]> git.proxmox.com Git - mirror_qemu.git/blame - util/qemu-sockets.c
s390x/pci: let pci devices start in configured mode
[mirror_qemu.git] / util / qemu-sockets.c
CommitLineData
305b0eb2
AL
1/*
2 * inet and unix socket functions for qemu
3 *
4 * (c) 2008 Gerd Hoffmann <kraxel@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 of the License.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
e6d91ab6
PB
14 *
15 * Contributions after 2012-01-13 are licensed under the terms of the
16 * GNU GPL, version 2 or (at your option) any later version.
305b0eb2 17 */
aafd7584 18#include "qemu/osdep.h"
d247d25f 19
6a02c806
SH
20#ifdef CONFIG_AF_VSOCK
21#include <linux/vm_sockets.h>
22#endif /* CONFIG_AF_VSOCK */
23
83c9089e 24#include "monitor/monitor.h"
bd269ebc 25#include "qapi/clone-visitor.h"
da34e65c 26#include "qapi/error.h"
1de7afc9 27#include "qemu/sockets.h"
1de7afc9 28#include "qemu/main-loop.h"
216411b8 29#include "qapi/clone-visitor.h"
b3db211f
DB
30#include "qapi/qobject-input-visitor.h"
31#include "qapi/qobject-output-visitor.h"
2a8e21c7 32#include "qapi-visit.h"
f348b6d1 33#include "qemu/cutils.h"
d247d25f
AL
34
35#ifndef AI_ADDRCONFIG
36# define AI_ADDRCONFIG 0
37#endif
340849a9 38
3de3d698
WB
39#ifndef AI_V4MAPPED
40# define AI_V4MAPPED 0
41#endif
d247d25f 42
6979a813
DB
43#ifndef AI_NUMERICSERV
44# define AI_NUMERICSERV 0
45#endif
46
2af2bf67 47
d247d25f
AL
48static int inet_getport(struct addrinfo *e)
49{
50 struct sockaddr_in *i4;
51 struct sockaddr_in6 *i6;
52
53 switch (e->ai_family) {
54 case PF_INET6:
55 i6 = (void*)e->ai_addr;
56 return ntohs(i6->sin6_port);
57 case PF_INET:
58 i4 = (void*)e->ai_addr;
59 return ntohs(i4->sin_port);
60 default:
61 return 0;
62 }
63}
64
65static void inet_setport(struct addrinfo *e, int port)
66{
67 struct sockaddr_in *i4;
68 struct sockaddr_in6 *i6;
69
70 switch (e->ai_family) {
71 case PF_INET6:
72 i6 = (void*)e->ai_addr;
73 i6->sin6_port = htons(port);
74 break;
75 case PF_INET:
76 i4 = (void*)e->ai_addr;
77 i4->sin_port = htons(port);
78 break;
79 }
80}
81
a589569f
WX
82NetworkAddressFamily inet_netfamily(int family)
83{
84 switch (family) {
85 case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6;
86 case PF_INET: return NETWORK_ADDRESS_FAMILY_IPV4;
87 case PF_UNIX: return NETWORK_ADDRESS_FAMILY_UNIX;
6a02c806
SH
88#ifdef CONFIG_AF_VSOCK
89 case PF_VSOCK: return NETWORK_ADDRESS_FAMILY_VSOCK;
90#endif /* CONFIG_AF_VSOCK */
a589569f
WX
91 }
92 return NETWORK_ADDRESS_FAMILY_UNKNOWN;
93}
94
1856835d
DB
95/*
96 * Matrix we're trying to apply
97 *
98 * ipv4 ipv6 family
99 * - - PF_UNSPEC
100 * - f PF_INET
101 * - t PF_INET6
102 * f - PF_INET6
103 * f f <error>
104 * f t PF_INET6
105 * t - PF_INET
106 * t f PF_INET
94bc0d19 107 * t t PF_INET6/PF_UNSPEC
1856835d 108 *
d43eda3d 109 * NB, this matrix is only about getting the necessary results
1856835d
DB
110 * from getaddrinfo(). Some of the cases require further work
111 * after reading results from getaddrinfo in order to fully
94bc0d19
DB
112 * apply the logic the end user wants.
113 *
114 * In the first and last cases, we must set IPV6_V6ONLY=0
115 * when binding, to allow a single listener to potentially
116 * accept both IPv4+6 addresses.
1856835d 117 */
c1b412f1
DB
118int inet_ai_family_from_address(InetSocketAddress *addr,
119 Error **errp)
1856835d
DB
120{
121 if (addr->has_ipv6 && addr->has_ipv4 &&
122 !addr->ipv6 && !addr->ipv4) {
123 error_setg(errp, "Cannot disable IPv4 and IPv6 at same time");
124 return PF_UNSPEC;
125 }
94bc0d19
DB
126 if ((addr->has_ipv6 && addr->ipv6) && (addr->has_ipv4 && addr->ipv4)) {
127 /*
128 * Some backends can only do a single listener. In that case
129 * we want empty hostname to resolve to "::" and then use the
130 * flag IPV6_V6ONLY==0 to get both protocols on 1 socket. This
131 * doesn't work for addresses other than "", so they're just
132 * inevitably broken until multiple listeners can be used,
133 * and thus we honour getaddrinfo automatic protocol detection
134 * Once all backends do multi-listener, remove the PF_INET6
135 * branch entirely.
136 */
137 if (!addr->host || g_str_equal(addr->host, "")) {
138 return PF_INET6;
139 } else {
140 return PF_UNSPEC;
141 }
142 }
1856835d
DB
143 if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) {
144 return PF_INET6;
145 }
146 if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) {
147 return PF_INET;
148 }
149 return PF_UNSPEC;
150}
151
39f80521
KO
152static int create_fast_reuse_socket(struct addrinfo *e)
153{
154 int slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol);
155 if (slisten < 0) {
156 return -1;
157 }
158 socket_set_fast_reuse(slisten);
159 return slisten;
160}
161
89382c3d
KO
162static int try_bind(int socket, InetSocketAddress *saddr, struct addrinfo *e)
163{
164#ifndef IPV6_V6ONLY
165 return bind(socket, e->ai_addr, e->ai_addrlen);
166#else
167 /*
168 * Deals with first & last cases in matrix in comment
169 * for inet_ai_family_from_address().
