2 * QEMU Block driver for NBD
4 * Copyright (c) 2019 Virtuozzo International GmbH.
5 * Copyright (C) 2016 Red Hat, Inc.
6 * Copyright (C) 2008 Bull S.A.S.
7 * Author: Laurent Vivier <Laurent.Vivier@bull.net>
10 * Copyright (C) 2007 Anthony Liguori <anthony@codemonkey.ws>
12 * Permission is hereby granted, free of charge, to any person obtaining a copy
13 * of this software and associated documentation files (the "Software"), to deal
14 * in the Software without restriction, including without limitation the rights
15 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
16 * copies of the Software, and to permit persons to whom the Software is
17 * furnished to do so, subject to the following conditions:
19 * The above copyright notice and this permission notice shall be included in
20 * all copies or substantial portions of the Software.
22 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
23 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
24 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
25 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
26 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
27 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
31 #include "qemu/osdep.h"
35 #include "qemu/option.h"
36 #include "qemu/cutils.h"
37 #include "qemu/main-loop.h"
39 #include "qapi/qapi-visit-sockets.h"
40 #include "qapi/qmp/qstring.h"
42 #include "block/qdict.h"
43 #include "block/nbd.h"
44 #include "block/block_int.h"
46 #define EN_OPTSTR ":exportname="
47 #define MAX_NBD_REQUESTS 16
49 #define HANDLE_TO_INDEX(bs, handle) ((handle) ^ (uint64_t)(intptr_t)(bs))
50 #define INDEX_TO_HANDLE(bs, index) ((index) ^ (uint64_t)(intptr_t)(bs))
54 uint64_t offset
; /* original offset of the request */
55 bool receiving
; /* waiting for connection_co? */
58 typedef enum NBDClientState
{
59 NBD_CLIENT_CONNECTING_WAIT
,
60 NBD_CLIENT_CONNECTING_NOWAIT
,
65 typedef struct BDRVNBDState
{
66 QIOChannelSocket
*sioc
; /* The master data channel */
67 QIOChannel
*ioc
; /* The current I/O channel which may differ (eg TLS) */
72 Coroutine
*connection_co
;
73 QemuCoSleepState
*connection_co_sleep_ns_state
;
75 bool wait_drained_end
;
82 NBDClientRequest requests
[MAX_NBD_REQUESTS
];
86 /* Connection parameters */
87 uint32_t reconnect_delay
;
89 char *export
, *tlscredsid
;
90 QCryptoTLSCreds
*tlscreds
;
95 static int nbd_client_connect(BlockDriverState
*bs
, Error
**errp
);
97 static void nbd_channel_error(BDRVNBDState
*s
, int ret
)
100 if (s
->state
== NBD_CLIENT_CONNECTED
) {
101 s
->state
= s
->reconnect_delay
? NBD_CLIENT_CONNECTING_WAIT
:
102 NBD_CLIENT_CONNECTING_NOWAIT
;
105 if (s
->state
== NBD_CLIENT_CONNECTED
) {
106 qio_channel_shutdown(s
->ioc
, QIO_CHANNEL_SHUTDOWN_BOTH
, NULL
);
108 s
->state
= NBD_CLIENT_QUIT
;
112 static void nbd_recv_coroutines_wake_all(BDRVNBDState
*s
)
116 for (i
= 0; i
< MAX_NBD_REQUESTS
; i
++) {
117 NBDClientRequest
*req
= &s
->requests
[i
];
119 if (req
->coroutine
&& req
->receiving
) {
120 aio_co_wake(req
->coroutine
);
125 static void nbd_client_detach_aio_context(BlockDriverState
*bs
)
127 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
129 qio_channel_detach_aio_context(QIO_CHANNEL(s
->ioc
));
132 static void nbd_client_attach_aio_context_bh(void *opaque
)
134 BlockDriverState
*bs
= opaque
;
135 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
138 * The node is still drained, so we know the coroutine has yielded in
139 * nbd_read_eof(), the only place where bs->in_flight can reach 0, or it is
140 * entered for the first time. Both places are safe for entering the
143 qemu_aio_coroutine_enter(bs
->aio_context
, s
->connection_co
);
144 bdrv_dec_in_flight(bs
);
147 static void nbd_client_attach_aio_context(BlockDriverState
*bs
,
148 AioContext
*new_context
)
150 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
153 * s->connection_co is either yielded from nbd_receive_reply or from
154 * nbd_co_reconnect_loop()
156 if (s
->state
== NBD_CLIENT_CONNECTED
) {
157 qio_channel_attach_aio_context(QIO_CHANNEL(s
->ioc
), new_context
);
160 bdrv_inc_in_flight(bs
);
163 * Need to wait here for the BH to run because the BH must run while the
164 * node is still drained.
166 aio_wait_bh_oneshot(new_context
, nbd_client_attach_aio_context_bh
, bs
);
169 static void coroutine_fn
nbd_client_co_drain_begin(BlockDriverState
*bs
)
171 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
174 if (s
->connection_co_sleep_ns_state
) {
175 qemu_co_sleep_wake(s
->connection_co_sleep_ns_state
);
179 static void coroutine_fn
nbd_client_co_drain_end(BlockDriverState
*bs
)
181 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
184 if (s
->wait_drained_end
) {
185 s
->wait_drained_end
= false;
186 aio_co_wake(s
->connection_co
);
191 static void nbd_teardown_connection(BlockDriverState
*bs
)
193 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
195 if (s
->state
== NBD_CLIENT_CONNECTED
) {
196 /* finish any pending coroutines */
198 qio_channel_shutdown(s
->ioc
, QIO_CHANNEL_SHUTDOWN_BOTH
, NULL
);
200 s
->state
= NBD_CLIENT_QUIT
;
201 if (s
->connection_co
) {
202 if (s
->connection_co_sleep_ns_state
) {
203 qemu_co_sleep_wake(s
->connection_co_sleep_ns_state
);
206 BDRV_POLL_WHILE(bs
, s
->connection_co
);
209 static bool nbd_client_connecting(BDRVNBDState
*s
)
211 return s
->state
== NBD_CLIENT_CONNECTING_WAIT
||
212 s
->state
== NBD_CLIENT_CONNECTING_NOWAIT
;
215 static bool nbd_client_connecting_wait(BDRVNBDState
*s
)
217 return s
->state
== NBD_CLIENT_CONNECTING_WAIT
;
220 static coroutine_fn
void nbd_reconnect_attempt(BDRVNBDState
*s
)
222 Error
*local_err
= NULL
;
224 if (!nbd_client_connecting(s
)) {
228 /* Wait for completion of all in-flight requests */
230 qemu_co_mutex_lock(&s
->send_mutex
);
232 while (s
->in_flight
> 0) {
233 qemu_co_mutex_unlock(&s
->send_mutex
);
234 nbd_recv_coroutines_wake_all(s
);
235 s
->wait_in_flight
= true;
236 qemu_coroutine_yield();
237 s
->wait_in_flight
= false;
238 qemu_co_mutex_lock(&s
->send_mutex
);
241 qemu_co_mutex_unlock(&s
->send_mutex
);
243 if (!nbd_client_connecting(s
)) {
248 * Now we are sure that nobody is accessing the channel, and no one will
249 * try until we set the state to CONNECTED.
252 /* Finalize previous connection if any */
254 nbd_client_detach_aio_context(s
->bs
);
255 object_unref(OBJECT(s
->sioc
));
257 object_unref(OBJECT(s
->ioc
));
261 s
->connect_status
= nbd_client_connect(s
->bs
, &local_err
);
262 error_free(s
->connect_err
);
263 s
->connect_err
= NULL
;
264 error_propagate(&s
->connect_err
, local_err
);
266 if (s
->connect_status
< 0) {
271 /* successfully connected */
272 s
->state
= NBD_CLIENT_CONNECTED
;
273 qemu_co_queue_restart_all(&s
->free_sema
);
276 static coroutine_fn
void nbd_co_reconnect_loop(BDRVNBDState
*s
)
278 uint64_t start_time_ns
= qemu_clock_get_ns(QEMU_CLOCK_REALTIME
);
279 uint64_t delay_ns
= s
->reconnect_delay
* NANOSECONDS_PER_SECOND
;
280 uint64_t timeout
= 1 * NANOSECONDS_PER_SECOND
;
281 uint64_t max_timeout
= 16 * NANOSECONDS_PER_SECOND
;
283 nbd_reconnect_attempt(s
);
285 while (nbd_client_connecting(s
)) {
286 if (s
->state
== NBD_CLIENT_CONNECTING_WAIT
&&
287 qemu_clock_get_ns(QEMU_CLOCK_REALTIME
) - start_time_ns
> delay_ns
)
289 s
->state
= NBD_CLIENT_CONNECTING_NOWAIT
;
290 qemu_co_queue_restart_all(&s
->free_sema
);
293 qemu_co_sleep_ns_wakeable(QEMU_CLOCK_REALTIME
, timeout
,
294 &s
->connection_co_sleep_ns_state
);
296 bdrv_dec_in_flight(s
->bs
);
297 s
->wait_drained_end
= true;
300 * We may be entered once from nbd_client_attach_aio_context_bh
301 * and then from nbd_client_co_drain_end. So here is a loop.
