mirror of https://github.com/xemu-project/xemu.git
Block layer patches
- crypto: Fix crash when used with multiqueue devices - linux-aio: add IO_CMD_FDSYNC command support - copy-before-write: Avoid integer overflows for timeout > 4s - Fix crash with QMP block_resize and iothreads - qemu-io: add cvtnum() error handling for zone commands - Code cleanup -----BEGIN PGP SIGNATURE----- iQJFBAABCAAvFiEE3D3rFZqa+V09dFb+fwmycsiPL9YFAmZoitoRHGt3b2xmQHJl ZGhhdC5jb20ACgkQfwmycsiPL9Z2ng/+KVz0P1M6fjdI0yJSwAla3PVRfB0BjZ+k pwoUaHholVB4lmhU8OhtUHgEPK/jIZVdgwfG2se8WHR3eAzEVTWqt5mRIjOVUX4b N29G6gTHt8p64YKSbiqnyK2IC7qhY/o3hQ+d8frk+tqstc2tzFHDtjkWtYROdl/X iNW6zXy1rz5qIyJ80QWvBs7CfQuvElzK0GN2QusSZDEUJYiLhVS6QfjNmRfJI5yT /eDoHAjMJycxy+8YpEj1QEdEcFV7dS0BCr6qeWeAg50Gej1xlDeknejG+Cro2A1z MJu4blqMhzzjG9YIS90wCDOxXYdifa1VQSIpV6zpU1ExToXFOVtF3h06Hu0aHiBu hU4UnTsQSLmlQXbSbFwlVgRdGfAxvIxp6EuWtPteSAfnxAlxoQbqnV6uN/RsFnsr R+zSiNx+20IDj4befzcQWNWpWNnTloRR01/iucncEpZZEu0/E58Y4bFAWBexMOhz MgYTXTVgR+WPuyR8FXyXX32dQBQMb5grSnseXwOBhi3ULrMqjLinR60B+XbWgy/g mE/oLc+uttAk1EbHH/8od8vjvtDHdl9FrfsPaPDlJTiexqNZHxiDE3WVdhvaPsTF wJ0CB7pdvrWIAVwmSpfksVoyL2HQx2ILjGSQbKPvYEZqSoUMr7+7Z0SkTQ1i706b xODS2wm+h0Q= =hMLb -----END PGP SIGNATURE----- Merge tag 'for-upstream' of https://repo.or.cz/qemu/kevin into staging Block layer patches - crypto: Fix crash when used with multiqueue devices - linux-aio: add IO_CMD_FDSYNC command support - copy-before-write: Avoid integer overflows for timeout > 4s - Fix crash with QMP block_resize and iothreads - qemu-io: add cvtnum() error handling for zone commands - Code cleanup # -----BEGIN PGP SIGNATURE----- # # iQJFBAABCAAvFiEE3D3rFZqa+V09dFb+fwmycsiPL9YFAmZoitoRHGt3b2xmQHJl # ZGhhdC5jb20ACgkQfwmycsiPL9Z2ng/+KVz0P1M6fjdI0yJSwAla3PVRfB0BjZ+k # pwoUaHholVB4lmhU8OhtUHgEPK/jIZVdgwfG2se8WHR3eAzEVTWqt5mRIjOVUX4b # N29G6gTHt8p64YKSbiqnyK2IC7qhY/o3hQ+d8frk+tqstc2tzFHDtjkWtYROdl/X # iNW6zXy1rz5qIyJ80QWvBs7CfQuvElzK0GN2QusSZDEUJYiLhVS6QfjNmRfJI5yT # /eDoHAjMJycxy+8YpEj1QEdEcFV7dS0BCr6qeWeAg50Gej1xlDeknejG+Cro2A1z # MJu4blqMhzzjG9YIS90wCDOxXYdifa1VQSIpV6zpU1ExToXFOVtF3h06Hu0aHiBu # hU4UnTsQSLmlQXbSbFwlVgRdGfAxvIxp6EuWtPteSAfnxAlxoQbqnV6uN/RsFnsr # R+zSiNx+20IDj4befzcQWNWpWNnTloRR01/iucncEpZZEu0/E58Y4bFAWBexMOhz # MgYTXTVgR+WPuyR8FXyXX32dQBQMb5grSnseXwOBhi3ULrMqjLinR60B+XbWgy/g # mE/oLc+uttAk1EbHH/8od8vjvtDHdl9FrfsPaPDlJTiexqNZHxiDE3WVdhvaPsTF # wJ0CB7pdvrWIAVwmSpfksVoyL2HQx2ILjGSQbKPvYEZqSoUMr7+7Z0SkTQ1i706b # xODS2wm+h0Q= # =hMLb # -----END PGP SIGNATURE----- # gpg: Signature made Tue 11 Jun 2024 10:35:22 AM PDT # gpg: using RSA key DC3DEB159A9AF95D3D7456FE7F09B272C88F2FD6 # gpg: issuer "kwolf@redhat.com" # gpg: Good signature from "Kevin Wolf <kwolf@redhat.com>" [full] * tag 'for-upstream' of https://repo.or.cz/qemu/kevin: crypto/block: drop qcrypto_block_open() n_threads argument block/crypto: create ciphers on demand linux-aio: add IO_CMD_FDSYNC command support block/copy-before-write: use uint64_t for timeout in nanoseconds qemu-io: add cvtnum() error handling for zone commands aio: warn about iohandler_ctx special casing Revert "monitor: use aio_co_reschedule_self()" block: drop force_dup parameter of raw_reconfigure_getfd() Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
