2 * Test client to test the NBD server. Doesn't do anything useful, except
3 * checking that the server does, actually, work.
5 * Note that the only 'real' test is to check the client against a kernel. If
6 * it works here but does not work in the kernel, then that's most likely a bug
7 * in this program and/or in nbd-server.
9 * Copyright(c) 2006 Wouter Verhelst
11 * This program is Free Software; you can redistribute it and/or modify it
12 * under the terms of the GNU General Public License as published by the Free
13 * Software Foundation, in version 2.
15 * This program is distributed in the hope that it will be useful, but WITHOUT
16 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
17 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
20 * You should have received a copy of the GNU General Public License along with
21 * this program; if not, write to the Free Software Foundation, Inc., 51
22 * Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
28 #include <sys/types.h>
29 #include <sys/socket.h>
34 #define MY_NAME "nbd-tester-client"
37 #include <netinet/in.h>
40 static gchar errstr[1024];
41 const static int errstr_len=1024;
45 CONNECTION_TYPE_CONNECT,
46 CONNECTION_TYPE_INIT_PASSWD,
47 CONNECTION_TYPE_CLISERV,
52 CONNECTION_CLOSE_PROPERLY,
53 CONNECTION_CLOSE_FAST,
56 inline int read_all(int f, void *buf, size_t len) {
61 if((res=read(f, buf, len)) <=0) {
62 snprintf(errstr, errstr_len, "Read failed: %s", strerror(errno));
72 int setup_connection(gchar *hostname, int port, CONNECTION_TYPE ctype) {
75 struct sockaddr_in addr;
80 if(ctype<CONNECTION_TYPE_CONNECT)
82 if((sock=socket(PF_INET, SOCK_STREAM, IPPROTO_TCP))<0) {
83 strncpy(errstr, strerror(errno), errstr_len);
87 if(!(host=gethostbyname(hostname))) {
88 strncpy(errstr, strerror(errno), errstr_len);
91 addr.sin_family=AF_INET;
92 addr.sin_port=htons(port);
93 addr.sin_addr.s_addr=*((int *) host->h_addr);
94 if((connect(sock, (struct sockaddr *)&addr, sizeof(addr))<0)) {
95 strncpy(errstr, strerror(errno), errstr_len);
98 if(ctype<CONNECTION_TYPE_INIT_PASSWD)
100 if(read_all(sock, buf, strlen(INIT_PASSWD))<0) {
101 snprintf(errstr, errstr_len, "Could not read INIT_PASSWD: %s",
106 snprintf(errstr, errstr_len, "Server closed connection");
109 if(strncmp(buf, INIT_PASSWD, strlen(INIT_PASSWD))) {
110 snprintf(errstr, errstr_len, "INIT_PASSWD does not match");
113 if(ctype<CONNECTION_TYPE_CLISERV)
115 if(read_all(sock, &tmp64, sizeof(tmp64))<0) {
116 snprintf(errstr, errstr_len, "Could not read cliserv_magic: %s",
121 if(tmp64 != cliserv_magic) {
122 strncpy(errstr, "cliserv_magic does not match", errstr_len);
125 if(ctype<CONNECTION_TYPE_FULL)
127 /* The information we get now contains information on sizes. If
128 * we're here, that means we want a 'working' connection, but
129 * we're not interested in the sizes. So, read them but throw
130 * the values away. We need to read the size of the device (a
131 * 64bit integer) plus the reserved fields (128 bytes; should
134 read_all(sock, buf, sizeof(tmp64)+128);
144 int close_connection(int sock, CLOSE_TYPE type) {
145 struct nbd_request req;
149 case CONNECTION_CLOSE_PROPERLY:
150 req.magic=htonl(NBD_REQUEST_MAGIC);
151 req.type=htonl(NBD_CMD_DISC);
152 memcpy(&(req.handle), &(counter), sizeof(counter));
156 if(write(sock, &req, sizeof(req))<0) {
157 snprintf(errstr, errstr_len, "Could not write to socket: %s", strerror(errno));
160 case CONNECTION_CLOSE_FAST:
162 snprintf(errstr, errstr_len, "Could not close socket: %s", strerror(errno));
