]>
Commit | Line | Data |
---|---|---|
8d6d89cb BR |
1 | /* |
2 | * GlusterFS backend for QEMU | |
3 | * | |
4 | * Copyright (C) 2012 Bharata B Rao <[email protected]> | |
5 | * | |
85c09bc0 BR |
6 | * This work is licensed under the terms of the GNU GPL, version 2 or later. |
7 | * See the COPYING file in the top-level directory. | |
8d6d89cb | 8 | * |
8d6d89cb | 9 | */ |
922a01a0 | 10 | |
80c71a24 | 11 | #include "qemu/osdep.h" |
de23e72b | 12 | #include "qemu/units.h" |
8d6d89cb | 13 | #include <glusterfs/api/glfs.h> |
737e150e | 14 | #include "block/block_int.h" |
609f45ea | 15 | #include "block/qdict.h" |
da34e65c | 16 | #include "qapi/error.h" |
452fcdbc | 17 | #include "qapi/qmp/qdict.h" |
6c7189bb | 18 | #include "qapi/qmp/qerror.h" |
1de7afc9 | 19 | #include "qemu/uri.h" |
0552ff24 | 20 | #include "qemu/error-report.h" |
0b8fa32f | 21 | #include "qemu/module.h" |
922a01a0 | 22 | #include "qemu/option.h" |
c56ac33b | 23 | #include "qemu/cutils.h" |
8d6d89cb | 24 | |
e014dbe7 PKK |
25 | #ifdef CONFIG_GLUSTERFS_FTRUNCATE_HAS_STAT |
26 | # define glfs_ftruncate(fd, offset) glfs_ftruncate(fd, offset, NULL, NULL) | |
27 | #endif | |
28 | ||
f70c50c8 | 29 | #define GLUSTER_OPT_FILENAME "filename" |
6c7189bb PKK |
30 | #define GLUSTER_OPT_VOLUME "volume" |
31 | #define GLUSTER_OPT_PATH "path" | |
32 | #define GLUSTER_OPT_TYPE "type" | |
33 | #define GLUSTER_OPT_SERVER_PATTERN "server." | |
34 | #define GLUSTER_OPT_HOST "host" | |
35 | #define GLUSTER_OPT_PORT "port" | |
36 | #define GLUSTER_OPT_TO "to" | |
37 | #define GLUSTER_OPT_IPV4 "ipv4" | |
38 | #define GLUSTER_OPT_IPV6 "ipv6" | |
39 | #define GLUSTER_OPT_SOCKET "socket" | |
f70c50c8 | 40 | #define GLUSTER_OPT_DEBUG "debug" |
7edac2dd | 41 | #define GLUSTER_DEFAULT_PORT 24007 |
f70c50c8 PKK |
42 | #define GLUSTER_DEBUG_DEFAULT 4 |
43 | #define GLUSTER_DEBUG_MAX 9 | |
e9db8ff3 PKK |
44 | #define GLUSTER_OPT_LOGFILE "logfile" |
45 | #define GLUSTER_LOGFILE_DEFAULT "-" /* handled in libgfapi as /dev/stderr */ | |
de23e72b SG |
46 | /* |
47 | * Several versions of GlusterFS (3.12? -> 6.0.1) fail when the transfer size | |
48 | * is greater or equal to 1024 MiB, so we are limiting the transfer size to 512 | |
49 | * MiB to avoid this rare issue. | |
50 | */ | |
51 | #define GLUSTER_MAX_TRANSFER (512 * MiB) | |
f70c50c8 | 52 | |
6c7189bb | 53 | #define GERR_INDEX_HINT "hint: check in 'server' array index '%d'\n" |
f70c50c8 | 54 | |
8d6d89cb | 55 | typedef struct GlusterAIOCB { |
8d6d89cb BR |
56 | int64_t size; |
57 | int ret; | |
15744b0b | 58 | Coroutine *coroutine; |
6ee50af2 | 59 | AioContext *aio_context; |
8d6d89cb BR |
60 | } GlusterAIOCB; |
61 | ||
62 | typedef struct BDRVGlusterState { | |
63 | struct glfs *glfs; | |
8d6d89cb | 64 | struct glfs_fd *fd; |
e9db8ff3 | 65 | char *logfile; |
947eb203 | 66 | bool supports_seek_data; |
1a417e46 | 67 | int debug; |
8d6d89cb BR |
68 | } BDRVGlusterState; |
69 | ||
f70c50c8 PKK |
70 | typedef struct BDRVGlusterReopenState { |
71 | struct glfs *glfs; | |
72 | struct glfs_fd *fd; | |
73 | } BDRVGlusterReopenState; | |
74 | ||
f70c50c8 | 75 | |
6349c154 PKK |
76 | typedef struct GlfsPreopened { |
77 | char *volume; | |
78 | glfs_t *fs; | |
79 | int ref; | |
80 | } GlfsPreopened; | |
81 | ||
82 | typedef struct ListElement { | |
83 | QLIST_ENTRY(ListElement) list; | |
84 | GlfsPreopened saved; | |
85 | } ListElement; | |
86 | ||
b58deb34 | 87 | static QLIST_HEAD(, ListElement) glfs_list; |
6349c154 | 88 | |
f70c50c8 PKK |
89 | static QemuOptsList qemu_gluster_create_opts = { |
90 | .name = "qemu-gluster-create-opts", | |
91 | .head = QTAILQ_HEAD_INITIALIZER(qemu_gluster_create_opts.head), | |
92 | .desc = { | |
93 | { | |
94 | .name = BLOCK_OPT_SIZE, | |
95 | .type = QEMU_OPT_SIZE, | |
96 | .help = "Virtual disk size" | |
97 | }, | |
98 | { | |
99 | .name = BLOCK_OPT_PREALLOC, | |
100 | .type = QEMU_OPT_STRING, | |
2ea8e96d SG |
101 | .help = "Preallocation mode (allowed values: off" |
102 | #ifdef CONFIG_GLUSTERFS_FALLOCATE | |
103 | ", falloc" | |
104 | #endif | |
105 | #ifdef CONFIG_GLUSTERFS_ZEROFILL | |
106 | ", full" | |
107 | #endif | |
108 | ")" | |
f70c50c8 PKK |
109 | }, |
110 | { | |
111 | .name = GLUSTER_OPT_DEBUG, | |
112 | .type = QEMU_OPT_NUMBER, | |
113 | .help = "Gluster log level, valid range is 0-9", | |
114 | }, | |
e9db8ff3 PKK |
115 | { |
116 | .name = GLUSTER_OPT_LOGFILE, | |
117 | .type = QEMU_OPT_STRING, | |
118 | .help = "Logfile path of libgfapi", | |
119 | }, | |
f70c50c8 PKK |
120 | { /* end of list */ } |
121 | } | |
122 | }; | |
123 | ||
124 | static QemuOptsList runtime_opts = { | |
125 | .name = "gluster", | |
126 | .head = QTAILQ_HEAD_INITIALIZER(runtime_opts.head), | |
127 | .desc = { | |
128 | { | |
129 | .name = GLUSTER_OPT_FILENAME, | |
130 | .type = QEMU_OPT_STRING, | |
131 | .help = "URL to the gluster image", | |
132 | }, | |
133 | { | |
134 | .name = GLUSTER_OPT_DEBUG, | |
135 | .type = QEMU_OPT_NUMBER, | |
136 | .help = "Gluster log level, valid range is 0-9", | |
137 | }, | |
e9db8ff3 PKK |
138 | { |
139 | .name = GLUSTER_OPT_LOGFILE, | |
140 | .type = QEMU_OPT_STRING, | |
141 | .help = "Logfile path of libgfapi", | |
142 | }, | |
f70c50c8 PKK |
143 | { /* end of list */ } |
144 | }, | |
145 | }; | |
146 | ||
6c7189bb PKK |
147 | static QemuOptsList runtime_json_opts = { |
148 | .name = "gluster_json", | |
149 | .head = QTAILQ_HEAD_INITIALIZER(runtime_json_opts.head), | |
150 | .desc = { | |
151 | { | |
152 | .name = GLUSTER_OPT_VOLUME, | |
153 | .type = QEMU_OPT_STRING, | |
154 | .help = "name of gluster volume where VM image resides", | |
155 | }, | |
156 | { | |
157 | .name = GLUSTER_OPT_PATH, | |
158 | .type = QEMU_OPT_STRING, | |
159 | .help = "absolute path to image file in gluster volume", | |
160 | }, | |
161 | { | |
162 | .name = GLUSTER_OPT_DEBUG, | |
163 | .type = QEMU_OPT_NUMBER, | |
164 | .help = "Gluster log level, valid range is 0-9", | |
165 | }, | |
166 | { /* end of list */ } | |
167 | }, | |
168 | }; | |
169 | ||
170 | static QemuOptsList runtime_type_opts = { | |
171 | .name = "gluster_type", | |
172 | .head = QTAILQ_HEAD_INITIALIZER(runtime_type_opts.head), | |
173 | .desc = { | |
174 | { | |
175 | .name = GLUSTER_OPT_TYPE, | |
176 | .type = QEMU_OPT_STRING, | |
c5f1ae3a | 177 | .help = "inet|unix", |
6c7189bb PKK |
178 | }, |
179 | { /* end of list */ } | |
180 | }, | |
181 | }; | |
182 | ||
183 | static QemuOptsList runtime_unix_opts = { | |
184 | .name = "gluster_unix", | |
185 | .head = QTAILQ_HEAD_INITIALIZER(runtime_unix_opts.head), | |
186 | .desc = { | |
187 | { | |
188 | .name = GLUSTER_OPT_SOCKET, | |
189 | .type = QEMU_OPT_STRING, | |
9dae635a KW |
190 | .help = "socket file path (legacy)", |
191 | }, | |
192 | { | |
193 | .name = GLUSTER_OPT_PATH, | |
194 | .type = QEMU_OPT_STRING, | |
195 | .help = "socket file path (QAPI)", | |
6c7189bb PKK |
196 | }, |
197 | { /* end of list */ } | |
198 | }, | |
199 | }; | |
200 | ||
c5f1ae3a MA |
201 | static QemuOptsList runtime_inet_opts = { |
202 | .name = "gluster_inet", | |
203 | .head = QTAILQ_HEAD_INITIALIZER(runtime_inet_opts.head), | |
6c7189bb PKK |
204 | .desc = { |
205 | { | |
206 | .name = GLUSTER_OPT_TYPE, | |
207 | .type = QEMU_OPT_STRING, | |
c5f1ae3a | 208 | .help = "inet|unix", |
6c7189bb PKK |
209 | }, |
210 | { | |
211 | .name = GLUSTER_OPT_HOST, | |
212 | .type = QEMU_OPT_STRING, | |
213 | .help = "host address (hostname/ipv4/ipv6 addresses)", | |
214 | }, | |
215 | { | |
216 | .name = GLUSTER_OPT_PORT, | |
53d9837f | 217 | .type = QEMU_OPT_STRING, |
6c7189bb PKK |
218 | .help = "port number on which glusterd is listening (default 24007)", |
219 | }, | |
220 | { | |
221 | .name = "to", | |
222 | .type = QEMU_OPT_NUMBER, | |
223 | .help = "max port number, not supported by gluster", | |
224 | }, | |
225 | { | |
226 | .name = "ipv4", | |
227 | .type = QEMU_OPT_BOOL, | |
228 | .help = "ipv4 bool value, not supported by gluster", | |
229 | }, | |
230 | { | |
231 | .name = "ipv6", | |
232 | .type = QEMU_OPT_BOOL, | |
233 | .help = "ipv6 bool value, not supported by gluster", | |
