]>
Commit | Line | Data |
---|---|---|
305b0eb2 AL |
1 | /* |
2 | * inet and unix socket functions for qemu | |
3 | * | |
4 | * (c) 2008 Gerd Hoffmann <[email protected]> | |
5 | * | |
6 | * This program is free software; you can redistribute it and/or modify | |
7 | * it under the terms of the GNU General Public License as published by | |
8 | * the Free Software Foundation; under version 2 of the License. | |
9 | * | |
10 | * This program is distributed in the hope that it will be useful, | |
11 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
12 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
13 | * GNU General Public License for more details. | |
e6d91ab6 PB |
14 | * |
15 | * Contributions after 2012-01-13 are licensed under the terms of the | |
16 | * GNU GPL, version 2 or (at your option) any later version. | |
305b0eb2 | 17 | */ |
aafd7584 | 18 | #include "qemu/osdep.h" |
d247d25f | 19 | |
6a02c806 SH |
20 | #ifdef CONFIG_AF_VSOCK |
21 | #include <linux/vm_sockets.h> | |
22 | #endif /* CONFIG_AF_VSOCK */ | |
23 | ||
83c9089e | 24 | #include "monitor/monitor.h" |
bd269ebc | 25 | #include "qapi/clone-visitor.h" |
da34e65c | 26 | #include "qapi/error.h" |
1de7afc9 | 27 | #include "qemu/sockets.h" |
1de7afc9 | 28 | #include "qemu/main-loop.h" |
216411b8 | 29 | #include "qapi/clone-visitor.h" |
b3db211f DB |
30 | #include "qapi/qobject-input-visitor.h" |
31 | #include "qapi/qobject-output-visitor.h" | |
2a8e21c7 | 32 | #include "qapi-visit.h" |
f348b6d1 | 33 | #include "qemu/cutils.h" |
d247d25f AL |
34 | |
35 | #ifndef AI_ADDRCONFIG | |
36 | # define AI_ADDRCONFIG 0 | |
37 | #endif | |
340849a9 | 38 | |
3de3d698 WB |
39 | #ifndef AI_V4MAPPED |
40 | # define AI_V4MAPPED 0 | |
41 | #endif | |
d247d25f | 42 | |
6979a813 DB |
43 | #ifndef AI_NUMERICSERV |
44 | # define AI_NUMERICSERV 0 | |
45 | #endif | |
46 | ||
2af2bf67 | 47 | |
d247d25f AL |
48 | static int inet_getport(struct addrinfo *e) |
49 | { | |
50 | struct sockaddr_in *i4; | |
51 | struct sockaddr_in6 *i6; | |
52 | ||
53 | switch (e->ai_family) { | |
54 | case PF_INET6: | |
55 | i6 = (void*)e->ai_addr; | |
56 | return ntohs(i6->sin6_port); | |
57 | case PF_INET: | |
58 | i4 = (void*)e->ai_addr; | |
59 | return ntohs(i4->sin_port); | |
60 | default: | |
61 | return 0; | |
62 | } | |
63 | } | |
64 | ||
65 | static void inet_setport(struct addrinfo *e, int port) | |
66 | { | |
67 | struct sockaddr_in *i4; | |
68 | struct sockaddr_in6 *i6; | |
69 | ||
70 | switch (e->ai_family) { | |
71 | case PF_INET6: | |
72 | i6 = (void*)e->ai_addr; | |
73 | i6->sin6_port = htons(port); | |
74 | break; | |
75 | case PF_INET: | |
76 | i4 = (void*)e->ai_addr; | |
77 | i4->sin_port = htons(port); | |
78 | break; | |
79 | } | |
80 | } | |
81 | ||
a589569f WX |
82 | NetworkAddressFamily inet_netfamily(int family) |
83 | { | |
84 | switch (family) { | |
85 | case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6; | |
86 | case PF_INET: return NETWORK_ADDRESS_FAMILY_IPV4; | |
87 | case PF_UNIX: return NETWORK_ADDRESS_FAMILY_UNIX; | |
6a02c806 SH |
88 | #ifdef CONFIG_AF_VSOCK |
89 | case PF_VSOCK: return NETWORK_ADDRESS_FAMILY_VSOCK; | |
90 | #endif /* CONFIG_AF_VSOCK */ | |
a589569f WX |
91 | } |
92 | return NETWORK_ADDRESS_FAMILY_UNKNOWN; | |
93 | } | |
94 | ||
1856835d DB |
95 | /* |
96 | * Matrix we're trying to apply | |
97 | * | |
98 | * ipv4 ipv6 family | |
99 | * - - PF_UNSPEC | |
100 | * - f PF_INET | |
101 | * - t PF_INET6 | |
102 | * f - PF_INET6 | |
103 | * f f <error> | |
104 | * f t PF_INET6 | |
105 | * t - PF_INET | |
106 | * t f PF_INET | |
107 | * t t PF_INET6 | |
108 | * | |
d43eda3d | 109 | * NB, this matrix is only about getting the necessary results |
1856835d DB |
110 | * from getaddrinfo(). Some of the cases require further work |
111 | * after reading results from getaddrinfo in order to fully | |
112 | * apply the logic the end user wants. eg with the last case | |
113 | * ipv4=t + ipv6=t + PF_INET6, getaddrinfo alone can only | |
114 | * guarantee the ipv6=t part of the request - we need more | |
115 | * checks to provide ipv4=t part of the guarantee. This is | |
116 | * outside scope of this method and not currently handled by | |
117 | * callers at all. | |
118 | */ | |
c1b412f1 DB |
119 | int inet_ai_family_from_address(InetSocketAddress *addr, |
120 | Error **errp) | |
1856835d DB |
121 | { |
122 | if (addr->has_ipv6 && addr->has_ipv4 && | |
123 | !addr->ipv6 && !addr->ipv4) { | |
124 | error_setg(errp, "Cannot disable IPv4 and IPv6 at same time"); | |
125 | return PF_UNSPEC; | |
126 | } | |
127 | if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) { | |
128 | return PF_INET6; | |
129 | } | |
130 | if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) { | |
131 | return PF_INET; | |
132 | } | |
133 | return PF_UNSPEC; | |
134 | } | |
135 | ||
136 | static int inet_listen_saddr(InetSocketAddress *saddr, | |
137 | int port_offset, | |
138 | bool update_addr, | |
139 | Error **errp) | |
d247d25f AL |
140 | { |
141 | struct addrinfo ai,*res,*e; | |
d247d25f AL |
142 | char port[33]; |
143 | char uaddr[INET6_ADDRSTRLEN+1]; | |
144 | char uport[33]; | |
1856835d DB |
145 | int slisten, rc, port_min, port_max, p; |
146 | Error *err = NULL; | |
d247d25f AL |
147 | |
148 | memset(&ai,0, sizeof(ai)); | |
3de3d698 | 149 | ai.ai_flags = AI_PASSIVE; |
6979a813 DB |
150 | if (saddr->has_numeric && saddr->numeric) { |
151 | ai.ai_flags |= AI_NUMERICHOST | AI_NUMERICSERV; | |
152 | } | |
1856835d | 153 | ai.ai_family = inet_ai_family_from_address(saddr, &err); |
e5bc776f | 154 | ai.ai_socktype = SOCK_STREAM; |
d247d25f | 155 | |
1856835d DB |
156 | if (err) { |
157 | error_propagate(errp, err); | |
158 | return -1; | |
159 | } | |
160 | ||
161 | if (saddr->host == NULL) { | |
0983f5e6 | 162 | error_setg(errp, "host not specified"); |
e5bc776f | 163 | return -1; |
d247d25f | 164 | } |
1856835d DB |
165 | if (saddr->port != NULL) { |
166 | pstrcpy(port, sizeof(port), saddr->port); | |
0983f5e6 DB |
167 | } else { |
168 | port[0] = '\0'; | |
169 | } | |
d247d25f AL |
170 | |
171 | /* lookup */ | |
8bc89127 GH |
172 | if (port_offset) { |
173 | unsigned long long baseport; | |
0983f5e6 DB |
174 | if (strlen(port) == 0) { |
175 | error_setg(errp, "port not specified"); | |
176 | return -1; | |
