| /* |
| * inet and unix socket functions for qemu |
| * |
| * (c) 2008 Gerd Hoffmann <kraxel@redhat.com> |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License as published by |
| * the Free Software Foundation; under version 2 of the License. |
| * |
| * This program is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| * GNU General Public License for more details. |
| */ |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <ctype.h> |
| #include <errno.h> |
| #include <unistd.h> |
| |
| #include "qemu_socket.h" |
| #include "qemu-common.h" /* for qemu_isdigit */ |
| |
| #ifndef AI_ADDRCONFIG |
| # define AI_ADDRCONFIG 0 |
| #endif |
| |
| static int sockets_debug = 0; |
| static const int on=1, off=0; |
| |
| static const char *sock_address_strfamily(SockAddress *s) |
| { |
| switch (sock_address_get_family(s)) { |
| case SOCKET_IN6: return "ipv6"; |
| case SOCKET_INET: return "ipv4"; |
| case SOCKET_UNIX: return "unix"; |
| default: return "????"; |
| } |
| } |
| |
| int inet_listen(const char *str, char *ostr, int olen, |
| SocketType socktype, int port_offset) |
| { |
| SockAddress** list; |
| SockAddress* e; |
| unsigned flags = SOCKET_LIST_PASSIVE; |
| char addr[64]; |
| char port[33]; |
| char uaddr[256+1]; |
| const char *opts, *h; |
| int slisten,pos,to,try_next,nn; |
| |
| /* parse address */ |
| if (str[0] == ':') { |
| /* no host given */ |
| addr[0] = '\0'; |
| if (1 != sscanf(str,":%32[^,]%n",port,&pos)) { |
| fprintf(stderr, "%s: portonly parse error (%s)\n", |
| __FUNCTION__, str); |
| return -1; |
| } |
| } else if (str[0] == '[') { |
| /* IPv6 addr */ |
| if (2 != sscanf(str,"[%64[^]]]:%32[^,]%n",addr,port,&pos)) { |
| fprintf(stderr, "%s: ipv6 parse error (%s)\n", |
| __FUNCTION__, str); |
| return -1; |
| } |
| flags |= SOCKET_LIST_FORCE_IN6; |
| } else if (qemu_isdigit(str[0])) { |
| /* IPv4 addr */ |
| if (2 != sscanf(str,"%64[0-9.]:%32[^,]%n",addr,port,&pos)) { |
| fprintf(stderr, "%s: ipv4 parse error (%s)\n", |
| __FUNCTION__, str); |
| return -1; |
| } |
| flags |= SOCKET_LIST_FORCE_INET; |
| } else { |
| /* hostname */ |
| if (2 != sscanf(str,"%64[^:]:%32[^,]%n",addr,port,&pos)) { |
| fprintf(stderr, "%s: hostname parse error (%s)\n", |
| __FUNCTION__, str); |
| return -1; |
| } |
| } |
| |
| /* parse options */ |
| opts = str + pos; |
| h = strstr(opts, ",to="); |
| to = h ? atoi(h+4) : 0; |
| if (strstr(opts, ",ipv4")) { |
| flags &= ~SOCKET_LIST_FORCE_IN6; |
| flags |= SOCKET_LIST_FORCE_INET; |
| } |
| if (strstr(opts, ",ipv6")) { |
| flags &= SOCKET_LIST_FORCE_INET; |
| flags |= SOCKET_LIST_FORCE_IN6; |
| } |
| |
| /* lookup */ |
| if (port_offset) |
| snprintf(port, sizeof(port), "%d", atoi(port) + port_offset); |
| |
| list = sock_address_list_create( strlen(addr) ? addr : NULL, |
| port, |
| flags ); |
| if (list == NULL) { |
| fprintf(stderr,"%s: getaddrinfo(%s,%s): %s\n", __FUNCTION__, |
| addr, port, errno_str); |
| return -1; |
| } |
| |
| /* create socket + bind */ |
| for (nn = 0; list[nn] != NULL; nn++) { |
| SocketFamily family; |
| |