234 | }, | |
235 | { /* end of list */ } | |
236 | }, | |
237 | }; | |
f70c50c8 | 238 | |
6349c154 PKK |
239 | static void glfs_set_preopened(const char *volume, glfs_t *fs) |
240 | { | |
241 | ListElement *entry = NULL; | |
242 | ||
243 | entry = g_new(ListElement, 1); | |
244 | ||
245 | entry->saved.volume = g_strdup(volume); | |
246 | ||
247 | entry->saved.fs = fs; | |
248 | entry->saved.ref = 1; | |
249 | ||
250 | QLIST_INSERT_HEAD(&glfs_list, entry, list); | |
251 | } | |
252 | ||
253 | static glfs_t *glfs_find_preopened(const char *volume) | |
254 | { | |
255 | ListElement *entry = NULL; | |
256 | ||
257 | QLIST_FOREACH(entry, &glfs_list, list) { | |
258 | if (strcmp(entry->saved.volume, volume) == 0) { | |
259 | entry->saved.ref++; | |
260 | return entry->saved.fs; | |
261 | } | |
262 | } | |
263 | ||
264 | return NULL; | |
265 | } | |
266 | ||
267 | static void glfs_clear_preopened(glfs_t *fs) | |
268 | { | |
269 | ListElement *entry = NULL; | |
668c0e44 | 270 | ListElement *next; |
6349c154 PKK |
271 | |
272 | if (fs == NULL) { | |
273 | return; | |
274 | } | |
275 | ||
668c0e44 | 276 | QLIST_FOREACH_SAFE(entry, &glfs_list, list, next) { |
6349c154 PKK |
277 | if (entry->saved.fs == fs) { |
278 | if (--entry->saved.ref) { | |
279 | return; | |
280 | } | |
281 | ||
282 | QLIST_REMOVE(entry, list); | |
283 | ||
284 | glfs_fini(entry->saved.fs); | |
285 | g_free(entry->saved.volume); | |
286 | g_free(entry); | |
287 | } | |
288 | } | |
289 | } | |
290 | ||
7edac2dd | 291 | static int parse_volume_options(BlockdevOptionsGluster *gconf, char *path) |
8d6d89cb BR |
292 | { |
293 | char *p, *q; | |
294 | ||
295 | if (!path) { | |
296 | return -EINVAL; | |
297 | } | |
298 | ||
299 | /* volume */ | |
300 | p = q = path + strspn(path, "/"); | |
301 | p += strcspn(p, "/"); | |
302 | if (*p == '\0') { | |
303 | return -EINVAL; | |
304 | } | |
d5cf4079 | 305 | gconf->volume = g_strndup(q, p - q); |
8d6d89cb | 306 | |
d5cf4079 | 307 | /* path */ |
8d6d89cb BR |
308 | p += strspn(p, "/"); |
309 | if (*p == '\0') { | |
310 | return -EINVAL; | |
311 | } | |
d5cf4079 | 312 | gconf->path = g_strdup(p); |
8d6d89cb BR |
313 | return 0; |
314 | } | |
315 | ||
316 | /* | |
d5cf4079 | 317 | * file=gluster[+transport]://[host[:port]]/volume/path[?socket=...] |
8d6d89cb BR |
318 | * |
319 | * 'gluster' is the protocol. | |
320 | * | |
321 | * 'transport' specifies the transport type used to connect to gluster | |
322 | * management daemon (glusterd). Valid transport types are | |
0552ff24 | 323 | * tcp or unix. If a transport type isn't specified, then tcp type is assumed. |
8d6d89cb | 324 | * |
d5cf4079 | 325 | * 'host' specifies the host where the volume file specification for |
0552ff24 | 326 | * the given volume resides. This can be either hostname or ipv4 address. |
d5cf4079 | 327 | * If transport type is 'unix', then 'host' field should not be specified. |
8d6d89cb BR |
328 | * The 'socket' field needs to be populated with the path to unix domain |
329 | * socket. | |
330 | * | |
331 | * 'port' is the port number on which glusterd is listening. This is optional | |
332 | * and if not specified, QEMU will send 0 which will make gluster to use the | |
333 | * default port. If the transport type is unix, then 'port' should not be | |
334 | * specified. | |
335 | * | |
d5cf4079 | 336 | * 'volume' is the name of the gluster volume which contains the VM image. |
8d6d89cb | 337 | * |
d5cf4079 | 338 | * 'path' is the path to the actual VM image that resides on gluster volume. |
8d6d89cb BR |
339 | * |
340 | * Examples: | |
341 | * | |
342 | * file=gluster://1.2.3.4/testvol/a.img | |
343 | * file=gluster+tcp://1.2.3.4/testvol/a.img | |
344 | * file=gluster+tcp://1.2.3.4:24007/testvol/dir/a.img | |
d5cf4079 | 345 | * file=gluster+tcp://host.domain.com:24007/testvol/dir/a.img |
8d6d89cb | 346 | * file=gluster+unix:///testvol/dir/a.img?socket=/tmp/glusterd.socket |
8d6d89cb | 347 | */ |
7edac2dd PKK |
348 | static int qemu_gluster_parse_uri(BlockdevOptionsGluster *gconf, |
349 | const char *filename) | |
8d6d89cb | 350 | { |
62cf396b | 351 | SocketAddress *gsconf; |
8d6d89cb BR |
352 | URI *uri; |
353 | QueryParams *qp = NULL; | |
354 | bool is_unix = false; | |
355 | int ret = 0; | |
356 | ||
357 | uri = uri_parse(filename); | |
358 | if (!uri) { | |
359 | return -EINVAL; | |
360 | } | |
361 | ||
62cf396b MA |
362 | gconf->server = g_new0(SocketAddressList, 1); |
363 | gconf->server->value = gsconf = g_new0(SocketAddress, 1); | |
7edac2dd | 364 | |
8d6d89cb | 365 | /* transport */ |
24897a76 | 366 | if (!uri->scheme || !strcmp(uri->scheme, "gluster")) { |
62cf396b | 367 | gsconf->type = SOCKET_ADDRESS_TYPE_INET; |
8d6d89cb | 368 | } else if (!strcmp(uri->scheme, "gluster+tcp")) { |
62cf396b | 369 | gsconf->type = SOCKET_ADDRESS_TYPE_INET; |
8d6d89cb | 370 | } else if (!strcmp(uri->scheme, "gluster+unix")) { |
62cf396b | 371 | gsconf->type = SOCKET_ADDRESS_TYPE_UNIX; |
8d6d89cb BR |
372 | is_unix = true; |
373 | } else if (!strcmp(uri->scheme, "gluster+rdma")) { | |
62cf396b | 374 | gsconf->type = SOCKET_ADDRESS_TYPE_INET; |
3dc6f869 | 375 | warn_report("rdma feature is not supported, falling back to tcp"); |
8d6d89cb BR |
376 | } else { |
377 | ret = -EINVAL; | |
378 | goto out; | |
379 | } | |
380 | ||
381 | ret = parse_volume_options(gconf, uri->path); | |
382 | if (ret < 0) { | |
383 | goto out; | |
384 | } | |
385 | ||
386 | qp = query_params_parse(uri->query); | |
387 | if (qp->n > 1 || (is_unix && !qp->n) || (!is_unix && qp->n)) { | |
388 | ret = -EINVAL; | |
389 | goto out; | |
390 | } | |
391 | ||
392 | if (is_unix) { | |
393 | if (uri->server || uri->port) { | |
394 | ret = -EINVAL; | |
395 | goto out; | |
396 | } | |
397 | if (strcmp(qp->p[0].name, "socket")) { | |
398 | ret = -EINVAL; | |
399 | goto out; | |
400 | } | |
7edac2dd | 401 | gsconf->u.q_unix.path = g_strdup(qp->p[0].value); |
8d6d89cb | 402 | } else { |
c5f1ae3a | 403 | gsconf->u.inet.host = g_strdup(uri->server ? uri->server : "localhost"); |
7edac2dd | 404 | if (uri->port) { |
c5f1ae3a | 405 | gsconf->u.inet.port = g_strdup_printf("%d", uri->port); |
7edac2dd | 406 | } else { |
c5f1ae3a | 407 | gsconf->u.inet.port = g_strdup_printf("%d", GLUSTER_DEFAULT_PORT); |
7edac2dd | 408 | } |
8d6d89cb BR |
409 | } |
410 | ||
411 | out: | |
412 | if (qp) { | |
413 | query_params_free(qp); | |
414 | } | |
415 | uri_free(uri); | |
416 | return ret; | |
417 | } | |
418 | ||
6c7189bb PKK |
419 | static struct glfs *qemu_gluster_glfs_init(BlockdevOptionsGluster *gconf, |
420 | Error **errp) | |
8d6d89cb | 421 | { |
6c7189bb | 422 | struct glfs *glfs; |
8d6d89cb BR |
423 | int ret; |
424 | int old_errno; | |
62cf396b | 425 | SocketAddressList *server; |
c56ac33b | 426 | unsigned long long port; |
8d6d89cb | 427 | |
6349c154 PKK |
428 | glfs = glfs_find_preopened(gconf->volume); |
429 | if (glfs) { | |
430 | return glfs; | |
431 | } | |
432 | ||
d5cf4079 | 433 | glfs = glfs_new(gconf->volume); |
8d6d89cb BR |
434 | if (!glfs) { |
435 | goto out; | |
436 | } | |
437 | ||
6349c154 PKK |
438 | glfs_set_preopened(gconf->volume, glfs); |
439 | ||
6c7189bb | 440 | for (server = gconf->server; server; server = server->next) { |
fce5d538 | 441 | switch (server->value->type) { |
62cf396b | 442 | case SOCKET_ADDRESS_TYPE_UNIX: |
fc29458d | 443 | ret = glfs_set_volfile_server(glfs, "unix", |
6c7189bb | 444 | server->value->u.q_unix.path, 0); |
fce5d538 | 445 | break; |
62cf396b | 446 | case SOCKET_ADDRESS_TYPE_INET: |
c5f1ae3a | 447 | if (parse_uint_full(server->value->u.inet.port, &port, 10) < 0 || |
c56ac33b PKK |
448 | port > 65535) { |
449 | error_setg(errp, "'%s' is not a valid port number", | |
c5f1ae3a | 450 | server->value->u.inet.port); |
c56ac33b PKK |
451 | errno = EINVAL; |
452 | goto out; | |
453 | } | |
fc29458d | 454 | ret = glfs_set_volfile_server(glfs, "tcp", |
c5f1ae3a | 455 | server->value->u.inet.host, |
c56ac33b | 456 | (int)port); |
fce5d538 | 457 | break; |
62cf396b MA |
458 | case SOCKET_ADDRESS_TYPE_VSOCK: |
459 | case SOCKET_ADDRESS_TYPE_FD: | |
fce5d538 MA |
