]> Git Repo - qemu.git/blame - util/qemu-sockets.c
io: fix temp directory used by test-io-channel-tls test
[qemu.git] / util / qemu-sockets.c
CommitLineData
305b0eb2
AL
1/*
2 * inet and unix socket functions for qemu
3 *
4 * (c) 2008 Gerd Hoffmann <[email protected]>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 of the License.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
e6d91ab6
PB
14 *
15 * Contributions after 2012-01-13 are licensed under the terms of the
16 * GNU GPL, version 2 or (at your option) any later version.
305b0eb2 17 */
aafd7584 18#include "qemu/osdep.h"
d247d25f 19
6a02c806
SH
20#ifdef CONFIG_AF_VSOCK
21#include <linux/vm_sockets.h>
22#endif /* CONFIG_AF_VSOCK */
23
83c9089e 24#include "monitor/monitor.h"
bd269ebc 25#include "qapi/clone-visitor.h"
da34e65c 26#include "qapi/error.h"
1de7afc9 27#include "qemu/sockets.h"
1de7afc9 28#include "qemu/main-loop.h"
216411b8 29#include "qapi/clone-visitor.h"
b3db211f
DB
30#include "qapi/qobject-input-visitor.h"
31#include "qapi/qobject-output-visitor.h"
2a8e21c7 32#include "qapi-visit.h"
f348b6d1 33#include "qemu/cutils.h"
d247d25f
AL
34
35#ifndef AI_ADDRCONFIG
36# define AI_ADDRCONFIG 0
37#endif
340849a9 38
3de3d698
WB
39#ifndef AI_V4MAPPED
40# define AI_V4MAPPED 0
41#endif
d247d25f 42
6979a813
DB
43#ifndef AI_NUMERICSERV
44# define AI_NUMERICSERV 0
45#endif
46
2af2bf67 47
d247d25f
AL
48static int inet_getport(struct addrinfo *e)
49{
50 struct sockaddr_in *i4;
51 struct sockaddr_in6 *i6;
52
53 switch (e->ai_family) {
54 case PF_INET6:
55 i6 = (void*)e->ai_addr;
56 return ntohs(i6->sin6_port);
57 case PF_INET:
58 i4 = (void*)e->ai_addr;
59 return ntohs(i4->sin_port);
60 default:
61 return 0;
62 }
63}
64
65static void inet_setport(struct addrinfo *e, int port)
66{
67 struct sockaddr_in *i4;
68 struct sockaddr_in6 *i6;
69
70 switch (e->ai_family) {
71 case PF_INET6:
72 i6 = (void*)e->ai_addr;
73 i6->sin6_port = htons(port);
74 break;
75 case PF_INET:
76 i4 = (void*)e->ai_addr;
77 i4->sin_port = htons(port);
78 break;
79 }
80}
81
a589569f
WX
82NetworkAddressFamily inet_netfamily(int family)
83{
84 switch (family) {
85 case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6;
86 case PF_INET: return NETWORK_ADDRESS_FAMILY_IPV4;
87 case PF_UNIX: return NETWORK_ADDRESS_FAMILY_UNIX;
6a02c806
SH
88#ifdef CONFIG_AF_VSOCK
89 case PF_VSOCK: return NETWORK_ADDRESS_FAMILY_VSOCK;
90#endif /* CONFIG_AF_VSOCK */
a589569f
WX
91 }
92 return NETWORK_ADDRESS_FAMILY_UNKNOWN;
93}
94
1856835d
DB
95/*
96 * Matrix we're trying to apply
97 *
98 * ipv4 ipv6 family
99 * - - PF_UNSPEC
100 * - f PF_INET
101 * - t PF_INET6
102 * f - PF_INET6
103 * f f <error>
104 * f t PF_INET6
105 * t - PF_INET
106 * t f PF_INET
94bc0d19 107 * t t PF_INET6/PF_UNSPEC
1856835d 108 *
d43eda3d 109 * NB, this matrix is only about getting the necessary results
1856835d
DB
110 * from getaddrinfo(). Some of the cases require further work
111 * after reading results from getaddrinfo in order to fully
94bc0d19
DB
112 * apply the logic the end user wants.
113 *
114 * In the first and last cases, we must set IPV6_V6ONLY=0
115 * when binding, to allow a single listener to potentially
116 * accept both IPv4+6 addresses.
1856835d 117 */
c1b412f1
DB
118int inet_ai_family_from_address(InetSocketAddress *addr,
119 Error **errp)
1856835d
DB
120{
121 if (addr->has_ipv6 && addr->has_ipv4 &&
122 !addr->ipv6 && !addr->ipv4) {
123 error_setg(errp, "Cannot disable IPv4 and IPv6 at same time");
124 return PF_UNSPEC;
125 }
94bc0d19
DB
126 if ((addr->has_ipv6 && addr->ipv6) && (addr->has_ipv4 && addr->ipv4)) {
127 /*
128 * Some backends can only do a single listener. In that case
129 * we want empty hostname to resolve to "::" and then use the
130 * flag IPV6_V6ONLY==0 to get both protocols on 1 socket. This
131 * doesn't work for addresses other than "", so they're just
132 * inevitably broken until multiple listeners can be used,
133 * and thus we honour getaddrinfo automatic protocol detection
134 * Once all backends do multi-listener, remove the PF_INET6
135 * branch entirely.
