target-arm: Allow cp access functions to indicate traps to EL2 or EL3
[qemu/ar7.git] / nbd.c
blob06b501ba672b94ac7f9df07e1cd25eb41b13923b
1 /*
2 * Copyright (C) 2005 Anthony Liguori <anthony@codemonkey.ws>
4 * Network Block Device
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 of the License.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, see <http://www.gnu.org/licenses/>.
19 #include "block/nbd.h"
20 #include "sysemu/block-backend.h"
22 #include "block/coroutine.h"
24 #include <errno.h>
25 #include <string.h>
26 #ifndef _WIN32
27 #include <sys/ioctl.h>
28 #endif
29 #if defined(__sun__) || defined(__HAIKU__)
30 #include <sys/ioccom.h>
31 #endif
32 #include <ctype.h>
33 #include <inttypes.h>
35 #ifdef __linux__
36 #include <linux/fs.h>
37 #endif
39 #include "qemu/sockets.h"
40 #include "qemu/queue.h"
41 #include "qemu/main-loop.h"
43 //#define DEBUG_NBD
45 #ifdef DEBUG_NBD
46 #define TRACE(msg, ...) do { \
47 LOG(msg, ## __VA_ARGS__); \
48 } while(0)
49 #else
50 #define TRACE(msg, ...) \
51 do { } while (0)
52 #endif
54 #define LOG(msg, ...) do { \
55 fprintf(stderr, "%s:%s():L%d: " msg "\n", \
56 __FILE__, __FUNCTION__, __LINE__, ## __VA_ARGS__); \
57 } while(0)
59 /* This is all part of the "official" NBD API.
61 * The most up-to-date documentation is available at:
62 * https://github.com/yoe/nbd/blob/master/doc/proto.txt
65 #define NBD_REQUEST_SIZE (4 + 4 + 8 + 8 + 4)
66 #define NBD_REPLY_SIZE (4 + 4 + 8)
67 #define NBD_REQUEST_MAGIC 0x25609513
68 #define NBD_REPLY_MAGIC 0x67446698
69 #define NBD_OPTS_MAGIC 0x49484156454F5054LL
70 #define NBD_CLIENT_MAGIC 0x0000420281861253LL
71 #define NBD_REP_MAGIC 0x3e889045565a9LL
73 #define NBD_SET_SOCK _IO(0xab, 0)
74 #define NBD_SET_BLKSIZE _IO(0xab, 1)
75 #define NBD_SET_SIZE _IO(0xab, 2)
76 #define NBD_DO_IT _IO(0xab, 3)
77 #define NBD_CLEAR_SOCK _IO(0xab, 4)
78 #define NBD_CLEAR_QUE _IO(0xab, 5)
79 #define NBD_PRINT_DEBUG _IO(0xab, 6)
80 #define NBD_SET_SIZE_BLOCKS _IO(0xab, 7)
81 #define NBD_DISCONNECT _IO(0xab, 8)
82 #define NBD_SET_TIMEOUT _IO(0xab, 9)
83 #define NBD_SET_FLAGS _IO(0xab, 10)
85 #define NBD_OPT_EXPORT_NAME (1)
86 #define NBD_OPT_ABORT (2)
87 #define NBD_OPT_LIST (3)
89 /* NBD errors are based on errno numbers, so there is a 1:1 mapping,
90 * but only a limited set of errno values is specified in the protocol.
91 * Everything else is squashed to EINVAL.
93 #define NBD_SUCCESS 0
94 #define NBD_EPERM 1
95 #define NBD_EIO 5
96 #define NBD_ENOMEM 12
97 #define NBD_EINVAL 22
98 #define NBD_ENOSPC 28
100 static int system_errno_to_nbd_errno(int err)
102 switch (err) {
103 case 0:
104 return NBD_SUCCESS;
105 case EPERM:
106 return NBD_EPERM;
107 case EIO:
108 return NBD_EIO;
109 case ENOMEM:
110 return NBD_ENOMEM;
111 #ifdef EDQUOT
112 case EDQUOT:
113 #endif
114 case EFBIG:
115 case ENOSPC:
116 return NBD_ENOSPC;
117 case EINVAL:
118 default:
119 return NBD_EINVAL;
123 static int nbd_errno_to_system_errno(int err)
125 switch (err) {
126 case NBD_SUCCESS:
127 return 0;
128 case NBD_EPERM:
129 return EPERM;
130 case NBD_EIO:
131 return EIO;
132 case NBD_ENOMEM:
133 return ENOMEM;
134 case NBD_ENOSPC:
135 return ENOSPC;
136 case NBD_EINVAL:
137 default:
138 return EINVAL;
142 /* Definitions for opaque data types */
144 typedef struct NBDRequest NBDRequest;
146 struct NBDRequest {
147 QSIMPLEQ_ENTRY(NBDRequest) entry;
148 NBDClient *client;
149 uint8_t *data;
152 struct NBDExport {
153 int refcount;
154 void (*close)(NBDExport *exp);
156 BlockBackend *blk;
157 char *name;
158 off_t dev_offset;
159 off_t size;
160 uint32_t nbdflags;
161 QTAILQ_HEAD(, NBDClient) clients;
162 QTAILQ_ENTRY(NBDExport) next;
164 AioContext *ctx;
167 static QTAILQ_HEAD(, NBDExport) exports = QTAILQ_HEAD_INITIALIZER(exports);
169 struct NBDClient {
170 int refcount;
171 void (*close)(NBDClient *client);
173 NBDExport *exp;
174 int sock;
176 Coroutine *recv_coroutine;
178 CoMutex send_lock;
179 Coroutine *send_coroutine;
181 bool can_read;
183 QTAILQ_ENTRY(NBDClient) next;
184 int nb_requests;
185 bool closing;
188 /* That's all folks */
190 static void nbd_set_handlers(NBDClient *client);
191 static void nbd_unset_handlers(NBDClient *client);
192 static void nbd_update_can_read(NBDClient *client);
194 ssize_t nbd_wr_sync(int fd, void *buffer, size_t size, bool do_read)
196 size_t offset = 0;
197 int err;
199 if (qemu_in_coroutine()) {
200 if (do_read) {
201 return qemu_co_recv(fd, buffer, size);
202 } else {
203 return qemu_co_send(fd, buffer, size);
207 while (offset < size) {
208 ssize_t len;
210 if (do_read) {
211 len = qemu_recv(fd, buffer + offset, size - offset, 0);
212 } else {
213 len = send(fd, buffer + offset, size - offset, 0);
216 if (len < 0) {
217 err = socket_error();
219 /* recoverable error */
220 if (err == EINTR || (offset > 0 && (err == EAGAIN || err == EWOULDBLOCK))) {
221 continue;
224 /* unrecoverable error */
225 return -err;
228 /* eof */
229 if (len == 0) {
230 break;
233 offset += len;
236 return offset;
239 static ssize_t read_sync(int fd, void *buffer, size_t size)
241 /* Sockets are kept in blocking mode in the negotiation phase. After
242 * that, a non-readable socket simply means that another thread stole
243 * our request/reply. Synchronization is done with recv_coroutine, so
244 * that this is coroutine-safe.
