2 * Open connection for network block device
4 * Copyright 1997,1998 Pavel Machek, distribute under GPL
5 * <pavel@atrey.karlin.mff.cuni.cz>
6 * Copyright (c) 2002 - 2011 Wouter Verhelst <w@uter.be>
8 * Version 1.0 - 64bit issues should be fixed, now
9 * Version 1.1 - added bs (blocksize) option (Alexey Guzeev, aga@permonline.ru)
10 * Version 1.2 - I added new option '-d' to send the disconnect request
11 * Version 2.0 - Version synchronised with server
12 * Version 2.1 - Check for disconnection before INIT_PASSWD is received
13 * to make errormsg a bit more helpful in case the server can't
14 * open the exported file.
15 * 16/03/2010 - Add IPv6 support.
16 * Kitt Tientanopajai <kitt@kitty.in.th>
17 * Neutron Soutmun <neo.neutron@gmail.com>
18 * Suriya Soutmun <darksolar@gmail.com>
24 #include <sys/ioctl.h>
25 #include <sys/socket.h>
27 #include <sys/types.h>
29 #include <netinet/tcp.h>
30 #include <netinet/in.h>
32 #include "netdb-compat.h"
37 #include <sys/mount.h>
46 #include <linux/ioctl.h>
47 #define MY_NAME "nbd_client"
51 #include "crypto-gnutls.h"
58 #define NBDC_DO_LIST 1
60 int check_conn(char* devname
, int do_print
) {
66 if( (p
=strrchr(devname
, '/')) ) {
69 if((p
=strchr(devname
, 'p'))) {
70 /* We can't do checks on partitions. */
73 snprintf(buf
, 256, "/sys/block/%s/pid", devname
);
74 if((fd
=open(buf
, O_RDONLY
))<0) {
81 len
=read(fd
, buf
, 256);
83 perror("could not read from server");
87 buf
[(len
< 256) ? len
: 255]='\0';
88 if(do_print
) printf("%s\n", buf
);
93 int opennet(char *name
, char* portstr
, int sdp
) {
95 struct addrinfo hints
;
96 struct addrinfo
*ai
= NULL
;
97 struct addrinfo
*rp
= NULL
;
100 memset(&hints
,'\0',sizeof(hints
));
101 hints
.ai_family
= AF_UNSPEC
;
102 hints
.ai_socktype
= SOCK_STREAM
;
103 hints
.ai_flags
= AI_ADDRCONFIG
| AI_NUMERICSERV
;
104 hints
.ai_protocol
= IPPROTO_TCP
;
106 e
= getaddrinfo(name
, portstr
, &hints
, &ai
);
109 fprintf(stderr
, "getaddrinfo failed: %s\n", gai_strerror(e
));
116 if (ai
->ai_family
== AF_INET
)
117 ai
->ai_family
= AF_INET_SDP
;
118 else (ai
->ai_family
== AF_INET6
)
119 ai
->ai_family
= AF_INET6_SDP
;
121 err("Can't do SDP: I was not compiled with SDP support!");
125 for(rp
= ai
; rp
!= NULL
; rp
= rp
->ai_next
) {
126 sock
= socket(rp
->ai_family
, rp
->ai_socktype
, rp
->ai_protocol
);
129 continue; /* error */
131 if(connect(sock
, rp
->ai_addr
, rp
->ai_addrlen
) != -1)
138 err_nonfatal("Socket failed: %m");
149 int openunix(const char *path
) {
151 struct sockaddr_un un_addr
;
152 memset(&un_addr
, 0, sizeof(un_addr
));
154 un_addr
.sun_family
= AF_UNIX
;
155 if (strnlen(path
, sizeof(un_addr
.sun_path
)) == sizeof(un_addr
.sun_path
)) {
156 err_nonfatal("UNIX socket path too long");
160 strncpy(un_addr
.sun_path
, path
, sizeof(un_addr
.sun_path
) - 1);
162 if ((sock
= socket(AF_UNIX
, SOCK_STREAM
, 0)) == -1) {
163 err_nonfatal("SOCKET failed");
167 if (connect(sock
, &un_addr
, sizeof(un_addr
)) == -1) {
168 err_nonfatal("CONNECT failed");
175 void ask_list(int sock
) {
182 const int BUF_SIZE
= 1024;
185 magic
= ntohll(opts_magic
);
186 if (write(sock
, &magic
, sizeof(magic
