From nobody Fri May 3 10:20:00 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) client-ip=208.118.235.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org Return-Path: Received: from lists.gnu.org (208.118.235.17 [208.118.235.17]) by mx.zohomail.com with SMTPS id 1513872095799568.1127454349837; Thu, 21 Dec 2017 08:01:35 -0800 (PST) Received: from localhost ([::1]:56611 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1eS3HY-0000vO-Nn for importer@patchew.org; Thu, 21 Dec 2017 11:01:16 -0500 Received: from eggs.gnu.org ([2001:4830:134:3::10]:43167) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1eS3Fo-0008N3-3n for qemu-devel@nongnu.org; Thu, 21 Dec 2017 10:59:29 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1eS3Fm-0000EK-9g for qemu-devel@nongnu.org; Thu, 21 Dec 2017 10:59:28 -0500 Received: from mx1.redhat.com ([209.132.183.28]:39874) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1eS3Fm-0000Du-3a for qemu-devel@nongnu.org; Thu, 21 Dec 2017 10:59:26 -0500 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 1DEBA72D10 for ; Thu, 21 Dec 2017 15:59:25 +0000 (UTC) Received: from localhost.localdomain.com (unknown [10.42.22.189]) by smtp.corp.redhat.com (Postfix) with ESMTP id 4EF062C8F0; Thu, 21 Dec 2017 15:59:23 +0000 (UTC) From: "Daniel P. Berrange" To: qemu-devel@nongnu.org Date: Thu, 21 Dec 2017 15:59:04 +0000 Message-Id: <20171221155905.3793-2-berrange@redhat.com> In-Reply-To: <20171221155905.3793-1-berrange@redhat.com> References: <20171221155905.3793-1-berrange@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.27]); Thu, 21 Dec 2017 15:59:25 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] [fuzzy] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v2 1/2] io: move fd_is_socket() into common sockets code X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: "Dr. David Alan Gilbert" , Markus Armbruster , =?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= , Paolo Bonzini Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail: RSF_0 Z_629925259 SPT_0 Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" The fd_is_socket() helper method is useful in a few places, so put it in the common sockets code. Signed-off-by: Daniel P. Berrange Reviewed-by: Eric Blake Reviewed-by: Markus Armbruster --- include/qemu/sockets.h | 1 + io/channel-util.c | 13 ------------- util/qemu-sockets.c | 13 +++++++++++++ 3 files changed, 14 insertions(+), 13 deletions(-) diff --git a/include/qemu/sockets.h b/include/qemu/sockets.h index 4f7311b52a..5680880f5a 100644 --- a/include/qemu/sockets.h +++ b/include/qemu/sockets.h @@ -12,6 +12,7 @@ int inet_aton(const char *cp, struct in_addr *ia); #include "qapi-types.h" =20 /* misc helpers */ +bool fd_is_socket(int fd); int qemu_socket(int domain, int type, int protocol); int qemu_accept(int s, struct sockaddr *addr, socklen_t *addrlen); int socket_set_cork(int fd, int v); diff --git a/io/channel-util.c b/io/channel-util.c index 0fb4bd0837..423d79845a 100644 --- a/io/channel-util.c +++ b/io/channel-util.c @@ -24,19 +24,6 @@ #include "io/channel-socket.h" =20 =20 -static bool fd_is_socket(int fd) -{ - int optval; - socklen_t optlen; - optlen =3D sizeof(optval); - return qemu_getsockopt(fd, - SOL_SOCKET, - SO_TYPE, - (char *)&optval, - &optlen) =3D=3D 0; -} - - QIOChannel *qio_channel_new_fd(int fd, Error **errp) { diff --git a/util/qemu-sockets.c b/util/qemu-sockets.c index af4f01211a..1d23f0b742 100644 --- a/util/qemu-sockets.c +++ b/util/qemu-sockets.c @@ -91,6 +91,19 @@ NetworkAddressFamily inet_netfamily(int family) return NETWORK_ADDRESS_FAMILY_UNKNOWN; } =20 +bool fd_is_socket(int fd) +{ + int optval; + socklen_t optlen; + optlen =3D sizeof(optval); + return qemu_getsockopt(fd, + SOL_SOCKET, + SO_TYPE, + (char *)&optval, + &optlen) =3D=3D 0; +} + + /* * Matrix we're trying to apply * --=20 2.14.3 From nobody Fri May 3 10:20:00 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) client-ip=208.118.235.