2018-11-07 09:36:44 +03:00
|
|
|
block-obj-y += raw-format.o vmdk.o vpc.o
|
|
|
|
block-obj-$(CONFIG_QCOW1) += qcow.o
|
|
|
|
block-obj-$(CONFIG_VDI) += vdi.o
|
|
|
|
block-obj-$(CONFIG_CLOOP) += cloop.o
|
|
|
|
block-obj-$(CONFIG_BOCHS) += bochs.o
|
|
|
|
block-obj-$(CONFIG_VVFAT) += vvfat.o
|
|
|
|
block-obj-$(CONFIG_DMG) += dmg.o
|
|
|
|
|
2019-05-06 17:27:35 +03:00
|
|
|
block-obj-y += qcow2.o qcow2-refcount.o qcow2-cluster.o qcow2-snapshot.o qcow2-cache.o qcow2-bitmap.o qcow2-threads.o
|
2018-11-07 09:36:44 +03:00
|
|
|
block-obj-$(CONFIG_QED) += qed.o qed-l2-cache.o qed-table.o qed-cluster.o
|
|
|
|
block-obj-$(CONFIG_QED) += qed-check.o
|
2016-09-21 07:27:16 +03:00
|
|
|
block-obj-y += vhdx.o vhdx-endian.o vhdx-log.o
|
2015-07-01 20:10:35 +03:00
|
|
|
block-obj-y += quorum.o
|
2018-11-07 09:36:44 +03:00
|
|
|
block-obj-y += blkdebug.o blkverify.o blkreplay.o
|
|
|
|
block-obj-$(CONFIG_PARALLELS) += parallels.o
|
2018-07-03 17:48:48 +03:00
|
|
|
block-obj-y += blklogwrites.o
|
block: New BlockBackend
A block device consists of a frontend device model and a backend.
A block backend has a tree of block drivers doing the actual work.
The tree is managed by the block layer.
We currently use a single abstraction BlockDriverState both for tree
nodes and the backend as a whole. Drawbacks:
* Its API includes both stuff that makes sense only at the block
backend level (root of the tree) and stuff that's only for use
within the block layer. This makes the API bigger and more complex
than necessary. Moreover, it's not obvious which interfaces are
meant for device models, and which really aren't.
* Since device models keep a reference to their backend, the backend
object can't just be destroyed. But for media change, we need to
replace the tree. Our solution is to make the BlockDriverState
generic, with actual driver state in a separate object, pointed to
by member opaque. That lets us replace the tree by deinitializing
and reinitializing its root. This special need of the root makes
the data structure awkward everywhere in the tree.
The general plan is to separate the APIs into "block backend", for use
by device models, monitor and whatever other code dealing with block
backends, and "block driver", for use by the block layer and whatever
other code (if any) dealing with trees and tree nodes.
Code dealing with block backends, device models in particular, should
become completely oblivious of BlockDriverState. This should let us
clean up both APIs, and the tree data structures.
This commit is a first step. It creates a minimal "block backend"
API: type BlockBackend and functions to create, destroy and find them.
BlockBackend objects are created and destroyed exactly when root
BlockDriverState objects are created and destroyed. "Root" in the
sense of "in bdrv_states". They're not yet used for anything; that'll
come shortly.
A root BlockDriverState is created with bdrv_new_root(), so where to
create a BlockBackend is obvious. Where these roots get destroyed
isn't always as obvious.
It is obvious in qemu-img.c, qemu-io.c and qemu-nbd.c, and in error
paths of blockdev_init(), blk_connect(). That leaves destruction of
objects successfully created by blockdev_init() and blk_connect().
blockdev_init() is used only by drive_new() and qmp_blockdev_add().
Objects created by the latter are currently indestructible (see commit
48f364d "blockdev: Refuse to drive_del something added with
blockdev-add" and commit 2d246f0 "blockdev: Introduce
DriveInfo.enable_auto_del"). Objects created by the former get
destroyed by drive_del().
Objects created by blk_connect() get destroyed by blk_disconnect().
BlockBackend is reference-counted. Its reference count never exceeds
one so far, but that's going to change.
