2 * Copyright (c) 1995 Danny Gasparovski.
4 * Please read the file COPYRIGHT for the
5 * terms and conditions of the copyright.
8 #include "qemu/osdep.h"
9 #include "qemu-common.h"
13 #include <sys/filio.h>
16 static void sofcantrcvmore(struct socket
*so
);
17 static void sofcantsendmore(struct socket
*so
);
19 struct socket
*solookup(struct socket
**last
, struct socket
*head
,
20 struct sockaddr_storage
*lhost
, struct sockaddr_storage
*fhost
)
22 struct socket
*so
= *last
;
25 if (so
!= head
&& sockaddr_equal(&(so
->lhost
.ss
), lhost
)
26 && (!fhost
|| sockaddr_equal(&so
->fhost
.ss
, fhost
))) {
30 for (so
= head
->so_next
; so
!= head
; so
= so
->so_next
) {
31 if (sockaddr_equal(&(so
->lhost
.ss
), lhost
)
32 && (!fhost
|| sockaddr_equal(&so
->fhost
.ss
, fhost
))) {
38 return (struct socket
*)NULL
;
42 * Create a new socket, initialise the fields
43 * It is the responsibility of the caller to
44 * insque() it into the correct linked-list
47 socreate(Slirp
*slirp
)
51 so
= (struct socket
*)malloc(sizeof(struct socket
));
53 memset(so
, 0, sizeof(struct socket
));
54 so
->so_state
= SS_NOFDREF
;
63 * Remove references to so from the given message queue.
66 soqfree(struct socket
*so
, struct quehead
*qh
)
70 for (ifq
= (struct mbuf
*) qh
->qh_link
;
71 (struct quehead
*) ifq
!= qh
;
72 ifq
= ifq
->ifq_next
) {
73 if (ifq
->ifq_so
== so
) {
76 for (ifm
= ifq
->ifs_next
; ifm
!= ifq
; ifm
= ifm
->ifs_next
) {
84 * remque and free a socket, clobber cache
87 sofree(struct socket
*so
)
89 Slirp
*slirp
= so
->slirp
;
91 soqfree(so
, &slirp
->if_fastq
);
92 soqfree(so
, &slirp
->if_batchq
);
94 if (so
->so_emu
==EMU_RSH
&& so
->extra
) {
98 if (so
== slirp
->tcp_last_so
) {
99 slirp
->tcp_last_so
= &slirp
->tcb
;
100 } else if (so
== slirp
->udp_last_so
) {
101 slirp
->udp_last_so
= &slirp
->udb
;
102 } else if (so
== slirp
->icmp_last_so
) {
103 slirp
->icmp_last_so
= &slirp
->icmp
;
107 if(so
->so_next
&& so
->so_prev
)
108 remque(so
); /* crashes if so is not in a queue */
116 size_t sopreprbuf(struct socket
*so
, struct iovec
*iov
, int *np
)
119 struct sbuf
*sb
= &so
->so_snd
;
120 int len
= sb
->sb_datalen
- sb
->sb_cc
;
121 int mss
= so
->so_tcpcb
->t_maxseg
;
123 DEBUG_CALL("sopreprbuf");
124 DEBUG_ARG("so = %p", so
);
129 iov
[0].iov_base
= sb
->sb_wptr
;
130 iov
[1].iov_base
= NULL
;
132 if (sb
->sb_wptr
< sb
->sb_rptr
) {
133 iov
[0].iov_len
= sb
->sb_rptr
- sb
->sb_wptr
;
134 /* Should never succeed, but... */
135 if (iov
[0].iov_len
> len
)
136 iov
[0].iov_len
= len
;
137 if (iov
[0].iov_len
> mss
)
138 iov
[0].iov_len
-= iov
[0].iov_len
%mss
;
141 iov
[0].iov_len
= (sb
->sb_data
+ sb
->sb_datalen
) - sb
->sb_wptr
;
142 /* Should never succeed, but... */
143 if (iov
[0].iov_len
> len
) iov
[0].iov_len
= len
;
144 len
-= iov
[0].iov_len
;
146 iov
[1].iov_base
= sb
->sb_data
;
147 iov
[1].iov_len
= sb
->sb_rptr
- sb
->sb_data
;
148 if(iov
[1].iov_len
> len
)
149 iov
[1].iov_len
= len
;
150 total
= iov
[0].iov_len
+ iov
[1].iov_len
;
153 if (iov
[1].iov_len
> lss
) {
154 iov
[1].iov_len
-= lss
;
157 lss
-= iov
[1].iov_len
;
158 iov
[0].iov_len
-= lss
;
164 if (iov
[0].iov_len
> mss
)
165 iov
[0].iov_len
-= iov
[0].iov_len
%mss
;
172 return iov
[0].iov_len
+ (n
- 1) * iov
[1].iov_len
;
176 * Read from so's socket into sb_snd, updating all relevant sbuf fields
177 * NOTE: This will only be called if it is select()ed for reading, so
178 * a read() of 0 (or less) means it's disconnected
181 soread(struct socket
*so
)
184 struct sbuf
*sb
= &so
->so_snd
;
187 DEBUG_CALL("soread");
188 DEBUG_ARG("so = %p", so
);
191 * No need to check if there's enough room to read.
