]> git.proxmox.com Git - qemu.git/blame - qemu-sockets.c
target-sh4: fix 64-bit fmov to/from memory
[qemu.git] / qemu-sockets.c
CommitLineData
305b0eb2
AL
1/*
2 * inet and unix socket functions for qemu
3 *
4 * (c) 2008 Gerd Hoffmann <kraxel@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 of the License.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
14 */
d247d25f
AL
15#include <stdio.h>
16#include <stdlib.h>
17#include <string.h>
18#include <ctype.h>
19#include <errno.h>
20#include <unistd.h>
21
22#include "qemu_socket.h"
23
24#ifndef AI_ADDRCONFIG
25# define AI_ADDRCONFIG 0
26#endif
27
28static int sockets_debug = 0;
29static const int on=1, off=0;
30
31static int inet_getport(struct addrinfo *e)
32{
33 struct sockaddr_in *i4;
34 struct sockaddr_in6 *i6;
35
36 switch (e->ai_family) {
37 case PF_INET6:
38 i6 = (void*)e->ai_addr;
39 return ntohs(i6->sin6_port);
40 case PF_INET:
41 i4 = (void*)e->ai_addr;
42 return ntohs(i4->sin_port);
43 default:
44 return 0;
45 }
46}
47
48static void inet_setport(struct addrinfo *e, int port)
49{
50 struct sockaddr_in *i4;
51 struct sockaddr_in6 *i6;
52
53 switch (e->ai_family) {
54 case PF_INET6:
55 i6 = (void*)e->ai_addr;
56 i6->sin6_port = htons(port);
57 break;
58 case PF_INET:
59 i4 = (void*)e->ai_addr;
60 i4->sin_port = htons(port);
61 break;
62 }
63}
64
65static const char *inet_strfamily(int family)
66{
67 switch (family) {
68 case PF_INET6: return "ipv6";
69 case PF_INET: return "ipv4";
70 case PF_UNIX: return "unix";
71 }
72 return "????";
73}
74
75static void inet_print_addrinfo(const char *tag, struct addrinfo *res)
76{
77 struct addrinfo *e;
78 char uaddr[INET6_ADDRSTRLEN+1];
79 char uport[33];
80
81 for (e = res; e != NULL; e = e->ai_next) {
82 getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
83 uaddr,INET6_ADDRSTRLEN,uport,32,
84 NI_NUMERICHOST | NI_NUMERICSERV);
85 fprintf(stderr,"%s: getaddrinfo: family %s, host %s, port %s\n",
86 tag, inet_strfamily(e->ai_family), uaddr, uport);
87 }
88}
89
90int inet_listen(const char *str, char *ostr, int olen,
91 int socktype, int port_offset)
92{
93 struct addrinfo ai,*res,*e;
94 char addr[64];
95 char port[33];
96 char uaddr[INET6_ADDRSTRLEN+1];
97 char uport[33];
98 const char *opts, *h;
99 int slisten,rc,pos,to,try_next;
100
101 memset(&ai,0, sizeof(ai));
102 ai.ai_flags = AI_PASSIVE | AI_ADDRCONFIG;
103 ai.ai_family = PF_UNSPEC;
104 ai.ai_socktype = socktype;
105
106 /* parse address */
107 if (str[0] == ':') {
108 /* no host given */
109 strcpy(addr,"");
110 if (1 != sscanf(str,":%32[^,]%n",port,&pos)) {
111 fprintf(stderr, "%s: portonly parse error (%s)\n",
112 __FUNCTION__, str);
113 return -1;
114 }
115 } else if (str[0] == '[') {
116 /* IPv6 addr */
117 if (2 != sscanf(str,"[%64[^]]]:%32[^,]%n",addr,port,&pos)) {
118 fprintf(stderr, "%s: ipv6 parse error (%s)\n",
119 __FUNCTION__, str);
120 return -1;
121 }
122 ai.ai_family = PF_INET6;
123 } else if (isdigit(str[0])) {
124 /* IPv4 addr */
125 if (2 != sscanf(str,"%64[0-9.]:%32[^,]%n",addr,port,&pos)) {
126 fprintf(stderr, "%s: ipv4 parse error (%s)\n",
127 __FUNCTION__, str);
128 return -1;
129 }
130 ai.ai_family = PF_INET;
131 } else {
132 /* hostname */
133 if (2 != sscanf(str,"%64[^:]:%32[^,]%n",addr,port,&pos)) {
134 fprintf(stderr, "%s: hostname parse error (%s)\n",
135 __FUNCTION__, str);
136 return -1;
137 }
138 }
139
140 /* parse options */
141 opts = str + pos;
142 h = strstr(opts, ",to=");
143 to = h ? atoi(h+4) : 0;
144 if (strstr(opts, ",ipv4"))
145 ai.ai_family = PF_INET;
146 if (strstr(opts, ",ipv6"))
147 ai.ai_family = PF_INET6;
148
149 /* lookup */
150 if (port_offset)
151 snprintf(port, sizeof(port), "%d", atoi(port) + port_offset);