In drive_del(), the BB's reference count is surely one now. The BDS's
reference count is greater than one when something else is holding a
reference, such as a block job. In this case, the BB is destroyed
right away, but the BDS lives on until all extra references get
dropped.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
2014-10-07 15:59:04 +04:00
|
|
|
block-obj-y += block-backend.o snapshot.o qapi.o
|
2016-12-02 22:48:54 +03:00
|
|
|
block-obj-$(CONFIG_WIN32) += file-win32.o win32-aio.o
|
|
|
|
block-obj-$(CONFIG_POSIX) += file-posix.o
|
2012-10-26 13:27:45 +04:00
|
|
|
block-obj-$(CONFIG_LINUX_AIO) += linux-aio.o
|
2020-01-20 17:18:47 +03:00
|
|
|
block-obj-$(CONFIG_LINUX_IO_URING) += io_uring.o
|
2018-01-09 18:50:57 +03:00
|
|
|
block-obj-y += null.o mirror.o commit.o io.o create.o
|
2015-06-08 19:17:42 +03:00
|
|
|
block-obj-y += throttle-groups.o
|
2018-01-16 09:08:55 +03:00
|
|
|
block-obj-$(CONFIG_LINUX) += nvme.o
|
2012-06-09 06:01:51 +04:00
|
|
|
|
2019-06-11 13:27:19 +03:00
|
|
|
block-obj-y += nbd.o
|
2018-11-07 09:36:44 +03:00
|
|
|
block-obj-$(CONFIG_SHEEPDOG) += sheepdog.o
|
2012-05-22 15:44:39 +04:00
|
|
|
block-obj-$(CONFIG_LIBISCSI) += iscsi.o
|
2017-01-24 15:49:21 +03:00
|
|
|
block-obj-$(if $(CONFIG_LIBISCSI),y,n) += iscsi-opts.o
|
2014-02-03 13:26:13 +04:00
|
|
|
block-obj-$(CONFIG_LIBNFS) += nfs.o
|
2012-05-22 15:44:39 +04:00
|
|
|
block-obj-$(CONFIG_CURL) += curl.o
|
|
|
|
block-obj-$(CONFIG_RBD) += rbd.o
|
2012-09-27 18:00:32 +04:00
|
|
|
block-obj-$(CONFIG_GLUSTERFS) += gluster.o
|
block/vxhs.c: Add support for a new block device type called "vxhs"
Source code for the qnio library that this code loads can be downloaded from:
https://github.com/VeritasHyperScale/libqnio.git
Sample command line using JSON syntax:
./x86_64-softmmu/qemu-system-x86_64 -name instance-00000008 -S -vnc 0.0.0.0:0
-k en-us -vga cirrus -device virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x5
-msg timestamp=on
'json:{"driver":"vxhs","vdisk-id":"c3e9095a-a5ee-4dce-afeb-2a59fb387410",
"server":{"host":"172.172.17.4","port":"9999"}}'
Sample command line using URI syntax:
qemu-img convert -f raw -O raw -n
/var/lib/nova/instances/_base/0c5eacd5ebea5ed914b6a3e7b18f1ce734c386ad
vxhs://192.168.0.1:9999/c6718f6b-0401-441d-a8c3-1f0064d75ee0
Sample command line using TLS credentials (run in secure mode):
./qemu-io --object
tls-creds-x509,id=tls0,dir=/etc/pki/qemu/vxhs,endpoint=client -c 'read
-v 66000 2.5k' 'json:{"server.host": "127.0.0.1", "server.port": "9999",
"vdisk-id": "/test.raw", "driver": "vxhs", "tls-creds":"tls0"}'
[Jeff: Modified trace-events with the correct string formatting]
Signed-off-by: Ashish Mittal <Ashish.Mittal@veritas.com>
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
Reviewed-by: Jeff Cody <jcody@redhat.com>
Signed-off-by: Jeff Cody <jcody@redhat.com>
Message-id: 1491277689-24949-2-git-send-email-Ashish.Mittal@veritas.com
2017-04-04 06:48:08 +03:00
|
|
|
block-obj-$(CONFIG_VXHS) += vxhs.o
|
2019-06-20 23:08:40 +03:00
|
|
|
block-obj-$(CONFIG_LIBSSH) += ssh.o
|
2016-03-08 07:44:55 +03:00
|
|
|
block-obj-y += accounting.o dirty-bitmap.o
|
block: add event when disk usage exceeds threshold
Managing applications, like oVirt (http://www.ovirt.org), make extensive
use of thin-provisioned disk images.
