]> git.proxmox.com Git - mirror_qemu.git/blame - block/nbd.c
can_host: Use class properties
[mirror_qemu.git] / block / nbd.c
CommitLineData
75818250
TS
1/*
2 * QEMU Block driver for NBD
3 *
f7651539 4 * Copyright (c) 2019 Virtuozzo International GmbH.
86f8cdf3 5 * Copyright (C) 2016 Red Hat, Inc.
75818250 6 * Copyright (C) 2008 Bull S.A.S.
bd5921b4 7 * Author: Laurent Vivier <Laurent.Vivier@bull.net>
75818250
TS
8 *
9 * Some parts:
10 * Copyright (C) 2007 Anthony Liguori <anthony@codemonkey.ws>
11 *
12 * Permission is hereby granted, free of charge, to any person obtaining a copy
13 * of this software and associated documentation files (the "Software"), to deal
14 * in the Software without restriction, including without limitation the rights
15 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
16 * copies of the Software, and to permit persons to whom the Software is
17 * furnished to do so, subject to the following conditions:
18 *
19 * The above copyright notice and this permission notice shall be included in
20 * all copies or substantial portions of the Software.
21 *
22 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
23 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
24 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
25 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
26 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
27 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
28 * THE SOFTWARE.
29 */
30
80c71a24 31#include "qemu/osdep.h"
86f8cdf3
VSO
32
33#include "trace.h"
1de7afc9 34#include "qemu/uri.h"
922a01a0 35#include "qemu/option.h"
86f8cdf3 36#include "qemu/cutils.h"
db725815 37#include "qemu/main-loop.h"
86f8cdf3 38
9af23989 39#include "qapi/qapi-visit-sockets.h"
2019d68b 40#include "qapi/qmp/qstring.h"
1dc4718d 41#include "qapi/clone-visitor.h"
86f8cdf3
VSO
42
43#include "block/qdict.h"
44#include "block/nbd.h"
45#include "block/block_int.h"
75818250 46
1d45f8b5 47#define EN_OPTSTR ":exportname="
86f8cdf3
VSO
48#define MAX_NBD_REQUESTS 16
49
50#define HANDLE_TO_INDEX(bs, handle) ((handle) ^ (uint64_t)(intptr_t)(bs))
51#define INDEX_TO_HANDLE(bs, index) ((index) ^ (uint64_t)(intptr_t)(bs))
52
53typedef struct {
54 Coroutine *coroutine;
55 uint64_t offset; /* original offset of the request */
56 bool receiving; /* waiting for connection_co? */
57} NBDClientRequest;
58
a34b1e5e 59typedef enum NBDClientState {
f7651539
VSO
60 NBD_CLIENT_CONNECTING_WAIT,
61 NBD_CLIENT_CONNECTING_NOWAIT,
a34b1e5e
VSO
62 NBD_CLIENT_CONNECTED,
63 NBD_CLIENT_QUIT
64} NBDClientState;
65
1dc4718d
VSO
66typedef enum NBDConnectThreadState {
67 /* No thread, no pending results */
68 CONNECT_THREAD_NONE,
69
70 /* Thread is running, no results for now */
71 CONNECT_THREAD_RUNNING,
72
73 /*
74 * Thread is running, but requestor exited. Thread should close
75 * the new socket and free the connect state on exit.
76 */
77 CONNECT_THREAD_RUNNING_DETACHED,
78
79 /* Thread finished, results are stored in a state */
80 CONNECT_THREAD_FAIL,
81 CONNECT_THREAD_SUCCESS
82} NBDConnectThreadState;
83
84typedef struct NBDConnectThread {
85 /* Initialization constants */
86 SocketAddress *saddr; /* address to connect to */
87 /*
88 * Bottom half to schedule on completion. Scheduled only if bh_ctx is not
89 * NULL
90 */
91 QEMUBHFunc *bh_func;
92 void *bh_opaque;
93
94 /*
95 * Result of last attempt. Valid in FAIL and SUCCESS states.
96 * If you want to steal error, don't forget to set pointer to NULL.
97 */
98 QIOChannelSocket *sioc;
99 Error *err;
100
101 /* state and bh_ctx are protected by mutex */
102 QemuMutex mutex;
103 NBDConnectThreadState state; /* current state of the thread */
104 AioContext *bh_ctx; /* where to schedule bh (NULL means don't schedule) */
105} NBDConnectThread;
106
611ae1d7 107typedef struct BDRVNBDState {
86f8cdf3
VSO
108 QIOChannelSocket *sioc; /* The master data channel */
109 QIOChannel *ioc; /* The current I/O channel which may differ (eg TLS) */
110 NBDExportInfo info;
111
112 CoMutex send_mutex;
113 CoQueue free_sema;
114 Coroutine *connection_co;
78c81a3f 115 Coroutine *teardown_co;
f7651539
VSO
116 QemuCoSleepState *connection_co_sleep_ns_state;
117 bool drained;
118 bool wait_drained_end;
86f8cdf3 119 int in_flight;
a34b1e5e 120 NBDClientState state;
f7651539
VSO
121 int connect_status;
122 Error *connect_err;
123 bool wait_in_flight;
86f8cdf3 124
46f56631
VSO
125 QEMUTimer *reconnect_delay_timer;
126
86f8cdf3
VSO
127 NBDClientRequest requests[MAX_NBD_REQUESTS];
128 NBDReply reply;
129 BlockDriverState *bs;
03504d05 130
8f071c9d
VSO
131 /* Connection parameters */
132 uint32_t reconnect_delay;
62cf396b 133 SocketAddress *saddr;
491d6c7c 134 char *export, *tlscredsid;
8f071c9d
VSO
135 QCryptoTLSCreds *tlscreds;
136 const char *hostname;
137 char *x_dirty_bitmap;
dbc7b014 138 bool alloc_depth;
1dc4718d
VSO
139
140 bool wait_connect;
141 NBDConnectThread *connect_thread;
75818250
TS
142} BDRVNBDState;
143
fa35591b
VSO
144static QIOChannelSocket *nbd_establish_connection(SocketAddress *saddr,
145 Error **errp);
1dc4718d
VSO
146static QIOChannelSocket *nbd_co_establish_connection(BlockDriverState *bs,
147 Error **errp);
148static void nbd_co_establish_connection_cancel(BlockDriverState *bs,
149 bool detach);
fa35591b
VSO
150static int nbd_client_handshake(BlockDriverState *bs, QIOChannelSocket *sioc,
151 Error **errp);
f7651539 152
7f493662
PN
153static void nbd_clear_bdrvstate(BDRVNBDState *s)
154{
155 object_unref(OBJECT(s->tlscreds));
156 qapi_free_SocketAddress(s->saddr);
157 s->saddr = NULL;
158 g_free(s->export);
159 s->export = NULL;
160 g_free(s->tlscredsid);
161 s->tlscredsid = NULL;
162 g_free(s->x_dirty_bitmap);
163 s->x_dirty_bitmap = NULL;
164}
165
a34b1e5e
VSO
166static void nbd_channel_error(BDRVNBDState *s, int ret)
167{
f7651539
VSO
168 if (ret == -EIO) {
169 if (s->state == NBD_CLIENT_CONNECTED) {
170 s->state = s->reconnect_delay ? NBD_CLIENT_CONNECTING_WAIT :
171 NBD_CLIENT_CONNECTING_NOWAIT;
172 }
173 } else {
174 if (s->state == NBD_CLIENT_CONNECTED) {
175 qio_channel_shutdown(s->ioc, QIO_CHANNEL_SHUTDOWN_BOTH, NULL);
176 }
177 s->state = NBD_CLIENT_QUIT;
178 }
a34b1e5e
VSO
179}
180
611ae1d7 181static void nbd_recv_coroutines_wake_all(BDRVNBDState *s)
86f8cdf3
VSO
182{
183 int i;
184
185 for (i = 0; i < MAX_NBD_REQUESTS; i++) {
186 NBDClientRequest *req = &s->requests[i];
187
188 if (req->coroutine && req->receiving) {
189 aio_co_wake(req->coroutine);
190 }
191 }
192}
193
46f56631
VSO
194static void reconnect_delay_timer_del(BDRVNBDState *s)
195{
196 if (s->reconnect_delay_timer) {
197 timer_del(s->reconnect_delay_timer);
198 timer_free(s->reconnect_delay_timer);
199 s->reconnect_delay_timer = NULL;
200 }
201}
202
203static void reconnect_delay_timer_cb(void *opaque)
204{
205 BDRVNBDState *s = opaque;
206
207 if (s->state == NBD_CLIENT_CONNECTING_WAIT) {
208 s->state = NBD_CLIENT_CONNECTING_NOWAIT;
209 while (qemu_co_enter_next(&s->free_sema, NULL)) {
210 /* Resume all queued requests */
211 }
212 }
213
214 reconnect_delay_timer_del(s);
215}
216
217static void reconnect_delay_timer_init(BDRVNBDState *s, uint64_t expire_time_ns)
218{
219 if (s->state != NBD_CLIENT_CONNECTING_WAIT) {
220 return;
221 }
222
223 assert(!s->reconnect_delay_timer);
224 s->reconnect_delay_timer = aio_timer_new(bdrv_get_aio_context(s->bs),
225 QEMU_CLOCK_REALTIME,
226 SCALE_NS,
227 reconnect_delay_timer_cb, s);
228 timer_mod(s->reconnect_delay_timer, expire_time_ns);
229}
230
86f8cdf3
VSO
231static void nbd_client_detach_aio_context(BlockDriverState *bs)
232{
611ae1d7
VSO
233 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
234
46f56631
VSO
235 /* Timer is deleted in nbd_client_co_drain_begin() */
236 assert(!s->reconnect_delay_timer);
611ae1d7 237 qio_channel_detach_aio_context(QIO_CHANNEL(s->ioc));
86f8cdf3
VSO
238}
239
240static void nbd_client_attach_aio_context_bh(void *opaque)
241{
242 BlockDriverState *bs = opaque;
611ae1d7 243 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
86f8cdf3
VSO
244
245 /*
246 * The node is still drained, so we know the coroutine has yielded in
247 * nbd_read_eof(), the only place where bs->in_flight can reach 0, or it is
248 * entered for the first time. Both places are safe for entering the
249 * coroutine.
250 */
611ae1d7 251 qemu_aio_coroutine_enter(bs->aio_context, s->connection_co);
86f8cdf3
VSO
252 bdrv_dec_in_flight(bs);
253}
254
255static void nbd_client_attach_aio_context(BlockDriverState *bs,
256 AioContext *new_context)
257{
611ae1d7
VSO
258 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
259
f7651539
VSO
260 /*
261 * s->connection_co is either yielded from nbd_receive_reply or from
262 * nbd_co_reconnect_loop()
263 */
264 if (s->state == NBD_CLIENT_CONNECTED) {
265 qio_channel_attach_aio_context(QIO_CHANNEL(s->ioc), new_context);
266 }
86f8cdf3
VSO
267
268 bdrv_inc_in_flight(bs);
269
270 /*
271 * Need to wait here for the BH to run because the BH must run while the
272 * node is still drained.
