blob: c22f3522c013e0afaa6cbc7d16f4c4b097c6b018 [file] [log] [blame]
/*
* inet and unix socket functions for qemu
*
* (c) 2008 Gerd Hoffmann <kraxel@redhat.com>
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; under version 2 of the License.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <ctype.h>
#include <errno.h>
#include <unistd.h>
#include "qemu_socket.h"
#include "qemu-common.h" /* for qemu_isdigit */
#ifndef AI_ADDRCONFIG
# define AI_ADDRCONFIG 0
#endif
static int sockets_debug = 0;
static const int on=1, off=0;
static const char *sock_address_strfamily(SockAddress *s)
{
switch (sock_address_get_family(s)) {
case SOCKET_IN6: return "ipv6";
case SOCKET_INET: return "ipv4";
case SOCKET_UNIX: return "unix";
default: return "????";
}
}
int inet_listen(const char *str, char *ostr, int olen,
SocketType socktype, int port_offset)
{
SockAddress** list;
SockAddress* e;
unsigned flags = SOCKET_LIST_PASSIVE;
char addr[64];
char port[33];
char uaddr[256+1];
const char *opts, *h;
int slisten,pos,to,try_next,nn;
/* parse address */
if (str[0] == ':') {
/* no host given */
addr[0] = '\0';
if (1 != sscanf(str,":%32[^,]%n",port,&pos)) {
fprintf(stderr, "%s: portonly parse error (%s)\n",
__FUNCTION__, str);
return -1;
}
} else if (str[0] == '[') {
/* IPv6 addr */
if (2 != sscanf(str,"[%64[^]]]:%32[^,]%n",addr,port,&pos)) {
fprintf(stderr, "%s: ipv6 parse error (%s)\n",
__FUNCTION__, str);
return -1;
}
flags |= SOCKET_LIST_FORCE_IN6;
} else if (qemu_isdigit(str[0])) {
/* IPv4 addr */
if (2 != sscanf(str,"%64[0-9.]:%32[^,]%n",addr,port,&pos)) {
fprintf(stderr, "%s: ipv4 parse error (%s)\n",
__FUNCTION__, str);
return -1;
}
flags |= SOCKET_LIST_FORCE_INET;
} else {
/* hostname */
if (2 != sscanf(str,"%64[^:]:%32[^,]%n",addr,port,&pos)) {
fprintf(stderr, "%s: hostname parse error (%s)\n",
__FUNCTION__, str);
return -1;
}
}
/* parse options */
opts = str + pos;
h = strstr(opts, ",to=");
to = h ? atoi(h+4) : 0;
if (strstr(opts, ",ipv4")) {
flags &= ~SOCKET_LIST_FORCE_IN6;
flags |= SOCKET_LIST_FORCE_INET;
}
if (strstr(opts, ",ipv6")) {
flags &= SOCKET_LIST_FORCE_INET;
flags |= SOCKET_LIST_FORCE_IN6;
}
/* lookup */
if (port_offset)
snprintf(port, sizeof(port), "%d", atoi(port) + port_offset);
list = sock_address_list_create( strlen(addr) ? addr : NULL,
port,
flags );
if (list == NULL) {
fprintf(stderr,"%s: getaddrinfo(%s,%s): %s\n", __FUNCTION__,
addr, port, errno_str);
return -1;
}
/* create socket + bind */
for (nn = 0; list[nn] != NULL; nn++) {
SocketFamily family;
e = list[nn];
family = sock_address_get_family(e);
slisten = socket_create(family, socktype);
if (slisten < 0) {
fprintf(stderr,"%s: socket(%s): %s\n", __FUNCTION__,
sock_address_strfamily(e), errno_str);
continue;
}
socket_set_xreuseaddr(slisten);
#ifdef IPV6_V6ONLY
/* listen on both ipv4 and ipv6 */
if (family == PF_INET6) {
socket_set_ipv6only(slisten);
}
#endif
for (;;) {
if (socket_bind(slisten, e) == 0) {
if (sockets_debug)
fprintf(stderr,"%s: bind(%s,%s,%d): OK\n", __FUNCTION__,
sock_address_strfamily(e), uaddr, sock_address_get_port(e));
goto listen;
}
socket_close(slisten);
try_next = to && (sock_address_get_port(e) <= to + port_offset);
if (!try_next || sockets_debug)
fprintf(stderr,"%s: bind(%s,%s,%d): %s\n", __FUNCTION__,
sock_address_strfamily(e), uaddr, sock_address_get_port(e),
strerror(errno));
if (try_next) {
sock_address_set_port(e, sock_address_get_port(e) + 1);
continue;
}
break;
}
}
sock_address_list_free(list);
fprintf(stderr, "%s: FAILED\n", __FUNCTION__);
return -1;
listen:
if (socket_listen(slisten,1) != 0) {
perror("listen");
socket_close(slisten);
return -1;
}
if (ostr) {
if (flags & SOCKET_LIST_FORCE_IN6) {
snprintf(ostr, olen, "[%s]:%d%s", uaddr,
sock_address_get_port(e) - port_offset, opts);
} else {
snprintf(ostr, olen, "%s:%d%s", uaddr,
sock_address_get_port(e) - port_offset, opts);
