2008-11-13 19:19:54 +03:00
|
|
|
/*
|
|
|
|
* inet and unix socket functions for qemu
|
|
|
|
*
|
|
|
|
* (c) 2008 Gerd Hoffmann <kraxel@redhat.com>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; under version 2 of the License.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
2012-07-09 13:08:39 +04:00
|
|
|
*
|
|
|
|
* Contributions after 2012-01-13 are licensed under the terms of the
|
|
|
|
* GNU GPL, version 2 or (at your option) any later version.
|
2008-11-13 19:19:54 +03:00
|
|
|
*/
|
2016-01-29 20:49:55 +03:00
|
|
|
#include "qemu/osdep.h"
|
2008-11-11 23:46:40 +03:00
|
|
|
|
2016-10-14 12:00:55 +03:00
|
|
|
#ifdef CONFIG_AF_VSOCK
|
|
|
|
#include <linux/vm_sockets.h>
|
|
|
|
#endif /* CONFIG_AF_VSOCK */
|
|
|
|
|
2012-12-17 21:19:49 +04:00
|
|
|
#include "monitor/monitor.h"
|
2017-04-26 10:36:41 +03:00
|
|
|
#include "qapi/clone-visitor.h"
|
include/qemu/osdep.h: Don't include qapi/error.h
Commit 57cb38b included qapi/error.h into qemu/osdep.h to get the
Error typedef. Since then, we've moved to include qemu/osdep.h
everywhere. Its file comment explains: "To avoid getting into
possible circular include dependencies, this file should not include
any other QEMU headers, with the exceptions of config-host.h,
compiler.h, os-posix.h and os-win32.h, all of which are doing a
similar job to this file and are under similar constraints."
qapi/error.h doesn't do a similar job, and it doesn't adhere to
similar constraints: it includes qapi-types.h. That's in excess of
100KiB of crap most .c files don't actually need.
Add the typedef to qemu/typedefs.h, and include that instead of
qapi/error.h. Include qapi/error.h in .c files that need it and don't
get it now. Include qapi-types.h in qom/object.h for uint16List.
Update scripts/clean-includes accordingly. Update it further to match
reality: replace config.h by config-target.h, add sysemu/os-posix.h,
sysemu/os-win32.h. Update the list of includes in the qemu/osdep.h
comment quoted above similarly.
This reduces the number of objects depending on qapi/error.h from "all
of them" to less than a third. Unfortunately, the number depending on
qapi-types.h shrinks only a little. More work is needed for that one.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
[Fix compilation without the spice devel packages. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-03-14 11:01:28 +03:00
|
|
|
#include "qapi/error.h"
|
2018-02-11 12:36:01 +03:00
|
|
|
#include "qapi/qapi-visit-sockets.h"
|
2012-12-17 21:20:00 +04:00
|
|
|
#include "qemu/sockets.h"
|
|
|
|
#include "qemu/main-loop.h"
|
2016-09-30 17:45:27 +03:00
|
|
|
#include "qapi/qobject-input-visitor.h"
|
|
|
|
#include "qapi/qobject-output-visitor.h"
|
2016-03-20 20:16:19 +03:00
|
|
|
#include "qemu/cutils.h"
|
2019-08-19 15:48:21 +03:00
|
|
|
#include "trace.h"
|
2008-11-11 23:46:40 +03:00
|
|
|
|
|
|
|
#ifndef AI_ADDRCONFIG
|
|
|
|
# define AI_ADDRCONFIG 0
|
|
|
|
#endif
|
2016-04-04 19:22:00 +03:00
|
|
|
|
2015-05-21 15:33:29 +03:00
|
|
|
#ifndef AI_V4MAPPED
|
|
|
|
# define AI_V4MAPPED 0
|
|
|
|
#endif
|
2008-11-11 23:46:40 +03:00
|
|
|
|
2016-07-19 14:58:52 +03:00
|
|
|
#ifndef AI_NUMERICSERV
|
|
|
|
# define AI_NUMERICSERV 0
|
|
|
|
#endif
|
|
|
|
|
2009-09-10 12:58:37 +04:00
|
|
|
|
2008-11-11 23:46:40 +03:00
|
|
|
static int inet_getport(struct addrinfo *e)
|
|
|
|
{
|
|
|
|
struct sockaddr_in *i4;
|
|
|
|
struct sockaddr_in6 *i6;
|
|
|
|
|
|
|
|
switch (e->ai_family) {
|
|
|
|
case PF_INET6:
|
|
|
|
i6 = (void*)e->ai_addr;
|
|
|
|
return ntohs(i6->sin6_port);
|
|
|
|
case PF_INET:
|
|
|
|
i4 = (void*)e->ai_addr;
|
|
|
|
return ntohs(i4->sin_port);
|
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void inet_setport(struct addrinfo *e, int port)
|
|
|
|
{
|
|
|
|
struct sockaddr_in *i4;
|
|
|
|
struct sockaddr_in6 *i6;
|
|
|
|
|
|
|
|
switch (e->ai_family) {
|
|
|
|
case PF_INET6:
|
|
|
|
i6 = (void*)e->ai_addr;
|
|
|
|
i6->sin6_port = htons(port);
|
|
|
|
break;
|
|
|
|
case PF_INET:
|
|
|
|
i4 = (void*)e->ai_addr;
|
|
|
|
i4->sin_port = htons(port);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-06-18 10:43:30 +04:00
|
|
|
NetworkAddressFamily inet_netfamily(int family)
|
|
|
|
{
|
|
|
|
switch (family) {
|
|
|
|
case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6;
|
|
|
|
case PF_INET: return NETWORK_ADDRESS_FAMILY_IPV4;
|
|
|
|
case PF_UNIX: return NETWORK_ADDRESS_FAMILY_UNIX;
|
2016-10-14 12:00:55 +03:00
|
|
|
#ifdef CONFIG_AF_VSOCK
|
|
|
|
case PF_VSOCK: return NETWORK_ADDRESS_FAMILY_VSOCK;
|
|
|
|
#endif /* CONFIG_AF_VSOCK */
|
2014-06-18 10:43:30 +04:00
|
|
|
}
|
|
|
|
return NETWORK_ADDRESS_FAMILY_UNKNOWN;
|
|
|
|
}
|
|
|
|
|
2017-12-21 15:55:20 +03:00
|
|
|
bool fd_is_socket(int fd)
|
|
|
|
{
|
|
|
|
int optval;
|
|
|
|
socklen_t optlen = sizeof(optval);
|
2022-02-19 00:34:50 +03:00
|
|
|
return !getsockopt(fd, SOL_SOCKET, SO_TYPE, &optval, &optlen);
|
2017-12-21 15:55:20 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-01-11 16:17:02 +03:00
|
|
|
/*
|
|
|
|
* Matrix we're trying to apply
|
|
|
|
*
|
|
|
|
* ipv4 ipv6 family
|
|
|
|
* - - PF_UNSPEC
|
|
|
|
* - f PF_INET
|
|
|
|
* - t PF_INET6
|
|
|
|
* f - PF_INET6
|
|
|
|
* f f <error>
|
|
|
|
* f t PF_INET6
|
|
|
|
* t - PF_INET
|
|
|
|
* t f PF_INET
|
sockets: ensure we don't accept IPv4 clients when IPv4 is disabled
Currently if you disable listening on IPv4 addresses, via the
CLI flag ipv4=off, we still mistakenly accept IPv4 clients via
the IPv6 listener socket due to IPV6_V6ONLY flag being unset.
We must ensure IPV6_V6ONLY is always set if ipv4=off
This fixes the following scenarios
-incoming tcp::9000,ipv6=on
-incoming tcp:[::]:9000,ipv6=on
-chardev socket,id=cdev0,host=,port=9000,server,nowait,ipv4=off
-chardev socket,id=cdev0,host=,port=9000,server,nowait,ipv6=on
-chardev socket,id=cdev0,host=::,port=9000,server,nowait,ipv4=off
-chardev socket,id=cdev0,host=::,port=9000,server,nowait,ipv6=on
which all mistakenly accepted IPv4 clients
Acked-by: Gerd Hoffmann <kraxel@gmail.com>
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
Reviewed-by: Eric Blake <eblake@redhat.com>
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
2017-05-17 16:17:55 +03:00
|
|
|
* t t PF_INET6/PF_UNSPEC
|
2016-01-11 16:17:02 +03:00
|
|
|
*
|
2016-03-14 12:58:29 +03:00
|
|
|
* NB, this matrix is only about getting the necessary results
|
2016-01-11 16:17:02 +03:00
|
|
|
* from getaddrinfo(). Some of the cases require further work
|
|
|
|
* after reading results from getaddrinfo in order to fully
|
sockets: ensure we don't accept IPv4 clients when IPv4 is disabled
Currently if you disable listening on IPv4 addresses, via the
CLI flag ipv4=off, we still mistakenly accept IPv4 clients via
the IPv6 listener socket due to IPV6_V6ONLY flag being unset.
We must ensure IPV6_V6ONLY is always set if ipv4=off
This fixes the following scenarios
-incoming tcp::9000,ipv6=on
-incoming tcp:[::]:9000,ipv6=on
-chardev socket,id=cdev0,host=,port=9000,server,nowait,ipv4=off
-chardev socket,id=cdev0,host=,port=9000,server,nowait,ipv6=on
-chardev socket,id=cdev0,host=::,port=9000,server,nowait,ipv4=off
-chardev socket,id=cdev0,host=::,port=9000,server,nowait,ipv6=on
which all mistakenly accepted IPv4 clients
Acked-by: Gerd Hoffmann <kraxel@gmail.com>
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
Reviewed-by: Eric Blake <eblake@redhat.com>
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
2017-05-17 16:17:55 +03:00
|
|
|
* apply the logic the end user wants.
|
|
|
|
*
|
|
|
|
* In the first and last cases, we must set IPV6_V6ONLY=0
|
|
|
|
* when binding, to allow a single listener to potentially
|
|
|
|
* accept both IPv4+6 addresses.
|
2016-01-11 16:17:02 +03:00
|
|
|
*/
|
2016-07-19 14:54:47 +03:00
|
|
|
int inet_ai_family_from_address(InetSocketAddress *addr,
|
|
|
|
Error **errp)
|
2016-01-11 16:17:02 +03:00
|
|
|
{
|
|
|
|
if (addr->has_ipv6 && addr->has_ipv4 &&
|
|
|
|
!addr->ipv6 && !addr->ipv4) {
|
|
|
|
error_setg(errp, "Cannot disable IPv4 and IPv6 at same time");
|
|
|
|
return PF_UNSPEC;
|
|
|
|
}
|
sockets: ensure we don't accept IPv4 clients when IPv4 is disabled
Currently if you disable listening on IPv4 addresses, via the
CLI flag ipv4=off, we still mistakenly accept IPv4 clients via
the IPv6 listener socket due to IPV6_V6ONLY flag being unset.