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org Return-Path: Received: from lists.gnu.org (lists.gnu.org [208.118.235.17]) by mx.zohomail.com with SMTPS id 151387214958640.92107259126976; Thu, 21 Dec 2017 08:02:29 -0800 (PST) Received: from localhost ([::1]:56636 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1eS3Ig-000235-Hl for importer@patchew.org; Thu, 21 Dec 2017 11:02:26 -0500 Received: from eggs.gnu.org ([2001:4830:134:3::10]:43201) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1eS3Fq-0008OR-Aa for qemu-devel@nongnu.org; Thu, 21 Dec 2017 10:59:32 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1eS3Fo-0000FZ-HG for qemu-devel@nongnu.org; Thu, 21 Dec 2017 10:59:30 -0500 Received: from mx1.redhat.com ([209.132.183.28]:60947) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1eS3Fo-0000F5-8J for qemu-devel@nongnu.org; Thu, 21 Dec 2017 10:59:28 -0500 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 4DF6C25C52 for ; Thu, 21 Dec 2017 15:59:27 +0000 (UTC) Received: from localhost.localdomain.com (unknown [10.42.22.189]) by smtp.corp.redhat.com (Postfix) with ESMTP id 6833F2C8F1; Thu, 21 Dec 2017 15:59:25 +0000 (UTC) From: "Daniel P. Berrange" To: qemu-devel@nongnu.org Date: Thu, 21 Dec 2017 15:59:05 +0000 Message-Id: <20171221155905.3793-3-berrange@redhat.com> In-Reply-To: <20171221155905.3793-1-berrange@redhat.com> References: <20171221155905.3793-1-berrange@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.30]); Thu, 21 Dec 2017 15:59:27 +0000 (UTC) X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] [fuzzy] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v2 2/2] char: allow passing pre-opened socket file descriptor at startup X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: "Dr. David Alan Gilbert" , Markus Armbruster , =?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= , Paolo Bonzini Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail: RSF_0 Z_629925259 SPT_0 Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" When starting QEMU management apps will usually setup a monitor socket, and then open it immediately after startup. If not using QEMU's own -daemonize arg, this process can be troublesome to handle correctly. The mgmt app will need to repeatedly call connect() until it succeeds, because it does not know when QEMU has created the listener socket. If can't retry connect() forever though, because an error might have caused QEMU to exit before it even creates the monitor. The obvious way to fix this kind of problem is to just pass in a pre-opened socket file descriptor for the QEMU monitor to listen on. The management app can now immediately call connect() just once. If connect() fails it knows that QEMU has exited with an error. The SocketAddress(Legacy) structs allow for FD passing via the monitor, usi= ng the 'getfd' command, but only when using QMP JSON syntax. The HMP & CLI syn= tax for chardevs, however, has no way to initialize the SocketAddress(Legacy) '= fd' variant. So this patch wires up the 'fd' parameter to refer to a refer to a passed in file descriptor. It