]>
Commit | Line | Data |
---|---|---|
305b0eb2 AL |
1 | /* |
2 | * inet and unix socket functions for qemu | |
3 | * | |
4 | * (c) 2008 Gerd Hoffmann <kraxel@redhat.com> | |
5 | * | |
6 | * This program is free software; you can redistribute it and/or modify | |
7 | * it under the terms of the GNU General Public License as published by | |
8 | * the Free Software Foundation; under version 2 of the License. | |
9 | * | |
10 | * This program is distributed in the hope that it will be useful, | |
11 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
12 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
13 | * GNU General Public License for more details. | |
e6d91ab6 PB |
14 | * |
15 | * Contributions after 2012-01-13 are licensed under the terms of the | |
16 | * GNU GPL, version 2 or (at your option) any later version. | |
305b0eb2 | 17 | */ |
aafd7584 | 18 | #include "qemu/osdep.h" |
d247d25f | 19 | |
83c9089e | 20 | #include "monitor/monitor.h" |
da34e65c | 21 | #include "qapi/error.h" |
1de7afc9 | 22 | #include "qemu/sockets.h" |
1de7afc9 | 23 | #include "qemu/main-loop.h" |
2a8e21c7 DB |
24 | #include "qapi/qmp-input-visitor.h" |
25 | #include "qapi/qmp-output-visitor.h" | |
26 | #include "qapi-visit.h" | |
f348b6d1 | 27 | #include "qemu/cutils.h" |
d247d25f AL |
28 | |
29 | #ifndef AI_ADDRCONFIG | |
30 | # define AI_ADDRCONFIG 0 | |
31 | #endif | |
340849a9 | 32 | |
3de3d698 WB |
33 | #ifndef AI_V4MAPPED |
34 | # define AI_V4MAPPED 0 | |
35 | #endif | |
d247d25f | 36 | |
2af2bf67 | 37 | |
d247d25f AL |
38 | static int inet_getport(struct addrinfo *e) |
39 | { | |
40 | struct sockaddr_in *i4; | |
41 | struct sockaddr_in6 *i6; | |
42 | ||
43 | switch (e->ai_family) { | |
44 | case PF_INET6: | |
45 | i6 = (void*)e->ai_addr; | |
46 | return ntohs(i6->sin6_port); | |
47 | case PF_INET: | |
48 | i4 = (void*)e->ai_addr; | |
49 | return ntohs(i4->sin_port); | |
50 | default: | |
51 | return 0; | |
52 | } | |
53 | } | |
54 | ||
55 | static void inet_setport(struct addrinfo *e, int port) | |
56 | { | |
57 | struct sockaddr_in *i4; | |
58 | struct sockaddr_in6 *i6; | |
59 | ||
60 | switch (e->ai_family) { | |
61 | case PF_INET6: | |
62 | i6 = (void*)e->ai_addr; | |
63 | i6->sin6_port = htons(port); | |
64 | break; | |
65 | case PF_INET: | |
66 | i4 = (void*)e->ai_addr; | |
67 | i4->sin_port = htons(port); | |
68 | break; | |
69 | } | |
70 | } | |
71 | ||
a589569f WX |
72 | NetworkAddressFamily inet_netfamily(int family) |
73 | { | |
74 | switch (family) { | |
75 | case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6; | |
76 | case PF_INET: return NETWORK_ADDRESS_FAMILY_IPV4; | |
77 | case PF_UNIX: return NETWORK_ADDRESS_FAMILY_UNIX; | |
78 | } | |
79 | return NETWORK_ADDRESS_FAMILY_UNKNOWN; | |
80 | } | |
81 | ||
1856835d DB |
82 | /* |
83 | * Matrix we're trying to apply | |
84 | * | |
85 | * ipv4 ipv6 family | |
86 | * - - PF_UNSPEC | |
87 | * - f PF_INET | |
88 | * - t PF_INET6 | |
89 | * f - PF_INET6 | |
90 | * f f <error> | |
91 | * f t PF_INET6 | |
92 | * t - PF_INET | |
93 | * t f PF_INET | |
94 | * t t PF_INET6 | |
95 | * | |
d43eda3d | 96 | * NB, this matrix is only about getting the necessary results |
1856835d DB |
97 | * from getaddrinfo(). Some of the cases require further work |
98 | * after reading results from getaddrinfo in order to fully | |
99 | * apply the logic the end user wants. eg with the last case | |
100 | * ipv4=t + ipv6=t + PF_INET6, getaddrinfo alone can only | |
101 | * guarantee the ipv6=t part of the request - we need more | |
102 | * checks to provide ipv4=t part of the guarantee. This is | |
103 | * outside scope of this method and not currently handled by | |
104 | * callers at all. | |
105 | */ | |
106 | static int inet_ai_family_from_address(InetSocketAddress *addr, | |
107 | Error **errp) | |
108 | { | |
109 | if (addr->has_ipv6 && addr->has_ipv4 && | |
110 | !addr->ipv6 && !addr->ipv4) { | |
111 | error_setg(errp, "Cannot disable IPv4 and IPv6 at same time"); | |
112 | return PF_UNSPEC; | |
113 | } | |
114 | if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) { | |
115 | return PF_INET6; | |
116 | } | |
117 | if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) { | |
118 | return PF_INET; | |
119 | } | |
120 | return PF_UNSPEC; | |
121 | } | |
122 | ||
123 | static int inet_listen_saddr(InetSocketAddress *saddr, | |
124 | int port_offset, | |
125 | bool update_addr, | |
126 | Error **errp) | |
d247d25f AL |
127 | { |
128 | struct addrinfo ai,*res,*e; | |
d247d25f AL |
129 | char port[33]; |
130 | char uaddr[INET6_ADDRSTRLEN+1]; | |
131 | char uport[33]; | |
1856835d DB |
132 | int slisten, rc, port_min, port_max, p; |
133 | Error *err = NULL; | |
d247d25f AL |
134 | |
135 | memset(&ai,0, sizeof(ai)); | |
3de3d698 | 136 | ai.ai_flags = AI_PASSIVE; |
1856835d | 137 | ai.ai_family = inet_ai_family_from_address(saddr, &err); |
e5bc776f | 138 | ai.ai_socktype = SOCK_STREAM; |
d247d25f | 139 | |
1856835d DB |
140 | if (err) { |