We must ensure IPV6_V6ONLY is always set if ipv4=off
This fixes the following scenarios
-incoming tcp::9000,ipv6=on
-incoming tcp:[::]:9000,ipv6=on
-chardev socket,id=cdev0,host=,port=9000,server,nowait,ipv4=off
-chardev socket,id=cdev0,host=,port=9000,server,nowait,ipv6=on
-chardev socket,id=cdev0,host=::,port=9000,server,nowait,ipv4=off
-chardev socket,id=cdev0,host=::,port=9000,server,nowait,ipv6=on
which all mistakenly accepted IPv4 clients
Acked-by: Gerd Hoffmann <kraxel@gmail.com>
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
Reviewed-by: Eric Blake <eblake@redhat.com>
Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
2017-05-17 16:17:55 +03:00
|
|
|
if ((addr->has_ipv6 && addr->ipv6) && (addr->has_ipv4 && addr->ipv4)) {
|
|
|
|
/*
|
|
|
|
* Some backends can only do a single listener. In that case
|
|
|
|
* we want empty hostname to resolve to "::" and then use the
|
|
|
|
* flag IPV6_V6ONLY==0 to get both protocols on 1 socket. This
|
|
|
|
* doesn't work for addresses other than "", so they're just
|
|
|
|
* inevitably broken until multiple listeners can be used,
|
|
|
|
* and thus we honour getaddrinfo automatic protocol detection
|
|
|
|
* Once all backends do multi-listener, remove the PF_INET6
|
|
|
|
* branch entirely.
|
|
|
|
*/
|
|
|
|
if (!addr->host || g_str_equal(addr->host, "")) {
|
|
|
|
return PF_INET6;
|
|
|
|
} else {
|
|
|
|
return PF_UNSPEC;
|
|
|
|
}
|
|
|
|
}
|
2016-01-11 16:17:02 +03:00
|
|
|
if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) {
|
|
|
|
return PF_INET6;
|
|
|
|
}
|
|
|
|
if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) {
|
|
|
|
return PF_INET;
|
|
|
|
}
|
|
|
|
return PF_UNSPEC;
|
|
|
|
}
|
|
|
|
|
2017-08-07 13:58:41 +03:00
|
|
|
static int create_fast_reuse_socket(struct addrinfo *e)
|
|
|
|
{
|
|
|
|
int slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol);
|
|
|
|
if (slisten < 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
socket_set_fast_reuse(slisten);
|
|
|
|
return slisten;
|
|
|
|
}
|
|
|
|
|
2017-08-07 13:58:40 +03:00
|
|
|
static int try_bind(int socket, InetSocketAddress *saddr, struct addrinfo *e)
|
|
|
|
{
|
|
|
|
#ifndef IPV6_V6ONLY
|
|
|
|
return bind(socket, e->ai_addr, e->ai_addrlen);
|
|
|
|
#else
|
|
|
|
/*
|
|
|
|
* Deals with first & last cases in matrix in comment
|
|
|
|
* for inet_ai_family_from_address().
|
|
|
|
*/
|
|
|
|
int v6only =
|
|
|
|
((!saddr->has_ipv4 && !saddr->has_ipv6) ||
|
|
|
|
(saddr->has_ipv4 && saddr->ipv4 &&
|
|
|
|
saddr->has_ipv6 && saddr->ipv6)) ? 0 : 1;
|
|
|
|
int stat;
|
|
|
|
|
|
|
|
rebind:
|
|
|
|
if (e->ai_family == PF_INET6) {
|
2022-02-19 00:34:50 +03:00
|
|
|
setsockopt(socket, IPPROTO_IPV6, IPV6_V6ONLY, &v6only,
|
|
|
|
sizeof(v6only));
|
2017-08-07 13:58:40 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
stat = bind(socket, e->ai_addr, e->ai_addrlen);
|
|
|
|
if (!stat) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If we got EADDRINUSE from an IPv6 bind & v6only is unset,
|
|
|
|
* it could be that the IPv4 port is already claimed, so retry
|
|
|
|
* with v6only set
|
|
|
|
*/
|
|
|
|
if (e->ai_family == PF_INET6 && errno == EADDRINUSE && !v6only) {
|
|
|
|
v6only = 1;
|
|
|
|
goto rebind;
|
|
|
|
}
|
|
|
|
return stat;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2016-01-11 16:17:02 +03:00
|
|
|
static int inet_listen_saddr(InetSocketAddress *saddr,
|
|
|
|
int port_offset,
|
2019-08-19 15:48:21 +03:00
|
|
|
int num,
|
2016-01-11 16:17:02 +03:00
|
|
|
Error **errp)
|
2008-11-11 23:46:40 +03:00
|
|
|
{
|
|
|
|
struct addrinfo ai,*res,*e;
|
|
|
|
char port[33];
|
|
|
|
char uaddr[INET6_ADDRSTRLEN+1];
|
|
|
|
char uport[33];
|
2017-08-07 13:58:42 +03:00
|
|
|
int rc, port_min, port_max, p;
|
2017-10-20 12:18:39 +03:00
|
|
|
int slisten = -1;
|
2017-08-07 13:58:42 +03:00
|
|
|
int saved_errno = 0;
|
|
|
|
bool socket_created = false;
|
2016-01-11 16:17:02 +03:00
|
|
|
Error *err = NULL;
|
2008-11-11 23:46:40 +03:00
|
|
|
|
2019-07-25 12:49:37 +03:00
|
|
|
if (saddr->keep_alive) {
|
|
|
|
error_setg(errp, "keep-alive option is not supported for passive "
|
|
|
|
"sockets");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2008-11-11 23:46:40 +03:00
|
|
|
memset(&ai,0, sizeof(ai));
|
2015-05-21 15:33:29 +03:00
|
|
|
ai.ai_flags = AI_PASSIVE;
|
2016-07-19 14:58:52 +03:00
|
|
|
if (saddr->has_numeric && saddr->numeric) {
|
|
|
|
ai.ai_flags |= AI_NUMERICHOST | AI_NUMERICSERV;
|
|
|
|
}
|
2016-01-11 16:17:02 +03:00
|
|
|
ai.ai_family = inet_ai_family_from_address(saddr, &err);
|
2009-09-10 12:58:41 +04:00
|
|
|
ai.ai_socktype = SOCK_STREAM;
|
2008-11-11 23:46:40 +03:00
|
|
|
|
2016-01-11 16:17:02 +03:00
|
|
|
if (err) {
|
|
|
|
error_propagate(errp, err);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (saddr->host == NULL) {
|
2015-09-01 16:46:50 +03:00
|
|
|
error_setg(errp, "host not specified");
|
2009-09-10 12:58:41 +04:00
|
|
|
return -1;
|
2008-11-11 23:46:40 +03:00
|
|
|
}
|
2016-01-11 16:17:02 +03:00
|
|
|
if (saddr->port != NULL) {
|
|
|
|
pstrcpy(port, sizeof(port), saddr->port);
|
2015-09-01 16:46:50 +03:00
|
|
|
} else {
|
|
|
|
port[0] = '\0';
|
|
|
|
}
|
2008-11-11 23:46:40 +03:00
|
|
|
|
|
|
|
/* lookup */
|
2013-12-11 15:58:41 +04:00
|
|
|
if (port_offset) {
|
|
|
|
unsigned long long baseport;
|
2015-09-01 16:46:50 +03:00
|
|
|
if (strlen(port) == 0) {
|
|
|
|
error_setg(errp, "port not specified");
|
|
|
|
return -1;
|
|
|
|
}
|
2013-12-11 15:58:41 +04:00
|
|
|
if (parse_uint_full(port, &baseport, 10) < 0) {
|
|
|
|
error_setg(errp, "can't convert to a number: %s", port);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (baseport > 65535 ||
|
|
|
|
baseport + port_offset > 65535) {
|
|
|
|
error_setg(errp, "port %s out of range", port);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
snprintf(port, sizeof(port), "%d", (int)baseport + port_offset);
|
|
|
|
}
|
2016-01-11 16:17:02 +03:00
|
|
|
rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL,
|
2015-09-01 16:46:50 +03:00
|
|
|
strlen(port) ? port : NULL, &ai, &res);
|
2008-11-11 23:46:40 +03:00
|
|
|
if (rc != 0) {
|
2016-01-11 16:17:02 +03:00
|
|
|
error_setg(errp, "address resolution failed for %s:%s: %s",
|
|
|
|
saddr->host, port, gai_strerror(rc));
|
2008-11-11 23:46:40 +03:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2017-08-07 13:58:42 +03:00
|
|
|
/* create socket + bind/listen */
|
2008-11-11 23:46:40 +03:00
|
|
|
for (e = res; e != NULL; e = e->ai_next) {
|
2021-09-07 15:19:13 +03:00
|
|
|
#ifdef HAVE_IPPROTO_MPTCP
|
2021-04-21 14:28:34 +03:00
|
|
|
if (saddr->has_mptcp && saddr->mptcp) {
|
|
|
|
e->ai_protocol = IPPROTO_MPTCP;
|
|
|
|
}
|
|
|
|
#endif
|
2009-05-06 13:57:03 +04:00
|
|
|
getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
|
2018-12-14 01:37:37 +03:00
|
|
|
uaddr,INET6_ADDRSTRLEN,uport,32,
|
|
|
|
NI_NUMERICHOST | NI_NUMERICSERV);
|
2017-08-07 13:58:41 +03:00
|
|
|
|
2012-02-07 18:09:15 +04:00
|
|
|
port_min = inet_getport(e);
|
2016-01-11 16:17:02 +03:00
|
|
|
port_max = saddr->has_to ? saddr->to + port_offset : port_min;
|
2012-02-07 18:09:15 +04:00
|
|
|
for (p = port_min; p <= port_max; p++) {
|
|
|
|
inet_setport(e, p);
|
2017-10-20 12:18:39 +03:00
|
|
|
|
|
|
|
slisten = create_fast_reuse_socket(e);
|
|
|
|
if (slisten < 0) {
|
|
|
|
/* First time we expect we might fail to create the socket
|
|
|
|
* eg if 'e' has AF_INET6 but ipv6 kmod is not loaded.
|
|
|
|
* Later iterations should always succeed if first iteration
|
|
|
|
* worked though, so treat that as fatal.
|
|
|
|
*/
|
|
|
|
if (p == port_min) {
|
2017-08-07 13:58:42 +03:00
|
|
|
continue;
|
|
|
|
} else {
|
2017-10-20 12:18:39 +03:00
|
|
|
error_setg_errno(errp, errno,
|
|
|
|
"Failed to recreate failed listening socket");
|
2017-08-07 13:58:42 +03:00
|
|
|
goto listen_failed;
|
2012-05-10 20:28:26 +04:00
|
|
|
}
|
2008-11-11 23:46:40 +03:00
|
|
|
}
|
2017-10-20 12:18:39 +03:00
|
|
|
socket_created = true;
|
|
|
|
|
|
|
|
rc = try_bind(slisten, saddr, e);
|
|
|
|
if (rc < 0) {
|
|
|
|
if (errno != EADDRINUSE) {
|
|
|
|
error_setg_errno(errp, errno, "Failed to bind socket");
|
|
|
|
goto listen_failed;
|
|
|
|
}
|
|
|
|
} else {
|
2019-08-19 15:48:21 +03:00
|
|
|
if (!listen(slisten, num)) {
|
2017-10-20 12:18:39 +03:00
|
|
|
goto listen_ok;
|
|
|
|
}
|
|
|
|
if (errno != EADDRINUSE) {
|
|
|
|
error_setg_errno(errp, errno, "Failed to listen on socket");
|
|
|
|
goto listen_failed;
|
|
|
|
}
|
2017-08-07 13:58:42 +03:00
|
|
|
}
|
|
|
|
/* Someone else managed to bind to the same port and beat us
|
|
|
|
* to listen on it! Socket semantics does not allow us to
|
|
|
|
* recover from this situation, so we need to recreate the
|
|
|
|
* socket to allow bind attempts for subsequent ports:
|
|
|
|
*/
|
|
|
|
closesocket(slisten);
|
2017-10-20 12:18:39 +03:00
|
|
|
slisten = -1;
|
2008-11-11 23:46:40 +03:00
|
|
|
}
|
2017-08-07 13:58:42 +03:00
|
|
|
}
|
|
|
|
error_setg_errno(errp, errno,
|
|
|
|
socket_created ?