273 */
274 aio_wait_bh_oneshot(new_context, nbd_client_attach_aio_context_bh, bs);
275}
276
f7651539
VSO
277static void coroutine_fn nbd_client_co_drain_begin(BlockDriverState *bs)
278{
279 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
86f8cdf3 280
f7651539
VSO
281 s->drained = true;
282 if (s->connection_co_sleep_ns_state) {
283 qemu_co_sleep_wake(s->connection_co_sleep_ns_state);
284 }
1dc4718d
VSO
285
286 nbd_co_establish_connection_cancel(bs, false);
8c517de2 287
46f56631
VSO
288 reconnect_delay_timer_del(s);
289
8c517de2
VSO
290 if (s->state == NBD_CLIENT_CONNECTING_WAIT) {
291 s->state = NBD_CLIENT_CONNECTING_NOWAIT;
292 qemu_co_queue_restart_all(&s->free_sema);
293 }
f7651539
VSO
294}
295
296static void coroutine_fn nbd_client_co_drain_end(BlockDriverState *bs)
86f8cdf3 297{
611ae1d7 298 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
86f8cdf3 299
f7651539
VSO
300 s->drained = false;
301 if (s->wait_drained_end) {
302 s->wait_drained_end = false;
303 aio_co_wake(s->connection_co);
304 }
305}
306
86f8cdf3 307
f7651539
VSO
308static void nbd_teardown_connection(BlockDriverState *bs)
309{
310 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
311
fbeb3e63 312 if (s->ioc) {
f7651539 313 /* finish any pending coroutines */
f7651539 314 qio_channel_shutdown(s->ioc, QIO_CHANNEL_SHUTDOWN_BOTH, NULL);
fbeb3e63
VSO
315 } else if (s->sioc) {
316 /* abort negotiation */
317 qio_channel_shutdown(QIO_CHANNEL(s->sioc), QIO_CHANNEL_SHUTDOWN_BOTH,
318 NULL);
f7651539 319 }
fbeb3e63 320
f7651539
VSO
321 s->state = NBD_CLIENT_QUIT;
322 if (s->connection_co) {
323 if (s->connection_co_sleep_ns_state) {
324 qemu_co_sleep_wake(s->connection_co_sleep_ns_state);
325 }
1dc4718d 326 nbd_co_establish_connection_cancel(bs, true);
f7651539 327 }
78c81a3f
HR
328 if (qemu_in_coroutine()) {
329 s->teardown_co = qemu_coroutine_self();
330 /* connection_co resumes us when it terminates */
331 qemu_coroutine_yield();
332 s->teardown_co = NULL;
333 } else {
334 BDRV_POLL_WHILE(bs, s->connection_co);
335 }
336 assert(!s->connection_co);
f7651539 337}
86f8cdf3 338
f7651539
VSO
339static bool nbd_client_connecting(BDRVNBDState *s)
340{
341 return s->state == NBD_CLIENT_CONNECTING_WAIT ||
342 s->state == NBD_CLIENT_CONNECTING_NOWAIT;
343}
344
345static bool nbd_client_connecting_wait(BDRVNBDState *s)
346{
347 return s->state == NBD_CLIENT_CONNECTING_WAIT;
348}
349
1dc4718d
VSO
350static void connect_bh(void *opaque)
351{
352 BDRVNBDState *state = opaque;
353
354 assert(state->wait_connect);
355 state->wait_connect = false;
356 aio_co_wake(state->connection_co);
357}
358
359static void nbd_init_connect_thread(BDRVNBDState *s)
360{
361 s->connect_thread = g_new(NBDConnectThread, 1);
362
363 *s->connect_thread = (NBDConnectThread) {
364 .saddr = QAPI_CLONE(SocketAddress, s->saddr),
365 .state = CONNECT_THREAD_NONE,
366 .bh_func = connect_bh,
367 .bh_opaque = s,
368 };
369
370 qemu_mutex_init(&s->connect_thread->mutex);
371}
372
373static void nbd_free_connect_thread(NBDConnectThread *thr)
374{
375 if (thr->sioc) {
376 qio_channel_close(QIO_CHANNEL(thr->sioc), NULL);
377 }
378 error_free(thr->err);
379 qapi_free_SocketAddress(thr->saddr);
380 g_free(thr);
381}
382
383static void *connect_thread_func(void *opaque)
384{
385 NBDConnectThread *thr = opaque;
386 int ret;
387 bool do_free = false;
388
389 thr->sioc = qio_channel_socket_new();
390
391 error_free(thr->err);
392 thr->err = NULL;
393 ret = qio_channel_socket_connect_sync(thr->sioc, thr->saddr, &thr->err);
394 if (ret < 0) {
395 object_unref(OBJECT(thr->sioc));
396 thr->sioc = NULL;
397 }
398
399 qemu_mutex_lock(&thr->mutex);
400
401 switch (thr->state) {
402 case CONNECT_THREAD_RUNNING:
403 thr->state = ret < 0 ? CONNECT_THREAD_FAIL : CONNECT_THREAD_SUCCESS;
404 if (thr->bh_ctx) {
405 aio_bh_schedule_oneshot(thr->bh_ctx, thr->bh_func, thr->bh_opaque);
406
407 /* play safe, don't reuse bh_ctx on further connection attempts */
408 thr->bh_ctx = NULL;
409 }
410 break;
411 case CONNECT_THREAD_RUNNING_DETACHED:
412 do_free = true;
413 break;
414 default:
415 abort();
416 }
417
418 qemu_mutex_unlock(&thr->mutex);
419
420 if (do_free) {
421 nbd_free_connect_thread(thr);
422 }
423
424 return NULL;
425}
426
427static QIOChannelSocket *coroutine_fn
428nbd_co_establish_connection(BlockDriverState *bs, Error **errp)
429{
430 QemuThread thread;
431 BDRVNBDState *s = bs->opaque;
432 QIOChannelSocket *res;
433 NBDConnectThread *thr = s->connect_thread;
434
435 qemu_mutex_lock(&thr->mutex);
436
437 switch (thr->state) {
438 case CONNECT_THREAD_FAIL:
439 case CONNECT_THREAD_NONE:
440 error_free(thr->err);
441 thr->err = NULL;
442 thr->state = CONNECT_THREAD_RUNNING;
443 qemu_thread_create(&thread, "nbd-connect",
444 connect_thread_func, thr, QEMU_THREAD_DETACHED);
445 break;
446 case CONNECT_THREAD_SUCCESS:
447 /* Previous attempt finally succeeded in background */
448 thr->state = CONNECT_THREAD_NONE;
449 res = thr->sioc;
450 thr->sioc = NULL;
451 qemu_mutex_unlock(&thr->mutex);
452 return res;
453 case CONNECT_THREAD_RUNNING:
454 /* Already running, will wait */
455 break;
456 default:
457 abort();
458 }
459
460 thr->bh_ctx = qemu_get_current_aio_context();
461
462 qemu_mutex_unlock(&thr->mutex);
463
464
465 /*
466 * We are going to wait for connect-thread finish, but
467 * nbd_client_co_drain_begin() can interrupt.
468 *
469 * Note that wait_connect variable is not visible for connect-thread. It
470 * doesn't need mutex protection, it used only inside home aio context of
471 * bs.
472 */
473 s->wait_connect = true;
474 qemu_coroutine_yield();
475
476 qemu_mutex_lock(&thr->mutex);
477
478 switch (thr->state) {
479 case CONNECT_THREAD_SUCCESS:
480 case CONNECT_THREAD_FAIL:
481 thr->state = CONNECT_THREAD_NONE;
482 error_propagate(errp, thr->err);
483 thr->err = NULL;
484 res = thr->sioc;
485 thr->sioc = NULL;
486 break;
487 case CONNECT_THREAD_RUNNING:
488 case CONNECT_THREAD_RUNNING_DETACHED:
489 /*
490 * Obviously, drained section wants to start. Report the attempt as
491 * failed. Still connect thread is executing in background, and its
492 * result may be used for next connection attempt.
493 */
494 res = NULL;
495 error_setg(errp, "Connection attempt cancelled by other operation");
496 break;
497
498 case CONNECT_THREAD_NONE:
499 /*
500 * Impossible. We've seen this thread running. So it should be
501 * running or at least give some results.
502 */
503 abort();
504
505 default:
506 abort();
507 }
508
509 qemu_mutex_unlock(&thr->mutex);
510
511 return res;
512}
513
514/*
515 * nbd_co_establish_connection_cancel
516 * Cancel nbd_co_establish_connection asynchronously: it will finish soon, to
517 * allow drained section to begin.
518 *
519 * If detach is true, also cleanup the state (or if thread is running, move it
520 * to CONNECT_THREAD_RUNNING_DETACHED state). s->connect_thread becomes NULL if
521 * detach is true.
522 */
523static void nbd_co_establish_connection_cancel(BlockDriverState *bs,
524 bool detach)
525{
526 BDRVNBDState *s = bs->opaque;
527 NBDConnectThread *thr = s->connect_thread;
528 bool wake = false;
529 bool do_free = false;
530
531 qemu_mutex_lock(&thr->mutex);
532
533 if (thr->state == CONNECT_THREAD_RUNNING) {
534 /* We can cancel only in running state, when bh is not yet scheduled */
535 thr->bh_ctx = NULL;
536 if (s->wait_connect) {
537 s->wait_connect = false;
538 wake = true;
539 }
540 if (detach) {
541 thr->state = CONNECT_THREAD_RUNNING_DETACHED;
542 s->connect_thread = NULL;
543 }
544 } else if (detach) {
545 do_free = true;
546 }
547
548 qemu_mutex_unlock(&thr->mutex);
549
550 if (do_free) {
551 nbd_free_connect_thread(thr);
552 s->connect_thread = NULL;
553 }
554
555 if (wake) {
556 aio_co_wake(s->connection_co);
557 }
558}
559
f7651539
VSO
560static coroutine_fn void nbd_reconnect_attempt(BDRVNBDState *s)
561{
fa35591b 562 int ret;
f7651539 563 Error *local_err = NULL;
fa35591b 564 QIOChannelSocket *sioc;
f7651539
VSO
565
566 if (!nbd_client_connecting(s)) {
567 return;
568 }
569
570 /* Wait for completion of all in-flight requests */
571
572 qemu_co_mutex_lock(&s->send_mutex);
573
574 while (s->in_flight > 0) {
575 qemu_co_mutex_unlock(&s->send_mutex);
576 nbd_recv_coroutines_wake_all(s);
577 s->wait_in_flight = true;
578 qemu_coroutine_yield();
579 s->wait_in_flight = false;
580 qemu_co_mutex_lock(&s->send_mutex);
581 }
582
583 qemu_co_mutex_unlock(&s->send_mutex);
584
585 if (!nbd_client_connecting(s)) {
586 return;
587 }
588
589 /*
590 * Now we are sure that nobody is accessing the channel, and no one will
591 * try until we set the state to CONNECTED.
592 */
593
594 /* Finalize previous connection if any */
595 if (s->ioc) {
8a509afd 596 qio_channel_detach_aio_context(QIO_CHANNEL(s->ioc));
f7651539
VSO
597 object_unref(OBJECT(s->sioc));
598 s->sioc = NULL;
599 object_unref(OBJECT(s->ioc));
600 s->ioc = NULL;
601 }
602
1dc4718d 603 sioc = nbd_co_establish_connection(s->bs, &local_err);
fa35591b
VSO
604 if (!sioc) {
605 ret = -ECONNREFUSED;
606 goto out;
607 }
608
dd1ec1a4
VSO
609 bdrv_dec_in_flight(s->bs);
610
fa35591b
VSO
611 ret = nbd_client_handshake(s->bs, sioc, &local_err);
612
dd1ec1a4
VSO
613 if (s->drained) {
614 s->wait_drained_end = true;
615 while (s->drained) {
616 /*
617 * We may be entered once from nbd_client_attach_aio_context_bh
618 * and then from nbd_client_co_drain_end. So here is a loop.
619 */
620 qemu_coroutine_yield();
621 }
622 }
623 bdrv_inc_in_flight(s->bs);
624
fa35591b
VSO
625out:
626 s->connect_status = ret;
f7651539
VSO
627 error_free(s->connect_err);
628 s->connect_err = NULL;
629 error_propagate(&s->connect_err, local_err);
630
fa35591b
VSO
631 if (ret >= 0) {
632 /* successfully connected */
633 s->state = NBD_CLIENT_CONNECTED;
634 qemu_co_queue_restart_all(&s->free_sema);
f7651539 635 }
f7651539
VSO
636}
637
638static coroutine_fn void nbd_co_reconnect_loop(BDRVNBDState *s)
639{
f7651539
VSO
640 uint64_t timeout = 1 * NANOSECONDS_PER_SECOND;
641 uint64_t max_timeout = 16 * NANOSECONDS_PER_SECOND;
642
46f56631
VSO
643 if (s->state == NBD_CLIENT_CONNECTING_WAIT) {
644 reconnect_delay_timer_init(s, qemu_clock_get_ns(QEMU_CLOCK_REALTIME) +
645 s->reconnect_delay * NANOSECONDS_PER_SECOND);
646 }
647
f7651539
VSO
648 nbd_reconnect_attempt(s);
649
650 while (nbd_client_connecting(s)) {
f7651539
VSO
651 if (s->drained) {
652 bdrv_dec_in_flight(s->bs);
653 s->wait_drained_end = true;
654 while (s->drained) {
655 /*
656 * We may be entered once from nbd_client_attach_aio_context_bh
657 * and then from nbd_client_co_drain_end. So here is a loop.
658 */
659 qemu_coroutine_yield();
660 }
661 bdrv_inc_in_flight(s->bs);
12c75e20
VSO
662 } else {
663 qemu_co_sleep_ns_wakeable(QEMU_CLOCK_REALTIME, timeout,
664 &s->connection_co_sleep_ns_state);
99d72dba
VSO
665 if (s->drained) {
666 continue;
667 }
12c75e20
VSO
668 if (timeout < max_timeout) {
669 timeout *= 2;
670 }
f7651539
VSO
671 }
672
673 nbd_reconnect_attempt(s);
674 }
46f56631
VSO
675
676 reconnect_delay_timer_del(s);
86f8cdf3
VSO
677}
678
679static coroutine_fn void nbd_connection_entry(void *opaque)
680{
611ae1d7 681 BDRVNBDState *s = opaque;
86f8cdf3
VSO
682 uint64_t i;
683 int ret = 0;
684 Error *local_err = NULL;
685
a34b1e5e 686 while (s->state != NBD_CLIENT_QUIT) {
86f8cdf3
VSO
687 /*
688 * The NBD client can only really be considered idle when it has
689 * yielded from qio_channel_readv_all_eof(), waiting for data. This is
690 * the point where the additional scheduled coroutine entry happens
691 * after nbd_client_attach_aio_context().
