]> git.proxmox.com Git - mirror_qemu.git/blame - ui/vnc.c
migration/postcopy: simplify calculation of run_start and fixup_start_addr
[mirror_qemu.git] / ui / vnc.c
CommitLineData
7d510b8c
FB
1/*
2 * QEMU VNC display driver
5fafdf24 3 *
7d510b8c
FB
4 * Copyright (C) 2006 Anthony Liguori <anthony@codemonkey.ws>
5 * Copyright (C) 2006 Fabrice Bellard
19a490bf 6 * Copyright (C) 2009 Red Hat, Inc
5fafdf24 7 *
7d510b8c
FB
8 * Permission is hereby granted, free of charge, to any person obtaining a copy
9 * of this software and associated documentation files (the "Software"), to deal
10 * in the Software without restriction, including without limitation the rights
11 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
12 * copies of the Software, and to permit persons to whom the Software is
13 * furnished to do so, subject to the following conditions:
14 *
15 * The above copyright notice and this permission notice shall be included in
16 * all copies or substantial portions of the Software.
17 *
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
21 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
22 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
23 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
24 * THE SOFTWARE.
25 */
26
e16f4c87 27#include "qemu/osdep.h"
19a490bf 28#include "vnc.h"
bd023f95 29#include "vnc-jobs.h"
40066175 30#include "trace.h"
9c17d615 31#include "sysemu/sysemu.h"
d49b6836 32#include "qemu/error-report.h"
0b8fa32f 33#include "qemu/module.h"
922a01a0 34#include "qemu/option.h"
1de7afc9
PB
35#include "qemu/sockets.h"
36#include "qemu/timer.h"
b76806d4 37#include "authz/list.h"
4db14629 38#include "qemu/config-file.h"
5d75648b
MA
39#include "qapi/qapi-emit-events.h"
40#include "qapi/qapi-events-ui.h"
e688df6b 41#include "qapi/error.h"
9af23989 42#include "qapi/qapi-commands-ui.h"
8d447d10 43#include "ui/input.h"
8e9b0d24 44#include "crypto/hash.h"
3e305e4a
DB
45#include "crypto/tlscredsanon.h"
46#include "crypto/tlscredsx509.h"
f7b2502c 47#include "crypto/random.h"
3e305e4a 48#include "qom/object_interfaces.h"
f348b6d1 49#include "qemu/cutils.h"
57a6d6d5 50#include "io/dns-resolver.h"
24236869 51
0f7b2864 52#define VNC_REFRESH_INTERVAL_BASE GUI_REFRESH_INTERVAL_DEFAULT
2430ffe4 53#define VNC_REFRESH_INTERVAL_INC 50
0f7b2864 54#define VNC_REFRESH_INTERVAL_MAX GUI_REFRESH_INTERVAL_IDLE
999342a0
CC
55static const struct timeval VNC_REFRESH_STATS = { 0, 500000 };
56static const struct timeval VNC_REFRESH_LOSSY = { 2, 0 };
24236869
FB
57
58#include "vnc_keysym.h"
800567a6 59#include "crypto/cipher.h"
70848515 60
d616ccc5
GH
61static QTAILQ_HEAD(, VncDisplay) vnc_displays =
62 QTAILQ_HEAD_INITIALIZER(vnc_displays);
a9ce8590 63
d467b679 64static int vnc_cursor_define(VncState *vs);
e2b72cb6 65static void vnc_update_throttle_offset(VncState *vs);
d467b679 66
8cf36489
GH
67static void vnc_set_share_mode(VncState *vs, VncShareMode mode)
68{
69#ifdef _VNC_DEBUG
70 static const char *mn[] = {
71 [0] = "undefined",
72 [VNC_SHARE_MODE_CONNECTING] = "connecting",
73 [VNC_SHARE_MODE_SHARED] = "shared",
74 [VNC_SHARE_MODE_EXCLUSIVE] = "exclusive",
75 [VNC_SHARE_MODE_DISCONNECTED] = "disconnected",
76 };
04d2529d
DB
77 fprintf(stderr, "%s/%p: %s -> %s\n", __func__,
78 vs->ioc, mn[vs->share_mode], mn[mode]);
8cf36489
GH
79#endif
80
e5f34cdd
GH
81 switch (vs->share_mode) {
82 case VNC_SHARE_MODE_CONNECTING:
83 vs->vd->num_connecting--;
84 break;
85 case VNC_SHARE_MODE_SHARED:
86 vs->vd->num_shared--;
87 break;
88 case VNC_SHARE_MODE_EXCLUSIVE:
8cf36489 89 vs->vd->num_exclusive--;
e5f34cdd
GH
90 break;
91 default:
92 break;
8cf36489 93 }
e5f34cdd 94
8cf36489 95 vs->share_mode = mode;
e5f34cdd
GH
96
97 switch (vs->share_mode) {
98 case VNC_SHARE_MODE_CONNECTING:
99 vs->vd->num_connecting++;
100 break;
101 case VNC_SHARE_MODE_SHARED:
102 vs->vd->num_shared++;
103 break;
104 case VNC_SHARE_MODE_EXCLUSIVE:
8cf36489 105 vs->vd->num_exclusive++;
e5f34cdd
GH
106 break;
107 default:
108 break;
8cf36489
GH
109 }
110}
111
1ff7df1a 112
bd269ebc 113static void vnc_init_basic_info(SocketAddress *addr,
98481bfc
EB
114 VncBasicInfo *info,
115 Error **errp)
d96fd29c 116{
04d2529d 117 switch (addr->type) {
bd269ebc
MA
118 case SOCKET_ADDRESS_TYPE_INET:
119 info->host = g_strdup(addr->u.inet.host);
120 info->service = g_strdup(addr->u.inet.port);
121 if (addr->u.inet.ipv6) {
04d2529d
DB
122 info->family = NETWORK_ADDRESS_FAMILY_IPV6;
123 } else {
124 info->family = NETWORK_ADDRESS_FAMILY_IPV4;
125 }
126 break;
d96fd29c 127
bd269ebc 128 case SOCKET_ADDRESS_TYPE_UNIX:
04d2529d 129 info->host = g_strdup("");
bd269ebc 130 info->service = g_strdup(addr->u.q_unix.path);
04d2529d
DB
131 info->family = NETWORK_ADDRESS_FAMILY_UNIX;
132 break;
133
bd269ebc
MA
134 case SOCKET_ADDRESS_TYPE_VSOCK:
135 case SOCKET_ADDRESS_TYPE_FD:
a6c76285 136 error_setg(errp, "Unsupported socket address type %s",
977c736f 137 SocketAddressType_str(addr->type));
04d2529d 138 break;
a6c76285
MA
139 default:
140 abort();
d96fd29c
LC
141 }
142
04d2529d 143 return;
d96fd29c
LC
144}
145
04d2529d
DB
146static void vnc_init_basic_info_from_server_addr(QIOChannelSocket *ioc,
147 VncBasicInfo *info,
98481bfc 148 Error **errp)
d96fd29c 149{
bd269ebc 150 SocketAddress *addr = NULL;
d96fd29c 151
624cdd46
DB
152 if (!ioc) {
153 error_setg(errp, "No listener socket available");
154 return;
155 }
156
04d2529d
DB
157 addr = qio_channel_socket_get_local_address(ioc, errp);
158 if (!addr) {
98481bfc 159 return;
d96fd29c
LC
160 }
161
04d2529d 162 vnc_init_basic_info(addr, info, errp);
bd269ebc 163 qapi_free_SocketAddress(addr);
d96fd29c
LC
164}
165
04d2529d
DB
166static void vnc_init_basic_info_from_remote_addr(QIOChannelSocket *ioc,
167 VncBasicInfo *info,
98481bfc 168 Error **errp)
d96fd29c 169{
bd269ebc 170 SocketAddress *addr = NULL;
d96fd29c 171
04d2529d
DB
172 addr = qio_channel_socket_get_remote_address(ioc, errp);
173 if (!addr) {
98481bfc 174 return;
d96fd29c
LC
175 }
176
04d2529d 177 vnc_init_basic_info(addr, info, errp);
bd269ebc 178 qapi_free_SocketAddress(addr);
d96fd29c
LC
179}
180
1ff7df1a
AL
181static const char *vnc_auth_name(VncDisplay *vd) {
182 switch (vd->auth) {
183 case VNC_AUTH_INVALID:
184 return "invalid";
185 case VNC_AUTH_NONE:
186 return "none";
187 case VNC_AUTH_VNC:
188 return "vnc";
189 case VNC_AUTH_RA2:
190 return "ra2";
191 case VNC_AUTH_RA2NE:
192 return "ra2ne";
193 case VNC_AUTH_TIGHT:
194 return "tight";
195 case VNC_AUTH_ULTRA:
196 return "ultra";
197 case VNC_AUTH_TLS:
198 return "tls";
199 case VNC_AUTH_VENCRYPT:
1ff7df1a
AL
200 switch (vd->subauth) {
201 case VNC_AUTH_VENCRYPT_PLAIN:
202 return "vencrypt+plain";
203 case VNC_AUTH_VENCRYPT_TLSNONE:
204 return "vencrypt+tls+none";
205 case VNC_AUTH_VENCRYPT_TLSVNC:
206 return "vencrypt+tls+vnc";
207 case VNC_AUTH_VENCRYPT_TLSPLAIN:
208 return "vencrypt+tls+plain";
209 case VNC_AUTH_VENCRYPT_X509NONE:
210 return "vencrypt+x509+none";
211 case VNC_AUTH_VENCRYPT_X509VNC:
212 return "vencrypt+x509+vnc";
213 case VNC_AUTH_VENCRYPT_X509PLAIN:
214 return "vencrypt+x509+plain";
28a76be8
AL
215 case VNC_AUTH_VENCRYPT_TLSSASL:
216 return "vencrypt+tls+sasl";
217 case VNC_AUTH_VENCRYPT_X509SASL:
218 return "vencrypt+x509+sasl";
1ff7df1a
AL
219 default:
220 return "vencrypt";
221 }
2f9606b3 222 case VNC_AUTH_SASL:
28a76be8 223 return "sasl";
1ff7df1a
AL
224 }
225 return "unknown";
226}
227
d616ccc5 228static VncServerInfo *vnc_server_info_get(VncDisplay *vd)
a7789382 229{
fb6ba0d5 230 VncServerInfo *info;
98481bfc 231 Error *err = NULL;
a7789382 232
13e1d0e7 233 if (!vd->listener || !vd->listener->nsioc) {
4ee74fa7
DB
234 return NULL;
235 }
236
3e7f136d 237 info = g_malloc0(sizeof(*info));
13e1d0e7 238 vnc_init_basic_info_from_server_addr(vd->listener->sioc[0],
ddf21908 239 qapi_VncServerInfo_base(info), &err);
fb6ba0d5 240 info->has_auth = true;
d616ccc5 241 info->auth = g_strdup(vnc_auth_name(vd));
98481bfc
EB
242 if (err) {
243 qapi_free_VncServerInfo(info);
244 info = NULL;
245 error_free(err);
246 }
fb6ba0d5 247 return info;
a7789382
LC
248}
249
4a80dba3 250static void vnc_client_cache_auth(VncState *client)
1ff7df1a 251{
4a80dba3
LC
252 if (!client->info) {
253 return;
d96fd29c 254 }
1263b7d6 255
3e305e4a
DB
256 if (client->tls) {
257 client->info->x509_dname =
258 qcrypto_tls_session_get_peer_name(client->tls);
259 client->info->has_x509_dname =
260 client->info->x509_dname != NULL;
d96fd29c 261 }
1263b7d6
AL
262#ifdef CONFIG_VNC_SASL
263 if (client->sasl.conn &&
d96fd29c 264 client->sasl.username) {
fb6ba0d5
WX
265 client->info->has_sasl_username = true;
266 client->info->sasl_username = g_strdup(client->sasl.username);
d96fd29c 267 }
1263b7d6 268#endif
4a80dba3 269}
d96fd29c 270
4a80dba3
LC
271static void vnc_client_cache_addr(VncState *client)
272{
98481bfc
EB
273 Error *err = NULL;
274
275 client->info = g_malloc0(sizeof(*client->info));
04d2529d 276 vnc_init_basic_info_from_remote_addr(client->sioc,
ddf21908 277 qapi_VncClientInfo_base(client->info),
98481bfc
EB
278 &err);
279 if (err) {
280 qapi_free_VncClientInfo(client->info);
281 client->info = NULL;
282 error_free(err);
4a80dba3 283 }
1ff7df1a
AL
284}
285
fb6ba0d5 286static void vnc_qmp_event(VncState *vs, QAPIEvent event)
586153d9 287{
fb6ba0d5 288 VncServerInfo *si;
586153d9
LC
289
290 if (!vs->info) {
291 return;
292 }
293
d616ccc5 294 si = vnc_server_info_get(vs->vd);
fb6ba0d5 295 if (!si) {
586153d9
LC
296 return;
297 }
298
fb6ba0d5
WX
299 switch (event) {
300 case QAPI_EVENT_VNC_CONNECTED:
3ab72385 301 qapi_event_send_vnc_connected(si, qapi_VncClientInfo_base(vs->info));
fb6ba0d5
WX
302 break;
303 case QAPI_EVENT_VNC_INITIALIZED:
3ab72385 304 qapi_event_send_vnc_initialized(si, vs->info);
fb6ba0d5
WX
305 break;
306 case QAPI_EVENT_VNC_DISCONNECTED:
3ab72385 307 qapi_event_send_vnc_disconnected(si, vs->info);
fb6ba0d5
WX
308 break;
309 default:
310 break;
311 }
586153d9 312
fb6ba0d5 313 qapi_free_VncServerInfo(si);
586153d9
LC
314}
315
2b54aa87 316static VncClientInfo *qmp_query_vnc_client(const VncState *client)
a9ce8590 317{
2b54aa87 318 VncClientInfo *info;
04d2529d 319 Error *err = NULL;
2b54aa87 320
04d2529d 321 info = g_malloc0(sizeof(*info));
2b54aa87 322
04d2529d
DB
323 vnc_init_basic_info_from_remote_addr(client->sioc,
324 qapi_VncClientInfo_base(info),
325 &err);
326 if (err) {
327 error_free(err);
328 qapi_free_VncClientInfo(info);
2b54aa87
LC
329 return NULL;
330 }
d96fd29c 331
ddf21908 332 info->websocket = client->websocket;
d96fd29c 333
3e305e4a
DB
334 if (client->tls) {
335 info->x509_dname = qcrypto_tls_session_get_peer_name(client->tls);
336 info->has_x509_dname = info->x509_dname != NULL;
2b54aa87 337 }
d96fd29c 338#ifdef CONFIG_VNC_SASL
2b54aa87
LC
339 if (client->sasl.conn && client->sasl.username) {
340 info->has_sasl_username = true;
341 info->sasl_username = g_strdup(client->sasl.username);
d96fd29c 342 }
2b54aa87 343#endif
1ff7df1a 344
2b54aa87 345 return info;
d96fd29c 346}
1ff7df1a 347
d616ccc5
GH
348static VncDisplay *vnc_display_find(const char *id)
349{
350 VncDisplay *vd;
351
352 if (id == NULL) {
353 return QTAILQ_FIRST(&vnc_displays);
354 }
355 QTAILQ_FOREACH(vd, &vnc_displays, next) {
356 if (strcmp(id, vd->id) == 0) {
357 return vd;
358 }
359 }
360 return NULL;
361}
362
2d29a436
GH
363static VncClientInfoList *qmp_query_client_list(VncDisplay *vd)
364{
365 VncClientInfoList *cinfo, *prev = NULL;
366 VncState *client;
367
368 QTAILQ_FOREACH(client, &vd->clients, next) {
369 cinfo = g_new0(VncClientInfoList, 1);
370 cinfo->value = qmp_query_vnc_client(client);
371 cinfo->next = prev;
372 prev = cinfo;
373 }
374 return prev;
375}
376
2b54aa87 377VncInfo *qmp_query_vnc(Error **errp)
d96fd29c 378{
2b54aa87 379 VncInfo *info = g_malloc0(sizeof(*info));
d616ccc5 380 VncDisplay *vd = vnc_display_find(NULL);
bd269ebc 381 SocketAddress *addr = NULL;
2b54aa87 382
13e1d0e7 383 if (vd == NULL || !vd->listener || !vd->listener->nsioc) {
2b54aa87 384 info->enabled = false;
d96fd29c 385 } else {
2b54aa87
LC
386 info->enabled = true;
387
388 /* for compatibility with the original command */
389 info->has_clients = true;
2d29a436 390 info->clients = qmp_query_client_list(vd);
d96fd29c 391
13e1d0e7
DB
392 addr = qio_channel_socket_get_local_address(vd->listener->sioc[0],
393 errp);
04d2529d 394 if (!addr) {
2b54aa87
LC
395 goto out_error;
396 }
d96fd29c 397
04d2529d 398 switch (addr->type) {
bd269ebc
MA
399 case SOCKET_ADDRESS_TYPE_INET:
400 info->host = g_strdup(addr->u.inet.host);
401 info->service = g_strdup(addr->u.inet.port);
402 if (addr->u.inet.ipv6) {
04d2529d
DB
403 info->family = NETWORK_ADDRESS_FAMILY_IPV6;
404 } else {
405 info->family = NETWORK_ADDRESS_FAMILY_IPV4;
406 }
407 break;
408
bd269ebc 409 case SOCKET_ADDRESS_TYPE_UNIX:
04d2529d 410 info->host = g_strdup("");
bd269ebc 411 info->service = g_strdup(addr->u.q_unix.path);
04d2529d
DB
412 info->family = NETWORK_ADDRESS_FAMILY_UNIX;
413 break;
414
bd269ebc
MA
415 case SOCKET_ADDRESS_TYPE_VSOCK:
416 case SOCKET_ADDRESS_TYPE_FD:
a6c76285 417 error_setg(errp, "Unsupported socket address type %s",
977c736f 418 SocketAddressType_str(addr->type));
2b54aa87 419 goto out_error;
a6c76285
MA
420 default:
421 abort();
1ff7df1a 422 }
2b54aa87
LC
423
424 info->has_host = true;
2b54aa87 425 info->has_service = true;
2b54aa87 426 info->has_family = true;
2b54aa87
LC
427
428 info->has_auth = true;
d616ccc5 429 info->auth = g_strdup(vnc_auth_name(vd));
a9ce8590 430 }
2b54aa87 431
bd269ebc 432 qapi_free_SocketAddress(addr);
2b54aa87
LC
433 return info;
434
435out_error:
bd269ebc 436 qapi_free_SocketAddress(addr);
2b54aa87
LC
437 qapi_free_VncInfo(info);
438 return NULL;
a9ce8590
FB
439}
440
2a7e6857
DB
441
442static void qmp_query_auth(int auth, int subauth,
443 VncPrimaryAuth *qmp_auth,
444 VncVencryptSubAuth *qmp_vencrypt,
445 bool *qmp_has_vencrypt);
446
447static VncServerInfo2List *qmp_query_server_entry(QIOChannelSocket *ioc,
448 bool websocket,
449 int auth,
450 int subauth,
451 VncServerInfo2List *prev)
df887684 452{
2a7e6857
DB
453 VncServerInfo2List *list;
454 VncServerInfo2 *info;
04d2529d 455 Error *err = NULL;
bd269ebc 456 SocketAddress *addr;
04d2529d
DB
457
458 addr = qio_channel_socket_get_local_address(ioc, &err);
459 if (!addr) {
460 error_free(err);
df887684
GH
461 return prev;
462 }
463
2a7e6857
DB
464 info = g_new0(VncServerInfo2, 1);
465 vnc_init_basic_info(addr, qapi_VncServerInfo2_base(info), &err);
bd269ebc 466 qapi_free_SocketAddress(addr);
04d2529d 467 if (err) {
2a7e6857 468 qapi_free_VncServerInfo2(info);
04d2529d
DB
469 error_free(err);
470 return prev;
471 }
4478aa76 472 info->websocket = websocket;
df887684 473
2a7e6857
DB
474 qmp_query_auth(auth, subauth, &info->auth,
475 &info->vencrypt, &info->has_vencrypt);
476
477 list = g_new0(VncServerInfo2List, 1);
df887684
GH
478 list->value = info;
479 list->next = prev;
480 return list;
481}
482
2a7e6857
DB
483static void qmp_query_auth(int auth, int subauth,
484 VncPrimaryAuth *qmp_auth,
485 VncVencryptSubAuth *qmp_vencrypt,
486 bool *qmp_has_vencrypt)
df887684 487{
2a7e6857 488 switch (auth) {
df887684 489 case VNC_AUTH_VNC:
2a7e6857 490 *qmp_auth = VNC_PRIMARY_AUTH_VNC;
df887684
GH
491 break;
492 case VNC_AUTH_RA2:
2a7e6857 493 *qmp_auth = VNC_PRIMARY_AUTH_RA2;
df887684
GH
494 break;
495 case VNC_AUTH_RA2NE:
2a7e6857 496 *qmp_auth = VNC_PRIMARY_AUTH_RA2NE;
df887684
GH
497 break;
498 case VNC_AUTH_TIGHT:
2a7e6857 499 *qmp_auth = VNC_PRIMARY_AUTH_TIGHT;
df887684
GH
500 break;
501 case VNC_AUTH_ULTRA:
2a7e6857 502 *qmp_auth = VNC_PRIMARY_AUTH_ULTRA;
df887684
GH
503 break;
504 case VNC_AUTH_TLS:
2a7e6857 505 *qmp_auth = VNC_PRIMARY_AUTH_TLS;
df887684
GH
506 break;
507 case VNC_AUTH_VENCRYPT:
2a7e6857
DB
508 *qmp_auth = VNC_PRIMARY_AUTH_VENCRYPT;
509 *qmp_has_vencrypt = true;
510 switch (subauth) {
df887684 511 case VNC_AUTH_VENCRYPT_PLAIN:
2a7e6857 512 *qmp_vencrypt = VNC_VENCRYPT_SUB_AUTH_PLAIN;
df887684
GH
513 break;
514 case VNC_AUTH_VENCRYPT_TLSNONE:
2a7e6857 515 *qmp_vencrypt = VNC_VENCRYPT_SUB_AUTH_TLS_NONE;
df887684
GH
516 break;
517 case VNC_AUTH_VENCRYPT_TLSVNC:
2a7e6857 518 *qmp_vencrypt = VNC_VENCRYPT_SUB_AUTH_TLS_VNC;
df887684
GH
519 break;
520 case VNC_AUTH_VENCRYPT_TLSPLAIN:
2a7e6857 521 *qmp_vencrypt = VNC_VENCRYPT_SUB_AUTH_TLS_PLAIN;
df887684
GH
522 break;
523 case VNC_AUTH_VENCRYPT_X509NONE:
2a7e6857 524 *qmp_vencrypt = VNC_VENCRYPT_SUB_AUTH_X509_NONE;
df887684
GH
525 break;
526 case VNC_AUTH_VENCRYPT_X509VNC:
2a7e6857 527 *qmp_vencrypt = VNC_VENCRYPT_SUB_AUTH_X509_VNC;
df887684
GH
528 break;
529 case VNC_AUTH_VENCRYPT_X509PLAIN:
2a7e6857 530 *qmp_vencrypt = VNC_VENCRYPT_SUB_AUTH_X509_PLAIN;
df887684
GH
531 break;
532 case VNC_AUTH_VENCRYPT_TLSSASL:
2a7e6857 533 *qmp_vencrypt = VNC_VENCRYPT_SUB_AUTH_TLS_SASL;
df887684
GH
534 break;
535 case VNC_AUTH_VENCRYPT_X509SASL:
2a7e6857 536 *qmp_vencrypt = VNC_VENCRYPT_SUB_AUTH_X509_SASL;
df887684
GH
537 break;
538 default:
2a7e6857 539 *qmp_has_vencrypt = false;
df887684
GH
540 break;
541 }
df887684
GH
542 break;
543 case VNC_AUTH_SASL:
2a7e6857 544 *qmp_auth = VNC_PRIMARY_AUTH_SASL;
df887684
GH
545 break;
546 case VNC_AUTH_NONE:
547 default:
2a7e6857 548 *qmp_auth = VNC_PRIMARY_AUTH_NONE;
df887684
GH
549 break;
550 }
551}
552
553VncInfo2List *qmp_query_vnc_servers(Error **errp)
554{
555 VncInfo2List *item, *prev = NULL;
556 VncInfo2 *info;
557 VncDisplay *vd;
558 DeviceState *dev;
4ee74fa7 559 size_t i;
df887684
GH
560
561 QTAILQ_FOREACH(vd, &vnc_displays, next) {
562 info = g_new0(VncInfo2, 1);
563 info->id = g_strdup(vd->id);
564 info->clients = qmp_query_client_list(vd);
2a7e6857
DB
565 qmp_query_auth(vd->auth, vd->subauth, &info->auth,
566 &info->vencrypt, &info->has_vencrypt);
df887684
GH
567 if (vd->dcl.con) {
568 dev = DEVICE(object_property_get_link(OBJECT(vd->dcl.con),
569 "device", NULL));
570 info->has_display = true;
571 info->display = g_strdup(dev->id);
572 }
13e1d0e7 573 for (i = 0; vd->listener != NULL && i < vd->listener->nsioc; i++) {
04d2529d 574 info->server = qmp_query_server_entry(
13e1d0e7
DB
575 vd->listener->sioc[i], false, vd->auth, vd->subauth,
576 info->server);
df887684 577 }
13e1d0e7 578 for (i = 0; vd->wslistener != NULL && i < vd->wslistener->nsioc; i++) {
04d2529d 579 info->server = qmp_query_server_entry(
13e1d0e7 580 vd->wslistener->sioc[i], true, vd->ws_auth,
4ee74fa7 581 vd->ws_subauth, info->server);
df887684 582 }
df887684
GH
583
584 item = g_new0(VncInfo2List, 1);
585 item->value = info;
586 item->next = prev;
587 prev = item;
588 }
589 return prev;
590}
591
24236869
FB
592/* TODO
593 1) Get the queue working for IO.