460 | default: |
461 | abort(); | |
6c7189bb PKK |
462 | } |
463 | ||
464 | if (ret < 0) { | |
465 | goto out; | |
466 | } | |
8d6d89cb BR |
467 | } |
468 | ||
1a417e46 | 469 | ret = glfs_set_logging(glfs, gconf->logfile, gconf->debug); |
8d6d89cb BR |
470 | if (ret < 0) { |
471 | goto out; | |
472 | } | |
473 | ||
474 | ret = glfs_init(glfs); | |
475 | if (ret) { | |
6c7189bb PKK |
476 | error_setg(errp, "Gluster connection for volume %s, path %s failed" |
477 | " to connect", gconf->volume, gconf->path); | |
478 | for (server = gconf->server; server; server = server->next) { | |
62cf396b | 479 | if (server->value->type == SOCKET_ADDRESS_TYPE_UNIX) { |
6c7189bb PKK |
480 | error_append_hint(errp, "hint: failed on socket %s ", |
481 | server->value->u.q_unix.path); | |
482 | } else { | |
483 | error_append_hint(errp, "hint: failed on host %s and port %s ", | |
c5f1ae3a MA |
484 | server->value->u.inet.host, |
485 | server->value->u.inet.port); | |
6c7189bb | 486 | } |
7edac2dd | 487 | } |
4557117d | 488 | |
6c7189bb PKK |
489 | error_append_hint(errp, "Please refer to gluster logs for more info\n"); |
490 | ||
4557117d | 491 | /* glfs_init sometimes doesn't set errno although docs suggest that */ |
7edac2dd | 492 | if (errno == 0) { |
4557117d | 493 | errno = EINVAL; |
7edac2dd | 494 | } |
4557117d | 495 | |
8d6d89cb BR |
496 | goto out; |
497 | } | |
498 | return glfs; | |
499 | ||
500 | out: | |
501 | if (glfs) { | |
502 | old_errno = errno; | |
6349c154 | 503 | glfs_clear_preopened(glfs); |
8d6d89cb BR |
504 | errno = old_errno; |
505 | } | |
506 | return NULL; | |
507 | } | |
508 | ||
6c7189bb PKK |
509 | /* |
510 | * Convert the json formatted command line into qapi. | |
511 | */ | |
512 | static int qemu_gluster_parse_json(BlockdevOptionsGluster *gconf, | |
513 | QDict *options, Error **errp) | |
514 | { | |
515 | QemuOpts *opts; | |
62cf396b MA |
516 | SocketAddress *gsconf = NULL; |
517 | SocketAddressList *curr = NULL; | |
6c7189bb PKK |
518 | QDict *backing_options = NULL; |
519 | Error *local_err = NULL; | |
520 | char *str = NULL; | |
521 | const char *ptr; | |
56faeb9b | 522 | int i, type, num_servers; |
6c7189bb PKK |
523 | |
524 | /* create opts info from runtime_json_opts list */ | |
525 | opts = qemu_opts_create(&runtime_json_opts, NULL, 0, &error_abort); | |
526 | qemu_opts_absorb_qdict(opts, options, &local_err); | |
527 | if (local_err) { | |
528 | goto out; | |
529 | } | |
530 | ||
531 | num_servers = qdict_array_entries(options, GLUSTER_OPT_SERVER_PATTERN); | |
532 | if (num_servers < 1) { | |
533 | error_setg(&local_err, QERR_MISSING_PARAMETER, "server"); | |
534 | goto out; | |
535 | } | |
536 | ||
537 | ptr = qemu_opt_get(opts, GLUSTER_OPT_VOLUME); | |
538 | if (!ptr) { | |
539 | error_setg(&local_err, QERR_MISSING_PARAMETER, GLUSTER_OPT_VOLUME); | |
540 | goto out; | |
541 | } | |
542 | gconf->volume = g_strdup(ptr); | |
543 | ||
544 | ptr = qemu_opt_get(opts, GLUSTER_OPT_PATH); | |
545 | if (!ptr) { | |
546 | error_setg(&local_err, QERR_MISSING_PARAMETER, GLUSTER_OPT_PATH); | |
547 | goto out; | |
548 | } | |
549 | gconf->path = g_strdup(ptr); | |
550 | qemu_opts_del(opts); | |
551 | ||
552 | for (i = 0; i < num_servers; i++) { | |
553 | str = g_strdup_printf(GLUSTER_OPT_SERVER_PATTERN"%d.", i); | |
554 | qdict_extract_subqdict(options, &backing_options, str); | |
555 | ||
556 | /* create opts info from runtime_type_opts list */ | |
557 | opts = qemu_opts_create(&runtime_type_opts, NULL, 0, &error_abort); | |
558 | qemu_opts_absorb_qdict(opts, backing_options, &local_err); | |
559 | if (local_err) { | |
560 | goto out; | |
561 | } | |
562 | ||
563 | ptr = qemu_opt_get(opts, GLUSTER_OPT_TYPE); | |
6c7189bb PKK |
564 | if (!ptr) { |
565 | error_setg(&local_err, QERR_MISSING_PARAMETER, GLUSTER_OPT_TYPE); | |
566 | error_append_hint(&local_err, GERR_INDEX_HINT, i); | |
567 | goto out; | |
568 | ||
569 | } | |
62cf396b | 570 | gsconf = g_new0(SocketAddress, 1); |
c5f1ae3a MA |
571 | if (!strcmp(ptr, "tcp")) { |
572 | ptr = "inet"; /* accept legacy "tcp" */ | |
573 | } | |
f7abe0ec | 574 | type = qapi_enum_parse(&SocketAddressType_lookup, ptr, -1, NULL); |
62cf396b MA |
575 | if (type != SOCKET_ADDRESS_TYPE_INET |
576 | && type != SOCKET_ADDRESS_TYPE_UNIX) { | |
fce5d538 MA |
577 | error_setg(&local_err, |
578 | "Parameter '%s' may be 'inet' or 'unix'", | |
579 | GLUSTER_OPT_TYPE); | |
6c7189bb PKK |
580 | error_append_hint(&local_err, GERR_INDEX_HINT, i); |
581 | goto out; | |
582 | } | |
fce5d538 | 583 | gsconf->type = type; |
6c7189bb PKK |
584 | qemu_opts_del(opts); |
585 | ||
62cf396b | 586 | if (gsconf->type == SOCKET_ADDRESS_TYPE_INET) { |
c5f1ae3a MA |
587 | /* create opts info from runtime_inet_opts list */ |
588 | opts = qemu_opts_create(&runtime_inet_opts, NULL, 0, &error_abort); | |
6c7189bb PKK |
589 | qemu_opts_absorb_qdict(opts, backing_options, &local_err); |
590 | if (local_err) { | |
591 | goto out; | |
592 | } | |
593 | ||
594 | ptr = qemu_opt_get(opts, GLUSTER_OPT_HOST); | |
595 | if (!ptr) { | |
596 | error_setg(&local_err, QERR_MISSING_PARAMETER, | |
597 | GLUSTER_OPT_HOST); | |
598 | error_append_hint(&local_err, GERR_INDEX_HINT, i); | |
599 | goto out; | |
600 | } | |
c5f1ae3a | 601 | gsconf->u.inet.host = g_strdup(ptr); |
6c7189bb PKK |
602 | ptr = qemu_opt_get(opts, GLUSTER_OPT_PORT); |
603 | if (!ptr) { | |
604 | error_setg(&local_err, QERR_MISSING_PARAMETER, | |
605 | GLUSTER_OPT_PORT); | |
606 | error_append_hint(&local_err, GERR_INDEX_HINT, i); | |
607 | goto out; | |
608 | } | |
c5f1ae3a | 609 | gsconf->u.inet.port = g_strdup(ptr); |
6c7189bb PKK |
610 | |
611 | /* defend for unsupported fields in InetSocketAddress, | |
612 | * i.e. @ipv4, @ipv6 and @to | |
613 | */ | |
614 | ptr = qemu_opt_get(opts, GLUSTER_OPT_TO); | |
615 | if (ptr) { | |
c5f1ae3a | 616 | gsconf->u.inet.has_to = true; |
6c7189bb PKK |
617 | } |
618 | ptr = qemu_opt_get(opts, GLUSTER_OPT_IPV4); | |
619 | if (ptr) { | |
c5f1ae3a | 620 | gsconf->u.inet.has_ipv4 = true; |
6c7189bb PKK |
621 | } |
622 | ptr = qemu_opt_get(opts, GLUSTER_OPT_IPV6); | |
623 | if (ptr) { | |
c5f1ae3a | 624 | gsconf->u.inet.has_ipv6 = true; |
6c7189bb | 625 | } |
c5f1ae3a | 626 | if (gsconf->u.inet.has_to) { |
6c7189bb PKK |
627 | error_setg(&local_err, "Parameter 'to' not supported"); |
628 | goto out; | |
629 | } | |
c5f1ae3a | 630 | if (gsconf->u.inet.has_ipv4 || gsconf->u.inet.has_ipv6) { |
6c7189bb PKK |
631 | error_setg(&local_err, "Parameters 'ipv4/ipv6' not supported"); |
632 | goto out; | |
633 | } | |
634 | qemu_opts_del(opts); | |
635 | } else { | |
636 | /* create opts info from runtime_unix_opts list */ | |
637 | opts = qemu_opts_create(&runtime_unix_opts, NULL, 0, &error_abort); | |
638 | qemu_opts_absorb_qdict(opts, backing_options, &local_err); | |
639 | if (local_err) { | |
640 | goto out; | |
641 | } | |
642 | ||
9dae635a KW |
643 | ptr = qemu_opt_get(opts, GLUSTER_OPT_PATH); |
644 | if (!ptr) { | |
645 | ptr = qemu_opt_get(opts, GLUSTER_OPT_SOCKET); | |
646 | } else if (qemu_opt_get(opts, GLUSTER_OPT_SOCKET)) { | |
647 | error_setg(&local_err, | |
648 | "Conflicting parameters 'path' and 'socket'"); | |
649 | error_append_hint(&local_err, GERR_INDEX_HINT, i); | |
650 | goto out; | |
651 | } | |
6c7189bb PKK |
652 | if (!ptr) { |
653 | error_setg(&local_err, QERR_MISSING_PARAMETER, | |
9dae635a | 654 | GLUSTER_OPT_PATH); |
6c7189bb PKK |
655 | error_append_hint(&local_err, GERR_INDEX_HINT, i); |
656 | goto out; | |
657 | } | |
658 | gsconf->u.q_unix.path = g_strdup(ptr); | |
659 | qemu_opts_del(opts); | |
660 | } | |
661 | ||
662 | if (gconf->server == NULL) { | |
62cf396b | 663 | gconf->server = g_new0(SocketAddressList, 1); |
6c7189bb PKK |
664 | gconf->server->value = gsconf; |
665 | curr = gconf->server; | |
666 | } else { | |
62cf396b | 667 | curr->next = g_new0(SocketAddressList, 1); |
6c7189bb PKK |
668 | curr->next->value = gsconf; |
669 | curr = curr->next; | |
670 | } | |
85a82e85 | 671 | gsconf = NULL; |
6c7189bb | 672 | |
cb3e7f08 | 673 | qobject_unref(backing_options); |
