]> git.proxmox.com Git - mirror_qemu.git/blame - util/qemu-sockets.c
Merge remote-tracking branch 'remotes/ehabkost/tags/x86-next-pull-request' into staging
[mirror_qemu.git] / util / qemu-sockets.c
CommitLineData
305b0eb2
AL
1/*
2 * inet and unix socket functions for qemu
3 *
4 * (c) 2008 Gerd Hoffmann <kraxel@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 of the License.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
e6d91ab6
PB
14 *
15 * Contributions after 2012-01-13 are licensed under the terms of the
16 * GNU GPL, version 2 or (at your option) any later version.
305b0eb2 17 */
aafd7584 18#include "qemu/osdep.h"
d247d25f 19
6a02c806
SH
20#ifdef CONFIG_AF_VSOCK
21#include <linux/vm_sockets.h>
22#endif /* CONFIG_AF_VSOCK */
23
83c9089e 24#include "monitor/monitor.h"
bd269ebc 25#include "qapi/clone-visitor.h"
da34e65c 26#include "qapi/error.h"
9af23989 27#include "qapi/qapi-visit-sockets.h"
1de7afc9 28#include "qemu/sockets.h"
1de7afc9 29#include "qemu/main-loop.h"
b3db211f
DB
30#include "qapi/qobject-input-visitor.h"
31#include "qapi/qobject-output-visitor.h"
f348b6d1 32#include "qemu/cutils.h"
d247d25f
AL
33
34#ifndef AI_ADDRCONFIG
35# define AI_ADDRCONFIG 0
36#endif
340849a9 37
3de3d698
WB
38#ifndef AI_V4MAPPED
39# define AI_V4MAPPED 0
40#endif
d247d25f 41
6979a813
DB
42#ifndef AI_NUMERICSERV
43# define AI_NUMERICSERV 0
44#endif
45
2af2bf67 46
d247d25f
AL
47static int inet_getport(struct addrinfo *e)
48{
49 struct sockaddr_in *i4;
50 struct sockaddr_in6 *i6;
51
52 switch (e->ai_family) {
53 case PF_INET6:
54 i6 = (void*)e->ai_addr;
55 return ntohs(i6->sin6_port);
56 case PF_INET:
57 i4 = (void*)e->ai_addr;
58 return ntohs(i4->sin_port);
59 default:
60 return 0;
61 }
62}
63
64static void inet_setport(struct addrinfo *e, int port)
65{
66 struct sockaddr_in *i4;
67 struct sockaddr_in6 *i6;
68
69 switch (e->ai_family) {
70 case PF_INET6:
71 i6 = (void*)e->ai_addr;
72 i6->sin6_port = htons(port);
73 break;
74 case PF_INET:
75 i4 = (void*)e->ai_addr;
76 i4->sin_port = htons(port);
77 break;
78 }
79}
80
a589569f
WX
81NetworkAddressFamily inet_netfamily(int family)
82{
83 switch (family) {
84 case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6;
85 case PF_INET: return NETWORK_ADDRESS_FAMILY_IPV4;
86 case PF_UNIX: return NETWORK_ADDRESS_FAMILY_UNIX;
6a02c806
SH
87#ifdef CONFIG_AF_VSOCK
88 case PF_VSOCK: return NETWORK_ADDRESS_FAMILY_VSOCK;
89#endif /* CONFIG_AF_VSOCK */
a589569f
WX
90 }
91 return NETWORK_ADDRESS_FAMILY_UNKNOWN;
92}
93
1856835d
DB
94/*
95 * Matrix we're trying to apply
96 *
97 * ipv4 ipv6 family
98 * - - PF_UNSPEC
99 * - f PF_INET
100 * - t PF_INET6
101 * f - PF_INET6
102 * f f <error>
103 * f t PF_INET6
104 * t - PF_INET
105 * t f PF_INET
94bc0d19 106 * t t PF_INET6/PF_UNSPEC
1856835d 107 *
d43eda3d 108 * NB, this matrix is only about getting the necessary results
1856835d
DB
109 * from getaddrinfo(). Some of the cases require further work
110 * after reading results from getaddrinfo in order to fully
94bc0d19
DB
111 * apply the logic the end user wants.
112 *
113 * In the first and last cases, we must set IPV6_V6ONLY=0
114 * when binding, to allow a single listener to potentially
115 * accept both IPv4+6 addresses.
1856835d 116 */
c1b412f1
DB
117int inet_ai_family_from_address(InetSocketAddress *addr,
118 Error **errp)
1856835d
DB
119{
120 if (addr->has_ipv6 && addr->has_ipv4 &&
121 !addr->ipv6 && !addr->ipv4) {
122 error_setg(errp, "Cannot disable IPv4 and IPv6 at same time");
123 return PF_UNSPEC;
124 }
94bc0d19
DB
125 if ((addr->has_ipv6 && addr->ipv6) && (addr->has_ipv4 && addr->ipv4)) {
126 /*
127 * Some backends can only do a single listener. In that case
128 * we want empty hostname to resolve to "::" and then use the
129 * flag IPV6_V6ONLY==0 to get both protocols on 1 socket. This
130 * doesn't work for addresses other than "", so they're just
131 * inevitably broken until multiple listeners can be used,
132 * and thus we honour getaddrinfo automatic protocol detection
133 * Once all backends do multi-listener, remove the PF_INET6
134 * branch entirely.
135 */
136 if (!addr->host || g_str_equal(addr->host, "")) {
137 return PF_INET6;
138 } else {
139 return PF_UNSPEC;
140 }
141 }
1856835d
DB
142 if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) {
143 return PF_INET6;
144 }
145 if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) {
146 return PF_INET;
147 }
148 return PF_UNSPEC;
149}
150
39f80521
KO
151static int create_fast_reuse_socket(struct addrinfo *e)
152{
153 int slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol);
154 if (slisten < 0) {
155 return -1;
156 }
157 socket_set_fast_reuse(slisten);
158 return slisten;
159}
160
89382c3d
KO
161static int try_bind(int socket, InetSocketAddress *saddr, struct addrinfo *e)
162{
163#ifndef IPV6_V6ONLY
164 return bind(socket, e->ai_addr, e->ai_addrlen);
165#else
166 /*
167 * Deals with first & last cases in matrix in comment
168 * for inet_ai_family_from_address().