|
|
|
|
"Failed to find an available port" :
|
|
|
|
"Failed to create a socket");
|
|
|
|
listen_failed:
|
|
|
|
saved_errno = errno;
|
|
|
|
if (slisten >= 0) {
|
2008-11-11 23:46:40 +03:00
|
|
|
closesocket(slisten);
|
|
|
|
}
|
|
|
|
freeaddrinfo(res);
|
2017-08-07 13:58:42 +03:00
|
|
|
errno = saved_errno;
|
2008-11-11 23:46:40 +03:00
|
|
|
return -1;
|
|
|
|
|
2017-08-07 13:58:42 +03:00
|
|
|
listen_ok:
|
2008-11-11 23:46:40 +03:00
|
|
|
freeaddrinfo(res);
|
|
|
|
return slisten;
|
|
|
|
}
|
|
|
|
|
2012-09-24 15:11:07 +04:00
|
|
|
#ifdef _WIN32
|
|
|
|
#define QEMU_SOCKET_RC_INPROGRESS(rc) \
|
|
|
|
((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY)
|
|
|
|
#else
|
|
|
|
#define QEMU_SOCKET_RC_INPROGRESS(rc) \
|
|
|
|
((rc) == -EINPROGRESS)
|
|
|
|
#endif
|
|
|
|
|
2020-09-18 12:31:45 +03:00
|
|
|
static int inet_connect_addr(const InetSocketAddress *saddr,
|
|
|
|
struct addrinfo *addr, Error **errp)
|
2012-09-24 15:11:09 +04:00
|
|
|
{
|
|
|
|
int sock, rc;
|
|
|
|
|
2012-09-24 15:11:07 +04:00
|
|
|
sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
|
|
|
|
if (sock < 0) {
|
2020-09-18 12:31:45 +03:00
|
|
|
error_setg_errno(errp, errno, "Failed to create socket family %d",
|
|
|
|
addr->ai_family);
|
2012-09-24 15:11:07 +04:00
|
|
|
return -1;
|
|
|
|
}
|
2013-10-02 14:23:16 +04:00
|
|
|
socket_set_fast_reuse(sock);
|
2017-06-16 11:54:45 +03:00
|
|
|
|
2012-09-24 15:11:07 +04:00
|
|
|
/* connect to peer */
|
|
|
|
do {
|
|
|
|
rc = 0;
|
|
|
|
if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) {
|
2016-03-07 23:36:03 +03:00
|
|
|
rc = -errno;
|
2012-09-24 15:11:07 +04:00
|
|
|
}
|
|
|
|
} while (rc == -EINTR);
|
|
|
|
|
2017-06-16 11:54:45 +03:00
|
|
|
if (rc < 0) {
|
2020-09-18 12:31:45 +03:00
|
|
|
error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
|
|
|
|
saddr->host, saddr->port);
|
2012-09-24 15:11:07 +04:00
|
|
|
closesocket(sock);
|
|
|
|
return -1;
|
|
|
|
}
|
2017-06-16 11:54:45 +03:00
|
|
|
|
2012-09-24 15:11:07 +04:00
|
|
|
return sock;
|
|
|
|
}
|
|
|
|
|
2016-01-11 16:17:03 +03:00
|
|
|
static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr,
|
|
|
|
Error **errp)
|
2012-09-24 15:11:07 +04:00
|
|
|
{
|
|
|
|
struct addrinfo ai, *res;
|
|
|
|
int rc;
|
2016-01-11 16:17:03 +03:00
|
|
|
Error *err = NULL;
|
2016-04-04 19:22:00 +03:00
|
|
|
static int useV4Mapped = 1;
|
2008-11-11 23:46:40 +03:00
|
|
|
|
2012-09-24 15:11:07 +04:00
|
|
|
memset(&ai, 0, sizeof(ai));
|
2012-09-24 15:11:09 +04:00
|
|
|
|
2016-04-04 19:22:00 +03:00
|
|
|
ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
|
2020-09-23 13:56:46 +03:00
|
|
|
if (qatomic_read(&useV4Mapped)) {
|
2016-04-04 19:22:00 +03:00
|
|
|
ai.ai_flags |= AI_V4MAPPED;
|
|
|
|
}
|
2016-01-11 16:17:03 +03:00
|
|
|
ai.ai_family = inet_ai_family_from_address(saddr, &err);
|
2009-09-10 12:58:40 +04:00
|
|
|
ai.ai_socktype = SOCK_STREAM;
|
2008-11-11 23:46:40 +03:00
|
|
|
|
2016-01-11 16:17:03 +03:00
|
|
|
if (err) {
|
|
|
|
error_propagate(errp, err);
|
2012-09-24 15:11:07 +04:00
|
|
|
return NULL;
|
2008-11-11 23:46:40 +03:00
|
|
|
}
|
|
|
|
|
2016-01-11 16:17:03 +03:00
|
|
|
if (saddr->host == NULL || saddr->port == NULL) {
|
|
|
|
error_setg(errp, "host and/or port not specified");
|
|
|
|
return NULL;
|
2012-09-24 15:11:07 +04:00
|
|
|
}
|
2008-11-11 23:46:40 +03:00
|
|
|
|
|
|
|
/* lookup */
|
2016-01-11 16:17:03 +03:00
|
|
|
rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
|
2016-04-04 19:22:00 +03:00
|
|
|
|
|
|
|
/* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but
|
|
|
|
* then don't implement it in their getaddrinfo(). Detect
|
2020-09-17 10:50:24 +03:00
|
|
|
* this and retry without the flag since that's preferable
|
2016-04-04 19:22:00 +03:00
|
|
|
* to a fatal error
|
|
|
|
*/
|
|
|
|
if (rc == EAI_BADFLAGS &&
|
|
|
|
(ai.ai_flags & AI_V4MAPPED)) {
|
2020-09-23 13:56:46 +03:00
|
|
|
qatomic_set(&useV4Mapped, 0);
|
2016-04-04 19:22:00 +03:00
|
|
|
ai.ai_flags &= ~AI_V4MAPPED;
|
|
|
|
rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
|
|
|
|
}
|
2012-09-24 15:11:07 +04:00
|
|
|
if (rc != 0) {
|
2016-01-11 16:17:03 +03:00
|
|
|
error_setg(errp, "address resolution failed for %s:%s: %s",
|
|
|
|
saddr->host, saddr->port, gai_strerror(rc));
|
2012-09-24 15:11:07 +04:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2012-09-24 15:11:08 +04:00
|
|
|
/**
|
|
|
|
* Create a socket and connect it to an address.
|
|
|
|
*
|
2016-01-11 16:17:03 +03:00
|
|
|
* @saddr: Inet socket address specification
|
2012-09-24 15:11:08 +04:00
|
|
|
* @errp: set on error
|
|
|
|
*
|
|
|
|
* Returns: -1 on error, file descriptor on success.
|
|
|
|
*/
|
2017-06-16 11:54:45 +03:00
|
|
|
int inet_connect_saddr(InetSocketAddress *saddr, Error **errp)
|
2012-09-24 15:11:07 +04:00
|
|
|
{
|
2014-05-19 20:57:37 +04:00
|
|
|
Error *local_err = NULL;
|
2012-09-24 15:11:07 +04:00
|
|
|
struct addrinfo *res, *e;
|
|
|
|
int sock = -1;
|
|
|
|
|
2016-01-11 16:17:03 +03:00
|
|
|
res = inet_parse_connect_saddr(saddr, errp);
|
2012-09-24 15:11:07 +04:00
|
|
|
if (!res) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2008-11-11 23:46:40 +03:00
|
|
|
for (e = res; e != NULL; e = e->ai_next) {
|
2014-05-19 20:57:37 +04:00
|
|
|
error_free(local_err);
|
|
|
|
local_err = NULL;
|
2021-04-21 14:28:34 +03:00
|
|
|
|
2021-09-07 15:19:13 +03:00
|
|
|
#ifdef HAVE_IPPROTO_MPTCP
|
2021-04-21 14:28:34 +03:00
|
|
|
if (saddr->has_mptcp && saddr->mptcp) {
|
|
|
|
e->ai_protocol = IPPROTO_MPTCP;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2020-09-18 12:31:45 +03:00
|
|
|
sock = inet_connect_addr(saddr, e, &local_err);
|
2014-05-19 20:57:37 +04:00
|
|
|
if (sock >= 0) {
|
2012-09-24 15:11:07 +04:00
|
|
|
break;
|
2012-05-10 20:28:16 +04:00
|
|
|
}
|
2008-11-11 23:46:40 +03:00
|
|
|
}
|
2014-05-19 20:57:37 +04:00
|
|
|
|
2019-09-10 10:59:43 +03:00
|
|
|
freeaddrinfo(res);
|
|
|
|
|
2014-05-19 20:57:37 +04:00
|
|
|
if (sock < 0) {
|
|
|
|
error_propagate(errp, local_err);
|
2019-09-10 10:59:43 +03:00
|
|
|
return sock;
|
2014-05-19 20:57:37 +04:00
|
|
|
}
|
2017-06-16 11:54:45 +03:00
|
|
|
|
2019-07-25 12:49:37 +03:00
|
|
|
if (saddr->keep_alive) {
|
|
|
|
int val = 1;
|
2022-02-19 00:34:50 +03:00
|
|
|
int ret = setsockopt(sock, SOL_SOCKET, SO_KEEPALIVE,
|
|
|
|
&val, sizeof(val));
|
2019-07-25 12:49:37 +03:00
|
|
|
|
|
|
|
if (ret < 0) {
|
|
|
|
error_setg_errno(errp, errno, "Unable to set KEEPALIVE");
|
|
|
|
close(sock);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-09-24 15:11:07 +04:00
|
|
|
return sock;
|
2008-11-11 23:46:40 +03:00
|
|
|
}
|
|
|
|
|
2016-01-11 16:17:04 +03:00
|
|
|
static int inet_dgram_saddr(InetSocketAddress *sraddr,
|
|
|
|
InetSocketAddress *sladdr,
|
|
|
|
Error **errp)
|
2009-09-10 12:58:51 +04:00
|
|
|
{
|
|
|
|
struct addrinfo ai, *peer = NULL, *local = NULL;
|
|
|
|
const char *addr;
|
|
|
|
const char *port;
|
|
|
|
int sock = -1, rc;
|
2016-01-11 16:17:04 +03:00
|
|
|
Error *err = NULL;
|
2009-09-10 12:58:51 +04:00
|
|
|
|
|
|
|
/* lookup peer addr */
|
|
|
|
memset(&ai,0, sizeof(ai));
|
2015-05-21 15:33:29 +03:00
|
|
|
ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG;
|
2016-01-11 16:17:04 +03:00
|
|
|
ai.ai_family = inet_ai_family_from_address(sraddr, &err);
|
2009-09-10 12:58:51 +04:00
|
|
|
ai.ai_socktype = SOCK_DGRAM;
|
|
|
|
|
2016-01-11 16:17:04 +03:00
|
|
|
if (err) {
|
|
|
|
error_propagate(errp, err);
|
2016-01-22 14:28:33 +03:00
|
|
|
goto err;
|
2016-01-11 16:17:04 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
addr = sraddr->host;
|
|
|
|
port = sraddr->port;
|
2009-09-10 12:58:51 +04:00
|
|
|
if (addr == NULL || strlen(addr) == 0) {
