivate *srcPriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(src);
g_autoptr(virJSONValue) servers = NULL;
virJSONValue *ret = NULL;
g_autoptr(virJSONValue) encrypt = NULL;
const char *encformat = NULL;
const char *username = NULL;
g_autoptr(virJSONValue) authmodes = NULL;
const char *keysecret = NULL;
if (src->nhosts > 0 &&
!(servers = qemuBlockStorageSourceBuildHostsJSONInetSocketAddress(src)))
return NULL;
if (!onlytarget && src->auth) {
username = srcPriv->secinfo->username;
keysecret = srcPriv->secinfo->alias;
/* the auth modes are modelled after our old command line generator */
if (!(authmodes = virJSONValueFromString("[\"cephx\",\"none\"]")))
return NULL;
}
if (src->encryption &&
src->encryption->engine == VIR_STORAGE_ENCRYPTION_ENGINE_LIBRBD) {
size_t i;
switch ((virStorageEncryptionFormatType) src->encryption->format) {
case VIR_STORAGE_ENCRYPTION_FORMAT_LUKS:
encformat = "luks";
break;
case VIR_STORAGE_ENCRYPTION_FORMAT_LUKS2:
encformat = "luks2";
break;
case VIR_STORAGE_ENCRYPTION_FORMAT_LUKS_ANY:
encformat = "luks-any";
break;
case VIR_STORAGE_ENCRYPTION_FORMAT_QCOW:
case VIR_STORAGE_ENCRYPTION_FORMAT_DEFAULT:
case VIR_STORAGE_ENCRYPTION_FORMAT_LAST:
default:
break;
}
for (i = src->encryption->nsecrets; i > 0; --i) {
g_autoptr(virJSONValue) new = NULL;
/* we consume the lower layer 'encrypt' into a new object */
if (virJSONValueObjectAdd(&new,
"s:format", encformat,
"s:key-secret", srcPriv->encinfo[i-1]->alias,
"A:parent", &encrypt,
NULL) < 0)
return NULL;
encrypt = g_steal_pointer(&new);
}
}
if (virJSONValueObjectAdd(&ret,
"s:pool", src->volume,
"s:image", src->path,
"S:snapshot", src->snapshot,
"S:conf", src->configFile,
"A:server", &servers,
"A:encrypt", &encrypt,
"S:user", username,
"A:auth-client-required", &authmodes,
"S:key-secret", keysecret,
NULL) < 0)
return NULL;
return ret;
}
static virJSONValue *
qemuBlockStorageSourceGetSheepdogProps(virStorageSource *src)
{
g_autoptr(virJSONValue) serverprops = NULL;
virJSONValue *ret = NULL;
if (src->nhosts != 1) {
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
_("sheepdog protocol accepts only one host"));
return NULL;
}
if (!(serverprops = qemuBlockStorageSourceBuildJSONSocketAddress(&src->hosts[0])))
return NULL;
/* libvirt does not support the 'snap-id' and 'tag' properties */
if (virJSONValueObjectAdd(&ret,
"a:server", &serverprops,
"s:vdi", src->path,
NULL) < 0)
return NULL;
return ret;
}
static virJSONValue *
qemuBlockStorageSourceGetSshProps(virStorageSource *src)
{
g_autoptr(virJSONValue) serverprops = NULL;
virJSONValue *ret = NULL;
const char *username = NULL;
g_autoptr(virJSONValue) host_key_check = NULL;
if (src->nhosts != 1) {
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
_("ssh protocol accepts only one host"));
return NULL;
}
serverprops = qemuBlockStorageSourceBuildJSONInetSocketAddress(&src->hosts[0]);
if (!serverprops)
return NULL;
if (src->auth)
username = src->auth->username;
else if (src->ssh_user)
username = src->ssh_user;
if (src->ssh_host_key_check_disabled &&
virJSONValueObjectAdd(&host_key_check,
"s:mode", "none",
NULL) < 0)
return NULL;
if (virJSONValueObjectAdd(&ret,
"s:path", src->path,
"a:server", &serverprops,
"S:user", username,
"A:host-key-check", &host_key_check,
NULL) < 0)
return NULL;
return ret;
}
static virJSONValue *
qemuBlockStorageSourceGetFileProps(virStorageSource *src,
bool onlytarget)
{
const char *path = src->path;
const char *iomode = NULL;
const char *prManagerAlias = NULL;
virJSONValue *ret = NULL;
if (!onlytarget) {
qemuDomainStorageSourcePrivate *srcpriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(src);
if (src->pr)
prManagerAlias = src->pr->mgralias;
if (src->iomode != VIR_DOMAIN_DISK_IO_DEFAULT)
iomode = virDomainDiskIoTypeToString(src->iomode);
if (srcpriv && srcpriv->fdpass)
path = qemuFDPassGetPath(srcpriv->fdpass);
}
ignore_value(virJSONValueObjectAdd(&ret,
"s:filename", path,
"S:aio", iomode,
"S:pr-manager", prManagerAlias,
NULL) < 0);
return ret;
}
static virJSONValue *
qemuBlockStorageSourceGetVvfatProps(virStorageSource *src,
bool onlytarget)
{
g_autoptr(virJSONValue) ret = NULL;
/* libvirt currently does not handle the following attributes:
* '*fat-type': 'int'
* '*label': 'str'
*/
if (virJSONValueObjectAdd(&ret,
"s:driver", "vvfat",
"s:dir", src->path,
"b:floppy", src->floppyimg, NULL) < 0)
return NULL;
if (!onlytarget &&
virJSONValueObjectAdd(&ret, "b:rw", !src->readonly, NULL) < 0)
return NULL;
return g_steal_pointer(&ret);
}
static virJSONValue *
qemuBlockStorageSourceGetNVMeProps(virStorageSource *src)
{
const virStorageSourceNVMeDef *nvme = src->nvme;
g_autofree char *pciAddr = NULL;
virJSONValue *ret = NULL;
if (!(pciAddr = virPCIDeviceAddressAsString(&nvme->pciAddr)))
return NULL;
ignore_value(virJSONValueObjectAdd(&ret,
"s:driver", "nvme",
"s:device", pciAddr,
"U:namespace", nvme->namespc,
NULL));
return ret;
}
static virJSONValue *
qemuBlockStorageSourceGetVhostVdpaProps(virStorageSource *src)
{
virJSONValue *ret = NULL;
qemuDomainStorageSourcePrivate *srcpriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(src);
ignore_value(virJSONValueObjectAdd(&ret,
"s:driver", "virtio-blk-vhost-vdpa",
"s:path", qemuFDPassGetPath(srcpriv->fdpass),
NULL));
return ret;
}
static int
qemuBlockStorageSourceGetBlockdevGetCacheProps(virStorageSource *src,
virJSONValue **cache)
{
bool direct = false;
bool noflush = false;
if (!qemuDomainDiskCachemodeFlags(src->cachemode, NULL, &direct, &noflush))
return 0;
if (virJSONValueObjectAdd(cache,
"b:direct", direct,
"b:no-flush", noflush,
NULL) < 0)
return -1;
return 0;
}
/**
* qemuBlockStorageSourceAddBlockdevCommonProps:
* @props: JSON object to append the props to
* @src: storage source
* @nodename: nodename to use for @src
* @effective: Whether props for the effective(topmost) layer are to be formatted
*
* Add the common props (node name, read-only state, cache configuration, discard)
* to a JSON object for a -blockdev definition. If @effective is true,
* the props are configured for the topmost layer used to access the data,
* otherwise the props are configured for the storage protocol backing a format
* layer.
*/
static int
qemuBlockStorageSourceAddBlockdevCommonProps(virJSONValue **props,
virStorageSource *src,
const char *nodename,
bool effective)
{
virStorageType actualType = virStorageSourceGetActualType(src);
g_autoptr(virJSONValue) cache = NULL;
const char *detectZeroes = NULL;
const char *discard = NULL;
virTristateBool autoReadOnly = VIR_TRISTATE_BOOL_ABSENT;
virTristateBool readOnly = VIR_TRISTATE_BOOL_ABSENT;
if (qemuBlockNodeNameValidate(nodename) < 0)
return -1;
if (qemuBlockStorageSourceGetBlockdevGetCacheProps(src, &cache) < 0)
return -1;
if (effective) {
virDomainDiskDetectZeroes dz = virDomainDiskGetDetectZeroesMode(src->discard,
src->detect_zeroes);
if (src->discard != VIR_DOMAIN_DISK_DISCARD_DEFAULT)
discard = virDomainDiskDiscardTypeToString(src->discard);
if (dz != VIR_DOMAIN_DISK_DETECT_ZEROES_DEFAULT)
detectZeroes = virDomainDiskDetectZeroesTypeToString(dz);
autoReadOnly = VIR_TRISTATE_BOOL_ABSENT;
readOnly = virTristateBoolFromBool(src->readonly);
} else {
/* when passing a FD to qemu via the /dev/fdset mechanism qemu
* fetches the appropriate FD from the fdset by checking that it has
* the correct accessmode. Now with 'auto-read-only' in effect qemu
* wants to use a read-only FD first. If the user didn't pass multiple
* FDs the feature will not work regardless, so we'll not enable it. */
if ((actualType == VIR_STORAGE_TYPE_FILE || actualType == VIR_STORAGE_TYPE_BLOCK) &&
src->fdtuple && src->fdtuple->nfds == 1) {
autoReadOnly = VIR_TRISTATE_BOOL_ABSENT;
/* now we setup the normal readonly flag. If user requested write access honour it */
if (src->fdtuple->writable)
readOnly = VIR_TRISTATE_BOOL_NO;
else
readOnly = virTristateBoolFromBool(src->readonly);
} else {
autoReadOnly = VIR_TRISTATE_BOOL_YES;
}
discard = "unmap";
}
/* currently unhandled global properties:
* '*force-share': 'bool'
*/
if (virJSONValueObjectAdd(props,
"s:node-name", nodename,
"T:read-only", readOnly,
"T:auto-read-only", autoReadOnly,
"S:discard", discard,
"S:detect-zeroes", detectZeroes,
"A:cache", &cache,
NULL) < 0)
return -1;
return 0;
}
/**
* qemuBlockStorageSourceGetBackendProps:
* @src: disk source
* @flags: bitwise-or of qemuBlockStorageSourceBackendPropsFlags
*
* Flags:
* QEMU_BLOCK_STORAGE_SOURCE_BACKEND_PROPS_LEGACY:
* use legacy formatting of attributes (for -drive / old qemus)
* QEMU_BLOCK_STORAGE_SOURCE_BACKEND_PROPS_TARGET_ONLY:
* omit any data which does not identify the image itself
* QEMU_BLOCK_STORAGE_SOURCE_BACKEND_PROPS_EFFECTIVE_NODE:
* the 'protocol' node is used as the effective/top node of a virStorageSource
*
* Creates a JSON object describing the underlying storage or protocol of a
* storage source. Returns NULL on error and reports an appropriate error message.