85a82e85 | 674 | backing_options = NULL; |
6c7189bb PKK |
675 | g_free(str); |
676 | str = NULL; | |
677 | } | |
678 | ||
679 | return 0; | |
680 | ||
681 | out: | |
682 | error_propagate(errp, local_err); | |
62cf396b | 683 | qapi_free_SocketAddress(gsconf); |
6c7189bb | 684 | qemu_opts_del(opts); |
85a82e85 | 685 | g_free(str); |
cb3e7f08 | 686 | qobject_unref(backing_options); |
6c7189bb PKK |
687 | errno = EINVAL; |
688 | return -errno; | |
689 | } | |
690 | ||
ab8bda76 KW |
691 | /* Converts options given in @filename and the @options QDict into the QAPI |
692 | * object @gconf. */ | |
693 | static int qemu_gluster_parse(BlockdevOptionsGluster *gconf, | |
694 | const char *filename, | |
695 | QDict *options, Error **errp) | |
6c7189bb PKK |
696 | { |
697 | int ret; | |
698 | if (filename) { | |
699 | ret = qemu_gluster_parse_uri(gconf, filename); | |
700 | if (ret < 0) { | |
44acd46f | 701 | error_setg(errp, "invalid URI %s", filename); |
6c7189bb | 702 | error_append_hint(errp, "Usage: file=gluster[+transport]://" |
e9db8ff3 PKK |
703 | "[host[:port]]volume/path[?socket=...]" |
704 | "[,file.debug=N]" | |
705 | "[,file.logfile=/path/filename.log]\n"); | |
ab8bda76 | 706 | return ret; |
6c7189bb PKK |
707 | } |
708 | } else { | |
709 | ret = qemu_gluster_parse_json(gconf, options, errp); | |
710 | if (ret < 0) { | |
711 | error_append_hint(errp, "Usage: " | |
712 | "-drive driver=qcow2,file.driver=gluster," | |
713 | "file.volume=testvol,file.path=/path/a.qcow2" | |
e9db8ff3 PKK |
714 | "[,file.debug=9]" |
715 | "[,file.logfile=/path/filename.log]," | |
c5f1ae3a | 716 | "file.server.0.type=inet," |
6c7189bb PKK |
717 | "file.server.0.host=1.2.3.4," |
718 | "file.server.0.port=24007," | |
719 | "file.server.1.transport=unix," | |
9dae635a | 720 | "file.server.1.path=/var/run/glusterd.socket ..." |
6c7189bb | 721 | "\n"); |
ab8bda76 | 722 | return ret; |
6c7189bb | 723 | } |
ab8bda76 | 724 | } |
6c7189bb | 725 | |
ab8bda76 KW |
726 | return 0; |
727 | } | |
728 | ||
729 | static struct glfs *qemu_gluster_init(BlockdevOptionsGluster *gconf, | |
730 | const char *filename, | |
731 | QDict *options, Error **errp) | |
732 | { | |
733 | int ret; | |
734 | ||
735 | ret = qemu_gluster_parse(gconf, filename, options, errp); | |
736 | if (ret < 0) { | |
737 | errno = -ret; | |
738 | return NULL; | |
6c7189bb PKK |
739 | } |
740 | ||
741 | return qemu_gluster_glfs_init(gconf, errp); | |
742 | } | |
743 | ||
7c815372 BR |
744 | /* |
745 | * AIO callback routine called from GlusterFS thread. | |
746 | */ | |
0e3b891f NV |
747 | static void gluster_finish_aiocb(struct glfs_fd *fd, ssize_t ret, |
748 | #ifdef CONFIG_GLUSTERFS_IOCB_HAS_STAT | |
749 | struct glfs_stat *pre, struct glfs_stat *post, | |
750 | #endif | |
751 | void *arg) | |
7c815372 BR |
752 | { |
753 | GlusterAIOCB *acb = (GlusterAIOCB *)arg; | |
754 | ||
755 | if (!ret || ret == acb->size) { | |
756 | acb->ret = 0; /* Success */ | |
757 | } else if (ret < 0) { | |
a8827453 | 758 | acb->ret = -errno; /* Read/Write failed */ |
7c815372 BR |
759 | } else { |
760 | acb->ret = -EIO; /* Partial read/write - fail it */ | |
761 | } | |
762 | ||
1919631e | 763 | aio_co_schedule(acb->aio_context, acb->coroutine); |
7c815372 BR |
764 | } |
765 | ||
1b37b344 JC |
766 | static void qemu_gluster_parse_flags(int bdrv_flags, int *open_flags) |
767 | { | |
768 | assert(open_flags != NULL); | |
769 | ||
770 | *open_flags |= O_BINARY; | |
771 | ||
772 | if (bdrv_flags & BDRV_O_RDWR) { | |
773 | *open_flags |= O_RDWR; | |
774 | } else { | |
775 | *open_flags |= O_RDONLY; | |
776 | } | |
777 | ||
778 | if ((bdrv_flags & BDRV_O_NOCACHE)) { | |
779 | *open_flags |= O_DIRECT; | |
780 | } | |
781 | } | |
782 | ||
947eb203 NV |
783 | /* |
784 | * Do SEEK_DATA/HOLE to detect if it is functional. Older broken versions of | |
785 | * gfapi incorrectly return the current offset when SEEK_DATA/HOLE is used. | |
786 | * - Corrected versions return -1 and set errno to EINVAL. | |
787 | * - Versions that support SEEK_DATA/HOLE correctly, will return -1 and set | |
788 | * errno to ENXIO when SEEK_DATA is called with a position of EOF. | |
789 | */ | |
790 | static bool qemu_gluster_test_seek(struct glfs_fd *fd) | |
791 | { | |
d9b78974 JC |
792 | off_t ret = 0; |
793 | ||
794 | #if defined SEEK_HOLE && defined SEEK_DATA | |
795 | off_t eof; | |
947eb203 NV |
796 | |
797 | eof = glfs_lseek(fd, 0, SEEK_END); | |
798 | if (eof < 0) { | |
799 | /* this should never occur */ | |
800 | return false; | |
801 | } | |
802 | ||
803 | /* this should always fail with ENXIO if SEEK_DATA is supported */ | |
804 | ret = glfs_lseek(fd, eof, SEEK_DATA); | |
d9b78974 JC |
805 | #endif |
806 | ||
947eb203 NV |
807 | return (ret < 0) && (errno == ENXIO); |
808 | } | |
809 | ||
56d1b4d2 | 810 | static int qemu_gluster_open(BlockDriverState *bs, QDict *options, |
015a1036 | 811 | int bdrv_flags, Error **errp) |
8d6d89cb BR |
812 | { |
813 | BDRVGlusterState *s = bs->opaque; | |
1b37b344 | 814 | int open_flags = 0; |
8d6d89cb | 815 | int ret = 0; |
7edac2dd | 816 | BlockdevOptionsGluster *gconf = NULL; |
b4894776 KW |
817 | QemuOpts *opts; |
818 | Error *local_err = NULL; | |
e9db8ff3 | 819 | const char *filename, *logfile; |
b4894776 | 820 | |
87ea75d5 | 821 | opts = qemu_opts_create(&runtime_opts, NULL, 0, &error_abort); |
b4894776 | 822 | qemu_opts_absorb_qdict(opts, options, &local_err); |
84d18f06 | 823 | if (local_err) { |
a7451cb8 | 824 | error_propagate(errp, local_err); |
b4894776 KW |
825 | ret = -EINVAL; |
826 | goto out; | |
827 | } | |
828 | ||
7eac868a JC |
829 | filename = qemu_opt_get(opts, GLUSTER_OPT_FILENAME); |
830 | ||
1a417e46 PKK |
831 | s->debug = qemu_opt_get_number(opts, GLUSTER_OPT_DEBUG, |
832 | GLUSTER_DEBUG_DEFAULT); | |
833 | if (s->debug < 0) { | |
834 | s->debug = 0; | |
835 | } else if (s->debug > GLUSTER_DEBUG_MAX) { | |
836 | s->debug = GLUSTER_DEBUG_MAX; | |
7eac868a | 837 | } |
b4894776 | 838 | |
7edac2dd | 839 | gconf = g_new0(BlockdevOptionsGluster, 1); |
1a417e46 PKK |
840 | gconf->debug = s->debug; |
841 | gconf->has_debug = true; | |
e9db8ff3 PKK |
842 | |
843 | logfile = qemu_opt_get(opts, GLUSTER_OPT_LOGFILE); | |
844 | s->logfile = g_strdup(logfile ? logfile : GLUSTER_LOGFILE_DEFAULT); | |
845 | ||
846 | gconf->logfile = g_strdup(s->logfile); | |
847 | gconf->has_logfile = true; | |
848 | ||
6c7189bb | 849 | s->glfs = qemu_gluster_init(gconf, filename, options, errp); |
8d6d89cb BR |
850 | if (!s->glfs) { |
851 | ret = -errno; | |
852 | goto out; | |
853 | } | |
854 | ||
d85fa9eb JC |
855 | #ifdef CONFIG_GLUSTERFS_XLATOR_OPT |
856 | /* Without this, if fsync fails for a recoverable reason (for instance, | |
857 | * ENOSPC), gluster will dump its cache, preventing retries. This means | |
858 | * almost certain data loss. Not all gluster versions support the | |
859 | * 'resync-failed-syncs-after-fsync' key value, but there is no way to | |
860 | * discover during runtime if it is supported (this api returns success for | |
861 | * unknown key/value pairs) */ | |
862 | ret = glfs_set_xlator_option(s->glfs, "*-write-behind", | |
863 | "resync-failed-syncs-after-fsync", | |
864 | "on"); | |
865 | if (ret < 0) { | |
866 | error_setg_errno(errp, errno, "Unable to set xlator key/value pair"); | |
867 | ret = -errno; | |
868 | goto out; | |
869 | } | |
870 | #endif | |
871 | ||
1b37b344 | 872 | qemu_gluster_parse_flags(bdrv_flags, &open_flags); |
8d6d89cb | 873 | |
d5cf4079 | 874 | s->fd = glfs_open(s->glfs, gconf->path, open_flags); |
54ea21bd KW |
875 | ret = s->fd ? 0 : -errno; |
876 | ||
877 | if (ret == -EACCES || ret == -EROFS) { | |
878 | /* Try to degrade to read-only, but if it doesn't work, still use the | |
879 | * normal error message. */ | |
880 | if (bdrv_apply_auto_read_only(bs, NULL, NULL) == 0) { | |
881 | open_flags = (open_flags & ~O_RDWR) | O_RDONLY; | |
882 | s->fd = glfs_open(s->glfs, gconf->path, open_flags); | |
883 | ret = s->fd ? 0 : -errno; | |
884 | } | |
8d6d89cb | 885 | } |
8d6d89cb | 886 | |
947eb203 NV |
887 | s->supports_seek_data = qemu_gluster_test_seek(s->fd); |