303 qemu_coroutine_yield();
305 bdrv_inc_in_flight(s
->bs
);
307 if (timeout
< max_timeout
) {
311 nbd_reconnect_attempt(s
);
315 static coroutine_fn
void nbd_connection_entry(void *opaque
)
317 BDRVNBDState
*s
= opaque
;
320 Error
*local_err
= NULL
;
322 while (s
->state
!= NBD_CLIENT_QUIT
) {
324 * The NBD client can only really be considered idle when it has
325 * yielded from qio_channel_readv_all_eof(), waiting for data. This is
326 * the point where the additional scheduled coroutine entry happens
327 * after nbd_client_attach_aio_context().
329 * Therefore we keep an additional in_flight reference all the time and
330 * only drop it temporarily here.
333 if (nbd_client_connecting(s
)) {
334 nbd_co_reconnect_loop(s
);
337 if (s
->state
!= NBD_CLIENT_CONNECTED
) {
341 assert(s
->reply
.handle
== 0);
342 ret
= nbd_receive_reply(s
->bs
, s
->ioc
, &s
->reply
, &local_err
);
345 trace_nbd_read_reply_entry_fail(ret
, error_get_pretty(local_err
));
346 error_free(local_err
);
350 nbd_channel_error(s
, ret
? ret
: -EIO
);
355 * There's no need for a mutex on the receive side, because the
356 * handler acts as a synchronization point and ensures that only
357 * one coroutine is called until the reply finishes.
359 i
= HANDLE_TO_INDEX(s
, s
->reply
.handle
);
360 if (i
>= MAX_NBD_REQUESTS
||
361 !s
->requests
[i
].coroutine
||
362 !s
->requests
[i
].receiving
||
363 (nbd_reply_is_structured(&s
->reply
) && !s
->info
.structured_reply
))
365 nbd_channel_error(s
, -EINVAL
);
370 * We're woken up again by the request itself. Note that there
371 * is no race between yielding and reentering connection_co. This
374 * - if the request runs on the same AioContext, it is only
375 * entered after we yield
377 * - if the request runs on a different AioContext, reentering
378 * connection_co happens through a bottom half, which can only
379 * run after we yield.
381 aio_co_wake(s
->requests
[i
].coroutine
);
382 qemu_coroutine_yield();
385 qemu_co_queue_restart_all(&s
->free_sema
);
386 nbd_recv_coroutines_wake_all(s
);
387 bdrv_dec_in_flight(s
->bs
);
389 s
->connection_co
= NULL
;
391 nbd_client_detach_aio_context(s
->bs
);
392 object_unref(OBJECT(s
->sioc
));
394 object_unref(OBJECT(s
->ioc
));
401 static int nbd_co_send_request(BlockDriverState
*bs
,
405 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
408 qemu_co_mutex_lock(&s
->send_mutex
);
409 while (s
->in_flight
== MAX_NBD_REQUESTS
|| nbd_client_connecting_wait(s
)) {
410 qemu_co_queue_wait(&s
->free_sema
, &s
->send_mutex
);
413 if (s
->state
!= NBD_CLIENT_CONNECTED
) {
420 for (i
= 0; i
< MAX_NBD_REQUESTS
; i
++) {
421 if (s
->requests
[i
].coroutine
== NULL
) {
426 g_assert(qemu_in_coroutine());
427 assert(i
< MAX_NBD_REQUESTS
);
429 s
->requests
[i
].coroutine
= qemu_coroutine_self();
430 s
->requests
[i
].offset
= request
->from
;
431 s
->requests
[i
].receiving
= false;
433 request
->handle
= INDEX_TO_HANDLE(s
, i
);
438 qio_channel_set_cork(s
->ioc
, true);
439 rc
= nbd_send_request(s
->ioc
, request
);
440 if (rc
>= 0 && s
->state
== NBD_CLIENT_CONNECTED
) {
441 if (qio_channel_writev_all(s
->ioc
, qiov
->iov
, qiov
->niov
,
445 } else if (rc
>= 0) {
448 qio_channel_set_cork(s
->ioc
, false);
450 rc
= nbd_send_request(s
->ioc
, request
);
455 nbd_channel_error(s
, rc
);
457 s
->requests
[i
].coroutine
= NULL
;
460 if (s
->in_flight
== 0 && s
->wait_in_flight
) {
461 aio_co_wake(s
->connection_co
);
463 qemu_co_queue_next(&s
->free_sema
);
466 qemu_co_mutex_unlock(&s
->send_mutex
);
470 static inline uint16_t payload_advance16(uint8_t **payload
)
473 return lduw_be_p(*payload
- 2);
476 static inline uint32_t payload_advance32(uint8_t **payload
)
479 return ldl_be_p(*payload
- 4);
482 static inline uint64_t payload_advance64(uint8_t **payload
)
485 return ldq_be_p(*payload
- 8);
488 static int nbd_parse_offset_hole_payload(BDRVNBDState
*s
,
489 NBDStructuredReplyChunk
*chunk
,
490 uint8_t *payload
, uint64_t orig_offset
,
491 QEMUIOVector
*qiov
, Error
**errp
)
496 if (chunk
->length
!= sizeof(offset
) + sizeof(hole_size
)) {
497 error_setg(errp
, "Protocol error: invalid payload for "
498 "NBD_REPLY_TYPE_OFFSET_HOLE");
502 offset
= payload_advance64(&payload
);
503 hole_size
= payload_advance32(&payload
);
505 if (!hole_size
|| offset
< orig_offset
|| hole_size
> qiov
->size
||
506 offset
> orig_offset
+ qiov
->size
- hole_size
) {
507 error_setg(errp
, "Protocol error: server sent chunk exceeding requested"
511 if (s
->info
.min_block
&&
512 !QEMU_IS_ALIGNED(hole_size
, s
->info
.min_block
)) {
513 trace_nbd_structured_read_compliance("hole");
516 qemu_iovec_memset(qiov
, offset
- orig_offset
, 0, hole_size
);
522 * nbd_parse_blockstatus_payload
523 * Based on our request, we expect only one extent in reply, for the
524 * base:allocation context.
526 static int nbd_parse_blockstatus_payload(BDRVNBDState
*s
,
527 NBDStructuredReplyChunk
*chunk
,
528 uint8_t *payload
, uint64_t orig_length
,
529 NBDExtent
*extent
, Error
**errp
)
533 /* The server succeeded, so it must have sent [at least] one extent */
534 if (chunk
->length
< sizeof(context_id
) + sizeof(*extent
)) {
535 error_setg(errp
, "Protocol error: invalid payload for "
536 "NBD_REPLY_TYPE_BLOCK_STATUS");
540 context_id
= payload_advance32(&payload
);
541 if (s
->info
.context_id
!= context_id
) {
542 error_setg(errp
, "Protocol error: unexpected context id %d for "
543 "NBD_REPLY_TYPE_BLOCK_STATUS, when negotiated context "
544 "id is %d", context_id
,
549 extent
->length
= payload_advance32(&payload
);
550 extent
->flags
= payload_advance32(&payload
);
552 if (extent
->length
== 0) {
553 error_setg(errp
, "Protocol error: server sent status chunk with "
559 * A server sending unaligned block status is in violation of the
560 * protocol, but as qemu-nbd 3.1 is such a server (at least for
561 * POSIX files that are not a multiple of 512 bytes, since qemu
562 * rounds files up to 512-byte multiples but lseek(SEEK_HOLE)
563 * still sees an implicit hole beyond the real EOF), it's nicer to
564 * work around the misbehaving server. If the request included
565 * more than the final unaligned block, truncate it back to an
566 * aligned result; if the request was only the final block, round
567 * up to the full block and change the status to fully-allocated
568 * (always a safe status, even if it loses information).
