]> git.proxmox.com Git - mirror_qemu.git/blame - util/qemu-sockets.c
qcow2: Inform block layer about discard boundaries
[mirror_qemu.git] / util / qemu-sockets.c
CommitLineData
305b0eb2
AL
1/*
2 * inet and unix socket functions for qemu
3 *
4 * (c) 2008 Gerd Hoffmann <kraxel@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 of the License.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
e6d91ab6
PB
14 *
15 * Contributions after 2012-01-13 are licensed under the terms of the
16 * GNU GPL, version 2 or (at your option) any later version.
305b0eb2 17 */
aafd7584 18#include "qemu/osdep.h"
d247d25f 19
83c9089e 20#include "monitor/monitor.h"
da34e65c 21#include "qapi/error.h"
1de7afc9 22#include "qemu/sockets.h"
1de7afc9 23#include "qemu/main-loop.h"
2a8e21c7
DB
24#include "qapi/qmp-input-visitor.h"
25#include "qapi/qmp-output-visitor.h"
26#include "qapi-visit.h"
f348b6d1 27#include "qemu/cutils.h"
d247d25f
AL
28
29#ifndef AI_ADDRCONFIG
30# define AI_ADDRCONFIG 0
31#endif
340849a9 32
3de3d698
WB
33#ifndef AI_V4MAPPED
34# define AI_V4MAPPED 0
35#endif
d247d25f 36
2af2bf67 37
d247d25f
AL
38static int inet_getport(struct addrinfo *e)
39{
40 struct sockaddr_in *i4;
41 struct sockaddr_in6 *i6;
42
43 switch (e->ai_family) {
44 case PF_INET6:
45 i6 = (void*)e->ai_addr;
46 return ntohs(i6->sin6_port);
47 case PF_INET:
48 i4 = (void*)e->ai_addr;
49 return ntohs(i4->sin_port);
50 default:
51 return 0;
52 }
53}
54
55static void inet_setport(struct addrinfo *e, int port)
56{
57 struct sockaddr_in *i4;
58 struct sockaddr_in6 *i6;
59
60 switch (e->ai_family) {
61 case PF_INET6:
62 i6 = (void*)e->ai_addr;
63 i6->sin6_port = htons(port);
64 break;
65 case PF_INET:
66 i4 = (void*)e->ai_addr;
67 i4->sin_port = htons(port);
68 break;
69 }
70}
71
a589569f
WX
72NetworkAddressFamily inet_netfamily(int family)
73{
74 switch (family) {
75 case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6;
76 case PF_INET: return NETWORK_ADDRESS_FAMILY_IPV4;
77 case PF_UNIX: return NETWORK_ADDRESS_FAMILY_UNIX;
78 }
79 return NETWORK_ADDRESS_FAMILY_UNKNOWN;
80}
81
1856835d
DB
82/*
83 * Matrix we're trying to apply
84 *
85 * ipv4 ipv6 family
86 * - - PF_UNSPEC
87 * - f PF_INET
88 * - t PF_INET6
89 * f - PF_INET6
90 * f f <error>
91 * f t PF_INET6
92 * t - PF_INET
93 * t f PF_INET
94 * t t PF_INET6
95 *
d43eda3d 96 * NB, this matrix is only about getting the necessary results
1856835d
DB
97 * from getaddrinfo(). Some of the cases require further work
98 * after reading results from getaddrinfo in order to fully
99 * apply the logic the end user wants. eg with the last case
100 * ipv4=t + ipv6=t + PF_INET6, getaddrinfo alone can only
101 * guarantee the ipv6=t part of the request - we need more
102 * checks to provide ipv4=t part of the guarantee. This is
103 * outside scope of this method and not currently handled by
104 * callers at all.
105 */
106static int inet_ai_family_from_address(InetSocketAddress *addr,
107 Error **errp)
108{
109 if (addr->has_ipv6 && addr->has_ipv4 &&
110 !addr->ipv6 && !addr->ipv4) {
111 error_setg(errp, "Cannot disable IPv4 and IPv6 at same time");
112 return PF_UNSPEC;
113 }
114 if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) {
115 return PF_INET6;
116 }
117 if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) {
118 return PF_INET;
119 }
120 return PF_UNSPEC;
121}
122
123static int inet_listen_saddr(InetSocketAddress *saddr,
124 int port_offset,
125 bool update_addr,
126 Error **errp)
d247d25f
AL
127{
128 struct addrinfo ai,*res,*e;
d247d25f
AL
129 char port[33];
130 char uaddr[INET6_ADDRSTRLEN+1];
131 char uport[33];
1856835d
DB
132 int slisten, rc, port_min, port_max, p;
133 Error *err = NULL;
d247d25f
AL
134
135 memset(&ai,0, sizeof(ai));
3de3d698 136 ai.ai_flags = AI_PASSIVE;
1856835d 137 ai.ai_family = inet_ai_family_from_address(saddr, &err);
e5bc776f 138 ai.ai_socktype = SOCK_STREAM;
d247d25f 139
1856835d
DB
140 if (err) {
141 error_propagate(errp, err);
142 return -1;
143 }
144
145 if (saddr->host == NULL) {
0983f5e6 146 error_setg(errp, "host not specified");
e5bc776f 147 return -1;
d247d25f 148 }
1856835d
DB
149 if (saddr->port != NULL) {
150 pstrcpy(port, sizeof(port), saddr->port);
0983f5e6
DB