|
|
|
|
addr = "localhost";
|
|
|
|
}
|
|
|
|
if (port == NULL || strlen(port) == 0) {
|
2012-10-02 11:25:14 +04:00
|
|
|
error_setg(errp, "remote port not specified");
|
2016-01-22 14:28:33 +03:00
|
|
|
goto err;
|
2009-09-10 12:58:51 +04:00
|
|
|
}
|
|
|
|
|
2016-07-28 13:50:04 +03:00
|
|
|
if ((rc = getaddrinfo(addr, port, &ai, &peer)) != 0) {
|
2012-10-02 11:25:14 +04:00
|
|
|
error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
|
|
|
|
gai_strerror(rc));
|
2016-07-28 11:54:33 +03:00
|
|
|
goto err;
|
2009-09-10 12:58:51 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* lookup local addr */
|
|
|
|
memset(&ai,0, sizeof(ai));
|
|
|
|
ai.ai_flags = AI_PASSIVE;
|
|
|
|
ai.ai_family = peer->ai_family;
|
|
|
|
ai.ai_socktype = SOCK_DGRAM;
|
|
|
|
|
2016-01-11 16:17:04 +03:00
|
|
|
if (sladdr) {
|
|
|
|
addr = sladdr->host;
|
|
|
|
port = sladdr->port;
|
|
|
|
if (addr == NULL || strlen(addr) == 0) {
|
|
|
|
addr = NULL;
|
|
|
|
}
|
|
|
|
if (!port || strlen(port) == 0) {
|
|
|
|
port = "0";
|
|
|
|
}
|
|
|
|
} else {
|
2009-09-10 12:58:51 +04:00
|
|
|
addr = NULL;
|
|
|
|
port = "0";
|
2016-01-11 16:17:04 +03:00
|
|
|
}
|
2009-09-10 12:58:51 +04:00
|
|
|
|
2016-07-28 13:50:04 +03:00
|
|
|
if ((rc = getaddrinfo(addr, port, &ai, &local)) != 0) {
|
2012-10-02 11:25:14 +04:00
|
|
|
error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
|
|
|
|
gai_strerror(rc));
|
2012-09-01 11:40:26 +04:00
|
|
|
goto err;
|
2009-09-10 12:58:51 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* create socket */
|
2009-12-02 14:24:42 +03:00
|
|
|
sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol);
|
2009-09-10 12:58:51 +04:00
|
|
|
if (sock < 0) {
|
2020-09-18 12:31:45 +03:00
|
|
|
error_setg_errno(errp, errno, "Failed to create socket family %d",
|
|
|
|
peer->ai_family);
|
2009-09-10 12:58:51 +04:00
|
|
|
goto err;
|
|
|
|
}
|
2013-10-02 14:23:16 +04:00
|
|
|
socket_set_fast_reuse(sock);
|
2009-09-10 12:58:51 +04:00
|
|
|
|
|
|
|
/* bind socket */
|
|
|
|
if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) {
|
2014-09-25 10:49:31 +04:00
|
|
|
error_setg_errno(errp, errno, "Failed to bind socket");
|
2009-09-10 12:58:51 +04:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* connect to peer */
|
|
|
|
if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) {
|
2020-09-18 12:31:45 +03:00
|
|
|
error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
|
|
|
|
addr, port);
|
2009-09-10 12:58:51 +04:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
freeaddrinfo(local);
|
|
|
|
freeaddrinfo(peer);
|
|
|
|
return sock;
|
|
|
|
|
|
|
|
err:
|
2016-07-28 11:54:33 +03:00
|
|
|
if (sock != -1) {
|
2009-09-10 12:58:51 +04:00
|
|
|
closesocket(sock);
|
2016-07-28 11:54:33 +03:00
|
|
|
}
|
|
|
|
if (local) {
|
2009-09-10 12:58:51 +04:00
|
|
|
freeaddrinfo(local);
|
2016-07-28 11:54:33 +03:00
|
|
|
}
|
|
|
|
if (peer) {
|
2009-09-10 12:58:51 +04:00
|
|
|
freeaddrinfo(peer);
|
2016-07-28 11:54:33 +03:00
|
|
|
}
|
|
|
|
|
2009-09-10 12:58:51 +04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2009-09-10 12:58:40 +04:00
|
|
|
/* compatibility wrapper */
|
2018-01-25 20:14:12 +03:00
|
|
|
static int inet_parse_flag(const char *flagname, const char *optstr, bool *val,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
char *end;
|
|
|
|
size_t len;
|
|
|
|
|
|
|
|
end = strstr(optstr, ",");
|
|
|
|
if (end) {
|
|
|
|
if (end[1] == ',') { /* Reject 'ipv6=on,,foo' */
|
|
|
|
error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
len = end - optstr;
|
|
|
|
} else {
|
|
|
|
len = strlen(optstr);
|
|
|
|
}
|
|
|
|
if (len == 0 || (len == 3 && strncmp(optstr, "=on", len) == 0)) {
|
|
|
|
*val = true;
|
|
|
|
} else if (len == 4 && strncmp(optstr, "=off", len) == 0) {
|
|
|
|
*val = false;
|
|
|
|
} else {
|
|
|
|
error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-04-26 10:36:37 +03:00
|
|
|
int inet_parse(InetSocketAddress *addr, const char *str, Error **errp)
|
2009-09-10 12:58:40 +04:00
|
|
|
{
|
|
|
|
const char *optstr, *h;
|
2015-01-30 22:37:55 +03:00
|
|
|
char host[65];
|
2009-09-10 12:58:40 +04:00
|
|
|
char port[33];
|
2012-09-19 15:51:46 +04:00
|
|
|
int to;
|
2009-09-10 12:58:40 +04:00
|
|
|
int pos;
|
2018-01-25 20:14:12 +03:00
|
|
|
char *begin;
|
2009-09-10 12:58:40 +04:00
|
|
|
|
2017-04-26 10:36:37 +03:00
|
|
|
memset(addr, 0, sizeof(*addr));
|
2012-09-19 15:51:46 +04:00
|
|
|
|
2009-09-10 12:58:40 +04:00
|
|
|
/* parse address */
|
|
|
|
if (str[0] == ':') {
|
|
|
|
/* no host given */
|
2012-09-19 15:51:46 +04:00
|
|
|
host[0] = '\0';
|
2016-07-28 13:50:04 +03:00
|
|
|
if (sscanf(str, ":%32[^,]%n", port, &pos) != 1) {
|
2012-09-19 15:22:21 +04:00
|
|
|
error_setg(errp, "error parsing port in address '%s'", str);
|
2017-04-26 10:36:37 +03:00
|
|
|
return -1;
|
2009-09-10 12:58:40 +04:00
|
|
|
}
|
|
|
|
} else if (str[0] == '[') {
|
|
|
|
/* IPv6 addr */
|
2016-07-28 13:50:04 +03:00
|
|
|
if (sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos) != 2) {
|
2012-09-19 15:22:21 +04:00
|
|
|
error_setg(errp, "error parsing IPv6 address '%s'", str);
|
2017-04-26 10:36:37 +03:00
|
|
|
return -1;
|
2009-09-10 12:58:40 +04:00
|
|
|
}
|
|
|
|
} else {
|
2013-06-03 19:54:55 +04:00
|
|
|
/* hostname or IPv4 addr */
|
2016-07-28 13:50:04 +03:00
|
|
|
if (sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos) != 2) {
|
2012-09-19 15:22:21 +04:00
|
|
|
error_setg(errp, "error parsing address '%s'", str);
|
2017-04-26 10:36:37 +03:00
|
|
|
return -1;
|
2009-09-10 12:58:40 +04:00
|
|
|
}
|
|
|
|
}
|
2012-09-19 15:51:46 +04:00
|
|
|
|
|
|
|
addr->host = g_strdup(host);
|
|
|
|
addr->port = g_strdup(port);
|
2009-09-10 12:58:40 +04:00
|
|
|
|
|
|
|
/* parse options */
|
|
|
|
optstr = str + pos;
|
|
|
|
h = strstr(optstr, ",to=");
|
2012-09-19 15:51:46 +04:00
|
|
|
if (h) {
|
2012-11-16 08:08:14 +04:00
|
|
|
h += 4;
|
|
|
|
if (sscanf(h, "%d%n", &to, &pos) != 1 ||
|
|
|
|
(h[pos] != '\0' && h[pos] != ',')) {
|
2012-09-19 15:51:46 +04:00
|
|
|
error_setg(errp, "error parsing to= argument");
|
2017-04-26 10:36:37 +03:00
|
|
|
return -1;
|
2012-09-19 15:51:46 +04:00
|
|
|
}
|
|
|
|
addr->has_to = true;
|
|
|
|
addr->to = to;
|
|
|
|
}
|
2018-01-25 20:14:12 +03:00
|
|
|
begin = strstr(optstr, ",ipv4");
|
|
|
|
if (begin) {
|
|
|
|
if (inet_parse_flag("ipv4", begin + 5, &addr->ipv4, errp) < 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
addr->has_ipv4 = true;
|
2012-09-19 15:51:46 +04:00
|
|
|
}
|
2018-01-25 20:14:12 +03:00
|
|
|
begin = strstr(optstr, ",ipv6");
|
|
|
|
if (begin) {
|
|
|
|
if (inet_parse_flag("ipv6", begin + 5, &addr->ipv6, errp) < 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
addr->has_ipv6 = true;
|
2012-09-19 15:51:46 +04:00
|
|
|
}
|
2019-07-25 12:49:37 +03:00
|
|
|
begin = strstr(optstr, ",keep-alive");
|
|
|
|
if (begin) {
|
|
|
|
if (inet_parse_flag("keep-alive", begin + strlen(",keep-alive"),
|
|
|
|
&addr->keep_alive, errp) < 0)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
addr->has_keep_alive = true;
|
|
|
|
}
|
2021-09-07 15:19:13 +03:00
|
|
|
#ifdef HAVE_IPPROTO_MPTCP
|
2021-04-21 14:28:34 +03:00
|
|
|
begin = strstr(optstr, ",mptcp");
|
|
|
|
if (begin) {
|
|
|
|
if (inet_parse_flag("mptcp", begin + strlen(",mptcp"),
|
|
|
|
&addr->mptcp, errp) < 0)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
addr->has_mptcp = true;
|
|
|
|
}
|
|
|
|
#endif
|
2017-04-26 10:36:37 +03:00
|
|
|
return 0;
|
2012-09-19 15:51:46 +04:00
|
|
|
}
|
|
|
|
|
2009-09-10 12:58:41 +04:00
|
|
|
|
2012-09-24 15:11:08 +04:00
|
|
|
/**
|
|
|
|
* Create a blocking socket and connect it to an address.