177 | } | |
8bc89127 GH |
178 | if (parse_uint_full(port, &baseport, 10) < 0) { |
179 | error_setg(errp, "can't convert to a number: %s", port); | |
180 | return -1; | |
181 | } | |
182 | if (baseport > 65535 || | |
183 | baseport + port_offset > 65535) { | |
184 | error_setg(errp, "port %s out of range", port); | |
185 | return -1; | |
186 | } | |
187 | snprintf(port, sizeof(port), "%d", (int)baseport + port_offset); | |
188 | } | |
1856835d | 189 | rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL, |
0983f5e6 | 190 | strlen(port) ? port : NULL, &ai, &res); |
d247d25f | 191 | if (rc != 0) { |
1856835d DB |
192 | error_setg(errp, "address resolution failed for %s:%s: %s", |
193 | saddr->host, port, gai_strerror(rc)); | |
d247d25f AL |
194 | return -1; |
195 | } | |
d247d25f AL |
196 | |
197 | /* create socket + bind */ | |
198 | for (e = res; e != NULL; e = e->ai_next) { | |
39b6efc8 VS |
199 | getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen, |
200 | uaddr,INET6_ADDRSTRLEN,uport,32, | |
201 | NI_NUMERICHOST | NI_NUMERICSERV); | |
40ff6d7e | 202 | slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol); |
39b6efc8 | 203 | if (slisten < 0) { |
029409e5 | 204 | if (!e->ai_next) { |
235256a2 | 205 | error_setg_errno(errp, errno, "Failed to create socket"); |
029409e5 | 206 | } |
39b6efc8 VS |
207 | continue; |
208 | } | |
d247d25f | 209 | |
04fd1c78 | 210 | socket_set_fast_reuse(slisten); |
d247d25f AL |
211 | #ifdef IPV6_V6ONLY |
212 | if (e->ai_family == PF_INET6) { | |
213 | /* listen on both ipv4 and ipv6 */ | |
f9b5426f | 214 | const int off = 0; |
9957fc7f SW |
215 | qemu_setsockopt(slisten, IPPROTO_IPV6, IPV6_V6ONLY, &off, |
216 | sizeof(off)); | |
d247d25f AL |
217 | } |
218 | #endif | |
219 | ||
877691f9 | 220 | port_min = inet_getport(e); |
1856835d | 221 | port_max = saddr->has_to ? saddr->to + port_offset : port_min; |
877691f9 MA |
222 | for (p = port_min; p <= port_max; p++) { |
223 | inet_setport(e, p); | |
d247d25f | 224 | if (bind(slisten, e->ai_addr, e->ai_addrlen) == 0) { |
d247d25f AL |
225 | goto listen; |
226 | } | |
877691f9 | 227 | if (p == port_max) { |
029409e5 | 228 | if (!e->ai_next) { |
235256a2 | 229 | error_setg_errno(errp, errno, "Failed to bind socket"); |
029409e5 | 230 | } |
d247d25f | 231 | } |
d247d25f AL |
232 | } |
233 | closesocket(slisten); | |
234 | } | |
d247d25f AL |
235 | freeaddrinfo(res); |
236 | return -1; | |
237 | ||
238 | listen: | |
239 | if (listen(slisten,1) != 0) { | |
235256a2 | 240 | error_setg_errno(errp, errno, "Failed to listen on socket"); |
d247d25f | 241 | closesocket(slisten); |
39b6efc8 | 242 | freeaddrinfo(res); |
d247d25f AL |
243 | return -1; |
244 | } | |
1856835d DB |
245 | if (update_addr) { |
246 | g_free(saddr->host); | |
247 | saddr->host = g_strdup(uaddr); | |
248 | g_free(saddr->port); | |
249 | saddr->port = g_strdup_printf("%d", | |
250 | inet_getport(e) - port_offset); | |
251 | saddr->has_ipv6 = saddr->ipv6 = e->ai_family == PF_INET6; | |
252 | saddr->has_ipv4 = saddr->ipv4 = e->ai_family != PF_INET6; | |
253 | } | |
d247d25f AL |
254 | freeaddrinfo(res); |
255 | return slisten; | |
256 | } | |
257 | ||
05bc1d8a MT |
258 | #ifdef _WIN32 |
259 | #define QEMU_SOCKET_RC_INPROGRESS(rc) \ | |
260 | ((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY) | |
261 | #else | |
262 | #define QEMU_SOCKET_RC_INPROGRESS(rc) \ | |
263 | ((rc) == -EINPROGRESS) | |
264 | #endif | |
265 | ||
233aa5c2 OW |
266 | /* Struct to store connect state for non blocking connect */ |
267 | typedef struct ConnectState { | |
268 | int fd; | |
269 | struct addrinfo *addr_list; | |
270 | struct addrinfo *current_addr; | |
271 | NonBlockingConnectHandler *callback; | |
272 | void *opaque; | |
273 | } ConnectState; | |
274 | ||
275 | static int inet_connect_addr(struct addrinfo *addr, bool *in_progress, | |
11663b55 | 276 | ConnectState *connect_state, Error **errp); |
233aa5c2 OW |
277 | |
278 | static void wait_for_connect(void *opaque) | |
d247d25f | 279 | { |
233aa5c2 OW |
280 | ConnectState *s = opaque; |
281 | int val = 0, rc = 0; | |
282 | socklen_t valsize = sizeof(val); | |
283 | bool in_progress; | |
51795029 | 284 | Error *err = NULL; |
233aa5c2 | 285 | |
82e1cc4b | 286 | qemu_set_fd_handler(s->fd, NULL, NULL, NULL); |
233aa5c2 OW |
287 | |
288 | do { | |
9957fc7f | 289 | rc = qemu_getsockopt(s->fd, SOL_SOCKET, SO_ERROR, &val, &valsize); |
b16a44e1 | 290 | } while (rc == -1 && errno == EINTR); |
233aa5c2 OW |
291 | |
292 | /* update rc to contain error */ | |
293 | if (!rc && val) { | |
294 | rc = -1; | |
51795029 | 295 | errno = val; |
233aa5c2 OW |
296 | } |
297 | ||
298 | /* connect error */ | |
299 | if (rc < 0) { | |
51795029 | 300 | error_setg_errno(&err, errno, "Error connecting to socket"); |
233aa5c2 OW |
301 | closesocket(s->fd); |
302 | s->fd = rc; | |
303 | } | |
304 | ||
305 | /* try to connect to the next address on the list */ | |
1fc05adf PB |
306 | if (s->current_addr) { |
307 | while (s->current_addr->ai_next != NULL && s->fd < 0) { | |
308 | s->current_addr = s->current_addr->ai_next; | |
11663b55 | 309 | s->fd = inet_connect_addr(s->current_addr, &in_progress, s, NULL); |
51795029 CM |
310 | if (s->fd < 0) { |
311 | error_free(err); | |
312 | err = NULL; | |
313 | error_setg_errno(&err, errno, "Unable to start socket connect"); | |
314 | } | |
1fc05adf PB |
315 | /* connect in progress */ |
316 | if (in_progress) { | |
51795029 | 317 | goto out; |
1fc05adf | 318 | } |
233aa5c2 | 319 | } |
1fc05adf PB |
320 | |
321 | freeaddrinfo(s->addr_list); | |
233aa5c2 | 322 | } |
05bc1d8a | 323 | |
233aa5c2 | 324 | if (s->callback) { |
51795029 | 325 | s->callback(s->fd, err, s->opaque); |
05bc1d8a | 326 | } |
233aa5c2 | 327 | g_free(s); |
51795029 CM |
328 | out: |
329 | error_free(err); | |
233aa5c2 OW |
330 | } |
331 | ||
332 | static int inet_connect_addr(struct addrinfo *addr, bool *in_progress, | |
11663b55 | 333 | ConnectState *connect_state, Error **errp) |
233aa5c2 OW |
334 | { |
335 | int sock, rc; | |
336 | ||
337 | *in_progress = false; | |
05bc1d8a MT |
338 | |
339 | sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol); | |
340 | if (sock < 0) { | |
235256a2 | 341 | error_setg_errno(errp, errno, "Failed to create socket"); |
05bc1d8a MT |
342 | return -1; |