)) < 0)
187 err("Failed/2.2: %m");
189 /* Ask for the list */
190 opt
= htonl(NBD_OPT_LIST
);
191 if(write(sock
, &opt
, sizeof(opt
)) < 0) {
192 err("writing list option failed: %m");
194 /* Send the length (zero) */
196 if(write(sock
, &len
, sizeof(len
)) < 0) {
197 err("writing length failed: %m");
199 /* newline, move away from the "Negotiation:" line */
202 memset(buf
, 0, 1024);
203 if(read(sock
, &magic
, sizeof(magic
)) < 0) {
204 err("Reading magic from server: %m");
206 if(read(sock
, &opt_server
, sizeof(opt_server
)) < 0) {
207 err("Reading option: %m");
209 if(read(sock
, &reptype
, sizeof(reptype
)) <0) {
210 err("Reading reply from server: %m");
212 if(read(sock
, &len
, sizeof(len
)) < 0) {
213 err("Reading length from server: %m");
217 reptype
=ntohl(reptype
);
218 if(magic
!= rep_magic
) {
219 err("Not enough magic from server");
221 if(reptype
& NBD_REP_FLAG_ERROR
) {
223 case NBD_REP_ERR_POLICY
:
224 fprintf(stderr
, "\nE: listing not allowed by server.\n");
227 fprintf(stderr
, "\nE: unexpected error from server.\n");
230 if(len
> 0 && len
< BUF_SIZE
) {
231 if((rlen
=read(sock
, buf
, len
)) < 0) {
232 fprintf(stderr
, "\nE: could not read error message from server\n");
235 fprintf(stderr
, "Server said: %s\n", buf
);
241 if(reptype
!= NBD_REP_SERVER
) {
242 err("Server sent us a reply we don't understand!");
244 if(read(sock
, &len
, sizeof(len
)) < 0) {
245 fprintf(stderr
, "\nE: could not read export name length from server\n");
249 if (len
>= BUF_SIZE
) {
250 fprintf(stderr
, "\nE: export name on server too long\n");
253 if(read(sock
, buf
, len
) < 0) {
254 fprintf(stderr
, "\nE: could not read export name from server\n");
261 } while(reptype
!= NBD_REP_ACK
);
262 opt
=htonl(NBD_OPT_ABORT
);
264 magic
=htonll(opts_magic
);
265 if (write(sock
, &magic
, sizeof(magic
)) < 0)
266 err("Failed/2.2: %m");
267 if (write(sock
, &opt
, sizeof(opt
)) < 0)
268 err("Failed writing abort");
269 if (write(sock
, &len
, sizeof(len
)) < 0)
270 err("Failed writing length");
273 void negotiate(int *sockp
, u64
*rsize64
, uint16_t *flags
, char* name
, uint32_t needed_flags
, uint32_t client_flags
, uint32_t do_opts
, char *certfile
, char *keyfile
, char *cacertfile
, char *tlshostname
, bool tls
) {
276 uint16_t global_flags
;
277 char buf
[256] = "\0\0\0\0\0\0\0\0\0";
282 printf("Negotiation: ");
283 readit(sock
, buf
, 8);
284 if (strcmp(buf
, INIT_PASSWD
))
285 err("INIT_PASSWD bad");
287 readit(sock
, &magic
, sizeof(magic
));
288 magic
= ntohll(magic
);
289 if (magic
!= opts_magic
) {
290 if(magic
== cliserv_magic
) {
291 err("It looks like you're trying to connect to an oldstyle server. This is no longer supported since nbd 3.10.");
295 readit(sock
, &tmp
, sizeof(uint16_t));
296 global_flags
= ntohs(tmp
);
297 if((needed_flags
& global_flags
) != needed_flags
) {
298 /* There's currently really only one reason why this
299 * check could possibly fail, but we may need to change
300 * this error message in the future... */
301 fprintf(stderr
, "\nE: Server does not support listing exports\n");
305 if (global_flags
& NBD_FLAG_NO_ZEROES
) {
306 client_flags
