From nobody Mon Feb 9 07:56:02 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) client-ip=208.118.235.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zoho.com; dkim=fail spf=pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; Return-Path: Received: from lists.gnu.org (lists.gnu.org [208.118.235.17]) by mx.zohomail.com with SMTPS id 1497620508495598.7097161524475; Fri, 16 Jun 2017 06:41:48 -0700 (PDT) Received: from localhost ([::1]:58954 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1dLrVT-00083W-7X for importer@patchew.org; Fri, 16 Jun 2017 09:41:47 -0400 Received: from eggs.gnu.org ([2001:4830:134:3::10]:54084) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1dLrRd-00051g-Ch for qemu-devel@nongnu.org; Fri, 16 Jun 2017 09:37:52 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1dLrRY-0000gj-HM for qemu-devel@nongnu.org; Fri, 16 Jun 2017 09:37:49 -0400 Received: from fanzine.igalia.com ([91.117.99.155]:35106) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1dLrRX-0000eI-VI; Fri, 16 Jun 2017 09:37:44 -0400 Received: from [194.100.51.2] (helo=perseus.local) by fanzine.igalia.com with esmtpsa (Cipher TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim) id 1dLrRV-0003tL-0B; Fri, 16 Jun 2017 15:37:41 +0200 Received: from berto by perseus.local with local (Exim 4.89) (envelope-from ) id 1dLrRD-000194-6R; Fri, 16 Jun 2017 16:37:23 +0300 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=igalia.com; s=20170329; h=References:In-Reply-To:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From; bh=WMyeJX84p0opUO5GJP5lChVS9HK6GYStdKcILVEskj0=; b=bG23Cdmjtlizoh9GU9OAmGNfI/6sQItEAHcwNoC6AzVYgAppLmc6Gv14PsgkQhAM3usgvWnd9U8IpR8uHxcaD/8+C8fe0RBGQbZB0IVERgfzRhj4qWu6nAElxAUR4N+FN8k0boBmsmTtqubDflU8pHPXiqU85Syb+2id+dNx9l1kZaFVIyX7ai/SY9nTJxeUq/KyLDZmokuYyfC6IXPuGdfMJUCS5gKrgVwi1s+jhb6vZ+IXaDtECnGf3fhBFVhroPOhbgXEHsBOo0zYEh937oYSWuXjIfA/B/J1gR0YXgOaVorqYJkHPzPQz0/qhCRQtDaQT8ydnuurJBbRTjGkWw==; From: Alberto Garcia To: qemu-devel@nongnu.org Date: Fri, 16 Jun 2017 16:37:04 +0300 Message-Id: <19e8d8d7defd42a8859482c57affa307d7341786.1497619885.git.berto@igalia.com> X-Mailer: git-send-email 2.11.0 In-Reply-To: References: In-Reply-To: References: X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x (no timestamps) [generic] [fuzzy] X-Received-From: 91.117.99.155 Subject: [Qemu-devel] [PATCH v3 4/7] qcow2: Split do_perform_cow() into _read(), _encrypt() and _write() X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Kevin Wolf , Alberto Garcia , qemu-block@nongnu.org, Max Reitz , Stefan Hajnoczi , "Denis V . Lunev" Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_0 Z_629925259 SPT_0 Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" This patch splits do_perform_cow() into three separate functions to read, encrypt and write the COW regions. perform_cow() can now read both regions first, then encrypt them and finally write them to disk. The memory allocation is also done in this function now, using one single buffer large enough to hold both regions. Signed-off-by: Alberto Garcia --- block/qcow2-cluster.c | 117 +++++++++++++++++++++++++++++++++++++---------= ---- 1 file changed, 87 insertions(+), 30 deletions(-) diff --git a/block/qcow2-cluster.c b/block/qcow2-cluster.c index 4c03639a72..3c9ace8a96 100644 --- a/block/qcow2-cluster.c +++ b/block/qcow2-cluster.c @@ -403,34 +403,26 @@ int qcow2_encrypt_sectors(BDRVQcow2State *s, int64_t = sector_num, return 0; } =20 -static int coroutine_fn do_perform_cow(BlockDriverState *bs, - uint64_t src_cluster_offset, - uint64_t cluster_offset, - unsigned offset_in_cluster, - unsigned bytes) +static int coroutine_fn do_perform_cow_read(BlockDriverState *bs, + uint64_t src_cluster_offset, + unsigned offset_in_cluster, + uint8_t *buffer, + unsigned bytes) { - BDRVQcow2State *s =3D bs->opaque; QEMUIOVector qiov; - struct iovec iov; + struct iovec iov =3D { .iov_base =3D buffer, .iov_len =3D bytes }; int ret; =20 if (bytes =3D=3D 0) { return 0; } =20 - iov.iov_len =3D bytes; - iov.iov_base =3D qemu_try_blockalign(bs, iov.iov_len); - if (iov.iov_base =3D=3D NULL) { - return -ENOMEM; - } - qemu_iovec_init_external(&qiov, &iov, 