594 2) there is some weirdness when using the -S option (the screen is grey
595 and not totally invalidated
596 3) resolutions > 1024
597*/
598
6af998db 599static int vnc_update_client(VncState *vs, int has_dirty);
198a0039 600static void vnc_disconnect_start(VncState *vs);
24236869 601
753b4053 602static void vnc_colordepth(VncState *vs);
1fc62412
SS
603static void framebuffer_update_request(VncState *vs, int incremental,
604 int x_position, int y_position,
605 int w, int h);
0f7b2864 606static void vnc_refresh(DisplayChangeListener *dcl);
1fc62412 607static int vnc_refresh_server_surface(VncDisplay *vd);
7eac3a87 608
d05959c2
GH
609static int vnc_width(VncDisplay *vd)
610{
611 return MIN(VNC_MAX_WIDTH, ROUND_UP(surface_width(vd->ds),
612 VNC_DIRTY_PIXELS_PER_BIT));
613}
614
615static int vnc_height(VncDisplay *vd)
616{
617 return MIN(VNC_MAX_HEIGHT, surface_height(vd->ds));
618}
619
bea60dd7
PL
620static void vnc_set_area_dirty(DECLARE_BITMAP(dirty[VNC_MAX_HEIGHT],
621 VNC_MAX_WIDTH / VNC_DIRTY_PIXELS_PER_BIT),
f7b3d68c
GH
622 VncDisplay *vd,
623 int x, int y, int w, int h)
624{
625 int width = vnc_width(vd);
626 int height = vnc_height(vd);
627
91937225
PL
628 /* this is needed this to ensure we updated all affected
629 * blocks if x % VNC_DIRTY_PIXELS_PER_BIT != 0 */
b4c85ddc
PL
630 w += (x % VNC_DIRTY_PIXELS_PER_BIT);
631 x -= (x % VNC_DIRTY_PIXELS_PER_BIT);
0486e8a7 632
9f64916d
GH
633 x = MIN(x, width);
634 y = MIN(y, height);
635 w = MIN(x + w, width) - x;
91937225 636 h = MIN(y + h, height);
788abf8e 637
b4c85ddc 638 for (; y < h; y++) {
bea60dd7 639 bitmap_set(dirty[y], x / VNC_DIRTY_PIXELS_PER_BIT,
91937225 640 DIV_ROUND_UP(w, VNC_DIRTY_PIXELS_PER_BIT));
b4c85ddc 641 }
24236869
FB
642}
643
bea60dd7
PL
644static void vnc_dpy_update(DisplayChangeListener *dcl,
645 int x, int y, int w, int h)
646{
647 VncDisplay *vd = container_of(dcl, VncDisplay, dcl);
648 struct VncSurface *s = &vd->guest;
bea60dd7 649
f7b3d68c 650 vnc_set_area_dirty(s->dirty, vd, x, y, w, h);
bea60dd7
PL
651}
652
70a4568f
CC
653void vnc_framebuffer_update(VncState *vs, int x, int y, int w, int h,
654 int32_t encoding)
24236869
FB
655{
656 vnc_write_u16(vs, x);
657 vnc_write_u16(vs, y);
658 vnc_write_u16(vs, w);
659 vnc_write_u16(vs, h);
660
661 vnc_write_s32(vs, encoding);
662}
663
32ed2680 664
621aaeb9
GH
665static void vnc_desktop_resize(VncState *vs)
666{
04d2529d 667 if (vs->ioc == NULL || !vnc_has_feature(vs, VNC_FEATURE_RESIZE)) {
621aaeb9
GH
668 return;
669 }
bea60dd7
PL
670 if (vs->client_width == pixman_image_get_width(vs->vd->server) &&
671 vs->client_height == pixman_image_get_height(vs->vd->server)) {
1d4b638a
GH
672 return;
673 }
4c956bd8
DB
674
675 assert(pixman_image_get_width(vs->vd->server) < 65536 &&
676 pixman_image_get_width(vs->vd->server) >= 0);
677 assert(pixman_image_get_height(vs->vd->server) < 65536 &&
678 pixman_image_get_height(vs->vd->server) >= 0);
bea60dd7
PL
679 vs->client_width = pixman_image_get_width(vs->vd->server);
680 vs->client_height = pixman_image_get_height(vs->vd->server);
bd023f95 681 vnc_lock_output(vs);
621aaeb9
GH
682 vnc_write_u8(vs, VNC_MSG_SERVER_FRAMEBUFFER_UPDATE);
683 vnc_write_u8(vs, 0);
684 vnc_write_u16(vs, 1); /* number of rects */
5862d195 685 vnc_framebuffer_update(vs, 0, 0, vs->client_width, vs->client_height,
621aaeb9 686 VNC_ENCODING_DESKTOPRESIZE);
bd023f95 687 vnc_unlock_output(vs);
621aaeb9
GH
688 vnc_flush(vs);
689}
690
bd023f95
CC
691static void vnc_abort_display_jobs(VncDisplay *vd)
692{
693 VncState *vs;
694
695 QTAILQ_FOREACH(vs, &vd->clients, next) {
696 vnc_lock_output(vs);
697 vs->abort = true;
698 vnc_unlock_output(vs);
699 }
700 QTAILQ_FOREACH(vs, &vd->clients, next) {
701 vnc_jobs_join(vs);
702 }
703 QTAILQ_FOREACH(vs, &vd->clients, next) {
704 vnc_lock_output(vs);
bbcdeb62
GH
705 if (vs->update == VNC_STATE_UPDATE_NONE &&
706 vs->job_update != VNC_STATE_UPDATE_NONE) {
707 /* job aborted before completion */
708 vs->update = vs->job_update;
709 vs->job_update = VNC_STATE_UPDATE_NONE;
710 }
bd023f95
CC
711 vs->abort = false;
712 vnc_unlock_output(vs);
713 }
714}
bd023f95 715
9f64916d
GH
716int vnc_server_fb_stride(VncDisplay *vd)
717{
718 return pixman_image_get_stride(vd->server);
719}
720
721void *vnc_server_fb_ptr(VncDisplay *vd, int x, int y)
722{
723 uint8_t *ptr;
724
725 ptr = (uint8_t *)pixman_image_get_data(vd->server);
726 ptr += y * vnc_server_fb_stride(vd);
727 ptr += x * VNC_SERVER_FB_BYTES;
728 return ptr;
729}
730
453f842b
GH
731static void vnc_update_server_surface(VncDisplay *vd)
732{
b69a553b
DB
733 int width, height;
734
453f842b
GH
735 qemu_pixman_image_unref(vd->server);
736 vd->server = NULL;
737
c7628bff
GH
738 if (QTAILQ_EMPTY(&vd->clients)) {
739 return;
740 }
741
b69a553b
DB
742 width = vnc_width(vd);
743 height = vnc_height(vd);
453f842b 744 vd->server = pixman_image_create_bits(VNC_SERVER_FB_FORMAT,
b69a553b 745 width, height,
453f842b 746 NULL, 0);
b69a553b
DB
747
748 memset(vd->guest.dirty, 0x00, sizeof(vd->guest.dirty));
749 vnc_set_area_dirty(vd->guest.dirty, vd, 0, 0,
750 width, height);
453f842b
GH
751}
752
61e77a5f
GH
753static bool vnc_check_pageflip(DisplaySurface *s1,
754 DisplaySurface *s2)
755{
756 return (s1 != NULL &&
757 s2 != NULL &&
758 surface_width(s1) == surface_width(s2) &&
759 surface_height(s1) == surface_height(s2) &&
760 surface_format(s1) == surface_format(s2));
761
762}
763
c12aeb86 764static void vnc_dpy_switch(DisplayChangeListener *dcl,
c12aeb86 765 DisplaySurface *surface)
24236869 766{
2e5567c9
GH
767 static const char placeholder_msg[] =
768 "Display output is not active.";
769 static DisplaySurface *placeholder;
21ef45d7 770 VncDisplay *vd = container_of(dcl, VncDisplay, dcl);
61e77a5f 771 bool pageflip = vnc_check_pageflip(vd->ds, surface);
41b4bef6 772 VncState *vs;
1fc62412 773
2e5567c9
GH
774 if (surface == NULL) {
775 if (placeholder == NULL) {
776 placeholder = qemu_create_message_surface(640, 480, placeholder_msg);
777 }
778 surface = placeholder;
779 }
780
bd023f95 781 vnc_abort_display_jobs(vd);
453f842b 782 vd->ds = surface;
bd023f95 783
6baebed7 784 /* guest surface */
9f64916d 785 qemu_pixman_image_unref(vd->guest.fb);
d39fa6d8
GH
786 vd->guest.fb = pixman_image_ref(surface->image);
787 vd->guest.format = surface->format;
24236869 788
61e77a5f
GH
789 if (pageflip) {
790 vnc_set_area_dirty(vd->guest.dirty, vd, 0, 0,
791 surface_width(surface),
792 surface_height(surface));
793 return;
794 }
795
796 /* server surface */
797 vnc_update_server_surface(vd);
798
41b4bef6 799 QTAILQ_FOREACH(vs, &vd->clients, next) {
1fc62412 800 vnc_colordepth(vs);
1d4b638a 801 vnc_desktop_resize(vs);
d467b679
GH
802 if (vs->vd->cursor) {
803 vnc_cursor_define(vs);
804 }
bea60dd7 805 memset(vs->dirty, 0x00, sizeof(vs->dirty));
f7b3d68c 806 vnc_set_area_dirty(vs->dirty, vd, 0, 0,
b69a553b
DB
807 vnc_width(vd),
808 vnc_height(vd));
e2b72cb6 809 vnc_update_throttle_offset(vs);
753b4053
AL
810 }
811}
812
3512779a 813/* fastest code */
9f64916d 814static void vnc_write_pixels_copy(VncState *vs,
d467b679 815 void *pixels, int size)
3512779a
FB
816{
817 vnc_write(vs, pixels, size);
818}
819
820/* slowest but generic code. */
70a4568f 821void vnc_convert_pixel(VncState *vs, uint8_t *buf, uint32_t v)
3512779a 822{
7eac3a87 823 uint8_t r, g, b;
1fc62412 824
9f64916d
GH
825#if VNC_SERVER_FB_FORMAT == PIXMAN_FORMAT(32, PIXMAN_TYPE_ARGB, 0, 8, 8, 8)
826 r = (((v & 0x00ff0000) >> 16) << vs->client_pf.rbits) >> 8;
827 g = (((v & 0x0000ff00) >> 8) << vs->client_pf.gbits) >> 8;
828 b = (((v & 0x000000ff) >> 0) << vs->client_pf.bbits) >> 8;
829#else
830# error need some bits here if you change VNC_SERVER_FB_FORMAT
831#endif
832 v = (r << vs->client_pf.rshift) |
833 (g << vs->client_pf.gshift) |
834 (b << vs->client_pf.bshift);
835 switch (vs->client_pf.bytes_per_pixel) {
3512779a
FB
836 case 1:
837 buf[0] = v;
838 break;
839 case 2:
9f64916d 840 if (vs->client_be) {
3512779a
FB
841 buf[0] = v >> 8;
842 buf[1] = v;
843 } else {
844 buf[1] = v >> 8;
845 buf[0] = v;
846 }
847 break;
848 default:
849 case 4:
9f64916d 850 if (vs->client_be) {
3512779a
FB
851 buf[0] = v >> 24;
852 buf[1] = v >> 16;
853 buf[2] = v >> 8;
854 buf[3] = v;
855 } else {
856 buf[3] = v >> 24;
857 buf[2] = v >> 16;
858 buf[1] = v >> 8;
859 buf[0] = v;
860 }
861 break;
862 }
863}
864
9f64916d 865static void vnc_write_pixels_generic(VncState *vs,
d467b679 866 void *pixels1, int size)
3512779a 867{
3512779a 868 uint8_t buf[4];
3512779a 869
9f64916d 870 if (VNC_SERVER_FB_BYTES == 4) {
7eac3a87
AL
871 uint32_t *pixels = pixels1;
872 int n, i;
873 n = size >> 2;
9f64916d 874 for (i = 0; i < n; i++) {
7eac3a87 875 vnc_convert_pixel(vs, buf, pixels[i]);
9f64916d 876 vnc_write(vs, buf, vs->client_pf.bytes_per_pixel);
7eac3a87 877 }
3512779a
FB
878 }
879}
880
a885211e 881int vnc_raw_send_framebuffer_update(VncState *vs, int x, int y, int w, int h)
24236869
FB
882{
883 int i;
60fe76f3 884 uint8_t *row;
1fc62412 885 VncDisplay *vd = vs->vd;
24236869 886
9f64916d 887 row = vnc_server_fb_ptr(vd, x, y);
24236869 888 for (i = 0; i < h; i++) {
9f64916d
GH
889 vs->write_pixels(vs, row, w * VNC_SERVER_FB_BYTES);
890 row += vnc_server_fb_stride(vd);
24236869 891 }
a885211e 892 return 1;
24236869
FB
893}
894
bd023f95 895int vnc_send_framebuffer_update(VncState *vs, int x, int y, int w, int h)
24236869 896{
a885211e 897 int n = 0;
de3f7de7
PL
898 bool encode_raw = false;
899 size_t saved_offs = vs->output.offset;
a885211e 900
fb437313 901 switch(vs->vnc_encoding) {
28a76be8 902 case VNC_ENCODING_ZLIB:
a885211e 903 n = vnc_zlib_send_framebuffer_update(vs, x, y, w, h);
28a76be8
AL
904 break;
905 case VNC_ENCODING_HEXTILE:
906 vnc_framebuffer_update(vs, x, y, w, h, VNC_ENCODING_HEXTILE);
a885211e 907 n = vnc_hextile_send_framebuffer_update(vs, x, y, w, h);
28a76be8 908 break;
380282b0
CC
909 case VNC_ENCODING_TIGHT:
910 n = vnc_tight_send_framebuffer_update(vs, x, y, w, h);
911 break;
efe556ad
CC
912 case VNC_ENCODING_TIGHT_PNG:
913 n = vnc_tight_png_send_framebuffer_update(vs, x, y, w, h);
914 break;
148954fa
CC
915 case VNC_ENCODING_ZRLE:
916 n = vnc_zrle_send_framebuffer_update(vs, x, y, w, h);
917 break;
918 case VNC_ENCODING_ZYWRLE:
919 n = vnc_zywrle_send_framebuffer_update(vs, x, y, w, h);
920 break;
28a76be8 921 default:
de3f7de7 922 encode_raw = true;
28a76be8 923 break;
fb437313 924 }
de3f7de7
PL
925
926 /* If the client has the same pixel format as our internal buffer and
927 * a RAW encoding would need less space fall back to RAW encoding to
928 * save bandwidth and processing power in the client. */
929 if (!encode_raw && vs->write_pixels == vnc_write_pixels_copy &&
930 12 + h * w * VNC_SERVER_FB_BYTES <= (vs->output.offset - saved_offs)) {
931 vs->output.offset = saved_offs;
932 encode_raw = true;
933 }
934
935 if (encode_raw) {
936 vnc_framebuffer_update(vs, x, y, w, h, VNC_ENCODING_RAW);
937 n = vnc_raw_send_framebuffer_update(vs, x, y, w, h);
938 }
939
a885211e 940 return n;
24236869
FB
941}
942
7c20b4a3 943static void vnc_mouse_set(DisplayChangeListener *dcl,
7c20b4a3 944 int x, int y, int visible)
d467b679
GH
945{
946 /* can we ask the client(s) to move the pointer ??? */
947}
948
949static int vnc_cursor_define(VncState *vs)
950{
951 QEMUCursor *c = vs->vd->cursor;
d467b679
GH
952 int isize;
953
954 if (vnc_has_feature(vs, VNC_FEATURE_RICH_CURSOR)) {
d01f9595 955 vnc_lock_output(vs);
d467b679
GH
956 vnc_write_u8(vs, VNC_MSG_SERVER_FRAMEBUFFER_UPDATE);
957 vnc_write_u8(vs, 0); /* padding */
958 vnc_write_u16(vs, 1); /* # of rects */
959 vnc_framebuffer_update(vs, c->hot_x, c->hot_y, c->width, c->height,
960 VNC_ENCODING_RICH_CURSOR);
9f64916d
GH
961 isize = c->width * c->height * vs->client_pf.bytes_per_pixel;
962 vnc_write_pixels_generic(vs, c->data, isize);
d467b679 963 vnc_write(vs, vs->vd->cursor_mask, vs->vd->cursor_msize);
d01f9595 964 vnc_unlock_output(vs);
d467b679
GH
965 return 0;
966 }
967 return -1;
968}
969
7c20b4a3 970static void vnc_dpy_cursor_define(DisplayChangeListener *dcl,
7c20b4a3 971 QEMUCursor *c)
d467b679 972{
d616ccc5 973 VncDisplay *vd = container_of(dcl, VncDisplay, dcl);
d467b679
GH
974 VncState *vs;
975
976 cursor_put(vd->cursor);
7267c094 977 g_free(vd->cursor_mask);
d467b679
GH
978
979 vd->cursor = c;
980 cursor_get(vd->cursor);
981 vd->cursor_msize = cursor_get_mono_bpl(c) * c->height;
7267c094 982 vd->cursor_mask = g_malloc0(vd->cursor_msize);
d467b679
GH
983 cursor_get_mono_mask(c, 0, vd->cursor_mask);
984
985 QTAILQ_FOREACH(vs, &vd->clients, next) {
986 vnc_cursor_define(vs);
987 }
988}
989
4769a881 990static int find_and_clear_dirty_height(VncState *vs,
6c71a539 991 int y, int last_x, int x, int height)
24236869
FB
992{
993 int h;
994
6c71a539 995 for (h = 1; h < (height - y); h++) {
bc2429b9 996 if (!test_bit(last_x, vs->dirty[y + h])) {
28a76be8 997 break;
bc2429b9 998 }
863d7c91 999 bitmap_clear(vs->dirty[y + h], last_x, x - last_x);
24236869
FB
1000 }
1001
1002 return h;
1003}
1004
e2b72cb6
DB
1005/*
1006 * Figure out how much pending data we should allow in the output
1007 * buffer before we throttle incremental display updates, and/or
1008 * drop audio samples.
1009 *
1010 * We allow for equiv of 1 full display's worth of FB updates,
1011 * and 1 second of audio samples. If audio backlog was larger
1012 * than that the client would already suffering awful audio
1013 * glitches, so dropping samples is no worse really).
1014 */
1015static void vnc_update_throttle_offset(VncState *vs)
1016{
1017 size_t offset =
1018 vs->client_width * vs->client_height * vs->client_pf.bytes_per_pixel;
1019
1020 if (vs->audio_cap) {
e2b72cb6 1021 int bps;
e2b72cb6
DB
1022 switch (vs->as.fmt) {
1023 default:
85bc5852
KZ
1024 case AUDIO_FORMAT_U8:
1025 case AUDIO_FORMAT_S8:
e2b72cb6
DB
1026 bps = 1;
1027 break;
85bc5852
KZ
1028 case AUDIO_FORMAT_U16:
1029 case AUDIO_FORMAT_S16:
e2b72cb6
DB
1030 bps = 2;
1031 break;
85bc5852
KZ
1032 case AUDIO_FORMAT_U32:
1033 case AUDIO_FORMAT_S32:
e2b72cb6
DB
1034 bps = 4;
1035 break;
1036 }
cf070658 1037 offset += vs->as.freq * bps * vs->as.nchannels;
e2b72cb6
DB
1038 }
1039
1040 /* Put a floor of 1MB on offset, so that if we have a large pending
1041 * buffer and the display is resized to a small size & back again
1042 * we don't suddenly apply a tiny send limit
1043 */
1044 offset = MAX(offset, 1024 * 1024);
1045
6aa22a29
DB
1046 if (vs->throttle_output_offset != offset) {
1047 trace_vnc_client_throttle_threshold(
1048 vs, vs->ioc, vs->throttle_output_offset, offset, vs->client_width,
1049 vs->client_height, vs->client_pf.bytes_per_pixel, vs->audio_cap);
1050 }
1051
e2b72cb6
DB
1052 vs->throttle_output_offset = offset;
1053}
1054
0bad8342
DB
1055static bool vnc_should_update(VncState *vs)
1056{
1057 switch (vs->update) {
1058 case VNC_STATE_UPDATE_NONE:
1059 break;
1060 case VNC_STATE_UPDATE_INCREMENTAL:
e2b72cb6 1061 /* Only allow incremental updates if the pending send queue
ada8d2e4
DB
1062 * is less than the permitted threshold, and the job worker
1063 * is completely idle.
0bad8342 1064 */
ada8d2e4
DB
1065 if (vs->output.offset < vs->throttle_output_offset &&
1066 vs->job_update == VNC_STATE_UPDATE_NONE) {
0bad8342
DB
1067 return true;
1068 }
6aa22a29
DB
1069 trace_vnc_client_throttle_incremental(
1070 vs, vs->ioc, vs->job_update, vs->output.offset);
0bad8342
DB
1071 break;
1072 case VNC_STATE_UPDATE_FORCE:
ada8d2e4
DB
1073 /* Only allow forced updates if the pending send queue
1074 * does not contain a previous forced update, and the
1075 * job worker is completely idle.