*/
virJSONValue *
qemuBlockStorageSourceGetBackendProps(virStorageSource *src,
unsigned int flags)
{
virStorageType actualType = virStorageSourceGetActualType(src);
g_autoptr(virJSONValue) fileprops = NULL;
const char *driver = NULL;
bool onlytarget = flags & QEMU_BLOCK_STORAGE_SOURCE_BACKEND_PROPS_TARGET_ONLY;
bool legacy = flags & QEMU_BLOCK_STORAGE_SOURCE_BACKEND_PROPS_LEGACY;
switch (actualType) {
case VIR_STORAGE_TYPE_BLOCK:
case VIR_STORAGE_TYPE_FILE:
if (virStorageSourceIsBlockLocal(src)) {
if (src->hostcdrom)
driver = "host_cdrom";
else
driver = "host_device";
} else {
driver = "file";
}
if (!(fileprops = qemuBlockStorageSourceGetFileProps(src, onlytarget)))
return NULL;
break;
case VIR_STORAGE_TYPE_DIR:
/* qemu handles directories by exposing them as a device with emulated
* FAT filesystem */
if (!(fileprops = qemuBlockStorageSourceGetVvfatProps(src, onlytarget)))
return NULL;
break;
case VIR_STORAGE_TYPE_NVME:
if (!(fileprops = qemuBlockStorageSourceGetNVMeProps(src)))
return NULL;
break;
case VIR_STORAGE_TYPE_VHOST_VDPA:
if (!(fileprops = qemuBlockStorageSourceGetVhostVdpaProps(src)))
return NULL;
break;
case VIR_STORAGE_TYPE_VHOST_USER:
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
_("unable to create blockdev props for vhostuser disk type"));
return NULL;
case VIR_STORAGE_TYPE_VOLUME:
virReportError(VIR_ERR_INTERNAL_ERROR,
_("storage source pool '%1$s' volume '%2$s' is not translated"),
src->srcpool->pool, src->srcpool->volume);
return NULL;
case VIR_STORAGE_TYPE_NONE:
case VIR_STORAGE_TYPE_LAST:
virReportEnumRangeError(virStorageType, actualType);
return NULL;
case VIR_STORAGE_TYPE_NETWORK:
/* prefer using nbdkit if configured for sources that are supported */
if ((fileprops = qemuBlockStorageSourceGetNbdkitProps(src))) {
driver = "nbd";
break;
}
switch ((virStorageNetProtocol) src->protocol) {
case VIR_STORAGE_NET_PROTOCOL_GLUSTER:
driver = "gluster";
if (!(fileprops = qemuBlockStorageSourceGetGlusterProps(src, onlytarget)))
return NULL;
break;
case VIR_STORAGE_NET_PROTOCOL_VXHS:
driver = "vxhs";
if (!(fileprops = qemuBlockStorageSourceGetVxHSProps(src, onlytarget)))
return NULL;
break;
case VIR_STORAGE_NET_PROTOCOL_HTTP:
case VIR_STORAGE_NET_PROTOCOL_HTTPS:
case VIR_STORAGE_NET_PROTOCOL_FTP:
case VIR_STORAGE_NET_PROTOCOL_FTPS:
case VIR_STORAGE_NET_PROTOCOL_TFTP:
driver = virStorageNetProtocolTypeToString(src->protocol);
if (!(fileprops = qemuBlockStorageSourceGetCURLProps(src, onlytarget)))
return NULL;
break;
case VIR_STORAGE_NET_PROTOCOL_ISCSI:
driver = "iscsi";
if (!(fileprops = qemuBlockStorageSourceGetISCSIProps(src, onlytarget)))
return NULL;
break;
case VIR_STORAGE_NET_PROTOCOL_NBD:
driver = "nbd";
if (!(fileprops = qemuBlockStorageSourceGetNBDProps(src, onlytarget)))
return NULL;
break;
case VIR_STORAGE_NET_PROTOCOL_RBD:
driver = "rbd";
if (!(fileprops = qemuBlockStorageSourceGetRBDProps(src, onlytarget)))
return NULL;
break;
case VIR_STORAGE_NET_PROTOCOL_SHEEPDOG:
driver = "sheepdog";
if (!(fileprops = qemuBlockStorageSourceGetSheepdogProps(src)))
return NULL;
break;
case VIR_STORAGE_NET_PROTOCOL_SSH:
driver = "ssh";
if (!(fileprops = qemuBlockStorageSourceGetSshProps(src)))
return NULL;
break;
case VIR_STORAGE_NET_PROTOCOL_NFS:
driver = "nfs";
if (!(fileprops = qemuBlockStorageSourceGetNFSProps(src)))
return NULL;
break;
case VIR_STORAGE_NET_PROTOCOL_NONE:
case VIR_STORAGE_NET_PROTOCOL_LAST:
virReportEnumRangeError(virStorageNetProtocol, src->protocol);
return NULL;
}
break;
}
if (driver && virJSONValueObjectPrependString(fileprops, "driver", driver) < 0)
return NULL;
if (!onlytarget && !legacy) {
if (qemuBlockStorageSourceAddBlockdevCommonProps(&fileprops, src,
qemuBlockStorageSourceGetStorageNodename(src),
!!(flags & QEMU_BLOCK_STORAGE_SOURCE_BACKEND_PROPS_EFFECTIVE_NODE)) < 0)
return NULL;
}
return g_steal_pointer(&fileprops);
}
static int
qemuBlockStorageSourceGetFormatLUKSProps(virStorageSource *src,
virJSONValue *props)
{
qemuDomainStorageSourcePrivate *srcPriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(src);
/* validation ensures that the qemu encryption engine accepts only a single secret */
if (!srcPriv || !srcPriv->encinfo || !srcPriv->encinfo[0]->alias) {
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
_("missing secret info for 'luks' driver"));
return -1;
}
if (virJSONValueObjectAdd(&props,
"s:driver", "luks",
"s:key-secret", srcPriv->encinfo[0]->alias,
NULL) < 0)
return -1;
return 0;
}
static int
qemuBlockStorageSourceGetCryptoProps(virStorageSource *src,
virJSONValue **encprops)
{
qemuDomainStorageSourcePrivate *srcpriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(src);
const char *encformat = NULL;
*encprops = NULL;
if (!src->encryption ||
src->encryption->engine != VIR_STORAGE_ENCRYPTION_ENGINE_QEMU ||
!srcpriv ||
!srcpriv->encinfo)
return 0;
switch ((virStorageEncryptionFormatType) src->encryption->format) {
case VIR_STORAGE_ENCRYPTION_FORMAT_QCOW:
encformat = "aes";
break;
case VIR_STORAGE_ENCRYPTION_FORMAT_LUKS:
encformat = "luks";
break;
case VIR_STORAGE_ENCRYPTION_FORMAT_LUKS2:
case VIR_STORAGE_ENCRYPTION_FORMAT_LUKS_ANY:
/* validation code asserts the above cases are impossible */
case VIR_STORAGE_ENCRYPTION_FORMAT_DEFAULT:
case VIR_STORAGE_ENCRYPTION_FORMAT_LAST:
default:
virReportEnumRangeError(virStorageEncryptionFormatType,
src->encryption->format);
return -1;
}
/* validation ensures that the qemu encryption engine accepts only a single secret */
return virJSONValueObjectAdd(encprops,
"s:format", encformat,
"s:key-secret", srcpriv->encinfo[0]->alias,
NULL);
}
static int
qemuBlockStorageSourceGetFormatQcowGenericProps(virStorageSource *src,
const char *format,
virJSONValue *props)
{
g_autoptr(virJSONValue) encprops = NULL;
if (qemuBlockStorageSourceGetCryptoProps(src, &encprops) < 0)
return -1;
if (virJSONValueObjectAdd(&props,
"s:driver", format,
"A:encrypt", &encprops, NULL) < 0)
return -1;
return 0;
}
static int
qemuBlockStorageSourceGetFormatQcow2Props(virStorageSource *src,
virJSONValue *props)
{
/* currently unhandled qcow2 props:
*
* 'lazy-refcounts'
* 'pass-discard-request'
* 'pass-discard-snapshot'
* 'pass-discard-other'
* 'overlap-check'
* 'l2-cache-size'
* 'l2-cache-entry-size'
* 'refcount-cache-size'
* 'cache-clean-interval'
*/
if (qemuBlockStorageSourceGetFormatQcowGenericProps(src, "qcow2", props) < 0)
return -1;
/* 'cache-size' controls the maximum size of L2 and refcount caches.
* see: qemu.git/docs/qcow2-cache.txt
* https://git.qemu.org/?p=qemu.git;a=blob;f=docs/qcow2-cache.txt
*/
if (virJSONValueObjectAdd(&props,
"P:cache-size", src->metadataCacheMaxSize,
"T:discard-no-unref", src->discard_no_unref,
NULL) < 0)
return -1;
if (src->dataFileStore) {
if (virJSONValueObjectAdd(&props,
"s:data-file", qemuBlockStorageSourceGetEffectiveNodename(src->dataFileStore),
NULL) < 0)
return -1;
}
return 0;
}
static virJSONValue *
qemuBlockStorageSourceGetBlockdevFormatProps(virStorageSource *src)
{
const char *driver = NULL;
g_autoptr(virJSONValue) props = NULL;
if (qemuBlockStorageSourceAddBlockdevCommonProps(&props,
src,
qemuBlockStorageSourceGetFormatNodename(src),
true) < 0)
return NULL;
switch ((virStorageFileFormat) src->format) {
case VIR_STORAGE_FILE_FAT:
/* The fat layer is emulated by the storage access layer, so we need to
* put a raw layer on top */
driver = "raw";
break;
case VIR_STORAGE_FILE_RAW:
if (qemuBlockStorageSourceIsLUKS(src)) {
if (qemuBlockStorageSourceGetFormatLUKSProps(src, props) < 0)
return NULL;
} else {
driver = "raw";
}
break;
case VIR_STORAGE_FILE_QCOW2:
if (qemuBlockStorageSourceGetFormatQcow2Props(src, props) < 0)
return NULL;
break;
case VIR_STORAGE_FILE_QCOW:
if (qemuBlockStorageSourceGetFormatQcowGenericProps(src, "qcow", props) < 0)
return NULL;
break;
/* formats without any special parameters */
case VIR_STORAGE_FILE_PLOOP:
driver = "parallels";
break;
case VIR_STORAGE_FILE_VHD:
driver = "vhdx";
break;
case VIR_STORAGE_FILE_BOCHS:
case VIR_STORAGE_FILE_CLOOP:
case VIR_STORAGE_FILE_DMG:
case VIR_STORAGE_FILE_VDI:
case VIR_STORAGE_FILE_VPC:
case VIR_STORAGE_FILE_QED:
case VIR_STORAGE_FILE_VMDK:
driver = virStorageFileFormatTypeToString(src->format);
break;
case VIR_STORAGE_FILE_AUTO_SAFE:
case VIR_STORAGE_FILE_AUTO:
case VIR_STORAGE_FILE_NONE:
case VIR_STORAGE_FILE_COW:
case VIR_STORAGE_FILE_ISO:
case VIR_STORAGE_FILE_DIR:
virReportError(VIR_ERR_INTERNAL_ERROR,
_("mishandled storage format '%1$s'"),
virStorageFileFormatTypeToString(src->format));
return NULL;
case VIR_STORAGE_FILE_LAST:
default:
virReportEnumRangeError(virStorageFileFormat, src->format);
return NULL;
}
if (driver &&
virJSONValueObjectAdd(&props, "s:driver", driver, NULL) < 0)
return NULL;
return g_steal_pointer(&props);
}
/**
* qemuBlockStorageSourceGetFormatProps:
*
* @src: storage source to format
* @backingStore: a storage source to use as backing of @src
*
* Formats properties of @src related to the format blockdev driver in qemu
* into a JSON object which can be used with blockdev-add or -blockdev.
*/
virJSONValue *
qemuBlockStorageSourceGetFormatProps(virStorageSource *src,
virStorageSource *backingStore)
{
g_autoptr(virJSONValue) props = NULL;
const char *backingFormatterStr = NULL;
const char *backingNodename = NULL;
if (virStorageSourceIsBacking(backingStore) &&
src->format < VIR_STORAGE_FILE_BACKING) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
_("storage format '%1$s' does not support backing store"),
virStorageFileFormatTypeToString(src->format));
return NULL;
}
if (backingStore &&
src->format >= VIR_STORAGE_FILE_BACKING) {
if (virStorageSourceIsBacking(backingStore)) {
backingFormatterStr = "s:backing";
backingNodename = qemuBlockStorageSourceGetEffectiveNodename(backingStore);
} else {
/* chain is terminated, indicate that no detection should happen in qemu */
backingFormatterStr = "n:backing";
}
}
if (!(props = qemuBlockStorageSourceGetBlockdevFormatProps(src)))
return NULL;
if (virJSONValueObjectAdd(&props,
"s:file", qemuBlockStorageSourceGetEffectiveStorageNodename(src),
backingFormatterStr, backingNodename,
NULL) < 0)
return 0;
return g_steal_pointer(&props);
}
/**
* qemuBlockStorageSourceGetBlockdevStorageSliceProps:
* @src: storage source object
* @effective: Whether this blockdev will be the 'effective' layer of @src
* @resize: If true, the 'size' and 'offset' parameters are not formatted
*
* Formats the JSON object representing -blockdev configuration required to
* configure a 'slice' of @src. If @effective is true, the slice layer is the
* topmost/effective blockdev layer of @src. If @resize is true the 'size' and
* 'offset' are not formatted, which is used to remove a slice restriction
* to resize the image.
*/
static virJSONValue *
qemuBlockStorageSourceGetBlockdevStorageSliceProps(virStorageSource *src,
bool effective,
bool resize)
{
g_autoptr(virJSONValue) props = NULL;
if (virJSONValueObjectAdd(&props,
"s:driver", "raw",
"s:file", qemuBlockStorageSourceGetStorageNodename(src),
NULL) < 0)
return NULL;
if (!resize &&
virJSONValueObjectAdd(&props,
"U:offset", src->sliceStorage->offset,
"U:size", src->sliceStorage->size,
NULL) < 0)
return NULL;
if (qemuBlockStorageSourceAddBlockdevCommonProps(&props,
src,
src->sliceStorage->nodename,
effective) < 0)
return NULL;
return g_steal_pointer(&props);
}
void
qemuBlockStorageSourceAttachDataFree(qemuBlockStorageSourceAttachData *data)
{
size_t i;
if (!data)
return;
virJSONValueFree(data->storageProps);
virJSONValueFree(data->storageSliceProps);
virJSONValueFree(data->formatProps);
virJSONValueFree(data->prmgrProps);
virJSONValueFree(data->authsecretProps);
virJSONValueFree(data->httpcookiesecretProps);
for (i = 0; i < data->encryptsecretCount; ++i) {
virJSONValueFree(data->encryptsecretProps[i]);
g_free(data->encryptsecretAlias[i]);
}
virJSONValueFree(data->tlsProps);
virJSONValueFree(data->tlsKeySecretProps);
g_free(data->tlsAlias);
g_free(data->tlsKeySecretAlias);
g_free(data->authsecretAlias);
g_free(data->encryptsecretProps);
g_free(data->encryptsecretAlias);
g_free(data->httpcookiesecretAlias);
g_free(data->driveCmd);
g_free(data->chardevAlias);
g_free(data);
}
/**
* qemuBlockStorageSourceAttachPrepareBlockdev:
* @src: storage source to prepare data from
* @backingStore: storage source to use as backing of @src
* @autoreadonly: use 'auto-read-only' feature of qemu
*
* Creates a qemuBlockStorageSourceAttachData structure containing data to attach
* @src to a VM using the blockdev-add approach. Note that this function only
* creates the data for the storage source itself, any other related
* authentication/encryption/... objects need to be prepared separately.