141 | error_propagate(errp, err); | |
142 | return -1; | |
143 | } | |
144 | ||
145 | if (saddr->host == NULL) { | |
0983f5e6 | 146 | error_setg(errp, "host not specified"); |
e5bc776f | 147 | return -1; |
d247d25f | 148 | } |
1856835d DB |
149 | if (saddr->port != NULL) { |
150 | pstrcpy(port, sizeof(port), saddr->port); | |
0983f5e6 DB |
151 | } else { |
152 | port[0] = '\0'; | |
153 | } | |
d247d25f AL |
154 | |
155 | /* lookup */ | |
8bc89127 GH |
156 | if (port_offset) { |
157 | unsigned long long baseport; | |
0983f5e6 DB |
158 | if (strlen(port) == 0) { |
159 | error_setg(errp, "port not specified"); | |
160 | return -1; | |
161 | } | |
8bc89127 GH |
162 | if (parse_uint_full(port, &baseport, 10) < 0) { |
163 | error_setg(errp, "can't convert to a number: %s", port); | |
164 | return -1; | |
165 | } | |
166 | if (baseport > 65535 || | |
167 | baseport + port_offset > 65535) { | |
168 | error_setg(errp, "port %s out of range", port); | |
169 | return -1; | |
170 | } | |
171 | snprintf(port, sizeof(port), "%d", (int)baseport + port_offset); | |
172 | } | |
1856835d | 173 | rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL, |
0983f5e6 | 174 | strlen(port) ? port : NULL, &ai, &res); |
d247d25f | 175 | if (rc != 0) { |
1856835d DB |
176 | error_setg(errp, "address resolution failed for %s:%s: %s", |
177 | saddr->host, port, gai_strerror(rc)); | |
d247d25f AL |
178 | return -1; |
179 | } | |
d247d25f AL |
180 | |
181 | /* create socket + bind */ | |
182 | for (e = res; e != NULL; e = e->ai_next) { | |
39b6efc8 VS |
183 | getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen, |
184 | uaddr,INET6_ADDRSTRLEN,uport,32, | |
185 | NI_NUMERICHOST | NI_NUMERICSERV); | |
40ff6d7e | 186 | slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol); |
39b6efc8 | 187 | if (slisten < 0) { |
029409e5 | 188 | if (!e->ai_next) { |
235256a2 | 189 | error_setg_errno(errp, errno, "Failed to create socket"); |
029409e5 | 190 | } |
39b6efc8 VS |
191 | continue; |
192 | } | |
d247d25f | 193 | |
04fd1c78 | 194 | socket_set_fast_reuse(slisten); |
d247d25f AL |
195 | #ifdef IPV6_V6ONLY |
196 | if (e->ai_family == PF_INET6) { | |
197 | /* listen on both ipv4 and ipv6 */ | |
f9b5426f | 198 | const int off = 0; |
9957fc7f SW |
199 | qemu_setsockopt(slisten, IPPROTO_IPV6, IPV6_V6ONLY, &off, |
200 | sizeof(off)); | |
d247d25f AL |
201 | } |
202 | #endif | |
203 | ||
877691f9 | 204 | port_min = inet_getport(e); |
1856835d | 205 | port_max = saddr->has_to ? saddr->to + port_offset : port_min; |
877691f9 MA |
206 | for (p = port_min; p <= port_max; p++) { |
207 | inet_setport(e, p); | |
d247d25f | 208 | if (bind(slisten, e->ai_addr, e->ai_addrlen) == 0) { |
d247d25f AL |
209 | goto listen; |
210 | } | |
877691f9 | 211 | if (p == port_max) { |
029409e5 | 212 | if (!e->ai_next) { |
235256a2 | 213 | error_setg_errno(errp, errno, "Failed to bind socket"); |
029409e5 | 214 | } |
d247d25f | 215 | } |
d247d25f AL |
216 | } |
217 | closesocket(slisten); | |
218 | } | |
d247d25f AL |
219 | freeaddrinfo(res); |
220 | return -1; | |
221 | ||
222 | listen: | |
223 | if (listen(slisten,1) != 0) { | |
235256a2 | 224 | error_setg_errno(errp, errno, "Failed to listen on socket"); |
d247d25f | 225 | closesocket(slisten); |
39b6efc8 | 226 | freeaddrinfo(res); |
d247d25f AL |
227 | return -1; |
228 | } | |
1856835d DB |
229 | if (update_addr) { |
230 | g_free(saddr->host); | |
231 | saddr->host = g_strdup(uaddr); | |
232 | g_free(saddr->port); | |
233 | saddr->port = g_strdup_printf("%d", | |
234 | inet_getport(e) - port_offset); | |
235 | saddr->has_ipv6 = saddr->ipv6 = e->ai_family == PF_INET6; | |
236 | saddr->has_ipv4 = saddr->ipv4 = e->ai_family != PF_INET6; | |
237 | } | |
d247d25f AL |
238 | freeaddrinfo(res); |
239 | return slisten; | |
240 | } | |
241 | ||
05bc1d8a MT |
242 | #ifdef _WIN32 |
243 | #define QEMU_SOCKET_RC_INPROGRESS(rc) \ | |
244 | ((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY) | |
245 | #else | |
246 | #define QEMU_SOCKET_RC_INPROGRESS(rc) \ | |
247 | ((rc) == -EINPROGRESS) | |
248 | #endif | |
249 | ||
233aa5c2 OW |
250 | /* Struct to store connect state for non blocking connect */ |
251 | typedef struct ConnectState { | |
252 | int fd; | |
253 | struct addrinfo *addr_list; | |
254 | struct addrinfo *current_addr; | |
255 | NonBlockingConnectHandler *callback; | |
256 | void *opaque; | |
257 | } ConnectState; | |
258 | ||
259 | static int inet_connect_addr(struct addrinfo *addr, bool *in_progress, | |
11663b55 | 260 | ConnectState *connect_state, Error **errp); |
233aa5c2 OW |
261 | |
262 | static void wait_for_connect(void *opaque) | |
d247d25f | 263 | { |
233aa5c2 OW |
264 | ConnectState *s = opaque; |
265 | int val = 0, rc = 0; | |
266 | socklen_t valsize = sizeof(val); | |
267 | bool in_progress; | |
51795029 | 268 | Error *err = NULL; |
233aa5c2 | 269 | |
82e1cc4b | 270 | qemu_set_fd_handler(s->fd, NULL, NULL, NULL); |
233aa5c2 OW |
271 | |
272 | do { | |