692 *
693 * Therefore we keep an additional in_flight reference all the time and
694 * only drop it temporarily here.
695 */
f7651539
VSO
696
697 if (nbd_client_connecting(s)) {
698 nbd_co_reconnect_loop(s);
699 }
700
701 if (s->state != NBD_CLIENT_CONNECTED) {
702 continue;
703 }
704
86f8cdf3
VSO
705 assert(s->reply.handle == 0);
706 ret = nbd_receive_reply(s->bs, s->ioc, &s->reply, &local_err);
707
708 if (local_err) {
709 trace_nbd_read_reply_entry_fail(ret, error_get_pretty(local_err));
710 error_free(local_err);
f7651539 711 local_err = NULL;
86f8cdf3
VSO
712 }
713 if (ret <= 0) {
a34b1e5e 714 nbd_channel_error(s, ret ? ret : -EIO);
f7651539 715 continue;
86f8cdf3
VSO
716 }
717
718 /*
719 * There's no need for a mutex on the receive side, because the
720 * handler acts as a synchronization point and ensures that only
721 * one coroutine is called until the reply finishes.
722 */
723 i = HANDLE_TO_INDEX(s, s->reply.handle);
724 if (i >= MAX_NBD_REQUESTS ||
725 !s->requests[i].coroutine ||
726 !s->requests[i].receiving ||
727 (nbd_reply_is_structured(&s->reply) && !s->info.structured_reply))
728 {
a34b1e5e 729 nbd_channel_error(s, -EINVAL);
f7651539 730 continue;
86f8cdf3
VSO
731 }
732
733 /*
734 * We're woken up again by the request itself. Note that there
735 * is no race between yielding and reentering connection_co. This
736 * is because:
737 *
738 * - if the request runs on the same AioContext, it is only
739 * entered after we yield
740 *
741 * - if the request runs on a different AioContext, reentering
742 * connection_co happens through a bottom half, which can only
743 * run after we yield.
744 */
745 aio_co_wake(s->requests[i].coroutine);
746 qemu_coroutine_yield();
747 }
748
f7651539 749 qemu_co_queue_restart_all(&s->free_sema);
86f8cdf3
VSO
750 nbd_recv_coroutines_wake_all(s);
751 bdrv_dec_in_flight(s->bs);
752
753 s->connection_co = NULL;
f7651539 754 if (s->ioc) {
8a509afd 755 qio_channel_detach_aio_context(QIO_CHANNEL(s->ioc));
f7651539
VSO
756 object_unref(OBJECT(s->sioc));
757 s->sioc = NULL;
758 object_unref(OBJECT(s->ioc));
759 s->ioc = NULL;
760 }
761
78c81a3f
HR
762 if (s->teardown_co) {
763 aio_co_wake(s->teardown_co);
764 }
86f8cdf3
VSO
765 aio_wait_kick();
766}
767
768static int nbd_co_send_request(BlockDriverState *bs,
769 NBDRequest *request,
770 QEMUIOVector *qiov)
771{
611ae1d7 772 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
a34b1e5e 773 int rc, i = -1;
86f8cdf3
VSO
774
775 qemu_co_mutex_lock(&s->send_mutex);
f7651539 776 while (s->in_flight == MAX_NBD_REQUESTS || nbd_client_connecting_wait(s)) {
86f8cdf3
VSO
777 qemu_co_queue_wait(&s->free_sema, &s->send_mutex);
778 }
a34b1e5e
VSO
779
780 if (s->state != NBD_CLIENT_CONNECTED) {
781 rc = -EIO;
782 goto err;
783 }
784
86f8cdf3
VSO
785 s->in_flight++;
786
787 for (i = 0; i < MAX_NBD_REQUESTS; i++) {
788 if (s->requests[i].coroutine == NULL) {
789 break;
790 }
791 }
792
793 g_assert(qemu_in_coroutine());
794 assert(i < MAX_NBD_REQUESTS);
795
796 s->requests[i].coroutine = qemu_coroutine_self();
797 s->requests[i].offset = request->from;
798 s->requests[i].receiving = false;
799
800 request->handle = INDEX_TO_HANDLE(s, i);
801
86f8cdf3
VSO
802 assert(s->ioc);
803
804 if (qiov) {
805 qio_channel_set_cork(s->ioc, true);
806 rc = nbd_send_request(s->ioc, request);
a34b1e5e 807 if (rc >= 0 && s->state == NBD_CLIENT_CONNECTED) {
86f8cdf3
VSO
808 if (qio_channel_writev_all(s->ioc, qiov->iov, qiov->niov,
809 NULL) < 0) {
810 rc = -EIO;
811 }
812 } else if (rc >= 0) {
813 rc = -EIO;
814 }
815 qio_channel_set_cork(s->ioc, false);
816 } else {
817 rc = nbd_send_request(s->ioc, request);
818 }
819
820err:
821 if (rc < 0) {
a34b1e5e
VSO
822 nbd_channel_error(s, rc);
823 if (i != -1) {
824 s->requests[i].coroutine = NULL;
825 s->in_flight--;
826 }
f7651539
VSO
827 if (s->in_flight == 0 && s->wait_in_flight) {
828 aio_co_wake(s->connection_co);
829 } else {
830 qemu_co_queue_next(&s->free_sema);
831 }
86f8cdf3
VSO
832 }
833 qemu_co_mutex_unlock(&s->send_mutex);
834 return rc;
835}
836
837static inline uint16_t payload_advance16(uint8_t **payload)
838{
839 *payload += 2;
840 return lduw_be_p(*payload - 2);
841}
842
843static inline uint32_t payload_advance32(uint8_t **payload)
844{
845 *payload += 4;
846 return ldl_be_p(*payload - 4);
847}
848
849static inline uint64_t payload_advance64(uint8_t **payload)
850{
851 *payload += 8;
852 return ldq_be_p(*payload - 8);
853}
854
611ae1d7 855static int nbd_parse_offset_hole_payload(BDRVNBDState *s,
86f8cdf3
VSO
856 NBDStructuredReplyChunk *chunk,
857 uint8_t *payload, uint64_t orig_offset,
858 QEMUIOVector *qiov, Error **errp)
859{
860 uint64_t offset;
861 uint32_t hole_size;
862
863 if (chunk->length != sizeof(offset) + sizeof(hole_size)) {
864 error_setg(errp, "Protocol error: invalid payload for "
865 "NBD_REPLY_TYPE_OFFSET_HOLE");
866 return -EINVAL;
867 }
868
869 offset = payload_advance64(&payload);
870 hole_size = payload_advance32(&payload);
871
872 if (!hole_size || offset < orig_offset || hole_size > qiov->size ||
873 offset > orig_offset + qiov->size - hole_size) {
874 error_setg(errp, "Protocol error: server sent chunk exceeding requested"
875 " region");
876 return -EINVAL;
877 }
611ae1d7
VSO
878 if (s->info.min_block &&
879 !QEMU_IS_ALIGNED(hole_size, s->info.min_block)) {
86f8cdf3
VSO
880 trace_nbd_structured_read_compliance("hole");
881 }
882
883 qemu_iovec_memset(qiov, offset - orig_offset, 0, hole_size);
884
885 return 0;
886}
887
888/*
889 * nbd_parse_blockstatus_payload
890 * Based on our request, we expect only one extent in reply, for the
891 * base:allocation context.
892 */
611ae1d7 893static int nbd_parse_blockstatus_payload(BDRVNBDState *s,
86f8cdf3
VSO
894 NBDStructuredReplyChunk *chunk,
895 uint8_t *payload, uint64_t orig_length,
896 NBDExtent *extent, Error **errp)
897{
898 uint32_t context_id;
899
900 /* The server succeeded, so it must have sent [at least] one extent */
901 if (chunk->length < sizeof(context_id) + sizeof(*extent)) {
902 error_setg(errp, "Protocol error: invalid payload for "
903 "NBD_REPLY_TYPE_BLOCK_STATUS");
904 return -EINVAL;
905 }
906
907 context_id = payload_advance32(&payload);
611ae1d7 908 if (s->info.context_id != context_id) {
86f8cdf3
VSO
909 error_setg(errp, "Protocol error: unexpected context id %d for "
910 "NBD_REPLY_TYPE_BLOCK_STATUS, when negotiated context "
911 "id is %d", context_id,
611ae1d7 912 s->info.context_id);
86f8cdf3
VSO
913 return -EINVAL;
914 }
915
916 extent->length = payload_advance32(&payload);
917 extent->flags = payload_advance32(&payload);
918
919 if (extent->length == 0) {
920 error_setg(errp, "Protocol error: server sent status chunk with "
921 "zero length");
922 return -EINVAL;
923 }
924
925 /*
926 * A server sending unaligned block status is in violation of the
927 * protocol, but as qemu-nbd 3.1 is such a server (at least for
928 * POSIX files that are not a multiple of 512 bytes, since qemu
929 * rounds files up to 512-byte multiples but lseek(SEEK_HOLE)
930 * still sees an implicit hole beyond the real EOF), it's nicer to
931 * work around the misbehaving server. If the request included
932 * more than the final unaligned block, truncate it back to an
933 * aligned result; if the request was only the final block, round
934 * up to the full block and change the status to fully-allocated
935 * (always a safe status, even if it loses information).
936 */
611ae1d7
VSO
937 if (s->info.min_block && !QEMU_IS_ALIGNED(extent->length,
938 s->info.min_block)) {
86f8cdf3 939 trace_nbd_parse_blockstatus_compliance("extent length is unaligned");
611ae1d7 940 if (extent->length > s->info.min_block) {
86f8cdf3 941 extent->length = QEMU_ALIGN_DOWN(extent->length,
611ae1d7 942 s->info.min_block);
86f8cdf3 943 } else {
611ae1d7 944 extent->length = s->info.min_block;
86f8cdf3
VSO
945 extent->flags = 0;
946 }
947 }
948
949 /*
950 * We used NBD_CMD_FLAG_REQ_ONE, so the server should not have
951 * sent us any more than one extent, nor should it have included
952 * status beyond our request in that extent. However, it's easy
953 * enough to ignore the server's noncompliance without killing the
954 * connection; just ignore trailing extents, and clamp things to
955 * the length of our request.
956 */
957 if (chunk->length > sizeof(context_id) + sizeof(*extent)) {
958 trace_nbd_parse_blockstatus_compliance("more than one extent");
959 }
960 if (extent->length > orig_length) {
961 extent->length = orig_length;
962 trace_nbd_parse_blockstatus_compliance("extent length too large");
963 }
964
dbc7b014
EB
965 /*
966 * HACK: if we are using x-dirty-bitmaps to access
967 * qemu:allocation-depth, treat all depths > 2 the same as 2,
968 * since nbd_client_co_block_status is only expecting the low two
969 * bits to be set.