1076 *
1077 * Note this means we'll queue a forced update, even if
1078 * the output buffer size is otherwise over the throttle
1079 * output limit.
1080 */
1081 if (vs->force_update_offset == 0 &&
1082 vs->job_update == VNC_STATE_UPDATE_NONE) {
1083 return true;
1084 }
6aa22a29
DB
1085 trace_vnc_client_throttle_forced(
1086 vs, vs->ioc, vs->job_update, vs->force_update_offset);
ada8d2e4 1087 break;
0bad8342
DB
1088 }
1089 return false;
1090}
1091
6af998db 1092static int vnc_update_client(VncState *vs, int has_dirty)
24236869 1093{
b939eb89
DB
1094 VncDisplay *vd = vs->vd;
1095 VncJob *job;
1096 int y;
1097 int height, width;
1098 int n = 0;
1099
5a8be0f7
GH
1100 if (vs->disconnecting) {
1101 vnc_disconnect_finish(vs);
1102 return 0;
1103 }
1104
63658280 1105 vs->has_dirty += has_dirty;
0bad8342 1106 if (!vnc_should_update(vs)) {
b939eb89
DB
1107 return 0;
1108 }
1109
fef1bbad 1110 if (!vs->has_dirty && vs->update != VNC_STATE_UPDATE_FORCE) {
b939eb89
DB
1111 return 0;
1112 }
1113
1114 /*
1115 * Send screen updates to the vnc client using the server
1116 * surface and server dirty map. guest surface updates
1117 * happening in parallel don't disturb us, the next pass will
1118 * send them to the client.
1119 */
1120 job = vnc_job_new(vs);
1121
1122 height = pixman_image_get_height(vd->server);
1123 width = pixman_image_get_width(vd->server);
1124
1125 y = 0;
1126 for (;;) {
1127 int x, h;
1128 unsigned long x2;
1129 unsigned long offset = find_next_bit((unsigned long *) &vs->dirty,
1130 height * VNC_DIRTY_BPL(vs),
1131 y * VNC_DIRTY_BPL(vs));
1132 if (offset == height * VNC_DIRTY_BPL(vs)) {
1133 /* no more dirty bits */
1134 break;
1135 }
1136 y = offset / VNC_DIRTY_BPL(vs);
1137 x = offset % VNC_DIRTY_BPL(vs);
1138 x2 = find_next_zero_bit((unsigned long *) &vs->dirty[y],
1139 VNC_DIRTY_BPL(vs), x);
1140 bitmap_clear(vs->dirty[y], x, x2 - x);
1141 h = find_and_clear_dirty_height(vs, y, x, x2, height);
1142 x2 = MIN(x2, width / VNC_DIRTY_PIXELS_PER_BIT);
1143 if (x2 > x) {
1144 n += vnc_job_add_rect(job, x * VNC_DIRTY_PIXELS_PER_BIT, y,
1145 (x2 - x) * VNC_DIRTY_PIXELS_PER_BIT, h);
1146 }
1147 if (!x && x2 == width / VNC_DIRTY_PIXELS_PER_BIT) {
1148 y += h;
1149 if (y == height) {
12b316d4 1150 break;
28a76be8
AL
1151 }
1152 }
24236869 1153 }
24236869 1154
ada8d2e4 1155 vs->job_update = vs->update;
728a7ac9 1156 vs->update = VNC_STATE_UPDATE_NONE;
ada8d2e4 1157 vnc_job_push(job);
b939eb89
DB
1158 vs->has_dirty = 0;
1159 return n;
24236869
FB
1160}
1161
429a8ed3 1162/* audio */
1163static void audio_capture_notify(void *opaque, audcnotification_e cmd)
1164{
1165 VncState *vs = opaque;
1166
f31f9c10 1167 assert(vs->magic == VNC_MAGIC);
429a8ed3 1168 switch (cmd) {
1169 case AUD_CNOTIFY_DISABLE:
bd023f95 1170 vnc_lock_output(vs);
46a183da
DB
1171 vnc_write_u8(vs, VNC_MSG_SERVER_QEMU);
1172 vnc_write_u8(vs, VNC_MSG_SERVER_QEMU_AUDIO);
1173 vnc_write_u16(vs, VNC_MSG_SERVER_QEMU_AUDIO_END);
bd023f95 1174 vnc_unlock_output(vs);
429a8ed3 1175 vnc_flush(vs);
1176 break;
1177
1178 case AUD_CNOTIFY_ENABLE:
bd023f95 1179 vnc_lock_output(vs);
46a183da
DB
1180 vnc_write_u8(vs, VNC_MSG_SERVER_QEMU);
1181 vnc_write_u8(vs, VNC_MSG_SERVER_QEMU_AUDIO);
1182 vnc_write_u16(vs, VNC_MSG_SERVER_QEMU_AUDIO_BEGIN);
bd023f95 1183 vnc_unlock_output(vs);
429a8ed3 1184 vnc_flush(vs);
1185 break;
1186 }
1187}
1188
1189static void audio_capture_destroy(void *opaque)
1190{
1191}
1192
1193static void audio_capture(void *opaque, void *buf, int size)
1194{
1195 VncState *vs = opaque;
1196
f31f9c10 1197 assert(vs->magic == VNC_MAGIC);
bd023f95 1198 vnc_lock_output(vs);
e2b72cb6
DB
1199 if (vs->output.offset < vs->throttle_output_offset) {
1200 vnc_write_u8(vs, VNC_MSG_SERVER_QEMU);
1201 vnc_write_u8(vs, VNC_MSG_SERVER_QEMU_AUDIO);
1202 vnc_write_u16(vs, VNC_MSG_SERVER_QEMU_AUDIO_DATA);
1203 vnc_write_u32(vs, size);
1204 vnc_write(vs, buf, size);
6aa22a29
DB
1205 } else {
1206 trace_vnc_client_throttle_audio(vs, vs->ioc, vs->output.offset);
e2b72cb6 1207 }
bd023f95 1208 vnc_unlock_output(vs);
429a8ed3 1209 vnc_flush(vs);
1210}
1211
1212static void audio_add(VncState *vs)
1213{
1214 struct audio_capture_ops ops;
1215
1216 if (vs->audio_cap) {
027a79c3 1217 error_report("audio already running");
429a8ed3 1218 return;
1219 }
1220
1221 ops.notify = audio_capture_notify;
1222 ops.destroy = audio_capture_destroy;
1223 ops.capture = audio_capture;
1224
1a7dafce 1225 vs->audio_cap = AUD_add_capture(&vs->as, &ops, vs);
429a8ed3 1226 if (!vs->audio_cap) {
027a79c3 1227 error_report("Failed to add audio capture");
429a8ed3 1228 }
1229}
1230
1231static void audio_del(VncState *vs)
1232{
1233 if (vs->audio_cap) {
1234 AUD_del_capture(vs->audio_cap, vs);
1235 vs->audio_cap = NULL;
1236 }
1237}
1238
198a0039
GH
1239static void vnc_disconnect_start(VncState *vs)
1240{
04d2529d 1241 if (vs->disconnecting) {
198a0039 1242 return;
04d2529d 1243 }
ad6374c4 1244 trace_vnc_client_disconnect_start(vs, vs->ioc);
8cf36489 1245 vnc_set_share_mode(vs, VNC_SHARE_MODE_DISCONNECTED);
04d2529d
DB
1246 if (vs->ioc_tag) {
1247 g_source_remove(vs->ioc_tag);
a75d6f07 1248 vs->ioc_tag = 0;
04d2529d
DB
1249 }
1250 qio_channel_close(vs->ioc, NULL);
1251 vs->disconnecting = TRUE;
198a0039
GH
1252}
1253
7536ee4b 1254void vnc_disconnect_finish(VncState *vs)
198a0039 1255{
7d964c9d
CC
1256 int i;
1257
ad6374c4
DB
1258 trace_vnc_client_disconnect_finish(vs, vs->ioc);
1259
bd023f95
CC
1260 vnc_jobs_join(vs); /* Wait encoding jobs */
1261
1262 vnc_lock_output(vs);
fb6ba0d5 1263 vnc_qmp_event(vs, QAPI_EVENT_VNC_DISCONNECTED);
0d72f3d3 1264
5d418e3b
CC
1265 buffer_free(&vs->input);
1266 buffer_free(&vs->output);
4a80dba3 1267
fb6ba0d5 1268 qapi_free_VncClientInfo(vs->info);
4a80dba3 1269
161c4f20 1270 vnc_zlib_clear(vs);
380282b0 1271 vnc_tight_clear(vs);
148954fa 1272 vnc_zrle_clear(vs);
161c4f20 1273
198a0039
GH
1274#ifdef CONFIG_VNC_SASL
1275 vnc_sasl_client_cleanup(vs);
1276#endif /* CONFIG_VNC_SASL */
1277 audio_del(vs);
c2f2ba49 1278 qkbd_state_lift_all_keys(vs->vd->kbd);
198a0039 1279
90cd03a3 1280 if (vs->mouse_mode_notifier.notify != NULL) {
6fd8e79a 1281 qemu_remove_mouse_mode_change_notifier(&vs->mouse_mode_notifier);
90cd03a3
DB
1282 }
1283 QTAILQ_REMOVE(&vs->vd->clients, vs, next);
1284 if (QTAILQ_EMPTY(&vs->vd->clients)) {
1285 /* last client gone */
1286 vnc_update_server_surface(vs->vd);
6fd8e79a 1287 }
41b4bef6 1288
bd023f95
CC
1289 vnc_unlock_output(vs);
1290
bd023f95 1291 qemu_mutex_destroy(&vs->output_mutex);
6fd8e79a
TH
1292 if (vs->bh != NULL) {
1293 qemu_bh_delete(vs->bh);
1294 }
175b2a6e 1295 buffer_free(&vs->jobs_buffer);
175b2a6e 1296
7d964c9d 1297 for (i = 0; i < VNC_STAT_ROWS; ++i) {
7267c094 1298 g_free(vs->lossy_rect[i]);
7d964c9d 1299 }
7267c094 1300 g_free(vs->lossy_rect);
04d2529d
DB
1301
1302 object_unref(OBJECT(vs->ioc));
1303 vs->ioc = NULL;
1304 object_unref(OBJECT(vs->sioc));
1305 vs->sioc = NULL;
f31f9c10 1306 vs->magic = 0;
7267c094 1307 g_free(vs);
198a0039 1308}
2f9606b3 1309
30b80fd5 1310size_t vnc_client_io_error(VncState *vs, ssize_t ret, Error **errp)
24236869 1311{
04d2529d
DB
1312 if (ret <= 0) {
1313 if (ret == 0) {
ad6374c4 1314 trace_vnc_client_eof(vs, vs->ioc);
537848ee 1315 vnc_disconnect_start(vs);
04d2529d 1316 } else if (ret != QIO_CHANNEL_ERR_BLOCK) {
ad6374c4
DB
1317 trace_vnc_client_io_error(vs, vs->ioc,
1318 errp ? error_get_pretty(*errp) :
1319 "Unknown");
537848ee 1320 vnc_disconnect_start(vs);
ea01e5fd 1321 }
24236869 1322
04d2529d
DB
1323 if (errp) {
1324 error_free(*errp);
1325 *errp = NULL;
1326 }
28a76be8 1327 return 0;
24236869
FB
1328 }
1329 return ret;
1330}
1331
5fb6c7a8
AL
1332
1333void vnc_client_error(VncState *vs)
24236869 1334{
198a0039
GH
1335 VNC_DEBUG("Closing down client sock: protocol error\n");
1336 vnc_disconnect_start(vs);
24236869
FB
1337}
1338
3e305e4a 1339
2f9606b3
AL
1340/*
1341 * Called to write a chunk of data to the client socket. The data may
1342 * be the raw data, or may have already been encoded by SASL.
1343 * The data will be written either straight onto the socket, or
1344 * written via the GNUTLS wrappers, if TLS/SSL encryption is enabled
1345 *
1346 * NB, it is theoretically possible to have 2 layers of encryption,
1347 * both SASL, and this TLS layer. It is highly unlikely in practice
1348 * though, since SASL encryption will typically be a no-op if TLS
1349 * is active
1350 *
1351 * Returns the number of bytes written, which may be less than
1352 * the requested 'datalen' if the socket would block. Returns
30b80fd5 1353 * 0 on I/O error, and disconnects the client socket.
2f9606b3 1354 */
30b80fd5 1355size_t vnc_client_write_buf(VncState *vs, const uint8_t *data, size_t datalen)
24236869 1356{
04d2529d 1357 Error *err = NULL;
fdd1ab6a 1358 ssize_t ret;
2cc45228
DB
1359 ret = qio_channel_write(
1360 vs->ioc, (const char *)data, datalen, &err);
23decc87 1361 VNC_DEBUG("Wrote wire %p %zd -> %ld\n", data, datalen, ret);
04d2529d 1362 return vnc_client_io_error(vs, ret, &err);
2f9606b3
AL
1363}
1364
1365
1366/*
1367 * Called to write buffered data to the client socket, when not
1368 * using any SASL SSF encryption layers. Will write as much data
1369 * as possible without blocking. If all buffered data is written,
1370 * will switch the FD poll() handler back to read monitoring.
1371 *
1372 * Returns the number of bytes written, which may be less than
30b80fd5
DB
1373 * the buffered output data if the socket would block. Returns
1374 * 0 on I/O error, and disconnects the client socket.
2f9606b3 1375 */
30b80fd5 1376static size_t vnc_client_write_plain(VncState *vs)
2f9606b3 1377{
6aa22a29 1378 size_t offset;
30b80fd5 1379 size_t ret;
2f9606b3
AL
1380
1381#ifdef CONFIG_VNC_SASL
23decc87 1382 VNC_DEBUG("Write Plain: Pending output %p size %zd offset %zd. Wait SSF %d\n",
2f9606b3
AL
1383 vs->output.buffer, vs->output.capacity, vs->output.offset,
1384 vs->sasl.waitWriteSSF);
1385
1386 if (vs->sasl.conn &&
1387 vs->sasl.runSSF &&
1388 vs->sasl.waitWriteSSF) {
1389 ret = vnc_client_write_buf(vs, vs->output.buffer, vs->sasl.waitWriteSSF);
1390 if (ret)
1391 vs->sasl.waitWriteSSF -= ret;
1392 } else
1393#endif /* CONFIG_VNC_SASL */
1394 ret = vnc_client_write_buf(vs, vs->output.buffer, vs->output.offset);
24236869 1395 if (!ret)
2f9606b3 1396 return 0;
24236869 1397
ada8d2e4 1398 if (ret >= vs->force_update_offset) {
6aa22a29
DB
1399 if (vs->force_update_offset != 0) {
1400 trace_vnc_client_unthrottle_forced(vs, vs->ioc);
1401 }
ada8d2e4
DB
1402 vs->force_update_offset = 0;
1403 } else {
1404 vs->force_update_offset -= ret;
1405 }
6aa22a29 1406 offset = vs->output.offset;
32ed2680 1407 buffer_advance(&vs->output, ret);
6aa22a29
DB
1408 if (offset >= vs->throttle_output_offset &&
1409 vs->output.offset < vs->throttle_output_offset) {
1410 trace_vnc_client_unthrottle_incremental(vs, vs->ioc, vs->output.offset);
1411 }
24236869
FB
1412
1413 if (vs->output.offset == 0) {
04d2529d
DB
1414 if (vs->ioc_tag) {
1415 g_source_remove(vs->ioc_tag);
1416 }
1417 vs->ioc_tag = qio_channel_add_watch(
1418 vs->ioc, G_IO_IN, vnc_client_io, vs, NULL);
24236869 1419 }
2f9606b3
AL
1420
1421 return ret;
1422}
1423
1424
1425/*
1426 * First function called whenever there is data to be written to
1427 * the client socket. Will delegate actual work according to whether
1428 * SASL SSF layers are enabled (thus requiring encryption calls)
1429 */
04d2529d 1430static void vnc_client_write_locked(VncState *vs)
2f9606b3 1431{
2f9606b3
AL
1432#ifdef CONFIG_VNC_SASL
1433 if (vs->sasl.conn &&
1434 vs->sasl.runSSF &&
9678d950
BS
1435 !vs->sasl.waitWriteSSF) {
1436 vnc_client_write_sasl(vs);
1437 } else
2f9606b3 1438#endif /* CONFIG_VNC_SASL */
7536ee4b 1439 {
d5f04223 1440 vnc_client_write_plain(vs);
7536ee4b 1441 }
24236869
FB
1442}
1443
04d2529d 1444static void vnc_client_write(VncState *vs)
bd023f95 1445{
f31f9c10 1446 assert(vs->magic == VNC_MAGIC);
bd023f95 1447 vnc_lock_output(vs);
d5f04223 1448 if (vs->output.offset) {
04d2529d
DB
1449 vnc_client_write_locked(vs);
1450 } else if (vs->ioc != NULL) {
1451 if (vs->ioc_tag) {
1452 g_source_remove(vs->ioc_tag);
1453 }
1454 vs->ioc_tag = qio_channel_add_watch(
1455 vs->ioc, G_IO_IN, vnc_client_io, vs, NULL);
bd023f95
CC
1456 }
1457 vnc_unlock_output(vs);
1458}
1459
5fb6c7a8 1460void vnc_read_when(VncState *vs, VncReadEvent *func, size_t expecting)
24236869
FB
1461{
1462 vs->read_handler = func;
1463 vs->read_handler_expect = expecting;
1464}
1465
2f9606b3
AL
1466
1467/*
1468 * Called to read a chunk of data from the client socket. The data may
1469 * be the raw data, or may need to be further decoded by SASL.
1470 * The data will be read either straight from to the socket, or
1471 * read via the GNUTLS wrappers, if TLS/SSL encryption is enabled
1472 *
1473 * NB, it is theoretically possible to have 2 layers of encryption,
1474 * both SASL, and this TLS layer. It is highly unlikely in practice
1475 * though, since SASL encryption will typically be a no-op if TLS
1476 * is active
1477 *
1478 * Returns the number of bytes read, which may be less than
1479 * the requested 'datalen' if the socket would block. Returns
30b80fd5 1480 * 0 on I/O error or EOF, and disconnects the client socket.
2f9606b3 1481 */
30b80fd5 1482size_t vnc_client_read_buf(VncState *vs, uint8_t *data, size_t datalen)
24236869 1483{
fdd1ab6a 1484 ssize_t ret;
04d2529d 1485 Error *err = NULL;
2cc45228
DB
1486 ret = qio_channel_read(
1487 vs->ioc, (char *)data, datalen, &err);
23decc87 1488 VNC_DEBUG("Read wire %p %zd -> %ld\n", data, datalen, ret);
04d2529d 1489 return vnc_client_io_error(vs, ret, &err);
2f9606b3 1490}
24236869 1491
2f9606b3
AL
1492
1493/*
1494 * Called to read data from the client socket to the input buffer,
1495 * when not using any SASL SSF encryption layers. Will read as much
1496 * data as possible without blocking.
1497 *
30b80fd5
DB
1498 * Returns the number of bytes read, which may be less than
1499 * the requested 'datalen' if the socket would block. Returns
1500 * 0 on I/O error or EOF, and disconnects the client socket.
2f9606b3 1501 */
30b80fd5 1502static size_t vnc_client_read_plain(VncState *vs)
2f9606b3 1503{
30b80fd5 1504 size_t ret;
23decc87 1505 VNC_DEBUG("Read plain %p size %zd offset %zd\n",
2f9606b3
AL
1506 vs->input.buffer, vs->input.capacity, vs->input.offset);
1507 buffer_reserve(&vs->input, 4096);
1508 ret = vnc_client_read_buf(vs, buffer_end(&vs->input), 4096);
1509 if (!ret)
1510 return 0;
24236869 1511 vs->input.offset += ret;
2f9606b3
AL
1512 return ret;
1513}
1514
175b2a6e
CC
1515static void vnc_jobs_bh(void *opaque)
1516{
1517 VncState *vs = opaque;
1518
f31f9c10 1519 assert(vs->magic == VNC_MAGIC);
175b2a6e
CC
1520 vnc_jobs_consume_buffer(vs);
1521}
2f9606b3
AL
1522
1523/*
1524 * First function called whenever there is more data to be read from
1525 * the client socket. Will delegate actual work according to whether
1526 * SASL SSF layers are enabled (thus requiring decryption calls)
ea697449 1527 * Returns 0 on success, -1 if client disconnected
2f9606b3 1528 */
ea697449 1529static int vnc_client_read(VncState *vs)
2f9606b3 1530{
30b80fd5 1531 size_t ret;
2f9606b3
AL
1532
1533#ifdef CONFIG_VNC_SASL
1534 if (vs->sasl.conn && vs->sasl.runSSF)
1535 ret = vnc_client_read_sasl(vs);
1536 else
1537#endif /* CONFIG_VNC_SASL */
d5f04223 1538 ret = vnc_client_read_plain(vs);
198a0039 1539 if (!ret) {
04d2529d 1540 if (vs->disconnecting) {
198a0039 1541 vnc_disconnect_finish(vs);
ea697449 1542 return -1;
04d2529d 1543 }
ea697449 1544 return 0;
198a0039 1545 }
24236869
FB
1546
1547 while (vs->read_handler && vs->input.offset >= vs->read_handler_expect) {
28a76be8
AL
1548 size_t len = vs->read_handler_expect;
1549 int ret;
1550
1551 ret = vs->read_handler(vs, vs->input.buffer, len);
04d2529d 1552 if (vs->disconnecting) {
198a0039 1553 vnc_disconnect_finish(vs);
ea697449 1554 return -1;
198a0039 1555 }
28a76be8
AL
1556
1557 if (!ret) {
32ed2680 1558 buffer_advance(&vs->input, len);
28a76be8
AL
1559 } else {
1560 vs->read_handler_expect = ret;
1561 }
24236869 1562 }
ea697449 1563 return 0;
24236869
FB
1564}
1565
04d2529d
DB
1566gboolean vnc_client_io(QIOChannel *ioc G_GNUC_UNUSED,
1567 GIOCondition condition, void *opaque)
1568{
1569 VncState *vs = opaque;
f31f9c10
GH
1570
1571 assert(vs->magic == VNC_MAGIC);
04d2529d 1572 if (condition & G_IO_IN) {
ea697449 1573 if (vnc_client_read(vs) < 0) {
1bc3117a
GH
1574 /* vs is free()ed here */
1575 return TRUE;
ea697449 1576 }
04d2529d
DB
1577 }
1578 if (condition & G_IO_OUT) {
1579 vnc_client_write(vs);
1580 }
1bc3117a 1581
d49b87f0
KK
1582 if (vs->disconnecting) {
1583 if (vs->ioc_tag != 0) {
1584 g_source_remove(vs->ioc_tag);
1585 }
1586 vs->ioc_tag = 0;
1587 }
04d2529d
DB
1588 return TRUE;
1589}
1590
1591
f887cf16
DB
1592/*
1593 * Scale factor to apply to vs->throttle_output_offset when checking for
1594 * hard limit. Worst case normal usage could be x2, if we have a complete
1595 * incremental update and complete forced update in the output buffer.
1596 * So x3 should be good enough, but we pick x5 to be conservative and thus
1597 * (hopefully) never trigger incorrectly.