136 */
137 if (!addr->host || g_str_equal(addr->host, "")) {
138 return PF_INET6;
139 } else {
140 return PF_UNSPEC;
141 }
142 }
1856835d
DB
143 if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) {
144 return PF_INET6;
145 }
146 if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) {
147 return PF_INET;
148 }
149 return PF_UNSPEC;
150}
151
152static int inet_listen_saddr(InetSocketAddress *saddr,
153 int port_offset,
154 bool update_addr,
155 Error **errp)
d247d25f
AL
156{
157 struct addrinfo ai,*res,*e;
d247d25f
AL
158 char port[33];
159 char uaddr[INET6_ADDRSTRLEN+1];
160 char uport[33];
1856835d
DB
161 int slisten, rc, port_min, port_max, p;
162 Error *err = NULL;
d247d25f
AL
163
164 memset(&ai,0, sizeof(ai));
3de3d698 165 ai.ai_flags = AI_PASSIVE;
6979a813
DB
166 if (saddr->has_numeric && saddr->numeric) {
167 ai.ai_flags |= AI_NUMERICHOST | AI_NUMERICSERV;
168 }
1856835d 169 ai.ai_family = inet_ai_family_from_address(saddr, &err);
e5bc776f 170 ai.ai_socktype = SOCK_STREAM;
d247d25f 171
1856835d
DB
172 if (err) {
173 error_propagate(errp, err);
174 return -1;
175 }
176
177 if (saddr->host == NULL) {
0983f5e6 178 error_setg(errp, "host not specified");
e5bc776f 179 return -1;
d247d25f 180 }
1856835d
DB
181 if (saddr->port != NULL) {
182 pstrcpy(port, sizeof(port), saddr->port);
0983f5e6
DB
183 } else {
184 port[0] = '\0';
185 }
d247d25f
AL
186
187 /* lookup */
8bc89127
GH
188 if (port_offset) {
189 unsigned long long baseport;
0983f5e6
DB
190 if (strlen(port) == 0) {
191 error_setg(errp, "port not specified");
192 return -1;
193 }
8bc89127
GH
194 if (parse_uint_full(port, &baseport, 10) < 0) {
195 error_setg(errp, "can't convert to a number: %s", port);
196 return -1;
197 }
198 if (baseport > 65535 ||
199 baseport + port_offset > 65535) {
200 error_setg(errp, "port %s out of range", port);
201 return -1;
202 }
203 snprintf(port, sizeof(port), "%d", (int)baseport + port_offset);
204 }
1856835d 205 rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL,
0983f5e6 206 strlen(port) ? port : NULL, &ai, &res);
d247d25f 207 if (rc != 0) {
1856835d
DB
208 error_setg(errp, "address resolution failed for %s:%s: %s",
209 saddr->host, port, gai_strerror(rc));
d247d25f
AL
210 return -1;
211 }
d247d25f
AL
212
213 /* create socket + bind */
214 for (e = res; e != NULL; e = e->ai_next) {
39b6efc8
VS
215 getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
216 uaddr,INET6_ADDRSTRLEN,uport,32,
217 NI_NUMERICHOST | NI_NUMERICSERV);
40ff6d7e 218 slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol);
39b6efc8 219 if (slisten < 0) {
029409e5 220 if (!e->ai_next) {
235256a2 221 error_setg_errno(errp, errno, "Failed to create socket");
029409e5 222 }
39b6efc8
VS
223 continue;
224 }
d247d25f 225
04fd1c78 226 socket_set_fast_reuse(slisten);
d247d25f 227
877691f9 228 port_min = inet_getport(e);
1856835d 229 port_max = saddr->has_to ? saddr->to + port_offset : port_min;
877691f9 230 for (p = port_min; p <= port_max; p++) {
5e059be4 231#ifdef IPV6_V6ONLY
94bc0d19
DB
232 /*
233 * Deals with first & last cases in matrix in comment
234 * for inet_ai_family_from_address().
235 */
236 int v6only =
237 ((!saddr->has_ipv4 && !saddr->has_ipv6) ||
238 (saddr->has_ipv4 && saddr->ipv4 &&
239 saddr->has_ipv6 && saddr->ipv6)) ? 0 : 1;
5e059be4 240#endif
877691f9 241 inet_setport(e, p);
5e059be4
DB
242#ifdef IPV6_V6ONLY
243 rebind:
244 if (e->ai_family == PF_INET6) {
245 qemu_setsockopt(slisten, IPPROTO_IPV6, IPV6_V6ONLY, &v6only,
246 sizeof(v6only));
247 }
248#endif
d247d25f 249 if (bind(slisten, e->ai_addr, e->ai_addrlen) == 0) {
d247d25f
AL
250 goto listen;
251 }
5e059be4
DB
252
253#ifdef IPV6_V6ONLY
254 /* If we got EADDRINUSE from an IPv6 bind & V6ONLY is unset,
255 * it could be that the IPv4 port is already claimed, so retry
256 * with V6ONLY set
257 */
258 if (e->ai_family == PF_INET6 && errno == EADDRINUSE && !v6only) {
259 v6only = 1;
260 goto rebind;
261 }
262#endif
263
877691f9 264 if (p == port_max) {
029409e5 265 if (!e->ai_next) {
235256a2 266 error_setg_errno(errp, errno, "Failed to bind socket");
029409e5 267 }
d247d25f 268 }
d247d25f
AL
269 }
270 closesocket(slisten);
271 }
d247d25f
AL
272 freeaddrinfo(res);
273 return -1;
274
275listen:
276 if (listen(slisten,1) != 0) {
235256a2 277 error_setg_errno(errp, errno, "Failed to listen on socket");
d247d25f 278 closesocket(slisten);
39b6efc8 279 freeaddrinfo(res);
d247d25f
AL
280 return -1;
281 }
1856835d
DB
282 if (update_addr) {
283 g_free(saddr->host);
284 saddr->host = g_strdup(uaddr);
285 g_free(saddr->port);
286 saddr->port = g_strdup_printf("%d",
287 inet_getport(e) - port_offset);
288 saddr->has_ipv6 = saddr->ipv6 = e->ai_family == PF_INET6;
289 saddr->has_ipv4 = saddr->ipv4 = e->ai_family != PF_INET6;
290 }
d247d25f
AL
291 freeaddrinfo(res);
292 return slisten;
293}
294
05bc1d8a
MT
295#ifdef _WIN32
296#define QEMU_SOCKET_RC_INPROGRESS(rc) \
297 ((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY)
298#else
299#define QEMU_SOCKET_RC_INPROGRESS(rc) \
300 ((rc) == -EINPROGRESS)
301#endif
302
233aa5c2
OW
303/* Struct to store connect state for non blocking connect */
304typedef struct ConnectState {
305 int fd;
306 struct addrinfo *addr_list;
307 struct addrinfo *current_addr;
308 NonBlockingConnectHandler *callback;
309 void *opaque;
310} ConnectState;
311
312static int inet_connect_addr(struct addrinfo *addr, bool *in_progress,
11663b55 313 ConnectState *connect_state, Error **errp);
233aa5c2
OW
314
315static void wait_for_connect(void *opaque)
