mirror of
https://github.com/mii443/qemu.git
synced 2025-08-23 23:49:36 +00:00
Merge tag 'win-socket-pull-request' of https://gitlab.com/marcandre.lureau/qemu into staging
QMP command to import win32 sockets # -----BEGIN PGP SIGNATURE----- # # iQJQBAABCAA6FiEEh6m9kz+HxgbSdvYt2ujhCXWWnOUFAmQPDQ0cHG1hcmNhbmRy # ZS5sdXJlYXVAcmVkaGF0LmNvbQAKCRDa6OEJdZac5eTUD/41+bodkctP9wtNQT5g # 4P2XQysa9dhxIaQuPT48J5bN0velOAv+p+e9jNMojVPHogACRGkjJUGrh2AhaWJO # bpqB5teNz3pbTLAHNrqiJdUrJDI0WSqBN2q7WgfbzvHMugBqul13n6UG/cVWH8D3 # pDX3miBl9Cv3zUDFzPjHH3eR/MHz+6wXmuzUGQdWqyGBoLwqgWA3Bqh39BDVOeJf # 03Kq3TbJSP096EjGGrq1pTYDIIv9AKzUWgn8tT8S73sD3J0BN28Gl5HirXDx8e/4 # 2WtW/XLYKjqoUl7RmXOjfOarCV+kxzdoYCAUYfyH6DLWrkXc41L5ugFdyxxQ66Sh # +on7hKCBzPEOPEXmlm6HlMj3bK4C/GI6mIoaZgCrsvj9xlehhQNtwpndAwAR8esH # perQ6q+jPdoQnBvOBgC3amckS1kYdbQivTILkoopumw/q4waG5reyA4rshbhm/bs # U33ZRzob0XyRWqvWAcq9hnWB5gvQCcppeJlu60gocnX5wdZOjbnsBXw3l+r2osIh # izJbxwM6xmz9oHh50nhDCn42JrNdSnZJdJ/XA/lrOkTHQ6kbZO7v86Y/mKQz+Vyx # Uyhb8/y8gKrUkZlGCEMvQVcyvOA8vneX8WhfZUm6w5MWWCNKfCrEl6UGmFkPAL0m # +sUYIhN5PSxWSQU5MWogXtQEPA== # =/Y/7 # -----END PGP SIGNATURE----- # gpg: Signature made Mon 13 Mar 2023 11:46:21 GMT # gpg: using RSA key 87A9BD933F87C606D276F62DDAE8E10975969CE5 # gpg: issuer "marcandre.lureau@redhat.com" # gpg: Good signature from "Marc-André Lureau <marcandre.lureau@redhat.com>" [full] # gpg: aka "Marc-André Lureau <marcandre.lureau@gmail.com>" [full] # Primary key fingerprint: 87A9 BD93 3F87 C606 D276 F62D DAE8 E109 7596 9CE5 * tag 'win-socket-pull-request' of https://gitlab.com/marcandre.lureau/qemu: (25 commits) monitor: restrict command getfd to POSIX hosts qtest: enable vnc-display test on win32 libqtest: make qtest_qmp_add_client work on win32 qmp: add 'get-win32-socket' monitor: release the lock before calling close() qmp: 'add_client' actually expects sockets osdep: implement qemu_socketpair() for win32 tests/docker: fix a win32 error due to portability char: do not double-close fd when failing to add client tests: fix path separator, use g_build_filename() win32: replace closesocket() with close() wrapper os-posix: remove useless ioctlsocket() define win32: avoid mixing SOCKET and file descriptor space slirp: open-code qemu_socket_(un)select() slirp: unregister the win32 SOCKET main-loop: remove qemu_fd_register(), win32/slirp/socket specific aio/win32: aio_set_fd_handler() only supports SOCKET aio: make aio_set_fd_poll() static to aio-posix.c win32/socket: introduce qemu_socket_unselect() helper win32/socket: introduce qemu_socket_select() helper ... Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
This commit is contained in:
@ -573,13 +573,13 @@ static int tpm_emulator_prepare_data_fd(TPMEmulator *tpm_emu)
|
|||||||
goto err_exit;
|
goto err_exit;
|
||||||
}
|
}
|
||||||
|
|
||||||
closesocket(fds[1]);
|
close(fds[1]);
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
err_exit:
|
err_exit:
|
||||||
closesocket(fds[0]);
|
close(fds[0]);
|
||||||
closesocket(fds[1]);
|
close(fds[1]);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1175,12 +1175,10 @@ bool qmp_add_client_char(int fd, bool has_skipauth, bool skipauth,
|
|||||||
|
|
||||||
if (!s) {
|
if (!s) {
|
||||||
error_setg(errp, "protocol '%s' is invalid", protocol);
|
error_setg(errp, "protocol '%s' is invalid", protocol);
|
||||||
close(fd);
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
if (qemu_chr_add_client(s, fd) < 0) {
|
if (qemu_chr_add_client(s, fd) < 0) {
|
||||||
error_setg(errp, "failed to add client");
|
error_setg(errp, "failed to add client");
|
||||||
close(fd);
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
return true;
|
return true;
|
||||||
|
@ -59,7 +59,7 @@ qcrypto_afalg_socket_bind(const char *type, const char *name,
|
|||||||
|
|
||||||
if (bind(sbind, (const struct sockaddr *)&salg, sizeof(salg)) != 0) {
|
if (bind(sbind, (const struct sockaddr *)&salg, sizeof(salg)) != 0) {
|
||||||
error_setg_errno(errp, errno, "Failed to bind socket");
|
error_setg_errno(errp, errno, "Failed to bind socket");
|
||||||
closesocket(sbind);
|
close(sbind);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -105,11 +105,11 @@ void qcrypto_afalg_comm_free(QCryptoAFAlg *afalg)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (afalg->tfmfd != -1) {
|
if (afalg->tfmfd != -1) {
|
||||||
closesocket(afalg->tfmfd);
|
close(afalg->tfmfd);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (afalg->opfd != -1) {
|
if (afalg->opfd != -1) {
|
||||||
closesocket(afalg->opfd);
|
close(afalg->opfd);
|
||||||
}
|
}
|
||||||
|
|
||||||
g_free(afalg);
|
g_free(afalg);
|
||||||
|
@ -1486,6 +1486,7 @@ SRST
|
|||||||
Inject an MCE on the given CPU (x86 only).
|
Inject an MCE on the given CPU (x86 only).
|
||||||
ERST
|
ERST
|
||||||
|
|
||||||
|
#ifdef CONFIG_POSIX
|
||||||
{
|
{
|
||||||
.name = "getfd",
|
.name = "getfd",
|
||||||
.args_type = "fdname:s",
|
.args_type = "fdname:s",
|
||||||
@ -1501,6 +1502,7 @@ SRST
|
|||||||
mechanism on unix sockets, it is stored using the name *fdname* for
|
mechanism on unix sockets, it is stored using the name *fdname* for
|
||||||
later use by other monitor commands.
|
later use by other monitor commands.
|
||||||
ERST
|
ERST
|
||||||
|
#endif
|
||||||
|
|
||||||
{
|
{
|
||||||
.name = "closefd",
|
.name = "closefd",
|
||||||
|
@ -340,7 +340,7 @@ static void hv_syndbg_realize(DeviceState *dev, Error **errp)
|
|||||||
syndbg->servaddr.sin_family = AF_INET;
|
syndbg->servaddr.sin_family = AF_INET;
|
||||||
if (connect(syndbg->socket, (struct sockaddr *)&syndbg->servaddr,
|
if (connect(syndbg->socket, (struct sockaddr *)&syndbg->servaddr,
|
||||||
sizeof(syndbg->servaddr)) < 0) {
|
sizeof(syndbg->servaddr)) < 0) {
|
||||||
closesocket(syndbg->socket);
|
close(syndbg->socket);
|
||||||
error_setg(errp, "%s failed to connect to socket", TYPE_HV_SYNDBG);
|
error_setg(errp, "%s failed to connect to socket", TYPE_HV_SYNDBG);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
@ -357,7 +357,7 @@ static void hv_syndbg_unrealize(DeviceState *dev)
|
|||||||
|
|
||||||
if (syndbg->socket > 0) {
|
if (syndbg->socket > 0) {
|
||||||
qemu_set_fd_handler(syndbg->socket, NULL, NULL, NULL);
|
qemu_set_fd_handler(syndbg->socket, NULL, NULL, NULL);
|
||||||
closesocket(syndbg->socket);
|
close(syndbg->socket);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -482,14 +482,6 @@ void aio_set_fd_handler(AioContext *ctx,
|
|||||||
IOHandler *io_poll_ready,
|
IOHandler *io_poll_ready,
|
||||||
void *opaque);
|
void *opaque);
|
||||||
|
|
||||||
/* Set polling begin/end callbacks for a file descriptor that has already been
|
|
||||||
* registered with aio_set_fd_handler. Do nothing if the file descriptor is
|
|
||||||
* not registered.
|
|
||||||
*/
|
|
||||||
void aio_set_fd_poll(AioContext *ctx, int fd,
|
|
||||||
IOHandler *io_poll_begin,
|
|
||||||
IOHandler *io_poll_end);
|
|
||||||
|
|
||||||
/* Register an event notifier and associated callbacks. Behaves very similarly
|
/* Register an event notifier and associated callbacks. Behaves very similarly
|
||||||
* to event_notifier_set_handler. Unlike event_notifier_set_handler, these callbacks
|
* to event_notifier_set_handler. Unlike event_notifier_set_handler, these callbacks
|
||||||
* will be invoked when using aio_poll().
|
* will be invoked when using aio_poll().
|
||||||
|
@ -519,6 +519,12 @@ static inline void error_propagator_cleanup(ErrorPropagator *prop)
|
|||||||
|
|
||||||
G_DEFINE_AUTO_CLEANUP_CLEAR_FUNC(ErrorPropagator, error_propagator_cleanup);
|
G_DEFINE_AUTO_CLEANUP_CLEAR_FUNC(ErrorPropagator, error_propagator_cleanup);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Special error destination to warn on error.
|
||||||
|
* See error_setg() and error_propagate() for details.
|
||||||
|
*/
|
||||||
|
extern Error *error_warn;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Special error destination to abort on error.
|
* Special error destination to abort on error.
|
||||||
* See error_setg() and error_propagate() for details.
|
* See error_setg() and error_propagate() for details.
|
||||||
|
@ -387,8 +387,6 @@ void qemu_cond_timedwait_iothread(QemuCond *cond, int ms);
|
|||||||
|
|
||||||
/* internal interfaces */
|
/* internal interfaces */
|
||||||
|
|
||||||
void qemu_fd_register(int fd);
|
|
||||||
|
|
||||||
#define qemu_bh_new(cb, opaque) \
|
#define qemu_bh_new(cb, opaque) \
|
||||||
qemu_bh_new_full((cb), (opaque), (stringify(cb)))
|
qemu_bh_new_full((cb), (opaque), (stringify(cb)))
|
||||||
QEMUBH *qemu_bh_new_full(QEMUBHFunc *cb, void *opaque, const char *name);
|
QEMUBH *qemu_bh_new_full(QEMUBHFunc *cb, void *opaque, const char *name);
|
||||||
|
@ -665,20 +665,6 @@ void qemu_prealloc_mem(int fd, char *area, size_t sz, int max_threads,
|
|||||||
*/
|
*/
|
||||||
char *qemu_get_pid_name(pid_t pid);
|
char *qemu_get_pid_name(pid_t pid);
|
||||||
|
|
||||||
/**
|
|
||||||
* qemu_fork:
|
|
||||||
*
|
|
||||||
* A version of fork that avoids signal handler race
|
|
||||||
* conditions that can lead to child process getting
|
|
||||||
* signals that are otherwise only expected by the
|
|
||||||
* parent. It also resets all signal handlers to the
|
|
||||||
* default settings.
