Provided by: manpages_5.05-1_all bug

NAME

       vsock - Linux VSOCK address family

SYNOPSIS

       #include <sys/socket.h>
       #include <linux/vm_sockets.h>

       stream_socket = socket(AF_VSOCK, SOCK_STREAM, 0);
       datagram_socket = socket(AF_VSOCK, SOCK_DGRAM, 0);

DESCRIPTION

       The  VSOCK  address family facilitates communication between virtual machines and the host
       they are running on.  This address family is used by guest agents and hypervisor  services
       that  need  a  communications  channel  that  is  independent  of  virtual machine network
       configuration.

       Valid socket types are  SOCK_STREAM  and  SOCK_DGRAM.   SOCK_STREAM  provides  connection-
       oriented   byte  streams  with  guaranteed,  in-order  delivery.   SOCK_DGRAM  provides  a
       connectionless datagram packet service with best-effort delivery and best-effort ordering.
       Availability of these socket types is dependent on the underlying hypervisor.

       A new socket is created with

           socket(AF_VSOCK, socket_type, 0);

       When  a  process  wants  to  establish  a  connection,  it  calls  connect(2) with a given
       destination socket address.  The socket is automatically bound to a free port if unbound.

       A process can listen for incoming connections by first binding to a socket  address  using
       bind(2) and then calling listen(2).

       Data  is  transmitted  using  the send(2) or write(2) families of system calls and data is
       received using the recv(2) or read(2) families of system calls.

   Address format
       A socket address is defined as a combination of a 32-bit Context Identifier  (CID)  and  a
       32-bit  port  number.   The  CID  identifies  the source or destination, which is either a
       virtual machine or the host.  The port number  differentiates  between  multiple  services
       running on a single machine.

           struct sockaddr_vm {
               sa_family_t    svm_family;     /* Address family: AF_VSOCK */
               unsigned short svm_reserved1;
               unsigned int   svm_port;       /* Port # in host byte order */
               unsigned int   svm_cid;        /* Address in host byte order */
               unsigned char  svm_zero[sizeof(struct sockaddr) -
                                       sizeof(sa_family_t) -
                                       sizeof(unsigned short) -
                                       sizeof(unsigned int) -
                                       sizeof(unsigned int)];
           };

       svm_family  is  always  set  to  AF_VSOCK.   svm_reserved1  is  always set to 0.  svm_port
       contains the port number in host byte order.  The  port  numbers  below  1024  are  called
       privileged  ports.  Only a process with the CAP_NET_BIND_SERVICE capability may bind(2) to
       these port numbers.  svm_zero must be zero-filled.

       There are several special addresses: VMADDR_CID_ANY (-1U) means any address  for  binding;
       VMADDR_CID_HYPERVISOR   (0)   is   reserved   for  services  built  into  the  hypervisor;
       VMADDR_CID_RESERVED (1) must not be used; VMADDR_CID_HOST (2) is the well-known address of
       the host.

       The special constant VMADDR_PORT_ANY (-1U) means any port number for binding.

   Live migration
       Sockets are affected by live migration of virtual machines.  Connected SOCK_STREAM sockets
       become disconnected when the virtual machine migrates to a new  host.   Applications  must
       reconnect when this happens.

       The  local CID may change across live migration if the old CID is not available on the new
       host.  Bound sockets are automatically updated to the new CID.

   Ioctls
       IOCTL_VM_SOCKETS_GET_LOCAL_CID
              Get the CID of the local machine.  The argument is a pointer to an unsigned int.

                  ioctl(socket, IOCTL_VM_SOCKETS_GET_LOCAL_CID, &cid);

              Consider using VMADDR_CID_ANY when binding instead of getting the  local  CID  with
              IOCTL_VM_SOCKETS_GET_LOCAL_CID.

ERRORS

       EACCES Unable to bind to a privileged port without the CAP_NET_BIND_SERVICE capability.

       EADDRINUSE
              Unable to bind to a port that is already in use.

       EADDRNOTAVAIL
              Unable to find a free port for binding or unable to bind to a nonlocal CID.

       EINVAL Invalid  parameters.   This  includes:  attempting to bind a socket that is already
              bound, providing an invalid struct sockaddr_vm, and other input validation errors.

       ENOPROTOOPT
              Invalid socket option in setsockopt(2) or getsockopt(2).

       ENOTCONN
              Unable to perform operation on an unconnected socket.

       EOPNOTSUPP
              Operation not supported.  This includes: the MSG_OOB flag that is  not  implemented
              for the send(2) family of syscalls and MSG_PEEK for the recv(2) family of syscalls.

       EPROTONOSUPPORT
              Invalid socket protocol number.  The protocol should always be 0.

       ESOCKTNOSUPPORT
              Unsupported socket type in socket(2).  Only SOCK_STREAM and SOCK_DGRAM are valid.

VERSIONS

       Support  for  VMware (VMCI) has been available since Linux 3.9.  KVM (virtio) is supported
       since Linux 4.8.  Hyper-V is supported since Linux 4.14.

SEE ALSO

       bind(2), connect(2), listen(2), recv(2), send(2), socket(2), capabilities(7)

COLOPHON

       This page is part of release 5.05 of the Linux man-pages project.  A  description  of  the
       project,  information  about  reporting  bugs, and the latest version of this page, can be
       found at https://www.kernel.org/doc/man-pages/.