can refer either to a named FD passed via the 'getfd' command, as already supported with QMP, or if numeric it refers to = an FD passed to QEMU at startup. This allows both HMP usage: (pass any FD number with SCM_RIGHTS) getfd myfd chardev-add socket,fd=3Dmyfd And also CLI usage (leak FD 3 from parent by clearing O_CLOEXEC) -chardev socket,fd=3D3,id=3Dmon -mon chardev=3Dmon,mode=3Dcontrol Note that we do not wire this up in the legacy chardev syntax, so you cannot use FD passing with '-qmp', you must use the modern '-mon' + '-chardev' pair An illustrative example of usage is: #!/usr/bin/perl use IO::Socket::UNIX; use Fcntl; unlink "/tmp/qmp"; my $srv =3D IO::Socket::UNIX->new( Type =3D> SOCK_STREAM(), Local =3D> "/tmp/qmp", Listen =3D> 1, ); my $flags =3D fcntl $srv, F_GETFD, 0; fcntl $srv, F_SETFD, $flags & ~FD_CLOEXEC; my $fd =3D $srv->fileno(); exec "qemu-system-x86_64", \ "-chardev", "socket,fd=3D$fd,server,nowait,id=3Dmon", \ "-mon", "chardev=3Dmon,mode=3Dcontrol"; Signed-off-by: Daniel P. Berrange Reviewed-by: Eric Blake --- chardev/char-socket.c | 32 ++++++++-- chardev/char.c | 3 + tests/test-char.c | 173 ++++++++++++++++++++++++++++++++++++++++++++++= +++- util/qemu-sockets.c | 42 +++++++++++- 4 files changed, 238 insertions(+), 12 deletions(-) diff --git a/chardev/char-socket.c b/chardev/char-socket.c index 6013972f72..e162db7542 100644 --- a/chardev/char-socket.c +++ b/chardev/char-socket.c @@ -28,6 +28,7 @@ #include "qemu/error-report.h" #include "qapi/error.h" #include "qapi/clone-visitor.h" +#include "qemu/cutils.h" =20 #include "chardev/char-io.h" =20 @@ -983,25 +984,36 @@ static void qemu_chr_parse_socket(QemuOpts *opts, Cha= rdevBackend *backend, const char *path =3D qemu_opt_get(opts, "path"); const char *host =3D qemu_opt_get(opts, "host"); const char *port =3D qemu_opt_get(opts, "port"); + const char *fd =3D qemu_opt_get(opts, "fd"); const char *tls_creds =3D qemu_opt_get(opts, "tls-creds"); SocketAddressLegacy *addr; ChardevSocket *sock; =20 + if ((!!path + !!fd + !!host) !=3D 1) { + error_setg(errp, + "Exactly one of 'path', 'fd' or 'host' required"); + return; + } + backend->type =3D CHARDEV_BACKEND_KIND_SOCKET; - if (!path) { - if (!host) { - error_setg(errp, "chardev: socket: no host given"); + if (path) { + if (tls_creds) { + error_setg(errp, "TLS can only be used over TCP socket"); return; } + } else if (host) { if (!port) { error_setg(errp, "chardev: socket: no port given"); return; } - } else { - if (tls_creds) { - error_setg(errp, "TLS can only be used over TCP socket"); + } else if (fd) { + /* We don't know what host to validate against when in client mode= */ + if (tls_creds && !is_listen) { + error_setg(errp, "TLS can not be used with pre-opened client F= D"); return; } + } else { + g_assert_not_reached(); } =20 sock =3D backend->u.socket.data =3D g_new0(ChardevSocket, 1); @@ -1027,7 +1039,7 @@ static void qemu_chr_parse_socket(QemuOpts *opts, Cha= rdevBackend *backend, addr->type =3D SOCKET_ADDRESS_LEGACY_KIND_UNIX; q_unix =3D addr->u.q_unix.data =3D g_new0(UnixSocketAddress, 1); q_unix->path =3D g_strdup(path); - } else { + } else if (host) { addr->type =3D SOCKET_ADDRESS_LEGACY_KIND_INET; addr->u.inet.data =3D g_new(InetSocketAddress, 1); *addr->u.inet.data =3D (InetSocketAddress) { @@ -1040,6 +1052,12 @@ static void qemu_chr_parse_socket(QemuOpts *opts, Ch= ardevBackend *backend, .has_ipv6 =3D qemu_opt_get(opts, "ipv6"), .ipv6 =3D qemu_opt_get_bool(opts, "ipv6", 0), }; + } else if (fd) { + addr->type =3D