343 | } | |
04fd1c78 | 344 | socket_set_fast_reuse(sock); |
233aa5c2 | 345 | if (connect_state != NULL) { |
f9e8cacc | 346 | qemu_set_nonblock(sock); |
05bc1d8a MT |
347 | } |
348 | /* connect to peer */ | |
349 | do { | |
350 | rc = 0; | |
351 | if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) { | |
b16a44e1 | 352 | rc = -errno; |
05bc1d8a MT |
353 | } |
354 | } while (rc == -EINTR); | |
355 | ||
233aa5c2 OW |
356 | if (connect_state != NULL && QEMU_SOCKET_RC_INPROGRESS(rc)) { |
357 | connect_state->fd = sock; | |
82e1cc4b | 358 | qemu_set_fd_handler(sock, NULL, wait_for_connect, connect_state); |
233aa5c2 | 359 | *in_progress = true; |
05bc1d8a | 360 | } else if (rc < 0) { |
235256a2 | 361 | error_setg_errno(errp, errno, "Failed to connect socket"); |
05bc1d8a MT |
362 | closesocket(sock); |
363 | return -1; | |
364 | } | |
365 | return sock; | |
366 | } | |
367 | ||
2942e420 DB |
368 | static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr, |
369 | Error **errp) | |
05bc1d8a MT |
370 | { |
371 | struct addrinfo ai, *res; | |
372 | int rc; | |
2942e420 | 373 | Error *err = NULL; |
340849a9 | 374 | static int useV4Mapped = 1; |
d247d25f | 375 | |
05bc1d8a | 376 | memset(&ai, 0, sizeof(ai)); |
233aa5c2 | 377 | |
340849a9 DB |
378 | ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG; |
379 | if (atomic_read(&useV4Mapped)) { | |
380 | ai.ai_flags |= AI_V4MAPPED; | |
381 | } | |
2942e420 | 382 | ai.ai_family = inet_ai_family_from_address(saddr, &err); |
f4c94c7c | 383 | ai.ai_socktype = SOCK_STREAM; |
d247d25f | 384 | |
2942e420 DB |
385 | if (err) { |
386 | error_propagate(errp, err); | |
05bc1d8a | 387 | return NULL; |
d247d25f AL |
388 | } |
389 | ||
2942e420 DB |
390 | if (saddr->host == NULL || saddr->port == NULL) { |
391 | error_setg(errp, "host and/or port not specified"); | |
392 | return NULL; | |
05bc1d8a | 393 | } |
d247d25f AL |
394 | |
395 | /* lookup */ | |
2942e420 | 396 | rc = getaddrinfo(saddr->host, saddr->port, &ai, &res); |
340849a9 DB |
397 | |
398 | /* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but | |
399 | * then don't implement it in their getaddrinfo(). Detect | |
400 | * this and retry without the flag since that's preferrable | |
401 | * to a fatal error | |
402 | */ | |
403 | if (rc == EAI_BADFLAGS && | |
404 | (ai.ai_flags & AI_V4MAPPED)) { | |
405 | atomic_set(&useV4Mapped, 0); | |
406 | ai.ai_flags &= ~AI_V4MAPPED; | |
407 | rc = getaddrinfo(saddr->host, saddr->port, &ai, &res); | |
408 | } | |
05bc1d8a | 409 | if (rc != 0) { |
2942e420 DB |
410 | error_setg(errp, "address resolution failed for %s:%s: %s", |
411 | saddr->host, saddr->port, gai_strerror(rc)); | |
05bc1d8a MT |
412 | return NULL; |
413 | } | |
414 | return res; | |
415 | } | |
416 | ||
5db5f44c OW |
417 | /** |
418 | * Create a socket and connect it to an address. | |
419 | * | |
2942e420 | 420 | * @saddr: Inet socket address specification |
5db5f44c | 421 | * @errp: set on error |
233aa5c2 OW |
422 | * @callback: callback function for non-blocking connect |
423 | * @opaque: opaque for callback function | |
5db5f44c OW |
424 | * |
425 | * Returns: -1 on error, file descriptor on success. | |
233aa5c2 OW |
426 | * |
427 | * If @callback is non-null, the connect is non-blocking. If this | |
428 | * function succeeds, callback will be called when the connection | |
429 | * completes, with the file descriptor on success, or -1 on error. | |
5db5f44c | 430 | */ |
6dffc1f6 FZ |
431 | int inet_connect_saddr(InetSocketAddress *saddr, |
432 | NonBlockingConnectHandler *callback, void *opaque, | |
433 | Error **errp) | |
05bc1d8a | 434 | { |
3f9286b7 | 435 | Error *local_err = NULL; |
05bc1d8a MT |
436 | struct addrinfo *res, *e; |
437 | int sock = -1; | |
233aa5c2 OW |
438 | bool in_progress; |
439 | ConnectState *connect_state = NULL; | |
05bc1d8a | 440 | |
2942e420 | 441 | res = inet_parse_connect_saddr(saddr, errp); |
05bc1d8a MT |
442 | if (!res) { |
443 | return -1; | |
444 | } | |
445 | ||
233aa5c2 OW |
446 | if (callback != NULL) { |
447 | connect_state = g_malloc0(sizeof(*connect_state)); | |
448 | connect_state->addr_list = res; | |
449 | connect_state->callback = callback; | |
450 | connect_state->opaque = opaque; | |
d247d25f | 451 | } |
d247d25f AL |
452 | |
453 | for (e = res; e != NULL; e = e->ai_next) { | |
3f9286b7 MA |
454 | error_free(local_err); |
455 | local_err = NULL; | |
233aa5c2 OW |
456 | if (connect_state != NULL) { |
457 | connect_state->current_addr = e; | |
458 | } | |
3f9286b7 MA |
459 | sock = inet_connect_addr(e, &in_progress, connect_state, &local_err); |
460 | if (sock >= 0) { | |
05bc1d8a | 461 | break; |
a6ba35b3 | 462 | } |
d247d25f | 463 | } |
3f9286b7 MA |
464 | |
465 | if (sock < 0) { | |
466 | error_propagate(errp, local_err); | |
467 | } else if (in_progress) { | |
468 | /* wait_for_connect() will do the rest */ | |
469 | return sock; | |
470 | } else { | |
471 | if (callback) { | |
51795029 | 472 | callback(sock, NULL, opaque); |
3f9286b7 MA |
473 | } |
474 | } | |
233aa5c2 | 475 | g_free(connect_state); |
d247d25f | 476 | freeaddrinfo(res); |
05bc1d8a | 477 | return sock; |
d247d25f AL |
478 | } |
479 | ||
8b39910e DB |
480 | static int inet_dgram_saddr(InetSocketAddress *sraddr, |
481 | InetSocketAddress *sladdr, | |
482 | Error **errp) | |
7e1b35b4 GH |
483 | { |
484 | struct addrinfo ai, *peer = NULL, *local = NULL; | |
485 | const char *addr; | |
486 | const char *port; | |
7e1b35b4 | 487 | int sock = -1, rc; |
8b39910e | 488 | Error *err = NULL; |
7e1b35b4 GH |
489 | |
490 | /* lookup peer addr */ | |
491 | memset(&ai,0, sizeof(ai)); | |
3de3d698 | 492 | ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG; |
8b39910e | 493 | ai.ai_family = inet_ai_family_from_address(sraddr, &err); |
7e1b35b4 GH |
494 | ai.ai_socktype = SOCK_DGRAM; |
495 | ||
8b39910e DB |
496 | if (err) { |
497 | error_propagate(errp, err); | |
58c652c0 | 498 | goto err; |
8b39910e DB |
499 | } |
500 | ||
501 | addr = sraddr->host; | |
502 | port = sraddr->port; | |
7e1b35b4 GH |
503 | if (addr == NULL || strlen(addr) == 0) { |
504 | addr = "localhost"; | |
505 | } | |
506 | if (port == NULL || strlen(port) == 0) { | |
4f085c82 | 507 | error_setg(errp, "remote port not specified"); |
58c652c0 | 508 | goto err; |
7e1b35b4 GH |
509 | } |