970 */
971 if (s->alloc_depth && extent->flags > 2) {
972 extent->flags = 2;
973 }
974
86f8cdf3
VSO
975 return 0;
976}
977
978/*
979 * nbd_parse_error_payload
980 * on success @errp contains message describing nbd error reply
981 */
982static int nbd_parse_error_payload(NBDStructuredReplyChunk *chunk,
983 uint8_t *payload, int *request_ret,
984 Error **errp)
985{
986 uint32_t error;
987 uint16_t message_size;
988
989 assert(chunk->type & (1 << 15));
990
991 if (chunk->length < sizeof(error) + sizeof(message_size)) {
992 error_setg(errp,
993 "Protocol error: invalid payload for structured error");
994 return -EINVAL;
995 }
996
997 error = nbd_errno_to_system_errno(payload_advance32(&payload));
998 if (error == 0) {
999 error_setg(errp, "Protocol error: server sent structured error chunk "
1000 "with error = 0");
1001 return -EINVAL;
1002 }
1003
1004 *request_ret = -error;
1005 message_size = payload_advance16(&payload);
1006
1007 if (message_size > chunk->length - sizeof(error) - sizeof(message_size)) {
1008 error_setg(errp, "Protocol error: server sent structured error chunk "
1009 "with incorrect message size");
1010 return -EINVAL;
1011 }
1012
1013 /* TODO: Add a trace point to mention the server complaint */
1014
1015 /* TODO handle ERROR_OFFSET */
1016
1017 return 0;
1018}
1019
611ae1d7 1020static int nbd_co_receive_offset_data_payload(BDRVNBDState *s,
86f8cdf3
VSO
1021 uint64_t orig_offset,
1022 QEMUIOVector *qiov, Error **errp)
1023{
1024 QEMUIOVector sub_qiov;
1025 uint64_t offset;
1026 size_t data_size;
1027 int ret;
1028 NBDStructuredReplyChunk *chunk = &s->reply.structured;
1029
1030 assert(nbd_reply_is_structured(&s->reply));
1031
1032 /* The NBD spec requires at least one byte of payload */
1033 if (chunk->length <= sizeof(offset)) {
1034 error_setg(errp, "Protocol error: invalid payload for "
1035 "NBD_REPLY_TYPE_OFFSET_DATA");
1036 return -EINVAL;
1037 }
1038
1039 if (nbd_read64(s->ioc, &offset, "OFFSET_DATA offset", errp) < 0) {
1040 return -EIO;
1041 }
1042
1043 data_size = chunk->length - sizeof(offset);
1044 assert(data_size);
1045 if (offset < orig_offset || data_size > qiov->size ||
1046 offset > orig_offset + qiov->size - data_size) {
1047 error_setg(errp, "Protocol error: server sent chunk exceeding requested"
1048 " region");
1049 return -EINVAL;
1050 }
1051 if (s->info.min_block && !QEMU_IS_ALIGNED(data_size, s->info.min_block)) {
1052 trace_nbd_structured_read_compliance("data");
1053 }
1054
1055 qemu_iovec_init(&sub_qiov, qiov->niov);
1056 qemu_iovec_concat(&sub_qiov, qiov, offset - orig_offset, data_size);
1057 ret = qio_channel_readv_all(s->ioc, sub_qiov.iov, sub_qiov.niov, errp);
1058 qemu_iovec_destroy(&sub_qiov);
1059
1060 return ret < 0 ? -EIO : 0;
1061}
1062
1063#define NBD_MAX_MALLOC_PAYLOAD 1000
1064static coroutine_fn int nbd_co_receive_structured_payload(
611ae1d7 1065 BDRVNBDState *s, void **payload, Error **errp)
86f8cdf3
VSO
1066{
1067 int ret;
1068 uint32_t len;
1069
1070 assert(nbd_reply_is_structured(&s->reply));
1071
1072 len = s->reply.structured.length;
1073
1074 if (len == 0) {
1075 return 0;
1076 }
1077
1078 if (payload == NULL) {
1079 error_setg(errp, "Unexpected structured payload");
1080 return -EINVAL;
1081 }
1082
1083 if (len > NBD_MAX_MALLOC_PAYLOAD) {
1084 error_setg(errp, "Payload too large");
1085 return -EINVAL;
1086 }
1087
1088 *payload = g_new(char, len);
1089 ret = nbd_read(s->ioc, *payload, len, "structured payload", errp);
1090 if (ret < 0) {
1091 g_free(*payload);
1092 *payload = NULL;
1093 return ret;
1094 }
1095
1096 return 0;
1097}
1098
1099/*
1100 * nbd_co_do_receive_one_chunk
1101 * for simple reply:
1102 * set request_ret to received reply error
1103 * if qiov is not NULL: read payload to @qiov
1104 * for structured reply chunk:
1105 * if error chunk: read payload, set @request_ret, do not set @payload
1106 * else if offset_data chunk: read payload data to @qiov, do not set @payload
1107 * else: read payload to @payload
1108 *
1109 * If function fails, @errp contains corresponding error message, and the
1110 * connection with the server is suspect. If it returns 0, then the
1111 * transaction succeeded (although @request_ret may be a negative errno
1112 * corresponding to the server's error reply), and errp is unchanged.
1113 */
1114static coroutine_fn int nbd_co_do_receive_one_chunk(
611ae1d7 1115 BDRVNBDState *s, uint64_t handle, bool only_structured,
86f8cdf3
VSO
1116 int *request_ret, QEMUIOVector *qiov, void **payload, Error **errp)
1117{
1118 int ret;
1119 int i = HANDLE_TO_INDEX(s, handle);
1120 void *local_payload = NULL;
1121 NBDStructuredReplyChunk *chunk;
1122
1123 if (payload) {
1124 *payload = NULL;
1125 }
1126 *request_ret = 0;
1127
1128 /* Wait until we're woken up by nbd_connection_entry. */
1129 s->requests[i].receiving = true;
1130 qemu_coroutine_yield();
1131 s->requests[i].receiving = false;
a34b1e5e 1132 if (s->state != NBD_CLIENT_CONNECTED) {
86f8cdf3
VSO
1133 error_setg(errp, "Connection closed");
1134 return -EIO;
1135 }
1136 assert(s->ioc);
1137
1138 assert(s->reply.handle == handle);
1139
1140 if (nbd_reply_is_simple(&s->reply)) {
1141 if (only_structured) {
1142 error_setg(errp, "Protocol error: simple reply when structured "
1143 "reply chunk was expected");
1144 return -EINVAL;
1145 }
1146
1147 *request_ret = -nbd_errno_to_system_errno(s->reply.simple.error);
1148 if (*request_ret < 0 || !qiov) {
1149 return 0;
1150 }
1151
1152 return qio_channel_readv_all(s->ioc, qiov->iov, qiov->niov,
1153 errp) < 0 ? -EIO : 0;
1154 }
1155
1156 /* handle structured reply chunk */
1157 assert(s->info.structured_reply);
1158 chunk = &s->reply.structured;
1159
1160 if (chunk->type == NBD_REPLY_TYPE_NONE) {
1161 if (!(chunk->flags & NBD_REPLY_FLAG_DONE)) {
1162 error_setg(errp, "Protocol error: NBD_REPLY_TYPE_NONE chunk without"
1163 " NBD_REPLY_FLAG_DONE flag set");
1164 return -EINVAL;
1165 }
1166 if (chunk->length) {
1167 error_setg(errp, "Protocol error: NBD_REPLY_TYPE_NONE chunk with"
1168 " nonzero length");
1169 return -EINVAL;
1170 }
1171 return 0;
1172 }
1173
1174 if (chunk->type == NBD_REPLY_TYPE_OFFSET_DATA) {
1175 if (!qiov) {
1176 error_setg(errp, "Unexpected NBD_REPLY_TYPE_OFFSET_DATA chunk");
1177 return -EINVAL;
1178 }
1179
1180 return nbd_co_receive_offset_data_payload(s, s->requests[i].offset,
1181 qiov, errp);
1182 }
1183
1184 if (nbd_reply_type_is_error(chunk->type)) {
1185 payload = &local_payload;
1186 }
1187
1188 ret = nbd_co_receive_structured_payload(s, payload, errp);
1189 if (ret < 0) {
1190 return ret;
1191 }
1192
1193 if (nbd_reply_type_is_error(chunk->type)) {
1194 ret = nbd_parse_error_payload(chunk, local_payload, request_ret, errp);
1195 g_free(local_payload);
1196 return ret;
1197 }
1198
1199 return 0;
1200}
1201
1202/*
1203 * nbd_co_receive_one_chunk
1204 * Read reply, wake up connection_co and set s->quit if needed.
1205 * Return value is a fatal error code or normal nbd reply error code
1206 */
1207static coroutine_fn int nbd_co_receive_one_chunk(
611ae1d7 1208 BDRVNBDState *s, uint64_t handle, bool only_structured,
86f8cdf3
VSO
1209 int *request_ret, QEMUIOVector *qiov, NBDReply *reply, void **payload,
1210 Error **errp)
1211{
1212 int ret = nbd_co_do_receive_one_chunk(s, handle, only_structured,
1213 request_ret, qiov, payload, errp);
1214
1215 if (ret < 0) {
5cf42b1c 1216 memset(reply, 0, sizeof(*reply));
a34b1e5e 1217 nbd_channel_error(s, ret);
86f8cdf3
VSO
1218 } else {
1219 /* For assert at loop start in nbd_connection_entry */
5cf42b1c 1220 *reply = s->reply;
86f8cdf3 1221 }
f7651539 1222 s->reply.handle = 0;
86f8cdf3 1223
f7651539
VSO
1224 if (s->connection_co && !s->wait_in_flight) {
1225 /*
1226 * We must check s->wait_in_flight, because we may entered by
1227 * nbd_recv_coroutines_wake_all(), in this case we should not
1228 * wake connection_co here, it will woken by last request.
1229 */
86f8cdf3
VSO
1230 aio_co_wake(s->connection_co);
1231 }
1232
1233 return ret;
1234}
1235
1236typedef struct NBDReplyChunkIter {
1237 int ret;
1238 int request_ret;
1239 Error *err;
1240 bool done, only_structured;
1241} NBDReplyChunkIter;
1242
1243static void nbd_iter_channel_error(NBDReplyChunkIter *iter,
1244 int ret, Error **local_err)
1245{
d9366135 1246 assert(local_err && *local_err);
86f8cdf3
VSO
1247 assert(ret < 0);
1248
1249 if (!iter->ret) {
1250 iter->ret = ret;
1251 error_propagate(&iter->err, *local_err);
1252 } else {
1253 error_free(*local_err);
1254 }
1255
1256 *local_err = NULL;
1257}
1258
1259static void nbd_iter_request_error(NBDReplyChunkIter *iter, int ret)
1260{
1261 assert(ret < 0);
1262
1263 if (!iter->request_ret) {
1264 iter->request_ret = ret;
1265 }
1266}
1267
1268/*
1269 * NBD_FOREACH_REPLY_CHUNK
1270 * The pointer stored in @payload requires g_free() to free it.
1271 */
1272#define NBD_FOREACH_REPLY_CHUNK(s, iter, handle, structured, \
1273 qiov, reply, payload) \
1274 for (iter = (NBDReplyChunkIter) { .only_structured = structured }; \
1275 nbd_reply_chunk_iter_receive(s, &iter, handle, qiov, reply, payload);)
1276
1277/*
1278 * nbd_reply_chunk_iter_receive
1279 * The pointer stored in @payload requires g_free() to free it.