152 rc = getaddrinfo(strlen(addr) ? addr : NULL, port, &ai, &res);
153 if (rc != 0) {
154 fprintf(stderr,"%s: getaddrinfo(%s,%s): %s\n", __FUNCTION__,
155 addr, port, gai_strerror(rc));
156 return -1;
157 }
158 if (sockets_debug)
159 inet_print_addrinfo(__FUNCTION__, res);
160
161 /* create socket + bind */
162 for (e = res; e != NULL; e = e->ai_next) {
163 getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
164 uaddr,INET6_ADDRSTRLEN,uport,32,
165 NI_NUMERICHOST | NI_NUMERICSERV);
166 slisten = socket(e->ai_family, e->ai_socktype, e->ai_protocol);
167 if (slisten < 0) {
168 fprintf(stderr,"%s: socket(%s): %s\n", __FUNCTION__,
169 inet_strfamily(e->ai_family), strerror(errno));
170 continue;
171 }
172
173 setsockopt(slisten,SOL_SOCKET,SO_REUSEADDR,(void*)&on,sizeof(on));
174#ifdef IPV6_V6ONLY
175 if (e->ai_family == PF_INET6) {
176 /* listen on both ipv4 and ipv6 */
177 setsockopt(slisten,IPPROTO_IPV6,IPV6_V6ONLY,(void*)&off,sizeof(off));
178 }
179#endif
180
181 for (;;) {
182 if (bind(slisten, e->ai_addr, e->ai_addrlen) == 0) {
183 if (sockets_debug)
184 fprintf(stderr,"%s: bind(%s,%s,%d): OK\n", __FUNCTION__,
185 inet_strfamily(e->ai_family), uaddr, inet_getport(e));
186 goto listen;
187 }
188 try_next = to && (inet_getport(e) <= to + port_offset);
189 if (!try_next || sockets_debug)
190 fprintf(stderr,"%s: bind(%s,%s,%d): %s\n", __FUNCTION__,
191 inet_strfamily(e->ai_family), uaddr, inet_getport(e),
192 strerror(errno));
193 if (try_next) {
194 inet_setport(e, inet_getport(e) + 1);
195 continue;
196 }
197 break;
198 }
199 closesocket(slisten);
200 }
201 fprintf(stderr, "%s: FAILED\n", __FUNCTION__);
202 freeaddrinfo(res);
203 return -1;
204
205listen:
206 if (listen(slisten,1) != 0) {
207 perror("listen");
208 closesocket(slisten);
209 return -1;
210 }
211 if (ostr) {
212 if (e->ai_family == PF_INET6) {
213 snprintf(ostr, olen, "[%s]:%d%s", uaddr,
214 inet_getport(e) - port_offset, opts);
215 } else {
216 snprintf(ostr, olen, "%s:%d%s", uaddr,
217 inet_getport(e) - port_offset, opts);
218 }
219 }
220 freeaddrinfo(res);
221 return slisten;
222}
223
224int inet_connect(const char *str, int socktype)
225{
226 struct addrinfo ai,*res,*e;
227 char addr[64];
228 char port[33];
229 char uaddr[INET6_ADDRSTRLEN+1];
230 char uport[33];
231 int sock,rc;
232
233 memset(&ai,0, sizeof(ai));
234 ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
235 ai.ai_family = PF_UNSPEC;
236 ai.ai_socktype = socktype;
237
238 /* parse address */
239 if (str[0] == '[') {
240 /* IPv6 addr */
241 if (2 != sscanf(str,"[%64[^]]]:%32[^,]",addr,port)) {
242 fprintf(stderr, "%s: ipv6 parse error (%s)\n",
243 __FUNCTION__, str);
244 return -1;
245 }
246 ai.ai_family = PF_INET6;
247 } else if (isdigit(str[0])) {
248 /* IPv4 addr */
249 if (2 != sscanf(str,"%64[0-9.]:%32[^,]",addr,port)) {
250 fprintf(stderr, "%s: ipv4 parse error (%s)\n",
251 __FUNCTION__, str);
252 return -1;
253 }
254 ai.ai_family = PF_INET;
255 } else {
256 /* hostname */
257 if (2 != sscanf(str,"%64[^:]:%32[^,]",addr,port)) {
258 fprintf(stderr, "%s: hostname parse error (%s)\n",
259 __FUNCTION__, str);
260 return -1;
261 }
262 }
263
264 /* parse options */
265 if (strstr(str, ",ipv4"))
266 ai.ai_family = PF_INET;
267 if (strstr(str, ",ipv6"))
268 ai.ai_family = PF_INET6;
269
270 /* lookup */
271 if (0 != (rc = getaddrinfo(addr, port, &ai, &res))) {
272 fprintf(stderr,"getaddrinfo(%s,%s): %s\n", gai_strerror(rc),
273 addr, port);
274 return -1;
275 }
276 if (sockets_debug)
277 inet_print_addrinfo(__FUNCTION__, res);
278
279 for (e = res; e != NULL; e = e->ai_next) {
280 if (getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