|= NBD_FLAG_C_NO_ZEROES
;
308 client_flags
= htonl(client_flags
);
309 if (write(sock
, &client_flags
, sizeof(client_flags
)) < 0)
310 err("Failed/2.1: %m");
315 int plainfd
[2]; // [0] is used by the proxy, [1] is used by NBD
316 tlssession_t
*s
= NULL
;
322 tmp64
= htonll(opts_magic
);
323 if (write(sock
, &tmp64
, sizeof(tmp64
)) < 0)
324 err( "Could not write magic: %m");
326 tmp32
= htonl(NBD_OPT_STARTTLS
);
327 if (write(sock
, &tmp32
, sizeof(tmp32
)) < 0)
328 err("Could not write option: %m");
331 if (write(sock
, &tmp32
, sizeof(tmp32
)) < 0)
332 err("Could not write option length: %m");
334 if (read(sock
, &tmp64
, sizeof(tmp64
)) < 0)
335 err("Could not read cliserv_magic: %m");
336 tmp64
= ntohll(tmp64
);
337 if (tmp64
!= NBD_OPT_REPLY_MAGIC
) {
338 err("reply magic does not match");
340 if (read(sock
, &tmp32
, sizeof(tmp32
)) < 0)
341 err("Could not read option type: %m");
342 tmp32
= ntohl(tmp32
);
343 if (tmp32
!= NBD_OPT_STARTTLS
)
344 err("Reply to wrong option");
345 if (read(sock
, &tmp32
, sizeof(tmp32
)) < 0)
346 err("Could not read option reply type: %m");
347 tmp32
= ntohl(tmp32
);
348 if (tmp32
!= NBD_REP_ACK
) {
349 err("Option reply type != NBD_REP_ACK");
351 if (read(sock
, &tmp32
, sizeof(tmp32
)) < 0) err(
352 "Could not read option data length: %m");
353 tmp32
= ntohl(tmp32
);
355 err("Option reply data length != 0");
357 s
= tlssession_new(0,
362 !cacertfile
|| !tlshostname
, // insecure flag
373 err("Cannot establish TLS session");
375 if (socketpair(AF_UNIX
, SOCK_STREAM
, 0, plainfd
) < 0)
376 err("Cannot get socket pair");
378 if (set_nonblocking(plainfd
[0], 0) <0 ||
379 set_nonblocking(plainfd
[1], 0) <0 ||
380 set_nonblocking(sock
, 0) <0) {
383 err("Cannot set socket options");
388 err("Could not fork");
391 if (daemon(0, 0) < 0) {
392 /* no one will see this */
393 fprintf(stderr
, "Can't detach from the terminal");
396 signal (SIGPIPE
, SIG_IGN
);
398 tlssession_mainloop(sock
, plainfd
[0], s
);
405 sock
= plainfd
[1]; /* use the decrypted FD from now on */
410 err("TLS requested but support not compiled in");
414 if(do_opts
& NBDC_DO_LIST
) {
419 /* Write the export name that we're after */
420 magic
= htonll(opts_magic
);
421 if (write(sock
, &magic
, sizeof(magic
)) < 0)
422 err("Failed/2.2: %m");
424 opt
= ntohl(NBD_OPT_EXPORT_NAME
);
425 if (write(sock
, &opt
, sizeof(opt
)) < 0)
426 err("Failed/2.3: %m");
427 namesize
= (u32
)strlen(name
);
428 namesize
= ntohl(namesize
);
429 if (write(sock
, &namesize
, sizeof(namesize
)) < 0)
430 err("Failed/2.4: %m");
431 if (write(sock
, name
, strlen(name
)) < 0)
432 err("Failed/2.4: %m");
434 readit(sock
, &size64
, sizeof(size64
));
435 size64
= ntohll(size64
);
437 if ((size64
>>12) > (uint64_t)~0UL) {
438 printf("size = %luMB", (unsigned long)(size64
>>20));
439 err("Exported device is too big for me. Get 64-bit machine :-(\n");
441 printf("size = %luMB", (unsigned long)(size64
>>20));
443 readit(sock
, &tmp
, sizeof(tmp
));
444 *flags
= (uint32_t)ntohs(tmp
);
446 if (!(global_flags
& NBD_FLAG_NO_ZEROES
)) {
447 readit(sock
, &buf
, 124);
454 bool get_from_config(char* cfgname
