* Qemu Dirty Bitmap backup to encrypted target @ 2019-09-30 19:26 Craig Mull 2019-10-01 0:24 ` John Snow 0 siblings, 1 reply; 5+ messages in thread From: Craig Mull @ 2019-09-30 19:26 UTC (permalink / raw) To: qemu-devel, Leo Luan [-- Attachment #1: Type: text/html, Size: 4893 bytes --] ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Qemu Dirty Bitmap backup to encrypted target 2019-09-30 19:26 Qemu Dirty Bitmap backup to encrypted target Craig Mull @ 2019-10-01 0:24 ` John Snow 2019-10-01 8:45 ` Kevin Wolf 0 siblings, 1 reply; 5+ messages in thread From: John Snow @ 2019-10-01 0:24 UTC (permalink / raw) To: Craig Mull; +Cc: qemu-devel, Qemu-block, Leo Luan On 9/30/19 3:26 PM, Craig Mull wrote: > How can have QEMU backup write the output to an encrypted target? > > Blocks in the dirty bitmap are unencrypted, and as such when I write > them with QEMU backup they are written to the target unencrypted. > > I've experimented with providing a json string as the target but with no > luck. > > > transaction='{ "execute": "transaction", > > "arguments": { > > "actions": [ > > {"type": "block-dirty-bitmap-add", > > "data": {"node": "drive-virtio-disk0", "granularity": 2097152, > "name": "mybitmap"} }, > > {"type": "drive-backup", > > "data": {"device": "drive-virtio-disk0", "target": > "json:{\"encrypt.format\": \"luks\", \"encrypt.key-secret\": > \"virtio-disk0-luks-secret0\", \"driver\": \"qcow2\", \"file\": > {\"driver\": \"file\", \"filename\": \"/tmp/target-encrypt-test.qcow2\"}}", > > "sync": "full", "format": "qcow2"} } > > ] > > } > > }' > > > > virsh -c qemu:///system qemu-monitor-command --pretty 28 $transaction > > > > { > > "id": "libvirt-45", > > "error": { > > "class": "GenericError", > > "desc": "Unknown protocol 'json'" > > } > > } > > I'll be honest, I'm not very good at the json specifications and don't really know when they're appropriate to use. At the basic level, drive-backup expects a filename. Sometimes the filename can get fancy, but... I stay away from that. Try using qmp-blockdev-create to create the target node instead, and then using blockdev-backup to backup to that target. --js ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Qemu Dirty Bitmap backup to encrypted target 2019-10-01 0:24 ` John Snow @ 2019-10-01 8:45 ` Kevin Wolf 2019-10-01 11:43 ` Peter Krempa 2019-10-02 11:35 ` Craig Mull 0 siblings, 2 replies; 5+ messages in thread From: Kevin Wolf @ 2019-10-01 8:45 UTC (permalink / raw) To: John Snow; +Cc: Craig Mull, pkrempa, qemu-devel, Qemu-block, Leo Luan Am 01.10.2019 um 02:24 hat John Snow geschrieben: > > > On 9/30/19 3:26 PM, Craig Mull wrote: > > How can have QEMU backup write the output to an encrypted target? > > > > Blocks in the dirty bitmap are unencrypted, and as such when I write > > them with QEMU backup they are written to the target unencrypted. > > > > I've experimented with providing a json string as the target but with no > > luck. > > > > > > transaction='{ "execute": "transaction", > > > > "arguments": { > > > > "actions": [ > > > > {"type": "block-dirty-bitmap-add", > > > > "data": {"node": "drive-virtio-disk0", "granularity": 2097152, > > "name": "mybitmap"} }, > > > > {"type": "drive-backup", > > > > "data": {"device": "drive-virtio-disk0", "target": > > "json:{\"encrypt.format\": \"luks\", \"encrypt.key-secret\": > > \"virtio-disk0-luks-secret0\", \"driver\": \"qcow2\", \"file\": > > {\"driver\": \"file\", \"filename\": \"/tmp/target-encrypt-test.qcow2\"}}", > > > > "sync": "full", "format": "qcow2"} } > > > > ] > > > > } > > > > }' > > > > > > > > virsh -c qemu:///system qemu-monitor-command --pretty 28 $transaction > > > > > > > > { > > > > "id": "libvirt-45", > > > > "error": { > > > > "class": "GenericError", > > > > "desc": "Unknown protocol 'json'" > > > > } > > > > } > > > > > > I'll be honest, I'm not very good at the json specifications and don't > really know when they're appropriate to use. At the basic level, > drive-backup expects a filename. Sometimes the filename can get fancy, > but... I stay away from that. > > Try using qmp-blockdev-create to create the target node instead, and > then using blockdev-backup to backup to that target. As the actual invocation is a virsh command, I think this is more of a libvirt question than a QEMU one. I suspect that libvirt won't support this without -blockdev support (which will enable blockdev-backup instead of drive-backup), but even then libvirt might not even offer an API for an encrypted target. Not sure, though, so CCing Peter. Kevin ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Qemu Dirty Bitmap backup to encrypted target 2019-10-01 8:45 ` Kevin Wolf @ 2019-10-01 11:43 ` Peter Krempa 2019-10-02 11:35 ` Craig Mull 1 sibling, 0 replies; 5+ messages in thread From: Peter Krempa @ 2019-10-01 11:43 UTC (permalink / raw) To: Kevin Wolf; +Cc: Craig Mull, John Snow, qemu-devel, Qemu-block, Leo Luan On Tue, Oct 01, 2019 at 10:45:53 +0200, Kevin Wolf wrote: > Am 01.10.2019 um 02:24 hat John Snow geschrieben: > > > > > > On 9/30/19 3:26 PM, Craig Mull wrote: > > > How can have QEMU backup write the output to an encrypted target? > > > > > > Blocks in the dirty bitmap are unencrypted, and as such when I write > > > them with QEMU backup they are written to the target unencrypted. > > > > > > I've experimented with providing a json string as the target but with no > > > luck. > > > > > > > > > transaction='{ "execute": "transaction", > > > > > > "arguments": { > > > > > > "actions": [ > > > > > > {"type": "block-dirty-bitmap-add", > > > > > > "data": {"node": "drive-virtio-disk0", "granularity": 2097152, > > > "name": "mybitmap"} }, > > > > > > {"type": "drive-backup", > > > > > > "data": {"device": "drive-virtio-disk0", "target": > > > "json:{\"encrypt.format\": \"luks\", \"encrypt.key-secret\": > > > \"virtio-disk0-luks-secret0\", \"driver\": \"qcow2\", \"file\": > > > {\"driver\": \"file\", \"filename\": \"/tmp/target-encrypt-test.qcow2\"}}", > > > > > > "sync": "full", "format": "qcow2"} } > > > > > > ] > > > > > > } > > > > > > }' > > > > > > > > > > > > virsh -c qemu:///system qemu-monitor-command --pretty 28 $transaction > > > > > > > > > > > > { > > > > > > "id": "libvirt-45", > > > > > > "error": { > > > > > > "class": "GenericError", > > > > > > "desc": "Unknown protocol 'json'" > > > > > > } > > > > > > } > > > > > > > > > > I'll be honest, I'm not very good at the json specifications and don't > > really know when they're appropriate to use. At the basic level, > > drive-backup expects a filename. Sometimes the filename can get fancy, > > but... I stay away from that. > > > > Try using qmp-blockdev-create to create the target node instead, and > > then using blockdev-backup to backup to that target. > > As the actual invocation is a virsh command, I think this is more of a > libvirt question than a QEMU one. The above virsh command is a direct (unsupported/experimental) command passthrough to qemu, thus the syntax is identical to raw QMP. You must use blockdev-backup as outlined above along with any management necessary for adding the devices previously. Obviously this may desynchronize state with libvirt. > I suspect that libvirt won't support this without -blockdev support > (which will enable blockdev-backup instead of drive-backup), but even > then libvirt might not even offer an API for an encrypted target. Not > sure, though, so CCing Peter. The current state is that libvirt will support backup only with -blockdev. In that case everything including encrypted images should be supported same way as we (will [1]) support them with snapshots or normal disks. This is currently being worked on. [1] All the code for blockdev is in but it's not enabled yet as we are waiting for the possibility to detect the fix for 'savevm' done recently. -blockdev will be supported with qemu-4.2. ^ permalink raw reply [flat|nested] 5+ messages in thread
* RE: Qemu Dirty Bitmap backup to encrypted target 2019-10-01 8:45 ` Kevin Wolf 2019-10-01 11:43 ` Peter Krempa @ 2019-10-02 11:35 ` Craig Mull 1 sibling, 0 replies; 5+ messages in thread From: Craig Mull @ 2019-10-02 11:35 UTC (permalink / raw) To: pkrempa; +Cc: kwolf, jsnow, qemu-devel, qemu-block, Leo Luan [-- Attachment #1: Type: text/html, Size: 6430 bytes --] ^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2019-10-02 11:46 UTC | newest] Thread overview: 5+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2019-09-30 19:26 Qemu Dirty Bitmap backup to encrypted target Craig Mull 2019-10-01 0:24 ` John Snow 2019-10-01 8:45 ` Kevin Wolf 2019-10-01 11:43 ` Peter Krempa 2019-10-02 11:35 ` Craig Mull
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).