|
|
||||||
*
|
|
||||||
* Returns 0 to child process, pid number to parent
|
|
||||||
* or -1 on failure.
|
|
||||||
*/
|
|
||||||
pid_t qemu_fork(Error **errp);
|
|
||||||
|
|
||||||
/* Using intptr_t ensures that qemu_*_page_mask is sign-extended even
|
/* Using intptr_t ensures that qemu_*_page_mask is sign-extended even
|
||||||
* when intptr_t is 32-bit and we are aligning a long long.
|
* when intptr_t is 32-bit and we are aligning a long long.
|
||||||
*/
|
*/
|
||||||
|
@ -15,7 +15,6 @@ int inet_aton(const char *cp, struct in_addr *ia);
|
|||||||
bool fd_is_socket(int fd);
|
bool fd_is_socket(int fd);
|
||||||
int qemu_socket(int domain, int type, int protocol);
|
int qemu_socket(int domain, int type, int protocol);
|
||||||
|
|
||||||
#ifndef WIN32
|
|
||||||
/**
|
/**
|
||||||
* qemu_socketpair:
|
* qemu_socketpair:
|
||||||
* @domain: specifies a communication domain, such as PF_UNIX
|
* @domain: specifies a communication domain, such as PF_UNIX
|
||||||
@ -30,7 +29,6 @@ int qemu_socket(int domain, int type, int protocol);
|
|||||||
* Return 0 on success.
|
* Return 0 on success.
|
||||||
*/
|
*/
|
||||||
int qemu_socketpair(int domain, int type, int protocol, int sv[2]);
|
int qemu_socketpair(int domain, int type, int protocol, int sv[2]);
|
||||||
#endif
|
|
||||||
|
|
||||||
int qemu_accept(int s, struct sockaddr *addr, socklen_t *addrlen);
|
int qemu_accept(int s, struct sockaddr *addr, socklen_t *addrlen);
|
||||||
/*
|
/*
|
||||||
|
@ -51,9 +51,6 @@ void os_daemonize(void);
|
|||||||
void os_setup_post(void);
|
void os_setup_post(void);
|
||||||
int os_mlock(void);
|
int os_mlock(void);
|
||||||
|
|
||||||
#define closesocket(s) close(s)
|
|
||||||
#define ioctlsocket(s, r, v) ioctl(s, r, v)
|
|
||||||
|
|
||||||
int os_set_daemonize(bool d);
|
int os_set_daemonize(bool d);
|
||||||
bool is_daemonized(void);
|
bool is_daemonized(void);
|
||||||
|
|
||||||
|
@ -29,6 +29,7 @@
|
|||||||
#include <winsock2.h>
|
#include <winsock2.h>
|
||||||
#include <windows.h>
|
#include <windows.h>
|
||||||
#include <ws2tcpip.h>
|
#include <ws2tcpip.h>
|
||||||
|
#include "qemu/typedefs.h"
|
||||||
|
|
||||||
#ifdef HAVE_AFUNIX_H
|
#ifdef HAVE_AFUNIX_H
|
||||||
#include <afunix.h>
|
#include <afunix.h>
|
||||||
@ -164,10 +165,20 @@ static inline void qemu_funlockfile(FILE *f)
|
|||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* Helper for WSAEventSelect, to report errors */
|
||||||
|
bool qemu_socket_select(int sockfd, WSAEVENT hEventObject,
|
||||||
|
long lNetworkEvents, Error **errp);
|
||||||
|
|
||||||
|
bool qemu_socket_unselect(int sockfd, Error **errp);
|
||||||
|
|
||||||
/* We wrap all the sockets functions so that we can
|
/* We wrap all the sockets functions so that we can
|
||||||
* set errno based on WSAGetLastError()
|
* set errno based on WSAGetLastError()
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
#undef close
|
||||||
|
#define close qemu_close_wrap
|
||||||
|
int qemu_close_wrap(int fd);
|
||||||
|
|
||||||
#undef connect
|
#undef connect
|
||||||
#define connect qemu_connect_wrap
|
#define connect qemu_connect_wrap
|
||||||
int qemu_connect_wrap(int sockfd, const struct sockaddr *addr,
|
int qemu_connect_wrap(int sockfd, const struct sockaddr *addr,
|
||||||
@ -199,10 +210,6 @@ int qemu_shutdown_wrap(int sockfd, int how);
|
|||||||
#define ioctlsocket qemu_ioctlsocket_wrap
|
#define ioctlsocket qemu_ioctlsocket_wrap
|
||||||
int qemu_ioctlsocket_wrap(int fd, int req, void *val);
|
int qemu_ioctlsocket_wrap(int fd, int req, void *val);
|
||||||
|
|
||||||
#undef closesocket
|
|
||||||
#define closesocket qemu_closesocket_wrap
|
|
||||||
int qemu_closesocket_wrap(int fd);
|
|
||||||
|
|
||||||
#undef getsockopt
|
#undef getsockopt
|
||||||
#define getsockopt qemu_getsockopt_wrap
|
#define getsockopt qemu_getsockopt_wrap
|
||||||
int qemu_getsockopt_wrap(int sockfd, int level, int optname,
|
int qemu_getsockopt_wrap(int sockfd, int level, int optname,
|
||||||
|
@ -442,9 +442,9 @@ static void qio_channel_socket_finalize(Object *obj)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
#ifdef WIN32
|
#ifdef WIN32
|
||||||
WSAEventSelect(ioc->fd, NULL, 0);
|
qemu_socket_unselect(ioc->fd, NULL);
|
||||||
#endif
|
#endif
|
||||||
closesocket(ioc->fd);
|
close(ioc->fd);
|
||||||
ioc->fd = -1;
|
ioc->fd = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -846,13 +846,13 @@ qio_channel_socket_close(QIOChannel *ioc,
|
|||||||
|
|
||||||
if (sioc->fd != -1) {
|
if (sioc->fd != -1) {
|
||||||
#ifdef WIN32
|
#ifdef WIN32
|
||||||
WSAEventSelect(sioc->fd, NULL, 0);
|
qemu_socket_unselect(sioc->fd, NULL);
|
||||||
#endif
|
#endif
|
||||||
if (qio_channel_has_feature(ioc, QIO_CHANNEL_FEATURE_LISTEN)) {
|
if (qio_channel_has_feature(ioc, QIO_CHANNEL_FEATURE_LISTEN)) {
|
||||||
socket_listen_cleanup(sioc->fd, errp);
|
socket_listen_cleanup(sioc->fd, errp);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (closesocket(sioc->fd) < 0) {
|
if (close(sioc->fd) < 0) {
|
||||||
sioc->fd = -1;
|
sioc->fd = -1;
|
||||||
error_setg_errno(&err, errno, "Unable to close socket");
|
error_setg_errno(&err, errno, "Unable to close socket");
|
||||||
error_propagate(errp, err);
|
error_propagate(errp, err);
|
||||||
|
@ -275,15 +275,15 @@ GSource *qio_channel_create_fd_watch(QIOChannel *ioc,
|
|||||||
|
|
||||||
#ifdef CONFIG_WIN32
|
#ifdef CONFIG_WIN32
|
||||||
GSource *qio_channel_create_socket_watch(QIOChannel *ioc,
|
GSource *qio_channel_create_socket_watch(QIOChannel *ioc,
|
||||||
int socket,
|
int sockfd,
|
||||||
GIOCondition condition)
|
GIOCondition condition)
|
||||||
{
|
{
|
||||||
GSource *source;
|
GSource *source;
|
||||||
QIOChannelSocketSource *ssource;
|
QIOChannelSocketSource *ssource;
|
||||||
|
|
||||||
WSAEventSelect(socket, ioc->event,
|
qemu_socket_select(sockfd, ioc->event,
|
||||||
FD_READ | FD_ACCEPT | FD_CLOSE |
|
FD_READ | FD_ACCEPT | FD_CLOSE |
|
||||||
FD_CONNECT | FD_WRITE | FD_OOB);
|
FD_CONNECT | FD_WRITE | FD_OOB, NULL);
|
||||||
|
|
||||||
source = g_source_new(&qio_channel_socket_source_funcs,
|
source = g_source_new(&qio_channel_socket_source_funcs,
|
||||||
sizeof(QIOChannelSocketSource));
|
sizeof(QIOChannelSocketSource));
|
||||||
@ -293,7 +293,7 @@ GSource *qio_channel_create_socket_watch(QIOChannel *ioc,
|
|||||||
object_ref(OBJECT(ioc));
|
object_ref(OBJECT(ioc));
|
||||||
|
|
||||||
ssource->condition = condition;
|
ssource->condition = condition;
|
||||||
ssource->socket = socket;
|
ssource->socket = _get_osfhandle(sockfd);
|
||||||
ssource->revents = 0;
|
ssource->revents = 0;
|
||||||
|
|
||||||
ssource->fd.fd = (gintptr)ioc->event;
|
ssource->fd.fd = (gintptr)ioc->event;
|
||||||
|
103
monitor/fds.c
103
monitor/fds.c
@ -61,11 +61,48 @@ struct MonFdset {
|
|||||||
static QemuMutex mon_fdsets_lock;
|
static QemuMutex mon_fdsets_lock;
|
||||||
static QLIST_HEAD(, MonFdset) mon_fdsets;
|
static QLIST_HEAD(, MonFdset) mon_fdsets;
|
||||||
|
|
||||||
|
static bool monitor_add_fd(Monitor *mon, int fd, const char *fdname, Error **errp)
|
||||||
|
{
|
||||||
|
mon_fd_t *monfd;
|
||||||
|
|
||||||
|
if (qemu_isdigit(fdname[0])) {
|
||||||
|
close(fd);
|
||||||
|
error_setg(errp, QERR_INVALID_PARAMETER_VALUE, "fdname",
|
||||||
|
"a name not starting with a digit");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* See close() call below. */
|
||||||
|
qemu_mutex_lock(&mon->mon_lock);
|
||||||
|
QLIST_FOREACH(monfd, &mon->fds, next) {
|
||||||
|
int tmp_fd;
|
||||||
|
|
||||||
|
if (strcmp(monfd->name, fdname) != 0) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
tmp_fd = monfd->fd;
|
||||||
|
monfd->fd = fd;
|
||||||
|
qemu_mutex_unlock(&mon->mon_lock);
|
||||||
|
/* Make sure close() is outside critical section */
|
||||||
|
close(tmp_fd);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
monfd = g_new0(mon_fd_t, 1);
|
||||||
|
monfd->name = g_strdup(fdname);
|
||||||
|
monfd->fd = fd;
|
||||||
|
|
||||||
|
QLIST_INSERT_HEAD(&mon->fds, monfd, next);
|
||||||
|
qemu_mutex_unlock(&mon->mon_lock);
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
#ifdef CONFIG_POSIX
|
||||||
void qmp_getfd(const char *fdname, Error **errp)
|
void qmp_getfd(const char *fdname, Error **errp)
|
||||||
{
|
{
|
||||||
Monitor *cur_mon = monitor_cur();
|
Monitor *cur_mon = monitor_cur();
|
||||||
mon_fd_t *monfd;
|
int fd;
|
||||||
int fd, tmp_fd;
|
|
||||||
|
|
||||||
fd = qemu_chr_fe_get_msgfd(&cur_mon->chr);
|
fd = qemu_chr_fe_get_msgfd(&cur_mon->chr);
|
||||||
if (fd == -1) {
|
if (fd == -1) {
|
||||||
@ -73,32 +110,9 @@ void qmp_getfd(const char *fdname, Error **errp)
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (qemu_isdigit(fdname[0])) {
|
monitor_add_fd(cur_mon, fd, fdname, errp);
|
||||||
close(fd);
|
|
||||||
error_setg(errp, QERR_INVALID_PARAMETER_VALUE, "fdname",
|
|
||||||
"a name not starting with a digit");
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
QEMU_LOCK_GUARD(&cur_mon->mon_lock);
|
|
||||||
QLIST_FOREACH(monfd, &cur_mon->fds, next) {
|
|
||||||
if (strcmp(monfd->name, fdname) != 0) {
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
tmp_fd = monfd->fd;
|
|
||||||
monfd->fd = fd;
|
|
||||||
/* Make sure close() is outside critical section */
|
|
||||||
close(tmp_fd);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
monfd = g_new0(mon_fd_t, 1);
|
|
||||||
monfd->name = g_strdup(fdname);
|
|
||||||
monfd->fd = fd;
|
|
||||||
|
|
||||||
QLIST_INSERT_HEAD(&cur_mon->fds, monfd, next);
|
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
void qmp_closefd(const char *fdname, Error **errp)
|
void qmp_closefd(const char *fdname, Error **errp)
|
||||||
{
|
{
|
||||||
@ -211,6 +225,41 @@ error:
|
|||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifdef WIN32
|
||||||
|
void qmp_get_win32_socket(const char *infos, const char *fdname, Error **errp)
|
||||||
|
{
|
||||||
|
g_autofree WSAPROTOCOL_INFOW *info = NULL;
|
||||||
|
gsize len;
|
||||||
|
SOCKET sk;
|
||||||
|
int fd;
|
||||||
|
|
||||||
|
info = (void *)g_base64_decode(infos, &len);
|
||||||
|
if (len != sizeof(*info)) {
|
||||||
|
error_setg(errp, "Invalid WSAPROTOCOL_INFOW value");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
sk = WSASocketW(FROM_PROTOCOL_INFO,
|
||||||
|
FROM_PROTOCOL_INFO,
|
||||||
|
FROM_PROTOCOL_INFO,
|
||||||
|
info, 0, 0);
|
||||||
|
if (sk == INVALID_SOCKET) {
|
||||||
|
error_setg_win32(errp, WSAGetLastError(), "Couldn't import socket");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
fd = _open_osfhandle(sk, _O_BINARY);
|