9957fc7f | 273 | rc = qemu_getsockopt(s->fd, SOL_SOCKET, SO_ERROR, &val, &valsize); |
b16a44e1 | 274 | } while (rc == -1 && errno == EINTR); |
233aa5c2 OW |
275 | |
276 | /* update rc to contain error */ | |
277 | if (!rc && val) { | |
278 | rc = -1; | |
51795029 | 279 | errno = val; |
233aa5c2 OW |
280 | } |
281 | ||
282 | /* connect error */ | |
283 | if (rc < 0) { | |
51795029 | 284 | error_setg_errno(&err, errno, "Error connecting to socket"); |
233aa5c2 OW |
285 | closesocket(s->fd); |
286 | s->fd = rc; | |
287 | } | |
288 | ||
289 | /* try to connect to the next address on the list */ | |
1fc05adf PB |
290 | if (s->current_addr) { |
291 | while (s->current_addr->ai_next != NULL && s->fd < 0) { | |
292 | s->current_addr = s->current_addr->ai_next; | |
11663b55 | 293 | s->fd = inet_connect_addr(s->current_addr, &in_progress, s, NULL); |
51795029 CM |
294 | if (s->fd < 0) { |
295 | error_free(err); | |
296 | err = NULL; | |
297 | error_setg_errno(&err, errno, "Unable to start socket connect"); | |
298 | } | |
1fc05adf PB |
299 | /* connect in progress */ |
300 | if (in_progress) { | |
51795029 | 301 | goto out; |
1fc05adf | 302 | } |
233aa5c2 | 303 | } |
1fc05adf PB |
304 | |
305 | freeaddrinfo(s->addr_list); | |
233aa5c2 | 306 | } |
05bc1d8a | 307 | |
233aa5c2 | 308 | if (s->callback) { |
51795029 | 309 | s->callback(s->fd, err, s->opaque); |
05bc1d8a | 310 | } |
233aa5c2 | 311 | g_free(s); |
51795029 CM |
312 | out: |
313 | error_free(err); | |
233aa5c2 OW |
314 | } |
315 | ||
316 | static int inet_connect_addr(struct addrinfo *addr, bool *in_progress, | |
11663b55 | 317 | ConnectState *connect_state, Error **errp) |
233aa5c2 OW |
318 | { |
319 | int sock, rc; | |
320 | ||
321 | *in_progress = false; | |
05bc1d8a MT |
322 | |
323 | sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol); | |
324 | if (sock < 0) { | |
235256a2 | 325 | error_setg_errno(errp, errno, "Failed to create socket"); |
05bc1d8a MT |
326 | return -1; |
327 | } | |
04fd1c78 | 328 | socket_set_fast_reuse(sock); |
233aa5c2 | 329 | if (connect_state != NULL) { |
f9e8cacc | 330 | qemu_set_nonblock(sock); |
05bc1d8a MT |
331 | } |
332 | /* connect to peer */ | |
333 | do { | |
334 | rc = 0; | |
335 | if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) { | |
b16a44e1 | 336 | rc = -errno; |
05bc1d8a MT |
337 | } |
338 | } while (rc == -EINTR); | |
339 | ||
233aa5c2 OW |
340 | if (connect_state != NULL && QEMU_SOCKET_RC_INPROGRESS(rc)) { |
341 | connect_state->fd = sock; | |
82e1cc4b | 342 | qemu_set_fd_handler(sock, NULL, wait_for_connect, connect_state); |
233aa5c2 | 343 | *in_progress = true; |
05bc1d8a | 344 | } else if (rc < 0) { |
235256a2 | 345 | error_setg_errno(errp, errno, "Failed to connect socket"); |
05bc1d8a MT |
346 | closesocket(sock); |
347 | return -1; | |
348 | } | |
349 | return sock; | |
350 | } | |
351 | ||
2942e420 DB |
352 | static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr, |
353 | Error **errp) | |
05bc1d8a MT |
354 | { |
355 | struct addrinfo ai, *res; | |
356 | int rc; | |
2942e420 | 357 | Error *err = NULL; |
340849a9 | 358 | static int useV4Mapped = 1; |
d247d25f | 359 | |
05bc1d8a | 360 | memset(&ai, 0, sizeof(ai)); |
233aa5c2 | 361 | |
340849a9 DB |
362 | ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG; |
363 | if (atomic_read(&useV4Mapped)) { | |
364 | ai.ai_flags |= AI_V4MAPPED; | |
365 | } | |
2942e420 | 366 | ai.ai_family = inet_ai_family_from_address(saddr, &err); |
f4c94c7c | 367 | ai.ai_socktype = SOCK_STREAM; |
d247d25f | 368 | |
2942e420 DB |
369 | if (err) { |
370 | error_propagate(errp, err); | |
05bc1d8a | 371 | return NULL; |
d247d25f AL |
372 | } |
373 | ||
2942e420 DB |
374 | if (saddr->host == NULL || saddr->port == NULL) { |
375 | error_setg(errp, "host and/or port not specified"); | |
376 | return NULL; | |
05bc1d8a | 377 | } |
d247d25f AL |
378 | |
379 | /* lookup */ | |
2942e420 | 380 | rc = getaddrinfo(saddr->host, saddr->port, &ai, &res); |
340849a9 DB |
381 | |
382 | /* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but | |
383 | * then don't implement it in their getaddrinfo(). Detect | |
384 | * this and retry without the flag since that's preferrable | |
385 | * to a fatal error | |
386 | */ | |
387 | if (rc == EAI_BADFLAGS && | |
388 | (ai.ai_flags & AI_V4MAPPED)) { | |
389 | atomic_set(&useV4Mapped, 0); | |
390 | ai.ai_flags &= ~AI_V4MAPPED; | |
391 | rc = getaddrinfo(saddr->host, saddr->port, &ai, &res); | |
392 | } | |
05bc1d8a | 393 | if (rc != 0) { |
2942e420 DB |
394 | error_setg(errp, "address resolution failed for %s:%s: %s", |
395 | saddr->host, saddr->port, gai_strerror(rc)); | |
05bc1d8a MT |
396 | return NULL; |
397 | } | |
398 | return res; | |
399 | } | |
400 | ||
5db5f44c OW |
401 | /** |
402 | * Create a socket and connect it to an address. | |
403 | * | |
2942e420 | 404 | * @saddr: Inet socket address specification |
5db5f44c | 405 | * @errp: set on error |
233aa5c2 OW |
406 | * @callback: callback function for non-blocking connect |
