Message ID | 1490583036-3683-1-git-send-email-Ashish.Mittal@veritas.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
On 03/26/2017 09:50 PM, Ashish Mittal wrote: > Source code for the qnio library that this code loads can be downloaded from: > https://github.com/VeritasHyperScale/libqnio.git When sending a multi-patch series, please include a 0/2 cover letter ('git config format.coverletter auto' can help). > > Sample command line using JSON syntax: > ./x86_64-softmmu/qemu-system-x86_64 -name instance-00000008 -S -vnc 0.0.0.0:0 > -k en-us -vga cirrus -device virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x5 > -msg timestamp=on > 'json:{"driver":"vxhs","vdisk-id":"c3e9095a-a5ee-4dce-afeb-2a59fb387410", > "server":{"host":"172.172.17.4","port":"9999"}}' > > Sample command line using URI syntax: > qemu-img convert -f raw -O raw -n > /var/lib/nova/instances/_base/0c5eacd5ebea5ed914b6a3e7b18f1ce734c386ad > vxhs://192.168.0.1:9999/c6718f6b-0401-441d-a8c3-1f0064d75ee0 Do we really need URI syntax, now that we have -blockdev-add going into 2.9? > > Sample command line using TLS credentials (run in secure mode): > ./qemu-io --object > tls-creds-x509,id=tls0,dir=/etc/pki/qemu/vxhs,endpoint=client -c 'read > -v 66000 2.5k' 'json:{"server.host": "127.0.0.1", "server.port": "9999", > "vdisk-id": "/test.raw", "driver": "vxhs", "tls-creds":"tls0"}' > > Signed-off-by: Ashish Mittal <Ashish.Mittal@veritas.com> > --- > I'm just doing a high-level review of the interface, and leaving the actual code review to others. > +++ b/block/vxhs.c > @@ -0,0 +1,595 @@ > +/* > + * QEMU Block driver for Veritas HyperScale (VxHS) > + * > + * This work is licensed under the terms of the GNU GPL, version 2 or later. > + * See the COPYING file in the top-level directory. > + * No Copyright notice? The GPL works by virtue of copyright law, so generally a copyright holder should be mentioned. > +++ b/qapi/block-core.json > @@ -2118,6 +2118,7 @@ > # @iscsi: Since 2.9 > # @rbd: Since 2.9 > # @sheepdog: Since 2.9 > +# @vxhs: Since 2.10 > # > # Since: 2.0 > ## > @@ -2127,7 +2128,7 @@ > 'host_device', 'http', 'https', 'iscsi', 'luks', 'nbd', 'nfs', > 'null-aio', 'null-co', 'parallels', 'qcow', 'qcow2', 'qed', > 'quorum', 'raw', 'rbd', 'replication', 'sheepdog', 'ssh', > - 'vdi', 'vhdx', 'vmdk', 'vpc', 'vvfat' ] } > + 'vdi', 'vhdx', 'vmdk', 'vpc', 'vvfat', 'vxhs' ] } Markus has patches pending (to promote x-blockdev-del over to blockdev-del) that will conflict in context with this patch. You may have to rebase again, but hopefully the conflicts should be easy to figure out. > > ## > # @BlockdevOptionsFile: > @@ -2820,6 +2821,22 @@ > 'data': { '*offset': 'int', '*size': 'int' } } > > ## > +# @BlockdevOptionsVxHS: > +# > +# Driver specific block device options for VxHS > +# > +# @vdisk-id: UUID of VxHS volume > +# @server: vxhs server IP, port > +# @tls-creds: TLS credentials ID > +# > +# Since: 2.10 > +## > +{ 'struct': 'BlockdevOptionsVxHS', > + 'data': { 'vdisk-id': 'str', > + 'server': 'InetSocketAddress', Do you want to use the new InetSocketAddressBase (just host and port, eliminating things like 'to' that don't make much sense in this context)? > + '*tls-creds': 'str' } } > + > +## > # @BlockdevOptions: > # > # Options for creating a block device. Many options are available for all > @@ -2881,7 +2898,8 @@ > 'vhdx': 'BlockdevOptionsGenericFormat', > 'vmdk': 'BlockdevOptionsGenericCOWFormat', > 'vpc': 'BlockdevOptionsGenericFormat', > - 'vvfat': 'BlockdevOptionsVVFAT' > + 'vvfat': 'BlockdevOptionsVVFAT', > + 'vxhs': 'BlockdevOptionsVxHS' > } } > > ## >
On Sun, Mar 26, 2017 at 07:50:35PM -0700, Ashish Mittal wrote: Have you tested live migration? If live migration is not supported then a migration blocker should be added using migrate_add_blocker(). > v10 changelog: > (1) Implemented accepting TLS creds per block device via the CLI > (see 3rd e.g in commit log). Corresponding changes made to the > libqnio library. > (2) iio_open() changed to accept TLS creds and use these internally > to set up SSL connections. > (3) Got rid of hard-coded VXHS_UUID_DEF. qemu_uuid is no longer used > for authentication in any way. Why does the code still access qemu_uuid and pass the UUID string to iio_init()? In libqnio.git (66698ca47bc594a9f623c240d63ea535f5a42b47) the 'instance' field is unused and not sent over the wire. Please drop it. > diff --git a/block/vxhs.c b/block/vxhs.c > new file mode 100644 > index 0000000..b98b535 > --- /dev/null > +++ b/block/vxhs.c > @@ -0,0 +1,595 @@ > +/* > + * QEMU Block driver for Veritas HyperScale (VxHS) > + * > + * This work is licensed under the terms of the GNU GPL, version 2 or later. > + * See the COPYING file in the top-level directory. > + * > + */ > + > +#include "qemu/osdep.h" > +#include <qnio/qnio_api.h> > +#include <sys/param.h> > +#include "block/block_int.h" > +#include "qapi/qmp/qerror.h" > +#include "qapi/qmp/qdict.h" > +#include "qapi/qmp/qstring.h" > +#include "trace.h" > +#include "qemu/uri.h" > +#include "qapi/error.h" > +#include "qemu/uuid.h" > +#include "crypto/tlscredsx509.h" > + > +#define VXHS_OPT_FILENAME "filename" > +#define VXHS_OPT_VDISK_ID "vdisk-id" > +#define VXHS_OPT_SERVER "server" > +#define VXHS_OPT_HOST "host" > +#define VXHS_OPT_PORT "port" > + > +QemuUUID qemu_uuid __attribute__ ((weak)); > + > +static uint32_t vxhs_ref; It would be nice to add: /* Only accessed under QEMU global mutex */ > +/* > + * Parse the incoming URI and populate *options with the host information. > + * URI syntax has the limitation of supporting only one host info. > + * To pass multiple host information, use the JSON syntax. References to multiple hosts are out of date. The driver only supports a single host now. > + */ > +static int vxhs_parse_uri(const char *filename, QDict *options) > +{ > + URI *uri = NULL; > + char *hoststr, *portstr; > + char *port; > + int ret = 0; > + > + trace_vxhs_parse_uri_filename(filename); > + uri = uri_parse(filename); > + if (!uri || !uri->server || !uri->path) { > + uri_free(uri); > + return -EINVAL; > + } > + > + hoststr = g_strdup(VXHS_OPT_SERVER".host"); > + qdict_put(options, hoststr, qstring_from_str(uri->server)); > + g_free(hoststr); > + > + portstr = g_strdup(VXHS_OPT_SERVER".port"); > + if (uri->port) { > + port = g_strdup_printf("%d", uri->port); > + qdict_put(options, portstr, qstring_from_str(port)); > + g_free(port); > + } > + g_free(portstr); The g_strdup()/g_free() isn't necessary for the qdict_put() key argument. The key belongs to the caller so we can pass a string literal: qdict_put(options, VXHS_OPT_SERVER ".host", qstring_from_str(uri->server)); if (uri->port) { port = g_strdup_printf("%d", uri->port); qdict_put(options, VXHS_OPT_SERVER ".port", qstring_from_str(port)); g_free(port); } > + > + if (strstr(uri->path, "vxhs") == NULL) { What does this check do? > +static int vxhs_open(BlockDriverState *bs, QDict *options, > + int bdrv_flags, Error **errp) > +{ > + BDRVVXHSState *s = bs->opaque; > + void *dev_handlep = NULL; > + QDict *backing_options = NULL; > + QemuOpts *opts, *tcp_opts; > + char *of_vsa_addr = NULL; > + Error *local_err = NULL; > + const char *vdisk_id_opt; > + const char *server_host_opt; > + char *str = NULL; > + int ret = 0; > + char *cacert = NULL; > + char *client_key = NULL; > + char *client_cert = NULL; > + > + ret = vxhs_init_and_ref(); > + if (ret < 0) { > + return ret; > + } > + > + /* Create opts info from runtime_opts and runtime_tcp_opts list */ > + opts = qemu_opts_create(&runtime_opts, NULL, 0, &error_abort); > + tcp_opts = qemu_opts_create(&runtime_tcp_opts, NULL, 0, &error_abort); > + > + qemu_opts_absorb_qdict(opts, options, &local_err); > + if (local_err) { > + ret = -EINVAL; > + goto out; > + } > + > + /* vdisk-id is the disk UUID */ > + vdisk_id_opt = qemu_opt_get(opts, VXHS_OPT_VDISK_ID); > + if (!vdisk_id_opt) { > + error_setg(&local_err, QERR_MISSING_PARAMETER, VXHS_OPT_VDISK_ID); > + ret = -EINVAL; > + goto out; > + } > + > + /* vdisk-id may contain a leading '/' */ > + if (strlen(vdisk_id_opt) > UUID_FMT_LEN + 1) { > + error_setg(&local_err, "vdisk-id cannot be more than %d characters", > + UUID_FMT_LEN); > + ret = -EINVAL; > + goto out; > + } > + > + s->vdisk_guid = g_strdup(vdisk_id_opt); > + trace_vxhs_open_vdiskid(vdisk_id_opt); > + > + /* get the 'server.' arguments */ > + str = g_strdup_printf(VXHS_OPT_SERVER"."); > + qdict_extract_subqdict(options, &backing_options, str); g_strdup_printf() is unnecessary. You can eliminate the 'str' local variable and just do: qdict_extract_subqdict(options, &backing_options, VXHS_OPT_SERVER "."); > + > + qemu_opts_absorb_qdict(tcp_opts, backing_options, &local_err); > + if (local_err != NULL) { > + ret = -EINVAL; > + goto out; > + } > + > + server_host_opt = qemu_opt_get(tcp_opts, VXHS_OPT_HOST); > + if (!server_host_opt) { > + error_setg(&local_err, QERR_MISSING_PARAMETER, > + VXHS_OPT_SERVER"."VXHS_OPT_HOST); > + ret = -EINVAL; > + goto out; > + } > + > + if (strlen(server_host_opt) > MAXHOSTNAMELEN) { > + error_setg(&local_err, "server.host cannot be more than %d characters", > + MAXHOSTNAMELEN); > + ret = -EINVAL; > + goto out; > + } > + > + /* check if we got tls-creds via the --object argument */ > + s->tlscredsid = g_strdup(qemu_opt_get(opts, "tls-creds")); > + if (s->tlscredsid) { > + vxhs_get_tls_creds(s->tlscredsid, &cacert, &client_key, > + &client_cert, &local_err); > + if (local_err != NULL) { > + ret = -EINVAL; > + goto out; > + } > + trace_vxhs_get_creds(cacert, client_key, client_cert); > + } > + > + s->vdisk_hostinfo.host = g_strdup(server_host_opt); > + s->vdisk_hostinfo.port = g_ascii_strtoll(qemu_opt_get(tcp_opts, > + VXHS_OPT_PORT), > + NULL, 0); > + > + trace_vxhs_open_hostinfo(s->vdisk_hostinfo.host, > + s->vdisk_hostinfo.port); > + > + of_vsa_addr = g_strdup_printf("of://%s:%d", > + s->vdisk_hostinfo.host, > + s->vdisk_hostinfo.port); > + > + /* > + * Open qnio channel to storage agent if not opened before > + */ > + dev_handlep = iio_open(of_vsa_addr, s->vdisk_guid, 0, > + cacert, client_key, client_cert); > + if (dev_handlep == NULL) { > + trace_vxhs_open_iio_open(of_vsa_addr); > + ret = -ENODEV; > + goto out; > + } > + s->vdisk_hostinfo.dev_handle = dev_handlep; > + > +out: > + g_free(str); > + g_free(of_vsa_addr); > + QDECREF(backing_options); > + qemu_opts_del(tcp_opts); > + qemu_opts_del(opts); > + g_free(cacert); > + g_free(client_key); > + g_free(client_cert); > + > + if (ret < 0) { > + vxhs_unref(); > + error_propagate(errp, local_err); > + g_free(s->vdisk_hostinfo.host); > + g_free(s->vdisk_guid); > + g_free(s->tlscredsid); > + s->vdisk_guid = NULL; > + errno = -ret; .bdrv_open() does not promise anything about errno. This line can be dropped. > + } > + > + return ret; > +} > + > +static const AIOCBInfo vxhs_aiocb_info = { > + .aiocb_size = sizeof(VXHSAIOCB) > +}; > + > +/* > + * This allocates QEMU-VXHS callback for each IO > + * and is passed to QNIO. When QNIO completes the work, > + * it will be passed back through the callback. > + */ > +static BlockAIOCB *vxhs_aio_rw(BlockDriverState *bs, int64_t sector_num, > + QEMUIOVector *qiov, int nb_sectors, > + BlockCompletionFunc *cb, void *opaque, > + VDISKAIOCmd iodir) > +{ > + VXHSAIOCB *acb = NULL; > + BDRVVXHSState *s = bs->opaque; > + size_t size; > + uint64_t offset; > + int iio_flags = 0; > + int ret = 0; > + void *dev_handle = s->vdisk_hostinfo.dev_handle; > + > + offset = sector_num * BDRV_SECTOR_SIZE; > + size = nb_sectors * BDRV_SECTOR_SIZE; > + acb = qemu_aio_get(&vxhs_aiocb_info, bs, cb, opaque); > + > + /* > + * Initialize VXHSAIOCB. > + */ > + acb->err = 0; > + acb->qiov = qiov; This field is unused, please remove it. > +static BlockDriver bdrv_vxhs = { > + .format_name = "vxhs", > + .protocol_name = "vxhs", > + .instance_size = sizeof(BDRVVXHSState), > + .bdrv_file_open = vxhs_open, > + .bdrv_parse_filename = vxhs_parse_filename, > + .bdrv_close = vxhs_close, > + .bdrv_getlength = vxhs_getlength, > + .bdrv_aio_readv = vxhs_aio_readv, > + .bdrv_aio_writev = vxhs_aio_writev, Missing .bdrv_aio_flush(). Does VxHS promise that every completed write request is persistent? In that case it may be better to disable the emulated disk write cache so the guest operating system and application know not to send flush commands.