169 */
170 int v6only =
171 ((!saddr->has_ipv4 && !saddr->has_ipv6) ||
172 (saddr->has_ipv4 && saddr->ipv4 &&
173 saddr->has_ipv6 && saddr->ipv6)) ? 0 : 1;
174 int stat;
175
176 rebind:
177 if (e->ai_family == PF_INET6) {
178 qemu_setsockopt(socket, IPPROTO_IPV6, IPV6_V6ONLY, &v6only,
179 sizeof(v6only));
180 }
181
182 stat = bind(socket, e->ai_addr, e->ai_addrlen);
183 if (!stat) {
184 return 0;
185 }
186
187 /* If we got EADDRINUSE from an IPv6 bind & v6only is unset,
188 * it could be that the IPv4 port is already claimed, so retry
189 * with v6only set
190 */
191 if (e->ai_family == PF_INET6 && errno == EADDRINUSE && !v6only) {
192 v6only = 1;
193 goto rebind;
194 }
195 return stat;
196#endif
197}
198
1856835d
DB
199static int inet_listen_saddr(InetSocketAddress *saddr,
200 int port_offset,
1856835d 201 Error **errp)
d247d25f
AL
202{
203 struct addrinfo ai,*res,*e;
d247d25f
AL
204 char port[33];
205 char uaddr[INET6_ADDRSTRLEN+1];
206 char uport[33];
9cf961bb 207 int rc, port_min, port_max, p;
10a7b7e6 208 int slisten = -1;
9cf961bb
KO
209 int saved_errno = 0;
210 bool socket_created = false;
1856835d 211 Error *err = NULL;
d247d25f
AL
212
213 memset(&ai,0, sizeof(ai));
3de3d698 214 ai.ai_flags = AI_PASSIVE;
6979a813
DB
215 if (saddr->has_numeric && saddr->numeric) {
216 ai.ai_flags |= AI_NUMERICHOST | AI_NUMERICSERV;
217 }
1856835d 218 ai.ai_family = inet_ai_family_from_address(saddr, &err);
e5bc776f 219 ai.ai_socktype = SOCK_STREAM;
d247d25f 220
1856835d
DB
221 if (err) {
222 error_propagate(errp, err);
223 return -1;
224 }
225
226 if (saddr->host == NULL) {
0983f5e6 227 error_setg(errp, "host not specified");
e5bc776f 228 return -1;
d247d25f 229 }
1856835d
DB
230 if (saddr->port != NULL) {
231 pstrcpy(port, sizeof(port), saddr->port);
0983f5e6
DB
232 } else {
233 port[0] = '\0';
234 }
d247d25f
AL
235
236 /* lookup */
8bc89127
GH
237 if (port_offset) {
238 unsigned long long baseport;
0983f5e6
DB
239 if (strlen(port) == 0) {
240 error_setg(errp, "port not specified");
241 return -1;
242 }
8bc89127
GH
243 if (parse_uint_full(port, &baseport, 10) < 0) {
244 error_setg(errp, "can't convert to a number: %s", port);
245 return -1;
246 }
247 if (baseport > 65535 ||
248 baseport + port_offset > 65535) {
249 error_setg(errp, "port %s out of range", port);
250 return -1;
251 }
252 snprintf(port, sizeof(port), "%d", (int)baseport + port_offset);
253 }
1856835d 254 rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL,
0983f5e6 255 strlen(port) ? port : NULL, &ai, &res);
d247d25f 256 if (rc != 0) {
1856835d
DB
257 error_setg(errp, "address resolution failed for %s:%s: %s",
258 saddr->host, port, gai_strerror(rc));
d247d25f
AL
259 return -1;
260 }
d247d25f 261
9cf961bb 262 /* create socket + bind/listen */
d247d25f 263 for (e = res; e != NULL; e = e->ai_next) {
39b6efc8
VS
264 getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
265 uaddr,INET6_ADDRSTRLEN,uport,32,
266 NI_NUMERICHOST | NI_NUMERICSERV);
39f80521 267
877691f9 268 port_min = inet_getport(e);
1856835d 269 port_max = saddr->has_to ? saddr->to + port_offset : port_min;
877691f9
MA
270 for (p = port_min; p <= port_max; p++) {
271 inet_setport(e, p);
10a7b7e6
DB
272
273 slisten = create_fast_reuse_socket(e);
274 if (slisten < 0) {
275 /* First time we expect we might fail to create the socket
276 * eg if 'e' has AF_INET6 but ipv6 kmod is not loaded.
277 * Later iterations should always succeed if first iteration
278 * worked though, so treat that as fatal.
279 */
280 if (p == port_min) {
9cf961bb
KO
281 continue;
282 } else {
10a7b7e6
DB
283 error_setg_errno(errp, errno,
284 "Failed to recreate failed listening socket");
9cf961bb 285 goto listen_failed;
029409e5 286 }
d247d25f 287 }
10a7b7e6
DB
288 socket_created = true;
289
290 rc = try_bind(slisten, saddr, e);
291 if (rc < 0) {
292 if (errno != EADDRINUSE) {
293 error_setg_errno(errp, errno, "Failed to bind socket");
294 goto listen_failed;
295 }
296 } else {
297 if (!listen(slisten, 1)) {
298 goto listen_ok;
299 }
300 if (errno != EADDRINUSE) {
301 error_setg_errno(errp, errno, "Failed to listen on socket");
302 goto listen_failed;
303 }
9cf961bb
KO
304 }
305 /* Someone else managed to bind to the same port and beat us
306 * to listen on it! Socket semantics does not allow us to
307 * recover from this situation, so we need to recreate the
308 * socket to allow bind attempts for subsequent ports:
309 */
310 closesocket(slisten);
10a7b7e6 311 slisten = -1;
d247d25f 312 }
9cf961bb
KO
313 }
314 error_setg_errno(errp, errno,
315 socket_created ?