|
|
|
|
*
|
|
|
|
* @str: address string
|
|
|
|
* @errp: set in case of an error
|
|
|
|
*
|
|
|
|
* Returns -1 in case of error, file descriptor on success
|
|
|
|
**/
|
|
|
|
int inet_connect(const char *str, Error **errp)
|
2009-09-10 12:58:40 +04:00
|
|
|
{
|
|
|
|
int sock = -1;
|
2017-04-26 10:36:37 +03:00
|
|
|
InetSocketAddress *addr = g_new(InetSocketAddress, 1);
|
2009-09-10 12:58:40 +04:00
|
|
|
|
2017-04-26 10:36:37 +03:00
|
|
|
if (!inet_parse(addr, str, errp)) {
|
2017-06-16 11:54:45 +03:00
|
|
|
sock = inet_connect_saddr(addr, errp);
|
2012-09-24 15:11:08 +04:00
|
|
|
}
|
2017-04-26 10:36:37 +03:00
|
|
|
qapi_free_InetSocketAddress(addr);
|
2012-09-24 15:11:08 +04:00
|
|
|
return sock;
|
|
|
|
}
|
|
|
|
|
2016-10-14 12:00:55 +03:00
|
|
|
#ifdef CONFIG_AF_VSOCK
|
|
|
|
static bool vsock_parse_vaddr_to_sockaddr(const VsockSocketAddress *vaddr,
|
|
|
|
struct sockaddr_vm *svm,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
unsigned long long val;
|
|
|
|
|
|
|
|
memset(svm, 0, sizeof(*svm));
|
|
|
|
svm->svm_family = AF_VSOCK;
|
|
|
|
|
|
|
|
if (parse_uint_full(vaddr->cid, &val, 10) < 0 ||
|
|
|
|
val > UINT32_MAX) {
|
|
|
|
error_setg(errp, "Failed to parse cid '%s'", vaddr->cid);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
svm->svm_cid = val;
|
|
|
|
|
|
|
|
if (parse_uint_full(vaddr->port, &val, 10) < 0 ||
|
|
|
|
val > UINT32_MAX) {
|
|
|
|
error_setg(errp, "Failed to parse port '%s'", vaddr->port);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
svm->svm_port = val;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-09-18 12:31:45 +03:00
|
|
|
static int vsock_connect_addr(const VsockSocketAddress *vaddr,
|
|
|
|
const struct sockaddr_vm *svm, Error **errp)
|
2016-10-14 12:00:55 +03:00
|
|
|
{
|
|
|
|
int sock, rc;
|
|
|
|
|
|
|
|
sock = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
|
|
|
|
if (sock < 0) {
|
2020-09-18 12:31:45 +03:00
|
|
|
error_setg_errno(errp, errno, "Failed to create socket family %d",
|
|
|
|
AF_VSOCK);
|
2016-10-14 12:00:55 +03:00
|
|
|
return -1;
|
|
|
|
}
|
2017-06-16 11:54:45 +03:00
|
|
|
|
2016-10-14 12:00:55 +03:00
|
|
|
/* connect to peer */
|
|
|
|
do {
|
|
|
|
rc = 0;
|
|
|
|
if (connect(sock, (const struct sockaddr *)svm, sizeof(*svm)) < 0) {
|
|
|
|
rc = -errno;
|
|
|
|
}
|
|
|
|
} while (rc == -EINTR);
|
|
|
|
|
2017-06-16 11:54:45 +03:00
|
|
|
if (rc < 0) {
|
2020-09-18 12:31:45 +03:00
|
|
|
error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
|
|
|
|
vaddr->cid, vaddr->port);
|
2016-10-14 12:00:55 +03:00
|
|
|
closesocket(sock);
|
|
|
|
return -1;
|
|
|
|
}
|
2017-06-16 11:54:45 +03:00
|
|
|
|
2016-10-14 12:00:55 +03:00
|
|
|
return sock;
|
|
|
|
}
|
|
|
|
|
2017-06-16 11:54:45 +03:00
|
|
|
static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
|
2016-10-14 12:00:55 +03:00
|
|
|
{
|
|
|
|
struct sockaddr_vm svm;
|
|
|
|
|
|
|
|
if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2020-09-18 12:31:45 +03:00
|
|
|
return vsock_connect_addr(vaddr, &svm, errp);
|
2016-10-14 12:00:55 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static int vsock_listen_saddr(VsockSocketAddress *vaddr,
|
2019-08-19 15:48:21 +03:00
|
|
|
int num,
|
2016-10-14 12:00:55 +03:00
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
struct sockaddr_vm svm;
|
|
|
|
int slisten;
|
|
|
|
|
|
|
|
if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
slisten = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
|
|
|
|
if (slisten < 0) {
|
|
|
|
error_setg_errno(errp, errno, "Failed to create socket");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bind(slisten, (const struct sockaddr *)&svm, sizeof(svm)) != 0) {
|
|
|
|
error_setg_errno(errp, errno, "Failed to bind socket");
|
|
|
|
closesocket(slisten);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2019-08-19 15:48:21 +03:00
|
|
|
if (listen(slisten, num) != 0) {
|
2016-10-14 12:00:55 +03:00
|
|
|
error_setg_errno(errp, errno, "Failed to listen on socket");
|
|
|
|
closesocket(slisten);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return slisten;
|
|
|
|
}
|
|
|
|
|
2017-04-26 10:36:36 +03:00
|
|
|
static int vsock_parse(VsockSocketAddress *addr, const char *str,
|
|
|
|
Error **errp)
|
2016-10-14 12:00:55 +03:00
|
|
|
{
|
|
|
|
char cid[33];
|
|
|
|
char port[33];
|
|
|
|
int n;
|
|
|
|
|
|
|
|
if (sscanf(str, "%32[^:]:%32[^,]%n", cid, port, &n) != 2) {
|
|
|
|
error_setg(errp, "error parsing address '%s'", str);
|
2017-04-26 10:36:36 +03:00
|
|
|
return -1;
|
2016-10-14 12:00:55 +03:00
|
|
|
}
|
|
|
|
if (str[n] != '\0') {
|
|
|
|
error_setg(errp, "trailing characters in address '%s'", str);
|
2017-04-26 10:36:36 +03:00
|
|
|
return -1;
|
2016-10-14 12:00:55 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
addr->cid = g_strdup(cid);
|
|
|
|
addr->port = g_strdup(port);
|
2017-04-26 10:36:36 +03:00
|
|
|
return 0;
|
2016-10-14 12:00:55 +03:00
|
|
|
}
|
|
|
|
#else
|
|
|
|
static void vsock_unsupported(Error **errp)
|
|
|
|
{
|
|
|
|
error_setg(errp, "socket family AF_VSOCK unsupported");
|
|
|
|
}
|
|
|
|
|
2017-06-16 11:54:45 +03:00
|
|
|
static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
|
2016-10-14 12:00:55 +03:00
|
|
|
{
|
|
|
|
vsock_unsupported(errp);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int vsock_listen_saddr(VsockSocketAddress *vaddr,
|
2019-08-19 15:48:21 +03:00
|
|
|
int num,
|
2016-10-14 12:00:55 +03:00
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
vsock_unsupported(errp);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2017-04-26 10:36:36 +03:00
|
|
|
static int vsock_parse(VsockSocketAddress *addr, const char *str,
|
|
|
|
Error **errp)
|
2016-10-14 12:00:55 +03:00
|
|
|
{
|
|
|
|
vsock_unsupported(errp);
|
2017-04-26 10:36:36 +03:00
|
|
|
return -1;
|
2016-10-14 12:00:55 +03:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_AF_VSOCK */
|
|
|
|
|
2008-11-11 23:46:40 +03:00
|
|
|
#ifndef _WIN32
|
|
|
|
|
2020-11-02 12:44:22 +03:00
|
|
|
static bool saddr_is_abstract(UnixSocketAddress *saddr)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_LINUX
|
|
|
|
return saddr->abstract;
|
|
|
|
#else
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool saddr_is_tight(UnixSocketAddress *saddr)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_LINUX
|
|
|
|
return !saddr->has_tight || saddr->tight;
|
|
|
|
#else
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2016-01-11 16:17:02 +03:00
|
|
|
static int unix_listen_saddr(UnixSocketAddress *saddr,
|
2019-08-19 15:48:21 +03:00
|
|
|
int num,
|
2016-01-11 16:17:02 +03:00
|
|
|
Error **errp)
|
2008-11-11 23:46:40 +03:00
|
|
|
{
|
2020-11-02 12:44:22 +03:00
|
|
|
bool abstract = saddr_is_abstract(saddr);
|
2008-11-11 23:46:40 +03:00
|
|
|
struct sockaddr_un un;
|
2009-09-10 12:58:38 +04:00
|
|
|
int sock, fd;
|
2017-05-25 18:53:00 +03:00
|
|
|
char *pathbuf = NULL;
|
|
|
|
const char *path;
|
sockets: avoid string truncation warnings when copying UNIX path
In file included from /usr/include/string.h:494,
from include/qemu/osdep.h:101,
from util/qemu-sockets.c:18:
In function ‘strncpy’,
inlined from ‘unix_connect_saddr.isra.0’ at util/qemu-sockets.c:925:5:
/usr/include/bits/string_fortified.h:106:10: warning: ‘__builtin_strncpy’ specified bound 108 equals destination size [-Wstringop-truncation]
106 | return __builtin___strncpy_chk (__dest, __src, __len, __bos (__dest));
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In function ‘strncpy’,
inlined from ‘unix_listen_saddr.isra.0’ at util/qemu-sockets.c:880:5:
/usr/include/bits/string_fortified.h:106:10: warning: ‘__builtin_strncpy’ specified bound 108 equals destination size [-Wstringop-truncation]
106 | return __builtin___strncpy_chk (__dest, __src, __len, __bos (__dest));
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
We are already validating the UNIX socket path length earlier in
the functions. If we save this string length when we first check
it, then we can simply use memcpy instead of strcpy later, avoiding
the gcc truncation warnings.
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Reviewed-by: Stefano Garzarella <sgarzare@redhat.com>
Message-Id: <20190501145052.12579-1-berrange@redhat.com>
Signed-off-by: Laurent Vivier <laurent@vivier.eu>
2019-05-01 17:50:52 +03:00
|
|
|
size_t pathlen;
|
2020-05-16 06:13:25 +03:00
|
|
|
size_t addrlen;
|
2008-11-11 23:46:40 +03:00
|
|
|
|
2009-12-02 14:24:42 +03:00
|
|
|
sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
|
2008-11-11 23:46:40 +03:00
|
|
|
if (sock < 0) {
|
2015-01-26 14:12:24 +03:00
|
|
|
error_setg_errno(errp, errno, "Failed to create Unix socket");
|
2009-05-06 13:57:03 +04:00
|
|
|
return -1;
|
2008-11-11 23:46:40 +03:00
|
|
|
}
|
|
|
|
|
2020-11-02 12:44:22 +03:00
|
|
|
if (saddr->path[0] || abstract) {
|
2017-05-25 18:53:00 +03:00
|
|
|
path = saddr->path;
|
2008-11-11 23:46:40 +03:00
|
|
|
} else {
|
2015-01-26 14:12:24 +03:00
|
|
|
const char *tmpdir = getenv("TMPDIR");
|
|
|
|
tmpdir = tmpdir ? tmpdir : "/tmp";
|
2017-05-25 18:53:00 +03:00
|
|
|
path = pathbuf = g_strdup_printf("%s/qemu-socket-XXXXXX", tmpdir);
|
|
|
|
}
|
2015-01-26 14:12:24 +03:00
|
|
|
|
sockets: avoid string truncation warnings when copying UNIX path
In file included from /usr/include/string.h:494,
from include/qemu/osdep.h:101,
from util/qemu-sockets.c:18:
In function ‘strncpy’,
inlined from ‘unix_connect_saddr.isra.0’ at util/qemu-sockets.c:925:5:
/usr/include/bits/string_fortified.h:106:10: warning: ‘__builtin_strncpy’ specified bound 108 equals destination size [-Wstringop-truncation]
106 | return __builtin___strncpy_chk (__dest, __src, __len, __bos (__dest));
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In function ‘strncpy’,
inlined from ‘unix_listen_saddr.isra.0’ at util/qemu-sockets.c:880:5:
/usr/include/bits/string_fortified.h:106:10: warning: ‘__builtin_strncpy’ specified bound 108 equals destination size [-Wstringop-truncation]
106 | return __builtin___strncpy_chk (__dest, __src, __len, __bos (__dest));
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
We are already validating the UNIX socket path length earlier in
the functions. If we save this string length when we first check
it, then we can simply use memcpy instead of strcpy later, avoiding
the gcc truncation warnings.