407 | * @opaque: opaque for callback function | |
5db5f44c OW |
408 | * |
409 | * Returns: -1 on error, file descriptor on success. | |
233aa5c2 OW |
410 | * |
411 | * If @callback is non-null, the connect is non-blocking. If this | |
412 | * function succeeds, callback will be called when the connection | |
413 | * completes, with the file descriptor on success, or -1 on error. | |
5db5f44c | 414 | */ |
2942e420 DB |
415 | static int inet_connect_saddr(InetSocketAddress *saddr, Error **errp, |
416 | NonBlockingConnectHandler *callback, void *opaque) | |
05bc1d8a | 417 | { |
3f9286b7 | 418 | Error *local_err = NULL; |
05bc1d8a MT |
419 | struct addrinfo *res, *e; |
420 | int sock = -1; | |
233aa5c2 OW |
421 | bool in_progress; |
422 | ConnectState *connect_state = NULL; | |
05bc1d8a | 423 | |
2942e420 | 424 | res = inet_parse_connect_saddr(saddr, errp); |
05bc1d8a MT |
425 | if (!res) { |
426 | return -1; | |
427 | } | |
428 | ||
233aa5c2 OW |
429 | if (callback != NULL) { |
430 | connect_state = g_malloc0(sizeof(*connect_state)); | |
431 | connect_state->addr_list = res; | |
432 | connect_state->callback = callback; | |
433 | connect_state->opaque = opaque; | |
d247d25f | 434 | } |
d247d25f AL |
435 | |
436 | for (e = res; e != NULL; e = e->ai_next) { | |
3f9286b7 MA |
437 | error_free(local_err); |
438 | local_err = NULL; | |
233aa5c2 OW |
439 | if (connect_state != NULL) { |
440 | connect_state->current_addr = e; | |
441 | } | |
3f9286b7 MA |
442 | sock = inet_connect_addr(e, &in_progress, connect_state, &local_err); |
443 | if (sock >= 0) { | |
05bc1d8a | 444 | break; |
a6ba35b3 | 445 | } |
d247d25f | 446 | } |
3f9286b7 MA |
447 | |
448 | if (sock < 0) { | |
449 | error_propagate(errp, local_err); | |
450 | } else if (in_progress) { | |
451 | /* wait_for_connect() will do the rest */ | |
452 | return sock; | |
453 | } else { | |
454 | if (callback) { | |
51795029 | 455 | callback(sock, NULL, opaque); |
3f9286b7 MA |
456 | } |
457 | } | |
233aa5c2 | 458 | g_free(connect_state); |
d247d25f | 459 | freeaddrinfo(res); |
05bc1d8a | 460 | return sock; |
d247d25f AL |
461 | } |
462 | ||
8b39910e DB |
463 | static int inet_dgram_saddr(InetSocketAddress *sraddr, |
464 | InetSocketAddress *sladdr, | |
465 | Error **errp) | |
7e1b35b4 GH |
466 | { |
467 | struct addrinfo ai, *peer = NULL, *local = NULL; | |
468 | const char *addr; | |
469 | const char *port; | |
7e1b35b4 | 470 | int sock = -1, rc; |
8b39910e | 471 | Error *err = NULL; |
7e1b35b4 GH |
472 | |
473 | /* lookup peer addr */ | |
474 | memset(&ai,0, sizeof(ai)); | |
3de3d698 | 475 | ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG; |
8b39910e | 476 | ai.ai_family = inet_ai_family_from_address(sraddr, &err); |
7e1b35b4 GH |
477 | ai.ai_socktype = SOCK_DGRAM; |
478 | ||
8b39910e DB |
479 | if (err) { |
480 | error_propagate(errp, err); | |
58c652c0 | 481 | goto err; |
8b39910e DB |
482 | } |
483 | ||
484 | addr = sraddr->host; | |
485 | port = sraddr->port; | |
7e1b35b4 GH |
486 | if (addr == NULL || strlen(addr) == 0) { |
487 | addr = "localhost"; | |
488 | } | |
489 | if (port == NULL || strlen(port) == 0) { | |
4f085c82 | 490 | error_setg(errp, "remote port not specified"); |
58c652c0 | 491 | goto err; |
7e1b35b4 GH |
492 | } |
493 | ||
7e1b35b4 | 494 | if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) { |
4f085c82 PB |
495 | error_setg(errp, "address resolution failed for %s:%s: %s", addr, port, |
496 | gai_strerror(rc)); | |
58c652c0 | 497 | goto err; |
7e1b35b4 | 498 | } |
7e1b35b4 GH |
499 | |
500 | /* lookup local addr */ | |
501 | memset(&ai,0, sizeof(ai)); | |
502 | ai.ai_flags = AI_PASSIVE; | |
503 | ai.ai_family = peer->ai_family; | |
504 | ai.ai_socktype = SOCK_DGRAM; | |
505 | ||
8b39910e DB |
506 | if (sladdr) { |
507 | addr = sladdr->host; | |
508 | port = sladdr->port; | |
509 | if (addr == NULL || strlen(addr) == 0) { | |
510 | addr = NULL; | |
511 | } | |
512 | if (!port || strlen(port) == 0) { | |
513 | port = "0"; | |
514 | } | |
515 | } else { | |
7e1b35b4 | 516 | addr = NULL; |
7e1b35b4 | 517 | port = "0"; |
8b39910e | 518 | } |
7e1b35b4 GH |
519 | |
520 | if (0 != (rc = getaddrinfo(addr, port, &ai, &local))) { | |
4f085c82 PB |
521 | error_setg(errp, "address resolution failed for %s:%s: %s", addr, port, |
522 | gai_strerror(rc)); | |
39b38459 | 523 | goto err; |
7e1b35b4 | 524 | } |
7e1b35b4 GH |
525 | |
526 | /* create socket */ | |
40ff6d7e | 527 | sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol); |
7e1b35b4 | 528 | if (sock < 0) { |
235256a2 | 529 | error_setg_errno(errp, errno, "Failed to create socket"); |
7e1b35b4 GH |
530 | goto err; |
531 | } | |
04fd1c78 | 532 | socket_set_fast_reuse(sock); |
7e1b35b4 GH |
533 | |
534 | /* bind socket */ | |
7e1b35b4 | 535 | if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) { |
235256a2 | 536 | error_setg_errno(errp, errno, "Failed to bind socket"); |
7e1b35b4 GH |
537 | goto err; |
538 | } | |
539 | ||