316 "Failed to find an available port" :
317 "Failed to create a socket");
318listen_failed:
319 saved_errno = errno;
320 if (slisten >= 0) {
d247d25f
AL
321 closesocket(slisten);
322 }
d247d25f 323 freeaddrinfo(res);
9cf961bb 324 errno = saved_errno;
d247d25f
AL
325 return -1;
326
9cf961bb 327listen_ok:
d247d25f
AL
328 freeaddrinfo(res);
329 return slisten;
330}
331
05bc1d8a
MT
332#ifdef _WIN32
333#define QEMU_SOCKET_RC_INPROGRESS(rc) \
334 ((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY)
335#else
336#define QEMU_SOCKET_RC_INPROGRESS(rc) \
337 ((rc) == -EINPROGRESS)
338#endif
339
b2587932 340static int inet_connect_addr(struct addrinfo *addr, Error **errp);
233aa5c2 341
b2587932 342static int inet_connect_addr(struct addrinfo *addr, Error **errp)
233aa5c2
OW
343{
344 int sock, rc;
345
05bc1d8a
MT
346 sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
347 if (sock < 0) {
235256a2 348 error_setg_errno(errp, errno, "Failed to create socket");
05bc1d8a
MT
349 return -1;
350 }
04fd1c78 351 socket_set_fast_reuse(sock);
b2587932 352
05bc1d8a
MT
353 /* connect to peer */
354 do {
355 rc = 0;
356 if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) {
b16a44e1 357 rc = -errno;
05bc1d8a
MT
358 }
359 } while (rc == -EINTR);
360
b2587932 361 if (rc < 0) {
235256a2 362 error_setg_errno(errp, errno, "Failed to connect socket");
05bc1d8a
MT
363 closesocket(sock);
364 return -1;
365 }
b2587932 366
05bc1d8a
MT
367 return sock;
368}
369
2942e420
DB
370static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr,
371 Error **errp)
05bc1d8a
MT
372{
373 struct addrinfo ai, *res;
374 int rc;
2942e420 375 Error *err = NULL;
340849a9 376 static int useV4Mapped = 1;
d247d25f 377
05bc1d8a 378 memset(&ai, 0, sizeof(ai));
233aa5c2 379
340849a9
DB
380 ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
381 if (atomic_read(&useV4Mapped)) {
382 ai.ai_flags |= AI_V4MAPPED;
383 }
2942e420 384 ai.ai_family = inet_ai_family_from_address(saddr, &err);
f4c94c7c 385 ai.ai_socktype = SOCK_STREAM;
d247d25f 386
2942e420
DB
387 if (err) {
388 error_propagate(errp, err);
05bc1d8a 389 return NULL;
d247d25f
AL
390 }
391
2942e420
DB
392 if (saddr->host == NULL || saddr->port == NULL) {
393 error_setg(errp, "host and/or port not specified");
394 return NULL;
05bc1d8a 395 }
d247d25f
AL
396
397 /* lookup */
2942e420 398 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
340849a9
DB
399
400 /* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but
401 * then don't implement it in their getaddrinfo(). Detect
402 * this and retry without the flag since that's preferrable
403 * to a fatal error
404 */
405 if (rc == EAI_BADFLAGS &&
406 (ai.ai_flags & AI_V4MAPPED)) {
407 atomic_set(&useV4Mapped, 0);
408 ai.ai_flags &= ~AI_V4MAPPED;
409 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
410 }
05bc1d8a 411 if (rc != 0) {
2942e420
DB
412 error_setg(errp, "address resolution failed for %s:%s: %s",
413 saddr->host, saddr->port, gai_strerror(rc));
05bc1d8a
MT
414 return NULL;
415 }
416 return res;
417}
418
5db5f44c
OW
419/**
420 * Create a socket and connect it to an address.
421 *
2942e420 422 * @saddr: Inet socket address specification
5db5f44c
OW
423 * @errp: set on error
424 *
425 * Returns: -1 on error, file descriptor on success.
426 */
b2587932 427int inet_connect_saddr(InetSocketAddress *saddr, Error **errp)
05bc1d8a 428{
3f9286b7 429 Error *local_err = NULL;
05bc1d8a
MT
430 struct addrinfo *res, *e;
431 int sock = -1;
05bc1d8a 432
2942e420 433 res = inet_parse_connect_saddr(saddr, errp);
05bc1d8a
MT
434 if (!res) {
435 return -1;
436 }
437
d247d25f 438 for (e = res; e != NULL; e = e->ai_next) {
3f9286b7
MA
439 error_free(local_err);
440 local_err = NULL;
b2587932 441 sock = inet_connect_addr(e, &local_err);
3f9286b7 442 if (sock >= 0) {
05bc1d8a 443 break;
a6ba35b3 444 }
d247d25f 445 }
3f9286b7
MA
446
447 if (sock < 0) {
448 error_propagate(errp, local_err);
3f9286b7 449 }
b2587932 450
d247d25f 451 freeaddrinfo(res);
05bc1d8a 452 return sock;
d247d25f
AL
453}
454
8b39910e
DB
455static int inet_dgram_saddr(InetSocketAddress *sraddr,
456 InetSocketAddress *sladdr,
457 Error **errp)
7e1b35b4
GH
458{
459 struct addrinfo ai, *peer = NULL, *local = NULL;
460 const char *addr;
461 const char *port;
7e1b35b4 462 int sock = -1, rc;
8b39910e 463 Error *err = NULL;
7e1b35b4
GH
464
465 /* lookup peer addr */
466 memset(&ai,0, sizeof(ai));
3de3d698 467 ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG;
8b39910e 468 ai.ai_family = inet_ai_family_from_address(sraddr, &err);
7e1b35b4
GH
469 ai.ai_socktype = SOCK_DGRAM;
470
8b39910e
DB
471 if (err) {
472 error_propagate(errp, err);
58c652c0 473 goto err;
8b39910e
DB
474 }
475
476 addr = sraddr->host;
477 port = sraddr->port;
7e1b35b4
GH
478 if (addr == NULL || strlen(addr) == 0) {
479 addr = "localhost";
480 }
481 if (port == NULL || strlen(port) == 0) {