888 | ||
8d6d89cb | 889 | out: |
b4894776 | 890 | qemu_opts_del(opts); |
7edac2dd | 891 | qapi_free_BlockdevOptionsGluster(gconf); |
8d6d89cb BR |
892 | if (!ret) { |
893 | return ret; | |
894 | } | |
e9db8ff3 | 895 | g_free(s->logfile); |
8d6d89cb BR |
896 | if (s->fd) { |
897 | glfs_close(s->fd); | |
898 | } | |
6349c154 PKK |
899 | |
900 | glfs_clear_preopened(s->glfs); | |
901 | ||
8d6d89cb BR |
902 | return ret; |
903 | } | |
904 | ||
de23e72b SG |
905 | static void qemu_gluster_refresh_limits(BlockDriverState *bs, Error **errp) |
906 | { | |
907 | bs->bl.max_transfer = GLUSTER_MAX_TRANSFER; | |
908 | } | |
909 | ||
adccfbcd JC |
910 | static int qemu_gluster_reopen_prepare(BDRVReopenState *state, |
911 | BlockReopenQueue *queue, Error **errp) | |
912 | { | |
913 | int ret = 0; | |
7eac868a | 914 | BDRVGlusterState *s; |
adccfbcd | 915 | BDRVGlusterReopenState *reop_s; |
7edac2dd | 916 | BlockdevOptionsGluster *gconf; |
adccfbcd JC |
917 | int open_flags = 0; |
918 | ||
919 | assert(state != NULL); | |
920 | assert(state->bs != NULL); | |
921 | ||
7eac868a JC |
922 | s = state->bs->opaque; |
923 | ||
5839e53b | 924 | state->opaque = g_new0(BDRVGlusterReopenState, 1); |
adccfbcd JC |
925 | reop_s = state->opaque; |
926 | ||
927 | qemu_gluster_parse_flags(state->flags, &open_flags); | |
928 | ||
7edac2dd | 929 | gconf = g_new0(BlockdevOptionsGluster, 1); |
1a417e46 PKK |
930 | gconf->debug = s->debug; |
931 | gconf->has_debug = true; | |
e9db8ff3 PKK |
932 | gconf->logfile = g_strdup(s->logfile); |
933 | gconf->has_logfile = true; | |
0b1847bb SG |
934 | |
935 | /* | |
936 | * If 'state->bs->exact_filename' is empty, 'state->options' should contain | |
937 | * the JSON parameters already parsed. | |
938 | */ | |
939 | if (state->bs->exact_filename[0] != '\0') { | |
940 | reop_s->glfs = qemu_gluster_init(gconf, state->bs->exact_filename, NULL, | |
941 | errp); | |
942 | } else { | |
943 | reop_s->glfs = qemu_gluster_init(gconf, NULL, state->options, errp); | |
944 | } | |
adccfbcd JC |
945 | if (reop_s->glfs == NULL) { |
946 | ret = -errno; | |
947 | goto exit; | |
948 | } | |
949 | ||
d85fa9eb JC |
950 | #ifdef CONFIG_GLUSTERFS_XLATOR_OPT |
951 | ret = glfs_set_xlator_option(reop_s->glfs, "*-write-behind", | |
952 | "resync-failed-syncs-after-fsync", "on"); | |
953 | if (ret < 0) { | |
954 | error_setg_errno(errp, errno, "Unable to set xlator key/value pair"); | |
955 | ret = -errno; | |
956 | goto exit; | |
957 | } | |
958 | #endif | |
959 | ||
d5cf4079 | 960 | reop_s->fd = glfs_open(reop_s->glfs, gconf->path, open_flags); |
adccfbcd JC |
961 | if (reop_s->fd == NULL) { |
962 | /* reops->glfs will be cleaned up in _abort */ | |
963 | ret = -errno; | |
964 | goto exit; | |
965 | } | |
966 | ||
967 | exit: | |
968 | /* state->opaque will be freed in either the _abort or _commit */ | |
7edac2dd | 969 | qapi_free_BlockdevOptionsGluster(gconf); |
adccfbcd JC |
970 | return ret; |
971 | } | |
972 | ||
973 | static void qemu_gluster_reopen_commit(BDRVReopenState *state) | |
974 | { | |
975 | BDRVGlusterReopenState *reop_s = state->opaque; | |
976 | BDRVGlusterState *s = state->bs->opaque; | |
977 | ||
978 | ||
979 | /* close the old */ | |
980 | if (s->fd) { | |
981 | glfs_close(s->fd); | |
982 | } | |
6349c154 PKK |
983 | |
984 | glfs_clear_preopened(s->glfs); | |
adccfbcd JC |
985 | |
986 | /* use the newly opened image / connection */ | |
987 | s->fd = reop_s->fd; | |
988 | s->glfs = reop_s->glfs; | |
989 | ||
990 | g_free(state->opaque); | |
991 | state->opaque = NULL; | |
992 | ||
993 | return; | |
994 | } | |
995 | ||
996 | ||
997 | static void qemu_gluster_reopen_abort(BDRVReopenState *state) | |
998 | { | |
999 | BDRVGlusterReopenState *reop_s = state->opaque; | |
1000 | ||
1001 | if (reop_s == NULL) { | |
1002 | return; | |
1003 | } | |
1004 | ||
1005 | if (reop_s->fd) { | |
1006 | glfs_close(reop_s->fd); | |
1007 | } | |
1008 | ||
6349c154 | 1009 | glfs_clear_preopened(reop_s->glfs); |
adccfbcd JC |
1010 | |
1011 | g_free(state->opaque); | |
1012 | state->opaque = NULL; | |
1013 | ||
1014 | return; | |
1015 | } | |
1016 | ||
7c815372 | 1017 | #ifdef CONFIG_GLUSTERFS_ZEROFILL |
e88a36eb | 1018 | static coroutine_fn int qemu_gluster_co_pwrite_zeroes(BlockDriverState *bs, |
f70c50c8 PKK |
1019 | int64_t offset, |
1020 | int size, | |
1021 | BdrvRequestFlags flags) | |
7c815372 BR |
1022 | { |
1023 | int ret; | |
c833d1e8 | 1024 | GlusterAIOCB acb; |
7c815372 | 1025 | BDRVGlusterState *s = bs->opaque; |
7c815372 | 1026 | |
c833d1e8 PB |
1027 | acb.size = size; |
1028 | acb.ret = 0; | |
1029 | acb.coroutine = qemu_coroutine_self(); | |
1030 | acb.aio_context = bdrv_get_aio_context(bs); | |
7c815372 | 1031 | |
c833d1e8 | 1032 | ret = glfs_zerofill_async(s->fd, offset, size, gluster_finish_aiocb, &acb); |
7c815372 | 1033 | if (ret < 0) { |
c833d1e8 | 1034 | return -errno; |
7c815372 BR |
1035 | } |
1036 | ||
1037 | qemu_coroutine_yield(); | |
c833d1e8 | 1038 | return acb.ret; |
7c815372 BR |
1039 | } |
1040 | #endif | |
1041 | ||
36e87909 HR |
1042 | static int qemu_gluster_do_truncate(struct glfs_fd *fd, int64_t offset, |
1043 | PreallocMode prealloc, Error **errp) | |
1044 | { | |
f3a33f79 HR |
1045 | int64_t current_length; |
1046 | ||
1047 | current_length = glfs_lseek(fd, 0, SEEK_END); | |
1048 | if (current_length < 0) { | |
1049 | error_setg_errno(errp, errno, "Failed to determine current size"); | |
1050 | return -errno; | |
1051 | } | |
1052 | ||
1053 | if (current_length > offset && prealloc != PREALLOC_MODE_OFF) { | |
1054 | error_setg(errp, "Cannot use preallocation for shrinking files"); | |
1055 | return -ENOTSUP; | |
1056 | } | |
1057 | ||
1058 | if (current_length == offset) { | |
1059 | return 0; | |
1060 | } | |
1061 | ||
36e87909 HR |
1062 | switch (prealloc) { |
1063 | #ifdef CONFIG_GLUSTERFS_FALLOCATE | |
1064 | case PREALLOC_MODE_FALLOC: | |
f3a33f79 | 1065 | if (glfs_fallocate(fd, 0, current_length, offset - current_length)) { |
36e87909 HR |
1066 | error_setg_errno(errp, errno, "Could not preallocate data"); |
1067 | return -errno; | |
1068 | } | |
1069 | break; | |
1070 | #endif /* CONFIG_GLUSTERFS_FALLOCATE */ | |
1071 | #ifdef CONFIG_GLUSTERFS_ZEROFILL | |
1072 | case PREALLOC_MODE_FULL: | |
1073 | if (glfs_ftruncate(fd, offset)) { | |
1074 | error_setg_errno(errp, errno, "Could not resize file"); | |
1075 | return -errno; | |
1076 | } | |
f3a33f79 | 1077 | if (glfs_zerofill(fd, current_length, offset - current_length)) { |
36e87909 HR |
1078 | error_setg_errno(errp, errno, "Could not zerofill the new area"); |
1079 | return -errno; | |
1080 | } | |
1081 | break; | |
1082 | #endif /* CONFIG_GLUSTERFS_ZEROFILL */ | |
1083 | case PREALLOC_MODE_OFF: | |
1084 | if (glfs_ftruncate(fd, offset)) { | |
1085 | error_setg_errno(errp, errno, "Could not resize file"); | |
1086 | return -errno; | |
1087 | } | |
1088 | break; | |
1089 | default: | |
1090 | error_setg(errp, "Unsupported preallocation mode: %s", | |
1091 | PreallocMode_str(prealloc)); | |
1092 | return -EINVAL; | |
1093 | } | |
1094 | ||
1095 | return 0; | |
1096 | } | |
1097 | ||
ab8bda76 KW |
1098 | static int qemu_gluster_co_create(BlockdevCreateOptions *options, |
1099 | Error **errp) | |
1100 | { | |
1101 | BlockdevCreateOptionsGluster *opts = &options->u.gluster; | |
1102 | struct glfs *glfs; | |
1103 | struct glfs_fd *fd = NULL; | |
1104 | int ret = 0; | |
1105 | ||
1106 | assert(options->driver == BLOCKDEV_DRIVER_GLUSTER); | |
1107 | ||
1108 | glfs = qemu_gluster_glfs_init(opts->location, errp); | |
1109 | if (!glfs) { | |
1110 | ret = -errno; | |
1111 | goto out; | |
1112 | } | |
1113 | ||
1114 | fd = glfs_creat(glfs, opts->location->path, | |
1115 | O_WRONLY | O_CREAT | O_TRUNC | O_BINARY, S_IRUSR | S_IWUSR); | |
1116 | if (!fd) { | |
1117 | ret = -errno; | |
1118 | goto out; | |
1119 | } | |
1120 | ||
1121 | ret = qemu_gluster_do_truncate(fd, opts->size, opts->preallocation, errp); | |
1122 | ||
1123 | out: | |
1124 | if (fd) { | |
1125 | if (glfs_close(fd) != 0 && ret == 0) { | |
1126 | ret = -errno; | |