540 | /* connect to peer */ | |
7e1b35b4 | 541 | if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) { |
235256a2 | 542 | error_setg_errno(errp, errno, "Failed to connect socket"); |
7e1b35b4 GH |
543 | goto err; |
544 | } | |
545 | ||
546 | freeaddrinfo(local); | |
547 | freeaddrinfo(peer); | |
548 | return sock; | |
549 | ||
550 | err: | |
551 | if (-1 != sock) | |
552 | closesocket(sock); | |
553 | if (local) | |
554 | freeaddrinfo(local); | |
555 | if (peer) | |
556 | freeaddrinfo(peer); | |
557 | return -1; | |
558 | } | |
559 | ||
f4c94c7c | 560 | /* compatibility wrapper */ |
f17c90be | 561 | InetSocketAddress *inet_parse(const char *str, Error **errp) |
f4c94c7c | 562 | { |
879e45c7 | 563 | InetSocketAddress *addr; |
f4c94c7c | 564 | const char *optstr, *h; |
55a10996 | 565 | char host[65]; |
f4c94c7c | 566 | char port[33]; |
879e45c7 | 567 | int to; |
f4c94c7c GH |
568 | int pos; |
569 | ||
879e45c7 PB |
570 | addr = g_new0(InetSocketAddress, 1); |
571 | ||
f4c94c7c GH |
572 | /* parse address */ |
573 | if (str[0] == ':') { | |
574 | /* no host given */ | |
879e45c7 PB |
575 | host[0] = '\0'; |
576 | if (1 != sscanf(str, ":%32[^,]%n", port, &pos)) { | |
2f002c43 | 577 | error_setg(errp, "error parsing port in address '%s'", str); |
879e45c7 | 578 | goto fail; |
f4c94c7c GH |
579 | } |
580 | } else if (str[0] == '[') { | |
581 | /* IPv6 addr */ | |
879e45c7 | 582 | if (2 != sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos)) { |
2f002c43 | 583 | error_setg(errp, "error parsing IPv6 address '%s'", str); |
879e45c7 | 584 | goto fail; |
f4c94c7c | 585 | } |
879e45c7 | 586 | addr->ipv6 = addr->has_ipv6 = true; |
f4c94c7c | 587 | } else { |
391b7b97 | 588 | /* hostname or IPv4 addr */ |
879e45c7 | 589 | if (2 != sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos)) { |
2f002c43 | 590 | error_setg(errp, "error parsing address '%s'", str); |
879e45c7 | 591 | goto fail; |
f4c94c7c | 592 | } |
391b7b97 JT |
593 | if (host[strspn(host, "0123456789.")] == '\0') { |
594 | addr->ipv4 = addr->has_ipv4 = true; | |
595 | } | |
f4c94c7c | 596 | } |
879e45c7 PB |
597 | |
598 | addr->host = g_strdup(host); | |
599 | addr->port = g_strdup(port); | |
f4c94c7c GH |
600 | |
601 | /* parse options */ | |
602 | optstr = str + pos; | |
603 | h = strstr(optstr, ",to="); | |
879e45c7 | 604 | if (h) { |
1ccbc285 AP |
605 | h += 4; |
606 | if (sscanf(h, "%d%n", &to, &pos) != 1 || | |
607 | (h[pos] != '\0' && h[pos] != ',')) { | |
879e45c7 PB |
608 | error_setg(errp, "error parsing to= argument"); |
609 | goto fail; | |
610 | } | |
611 | addr->has_to = true; | |
612 | addr->to = to; | |
613 | } | |
614 | if (strstr(optstr, ",ipv4")) { | |
615 | addr->ipv4 = addr->has_ipv4 = true; | |
616 | } | |
617 | if (strstr(optstr, ",ipv6")) { | |
618 | addr->ipv6 = addr->has_ipv6 = true; | |
619 | } | |
620 | return addr; | |
621 | ||
622 | fail: | |
623 | qapi_free_InetSocketAddress(addr); | |
624 | return NULL; | |
625 | } | |
626 | ||
e5bc776f | 627 | |
5db5f44c OW |
628 | /** |
629 | * Create a blocking socket and connect it to an address. | |
630 | * | |
631 | * @str: address string | |
632 | * @errp: set in case of an error | |
633 | * | |
634 | * Returns -1 in case of error, file descriptor on success | |
635 | **/ | |
636 | int inet_connect(const char *str, Error **errp) | |
f4c94c7c | 637 | { |
f4c94c7c | 638 | int sock = -1; |
879e45c7 | 639 | InetSocketAddress *addr; |
f4c94c7c | 640 | |
879e45c7 PB |
641 | addr = inet_parse(str, errp); |
642 | if (addr != NULL) { | |
2942e420 | 643 | sock = inet_connect_saddr(addr, errp, NULL, NULL); |
879e45c7 | 644 | qapi_free_InetSocketAddress(addr); |
5db5f44c | 645 | } |
5db5f44c OW |
646 | return sock; |
647 | } | |
648 | ||
d247d25f AL |
649 | #ifndef _WIN32 |
650 | ||
1856835d DB |
651 | static int unix_listen_saddr(UnixSocketAddress *saddr, |
652 | bool update_addr, | |
653 | Error **errp) | |
d247d25f AL |
654 | { |
655 | struct sockaddr_un un; | |
62b6adfb | 656 | int sock, fd; |
d247d25f | 657 | |
40ff6d7e | 658 | sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0); |
d247d25f | 659 | if (sock < 0) { |
b658c53d | 660 | error_setg_errno(errp, errno, "Failed to create Unix socket"); |
39b6efc8 | 661 | return -1; |
d247d25f AL |
662 | } |
663 | ||
d247d25f AL |
664 | memset(&un, 0, sizeof(un)); |
665 | un.sun_family = AF_UNIX; | |
1856835d DB |
666 | if (saddr->path && strlen(saddr->path)) { |
667 | snprintf(un.sun_path, sizeof(un.sun_path), "%s", saddr->path); | |
d247d25f | 668 | } else { |
b658c53d PB |
669 | const char *tmpdir = getenv("TMPDIR"); |
670 | tmpdir = tmpdir ? tmpdir : "/tmp"; | |
671 | if (snprintf(un.sun_path, sizeof(un.sun_path), "%s/qemu-socket-XXXXXX", | |
672 | tmpdir) >= sizeof(un.sun_path)) { | |
673 | error_setg_errno(errp, errno, | |
674 | "TMPDIR environment variable (%s) too large", tmpdir); | |
675 | goto err; | |
676 | } | |
677 | ||
d247d25f AL |
678 | /* |
679 | * This dummy fd usage silences the mktemp() unsecure warning. | |