*
* The changes are then applied using qemuBlockStorageSourceAttachApply.
*
* Returns the filled data structure on success or NULL on error and a libvirt
* error is reported
*/
qemuBlockStorageSourceAttachData *
qemuBlockStorageSourceAttachPrepareBlockdev(virStorageSource *src,
virStorageSource *backingStore)
{
g_autoptr(qemuBlockStorageSourceAttachData) data = NULL;
bool effective = true;
unsigned int backendpropsflags = 0;
data = g_new0(qemuBlockStorageSourceAttachData, 1);
if (qemuBlockStorageSourceGetFormatNodename(src)) {
if (!(data->formatProps = qemuBlockStorageSourceGetFormatProps(src, backingStore)))
return NULL;
data->formatNodeName = qemuBlockStorageSourceGetFormatNodename(src);
effective = false;
}
if ((data->storageSliceNodeName = qemuBlockStorageSourceGetSliceNodename(src))) {
if (!(data->storageSliceProps = qemuBlockStorageSourceGetBlockdevStorageSliceProps(src, effective, false)))
return NULL;
effective = false;
}
if (effective)
backendpropsflags = QEMU_BLOCK_STORAGE_SOURCE_BACKEND_PROPS_EFFECTIVE_NODE;
if (!(data->storageProps = qemuBlockStorageSourceGetBackendProps(src, backendpropsflags)))
return NULL;
data->storageNodeName = qemuBlockStorageSourceGetStorageNodename(src);
return g_steal_pointer(&data);
}
static int
qemuBlockStorageSourceAttachApplyStorageDeps(qemuMonitor *mon,
qemuBlockStorageSourceAttachData *data)
{
if (data->prmgrProps &&
qemuMonitorAddObject(mon, &data->prmgrProps, &data->prmgrAlias) < 0)
return -1;
if (data->authsecretProps &&
qemuMonitorAddObject(mon, &data->authsecretProps,
&data->authsecretAlias) < 0)
return -1;
if (data->httpcookiesecretProps &&
qemuMonitorAddObject(mon, &data->httpcookiesecretProps,
&data->httpcookiesecretAlias) < 0)
return -1;
if (data->tlsKeySecretProps &&
qemuMonitorAddObject(mon, &data->tlsKeySecretProps,
&data->tlsKeySecretAlias) < 0)
return -1;
if (data->tlsProps &&
qemuMonitorAddObject(mon, &data->tlsProps, &data->tlsAlias) < 0)
return -1;
if (qemuFDPassTransferMonitor(data->fdpass, mon) < 0)
return -1;
return 0;
}
static int
qemuBlockStorageSourceAttachApplyStorage(qemuMonitor *mon,
qemuBlockStorageSourceAttachData *data)
{
if (data->storageProps) {
if (qemuMonitorBlockdevAdd(mon, &data->storageProps) < 0)
return -1;
data->storageAttached = true;
}
return 0;
}
static int
qemuBlockStorageSourceAttachApplyFormatDeps(qemuMonitor *mon,
qemuBlockStorageSourceAttachData *data)
{
size_t i;
for (i = 0; i < data->encryptsecretCount; ++i) {
if (qemuMonitorAddObject(mon, &data->encryptsecretProps[i],
&data->encryptsecretAlias[i]) < 0)
return -1;
}
return 0;
}
static int
qemuBlockStorageSourceAttachApplyFormat(qemuMonitor *mon,
qemuBlockStorageSourceAttachData *data)
{
if (data->formatProps) {
if (qemuMonitorBlockdevAdd(mon, &data->formatProps) < 0)
return -1;
data->formatAttached = true;
}
return 0;
}
static int
qemuBlockStorageSourceAttachApplyStorageSlice(qemuMonitor *mon,
qemuBlockStorageSourceAttachData *data)
{
if (data->storageSliceProps) {
if (qemuMonitorBlockdevAdd(mon, &data->storageSliceProps) < 0)
return -1;
data->storageSliceAttached = true;
}
return 0;
}
/**
* qemuBlockStorageSourceAttachApply:
* @mon: monitor object
* @data: structure holding data of block device to apply
*
* Attaches a virStorageSource definition converted to
* qemuBlockStorageSourceAttachData to a running VM. This function expects being
* called after the monitor was entered.
*
* Returns 0 on success and -1 on error with a libvirt error reported. If an
* error occurred, changes which were already applied need to be rolled back by
* calling qemuBlockStorageSourceAttachRollback.
*/
int
qemuBlockStorageSourceAttachApply(qemuMonitor *mon,
qemuBlockStorageSourceAttachData *data)
{
if (qemuBlockStorageSourceAttachApplyStorageDeps(mon, data) < 0 ||
qemuBlockStorageSourceAttachApplyFormatDeps(mon, data) < 0 ||
qemuBlockStorageSourceAttachApplyStorage(mon, data) < 0 ||
qemuBlockStorageSourceAttachApplyStorageSlice(mon, data) < 0 ||
qemuBlockStorageSourceAttachApplyFormat(mon, data) < 0)
return -1;
if (data->chardevDef) {
g_autoptr(virJSONValue) props = NULL;
if (qemuChardevGetBackendProps(data->chardevDef, false, data->qemuCaps,
data->chardevAlias, NULL, &props) < 0)
return -1;
if (qemuMonitorAttachCharDev(mon, &props, NULL) < 0)
return -1;
data->chardevAdded = true;
}
return 0;
}
/**
* qemuBlockStorageSourceAttachRollback:
* @mon: monitor object
* @data: structure holding data of block device to roll back
*
* Attempts a best effort rollback of changes which were made to a running VM by
* qemuBlockStorageSourceAttachApply. Preserves any existing errors.
*
* This function expects being called after the monitor was entered.
*/
void
qemuBlockStorageSourceAttachRollback(qemuMonitor *mon,
qemuBlockStorageSourceAttachData *data)
{
virErrorPtr orig_err;
size_t i;
virErrorPreserveLast(&orig_err);
if (data->chardevAdded) {
if (qemuMonitorDetachCharDev(mon, data->chardevAlias) < 0) {
VIR_WARN("Unable to remove chardev %s after failed 'device_add'",
data->chardevAlias);
}
}
if (data->formatAttached)
ignore_value(qemuMonitorBlockdevDel(mon, data->formatNodeName));
if (data->storageSliceAttached)
ignore_value(qemuMonitorBlockdevDel(mon, data->storageSliceNodeName));
if (data->storageAttached)
ignore_value(qemuMonitorBlockdevDel(mon, data->storageNodeName));
if (data->prmgrAlias)
ignore_value(qemuMonitorDelObject(mon, data->prmgrAlias, false));
if (data->authsecretAlias)
ignore_value(qemuMonitorDelObject(mon, data->authsecretAlias, false));
for (i = 0; i < data->encryptsecretCount; ++i) {
if (data->encryptsecretAlias[i])
ignore_value(qemuMonitorDelObject(mon, data->encryptsecretAlias[i], false));
}
if (data->httpcookiesecretAlias)
ignore_value(qemuMonitorDelObject(mon, data->httpcookiesecretAlias, false));
if (data->tlsAlias)
ignore_value(qemuMonitorDelObject(mon, data->tlsAlias, false));
if (data->tlsKeySecretAlias)
ignore_value(qemuMonitorDelObject(mon, data->tlsKeySecretAlias, false));
qemuFDPassTransferMonitorRollback(data->fdpass, mon);
virErrorRestore(&orig_err);
}
/**
* qemuBlockStorageSourceDetachPrepare:
* @src: disk source structure
*
* Prepare qemuBlockStorageSourceAttachData *for detaching a single source
* from a VM.
*/
qemuBlockStorageSourceAttachData *
qemuBlockStorageSourceDetachPrepare(virStorageSource *src)
{
qemuDomainStorageSourcePrivate *srcpriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(src);
g_autoptr(qemuBlockStorageSourceAttachData) data = NULL;
data = g_new0(qemuBlockStorageSourceAttachData, 1);
if ((data->formatNodeName = qemuBlockStorageSourceGetFormatNodename(src)))
data->formatAttached = true;
if ((data->storageSliceNodeName = qemuBlockStorageSourceGetSliceNodename(src)))
data->storageSliceAttached = true;
data->storageNodeName = qemuBlockStorageSourceGetStorageNodename(src);
data->storageAttached = true;
if (src->pr &&
!virStoragePRDefIsManaged(src->pr))
data->prmgrAlias = g_strdup(src->pr->mgralias);
data->tlsAlias = g_strdup(src->tlsAlias);
if (srcpriv) {
if (srcpriv->secinfo)
data->authsecretAlias = g_strdup(srcpriv->secinfo->alias);
if (srcpriv->encinfo) {
size_t i;
data->encryptsecretCount = srcpriv->enccount;
data->encryptsecretProps = g_new0(virJSONValue *, srcpriv->enccount);
data->encryptsecretAlias = g_new0(char *, srcpriv->enccount);
for (i = 0; i < srcpriv->enccount; ++i) {
data->encryptsecretAlias[i] = g_strdup(srcpriv->encinfo[i]->alias);
}
}
if (srcpriv->httpcookie)
data->httpcookiesecretAlias = g_strdup(srcpriv->httpcookie->alias);
if (srcpriv->tlsKeySecret)
data->tlsKeySecretAlias = g_strdup(srcpriv->tlsKeySecret->alias);
data->fdpass = srcpriv->fdpass;
}
return g_steal_pointer(&data);
}
void
qemuBlockStorageSourceChainDataFree(qemuBlockStorageSourceChainData *data)
{
size_t i;
if (!data)
return;
for (i = 0; i < data->nsrcdata; i++)
qemuBlockStorageSourceAttachDataFree(data->srcdata[i]);
virJSONValueFree(data->copyOnReadProps);
g_free(data->copyOnReadNodename);
g_free(data->srcdata);
g_free(data);
}
/**
* qemuBlockStorageSourceChainDetachPrepareBlockdev
* @src: storage source chain to remove
*
* Prepares qemuBlockStorageSourceChainData *for detaching @src and its
* backingStore if -blockdev was used.
*/
qemuBlockStorageSourceChainData *
qemuBlockStorageSourceChainDetachPrepareBlockdev(virStorageSource *src)
{
g_autoptr(qemuBlockStorageSourceAttachData) backend = NULL;
g_autoptr(qemuBlockStorageSourceChainData) data = NULL;
virStorageSource *n;
data = g_new0(qemuBlockStorageSourceChainData, 1);
for (n = src; virStorageSourceIsBacking(n); n = n->backingStore) {
if (!(backend = qemuBlockStorageSourceDetachPrepare(n)))
return NULL;
VIR_APPEND_ELEMENT(data->srcdata, data->nsrcdata, backend);
if (n->dataFileStore) {
if (!(backend = qemuBlockStorageSourceDetachPrepare(n->dataFileStore)))
return NULL;
VIR_APPEND_ELEMENT(data->srcdata, data->nsrcdata, backend);
}
}
return g_steal_pointer(&data);
}
/**
* qemuBlockStorageSourceChainDetachPrepareChardev
* @src: storage source chain to remove
*
* Prepares qemuBlockStorageSourceChainData *for detaching @src and its
* backingStore if -chardev was used.
*/
qemuBlockStorageSourceChainData *
qemuBlockStorageSourceChainDetachPrepareChardev(char *chardevAlias)
{
g_autoptr(qemuBlockStorageSourceAttachData) backend = NULL;
g_autoptr(qemuBlockStorageSourceChainData) data = NULL;
data = g_new0(qemuBlockStorageSourceChainData, 1);
backend = g_new0(qemuBlockStorageSourceAttachData, 1);
backend->chardevAlias = chardevAlias;
backend->chardevAdded = true;
VIR_APPEND_ELEMENT(data->srcdata, data->nsrcdata, backend);
return g_steal_pointer(&data);
}
/**
* qemuBlockStorageSourceChainAttach:
* @mon: monitor object
* @data: storage source chain data
*
* Attach a storage source including its backing chain and supporting objects.
* Caller must enter @mon prior calling this function. In case of error this
* function returns -1. @data is updated so that qemuBlockStorageSourceChainDetach
* can be used to roll-back the changes.
