//! Driver for LTO SCSI tapes //! //! This is a userspace drive implementation using SG_IO. //! //! Why we do not use the Linux tape driver: //! //! - missing features (MAM, Encryption, ...) //! //! - strange permission handling - only root (or CAP_SYS_RAWIO) can //! do SG_IO (SYS_RAW_IO) //! //! - unability to detect EOT (you just get EIO) use std::convert::TryInto; use std::fs::File; use std::os::unix::io::{AsRawFd, FromRawFd, RawFd}; use anyhow::{bail, format_err, Error}; use proxmox_uuid::Uuid; use pbs_api_types::{ Fingerprint, Lp17VolumeStatistics, LtoDriveAndMediaStatus, LtoTapeDrive, MamAttribute, }; use pbs_config::key_config::KeyConfig; use pbs_tape::{ linux_list_drives::open_lto_tape_device, sg_tape::{SgTape, TapeAlertFlags}, BlockReadError, MediaContentHeader, TapeRead, TapeWrite, }; use proxmox_sys::command::run_command; use crate::tape::{ drive::TapeDriver, file_formats::{MediaSetLabel, PROXMOX_BACKUP_MEDIA_SET_LABEL_MAGIC_1_0}, }; /// Open a tape device /// /// This does additional checks: /// /// - check if it is a non-rewinding tape device /// - check if drive is ready (tape loaded) /// - check block size /// - for autoloader only, try to reload ejected tapes pub fn open_lto_tape_drive(config: &LtoTapeDrive) -> Result { proxmox_lang::try_block!({ let file = open_lto_tape_device(&config.path)?; let mut handle = LtoTapeHandle::new(file)?; if !handle.sg_tape.test_unit_ready().is_ok() { // for autoloader only, try to reload ejected tapes if config.changer.is_some() { let _ = handle.sg_tape.load(); // just try, ignore error } } handle.sg_tape.wait_until_ready()?; handle.set_default_options()?; Ok(handle) }) .map_err(|err: Error| { format_err!( "open drive '{}' ({}) failed - {}", config.name, config.path, err ) }) } /// Lto Tape device handle pub struct LtoTapeHandle { sg_tape: SgTape, } impl LtoTapeHandle { /// Creates a new instance pub fn new(file: File) -> Result { let sg_tape = SgTape::new(file)?; Ok(Self { sg_tape }) } /// Set all options we need/want pub fn set_default_options(&mut self) -> Result<(), Error> { self.sg_tape.set_default_options()?; Ok(()) } /// Set driver options pub fn set_drive_options( &mut self, compression: Option, block_length: Option, buffer_mode: Option, ) -> Result<(), Error> { self.sg_tape .set_drive_options(compression, block_length, buffer_mode) } /// Write a single EOF mark without flushing buffers pub fn write_filemarks(&mut self, count: usize) -> Result<(), std::io::Error> { self.sg_tape.write_filemarks(count, false) } /// Get Tape and Media status pub fn get_drive_and_media_status(&mut self) -> Result { self.sg_tape.get_drive_and_media_status() } pub fn forward_space_count_files(&mut self, count: usize) -> Result<(), Error> { self.sg_tape.space_filemarks(count.try_into()?) } pub fn backward_space_count_files(&mut self, count: usize) -> Result<(), Error> { self.sg_tape.space_filemarks(-count.try_into()?) } pub fn forward_space_count_records(&mut self, count: usize) -> Result<(), Error> { self.sg_tape.space_blocks(count.try_into()?) } pub fn backward_space_count_records(&mut self, count: usize) -> Result<(), Error> { self.sg_tape.space_blocks(-count.try_into()?) } /// Position the tape after filemark count. Count 0 means BOT. pub fn locate_file(&mut self, position: u64) -> Result<(), Error> { self.sg_tape.locate_file(position) } pub fn erase_media(&mut self, fast: bool) -> Result<(), Error> { self.sg_tape.erase_media(fast) } pub fn load(&mut self) -> Result<(), Error> { self.sg_tape.load() } /// Read Cartridge Memory (MAM Attributes) pub fn cartridge_memory(&mut self) -> Result, Error> { self.sg_tape.cartridge_memory() } /// Read Volume Statistics pub fn volume_statistics(&mut self) -> Result { self.sg_tape.volume_statistics() } /// Lock the drive door pub fn lock(&mut self) -> Result<(), Error> { self.sg_tape .set_medium_removal(false) .map_err(|err| format_err!("lock door failed - {}", err)) } /// Unlock the drive door pub fn unlock(&mut self) -> Result<(), Error> { self.sg_tape .set_medium_removal(true) .map_err(|err| format_err!