246 return nbd_wr_sync(fd, buffer, size, true);
249 static ssize_t drop_sync(int fd, size_t size)
251 ssize_t ret, dropped = size;
252 uint8_t *buffer = g_malloc(MIN(65536, size));
254 while (size > 0) {
255 ret = read_sync(fd, buffer, MIN(65536, size));
256 if (ret < 0) {
257 g_free(buffer);
258 return ret;
261 assert(ret <= size);
262 size -= ret;
265 g_free(buffer);
266 return dropped;
269 static ssize_t write_sync(int fd, void *buffer, size_t size)
271 int ret;
272 do {
273 /* For writes, we do expect the socket to be writable. */
274 ret = nbd_wr_sync(fd, buffer, size, false);
275 } while (ret == -EAGAIN);
276 return ret;
279 /* Basic flow for negotiation
281 Server Client
282 Negotiate
286 Server Client
287 Negotiate #1
288 Option
289 Negotiate #2
291 ----
293 followed by
295 Server Client
296 Request
297 Response
298 Request
299 Response
302 Request (type == 2)
306 static int nbd_send_rep(int csock, uint32_t type, uint32_t opt)
308 uint64_t magic;
309 uint32_t len;
311 magic = cpu_to_be64(NBD_REP_MAGIC);
312 if (write_sync(csock, &magic, sizeof(magic)) != sizeof(magic)) {
313 LOG("write failed (rep magic)");
314 return -EINVAL;
316 opt = cpu_to_be32(opt);
317 if (write_sync(csock, &opt, sizeof(opt)) != sizeof(opt)) {
318 LOG("write failed (rep opt)");
319 return -EINVAL;
321 type = cpu_to_be32(type);
322 if (write_sync(csock, &type, sizeof(type)) != sizeof(type)) {
323 LOG("write failed (rep type)");
324 return -EINVAL;
326 len = cpu_to_be32(0);
327 if (write_sync(csock, &len, sizeof(len)) != sizeof(len)) {
328 LOG("write failed (rep data length)");
329 return -EINVAL;
331 return 0;
334 static int nbd_send_rep_list(int csock, NBDExport *exp)
336 uint64_t magic, name_len;
337 uint32_t opt, type, len;
339 name_len = strlen(exp->name);
340 magic = cpu_to_be64(NBD_REP_MAGIC);
341 if (write_sync(csock, &magic, sizeof(magic)) != sizeof(magic)) {
342 LOG("write failed (magic)");
343 return -EINVAL;
345 opt = cpu_to_be32(NBD_OPT_LIST);
346 if (write_sync(csock, &opt, sizeof(opt)) != sizeof(opt)) {
347 LOG("write failed (opt)");
348 return -EINVAL;
350 type = cpu_to_be32(NBD_REP_SERVER);
351 if (write_sync(csock, &type, sizeof(type)) != sizeof(type)) {
352 LOG("write failed (reply type)");
353 return -EINVAL;
355 len = cpu_to_be32(name_len + sizeof(len));
356 if (write_sync(csock, &len, sizeof(len)) != sizeof(len)) {
357 LOG("write failed (length)");
358 return -EINVAL;
360 len = cpu_to_be32(name_len);
361 if (write_sync(csock, &len, sizeof(len)) != sizeof(len)) {
362 LOG("write failed (length)");
363 return -EINVAL;
365 if (write_sync(csock, exp->name, name_len) != name_len) {
366 LOG("write failed (buffer)");
367 return -EINVAL;
369 return 0;
372 static int nbd_handle_list(NBDClient *client, uint32_t length)
374 int csock;
375 NBDExport *exp;
377 csock = client->sock;
378 if (length) {
379 if (drop_sync(csock, length) != length) {
380 return -EIO;
382 return nbd_send_rep(csock, NBD_REP_ERR_INVALID, NBD_OPT_LIST);
385 /* For each export, send a NBD_REP_SERVER reply. */
386 QTAILQ_FOREACH(exp, &exports, next) {
387 if (nbd_send_rep_list(csock, exp)) {
388 return -EINVAL;
391 /* Finish with a NBD_REP_ACK. */
392 return nbd_send_rep(csock, NBD_REP_ACK, NBD_OPT_LIST);
395 static int nbd_handle_export_name(NBDClient *client, uint32_t length)
397 int rc = -EINVAL, csock = client->sock;
398 char name[256];
400 /* Client sends:
401 [20 .. xx] export name (length bytes)
403 TRACE("Checking length");
404 if (length > 255) {
405 LOG("Bad length received");
406 goto fail;
408 if (read_sync(csock, name, length) != length) {
409 LOG("read failed");
410 goto fail;
412 name[length] = '\0';
414 client->exp = nbd_export_find(name);
415 if (!client->exp) {
416 LOG("export not found");
417 goto fail;
420 QTAILQ_INSERT_TAIL(&client->exp->clients, client, next);
421 nbd_export_get(client->exp);
422 rc = 0;
423 fail:
424 return rc;