680 | * Using mkstemp() doesn't make things more secure here | |
681 | * though. bind() complains about existing files, so we have | |
682 | * to unlink first and thus re-open the race window. The | |
683 | * worst case possible is bind() failing, i.e. a DoS attack. | |
684 | */ | |
b658c53d PB |
685 | fd = mkstemp(un.sun_path); |
686 | if (fd < 0) { | |
687 | error_setg_errno(errp, errno, | |
688 | "Failed to make a temporary socket name in %s", tmpdir); | |
689 | goto err; | |
690 | } | |
691 | close(fd); | |
1856835d DB |
692 | if (update_addr) { |
693 | g_free(saddr->path); | |
694 | saddr->path = g_strdup(un.sun_path); | |
695 | } | |
d247d25f | 696 | } |
d247d25f | 697 | |
a2f31f18 | 698 | if (unlink(un.sun_path) < 0 && errno != ENOENT) { |
0ef705a2 CR |
699 | error_setg_errno(errp, errno, |
700 | "Failed to unlink socket %s", un.sun_path); | |
701 | goto err; | |
702 | } | |
d247d25f | 703 | if (bind(sock, (struct sockaddr*) &un, sizeof(un)) < 0) { |
b658c53d | 704 | error_setg_errno(errp, errno, "Failed to bind socket to %s", un.sun_path); |
d247d25f AL |
705 | goto err; |
706 | } | |
707 | if (listen(sock, 1) < 0) { | |
235256a2 | 708 | error_setg_errno(errp, errno, "Failed to listen on socket"); |
d247d25f AL |
709 | goto err; |
710 | } | |
711 | ||
d247d25f AL |
712 | return sock; |
713 | ||
714 | err: | |
d247d25f AL |
715 | closesocket(sock); |
716 | return -1; | |
717 | } | |
718 | ||
2942e420 DB |
719 | static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp, |
720 | NonBlockingConnectHandler *callback, void *opaque) | |
d247d25f AL |
721 | { |
722 | struct sockaddr_un un; | |
1fc05adf PB |
723 | ConnectState *connect_state = NULL; |
724 | int sock, rc; | |
d247d25f | 725 | |
2942e420 | 726 | if (saddr->path == NULL) { |
312fd5f2 | 727 | error_setg(errp, "unix connect: no path specified"); |
2af2bf67 GH |
728 | return -1; |
729 | } | |
730 | ||
40ff6d7e | 731 | sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0); |
d247d25f | 732 | if (sock < 0) { |
235256a2 | 733 | error_setg_errno(errp, errno, "Failed to create socket"); |
39b6efc8 | 734 | return -1; |
d247d25f | 735 | } |
1fc05adf PB |
736 | if (callback != NULL) { |
737 | connect_state = g_malloc0(sizeof(*connect_state)); | |
738 | connect_state->callback = callback; | |
739 | connect_state->opaque = opaque; | |
f9e8cacc | 740 | qemu_set_nonblock(sock); |
1fc05adf | 741 | } |
d247d25f AL |
742 | |
743 | memset(&un, 0, sizeof(un)); | |
744 | un.sun_family = AF_UNIX; | |
2942e420 | 745 | snprintf(un.sun_path, sizeof(un.sun_path), "%s", saddr->path); |
1fc05adf PB |
746 | |
747 | /* connect to peer */ | |
748 | do { | |
749 | rc = 0; | |
750 | if (connect(sock, (struct sockaddr *) &un, sizeof(un)) < 0) { | |
b16a44e1 | 751 | rc = -errno; |
1fc05adf PB |
752 | } |
753 | } while (rc == -EINTR); | |
754 | ||
755 | if (connect_state != NULL && QEMU_SOCKET_RC_INPROGRESS(rc)) { | |
756 | connect_state->fd = sock; | |
82e1cc4b | 757 | qemu_set_fd_handler(sock, NULL, wait_for_connect, connect_state); |
1fc05adf PB |
758 | return sock; |
759 | } else if (rc >= 0) { | |
760 | /* non blocking socket immediate success, call callback */ | |
761 | if (callback != NULL) { | |
51795029 | 762 | callback(sock, NULL, opaque); |
1fc05adf PB |
763 | } |
764 | } | |
765 | ||
766 | if (rc < 0) { | |
235256a2 | 767 | error_setg_errno(errp, -rc, "Failed to connect socket"); |
9d947472 | 768 | close(sock); |
1fc05adf | 769 | sock = -1; |
d247d25f AL |
770 | } |
771 | ||
1fc05adf | 772 | g_free(connect_state); |
d247d25f AL |
773 | return sock; |
774 | } | |
775 | ||
0c814709 PB |
776 | #else |
777 | ||
1856835d DB |
778 | static int unix_listen_saddr(UnixSocketAddress *saddr, |
779 | bool update_addr, | |
780 | Error **errp) | |
0c814709 | 781 | { |
58899664 | 782 | error_setg(errp, "unix sockets are not available on windows"); |
0c814709 PB |
783 | errno = ENOTSUP; |
784 | return -1; | |
785 | } | |
786 | ||
2942e420 DB |
787 | static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp, |
788 | NonBlockingConnectHandler *callback, void *opaque) | |
0c814709 | 789 | { |
58899664 | 790 | error_setg(errp, "unix sockets are not available on windows"); |
0c814709 PB |
791 | errno = ENOTSUP; |
792 | return -1; | |
793 | } | |
794 | #endif | |
795 | ||
2af2bf67 | 796 | /* compatibility wrapper */ |
7fc4e63e | 797 | int unix_listen(const char *str, char *ostr, int olen, Error **errp) |
62b6adfb | 798 | { |
62b6adfb GH |
799 | char *path, *optstr; |
800 | int sock, len; | |
1856835d | 801 | UnixSocketAddress *saddr; |
62b6adfb | 802 | |
1856835d | 803 | saddr = g_new0(UnixSocketAddress, 1); |
62b6adfb GH |
804 | |
805 | optstr = strchr(str, ','); | |
806 | if (optstr) { | |
807 | len = optstr - str; | |
808 | if (len) { | |
7267c094 | 809 | path = g_malloc(len+1); |
62b6adfb | 810 | snprintf(path, len+1, "%.*s", len, str); |
1856835d | 811 | saddr->path = path; |
62b6adfb GH |
812 | } |
813 | } else { | |
