]>
Commit | Line | Data |
---|---|---|
78368575 DB |
1 | /* |
2 | * QEMU block full disk encryption | |
3 | * | |
4 | * Copyright (c) 2015-2016 Red Hat, Inc. | |
5 | * | |
6 | * This library is free software; you can redistribute it and/or | |
7 | * modify it under the terms of the GNU Lesser General Public | |
8 | * License as published by the Free Software Foundation; either | |
9 | * version 2 of the License, or (at your option) any later version. | |
10 | * | |
11 | * This library is distributed in the hope that it will be useful, | |
12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
14 | * Lesser General Public License for more details. | |
15 | * | |
16 | * You should have received a copy of the GNU Lesser General Public | |
17 | * License along with this library; if not, see <http://www.gnu.org/licenses/>. | |
18 | * | |
19 | */ | |
20 | ||
21 | #include "qemu/osdep.h" | |
22 | ||
23 | #include "block/block_int.h" | |
24 | #include "sysemu/block-backend.h" | |
25 | #include "crypto/block.h" | |
26 | #include "qapi/opts-visitor.h" | |
452fcdbc | 27 | #include "qapi/qmp/qdict.h" |
306a06e5 | 28 | #include "qapi/qobject-input-visitor.h" |
78368575 DB |
29 | #include "qapi-visit.h" |
30 | #include "qapi/error.h" | |
306a06e5 | 31 | #include "block/crypto.h" |
78368575 DB |
32 | |
33 | typedef struct BlockCrypto BlockCrypto; | |
34 | ||
35 | struct BlockCrypto { | |
36 | QCryptoBlock *block; | |
37 | }; | |
38 | ||
39 | ||
40 | static int block_crypto_probe_generic(QCryptoBlockFormat format, | |
41 | const uint8_t *buf, | |
42 | int buf_size, | |
43 | const char *filename) | |
44 | { | |
45 | if (qcrypto_block_has_format(format, buf, buf_size)) { | |
46 | return 100; | |
47 | } else { | |
48 | return 0; | |
49 | } | |
50 | } | |
51 | ||
52 | ||
53 | static ssize_t block_crypto_read_func(QCryptoBlock *block, | |
54 | size_t offset, | |
55 | uint8_t *buf, | |
56 | size_t buflen, | |
e4a3507e | 57 | void *opaque, |
37509233 | 58 | Error **errp) |
78368575 DB |
59 | { |
60 | BlockDriverState *bs = opaque; | |
61 | ssize_t ret; | |
62 | ||
cf2ab8fc | 63 | ret = bdrv_pread(bs->file, offset, buf, buflen); |
78368575 DB |
64 | if (ret < 0) { |
65 | error_setg_errno(errp, -ret, "Could not read encryption header"); | |
66 | return ret; | |
67 | } | |
68 | return ret; | |
69 | } | |
70 | ||
71 | ||
72 | struct BlockCryptoCreateData { | |
73 | const char *filename; | |
74 | QemuOpts *opts; | |
75 | BlockBackend *blk; | |
76 | uint64_t size; | |
77 | }; | |
78 | ||
79 | ||
80 | static ssize_t block_crypto_write_func(QCryptoBlock *block, | |
81 | size_t offset, | |
82 | const uint8_t *buf, | |
83 | size_t buflen, | |
e4a3507e | 84 | void *opaque, |
37509233 | 85 | Error **errp) |
78368575 DB |
86 | { |
87 | struct BlockCryptoCreateData *data = opaque; | |
88 | ssize_t ret; | |
89 | ||
8341f00d | 90 | ret = blk_pwrite(data->blk, offset, buf, buflen, 0); |
78368575 DB |
91 | if (ret < 0) { |
92 | error_setg_errno(errp, -ret, "Could not write encryption header"); | |
93 | return ret; | |
94 | } | |
95 | return ret; | |
96 | } | |
97 | ||
98 | ||