170 */
171 int v6only =
172 ((!saddr->has_ipv4 && !saddr->has_ipv6) ||
173 (saddr->has_ipv4 && saddr->ipv4 &&
174 saddr->has_ipv6 && saddr->ipv6)) ? 0 : 1;
175 int stat;
176
177 rebind:
178 if (e->ai_family == PF_INET6) {
179 qemu_setsockopt(socket, IPPROTO_IPV6, IPV6_V6ONLY, &v6only,
180 sizeof(v6only));
181 }
182
183 stat = bind(socket, e->ai_addr, e->ai_addrlen);
184 if (!stat) {
185 return 0;
186 }
187
188 /* If we got EADDRINUSE from an IPv6 bind & v6only is unset,
189 * it could be that the IPv4 port is already claimed, so retry
190 * with v6only set
191 */
192 if (e->ai_family == PF_INET6 && errno == EADDRINUSE && !v6only) {
193 v6only = 1;
194 goto rebind;
195 }
196 return stat;
197#endif
198}
199
1856835d
DB
200static int inet_listen_saddr(InetSocketAddress *saddr,
201 int port_offset,
202 bool update_addr,
203 Error **errp)
d247d25f
AL
204{
205 struct addrinfo ai,*res,*e;
d247d25f
AL
206 char port[33];
207 char uaddr[INET6_ADDRSTRLEN+1];
208 char uport[33];
9cf961bb 209 int rc, port_min, port_max, p;
10a7b7e6 210 int slisten = -1;
9cf961bb
KO
211 int saved_errno = 0;
212 bool socket_created = false;
1856835d 213 Error *err = NULL;
d247d25f
AL
214
215 memset(&ai,0, sizeof(ai));
3de3d698 216 ai.ai_flags = AI_PASSIVE;
6979a813
DB
217 if (saddr->has_numeric && saddr->numeric) {
218 ai.ai_flags |= AI_NUMERICHOST | AI_NUMERICSERV;
219 }
1856835d 220 ai.ai_family = inet_ai_family_from_address(saddr, &err);
e5bc776f 221 ai.ai_socktype = SOCK_STREAM;
d247d25f 222
1856835d
DB
223 if (err) {
224 error_propagate(errp, err);
225 return -1;
226 }
227
228 if (saddr->host == NULL) {
0983f5e6 229 error_setg(errp, "host not specified");
e5bc776f 230 return -1;
d247d25f 231 }
1856835d
DB
232 if (saddr->port != NULL) {
233 pstrcpy(port, sizeof(port), saddr->port);
0983f5e6
DB
234 } else {
235 port[0] = '\0';
236 }
d247d25f
AL
237
238 /* lookup */
8bc89127
GH
239 if (port_offset) {
240 unsigned long long baseport;
0983f5e6
DB
241 if (strlen(port) == 0) {
242 error_setg(errp, "port not specified");
243 return -1;
244 }
8bc89127
GH
245 if (parse_uint_full(port, &baseport, 10) < 0) {
246 error_setg(errp, "can't convert to a number: %s", port);
247 return -1;
248 }
249 if (baseport > 65535 ||
250 baseport + port_offset > 65535) {
251 error_setg(errp, "port %s out of range", port);
252 return -1;
253 }
254 snprintf(port, sizeof(port), "%d", (int)baseport + port_offset);
255 }
1856835d 256 rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL,
0983f5e6 257 strlen(port) ? port : NULL, &ai, &res);
d247d25f 258 if (rc != 0) {
1856835d
DB
259 error_setg(errp, "address resolution failed for %s:%s: %s",
260 saddr->host, port, gai_strerror(rc));
d247d25f
AL
261 return -1;
262 }
d247d25f 263
9cf961bb 264 /* create socket + bind/listen */
d247d25f 265 for (e = res; e != NULL; e = e->ai_next) {
39b6efc8
VS
266 getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
267 uaddr,INET6_ADDRSTRLEN,uport,32,
268 NI_NUMERICHOST | NI_NUMERICSERV);
39f80521 269
877691f9 270 port_min = inet_getport(e);
1856835d 271 port_max = saddr->has_to ? saddr->to + port_offset : port_min;
877691f9
MA
272 for (p = port_min; p <= port_max; p++) {
273 inet_setport(e, p);
10a7b7e6
DB
274
275 slisten = create_fast_reuse_socket(e);
276 if (slisten < 0) {
277 /* First time we expect we might fail to create the socket
278 * eg if 'e' has AF_INET6 but ipv6 kmod is not loaded.
279 * Later iterations should always succeed if first iteration
280 * worked though, so treat that as fatal.
281 */
282 if (p == port_min) {
9cf961bb
KO
283 continue;
284 } else {
10a7b7e6
DB
285 error_setg_errno(errp, errno,
286 "Failed to recreate failed listening socket");
9cf961bb 287 goto listen_failed;
029409e5 288 }
d247d25f 289 }
10a7b7e6
DB
290 socket_created = true;
291
292 rc = try_bind(slisten, saddr, e);
293 if (rc < 0) {
294 if (errno != EADDRINUSE) {
295 error_setg_errno(errp, errno, "Failed to bind socket");
296 goto listen_failed;
297 }
298 } else {
299 if (!listen(slisten, 1)) {
300 goto listen_ok;
301 }
302 if (errno != EADDRINUSE) {
303 error_setg_errno(errp, errno, "Failed to listen on socket");
304 goto listen_failed;
305 }
9cf961bb
KO
306 }
307 /* Someone else managed to bind to the same port and beat us
308 * to listen on it! Socket semantics does not allow us to
309 * recover from this situation, so we need to recreate the
310 * socket to allow bind attempts for subsequent ports:
311 */
312 closesocket(slisten);
10a7b7e6 313 slisten = -1;
d247d25f 314 }
9cf961bb
KO
315 }
316 error_setg_errno(errp, errno,
317 socket_created ?