1856835d | 814 | saddr->path = g_strdup(str); |
62b6adfb GH |
815 | } |
816 | ||
1856835d | 817 | sock = unix_listen_saddr(saddr, true, errp); |
62b6adfb GH |
818 | |
819 | if (sock != -1 && ostr) | |
1856835d DB |
820 | snprintf(ostr, olen, "%s%s", saddr->path, optstr ? optstr : ""); |
821 | qapi_free_UnixSocketAddress(saddr); | |
62b6adfb GH |
822 | return sock; |
823 | } | |
824 | ||
7fc4e63e | 825 | int unix_connect(const char *path, Error **errp) |
2af2bf67 | 826 | { |
2942e420 | 827 | UnixSocketAddress *saddr; |
2af2bf67 GH |
828 | int sock; |
829 | ||
2942e420 DB |
830 | saddr = g_new0(UnixSocketAddress, 1); |
831 | saddr->path = g_strdup(path); | |
832 | sock = unix_connect_saddr(saddr, errp, NULL, NULL); | |
833 | qapi_free_UnixSocketAddress(saddr); | |
1fc05adf PB |
834 | return sock; |
835 | } | |
836 | ||
837 | ||
101f9cbc PB |
838 | SocketAddress *socket_parse(const char *str, Error **errp) |
839 | { | |
afde3f8b | 840 | SocketAddress *addr; |
101f9cbc | 841 | |
afde3f8b | 842 | addr = g_new0(SocketAddress, 1); |
101f9cbc PB |
843 | if (strstart(str, "unix:", NULL)) { |
844 | if (str[5] == '\0') { | |
312fd5f2 | 845 | error_setg(errp, "invalid Unix socket address"); |
101f9cbc PB |
846 | goto fail; |
847 | } else { | |
2d32adda | 848 | addr->type = SOCKET_ADDRESS_KIND_UNIX; |
32bafa8f EB |
849 | addr->u.q_unix.data = g_new(UnixSocketAddress, 1); |
850 | addr->u.q_unix.data->path = g_strdup(str + 5); | |
101f9cbc PB |
851 | } |
852 | } else if (strstart(str, "fd:", NULL)) { | |
853 | if (str[3] == '\0') { | |
312fd5f2 | 854 | error_setg(errp, "invalid file descriptor address"); |
101f9cbc PB |
855 | goto fail; |
856 | } else { | |
2d32adda | 857 | addr->type = SOCKET_ADDRESS_KIND_FD; |
32bafa8f EB |
858 | addr->u.fd.data = g_new(String, 1); |
859 | addr->u.fd.data->str = g_strdup(str + 3); | |
101f9cbc PB |
860 | } |
861 | } else { | |
2d32adda | 862 | addr->type = SOCKET_ADDRESS_KIND_INET; |
32bafa8f EB |
863 | addr->u.inet.data = inet_parse(str, errp); |
864 | if (addr->u.inet.data == NULL) { | |
101f9cbc PB |
865 | goto fail; |
866 | } | |
867 | } | |
868 | return addr; | |
869 | ||
870 | fail: | |
871 | qapi_free_SocketAddress(addr); | |
872 | return NULL; | |
873 | } | |
874 | ||
875 | int socket_connect(SocketAddress *addr, Error **errp, | |
876 | NonBlockingConnectHandler *callback, void *opaque) | |
877 | { | |
101f9cbc PB |
878 | int fd; |
879 | ||
2d32adda | 880 | switch (addr->type) { |
101f9cbc | 881 | case SOCKET_ADDRESS_KIND_INET: |
32bafa8f | 882 | fd = inet_connect_saddr(addr->u.inet.data, errp, callback, opaque); |
101f9cbc PB |
883 | break; |
884 | ||
885 | case SOCKET_ADDRESS_KIND_UNIX: | |
32bafa8f | 886 | fd = unix_connect_saddr(addr->u.q_unix.data, errp, callback, opaque); |
101f9cbc PB |
887 | break; |
888 | ||
889 | case SOCKET_ADDRESS_KIND_FD: | |
32bafa8f | 890 | fd = monitor_get_fd(cur_mon, addr->u.fd.data->str, errp); |
d1ec72a4 | 891 | if (fd >= 0 && callback) { |
1a751ebf | 892 | qemu_set_nonblock(fd); |
51795029 | 893 | callback(fd, NULL, opaque); |
101f9cbc PB |
894 | } |
895 | break; | |
896 | ||
897 | default: | |
898 | abort(); | |
899 | } | |
101f9cbc PB |
900 | return fd; |
901 | } | |
902 | ||
903 | int socket_listen(SocketAddress *addr, Error **errp) | |
904 | { | |
101f9cbc PB |
905 | int fd; |
906 | ||
2d32adda | 907 | switch (addr->type) { |
101f9cbc | 908 | case SOCKET_ADDRESS_KIND_INET: |
32bafa8f | 909 | fd = inet_listen_saddr(addr->u.inet.data, 0, false, errp); |
101f9cbc PB |
910 | break; |
911 | ||
912 | case SOCKET_ADDRESS_KIND_UNIX: | |
32bafa8f | 913 | fd = unix_listen_saddr(addr->u.q_unix.data, false, errp); |
101f9cbc PB |
914 | break; |
915 | ||
916 | case SOCKET_ADDRESS_KIND_FD: | |
32bafa8f | 917 | fd = monitor_get_fd(cur_mon, addr->u.fd.data->str, errp); |
101f9cbc PB |
918 | break; |
919 | ||
920 | default: | |
921 | abort(); | |
922 | } | |
101f9cbc PB |
923 | return fd; |
924 | } | |
925 | ||
74b6ce43 MAL |
926 | void socket_listen_cleanup(int fd, Error **errp) |
927 | { | |
928 | SocketAddress *addr; | |
929 | ||
930 | addr = socket_local_address(fd, errp); | |
931 | ||
932 | if (addr->type == SOCKET_ADDRESS_KIND_UNIX | |
933 | && addr->u.q_unix.data->path) { | |
934 | if (unlink(addr->u.q_unix.data->path) < 0 && errno != ENOENT) { | |
935 | error_setg_errno(errp, errno, | |
936 | "Failed to unlink socket %s", | |
937 | addr->u.q_unix.data->path); | |
938 | } | |
939 | } | |
940 | ||
73f40c18 | 941 | qapi_free_SocketAddress(addr); |
74b6ce43 MAL |
942 | } |
943 | ||
3ecc059d GH |
944 | int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp) |
945 | { | |
3ecc059d GH |
946 | int fd; |
947 | ||
2d32adda | 948 | switch (remote->type) { |
3ecc059d | 949 | case SOCKET_ADDRESS_KIND_INET: |
32bafa8f EB |
950 | fd = inet_dgram_saddr(remote->u.inet.data, |
951 | local ? local->u.inet.data : NULL, errp); | |
3ecc059d GH |
952 | break; |
953 | ||
954 | default: | |
955 | error_setg(errp, "socket type unsupported for datagram"); | |