d247d25f 316{
233aa5c2
OW
317 ConnectState *s = opaque;
318 int val = 0, rc = 0;
319 socklen_t valsize = sizeof(val);
320 bool in_progress;
51795029 321 Error *err = NULL;
233aa5c2 322
82e1cc4b 323 qemu_set_fd_handler(s->fd, NULL, NULL, NULL);
233aa5c2
OW
324
325 do {
9957fc7f 326 rc = qemu_getsockopt(s->fd, SOL_SOCKET, SO_ERROR, &val, &valsize);
b16a44e1 327 } while (rc == -1 && errno == EINTR);
233aa5c2
OW
328
329 /* update rc to contain error */
330 if (!rc && val) {
331 rc = -1;
51795029 332 errno = val;
233aa5c2
OW
333 }
334
335 /* connect error */
336 if (rc < 0) {
51795029 337 error_setg_errno(&err, errno, "Error connecting to socket");
233aa5c2
OW
338 closesocket(s->fd);
339 s->fd = rc;
340 }
341
342 /* try to connect to the next address on the list */
1fc05adf
PB
343 if (s->current_addr) {
344 while (s->current_addr->ai_next != NULL && s->fd < 0) {
345 s->current_addr = s->current_addr->ai_next;
11663b55 346 s->fd = inet_connect_addr(s->current_addr, &in_progress, s, NULL);
51795029
CM
347 if (s->fd < 0) {
348 error_free(err);
349 err = NULL;
350 error_setg_errno(&err, errno, "Unable to start socket connect");
351 }
1fc05adf
PB
352 /* connect in progress */
353 if (in_progress) {
51795029 354 goto out;
1fc05adf 355 }
233aa5c2 356 }
1fc05adf
PB
357
358 freeaddrinfo(s->addr_list);
233aa5c2 359 }
05bc1d8a 360
233aa5c2 361 if (s->callback) {
51795029 362 s->callback(s->fd, err, s->opaque);
05bc1d8a 363 }
233aa5c2 364 g_free(s);
51795029
CM
365out:
366 error_free(err);
233aa5c2
OW
367}
368
369static int inet_connect_addr(struct addrinfo *addr, bool *in_progress,
11663b55 370 ConnectState *connect_state, Error **errp)
233aa5c2
OW
371{
372 int sock, rc;
373
374 *in_progress = false;
05bc1d8a
MT
375
376 sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
377 if (sock < 0) {
235256a2 378 error_setg_errno(errp, errno, "Failed to create socket");
05bc1d8a
MT
379 return -1;
380 }
04fd1c78 381 socket_set_fast_reuse(sock);
233aa5c2 382 if (connect_state != NULL) {
f9e8cacc 383 qemu_set_nonblock(sock);
05bc1d8a
MT
384 }
385 /* connect to peer */
386 do {
387 rc = 0;
388 if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) {
b16a44e1 389 rc = -errno;
05bc1d8a
MT
390 }
391 } while (rc == -EINTR);
392
233aa5c2
OW
393 if (connect_state != NULL && QEMU_SOCKET_RC_INPROGRESS(rc)) {
394 connect_state->fd = sock;
82e1cc4b 395 qemu_set_fd_handler(sock, NULL, wait_for_connect, connect_state);
233aa5c2 396 *in_progress = true;
05bc1d8a 397 } else if (rc < 0) {
235256a2 398 error_setg_errno(errp, errno, "Failed to connect socket");
05bc1d8a
MT
399 closesocket(sock);
400 return -1;
401 }
402 return sock;
403}
404
2942e420
DB
405static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr,
406 Error **errp)
05bc1d8a
MT
407{
408 struct addrinfo ai, *res;
409 int rc;
2942e420 410 Error *err = NULL;
340849a9 411 static int useV4Mapped = 1;
d247d25f 412
05bc1d8a 413 memset(&ai, 0, sizeof(ai));
233aa5c2 414
340849a9
DB
415 ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
416 if (atomic_read(&useV4Mapped)) {
417 ai.ai_flags |= AI_V4MAPPED;
418 }
2942e420 419 ai.ai_family = inet_ai_family_from_address(saddr, &err);
f4c94c7c 420 ai.ai_socktype = SOCK_STREAM;
d247d25f 421
2942e420
DB
422 if (err) {
423 error_propagate(errp, err);
05bc1d8a 424 return NULL;
d247d25f
AL
425 }
426
2942e420
DB
427 if (saddr->host == NULL || saddr->port == NULL) {
428 error_setg(errp, "host and/or port not specified");
429 return NULL;
05bc1d8a 430 }
d247d25f
AL
431
432 /* lookup */
2942e420 433 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
340849a9
DB
434
435 /* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but
436 * then don't implement it in their getaddrinfo(). Detect
437 * this and retry without the flag since that's preferrable
438 * to a fatal error
439 */
440 if (rc == EAI_BADFLAGS &&
441 (ai.ai_flags & AI_V4MAPPED)) {
442 atomic_set(&useV4Mapped, 0);
443 ai.ai_flags &= ~AI_V4MAPPED;
444 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
445 }
05bc1d8a 446 if (rc != 0) {
2942e420
DB
447 error_setg(errp, "address resolution failed for %s:%s: %s",
448 saddr->host, saddr->port, gai_strerror(rc));
05bc1d8a
MT
449 return NULL;
450 }
451 return res;
452}
453
5db5f44c
OW
454/**
455 * Create a socket and connect it to an address.
456 *
2942e420 457 * @saddr: Inet socket address specification
5db5f44c 458 * @errp: set on error
233aa5c2
OW
459 * @callback: callback function for non-blocking connect
460 * @opaque: opaque for callback function
5db5f44c
OW
461 *
462 * Returns: -1 on error, file descriptor on success.
233aa5c2
OW
463 *
464 * If @callback is non-null, the connect is non-blocking. If this
465 * function succeeds, callback will be called when the connection
466 * completes, with the file descriptor on success, or -1 on error.
5db5f44c 467 */
6dffc1f6
FZ
468int inet_connect_saddr(InetSocketAddress *saddr,
469 NonBlockingConnectHandler *callback, void *opaque,
470 Error **errp)
05bc1d8a 471{
3f9286b7 472 Error *local_err = NULL;
05bc1d8a
MT
473 struct addrinfo *res, *e;
474 int sock = -1;
233aa5c2
OW
475 bool in_progress;
476 ConnectState *connect_state = NULL;
05bc1d8a 477
2942e420 478 res = inet_parse_connect_saddr(saddr, errp);
05bc1d8a
MT
479 if (!res) {
480 return -1;
481 }
482
233aa5c2
OW
483 if (callback != NULL) {
484 connect_state = g_malloc0(sizeof(*connect_state));
485 connect_state->addr_list = res;
486 connect_state->callback = callback;
487 connect_state->opaque = opaque;