151 } else {
152 port[0] = '\0';
153 }
d247d25f
AL
154
155 /* lookup */
8bc89127
GH
156 if (port_offset) {
157 unsigned long long baseport;
0983f5e6
DB
158 if (strlen(port) == 0) {
159 error_setg(errp, "port not specified");
160 return -1;
161 }
8bc89127
GH
162 if (parse_uint_full(port, &baseport, 10) < 0) {
163 error_setg(errp, "can't convert to a number: %s", port);
164 return -1;
165 }
166 if (baseport > 65535 ||
167 baseport + port_offset > 65535) {
168 error_setg(errp, "port %s out of range", port);
169 return -1;
170 }
171 snprintf(port, sizeof(port), "%d", (int)baseport + port_offset);
172 }
1856835d 173 rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL,
0983f5e6 174 strlen(port) ? port : NULL, &ai, &res);
d247d25f 175 if (rc != 0) {
1856835d
DB
176 error_setg(errp, "address resolution failed for %s:%s: %s",
177 saddr->host, port, gai_strerror(rc));
d247d25f
AL
178 return -1;
179 }
d247d25f
AL
180
181 /* create socket + bind */
182 for (e = res; e != NULL; e = e->ai_next) {
39b6efc8
VS
183 getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
184 uaddr,INET6_ADDRSTRLEN,uport,32,
185 NI_NUMERICHOST | NI_NUMERICSERV);
40ff6d7e 186 slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol);
39b6efc8 187 if (slisten < 0) {
029409e5 188 if (!e->ai_next) {
235256a2 189 error_setg_errno(errp, errno, "Failed to create socket");
029409e5 190 }
39b6efc8
VS
191 continue;
192 }
d247d25f 193
04fd1c78 194 socket_set_fast_reuse(slisten);
d247d25f
AL
195#ifdef IPV6_V6ONLY
196 if (e->ai_family == PF_INET6) {
197 /* listen on both ipv4 and ipv6 */
f9b5426f 198 const int off = 0;
9957fc7f
SW
199 qemu_setsockopt(slisten, IPPROTO_IPV6, IPV6_V6ONLY, &off,
200 sizeof(off));
d247d25f
AL
201 }
202#endif
203
877691f9 204 port_min = inet_getport(e);
1856835d 205 port_max = saddr->has_to ? saddr->to + port_offset : port_min;
877691f9
MA
206 for (p = port_min; p <= port_max; p++) {
207 inet_setport(e, p);
d247d25f 208 if (bind(slisten, e->ai_addr, e->ai_addrlen) == 0) {
d247d25f
AL
209 goto listen;
210 }
877691f9 211 if (p == port_max) {
029409e5 212 if (!e->ai_next) {
235256a2 213 error_setg_errno(errp, errno, "Failed to bind socket");
029409e5 214 }
d247d25f 215 }
d247d25f
AL
216 }
217 closesocket(slisten);
218 }
d247d25f
AL
219 freeaddrinfo(res);
220 return -1;
221
222listen:
223 if (listen(slisten,1) != 0) {
235256a2 224 error_setg_errno(errp, errno, "Failed to listen on socket");
d247d25f 225 closesocket(slisten);
39b6efc8 226 freeaddrinfo(res);
d247d25f
AL
227 return -1;
228 }
1856835d
DB
229 if (update_addr) {
230 g_free(saddr->host);
231 saddr->host = g_strdup(uaddr);
232 g_free(saddr->port);
233 saddr->port = g_strdup_printf("%d",
234 inet_getport(e) - port_offset);
235 saddr->has_ipv6 = saddr->ipv6 = e->ai_family == PF_INET6;
236 saddr->has_ipv4 = saddr->ipv4 = e->ai_family != PF_INET6;
237 }
d247d25f
AL
238 freeaddrinfo(res);
239 return slisten;
240}
241
05bc1d8a
MT
242#ifdef _WIN32
243#define QEMU_SOCKET_RC_INPROGRESS(rc) \
244 ((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY)
245#else
246#define QEMU_SOCKET_RC_INPROGRESS(rc) \
247 ((rc) == -EINPROGRESS)
248#endif
249
233aa5c2
OW
250/* Struct to store connect state for non blocking connect */
251typedef struct ConnectState {
252 int fd;
253 struct addrinfo *addr_list;
254 struct addrinfo *current_addr;
255 NonBlockingConnectHandler *callback;
256 void *opaque;
257} ConnectState;
258
259static int inet_connect_addr(struct addrinfo *addr, bool *in_progress,
11663b55 260 ConnectState *connect_state, Error **errp);
233aa5c2
OW
261
262static void wait_for_connect(void *opaque)
d247d25f 263{
233aa5c2
OW
264 ConnectState *s = opaque;
265 int val = 0, rc = 0;
266 socklen_t valsize = sizeof(val);
267 bool in_progress;
51795029 268 Error *err = NULL;
233aa5c2 269
82e1cc4b 270 qemu_set_fd_handler(s->fd, NULL, NULL, NULL);
233aa5c2
OW
271
272 do {
9957fc7f 273 rc = qemu_getsockopt(s->fd, SOL_SOCKET, SO_ERROR, &val, &valsize);
b16a44e1 274 } while (rc == -1 && errno == EINTR);
233aa5c2
OW
275
276 /* update rc to contain error */
277 if (!rc && val) {
278 rc = -1;
51795029 279 errno = val;
233aa5c2
OW
280 }
281
282 /* connect error */
283 if (rc < 0) {
