2 * QEMU VNC display driver
4 * Copyright (C) 2006 Anthony Liguori <anthony@codemonkey.ws>
5 * Copyright (C) 2006 Fabrice Bellard
6 * Copyright (C) 2009 Red Hat, Inc
8 * Permission is hereby granted, free of charge, to any person obtaining a copy
9 * of this software and associated documentation files (the "Software"), to deal
10 * in the Software without restriction, including without limitation the rights
11 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
12 * copies of the Software, and to permit persons to whom the Software is
13 * furnished to do so, subject to the following conditions:
15 * The above copyright notice and this permission notice shall be included in
16 * all copies or substantial portions of the Software.
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
21 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
22 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
23 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
27 #include "qemu/osdep.h"
31 #include "sysemu/sysemu.h"
32 #include "qemu/error-report.h"
33 #include "qemu/module.h"
34 #include "qemu/option.h"
35 #include "qemu/sockets.h"
36 #include "qemu/timer.h"
37 #include "authz/list.h"
38 #include "qemu/config-file.h"
39 #include "qapi/qapi-emit-events.h"
40 #include "qapi/qapi-events-ui.h"
41 #include "qapi/error.h"
42 #include "qapi/qapi-commands-ui.h"
44 #include "crypto/hash.h"
45 #include "crypto/tlscredsanon.h"
46 #include "crypto/tlscredsx509.h"
47 #include "crypto/random.h"
48 #include "qom/object_interfaces.h"
49 #include "qemu/cutils.h"
50 #include "io/dns-resolver.h"
52 #define VNC_REFRESH_INTERVAL_BASE GUI_REFRESH_INTERVAL_DEFAULT
53 #define VNC_REFRESH_INTERVAL_INC 50
54 #define VNC_REFRESH_INTERVAL_MAX GUI_REFRESH_INTERVAL_IDLE
55 static const struct timeval VNC_REFRESH_STATS
= { 0, 500000 };
56 static const struct timeval VNC_REFRESH_LOSSY
= { 2, 0 };
58 #include "vnc_keysym.h"
59 #include "crypto/cipher.h"
61 static QTAILQ_HEAD(, VncDisplay
) vnc_displays
=
62 QTAILQ_HEAD_INITIALIZER(vnc_displays
);
64 static int vnc_cursor_define(VncState
*vs
);
65 static void vnc_update_throttle_offset(VncState
*vs
);
67 static void vnc_set_share_mode(VncState
*vs
, VncShareMode mode
)
70 static const char *mn
[] = {
72 [VNC_SHARE_MODE_CONNECTING
] = "connecting",
73 [VNC_SHARE_MODE_SHARED
] = "shared",
74 [VNC_SHARE_MODE_EXCLUSIVE
] = "exclusive",
75 [VNC_SHARE_MODE_DISCONNECTED
] = "disconnected",
77 fprintf(stderr
, "%s/%p: %s -> %s\n", __func__
,
78 vs
->ioc
, mn
[vs
->share_mode
], mn
[mode
]);
81 switch (vs
->share_mode
) {
82 case VNC_SHARE_MODE_CONNECTING
:
83 vs
->vd
->num_connecting
--;
85 case VNC_SHARE_MODE_SHARED
:
88 case VNC_SHARE_MODE_EXCLUSIVE
:
89 vs
->vd
->num_exclusive
--;
95 vs
->share_mode
= mode
;
97 switch (vs
->share_mode
) {
98 case VNC_SHARE_MODE_CONNECTING
:
99 vs
->vd
->num_connecting
++;
101 case VNC_SHARE_MODE_SHARED
:
102 vs
->vd
->num_shared
++;
104 case VNC_SHARE_MODE_EXCLUSIVE
:
105 vs
->vd
->num_exclusive
++;
113 static void vnc_init_basic_info(SocketAddress
*addr
,
117 switch (addr
->type
) {
118 case SOCKET_ADDRESS_TYPE_INET
:
119 info
->host
= g_strdup(addr
->u
.inet
.host
);
120 info
->service
= g_strdup(addr
->u
.inet
.port
);
121 if (addr
->u
.inet
.ipv6
) {
122 info
->family
= NETWORK_ADDRESS_FAMILY_IPV6
;
124 info
->family
= NETWORK_ADDRESS_FAMILY_IPV4
;
128 case SOCKET_ADDRESS_TYPE_UNIX
:
129 info
->host
= g_strdup("");
130 info
->service
= g_strdup(addr
->u
.q_unix
.path
);
131 info
->family
= NETWORK_ADDRESS_FAMILY_UNIX
;
134 case SOCKET_ADDRESS_TYPE_VSOCK
:
135 case SOCKET_ADDRESS_TYPE_FD
:
136 error_setg(errp
, "Unsupported socket address type %s",
137 SocketAddressType_str(addr
->type
));
146 static void vnc_init_basic_info_from_server_addr(QIOChannelSocket
*ioc
,
150 SocketAddress
*addr
= NULL
;
153 error_setg(errp
, "No listener socket available");
157 addr
= qio_channel_socket_get_local_address(ioc
, errp
);
162 vnc_init_basic_info(addr
, info
, errp
);
163 qapi_free_SocketAddress(addr
);
166 static void vnc_init_basic_info_from_remote_addr(QIOChannelSocket
*ioc
,
170 SocketAddress
*addr
= NULL
;
172 addr
= qio_channel_socket_get_remote_address(ioc
, errp
);
177 vnc_init_basic_info(addr
, info
, errp
);
178 qapi_free_SocketAddress(addr
);
181 static const char *vnc_auth_name(VncDisplay
*vd
) {
183 case VNC_AUTH_INVALID
:
199 case VNC_AUTH_VENCRYPT
:
200 switch (vd
->subauth
) {
201 case VNC_AUTH_VENCRYPT_PLAIN
:
202 return "vencrypt+plain";
203 case VNC_AUTH_VENCRYPT_TLSNONE
:
204 return "vencrypt+tls+none";
205 case VNC_AUTH_VENCRYPT_TLSVNC
:
206 return "vencrypt+tls+vnc";
207 case VNC_AUTH_VENCRYPT_TLSPLAIN
:
208 return "vencrypt+tls+plain";
209 case VNC_AUTH_VENCRYPT_X509NONE
:
210 return "vencrypt+x509+none";
211 case VNC_AUTH_VENCRYPT_X509VNC
:
212 return "vencrypt+x509+vnc";
213 case VNC_AUTH_VENCRYPT_X509PLAIN
:
214 return "vencrypt+x509+plain";
215 case VNC_AUTH_VENCRYPT_TLSSASL
:
216 return "vencrypt+tls+sasl";
217 case VNC_AUTH_VENCRYPT_X509SASL
:
218 return "vencrypt+x509+sasl";
228 static VncServerInfo
*vnc_server_info_get(VncDisplay
*vd
)
233 if (!vd
->listener
|| !vd
->listener
->nsioc
) {
237 info
= g_malloc0(sizeof(*info
));
238 vnc_init_basic_info_from_server_addr(vd
->listener
->sioc
[0],
239 qapi_VncServerInfo_base(info
), &err
);
240 info
->has_auth
= true;
241 info
->auth
= g_strdup(vnc_auth_name(vd
));
243 qapi_free_VncServerInfo(info
);
250 static void vnc_client_cache_auth(VncState
*client
)
257 client
->info
->x509_dname
=
258 qcrypto_tls_session_get_peer_name(client
->tls
);
259 client
->info
->has_x509_dname
=
260 client
->info
->x509_dname
!= NULL
;
262 #ifdef CONFIG_VNC_SASL
263 if (client
->sasl
.conn
&&
264 client
->sasl
.username
) {
265 client
->info
->has_sasl_username
= true;
266 client
->info
->sasl_username
= g_strdup(client
->sasl
.username
);
271 static void vnc_client_cache_addr(VncState
*client
)
275 client
->info
= g_malloc0(sizeof(*client
->info
));
276 vnc_init_basic_info_from_remote_addr(client
->sioc
,
277 qapi_VncClientInfo_base(client
->info
),
280 qapi_free_VncClientInfo(client
->info
);
286 static void vnc_qmp_event(VncState
*vs
, QAPIEvent event
)
294 si
= vnc_server_info_get(vs
->vd
);
300 case QAPI_EVENT_VNC_CONNECTED
:
301 qapi_event_send_vnc_connected(si
, qapi_VncClientInfo_base(vs
->info
));
303 case QAPI_EVENT_VNC_INITIALIZED
:
304 qapi_event_send_vnc_initialized(si
, vs
->info
);
306 case QAPI_EVENT_VNC_DISCONNECTED
:
307 qapi_event_send_vnc_disconnected(si
, vs
->info
);
313 qapi_free_VncServerInfo(si
);
316 static VncClientInfo
*qmp_query_vnc_client(const VncState
*client
)
321 info
= g_malloc0(sizeof(*info
));
323 vnc_init_basic_info_from_remote_addr(client
->sioc
,
324 qapi_VncClientInfo_base(info
),
328 qapi_free_VncClientInfo(info
);
332 info
->websocket
= client
->websocket
;
335 info
->x509_dname
= qcrypto_tls_session_get_peer_name(client
->tls
);
336 info
->has_x509_dname
= info
->x509_dname
!= NULL
;
338 #ifdef CONFIG_VNC_SASL
339 if (client
->sasl
.conn
&& client
->sasl
.username
) {
340 info
->has_sasl_username
= true;
341 info
->sasl_username
= g_strdup(client
->sasl
.username
);
348 static VncDisplay
*vnc_display_find(const char *id
)
353 return QTAILQ_FIRST(&vnc_displays
);
355 QTAILQ_FOREACH(vd
, &vnc_displays
, next
) {
356 if (strcmp(id
, vd
->id
) == 0) {
363 static VncClientInfoList
*qmp_query_client_list(VncDisplay
*vd
)
365 VncClientInfoList
*cinfo
, *prev
= NULL
;
368 QTAILQ_FOREACH(client
, &vd
->clients
, next
) {
369 cinfo
= g_new0(VncClientInfoList
, 1);
370 cinfo
->value
= qmp_query_vnc_client(client
);
377 VncInfo
*qmp_query_vnc(Error
**errp
)
379 VncInfo
*info
= g_malloc0(sizeof(*info
));
380 VncDisplay
*vd
= vnc_display_find(NULL
);
381 SocketAddress
*addr
= NULL
;
383 if (vd
== NULL
|| !vd
->listener
|| !vd
->listener
->nsioc
) {
384 info
->enabled
= false;
386 info
->enabled
= true;
388 /* for compatibility with the original command */
389 info
->has_clients
= true;
390 info
->clients
= qmp_query_client_list(vd
);
392 addr
= qio_channel_socket_get_local_address(vd
->listener
->sioc
[0],
398 switch (addr
->type
) {
399 case SOCKET_ADDRESS_TYPE_INET
:
400 info
->host
= g_strdup(addr
->u
.inet
.host
);
401 info
->service
= g_strdup(addr
->u
.inet
.port
);
402 if (addr
->u
.inet
.ipv6
) {
403 info
->family
= NETWORK_ADDRESS_FAMILY_IPV6
;
405 info
->family
= NETWORK_ADDRESS_FAMILY_IPV4
;
409 case SOCKET_ADDRESS_TYPE_UNIX
:
410 info
->host
= g_strdup("");
411 info
->service
= g_strdup(addr
->u
.q_unix
.path
);
412 info
->family
= NETWORK_ADDRESS_FAMILY_UNIX
;
415 case SOCKET_ADDRESS_TYPE_VSOCK
:
416 case SOCKET_ADDRESS_TYPE_FD
:
417 error_setg(errp
, "Unsupported socket address type %s",
418 SocketAddressType_str(addr
->type
));
424 info
->has_host
= true;
425 info
->has_service
= true;
426 info
->has_family
= true;
428 info
->has_auth
= true;
429 info
->auth
= g_strdup(vnc_auth_name(vd
));
432 qapi_free_SocketAddress(addr
);
436 qapi_free_SocketAddress(addr
);
437 qapi_free_VncInfo(info
);
442 static void qmp_query_auth(int auth
, int subauth
,
443 VncPrimaryAuth
*qmp_auth
,
444 VncVencryptSubAuth
*qmp_vencrypt
,
445 bool *qmp_has_vencrypt
);
447 static VncServerInfo2List
*qmp_query_server_entry(QIOChannelSocket
*ioc
,
451 VncServerInfo2List
*prev
)
453 VncServerInfo2List
*list
;
454 VncServerInfo2
*info
;
458 addr
= qio_channel_socket_get_local_address(ioc
, &err
);
464 info
= g_new0(VncServerInfo2
, 1);
465 vnc_init_basic_info(addr
, qapi_VncServerInfo2_base(info
), &err
);
466 qapi_free_SocketAddress(addr
);
468 qapi_free_VncServerInfo2(info
);
472 info
->websocket
= websocket
;
474 qmp_query_auth(auth
, subauth
, &info
->auth
,
475 &info
->vencrypt
, &info
->has_vencrypt
);
477 list
= g_new0(VncServerInfo2List
, 1);
483 static void qmp_query_auth(int auth
, int subauth
,
484 VncPrimaryAuth
*qmp_auth
,
485 VncVencryptSubAuth
*qmp_vencrypt
,
486 bool *qmp_has_vencrypt
)
490 *qmp_auth
= VNC_PRIMARY_AUTH_VNC
;
493 *qmp_auth
= VNC_PRIMARY_AUTH_RA2
;
496 *qmp_auth
= VNC_PRIMARY_AUTH_RA2NE
;
499 *qmp_auth
= VNC_PRIMARY_AUTH_TIGHT
;
502 *qmp_auth
= VNC_PRIMARY_AUTH_ULTRA
;
505 *qmp_auth
= VNC_PRIMARY_AUTH_TLS
;
507 case VNC_AUTH_VENCRYPT
:
508 *qmp_auth
= VNC_PRIMARY_AUTH_VENCRYPT
;
509 *qmp_has_vencrypt
= true;
511 case VNC_AUTH_VENCRYPT_PLAIN
:
512 *qmp_vencrypt
= VNC_VENCRYPT_SUB_AUTH_PLAIN
;
514 case VNC_AUTH_VENCRYPT_TLSNONE
:
515 *qmp_vencrypt
= VNC_VENCRYPT_SUB_AUTH_TLS_NONE
;
517 case VNC_AUTH_VENCRYPT_TLSVNC
:
518 *qmp_vencrypt
= VNC_VENCRYPT_SUB_AUTH_TLS_VNC
;
520 case VNC_AUTH_VENCRYPT_TLSPLAIN
:
521 *qmp_vencrypt
= VNC_VENCRYPT_SUB_AUTH_TLS_PLAIN
;
523 case VNC_AUTH_VENCRYPT_X509NONE
:
524 *qmp_vencrypt
= VNC_VENCRYPT_SUB_AUTH_X509_NONE
;
526 case VNC_AUTH_VENCRYPT_X509VNC
:
527 *qmp_vencrypt
= VNC_VENCRYPT_SUB_AUTH_X509_VNC
;
529 case VNC_AUTH_VENCRYPT_X509PLAIN
:
530 *qmp_vencrypt
= VNC_VENCRYPT_SUB_AUTH_X509_PLAIN
;
532 case VNC_AUTH_VENCRYPT_TLSSASL
:
533 *qmp_vencrypt
= VNC_VENCRYPT_SUB_AUTH_TLS_SASL
;
535 case VNC_AUTH_VENCRYPT_X509SASL
:
536 *qmp_vencrypt
= VNC_VENCRYPT_SUB_AUTH_X509_SASL
;
539 *qmp_has_vencrypt
= false;
544 *qmp_auth
= VNC_PRIMARY_AUTH_SASL
;
548 *qmp_auth
= VNC_PRIMARY_AUTH_NONE
;
553 VncInfo2List
*qmp_query_vnc_servers(Error
**errp
)
555 VncInfo2List
*item
, *prev
= NULL
;
561 QTAILQ_FOREACH(vd
, &vnc_displays
, next
) {
562 info
= g_new0(VncInfo2
, 1);
563 info
->id
= g_strdup(vd
->id
);
564 info
->clients
= qmp_query_client_list(vd
);
565 qmp_query_auth(vd
->auth
, vd
->subauth
, &info
->auth
,
566 &info
->vencrypt
, &info
->has_vencrypt
);
568 dev
= DEVICE(object_property_get_link(OBJECT(vd
->dcl
.con
),
570 info
->has_display
= true;
571 info
->display
= g_strdup(dev
->id
);
573 for (i
= 0; vd
->listener
!= NULL
&& i
< vd
->listener
->nsioc
; i
++) {
574 info
->server
= qmp_query_server_entry(
575 vd
->listener
->sioc
[i
], false, vd
->auth
, vd
->subauth
,
578 for (i
= 0; vd
->wslistener
!= NULL
&& i
< vd
->wslistener
->nsioc
; i
++) {
579 info
->server
= qmp_query_server_entry(
580 vd
->wslistener
->sioc
[i
], true, vd
->ws_auth
,
581 vd
->ws_subauth
, info
->server
);
584 item
= g_new0(VncInfo2List
, 1);
593 1) Get the queue working for IO.