On Mon, Mar 27, 2017 at 8:56 AM, Eric Blake <eblake@redhat.com> wrote: > On 03/26/2017 09:50 PM, Ashish Mittal wrote: >> Source code for the qnio library that this code loads can be downloaded from: >> https://github.com/VeritasHyperScale/libqnio.git > > When sending a multi-patch series, please include a 0/2 cover letter > ('git config format.coverletter auto' can help). > Will do! >> >> Sample command line using JSON syntax: >> ./x86_64-softmmu/qemu-system-x86_64 -name instance-00000008 -S -vnc 0.0.0.0:0 >> -k en-us -vga cirrus -device virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x5 >> -msg timestamp=on >> 'json:{"driver":"vxhs","vdisk-id":"c3e9095a-a5ee-4dce-afeb-2a59fb387410", >> "server":{"host":"172.172.17.4","port":"9999"}}' >> >> Sample command line using URI syntax: >> qemu-img convert -f raw -O raw -n >> /var/lib/nova/instances/_base/0c5eacd5ebea5ed914b6a3e7b18f1ce734c386ad >> vxhs://192.168.0.1:9999/c6718f6b-0401-441d-a8c3-1f0064d75ee0 > > Do we really need URI syntax, now that we have -blockdev-add going into 2.9? > Having it just makes manual testing with CLI easier (less to type). Would like to retain it for now, unless having this is a problem. Removing it will also require rework and retesting of the qemu-iotests patch. >> >> Sample command line using TLS credentials (run in secure mode): >> ./qemu-io --object >> tls-creds-x509,id=tls0,dir=/etc/pki/qemu/vxhs,endpoint=client -c 'read >> -v 66000 2.5k' 'json:{"server.host": "127.0.0.1", "server.port": "9999", >> "vdisk-id": "/test.raw", "driver": "vxhs", "tls-creds":"tls0"}' >> >> Signed-off-by: Ashish Mittal <Ashish.Mittal@veritas.com> >> --- >> > > I'm just doing a high-level review of the interface, and leaving the > actual code review to others. > >> +++ b/block/vxhs.c >> @@ -0,0 +1,595 @@ >> +/* >> + * QEMU Block driver for Veritas HyperScale (VxHS) >> + * >> + * This work is licensed under the terms of the GNU GPL, version 2 or later. >> + * See the COPYING file in the top-level directory. >> + * > > No Copyright notice? The GPL works by virtue of copyright law, so > generally a copyright holder should be mentioned. > I guess what's missing is the "Copyright (c) Veritas, LLC. 2017" line. Is that correct? > >> +++ b/qapi/block-core.json >> @@ -2118,6 +2118,7 @@ >> # @iscsi: Since 2.9 >> # @rbd: Since 2.9 >> # @sheepdog: Since 2.9 >> +# @vxhs: Since 2.10 >> # >> # Since: 2.0 >> ## >> @@ -2127,7 +2128,7 @@ >> 'host_device', 'http', 'https', 'iscsi', 'luks', 'nbd', 'nfs', >> 'null-aio', 'null-co', 'parallels', 'qcow', 'qcow2', 'qed', >> 'quorum', 'raw', 'rbd', 'replication', 'sheepdog', 'ssh', >> - 'vdi', 'vhdx', 'vmdk', 'vpc', 'vvfat' ] } >> + 'vdi', 'vhdx', 'vmdk', 'vpc', 'vvfat', 'vxhs' ] } > > Markus has patches pending (to promote x-blockdev-del over to > blockdev-del) that will conflict in context with this patch. You may > have to rebase again, but hopefully the conflicts should be easy to > figure out. > I will rebase again as needed. Not having vxhs code merged yet does create conflicts while rebasing. It would have been much easier to just send out patches for the review comments :) >> >> ## >> # @BlockdevOptionsFile: >> @@ -2820,6 +2821,22 @@ >> 'data': { '*offset': 'int', '*size': 'int' } } >> >> ## >> +# @BlockdevOptionsVxHS: >> +# >> +# Driver specific block device options for VxHS >> +# >> +# @vdisk-id: UUID of VxHS volume >> +# @server: vxhs server IP, port >> +# @tls-creds: TLS credentials ID >> +# >> +# Since: 2.10 >> +## >> +{ 'struct': 'BlockdevOptionsVxHS', >> + 'data': { 'vdisk-id': 'str', >> + 'server': 'InetSocketAddress', > > Do you want to use the new InetSocketAddressBase (just host and port, > eliminating things like 'to' that don't make much sense in this context)? > Don't see InetSocketAddressBase in the latest code. Could you please give me a usage example for reference? Thanks! >> + '*tls-creds': 'str' } } >> + >> +## >> # @BlockdevOptions: >> # >> # Options for creating a block device. Many options are available for all >> @@ -2881,7 +2898,8 @@ >> 'vhdx': 'BlockdevOptionsGenericFormat', >> 'vmdk': 'BlockdevOptionsGenericCOWFormat', >> 'vpc': 'BlockdevOptionsGenericFormat', >> - 'vvfat': 'BlockdevOptionsVVFAT' >> + 'vvfat': 'BlockdevOptionsVVFAT', >> + 'vxhs': 'BlockdevOptionsVxHS' >> } } >> >> ## >> > > -- > Eric Blake eblake redhat com +1-919-301-3266 > Libvirt virtualization library http://libvirt.org >
On 03/27/2017 01:25 PM, ashish mittal wrote: >>> >>> Sample command line using URI syntax: >>> qemu-img convert -f raw -O raw -n >>> /var/lib/nova/instances/_base/0c5eacd5ebea5ed914b6a3e7b18f1ce734c386ad >>> vxhs://192.168.0.1:9999/c6718f6b-0401-441d-a8c3-1f0064d75ee0 >> >> Do we really need URI syntax, now that we have -blockdev-add going into 2.9? >> > > Having it just makes manual testing with CLI easier (less to type). > Would like to retain it for now, unless having this is a problem. > Removing it will also require rework and retesting of the qemu-iotests > patch. At this point, it's a maintenance burden. We're trying to get rid of QemuOpts madness in favor of sane QMP design, and every new driver that adds yet another URI hack on top of QemuOpts makes it that much harder to get rid of the cruft. I'm not going to be the one to outright reject a URI scheme as long as the QMP works with equal features. But given the churn currently going on about RBD support for 2.9, I want to make absolutely sure we get the QMP part exactly right, and don't have to maintain any extra translation layers to URI than absolutely necessary. >> >> No Copyright notice? The GPL works by virtue of copyright law, so >> generally a copyright holder should be mentioned. >> > > I guess what's missing is the "Copyright (c) Veritas, LLC. 2017" line. > Is that correct? Yes. (Your company's legal team may have specific requirements or advice on exactly how to format the line; I can't speak to whether you have complied with those checklists, but from my perspective your proposal looks fine). >>> +## >>> +{ 'struct': 'BlockdevOptionsVxHS', >>> + 'data': { 'vdisk-id': 'str', >>> + 'server': 'InetSocketAddress', >> >> Do you want to use the new InetSocketAddressBase (just host and port, >> eliminating things like 'to' that don't make much sense in this context)? >> > > Don't see InetSocketAddressBase in the latest code. Could you please > give me a usage example for reference? Thanks! Part of Markus' pending series that you'd have to rebase on ;) https://lists.gnu.org/archive/html/qemu-devel/2017-03/msg05215.html
On Mon, Mar 27, 2017 at 10:27 AM, Stefan Hajnoczi <stefanha@gmail.com> wrote: > On Sun, Mar 26, 2017 at 07:50:35PM -0700, Ashish Mittal wrote: > > Have you tested live migration? > > If live migration is not supported then a migration blocker should be > added using migrate_add_blocker(). > We do support live migration. We have been testing a fork of this code (slightly different version) with live migration. >> v10 changelog: >> (1) Implemented accepting TLS creds per block device via the CLI >> (see 3rd e.g in commit log). Corresponding changes made to the >> libqnio library. >> (2) iio_open() changed to accept TLS creds and use these internally >> to set up SSL connections. >> (3) Got rid of hard-coded VXHS_UUID_DEF. qemu_uuid is no longer used >> for authentication in any way. > > Why does the code still access qemu_uuid and pass the UUID string to > iio_init()? > I was of the opinion that knowing what instance (for qemu-kvm case) was opening a block device could be a useful piece of information for the block device to have in the future. > In libqnio.git (66698ca47bc594a9f623c240d63ea535f5a42b47) the 'instance' > field is unused and not sent over the wire. Please drop it. > It is not used at present. I will drop it. >> diff --git a/block/vxhs.c b/block/vxhs.c >> new file mode 100644 >> index 0000000..b98b535 >> --- /dev/null >> +++ b/block/vxhs.c >> @@ -0,0 +1,595 @@ >> +/* >> + * QEMU Block driver for Veritas HyperScale (VxHS) >> + * >> + * This work is licensed under the terms of the GNU GPL, version 2 or later. >> + * See the COPYING file in the top-level directory. >> + * >> + */ >> + >> +#include "qemu/osdep.h" >> +#include <qnio/qnio_api.h> >> +#include <sys/param.h> >> +#include "block/block_int.h" >> +#include "qapi/qmp/qerror.h" >> +#include "qapi/qmp/qdict.h" >> +#include "qapi/qmp/qstring.h" >> +#include "trace.h" >> +#include "qemu/uri.h" >> +#include "qapi/error.h" >> +#include "qemu/uuid.h" >> +#include "crypto/tlscredsx509.h" >> + >> +#define VXHS_OPT_FILENAME "filename" >> +#define VXHS_OPT_VDISK_ID "vdisk-id" >> +#define VXHS_OPT_SERVER "server" >> +#define VXHS_OPT_HOST "host" >> +#define VXHS_OPT_PORT "port" >> + >> +QemuUUID qemu_uuid __attribute__ ((weak)); >> + >> +static uint32_t vxhs_ref; > > It would be nice to add: > /* Only accessed under QEMU global mutex */ > Will do. >> +/* >> + * Parse the incoming URI and populate *options with the host information. >> + * URI syntax has the limitation of supporting only one host info. >> + * To pass multiple host information, use the JSON syntax. > > References to multiple hosts are out of date. The driver only supports > a single host now. > Will change. >> + */ >> +static int vxhs_parse_uri(const char *filename, QDict *options) >> +{ >> + URI *uri = NULL; >> + char *hoststr, *portstr; >> + char *port; >> + int ret = 0; >> + >> + trace_vxhs_parse_uri_filename(filename); >> + uri = uri_parse(filename); >> + if (!uri || !uri->server || !uri->path) { >> + uri_free(uri); >> + return -EINVAL; >> + } >> + >> + hoststr = g_strdup(VXHS_OPT_SERVER".host"); >> + qdict_put(options, hoststr, qstring_from_str(uri->server)); >> + g_free(hoststr); >> + >> + portstr = g_strdup(VXHS_OPT_SERVER".port"); >> + if (uri->port) { >> + port = g_strdup_printf("%d", uri->port); >> + qdict_put(options, portstr, qstring_from_str(port)); >> + g_free(port); >> + } >> + g_free(portstr); > > The g_strdup()/g_free() isn't necessary for the qdict_put() key > argument. The key belongs to the caller so we can pass a string > literal: Will Change. > > qdict_put(options, VXHS_OPT_SERVER ".host", qstring_from_str(uri->server)); > if (uri->port) { > port = g_strdup_printf("%d", uri->port); > qdict_put(options, VXHS_OPT_SERVER ".port", qstring_from_str(port)); > g_free(port); > } > >> + >> + if (strstr(uri->path, "vxhs") == NULL) { > > What does this check do? > Not sure about the history, but it's been there since first code draft. Will check if it serves any purpose, or remove it. >> +static int vxhs_open(BlockDriverState *bs, QDict *options, >> + int bdrv_flags, Error **errp) >> +{ >> + BDRVVXHSState *s = bs->opaque; >> + void *dev_handlep = NULL; >> + QDict *backing_options = NULL; >> + QemuOpts *opts, *tcp_opts; >> + char *of_vsa_addr = NULL; >> + Error *local_err = NULL; >> + const char *vdisk_id_opt; >> + const char *server_host_opt; >> + char *str = NULL; >> + int ret = 0; >> + char *cacert = NULL; >> + char *client_key = NULL; >> + char *client_cert = NULL; >> + >> + ret = vxhs_init_and_ref(); >> + if (ret < 0) { >> + return ret; >> + } >> + >> + /* Create opts info from runtime_opts and runtime_tcp_opts list */ >> + opts = qemu_opts_create(&runtime_opts, NULL, 0, &error_abort); >> + tcp_opts = qemu_opts_create(&runtime_tcp_opts, NULL, 0, &error_abort); >> + >> + qemu_opts_absorb_qdict(opts, options, &local_err); >> + if (local_err) { >> + ret = -EINVAL; >> + goto out; >> + } >> + >> + /* vdisk-id is the disk UUID */ >> + vdisk_id_opt = qemu_opt_get(opts, VXHS_OPT_VDISK_ID); >> + if (!vdisk_id_opt) { >> + error_setg(&local_err, QERR_MISSING_PARAMETER, VXHS_OPT_VDISK_ID); >> + ret = -EINVAL; >> + goto out; >> + } >> + >> + /* vdisk-id may contain a leading '/' */ >> + if (strlen(vdisk_id_opt) > UUID_FMT_LEN + 1) { >> + error_setg(&local_err, "vdisk-id cannot be more than %d characters", >> + UUID_FMT_LEN); >> + ret = -EINVAL; >> + goto out; >> + } >> + >> + s->vdisk_guid = g_strdup(vdisk_id_opt); >> + trace_vxhs_open_vdiskid(vdisk_id_opt); >> + >> + /* get the 'server.' arguments */ >> + str = g_strdup_printf(VXHS_OPT_SERVER"."); >> + qdict_extract_subqdict(options, &backing_options, str); > > g_strdup_printf() is unnecessary. You can eliminate the 'str' local > variable and just do: > > qdict_extract_subqdict(options, &backing_options, VXHS_OPT_SERVER "."); > Will do. Thanks! >> + >> + qemu_opts_absorb_qdict(tcp_opts, backing_options, &local_err); >> + if (local_err != NULL) { >> + ret = -EINVAL; >> + goto out; >> + } >> + >> + server_host_opt = qemu_opt_get(tcp_opts, VXHS_OPT_HOST); >> + if (!server_host_opt) { >> + error_setg(&local_err, QERR_MISSING_PARAMETER, >> + VXHS_OPT_SERVER"."VXHS_OPT_HOST); >> + ret = -EINVAL; >> + goto out; >> + } >> + >> + if (strlen(server_host_opt) > MAXHOSTNAMELEN) { >> + error_setg(&local_err, "server.host cannot be more than %d characters", >> + MAXHOSTNAMELEN); >> + ret = -EINVAL; >> + goto out; >> + } >> + >> + /* check if we got tls-creds via the --object argument */ >> + s->tlscredsid = g_strdup(qemu_opt_get(opts, "tls-creds")); >> + if (s->tlscredsid) { >> + vxhs_get_tls_creds(s->tlscredsid, &cacert, &client_key, >> + &client_cert, &local_err); >> + if (local_err != NULL) { >> + ret = -EINVAL; >> + goto out; >> + } >> + trace_vxhs_get_creds(cacert, client_key, client_cert); >> + } >> + >> + s->vdisk_hostinfo.host = g_strdup(server_host_opt); >> + s->vdisk_hostinfo.port = g_ascii_strtoll(qemu_opt_get(tcp_opts, >> + VXHS_OPT_PORT), >> + NULL, 0); >> + >> + trace_vxhs_open_hostinfo(s->vdisk_hostinfo.host, >> + s->vdisk_hostinfo.port); >> + >> + of_vsa_addr = g_strdup_printf("of://%s:%d", >> + s->vdisk_hostinfo.host, >> + s->vdisk_hostinfo.port); >> + >> + /* >> + * Open qnio channel to storage agent if not opened before >> + */ >> + dev_handlep = iio_open(of_vsa_addr, s->vdisk_guid, 0, >> + cacert, client_key, client_cert); >> + if (dev_handlep == NULL) { >> + trace_vxhs_open_iio_open(of_vsa_addr); >> + ret = -ENODEV; >> + goto out; >> + } >> + s->vdisk_hostinfo.dev_handle = dev_handlep; >> + >> +out: >> + g_free(str); >> + g_free(of_vsa_addr); >> + QDECREF(backing_options); >> + qemu_opts_del(tcp_opts); >> + qemu_opts_del(opts); >> + g_free(cacert); >> + g_free(client_key); >> + g_free(client_cert); >> + >> + if (ret < 0) { >> + vxhs_unref(); >> + error_propagate(errp, local_err); >> + g_free(s->vdisk_hostinfo.host); >> + g_free(s->vdisk_guid); >> + g_free(s->tlscredsid); >> + s->vdisk_guid = NULL; >> + errno = -ret; > > .bdrv_open() does not promise anything about errno. This line can be > dropped. > Will do. >> + } >> + >> + return ret; >> +} >> + >> +static const AIOCBInfo vxhs_aiocb_info = { >> + .aiocb_size = sizeof(VXHSAIOCB) >> +}; >> + >> +/* >> + * This allocates QEMU-VXHS callback for each IO >> + * and is passed to QNIO. When QNIO completes the work, >> + * it will be passed back through the callback. >> + */ >> +static BlockAIOCB *vxhs_aio_rw(BlockDriverState *bs, int64_t sector_num, >> + QEMUIOVector *qiov, int nb_sectors, >> + BlockCompletionFunc *cb, void *opaque, >> + VDISKAIOCmd iodir) >> +{ >> + VXHSAIOCB *acb = NULL; >> + BDRVVXHSState *s = bs->opaque; >> + size_t size; >> + uint64_t offset; >> + int iio_flags = 0; >> + int ret = 0; >> + void *dev_handle = s->vdisk_hostinfo.dev_handle; >> + >> + offset = sector_num * BDRV_SECTOR_SIZE; >> + size = nb_sectors * BDRV_SECTOR_SIZE; >> + acb = qemu_aio_get(&vxhs_aiocb_info, bs, cb, opaque); >> + >> + /* >> + * Initialize VXHSAIOCB. >> + */ >> + acb->err = 0; >> + acb->qiov = qiov; > > This field is unused, please remove it. > Yes! Thanks! >> +static BlockDriver bdrv_vxhs = { >> + .format_name = "vxhs", >> + .protocol_name = "vxhs", >> + .instance_size = sizeof(BDRVVXHSState), >> + .bdrv_file_open = vxhs_open, >> + .bdrv_parse_filename = vxhs_parse_filename, >> + .bdrv_close = vxhs_close, >> + .bdrv_getlength = vxhs_getlength, >> + .bdrv_aio_readv = vxhs_aio_readv, >> + .bdrv_aio_writev = vxhs_aio_writev, > > Missing .bdrv_aio_flush(). Does VxHS promise that every completed write > request is persistent? > Yes, every acknowledged write request is persistent. > In that case it may be better to disable the emulated disk write cache > so the guest operating system and application know not to send flush > commands. We do pass "cache=none" on the qemu command line for every block device. Are there any other code changes necessary? Any pointers will help. Thanks, Ashish