570 if (s
->info
.min_block
&& !QEMU_IS_ALIGNED(extent
->length
,
571 s
->info
.min_block
)) {
572 trace_nbd_parse_blockstatus_compliance("extent length is unaligned");
573 if (extent
->length
> s
->info
.min_block
) {
574 extent
->length
= QEMU_ALIGN_DOWN(extent
->length
,
577 extent
->length
= s
->info
.min_block
;
583 * We used NBD_CMD_FLAG_REQ_ONE, so the server should not have
584 * sent us any more than one extent, nor should it have included
585 * status beyond our request in that extent. However, it's easy
586 * enough to ignore the server's noncompliance without killing the
587 * connection; just ignore trailing extents, and clamp things to
588 * the length of our request.
590 if (chunk
->length
> sizeof(context_id
) + sizeof(*extent
)) {
591 trace_nbd_parse_blockstatus_compliance("more than one extent");
593 if (extent
->length
> orig_length
) {
594 extent
->length
= orig_length
;
595 trace_nbd_parse_blockstatus_compliance("extent length too large");
602 * nbd_parse_error_payload
603 * on success @errp contains message describing nbd error reply
605 static int nbd_parse_error_payload(NBDStructuredReplyChunk
*chunk
,
606 uint8_t *payload
, int *request_ret
,
610 uint16_t message_size
;
612 assert(chunk
->type
& (1 << 15));
614 if (chunk
->length
< sizeof(error
) + sizeof(message_size
)) {
616 "Protocol error: invalid payload for structured error");
620 error
= nbd_errno_to_system_errno(payload_advance32(&payload
));
622 error_setg(errp
, "Protocol error: server sent structured error chunk "
627 *request_ret
= -error
;
628 message_size
= payload_advance16(&payload
);
630 if (message_size
> chunk
->length
- sizeof(error
) - sizeof(message_size
)) {
631 error_setg(errp
, "Protocol error: server sent structured error chunk "
632 "with incorrect message size");
636 /* TODO: Add a trace point to mention the server complaint */
638 /* TODO handle ERROR_OFFSET */
643 static int nbd_co_receive_offset_data_payload(BDRVNBDState
*s
,
644 uint64_t orig_offset
,
645 QEMUIOVector
*qiov
, Error
**errp
)
647 QEMUIOVector sub_qiov
;
651 NBDStructuredReplyChunk
*chunk
= &s
->reply
.structured
;
653 assert(nbd_reply_is_structured(&s
->reply
));
655 /* The NBD spec requires at least one byte of payload */
656 if (chunk
->length
<= sizeof(offset
)) {
657 error_setg(errp
, "Protocol error: invalid payload for "
658 "NBD_REPLY_TYPE_OFFSET_DATA");
662 if (nbd_read64(s
->ioc
, &offset
, "OFFSET_DATA offset", errp
) < 0) {
666 data_size
= chunk
->length
- sizeof(offset
);
668 if (offset
< orig_offset
|| data_size
> qiov
->size
||
669 offset
> orig_offset
+ qiov
->size
- data_size
) {
670 error_setg(errp
, "Protocol error: server sent chunk exceeding requested"
674 if (s
->info
.min_block
&& !QEMU_IS_ALIGNED(data_size
, s
->info
.min_block
)) {
675 trace_nbd_structured_read_compliance("data");
678 qemu_iovec_init(&sub_qiov
, qiov
->niov
);
679 qemu_iovec_concat(&sub_qiov
, qiov
, offset
- orig_offset
, data_size
);
680 ret
= qio_channel_readv_all(s
->ioc
, sub_qiov
.iov
, sub_qiov
.niov
, errp
);
681 qemu_iovec_destroy(&sub_qiov
);
683 return ret
< 0 ? -EIO
: 0;
686 #define NBD_MAX_MALLOC_PAYLOAD 1000
687 static coroutine_fn
int nbd_co_receive_structured_payload(
688 BDRVNBDState
*s
, void **payload
, Error
**errp
)
693 assert(nbd_reply_is_structured(&s
->reply
));
695 len
= s
->reply
.structured
.length
;
701 if (payload
== NULL
) {
702 error_setg(errp
, "Unexpected structured payload");
706 if (len
> NBD_MAX_MALLOC_PAYLOAD
) {
707 error_setg(errp
, "Payload too large");
711 *payload
= g_new(char, len
);
712 ret
= nbd_read(s
->ioc
, *payload
, len
, "structured payload", errp
);
723 * nbd_co_do_receive_one_chunk
725 * set request_ret to received reply error
726 * if qiov is not NULL: read payload to @qiov
727 * for structured reply chunk:
728 * if error chunk: read payload, set @request_ret, do not set @payload
729 * else if offset_data chunk: read payload data to @qiov, do not set @payload
730 * else: read payload to @payload
732 * If function fails, @errp contains corresponding error message, and the
733 * connection with the server is suspect. If it returns 0, then the
734 * transaction succeeded (although @request_ret may be a negative errno
735 * corresponding to the server's error reply), and errp is unchanged.
737 static coroutine_fn
int nbd_co_do_receive_one_chunk(
738 BDRVNBDState
*s
, uint64_t handle
, bool only_structured
,
739 int *request_ret
, QEMUIOVector
*qiov
, void **payload
, Error
**errp
)
742 int i
= HANDLE_TO_INDEX(s
, handle
);
743 void *local_payload
= NULL
;
744 NBDStructuredReplyChunk
*chunk
;
751 /* Wait until we're woken up by nbd_connection_entry. */
752 s
->requests
[i
].receiving
= true;
753 qemu_coroutine_yield();
754 s
->requests
[i
].receiving
= false;
755 if (s
->state
!= NBD_CLIENT_CONNECTED
) {
756 error_setg(errp
, "Connection closed");
761 assert(s
->reply
.handle
== handle
);
763 if (nbd_reply_is_simple(&s
->reply
)) {
764 if (only_structured
) {
765 error_setg(errp
, "Protocol error: simple reply when structured "
766 "reply chunk was expected");
770 *request_ret
= -nbd_errno_to_system_errno(s
->reply
.simple
.error
);
771 if (*request_ret
< 0 || !qiov
) {
775 return qio_channel_readv_all(s
->ioc
, qiov
->iov
, qiov
->niov
,
776 errp
) < 0 ? -EIO
: 0;
779 /* handle structured reply chunk */
780 assert(s
->info
.structured_reply
);
781 chunk
= &s
->reply
.structured
;
783 if (chunk
->type
== NBD_REPLY_TYPE_NONE
) {
784 if (!(chunk
->flags
& NBD_REPLY_FLAG_DONE
)) {
785 error_setg(errp
, "Protocol error: NBD_REPLY_TYPE_NONE chunk without"
786 " NBD_REPLY_FLAG_DONE flag set");
790 error_setg(errp
, "Protocol error: NBD_REPLY_TYPE_NONE chunk with"
797 if (chunk
->type
== NBD_REPLY_TYPE_OFFSET_DATA
) {
799 error_setg(errp
, "Unexpected NBD_REPLY_TYPE_OFFSET_DATA chunk");
803 return nbd_co_receive_offset_data_payload(s
, s
->requests
[i
].offset
,
807 if (nbd_reply_type_is_error(chunk
->type
)) {
808 payload
= &local_payload
;
811 ret
= nbd_co_receive_structured_payload(s
, payload
, errp
);
816 if (nbd_reply_type_is_error(chunk
->type
)) {
817 ret
= nbd_parse_error_payload(chunk
, local_payload
, request_ret
, errp
);
818 g_free(local_payload
);
826 * nbd_co_receive_one_chunk
827 * Read reply, wake up connection_co and set s->quit if needed.