594 2) there is some weirdness when using the -S option (the screen is grey
595 and not totally invalidated
596 3) resolutions > 1024
599 static int vnc_update_client(VncState
*vs
, int has_dirty
);
600 static void vnc_disconnect_start(VncState
*vs
);
602 static void vnc_colordepth(VncState
*vs
);
603 static void framebuffer_update_request(VncState
*vs
, int incremental
,
604 int x_position
, int y_position
,
606 static void vnc_refresh(DisplayChangeListener
*dcl
);
607 static int vnc_refresh_server_surface(VncDisplay
*vd
);
609 static int vnc_width(VncDisplay
*vd
)
611 return MIN(VNC_MAX_WIDTH
, ROUND_UP(surface_width(vd
->ds
),
612 VNC_DIRTY_PIXELS_PER_BIT
));
615 static int vnc_height(VncDisplay
*vd
)
617 return MIN(VNC_MAX_HEIGHT
, surface_height(vd
->ds
));
620 static void vnc_set_area_dirty(DECLARE_BITMAP(dirty
[VNC_MAX_HEIGHT
],
621 VNC_MAX_WIDTH
/ VNC_DIRTY_PIXELS_PER_BIT
),
623 int x
, int y
, int w
, int h
)
625 int width
= vnc_width(vd
);
626 int height
= vnc_height(vd
);
628 /* this is needed this to ensure we updated all affected
629 * blocks if x % VNC_DIRTY_PIXELS_PER_BIT != 0 */
630 w
+= (x
% VNC_DIRTY_PIXELS_PER_BIT
);
631 x
-= (x
% VNC_DIRTY_PIXELS_PER_BIT
);
635 w
= MIN(x
+ w
, width
) - x
;
636 h
= MIN(y
+ h
, height
);
639 bitmap_set(dirty
[y
], x
/ VNC_DIRTY_PIXELS_PER_BIT
,
640 DIV_ROUND_UP(w
, VNC_DIRTY_PIXELS_PER_BIT
));
644 static void vnc_dpy_update(DisplayChangeListener
*dcl
,
645 int x
, int y
, int w
, int h
)
647 VncDisplay
*vd
= container_of(dcl
, VncDisplay
, dcl
);
648 struct VncSurface
*s
= &vd
->guest
;
650 vnc_set_area_dirty(s
->dirty
, vd
, x
, y
, w
, h
);
653 void vnc_framebuffer_update(VncState
*vs
, int x
, int y
, int w
, int h
,
656 vnc_write_u16(vs
, x
);
657 vnc_write_u16(vs
, y
);
658 vnc_write_u16(vs
, w
);
659 vnc_write_u16(vs
, h
);
661 vnc_write_s32(vs
, encoding
);
665 static void vnc_desktop_resize(VncState
*vs
)
667 if (vs
->ioc
== NULL
|| !vnc_has_feature(vs
, VNC_FEATURE_RESIZE
)) {
670 if (vs
->client_width
== pixman_image_get_width(vs
->vd
->server
) &&
671 vs
->client_height
== pixman_image_get_height(vs
->vd
->server
)) {
675 assert(pixman_image_get_width(vs
->vd
->server
) < 65536 &&
676 pixman_image_get_width(vs
->vd
->server
) >= 0);
677 assert(pixman_image_get_height(vs
->vd
->server
) < 65536 &&
678 pixman_image_get_height(vs
->vd
->server
) >= 0);
679 vs
->client_width
= pixman_image_get_width(vs
->vd
->server
);
680 vs
->client_height
= pixman_image_get_height(vs
->vd
->server
);
682 vnc_write_u8(vs
, VNC_MSG_SERVER_FRAMEBUFFER_UPDATE
);
684 vnc_write_u16(vs
, 1); /* number of rects */
685 vnc_framebuffer_update(vs
, 0, 0, vs
->client_width
, vs
->client_height
,
686 VNC_ENCODING_DESKTOPRESIZE
);
687 vnc_unlock_output(vs
);
691 static void vnc_abort_display_jobs(VncDisplay
*vd
)
695 QTAILQ_FOREACH(vs
, &vd
->clients
, next
) {
698 vnc_unlock_output(vs
);
700 QTAILQ_FOREACH(vs
, &vd
->clients
, next
) {
703 QTAILQ_FOREACH(vs
, &vd
->clients
, next
) {
705 if (vs
->update
== VNC_STATE_UPDATE_NONE
&&
706 vs
->job_update
!= VNC_STATE_UPDATE_NONE
) {
707 /* job aborted before completion */
708 vs
->update
= vs
->job_update
;
709 vs
->job_update
= VNC_STATE_UPDATE_NONE
;
712 vnc_unlock_output(vs
);
716 int vnc_server_fb_stride(VncDisplay
*vd
)
718 return pixman_image_get_stride(vd
->server
);
721 void *vnc_server_fb_ptr(VncDisplay
*vd
, int x
, int y
)
725 ptr
= (uint8_t *)pixman_image_get_data(vd
->server
);
726 ptr
+= y
* vnc_server_fb_stride(vd
);
727 ptr
+= x
* VNC_SERVER_FB_BYTES
;
731 static void vnc_update_server_surface(VncDisplay
*vd
)
735 qemu_pixman_image_unref(vd
->server
);
738 if (QTAILQ_EMPTY(&vd
->clients
)) {
742 width
= vnc_width(vd
);
743 height
= vnc_height(vd
);
744 vd
->server
= pixman_image_create_bits(VNC_SERVER_FB_FORMAT
,
748 memset(vd
->guest
.dirty
, 0x00, sizeof(vd
->guest
.dirty
));
749 vnc_set_area_dirty(vd
->guest
.dirty
, vd
, 0, 0,
753 static bool vnc_check_pageflip(DisplaySurface
*s1
,
756 return (s1
!= NULL
&&
758 surface_width(s1
) == surface_width(s2
) &&
759 surface_height(s1
) == surface_height(s2
) &&
760 surface_format(s1
) == surface_format(s2
));
764 static void vnc_dpy_switch(DisplayChangeListener
*dcl
,
765 DisplaySurface
*surface
)
767 static const char placeholder_msg
[] =
768 "Display output is not active.";
769 static DisplaySurface
*placeholder
;
770 VncDisplay
*vd
= container_of(dcl
, VncDisplay
, dcl
);
771 bool pageflip
= vnc_check_pageflip(vd
->ds
, surface
);
774 if (surface
== NULL
) {
775 if (placeholder
== NULL
) {
776 placeholder
= qemu_create_message_surface(640, 480, placeholder_msg
);
778 surface
= placeholder
;
781 vnc_abort_display_jobs(vd
);
785 qemu_pixman_image_unref(vd
->guest
.fb
);
786 vd
->guest
.fb
= pixman_image_ref(surface
->image
);
787 vd
->guest
.format
= surface
->format
;
790 vnc_set_area_dirty(vd
->guest
.dirty
, vd
, 0, 0,
791 surface_width(surface
),
792 surface_height(surface
));
797 vnc_update_server_surface(vd
);
799 QTAILQ_FOREACH(vs
, &vd
->clients
, next
) {
801 vnc_desktop_resize(vs
);
802 if (vs
->vd
->cursor
) {
803 vnc_cursor_define(vs
);
805 memset(vs
->dirty
, 0x00, sizeof(vs
->dirty
));
806 vnc_set_area_dirty(vs
->dirty
, vd
, 0, 0,
809 vnc_update_throttle_offset(vs
);
814 static void vnc_write_pixels_copy(VncState
*vs
,
815 void *pixels
, int size
)
817 vnc_write(vs
, pixels
, size
);
820 /* slowest but generic code. */
821 void vnc_convert_pixel(VncState
*vs
, uint8_t *buf
, uint32_t v
)
825 #if VNC_SERVER_FB_FORMAT == PIXMAN_FORMAT(32, PIXMAN_TYPE_ARGB, 0, 8, 8, 8)
826 r
= (((v
& 0x00ff0000) >> 16) << vs
->client_pf
.rbits
) >> 8;
827 g
= (((v
& 0x0000ff00) >> 8) << vs
->client_pf
.gbits
) >> 8;
828 b
= (((v
& 0x000000ff) >> 0) << vs
->client_pf
.bbits
) >> 8;
830 # error need some bits here if you change VNC_SERVER_FB_FORMAT
832 v
= (r
<< vs
->client_pf
.rshift
) |
833 (g
<< vs
->client_pf
.gshift
) |
834 (b
<< vs
->client_pf
.bshift
);
835 switch (vs
->client_pf
.bytes_per_pixel
) {
865 static void vnc_write_pixels_generic(VncState
*vs
,
866 void *pixels1
, int size
)
870 if (VNC_SERVER_FB_BYTES
== 4) {
871 uint32_t *pixels
= pixels1
;
874 for (i
= 0; i
< n
; i
++) {
875 vnc_convert_pixel(vs
, buf
, pixels
[i
]);
876 vnc_write(vs
, buf
, vs
->client_pf
.bytes_per_pixel
);
881 int vnc_raw_send_framebuffer_update(VncState
*vs
, int x
, int y
, int w
, int h
)
885 VncDisplay
*vd
= vs
->vd
;
887 row
= vnc_server_fb_ptr(vd
, x
, y
);
888 for (i
= 0; i
< h
; i
++) {
889 vs
->write_pixels(vs
, row
, w
* VNC_SERVER_FB_BYTES
);
890 row
+= vnc_server_fb_stride(vd
);
895 int vnc_send_framebuffer_update(VncState
*vs
, int x
, int y
, int w
, int h
)
898 bool encode_raw
= false;
899 size_t saved_offs
= vs
->output
.offset
;
901 switch(vs
->vnc_encoding
) {
902 case VNC_ENCODING_ZLIB
:
903 n
= vnc_zlib_send_framebuffer_update(vs
, x
, y
, w
, h
);
905 case VNC_ENCODING_HEXTILE
:
906 vnc_framebuffer_update(vs
, x
, y
, w
, h
, VNC_ENCODING_HEXTILE
);
907 n
= vnc_hextile_send_framebuffer_update(vs
, x
, y
, w
, h
);
909 case VNC_ENCODING_TIGHT
:
910 n
= vnc_tight_send_framebuffer_update(vs
, x
, y
, w
, h
);
912 case VNC_ENCODING_TIGHT_PNG
:
913 n
= vnc_tight_png_send_framebuffer_update(vs
, x
, y
, w
, h
);
915 case VNC_ENCODING_ZRLE
:
916 n
= vnc_zrle_send_framebuffer_update(vs
, x
, y
, w
, h
);
918 case VNC_ENCODING_ZYWRLE
:
919 n
= vnc_zywrle_send_framebuffer_update(vs
, x
, y
, w
, h
);
926 /* If the client has the same pixel format as our internal buffer and
927 * a RAW encoding would need less space fall back to RAW encoding to
928 * save bandwidth and processing power in the client. */
929 if (!encode_raw
&& vs
->write_pixels
== vnc_write_pixels_copy
&&
930 12 + h
* w
* VNC_SERVER_FB_BYTES
<= (vs
->output
.offset
- saved_offs
)) {
931 vs
->output
.offset
= saved_offs
;
936 vnc_framebuffer_update(vs
, x
, y
, w
, h
, VNC_ENCODING_RAW
);
937 n
= vnc_raw_send_framebuffer_update(vs
, x
, y
, w
, h
);
943 static void vnc_mouse_set(DisplayChangeListener
*dcl
,
944 int x
, int y
, int visible
)
946 /* can we ask the client(s) to move the pointer ??? */
949 static int vnc_cursor_define(VncState
*vs
)
951 QEMUCursor
*c
= vs
->vd
->cursor
;
954 if (vnc_has_feature(vs
, VNC_FEATURE_RICH_CURSOR
)) {
956 vnc_write_u8(vs
, VNC_MSG_SERVER_FRAMEBUFFER_UPDATE
);
957 vnc_write_u8(vs
, 0); /* padding */
958 vnc_write_u16(vs
, 1); /* # of rects */
959 vnc_framebuffer_update(vs
, c
->hot_x
, c
->hot_y
, c
->width
, c
->height
,
960 VNC_ENCODING_RICH_CURSOR
);
961 isize
= c
->width
* c
->height
* vs
->client_pf
.bytes_per_pixel
;
962 vnc_write_pixels_generic(vs
, c
->data
, isize
);
963 vnc_write(vs
, vs
->vd
->cursor_mask
, vs
->vd
->cursor_msize
);
964 vnc_unlock_output(vs
);
970 static void vnc_dpy_cursor_define(DisplayChangeListener
*dcl
,
973 VncDisplay
*vd
= container_of(dcl
, VncDisplay
, dcl
);
976 cursor_put(vd
->cursor
);
977 g_free(vd
->cursor_mask
);
980 cursor_get(vd
->cursor
);
981 vd
->cursor_msize
= cursor_get_mono_bpl(c
) * c
->height
;
982 vd
->cursor_mask
= g_malloc0(vd
->cursor_msize
);
983 cursor_get_mono_mask(c
, 0, vd
->cursor_mask
);
985 QTAILQ_FOREACH(vs
, &vd
->clients
, next
) {
986 vnc_cursor_define(vs
);
990 static int find_and_clear_dirty_height(VncState
*vs
,
991 int y
, int last_x
, int x
, int height
)
995 for (h
= 1; h
< (height
- y
); h
++) {
996 if (!test_bit(last_x
, vs
->dirty
[y
+ h
])) {
999 bitmap_clear(vs
->dirty
[y
+ h
], last_x
, x
- last_x
);
1006 * Figure out how much pending data we should allow in the output
1007 * buffer before we throttle incremental display updates, and/or
1008 * drop audio samples.
1010 * We allow for equiv of 1 full display's worth of FB updates,
1011 * and 1 second of audio samples. If audio backlog was larger
1012 * than that the client would already suffering awful audio
1013 * glitches, so dropping samples is no worse really).
1015 static void vnc_update_throttle_offset(VncState
*vs
)
1018 vs
->client_width
* vs
->client_height
* vs
->client_pf
.bytes_per_pixel
;
1020 if (vs
->audio_cap
) {
1022 switch (vs
->as
.fmt
) {
1024 case AUDIO_FORMAT_U8
:
1025 case AUDIO_FORMAT_S8
:
1028 case AUDIO_FORMAT_U16
:
1029 case AUDIO_FORMAT_S16
:
1032 case AUDIO_FORMAT_U32
:
1033 case AUDIO_FORMAT_S32
:
1037 offset
+= vs
->as
.freq
* bps
* vs
->as
.nchannels
;
1040 /* Put a floor of 1MB on offset, so that if we have a large pending
1041 * buffer and the display is resized to a small size & back again
1042 * we don't suddenly apply a tiny send limit
1044 offset
= MAX(offset
, 1024 * 1024);
1046 if (vs
->throttle_output_offset
!= offset
) {
1047 trace_vnc_client_throttle_threshold(
1048 vs
, vs
->ioc
, vs
->throttle_output_offset
, offset
, vs
->client_width
,
1049 vs
->client_height
, vs
->client_pf
.bytes_per_pixel
, vs
->audio_cap
);
1052 vs
->throttle_output_offset
= offset
;
1055 static bool vnc_should_update(VncState
*vs
)
1057 switch (vs
->update
) {
1058 case VNC_STATE_UPDATE_NONE
:
1060 case VNC_STATE_UPDATE_INCREMENTAL
:
1061 /* Only allow incremental updates if the pending send queue
1062 * is less than the permitted threshold, and the job worker
1063 * is completely idle.
1065 if (vs
->output
.offset
< vs
->throttle_output_offset
&&
1066 vs
->job_update
== VNC_STATE_UPDATE_NONE
) {
1069 trace_vnc_client_throttle_incremental(
1070 vs
, vs
->ioc
, vs
->job_update
, vs
->output
.offset
);
1072 case VNC_STATE_UPDATE_FORCE
:
1073 /* Only allow forced updates if the pending send queue
1074 * does not contain a previous forced update, and the
1075 * job worker is completely idle.
1077 * Note this means we'll queue a forced update, even if
1078 * the output buffer size is otherwise over the throttle
1081 if (vs
->force_update_offset
== 0 &&
1082 vs
->job_update
== VNC_STATE_UPDATE_NONE
) {
1085 trace_vnc_client_throttle_forced(
1086 vs
, vs
->ioc
, vs
->job_update
, vs
->force_update_offset
);
1092 static int vnc_update_client(VncState
*vs
, int has_dirty
)
1094 VncDisplay
*vd
= vs
->vd
;
1100 if (vs
->disconnecting
) {
1101 vnc_disconnect_finish(vs
);
1105 vs
->has_dirty
+= has_dirty
;
1106 if (!vnc_should_update(vs
)) {
1110 if (!vs
->has_dirty
&& vs
->update
!= VNC_STATE_UPDATE_FORCE
) {
1115 * Send screen updates to the vnc client using the server
1116 * surface and server dirty map. guest surface updates
1117 * happening in parallel don't disturb us, the next pass will
1118 * send them to the client.