427 static int nbd_receive_options(NBDClient *client)
429 int csock = client->sock;
430 uint32_t flags;
432 /* Client sends:
433 [ 0 .. 3] client flags
435 [ 0 .. 7] NBD_OPTS_MAGIC
436 [ 8 .. 11] NBD option
437 [12 .. 15] Data length
438 ... Rest of request
440 [ 0 .. 7] NBD_OPTS_MAGIC
441 [ 8 .. 11] Second NBD option
442 [12 .. 15] Data length
443 ... Rest of request
446 if (read_sync(csock, &flags, sizeof(flags)) != sizeof(flags)) {
447 LOG("read failed");
448 return -EIO;
450 TRACE("Checking client flags");
451 be32_to_cpus(&flags);
452 if (flags != 0 && flags != NBD_FLAG_C_FIXED_NEWSTYLE) {
453 LOG("Bad client flags received");
454 return -EIO;
457 while (1) {
458 int ret;
459 uint32_t tmp, length;
460 uint64_t magic;
462 if (read_sync(csock, &magic, sizeof(magic)) != sizeof(magic)) {
463 LOG("read failed");
464 return -EINVAL;
466 TRACE("Checking opts magic");
467 if (magic != be64_to_cpu(NBD_OPTS_MAGIC)) {
468 LOG("Bad magic received");
469 return -EINVAL;
472 if (read_sync(csock, &tmp, sizeof(tmp)) != sizeof(tmp)) {
473 LOG("read failed");
474 return -EINVAL;
477 if (read_sync(csock, &length, sizeof(length)) != sizeof(length)) {
478 LOG("read failed");
479 return -EINVAL;
481 length = be32_to_cpu(length);
483 TRACE("Checking option");
484 switch (be32_to_cpu(tmp)) {
485 case NBD_OPT_LIST:
486 ret = nbd_handle_list(client, length);
487 if (ret < 0) {
488 return ret;
490 break;
492 case NBD_OPT_ABORT:
493 return -EINVAL;
495 case NBD_OPT_EXPORT_NAME:
496 return nbd_handle_export_name(client, length);
498 default:
499 tmp = be32_to_cpu(tmp);
500 LOG("Unsupported option 0x%x", tmp);
501 nbd_send_rep(client->sock, NBD_REP_ERR_UNSUP, tmp);
502 return -EINVAL;
507 static int nbd_send_negotiate(NBDClient *client)
509 int csock = client->sock;
510 char buf[8 + 8 + 8 + 128];
511 int rc;
512 const int myflags = (NBD_FLAG_HAS_FLAGS | NBD_FLAG_SEND_TRIM |
513 NBD_FLAG_SEND_FLUSH | NBD_FLAG_SEND_FUA);
515 /* Negotiation header without options:
516 [ 0 .. 7] passwd ("NBDMAGIC")
517 [ 8 .. 15] magic (NBD_CLIENT_MAGIC)
518 [16 .. 23] size
519 [24 .. 25] server flags (0)
520 [26 .. 27] export flags
521 [28 .. 151] reserved (0)
523 Negotiation header with options, part 1:
524 [ 0 .. 7] passwd ("NBDMAGIC")
525 [ 8 .. 15] magic (NBD_OPTS_MAGIC)
526 [16 .. 17] server flags (0)
528 part 2 (after options are sent):
529 [18 .. 25] size
530 [26 .. 27] export flags
531 [28 .. 151] reserved (0)
534 qemu_set_block(csock);
535 rc = -EINVAL;
537 TRACE("Beginning negotiation.");
538 memset(buf, 0, sizeof(buf));
539 memcpy(buf, "NBDMAGIC", 8);
540 if (client->exp) {
541 assert ((client->exp->nbdflags & ~65535) == 0);
542 cpu_to_be64w((uint64_t*)(buf + 8), NBD_CLIENT_MAGIC);
543 cpu_to_be64w((uint64_t*)(buf + 16), client->exp->size);
544 cpu_to_be16w((uint16_t*)(buf + 26), client->exp->nbdflags | myflags);
545 } else {
546 cpu_to_be64w((uint64_t*)(buf + 8), NBD_OPTS_MAGIC);
547 cpu_to_be16w((uint16_t *)(buf + 16), NBD_FLAG_FIXED_NEWSTYLE);
550 if (client->exp) {
551 if (write_sync(csock, buf, sizeof(buf)) != sizeof(buf)) {
552 LOG("write failed");
553 goto fail;
555 } else {
556 if (write_sync(csock, buf, 18) != 18) {
557 LOG("write failed");
558 goto fail;
560 rc = nbd_receive_options(client);
561 if (rc != 0) {
562 LOG("option negotiation failed");
563 goto fail;
566 assert ((client->exp->nbdflags & ~65535) == 0);
567 cpu_to_be64w((uint64_t*)(buf + 18), client->exp->size);
568 cpu_to_be16w((uint16_t*)(buf + 26), client->exp->nbdflags | myflags);
569 if (write_sync(csock, buf + 18, sizeof(buf) - 18) != sizeof(buf) - 18) {
570 LOG("write failed");
571 goto fail;
575 TRACE("Negotiation succeeded.");
576 rc = 0;
577 fail:
578 qemu_set_nonblock(csock);
579 return rc;
582 int nbd_receive_negotiate(int csock, const char *name, uint32_t *flags,
583 off_t *size, Error **errp)
585 char buf[256];
586 uint64_t magic, s;
587 uint16_t tmp;
588 int rc;
590 TRACE("Receiving negotiation.");