318 "Failed to find an available port" :
319 "Failed to create a socket");
320listen_failed:
321 saved_errno = errno;
322 if (slisten >= 0) {
d247d25f
AL
323 closesocket(slisten);
324 }
d247d25f 325 freeaddrinfo(res);
9cf961bb 326 errno = saved_errno;
d247d25f
AL
327 return -1;
328
9cf961bb 329listen_ok:
1856835d
DB
330 if (update_addr) {
331 g_free(saddr->host);
332 saddr->host = g_strdup(uaddr);
333 g_free(saddr->port);
334 saddr->port = g_strdup_printf("%d",
335 inet_getport(e) - port_offset);
336 saddr->has_ipv6 = saddr->ipv6 = e->ai_family == PF_INET6;
337 saddr->has_ipv4 = saddr->ipv4 = e->ai_family != PF_INET6;
338 }
d247d25f
AL
339 freeaddrinfo(res);
340 return slisten;
341}
342
05bc1d8a
MT
343#ifdef _WIN32
344#define QEMU_SOCKET_RC_INPROGRESS(rc) \
345 ((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY)
346#else
347#define QEMU_SOCKET_RC_INPROGRESS(rc) \
348 ((rc) == -EINPROGRESS)
349#endif
350
b2587932 351static int inet_connect_addr(struct addrinfo *addr, Error **errp);
233aa5c2 352
b2587932 353static int inet_connect_addr(struct addrinfo *addr, Error **errp)
233aa5c2
OW
354{
355 int sock, rc;
356
05bc1d8a
MT
357 sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
358 if (sock < 0) {
235256a2 359 error_setg_errno(errp, errno, "Failed to create socket");
05bc1d8a
MT
360 return -1;
361 }
04fd1c78 362 socket_set_fast_reuse(sock);
b2587932 363
05bc1d8a
MT
364 /* connect to peer */
365 do {
366 rc = 0;
367 if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) {
b16a44e1 368 rc = -errno;
05bc1d8a
MT
369 }
370 } while (rc == -EINTR);
371
b2587932 372 if (rc < 0) {
235256a2 373 error_setg_errno(errp, errno, "Failed to connect socket");
05bc1d8a
MT
374 closesocket(sock);
375 return -1;
376 }
b2587932 377
05bc1d8a
MT
378 return sock;
379}
380
2942e420
DB
381static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr,
382 Error **errp)
05bc1d8a
MT
383{
384 struct addrinfo ai, *res;
385 int rc;
2942e420 386 Error *err = NULL;
340849a9 387 static int useV4Mapped = 1;
d247d25f 388
05bc1d8a 389 memset(&ai, 0, sizeof(ai));
233aa5c2 390
340849a9
DB
391 ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
392 if (atomic_read(&useV4Mapped)) {
393 ai.ai_flags |= AI_V4MAPPED;
394 }
2942e420 395 ai.ai_family = inet_ai_family_from_address(saddr, &err);
f4c94c7c 396 ai.ai_socktype = SOCK_STREAM;
d247d25f 397
2942e420
DB
398 if (err) {
399 error_propagate(errp, err);
05bc1d8a 400 return NULL;
d247d25f
AL
401 }
402
2942e420
DB
403 if (saddr->host == NULL || saddr->port == NULL) {
404 error_setg(errp, "host and/or port not specified");
405 return NULL;
05bc1d8a 406 }
d247d25f
AL
407
408 /* lookup */
2942e420 409 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
340849a9
DB
410
411 /* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but
412 * then don't implement it in their getaddrinfo(). Detect
413 * this and retry without the flag since that's preferrable
414 * to a fatal error
415 */
416 if (rc == EAI_BADFLAGS &&
417 (ai.ai_flags & AI_V4MAPPED)) {
418 atomic_set(&useV4Mapped, 0);
419 ai.ai_flags &= ~AI_V4MAPPED;
420 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
421 }
05bc1d8a 422 if (rc != 0) {
2942e420
DB
423 error_setg(errp, "address resolution failed for %s:%s: %s",
424 saddr->host, saddr->port, gai_strerror(rc));
05bc1d8a
MT
425 return NULL;
426 }
427 return res;
428}
429
5db5f44c
OW
430/**
431 * Create a socket and connect it to an address.
432 *
2942e420 433 * @saddr: Inet socket address specification
5db5f44c
OW
434 * @errp: set on error
435 *
436 * Returns: -1 on error, file descriptor on success.