1598 */
1599#define VNC_THROTTLE_OUTPUT_LIMIT_SCALE 5
1600
5fb6c7a8 1601void vnc_write(VncState *vs, const void *data, size_t len)
24236869 1602{
f31f9c10 1603 assert(vs->magic == VNC_MAGIC);
f887cf16
DB
1604 if (vs->disconnecting) {
1605 return;
1606 }
1607 /* Protection against malicious client/guest to prevent our output
1608 * buffer growing without bound if client stops reading data. This
1609 * should rarely trigger, because we have earlier throttling code
1610 * which stops issuing framebuffer updates and drops audio data
1611 * if the throttle_output_offset value is exceeded. So we only reach
1612 * this higher level if a huge number of pseudo-encodings get
1613 * triggered while data can't be sent on the socket.
1614 *
1615 * NB throttle_output_offset can be zero during early protocol
1616 * handshake, or from the job thread's VncState clone
1617 */
1618 if (vs->throttle_output_offset != 0 &&
dffa1de0
DB
1619 (vs->output.offset / VNC_THROTTLE_OUTPUT_LIMIT_SCALE) >
1620 vs->throttle_output_offset) {
6aa22a29
DB
1621 trace_vnc_client_output_limit(vs, vs->ioc, vs->output.offset,
1622 vs->throttle_output_offset);
f887cf16
DB
1623 vnc_disconnect_start(vs);
1624 return;
1625 }
24236869
FB
1626 buffer_reserve(&vs->output, len);
1627
04d2529d
DB
1628 if (vs->ioc != NULL && buffer_empty(&vs->output)) {
1629 if (vs->ioc_tag) {
1630 g_source_remove(vs->ioc_tag);
1631 }
1632 vs->ioc_tag = qio_channel_add_watch(
1633 vs->ioc, G_IO_IN | G_IO_OUT, vnc_client_io, vs, NULL);
24236869
FB
1634 }
1635
1636 buffer_append(&vs->output, data, len);
1637}
1638
5fb6c7a8 1639void vnc_write_s32(VncState *vs, int32_t value)
24236869
FB
1640{
1641 vnc_write_u32(vs, *(uint32_t *)&value);
1642}
1643
5fb6c7a8 1644void vnc_write_u32(VncState *vs, uint32_t value)
24236869
FB
1645{
1646 uint8_t buf[4];
1647
1648 buf[0] = (value >> 24) & 0xFF;
1649 buf[1] = (value >> 16) & 0xFF;
1650 buf[2] = (value >> 8) & 0xFF;
1651 buf[3] = value & 0xFF;
1652
1653 vnc_write(vs, buf, 4);
1654}
1655
5fb6c7a8 1656void vnc_write_u16(VncState *vs, uint16_t value)
24236869 1657{
64f5a135 1658 uint8_t buf[2];
24236869
FB
1659
1660 buf[0] = (value >> 8) & 0xFF;
1661 buf[1] = value & 0xFF;
1662
1663 vnc_write(vs, buf, 2);
1664}
1665
5fb6c7a8 1666void vnc_write_u8(VncState *vs, uint8_t value)
24236869
FB
1667{
1668 vnc_write(vs, (char *)&value, 1);
1669}
1670
5fb6c7a8 1671void vnc_flush(VncState *vs)
24236869 1672{
bd023f95 1673 vnc_lock_output(vs);
d5f04223 1674 if (vs->ioc != NULL && vs->output.offset) {
bd023f95
CC
1675 vnc_client_write_locked(vs);
1676 }
d49b87f0
KK
1677 if (vs->disconnecting) {
1678 if (vs->ioc_tag != 0) {
1679 g_source_remove(vs->ioc_tag);
1680 }
1681 vs->ioc_tag = 0;
1682 }
bd023f95 1683 vnc_unlock_output(vs);
24236869
FB
1684}
1685
71a8cdec 1686static uint8_t read_u8(uint8_t *data, size_t offset)
24236869
FB
1687{
1688 return data[offset];
1689}
1690
71a8cdec 1691static uint16_t read_u16(uint8_t *data, size_t offset)
24236869
FB
1692{
1693 return ((data[offset] & 0xFF) << 8) | (data[offset + 1] & 0xFF);
1694}
1695
71a8cdec 1696static int32_t read_s32(uint8_t *data, size_t offset)
24236869
FB
1697{
1698 return (int32_t)((data[offset] << 24) | (data[offset + 1] << 16) |
28a76be8 1699 (data[offset + 2] << 8) | data[offset + 3]);
24236869
FB
1700}
1701
5fb6c7a8 1702uint32_t read_u32(uint8_t *data, size_t offset)
24236869
FB
1703{
1704 return ((data[offset] << 24) | (data[offset + 1] << 16) |
28a76be8 1705 (data[offset + 2] << 8) | data[offset + 3]);
24236869
FB
1706}
1707
60fe76f3 1708static void client_cut_text(VncState *vs, size_t len, uint8_t *text)
24236869
FB
1709{
1710}
1711
9e8dd451 1712static void check_pointer_type_change(Notifier *notifier, void *data)
564c337e 1713{
37c34d9d 1714 VncState *vs = container_of(notifier, VncState, mouse_mode_notifier);
14768eba 1715 int absolute = qemu_input_is_absolute();
37c34d9d 1716
29fa4ed9 1717 if (vnc_has_feature(vs, VNC_FEATURE_POINTER_TYPE_CHANGE) && vs->absolute != absolute) {
bd023f95 1718 vnc_lock_output(vs);
46a183da 1719 vnc_write_u8(vs, VNC_MSG_SERVER_FRAMEBUFFER_UPDATE);
28a76be8
AL
1720 vnc_write_u8(vs, 0);
1721 vnc_write_u16(vs, 1);
1722 vnc_framebuffer_update(vs, absolute, 0,
bea60dd7
PL
1723 pixman_image_get_width(vs->vd->server),
1724 pixman_image_get_height(vs->vd->server),
29fa4ed9 1725 VNC_ENCODING_POINTER_TYPE_CHANGE);
bd023f95 1726 vnc_unlock_output(vs);
28a76be8 1727 vnc_flush(vs);
564c337e
FB
1728 }
1729 vs->absolute = absolute;
1730}
1731
24236869
FB
1732static void pointer_event(VncState *vs, int button_mask, int x, int y)
1733{
7fb1cf16 1734 static uint32_t bmap[INPUT_BUTTON__MAX] = {
14768eba
GH
1735 [INPUT_BUTTON_LEFT] = 0x01,
1736 [INPUT_BUTTON_MIDDLE] = 0x02,
1737 [INPUT_BUTTON_RIGHT] = 0x04,
f22d0af0
GH
1738 [INPUT_BUTTON_WHEEL_UP] = 0x08,
1739 [INPUT_BUTTON_WHEEL_DOWN] = 0x10,
14768eba
GH
1740 };
1741 QemuConsole *con = vs->vd->dcl.con;
bea60dd7
PL
1742 int width = pixman_image_get_width(vs->vd->server);
1743 int height = pixman_image_get_height(vs->vd->server);
24236869 1744
14768eba
GH
1745 if (vs->last_bmask != button_mask) {
1746 qemu_input_update_buttons(con, bmap, vs->last_bmask, button_mask);
1747 vs->last_bmask = button_mask;
1748 }
564c337e
FB
1749
1750 if (vs->absolute) {
9cfa7ab9
PV
1751 qemu_input_queue_abs(con, INPUT_AXIS_X, x, 0, width);
1752 qemu_input_queue_abs(con, INPUT_AXIS_Y, y, 0, height);
29fa4ed9 1753 } else if (vnc_has_feature(vs, VNC_FEATURE_POINTER_TYPE_CHANGE)) {
14768eba
GH
1754 qemu_input_queue_rel(con, INPUT_AXIS_X, x - 0x7FFF);
1755 qemu_input_queue_rel(con, INPUT_AXIS_Y, y - 0x7FFF);
564c337e 1756 } else {
14768eba
GH
1757 if (vs->last_x != -1) {
1758 qemu_input_queue_rel(con, INPUT_AXIS_X, x - vs->last_x);
1759 qemu_input_queue_rel(con, INPUT_AXIS_Y, y - vs->last_y);
1760 }
28a76be8
AL
1761 vs->last_x = x;
1762 vs->last_y = y;
24236869 1763 }
14768eba 1764 qemu_input_event_sync();
24236869
FB
1765}
1766
c2f2ba49 1767static void press_key(VncState *vs, QKeyCode qcode)
64f5a135 1768{
c2f2ba49
GH
1769 qkbd_state_key_event(vs->vd->kbd, qcode, true);
1770 qkbd_state_key_event(vs->vd->kbd, qcode, false);
a528b80c
AZ
1771}
1772
ab99e5c1
LL
1773static void vnc_led_state_change(VncState *vs)
1774{
ab99e5c1
LL
1775 if (!vnc_has_feature(vs, VNC_FEATURE_LED_STATE)) {
1776 return;
1777 }
1778
ab99e5c1
LL
1779 vnc_lock_output(vs);
1780 vnc_write_u8(vs, VNC_MSG_SERVER_FRAMEBUFFER_UPDATE);
1781 vnc_write_u8(vs, 0);
1782 vnc_write_u16(vs, 1);
1783 vnc_framebuffer_update(vs, 0, 0, 1, 1, VNC_ENCODING_LED_STATE);
a54f0d2b 1784 vnc_write_u8(vs, vs->vd->ledstate);
ab99e5c1
LL
1785 vnc_unlock_output(vs);
1786 vnc_flush(vs);
1787}
1788
7ffb82ca
GH
1789static void kbd_leds(void *opaque, int ledstate)
1790{
a54f0d2b
PO
1791 VncDisplay *vd = opaque;
1792 VncState *client;
7ffb82ca 1793
40066175
GH
1794 trace_vnc_key_guest_leds((ledstate & QEMU_CAPS_LOCK_LED),
1795 (ledstate & QEMU_NUM_LOCK_LED),
1796 (ledstate & QEMU_SCROLL_LOCK_LED));
1797
a54f0d2b
PO
1798 if (ledstate == vd->ledstate) {
1799 return;
96f3d174 1800 }
ab99e5c1 1801
a54f0d2b
PO
1802 vd->ledstate = ledstate;
1803
1804 QTAILQ_FOREACH(client, &vd->clients, next) {
1805 vnc_led_state_change(client);
ab99e5c1 1806 }
7ffb82ca
GH
1807}
1808
9ca313aa 1809static void do_key_event(VncState *vs, int down, int keycode, int sym)
24236869 1810{
c2f2ba49
GH
1811 QKeyCode qcode = qemu_input_key_number_to_qcode(keycode);
1812
64f5a135 1813 /* QEMU console switch */
c2f2ba49
GH
1814 switch (qcode) {
1815 case Q_KEY_CODE_1 ... Q_KEY_CODE_9: /* '1' to '9' keys */
1816 if (vs->vd->dcl.con == NULL && down &&
1817 qkbd_state_modifier_get(vs->vd->kbd, QKBD_MOD_CTRL) &&
1818 qkbd_state_modifier_get(vs->vd->kbd, QKBD_MOD_ALT)) {
64f5a135 1819 /* Reset the modifiers sent to the current console */
c2f2ba49
GH
1820 qkbd_state_lift_all_keys(vs->vd->kbd);
1821 console_select(qcode - Q_KEY_CODE_1);
64f5a135
FB
1822 return;
1823 }
c2f2ba49 1824 default:
a528b80c
AZ
1825 break;
1826 }
1827
e7b2aacc
LL
1828 /* Turn off the lock state sync logic if the client support the led
1829 state extension.
1830 */
9892088b 1831 if (down && vs->vd->lock_key_sync &&
e7b2aacc 1832 !vnc_has_feature(vs, VNC_FEATURE_LED_STATE) &&
3a0558b5 1833 keycode_is_keypad(vs->vd->kbd_layout, keycode)) {
a528b80c
AZ
1834 /* If the numlock state needs to change then simulate an additional
1835 keypress before sending this one. This will happen if the user
1836 toggles numlock away from the VNC window.
1837 */
753b4053 1838 if (keysym_is_numlock(vs->vd->kbd_layout, sym & 0xFFFF)) {
c2f2ba49 1839 if (!qkbd_state_modifier_get(vs->vd->kbd, QKBD_MOD_NUMLOCK)) {
40066175 1840 trace_vnc_key_sync_numlock(true);
c2f2ba49 1841 press_key(vs, Q_KEY_CODE_NUM_LOCK);
a528b80c
AZ
1842 }
1843 } else {
c2f2ba49 1844 if (qkbd_state_modifier_get(vs->vd->kbd, QKBD_MOD_NUMLOCK)) {
40066175 1845 trace_vnc_key_sync_numlock(false);
c2f2ba49 1846 press_key(vs, Q_KEY_CODE_NUM_LOCK);
a528b80c
AZ
1847 }
1848 }
64f5a135 1849 }
24236869 1850
9892088b 1851 if (down && vs->vd->lock_key_sync &&
e7b2aacc 1852 !vnc_has_feature(vs, VNC_FEATURE_LED_STATE) &&
3a0558b5 1853 ((sym >= 'A' && sym <= 'Z') || (sym >= 'a' && sym <= 'z'))) {
6b132502
GH
1854 /* If the capslock state needs to change then simulate an additional
1855 keypress before sending this one. This will happen if the user
1856 toggles capslock away from the VNC window.
1857 */
1858 int uppercase = !!(sym >= 'A' && sym <= 'Z');
c2f2ba49
GH
1859 bool shift = qkbd_state_modifier_get(vs->vd->kbd, QKBD_MOD_SHIFT);
1860 bool capslock = qkbd_state_modifier_get(vs->vd->kbd, QKBD_MOD_CAPSLOCK);
6b132502
GH
1861 if (capslock) {
1862 if (uppercase == shift) {
40066175 1863 trace_vnc_key_sync_capslock(false);
c2f2ba49 1864 press_key(vs, Q_KEY_CODE_CAPS_LOCK);
6b132502
GH
1865 }
1866 } else {
1867 if (uppercase != shift) {
40066175 1868 trace_vnc_key_sync_capslock(true);
c2f2ba49 1869 press_key(vs, Q_KEY_CODE_CAPS_LOCK);
6b132502
GH
1870 }
1871 }
1872 }
1873
c2f2ba49
GH
1874 qkbd_state_key_event(vs->vd->kbd, qcode, down);
1875 if (!qemu_console_is_graphic(NULL)) {
1876 bool numlock = qkbd_state_modifier_get(vs->vd->kbd, QKBD_MOD_NUMLOCK);
1877 bool control = qkbd_state_modifier_get(vs->vd->kbd, QKBD_MOD_CTRL);
64f5a135
FB
1878 /* QEMU console emulation */
1879 if (down) {
1880 switch (keycode) {
1881 case 0x2a: /* Left Shift */
1882 case 0x36: /* Right Shift */
1883 case 0x1d: /* Left CTRL */
1884 case 0x9d: /* Right CTRL */
1885 case 0x38: /* Left ALT */
1886 case 0xb8: /* Right ALT */
1887 break;
1888 case 0xc8:
1889 kbd_put_keysym(QEMU_KEY_UP);
1890 break;
1891 case 0xd0:
1892 kbd_put_keysym(QEMU_KEY_DOWN);
1893 break;
1894 case 0xcb:
1895 kbd_put_keysym(QEMU_KEY_LEFT);
1896 break;
1897 case 0xcd:
1898 kbd_put_keysym(QEMU_KEY_RIGHT);
1899 break;
1900 case 0xd3:
1901 kbd_put_keysym(QEMU_KEY_DELETE);
1902 break;
1903 case 0xc7:
1904 kbd_put_keysym(QEMU_KEY_HOME);
1905 break;
1906 case 0xcf:
1907 kbd_put_keysym(QEMU_KEY_END);
1908 break;
1909 case 0xc9:
1910 kbd_put_keysym(QEMU_KEY_PAGEUP);
1911 break;
1912 case 0xd1:
1913 kbd_put_keysym(QEMU_KEY_PAGEDOWN);
1914 break;
bb0a18e1
GH
1915
1916 case 0x47:
1917 kbd_put_keysym(numlock ? '7' : QEMU_KEY_HOME);
1918 break;
1919 case 0x48:
1920 kbd_put_keysym(numlock ? '8' : QEMU_KEY_UP);
1921 break;
1922 case 0x49:
1923 kbd_put_keysym(numlock ? '9' : QEMU_KEY_PAGEUP);
1924 break;
1925 case 0x4b:
1926 kbd_put_keysym(numlock ? '4' : QEMU_KEY_LEFT);
1927 break;
1928 case 0x4c:
1929 kbd_put_keysym('5');
1930 break;
1931 case 0x4d:
1932 kbd_put_keysym(numlock ? '6' : QEMU_KEY_RIGHT);
1933 break;
1934 case 0x4f:
1935 kbd_put_keysym(numlock ? '1' : QEMU_KEY_END);
1936 break;
1937 case 0x50:
1938 kbd_put_keysym(numlock ? '2' : QEMU_KEY_DOWN);
1939 break;
1940 case 0x51:
1941 kbd_put_keysym(numlock ? '3' : QEMU_KEY_PAGEDOWN);
1942 break;
1943 case 0x52:
1944 kbd_put_keysym('0');
1945 break;
1946 case 0x53:
1947 kbd_put_keysym(numlock ? '.' : QEMU_KEY_DELETE);
1948 break;
1949
1950 case 0xb5:
1951 kbd_put_keysym('/');
1952 break;
1953 case 0x37:
1954 kbd_put_keysym('*');
1955 break;
1956 case 0x4a:
1957 kbd_put_keysym('-');
1958 break;
1959 case 0x4e:
1960 kbd_put_keysym('+');
1961 break;
1962 case 0x9c:
1963 kbd_put_keysym('\n');
1964 break;
1965
64f5a135 1966 default:
e26437c2
GH
1967 if (control) {
1968 kbd_put_keysym(sym & 0x1f);
1969 } else {
1970 kbd_put_keysym(sym);
1971 }
64f5a135
FB
1972 break;
1973 }
1974 }
1975 }
24236869
FB
1976}
1977
40066175
GH
1978static const char *code2name(int keycode)
1979{
977c736f 1980 return QKeyCode_str(qemu_input_key_number_to_qcode(keycode));
40066175
GH
1981}
1982
bdbd7676
FB
1983static void key_event(VncState *vs, int down, uint32_t sym)
1984{
9ca313aa 1985 int keycode;
4a93fe17 1986 int lsym = sym;
9ca313aa 1987
81c0d5a6 1988 if (lsym >= 'A' && lsym <= 'Z' && qemu_console_is_graphic(NULL)) {
4a93fe17
GH
1989 lsym = lsym - 'A' + 'a';
1990 }
9ca313aa 1991
abb4f2c9 1992 keycode = keysym2scancode(vs->vd->kbd_layout, lsym & 0xFFFF,
19c1b9fd 1993 vs->vd->kbd, down) & SCANCODE_KEYMASK;
40066175 1994 trace_vnc_key_event_map(down, sym, keycode, code2name(keycode));
9ca313aa
AL
1995 do_key_event(vs, down, keycode, sym);
1996}
1997
1998static void ext_key_event(VncState *vs, int down,
1999 uint32_t sym, uint16_t keycode)
2000{
2001 /* if the user specifies a keyboard layout, always use it */
40066175 2002 if (keyboard_layout) {
9ca313aa 2003 key_event(vs, down, sym);
40066175
GH
2004 } else {
2005 trace_vnc_key_event_ext(down, sym, keycode, code2name(keycode));
9ca313aa 2006 do_key_event(vs, down, keycode, sym);
40066175 2007 }
bdbd7676
FB
2008}
2009
24236869 2010static void framebuffer_update_request(VncState *vs, int incremental,
bea60dd7 2011 int x, int y, int w, int h)
24236869 2012{
bea60dd7 2013 if (incremental) {
fef1bbad
DB
2014 if (vs->update != VNC_STATE_UPDATE_FORCE) {
2015 vs->update = VNC_STATE_UPDATE_INCREMENTAL;
2016 }
2017 } else {
2018 vs->update = VNC_STATE_UPDATE_FORCE;
2019 vnc_set_area_dirty(vs->dirty, vs->vd, x, y, w, h);
24236869
FB
2020 }
2021}
2022
9ca313aa
AL
2023static void send_ext_key_event_ack(VncState *vs)
2024{
bd023f95 2025 vnc_lock_output(vs);
46a183da 2026 vnc_write_u8(vs, VNC_MSG_SERVER_FRAMEBUFFER_UPDATE);
9ca313aa
AL
2027 vnc_write_u8(vs, 0);
2028 vnc_write_u16(vs, 1);
d39fa6d8 2029 vnc_framebuffer_update(vs, 0, 0,
bea60dd7
PL
2030 pixman_image_get_width(vs->vd->server),
2031 pixman_image_get_height(vs->vd->server),
29fa4ed9 2032 VNC_ENCODING_EXT_KEY_EVENT);
bd023f95 2033 vnc_unlock_output(vs);
9ca313aa
AL
2034 vnc_flush(vs);
2035}
2036
429a8ed3 2037static void send_ext_audio_ack(VncState *vs)
2038{
bd023f95 2039 vnc_lock_output(vs);
46a183da 2040 vnc_write_u8(vs, VNC_MSG_SERVER_FRAMEBUFFER_UPDATE);
429a8ed3 2041 vnc_write_u8(vs, 0);
2042 vnc_write_u16(vs, 1);
d39fa6d8 2043 vnc_framebuffer_update(vs, 0, 0,
bea60dd7
PL
2044 pixman_image_get_width(vs->vd->server),
2045 pixman_image_get_height(vs->vd->server),
29fa4ed9 2046 VNC_ENCODING_AUDIO);
bd023f95 2047 vnc_unlock_output(vs);
429a8ed3 2048 vnc_flush(vs);
2049}
2050
24236869
FB
2051static void set_encodings(VncState *vs, int32_t *encodings, size_t n_encodings)
2052{
2053 int i;
29fa4ed9 2054 unsigned int enc = 0;
24236869 2055
29fa4ed9 2056 vs->features = 0;
a9f20d31 2057 vs->vnc_encoding = 0;
d1af0e05
CC
2058 vs->tight.compression = 9;
2059 vs->tight.quality = -1; /* Lossless by default */
564c337e 2060 vs->absolute = -1;
24236869 2061
8a0f0d0c
CC
2062 /*
2063 * Start from the end because the encodings are sent in order of preference.
e5bed759 2064 * This way the preferred encoding (first encoding defined in the array)
8a0f0d0c
CC
2065 * will be set at the end of the loop.