1280 */
611ae1d7 1281static bool nbd_reply_chunk_iter_receive(BDRVNBDState *s,
86f8cdf3
VSO
1282 NBDReplyChunkIter *iter,
1283 uint64_t handle,
1284 QEMUIOVector *qiov, NBDReply *reply,
1285 void **payload)
1286{
1287 int ret, request_ret;
1288 NBDReply local_reply;
1289 NBDStructuredReplyChunk *chunk;
1290 Error *local_err = NULL;
a34b1e5e 1291 if (s->state != NBD_CLIENT_CONNECTED) {
86f8cdf3
VSO
1292 error_setg(&local_err, "Connection closed");
1293 nbd_iter_channel_error(iter, -EIO, &local_err);
1294 goto break_loop;
1295 }
1296
1297 if (iter->done) {
1298 /* Previous iteration was last. */
1299 goto break_loop;
1300 }
1301
1302 if (reply == NULL) {
1303 reply = &local_reply;
1304 }
1305
1306 ret = nbd_co_receive_one_chunk(s, handle, iter->only_structured,
1307 &request_ret, qiov, reply, payload,
1308 &local_err);
1309 if (ret < 0) {
1310 nbd_iter_channel_error(iter, ret, &local_err);
1311 } else if (request_ret < 0) {
1312 nbd_iter_request_error(iter, request_ret);
1313 }
1314
1315 /* Do not execute the body of NBD_FOREACH_REPLY_CHUNK for simple reply. */
a34b1e5e 1316 if (nbd_reply_is_simple(reply) || s->state != NBD_CLIENT_CONNECTED) {
86f8cdf3
VSO
1317 goto break_loop;
1318 }
1319
1320 chunk = &reply->structured;
1321 iter->only_structured = true;
1322
1323 if (chunk->type == NBD_REPLY_TYPE_NONE) {
1324 /* NBD_REPLY_FLAG_DONE is already checked in nbd_co_receive_one_chunk */
1325 assert(chunk->flags & NBD_REPLY_FLAG_DONE);
1326 goto break_loop;
1327 }
1328
1329 if (chunk->flags & NBD_REPLY_FLAG_DONE) {
1330 /* This iteration is last. */
1331 iter->done = true;
1332 }
1333
1334 /* Execute the loop body */
1335 return true;
1336
1337break_loop:
1338 s->requests[HANDLE_TO_INDEX(s, handle)].coroutine = NULL;
1339
1340 qemu_co_mutex_lock(&s->send_mutex);
1341 s->in_flight--;
f7651539
VSO
1342 if (s->in_flight == 0 && s->wait_in_flight) {
1343 aio_co_wake(s->connection_co);
1344 } else {
1345 qemu_co_queue_next(&s->free_sema);
1346 }
86f8cdf3
VSO
1347 qemu_co_mutex_unlock(&s->send_mutex);
1348
1349 return false;
1350}
1351
611ae1d7 1352static int nbd_co_receive_return_code(BDRVNBDState *s, uint64_t handle,
86f8cdf3
VSO
1353 int *request_ret, Error **errp)
1354{
1355 NBDReplyChunkIter iter;
1356
1357 NBD_FOREACH_REPLY_CHUNK(s, iter, handle, false, NULL, NULL, NULL) {
1358 /* nbd_reply_chunk_iter_receive does all the work */
1359 }
1360
1361 error_propagate(errp, iter.err);
1362 *request_ret = iter.request_ret;
1363 return iter.ret;
1364}
1365
611ae1d7 1366static int nbd_co_receive_cmdread_reply(BDRVNBDState *s, uint64_t handle,
86f8cdf3
VSO
1367 uint64_t offset, QEMUIOVector *qiov,
1368 int *request_ret, Error **errp)
1369{
1370 NBDReplyChunkIter iter;
1371 NBDReply reply;
1372 void *payload = NULL;
1373 Error *local_err = NULL;
1374
1375 NBD_FOREACH_REPLY_CHUNK(s, iter, handle, s->info.structured_reply,
1376 qiov, &reply, &payload)
1377 {
1378 int ret;
1379 NBDStructuredReplyChunk *chunk = &reply.structured;
1380
1381 assert(nbd_reply_is_structured(&reply));
1382
1383 switch (chunk->type) {
1384 case NBD_REPLY_TYPE_OFFSET_DATA:
1385 /*
1386 * special cased in nbd_co_receive_one_chunk, data is already
1387 * in qiov
1388 */
1389 break;
1390 case NBD_REPLY_TYPE_OFFSET_HOLE:
1391 ret = nbd_parse_offset_hole_payload(s, &reply.structured, payload,
1392 offset, qiov, &local_err);
1393 if (ret < 0) {
a34b1e5e 1394 nbd_channel_error(s, ret);
86f8cdf3
VSO
1395 nbd_iter_channel_error(&iter, ret, &local_err);
1396 }
1397 break;
1398 default:
1399 if (!nbd_reply_type_is_error(chunk->type)) {
1400 /* not allowed reply type */
a34b1e5e 1401 nbd_channel_error(s, -EINVAL);
86f8cdf3
VSO
1402 error_setg(&local_err,
1403 "Unexpected reply type: %d (%s) for CMD_READ",
1404 chunk->type, nbd_reply_type_lookup(chunk->type));
1405 nbd_iter_channel_error(&iter, -EINVAL, &local_err);
1406 }
1407 }
1408
1409 g_free(payload);
1410 payload = NULL;
1411 }
1412
1413 error_propagate(errp, iter.err);
1414 *request_ret = iter.request_ret;
1415 return iter.ret;
1416}
1417
611ae1d7 1418static int nbd_co_receive_blockstatus_reply(BDRVNBDState *s,
86f8cdf3
VSO
1419 uint64_t handle, uint64_t length,
1420 NBDExtent *extent,
1421 int *request_ret, Error **errp)
1422{
1423 NBDReplyChunkIter iter;
1424 NBDReply reply;
1425 void *payload = NULL;
1426 Error *local_err = NULL;
1427 bool received = false;
1428
1429 assert(!extent->length);
1430 NBD_FOREACH_REPLY_CHUNK(s, iter, handle, false, NULL, &reply, &payload) {
1431 int ret;
1432 NBDStructuredReplyChunk *chunk = &reply.structured;
1433
1434 assert(nbd_reply_is_structured(&reply));
1435
1436 switch (chunk->type) {
1437 case NBD_REPLY_TYPE_BLOCK_STATUS:
1438 if (received) {
a34b1e5e 1439 nbd_channel_error(s, -EINVAL);
86f8cdf3
VSO
1440 error_setg(&local_err, "Several BLOCK_STATUS chunks in reply");
1441 nbd_iter_channel_error(&iter, -EINVAL, &local_err);
1442 }
1443 received = true;
1444
1445 ret = nbd_parse_blockstatus_payload(s, &reply.structured,
1446 payload, length, extent,
1447 &local_err);
1448 if (ret < 0) {
a34b1e5e 1449 nbd_channel_error(s, ret);
86f8cdf3
VSO
1450 nbd_iter_channel_error(&iter, ret, &local_err);
1451 }
1452 break;
1453 default:
1454 if (!nbd_reply_type_is_error(chunk->type)) {
a34b1e5e 1455 nbd_channel_error(s, -EINVAL);
86f8cdf3
VSO
1456 error_setg(&local_err,
1457 "Unexpected reply type: %d (%s) "
1458 "for CMD_BLOCK_STATUS",
1459 chunk->type, nbd_reply_type_lookup(chunk->type));
1460 nbd_iter_channel_error(&iter, -EINVAL, &local_err);
1461 }
1462 }
1463
1464 g_free(payload);
1465 payload = NULL;
1466 }
1467
1468 if (!extent->length && !iter.request_ret) {
1469 error_setg(&local_err, "Server did not reply with any status extents");
1470 nbd_iter_channel_error(&iter, -EIO, &local_err);
1471 }
1472
1473 error_propagate(errp, iter.err);
1474 *request_ret = iter.request_ret;
1475 return iter.ret;
1476}
1477
1478static int nbd_co_request(BlockDriverState *bs, NBDRequest *request,
1479 QEMUIOVector *write_qiov)
1480{
1481 int ret, request_ret;
1482 Error *local_err = NULL;
611ae1d7 1483 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
86f8cdf3
VSO
1484
1485 assert(request->type != NBD_CMD_READ);
1486 if (write_qiov) {
1487 assert(request->type == NBD_CMD_WRITE);
1488 assert(request->len == iov_size(write_qiov->iov, write_qiov->niov));
1489 } else {
1490 assert(request->type != NBD_CMD_WRITE);
1491 }
86f8cdf3 1492
f7651539
VSO
1493 do {
1494 ret = nbd_co_send_request(bs, request, write_qiov);
1495 if (ret < 0) {
1496 continue;
1497 }
1498
1499 ret = nbd_co_receive_return_code(s, request->handle,
1500 &request_ret, &local_err);
1501 if (local_err) {
1502 trace_nbd_co_request_fail(request->from, request->len,
1503 request->handle, request->flags,
1504 request->type,
1505 nbd_cmd_lookup(request->type),
1506 ret, error_get_pretty(local_err));
1507 error_free(local_err);
1508 local_err = NULL;
1509 }
1510 } while (ret < 0 && nbd_client_connecting_wait(s));
1511
86f8cdf3
VSO
1512 return ret ? ret : request_ret;
1513}
1514
1515static int nbd_client_co_preadv(BlockDriverState *bs, uint64_t offset,
1516 uint64_t bytes, QEMUIOVector *qiov, int flags)
1517{
1518 int ret, request_ret;
1519 Error *local_err = NULL;
611ae1d7 1520 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
86f8cdf3
VSO
1521 NBDRequest request = {
1522 .type = NBD_CMD_READ,
1523 .from = offset,
1524 .len = bytes,
1525 };
1526
1527 assert(bytes <= NBD_MAX_BUFFER_SIZE);
1528 assert(!flags);
1529
1530 if (!bytes) {
1531 return 0;
1532 }
1533 /*
1534 * Work around the fact that the block layer doesn't do
1535 * byte-accurate sizing yet - if the read exceeds the server's
1536 * advertised size because the block layer rounded size up, then
1537 * truncate the request to the server and tail-pad with zero.
1538 */
611ae1d7 1539 if (offset >= s->info.size) {
86f8cdf3
VSO
1540 assert(bytes < BDRV_SECTOR_SIZE);
1541 qemu_iovec_memset(qiov, 0, 0, bytes);
1542 return 0;
1543 }
611ae1d7
VSO
1544 if (offset + bytes > s->info.size) {
1545 uint64_t slop = offset + bytes - s->info.size;
86f8cdf3
VSO
1546
1547 assert(slop < BDRV_SECTOR_SIZE);
1548 qemu_iovec_memset(qiov, bytes - slop, 0, slop);
1549 request.len -= slop;
1550 }
1551
f7651539
VSO
1552 do {
1553 ret = nbd_co_send_request(bs, &request, NULL);
1554 if (ret < 0) {
1555 continue;
1556 }
1557
1558 ret = nbd_co_receive_cmdread_reply(s, request.handle, offset, qiov,
1559 &request_ret, &local_err);
1560 if (local_err) {
1561 trace_nbd_co_request_fail(request.from, request.len, request.handle,
1562 request.flags, request.type,
1563 nbd_cmd_lookup(request.type),
1564 ret, error_get_pretty(local_err));
1565 error_free(local_err);
1566 local_err = NULL;
1567 }
1568 } while (ret < 0 && nbd_client_connecting_wait(s));
86f8cdf3 1569
86f8cdf3
VSO
1570 return ret ? ret : request_ret;
1571}
1572
1573static int nbd_client_co_pwritev(BlockDriverState *bs, uint64_t offset,
1574 uint64_t bytes, QEMUIOVector *qiov, int flags)
1575{
611ae1d7 1576 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
86f8cdf3
VSO
1577 NBDRequest request = {
1578 .type = NBD_CMD_WRITE,
1579 .from = offset,
1580 .len = bytes,
1581 };
1582
611ae1d7 1583 assert(!(s->info.flags & NBD_FLAG_READ_ONLY));
86f8cdf3 1584 if (flags & BDRV_REQ_FUA) {
611ae1d7 1585 assert(s->info.flags & NBD_FLAG_SEND_FUA);
86f8cdf3
VSO
1586 request.flags |= NBD_CMD_FLAG_FUA;
1587 }
1588
1589 assert(bytes <= NBD_MAX_BUFFER_SIZE);
1590
1591 if (!bytes) {
1592 return 0;
1593 }
1594 return nbd_co_request(bs, &request, qiov);
1595}
1596
1597static int nbd_client_co_pwrite_zeroes(BlockDriverState *bs, int64_t offset,
1598 int bytes, BdrvRequestFlags flags)
1599{
611ae1d7 1600 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
86f8cdf3
VSO
1601 NBDRequest request = {
1602 .type = NBD_CMD_WRITE_ZEROES,
1603 .from = offset,
1604 .len = bytes,
1605 };
1606
611ae1d7
VSO
1607 assert(!(s->info.flags & NBD_FLAG_READ_ONLY));
1608 if (!(s->info.flags & NBD_FLAG_SEND_WRITE_ZEROES)) {
86f8cdf3
VSO
1609 return -ENOTSUP;
1610 }
1611
1612 if (flags & BDRV_REQ_FUA) {
611ae1d7 1613 assert(s->info.flags & NBD_FLAG_SEND_FUA);
86f8cdf3
VSO
1614 request.flags |= NBD_CMD_FLAG_FUA;
1615 }
1616 if (!(flags & BDRV_REQ_MAY_UNMAP)) {
1617 request.flags |= NBD_CMD_FLAG_NO_HOLE;
1618 }
f061656c
EB
1619 if (flags & BDRV_REQ_NO_FALLBACK) {
1620 assert(s->info.flags & NBD_FLAG_SEND_FAST_ZERO);
1621 request.flags |= NBD_CMD_FLAG_FAST_ZERO;
1622 }
86f8cdf3
VSO
1623
1624 if (!bytes) {
1625 return 0;
1626 }
1627 return nbd_co_request(bs, &request, NULL);
1628}
1629
1630static int nbd_client_co_flush(BlockDriverState *bs)
1631{
611ae1d7 1632 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
86f8cdf3
VSO
1633 NBDRequest request = { .type = NBD_CMD_FLUSH };
1634
611ae1d7 1635 if (!(s->info.flags & NBD_FLAG_SEND_FLUSH)) {
86f8cdf3
VSO
1636 return 0;
1637 }
1638
1639 request.from = 0;
1640 request.len = 0;
1641
1642 return nbd_co_request(bs, &request, NULL);
1643}
1644
1645static int nbd_client_co_pdiscard(BlockDriverState *bs, int64_t offset,
1646 int bytes)
1647{
611ae1d7 1648 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
86f8cdf3
VSO
1649 NBDRequest request = {
1650 .type = NBD_CMD_TRIM,
1651 .from = offset,
1652 .len = bytes,
1653 };
1654
611ae1d7
VSO
1655 assert(!(s->info.flags & NBD_FLAG_READ_ONLY));
1656 if (!(s->info.flags & NBD_FLAG_SEND_TRIM) || !bytes) {
86f8cdf3
VSO
1657 return 0;
1658 }
1659
1660 return nbd_co_request(bs, &request, NULL);
1661}
1662
1663static int coroutine_fn nbd_client_co_block_status(
1664 BlockDriverState *bs, bool want_zero, int64_t offset, int64_t bytes,
1665 int64_t *pnum, int64_t *map, BlockDriverState **file)
1666{
1667 int ret, request_ret;
1668 NBDExtent extent = { 0 };
611ae1d7 1669 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
86f8cdf3
VSO
1670 Error *local_err = NULL;
1671
1672 NBDRequest request = {
1673 .type = NBD_CMD_BLOCK_STATUS,
1674 .from = offset,
6bf792b4 1675 .len = MIN(QEMU_ALIGN_DOWN(INT_MAX, bs->bl.request_alignment),
611ae1d7 1676 MIN(bytes, s->info.size - offset)),
86f8cdf3
VSO
1677 .flags = NBD_CMD_FLAG_REQ_ONE,
1678 };
1679
611ae1d7 1680 if (!s->info.base_allocation) {
86f8cdf3
VSO
1681 *pnum = bytes;
1682 *map = offset;
1683 *file = bs;
1684 return BDRV_BLOCK_DATA | BDRV_BLOCK_OFFSET_VALID;
1685 }
1686
1687 /*
1688 * Work around the fact that the block layer doesn't do
1689 * byte-accurate sizing yet - if the status request exceeds the
1690 * server's advertised size because the block layer rounded size
1691 * up, we truncated the request to the server (above), or are
1692 * called on just the hole.