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Reviewed-by: Stefano Garzarella <sgarzare@redhat.com>
Message-Id: <20190501145052.12579-1-berrange@redhat.com>
Signed-off-by: Laurent Vivier <laurent@vivier.eu>
2019-05-01 17:50:52 +03:00
|
|
|
pathlen = strlen(path);
|
2020-05-16 06:13:25 +03:00
|
|
|
if (pathlen > sizeof(un.sun_path) ||
|
2020-11-02 12:44:22 +03:00
|
|
|
(abstract && pathlen > (sizeof(un.sun_path) - 1))) {
|
2017-05-25 18:53:00 +03:00
|
|
|
error_setg(errp, "UNIX socket path '%s' is too long", path);
|
|
|
|
error_append_hint(errp, "Path must be less than %zu bytes\n",
|
2020-11-02 12:44:22 +03:00
|
|
|
abstract ? sizeof(un.sun_path) - 1 :
|
2017-05-25 18:53:00 +03:00
|
|
|
sizeof(un.sun_path));
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pathbuf != NULL) {
|
2008-11-11 23:46:40 +03:00
|
|
|
/*
|
|
|
|
* This dummy fd usage silences the mktemp() unsecure warning.
|
|
|
|
* Using mkstemp() doesn't make things more secure here
|
|
|
|
* though. bind() complains about existing files, so we have
|
|
|
|
* to unlink first and thus re-open the race window. The
|
|
|
|
* worst case possible is bind() failing, i.e. a DoS attack.
|
|
|
|
*/
|
2017-05-25 18:53:00 +03:00
|
|
|
fd = mkstemp(pathbuf);
|
2015-01-26 14:12:24 +03:00
|
|
|
if (fd < 0) {
|
|
|
|
error_setg_errno(errp, errno,
|
2017-05-25 18:53:00 +03:00
|
|
|
"Failed to make a temporary socket %s", pathbuf);
|
2015-01-26 14:12:24 +03:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
close(fd);
|
2008-11-11 23:46:40 +03:00
|
|
|
}
|
|
|
|
|
2020-11-02 12:44:22 +03:00
|
|
|
if (!abstract && unlink(path) < 0 && errno != ENOENT) {
|
2015-05-05 18:07:19 +03:00
|
|
|
error_setg_errno(errp, errno,
|
2017-05-25 18:53:00 +03:00
|
|
|
"Failed to unlink socket %s", path);
|
2015-05-05 18:07:19 +03:00
|
|
|
goto err;
|
|
|
|
}
|
2017-05-25 18:53:00 +03:00
|
|
|
|
|
|
|
memset(&un, 0, sizeof(un));
|
|
|
|
un.sun_family = AF_UNIX;
|
2020-05-16 06:13:25 +03:00
|
|
|
addrlen = sizeof(un);
|
2017-05-25 18:53:00 +03:00
|
|
|
|
2020-11-02 12:44:22 +03:00
|
|
|
if (abstract) {
|
2020-05-16 06:13:25 +03:00
|
|
|
un.sun_path[0] = '\0';
|
|
|
|
memcpy(&un.sun_path[1], path, pathlen);
|
2020-11-02 12:44:22 +03:00
|
|
|
if (saddr_is_tight(saddr)) {
|
2020-05-16 06:13:25 +03:00
|
|
|
addrlen = offsetof(struct sockaddr_un, sun_path) + 1 + pathlen;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
memcpy(un.sun_path, path, pathlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bind(sock, (struct sockaddr *) &un, addrlen) < 0) {
|
2017-06-26 13:37:56 +03:00
|
|
|
error_setg_errno(errp, errno, "Failed to bind socket to %s", path);
|
2008-11-11 23:46:40 +03:00
|
|
|
goto err;
|
|
|
|
}
|
2019-08-19 15:48:21 +03:00
|
|
|
if (listen(sock, num) < 0) {
|
2014-09-25 10:49:31 +04:00
|
|
|
error_setg_errno(errp, errno, "Failed to listen on socket");
|
2008-11-11 23:46:40 +03:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2017-12-12 14:12:19 +03:00
|
|
|
g_free(pathbuf);
|
2008-11-11 23:46:40 +03:00
|
|
|
return sock;
|
|
|
|
|
|
|
|
err:
|
2017-05-25 18:53:00 +03:00
|
|
|
g_free(pathbuf);
|
2008-11-11 23:46:40 +03:00
|
|
|
closesocket(sock);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2017-06-16 11:54:45 +03:00
|
|
|
static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
|
2008-11-11 23:46:40 +03:00
|
|
|
{
|
2020-11-02 12:44:22 +03:00
|
|
|
bool abstract = saddr_is_abstract(saddr);
|
2008-11-11 23:46:40 +03:00
|
|
|
struct sockaddr_un un;
|
2012-10-03 15:37:46 +04:00
|
|
|
int sock, rc;
|
sockets: avoid string truncation warnings when copying UNIX path
In file included from /usr/include/string.h:494,
from include/qemu/osdep.h:101,
from util/qemu-sockets.c:18:
In function ‘strncpy’,
inlined from ‘unix_connect_saddr.isra.0’ at util/qemu-sockets.c:925:5:
/usr/include/bits/string_fortified.h:106:10: warning: ‘__builtin_strncpy’ specified bound 108 equals destination size [-Wstringop-truncation]
106 | return __builtin___strncpy_chk (__dest, __src, __len, __bos (__dest));
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In function ‘strncpy’,
inlined from ‘unix_listen_saddr.isra.0’ at util/qemu-sockets.c:880:5:
/usr/include/bits/string_fortified.h:106:10: warning: ‘__builtin_strncpy’ specified bound 108 equals destination size [-Wstringop-truncation]
106 | return __builtin___strncpy_chk (__dest, __src, __len, __bos (__dest));
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
We are already validating the UNIX socket path length earlier in
the functions. If we save this string length when we first check
it, then we can simply use memcpy instead of strcpy later, avoiding
the gcc truncation warnings.
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Reviewed-by: Stefano Garzarella <sgarzare@redhat.com>
Message-Id: <20190501145052.12579-1-berrange@redhat.com>
Signed-off-by: Laurent Vivier <laurent@vivier.eu>
2019-05-01 17:50:52 +03:00
|
|
|
size_t pathlen;
|
2020-05-16 06:13:25 +03:00
|
|
|
size_t addrlen;
|
2008-11-11 23:46:40 +03:00
|
|
|
|
2016-01-11 16:17:03 +03:00
|
|
|
if (saddr->path == NULL) {
|
error: Strip trailing '\n' from error string arguments (again)
Commit 6daf194d and be62a2eb got rid of a bunch, but they keep coming
back. Tracked down with this Coccinelle semantic patch:
@r@
expression err, eno, cls, fmt;
position p;
@@
(
error_report(fmt, ...)@p
|
error_set(err, cls, fmt, ...)@p
|
error_set_errno(err, eno, cls, fmt, ...)@p
|
error_setg(err, fmt, ...)@p
|
error_setg_errno(err, eno, fmt, ...)@p
)
@script:python@
fmt << r.fmt;
p << r.p;
@@
if "\\n" in str(fmt):
print "%s:%s:%s:%s" % (p[0].file, p[0].line, p[0].column, fmt)
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Message-id: 1360354939-10994-4-git-send-email-armbru@redhat.com
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2013-02-09 00:22:16 +04:00
|
|
|
error_setg(errp, "unix connect: no path specified");
|
2009-09-10 12:58:37 +04:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2009-12-02 14:24:42 +03:00
|
|
|
sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
|
2008-11-11 23:46:40 +03:00
|
|
|
if (sock < 0) {
|
2014-09-25 10:49:31 +04:00
|
|
|
error_setg_errno(errp, errno, "Failed to create socket");
|
2009-05-06 13:57:03 +04:00
|
|
|
return -1;
|
2008-11-11 23:46:40 +03:00
|
|
|
}
|
|
|
|
|
sockets: avoid string truncation warnings when copying UNIX path
In file included from /usr/include/string.h:494,
from include/qemu/osdep.h:101,
from util/qemu-sockets.c:18:
In function ‘strncpy’,
inlined from ‘unix_connect_saddr.isra.0’ at util/qemu-sockets.c:925:5:
/usr/include/bits/string_fortified.h:106:10: warning: ‘__builtin_strncpy’ specified bound 108 equals destination size [-Wstringop-truncation]
106 | return __builtin___strncpy_chk (__dest, __src, __len, __bos (__dest));
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In function ‘strncpy’,
inlined from ‘unix_listen_saddr.isra.0’ at util/qemu-sockets.c:880:5:
/usr/include/bits/string_fortified.h:106:10: warning: ‘__builtin_strncpy’ specified bound 108 equals destination size [-Wstringop-truncation]
106 | return __builtin___strncpy_chk (__dest, __src, __len, __bos (__dest));
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
We are already validating the UNIX socket path length earlier in
the functions. If we save this string length when we first check
it, then we can simply use memcpy instead of strcpy later, avoiding
the gcc truncation warnings.
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Reviewed-by: Stefano Garzarella <sgarzare@redhat.com>
Message-Id: <20190501145052.12579-1-berrange@redhat.com>
Signed-off-by: Laurent Vivier <laurent@vivier.eu>
2019-05-01 17:50:52 +03:00
|
|
|
pathlen = strlen(saddr->path);
|
2020-05-16 06:13:25 +03:00
|
|
|
if (pathlen > sizeof(un.sun_path) ||
|
2020-11-02 12:44:22 +03:00
|
|
|
(abstract && pathlen > (sizeof(un.sun_path) - 1))) {
|
2017-05-25 18:53:00 +03:00
|
|
|
error_setg(errp, "UNIX socket path '%s' is too long", saddr->path);
|
|
|
|
error_append_hint(errp, "Path must be less than %zu bytes\n",
|
2020-11-02 12:44:22 +03:00
|
|
|
abstract ? sizeof(un.sun_path) - 1 :
|
2017-05-25 18:53:00 +03:00
|
|
|
sizeof(un.sun_path));
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2008-11-11 23:46:40 +03:00
|
|
|
memset(&un, 0, sizeof(un));
|
|
|
|
un.sun_family = AF_UNIX;
|
2020-05-16 06:13:25 +03:00
|
|
|
addrlen = sizeof(un);
|
2012-10-03 15:37:46 +04:00
|
|
|
|
2020-11-02 12:44:22 +03:00
|
|
|
if (abstract) {
|
2020-05-16 06:13:25 +03:00
|
|
|
un.sun_path[0] = '\0';
|
|
|
|
memcpy(&un.sun_path[1], saddr->path, pathlen);
|
2020-11-02 12:44:22 +03:00
|
|
|
if (saddr_is_tight(saddr)) {
|
2020-05-16 06:13:25 +03:00
|
|
|
addrlen = offsetof(struct sockaddr_un, sun_path) + 1 + pathlen;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
memcpy(un.sun_path, saddr->path, pathlen);
|
|
|
|
}
|
2012-10-03 15:37:46 +04:00
|
|
|
/* connect to peer */
|
|
|
|
do {
|
|
|
|
rc = 0;
|
2020-05-16 06:13:25 +03:00
|
|
|
if (connect(sock, (struct sockaddr *) &un, addrlen) < 0) {
|
2016-03-07 23:36:03 +03:00
|
|
|
rc = -errno;
|
2012-10-03 15:37:46 +04:00
|
|
|
}
|
|
|
|
} while (rc == -EINTR);
|
|
|
|
|
|
|
|
if (rc < 0) {
|
2020-09-18 12:31:45 +03:00
|
|
|
error_setg_errno(errp, -rc, "Failed to connect to '%s'",
|