510 | ||
9cd1883c | 511 | if ((rc = getaddrinfo(addr, port, &ai, &peer)) != 0) { |
4f085c82 PB |
512 | error_setg(errp, "address resolution failed for %s:%s: %s", addr, port, |
513 | gai_strerror(rc)); | |
26015051 | 514 | goto err; |
7e1b35b4 | 515 | } |
7e1b35b4 GH |
516 | |
517 | /* lookup local addr */ | |
518 | memset(&ai,0, sizeof(ai)); | |
519 | ai.ai_flags = AI_PASSIVE; | |
520 | ai.ai_family = peer->ai_family; | |
521 | ai.ai_socktype = SOCK_DGRAM; | |
522 | ||
8b39910e DB |
523 | if (sladdr) { |
524 | addr = sladdr->host; | |
525 | port = sladdr->port; | |
526 | if (addr == NULL || strlen(addr) == 0) { | |
527 | addr = NULL; | |
528 | } | |
529 | if (!port || strlen(port) == 0) { | |
530 | port = "0"; | |
531 | } | |
532 | } else { | |
7e1b35b4 | 533 | addr = NULL; |
7e1b35b4 | 534 | port = "0"; |
8b39910e | 535 | } |
7e1b35b4 | 536 | |
9cd1883c | 537 | if ((rc = getaddrinfo(addr, port, &ai, &local)) != 0) { |
4f085c82 PB |
538 | error_setg(errp, "address resolution failed for %s:%s: %s", addr, port, |
539 | gai_strerror(rc)); | |
39b38459 | 540 | goto err; |
7e1b35b4 | 541 | } |
7e1b35b4 GH |
542 | |
543 | /* create socket */ | |
40ff6d7e | 544 | sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol); |
7e1b35b4 | 545 | if (sock < 0) { |
235256a2 | 546 | error_setg_errno(errp, errno, "Failed to create socket"); |
7e1b35b4 GH |
547 | goto err; |
548 | } | |
04fd1c78 | 549 | socket_set_fast_reuse(sock); |
7e1b35b4 GH |
550 | |
551 | /* bind socket */ | |
7e1b35b4 | 552 | if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) { |
235256a2 | 553 | error_setg_errno(errp, errno, "Failed to bind socket"); |
7e1b35b4 GH |
554 | goto err; |
555 | } | |
556 | ||
557 | /* connect to peer */ | |
7e1b35b4 | 558 | if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) { |
235256a2 | 559 | error_setg_errno(errp, errno, "Failed to connect socket"); |
7e1b35b4 GH |
560 | goto err; |
561 | } | |
562 | ||
563 | freeaddrinfo(local); | |
564 | freeaddrinfo(peer); | |
565 | return sock; | |
566 | ||
567 | err: | |
26015051 | 568 | if (sock != -1) { |
7e1b35b4 | 569 | closesocket(sock); |
26015051 C |
570 | } |
571 | if (local) { | |
7e1b35b4 | 572 | freeaddrinfo(local); |
26015051 C |
573 | } |
574 | if (peer) { | |
7e1b35b4 | 575 | freeaddrinfo(peer); |
26015051 C |
576 | } |
577 | ||
7e1b35b4 GH |
578 | return -1; |
579 | } | |
580 | ||
f4c94c7c | 581 | /* compatibility wrapper */ |
0785bd7a | 582 | int inet_parse(InetSocketAddress *addr, const char *str, Error **errp) |
f4c94c7c GH |
583 | { |
584 | const char *optstr, *h; | |
55a10996 | 585 | char host[65]; |
f4c94c7c | 586 | char port[33]; |
879e45c7 | 587 | int to; |
f4c94c7c GH |
588 | int pos; |
589 | ||
0785bd7a | 590 | memset(addr, 0, sizeof(*addr)); |
879e45c7 | 591 | |
f4c94c7c GH |
592 | /* parse address */ |
593 | if (str[0] == ':') { | |
594 | /* no host given */ | |
879e45c7 | 595 | host[0] = '\0'; |
9cd1883c | 596 | if (sscanf(str, ":%32[^,]%n", port, &pos) != 1) { |
2f002c43 | 597 | error_setg(errp, "error parsing port in address '%s'", str); |
0785bd7a | 598 | return -1; |
f4c94c7c GH |
599 | } |
600 | } else if (str[0] == '[') { | |
601 | /* IPv6 addr */ | |
9cd1883c | 602 | if (sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos) != 2) { |
2f002c43 | 603 | error_setg(errp, "error parsing IPv6 address '%s'", str); |
0785bd7a | 604 | return -1; |
f4c94c7c | 605 | } |
879e45c7 | 606 | addr->ipv6 = addr->has_ipv6 = true; |
f4c94c7c | 607 | } else { |
391b7b97 | 608 | /* hostname or IPv4 addr */ |
9cd1883c | 609 | if (sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos) != 2) { |
2f002c43 | 610 | error_setg(errp, "error parsing address '%s'", str); |
0785bd7a | 611 | return -1; |
f4c94c7c | 612 | } |
391b7b97 JT |
613 | if (host[strspn(host, "0123456789.")] == '\0') { |
614 | addr->ipv4 = addr->has_ipv4 = true; | |
615 | } | |
f4c94c7c | 616 | } |
879e45c7 PB |
617 | |
618 | addr->host = g_strdup(host); | |
619 | addr->port = g_strdup(port); | |
f4c94c7c GH |
620 | |
621 | /* parse options */ | |
622 | optstr = str + pos; | |
623 | h = strstr(optstr, ",to="); | |
879e45c7 | 624 | if (h) { |
1ccbc285 AP |
625 | h += 4; |
626 | if (sscanf(h, "%d%n", &to, &pos) != 1 || | |
627 | (h[pos] != '\0' && h[pos] != ',')) { | |
879e45c7 | 628 | error_setg(errp, "error parsing to= argument"); |
0785bd7a | 629 | return -1; |
879e45c7 PB |
630 | } |
631 | addr->has_to = true; | |
632 | addr->to = to; | |
633 | } | |
634 | if (strstr(optstr, ",ipv4")) { | |
635 | addr->ipv4 = addr->has_ipv4 = true; | |
636 | } | |
637 | if (strstr(optstr, ",ipv6")) { | |
638 | addr->ipv6 = addr->has_ipv6 = true; | |
639 | } | |
0785bd7a | 640 | return 0; |
879e45c7 PB |
641 | } |
642 | ||
e5bc776f | 643 | |
5db5f44c OW |
644 | /** |
645 | * Create a blocking socket and connect it to an address. | |
646 | * | |
647 | * @str: address string | |
648 | * @errp: set in case of an error | |
649 | * | |
650 | * Returns -1 in case of error, file descriptor on success | |
651 | **/ | |
652 | int inet_connect(const char *str, Error **errp) | |
f4c94c7c | 653 | { |
f4c94c7c | 654 | int sock = -1; |
0785bd7a | 655 | InetSocketAddress *addr = g_new(InetSocketAddress, 1); |
f4c94c7c | 656 | |
0785bd7a | 657 | if (!inet_parse(addr, str, errp)) { |
6dffc1f6 | 658 | sock = inet_connect_saddr(addr, NULL, NULL, errp); |
5db5f44c | 659 | } |
0785bd7a | 660 | qapi_free_InetSocketAddress(addr); |
5db5f44c OW |
661 | return sock; |
662 | } | |
663 | ||
6a02c806 SH |
664 | #ifdef CONFIG_AF_VSOCK |
665 | static bool vsock_parse_vaddr_to_sockaddr(const VsockSocketAddress *vaddr, | |
666 | struct sockaddr_vm *svm, | |
667 | Error **errp) | |
668 | { | |
669 | unsigned long long val; | |
670 | ||
671 | memset(svm, 0, sizeof(*svm)); | |
672 | svm->svm_family = AF_VSOCK; | |
673 | ||
674 | if (parse_uint_full(vaddr->cid, &val, 10) < 0 || | |
675 | val > UINT32_MAX) { | |
676 | error_setg(errp, "Failed to parse cid '%s'", vaddr->cid); | |
677 | return false; | |
678 | } | |
679 | svm->svm_cid = val; | |
680 | ||
681 | if (parse_uint_full(vaddr->port, &val, 10) < 0 || | |
682 | val > UINT32_MAX) { | |
683 | error_setg(errp, "Failed to parse port '%s'", vaddr->port); | |
684 | return false; | |
685 | } | |
686 | svm->svm_port = val; | |
687 | ||