592 rc = -EINVAL;
594 if (read_sync(csock, buf, 8) != 8) {
595 error_setg(errp, "Failed to read data");
596 goto fail;
599 buf[8] = '\0';
600 if (strlen(buf) == 0) {
601 error_setg(errp, "Server connection closed unexpectedly");
602 goto fail;
605 TRACE("Magic is %c%c%c%c%c%c%c%c",
606 qemu_isprint(buf[0]) ? buf[0] : '.',
607 qemu_isprint(buf[1]) ? buf[1] : '.',
608 qemu_isprint(buf[2]) ? buf[2] : '.',
609 qemu_isprint(buf[3]) ? buf[3] : '.',
610 qemu_isprint(buf[4]) ? buf[4] : '.',
611 qemu_isprint(buf[5]) ? buf[5] : '.',
612 qemu_isprint(buf[6]) ? buf[6] : '.',
613 qemu_isprint(buf[7]) ? buf[7] : '.');
615 if (memcmp(buf, "NBDMAGIC", 8) != 0) {
616 error_setg(errp, "Invalid magic received");
617 goto fail;
620 if (read_sync(csock, &magic, sizeof(magic)) != sizeof(magic)) {
621 error_setg(errp, "Failed to read magic");
622 goto fail;
624 magic = be64_to_cpu(magic);
625 TRACE("Magic is 0x%" PRIx64, magic);
627 if (name) {
628 uint32_t reserved = 0;
629 uint32_t opt;
630 uint32_t namesize;
632 TRACE("Checking magic (opts_magic)");
633 if (magic != NBD_OPTS_MAGIC) {
634 if (magic == NBD_CLIENT_MAGIC) {
635 error_setg(errp, "Server does not support export names");
636 } else {
637 error_setg(errp, "Bad magic received");
639 goto fail;
641 if (read_sync(csock, &tmp, sizeof(tmp)) != sizeof(tmp)) {
642 error_setg(errp, "Failed to read server flags");
643 goto fail;
645 *flags = be16_to_cpu(tmp) << 16;
646 /* reserved for future use */
647 if (write_sync(csock, &reserved, sizeof(reserved)) !=
648 sizeof(reserved)) {
649 error_setg(errp, "Failed to read reserved field");
650 goto fail;
652 /* write the export name */
653 magic = cpu_to_be64(magic);
654 if (write_sync(csock, &magic, sizeof(magic)) != sizeof(magic)) {
655 error_setg(errp, "Failed to send export name magic");
656 goto fail;
658 opt = cpu_to_be32(NBD_OPT_EXPORT_NAME);
659 if (write_sync(csock, &opt, sizeof(opt)) != sizeof(opt)) {
660 error_setg(errp, "Failed to send export name option number");
661 goto fail;
663 namesize = cpu_to_be32(strlen(name));
664 if (write_sync(csock, &namesize, sizeof(namesize)) !=
665 sizeof(namesize)) {
666 error_setg(errp, "Failed to send export name length");
667 goto fail;
669 if (write_sync(csock, (char*)name, strlen(name)) != strlen(name)) {
670 error_setg(errp, "Failed to send export name");
671 goto fail;
673 } else {
674 TRACE("Checking magic (cli_magic)");
676 if (magic != NBD_CLIENT_MAGIC) {
677 if (magic == NBD_OPTS_MAGIC) {
678 error_setg(errp, "Server requires an export name");
679 } else {
680 error_setg(errp, "Bad magic received");
682 goto fail;
686 if (read_sync(csock, &s, sizeof(s)) != sizeof(s)) {
687 error_setg(errp, "Failed to read export length");
688 goto fail;
690 *size = be64_to_cpu(s);
691 TRACE("Size is %" PRIu64, *size);
693 if (!name) {
694 if (read_sync(csock, flags, sizeof(*flags)) != sizeof(*flags)) {
695 error_setg(errp, "Failed to read export flags");
696 goto fail;
698 *flags = be32_to_cpup(flags);
699 } else {
700 if (read_sync(csock, &tmp, sizeof(tmp)) != sizeof(tmp)) {
701 error_setg(errp, "Failed to read export flags");
702 goto fail;
704 *flags |= be16_to_cpu(tmp);
706 if (read_sync(csock, &buf, 124) != 124) {
707 error_setg(errp, "Failed to read reserved block");
708 goto fail;
710 rc = 0;
712 fail:
713 return rc;
716 #ifdef __linux__
717 int nbd_init(int fd, int csock, uint32_t flags, off_t size)
719 TRACE("Setting NBD socket");
721 if (ioctl(fd, NBD_SET_SOCK, csock) < 0) {
722 int serrno = errno;
723 LOG("Failed to set NBD socket");
724 return -serrno;
727 TRACE("Setting block size to %lu", (unsigned long)BDRV_SECTOR_SIZE);
729 if (ioctl(fd, NBD_SET_BLKSIZE, (size_t)BDRV_SECTOR_SIZE) < 0) {
730 int serrno = errno;
731 LOG("Failed setting NBD block size");
732 return -serrno;
735 TRACE("Setting size to %zd block(s)", (size_t)(size / BDRV_SECTOR_SIZE));
737 if (ioctl(fd, NBD_SET_SIZE_BLOCKS, (size_t)(size / BDRV_SECTOR_SIZE)) < 0) {