99 | static ssize_t block_crypto_init_func(QCryptoBlock *block, | |
100 | size_t headerlen, | |
e4a3507e | 101 | void *opaque, |
37509233 | 102 | Error **errp) |
78368575 DB |
103 | { |
104 | struct BlockCryptoCreateData *data = opaque; | |
105 | int ret; | |
106 | ||
107 | /* User provided size should reflect amount of space made | |
108 | * available to the guest, so we must take account of that | |
109 | * which will be used by the crypto header | |
110 | */ | |
111 | data->size += headerlen; | |
112 | ||
113 | qemu_opt_set_number(data->opts, BLOCK_OPT_SIZE, data->size, &error_abort); | |
114 | ret = bdrv_create_file(data->filename, data->opts, errp); | |
115 | if (ret < 0) { | |
116 | return -1; | |
117 | } | |
118 | ||
119 | data->blk = blk_new_open(data->filename, NULL, NULL, | |
72e775c7 | 120 | BDRV_O_RDWR | BDRV_O_PROTOCOL, errp); |
78368575 DB |
121 | if (!data->blk) { |
122 | return -1; | |
123 | } | |
124 | ||
125 | return 0; | |
126 | } | |
127 | ||
128 | ||
129 | static QemuOptsList block_crypto_runtime_opts_luks = { | |
130 | .name = "crypto", | |
131 | .head = QTAILQ_HEAD_INITIALIZER(block_crypto_runtime_opts_luks.head), | |
132 | .desc = { | |
4a47f854 | 133 | BLOCK_CRYPTO_OPT_DEF_LUKS_KEY_SECRET(""), |
78368575 DB |
134 | { /* end of list */ } |
135 | }, | |
136 | }; | |
137 | ||
138 | ||
139 | static QemuOptsList block_crypto_create_opts_luks = { | |
140 | .name = "crypto", | |
141 | .head = QTAILQ_HEAD_INITIALIZER(block_crypto_create_opts_luks.head), | |
142 | .desc = { | |
143 | { | |
144 | .name = BLOCK_OPT_SIZE, | |
145 | .type = QEMU_OPT_SIZE, | |
146 | .help = "Virtual disk size" | |
147 | }, | |
4a47f854 DB |
148 | BLOCK_CRYPTO_OPT_DEF_LUKS_KEY_SECRET(""), |
149 | BLOCK_CRYPTO_OPT_DEF_LUKS_CIPHER_ALG(""), | |
150 | BLOCK_CRYPTO_OPT_DEF_LUKS_CIPHER_MODE(""), | |
151 | BLOCK_CRYPTO_OPT_DEF_LUKS_IVGEN_ALG(""), | |
152 | BLOCK_CRYPTO_OPT_DEF_LUKS_IVGEN_HASH_ALG(""), | |
153 | BLOCK_CRYPTO_OPT_DEF_LUKS_HASH_ALG(""), | |
154 | BLOCK_CRYPTO_OPT_DEF_LUKS_ITER_TIME(""), | |
78368575 DB |
155 | { /* end of list */ } |
156 | }, | |
157 | }; | |
158 | ||
159 | ||
306a06e5 | 160 | QCryptoBlockOpenOptions * |
78368575 | 161 | block_crypto_open_opts_init(QCryptoBlockFormat format, |
306a06e5 | 162 | QDict *opts, |
78368575 DB |
163 | Error **errp) |
164 | { | |
09204eac | 165 | Visitor *v; |
78368575 DB |
166 | QCryptoBlockOpenOptions *ret = NULL; |
167 | Error *local_err = NULL; | |
168 | ||
169 | ret = g_new0(QCryptoBlockOpenOptions, 1); | |
170 | ret->format = format; | |
171 | ||
306a06e5 | 172 | v = qobject_input_visitor_new_keyval(QOBJECT(opts)); |
78368575 | 173 | |
09204eac | 174 | visit_start_struct(v, NULL, NULL, 0, &local_err); |
78368575 DB |
175 | if (local_err) { |
176 | goto out; | |
177 | } | |
178 | ||
179 | switch (format) { | |
180 | case Q_CRYPTO_BLOCK_FORMAT_LUKS: | |
181 | visit_type_QCryptoBlockOptionsLUKS_members( | |
09204eac | 182 | v, &ret->u.luks, &local_err); |
78368575 DB |
183 | break; |
184 | ||
d85f4222 DB |
185 | case Q_CRYPTO_BLOCK_FORMAT_QCOW: |
186 | visit_type_QCryptoBlockOptionsQCow_members( | |
187 | v, &ret->u.qcow, &local_err); | |