828 * Return value is a fatal error code or normal nbd reply error code
830 static coroutine_fn
int nbd_co_receive_one_chunk(
831 BDRVNBDState
*s
, uint64_t handle
, bool only_structured
,
832 int *request_ret
, QEMUIOVector
*qiov
, NBDReply
*reply
, void **payload
,
835 int ret
= nbd_co_do_receive_one_chunk(s
, handle
, only_structured
,
836 request_ret
, qiov
, payload
, errp
);
839 memset(reply
, 0, sizeof(*reply
));
840 nbd_channel_error(s
, ret
);
842 /* For assert at loop start in nbd_connection_entry */
847 if (s
->connection_co
&& !s
->wait_in_flight
) {
849 * We must check s->wait_in_flight, because we may entered by
850 * nbd_recv_coroutines_wake_all(), in this case we should not
851 * wake connection_co here, it will woken by last request.
853 aio_co_wake(s
->connection_co
);
859 typedef struct NBDReplyChunkIter
{
863 bool done
, only_structured
;
866 static void nbd_iter_channel_error(NBDReplyChunkIter
*iter
,
867 int ret
, Error
**local_err
)
873 error_propagate(&iter
->err
, *local_err
);
875 error_free(*local_err
);
881 static void nbd_iter_request_error(NBDReplyChunkIter
*iter
, int ret
)
885 if (!iter
->request_ret
) {
886 iter
->request_ret
= ret
;
891 * NBD_FOREACH_REPLY_CHUNK
892 * The pointer stored in @payload requires g_free() to free it.
894 #define NBD_FOREACH_REPLY_CHUNK(s, iter, handle, structured, \
895 qiov, reply, payload) \
896 for (iter = (NBDReplyChunkIter) { .only_structured = structured }; \
897 nbd_reply_chunk_iter_receive(s, &iter, handle, qiov, reply, payload);)
900 * nbd_reply_chunk_iter_receive
901 * The pointer stored in @payload requires g_free() to free it.
903 static bool nbd_reply_chunk_iter_receive(BDRVNBDState
*s
,
904 NBDReplyChunkIter
*iter
,
906 QEMUIOVector
*qiov
, NBDReply
*reply
,
909 int ret
, request_ret
;
910 NBDReply local_reply
;
911 NBDStructuredReplyChunk
*chunk
;
912 Error
*local_err
= NULL
;
913 if (s
->state
!= NBD_CLIENT_CONNECTED
) {
914 error_setg(&local_err
, "Connection closed");
915 nbd_iter_channel_error(iter
, -EIO
, &local_err
);
920 /* Previous iteration was last. */
925 reply
= &local_reply
;
928 ret
= nbd_co_receive_one_chunk(s
, handle
, iter
->only_structured
,
929 &request_ret
, qiov
, reply
, payload
,
932 nbd_iter_channel_error(iter
, ret
, &local_err
);
933 } else if (request_ret
< 0) {
934 nbd_iter_request_error(iter
, request_ret
);
937 /* Do not execute the body of NBD_FOREACH_REPLY_CHUNK for simple reply. */
938 if (nbd_reply_is_simple(reply
) || s
->state
!= NBD_CLIENT_CONNECTED
) {
942 chunk
= &reply
->structured
;
943 iter
->only_structured
= true;
945 if (chunk
->type
== NBD_REPLY_TYPE_NONE
) {
946 /* NBD_REPLY_FLAG_DONE is already checked in nbd_co_receive_one_chunk */
947 assert(chunk
->flags
& NBD_REPLY_FLAG_DONE
);
951 if (chunk
->flags
& NBD_REPLY_FLAG_DONE
) {
952 /* This iteration is last. */
956 /* Execute the loop body */
960 s
->requests
[HANDLE_TO_INDEX(s
, handle
)].coroutine
= NULL
;
962 qemu_co_mutex_lock(&s
->send_mutex
);
964 if (s
->in_flight
== 0 && s
->wait_in_flight
) {
965 aio_co_wake(s
->connection_co
);
967 qemu_co_queue_next(&s
->free_sema
);
969 qemu_co_mutex_unlock(&s
->send_mutex
);
974 static int nbd_co_receive_return_code(BDRVNBDState
*s
, uint64_t handle
,
975 int *request_ret
, Error
**errp
)
977 NBDReplyChunkIter iter
;
979 NBD_FOREACH_REPLY_CHUNK(s
, iter
, handle
, false, NULL
, NULL
, NULL
) {
980 /* nbd_reply_chunk_iter_receive does all the work */
983 error_propagate(errp
, iter
.err
);
984 *request_ret
= iter
.request_ret
;
988 static int nbd_co_receive_cmdread_reply(BDRVNBDState
*s
, uint64_t handle
,
989 uint64_t offset
, QEMUIOVector
*qiov
,
990 int *request_ret
, Error
**errp
)
992 NBDReplyChunkIter iter
;
994 void *payload
= NULL
;
995 Error
*local_err
= NULL
;
997 NBD_FOREACH_REPLY_CHUNK(s
, iter
, handle
, s
->info
.structured_reply
,
998 qiov
, &reply
, &payload
)
1001 NBDStructuredReplyChunk
*chunk
= &reply
.structured
;
1003 assert(nbd_reply_is_structured(&reply
));
1005 switch (chunk
->type
) {
1006 case NBD_REPLY_TYPE_OFFSET_DATA
:
1008 * special cased in nbd_co_receive_one_chunk, data is already
1012 case NBD_REPLY_TYPE_OFFSET_HOLE
:
1013 ret
= nbd_parse_offset_hole_payload(s
, &reply
.structured
, payload
,
1014 offset
, qiov
, &local_err
);
1016 nbd_channel_error(s
, ret
);
1017 nbd_iter_channel_error(&iter
, ret
, &local_err
);
1021 if (!nbd_reply_type_is_error(chunk
->type
)) {
1022 /* not allowed reply type */
1023 nbd_channel_error(s
, -EINVAL
);
1024 error_setg(&local_err
,
1025 "Unexpected reply type: %d (%s) for CMD_READ",
1026 chunk
->type
, nbd_reply_type_lookup(chunk
->type
));
1027 nbd_iter_channel_error(&iter
, -EINVAL
, &local_err
);
1035 error_propagate(errp
, iter
.err
);
1036 *request_ret
= iter
.request_ret
;
1040 static int nbd_co_receive_blockstatus_reply(BDRVNBDState
*s
,
1041 uint64_t handle
, uint64_t length
,
1043 int *request_ret
, Error
**errp
)
1045 NBDReplyChunkIter iter
;
1047 void *payload
= NULL
;
1048 Error
*local_err
= NULL
;
1049 bool received
= false;
1051 assert(!extent
->length
);
1052 NBD_FOREACH_REPLY_CHUNK(s
, iter
, handle
, false, NULL
, &reply
, &payload
) {
1054 NBDStructuredReplyChunk
*chunk
= &reply
.structured
;
1056 assert(nbd_reply_is_structured(&reply
));
1058 switch (chunk
->type
) {
1059 case NBD_REPLY_TYPE_BLOCK_STATUS
:
1061 nbd_channel_error(s
, -EINVAL
);
1062 error_setg(&local_err
, "Several BLOCK_STATUS chunks in reply");
1063 nbd_iter_channel_error(&iter
, -EINVAL
, &local_err
);
1067 ret
= nbd_parse_blockstatus_payload(s
, &reply
.structured
,
1068 payload
, length
, extent
,
1071 nbd_channel_error(s
, ret
);
1072 nbd_iter_channel_error(&iter
, ret
, &local_err
);
1076 if (!nbd_reply_type_is_error(chunk
->type
)) {
1077 nbd_channel_error(s
, -EINVAL
);
1078 error_setg(&local_err
,
1079 "Unexpected reply type: %d (%s) "
1080 "for CMD_BLOCK_STATUS",
1081 chunk
->type
, nbd_reply_type_lookup(chunk
->type
));
1082 nbd_iter_channel_error(&iter
, -EINVAL
, &local_err
);
1090 if (!extent
->length
&& !iter
.request_ret
) {
1091 error_setg(&local_err
, "Server did not reply with any status extents");
1092 nbd_iter_channel_error(&iter
, -EIO
, &local_err
);
1095 error_propagate(errp
, iter
.err
);
1096 *request_ret
= iter
.request_ret
;
1100 static int nbd_co_request(BlockDriverState
*bs
, NBDRequest
*request
,
1101 QEMUIOVector
*write_qiov
)
1103 int ret
, request_ret
;
1104 Error
*local_err
= NULL
;
1105 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
1107 assert(request
->type
!= NBD_CMD_READ
);
1109 assert(request
->type
== NBD_CMD_WRITE
);
1110 assert(request
->len
== iov_size(write_qiov
->iov
, write_qiov
->niov
));
1112 assert(request
->type
!= NBD_CMD_WRITE
);
1116 ret
= nbd_co_send_request(bs
, request
, write_qiov
);
1121 ret
= nbd_co_receive_return_code(s
, request
->handle
,
1122 &request_ret
, &local_err
);
1124 trace_nbd_co_request_fail(request
->from
, request
->len
,
1125 request
->handle
, request
->flags
,
1127 nbd_cmd_lookup(request
->type
),
1128 ret
, error_get_pretty(local_err
));
1129 error_free(local_err
);
1132 } while (ret
< 0 && nbd_client_connecting_wait(s
));
1134 return ret
? ret
: request_ret
;
1137 static int nbd_client_co_preadv(BlockDriverState
*bs
, uint64_t offset
,
1138 uint64_t bytes
, QEMUIOVector
*qiov
, int flags
)
1140 int ret
, request_ret
;
1141 Error
*local_err
= NULL
;
1142 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
1143 NBDRequest request
= {
1144 .type
= NBD_CMD_READ
,
1149 assert(bytes
<= NBD_MAX_BUFFER_SIZE
);
1156 * Work around the fact that the block layer doesn't do
1157 * byte-accurate sizing yet - if the read exceeds the server's
1158 * advertised size because the block layer rounded size up, then
1159 * truncate the request to the server and tail-pad with zero.