On Sun, Mar 26, 2017 at 07:50:35PM -0700, Ashish Mittal wrote: > Source code for the qnio library that this code loads can be downloaded from: > https://github.com/VeritasHyperScale/libqnio.git > > Sample command line using JSON syntax: > ./x86_64-softmmu/qemu-system-x86_64 -name instance-00000008 -S -vnc 0.0.0.0:0 > -k en-us -vga cirrus -device virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x5 > -msg timestamp=on > 'json:{"driver":"vxhs","vdisk-id":"c3e9095a-a5ee-4dce-afeb-2a59fb387410", > "server":{"host":"172.172.17.4","port":"9999"}}' > > Sample command line using URI syntax: > qemu-img convert -f raw -O raw -n > /var/lib/nova/instances/_base/0c5eacd5ebea5ed914b6a3e7b18f1ce734c386ad > vxhs://192.168.0.1:9999/c6718f6b-0401-441d-a8c3-1f0064d75ee0 > > Sample command line using TLS credentials (run in secure mode): > ./qemu-io --object > tls-creds-x509,id=tls0,dir=/etc/pki/qemu/vxhs,endpoint=client -c 'read > -v 66000 2.5k' 'json:{"server.host": "127.0.0.1", "server.port": "9999", > "vdisk-id": "/test.raw", "driver": "vxhs", "tls-creds":"tls0"}' > > Signed-off-by: Ashish Mittal <Ashish.Mittal@veritas.com> > --- > > v10 changelog: > (1) Implemented accepting TLS creds per block device via the CLI > (see 3rd e.g in commit log). Corresponding changes made to the > libqnio library. > (2) iio_open() changed to accept TLS creds and use these internally > to set up SSL connections. > (3) Got rid of hard-coded VXHS_UUID_DEF. qemu_uuid is no longer used > for authentication in any way. > (4) Removed unnecessary qdict_del(backing_options, str). > (5) Added '*tls-creds' to BlockdevOptionsVxHS. > > v9 changelog: > (1) Fixes for all the review comments from v8. I have left the definition > of VXHS_UUID_DEF unchanged pending a better suggestion. > (2) qcow2 tests now pass on the vxhs test server. > (3) Packaging changes for libvxhs will be checked in to the git repo soon. > (4) I have not moved extern QemuUUID qemu_uuid to a separate header file. > > v8 changelog: > (1) Security implementation for libqnio present in branch 'securify'. > Please use 'securify' branch for building libqnio and testing > with this patch. > (2) Renamed libqnio to libvxhs. > (3) Pass instance ID to libvxhs for SSL authentication. > > v7 changelog: > (1) IO failover code has moved out to the libqnio library. > (2) Fixes for issues reported by Stefan on v6. > (3) Incorporated the QEMUBH patch provided by Stefan. > This is a replacement for the pipe mechanism used earlier. > (4) Fixes to the buffer overflows reported in libqnio. > (5) Input validations in vxhs.c to prevent any buffer overflows for > arguments passed to libqnio. > > v6 changelog: > (1) Added qemu-iotests for VxHS as a new patch in the series. > (2) Replaced release version from 2.8 to 2.9 in block-core.json. > > v5 changelog: > (1) Incorporated v4 review comments. > > v4 changelog: > (1) Incorporated v3 review comments on QAPI changes. > (2) Added refcounting for device open/close. > Free library resources on last device close. > > v3 changelog: > (1) Added QAPI schema for the VxHS driver. > > v2 changelog: > (1) Changes done in response to v1 comments. > > block/Makefile.objs | 2 + > block/trace-events | 17 ++ > block/vxhs.c | 595 +++++++++++++++++++++++++++++++++++++++++++++++++++ > configure | 39 ++++ > qapi/block-core.json | 22 +- > 5 files changed, 673 insertions(+), 2 deletions(-) > create mode 100644 block/vxhs.c > > diff --git a/block/Makefile.objs b/block/Makefile.objs > index de96f8e..ea95530 100644 > --- a/block/Makefile.objs > +++ b/block/Makefile.objs > @@ -19,6 +19,7 @@ block-obj-$(CONFIG_LIBNFS) += nfs.o > block-obj-$(CONFIG_CURL) += curl.o > block-obj-$(CONFIG_RBD) += rbd.o > block-obj-$(CONFIG_GLUSTERFS) += gluster.o > +block-obj-$(CONFIG_VXHS) += vxhs.o > block-obj-$(CONFIG_LIBSSH2) += ssh.o > block-obj-y += accounting.o dirty-bitmap.o > block-obj-y += write-threshold.o > @@ -38,6 +39,7 @@ rbd.o-cflags := $(RBD_CFLAGS) > rbd.o-libs := $(RBD_LIBS) > gluster.o-cflags := $(GLUSTERFS_CFLAGS) > gluster.o-libs := $(GLUSTERFS_LIBS) > +vxhs.o-libs := $(VXHS_LIBS) > ssh.o-cflags := $(LIBSSH2_CFLAGS) > ssh.o-libs := $(LIBSSH2_LIBS) > block-obj-$(if $(CONFIG_BZIP2),m,n) += dmg-bz2.o > diff --git a/block/trace-events b/block/trace-events > index 0bc5c0a..7758ec3 100644 > --- a/block/trace-events > +++ b/block/trace-events > @@ -110,3 +110,20 @@ qed_aio_write_data(void *s, void *acb, int ret, uint64_t offset, size_t len) "s > qed_aio_write_prefill(void *s, void *acb, uint64_t start, size_t len, uint64_t offset) "s %p acb %p start %"PRIu64" len %zu offset %"PRIu64 > qed_aio_write_postfill(void *s, void *acb, uint64_t start, size_t len, uint64_t offset) "s %p acb %p start %"PRIu64" len %zu offset %"PRIu64 > qed_aio_write_main(void *s, void *acb, int ret, uint64_t offset, size_t len) "s %p acb %p ret %d offset %"PRIu64" len %zu" > + > +# block/vxhs.c > +vxhs_iio_callback(int error) "ctx is NULL: error %d" > +vxhs_iio_callback_chnfail(int err, int error) "QNIO channel failed, no i/o %d, %d" > +vxhs_iio_callback_unknwn(int opcode, int err) "unexpected opcode %d, errno %d" > +vxhs_aio_rw_invalid(int req) "Invalid I/O request iodir %d" > +vxhs_aio_rw_ioerr(char *guid, int iodir, uint64_t size, uint64_t off, void *acb, int ret, int err) "IO ERROR (vDisk %s) FOR : Read/Write = %d size = %lu offset = %lu ACB = %p. Error = %d, errno = %d" > +vxhs_get_vdisk_stat_err(char *guid, int ret, int err) "vDisk (%s) stat ioctl failed, ret = %d, errno = %d" > +vxhs_get_vdisk_stat(char *vdisk_guid, uint64_t vdisk_size) "vDisk %s stat ioctl returned size %lu" > +vxhs_complete_aio(void *acb, uint64_t ret) "aio failed acb %p ret %ld" > +vxhs_parse_uri_filename(const char *filename) "URI passed via bdrv_parse_filename %s" > +vxhs_open_vdiskid(const char *vdisk_id) "Opening vdisk-id %s" > +vxhs_open_hostinfo(char *of_vsa_addr, int port) "Adding host %s:%d to BDRVVXHSState" > +vxhs_open_iio_open(const char *host) "Failed to connect to storage agent on host %s" > +vxhs_parse_uri_hostinfo(char *host, int port) "Host: IP %s, Port %d" > +vxhs_close(char *vdisk_guid) "Closing vdisk %s" > +vxhs_get_creds(const char *cacert, const char *client_key, const char *client_cert) "cacert %s, client_key %s, client_cert %s" > diff --git a/block/vxhs.c b/block/vxhs.c > new file mode 100644 > index 0000000..b98b535 > --- /dev/null > +++ b/block/vxhs.c > @@ -0,0 +1,595 @@ > +/* > + * QEMU Block driver for Veritas HyperScale (VxHS) > + * > + * This work is licensed under the terms of the GNU GPL, version 2 or later. > + * See the COPYING file in the top-level directory. > + * > + */ > + > +#include "qemu/osdep.h" > +#include <qnio/qnio_api.h> > +#include <sys/param.h> > +#include "block/block_int.h" > +#include "qapi/qmp/qerror.h" > +#include "qapi/qmp/qdict.h" > +#include "qapi/qmp/qstring.h" > +#include "trace.h" > +#include "qemu/uri.h" > +#include "qapi/error.h" > +#include "qemu/uuid.h" > +#include "crypto/tlscredsx509.h" > + > +#define VXHS_OPT_FILENAME "filename" > +#define VXHS_OPT_VDISK_ID "vdisk-id" > +#define VXHS_OPT_SERVER "server" > +#define VXHS_OPT_HOST "host" > +#define VXHS_OPT_PORT "port" > + > +QemuUUID qemu_uuid __attribute__ ((weak)); > + I assume the qemu_uuid here can go away. > +static uint32_t vxhs_ref; > + > +typedef enum { > + VDISK_AIO_READ, > + VDISK_AIO_WRITE, > +} VDISKAIOCmd; > + > +/* > + * HyperScale AIO callbacks structure > + */ > +typedef struct VXHSAIOCB { > + BlockAIOCB common; > + int err; > + QEMUIOVector *qiov; > +} VXHSAIOCB; > + > +typedef struct VXHSvDiskHostsInfo { > + void *dev_handle; /* Device handle */ > + char *host; /* Host name or IP */ > + int port; /* Host's port number */ > +} VXHSvDiskHostsInfo; > + > +/* > + * Structure per vDisk maintained for state > + */ > +typedef struct BDRVVXHSState { > + VXHSvDiskHostsInfo vdisk_hostinfo; /* Per host info */ > + char *vdisk_guid; > + char *tlscredsid; /* tlscredsid */ > +} BDRVVXHSState; > + > +static void vxhs_complete_aio_bh(void *opaque) > +{ > + VXHSAIOCB *acb = opaque; > + BlockCompletionFunc *cb = acb->common.cb; > + void *cb_opaque = acb->common.opaque; > + int ret = 0; > + > + if (acb->err != 0) { > + trace_vxhs_complete_aio(acb, acb->err); > + ret = (-EIO); > + } > + > + qemu_aio_unref(acb); > + cb(cb_opaque, ret); > +} > + > +/* > + * Called from a libqnio thread > + */ > +static void vxhs_iio_callback(void *ctx, uint32_t opcode, uint32_t error) > +{ > + VXHSAIOCB *acb = NULL; > + > + switch (opcode) { > + case IRP_READ_REQUEST: > + case IRP_WRITE_REQUEST: > + > + /* > + * ctx is VXHSAIOCB* > + * ctx is NULL if error is QNIOERROR_CHANNEL_HUP > + */ > + if (ctx) { > + acb = ctx; > + } else { > + trace_vxhs_iio_callback(error); > + goto out; > + } > + > + if (error) { > + if (!acb->err) { > + acb->err = error; > + } > + trace_vxhs_iio_callback(error); > + } > + > + aio_bh_schedule_oneshot(bdrv_get_aio_context(acb->common.bs), > + vxhs_complete_aio_bh, acb); > + break; > + > + default: > + if (error == QNIOERROR_HUP) { > + /* > + * Channel failed, spontaneous notification, > + * not in response to I/O > + */ > + trace_vxhs_iio_callback_chnfail(error, errno); > + } else { > + trace_vxhs_iio_callback_unknwn(opcode, error); > + } > + break; > + } > +out: > + return; > +} > + > +static QemuOptsList runtime_opts = { > + .name = "vxhs", > + .head = QTAILQ_HEAD_INITIALIZER(runtime_opts.head), > + .desc = { > + { > + .name = VXHS_OPT_FILENAME, > + .type = QEMU_OPT_STRING, > + .help = "URI to the Veritas HyperScale image", > + }, > + { > + .name = VXHS_OPT_VDISK_ID, > + .type = QEMU_OPT_STRING, > + .help = "UUID of the VxHS vdisk", > + }, > + { > + .name = "tls-creds", > + .type = QEMU_OPT_STRING, > + .help = "ID of the TLS/SSL credentials to use", > + }, > + { /* end of list */ } > + }, > +}; > + > +static QemuOptsList runtime_tcp_opts = { > + .name = "vxhs_tcp", > + .head = QTAILQ_HEAD_INITIALIZER(runtime_tcp_opts.head), > + .desc = { > + { > + .name = VXHS_OPT_HOST, > + .type = QEMU_OPT_STRING, > + .help = "host address (ipv4 addresses)", > + }, > + { > + .name = VXHS_OPT_PORT, > + .type = QEMU_OPT_NUMBER, > + .help = "port number on which VxHSD is listening (default 9999)", > + .def_value_str = "9999" > + }, > + { /* end of list */ } > + }, > +}; > + > +/* > + * Parse the incoming URI and populate *options with the host information. > + * URI syntax has the limitation of supporting only one host info. > + * To pass multiple host information, use the JSON syntax. > + */ > +static int vxhs_parse_uri(const char *filename, QDict *options) > +{ > + URI *uri = NULL; > + char *hoststr, *portstr; > + char *port; > + int ret = 0; > + > + trace_vxhs_parse_uri_filename(filename); > + uri = uri_parse(filename); > + if (!uri || !uri->server || !uri->path) { > + uri_free(uri); > + return -EINVAL; > + } > + > + hoststr = g_strdup(VXHS_OPT_SERVER".host"); > + qdict_put(options, hoststr, qstring_from_str(uri->server)); > + g_free(hoststr); > + > + portstr = g_strdup(VXHS_OPT_SERVER".port"); > + if (uri->port) { > + port = g_strdup_printf("%d", uri->port); > + qdict_put(options, portstr, qstring_from_str(port)); > + g_free(port); > + } > + g_free(portstr); > + > + if (strstr(uri->path, "vxhs") == NULL) { > + qdict_put(options, "vdisk-id", qstring_from_str(uri->path)); > + } > + > + trace_vxhs_parse_uri_hostinfo(uri->server, uri->port); > + uri_free(uri); > + > + return ret; > +} > + > +static void vxhs_parse_filename(const char *filename, QDict *options, > + Error **errp) > +{ > + if (qdict_haskey(options, "vdisk-id") || qdict_haskey(options, "server")) { > + error_setg(errp, "vdisk-id/server and a file name may not be specified " > + "at the same time"); > + return; > + } > + > + if (strstr(filename, "://")) { > + int ret = vxhs_parse_uri(filename, options); > + if (ret < 0) { > + error_setg(errp, "Invalid URI. URI should be of the form " > + " vxhs://<host_ip>:<port>/<vdisk-id>"); > + } > + } > +} > + > +static int vxhs_init_and_ref(void) > +{ > + if (vxhs_ref == 0) { I apologize, as this is my fault for what I recommended before. But it'd be best to change this to if (vxhs_ref++ == 0), so that refcnt is always incremented. > + char out[UUID_FMT_LEN + 1]; > + if (qemu_uuid_is_null(&qemu_uuid)) { > + if (iio_init(QNIO_VERSION, vxhs_iio_callback, NULL)) { > + return -ENODEV; > + } > + } else { > + qemu_uuid_unparse(&qemu_uuid, out); > + if (iio_init(QNIO_VERSION, vxhs_iio_callback, out)) { > + return -ENODEV; > + } > + } All of the above can be reduced to just: if (iio_init(QNIO_VERSION, vxhs_iio_callback, NULL)) { return -ENODEV; } Looking at the libqnio code, the instance paramter to iio_init() looks to be vestigial, and just passed around internally but never used. Best to just get rid of it then, and drop the instance parameter altogether. > + } > + vxhs_ref++; (and delete this line if incrementing above). > + return 0; > +} > + > +static void vxhs_unref(void) > +{ > + if (vxhs_ref && --vxhs_ref == 0) { The short-circuit check for vxhs_ref can go away here with the changes I recommended to vxhs_init_and_ref(), because vxhs_ref inc and dec are always matched up. > + iio_fini(); > + } > +} > + > +static void vxhs_get_tls_creds(const char *id, char **cacert, > + char **key, char **cert, Error **errp) > +{ > + Object *obj; > + QCryptoTLSCreds *creds = NULL; > + QCryptoTLSCredsX509 *creds_x509 = NULL; Neither of these need to be initialized. > + > + obj = object_resolve_path_component( > + object_get_objects_root(), id); > + > + if (!obj) { > + error_setg(errp, "No TLS credentials with id '%s'", > + id); > + return; > + } > + > + creds_x509 = (QCryptoTLSCredsX509 *) > + object_dynamic_cast(obj, TYPE_QCRYPTO_TLS_CREDS_X509); > + > + if (!creds_x509) { > + error_setg(errp, "Object with id '%s' is not TLS credentials", > + id); > + return; > + } > + > + creds = &creds_x509->parent_obj; > + > + if (creds->endpoint != QCRYPTO_TLS_CREDS_ENDPOINT_CLIENT) { > + error_setg(errp, > + "Expecting TLS credentials with a client endpoint"); > + return; > + } > + > + /* > + * Get the cacert, client_cert and client_key file names. > + */ > + if (!creds->dir) { > + error_setg(errp, "TLS object missing 'dir' property value"); > + return; > + } > + > + *cacert = g_strdup_printf("%s/%s", creds->dir, > + QCRYPTO_TLS_CREDS_X509_CA_CERT); > + *cert = g_strdup_printf("%s/%s", creds->dir, > + QCRYPTO_TLS_CREDS_X509_CLIENT_CERT); > + *key = g_strdup_printf("%s/%s", creds->dir, > + QCRYPTO_TLS_CREDS_X509_CLIENT_KEY); > +} > + > +static int vxhs_open(BlockDriverState *bs, QDict *options, > + int bdrv_flags, Error **errp) > +{ > + BDRVVXHSState *s = bs->opaque; > + void *dev_handlep = NULL; dev_handlep does not need to be initialized. > + QDict *backing_options = NULL; > + QemuOpts *opts, *tcp_opts; > + char *of_vsa_addr = NULL; > + Error *local_err = NULL; > + const char *vdisk_id_opt; > + const char *server_host_opt; > + char *str = NULL; > + int ret = 0; > + char *cacert = NULL; > + char *client_key = NULL; > + char *client_cert = NULL; > + > + ret = vxhs_init_and_ref(); > + if (ret < 0) { > + return ret; > + } > + > + /* Create opts info from runtime_opts and runtime_tcp_opts list */ > + opts = qemu_opts_create(&runtime_opts, NULL, 0, &error_abort); > + tcp_opts = qemu_opts_create(&runtime_tcp_opts, NULL, 0, &error_abort); > + > + qemu_opts_absorb_qdict(opts, options, &local_err); > + if (local_err) { > + ret = -EINVAL; > + goto out; > + } > + > + /* vdisk-id is the disk UUID */ > + vdisk_id_opt = qemu_opt_get(opts, VXHS_OPT_VDISK_ID); > + if (!vdisk_id_opt) { > + error_setg(&local_err, QERR_MISSING_PARAMETER, VXHS_OPT_VDISK_ID); > + ret = -EINVAL; > + goto out; > + } > + > + /* vdisk-id may contain a leading '/' */ > + if (strlen(vdisk_id_opt) > UUID_FMT_LEN + 1) { > + error_setg(&local_err, "vdisk-id cannot be more than %d characters", > + UUID_FMT_LEN); > + ret = -EINVAL; > + goto out; > + } > + > + s->vdisk_guid = g_strdup(vdisk_id_opt); > + trace_vxhs_open_vdiskid(vdisk_id_opt); > + > + /* get the 'server.' arguments */ > + str = g_strdup_printf(VXHS_OPT_SERVER"."); > + qdict_extract_subqdict(options, &backing_options, str); > + > + qemu_opts_absorb_qdict(tcp_opts, backing_options, &local_err); > + if (local_err != NULL) { > + ret = -EINVAL; > + goto out; > + } > + > + server_host_opt = qemu_opt_get(tcp_opts, VXHS_OPT_HOST); > + if (!server_host_opt) { > + error_setg(&local_err, QERR_MISSING_PARAMETER, > + VXHS_OPT_SERVER"."VXHS_OPT_HOST); > + ret = -EINVAL; > + goto out; > + } > + > + if (strlen(server_host_opt) > MAXHOSTNAMELEN) { > + error_setg(&local_err, "server.host cannot be more than %d characters", > + MAXHOSTNAMELEN); > + ret = -EINVAL; > + goto out; > + } > + > + /* check if we got tls-creds via the --object argument */ > + s->tlscredsid = g_strdup(qemu_opt_get(opts, "tls-creds")); > + if (s->tlscredsid) { > + vxhs_get_tls_creds(s->tlscredsid, &cacert, &client_key, > + &client_cert, &local_err); > + if (local_err != NULL) { > + ret = -EINVAL; > + goto out; > + } > + trace_vxhs_get_creds(cacert, client_key, client_cert); > + } > + > + s->vdisk_hostinfo.host = g_strdup(server_host_opt); > + s->vdisk_hostinfo.port = g_ascii_strtoll(qemu_opt_get(tcp_opts, > + VXHS_OPT_PORT), > + NULL, 0); > + > + trace_vxhs_open_hostinfo(s->vdisk_hostinfo.host, > + s->vdisk_hostinfo.port); > + > + of_vsa_addr = g_strdup_printf("of://%s:%d", > + s->vdisk_hostinfo.host, > + s->vdisk_hostinfo.port); > + > + /* > + * Open qnio channel to storage agent if not opened before > + */ > + dev_handlep = iio_open(of_vsa_addr, s->vdisk_guid, 