d247d25f 488 }
d247d25f
AL
489
490 for (e = res; e != NULL; e = e->ai_next) {
3f9286b7
MA
491 error_free(local_err);
492 local_err = NULL;
233aa5c2
OW
493 if (connect_state != NULL) {
494 connect_state->current_addr = e;
495 }
3f9286b7
MA
496 sock = inet_connect_addr(e, &in_progress, connect_state, &local_err);
497 if (sock >= 0) {
05bc1d8a 498 break;
a6ba35b3 499 }
d247d25f 500 }
3f9286b7
MA
501
502 if (sock < 0) {
503 error_propagate(errp, local_err);
504 } else if (in_progress) {
505 /* wait_for_connect() will do the rest */
506 return sock;
507 } else {
508 if (callback) {
51795029 509 callback(sock, NULL, opaque);
3f9286b7
MA
510 }
511 }
233aa5c2 512 g_free(connect_state);
d247d25f 513 freeaddrinfo(res);
05bc1d8a 514 return sock;
d247d25f
AL
515}
516
8b39910e
DB
517static int inet_dgram_saddr(InetSocketAddress *sraddr,
518 InetSocketAddress *sladdr,
519 Error **errp)
7e1b35b4
GH
520{
521 struct addrinfo ai, *peer = NULL, *local = NULL;
522 const char *addr;
523 const char *port;
7e1b35b4 524 int sock = -1, rc;
8b39910e 525 Error *err = NULL;
7e1b35b4
GH
526
527 /* lookup peer addr */
528 memset(&ai,0, sizeof(ai));
3de3d698 529 ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG;
8b39910e 530 ai.ai_family = inet_ai_family_from_address(sraddr, &err);
7e1b35b4
GH
531 ai.ai_socktype = SOCK_DGRAM;
532
8b39910e
DB
533 if (err) {
534 error_propagate(errp, err);
58c652c0 535 goto err;
8b39910e
DB
536 }
537
538 addr = sraddr->host;
539 port = sraddr->port;
7e1b35b4
GH
540 if (addr == NULL || strlen(addr) == 0) {
541 addr = "localhost";
542 }
543 if (port == NULL || strlen(port) == 0) {
4f085c82 544 error_setg(errp, "remote port not specified");
58c652c0 545 goto err;
7e1b35b4
GH
546 }
547
9cd1883c 548 if ((rc = getaddrinfo(addr, port, &ai, &peer)) != 0) {
4f085c82
PB
549 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
550 gai_strerror(rc));
26015051 551 goto err;
7e1b35b4 552 }
7e1b35b4
GH
553
554 /* lookup local addr */
555 memset(&ai,0, sizeof(ai));
556 ai.ai_flags = AI_PASSIVE;
557 ai.ai_family = peer->ai_family;
558 ai.ai_socktype = SOCK_DGRAM;
559
8b39910e
DB
560 if (sladdr) {
561 addr = sladdr->host;
562 port = sladdr->port;
563 if (addr == NULL || strlen(addr) == 0) {
564 addr = NULL;
565 }
566 if (!port || strlen(port) == 0) {
567 port = "0";
568 }
569 } else {
7e1b35b4 570 addr = NULL;
7e1b35b4 571 port = "0";
8b39910e 572 }
7e1b35b4 573
9cd1883c 574 if ((rc = getaddrinfo(addr, port, &ai, &local)) != 0) {
4f085c82
PB
575 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
576 gai_strerror(rc));
39b38459 577 goto err;
7e1b35b4 578 }
7e1b35b4
GH
579
580 /* create socket */
40ff6d7e 581 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol);
7e1b35b4 582 if (sock < 0) {
235256a2 583 error_setg_errno(errp, errno, "Failed to create socket");
7e1b35b4
GH
584 goto err;
585 }
04fd1c78 586 socket_set_fast_reuse(sock);
7e1b35b4
GH
587
588 /* bind socket */
7e1b35b4 589 if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) {
235256a2 590 error_setg_errno(errp, errno, "Failed to bind socket");
7e1b35b4
GH
591 goto err;
592 }
593
594 /* connect to peer */
7e1b35b4 595 if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) {
235256a2 596 error_setg_errno(errp, errno, "Failed to connect socket");
7e1b35b4
GH
597 goto err;
598 }
599
600 freeaddrinfo(local);
601 freeaddrinfo(peer);
602 return sock;
603
604err:
26015051 605 if (sock != -1) {
7e1b35b4 606 closesocket(sock);
26015051
C
607 }
608 if (local) {
7e1b35b4 609 freeaddrinfo(local);
26015051
C
610 }
611 if (peer) {
7e1b35b4 612 freeaddrinfo(peer);
26015051
C
613 }
614
7e1b35b4
GH
615 return -1;
616}
617
f4c94c7c 618/* compatibility wrapper */
0785bd7a 619int inet_parse(InetSocketAddress *addr, const char *str, Error **errp)
f4c94c7c
GH
620{
621 const char *optstr, *h;
55a10996 622 char host[65];
f4c94c7c 623 char port[33];
879e45c7 624 int to;
f4c94c7c
GH
625 int pos;
626
0785bd7a 627 memset(addr, 0, sizeof(*addr));
879e45c7 628
f4c94c7c
GH
629 /* parse address */
630 if (str[0] == ':') {
631 /* no host given */
879e45c7 632 host[0] = '\0';
9cd1883c 633 if (sscanf(str, ":%32[^,]%n", port, &pos) != 1) {
2f002c43 634 error_setg(errp, "error parsing port in address '%s'", str);
0785bd7a 635 return -1;
f4c94c7c
GH
636 }
637 } else if (str[0] == '[') {
638 /* IPv6 addr */
9cd1883c 639 if (sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 640 error_setg(errp, "error parsing IPv6 address '%s'", str);
0785bd7a 641 return -1;
f4c94c7c 642 }
f4c94c7c 643 } else {
391b7b97 644 /* hostname or IPv4 addr */
9cd1883c 645 if (sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 646 error_setg(errp, "error parsing address '%s'", str);
0785bd7a 647 return -1;
f4c94c7c
GH
648 }
649 }
879e45c7
PB
650
651 addr->host = g_strdup(host);
652 addr->port = g_strdup(port);
f4c94c7c
GH
653
654 /* parse options */
655 optstr = str + pos;
656 h = strstr(optstr, ",to=");
879e45c7 657 if (h) {
1ccbc285
AP
658 h += 4;
659 if (sscanf(h, "%d%n", &to, &pos) != 1 ||
660 (h[pos] != '\0' && h[pos] != ',')) {
879e45c7 661 error_setg(errp, "error parsing to= argument");
0785bd7a 662 return -1;
879e45c7
PB
663 }
664 addr->has_to = true;
665 addr->to = to;
666 }
667 if (strstr(optstr, ",ipv4")) {
668 addr->ipv4 = addr->has_ipv4 = true;
669 }
670 if (strstr(optstr, ",ipv6")) {
671 addr->ipv6 = addr->has_ipv6 = true;
672 }
0785bd7a 673 return 0;
879e45c7
PB
674}
675
e5bc776f 676
5db5f44c
OW
677/**
678 * Create a blocking socket and connect it to an address.