1120 job
= vnc_job_new(vs
);
1122 height
= pixman_image_get_height(vd
->server
);
1123 width
= pixman_image_get_width(vd
->server
);
1129 unsigned long offset
= find_next_bit((unsigned long *) &vs
->dirty
,
1130 height
* VNC_DIRTY_BPL(vs
),
1131 y
* VNC_DIRTY_BPL(vs
));
1132 if (offset
== height
* VNC_DIRTY_BPL(vs
)) {
1133 /* no more dirty bits */
1136 y
= offset
/ VNC_DIRTY_BPL(vs
);
1137 x
= offset
% VNC_DIRTY_BPL(vs
);
1138 x2
= find_next_zero_bit((unsigned long *) &vs
->dirty
[y
],
1139 VNC_DIRTY_BPL(vs
), x
);
1140 bitmap_clear(vs
->dirty
[y
], x
, x2
- x
);
1141 h
= find_and_clear_dirty_height(vs
, y
, x
, x2
, height
);
1142 x2
= MIN(x2
, width
/ VNC_DIRTY_PIXELS_PER_BIT
);
1144 n
+= vnc_job_add_rect(job
, x
* VNC_DIRTY_PIXELS_PER_BIT
, y
,
1145 (x2
- x
) * VNC_DIRTY_PIXELS_PER_BIT
, h
);
1147 if (!x
&& x2
== width
/ VNC_DIRTY_PIXELS_PER_BIT
) {
1155 vs
->job_update
= vs
->update
;
1156 vs
->update
= VNC_STATE_UPDATE_NONE
;
1163 static void audio_capture_notify(void *opaque
, audcnotification_e cmd
)
1165 VncState
*vs
= opaque
;
1167 assert(vs
->magic
== VNC_MAGIC
);
1169 case AUD_CNOTIFY_DISABLE
:
1170 vnc_lock_output(vs
);
1171 vnc_write_u8(vs
, VNC_MSG_SERVER_QEMU
);
1172 vnc_write_u8(vs
, VNC_MSG_SERVER_QEMU_AUDIO
);
1173 vnc_write_u16(vs
, VNC_MSG_SERVER_QEMU_AUDIO_END
);
1174 vnc_unlock_output(vs
);
1178 case AUD_CNOTIFY_ENABLE
:
1179 vnc_lock_output(vs
);
1180 vnc_write_u8(vs
, VNC_MSG_SERVER_QEMU
);
1181 vnc_write_u8(vs
, VNC_MSG_SERVER_QEMU_AUDIO
);
1182 vnc_write_u16(vs
, VNC_MSG_SERVER_QEMU_AUDIO_BEGIN
);
1183 vnc_unlock_output(vs
);
1189 static void audio_capture_destroy(void *opaque
)
1193 static void audio_capture(void *opaque
, void *buf
, int size
)
1195 VncState
*vs
= opaque
;
1197 assert(vs
->magic
== VNC_MAGIC
);
1198 vnc_lock_output(vs
);
1199 if (vs
->output
.offset
< vs
->throttle_output_offset
) {
1200 vnc_write_u8(vs
, VNC_MSG_SERVER_QEMU
);
1201 vnc_write_u8(vs
, VNC_MSG_SERVER_QEMU_AUDIO
);
1202 vnc_write_u16(vs
, VNC_MSG_SERVER_QEMU_AUDIO_DATA
);
1203 vnc_write_u32(vs
, size
);
1204 vnc_write(vs
, buf
, size
);
1206 trace_vnc_client_throttle_audio(vs
, vs
->ioc
, vs
->output
.offset
);
1208 vnc_unlock_output(vs
);
1212 static void audio_add(VncState
*vs
)
1214 struct audio_capture_ops ops
;
1216 if (vs
->audio_cap
) {
1217 error_report("audio already running");
1221 ops
.notify
= audio_capture_notify
;
1222 ops
.destroy
= audio_capture_destroy
;
1223 ops
.capture
= audio_capture
;
1225 vs
->audio_cap
= AUD_add_capture(&vs
->as
, &ops
, vs
);
1226 if (!vs
->audio_cap
) {
1227 error_report("Failed to add audio capture");
1231 static void audio_del(VncState
*vs
)
1233 if (vs
->audio_cap
) {
1234 AUD_del_capture(vs
->audio_cap
, vs
);
1235 vs
->audio_cap
= NULL
;
1239 static void vnc_disconnect_start(VncState
*vs
)
1241 if (vs
->disconnecting
) {
1244 trace_vnc_client_disconnect_start(vs
, vs
->ioc
);
1245 vnc_set_share_mode(vs
, VNC_SHARE_MODE_DISCONNECTED
);
1247 g_source_remove(vs
->ioc_tag
);
1250 qio_channel_close(vs
->ioc
, NULL
);
1251 vs
->disconnecting
= TRUE
;
1254 void vnc_disconnect_finish(VncState
*vs
)
1258 trace_vnc_client_disconnect_finish(vs
, vs
->ioc
);
1260 vnc_jobs_join(vs
); /* Wait encoding jobs */
1262 vnc_lock_output(vs
);
1263 vnc_qmp_event(vs
, QAPI_EVENT_VNC_DISCONNECTED
);
1265 buffer_free(&vs
->input
);
1266 buffer_free(&vs
->output
);
1268 qapi_free_VncClientInfo(vs
->info
);
1271 vnc_tight_clear(vs
);
1274 #ifdef CONFIG_VNC_SASL
1275 vnc_sasl_client_cleanup(vs
);
1276 #endif /* CONFIG_VNC_SASL */
1278 qkbd_state_lift_all_keys(vs
->vd
->kbd
);
1280 if (vs
->mouse_mode_notifier
.notify
!= NULL
) {
1281 qemu_remove_mouse_mode_change_notifier(&vs
->mouse_mode_notifier
);
1283 QTAILQ_REMOVE(&vs
->vd
->clients
, vs
, next
);
1284 if (QTAILQ_EMPTY(&vs
->vd
->clients
)) {
1285 /* last client gone */
1286 vnc_update_server_surface(vs
->vd
);
1289 vnc_unlock_output(vs
);
1291 qemu_mutex_destroy(&vs
->output_mutex
);
1292 if (vs
->bh
!= NULL
) {
1293 qemu_bh_delete(vs
->bh
);
1295 buffer_free(&vs
->jobs_buffer
);
1297 for (i
= 0; i
< VNC_STAT_ROWS
; ++i
) {
1298 g_free(vs
->lossy_rect
[i
]);
1300 g_free(vs
->lossy_rect
);
1302 object_unref(OBJECT(vs
->ioc
));
1304 object_unref(OBJECT(vs
->sioc
));
1310 size_t vnc_client_io_error(VncState
*vs
, ssize_t ret
, Error
**errp
)
1314 trace_vnc_client_eof(vs
, vs
->ioc
);
1315 vnc_disconnect_start(vs
);
1316 } else if (ret
!= QIO_CHANNEL_ERR_BLOCK
) {
1317 trace_vnc_client_io_error(vs
, vs
->ioc
,
1318 errp
? error_get_pretty(*errp
) :
1320 vnc_disconnect_start(vs
);
1333 void vnc_client_error(VncState
*vs
)
1335 VNC_DEBUG("Closing down client sock: protocol error\n");
1336 vnc_disconnect_start(vs
);
1341 * Called to write a chunk of data to the client socket. The data may
1342 * be the raw data, or may have already been encoded by SASL.
1343 * The data will be written either straight onto the socket, or
1344 * written via the GNUTLS wrappers, if TLS/SSL encryption is enabled
1346 * NB, it is theoretically possible to have 2 layers of encryption,
1347 * both SASL, and this TLS layer. It is highly unlikely in practice
1348 * though, since SASL encryption will typically be a no-op if TLS
1351 * Returns the number of bytes written, which may be less than
1352 * the requested 'datalen' if the socket would block. Returns
1353 * 0 on I/O error, and disconnects the client socket.
1355 size_t vnc_client_write_buf(VncState
*vs
, const uint8_t *data
, size_t datalen
)
1359 ret
= qio_channel_write(
1360 vs
->ioc
, (const char *)data
, datalen
, &err
);
1361 VNC_DEBUG("Wrote wire %p %zd -> %ld\n", data
, datalen
, ret
);
1362 return vnc_client_io_error(vs
, ret
, &err
);
1367 * Called to write buffered data to the client socket, when not
1368 * using any SASL SSF encryption layers. Will write as much data
1369 * as possible without blocking. If all buffered data is written,
1370 * will switch the FD poll() handler back to read monitoring.
1372 * Returns the number of bytes written, which may be less than
1373 * the buffered output data if the socket would block. Returns
1374 * 0 on I/O error, and disconnects the client socket.
1376 static size_t vnc_client_write_plain(VncState
*vs
)
1381 #ifdef CONFIG_VNC_SASL
1382 VNC_DEBUG("Write Plain: Pending output %p size %zd offset %zd. Wait SSF %d\n",
1383 vs
->output
.buffer
, vs
->output
.capacity
, vs
->output
.offset
,
1384 vs
->sasl
.waitWriteSSF
);
1386 if (vs
->sasl
.conn
&&
1388 vs
->sasl
.waitWriteSSF
) {
1389 ret
= vnc_client_write_buf(vs
, vs
->output
.buffer
, vs
->sasl
.waitWriteSSF
);
1391 vs
->sasl
.waitWriteSSF
-= ret
;
1393 #endif /* CONFIG_VNC_SASL */
1394 ret
= vnc_client_write_buf(vs
, vs
->output
.buffer
, vs
->output
.offset
);
1398 if (ret
>= vs
->force_update_offset
) {
1399 if (vs
->force_update_offset
!= 0) {
1400 trace_vnc_client_unthrottle_forced(vs
, vs
->ioc
);
1402 vs
->force_update_offset
= 0;
1404 vs
->force_update_offset
-= ret
;
1406 offset
= vs
->output
.offset
;
1407 buffer_advance(&vs
->output
, ret
);
1408 if (offset
>= vs
->throttle_output_offset
&&
1409 vs
->output
.offset
< vs
->throttle_output_offset
) {
1410 trace_vnc_client_unthrottle_incremental(vs
, vs
->ioc
, vs
->output
.offset
);
1413 if (vs
->output
.offset
== 0) {
1415 g_source_remove(vs
->ioc_tag
);
1417 vs
->ioc_tag
= qio_channel_add_watch(
1418 vs
->ioc
, G_IO_IN
, vnc_client_io
, vs
, NULL
);
1426 * First function called whenever there is data to be written to
1427 * the client socket. Will delegate actual work according to whether
1428 * SASL SSF layers are enabled (thus requiring encryption calls)
1430 static void vnc_client_write_locked(VncState
*vs
)
1432 #ifdef CONFIG_VNC_SASL
1433 if (vs
->sasl
.conn
&&
1435 !vs
->sasl
.waitWriteSSF
) {
1436 vnc_client_write_sasl(vs
);
1438 #endif /* CONFIG_VNC_SASL */
1440 vnc_client_write_plain(vs
);
1444 static void vnc_client_write(VncState
*vs
)
1446 assert(vs
->magic
== VNC_MAGIC
);
1447 vnc_lock_output(vs
);
1448 if (vs
->output
.offset
) {
1449 vnc_client_write_locked(vs
);
1450 } else if (vs
->ioc
!= NULL
) {
1452 g_source_remove(vs
->ioc_tag
);
1454 vs
->ioc_tag
= qio_channel_add_watch(
1455 vs
->ioc
, G_IO_IN
, vnc_client_io
, vs
, NULL
);
1457 vnc_unlock_output(vs
);
1460 void vnc_read_when(VncState
*vs
, VncReadEvent
*func
, size_t expecting
)
1462 vs
->read_handler
= func
;
1463 vs
->read_handler_expect
= expecting
;
1468 * Called to read a chunk of data from the client socket. The data may
1469 * be the raw data, or may need to be further decoded by SASL.
1470 * The data will be read either straight from to the socket, or
1471 * read via the GNUTLS wrappers, if TLS/SSL encryption is enabled
1473 * NB, it is theoretically possible to have 2 layers of encryption,
1474 * both SASL, and this TLS layer. It is highly unlikely in practice
1475 * though, since SASL encryption will typically be a no-op if TLS
1478 * Returns the number of bytes read, which may be less than
1479 * the requested 'datalen' if the socket would block. Returns
1480 * 0 on I/O error or EOF, and disconnects the client socket.
1482 size_t vnc_client_read_buf(VncState
*vs
, uint8_t *data
, size_t datalen
)
1486 ret
= qio_channel_read(
1487 vs
->ioc
, (char *)data
, datalen
, &err
);
1488 VNC_DEBUG("Read wire %p %zd -> %ld\n", data
, datalen
, ret
);
1489 return vnc_client_io_error(vs
, ret
, &err
);
1494 * Called to read data from the client socket to the input buffer,
1495 * when not using any SASL SSF encryption layers. Will read as much
1496 * data as possible without blocking.
1498 * Returns the number of bytes read, which may be less than
1499 * the requested 'datalen' if the socket would block. Returns
1500 * 0 on I/O error or EOF, and disconnects the client socket.
1502 static size_t vnc_client_read_plain(VncState
*vs
)
1505 VNC_DEBUG("Read plain %p size %zd offset %zd\n",
1506 vs
->input
.buffer
, vs
->input
.capacity
, vs
->input
.offset
);
1507 buffer_reserve(&vs
->input
, 4096);
1508 ret
= vnc_client_read_buf(vs
, buffer_end(&vs
->input
), 4096);
1511 vs
->input
.offset
+= ret
;
1515 static void vnc_jobs_bh(void *opaque
)
1517 VncState
*vs
= opaque
;
1519 assert(vs
->magic
== VNC_MAGIC
);
1520 vnc_jobs_consume_buffer(vs
);
1524 * First function called whenever there is more data to be read from
1525 * the client socket. Will delegate actual work according to whether
1526 * SASL SSF layers are enabled (thus requiring decryption calls)
1527 * Returns 0 on success, -1 if client disconnected
1529 static int vnc_client_read(VncState
*vs
)
1533 #ifdef CONFIG_VNC_SASL
1534 if (vs
->sasl
.conn
&& vs
->sasl
.runSSF
)
1535 ret
= vnc_client_read_sasl(vs
);
1537 #endif /* CONFIG_VNC_SASL */
1538 ret
= vnc_client_read_plain(vs
);
1540 if (vs
->disconnecting
) {
1541 vnc_disconnect_finish(vs
);
1547 while (vs
->read_handler
&& vs
->input
.offset
>= vs
->read_handler_expect
) {
1548 size_t len
= vs
->read_handler_expect
;
1551 ret
= vs
->read_handler(vs
, vs
->input
.buffer
, len
);
1552 if (vs
->disconnecting
) {
1553 vnc_disconnect_finish(vs
);
1558 buffer_advance(&vs
->input
, len
);
1560 vs
->read_handler_expect
= ret
;
1566 gboolean
vnc_client_io(QIOChannel
*ioc G_GNUC_UNUSED
,
1567 GIOCondition condition
, void *opaque
)
1569 VncState
*vs
= opaque
;
1571 assert(vs
->magic
== VNC_MAGIC
);
1572 if (condition
& G_IO_IN
) {
1573 if (vnc_client_read(vs
) < 0) {
1574 /* vs is free()ed here */
1578 if (condition
& G_IO_OUT
) {
1579 vnc_client_write(vs
);
1582 if (vs
->disconnecting
) {
1583 if (vs
->ioc_tag
!= 0) {
1584 g_source_remove(vs
->ioc_tag
);
1593 * Scale factor to apply to vs->throttle_output_offset when checking for
1594 * hard limit. Worst case normal usage could be x2, if we have a complete
1595 * incremental update and complete forced update in the output buffer.
1596 * So x3 should be good enough, but we pick x5 to be conservative and thus
1597 * (hopefully) never trigger incorrectly.
1599 #define VNC_THROTTLE_OUTPUT_LIMIT_SCALE 5
1601 void vnc_write(VncState
*vs
, const void *data
, size_t len
)
1603 assert(vs
->magic
== VNC_MAGIC
);
1604 if (vs
->disconnecting
) {
1607 /* Protection against malicious client/guest to prevent our output
1608 * buffer growing without bound if client stops reading data. This
1609 * should rarely trigger, because we have earlier throttling code
1610 * which stops issuing framebuffer updates and drops audio data
1611 * if the throttle_output_offset value is exceeded. So we only reach
1612 * this higher level if a huge number of pseudo-encodings get
1613 * triggered while data can't be sent on the socket.