188 | break; | |
189 | ||
78368575 DB |
190 | default: |
191 | error_setg(&local_err, "Unsupported block format %d", format); | |
192 | break; | |
193 | } | |
15c2f669 | 194 | if (!local_err) { |
09204eac | 195 | visit_check_struct(v, &local_err); |
15c2f669 | 196 | } |
78368575 | 197 | |
09204eac | 198 | visit_end_struct(v, NULL); |
78368575 DB |
199 | |
200 | out: | |
201 | if (local_err) { | |
202 | error_propagate(errp, local_err); | |
203 | qapi_free_QCryptoBlockOpenOptions(ret); | |
204 | ret = NULL; | |
205 | } | |
09204eac | 206 | visit_free(v); |
78368575 DB |
207 | return ret; |
208 | } | |
209 | ||
210 | ||
306a06e5 | 211 | QCryptoBlockCreateOptions * |
78368575 | 212 | block_crypto_create_opts_init(QCryptoBlockFormat format, |
306a06e5 | 213 | QDict *opts, |
78368575 DB |
214 | Error **errp) |
215 | { | |
09204eac | 216 | Visitor *v; |
78368575 DB |
217 | QCryptoBlockCreateOptions *ret = NULL; |
218 | Error *local_err = NULL; | |
219 | ||
220 | ret = g_new0(QCryptoBlockCreateOptions, 1); | |
221 | ret->format = format; | |
222 | ||
306a06e5 | 223 | v = qobject_input_visitor_new_keyval(QOBJECT(opts)); |
78368575 | 224 | |
09204eac | 225 | visit_start_struct(v, NULL, NULL, 0, &local_err); |
78368575 DB |
226 | if (local_err) { |
227 | goto out; | |
228 | } | |
229 | ||
230 | switch (format) { | |
231 | case Q_CRYPTO_BLOCK_FORMAT_LUKS: | |
232 | visit_type_QCryptoBlockCreateOptionsLUKS_members( | |
09204eac | 233 | v, &ret->u.luks, &local_err); |
78368575 DB |
234 | break; |
235 | ||
d85f4222 DB |
236 | case Q_CRYPTO_BLOCK_FORMAT_QCOW: |
237 | visit_type_QCryptoBlockOptionsQCow_members( | |
238 | v, &ret->u.qcow, &local_err); | |
239 | break; | |
240 | ||
78368575 DB |
241 | default: |
242 | error_setg(&local_err, "Unsupported block format %d", format); | |
243 | break; | |
244 | } | |
15c2f669 | 245 | if (!local_err) { |
09204eac | 246 | visit_check_struct(v, &local_err); |
15c2f669 | 247 | } |
78368575 | 248 | |
09204eac | 249 | visit_end_struct(v, NULL); |
78368575 DB |
250 | |
251 | out: | |
252 | if (local_err) { | |
253 | error_propagate(errp, local_err); | |
254 | qapi_free_QCryptoBlockCreateOptions(ret); | |
255 | ret = NULL; | |
256 | } | |
09204eac | 257 | visit_free(v); |
78368575 DB |
258 | return ret; |
259 | } | |
260 | ||
261 | ||
262 | static int block_crypto_open_generic(QCryptoBlockFormat format, | |
263 | QemuOptsList *opts_spec, | |
264 | BlockDriverState *bs, | |
265 | QDict *options, | |
266 | int flags, | |
267 | Error **errp) | |
268 | { | |
269 | BlockCrypto *crypto = bs->opaque; | |
270 | QemuOpts *opts = NULL; | |
271 | Error *local_err = NULL; | |
272 | int ret = -EINVAL; | |
273 | QCryptoBlockOpenOptions *open_opts = NULL; | |
274 | unsigned int cflags = 0; | |
306a06e5 | 275 | QDict *cryptoopts = NULL; |
78368575 | 276 | |
4e4bf5c4 KW |
277 | bs->file = bdrv_open_child(NULL, options, "file", bs, &child_file, |
278 | false, errp); | |
279 | if (!bs->file) { | |
280 | return -EINVAL; | |
281 | } | |
282 | ||
d67a6b09 DB |
283 | bs->supported_write_flags = BDRV_REQ_FUA & |
284 | bs->file->bs->supported_write_flags; | |
285 | ||