This commit is contained in:
commit
36c1febe3f
|
@ -43,7 +43,7 @@ typedef struct BDRVCopyBeforeWriteState {
|
|||
BlockCopyState *bcs;
|
||||
BdrvChild *target;
|
||||
OnCbwError on_cbw_error;
|
||||
uint32_t cbw_timeout_ns;
|
||||
uint64_t cbw_timeout_ns;
|
||||
bool discard_source;
|
||||
|
||||
/*
|
||||
|
|
|
@ -363,7 +363,6 @@ static int block_crypto_open_generic(QCryptoBlockFormat format,
|
|||
block_crypto_read_func,
|
||||
bs,
|
||||
cflags,
|
||||
1,
|
||||
errp);
|
||||
|
||||
if (!crypto->block) {
|
||||
|
|
|
@ -159,6 +159,7 @@ typedef struct BDRVRawState {
|
|||
bool has_discard:1;
|
||||
bool has_write_zeroes:1;
|
||||
bool use_linux_aio:1;
|
||||
bool has_laio_fdsync:1;
|
||||
bool use_linux_io_uring:1;
|
||||
int page_cache_inconsistent; /* errno from fdatasync failure */
|
||||
bool has_fallocate;
|
||||
|
@ -718,6 +719,9 @@ static int raw_open_common(BlockDriverState *bs, QDict *options,
|
|||
ret = -EINVAL;
|
||||
goto fail;
|
||||
}
|
||||
if (s->use_linux_aio) {
|
||||
s->has_laio_fdsync = laio_has_fdsync(s->fd);
|
||||
}
|
||||
#else
|
||||
if (s->use_linux_aio) {
|
||||
error_setg(errp, "aio=native was specified, but is not supported "
|
||||
|
@ -1039,8 +1043,7 @@ static int fcntl_setfl(int fd, int flag)
|
|||
}
|
||||
|
||||
static int raw_reconfigure_getfd(BlockDriverState *bs, int flags,
|
||||
int *open_flags, uint64_t perm, bool force_dup,
|
||||
Error **errp)
|
||||
int *open_flags, uint64_t perm, Error **errp)
|
||||
{
|
||||
BDRVRawState *s = bs->opaque;
|
||||
int fd = -1;
|
||||
|
@ -1068,7 +1071,7 @@ static int raw_reconfigure_getfd(BlockDriverState *bs, int flags,
|
|||
assert((s->open_flags & O_ASYNC) == 0);
|
||||
#endif
|
||||
|
||||
if (!force_dup && *open_flags == s->open_flags) {
|
||||
if (*open_flags == s->open_flags) {
|
||||
/* We're lucky, the existing fd is fine */
|
||||
return s->fd;
|
||||
}
|
||||
|
@ -2599,6 +2602,11 @@ static int coroutine_fn raw_co_flush_to_disk(BlockDriverState *bs)
|
|||
if (raw_check_linux_io_uring(s)) {
|
||||
return luring_co_submit(bs, s->fd, 0, NULL, QEMU_AIO_FLUSH);
|
||||
}
|
||||
#endif
|
||||
#ifdef CONFIG_LINUX_AIO
|
||||
if (s->has_laio_fdsync && raw_check_linux_aio(s)) {
|
||||
return laio_co_submit(s->fd, 0, NULL, QEMU_AIO_FLUSH, 0);
|
||||
}
|
||||
#endif
|
||||
return raw_thread_pool_submit(handle_aiocb_flush, &acb);
|
||||
}
|
||||
|
@ -3748,8 +3756,7 @@ static int raw_check_perm(BlockDriverState *bs, uint64_t perm, uint64_t shared,
|
|||
int ret;
|
||||
|
||||
/* We may need a new fd if auto-read-only switches the mode */
|
||||
ret = raw_reconfigure_getfd(bs, input_flags, &open_flags, perm,
|
||||
false, errp);
|
||||
ret = raw_reconfigure_getfd(bs, input_flags, &open_flags, perm, errp);
|
||||
if (ret < 0) {
|
||||
return ret;
|
||||
} else if (ret != s->fd) {
|
||||
|
|
|
@ -384,6 +384,9 @@ static int laio_do_submit(int fd, struct qemu_laiocb *laiocb, off_t offset,
|
|||
case QEMU_AIO_READ:
|
||||
io_prep_preadv(iocbs, fd, qiov->iov, qiov->niov, offset);
|
||||
break;
|
||||
case QEMU_AIO_FLUSH:
|
||||
io_prep_fdsync(iocbs, fd);
|