1161 if (offset
>= s
->info
.size
) {
1162 assert(bytes
< BDRV_SECTOR_SIZE
);
1163 qemu_iovec_memset(qiov
, 0, 0, bytes
);
1166 if (offset
+ bytes
> s
->info
.size
) {
1167 uint64_t slop
= offset
+ bytes
- s
->info
.size
;
1169 assert(slop
< BDRV_SECTOR_SIZE
);
1170 qemu_iovec_memset(qiov
, bytes
- slop
, 0, slop
);
1171 request
.len
-= slop
;
1175 ret
= nbd_co_send_request(bs
, &request
, NULL
);
1180 ret
= nbd_co_receive_cmdread_reply(s
, request
.handle
, offset
, qiov
,
1181 &request_ret
, &local_err
);
1183 trace_nbd_co_request_fail(request
.from
, request
.len
, request
.handle
,
1184 request
.flags
, request
.type
,
1185 nbd_cmd_lookup(request
.type
),
1186 ret
, error_get_pretty(local_err
));
1187 error_free(local_err
);
1190 } while (ret
< 0 && nbd_client_connecting_wait(s
));
1192 return ret
? ret
: request_ret
;
1195 static int nbd_client_co_pwritev(BlockDriverState
*bs
, uint64_t offset
,
1196 uint64_t bytes
, QEMUIOVector
*qiov
, int flags
)
1198 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
1199 NBDRequest request
= {
1200 .type
= NBD_CMD_WRITE
,
1205 assert(!(s
->info
.flags
& NBD_FLAG_READ_ONLY
));
1206 if (flags
& BDRV_REQ_FUA
) {
1207 assert(s
->info
.flags
& NBD_FLAG_SEND_FUA
);
1208 request
.flags
|= NBD_CMD_FLAG_FUA
;
1211 assert(bytes
<= NBD_MAX_BUFFER_SIZE
);
1216 return nbd_co_request(bs
, &request
, qiov
);
1219 static int nbd_client_co_pwrite_zeroes(BlockDriverState
*bs
, int64_t offset
,
1220 int bytes
, BdrvRequestFlags flags
)
1222 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
1223 NBDRequest request
= {
1224 .type
= NBD_CMD_WRITE_ZEROES
,
1229 assert(!(s
->info
.flags
& NBD_FLAG_READ_ONLY
));
1230 if (!(s
->info
.flags
& NBD_FLAG_SEND_WRITE_ZEROES
)) {
1234 if (flags
& BDRV_REQ_FUA
) {
1235 assert(s
->info
.flags
& NBD_FLAG_SEND_FUA
);
1236 request
.flags
|= NBD_CMD_FLAG_FUA
;
1238 if (!(flags
& BDRV_REQ_MAY_UNMAP
)) {
1239 request
.flags
|= NBD_CMD_FLAG_NO_HOLE
;
1241 if (flags
& BDRV_REQ_NO_FALLBACK
) {
1242 assert(s
->info
.flags
& NBD_FLAG_SEND_FAST_ZERO
);
1243 request
.flags
|= NBD_CMD_FLAG_FAST_ZERO
;
1249 return nbd_co_request(bs
, &request
, NULL
);
1252 static int nbd_client_co_flush(BlockDriverState
*bs
)
1254 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
1255 NBDRequest request
= { .type
= NBD_CMD_FLUSH
};
1257 if (!(s
->info
.flags
& NBD_FLAG_SEND_FLUSH
)) {
1264 return nbd_co_request(bs
, &request
, NULL
);
1267 static int nbd_client_co_pdiscard(BlockDriverState
*bs
, int64_t offset
,
1270 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
1271 NBDRequest request
= {
1272 .type
= NBD_CMD_TRIM
,
1277 assert(!(s
->info
.flags
& NBD_FLAG_READ_ONLY
));
1278 if (!(s
->info
.flags
& NBD_FLAG_SEND_TRIM
) || !bytes
) {
1282 return nbd_co_request(bs
, &request
, NULL
);
1285 static int coroutine_fn
nbd_client_co_block_status(
1286 BlockDriverState
*bs
, bool want_zero
, int64_t offset
, int64_t bytes
,
1287 int64_t *pnum
, int64_t *map
, BlockDriverState
**file
)
1289 int ret
, request_ret
;
1290 NBDExtent extent
= { 0 };
1291 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
1292 Error
*local_err
= NULL
;
1294 NBDRequest request
= {
1295 .type
= NBD_CMD_BLOCK_STATUS
,
1297 .len
= MIN(MIN_NON_ZERO(QEMU_ALIGN_DOWN(INT_MAX
,
1298 bs
->bl
.request_alignment
),
1300 MIN(bytes
, s
->info
.size
- offset
)),
1301 .flags
= NBD_CMD_FLAG_REQ_ONE
,
1304 if (!s
->info
.base_allocation
) {
1308 return BDRV_BLOCK_DATA
| BDRV_BLOCK_OFFSET_VALID
;
1312 * Work around the fact that the block layer doesn't do
1313 * byte-accurate sizing yet - if the status request exceeds the
1314 * server's advertised size because the block layer rounded size
1315 * up, we truncated the request to the server (above), or are
1316 * called on just the hole.