||||||
|
if (fd < 0) {
|
||||||
|
error_setg_errno(errp, errno, "Failed to associate a FD with the SOCKET");
|
||||||
|
closesocket(sk);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
monitor_add_fd(monitor_cur(), fd, fdname, errp);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
|
||||||
void qmp_remove_fd(int64_t fdset_id, bool has_fd, int64_t fd, Error **errp)
|
void qmp_remove_fd(int64_t fdset_id, bool has_fd, int64_t fd, Error **errp)
|
||||||
{
|
{
|
||||||
MonFdset *mon_fdset;
|
MonFdset *mon_fdset;
|
||||||
|
@ -192,6 +192,7 @@ void hmp_change(Monitor *mon, const QDict *qdict)
|
|||||||
hmp_handle_error(mon, err);
|
hmp_handle_error(mon, err);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifdef CONFIG_POSIX
|
||||||
void hmp_getfd(Monitor *mon, const QDict *qdict)
|
void hmp_getfd(Monitor *mon, const QDict *qdict)
|
||||||
{
|
{
|
||||||
const char *fdname = qdict_get_str(qdict, "fdname");
|
const char *fdname = qdict_get_str(qdict, "fdname");
|
||||||
@ -200,6 +201,7 @@ void hmp_getfd(Monitor *mon, const QDict *qdict)
|
|||||||
qmp_getfd(fdname, &err);
|
qmp_getfd(fdname, &err);
|
||||||
hmp_handle_error(mon, err);
|
hmp_handle_error(mon, err);
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
void hmp_closefd(Monitor *mon, const QDict *qdict)
|
void hmp_closefd(Monitor *mon, const QDict *qdict)
|
||||||
{
|
{
|
||||||
|
@ -14,6 +14,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include "qemu/osdep.h"
|
#include "qemu/osdep.h"
|
||||||
|
#include "qemu/sockets.h"
|
||||||
#include "monitor-internal.h"
|
#include "monitor-internal.h"
|
||||||
#include "monitor/qdev.h"
|
#include "monitor/qdev.h"
|
||||||
#include "monitor/qmp-helpers.h"
|
#include "monitor/qmp-helpers.h"
|
||||||
@ -139,6 +140,12 @@ void qmp_add_client(const char *protocol, const char *fdname,
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (!fd_is_socket(fd)) {
|
||||||
|
error_setg(errp, "parameter @fdname must name a socket");
|
||||||
|
close(fd);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
for (i = 0; i < ARRAY_SIZE(protocol_table); i++) {
|
for (i = 0; i < ARRAY_SIZE(protocol_table); i++) {
|
||||||
if (!strcmp(protocol, protocol_table[i].name)) {
|
if (!strcmp(protocol, protocol_table[i].name)) {
|
||||||
if (!protocol_table[i].add_client(fd, has_skipauth, skipauth,
|
if (!protocol_table[i].add_client(fd, has_skipauth, skipauth,
|
||||||
|
14
net/dgram.c
14
net/dgram.c
@ -230,7 +230,7 @@ static int net_dgram_mcast_create(struct sockaddr_in *mcastaddr,
|
|||||||
return fd;
|
return fd;
|
||||||
fail:
|
fail:
|
||||||
if (fd >= 0) {
|
if (fd >= 0) {
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
}
|
}
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
@ -352,7 +352,7 @@ static int net_dgram_mcast_init(NetClientState *peer,
|
|||||||
if (convert_host_port(saddr, local->u.inet.host, local->u.inet.port,
|
if (convert_host_port(saddr, local->u.inet.host, local->u.inet.port,
|
||||||
errp) < 0) {
|
errp) < 0) {
|
||||||
g_free(saddr);
|
g_free(saddr);
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -360,14 +360,14 @@ static int net_dgram_mcast_init(NetClientState *peer,
|
|||||||
if (saddr->sin_addr.s_addr == 0) {
|
if (saddr->sin_addr.s_addr == 0) {
|
||||||
error_setg(errp, "can't setup multicast destination address");
|
error_setg(errp, "can't setup multicast destination address");
|
||||||
g_free(saddr);
|
g_free(saddr);
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
/* clone dgram socket */
|
/* clone dgram socket */
|
||||||
newfd = net_dgram_mcast_create(saddr, NULL, errp);
|
newfd = net_dgram_mcast_create(saddr, NULL, errp);
|
||||||
if (newfd < 0) {
|
if (newfd < 0) {
|
||||||
g_free(saddr);
|
g_free(saddr);
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
/* clone newfd to fd, close newfd */
|
/* clone newfd to fd, close newfd */
|
||||||
@ -494,14 +494,14 @@ int net_init_dgram(const Netdev *netdev, const char *name,
|
|||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
error_setg_errno(errp, errno,
|
error_setg_errno(errp, errno,
|
||||||
"can't set socket option SO_REUSEADDR");
|
"can't set socket option SO_REUSEADDR");
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
ret = bind(fd, (struct sockaddr *)&laddr_in, sizeof(laddr_in));
|
ret = bind(fd, (struct sockaddr *)&laddr_in, sizeof(laddr_in));
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
error_setg_errno(errp, errno, "can't bind ip=%s to socket",
|
error_setg_errno(errp, errno, "can't bind ip=%s to socket",
|
||||||
inet_ntoa(laddr_in.sin_addr));
|
inet_ntoa(laddr_in.sin_addr));
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
qemu_socket_set_nonblock(fd);
|
qemu_socket_set_nonblock(fd);
|
||||||
@ -548,7 +548,7 @@ int net_init_dgram(const Netdev *netdev, const char *name,
|
|||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
error_setg_errno(errp, errno, "can't bind unix=%s to socket",
|
error_setg_errno(errp, errno, "can't bind unix=%s to socket",
|
||||||
laddr_un.sun_path);
|
laddr_un.sun_path);
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
qemu_socket_set_nonblock(fd);
|
qemu_socket_set_nonblock(fd);
|
||||||
|
16
net/slirp.c
16
net/slirp.c
@ -248,12 +248,24 @@ static void net_slirp_timer_mod(void *timer, int64_t expire_timer,
|
|||||||
|
|
||||||
static void net_slirp_register_poll_fd(int fd, void *opaque)
|
static void net_slirp_register_poll_fd(int fd, void *opaque)
|
||||||
{
|
{
|
||||||
qemu_fd_register(fd);
|
#ifdef WIN32
|
||||||
|
AioContext *ctxt = qemu_get_aio_context();
|
||||||
|
|
||||||
|
if (WSAEventSelect(fd, event_notifier_get_handle(&ctxt->notifier),
|
||||||
|
FD_READ | FD_ACCEPT | FD_CLOSE |
|
||||||
|
FD_CONNECT | FD_WRITE | FD_OOB) != 0) {
|
||||||
|
error_setg_win32(&error_warn, WSAGetLastError(), "failed to WSAEventSelect()");
|
||||||
|
}
|
||||||
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
static void net_slirp_unregister_poll_fd(int fd, void *opaque)
|
static void net_slirp_unregister_poll_fd(int fd, void *opaque)
|
||||||
{
|
{
|
||||||
/* no qemu_fd_unregister */
|
#ifdef WIN32
|
||||||
|
if (WSAEventSelect(fd, NULL, 0) != 0) {
|
||||||
|
error_setg_win32(&error_warn, WSAGetLastError(), "failed to WSAEventSelect()");
|
||||||
|
}
|
||||||
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
static void net_slirp_notify(void *opaque)
|
static void net_slirp_notify(void *opaque)
|
||||||
|
22
net/socket.c
22
net/socket.c
@ -172,7 +172,7 @@ static void net_socket_send(void *opaque)
|
|||||||
if (s->listen_fd != -1) {
|
if (s->listen_fd != -1) {
|
||||||
qemu_set_fd_handler(s->listen_fd, net_socket_accept, NULL, s);
|
qemu_set_fd_handler(s->listen_fd, net_socket_accept, NULL, s);
|
||||||
}
|
}
|
||||||
closesocket(s->fd);
|
close(s->fd);
|
||||||
|
|
||||||
s->fd = -1;
|
s->fd = -1;
|
||||||
net_socket_rs_init(&s->rs, net_socket_rs_finalize, false);
|
net_socket_rs_init(&s->rs, net_socket_rs_finalize, false);
|
||||||
@ -299,7 +299,7 @@ static int net_socket_mcast_create(struct sockaddr_in *mcastaddr,
|
|||||||
return fd;
|
return fd;
|
||||||
fail:
|
fail:
|
||||||
if (fd >= 0)
|
if (fd >= 0)
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -314,7 +314,7 @@ static void net_socket_cleanup(NetClientState *nc)
|
|||||||
}
|
}
|
||||||
if (s->listen_fd != -1) {
|
if (s->listen_fd != -1) {
|
||||||
qemu_set_fd_handler(s->listen_fd, NULL, NULL, NULL);
|
qemu_set_fd_handler(s->listen_fd, NULL, NULL, NULL);
|
||||||
closesocket(s->listen_fd);
|
close(s->listen_fd);
|
||||||
s->listen_fd = -1;
|
s->listen_fd = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -399,7 +399,7 @@ static NetSocketState *net_socket_fd_init_dgram(NetClientState *peer,
|
|||||||
return s;
|
return s;
|
||||||
|
|
||||||
err:
|
err:
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -456,7 +456,7 @@ static NetSocketState *net_socket_fd_init(NetClientState *peer,
|
|||||||
if(getsockopt(fd, SOL_SOCKET, SO_TYPE, (char *)&so_type,
|
if(getsockopt(fd, SOL_SOCKET, SO_TYPE, (char *)&so_type,
|
||||||
(socklen_t *)&optlen)< 0) {
|
(socklen_t *)&optlen)< 0) {
|
||||||
error_setg(errp, "can't get socket option SO_TYPE");
|
error_setg(errp, "can't get socket option SO_TYPE");
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
switch(so_type) {
|
switch(so_type) {
|
||||||
@ -468,7 +468,7 @@ static NetSocketState *net_socket_fd_init(NetClientState *peer,
|
|||||||
default:
|
default:
|
||||||
error_setg(errp, "socket type=%d for fd=%d must be either"
|
error_setg(errp, "socket type=%d for fd=%d must be either"
|
||||||
" SOCK_DGRAM or SOCK_STREAM", so_type, fd);
|
" SOCK_DGRAM or SOCK_STREAM", so_type, fd);
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
}
|
}
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
@ -526,13 +526,13 @@ static int net_socket_listen_init(NetClientState *peer,
|
|||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
error_setg_errno(errp, errno, "can't bind ip=%s to socket",
|
error_setg_errno(errp, errno, "can't bind ip=%s to socket",
|
||||||
inet_ntoa(saddr.sin_addr));
|
inet_ntoa(saddr.sin_addr));
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
ret = listen(fd, 0);
|
ret = listen(fd, 0);
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
error_setg_errno(errp, errno, "can't listen on socket");
|
error_setg_errno(errp, errno, "can't listen on socket");
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -579,7 +579,7 @@ static int net_socket_connect_init(NetClientState *peer,
|
|||||||
break;
|
break;
|
||||||
} else {
|
} else {
|
||||||
error_setg_errno(errp, errno, "can't connect socket");
|
error_setg_errno(errp, errno, "can't connect socket");
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
@ -671,14 +671,14 @@ static int net_socket_udp_init(NetClientState *peer,
|
|||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
error_setg_errno(errp, errno,
|
error_setg_errno(errp, errno,
|
||||||
"can't set socket option SO_REUSEADDR");
|
"can't set socket option SO_REUSEADDR");
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
ret = bind(fd, (struct sockaddr *)&laddr, sizeof(laddr));
|
ret = bind(fd, (struct sockaddr *)&laddr, sizeof(laddr));
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
error_setg_errno(errp, errno, "can't bind ip=%s to socket",
|
error_setg_errno(errp, errno, "can't bind ip=%s to socket",
|
||||||
inet_ntoa(laddr.sin_addr));
|
inet_ntoa(laddr.sin_addr));
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
qemu_socket_set_nonblock(fd);
|
qemu_socket_set_nonblock(fd);