437 */
b2587932 438int inet_connect_saddr(InetSocketAddress *saddr, Error **errp)
05bc1d8a 439{
3f9286b7 440 Error *local_err = NULL;
05bc1d8a
MT
441 struct addrinfo *res, *e;
442 int sock = -1;
05bc1d8a 443
2942e420 444 res = inet_parse_connect_saddr(saddr, errp);
05bc1d8a
MT
445 if (!res) {
446 return -1;
447 }
448
d247d25f 449 for (e = res; e != NULL; e = e->ai_next) {
3f9286b7
MA
450 error_free(local_err);
451 local_err = NULL;
b2587932 452 sock = inet_connect_addr(e, &local_err);
3f9286b7 453 if (sock >= 0) {
05bc1d8a 454 break;
a6ba35b3 455 }
d247d25f 456 }
3f9286b7
MA
457
458 if (sock < 0) {
459 error_propagate(errp, local_err);
3f9286b7 460 }
b2587932 461
d247d25f 462 freeaddrinfo(res);
05bc1d8a 463 return sock;
d247d25f
AL
464}
465
8b39910e
DB
466static int inet_dgram_saddr(InetSocketAddress *sraddr,
467 InetSocketAddress *sladdr,
468 Error **errp)
7e1b35b4
GH
469{
470 struct addrinfo ai, *peer = NULL, *local = NULL;
471 const char *addr;
472 const char *port;
7e1b35b4 473 int sock = -1, rc;
8b39910e 474 Error *err = NULL;
7e1b35b4
GH
475
476 /* lookup peer addr */
477 memset(&ai,0, sizeof(ai));
3de3d698 478 ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG;
8b39910e 479 ai.ai_family = inet_ai_family_from_address(sraddr, &err);
7e1b35b4
GH
480 ai.ai_socktype = SOCK_DGRAM;
481
8b39910e
DB
482 if (err) {
483 error_propagate(errp, err);
58c652c0 484 goto err;
8b39910e
DB
485 }
486
487 addr = sraddr->host;
488 port = sraddr->port;
7e1b35b4
GH
489 if (addr == NULL || strlen(addr) == 0) {
490 addr = "localhost";
491 }
492 if (port == NULL || strlen(port) == 0) {
4f085c82 493 error_setg(errp, "remote port not specified");
58c652c0 494 goto err;
7e1b35b4
GH
495 }
496
9cd1883c 497 if ((rc = getaddrinfo(addr, port, &ai, &peer)) != 0) {
4f085c82
PB
498 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
499 gai_strerror(rc));
26015051 500 goto err;
7e1b35b4 501 }
7e1b35b4
GH
502
503 /* lookup local addr */
504 memset(&ai,0, sizeof(ai));
505 ai.ai_flags = AI_PASSIVE;
506 ai.ai_family = peer->ai_family;
507 ai.ai_socktype = SOCK_DGRAM;
508
8b39910e
DB
509 if (sladdr) {
510 addr = sladdr->host;
511 port = sladdr->port;
512 if (addr == NULL || strlen(addr) == 0) {
513 addr = NULL;
514 }
515 if (!port || strlen(port) == 0) {
516 port = "0";
517 }
518 } else {
7e1b35b4 519 addr = NULL;
7e1b35b4 520 port = "0";
8b39910e 521 }
7e1b35b4 522
9cd1883c 523 if ((rc = getaddrinfo(addr, port, &ai, &local)) != 0) {
4f085c82
PB
524 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
525 gai_strerror(rc));
39b38459 526 goto err;
7e1b35b4 527 }
7e1b35b4
GH
528
529 /* create socket */
40ff6d7e 530 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol);
7e1b35b4 531 if (sock < 0) {
235256a2 532 error_setg_errno(errp, errno, "Failed to create socket");
7e1b35b4
GH
533 goto err;
534 }
04fd1c78 535 socket_set_fast_reuse(sock);
7e1b35b4
GH
536
537 /* bind socket */
7e1b35b4 538 if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) {
235256a2 539 error_setg_errno(errp, errno, "Failed to bind socket");
7e1b35b4
GH
540 goto err;
541 }
542
543 /* connect to peer */
7e1b35b4 544 if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) {
235256a2 545 error_setg_errno(errp, errno, "Failed to connect socket");
7e1b35b4
GH
546 goto err;
547 }
548
549 freeaddrinfo(local);
550 freeaddrinfo(peer);
551 return sock;
552
553err:
26015051 554 if (sock != -1) {
7e1b35b4 555 closesocket(sock);
26015051
C
556 }
557 if (local) {
7e1b35b4 558 freeaddrinfo(local);
26015051
C
559 }
560 if (peer) {
7e1b35b4 561 freeaddrinfo(peer);
26015051
C
562 }
563
7e1b35b4
GH
564 return -1;
565}
566
f4c94c7c 567/* compatibility wrapper */
0785bd7a 568int inet_parse(InetSocketAddress *addr, const char *str, Error **errp)
f4c94c7c
GH
569{
570 const char *optstr, *h;
55a10996 571 char host[65];
f4c94c7c 572 char port[33];
879e45c7 573 int to;
f4c94c7c
GH
574 int pos;
575
0785bd7a 576 memset(addr, 0, sizeof(*addr));
879e45c7 577
f4c94c7c
GH
578 /* parse address */
579 if (str[0] == ':') {
580 /* no host given */
879e45c7 581 host[0] = '\0';
9cd1883c 582 if (sscanf(str, ":%32[^,]%n", port, &pos) != 1) {
2f002c43 583 error_setg(errp, "error parsing port in address '%s'", str);
0785bd7a 584 return -1;
f4c94c7c
GH
585 }
586 } else if (str[0] == '[') {
587 /* IPv6 addr */
9cd1883c 588 if (sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 589 error_setg(errp, "error parsing IPv6 address '%s'", str);
0785bd7a 590 return -1;
f4c94c7c 591 }
f4c94c7c 592 } else {
391b7b97 593 /* hostname or IPv4 addr */
9cd1883c 594 if (sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 595 error_setg(errp, "error parsing address '%s'", str);
0785bd7a 596 return -1;
f4c94c7c
GH
597 }
598 }
879e45c7
PB
599
600 addr->host = g_strdup(host);
601 addr->port = g_strdup(port);
f4c94c7c
GH
602
603 /* parse options */
604 optstr = str + pos;
605 h = strstr(optstr, ",to=");
879e45c7 606 if (h) {
1ccbc285
AP
607 h += 4;
608 if (sscanf(h, "%d%n", &to, &pos) != 1 ||
609 (h[pos] != '\0' && h[pos] != ',')) {
879e45c7 610 error_setg(errp, "error parsing to= argument");
0785bd7a 611 return -1;
879e45c7
PB
612 }
613 addr->has_to = true;
614 addr->to = to;
615 }
616 if (strstr(optstr, ",ipv4")) {
617 addr->ipv4 = addr->has_ipv4 = true;
618 }
619 if (strstr(optstr, ",ipv6")) {
620 addr->ipv6 = addr->has_ipv6 = true;
621 }
0785bd7a 622 return 0;
879e45c7
PB
623}
624
e5bc776f 625
5db5f44c
OW
626/**
627 * Create a blocking socket and connect it to an address.