1693 */
611ae1d7 1694 if (offset >= s->info.size) {
86f8cdf3
VSO
1695 *pnum = bytes;
1696 assert(bytes < BDRV_SECTOR_SIZE);
1697 /* Intentionally don't report offset_valid for the hole */
1698 return BDRV_BLOCK_ZERO;
1699 }
1700
611ae1d7
VSO
1701 if (s->info.min_block) {
1702 assert(QEMU_IS_ALIGNED(request.len, s->info.min_block));
86f8cdf3 1703 }
f7651539
VSO
1704 do {
1705 ret = nbd_co_send_request(bs, &request, NULL);
1706 if (ret < 0) {
1707 continue;
1708 }
1709
1710 ret = nbd_co_receive_blockstatus_reply(s, request.handle, bytes,
1711 &extent, &request_ret,
1712 &local_err);
1713 if (local_err) {
1714 trace_nbd_co_request_fail(request.from, request.len, request.handle,
1715 request.flags, request.type,
1716 nbd_cmd_lookup(request.type),
1717 ret, error_get_pretty(local_err));
1718 error_free(local_err);
1719 local_err = NULL;
1720 }
1721 } while (ret < 0 && nbd_client_connecting_wait(s));
86f8cdf3 1722
86f8cdf3
VSO
1723 if (ret < 0 || request_ret < 0) {
1724 return ret ? ret : request_ret;
1725 }
1726
1727 assert(extent.length);
1728 *pnum = extent.length;
1729 *map = offset;
1730 *file = bs;
1731 return (extent.flags & NBD_STATE_HOLE ? 0 : BDRV_BLOCK_DATA) |
1732 (extent.flags & NBD_STATE_ZERO ? BDRV_BLOCK_ZERO : 0) |
1733 BDRV_BLOCK_OFFSET_VALID;
1734}
1735
e99754b4
ML
1736static int nbd_client_reopen_prepare(BDRVReopenState *state,
1737 BlockReopenQueue *queue, Error **errp)
1738{
1739 BDRVNBDState *s = (BDRVNBDState *)state->bs->opaque;
1740
1741 if ((state->flags & BDRV_O_RDWR) && (s->info.flags & NBD_FLAG_READ_ONLY)) {
1742 error_setg(errp, "Can't reopen read-only NBD mount as read/write");
1743 return -EACCES;
1744 }
1745 return 0;
1746}
1747
86f8cdf3
VSO
1748static void nbd_client_close(BlockDriverState *bs)
1749{
611ae1d7 1750 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
86f8cdf3
VSO
1751 NBDRequest request = { .type = NBD_CMD_DISC };
1752
f7651539
VSO
1753 if (s->ioc) {
1754 nbd_send_request(s->ioc, &request);
1755 }
86f8cdf3
VSO
1756
1757 nbd_teardown_connection(bs);
1758}
1759
1760static QIOChannelSocket *nbd_establish_connection(SocketAddress *saddr,
1761 Error **errp)
1762{
795d946d 1763 ERRP_GUARD();
86f8cdf3 1764 QIOChannelSocket *sioc;
86f8cdf3
VSO
1765
1766 sioc = qio_channel_socket_new();
1767 qio_channel_set_name(QIO_CHANNEL(sioc), "nbd-client");
1768
795d946d
VSO
1769 qio_channel_socket_connect_sync(sioc, saddr, errp);
1770 if (*errp) {
86f8cdf3 1771 object_unref(OBJECT(sioc));
86f8cdf3
VSO
1772 return NULL;
1773 }
1774
1775 qio_channel_set_delay(QIO_CHANNEL(sioc), false);
1776
1777 return sioc;
1778}
1779
fa35591b
VSO
1780/* nbd_client_handshake takes ownership on sioc. On failure it is unref'ed. */
1781static int nbd_client_handshake(BlockDriverState *bs, QIOChannelSocket *sioc,
1782 Error **errp)
86f8cdf3 1783{
611ae1d7 1784 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
a8e2bb6a 1785 AioContext *aio_context = bdrv_get_aio_context(bs);
86f8cdf3
VSO
1786 int ret;
1787
fa35591b 1788 trace_nbd_client_handshake(s->export);
fbeb3e63
VSO
1789
1790 s->sioc = sioc;
1791
a8e2bb6a
VSO
1792 qio_channel_set_blocking(QIO_CHANNEL(sioc), false, NULL);
1793 qio_channel_attach_aio_context(QIO_CHANNEL(sioc), aio_context);
86f8cdf3 1794
611ae1d7
VSO
1795 s->info.request_sizes = true;
1796 s->info.structured_reply = true;
1797 s->info.base_allocation = true;
8f071c9d
VSO
1798 s->info.x_dirty_bitmap = g_strdup(s->x_dirty_bitmap);
1799 s->info.name = g_strdup(s->export ?: "");
1800 ret = nbd_receive_negotiate(aio_context, QIO_CHANNEL(sioc), s->tlscreds,
1801 s->hostname, &s->ioc, &s->info, errp);
611ae1d7
VSO
1802 g_free(s->info.x_dirty_bitmap);
1803 g_free(s->info.name);
86f8cdf3
VSO
1804 if (ret < 0) {
1805 object_unref(OBJECT(sioc));
fbeb3e63 1806 s->sioc = NULL;
86f8cdf3
VSO
1807 return ret;
1808 }
dbc7b014
EB
1809 if (s->x_dirty_bitmap) {
1810 if (!s->info.base_allocation) {
1811 error_setg(errp, "requested x-dirty-bitmap %s not found",
1812 s->x_dirty_bitmap);
1813 ret = -EINVAL;
1814 goto fail;
1815 }
1816 if (strcmp(s->x_dirty_bitmap, "qemu:allocation-depth") == 0) {
1817 s->alloc_depth = true;
1818 }
86f8cdf3 1819 }
611ae1d7 1820 if (s->info.flags & NBD_FLAG_READ_ONLY) {
86f8cdf3
VSO
1821 ret = bdrv_apply_auto_read_only(bs, "NBD export is read-only", errp);
1822 if (ret < 0) {
1823 goto fail;
1824 }
1825 }
611ae1d7 1826 if (s->info.flags & NBD_FLAG_SEND_FUA) {
86f8cdf3
VSO
1827 bs->supported_write_flags = BDRV_REQ_FUA;
1828 bs->supported_zero_flags |= BDRV_REQ_FUA;
1829 }
611ae1d7 1830 if (s->info.flags & NBD_FLAG_SEND_WRITE_ZEROES) {
86f8cdf3 1831 bs->supported_zero_flags |= BDRV_REQ_MAY_UNMAP;
f061656c
EB
1832 if (s->info.flags & NBD_FLAG_SEND_FAST_ZERO) {
1833 bs->supported_zero_flags |= BDRV_REQ_NO_FALLBACK;
1834 }
86f8cdf3
VSO
1835 }
1836
611ae1d7
VSO
1837 if (!s->ioc) {
1838 s->ioc = QIO_CHANNEL(sioc);
1839 object_ref(OBJECT(s->ioc));
86f8cdf3
VSO
1840 }
1841
fa35591b 1842 trace_nbd_client_handshake_success(s->export);
86f8cdf3
VSO
1843
1844 return 0;
1845
1846 fail:
1847 /*
a8e2bb6a
VSO
1848 * We have connected, but must fail for other reasons.
1849 * Send NBD_CMD_DISC as a courtesy to the server.
86f8cdf3
VSO
1850 */
1851 {
1852 NBDRequest request = { .type = NBD_CMD_DISC };
1853
611ae1d7 1854 nbd_send_request(s->ioc ?: QIO_CHANNEL(sioc), &request);
86f8cdf3
VSO
1855
1856 object_unref(OBJECT(sioc));
fbeb3e63 1857 s->sioc = NULL;
86f8cdf3
VSO
1858
1859 return ret;
1860 }
1861}
1862
8f071c9d
VSO
1863/*
1864 * Parse nbd_open options
1865 */
86f8cdf3 1866
f53a1feb 1867static int nbd_parse_uri(const char *filename, QDict *options)
1d7d2a9d
PB
1868{
1869 URI *uri;
1870 const char *p;
1871 QueryParams *qp = NULL;
1872 int ret = 0;
f53a1feb 1873 bool is_unix;
1d7d2a9d
PB
1874
1875 uri = uri_parse(filename);
1876 if (!uri) {
1877 return -EINVAL;
1878 }
1879
1880 /* transport */
f69165a8 1881 if (!g_strcmp0(uri->scheme, "nbd")) {
f53a1feb 1882 is_unix = false;
f69165a8 1883 } else if (!g_strcmp0(uri->scheme, "nbd+tcp")) {
f53a1feb 1884 is_unix = false;
f69165a8 1885 } else if (!g_strcmp0(uri->scheme, "nbd+unix")) {
f53a1feb 1886 is_unix = true;
1d7d2a9d
PB
1887 } else {
1888 ret = -EINVAL;
1889 goto out;
1890 }
1891
2485f22f
EB
1892 p = uri->path ? uri->path : "";
1893 if (p[0] == '/') {
1894 p++;
1895 }
1d7d2a9d 1896 if (p[0]) {
46f5ac20 1897 qdict_put_str(options, "export", p);
1d7d2a9d
PB
1898 }
1899
1900 qp = query_params_parse(uri->query);
f53a1feb 1901 if (qp->n > 1 || (is_unix && !qp->n) || (!is_unix && qp->n)) {
1d7d2a9d
PB
1902 ret = -EINVAL;
1903 goto out;
1904 }
1905
f53a1feb 1906 if (is_unix) {
1d7d2a9d
PB
1907 /* nbd+unix:///export?socket=path */
1908 if (uri->server || uri->port || strcmp(qp->p[0].name, "socket")) {
1909 ret = -EINVAL;
1910 goto out;
1911 }
46f5ac20
EB
1912 qdict_put_str(options, "server.type", "unix");
1913 qdict_put_str(options, "server.path", qp->p[0].value);
1d7d2a9d 1914 } else {
23307908 1915 QString *host;
f84d431b
HR
1916 char *port_str;
1917
bebbf7fa 1918 /* nbd[+tcp]://host[:port]/export */
1d7d2a9d
PB
1919 if (!uri->server) {
1920 ret = -EINVAL;
1921 goto out;
1922 }
f17c90be 1923
23307908
JT
1924 /* strip braces from literal IPv6 address */
1925 if (uri->server[0] == '[') {
1926 host = qstring_from_substr(uri->server, 1,
ba891d68 1927 strlen(uri->server) - 1);
23307908
JT
1928 } else {
1929 host = qstring_from_str(uri->server);
1930 }
1931
46f5ac20 1932 qdict_put_str(options, "server.type", "inet");
9445673e 1933 qdict_put(options, "server.host", host);
f84d431b
HR
1934
1935 port_str = g_strdup_printf("%d", uri->port ?: NBD_DEFAULT_PORT);
46f5ac20 1936 qdict_put_str(options, "server.port", port_str);
f84d431b 1937 g_free(port_str);
1d7d2a9d
PB
1938 }
1939
1940out:
1941 if (qp) {
1942 query_params_free(qp);
1943 }
1944 uri_free(uri);
1945 return ret;
1946}
1947
48c38e0b
HR
1948static bool nbd_has_filename_options_conflict(QDict *options, Error **errp)
1949{
1950 const QDictEntry *e;
1951
1952 for (e = qdict_first(options); e; e = qdict_next(options, e)) {
1953 if (!strcmp(e->key, "host") ||
1954 !strcmp(e->key, "port") ||
1955 !strcmp(e->key, "path") ||
491d6c7c
HR
1956 !strcmp(e->key, "export") ||
1957 strstart(e->key, "server.", NULL))
48c38e0b
HR
1958 {
1959 error_setg(errp, "Option '%s' cannot be used with a file name",
1960 e->key);
1961 return true;
1962 }
1963 }
1964
1965 return false;
1966}
1967
6963a30d
KW
1968static void nbd_parse_filename(const char *filename, QDict *options,
1969 Error **errp)
75818250 1970{
df18c04e 1971 g_autofree char *file = NULL;
33897dc7
NT
1972 char *export_name;
1973 const char *host_spec;
75818250 1974 const char *unixpath;
75818250 1975
48c38e0b 1976 if (nbd_has_filename_options_conflict(options, errp)) {
681e7ad0
KW
1977 return;
1978 }
1979
1d7d2a9d 1980 if (strstr(filename, "://")) {
6963a30d
KW
1981 int ret = nbd_parse_uri(filename, options);
1982 if (ret < 0) {