|
||||||
|
@ -14,6 +14,9 @@
|
|||||||
# Allow client connections for VNC, Spice and socket based
|
# Allow client connections for VNC, Spice and socket based
|
||||||
# character devices to be passed in to QEMU via SCM_RIGHTS.
|
# character devices to be passed in to QEMU via SCM_RIGHTS.
|
||||||
#
|
#
|
||||||
|
# If the FD associated with @fdname is not a socket, the command will fail and
|
||||||
|
# the FD will be closed.
|
||||||
|
#
|
||||||
# @protocol: protocol name. Valid names are "vnc", "spice", "@dbus-display" or
|
# @protocol: protocol name. Valid names are "vnc", "spice", "@dbus-display" or
|
||||||
# the name of a character device (eg. from -chardev id=XXXX)
|
# the name of a character device (eg. from -chardev id=XXXX)
|
||||||
#
|
#
|
||||||
@ -270,7 +273,38 @@
|
|||||||
# <- { "return": {} }
|
# <- { "return": {} }
|
||||||
#
|
#
|
||||||
##
|
##
|
||||||
{ 'command': 'getfd', 'data': {'fdname': 'str'} }
|
{ 'command': 'getfd', 'data': {'fdname': 'str'}, 'if': 'CONFIG_POSIX' }
|
||||||
|
|
||||||
|
##
|
||||||
|
# @get-win32-socket:
|
||||||
|
#
|
||||||
|
# Add a socket that was duplicated to QEMU process with
|
||||||
|
# WSADuplicateSocketW() via WSASocket() & WSAPROTOCOL_INFOW structure
|
||||||
|
# and assign it a name (the SOCKET is associated with a CRT file
|
||||||
|
# descriptor)
|
||||||
|
#
|
||||||
|
# @info: the WSAPROTOCOL_INFOW structure (encoded in base64)
|
||||||
|
#
|
||||||
|
# @fdname: file descriptor name
|
||||||
|
#
|
||||||
|
# Returns: Nothing on success
|
||||||
|
#
|
||||||
|
# Since: 8.0
|
||||||
|
#
|
||||||
|
# Notes: If @fdname already exists, the file descriptor assigned to
|
||||||
|
# it will be closed and replaced by the received file
|
||||||
|
# descriptor.
|
||||||
|
#
|
||||||
|
# The 'closefd' command can be used to explicitly close the
|
||||||
|
# file descriptor when it is no longer needed.
|
||||||
|
#
|
||||||
|
# Example:
|
||||||
|
#
|
||||||
|
# -> { "execute": "get-win32-socket", "arguments": { "info": "abcd123..", fdname": "skclient" } }
|
||||||
|
# <- { "return": {} }
|
||||||
|
#
|
||||||
|
##
|
||||||
|
{ 'command': 'get-win32-socket', 'data': {'info': 'str', 'fdname': 'str'}, 'if': 'CONFIG_WIN32' }
|
||||||
|
|
||||||
##
|
##
|
||||||
# @closefd:
|
# @closefd:
|
||||||
|
@ -23,10 +23,10 @@ import enum
|
|||||||
import tempfile
|
import tempfile
|
||||||
import re
|
import re
|
||||||
import signal
|
import signal
|
||||||
|
import getpass
|
||||||
from tarfile import TarFile, TarInfo
|
from tarfile import TarFile, TarInfo
|
||||||
from io import StringIO, BytesIO
|
from io import StringIO, BytesIO
|
||||||
from shutil import copy, rmtree
|
from shutil import copy, rmtree
|
||||||
from pwd import getpwuid
|
|
||||||
from datetime import datetime, timedelta
|
from datetime import datetime, timedelta
|
||||||
|
|
||||||
|
|
||||||
@ -316,7 +316,7 @@ class Docker(object):
|
|||||||
|
|
||||||
if user:
|
if user:
|
||||||
uid = os.getuid()
|
uid = os.getuid()
|
||||||
uname = getpwuid(uid).pw_name
|
uname = getpass.getuser()
|
||||||
tmp_df.write("\n")
|
tmp_df.write("\n")
|
||||||
tmp_df.write("RUN id %s 2>/dev/null || useradd -u %d -U %s" %
|
tmp_df.write("RUN id %s 2>/dev/null || useradd -u %d -U %s" %
|
||||||
(uname, uid, uname))
|
(uname, uid, uname))
|
||||||
@ -570,7 +570,7 @@ class UpdateCommand(SubCommand):
|
|||||||
|
|
||||||
if args.user:
|
if args.user:
|
||||||
uid = os.getuid()
|
uid = os.getuid()
|
||||||
uname = getpwuid(uid).pw_name
|
uname = getpass.getuser()
|
||||||
df.write("\n")
|
df.write("\n")
|
||||||
df.write("RUN id %s 2>/dev/null || useradd -u %d -U %s" %
|
df.write("RUN id %s 2>/dev/null || useradd -u %d -U %s" %
|
||||||
(uname, uid, uname))
|
(uname, uid, uname))
|
||||||
|
@ -124,7 +124,7 @@ static int socket_accept(int sock)
|
|||||||
(void *)&timeout, sizeof(timeout))) {
|
(void *)&timeout, sizeof(timeout))) {
|
||||||
fprintf(stderr, "%s failed to set SO_RCVTIMEO: %s\n",
|
fprintf(stderr, "%s failed to set SO_RCVTIMEO: %s\n",
|
||||||
__func__, strerror(errno));
|
__func__, strerror(errno));
|
||||||
closesocket(sock);
|
close(sock);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -135,7 +135,7 @@ static int socket_accept(int sock)
|
|||||||
if (ret == -1) {
|
if (ret == -1) {
|
||||||
fprintf(stderr, "%s failed: %s\n", __func__, strerror(errno));
|
fprintf(stderr, "%s failed: %s\n", __func__, strerror(errno));
|
||||||
}
|
}
|
||||||
closesocket(sock);
|
close(sock);
|
||||||
|
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
@ -564,8 +564,8 @@ void qtest_quit(QTestState *s)
|
|||||||
qtest_remove_abrt_handler(s);
|
qtest_remove_abrt_handler(s);
|
||||||
|
|
||||||
qtest_kill_qemu(s);
|
qtest_kill_qemu(s);
|
||||||
closesocket(s->fd);
|
close(s->fd);
|
||||||
closesocket(s->qmp_fd);
|
close(s->qmp_fd);
|
||||||
g_string_free(s->rx, true);
|
g_string_free(s->rx, true);
|
||||||
|
|
||||||
for (GList *it = s->pending_events; it != NULL; it = it->next) {
|
for (GList *it = s->pending_events; it != NULL; it = it->next) {
|
||||||
@ -1478,13 +1478,28 @@ void qtest_qmp_device_add(QTestState *qts, const char *driver, const char *id,
|
|||||||
qobject_unref(args);
|
qobject_unref(args);
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef _WIN32
|
|
||||||
void qtest_qmp_add_client(QTestState *qts, const char *protocol, int fd)
|
void qtest_qmp_add_client(QTestState *qts, const char *protocol, int fd)
|
||||||
{
|
{
|
||||||
QDict *resp;
|
QDict *resp;
|
||||||
|
|
||||||
|
#ifdef WIN32
|
||||||
|
WSAPROTOCOL_INFOW info;
|
||||||
|
g_autofree char *info64 = NULL;
|
||||||
|
SOCKET s;
|
||||||
|
|
||||||
|
assert(fd_is_socket(fd));
|
||||||
|
s = _get_osfhandle(fd);
|
||||||
|
if (WSADuplicateSocketW(s, GetProcessId((HANDLE)qts->qemu_pid), &info) == SOCKET_ERROR) {
|
||||||
|
g_autofree char *emsg = g_win32_error_message(WSAGetLastError());
|
||||||
|
g_error("WSADuplicateSocketW failed: %s", emsg);
|
||||||
|
}
|
||||||
|
info64 = g_base64_encode((guchar *)&info, sizeof(info));
|
||||||
|
resp = qtest_qmp(qts, "{'execute': 'get-win32-socket',"
|
||||||
|
"'arguments': {'fdname': 'fdname', 'info': %s}}", info64);
|
||||||
|
#else
|
||||||
resp = qtest_qmp_fds(qts, &fd, 1, "{'execute': 'getfd',"
|
resp = qtest_qmp_fds(qts, &fd, 1, "{'execute': 'getfd',"
|
||||||
"'arguments': {'fdname': 'fdname'}}");
|
"'arguments': {'fdname': 'fdname'}}");
|
||||||
|
#endif
|
||||||
g_assert(resp);
|
g_assert(resp);
|
||||||
g_assert(!qdict_haskey(resp, "event")); /* We don't expect any events */
|
g_assert(!qdict_haskey(resp, "event")); /* We don't expect any events */
|
||||||
g_assert(!qdict_haskey(resp, "error"));
|
g_assert(!qdict_haskey(resp, "error"));
|
||||||
@ -1498,7 +1513,6 @@ void qtest_qmp_add_client(QTestState *qts, const char *protocol, int fd)
|
|||||||
g_assert(!qdict_haskey(resp, "error"));
|
g_assert(!qdict_haskey(resp, "error"));
|
||||||
qobject_unref(resp);
|
qobject_unref(resp);
|
||||||
}
|
}
|
||||||
#endif
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Generic hot-unplugging test via the device_del QMP command.