51795029 284 error_setg_errno(&err, errno, "Error connecting to socket");
233aa5c2
OW
285 closesocket(s->fd);
286 s->fd = rc;
287 }
288
289 /* try to connect to the next address on the list */
1fc05adf
PB
290 if (s->current_addr) {
291 while (s->current_addr->ai_next != NULL && s->fd < 0) {
292 s->current_addr = s->current_addr->ai_next;
11663b55 293 s->fd = inet_connect_addr(s->current_addr, &in_progress, s, NULL);
51795029
CM
294 if (s->fd < 0) {
295 error_free(err);
296 err = NULL;
297 error_setg_errno(&err, errno, "Unable to start socket connect");
298 }
1fc05adf
PB
299 /* connect in progress */
300 if (in_progress) {
51795029 301 goto out;
1fc05adf 302 }
233aa5c2 303 }
1fc05adf
PB
304
305 freeaddrinfo(s->addr_list);
233aa5c2 306 }
05bc1d8a 307
233aa5c2 308 if (s->callback) {
51795029 309 s->callback(s->fd, err, s->opaque);
05bc1d8a 310 }
233aa5c2 311 g_free(s);
51795029
CM
312out:
313 error_free(err);
233aa5c2
OW
314}
315
316static int inet_connect_addr(struct addrinfo *addr, bool *in_progress,
11663b55 317 ConnectState *connect_state, Error **errp)
233aa5c2
OW
318{
319 int sock, rc;
320
321 *in_progress = false;
05bc1d8a
MT
322
323 sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
324 if (sock < 0) {
235256a2 325 error_setg_errno(errp, errno, "Failed to create socket");
05bc1d8a
MT
326 return -1;
327 }
04fd1c78 328 socket_set_fast_reuse(sock);
233aa5c2 329 if (connect_state != NULL) {
f9e8cacc 330 qemu_set_nonblock(sock);
05bc1d8a
MT
331 }
332 /* connect to peer */
333 do {
334 rc = 0;
335 if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) {
b16a44e1 336 rc = -errno;
05bc1d8a
MT
337 }
338 } while (rc == -EINTR);
339
233aa5c2
OW
340 if (connect_state != NULL && QEMU_SOCKET_RC_INPROGRESS(rc)) {
341 connect_state->fd = sock;
82e1cc4b 342 qemu_set_fd_handler(sock, NULL, wait_for_connect, connect_state);
233aa5c2 343 *in_progress = true;
05bc1d8a 344 } else if (rc < 0) {
235256a2 345 error_setg_errno(errp, errno, "Failed to connect socket");
05bc1d8a
MT
346 closesocket(sock);
347 return -1;
348 }
349 return sock;
350}
351
2942e420
DB
352static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr,
353 Error **errp)
05bc1d8a
MT
354{
355 struct addrinfo ai, *res;
356 int rc;
2942e420 357 Error *err = NULL;
340849a9 358 static int useV4Mapped = 1;
d247d25f 359
05bc1d8a 360 memset(&ai, 0, sizeof(ai));
233aa5c2 361
340849a9
DB
362 ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
363 if (atomic_read(&useV4Mapped)) {
364 ai.ai_flags |= AI_V4MAPPED;
365 }
2942e420 366 ai.ai_family = inet_ai_family_from_address(saddr, &err);
f4c94c7c 367 ai.ai_socktype = SOCK_STREAM;
d247d25f 368
2942e420
DB
369 if (err) {
370 error_propagate(errp, err);
05bc1d8a 371 return NULL;
d247d25f
AL
372 }
373
2942e420
DB
374 if (saddr->host == NULL || saddr->port == NULL) {
375 error_setg(errp, "host and/or port not specified");
376 return NULL;
05bc1d8a 377 }
d247d25f
AL
378
379 /* lookup */
2942e420 380 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
340849a9
DB
381
382 /* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but
383 * then don't implement it in their getaddrinfo(). Detect
384 * this and retry without the flag since that's preferrable
385 * to a fatal error
386 */
387 if (rc == EAI_BADFLAGS &&
388 (ai.ai_flags & AI_V4MAPPED)) {
389 atomic_set(&useV4Mapped, 0);
390 ai.ai_flags &= ~AI_V4MAPPED;
391 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
392 }
05bc1d8a 393 if (rc != 0) {
2942e420
DB
394 error_setg(errp, "address resolution failed for %s:%s: %s",
395 saddr->host, saddr->port, gai_strerror(rc));
05bc1d8a
MT
396 return NULL;
397 }
398 return res;
399}
400
5db5f44c
OW
401/**
402 * Create a socket and connect it to an address.
403 *
2942e420 404 * @saddr: Inet socket address specification
5db5f44c 405 * @errp: set on error
233aa5c2
OW
406 * @callback: callback function for non-blocking connect
407 * @opaque: opaque for callback function
5db5f44c
OW
408 *
409 * Returns: -1 on error, file descriptor on success.
233aa5c2
OW
410 *
411 * If @callback is non-null, the connect is non-blocking. If this
412 * function succeeds, callback will be called when the connection
413 * completes, with the file descriptor on success, or -1 on error.