1983 error_setg(errp, "No valid URL specified");
1984 }
1985 return;
1d7d2a9d
PB
1986 }
1987
7267c094 1988 file = g_strdup(filename);
1d45f8b5 1989
33897dc7
NT
1990 export_name = strstr(file, EN_OPTSTR);
1991 if (export_name) {
1992 if (export_name[strlen(EN_OPTSTR)] == 0) {
df18c04e 1993 return;
1d45f8b5 1994 }
33897dc7
NT
1995 export_name[0] = 0; /* truncate 'file' */
1996 export_name += strlen(EN_OPTSTR);
f53a1feb 1997
46f5ac20 1998 qdict_put_str(options, "export", export_name);
1d45f8b5
LV
1999 }
2000
33897dc7
NT
2001 /* extract the host_spec - fail if it's not nbd:... */
2002 if (!strstart(file, "nbd:", &host_spec)) {
6963a30d 2003 error_setg(errp, "File name string for NBD must start with 'nbd:'");
df18c04e 2004 return;
1d45f8b5 2005 }
75818250 2006
f53a1feb 2007 if (!*host_spec) {
df18c04e 2008 return;
f53a1feb
KW
2009 }
2010
33897dc7
NT
2011 /* are we a UNIX or TCP socket? */
2012 if (strstart(host_spec, "unix:", &unixpath)) {
46f5ac20
EB
2013 qdict_put_str(options, "server.type", "unix");
2014 qdict_put_str(options, "server.path", unixpath);
75818250 2015 } else {
0785bd7a 2016 InetSocketAddress *addr = g_new(InetSocketAddress, 1);
f53a1feb 2017
0785bd7a
MA
2018 if (inet_parse(addr, host_spec, errp)) {
2019 goto out_inet;
f17c90be 2020 }
75818250 2021
46f5ac20
EB
2022 qdict_put_str(options, "server.type", "inet");
2023 qdict_put_str(options, "server.host", addr->host);
2024 qdict_put_str(options, "server.port", addr->port);
0785bd7a 2025 out_inet:
f53a1feb
KW
2026 qapi_free_InetSocketAddress(addr);
2027 }
f53a1feb
KW
2028}
2029
491d6c7c
HR
2030static bool nbd_process_legacy_socket_options(QDict *output_options,
2031 QemuOpts *legacy_opts,
2032 Error **errp)
f53a1feb 2033{
491d6c7c
HR
2034 const char *path = qemu_opt_get(legacy_opts, "path");
2035 const char *host = qemu_opt_get(legacy_opts, "host");
2036 const char *port = qemu_opt_get(legacy_opts, "port");
2037 const QDictEntry *e;
f53a1feb 2038
491d6c7c
HR
2039 if (!path && !host && !port) {
2040 return true;
2041 }
03504d05 2042
491d6c7c
HR
2043 for (e = qdict_first(output_options); e; e = qdict_next(output_options, e))
2044 {
2045 if (strstart(e->key, "server.", NULL)) {
2046 error_setg(errp, "Cannot use 'server' and path/host/port at the "
2047 "same time");
2048 return false;
681e7ad0 2049 }
33897dc7 2050 }
491d6c7c
HR
2051
2052 if (path && host) {
2053 error_setg(errp, "path and host may not be used at the same time");
2054 return false;
2055 } else if (path) {
2056 if (port) {
2057 error_setg(errp, "port may not be used without host");
2058 return false;
2059 }
2060
46f5ac20
EB
2061 qdict_put_str(output_options, "server.type", "unix");
2062 qdict_put_str(output_options, "server.path", path);
491d6c7c 2063 } else if (host) {
46f5ac20
EB
2064 qdict_put_str(output_options, "server.type", "inet");
2065 qdict_put_str(output_options, "server.host", host);
2066 qdict_put_str(output_options, "server.port",
2067 port ?: stringify(NBD_DEFAULT_PORT));
442045cb 2068 }
f53a1feb 2069
491d6c7c
HR
2070 return true;
2071}
f53a1feb 2072
62cf396b
MA
2073static SocketAddress *nbd_config(BDRVNBDState *s, QDict *options,
2074 Error **errp)
491d6c7c 2075{
62cf396b 2076 SocketAddress *saddr = NULL;
491d6c7c 2077 QDict *addr = NULL;
491d6c7c 2078 Visitor *iv = NULL;
491d6c7c
HR
2079
2080 qdict_extract_subqdict(options, &addr, "server.");
2081 if (!qdict_size(addr)) {
2082 error_setg(errp, "NBD server address missing");
2083 goto done;
f53a1feb
KW
2084 }
2085
af91062e
MA
2086 iv = qobject_input_visitor_new_flat_confused(addr, errp);
2087 if (!iv) {
491d6c7c
HR
2088 goto done;
2089 }
bebbf7fa 2090
af175e85 2091 if (!visit_type_SocketAddress(iv, NULL, &saddr, errp)) {
491d6c7c
HR
2092 goto done;
2093 }
7a5ed437 2094
491d6c7c 2095done:
cb3e7f08 2096 qobject_unref(addr);
491d6c7c 2097 visit_free(iv);
7a5ed437 2098 return saddr;
33897dc7 2099}
1d45f8b5 2100
75822a12
DB
2101static QCryptoTLSCreds *nbd_get_tls_creds(const char *id, Error **errp)
2102{
2103 Object *obj;
2104 QCryptoTLSCreds *creds;
2105
2106 obj = object_resolve_path_component(
2107 object_get_objects_root(), id);
2108 if (!obj) {
2109 error_setg(errp, "No TLS credentials with id '%s'",
2110 id);
2111 return NULL;
2112 }
2113 creds = (QCryptoTLSCreds *)
2114 object_dynamic_cast(obj, TYPE_QCRYPTO_TLS_CREDS);
2115 if (!creds) {
2116 error_setg(errp, "Object with id '%s' is not TLS credentials",
2117 id);
2118 return NULL;
2119 }
2120
2121 if (creds->endpoint != QCRYPTO_TLS_CREDS_ENDPOINT_CLIENT) {
2122 error_setg(errp,
2123 "Expecting TLS credentials with a client endpoint");
2124 return NULL;
2125 }
2126 object_ref(obj);
2127 return creds;
2128}
2129
2130
7ccc44fd
HR
2131static QemuOptsList nbd_runtime_opts = {
2132 .name = "nbd",
2133 .head = QTAILQ_HEAD_INITIALIZER(nbd_runtime_opts.head),
2134 .desc = {
2135 {
2136 .name = "host",
2137 .type = QEMU_OPT_STRING,
2138 .help = "TCP host to connect to",
2139 },
2140 {
2141 .name = "port",
2142 .type = QEMU_OPT_STRING,
2143 .help = "TCP port to connect to",
2144 },
2145 {
2146 .name = "path",
2147 .type = QEMU_OPT_STRING,
2148 .help = "Unix socket path to connect to",
2149 },
2150 {
2151 .name = "export",
2152 .type = QEMU_OPT_STRING,
2153 .help = "Name of the NBD export to open",
2154 },
2155 {
2156 .name = "tls-creds",
2157 .type = QEMU_OPT_STRING,
2158 .help = "ID of the TLS credentials to use",
2159 },
216ee365
EB
2160 {
2161 .name = "x-dirty-bitmap",
2162 .type = QEMU_OPT_STRING,
2163 .help = "experimental: expose named dirty bitmap in place of "
2164 "block status",
2165 },
b172ae2e
VSO
2166 {
2167 .name = "reconnect-delay",
2168 .type = QEMU_OPT_NUMBER,
2169 .help = "On an unexpected disconnect, the nbd client tries to "
2170 "connect again until succeeding or encountering a serious "
2171 "error. During the first @reconnect-delay seconds, all "
2172 "requests are paused and will be rerun on a successful "
2173 "reconnect. After that time, any delayed requests and all "
2174 "future requests before a successful reconnect will "
2175 "immediately fail. Default 0",
2176 },
c4365735 2177 { /* end of list */ }
7ccc44fd
HR
2178 },
2179};
2180
8f071c9d
VSO
2181static int nbd_process_options(BlockDriverState *bs, QDict *options,
2182 Error **errp)
33897dc7
NT
2183{
2184 BDRVNBDState *s = bs->opaque;
8f071c9d 2185 QemuOpts *opts;
75822a12 2186 int ret = -EINVAL;
ae255e52 2187
7ccc44fd 2188 opts = qemu_opts_create(&nbd_runtime_opts, NULL, 0, &error_abort);
af175e85 2189 if (!qemu_opts_absorb_qdict(opts, options, errp)) {
7ccc44fd
HR
2190 goto error;
2191 }
2192
62cf396b 2193 /* Translate @host, @port, and @path to a SocketAddress */
491d6c7c
HR
2194 if (!nbd_process_legacy_socket_options(options, opts, errp)) {
2195 goto error;
2196 }
2197
33897dc7 2198 /* Pop the config into our state object. Exit if invalid. */
491d6c7c
HR
2199 s->saddr = nbd_config(s, options, errp);
2200 if (!s->saddr) {
75822a12
DB
2201 goto error;
2202 }
2203
491d6c7c 2204 s->export = g_strdup(qemu_opt_get(opts, "export"));
93676c88
EB
2205 if (s->export && strlen(s->export) > NBD_MAX_STRING_SIZE) {
2206 error_setg(errp, "export name too long to send to server");
2207 goto error;
2208 }
491d6c7c 2209
03504d05
HR
2210 s->tlscredsid = g_strdup(qemu_opt_get(opts, "tls-creds"));
2211 if (s->tlscredsid) {
8f071c9d
VSO
2212 s->tlscreds = nbd_get_tls_creds(s->tlscredsid, errp);
2213 if (!s->tlscreds) {
75822a12
DB
2214 goto error;
2215 }
2216
ca0b64e5 2217 /* TODO SOCKET_ADDRESS_KIND_FD where fd has AF_INET or AF_INET6 */
62cf396b 2218 if (s->saddr->type != SOCKET_ADDRESS_TYPE_INET) {
75822a12
DB
2219 error_setg(errp, "TLS only supported over IP sockets");
2220 goto error;
2221 }
8f071c9d 2222 s->hostname = s->saddr->u.inet.host;
33897dc7
NT
2223 }
2224
8f071c9d 2225 s->x_dirty_bitmap = g_strdup(qemu_opt_get(opts, "x-dirty-bitmap"));
93676c88
EB
2226 if (s->x_dirty_bitmap && strlen(s->x_dirty_bitmap) > NBD_MAX_STRING_SIZE) {
2227 error_setg(errp, "x-dirty-bitmap query too long to send to server");
2228 goto error;
2229 }
2230
8f071c9d
VSO
2231 s->reconnect_delay = qemu_opt_get_number(opts, "reconnect-delay", 0);
2232
2233 ret = 0;
d42f78e9 2234
75822a12 2235 error:
03504d05 2236 if (ret < 0) {
7f493662 2237 nbd_clear_bdrvstate(s);
03504d05 2238 }
7ccc44fd 2239 qemu_opts_del(opts);
75822a12 2240 return ret;
e183ef75
PB
2241}
2242
8f071c9d
VSO
2243static int nbd_open(BlockDriverState *bs, QDict *options, int flags,
2244 Error **errp)
2245{
2246 int ret;
2247 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
fa35591b 2248 QIOChannelSocket *sioc;
8f071c9d
VSO
2249
2250 ret = nbd_process_options(bs, options, errp);
2251 if (ret < 0) {
2252 return ret;
2253 }
2254
2255 s->bs = bs;
2256 qemu_co_mutex_init(&s->send_mutex);
2257 qemu_co_queue_init(&s->free_sema);
2258
fa35591b
VSO
2259 /*
2260 * establish TCP connection, return error if it fails
2261 * TODO: Configurable retry-until-timeout behaviour.