}
}
sock_address_list_free(list);
return slisten;
}
int inet_connect(const char *str, SocketType socktype)
{
SockAddress** list;
SockAddress* e;
unsigned flags = 0;
char addr[64];
char port[33];
int sock, nn;
/* parse address */
if (str[0] == '[') {
/* IPv6 addr */
if (2 != sscanf(str,"[%64[^]]]:%32[^,]",addr,port)) {
fprintf(stderr, "%s: ipv6 parse error (%s)\n",
__FUNCTION__, str);
return -1;
}
flags |= SOCKET_LIST_FORCE_IN6;
} else if (qemu_isdigit(str[0])) {
/* IPv4 addr */
if (2 != sscanf(str,"%64[0-9.]:%32[^,]",addr,port)) {
fprintf(stderr, "%s: ipv4 parse error (%s)\n",
__FUNCTION__, str);
return -1;
}
flags |= SOCKET_LIST_FORCE_INET;
} else {
/* hostname */
if (2 != sscanf(str,"%64[^:]:%32[^,]",addr,port)) {
fprintf(stderr, "%s: hostname parse error (%s)\n",
__FUNCTION__, str);
return -1;
}
}
/* parse options */
if (strstr(str, ",ipv4")) {
flags &= SOCKET_LIST_FORCE_IN6;
flags |= SOCKET_LIST_FORCE_INET;
}
if (strstr(str, ",ipv6")) {
flags &= SOCKET_LIST_FORCE_INET;
flags |= SOCKET_LIST_FORCE_IN6;
}
/* lookup */
list = sock_address_list_create(addr, port, flags);
if (list == NULL) {
fprintf(stderr,"getaddrinfo(%s,%s): %s\n",
addr, port, errno_str);
return -1;
}
for (nn = 0; list[nn] != NULL; nn++) {
e = list[nn];
sock = socket_create(sock_address_get_family(e), socktype);
if (sock < 0) {
fprintf(stderr,"%s: socket(%s): %s\n", __FUNCTION__,
sock_address_strfamily(e), errno_str);
continue;
}
socket_set_xreuseaddr(sock);
/* connect to peer */
if (socket_connect(sock,e) < 0) {
if (sockets_debug)
fprintf(stderr, "%s: connect(%s,%s,%s,%s): %s\n", __FUNCTION__,
sock_address_strfamily(e),
sock_address_to_string(e), addr, port, strerror(errno));
socket_close(sock);
continue;
}
if (sockets_debug)
fprintf(stderr, "%s: connect(%s,%s,%s,%s): OK\n", __FUNCTION__,
sock_address_strfamily(e),
sock_address_to_string(e), addr, port);
goto EXIT;
}
sock = -1;
EXIT:
sock_address_list_free(list);
return sock;
}
#ifndef _WIN32
int unix_listen(const char *str, char *ostr, int olen)
{
SockAddress un;
char unpath[PATH_MAX];
char *path, *upath, *opts;
int sock, fd, len;
opts = strchr(str, ',');
if (opts) {
len = opts - str;
path = qemu_malloc(len+1);
snprintf(path, len+1, "%.*s", len, str);
} else
path = qemu_strdup(str);
if (path || strlen(path) > 0) {
upath = path;
} else {
char *tmpdir = getenv("TMPDIR");
snprintf(unpath, sizeof(unpath), "%s/qemu-socket-XXXXXX",
tmpdir ? tmpdir : "/tmp");
/*
* This dummy fd usage silences the mktemp() unsecure warning.
* Using mkstemp() doesn't make things more secure here
* though. bind() complains about existing files, so we have
* to unlink first and thus re-open the race window. The
* worst case possible is bind() failing, i.e. a DoS attack.
*/
fd = mkstemp(unpath); close(fd);
upath = unpath;
}
snprintf(ostr, olen, "%s%s", path, opts ? opts : "");
sock = socket_unix_server(upath, SOCKET_STREAM);
sock_address_done(&un);
if (sock < 0) {
fprintf(stderr, "bind(unix:%s): %s\n", upath, errno_str);
goto err;
}
if (sockets_debug)
fprintf(stderr, "bind(unix:%s): OK\n", upath);
qemu_free(path);
return sock;
err:
qemu_free(path);
socket_close(sock);
return -1;
}
int unix_connect(const char *path)
{
SockAddress un;
int ret, sock;
sock = socket_create_unix(SOCKET_STREAM);
if (sock < 0) {
perror("socket(unix)");
return -1;
}
sock_address_init_unix(&un, path);
ret = socket_connect(sock, &un);
sock_address_done(&un);
if (ret < 0) {
fprintf(stderr, "connect(unix:%s): %s\n", path, errno_str);
return -1;
}
if (sockets_debug)
fprintf(stderr, "connect(unix:%s): OK\n", path);
return sock;
}
#else
int unix_listen(const char *path, char *ostr, int olen)
{
fprintf(stderr, "unix sockets are not available on windows\n");
return -1;
}
int unix_connect(const char *path)
{
fprintf(stderr, "unix sockets are not available on windows\n");
return -1;
}
#endif