688 | return true; | |
689 | } | |
690 | ||
691 | static int vsock_connect_addr(const struct sockaddr_vm *svm, bool *in_progress, | |
692 | ConnectState *connect_state, Error **errp) | |
693 | { | |
694 | int sock, rc; | |
695 | ||
696 | *in_progress = false; | |
697 | ||
698 | sock = qemu_socket(AF_VSOCK, SOCK_STREAM, 0); | |
699 | if (sock < 0) { | |
700 | error_setg_errno(errp, errno, "Failed to create socket"); | |
701 | return -1; | |
702 | } | |
703 | if (connect_state != NULL) { | |
704 | qemu_set_nonblock(sock); | |
705 | } | |
706 | /* connect to peer */ | |
707 | do { | |
708 | rc = 0; | |
709 | if (connect(sock, (const struct sockaddr *)svm, sizeof(*svm)) < 0) { | |
710 | rc = -errno; | |
711 | } | |
712 | } while (rc == -EINTR); | |
713 | ||
714 | if (connect_state != NULL && QEMU_SOCKET_RC_INPROGRESS(rc)) { | |
715 | connect_state->fd = sock; | |
716 | qemu_set_fd_handler(sock, NULL, wait_for_connect, connect_state); | |
717 | *in_progress = true; | |
718 | } else if (rc < 0) { | |
719 | error_setg_errno(errp, errno, "Failed to connect socket"); | |
720 | closesocket(sock); | |
721 | return -1; | |
722 | } | |
723 | return sock; | |
724 | } | |
725 | ||
1a9a7f25 | 726 | static int vsock_connect_saddr(VsockSocketAddress *vaddr, |
6a02c806 | 727 | NonBlockingConnectHandler *callback, |
1a9a7f25 FZ |
728 | void *opaque, |
729 | Error **errp) | |
6a02c806 SH |
730 | { |
731 | struct sockaddr_vm svm; | |
732 | int sock = -1; | |
733 | bool in_progress; | |
734 | ConnectState *connect_state = NULL; | |
735 | ||
736 | if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) { | |
737 | return -1; | |
738 | } | |
739 | ||
740 | if (callback != NULL) { | |
741 | connect_state = g_malloc0(sizeof(*connect_state)); | |
742 | connect_state->callback = callback; | |
743 | connect_state->opaque = opaque; | |
744 | } | |
745 | ||
746 | sock = vsock_connect_addr(&svm, &in_progress, connect_state, errp); | |
747 | if (sock < 0) { | |
748 | /* do nothing */ | |
749 | } else if (in_progress) { | |
750 | /* wait_for_connect() will do the rest */ | |
751 | return sock; | |
752 | } else { | |
753 | if (callback) { | |
754 | callback(sock, NULL, opaque); | |
755 | } | |
756 | } | |
757 | g_free(connect_state); | |
758 | return sock; | |
759 | } | |
760 | ||
761 | static int vsock_listen_saddr(VsockSocketAddress *vaddr, | |
762 | Error **errp) | |
763 | { | |
764 | struct sockaddr_vm svm; | |
765 | int slisten; | |
766 | ||
767 | if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) { | |
768 | return -1; | |
769 | } | |
770 | ||
771 | slisten = qemu_socket(AF_VSOCK, SOCK_STREAM, 0); | |
772 | if (slisten < 0) { | |
773 | error_setg_errno(errp, errno, "Failed to create socket"); | |
774 | return -1; | |
775 | } | |
776 | ||
777 | if (bind(slisten, (const struct sockaddr *)&svm, sizeof(svm)) != 0) { | |
778 | error_setg_errno(errp, errno, "Failed to bind socket"); | |
779 | closesocket(slisten); | |
780 | return -1; | |
781 | } | |
782 | ||
783 | if (listen(slisten, 1) != 0) { | |
784 | error_setg_errno(errp, errno, "Failed to listen on socket"); | |
785 | closesocket(slisten); | |
786 | return -1; | |
787 | } | |
788 | return slisten; | |
789 | } | |
790 | ||
4db5c619 MA |
791 | static int vsock_parse(VsockSocketAddress *addr, const char *str, |
792 | Error **errp) | |
6a02c806 | 793 | { |
6a02c806 SH |
794 | char cid[33]; |
795 | char port[33]; | |
796 | int n; | |
797 | ||
798 | if (sscanf(str, "%32[^:]:%32[^,]%n", cid, port, &n) != 2) { | |
799 | error_setg(errp, "error parsing address '%s'", str); | |
4db5c619 | 800 | return -1; |
6a02c806 SH |
801 | } |
802 | if (str[n] != '\0') { | |
803 | error_setg(errp, "trailing characters in address '%s'", str); | |
4db5c619 | 804 | return -1; |
6a02c806 SH |
805 | } |
806 | ||
6a02c806 SH |
807 | addr->cid = g_strdup(cid); |
808 | addr->port = g_strdup(port); | |
4db5c619 | 809 | return 0; |
6a02c806 SH |
810 | } |
811 | #else | |
812 | static void vsock_unsupported(Error **errp) | |
813 | { | |
814 | error_setg(errp, "socket family AF_VSOCK unsupported"); | |
815 | } | |
816 | ||
1a9a7f25 | 817 | static int vsock_connect_saddr(VsockSocketAddress *vaddr, |
6a02c806 | 818 | NonBlockingConnectHandler *callback, |
1a9a7f25 | 819 | void *opaque, Error **errp) |
6a02c806 SH |
820 | { |
821 | vsock_unsupported(errp); | |
822 | return -1; | |
823 | } | |
824 | ||
825 | static int vsock_listen_saddr(VsockSocketAddress *vaddr, | |
826 | Error **errp) | |
827 | { | |
828 | vsock_unsupported(errp); | |
829 | return -1; | |
830 | } | |
831 | ||
4db5c619 MA |
832 | static int vsock_parse(VsockSocketAddress *addr, const char *str, |
833 | Error **errp) | |
6a02c806 SH |
834 | { |
835 | vsock_unsupported(errp); | |
4db5c619 | 836 | return -1; |
6a02c806 SH |
837 | } |
838 | #endif /* CONFIG_AF_VSOCK */ | |
839 | ||
d247d25f AL |
840 | #ifndef _WIN32 |
841 | ||
1856835d DB |
842 | static int unix_listen_saddr(UnixSocketAddress *saddr, |
843 | bool update_addr, | |
844 | Error **errp) | |
d247d25f AL |
845 | { |
846 | struct sockaddr_un un; | |
62b6adfb | 847 | int sock, fd; |
ad9579aa DB |
848 | char *pathbuf = NULL; |
849 | const char *path; | |
d247d25f | 850 | |
40ff6d7e | 851 | sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0); |
d247d25f | 852 | if (sock < 0) { |
b658c53d | 853 | error_setg_errno(errp, errno, "Failed to create Unix socket"); |
39b6efc8 | 854 | return -1; |
d247d25f AL |
855 | } |
856 | ||
ad9579aa DB |
857 | if (saddr->path && saddr->path[0]) { |
858 | path = saddr->path; | |
d247d25f | 859 | } else { |
b658c53d PB |
860 | const char *tmpdir = getenv("TMPDIR"); |
861 | tmpdir = tmpdir ? tmpdir : "/tmp"; | |
ad9579aa DB |
862 | path = pathbuf = g_strdup_printf("%s/qemu-socket-XXXXXX", tmpdir); |
863 | } | |
b658c53d | 864 | |
ad9579aa DB |
865 | if (strlen(path) > sizeof(un.sun_path)) { |
866 | error_setg(errp, "UNIX socket path '%s' is too long", path); | |
867 | error_append_hint(errp, "Path must be less than %zu bytes\n", | |
868 | sizeof(un.sun_path)); | |
869 | goto err; | |
870 | } | |
871 | ||
872 | if (pathbuf != NULL) { | |
d247d25f AL |
873 | /* |
874 | * This dummy fd usage silences the mktemp() unsecure warning. | |
875 | * Using mkstemp() doesn't make things more secure here | |