1127 | } | |
1128 | } | |
1129 | glfs_clear_preopened(glfs); | |
1130 | return ret; | |
1131 | } | |
1132 | ||
efc75e2a SH |
1133 | static int coroutine_fn qemu_gluster_co_create_opts(const char *filename, |
1134 | QemuOpts *opts, | |
1135 | Error **errp) | |
8d6d89cb | 1136 | { |
ab8bda76 KW |
1137 | BlockdevCreateOptions *options; |
1138 | BlockdevCreateOptionsGluster *gopts; | |
7edac2dd | 1139 | BlockdevOptionsGluster *gconf; |
90c772de | 1140 | char *tmp = NULL; |
df3a429a | 1141 | Error *local_err = NULL; |
ab8bda76 KW |
1142 | int ret; |
1143 | ||
1144 | options = g_new0(BlockdevCreateOptions, 1); | |
1145 | options->driver = BLOCKDEV_DRIVER_GLUSTER; | |
1146 | gopts = &options->u.gluster; | |
8d6d89cb | 1147 | |
7edac2dd | 1148 | gconf = g_new0(BlockdevOptionsGluster, 1); |
ab8bda76 KW |
1149 | gopts->location = gconf; |
1150 | ||
1151 | gopts->size = ROUND_UP(qemu_opt_get_size_del(opts, BLOCK_OPT_SIZE, 0), | |
1152 | BDRV_SECTOR_SIZE); | |
1153 | ||
1154 | tmp = qemu_opt_get_del(opts, BLOCK_OPT_PREALLOC); | |
1155 | gopts->preallocation = qapi_enum_parse(&PreallocMode_lookup, tmp, | |
1156 | PREALLOC_MODE_OFF, &local_err); | |
1157 | g_free(tmp); | |
1158 | if (local_err) { | |
1159 | error_propagate(errp, local_err); | |
1160 | ret = -EINVAL; | |
1161 | goto fail; | |
1162 | } | |
1163 | ||
1a417e46 PKK |
1164 | gconf->debug = qemu_opt_get_number_del(opts, GLUSTER_OPT_DEBUG, |
1165 | GLUSTER_DEBUG_DEFAULT); | |
1166 | if (gconf->debug < 0) { | |
1167 | gconf->debug = 0; | |
1168 | } else if (gconf->debug > GLUSTER_DEBUG_MAX) { | |
1169 | gconf->debug = GLUSTER_DEBUG_MAX; | |
1170 | } | |
1171 | gconf->has_debug = true; | |
7eac868a | 1172 | |
e9db8ff3 PKK |
1173 | gconf->logfile = qemu_opt_get_del(opts, GLUSTER_OPT_LOGFILE); |
1174 | if (!gconf->logfile) { | |
1175 | gconf->logfile = g_strdup(GLUSTER_LOGFILE_DEFAULT); | |
1176 | } | |
1177 | gconf->has_logfile = true; | |
1178 | ||
ab8bda76 KW |
1179 | ret = qemu_gluster_parse(gconf, filename, NULL, errp); |
1180 | if (ret < 0) { | |
1181 | goto fail; | |
8d6d89cb BR |
1182 | } |
1183 | ||
ab8bda76 KW |
1184 | ret = qemu_gluster_co_create(options, errp); |
1185 | if (ret < 0) { | |
1186 | goto fail; | |
df3a429a NV |
1187 | } |
1188 | ||
ab8bda76 KW |
1189 | ret = 0; |
1190 | fail: | |
1191 | qapi_free_BlockdevCreateOptions(options); | |
8d6d89cb BR |
1192 | return ret; |
1193 | } | |
1194 | ||
15744b0b | 1195 | static coroutine_fn int qemu_gluster_co_rw(BlockDriverState *bs, |
f70c50c8 PKK |
1196 | int64_t sector_num, int nb_sectors, |
1197 | QEMUIOVector *qiov, int write) | |
8d6d89cb BR |
1198 | { |
1199 | int ret; | |
c833d1e8 | 1200 | GlusterAIOCB acb; |
8d6d89cb | 1201 | BDRVGlusterState *s = bs->opaque; |
15744b0b BR |
1202 | size_t size = nb_sectors * BDRV_SECTOR_SIZE; |
1203 | off_t offset = sector_num * BDRV_SECTOR_SIZE; | |
8d6d89cb | 1204 | |
c833d1e8 PB |
1205 | acb.size = size; |
1206 | acb.ret = 0; | |
1207 | acb.coroutine = qemu_coroutine_self(); | |
1208 | acb.aio_context = bdrv_get_aio_context(bs); | |
8d6d89cb BR |
1209 | |
1210 | if (write) { | |
1211 | ret = glfs_pwritev_async(s->fd, qiov->iov, qiov->niov, offset, 0, | |
f70c50c8 | 1212 | gluster_finish_aiocb, &acb); |
8d6d89cb BR |
1213 | } else { |
1214 | ret = glfs_preadv_async(s->fd, qiov->iov, qiov->niov, offset, 0, | |
f70c50c8 | 1215 | gluster_finish_aiocb, &acb); |
8d6d89cb BR |
1216 | } |
1217 | ||
1218 | if (ret < 0) { | |
c833d1e8 | 1219 | return -errno; |
8d6d89cb | 1220 | } |
15744b0b BR |
1221 | |
1222 | qemu_coroutine_yield(); | |
c833d1e8 | 1223 | return acb.ret; |
8d6d89cb BR |
1224 | } |
1225 | ||
061ca8a3 KW |
1226 | static coroutine_fn int qemu_gluster_co_truncate(BlockDriverState *bs, |
1227 | int64_t offset, | |
1228 | PreallocMode prealloc, | |
1229 | Error **errp) | |
42ec24e2 | 1230 | { |
42ec24e2 | 1231 | BDRVGlusterState *s = bs->opaque; |
c3132aff | 1232 | return qemu_gluster_do_truncate(s->fd, offset, prealloc, errp); |
42ec24e2 PB |
1233 | } |
1234 | ||
15744b0b | 1235 | static coroutine_fn int qemu_gluster_co_readv(BlockDriverState *bs, |
f70c50c8 PKK |
1236 | int64_t sector_num, |
1237 | int nb_sectors, | |
1238 | QEMUIOVector *qiov) | |
8d6d89cb | 1239 | { |
15744b0b | 1240 | return qemu_gluster_co_rw(bs, sector_num, nb_sectors, qiov, 0); |
8d6d89cb BR |
1241 | } |
1242 | ||
15744b0b | 1243 | static coroutine_fn int qemu_gluster_co_writev(BlockDriverState *bs, |
f70c50c8 PKK |
1244 | int64_t sector_num, |
1245 | int nb_sectors, | |
e18a58b4 EB |
1246 | QEMUIOVector *qiov, |
1247 | int flags) | |
8d6d89cb | 1248 | { |
e18a58b4 | 1249 | assert(!flags); |
15744b0b | 1250 | return qemu_gluster_co_rw(bs, sector_num, nb_sectors, qiov, 1); |
8d6d89cb BR |
1251 | } |
1252 | ||
5d4343e6 JC |
1253 | static void qemu_gluster_close(BlockDriverState *bs) |
1254 | { | |
1255 | BDRVGlusterState *s = bs->opaque; | |
1256 | ||
e9db8ff3 | 1257 | g_free(s->logfile); |
5d4343e6 JC |
1258 | if (s->fd) { |
1259 | glfs_close(s->fd); | |
1260 | s->fd = NULL; | |
1261 | } | |
6349c154 | 1262 | glfs_clear_preopened(s->glfs); |
5d4343e6 JC |
1263 | } |
1264 | ||
15744b0b | 1265 | static coroutine_fn int qemu_gluster_co_flush_to_disk(BlockDriverState *bs) |
8d6d89cb BR |
1266 | { |
1267 | int ret; | |
c833d1e8 | 1268 | GlusterAIOCB acb; |
8d6d89cb BR |
1269 | BDRVGlusterState *s = bs->opaque; |
1270 | ||
c833d1e8 PB |
1271 | acb.size = 0; |
1272 | acb.ret = 0; | |
1273 | acb.coroutine = qemu_coroutine_self(); | |
1274 | acb.aio_context = bdrv_get_aio_context(bs); | |
8d6d89cb | 1275 | |
c833d1e8 | 1276 | ret = glfs_fsync_async(s->fd, gluster_finish_aiocb, &acb); |
8d6d89cb | 1277 | if (ret < 0) { |
d85fa9eb JC |
1278 | ret = -errno; |
1279 | goto error; | |
8d6d89cb | 1280 | } |
15744b0b BR |
1281 | |
1282 | qemu_coroutine_yield(); | |
d85fa9eb JC |
1283 | if (acb.ret < 0) { |
1284 | ret = acb.ret; | |
1285 | goto error; | |
1286 | } | |
1287 | ||
c833d1e8 | 1288 | return acb.ret; |
d85fa9eb JC |
1289 | |
1290 | error: | |
1291 | /* Some versions of Gluster (3.5.6 -> 3.5.8?) will not retain its cache | |
1292 | * after a fsync failure, so we have no way of allowing the guest to safely | |
1293 | * continue. Gluster versions prior to 3.5.6 don't retain the cache | |
1294 | * either, but will invalidate the fd on error, so this is again our only | |
1295 | * option. | |
1296 | * | |
1297 | * The 'resync-failed-syncs-after-fsync' xlator option for the | |
1298 | * write-behind cache will cause later gluster versions to retain its | |
1299 | * cache after error, so long as the fd remains open. However, we | |
1300 | * currently have no way of knowing if this option is supported. | |
1301 | * | |
1302 | * TODO: Once gluster provides a way for us to determine if the option | |
1303 | * is supported, bypass the closure and setting drv to NULL. */ | |
1304 | qemu_gluster_close(bs); | |
1305 | bs->drv = NULL; | |
1306 | return ret; | |
8d6d89cb BR |
1307 | } |
1308 | ||
0c14fb47 | 1309 | #ifdef CONFIG_GLUSTERFS_DISCARD |
1014170b EB |
1310 | static coroutine_fn int qemu_gluster_co_pdiscard(BlockDriverState *bs, |
1311 | int64_t offset, int size) | |
0c14fb47 BR |
1312 | { |
1313 | int ret; | |
c833d1e8 | 1314 | GlusterAIOCB acb; |
0c14fb47 | 1315 | BDRVGlusterState *s = bs->opaque; |
0c14fb47 | 1316 | |
c833d1e8 PB |
1317 | acb.size = 0; |
1318 | acb.ret = 0; | |
1319 | acb.coroutine = qemu_coroutine_self(); | |
1320 | acb.aio_context = bdrv_get_aio_context(bs); | |
0c14fb47 | 1321 | |
c833d1e8 | 1322 | ret = glfs_discard_async(s->fd, offset, size, gluster_finish_aiocb, &acb); |
0c14fb47 | 1323 | if (ret < 0) { |
c833d1e8 | 1324 | return -errno; |
0c14fb47 | 1325 | } |
15744b0b BR |
1326 | |
1327 | qemu_coroutine_yield(); | |
c833d1e8 | 1328 | return acb.ret; |
0c14fb47 BR |
1329 | } |
1330 | #endif | |
1331 | ||
8d6d89cb BR |
1332 | static int64_t qemu_gluster_getlength(BlockDriverState *bs) |
1333 | { | |
1334 | BDRVGlusterState *s = bs->opaque; | |
1335 | int64_t ret; | |
1336 | ||
1337 | ret = glfs_lseek(s->fd, 0, SEEK_END); | |
1338 | if (ret < 0) { | |
1339 | return -errno; | |
