8 #include "qemu_socket.h"
11 # define AI_ADDRCONFIG 0
14 static int sockets_debug
= 0;
15 static const int on
=1, off
=0;
17 static int inet_getport(struct addrinfo
*e
)
19 struct sockaddr_in
*i4
;
20 struct sockaddr_in6
*i6
;
22 switch (e
->ai_family
) {
24 i6
= (void*)e
->ai_addr
;
25 return ntohs(i6
->sin6_port
);
27 i4
= (void*)e
->ai_addr
;
28 return ntohs(i4
->sin_port
);
34 static void inet_setport(struct addrinfo
*e
, int port
)
36 struct sockaddr_in
*i4
;
37 struct sockaddr_in6
*i6
;
39 switch (e
->ai_family
) {
41 i6
= (void*)e
->ai_addr
;
42 i6
->sin6_port
= htons(port
);
45 i4
= (void*)e
->ai_addr
;
46 i4
->sin_port
= htons(port
);
51 static const char *inet_strfamily(int family
)
54 case PF_INET6
: return "ipv6";
55 case PF_INET
: return "ipv4";
56 case PF_UNIX
: return "unix";
61 static void inet_print_addrinfo(const char *tag
, struct addrinfo
*res
)
64 char uaddr
[INET6_ADDRSTRLEN
+1];
67 for (e
= res
; e
!= NULL
; e
= e
->ai_next
) {
68 getnameinfo((struct sockaddr
*)e
->ai_addr
,e
->ai_addrlen
,
69 uaddr
,INET6_ADDRSTRLEN
,uport
,32,
70 NI_NUMERICHOST
| NI_NUMERICSERV
);
71 fprintf(stderr
,"%s: getaddrinfo: family %s, host %s, port %s\n",
72 tag
, inet_strfamily(e
->ai_family
), uaddr
, uport
);
76 int inet_listen(const char *str
, char *ostr
, int olen
,
77 int socktype
, int port_offset
)
79 struct addrinfo ai
,*res
,*e
;
82 char uaddr
[INET6_ADDRSTRLEN
+1];
85 int slisten
,rc
,pos
,to
,try_next
;
87 memset(&ai
,0, sizeof(ai
));
88 ai
.ai_flags
= AI_PASSIVE
| AI_ADDRCONFIG
;
89 ai
.ai_family
= PF_UNSPEC
;
90 ai
.ai_socktype
= socktype
;
96 if (1 != sscanf(str
,":%32[^,]%n",port
,&pos
)) {
97 fprintf(stderr
, "%s: portonly parse error (%s)\n",
101 } else if (str
[0] == '[') {
103 if (2 != sscanf(str
,"[%64[^]]]:%32[^,]%n",addr
,port
,&pos
)) {
104 fprintf(stderr
, "%s: ipv6 parse error (%s)\n",
108 ai
.ai_family
= PF_INET6
;
109 } else if (isdigit(str
[0])) {
111 if (2 != sscanf(str
,"%64[0-9.]:%32[^,]%n",addr
,port
,&pos
)) {
112 fprintf(stderr
, "%s: ipv4 parse error (%s)\n",
116 ai
.ai_family
= PF_INET
;
119 if (2 != sscanf(str
,"%64[^:]:%32[^,]%n",addr
,port
,&pos
)) {
120 fprintf(stderr
, "%s: hostname parse error (%s)\n",
128 h
= strstr(opts
, ",to=");
129 to
= h
? atoi(h
+4) : 0;
130 if (strstr(opts
, ",ipv4"))
131 ai
.ai_family
= PF_INET
;
132 if (strstr(opts
, ",ipv6"))
133 ai
.ai_family
= PF_INET6
;
137 snprintf(port
, sizeof(port
), "%d", atoi(port
) + port_offset
);
138 rc
= getaddrinfo(strlen(addr
) ? addr
: NULL
, port
, &ai
, &res
);
140 fprintf(stderr
,"%s: getaddrinfo(%s,%s): %s\n", __FUNCTION__
,
141 addr
, port
, gai_strerror(rc
));
145 inet_print_addrinfo(__FUNCTION__
, res
);
147 /* create socket + bind */
148 for (e
= res