SOCKET_ADDRESS_LEGACY_KIND_FD; + addr->u.fd.data =3D g_new(String, 1); + addr->u.fd.data->str =3D g_strdup(fd); + } else { + g_assert_not_reached(); } sock->addr =3D addr; } diff --git a/chardev/char.c b/chardev/char.c index 2ae4f465ec..9d674855ae 100644 --- a/chardev/char.c +++ b/chardev/char.c @@ -798,6 +798,9 @@ QemuOptsList qemu_chardev_opts =3D { },{ .name =3D "port", .type =3D QEMU_OPT_STRING, + },{ + .name =3D "fd", + .type =3D QEMU_OPT_STRING, },{ .name =3D "localaddr", .type =3D QEMU_OPT_STRING, diff --git a/tests/test-char.c b/tests/test-char.c index 7ac25ff73f..e72a20f0c2 100644 --- a/tests/test-char.c +++ b/tests/test-char.c @@ -9,6 +9,7 @@ #include "qapi/error.h" #include "qom/qom-qobject.h" #include "qmp-commands.h" +#include "monitor/monitor.h" =20 static bool quit; =20 @@ -284,9 +285,8 @@ static int socket_can_read_hello(void *opaque) return 10; } =20 -static void char_socket_test(void) +static void char_socket_test_common(Chardev *chr) { - Chardev *chr =3D qemu_chr_new("server", "tcp:127.0.0.1:0,server,nowait= "); Chardev *chr_client; QObject *addr; QDict *qdict; @@ -341,6 +341,169 @@ static void char_socket_test(void) object_unparent(OBJECT(chr)); } =20 + +static void char_socket_basic_test(void) +{ + Chardev *chr =3D qemu_chr_new("server", "tcp:127.0.0.1:0,server,nowait= "); + + char_socket_test_common(chr); +} + + +static int char_socket_listener(void) +{ + SocketAddress *addr =3D g_new0(SocketAddress, 1); + int srv; + + addr->type =3D SOCKET_ADDRESS_TYPE_INET; + addr->u.inet.host =3D g_strdup("127.0.0.1"); + addr->u.inet.port =3D g_strdup("0"); + + srv =3D socket_listen(addr, &error_abort); + g_assert(srv >=3D 0); + + qapi_free_SocketAddress(addr); + return srv; +} + + +/* If a monitor is not active (ie cur_mon =3D=3D NULL), then + * we should be able to use fd=3D syntax + */ +static void char_socket_fdpass_cli_test(void) +{ + Chardev *chr; + char *optstr; + QemuOpts *opts; + int fd; + + g_assert_null(cur_mon); + + fd =3D char_socket_listener(); + + optstr =3D g_strdup_printf("socket,id=3Dcdev,fd=3D%d,server,nowait", f= d); + + opts =3D qemu_opts_parse_noisily(qemu_find_opts("chardev"), + optstr, true); + g_assert_nonnull(opts); + + chr =3D qemu_chr_new_from_opts(opts, &error_abort); + + qemu_opts_del(opts); + + char_socket_test_common(chr); +} + + +static int mon_fd =3D -1; + +int monitor_get_fd(Monitor *mon, const char *fdname, Error **errp) +{ + if (mon_fd =3D=3D -1) { + error_setg(errp, "No fd named %s", fdname); + return -1; + } + return mon_fd; +} + +/* Syms in libqemustub.a are discarded at .o file granularity. + * To replace monitor_get_fd() we must ensure everything in + * stubs/monitor.c is defined, to make sure monitor.o is discarded + * otherwise we get duplicate syms at link time. + */ +Monitor *cur_mon =3D NULL; +void monitor_init(Chardev *chr, int flags) {} + +/* If a monitor is active (ie cur_mon !=3D NULL), then + * we should be able to use fd=3D syntax + */ +static void char_socket_fdpass_mon_test(void) +{ + Chardev *chr; + const char *optstr; + QemuOpts *opts; + int fd; + + fd =3D char_socket_listener(); + mon_fd =3D fd; + cur_mon =3D g_malloc(1); /* Pretend we have a mon available */ + + optstr =3D "socket,id=3Dcdev,fd=3Dmyfd,server,nowait"; + + opts =3D qemu_opts_parse_noisily(qemu_find_opts("chardev"), + optstr, true); + g_assert_nonnull(opts); + + chr =3D qemu_chr_new_from_opts(opts, &error_abort); + + qemu_opts_del(opts); + + char_socket_test_common(chr); + mon_fd =3D -1; + g_free(cur_mon); + cur_mon =3D NULL; +} + + +/* If a monitor is active (ie cur_mon !