1340 | } else { | |
1341 | return ret; | |
1342 | } | |
1343 | } | |
1344 | ||
1345 | static int64_t qemu_gluster_allocated_file_size(BlockDriverState *bs) | |
1346 | { | |
1347 | BDRVGlusterState *s = bs->opaque; | |
1348 | struct stat st; | |
1349 | int ret; | |
1350 | ||
1351 | ret = glfs_fstat(s->fd, &st); | |
1352 | if (ret < 0) { | |
1353 | return -errno; | |
1354 | } else { | |
1355 | return st.st_blocks * 512; | |
1356 | } | |
1357 | } | |
1358 | ||
8ab6feec KW |
1359 | static int qemu_gluster_has_zero_init(BlockDriverState *bs) |
1360 | { | |
1361 | /* GlusterFS volume could be backed by a block device */ | |
1362 | return 0; | |
1363 | } | |
1364 | ||
947eb203 NV |
1365 | /* |
1366 | * Find allocation range in @bs around offset @start. | |
1367 | * May change underlying file descriptor's file offset. | |
1368 | * If @start is not in a hole, store @start in @data, and the | |
1369 | * beginning of the next hole in @hole, and return 0. | |
1370 | * If @start is in a non-trailing hole, store @start in @hole and the | |
1371 | * beginning of the next non-hole in @data, and return 0. | |
1372 | * If @start is in a trailing hole or beyond EOF, return -ENXIO. | |
1373 | * If we can't find out, return a negative errno other than -ENXIO. | |
1374 | * | |
50d6a8a3 | 1375 | * (Shamefully copied from file-posix.c, only minuscule adaptions.) |
947eb203 NV |
1376 | */ |
1377 | static int find_allocation(BlockDriverState *bs, off_t start, | |
1378 | off_t *data, off_t *hole) | |
1379 | { | |
1380 | BDRVGlusterState *s = bs->opaque; | |
947eb203 NV |
1381 | |
1382 | if (!s->supports_seek_data) { | |
d9b78974 | 1383 | goto exit; |
947eb203 NV |
1384 | } |
1385 | ||
d9b78974 JC |
1386 | #if defined SEEK_HOLE && defined SEEK_DATA |
1387 | off_t offs; | |
1388 | ||
947eb203 NV |
1389 | /* |
1390 | * SEEK_DATA cases: | |
1391 | * D1. offs == start: start is in data | |
1392 | * D2. offs > start: start is in a hole, next data at offs | |
1393 | * D3. offs < 0, errno = ENXIO: either start is in a trailing hole | |
1394 | * or start is beyond EOF | |
1395 | * If the latter happens, the file has been truncated behind | |
1396 | * our back since we opened it. All bets are off then. | |
1397 | * Treating like a trailing hole is simplest. | |
1398 | * D4. offs < 0, errno != ENXIO: we learned nothing | |
1399 | */ | |
1400 | offs = glfs_lseek(s->fd, start, SEEK_DATA); | |
1401 | if (offs < 0) { | |
1402 | return -errno; /* D3 or D4 */ | |
1403 | } | |
223a23c1 JC |
1404 | |
1405 | if (offs < start) { | |
1406 | /* This is not a valid return by lseek(). We are safe to just return | |
1407 | * -EIO in this case, and we'll treat it like D4. Unfortunately some | |
1408 | * versions of gluster server will return offs < start, so an assert | |
1409 | * here will unnecessarily abort QEMU. */ | |
1410 | return -EIO; | |
1411 | } | |
947eb203 NV |
1412 | |
1413 | if (offs > start) { | |
1414 | /* D2: in hole, next data at offs */ | |
1415 | *hole = start; | |
1416 | *data = offs; | |
1417 | return 0; | |
1418 | } | |
1419 | ||
1420 | /* D1: in data, end not yet known */ | |
1421 | ||
1422 | /* | |
1423 | * SEEK_HOLE cases: | |
1424 | * H1. offs == start: start is in a hole | |
1425 | * If this happens here, a hole has been dug behind our back | |
1426 | * since the previous lseek(). | |
1427 | * H2. offs > start: either start is in data, next hole at offs, | |
1428 | * or start is in trailing hole, EOF at offs | |
1429 | * Linux treats trailing holes like any other hole: offs == | |
1430 | * start. Solaris seeks to EOF instead: offs > start (blech). | |
1431 | * If that happens here, a hole has been dug behind our back | |
1432 | * since the previous lseek(). | |
1433 | * H3. offs < 0, errno = ENXIO: start is beyond EOF | |
1434 | * If this happens, the file has been truncated behind our | |
1435 | * back since we opened it. Treat it like a trailing hole. | |
1436 | * H4. offs < 0, errno != ENXIO: we learned nothing | |
1437 | * Pretend we know nothing at all, i.e. "forget" about D1. | |
1438 | */ | |
1439 | offs = glfs_lseek(s->fd, start, SEEK_HOLE); | |
1440 | if (offs < 0) { | |
1441 | return -errno; /* D1 and (H3 or H4) */ | |
1442 | } | |
223a23c1 JC |
1443 | |
1444 | if (offs < start) { | |
1445 | /* This is not a valid return by lseek(). We are safe to just return | |
1446 | * -EIO in this case, and we'll treat it like H4. Unfortunately some | |
1447 | * versions of gluster server will return offs < start, so an assert | |
1448 | * here will unnecessarily abort QEMU. */ | |
1449 | return -EIO; | |
1450 | } | |
947eb203 NV |
1451 | |
1452 | if (offs > start) { | |
1453 | /* | |
1454 | * D1 and H2: either in data, next hole at offs, or it was in | |
1455 | * data but is now in a trailing hole. In the latter case, | |
1456 | * all bets are off. Treating it as if it there was data all | |
1457 | * the way to EOF is safe, so simply do that. | |
1458 | */ | |
1459 | *data = start; | |
1460 | *hole = offs; | |
1461 | return 0; | |
1462 | } | |
1463 | ||
1464 | /* D1 and H1 */ | |
1465 | return -EBUSY; | |
d9b78974 JC |
1466 | #endif |
1467 | ||
1468 | exit: | |
1469 | return -ENOTSUP; | |
947eb203 NV |
1470 | } |
1471 | ||
1472 | /* | |
08c9e773 | 1473 | * Returns the allocation status of the specified offset. |
947eb203 | 1474 | * |
08c9e773 | 1475 | * The block layer guarantees 'offset' and 'bytes' are within bounds. |
947eb203 | 1476 | * |
08c9e773 EB |
1477 | * 'pnum' is set to the number of bytes (including and immediately following |
1478 | * the specified offset) that are known to be in the same | |
947eb203 NV |
1479 | * allocated/unallocated state. |
1480 | * | |
08c9e773 | 1481 | * 'bytes' is the max value 'pnum' should be set to. |
947eb203 | 1482 | * |
08c9e773 | 1483 | * (Based on raw_co_block_status() from file-posix.c.) |
947eb203 | 1484 | */ |
08c9e773 EB |
1485 | static int coroutine_fn qemu_gluster_co_block_status(BlockDriverState *bs, |
1486 | bool want_zero, | |
1487 | int64_t offset, | |
1488 | int64_t bytes, | |
1489 | int64_t *pnum, | |
1490 | int64_t *map, | |
1491 | BlockDriverState **file) | |
947eb203 NV |
1492 | { |
1493 | BDRVGlusterState *s = bs->opaque; | |
08c9e773 | 1494 | off_t data = 0, hole = 0; |
947eb203 NV |
1495 | int ret = -EINVAL; |
1496 | ||
1497 | if (!s->fd) { | |
1498 | return ret; | |
1499 | } | |
1500 | ||
08c9e773 EB |
1501 | if (!want_zero) { |
1502 | *pnum = bytes; | |
1503 | *map = offset; | |
1504 | *file = bs; | |
1505 | return BDRV_BLOCK_DATA | BDRV_BLOCK_OFFSET_VALID; | |
947eb203 NV |
1506 | } |
1507 | ||
08c9e773 | 1508 | ret = find_allocation(bs, offset, &data, &hole); |
947eb203 NV |
1509 | if (ret == -ENXIO) { |
1510 | /* Trailing hole */ | |
08c9e773 | 1511 | *pnum = bytes; |
947eb203 NV |
1512 | ret = BDRV_BLOCK_ZERO; |
1513 | } else if (ret < 0) { | |
1514 | /* No info available, so pretend there are no holes */ | |
08c9e773 | 1515 | *pnum = bytes; |
947eb203 | 1516 | ret = BDRV_BLOCK_DATA; |
08c9e773 EB |
1517 | } else if (data == offset) { |
1518 | /* On a data extent, compute bytes to the end of the extent, | |
947eb203 | 1519 | * possibly including a partial sector at EOF. */ |
08c9e773 | 1520 | *pnum = MIN(bytes, hole - offset); |
947eb203 NV |
1521 | ret = BDRV_BLOCK_DATA; |
1522 | } else { | |
08c9e773 EB |
1523 | /* On a hole, compute bytes to the beginning of the next extent. */ |
1524 | assert(hole == offset); | |
1525 | *pnum = MIN(bytes, data - offset); | |
947eb203 NV |
1526 | ret = BDRV_BLOCK_ZERO; |
1527 | } | |
1528 | ||
08c9e773 | 1529 | *map = offset; |
947eb203 NV |
1530 | *file = bs; |
1531 | ||
08c9e773 | 1532 | return ret | BDRV_BLOCK_OFFSET_VALID; |
947eb203 NV |
1533 | } |
1534 | ||
1535 | ||
2654267c HR |
1536 | static const char *const gluster_strong_open_opts[] = { |
1537 | GLUSTER_OPT_VOLUME, | |
1538 | GLUSTER_OPT_PATH, | |
1539 | GLUSTER_OPT_TYPE, | |
1540 | GLUSTER_OPT_SERVER_PATTERN, | |
1541 | GLUSTER_OPT_HOST, | |
1542 | GLUSTER_OPT_PORT, | |
1543 | GLUSTER_OPT_TO, | |
1544 | GLUSTER_OPT_IPV4, | |
1545 | GLUSTER_OPT_IPV6, | |
