Blame SOURCES/kvm-qcow2-fix-image-corruption-after-committing-qcow2-im.patch

4a2fec
From 97c8bc6029a1f88ee5bd737b2bf257139d533fea Mon Sep 17 00:00:00 2001
4a2fec
From: "Daniel P. Berrange" <berrange@redhat.com>
4a2fec
Date: Wed, 29 Nov 2017 15:09:20 +0100
4a2fec
Subject: [PATCH 02/36] qcow2: fix image corruption after committing qcow2
4a2fec
 image into base
4a2fec
4a2fec
RH-Author: Daniel P. Berrange <berrange@redhat.com>
4a2fec
Message-id: <20171129150920.8539-3-berrange@redhat.com>
4a2fec
Patchwork-id: 77975
4a2fec
O-Subject: [RHV-7.5 qemu-kvm-rhev PATCH 2/2] qcow2: fix image corruption after committing qcow2 image into base
4a2fec
Bugzilla: 1406803
4a2fec
RH-Acked-by: Max Reitz <mreitz@redhat.com>
4a2fec
RH-Acked-by: Jeffrey Cody <jcody@redhat.com>
4a2fec
RH-Acked-by: Kevin Wolf <kwolf@redhat.com>
4a2fec
4a2fec
After committing the qcow2 image contents into the base image, qemu-img
4a2fec
will call bdrv_make_empty to drop the payload in the layered image.
4a2fec
4a2fec
When this is done for qcow2 images, it blows away the LUKS encryption
4a2fec
header, making the resulting image unusable. There are two codepaths
4a2fec
for emptying a qcow2 image, and the second (slower) codepath leaves
4a2fec
the LUKS header intact, so force use of that codepath.
4a2fec
4a2fec
Reviewed-by: Eric Blake <eblake@redhat.com>
4a2fec
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
4a2fec
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
4a2fec
(cherry picked from commit f06033295b51d4868c2b4921ad2287e8f55eb688)
4a2fec
Signed-off-by: Miroslav Rezanina <mrezanin@redhat.com>
4a2fec
4a2fec
Conflicts:
4a2fec
  tests/qemu-iotests/group - some earlier tests don't exist yet
4a2fec
---
4a2fec
 block/qcow2.c                    |   6 +-
4a2fec
 tests/qemu-iotests/198           | 104 ++++++++++++++++++++++++++++++++
4a2fec
 tests/qemu-iotests/198.out       | 126 +++++++++++++++++++++++++++++++++++++++
4a2fec
 tests/qemu-iotests/common.filter |   4 +-
4a2fec
 tests/qemu-iotests/group         |   1 +
4a2fec
 5 files changed, 238 insertions(+), 3 deletions(-)
4a2fec
 create mode 100755 tests/qemu-iotests/198
4a2fec
 create mode 100644 tests/qemu-iotests/198.out
4a2fec
4a2fec
diff --git a/block/qcow2.c b/block/qcow2.c
4a2fec
index 6e8f753..a51efcc 100644
4a2fec
--- a/block/qcow2.c
4a2fec
+++ b/block/qcow2.c
4a2fec
@@ -3567,12 +3567,14 @@ static int qcow2_make_empty(BlockDriverState *bs)
4a2fec
     l1_clusters = DIV_ROUND_UP(s->l1_size, s->cluster_size / sizeof(uint64_t));
4a2fec
 
4a2fec
     if (s->qcow_version >= 3 && !s->snapshots &&
4a2fec
-        3 + l1_clusters <= s->refcount_block_size) {
4a2fec
+        3 + l1_clusters <= s->refcount_block_size &&
4a2fec
+        s->crypt_method_header != QCOW_CRYPT_LUKS) {
4a2fec
         /* The following function only works for qcow2 v3 images (it requires
4a2fec
          * the dirty flag) and only as long as there are no snapshots (because
4a2fec
          * it completely empties the image). Furthermore, the L1 table and three
4a2fec
          * additional clusters (image header, refcount table, one refcount
4a2fec
-         * block) have to fit inside one refcount block. */
4a2fec
+         * block) have to fit inside one refcount block. It cannot be used
4a2fec
+         * for LUKS (yet) as it throws away the LUKS header cluster(s) */
4a2fec
         return make_completely_empty(bs);
4a2fec
     }
4a2fec
 
4a2fec
diff --git a/tests/qemu-iotests/198 b/tests/qemu-iotests/198
4a2fec
new file mode 100755
4a2fec
index 0000000..34ef666
4a2fec
--- /dev/null
4a2fec
+++ b/tests/qemu-iotests/198
4a2fec
@@ -0,0 +1,104 @@
4a2fec
+#!/bin/bash
4a2fec
+#
4a2fec
+# Test commit of encrypted qcow2 files
4a2fec
+#
4a2fec
+# Copyright (C) 2017 Red Hat, Inc.