628 *
629 * @str: address string
630 * @errp: set in case of an error
631 *
632 * Returns -1 in case of error, file descriptor on success
633 **/
634int inet_connect(const char *str, Error **errp)
f4c94c7c 635{
f4c94c7c 636 int sock = -1;
0785bd7a 637 InetSocketAddress *addr = g_new(InetSocketAddress, 1);
f4c94c7c 638
0785bd7a 639 if (!inet_parse(addr, str, errp)) {
b2587932 640 sock = inet_connect_saddr(addr, errp);
5db5f44c 641 }
0785bd7a 642 qapi_free_InetSocketAddress(addr);
5db5f44c
OW
643 return sock;
644}
645
6a02c806
SH
646#ifdef CONFIG_AF_VSOCK
647static bool vsock_parse_vaddr_to_sockaddr(const VsockSocketAddress *vaddr,
648 struct sockaddr_vm *svm,
649 Error **errp)
650{
651 unsigned long long val;
652
653 memset(svm, 0, sizeof(*svm));
654 svm->svm_family = AF_VSOCK;
655
656 if (parse_uint_full(vaddr->cid, &val, 10) < 0 ||
657 val > UINT32_MAX) {
658 error_setg(errp, "Failed to parse cid '%s'", vaddr->cid);
659 return false;
660 }
661 svm->svm_cid = val;
662
663 if (parse_uint_full(vaddr->port, &val, 10) < 0 ||
664 val > UINT32_MAX) {
665 error_setg(errp, "Failed to parse port '%s'", vaddr->port);
666 return false;
667 }
668 svm->svm_port = val;
669
670 return true;
671}
672
b2587932 673static int vsock_connect_addr(const struct sockaddr_vm *svm, Error **errp)
6a02c806
SH
674{
675 int sock, rc;
676
6a02c806
SH
677 sock = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
678 if (sock < 0) {
679 error_setg_errno(errp, errno, "Failed to create socket");
680 return -1;
681 }
b2587932 682
6a02c806
SH
683 /* connect to peer */
684 do {
685 rc = 0;
686 if (connect(sock, (const struct sockaddr *)svm, sizeof(*svm)) < 0) {
687 rc = -errno;
688 }
689 } while (rc == -EINTR);
690
b2587932 691 if (rc < 0) {
6a02c806
SH
692 error_setg_errno(errp, errno, "Failed to connect socket");
693 closesocket(sock);
694 return -1;
695 }
b2587932 696
6a02c806
SH
697 return sock;
698}
699
b2587932 700static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
6a02c806
SH
701{
702 struct sockaddr_vm svm;
703 int sock = -1;
6a02c806
SH
704
705 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
706 return -1;
707 }
708
b2587932 709 sock = vsock_connect_addr(&svm, errp);
6a02c806 710
6a02c806
SH
711 return sock;
712}
713
714static int vsock_listen_saddr(VsockSocketAddress *vaddr,
715 Error **errp)
716{
717 struct sockaddr_vm svm;
718 int slisten;
719
720 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
721 return -1;
722 }
723
724 slisten = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
725 if (slisten < 0) {
726 error_setg_errno(errp, errno, "Failed to create socket");
727 return -1;
728 }
729
730 if (bind(slisten, (const struct sockaddr *)&svm, sizeof(svm)) != 0) {
731 error_setg_errno(errp, errno, "Failed to bind socket");
732 closesocket(slisten);
733 return -1;
734 }
735
736 if (listen(slisten, 1) != 0) {
737 error_setg_errno(errp, errno, "Failed to listen on socket");
738 closesocket(slisten);
739 return -1;
740 }
741 return slisten;
742}
743
4db5c619
MA
744static int vsock_parse(VsockSocketAddress *addr, const char *str,
745 Error **errp)
6a02c806 746{
6a02c806
SH
747 char cid[33];
748 char port[33];
749 int n;
750
751 if (sscanf(str, "%32[^:]:%32[^,]%n", cid, port, &n) != 2) {
752 error_setg(errp, "error parsing address '%s'", str);
4db5c619 753 return -1;
6a02c806
SH
754 }
755 if (str[n] != '\0') {
756 error_setg(errp, "trailing characters in address '%s'", str);
4db5c619 757 return -1;
6a02c806
SH
758 }
759
6a02c806
SH
760 addr->cid = g_strdup(cid);
761 addr->port = g_strdup(port);
4db5c619 762 return 0;
6a02c806
SH
763}
764#else
765static void vsock_unsupported(Error **errp)
766{
767 error_setg(errp, "socket family AF_VSOCK unsupported");
768}
769
b2587932 770static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
6a02c806
SH
771{
772 vsock_unsupported(errp);
773 return -1;
774}
775
776static int vsock_listen_saddr(VsockSocketAddress *vaddr,
777 Error **errp)
778{
779 vsock_unsupported(errp);
780 return -1;
781}
782
4db5c619
MA
783static int vsock_parse(VsockSocketAddress *addr, const char *str,
784 Error **errp)
6a02c806
SH
785{
786 vsock_unsupported(errp);
4db5c619 787 return -1;
6a02c806
SH
788}
789#endif /* CONFIG_AF_VSOCK */
790
d247d25f
AL
791#ifndef _WIN32
792
1856835d
DB
793static int unix_listen_saddr(UnixSocketAddress *saddr,
794 bool update_addr,
795 Error **errp)
d247d25f
AL
796{
797 struct sockaddr_un un;
62b6adfb 798 int sock, fd;
ad9579aa
DB
799 char *pathbuf = NULL;
800 const char *path;
d247d25f 801
40ff6d7e 802 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 803 if (sock < 0) {
b658c53d 804 error_setg_errno(errp, errno, "Failed to create Unix socket");
39b6efc8 805 return -1;
d247d25f
AL
806 }
807
ad9579aa
DB
808 if (saddr->path && saddr->path[0]) {
809 path = saddr->path;
d247d25f 810 } else {
b658c53d
PB
811 const char *tmpdir = getenv("TMPDIR");
812 tmpdir = tmpdir ? tmpdir : "/tmp";
ad9579aa
DB
813 path = pathbuf = g_strdup_printf("%s/qemu-socket-XXXXXX", tmpdir);
814 }
b658c53d 815
ad9579aa
DB
816 if (strlen(path) > sizeof(un.sun_path)) {
817 error_setg(errp, "UNIX socket path '%s' is too long", path);
818 error_append_hint(errp, "Path must be less than %zu bytes\n",
819 sizeof(un.sun_path));
820 goto err;
821 }
822
823 if (pathbuf != NULL) {
d247d25f
AL
824 /*
825 * This dummy fd usage silences the mktemp() unsecure warning.