2017-05-25 18:53:00 +03:00
|
|
|
saddr->path);
|
|
|
|
goto err;
|
2008-11-11 23:46:40 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return sock;
|
2017-05-25 18:53:00 +03:00
|
|
|
|
|
|
|
err:
|
|
|
|
close(sock);
|
|
|
|
return -1;
|
2008-11-11 23:46:40 +03:00
|
|
|
}
|
|
|
|
|
2012-10-18 10:44:00 +04:00
|
|
|
#else
|
|
|
|
|
2016-01-11 16:17:02 +03:00
|
|
|
static int unix_listen_saddr(UnixSocketAddress *saddr,
|
2019-08-19 15:48:21 +03:00
|
|
|
int num,
|
2016-01-11 16:17:02 +03:00
|
|
|
Error **errp)
|
2012-10-18 10:44:00 +04:00
|
|
|
{
|
2012-09-19 15:54:39 +04:00
|
|
|
error_setg(errp, "unix sockets are not available on windows");
|
2012-10-18 10:44:00 +04:00
|
|
|
errno = ENOTSUP;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2017-06-16 11:54:45 +03:00
|
|
|
static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
|
2012-10-18 10:44:00 +04:00
|
|
|
{
|
2012-09-19 15:54:39 +04:00
|
|
|
error_setg(errp, "unix sockets are not available on windows");
|
2012-10-18 10:44:00 +04:00
|
|
|
errno = ENOTSUP;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2009-09-10 12:58:37 +04:00
|
|
|
/* compatibility wrapper */
|
2017-12-12 14:12:19 +03:00
|
|
|
int unix_listen(const char *str, Error **errp)
|
2009-09-10 12:58:38 +04:00
|
|
|
{
|
2016-01-11 16:17:02 +03:00
|
|
|
UnixSocketAddress *saddr;
|
2019-05-03 16:00:33 +03:00
|
|
|
int sock;
|
2009-09-10 12:58:38 +04:00
|
|
|
|
2016-01-11 16:17:02 +03:00
|
|
|
saddr = g_new0(UnixSocketAddress, 1);
|
2019-05-03 16:00:33 +03:00
|
|
|
saddr->path = g_strdup(str);
|
2019-08-19 15:48:21 +03:00
|
|
|
sock = unix_listen_saddr(saddr, 1, errp);
|
2016-01-11 16:17:02 +03:00
|
|
|
qapi_free_UnixSocketAddress(saddr);
|
2009-09-10 12:58:38 +04:00
|
|
|
return sock;
|
|
|
|
}
|
|
|
|
|
2012-10-02 11:35:32 +04:00
|
|
|
int unix_connect(const char *path, Error **errp)
|
2009-09-10 12:58:37 +04:00
|
|
|
{
|
2016-01-11 16:17:03 +03:00
|
|
|
UnixSocketAddress *saddr;
|
2009-09-10 12:58:37 +04:00
|
|
|
int sock;
|
|
|
|
|
2016-01-11 16:17:03 +03:00
|
|
|
saddr = g_new0(UnixSocketAddress, 1);
|
|
|
|
saddr->path = g_strdup(path);
|
2017-06-16 11:54:45 +03:00
|
|
|
sock = unix_connect_saddr(saddr, errp);
|
2016-01-11 16:17:03 +03:00
|
|
|
qapi_free_UnixSocketAddress(saddr);
|
2012-10-03 15:37:46 +04:00
|
|
|
return sock;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
SocketAddress *socket_parse(const char *str, Error **errp)
|
2012-10-23 23:31:53 +04:00
|
|
|
{
|
2017-04-26 10:36:41 +03:00
|
|
|
SocketAddress *addr;
|
2012-10-23 23:31:53 +04:00
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
addr = g_new0(SocketAddress, 1);
|
2012-10-23 23:31:53 +04:00
|
|
|
if (strstart(str, "unix:", NULL)) {
|
|
|
|
if (str[5] == '\0') {
|
error: Strip trailing '\n' from error string arguments (again)
Commit 6daf194d and be62a2eb got rid of a bunch, but they keep coming
back. Tracked down with this Coccinelle semantic patch:
@r@
expression err, eno, cls, fmt;
position p;
@@
(
error_report(fmt, ...)@p
|
error_set(err, cls, fmt, ...)@p
|
error_set_errno(err, eno, cls, fmt, ...)@p
|
error_setg(err, fmt, ...)@p
|
error_setg_errno(err, eno, fmt, ...)@p
)
@script:python@
fmt << r.fmt;
p << r.p;
@@
if "\\n" in str(fmt):
print "%s:%s:%s:%s" % (p[0].file, p[0].line, p[0].column, fmt)
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Message-id: 1360354939-10994-4-git-send-email-armbru@redhat.com
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2013-02-09 00:22:16 +04:00
|
|
|
error_setg(errp, "invalid Unix socket address");
|
2012-10-23 23:31:53 +04:00
|
|
|
goto fail;
|
|
|
|
} else {
|
2017-04-26 10:36:41 +03:00
|
|
|
addr->type = SOCKET_ADDRESS_TYPE_UNIX;
|
|
|
|
addr->u.q_unix.path = g_strdup(str + 5);
|
2012-10-23 23:31:53 +04:00
|
|
|
}
|
|
|
|
} else if (strstart(str, "fd:", NULL)) {
|
|
|
|
if (str[3] == '\0') {
|
error: Strip trailing '\n' from error string arguments (again)
Commit 6daf194d and be62a2eb got rid of a bunch, but they keep coming
back. Tracked down with this Coccinelle semantic patch:
@r@
expression err, eno, cls, fmt;
position p;
@@
(
error_report(fmt, ...)@p
|
error_set(err, cls, fmt, ...)@p
|
error_set_errno(err, eno, cls, fmt, ...)@p
|
error_setg(err, fmt, ...)@p
|
error_setg_errno(err, eno, fmt, ...)@p
)
@script:python@
fmt << r.fmt;
p << r.p;
@@
if "\\n" in str(fmt):
print "%s:%s:%s:%s" % (p[0].file, p[0].line, p[0].column, fmt)
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Message-id: 1360354939-10994-4-git-send-email-armbru@redhat.com
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2013-02-09 00:22:16 +04:00
|
|
|
error_setg(errp, "invalid file descriptor address");
|
2012-10-23 23:31:53 +04:00
|
|
|
goto fail;
|
|
|
|
} else {
|
2017-04-26 10:36:41 +03:00
|
|
|
addr->type = SOCKET_ADDRESS_TYPE_FD;
|
|
|
|
addr->u.fd.str = g_strdup(str + 3);
|
2012-10-23 23:31:53 +04:00
|
|
|
}
|
2016-10-14 12:00:55 +03:00
|
|
|
} else if (strstart(str, "vsock:", NULL)) {
|
2017-04-26 10:36:41 +03:00
|
|
|
addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
|
|
|
|
if (vsock_parse(&addr->u.vsock, str + strlen("vsock:"), errp)) {
|
2016-10-14 12:00:55 +03:00
|
|
|
goto fail;
|
|
|
|
}
|
2012-10-23 23:31:53 +04:00
|
|
|
} else {
|
2017-04-26 10:36:41 +03:00
|
|
|
addr->type = SOCKET_ADDRESS_TYPE_INET;
|
|
|
|
if (inet_parse(&addr->u.inet, str, errp)) {
|
2012-10-23 23:31:53 +04:00
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return addr;
|
|
|
|
|
|
|
|
fail:
|
2017-04-26 10:36:41 +03:00
|
|
|
qapi_free_SocketAddress(addr);
|
2012-10-23 23:31:53 +04:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2021-03-10 20:30:04 +03:00
|
|
|
static int socket_get_fd(const char *fdstr, Error **errp)
|
2017-12-22 14:08:49 +03:00
|
|
|
{
|
2020-10-05 18:58:44 +03:00
|
|
|
Monitor *cur_mon = monitor_cur();
|
2017-12-22 14:04:30 +03:00
|
|
|
int fd;
|
|
|
|
if (cur_mon) {
|
|
|
|
fd = monitor_get_fd(cur_mon, fdstr, errp);
|
|
|
|
if (fd < 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (qemu_strtoi(fdstr, NULL, 10, &fd) < 0) {
|
|
|
|
error_setg_errno(errp, errno,
|
|
|
|
"Unable to parse FD number %s",
|
|
|
|
fdstr);
|
|
|
|
return -1;
|
|
|
|
}
|
2017-12-22 14:08:49 +03:00
|
|
|
}
|
|
|
|
if (!fd_is_socket(fd)) {
|
|
|
|
error_setg(errp, "File descriptor '%s' is not a socket", fdstr);
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
2021-06-10 13:07:35 +03:00
|
|
|
int socket_address_parse_named_fd(SocketAddress *addr, Error **errp)
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
if (addr->type != SOCKET_ADDRESS_TYPE_FD) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
fd = socket_get_fd(addr->u.fd.str, errp);
|
|
|
|
if (fd < 0) {
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
|
|
|
g_free(addr->u.fd.str);
|
|
|
|
addr->u.fd.str = g_strdup_printf("%d", fd);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-06-16 11:54:45 +03:00
|
|
|
int socket_connect(SocketAddress *addr, Error **errp)
|
2012-10-23 23:31:53 +04:00
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
|
2015-10-27 01:34:55 +03:00
|
|
|
switch (addr->type) {
|
2017-04-26 10:36:41 +03:00
|
|
|
case SOCKET_ADDRESS_TYPE_INET:
|
2017-06-16 11:54:45 +03:00
|
|
|
fd = inet_connect_saddr(&addr->u.inet, errp);
|
2012-10-23 23:31:53 +04:00
|
|
|
break;
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
case SOCKET_ADDRESS_TYPE_UNIX:
|
2017-06-16 11:54:45 +03:00
|
|
|
fd = unix_connect_saddr(&addr->u.q_unix, errp);
|
2012-10-23 23:31:53 +04:00
|
|
|
break;
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
case SOCKET_ADDRESS_TYPE_FD:
|
2021-03-10 20:30:04 +03:00
|
|
|
fd = socket_get_fd(addr->u.fd.str, errp);
|
2012-10-23 23:31:53 +04:00
|
|
|
break;
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
case SOCKET_ADDRESS_TYPE_VSOCK:
|
2017-06-16 11:54:45 +03:00
|
|
|
fd = vsock_connect_saddr(&addr->u.vsock, errp);
|
2016-10-14 12:00:55 +03:00
|
|
|
break;
|
|
|
|
|
2012-10-23 23:31:53 +04:00
|
|
|
default:
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
2019-08-19 15:48:21 +03:00
|
|
|
int socket_listen(SocketAddress *addr, int num, Error **errp)
|
2012-10-23 23:31:53 +04:00
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
|
2019-08-19 15:48:21 +03:00
|
|
|
trace_socket_listen(num);
|
2015-10-27 01:34:55 +03:00
|
|
|
switch (addr->type) {
|
2017-04-26 10:36:41 +03:00
|
|
|
case SOCKET_ADDRESS_TYPE_INET:
|
2019-08-19 15:48:21 +03:00
|
|
|
fd = inet_listen_saddr(&addr->u.inet, 0, num, errp);
|
2012-10-23 23:31:53 +04:00
|
|
|
break;
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
case SOCKET_ADDRESS_TYPE_UNIX:
|
2019-08-19 15:48:21 +03:00
|
|
|
fd = unix_listen_saddr(&addr->u.q_unix, num, errp);
|
2012-10-23 23:31:53 +04:00
|
|
|
break;
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
case SOCKET_ADDRESS_TYPE_FD:
|
2021-03-10 20:30:04 +03:00
|
|
|
fd = socket_get_fd(addr->u.fd.str, errp);
|
|
|
|
if (fd < 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the socket is not yet in the listen state, then transition it to
|
|
|
|
* the listen state now.
|
|
|
|
*
|
|
|
|
* If it's already listening then this updates the backlog value as
|
|
|
|
* requested.
|
|
|
|
*
|
|
|
|
* If this socket cannot listen because it's already in another state
|
|
|
|
* (e.g. unbound or connected) then we'll catch the error here.