, char** name_ptr
, char** dev_ptr
, char** hostn_ptr
, int* bs
, int* timeout
, int* persist
, int* swap
, int* sdp
, int* b_unix
, char**port
, int* num_conns
, char **certfile
, char **keyfile
, char **cacertfile
, char **tlshostname
) {
455 int fd
= open(SYSCONFDIR
"/nbdtab", O_RDONLY
);
458 fprintf(stderr
, "while opening %s: ", SYSCONFDIR
"/nbdtab");
459 perror("could not open config file");
462 off_t size
= lseek(fd
, 0, SEEK_END
);
463 lseek(fd
, 0, SEEK_SET
);
465 char *fsep
= "\n\t# ";
469 perror("E: mmap'ing nbdtab");
473 data
= mmap(NULL
, (size_t)size
, PROT_READ
, MAP_SHARED
, fd
, 0);
474 if(!strncmp(cfgname
, "/dev/", 5)) {
477 char *loc
= strstr((const char*)data
, cfgname
);
481 size_t l
= strlen(cfgname
) + 6;
482 *dev_ptr
= malloc(l
);
483 snprintf(*dev_ptr
, l
, "/dev/%s", cfgname
);
485 size_t line_len
, field_len
, ws_len
;
486 #define CHECK_LEN field_len = strcspn(loc, fsep); ws_len = strspn(loc+field_len, fsep); if(field_len > line_len || line_len <= 0) { goto out; }
487 #define MOVE_NEXT line_len -= field_len + ws_len; loc += field_len + ws_len
488 // find length of line
489 line_len
= strcspn(loc
, lsep
);
490 // first field is the device node name, which we already know, so skip it
493 // next field is the hostname
495 *hostn_ptr
= strndup(loc
, field_len
);
497 // third field is the export name
499 *name_ptr
= strndup(loc
, field_len
);
500 if(ws_len
+ field_len
> line_len
) {
501 // optional last field is not there, so return success
509 // fourth field is the options field, a comma-separated field of options
511 if(!strncmp(loc
, "conns=", 6)) {
512 *num_conns
= (int)strtol(loc
+6, &loc
, 0);
515 if(!strncmp(loc
, "bs=", 3)) {
516 *bs
= (int)strtol(loc
+3, &loc
, 0);
519 if(!strncmp(loc
, "timeout=", 8)) {
520 *timeout
= (int)strtol(loc
+8, &loc
, 0);
523 if(!strncmp(loc
, "port=", 5)) {
524 *port
= strndup(loc
+5, strcspn(loc
+5, ","));
527 if(!strncmp(loc
, "persist", 7)) {
532 if(!strncmp(loc
, "swap", 4)) {
537 if(!strncmp(loc
, "sdp", 3)) {
542 if(!strncmp(loc
, "unix", 4)) {
547 if(!strncmp(loc
, "certfile=", 9)) {
548 *certfile
= strndup(loc
+9, strcspn(loc
+9, ","));
551 if(!strncmp(loc
, "keyfile=", 8)) {
552 *keyfile
= strndup(loc
+8, strcspn(loc
+8, ","));
555 if(!strncmp(loc
, "cacertfile=", 11)) {
556 *cacertfile
= strndup(loc
+11, strcspn(loc
+11, ","));
559 if(!strncmp(loc
, "tlshostname=", 9)) {
560 *tlshostname
= strndup(loc
+9, strcspn(loc
+9, ","));
563 // skip unknown options, with a warning unless they start with a '_'
564 l
= strcspn(loc
, ",");
566 char* s
= strndup(loc
, l
);
567 fprintf(stderr
, "Warning: unknown option '%s' found in nbdtab file", s
);
575 } while(strcspn(loc
, lsep
) > 0);
587 void setsizes(int nbd
, u64 size64
, int blocksize
, u32 flags
) {
589 int read_only
= (flags
& NBD_FLAG_READ_ONLY
) ? 1 : 0;
591 if (size64
>>12 > (uint64_t)~0UL)
592 err("Device too large.\n");
594 int tmp_blocksize
= 4096;
595 if (size64
/ (u64
)blocksize
<= (uint64_t)~0UL)
596 tmp_blocksize
= blocksize
;
597 if (ioctl(nbd
, NBD_SET_BLKSIZE
, tmp_blocksize
) < 0) {
598 fprintf(stderr
, "Failed to set blocksize %d\n",