876 | * though. bind() complains about existing files, so we have | |
877 | * to unlink first and thus re-open the race window. The | |
878 | * worst case possible is bind() failing, i.e. a DoS attack. | |
879 | */ | |
ad9579aa | 880 | fd = mkstemp(pathbuf); |
b658c53d PB |
881 | if (fd < 0) { |
882 | error_setg_errno(errp, errno, | |
ad9579aa | 883 | "Failed to make a temporary socket %s", pathbuf); |
b658c53d PB |
884 | goto err; |
885 | } | |
886 | close(fd); | |
d247d25f | 887 | } |
d247d25f | 888 | |
ad9579aa | 889 | if (unlink(path) < 0 && errno != ENOENT) { |
0ef705a2 | 890 | error_setg_errno(errp, errno, |
ad9579aa | 891 | "Failed to unlink socket %s", path); |
0ef705a2 CR |
892 | goto err; |
893 | } | |
ad9579aa DB |
894 | |
895 | memset(&un, 0, sizeof(un)); | |
896 | un.sun_family = AF_UNIX; | |
897 | strncpy(un.sun_path, path, sizeof(un.sun_path)); | |
898 | ||
d247d25f | 899 | if (bind(sock, (struct sockaddr*) &un, sizeof(un)) < 0) { |
b658c53d | 900 | error_setg_errno(errp, errno, "Failed to bind socket to %s", un.sun_path); |
d247d25f AL |
901 | goto err; |
902 | } | |
903 | if (listen(sock, 1) < 0) { | |
235256a2 | 904 | error_setg_errno(errp, errno, "Failed to listen on socket"); |
d247d25f AL |
905 | goto err; |
906 | } | |
907 | ||
ad9579aa DB |
908 | if (update_addr && pathbuf) { |
909 | g_free(saddr->path); | |
910 | saddr->path = pathbuf; | |
911 | } else { | |
912 | g_free(pathbuf); | |
913 | } | |
d247d25f AL |
914 | return sock; |
915 | ||
916 | err: | |
ad9579aa | 917 | g_free(pathbuf); |
d247d25f AL |
918 | closesocket(sock); |
919 | return -1; | |
920 | } | |
921 | ||
2bdc6791 FZ |
922 | static int unix_connect_saddr(UnixSocketAddress *saddr, |
923 | NonBlockingConnectHandler *callback, void *opaque, | |
924 | Error **errp) | |
d247d25f AL |
925 | { |
926 | struct sockaddr_un un; | |
1fc05adf PB |
927 | ConnectState *connect_state = NULL; |
928 | int sock, rc; | |
d247d25f | 929 | |
2942e420 | 930 | if (saddr->path == NULL) { |
312fd5f2 | 931 | error_setg(errp, "unix connect: no path specified"); |
2af2bf67 GH |
932 | return -1; |
933 | } | |
934 | ||
40ff6d7e | 935 | sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0); |
d247d25f | 936 | if (sock < 0) { |
235256a2 | 937 | error_setg_errno(errp, errno, "Failed to create socket"); |
39b6efc8 | 938 | return -1; |
d247d25f | 939 | } |
1fc05adf PB |
940 | if (callback != NULL) { |
941 | connect_state = g_malloc0(sizeof(*connect_state)); | |
942 | connect_state->callback = callback; | |
943 | connect_state->opaque = opaque; | |
f9e8cacc | 944 | qemu_set_nonblock(sock); |
1fc05adf | 945 | } |
d247d25f | 946 | |
ad9579aa DB |
947 | if (strlen(saddr->path) > sizeof(un.sun_path)) { |
948 | error_setg(errp, "UNIX socket path '%s' is too long", saddr->path); | |
949 | error_append_hint(errp, "Path must be less than %zu bytes\n", | |
950 | sizeof(un.sun_path)); | |
951 | goto err; | |
952 | } | |
953 | ||
d247d25f AL |
954 | memset(&un, 0, sizeof(un)); |
955 | un.sun_family = AF_UNIX; | |
ad9579aa | 956 | strncpy(un.sun_path, saddr->path, sizeof(un.sun_path)); |
1fc05adf PB |
957 | |
958 | /* connect to peer */ | |
959 | do { | |
960 | rc = 0; | |
961 | if (connect(sock, (struct sockaddr *) &un, sizeof(un)) < 0) { | |
b16a44e1 | 962 | rc = -errno; |
1fc05adf PB |
963 | } |
964 | } while (rc == -EINTR); | |
965 | ||
966 | if (connect_state != NULL && QEMU_SOCKET_RC_INPROGRESS(rc)) { | |
967 | connect_state->fd = sock; | |
82e1cc4b | 968 | qemu_set_fd_handler(sock, NULL, wait_for_connect, connect_state); |
1fc05adf PB |
969 | return sock; |
970 | } else if (rc >= 0) { | |
971 | /* non blocking socket immediate success, call callback */ | |
972 | if (callback != NULL) { | |
51795029 | 973 | callback(sock, NULL, opaque); |
1fc05adf PB |
974 | } |
975 | } | |
976 | ||
977 | if (rc < 0) { | |
ad9579aa DB |
978 | error_setg_errno(errp, -rc, "Failed to connect socket %s", |
979 | saddr->path); | |
980 | goto err; | |
d247d25f AL |
981 | } |
982 | ||
1fc05adf | 983 | g_free(connect_state); |
d247d25f | 984 | return sock; |
ad9579aa DB |
985 | |
986 | err: | |
987 | close(sock); | |
988 | g_free(connect_state); | |
989 | return -1; | |
d247d25f AL |
990 | } |
991 | ||
0c814709 PB |
992 | #else |
993 | ||
1856835d DB |
994 | static int unix_listen_saddr(UnixSocketAddress *saddr, |
995 | bool update_addr, | |
996 | Error **errp) | |
0c814709 | 997 | { |
58899664 | 998 | error_setg(errp, "unix sockets are not available on windows"); |
0c814709 PB |
999 | errno = ENOTSUP; |
1000 | return -1; | |
1001 | } | |
1002 | ||
2bdc6791 FZ |
1003 | static int unix_connect_saddr(UnixSocketAddress *saddr, |
1004 | NonBlockingConnectHandler *callback, void *opaque, | |
1005 | Error **errp) | |
0c814709 | 1006 | { |
58899664 | 1007 | error_setg(errp, "unix sockets are not available on windows"); |
0c814709 PB |
1008 | errno = ENOTSUP; |
1009 | return -1; | |
1010 | } | |
1011 | #endif | |
1012 | ||
2af2bf67 | 1013 | /* compatibility wrapper */ |
7fc4e63e | 1014 | int unix_listen(const char *str, char *ostr, int olen, Error **errp) |
62b6adfb | 1015 | { |
62b6adfb GH |
1016 | char *path, *optstr; |
1017 | int sock, len; | |
1856835d | 1018 | UnixSocketAddress *saddr; |
62b6adfb | 1019 | |
1856835d | 1020 | saddr = g_new0(UnixSocketAddress, 1); |
62b6adfb GH |
1021 | |
1022 | optstr = strchr(str, ','); | |
1023 | if (optstr) { | |
1024 | len = optstr - str; | |
1025 | if (len) { | |
7267c094 | 1026 | path = g_malloc(len+1); |
62b6adfb | 1027 | snprintf(path, len+1, "%.*s", len, str); |
1856835d | 1028 | saddr->path = path; |
62b6adfb GH |
1029 | } |
1030 | } else { | |
1856835d | 1031 | saddr->path = g_strdup(str); |
62b6adfb GH |
1032 | } |
1033 | ||
1856835d | 1034 | sock = unix_listen_saddr(saddr, true, errp); |
62b6adfb | 1035 | |
26015051 | 1036 | if (sock != -1 && ostr) { |
1856835d | 1037 | snprintf(ostr, olen, "%s%s", saddr->path, optstr ? optstr : ""); |
26015051 C |
1038 | } |
1039 | ||
1856835d | 1040 | qapi_free_UnixSocketAddress(saddr); |
62b6adfb GH |
1041 | return sock; |
1042 | } | |
1043 | ||
7fc4e63e | 1044 | int unix_connect(const char *path, Error **errp) |
2af2bf67 | 1045 | { |
2942e420 | 1046 | UnixSocketAddress *saddr; |
2af2bf67 GH |
1047 | int sock; |
1048 | ||
2942e420 DB |
1049 | saddr = g_new0(UnixSocketAddress, 1); |