0, > + cacert, client_key, client_cert); > + if (dev_handlep == NULL) { > + trace_vxhs_open_iio_open(of_vsa_addr); > + ret = -ENODEV; > + goto out; > + } > + s->vdisk_hostinfo.dev_handle = dev_handlep; > + > +out: > + g_free(str); > + g_free(of_vsa_addr); > + QDECREF(backing_options); > + qemu_opts_del(tcp_opts); > + qemu_opts_del(opts); > + g_free(cacert); > + g_free(client_key); > + g_free(client_cert); > + > + if (ret < 0) { > + vxhs_unref(); > + error_propagate(errp, local_err); > + g_free(s->vdisk_hostinfo.host); > + g_free(s->vdisk_guid); > + g_free(s->tlscredsid); > + s->vdisk_guid = NULL; > + errno = -ret; > + } > + > + return ret; > +} > + > +static const AIOCBInfo vxhs_aiocb_info = { > + .aiocb_size = sizeof(VXHSAIOCB) > +}; > + > +/* > + * This allocates QEMU-VXHS callback for each IO > + * and is passed to QNIO. When QNIO completes the work, > + * it will be passed back through the callback. > + */ > +static BlockAIOCB *vxhs_aio_rw(BlockDriverState *bs, int64_t sector_num, > + QEMUIOVector *qiov, int nb_sectors, > + BlockCompletionFunc *cb, void *opaque, > + VDISKAIOCmd iodir) > +{ > + VXHSAIOCB *acb = NULL; > + BDRVVXHSState *s = bs->opaque; > + size_t size; > + uint64_t offset; > + int iio_flags = 0; > + int ret = 0; > + void *dev_handle = s->vdisk_hostinfo.dev_handle; > + > + offset = sector_num * BDRV_SECTOR_SIZE; > + size = nb_sectors * BDRV_SECTOR_SIZE; > + acb = qemu_aio_get(&vxhs_aiocb_info, bs, cb, opaque); > + > + /* > + * Initialize VXHSAIOCB. > + */ > + acb->err = 0; > + acb->qiov = qiov; > + > + iio_flags = IIO_FLAG_ASYNC; > + > + switch (iodir) { > + case VDISK_AIO_WRITE: > + ret = iio_writev(dev_handle, acb, qiov->iov, qiov->niov, > + offset, (uint64_t)size, iio_flags); > + break; > + case VDISK_AIO_READ: > + ret = iio_readv(dev_handle, acb, qiov->iov, qiov->niov, > + offset, (uint64_t)size, iio_flags); > + break; > + default: > + trace_vxhs_aio_rw_invalid(iodir); > + goto errout; > + } > + > + if (ret != 0) { > + trace_vxhs_aio_rw_ioerr(s->vdisk_guid, iodir, size, offset, > + acb, ret, errno); > + goto errout; > + } > + return &acb->common; > + > +errout: > + qemu_aio_unref(acb); > + return NULL; > +} > + > +static BlockAIOCB *vxhs_aio_readv(BlockDriverState *bs, > + int64_t sector_num, QEMUIOVector *qiov, > + int nb_sectors, > + BlockCompletionFunc *cb, void *opaque) > +{ > + return vxhs_aio_rw(bs, sector_num, qiov, nb_sectors, cb, > + opaque, VDISK_AIO_READ); > +} > + > +static BlockAIOCB *vxhs_aio_writev(BlockDriverState *bs, > + int64_t sector_num, QEMUIOVector *qiov, > + int nb_sectors, > + BlockCompletionFunc *cb, void *opaque) > +{ > + return vxhs_aio_rw(bs, sector_num, qiov, nb_sectors, > + cb, opaque, VDISK_AIO_WRITE); > +} > + > +static void vxhs_close(BlockDriverState *bs) > +{ > + BDRVVXHSState *s = bs->opaque; > + > + trace_vxhs_close(s->vdisk_guid); > + > + g_free(s->vdisk_guid); > + s->vdisk_guid = NULL; > + > + /* > + * Close vDisk device > + */ > + if (s->vdisk_hostinfo.dev_handle) { > + iio_close(s->vdisk_hostinfo.dev_handle); > + s->vdisk_hostinfo.dev_handle = NULL; > + } > + > + vxhs_unref(); > + > + /* > + * Free the dynamically allocated host string etc > + */ > + g_free(s->vdisk_hostinfo.host); > + g_free(s->tlscredsid); > + s->tlscredsid = NULL; > + s->vdisk_hostinfo.host = NULL; > + s->vdisk_hostinfo.port = 0; > +} > + > +static int64_t vxhs_get_vdisk_stat(BDRVVXHSState *s) > +{ > + int64_t vdisk_size = -1; > + int ret = 0; > + void *dev_handle = s->vdisk_hostinfo.dev_handle; > + > + ret = iio_ioctl(dev_handle, IOR_VDISK_STAT, &vdisk_size, 0); > + if (ret < 0) { > + trace_vxhs_get_vdisk_stat_err(s->vdisk_guid, ret, errno); > + return -EIO; > + } > + > + trace_vxhs_get_vdisk_stat(s->vdisk_guid, vdisk_size); > + return vdisk_size; > +} > + > +/* > + * Returns the size of vDisk in bytes. This is required > + * by QEMU block upper block layer so that it is visible > + * to guest. > + */ > +static int64_t vxhs_getlength(BlockDriverState *bs) > +{ > + BDRVVXHSState *s = bs->opaque; > + int64_t vdisk_size; > + > + vdisk_size = vxhs_get_vdisk_stat(s); > + if (vdisk_size < 0) { > + return -EIO; > + } > + > + return vdisk_size; > +} > + > +static BlockDriver bdrv_vxhs = { > + .format_name = "vxhs", > + .protocol_name = "vxhs", > + .instance_size = sizeof(BDRVVXHSState), > + .bdrv_file_open = vxhs_open, > + .bdrv_parse_filename = vxhs_parse_filename, > + .bdrv_close = vxhs_close, > + .bdrv_getlength = vxhs_getlength, > + .bdrv_aio_readv = vxhs_aio_readv, > + .bdrv_aio_writev = vxhs_aio_writev, > +}; > + > +static void bdrv_vxhs_init(void) > +{ > + bdrv_register(&bdrv_vxhs); > +} > + > +block_init(bdrv_vxhs_init); > diff --git a/configure b/configure > index d1ce33b..8f4a7a3 100755 > --- a/configure > +++ b/configure > @@ -320,6 +320,7 @@ numa="" > tcmalloc="no" > jemalloc="no" > replication="yes" > +vxhs="" > > supported_cpu="no" > supported_os="no" > @@ -1178,6 +1179,10 @@ for opt do > ;; > --enable-replication) replication="yes" > ;; > + --disable-vxhs) vxhs="no" > + ;; > + --enable-vxhs) vxhs="yes" > + ;; > *) > echo "ERROR: unknown option $opt" > echo "Try '$0 --help' for more information" > @@ -1422,6 +1427,7 @@ disabled with --disable-FEATURE, default is enabled if available: > xfsctl xfsctl support > qom-cast-debug cast debugging support > tools build qemu-io, qemu-nbd and qemu-image tools > + vxhs Veritas HyperScale vDisk backend support > > NOTE: The object files are built at the place where configure is launched > EOF > @@ -4757,6 +4763,33 @@ if compile_prog "" "" ; then > fi > > ########################################## > +# Veritas HyperScale block driver VxHS > +# Check if libvxhs is installed > + > +if test "$vxhs" != "no" ; then > + cat > $TMPC <<EOF > +#include <stdint.h> > +#include <qnio/qnio_api.h> > + > +void *vxhs_callback; > + > +int main(void) { > + iio_init(QNIO_VERSION, vxhs_callback, (void *)0); > + return 0; > +} > +EOF > + vxhs_libs="-lvxhs -lssl" > + if compile_prog "" "$vxhs_libs" ; then > + vxhs=yes > + else > + if test "$vxhs" = "yes" ; then > + feature_not_found "vxhs block device" "Install libvxhs See github" > + fi > + vxhs=no > + fi > +fi > + > +########################################## > # End of CC checks > # After here, no more $cc or $ld runs > > @@ -5122,6 +5155,7 @@ echo "tcmalloc support $tcmalloc" > echo "jemalloc support $jemalloc" > echo "avx2 optimization $avx2_opt" > echo "replication support $replication" > +echo "VxHS block device $vxhs" > > if test "$sdl_too_old" = "yes"; then > echo "-> Your SDL version is too old - please upgrade to have SDL support" > @@ -5761,6 +5795,11 @@ if test "$pthread_setname_np" = "yes" ; then > echo "CONFIG_PTHREAD_SETNAME_NP=y" >> $config_host_mak > fi > > +if test "$vxhs" = "yes" ; then > + echo "CONFIG_VXHS=y" >> $config_host_mak > + echo "VXHS_LIBS=$vxhs_libs" >> $config_host_mak > +fi > + > if test "$tcg_interpreter" = "yes"; then > QEMU_INCLUDES="-I\$(SRC_PATH)/tcg/tci $QEMU_INCLUDES" > elif test "$ARCH" = "sparc64" ; then > diff --git a/qapi/block-core.json b/qapi/block-core.json > index 0f132fc..54cb7c6 100644 > --- a/qapi/block-core.json > +++ b/qapi/block-core.json > @@ -2118,6 +2118,7 @@ > # @iscsi: Since 2.9 > # @rbd: Since 2.9 > # @sheepdog: Since 2.9 > +# @vxhs: Since 2.10 > # > # Since: 2.0 > ## > @@ -2127,7 +2128,7 @@ > 'host_device', 'http', 'https', 'iscsi', 'luks', 'nbd', 'nfs', > 'null-aio', 'null-co', 'parallels', 'qcow', 'qcow2', 'qed', > 'quorum', 'raw', 'rbd', 'replication', 'sheepdog', 'ssh', > - 'vdi', 'vhdx', 'vmdk', 'vpc', 'vvfat' ] } > + 'vdi', 'vhdx', 'vmdk', 'vpc', 'vvfat', 'vxhs' ] } > > ## > # @BlockdevOptionsFile: > @@ -2820,6 +2821,22 @@ > 'data': { '*offset': 'int', '*size': 'int' } } > > ## > +# @BlockdevOptionsVxHS: > +# > +# Driver specific block device options for VxHS > +# > +# @vdisk-id: UUID of VxHS volume > +# @server: vxhs server IP, port > +# @tls-creds: TLS credentials ID > +# > +# Since: 2.10 > +## > +{ 'struct': 'BlockdevOptionsVxHS', > + 'data': { 'vdisk-id': 'str', > + 'server': 'InetSocketAddress', > + '*tls-creds': 'str' } } > + > +## > # @BlockdevOptions: > # > # Options for creating a block device. Many options are available for all > @@ -2881,7 +2898,8 @@ > 'vhdx': 'BlockdevOptionsGenericFormat', > 'vmdk': 'BlockdevOptionsGenericCOWFormat', > 'vpc': 'BlockdevOptionsGenericFormat', > - 'vvfat': 'BlockdevOptionsVVFAT' > + 'vvfat': 'BlockdevOptionsVVFAT', > + 'vxhs': 'BlockdevOptionsVxHS' > } } > > ## > -- > 2.5.5 >
Hi Jeff, Will incorporate all your review comments with two small dependent changes as follows: @@ -302,14 +286,14 @@ static int vxhs_open(BlockDriverState *bs, QDict *options, int bdrv_flags, Error **errp) { BDRVVXHSState *s = bs->opaque; - void *dev_handlep = NULL; + void *dev_handlep; QDict *backing_options = NULL; - QemuOpts *opts, *tcp_opts; <== These two have to be init to NULL because we potentially gfree them before assignment.. + QemuOpts *opts = NULL; + QemuOpts *tcp_opts = NULL; char *of_vsa_addr = NULL; Error *local_err = NULL; const char *vdisk_id_opt; const char *server_host_opt; - char *str = NULL; int ret = 0; char *cacert = NULL; char *client_key = NULL; @@ -317,7 +301,8 @@ static int vxhs_open(BlockDriverState *bs, QDict *options, ret = vxhs_init_and_ref(); if (ret < 0) { - return ret; + ret = -EINVAL; + goto out; <== have to call vxhs_unref() in case of an error to decrement the refcount.. } Would it help if I send out a diff over the last patch (vxhs.c only) after incorporating changes from all three reviews? I can then send v11 series if everyone okays the diff? Regards, Ashish On Tue, Mar 28, 2017 at 10:03 AM, Jeff Cody <jcody@redhat.com> wrote: > On Sun, Mar 26, 2017 at 07:50:35PM -0700, Ashish Mittal wrote: >> Source code for the qnio library that this code loads can be downloaded from: >> https://github.com/VeritasHyperScale/libqnio.git >> >> Sample command line using JSON syntax: >> ./x86_64-softmmu/qemu-system-x86_64 -name instance-00000008 -S -vnc 0.0.0.0:0 >> -k en-us -vga cirrus -device virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x5 >> -msg timestamp=on >> 'json:{"driver":"vxhs","vdisk-id":"c3e9095a-a5ee-4dce-afeb-2a59fb387410", >> "server":{"host":"172.172.17.4","port":"9999"}}' >> >> Sample command line using URI syntax: >> qemu-img convert -f raw -O raw -n >> /var/lib/nova/instances/_base/0c5eacd5ebea5ed914b6a3e7b18f1ce734c386ad >> vxhs://192.168.0.1:9999/c6718f6b-0401-441d-a8c3-1f0064d75ee0 >> >> Sample command line using TLS credentials (run in secure mode): >> ./qemu-io --object >> tls-creds-x509,id=tls0,dir=/etc/pki/qemu/vxhs,endpoint=client -c 'read >> -v 66000 2.5k' 'json:{"server.host": "127.0.0.1", "server.port": "9999", >> "vdisk-id": "/test.raw", "driver": "vxhs", "tls-creds":"tls0"}' >> >> Signed-off-by: Ashish Mittal <Ashish.Mittal@veritas.com> >> --- >> >> v10 changelog: >> (1) Implemented accepting TLS creds per block device via the CLI >> (see 3rd e.g in commit log). Corresponding changes made to the >> libqnio library. >> (2) iio_open() changed to accept TLS creds and use these internally >> to set up SSL connections. >> (3) Got rid of hard-coded VXHS_UUID_DEF. qemu_uuid is no longer used >> for authentication in any way. >> (4) Removed unnecessary qdict_del(backing_options, str). >> (5) Added '*tls-creds' to BlockdevOptionsVxHS. >> >> v9 changelog: >> (1) Fixes for all the review comments from v8. I have left the definition >> of VXHS_UUID_DEF unchanged pending a better suggestion. >> (2) qcow2 tests now pass on the vxhs test server. >> (3) Packaging changes for libvxhs will be checked in to the git repo soon. >> (4) I have not moved extern QemuUUID qemu_uuid to a separate header file. >> >> v8 changelog: >> (1) Security implementation for libqnio present in branch 'securify'. >> Please use 'securify' branch for building libqnio and testing >> with this patch. >> (2) Renamed libqnio to libvxhs. >> (3) Pass instance ID to libvxhs for SSL authentication. >> >> v7 changelog: >> (1) IO failover code has moved out to the libqnio library. >> (2) Fixes for issues reported by Stefan on v6. >> (3) Incorporated the QEMUBH patch provided by Stefan. >> This is a replacement for the pipe mechanism used earlier. >> (4) Fixes to the buffer overflows reported in libqnio. >> (5) Input validations in vxhs.c to prevent any buffer overflows for >> arguments passed to libqnio. >> >> v6 changelog: >> (1) Added qemu-iotests for VxHS as a new patch in the series. >> (2) Replaced release version from 2.8 to 2.9 in block-core.json. >> >> v5 changelog: >> (1) Incorporated v4 review comments. >> >> v4 changelog: >> (1) Incorporated v3 review comments on QAPI changes. >> (2) Added refcounting for device open/close. >> Free library resources on last device close. >> >> v3 changelog: >> (1) Added QAPI schema for the VxHS driver. >> >> v2 changelog: >> (1) Changes done in response to v1 comments. >> >> block/Makefile.objs | 2 + >> block/trace-events | 17 ++ >> block/vxhs.c | 595 +++++++++++++++++++++++++++++++++++++++++++++++++++ >> configure | 39 ++++ >> qapi/block-core.json | 22 +- >> 5 files changed, 673 insertions(+), 2 deletions(-) >> create mode 100644 block/vxhs.c >> >> diff --git a/block/Makefile.objs b/block/Makefile.objs >> index de96f8e..ea95530 100644 >> --- a/block/Makefile.objs >> +++ b/block/Makefile.objs >> @@ -19,6 +19,7 @@ block-obj-$(CONFIG_LIBNFS) += nfs.o >> block-obj-$(CONFIG_CURL) += curl.o >> block-obj-$(CONFIG_RBD) += rbd.o >> block-obj-$(CONFIG_GLUSTERFS) += gluster.o >> +block-obj-$(CONFIG_VXHS) += vxhs.o >> block-obj-$(CONFIG_LIBSSH2) += ssh.o >> block-obj-y += accounting.o dirty-bitmap.o >> block-obj-y += write-threshold.o >> @@ -38,6 +39,7 @@ rbd.o-cflags := $(RBD_CFLAGS) >> rbd.o-libs := $(RBD_LIBS) >> gluster.o-cflags := $(GLUSTERFS_CFLAGS) >> gluster.o-libs := $(GLUSTERFS_LIBS) >> +vxhs.o-libs := $(VXHS_LIBS) >> ssh.o-cflags := $(LIBSSH2_CFLAGS) >> ssh.o-libs := $(LIBSSH2_LIBS) >> block-obj-$(if $(CONFIG_BZIP2),m,n) += dmg-bz2.o >> diff --git a/block/trace-events b/block/trace-events >> index 0bc5c0a..7758ec3 100644 >> --- a/block/trace-events >> +++ b/block/trace-events >> @@ -110,3 +110,20 @@ qed_aio_write_data(void *s, void *acb, int ret, uint64_t offset, size_t len) "s >> qed_aio_write_prefill(void *s, void *acb, uint64_t start, size_t len, uint64_t offset) "s %p acb %p start %"PRIu64" len %zu offset %"PRIu64 >> qed_aio_write_postfill(void *s, void *acb, uint64_t start, size_t len, uint64_t offset) "s %p acb %p start %"PRIu64" len %zu offset %"PRIu64 >> qed_aio_write_main(void *s, void *acb, int ret, uint64_t offset, size_t len) "s %p acb %p ret %d offset %"PRIu64" len %zu" >> + >> +# block/vxhs.c >> +vxhs_iio_callback(int error) "ctx is NULL: error %d" >> +vxhs_iio_callback_chnfail(int err, int error) "QNIO channel failed, no i/o %d, %d" >> +vxhs_iio_callback_unknwn(int opcode, int err) "unexpected opcode %d, errno %d" >> +vxhs_aio_rw_invalid(int req) "Invalid I/O request iodir %d" >> +vxhs_aio_rw_ioerr(char *guid, int iodir, uint64_t size, uint64_t off, void *acb, int ret, int err) "IO ERROR (vDisk %s) FOR : Read/Write = %d size = %lu offset = %lu ACB = %p. Error = %d, errno = %d" >> +vxhs_get_vdisk_stat_err(char *guid, int ret, int err) "vDisk (%s) stat ioctl failed, ret = %d, errno = %d" >> +vxhs_get_vdisk_stat(char *vdisk_guid, uint64_t vdisk_size) "vDisk %s stat ioctl returned size %lu" >> +vxhs_complete_aio(void *acb, uint64_t ret) "aio failed acb %p ret %ld" >> +vxhs_parse_uri_filename(const char *filename) "URI passed via bdrv_parse_filename %s" >> +vxhs_open_vdiskid(const char *vdisk_id) "Opening vdisk-id %s" >> +vxhs_open_hostinfo(char *of_vsa_addr, int port) "Adding host %s:%d to BDRVVXHSState" >> +vxhs_open_iio_open(const char *host) "Failed to connect to storage agent on host %s" >> +vxhs_parse_uri_hostinfo(char *host, int port) "Host: IP %s, Port %d" >> +vxhs_close(char *vdisk_guid) "Closing vdisk %s" >> +vxhs_get_creds(const char *cacert, const char *client_key, const char *client_cert) "cacert %s, client_key %s, client_cert %s" >> diff --git a/block/vxhs.c b/block/vxhs.c >> new file mode 100644 >> index 0000000..b98b535 >> --- /dev/null >> +++ b/block/vxhs.c >> @@ -0,0 +1,595 @@ >> +/* >> + * QEMU Block driver for Veritas HyperScale (VxHS) >> + * >> + * This work is licensed under the terms of the GNU GPL, version 2 or later. >> + * See the COPYING file in the top-level directory. >> + * >> + */ >> + >> +#include "qemu/osdep.h" >> +#include <qnio/qnio_api.h> >> +#include <sys/param.h> >> +#include "block/block_int.h" >> +#include "qapi/qmp/qerror.h" >> +#include "qapi/qmp/qdict.h" >> +#include "qapi/qmp/qstring.h" >> +#include "trace.h" >> +#include "qemu/uri.h" >> +#include "qapi/error.h" >> +#include "qemu/uuid.h" >> +#include "crypto/tlscredsx509.h" >> + >> +#define VXHS_OPT_FILENAME "filename" >> +#define VXHS_OPT_VDISK_ID "vdisk-id" >> +#define VXHS_OPT_SERVER "server" >> +#define VXHS_OPT_HOST "host" >> +#define VXHS_OPT_PORT "port" >> + >> +QemuUUID qemu_uuid __attribute__ ((weak)); >> + > > I assume the qemu_uuid here can go away. > >> +static uint32_t vxhs_ref; >> + >> +typedef enum { >> + VDISK_AIO_READ, >> + VDISK_AIO_WRITE, >> +} VDISKAIOCmd; >> + >> +/* >> + * HyperScale AIO callbacks structure >> + */ >> +typedef struct VXHSAIOCB { >> + BlockAIOCB common; >> + int err; >> + QEMUIOVector *qiov; >> +} VXHSAIOCB; >> + >> +typedef struct VXHSvDiskHostsInfo { >> + void *dev_handle; /* Device handle */ >> + char *host; /* Host name or IP */ >> + int port; /* Host's port number */ >> +} VXHSvDiskHostsInfo; >> + >> +/* >> + * Structure per vDisk maintained for state >> + */ >> +typedef struct BDRVVXHSState { >> + VXHSvDiskHostsInfo vdisk_hostinfo; /* Per host info */ >> + char *vdisk_guid; >> + char *tlscredsid; /* tlscredsid */ >> +} BDRVVXHSState; >> + >> +static void vxhs_complete_aio_bh(void *opaque) >> +{ >> + VXHSAIOCB *acb = opaque; >> + BlockCompletionFunc *cb = acb->common.cb; >> + void *cb_opaque = acb->common.opaque; >> + int ret = 0; >> + >> + if (acb->err != 0) { >> + trace_vxhs_complete_aio(acb, acb->err); >> + ret = (-EIO); >> + } >> + >> + qemu_aio_unref(acb); >> + cb(cb_opaque, ret); >> +} >> + >> +/* >> + * Called from a libqnio thread >> + */ >> +static void vxhs_iio_callback(void *ctx, uint32_t opcode, uint32_t error) >> +{ >> + VXHSAIOCB *acb = NULL; >> + >> + switch (opcode) { >> + case IRP_READ_REQUEST: >> + case IRP_WRITE_REQUEST: >> + >> + /* >> + * ctx is VXHSAIOCB* >> + * ctx is NULL if error is QNIOERROR_CHANNEL_HUP >> + */ >> + if (ctx) { >> + acb = ctx; >> + } else { >> + trace_vxhs_iio_callback(error); >> + goto out; >> + } >> + >> + if (error) { >> + if (!acb->err) { >> + acb->err = error; >> + } >> + trace_vxhs_iio_callback(error); >> + } >> + >> + aio_bh_schedule_oneshot(bdrv_get_aio_context(acb->common.bs), >> + vxhs_complete_aio_bh, acb); >> + break; >> + >> + default: >> + if (error == QNIOERROR_HUP) { >> + /* >> + * Channel failed, spontaneous notification, >> + * not in response to I/O >> + */ >> + trace_vxhs_iio_callback_chnfail(error, errno); >> + } else { >> + trace_vxhs_iio_callback_unknwn(opcode, error); >> + } >> + break; >> + } >> +out: >> + return; >> +} >> + >> +static QemuOptsList runtime_opts = { >> + .name = "vxhs", >> + .head = QTAILQ_HEAD_INITIALIZER(runtime_opts.head), >> + .desc = { >> + { >> + .name = VXHS_OPT_FILENAME, >> + .type = QEMU_OPT_STRING, >> + .help = "URI to the Veritas HyperScale image", >> + }, >> + { >> + .name = VXHS_OPT_VDISK_ID, >> + .type = QEMU_OPT_STRING, >> + .help = "UUID of the VxHS vdisk", >> + }, >> + { >> + .name = "tls-creds", >> + .type = QEMU_OPT_STRING, >> + .help = "ID of the TLS/SSL credentials to use", >> + }, >> + { /* end of list */ } >> + }, >> +}; >> + >> +static QemuOptsList runtime_tcp_opts = { >> + .name = "vxhs_tcp", >> + .head = QTAILQ_HEAD_INITIALIZER(runtime_tcp_opts.head), >> + .desc = { >> + { >> + .name = VXHS_OPT_HOST, >> + .type = QEMU_OPT_STRING, >> + .help = "host address (ipv4 addresses)", >> + }, >> + { >> + .name = VXHS_OPT_PORT, >> + .type = QEMU_OPT_NUMBER, >> + .help = "port number on which VxHSD is listening (default 9999)", >> + .def_value_str = "9999" >> + }, >> + { /* end of list */ } >> + }, >> +}; >> + >> +/* >> + * Parse the incoming URI and populate *options with the host information. >> + * URI syntax has the limitation of supporting only one host info. >> + * To pass multiple host information, use the JSON syntax. >> + */ >> +static int vxhs_parse_uri(const char *filename, QDict *options) >> +{ >> + URI *uri = NULL; >> + char *hoststr, *portstr; >> + char *port; >> + int ret = 0; >> + >> + trace_vxhs_parse_uri_filename(filename); >> + uri = uri_parse(filename); >> + if (!uri || !uri->server || !uri->path) { >> + uri_free(uri); >> + return -EINVAL; >> + } >> + >> + hoststr = g_strdup(VXHS_OPT_SERVER".host"); >> + qdict_put(options, hoststr, qstring_from_str(uri->server)); >> + g_free(hoststr); >> + >> + portstr = g_strdup(VXHS_OPT_SERVER".port"); >> + if (uri->port) { >> + port = g_strdup_printf("%d", uri->port); >> + qdict_put(options, portstr, qstring_from_str(port)); >> + g_free(port); >> + } >> + g_free(portstr); >> + >> + if (strstr(uri->path, "vxhs") == NULL) { >> + qdict_put(options, "vdisk-id", qstring_from_str(uri->path)); >> + } >> + >> + trace_vxhs_parse_uri_hostinfo(uri->server, uri->port); >> + uri_free(uri); >> + >> + return ret; >> +} >> + >> +static void vxhs_parse_filename(const char *filename, QDict *options, >> + Error **errp) >> +{ >> + if (qdict_haskey(options, "vdisk-id") || qdict_haskey(options, "server")) { >> + error_setg(errp, "vdisk-id/server and a file name may not be specified " >> + "at the same time"); >> + return; >> + } >> + >> + if (strstr(filename, "://")) { >> + int ret = vxhs_parse_uri(filename, options); >> + if (ret < 0) { >> + error_setg(errp, "Invalid URI. URI should be of the form " >> + " vxhs://<host_ip>:<port>/<vdisk-id>"); >> + } >> + } >> +} >> + >> +static int vxhs_init_and_ref(void) >> +{ >> + if (vxhs_ref == 0) { > > I apologize, as this is my fault for what I recommended before. But it'd be > best to change this to if (vxhs_ref++ == 0), so that refcnt is always > incremented. > >> + char out[UUID_FMT_LEN + 1]; >> + if (qemu_uuid_is_null(&qemu_uuid)) { >> + if (iio_init(QNIO_VERSION, vxhs_iio_callback, NULL)) { >> + return -ENODEV; >> + } >> + } else { >> + qemu_uuid_unparse(&qemu_uuid, out); >> + if (iio_init(QNIO_VERSION, vxhs_iio_callback, out)) { >> + return -ENODEV; >> + } >> + } > > All of the above can be reduced to just: > > if (iio_init(QNIO_VERSION, vxhs_iio_callback, NULL)) { > return -ENODEV; > } > > Looking at the libqnio code, the instance paramter to iio_init() looks to be > vestigial, and just passed around internally but never used. > > Best to just get rid of it then, and drop the instance parameter altogether. > >> + } >> + vxhs_ref++; > > (and delete this line if incrementing above). > >> + return 0; >> +} >> + >> +static void vxhs_unref(void) >> +{ >> + if (vxhs_ref && --vxhs_ref == 0) { > > The short-circuit check for vxhs_ref can go away here with the changes I > recommended to vxhs_init_and_ref(), because vxhs_ref inc and dec are always > matched up. > >> + iio_fini(); >> + } >> +} >> + >> +static void vxhs_get_tls_creds(const char *id, char **cacert, >> + char **key, char **cert, Error **errp) >> +{ >> + Object *obj; >> + QCryptoTLSCreds *creds = NULL; >> + QCryptoTLSCredsX509 *creds_x509 = NULL; > > Neither of these need to be initialized. > >> + >> + obj = object_resolve_path_component( >> + object_get_objects_root(), id); >> + >> + if (!obj) { >> + error_setg(errp, "No TLS credentials with id '%s'", >> + id); >> + return; >> + } >> + >> + creds_x509 = (QCryptoTLSCredsX509 *) >> + object_dynamic_cast(obj, TYPE_QCRYPTO_TLS_CREDS_X509); >> + >> + if (!creds_x509) { >> + error_setg(errp, "Object with id '%s' is not TLS credentials", >> + id); >> + return; >> + } >> + >> + creds = &creds_x509->parent_obj; >> + >> + if (creds->endpoint != QCRYPTO_TLS_CREDS_ENDPOINT_CLIENT) { >> + error_setg(errp, >> + "Expecting TLS credentials with a client endpoint"); >> + return; >> + } >> + >> + /* >> + * Get the cacert, client_cert and client_key file names. >> + */ >> + if (!creds->dir) { >> + error_setg(errp, "TLS object missing 'dir' property value"); >> + return; >> + } >> + >> + *cacert = g_strdup_printf("%s/%s", creds->dir, >> + QCRYPTO_TLS_CREDS_X509_CA_CERT); >> + *cert = g_strdup_printf("%s/%s", creds->dir, >> + QCRYPTO_TLS_CREDS_X509_CLIENT_CERT); >> + *key = g_strdup_printf("%s/%s", creds->dir, >> + QCRYPTO_TLS_CREDS_X509_CLIENT_KEY); >> +} >> + >> +static int vxhs_open(BlockDriverState *bs, QDict *options, >> + int bdrv_flags, Error **errp) >> +{ >> + BDRVVXHSState *s = bs->opaque; >> + void *dev_handlep = NULL; > > dev_handlep does not need to be initialized. > >> + QDict *backing_options = NULL; >> + QemuOpts *opts, *tcp_opts; >> + char *of_vsa_addr = NULL; >> + Error *local_err = NULL; >> + const char *vdisk_id_opt; >> + const char *server_host_opt; >> + char *str = NULL; >> + int ret = 0; >> + char *cacert = NULL; >> + char *client_key = NULL; >> + char *client_cert = NULL; >> + >> + ret = vxhs_init_and_ref(); >> + if (ret < 0) { >> + return ret; >> + } >> + >> + /* Create opts info from runtime_opts and runtime_tcp_opts list */ >> + opts = qemu_opts_create(&runtime_opts, NULL, 0, &error_abort); >> + tcp_opts = qemu_opts_create(&runtime_tcp_opts, NULL, 0, &error_abort); >> + >> + qemu_opts_absorb_qdict(opts, options, &local_err); >> + if (local_err) { >> + ret = -EINVAL; >> + goto out; >> + } >> + >> + /* vdisk-id is the disk UUID */ >> + vdisk_id_opt = qemu_opt_get(opts, VXHS_OPT_VDISK_ID); >> + if (!vdisk_id_opt) { >> + error_setg(&local_err, QERR_MISSING_PARAMETER, VXHS_OPT_VDISK_ID); >> + ret = -EINVAL; >> + goto out; >> + } >> + >> + /* vdisk-id may contain a leading '/' */ >> + if (strlen(vdisk_id_opt) > UUID_FMT_LEN + 1) { >> + error_setg(&local_err, "vdisk-id cannot be more than %d characters", >> + UUID_FMT_LEN); >> + ret = -EINVAL; >> + goto out; >> + } >> + >> + s->vdisk_guid = g_strdup(vdisk_id_opt); >> + trace_vxhs_open_vdiskid(vdisk_id_opt); >> + >> + /* get the 'server.' arguments */ >> + str = g_strdup_printf(VXHS_OPT_SERVER"."); >> + qdict_extract_subqdict(options, &backing_options, str); >> + >> + qemu_opts_absorb_qdict(tcp_opts, backing_options, &local_err); >> + if (local_err != NULL) { >> + ret = -EINVAL; >> + goto out; >> + } >> + >> + server_host_opt = qemu_opt_get(tcp_opts, VXHS_OPT_HOST); >> + if (!server_host_opt) { >> + error_setg(&local_err, QERR_MISSING_PARAMETER, >> + VXHS_OPT_SERVER"."VXHS_OPT_HOST); >> + ret = -EINVAL; >> + goto out; >> + } >> + >> + if (strlen(server_host_opt) > MAXHOSTNAMELEN) { >> + error_setg(&local_err, "server.host cannot be more than %d characters", >> + MAXHOSTNAMELEN); >> + ret = -EINVAL; >> + goto out; >> + } >> + >> + /* check if we got tls-creds via the --object argument */ >> + s->tlscredsid = g_strdup(qemu_opt_get(opts, "tls-creds")); >> + if (s->tlscredsid) { >> + vxhs_get_tls_creds(s->tlscredsid, &cacert, &client_key, >> + &client_cert, &local_err); >> + if (local_err != NULL) { >> + ret = -EINVAL; >> + goto out; >> + } >> + trace_vxhs_get_creds(cacert, client_key, client_cert); >> + } >> + >> + s->vdisk_hostinfo.host = g_strdup(server_host_opt); >> + s->vdisk_hostinfo.port = g_ascii_strtoll(qemu_opt_get(tcp_opts, >> + VXHS_OPT_PORT), >> + NULL, 0); >> + >> + trace_vxhs_open_hostinfo(s->vdisk_hostinfo.host, >> + s->vdisk_hostinfo.port); >> + >> + of_vsa_addr = g_strdup_printf("of://%s:%d", >> + s->vdisk_hostinfo.host, >> + s->vdisk_hostinfo.port); >> + >> + /* >> + * Open qnio channel to storage agent if not opened before >> + */ >> + dev_handlep = iio_open(of_vsa_addr, s->vdisk_guid, 0, >> + cacert, client_key, client_cert); >> + if (dev_handlep == NULL) { >> + trace_vxhs_open_iio_open(of_vsa_addr); >> + ret = -ENODEV; >> + goto out; >> + } >> + s->vdisk_hostinfo.dev_handle = dev_handlep; >> + >> +out: >> + g_free(str); >> + g_free(of_vsa_addr); >> + QDECREF(backing_options); >> + qemu_opts_del(tcp_opts); >> + qemu_opts_del(opts); >> + g_free(cacert); >> + g_free(client_key); >> + g_free(client_cert); >> + >> + if (ret < 0) { >> + vxhs_unref(); >> + error_propagate(errp, local_err); >> + g_free(s->vdisk_hostinfo.host); >> + g_free(s->vdisk_guid); >> + g_free(s->tlscredsid); >> + s->vdisk_guid = NULL; >> + errno = -ret; >> + } >> + >> + return ret; >> +} >> + >> +static const AIOCBInfo vxhs_aiocb_info = { >> + .aiocb_size = sizeof(VXHSAIOCB) >> +}; >> + >> +/* >> + * This allocates QEMU-VXHS callback for each IO >> + * and is passed to QNIO. When QNIO completes the work, >> + * it will be passed back through the callback. >> + */ >> +static BlockAIOCB *vxhs_aio_rw(BlockDriverState *bs, int64_t sector_num, >> + QEMUIOVector *qiov, int nb_sectors, >> + BlockCompletionFunc *cb, void *opaque, >> + VDISKAIOCmd iodir) >> +{ >> + VXHSAIOCB *acb = NULL; >> + BDRVVXHSState *s = bs->opaque; >> + size_t size; >> + uint64_t offset; >> + int iio_flags = 0; >> + int ret = 0; >> + void *dev_handle = s->vdisk_hostinfo.dev_handle; >> + >> + offset = sector_num * BDRV_SECTOR_SIZE; >> + size = nb_sectors * BDRV_SECTOR_SIZE; >> + acb = qemu_aio_get(&vxhs_aiocb_info, bs, cb, opaque); >> + >> + /* >> + * Initialize VXHSAIOCB. >> + */ >> + acb->err = 0; >> + acb->qiov = qiov; >> + >> + iio_flags = IIO_FLAG_ASYNC; >> + >> + switch (iodir) { >> + case VDISK_AIO_WRITE: >> + ret = iio_writev(dev_handle, acb, qiov->iov, qiov->niov, >> + offset, (uint64_t)size, iio_flags); >> + break; >> + case VDISK_AIO_READ: >> + ret = iio_readv(dev_handle, acb, qiov->iov, qiov->niov, >> + offset, (uint64_t)size, iio_flags); >> + break; >> + default: >> + trace_vxhs_aio_rw_invalid(iodir); >> + goto errout; >> + } >> + >> + if (ret != 0) { >> + trace_vxhs_aio_rw_ioerr(s->vdisk_guid, iodir, size, offset, >> + acb, ret, errno); >> + goto errout; >> + } >> + return &acb->common; >> + >> +errout: >> + qemu_aio_unref(acb); >> + return NULL; >> +} >> + >> +static BlockAIOCB *vxhs_aio_readv(BlockDriverState *bs, >> + int64_t sector_num, QEMUIOVector *qiov, >> + int nb_sectors, >> + BlockCompletionFunc *cb, void *opaque) >> +{ >> + return vxhs_aio_rw(bs, sector_num, qiov, nb_sectors, cb, >> + opaque, VDISK_AIO_READ); >> +} >> + >> +static BlockAIOCB *vxhs_aio_writev(BlockDriverState *bs, >> + int64_t sector_num, QEMUIOVector *qiov, >> + int nb_sectors, >> + BlockCompletionFunc *cb, void *opaque) >> +{ >> + return vxhs_aio_rw(bs, sector_num, qiov, nb_sectors, >> + cb, opaque, VDISK_AIO_WRITE); >> +} >> + >> +static void vxhs_close(BlockDriverState *bs) >> +{ >> + BDRVVXHSState *s = bs->opaque; >> + >> + trace_vxhs_close(s->vdisk_guid); >> + >> + g_free(s->vdisk_guid); >> + s->vdisk_guid = NULL; >> + >> + /* >> + * Close vDisk device >> + */ >> + if (s->vdisk_hostinfo.dev_handle) { >> + iio_close(s->vdisk_hostinfo.dev_handle); >> + s->vdisk_hostinfo.dev_handle = NULL; >> + } >> + >> + vxhs_unref(); >> + >> + /* >> + * Free the dynamically allocated host string etc >> + */ >> + g_free(s->vdisk_hostinfo.host); >> + g_free(s->tlscredsid); >> + s->tlscredsid = NULL; >> + s->vdisk_hostinfo.host = NULL; >> + s->vdisk_hostinfo.port = 0; >> +} >> + >> +static int64_t vxhs_get_vdisk_stat(BDRVVXHSState *s) >> +{ >> + int64_t vdisk_size = -1; >> + int ret = 0; >> + void *dev_handle = s->vdisk_hostinfo.dev_handle; >> + >> + ret = iio_ioctl(dev_handle, IOR_VDISK_STAT, &vdisk_size, 0); >> + if (ret < 0) { >> + trace_vxhs_get_vdisk_stat_err(s->vdisk_guid, ret, errno); >> + return -EIO; >> + } >> + >> + trace_vxhs_get_vdisk_stat(s->vdisk_guid, vdisk_size); >> + return vdisk_size; >> +} >> + >> +/* >> + * Returns the size of vDisk in bytes. This is required >> + * by QEMU block upper block layer so that it is visible >> + * to guest. >> + */ >> +static int64_t vxhs_getlength(BlockDriverState *bs) >> +{ >> + BDRVVXHSState *s = bs->opaque; >> + int64_t vdisk_size; >> + >> + vdisk_size = vxhs_get_vdisk_stat(s); >> + if (vdisk_size < 0) { >> + return -EIO; >> + } >> + >> + return vdisk_size; >> +} >> + >> +static BlockDriver bdrv_vxhs = { >> + .format_name = "vxhs", >> + .protocol_name = "vxhs", >> + .instance_size = sizeof(BDRVVXHSState), >> + .bdrv_file_open = vxhs_open, >> + .bdrv_parse_filename = vxhs_parse_filename, >> + .bdrv_close = vxhs_close, >> + .bdrv_getlength = vxhs_getlength, >> + .bdrv_aio_readv = vxhs_aio_readv, >> + .bdrv_aio_writev = vxhs_aio_writev, >> +}; >> + >> +static void bdrv_vxhs_init(void) >> +{ >> + bdrv_register(&bdrv_vxhs); >> +} >> + >> +block_init(bdrv_vxhs_init); >> diff --git a/configure b/configure >> index d1ce33b..8f4a7a3 100755 >> --- a/configure >> +++ b/configure >> @@ -320,6 +320,7 @@ numa="" >> tcmalloc="no" >> jemalloc="no" >> replication="yes" >> +vxhs="" >> >> supported_cpu="no" >> supported_os="no" >> @@ -1178,6 +1179,10 @@ for opt do >> ;; >> --enable-replication) replication="yes" >> ;; >> + --disable-vxhs) vxhs="no" >> + ;; >> + --enable-vxhs) vxhs="yes" >> + ;; >> *) >> echo "ERROR: unknown option $opt" >> echo "Try '$0 --help' for more information" >> @@ -1422,6 +1427,7 @@ disabled with --disable-FEATURE, default is enabled if available: >> xfsctl xfsctl support >> qom-cast-debug cast debugging support >> tools build qemu-io, qemu-nbd and qemu-image tools >> + vxhs Veritas HyperScale vDisk backend support >> >> NOTE: The object files are built at the place where configure is launched >> EOF >> @@ -4757,6 +4763,33 @@ if compile_prog "" "" ; then >> fi >> >> ########################################## >> +# Veritas HyperScale block driver VxHS >> +# Check if libvxhs is installed >> + >> +if test "$vxhs" != "no" ; then >> + cat > $TMPC <<EOF >> +#include <stdint.h> >> +#include <qnio/qnio_api.h> >> + >> +void *vxhs_callback; >> + >> +int main(void) { >> + iio_init(QNIO_VERSION, vxhs_callback, (void *)0); >> + return 0; >> +} >> +EOF >> + vxhs_libs="-lvxhs -lssl" >> + if