*/
int
qemuBlockStorageSourceChainAttach(qemuMonitor *mon,
qemuBlockStorageSourceChainData *data)
{
size_t i;
for (i = data->nsrcdata; i > 0; i--) {
if (qemuBlockStorageSourceAttachApply(mon, data->srcdata[i - 1]) < 0)
return -1;
}
if (data->copyOnReadProps) {
if (qemuMonitorBlockdevAdd(mon, &data->copyOnReadProps) < 0)
return -1;
}
return 0;
}
/**
* qemuBlockStorageSourceChainDetach:
* @mon: monitor object
* @data: storage source chain data
*
* Detach a unused storage source including all its backing chain and related
* objects described by @data.
*/
void
qemuBlockStorageSourceChainDetach(qemuMonitor *mon,
qemuBlockStorageSourceChainData *data)
{
size_t i;
if (!data)
return;
if (data->copyOnReadAttached)
ignore_value(qemuMonitorBlockdevDel(mon, data->copyOnReadNodename));
for (i = 0; i < data->nsrcdata; i++)
qemuBlockStorageSourceAttachRollback(mon, data->srcdata[i]);
}
int
qemuBlockSnapshotAddBlockdev(virJSONValue *actions,
virDomainDiskDef *disk,
virStorageSource *newsrc)
{
return qemuMonitorTransactionSnapshotBlockdev(actions,
qemuBlockStorageSourceGetEffectiveNodename(disk->src),
qemuBlockStorageSourceGetFormatNodename(newsrc));
}
/**
* qemuBlockStorageGetCopyOnReadProps:
* @disk: disk with copy-on-read enabled
*
* Creates blockdev properties for a disk copy-on-read layer.
*/
virJSONValue *
qemuBlockStorageGetCopyOnReadProps(virDomainDiskDef *disk)
{
qemuDomainDiskPrivate *priv = QEMU_DOMAIN_DISK_PRIVATE(disk);
virJSONValue *ret = NULL;
ignore_value(virJSONValueObjectAdd(&ret,
"s:driver", "copy-on-read",
"s:node-name", priv->nodeCopyOnRead,
"s:file", qemuBlockStorageSourceGetEffectiveNodename(disk->src),
"s:discard", "unmap",
NULL));
return ret;
}
/**
* qemuBlockGetBackingStoreString:
* @src: storage source to get the string for
* @pretty: pretty-print the JSON (if applicable, used by tests)
*
* Formats a string used in the backing store field of a disk image which
* supports backing store. Non-local storage may result in use of the json:
* pseudo protocol for any complex configuration.
*/
char *
qemuBlockGetBackingStoreString(virStorageSource *src,
bool pretty)
{
virStorageType actualType = virStorageSourceGetActualType(src);
g_autoptr(virJSONValue) backingProps = NULL;
g_autoptr(virJSONValue) sliceProps = NULL;
virJSONValue *props = NULL;
g_autoptr(virURI) uri = NULL;
g_autofree char *backingJSON = NULL;
if (!src->sliceStorage) {
if (virStorageSourceIsLocalStorage(src)) {
if (src->type == VIR_STORAGE_TYPE_DIR &&
src->format == VIR_STORAGE_FILE_FAT)
return g_strdup_printf("fat:%s", src->path);
return g_strdup(src->path);
}
/* generate simplified URIs for the easy cases */
if (actualType == VIR_STORAGE_TYPE_NETWORK &&
src->nhosts == 1 &&
src->hosts->transport == VIR_STORAGE_NET_HOST_TRANS_TCP &&
src->timeout == 0 &&
src->ncookies == 0 &&
src->sslverify == VIR_TRISTATE_BOOL_ABSENT &&
src->timeout == 0 &&
src->readahead == 0 &&
src->reconnectDelay == 0) {
switch ((virStorageNetProtocol) src->protocol) {
case VIR_STORAGE_NET_PROTOCOL_NBD:
case VIR_STORAGE_NET_PROTOCOL_HTTP:
case VIR_STORAGE_NET_PROTOCOL_HTTPS:
case VIR_STORAGE_NET_PROTOCOL_FTP:
case VIR_STORAGE_NET_PROTOCOL_FTPS:
case VIR_STORAGE_NET_PROTOCOL_TFTP:
case VIR_STORAGE_NET_PROTOCOL_ISCSI:
case VIR_STORAGE_NET_PROTOCOL_GLUSTER:
if (!(uri = qemuBlockStorageSourceGetURI(src)))
return NULL;
return virURIFormat(uri);
case VIR_STORAGE_NET_PROTOCOL_SHEEPDOG:
case VIR_STORAGE_NET_PROTOCOL_RBD:
case VIR_STORAGE_NET_PROTOCOL_VXHS:
case VIR_STORAGE_NET_PROTOCOL_NFS:
case VIR_STORAGE_NET_PROTOCOL_SSH:
case VIR_STORAGE_NET_PROTOCOL_LAST:
case VIR_STORAGE_NET_PROTOCOL_NONE:
break;
}
}
}
/* use json: pseudo protocol otherwise */
if (!(backingProps = qemuBlockStorageSourceGetBackendProps(src,
QEMU_BLOCK_STORAGE_SOURCE_BACKEND_PROPS_TARGET_ONLY)))
return NULL;
props = backingProps;
if (src->sliceStorage) {
if (virJSONValueObjectAdd(&sliceProps,
"s:driver", "raw",
"U:offset", src->sliceStorage->offset,
"U:size", src->sliceStorage->size,
"a:file", &backingProps,
NULL) < 0)
return NULL;
props = sliceProps;
}
if (!(backingJSON = virJSONValueToString(props, pretty)))
return NULL;
return g_strdup_printf("json:{\"file\":%s}", backingJSON);
}
static int
qemuBlockStorageSourceCreateAddBacking(virStorageSource *backing,
virJSONValue *props,
bool format)
{
g_autofree char *backingFileStr = NULL;
const char *backingFormatStr = NULL;
if (!virStorageSourceIsBacking(backing))
return 0;
if (format) {
if (qemuBlockStorageSourceIsLUKS(backing))
backingFormatStr = "luks";
else
backingFormatStr = virStorageFileFormatTypeToString(backing->format);
}
if (!(backingFileStr = qemuBlockGetBackingStoreString(backing, false)))
return -1;
if (virJSONValueObjectAdd(&props,
"S:backing-file", backingFileStr,
"S:backing-fmt", backingFormatStr,
NULL) < 0)
return -1;
return 0;
}
static int
qemuBlockStorageSourceCreateGetFormatPropsGeneric(virStorageSource *src,
const char *driver,
virJSONValue **retprops,
virStorageSource *backing)
{
g_autoptr(virJSONValue) props = NULL;
if (virJSONValueObjectAdd(&props,
"s:driver", driver,
"s:file", qemuBlockStorageSourceGetEffectiveStorageNodename(src),
"U:size", src->capacity,
NULL) < 0)
return -1;
if (backing &&
qemuBlockStorageSourceCreateAddBacking(backing, props, false) < 0)
return -1;
*retprops = g_steal_pointer(&props);
return 0;
}
static int
qemuBlockStorageSourceCreateGetEncryptionLUKS(virStorageSource *src,
virJSONValue **luksProps)
{
qemuDomainStorageSourcePrivate *srcpriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(src);
g_autoptr(virJSONValue) props = NULL;
g_autofree char *cipheralg = NULL;
const char *keysecret = NULL;
if (srcpriv &&
srcpriv->encinfo)
keysecret = srcpriv->encinfo[0]->alias;
if (virJSONValueObjectAdd(&props,
"s:key-secret", keysecret,
NULL) < 0)
return -1;
if (src->encryption) {
if (src->encryption->encinfo.cipher_name) {
cipheralg = g_strdup_printf("%s-%u",
src->encryption->encinfo.cipher_name,
src->encryption->encinfo.cipher_size);
}
if (virJSONValueObjectAdd(&props,
"S:cipher-alg", cipheralg,
"S:cipher-mode", src->encryption->encinfo.cipher_mode,
"S:hash-alg", src->encryption->encinfo.cipher_hash,
"S:ivgen-alg", src->encryption->encinfo.ivgen_name,
"S:ivgen-hash-alg", src->encryption->encinfo.ivgen_hash,
NULL) < 0)
return -1;
}
*luksProps = g_steal_pointer(&props);
return 0;
}
static int
qemuBlockStorageSourceCreateGetFormatPropsLUKS(virStorageSource *src,
virJSONValue **props)
{
g_autoptr(virJSONValue) luksprops = NULL;
if (qemuBlockStorageSourceCreateGetEncryptionLUKS(src, &luksprops) < 0)
return -1;
if (virJSONValueObjectAdd(&luksprops,
"s:driver", "luks",
"s:file", qemuBlockStorageSourceGetEffectiveStorageNodename(src),
"U:size", src->capacity,
NULL) < 0)
return -1;
*props = g_steal_pointer(&luksprops);
return 0;
}
static int
qemuBlockStorageSourceCreateAddEncryptionQcow(virStorageSource *src,
virJSONValue *props)
{
g_autoptr(virJSONValue) encryptProps = NULL;
if (!src->encryption)
return 0;
if (src->encryption->format != VIR_STORAGE_ENCRYPTION_FORMAT_LUKS) {
virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
_("creation of qcow/qcow2 files supports only 'luks' encryption"));
return -1;
}
if (qemuBlockStorageSourceCreateGetEncryptionLUKS(src, &encryptProps) < 0)
return -1;
if (virJSONValueObjectAdd(&encryptProps, "s:format", "luks", NULL) < 0)
return -1;
if (virJSONValueObjectAdd(&props, "a:encrypt", &encryptProps, NULL) < 0)
return -1;
return 0;
}
static int
qemuBlockStorageSourceCreateGetFormatPropsQcow2(virStorageSource *src,
virStorageSource *backing,
virJSONValue **props)
{
g_autoptr(virJSONValue) qcow2props = NULL;
const char *qcow2version = NULL;
bool extendedL2 = false;
if (STREQ_NULLABLE(src->compat, "0.10"))
qcow2version = "v2";
else if (STREQ_NULLABLE(src->compat, "1.1"))
qcow2version = "v3";
if (src->features)
extendedL2 = virBitmapIsBitSet(src->features, VIR_STORAGE_FILE_FEATURE_EXTENDED_L2);
if (virJSONValueObjectAdd(&qcow2props,
"s:driver", "qcow2",
"s:file", qemuBlockStorageSourceGetEffectiveStorageNodename(src),
"U:size", src->capacity,
"S:version", qcow2version,
"P:cluster-size", src->clusterSize,
"B:extended-l2", extendedL2,
NULL) < 0)
return -1;
if (qemuBlockStorageSourceCreateAddBacking(backing, qcow2props, true) < 0 ||
qemuBlockStorageSourceCreateAddEncryptionQcow(src, qcow2props) < 0)
return -1;
*props = g_steal_pointer(&qcow2props);
return 0;
}
static int
qemuBlockStorageSourceCreateGetFormatPropsQcow(virStorageSource *src,
virStorageSource *backing,
virJSONValue **props)
{
g_autoptr(virJSONValue) qcowprops = NULL;
if (virJSONValueObjectAdd(&qcowprops,
"s:driver", "qcow",
"s:file", qemuBlockStorageSourceGetEffectiveStorageNodename(src),
"U:size", src->capacity,
NULL) < 0)
return -1;
if (qemuBlockStorageSourceCreateAddBacking(backing, qcowprops, false) < 0 ||
qemuBlockStorageSourceCreateAddEncryptionQcow(src, qcowprops) < 0)
return -1;
*props = g_steal_pointer(&qcowprops);
return 0;
}
static int
qemuBlockStorageSourceCreateGetFormatPropsQed(virStorageSource *src,
virStorageSource *backing,
virJSONValue **props)
{
g_autoptr(virJSONValue) qedprops = NULL;
if (virJSONValueObjectAdd(&qedprops,
"s:driver", "qed",
"s:file", qemuBlockStorageSourceGetEffectiveStorageNodename(src),
"U:size", src->capacity,
NULL) < 0)
return -1;
if (qemuBlockStorageSourceCreateAddBacking(backing, qedprops, true) < 0)
return -1;
*props = g_steal_pointer(&qedprops);
return 0;
}
/**
* qemuBlockStorageSourceCreateGetFormatProps:
* @src: storage source to format
* @backing: storage source describing backing image of @src (if necessary)
* @props: filled with props to be used with 'blockdev-create' to format @src
*
* @src must be properly initialized to contain node-names of the protocol layer
* which should be formatted. @props may be NULL with success returned in which
* case creation of given storage format is not supported. Note that creation
* of 'raw' storage is also returns NULL as there is nothing to do.