|
* Generic hot-unplugging test via the device_del QMP command.
|
||||||
|
@ -758,17 +758,16 @@ void qtest_qmp_device_add_qdict(QTestState *qts, const char *drv,
|
|||||||
void qtest_qmp_device_add(QTestState *qts, const char *driver, const char *id,
|
void qtest_qmp_device_add(QTestState *qts, const char *driver, const char *id,
|
||||||
const char *fmt, ...) G_GNUC_PRINTF(4, 5);
|
const char *fmt, ...) G_GNUC_PRINTF(4, 5);
|
||||||
|
|
||||||
#ifndef _WIN32
|
|
||||||
/**
|
/**
|
||||||
* qtest_qmp_add_client:
|
* qtest_qmp_add_client:
|
||||||
* @qts: QTestState instance to operate on
|
* @qts: QTestState instance to operate on
|
||||||
* @protocol: the protocol to add to
|
* @protocol: the protocol to add to
|
||||||
* @fd: the client file-descriptor
|
* @fd: the client file-descriptor
|
||||||
*
|
*
|
||||||
* Call QMP ``getfd`` followed by ``add_client`` with the given @fd.
|
* Call QMP ``getfd`` (on Windows ``get-win32-socket``) followed by
|
||||||
|
* ``add_client`` with the given @fd.
|
||||||
*/
|
*/
|
||||||
void qtest_qmp_add_client(QTestState *qts, const char *protocol, int fd);
|
void qtest_qmp_add_client(QTestState *qts, const char *protocol, int fd);
|
||||||
#endif /* _WIN32 */
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* qtest_qmp_device_del_send:
|
* qtest_qmp_device_del_send:
|
||||||
|
@ -107,7 +107,7 @@ static void test_nrf51_uart(void)
|
|||||||
g_assert_true(recv(sock_fd, s, 10, 0) == 5);
|
g_assert_true(recv(sock_fd, s, 10, 0) == 5);
|
||||||
g_assert_true(memcmp(s, "world", 5) == 0);
|
g_assert_true(memcmp(s, "world", 5) == 0);
|
||||||
|
|
||||||
closesocket(sock_fd);
|
close(sock_fd);
|
||||||
|
|
||||||
qtest_quit(qts);
|
qtest_quit(qts);
|
||||||
}
|
}
|
||||||
|
@ -99,7 +99,7 @@ static int inet_get_free_port_multiple(int nb, int *port, bool ipv6)
|
|||||||
|
|
||||||
nb = i;
|
nb = i;
|
||||||
for (i = 0; i < nb; i++) {
|
for (i = 0; i < nb; i++) {
|
||||||
closesocket(sock[i]);
|
close(sock[i]);
|
||||||
}
|
}
|
||||||
|
|
||||||
return nb;
|
return nb;
|
||||||
@ -361,8 +361,8 @@ static void test_stream_fd(void)
|
|||||||
qtest_quit(qts1);
|
qtest_quit(qts1);
|
||||||
qtest_quit(qts0);
|
qtest_quit(qts0);
|
||||||
|
|
||||||
closesocket(sock[0]);
|
close(sock[0]);
|
||||||
closesocket(sock[1]);
|
close(sock[1]);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@ -487,8 +487,8 @@ static void test_dgram_fd(void)
|
|||||||
qtest_quit(qts1);
|
qtest_quit(qts1);
|
||||||
qtest_quit(qts0);
|
qtest_quit(qts0);
|
||||||
|
|
||||||
closesocket(sv[0]);
|
close(sv[0]);
|
||||||
closesocket(sv[1]);
|
close(sv[1]);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@ -19,7 +19,7 @@ typedef struct Test {
|
|||||||
GMainLoop *loop;
|
GMainLoop *loop;
|
||||||
} Test;
|
} Test;
|
||||||
|
|
||||||
#if !defined(WIN32) && !defined(CONFIG_DARWIN)
|
#if !defined(CONFIG_DARWIN)
|
||||||
|
|
||||||
static void on_vnc_error(VncConnection* self,
|
static void on_vnc_error(VncConnection* self,
|
||||||
const char* msg)
|
const char* msg)
|
||||||
@ -38,10 +38,7 @@ static void on_vnc_auth_failure(VncConnection *self,
|
|||||||
static bool
|
static bool
|
||||||
test_setup(Test *test)
|
test_setup(Test *test)
|
||||||
{
|
{
|
||||||
#ifdef WIN32
|
#if defined(CONFIG_DARWIN)
|
||||||
g_test_skip("Not supported on Windows yet");
|
|
||||||
return false;
|
|
||||||
#elif defined(CONFIG_DARWIN)
|
|
||||||
g_test_skip("Broken on Darwin");
|
g_test_skip("Broken on Darwin");
|
||||||
return false;
|
return false;
|
||||||
#else
|
#else
|
||||||
@ -59,7 +56,12 @@ test_setup(Test *test)
|
|||||||
g_signal_connect(test->conn, "vnc-auth-failure",
|
g_signal_connect(test->conn, "vnc-auth-failure",
|
||||||
G_CALLBACK(on_vnc_auth_failure), NULL);
|
G_CALLBACK(on_vnc_auth_failure), NULL);
|
||||||
vnc_connection_set_auth_type(test->conn, VNC_CONNECTION_AUTH_NONE);
|
vnc_connection_set_auth_type(test->conn, VNC_CONNECTION_AUTH_NONE);
|
||||||
|
|
||||||
|
#ifdef WIN32
|
||||||
|
vnc_connection_open_fd(test->conn, _get_osfhandle(pair[0]));
|
||||||
|
#else
|
||||||
vnc_connection_open_fd(test->conn, pair[0]);
|
vnc_connection_open_fd(test->conn, pair[0]);
|
||||||
|
#endif
|
||||||
|
|
||||||
test->loop = g_main_loop_new(NULL, FALSE);
|
test->loop = g_main_loop_new(NULL, FALSE);
|
||||||
return true;
|
return true;
|
||||||
|
@ -11,6 +11,7 @@ tests = {
|
|||||||
'check-qobject': [],
|
'check-qobject': [],
|
||||||
'check-qjson': [],
|
'check-qjson': [],
|
||||||
'check-qlit': [],
|
'check-qlit': [],
|
||||||
|
'test-error-report': [],
|
||||||
'test-qobject-output-visitor': [testqapi],
|
'test-qobject-output-visitor': [testqapi],
|
||||||
'test-clone-visitor': [testqapi],
|
'test-clone-visitor': [testqapi],
|
||||||
'test-qobject-input-visitor': [testqapi],
|
'test-qobject-input-visitor': [testqapi],
|
||||||
|
@ -160,7 +160,7 @@ void socket_check_afunix_support(bool *has_afunix)
|
|||||||
int fd;
|
int fd;
|
||||||
|
|
||||||
fd = socket(PF_UNIX, SOCK_STREAM, 0);
|
fd = socket(PF_UNIX, SOCK_STREAM, 0);
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
|
|
||||||
#ifdef _WIN32
|
#ifdef _WIN32
|
||||||
*has_afunix = (fd != (int)INVALID_SOCKET);
|
*has_afunix = (fd != (int)INVALID_SOCKET);
|
||||||
|
139
tests/unit/test-error-report.c
Normal file
139
tests/unit/test-error-report.c
Normal file
@ -0,0 +1,139 @@
|
|||||||
|
/*
|
||||||
|
* Error reporting test
|
||||||
|
*
|
||||||
|
* Copyright (C) 2022 Red Hat Inc.
|
||||||
|
*
|
||||||
|
* This work is licensed under the terms of the GNU GPL, version 2 or later.
|
||||||
|
* See the COPYING file in the top-level directory.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "qemu/osdep.h"
|
||||||
|
#include "glib-compat.h"
|
||||||
|
#include <locale.h>
|
||||||
|
|
||||||
|
#include "qemu/error-report.h"
|
||||||
|
#include "qapi/error.h"
|
||||||
|
|
||||||
|
static void
|
||||||
|
test_error_report_simple(void)
|
||||||
|
{
|
||||||
|
if (g_test_subprocess()) {
|
||||||
|
error_report("%s", "test error");
|
||||||
|
warn_report("%s", "test warn");
|
||||||
|
info_report("%s", "test info");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
g_test_trap_subprocess(NULL, 0, 0);
|
||||||
|
g_test_trap_assert_passed();
|
||||||
|
g_test_trap_assert_stderr("\
|
||||||
|
test-error-report: test error*\
|
||||||
|
test-error-report: warning: test warn*\
|
||||||
|
test-error-report: info: test info*\
|
||||||
|
");
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
test_error_report_loc(void)
|
||||||
|
{
|
||||||
|
if (g_test_subprocess()) {
|
||||||
|
loc_set_file("some-file.c", 7717);
|
||||||
|
error_report("%s", "test error1");
|
||||||
|
loc_set_none();
|
||||||
|
error_report("%s", "test error2");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
g_test_trap_subprocess(NULL, 0, 0);
|
||||||
|
g_test_trap_assert_passed();
|
||||||
|
g_test_trap_assert_stderr("\
|
||||||
|
test-error-report:some-file.c:7717: test error1*\
|
||||||
|
test-error-report: test error2*\
|
||||||
|
");
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
test_error_report_glog(void)
|
||||||
|
{
|
||||||
|
if (g_test_subprocess()) {
|
||||||
|
g_message("gmessage");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
g_test_trap_subprocess(NULL, 0, 0);
|
||||||
|
g_test_trap_assert_passed();
|
||||||
|
g_test_trap_assert_stderr("test-error-report: info: gmessage*");
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
test_error_report_once(void)
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
|
||||||
|
if (g_test_subprocess()) {
|
||||||
|
for (i = 0; i < 3; i++) {
|
||||||
|
warn_report_once("warn");
|
||||||
|
error_report_once("err");
|
||||||
|
}
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
g_test_trap_subprocess(NULL, 0, 0);
|
||||||
|
g_test_trap_assert_passed();
|
||||||
|
g_test_trap_assert_stderr("\
|
||||||
|
test-error-report: warning: warn*\
|
||||||
|
test-error-report: err*\
|
||||||
|
");
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
test_error_report_timestamp(void)
|
||||||
|
{
|
||||||
|
if (g_test_subprocess()) {
|
||||||
|
message_with_timestamp = true;
|
||||||
|
warn_report("warn");
|
||||||
|
error_report("err");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
g_test_trap_subprocess(NULL, 0, 0);
|
||||||
|
g_test_trap_assert_passed();
|
||||||
|
g_test_trap_assert_stderr("\
|
||||||
|
*-*-*:*:* test-error-report: warning: warn*\
|
||||||
|
*-*-*:*:* test-error-report: err*\
|
||||||
|
");
|
||||||
|
}
|
||||||
|
|
||||||
|
static void
|
||||||
|
test_error_warn(void)
|
||||||
|
{
|
||||||
|
if (g_test_subprocess()) {
|
||||||