192 * soread wouldn't have been called if there weren't
194 sopreprbuf(so
, iov
, &n
);
197 nn
= readv(so
->s
, (struct iovec
*)iov
, n
);
198 DEBUG_MISC((dfd
, " ... read nn = %d bytes\n", nn
));
200 nn
= qemu_recv(so
->s
, iov
[0].iov_base
, iov
[0].iov_len
,0);
203 if (nn
< 0 && (errno
== EINTR
|| errno
== EAGAIN
))
207 socklen_t elen
= sizeof err
;
208 struct sockaddr_storage addr
;
209 struct sockaddr
*paddr
= (struct sockaddr
*) &addr
;
210 socklen_t alen
= sizeof addr
;
214 if (getpeername(so
->s
, paddr
, &alen
) < 0) {
217 getsockopt(so
->s
, SOL_SOCKET
, SO_ERROR
,
222 DEBUG_MISC((dfd
, " --- soread() disconnected, nn = %d, errno = %d-%s\n", nn
, errno
,strerror(errno
)));
225 if (err
== ECONNRESET
|| err
== ECONNREFUSED
226 || err
== ENOTCONN
|| err
== EPIPE
) {
227 tcp_drop(sototcpcb(so
), err
);
229 tcp_sockclosed(sototcpcb(so
));
237 * If there was no error, try and read the second time round
238 * We read again if n = 2 (ie, there's another part of the buffer)
239 * and we read as much as we could in the first read
240 * We don't test for <= 0 this time, because there legitimately
241 * might not be any more data (since the socket is non-blocking),
242 * a close will be detected on next iteration.
243 * A return of -1 won't (shouldn't) happen, since it didn't happen above
245 if (n
== 2 && nn
== iov
[0].iov_len
) {
247 ret
= qemu_recv(so
->s
, iov
[1].iov_base
, iov
[1].iov_len
,0);
252 DEBUG_MISC((dfd
, " ... read nn = %d bytes\n", nn
));
258 if (sb
->sb_wptr
>= (sb
->sb_data
+ sb
->sb_datalen
))
259 sb
->sb_wptr
-= sb
->sb_datalen
;
263 int soreadbuf(struct socket
*so
, const char *buf
, int size
)
265 int n
, nn
, copy
= size
;
266 struct sbuf
*sb
= &so
->so_snd
;
269 DEBUG_CALL("soreadbuf");
270 DEBUG_ARG("so = %p", so
);
273 * No need to check if there's enough room to read.