4f085c82 482 error_setg(errp, "remote port not specified");
58c652c0 483 goto err;
7e1b35b4
GH
484 }
485
9cd1883c 486 if ((rc = getaddrinfo(addr, port, &ai, &peer)) != 0) {
4f085c82
PB
487 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
488 gai_strerror(rc));
26015051 489 goto err;
7e1b35b4 490 }
7e1b35b4
GH
491
492 /* lookup local addr */
493 memset(&ai,0, sizeof(ai));
494 ai.ai_flags = AI_PASSIVE;
495 ai.ai_family = peer->ai_family;
496 ai.ai_socktype = SOCK_DGRAM;
497
8b39910e
DB
498 if (sladdr) {
499 addr = sladdr->host;
500 port = sladdr->port;
501 if (addr == NULL || strlen(addr) == 0) {
502 addr = NULL;
503 }
504 if (!port || strlen(port) == 0) {
505 port = "0";
506 }
507 } else {
7e1b35b4 508 addr = NULL;
7e1b35b4 509 port = "0";
8b39910e 510 }
7e1b35b4 511
9cd1883c 512 if ((rc = getaddrinfo(addr, port, &ai, &local)) != 0) {
4f085c82
PB
513 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
514 gai_strerror(rc));
39b38459 515 goto err;
7e1b35b4 516 }
7e1b35b4
GH
517
518 /* create socket */
40ff6d7e 519 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol);
7e1b35b4 520 if (sock < 0) {
235256a2 521 error_setg_errno(errp, errno, "Failed to create socket");
7e1b35b4
GH
522 goto err;
523 }
04fd1c78 524 socket_set_fast_reuse(sock);
7e1b35b4
GH
525
526 /* bind socket */
7e1b35b4 527 if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) {
235256a2 528 error_setg_errno(errp, errno, "Failed to bind socket");
7e1b35b4
GH
529 goto err;
530 }
531
532 /* connect to peer */
7e1b35b4 533 if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) {
235256a2 534 error_setg_errno(errp, errno, "Failed to connect socket");
7e1b35b4
GH
535 goto err;
536 }
537
538 freeaddrinfo(local);
539 freeaddrinfo(peer);
540 return sock;
541
542err:
26015051 543 if (sock != -1) {
7e1b35b4 544 closesocket(sock);
26015051
C
545 }
546 if (local) {
7e1b35b4 547 freeaddrinfo(local);
26015051
C
548 }
549 if (peer) {
7e1b35b4 550 freeaddrinfo(peer);
26015051
C
551 }
552
7e1b35b4
GH
553 return -1;
554}
555
f4c94c7c 556/* compatibility wrapper */
3e32370a
DB
557static int inet_parse_flag(const char *flagname, const char *optstr, bool *val,
558 Error **errp)
559{
560 char *end;
561 size_t len;
562
563 end = strstr(optstr, ",");
564 if (end) {
565 if (end[1] == ',') { /* Reject 'ipv6=on,,foo' */
566 error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
567 return -1;
568 }
569 len = end - optstr;
570 } else {
571 len = strlen(optstr);
572 }
573 if (len == 0 || (len == 3 && strncmp(optstr, "=on", len) == 0)) {
574 *val = true;
575 } else if (len == 4 && strncmp(optstr, "=off", len) == 0) {
576 *val = false;
577 } else {
578 error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
579 return -1;
580 }
581 return 0;
582}
583
0785bd7a 584int inet_parse(InetSocketAddress *addr, const char *str, Error **errp)
f4c94c7c
GH
585{
586 const char *optstr, *h;
55a10996 587 char host[65];
f4c94c7c 588 char port[33];
879e45c7 589 int to;
f4c94c7c 590 int pos;
3e32370a 591 char *begin;
f4c94c7c 592
0785bd7a 593 memset(addr, 0, sizeof(*addr));
879e45c7 594
f4c94c7c
GH
595 /* parse address */
596 if (str[0] == ':') {
597 /* no host given */
879e45c7 598 host[0] = '\0';
9cd1883c 599 if (sscanf(str, ":%32[^,]%n", port, &pos) != 1) {
2f002c43 600 error_setg(errp, "error parsing port in address '%s'", str);
0785bd7a 601 return -1;
f4c94c7c
GH
602 }
603 } else if (str[0] == '[') {
604 /* IPv6 addr */
9cd1883c 605 if (sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 606 error_setg(errp, "error parsing IPv6 address '%s'", str);
0785bd7a 607 return -1;
f4c94c7c 608 }
f4c94c7c 609 } else {
391b7b97 610 /* hostname or IPv4 addr */
9cd1883c 611 if (sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 612 error_setg(errp, "error parsing address '%s'", str);
0785bd7a 613 return -1;
f4c94c7c
GH
614 }
615 }
879e45c7
PB
616
617 addr->host = g_strdup(host);
618 addr->port = g_strdup(port);
f4c94c7c
GH
619
620 /* parse options */
621 optstr = str + pos;
622 h = strstr(optstr, ",to=");
879e45c7 623 if (h) {
1ccbc285
AP
624 h += 4;
625 if (sscanf(h, "%d%n", &to, &pos) != 1 ||
626 (h[pos] != '\0' && h[pos] != ',')) {
879e45c7 627 error_setg(errp, "error parsing to= argument");
0785bd7a 628 return -1;
879e45c7
PB
629 }
630 addr->has_to = true;
631 addr->to = to;
632 }
3e32370a
DB
633 begin = strstr(optstr, ",ipv4");
634 if (begin) {
635 if (inet_parse_flag("ipv4", begin + 5, &addr->ipv4, errp) < 0) {
636 return -1;
637 }
638 addr->has_ipv4 = true;
879e45c7 639 }
3e32370a
DB
640 begin = strstr(optstr, ",ipv6");
641 if (begin) {
642 if (inet_parse_flag("ipv6", begin + 5, &addr->ipv6, errp) < 0) {
643 return -1;
644 }
645 addr->has_ipv6 = true;
879e45c7 646 }
0785bd7a 647 return 0;
879e45c7
PB
648}
649
e5bc776f 650
5db5f44c
OW
651/**
652 * Create a blocking socket and connect it to an address.