738 int serrno = errno;
739 LOG("Failed setting size (in blocks)");
740 return -serrno;
743 if (ioctl(fd, NBD_SET_FLAGS, flags) < 0) {
744 if (errno == ENOTTY) {
745 int read_only = (flags & NBD_FLAG_READ_ONLY) != 0;
746 TRACE("Setting readonly attribute");
748 if (ioctl(fd, BLKROSET, (unsigned long) &read_only) < 0) {
749 int serrno = errno;
750 LOG("Failed setting read-only attribute");
751 return -serrno;
753 } else {
754 int serrno = errno;
755 LOG("Failed setting flags");
756 return -serrno;
760 TRACE("Negotiation ended");
762 return 0;
765 int nbd_disconnect(int fd)
767 ioctl(fd, NBD_CLEAR_QUE);
768 ioctl(fd, NBD_DISCONNECT);
769 ioctl(fd, NBD_CLEAR_SOCK);
770 return 0;
773 int nbd_client(int fd)
775 int ret;
776 int serrno;
778 TRACE("Doing NBD loop");
780 ret = ioctl(fd, NBD_DO_IT);
781 if (ret < 0 && errno == EPIPE) {
782 /* NBD_DO_IT normally returns EPIPE when someone has disconnected
783 * the socket via NBD_DISCONNECT. We do not want to return 1 in
784 * that case.
786 ret = 0;
788 serrno = errno;
790 TRACE("NBD loop returned %d: %s", ret, strerror(serrno));
792 TRACE("Clearing NBD queue");
793 ioctl(fd, NBD_CLEAR_QUE);
795 TRACE("Clearing NBD socket");
796 ioctl(fd, NBD_CLEAR_SOCK);
798 errno = serrno;
799 return ret;
801 #else
802 int nbd_init(int fd, int csock, uint32_t flags, off_t size)
804 return -ENOTSUP;
807 int nbd_disconnect(int fd)
809 return -ENOTSUP;
812 int nbd_client(int fd)
814 return -ENOTSUP;
816 #endif
818 ssize_t nbd_send_request(int csock, struct nbd_request *request)
820 uint8_t buf[NBD_REQUEST_SIZE];
821 ssize_t ret;
823 cpu_to_be32w((uint32_t*)buf, NBD_REQUEST_MAGIC);
824 cpu_to_be32w((uint32_t*)(buf + 4), request->type);
825 cpu_to_be64w((uint64_t*)(buf + 8), request->handle);
826 cpu_to_be64w((uint64_t*)(buf + 16), request->from);
827 cpu_to_be32w((uint32_t*)(buf + 24), request->len);
829 TRACE("Sending request to client: "
830 "{ .from = %" PRIu64", .len = %u, .handle = %" PRIu64", .type=%i}",
831 request->from, request->len, request->handle, request->type);
833 ret = write_sync(csock, buf, sizeof(buf));
834 if (ret < 0) {
835 return ret;
838 if (ret != sizeof(buf)) {
839 LOG("writing to socket failed");
840 return -EINVAL;
842 return 0;
845 static ssize_t nbd_receive_request(int csock, struct nbd_request *request)
847 uint8_t buf[NBD_REQUEST_SIZE];
848 uint32_t magic;
849 ssize_t ret;
851 ret = read_sync(csock, buf, sizeof(buf));
852 if (ret < 0) {
853 return ret;
856 if (ret != sizeof(buf)) {
857 LOG("read failed");
858 return -EINVAL;
861 /* Request
862 [ 0 .. 3] magic (NBD_REQUEST_MAGIC)
863 [ 4 .. 7] type (0 == READ, 1 == WRITE)
864 [ 8 .. 15] handle
865 [16 .. 23] from
866 [24 .. 27] len
869 magic = be32_to_cpup((uint32_t*)buf);
870 request->type = be32_to_cpup((uint32_t*)(buf + 4));
871 request->handle = be64_to_cpup((uint64_t*)(buf + 8));
872 request->from = be64_to_cpup((uint64_t*)(buf + 16));
873 request->len = be32_to_cpup((uint32_t*)(buf + 24));
875 TRACE("Got request: "
876 "{ magic = 0x%x, .type = %d, from = %" PRIu64" , len = %u }",
877 magic, request->type, request->from, request->len);
879 if (magic != NBD_REQUEST_MAGIC) {
880 LOG("invalid magic (got 0x%x)", magic);
881 return -EINVAL;
883 return 0;
886 ssize_t nbd_receive_reply(int csock, struct nbd_reply *reply)
888 uint8_t buf[NBD_REPLY_SIZE];
889 uint32_t magic;
890 ssize_t ret;
892 ret = read_sync(csock, buf, sizeof(buf));
893 if (ret < 0) {
894 return ret;
897 if (ret != sizeof(buf)) {
898 LOG("read failed");
899 return -EINVAL;
902 /* Reply
903 [ 0 .. 3] magic (NBD_REPLY_MAGIC)
904 [ 4 .. 7] error (0 == no error)
905 [ 7 .. 15] handle
908 magic = be32_to_cpup((uint32_t*)buf);
909 reply->error = be32_to_cpup((uint32_t*)(buf + 4));
910 reply->handle = be64_to_cpup((uint64_t*)(buf + 8));
912 reply->error = nbd_errno_to_system_errno(reply->error);
914 TRACE("Got reply: "
915 "{ magic = 0x%x, .error = %d, handle = %" PRIu64" }",