2066 */
24236869 2067 for (i = n_encodings - 1; i >= 0; i--) {
29fa4ed9
AL
2068 enc = encodings[i];
2069 switch (enc) {
2070 case VNC_ENCODING_RAW:
a9f20d31 2071 vs->vnc_encoding = enc;
29fa4ed9
AL
2072 break;
2073 case VNC_ENCODING_COPYRECT:
753b4053 2074 vs->features |= VNC_FEATURE_COPYRECT_MASK;
29fa4ed9
AL
2075 break;
2076 case VNC_ENCODING_HEXTILE:
2077 vs->features |= VNC_FEATURE_HEXTILE_MASK;
a9f20d31 2078 vs->vnc_encoding = enc;
29fa4ed9 2079 break;
380282b0
CC
2080 case VNC_ENCODING_TIGHT:
2081 vs->features |= VNC_FEATURE_TIGHT_MASK;
2082 vs->vnc_encoding = enc;
2083 break;
fe3e7f2d 2084#ifdef CONFIG_VNC_PNG
efe556ad
CC
2085 case VNC_ENCODING_TIGHT_PNG:
2086 vs->features |= VNC_FEATURE_TIGHT_PNG_MASK;
2087 vs->vnc_encoding = enc;
2088 break;
fe3e7f2d 2089#endif
059cef40
AL
2090 case VNC_ENCODING_ZLIB:
2091 vs->features |= VNC_FEATURE_ZLIB_MASK;
a9f20d31 2092 vs->vnc_encoding = enc;
059cef40 2093 break;
148954fa
CC
2094 case VNC_ENCODING_ZRLE:
2095 vs->features |= VNC_FEATURE_ZRLE_MASK;
2096 vs->vnc_encoding = enc;
2097 break;
2098 case VNC_ENCODING_ZYWRLE:
2099 vs->features |= VNC_FEATURE_ZYWRLE_MASK;
2100 vs->vnc_encoding = enc;
2101 break;
29fa4ed9
AL
2102 case VNC_ENCODING_DESKTOPRESIZE:
2103 vs->features |= VNC_FEATURE_RESIZE_MASK;
2104 break;
2105 case VNC_ENCODING_POINTER_TYPE_CHANGE:
2106 vs->features |= VNC_FEATURE_POINTER_TYPE_CHANGE_MASK;
2107 break;
d467b679
GH
2108 case VNC_ENCODING_RICH_CURSOR:
2109 vs->features |= VNC_FEATURE_RICH_CURSOR_MASK;
91ec41dc
FZ
2110 if (vs->vd->cursor) {
2111 vnc_cursor_define(vs);
2112 }
d467b679 2113 break;
29fa4ed9 2114 case VNC_ENCODING_EXT_KEY_EVENT:
9ca313aa
AL
2115 send_ext_key_event_ack(vs);
2116 break;
29fa4ed9 2117 case VNC_ENCODING_AUDIO:
429a8ed3 2118 send_ext_audio_ack(vs);
2119 break;
29fa4ed9
AL
2120 case VNC_ENCODING_WMVi:
2121 vs->features |= VNC_FEATURE_WMVI_MASK;
ca4cca4d 2122 break;
ab99e5c1
LL
2123 case VNC_ENCODING_LED_STATE:
2124 vs->features |= VNC_FEATURE_LED_STATE_MASK;
2125 break;
fb437313 2126 case VNC_ENCODING_COMPRESSLEVEL0 ... VNC_ENCODING_COMPRESSLEVEL0 + 9:
d1af0e05 2127 vs->tight.compression = (enc & 0x0F);
fb437313
AL
2128 break;
2129 case VNC_ENCODING_QUALITYLEVEL0 ... VNC_ENCODING_QUALITYLEVEL0 + 9:
b31f519e
CC
2130 if (vs->vd->lossy) {
2131 vs->tight.quality = (enc & 0x0F);
2132 }
fb437313 2133 break;
29fa4ed9
AL
2134 default:
2135 VNC_DEBUG("Unknown encoding: %d (0x%.8x): %d\n", i, enc, enc);
2136 break;
2137 }
24236869 2138 }
6356e472 2139 vnc_desktop_resize(vs);
9e8dd451 2140 check_pointer_type_change(&vs->mouse_mode_notifier, NULL);
ab99e5c1 2141 vnc_led_state_change(vs);
24236869
FB
2142}
2143
6cec5487
AL
2144static void set_pixel_conversion(VncState *vs)
2145{
9f64916d
GH
2146 pixman_format_code_t fmt = qemu_pixman_get_format(&vs->client_pf);
2147
2148 if (fmt == VNC_SERVER_FB_FORMAT) {
6cec5487 2149 vs->write_pixels = vnc_write_pixels_copy;
70a4568f 2150 vnc_hextile_set_pixel_conversion(vs, 0);
6cec5487
AL
2151 } else {
2152 vs->write_pixels = vnc_write_pixels_generic;
70a4568f 2153 vnc_hextile_set_pixel_conversion(vs, 1);
6cec5487
AL
2154 }
2155}
2156
0c426e45
AG
2157static void send_color_map(VncState *vs)
2158{
2159 int i;
2160
2161 vnc_write_u8(vs, VNC_MSG_SERVER_SET_COLOUR_MAP_ENTRIES);
2162 vnc_write_u8(vs, 0); /* padding */
2163 vnc_write_u16(vs, 0); /* first color */
2164 vnc_write_u16(vs, 256); /* # of colors */
2165
2166 for (i = 0; i < 256; i++) {
2167 PixelFormat *pf = &vs->client_pf;
2168
2169 vnc_write_u16(vs, (((i >> pf->rshift) & pf->rmax) << (16 - pf->rbits)));
2170 vnc_write_u16(vs, (((i >> pf->gshift) & pf->gmax) << (16 - pf->gbits)));
2171 vnc_write_u16(vs, (((i >> pf->bshift) & pf->bmax) << (16 - pf->bbits)));
2172 }
2173}
2174
ec9fb41a 2175static void set_pixel_format(VncState *vs, int bits_per_pixel,
28a76be8
AL
2176 int big_endian_flag, int true_color_flag,
2177 int red_max, int green_max, int blue_max,
2178 int red_shift, int green_shift, int blue_shift)
24236869 2179{
3512779a 2180 if (!true_color_flag) {
0c426e45
AG
2181 /* Expose a reasonable default 256 color map */
2182 bits_per_pixel = 8;
0c426e45
AG
2183 red_max = 7;
2184 green_max = 7;
2185 blue_max = 3;
2186 red_shift = 0;
2187 green_shift = 3;
2188 blue_shift = 6;
3512779a 2189 }
24236869 2190
e6908bfe
PM
2191 switch (bits_per_pixel) {
2192 case 8:
2193 case 16:
2194 case 32:
2195 break;
2196 default:
2197 vnc_client_error(vs);
2198 return;
2199 }
2200
4c65fed8 2201 vs->client_pf.rmax = red_max ? red_max : 0xFF;
7c9209e7 2202 vs->client_pf.rbits = ctpopl(red_max);
9f64916d
GH
2203 vs->client_pf.rshift = red_shift;
2204 vs->client_pf.rmask = red_max << red_shift;
4c65fed8 2205 vs->client_pf.gmax = green_max ? green_max : 0xFF;
7c9209e7 2206 vs->client_pf.gbits = ctpopl(green_max);
9f64916d
GH
2207 vs->client_pf.gshift = green_shift;
2208 vs->client_pf.gmask = green_max << green_shift;
4c65fed8 2209 vs->client_pf.bmax = blue_max ? blue_max : 0xFF;
7c9209e7 2210 vs->client_pf.bbits = ctpopl(blue_max);
9f64916d
GH
2211 vs->client_pf.bshift = blue_shift;
2212 vs->client_pf.bmask = blue_max << blue_shift;
2213 vs->client_pf.bits_per_pixel = bits_per_pixel;
2214 vs->client_pf.bytes_per_pixel = bits_per_pixel / 8;
2215 vs->client_pf.depth = bits_per_pixel == 32 ? 24 : bits_per_pixel;
2216 vs->client_be = big_endian_flag;
6cec5487 2217
0c426e45
AG
2218 if (!true_color_flag) {
2219 send_color_map(vs);
2220 }
2221
6cec5487 2222 set_pixel_conversion(vs);
24236869 2223
1d0d59fe
GH
2224 graphic_hw_invalidate(vs->vd->dcl.con);
2225 graphic_hw_update(vs->vd->dcl.con);
24236869
FB
2226}
2227
ca4cca4d
AL
2228static void pixel_format_message (VncState *vs) {
2229 char pad[3] = { 0, 0, 0 };
2230
9f64916d
GH
2231 vs->client_pf = qemu_default_pixelformat(32);
2232
2233 vnc_write_u8(vs, vs->client_pf.bits_per_pixel); /* bits-per-pixel */
2234 vnc_write_u8(vs, vs->client_pf.depth); /* depth */
ca4cca4d 2235
e2542fe2 2236#ifdef HOST_WORDS_BIGENDIAN
ca4cca4d
AL
2237 vnc_write_u8(vs, 1); /* big-endian-flag */
2238#else
2239 vnc_write_u8(vs, 0); /* big-endian-flag */
2240#endif
2241 vnc_write_u8(vs, 1); /* true-color-flag */
9f64916d
GH
2242 vnc_write_u16(vs, vs->client_pf.rmax); /* red-max */
2243 vnc_write_u16(vs, vs->client_pf.gmax); /* green-max */
2244 vnc_write_u16(vs, vs->client_pf.bmax); /* blue-max */
2245 vnc_write_u8(vs, vs->client_pf.rshift); /* red-shift */
2246 vnc_write_u8(vs, vs->client_pf.gshift); /* green-shift */
2247 vnc_write_u8(vs, vs->client_pf.bshift); /* blue-shift */
2248 vnc_write(vs, pad, 3); /* padding */
70a4568f
CC
2249
2250 vnc_hextile_set_pixel_conversion(vs, 0);
ca4cca4d 2251 vs->write_pixels = vnc_write_pixels_copy;
ca4cca4d
AL
2252}
2253
753b4053 2254static void vnc_colordepth(VncState *vs)
7eac3a87 2255{
753b4053 2256 if (vnc_has_feature(vs, VNC_FEATURE_WMVI)) {
ca4cca4d 2257 /* Sending a WMVi message to notify the client*/
bd023f95 2258 vnc_lock_output(vs);
46a183da 2259 vnc_write_u8(vs, VNC_MSG_SERVER_FRAMEBUFFER_UPDATE);
ca4cca4d
AL
2260 vnc_write_u8(vs, 0);
2261 vnc_write_u16(vs, 1); /* number of rects */
d39fa6d8 2262 vnc_framebuffer_update(vs, 0, 0,
bea60dd7
PL
2263 pixman_image_get_width(vs->vd->server),
2264 pixman_image_get_height(vs->vd->server),
d39fa6d8 2265 VNC_ENCODING_WMVi);
ca4cca4d 2266 pixel_format_message(vs);
bd023f95 2267 vnc_unlock_output(vs);
ca4cca4d 2268 vnc_flush(vs);
7eac3a87 2269 } else {
6cec5487 2270 set_pixel_conversion(vs);
7eac3a87
AL
2271 }
2272}
2273
60fe76f3 2274static int protocol_client_msg(VncState *vs, uint8_t *data, size_t len)
24236869
FB
2275{
2276 int i;
2277 uint16_t limit;
cf070658 2278 uint32_t freq;
2430ffe4
SS
2279 VncDisplay *vd = vs->vd;
2280
2281 if (data[0] > 3) {
0f7b2864 2282 update_displaychangelistener(&vd->dcl, VNC_REFRESH_INTERVAL_BASE);
2430ffe4 2283 }
24236869
FB
2284
2285 switch (data[0]) {
46a183da 2286 case VNC_MSG_CLIENT_SET_PIXEL_FORMAT:
28a76be8
AL
2287 if (len == 1)
2288 return 20;
2289
ec9fb41a 2290 set_pixel_format(vs, read_u8(data, 4),
28a76be8
AL
2291 read_u8(data, 6), read_u8(data, 7),
2292 read_u16(data, 8), read_u16(data, 10),
2293 read_u16(data, 12), read_u8(data, 14),
2294 read_u8(data, 15), read_u8(data, 16));
2295 break;
46a183da 2296 case VNC_MSG_CLIENT_SET_ENCODINGS:
28a76be8
AL
2297 if (len == 1)
2298 return 4;
24236869 2299
28a76be8 2300 if (len == 4) {
69dd5c9f
AL
2301 limit = read_u16(data, 2);
2302 if (limit > 0)
2303 return 4 + (limit * 4);
2304 } else
2305 limit = read_u16(data, 2);
24236869 2306
28a76be8
AL
2307 for (i = 0; i < limit; i++) {
2308 int32_t val = read_s32(data, 4 + (i * 4));
2309 memcpy(data + 4 + (i * 4), &val, sizeof(val));
2310 }
24236869 2311
28a76be8
AL
2312 set_encodings(vs, (int32_t *)(data + 4), limit);
2313 break;
46a183da 2314 case VNC_MSG_CLIENT_FRAMEBUFFER_UPDATE_REQUEST:
28a76be8
AL
2315 if (len == 1)
2316 return 10;
24236869 2317
28a76be8
AL
2318 framebuffer_update_request(vs,
2319 read_u8(data, 1), read_u16(data, 2), read_u16(data, 4),
2320 read_u16(data, 6), read_u16(data, 8));
2321 break;
46a183da 2322 case VNC_MSG_CLIENT_KEY_EVENT:
28a76be8
AL
2323 if (len == 1)
2324 return 8;
24236869 2325
28a76be8
AL
2326 key_event(vs, read_u8(data, 1), read_u32(data, 4));
2327 break;
46a183da 2328 case VNC_MSG_CLIENT_POINTER_EVENT:
28a76be8
AL
2329 if (len == 1)
2330 return 6;
24236869 2331
28a76be8
AL
2332 pointer_event(vs, read_u8(data, 1), read_u16(data, 2), read_u16(data, 4));
2333 break;
46a183da 2334 case VNC_MSG_CLIENT_CUT_TEXT:
f9a70e79 2335 if (len == 1) {
28a76be8 2336 return 8;
f9a70e79 2337 }
28a76be8 2338 if (len == 8) {
baa7666c 2339 uint32_t dlen = read_u32(data, 4);
f9a70e79
PL
2340 if (dlen > (1 << 20)) {
2341 error_report("vnc: client_cut_text msg payload has %u bytes"
2342 " which exceeds our limit of 1MB.", dlen);
2343 vnc_client_error(vs);
2344 break;
2345 }
2346 if (dlen > 0) {
baa7666c 2347 return 8 + dlen;
f9a70e79 2348 }
baa7666c 2349 }
24236869 2350
28a76be8
AL
2351 client_cut_text(vs, read_u32(data, 4), data + 8);
2352 break;
46a183da 2353 case VNC_MSG_CLIENT_QEMU:
9ca313aa
AL
2354 if (len == 1)
2355 return 2;
2356
2357 switch (read_u8(data, 1)) {
46a183da 2358 case VNC_MSG_CLIENT_QEMU_EXT_KEY_EVENT:
9ca313aa
AL
2359 if (len == 2)
2360 return 12;
2361
2362 ext_key_event(vs, read_u16(data, 2),
2363 read_u32(data, 4), read_u32(data, 8));
2364 break;
46a183da 2365 case VNC_MSG_CLIENT_QEMU_AUDIO:
429a8ed3 2366 if (len == 2)
2367 return 4;
2368
2369 switch (read_u16 (data, 2)) {
46a183da 2370 case VNC_MSG_CLIENT_QEMU_AUDIO_ENABLE:
429a8ed3 2371 audio_add(vs);
2372 break;
46a183da 2373 case VNC_MSG_CLIENT_QEMU_AUDIO_DISABLE:
429a8ed3 2374 audio_del(vs);
2375 break;
46a183da 2376 case VNC_MSG_CLIENT_QEMU_AUDIO_SET_FORMAT:
429a8ed3 2377 if (len == 4)
2378 return 10;
2379 switch (read_u8(data, 4)) {
85bc5852
KZ
2380 case 0: vs->as.fmt = AUDIO_FORMAT_U8; break;
2381 case 1: vs->as.fmt = AUDIO_FORMAT_S8; break;
2382 case 2: vs->as.fmt = AUDIO_FORMAT_U16; break;
2383 case 3: vs->as.fmt = AUDIO_FORMAT_S16; break;
2384 case 4: vs->as.fmt = AUDIO_FORMAT_U32; break;
2385 case 5: vs->as.fmt = AUDIO_FORMAT_S32; break;
429a8ed3 2386 default:
153130cd 2387 VNC_DEBUG("Invalid audio format %d\n", read_u8(data, 4));
429a8ed3 2388 vnc_client_error(vs);
2389 break;
2390 }
2391 vs->as.nchannels = read_u8(data, 5);
2392 if (vs->as.nchannels != 1 && vs->as.nchannels != 2) {
090fdc83 2393 VNC_DEBUG("Invalid audio channel count %d\n",
153130cd 2394 read_u8(data, 5));
429a8ed3 2395 vnc_client_error(vs);
2396 break;
2397 }
cf070658
DB
2398 freq = read_u32(data, 6);
2399 /* No official limit for protocol, but 48khz is a sensible
2400 * upper bound for trustworthy clients, and this limit
2401 * protects calculations involving 'vs->as.freq' later.
2402 */
2403 if (freq > 48000) {
2404 VNC_DEBUG("Invalid audio frequency %u > 48000", freq);
2405 vnc_client_error(vs);
2406 break;
2407 }
2408 vs->as.freq = freq;
429a8ed3 2409 break;
2410 default:
153130cd 2411 VNC_DEBUG("Invalid audio message %d\n", read_u8(data, 4));
429a8ed3 2412 vnc_client_error(vs);
2413 break;
2414 }
2415 break;
2416
9ca313aa 2417 default:
153130cd 2418 VNC_DEBUG("Msg: %d\n", read_u16(data, 0));
9ca313aa
AL
2419 vnc_client_error(vs);
2420 break;
2421 }
2422 break;
24236869 2423 default:
153130cd 2424 VNC_DEBUG("Msg: %d\n", data[0]);
28a76be8
AL
2425 vnc_client_error(vs);
2426 break;
24236869 2427 }
5fafdf24 2428
e2b72cb6 2429 vnc_update_throttle_offset(vs);
24236869
FB
2430 vnc_read_when(vs, protocol_client_msg, 1);
2431 return 0;
2432}
2433
60fe76f3 2434static int protocol_client_init(VncState *vs, uint8_t *data, size_t len)
24236869 2435{
c35734b2 2436 char buf[1024];
8cf36489 2437 VncShareMode mode;
c35734b2 2438 int size;
24236869 2439
8cf36489
GH
2440 mode = data[0] ? VNC_SHARE_MODE_SHARED : VNC_SHARE_MODE_EXCLUSIVE;
2441 switch (vs->vd->share_policy) {
2442 case VNC_SHARE_POLICY_IGNORE:
2443 /*
2444 * Ignore the shared flag. Nothing to do here.
2445 *
2446 * Doesn't conform to the rfb spec but is traditional qemu
2447 * behavior, thus left here as option for compatibility
2448 * reasons.
2449 */
2450 break;
2451 case VNC_SHARE_POLICY_ALLOW_EXCLUSIVE:
2452 /*
2453 * Policy: Allow clients ask for exclusive access.
2454 *
2455 * Implementation: When a client asks for exclusive access,
2456 * disconnect all others. Shared connects are allowed as long
2457 * as no exclusive connection exists.
2458 *
2459 * This is how the rfb spec suggests to handle the shared flag.
2460 */
2461 if (mode == VNC_SHARE_MODE_EXCLUSIVE) {
2462 VncState *client;
2463 QTAILQ_FOREACH(client, &vs->vd->clients, next) {
2464 if (vs == client) {
2465 continue;
2466 }
2467 if (client->share_mode != VNC_SHARE_MODE_EXCLUSIVE &&
2468 client->share_mode != VNC_SHARE_MODE_SHARED) {
2469 continue;
2470 }
2471 vnc_disconnect_start(client);
2472 }
2473 }
2474 if (mode == VNC_SHARE_MODE_SHARED) {
2475 if (vs->vd->num_exclusive > 0) {
2476 vnc_disconnect_start(vs);
2477 return 0;
2478 }
2479 }
2480 break;
2481 case VNC_SHARE_POLICY_FORCE_SHARED:
2482 /*
2483 * Policy: Shared connects only.
2484 * Implementation: Disallow clients asking for exclusive access.
2485 *
2486 * Useful for shared desktop sessions where you don't want
2487 * someone forgetting to say -shared when running the vnc
2488 * client disconnect everybody else.