653 *
654 * @str: address string
655 * @errp: set in case of an error
656 *
657 * Returns -1 in case of error, file descriptor on success
658 **/
659int inet_connect(const char *str, Error **errp)
f4c94c7c 660{
f4c94c7c 661 int sock = -1;
0785bd7a 662 InetSocketAddress *addr = g_new(InetSocketAddress, 1);
f4c94c7c 663
0785bd7a 664 if (!inet_parse(addr, str, errp)) {
b2587932 665 sock = inet_connect_saddr(addr, errp);
5db5f44c 666 }
0785bd7a 667 qapi_free_InetSocketAddress(addr);
5db5f44c
OW
668 return sock;
669}
670
6a02c806
SH
671#ifdef CONFIG_AF_VSOCK
672static bool vsock_parse_vaddr_to_sockaddr(const VsockSocketAddress *vaddr,
673 struct sockaddr_vm *svm,
674 Error **errp)
675{
676 unsigned long long val;
677
678 memset(svm, 0, sizeof(*svm));
679 svm->svm_family = AF_VSOCK;
680
681 if (parse_uint_full(vaddr->cid, &val, 10) < 0 ||
682 val > UINT32_MAX) {
683 error_setg(errp, "Failed to parse cid '%s'", vaddr->cid);
684 return false;
685 }
686 svm->svm_cid = val;
687
688 if (parse_uint_full(vaddr->port, &val, 10) < 0 ||
689 val > UINT32_MAX) {
690 error_setg(errp, "Failed to parse port '%s'", vaddr->port);
691 return false;
692 }
693 svm->svm_port = val;
694
695 return true;
696}
697
b2587932 698static int vsock_connect_addr(const struct sockaddr_vm *svm, Error **errp)
6a02c806
SH
699{
700 int sock, rc;
701
6a02c806
SH
702 sock = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
703 if (sock < 0) {
704 error_setg_errno(errp, errno, "Failed to create socket");
705 return -1;
706 }
b2587932 707
6a02c806
SH
708 /* connect to peer */
709 do {
710 rc = 0;
711 if (connect(sock, (const struct sockaddr *)svm, sizeof(*svm)) < 0) {
712 rc = -errno;
713 }
714 } while (rc == -EINTR);
715
b2587932 716 if (rc < 0) {
6a02c806
SH
717 error_setg_errno(errp, errno, "Failed to connect socket");
718 closesocket(sock);
719 return -1;
720 }
b2587932 721
6a02c806
SH
722 return sock;
723}
724
b2587932 725static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
6a02c806
SH
726{
727 struct sockaddr_vm svm;
728 int sock = -1;
6a02c806
SH
729
730 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
731 return -1;
732 }
733
b2587932 734 sock = vsock_connect_addr(&svm, errp);
6a02c806 735
6a02c806
SH
736 return sock;
737}
738
739static int vsock_listen_saddr(VsockSocketAddress *vaddr,
740 Error **errp)
741{
742 struct sockaddr_vm svm;
743 int slisten;
744
745 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
746 return -1;
747 }
748
749 slisten = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
750 if (slisten < 0) {
751 error_setg_errno(errp, errno, "Failed to create socket");
752 return -1;
753 }
754
755 if (bind(slisten, (const struct sockaddr *)&svm, sizeof(svm)) != 0) {
756 error_setg_errno(errp, errno, "Failed to bind socket");
757 closesocket(slisten);
758 return -1;
759 }
760
761 if (listen(slisten, 1) != 0) {
762 error_setg_errno(errp, errno, "Failed to listen on socket");
763 closesocket(slisten);
764 return -1;
765 }
766 return slisten;
767}
768
4db5c619
MA
769static int vsock_parse(VsockSocketAddress *addr, const char *str,
770 Error **errp)
6a02c806 771{
6a02c806
SH
772 char cid[33];
773 char port[33];
774 int n;
775
776 if (sscanf(str, "%32[^:]:%32[^,]%n", cid, port, &n) != 2) {
777 error_setg(errp, "error parsing address '%s'", str);
4db5c619 778 return -1;
6a02c806
SH
779 }
780 if (str[n] != '\0') {
781 error_setg(errp, "trailing characters in address '%s'", str);
4db5c619 782 return -1;
6a02c806
SH
783 }
784
6a02c806
SH
785 addr->cid = g_strdup(cid);
786 addr->port = g_strdup(port);
4db5c619 787 return 0;
6a02c806
SH
788}
789#else
790static void vsock_unsupported(Error **errp)
791{
792 error_setg(errp, "socket family AF_VSOCK unsupported");
793}
794
b2587932 795static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
6a02c806
SH
796{
797 vsock_unsupported(errp);
798 return -1;
799}
800
801static int vsock_listen_saddr(VsockSocketAddress *vaddr,
802 Error **errp)
803{
804 vsock_unsupported(errp);
805 return -1;
806}
807
4db5c619
MA
808static int vsock_parse(VsockSocketAddress *addr, const char *str,
809 Error **errp)
6a02c806
SH
810{
811 vsock_unsupported(errp);
4db5c619 812 return -1;
6a02c806
SH
813}
814#endif /* CONFIG_AF_VSOCK */
815
d247d25f
AL
816#ifndef _WIN32
817
1856835d 818static int unix_listen_saddr(UnixSocketAddress *saddr,
1856835d 819 Error **errp)
d247d25f
AL
820{
821 struct sockaddr_un un;
62b6adfb 822 int sock, fd;
ad9579aa
DB
823 char *pathbuf = NULL;
824 const char *path;
d247d25f 825
40ff6d7e 826 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 827 if (sock < 0) {
b658c53d 828 error_setg_errno(errp, errno, "Failed to create Unix socket");
39b6efc8 829 return -1;
d247d25f
AL
830 }
831
ad9579aa
DB
832 if (saddr->path && saddr->path[0]) {
833 path = saddr->path;
d247d25f 834 } else {
b658c53d
PB
835 const char *tmpdir = getenv("TMPDIR");
836 tmpdir = tmpdir ? tmpdir : "/tmp";
ad9579aa
DB
837 path = pathbuf = g_strdup_printf("%s/qemu-socket-XXXXXX", tmpdir);
838 }
b658c53d 839
ad9579aa
DB
840 if (strlen(path) > sizeof(un.sun_path)) {
841 error_setg(errp, "UNIX socket path '%s' is too long", path);
842 error_append_hint(errp, "Path must be less than %zu bytes\n",
843 sizeof(un.sun_path));
844 goto err;
845 }
846
847 if (pathbuf != NULL) {
d247d25f
AL
848 /*
849 * This dummy fd usage silences the mktemp() unsecure warning.