||||
break;
|
||||
/* Currently Linux kernel does not support other operations */
|
||||
default:
|
||||
fprintf(stderr, "%s: invalid AIO request type 0x%x.\n",
|
||||
|
@ -412,7 +415,7 @@ int coroutine_fn laio_co_submit(int fd, uint64_t offset, QEMUIOVector *qiov,
|
|||
AioContext *ctx = qemu_get_current_aio_context();
|
||||
struct qemu_laiocb laiocb = {
|
||||
.co = qemu_coroutine_self(),
|
||||
.nbytes = qiov->size,
|
||||
.nbytes = qiov ? qiov->size : 0,
|
||||
.ctx = aio_get_linux_aio(ctx),
|
||||
.ret = -EINPROGRESS,
|
||||
.is_read = (type == QEMU_AIO_READ),
|
||||
|
@ -486,3 +489,19 @@ void laio_cleanup(LinuxAioState *s)
|
|||
}
|
||||
g_free(s);
|
||||
}
|
||||
|
||||
bool laio_has_fdsync(int fd)
|
||||
{
|
||||
struct iocb cb;
|
||||
struct iocb *cbs[] = {&cb, NULL};
|
||||
|
||||
io_context_t ctx = 0;
|
||||
io_setup(1, &ctx);
|
||||
|
||||
/* check if host kernel supports IO_CMD_FDSYNC */
|
||||
io_prep_fdsync(&cb, fd);
|
||||
int ret = io_submit(ctx, 1, cbs);
|
||||
|
||||
io_destroy(ctx);
|
||||
return (ret == -EINVAL) ? false : true;
|
||||
}
|
||||
|
|
|
@ -211,7 +211,7 @@ static int qcow_open(BlockDriverState *bs, QDict *options, int flags,
|
|||
cflags |= QCRYPTO_BLOCK_OPEN_NO_IO;
|
||||
}
|
||||
s->crypto = qcrypto_block_open(crypto_opts, "encrypt.",
|
||||
NULL, NULL, cflags, 1, errp);
|
||||
NULL, NULL, cflags, errp);
|
||||
if (!s->crypto) {
|
||||
ret = -EINVAL;
|
||||
goto fail;
|
||||
|
|
|
@ -321,7 +321,7 @@ qcow2_read_extensions(BlockDriverState *bs, uint64_t start_offset,
|
|||
}
|
||||
s->crypto = qcrypto_block_open(s->crypto_opts, "encrypt.",
|
||||
qcow2_crypto_hdr_read_func,
|
||||
bs, cflags, QCOW2_MAX_THREADS, errp);
|
||||
bs, cflags, errp);
|
||||
if (!s->crypto) {
|
||||
return -EINVAL;
|
||||
}
|
||||
|
@ -1701,8 +1701,7 @@ qcow2_do_open(BlockDriverState *bs, QDict *options, int flags,
|
|||
cflags |= QCRYPTO_BLOCK_OPEN_NO_IO;
|
||||
}
|
||||
s->crypto = qcrypto_block_open(s->crypto_opts, "encrypt.",
|
||||
NULL, NULL, cflags,
|
||||
QCOW2_MAX_THREADS, errp);
|
||||
NULL, NULL, cflags, errp);
|
||||
if (!s->crypto) {
|
||||
ret = -EINVAL;
|
||||
goto fail;
|
||||
|
|
|
@ -1189,7 +1189,6 @@ qcrypto_block_luks_open(QCryptoBlock *block,
|
|||
QCryptoBlockReadFunc readfunc,
|
||||
void *opaque,
|
||||
unsigned int flags,
|
||||
size_t n_threads,
|
||||
Error **errp)
|
||||
{
|
||||
QCryptoBlockLUKS *luks = NULL;
|
||||
|
@ -1262,7 +1261,6 @@ qcrypto_block_luks_open(QCryptoBlock *block,
|
|||
luks->cipher_mode,
|
||||
masterkey,
|
||||
luks->header.master_key_len,
|
||||
n_threads,
|
||||
errp) < 0) {
|
||||
goto fail;
|
||||
}
|
||||
|
@ -1456,7 +1454,7 @@ qcrypto_block_luks_create(QCryptoBlock *block,
|
|||
/* Setup the block device payload encryption objects */
|
||||
if (qcrypto_block_init_cipher(block, luks_opts.cipher_alg,
|
||||
luks_opts.cipher_mode, masterkey,
|
||||
luks->header.master_key_len, 1, errp) < 0) {
|
||||
luks->header.master_key_len, errp) < 0) {
|
||||
goto error;
|
||||
}
|
||||
|
||||
|
|
|
@ -44,7 +44,6 @@ qcrypto_block_qcow_has_format(const uint8_t *buf G_GNUC_UNUSED,
|
|||
static int
|
||||
qcrypto_block_qcow_init(QCryptoBlock *block,