78368575 DB |
286 | opts = qemu_opts_create(opts_spec, NULL, 0, &error_abort); |
287 | qemu_opts_absorb_qdict(opts, options, &local_err); | |
288 | if (local_err) { | |
289 | error_propagate(errp, local_err); | |
290 | goto cleanup; | |
291 | } | |
292 | ||
306a06e5 DB |
293 | cryptoopts = qemu_opts_to_qdict(opts, NULL); |
294 | ||
295 | open_opts = block_crypto_open_opts_init(format, cryptoopts, errp); | |
78368575 DB |
296 | if (!open_opts) { |
297 | goto cleanup; | |
298 | } | |
299 | ||
300 | if (flags & BDRV_O_NO_IO) { | |
301 | cflags |= QCRYPTO_BLOCK_OPEN_NO_IO; | |
302 | } | |
1cd9a787 | 303 | crypto->block = qcrypto_block_open(open_opts, NULL, |
78368575 DB |
304 | block_crypto_read_func, |
305 | bs, | |
306 | cflags, | |
307 | errp); | |
308 | ||
309 | if (!crypto->block) { | |
310 | ret = -EIO; | |
311 | goto cleanup; | |
312 | } | |
313 | ||
54115412 | 314 | bs->encrypted = true; |
78368575 DB |
315 | |
316 | ret = 0; | |
317 | cleanup: | |
306a06e5 | 318 | QDECREF(cryptoopts); |
78368575 DB |
319 | qapi_free_QCryptoBlockOpenOptions(open_opts); |
320 | return ret; | |
321 | } | |
322 | ||
323 | ||
324 | static int block_crypto_create_generic(QCryptoBlockFormat format, | |
325 | const char *filename, | |
326 | QemuOpts *opts, | |
327 | Error **errp) | |
328 | { | |
329 | int ret = -EINVAL; | |
330 | QCryptoBlockCreateOptions *create_opts = NULL; | |
331 | QCryptoBlock *crypto = NULL; | |
332 | struct BlockCryptoCreateData data = { | |
333 | .size = ROUND_UP(qemu_opt_get_size_del(opts, BLOCK_OPT_SIZE, 0), | |
334 | BDRV_SECTOR_SIZE), | |
335 | .opts = opts, | |
336 | .filename = filename, | |
337 | }; | |
306a06e5 DB |
338 | QDict *cryptoopts; |
339 | ||
340 | cryptoopts = qemu_opts_to_qdict(opts, NULL); | |
78368575 | 341 | |
306a06e5 | 342 | create_opts = block_crypto_create_opts_init(format, cryptoopts, errp); |
78368575 DB |
343 | if (!create_opts) { |
344 | return -1; | |
345 | } | |
346 | ||
1cd9a787 | 347 | crypto = qcrypto_block_create(create_opts, NULL, |
78368575 DB |
348 | block_crypto_init_func, |
349 | block_crypto_write_func, | |
350 | &data, | |
351 | errp); | |
352 | ||
353 | if (!crypto) { | |
354 | ret = -EIO; | |
355 | goto cleanup; | |
356 | } | |
357 | ||
358 | ret = 0; | |
359 | cleanup: | |
306a06e5 | 360 | QDECREF(cryptoopts); |
78368575 DB |
361 | qcrypto_block_free(crypto); |
362 | blk_unref(data.blk); | |
363 | qapi_free_QCryptoBlockCreateOptions(create_opts); | |
364 | return ret; | |
365 | } | |
366 | ||
4bff28b8 | 367 | static int block_crypto_truncate(BlockDriverState *bs, int64_t offset, |
8243ccb7 | 368 | PreallocMode prealloc, Error **errp) |
78368575 DB |
369 | { |
370 | BlockCrypto *crypto = bs->opaque; | |
31376555 | 371 | uint64_t payload_offset = |
78368575 | 372 | qcrypto_block_get_payload_offset(crypto->block); |
31376555 | 373 | assert(payload_offset < (INT64_MAX - offset)); |
78368575 DB |
374 | |
375 | offset += payload_offset; | |
376 | ||
7ea37c30 | 377 | return bdrv_truncate(bs->file, offset, prealloc, errp); |
78368575 DB |
378 | } |
379 | ||
380 | static void block_crypto_close(BlockDriverState *bs) | |
381 | { | |