2489 */
2490 if (mode == VNC_SHARE_MODE_EXCLUSIVE) {
2491 vnc_disconnect_start(vs);
2492 return 0;
2493 }
2494 break;
2495 }
2496 vnc_set_share_mode(vs, mode);
2497
e5f34cdd
GH
2498 if (vs->vd->num_shared > vs->vd->connections_limit) {
2499 vnc_disconnect_start(vs);
2500 return 0;
2501 }
2502
4c956bd8
DB
2503 assert(pixman_image_get_width(vs->vd->server) < 65536 &&
2504 pixman_image_get_width(vs->vd->server) >= 0);
2505 assert(pixman_image_get_height(vs->vd->server) < 65536 &&
2506 pixman_image_get_height(vs->vd->server) >= 0);
bea60dd7
PL
2507 vs->client_width = pixman_image_get_width(vs->vd->server);
2508 vs->client_height = pixman_image_get_height(vs->vd->server);
5862d195
GH
2509 vnc_write_u16(vs, vs->client_width);
2510 vnc_write_u16(vs, vs->client_height);
24236869 2511
ca4cca4d 2512 pixel_format_message(vs);
24236869 2513
97efe4f9 2514 if (qemu_name) {
c35734b2 2515 size = snprintf(buf, sizeof(buf), "QEMU (%s)", qemu_name);
97efe4f9
TH
2516 if (size > sizeof(buf)) {
2517 size = sizeof(buf);
2518 }
2519 } else {
c35734b2 2520 size = snprintf(buf, sizeof(buf), "QEMU");
97efe4f9 2521 }
c35734b2
TS
2522
2523 vnc_write_u32(vs, size);
2524 vnc_write(vs, buf, size);
24236869
FB
2525 vnc_flush(vs);
2526
4a80dba3 2527 vnc_client_cache_auth(vs);
fb6ba0d5 2528 vnc_qmp_event(vs, QAPI_EVENT_VNC_INITIALIZED);
4a80dba3 2529
24236869
FB
2530 vnc_read_when(vs, protocol_client_msg, 1);
2531
2532 return 0;
2533}
2534
5fb6c7a8
AL
2535void start_client_init(VncState *vs)
2536{
2537 vnc_read_when(vs, protocol_client_init, 1);
2538}
2539
4347e638
RH
2540static void authentication_failed(VncState *vs)
2541{
2542 vnc_write_u32(vs, 1); /* Reject auth */
2543 if (vs->minor >= 8) {
2544 static const char err[] = "Authentication failed";
2545 vnc_write_u32(vs, sizeof(err));
2546 vnc_write(vs, err, sizeof(err));
2547 }
2548 vnc_flush(vs);
2549 vnc_client_error(vs);
2550}
2551
60fe76f3 2552static int protocol_client_auth_vnc(VncState *vs, uint8_t *data, size_t len)
70848515 2553{
60fe76f3 2554 unsigned char response[VNC_AUTH_CHALLENGE_SIZE];
800567a6 2555 size_t i, pwlen;
60fe76f3 2556 unsigned char key[8];
3c9405a0 2557 time_t now = time(NULL);
60928458 2558 QCryptoCipher *cipher = NULL;
800567a6 2559 Error *err = NULL;
70848515 2560
1cd20f8b 2561 if (!vs->vd->password) {
7364dbda 2562 trace_vnc_auth_fail(vs, vs->auth, "password is not set", "");
6bffdf0f 2563 goto reject;
70848515 2564 }
3c9405a0 2565 if (vs->vd->expires < now) {
7364dbda 2566 trace_vnc_auth_fail(vs, vs->auth, "password is expired", "");
3c9405a0
GH
2567 goto reject;
2568 }
70848515
TS
2569
2570 memcpy(response, vs->challenge, VNC_AUTH_CHALLENGE_SIZE);
2571
2572 /* Calculate the expected challenge response */
753b4053 2573 pwlen = strlen(vs->vd->password);
70848515 2574 for (i=0; i<sizeof(key); i++)
753b4053 2575 key[i] = i<pwlen ? vs->vd->password[i] : 0;
800567a6
DB
2576
2577 cipher = qcrypto_cipher_new(
2578 QCRYPTO_CIPHER_ALG_DES_RFB,
2579 QCRYPTO_CIPHER_MODE_ECB,
2580 key, G_N_ELEMENTS(key),
2581 &err);
2582 if (!cipher) {
7364dbda
DB
2583 trace_vnc_auth_fail(vs, vs->auth, "cannot create cipher",
2584 error_get_pretty(err));
800567a6
DB
2585 error_free(err);
2586 goto reject;
2587 }
2588
a1695137 2589 if (qcrypto_cipher_encrypt(cipher,
800567a6
DB
2590 vs->challenge,
2591 response,
2592 VNC_AUTH_CHALLENGE_SIZE,
2593 &err) < 0) {
7364dbda
DB
2594 trace_vnc_auth_fail(vs, vs->auth, "cannot encrypt challenge response",
2595 error_get_pretty(err));
800567a6
DB
2596 error_free(err);
2597 goto reject;
2598 }
70848515
TS
2599
2600 /* Compare expected vs actual challenge response */
2601 if (memcmp(response, data, VNC_AUTH_CHALLENGE_SIZE) != 0) {
7364dbda 2602 trace_vnc_auth_fail(vs, vs->auth, "mis-matched challenge response", "");
6bffdf0f 2603 goto reject;
70848515 2604 } else {
7364dbda 2605 trace_vnc_auth_pass(vs, vs->auth);
28a76be8
AL
2606 vnc_write_u32(vs, 0); /* Accept auth */
2607 vnc_flush(vs);
70848515 2608
5fb6c7a8 2609 start_client_init(vs);
70848515 2610 }
60928458
GA
2611
2612 qcrypto_cipher_free(cipher);
70848515 2613 return 0;
6bffdf0f
GH
2614
2615reject:
4347e638 2616 authentication_failed(vs);
60928458 2617 qcrypto_cipher_free(cipher);
6bffdf0f 2618 return 0;
70848515
TS
2619}
2620
5fb6c7a8 2621void start_auth_vnc(VncState *vs)
70848515 2622{
f7b2502c
RH
2623 Error *err = NULL;
2624
2625 if (qcrypto_random_bytes(vs->challenge, sizeof(vs->challenge), &err)) {
2626 trace_vnc_auth_fail(vs, vs->auth, "cannot get random bytes",
2627 error_get_pretty(err));
2628 error_free(err);
2629 authentication_failed(vs);
2630 return;
2631 }
2632
70848515
TS
2633 /* Send client a 'random' challenge */
2634 vnc_write(vs, vs->challenge, sizeof(vs->challenge));
2635 vnc_flush(vs);
2636
2637 vnc_read_when(vs, protocol_client_auth_vnc, sizeof(vs->challenge));
469b15c6
TS
2638}
2639
2640
60fe76f3 2641static int protocol_client_auth(VncState *vs, uint8_t *data, size_t len)
70848515
TS
2642{
2643 /* We only advertise 1 auth scheme at a time, so client
2644 * must pick the one we sent. Verify this */
7e7e2ebc 2645 if (data[0] != vs->auth) { /* Reject auth */
7364dbda 2646 trace_vnc_auth_reject(vs, vs->auth, (int)data[0]);
4347e638 2647 authentication_failed(vs);
70848515 2648 } else { /* Accept requested auth */
7364dbda 2649 trace_vnc_auth_start(vs, vs->auth);
7e7e2ebc 2650 switch (vs->auth) {
70848515 2651 case VNC_AUTH_NONE:
a26c97ad
AZ
2652 if (vs->minor >= 8) {
2653 vnc_write_u32(vs, 0); /* Accept auth completion */
2654 vnc_flush(vs);
2655 }
7364dbda 2656 trace_vnc_auth_pass(vs, vs->auth);
5fb6c7a8 2657 start_client_init(vs);
70848515
TS
2658 break;
2659
2660 case VNC_AUTH_VNC:
5fb6c7a8
AL
2661 start_auth_vnc(vs);
2662 break;
70848515 2663
8d5d2d4c 2664 case VNC_AUTH_VENCRYPT:
5fb6c7a8
AL
2665 start_auth_vencrypt(vs);
2666 break;
8d5d2d4c 2667
2f9606b3
AL
2668#ifdef CONFIG_VNC_SASL
2669 case VNC_AUTH_SASL:
2f9606b3
AL
2670 start_auth_sasl(vs);
2671 break;
2672#endif /* CONFIG_VNC_SASL */
2673
70848515 2674 default: /* Should not be possible, but just in case */
7364dbda 2675 trace_vnc_auth_fail(vs, vs->auth, "Unhandled auth method", "");
4347e638 2676 authentication_failed(vs);
70848515
TS
2677 }
2678 }
2679 return 0;
2680}
2681
60fe76f3 2682static int protocol_version(VncState *vs, uint8_t *version, size_t len)
24236869
FB
2683{
2684 char local[13];
24236869
FB
2685
2686 memcpy(local, version, 12);
2687 local[12] = 0;
2688
70848515 2689 if (sscanf(local, "RFB %03d.%03d\n", &vs->major, &vs->minor) != 2) {
28a76be8
AL
2690 VNC_DEBUG("Malformed protocol version %s\n", local);
2691 vnc_client_error(vs);
2692 return 0;
24236869 2693 }
70848515
TS
2694 VNC_DEBUG("Client request protocol version %d.%d\n", vs->major, vs->minor);
2695 if (vs->major != 3 ||
28a76be8
AL
2696 (vs->minor != 3 &&
2697 vs->minor != 4 &&
2698 vs->minor != 5 &&
2699 vs->minor != 7 &&
2700 vs->minor != 8)) {
2701 VNC_DEBUG("Unsupported client version\n");
2702 vnc_write_u32(vs, VNC_AUTH_INVALID);
2703 vnc_flush(vs);
2704 vnc_client_error(vs);
2705 return 0;
70848515 2706 }
b0566f4f 2707 /* Some broken clients report v3.4 or v3.5, which spec requires to be treated
70848515
TS
2708 * as equivalent to v3.3 by servers
2709 */
b0566f4f 2710 if (vs->minor == 4 || vs->minor == 5)
28a76be8 2711 vs->minor = 3;
70848515
TS
2712
2713 if (vs->minor == 3) {
7364dbda 2714 trace_vnc_auth_start(vs, vs->auth);
7e7e2ebc 2715 if (vs->auth == VNC_AUTH_NONE) {
7e7e2ebc 2716 vnc_write_u32(vs, vs->auth);
70848515 2717 vnc_flush(vs);
7364dbda 2718 trace_vnc_auth_pass(vs, vs->auth);
28a76be8 2719 start_client_init(vs);
7e7e2ebc 2720 } else if (vs->auth == VNC_AUTH_VNC) {
70848515 2721 VNC_DEBUG("Tell client VNC auth\n");
7e7e2ebc 2722 vnc_write_u32(vs, vs->auth);
70848515
TS
2723 vnc_flush(vs);
2724 start_auth_vnc(vs);
2725 } else {
7364dbda
DB
2726 trace_vnc_auth_fail(vs, vs->auth,
2727 "Unsupported auth method for v3.3", "");
70848515
TS
2728 vnc_write_u32(vs, VNC_AUTH_INVALID);
2729 vnc_flush(vs);
2730 vnc_client_error(vs);
2731 }
2732 } else {
28a76be8 2733 vnc_write_u8(vs, 1); /* num auth */
7e7e2ebc 2734 vnc_write_u8(vs, vs->auth);
28a76be8
AL
2735 vnc_read_when(vs, protocol_client_auth, 1);
2736 vnc_flush(vs);
70848515 2737 }
24236869
FB
2738
2739 return 0;
2740}
2741
999342a0
CC
2742static VncRectStat *vnc_stat_rect(VncDisplay *vd, int x, int y)
2743{
2744 struct VncSurface *vs = &vd->guest;
2745
2746 return &vs->stats[y / VNC_STAT_RECT][x / VNC_STAT_RECT];
2747}
2748
7d964c9d
CC
2749void vnc_sent_lossy_rect(VncState *vs, int x, int y, int w, int h)
2750{
2751 int i, j;
2752
2753 w = (x + w) / VNC_STAT_RECT;
2754 h = (y + h) / VNC_STAT_RECT;
2755 x /= VNC_STAT_RECT;
2756 y /= VNC_STAT_RECT;
2757
207f328a
CC
2758 for (j = y; j <= h; j++) {
2759 for (i = x; i <= w; i++) {
7d964c9d
CC
2760 vs->lossy_rect[j][i] = 1;
2761 }
2762 }
2763}
2764
2765static int vnc_refresh_lossy_rect(VncDisplay *vd, int x, int y)
2766{
2767 VncState *vs;
2768 int sty = y / VNC_STAT_RECT;
2769 int stx = x / VNC_STAT_RECT;
2770 int has_dirty = 0;
2771
5a3804db
MAL
2772 y = QEMU_ALIGN_DOWN(y, VNC_STAT_RECT);
2773 x = QEMU_ALIGN_DOWN(x, VNC_STAT_RECT);
7d964c9d
CC
2774
2775 QTAILQ_FOREACH(vs, &vd->clients, next) {
bc2429b9 2776 int j;
7d964c9d
CC
2777
2778 /* kernel send buffers are full -> refresh later */
2779 if (vs->output.offset) {
2780 continue;
2781 }
2782
2783 if (!vs->lossy_rect[sty][stx]) {
2784 continue;
2785 }
207f328a 2786
7d964c9d
CC
2787 vs->lossy_rect[sty][stx] = 0;
2788 for (j = 0; j < VNC_STAT_RECT; ++j) {
b4c85ddc
PL
2789 bitmap_set(vs->dirty[y + j],
2790 x / VNC_DIRTY_PIXELS_PER_BIT,
2791 VNC_STAT_RECT / VNC_DIRTY_PIXELS_PER_BIT);
7d964c9d
CC
2792 }
2793 has_dirty++;
2794 }
207f328a 2795
7d964c9d
CC
2796 return has_dirty;
2797}
2798
2799static int vnc_update_stats(VncDisplay *vd, struct timeval * tv)
999342a0 2800{
eebe0b79
GH
2801 int width = MIN(pixman_image_get_width(vd->guest.fb),
2802 pixman_image_get_width(vd->server));
2803 int height = MIN(pixman_image_get_height(vd->guest.fb),
2804 pixman_image_get_height(vd->server));
999342a0
CC
2805 int x, y;
2806 struct timeval res;
7d964c9d 2807 int has_dirty = 0;
999342a0 2808
9f64916d
GH
2809 for (y = 0; y < height; y += VNC_STAT_RECT) {
2810 for (x = 0; x < width; x += VNC_STAT_RECT) {
999342a0
CC
2811 VncRectStat *rect = vnc_stat_rect(vd, x, y);
2812
2813 rect->updated = false;
2814 }
2815 }
2816
ad620c29 2817 qemu_timersub(tv, &VNC_REFRESH_STATS, &res);
999342a0
CC
2818
2819 if (timercmp(&vd->guest.last_freq_check, &res, >)) {
7d964c9d 2820 return has_dirty;
999342a0
CC
2821 }
2822 vd->guest.last_freq_check = *tv;
2823
9f64916d
GH
2824 for (y = 0; y < height; y += VNC_STAT_RECT) {
2825 for (x = 0; x < width; x += VNC_STAT_RECT) {
999342a0
CC
2826 VncRectStat *rect= vnc_stat_rect(vd, x, y);
2827 int count = ARRAY_SIZE(rect->times);
2828 struct timeval min, max;
2829
2830 if (!timerisset(&rect->times[count - 1])) {
2831 continue ;
2832 }
2833
2834 max = rect->times[(rect->idx + count - 1) % count];
ad620c29 2835 qemu_timersub(tv, &max, &res);
999342a0
CC
2836
2837 if (timercmp(&res, &VNC_REFRESH_LOSSY, >)) {
2838 rect->freq = 0;
7d964c9d 2839 has_dirty += vnc_refresh_lossy_rect(vd, x, y);
999342a0
CC
2840 memset(rect->times, 0, sizeof (rect->times));
2841 continue ;
2842 }
2843
2844 min = rect->times[rect->idx];
2845 max = rect->times[(rect->idx + count - 1) % count];
ad620c29 2846 qemu_timersub(&max, &min, &res);
999342a0
CC
2847
2848 rect->freq = res.tv_sec + res.tv_usec / 1000000.;
2849 rect->freq /= count;
2850 rect->freq = 1. / rect->freq;
2851 }
2852 }
7d964c9d 2853 return has_dirty;
999342a0
CC
2854}
2855
2856double vnc_update_freq(VncState *vs, int x, int y, int w, int h)
2857{
2858 int i, j;
2859 double total = 0;
2860 int num = 0;
2861
5a3804db
MAL
2862 x = QEMU_ALIGN_DOWN(x, VNC_STAT_RECT);
2863 y = QEMU_ALIGN_DOWN(y, VNC_STAT_RECT);
999342a0
CC
2864
2865 for (j = y; j <= y + h; j += VNC_STAT_RECT) {
2866 for (i = x; i <= x + w; i += VNC_STAT_RECT) {
2867 total += vnc_stat_rect(vs->vd, i, j)->freq;
2868 num++;
2869 }
2870 }
2871
2872 if (num) {
2873 return total / num;
2874 } else {
2875 return 0;
2876 }
2877}
2878
2879static void vnc_rect_updated(VncDisplay *vd, int x, int y, struct timeval * tv)
2880{
2881 VncRectStat *rect;
2882
2883 rect = vnc_stat_rect(vd, x, y);
2884 if (rect->updated) {
2885 return ;
2886 }
2887 rect->times[rect->idx] = *tv;
2888 rect->idx = (rect->idx + 1) % ARRAY_SIZE(rect->times);
2889 rect->updated = true;
2890}
2891
1fc62412
SS
2892static int vnc_refresh_server_surface(VncDisplay *vd)
2893{
bea60dd7
PL
2894 int width = MIN(pixman_image_get_width(vd->guest.fb),
2895 pixman_image_get_width(vd->server));
2896 int height = MIN(pixman_image_get_height(vd->guest.fb),
2897 pixman_image_get_height(vd->server));
eb8934b0 2898 int cmp_bytes, server_stride, line_bytes, guest_ll, guest_stride, y = 0;
12b316d4 2899 uint8_t *guest_row0 = NULL, *server_row0;
41b4bef6 2900 VncState *vs;
1fc62412 2901 int has_dirty = 0;
9f64916d 2902 pixman_image_t *tmpbuf = NULL;
1fc62412 2903
80e0c8c3 2904 struct timeval tv = { 0, 0 };
999342a0 2905
80e0c8c3
CC
2906 if (!vd->non_adaptive) {
2907 gettimeofday(&tv, NULL);
2908 has_dirty = vnc_update_stats(vd, &tv);
2909 }
999342a0 2910
1fc62412
SS
2911 /*
2912 * Walk through the guest dirty map.
2913 * Check and copy modified bits from guest to server surface.
2914 * Update server dirty map.
2915 */
bea60dd7 2916 server_row0 = (uint8_t *)pixman_image_get_data(vd->server);
eb8934b0
GH
2917 server_stride = guest_stride = guest_ll =
2918 pixman_image_get_stride(vd->server);
bea60dd7
PL
2919 cmp_bytes = MIN(VNC_DIRTY_PIXELS_PER_BIT * VNC_SERVER_FB_BYTES,
2920 server_stride);
9f64916d
GH
2921 if (vd->guest.format != VNC_SERVER_FB_FORMAT) {
2922 int width = pixman_image_get_width(vd->server);
2923 tmpbuf = qemu_pixman_linebuf_create(VNC_SERVER_FB_FORMAT, width);
12b316d4 2924 } else {
eb8934b0
GH
2925 int guest_bpp =
2926 PIXMAN_FORMAT_BPP(pixman_image_get_format(vd->guest.fb));
12b316d4
PL
2927 guest_row0 = (uint8_t *)pixman_image_get_data(vd->guest.fb);
2928 guest_stride = pixman_image_get_stride(vd->guest.fb);
949ed4c2
PMD
2929 guest_ll = pixman_image_get_width(vd->guest.fb)
2930 * DIV_ROUND_UP(guest_bpp, 8);
12b316d4 2931 }
eb8934b0 2932 line_bytes = MIN(server_stride, guest_ll);
12b316d4 2933
12b316d4
PL
2934 for (;;) {
2935 int x;
2936 uint8_t *guest_ptr, *server_ptr;
2937 unsigned long offset = find_next_bit((unsigned long *) &vd->guest.dirty,
2938 height * VNC_DIRTY_BPL(&vd->guest),
2939 y * VNC_DIRTY_BPL(&vd->guest));
2940 if (offset == height * VNC_DIRTY_BPL(&vd->guest)) {
2941 /* no more dirty bits */
2942 break;
2943 }
2944 y = offset / VNC_DIRTY_BPL(&vd->guest);
2945 x = offset % VNC_DIRTY_BPL(&vd->guest);
1fc62412 2946
12b316d4
PL
2947 server_ptr = server_row0 + y * server_stride + x * cmp_bytes;
2948
2949 if (vd->guest.format != VNC_SERVER_FB_FORMAT) {
2950 qemu_pixman_linebuf_fill(tmpbuf, vd->guest.fb, width, 0, y);
2951 guest_ptr = (uint8_t *)pixman_image_get_data(tmpbuf);
2952 } else {
2953 guest_ptr = guest_row0 + y * guest_stride;
2954 }
2955 guest_ptr += x * cmp_bytes;