|
||||
const char *keysecret,
|
||||
size_t n_threads,
|
||||
Error **errp)
|
||||
{
|
||||
char *password;
|
||||
|
@ -75,7 +74,7 @@ qcrypto_block_qcow_init(QCryptoBlock *block,
|
|||
ret = qcrypto_block_init_cipher(block, QCRYPTO_CIPHER_ALG_AES_128,
|
||||
QCRYPTO_CIPHER_MODE_CBC,
|
||||
keybuf, G_N_ELEMENTS(keybuf),
|
||||
n_threads, errp);
|
||||
errp);
|
||||
if (ret < 0) {
|
||||
ret = -ENOTSUP;
|
||||
goto fail;
|
||||
|
@ -100,7 +99,6 @@ qcrypto_block_qcow_open(QCryptoBlock *block,
|
|||
QCryptoBlockReadFunc readfunc G_GNUC_UNUSED,
|
||||
void *opaque G_GNUC_UNUSED,
|
||||
unsigned int flags,
|
||||
size_t n_threads,
|
||||
Error **errp)
|
||||
{
|
||||
if (flags & QCRYPTO_BLOCK_OPEN_NO_IO) {
|
||||
|
@ -115,7 +113,7 @@ qcrypto_block_qcow_open(QCryptoBlock *block,
|
|||
return -1;
|
||||
}
|
||||
return qcrypto_block_qcow_init(block, options->u.qcow.key_secret,
|
||||
n_threads, errp);
|
||||
errp);
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -135,7 +133,7 @@ qcrypto_block_qcow_create(QCryptoBlock *block,
|
|||
return -1;
|
||||
}
|
||||
/* QCow2 has no special header, since everything is hardwired */
|
||||
return qcrypto_block_qcow_init(block, options->u.qcow.key_secret, 1, errp);
|
||||
return qcrypto_block_qcow_init(block, options->u.qcow.key_secret, errp);
|
||||
}
|
||||
|
||||
|
||||
|
|
114
crypto/block.c
114
crypto/block.c
|
@ -20,6 +20,7 @@
|
|||
|
||||
#include "qemu/osdep.h"
|
||||
#include "qapi/error.h"
|
||||
#include "qemu/lockable.h"
|
||||
#include "blockpriv.h"
|
||||
#include "block-qcow.h"
|
||||
#include "block-luks.h"
|
||||
|
@ -52,11 +53,12 @@ QCryptoBlock *qcrypto_block_open(QCryptoBlockOpenOptions *options,
|
|||
QCryptoBlockReadFunc readfunc,
|
||||
void *opaque,
|
||||
unsigned int flags,
|
||||
size_t n_threads,
|
||||
Error **errp)
|
||||
{
|
||||
QCryptoBlock *block = g_new0(QCryptoBlock, 1);
|
||||
|
||||
qemu_mutex_init(&block->mutex);
|
||||
|
||||
block->format = options->format;
|
||||
|
||||
if (options->format >= G_N_ELEMENTS(qcrypto_block_drivers) ||
|
||||
|
@ -70,14 +72,12 @@ QCryptoBlock *qcrypto_block_open(QCryptoBlockOpenOptions *options,
|
|||
block->driver = qcrypto_block_drivers[options->format];
|
||||
|
||||
if (block->driver->open(block, options, optprefix,
|
||||
readfunc, opaque, flags, n_threads, errp) < 0)
|
||||
readfunc, opaque, flags, errp) < 0)
|
||||
{
|
||||
g_free(block);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
qemu_mutex_init(&block->mutex);
|
||||
|
||||
return block;
|
||||
}
|
||||
|
||||
|
@ -92,6 +92,8 @@ QCryptoBlock *qcrypto_block_create(QCryptoBlockCreateOptions *options,
|
|||
{
|
||||
QCryptoBlock *block = g_new0(QCryptoBlock, 1);
|
||||
|
||||
qemu_mutex_init(&block->mutex);
|
||||
|
||||
block->format = options->format;
|
||||
|
||||
if (options->format >= G_N_ELEMENTS(qcrypto_block_drivers) ||
|
||||
|
@ -111,8 +113,6 @@ QCryptoBlock *qcrypto_block_create(QCryptoBlockCreateOptions *options,
|
|||
return NULL;
|
||||
}
|
||||
|
||||
qemu_mutex_init(&block->mutex);
|
||||
|
||||
return block;
|
||||
}
|
||||
|
||||
|
@ -227,37 +227,42 @@ QCryptoCipher *qcrypto_block_get_cipher(QCryptoBlock *block)