1615 * NB throttle_output_offset can be zero during early protocol
1616 * handshake, or from the job thread's VncState clone
1618 if (vs
->throttle_output_offset
!= 0 &&
1619 (vs
->output
.offset
/ VNC_THROTTLE_OUTPUT_LIMIT_SCALE
) >
1620 vs
->throttle_output_offset
) {
1621 trace_vnc_client_output_limit(vs
, vs
->ioc
, vs
->output
.offset
,
1622 vs
->throttle_output_offset
);
1623 vnc_disconnect_start(vs
);
1626 buffer_reserve(&vs
->output
, len
);
1628 if (vs
->ioc
!= NULL
&& buffer_empty(&vs
->output
)) {
1630 g_source_remove(vs
->ioc_tag
);
1632 vs
->ioc_tag
= qio_channel_add_watch(
1633 vs
->ioc
, G_IO_IN
| G_IO_OUT
, vnc_client_io
, vs
, NULL
);
1636 buffer_append(&vs
->output
, data
, len
);
1639 void vnc_write_s32(VncState
*vs
, int32_t value
)
1641 vnc_write_u32(vs
, *(uint32_t *)&value
);
1644 void vnc_write_u32(VncState
*vs
, uint32_t value
)
1648 buf
[0] = (value
>> 24) & 0xFF;
1649 buf
[1] = (value
>> 16) & 0xFF;
1650 buf
[2] = (value
>> 8) & 0xFF;
1651 buf
[3] = value
& 0xFF;
1653 vnc_write(vs
, buf
, 4);
1656 void vnc_write_u16(VncState
*vs
, uint16_t value
)
1660 buf
[0] = (value
>> 8) & 0xFF;
1661 buf
[1] = value
& 0xFF;
1663 vnc_write(vs
, buf
, 2);
1666 void vnc_write_u8(VncState
*vs
, uint8_t value
)
1668 vnc_write(vs
, (char *)&value
, 1);
1671 void vnc_flush(VncState
*vs
)
1673 vnc_lock_output(vs
);
1674 if (vs
->ioc
!= NULL
&& vs
->output
.offset
) {
1675 vnc_client_write_locked(vs
);
1677 if (vs
->disconnecting
) {
1678 if (vs
->ioc_tag
!= 0) {
1679 g_source_remove(vs
->ioc_tag
);
1683 vnc_unlock_output(vs
);
1686 static uint8_t read_u8(uint8_t *data
, size_t offset
)
1688 return data
[offset
];
1691 static uint16_t read_u16(uint8_t *data
, size_t offset
)
1693 return ((data
[offset
] & 0xFF) << 8) | (data
[offset
+ 1] & 0xFF);
1696 static int32_t read_s32(uint8_t *data
, size_t offset
)
1698 return (int32_t)((data
[offset
] << 24) | (data
[offset
+ 1] << 16) |
1699 (data
[offset
+ 2] << 8) | data
[offset
+ 3]);
1702 uint32_t read_u32(uint8_t *data
, size_t offset
)
1704 return ((data
[offset
] << 24) | (data
[offset
+ 1] << 16) |
1705 (data
[offset
+ 2] << 8) | data
[offset
+ 3]);
1708 static void client_cut_text(VncState
*vs
, size_t len
, uint8_t *text
)
1712 static void check_pointer_type_change(Notifier
*notifier
, void *data
)
1714 VncState
*vs
= container_of(notifier
, VncState
, mouse_mode_notifier
);
1715 int absolute
= qemu_input_is_absolute();
1717 if (vnc_has_feature(vs
, VNC_FEATURE_POINTER_TYPE_CHANGE
) && vs
->absolute
!= absolute
) {
1718 vnc_lock_output(vs
);
1719 vnc_write_u8(vs
, VNC_MSG_SERVER_FRAMEBUFFER_UPDATE
);
1720 vnc_write_u8(vs
, 0);
1721 vnc_write_u16(vs
, 1);
1722 vnc_framebuffer_update(vs
, absolute
, 0,
1723 pixman_image_get_width(vs
->vd
->server
),
1724 pixman_image_get_height(vs
->vd
->server
),
1725 VNC_ENCODING_POINTER_TYPE_CHANGE
);
1726 vnc_unlock_output(vs
);
1729 vs
->absolute
= absolute
;
1732 static void pointer_event(VncState
*vs
, int button_mask
, int x
, int y
)
1734 static uint32_t bmap
[INPUT_BUTTON__MAX
] = {
1735 [INPUT_BUTTON_LEFT
] = 0x01,
1736 [INPUT_BUTTON_MIDDLE
] = 0x02,
1737 [INPUT_BUTTON_RIGHT
] = 0x04,
1738 [INPUT_BUTTON_WHEEL_UP
] = 0x08,
1739 [INPUT_BUTTON_WHEEL_DOWN
] = 0x10,
1741 QemuConsole
*con
= vs
->vd
->dcl
.con
;
1742 int width
= pixman_image_get_width(vs
->vd
->server
);
1743 int height
= pixman_image_get_height(vs
->vd
->server
);
1745 if (vs
->last_bmask
!= button_mask
) {
1746 qemu_input_update_buttons(con
, bmap
, vs
->last_bmask
, button_mask
);
1747 vs
->last_bmask
= button_mask
;
1751 qemu_input_queue_abs(con
, INPUT_AXIS_X
, x
, 0, width
);
1752 qemu_input_queue_abs(con
, INPUT_AXIS_Y
, y
, 0, height
);
1753 } else if (vnc_has_feature(vs
, VNC_FEATURE_POINTER_TYPE_CHANGE
)) {
1754 qemu_input_queue_rel(con
, INPUT_AXIS_X
, x
- 0x7FFF);
1755 qemu_input_queue_rel(con
, INPUT_AXIS_Y
, y
- 0x7FFF);
1757 if (vs
->last_x
!= -1) {
1758 qemu_input_queue_rel(con
, INPUT_AXIS_X
, x
- vs
->last_x
);
1759 qemu_input_queue_rel(con
, INPUT_AXIS_Y
, y
- vs
->last_y
);
1764 qemu_input_event_sync();
1767 static void press_key(VncState
*vs
, QKeyCode qcode
)
1769 qkbd_state_key_event(vs
->vd
->kbd
, qcode
, true);
1770 qkbd_state_key_event(vs
->vd
->kbd
, qcode
, false);
1773 static void vnc_led_state_change(VncState
*vs
)
1775 if (!vnc_has_feature(vs
, VNC_FEATURE_LED_STATE
)) {
1779 vnc_lock_output(vs
);
1780 vnc_write_u8(vs
, VNC_MSG_SERVER_FRAMEBUFFER_UPDATE
);
1781 vnc_write_u8(vs
, 0);
1782 vnc_write_u16(vs
, 1);
1783 vnc_framebuffer_update(vs
, 0, 0, 1, 1, VNC_ENCODING_LED_STATE
);
1784 vnc_write_u8(vs
, vs
->vd
->ledstate
);
1785 vnc_unlock_output(vs
);
1789 static void kbd_leds(void *opaque
, int ledstate
)
1791 VncDisplay
*vd
= opaque
;
1794 trace_vnc_key_guest_leds((ledstate
& QEMU_CAPS_LOCK_LED
),
1795 (ledstate
& QEMU_NUM_LOCK_LED
),
1796 (ledstate
& QEMU_SCROLL_LOCK_LED
));
1798 if (ledstate
== vd
->ledstate
) {
1802 vd
->ledstate
= ledstate
;
1804 QTAILQ_FOREACH(client
, &vd
->clients
, next
) {
1805 vnc_led_state_change(client
);
1809 static void do_key_event(VncState
*vs
, int down
, int keycode
, int sym
)
1811 QKeyCode qcode
= qemu_input_key_number_to_qcode(keycode
);
1813 /* QEMU console switch */
1815 case Q_KEY_CODE_1
... Q_KEY_CODE_9
: /* '1' to '9' keys */
1816 if (vs
->vd
->dcl
.con
== NULL
&& down
&&
1817 qkbd_state_modifier_get(vs
->vd
->kbd
, QKBD_MOD_CTRL
) &&
1818 qkbd_state_modifier_get(vs
->vd
->kbd
, QKBD_MOD_ALT
)) {
1819 /* Reset the modifiers sent to the current console */
1820 qkbd_state_lift_all_keys(vs
->vd
->kbd
);
1821 console_select(qcode
- Q_KEY_CODE_1
);
1828 /* Turn off the lock state sync logic if the client support the led
1831 if (down
&& vs
->vd
->lock_key_sync
&&
1832 !vnc_has_feature(vs
, VNC_FEATURE_LED_STATE
) &&
1833 keycode_is_keypad(vs
->vd
->kbd_layout
, keycode
)) {
1834 /* If the numlock state needs to change then simulate an additional
1835 keypress before sending this one. This will happen if the user
1836 toggles numlock away from the VNC window.
1838 if (keysym_is_numlock(vs
->vd
->kbd_layout
, sym
& 0xFFFF)) {
1839 if (!qkbd_state_modifier_get(vs
->vd
->kbd
, QKBD_MOD_NUMLOCK
)) {
1840 trace_vnc_key_sync_numlock(true);
1841 press_key(vs
, Q_KEY_CODE_NUM_LOCK
);
1844 if (qkbd_state_modifier_get(vs
->vd
->kbd
, QKBD_MOD_NUMLOCK
)) {
1845 trace_vnc_key_sync_numlock(false);
1846 press_key(vs
, Q_KEY_CODE_NUM_LOCK
);
1851 if (down
&& vs
->vd
->lock_key_sync
&&
1852 !vnc_has_feature(vs
, VNC_FEATURE_LED_STATE
) &&
1853 ((sym
>= 'A' && sym
<= 'Z') || (sym
>= 'a' && sym
<= 'z'))) {
1854 /* If the capslock state needs to change then simulate an additional
1855 keypress before sending this one. This will happen if the user
1856 toggles capslock away from the VNC window.
1858 int uppercase
= !!(sym
>= 'A' && sym
<= 'Z');
1859 bool shift
= qkbd_state_modifier_get(vs
->vd
->kbd
, QKBD_MOD_SHIFT
);
1860 bool capslock
= qkbd_state_modifier_get(vs
->vd
->kbd
, QKBD_MOD_CAPSLOCK
);
1862 if (uppercase
== shift
) {
1863 trace_vnc_key_sync_capslock(false);
1864 press_key(vs
, Q_KEY_CODE_CAPS_LOCK
);
1867 if (uppercase
!= shift
) {
1868 trace_vnc_key_sync_capslock(true);
1869 press_key(vs
, Q_KEY_CODE_CAPS_LOCK
);
1874 qkbd_state_key_event(vs
->vd
->kbd
, qcode
, down
);
1875 if (!qemu_console_is_graphic(NULL
)) {
1876 bool numlock
= qkbd_state_modifier_get(vs
->vd
->kbd
, QKBD_MOD_NUMLOCK
);
1877 bool control
= qkbd_state_modifier_get(vs
->vd
->kbd
, QKBD_MOD_CTRL
);
1878 /* QEMU console emulation */
1881 case 0x2a: /* Left Shift */
1882 case 0x36: /* Right Shift */
1883 case 0x1d: /* Left CTRL */
1884 case 0x9d: /* Right CTRL */
1885 case 0x38: /* Left ALT */
1886 case 0xb8: /* Right ALT */
1889 kbd_put_keysym(QEMU_KEY_UP
);
1892 kbd_put_keysym(QEMU_KEY_DOWN
);
1895 kbd_put_keysym(QEMU_KEY_LEFT
);
1898 kbd_put_keysym(QEMU_KEY_RIGHT
);
1901 kbd_put_keysym(QEMU_KEY_DELETE
);
1904 kbd_put_keysym(QEMU_KEY_HOME
);
1907 kbd_put_keysym(QEMU_KEY_END
);
1910 kbd_put_keysym(QEMU_KEY_PAGEUP
);
1913 kbd_put_keysym(QEMU_KEY_PAGEDOWN
);
1917 kbd_put_keysym(numlock
? '7' : QEMU_KEY_HOME
);
1920 kbd_put_keysym(numlock
? '8' : QEMU_KEY_UP
);
1923 kbd_put_keysym(numlock
? '9' : QEMU_KEY_PAGEUP
);
1926 kbd_put_keysym(numlock
? '4' : QEMU_KEY_LEFT
);
1929 kbd_put_keysym('5');
1932 kbd_put_keysym(numlock
? '6' : QEMU_KEY_RIGHT
);
1935 kbd_put_keysym(numlock
? '1' : QEMU_KEY_END
);
1938 kbd_put_keysym(numlock
? '2' : QEMU_KEY_DOWN
);
1941 kbd_put_keysym(numlock
? '3' : QEMU_KEY_PAGEDOWN
);
1944 kbd_put_keysym('0');
1947 kbd_put_keysym(numlock
? '.' : QEMU_KEY_DELETE
);
1951 kbd_put_keysym('/');
1954 kbd_put_keysym('*');
1957 kbd_put_keysym('-');
1960 kbd_put_keysym('+');
1963 kbd_put_keysym('\n');
1968 kbd_put_keysym(sym
& 0x1f);
1970 kbd_put_keysym(sym
);
1978 static const char *code2name(int keycode
)
1980 return QKeyCode_str(qemu_input_key_number_to_qcode(keycode
));
1983 static void key_event(VncState
*vs
, int down
, uint32_t sym
)
1988 if (lsym
>= 'A' && lsym
<= 'Z' && qemu_console_is_graphic(NULL
)) {
1989 lsym
= lsym
- 'A' + 'a';
1992 keycode
= keysym2scancode(vs
->vd
->kbd_layout
, lsym
& 0xFFFF,
1993 vs
->vd
->kbd
, down
) & SCANCODE_KEYMASK
;
1994 trace_vnc_key_event_map(down
, sym
, keycode
, code2name(keycode
));
1995 do_key_event(vs
, down
, keycode
, sym
);
1998 static void ext_key_event(VncState
*vs
, int down
,
1999 uint32_t sym
, uint16_t keycode
)
2001 /* if the user specifies a keyboard layout, always use it */
2002 if (keyboard_layout
) {
2003 key_event(vs
, down
, sym
);
2005 trace_vnc_key_event_ext(down
, sym
, keycode
, code2name(keycode
));
2006 do_key_event(vs
, down
, keycode
, sym
);
2010 static void framebuffer_update_request(VncState
*vs
, int incremental
,
2011 int x
, int y
, int w
, int h
)
2014 if (vs
->update
!= VNC_STATE_UPDATE_FORCE
) {
2015 vs
->update
= VNC_STATE_UPDATE_INCREMENTAL
;
2018 vs
->update
= VNC_STATE_UPDATE_FORCE
;
2019 vnc_set_area_dirty(vs
->dirty
, vs
->vd
, x
, y
, w
, h
);
2023 static void send_ext_key_event_ack(VncState
*vs
)
2025 vnc_lock_output(vs
);
2026 vnc_write_u8(vs
, VNC_MSG_SERVER_FRAMEBUFFER_UPDATE
);
2027 vnc_write_u8(vs
, 0);
2028 vnc_write_u16(vs
, 1);
2029 vnc_framebuffer_update(vs
, 0, 0,
2030 pixman_image_get_width(vs
->vd
->server
),
2031 pixman_image_get_height(vs
->vd
->server
),
2032 VNC_ENCODING_EXT_KEY_EVENT
);
2033 vnc_unlock_output(vs
);
2037 static void send_ext_audio_ack(VncState
*vs
)
2039 vnc_lock_output(vs
);
2040 vnc_write_u8(vs
, VNC_MSG_SERVER_FRAMEBUFFER_UPDATE
);
2041 vnc_write_u8(vs
, 0);
2042 vnc_write_u16(vs
, 1);
2043 vnc_framebuffer_update(vs
, 0, 0,
2044 pixman_image_get_width(vs
->vd
->server
),
2045 pixman_image_get_height(vs
->vd
->server
),
2046 VNC_ENCODING_AUDIO
);
2047 vnc_unlock_output(vs
);
2051 static void set_encodings(VncState
*vs
, int32_t *encodings
, size_t n_encodings
)
2054 unsigned int enc
= 0;
2057 vs
->vnc_encoding
= 0;
2058 vs
->tight
.compression
= 9;
2059 vs
->tight
.quality
= -1; /* Lossless by default */
2063 * Start from the end because the encodings are sent in order of preference.
2064 * This way the preferred encoding (first encoding defined in the array)
2065 * will be set at the end of the loop.