| e = list[nn]; |
| family = sock_address_get_family(e); |
| slisten = socket_create(family, socktype); |
| if (slisten < 0) { |
| fprintf(stderr,"%s: socket(%s): %s\n", __FUNCTION__, |
| sock_address_strfamily(e), errno_str); |
| continue; |
| } |
| |
| socket_set_xreuseaddr(slisten); |
| #ifdef IPV6_V6ONLY |
| /* listen on both ipv4 and ipv6 */ |
| if (family == PF_INET6) { |
| socket_set_ipv6only(slisten); |
| } |
| #endif |
| |
| for (;;) { |
| if (socket_bind(slisten, e) == 0) { |
| if (sockets_debug) |
| fprintf(stderr,"%s: bind(%s,%s,%d): OK\n", __FUNCTION__, |
| sock_address_strfamily(e), uaddr, sock_address_get_port(e)); |
| goto listen; |
| } |
| socket_close(slisten); |
| try_next = to && (sock_address_get_port(e) <= to + port_offset); |
| if (!try_next || sockets_debug) |
| fprintf(stderr,"%s: bind(%s,%s,%d): %s\n", __FUNCTION__, |
| sock_address_strfamily(e), uaddr, sock_address_get_port(e), |
| strerror(errno)); |
| if (try_next) { |
| sock_address_set_port(e, sock_address_get_port(e) + 1); |
| continue; |
| } |
| break; |
| } |
| } |
| sock_address_list_free(list); |
| fprintf(stderr, "%s: FAILED\n", __FUNCTION__); |
| return -1; |
| |
| listen: |
| if (socket_listen(slisten,1) != 0) { |
| perror("listen"); |
| socket_close(slisten); |
| return -1; |
| } |
| if (ostr) { |
| if (flags & SOCKET_LIST_FORCE_IN6) { |
| snprintf(ostr, olen, "[%s]:%d%s", uaddr, |
| sock_address_get_port(e) - port_offset, opts); |
| } else { |
| snprintf(ostr, olen, "%s:%d%s", uaddr, |
| sock_address_get_port(e) - port_offset, opts); |
| } |
| } |
| sock_address_list_free(list); |
| return slisten; |
| } |
| |
| int inet_connect(const char *str, SocketType socktype) |
| { |
| SockAddress** list; |
| SockAddress* e; |
| unsigned flags = 0; |
| char addr[64]; |
| char port[33]; |
| int sock, nn; |
| |
| /* parse address */ |
| if (str[0] == '[') { |
| /* IPv6 addr */ |
| if (2 != sscanf(str,"[%64[^]]]:%32[^,]",addr,port)) { |
| fprintf(stderr, "%s: ipv6 parse error (%s)\n", |
| __FUNCTION__, str); |
| return -1; |
| } |
| flags |= SOCKET_LIST_FORCE_IN6; |
| } else if (qemu_isdigit(str[0])) { |
| /* IPv4 addr */ |
| if (2 != sscanf(str,"%64[0-9.]:%32[^,]",addr,port)) { |
| fprintf(stderr, "%s: ipv4 parse error (%s)\n", |
| __FUNCTION__, str); |
| return -1; |
| } |
| flags |= SOCKET_LIST_FORCE_INET; |
| } else { |
| /* hostname */ |
| if (2 != sscanf(str,"%64[^:]:%32[^,]",addr,port)) { |
| fprintf(stderr, "%s: hostname parse error (%s)\n", |
| __FUNCTION__, str); |
| return -1; |
| } |
| } |
| |
| /* parse options */ |
| if (strstr(str, ",ipv4")) { |
| flags &= SOCKET_LIST_FORCE_IN6; |
| flags |= SOCKET_LIST_FORCE_INET; |
| } |
| if (strstr(str, ",ipv6")) { |
| flags &= SOCKET_LIST_FORCE_INET; |
| flags |= SOCKET_LIST_FORCE_IN6; |
| } |
| |
| /* lookup */ |
| list = sock_address_list_create(addr, port, flags); |
| if (list == NULL) { |
| fprintf(stderr,"getaddrinfo(%s,%s): %s\n", |
| addr, port, errno_str); |
| return -1; |
| } |
| |
| for (nn = 0; list[nn] != NULL; nn++) { |
| e = list[nn]; |
