On Thu, Oct 31, 2013 at 04:40:11PM +0100, Ján Tomko wrote:
Also try to bind on IPv6 to check if the port is occupied.
https://bugzilla.redhat.com/show_bug.cgi?id=1025407
---
src/util/virportallocator.c | 45 ++++++++++++++++++++++++++++++++++++++-------
1 file changed, 38 insertions(+), 7 deletions(-)
Have you tested this on a system where the IPv6 kernel module is
not present, and on a system with IPv6 kmod is present, but no
interfaces have any IPv6 addresses (not even link-local ones).
I'm concerned this is going to trigger failures on IPv4 only
hosts.
diff --git a/src/util/virportallocator.c
b/src/util/virportallocator.c
index 1922ea6..24b4bff 100644
--- a/src/util/virportallocator.c
+++ b/src/util/virportallocator.c
@@ -99,21 +99,45 @@ virPortAllocatorPtr virPortAllocatorNew(const char *name,
}
static int virPortAllocatorBindToPort(bool *used,
- unsigned short port)
+ unsigned short port,
+ int family)
{
- struct sockaddr_in addr = {
+ struct sockaddr_in6 addr6 = {
+ .sin6_family = AF_INET6,
+ .sin6_port = htons(port),
+ .sin6_addr = IN6ADDR_ANY_INIT,
+ };
+ struct sockaddr_in addr4 = {
.sin_family = AF_INET,
.sin_port = htons(port),
.sin_addr.s_addr = htonl(INADDR_ANY)
};
+ struct sockaddr* addr;
+ size_t addrlen;
+ int v6only = 1;
int reuse = 1;
int ret = -1;
int fd = -1;
+ bool ipv6 = false;
+
+ if (family == AF_INET6) {
+ addr = (struct sockaddr*)&addr6;
+ addrlen = sizeof(addr6);
+ ipv6 = true;
+ } else if (family == AF_INET) {
+ addr = (struct sockaddr*)&addr4;
+ addrlen = sizeof(addr4);
family can be AF_INET or AF_INET6 here...
+ } else {
+ virReportError(VIR_ERR_INTERNAL_ERROR, _("Unknown family %d"),
family);
+ return -1;
+ }
*used = false;
fd = socket(PF_INET, SOCK_STREAM, 0);
...but you're hardcoding PF_INET here. I'm not sure it is valid
to use an PF_INET socket with an AF_INET6 address in bind().
if (fd < 0) {
+ if (errno == EAFNOSUPPORT)
+ return 0;
virReportSystemError(errno, "%s", _("Unable to open test
socket"));
goto cleanup;
}
@@ -125,7 +149,14 @@ static int virPortAllocatorBindToPort(bool *used,
goto cleanup;
}
- if (bind(fd, (struct sockaddr*)&addr, sizeof(addr)) < 0) {
+ if (ipv6 && setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (void*)&v6only,
+ sizeof(v6only)) < 0) {
+ virReportSystemError(errno, "%s",
+ _("Unable to set IPV6_V6ONLY flag"));
+ goto cleanup;
+ }
+
+ if (bind(fd, addr, addrlen) < 0) {
if (errno == EADDRINUSE) {
*used = true;
ret = 0;
@@ -151,7 +182,7 @@ int virPortAllocatorAcquire(virPortAllocatorPtr pa,
virObjectLock(pa);
for (i = pa->start; i <= pa->end && !*port; i++) {
- bool used = false;
+ bool used = false, v6used = false;
if (virBitmapGetBit(pa->bitmap,
i - pa->start, &used) < 0) {
@@ -163,10 +194,10 @@ int virPortAllocatorAcquire(virPortAllocatorPtr pa,
if (used)
continue;
- if (virPortAllocatorBindToPort(&used, i) < 0)
+ if (virPortAllocatorBindToPort(&v6used, i, AF_INET6) < 0 ||
+ virPortAllocatorBindToPort(&used, i, AF_INET) < 0)
goto cleanup;
-
- if (!used) {
+ if (!used && !v6used) {
/* Add port to bitmap of reserved ports */
if (virBitmapSetBit(pa->bitmap,
i - pa->start) < 0) {
Daniel
--
|:
http://berrange.com -o-
http://www.flickr.com/photos/dberrange/ :|
|:
http://libvirt.org -o-
http://virt-manager.org :|
|:
http://autobuild.org -o-
http://search.cpan.org/~danberr/ :|
|:
http://entangle-photo.org -o-
http://live.gnome.org/gtk-vnc :|