1318 if (offset
>= s
->info
.size
) {
1320 assert(bytes
< BDRV_SECTOR_SIZE
);
1321 /* Intentionally don't report offset_valid for the hole */
1322 return BDRV_BLOCK_ZERO
;
1325 if (s
->info
.min_block
) {
1326 assert(QEMU_IS_ALIGNED(request
.len
, s
->info
.min_block
));
1329 ret
= nbd_co_send_request(bs
, &request
, NULL
);
1334 ret
= nbd_co_receive_blockstatus_reply(s
, request
.handle
, bytes
,
1335 &extent
, &request_ret
,
1338 trace_nbd_co_request_fail(request
.from
, request
.len
, request
.handle
,
1339 request
.flags
, request
.type
,
1340 nbd_cmd_lookup(request
.type
),
1341 ret
, error_get_pretty(local_err
));
1342 error_free(local_err
);
1345 } while (ret
< 0 && nbd_client_connecting_wait(s
));
1347 if (ret
< 0 || request_ret
< 0) {
1348 return ret
? ret
: request_ret
;
1351 assert(extent
.length
);
1352 *pnum
= extent
.length
;
1355 return (extent
.flags
& NBD_STATE_HOLE
? 0 : BDRV_BLOCK_DATA
) |
1356 (extent
.flags
& NBD_STATE_ZERO
? BDRV_BLOCK_ZERO
: 0) |
1357 BDRV_BLOCK_OFFSET_VALID
;
1360 static int nbd_client_reopen_prepare(BDRVReopenState
*state
,
1361 BlockReopenQueue
*queue
, Error
**errp
)
1363 BDRVNBDState
*s
= (BDRVNBDState
*)state
->bs
->opaque
;
1365 if ((state
->flags
& BDRV_O_RDWR
) && (s
->info
.flags
& NBD_FLAG_READ_ONLY
)) {
1366 error_setg(errp
, "Can't reopen read-only NBD mount as read/write");
1372 static void nbd_client_close(BlockDriverState
*bs
)
1374 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
1375 NBDRequest request
= { .type
= NBD_CMD_DISC
};
1378 nbd_send_request(s
->ioc
, &request
);
1381 nbd_teardown_connection(bs
);
1384 static QIOChannelSocket
*nbd_establish_connection(SocketAddress
*saddr
,
1387 QIOChannelSocket
*sioc
;
1388 Error
*local_err
= NULL
;
1390 sioc
= qio_channel_socket_new();
1391 qio_channel_set_name(QIO_CHANNEL(sioc
), "nbd-client");
1393 qio_channel_socket_connect_sync(sioc
, saddr
, &local_err
);
1395 object_unref(OBJECT(sioc
));
1396 error_propagate(errp
, local_err
);
1400 qio_channel_set_delay(QIO_CHANNEL(sioc
), false);
1405 static int nbd_client_connect(BlockDriverState
*bs
, Error
**errp
)
1407 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
1408 AioContext
*aio_context
= bdrv_get_aio_context(bs
);
1412 * establish TCP connection, return error if it fails
1413 * TODO: Configurable retry-until-timeout behaviour.
1415 QIOChannelSocket
*sioc
= nbd_establish_connection(s
->saddr
, errp
);
1418 return -ECONNREFUSED
;
1422 trace_nbd_client_connect(s
->export
);
1423 qio_channel_set_blocking(QIO_CHANNEL(sioc
), false, NULL
);
1424 qio_channel_attach_aio_context(QIO_CHANNEL(sioc
), aio_context
);
1426 s
->info
.request_sizes
= true;
1427 s
->info
.structured_reply
= true;
1428 s
->info
.base_allocation
= true;
1429 s
->info
.x_dirty_bitmap
= g_strdup(s
->x_dirty_bitmap
);
1430 s
->info
.name
= g_strdup(s
->export
?: "");
1431 ret
= nbd_receive_negotiate(aio_context
, QIO_CHANNEL(sioc
), s
->tlscreds
,
1432 s
->hostname
, &s
->ioc
, &s
->info
, errp
);
1433 g_free(s
->info
.x_dirty_bitmap
);
1434 g_free(s
->info
.name
);
1436 object_unref(OBJECT(sioc
));
1439 if (s
->x_dirty_bitmap
&& !s
->info
.base_allocation
) {
1440 error_setg(errp
, "requested x-dirty-bitmap %s not found",
1445 if (s
->info
.flags
& NBD_FLAG_READ_ONLY
) {
1446 ret
= bdrv_apply_auto_read_only(bs
, "NBD export is read-only", errp
);
1451 if (s
->info
.flags
& NBD_FLAG_SEND_FUA
) {
1452 bs
->supported_write_flags
= BDRV_REQ_FUA
;
1453 bs
->supported_zero_flags
|= BDRV_REQ_FUA
;
1455 if (s
->info
.flags
& NBD_FLAG_SEND_WRITE_ZEROES
) {
1456 bs
->supported_zero_flags
|= BDRV_REQ_MAY_UNMAP
;
1457 if (s
->info
.flags
& NBD_FLAG_SEND_FAST_ZERO
) {
1458 bs
->supported_zero_flags
|= BDRV_REQ_NO_FALLBACK
;
1465 s
->ioc
= QIO_CHANNEL(sioc
);
1466 object_ref(OBJECT(s
->ioc
));
1469 trace_nbd_client_connect_success(s
->export
);
1475 * We have connected, but must fail for other reasons.
1476 * Send NBD_CMD_DISC as a courtesy to the server.
1479 NBDRequest request
= { .type
= NBD_CMD_DISC
};
1481 nbd_send_request(s
->ioc
?: QIO_CHANNEL(sioc
), &request
);
1483 object_unref(OBJECT(sioc
));
1490 * Parse nbd_open options
1493 static int nbd_parse_uri(const char *filename
, QDict
*options
)
1497 QueryParams
*qp
= NULL
;
1501 uri
= uri_parse(filename
);
1507 if (!g_strcmp0(uri
->scheme
, "nbd")) {
1509 } else if (!g_strcmp0(uri
->scheme
, "nbd+tcp")) {
1511 } else if (!g_strcmp0(uri
->scheme
, "nbd+unix")) {
1518 p
= uri
->path
? uri
->path
: "/";
1519 p
+= strspn(p
, "/");
1521 qdict_put_str(options
, "export", p
);
1524 qp
= query_params_parse(uri
->query
);
1525 if (qp
->n
> 1 || (is_unix
&& !qp
->n
) || (!is_unix
&& qp
->n
)) {
1531 /* nbd+unix:///export?socket=path */
1532 if (uri
->server
|| uri
->port
|| strcmp(qp
->p
[0].name
, "socket")) {
1536 qdict_put_str(options
, "server.type", "unix");
1537 qdict_put_str(options
, "server.path", qp
->p
[0].value
);
1542 /* nbd[+tcp]://host[:port]/export */
1548 /* strip braces from literal IPv6 address */
1549 if (uri
->server
[0] == '[') {
1550 host
= qstring_from_substr(uri
->server
, 1,
1551 strlen(uri
->server
) - 1);
1553 host
= qstring_from_str(uri
->server
);
1556 qdict_put_str(options
, "server.type", "inet");
1557 qdict_put(options
, "server.host", host
);
1559 port_str
= g_strdup_printf("%d", uri
->port
?: NBD_DEFAULT_PORT
);
1560 qdict_put_str(options
, "server.port", port_str
);
1566 query_params_free(qp
);
1572 static bool nbd_has_filename_options_conflict(QDict
*options
, Error
**errp
)
1574 const QDictEntry
*e
;
1576 for (e
= qdict_first(options
); e
; e
= qdict_next(options
, e
)) {
1577 if (!strcmp(e
->key
, "host") ||
1578 !strcmp(e
->key
, "port") ||
1579 !strcmp(e
->key
, "path") ||
1580 !strcmp(e
->key
, "export") ||
1581 strstart(e
->key
, "server.", NULL
))
1583 error_setg(errp
, "Option '%s' cannot be used with a file name",
1592 static void nbd_parse_filename(const char *filename
, QDict
*options
,
1595 g_autofree
char *file
= NULL
;
1597 const char *host_spec
;
1598 const char *unixpath
;
1600 if (nbd_has_filename_options_conflict(options
, errp
)) {
1604 if (strstr(filename
, "://")) {
1605 int ret
= nbd_parse_uri(filename
, options
);
1607 error_setg(errp
, "No valid URL specified");
1612 file
= g_strdup(filename
);
1614 export_name
= strstr(file
, EN_OPTSTR
);
1616 if (export_name
[strlen(EN_OPTSTR
)] == 0) {
1619 export_name
[0] = 0; /* truncate 'file' */
1620 export_name
+= strlen(EN_OPTSTR
);