274 * soread wouldn't have been called if there weren't
276 if (sopreprbuf(so
, iov
, &n
) < size
)
279 nn
= MIN(iov
[0].iov_len
, copy
);
280 memcpy(iov
[0].iov_base
, buf
, nn
);
288 memcpy(iov
[1].iov_base
, buf
, copy
);
294 if (sb
->sb_wptr
>= (sb
->sb_data
+ sb
->sb_datalen
))
295 sb
->sb_wptr
-= sb
->sb_datalen
;
300 tcp_sockclosed(sototcpcb(so
));
301 fprintf(stderr
, "soreadbuf buffer to small");
308 * When the socket is created, we set it SO_OOBINLINE,
309 * so when OOB data arrives, we soread() it and everything
310 * in the send buffer is sent as urgent data
313 sorecvoob(struct socket
*so
)
315 struct tcpcb
*tp
= sototcpcb(so
);
318 DEBUG_CALL("sorecvoob");
319 DEBUG_ARG("so = %p", so
);
322 * We take a guess at how much urgent data has arrived.
323 * In most situations, when urgent data arrives, the next
324 * read() should get all the urgent data. This guess will
325 * be wrong however if more data arrives just after the
326 * urgent data, or the read() doesn't return all the
331 tp
->snd_up
= tp
->snd_una
+ so
->so_snd
.sb_cc
;
342 * There's a lot duplicated code here, but...
345 sosendoob(struct socket
*so
)
347 struct sbuf
*sb
= &so
->so_rcv
;
348 char buff
[2048]; /* XXX Shouldn't be sending more oob data than this */
352 DEBUG_CALL("sosendoob");
353 DEBUG_ARG("so = %p", so
);
354 DEBUG_ARG("sb->sb_cc = %d", sb
->sb_cc
);
356 if (so
->so_urgc
> 2048)
357 so
->so_urgc
= 2048; /* XXXX */
359 if (sb
->sb_rptr
< sb
->sb_wptr
) {
360 /* We can send it directly */
361 n
= slirp_send(so
, sb
->sb_rptr
, so
->so_urgc
, (MSG_OOB
)); /* |MSG_DONTWAIT)); */
364 * Since there's no sendv or sendtov like writev,
365 * we must copy all data to a linear buffer then
368 uint32_t urgc
= so
->so_urgc
;
369 int len
= (sb
->sb_data
+ sb
->sb_datalen
) - sb
->sb_rptr
;
373 memcpy(buff
, sb
->sb_rptr
, len
);
376 n
= sb
->sb_wptr
- sb
->sb_data
;
380 memcpy((buff
+ len
), sb
->sb_data
, n
);
383 n
= slirp_send(so
, buff
, len
, (MSG_OOB
)); /* |MSG_DONTWAIT)); */
386 DEBUG_ERROR((dfd
, "Didn't send all data urgently XXXXX\n"));
395 DEBUG_MISC((dfd
, " ---2 sent %d bytes urgent data, %d urgent bytes left\n", n
, so
->so_urgc
));
399 if (sb
->sb_rptr
>= (sb
->sb_data
+ sb
->sb_datalen
))
400 sb
->sb_rptr
-= sb
->sb_datalen
;
406 * Write data from so_rcv to so's socket,
407 * updating all sbuf field as necessary
410 sowrite(struct socket
*so
)
413 struct sbuf
*sb
= &so
->so_rcv
;
417 DEBUG_CALL("sowrite");
418 DEBUG_ARG("so = %p", so
);
421 uint32_t expected
= so
->so_urgc
;
422 if (sosendoob(so
) < expected
) {
423 /* Treat a short write as a fatal error too,
424 * rather than continuing on and sending the urgent
425 * data as if it were non-urgent and leaving the
426 * so_urgc count wrong.