|
|||
* This function is used only in test with one thread (it's safe to skip
|
||||
* pop/push interface), so it's enough to assert it here:
|
||||
*/
|
||||
assert(block->n_ciphers <= 1);
|
||||
return block->ciphers ? block->ciphers[0] : NULL;
|
||||
assert(block->max_free_ciphers <= 1);
|
||||
return block->free_ciphers ? block->free_ciphers[0] : NULL;
|
||||
}
|
||||
|
||||
|
||||
static QCryptoCipher *qcrypto_block_pop_cipher(QCryptoBlock *block)
|
||||
static QCryptoCipher *qcrypto_block_pop_cipher(QCryptoBlock *block,
|
||||
Error **errp)
|
||||
{
|
||||
QCryptoCipher *cipher;
|
||||
/* Usually there is a free cipher available */
|
||||
WITH_QEMU_LOCK_GUARD(&block->mutex) {
|
||||
if (block->n_free_ciphers > 0) {
|
||||
block->n_free_ciphers--;
|
||||
return block->free_ciphers[block->n_free_ciphers];
|
||||
}
|
||||
}
|
||||
|
||||
qemu_mutex_lock(&block->mutex);
|
||||
|
||||
assert(block->n_free_ciphers > 0);
|
||||
block->n_free_ciphers--;
|
||||
cipher = block->ciphers[block->n_free_ciphers];
|
||||
|
||||
qemu_mutex_unlock(&block->mutex);
|
||||
|
||||
return cipher;
|
||||
/* Otherwise allocate a new cipher */
|
||||
return qcrypto_cipher_new(block->alg, block->mode, block->key,
|
||||
block->nkey, errp);
|
||||
}
|
||||
|
||||
|
||||
static void qcrypto_block_push_cipher(QCryptoBlock *block,
|
||||
QCryptoCipher *cipher)
|
||||
{
|
||||
qemu_mutex_lock(&block->mutex);
|
||||
QEMU_LOCK_GUARD(&block->mutex);
|
||||
|
||||
assert(block->n_free_ciphers < block->n_ciphers);
|
||||
block->ciphers[block->n_free_ciphers] = cipher;
|
||||
if (block->n_free_ciphers == block->max_free_ciphers) {
|
||||
block->max_free_ciphers++;
|
||||
block->free_ciphers = g_renew(QCryptoCipher *,
|
||||
block->free_ciphers,
|
||||
block->max_free_ciphers);
|
||||
}
|
||||
|
||||
block->free_ciphers[block->n_free_ciphers] = cipher;
|
||||
block->n_free_ciphers++;
|
||||
|
||||
qemu_mutex_unlock(&block->mutex);
|
||||
}
|
||||
|
||||
|
||||
|
@ -265,24 +270,31 @@ int qcrypto_block_init_cipher(QCryptoBlock *block,
|
|||
QCryptoCipherAlgorithm alg,
|
||||
QCryptoCipherMode mode,
|
||||
const uint8_t *key, size_t nkey,
|
||||
size_t n_threads, Error **errp)
|
||||
Error **errp)
|
||||
{
|
||||
size_t i;
|
||||
QCryptoCipher *cipher;
|
||||
|
||||
assert(!block->ciphers && !block->n_ciphers && !block->n_free_ciphers);
|
||||
assert(!block->free_ciphers && !block->max_free_ciphers &&
|
||||
!block->n_free_ciphers);
|
||||
|
||||
block->ciphers = g_new0(QCryptoCipher *, n_threads);
|
||||
/* Stash away cipher parameters for qcrypto_block_pop_cipher() */
|
||||
block->alg = alg;
|
||||
block->mode = mode;
|
||||
block->key = g_memdup2(key, nkey);
|
||||
block->nkey = nkey;
|
||||
|
||||
for (i = 0; i < n_threads; i++) {
|
||||
block->ciphers[i] = qcrypto_cipher_new(alg, mode, key, nkey, errp);
|
||||
if (!block->ciphers[i]) {
|
||||
qcrypto_block_free_cipher(block);
|
||||
return -1;
|
||||
}
|
||||
block->n_ciphers++;
|
||||
block->n_free_ciphers++;
|
||||
/*
|
||||
* Create a new cipher to validate the parameters now. This reduces the
|
||||
* chance of cipher creation failing at I/O time.
