* Qemu Dirty Bitmap backup to encrypted target
@ 2019-09-30 19:26 Craig Mull
2019-10-01 0:24 ` John Snow
0 siblings, 1 reply; 5+ messages in thread
From: Craig Mull @ 2019-09-30 19:26 UTC (permalink / raw)
To: qemu-devel, Leo Luan
[-- Attachment #1: Type: text/html, Size: 4893 bytes --]
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Qemu Dirty Bitmap backup to encrypted target
2019-09-30 19:26 Qemu Dirty Bitmap backup to encrypted target Craig Mull
@ 2019-10-01 0:24 ` John Snow
2019-10-01 8:45 ` Kevin Wolf
0 siblings, 1 reply; 5+ messages in thread
From: John Snow @ 2019-10-01 0:24 UTC (permalink / raw)
To: Craig Mull; +Cc: qemu-devel, Qemu-block, Leo Luan
On 9/30/19 3:26 PM, Craig Mull wrote:
> How can have QEMU backup write the output to an encrypted target?
>
> Blocks in the dirty bitmap are unencrypted, and as such when I write
> them with QEMU backup they are written to the target unencrypted.
>
> I've experimented with providing a json string as the target but with no
> luck.
>
>
> transaction='{ "execute": "transaction",
>
> "arguments": {
>
> "actions": [
>
> {"type": "block-dirty-bitmap-add",
>
> "data": {"node": "drive-virtio-disk0", "granularity": 2097152,
> "name": "mybitmap"} },
>
> {"type": "drive-backup",
>
> "data": {"device": "drive-virtio-disk0", "target":
> "json:{\"encrypt.format\": \"luks\", \"encrypt.key-secret\":
> \"virtio-disk0-luks-secret0\", \"driver\": \"qcow2\", \"file\":
> {\"driver\": \"file\", \"filename\": \"/tmp/target-encrypt-test.qcow2\"}}",
>
> "sync": "full", "format": "qcow2"} }
>
> ]
>
> }
>
> }'
>
>
>
> virsh -c qemu:///system qemu-monitor-command --pretty 28 $transaction
>
>
>
> {
>
> "id": "libvirt-45",
>
> "error": {
>
> "class": "GenericError",
>
> "desc": "Unknown protocol 'json'"
>
> }
>
> }
>
>
I'll be honest, I'm not very good at the json specifications and don't
really know when they're appropriate to use. At the basic level,
drive-backup expects a filename. Sometimes the filename can get fancy,
but... I stay away from that.
Try using qmp-blockdev-create to create the target node instead, and
then using blockdev-backup to backup to that target.
--js
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Qemu Dirty Bitmap backup to encrypted target
2019-10-01 0:24 ` John Snow
@ 2019-10-01 8:45 ` Kevin Wolf
2019-10-01 11:43 ` Peter Krempa
2019-10-02 11:35 ` Craig Mull
0 siblings, 2 replies; 5+ messages in thread
From: Kevin Wolf @ 2019-10-01 8:45 UTC (permalink / raw)
To: John Snow; +Cc: Craig Mull, pkrempa, qemu-devel, Qemu-block, Leo Luan
Am 01.10.2019 um 02:24 hat John Snow geschrieben:
>
>
> On 9/30/19 3:26 PM, Craig Mull wrote:
> > How can have QEMU backup write the output to an encrypted target?
> >
> > Blocks in the dirty bitmap are unencrypted, and as such when I write
> > them with QEMU backup they are written to the target unencrypted.
> >
> > I've experimented with providing a json string as the target but with no
> > luck.
> >
> >
> > transaction='{ "execute": "transaction",
> >
> > "arguments": {
> >
> > "actions": [
> >
> > {"type": "block-dirty-bitmap-add",
> >
> > "data": {"node": "drive-virtio-disk0", "granularity": 2097152,
> > "name": "mybitmap"} },
> >
> > {"type": "drive-backup",
> >
> > "data": {"device": "drive-virtio-disk0", "target":
> > "json:{\"encrypt.format\": \"luks\", \"encrypt.key-secret\":
> > \"virtio-disk0-luks-secret0\", \"driver\": \"qcow2\", \"file\":
> > {\"driver\": \"file\", \"filename\": \"/tmp/target-encrypt-test.qcow2\"}}",
> >
> > "sync": "full", "format": "qcow2"} }
> >
> > ]
> >
> > }
> >
> > }'
> >
> >
> >
> > virsh -c qemu:///system qemu-monitor-command --pretty 28 $transaction
> >
> >
> >
> > {
> >
> > "id": "libvirt-45",
> >
> > "error": {
> >
> > "class": "GenericError",
> >
> > "desc": "Unknown protocol 'json'"
> >
> > }
> >
> > }
> >
> >
>
> I'll be honest, I'm not very good at the json specifications and don't
> really know when they're appropriate to use. At the basic level,
> drive-backup expects a filename. Sometimes the filename can get fancy,
> but... I stay away from that.