428 goto err_disconnected
;
435 * No need to check if there's something to write,
436 * sowrite wouldn't have been called otherwise
439 iov
[0].iov_base
= sb
->sb_rptr
;
440 iov
[1].iov_base
= NULL
;
442 if (sb
->sb_rptr
< sb
->sb_wptr
) {
443 iov
[0].iov_len
= sb
->sb_wptr
- sb
->sb_rptr
;
444 /* Should never succeed, but... */
445 if (iov
[0].iov_len
> len
) iov
[0].iov_len
= len
;
448 iov
[0].iov_len
= (sb
->sb_data
+ sb
->sb_datalen
) - sb
->sb_rptr
;
449 if (iov
[0].iov_len
> len
) iov
[0].iov_len
= len
;
450 len
-= iov
[0].iov_len
;
452 iov
[1].iov_base
= sb
->sb_data
;
453 iov
[1].iov_len
= sb
->sb_wptr
- sb
->sb_data
;
454 if (iov
[1].iov_len
> len
) iov
[1].iov_len
= len
;
459 /* Check if there's urgent data to send, and if so, send it */
462 nn
= writev(so
->s
, (const struct iovec
*)iov
, n
);
464 DEBUG_MISC((dfd
, " ... wrote nn = %d bytes\n", nn
));
466 nn
= slirp_send(so
, iov
[0].iov_base
, iov
[0].iov_len
,0);
468 /* This should never happen, but people tell me it does *shrug* */
469 if (nn
< 0 && (errno
== EAGAIN
|| errno
== EINTR
))
473 goto err_disconnected
;
477 if (n
== 2 && nn
== iov
[0].iov_len
) {
479 ret
= slirp_send(so
, iov
[1].iov_base
, iov
[1].iov_len
,0);
483 DEBUG_MISC((dfd
, " ... wrote nn = %d bytes\n", nn
));
489 if (sb
->sb_rptr
>= (sb
->sb_data
+ sb
->sb_datalen
))
490 sb
->sb_rptr
-= sb
->sb_datalen
;
493 * If in DRAIN mode, and there's no more data, set
496 if ((so
->so_state
& SS_FWDRAIN
) && sb
->sb_cc
== 0)
502 DEBUG_MISC((dfd
, " --- sowrite disconnected, so->so_state = %x, errno = %d\n",
503 so
->so_state
, errno
));
505 tcp_sockclosed(sototcpcb(so
));
510 * recvfrom() a UDP socket
513 sorecvfrom(struct socket
*so
)
515 struct sockaddr_storage addr
;
516 struct sockaddr_storage saddr
, daddr
;
517 socklen_t addrlen
= sizeof(struct sockaddr_storage
);
519 DEBUG_CALL("sorecvfrom");
520 DEBUG_ARG("so = %p", so
);
522 if (so
->so_type
== IPPROTO_ICMP
) { /* This is a "ping" reply */
526 len
= recvfrom(so
->s
, buff
, 256, 0,
527 (struct sockaddr
*)&addr
, &addrlen
);
528 /* XXX Check if reply is "correct"? */
530 if(len
== -1 || len
== 0) {
531 u_char code
=ICMP_UNREACH_PORT
;
533 if(errno
== EHOSTUNREACH
) code
=ICMP_UNREACH_HOST
;
534 else if(errno
== ENETUNREACH
) code
=ICMP_UNREACH_NET
;
536 DEBUG_MISC((dfd
," udp icmp rx errno = %d-%s\n",
537 errno
,strerror(errno
)));
538 icmp_send_error(so
->so_m
, ICMP_UNREACH
, code
, 0, strerror(errno
));
540 icmp_reflect(so
->so_m
);
541 so
->so_m
= NULL
; /* Don't m_free() it again! */
543 /* No need for this socket anymore, udp_detach it */
545 } else { /* A "normal" UDP packet */
554 m
= m_get(so
->slirp
);
558 switch (so
->so_ffamily
) {
560 m
->m_data
+= IF_MAXLINKHDR
+ sizeof(struct udpiphdr
);
563 m
->m_data
+= IF_MAXLINKHDR
+ sizeof(struct ip6
)
564 + sizeof(struct udphdr
);
567 g_assert_not_reached();
572 * XXX Shouldn't FIONREAD packets destined for port 53,
573 * but I don't know the max packet size for DNS lookups
576 /* if (so->so_fport != htons(53)) { */
577 ioctlsocket(so
->s
, FIONREAD
, &n
);
580 n
= (m
->m_data
- m
->m_dat
) + m
->m_len
+ n
+ 1;
586 m
->m_len