382 | BlockCrypto *crypto = bs->opaque; | |
383 | qcrypto_block_free(crypto->block); | |
384 | } | |
385 | ||
386 | ||
161253e2 DB |
387 | /* |
388 | * 1 MB bounce buffer gives good performance / memory tradeoff | |
389 | * when using cache=none|directsync. | |
390 | */ | |
391 | #define BLOCK_CRYPTO_MAX_IO_SIZE (1024 * 1024) | |
78368575 DB |
392 | |
393 | static coroutine_fn int | |
a73466fb DB |
394 | block_crypto_co_preadv(BlockDriverState *bs, uint64_t offset, uint64_t bytes, |
395 | QEMUIOVector *qiov, int flags) | |
78368575 DB |
396 | { |
397 | BlockCrypto *crypto = bs->opaque; | |
a73466fb | 398 | uint64_t cur_bytes; /* number of bytes in current iteration */ |
78368575 DB |
399 | uint64_t bytes_done = 0; |
400 | uint8_t *cipher_data = NULL; | |
401 | QEMUIOVector hd_qiov; | |
402 | int ret = 0; | |
a73466fb DB |
403 | uint64_t sector_size = qcrypto_block_get_sector_size(crypto->block); |
404 | uint64_t payload_offset = qcrypto_block_get_payload_offset(crypto->block); | |
a73466fb DB |
405 | |
406 | assert(!flags); | |
407 | assert(payload_offset < INT64_MAX); | |
408 | assert(QEMU_IS_ALIGNED(offset, sector_size)); | |
409 | assert(QEMU_IS_ALIGNED(bytes, sector_size)); | |
78368575 DB |
410 | |
411 | qemu_iovec_init(&hd_qiov, qiov->niov); | |
412 | ||
161253e2 DB |
413 | /* Bounce buffer because we don't wish to expose cipher text |
414 | * in qiov which points to guest memory. | |
78368575 DB |
415 | */ |
416 | cipher_data = | |
161253e2 | 417 | qemu_try_blockalign(bs->file->bs, MIN(BLOCK_CRYPTO_MAX_IO_SIZE, |
78368575 DB |
418 | qiov->size)); |
419 | if (cipher_data == NULL) { | |
420 | ret = -ENOMEM; | |
421 | goto cleanup; | |
422 | } | |
423 | ||
a73466fb DB |
424 | while (bytes) { |
425 | cur_bytes = MIN(bytes, BLOCK_CRYPTO_MAX_IO_SIZE); | |
78368575 DB |
426 | |
427 | qemu_iovec_reset(&hd_qiov); | |
a73466fb | 428 | qemu_iovec_add(&hd_qiov, cipher_data, cur_bytes); |
78368575 | 429 | |
a73466fb DB |
430 | ret = bdrv_co_preadv(bs->file, payload_offset + offset + bytes_done, |
431 | cur_bytes, &hd_qiov, 0); | |
78368575 DB |
432 | if (ret < 0) { |
433 | goto cleanup; | |
434 | } | |
435 | ||
4609742a DB |
436 | if (qcrypto_block_decrypt(crypto->block, offset + bytes_done, |
437 | cipher_data, cur_bytes, NULL) < 0) { | |
78368575 DB |
438 | ret = -EIO; |
439 | goto cleanup; | |
440 | } | |
441 | ||
a73466fb | 442 | qemu_iovec_from_buf(qiov, bytes_done, cipher_data, cur_bytes); |
78368575 | 443 | |
a73466fb DB |
444 | bytes -= cur_bytes; |
445 | bytes_done += cur_bytes; | |
78368575 DB |
446 | } |
447 | ||
448 | cleanup: | |
449 | qemu_iovec_destroy(&hd_qiov); | |
450 | qemu_vfree(cipher_data); | |
451 | ||
452 | return ret; | |
453 | } | |
454 | ||
455 | ||
456 | static coroutine_fn int | |
a73466fb DB |
457 | block_crypto_co_pwritev(BlockDriverState *bs, uint64_t offset, uint64_t bytes, |
458 | QEMUIOVector *qiov, int flags) | |
78368575 DB |
459 | { |
460 | BlockCrypto *crypto = bs->opaque; | |
a73466fb | 461 | uint64_t cur_bytes; /* number of bytes in current iteration */ |
78368575 DB |
462 | uint64_t bytes_done = 0; |
463 | uint8_t *cipher_data = NULL; | |