; e
!= NULL
; e
= e
->ai_next
) {
149 getnameinfo((struct sockaddr
*)e
->ai_addr
,e
->ai_addrlen
,
150 uaddr
,INET6_ADDRSTRLEN
,uport
,32,
151 NI_NUMERICHOST
| NI_NUMERICSERV
);
152 slisten
= socket(e
->ai_family
, e
->ai_socktype
, e
->ai_protocol
);
154 fprintf(stderr
,"%s: socket(%s): %s\n", __FUNCTION__
,
155 inet_strfamily(e
->ai_family
), strerror(errno
));
159 setsockopt(slisten
,SOL_SOCKET
,SO_REUSEADDR
,(void*)&on
,sizeof(on
));
161 if (e
->ai_family
== PF_INET6
) {
162 /* listen on both ipv4 and ipv6 */
163 setsockopt(slisten
,IPPROTO_IPV6
,IPV6_V6ONLY
,(void*)&off
,sizeof(off
));
168 if (bind(slisten
, e
->ai_addr
, e
->ai_addrlen
) == 0) {
170 fprintf(stderr
,"%s: bind(%s,%s,%d): OK\n", __FUNCTION__
,
171 inet_strfamily(e
->ai_family
), uaddr
, inet_getport(e
));
174 try_next
= to
&& (inet_getport(e
) <= to
+ port_offset
);
175 if (!try_next
|| sockets_debug
)
176 fprintf(stderr
,"%s: bind(%s,%s,%d): %s\n", __FUNCTION__
,
177 inet_strfamily(e
->ai_family
), uaddr
, inet_getport(e
),
180 inet_setport(e
, inet_getport(e
) + 1);
185 closesocket(slisten
);
187 fprintf(stderr
, "%s: FAILED\n", __FUNCTION__
);
192 if (listen(slisten
,1) != 0) {
194 closesocket(slisten
);
198 if (e
->ai_family
== PF_INET6
) {
199 snprintf(ostr
, olen
, "[%s]:%d%s", uaddr
,
200 inet_getport(e
) - port_offset
, opts
);
202 snprintf(ostr
, olen
, "%s:%d%s", uaddr
,
203 inet_getport(e
) - port_offset
, opts
);
210 int inet_connect(const char *str
, int socktype
)
212 struct addrinfo ai
,*res
,*e
;
215 char uaddr
[INET6_ADDRSTRLEN
+1];
219 memset(&ai
,0, sizeof(ai
));
220 ai
.ai_flags
= AI_CANONNAME
| AI_ADDRCONFIG
;
221 ai
.ai_family
= PF_UNSPEC
;
222 ai
.ai_socktype
= socktype
;
227 if (2 != sscanf(str
,"[%64[^]]]:%32[^,]",addr
,port
)) {
228 fprintf(stderr
, "%s: ipv6 parse error (%s)\n",
232 ai
.ai_family
= PF_INET6
;
233 } else if (isdigit(str
[0])) {
235 if (2 != sscanf(str
,"%64[0-9.]:%32[^,]",addr
,port
)) {
236 fprintf(stderr
, "%s: ipv4 parse error (%s)\n",
240 ai
.ai_family
= PF_INET
;
243 if (2 != sscanf(str
,"%64[^:]:%32[^,]",addr
,port
)) {
244 fprintf(stderr
, "%s: hostname parse error (%s)\n",
251 if (strstr(str
, ",ipv4"))
252 ai
.ai_family
= PF_INET
;
253 if (strstr(str
, ",ipv6"))
254 ai
.ai_family
= PF_INET6
;
257 if (0 != (rc
= getaddrinfo(addr
, port
, &ai
, &res
))) {
258 fprintf(stderr
,"getaddrinfo(%s,%s): %s\n", gai_strerror(rc
),
263 inet_print_addrinfo(__FUNCTION__
, res
);
265 for (e
= res
; e
!= NULL
; e
= e
->ai_next
) {
266 if (getnameinfo((struct sockaddr
*)e
->ai_addr
,e
->ai_addrlen
,
267 uaddr
,INET6_ADDRSTRLEN
,uport
,32,
268 NI_NUMERICHOST
| NI_NUMERICSERV
) != 0) {
269 fprintf(stderr
,"%s: getnameinfo: oops\n", __FUNCTION__
);
272 sock
= socket(e