| sock = socket_create(sock_address_get_family(e), socktype); |
| if (sock < 0) { |
| fprintf(stderr,"%s: socket(%s): %s\n", __FUNCTION__, |
| sock_address_strfamily(e), errno_str); |
| continue; |
| } |
| socket_set_xreuseaddr(sock); |
| |
| /* connect to peer */ |
| if (socket_connect(sock,e) < 0) { |
| if (sockets_debug) |
| fprintf(stderr, "%s: connect(%s,%s,%s,%s): %s\n", __FUNCTION__, |
| sock_address_strfamily(e), |
| sock_address_to_string(e), addr, port, strerror(errno)); |
| socket_close(sock); |
| continue; |
| } |
| if (sockets_debug) |
| fprintf(stderr, "%s: connect(%s,%s,%s,%s): OK\n", __FUNCTION__, |
| sock_address_strfamily(e), |
| sock_address_to_string(e), addr, port); |
| |
| goto EXIT; |
| } |
| sock = -1; |
| EXIT: |
| sock_address_list_free(list); |
| return sock; |
| } |
| |
| #ifndef _WIN32 |
| |
| int unix_listen(const char *str, char *ostr, int olen) |
| { |
| SockAddress un; |
| char unpath[PATH_MAX]; |
| char *path, *upath, *opts; |
| int sock, fd, len; |
| |
| opts = strchr(str, ','); |
| if (opts) { |
| len = opts - str; |
| path = qemu_malloc(len+1); |
| snprintf(path, len+1, "%.*s", len, str); |
| } else |
| path = qemu_strdup(str); |
| |
| if (path || strlen(path) > 0) { |
| upath = path; |
| } else { |
| char *tmpdir = getenv("TMPDIR"); |
| snprintf(unpath, sizeof(unpath), "%s/qemu-socket-XXXXXX", |
| tmpdir ? tmpdir : "/tmp"); |
| /* |
| * This dummy fd usage silences the mktemp() unsecure warning. |
| * Using mkstemp() doesn't make things more secure here |
| * though. bind() complains about existing files, so we have |
| * to unlink first and thus re-open the race window. The |
| * worst case possible is bind() failing, i.e. a DoS attack. |
| */ |
| fd = mkstemp(unpath); close(fd); |
| upath = unpath; |
| } |
| snprintf(ostr, olen, "%s%s", path, opts ? opts : ""); |
| |
| sock = socket_unix_server(upath, SOCKET_STREAM); |
| sock_address_done(&un); |
| |
| if (sock < 0) { |
| fprintf(stderr, "bind(unix:%s): %s\n", upath, errno_str); |
| goto err; |
| } |
| |
| if (sockets_debug) |
| fprintf(stderr, "bind(unix:%s): OK\n", upath); |
| |
| qemu_free(path); |
| return sock; |
| |
| err: |
| qemu_free(path); |
| socket_close(sock); |
| return -1; |
| } |
| |
| int unix_connect(const char *path) |
| { |
| SockAddress un; |
| int ret, sock; |
| |
| sock = socket_create_unix(SOCKET_STREAM); |
| if (sock < 0) { |
| perror("socket(unix)"); |
| return -1; |
| } |
| |
| sock_address_init_unix(&un, path); |
| ret = socket_connect(sock, &un); |
| sock_address_done(&un); |
| if (ret < 0) { |
| fprintf(stderr, "connect(unix:%s): %s\n", path, errno_str); |
| return -1; |
| } |
| |
| |
| if (sockets_debug) |
| fprintf(stderr, "connect(unix:%s): OK\n", path); |
| return sock; |
| } |
| |
| #else |
| |
| int unix_listen(const char *path, char *ostr, int olen) |
| { |
| fprintf(stderr, "unix sockets are not available on windows\n"); |
| return -1; |
| } |
| |
| int unix_connect(const char *path) |
| { |
| fprintf(stderr, "unix sockets are not available on windows\n"); |
| return -1; |
| } |
| |
| #endif |