5db5f44c 414 */
2942e420
DB
415static int inet_connect_saddr(InetSocketAddress *saddr, Error **errp,
416 NonBlockingConnectHandler *callback, void *opaque)
05bc1d8a 417{
3f9286b7 418 Error *local_err = NULL;
05bc1d8a
MT
419 struct addrinfo *res, *e;
420 int sock = -1;
233aa5c2
OW
421 bool in_progress;
422 ConnectState *connect_state = NULL;
05bc1d8a 423
2942e420 424 res = inet_parse_connect_saddr(saddr, errp);
05bc1d8a
MT
425 if (!res) {
426 return -1;
427 }
428
233aa5c2
OW
429 if (callback != NULL) {
430 connect_state = g_malloc0(sizeof(*connect_state));
431 connect_state->addr_list = res;
432 connect_state->callback = callback;
433 connect_state->opaque = opaque;
d247d25f 434 }
d247d25f
AL
435
436 for (e = res; e != NULL; e = e->ai_next) {
3f9286b7
MA
437 error_free(local_err);
438 local_err = NULL;
233aa5c2
OW
439 if (connect_state != NULL) {
440 connect_state->current_addr = e;
441 }
3f9286b7
MA
442 sock = inet_connect_addr(e, &in_progress, connect_state, &local_err);
443 if (sock >= 0) {
05bc1d8a 444 break;
a6ba35b3 445 }
d247d25f 446 }
3f9286b7
MA
447
448 if (sock < 0) {
449 error_propagate(errp, local_err);
450 } else if (in_progress) {
451 /* wait_for_connect() will do the rest */
452 return sock;
453 } else {
454 if (callback) {
51795029 455 callback(sock, NULL, opaque);
3f9286b7
MA
456 }
457 }
233aa5c2 458 g_free(connect_state);
d247d25f 459 freeaddrinfo(res);
05bc1d8a 460 return sock;
d247d25f
AL
461}
462
8b39910e
DB
463static int inet_dgram_saddr(InetSocketAddress *sraddr,
464 InetSocketAddress *sladdr,
465 Error **errp)
7e1b35b4
GH
466{
467 struct addrinfo ai, *peer = NULL, *local = NULL;
468 const char *addr;
469 const char *port;
7e1b35b4 470 int sock = -1, rc;
8b39910e 471 Error *err = NULL;
7e1b35b4
GH
472
473 /* lookup peer addr */
474 memset(&ai,0, sizeof(ai));
3de3d698 475 ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG;
8b39910e 476 ai.ai_family = inet_ai_family_from_address(sraddr, &err);
7e1b35b4
GH
477 ai.ai_socktype = SOCK_DGRAM;
478
8b39910e
DB
479 if (err) {
480 error_propagate(errp, err);
58c652c0 481 goto err;
8b39910e
DB
482 }
483
484 addr = sraddr->host;
485 port = sraddr->port;
7e1b35b4
GH
486 if (addr == NULL || strlen(addr) == 0) {
487 addr = "localhost";
488 }
489 if (port == NULL || strlen(port) == 0) {
4f085c82 490 error_setg(errp, "remote port not specified");
58c652c0 491 goto err;
7e1b35b4
GH
492 }
493
7e1b35b4 494 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) {
4f085c82
PB
495 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
496 gai_strerror(rc));
58c652c0 497 goto err;
7e1b35b4 498 }
7e1b35b4
GH
499
500 /* lookup local addr */
501 memset(&ai,0, sizeof(ai));
502 ai.ai_flags = AI_PASSIVE;
503 ai.ai_family = peer->ai_family;
504 ai.ai_socktype = SOCK_DGRAM;
505
8b39910e
DB
506 if (sladdr) {
507 addr = sladdr->host;
508 port = sladdr->port;
509 if (addr == NULL || strlen(addr) == 0) {
510 addr = NULL;
511 }
512 if (!port || strlen(port) == 0) {
513 port = "0";
514 }
515 } else {
7e1b35b4 516 addr = NULL;
7e1b35b4 517 port = "0";
8b39910e 518 }
7e1b35b4
GH
519
520 if (0 != (rc = getaddrinfo(addr, port, &ai, &local))) {
4f085c82
PB
521 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
522 gai_strerror(rc));
39b38459 523 goto err;
7e1b35b4 524 }
7e1b35b4
GH
525
526 /* create socket */
40ff6d7e 527 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol);
7e1b35b4 528 if (sock < 0) {
235256a2 529 error_setg_errno(errp, errno, "Failed to create socket");
7e1b35b4
GH
530 goto err;
531 }
04fd1c78 532 socket_set_fast_reuse(sock);
7e1b35b4
GH
533
534 /* bind socket */
7e1b35b4 535 if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) {
235256a2 536 error_setg_errno(errp, errno, "Failed to bind socket");
7e1b35b4
GH
537 goto err;
538 }
539
540 /* connect to peer */
7e1b35b4 541 if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) {
235256a2 542 error_setg_errno(errp, errno, "Failed to connect socket");
7e1b35b4
GH
543 goto err;
544 }
545
546 freeaddrinfo(local);
547 freeaddrinfo(peer);
548 return sock;
549
550err:
551 if (-1 != sock)