= recvfrom(so
->s
, m
->m_data
, len
, 0,
587 (struct sockaddr
*)&addr
, &addrlen
);
588 DEBUG_MISC((dfd
, " did recvfrom %d, errno = %d-%s\n",
589 m
->m_len
, errno
,strerror(errno
)));
591 /* Report error as ICMP */
592 switch (so
->so_lfamily
) {
595 code
= ICMP_UNREACH_PORT
;
597 if (errno
== EHOSTUNREACH
) {
598 code
= ICMP_UNREACH_HOST
;
599 } else if (errno
== ENETUNREACH
) {
600 code
= ICMP_UNREACH_NET
;
603 DEBUG_MISC((dfd
, " rx error, tx icmp ICMP_UNREACH:%i\n", code
));
604 icmp_send_error(so
->so_m
, ICMP_UNREACH
, code
, 0, strerror(errno
));
607 code
= ICMP6_UNREACH_PORT
;
609 if (errno
== EHOSTUNREACH
) {
610 code
= ICMP6_UNREACH_ADDRESS
;
611 } else if (errno
== ENETUNREACH
) {
612 code
= ICMP6_UNREACH_NO_ROUTE
;
615 DEBUG_MISC((dfd
, " rx error, tx icmp6 ICMP_UNREACH:%i\n", code
));
616 icmp6_send_error(so
->so_m
, ICMP6_UNREACH
, code
);
619 g_assert_not_reached();
625 * Hack: domain name lookup will be used the most for UDP,
626 * and since they'll only be used once there's no need
627 * for the 4 minute (or whatever) timeout... So we time them
628 * out much quicker (10 seconds for now...)
631 if (so
->so_fport
== htons(53))
632 so
->so_expire
= curtime
+ SO_EXPIREFAST
;
634 so
->so_expire
= curtime
+ SO_EXPIRE
;
638 * If this packet was destined for CTL_ADDR,
639 * make it look like that's where it came from
642 sotranslate_in(so
, &saddr
);
643 daddr
= so
->lhost
.ss
;
645 switch (so
->so_ffamily
) {
647 udp_output(so
, m
, (struct sockaddr_in
*) &saddr
,
648 (struct sockaddr_in
*) &daddr
,
652 udp6_output(so
, m
, (struct sockaddr_in6
*) &saddr
,
653 (struct sockaddr_in6
*) &daddr
);
656 g_assert_not_reached();
660 } /* if ping packet */
667 sosendto(struct socket
*so
, struct mbuf
*m
)
670 struct sockaddr_storage addr
;
672 DEBUG_CALL("sosendto");
673 DEBUG_ARG("so = %p", so
);
674 DEBUG_ARG("m = %p", m
);
677 DEBUG_CALL(" sendto()ing)");
678 sotranslate_out(so
, &addr
);
680 /* Don't care what port we get */
681 ret
= sendto(so
->s
, m
->m_data
, m
->m_len
, 0,
682 (struct sockaddr
*)&addr
, sockaddr_size(&addr
));
687 * Kill the socket if there's no reply in 4 minutes,
688 * but only if it's an expirable socket
691 so
->so_expire
= curtime
+ SO_EXPIRE
;
692 so
->so_state
&= SS_PERSISTENT_MASK
;
693 so
->so_state
|= SS_ISFCONNECTED
; /* So that it gets select()ed */
698 * Listen for incoming TCP connections
701 tcp_listen(Slirp
*slirp
, uint32_t haddr
, u_int hport
, uint32_t laddr
,
702 u_int lport
, int flags
)
704 struct sockaddr_in addr
;
707 socklen_t addrlen
= sizeof(addr
);
708 memset(&addr
, 0, addrlen
);
710 DEBUG_CALL("tcp_listen");
711 DEBUG_ARG("haddr = %s", inet_ntoa((struct in_addr
){.s_addr
= haddr
}));
712 DEBUG_ARG("hport = %d", ntohs(hport
));
713 DEBUG_ARG("laddr = %s", inet_ntoa((struct in_addr
){.s_addr
= laddr
}));
714 DEBUG_ARG("lport = %d", ntohs(lport
));
715 DEBUG_ARG("flags = %x", flags
);
717 so
= socreate(slirp
);
722 /* Don't tcp_attach... we don't need so_snd nor so_rcv */
723 if ((so
->so_tcpcb
= tcp_newtcpcb(so
)) == NULL
) {
727 insque(so
, &slirp
->tcb
);
730 * SS_FACCEPTONCE sockets must time out.