4a2fec
+#
4a2fec
+# This program is free software; you can redistribute it and/or modify
4a2fec
+# it under the terms of the GNU General Public License as published by
4a2fec
+# the Free Software Foundation; either version 2 of the License, or
4a2fec
+# (at your option) any later version.
4a2fec
+#
4a2fec
+# This program is distributed in the hope that it will be useful,
4a2fec
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
4a2fec
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
4a2fec
+# GNU General Public License for more details.
4a2fec
+#
4a2fec
+# You should have received a copy of the GNU General Public License
4a2fec
+# along with this program.  If not, see <http://www.gnu.org/licenses/>.
4a2fec
+#
4a2fec
+
4a2fec
+# creator
4a2fec
+owner=berrange@redhat.com
4a2fec
+
4a2fec
+seq=`basename $0`
4a2fec
+echo "QA output created by $seq"
4a2fec
+
4a2fec
+here=`pwd`
4a2fec
+status=1	# failure is the default!
4a2fec
+
4a2fec
+_cleanup()
4a2fec
+{
4a2fec
+	_cleanup_test_img
4a2fec
+}
4a2fec
+trap "_cleanup; exit \$status" 0 1 2 3 15
4a2fec
+
4a2fec
+# get standard environment, filters and checks
4a2fec
+. ./common.rc
4a2fec
+. ./common.filter
4a2fec
+
4a2fec
+_supported_fmt qcow2
4a2fec
+_supported_proto generic
4a2fec
+_supported_os Linux
4a2fec
+
4a2fec
+
4a2fec
+size=16M
4a2fec
+TEST_IMG_BASE=$TEST_IMG.base
4a2fec
+SECRET0="secret,id=sec0,data=astrochicken"
4a2fec
+SECRET1="secret,id=sec1,data=furby"
4a2fec
+
4a2fec
+TEST_IMG_SAVE=$TEST_IMG
4a2fec
+TEST_IMG=$TEST_IMG_BASE
4a2fec
+echo "== create base =="
4a2fec
+_make_test_img --object $SECRET0 -o "encrypt.format=luks,encrypt.key-secret=sec0,encrypt.iter-time=10" $size
4a2fec
+TEST_IMG=$TEST_IMG_SAVE
4a2fec
+
4a2fec
+IMGSPECBASE="driver=$IMGFMT,file.filename=$TEST_IMG_BASE,encrypt.key-secret=sec0"
4a2fec
+IMGSPECLAYER="driver=$IMGFMT,file.filename=$TEST_IMG,encrypt.key-secret=sec1"
4a2fec
+IMGSPEC="$IMGSPECLAYER,backing.driver=$IMGFMT,backing.file.filename=$TEST_IMG_BASE,backing.encrypt.key-secret=sec0"
4a2fec
+QEMU_IO_OPTIONS=$QEMU_IO_OPTIONS_NO_FMT
4a2fec
+
4a2fec
+echo
4a2fec
+echo "== writing whole image base =="
4a2fec
+$QEMU_IO --object $SECRET0 -c "write -P 0xa 0 $size" --image-opts $IMGSPECBASE | _filter_qemu_io | _filter_testdir
4a2fec
+
4a2fec
+echo "== create overlay =="
4a2fec
+_make_test_img --object $SECRET1 -o "encrypt.format=luks,encrypt.key-secret=sec1,encrypt.iter-time=10" -u -b "$TEST_IMG_BASE" $size
4a2fec
+
4a2fec
+echo
4a2fec
+echo "== writing whole image layer =="
4a2fec
+$QEMU_IO --object $SECRET0 --object $SECRET1 -c "write -P 0x9 0 $size" --image-opts $IMGSPEC | _filter_qemu_io | _filter_testdir
4a2fec
+
4a2fec
+echo
4a2fec
+echo "== verify pattern base =="
4a2fec
+$QEMU_IO --object $SECRET0 -c "read -P 0xa 0 $size" --image-opts $IMGSPECBASE | _filter_qemu_io | _filter_testdir
4a2fec
+
4a2fec
+echo
4a2fec
+echo "== verify pattern layer =="
4a2fec
+$QEMU_IO --object $SECRET0 --object $SECRET1 -c "read -P 0x9 0 $size" --image-opts $IMGSPEC | _filter_qemu_io | _filter_testdir
4a2fec
+
4a2fec
+echo
4a2fec
+echo "== committing layer into base =="
4a2fec
+$QEMU_IMG commit --object $SECRET0 --object $SECRET1 --image-opts $IMGSPEC | _filter_testdir
4a2fec
+
4a2fec
+echo
4a2fec
+echo "== verify pattern base =="
4a2fec
+$QEMU_IO --object $SECRET0 -c "read -P 0x9 0 $size" --image-opts $IMGSPECBASE | _filter_qemu_io | _filter_testdir
4a2fec
+
4a2fec
+echo