600 err("Ioctl/1.1a failed: %m\n");
602 size
= (unsigned long)(size64
/ (u64
)tmp_blocksize
);
603 if (ioctl(nbd
, NBD_SET_SIZE_BLOCKS
, size
) < 0)
604 err("Ioctl/1.1b failed: %m\n");
605 if (tmp_blocksize
!= blocksize
) {
606 if (ioctl(nbd
, NBD_SET_BLKSIZE
, (unsigned long)blocksize
) < 0) {
607 fprintf(stderr
, "Failed to set blocksize %d\n",
609 err("Ioctl/1.1c failed: %m\n");
612 fprintf(stderr
, "bs=%d, sz=%llu bytes\n", blocksize
, (u64
)tmp_blocksize
* size
);
615 ioctl(nbd
, NBD_CLEAR_SOCK
);
617 /* ignore error as kernel may not support */
618 ioctl(nbd
, NBD_SET_FLAGS
, (unsigned long) flags
);
620 if (ioctl(nbd
, BLKROSET
, (unsigned long) &read_only
) < 0)
621 err("Unable to set read-only attribute for device");
624 void set_timeout(int nbd
, int timeout
) {
626 if (ioctl(nbd
, NBD_SET_TIMEOUT
, (unsigned long)timeout
) < 0)
627 err("Ioctl NBD_SET_TIMEOUT failed: %m\n");
628 fprintf(stderr
, "timeout=%d\n", timeout
);
632 void finish_sock(int sock
, int nbd
, int swap
) {
633 if (ioctl(nbd
, NBD_SET_SOCK
, sock
) < 0) {
635 err("Kernel doesn't support multiple connections\n");
637 err("Ioctl NBD_SET_SOCK failed: %m\n");
642 mlockall(MCL_CURRENT
| MCL_FUTURE
);
647 oom_adjust(const char *file
, const char *value
)
652 fd
= open(file
, O_WRONLY
);
656 rc
= write(fd
, value
, len
) != (ssize_t
) len
;
661 void usage(char* errmsg
, ...) {
665 va_start(ap
, errmsg
);
666 snprintf(tmp
, 256, "ERROR: %s\n\n", errmsg
);
667 vfprintf(stderr
, tmp
, ap
);
670 fprintf(stderr
, "nbd-client version %s\n", PACKAGE_VERSION
);
672 fprintf(stderr
, "Usage: nbd-client -name|-N name host [port] nbd_device\n\t[-block-size|-b block size] [-timeout|-t timeout] [-swap|-s] [-sdp|-S]\n\t[-persist|-p] [-nofork|-n] [-systemd-mark|-m]\n");
673 fprintf(stderr
, "Or : nbd-client -u (with same arguments as above)\n");
674 fprintf(stderr
, "Or : nbd-client nbdX\n");
675 fprintf(stderr
, "Or : nbd-client -d nbd_device\n");
676 fprintf(stderr
, "Or : nbd-client -c nbd_device\n");
677 fprintf(stderr
, "Or : nbd-client -h|--help\n");
678 fprintf(stderr
, "Or : nbd-client -l|--list host\n");
680 fprintf(stderr
, "All commands that connect to a host also take:\n\t[-F|-certfile certfile] [-K|-keyfile keyfile]\n\t[-A|-cacertfile cacertfile] [-H|-tlshostname hostname] [-x|-enable-tls]\n");
682 fprintf(stderr
, "Default value for blocksize is 1024 (recommended for ethernet)\n");
683 fprintf(stderr
, "Allowed values for blocksize are 512,1024,2048,4096\n"); /* will be checked in kernel :) */
684 fprintf(stderr
, "Note, that kernel 2.4.2 and older ones do not work correctly with\n");
685 fprintf(stderr
, "blocksizes other than 1024 without patches\n");
686 fprintf(stderr
, "Default value for port is 10809. Note that port must always be numeric\n");
689 void disconnect(char* device
) {
690 int nbd
= open(device
, O_RDWR
);
693 err("Cannot open NBD: %m\nPlease ensure the 'nbd' module is loaded.");
694 printf("disconnect, ");
695 if (ioctl(nbd
, NBD_DISCONNECT
)<0)
696 err("Ioctl failed: %m\n");
698 if (ioctl(nbd
, NBD_CLEAR_SOCK
)<0)
699 err("Ioctl failed: %m\n");
703 int main(int argc
, char *argv
[]) {