compile_prog "" "$vxhs_libs" ; then >> + vxhs=yes >> + else >> + if test "$vxhs" = "yes" ; then >> + feature_not_found "vxhs block device" "Install libvxhs See github" >> + fi >> + vxhs=no >> + fi >> +fi >> + >> +########################################## >> # End of CC checks >> # After here, no more $cc or $ld runs >> >> @@ -5122,6 +5155,7 @@ echo "tcmalloc support $tcmalloc" >> echo "jemalloc support $jemalloc" >> echo "avx2 optimization $avx2_opt" >> echo "replication support $replication" >> +echo "VxHS block device $vxhs" >> >> if test "$sdl_too_old" = "yes"; then >> echo "-> Your SDL version is too old - please upgrade to have SDL support" >> @@ -5761,6 +5795,11 @@ if test "$pthread_setname_np" = "yes" ; then >> echo "CONFIG_PTHREAD_SETNAME_NP=y" >> $config_host_mak >> fi >> >> +if test "$vxhs" = "yes" ; then >> + echo "CONFIG_VXHS=y" >> $config_host_mak >> + echo "VXHS_LIBS=$vxhs_libs" >> $config_host_mak >> +fi >> + >> if test "$tcg_interpreter" = "yes"; then >> QEMU_INCLUDES="-I\$(SRC_PATH)/tcg/tci $QEMU_INCLUDES" >> elif test "$ARCH" = "sparc64" ; then >> diff --git a/qapi/block-core.json b/qapi/block-core.json >> index 0f132fc..54cb7c6 100644 >> --- a/qapi/block-core.json >> +++ b/qapi/block-core.json >> @@ -2118,6 +2118,7 @@ >> # @iscsi: Since 2.9 >> # @rbd: Since 2.9 >> # @sheepdog: Since 2.9 >> +# @vxhs: Since 2.10 >> # >> # Since: 2.0 >> ## >> @@ -2127,7 +2128,7 @@ >> 'host_device', 'http', 'https', 'iscsi', 'luks', 'nbd', 'nfs', >> 'null-aio', 'null-co', 'parallels', 'qcow', 'qcow2', 'qed', >> 'quorum', 'raw', 'rbd', 'replication', 'sheepdog', 'ssh', >> - 'vdi', 'vhdx', 'vmdk', 'vpc', 'vvfat' ] } >> + 'vdi', 'vhdx', 'vmdk', 'vpc', 'vvfat', 'vxhs' ] } >> >> ## >> # @BlockdevOptionsFile: >> @@ -2820,6 +2821,22 @@ >> 'data': { '*offset': 'int', '*size': 'int' } } >> >> ## >> +# @BlockdevOptionsVxHS: >> +# >> +# Driver specific block device options for VxHS >> +# >> +# @vdisk-id: UUID of VxHS volume >> +# @server: vxhs server IP, port >> +# @tls-creds: TLS credentials ID >> +# >> +# Since: 2.10 >> +## >> +{ 'struct': 'BlockdevOptionsVxHS', >> + 'data': { 'vdisk-id': 'str', >> + 'server': 'InetSocketAddress', >> + '*tls-creds': 'str' } } >> + >> +## >> # @BlockdevOptions: >> # >> # Options for creating a block device. Many options are available for all >> @@ -2881,7 +2898,8 @@ >> 'vhdx': 'BlockdevOptionsGenericFormat', >> 'vmdk': 'BlockdevOptionsGenericCOWFormat', >> 'vpc': 'BlockdevOptionsGenericFormat', >> - 'vvfat': 'BlockdevOptionsVVFAT' >> + 'vvfat': 'BlockdevOptionsVVFAT', >> + 'vxhs': 'BlockdevOptionsVxHS' >> } } >> >> ## >> -- >> 2.5.5 >>
On Mon, Mar 27, 2017 at 6:04 PM, ashish mittal <ashmit602@gmail.com> wrote: > On Mon, Mar 27, 2017 at 10:27 AM, Stefan Hajnoczi <stefanha@gmail.com> wrote: >> On Sun, Mar 26, 2017 at 07:50:35PM -0700, Ashish Mittal wrote: >> >> Have you tested live migration? >> >> If live migration is not supported then a migration blocker should be >> added using migrate_add_blocker(). >> > > We do support live migration. We have been testing a fork of this code > (slightly different version) with live migration. > >>> v10 changelog: >>> (1) Implemented accepting TLS creds per block device via the CLI >>> (see 3rd e.g in commit log). Corresponding changes made to the >>> libqnio library. >>> (2) iio_open() changed to accept TLS creds and use these internally >>> to set up SSL connections. >>> (3) Got rid of hard-coded VXHS_UUID_DEF. qemu_uuid is no longer used >>> for authentication in any way. >> >> Why does the code still access qemu_uuid and pass the UUID string to >> iio_init()? >> > > I was of the opinion that knowing what instance (for qemu-kvm case) > was opening a block device could be a useful piece of information for > the block device to have in the future. > >> In libqnio.git (66698ca47bc594a9f623c240d63ea535f5a42b47) the 'instance' >> field is unused and not sent over the wire. Please drop it. >> > > It is not used at present. I will drop it. > >>> diff --git a/block/vxhs.c b/block/vxhs.c >>> new file mode 100644 >>> index 0000000..b98b535 >>> --- /dev/null >>> +++ b/block/vxhs.c >>> @@ -0,0 +1,595 @@ >>> +/* >>> + * QEMU Block driver for Veritas HyperScale (VxHS) >>> + * >>> + * This work is licensed under the terms of the GNU GPL, version 2 or later. >>> + * See the COPYING file in the top-level directory. >>> + * >>> + */ >>> + >>> +#include "qemu/osdep.h" >>> +#include <qnio/qnio_api.h> >>> +#include <sys/param.h> >>> +#include "block/block_int.h" >>> +#include "qapi/qmp/qerror.h" >>> +#include "qapi/qmp/qdict.h" >>> +#include "qapi/qmp/qstring.h" >>> +#include "trace.h" >>> +#include "qemu/uri.h" >>> +#include "qapi/error.h" >>> +#include "qemu/uuid.h" >>> +#include "crypto/tlscredsx509.h" >>> + >>> +#define VXHS_OPT_FILENAME "filename" >>> +#define VXHS_OPT_VDISK_ID "vdisk-id" >>> +#define VXHS_OPT_SERVER "server" >>> +#define VXHS_OPT_HOST "host" >>> +#define VXHS_OPT_PORT "port" >>> + >>> +QemuUUID qemu_uuid __attribute__ ((weak)); >>> + >>> +static uint32_t vxhs_ref; >> >> It would be nice to add: >> /* Only accessed under QEMU global mutex */ >> > Will do. > >>> +/* >>> + * Parse the incoming URI and populate *options with the host information. >>> + * URI syntax has the limitation of supporting only one host info. >>> + * To pass multiple host information, use the JSON syntax. >> >> References to multiple hosts are out of date. The driver only supports >> a single host now. >> > Will change. > >>> + */ >>> +static int vxhs_parse_uri(const char *filename, QDict *options) >>> +{ >>> + URI *uri = NULL; >>> + char *hoststr, *portstr; >>> + char *port; >>> + int ret = 0; >>> + >>> + trace_vxhs_parse_uri_filename(filename); >>> + uri = uri_parse(filename); >>> + if (!uri || !uri->server || !uri->path) { >>> + uri_free(uri); >>> + return -EINVAL; >>> + } >>> + >>> + hoststr = g_strdup(VXHS_OPT_SERVER".host"); >>> + qdict_put(options, hoststr, qstring_from_str(uri->server)); >>> + g_free(hoststr); >>> + >>> + portstr = g_strdup(VXHS_OPT_SERVER".port"); >>> + if (uri->port) { >>> + port = g_strdup_printf("%d", uri->port); >>> + qdict_put(options, portstr, qstring_from_str(port)); >>> + g_free(port); >>> + } >>> + g_free(portstr); >> >> The g_strdup()/g_free() isn't necessary for the qdict_put() key >> argument. The key belongs to the caller so we can pass a string >> literal: > > Will Change. > >> >> qdict_put(options, VXHS_OPT_SERVER ".host", qstring_from_str(uri->server)); >> if (uri->port) { >> port = g_strdup_printf("%d", uri->port); >> qdict_put(options, VXHS_OPT_SERVER ".port", qstring_from_str(port)); >> g_free(port); >> } >> >>> + >>> + if (strstr(uri->path, "vxhs") == NULL) { >> >> What does this check do? >> > > Not sure about the history, but it's been there since first code > draft. Will check if it serves any purpose, or remove it. > >>> +static int vxhs_open(BlockDriverState *bs, QDict *options, >>> + int bdrv_flags, Error **errp) >>> +{ >>> + BDRVVXHSState *s = bs->opaque; >>> + void *dev_handlep = NULL; >>> + QDict *backing_options = NULL; >>> + QemuOpts *opts, *tcp_opts; >>> + char *of_vsa_addr = NULL; >>> + Error *local_err = NULL; >>> + const char *vdisk_id_opt; >>> + const char *server_host_opt; >>> + char *str = NULL; >>> + int ret = 0; >>> + char *cacert = NULL; >>> + char *client_key = NULL; >>> + char *client_cert = NULL; >>> + >>> + ret = vxhs_init_and_ref(); >>> + if (ret < 0) { >>> + return ret; >>> + } >>> + >>> + /* Create opts info from runtime_opts and runtime_tcp_opts list */ >>> + opts = qemu_opts_create(&runtime_opts, NULL, 0, &error_abort); >>> + tcp_opts = qemu_opts_create(&runtime_tcp_opts, NULL, 0, &error_abort); >>> + >>> + qemu_opts_absorb_qdict(opts, options, &local_err); >>> + if (local_err) { >>> + ret = -EINVAL; >>> + goto out; >>> + } >>> + >>> + /* vdisk-id is the disk UUID */ >>> + vdisk_id_opt = qemu_opt_get(opts, VXHS_OPT_VDISK_ID); >>> + if (!vdisk_id_opt) { >>> + error_setg(&local_err, QERR_MISSING_PARAMETER, VXHS_OPT_VDISK_ID); >>> + ret = -EINVAL; >>> + goto out; >>> + } >>> + >>> + /* vdisk-id may contain a leading '/' */ >>> + if (strlen(vdisk_id_opt) > UUID_FMT_LEN + 1) { >>> + error_setg(&local_err, "vdisk-id cannot be more than %d characters", >>> + UUID_FMT_LEN); >>> + ret = -EINVAL; >>> + goto out; >>> + } >>> + >>> + s->vdisk_guid = g_strdup(vdisk_id_opt); >>> + trace_vxhs_open_vdiskid(vdisk_id_opt); >>> + >>> + /* get the 'server.' arguments */ >>> + str = g_strdup_printf(VXHS_OPT_SERVER"."); >>> + qdict_extract_subqdict(options, &backing_options, str); >> >> g_strdup_printf() is unnecessary. You can eliminate the 'str' local >> variable and just do: >> >> qdict_extract_subqdict(options, &backing_options, VXHS_OPT_SERVER "."); >> > Will do. Thanks! > >>> + >>> + qemu_opts_absorb_qdict(tcp_opts, backing_options, &local_err); >>> + if (local_err != NULL) { >>> + ret = -EINVAL; >>> + goto out; >>> + } >>> + >>> + server_host_opt = qemu_opt_get(tcp_opts, VXHS_OPT_HOST); >>> + if (!server_host_opt) { >>> + error_setg(&local_err, QERR_MISSING_PARAMETER, >>> + VXHS_OPT_SERVER"."VXHS_OPT_HOST); >>> + ret = -EINVAL; >>> + goto out; >>> + } >>> + >>> + if (strlen(server_host_opt) > MAXHOSTNAMELEN) { >>> + error_setg(&local_err, "server.host cannot be more than %d characters", >>> + MAXHOSTNAMELEN); >>> + ret = -EINVAL; >>> + goto out; >>> + } >>> + >>> + /* check if we got tls-creds via the --object argument */ >>> + s->tlscredsid = g_strdup(qemu_opt_get(opts, "tls-creds")); >>> + if (s->tlscredsid) { >>> + vxhs_get_tls_creds(s->tlscredsid, &cacert, &client_key, >>> + &client_cert, &local_err); >>> + if (local_err != NULL) { >>> + ret = -EINVAL; >>> + goto out; >>> + } >>> + trace_vxhs_get_creds(cacert, client_key, client_cert); >>> + } >>> + >>> + s->vdisk_hostinfo.host = g_strdup(server_host_opt); >>> + s->vdisk_hostinfo.port = g_ascii_strtoll(qemu_opt_get(tcp_opts, >>> + VXHS_OPT_PORT), >>> + NULL, 0); >>> + >>> + trace_vxhs_open_hostinfo(s->vdisk_hostinfo.host, >>> + s->vdisk_hostinfo.port); >>> + >>> + of_vsa_addr = g_strdup_printf("of://%s:%d", >>> + s->vdisk_hostinfo.host, >>> + s->vdisk_hostinfo.port); >>> + >>> + /* >>> + * Open qnio channel to storage agent if not opened before >>> + */ >>> + dev_handlep = iio_open(of_vsa_addr, s->vdisk_guid, 0, >>> + cacert, client_key, client_cert); >>> + if (dev_handlep == NULL) { >>> + trace_vxhs_open_iio_open(of_vsa_addr); >>> + ret = -ENODEV; >>> + goto out; >>> + } >>> + s->vdisk_hostinfo.dev_handle = dev_handlep; >>> + >>> +out: >>> + g_free(str); >>> + g_free(of_vsa_addr); >>> + QDECREF(backing_options); >>> + qemu_opts_del(tcp_opts); >>> + qemu_opts_del(opts); >>> + g_free(cacert); >>> + g_free(client_key); >>> + g_free(client_cert); >>> + >>> + if (ret < 0) { >>> + vxhs_unref(); >>> + error_propagate(errp, local_err); >>> + g_free(s->vdisk_hostinfo.host); >>> + g_free(s->vdisk_guid); >>> + g_free(s->tlscredsid); >>> + s->vdisk_guid = NULL; >>> + errno = -ret; >> >> .bdrv_open() does not promise anything about errno. This line can be >> dropped. >> > Will do. > >>> + } >>> + >>> + return ret; >>> +} >>> + >>> +static const AIOCBInfo vxhs_aiocb_info = { >>> + .aiocb_size = sizeof(VXHSAIOCB) >>> +}; >>> + >>> +/* >>> + * This allocates QEMU-VXHS callback for each IO >>> + * and is passed to QNIO. When QNIO completes the work, >>> + * it will be passed back through the callback. >>> + */ >>> +static BlockAIOCB *vxhs_aio_rw(BlockDriverState *bs, int64_t sector_num, >>> + QEMUIOVector *qiov, int nb_sectors, >>> + BlockCompletionFunc *cb, void *opaque, >>> + VDISKAIOCmd iodir) >>> +{ >>> + VXHSAIOCB *acb = NULL; >>> + BDRVVXHSState *s = bs->opaque; >>> + size_t size; >>> + uint64_t offset; >>> + int iio_flags = 0; >>> + int ret = 0; >>> + void *dev_handle = s->vdisk_hostinfo.dev_handle; >>> + >>> + offset = sector_num * BDRV_SECTOR_SIZE; >>> + size = nb_sectors * BDRV_SECTOR_SIZE; >>> + acb = qemu_aio_get(&vxhs_aiocb_info, bs, cb, opaque); >>> + >>> + /* >>> + * Initialize VXHSAIOCB. >>> + */ >>> + acb->err = 0; >>> + acb->qiov = qiov; >> >> This field is unused, please remove it. >> > Yes! Thanks! > >>> +static BlockDriver bdrv_vxhs = { >>> + .format_name = "vxhs", >>> + .protocol_name = "vxhs", >>> + .instance_size = sizeof(BDRVVXHSState), >>> + .bdrv_file_open = vxhs_open, >>> + .bdrv_parse_filename = vxhs_parse_filename, >>> + .bdrv_close = vxhs_close, >>> + .bdrv_getlength = vxhs_getlength, >>> + .bdrv_aio_readv = vxhs_aio_readv, >>> + .bdrv_aio_writev = vxhs_aio_writev, >> >> Missing .bdrv_aio_flush(). Does VxHS promise that every completed write >> request is persistent? >> > > Yes, every acknowledged write request is persistent. > >> In that case it may be better to disable the emulated disk write cache >> so the guest operating system and application know not to send flush >> commands. > > We do pass "cache=none" on the qemu command line for every block > device. Are there any other code changes necessary? Any pointers will > help. > Upon further reading, I now understand that cache=none will not disable the emulated disk write cache. I am trying to understand if - (1) It should still not be a problem since flush will just be a no-op for us. (2) Is there a way, or reason, to disable the emulated disk write cache in the code for vxhs? I think passing WCE=0 to the guest has something to do with this, although I have yet to figure out what that means. (3) Is this a must for merge? > Thanks, > Ashish
On Fri, Mar 31, 2017 at 11:25:02AM -0700, ashish mittal wrote: > On Mon, Mar 27, 2017 at 6:04 PM, ashish mittal <ashmit602@gmail.com> wrote: > > On Mon, Mar 27, 2017 at 10:27 AM, Stefan Hajnoczi <stefanha@gmail.com> wrote: > >> On Sun, Mar 26, 2017 at 07:50:35PM -0700, Ashish Mittal wrote: > >> > >> Have you tested live migration? > >> > >> If live migration is not supported then a migration blocker should be > >> added using migrate_add_blocker(). > >> > > > > We do support live migration. We have been testing a fork of this code > > (slightly different version) with live migration. The reason I ask is because this patch doesn't implement the BlockDriver bdrv_invalidate_cache()/bdrv_inactivate() callbacks. These functions are invoked during live migration so that the block driver can ensure data consistency. Since the destination QEMU process is launched while the source QEMU is still running and making changes to the disk, some block drivers need to discard metadata at migration handover time that was read upon opening the image on the destination. The guarantees that they see the latest metadata. Not sure if libvxhs caches anything that might get stale during live migration, but I wanted to raise this question? Regarding a fork of this code that you haven't posted to the mailing list, it doesn't exist as far as anyone here is concerned :). Therefore either the code on the mailing list needs to support migration or it must register a migration blocker to prevent migration. > >>> +static BlockDriver bdrv_vxhs = { > >>> + .format_name = "vxhs", > >>> + .protocol_name = "vxhs", > >>> + .instance_size = sizeof(BDRVVXHSState), > >>> + .bdrv_file_open = vxhs_open, > >>> + .bdrv_parse_filename = vxhs_parse_filename, > >>> + .bdrv_close = vxhs_close, > >>> + .bdrv_getlength = vxhs_getlength, > >>> + .bdrv_aio_readv = vxhs_aio_readv, > >>> + .bdrv_aio_writev = vxhs_aio_writev, > >> > >> Missing .bdrv_aio_flush(). Does VxHS promise that every completed write > >> request is persistent? > >> > > > > Yes, every acknowledged write request is persistent. > > > >> In that case it may be better to disable the emulated disk write cache > >> so the guest operating system and application know not to send flush > >> commands. > > > > We do pass "cache=none" on the qemu command line for every block > > device. Are there any other code changes necessary? Any pointers will > > help. > > > > Upon further reading, I now understand that cache=none will not > disable the emulated disk write cache. I am trying to understand if - > (1) It should still not be a problem since flush will just be a no-op for us. The guest operating system and applications may take different code paths depending on the state of the disk write cache. Useless vmexits can be eliminated if the guest doesn't need to send flush commands. Hence the file system and applications may perform better. > (2) Is there a way, or reason, to disable the emulated disk write > cache in the code for vxhs? I think passing WCE=0 to the guest has > something to do with this, although I have yet to figure out what that > means. Right, WCE == "Write Cache Enable". If you disable the write cache then the guest's SCSI disk or virtio-blk drivers will notice that the disk does not require flush commands. Try launching a guest with -drive if=none,id=drive0,cache=directsync,... and you should see that the write cache is disabled: # cat /sys/block/vda/queue/write_cache > (3) Is this a must for merge? This doesn't affect the block driver code so no change is necessary.