4a2fec
+echo "== verify pattern layer =="
4a2fec
+$QEMU_IO --object $SECRET0 --object $SECRET1 -c "read -P 0x9 0 $size" --image-opts $IMGSPEC | _filter_qemu_io | _filter_testdir
4a2fec
+
4a2fec
+echo
4a2fec
+echo "== checking image base =="
4a2fec
+$QEMU_IMG info --image-opts $IMGSPECBASE | _filter_img_info | _filter_testdir | sed -e "/^disk size:/ D"
4a2fec
+
4a2fec
+echo
4a2fec
+echo "== checking image layer =="
4a2fec
+$QEMU_IMG info --image-opts $IMGSPECLAYER | _filter_img_info | _filter_testdir | sed -e "/^disk size:/ D"
4a2fec
+
4a2fec
+
4a2fec
+# success, all done
4a2fec
+echo "*** done"
4a2fec
+rm -f $seq.full
4a2fec
+status=0
4a2fec
diff --git a/tests/qemu-iotests/198.out b/tests/qemu-iotests/198.out
4a2fec
new file mode 100644
4a2fec
index 0000000..2db565e
4a2fec
--- /dev/null
4a2fec
+++ b/tests/qemu-iotests/198.out
4a2fec
@@ -0,0 +1,126 @@
4a2fec
+QA output created by 198
4a2fec
+== create base ==
4a2fec
+Formatting 'TEST_DIR/t.IMGFMT.base', fmt=IMGFMT size=16777216 encrypt.format=luks encrypt.key-secret=sec0 encrypt.iter-time=10
4a2fec
+
4a2fec
+== writing whole image base ==
4a2fec
+wrote 16777216/16777216 bytes at offset 0
4a2fec
+16 MiB, X ops; XX:XX:XX.X (XXX YYY/sec and XXX ops/sec)
4a2fec
+== create overlay ==
4a2fec
+Formatting 'TEST_DIR/t.IMGFMT', fmt=IMGFMT size=16777216 backing_file=TEST_DIR/t.IMGFMT.base encrypt.format=luks encrypt.key-secret=sec1 encrypt.iter-time=10
4a2fec
+
4a2fec
+== writing whole image layer ==
4a2fec
+wrote 16777216/16777216 bytes at offset 0
4a2fec
+16 MiB, X ops; XX:XX:XX.X (XXX YYY/sec and XXX ops/sec)
4a2fec
+
4a2fec
+== verify pattern base ==
4a2fec
+read 16777216/16777216 bytes at offset 0
4a2fec
+16 MiB, X ops; XX:XX:XX.X (XXX YYY/sec and XXX ops/sec)
4a2fec
+
4a2fec
+== verify pattern layer ==
4a2fec
+read 16777216/16777216 bytes at offset 0
4a2fec
+16 MiB, X ops; XX:XX:XX.X (XXX YYY/sec and XXX ops/sec)
4a2fec
+
4a2fec
+== committing layer into base ==
4a2fec
+Image committed.
4a2fec
+
4a2fec
+== verify pattern base ==
4a2fec
+read 16777216/16777216 bytes at offset 0
4a2fec
+16 MiB, X ops; XX:XX:XX.X (XXX YYY/sec and XXX ops/sec)
4a2fec
+
4a2fec
+== verify pattern layer ==
4a2fec
+read 16777216/16777216 bytes at offset 0
4a2fec
+16 MiB, X ops; XX:XX:XX.X (XXX YYY/sec and XXX ops/sec)
4a2fec
+
4a2fec
+== checking image base ==
4a2fec
+image: json:{"encrypt.key-secret": "sec0", "driver": "IMGFMT", "file": {"driver": "file", "filename": "TEST_DIR/t.IMGFMT.base"}}
4a2fec
+file format: IMGFMT
4a2fec
+virtual size: 16M (16777216 bytes)
4a2fec
+Format specific information:
4a2fec
+    compat: 1.1
4a2fec
+    lazy refcounts: false
4a2fec
+    refcount bits: 16
4a2fec
+    encrypt:
4a2fec
+        ivgen alg: plain64
4a2fec
+        hash alg: sha256
4a2fec
+        cipher alg: aes-256
4a2fec
+        uuid: 00000000-0000-0000-0000-000000000000
4a2fec
+        format: luks
4a2fec
+        cipher mode: xts
4a2fec
+        slots:
4a2fec
+            [0]:
4a2fec
+                active: true
4a2fec
+                iters: 1024
4a2fec
+                key offset: 4096
4a2fec
+                stripes: 4000
4a2fec
+            [1]:
4a2fec
+                active: false
4a2fec
+                key offset: 262144
4a2fec
+            [2]:
4a2fec
+                active: false
4a2fec
+                key offset: 520192
4a2fec
+            [3]:
4a2fec
+                active: false
4a2fec