|
||||
*/
|
||||
cipher = qcrypto_block_pop_cipher(block, errp);
|
||||
if (!cipher) {
|
||||
g_free(block->key);
|
||||
block->key = NULL;
|
||||
return -1;
|
||||
}
|
||||
|
||||
qcrypto_block_push_cipher(block, cipher);
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@ -291,19 +303,23 @@ void qcrypto_block_free_cipher(QCryptoBlock *block)
|
|||
{
|
||||
size_t i;
|
||||
|
||||
if (!block->ciphers) {
|
||||
g_free(block->key);
|
||||
block->key = NULL;
|
||||
|
||||
if (!block->free_ciphers) {
|
||||
return;
|
||||
}
|
||||
|
||||
assert(block->n_ciphers == block->n_free_ciphers);
|
||||
/* All popped ciphers were eventually pushed back */
|
||||
assert(block->n_free_ciphers == block->max_free_ciphers);
|
||||
|
||||
for (i = 0; i < block->n_ciphers; i++) {
|
||||
qcrypto_cipher_free(block->ciphers[i]);
|
||||
for (i = 0; i < block->max_free_ciphers; i++) {
|
||||
qcrypto_cipher_free(block->free_ciphers[i]);
|
||||
}
|
||||
|
||||
g_free(block->ciphers);
|
||||
block->ciphers = NULL;
|
||||
block->n_ciphers = block->n_free_ciphers = 0;
|
||||
g_free(block->free_ciphers);
|
||||
block->free_ciphers = NULL;
|
||||
block->max_free_ciphers = block->n_free_ciphers = 0;
|
||||
}
|
||||
|
||||
QCryptoIVGen *qcrypto_block_get_ivgen(QCryptoBlock *block)
|
||||
|
@ -311,7 +327,7 @@ QCryptoIVGen *qcrypto_block_get_ivgen(QCryptoBlock *block)
|
|||
/* ivgen should be accessed under mutex. However, this function is used only
|
||||
* in test with one thread, so it's enough to assert it here:
|
||||
*/
|
||||
assert(block->n_ciphers <= 1);
|
||||
assert(block->max_free_ciphers <= 1);
|
||||
return block->ivgen;
|
||||
}
|
||||
|
||||
|
@ -446,7 +462,10 @@ int qcrypto_block_decrypt_helper(QCryptoBlock *block,
|
|||
Error **errp)
|
||||
{
|
||||
int ret;
|
||||
QCryptoCipher *cipher = qcrypto_block_pop_cipher(block);
|
||||
QCryptoCipher *cipher = qcrypto_block_pop_cipher(block, errp);
|
||||
if (!cipher) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
ret = do_qcrypto_block_cipher_encdec(cipher, block->niv, block->ivgen,
|
||||
&block->mutex, sectorsize, offset, buf,
|
||||
|
@ -465,7 +484,10 @@ int qcrypto_block_encrypt_helper(QCryptoBlock *block,
|
|||
Error **errp)
|
||||
{
|
||||
int ret;
|
||||
QCryptoCipher *cipher = qcrypto_block_pop_cipher(block);
|
||||
QCryptoCipher *cipher = qcrypto_block_pop_cipher(block, errp);
|
||||
if (!cipher) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
ret = do_qcrypto_block_cipher_encdec(cipher, block->niv, block->ivgen,
|
||||
&block->mutex, sectorsize, offset, buf,
|
||||
|
|
|
@ -32,8 +32,14 @@ struct QCryptoBlock {
|
|||
const QCryptoBlockDriver *driver;
|
||||
void *opaque;
|
||||
|
||||
QCryptoCipher **ciphers;
|
||||
size_t n_ciphers;
|
||||
/* Cipher parameters */
|
||||
QCryptoCipherAlgorithm alg;
|
||||
QCryptoCipherMode mode;
|
||||
uint8_t *key;
|
||||
size_t nkey;
|
||||
|
||||
QCryptoCipher **free_ciphers;
|
||||
size_t max_free_ciphers;
|
||||
size_t n_free_ciphers;
|
||||
QCryptoIVGen *ivgen;
|
||||
QemuMutex mutex;
|
||||
|
@ -53,7 +59,6 @@ struct QCryptoBlockDriver {
|
|||
QCryptoBlockReadFunc readfunc,
|
||||
void *opaque,
|
||||
unsigned int flags,
|
||||
size_t n_threads,
|
||||
Error **errp);
|
||||
|
||||
int (*create)(QCryptoBlock *block,
|
||||
|
@ -130,7 +135,7 @@ int qcrypto_block_init_cipher(QCryptoBlock *block,
|
|||
QCryptoCipherAlgorithm alg,
|
||||
QCryptoCipherMode mode,
|
||||
const uint8_t *key, size_t nkey,
|
||||
size_t n_threads, Error **errp);
|
||||
Error **errp);
|
||||
|
||||
void qcrypto_block_free_cipher(QCryptoBlock *block);
|
||||
|
||||
|
|
|
@ -629,6 +629,9 @@ void aio_co_schedule(AioContext *ctx, Coroutine *co);
|
|||
*
|
||||
* Move the currently running coroutine to new_ctx. If the coroutine is already
|
||||
* running in new_ctx, do nothing.