826 * Using mkstemp() doesn't make things more secure here
827 * though. bind() complains about existing files, so we have
828 * to unlink first and thus re-open the race window. The
829 * worst case possible is bind() failing, i.e. a DoS attack.
830 */
ad9579aa 831 fd = mkstemp(pathbuf);
b658c53d
PB
832 if (fd < 0) {
833 error_setg_errno(errp, errno,
ad9579aa 834 "Failed to make a temporary socket %s", pathbuf);
b658c53d
PB
835 goto err;
836 }
837 close(fd);
d247d25f 838 }
d247d25f 839
ad9579aa 840 if (unlink(path) < 0 && errno != ENOENT) {
0ef705a2 841 error_setg_errno(errp, errno,
ad9579aa 842 "Failed to unlink socket %s", path);
0ef705a2
CR
843 goto err;
844 }
ad9579aa
DB
845
846 memset(&un, 0, sizeof(un));
847 un.sun_family = AF_UNIX;
848 strncpy(un.sun_path, path, sizeof(un.sun_path));
849
d247d25f 850 if (bind(sock, (struct sockaddr*) &un, sizeof(un)) < 0) {
56382bd5 851 error_setg_errno(errp, errno, "Failed to bind socket to %s", path);
d247d25f
AL
852 goto err;
853 }
854 if (listen(sock, 1) < 0) {
235256a2 855 error_setg_errno(errp, errno, "Failed to listen on socket");
d247d25f
AL
856 goto err;
857 }
858
ad9579aa
DB
859 if (update_addr && pathbuf) {
860 g_free(saddr->path);
861 saddr->path = pathbuf;
862 } else {
863 g_free(pathbuf);
864 }
d247d25f
AL
865 return sock;
866
867err:
ad9579aa 868 g_free(pathbuf);
d247d25f
AL
869 closesocket(sock);
870 return -1;
871}
872
b2587932 873static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
d247d25f
AL
874{
875 struct sockaddr_un un;
1fc05adf 876 int sock, rc;
d247d25f 877
2942e420 878 if (saddr->path == NULL) {
312fd5f2 879 error_setg(errp, "unix connect: no path specified");
2af2bf67
GH
880 return -1;
881 }
882
40ff6d7e 883 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 884 if (sock < 0) {
235256a2 885 error_setg_errno(errp, errno, "Failed to create socket");
39b6efc8 886 return -1;
d247d25f
AL
887 }
888
ad9579aa
DB
889 if (strlen(saddr->path) > sizeof(un.sun_path)) {
890 error_setg(errp, "UNIX socket path '%s' is too long", saddr->path);
891 error_append_hint(errp, "Path must be less than %zu bytes\n",
892 sizeof(un.sun_path));
893 goto err;
894 }
895
d247d25f
AL
896 memset(&un, 0, sizeof(un));
897 un.sun_family = AF_UNIX;
ad9579aa 898 strncpy(un.sun_path, saddr->path, sizeof(un.sun_path));
1fc05adf
PB
899
900 /* connect to peer */
901 do {
902 rc = 0;
903 if (connect(sock, (struct sockaddr *) &un, sizeof(un)) < 0) {
b16a44e1 904 rc = -errno;
1fc05adf
PB
905 }
906 } while (rc == -EINTR);
907
1fc05adf 908 if (rc < 0) {
ad9579aa
DB
909 error_setg_errno(errp, -rc, "Failed to connect socket %s",
910 saddr->path);
911 goto err;
d247d25f
AL
912 }
913
d247d25f 914 return sock;
ad9579aa
DB
915
916 err:
917 close(sock);
ad9579aa 918 return -1;
d247d25f
AL
919}
920
0c814709
PB
921#else
922
1856835d
DB
923static int unix_listen_saddr(UnixSocketAddress *saddr,
924 bool update_addr,
925 Error **errp)
0c814709 926{
58899664 927 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
928 errno = ENOTSUP;
929 return -1;
930}
931
b2587932 932static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
0c814709 933{
58899664 934 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
935 errno = ENOTSUP;
936 return -1;
937}
938#endif
939
2af2bf67 940/* compatibility wrapper */
7fc4e63e 941int unix_listen(const char *str, char *ostr, int olen, Error **errp)
62b6adfb 942{
62b6adfb
GH
943 char *path, *optstr;
944 int sock, len;
1856835d 945 UnixSocketAddress *saddr;
62b6adfb 946
1856835d 947 saddr = g_new0(UnixSocketAddress, 1);
62b6adfb
GH
948
949 optstr = strchr(str, ',');
950 if (optstr) {
951 len = optstr - str;
952 if (len) {
7267c094 953 path = g_malloc(len+1);
62b6adfb 954 snprintf(path, len+1, "%.*s", len, str);
1856835d 955 saddr->path = path;
62b6adfb
GH
956 }
957 } else {
1856835d 958 saddr->path = g_strdup(str);
62b6adfb
GH
959 }
960
1856835d 961 sock = unix_listen_saddr(saddr, true, errp);
62b6adfb 962
26015051 963 if (sock != -1 && ostr) {
1856835d 964 snprintf(ostr, olen, "%s%s", saddr->path, optstr ? optstr : "");
26015051
C
965 }
966
1856835d 967 qapi_free_UnixSocketAddress(saddr);
62b6adfb
GH
968 return sock;
969}
970
7fc4e63e 971int unix_connect(const char *path, Error **errp)
2af2bf67 972{
2942e420 973 UnixSocketAddress *saddr;