|
error_setg(&error_warn, "Testing &error_warn");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
g_test_trap_subprocess(NULL, 0, 0);
|
||||||
|
g_test_trap_assert_passed();
|
||||||
|
g_test_trap_assert_stderr("\
|
||||||
|
test-error-report: warning: Testing &error_warn*\
|
||||||
|
");
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
int
|
||||||
|
main(int argc, char *argv[])
|
||||||
|
{
|
||||||
|
setlocale(LC_ALL, "");
|
||||||
|
|
||||||
|
g_test_init(&argc, &argv, NULL);
|
||||||
|
error_init("test-error-report");
|
||||||
|
|
||||||
|
g_test_add_func("/error-report/simple", test_error_report_simple);
|
||||||
|
g_test_add_func("/error-report/loc", test_error_report_loc);
|
||||||
|
g_test_add_func("/error-report/glog", test_error_report_glog);
|
||||||
|
g_test_add_func("/error-report/once", test_error_report_once);
|
||||||
|
g_test_add_func("/error-report/timestamp", test_error_report_timestamp);
|
||||||
|
g_test_add_func("/error-report/warn", test_error_warn);
|
||||||
|
|
||||||
|
return g_test_run();
|
||||||
|
}
|
@ -35,7 +35,7 @@ static char *socat = NULL;
|
|||||||
static void test_io_channel_command_fifo(bool async)
|
static void test_io_channel_command_fifo(bool async)
|
||||||
{
|
{
|
||||||
g_autofree gchar *tmpdir = g_dir_make_tmp("qemu-test-io-channel.XXXXXX", NULL);
|
g_autofree gchar *tmpdir = g_dir_make_tmp("qemu-test-io-channel.XXXXXX", NULL);
|
||||||
g_autofree gchar *fifo = g_strdup_printf("%s/%s", tmpdir, TEST_FIFO);
|
g_autofree gchar *fifo = g_build_filename(tmpdir, TEST_FIFO, NULL);
|
||||||
g_autofree gchar *srcargs = g_strdup_printf("%s - PIPE:%s,wronly", socat, fifo);
|
g_autofree gchar *srcargs = g_strdup_printf("%s - PIPE:%s,wronly", socat, fifo);
|
||||||
g_autofree gchar *dstargs = g_strdup_printf("%s PIPE:%s,rdonly -", socat, fifo);
|
g_autofree gchar *dstargs = g_strdup_printf("%s PIPE:%s,rdonly -", socat, fifo);
|
||||||
g_auto(GStrv) srcargv = g_strsplit(srcargs, " ", -1);
|
g_auto(GStrv) srcargv = g_strsplit(srcargs, " ", -1);
|
||||||
|
@ -180,9 +180,9 @@ void aio_set_fd_handler(AioContext *ctx,
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void aio_set_fd_poll(AioContext *ctx, int fd,
|
static void aio_set_fd_poll(AioContext *ctx, int fd,
|
||||||
IOHandler *io_poll_begin,
|
IOHandler *io_poll_begin,
|
||||||
IOHandler *io_poll_end)
|
IOHandler *io_poll_end)
|
||||||
{
|
{
|
||||||
AioHandler *node = find_aio_handler(ctx, fd);
|
AioHandler *node = find_aio_handler(ctx, fd);
|
||||||
|
|
||||||
|
@ -22,6 +22,7 @@
|
|||||||
#include "qemu/sockets.h"
|
#include "qemu/sockets.h"
|
||||||
#include "qapi/error.h"
|
#include "qapi/error.h"
|
||||||
#include "qemu/rcu_queue.h"
|
#include "qemu/rcu_queue.h"
|
||||||
|
#include "qemu/error-report.h"
|
||||||
|
|
||||||
struct AioHandler {
|
struct AioHandler {
|
||||||
EventNotifier *e;
|
EventNotifier *e;
|
||||||
@ -70,13 +71,20 @@ void aio_set_fd_handler(AioContext *ctx,
|
|||||||
IOHandler *io_poll_ready,
|
IOHandler *io_poll_ready,
|
||||||
void *opaque)
|
void *opaque)
|
||||||
{
|
{
|
||||||
/* fd is a SOCKET in our case */
|
|
||||||
AioHandler *old_node;
|
AioHandler *old_node;
|
||||||
AioHandler *node = NULL;
|
AioHandler *node = NULL;
|
||||||
|
SOCKET s;
|
||||||
|
|
||||||
|
if (!fd_is_socket(fd)) {
|
||||||
|
error_report("fd=%d is not a socket, AIO implementation is missing", fd);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
s = _get_osfhandle(fd);
|
||||||
|
|
||||||
qemu_lockcnt_lock(&ctx->list_lock);
|
qemu_lockcnt_lock(&ctx->list_lock);
|
||||||
QLIST_FOREACH(old_node, &ctx->aio_handlers, node) {
|
QLIST_FOREACH(old_node, &ctx->aio_handlers, node) {
|
||||||
if (old_node->pfd.fd == fd && !old_node->deleted) {
|
if (old_node->pfd.fd == s && !old_node->deleted) {
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -87,7 +95,7 @@ void aio_set_fd_handler(AioContext *ctx,
|
|||||||
|
|
||||||
/* Alloc and insert if it's not already there */
|
/* Alloc and insert if it's not already there */
|
||||||
node = g_new0(AioHandler, 1);
|
node = g_new0(AioHandler, 1);
|
||||||
node->pfd.fd = fd;
|
node->pfd.fd = s;
|
||||||
|
|
||||||
node->pfd.events = 0;
|
node->pfd.events = 0;
|
||||||
if (node->io_read) {
|
if (node->io_read) {
|
||||||
@ -115,7 +123,7 @@ void aio_set_fd_handler(AioContext *ctx,
|
|||||||
|
|
||||||
QLIST_INSERT_HEAD_RCU(&ctx->aio_handlers, node, node);
|
QLIST_INSERT_HEAD_RCU(&ctx->aio_handlers, node, node);
|
||||||
event = event_notifier_get_handle(&ctx->notifier);
|
event = event_notifier_get_handle(&ctx->notifier);
|
||||||
WSAEventSelect(node->pfd.fd, event, bitmask);
|
qemu_socket_select(fd, event, bitmask, NULL);
|
||||||
}
|
}
|
||||||
if (old_node) {
|
if (old_node) {
|
||||||
aio_remove_fd_handler(ctx, old_node);
|
aio_remove_fd_handler(ctx, old_node);
|
||||||
@ -125,13 +133,6 @@ void aio_set_fd_handler(AioContext *ctx,
|
|||||||
aio_notify(ctx);
|
aio_notify(ctx);
|
||||||
}
|
}
|
||||||
|
|
||||||
void aio_set_fd_poll(AioContext *ctx, int fd,
|
|
||||||
IOHandler *io_poll_begin,
|
|
||||||
IOHandler *io_poll_end)
|
|
||||||
{
|
|
||||||
/* Not implemented */
|
|
||||||
}
|
|
||||||
|
|
||||||
void aio_set_event_notifier(AioContext *ctx,
|
void aio_set_event_notifier(AioContext *ctx,
|
||||||
EventNotifier *e,
|
EventNotifier *e,
|
||||||
bool is_external,
|
bool is_external,
|
||||||
|
10
util/error.c
10
util/error.c
@ -27,8 +27,9 @@ struct Error
|
|||||||
|
|
||||||
Error *error_abort;
|
Error *error_abort;
|
||||||
Error *error_fatal;
|
Error *error_fatal;
|
||||||
|
Error *error_warn;
|
||||||
|
|
||||||
static void error_handle_fatal(Error **errp, Error *err)
|
static void error_handle(Error **errp, Error *err)
|
||||||
{
|
{
|
||||||
if (errp == &error_abort) {
|
if (errp == &error_abort) {
|
||||||
fprintf(stderr, "Unexpected error in %s() at %s:%d:\n",
|
fprintf(stderr, "Unexpected error in %s() at %s:%d:\n",
|
||||||
@ -43,6 +44,9 @@ static void error_handle_fatal(Error **errp, Error *err)
|
|||||||
error_report_err(err);
|
error_report_err(err);
|
||||||
exit(1);
|
exit(1);
|
||||||
}
|
}
|
||||||
|
if (errp == &error_warn) {
|
||||||
|
warn_report_err(err);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
G_GNUC_PRINTF(6, 0)
|
G_GNUC_PRINTF(6, 0)
|
||||||
@ -71,7 +75,7 @@ static void error_setv(Error **errp,
|
|||||||
err->line = line;
|
err->line = line;
|
||||||
err->func = func;
|
err->func = func;
|
||||||
|
|
||||||
error_handle_fatal(errp, err);
|
error_handle(errp, err);
|
||||||
*errp = err;
|
*errp = err;
|
||||||
|
|
||||||
errno = saved_errno;
|
errno = saved_errno;
|
||||||
@ -284,7 +288,7 @@ void error_propagate(Error **dst_errp, Error *local_err)
|
|||||||
if (!local_err) {
|
if (!local_err) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
error_handle_fatal(dst_errp, local_err);
|
error_handle(dst_errp, local_err);
|
||||||
if (dst_errp && !*dst_errp) {
|
if (dst_errp && !*dst_errp) {
|
||||||
*dst_errp = local_err;
|
*dst_errp = local_err;
|
||||||
} else {
|
} else {
|
||||||
|
@ -252,10 +252,6 @@ static int max_priority;
|
|||||||
static int glib_pollfds_idx;
|
static int glib_pollfds_idx;
|
||||||
static int glib_n_poll_fds;
|
static int glib_n_poll_fds;
|
||||||
|
|
||||||
void qemu_fd_register(int fd)
|
|
||||||
{
|
|
||||||
}
|
|
||||||
|
|
||||||
static void glib_pollfds_fill(int64_t *cur_timeout)
|
static void glib_pollfds_fill(int64_t *cur_timeout)
|
||||||
{
|
{
|
||||||
GMainContext *context = g_main_context_default();
|
GMainContext *context = g_main_context_default();
|
||||||
@ -414,13 +410,6 @@ void qemu_del_wait_object(HANDLE handle, WaitObjectFunc *func, void *opaque)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void qemu_fd_register(int fd)
|
|
||||||
{
|
|
||||||
WSAEventSelect(fd, event_notifier_get_handle(&qemu_aio_context->notifier),
|
|
||||||
FD_READ | FD_ACCEPT | FD_CLOSE |
|
|
||||||
FD_CONNECT | FD_WRITE | FD_OOB);
|
|
||||||
}
|
|
||||||
|
|
||||||
static int pollfds_fill(GArray *pollfds, fd_set *rfds, fd_set *wfds,
|
static int pollfds_fill(GArray *pollfds, fd_set *rfds, fd_set *wfds,
|
||||||
fd_set *xfds)
|
fd_set *xfds)
|
||||||
{
|
{
|
||||||
|
@ -583,76 +583,6 @@ char *qemu_get_pid_name(pid_t pid)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
pid_t qemu_fork(Error **errp)
|
|
||||||
{
|
|
||||||
sigset_t oldmask, newmask;
|
|
||||||
struct sigaction sig_action;
|
|
||||||
int saved_errno;
|
|
||||||
pid_t pid;
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Need to block signals now, so that child process can safely
|
|
||||||
* kill off caller's signal handlers without a race.