2067 for (i
= n_encodings
- 1; i
>= 0; i
--) {
2070 case VNC_ENCODING_RAW
:
2071 vs
->vnc_encoding
= enc
;
2073 case VNC_ENCODING_COPYRECT
:
2074 vs
->features
|= VNC_FEATURE_COPYRECT_MASK
;
2076 case VNC_ENCODING_HEXTILE
:
2077 vs
->features
|= VNC_FEATURE_HEXTILE_MASK
;
2078 vs
->vnc_encoding
= enc
;
2080 case VNC_ENCODING_TIGHT
:
2081 vs
->features
|= VNC_FEATURE_TIGHT_MASK
;
2082 vs
->vnc_encoding
= enc
;
2084 #ifdef CONFIG_VNC_PNG
2085 case VNC_ENCODING_TIGHT_PNG
:
2086 vs
->features
|= VNC_FEATURE_TIGHT_PNG_MASK
;
2087 vs
->vnc_encoding
= enc
;
2090 case VNC_ENCODING_ZLIB
:
2091 vs
->features
|= VNC_FEATURE_ZLIB_MASK
;
2092 vs
->vnc_encoding
= enc
;
2094 case VNC_ENCODING_ZRLE
:
2095 vs
->features
|= VNC_FEATURE_ZRLE_MASK
;
2096 vs
->vnc_encoding
= enc
;
2098 case VNC_ENCODING_ZYWRLE
:
2099 vs
->features
|= VNC_FEATURE_ZYWRLE_MASK
;
2100 vs
->vnc_encoding
= enc
;
2102 case VNC_ENCODING_DESKTOPRESIZE
:
2103 vs
->features
|= VNC_FEATURE_RESIZE_MASK
;
2105 case VNC_ENCODING_POINTER_TYPE_CHANGE
:
2106 vs
->features
|= VNC_FEATURE_POINTER_TYPE_CHANGE_MASK
;
2108 case VNC_ENCODING_RICH_CURSOR
:
2109 vs
->features
|= VNC_FEATURE_RICH_CURSOR_MASK
;
2110 if (vs
->vd
->cursor
) {
2111 vnc_cursor_define(vs
);
2114 case VNC_ENCODING_EXT_KEY_EVENT
:
2115 send_ext_key_event_ack(vs
);
2117 case VNC_ENCODING_AUDIO
:
2118 send_ext_audio_ack(vs
);
2120 case VNC_ENCODING_WMVi
:
2121 vs
->features
|= VNC_FEATURE_WMVI_MASK
;
2123 case VNC_ENCODING_LED_STATE
:
2124 vs
->features
|= VNC_FEATURE_LED_STATE_MASK
;
2126 case VNC_ENCODING_COMPRESSLEVEL0
... VNC_ENCODING_COMPRESSLEVEL0
+ 9:
2127 vs
->tight
.compression
= (enc
& 0x0F);
2129 case VNC_ENCODING_QUALITYLEVEL0
... VNC_ENCODING_QUALITYLEVEL0
+ 9:
2130 if (vs
->vd
->lossy
) {
2131 vs
->tight
.quality
= (enc
& 0x0F);
2135 VNC_DEBUG("Unknown encoding: %d (0x%.8x): %d\n", i
, enc
, enc
);
2139 vnc_desktop_resize(vs
);
2140 check_pointer_type_change(&vs
->mouse_mode_notifier
, NULL
);
2141 vnc_led_state_change(vs
);
2144 static void set_pixel_conversion(VncState
*vs
)
2146 pixman_format_code_t fmt
= qemu_pixman_get_format(&vs
->client_pf
);
2148 if (fmt
== VNC_SERVER_FB_FORMAT
) {
2149 vs
->write_pixels
= vnc_write_pixels_copy
;
2150 vnc_hextile_set_pixel_conversion(vs
, 0);
2152 vs
->write_pixels
= vnc_write_pixels_generic
;
2153 vnc_hextile_set_pixel_conversion(vs
, 1);
2157 static void send_color_map(VncState
*vs
)
2161 vnc_write_u8(vs
, VNC_MSG_SERVER_SET_COLOUR_MAP_ENTRIES
);
2162 vnc_write_u8(vs
, 0); /* padding */
2163 vnc_write_u16(vs
, 0); /* first color */
2164 vnc_write_u16(vs
, 256); /* # of colors */
2166 for (i
= 0; i
< 256; i
++) {
2167 PixelFormat
*pf
= &vs
->client_pf
;
2169 vnc_write_u16(vs
, (((i
>> pf
->rshift
) & pf
->rmax
) << (16 - pf
->rbits
)));
2170 vnc_write_u16(vs
, (((i
>> pf
->gshift
) & pf
->gmax
) << (16 - pf
->gbits
)));
2171 vnc_write_u16(vs
, (((i
>> pf
->bshift
) & pf
->bmax
) << (16 - pf
->bbits
)));
2175 static void set_pixel_format(VncState
*vs
, int bits_per_pixel
,
2176 int big_endian_flag
, int true_color_flag
,
2177 int red_max
, int green_max
, int blue_max
,
2178 int red_shift
, int green_shift
, int blue_shift
)
2180 if (!true_color_flag
) {
2181 /* Expose a reasonable default 256 color map */
2191 switch (bits_per_pixel
) {
2197 vnc_client_error(vs
);
2201 vs
->client_pf
.rmax
= red_max
? red_max
: 0xFF;
2202 vs
->client_pf
.rbits
= ctpopl(red_max
);
2203 vs
->client_pf
.rshift
= red_shift
;
2204 vs
->client_pf
.rmask
= red_max
<< red_shift
;
2205 vs
->client_pf
.gmax
= green_max
? green_max
: 0xFF;
2206 vs
->client_pf
.gbits
= ctpopl(green_max
);
2207 vs
->client_pf
.gshift
= green_shift
;
2208 vs
->client_pf
.gmask
= green_max
<< green_shift
;
2209 vs
->client_pf
.bmax
= blue_max
? blue_max
: 0xFF;
2210 vs
->client_pf
.bbits
= ctpopl(blue_max
);
2211 vs
->client_pf
.bshift
= blue_shift
;
2212 vs
->client_pf
.bmask
= blue_max
<< blue_shift
;
2213 vs
->client_pf
.bits_per_pixel
= bits_per_pixel
;
2214 vs
->client_pf
.bytes_per_pixel
= bits_per_pixel
/ 8;
2215 vs
->client_pf
.depth
= bits_per_pixel
== 32 ? 24 : bits_per_pixel
;
2216 vs
->client_be
= big_endian_flag
;
2218 if (!true_color_flag
) {
2222 set_pixel_conversion(vs
);
2224 graphic_hw_invalidate(vs
->vd
->dcl
.con
);
2225 graphic_hw_update(vs
->vd
->dcl
.con
);
2228 static void pixel_format_message (VncState
*vs
) {
2229 char pad
[3] = { 0, 0, 0 };
2231 vs
->client_pf
= qemu_default_pixelformat(32);
2233 vnc_write_u8(vs
, vs
->client_pf
.bits_per_pixel
); /* bits-per-pixel */
2234 vnc_write_u8(vs
, vs
->client_pf
.depth
); /* depth */
2236 #ifdef HOST_WORDS_BIGENDIAN
2237 vnc_write_u8(vs
, 1); /* big-endian-flag */
2239 vnc_write_u8(vs
, 0); /* big-endian-flag */
2241 vnc_write_u8(vs
, 1); /* true-color-flag */
2242 vnc_write_u16(vs
, vs
->client_pf
.rmax
); /* red-max */
2243 vnc_write_u16(vs
, vs
->client_pf
.gmax
); /* green-max */
2244 vnc_write_u16(vs
, vs
->client_pf
.bmax
); /* blue-max */
2245 vnc_write_u8(vs
, vs
->client_pf
.rshift
); /* red-shift */
2246 vnc_write_u8(vs
, vs
->client_pf
.gshift
); /* green-shift */
2247 vnc_write_u8(vs
, vs
->client_pf
.bshift
); /* blue-shift */
2248 vnc_write(vs
, pad
, 3); /* padding */
2250 vnc_hextile_set_pixel_conversion(vs
, 0);
2251 vs
->write_pixels
= vnc_write_pixels_copy
;
2254 static void vnc_colordepth(VncState
*vs
)
2256 if (vnc_has_feature(vs
, VNC_FEATURE_WMVI
)) {
2257 /* Sending a WMVi message to notify the client*/
2258 vnc_lock_output(vs
);
2259 vnc_write_u8(vs
, VNC_MSG_SERVER_FRAMEBUFFER_UPDATE
);
2260 vnc_write_u8(vs
, 0);
2261 vnc_write_u16(vs
, 1); /* number of rects */
2262 vnc_framebuffer_update(vs
, 0, 0,
2263 pixman_image_get_width(vs
->vd
->server
),
2264 pixman_image_get_height(vs
->vd
->server
),
2266 pixel_format_message(vs
);
2267 vnc_unlock_output(vs
);
2270 set_pixel_conversion(vs
);
2274 static int protocol_client_msg(VncState
*vs
, uint8_t *data
, size_t len
)
2279 VncDisplay
*vd
= vs
->vd
;
2282 update_displaychangelistener(&vd
->dcl
, VNC_REFRESH_INTERVAL_BASE
);
2286 case VNC_MSG_CLIENT_SET_PIXEL_FORMAT
:
2290 set_pixel_format(vs
, read_u8(data
, 4),
2291 read_u8(data
, 6), read_u8(data
, 7),
2292 read_u16(data
, 8), read_u16(data
, 10),
2293 read_u16(data
, 12), read_u8(data
, 14),
2294 read_u8(data
, 15), read_u8(data
, 16));
2296 case VNC_MSG_CLIENT_SET_ENCODINGS
:
2301 limit
= read_u16(data
, 2);
2303 return 4 + (limit
* 4);
2305 limit
= read_u16(data
, 2);
2307 for (i
= 0; i
< limit
; i
++) {
2308 int32_t val
= read_s32(data
, 4 + (i
* 4));
2309 memcpy(data
+ 4 + (i
* 4), &val
, sizeof(val
));
2312 set_encodings(vs
, (int32_t *)(data
+ 4), limit
);
2314 case VNC_MSG_CLIENT_FRAMEBUFFER_UPDATE_REQUEST
:
2318 framebuffer_update_request(vs
,
2319 read_u8(data
, 1), read_u16(data
, 2), read_u16(data
, 4),
2320 read_u16(data
, 6), read_u16(data
, 8));
2322 case VNC_MSG_CLIENT_KEY_EVENT
:
2326 key_event(vs
, read_u8(data
, 1), read_u32(data
, 4));
2328 case VNC_MSG_CLIENT_POINTER_EVENT
:
2332 pointer_event(vs
, read_u8(data
, 1), read_u16(data
, 2), read_u16(data
, 4));
2334 case VNC_MSG_CLIENT_CUT_TEXT
:
2339 uint32_t dlen
= read_u32(data
, 4);
2340 if (dlen
> (1 << 20)) {
2341 error_report("vnc: client_cut_text msg payload has %u bytes"
2342 " which exceeds our limit of 1MB.", dlen
);
2343 vnc_client_error(vs
);
2351 client_cut_text(vs
, read_u32(data
, 4), data
+ 8);
2353 case VNC_MSG_CLIENT_QEMU
:
2357 switch (read_u8(data
, 1)) {
2358 case VNC_MSG_CLIENT_QEMU_EXT_KEY_EVENT
:
2362 ext_key_event(vs
, read_u16(data
, 2),
2363 read_u32(data
, 4), read_u32(data
, 8));
2365 case VNC_MSG_CLIENT_QEMU_AUDIO
:
2369 switch (read_u16 (data
, 2)) {
2370 case VNC_MSG_CLIENT_QEMU_AUDIO_ENABLE
:
2373 case VNC_MSG_CLIENT_QEMU_AUDIO_DISABLE
:
2376 case VNC_MSG_CLIENT_QEMU_AUDIO_SET_FORMAT
:
2379 switch (read_u8(data
, 4)) {
2380 case 0: vs
->as
.fmt
= AUDIO_FORMAT_U8
; break;
2381 case 1: vs
->as
.fmt
= AUDIO_FORMAT_S8
; break;
2382 case 2: vs
->as
.fmt
= AUDIO_FORMAT_U16
; break;
2383 case 3: vs
->as
.fmt
= AUDIO_FORMAT_S16
; break;
2384 case 4: vs
->as
.fmt
= AUDIO_FORMAT_U32
; break;
2385 case 5: vs
->as
.fmt
= AUDIO_FORMAT_S32
; break;
2387 VNC_DEBUG("Invalid audio format %d\n", read_u8(data
, 4));
2388 vnc_client_error(vs
);
2391 vs
->as
.nchannels
= read_u8(data
, 5);
2392 if (vs
->as
.nchannels
!= 1 && vs
->as
.nchannels
!= 2) {
2393 VNC_DEBUG("Invalid audio channel count %d\n",
2395 vnc_client_error(vs
);
2398 freq
= read_u32(data
, 6);
2399 /* No official limit for protocol, but 48khz is a sensible
2400 * upper bound for trustworthy clients, and this limit
2401 * protects calculations involving 'vs->as.freq' later.
2404 VNC_DEBUG("Invalid audio frequency %u > 48000", freq
);
2405 vnc_client_error(vs
);
2411 VNC_DEBUG("Invalid audio message %d\n", read_u8(data
, 4));
2412 vnc_client_error(vs
);
2418 VNC_DEBUG("Msg: %d\n", read_u16(data
, 0));
2419 vnc_client_error(vs
);
2424 VNC_DEBUG("Msg: %d\n", data
[0]);
2425 vnc_client_error(vs
);
2429 vnc_update_throttle_offset(vs
);
2430 vnc_read_when(vs
, protocol_client_msg
, 1);
2434 static int protocol_client_init(VncState
*vs
, uint8_t *data
, size_t len
)
2440 mode
= data
[0] ? VNC_SHARE_MODE_SHARED
: VNC_SHARE_MODE_EXCLUSIVE
;
2441 switch (vs
->vd
->share_policy
) {
2442 case VNC_SHARE_POLICY_IGNORE
:
2444 * Ignore the shared flag. Nothing to do here.
2446 * Doesn't conform to the rfb spec but is traditional qemu
2447 * behavior, thus left here as option for compatibility
2451 case VNC_SHARE_POLICY_ALLOW_EXCLUSIVE
:
2453 * Policy: Allow clients ask for exclusive access.
2455 * Implementation: When a client asks for exclusive access,
2456 * disconnect all others. Shared connects are allowed as long
2457 * as no exclusive connection exists.
2459 * This is how the rfb spec suggests to handle the shared flag.
2461 if (mode
== VNC_SHARE_MODE_EXCLUSIVE
) {
2463 QTAILQ_FOREACH(client
, &vs
->vd
->clients
, next
) {
2467 if (client
->share_mode
!= VNC_SHARE_MODE_EXCLUSIVE
&&
2468 client
->share_mode
!= VNC_SHARE_MODE_SHARED
) {
2471 vnc_disconnect_start(client
);
2474 if (mode
== VNC_SHARE_MODE_SHARED
) {
2475 if (vs
->vd
->num_exclusive
> 0) {
2476 vnc_disconnect_start(vs
);
2481 case VNC_SHARE_POLICY_FORCE_SHARED
:
2483 * Policy: Shared connects only.
2484 * Implementation: Disallow clients asking for exclusive access.
2486 * Useful for shared desktop sessions where you don't want
2487 * someone forgetting to say -shared when running the vnc
2488 * client disconnect everybody else.