To let the guest run smoothly and be not unnecessarily paused, oVirt sets
a disk usage threshold (so called 'high water mark') based on the occupation
of the device, and automatically extends the image once the threshold
is reached or exceeded.
In order to detect the crossing of the threshold, oVirt has no choice but
aggressively polling the QEMU monitor using the query-blockstats command.
This lead to unnecessary system load, and is made even worse under scale:
deployments with hundreds of VMs are no longer rare.
To fix this, this patch adds:
* A new monitor command `block-set-write-threshold', to set a mark for
a given block device.
* A new event `BLOCK_WRITE_THRESHOLD', to report if a block device
usage exceeds the threshold.
* A new `write_threshold' field into the `BlockDeviceInfo' structure,
to report the configured threshold.
This will allow the managing application to use smarter and more
efficient monitoring, greatly reducing the need of polling.
[Updated qemu-iotests 067 output to add the new 'write_threshold'
property. --Stefan]
[Changed g_assert_false() to !g_assert() to fix the build on older glib
versions. --Kevin]
Signed-off-by: Francesco Romani <fromani@redhat.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Message-id: 1421068273-692-1-git-send-email-fromani@redhat.com
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
2015-01-12 16:11:13 +03:00
|
|
|
block-obj-y += write-threshold.o
|
2016-07-27 10:01:45 +03:00
|
|
|
block-obj-y += backup.o
|
2016-07-27 10:01:50 +03:00
|
|
|
block-obj-$(CONFIG_REPLICATION) += replication.o
|
2018-04-21 16:29:21 +03:00
|
|
|
block-obj-y += throttle.o copy-on-read.o
|
2019-09-20 17:20:48 +03:00
|
|
|
block-obj-y += block-copy.o
|
2012-09-28 19:22:47 +04:00
|
|
|
|
block: add generic full disk encryption driver
Add a block driver that is capable of supporting any full disk
encryption format. This utilizes the previously added block
encryption code, and at this time supports the LUKS format.
The driver code is capable of supporting any format supported
by the QCryptoBlock module, so it registers one block driver
for each format. This patch only registers the "luks" driver
since the "qcow" driver is there only for back-compatibility
with existing qcow built-in encryption.
New LUKS compatible volumes can be formatted using qemu-img
with defaults for all settings.
$ qemu-img create --object secret,data=123456,id=sec0 \
-f luks -o key-secret=sec0 demo.luks 10G
Alternatively the cryptographic settings can be explicitly
set
$ qemu-img create --object secret,data=123456,id=sec0 \
-f luks -o key-secret=sec0,cipher-alg=aes-256,\
cipher-mode=cbc,ivgen-alg=plain64,hash-alg=sha256 \
demo.luks 10G
And query its size
$ qemu-img info demo.img
image: demo.img
file format: luks
virtual size: 10G (10737418240 bytes)
disk size: 132K
encrypted: yes
Note that it was not necessary to provide the password
when querying info for the volume. The password is only
required when performing I/O on the volume
All volumes created by this new 'luks' driver should be
capable of being opened by the kernel dm-crypt driver.
The only algorithms listed in the LUKS spec that are
not currently supported by this impl are sha512 and
ripemd160 hashes and cast6 cipher.