2262 */
2263 sioc = nbd_establish_connection(s->saddr, errp);
2264 if (!sioc) {
2265 return -ECONNREFUSED;
2266 }
2267
2268 ret = nbd_client_handshake(bs, sioc, errp);
8f071c9d 2269 if (ret < 0) {
8198cf5e 2270 nbd_clear_bdrvstate(s);
8f071c9d
VSO
2271 return ret;
2272 }
2273 /* successfully connected */
2274 s->state = NBD_CLIENT_CONNECTED;
2275
1dc4718d
VSO
2276 nbd_init_connect_thread(s);
2277
8f071c9d
VSO
2278 s->connection_co = qemu_coroutine_create(nbd_connection_entry, s);
2279 bdrv_inc_in_flight(bs);
2280 aio_co_schedule(bdrv_get_aio_context(bs), s->connection_co);
2281
2282 return 0;
2283}
2284
1486d04a
PB
2285static int nbd_co_flush(BlockDriverState *bs)
2286{
f53a829b 2287 return nbd_client_co_flush(bs);
1486d04a
PB
2288}
2289
fa21e6fa
DL
2290static void nbd_refresh_limits(BlockDriverState *bs, Error **errp)
2291{
611ae1d7 2292 BDRVNBDState *s = (BDRVNBDState *)bs->opaque;
fd8d372d 2293 uint32_t min = s->info.min_block;
081dd1fe
EB
2294 uint32_t max = MIN_NON_ZERO(NBD_MAX_BUFFER_SIZE, s->info.max_block);
2295
7da537f7
EB
2296 /*
2297 * If the server did not advertise an alignment:
2298 * - a size that is not sector-aligned implies that an alignment
2299 * of 1 can be used to access those tail bytes
2300 * - advertisement of block status requires an alignment of 1, so
2301 * that we don't violate block layer constraints that block
2302 * status is always aligned (as we can't control whether the
2303 * server will report sub-sector extents, such as a hole at EOF
2304 * on an unaligned POSIX file)
2305 * - otherwise, assume the server is so old that we are safer avoiding
2306 * sub-sector requests
2307 */
2308 if (!min) {
2309 min = (!QEMU_IS_ALIGNED(s->info.size, BDRV_SECTOR_SIZE) ||
2310 s->info.base_allocation) ? 1 : BDRV_SECTOR_SIZE;
2311 }
2312
2313 bs->bl.request_alignment = min;
714eb0db 2314 bs->bl.max_pdiscard = QEMU_ALIGN_DOWN(INT_MAX, min);
081dd1fe
EB
2315 bs->bl.max_pwrite_zeroes = max;
2316 bs->bl.max_transfer = max;
2317
2318 if (s->info.opt_block &&
2319 s->info.opt_block > bs->bl.opt_transfer) {
2320 bs->bl.opt_transfer = s->info.opt_block;
2321 }
fa21e6fa
DL
2322}
2323
75818250
TS
2324static void nbd_close(BlockDriverState *bs)
2325{
03504d05
HR
2326 BDRVNBDState *s = bs->opaque;
2327
f53a829b 2328 nbd_client_close(bs);
7f493662 2329 nbd_clear_bdrvstate(s);
75818250
TS
2330}
2331
a2b333c0
NS
2332/*
2333 * NBD cannot truncate, but if the caller asks to truncate to the same size, or
2334 * to a smaller size with exact=false, there is no reason to fail the
2335 * operation.
2336 *
2337 * Preallocation mode is ignored since it does not seems useful to fail when
2338 * we never change anything.
2339 */
2340static int coroutine_fn nbd_co_truncate(BlockDriverState *bs, int64_t offset,
2341 bool exact, PreallocMode prealloc,
2342 BdrvRequestFlags flags, Error **errp)
2343{
2344 BDRVNBDState *s = bs->opaque;
2345
2346 if (offset != s->info.size && exact) {
2347 error_setg(errp, "Cannot resize NBD nodes");
2348 return -ENOTSUP;
2349 }
2350
2351 if (offset > s->info.size) {
2352 error_setg(errp, "Cannot grow NBD nodes");
2353 return -EINVAL;
2354 }
2355
2356 return 0;
2357}
2358
75818250
TS
2359static int64_t nbd_getlength(BlockDriverState *bs)
2360{
2361 BDRVNBDState *s = bs->opaque;
2362
611ae1d7 2363 return s->info.size;
75818250
TS
2364}
2365
998b3a1e 2366static void nbd_refresh_filename(BlockDriverState *bs)
2019d68b 2367{
03504d05 2368 BDRVNBDState *s = bs->opaque;
491d6c7c 2369 const char *host = NULL, *port = NULL, *path = NULL;
5c86bdf1 2370 size_t len = 0;
491d6c7c 2371
62cf396b 2372 if (s->saddr->type == SOCKET_ADDRESS_TYPE_INET) {
9445673e 2373 const InetSocketAddress *inet = &s->saddr->u.inet;
491d6c7c
HR
2374 if (!inet->has_ipv4 && !inet->has_ipv6 && !inet->has_to) {
2375 host = inet->host;
2376 port = inet->port;
2377 }
62cf396b 2378 } else if (s->saddr->type == SOCKET_ADDRESS_TYPE_UNIX) {
9445673e
MA
2379 path = s->saddr->u.q_unix.path;
2380 } /* else can't represent as pseudo-filename */
2019d68b 2381
491d6c7c 2382 if (path && s->export) {
5c86bdf1
EB
2383 len = snprintf(bs->exact_filename, sizeof(bs->exact_filename),
2384 "nbd+unix:///%s?socket=%s", s->export, path);
491d6c7c 2385 } else if (path && !s->export) {
5c86bdf1
EB
2386 len = snprintf(bs->exact_filename, sizeof(bs->exact_filename),
2387 "nbd+unix://?socket=%s", path);
491d6c7c 2388 } else if (host && s->export) {
5c86bdf1
EB
2389 len = snprintf(bs->exact_filename, sizeof(bs->exact_filename),
2390 "nbd://%s:%s/%s", host, port, s->export);
491d6c7c 2391 } else if (host && !s->export) {
5c86bdf1
EB
2392 len = snprintf(bs->exact_filename, sizeof(bs->exact_filename),
2393 "nbd://%s:%s", host, port);
2394 }
00d69986 2395 if (len >= sizeof(bs->exact_filename)) {
5c86bdf1
EB
2396 /* Name is too long to represent exactly, so leave it empty. */
2397 bs->exact_filename[0] = '\0';
ec0de768 2398 }
2019d68b
HR
2399}
2400
8a6239c0
HR
2401static char *nbd_dirname(BlockDriverState *bs, Error **errp)
2402{
2403 /* The generic bdrv_dirname() implementation is able to work out some
2404 * directory name for NBD nodes, but that would be wrong. So far there is no
2405 * specification for how "export paths" would work, so NBD does not have
2406 * directory names. */
2407 error_setg(errp, "Cannot generate a base directory for NBD nodes");
2408 return NULL;
2409}
2410
2654267c
HR
2411static const char *const nbd_strong_runtime_opts[] = {
2412 "path",
2413 "host",
2414 "port",
2415 "export",
2416 "tls-creds",
2417 "server.",
2418
2419 NULL
2420};
2421
5efa9d5a 2422static BlockDriver bdrv_nbd = {
69447cd8
SH
2423 .format_name = "nbd",
2424 .protocol_name = "nbd",
2425 .instance_size = sizeof(BDRVNBDState),
2426 .bdrv_parse_filename = nbd_parse_filename,
5a5e7f8c
ML
2427 .bdrv_co_create_opts = bdrv_co_create_opts_simple,
2428 .create_opts = &bdrv_create_opts_simple,
69447cd8 2429 .bdrv_file_open = nbd_open,
e99754b4 2430 .bdrv_reopen_prepare = nbd_client_reopen_prepare,
70c4fb26
EB
2431 .bdrv_co_preadv = nbd_client_co_preadv,
2432 .bdrv_co_pwritev = nbd_client_co_pwritev,
fa778fff 2433 .bdrv_co_pwrite_zeroes = nbd_client_co_pwrite_zeroes,
69447cd8
SH
2434 .bdrv_close = nbd_close,
2435 .bdrv_co_flush_to_os = nbd_co_flush,
447e57c3 2436 .bdrv_co_pdiscard = nbd_client_co_pdiscard,
fa21e6fa 2437 .bdrv_refresh_limits = nbd_refresh_limits,
a2b333c0 2438 .bdrv_co_truncate = nbd_co_truncate,
69447cd8 2439 .bdrv_getlength = nbd_getlength,
86f8cdf3
VSO
2440 .bdrv_detach_aio_context = nbd_client_detach_aio_context,
2441 .bdrv_attach_aio_context = nbd_client_attach_aio_context,
f7651539
VSO
2442 .bdrv_co_drain_begin = nbd_client_co_drain_begin,
2443 .bdrv_co_drain_end = nbd_client_co_drain_end,
2019d68b 2444 .bdrv_refresh_filename = nbd_refresh_filename,
78a33ab5 2445 .bdrv_co_block_status = nbd_client_co_block_status,
8a6239c0 2446 .bdrv_dirname = nbd_dirname,
2654267c 2447 .strong_runtime_opts = nbd_strong_runtime_opts,
1d7d2a9d
PB
2448};
2449
2450static BlockDriver bdrv_nbd_tcp = {
69447cd8
SH
2451 .format_name = "nbd",
2452 .protocol_name = "nbd+tcp",
2453 .instance_size = sizeof(BDRVNBDState),
2454 .bdrv_parse_filename = nbd_parse_filename,
5a5e7f8c
ML
2455 .bdrv_co_create_opts = bdrv_co_create_opts_simple,
2456 .create_opts = &bdrv_create_opts_simple,
69447cd8 2457 .bdrv_file_open = nbd_open,
e99754b4 2458 .bdrv_reopen_prepare = nbd_client_reopen_prepare,
70c4fb26
EB
2459 .bdrv_co_preadv = nbd_client_co_preadv,
2460 .bdrv_co_pwritev = nbd_client_co_pwritev,
fa778fff 2461 .bdrv_co_pwrite_zeroes = nbd_client_co_pwrite_zeroes,
69447cd8
SH
2462 .bdrv_close = nbd_close,
2463 .bdrv_co_flush_to_os = nbd_co_flush,
447e57c3 2464 .bdrv_co_pdiscard = nbd_client_co_pdiscard,
fa21e6fa 2465 .bdrv_refresh_limits = nbd_refresh_limits,
a2b333c0 2466 .bdrv_co_truncate = nbd_co_truncate,
69447cd8 2467 .bdrv_getlength = nbd_getlength,
86f8cdf3
VSO
2468 .bdrv_detach_aio_context = nbd_client_detach_aio_context,
2469 .bdrv_attach_aio_context = nbd_client_attach_aio_context,
f7651539
VSO
2470 .bdrv_co_drain_begin = nbd_client_co_drain_begin,
2471 .bdrv_co_drain_end = nbd_client_co_drain_end,
2019d68b 2472 .bdrv_refresh_filename = nbd_refresh_filename,
78a33ab5 2473 .bdrv_co_block_status = nbd_client_co_block_status,
8a6239c0 2474 .bdrv_dirname = nbd_dirname,
2654267c 2475 .strong_runtime_opts = nbd_strong_runtime_opts,
1d7d2a9d
PB
2476};
2477
2478static BlockDriver bdrv_nbd_unix = {
69447cd8
SH
2479 .format_name = "nbd",
2480 .protocol_name = "nbd+unix",
2481 .instance_size = sizeof(BDRVNBDState),
2482 .bdrv_parse_filename = nbd_parse_filename,
5a5e7f8c
ML
2483 .bdrv_co_create_opts = bdrv_co_create_opts_simple,
2484 .create_opts = &bdrv_create_opts_simple,
69447cd8 2485 .bdrv_file_open = nbd_open,
e99754b4 2486 .bdrv_reopen_prepare = nbd_client_reopen_prepare,
70c4fb26
EB
2487 .bdrv_co_preadv = nbd_client_co_preadv,
2488 .bdrv_co_pwritev = nbd_client_co_pwritev,
fa778fff 2489 .bdrv_co_pwrite_zeroes = nbd_client_co_pwrite_zeroes,
69447cd8
SH
2490 .bdrv_close = nbd_close,
2491 .bdrv_co_flush_to_os = nbd_co_flush,
447e57c3 2492 .bdrv_co_pdiscard = nbd_client_co_pdiscard,
fa21e6fa 2493 .bdrv_refresh_limits = nbd_refresh_limits,
a2b333c0 2494 .bdrv_co_truncate = nbd_co_truncate,
69447cd8 2495 .bdrv_getlength = nbd_getlength,
86f8cdf3
VSO
2496 .bdrv_detach_aio_context = nbd_client_detach_aio_context,
2497 .bdrv_attach_aio_context = nbd_client_attach_aio_context,
f7651539
VSO
2498 .bdrv_co_drain_begin = nbd_client_co_drain_begin,
2499 .bdrv_co_drain_end = nbd_client_co_drain_end,
2019d68b 2500 .bdrv_refresh_filename = nbd_refresh_filename,
78a33ab5 2501 .bdrv_co_block_status = nbd_client_co_block_status,
8a6239c0 2502 .bdrv_dirname = nbd_dirname,
2654267c 2503 .strong_runtime_opts = nbd_strong_runtime_opts,
75818250 2504};
5efa9d5a
AL
2505
2506static void bdrv_nbd_init(void)
2507{
2508 bdrv_register(&bdrv_nbd);
1d7d2a9d
PB
2509 bdrv_register(&bdrv_nbd_tcp);
2510 bdrv_register(&bdrv_nbd_unix);
5efa9d5a
AL
2511}
2512
2513block_init(bdrv_nbd_init);