679 *
680 * @str: address string
681 * @errp: set in case of an error
682 *
683 * Returns -1 in case of error, file descriptor on success
684 **/
685int inet_connect(const char *str, Error **errp)
f4c94c7c 686{
f4c94c7c 687 int sock = -1;
0785bd7a 688 InetSocketAddress *addr = g_new(InetSocketAddress, 1);
f4c94c7c 689
0785bd7a 690 if (!inet_parse(addr, str, errp)) {
6dffc1f6 691 sock = inet_connect_saddr(addr, NULL, NULL, errp);
5db5f44c 692 }
0785bd7a 693 qapi_free_InetSocketAddress(addr);
5db5f44c
OW
694 return sock;
695}
696
6a02c806
SH
697#ifdef CONFIG_AF_VSOCK
698static bool vsock_parse_vaddr_to_sockaddr(const VsockSocketAddress *vaddr,
699 struct sockaddr_vm *svm,
700 Error **errp)
701{
702 unsigned long long val;
703
704 memset(svm, 0, sizeof(*svm));
705 svm->svm_family = AF_VSOCK;
706
707 if (parse_uint_full(vaddr->cid, &val, 10) < 0 ||
708 val > UINT32_MAX) {
709 error_setg(errp, "Failed to parse cid '%s'", vaddr->cid);
710 return false;
711 }
712 svm->svm_cid = val;
713
714 if (parse_uint_full(vaddr->port, &val, 10) < 0 ||
715 val > UINT32_MAX) {
716 error_setg(errp, "Failed to parse port '%s'", vaddr->port);
717 return false;
718 }
719 svm->svm_port = val;
720
721 return true;
722}
723
724static int vsock_connect_addr(const struct sockaddr_vm *svm, bool *in_progress,
725 ConnectState *connect_state, Error **errp)
726{
727 int sock, rc;
728
729 *in_progress = false;
730
731 sock = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
732 if (sock < 0) {
733 error_setg_errno(errp, errno, "Failed to create socket");
734 return -1;
735 }
736 if (connect_state != NULL) {
737 qemu_set_nonblock(sock);
738 }
739 /* connect to peer */
740 do {
741 rc = 0;
742 if (connect(sock, (const struct sockaddr *)svm, sizeof(*svm)) < 0) {
743 rc = -errno;
744 }
745 } while (rc == -EINTR);
746
747 if (connect_state != NULL && QEMU_SOCKET_RC_INPROGRESS(rc)) {
748 connect_state->fd = sock;
749 qemu_set_fd_handler(sock, NULL, wait_for_connect, connect_state);
750 *in_progress = true;
751 } else if (rc < 0) {
752 error_setg_errno(errp, errno, "Failed to connect socket");
753 closesocket(sock);
754 return -1;
755 }
756 return sock;
757}
758
1a9a7f25 759static int vsock_connect_saddr(VsockSocketAddress *vaddr,
6a02c806 760 NonBlockingConnectHandler *callback,
1a9a7f25
FZ
761 void *opaque,
762 Error **errp)
6a02c806
SH
763{
764 struct sockaddr_vm svm;
765 int sock = -1;
766 bool in_progress;
767 ConnectState *connect_state = NULL;
768
769 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
770 return -1;
771 }
772
773 if (callback != NULL) {
774 connect_state = g_malloc0(sizeof(*connect_state));
775 connect_state->callback = callback;
776 connect_state->opaque = opaque;
777 }
778
779 sock = vsock_connect_addr(&svm, &in_progress, connect_state, errp);
780 if (sock < 0) {
781 /* do nothing */
782 } else if (in_progress) {
783 /* wait_for_connect() will do the rest */
784 return sock;
785 } else {
786 if (callback) {
787 callback(sock, NULL, opaque);
788 }
789 }
790 g_free(connect_state);
791 return sock;
792}
793
794static int vsock_listen_saddr(VsockSocketAddress *vaddr,
795 Error **errp)
796{
797 struct sockaddr_vm svm;
798 int slisten;
799
800 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
801 return -1;
802 }
803
804 slisten = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
805 if (slisten < 0) {
806 error_setg_errno(errp, errno, "Failed to create socket");
807 return -1;
808 }
809
810 if (bind(slisten, (const struct sockaddr *)&svm, sizeof(svm)) != 0) {
811 error_setg_errno(errp, errno, "Failed to bind socket");
812 closesocket(slisten);
813 return -1;
814 }
815
816 if (listen(slisten, 1) != 0) {
817 error_setg_errno(errp, errno, "Failed to listen on socket");
818 closesocket(slisten);
819 return -1;
820 }
821 return slisten;
822}
823
4db5c619
MA
824static int vsock_parse(VsockSocketAddress *addr, const char *str,
825 Error **errp)
6a02c806 826{
6a02c806
SH
827 char cid[33];
828 char port[33];
829 int n;
830
831 if (sscanf(str, "%32[^:]:%32[^,]%n", cid, port, &n) != 2) {
832 error_setg(errp, "error parsing address '%s'", str);
4db5c619 833 return -1;
6a02c806
SH
834 }
835 if (str[n] != '\0') {
836 error_setg(errp, "trailing characters in address '%s'", str);
4db5c619 837 return -1;
6a02c806
SH
838 }
839
6a02c806
SH
840 addr->cid = g_strdup(cid);
841 addr->port = g_strdup(port);
4db5c619 842 return 0;
6a02c806
SH
843}
844#else
845static void vsock_unsupported(Error **errp)
846{
847 error_setg(errp, "socket family AF_VSOCK unsupported");
848}
849
1a9a7f25 850static int vsock_connect_saddr(VsockSocketAddress *vaddr,
6a02c806 851 NonBlockingConnectHandler *callback,
1a9a7f25 852 void *opaque, Error **errp)
6a02c806
SH
853{
854 vsock_unsupported(errp);
855 return -1;
856}
857
858static int vsock_listen_saddr(VsockSocketAddress *vaddr,
859 Error **errp)
860{
861 vsock_unsupported(errp);
862 return -1;
863}
864
4db5c619
MA
865static int vsock_parse(VsockSocketAddress *addr, const char *str,
866 Error **errp)
6a02c806
SH
867{
868 vsock_unsupported(errp);
4db5c619 869 return -1;
6a02c806
SH
870}
871#endif /* CONFIG_AF_VSOCK */
872
d247d25f
AL
873#ifndef _WIN32
874
1856835d
DB
875static int unix_listen_saddr(UnixSocketAddress *saddr,
876 bool update_addr,
877 Error **errp)
d247d25f
AL
878{
879 struct sockaddr_un un;
62b6adfb 880 int sock, fd;
ad9579aa
DB
881 char *pathbuf = NULL;
882 const char *path;
d247d25f 883
40ff6d7e 884 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 885 if (sock < 0) {
b658c53d 886 error_setg_errno(errp, errno, "Failed to create Unix socket");
39b6efc8 887 return -1;
d247d25f
AL
888 }
889
ad9579aa
DB
890 if (saddr->path && saddr->path[0]) {
891 path = saddr->path;
d247d25f 892 } else {
b658c53d
PB
893 const char *tmpdir = getenv("TMPDIR");
894 tmpdir = tmpdir ? tmpdir : "/tmp";
ad9579aa
DB
895 path = pathbuf = g_strdup_printf("%s/qemu-socket-XXXXXX", tmpdir);
896 }
b658c53d 897
ad9579aa
DB
898 if (strlen(path) > sizeof(un.sun_path)) {
899 error_setg(errp, "UNIX socket path '%s' is too long", path);
900 error_append_hint(errp, "Path must be less than %zu bytes\n",
901 sizeof(un.sun_path));
902 goto err;
903 }
904
905 if (pathbuf != NULL) {
d247d25f
AL
906 /*
907 * This dummy fd usage silences the mktemp() unsecure warning.