552 closesocket(sock);
553 if (local)
554 freeaddrinfo(local);
555 if (peer)
556 freeaddrinfo(peer);
557 return -1;
558}
559
f4c94c7c 560/* compatibility wrapper */
f17c90be 561InetSocketAddress *inet_parse(const char *str, Error **errp)
f4c94c7c 562{
879e45c7 563 InetSocketAddress *addr;
f4c94c7c 564 const char *optstr, *h;
55a10996 565 char host[65];
f4c94c7c 566 char port[33];
879e45c7 567 int to;
f4c94c7c
GH
568 int pos;
569
879e45c7
PB
570 addr = g_new0(InetSocketAddress, 1);
571
f4c94c7c
GH
572 /* parse address */
573 if (str[0] == ':') {
574 /* no host given */
879e45c7
PB
575 host[0] = '\0';
576 if (1 != sscanf(str, ":%32[^,]%n", port, &pos)) {
2f002c43 577 error_setg(errp, "error parsing port in address '%s'", str);
879e45c7 578 goto fail;
f4c94c7c
GH
579 }
580 } else if (str[0] == '[') {
581 /* IPv6 addr */
879e45c7 582 if (2 != sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos)) {
2f002c43 583 error_setg(errp, "error parsing IPv6 address '%s'", str);
879e45c7 584 goto fail;
f4c94c7c 585 }
879e45c7 586 addr->ipv6 = addr->has_ipv6 = true;
f4c94c7c 587 } else {
391b7b97 588 /* hostname or IPv4 addr */
879e45c7 589 if (2 != sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos)) {
2f002c43 590 error_setg(errp, "error parsing address '%s'", str);
879e45c7 591 goto fail;
f4c94c7c 592 }
391b7b97
JT
593 if (host[strspn(host, "0123456789.")] == '\0') {
594 addr->ipv4 = addr->has_ipv4 = true;
595 }
f4c94c7c 596 }
879e45c7
PB
597
598 addr->host = g_strdup(host);
599 addr->port = g_strdup(port);
f4c94c7c
GH
600
601 /* parse options */
602 optstr = str + pos;
603 h = strstr(optstr, ",to=");
879e45c7 604 if (h) {
1ccbc285
AP
605 h += 4;
606 if (sscanf(h, "%d%n", &to, &pos) != 1 ||
607 (h[pos] != '\0' && h[pos] != ',')) {
879e45c7
PB
608 error_setg(errp, "error parsing to= argument");
609 goto fail;
610 }
611 addr->has_to = true;
612 addr->to = to;
613 }
614 if (strstr(optstr, ",ipv4")) {
615 addr->ipv4 = addr->has_ipv4 = true;
616 }
617 if (strstr(optstr, ",ipv6")) {
618 addr->ipv6 = addr->has_ipv6 = true;
619 }
620 return addr;
621
622fail:
623 qapi_free_InetSocketAddress(addr);
624 return NULL;
625}
626
e5bc776f 627
5db5f44c
OW
628/**
629 * Create a blocking socket and connect it to an address.
630 *
631 * @str: address string
632 * @errp: set in case of an error
633 *
634 * Returns -1 in case of error, file descriptor on success
635 **/
636int inet_connect(const char *str, Error **errp)
f4c94c7c 637{
f4c94c7c 638 int sock = -1;
879e45c7 639 InetSocketAddress *addr;
f4c94c7c 640
879e45c7
PB
641 addr = inet_parse(str, errp);
642 if (addr != NULL) {
2942e420 643 sock = inet_connect_saddr(addr, errp, NULL, NULL);
879e45c7 644 qapi_free_InetSocketAddress(addr);
5db5f44c 645 }
5db5f44c
OW
646 return sock;
647}
648
d247d25f
AL
649#ifndef _WIN32
650
1856835d
DB
651static int unix_listen_saddr(UnixSocketAddress *saddr,
652 bool update_addr,
653 Error **errp)
d247d25f
AL
654{
655 struct sockaddr_un un;
62b6adfb 656 int sock, fd;
d247d25f 657
40ff6d7e 658 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 659 if (sock < 0) {
b658c53d 660 error_setg_errno(errp, errno, "Failed to create Unix socket");
39b6efc8 661 return -1;
d247d25f
AL
662 }
663
d247d25f
AL
664 memset(&un, 0, sizeof(un));
665 un.sun_family = AF_UNIX;
1856835d
DB
666 if (saddr->path && strlen(saddr->path)) {
667 snprintf(un.sun_path, sizeof(un.sun_path), "%s", saddr->path);
d247d25f 668 } else {
b658c53d
PB
669 const char *tmpdir = getenv("TMPDIR");
670 tmpdir = tmpdir ? tmpdir : "/tmp";
671 if (snprintf(un.sun_path, sizeof(un.sun_path), "%s/qemu-socket-XXXXXX",
672 tmpdir) >= sizeof(un.sun_path)) {
673 error_setg_errno(errp, errno,
674 "TMPDIR environment variable (%s) too large", tmpdir);
675 goto err;
676 }
677
d247d25f
AL
678 /*
679 * This dummy fd usage silences the mktemp() unsecure warning.
680 * Using mkstemp() doesn't make things more secure here
681 * though. bind() complains about existing files, so we have
682 * to unlink first and thus re-open the race window. The
683 * worst case possible is bind() failing, i.e. a DoS attack.