464 | QEMUIOVector hd_qiov; | |
465 | int ret = 0; | |
a73466fb DB |
466 | uint64_t sector_size = qcrypto_block_get_sector_size(crypto->block); |
467 | uint64_t payload_offset = qcrypto_block_get_payload_offset(crypto->block); | |
a73466fb | 468 | |
d67a6b09 | 469 | assert(!(flags & ~BDRV_REQ_FUA)); |
a73466fb DB |
470 | assert(payload_offset < INT64_MAX); |
471 | assert(QEMU_IS_ALIGNED(offset, sector_size)); | |
472 | assert(QEMU_IS_ALIGNED(bytes, sector_size)); | |
78368575 DB |
473 | |
474 | qemu_iovec_init(&hd_qiov, qiov->niov); | |
475 | ||
161253e2 DB |
476 | /* Bounce buffer because we're not permitted to touch |
477 | * contents of qiov - it points to guest memory. | |
78368575 DB |
478 | */ |
479 | cipher_data = | |
161253e2 | 480 | qemu_try_blockalign(bs->file->bs, MIN(BLOCK_CRYPTO_MAX_IO_SIZE, |
78368575 DB |
481 | qiov->size)); |
482 | if (cipher_data == NULL) { | |
483 | ret = -ENOMEM; | |
484 | goto cleanup; | |
485 | } | |
486 | ||
a73466fb DB |
487 | while (bytes) { |
488 | cur_bytes = MIN(bytes, BLOCK_CRYPTO_MAX_IO_SIZE); | |
78368575 | 489 | |
a73466fb | 490 | qemu_iovec_to_buf(qiov, bytes_done, cipher_data, cur_bytes); |
78368575 | 491 | |
4609742a DB |
492 | if (qcrypto_block_encrypt(crypto->block, offset + bytes_done, |
493 | cipher_data, cur_bytes, NULL) < 0) { | |
78368575 DB |
494 | ret = -EIO; |
495 | goto cleanup; | |
496 | } | |
497 | ||
498 | qemu_iovec_reset(&hd_qiov); | |
a73466fb | 499 | qemu_iovec_add(&hd_qiov, cipher_data, cur_bytes); |
78368575 | 500 | |
a73466fb | 501 | ret = bdrv_co_pwritev(bs->file, payload_offset + offset + bytes_done, |
d67a6b09 | 502 | cur_bytes, &hd_qiov, flags); |
78368575 DB |
503 | if (ret < 0) { |
504 | goto cleanup; | |
505 | } | |
506 | ||
a73466fb DB |
507 | bytes -= cur_bytes; |
508 | bytes_done += cur_bytes; | |
78368575 DB |
509 | } |
510 | ||
511 | cleanup: | |
512 | qemu_iovec_destroy(&hd_qiov); | |
513 | qemu_vfree(cipher_data); | |
514 | ||
515 | return ret; | |
516 | } | |
517 | ||
a73466fb DB |
518 | static void block_crypto_refresh_limits(BlockDriverState *bs, Error **errp) |
519 | { | |
520 | BlockCrypto *crypto = bs->opaque; | |
521 | uint64_t sector_size = qcrypto_block_get_sector_size(crypto->block); | |
522 | bs->bl.request_alignment = sector_size; /* No sub-sector I/O */ | |
523 | } | |
524 | ||
78368575 DB |
525 | |
526 | static int64_t block_crypto_getlength(BlockDriverState *bs) | |
527 | { | |
528 | BlockCrypto *crypto = bs->opaque; | |
529 | int64_t len = bdrv_getlength(bs->file->bs); | |
530 | ||
31376555 DB |
531 | uint64_t offset = qcrypto_block_get_payload_offset(crypto->block); |
532 | assert(offset < INT64_MAX); | |
533 | assert(offset < len); | |
78368575 DB |
534 | |
535 | len -= offset; | |
536 | ||
537 | return len; | |
538 | } | |
539 | ||
540 | ||
541 | static int block_crypto_probe_luks(const uint8_t *buf, | |
542 | int buf_size, | |
543 | const char *filename) { | |
544 | return block_crypto_probe_generic(Q_CRYPTO_BLOCK_FORMAT_LUKS, | |
545 | buf, buf_size, filename); | |
546 | } | |
547 | ||
548 | static int block_crypto_open_luks(BlockDriverState *bs, | |