|
|
|
|
*/
|
|
|
|
if (listen(fd, num) != 0) {
|
|
|
|
error_setg_errno(errp, errno, "Failed to listen on fd socket");
|
|
|
|
closesocket(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
2012-10-23 23:31:53 +04:00
|
|
|
break;
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
case SOCKET_ADDRESS_TYPE_VSOCK:
|
2019-08-19 15:48:21 +03:00
|
|
|
fd = vsock_listen_saddr(&addr->u.vsock, num, errp);
|
2016-10-14 12:00:55 +03:00
|
|
|
break;
|
|
|
|
|
2012-10-23 23:31:53 +04:00
|
|
|
default:
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
2016-06-16 22:28:52 +03:00
|
|
|
void socket_listen_cleanup(int fd, Error **errp)
|
|
|
|
{
|
2017-04-26 10:36:41 +03:00
|
|
|
SocketAddress *addr;
|
2016-06-16 22:28:52 +03:00
|
|
|
|
|
|
|
addr = socket_local_address(fd, errp);
|
2017-10-27 10:51:59 +03:00
|
|
|
if (!addr) {
|
|
|
|
return;
|
|
|
|
}
|
2016-06-16 22:28:52 +03:00
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
if (addr->type == SOCKET_ADDRESS_TYPE_UNIX
|
|
|
|
&& addr->u.q_unix.path) {
|
|
|
|
if (unlink(addr->u.q_unix.path) < 0 && errno != ENOENT) {
|
2016-06-16 22:28:52 +03:00
|
|
|
error_setg_errno(errp, errno,
|
|
|
|
"Failed to unlink socket %s",
|
2017-04-26 10:36:41 +03:00
|
|
|
addr->u.q_unix.path);
|
2016-06-16 22:28:52 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
qapi_free_SocketAddress(addr);
|
2016-06-16 22:28:52 +03:00
|
|
|
}
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp)
|
2013-02-27 17:10:47 +04:00
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
|
2017-03-30 20:43:09 +03:00
|
|
|
/*
|
2017-04-26 10:36:41 +03:00
|
|
|
* TODO SOCKET_ADDRESS_TYPE_FD when fd is AF_INET or AF_INET6
|
2017-03-30 20:43:09 +03:00
|
|
|
* (although other address families can do SOCK_DGRAM, too)
|
|
|
|
*/
|
2015-10-27 01:34:55 +03:00
|
|
|
switch (remote->type) {
|
2017-04-26 10:36:41 +03:00
|
|
|
case SOCKET_ADDRESS_TYPE_INET:
|
|
|
|
fd = inet_dgram_saddr(&remote->u.inet,
|
|
|
|
local ? &local->u.inet : NULL, errp);
|
2013-02-27 17:10:47 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
error_setg(errp, "socket type unsupported for datagram");
|
2013-06-24 10:39:56 +04:00
|
|
|
fd = -1;
|
2013-02-27 17:10:47 +04:00
|
|
|
}
|
|
|
|
return fd;
|
|
|
|
}
|
2015-05-01 19:36:20 +03:00
|
|
|
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
static SocketAddress *
|
2015-05-01 19:36:20 +03:00
|
|
|
socket_sockaddr_to_address_inet(struct sockaddr_storage *sa,
|
|
|
|
socklen_t salen,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
char host[NI_MAXHOST];
|
|
|
|
char serv[NI_MAXSERV];
|
2017-04-26 10:36:41 +03:00
|
|
|
SocketAddress *addr;
|
2016-03-03 19:16:48 +03:00
|
|
|
InetSocketAddress *inet;
|
2015-05-01 19:36:20 +03:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = getnameinfo((struct sockaddr *)sa, salen,
|
|
|
|
host, sizeof(host),
|
|
|
|
serv, sizeof(serv),
|
|
|
|
NI_NUMERICHOST | NI_NUMERICSERV);
|
|
|
|
if (ret != 0) {
|
|
|
|
error_setg(errp, "Cannot format numeric socket address: %s",
|
|
|
|
gai_strerror(ret));
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
addr = g_new0(SocketAddress, 1);
|
|
|
|
addr->type = SOCKET_ADDRESS_TYPE_INET;
|
|
|
|
inet = &addr->u.inet;
|
2016-03-03 19:16:48 +03:00
|
|
|
inet->host = g_strdup(host);
|
|
|
|
inet->port = g_strdup(serv);
|
2015-05-01 19:36:20 +03:00
|
|
|
if (sa->ss_family == AF_INET) {
|
2016-03-03 19:16:48 +03:00
|
|
|
inet->has_ipv4 = inet->ipv4 = true;
|
2015-05-01 19:36:20 +03:00
|
|
|
} else {
|
2016-03-03 19:16:48 +03:00
|
|
|
inet->has_ipv6 = inet->ipv6 = true;
|
2015-05-01 19:36:20 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
return addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#ifndef WIN32
|
2017-04-26 10:36:41 +03:00
|
|
|
static SocketAddress *
|
2015-05-01 19:36:20 +03:00
|
|
|
socket_sockaddr_to_address_unix(struct sockaddr_storage *sa,
|
|
|
|
socklen_t salen,
|
|
|
|
Error **errp)
|
|
|
|
{
|
2017-04-26 10:36:41 +03:00
|
|
|
SocketAddress *addr;
|
2015-05-01 19:36:20 +03:00
|
|
|
struct sockaddr_un *su = (struct sockaddr_un *)sa;
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
addr = g_new0(SocketAddress, 1);
|
|
|
|
addr->type = SOCKET_ADDRESS_TYPE_UNIX;
|
2021-09-01 16:16:24 +03:00
|
|
|
salen -= offsetof(struct sockaddr_un, sun_path);
|
2020-11-02 12:44:19 +03:00
|
|
|
#ifdef CONFIG_LINUX
|
2021-09-01 16:16:24 +03:00
|
|
|
if (salen > 0 && !su->sun_path[0]) {
|
2020-11-02 12:44:19 +03:00
|
|
|
/* Linux abstract socket */
|
2021-09-01 16:16:24 +03:00
|
|
|
addr->u.q_unix.path = g_strndup(su->sun_path + 1, salen - 1);
|
2020-11-02 12:44:19 +03:00
|
|
|
addr->u.q_unix.has_abstract = true;
|
|
|
|
addr->u.q_unix.abstract = true;
|
|
|
|
addr->u.q_unix.has_tight = true;
|
2021-09-01 16:16:24 +03:00
|
|
|
addr->u.q_unix.tight = salen < sizeof(su->sun_path);
|
2020-11-02 12:44:19 +03:00
|
|
|
return addr;
|
2015-05-01 19:36:20 +03:00
|
|
|
}
|
2020-11-02 12:44:19 +03:00
|
|
|
#endif
|
2015-05-01 19:36:20 +03:00
|
|
|
|
2021-09-01 16:16:24 +03:00
|
|
|
addr->u.q_unix.path = g_strndup(su->sun_path, salen);
|
2015-05-01 19:36:20 +03:00
|
|
|
return addr;
|
|
|
|
}
|
|
|
|
#endif /* WIN32 */
|
|
|
|
|
2016-10-14 12:00:55 +03:00
|
|
|
#ifdef CONFIG_AF_VSOCK
|
2017-04-26 10:36:41 +03:00
|
|
|
static SocketAddress *
|
2016-10-14 12:00:55 +03:00
|
|
|
socket_sockaddr_to_address_vsock(struct sockaddr_storage *sa,
|
|
|
|
socklen_t salen,
|
|
|
|
Error **errp)
|
|
|
|
{
|
2017-04-26 10:36:41 +03:00
|
|
|
SocketAddress *addr;
|
2016-10-14 12:00:55 +03:00
|
|
|
VsockSocketAddress *vaddr;
|
|
|
|
struct sockaddr_vm *svm = (struct sockaddr_vm *)sa;
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
addr = g_new0(SocketAddress, 1);
|
|
|
|
addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
|
|
|
|
vaddr = &addr->u.vsock;
|
2016-10-14 12:00:55 +03:00
|
|
|
vaddr->cid = g_strdup_printf("%u", svm->svm_cid);
|
|
|
|
vaddr->port = g_strdup_printf("%u", svm->svm_port);
|
|
|
|
|
|
|
|
return addr;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_AF_VSOCK */
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
SocketAddress *
|
2015-05-01 19:36:20 +03:00
|
|
|
socket_sockaddr_to_address(struct sockaddr_storage *sa,
|
|
|
|
socklen_t salen,
|
|
|
|
Error **errp)
|
|
|
|
{
|
|
|
|
switch (sa->ss_family) {
|
|
|
|
case AF_INET:
|
|
|
|
case AF_INET6:
|
|
|
|
return socket_sockaddr_to_address_inet(sa, salen, errp);
|
|
|
|
|
|
|
|
#ifndef WIN32
|
|
|
|
case AF_UNIX:
|
|
|
|
return socket_sockaddr_to_address_unix(sa, salen, errp);
|
|
|
|
#endif /* WIN32 */
|
|
|
|
|
2016-10-14 12:00:55 +03:00
|
|
|
#ifdef CONFIG_AF_VSOCK
|
|
|
|
case AF_VSOCK:
|
|
|
|
return socket_sockaddr_to_address_vsock(sa, salen, errp);
|
|
|
|
#endif
|
|
|
|
|
2015-05-01 19:36:20 +03:00
|
|
|
default:
|
|
|
|
error_setg(errp, "socket family %d unsupported",
|
|
|
|
sa->ss_family);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
SocketAddress *socket_local_address(int fd, Error **errp)
|
2015-05-01 19:36:20 +03:00
|
|
|
{
|
|
|
|
struct sockaddr_storage ss;
|
|
|
|
socklen_t sslen = sizeof(ss);
|
|
|
|
|
|
|
|
if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) {
|
2016-03-07 23:36:03 +03:00
|
|
|
error_setg_errno(errp, errno, "%s",
|
2015-05-01 19:36:20 +03:00
|
|
|
"Unable to query local socket address");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return socket_sockaddr_to_address(&ss, sslen, errp);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
SocketAddress *socket_remote_address(int fd, Error **errp)
|
2015-05-01 19:36:20 +03:00
|
|
|
{
|
|
|
|
struct sockaddr_storage ss;
|
|
|
|
socklen_t sslen = sizeof(ss);
|
|
|
|
|
|
|
|
if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) {
|
2016-03-07 23:36:03 +03:00
|
|
|
error_setg_errno(errp, errno, "%s",
|
2015-05-01 19:36:20 +03:00
|
|
|
"Unable to query remote socket address");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return socket_sockaddr_to_address(&ss, sslen, errp);
|
|
|
|
}
|
2015-08-14 20:18:41 +03:00
|
|
|
|
2017-03-30 20:43:15 +03:00
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
SocketAddress *socket_address_flatten(SocketAddressLegacy *addr_legacy)
|
|
|
|
{
|
2017-05-15 19:39:04 +03:00
|
|
|
SocketAddress *addr;
|
2017-04-26 10:36:41 +03:00
|
|
|
|
|
|
|
if (!addr_legacy) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2017-05-15 19:39:04 +03:00
|
|
|
addr = g_new(SocketAddress, 1);
|
|
|
|
|
2017-04-26 10:36:41 +03:00
|
|
|
switch (addr_legacy->type) {
|
2021-09-17 17:31:19 +03:00
|
|
|
case SOCKET_ADDRESS_TYPE_INET:
|
2017-04-26 10:36:41 +03:00
|
|
|
addr->type = SOCKET_ADDRESS_TYPE_INET;
|
|
|
|
QAPI_CLONE_MEMBERS(InetSocketAddress, &addr->u.inet,
|
|
|
|
addr_legacy->u.inet.data);
|
|
|
|
break;
|
2021-09-17 17:31:19 +03:00
|
|
|
case SOCKET_ADDRESS_TYPE_UNIX:
|
2017-04-26 10:36:41 +03:00
|
|
|
addr->type = SOCKET_ADDRESS_TYPE_UNIX;
|
|
|
|
QAPI_CLONE_MEMBERS(UnixSocketAddress, &addr->u.q_unix,
|
|
|
|
addr_legacy->u.q_unix.data);
|
|
|
|
break;
|
2021-09-17 17:31:19 +03:00
|
|
|
case SOCKET_ADDRESS_TYPE_VSOCK:
|
2017-04-26 10:36:41 +03:00
|
|
|
addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
|
|
|
|
QAPI_CLONE_MEMBERS(VsockSocketAddress, &addr->u.vsock,
|
|
|
|
addr_legacy->u.vsock.data);
|
|
|
|
break;
|
2021-09-17 17:31:19 +03:00
|
|
|
case SOCKET_ADDRESS_TYPE_FD:
|
2017-04-26 10:36:41 +03:00
|
|
|
addr->type = SOCKET_ADDRESS_TYPE_FD;
|
|
|
|
QAPI_CLONE_MEMBERS(String, &addr->u.fd, addr_legacy->u.fd.data);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
return addr;
|
|
|
|
}
|