Reviewed-by: Eric Blake <eblake@redhat.com>
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
[ kwolf - Added #include to resolve conflict with da34e65c ]
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
2016-03-21 17:11:47 +03:00
|
|
|
block-obj-y += crypto.o
|
|
|
|
|
2019-09-16 20:53:21 +03:00
|
|
|
block-obj-y += aio_task.o
|
2019-10-01 16:14:08 +03:00
|
|
|
block-obj-y += backup-top.o
|
2019-12-02 15:15:04 +03:00
|
|
|
block-obj-y += filter-compress.o
|
2020-03-08 12:24:32 +03:00
|
|
|
common-obj-y += monitor/
|
2019-09-16 20:53:21 +03:00
|
|
|
|
2020-02-24 17:29:54 +03:00
|
|
|
block-obj-y += stream.o
|
2012-09-17 10:35:53 +04:00
|
|
|
|
2020-02-24 17:29:51 +03:00
|
|
|
common-obj-y += qapi-sysemu.o
|
|
|
|
|
2016-08-12 16:27:04 +03:00
|
|
|
nfs.o-libs := $(LIBNFS_LIBS)
|
2014-02-10 10:48:54 +04:00
|
|
|
iscsi.o-cflags := $(LIBISCSI_CFLAGS)
|
|
|
|
iscsi.o-libs := $(LIBISCSI_LIBS)
|
|
|
|
curl.o-cflags := $(CURL_CFLAGS)
|
|
|
|
curl.o-libs := $(CURL_LIBS)
|
|
|
|
rbd.o-cflags := $(RBD_CFLAGS)
|
|
|
|
rbd.o-libs := $(RBD_LIBS)
|
|
|
|
gluster.o-cflags := $(GLUSTERFS_CFLAGS)
|
|
|
|
gluster.o-libs := $(GLUSTERFS_LIBS)
|
block/vxhs.c: Add support for a new block device type called "vxhs"
Source code for the qnio library that this code loads can be downloaded from:
https://github.com/VeritasHyperScale/libqnio.git
Sample command line using JSON syntax:
./x86_64-softmmu/qemu-system-x86_64 -name instance-00000008 -S -vnc 0.0.0.0:0
-k en-us -vga cirrus -device virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x5
-msg timestamp=on
'json:{"driver":"vxhs","vdisk-id":"c3e9095a-a5ee-4dce-afeb-2a59fb387410",
"server":{"host":"172.172.17.4","port":"9999"}}'
Sample command line using URI syntax:
qemu-img convert -f raw -O raw -n
/var/lib/nova/instances/_base/0c5eacd5ebea5ed914b6a3e7b18f1ce734c386ad
vxhs://192.168.0.1:9999/c6718f6b-0401-441d-a8c3-1f0064d75ee0
Sample command line using TLS credentials (run in secure mode):
./qemu-io --object
tls-creds-x509,id=tls0,dir=/etc/pki/qemu/vxhs,endpoint=client -c 'read
-v 66000 2.5k' 'json:{"server.host": "127.0.0.1", "server.port": "9999",
"vdisk-id": "/test.raw", "driver": "vxhs", "tls-creds":"tls0"}'
[Jeff: Modified trace-events with the correct string formatting]
Signed-off-by: Ashish Mittal <Ashish.Mittal@veritas.com>
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
Reviewed-by: Jeff Cody <jcody@redhat.com>
Signed-off-by: Jeff Cody <jcody@redhat.com>
Message-id: 1491277689-24949-2-git-send-email-Ashish.Mittal@veritas.com
2017-04-04 06:48:08 +03:00
|
|
|
vxhs.o-libs := $(VXHS_LIBS)
|
2019-06-20 23:08:40 +03:00
|
|
|
ssh.o-cflags := $(LIBSSH_CFLAGS)
|
|
|
|
ssh.o-libs := $(LIBSSH_LIBS)
|
2018-11-07 09:36:44 +03:00
|
|
|
block-obj-dmg-bz2-$(CONFIG_BZIP2) += dmg-bz2.o
|
|
|
|
block-obj-$(if $(CONFIG_DMG),m,n) += $(block-obj-dmg-bz2-y)
|
2016-09-05 05:50:45 +03:00
|
|
|
dmg-bz2.o-libs := $(BZIP2_LIBS)
|
2018-11-05 18:08:04 +03:00
|
|
|
block-obj-$(if $(CONFIG_LZFSE),m,n) += dmg-lzfse.o
|
|
|
|
dmg-lzfse.o-libs := $(LZFSE_LIBS)
|
2014-02-10 10:48:54 +04:00
|
|
|
qcow.o-libs := -lz
|
|
|
|
linux-aio.o-libs := -laio
|
2020-01-20 17:18:47 +03:00
|
|
|
io_uring.o-cflags := $(LINUX_IO_URING_CFLAGS)
|
|
|
|
io_uring.o-libs := $(LINUX_IO_URING_LIBS)
|
2018-01-12 12:01:19 +03:00
|
|
|
parallels.o-cflags := $(LIBXML2_CFLAGS)
|
|
|
|
parallels.o-libs := $(LIBXML2_LIBS)
|