850 * Using mkstemp() doesn't make things more secure here
851 * though. bind() complains about existing files, so we have
852 * to unlink first and thus re-open the race window. The
853 * worst case possible is bind() failing, i.e. a DoS attack.
854 */
ad9579aa 855 fd = mkstemp(pathbuf);
b658c53d
PB
856 if (fd < 0) {
857 error_setg_errno(errp, errno,
ad9579aa 858 "Failed to make a temporary socket %s", pathbuf);
b658c53d
PB
859 goto err;
860 }
861 close(fd);
d247d25f 862 }
d247d25f 863
ad9579aa 864 if (unlink(path) < 0 && errno != ENOENT) {
0ef705a2 865 error_setg_errno(errp, errno,
ad9579aa 866 "Failed to unlink socket %s", path);
0ef705a2
CR
867 goto err;
868 }
ad9579aa
DB
869
870 memset(&un, 0, sizeof(un));
871 un.sun_family = AF_UNIX;
872 strncpy(un.sun_path, path, sizeof(un.sun_path));
873
d247d25f 874 if (bind(sock, (struct sockaddr*) &un, sizeof(un)) < 0) {
56382bd5 875 error_setg_errno(errp, errno, "Failed to bind socket to %s", path);
d247d25f
AL
876 goto err;
877 }
878 if (listen(sock, 1) < 0) {
235256a2 879 error_setg_errno(errp, errno, "Failed to listen on socket");
d247d25f
AL
880 goto err;
881 }
882
62473511 883 g_free(pathbuf);
d247d25f
AL
884 return sock;
885
886err:
ad9579aa 887 g_free(pathbuf);
d247d25f
AL
888 closesocket(sock);
889 return -1;
890}
891
b2587932 892static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
d247d25f
AL
893{
894 struct sockaddr_un un;
1fc05adf 895 int sock, rc;
d247d25f 896
2942e420 897 if (saddr->path == NULL) {
312fd5f2 898 error_setg(errp, "unix connect: no path specified");
2af2bf67
GH
899 return -1;
900 }
901
40ff6d7e 902 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 903 if (sock < 0) {
235256a2 904 error_setg_errno(errp, errno, "Failed to create socket");
39b6efc8 905 return -1;
d247d25f
AL
906 }
907
ad9579aa
DB
908 if (strlen(saddr->path) > sizeof(un.sun_path)) {
909 error_setg(errp, "UNIX socket path '%s' is too long", saddr->path);
910 error_append_hint(errp, "Path must be less than %zu bytes\n",
911 sizeof(un.sun_path));
912 goto err;
913 }
914
d247d25f
AL
915 memset(&un, 0, sizeof(un));
916 un.sun_family = AF_UNIX;
ad9579aa 917 strncpy(un.sun_path, saddr->path, sizeof(un.sun_path));
1fc05adf
PB
918
919 /* connect to peer */
920 do {
921 rc = 0;
922 if (connect(sock, (struct sockaddr *) &un, sizeof(un)) < 0) {
b16a44e1 923 rc = -errno;
1fc05adf
PB
924 }
925 } while (rc == -EINTR);
926
1fc05adf 927 if (rc < 0) {
ad9579aa
DB
928 error_setg_errno(errp, -rc, "Failed to connect socket %s",
929 saddr->path);
930 goto err;
d247d25f
AL
931 }
932
d247d25f 933 return sock;
ad9579aa
DB
934
935 err:
936 close(sock);
ad9579aa 937 return -1;
d247d25f
AL
938}
939
0c814709
PB
940#else
941
1856835d 942static int unix_listen_saddr(UnixSocketAddress *saddr,
1856835d 943 Error **errp)
0c814709 944{
58899664 945 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
946 errno = ENOTSUP;
947 return -1;
948}
949
b2587932 950static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
0c814709 951{
58899664 952 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
953 errno = ENOTSUP;
954 return -1;
955}
956#endif
957
2af2bf67 958/* compatibility wrapper */
62473511 959int unix_listen(const char *str, Error **errp)
62b6adfb 960{
62b6adfb
GH
961 char *path, *optstr;
962 int sock, len;
1856835d 963 UnixSocketAddress *saddr;
62b6adfb 964
1856835d 965 saddr = g_new0(UnixSocketAddress, 1);
62b6adfb
GH
966
967 optstr = strchr(str, ',');
968 if (optstr) {
969 len = optstr - str;
970 if (len) {
7267c094 971 path = g_malloc(len+1);
62b6adfb 972 snprintf(path, len+1, "%.*s", len, str);
1856835d 973 saddr->path = path;
62b6adfb
GH
974 }
975 } else {
1856835d 976 saddr->path = g_strdup(str);
62b6adfb
GH
977 }
978
62473511 979 sock = unix_listen_saddr(saddr, errp);
26015051 980
1856835d 981 qapi_free_UnixSocketAddress(saddr);
62b6adfb
GH
982 return sock;
983}
984
7fc4e63e 985int unix_connect(const char *path, Error **errp)
2af2bf67 986{
2942e420 987 UnixSocketAddress *saddr;
2af2bf67
GH
988 int sock;
989
2942e420
DB
990 saddr = g_new0(UnixSocketAddress, 1);
991 saddr->path = g_strdup(path);
b2587932 992 sock = unix_connect_saddr(saddr, errp);
2942e420 993 qapi_free_UnixSocketAddress(saddr);
1fc05adf
PB
994 return sock;
995}
996
997
bd269ebc 998SocketAddress *socket_parse(const char *str, Error **errp)
101f9cbc 999{
bd269ebc 1000 SocketAddress *addr;
101f9cbc 1001
bd269ebc 1002 addr = g_new0(SocketAddress, 1);
101f9cbc
PB
1003 if (strstart(str, "unix:", NULL)) {