908 * Using mkstemp() doesn't make things more secure here
909 * though. bind() complains about existing files, so we have
910 * to unlink first and thus re-open the race window. The
911 * worst case possible is bind() failing, i.e. a DoS attack.
912 */
ad9579aa 913 fd = mkstemp(pathbuf);
b658c53d
PB
914 if (fd < 0) {
915 error_setg_errno(errp, errno,
ad9579aa 916 "Failed to make a temporary socket %s", pathbuf);
b658c53d
PB
917 goto err;
918 }
919 close(fd);
d247d25f 920 }
d247d25f 921
ad9579aa 922 if (unlink(path) < 0 && errno != ENOENT) {
0ef705a2 923 error_setg_errno(errp, errno,
ad9579aa 924 "Failed to unlink socket %s", path);
0ef705a2
CR
925 goto err;
926 }
ad9579aa
DB
927
928 memset(&un, 0, sizeof(un));
929 un.sun_family = AF_UNIX;
930 strncpy(un.sun_path, path, sizeof(un.sun_path));
931
d247d25f 932 if (bind(sock, (struct sockaddr*) &un, sizeof(un)) < 0) {
56382bd5 933 error_setg_errno(errp, errno, "Failed to bind socket to %s", path);
d247d25f
AL
934 goto err;
935 }
936 if (listen(sock, 1) < 0) {
235256a2 937 error_setg_errno(errp, errno, "Failed to listen on socket");
d247d25f
AL
938 goto err;
939 }
940
ad9579aa
DB
941 if (update_addr && pathbuf) {
942 g_free(saddr->path);
943 saddr->path = pathbuf;
944 } else {
945 g_free(pathbuf);
946 }
d247d25f
AL
947 return sock;
948
949err:
ad9579aa 950 g_free(pathbuf);
d247d25f
AL
951 closesocket(sock);
952 return -1;
953}
954
2bdc6791
FZ
955static int unix_connect_saddr(UnixSocketAddress *saddr,
956 NonBlockingConnectHandler *callback, void *opaque,
957 Error **errp)
d247d25f
AL
958{
959 struct sockaddr_un un;
1fc05adf
PB
960 ConnectState *connect_state = NULL;
961 int sock, rc;
d247d25f 962
2942e420 963 if (saddr->path == NULL) {
312fd5f2 964 error_setg(errp, "unix connect: no path specified");
2af2bf67
GH
965 return -1;
966 }
967
40ff6d7e 968 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 969 if (sock < 0) {
235256a2 970 error_setg_errno(errp, errno, "Failed to create socket");
39b6efc8 971 return -1;
d247d25f 972 }
1fc05adf
PB
973 if (callback != NULL) {
974 connect_state = g_malloc0(sizeof(*connect_state));
975 connect_state->callback = callback;
976 connect_state->opaque = opaque;
f9e8cacc 977 qemu_set_nonblock(sock);
1fc05adf 978 }
d247d25f 979
ad9579aa
DB
980 if (strlen(saddr->path) > sizeof(un.sun_path)) {
981 error_setg(errp, "UNIX socket path '%s' is too long", saddr->path);
982 error_append_hint(errp, "Path must be less than %zu bytes\n",
983 sizeof(un.sun_path));
984 goto err;
985 }
986
d247d25f
AL
987 memset(&un, 0, sizeof(un));
988 un.sun_family = AF_UNIX;
ad9579aa 989 strncpy(un.sun_path, saddr->path, sizeof(un.sun_path));
1fc05adf
PB
990
991 /* connect to peer */
992 do {
993 rc = 0;
994 if (connect(sock, (struct sockaddr *) &un, sizeof(un)) < 0) {
b16a44e1 995 rc = -errno;
1fc05adf
PB
996 }
997 } while (rc == -EINTR);
998
999 if (connect_state != NULL && QEMU_SOCKET_RC_INPROGRESS(rc)) {
1000 connect_state->fd = sock;
82e1cc4b 1001 qemu_set_fd_handler(sock, NULL, wait_for_connect, connect_state);
1fc05adf
PB
1002 return sock;
1003 } else if (rc >= 0) {
1004 /* non blocking socket immediate success, call callback */
1005 if (callback != NULL) {
51795029 1006 callback(sock, NULL, opaque);
1fc05adf
PB
1007 }
1008 }
1009
1010 if (rc < 0) {
ad9579aa
DB
1011 error_setg_errno(errp, -rc, "Failed to connect socket %s",
1012 saddr->path);
1013 goto err;
d247d25f
AL
1014 }
1015
1fc05adf 1016 g_free(connect_state);
d247d25f 1017 return sock;
ad9579aa
DB
1018
1019 err:
1020 close(sock);
1021 g_free(connect_state);
1022 return -1;
d247d25f
AL
1023}
1024
0c814709
PB
1025#else
1026
1856835d
DB
1027static int unix_listen_saddr(UnixSocketAddress *saddr,
1028 bool update_addr,
1029 Error **errp)
0c814709 1030{
58899664 1031 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
1032 errno = ENOTSUP;
1033 return -1;
1034}
1035
2bdc6791
FZ
1036static int unix_connect_saddr(UnixSocketAddress *saddr,
1037 NonBlockingConnectHandler *callback, void *opaque,
1038 Error **errp)
0c814709 1039{
58899664 1040 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
1041 errno = ENOTSUP;
1042 return -1;
1043}
1044#endif
1045
2af2bf67 1046/* compatibility wrapper */
7fc4e63e 1047int unix_listen(const char *str, char *ostr, int olen, Error **errp)
62b6adfb 1048{
62b6adfb
GH
1049 char *path, *optstr;
1050 int sock, len;
1856835d 1051 UnixSocketAddress *saddr;
62b6adfb 1052
1856835d 1053 saddr = g_new0(UnixSocketAddress, 1);
62b6adfb
GH
1054
1055 optstr = strchr(str, ',');
1056 if (optstr) {
1057 len = optstr - str;
1058 if (len) {
7267c094 1059 path = g_malloc(len+1);
62b6adfb 1060 snprintf(path, len+1, "%.*s", len, str);
1856835d 1061 saddr->path = path;
62b6adfb
GH
1062 }
1063 } else {
1856835d 1064 saddr->path = g_strdup(str);
62b6adfb
GH
1065 }
1066
1856835d 1067 sock = unix_listen_saddr(saddr, true, errp);
62b6adfb 1068
26015051 1069 if (sock != -1 && ostr) {
1856835d 1070 snprintf(ostr, olen, "%s%s", saddr->path, optstr ? optstr : "");