|
||||
*
|
||||
* Note that this function cannot reschedule from iohandler_ctx to
|
||||
* qemu_aio_context.
|
||||
*/
|
||||
void coroutine_fn aio_co_reschedule_self(AioContext *new_ctx);
|
||||
|
||||
|
@ -661,6 +664,9 @@ void aio_co_enter(AioContext *ctx, Coroutine *co);
|
|||
* If called from an IOThread this will be the IOThread's AioContext. If
|
||||
* called from the main thread or with the "big QEMU lock" taken it
|
||||
* will be the main loop AioContext.
|
||||
*
|
||||
* Note that the return value is never the main loop's iohandler_ctx and the
|
||||
* return value is the main loop AioContext instead.
|
||||
*/
|
||||
AioContext *qemu_get_current_aio_context(void);
|
||||
|
||||
|
|
|
@ -60,6 +60,7 @@ void laio_cleanup(LinuxAioState *s);
|
|||
int coroutine_fn laio_co_submit(int fd, uint64_t offset, QEMUIOVector *qiov,
|
||||
int type, uint64_t dev_max_batch);
|
||||
|
||||
bool laio_has_fdsync(int);
|
||||
void laio_detach_aio_context(LinuxAioState *s, AioContext *old_context);
|
||||
void laio_attach_aio_context(LinuxAioState *s, AioContext *new_context);
|
||||
#endif
|
||||
|
|
|
@ -76,7 +76,6 @@ typedef enum {
|
|||
* @readfunc: callback for reading data from the volume
|
||||
* @opaque: data to pass to @readfunc
|
||||
* @flags: bitmask of QCryptoBlockOpenFlags values
|
||||
* @n_threads: allow concurrent I/O from up to @n_threads threads
|
||||
* @errp: pointer to a NULL-initialized error object
|
||||
*
|
||||
* Create a new block encryption object for an existing
|
||||
|
@ -113,7 +112,6 @@ QCryptoBlock *qcrypto_block_open(QCryptoBlockOpenOptions *options,
|
|||
QCryptoBlockReadFunc readfunc,
|
||||
void *opaque,
|
||||
unsigned int flags,
|
||||
size_t n_threads,
|
||||
Error **errp);
|
||||
|
||||
typedef enum {
|
||||
|
|
|
@ -212,7 +212,8 @@ QDict *coroutine_mixed_fn qmp_dispatch(const QmpCommandList *cmds, QObject *requ
|
|||
* executing the command handler so that it can make progress if it
|
||||
* involves an AIO_WAIT_WHILE().
|
||||
*/
|
||||
aio_co_reschedule_self(qemu_get_aio_context());
|
||||
aio_co_schedule(qemu_get_aio_context(), qemu_coroutine_self());
|
||||
qemu_coroutine_yield();
|
||||
}
|
||||
|
||||
monitor_set_cur(qemu_coroutine_self(), cur_mon);
|
||||
|
@ -226,7 +227,9 @@ QDict *coroutine_mixed_fn qmp_dispatch(const QmpCommandList *cmds, QObject *requ
|
|||
* Move back to iohandler_ctx so that nested event loops for
|
||||
* qemu_aio_context don't start new monitor commands.