1004 if (str[5] == '\0') {
312fd5f2 1005 error_setg(errp, "invalid Unix socket address");
101f9cbc
PB
1006 goto fail;
1007 } else {
bd269ebc
MA
1008 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1009 addr->u.q_unix.path = g_strdup(str + 5);
101f9cbc
PB
1010 }
1011 } else if (strstart(str, "fd:", NULL)) {
1012 if (str[3] == '\0') {
312fd5f2 1013 error_setg(errp, "invalid file descriptor address");
101f9cbc
PB
1014 goto fail;
1015 } else {
bd269ebc
MA
1016 addr->type = SOCKET_ADDRESS_TYPE_FD;
1017 addr->u.fd.str = g_strdup(str + 3);
101f9cbc 1018 }
6a02c806 1019 } else if (strstart(str, "vsock:", NULL)) {
bd269ebc
MA
1020 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1021 if (vsock_parse(&addr->u.vsock, str + strlen("vsock:"), errp)) {
6a02c806
SH
1022 goto fail;
1023 }
101f9cbc 1024 } else {
bd269ebc
MA
1025 addr->type = SOCKET_ADDRESS_TYPE_INET;
1026 if (inet_parse(&addr->u.inet, str, errp)) {
101f9cbc
PB
1027 goto fail;
1028 }
1029 }
1030 return addr;
1031
1032fail:
bd269ebc 1033 qapi_free_SocketAddress(addr);
101f9cbc
PB
1034 return NULL;
1035}
1036
b2587932 1037int socket_connect(SocketAddress *addr, Error **errp)
101f9cbc 1038{
101f9cbc
PB
1039 int fd;
1040
2d32adda 1041 switch (addr->type) {
bd269ebc 1042 case SOCKET_ADDRESS_TYPE_INET:
b2587932 1043 fd = inet_connect_saddr(&addr->u.inet, errp);
101f9cbc
PB
1044 break;
1045
bd269ebc 1046 case SOCKET_ADDRESS_TYPE_UNIX:
b2587932 1047 fd = unix_connect_saddr(&addr->u.q_unix, errp);
101f9cbc
PB
1048 break;
1049
bd269ebc
MA
1050 case SOCKET_ADDRESS_TYPE_FD:
1051 fd = monitor_get_fd(cur_mon, addr->u.fd.str, errp);
101f9cbc
PB
1052 break;
1053
bd269ebc 1054 case SOCKET_ADDRESS_TYPE_VSOCK:
b2587932 1055 fd = vsock_connect_saddr(&addr->u.vsock, errp);
6a02c806
SH
1056 break;
1057
101f9cbc
PB
1058 default:
1059 abort();
1060 }
101f9cbc
PB
1061 return fd;
1062}
1063
bd269ebc 1064int socket_listen(SocketAddress *addr, Error **errp)
101f9cbc 1065{
101f9cbc
PB
1066 int fd;
1067
2d32adda 1068 switch (addr->type) {
bd269ebc 1069 case SOCKET_ADDRESS_TYPE_INET:
62473511 1070 fd = inet_listen_saddr(&addr->u.inet, 0, errp);
101f9cbc
PB
1071 break;
1072
bd269ebc 1073 case SOCKET_ADDRESS_TYPE_UNIX:
62473511 1074 fd = unix_listen_saddr(&addr->u.q_unix, errp);
101f9cbc
PB
1075 break;
1076
bd269ebc
MA
1077 case SOCKET_ADDRESS_TYPE_FD:
1078 fd = monitor_get_fd(cur_mon, addr->u.fd.str, errp);
101f9cbc
PB
1079 break;
1080
bd269ebc
MA
1081 case SOCKET_ADDRESS_TYPE_VSOCK:
1082 fd = vsock_listen_saddr(&addr->u.vsock, errp);
6a02c806
SH
1083 break;
1084
101f9cbc
PB
1085 default:
1086 abort();
1087 }
101f9cbc
PB
1088 return fd;
1089}
1090
74b6ce43
MAL
1091void socket_listen_cleanup(int fd, Error **errp)
1092{
bd269ebc 1093 SocketAddress *addr;
74b6ce43
MAL
1094
1095 addr = socket_local_address(fd, errp);
2d7ad7c0
DB
1096 if (!addr) {
1097 return;
1098 }
74b6ce43 1099
bd269ebc
MA
1100 if (addr->type == SOCKET_ADDRESS_TYPE_UNIX
1101 && addr->u.q_unix.path) {
1102 if (unlink(addr->u.q_unix.path) < 0 && errno != ENOENT) {
74b6ce43
MAL
1103 error_setg_errno(errp, errno,
1104 "Failed to unlink socket %s",
bd269ebc 1105 addr->u.q_unix.path);
74b6ce43
MAL
1106 }
1107 }
1108
bd269ebc 1109 qapi_free_SocketAddress(addr);
74b6ce43
MAL
1110}
1111
bd269ebc 1112int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp)
3ecc059d 1113{
3ecc059d
GH
1114 int fd;
1115
ca0b64e5 1116 /*
bd269ebc 1117 * TODO SOCKET_ADDRESS_TYPE_FD when fd is AF_INET or AF_INET6
ca0b64e5
MA
1118 * (although other address families can do SOCK_DGRAM, too)
1119 */
2d32adda 1120 switch (remote->type) {
bd269ebc
MA
1121 case SOCKET_ADDRESS_TYPE_INET:
1122 fd = inet_dgram_saddr(&remote->u.inet,
1123 local ? &local->u.inet : NULL, errp);
3ecc059d
GH
1124 break;
1125
1126 default:
1127 error_setg(errp, "socket type unsupported for datagram");
7a5b6af1 1128 fd = -1;
3ecc059d 1129 }
3ecc059d
GH
1130 return fd;
1131}
17c55dec
DB
1132
1133
bd269ebc 1134static SocketAddress *
17c55dec
DB
1135socket_sockaddr_to_address_inet(struct sockaddr_storage *sa,
1136 socklen_t salen,
1137 Error **errp)
1138{
1139 char host[NI_MAXHOST];
1140 char serv[NI_MAXSERV];
bd269ebc 1141 SocketAddress *addr;
0399293e 1142 InetSocketAddress *inet;
17c55dec
DB
1143 int ret;
1144
1145 ret = getnameinfo((struct sockaddr *)sa, salen,
1146 host, sizeof(host),
1147 serv, sizeof(serv),
1148 NI_NUMERICHOST | NI_NUMERICSERV);
1149 if (ret != 0) {
1150 error_setg(errp, "Cannot format numeric socket address: %s",