+                key offset: 778240
4a2fec
+            [4]:
4a2fec
+                active: false
4a2fec
+                key offset: 1036288
4a2fec
+            [5]:
4a2fec
+                active: false
4a2fec
+                key offset: 1294336
4a2fec
+            [6]:
4a2fec
+                active: false
4a2fec
+                key offset: 1552384
4a2fec
+            [7]:
4a2fec
+                active: false
4a2fec
+                key offset: 1810432
4a2fec
+        payload offset: 2068480
4a2fec
+        master key iters: 1024
4a2fec
+    corrupt: false
4a2fec
+
4a2fec
+== checking image layer ==
4a2fec
+image: json:{"encrypt.key-secret": "sec1", "driver": "IMGFMT", "file": {"driver": "file", "filename": "TEST_DIR/t.IMGFMT"}}
4a2fec
+file format: IMGFMT
4a2fec
+virtual size: 16M (16777216 bytes)
4a2fec
+backing file: TEST_DIR/t.IMGFMT.base
4a2fec
+Format specific information:
4a2fec
+    compat: 1.1
4a2fec
+    lazy refcounts: false
4a2fec
+    refcount bits: 16
4a2fec
+    encrypt:
4a2fec
+        ivgen alg: plain64
4a2fec
+        hash alg: sha256
4a2fec
+        cipher alg: aes-256
4a2fec
+        uuid: 00000000-0000-0000-0000-000000000000
4a2fec
+        format: luks
4a2fec
+        cipher mode: xts
4a2fec
+        slots:
4a2fec
+            [0]:
4a2fec
+                active: true
4a2fec
+                iters: 1024
4a2fec
+                key offset: 4096
4a2fec
+                stripes: 4000
4a2fec
+            [1]:
4a2fec
+                active: false
4a2fec
+                key offset: 262144
4a2fec
+            [2]:
4a2fec
+                active: false
4a2fec
+                key offset: 520192
4a2fec
+            [3]:
4a2fec
+                active: false
4a2fec
+                key offset: 778240
4a2fec
+            [4]:
4a2fec
+                active: false
4a2fec
+                key offset: 1036288
4a2fec
+            [5]:
4a2fec
+                active: false
4a2fec
+                key offset: 1294336
4a2fec
+            [6]:
4a2fec
+                active: false
4a2fec
+                key offset: 1552384
4a2fec
+            [7]:
4a2fec
+                active: false
4a2fec
+                key offset: 1810432
4a2fec
+        payload offset: 2068480
4a2fec
+        master key iters: 1024
4a2fec
+    corrupt: false
4a2fec
+*** done
4a2fec
diff --git a/tests/qemu-iotests/common.filter b/tests/qemu-iotests/common.filter
4a2fec
index 9d5442e..b0140d8 100644
4a2fec
--- a/tests/qemu-iotests/common.filter
4a2fec
+++ b/tests/qemu-iotests/common.filter
4a2fec
@@ -150,7 +150,9 @@ _filter_img_info()
4a2fec
         -e "/lazy_refcounts: \\(on\\|off\\)/d" \
4a2fec
         -e "/block_size: [0-9]\\+/d" \
4a2fec
         -e "/block_state_zero: \\(on\\|off\\)/d" \
4a2fec
-        -e "/log_size: [0-9]\\+/d"
4a2fec
+        -e "/log_size: [0-9]\\+/d" \
4a2fec
+        -e "s/iters: [0-9]\\+/iters: 1024/" \
4a2fec
+        -e "s/uuid: [-a-f0-9]\\+/uuid: 00000000-0000-0000-0000-000000000000/"
4a2fec
 }
4a2fec
 
4a2fec
 # filter out offsets and file names from qemu-img map; good for both
4a2fec
diff --git a/tests/qemu-iotests/group b/tests/qemu-iotests/group
4a2fec
index 0c2bda3..13760b3 100644
4a2fec
--- a/tests/qemu-iotests/group
4a2fec
+++ b/tests/qemu-iotests/group
4a2fec
@@ -188,3 +188,4 @@
4a2fec
 190 rw auto quick
4a2fec
 192 rw auto quick
4a2fec
 194 rw auto migration quick
4a2fec
+198 rw auto
4a2fec
-- 
4a2fec
1.8.3.1
4a2fec