On Mon, Apr 3, 2017 at 8:11 AM, Stefan Hajnoczi <stefanha@gmail.com> wrote: > On Fri, Mar 31, 2017 at 11:25:02AM -0700, ashish mittal wrote: >> On Mon, Mar 27, 2017 at 6:04 PM, ashish mittal <ashmit602@gmail.com> wrote: >> > On Mon, Mar 27, 2017 at 10:27 AM, Stefan Hajnoczi <stefanha@gmail.com> wrote: >> >> On Sun, Mar 26, 2017 at 07:50:35PM -0700, Ashish Mittal wrote: >> >> >> >> Have you tested live migration? >> >> >> >> If live migration is not supported then a migration blocker should be >> >> added using migrate_add_blocker(). >> >> >> > >> > We do support live migration. We have been testing a fork of this code >> > (slightly different version) with live migration. > > The reason I ask is because this patch doesn't implement the > BlockDriver bdrv_invalidate_cache()/bdrv_inactivate() callbacks. These > functions are invoked during live migration so that the block driver can > ensure data consistency. > > Since the destination QEMU process is launched while the source QEMU is > still running and making changes to the disk, some block drivers need to > discard metadata at migration handover time that was read upon opening > the image on the destination. The guarantees that they see the latest > metadata. > Thanks! During live migration, we point the vdisks to the same host as the migration source (specified on the vxhs command line), thereby insuring consistent view of data. > Not sure if libvxhs caches anything that might get stale during live > migration, but I wanted to raise this question? > > Regarding a fork of this code that you haven't posted to the mailing > list, it doesn't exist as far as anyone here is concerned :). Therefore > either the code on the mailing list needs to support migration or it > must register a migration blocker to prevent migration. > The code on the mailing list does support live migration. Live migration requires the support of proprietary vxhs bits and also our orchestration code within OpenStack. We have been testing live migration and it works without any data consistency issues. >> >>> +static BlockDriver bdrv_vxhs = { >> >>> + .format_name = "vxhs", >> >>> + .protocol_name = "vxhs", >> >>> + .instance_size = sizeof(BDRVVXHSState), >> >>> + .bdrv_file_open = vxhs_open, >> >>> + .bdrv_parse_filename = vxhs_parse_filename, >> >>> + .bdrv_close = vxhs_close, >> >>> + .bdrv_getlength = vxhs_getlength, >> >>> + .bdrv_aio_readv = vxhs_aio_readv, >> >>> + .bdrv_aio_writev = vxhs_aio_writev, >> >> >> >> Missing .bdrv_aio_flush(). Does VxHS promise that every completed write >> >> request is persistent? >> >> >> > >> > Yes, every acknowledged write request is persistent. >> > >> >> In that case it may be better to disable the emulated disk write cache >> >> so the guest operating system and application know not to send flush >> >> commands. >> > >> > We do pass "cache=none" on the qemu command line for every block >> > device. Are there any other code changes necessary? Any pointers will >> > help. >> > >> >> Upon further reading, I now understand that cache=none will not >> disable the emulated disk write cache. I am trying to understand if - >> (1) It should still not be a problem since flush will just be a no-op for us. > > The guest operating system and applications may take different code > paths depending on the state of the disk write cache. > > Useless vmexits can be eliminated if the guest doesn't need to send > flush commands. Hence the file system and applications may perform > better. > >> (2) Is there a way, or reason, to disable the emulated disk write >> cache in the code for vxhs? I think passing WCE=0 to the guest has >> something to do with this, although I have yet to figure out what that >> means. > > Right, WCE == "Write Cache Enable". If you disable the write cache then > the guest's SCSI disk or virtio-blk drivers will notice that the disk > does not require flush commands. > > Try launching a guest with -drive if=none,id=drive0,cache=directsync,... > and you should see that the write cache is disabled: > > # cat /sys/block/vda/queue/write_cache > Thanks! Will try this. As you mentioned, this might give us a slightly better performance as it will avoid unnecessary flush from the guest OS/app. I was wondering if there was a separate command line option (other than cache=directsync) for passing WCE=0? Reading some of the articles out there almost suggested as if there was! Maybe I was just confused. >> (3) Is this a must for merge? > > This doesn't affect the block driver code so no change is necessary.
diff --git a/block/Makefile.objs b/block/Makefile.objs index de96f8e..ea95530 100644 --- a/block/Makefile.objs +++ b/block/Makefile.objs @@ -19,6 +19,7 @@ block-obj-$(CONFIG_LIBNFS) += nfs.o block-obj-$(CONFIG_CURL) += curl.o block-obj-$(CONFIG_RBD) += rbd.o block-obj-$(CONFIG_GLUSTERFS) += gluster.o +block-obj-$(CONFIG_VXHS) += vxhs.o block-obj-$(CONFIG_LIBSSH2) += ssh.o block-obj-y += accounting.o dirty-bitmap.o block-obj-y += write-threshold.o @@ -38,6 +39,7 @@ rbd.o-cflags := $(RBD_CFLAGS) rbd.o-libs := $(RBD_LIBS) gluster.o-cflags := $(GLUSTERFS_CFLAGS) gluster.o-libs := $(GLUSTERFS_LIBS) +vxhs.o-libs := $(VXHS_LIBS) ssh.o-cflags := $(LIBSSH2_CFLAGS) ssh.o-libs := $(LIBSSH2_LIBS) block-obj-$(if $(CONFIG_BZIP2),m,n) += dmg-bz2.o diff --git a/block/trace-events b/block/trace-events index 0bc5c0a..7758ec3 100644 --- a/block/trace-events +++ b/block/trace-events @@ -110,3 +110,20 @@ qed_aio_write_data(void *s, void *acb, int ret, uint64_t offset, size_t len) "s qed_aio_write_prefill(void *s, void *acb, uint64_t start, size_t len, uint64_t offset) "s %p acb %p start %"PRIu64" len %zu offset %"PRIu64 qed_aio_write_postfill(void *s, void *acb, uint64_t start, size_t len, uint64_t offset) "s %p acb %p start %"PRIu64" len %zu offset %"PRIu64 qed_aio_write_main(void *s, void *acb, int ret, uint64_t offset, size_t len) "s %p acb %p ret %d offset %"PRIu64" len %zu" + +# block/vxhs.c +vxhs_iio_callback(int error) "ctx is NULL: error %d" +vxhs_iio_callback_chnfail(int err, int error) "QNIO channel failed, no i/o %d, %d" +vxhs_iio_callback_unknwn(int opcode, int err) "unexpected opcode %d, errno %d" +vxhs_aio_rw_invalid(int req) "Invalid I/O request iodir %d" +vxhs_aio_rw_ioerr(char *guid, int iodir, uint64_t size, uint64_t off, void *acb, int ret, int err) "IO ERROR (vDisk %s) FOR : Read/Write = %d size = %lu offset = %lu ACB = %p. Error = %d, errno = %d" +vxhs_get_vdisk_stat_err(char *guid, int ret, int err) "vDisk (%s) stat ioctl failed, ret = %d, errno = %d" +vxhs_get_vdisk_stat(char *vdisk_guid, uint64_t vdisk_size) "vDisk %s stat ioctl returned size %lu" +vxhs_complete_aio(void *acb, uint64_t ret) "aio failed acb %p ret %ld" +vxhs_parse_uri_filename(const char *filename) "URI passed via bdrv_parse_filename %s" +vxhs_open_vdiskid(const char *vdisk_id) "Opening vdisk-id %s" +vxhs_open_hostinfo(char *of_vsa_addr, int port) "Adding host %s:%d to BDRVVXHSState" +vxhs_open_iio_open(const char *host) "Failed to connect to storage agent on host %s" +vxhs_parse_uri_hostinfo(char *host, int port) "Host: IP %s, Port %d" +vxhs_close(char *vdisk_guid) "Closing vdisk %s" +vxhs_get_creds(const char *cacert, const char *client_key, const char *client_cert) "cacert %s, client_key %s, client_cert %s" diff --git a/block/vxhs.c b/block/vxhs.c new file mode 100644 index 0000000..b98b535 --- /dev/null +++ b/block/vxhs.c @@ -0,0 +1,595 @@ +/* + * QEMU Block driver for Veritas HyperScale (VxHS) + * + * This work is licensed under the terms of the GNU GPL, version 2 or later. + * See the COPYING file in the top-level directory. + * + */ + +#include "qemu/osdep.h" +#include <qnio/qnio_api.h> +#include <sys/param.h> +#include "block/block_int.h" +#include "qapi/qmp/qerror.h" +#include "qapi/qmp/qdict.h" +#include "qapi/qmp/qstring.h" +#include "trace.h" +#include "qemu/uri.h" +#include "qapi/error.h" +#include "qemu/uuid.h" +#include "crypto/tlscredsx509.h" + +#define VXHS_OPT_FILENAME "filename" +#define VXHS_OPT_VDISK_ID "vdisk-id" +#define VXHS_OPT_SERVER "server" +#define VXHS_OPT_HOST "host" +#define VXHS_OPT_PORT "port" + +QemuUUID qemu_uuid __attribute__ ((weak)); + +static uint32_t vxhs_ref; + +typedef enum { + VDISK_AIO_READ, + VDISK_AIO_WRITE, +} VDISKAIOCmd; + +/* + * HyperScale AIO callbacks structure + */ +typedef struct VXHSAIOCB { + BlockAIOCB common; + int err; + QEMUIOVector *qiov; +} VXHSAIOCB; + +typedef struct VXHSvDiskHostsInfo { + void *dev_handle; /* Device handle */ + char *host; /* Host name or IP */ + int port; /* Host's port number */ +} VXHSvDiskHostsInfo; + +/* + * Structure per vDisk maintained for state + */ +typedef struct BDRVVXHSState { + VXHSvDiskHostsInfo vdisk_hostinfo; /* Per host info */ + char *vdisk_guid; + char *tlscredsid; /* tlscredsid */ +} BDRVVXHSState; + +static void vxhs_complete_aio_bh(void *opaque) +{ + VXHSAIOCB *acb = opaque; + BlockCompletionFunc *cb = acb->common.cb; + void *cb_opaque = acb->common.opaque; + int ret = 0; + + if (acb->err != 0) { + trace_vxhs_complete_aio(acb, acb->err); + ret = (-EIO); + } + + qemu_aio_unref(acb); + cb(cb_opaque, ret); +} + +/* + * Called from a libqnio thread + */ +static void vxhs_iio_callback(void *ctx, uint32_t opcode, uint32_t error) +{ + VXHSAIOCB *acb = NULL; + + switch (opcode) { + case IRP_READ_REQUEST: + case IRP_WRITE_REQUEST: + + /* + * ctx is VXHSAIOCB* + * ctx is NULL if error is QNIOERROR_CHANNEL_HUP + */ + if (ctx) { + acb = ctx; + } else { + trace_vxhs_iio_callback(error); + goto out; + } + + if (error) { + if (!acb->err) { + acb->err = error; + } + trace_vxhs_iio_callback(error); + } + + aio_bh_schedule_oneshot(bdrv_get_aio_context(acb->common.bs), + vxhs_complete_aio_bh, acb); + break; + + default: + if (error == QNIOERROR_HUP) { + /* + * Channel failed, spontaneous notification, + * not in response to I/O + */ + trace_vxhs_iio_callback_chnfail(error, errno); + } else { + trace_vxhs_iio_callback_unknwn(opcode, error); + } + break; + } +out: + return; +} + +static QemuOptsList runtime_opts = { + .name = "vxhs", + .head = QTAILQ_HEAD_INITIALIZER(runtime_opts.head), + .desc = { + { + .name = VXHS_OPT_FILENAME, + .type = QEMU_OPT_STRING, + .help = "URI to the Veritas HyperScale image", + }, + { + .name = VXHS_OPT_VDISK_ID, + .type = QEMU_OPT_STRING, + .help = "UUID of the VxHS vdisk", + }, + { + .name = "tls-creds", + .type = QEMU_OPT_STRING, + .help = "ID of the TLS/SSL credentials to use", + }, + { /* end of list */ } + }, +}; + +static QemuOptsList runtime_tcp_opts = { + .name = "vxhs_tcp", + .head = QTAILQ_HEAD_INITIALIZER(runtime_tcp_opts.head), + .desc = { + { + .name = VXHS_OPT_HOST, + .type = QEMU_OPT_STRING, + .help = "host address (ipv4 addresses)", + }, + { + .name = VXHS_OPT_PORT, + .type = QEMU_OPT_NUMBER, + .help = "port number on which VxHSD is listening (default 9999)", + .def_value_str = "9999" + }, + { /* end of list */ } + }, +}; + +/* + * Parse the incoming URI and populate *options with the host information. + * URI syntax has the limitation of supporting only one host info. + * To pass multiple host information, use the JSON syntax. + */ +static int vxhs_parse_uri(const char *filename, QDict *options) +{ + URI *uri = NULL; + char *hoststr, *portstr; + char *port; + int ret = 0; + + trace_vxhs_parse_uri_filename(filename); + uri = uri_parse(filename); + if (!uri || !uri->server || !uri->path) { + uri_free(uri); + return -EINVAL; + } + + hoststr = g_strdup(VXHS_OPT_SERVER".host"); + qdict_put(options, hoststr, qstring_from_str(uri->server)); + g_free(hoststr); + + portstr = g_strdup(VXHS_OPT_SERVER".port"); + if (uri->port) { + port = g_strdup_printf("%d", uri->port); + qdict_put(options, portstr, qstring_from_str(port)); + g_free(port); + } + g_free(portstr); + + if (strstr(uri->path, "vxhs") == NULL) { + qdict_put(options, "vdisk-id", qstring_from_str(uri->path)); + } + + trace_vxhs_parse_uri_hostinfo(uri->server, uri->port); + uri_free(uri); + + return ret; +} + +static void vxhs_parse_filename(const char *filename, QDict *options, + Error **errp) +{ + if (qdict_haskey(options, "vdisk-id") || qdict_haskey(options, "server")) { + error_setg(errp, "vdisk-id/server and a file name may not be specified " + "at the same time"); + return; + } + + if (strstr(filename, "://")) { + int ret = vxhs_parse_uri(filename, options); + if (ret < 0) { + error_setg(errp, "Invalid URI. URI should be of the form " + " vxhs://<host_ip>:<port>/<vdisk-id>"); + } + } +} + +static int vxhs_init_and_ref(void) +{ + if (vxhs_ref == 0) { + char out[UUID_FMT_LEN + 1]; + if (qemu_uuid_is_null(&qemu_uuid)) { + if (iio_init(QNIO_VERSION, vxhs_iio_callback, NULL)) { + return -ENODEV; + } + } else { + qemu_uuid_unparse(&qemu_uuid, out); + if (iio_init(QNIO_VERSION, vxhs_iio_callback, out)) { + return -ENODEV; + } + } + } + vxhs_ref++; + return 0; +} + +static void vxhs_unref(void) +{ + if (vxhs_ref && --vxhs_ref == 0) { + iio_fini(); + } +} + +static void vxhs_get_tls_creds(const char *id, char **cacert, + char **key, char **cert, Error **errp) +{ + Object *obj; + QCryptoTLSCreds *creds = NULL; + QCryptoTLSCredsX509 *creds_x509 = NULL; + + obj = object_resolve_path_component( + object_get_objects_root(), id); + + if (!obj) { + error_setg(errp, "No TLS credentials with id '%s'", + id); + return; + } + + creds_x509 = (QCryptoTLSCredsX509 *) + object_dynamic_cast(obj, TYPE_QCRYPTO_TLS_CREDS_X509); + + if (!creds_x509) { + error_setg(errp, "Object with id '%s' is not TLS credentials", + id); + return; + } + + creds = &creds_x509->parent_obj; + + if (creds->endpoint != QCRYPTO_TLS_CREDS_ENDPOINT_CLIENT) { + error_setg(errp, + "Expecting TLS credentials with a client endpoint"); + return; + } + + /* + * Get the cacert, client_cert and client_key file names. + */ + if (!creds->dir) { + error_setg(errp, "TLS object missing 'dir' property value"); + return; + } + + *cacert = g_strdup_printf("%s/%s", creds->dir, + QCRYPTO_TLS_CREDS_X509_CA_CERT); + *cert = g_strdup_printf("%s/%s", creds->dir, + QCRYPTO_TLS_CREDS_X509_CLIENT_CERT); + *key = g_strdup_printf("%s/%s", creds->dir, + QCRYPTO_TLS_CREDS_X509_CLIENT_KEY); +} + +static int vxhs_open(BlockDriverState *bs, QDict *options, + int bdrv_flags, Error **errp) +{ + BDRVVXHSState *s = bs->opaque; + void *dev_handlep = NULL; + QDict *backing_options = NULL; + QemuOpts *opts, *tcp_opts; + char *of_vsa_addr = NULL; + Error *local_err = NULL; + const char *vdisk_id_opt; + const char *server_host_opt; + char *str = NULL; + int ret = 0; + char *cacert = NULL; + char *client_key = NULL; + char *client_cert = NULL; + + ret = vxhs_init_and_ref(); + if (ret < 0) { + return ret; + } + + /* Create opts info from runtime_opts and runtime_tcp_opts list */ + opts = qemu_opts_create(&runtime_opts, NULL, 0, &error_abort); + tcp_opts = qemu_opts_create(&runtime_tcp_opts, NULL, 0, &error_abort); + + qemu_opts_absorb_qdict(opts, options, &local_err); + if (local_err) { + ret = -EINVAL; + goto out; + } + + /* vdisk-id is the disk UUID */ + vdisk_id_opt = qemu_opt_get(opts, VXHS_OPT_VDISK_ID); + if (!vdisk_id_opt) { + error_setg(&local_err, QERR_MISSING_PARAMETER, VXHS_OPT_VDISK_ID); + ret = -EINVAL; + goto out; + } + + /* vdisk-id may contain a leading '/' */ + if (strlen(vdisk_id_opt) > UUID_FMT_LEN + 1) { + error_setg(&local_err, "vdisk-id cannot be more than %d characters", + UUID_FMT_LEN); + ret = -EINVAL; + goto out; + } + + s->vdisk_guid = g_strdup(vdisk_id_opt); + trace_vxhs_open_vdiskid(vdisk_id_opt); + + /* get the 'server.' arguments */ + str = g_strdup_printf(VXHS_OPT_SERVER"."); + qdict_extract_subqdict(options, &backing_options, str); + + qemu_opts_absorb_qdict(tcp_opts, backing_options, &local_err); + if (local_err != NULL) { + ret = -EINVAL; + goto out; + } + + server_host_opt = qemu_opt_get(tcp_opts, VXHS_OPT_HOST); + if (!server_host_opt) { + error_setg(&local_err, QERR_MISSING_PARAMETER, + VXHS_OPT_SERVER"."VXHS_OPT_HOST); + ret = -EINVAL; + goto out; + } + + if (strlen(server_host_opt) > MAXHOSTNAMELEN) { + error_setg(&local_err, "server.host cannot be more than %d characters", + MAXHOSTNAMELEN); + ret = -EINVAL; + goto out; + } + + /* check if we got tls-creds via the --object argument */ + s->tlscredsid = g_strdup(qemu_opt_get(opts, "tls-creds")); + if (s->tlscredsid) { + vxhs_get_tls_creds(s->tlscredsid, &cacert, &client_key, + &client_cert, &local_err); + if (local_err != NULL) { + ret = -EINVAL; + goto out; + } + trace_vxhs_get_creds(cacert, client_key, client_cert); + } + + s->vdisk_hostinfo.host = g_strdup(server_host_opt); + s->vdisk_hostinfo.port = g_ascii_strtoll(qemu_opt_get(tcp_opts, + VXHS_OPT_PORT), + NULL, 0); + + trace_vxhs_open_hostinfo(s->vdisk_hostinfo.host, + s->vdisk_hostinfo.port); + + of_vsa_addr = g_strdup_printf("of://%s:%d", + s->vdisk_hostinfo.host, + s->vdisk_hostinfo.port); + + /* + * Open qnio channel to storage agent if not opened before + */ + dev_handlep = iio_open(of_vsa_addr, s->vdisk_guid, 0, + cacert, client_key, client_cert); + if (dev_handlep == NULL) { + trace_vxhs_open_iio_open(of_vsa_addr); + ret = -ENODEV; + goto out; + } + s->vdisk_hostinfo.dev_handle = dev_handlep; + +out: + g_free(str); + g_free(of_vsa_addr); + QDECREF(backing_options); + qemu_opts_del(tcp_opts); + qemu_opts_del(opts); + g_free(cacert); + g_free(client_key); + g_free(client_cert); + + if (ret < 0) { + vxhs_unref(); + error_propagate(errp, local_err); + g_free(s->vdisk_hostinfo.host); + g_free(s->vdisk_guid); + g_free(s->tlscredsid); + s->vdisk_guid = NULL; + errno = -ret; + } + + return ret; +} + +static const AIOCBInfo vxhs_aiocb_info = { + .aiocb_size = sizeof(VXHSAIOCB) +}; + +/* + * This allocates QEMU-VXHS callback for each IO + * and is passed to QNIO. When QNIO completes the work, + * it will be passed back through the callback. + */ +static BlockAIOCB *vxhs_aio_rw(BlockDriverState *bs, int64_t sector_num, + QEMUIOVector *qiov, int nb_sectors, + BlockCompletionFunc *cb, void *opaque, + VDISKAIOCmd iodir) +{ + VXHSAIOCB *acb = NULL; + BDRVVXHSState *s = bs->opaque; + size_t size; + uint64_t offset; + int iio_flags = 0; + int ret = 0; + void *dev_handle = s->vdisk_hostinfo.dev_handle; + + offset = sector_num * BDRV_SECTOR_SIZE; + size = nb_sectors * BDRV_SECTOR_SIZE; + acb = qemu_aio_get(&vxhs_aiocb_info, bs, cb, opaque); + + /* + * Initialize VXHSAIOCB. + */ + acb->err = 0; + acb->qiov = qiov; + + iio_flags = IIO_FLAG_ASYNC; + + switch (iodir) { + case VDISK_AIO_WRITE: + ret = iio_writev(dev_handle, acb, qiov->iov, qiov->niov, + offset, (uint64_t)size, iio_flags); + break; + case VDISK_AIO_READ: + ret = iio_readv(dev_handle, acb, qiov->iov, qiov->niov, + offset, (uint64_t)size, iio_flags); + break; + default: + trace_vxhs_aio_rw_invalid(iodir); + goto errout; + } + + if (ret != 0) { + trace_vxhs_aio_rw_ioerr(s->vdisk_guid, iodir, size, offset, + acb, ret, errno); + goto errout; + } + return &acb->common; + +errout: + qemu_aio_unref(acb); + return NULL; +} + +static BlockAIOCB *vxhs_aio_readv(BlockDriverState *bs, + int64_t sector_num, QEMUIOVector *qiov, + int nb_sectors, + BlockCompletionFunc *cb, void *opaque) +{ + return vxhs_aio_rw(bs, sector_num, qiov, nb_sectors, cb, + opaque, VDISK_AIO_READ); +} + +static BlockAIOCB *vxhs_aio_writev(BlockDriverState *bs, + int64_t sector_num, QEMUIOVector *qiov, + int nb_sectors, + BlockCompletionFunc *cb, void *opaque) +{ + return vxhs_aio_rw(bs, sector_num, qiov, nb_sectors, + cb, opaque, VDISK_AIO_WRITE); +} + +static void vxhs_close(BlockDriverState *bs) +{ + BDRVVXHSState *s = bs->opaque; + + trace_vxhs_close(s->vdisk_guid); + + g_free(s->vdisk_guid); + s->vdisk_guid = NULL; + + /* + * Close vDisk device + */ + if (s->vdisk_hostinfo.dev_handle) { + iio_close(s->vdisk_hostinfo.dev_handle); + s->vdisk_hostinfo.dev_handle = NULL; + } + + vxhs_unref(); + + /* + * Free the dynamically allocated host string etc + */ + g_free(s->vdisk_hostinfo.host); + g_free(s->tlscredsid); + s->tlscredsid = NULL; + s->vdisk_hostinfo.host = NULL; + s->vdisk_hostinfo.port = 0; +} + +static int64_t vxhs_get_vdisk_stat(BDRVVXHSState *s) +{ + int64_t vdisk_size = -1; + int ret = 0; + void *dev_handle = s->vdisk_hostinfo.dev_handle; + + ret = iio_ioctl(dev_handle, IOR_VDISK_STAT, &vdisk_size, 0); + if (ret < 0) { + trace_vxhs_get_vdisk_stat_err(s->vdisk_guid, ret, errno); + return -EIO; + } + + trace_vxhs_get_vdisk_stat(s->vdisk_guid, vdisk_size); + return vdisk_size; +} + +/* + * Returns the size of vDisk in bytes. This is required + * by QEMU block upper block layer so that it is visible + * to guest. + */ +static int64_t vxhs_getlength(BlockDriverState *bs) +{ + BDRVVXHSState *s = bs->opaque; + int64_t vdisk_size; + + vdisk_size = vxhs_get_vdisk_stat(s); + if (vdisk_size < 0) { + return -EIO; + } + + return vdisk_size; +} + +static BlockDriver bdrv_vxhs = { + .format_name = "vxhs", + .protocol_name = "vxhs", + .instance_size = sizeof(BDRVVXHSState), + .bdrv_file_open = vxhs_open, + .bdrv_parse_filename = vxhs_parse_filename, + .bdrv_close = vxhs_close, + .bdrv_getlength = vxhs_getlength, + .bdrv_aio_readv = vxhs_aio_readv, + .bdrv_aio_writev = vxhs_aio_writev, +}; + +static void bdrv_vxhs_init(void) +{ + bdrv_register(&bdrv_vxhs); +} + +block_init(bdrv_vxhs_init); diff --git a/configure b/configure index d1ce33b..8f4a7a3 100755 --- a/configure +++ b/configure @@ -320,6 +320,7 @@ numa="" tcmalloc="no" jemalloc="no" replication="yes" +vxhs="" supported_cpu="no" supported_os="no" @@ -1178,6 +1179,10 @@ for opt do ;; --enable-replication) replication="yes" ;; + --disable-vxhs) vxhs="no" + ;; + --enable-vxhs) vxhs="yes" + ;; *) echo "ERROR: unknown option $opt" echo "Try '$0 --help' for more information" @@ -1422,6 +1427,7 @@ disabled with --disable-FEATURE, default is enabled if available: xfsctl xfsctl support qom-cast-debug cast debugging support tools build qemu-io, qemu-nbd and qemu-image tools + vxhs Veritas HyperScale vDisk backend support NOTE: The object files are built at the place where configure is launched EOF @@ -4757,6 +4763,33 @@ if compile_prog "" "" ; then fi ########################################## +# Veritas HyperScale block driver VxHS +# Check if libvxhs is installed + +if test "$vxhs" != "no" ; then + cat > $TMPC <<EOF +#include <stdint.h> +#include <qnio/qnio_api.h> + +void *vxhs_callback; + +int main(void) { + iio_init(QNIO_VERSION, vxhs_callback, (void *)0); + return 0; +} +EOF + vxhs_libs="-lvxhs -lssl" + if compile_prog "" "$vxhs_libs" ; then + vxhs=yes + else + if test "$vxhs" = "yes" ; then + feature_not_found "vxhs block device" "Install libvxhs See github" + fi + vxhs=no + fi +fi + +########################################## # End of CC checks # After here, no more $cc or $ld runs @@ -5122,6 +5155,7 @@ echo "tcmalloc support $tcmalloc" echo "jemalloc support $jemalloc" echo "avx2 optimization $avx2_opt" echo "replication support $replication" +echo "VxHS block device $vxhs" if test "$sdl_too_old" = "yes"; then echo "-> Your SDL version is too old - please upgrade to have SDL support" @@ -5761,6 +5795,11 @@ if test "$pthread_setname_np" = "yes" ; then echo "CONFIG_PTHREAD_SETNAME_NP=y" >> $config_host_mak fi +if test "$vxhs" = "yes" ; then + echo "CONFIG_VXHS=y" >> $config_host_mak + echo "VXHS_LIBS=$vxhs_libs" >> $config_host_mak +fi + if test "$tcg_interpreter" = "yes"; then QEMU_INCLUDES="-I\$(SRC_PATH)/tcg/tci $QEMU_INCLUDES" elif test "$ARCH" = "sparc64" ; then diff --git a/qapi/block-core.json b/qapi/block-core.json index 0f132fc..54cb7c6 100644 --- a/qapi/block-core.json +++ b/qapi/block-core.json @@ -2118,6 +2118,7 @@ # @iscsi: Since 2.9 # @rbd: Since 2.9 # @sheepdog: Since 2.9 +# @vxhs: Since 2.10 # # Since: 2.0 ## @@ -2127,7 +2128,7 @@ 'host_device', 'http', 'https', 'iscsi', 'luks', 'nbd', 'nfs', 'null-aio', 'null-co', 'parallels', 'qcow', 'qcow2', 'qed', 'quorum', 'raw', 'rbd', 'replication', 'sheepdog', 'ssh', - 'vdi', 'vhdx', 'vmdk', 'vpc', 'vvfat' ] } + 'vdi', 'vhdx', 'vmdk', 'vpc', 'vvfat', 'vxhs' ] } ## # @BlockdevOptionsFile: @@ -2820,6 +2821,22 @@ 'data': { '*offset': 'int', '*size': 'int' } } ## +# @BlockdevOptionsVxHS: +# +# Driver specific block device options for VxHS +# +# @vdisk-id: UUID of VxHS volume +# @server: vxhs server IP, port +# @tls-creds: TLS credentials ID +# +# Since: 2.10 +## +{ 'struct': 'BlockdevOptionsVxHS', + 'data': { 'vdisk-id': 'str', + 'server': 'InetSocketAddress', + '*tls-creds': 'str' } } + +## # @BlockdevOptions: # # Options for creating a block device. Many options are available for all @@ -2881,7 +2898,8 @@ 'vhdx': 'BlockdevOptionsGenericFormat', 'vmdk': 'BlockdevOptionsGenericCOWFormat', 'vpc': 'BlockdevOptionsGenericFormat', - 'vvfat': 'BlockdevOptionsVVFAT' + 'vvfat': 'BlockdevOptionsVVFAT', + 'vxhs': 'BlockdevOptionsVxHS' } } ##
Source code for the qnio library that this code loads can be downloaded from: https://github.com/VeritasHyperScale/libqnio.git Sample command line using JSON syntax: ./x86_64-softmmu/qemu-system-x86_64 -name instance-00000008 -S -vnc 0.0.0.0:0 -k en-us -vga cirrus -device virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x5 -msg timestamp=on 'json:{"driver":"vxhs","vdisk-id":"c3e9095a-a5ee-4dce-afeb-2a59fb387410", "server":{"host":"172.172.17.4","port":"9999"}}' Sample command line using URI syntax: qemu-img convert -f raw -O raw -n /var/lib/nova/instances/_base/0c5eacd5ebea5ed914b6a3e7b18f1ce734c386ad vxhs://192.168.0.1:9999/c6718f6b-0401-441d-a8c3-1f0064d75ee0 Sample command line using TLS credentials (run in secure mode): ./qemu-io --object tls-creds-x509,id=tls0,dir=/etc/pki/qemu/vxhs,endpoint=client -c 'read -v 66000 2.5k' 'json:{"server.host": "127.0.0.1", "server.port": "9999", "vdisk-id": "/test.raw", "driver": "vxhs", "tls-creds":"tls0"}' Signed-off-by: Ashish Mittal <Ashish.Mittal@veritas.com> --- v10 changelog: (1) Implemented accepting TLS creds per block device via the CLI (see 3rd e.g in commit log). Corresponding changes made to the libqnio library. (2) iio_open() changed to accept TLS creds and use these internally to set up SSL connections. (3) Got rid of hard-coded VXHS_UUID_DEF. qemu_uuid is no longer used for authentication in any way. (4) Removed unnecessary qdict_del(backing_options, str). (5) Added '*tls-creds' to BlockdevOptionsVxHS. v9 changelog: (1) Fixes for all the review comments from v8. I have left the definition of VXHS_UUID_DEF unchanged pending a better suggestion. (2) qcow2 tests now pass on the vxhs test server. (3) Packaging changes for libvxhs will be checked in to the git repo soon. (4) I have not moved extern QemuUUID qemu_uuid to a separate header file. v8 changelog: (1) Security implementation for libqnio present in branch 'securify'. Please use 'securify' branch for building libqnio and testing with this patch. (2) Renamed libqnio to libvxhs. (3) Pass instance ID to libvxhs for SSL authentication. v7 changelog: (1) IO failover code has moved out to the libqnio library. (2) Fixes for issues reported by Stefan on v6. (3) Incorporated the QEMUBH patch provided by Stefan. This is a replacement for the pipe mechanism used earlier. (4) Fixes to the buffer overflows reported in libqnio. (5) Input validations in vxhs.c to prevent any buffer overflows for arguments passed to libqnio. v6 changelog: (1) Added qemu-iotests for VxHS as a new patch in the series. (2) Replaced release version from 2.8 to 2.9 in block-core.json. v5 changelog: (1) Incorporated v4 review comments. v4 changelog: (1) Incorporated v3 review comments on QAPI changes. (2) Added refcounting for device open/close. Free library resources on last device close. v3 changelog: (1) Added QAPI schema for the VxHS driver. v2 changelog: (1) Changes done in response to v1 comments. block/Makefile.objs | 2 + block/trace-events | 17 ++ block/vxhs.c | 595 +++++++++++++++++++++++++++++++++++++++++++++++++++ configure | 39 ++++ qapi/block-core.json | 22 +- 5 files changed, 673 insertions(+), 2 deletions(-) create mode 100644 block/vxhs.c