|
|
||||||
*/
|
|
||||||
sigfillset(&newmask);
|
|
||||||
if (pthread_sigmask(SIG_SETMASK, &newmask, &oldmask) != 0) {
|
|
||||||
error_setg_errno(errp, errno,
|
|
||||||
"cannot block signals");
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
pid = fork();
|
|
||||||
saved_errno = errno;
|
|
||||||
|
|
||||||
if (pid < 0) {
|
|
||||||
/* attempt to restore signal mask, but ignore failure, to
|
|
||||||
* avoid obscuring the fork failure */
|
|
||||||
(void)pthread_sigmask(SIG_SETMASK, &oldmask, NULL);
|
|
||||||
error_setg_errno(errp, saved_errno,
|
|
||||||
"cannot fork child process");
|
|
||||||
errno = saved_errno;
|
|
||||||
return -1;
|
|
||||||
} else if (pid) {
|
|
||||||
/* parent process */
|
|
||||||
|
|
||||||
/* Restore our original signal mask now that the child is
|
|
||||||
* safely running. Only documented failures are EFAULT (not
|
|
||||||
* possible, since we are using just-grabbed mask) or EINVAL
|
|
||||||
* (not possible, since we are using correct arguments). */
|
|
||||||
(void)pthread_sigmask(SIG_SETMASK, &oldmask, NULL);
|
|
||||||
} else {
|
|
||||||
/* child process */
|
|
||||||
size_t i;
|
|
||||||
|
|
||||||
/* Clear out all signal handlers from parent so nothing
|
|
||||||
* unexpected can happen in our child once we unblock
|
|
||||||
* signals */
|
|
||||||
sig_action.sa_handler = SIG_DFL;
|
|
||||||
sig_action.sa_flags = 0;
|
|
||||||
sigemptyset(&sig_action.sa_mask);
|
|
||||||
|
|
||||||
for (i = 1; i < NSIG; i++) {
|
|
||||||
/* Only possible errors are EFAULT or EINVAL The former
|
|
||||||
* won't happen, the latter we expect, so no need to check
|
|
||||||
* return value */
|
|
||||||
(void)sigaction(i, &sig_action, NULL);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Unmask all signals in child, since we've no idea what the
|
|
||||||
* caller's done with their signal mask and don't want to
|
|
||||||
* propagate that to children */
|
|
||||||
sigemptyset(&newmask);
|
|
||||||
if (pthread_sigmask(SIG_SETMASK, &newmask, NULL) != 0) {
|
|
||||||
Error *local_err = NULL;
|
|
||||||
error_setg_errno(&local_err, errno,
|
|
||||||
"cannot unblock signals");
|
|
||||||
error_report_err(local_err);
|
|
||||||
_exit(1);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return pid;
|
|
||||||
}
|
|
||||||
|
|
||||||
void *qemu_alloc_stack(size_t *sz)
|
void *qemu_alloc_stack(size_t *sz)
|
||||||
{
|
{
|
||||||
void *ptr, *guardpage;
|
void *ptr, *guardpage;
|
||||||
|
@ -180,7 +180,7 @@ static int socket_error(void)
|
|||||||
void qemu_socket_set_block(int fd)
|
void qemu_socket_set_block(int fd)
|
||||||
{
|
{
|
||||||
unsigned long opt = 0;
|
unsigned long opt = 0;
|
||||||
WSAEventSelect(fd, NULL, 0);
|
qemu_socket_unselect(fd, NULL);
|
||||||
ioctlsocket(fd, FIONBIO, &opt);
|
ioctlsocket(fd, FIONBIO, &opt);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -283,21 +283,155 @@ char *qemu_get_pid_name(pid_t pid)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
pid_t qemu_fork(Error **errp)
|
bool qemu_socket_select(int sockfd, WSAEVENT hEventObject,
|
||||||
|
long lNetworkEvents, Error **errp)
|
||||||
{
|
{
|
||||||
errno = ENOSYS;
|
SOCKET s = _get_osfhandle(sockfd);
|
||||||
error_setg_errno(errp, errno,
|
|
||||||
"cannot fork child process");
|
if (errp == NULL) {
|
||||||
return -1;
|
errp = &error_warn;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (s == INVALID_SOCKET) {
|
||||||
|
error_setg(errp, "invalid socket fd=%d", sockfd);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (WSAEventSelect(s, hEventObject, lNetworkEvents) != 0) {
|
||||||
|
error_setg_win32(errp, WSAGetLastError(), "failed to WSAEventSelect()");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
bool qemu_socket_unselect(int sockfd, Error **errp)
|
||||||
|
{
|
||||||
|
return qemu_socket_select(sockfd, NULL, 0, errp);
|
||||||
|
}
|
||||||
|
|
||||||
|
int qemu_socketpair(int domain, int type, int protocol, int sv[2])
|
||||||
|
{
|
||||||
|
struct sockaddr_un addr = {
|
||||||
|
0,
|
||||||
|
};
|
||||||
|
socklen_t socklen;
|
||||||
|
int listener = -1;
|
||||||
|
int client = -1;
|
||||||
|
int server = -1;
|
||||||
|
g_autofree char *path = NULL;
|
||||||
|
int tmpfd;
|
||||||
|
u_long arg;
|
||||||
|
int ret = -1;
|
||||||
|
|
||||||
|
g_return_val_if_fail(sv != NULL, -1);
|
||||||
|
|
||||||
|
addr.sun_family = AF_UNIX;
|
||||||
|
socklen = sizeof(addr);
|
||||||
|
|
||||||
|
tmpfd = g_file_open_tmp(NULL, &path, NULL);
|
||||||
|
if (tmpfd == -1 || !path) {
|
||||||
|
errno = EACCES;
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
close(tmpfd);
|
||||||
|
|
||||||
|
if (strlen(path) >= sizeof(addr.sun_path)) {
|
||||||
|
errno = EINVAL;
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
strncpy(addr.sun_path, path, sizeof(addr.sun_path) - 1);
|
||||||
|
|
||||||
|
listener = socket(domain, type, protocol);
|
||||||
|
if (listener == -1) {
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (DeleteFile(path) == 0 && GetLastError() != ERROR_FILE_NOT_FOUND) {
|
||||||
|
errno = EACCES;
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
g_clear_pointer(&path, g_free);
|
||||||
|
|
||||||
|
if (bind(listener, (struct sockaddr *)&addr, socklen) == -1) {
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (listen(listener, 1) == -1) {
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
client = socket(domain, type, protocol);
|
||||||
|
if (client == -1) {
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
arg = 1;
|
||||||
|
if (ioctlsocket(client, FIONBIO, &arg) != NO_ERROR) {
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (connect(client, (struct sockaddr *)&addr, socklen) == -1 &&
|
||||||
|
WSAGetLastError() != WSAEWOULDBLOCK) {
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
server = accept(listener, NULL, NULL);
|
||||||
|
if (server == -1) {
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
arg = 0;
|
||||||
|
if (ioctlsocket(client, FIONBIO, &arg) != NO_ERROR) {
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
arg = 0;
|
||||||
|
if (ioctlsocket(client, SIO_AF_UNIX_GETPEERPID, &arg) != NO_ERROR) {
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (arg != GetCurrentProcessId()) {
|
||||||
|
errno = EPERM;
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
|
||||||
|
sv[0] = server;
|
||||||
|
server = -1;
|
||||||
|
sv[1] = client;
|
||||||
|
client = -1;
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
out:
|
||||||
|
if (listener != -1) {
|
||||||
|
close(listener);
|
||||||
|
}
|
||||||
|
if (client != -1) {
|
||||||
|
close(client);
|
||||||
|
}
|
||||||
|
if (server != -1) {
|
||||||
|
close(server);
|
||||||
|
}
|
||||||
|
if (path) {
|
||||||
|
DeleteFile(path);
|
||||||
|
}
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
#undef connect
|
#undef connect
|
||||||
int qemu_connect_wrap(int sockfd, const struct sockaddr *addr,
|
int qemu_connect_wrap(int sockfd, const struct sockaddr *addr,
|
||||||
socklen_t addrlen)
|
socklen_t addrlen)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
ret = connect(sockfd, addr, addrlen);
|
SOCKET s = _get_osfhandle(sockfd);
|
||||||
|
|
||||||
|
if (s == INVALID_SOCKET) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = connect(s, addr, addrlen);
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
if (WSAGetLastError() == WSAEWOULDBLOCK) {
|
if (WSAGetLastError() == WSAEWOULDBLOCK) {
|
||||||
errno = EINPROGRESS;
|
errno = EINPROGRESS;
|
||||||
@ -313,7 +447,13 @@ int qemu_connect_wrap(int sockfd, const struct sockaddr *addr,
|
|||||||
int qemu_listen_wrap(int sockfd, int backlog)
|
int qemu_listen_wrap(int sockfd, int backlog)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
ret = listen(sockfd, backlog);
|
SOCKET s = _get_osfhandle(sockfd);
|
||||||
|
|
||||||
|
if (s == INVALID_SOCKET) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = listen(s, backlog);
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
errno = socket_error();
|
errno = socket_error();
|
||||||
}
|
}
|
||||||
@ -326,7 +466,13 @@ int qemu_bind_wrap(int sockfd, const struct sockaddr *addr,
|
|||||||
socklen_t addrlen)
|
socklen_t addrlen)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
ret = bind(sockfd, addr, addrlen);
|
SOCKET s = _get_osfhandle(sockfd);
|
||||||
|
|
||||||
|
if (s == INVALID_SOCKET) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = bind(s, addr, addrlen);
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
errno = socket_error();
|
errno = socket_error();
|
||||||
}
|
}
|
||||||
@ -334,15 +480,82 @@ int qemu_bind_wrap(int sockfd, const struct sockaddr *addr,
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#undef close
|
||||||
|
int qemu_close_wrap(int fd)
|
||||||
|
{
|
||||||
|
int ret;
|
||||||
|
DWORD flags = 0;
|
||||||
|
SOCKET s = INVALID_SOCKET;
|
||||||
|
|
||||||
|
if (fd_is_socket(fd)) {
|
||||||
|
s = _get_osfhandle(fd);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* If we were to just call _close on the descriptor, it would close the
|
||||||
|
* HANDLE, but it wouldn't free any of the resources associated to the
|
||||||
|
* SOCKET, and we can't call _close after calling closesocket, because
|
||||||
|
* closesocket has already closed the HANDLE, and _close would attempt to
|
||||||
|
* close the HANDLE again, resulting in a double free. We can however
|
||||||
|
* protect the HANDLE from actually being closed long enough to close the
|
||||||
|
* file descriptor, then close the socket itself.