704 char* port
=NBD_DEFAULT_PORT
;
713 int G_GNUC_UNUSED nofork
=0; // if -dNOFORK
721 uint16_t needed_flags
=0;
722 uint32_t cflags
=NBD_FLAG_C_FIXED_NEWSTYLE
;
725 char *certfile
= NULL
;
726 char *keyfile
= NULL
;
727 char *cacertfile
= NULL
;
728 char *tlshostname
= NULL
;
731 int num_connections
= 1;
732 struct option long_options
[] = {
733 { "block-size", required_argument
, NULL
, 'b' },
734 { "check", required_argument
, NULL
, 'c' },
735 { "connections", required_argument
, NULL
, 'C'},
736 { "disconnect", required_argument
, NULL
, 'd' },
737 { "help", no_argument
, NULL
, 'h' },
738 { "list", no_argument
, NULL
, 'l' },
739 { "name", required_argument
, NULL
, 'N' },
740 { "nofork", no_argument
, NULL
, 'n' },
741 { "persist", no_argument
, NULL
, 'p' },
742 { "sdp", no_argument
, NULL
, 'S' },
743 { "swap", no_argument
, NULL
, 's' },
744 { "systemd-mark", no_argument
, NULL
, 'm' },
745 { "timeout", required_argument
, NULL
, 't' },
746 { "unix", no_argument
, NULL
, 'u' },
747 { "certfile", required_argument
, NULL
, 'F' },
748 { "keyfile", required_argument
, NULL
, 'K' },
749 { "cacertfile", required_argument
, NULL
, 'A' },
750 { "tlshostname", required_argument
, NULL
, 'H' },
751 { "enable-tls", no_argument
, NULL
, 'x' },
762 while((c
=getopt_long_only(argc
, argv
, "-b:c:d:hlnN:pSst:uC:K:A:H:x", long_options
, NULL
))>=0) {
765 // non-option argument
766 if(strchr(optarg
, '=')) {
767 // old-style 'bs=' or 'timeout='
769 fprintf(stderr
, "WARNING: old-style command-line argument encountered. This is deprecated.\n");
770 if(!strncmp(optarg
, "bs=", 3)) {
774 if(!strncmp(optarg
, "timeout=", 8)) {
778 usage("unknown option %s encountered", optarg
);
781 switch(nonspecial
++) {
788 if(!strtol(optarg
, NULL
, 0)) {
789 // not parseable as a number, assume it's the device
801 usage("too many non-option arguments specified");
807 blocksize
=(int)strtol(optarg
, NULL
, 0);
810 return check_conn(optarg
, 1);
812 num_connections
= (int)strtol(optarg
, NULL
, 0);
821 needed_flags
|= NBD_FLAG_FIXED_NEWSTYLE
;
822 opts
|= NBDC_DO_LIST
;
845 timeout
=strtol(optarg
, NULL
, 0);
855 certfile
=strdup(optarg
);
858 keyfile
=strdup(optarg
);
861 cacertfile
=strdup(optarg
);
864 tlshostname
=strdup(optarg
);
871 fprintf(stderr
, "E: TLS support not compiled in\n");
875 fprintf(stderr
, "E: option eaten by 42 mice\n");
882 err("swap option unsupported on Android because mlockall is unsupported.");
885 if((!name
|| !nbddev
) && !(opts
& NBDC_DO_LIST
)) {
886 if(!strncmp(hostname
, "nbd", 3) || !strncmp(hostname
, "/dev/nbd", 8)) {
887 if(!get_from_config(hostname
, &name
, &nbddev
, &hostname
, &blocksize
, &timeout
, &cont
, &swap
, &sdp
, &b_unix
, &port
, &num_connections
, &certfile
, &keyfile
, &cacertfile
, &hostname
)) {
888 usage("no valid configuration for specified device found", hostname
);
892 usage("not enough information specified, and argument didn't look like an nbd device");
897 usage("no information specified");
901 if (keyfile
&& !certfile
)
902 certfile
= strdup(keyfile
);
904 if (certfile
!= NULL
|| keyfile
!= NULL
|| cacertfile
!= NULL
|| tlshostname