("unlock door failed - {}", err)) } } impl TapeDriver for LtoTapeHandle { fn sync(&mut self) -> Result<(), Error> { self.sg_tape.sync()?; Ok(()) } /// Go to the end of the recorded media (for appending files). fn move_to_eom(&mut self, write_missing_eof: bool) -> Result<(), Error> { self.sg_tape.move_to_eom(write_missing_eof) } fn move_to_last_file(&mut self) -> Result<(), Error> { self.move_to_eom(false)?; self.sg_tape.check_filemark()?; let pos = self.current_file_number()?; if pos == 0 { bail!("move_to_last_file failed - media contains no data"); } if pos == 1 { self.rewind()?; return Ok(()); } self.backward_space_count_files(2)?; self.forward_space_count_files(1)?; Ok(()) } fn move_to_file(&mut self, file: u64) -> Result<(), Error> { self.locate_file(file) } fn rewind(&mut self) -> Result<(), Error> { self.sg_tape.rewind() } fn current_file_number(&mut self) -> Result { self.sg_tape.current_file_number() } fn format_media(&mut self, fast: bool) -> Result<(), Error> { self.sg_tape.format_media(fast) } fn read_next_file<'a>(&'a mut self) -> Result, BlockReadError> { let reader = self.sg_tape.open_reader()?; let handle: Box = Box::new(reader); Ok(handle) } fn write_file<'a>(&'a mut self) -> Result, std::io::Error> { let handle = self.sg_tape.open_writer(); Ok(Box::new(handle)) } fn write_media_set_label( &mut self, media_set_label: &MediaSetLabel, key_config: Option<&KeyConfig>, ) -> Result<(), Error> { let file_number = self.current_file_number()?; if file_number != 1 { self.rewind()?; self.forward_space_count_files(1)?; // skip label } let file_number = self.current_file_number()?; if file_number != 1 { bail!( "write_media_set_label failed - got wrong file number ({} != 1)", file_number ); } self.set_encryption(None)?; { // limit handle scope let mut handle = self.write_file()?; let mut value = serde_json::to_value(media_set_label)?; if media_set_label.encryption_key_fingerprint.is_some() { match key_config { Some(key_config) => { value["key-config"] = serde_json::to_value(key_config)?; } None => { bail!("missing encryption key config"); } } } let raw = serde_json::to_string_pretty(&value)?; let header = MediaContentHeader::new(PROXMOX_BACKUP_MEDIA_SET_LABEL_MAGIC_1_0, raw.len() as u32); handle.write_header(&header, raw.as_bytes())?; handle.finish(false)?; } self.sync()?; // sync data to tape Ok(()) } /// Rewind and put the drive off line (Eject media). fn eject_media(&mut self) -> Result<(), Error> { self.sg_tape.eject() } /// Read Tape Alert Flags fn tape_alert_flags(&mut self) -> Result { self.sg_tape.tape_alert_flags() } /// Set or clear encryption key /// /// Note: Only 'root' can read secret encryption keys, so we need /// to spawn setuid binary 'sg-tape-cmd'. fn set_encryption( &mut self, key_fingerprint: Option<(Fingerprint, Uuid)>, ) -> Result<(), Error> { if nix::unistd::Uid::effective().is_root() { if let Some((ref key_fingerprint, ref uuid)) = key_fingerprint { let (key_map, _digest) = pbs_config::tape_encryption_keys::load_keys()?; match key_map.get(key_fingerprint) { Some(item) => { // derive specialized key for each media-set let mut tape_key = [0u8; 32]; let uuid_bytes: [u8; 16] = uuid.as_bytes().clone(); openssl::pkcs5::pbkdf2_hmac( &item.key, &uuid_bytes, 10, openssl::hash::MessageDigest::sha256(), &mut tape_key, )?; return self.sg_tape.set_encryption(Some(tape_key)); } None => bail!("unknown tape encryption key '{}'", key_fingerprint), } } else { return self.sg_tape.set_encryption(None); } } let output = if let Some((fingerprint, uuid)) = key_fingerprint { let fingerprint = fingerprint.signature(); run_sg_tape_cmd( "encryption", &["--fingerprint", &fingerprint, "--uuid", &uuid.to_string()], self.sg_tape.file_mut().as_raw_fd(), )? } else { run_sg_tape_cmd("encryption", &[], self.sg_tape.file_mut().as_raw_fd())? }; let result: Result<(), String> = serde_json::from_str(&output)?; result.map_err(|err| format_err!("{}", err)) } } fn run_sg_tape_cmd(subcmd: &str, args: &[&str], fd: RawFd) -> Result { let mut command = std::process::Command::new("/usr/lib/x86_64-linux-gnu/proxmox-backup/sg-tape-cmd"); command.args(&[subcmd]); command.args(&["--stdin"]); command.args(args); let device_fd = nix::unistd::dup(fd)?; command.stdin(unsafe { std::process::Stdio::from_raw_fd(device_fd) }); run_command(command, None) }