|
||||
*/
|
||||
aio_co_reschedule_self(iohandler_get_aio_context());
|
||||
aio_co_schedule(iohandler_get_aio_context(),
|
||||
qemu_coroutine_self());
|
||||
qemu_coroutine_yield();
|
||||
}
|
||||
} else {
|
||||
/*
|
||||
|
|
|
@ -1739,12 +1739,26 @@ static int zone_report_f(BlockBackend *blk, int argc, char **argv)
|
|||
{
|
||||
int ret;
|
||||
int64_t offset;
|
||||
int64_t val;
|
||||
unsigned int nr_zones;
|
||||
|
||||
++optind;
|
||||
offset = cvtnum(argv[optind]);
|
||||
if (offset < 0) {
|
||||
print_cvtnum_err(offset, argv[optind]);
|
||||
return offset;
|
||||
}
|
||||
++optind;
|
||||
nr_zones = cvtnum(argv[optind]);
|
||||
val = cvtnum(argv[optind]);
|
||||
if (val < 0) {
|
||||
print_cvtnum_err(val, argv[optind]);
|
||||
return val;
|
||||
}
|
||||
if (val > UINT_MAX) {
|
||||
printf("Number of zones must be less than 2^32\n");
|
||||
return -ERANGE;
|
||||
}
|
||||
nr_zones = val;
|
||||
|
||||
g_autofree BlockZoneDescriptor *zones = NULL;
|
||||
zones = g_new(BlockZoneDescriptor, nr_zones);
|
||||
|
@ -1780,8 +1794,16 @@ static int zone_open_f(BlockBackend *blk, int argc, char **argv)
|
|||
int64_t offset, len;
|
||||
++optind;
|
||||
offset = cvtnum(argv[optind]);
|
||||
if (offset < 0) {
|
||||
print_cvtnum_err(offset, argv[optind]);
|
||||
return offset;
|
||||
}
|
||||
++optind;
|
||||
len = cvtnum(argv[optind]);
|
||||
if (len < 0) {
|
||||
print_cvtnum_err(len, argv[optind]);
|
||||
return len;
|
||||
}
|
||||
ret = blk_zone_mgmt(blk, BLK_ZO_OPEN, offset, len);
|
||||
if (ret < 0) {
|
||||
printf("zone open failed: %s\n", strerror(-ret));
|
||||
|
@ -1805,8 +1827,16 @@ static int zone_close_f(BlockBackend *blk, int argc, char **argv)
|
|||
int64_t offset, len;
|
||||
++optind;
|
||||
offset = cvtnum(argv[optind]);
|
||||
if (offset < 0) {
|
||||
print_cvtnum_err(offset, argv[optind]);
|
||||
return offset;
|
||||
}
|
||||
++optind;
|
||||
len = cvtnum(argv[optind]);
|
||||
if (len < 0) {
|
||||
print_cvtnum_err(len, argv[optind]);
|
||||
return len;
|
||||
}
|
||||
ret = blk_zone_mgmt(blk, BLK_ZO_CLOSE, offset, len);
|
||||
if (ret < 0) {
|
||||
printf("zone close failed: %s\n", strerror(-ret));
|
||||
|
@ -1830,8 +1860,16 @@ static int zone_finish_f(BlockBackend *blk, int argc, char **argv)
|
|||
int64_t offset, len;
|
||||
++optind;
|
||||
offset = cvtnum(argv[optind]);
|
||||
if (offset < 0) {
|
||||
print_cvtnum_err(offset, argv[optind]);
|
||||
return offset;
|
||||
}
|
||||
++optind;
|
||||
len = cvtnum(argv[optind]);
|
||||
if (len < 0) {
|
||||
print_cvtnum_err(len, argv[optind]);
|
||||
return len;
|
||||
}
|
||||
ret = blk_zone_mgmt(blk, BLK_ZO_FINISH, offset, len);
|
||||
if (ret < 0) {
|
||||
printf("zone finish failed: %s\n", strerror(-ret));
|
||||
|
@ -1855,8 +1893,16 @@ static int zone_reset_f(BlockBackend *blk, int argc, char **argv)
|
|||
int64_t offset, len;
|
||||
++optind;
|
||||
offset = cvtnum(argv[optind]);
|
||||
if (offset < 0) {
|
||||
print_cvtnum_err(offset, argv[optind]);
|
||||
return offset;
|
||||
}
|
||||
++optind;
|
||||
len = cvtnum(argv[optind]);
|
||||
if (len < 0) {
|
||||
print_cvtnum_err(len, argv[optind]);
|
||||
return len;
|
||||
}
|
||||
ret = blk_zone_mgmt(blk, BLK_ZO_RESET, offset, len);
|
||||
if (ret < 0) {
|
||||
printf("zone reset failed: %s\n", strerror(-ret));
|
||||
|
|
|
@ -303,7 +303,6 @@ static void test_block(gconstpointer opaque)
|
|||
test_block_read_func,
|
||||
&header,
|
||||
0,
|
||||
1,
|
||||
NULL);
|
||||
g_assert(blk == NULL);
|
||||
|
||||
|
@ -312,7 +311,6 @@ static void test_block(gconstpointer opaque)
|
|||
test_block_read_func,
|
||||
&header,
|
||||
QCRYPTO_BLOCK_OPEN_NO_IO,
|
||||
1,
|
||||
&error_abort);
|
||||
|
||||
g_assert(qcrypto_block_get_cipher(blk) == NULL);
|
||||
|
@ -327,7 +325,6 @@ static void test_block(gconstpointer opaque)
|
|||
test_block_read_func,
|
||||
&header,
|
||||
0,
|
||||
1,
|
||||
&error_abort);
|
||||
g_assert(blk);
|
||||
|
||||
|
@ -384,7 +381,6 @@ test_luks_bad_header(gconstpointer data)
|
|||
test_block_read_func,
|
||||
&buf,
|
||||
0,
|
||||
1,
|
||||
&err);
|
||||
g_assert(!blk);
|
||||
g_assert(err);
|
||||
|
|
Loading…
Reference in New Issue