1622 qdict_put_str(options
, "export", export_name
);
1625 /* extract the host_spec - fail if it's not nbd:... */
1626 if (!strstart(file
, "nbd:", &host_spec
)) {
1627 error_setg(errp
, "File name string for NBD must start with 'nbd:'");
1635 /* are we a UNIX or TCP socket? */
1636 if (strstart(host_spec
, "unix:", &unixpath
)) {
1637 qdict_put_str(options
, "server.type", "unix");
1638 qdict_put_str(options
, "server.path", unixpath
);
1640 InetSocketAddress
*addr
= g_new(InetSocketAddress
, 1);
1642 if (inet_parse(addr
, host_spec
, errp
)) {
1646 qdict_put_str(options
, "server.type", "inet");
1647 qdict_put_str(options
, "server.host", addr
->host
);
1648 qdict_put_str(options
, "server.port", addr
->port
);
1650 qapi_free_InetSocketAddress(addr
);
1654 static bool nbd_process_legacy_socket_options(QDict
*output_options
,
1655 QemuOpts
*legacy_opts
,
1658 const char *path
= qemu_opt_get(legacy_opts
, "path");
1659 const char *host
= qemu_opt_get(legacy_opts
, "host");
1660 const char *port
= qemu_opt_get(legacy_opts
, "port");
1661 const QDictEntry
*e
;
1663 if (!path
&& !host
&& !port
) {
1667 for (e
= qdict_first(output_options
); e
; e
= qdict_next(output_options
, e
))
1669 if (strstart(e
->key
, "server.", NULL
)) {
1670 error_setg(errp
, "Cannot use 'server' and path/host/port at the "
1677 error_setg(errp
, "path and host may not be used at the same time");
1681 error_setg(errp
, "port may not be used without host");
1685 qdict_put_str(output_options
, "server.type", "unix");
1686 qdict_put_str(output_options
, "server.path", path
);
1688 qdict_put_str(output_options
, "server.type", "inet");
1689 qdict_put_str(output_options
, "server.host", host
);
1690 qdict_put_str(output_options
, "server.port",
1691 port
?: stringify(NBD_DEFAULT_PORT
));
1697 static SocketAddress
*nbd_config(BDRVNBDState
*s
, QDict
*options
,
1700 SocketAddress
*saddr
= NULL
;
1703 Error
*local_err
= NULL
;
1705 qdict_extract_subqdict(options
, &addr
, "server.");
1706 if (!qdict_size(addr
)) {
1707 error_setg(errp
, "NBD server address missing");
1711 iv
= qobject_input_visitor_new_flat_confused(addr
, errp
);
1716 visit_type_SocketAddress(iv
, NULL
, &saddr
, &local_err
);
1718 error_propagate(errp
, local_err
);
1723 qobject_unref(addr
);
1728 static QCryptoTLSCreds
*nbd_get_tls_creds(const char *id
, Error
**errp
)
1731 QCryptoTLSCreds
*creds
;
1733 obj
= object_resolve_path_component(
1734 object_get_objects_root(), id
);
1736 error_setg(errp
, "No TLS credentials with id '%s'",
1740 creds
= (QCryptoTLSCreds
*)
1741 object_dynamic_cast(obj
, TYPE_QCRYPTO_TLS_CREDS
);
1743 error_setg(errp
, "Object with id '%s' is not TLS credentials",
1748 if (creds
->endpoint
!= QCRYPTO_TLS_CREDS_ENDPOINT_CLIENT
) {
1750 "Expecting TLS credentials with a client endpoint");
1758 static QemuOptsList nbd_runtime_opts
= {
1760 .head
= QTAILQ_HEAD_INITIALIZER(nbd_runtime_opts
.head
),
1764 .type
= QEMU_OPT_STRING
,
1765 .help
= "TCP host to connect to",
1769 .type
= QEMU_OPT_STRING
,
1770 .help
= "TCP port to connect to",
1774 .type
= QEMU_OPT_STRING
,
1775 .help
= "Unix socket path to connect to",
1779 .type
= QEMU_OPT_STRING
,
1780 .help
= "Name of the NBD export to open",
1783 .name
= "tls-creds",
1784 .type
= QEMU_OPT_STRING
,
1785 .help
= "ID of the TLS credentials to use",
1788 .name
= "x-dirty-bitmap",
1789 .type
= QEMU_OPT_STRING
,
1790 .help
= "experimental: expose named dirty bitmap in place of "
1794 .name
= "reconnect-delay",
1795 .type
= QEMU_OPT_NUMBER
,
1796 .help
= "On an unexpected disconnect, the nbd client tries to "
1797 "connect again until succeeding or encountering a serious "
1798 "error. During the first @reconnect-delay seconds, all "
1799 "requests are paused and will be rerun on a successful "
1800 "reconnect. After that time, any delayed requests and all "
1801 "future requests before a successful reconnect will "
1802 "immediately fail. Default 0",
1804 { /* end of list */ }
1808 static int nbd_process_options(BlockDriverState
*bs
, QDict
*options
,
1811 BDRVNBDState
*s
= bs
->opaque
;
1813 Error
*local_err
= NULL
;
1816 opts
= qemu_opts_create(&nbd_runtime_opts
, NULL
, 0, &error_abort
);
1817 qemu_opts_absorb_qdict(opts
, options
, &local_err
);
1819 error_propagate(errp
, local_err
);
1823 /* Translate @host, @port, and @path to a SocketAddress */
1824 if (!nbd_process_legacy_socket_options(options
, opts
, errp
)) {
1828 /* Pop the config into our state object. Exit if invalid. */
1829 s
->saddr
= nbd_config(s
, options
, errp
);
1834 s
->export
= g_strdup(qemu_opt_get(opts
, "export"));
1835 if (s
->export
&& strlen(s
->export
) > NBD_MAX_STRING_SIZE
) {
1836 error_setg(errp
, "export name too long to send to server");
1840 s
->tlscredsid
= g_strdup(qemu_opt_get(opts
, "tls-creds"));
1841 if (s
->tlscredsid
) {
1842 s
->tlscreds
= nbd_get_tls_creds(s
->tlscredsid
, errp
);
1847 /* TODO SOCKET_ADDRESS_KIND_FD where fd has AF_INET or AF_INET6 */
1848 if (s
->saddr
->type
!= SOCKET_ADDRESS_TYPE_INET
) {
1849 error_setg(errp
, "TLS only supported over IP sockets");
1852 s
->hostname
= s
->saddr
->u
.inet
.host
;
1855 s
->x_dirty_bitmap
= g_strdup(qemu_opt_get(opts
, "x-dirty-bitmap"));
1856 if (s
->x_dirty_bitmap
&& strlen(s
->x_dirty_bitmap
) > NBD_MAX_STRING_SIZE
) {
1857 error_setg(errp
, "x-dirty-bitmap query too long to send to server");
1861 s
->reconnect_delay
= qemu_opt_get_number(opts
, "reconnect-delay", 0);
1867 object_unref(OBJECT(s
->tlscreds
));
1868 qapi_free_SocketAddress(s
->saddr
);
1870 g_free(s
->tlscredsid
);
1871 g_free(s
->x_dirty_bitmap
);
1873 qemu_opts_del(opts
);
1877 static int nbd_open(BlockDriverState
*bs
, QDict
*options
, int flags
,
1881 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
1883 ret
= nbd_process_options(bs
, options
, errp
);
1889 qemu_co_mutex_init(&s
->send_mutex
);
1890 qemu_co_queue_init(&s
->free_sema
);
1892 ret
= nbd_client_connect(bs
, errp
);
1896 /* successfully connected */
1897 s
->state
= NBD_CLIENT_CONNECTED
;
1899 s
->connection_co
= qemu_coroutine_create(nbd_connection_entry
, s
);
1900 bdrv_inc_in_flight(bs
);
1901 aio_co_schedule(bdrv_get_aio_context(bs
), s
->connection_co
);
1906 static int nbd_co_flush(BlockDriverState
*bs
)
1908 return nbd_client_co_flush(bs
);
1911 static void nbd_refresh_limits(BlockDriverState
*bs
, Error
**errp
)
1913 BDRVNBDState
*s
= (BDRVNBDState
*)bs
->opaque
;
1914 uint32_t min
= s
->info
.min_block
;
1915 uint32_t max