1050 | saddr->path = g_strdup(path); | |
2bdc6791 | 1051 | sock = unix_connect_saddr(saddr, NULL, NULL, errp); |
2942e420 | 1052 | qapi_free_UnixSocketAddress(saddr); |
1fc05adf PB |
1053 | return sock; |
1054 | } | |
1055 | ||
1056 | ||
bd269ebc | 1057 | SocketAddress *socket_parse(const char *str, Error **errp) |
101f9cbc | 1058 | { |
bd269ebc | 1059 | SocketAddress *addr; |
101f9cbc | 1060 | |
bd269ebc | 1061 | addr = g_new0(SocketAddress, 1); |
101f9cbc PB |
1062 | if (strstart(str, "unix:", NULL)) { |
1063 | if (str[5] == '\0') { | |
312fd5f2 | 1064 | error_setg(errp, "invalid Unix socket address"); |
101f9cbc PB |
1065 | goto fail; |
1066 | } else { | |
bd269ebc MA |
1067 | addr->type = SOCKET_ADDRESS_TYPE_UNIX; |
1068 | addr->u.q_unix.path = g_strdup(str + 5); | |
101f9cbc PB |
1069 | } |
1070 | } else if (strstart(str, "fd:", NULL)) { | |
1071 | if (str[3] == '\0') { | |
312fd5f2 | 1072 | error_setg(errp, "invalid file descriptor address"); |
101f9cbc PB |
1073 | goto fail; |
1074 | } else { | |
bd269ebc MA |
1075 | addr->type = SOCKET_ADDRESS_TYPE_FD; |
1076 | addr->u.fd.str = g_strdup(str + 3); | |
101f9cbc | 1077 | } |
6a02c806 | 1078 | } else if (strstart(str, "vsock:", NULL)) { |
bd269ebc MA |
1079 | addr->type = SOCKET_ADDRESS_TYPE_VSOCK; |
1080 | if (vsock_parse(&addr->u.vsock, str + strlen("vsock:"), errp)) { | |
6a02c806 SH |
1081 | goto fail; |
1082 | } | |
101f9cbc | 1083 | } else { |
bd269ebc MA |
1084 | addr->type = SOCKET_ADDRESS_TYPE_INET; |
1085 | if (inet_parse(&addr->u.inet, str, errp)) { | |
101f9cbc PB |
1086 | goto fail; |
1087 | } | |
1088 | } | |
1089 | return addr; | |
1090 | ||
1091 | fail: | |
bd269ebc | 1092 | qapi_free_SocketAddress(addr); |
101f9cbc PB |
1093 | return NULL; |
1094 | } | |
1095 | ||
bd269ebc | 1096 | int socket_connect(SocketAddress *addr, NonBlockingConnectHandler *callback, |
226799ce | 1097 | void *opaque, Error **errp) |
101f9cbc | 1098 | { |
101f9cbc PB |
1099 | int fd; |
1100 | ||
2d32adda | 1101 | switch (addr->type) { |
bd269ebc MA |
1102 | case SOCKET_ADDRESS_TYPE_INET: |
1103 | fd = inet_connect_saddr(&addr->u.inet, callback, opaque, errp); | |
101f9cbc PB |
1104 | break; |
1105 | ||
bd269ebc MA |
1106 | case SOCKET_ADDRESS_TYPE_UNIX: |
1107 | fd = unix_connect_saddr(&addr->u.q_unix, callback, opaque, errp); | |
101f9cbc PB |
1108 | break; |
1109 | ||
bd269ebc MA |
1110 | case SOCKET_ADDRESS_TYPE_FD: |
1111 | fd = monitor_get_fd(cur_mon, addr->u.fd.str, errp); | |
d1ec72a4 | 1112 | if (fd >= 0 && callback) { |
1a751ebf | 1113 | qemu_set_nonblock(fd); |
51795029 | 1114 | callback(fd, NULL, opaque); |
101f9cbc PB |
1115 | } |
1116 | break; | |
1117 | ||
bd269ebc MA |
1118 | case SOCKET_ADDRESS_TYPE_VSOCK: |
1119 | fd = vsock_connect_saddr(&addr->u.vsock, callback, opaque, errp); | |
6a02c806 SH |
1120 | break; |
1121 | ||
101f9cbc PB |
1122 | default: |
1123 | abort(); | |
1124 | } | |
101f9cbc PB |
1125 | return fd; |
1126 | } | |
1127 | ||
bd269ebc | 1128 | int socket_listen(SocketAddress *addr, Error **errp) |
101f9cbc | 1129 | { |
101f9cbc PB |
1130 | int fd; |
1131 | ||
2d32adda | 1132 | switch (addr->type) { |
bd269ebc MA |
1133 | case SOCKET_ADDRESS_TYPE_INET: |
1134 | fd = inet_listen_saddr(&addr->u.inet, 0, false, errp); | |
101f9cbc PB |
1135 | break; |
1136 | ||
bd269ebc MA |
1137 | case SOCKET_ADDRESS_TYPE_UNIX: |
1138 | fd = unix_listen_saddr(&addr->u.q_unix, false, errp); | |
101f9cbc PB |
1139 | break; |
1140 | ||
bd269ebc MA |
1141 | case SOCKET_ADDRESS_TYPE_FD: |
1142 | fd = monitor_get_fd(cur_mon, addr->u.fd.str, errp); | |
101f9cbc PB |
1143 | break; |
1144 | ||
bd269ebc MA |
1145 | case SOCKET_ADDRESS_TYPE_VSOCK: |
1146 | fd = vsock_listen_saddr(&addr->u.vsock, errp); | |
6a02c806 SH |
1147 | break; |
1148 | ||
101f9cbc PB |
1149 | default: |
1150 | abort(); | |
1151 | } | |
101f9cbc PB |
1152 | return fd; |
1153 | } | |
1154 | ||
74b6ce43 MAL |
1155 | void socket_listen_cleanup(int fd, Error **errp) |
1156 | { | |
bd269ebc | 1157 | SocketAddress *addr; |
74b6ce43 MAL |
1158 | |
1159 | addr = socket_local_address(fd, errp); | |
1160 | ||
bd269ebc MA |
1161 | if (addr->type == SOCKET_ADDRESS_TYPE_UNIX |
1162 | && addr->u.q_unix.path) { | |
1163 | if (unlink(addr->u.q_unix.path) < 0 && errno != ENOENT) { | |
74b6ce43 MAL |
1164 | error_setg_errno(errp, errno, |
1165 | "Failed to unlink socket %s", | |
bd269ebc | 1166 | addr->u.q_unix.path); |
74b6ce43 MAL |
1167 | } |
1168 | } | |
1169 | ||
bd269ebc | 1170 | qapi_free_SocketAddress(addr); |
74b6ce43 MAL |
1171 | } |
1172 | ||
bd269ebc | 1173 | int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp) |
3ecc059d | 1174 | { |
3ecc059d GH |
1175 | int fd; |
1176 | ||
ca0b64e5 | 1177 | /* |
bd269ebc | 1178 | * TODO SOCKET_ADDRESS_TYPE_FD when fd is AF_INET or AF_INET6 |
ca0b64e5 MA |
1179 | * (although other address families can do SOCK_DGRAM, too) |
1180 | */ | |
2d32adda | 1181 | switch (remote->type) { |
bd269ebc MA |
1182 | case SOCKET_ADDRESS_TYPE_INET: |
1183 | fd = inet_dgram_saddr(&remote->u.inet, | |
1184 | local ? &local->u.inet : NULL, errp); | |
3ecc059d GH |
1185 | break; |
1186 | ||
1187 | default: | |
1188 | error_setg(errp, "socket type unsupported for datagram"); | |
7a5b6af1 | 1189 | fd = -1; |
3ecc059d | 1190 | } |
3ecc059d GH |
1191 | return fd; |
1192 | } | |
17c55dec DB |
1193 | |
1194 | ||
bd269ebc | 1195 | static SocketAddress * |
17c55dec DB |
1196 | socket_sockaddr_to_address_inet(struct sockaddr_storage *sa, |
1197 | socklen_t salen, | |
1198 | Error **errp) | |
1199 | { | |
1200 | char host[NI_MAXHOST]; | |
1201 | char serv[NI_MAXSERV]; | |
bd269ebc | 1202 | SocketAddress *addr; |
0399293e | 1203 | InetSocketAddress *inet; |
17c55dec DB |
1204 | int ret; |
1205 | ||
1206 | ret = getnameinfo((struct sockaddr *)sa, salen, | |
1207 | host, sizeof(host), | |
1208 | serv, sizeof(serv), | |
1209 | NI_NUMERICHOST | NI_NUMERICSERV); | |
1210 | if (ret != 0) { | |
1211 | error_setg(errp, "Cannot format numeric socket address: %s", | |
1212 | gai_strerror(ret)); | |
1213 | return NULL; | |
1214 | } | |
1215 | ||
bd269ebc MA |
1216 | addr = g_new0(SocketAddress, 1); |
1217 | addr->type = SOCKET_ADDRESS_TYPE_INET; | |
1218 | inet = &addr->u.inet; | |
0399293e EB |
1219 | inet->host = g_strdup(host); |
1220 | inet->port = g_strdup(serv); | |