!= NULL
) {
908 if (!tlshostname
&& hostname
)
909 tlshostname
= strdup(hostname
);
911 if(strlen(name
)==0 && !(opts
& NBDC_DO_LIST
)) {
912 printf("Warning: the oldstyle protocol is no longer supported.\nThis method now uses the newstyle protocol with a default export\n");
915 if(!opts
& NBDC_DO_LIST
) {
916 nbd
= open(nbddev
, O_RDWR
);
918 err("Cannot open NBD: %m\nPlease ensure the 'nbd' module is loaded.");
921 for (i
= 0; i
< num_connections
; i
++) {
923 sock
= openunix(hostname
);
925 sock
= opennet(hostname
, port
, sdp
);
929 negotiate(&sock
, &size64
, &flags
, name
, needed_flags
, cflags
, opts
, certfile
, keyfile
, cacertfile
, tlshostname
, tls
);
931 setsizes(nbd
, size64
, blocksize
, flags
);
932 set_timeout(nbd
, timeout
);
934 finish_sock(sock
, nbd
, swap
);
937 fprintf(stderr
, "Warning: using swap and TLS is prone to deadlock\n");
938 /* try linux >= 2.6.36 interface first */
939 if (oom_adjust("/proc/self/oom_score_adj", "-1000")) {
940 /* fall back to linux <= 2.6.35 interface */
941 oom_adjust("/proc/self/oom_adj", "-17");
951 err("Cannot detach from terminal");
954 memset(&sa
, 0, sizeof(sa
));
955 sa
.sa_handler
= SIG_IGN
;
956 sigaction(SIGCHLD
, &sa
, NULL
);
958 /* For child to check its parent */
964 sigdelset(&block
, SIGKILL
);
965 sigdelset(&block
, SIGTERM
);
966 sigdelset(&block
, SIGPIPE
);
967 sigprocmask(SIG_SETMASK
, &block
, &old
);
970 /* Due to a race, the kernel NBD driver cannot
971 * call for a reread of the partition table
972 * in the handling of the NBD_DO_IT ioctl().
973 * Therefore, this is done in the first open()
974 * of the device. We therefore make sure that
975 * the device is opened at least once after the
976 * connection was made. This has to be done in a
977 * separate process, since the NBD_DO_IT ioctl()
978 * does not return until the NBD device has
981 struct timespec req
= {
983 .tv_nsec
= 100000000,
985 while(check_conn(nbddev
, 0)) {
986 if (main_pid
!= getppid()) {
987 /* check_conn() will not return 0 when nbd disconnected
988 * and parent exited during this loop. So the child has to
989 * explicitly check parent identity and exit if parent
993 nanosleep(&req
, NULL
);
995 open(nbddev
, O_RDONLY
);
1000 if (ioctl(nbd
, NBD_DO_IT
) < 0) {
1002 fprintf(stderr
, "nbd,%d: Kernel call returned: %d", main_pid
, error
);
1004 /* The user probably did 'nbd-client -d' on us.
1012 close(sock
); close(nbd
);
1014 fprintf(stderr
, " Reconnecting\n");
1016 sock
= openunix(hostname
);
1018 sock
= opennet(hostname
, port
, sdp
);
1023 nbd
= open(nbddev
, O_RDWR
);
1025 err("Cannot open NBD: %m");
1026 negotiate(&sock
, &new_size
, &new_flags
, name
, needed_flags
, cflags
, opts
, certfile
, keyfile
, cacertfile
, tlshostname
, tls
);
1027 if (size64
!= new_size
) {
1028 err("Size of the device changed. Bye");
1030 setsizes(nbd
, size64
, blocksize
,
1033 set_timeout(nbd
, timeout
);
1034 finish_sock(sock
,nbd
,swap
);
1038 /* We're on 2.4. It's not clearly defined what exactly
1039 * happened at this point. Probably best to quit, now
1041 fprintf(stderr
, "Kernel call returned.");
1046 ioctl(nbd
, NBD_CLEAR_SOCK
);