2956
2957 for (; x < DIV_ROUND_UP(width, VNC_DIRTY_PIXELS_PER_BIT);
2958 x++, guest_ptr += cmp_bytes, server_ptr += cmp_bytes) {
bea60dd7 2959 int _cmp_bytes = cmp_bytes;
12b316d4
PL
2960 if (!test_and_clear_bit(x, vd->guest.dirty[y])) {
2961 continue;
2962 }
eb8934b0
GH
2963 if ((x + 1) * cmp_bytes > line_bytes) {
2964 _cmp_bytes = line_bytes - x * cmp_bytes;
bea60dd7 2965 }
eb8934b0 2966 assert(_cmp_bytes >= 0);
bea60dd7 2967 if (memcmp(server_ptr, guest_ptr, _cmp_bytes) == 0) {
12b316d4
PL
2968 continue;
2969 }
bea60dd7 2970 memcpy(server_ptr, guest_ptr, _cmp_bytes);
12b316d4
PL
2971 if (!vd->non_adaptive) {
2972 vnc_rect_updated(vd, x * VNC_DIRTY_PIXELS_PER_BIT,
2973 y, &tv);
1fc62412 2974 }
12b316d4
PL
2975 QTAILQ_FOREACH(vs, &vd->clients, next) {
2976 set_bit(x, vs->dirty[y]);
2977 }
2978 has_dirty++;
1fc62412 2979 }
12b316d4
PL
2980
2981 y++;
1fc62412 2982 }
9f64916d 2983 qemu_pixman_image_unref(tmpbuf);
1fc62412
SS
2984 return has_dirty;
2985}
2986
0f7b2864 2987static void vnc_refresh(DisplayChangeListener *dcl)
703bc68f 2988{
0f7b2864 2989 VncDisplay *vd = container_of(dcl, VncDisplay, dcl);
41b4bef6
AS
2990 VncState *vs, *vn;
2991 int has_dirty, rects = 0;
703bc68f 2992
9d6b2070
C
2993 if (QTAILQ_EMPTY(&vd->clients)) {
2994 update_displaychangelistener(&vd->dcl, VNC_REFRESH_INTERVAL_MAX);
2995 return;
2996 }
2997
1d0d59fe 2998 graphic_hw_update(vd->dcl.con);
703bc68f 2999
bd023f95 3000 if (vnc_trylock_display(vd)) {
0f7b2864 3001 update_displaychangelistener(&vd->dcl, VNC_REFRESH_INTERVAL_BASE);
bd023f95
CC
3002 return;
3003 }
3004
1fc62412 3005 has_dirty = vnc_refresh_server_surface(vd);
bd023f95 3006 vnc_unlock_display(vd);
1fc62412 3007
41b4bef6 3008 QTAILQ_FOREACH_SAFE(vs, &vd->clients, next, vn) {
6af998db 3009 rects += vnc_update_client(vs, has_dirty);
6185c578 3010 /* vs might be free()ed here */
703bc68f 3011 }
bd023f95 3012
2430ffe4 3013 if (has_dirty && rects) {
0f7b2864
GH
3014 vd->dcl.update_interval /= 2;
3015 if (vd->dcl.update_interval < VNC_REFRESH_INTERVAL_BASE) {
3016 vd->dcl.update_interval = VNC_REFRESH_INTERVAL_BASE;
3017 }
2430ffe4 3018 } else {
0f7b2864
GH
3019 vd->dcl.update_interval += VNC_REFRESH_INTERVAL_INC;
3020 if (vd->dcl.update_interval > VNC_REFRESH_INTERVAL_MAX) {
3021 vd->dcl.update_interval = VNC_REFRESH_INTERVAL_MAX;
3022 }
703bc68f
SS
3023 }
3024}
3025
04d2529d 3026static void vnc_connect(VncDisplay *vd, QIOChannelSocket *sioc,
2c8cf549 3027 bool skipauth, bool websocket)
3aa3eea3 3028{
fedf0d35 3029 VncState *vs = g_new0(VncState, 1);
90cd03a3 3030 bool first_client = QTAILQ_EMPTY(&vd->clients);
7d964c9d
CC
3031 int i;
3032
ad6374c4 3033 trace_vnc_client_connect(vs, sioc);
f31f9c10 3034 vs->magic = VNC_MAGIC;
04d2529d
DB
3035 vs->sioc = sioc;
3036 object_ref(OBJECT(vs->sioc));
3037 vs->ioc = QIO_CHANNEL(sioc);
3038 object_ref(OBJECT(vs->ioc));
d616ccc5 3039 vs->vd = vd;
7e7e2ebc 3040
04d2529d
DB
3041 buffer_init(&vs->input, "vnc-input/%p", sioc);
3042 buffer_init(&vs->output, "vnc-output/%p", sioc);
04d2529d 3043 buffer_init(&vs->jobs_buffer, "vnc-jobs_buffer/%p", sioc);
543b9580 3044
04d2529d
DB
3045 buffer_init(&vs->tight.tight, "vnc-tight/%p", sioc);
3046 buffer_init(&vs->tight.zlib, "vnc-tight-zlib/%p", sioc);
3047 buffer_init(&vs->tight.gradient, "vnc-tight-gradient/%p", sioc);
543b9580 3048#ifdef CONFIG_VNC_JPEG
04d2529d 3049 buffer_init(&vs->tight.jpeg, "vnc-tight-jpeg/%p", sioc);
543b9580
GH
3050#endif
3051#ifdef CONFIG_VNC_PNG
04d2529d 3052 buffer_init(&vs->tight.png, "vnc-tight-png/%p", sioc);
543b9580 3053#endif
04d2529d
DB
3054 buffer_init(&vs->zlib.zlib, "vnc-zlib/%p", sioc);
3055 buffer_init(&vs->zrle.zrle, "vnc-zrle/%p", sioc);
3056 buffer_init(&vs->zrle.fb, "vnc-zrle-fb/%p", sioc);
3057 buffer_init(&vs->zrle.zlib, "vnc-zrle-zlib/%p", sioc);
543b9580 3058
7e7e2ebc 3059 if (skipauth) {
7d37435b
PB
3060 vs->auth = VNC_AUTH_NONE;
3061 vs->subauth = VNC_AUTH_INVALID;
7e7e2ebc 3062 } else {
f9148c8a
DB
3063 if (websocket) {
3064 vs->auth = vd->ws_auth;
3065 vs->subauth = VNC_AUTH_INVALID;
3066 } else {
3067 vs->auth = vd->auth;
3068 vs->subauth = vd->subauth;
3069 }
7e7e2ebc 3070 }
04d2529d
DB
3071 VNC_DEBUG("Client sioc=%p ws=%d auth=%d subauth=%d\n",
3072 sioc, websocket, vs->auth, vs->subauth);
7e7e2ebc 3073
7267c094 3074 vs->lossy_rect = g_malloc0(VNC_STAT_ROWS * sizeof (*vs->lossy_rect));
7d964c9d 3075 for (i = 0; i < VNC_STAT_ROWS; ++i) {
fedf0d35 3076 vs->lossy_rect[i] = g_new0(uint8_t, VNC_STAT_COLS);
7d964c9d 3077 }
753b4053 3078
04d2529d 3079 VNC_DEBUG("New client on socket %p\n", vs->sioc);
0f7b2864 3080 update_displaychangelistener(&vd->dcl, VNC_REFRESH_INTERVAL_BASE);
04d2529d 3081 qio_channel_set_blocking(vs->ioc, false, NULL);
a75d6f07
BC
3082 if (vs->ioc_tag) {
3083 g_source_remove(vs->ioc_tag);
3084 }
7536ee4b
TH
3085 if (websocket) {
3086 vs->websocket = 1;
38e5756a 3087 if (vd->tlscreds) {
04d2529d
DB
3088 vs->ioc_tag = qio_channel_add_watch(
3089 vs->ioc, G_IO_IN, vncws_tls_handshake_io, vs, NULL);
3e305e4a 3090 } else {
04d2529d
DB
3091 vs->ioc_tag = qio_channel_add_watch(
3092 vs->ioc, G_IO_IN, vncws_handshake_io, vs, NULL);
0057a0d5 3093 }
04d2529d
DB
3094 } else {
3095 vs->ioc_tag = qio_channel_add_watch(
3096 vs->ioc, G_IO_IN, vnc_client_io, vs, NULL);
7536ee4b 3097 }
753b4053 3098
4a80dba3 3099 vnc_client_cache_addr(vs);
fb6ba0d5 3100 vnc_qmp_event(vs, QAPI_EVENT_VNC_CONNECTED);
8cf36489 3101 vnc_set_share_mode(vs, VNC_SHARE_MODE_CONNECTING);
4a80dba3 3102
753b4053
AL
3103 vs->last_x = -1;
3104 vs->last_y = -1;
3105
3106 vs->as.freq = 44100;
3107 vs->as.nchannels = 2;
85bc5852 3108 vs->as.fmt = AUDIO_FORMAT_S16;
753b4053
AL
3109 vs->as.endianness = 0;
3110
bd023f95 3111 qemu_mutex_init(&vs->output_mutex);
175b2a6e 3112 vs->bh = qemu_bh_new(vnc_jobs_bh, vs);
bd023f95 3113
e5f34cdd 3114 QTAILQ_INSERT_TAIL(&vd->clients, vs, next);
c7628bff
GH
3115 if (first_client) {
3116 vnc_update_server_surface(vd);
3117 }
1fc62412 3118
1d0d59fe 3119 graphic_hw_update(vd->dcl.con);
1fc62412 3120
90cd03a3 3121 if (!vs->websocket) {
dbee9897 3122 vnc_start_protocol(vs);
90cd03a3
DB
3123 }
3124
3125 if (vd->num_connecting > vd->connections_limit) {
3126 QTAILQ_FOREACH(vs, &vd->clients, next) {
3127 if (vs->share_mode == VNC_SHARE_MODE_CONNECTING) {
3128 vnc_disconnect_start(vs);
3129 return;
3130 }
3131 }
3132 }
3133}
3134
dbee9897 3135void vnc_start_protocol(VncState *vs)
90cd03a3 3136{
3aa3eea3
AZ
3137 vnc_write(vs, "RFB 003.008\n", 12);
3138 vnc_flush(vs);
3139 vnc_read_when(vs, protocol_version, 12);
753b4053 3140
37c34d9d
AL
3141 vs->mouse_mode_notifier.notify = check_pointer_type_change;
3142 qemu_add_mouse_mode_change_notifier(&vs->mouse_mode_notifier);
3aa3eea3
AZ
3143}
3144
13e1d0e7
DB
3145static void vnc_listen_io(QIONetListener *listener,
3146 QIOChannelSocket *cioc,
3147 void *opaque)
24236869 3148{
bf01c179 3149 VncDisplay *vd = opaque;
13e1d0e7 3150 bool isWebsock = listener == vd->wslistener;
7536ee4b 3151
13e1d0e7
DB
3152 qio_channel_set_name(QIO_CHANNEL(cioc),
3153 isWebsock ? "vnc-ws-server" : "vnc-server");
3154 qio_channel_set_delay(QIO_CHANNEL(cioc), false);
3155 vnc_connect(vd, cioc, false, isWebsock);
7536ee4b 3156}
7536ee4b 3157
7c20b4a3 3158static const DisplayChangeListenerOps dcl_ops = {
34da30af
BH
3159 .dpy_name = "vnc",
3160 .dpy_refresh = vnc_refresh,
34da30af
BH
3161 .dpy_gfx_update = vnc_dpy_update,
3162 .dpy_gfx_switch = vnc_dpy_switch,
3163 .dpy_gfx_check_format = qemu_pixman_check_format,
3164 .dpy_mouse_set = vnc_mouse_set,
3165 .dpy_cursor_define = vnc_dpy_cursor_define,
7c20b4a3
GH
3166};
3167
ab4f931e 3168void vnc_display_init(const char *id, Error **errp)
24236869 3169{
bf01c179 3170 VncDisplay *vd;
4db14629
GH
3171
3172 if (vnc_display_find(id) != NULL) {
3173 return;
3174 }
bf01c179 3175 vd = g_malloc0(sizeof(*vd));
24236869 3176
bf01c179
DB
3177 vd->id = strdup(id);
3178 QTAILQ_INSERT_TAIL(&vnc_displays, vd, next);
24236869 3179
bf01c179
DB
3180 QTAILQ_INIT(&vd->clients);
3181 vd->expires = TIME_MAX;
24236869 3182
40066175
GH
3183 if (keyboard_layout) {
3184 trace_vnc_key_map_init(keyboard_layout);
ab4f931e
FL
3185 vd->kbd_layout = init_keyboard_layout(name2keysym,
3186 keyboard_layout, errp);
40066175 3187 } else {
ab4f931e 3188 vd->kbd_layout = init_keyboard_layout(name2keysym, "en-us", errp);
40066175 3189 }
24236869 3190
bf01c179 3191 if (!vd->kbd_layout) {
ab4f931e 3192 return;
bf01c179 3193 }
24236869 3194
bf01c179
DB
3195 vd->share_policy = VNC_SHARE_POLICY_ALLOW_EXCLUSIVE;
3196 vd->connections_limit = 32;
12e29b16 3197
bf01c179 3198 qemu_mutex_init(&vd->mutex);
bd023f95 3199 vnc_start_worker_thread();
bd023f95 3200
bf01c179
DB
3201 vd->dcl.ops = &dcl_ops;
3202 register_displaychangelistener(&vd->dcl);
c2f2ba49 3203 vd->kbd = qkbd_state_init(vd->dcl.con);
71cab5ca
TS
3204}
3205
6f43024c 3206
bf01c179 3207static void vnc_display_close(VncDisplay *vd)
71cab5ca 3208{
bf01c179 3209 if (!vd) {
452b4d88 3210 return;
bf01c179
DB
3211 }
3212 vd->is_unix = false;
13e1d0e7
DB
3213
3214 if (vd->listener) {
3215 qio_net_listener_disconnect(vd->listener);
3216 object_unref(OBJECT(vd->listener));
71cab5ca 3217 }
13e1d0e7 3218 vd->listener = NULL;
4ee74fa7 3219
13e1d0e7
DB
3220 if (vd->wslistener) {
3221 qio_net_listener_disconnect(vd->wslistener);
3222 object_unref(OBJECT(vd->wslistener));
7536ee4b 3223 }
13e1d0e7 3224 vd->wslistener = NULL;
4ee74fa7 3225
bf01c179
DB
3226 vd->auth = VNC_AUTH_INVALID;
3227 vd->subauth = VNC_AUTH_INVALID;
3228 if (vd->tlscreds) {
3229 object_unparent(OBJECT(vd->tlscreds));
3230 vd->tlscreds = NULL;
3e305e4a 3231 }
b76806d4
DB
3232 if (vd->tlsauthz) {
3233 object_unparent(OBJECT(vd->tlsauthz));
3234 vd->tlsauthz = NULL;
3235 }
3236 g_free(vd->tlsauthzid);
3237 vd->tlsauthzid = NULL;
a54f0d2b
PO
3238 if (vd->lock_key_sync) {
3239 qemu_remove_led_event_handler(vd->led);
2dc120be 3240 vd->led = NULL;
a54f0d2b 3241 }
b76806d4
DB
3242#ifdef CONFIG_VNC_SASL
3243 if (vd->sasl.authz) {
3244 object_unparent(OBJECT(vd->sasl.authz));
3245 vd->sasl.authz = NULL;
3246 }
3247 g_free(vd->sasl.authzid);
3248 vd->sasl.authzid = NULL;
3249#endif
70848515
TS
3250}
3251
14f7143e 3252int vnc_display_password(const char *id, const char *password)
70848515 3253{
bf01c179 3254 VncDisplay *vd = vnc_display_find(id);
70848515 3255
bf01c179 3256 if (!vd) {
a6aa9d3e 3257 return -EINVAL;
7ef92331 3258 }
bf01c179 3259 if (vd->auth == VNC_AUTH_NONE) {
cf864569 3260 error_printf_unless_qmp("If you want use passwords please enable "
7ea7d36e 3261 "password auth using '-vnc ${dpy},password'.\n");
cf864569 3262 return -EINVAL;
1cd20f8b
AL
3263 }
3264
bf01c179
DB
3265 g_free(vd->password);
3266 vd->password = g_strdup(password);
a6aa9d3e
LC
3267
3268 return 0;
71cab5ca
TS
3269}
3270
14f7143e 3271int vnc_display_pw_expire(const char *id, time_t expires)
3c9405a0 3272{
bf01c179 3273 VncDisplay *vd = vnc_display_find(id);
3c9405a0 3274
bf01c179 3275 if (!vd) {
1643f2b2
GH
3276 return -EINVAL;
3277 }
3278
bf01c179 3279 vd->expires = expires;
3c9405a0
GH
3280 return 0;
3281}
3282
bf01c179 3283static void vnc_display_print_local_addr(VncDisplay *vd)
f92f8afe 3284{
bd269ebc 3285 SocketAddress *addr;
04d2529d 3286 Error *err = NULL;
d616ccc5 3287
13e1d0e7 3288 if (!vd->listener || !vd->listener->nsioc) {
4ee74fa7
DB
3289 return;
3290 }
3291
13e1d0e7 3292 addr = qio_channel_socket_get_local_address(vd->listener->sioc[0], &err);
04d2529d 3293 if (!addr) {
33df7bf3 3294 return;
04d2529d
DB
3295 }
3296
bd269ebc
MA
3297 if (addr->type != SOCKET_ADDRESS_TYPE_INET) {
3298 qapi_free_SocketAddress(addr);
33df7bf3 3299 return;
04d2529d 3300 }
33df7bf3 3301 error_printf_unless_qmp("VNC server running on %s:%s\n",
bd269ebc
MA
3302 addr->u.inet.host,
3303 addr->u.inet.port);
3304 qapi_free_SocketAddress(addr);
f92f8afe
AL
3305}
3306
4db14629
GH
3307static QemuOptsList qemu_vnc_opts = {
3308 .name = "vnc",
3309 .head = QTAILQ_HEAD_INITIALIZER(qemu_vnc_opts.head),
3310 .implied_opt_name = "vnc",
3311 .desc = {
3312 {
3313 .name = "vnc",
3314 .type = QEMU_OPT_STRING,
3315 },{
3316 .name = "websocket",
3317 .type = QEMU_OPT_STRING,
3318 },{
3e305e4a
DB
3319 .name = "tls-creds",
3320 .type = QEMU_OPT_STRING,
4db14629
GH
3321 },{
3322 .name = "share",
3323 .type = QEMU_OPT_STRING,
1d0d59fe
GH
3324 },{
3325 .name = "display",
3326 .type = QEMU_OPT_STRING,
3327 },{
3328 .name = "head",
3329 .type = QEMU_OPT_NUMBER,
e5f34cdd
GH
3330 },{
3331 .name = "connections",
3332 .type = QEMU_OPT_NUMBER,
88428b7a
GA
3333 },{
3334 .name = "to",
3335 .type = QEMU_OPT_NUMBER,
3336 },{
3337 .name = "ipv4",
3338 .type = QEMU_OPT_BOOL,
3339 },{
3340 .name = "ipv6",
3341 .type = QEMU_OPT_BOOL,
4db14629
GH
3342 },{
3343 .name = "password",
3344 .type = QEMU_OPT_BOOL,
3345 },{
3346 .name = "reverse",
3347 .type = QEMU_OPT_BOOL,
3348 },{
3349 .name = "lock-key-sync",
3350 .type = QEMU_OPT_BOOL,
c5ce8333
GH
3351 },{
3352 .name = "key-delay-ms",
3353 .type = QEMU_OPT_NUMBER,
4db14629
GH
3354 },{
3355 .name = "sasl",
3356 .type = QEMU_OPT_BOOL,
4db14629
GH
3357 },{
3358 .name = "acl",
3359 .type = QEMU_OPT_BOOL,
55cf09a0
DB
3360 },{
3361 .name = "tls-authz",
3362 .type = QEMU_OPT_STRING,
3363 },{
3364 .name = "sasl-authz",
3365 .type = QEMU_OPT_STRING,
4db14629
GH
3366 },{
3367 .name = "lossy",
3368 .type = QEMU_OPT_BOOL,
3369 },{
3370 .name = "non-adaptive",
3371 .type = QEMU_OPT_BOOL,
3372 },
3373 { /* end of list */ }
3374 },
3375};
3376
0dd72e15 3377
3e305e4a 3378static int
eda24e18
DB
3379vnc_display_setup_auth(int *auth,
3380 int *subauth,
3381 QCryptoTLSCreds *tlscreds,
0dd72e15
DB
3382 bool password,
3383 bool sasl,
3e305e4a
DB
3384 bool websocket,
3385 Error **errp)
0dd72e15
DB
3386{
3387 /*
3388 * We have a choice of 3 authentication options
3389 *
3390 * 1. none
3391 * 2. vnc
3392 * 3. sasl
3393 *
3394 * The channel can be run in 2 modes
3395 *
3396 * 1. clear
3397 * 2. tls
3398 *
3399 * And TLS can use 2 types of credentials
3400 *
3401 * 1. anon
3402 * 2. x509
3403 *
3404 * We thus have 9 possible logical combinations
3405 *
3406 * 1. clear + none
3407 * 2. clear + vnc
3408 * 3. clear + sasl
3409 * 4. tls + anon + none
3410 * 5. tls + anon + vnc
3411 * 6. tls + anon + sasl
3412 * 7. tls + x509 + none
3413 * 8. tls + x509 + vnc
3414 * 9. tls + x509 + sasl
3415 *
3416 * These need to be mapped into the VNC auth schemes
3417 * in an appropriate manner. In regular VNC, all the
3418 * TLS options get mapped into VNC_AUTH_VENCRYPT
3419 * sub-auth types.
f9148c8a
DB
3420 *
3421 * In websockets, the https:// protocol already provides
3422 * TLS support, so there is no need to make use of the
3423 * VeNCrypt extension. Furthermore, websockets browser
3424 * clients could not use VeNCrypt even if they wanted to,
3425 * as they cannot control when the TLS handshake takes
3426 * place. Thus there is no option but to rely on https://,
3427 * meaning combinations 4->6 and 7->9 will be mapped to
3428 * VNC auth schemes in the same way as combos 1->3.
3429 *
3430 * Regardless of fact that we have a different mapping to
3431 * VNC auth mechs for plain VNC vs websockets VNC, the end
3432 * result has the same security characteristics.