|
||||||
|
*/
|
||||||
|
if (!GetHandleInformation((HANDLE)s, &flags)) {
|
||||||
|
errno = EACCES;
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!SetHandleInformation((HANDLE)s, HANDLE_FLAG_PROTECT_FROM_CLOSE, HANDLE_FLAG_PROTECT_FROM_CLOSE)) {
|
||||||
|
errno = EACCES;
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = close(fd);
|
||||||
|
|
||||||
|
if (s != INVALID_SOCKET && !SetHandleInformation((HANDLE)s, flags, flags)) {
|
||||||
|
errno = EACCES;
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* close() returns EBADF since we PROTECT_FROM_CLOSE the underlying handle,
|
||||||
|
* but the FD is actually freed
|
||||||
|
*/
|
||||||
|
if (ret < 0 && (s == INVALID_SOCKET || errno != EBADF)) {
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (s != INVALID_SOCKET) {
|
||||||
|
ret = closesocket(s);
|
||||||
|
if (ret < 0) {
|
||||||
|
errno = socket_error();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
#undef socket
|
#undef socket
|
||||||
int qemu_socket_wrap(int domain, int type, int protocol)
|
int qemu_socket_wrap(int domain, int type, int protocol)
|
||||||
{
|
{
|
||||||
int ret;
|
SOCKET s;
|
||||||
ret = socket(domain, type, protocol);
|
int fd;
|
||||||
if (ret < 0) {
|
|
||||||
|
s = socket(domain, type, protocol);
|
||||||
|
if (s == -1) {
|
||||||
errno = socket_error();
|
errno = socket_error();
|
||||||
|
return -1;
|
||||||
}
|
}
|
||||||
return ret;
|
|
||||||
|
fd = _open_osfhandle(s, _O_BINARY);
|
||||||
|
if (fd < 0) {
|
||||||
|
closesocket(s);
|
||||||
|
/* _open_osfhandle may not set errno, and closesocket() may override it */
|
||||||
|
errno = ENOMEM;
|
||||||
|
}
|
||||||
|
|
||||||
|
return fd;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -350,12 +563,27 @@ int qemu_socket_wrap(int domain, int type, int protocol)
|
|||||||
int qemu_accept_wrap(int sockfd, struct sockaddr *addr,
|
int qemu_accept_wrap(int sockfd, struct sockaddr *addr,
|
||||||
socklen_t *addrlen)
|
socklen_t *addrlen)
|
||||||
{
|
{
|
||||||
int ret;
|
int fd;
|
||||||
ret = accept(sockfd, addr, addrlen);
|
SOCKET s = _get_osfhandle(sockfd);
|
||||||
if (ret < 0) {
|
|
||||||
errno = socket_error();
|
if (s == INVALID_SOCKET) {
|
||||||
|
return -1;
|
||||||
}
|
}
|
||||||
return ret;
|
|
||||||
|
s = accept(s, addr, addrlen);
|
||||||
|
if (s == -1) {
|
||||||
|
errno = socket_error();
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
fd = _open_osfhandle(s, _O_BINARY);
|
||||||
|
if (fd < 0) {
|
||||||
|
closesocket(s);
|
||||||
|
/* _open_osfhandle may not set errno, and closesocket() may override it */
|
||||||
|
errno = ENOMEM;
|
||||||
|
}
|
||||||
|
|
||||||
|
return fd;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -363,7 +591,13 @@ int qemu_accept_wrap(int sockfd, struct sockaddr *addr,
|
|||||||
int qemu_shutdown_wrap(int sockfd, int how)
|
int qemu_shutdown_wrap(int sockfd, int how)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
ret = shutdown(sockfd, how);
|
SOCKET s = _get_osfhandle(sockfd);
|
||||||
|
|
||||||
|
if (s == INVALID_SOCKET) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = shutdown(s, how);
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
errno = socket_error();
|
errno = socket_error();
|
||||||
}
|
}
|
||||||
@ -375,19 +609,13 @@ int qemu_shutdown_wrap(int sockfd, int how)
|
|||||||
int qemu_ioctlsocket_wrap(int fd, int req, void *val)
|
int qemu_ioctlsocket_wrap(int fd, int req, void *val)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
ret = ioctlsocket(fd, req, val);
|
SOCKET s = _get_osfhandle(fd);
|
||||||
if (ret < 0) {
|
|
||||||
errno = socket_error();
|
if (s == INVALID_SOCKET) {
|
||||||
|
return -1;
|
||||||
}
|
}
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
ret = ioctlsocket(s, req, val);
|
||||||
#undef closesocket
|
|
||||||
int qemu_closesocket_wrap(int fd)
|
|
||||||
{
|
|
||||||
int ret;
|
|
||||||
ret = closesocket(fd);
|
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
errno = socket_error();
|
errno = socket_error();
|
||||||
}
|
}
|
||||||
@ -400,7 +628,13 @@ int qemu_getsockopt_wrap(int sockfd, int level, int optname,
|
|||||||
void *optval, socklen_t *optlen)
|
void *optval, socklen_t *optlen)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
ret = getsockopt(sockfd, level, optname, optval, optlen);
|
SOCKET s = _get_osfhandle(sockfd);
|
||||||
|
|
||||||
|
if (s == INVALID_SOCKET) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = getsockopt(s, level, optname, optval, optlen);
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
errno = socket_error();
|
errno = socket_error();
|
||||||
}
|
}
|
||||||
@ -413,7 +647,13 @@ int qemu_setsockopt_wrap(int sockfd, int level, int optname,
|
|||||||
const void *optval, socklen_t optlen)
|
const void *optval, socklen_t optlen)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
ret = setsockopt(sockfd, level, optname, optval, optlen);
|
SOCKET s = _get_osfhandle(sockfd);
|
||||||
|
|
||||||
|
if (s == INVALID_SOCKET) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = setsockopt(s, level, optname, optval, optlen);
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
errno = socket_error();
|
errno = socket_error();
|
||||||
}
|
}
|
||||||
@ -426,7 +666,13 @@ int qemu_getpeername_wrap(int sockfd, struct sockaddr *addr,
|
|||||||
socklen_t *addrlen)
|
socklen_t *addrlen)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
ret = getpeername(sockfd, addr, addrlen);
|
SOCKET s = _get_osfhandle(sockfd);
|
||||||
|
|
||||||
|
if (s == INVALID_SOCKET) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = getpeername(s, addr, addrlen);
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
errno = socket_error();
|
errno = socket_error();
|
||||||
}
|
}
|
||||||
@ -439,7 +685,13 @@ int qemu_getsockname_wrap(int sockfd, struct sockaddr *addr,
|
|||||||
socklen_t *addrlen)
|
socklen_t *addrlen)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
ret = getsockname(sockfd, addr, addrlen);
|
SOCKET s = _get_osfhandle(sockfd);
|
||||||
|
|
||||||
|
if (s == INVALID_SOCKET) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = getsockname(s, addr, addrlen);
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
errno = socket_error();
|
errno = socket_error();
|
||||||
}
|
}
|
||||||
@ -451,7 +703,13 @@ int qemu_getsockname_wrap(int sockfd, struct sockaddr *addr,
|
|||||||
ssize_t qemu_send_wrap(int sockfd, const void *buf, size_t len, int flags)
|
ssize_t qemu_send_wrap(int sockfd, const void *buf, size_t len, int flags)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
ret = send(sockfd, buf, len, flags);
|
SOCKET s = _get_osfhandle(sockfd);
|
||||||
|
|
||||||
|
if (s == INVALID_SOCKET) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = send(s, buf, len, flags);
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
errno = socket_error();
|
errno = socket_error();
|
||||||
}
|
}
|
||||||
@ -464,7 +722,13 @@ ssize_t qemu_sendto_wrap(int sockfd, const void *buf, size_t len, int flags,
|
|||||||
const struct sockaddr *addr, socklen_t addrlen)
|
const struct sockaddr *addr, socklen_t addrlen)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
ret = sendto(sockfd, buf, len, flags, addr, addrlen);
|
SOCKET s = _get_osfhandle(sockfd);
|
||||||
|
|
||||||
|
if (s == INVALID_SOCKET) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = sendto(s, buf, len, flags, addr, addrlen);
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
errno = socket_error();
|
errno = socket_error();
|
||||||
}
|
}
|
||||||
@ -476,7 +740,13 @@ ssize_t qemu_sendto_wrap(int sockfd, const void *buf, size_t len, int flags,
|
|||||||
ssize_t qemu_recv_wrap(int sockfd, void *buf, size_t len, int flags)
|
ssize_t qemu_recv_wrap(int sockfd, void *buf, size_t len, int flags)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
ret = recv(sockfd, buf, len, flags);
|
SOCKET s = _get_osfhandle(sockfd);
|
||||||
|
|
||||||
|
if (s == INVALID_SOCKET) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = recv(s, buf, len, flags);
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
errno = socket_error();
|
errno = socket_error();
|
||||||
}
|
}
|
||||||
@ -489,7 +759,13 @@ ssize_t qemu_recvfrom_wrap(int sockfd, void *buf, size_t len, int flags,
|
|||||||
struct sockaddr *addr, socklen_t *addrlen)
|
struct sockaddr *addr, socklen_t *addrlen)
|
||||||
{
|
{
|
||||||
int ret;
|
int ret;
|
||||||
ret = recvfrom(sockfd, buf, len, flags, addr, addrlen);
|
SOCKET s = _get_osfhandle(sockfd);
|
||||||
|
|
||||||
|
if (s == INVALID_SOCKET) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = recvfrom(s, buf, len, flags, addr, addrlen);
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
errno = socket_error();
|
errno = socket_error();
|
||||||
}
|
}
|
||||||
|
@ -326,7 +326,7 @@ static int inet_listen_saddr(InetSocketAddress *saddr,
|
|||||||
* recover from this situation, so we need to recreate the
|
* recover from this situation, so we need to recreate the
|
||||||
* socket to allow bind attempts for subsequent ports:
|
* socket to allow bind attempts for subsequent ports:
|
||||||
*/
|
*/
|
||||||
closesocket(slisten);
|
close(slisten);
|
||||||
slisten = -1;
|
slisten = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -337,7 +337,7 @@ static int inet_listen_saddr(InetSocketAddress *saddr,
|
|||||||
listen_failed:
|
listen_failed:
|
||||||
saved_errno = errno;
|
saved_errno = errno;
|
||||||
if (slisten >= 0) {
|
if (slisten >= 0) {
|
||||||
closesocket(slisten);
|
close(slisten);
|
||||||
}
|
}
|
||||||
freeaddrinfo(res);
|
freeaddrinfo(res);
|
||||||
errno = saved_errno;
|
errno = saved_errno;
|
||||||
@ -380,7 +380,7 @@ static int inet_connect_addr(const InetSocketAddress *saddr,
|
|||||||
if (rc < 0) {
|
if (rc < 0) {
|
||||||
error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
|
error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
|
||||||
saddr->host, saddr->port);
|
saddr->host, saddr->port);
|
||||||
closesocket(sock);
|
close(sock);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -483,7 +483,7 @@ int inet_connect_saddr(InetSocketAddress *saddr, Error **errp)
|
|||||||
|
|
||||||
if (ret < 0) {
|
if (ret < 0) {
|
||||||
error_setg_errno(errp, errno, "Unable to set KEEPALIVE");
|
error_setg_errno(errp, errno, "Unable to set KEEPALIVE");
|
||||||
closesocket(sock);
|
close(sock);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -580,7 +580,7 @@ static int inet_dgram_saddr(InetSocketAddress *sraddr,
|
|||||||
|
|
||||||
err:
|
err:
|
||||||
if (sock != -1) {
|
if (sock != -1) {
|
||||||
closesocket(sock);
|
close(sock);
|
||||||
}
|
}
|
||||||
if (local) {
|
if (local) {
|
||||||
freeaddrinfo(local);
|
freeaddrinfo(local);
|
||||||
@ -777,7 +777,7 @@ static int vsock_connect_addr(const VsockSocketAddress *vaddr,
|
|||||||
if (rc < 0) {
|
if (rc < 0) {
|
||||||
error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
|
error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
|
||||||
vaddr->cid, vaddr->port);
|
vaddr->cid, vaddr->port);
|
||||||
closesocket(sock);
|
close(sock);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -814,13 +814,13 @@ static int vsock_listen_saddr(VsockSocketAddress *vaddr,
|
|||||||
|
|
||||||
if (bind(slisten, (const struct sockaddr *)&svm, sizeof(svm)) != 0) {
|
if (bind(slisten, (const struct sockaddr *)&svm, sizeof(svm)) != 0) {
|
||||||
error_setg_errno(errp, errno, "Failed to bind socket");
|
error_setg_errno(errp, errno, "Failed to bind socket");
|
||||||
closesocket(slisten);
|
close(slisten);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (listen(slisten, num) != 0) {
|
if (listen(slisten, num) != 0) {
|
||||||
error_setg_errno(errp, errno, "Failed to listen on socket");
|
error_setg_errno(errp, errno, "Failed to listen on socket");
|
||||||
closesocket(slisten);
|
close(slisten);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
return slisten;
|
return slisten;
|
||||||
@ -978,7 +978,7 @@ static int unix_listen_saddr(UnixSocketAddress *saddr,
|
|||||||
|
|
||||||
err:
|
err:
|
||||||
g_free(pathbuf);
|
g_free(pathbuf);
|
||||||
closesocket(sock);
|
close(sock);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1041,7 +1041,7 @@ static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
|
|||||||
return sock;
|
return sock;
|
||||||
|
|
||||||
err:
|
err:
|
||||||
closesocket(sock);
|
close(sock);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1238,7 +1238,7 @@ int socket_listen(SocketAddress *addr, int num, Error **errp)
|
|||||||
*/
|
*/
|
||||||
if (listen(fd, num) != 0) {
|
if (listen(fd, num) != 0) {
|
||||||
error_setg_errno(errp, errno, "Failed to listen on fd socket");
|
error_setg_errno(errp, errno, "Failed to listen on fd socket");
|
||||||
closesocket(fd);
|
close(fd);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
|
Reference in New Issue
Block a user