->ai_family
, e
->ai_socktype
, e
->ai_protocol
);
274 fprintf(stderr
,"%s: socket(%s): %s\n", __FUNCTION__
,
275 inet_strfamily(e
->ai_family
), strerror(errno
));
278 setsockopt(sock
,SOL_SOCKET
,SO_REUSEADDR
,(void*)&on
,sizeof(on
));
280 /* connect to peer */
281 if (connect(sock
,e
->ai_addr
,e
->ai_addrlen
) < 0) {
282 if (sockets_debug
|| NULL
== e
->ai_next
)
283 fprintf(stderr
, "%s: connect(%s,%s,%s,%s): %s\n", __FUNCTION__
,
284 inet_strfamily(e
->ai_family
),
285 e
->ai_canonname
, uaddr
, uport
, strerror(errno
));
290 fprintf(stderr
, "%s: connect(%s,%s,%s,%s): OK\n", __FUNCTION__
,
291 inet_strfamily(e
->ai_family
),
292 e
->ai_canonname
, uaddr
, uport
);
302 int unix_listen(const char *str
, char *ostr
, int olen
)
304 struct sockaddr_un un
;
308 sock
= socket(PF_UNIX
, SOCK_STREAM
, 0);
310 perror("socket(unix)");
314 opts
= strchr(str
, ',');
317 path
= malloc(len
+1);
318 snprintf(path
, len
+1, "%.*s", len
, str
);
322 memset(&un
, 0, sizeof(un
));
323 un
.sun_family
= AF_UNIX
;
324 if (path
&& strlen(path
)) {
325 snprintf(un
.sun_path
, sizeof(un
.sun_path
), "%s", path
);
327 char *tmpdir
= getenv("TMPDIR");
328 snprintf(un
.sun_path
, sizeof(un
.sun_path
), "%s/qemu-socket-XXXXXX",
329 tmpdir
? tmpdir
: "/tmp");
331 * This dummy fd usage silences the mktemp() unsecure warning.
332 * Using mkstemp() doesn't make things more secure here
333 * though. bind() complains about existing files, so we have
334 * to unlink first and thus re-open the race window. The
335 * worst case possible is bind() failing, i.e. a DoS attack.
337 fd
= mkstemp(un
.sun_path
); close(fd
);
339 snprintf(ostr
, olen
, "%s%s", un
.sun_path
, opts
? opts
: "");
342 if (bind(sock
, (struct sockaddr
*) &un
, sizeof(un
)) < 0) {
343 fprintf(stderr
, "bind(unix:%s): %s\n", un
.sun_path
, strerror(errno
));
346 if (listen(sock
, 1) < 0) {
347 fprintf(stderr
, "listen(unix:%s): %s\n", un
.sun_path
, strerror(errno
));
352 fprintf(stderr
, "bind(unix:%s): OK\n", un
.sun_path
);
362 int unix_connect(const char *path
)
364 struct sockaddr_un un
;
367 sock
= socket(PF_UNIX
, SOCK_STREAM
, 0);
369 perror("socket(unix)");
373 memset(&un
, 0, sizeof(un
));
374 un
.sun_family
= AF_UNIX
;
375 snprintf(un
.sun_path
, sizeof(un
.sun_path
), "%s", path
);
376 if (connect(sock
, (struct sockaddr
*) &un
, sizeof(un
)) < 0) {
377 fprintf(stderr
, "connect(unix:%s): %s\n", path
, strerror(errno
));
382 fprintf(stderr
, "connect(unix:%s): OK\n", path
);
388 int unix_listen(const char *path
, char *ostr
, int olen
)
390 fprintf(stderr
, "unix sockets are not available on windows\n");
394 int unix_connect(const char *path
)
396 fprintf(stderr
, "unix sockets are not available on windows\n");