684 */
b658c53d
PB
685 fd = mkstemp(un.sun_path);
686 if (fd < 0) {
687 error_setg_errno(errp, errno,
688 "Failed to make a temporary socket name in %s", tmpdir);
689 goto err;
690 }
691 close(fd);
1856835d
DB
692 if (update_addr) {
693 g_free(saddr->path);
694 saddr->path = g_strdup(un.sun_path);
695 }
d247d25f 696 }
d247d25f 697
a2f31f18 698 if (unlink(un.sun_path) < 0 && errno != ENOENT) {
0ef705a2
CR
699 error_setg_errno(errp, errno,
700 "Failed to unlink socket %s", un.sun_path);
701 goto err;
702 }
d247d25f 703 if (bind(sock, (struct sockaddr*) &un, sizeof(un)) < 0) {
b658c53d 704 error_setg_errno(errp, errno, "Failed to bind socket to %s", un.sun_path);
d247d25f
AL
705 goto err;
706 }
707 if (listen(sock, 1) < 0) {
235256a2 708 error_setg_errno(errp, errno, "Failed to listen on socket");
d247d25f
AL
709 goto err;
710 }
711
d247d25f
AL
712 return sock;
713
714err:
d247d25f
AL
715 closesocket(sock);
716 return -1;
717}
718
2942e420
DB
719static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp,
720 NonBlockingConnectHandler *callback, void *opaque)
d247d25f
AL
721{
722 struct sockaddr_un un;
1fc05adf
PB
723 ConnectState *connect_state = NULL;
724 int sock, rc;
d247d25f 725
2942e420 726 if (saddr->path == NULL) {
312fd5f2 727 error_setg(errp, "unix connect: no path specified");
2af2bf67
GH
728 return -1;
729 }
730
40ff6d7e 731 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 732 if (sock < 0) {
235256a2 733 error_setg_errno(errp, errno, "Failed to create socket");
39b6efc8 734 return -1;
d247d25f 735 }
1fc05adf
PB
736 if (callback != NULL) {
737 connect_state = g_malloc0(sizeof(*connect_state));
738 connect_state->callback = callback;
739 connect_state->opaque = opaque;
f9e8cacc 740 qemu_set_nonblock(sock);
1fc05adf 741 }
d247d25f
AL
742
743 memset(&un, 0, sizeof(un));
744 un.sun_family = AF_UNIX;
2942e420 745 snprintf(un.sun_path, sizeof(un.sun_path), "%s", saddr->path);
1fc05adf
PB
746
747 /* connect to peer */
748 do {
749 rc = 0;
750 if (connect(sock, (struct sockaddr *) &un, sizeof(un)) < 0) {
b16a44e1 751 rc = -errno;
1fc05adf
PB
752 }
753 } while (rc == -EINTR);
754
755 if (connect_state != NULL && QEMU_SOCKET_RC_INPROGRESS(rc)) {
756 connect_state->fd = sock;
82e1cc4b 757 qemu_set_fd_handler(sock, NULL, wait_for_connect, connect_state);
1fc05adf
PB
758 return sock;
759 } else if (rc >= 0) {
760 /* non blocking socket immediate success, call callback */
761 if (callback != NULL) {
51795029 762 callback(sock, NULL, opaque);
1fc05adf
PB
763 }
764 }
765
766 if (rc < 0) {
235256a2 767 error_setg_errno(errp, -rc, "Failed to connect socket");
9d947472 768 close(sock);
1fc05adf 769 sock = -1;
d247d25f
AL
770 }
771
1fc05adf 772 g_free(connect_state);
d247d25f
AL
773 return sock;
774}
775
0c814709
PB
776#else
777
1856835d
DB
778static int unix_listen_saddr(UnixSocketAddress *saddr,
779 bool update_addr,
780 Error **errp)
0c814709 781{
58899664 782 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
783 errno = ENOTSUP;
784 return -1;
785}
786
2942e420
DB
787static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp,
788 NonBlockingConnectHandler *callback, void *opaque)
0c814709 789{
58899664 790 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
791 errno = ENOTSUP;
792 return -1;
793}
794#endif
795
2af2bf67 796/* compatibility wrapper */
7fc4e63e 797int unix_listen(const char *str, char *ostr, int olen, Error **errp)
62b6adfb 798{
62b6adfb
GH
799 char *path, *optstr;
800 int sock, len;
1856835d 801 UnixSocketAddress *saddr;
62b6adfb 802
1856835d 803 saddr = g_new0(UnixSocketAddress, 1);
62b6adfb
GH
804
805 optstr = strchr(str, ',');
806 if (optstr) {
807 len = optstr - str;
808 if (len) {
7267c094 809 path = g_malloc(len+1);
62b6adfb 810 snprintf(path, len+1, "%.*s", len, str);
1856835d 811 saddr->path = path;
62b6adfb
GH
812 }
813 } else {
1856835d 814 saddr->path = g_strdup(str);
62b6adfb
GH
815 }
816
1856835d 817 sock = unix_listen_saddr(saddr, true, errp);
62b6adfb
GH
818
819 if (sock != -1 && ostr)