26015051
C
1071 }
1072
1856835d 1073 qapi_free_UnixSocketAddress(saddr);
62b6adfb
GH
1074 return sock;
1075}
1076
7fc4e63e 1077int unix_connect(const char *path, Error **errp)
2af2bf67 1078{
2942e420 1079 UnixSocketAddress *saddr;
2af2bf67
GH
1080 int sock;
1081
2942e420
DB
1082 saddr = g_new0(UnixSocketAddress, 1);
1083 saddr->path = g_strdup(path);
2bdc6791 1084 sock = unix_connect_saddr(saddr, NULL, NULL, errp);
2942e420 1085 qapi_free_UnixSocketAddress(saddr);
1fc05adf
PB
1086 return sock;
1087}
1088
1089
bd269ebc 1090SocketAddress *socket_parse(const char *str, Error **errp)
101f9cbc 1091{
bd269ebc 1092 SocketAddress *addr;
101f9cbc 1093
bd269ebc 1094 addr = g_new0(SocketAddress, 1);
101f9cbc
PB
1095 if (strstart(str, "unix:", NULL)) {
1096 if (str[5] == '\0') {
312fd5f2 1097 error_setg(errp, "invalid Unix socket address");
101f9cbc
PB
1098 goto fail;
1099 } else {
bd269ebc
MA
1100 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1101 addr->u.q_unix.path = g_strdup(str + 5);
101f9cbc
PB
1102 }
1103 } else if (strstart(str, "fd:", NULL)) {
1104 if (str[3] == '\0') {
312fd5f2 1105 error_setg(errp, "invalid file descriptor address");
101f9cbc
PB
1106 goto fail;
1107 } else {
bd269ebc
MA
1108 addr->type = SOCKET_ADDRESS_TYPE_FD;
1109 addr->u.fd.str = g_strdup(str + 3);
101f9cbc 1110 }
6a02c806 1111 } else if (strstart(str, "vsock:", NULL)) {
bd269ebc
MA
1112 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1113 if (vsock_parse(&addr->u.vsock, str + strlen("vsock:"), errp)) {
6a02c806
SH
1114 goto fail;
1115 }
101f9cbc 1116 } else {
bd269ebc
MA
1117 addr->type = SOCKET_ADDRESS_TYPE_INET;
1118 if (inet_parse(&addr->u.inet, str, errp)) {
101f9cbc
PB
1119 goto fail;
1120 }
1121 }
1122 return addr;
1123
1124fail:
bd269ebc 1125 qapi_free_SocketAddress(addr);
101f9cbc
PB
1126 return NULL;
1127}
1128
bd269ebc 1129int socket_connect(SocketAddress *addr, NonBlockingConnectHandler *callback,
226799ce 1130 void *opaque, Error **errp)
101f9cbc 1131{
101f9cbc
PB
1132 int fd;
1133
2d32adda 1134 switch (addr->type) {
bd269ebc
MA
1135 case SOCKET_ADDRESS_TYPE_INET:
1136 fd = inet_connect_saddr(&addr->u.inet, callback, opaque, errp);
101f9cbc
PB
1137 break;
1138
bd269ebc
MA
1139 case SOCKET_ADDRESS_TYPE_UNIX:
1140 fd = unix_connect_saddr(&addr->u.q_unix, callback, opaque, errp);
101f9cbc
PB
1141 break;
1142
bd269ebc
MA
1143 case SOCKET_ADDRESS_TYPE_FD:
1144 fd = monitor_get_fd(cur_mon, addr->u.fd.str, errp);
d1ec72a4 1145 if (fd >= 0 && callback) {
1a751ebf 1146 qemu_set_nonblock(fd);
51795029 1147 callback(fd, NULL, opaque);
101f9cbc
PB
1148 }
1149 break;
1150
bd269ebc
MA
1151 case SOCKET_ADDRESS_TYPE_VSOCK:
1152 fd = vsock_connect_saddr(&addr->u.vsock, callback, opaque, errp);
6a02c806
SH
1153 break;
1154
101f9cbc
PB
1155 default:
1156 abort();
1157 }
101f9cbc
PB
1158 return fd;
1159}
1160
bd269ebc 1161int socket_listen(SocketAddress *addr, Error **errp)
101f9cbc 1162{
101f9cbc
PB
1163 int fd;
1164
2d32adda 1165 switch (addr->type) {
bd269ebc
MA
1166 case SOCKET_ADDRESS_TYPE_INET:
1167 fd = inet_listen_saddr(&addr->u.inet, 0, false, errp);
101f9cbc
PB
1168 break;
1169
bd269ebc
MA
1170 case SOCKET_ADDRESS_TYPE_UNIX:
1171 fd = unix_listen_saddr(&addr->u.q_unix, false, errp);
101f9cbc
PB
1172 break;
1173
bd269ebc
MA
1174 case SOCKET_ADDRESS_TYPE_FD:
1175 fd = monitor_get_fd(cur_mon, addr->u.fd.str, errp);
101f9cbc
PB
1176 break;
1177
bd269ebc
MA
1178 case SOCKET_ADDRESS_TYPE_VSOCK:
1179 fd = vsock_listen_saddr(&addr->u.vsock, errp);
6a02c806
SH
1180 break;
1181
101f9cbc
PB
1182 default:
1183 abort();
1184 }
101f9cbc
PB
1185 return fd;
1186}
1187
74b6ce43
MAL
1188void socket_listen_cleanup(int fd, Error **errp)
1189{
bd269ebc 1190 SocketAddress *addr;
74b6ce43
MAL
1191
1192 addr = socket_local_address(fd, errp);
1193
bd269ebc
MA
1194 if (addr->type == SOCKET_ADDRESS_TYPE_UNIX
1195 && addr->u.q_unix.path) {
1196 if (unlink(addr->u.q_unix.path) < 0 && errno != ENOENT) {
74b6ce43
MAL
1197 error_setg_errno(errp, errno,
1198 "Failed to unlink socket %s",
bd269ebc 1199 addr->u.q_unix.path);
74b6ce43
MAL
1200 }
1201 }
1202
bd269ebc 1203 qapi_free_SocketAddress(addr);
74b6ce43
MAL
1204}
1205
bd269ebc 1206int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp)
3ecc059d 1207{
3ecc059d
GH
1208 int fd;
1209
ca0b64e5 1210 /*
bd269ebc 1211 * TODO SOCKET_ADDRESS_TYPE_FD when fd is AF_INET or AF_INET6
ca0b64e5
MA
1212 * (although other address families can do SOCK_DGRAM, too)
1213 */
2d32adda 1214 switch (remote->type) {
bd269ebc
MA
1215 case SOCKET_ADDRESS_TYPE_INET:
1216 fd = inet_dgram_saddr(&remote->u.inet,
1217 local ? &local->u.inet : NULL, errp);
3ecc059d
GH
1218 break;
1219
1220 default:
1221 error_setg(errp, "socket type unsupported for datagram");
7a5b6af1 1222 fd = -1;
3ecc059d 1223 }
3ecc059d
GH
1224 return fd;
1225}
17c55dec
DB
1226
1227
bd269ebc 1228static SocketAddress *
17c55dec
DB
1229socket_sockaddr_to_address_inet(struct sockaddr_storage *sa,