549 | QDict *options, | |
550 | int flags, | |
551 | Error **errp) | |
552 | { | |
553 | return block_crypto_open_generic(Q_CRYPTO_BLOCK_FORMAT_LUKS, | |
554 | &block_crypto_runtime_opts_luks, | |
555 | bs, options, flags, errp); | |
556 | } | |
557 | ||
558 | static int block_crypto_create_luks(const char *filename, | |
559 | QemuOpts *opts, | |
560 | Error **errp) | |
561 | { | |
562 | return block_crypto_create_generic(Q_CRYPTO_BLOCK_FORMAT_LUKS, | |
563 | filename, opts, errp); | |
564 | } | |
565 | ||
c7c4cf49 DB |
566 | static int block_crypto_get_info_luks(BlockDriverState *bs, |
567 | BlockDriverInfo *bdi) | |
568 | { | |
569 | BlockDriverInfo subbdi; | |
570 | int ret; | |
571 | ||
572 | ret = bdrv_get_info(bs->file->bs, &subbdi); | |
573 | if (ret != 0) { | |
574 | return ret; | |
575 | } | |
576 | ||
577 | bdi->unallocated_blocks_are_zero = false; | |
578 | bdi->can_write_zeroes_with_unmap = false; | |
579 | bdi->cluster_size = subbdi.cluster_size; | |
580 | ||
581 | return 0; | |
582 | } | |
583 | ||
584 | static ImageInfoSpecific * | |
585 | block_crypto_get_specific_info_luks(BlockDriverState *bs) | |
586 | { | |
587 | BlockCrypto *crypto = bs->opaque; | |
588 | ImageInfoSpecific *spec_info; | |
589 | QCryptoBlockInfo *info; | |
590 | ||
591 | info = qcrypto_block_get_info(crypto->block, NULL); | |
592 | if (!info) { | |
593 | return NULL; | |
594 | } | |
595 | if (info->format != Q_CRYPTO_BLOCK_FORMAT_LUKS) { | |
596 | qapi_free_QCryptoBlockInfo(info); | |
597 | return NULL; | |
598 | } | |
599 | ||
600 | spec_info = g_new(ImageInfoSpecific, 1); | |
601 | spec_info->type = IMAGE_INFO_SPECIFIC_KIND_LUKS; | |
602 | spec_info->u.luks.data = g_new(QCryptoBlockInfoLUKS, 1); | |
603 | *spec_info->u.luks.data = info->u.luks; | |
604 | ||
605 | /* Blank out pointers we've just stolen to avoid double free */ | |
606 | memset(&info->u.luks, 0, sizeof(info->u.luks)); | |
607 | ||
608 | qapi_free_QCryptoBlockInfo(info); | |
609 | ||
610 | return spec_info; | |
611 | } | |
612 | ||
78368575 DB |
613 | BlockDriver bdrv_crypto_luks = { |
614 | .format_name = "luks", | |
615 | .instance_size = sizeof(BlockCrypto), | |
616 | .bdrv_probe = block_crypto_probe_luks, | |
617 | .bdrv_open = block_crypto_open_luks, | |
618 | .bdrv_close = block_crypto_close, | |
862f215f | 619 | .bdrv_child_perm = bdrv_format_default_perms, |
78368575 DB |
620 | .bdrv_create = block_crypto_create_luks, |
621 | .bdrv_truncate = block_crypto_truncate, | |
622 | .create_opts = &block_crypto_create_opts_luks, | |
623 | ||
a73466fb DB |
624 | .bdrv_refresh_limits = block_crypto_refresh_limits, |
625 | .bdrv_co_preadv = block_crypto_co_preadv, | |
626 | .bdrv_co_pwritev = block_crypto_co_pwritev, | |
78368575 | 627 | .bdrv_getlength = block_crypto_getlength, |
c7c4cf49 DB |
628 | .bdrv_get_info = block_crypto_get_info_luks, |
629 | .bdrv_get_specific_info = block_crypto_get_specific_info_luks, | |
78368575 DB |
630 | }; |
631 | ||
632 | static void block_crypto_init(void) | |
633 | { | |
634 | bdrv_register(&bdrv_crypto_luks); | |
635 | } | |
636 | ||
637 | block_init(block_crypto_init); |