*/
int
qemuBlockStorageSourceCreateGetFormatProps(virStorageSource *src,
virStorageSource *backing,
virJSONValue **props)
{
switch ((virStorageFileFormat) src->format) {
case VIR_STORAGE_FILE_RAW:
if (!qemuBlockStorageSourceIsLUKS(src))
return 0;
return qemuBlockStorageSourceCreateGetFormatPropsLUKS(src, props);
case VIR_STORAGE_FILE_QCOW2:
return qemuBlockStorageSourceCreateGetFormatPropsQcow2(src, backing, props);
case VIR_STORAGE_FILE_QCOW:
return qemuBlockStorageSourceCreateGetFormatPropsQcow(src, backing, props);
case VIR_STORAGE_FILE_QED:
return qemuBlockStorageSourceCreateGetFormatPropsQed(src, backing, props);
case VIR_STORAGE_FILE_VPC:
return qemuBlockStorageSourceCreateGetFormatPropsGeneric(src, "vpc",
props, NULL);
case VIR_STORAGE_FILE_PLOOP:
return qemuBlockStorageSourceCreateGetFormatPropsGeneric(src, "parallels",
props, NULL);
case VIR_STORAGE_FILE_VDI:
return qemuBlockStorageSourceCreateGetFormatPropsGeneric(src, "vdi",
props, NULL);
case VIR_STORAGE_FILE_VHD:
return qemuBlockStorageSourceCreateGetFormatPropsGeneric(src, "vhdx",
props, NULL);
case VIR_STORAGE_FILE_VMDK:
return qemuBlockStorageSourceCreateGetFormatPropsGeneric(src, "vmdk",
props, backing);
/* unsupported by qemu / impossible */
case VIR_STORAGE_FILE_FAT:
case VIR_STORAGE_FILE_BOCHS:
case VIR_STORAGE_FILE_CLOOP:
case VIR_STORAGE_FILE_DMG:
case VIR_STORAGE_FILE_COW:
case VIR_STORAGE_FILE_ISO:
case VIR_STORAGE_FILE_DIR:
return 0;
case VIR_STORAGE_FILE_AUTO_SAFE:
case VIR_STORAGE_FILE_AUTO:
case VIR_STORAGE_FILE_NONE:
virReportError(VIR_ERR_INTERNAL_ERROR,
_("mishandled storage format '%1$s'"),
virStorageFileFormatTypeToString(src->format));
return -1;
case VIR_STORAGE_FILE_LAST:
default:
break;
}
virReportEnumRangeError(virStorageFileFormat, src->format);
return -1;
}
/**
* qemuBlockStorageSourceCreateGetStorageProps:
* @src: storage source to create
* @props: filled with props to be used with 'blockdev-create' to create @src
*
* This function should be used only if @src->type is VIR_STORAGE_TYPE_NETWORK.
* Note that @props may be NULL if qemu does not support creation storage
* on given protocol. @src->physical is used as size for the storage.
*/
int
qemuBlockStorageSourceCreateGetStorageProps(virStorageSource *src,
virJSONValue **props)
{
virStorageType actualType = virStorageSourceGetActualType(src);
g_autoptr(virJSONValue) location = NULL;
const char *driver = NULL;
const char *filename = NULL;
qemuDomainStorageSourcePrivate *srcPriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(src);
switch (actualType) {
case VIR_STORAGE_TYPE_FILE:
driver = "file";
filename = src->path;
break;
case VIR_STORAGE_TYPE_NETWORK:
switch ((virStorageNetProtocol) src->protocol) {
case VIR_STORAGE_NET_PROTOCOL_GLUSTER:
driver = "gluster";
if (!(location = qemuBlockStorageSourceGetGlusterProps(src, false)))
return -1;
break;
case VIR_STORAGE_NET_PROTOCOL_RBD:
driver = "rbd";
if (!(location = qemuBlockStorageSourceGetRBDProps(src, false)))
return -1;
break;
case VIR_STORAGE_NET_PROTOCOL_SHEEPDOG:
driver = "sheepdog";
if (!(location = qemuBlockStorageSourceGetSheepdogProps(src)))
return -1;
break;
case VIR_STORAGE_NET_PROTOCOL_SSH:
if (srcPriv->nbdkitProcess) {
/* disk creation not yet supported with nbdkit, and even if it
* was supported, it would not be done with blockdev-create
* props */
return 0;
}
driver = "ssh";
if (!(location = qemuBlockStorageSourceGetSshProps(src)))
return -1;
break;
case VIR_STORAGE_NET_PROTOCOL_NFS:
driver = "nfs";
if (!(location = qemuBlockStorageSourceGetNFSProps(src)))
return -1;
break;
/* unsupported/impossible */
case VIR_STORAGE_NET_PROTOCOL_NBD:
case VIR_STORAGE_NET_PROTOCOL_ISCSI:
case VIR_STORAGE_NET_PROTOCOL_VXHS:
case VIR_STORAGE_NET_PROTOCOL_HTTP:
case VIR_STORAGE_NET_PROTOCOL_HTTPS:
case VIR_STORAGE_NET_PROTOCOL_FTP:
case VIR_STORAGE_NET_PROTOCOL_FTPS:
case VIR_STORAGE_NET_PROTOCOL_TFTP:
case VIR_STORAGE_NET_PROTOCOL_NONE:
case VIR_STORAGE_NET_PROTOCOL_LAST:
return 0;
}
break;
case VIR_STORAGE_TYPE_BLOCK:
case VIR_STORAGE_TYPE_DIR:
case VIR_STORAGE_TYPE_VOLUME:
case VIR_STORAGE_TYPE_NVME:
case VIR_STORAGE_TYPE_VHOST_USER:
case VIR_STORAGE_TYPE_VHOST_VDPA:
return 0;
case VIR_STORAGE_TYPE_NONE:
case VIR_STORAGE_TYPE_LAST:
virReportEnumRangeError(virStorageType, actualType);
return -1;
}
if (virJSONValueObjectAdd(props,
"s:driver", driver,
"S:filename", filename,
"A:location", &location,
"U:size", src->physical,
NULL) < 0)
return -1;
return 0;
}
static int
qemuBlockStorageSourceCreateGeneric(virDomainObj *vm,
virJSONValue *createProps,
virStorageSource *src,
virStorageSource *chain,
bool storageCreate,
virDomainAsyncJob asyncJob)
{
g_autoptr(virJSONValue) props = createProps;
qemuDomainObjPrivate *priv = vm->privateData;
qemuBlockJobData *job = NULL;
int ret = -1;
int rc;
if (!(job = qemuBlockJobNewCreate(vm, src, chain, storageCreate)))
return -1;
qemuBlockJobSyncBegin(job);
if (qemuDomainObjEnterMonitorAsync(vm, asyncJob) < 0)
goto cleanup;
rc = qemuMonitorBlockdevCreate(priv->mon, job->name, &props);
qemuDomainObjExitMonitor(vm);
if (rc < 0)
goto cleanup;
qemuBlockJobStarted(job, vm);
qemuBlockJobUpdate(vm, job, asyncJob);
while (qemuBlockJobIsRunning(job)) {
if (qemuDomainObjWait(vm) < 0)
goto cleanup;
qemuBlockJobUpdate(vm, job, asyncJob);
}
if (job->state == QEMU_BLOCKJOB_STATE_FAILED ||
job->state == QEMU_BLOCKJOB_STATE_CANCELLED) {
if (job->state == QEMU_BLOCKJOB_STATE_CANCELLED && !job->errmsg) {
virReportError(VIR_ERR_OPERATION_FAILED, "%s",
_("blockdev-create job was cancelled"));
} else {
virReportError(VIR_ERR_OPERATION_FAILED,
_("failed to format image: '%1$s'"), NULLSTR(job->errmsg));
}
goto cleanup;
}
ret = 0;
cleanup:
qemuBlockJobStartupFinalize(vm, job);
return ret;
}
static int
qemuBlockStorageSourceCreateStorage(virDomainObj *vm,
virStorageSource *src,
virStorageSource *chain,
virDomainAsyncJob asyncJob)
{
virStorageType actualType = virStorageSourceGetActualType(src);
g_autoptr(virJSONValue) createstorageprops = NULL;
int ret;
/* We create local files directly to be able to apply security labels
* properly. This is enough for formats which store the capacity of the image
* in the metadata as they will grow. We must create a correctly sized
* image for 'raw' and 'luks' though as the image size influences the
* capacity.
*/
if (actualType != VIR_STORAGE_TYPE_NETWORK &&
!(actualType == VIR_STORAGE_TYPE_FILE && src->format == VIR_STORAGE_FILE_RAW))
return 0;
if (qemuBlockStorageSourceCreateGetStorageProps(src, &createstorageprops) < 0)
return -1;
if (!createstorageprops) {
/* we can always try opening it to see whether it was existing */
return 0;
}
ret = qemuBlockStorageSourceCreateGeneric(vm, createstorageprops, src, chain,
true, asyncJob);
createstorageprops = NULL;
return ret;
}
static int
qemuBlockStorageSourceCreateFormat(virDomainObj *vm,
virStorageSource *src,
virStorageSource *backingStore,
virStorageSource *chain,
virDomainAsyncJob asyncJob)
{
g_autoptr(virJSONValue) createformatprops = NULL;
int ret;
/* we don't bother creating only a true 'raw' image */
if (qemuBlockStorageSourceIsRaw(src))
return 0;
if (src->dataFileStore) {
virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
_("creation of storage images with <dataStore> feature is not supported"));
return -1;
}
if (qemuBlockStorageSourceCreateGetFormatProps(src, backingStore,
&createformatprops) < 0)
return -1;
if (!createformatprops) {
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
_("can't create storage format '%1$s'"),
virStorageFileFormatTypeToString(src->format));
return -1;
}
ret = qemuBlockStorageSourceCreateGeneric(vm, createformatprops, src, chain,
false, asyncJob);
createformatprops = NULL;
return ret;
}
/**
* qemuBlockStorageSourceCreate:
* @vm: domain object
* @src: storage source definition to create
* @backingStore: backingStore of the new image (used only in image metadata)
* @chain: backing chain to unplug in case of a long-running job failure
* @data: qemuBlockStorageSourceAttachData for @src so that it can be attached
* @asyncJob: qemu asynchronous job type
*
* Creates and formats a storage volume according to @src and attaches it to @vm.
* @data must provide attachment data as if @src was existing. @src is attached
* after successful return of this function. If libvirtd is restarted during
* the create job @chain is unplugged, otherwise it's left for the caller.
* If @backingStore is provided, the new image will refer to it as its backing
* store.
*/
int
qemuBlockStorageSourceCreate(virDomainObj *vm,
virStorageSource *src,
virStorageSource *backingStore,
virStorageSource *chain,
qemuBlockStorageSourceAttachData *data,
virDomainAsyncJob asyncJob)
{
qemuDomainObjPrivate *priv = vm->privateData;
int ret = -1;
int rc;
if (src->sliceStorage) {
virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
_("creation of images with slice type='storage' is not supported"));
return -1;
}
/* grant write access to read-only images during formatting */
if (src->readonly &&
qemuDomainStorageSourceAccessAllow(priv->driver, vm, src, false,
false, true) < 0)
return -1;
if (qemuDomainObjEnterMonitorAsync(vm, asyncJob) < 0)
goto cleanup;
rc = qemuBlockStorageSourceAttachApplyStorageDeps(priv->mon, data);
if (rc == 0)
rc = qemuBlockStorageSourceAttachApplyFormatDeps(priv->mon, data);
qemuDomainObjExitMonitor(vm);
if (rc < 0)
goto cleanup;
if (qemuBlockStorageSourceCreateStorage(vm, src, chain, asyncJob) < 0)
goto cleanup;
if (qemuDomainObjEnterMonitorAsync(vm, asyncJob) < 0)
goto cleanup;
rc = qemuBlockStorageSourceAttachApplyStorage(priv->mon, data);
qemuDomainObjExitMonitor(vm);
if (rc < 0)
goto cleanup;
if (qemuBlockStorageSourceCreateFormat(vm, src, backingStore, chain,
asyncJob) < 0)
goto cleanup;
/* revoke write access to read-only images during formatting */
if (src->readonly &&
qemuDomainStorageSourceAccessAllow(priv->driver, vm, src, true,
false, true) < 0)
goto cleanup;
if (qemuDomainObjEnterMonitorAsync(vm, asyncJob) < 0)
goto cleanup;
rc = qemuBlockStorageSourceAttachApplyFormat(priv->mon, data);
qemuDomainObjExitMonitor(vm);
if (rc < 0)
goto cleanup;
ret = 0;
cleanup:
if (ret < 0 &&
virDomainObjIsActive(vm) &&
qemuDomainObjEnterMonitorAsync(vm, asyncJob) == 0) {
qemuBlockStorageSourceAttachRollback(priv->mon, data);
qemuDomainObjExitMonitor(vm);
}
return ret;
}
/**
* qemuBlockStorageSourceCreateDetectSize:
* @blockNamedNodeData: hash table filled with qemuBlockNamedNodeData
* @src: storage source to update size/capacity on
* @templ: storage source template
*
* When creating a storage source via blockdev-create we need to know the size
* and capacity of the original volume (e.g. when creating a snapshot or copy).
* This function updates @src's 'capacity' and 'physical' attributes according
* to the detected sizes from @templ.