1856835d
DB
820 snprintf(ostr, olen, "%s%s", saddr->path, optstr ? optstr : "");
821 qapi_free_UnixSocketAddress(saddr);
62b6adfb
GH
822 return sock;
823}
824
7fc4e63e 825int unix_connect(const char *path, Error **errp)
2af2bf67 826{
2942e420 827 UnixSocketAddress *saddr;
2af2bf67
GH
828 int sock;
829
2942e420
DB
830 saddr = g_new0(UnixSocketAddress, 1);
831 saddr->path = g_strdup(path);
832 sock = unix_connect_saddr(saddr, errp, NULL, NULL);
833 qapi_free_UnixSocketAddress(saddr);
1fc05adf
PB
834 return sock;
835}
836
837
101f9cbc
PB
838SocketAddress *socket_parse(const char *str, Error **errp)
839{
afde3f8b 840 SocketAddress *addr;
101f9cbc 841
afde3f8b 842 addr = g_new0(SocketAddress, 1);
101f9cbc
PB
843 if (strstart(str, "unix:", NULL)) {
844 if (str[5] == '\0') {
312fd5f2 845 error_setg(errp, "invalid Unix socket address");
101f9cbc
PB
846 goto fail;
847 } else {
2d32adda 848 addr->type = SOCKET_ADDRESS_KIND_UNIX;
32bafa8f
EB
849 addr->u.q_unix.data = g_new(UnixSocketAddress, 1);
850 addr->u.q_unix.data->path = g_strdup(str + 5);
101f9cbc
PB
851 }
852 } else if (strstart(str, "fd:", NULL)) {
853 if (str[3] == '\0') {
312fd5f2 854 error_setg(errp, "invalid file descriptor address");
101f9cbc
PB
855 goto fail;
856 } else {
2d32adda 857 addr->type = SOCKET_ADDRESS_KIND_FD;
32bafa8f
EB
858 addr->u.fd.data = g_new(String, 1);
859 addr->u.fd.data->str = g_strdup(str + 3);
101f9cbc
PB
860 }
861 } else {
2d32adda 862 addr->type = SOCKET_ADDRESS_KIND_INET;
32bafa8f
EB
863 addr->u.inet.data = inet_parse(str, errp);
864 if (addr->u.inet.data == NULL) {
101f9cbc
PB
865 goto fail;
866 }
867 }
868 return addr;
869
870fail:
871 qapi_free_SocketAddress(addr);
872 return NULL;
873}
874
875int socket_connect(SocketAddress *addr, Error **errp,
876 NonBlockingConnectHandler *callback, void *opaque)
877{
101f9cbc
PB
878 int fd;
879
2d32adda 880 switch (addr->type) {
101f9cbc 881 case SOCKET_ADDRESS_KIND_INET:
32bafa8f 882 fd = inet_connect_saddr(addr->u.inet.data, errp, callback, opaque);
101f9cbc
PB
883 break;
884
885 case SOCKET_ADDRESS_KIND_UNIX:
32bafa8f 886 fd = unix_connect_saddr(addr->u.q_unix.data, errp, callback, opaque);
101f9cbc
PB
887 break;
888
889 case SOCKET_ADDRESS_KIND_FD:
32bafa8f 890 fd = monitor_get_fd(cur_mon, addr->u.fd.data->str, errp);
d1ec72a4 891 if (fd >= 0 && callback) {
1a751ebf 892 qemu_set_nonblock(fd);
51795029 893 callback(fd, NULL, opaque);
101f9cbc
PB
894 }
895 break;
896
897 default:
898 abort();
899 }
101f9cbc
PB
900 return fd;
901}
902
903int socket_listen(SocketAddress *addr, Error **errp)
904{
101f9cbc
PB
905 int fd;
906
2d32adda 907 switch (addr->type) {
101f9cbc 908 case SOCKET_ADDRESS_KIND_INET:
32bafa8f 909 fd = inet_listen_saddr(addr->u.inet.data, 0, false, errp);
101f9cbc
PB
910 break;
911
912 case SOCKET_ADDRESS_KIND_UNIX:
32bafa8f 913 fd = unix_listen_saddr(addr->u.q_unix.data, false, errp);
101f9cbc
PB
914 break;
915
916 case SOCKET_ADDRESS_KIND_FD:
32bafa8f 917 fd = monitor_get_fd(cur_mon, addr->u.fd.data->str, errp);
101f9cbc
PB
918 break;
919
920 default:
921 abort();
922 }
101f9cbc
PB
923 return fd;
924}
925
74b6ce43
MAL
926void socket_listen_cleanup(int fd, Error **errp)
927{
928 SocketAddress *addr;
929
930 addr = socket_local_address(fd, errp);
931
932 if (addr->type == SOCKET_ADDRESS_KIND_UNIX
933 && addr->u.q_unix.data->path) {
934 if (unlink(addr->u.q_unix.data->path) < 0 && errno != ENOENT) {
935 error_setg_errno(errp, errno,
936 "Failed to unlink socket %s",
937 addr->u.q_unix.data->path);
938 }
939 }
940
73f40c18 941 qapi_free_SocketAddress(addr);
74b6ce43
MAL
942}
943
3ecc059d
GH
944int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp)
945{
3ecc059d
GH
946 int fd;
947
2d32adda 948 switch (remote->type) {
3ecc059d 949 case SOCKET_ADDRESS_KIND_INET:
32bafa8f
EB
950 fd = inet_dgram_saddr(remote->u.inet.data,
951 local ? local->u.inet.data : NULL, errp);
3ecc059d
GH
952 break;
953
954 default:
955 error_setg(errp, "socket type unsupported for datagram");
7a5b6af1 956 fd = -1;