1546 | GLUSTER_OPT_SOCKET, | |
1547 | ||
1548 | NULL | |
1549 | }; | |
1550 | ||
8d6d89cb BR |
1551 | static BlockDriver bdrv_gluster = { |
1552 | .format_name = "gluster", | |
1553 | .protocol_name = "gluster", | |
1554 | .instance_size = sizeof(BDRVGlusterState), | |
6c7189bb | 1555 | .bdrv_needs_filename = false, |
8d6d89cb | 1556 | .bdrv_file_open = qemu_gluster_open, |
adccfbcd JC |
1557 | .bdrv_reopen_prepare = qemu_gluster_reopen_prepare, |
1558 | .bdrv_reopen_commit = qemu_gluster_reopen_commit, | |
1559 | .bdrv_reopen_abort = qemu_gluster_reopen_abort, | |
8d6d89cb | 1560 | .bdrv_close = qemu_gluster_close, |
ab8bda76 | 1561 | .bdrv_co_create = qemu_gluster_co_create, |
efc75e2a | 1562 | .bdrv_co_create_opts = qemu_gluster_co_create_opts, |
8d6d89cb BR |
1563 | .bdrv_getlength = qemu_gluster_getlength, |
1564 | .bdrv_get_allocated_file_size = qemu_gluster_allocated_file_size, | |
061ca8a3 | 1565 | .bdrv_co_truncate = qemu_gluster_co_truncate, |
15744b0b BR |
1566 | .bdrv_co_readv = qemu_gluster_co_readv, |
1567 | .bdrv_co_writev = qemu_gluster_co_writev, | |
1568 | .bdrv_co_flush_to_disk = qemu_gluster_co_flush_to_disk, | |
8ab6feec | 1569 | .bdrv_has_zero_init = qemu_gluster_has_zero_init, |
1dcaf527 | 1570 | .bdrv_has_zero_init_truncate = qemu_gluster_has_zero_init, |
0c14fb47 | 1571 | #ifdef CONFIG_GLUSTERFS_DISCARD |
1014170b | 1572 | .bdrv_co_pdiscard = qemu_gluster_co_pdiscard, |
7c815372 BR |
1573 | #endif |
1574 | #ifdef CONFIG_GLUSTERFS_ZEROFILL | |
e88a36eb | 1575 | .bdrv_co_pwrite_zeroes = qemu_gluster_co_pwrite_zeroes, |
0c14fb47 | 1576 | #endif |
08c9e773 | 1577 | .bdrv_co_block_status = qemu_gluster_co_block_status, |
de23e72b | 1578 | .bdrv_refresh_limits = qemu_gluster_refresh_limits, |
90c772de | 1579 | .create_opts = &qemu_gluster_create_opts, |
2654267c | 1580 | .strong_runtime_opts = gluster_strong_open_opts, |
8d6d89cb BR |
1581 | }; |
1582 | ||
1583 | static BlockDriver bdrv_gluster_tcp = { | |
1584 | .format_name = "gluster", | |
1585 | .protocol_name = "gluster+tcp", | |
1586 | .instance_size = sizeof(BDRVGlusterState), | |
6c7189bb | 1587 | .bdrv_needs_filename = false, |
8d6d89cb | 1588 | .bdrv_file_open = qemu_gluster_open, |
adccfbcd JC |
1589 | .bdrv_reopen_prepare = qemu_gluster_reopen_prepare, |
1590 | .bdrv_reopen_commit = qemu_gluster_reopen_commit, | |
1591 | .bdrv_reopen_abort = qemu_gluster_reopen_abort, | |
8d6d89cb | 1592 | .bdrv_close = qemu_gluster_close, |
ab8bda76 | 1593 | .bdrv_co_create = qemu_gluster_co_create, |
efc75e2a | 1594 | .bdrv_co_create_opts = qemu_gluster_co_create_opts, |
8d6d89cb BR |
1595 | .bdrv_getlength = qemu_gluster_getlength, |
1596 | .bdrv_get_allocated_file_size = qemu_gluster_allocated_file_size, | |
061ca8a3 | 1597 | .bdrv_co_truncate = qemu_gluster_co_truncate, |
15744b0b BR |
1598 | .bdrv_co_readv = qemu_gluster_co_readv, |
1599 | .bdrv_co_writev = qemu_gluster_co_writev, | |
1600 | .bdrv_co_flush_to_disk = qemu_gluster_co_flush_to_disk, | |
8ab6feec | 1601 | .bdrv_has_zero_init = qemu_gluster_has_zero_init, |
1dcaf527 | 1602 | .bdrv_has_zero_init_truncate = qemu_gluster_has_zero_init, |
0c14fb47 | 1603 | #ifdef CONFIG_GLUSTERFS_DISCARD |
1014170b | 1604 | .bdrv_co_pdiscard = qemu_gluster_co_pdiscard, |
7c815372 BR |
1605 | #endif |
1606 | #ifdef CONFIG_GLUSTERFS_ZEROFILL | |
e88a36eb | 1607 | .bdrv_co_pwrite_zeroes = qemu_gluster_co_pwrite_zeroes, |
0c14fb47 | 1608 | #endif |
08c9e773 | 1609 | .bdrv_co_block_status = qemu_gluster_co_block_status, |
de23e72b | 1610 | .bdrv_refresh_limits = qemu_gluster_refresh_limits, |
90c772de | 1611 | .create_opts = &qemu_gluster_create_opts, |
2654267c | 1612 | .strong_runtime_opts = gluster_strong_open_opts, |
8d6d89cb BR |
1613 | }; |
1614 | ||
1615 | static BlockDriver bdrv_gluster_unix = { | |
1616 | .format_name = "gluster", | |
1617 | .protocol_name = "gluster+unix", | |
1618 | .instance_size = sizeof(BDRVGlusterState), | |
030be321 | 1619 | .bdrv_needs_filename = true, |
8d6d89cb | 1620 | .bdrv_file_open = qemu_gluster_open, |
adccfbcd JC |
1621 | .bdrv_reopen_prepare = qemu_gluster_reopen_prepare, |
1622 | .bdrv_reopen_commit = qemu_gluster_reopen_commit, | |
1623 | .bdrv_reopen_abort = qemu_gluster_reopen_abort, | |
8d6d89cb | 1624 | .bdrv_close = qemu_gluster_close, |
ab8bda76 | 1625 | .bdrv_co_create = qemu_gluster_co_create, |
efc75e2a | 1626 | .bdrv_co_create_opts = qemu_gluster_co_create_opts, |
8d6d89cb BR |
1627 | .bdrv_getlength = qemu_gluster_getlength, |
1628 | .bdrv_get_allocated_file_size = qemu_gluster_allocated_file_size, | |
061ca8a3 | 1629 | .bdrv_co_truncate = qemu_gluster_co_truncate, |
15744b0b BR |
1630 | .bdrv_co_readv = qemu_gluster_co_readv, |
1631 | .bdrv_co_writev = qemu_gluster_co_writev, | |
1632 | .bdrv_co_flush_to_disk = qemu_gluster_co_flush_to_disk, | |
8ab6feec | 1633 | .bdrv_has_zero_init = qemu_gluster_has_zero_init, |
1dcaf527 | 1634 | .bdrv_has_zero_init_truncate = qemu_gluster_has_zero_init, |
0c14fb47 | 1635 | #ifdef CONFIG_GLUSTERFS_DISCARD |
1014170b | 1636 | .bdrv_co_pdiscard = qemu_gluster_co_pdiscard, |
7c815372 BR |
1637 | #endif |
1638 | #ifdef CONFIG_GLUSTERFS_ZEROFILL | |
e88a36eb | 1639 | .bdrv_co_pwrite_zeroes = qemu_gluster_co_pwrite_zeroes, |
0c14fb47 | 1640 | #endif |
08c9e773 | 1641 | .bdrv_co_block_status = qemu_gluster_co_block_status, |
de23e72b | 1642 | .bdrv_refresh_limits = qemu_gluster_refresh_limits, |
90c772de | 1643 | .create_opts = &qemu_gluster_create_opts, |
2654267c | 1644 | .strong_runtime_opts = gluster_strong_open_opts, |
8d6d89cb BR |
1645 | }; |
1646 | ||
0552ff24 PKK |
1647 | /* rdma is deprecated (actually never supported for volfile fetch). |
1648 | * Let's maintain it for the protocol compatibility, to make sure things | |
1649 | * won't break immediately. For now, gluster+rdma will fall back to gluster+tcp | |
1650 | * protocol with a warning. | |
1651 | * TODO: remove gluster+rdma interface support | |
1652 | */ | |
8d6d89cb BR |
1653 | static BlockDriver bdrv_gluster_rdma = { |
1654 | .format_name = "gluster", | |
1655 | .protocol_name = "gluster+rdma", | |
1656 | .instance_size = sizeof(BDRVGlusterState), | |
030be321 | 1657 | .bdrv_needs_filename = true, |
8d6d89cb | 1658 | .bdrv_file_open = qemu_gluster_open, |
adccfbcd JC |
1659 | .bdrv_reopen_prepare = qemu_gluster_reopen_prepare, |
1660 | .bdrv_reopen_commit = qemu_gluster_reopen_commit, | |
1661 | .bdrv_reopen_abort = qemu_gluster_reopen_abort, | |
8d6d89cb | 1662 | .bdrv_close = qemu_gluster_close, |
ab8bda76 | 1663 | .bdrv_co_create = qemu_gluster_co_create, |
efc75e2a | 1664 | .bdrv_co_create_opts = qemu_gluster_co_create_opts, |
8d6d89cb BR |
1665 | .bdrv_getlength = qemu_gluster_getlength, |
1666 | .bdrv_get_allocated_file_size = qemu_gluster_allocated_file_size, | |
061ca8a3 | 1667 | .bdrv_co_truncate = qemu_gluster_co_truncate, |
15744b0b BR |
1668 | .bdrv_co_readv = qemu_gluster_co_readv, |
1669 | .bdrv_co_writev = qemu_gluster_co_writev, | |
1670 | .bdrv_co_flush_to_disk = qemu_gluster_co_flush_to_disk, | |
8ab6feec | 1671 | .bdrv_has_zero_init = qemu_gluster_has_zero_init, |
1dcaf527 | 1672 | .bdrv_has_zero_init_truncate = qemu_gluster_has_zero_init, |
0c14fb47 | 1673 | #ifdef CONFIG_GLUSTERFS_DISCARD |
1014170b | 1674 | .bdrv_co_pdiscard = qemu_gluster_co_pdiscard, |
7c815372 BR |
1675 | #endif |
1676 | #ifdef CONFIG_GLUSTERFS_ZEROFILL | |
e88a36eb | 1677 | .bdrv_co_pwrite_zeroes = qemu_gluster_co_pwrite_zeroes, |
0c14fb47 | 1678 | #endif |
08c9e773 | 1679 | .bdrv_co_block_status = qemu_gluster_co_block_status, |
de23e72b | 1680 | .bdrv_refresh_limits = qemu_gluster_refresh_limits, |
90c772de | 1681 | .create_opts = &qemu_gluster_create_opts, |
2654267c | 1682 | .strong_runtime_opts = gluster_strong_open_opts, |
8d6d89cb BR |
1683 | }; |
1684 | ||
1685 | static void bdrv_gluster_init(void) | |
1686 | { | |
1687 | bdrv_register(&bdrv_gluster_rdma); | |
1688 | bdrv_register(&bdrv_gluster_unix); | |
1689 | bdrv_register(&bdrv_gluster_tcp); | |
1690 | bdrv_register(&bdrv_gluster); | |
1691 | } | |
1692 | ||
1693 | block_init(bdrv_gluster_init); |