2af2bf67
GH
974 int sock;
975
2942e420
DB
976 saddr = g_new0(UnixSocketAddress, 1);
977 saddr->path = g_strdup(path);
b2587932 978 sock = unix_connect_saddr(saddr, errp);
2942e420 979 qapi_free_UnixSocketAddress(saddr);
1fc05adf
PB
980 return sock;
981}
982
983
bd269ebc 984SocketAddress *socket_parse(const char *str, Error **errp)
101f9cbc 985{
bd269ebc 986 SocketAddress *addr;
101f9cbc 987
bd269ebc 988 addr = g_new0(SocketAddress, 1);
101f9cbc
PB
989 if (strstart(str, "unix:", NULL)) {
990 if (str[5] == '\0') {
312fd5f2 991 error_setg(errp, "invalid Unix socket address");
101f9cbc
PB
992 goto fail;
993 } else {
bd269ebc
MA
994 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
995 addr->u.q_unix.path = g_strdup(str + 5);
101f9cbc
PB
996 }
997 } else if (strstart(str, "fd:", NULL)) {
998 if (str[3] == '\0') {
312fd5f2 999 error_setg(errp, "invalid file descriptor address");
101f9cbc
PB
1000 goto fail;
1001 } else {
bd269ebc
MA
1002 addr->type = SOCKET_ADDRESS_TYPE_FD;
1003 addr->u.fd.str = g_strdup(str + 3);
101f9cbc 1004 }
6a02c806 1005 } else if (strstart(str, "vsock:", NULL)) {
bd269ebc
MA
1006 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1007 if (vsock_parse(&addr->u.vsock, str + strlen("vsock:"), errp)) {
6a02c806
SH
1008 goto fail;
1009 }
101f9cbc 1010 } else {
bd269ebc
MA
1011 addr->type = SOCKET_ADDRESS_TYPE_INET;
1012 if (inet_parse(&addr->u.inet, str, errp)) {
101f9cbc
PB
1013 goto fail;
1014 }
1015 }
1016 return addr;
1017
1018fail:
bd269ebc 1019 qapi_free_SocketAddress(addr);
101f9cbc
PB
1020 return NULL;
1021}
1022
b2587932 1023int socket_connect(SocketAddress *addr, Error **errp)
101f9cbc 1024{
101f9cbc
PB
1025 int fd;
1026
2d32adda 1027 switch (addr->type) {
bd269ebc 1028 case SOCKET_ADDRESS_TYPE_INET:
b2587932 1029 fd = inet_connect_saddr(&addr->u.inet, errp);
101f9cbc
PB
1030 break;
1031
bd269ebc 1032 case SOCKET_ADDRESS_TYPE_UNIX:
b2587932 1033 fd = unix_connect_saddr(&addr->u.q_unix, errp);
101f9cbc
PB
1034 break;
1035
bd269ebc
MA
1036 case SOCKET_ADDRESS_TYPE_FD:
1037 fd = monitor_get_fd(cur_mon, addr->u.fd.str, errp);
101f9cbc
PB
1038 break;
1039
bd269ebc 1040 case SOCKET_ADDRESS_TYPE_VSOCK:
b2587932 1041 fd = vsock_connect_saddr(&addr->u.vsock, errp);
6a02c806
SH
1042 break;
1043
101f9cbc
PB
1044 default:
1045 abort();
1046 }
101f9cbc
PB
1047 return fd;
1048}
1049
bd269ebc 1050int socket_listen(SocketAddress *addr, Error **errp)
101f9cbc 1051{
101f9cbc
PB
1052 int fd;
1053
2d32adda 1054 switch (addr->type) {
bd269ebc
MA
1055 case SOCKET_ADDRESS_TYPE_INET:
1056 fd = inet_listen_saddr(&addr->u.inet, 0, false, errp);
101f9cbc
PB
1057 break;
1058
bd269ebc
MA
1059 case SOCKET_ADDRESS_TYPE_UNIX:
1060 fd = unix_listen_saddr(&addr->u.q_unix, false, errp);
101f9cbc
PB
1061 break;
1062
bd269ebc
MA
1063 case SOCKET_ADDRESS_TYPE_FD:
1064 fd = monitor_get_fd(cur_mon, addr->u.fd.str, errp);
101f9cbc
PB
1065 break;
1066
bd269ebc
MA
1067 case SOCKET_ADDRESS_TYPE_VSOCK:
1068 fd = vsock_listen_saddr(&addr->u.vsock, errp);
6a02c806
SH
1069 break;
1070
101f9cbc
PB
1071 default:
1072 abort();
1073 }
101f9cbc
PB
1074 return fd;
1075}
1076
74b6ce43
MAL
1077void socket_listen_cleanup(int fd, Error **errp)
1078{
bd269ebc 1079 SocketAddress *addr;
74b6ce43
MAL
1080
1081 addr = socket_local_address(fd, errp);
1082
bd269ebc
MA
1083 if (addr->type == SOCKET_ADDRESS_TYPE_UNIX
1084 && addr->u.q_unix.path) {
1085 if (unlink(addr->u.q_unix.path) < 0 && errno != ENOENT) {
74b6ce43
MAL
1086 error_setg_errno(errp, errno,
1087 "Failed to unlink socket %s",
bd269ebc 1088 addr->u.q_unix.path);
74b6ce43
MAL
1089 }
1090 }
1091
bd269ebc 1092 qapi_free_SocketAddress(addr);
74b6ce43
MAL
1093}
1094
bd269ebc 1095int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp)
3ecc059d 1096{
3ecc059d
GH
1097 int fd;
1098
ca0b64e5 1099 /*
bd269ebc 1100 * TODO SOCKET_ADDRESS_TYPE_FD when fd is AF_INET or AF_INET6
ca0b64e5
MA
1101 * (although other address families can do SOCK_DGRAM, too)
1102 */
2d32adda 1103 switch (remote->type) {
bd269ebc
MA
1104 case SOCKET_ADDRESS_TYPE_INET:
1105 fd = inet_dgram_saddr(&remote->u.inet,
1106 local ? &local->u.inet : NULL, errp);
3ecc059d
GH
1107 break;
1108
1109 default:
1110 error_setg(errp, "socket type unsupported for datagram");
7a5b6af1 1111 fd = -1;