3ecc059d 957 }
3ecc059d
GH
958 return fd;
959}
17c55dec
DB
960
961
962static SocketAddress *
963socket_sockaddr_to_address_inet(struct sockaddr_storage *sa,
964 socklen_t salen,
965 Error **errp)
966{
967 char host[NI_MAXHOST];
968 char serv[NI_MAXSERV];
969 SocketAddress *addr;
0399293e 970 InetSocketAddress *inet;
17c55dec
DB
971 int ret;
972
973 ret = getnameinfo((struct sockaddr *)sa, salen,
974 host, sizeof(host),
975 serv, sizeof(serv),
976 NI_NUMERICHOST | NI_NUMERICSERV);
977 if (ret != 0) {
978 error_setg(errp, "Cannot format numeric socket address: %s",
979 gai_strerror(ret));
980 return NULL;
981 }
982
983 addr = g_new0(SocketAddress, 1);
2d32adda 984 addr->type = SOCKET_ADDRESS_KIND_INET;
32bafa8f 985 inet = addr->u.inet.data = g_new0(InetSocketAddress, 1);
0399293e
EB
986 inet->host = g_strdup(host);
987 inet->port = g_strdup(serv);
17c55dec 988 if (sa->ss_family == AF_INET) {
0399293e 989 inet->has_ipv4 = inet->ipv4 = true;
17c55dec 990 } else {
0399293e 991 inet->has_ipv6 = inet->ipv6 = true;
17c55dec
DB
992 }
993
994 return addr;
995}
996
997
998#ifndef WIN32
999static SocketAddress *
1000socket_sockaddr_to_address_unix(struct sockaddr_storage *sa,
1001 socklen_t salen,
1002 Error **errp)
1003{
1004 SocketAddress *addr;
1005 struct sockaddr_un *su = (struct sockaddr_un *)sa;
1006
1007 addr = g_new0(SocketAddress, 1);
2d32adda 1008 addr->type = SOCKET_ADDRESS_KIND_UNIX;
32bafa8f 1009 addr->u.q_unix.data = g_new0(UnixSocketAddress, 1);
17c55dec 1010 if (su->sun_path[0]) {
32bafa8f
EB
1011 addr->u.q_unix.data->path = g_strndup(su->sun_path,
1012 sizeof(su->sun_path));
17c55dec
DB
1013 }
1014
1015 return addr;
1016}
1017#endif /* WIN32 */
1018
559607ea 1019SocketAddress *
17c55dec
DB
1020socket_sockaddr_to_address(struct sockaddr_storage *sa,
1021 socklen_t salen,
1022 Error **errp)
1023{
1024 switch (sa->ss_family) {
1025 case AF_INET:
1026 case AF_INET6:
1027 return socket_sockaddr_to_address_inet(sa, salen, errp);
1028
1029#ifndef WIN32
1030 case AF_UNIX:
1031 return socket_sockaddr_to_address_unix(sa, salen, errp);
1032#endif /* WIN32 */
1033
1034 default:
1035 error_setg(errp, "socket family %d unsupported",
1036 sa->ss_family);
1037 return NULL;
1038 }
1039 return 0;
1040}
1041
1042
1043SocketAddress *socket_local_address(int fd, Error **errp)
1044{
1045 struct sockaddr_storage ss;
1046 socklen_t sslen = sizeof(ss);
1047
1048 if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1049 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1050 "Unable to query local socket address");
1051 return NULL;
1052 }
1053
1054 return socket_sockaddr_to_address(&ss, sslen, errp);
1055}
1056
1057
1058SocketAddress *socket_remote_address(int fd, Error **errp)
1059{
1060 struct sockaddr_storage ss;
1061 socklen_t sslen = sizeof(ss);
1062
1063 if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1064 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1065 "Unable to query remote socket address");
1066 return NULL;
1067 }
1068
1069 return socket_sockaddr_to_address(&ss, sslen, errp);
1070}
2a8e21c7 1071
7e844959
AA
1072char *socket_address_to_string(struct SocketAddress *addr, Error **errp)
1073{
1074 char *buf;
1075 InetSocketAddress *inet;
1076 char host_port[INET6_ADDRSTRLEN + 5 + 4];
1077
1078 switch (addr->type) {
1079 case SOCKET_ADDRESS_KIND_INET:
1080 inet = addr->u.inet.data;
1081 if (strchr(inet->host, ':') == NULL) {
1082 snprintf(host_port, sizeof(host_port), "%s:%s", inet->host,
1083 inet->port);
1084 buf = g_strdup(host_port);
1085 } else {
1086 snprintf(host_port, sizeof(host_port), "[%s]:%s", inet->host,
1087 inet->port);
1088 buf = g_strdup(host_port);
1089 }
1090 break;
1091
1092 case SOCKET_ADDRESS_KIND_UNIX:
1093 buf = g_strdup(addr->u.q_unix.data->path);
1094 break;
1095
1096 case SOCKET_ADDRESS_KIND_FD:
1097 buf = g_strdup(addr->u.fd.data->str);
1098 break;
1099
1100 default:
1101 error_setg(errp, "socket family %d unsupported",
1102 addr->type);
1103 return NULL;
1104 }
1105 return buf;
1106}