1230 socklen_t salen,
1231 Error **errp)
1232{
1233 char host[NI_MAXHOST];
1234 char serv[NI_MAXSERV];
bd269ebc 1235 SocketAddress *addr;
0399293e 1236 InetSocketAddress *inet;
17c55dec
DB
1237 int ret;
1238
1239 ret = getnameinfo((struct sockaddr *)sa, salen,
1240 host, sizeof(host),
1241 serv, sizeof(serv),
1242 NI_NUMERICHOST | NI_NUMERICSERV);
1243 if (ret != 0) {
1244 error_setg(errp, "Cannot format numeric socket address: %s",
1245 gai_strerror(ret));
1246 return NULL;
1247 }
1248
bd269ebc
MA
1249 addr = g_new0(SocketAddress, 1);
1250 addr->type = SOCKET_ADDRESS_TYPE_INET;
1251 inet = &addr->u.inet;
0399293e
EB
1252 inet->host = g_strdup(host);
1253 inet->port = g_strdup(serv);
17c55dec 1254 if (sa->ss_family == AF_INET) {
0399293e 1255 inet->has_ipv4 = inet->ipv4 = true;
17c55dec 1256 } else {
0399293e 1257 inet->has_ipv6 = inet->ipv6 = true;
17c55dec
DB
1258 }
1259
1260 return addr;
1261}
1262
1263
1264#ifndef WIN32
bd269ebc 1265static SocketAddress *
17c55dec
DB
1266socket_sockaddr_to_address_unix(struct sockaddr_storage *sa,
1267 socklen_t salen,
1268 Error **errp)
1269{
bd269ebc 1270 SocketAddress *addr;
17c55dec
DB
1271 struct sockaddr_un *su = (struct sockaddr_un *)sa;
1272
bd269ebc
MA
1273 addr = g_new0(SocketAddress, 1);
1274 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
17c55dec 1275 if (su->sun_path[0]) {
bd269ebc 1276 addr->u.q_unix.path = g_strndup(su->sun_path, sizeof(su->sun_path));
17c55dec
DB
1277 }
1278
1279 return addr;
1280}
1281#endif /* WIN32 */
1282
6a02c806 1283#ifdef CONFIG_AF_VSOCK
bd269ebc 1284static SocketAddress *
6a02c806
SH
1285socket_sockaddr_to_address_vsock(struct sockaddr_storage *sa,
1286 socklen_t salen,
1287 Error **errp)
1288{
bd269ebc 1289 SocketAddress *addr;
6a02c806
SH
1290 VsockSocketAddress *vaddr;
1291 struct sockaddr_vm *svm = (struct sockaddr_vm *)sa;
1292
bd269ebc
MA
1293 addr = g_new0(SocketAddress, 1);
1294 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1295 vaddr = &addr->u.vsock;
6a02c806
SH
1296 vaddr->cid = g_strdup_printf("%u", svm->svm_cid);
1297 vaddr->port = g_strdup_printf("%u", svm->svm_port);
1298
1299 return addr;
1300}
1301#endif /* CONFIG_AF_VSOCK */
1302
bd269ebc 1303SocketAddress *
17c55dec
DB
1304socket_sockaddr_to_address(struct sockaddr_storage *sa,
1305 socklen_t salen,
1306 Error **errp)
1307{
1308 switch (sa->ss_family) {
1309 case AF_INET:
1310 case AF_INET6:
1311 return socket_sockaddr_to_address_inet(sa, salen, errp);
1312
1313#ifndef WIN32
1314 case AF_UNIX:
1315 return socket_sockaddr_to_address_unix(sa, salen, errp);
1316#endif /* WIN32 */
1317
6a02c806
SH
1318#ifdef CONFIG_AF_VSOCK
1319 case AF_VSOCK:
1320 return socket_sockaddr_to_address_vsock(sa, salen, errp);
1321#endif
1322
17c55dec
DB
1323 default:
1324 error_setg(errp, "socket family %d unsupported",
1325 sa->ss_family);
1326 return NULL;
1327 }
1328 return 0;
1329}
1330
1331
bd269ebc 1332SocketAddress *socket_local_address(int fd, Error **errp)
17c55dec
DB
1333{
1334 struct sockaddr_storage ss;
1335 socklen_t sslen = sizeof(ss);
1336
1337 if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1338 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1339 "Unable to query local socket address");
1340 return NULL;
1341 }
1342
1343 return socket_sockaddr_to_address(&ss, sslen, errp);
1344}
1345
1346
bd269ebc 1347SocketAddress *socket_remote_address(int fd, Error **errp)
17c55dec
DB
1348{
1349 struct sockaddr_storage ss;
1350 socklen_t sslen = sizeof(ss);
1351
1352 if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1353 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1354 "Unable to query remote socket address");
1355 return NULL;
1356 }
1357
1358 return socket_sockaddr_to_address(&ss, sslen, errp);
1359}
2a8e21c7 1360
216411b8 1361
bd269ebc
MA
1362SocketAddress *socket_address_flatten(SocketAddressLegacy *addr_legacy)
1363{
fc0f0059 1364 SocketAddress *addr;
bd269ebc
MA
1365
1366 if (!addr_legacy) {
1367 return NULL;
1368 }
1369
fc0f0059
MA
1370 addr = g_new(SocketAddress, 1);
1371
bd269ebc
MA
1372 switch (addr_legacy->type) {
1373 case SOCKET_ADDRESS_LEGACY_KIND_INET:
1374 addr->type = SOCKET_ADDRESS_TYPE_INET;
1375 QAPI_CLONE_MEMBERS(InetSocketAddress, &addr->u.inet,
1376 addr_legacy->u.inet.data);
1377 break;
1378 case SOCKET_ADDRESS_LEGACY_KIND_UNIX:
1379 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1380 QAPI_CLONE_MEMBERS(UnixSocketAddress, &addr->u.q_unix,
1381 addr_legacy->u.q_unix.data);
1382 break;
1383 case SOCKET_ADDRESS_LEGACY_KIND_VSOCK:
1384 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1385 QAPI_CLONE_MEMBERS(VsockSocketAddress, &addr->u.vsock,
1386 addr_legacy->u.vsock.data);
1387 break;
1388 case SOCKET_ADDRESS_LEGACY_KIND_FD:
1389 addr->type = SOCKET_ADDRESS_TYPE_FD;
1390 QAPI_CLONE_MEMBERS(String, &addr->u.fd, addr_legacy->u.fd.data);
1391 break;
1392 default:
1393 abort();
1394 }
1395
1396 return addr;
1397}
This page took 0.96046 seconds and 4 git commands to generate.