*/
int
qemuBlockStorageSourceCreateDetectSize(GHashTable *blockNamedNodeData,
virStorageSource *src,
virStorageSource *templ)
{
qemuBlockNamedNodeData *entry;
if (!(entry = virHashLookup(blockNamedNodeData, qemuBlockStorageSourceGetEffectiveNodename(templ)))) {
virReportError(VIR_ERR_INTERNAL_ERROR,
_("failed to update capacity data for block node '%1$s'"),
qemuBlockStorageSourceGetEffectiveNodename(templ));
return -1;
}
/* propagate properties of qcow2 images if possible*/
if (templ->format == VIR_STORAGE_FILE_QCOW2 &&
src->format == VIR_STORAGE_FILE_QCOW2) {
if (src->clusterSize == 0)
src->clusterSize = entry->clusterSize;
if (entry->qcow2extendedL2) {
if (!src->features)
src->features = virBitmapNew(VIR_STORAGE_FILE_FEATURE_LAST);
ignore_value(virBitmapSetBit(src->features, VIR_STORAGE_FILE_FEATURE_EXTENDED_L2));
}
}
if (qemuBlockStorageSourceIsRaw(src)) {
src->physical = entry->capacity;
} else {
src->physical = entry->physical;
}
src->capacity = entry->capacity;
return 0;
}
int
qemuBlockRemoveImageMetadata(virQEMUDriver *driver,
virDomainObj *vm,
const char *diskTarget,
virStorageSource *src)
{
virStorageSource *n;
int ret = 0;
for (n = src; virStorageSourceIsBacking(n); n = n->backingStore) {
if (qemuSecurityMoveImageMetadata(driver, vm, n, NULL) < 0) {
VIR_WARN("Unable to remove disk metadata on "
"vm %s from %s (disk target %s)",
vm->def->name,
NULLSTR(n->path),
diskTarget);
ret = -1;
}
}
return ret;
}
/**
* qemuBlockNamedNodeDataGetBitmapByName:
* @blockNamedNodeData: hash table returned by qemuMonitorBlockGetNamedNodeData
* @src: disk source to find the bitmap for
* @bitmap: name of the bitmap to find
*
* Looks up a bitmap named @bitmap of the @src image.
*/
qemuBlockNamedNodeDataBitmap *
qemuBlockNamedNodeDataGetBitmapByName(GHashTable *blockNamedNodeData,
virStorageSource *src,
const char *bitmap)
{
qemuBlockNamedNodeData *nodedata;
size_t i;
if (!(nodedata = virHashLookup(blockNamedNodeData,
qemuBlockStorageSourceGetEffectiveNodename(src))))
return NULL;
for (i = 0; i < nodedata->nbitmaps; i++) {
qemuBlockNamedNodeDataBitmap *bitmapdata = nodedata->bitmaps[i];
if (STRNEQ(bitmapdata->name, bitmap))
continue;
return bitmapdata;
}
return NULL;
}
GHashTable *
qemuBlockGetNamedNodeData(virDomainObj *vm,
virDomainAsyncJob asyncJob)
{
qemuDomainObjPrivate *priv = vm->privateData;
GHashTable *blockNamedNodeData = NULL;
if (qemuDomainObjEnterMonitorAsync(vm, asyncJob) < 0)
return NULL;
blockNamedNodeData = qemuMonitorBlockGetNamedNodeData(priv->mon);
qemuDomainObjExitMonitor(vm);
return blockNamedNodeData;
}
/**
* qemuBlockGetBitmapMergeActionsGetBitmaps:
*
* Collect a list of bitmaps which need to be handled in
* qemuBlockGetBitmapMergeActions. The list contains only valid bitmaps in the
* sub-chain which is being processed.
*
* Note that the returned GSList contains bitmap names string pointers borrowed
* from @blockNamedNodeData so they must not be freed.
*/
static GSList *
qemuBlockGetBitmapMergeActionsGetBitmaps(virStorageSource *topsrc,
const char *bitmapname,
GHashTable *blockNamedNodeData)
{
g_autoptr(GSList) ret = NULL;
qemuBlockNamedNodeData *entry;
size_t i;
/* for now it doesn't make sense to consider bitmaps which are not present
* in @topsrc as we can't recreate a bitmap for a layer if it's missing */
if (!(entry = virHashLookup(blockNamedNodeData, qemuBlockStorageSourceGetEffectiveNodename(topsrc))))
return NULL;
for (i = 0; i < entry->nbitmaps; i++) {
qemuBlockNamedNodeDataBitmap *bitmap = entry->bitmaps[i];
if (bitmapname &&
STRNEQ(bitmapname, bitmap->name))
continue;
if (!qemuBlockBitmapChainIsValid(topsrc, bitmap->name, blockNamedNodeData))
continue;
ret = g_slist_prepend(ret, bitmap->name);
}
return g_steal_pointer(&ret);
}
/**
* qemuBlockGetBitmapMergeActions:
* @topsrc: top of the chain to merge bitmaps in
* @basesrc: bottom of the chain to merge bitmaps in (NULL for full chain)
* @target: destination storage source of the merge (may be part of original chain)
* @bitmapname: name of bitmap to perform the merge (NULL for all bitmaps)
* @dstbitmapname: name of destination bitmap of the merge (see below for caveats)
* @writebitmapsrc: storage source corresponding to the node containing the write temporary bitmap
* @actions: returns actions for a 'transaction' QMP command for executing the merge
* @blockNamedNodeData: hash table filled with qemuBlockNamedNodeData
*
* Calculate handling of dirty block bitmaps between @topsrc and @basesrc. If
* @basesrc is NULL the end of the chain is considered. @target is the destination
* storage source definition of the merge and may or may not be part of the
* merged chain.
*
* Specifically the merging algorithm ensures that each considered bitmap is
* merged with the appropriate bitmaps so that it properly describes
* the state of dirty blocks when looked at from @topsrc based on the depth
* of the backing chain where the bitmap is placed.
*
* If @bitmapname is non-NULL only bitmaps with that name are handled, otherwise
* all bitmaps are considered.
*
* If @dstbitmap is non-NULL everything is merged into a bitmap with that name,
* otherwise each bitmap is merged into a bitmap with the same name into @target.
* Additionally if @dstbitmap is non-NULL the target bitmap is created as 'inactive'
* and 'transient' as a special case for the backup operation.
*
* If @writebitmapsrc is non-NULL, the 'libvirt-tmp-activewrite' bitmap from
* given node is merged along with others. This bitmap corresponds to the writes
* which occurred between an active layer job finished and the rest of the bitmap
* merging.
*
* If the bitmap is not valid somehow (see qemuBlockBitmapChainIsValid) given
* bitmap is silently skipped, so callers must ensure that given bitmap is valid
* if they care about it.
*
* The resulting 'transaction' QMP command actions are filled in and returned via
* @actions.
*
* Note that @actions may be NULL if no merging is required.
*/
int
qemuBlockGetBitmapMergeActions(virStorageSource *topsrc,
virStorageSource *basesrc,
virStorageSource *target,
const char *bitmapname,
const char *dstbitmapname,
virStorageSource *writebitmapsrc,
virJSONValue **actions,
GHashTable *blockNamedNodeData)
{
g_autoptr(virJSONValue) act = virJSONValueNewArray();
virStorageSource *n;
g_autoptr(GSList) bitmaps = NULL;
GSList *next;
if (!(bitmaps = qemuBlockGetBitmapMergeActionsGetBitmaps(topsrc, bitmapname,
blockNamedNodeData)))
goto done;
for (next = bitmaps; next; next = next->next) {
const char *curbitmap = next->data;
const char *mergebitmapname = dstbitmapname;
bool mergebitmappersistent = false;
bool mergebitmapdisabled = true;
g_autoptr(virJSONValue) merge = virJSONValueNewArray();
unsigned long long granularity = 0;
qemuBlockNamedNodeDataBitmap *bitmap;
/* explicitly named destinations mean that we want a temporary
* disabled bitmap only, so undo the default for non-explicit cases */
if (!mergebitmapname) {
mergebitmapname = curbitmap;
mergebitmappersistent = true;
mergebitmapdisabled = false;
}
for (n = topsrc; virStorageSourceIsBacking(n) && n != basesrc; n = n->backingStore) {
if (!(bitmap = qemuBlockNamedNodeDataGetBitmapByName(blockNamedNodeData,
n, curbitmap)))
continue;
if (granularity == 0)
granularity = bitmap->granularity;
if (qemuMonitorTransactionBitmapMergeSourceAddBitmap(merge,
qemuBlockStorageSourceGetEffectiveNodename(n),
bitmap->name) < 0)
return -1;
}
if (dstbitmapname ||
!(bitmap = qemuBlockNamedNodeDataGetBitmapByName(blockNamedNodeData,
target, curbitmap))) {
if (qemuMonitorTransactionBitmapAdd(act,
qemuBlockStorageSourceGetEffectiveNodename(target),
mergebitmapname,
mergebitmappersistent,
mergebitmapdisabled,
granularity) < 0)
return -1;
}
if (writebitmapsrc &&
qemuMonitorTransactionBitmapMergeSourceAddBitmap(merge,
qemuBlockStorageSourceGetEffectiveNodename(writebitmapsrc),
"libvirt-tmp-activewrite") < 0)
return -1;
if (qemuMonitorTransactionBitmapMerge(act, qemuBlockStorageSourceGetEffectiveNodename(target),
mergebitmapname, &merge) < 0)
return -1;
}
done:
if (writebitmapsrc &&
qemuMonitorTransactionBitmapRemove(act, qemuBlockStorageSourceGetEffectiveNodename(writebitmapsrc),
"libvirt-tmp-activewrite") < 0)
return -1;
if (virJSONValueArraySize(act) > 0)
*actions = g_steal_pointer(&act);
return 0;
}
/**
* qemuBlockBitmapChainIsValid:
*
* Validates that the backing chain of @src contains bitmaps which libvirt will
* consider as properly corresponding to a checkpoint named @bitmapname.
*
* The bitmaps need to:
* 1) start from the top image @src
* 2) must be present in consecutive layers
* 3) all must be active, persistent and not inconsistent
*/
bool
qemuBlockBitmapChainIsValid(virStorageSource *src,
const char *bitmapname,
GHashTable *blockNamedNodeData)
{
virStorageSource *n;
bool found = false;
bool chain_ended = false;
for (n = src; virStorageSourceIsBacking(n); n = n->backingStore) {
qemuBlockNamedNodeDataBitmap *bitmap;
if (!(bitmap = qemuBlockNamedNodeDataGetBitmapByName(blockNamedNodeData,
n, bitmapname))) {
/* rule 1, must start from top */
if (!found)
return false;
chain_ended = true;
continue;
}
/* rule 2, no-gaps */
if (chain_ended)
return false;
/* rule 3 */
if (bitmap->inconsistent || !bitmap->persistent || !bitmap->recording)
return false;
found = true;
}
return found;
}
/**
* qemuBlockBitmapsHandleBlockcopy:
* @src: disk source
* @mirror: mirror source
* @blockNamedNodeData: hash table containing data about bitmaps
* @shallow: whether shallow copy is requested
* @actions: filled with arguments for a 'transaction' command
*
* Calculates which bitmaps to copy and merge during a virDomainBlockCopy job.
* This is designed to be called when the job is already synchronised as it
* may result in active bitmaps being created.
*
* Returns 0 on success and -1 on error. If @actions is NULL when 0 is returned
* there are no actions to perform for the given job.
*/
int
qemuBlockBitmapsHandleBlockcopy(virStorageSource *src,
virStorageSource *mirror,
GHashTable *blockNamedNodeData,
bool shallow,
virJSONValue **actions)
{
virStorageSource *base = NULL;
/* if copy destination is a 'raw' image there's no point in attempting to
* merge the bitmaps into it */
if (mirror->format == VIR_STORAGE_FILE_RAW)
return 0;
if (shallow)
base = src->backingStore;
if (qemuBlockGetBitmapMergeActions(src, base, mirror, NULL, NULL, mirror, actions,
blockNamedNodeData) < 0)
return -1;
return 0;
}
/**
* @topsrc: virStorageSource representing 'top' of the job
* @basesrc: virStorageSource representing 'base' of the job
* @active: commit job is an active layer block-commit
* @blockNamedNodeData: hash table containing data about bitmaps
* @actions: filled with arguments for a 'transaction' command
* @disabledBitmapsBase: bitmap names which were disabled
*
* Calculates the necessary bitmap merges/additions/enablements to properly
* handle commit of images from 'top' into 'base'. The necessary operations
* in the form of arguments of the 'transaction' command are filled into
* 'actions' if there is anything to do. Otherwise NULL is returned.
*/
int
qemuBlockBitmapsHandleCommitFinish(virStorageSource *topsrc,
virStorageSource *basesrc,
bool active,
GHashTable *blockNamedNodeData,
virJSONValue **actions)
{
virStorageSource *writebitmapsrc = NULL;
/* if base is a 'raw' image there's no point in attempting to merge the
* bitmaps into it */
if (basesrc->format == VIR_STORAGE_FILE_RAW)
return 0;
if (active)
writebitmapsrc = basesrc;
if (qemuBlockGetBitmapMergeActions(topsrc, basesrc, basesrc, NULL, NULL,
writebitmapsrc, actions,
blockNamedNodeData) < 0)
return -1;
return 0;
}
/**
* qemuBlockReopenAccess:
* @vm: domain object
* @src: storage source to reopen
* @readonly: requested readonly mode
* @asyncJob: qemu async job type
*
* Reopen @src image to ensure that it is in @readonly. Does nothing if it is
* already in the requested state.