916 magic, reply->error, reply->handle);
918 if (magic != NBD_REPLY_MAGIC) {
919 LOG("invalid magic (got 0x%x)", magic);
920 return -EINVAL;
922 return 0;
925 static ssize_t nbd_send_reply(int csock, struct nbd_reply *reply)
927 uint8_t buf[NBD_REPLY_SIZE];
928 ssize_t ret;
930 reply->error = system_errno_to_nbd_errno(reply->error);
932 /* Reply
933 [ 0 .. 3] magic (NBD_REPLY_MAGIC)
934 [ 4 .. 7] error (0 == no error)
935 [ 7 .. 15] handle
937 cpu_to_be32w((uint32_t*)buf, NBD_REPLY_MAGIC);
938 cpu_to_be32w((uint32_t*)(buf + 4), reply->error);
939 cpu_to_be64w((uint64_t*)(buf + 8), reply->handle);
941 TRACE("Sending response to client");
943 ret = write_sync(csock, buf, sizeof(buf));
944 if (ret < 0) {
945 return ret;
948 if (ret != sizeof(buf)) {
949 LOG("writing to socket failed");
950 return -EINVAL;
952 return 0;
955 #define MAX_NBD_REQUESTS 16
957 void nbd_client_get(NBDClient *client)
959 client->refcount++;
962 void nbd_client_put(NBDClient *client)
964 if (--client->refcount == 0) {
965 /* The last reference should be dropped by client->close,
966 * which is called by client_close.
968 assert(client->closing);
970 nbd_unset_handlers(client);
971 close(client->sock);
972 client->sock = -1;
973 if (client->exp) {
974 QTAILQ_REMOVE(&client->exp->clients, client, next);
975 nbd_export_put(client->exp);
977 g_free(client);
981 static void client_close(NBDClient *client)
983 if (client->closing) {
984 return;
987 client->closing = true;
989 /* Force requests to finish. They will drop their own references,
990 * then we'll close the socket and free the NBDClient.
992 shutdown(client->sock, 2);
994 /* Also tell the client, so that they release their reference. */
995 if (client->close) {
996 client->close(client);
1000 static NBDRequest *nbd_request_get(NBDClient *client)
1002 NBDRequest *req;
1004 assert(client->nb_requests <= MAX_NBD_REQUESTS - 1);
1005 client->nb_requests++;
1006 nbd_update_can_read(client);
1008 req = g_slice_new0(NBDRequest);
1009 nbd_client_get(client);
1010 req->client = client;
1011 return req;
1014 static void nbd_request_put(NBDRequest *req)
1016 NBDClient *client = req->client;
1018 if (req->data) {
1019 qemu_vfree(req->data);
1021 g_slice_free(NBDRequest, req);
1023 client->nb_requests--;
1024 nbd_update_can_read(client);
1025 nbd_client_put(client);
1028 static void blk_aio_attached(AioContext *ctx, void *opaque)
1030 NBDExport *exp = opaque;
1031 NBDClient *client;
1033 TRACE("Export %s: Attaching clients to AIO context %p\n", exp->name, ctx);
1035 exp->ctx = ctx;
1037 QTAILQ_FOREACH(client, &exp->clients, next) {
1038 nbd_set_handlers(client);
1042 static void blk_aio_detach(void *opaque)
1044 NBDExport *exp = opaque;
1045 NBDClient *client;
1047 TRACE("Export %s: Detaching clients from AIO context %p\n", exp->name, exp->ctx);
1049 QTAILQ_FOREACH(client, &exp->clients, next) {
1050 nbd_unset_handlers(client);
1053 exp->ctx = NULL;
1056 NBDExport *nbd_export_new(BlockBackend *blk, off_t dev_offset, off_t size,
1057 uint32_t nbdflags, void (*close)(NBDExport *),
1058 Error **errp)
1060 NBDExport *exp = g_malloc0(sizeof(NBDExport));
1061 exp->refcount = 1;
1062 QTAILQ_INIT(&exp->clients);
1063 exp->blk = blk;
1064 exp->dev_offset = dev_offset;
1065 exp->nbdflags = nbdflags;
1066 exp->size = size < 0 ? blk_getlength(blk) : size;
1067 if (exp->size < 0) {
1068 error_setg_errno(errp, -exp->size,
1069 "Failed to determine the NBD export's length");
1070 goto fail;
1072 exp->size -= exp->size % BDRV_SECTOR_SIZE;
1074 exp->close = close;
1075 exp->ctx = blk_get_aio_context(blk);
1076 blk_ref(blk);
1077 blk_add_aio_context_notifier(blk, blk_aio_attached, blk_aio_detach, exp);
1079 * NBD exports are used for non-shared storage migration. Make sure
1080 * that BDRV_O_INCOMING is cleared and the image is ready for write
1081 * access since the export could be available before migration handover.