7a5b6af1 | 956 | fd = -1; |
3ecc059d | 957 | } |
3ecc059d GH |
958 | return fd; |
959 | } | |
17c55dec DB |
960 | |
961 | ||
962 | static SocketAddress * | |
963 | socket_sockaddr_to_address_inet(struct sockaddr_storage *sa, | |
964 | socklen_t salen, | |
965 | Error **errp) | |
966 | { | |
967 | char host[NI_MAXHOST]; | |
968 | char serv[NI_MAXSERV]; | |
969 | SocketAddress *addr; | |
0399293e | 970 | InetSocketAddress *inet; |
17c55dec DB |
971 | int ret; |
972 | ||
973 | ret = getnameinfo((struct sockaddr *)sa, salen, | |
974 | host, sizeof(host), | |
975 | serv, sizeof(serv), | |
976 | NI_NUMERICHOST | NI_NUMERICSERV); | |
977 | if (ret != 0) { | |
978 | error_setg(errp, "Cannot format numeric socket address: %s", | |
979 | gai_strerror(ret)); | |
980 | return NULL; | |
981 | } | |
982 | ||
983 | addr = g_new0(SocketAddress, 1); | |
2d32adda | 984 | addr->type = SOCKET_ADDRESS_KIND_INET; |
32bafa8f | 985 | inet = addr->u.inet.data = g_new0(InetSocketAddress, 1); |
0399293e EB |
986 | inet->host = g_strdup(host); |
987 | inet->port = g_strdup(serv); | |
17c55dec | 988 | if (sa->ss_family == AF_INET) { |
0399293e | 989 | inet->has_ipv4 = inet->ipv4 = true; |
17c55dec | 990 | } else { |
0399293e | 991 | inet->has_ipv6 = inet->ipv6 = true; |
17c55dec DB |
992 | } |
993 | ||
994 | return addr; | |
995 | } | |
996 | ||
997 | ||
998 | #ifndef WIN32 | |
999 | static SocketAddress * | |
1000 | socket_sockaddr_to_address_unix(struct sockaddr_storage *sa, | |
1001 | socklen_t salen, | |
1002 | Error **errp) | |
1003 | { | |
1004 | SocketAddress *addr; | |
1005 | struct sockaddr_un *su = (struct sockaddr_un *)sa; | |
1006 | ||
1007 | addr = g_new0(SocketAddress, 1); | |
2d32adda | 1008 | addr->type = SOCKET_ADDRESS_KIND_UNIX; |
32bafa8f | 1009 | addr->u.q_unix.data = g_new0(UnixSocketAddress, 1); |
17c55dec | 1010 | if (su->sun_path[0]) { |
32bafa8f EB |
1011 | addr->u.q_unix.data->path = g_strndup(su->sun_path, |
1012 | sizeof(su->sun_path)); | |
17c55dec DB |
1013 | } |
1014 | ||
1015 | return addr; | |
1016 | } | |
1017 | #endif /* WIN32 */ | |
1018 | ||
559607ea | 1019 | SocketAddress * |
17c55dec DB |
1020 | socket_sockaddr_to_address(struct sockaddr_storage *sa, |
1021 | socklen_t salen, | |
1022 | Error **errp) | |
1023 | { | |
1024 | switch (sa->ss_family) { | |
1025 | case AF_INET: | |
1026 | case AF_INET6: | |
1027 | return socket_sockaddr_to_address_inet(sa, salen, errp); | |
1028 | ||
1029 | #ifndef WIN32 | |
1030 | case AF_UNIX: | |
1031 | return socket_sockaddr_to_address_unix(sa, salen, errp); | |
1032 | #endif /* WIN32 */ | |
1033 | ||
1034 | default: | |
1035 | error_setg(errp, "socket family %d unsupported", | |
1036 | sa->ss_family); | |
1037 | return NULL; | |
1038 | } | |
1039 | return 0; | |
1040 | } | |
1041 | ||
1042 | ||
1043 | SocketAddress *socket_local_address(int fd, Error **errp) | |
1044 | { | |
1045 | struct sockaddr_storage ss; | |
1046 | socklen_t sslen = sizeof(ss); | |
1047 | ||
1048 | if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) { | |
b16a44e1 | 1049 | error_setg_errno(errp, errno, "%s", |
17c55dec DB |
1050 | "Unable to query local socket address"); |
1051 | return NULL; | |
1052 | } | |
1053 | ||
1054 | return socket_sockaddr_to_address(&ss, sslen, errp); | |
1055 | } | |
1056 | ||
1057 | ||
1058 | SocketAddress *socket_remote_address(int fd, Error **errp) | |
1059 | { | |
1060 | struct sockaddr_storage ss; | |
1061 | socklen_t sslen = sizeof(ss); | |
1062 | ||
1063 | if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) { | |
b16a44e1 | 1064 | error_setg_errno(errp, errno, "%s", |
17c55dec DB |
1065 | "Unable to query remote socket address"); |
1066 | return NULL; | |
1067 | } | |
1068 | ||
1069 | return socket_sockaddr_to_address(&ss, sslen, errp); | |
1070 | } | |
2a8e21c7 | 1071 | |
7e844959 AA |
1072 | char *socket_address_to_string(struct SocketAddress *addr, Error **errp) |
1073 | { | |
1074 | char *buf; | |
1075 | InetSocketAddress *inet; | |
1076 | char host_port[INET6_ADDRSTRLEN + 5 + 4]; | |
1077 | ||
1078 | switch (addr->type) { | |
1079 | case SOCKET_ADDRESS_KIND_INET: | |
1080 | inet = addr->u.inet.data; | |
1081 | if (strchr(inet->host, ':') == NULL) { | |
1082 | snprintf(host_port, sizeof(host_port), "%s:%s", inet->host, | |
1083 | inet->port); | |
1084 | buf = g_strdup(host_port); | |
1085 | } else { | |
1086 | snprintf(host_port, sizeof(host_port), "[%s]:%s", inet->host, | |
1087 | inet->port); | |
1088 | buf = g_strdup(host_port); | |
1089 | } | |
1090 | break; | |
1091 | ||
1092 | case SOCKET_ADDRESS_KIND_UNIX: | |
1093 | buf = g_strdup(addr->u.q_unix.data->path); | |
1094 | break; | |
1095 | ||
1096 | case SOCKET_ADDRESS_KIND_FD: | |
1097 | buf = g_strdup(addr->u.fd.data->str); | |
1098 | break; | |
1099 | ||
1100 | default: | |
1101 | error_setg(errp, "socket family %d unsupported", | |
1102 | addr->type); | |
1103 | return NULL; | |
1104 | } | |
1105 | return buf; | |
1106 | } |