*
* Callers must use qemuBlockReopenReadWrite/qemuBlockReopenReadOnly functions.
*/
static int
qemuBlockReopenAccess(virDomainObj *vm,
virStorageSource *src,
bool readonly,
virDomainAsyncJob asyncJob)
{
g_autoptr(virJSONValue) reopenoptions = virJSONValueNewArray();
g_autoptr(virJSONValue) srcprops = NULL;
int rc;
VIR_DEBUG("nodename:'%s' current-ro:'%d requested-ro='%d'",
qemuBlockStorageSourceGetEffectiveNodename(src),
src->readonly, readonly);
if (src->readonly == readonly)
return 0;
/* If we are lacking the object here, qemu might have opened an image with
* a node name unknown to us */
if (src->format >= VIR_STORAGE_FILE_BACKING && !src->backingStore) {
virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
_("can't reopen image with unknown presence of backing store"));
return -1;
}
src->readonly = readonly;
/* from now on all error paths must use 'goto error' which restores the original state */
/* based on which is the current 'effecitve' layer we must reopen the
* appropriate blockdev */
if (qemuBlockStorageSourceGetFormatNodename(src)) {
if (!(srcprops = qemuBlockStorageSourceGetFormatProps(src, src->backingStore)))
goto error;
} else if (qemuBlockStorageSourceGetSliceNodename(src)) {
if (!(srcprops = qemuBlockStorageSourceGetBlockdevStorageSliceProps(src, true, false)))
goto error;
} else {
if (!(srcprops = qemuBlockStorageSourceGetBackendProps(src,
QEMU_BLOCK_STORAGE_SOURCE_BACKEND_PROPS_EFFECTIVE_NODE)))
goto error;
}
if (virJSONValueArrayAppend(reopenoptions, &srcprops) < 0)
goto error;
if (qemuDomainObjEnterMonitorAsync(vm, asyncJob) < 0)
goto error;
rc = qemuMonitorBlockdevReopen(qemuDomainGetMonitor(vm), &reopenoptions);
qemuDomainObjExitMonitor(vm);
if (rc < 0)
goto error;
return 0;
error:
src->readonly = !readonly;
return -1;
}
/**
* qemuBlockReopenReadWrite:
* @vm: domain object
* @src: storage source to reopen
* @asyncJob: qemu async job type
*
* Semantic wrapper that reopens @src read-write. After successful reopen @src's
* 'readonly' flag is modified. Does nothing if @src is already read-write.
*/
int
qemuBlockReopenReadWrite(virDomainObj *vm,
virStorageSource *src,
virDomainAsyncJob asyncJob)
{
return qemuBlockReopenAccess(vm, src, false, asyncJob);
}
/**
* qemuBlockReopenReadOnly:
* @vm: domain object
* @src: storage source to reopen
* @asyncJob: qemu async job type
*
* Semantic wrapper that reopens @src read-only. After successful reopen @src's
* 'readonly' flag is modified. Does nothing if @src is already read-only.
*/
int
qemuBlockReopenReadOnly(virDomainObj *vm,
virStorageSource *src,
virDomainAsyncJob asyncJob)
{
return qemuBlockReopenAccess(vm, src, true, asyncJob);
}
/**
* qemuBlockStorageSourceIsLUKS:
* @src: storage source object
*
* Returns true if @src is an image in 'luks' format, which is to be decrypted
* in qemu (rather than transparently by the transport layer or host's kernel).
*/
bool
qemuBlockStorageSourceIsLUKS(const virStorageSource *src)
{
if (src->format != VIR_STORAGE_FILE_RAW)
return false;
if (src->encryption &&
src->encryption->engine == VIR_STORAGE_ENCRYPTION_ENGINE_QEMU &&
src->encryption->format == VIR_STORAGE_ENCRYPTION_FORMAT_LUKS)
return true;
return false;
}
/**
* qemuBlockStorageSourceIsRaw:
* @src: storage source object
*
* Returns true if @src is a true 'raw' image. This specifically excludes
* LUKS encrypted images to be decrypted by qemu.
*/
bool
qemuBlockStorageSourceIsRaw(const virStorageSource *src)
{
if (src->format != VIR_STORAGE_FILE_RAW)
return false;
if (qemuBlockStorageSourceIsLUKS(src))
return false;
return true;
}
/**
* qemuBlockReopenSliceExpand:
* @vm: domain object
* @src: storage source to reopen
*
* Reopen @src image to remove its storage slice. Note that this currently
* works only for 'raw' disks.
*
* Note: This changes transforms the definition such that the 'raw' driver
* becomes the 'format' layer rather than the 'slice' layer, to be able
* to free the slice definition.
*/
int
qemuBlockReopenSliceExpand(virDomainObj *vm,
virStorageSource *src)
{
g_autoptr(virJSONValue) reopenoptions = virJSONValueNewArray();
g_autoptr(virJSONValue) srcprops = NULL;
int rc;
/* If we are lacking the object here, qemu might have opened an image with
* a node name unknown to us */
/* Note: This is currently dead code, as only 'raw' images are supported */
if (!src->backingStore) {
virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
_("can't reopen image with unknown presence of backing store"));
return -1;
}
/* If there is an explicit storage slice 'raw' driver layer we need to modify that */
if (qemuBlockStorageSourceGetSliceNodename(src)) {
/* we need to know whether the slice layer is the "effective" layer */
bool isEffective = !qemuBlockStorageSourceGetSliceNodename(src);
if (!(srcprops = qemuBlockStorageSourceGetBlockdevStorageSliceProps(src, isEffective, true)))
return -1;
} else {
if (!(srcprops = qemuBlockStorageSourceGetFormatProps(src, src->backingStore)))
return -1;
}
if (virJSONValueArrayAppend(reopenoptions, &srcprops) < 0)
return -1;
if (qemuDomainObjEnterMonitorAsync(vm, VIR_ASYNC_JOB_NONE) < 0)
return -1;
rc = qemuMonitorBlockdevReopen(qemuDomainGetMonitor(vm), &reopenoptions);
qemuDomainObjExitMonitor(vm);
if (rc < 0)
return -1;
/* transform the 'slice' raw driver into a 'format' driver so that we don't
* have to add extra code */
if (qemuBlockStorageSourceGetSliceNodename(src))
qemuBlockStorageSourceSetFormatNodename(src, g_strdup(qemuBlockStorageSourceGetSliceNodename(src)));
/* get rid of the slice */
g_clear_pointer(&src->sliceStorage, virStorageSourceSliceFree);
return 0;
}
/**
* qemuBlockStorageSourceNeedSliceLayer:
* @src: source to inspect
*
* Returns true if @src requires an extra 'raw' layer for handling of the storage
* slice.
*
* Important: This helper must be used only for decisions when setting up a
* '-blockdev' backend in which case the storage slice layer node name will be
* populated.
* Any cases when the backend can be already in use must decide based on the
* existence of the storage slice layer nodename.
*/
bool
qemuBlockStorageSourceNeedsStorageSliceLayer(const virStorageSource *src)
{
return !!src->sliceStorage;
}
/**
* qemuBlockStorageSourceNeedsFormatLayer:
* @src: storage source
*
* Returns true if configuration of @src requires a 'format' layer -blockdev.
*
* Important: This helper must be used only for decisions when setting up a
* '-blockdev' backend in which case the format layer node name will be populated.
* Any cases when the backend can be already in use must decide based on the
* existence of the format layer nodename.
*/
bool
qemuBlockStorageSourceNeedsFormatLayer(const virStorageSource *src,
virQEMUCaps *qemuCaps)
{
virStorageType actualType = virStorageSourceGetActualType(src);
if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_BLOCKJOB_BACKING_MASK_PROTOCOL))
return true;
if (!qemuBlockStorageSourceIsRaw(src))
return true;
/* when passing a FD to qemu via the /dev/fdset mechanism qemu
* fetches the appropriate FD from the fdset by checking that it has
* the correct accessmode. Now if a user passes an explicitly read-write fd
* but intends to use the disk in read-only mode we need to install a
* read-only raw driver on top as qemu wouldn't be able to pick the correct
* fd. */
if ((actualType == VIR_STORAGE_TYPE_FILE || actualType == VIR_STORAGE_TYPE_BLOCK) &&
src->fdtuple &&
src->fdtuple->nfds == 1 &&
src->fdtuple->writable)
return true;
return false;
}
/**
* qemuBlockStorageSourceGetCookieString:
* @src: storage source
*
* Returns a properly formatted string representing cookies of @src in format
* accepted by qemu.
*/
char *
qemuBlockStorageSourceGetCookieString(virStorageSource *src)
{
g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
size_t i;
for (i = 0; i < src->ncookies; i++) {
virStorageNetCookieDef *cookie = src->cookies[i];
virBufferAsprintf(&buf, "%s=%s; ", cookie->name, cookie->value);
}
virBufferTrim(&buf, "; ");
return virBufferContentAndReset(&buf);
}
/**
* qemuBlockUpdateRelativeBacking:
* @vm: domain object
* @src: starting point of the update
* @topsrc: top level image in the backing chain (used to get security label)
*
* Reload data necessary for keeping backing store links starting from @src
* relative.
*/
int
qemuBlockUpdateRelativeBacking(virDomainObj *vm,
virStorageSource *src,
virStorageSource *topsrc)
{
qemuDomainObjPrivate *priv = vm->privateData;
virQEMUDriver *driver = priv->driver;
virStorageSource *n;
for (n = src; virStorageSourceHasBacking(n); n = n->backingStore) {
int rc;
if (n->backingStore->relPath)
break;
if (!virStorageSourceSupportsBackingChainTraversal(n))
continue;
if (qemuDomainStorageFileInit(driver, vm, n, topsrc) < 0)
return -1;
rc = virStorageSourceFetchRelativeBackingPath(n, &n->backingStore->relPath);
virStorageSourceDeinit(n);
if (rc < 0)
return rc;
}
return 0;
}
virJSONValue *
qemuBlockExportGetNBDProps(const char *nodename,
const char *exportname,
bool writable,
const char **bitmaps)
{
g_autofree char *exportid = NULL;
g_autoptr(virJSONValue) bitmapsarr = NULL;
virJSONValue *ret = NULL;
exportid = g_strdup_printf("libvirt-nbd-%s", nodename);
if (bitmaps && *bitmaps) {
bitmapsarr = virJSONValueNewArray();
while (*bitmaps) {
if (virJSONValueArrayAppendString(bitmapsarr, *(bitmaps++)) < 0)
return NULL;
}
}
if (virJSONValueObjectAdd(&ret,
"s:type", "nbd",
"s:id", exportid,
"s:node-name", nodename,
"b:writable", writable,
"s:name", exportname,
"A:bitmaps", &bitmapsarr,
NULL) < 0)
return NULL;
return ret;
}
/**
* qemuBlockExportAddNBD:
* @vm: domain object
* @src: disk source to export
* @exportname: name for the export
* @writable: whether the NBD export allows writes
* @bitmap: (optional) block dirty bitmap to export along
*
* This function automatically selects the proper invocation of exporting a
* block backend via NBD in qemu.
*
* This function must be called while in the monitor context.
*/
int
qemuBlockExportAddNBD(virDomainObj *vm,
virStorageSource *src,
const char *exportname,
bool writable,
const char *bitmap)
{
qemuDomainObjPrivate *priv = vm->privateData;
g_autoptr(virJSONValue) nbdprops = NULL;
const char *bitmaps[2] = { bitmap, NULL };
if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_BLOCK_EXPORT_ADD))
return qemuMonitorNBDServerAdd(priv->mon, qemuBlockStorageSourceGetEffectiveNodename(src),
exportname, writable, bitmap);
if (!(nbdprops = qemuBlockExportGetNBDProps(qemuBlockStorageSourceGetEffectiveNodename(src),
exportname, writable, bitmaps)))
return -1;
return qemuMonitorBlockExportAdd(priv->mon, &nbdprops);
}
/**
* qemuBlockCommit:
* @vm: domain object
* @disk: disk object where we are about to block commit
* @baseSource: disk source within backing chain to commit data into
* @topSource: disk source within backing chain with data we will commit
* @top_parent: disk source that has @topSource as backing disk
* @bandwidth: bandwidth limit in bytes/s
* @asyncJob: qemu async job type
* @autofinalize: virTristateBool controlling qemu block job finalization
* @flags: bitwise-OR of virDomainBlockCommitFlags
*
* Starts a block commit job for @disk. If @asyncJob is different then
* VIR_ASYNC_JOB_NONE the job will be started as synchronous.