17c55dec | 1221 | if (sa->ss_family == AF_INET) { |
0399293e | 1222 | inet->has_ipv4 = inet->ipv4 = true; |
17c55dec | 1223 | } else { |
0399293e | 1224 | inet->has_ipv6 = inet->ipv6 = true; |
17c55dec DB |
1225 | } |
1226 | ||
1227 | return addr; | |
1228 | } | |
1229 | ||
1230 | ||
1231 | #ifndef WIN32 | |
bd269ebc | 1232 | static SocketAddress * |
17c55dec DB |
1233 | socket_sockaddr_to_address_unix(struct sockaddr_storage *sa, |
1234 | socklen_t salen, | |
1235 | Error **errp) | |
1236 | { | |
bd269ebc | 1237 | SocketAddress *addr; |
17c55dec DB |
1238 | struct sockaddr_un *su = (struct sockaddr_un *)sa; |
1239 | ||
bd269ebc MA |
1240 | addr = g_new0(SocketAddress, 1); |
1241 | addr->type = SOCKET_ADDRESS_TYPE_UNIX; | |
17c55dec | 1242 | if (su->sun_path[0]) { |
bd269ebc | 1243 | addr->u.q_unix.path = g_strndup(su->sun_path, sizeof(su->sun_path)); |
17c55dec DB |
1244 | } |
1245 | ||
1246 | return addr; | |
1247 | } | |
1248 | #endif /* WIN32 */ | |
1249 | ||
6a02c806 | 1250 | #ifdef CONFIG_AF_VSOCK |
bd269ebc | 1251 | static SocketAddress * |
6a02c806 SH |
1252 | socket_sockaddr_to_address_vsock(struct sockaddr_storage *sa, |
1253 | socklen_t salen, | |
1254 | Error **errp) | |
1255 | { | |
bd269ebc | 1256 | SocketAddress *addr; |
6a02c806 SH |
1257 | VsockSocketAddress *vaddr; |
1258 | struct sockaddr_vm *svm = (struct sockaddr_vm *)sa; | |
1259 | ||
bd269ebc MA |
1260 | addr = g_new0(SocketAddress, 1); |
1261 | addr->type = SOCKET_ADDRESS_TYPE_VSOCK; | |
1262 | vaddr = &addr->u.vsock; | |
6a02c806 SH |
1263 | vaddr->cid = g_strdup_printf("%u", svm->svm_cid); |
1264 | vaddr->port = g_strdup_printf("%u", svm->svm_port); | |
1265 | ||
1266 | return addr; | |
1267 | } | |
1268 | #endif /* CONFIG_AF_VSOCK */ | |
1269 | ||
bd269ebc | 1270 | SocketAddress * |
17c55dec DB |
1271 | socket_sockaddr_to_address(struct sockaddr_storage *sa, |
1272 | socklen_t salen, | |
1273 | Error **errp) | |
1274 | { | |
1275 | switch (sa->ss_family) { | |
1276 | case AF_INET: | |
1277 | case AF_INET6: | |
1278 | return socket_sockaddr_to_address_inet(sa, salen, errp); | |
1279 | ||
1280 | #ifndef WIN32 | |
1281 | case AF_UNIX: | |
1282 | return socket_sockaddr_to_address_unix(sa, salen, errp); | |
1283 | #endif /* WIN32 */ | |
1284 | ||
6a02c806 SH |
1285 | #ifdef CONFIG_AF_VSOCK |
1286 | case AF_VSOCK: | |
1287 | return socket_sockaddr_to_address_vsock(sa, salen, errp); | |
1288 | #endif | |
1289 | ||
17c55dec DB |
1290 | default: |
1291 | error_setg(errp, "socket family %d unsupported", | |
1292 | sa->ss_family); | |
1293 | return NULL; | |
1294 | } | |
1295 | return 0; | |
1296 | } | |
1297 | ||
1298 | ||
bd269ebc | 1299 | SocketAddress *socket_local_address(int fd, Error **errp) |
17c55dec DB |
1300 | { |
1301 | struct sockaddr_storage ss; | |
1302 | socklen_t sslen = sizeof(ss); | |
1303 | ||
1304 | if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) { | |
b16a44e1 | 1305 | error_setg_errno(errp, errno, "%s", |
17c55dec DB |
1306 | "Unable to query local socket address"); |
1307 | return NULL; | |
1308 | } | |
1309 | ||
1310 | return socket_sockaddr_to_address(&ss, sslen, errp); | |
1311 | } | |
1312 | ||
1313 | ||
bd269ebc | 1314 | SocketAddress *socket_remote_address(int fd, Error **errp) |
17c55dec DB |
1315 | { |
1316 | struct sockaddr_storage ss; | |
1317 | socklen_t sslen = sizeof(ss); | |
1318 | ||
1319 | if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) { | |
b16a44e1 | 1320 | error_setg_errno(errp, errno, "%s", |
17c55dec DB |
1321 | "Unable to query remote socket address"); |
1322 | return NULL; | |
1323 | } | |
1324 | ||
1325 | return socket_sockaddr_to_address(&ss, sslen, errp); | |
1326 | } | |
2a8e21c7 | 1327 | |
bd269ebc | 1328 | char *socket_address_to_string(struct SocketAddress *addr, Error **errp) |
7e844959 AA |
1329 | { |
1330 | char *buf; | |
1331 | InetSocketAddress *inet; | |
7e844959 AA |
1332 | |
1333 | switch (addr->type) { | |
bd269ebc MA |
1334 | case SOCKET_ADDRESS_TYPE_INET: |
1335 | inet = &addr->u.inet; | |
7e844959 | 1336 | if (strchr(inet->host, ':') == NULL) { |
44fdc764 | 1337 | buf = g_strdup_printf("%s:%s", inet->host, inet->port); |
7e844959 | 1338 | } else { |
44fdc764 | 1339 | buf = g_strdup_printf("[%s]:%s", inet->host, inet->port); |
7e844959 AA |
1340 | } |
1341 | break; | |
1342 | ||
bd269ebc MA |
1343 | case SOCKET_ADDRESS_TYPE_UNIX: |
1344 | buf = g_strdup(addr->u.q_unix.path); | |
7e844959 AA |
1345 | break; |
1346 | ||
bd269ebc MA |
1347 | case SOCKET_ADDRESS_TYPE_FD: |
1348 | buf = g_strdup(addr->u.fd.str); | |
7e844959 AA |
1349 | break; |
1350 | ||
bd269ebc | 1351 | case SOCKET_ADDRESS_TYPE_VSOCK: |
6a02c806 | 1352 | buf = g_strdup_printf("%s:%s", |
bd269ebc MA |
1353 | addr->u.vsock.cid, |
1354 | addr->u.vsock.port); | |
6a02c806 SH |
1355 | break; |
1356 | ||
7e844959 | 1357 | default: |
a6c76285 | 1358 | abort(); |
7e844959 AA |
1359 | } |
1360 | return buf; | |
1361 | } | |
216411b8 | 1362 | |
bd269ebc MA |
1363 | SocketAddress *socket_address_flatten(SocketAddressLegacy *addr_legacy) |
1364 | { | |
fc0f0059 | 1365 | SocketAddress *addr; |
bd269ebc MA |
1366 | |
1367 | if (!addr_legacy) { | |
1368 | return NULL; | |
1369 | } | |
1370 | ||
fc0f0059 MA |
1371 | addr = g_new(SocketAddress, 1); |
1372 | ||
bd269ebc MA |
1373 | switch (addr_legacy->type) { |
1374 | case SOCKET_ADDRESS_LEGACY_KIND_INET: | |
1375 | addr->type = SOCKET_ADDRESS_TYPE_INET; | |
1376 | QAPI_CLONE_MEMBERS(InetSocketAddress, &addr->u.inet, | |
1377 | addr_legacy->u.inet.data); | |
1378 | break; | |
1379 | case SOCKET_ADDRESS_LEGACY_KIND_UNIX: | |
1380 | addr->type = SOCKET_ADDRESS_TYPE_UNIX; | |
1381 | QAPI_CLONE_MEMBERS(UnixSocketAddress, &addr->u.q_unix, | |
1382 | addr_legacy->u.q_unix.data); | |
1383 | break; | |
1384 | case SOCKET_ADDRESS_LEGACY_KIND_VSOCK: | |
1385 | addr->type = SOCKET_ADDRESS_TYPE_VSOCK; | |
1386 | QAPI_CLONE_MEMBERS(VsockSocketAddress, &addr->u.vsock, | |
1387 | addr_legacy->u.vsock.data); | |
1388 | break; | |
1389 | case SOCKET_ADDRESS_LEGACY_KIND_FD: | |
1390 | addr->type = SOCKET_ADDRESS_TYPE_FD; | |
1391 | QAPI_CLONE_MEMBERS(String, &addr->u.fd, addr_legacy->u.fd.data); | |
1392 | break; | |
1393 | default: | |
1394 | abort(); | |
1395 | } | |
1396 | ||
1397 | return addr; | |
1398 | } |