1083 blk_invalidate_cache(blk, NULL);
1084 return exp;
1086 fail:
1087 g_free(exp);
1088 return NULL;
1091 NBDExport *nbd_export_find(const char *name)
1093 NBDExport *exp;
1094 QTAILQ_FOREACH(exp, &exports, next) {
1095 if (strcmp(name, exp->name) == 0) {
1096 return exp;
1100 return NULL;
1103 void nbd_export_set_name(NBDExport *exp, const char *name)
1105 if (exp->name == name) {
1106 return;
1109 nbd_export_get(exp);
1110 if (exp->name != NULL) {
1111 g_free(exp->name);
1112 exp->name = NULL;
1113 QTAILQ_REMOVE(&exports, exp, next);
1114 nbd_export_put(exp);
1116 if (name != NULL) {
1117 nbd_export_get(exp);
1118 exp->name = g_strdup(name);
1119 QTAILQ_INSERT_TAIL(&exports, exp, next);
1121 nbd_export_put(exp);
1124 void nbd_export_close(NBDExport *exp)
1126 NBDClient *client, *next;
1128 nbd_export_get(exp);
1129 QTAILQ_FOREACH_SAFE(client, &exp->clients, next, next) {
1130 client_close(client);
1132 nbd_export_set_name(exp, NULL);
1133 nbd_export_put(exp);
1134 if (exp->blk) {
1135 blk_remove_aio_context_notifier(exp->blk, blk_aio_attached,
1136 blk_aio_detach, exp);
1137 blk_unref(exp->blk);
1138 exp->blk = NULL;
1142 void nbd_export_get(NBDExport *exp)
1144 assert(exp->refcount > 0);
1145 exp->refcount++;
1148 void nbd_export_put(NBDExport *exp)
1150 assert(exp->refcount > 0);
1151 if (exp->refcount == 1) {
1152 nbd_export_close(exp);
1155 if (--exp->refcount == 0) {
1156 assert(exp->name == NULL);
1158 if (exp->close) {
1159 exp->close(exp);
1162 g_free(exp);
1166 BlockBackend *nbd_export_get_blockdev(NBDExport *exp)
1168 return exp->blk;
1171 void nbd_export_close_all(void)
1173 NBDExport *exp, *next;
1175 QTAILQ_FOREACH_SAFE(exp, &exports, next, next) {
1176 nbd_export_close(exp);
1180 static ssize_t nbd_co_send_reply(NBDRequest *req, struct nbd_reply *reply,
1181 int len)
1183 NBDClient *client = req->client;
1184 int csock = client->sock;
1185 ssize_t rc, ret;
1187 qemu_co_mutex_lock(&client->send_lock);
1188 client->send_coroutine = qemu_coroutine_self();
1189 nbd_set_handlers(client);
1191 if (!len) {
1192 rc = nbd_send_reply(csock, reply);
1193 } else {
1194 socket_set_cork(csock, 1);
1195 rc = nbd_send_reply(csock, reply);
1196 if (rc >= 0) {
1197 ret = qemu_co_send(csock, req->data, len);
1198 if (ret != len) {
1199 rc = -EIO;
1202 socket_set_cork(csock, 0);
1205 client->send_coroutine = NULL;
1206 nbd_set_handlers(client);
1207 qemu_co_mutex_unlock(&client->send_lock);
1208 return rc;
1211 static ssize_t nbd_co_receive_request(NBDRequest *req, struct nbd_request *request)
1213 NBDClient *client = req->client;
1214 int csock = client->sock;
1215 uint32_t command;
1216 ssize_t rc;
1218 client->recv_coroutine = qemu_coroutine_self();
1219 nbd_update_can_read(client);
1221 rc = nbd_receive_request(csock, request);
1222 if (rc < 0) {
1223 if (rc != -EAGAIN) {
1224 rc = -EIO;
1226 goto out;
1229 if (request->len > NBD_MAX_BUFFER_SIZE) {
1230 LOG("len (%u) is larger than max len (%u)",
1231 request->len, NBD_MAX_BUFFER_SIZE);
1232 rc = -EINVAL;
1233 goto out;
1236 if ((request->from + request->len) < request->from) {
1237 LOG("integer overflow detected! "
1238 "you're probably being attacked");
1239 rc = -EINVAL;
1240 goto out;
1243 TRACE("Decoding type");
1245 command = request->type & NBD_CMD_MASK_COMMAND;
1246 if (command == NBD_CMD_READ || command == NBD_CMD_WRITE) {
1247 req->data = blk_blockalign(client->exp->blk, request->len);
1249 if (command == NBD_CMD_WRITE) {
1250 TRACE("Reading %u byte(s)", request->len);
1252 if (qemu_co_recv(csock, req->data, request->len) != request->len) {
1253 LOG("reading from socket failed");
1254 rc = -EIO;
1255 goto out;
1258 rc = 0;
1260 out:
1261 client->recv_coroutine = NULL;
1262 nbd_update_can_read(client);
1264 return rc;
1267 static void nbd_trip(void *opaque)
1269 NBDClient *client = opaque;
1270 NBDExport *exp = client->exp;
1271 NBDRequest *req;
1272 struct nbd_request request;
1273 struct nbd_reply reply;
1274 ssize_t ret;
1275 uint32_t command;
1277 TRACE("Reading request.");
1278 if (client->closing) {
1279 return;
1282 req = nbd_request_get(client);
1283 ret = nbd_co_receive_request(req, &request);
1284 if (ret == -EAGAIN) {
1285 goto done;
1287 if (ret == -EIO) {
1288 goto out;
1291 reply.handle = request.handle;
1292 reply.error = 0;
1294 if (ret < 0) {
1295 reply.error = -ret;
1296 goto error_reply;
1298 command = request.type & NBD_CMD_MASK_COMMAND;
1299 if (command != NBD_CMD_DISC && (request.from + request.len) > exp->size) {