*
* The @autofinalize argument controls if the qemu block job will be automatically
* finalized. This is used when deleting external snapshots where we need to
* disable automatic finalization for some use-case. The default value passed
* to this argument should be VIR_TRISTATE_BOOL_YES.
*
* Returns qemuBlockJobData pointer on success, NULL on error. Caller is responsible
* to call virObjectUnref on the pointer.
*/
qemuBlockJobData *
qemuBlockCommit(virDomainObj *vm,
virDomainDiskDef *disk,
virStorageSource *baseSource,
virStorageSource *topSource,
virStorageSource *top_parent,
unsigned long long bandwidth,
virDomainAsyncJob asyncJob,
virTristateBool autofinalize,
unsigned int flags)
{
qemuDomainObjPrivate *priv = vm->privateData;
virQEMUDriver *driver = priv->driver;
int rc = -1;
bool clean_access = false;
g_autofree char *backingPath = NULL;
qemuBlockJobData *job = NULL;
qemuBlockJobData *ret = NULL;
g_autoptr(virStorageSource) mirror = NULL;
if (virDomainObjCheckActive(vm) < 0)
return NULL;
if (!qemuDomainDiskBlockJobIsSupported(disk))
return NULL;
if (virStorageSourceIsEmpty(disk->src)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
_("disk %1$s has no source file to be committed"),
disk->dst);
return NULL;
}
if (qemuDomainDiskBlockJobIsActive(disk))
return NULL;
if (qemuDomainSupportsCheckpointsBlockjobs(vm) < 0)
return NULL;
if (topSource == disk->src) {
/* XXX Should we auto-pivot when COMMIT_ACTIVE is not specified? */
if (!(flags & VIR_DOMAIN_BLOCK_COMMIT_ACTIVE)) {
virReportError(VIR_ERR_INVALID_ARG,
_("commit of '%1$s' active layer requires active flag"),
disk->dst);
return NULL;
}
} else if (flags & VIR_DOMAIN_BLOCK_COMMIT_ACTIVE) {
virReportError(VIR_ERR_INVALID_ARG,
_("active commit requested but '%1$s' is not active"),
topSource->path);
return NULL;
}
if (!virStorageSourceHasBacking(topSource)) {
virReportError(VIR_ERR_INVALID_ARG,
_("top '%1$s' in chain for '%2$s' has no backing file"),
topSource->path, disk->src->path);
return NULL;
}
if ((flags & VIR_DOMAIN_BLOCK_COMMIT_SHALLOW) &&
baseSource != topSource->backingStore) {
virReportError(VIR_ERR_INVALID_ARG,
_("base '%1$s' is not immediately below '%2$s' in chain for '%3$s'"),
baseSource->path, topSource->path, disk->src->path);
return NULL;
}
/* For an active commit, clone enough of the base to act as the mirror */
if (topSource == disk->src) {
if (!(mirror = virStorageSourceCopy(baseSource, false)))
return NULL;
if (virStorageSourceInitChainElement(mirror,
disk->src,
true) < 0)
return NULL;
}
if (flags & VIR_DOMAIN_BLOCK_COMMIT_RELATIVE &&
topSource != disk->src) {
if (top_parent &&
qemuBlockUpdateRelativeBacking(vm, top_parent, disk->src) < 0)
return NULL;
if (virStorageSourceGetRelativeBackingPath(topSource, baseSource,
&backingPath) < 0)
return NULL;
if (!backingPath) {
virReportError(VIR_ERR_OPERATION_INVALID, "%s",
_("can't keep relative backing relationship"));
return NULL;
}
}
/* For the commit to succeed, we must allow qemu to open both the
* 'base' image and the parent of 'top' as read/write; 'top' might
* not have a parent, or might already be read-write. XXX It
* would also be nice to revert 'base' to read-only, as well as
* revoke access to files removed from the chain, when the commit
* operation succeeds, but doing that requires tracking the
* operation in XML across libvirtd restarts. */
clean_access = true;
if (qemuDomainStorageSourceAccessAllow(driver, vm, baseSource,
false, false, false) < 0)
goto cleanup;
if (baseSource->dataFileStore) {
if (qemuDomainStorageSourceAccessAllow(driver, vm, baseSource->dataFileStore,
false, false, false) < 0)
goto cleanup;
if (qemuBlockReopenReadWrite(vm, baseSource->dataFileStore, asyncJob) < 0)
goto cleanup;
}
if (top_parent && top_parent != disk->src) {
/* While top_parent is topmost image, we don't need to remember its
* owner as it will be overwritten upon finishing the commit. Hence,
* pass chainTop = false. */
if (qemuDomainStorageSourceAccessAllow(driver, vm, top_parent,
false, false, false) < 0)
goto cleanup;
if (top_parent->dataFileStore) {
if (qemuDomainStorageSourceAccessAllow(driver, vm, top_parent->dataFileStore,
false, false, false) < 0)
goto cleanup;
if (qemuBlockReopenReadWrite(vm, top_parent->dataFileStore, asyncJob) < 0)
goto cleanup;
}
}
if (!(job = qemuBlockJobDiskNewCommit(vm, disk, top_parent, topSource,
baseSource,
flags & VIR_DOMAIN_BLOCK_COMMIT_DELETE,
autofinalize,
flags)))
goto cleanup;
disk->mirrorState = VIR_DOMAIN_DISK_MIRROR_STATE_NONE;
if (!backingPath && top_parent &&
!(backingPath = qemuBlockGetBackingStoreString(baseSource, false)))
goto cleanup;
if (asyncJob != VIR_ASYNC_JOB_NONE)
qemuBlockJobSyncBegin(job);
if (qemuDomainObjEnterMonitorAsync(vm, asyncJob) < 0)
goto cleanup;
rc = qemuMonitorBlockCommit(priv->mon,
qemuDomainDiskGetTopNodename(disk),
job->name,
qemuBlockStorageSourceGetEffectiveNodename(topSource),
qemuBlockStorageSourceGetEffectiveNodename(baseSource),
backingPath, bandwidth,
autofinalize);
qemuDomainObjExitMonitor(vm);
if (rc < 0)
goto cleanup;
if (mirror) {
disk->mirror = g_steal_pointer(&mirror);
disk->mirrorJob = VIR_DOMAIN_BLOCK_JOB_TYPE_ACTIVE_COMMIT;
}
qemuBlockJobStarted(job, vm);
ret = virObjectRef(job);
cleanup:
if (rc < 0 && clean_access) {
virErrorPtr orig_err;
virErrorPreserveLast(&orig_err);
/* Revert access to read-only, if possible. */
if (baseSource->dataFileStore) {
qemuDomainStorageSourceAccessAllow(driver, vm, baseSource->dataFileStore,
true, false, false);
qemuBlockReopenReadOnly(vm, baseSource->dataFileStore, asyncJob);
}
qemuDomainStorageSourceAccessAllow(driver, vm, baseSource,
true, false, false);
if (top_parent && top_parent != disk->src) {
if (top_parent->dataFileStore) {
qemuDomainStorageSourceAccessAllow(driver, vm, top_parent->dataFileStore,
true, false, false);
qemuBlockReopenReadWrite(vm, top_parent->dataFileStore, asyncJob);
}
qemuDomainStorageSourceAccessAllow(driver, vm, top_parent,
true, false, false);
}
virErrorRestore(&orig_err);
}
qemuBlockJobStartupFinalize(vm, job);
return ret;
}
/* Called while holding the VM job lock, to implement a block job
* abort with pivot; this updates the VM definition as appropriate, on
* either success or failure. */
int
qemuBlockPivot(virDomainObj *vm,
qemuBlockJobData *job,
virDomainAsyncJob asyncJob,
virDomainDiskDef *disk)
{
g_autoptr(qemuBlockStorageSourceChainData) chainattachdata = NULL;
int ret = -1;
qemuDomainObjPrivate *priv = vm->privateData;
g_autoptr(virJSONValue) bitmapactions = NULL;
g_autoptr(virJSONValue) reopenactions = NULL;
int rc = 0;
if (job->state != QEMU_BLOCKJOB_STATE_READY) {
virReportError(VIR_ERR_BLOCK_COPY_ACTIVE,
_("block job '%1$s' not ready for pivot yet"),
job->name);
return -1;
}
switch ((qemuBlockJobType) job->type) {
case QEMU_BLOCKJOB_TYPE_NONE:
case QEMU_BLOCKJOB_TYPE_LAST:
virReportError(VIR_ERR_INTERNAL_ERROR,
_("invalid job type '%1$d'"), job->type);
return -1;
case QEMU_BLOCKJOB_TYPE_PULL:
case QEMU_BLOCKJOB_TYPE_COMMIT:
case QEMU_BLOCKJOB_TYPE_BACKUP:
case QEMU_BLOCKJOB_TYPE_INTERNAL:
case QEMU_BLOCKJOB_TYPE_CREATE:
case QEMU_BLOCKJOB_TYPE_SNAPSHOT_SAVE:
case QEMU_BLOCKJOB_TYPE_SNAPSHOT_DELETE:
case QEMU_BLOCKJOB_TYPE_SNAPSHOT_LOAD:
case QEMU_BLOCKJOB_TYPE_BROKEN:
virReportError(VIR_ERR_OPERATION_INVALID,
_("job type '%1$s' does not support pivot"),
qemuBlockjobTypeToString(job->type));
return -1;
case QEMU_BLOCKJOB_TYPE_COPY:
if (!job->jobflagsmissing) {
bool shallow = job->jobflags & VIR_DOMAIN_BLOCK_COPY_SHALLOW;
bool reuse = job->jobflags & VIR_DOMAIN_BLOCK_COPY_REUSE_EXT;
bitmapactions = virJSONValueNewArray();
if (qemuMonitorTransactionBitmapAdd(bitmapactions,
qemuBlockStorageSourceGetEffectiveNodename(disk->mirror),
"libvirt-tmp-activewrite",
false,
false,
0) < 0)
return -1;
/* Open and install the backing chain of 'mirror' late if we can use
* blockdev-snapshot to do it. This is to appease oVirt that wants
* to copy data into the backing chain while the top image is being
* copied shallow */
if (reuse && shallow &&
virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_BLOCKDEV_SNAPSHOT_ALLOW_WRITE_ONLY) &&
virStorageSourceHasBacking(disk->mirror)) {
if (qemuProcessPrepareHostStorageSourceChain(vm, disk->mirror->backingStore) < 0)
return -1;
if (!(chainattachdata = qemuBuildStorageSourceChainAttachPrepareBlockdev(disk->mirror->backingStore)))
return -1;
reopenactions = virJSONValueNewArray();
if (qemuMonitorTransactionSnapshotBlockdev(reopenactions,
qemuBlockStorageSourceGetEffectiveNodename(disk->mirror->backingStore),
qemuBlockStorageSourceGetFormatNodename(disk->mirror)))
return -1;
}
}
break;
case QEMU_BLOCKJOB_TYPE_ACTIVE_COMMIT:
bitmapactions = virJSONValueNewArray();
if (qemuMonitorTransactionBitmapAdd(bitmapactions,
qemuBlockStorageSourceGetEffectiveNodename(job->data.commit.base),
"libvirt-tmp-activewrite",
false,
false,
0) < 0)
return -1;
break;
}
if (qemuDomainObjEnterMonitorAsync(vm, asyncJob) < 0)
return -1;
if (chainattachdata) {
if ((rc = qemuBlockStorageSourceChainAttach(priv->mon, chainattachdata)) == 0) {
/* install backing images on success, or unplug them on failure */
if ((rc = qemuMonitorTransaction(priv->mon, &reopenactions)) != 0)
qemuBlockStorageSourceChainDetach(priv->mon, chainattachdata);
}
}
if (bitmapactions && rc == 0)
ignore_value(qemuMonitorTransaction(priv->mon, &bitmapactions));
if (rc == 0)
ret = qemuMonitorJobComplete(priv->mon, job->name);
qemuDomainObjExitMonitor(vm);
/* The pivot failed. The block job in QEMU remains in the synchronised state */
if (ret < 0)
return -1;
if (disk && disk->mirror)
disk->mirrorState = VIR_DOMAIN_DISK_MIRROR_STATE_PIVOT;
job->state = QEMU_BLOCKJOB_STATE_PIVOTING;
return ret;
}
/**
* qemuBlockFinalize:
* @vm: domain object
* @job: qemu block job data object
* @asyncJob: qemu async job type
*
* When qemu job is started with autofinalize disabled it will wait in pending
* state for block job finalize to be called manually in order to finish the
* job. This is useful when we are running jobs on multiple disks to make
* a synchronization point before we finish.
*
* Return -1 on error, 0 on success.
*/
int
qemuBlockFinalize(virDomainObj *vm,
qemuBlockJobData *job,
virDomainAsyncJob asyncJob)
{
int ret;
qemuDomainObjPrivate *priv = vm->privateData;
if (qemuDomainObjEnterMonitorAsync(vm, asyncJob) < 0)
return -1;
ret = qemuMonitorJobFinalize(priv->mon, job->name);
qemuDomainObjExitMonitor(vm);
return ret;
}