732 if (flags
& SS_FACCEPTONCE
)
733 so
->so_tcpcb
->t_timer
[TCPT_KEEP
] = TCPTV_KEEP_INIT
*2;
735 so
->so_state
&= SS_PERSISTENT_MASK
;
736 so
->so_state
|= (SS_FACCEPTCONN
| flags
);
737 so
->so_lfamily
= AF_INET
;
738 so
->so_lport
= lport
; /* Kept in network format */
739 so
->so_laddr
.s_addr
= laddr
; /* Ditto */
741 addr
.sin_family
= AF_INET
;
742 addr
.sin_addr
.s_addr
= haddr
;
743 addr
.sin_port
= hport
;
745 if (((s
= qemu_socket(AF_INET
,SOCK_STREAM
,0)) < 0) ||
746 (socket_set_fast_reuse(s
) < 0) ||
747 (bind(s
,(struct sockaddr
*)&addr
, sizeof(addr
)) < 0) ||
749 int tmperrno
= errno
; /* Don't clobber the real reason we failed */
755 /* Restore the real errno */
757 WSASetLastError(tmperrno
);
763 qemu_setsockopt(s
, SOL_SOCKET
, SO_OOBINLINE
, &opt
, sizeof(int));
765 qemu_setsockopt(s
, IPPROTO_TCP
, TCP_NODELAY
, &opt
, sizeof(int));
767 getsockname(s
,(struct sockaddr
*)&addr
,&addrlen
);
768 so
->so_ffamily
= AF_INET
;
769 so
->so_fport
= addr
.sin_port
;
770 if (addr
.sin_addr
.s_addr
== 0 || addr
.sin_addr
.s_addr
== loopback_addr
.s_addr
)
771 so
->so_faddr
= slirp
->vhost_addr
;
773 so
->so_faddr
= addr
.sin_addr
;
780 * Various session state calls
781 * XXX Should be #define's
782 * The socket state stuff needs work, these often get call 2 or 3
783 * times each when only 1 was needed
786 soisfconnecting(struct socket
*so
)
788 so
->so_state
&= ~(SS_NOFDREF
|SS_ISFCONNECTED
|SS_FCANTRCVMORE
|
789 SS_FCANTSENDMORE
|SS_FWDRAIN
);
790 so
->so_state
|= SS_ISFCONNECTING
; /* Clobber other states */
794 soisfconnected(struct socket
*so
)
796 so
->so_state
&= ~(SS_ISFCONNECTING
|SS_FWDRAIN
|SS_NOFDREF
);
797 so
->so_state
|= SS_ISFCONNECTED
; /* Clobber other states */
801 sofcantrcvmore(struct socket
*so
)
803 if ((so
->so_state
& SS_NOFDREF
) == 0) {
806 so
->so_state
&= ~(SS_ISFCONNECTING
);
807 if (so
->so_state
& SS_FCANTSENDMORE
) {
808 so
->so_state
&= SS_PERSISTENT_MASK
;
809 so
->so_state
|= SS_NOFDREF
; /* Don't select it */
811 so
->so_state
|= SS_FCANTRCVMORE
;
816 sofcantsendmore(struct socket
*so
)
818 if ((so
->so_state
& SS_NOFDREF
) == 0) {
819 shutdown(so
->s
,1); /* send FIN to fhost */
821 so
->so_state
&= ~(SS_ISFCONNECTING
);
822 if (so
->so_state
& SS_FCANTRCVMORE
) {
823 so
->so_state
&= SS_PERSISTENT_MASK
;
824 so
->so_state
|= SS_NOFDREF
; /* as above */
826 so
->so_state
|= SS_FCANTSENDMORE
;
831 * Set write drain mode
832 * Set CANTSENDMORE once all data has been write()n
835 sofwdrain(struct socket
*so
)
837 if (so
->so_rcv
.sb_cc
)
838 so
->so_state
|= SS_FWDRAIN
;