2490 if (mode
== VNC_SHARE_MODE_EXCLUSIVE
) {
2491 vnc_disconnect_start(vs
);
2496 vnc_set_share_mode(vs
, mode
);
2498 if (vs
->vd
->num_shared
> vs
->vd
->connections_limit
) {
2499 vnc_disconnect_start(vs
);
2503 assert(pixman_image_get_width(vs
->vd
->server
) < 65536 &&
2504 pixman_image_get_width(vs
->vd
->server
) >= 0);
2505 assert(pixman_image_get_height(vs
->vd
->server
) < 65536 &&
2506 pixman_image_get_height(vs
->vd
->server
) >= 0);
2507 vs
->client_width
= pixman_image_get_width(vs
->vd
->server
);
2508 vs
->client_height
= pixman_image_get_height(vs
->vd
->server
);
2509 vnc_write_u16(vs
, vs
->client_width
);
2510 vnc_write_u16(vs
, vs
->client_height
);
2512 pixel_format_message(vs
);
2515 size
= snprintf(buf
, sizeof(buf
), "QEMU (%s)", qemu_name
);
2516 if (size
> sizeof(buf
)) {
2520 size
= snprintf(buf
, sizeof(buf
), "QEMU");
2523 vnc_write_u32(vs
, size
);
2524 vnc_write(vs
, buf
, size
);
2527 vnc_client_cache_auth(vs
);
2528 vnc_qmp_event(vs
, QAPI_EVENT_VNC_INITIALIZED
);
2530 vnc_read_when(vs
, protocol_client_msg
, 1);
2535 void start_client_init(VncState
*vs
)
2537 vnc_read_when(vs
, protocol_client_init
, 1);
2540 static void authentication_failed(VncState
*vs
)
2542 vnc_write_u32(vs
, 1); /* Reject auth */
2543 if (vs
->minor
>= 8) {
2544 static const char err
[] = "Authentication failed";
2545 vnc_write_u32(vs
, sizeof(err
));
2546 vnc_write(vs
, err
, sizeof(err
));
2549 vnc_client_error(vs
);
2552 static int protocol_client_auth_vnc(VncState
*vs
, uint8_t *data
, size_t len
)
2554 unsigned char response
[VNC_AUTH_CHALLENGE_SIZE
];
2556 unsigned char key
[8];
2557 time_t now
= time(NULL
);
2558 QCryptoCipher
*cipher
= NULL
;
2561 if (!vs
->vd
->password
) {
2562 trace_vnc_auth_fail(vs
, vs
->auth
, "password is not set", "");
2565 if (vs
->vd
->expires
< now
) {
2566 trace_vnc_auth_fail(vs
, vs
->auth
, "password is expired", "");
2570 memcpy(response
, vs
->challenge
, VNC_AUTH_CHALLENGE_SIZE
);
2572 /* Calculate the expected challenge response */
2573 pwlen
= strlen(vs
->vd
->password
);
2574 for (i
=0; i
<sizeof(key
); i
++)
2575 key
[i
] = i
<pwlen
? vs
->vd
->password
[i
] : 0;
2577 cipher
= qcrypto_cipher_new(
2578 QCRYPTO_CIPHER_ALG_DES_RFB
,
2579 QCRYPTO_CIPHER_MODE_ECB
,
2580 key
, G_N_ELEMENTS(key
),
2583 trace_vnc_auth_fail(vs
, vs
->auth
, "cannot create cipher",
2584 error_get_pretty(err
));
2589 if (qcrypto_cipher_encrypt(cipher
,
2592 VNC_AUTH_CHALLENGE_SIZE
,
2594 trace_vnc_auth_fail(vs
, vs
->auth
, "cannot encrypt challenge response",
2595 error_get_pretty(err
));
2600 /* Compare expected vs actual challenge response */
2601 if (memcmp(response
, data
, VNC_AUTH_CHALLENGE_SIZE
) != 0) {
2602 trace_vnc_auth_fail(vs
, vs
->auth
, "mis-matched challenge response", "");
2605 trace_vnc_auth_pass(vs
, vs
->auth
);
2606 vnc_write_u32(vs
, 0); /* Accept auth */
2609 start_client_init(vs
);
2612 qcrypto_cipher_free(cipher
);
2616 authentication_failed(vs
);
2617 qcrypto_cipher_free(cipher
);
2621 void start_auth_vnc(VncState
*vs
)
2625 if (qcrypto_random_bytes(vs
->challenge
, sizeof(vs
->challenge
), &err
)) {
2626 trace_vnc_auth_fail(vs
, vs
->auth
, "cannot get random bytes",
2627 error_get_pretty(err
));
2629 authentication_failed(vs
);
2633 /* Send client a 'random' challenge */
2634 vnc_write(vs
, vs
->challenge
, sizeof(vs
->challenge
));
2637 vnc_read_when(vs
, protocol_client_auth_vnc
, sizeof(vs
->challenge
));
2641 static int protocol_client_auth(VncState
*vs
, uint8_t *data
, size_t len
)
2643 /* We only advertise 1 auth scheme at a time, so client
2644 * must pick the one we sent. Verify this */
2645 if (data
[0] != vs
->auth
) { /* Reject auth */
2646 trace_vnc_auth_reject(vs
, vs
->auth
, (int)data
[0]);
2647 authentication_failed(vs
);
2648 } else { /* Accept requested auth */
2649 trace_vnc_auth_start(vs
, vs
->auth
);
2652 if (vs
->minor
>= 8) {
2653 vnc_write_u32(vs
, 0); /* Accept auth completion */
2656 trace_vnc_auth_pass(vs
, vs
->auth
);
2657 start_client_init(vs
);
2664 case VNC_AUTH_VENCRYPT
:
2665 start_auth_vencrypt(vs
);
2668 #ifdef CONFIG_VNC_SASL
2670 start_auth_sasl(vs
);
2672 #endif /* CONFIG_VNC_SASL */
2674 default: /* Should not be possible, but just in case */
2675 trace_vnc_auth_fail(vs
, vs
->auth
, "Unhandled auth method", "");
2676 authentication_failed(vs
);
2682 static int protocol_version(VncState
*vs
, uint8_t *version
, size_t len
)
2686 memcpy(local
, version
, 12);
2689 if (sscanf(local
, "RFB %03d.%03d\n", &vs
->major
, &vs
->minor
) != 2) {
2690 VNC_DEBUG("Malformed protocol version %s\n", local
);
2691 vnc_client_error(vs
);
2694 VNC_DEBUG("Client request protocol version %d.%d\n", vs
->major
, vs
->minor
);
2695 if (vs
->major
!= 3 ||
2701 VNC_DEBUG("Unsupported client version\n");
2702 vnc_write_u32(vs
, VNC_AUTH_INVALID
);
2704 vnc_client_error(vs
);
2707 /* Some broken clients report v3.4 or v3.5, which spec requires to be treated
2708 * as equivalent to v3.3 by servers
2710 if (vs
->minor
== 4 || vs
->minor
== 5)
2713 if (vs
->minor
== 3) {
2714 trace_vnc_auth_start(vs
, vs
->auth
);
2715 if (vs
->auth
== VNC_AUTH_NONE
) {
2716 vnc_write_u32(vs
, vs
->auth
);
2718 trace_vnc_auth_pass(vs
, vs
->auth
);
2719 start_client_init(vs
);
2720 } else if (vs
->auth
== VNC_AUTH_VNC
) {
2721 VNC_DEBUG("Tell client VNC auth\n");
2722 vnc_write_u32(vs
, vs
->auth
);
2726 trace_vnc_auth_fail(vs
, vs
->auth
,
2727 "Unsupported auth method for v3.3", "");
2728 vnc_write_u32(vs
, VNC_AUTH_INVALID
);
2730 vnc_client_error(vs
);
2733 vnc_write_u8(vs
, 1); /* num auth */
2734 vnc_write_u8(vs
, vs
->auth
);
2735 vnc_read_when(vs
, protocol_client_auth
, 1);
2742 static VncRectStat
*vnc_stat_rect(VncDisplay
*vd
, int x
, int y
)
2744 struct VncSurface
*vs
= &vd
->guest
;
2746 return &vs
->stats
[y
/ VNC_STAT_RECT
][x
/ VNC_STAT_RECT
];
2749 void vnc_sent_lossy_rect(VncState
*vs
, int x
, int y
, int w
, int h
)
2753 w
= (x
+ w
) / VNC_STAT_RECT
;
2754 h
= (y
+ h
) / VNC_STAT_RECT
;
2758 for (j
= y
; j
<= h
; j
++) {
2759 for (i
= x
; i
<= w
; i
++) {
2760 vs
->lossy_rect
[j
][i
] = 1;
2765 static int vnc_refresh_lossy_rect(VncDisplay
*vd
, int x
, int y
)
2768 int sty
= y
/ VNC_STAT_RECT
;
2769 int stx
= x
/ VNC_STAT_RECT
;
2772 y
= QEMU_ALIGN_DOWN(y
, VNC_STAT_RECT
);
2773 x
= QEMU_ALIGN_DOWN(x
, VNC_STAT_RECT
);
2775 QTAILQ_FOREACH(vs
, &vd
->clients
, next
) {
2778 /* kernel send buffers are full -> refresh later */
2779 if (vs
->output
.offset
) {
2783 if (!vs
->lossy_rect
[sty
][stx
]) {
2787 vs
->lossy_rect
[sty
][stx
] = 0;
2788 for (j
= 0; j
< VNC_STAT_RECT
; ++j
) {
2789 bitmap_set(vs
->dirty
[y
+ j
],
2790 x
/ VNC_DIRTY_PIXELS_PER_BIT
,
2791 VNC_STAT_RECT
/ VNC_DIRTY_PIXELS_PER_BIT
);
2799 static int vnc_update_stats(VncDisplay
*vd
, struct timeval
* tv
)
2801 int width
= MIN(pixman_image_get_width(vd
->guest
.fb
),
2802 pixman_image_get_width(vd
->server
));
2803 int height
= MIN(pixman_image_get_height(vd
->guest
.fb
),
2804 pixman_image_get_height(vd
->server
));
2809 for (y
= 0; y
< height
; y
+= VNC_STAT_RECT
) {
2810 for (x
= 0; x
< width
; x
+= VNC_STAT_RECT
) {
2811 VncRectStat
*rect
= vnc_stat_rect(vd
, x
, y
);
2813 rect
->updated
= false;
2817 qemu_timersub(tv
, &VNC_REFRESH_STATS
, &res
);
2819 if (timercmp(&vd
->guest
.last_freq_check
, &res
, >)) {
2822 vd
->guest
.last_freq_check
= *tv
;
2824 for (y
= 0; y
< height
; y
+= VNC_STAT_RECT
) {
2825 for (x
= 0; x
< width
; x
+= VNC_STAT_RECT
) {
2826 VncRectStat
*rect
= vnc_stat_rect(vd
, x
, y
);
2827 int count
= ARRAY_SIZE(rect
->times
);
2828 struct timeval min
, max
;
2830 if (!timerisset(&rect
->times
[count
- 1])) {
2834 max
= rect
->times
[(rect
->idx
+ count
- 1) % count
];
2835 qemu_timersub(tv
, &max
, &res
);
2837 if (timercmp(&res
, &VNC_REFRESH_LOSSY
, >)) {
2839 has_dirty
+= vnc_refresh_lossy_rect(vd
, x
, y
);
2840 memset(rect
->times
, 0, sizeof (rect
->times
));
2844 min
= rect
->times
[rect
->idx
];
2845 max
= rect
->times
[(rect
->idx
+ count
- 1) % count
];
2846 qemu_timersub(&max
, &min
, &res
);
2848 rect
->freq
= res
.tv_sec
+ res
.tv_usec
/ 1000000.;
2849 rect
->freq
/= count
;
2850 rect
->freq
= 1. / rect
->freq
;
2856 double vnc_update_freq(VncState
*vs
, int x
, int y
, int w
, int h
)
2862 x
= QEMU_ALIGN_DOWN(x
, VNC_STAT_RECT
);
2863 y
= QEMU_ALIGN_DOWN(y
, VNC_STAT_RECT
);
2865 for (j
= y
; j
<= y
+ h
; j
+= VNC_STAT_RECT
) {
2866 for (i
= x
; i
<= x
+ w
; i
+= VNC_STAT_RECT
) {
2867 total
+= vnc_stat_rect(vs
->vd
, i
, j
)->freq
;
2879 static void vnc_rect_updated(VncDisplay
*vd
, int x
, int y
, struct timeval
* tv
)
2883 rect
= vnc_stat_rect(vd
, x
, y
);
2884 if (rect
->updated
) {
2887 rect
->times
[rect
->idx
] = *tv
;
2888 rect
->idx
= (rect
->idx
+ 1) % ARRAY_SIZE(rect
->times
);
2889 rect
->updated
= true;
2892 static int vnc_refresh_server_surface(VncDisplay
*vd
)
2894 int width
= MIN(pixman_image_get_width(vd
->guest
.fb
),
2895 pixman_image_get_width(vd
->server
));
2896 int height
= MIN(pixman_image_get_height(vd
->guest
.fb
),
2897 pixman_image_get_height(vd
->server
));
2898 int cmp_bytes
, server_stride
, line_bytes
, guest_ll
, guest_stride
, y
= 0;
2899 uint8_t *guest_row0
= NULL
, *server_row0
;
2902 pixman_image_t
*tmpbuf
= NULL
;
2904 struct timeval tv
= { 0, 0 };
2906 if (!vd
->non_adaptive
) {
2907 gettimeofday(&tv
, NULL
);
2908 has_dirty
= vnc_update_stats(vd
, &tv
);
2912 * Walk through the guest dirty map.
2913 * Check and copy modified bits from guest to server surface.
2914 * Update server dirty map.