1300 LOG("From: %" PRIu64 ", Len: %u, Size: %" PRIu64
1301 ", Offset: %" PRIu64 "\n",
1302 request.from, request.len,
1303 (uint64_t)exp->size, (uint64_t)exp->dev_offset);
1304 LOG("requested operation past EOF--bad client?");
1305 goto invalid_request;
1308 switch (command) {
1309 case NBD_CMD_READ:
1310 TRACE("Request type is READ");
1312 if (request.type & NBD_CMD_FLAG_FUA) {
1313 ret = blk_co_flush(exp->blk);
1314 if (ret < 0) {
1315 LOG("flush failed");
1316 reply.error = -ret;
1317 goto error_reply;
1321 ret = blk_read(exp->blk,
1322 (request.from + exp->dev_offset) / BDRV_SECTOR_SIZE,
1323 req->data, request.len / BDRV_SECTOR_SIZE);
1324 if (ret < 0) {
1325 LOG("reading from file failed");
1326 reply.error = -ret;
1327 goto error_reply;
1330 TRACE("Read %u byte(s)", request.len);
1331 if (nbd_co_send_reply(req, &reply, request.len) < 0)
1332 goto out;
1333 break;
1334 case NBD_CMD_WRITE:
1335 TRACE("Request type is WRITE");
1337 if (exp->nbdflags & NBD_FLAG_READ_ONLY) {
1338 TRACE("Server is read-only, return error");
1339 reply.error = EROFS;
1340 goto error_reply;
1343 TRACE("Writing to device");
1345 ret = blk_write(exp->blk,
1346 (request.from + exp->dev_offset) / BDRV_SECTOR_SIZE,
1347 req->data, request.len / BDRV_SECTOR_SIZE);
1348 if (ret < 0) {
1349 LOG("writing to file failed");
1350 reply.error = -ret;
1351 goto error_reply;
1354 if (request.type & NBD_CMD_FLAG_FUA) {
1355 ret = blk_co_flush(exp->blk);
1356 if (ret < 0) {
1357 LOG("flush failed");
1358 reply.error = -ret;
1359 goto error_reply;
1363 if (nbd_co_send_reply(req, &reply, 0) < 0) {
1364 goto out;
1366 break;
1367 case NBD_CMD_DISC:
1368 TRACE("Request type is DISCONNECT");
1369 errno = 0;
1370 goto out;
1371 case NBD_CMD_FLUSH:
1372 TRACE("Request type is FLUSH");
1374 ret = blk_co_flush(exp->blk);
1375 if (ret < 0) {
1376 LOG("flush failed");
1377 reply.error = -ret;
1379 if (nbd_co_send_reply(req, &reply, 0) < 0) {
1380 goto out;
1382 break;
1383 case NBD_CMD_TRIM:
1384 TRACE("Request type is TRIM");
1385 ret = blk_co_discard(exp->blk, (request.from + exp->dev_offset)
1386 / BDRV_SECTOR_SIZE,
1387 request.len / BDRV_SECTOR_SIZE);
1388 if (ret < 0) {
1389 LOG("discard failed");
1390 reply.error = -ret;
1392 if (nbd_co_send_reply(req, &reply, 0) < 0) {
1393 goto out;
1395 break;
1396 default:
1397 LOG("invalid request type (%u) received", request.type);
1398 invalid_request:
1399 reply.error = EINVAL;
1400 error_reply:
1401 if (nbd_co_send_reply(req, &reply, 0) < 0) {
1402 goto out;
1404 break;
1407 TRACE("Request/Reply complete");
1409 done:
1410 nbd_request_put(req);
1411 return;
1413 out:
1414 nbd_request_put(req);
1415 client_close(client);
1418 static void nbd_read(void *opaque)
1420 NBDClient *client = opaque;
1422 if (client->recv_coroutine) {
1423 qemu_coroutine_enter(client->recv_coroutine, NULL);
1424 } else {
1425 qemu_coroutine_enter(qemu_coroutine_create(nbd_trip), client);
1429 static void nbd_restart_write(void *opaque)
1431 NBDClient *client = opaque;
1433 qemu_coroutine_enter(client->send_coroutine, NULL);
1436 static void nbd_set_handlers(NBDClient *client)
1438 if (client->exp && client->exp->ctx) {
1439 aio_set_fd_handler(client->exp->ctx, client->sock,
1440 client->can_read ? nbd_read : NULL,
1441 client->send_coroutine ? nbd_restart_write : NULL,
1442 client);
1446 static void nbd_unset_handlers(NBDClient *client)
1448 if (client->exp && client->exp->ctx) {
1449 aio_set_fd_handler(client->exp->ctx, client->sock, NULL, NULL, NULL);
1453 static void nbd_update_can_read(NBDClient *client)
1455 bool can_read = client->recv_coroutine ||
1456 client->nb_requests < MAX_NBD_REQUESTS;
1458 if (can_read != client->can_read) {
1459 client->can_read = can_read;
1460 nbd_set_handlers(client);
1462 /* There is no need to invoke aio_notify(), since aio_set_fd_handler()
1463 * in nbd_set_handlers() will have taken care of that */
1467 NBDClient *nbd_client_new(NBDExport *exp, int csock,
1468 void (*close)(NBDClient *))
1470 NBDClient *client;
1471 client = g_malloc0(sizeof(NBDClient));
1472 client->refcount = 1;
1473 client->exp = exp;
1474 client->sock = csock;
1475 client->can_read = true;
1476 if (nbd_send_negotiate(client)) {
1477 g_free(client);
1478 return NULL;
1480 client->close = close;
1481 qemu_co_mutex_init(&client->send_lock);
1482 nbd_set_handlers(client);
1484 if (exp) {
1485 QTAILQ_INSERT_TAIL(&exp->clients, client, next);
1486 nbd_export_get(exp);
1488 return client;