>
> Try using qmp-blockdev-create to create the target node instead, and
> then using blockdev-backup to backup to that target.
As the actual invocation is a virsh command, I think this is more of a
libvirt question than a QEMU one.
I suspect that libvirt won't support this without -blockdev support
(which will enable blockdev-backup instead of drive-backup), but even
then libvirt might not even offer an API for an encrypted target. Not
sure, though, so CCing Peter.
Kevin
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Qemu Dirty Bitmap backup to encrypted target
2019-10-01 8:45 ` Kevin Wolf
@ 2019-10-01 11:43 ` Peter Krempa
2019-10-02 11:35 ` Craig Mull
1 sibling, 0 replies; 5+ messages in thread
From: Peter Krempa @ 2019-10-01 11:43 UTC (permalink / raw)
To: Kevin Wolf; +Cc: Craig Mull, John Snow, qemu-devel, Qemu-block, Leo Luan
On Tue, Oct 01, 2019 at 10:45:53 +0200, Kevin Wolf wrote:
> Am 01.10.2019 um 02:24 hat John Snow geschrieben:
> >
> >
> > On 9/30/19 3:26 PM, Craig Mull wrote:
> > > How can have QEMU backup write the output to an encrypted target?
> > >
> > > Blocks in the dirty bitmap are unencrypted, and as such when I write
> > > them with QEMU backup they are written to the target unencrypted.
> > >
> > > I've experimented with providing a json string as the target but with no
> > > luck.
> > >
> > >
> > > transaction='{ "execute": "transaction",
> > >
> > > "arguments": {
> > >
> > > "actions": [
> > >
> > > {"type": "block-dirty-bitmap-add",
> > >
> > > "data": {"node": "drive-virtio-disk0", "granularity": 2097152,
> > > "name": "mybitmap"} },
> > >
> > > {"type": "drive-backup",
> > >
> > > "data": {"device": "drive-virtio-disk0", "target":
> > > "json:{\"encrypt.format\": \"luks\", \"encrypt.key-secret\":
> > > \"virtio-disk0-luks-secret0\", \"driver\": \"qcow2\", \"file\":
> > > {\"driver\": \"file\", \"filename\": \"/tmp/target-encrypt-test.qcow2\"}}",
> > >
> > > "sync": "full", "format": "qcow2"} }
> > >
> > > ]
> > >
> > > }
> > >
> > > }'
> > >
> > >
> > >
> > > virsh -c qemu:///system qemu-monitor-command --pretty 28 $transaction
> > >
> > >
> > >
> > > {
> > >
> > > "id": "libvirt-45",
> > >
> > > "error": {
> > >
> > > "class": "GenericError",
> > >
> > > "desc": "Unknown protocol 'json'"
> > >
> > > }
> > >
> > > }
> > >
> > >
> >
> > I'll be honest, I'm not very good at the json specifications and don't
> > really know when they're appropriate to use. At the basic level,
> > drive-backup expects a filename. Sometimes the filename can get fancy,
> > but... I stay away from that.
> >
> > Try using qmp-blockdev-create to create the target node instead, and
> > then using blockdev-backup to backup to that target.
>
> As the actual invocation is a virsh command, I think this is more of a
> libvirt question than a QEMU one.
The above virsh command is a direct (unsupported/experimental) command
passthrough to qemu, thus the syntax is identical to raw QMP.
You must use blockdev-backup as outlined above along with any management
necessary for adding the devices previously. Obviously this may
desynchronize state with libvirt.
> I suspect that libvirt won't support this without -blockdev support
> (which will enable blockdev-backup instead of drive-backup), but even
> then libvirt might not even offer an API for an encrypted target. Not
> sure, though, so CCing Peter.
The current state is that libvirt will support backup only with
-blockdev. In that case everything including encrypted images should be
supported same way as we (will [1]) support them with snapshots or
normal disks.
This is currently being worked on.
[1] All the code for blockdev is in but it's not enabled yet as we are
waiting for the possibility to detect the fix for 'savevm' done
recently. -blockdev will be supported with qemu-4.2.
^ permalink raw reply [flat|nested] 5+ messages in thread
* RE: Qemu Dirty Bitmap backup to encrypted target
2019-10-01 8:45 ` Kevin Wolf
2019-10-01 11:43 ` Peter Krempa
@ 2019-10-02 11:35 ` Craig Mull
1 sibling, 0 replies; 5+ messages in thread
From: Craig Mull @ 2019-10-02 11:35 UTC (permalink / raw)
To: pkrempa; +Cc: kwolf, jsnow, qemu-devel, qemu-block, Leo Luan
[-- Attachment #1: Type: text/html, Size: 6430 bytes --]
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2019-10-02 11:46 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2019-09-30 19:26 Qemu Dirty Bitmap backup to encrypted target Craig Mull
2019-10-01 0:24 ` John Snow
2019-10-01 8:45 ` Kevin Wolf
2019-10-01 11:43 ` Peter Krempa
2019-10-02 11:35 ` Craig Mull
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).