1); =20 BLKDBG_EVENT(bs->file, BLKDBG_COW_READ); =20 if (!bs->drv) { - ret =3D -ENOMEDIUM; - goto out; + return -ENOMEDIUM; } =20 /* Call .bdrv_co_readv() directly instead of using the public block-la= yer @@ -440,39 +432,63 @@ static int coroutine_fn do_perform_cow(BlockDriverSta= te *bs, ret =3D bs->drv->bdrv_co_preadv(bs, src_cluster_offset + offset_in_clu= ster, bytes, &qiov, 0); if (ret < 0) { - goto out; + return ret; } =20 - if (bs->encrypted) { + return 0; +} + +static bool coroutine_fn do_perform_cow_encrypt(BlockDriverState *bs, + uint64_t src_cluster_offse= t, + unsigned offset_in_cluster, + uint8_t *buffer, + unsigned bytes) +{ + if (bytes && bs->encrypted) { + BDRVQcow2State *s =3D bs->opaque; int64_t sector =3D (src_cluster_offset + offset_in_cluster) >> BDRV_SECTOR_BITS; assert(s->cipher); assert((offset_in_cluster & ~BDRV_SECTOR_MASK) =3D=3D 0); assert((bytes & ~BDRV_SECTOR_MASK) =3D=3D 0); - if (qcow2_encrypt_sectors(s, sector, iov.iov_base, iov.iov_base, + if (qcow2_encrypt_sectors(s, sector, buffer, buffer, bytes >> BDRV_SECTOR_BITS, true, NULL) <= 0) { - ret =3D -EIO; - goto out; + return false; } } + return true; +} + +static int coroutine_fn do_perform_cow_write(BlockDriverState *bs, + uint64_t cluster_offset, + unsigned offset_in_cluster, + uint8_t *buffer, + unsigned bytes) +{ + QEMUIOVector qiov; + struct iovec iov =3D { .iov_base =3D buffer, .iov_len =3D bytes }; + int ret; + + if (bytes =3D=3D 0) { + return 0; + } + + qemu_iovec_init_external(&qiov, &iov, 1); =20 ret =3D qcow2_pre_write_overlap_check(bs, 0, cluster_offset + offset_in_cluster, bytes); if (ret < 0) { - goto out; + return ret; } =20 BLKDBG_EVENT(bs->file, BLKDBG_COW_WRITE); ret =3D bdrv_co_pwritev(bs->file, cluster_offset + offset_in_cluster, bytes, &qiov, 0); if (ret < 0) { - goto out; + return ret; } =20 - ret =3D 0; -out: - qemu_vfree(iov.iov_base); - return ret; + return 0; } =20 =20 @@ -760,22 +776,62 @@ static int perform_cow(BlockDriverState *bs, QCowL2Me= ta *m) BDRVQcow2State *s =3D bs->opaque; Qcow2COWRegion *start =3D &m->cow_start; Qcow2COWRegion *end =3D &m->cow_end; + unsigned buffer_size; + uint8_t *start_buffer, *end_buffer; int ret; =20 + assert(start->nb_bytes <=3D UINT_MAX - end->nb_bytes); + if (start->nb_bytes =3D=3D 0 && end->nb_bytes =3D=3D 0) { return 0; } =20 + /* Reserve a buffer large enough to store the data from both the + * start and end COW regions. Add some padding in the middle if + * necessary to make sure that the end region is optimally aligned */ + buffer_size =3D QEMU_ALIGN_UP(start->nb_bytes, bdrv_opt_mem_align(bs))= + + end->nb_bytes; + start_buffer =3D qemu_try_blockalign(bs, buffer_size); + if (start_buffer =3D=3D NULL) { + return -ENOMEM; + } + /* The part of the buffer where the end region is located */ + end_buffer =3D start_buffer + buffer_size - end->nb_bytes; + qemu_co_mutex_unlock(&s->lock); - ret =3D do_perform_cow(bs, m->offset, m->alloc_offset, - start->offset, start->nb_bytes); + /* First we read the existing data from both COW regions */ + ret =3D do_perform_cow_read(bs, m->offset, start->offset, + start_buffer, start->nb_bytes); if (ret < 0) { goto fail; } =20 - ret =3D do_perform_cow(bs, m->offset, m->alloc_offset, - end->offset, end->nb_bytes); + ret =3D do_perform_cow_read(bs, m->offset, end->offset, + end_buffer, end->nb_bytes); + if (ret < 0) { + goto fail; + } + + /* Encrypt the data if necessary before writing it */ + if (bs->encrypted) { + if (!do_perform_cow_encrypt(bs, m->offset, start->offset, + start_buffer, start->nb_bytes) || + !do_perform_cow_encrypt(bs, m->offset, end->offset, + end_buffer, end->nb_bytes)) { + ret =3D -EIO; + goto fail; + } + } + + /* And now we can write everything */ + ret =3D do_perform_cow_write(bs, m->alloc_offset, start->offset, + start_buffer, start->nb_bytes); + if (ret < 0) { + goto fail; + } =20 + ret =3D do_perform_cow_write(bs, m->alloc_offset, end->offset, + end_buffer, end->nb_bytes); fail: qemu_co_mutex_lock(&s->lock); =20 @@ -788,6 +844,7 @@ fail: qcow2_cache_depends_on_flush(s->l2_table_cache); } =20 + qemu_vfree(start_buffer); return ret; } =20 --=20 2.11.0