0dd72e15 3433 */
eda24e18
DB
3434 if (websocket || !tlscreds) {
3435 if (password) {
0dd72e15 3436 VNC_DEBUG("Initializing VNC server with password auth\n");
eda24e18
DB
3437 *auth = VNC_AUTH_VNC;
3438 } else if (sasl) {
3439 VNC_DEBUG("Initializing VNC server with SASL auth\n");
3440 *auth = VNC_AUTH_SASL;
f9148c8a 3441 } else {
eda24e18
DB
3442 VNC_DEBUG("Initializing VNC server with no auth\n");
3443 *auth = VNC_AUTH_NONE;
f9148c8a 3444 }
eda24e18
DB
3445 *subauth = VNC_AUTH_INVALID;
3446 } else {
3447 bool is_x509 = object_dynamic_cast(OBJECT(tlscreds),
3448 TYPE_QCRYPTO_TLS_CREDS_X509) != NULL;
3449 bool is_anon = object_dynamic_cast(OBJECT(tlscreds),
3450 TYPE_QCRYPTO_TLS_CREDS_ANON) != NULL;
3451
3452 if (!is_x509 && !is_anon) {
3453 error_setg(errp,
3454 "Unsupported TLS cred type %s",
3455 object_get_typename(OBJECT(tlscreds)));
3456 return -1;
3457 }
3458 *auth = VNC_AUTH_VENCRYPT;
3459 if (password) {
3460 if (is_x509) {
3461 VNC_DEBUG("Initializing VNC server with x509 password auth\n");
3462 *subauth = VNC_AUTH_VENCRYPT_X509VNC;
3463 } else {
3464 VNC_DEBUG("Initializing VNC server with TLS password auth\n");
3465 *subauth = VNC_AUTH_VENCRYPT_TLSVNC;
3466 }
3467
3468 } else if (sasl) {
3469 if (is_x509) {
0dd72e15 3470 VNC_DEBUG("Initializing VNC server with x509 SASL auth\n");
eda24e18 3471 *subauth = VNC_AUTH_VENCRYPT_X509SASL;
3e305e4a 3472 } else {
eda24e18
DB
3473 VNC_DEBUG("Initializing VNC server with TLS SASL auth\n");
3474 *subauth = VNC_AUTH_VENCRYPT_TLSSASL;
0dd72e15
DB
3475 }
3476 } else {
eda24e18 3477 if (is_x509) {
0dd72e15 3478 VNC_DEBUG("Initializing VNC server with x509 no auth\n");
eda24e18 3479 *subauth = VNC_AUTH_VENCRYPT_X509NONE;
3e305e4a 3480 } else {
eda24e18
DB
3481 VNC_DEBUG("Initializing VNC server with TLS no auth\n");
3482 *subauth = VNC_AUTH_VENCRYPT_TLSNONE;
0dd72e15 3483 }
f9148c8a 3484 }
0dd72e15 3485 }
3e305e4a
DB
3486 return 0;
3487}
3488
3489
275e0d61
DB
3490static int vnc_display_get_address(const char *addrstr,
3491 bool websocket,
e5766eb4 3492 bool reverse,
275e0d61
DB
3493 int displaynum,
3494 int to,
3495 bool has_ipv4,
3496 bool has_ipv6,
3497 bool ipv4,
3498 bool ipv6,
bd269ebc 3499 SocketAddress **retaddr,
275e0d61
DB
3500 Error **errp)
3501{
3502 int ret = -1;
bd269ebc 3503 SocketAddress *addr = NULL;
275e0d61 3504
bd269ebc 3505 addr = g_new0(SocketAddress, 1);
275e0d61
DB
3506
3507 if (strncmp(addrstr, "unix:", 5) == 0) {
bd269ebc
MA
3508 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
3509 addr->u.q_unix.path = g_strdup(addrstr + 5);
275e0d61
DB
3510
3511 if (websocket) {
3512 error_setg(errp, "UNIX sockets not supported with websock");
3513 goto cleanup;
3514 }
3515
3516 if (to) {
3517 error_setg(errp, "Port range not support with UNIX socket");
3518 goto cleanup;
3519 }
3520 ret = 0;
3521 } else {
3522 const char *port;
3523 size_t hostlen;
3524 unsigned long long baseport = 0;
3525 InetSocketAddress *inet;
3526
3527 port = strrchr(addrstr, ':');
3528 if (!port) {
3529 if (websocket) {
3530 hostlen = 0;
3531 port = addrstr;
3532 } else {
3533 error_setg(errp, "no vnc port specified");
3534 goto cleanup;
3535 }
3536 } else {
3537 hostlen = port - addrstr;
3538 port++;
3539 if (*port == '\0') {
3540 error_setg(errp, "vnc port cannot be empty");
3541 goto cleanup;
3542 }
3543 }
3544
bd269ebc
MA
3545 addr->type = SOCKET_ADDRESS_TYPE_INET;
3546 inet = &addr->u.inet;
275e0d61
DB
3547 if (addrstr[0] == '[' && addrstr[hostlen - 1] == ']') {
3548 inet->host = g_strndup(addrstr + 1, hostlen - 2);
3549 } else {
3550 inet->host = g_strndup(addrstr, hostlen);
3551 }
3552 /* plain VNC port is just an offset, for websocket
3553 * port is absolute */
3554 if (websocket) {
3555 if (g_str_equal(addrstr, "") ||
3556 g_str_equal(addrstr, "on")) {
396f935a
DB
3557 if (displaynum == -1) {
3558 error_setg(errp, "explicit websocket port is required");
3559 goto cleanup;
3560 }
275e0d61
DB
3561 inet->port = g_strdup_printf(
3562 "%d", displaynum + 5700);
3563 if (to) {
3564 inet->has_to = true;
3565 inet->to = to + 5700;
3566 }
3567 } else {
3568 inet->port = g_strdup(port);
3569 }
3570 } else {
e5766eb4 3571 int offset = reverse ? 0 : 5900;
275e0d61
DB
3572 if (parse_uint_full(port, &baseport, 10) < 0) {
3573 error_setg(errp, "can't convert to a number: %s", port);
3574 goto cleanup;
3575 }
3576 if (baseport > 65535 ||
e5766eb4 3577 baseport + offset > 65535) {
275e0d61
DB
3578 error_setg(errp, "port %s out of range", port);
3579 goto cleanup;
3580 }
3581 inet->port = g_strdup_printf(
e5766eb4 3582 "%d", (int)baseport + offset);
275e0d61
DB
3583
3584 if (to) {
3585 inet->has_to = true;
e5766eb4 3586 inet->to = to + offset;
275e0d61
DB
3587 }
3588 }
3589
3590 inet->ipv4 = ipv4;
3591 inet->has_ipv4 = has_ipv4;
3592 inet->ipv6 = ipv6;
3593 inet->has_ipv6 = has_ipv6;
3594
3595 ret = baseport;
3596 }
3597
3598 *retaddr = addr;
3599
3600 cleanup:
3601 if (ret < 0) {
bd269ebc 3602 qapi_free_SocketAddress(addr);
275e0d61
DB
3603 }
3604 return ret;
3605}
3606
9f26f325
PMD
3607static void vnc_free_addresses(SocketAddress ***retsaddr,
3608 size_t *retnsaddr)
3609{
3610 size_t i;
3611
3612 for (i = 0; i < *retnsaddr; i++) {
3613 qapi_free_SocketAddress((*retsaddr)[i]);
3614 }
3615 g_free(*retsaddr);
3616
3617 *retsaddr = NULL;
3618 *retnsaddr = 0;
3619}
3620
275e0d61 3621static int vnc_display_get_addresses(QemuOpts *opts,
e5766eb4 3622 bool reverse,
bd269ebc 3623 SocketAddress ***retsaddr,
396f935a 3624 size_t *retnsaddr,
bd269ebc 3625 SocketAddress ***retwsaddr,
396f935a 3626 size_t *retnwsaddr,
275e0d61
DB
3627 Error **errp)
3628{
bd269ebc
MA
3629 SocketAddress *saddr = NULL;
3630 SocketAddress *wsaddr = NULL;
396f935a
DB
3631 QemuOptsIter addriter;
3632 const char *addr;
275e0d61
DB
3633 int to = qemu_opt_get_number(opts, "to", 0);
3634 bool has_ipv4 = qemu_opt_get(opts, "ipv4");
3635 bool has_ipv6 = qemu_opt_get(opts, "ipv6");
3636 bool ipv4 = qemu_opt_get_bool(opts, "ipv4", false);
3637 bool ipv6 = qemu_opt_get_bool(opts, "ipv6", false);
396f935a
DB
3638 int displaynum = -1;
3639 int ret = -1;
275e0d61 3640
396f935a
DB
3641 *retsaddr = NULL;
3642 *retnsaddr = 0;
3643 *retwsaddr = NULL;
3644 *retnwsaddr = 0;
275e0d61 3645
396f935a
DB
3646 addr = qemu_opt_get(opts, "vnc");
3647 if (addr == NULL || g_str_equal(addr, "none")) {
3648 ret = 0;
3649 goto cleanup;
3650 }
3651 if (qemu_opt_get(opts, "websocket") &&
275e0d61
DB
3652 !qcrypto_hash_supports(QCRYPTO_HASH_ALG_SHA1)) {
3653 error_setg(errp,
3654 "SHA1 hash support is required for websockets");
396f935a
DB
3655 goto cleanup;
3656 }
3657
3658 qemu_opt_iter_init(&addriter, opts, "vnc");
3659 while ((addr = qemu_opt_iter_next(&addriter)) != NULL) {
3660 int rv;
e5766eb4 3661 rv = vnc_display_get_address(addr, false, reverse, 0, to,
396f935a
DB
3662 has_ipv4, has_ipv6,
3663 ipv4, ipv6,
3664 &saddr, errp);
3665 if (rv < 0) {
3666 goto cleanup;
3667 }
3668 /* Historical compat - first listen address can be used
3669 * to set the default websocket port
3670 */
3671 if (displaynum == -1) {
3672 displaynum = rv;
3673 }
bd269ebc 3674 *retsaddr = g_renew(SocketAddress *, *retsaddr, *retnsaddr + 1);
396f935a 3675 (*retsaddr)[(*retnsaddr)++] = saddr;
275e0d61
DB
3676 }
3677
396f935a
DB
3678 /* If we had multiple primary displays, we don't do defaults
3679 * for websocket, and require explicit config instead. */
3680 if (*retnsaddr > 1) {
3681 displaynum = -1;
275e0d61 3682 }
396f935a
DB
3683
3684 qemu_opt_iter_init(&addriter, opts, "websocket");
3685 while ((addr = qemu_opt_iter_next(&addriter)) != NULL) {
e5766eb4 3686 if (vnc_display_get_address(addr, true, reverse, displaynum, to,
275e0d61
DB
3687 has_ipv4, has_ipv6,
3688 ipv4, ipv6,
3689 &wsaddr, errp) < 0) {
396f935a 3690 goto cleanup;
275e0d61 3691 }
396f935a
DB
3692
3693 /* Historical compat - if only a single listen address was
3694 * provided, then this is used to set the default listen
3695 * address for websocket too
3696 */
3697 if (*retnsaddr == 1 &&
bd269ebc
MA
3698 (*retsaddr)[0]->type == SOCKET_ADDRESS_TYPE_INET &&
3699 wsaddr->type == SOCKET_ADDRESS_TYPE_INET &&
3700 g_str_equal(wsaddr->u.inet.host, "") &&
3701 !g_str_equal((*retsaddr)[0]->u.inet.host, "")) {
3702 g_free(wsaddr->u.inet.host);
3703 wsaddr->u.inet.host = g_strdup((*retsaddr)[0]->u.inet.host);
275e0d61 3704 }
396f935a 3705
bd269ebc 3706 *retwsaddr = g_renew(SocketAddress *, *retwsaddr, *retnwsaddr + 1);
396f935a 3707 (*retwsaddr)[(*retnwsaddr)++] = wsaddr;
275e0d61 3708 }
275e0d61 3709
396f935a
DB
3710 ret = 0;
3711 cleanup:
3712 if (ret < 0) {
9f26f325
PMD
3713 vnc_free_addresses(retsaddr, retnsaddr);
3714 vnc_free_addresses(retwsaddr, retnwsaddr);
396f935a
DB
3715 }
3716 return ret;
275e0d61
DB
3717}
3718
8bd22f47 3719static int vnc_display_connect(VncDisplay *vd,
bd269ebc 3720 SocketAddress **saddr,
396f935a 3721 size_t nsaddr,
bd269ebc 3722 SocketAddress **wsaddr,
396f935a 3723 size_t nwsaddr,
8bd22f47
DB
3724 Error **errp)
3725{
3726 /* connect to viewer */
3727 QIOChannelSocket *sioc = NULL;
396f935a 3728 if (nwsaddr != 0) {
8bd22f47
DB
3729 error_setg(errp, "Cannot use websockets in reverse mode");
3730 return -1;
3731 }
396f935a
DB
3732 if (nsaddr != 1) {
3733 error_setg(errp, "Expected a single address in reverse mode");
3734 return -1;
3735 }
bd269ebc
MA
3736 /* TODO SOCKET_ADDRESS_TYPE_FD when fd has AF_UNIX */
3737 vd->is_unix = saddr[0]->type == SOCKET_ADDRESS_TYPE_UNIX;
8bd22f47
DB
3738 sioc = qio_channel_socket_new();
3739 qio_channel_set_name(QIO_CHANNEL(sioc), "vnc-reverse");
396f935a 3740 if (qio_channel_socket_connect_sync(sioc, saddr[0], errp) < 0) {
8bd22f47
DB
3741 return -1;
3742 }
3743 vnc_connect(vd, sioc, false, false);
3744 object_unref(OBJECT(sioc));
3745 return 0;
3746}
3747
3748
8bd22f47 3749static int vnc_display_listen(VncDisplay *vd,
bd269ebc 3750 SocketAddress **saddr,
396f935a 3751 size_t nsaddr,
bd269ebc 3752 SocketAddress **wsaddr,
396f935a 3753 size_t nwsaddr,
8bd22f47
DB
3754 Error **errp)
3755{
396f935a 3756 size_t i;
8bd22f47 3757
13e1d0e7
DB
3758 if (nsaddr) {
3759 vd->listener = qio_net_listener_new();
3760 qio_net_listener_set_name(vd->listener, "vnc-listen");
3761 for (i = 0; i < nsaddr; i++) {
3762 if (qio_net_listener_open_sync(vd->listener,
3763 saddr[i],
3764 errp) < 0) {
3765 return -1;
3766 }
396f935a 3767 }
13e1d0e7
DB
3768
3769 qio_net_listener_set_client_func(vd->listener,
3770 vnc_listen_io, vd, NULL);
8bd22f47 3771 }
13e1d0e7
DB
3772
3773 if (nwsaddr) {
3774 vd->wslistener = qio_net_listener_new();
3775 qio_net_listener_set_name(vd->wslistener, "vnc-ws-listen");
3776 for (i = 0; i < nwsaddr; i++) {
3777 if (qio_net_listener_open_sync(vd->wslistener,
3778 wsaddr[i],
3779 errp) < 0) {
3780 return -1;
3781 }
396f935a 3782 }
13e1d0e7
DB
3783
3784 qio_net_listener_set_client_func(vd->wslistener,
3785 vnc_listen_io, vd, NULL);
8bd22f47
DB
3786 }
3787
3788 return 0;
3789}
3790
3791
4db14629 3792void vnc_display_open(const char *id, Error **errp)
71cab5ca 3793{
bf01c179 3794 VncDisplay *vd = vnc_display_find(id);
4db14629 3795 QemuOpts *opts = qemu_opts_find(&qemu_vnc_opts, id);
bd269ebc 3796 SocketAddress **saddr = NULL, **wsaddr = NULL;
396f935a 3797 size_t nsaddr, nwsaddr;
e2a11d9d 3798 const char *share, *device_id;
1d0d59fe 3799 QemuConsole *con;
a2c72de0
GA
3800 bool password = false;
3801 bool reverse = false;
3e305e4a 3802 const char *credid;
a2c72de0 3803 bool sasl = false;
76655d6d 3804 int acl = 0;
55cf09a0
DB
3805 const char *tlsauthz;
3806 const char *saslauthz;
3a0558b5 3807 int lock_key_sync = 1;
c5ce8333 3808 int key_delay_ms;
71cab5ca 3809
bf01c179 3810 if (!vd) {
2d55f0e8
PB
3811 error_setg(errp, "VNC display not active");
3812 return;
3813 }
bf01c179 3814 vnc_display_close(vd);
24236869 3815
4db14629
GH
3816 if (!opts) {
3817 return;
3818 }
274c3b52 3819
e5766eb4
GH
3820 reverse = qemu_opt_get_bool(opts, "reverse", false);
3821 if (vnc_display_get_addresses(opts, reverse, &saddr, &nsaddr,
396f935a 3822 &wsaddr, &nwsaddr, errp) < 0) {
e5560329 3823 goto fail;
e2a11d9d 3824 }
e5560329 3825
4db14629 3826 password = qemu_opt_get_bool(opts, "password", false);
800567a6
DB
3827 if (password) {
3828 if (fips_get_state()) {
3829 error_setg(errp,
3830 "VNC password auth disabled due to FIPS mode, "
3831 "consider using the VeNCrypt or SASL authentication "
3832 "methods as an alternative");
3833 goto fail;
3834 }
3835 if (!qcrypto_cipher_supports(
f844836d 3836 QCRYPTO_CIPHER_ALG_DES_RFB, QCRYPTO_CIPHER_MODE_ECB)) {
800567a6
DB
3837 error_setg(errp,
3838 "Cipher backend does not support DES RFB algorithm");
3839 goto fail;
3840 }
4db14629
GH
3841 }
3842
4db14629 3843 lock_key_sync = qemu_opt_get_bool(opts, "lock-key-sync", true);
d3b0db6d 3844 key_delay_ms = qemu_opt_get_number(opts, "key-delay-ms", 10);
4db14629 3845 sasl = qemu_opt_get_bool(opts, "sasl", false);
d169f04b
DB
3846#ifndef CONFIG_VNC_SASL
3847 if (sasl) {
3848 error_setg(errp, "VNC SASL auth requires cyrus-sasl support");
3849 goto fail;
3850 }
3851#endif /* CONFIG_VNC_SASL */
3e305e4a
DB
3852 credid = qemu_opt_get(opts, "tls-creds");
3853 if (credid) {
3854 Object *creds;
3e305e4a
DB
3855 creds = object_resolve_path_component(
3856 object_get_objects_root(), credid);
3857 if (!creds) {
3858 error_setg(errp, "No TLS credentials with id '%s'",
3859 credid);
3860 goto fail;
3861 }
bf01c179 3862 vd->tlscreds = (QCryptoTLSCreds *)
3e305e4a
DB
3863 object_dynamic_cast(creds,
3864 TYPE_QCRYPTO_TLS_CREDS);
bf01c179 3865 if (!vd->tlscreds) {
3e305e4a
DB
3866 error_setg(errp, "Object with id '%s' is not TLS credentials",
3867 credid);
3868 goto fail;
3869 }
bf01c179 3870 object_ref(OBJECT(vd->tlscreds));
3e305e4a 3871
bf01c179 3872 if (vd->tlscreds->endpoint != QCRYPTO_TLS_CREDS_ENDPOINT_SERVER) {
3e305e4a
DB
3873 error_setg(errp,
3874 "Expecting TLS credentials with a server endpoint");
3875 goto fail;
3876 }
4db14629 3877 }
55cf09a0
DB
3878 if (qemu_opt_get(opts, "acl")) {
3879 error_report("The 'acl' option to -vnc is deprecated. "
3880 "Please use the 'tls-authz' and 'sasl-authz' "
3881 "options instead");
3882 }
4db14629 3883 acl = qemu_opt_get_bool(opts, "acl", false);
55cf09a0
DB
3884 tlsauthz = qemu_opt_get(opts, "tls-authz");
3885 if (acl && tlsauthz) {
3886 error_setg(errp, "'acl' option is mutually exclusive with the "
3887 "'tls-authz' option");
3888 goto fail;
3889 }
3890 if (tlsauthz && !vd->tlscreds) {
3891 error_setg(errp, "'tls-authz' provided but TLS is not enabled");
3892 goto fail;
3893 }
3894
3895 saslauthz = qemu_opt_get(opts, "sasl-authz");
3896 if (acl && saslauthz) {
3897 error_setg(errp, "'acl' option is mutually exclusive with the "
3898 "'sasl-authz' option");
3899 goto fail;
3900 }
3901 if (saslauthz && !sasl) {
3902 error_setg(errp, "'sasl-authz' provided but SASL auth is not enabled");
3903 goto fail;
3904 }
4db14629
GH
3905
3906 share = qemu_opt_get(opts, "share");
3907 if (share) {
3908 if (strcmp(share, "ignore") == 0) {
bf01c179 3909 vd->share_policy = VNC_SHARE_POLICY_IGNORE;
4db14629 3910 } else if (strcmp(share, "allow-exclusive") == 0) {
bf01c179 3911 vd->share_policy = VNC_SHARE_POLICY_ALLOW_EXCLUSIVE;
4db14629 3912 } else if (strcmp(share, "force-shared") == 0) {
bf01c179 3913 vd->share_policy = VNC_SHARE_POLICY_FORCE_SHARED;
4db14629
GH
3914 } else {
3915 error_setg(errp, "unknown vnc share= option");
3916 goto fail;
3917 }
3918 } else {
bf01c179 3919 vd->share_policy = VNC_SHARE_POLICY_ALLOW_EXCLUSIVE;
4db14629 3920 }
bf01c179 3921 vd->connections_limit = qemu_opt_get_number(opts, "connections", 32);
4db14629 3922
4db14629 3923#ifdef CONFIG_VNC_JPEG
bf01c179 3924 vd->lossy = qemu_opt_get_bool(opts, "lossy", false);
4db14629 3925#endif
bf01c179 3926 vd->non_adaptive = qemu_opt_get_bool(opts, "non-adaptive", false);
e22492d3
PL
3927 /* adaptive updates are only used with tight encoding and
3928 * if lossy updates are enabled so we can disable all the
3929 * calculations otherwise */
bf01c179
DB
3930 if (!vd->lossy) {
3931 vd->non_adaptive = true;
e22492d3
PL
3932 }
3933
55cf09a0
DB
3934 if (tlsauthz) {
3935 vd->tlsauthzid = g_strdup(tlsauthz);
3936 } else if (acl) {
bf01c179 3937 if (strcmp(vd->id, "default") == 0) {
b76806d4 3938 vd->tlsauthzid = g_strdup("vnc.x509dname");
c8496408 3939 } else {
b76806d4 3940 vd->tlsauthzid = g_strdup_printf("vnc.%s.x509dname", vd->id);
c8496408 3941 }
b76806d4
DB
3942 vd->tlsauthz = QAUTHZ(qauthz_list_new(vd->tlsauthzid,
3943 QAUTHZ_LIST_POLICY_DENY,
3944 &error_abort));
2cc45228 3945 }
76655d6d 3946#ifdef CONFIG_VNC_SASL
55cf09a0
DB
3947 if (sasl) {
3948 if (saslauthz) {
3949 vd->sasl.authzid = g_strdup(saslauthz);
3950 } else if (acl) {
3951 if (strcmp(vd->id, "default") == 0) {
3952 vd->sasl.authzid = g_strdup("vnc.username");
3953 } else {
3954 vd->sasl.authzid = g_strdup_printf("vnc.%s.username", vd->id);
3955 }
3956 vd->sasl.authz = QAUTHZ(qauthz_list_new(vd->sasl.authzid,
3957 QAUTHZ_LIST_POLICY_DENY,
3958 &error_abort));
c8496408 3959 }
76655d6d
AL
3960 }
3961#endif
3962
eda24e18
DB
3963 if (vnc_display_setup_auth(&vd->auth, &vd->subauth,
3964 vd->tlscreds, password,
3965 sasl, false, errp) < 0) {
3966 goto fail;
3967 }
7364dbda 3968 trace_vnc_auth_init(vd, 0, vd->auth, vd->subauth);
eda24e18
DB
3969
3970 if (vnc_display_setup_auth(&vd->ws_auth, &vd->ws_subauth,
3971 vd->tlscreds, password,
3972 sasl, true, errp) < 0) {
3e305e4a
DB
3973 goto fail;
3974 }
7364dbda 3975 trace_vnc_auth_init(vd, 1, vd->ws_auth, vd->ws_subauth);
24236869 3976
2f9606b3 3977#ifdef CONFIG_VNC_SASL
b5dc0d7d
MAL
3978 if (sasl) {
3979 int saslErr = sasl_server_init(NULL, "qemu");
3980
3981 if (saslErr != SASL_OK) {
3982 error_setg(errp, "Failed to initialize SASL auth: %s",
3983 sasl_errstring(saslErr, NULL, NULL));
3984 goto fail;
3985 }
2f9606b3
AL
3986 }
3987#endif
bf01c179 3988 vd->lock_key_sync = lock_key_sync;
a54f0d2b
PO
3989 if (lock_key_sync) {
3990 vd->led = qemu_add_led_event_handler(kbd_leds, vd);
3991 }
3992 vd->ledstate = 0;
2f9606b3 3993
1d0d59fe
GH
3994 device_id = qemu_opt_get(opts, "display");
3995 if (device_id) {
1d0d59fe 3996 int head = qemu_opt_get_number(opts, "head", 0);
f2c1d54c 3997 Error *err = NULL;
1d0d59fe 3998
f2c1d54c
GH
3999 con = qemu_console_lookup_by_device_name(device_id, head, &err);
4000 if (err) {
4001 error_propagate(errp, err);
1d0d59fe
GH
4002 goto fail;
4003 }
4004 } else {
4005 con = NULL;
4006 }
4007
bf01c179 4008 if (con != vd->dcl.con) {
c2f2ba49 4009 qkbd_state_free(vd->kbd);
bf01c179
DB
4010 unregister_displaychangelistener(&vd->dcl);
4011 vd->dcl.con = con;
4012 register_displaychangelistener(&vd->dcl);
c2f2ba49 4013 vd->kbd = qkbd_state_init(vd->dcl.con);
1d0d59fe 4014 }
c2f2ba49 4015 qkbd_state_set_delay(vd->kbd, key_delay_ms);
1d0d59fe 4016
fa03cb7f
MAL
4017 if (saddr == NULL) {
4018 goto cleanup;
4019 }
4020
3aa3eea3 4021 if (reverse) {
396f935a 4022 if (vnc_display_connect(vd, saddr, nsaddr, wsaddr, nwsaddr, errp) < 0) {
007fcd3e
PB
4023 goto fail;
4024 }
9712ecaf 4025 } else {
396f935a 4026 if (vnc_display_listen(vd, saddr, nsaddr, wsaddr, nwsaddr, errp) < 0) {
e0d03b8c
DB
4027 goto fail;
4028 }
24236869 4029 }
e0d03b8c 4030
275e0d61 4031 if (qemu_opt_get(opts, "to")) {
bf01c179 4032 vnc_display_print_local_addr(vd);
33df7bf3
PB
4033 }
4034
396f935a 4035 cleanup:
9f26f325
PMD
4036 vnc_free_addresses(&saddr, &nsaddr);
4037 vnc_free_addresses(&wsaddr, &nwsaddr);
2d55f0e8 4038 return;
1ce52c78
PB
4039
4040fail:
4ee74fa7 4041 vnc_display_close(vd);
396f935a 4042 goto cleanup;
24236869 4043}
13661089 4044
14f7143e 4045void vnc_display_add_client(const char *id, int csock, bool skipauth)
13661089 4046{
bf01c179 4047 VncDisplay *vd = vnc_display_find(id);
04d2529d 4048 QIOChannelSocket *sioc;
13661089 4049
bf01c179 4050 if (!vd) {
d616ccc5
GH
4051 return;
4052 }
04d2529d
DB
4053
4054 sioc = qio_channel_socket_new_fd(csock, NULL);
4055 if (sioc) {
10bcfe58 4056 qio_channel_set_name(QIO_CHANNEL(sioc), "vnc-server");
bf01c179 4057 vnc_connect(vd, sioc, skipauth, false);
04d2529d
DB
4058 object_unref(OBJECT(sioc));
4059 }
13661089 4060}
4db14629 4061
9634f4e3 4062static void vnc_auto_assign_id(QemuOptsList *olist, QemuOpts *opts)
2779672f
GA
4063{
4064 int i = 2;
4065 char *id;
4066
4067 id = g_strdup("default");
4068 while (qemu_opts_find(olist, id)) {
4069 g_free(id);
4070 id = g_strdup_printf("vnc%d", i++);
4071 }
4072 qemu_opts_set_id(opts, id);
4073}
4074
70b94331 4075QemuOpts *vnc_parse(const char *str, Error **errp)
4db14629 4076{
4db14629 4077 QemuOptsList *olist = qemu_find_opts("vnc");
70b94331 4078 QemuOpts *opts = qemu_opts_parse(olist, str, true, errp);
81607cbf 4079 const char *id;
4db14629 4080
81607cbf
GA
4081 if (!opts) {
4082 return NULL;
4083 }
4084
4085 id = qemu_opts_id(opts);
4db14629
GH
4086 if (!id) {
4087 /* auto-assign id if not present */
2779672f 4088 vnc_auto_assign_id(olist, opts);
4db14629 4089 }
9634f4e3
GH
4090 return opts;
4091}
4092
28d0de7a 4093int vnc_init_func(void *opaque, QemuOpts *opts, Error **errp)
9634f4e3
GH
4094{
4095 Error *local_err = NULL;
4096 char *id = (char *)qemu_opts_id(opts);
4db14629 4097
9634f4e3 4098 assert(id);
ab4f931e
FL
4099 vnc_display_init(id, &local_err);
4100 if (local_err) {
612aea20
MA
4101 error_propagate(errp, local_err);
4102 return -1;
ab4f931e 4103 }
4db14629
GH
4104 vnc_display_open(id, &local_err);
4105 if (local_err != NULL) {
612aea20
MA
4106 error_propagate(errp, local_err);
4107 return -1;
4db14629
GH
4108 }
4109 return 0;
4110}
4111
4112static void vnc_register_config(void)
4113{
4114 qemu_add_opts(&qemu_vnc_opts);
4115}
34294e2f 4116opts_init(vnc_register_config);