167 g_critical("Your compiler is on crack!"); /* or I am buggy */
173 int read_packet_check_header(int sock, size_t datasize, long long int curhandle) {
174 struct nbd_reply rep;
178 read_all(sock, &rep, sizeof(rep));
179 rep.magic=ntohl(rep.magic);
180 rep.error=ntohl(rep.error);
181 if(rep.magic!=NBD_REPLY_MAGIC) {
182 snprintf(errstr, errstr_len, "Received package with incorrect reply_magic. Index of sent packages is %lld (0x%llX), received handle is %lld (0x%llX). Received magic 0x%lX, expected 0x%lX", curhandle, curhandle, *((u64*)rep.handle), *((u64*)rep.handle), (long unsigned int)rep.magic, (long unsigned int)NBD_REPLY_MAGIC);
187 snprintf(errstr, errstr_len, "Received error from server: %ld (0x%lX). Handle is %lld (0x%llX).", (long int)rep.error, (long unsigned int)rep.error, (long long int)(*((u64*)rep.handle)), *((u64*)rep.handle));
191 read_all(sock, &buf, datasize);
197 int throughput_test(gchar* hostname, int port, int sock, char sock_is_open, char close_sock) {
200 struct nbd_request req;
205 struct timeval start;
209 char speedchar[2] = { '\0', '\0' };
212 signed int do_write=TRUE;
216 if((sock=setup_connection(hostname, port, CONNECTION_TYPE_CLISERV))<0) {
217 g_warning("Could not open socket: %s", errstr);
222 /* Assume the file is at least 4k in size. Not much of a test
223 * this way, but, well. */
226 if((tmp=read_all(sock, &size, sizeof(u64)))<0) {
228 snprintf(errstr, errstr_len, "Could not read from socket: %s", strerror(errno));
233 snprintf(errstr, errstr_len, "Server closed connection unexpectedly when trying to read size of device in throughput test");
236 read_all(sock,&buf,128);
238 req.magic=htonl(NBD_REQUEST_MAGIC);
239 req.type=htonl(NBD_CMD_READ);
241 if(gettimeofday(&start, NULL)<0) {
243 snprintf(errstr, errstr_len, "Could not measure start time: %s", strerror(errno));
246 for(i=0;i+1024<=size;i+=1024) {
248 *((u64*)req.handle)=i;
250 write(sock, &req, sizeof(req));
251 printf("Requests(+): %d\n", ++requests);
258 select(sock+1, &set, NULL, NULL, &tv);
259 if(FD_ISSET(sock, &set)) {
260 /* Okay, there's something ready for
262 if(read_packet_check_header(sock, 1024, i)<0) {
266 printf("Requests(-): %d\n", --requests);
268 } while FD_ISSET(sock, &set);
269 /* Now wait until we can write again or until a second have
270 * passed, whichever comes first*/
275 do_write=select(sock+1,NULL,&set,NULL,&tv);
276 if(!do_write) printf("Select finished\n");
278 snprintf(errstr, errstr_len, "select: %s", strerror(errno));
283 /* Now empty the read buffer */
289 select(sock+1, &set, NULL, NULL, &tv);
290 if(FD_ISSET(sock, &set)) {
291 /* Okay, there's something ready for
293 read_packet_check_header(sock, 1024, i);
294 printf("Requests(-): %d\n", --requests);
297 if(gettimeofday(&stop, NULL)<0) {
299 snprintf(errstr, errstr_len, "Could not measure end time: %s", strerror(errno));
302 timespan=stop.tv_sec-start.tv_sec+(stop.tv_usec-start.tv_usec)/1000000;
303 speed=(int)(size/timespan);
316 g_message("Throughput test complete. Took %.3f seconds to complete, %d%sB/s",timespan,speed,speedchar);
320 close_connection(sock, CONNECTION_CLOSE_PROPERLY);
326 int main(int argc, char**argv) {
333 g_message("Not enough arguments");
334 g_message("Usage: %s <hostname> <port>", argv[0]);
338 hostname=g_strdup(argv[1]);
339 p=(strtol(argv[2], NULL, 0));
340 if(p==LONG_MIN||p==LONG_MAX) {
341 g_critical("Could not parse port number: %s", strerror(errno));
346 if(throughput_test(hostname, port, sock, FALSE, TRUE)<0) {
347 g_warning("Could not run throughput test: %s", errstr);