844 * Translate addr in host addr when it is a virtual address
846 void sotranslate_out(struct socket
*so
, struct sockaddr_storage
*addr
)
848 Slirp
*slirp
= so
->slirp
;
849 struct sockaddr_in
*sin
= (struct sockaddr_in
*)addr
;
850 struct sockaddr_in6
*sin6
= (struct sockaddr_in6
*)addr
;
852 switch (addr
->ss_family
) {
854 if ((so
->so_faddr
.s_addr
& slirp
->vnetwork_mask
.s_addr
) ==
855 slirp
->vnetwork_addr
.s_addr
) {
857 if (so
->so_faddr
.s_addr
== slirp
->vnameserver_addr
.s_addr
) {
858 if (get_dns_addr(&sin
->sin_addr
) < 0) {
859 sin
->sin_addr
= loopback_addr
;
862 sin
->sin_addr
= loopback_addr
;
866 DEBUG_MISC((dfd
, " addr.sin_port=%d, "
867 "addr.sin_addr.s_addr=%.16s\n",
868 ntohs(sin
->sin_port
), inet_ntoa(sin
->sin_addr
)));
872 if (in6_equal_net(&so
->so_faddr6
, &slirp
->vprefix_addr6
,
873 slirp
->vprefix_len
)) {
874 if (in6_equal(&so
->so_faddr6
, &slirp
->vnameserver_addr6
)) {
876 if (get_dns6_addr(&sin6
->sin6_addr
, &scope_id
) >= 0) {
877 sin6
->sin6_scope_id
= scope_id
;
879 sin6
->sin6_addr
= in6addr_loopback
;
882 sin6
->sin6_addr
= in6addr_loopback
;
892 void sotranslate_in(struct socket
*so
, struct sockaddr_storage
*addr
)
894 Slirp
*slirp
= so
->slirp
;
895 struct sockaddr_in
*sin
= (struct sockaddr_in
*)addr
;
896 struct sockaddr_in6
*sin6
= (struct sockaddr_in6
*)addr
;
898 switch (addr
->ss_family
) {
900 if ((so
->so_faddr
.s_addr
& slirp
->vnetwork_mask
.s_addr
) ==
901 slirp
->vnetwork_addr
.s_addr
) {
902 uint32_t inv_mask
= ~slirp
->vnetwork_mask
.s_addr
;
904 if ((so
->so_faddr
.s_addr
& inv_mask
) == inv_mask
) {
905 sin
->sin_addr
= slirp
->vhost_addr
;
906 } else if (sin
->sin_addr
.s_addr
== loopback_addr
.s_addr
||
907 so
->so_faddr
.s_addr
!= slirp
->vhost_addr
.s_addr
) {
908 sin
->sin_addr
= so
->so_faddr
;
914 if (in6_equal_net(&so
->so_faddr6
, &slirp
->vprefix_addr6
,
915 slirp
->vprefix_len
)) {
916 if (in6_equal(&sin6
->sin6_addr
, &in6addr_loopback
)
917 || !in6_equal(&so
->so_faddr6
, &slirp
->vhost_addr6
)) {
918 sin6
->sin6_addr
= so
->so_faddr6
;
929 * Translate connections from localhost to the real hostname
931 void sotranslate_accept(struct socket
*so
)
933 Slirp
*slirp
= so
->slirp
;
935 switch (so
->so_ffamily
) {
937 if (so
->so_faddr
.s_addr
== INADDR_ANY
||
938 (so
->so_faddr
.s_addr
& loopback_mask
) ==
939 (loopback_addr
.s_addr
& loopback_mask
)) {
940 so
->so_faddr
= slirp
->vhost_addr
;
945 if (in6_equal(&so
->so_faddr6
, &in6addr_any
) ||
946 in6_equal(&so
->so_faddr6
, &in6addr_loopback
)) {
947 so
->so_faddr6
= slirp
->vhost_addr6
;