= MIN_NON_ZERO(NBD_MAX_BUFFER_SIZE
, s
->info
.max_block
);
1918 * If the server did not advertise an alignment:
1919 * - a size that is not sector-aligned implies that an alignment
1920 * of 1 can be used to access those tail bytes
1921 * - advertisement of block status requires an alignment of 1, so
1922 * that we don't violate block layer constraints that block
1923 * status is always aligned (as we can't control whether the
1924 * server will report sub-sector extents, such as a hole at EOF
1925 * on an unaligned POSIX file)
1926 * - otherwise, assume the server is so old that we are safer avoiding
1927 * sub-sector requests
1930 min
= (!QEMU_IS_ALIGNED(s
->info
.size
, BDRV_SECTOR_SIZE
) ||
1931 s
->info
.base_allocation
) ? 1 : BDRV_SECTOR_SIZE
;
1934 bs
->bl
.request_alignment
= min
;
1935 bs
->bl
.max_pdiscard
= max
;
1936 bs
->bl
.max_pwrite_zeroes
= max
;
1937 bs
->bl
.max_transfer
= max
;
1939 if (s
->info
.opt_block
&&
1940 s
->info
.opt_block
> bs
->bl
.opt_transfer
) {
1941 bs
->bl
.opt_transfer
= s
->info
.opt_block
;
1945 static void nbd_close(BlockDriverState
*bs
)
1947 BDRVNBDState
*s
= bs
->opaque
;
1949 nbd_client_close(bs
);
1951 object_unref(OBJECT(s
->tlscreds
));
1952 qapi_free_SocketAddress(s
->saddr
);
1954 g_free(s
->tlscredsid
);
1955 g_free(s
->x_dirty_bitmap
);
1958 static int64_t nbd_getlength(BlockDriverState
*bs
)
1960 BDRVNBDState
*s
= bs
->opaque
;
1962 return s
->info
.size
;
1965 static void nbd_refresh_filename(BlockDriverState
*bs
)
1967 BDRVNBDState
*s
= bs
->opaque
;
1968 const char *host
= NULL
, *port
= NULL
, *path
= NULL
;
1970 if (s
->saddr
->type
== SOCKET_ADDRESS_TYPE_INET
) {
1971 const InetSocketAddress
*inet
= &s
->saddr
->u
.inet
;
1972 if (!inet
->has_ipv4
&& !inet
->has_ipv6
&& !inet
->has_to
) {
1976 } else if (s
->saddr
->type
== SOCKET_ADDRESS_TYPE_UNIX
) {
1977 path
= s
->saddr
->u
.q_unix
.path
;
1978 } /* else can't represent as pseudo-filename */
1980 if (path
&& s
->export
) {
1981 snprintf(bs
->exact_filename
, sizeof(bs
->exact_filename
),
1982 "nbd+unix:///%s?socket=%s", s
->export
, path
);
1983 } else if (path
&& !s
->export
) {
1984 snprintf(bs
->exact_filename
, sizeof(bs
->exact_filename
),
1985 "nbd+unix://?socket=%s", path
);
1986 } else if (host
&& s
->export
) {
1987 snprintf(bs
->exact_filename
, sizeof(bs
->exact_filename
),
1988 "nbd://%s:%s/%s", host
, port
, s
->export
);
1989 } else if (host
&& !s
->export
) {
1990 snprintf(bs
->exact_filename
, sizeof(bs
->exact_filename
),
1991 "nbd://%s:%s", host
, port
);
1995 static char *nbd_dirname(BlockDriverState
*bs
, Error
**errp
)
1997 /* The generic bdrv_dirname() implementation is able to work out some
1998 * directory name for NBD nodes, but that would be wrong. So far there is no
1999 * specification for how "export paths" would work, so NBD does not have
2000 * directory names. */
2001 error_setg(errp
, "Cannot generate a base directory for NBD nodes");
2005 static const char *const nbd_strong_runtime_opts
[] = {
2016 static BlockDriver bdrv_nbd
= {
2017 .format_name
= "nbd",
2018 .protocol_name
= "nbd",
2019 .instance_size
= sizeof(BDRVNBDState
),
2020 .bdrv_parse_filename
= nbd_parse_filename
,
2021 .bdrv_file_open
= nbd_open
,
2022 .bdrv_reopen_prepare
= nbd_client_reopen_prepare
,
2023 .bdrv_co_preadv
= nbd_client_co_preadv
,
2024 .bdrv_co_pwritev
= nbd_client_co_pwritev
,
2025 .bdrv_co_pwrite_zeroes
= nbd_client_co_pwrite_zeroes
,
2026 .bdrv_close
= nbd_close
,
2027 .bdrv_co_flush_to_os
= nbd_co_flush
,
2028 .bdrv_co_pdiscard
= nbd_client_co_pdiscard
,
2029 .bdrv_refresh_limits
= nbd_refresh_limits
,
2030 .bdrv_getlength
= nbd_getlength
,
2031 .bdrv_detach_aio_context
= nbd_client_detach_aio_context
,
2032 .bdrv_attach_aio_context
= nbd_client_attach_aio_context
,
2033 .bdrv_co_drain_begin
= nbd_client_co_drain_begin
,
2034 .bdrv_co_drain_end
= nbd_client_co_drain_end
,
2035 .bdrv_refresh_filename
= nbd_refresh_filename
,
2036 .bdrv_co_block_status
= nbd_client_co_block_status
,
2037 .bdrv_dirname
= nbd_dirname
,
2038 .strong_runtime_opts
= nbd_strong_runtime_opts
,
2041 static BlockDriver bdrv_nbd_tcp
= {
2042 .format_name
= "nbd",
2043 .protocol_name
= "nbd+tcp",
2044 .instance_size
= sizeof(BDRVNBDState
),
2045 .bdrv_parse_filename
= nbd_parse_filename
,
2046 .bdrv_file_open
= nbd_open
,
2047 .bdrv_reopen_prepare
= nbd_client_reopen_prepare
,
2048 .bdrv_co_preadv
= nbd_client_co_preadv
,
2049 .bdrv_co_pwritev
= nbd_client_co_pwritev
,
2050 .bdrv_co_pwrite_zeroes
= nbd_client_co_pwrite_zeroes
,
2051 .bdrv_close
= nbd_close
,
2052 .bdrv_co_flush_to_os
= nbd_co_flush
,
2053 .bdrv_co_pdiscard
= nbd_client_co_pdiscard
,
2054 .bdrv_refresh_limits
= nbd_refresh_limits
,
2055 .bdrv_getlength
= nbd_getlength
,
2056 .bdrv_detach_aio_context
= nbd_client_detach_aio_context
,
2057 .bdrv_attach_aio_context
= nbd_client_attach_aio_context
,
2058 .bdrv_co_drain_begin
= nbd_client_co_drain_begin
,
2059 .bdrv_co_drain_end
= nbd_client_co_drain_end
,
2060 .bdrv_refresh_filename
= nbd_refresh_filename
,
2061 .bdrv_co_block_status
= nbd_client_co_block_status
,
2062 .bdrv_dirname
= nbd_dirname
,
2063 .strong_runtime_opts
= nbd_strong_runtime_opts
,
2066 static BlockDriver bdrv_nbd_unix
= {
2067 .format_name
= "nbd",
2068 .protocol_name
= "nbd+unix",
2069 .instance_size
= sizeof(BDRVNBDState
),
2070 .bdrv_parse_filename
= nbd_parse_filename
,
2071 .bdrv_file_open
= nbd_open
,
2072 .bdrv_reopen_prepare
= nbd_client_reopen_prepare
,
2073 .bdrv_co_preadv
= nbd_client_co_preadv
,
2074 .bdrv_co_pwritev
= nbd_client_co_pwritev
,
2075 .bdrv_co_pwrite_zeroes
= nbd_client_co_pwrite_zeroes
,
2076 .bdrv_close
= nbd_close
,
2077 .bdrv_co_flush_to_os
= nbd_co_flush
,
2078 .bdrv_co_pdiscard
= nbd_client_co_pdiscard
,
2079 .bdrv_refresh_limits
= nbd_refresh_limits
,
2080 .bdrv_getlength
= nbd_getlength
,
2081 .bdrv_detach_aio_context
= nbd_client_detach_aio_context
,
2082 .bdrv_attach_aio_context
= nbd_client_attach_aio_context
,
2083 .bdrv_co_drain_begin
= nbd_client_co_drain_begin
,
2084 .bdrv_co_drain_end
= nbd_client_co_drain_end
,
2085 .bdrv_refresh_filename
= nbd_refresh_filename
,
2086 .bdrv_co_block_status
= nbd_client_co_block_status
,
2087 .bdrv_dirname
= nbd_dirname
,
2088 .strong_runtime_opts
= nbd_strong_runtime_opts
,
2091 static void bdrv_nbd_init(void)
2093 bdrv_register(&bdrv_nbd
);
2094 bdrv_register(&bdrv_nbd_tcp
);
2095 bdrv_register(&bdrv_nbd_unix
);
2098 block_init(bdrv_nbd_init
);