2916 server_row0
= (uint8_t *)pixman_image_get_data(vd
->server
);
2917 server_stride
= guest_stride
= guest_ll
=
2918 pixman_image_get_stride(vd
->server
);
2919 cmp_bytes
= MIN(VNC_DIRTY_PIXELS_PER_BIT
* VNC_SERVER_FB_BYTES
,
2921 if (vd
->guest
.format
!= VNC_SERVER_FB_FORMAT
) {
2922 int width
= pixman_image_get_width(vd
->server
);
2923 tmpbuf
= qemu_pixman_linebuf_create(VNC_SERVER_FB_FORMAT
, width
);
2926 PIXMAN_FORMAT_BPP(pixman_image_get_format(vd
->guest
.fb
));
2927 guest_row0
= (uint8_t *)pixman_image_get_data(vd
->guest
.fb
);
2928 guest_stride
= pixman_image_get_stride(vd
->guest
.fb
);
2929 guest_ll
= pixman_image_get_width(vd
->guest
.fb
)
2930 * DIV_ROUND_UP(guest_bpp
, 8);
2932 line_bytes
= MIN(server_stride
, guest_ll
);
2936 uint8_t *guest_ptr
, *server_ptr
;
2937 unsigned long offset
= find_next_bit((unsigned long *) &vd
->guest
.dirty
,
2938 height
* VNC_DIRTY_BPL(&vd
->guest
),
2939 y
* VNC_DIRTY_BPL(&vd
->guest
));
2940 if (offset
== height
* VNC_DIRTY_BPL(&vd
->guest
)) {
2941 /* no more dirty bits */
2944 y
= offset
/ VNC_DIRTY_BPL(&vd
->guest
);
2945 x
= offset
% VNC_DIRTY_BPL(&vd
->guest
);
2947 server_ptr
= server_row0
+ y
* server_stride
+ x
* cmp_bytes
;
2949 if (vd
->guest
.format
!= VNC_SERVER_FB_FORMAT
) {
2950 qemu_pixman_linebuf_fill(tmpbuf
, vd
->guest
.fb
, width
, 0, y
);
2951 guest_ptr
= (uint8_t *)pixman_image_get_data(tmpbuf
);
2953 guest_ptr
= guest_row0
+ y
* guest_stride
;
2955 guest_ptr
+= x
* cmp_bytes
;
2957 for (; x
< DIV_ROUND_UP(width
, VNC_DIRTY_PIXELS_PER_BIT
);
2958 x
++, guest_ptr
+= cmp_bytes
, server_ptr
+= cmp_bytes
) {
2959 int _cmp_bytes
= cmp_bytes
;
2960 if (!test_and_clear_bit(x
, vd
->guest
.dirty
[y
])) {
2963 if ((x
+ 1) * cmp_bytes
> line_bytes
) {
2964 _cmp_bytes
= line_bytes
- x
* cmp_bytes
;
2966 assert(_cmp_bytes
>= 0);
2967 if (memcmp(server_ptr
, guest_ptr
, _cmp_bytes
) == 0) {
2970 memcpy(server_ptr
, guest_ptr
, _cmp_bytes
);
2971 if (!vd
->non_adaptive
) {
2972 vnc_rect_updated(vd
, x
* VNC_DIRTY_PIXELS_PER_BIT
,
2975 QTAILQ_FOREACH(vs
, &vd
->clients
, next
) {
2976 set_bit(x
, vs
->dirty
[y
]);
2983 qemu_pixman_image_unref(tmpbuf
);
2987 static void vnc_refresh(DisplayChangeListener
*dcl
)
2989 VncDisplay
*vd
= container_of(dcl
, VncDisplay
, dcl
);
2991 int has_dirty
, rects
= 0;
2993 if (QTAILQ_EMPTY(&vd
->clients
)) {
2994 update_displaychangelistener(&vd
->dcl
, VNC_REFRESH_INTERVAL_MAX
);
2998 graphic_hw_update(vd
->dcl
.con
);
3000 if (vnc_trylock_display(vd
)) {
3001 update_displaychangelistener(&vd
->dcl
, VNC_REFRESH_INTERVAL_BASE
);
3005 has_dirty
= vnc_refresh_server_surface(vd
);
3006 vnc_unlock_display(vd
);
3008 QTAILQ_FOREACH_SAFE(vs
, &vd
->clients
, next
, vn
) {
3009 rects
+= vnc_update_client(vs
, has_dirty
);
3010 /* vs might be free()ed here */
3013 if (has_dirty
&& rects
) {
3014 vd
->dcl
.update_interval
/= 2;
3015 if (vd
->dcl
.update_interval
< VNC_REFRESH_INTERVAL_BASE
) {
3016 vd
->dcl
.update_interval
= VNC_REFRESH_INTERVAL_BASE
;
3019 vd
->dcl
.update_interval
+= VNC_REFRESH_INTERVAL_INC
;
3020 if (vd
->dcl
.update_interval
> VNC_REFRESH_INTERVAL_MAX
) {
3021 vd
->dcl
.update_interval
= VNC_REFRESH_INTERVAL_MAX
;
3026 static void vnc_connect(VncDisplay
*vd
, QIOChannelSocket
*sioc
,
3027 bool skipauth
, bool websocket
)
3029 VncState
*vs
= g_new0(VncState
, 1);
3030 bool first_client
= QTAILQ_EMPTY(&vd
->clients
);
3033 trace_vnc_client_connect(vs
, sioc
);
3034 vs
->magic
= VNC_MAGIC
;
3036 object_ref(OBJECT(vs
->sioc
));
3037 vs
->ioc
= QIO_CHANNEL(sioc
);
3038 object_ref(OBJECT(vs
->ioc
));
3041 buffer_init(&vs
->input
, "vnc-input/%p", sioc
);
3042 buffer_init(&vs
->output
, "vnc-output/%p", sioc
);
3043 buffer_init(&vs
->jobs_buffer
, "vnc-jobs_buffer/%p", sioc
);
3045 buffer_init(&vs
->tight
.tight
, "vnc-tight/%p", sioc
);
3046 buffer_init(&vs
->tight
.zlib
, "vnc-tight-zlib/%p", sioc
);
3047 buffer_init(&vs
->tight
.gradient
, "vnc-tight-gradient/%p", sioc
);
3048 #ifdef CONFIG_VNC_JPEG
3049 buffer_init(&vs
->tight
.jpeg
, "vnc-tight-jpeg/%p", sioc
);
3051 #ifdef CONFIG_VNC_PNG
3052 buffer_init(&vs
->tight
.png
, "vnc-tight-png/%p", sioc
);
3054 buffer_init(&vs
->zlib
.zlib
, "vnc-zlib/%p", sioc
);
3055 buffer_init(&vs
->zrle
.zrle
, "vnc-zrle/%p", sioc
);
3056 buffer_init(&vs
->zrle
.fb
, "vnc-zrle-fb/%p", sioc
);
3057 buffer_init(&vs
->zrle
.zlib
, "vnc-zrle-zlib/%p", sioc
);
3060 vs
->auth
= VNC_AUTH_NONE
;
3061 vs
->subauth
= VNC_AUTH_INVALID
;
3064 vs
->auth
= vd
->ws_auth
;
3065 vs
->subauth
= VNC_AUTH_INVALID
;
3067 vs
->auth
= vd
->auth
;
3068 vs
->subauth
= vd
->subauth
;
3071 VNC_DEBUG("Client sioc=%p ws=%d auth=%d subauth=%d\n",
3072 sioc
, websocket
, vs
->auth
, vs
->subauth
);
3074 vs
->lossy_rect
= g_malloc0(VNC_STAT_ROWS
* sizeof (*vs
->lossy_rect
));
3075 for (i
= 0; i
< VNC_STAT_ROWS
; ++i
) {
3076 vs
->lossy_rect
[i
] = g_new0(uint8_t, VNC_STAT_COLS
);
3079 VNC_DEBUG("New client on socket %p\n", vs
->sioc
);
3080 update_displaychangelistener(&vd
->dcl
, VNC_REFRESH_INTERVAL_BASE
);
3081 qio_channel_set_blocking(vs
->ioc
, false, NULL
);
3083 g_source_remove(vs
->ioc_tag
);
3088 vs
->ioc_tag
= qio_channel_add_watch(
3089 vs
->ioc
, G_IO_IN
, vncws_tls_handshake_io
, vs
, NULL
);
3091 vs
->ioc_tag
= qio_channel_add_watch(
3092 vs
->ioc
, G_IO_IN
, vncws_handshake_io
, vs
, NULL
);
3095 vs
->ioc_tag
= qio_channel_add_watch(
3096 vs
->ioc
, G_IO_IN
, vnc_client_io
, vs
, NULL
);
3099 vnc_client_cache_addr(vs
);
3100 vnc_qmp_event(vs
, QAPI_EVENT_VNC_CONNECTED
);
3101 vnc_set_share_mode(vs
, VNC_SHARE_MODE_CONNECTING
);
3106 vs
->as
.freq
= 44100;
3107 vs
->as
.nchannels
= 2;
3108 vs
->as
.fmt
= AUDIO_FORMAT_S16
;
3109 vs
->as
.endianness
= 0;
3111 qemu_mutex_init(&vs
->output_mutex
);
3112 vs
->bh
= qemu_bh_new(vnc_jobs_bh
, vs
);
3114 QTAILQ_INSERT_TAIL(&vd
->clients
, vs
, next
);
3116 vnc_update_server_surface(vd
);
3119 graphic_hw_update(vd
->dcl
.con
);
3121 if (!vs
->websocket
) {
3122 vnc_start_protocol(vs
);
3125 if (vd
->num_connecting
> vd
->connections_limit
) {
3126 QTAILQ_FOREACH(vs
, &vd
->clients
, next
) {
3127 if (vs
->share_mode
== VNC_SHARE_MODE_CONNECTING
) {
3128 vnc_disconnect_start(vs
);
3135 void vnc_start_protocol(VncState
*vs
)
3137 vnc_write(vs
, "RFB 003.008\n", 12);
3139 vnc_read_when(vs
, protocol_version
, 12);
3141 vs
->mouse_mode_notifier
.notify
= check_pointer_type_change
;
3142 qemu_add_mouse_mode_change_notifier(&vs
->mouse_mode_notifier
);
3145 static void vnc_listen_io(QIONetListener
*listener
,
3146 QIOChannelSocket
*cioc
,
3149 VncDisplay
*vd
= opaque
;
3150 bool isWebsock
= listener
== vd
->wslistener
;
3152 qio_channel_set_name(QIO_CHANNEL(cioc
),
3153 isWebsock
? "vnc-ws-server" : "vnc-server");
3154 qio_channel_set_delay(QIO_CHANNEL(cioc
), false);
3155 vnc_connect(vd
, cioc
, false, isWebsock
);
3158 static const DisplayChangeListenerOps dcl_ops
= {
3160 .dpy_refresh
= vnc_refresh
,
3161 .dpy_gfx_update
= vnc_dpy_update
,
3162 .dpy_gfx_switch
= vnc_dpy_switch
,
3163 .dpy_gfx_check_format
= qemu_pixman_check_format
,
3164 .dpy_mouse_set
= vnc_mouse_set
,
3165 .dpy_cursor_define
= vnc_dpy_cursor_define
,
3168 void vnc_display_init(const char *id
, Error
**errp
)
3172 if (vnc_display_find(id
) != NULL
) {
3175 vd
= g_malloc0(sizeof(*vd
));
3177 vd
->id
= strdup(id
);
3178 QTAILQ_INSERT_TAIL(&vnc_displays
, vd
, next
);
3180 QTAILQ_INIT(&vd
->clients
);
3181 vd
->expires
= TIME_MAX
;
3183 if (keyboard_layout
) {
3184 trace_vnc_key_map_init(keyboard_layout
);
3185 vd
->kbd_layout
= init_keyboard_layout(name2keysym
,
3186 keyboard_layout
, errp
);
3188 vd
->kbd_layout
= init_keyboard_layout(name2keysym
, "en-us", errp
);
3191 if (!vd
->kbd_layout
) {
3195 vd
->share_policy
= VNC_SHARE_POLICY_ALLOW_EXCLUSIVE
;
3196 vd
->connections_limit
= 32;
3198 qemu_mutex_init(&vd
->mutex
);
3199 vnc_start_worker_thread();
3201 vd
->dcl
.ops
= &dcl_ops
;
3202 register_displaychangelistener(&vd
->dcl
);
3203 vd
->kbd
= qkbd_state_init(vd
->dcl
.con
);
3207 static void vnc_display_close(VncDisplay
*vd
)
3212 vd
->is_unix
= false;
3215 qio_net_listener_disconnect(vd
->listener
);
3216 object_unref(OBJECT(vd
->listener
));
3218 vd
->listener
= NULL
;
3220 if (vd
->wslistener
) {
3221 qio_net_listener_disconnect(vd
->wslistener
);
3222 object_unref(OBJECT(vd
->wslistener
));
3224 vd
->wslistener
= NULL
;
3226 vd
->auth
= VNC_AUTH_INVALID
;
3227 vd
->subauth
= VNC_AUTH_INVALID
;
3229 object_unparent(OBJECT(vd
->tlscreds
));
3230 vd
->tlscreds
= NULL
;
3233 object_unparent(OBJECT(vd
->tlsauthz
));
3234 vd
->tlsauthz
= NULL
;
3236 g_free(vd
->tlsauthzid
);
3237 vd
->tlsauthzid
= NULL
;
3238 if (vd
->lock_key_sync
) {
3239 qemu_remove_led_event_handler(vd
->led
);
3242 #ifdef CONFIG_VNC_SASL
3243 if (vd
->sasl
.authz
) {
3244 object_unparent(OBJECT(vd
->sasl
.authz
));
3245 vd
->sasl
.authz
= NULL
;
3247 g_free(vd
->sasl
.authzid
);
3248 vd
->sasl
.authzid
= NULL
;
3252 int vnc_display_password(const char *id
, const char *password
)
3254 VncDisplay
*vd
= vnc_display_find(id
);
3259 if (vd
->auth
== VNC_AUTH_NONE
) {
3260 error_printf_unless_qmp("If you want use passwords please enable "
3261 "password auth using '-vnc ${dpy},password'.\n");
3265 g_free(vd
->password
);
3266 vd
->password
= g_strdup(password
);
3271 int vnc_display_pw_expire(const char *id
, time_t expires
)
3273 VncDisplay
*vd
= vnc_display_find(id
);
3279 vd
->expires
= expires
;
3283 static void vnc_display_print_local_addr(VncDisplay
*vd
)
3285 SocketAddress
*addr
;
3288 if (!vd
->listener
|| !vd
->listener
->nsioc
) {
3292 addr
= qio_channel_socket_get_local_address(vd
->listener
->sioc
[0], &err
);
3297 if (addr
->type
!= SOCKET_ADDRESS_TYPE_INET
) {
3298 qapi_free_SocketAddress(addr
);
3301 error_printf_unless_qmp("VNC server running on %s:%s\n",
3304 qapi_free_SocketAddress(addr
);
3307 static QemuOptsList qemu_vnc_opts
= {
3309 .head
= QTAILQ_HEAD_INITIALIZER(qemu_vnc_opts
.head
),
3310 .implied_opt_name
= "vnc",
3314 .type
= QEMU_OPT_STRING
,
3316 .name
= "websocket",
3317 .type
= QEMU_OPT_STRING
,
3319 .name
= "tls-creds",
3320 .type
= QEMU_OPT_STRING
,
3323 .type
= QEMU_OPT_STRING
,
3326 .type
= QEMU_OPT_STRING
,
3329 .type
= QEMU_OPT_NUMBER
,
3331 .name
= "connections",
3332 .type
= QEMU_OPT_NUMBER
,
3335 .type
= QEMU_OPT_NUMBER
,
3338 .type
= QEMU_OPT_BOOL
,
3341 .type
= QEMU_OPT_BOOL
,
3344 .type
= QEMU_OPT_BOOL
,
3347 .type
= QEMU_OPT_BOOL
,
3349 .name
= "lock-key-sync",
3350 .type
= QEMU_OPT_BOOL
,
3352 .name
= "key-delay-ms",
3353 .type
= QEMU_OPT_NUMBER
,
3356 .type
= QEMU_OPT_BOOL
,
3359 .type
= QEMU_OPT_BOOL
,
3361 .name
= "tls-authz",
3362 .type
= QEMU_OPT_STRING
,
3364 .name
= "sasl-authz",
3365 .type
= QEMU_OPT_STRING
,
3368 .type
= QEMU_OPT_BOOL
,
3370 .name
= "non-adaptive",
3371 .type
= QEMU_OPT_BOOL
,
3373 { /* end of list */ }
3379 vnc_display_setup_auth(int *auth
,
3381 QCryptoTLSCreds
*tlscreds
,
3388 * We have a choice of 3 authentication options
3394 * The channel can be run in 2 modes
3399 * And TLS can use 2 types of credentials
3404 * We thus have 9 possible logical combinations
3409 * 4. tls + anon + none
3410 * 5. tls + anon + vnc
3411 * 6. tls + anon + sasl
3412 * 7. tls + x509 + none
3413 * 8. tls + x509 + vnc
3414 * 9. tls + x509 + sasl
3416 * These need to be mapped into the VNC auth schemes
3417 * in an appropriate manner. In regular VNC, all the
3418 * TLS options get mapped into VNC_AUTH_VENCRYPT
3421 * In websockets, the https:// protocol already provides
3422 * TLS support, so there is no need to make use of the
3423 * VeNCrypt extension. Furthermore, websockets browser
3424 * clients could not use VeNCrypt even if they wanted to,
3425 * as they cannot control when the TLS handshake takes
3426 * place. Thus there is no option but to rely on https://,
3427 * meaning combinations 4->6 and 7->9 will be mapped to
3428 * VNC auth schemes in the same way as combos 1->3.
3430 * Regardless of fact that we have a different mapping to
3431 * VNC auth mechs for plain VNC vs websockets VNC, the end
3432 * result has the same security characteristics.