281 uaddr,INET6_ADDRSTRLEN,uport,32,
282 NI_NUMERICHOST | NI_NUMERICSERV) != 0) {
283 fprintf(stderr,"%s: getnameinfo: oops\n", __FUNCTION__);
284 continue;
285 }
286 sock = socket(e->ai_family, e->ai_socktype, e->ai_protocol);
287 if (sock < 0) {
288 fprintf(stderr,"%s: socket(%s): %s\n", __FUNCTION__,
289 inet_strfamily(e->ai_family), strerror(errno));
290 continue;
291 }
292 setsockopt(sock,SOL_SOCKET,SO_REUSEADDR,(void*)&on,sizeof(on));
293
294 /* connect to peer */
295 if (connect(sock,e->ai_addr,e->ai_addrlen) < 0) {
296 if (sockets_debug || NULL == e->ai_next)
297 fprintf(stderr, "%s: connect(%s,%s,%s,%s): %s\n", __FUNCTION__,
298 inet_strfamily(e->ai_family),
299 e->ai_canonname, uaddr, uport, strerror(errno));
300 closesocket(sock);
301 continue;
302 }
303 if (sockets_debug)
304 fprintf(stderr, "%s: connect(%s,%s,%s,%s): OK\n", __FUNCTION__,
305 inet_strfamily(e->ai_family),
306 e->ai_canonname, uaddr, uport);
307 freeaddrinfo(res);
308 return sock;
309 }
310 freeaddrinfo(res);
311 return -1;
312}
313
314#ifndef _WIN32
315
316int unix_listen(const char *str, char *ostr, int olen)
317{
318 struct sockaddr_un un;
319 char *path, *opts;
320 int sock, fd, len;
321
322 sock = socket(PF_UNIX, SOCK_STREAM, 0);
323 if (sock < 0) {
324 perror("socket(unix)");
325 return -1;
326 }
327
328 opts = strchr(str, ',');
329 if (opts) {
330 len = opts - str;
331 path = malloc(len+1);
332 snprintf(path, len+1, "%.*s", len, str);
333 } else
334 path = strdup(str);
335
336 memset(&un, 0, sizeof(un));
337 un.sun_family = AF_UNIX;
338 if (path && strlen(path)) {
339 snprintf(un.sun_path, sizeof(un.sun_path), "%s", path);
340 } else {
341 char *tmpdir = getenv("TMPDIR");
342 snprintf(un.sun_path, sizeof(un.sun_path), "%s/qemu-socket-XXXXXX",
343 tmpdir ? tmpdir : "/tmp");
344 /*
345 * This dummy fd usage silences the mktemp() unsecure warning.
346 * Using mkstemp() doesn't make things more secure here
347 * though. bind() complains about existing files, so we have
348 * to unlink first and thus re-open the race window. The
349 * worst case possible is bind() failing, i.e. a DoS attack.
350 */
351 fd = mkstemp(un.sun_path); close(fd);
352 }
353 snprintf(ostr, olen, "%s%s", un.sun_path, opts ? opts : "");
354
355 unlink(un.sun_path);
356 if (bind(sock, (struct sockaddr*) &un, sizeof(un)) < 0) {
357 fprintf(stderr, "bind(unix:%s): %s\n", un.sun_path, strerror(errno));
358 goto err;
359 }
360 if (listen(sock, 1) < 0) {
361 fprintf(stderr, "listen(unix:%s): %s\n", un.sun_path, strerror(errno));
362 goto err;
363 }
364
365 if (sockets_debug)
366 fprintf(stderr, "bind(unix:%s): OK\n", un.sun_path);
367 free(path);
368 return sock;
369
370err:
371 free(path);
372 closesocket(sock);
373 return -1;
374}
375
376int unix_connect(const char *path)
377{
378 struct sockaddr_un un;
379 int sock;
380
381 sock = socket(PF_UNIX, SOCK_STREAM, 0);
382 if (sock < 0) {
383 perror("socket(unix)");
384 return -1;
385 }
386
387 memset(&un, 0, sizeof(un));
388 un.sun_family = AF_UNIX;
389 snprintf(un.sun_path, sizeof(un.sun_path), "%s", path);
390 if (connect(sock, (struct sockaddr*) &un, sizeof(un)) < 0) {
391 fprintf(stderr, "connect(unix:%s): %s\n", path, strerror(errno));
392 return -1;
393 }
394
395 if (sockets_debug)
396 fprintf(stderr, "connect(unix:%s): OK\n", path);
397 return sock;
398}
399
400#else
401
402int unix_listen(const char *path, char *ostr, int olen)
403{
404 fprintf(stderr, "unix sockets are not available on windows\n");
405 return -1;
406}
407
408int unix_connect(const char *path)
409{
410 fprintf(stderr, "unix sockets are not available on windows\n");
411 return -1;
412}
413
414#endif