=3D NULL), then + * we should not allow using fd=3D syntax + */ +static void char_socket_fdpass_nocli_test(void) +{ + Chardev *chr; + char *optstr; + QemuOpts *opts; + int fd; + Error *local_err =3D NULL; + + fd =3D char_socket_listener(); + cur_mon =3D g_malloc(1); /* Pretend we have a mon available */ + + optstr =3D g_strdup_printf("socket,id=3Dcdev,fd=3D%d,server,nowait", f= d); + + opts =3D qemu_opts_parse_noisily(qemu_find_opts("chardev"), + optstr, true); + g_assert_nonnull(opts); + + chr =3D qemu_chr_new_from_opts(opts, &local_err); + + qemu_opts_del(opts); + + g_assert_nonnull(local_err); + g_assert_null(chr); + error_free(local_err); + g_free(cur_mon); + cur_mon =3D NULL; +} + + +/* If a monitor is not active (ie cur_mon =3D=3D NULL), then + * we should not allow using fd=3D syntax + */ +static void char_socket_fdpass_nomon_test(void) +{ + Chardev *chr; + const char *optstr; + QemuOpts *opts; + Error *local_err =3D NULL; + + g_assert_null(cur_mon); + optstr =3D "socket,id=3Dcdev,fd=3Dmyfd,server,nowait"; + + opts =3D qemu_opts_parse_noisily(qemu_find_opts("chardev"), + optstr, true); + g_assert_nonnull(opts); + + chr =3D qemu_chr_new_from_opts(opts, &local_err); + + qemu_opts_del(opts); + + g_assert_nonnull(local_err); + g_assert_null(chr); + error_free(local_err); +} + + #ifndef _WIN32 static void char_pipe_test(void) { @@ -757,7 +920,11 @@ int main(int argc, char **argv) #ifndef _WIN32 g_test_add_func("/char/file-fifo", char_file_fifo_test); #endif - g_test_add_func("/char/socket", char_socket_test); + g_test_add_func("/char/socket/basic", char_socket_basic_test); + g_test_add_func("/char/socket/fdpass/cli", char_socket_fdpass_cli_test= ); + g_test_add_func("/char/socket/fdpass/mon", char_socket_fdpass_mon_test= ); + g_test_add_func("/char/socket/fdpass/nocli", char_socket_fdpass_nocli_= test); + g_test_add_func("/char/socket/fdpass/nomon", char_socket_fdpass_nomon_= test); g_test_add_func("/char/udp", char_udp_test); #ifdef HAVE_CHARDEV_SERIAL g_test_add_func("/char/serial", char_serial_test); diff --git a/util/qemu-sockets.c b/util/qemu-sockets.c index 1d23f0b742..9400f9a940 100644 --- a/util/qemu-sockets.c +++ b/util/qemu-sockets.c @@ -1046,7 +1046,26 @@ int socket_connect(SocketAddress *addr, Error **errp) break; =20 case SOCKET_ADDRESS_TYPE_FD: - fd =3D monitor_get_fd(cur_mon, addr->u.fd.str, errp); + if (cur_mon) { + fd =3D monitor_get_fd(cur_mon, addr->u.fd.str, errp); + if (fd < 0) { + return -1; + } + } else { + unsigned long i; + if (qemu_strtoul(addr->u.fd.str, NULL, 10, &i) < 0) { + error_setg_errno(errp, errno, + "Unable to parse FD number %s", + addr->u.fd.str); + return -1; + } + fd =3D i; + } + if (!fd_is_socket(fd)) { + error_setg(errp, "Expected a socket FD %s", addr->u.fd.str); + close(fd); + return -1; + } break; =20 case SOCKET_ADDRESS_TYPE_VSOCK: @@ -1073,7 +1092,26 @@ int socket_listen(SocketAddress *addr, Error **errp) break; =20 case SOCKET_ADDRESS_TYPE_FD: - fd =3D monitor_get_fd(cur_mon, addr->u.fd.str, errp); + if (cur_mon) { + fd =3D monitor_get_fd(cur_mon, addr->u.fd.str, errp); + if (fd < 0) { + return -1; + } + } else { + unsigned long i; + if (qemu_strtoul(addr->u.fd.str, NULL, 10, &i) < 0) { + error_setg_errno(errp, errno, + "Unable to parse FD number %s", + addr->u.fd.str); + return -1; + } + fd =3D i; + } + if (!fd_is_socket(fd)) { + error_setg(errp, "Expected a socket FD %s", addr->u.fd.str); + close(fd); + return -1; + } break; =20 case SOCKET_ADDRESS_TYPE_VSOCK: --=20 2.14.3