1151 gai_strerror(ret));
1152 return NULL;
1153 }
1154
bd269ebc
MA
1155 addr = g_new0(SocketAddress, 1);
1156 addr->type = SOCKET_ADDRESS_TYPE_INET;
1157 inet = &addr->u.inet;
0399293e
EB
1158 inet->host = g_strdup(host);
1159 inet->port = g_strdup(serv);
17c55dec 1160 if (sa->ss_family == AF_INET) {
0399293e 1161 inet->has_ipv4 = inet->ipv4 = true;
17c55dec 1162 } else {
0399293e 1163 inet->has_ipv6 = inet->ipv6 = true;
17c55dec
DB
1164 }
1165
1166 return addr;
1167}
1168
1169
1170#ifndef WIN32
bd269ebc 1171static SocketAddress *
17c55dec
DB
1172socket_sockaddr_to_address_unix(struct sockaddr_storage *sa,
1173 socklen_t salen,
1174 Error **errp)
1175{
bd269ebc 1176 SocketAddress *addr;
17c55dec
DB
1177 struct sockaddr_un *su = (struct sockaddr_un *)sa;
1178
bd269ebc
MA
1179 addr = g_new0(SocketAddress, 1);
1180 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
17c55dec 1181 if (su->sun_path[0]) {
bd269ebc 1182 addr->u.q_unix.path = g_strndup(su->sun_path, sizeof(su->sun_path));
17c55dec
DB
1183 }
1184
1185 return addr;
1186}
1187#endif /* WIN32 */
1188
6a02c806 1189#ifdef CONFIG_AF_VSOCK
bd269ebc 1190static SocketAddress *
6a02c806
SH
1191socket_sockaddr_to_address_vsock(struct sockaddr_storage *sa,
1192 socklen_t salen,
1193 Error **errp)
1194{
bd269ebc 1195 SocketAddress *addr;
6a02c806
SH
1196 VsockSocketAddress *vaddr;
1197 struct sockaddr_vm *svm = (struct sockaddr_vm *)sa;
1198
bd269ebc
MA
1199 addr = g_new0(SocketAddress, 1);
1200 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1201 vaddr = &addr->u.vsock;
6a02c806
SH
1202 vaddr->cid = g_strdup_printf("%u", svm->svm_cid);
1203 vaddr->port = g_strdup_printf("%u", svm->svm_port);
1204
1205 return addr;
1206}
1207#endif /* CONFIG_AF_VSOCK */
1208
bd269ebc 1209SocketAddress *
17c55dec
DB
1210socket_sockaddr_to_address(struct sockaddr_storage *sa,
1211 socklen_t salen,
1212 Error **errp)
1213{
1214 switch (sa->ss_family) {
1215 case AF_INET:
1216 case AF_INET6:
1217 return socket_sockaddr_to_address_inet(sa, salen, errp);
1218
1219#ifndef WIN32
1220 case AF_UNIX:
1221 return socket_sockaddr_to_address_unix(sa, salen, errp);
1222#endif /* WIN32 */
1223
6a02c806
SH
1224#ifdef CONFIG_AF_VSOCK
1225 case AF_VSOCK:
1226 return socket_sockaddr_to_address_vsock(sa, salen, errp);
1227#endif
1228
17c55dec
DB
1229 default:
1230 error_setg(errp, "socket family %d unsupported",
1231 sa->ss_family);
1232 return NULL;
1233 }
1234 return 0;
1235}
1236
1237
bd269ebc 1238SocketAddress *socket_local_address(int fd, Error **errp)
17c55dec
DB
1239{
1240 struct sockaddr_storage ss;
1241 socklen_t sslen = sizeof(ss);
1242
1243 if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1244 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1245 "Unable to query local socket address");
1246 return NULL;
1247 }
1248
1249 return socket_sockaddr_to_address(&ss, sslen, errp);
1250}
1251
1252
bd269ebc 1253SocketAddress *socket_remote_address(int fd, Error **errp)
17c55dec
DB
1254{
1255 struct sockaddr_storage ss;
1256 socklen_t sslen = sizeof(ss);
1257
1258 if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1259 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1260 "Unable to query remote socket address");
1261 return NULL;
1262 }
1263
1264 return socket_sockaddr_to_address(&ss, sslen, errp);
1265}
2a8e21c7 1266
216411b8 1267
bd269ebc
MA
1268SocketAddress *socket_address_flatten(SocketAddressLegacy *addr_legacy)
1269{
fc0f0059 1270 SocketAddress *addr;
bd269ebc
MA
1271
1272 if (!addr_legacy) {
1273 return NULL;
1274 }
1275
fc0f0059
MA
1276 addr = g_new(SocketAddress, 1);
1277
bd269ebc
MA
1278 switch (addr_legacy->type) {
1279 case SOCKET_ADDRESS_LEGACY_KIND_INET:
1280 addr->type = SOCKET_ADDRESS_TYPE_INET;
1281 QAPI_CLONE_MEMBERS(InetSocketAddress, &addr->u.inet,
1282 addr_legacy->u.inet.data);
1283 break;
1284 case SOCKET_ADDRESS_LEGACY_KIND_UNIX:
1285 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1286 QAPI_CLONE_MEMBERS(UnixSocketAddress, &addr->u.q_unix,
1287 addr_legacy->u.q_unix.data);
1288 break;
1289 case SOCKET_ADDRESS_LEGACY_KIND_VSOCK:
1290 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1291 QAPI_CLONE_MEMBERS(VsockSocketAddress, &addr->u.vsock,
1292 addr_legacy->u.vsock.data);
1293 break;
1294 case SOCKET_ADDRESS_LEGACY_KIND_FD:
1295 addr->type = SOCKET_ADDRESS_TYPE_FD;
1296 QAPI_CLONE_MEMBERS(String, &addr->u.fd, addr_legacy->u.fd.data);
1297 break;
1298 default:
1299 abort();
1300 }
1301
1302 return addr;
1303}