3434 if (websocket
|| !tlscreds
) {
3436 VNC_DEBUG("Initializing VNC server with password auth\n");
3437 *auth
= VNC_AUTH_VNC
;
3439 VNC_DEBUG("Initializing VNC server with SASL auth\n");
3440 *auth
= VNC_AUTH_SASL
;
3442 VNC_DEBUG("Initializing VNC server with no auth\n");
3443 *auth
= VNC_AUTH_NONE
;
3445 *subauth
= VNC_AUTH_INVALID
;
3447 bool is_x509
= object_dynamic_cast(OBJECT(tlscreds
),
3448 TYPE_QCRYPTO_TLS_CREDS_X509
) != NULL
;
3449 bool is_anon
= object_dynamic_cast(OBJECT(tlscreds
),
3450 TYPE_QCRYPTO_TLS_CREDS_ANON
) != NULL
;
3452 if (!is_x509
&& !is_anon
) {
3454 "Unsupported TLS cred type %s",
3455 object_get_typename(OBJECT(tlscreds
)));
3458 *auth
= VNC_AUTH_VENCRYPT
;
3461 VNC_DEBUG("Initializing VNC server with x509 password auth\n");
3462 *subauth
= VNC_AUTH_VENCRYPT_X509VNC
;
3464 VNC_DEBUG("Initializing VNC server with TLS password auth\n");
3465 *subauth
= VNC_AUTH_VENCRYPT_TLSVNC
;
3470 VNC_DEBUG("Initializing VNC server with x509 SASL auth\n");
3471 *subauth
= VNC_AUTH_VENCRYPT_X509SASL
;
3473 VNC_DEBUG("Initializing VNC server with TLS SASL auth\n");
3474 *subauth
= VNC_AUTH_VENCRYPT_TLSSASL
;
3478 VNC_DEBUG("Initializing VNC server with x509 no auth\n");
3479 *subauth
= VNC_AUTH_VENCRYPT_X509NONE
;
3481 VNC_DEBUG("Initializing VNC server with TLS no auth\n");
3482 *subauth
= VNC_AUTH_VENCRYPT_TLSNONE
;
3490 static int vnc_display_get_address(const char *addrstr
,
3499 SocketAddress
**retaddr
,
3503 SocketAddress
*addr
= NULL
;
3505 addr
= g_new0(SocketAddress
, 1);
3507 if (strncmp(addrstr
, "unix:", 5) == 0) {
3508 addr
->type
= SOCKET_ADDRESS_TYPE_UNIX
;
3509 addr
->u
.q_unix
.path
= g_strdup(addrstr
+ 5);
3512 error_setg(errp
, "UNIX sockets not supported with websock");
3517 error_setg(errp
, "Port range not support with UNIX socket");
3524 unsigned long long baseport
= 0;
3525 InetSocketAddress
*inet
;
3527 port
= strrchr(addrstr
, ':');
3533 error_setg(errp
, "no vnc port specified");
3537 hostlen
= port
- addrstr
;
3539 if (*port
== '\0') {
3540 error_setg(errp
, "vnc port cannot be empty");
3545 addr
->type
= SOCKET_ADDRESS_TYPE_INET
;
3546 inet
= &addr
->u
.inet
;
3547 if (addrstr
[0] == '[' && addrstr
[hostlen
- 1] == ']') {
3548 inet
->host
= g_strndup(addrstr
+ 1, hostlen
- 2);
3550 inet
->host
= g_strndup(addrstr
, hostlen
);
3552 /* plain VNC port is just an offset, for websocket
3553 * port is absolute */
3555 if (g_str_equal(addrstr
, "") ||
3556 g_str_equal(addrstr
, "on")) {
3557 if (displaynum
== -1) {
3558 error_setg(errp
, "explicit websocket port is required");
3561 inet
->port
= g_strdup_printf(
3562 "%d", displaynum
+ 5700);
3564 inet
->has_to
= true;
3565 inet
->to
= to
+ 5700;
3568 inet
->port
= g_strdup(port
);
3571 int offset
= reverse
? 0 : 5900;
3572 if (parse_uint_full(port
, &baseport
, 10) < 0) {
3573 error_setg(errp
, "can't convert to a number: %s", port
);
3576 if (baseport
> 65535 ||
3577 baseport
+ offset
> 65535) {
3578 error_setg(errp
, "port %s out of range", port
);
3581 inet
->port
= g_strdup_printf(
3582 "%d", (int)baseport
+ offset
);
3585 inet
->has_to
= true;
3586 inet
->to
= to
+ offset
;
3591 inet
->has_ipv4
= has_ipv4
;
3593 inet
->has_ipv6
= has_ipv6
;
3602 qapi_free_SocketAddress(addr
);
3607 static void vnc_free_addresses(SocketAddress
***retsaddr
,
3612 for (i
= 0; i
< *retnsaddr
; i
++) {
3613 qapi_free_SocketAddress((*retsaddr
)[i
]);
3621 static int vnc_display_get_addresses(QemuOpts
*opts
,
3623 SocketAddress
***retsaddr
,
3625 SocketAddress
***retwsaddr
,
3629 SocketAddress
*saddr
= NULL
;
3630 SocketAddress
*wsaddr
= NULL
;
3631 QemuOptsIter addriter
;
3633 int to
= qemu_opt_get_number(opts
, "to", 0);
3634 bool has_ipv4
= qemu_opt_get(opts
, "ipv4");
3635 bool has_ipv6
= qemu_opt_get(opts
, "ipv6");
3636 bool ipv4
= qemu_opt_get_bool(opts
, "ipv4", false);
3637 bool ipv6
= qemu_opt_get_bool(opts
, "ipv6", false);
3638 int displaynum
= -1;
3646 addr
= qemu_opt_get(opts
, "vnc");
3647 if (addr
== NULL
|| g_str_equal(addr
, "none")) {
3651 if (qemu_opt_get(opts
, "websocket") &&
3652 !qcrypto_hash_supports(QCRYPTO_HASH_ALG_SHA1
)) {
3654 "SHA1 hash support is required for websockets");
3658 qemu_opt_iter_init(&addriter
, opts
, "vnc");
3659 while ((addr
= qemu_opt_iter_next(&addriter
)) != NULL
) {
3661 rv
= vnc_display_get_address(addr
, false, reverse
, 0, to
,
3668 /* Historical compat - first listen address can be used
3669 * to set the default websocket port
3671 if (displaynum
== -1) {
3674 *retsaddr
= g_renew(SocketAddress
*, *retsaddr
, *retnsaddr
+ 1);
3675 (*retsaddr
)[(*retnsaddr
)++] = saddr
;
3678 /* If we had multiple primary displays, we don't do defaults
3679 * for websocket, and require explicit config instead. */
3680 if (*retnsaddr
> 1) {
3684 qemu_opt_iter_init(&addriter
, opts
, "websocket");
3685 while ((addr
= qemu_opt_iter_next(&addriter
)) != NULL
) {
3686 if (vnc_display_get_address(addr
, true, reverse
, displaynum
, to
,
3689 &wsaddr
, errp
) < 0) {
3693 /* Historical compat - if only a single listen address was
3694 * provided, then this is used to set the default listen
3695 * address for websocket too
3697 if (*retnsaddr
== 1 &&
3698 (*retsaddr
)[0]->type
== SOCKET_ADDRESS_TYPE_INET
&&
3699 wsaddr
->type
== SOCKET_ADDRESS_TYPE_INET
&&
3700 g_str_equal(wsaddr
->u
.inet
.host
, "") &&
3701 !g_str_equal((*retsaddr
)[0]->u
.inet
.host
, "")) {
3702 g_free(wsaddr
->u
.inet
.host
);
3703 wsaddr
->u
.inet
.host
= g_strdup((*retsaddr
)[0]->u
.inet
.host
);
3706 *retwsaddr
= g_renew(SocketAddress
*, *retwsaddr
, *retnwsaddr
+ 1);
3707 (*retwsaddr
)[(*retnwsaddr
)++] = wsaddr
;
3713 vnc_free_addresses(retsaddr
, retnsaddr
);
3714 vnc_free_addresses(retwsaddr
, retnwsaddr
);
3719 static int vnc_display_connect(VncDisplay
*vd
,
3720 SocketAddress
**saddr
,
3722 SocketAddress
**wsaddr
,
3726 /* connect to viewer */
3727 QIOChannelSocket
*sioc
= NULL
;
3729 error_setg(errp
, "Cannot use websockets in reverse mode");
3733 error_setg(errp
, "Expected a single address in reverse mode");
3736 /* TODO SOCKET_ADDRESS_TYPE_FD when fd has AF_UNIX */
3737 vd
->is_unix
= saddr
[0]->type
== SOCKET_ADDRESS_TYPE_UNIX
;
3738 sioc
= qio_channel_socket_new();
3739 qio_channel_set_name(QIO_CHANNEL(sioc
), "vnc-reverse");
3740 if (qio_channel_socket_connect_sync(sioc
, saddr
[0], errp
) < 0) {
3743 vnc_connect(vd
, sioc
, false, false);
3744 object_unref(OBJECT(sioc
));
3749 static int vnc_display_listen(VncDisplay
*vd
,
3750 SocketAddress
**saddr
,
3752 SocketAddress
**wsaddr
,
3759 vd
->listener
= qio_net_listener_new();
3760 qio_net_listener_set_name(vd
->listener
, "vnc-listen");
3761 for (i
= 0; i
< nsaddr
; i
++) {
3762 if (qio_net_listener_open_sync(vd
->listener
,
3769 qio_net_listener_set_client_func(vd
->listener
,
3770 vnc_listen_io
, vd
, NULL
);
3774 vd
->wslistener
= qio_net_listener_new();
3775 qio_net_listener_set_name(vd
->wslistener
, "vnc-ws-listen");
3776 for (i
= 0; i
< nwsaddr
; i
++) {
3777 if (qio_net_listener_open_sync(vd
->wslistener
,
3784 qio_net_listener_set_client_func(vd
->wslistener
,
3785 vnc_listen_io
, vd
, NULL
);
3792 void vnc_display_open(const char *id
, Error
**errp
)
3794 VncDisplay
*vd
= vnc_display_find(id
);
3795 QemuOpts
*opts
= qemu_opts_find(&qemu_vnc_opts
, id
);
3796 SocketAddress
**saddr
= NULL
, **wsaddr
= NULL
;
3797 size_t nsaddr
, nwsaddr
;
3798 const char *share
, *device_id
;
3800 bool password
= false;
3801 bool reverse
= false;
3805 const char *tlsauthz
;
3806 const char *saslauthz
;
3807 int lock_key_sync
= 1;
3811 error_setg(errp
, "VNC display not active");
3814 vnc_display_close(vd
);
3820 reverse
= qemu_opt_get_bool(opts
, "reverse", false);
3821 if (vnc_display_get_addresses(opts
, reverse
, &saddr
, &nsaddr
,
3822 &wsaddr
, &nwsaddr
, errp
) < 0) {
3826 password
= qemu_opt_get_bool(opts
, "password", false);
3828 if (fips_get_state()) {
3830 "VNC password auth disabled due to FIPS mode, "
3831 "consider using the VeNCrypt or SASL authentication "
3832 "methods as an alternative");
3835 if (!qcrypto_cipher_supports(
3836 QCRYPTO_CIPHER_ALG_DES_RFB
, QCRYPTO_CIPHER_MODE_ECB
)) {
3838 "Cipher backend does not support DES RFB algorithm");
3843 lock_key_sync
= qemu_opt_get_bool(opts
, "lock-key-sync", true);
3844 key_delay_ms
= qemu_opt_get_number(opts
, "key-delay-ms", 10);
3845 sasl
= qemu_opt_get_bool(opts
, "sasl", false);
3846 #ifndef CONFIG_VNC_SASL
3848 error_setg(errp
, "VNC SASL auth requires cyrus-sasl support");
3851 #endif /* CONFIG_VNC_SASL */
3852 credid
= qemu_opt_get(opts
, "tls-creds");
3855 creds
= object_resolve_path_component(
3856 object_get_objects_root(), credid
);
3858 error_setg(errp
, "No TLS credentials with id '%s'",
3862 vd
->tlscreds
= (QCryptoTLSCreds
*)
3863 object_dynamic_cast(creds
,
3864 TYPE_QCRYPTO_TLS_CREDS
);
3865 if (!vd
->tlscreds
) {
3866 error_setg(errp
, "Object with id '%s' is not TLS credentials",
3870 object_ref(OBJECT(vd
->tlscreds
));
3872 if (vd
->tlscreds
->endpoint
!= QCRYPTO_TLS_CREDS_ENDPOINT_SERVER
) {
3874 "Expecting TLS credentials with a server endpoint");
3878 if (qemu_opt_get(opts
, "acl")) {
3879 error_report("The 'acl' option to -vnc is deprecated. "
3880 "Please use the 'tls-authz' and 'sasl-authz' "
3883 acl
= qemu_opt_get_bool(opts
, "acl", false);
3884 tlsauthz
= qemu_opt_get(opts
, "tls-authz");
3885 if (acl
&& tlsauthz
) {
3886 error_setg(errp
, "'acl' option is mutually exclusive with the "
3887 "'tls-authz' option");
3890 if (tlsauthz
&& !vd
->tlscreds
) {
3891 error_setg(errp
, "'tls-authz' provided but TLS is not enabled");
3895 saslauthz
= qemu_opt_get(opts
, "sasl-authz");
3896 if (acl
&& saslauthz
) {
3897 error_setg(errp
, "'acl' option is mutually exclusive with the "
3898 "'sasl-authz' option");
3901 if (saslauthz
&& !sasl
) {
3902 error_setg(errp
, "'sasl-authz' provided but SASL auth is not enabled");
3906 share
= qemu_opt_get(opts
, "share");
3908 if (strcmp(share
, "ignore") == 0) {
3909 vd
->share_policy
= VNC_SHARE_POLICY_IGNORE
;
3910 } else if (strcmp(share
, "allow-exclusive") == 0) {
3911 vd
->share_policy
= VNC_SHARE_POLICY_ALLOW_EXCLUSIVE
;
3912 } else if (strcmp(share
, "force-shared") == 0) {
3913 vd
->share_policy
= VNC_SHARE_POLICY_FORCE_SHARED
;
3915 error_setg(errp
, "unknown vnc share= option");
3919 vd
->share_policy
= VNC_SHARE_POLICY_ALLOW_EXCLUSIVE
;
3921 vd
->connections_limit
= qemu_opt_get_number(opts
, "connections", 32);
3923 #ifdef CONFIG_VNC_JPEG
3924 vd
->lossy
= qemu_opt_get_bool(opts
, "lossy", false);
3926 vd
->non_adaptive
= qemu_opt_get_bool(opts
, "non-adaptive", false);
3927 /* adaptive updates are only used with tight encoding and
3928 * if lossy updates are enabled so we can disable all the
3929 * calculations otherwise */
3931 vd
->non_adaptive
= true;
3935 vd
->tlsauthzid
= g_strdup(tlsauthz
);
3937 if (strcmp(vd
->id
, "default") == 0) {
3938 vd
->tlsauthzid
= g_strdup("vnc.x509dname");
3940 vd
->tlsauthzid
= g_strdup_printf("vnc.%s.x509dname", vd
->id
);
3942 vd
->tlsauthz
= QAUTHZ(qauthz_list_new(vd
->tlsauthzid
,
3943 QAUTHZ_LIST_POLICY_DENY
,
3946 #ifdef CONFIG_VNC_SASL
3949 vd
->sasl
.authzid
= g_strdup(saslauthz
);
3951 if (strcmp(vd
->id
, "default") == 0) {
3952 vd
->sasl
.authzid
= g_strdup("vnc.username");
3954 vd
->sasl
.authzid
= g_strdup_printf("vnc.%s.username", vd
->id
);
3956 vd
->sasl
.authz
= QAUTHZ(qauthz_list_new(vd
->sasl
.authzid
,
3957 QAUTHZ_LIST_POLICY_DENY
,
3963 if (vnc_display_setup_auth(&vd
->auth
, &vd
->subauth
,
3964 vd
->tlscreds
, password
,
3965 sasl
, false, errp
) < 0) {
3968 trace_vnc_auth_init(vd
, 0, vd
->auth
, vd
->subauth
);
3970 if (vnc_display_setup_auth(&vd
->ws_auth
, &vd
->ws_subauth
,
3971 vd
->tlscreds
, password
,
3972 sasl
, true, errp
) < 0) {
3975 trace_vnc_auth_init(vd
, 1, vd
->ws_auth
, vd
->ws_subauth
);
3977 #ifdef CONFIG_VNC_SASL
3979 int saslErr
= sasl_server_init(NULL
, "qemu");
3981 if (saslErr
!= SASL_OK
) {
3982 error_setg(errp
, "Failed to initialize SASL auth: %s",
3983 sasl_errstring(saslErr
, NULL
, NULL
));
3988 vd
->lock_key_sync
= lock_key_sync
;
3989 if (lock_key_sync
) {
3990 vd
->led
= qemu_add_led_event_handler(kbd_leds
, vd
);
3994 device_id
= qemu_opt_get(opts
, "display");
3996 int head
= qemu_opt_get_number(opts
, "head", 0);
3999 con
= qemu_console_lookup_by_device_name(device_id
, head
, &err
);
4001 error_propagate(errp
, err
);
4008 if (con
!= vd
->dcl
.con
) {
4009 qkbd_state_free(vd
->kbd
);
4010 unregister_displaychangelistener(&vd
->dcl
);
4012 register_displaychangelistener(&vd
->dcl
);
4013 vd
->kbd
= qkbd_state_init(vd
->dcl
.con
);
4015 qkbd_state_set_delay(vd
->kbd
, key_delay_ms
);
4017 if (saddr
== NULL
) {
4022 if (vnc_display_connect(vd
, saddr
, nsaddr
, wsaddr
, nwsaddr
, errp
) < 0) {
4026 if (vnc_display_listen(vd
, saddr
, nsaddr
, wsaddr
, nwsaddr
, errp
) < 0) {
4031 if (qemu_opt_get(opts
, "to")) {
4032 vnc_display_print_local_addr(vd
);
4036 vnc_free_addresses(&saddr
, &nsaddr
);
4037 vnc_free_addresses(&wsaddr
, &nwsaddr
);
4041 vnc_display_close(vd
);
4045 void vnc_display_add_client(const char *id
, int csock
, bool skipauth
)
4047 VncDisplay
*vd
= vnc_display_find(id
);
4048 QIOChannelSocket
*sioc
;
4054 sioc
= qio_channel_socket_new_fd(csock
, NULL
);
4056 qio_channel_set_name(QIO_CHANNEL(sioc
), "vnc-server");
4057 vnc_connect(vd
, sioc
, skipauth
, false);
4058 object_unref(OBJECT(sioc
));
4062 static void vnc_auto_assign_id(QemuOptsList
*olist
, QemuOpts
*opts
)
4067 id
= g_strdup("default");
4068 while (qemu_opts_find(olist
, id
)) {
4070 id
= g_strdup_printf("vnc%d", i
++);
4072 qemu_opts_set_id(opts
, id
);
4075 QemuOpts
*vnc_parse(const char *str
, Error
**errp
)
4077 QemuOptsList
*olist
= qemu_find_opts("vnc");
4078 QemuOpts
*opts
= qemu_opts_parse(olist
, str
, true, errp
);
4085 id
= qemu_opts_id(opts
);
4087 /* auto-assign id if not present */
4088 vnc_auto_assign_id(olist
, opts
);
4093 int vnc_init_func(void *opaque
, QemuOpts
*opts
, Error
**errp
)
4095 Error
*local_err
= NULL
;
4096 char *id
= (char *)qemu_opts_id(opts
);
4099 vnc_display_init(id
, &local_err
);
4101 error_propagate(errp
, local_err
);
4104 vnc_display_open(id
, &local_err
);
4105 if (local_err
!= NULL
) {
4106 error_propagate(errp
, local_err
);
4112 static void vnc_register_config(void)
4114 qemu_add_opts(&qemu_vnc_opts
);
4116 opts_init(vnc_register_config
);