3ecc059d 1112 }
3ecc059d
GH
1113 return fd;
1114}
17c55dec
DB
1115
1116
bd269ebc 1117static SocketAddress *
17c55dec
DB
1118socket_sockaddr_to_address_inet(struct sockaddr_storage *sa,
1119 socklen_t salen,
1120 Error **errp)
1121{
1122 char host[NI_MAXHOST];
1123 char serv[NI_MAXSERV];
bd269ebc 1124 SocketAddress *addr;
0399293e 1125 InetSocketAddress *inet;
17c55dec
DB
1126 int ret;
1127
1128 ret = getnameinfo((struct sockaddr *)sa, salen,
1129 host, sizeof(host),
1130 serv, sizeof(serv),
1131 NI_NUMERICHOST | NI_NUMERICSERV);
1132 if (ret != 0) {
1133 error_setg(errp, "Cannot format numeric socket address: %s",
1134 gai_strerror(ret));
1135 return NULL;
1136 }
1137
bd269ebc
MA
1138 addr = g_new0(SocketAddress, 1);
1139 addr->type = SOCKET_ADDRESS_TYPE_INET;
1140 inet = &addr->u.inet;
0399293e
EB
1141 inet->host = g_strdup(host);
1142 inet->port = g_strdup(serv);
17c55dec 1143 if (sa->ss_family == AF_INET) {
0399293e 1144 inet->has_ipv4 = inet->ipv4 = true;
17c55dec 1145 } else {
0399293e 1146 inet->has_ipv6 = inet->ipv6 = true;
17c55dec
DB
1147 }
1148
1149 return addr;
1150}
1151
1152
1153#ifndef WIN32
bd269ebc 1154static SocketAddress *
17c55dec
DB
1155socket_sockaddr_to_address_unix(struct sockaddr_storage *sa,
1156 socklen_t salen,
1157 Error **errp)
1158{
bd269ebc 1159 SocketAddress *addr;
17c55dec
DB
1160 struct sockaddr_un *su = (struct sockaddr_un *)sa;
1161
bd269ebc
MA
1162 addr = g_new0(SocketAddress, 1);
1163 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
17c55dec 1164 if (su->sun_path[0]) {
bd269ebc 1165 addr->u.q_unix.path = g_strndup(su->sun_path, sizeof(su->sun_path));
17c55dec
DB
1166 }
1167
1168 return addr;
1169}
1170#endif /* WIN32 */
1171
6a02c806 1172#ifdef CONFIG_AF_VSOCK
bd269ebc 1173static SocketAddress *
6a02c806
SH
1174socket_sockaddr_to_address_vsock(struct sockaddr_storage *sa,
1175 socklen_t salen,
1176 Error **errp)
1177{
bd269ebc 1178 SocketAddress *addr;
6a02c806
SH
1179 VsockSocketAddress *vaddr;
1180 struct sockaddr_vm *svm = (struct sockaddr_vm *)sa;
1181
bd269ebc
MA
1182 addr = g_new0(SocketAddress, 1);
1183 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1184 vaddr = &addr->u.vsock;
6a02c806
SH
1185 vaddr->cid = g_strdup_printf("%u", svm->svm_cid);
1186 vaddr->port = g_strdup_printf("%u", svm->svm_port);
1187
1188 return addr;
1189}
1190#endif /* CONFIG_AF_VSOCK */
1191
bd269ebc 1192SocketAddress *
17c55dec
DB
1193socket_sockaddr_to_address(struct sockaddr_storage *sa,
1194 socklen_t salen,
1195 Error **errp)
1196{
1197 switch (sa->ss_family) {
1198 case AF_INET:
1199 case AF_INET6:
1200 return socket_sockaddr_to_address_inet(sa, salen, errp);
1201
1202#ifndef WIN32
1203 case AF_UNIX:
1204 return socket_sockaddr_to_address_unix(sa, salen, errp);
1205#endif /* WIN32 */
1206
6a02c806
SH
1207#ifdef CONFIG_AF_VSOCK
1208 case AF_VSOCK:
1209 return socket_sockaddr_to_address_vsock(sa, salen, errp);
1210#endif
1211
17c55dec
DB
1212 default:
1213 error_setg(errp, "socket family %d unsupported",
1214 sa->ss_family);
1215 return NULL;
1216 }
1217 return 0;
1218}
1219
1220
bd269ebc 1221SocketAddress *socket_local_address(int fd, Error **errp)
17c55dec
DB
1222{
1223 struct sockaddr_storage ss;
1224 socklen_t sslen = sizeof(ss);
1225
1226 if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1227 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1228 "Unable to query local socket address");
1229 return NULL;
1230 }
1231
1232 return socket_sockaddr_to_address(&ss, sslen, errp);
1233}
1234
1235
bd269ebc 1236SocketAddress *socket_remote_address(int fd, Error **errp)
17c55dec
DB
1237{
1238 struct sockaddr_storage ss;
1239 socklen_t sslen = sizeof(ss);
1240
1241 if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1242 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1243 "Unable to query remote socket address");
1244 return NULL;
1245 }
1246
1247 return socket_sockaddr_to_address(&ss, sslen, errp);
1248}
2a8e21c7 1249
216411b8 1250
bd269ebc
MA
1251SocketAddress *socket_address_flatten(SocketAddressLegacy *addr_legacy)
1252{
fc0f0059 1253 SocketAddress *addr;
bd269ebc
MA
1254
1255 if (!addr_legacy) {
1256 return NULL;
1257 }
1258
fc0f0059
MA
1259 addr = g_new(SocketAddress, 1);
1260
bd269ebc
MA
1261 switch (addr_legacy->type) {
1262 case SOCKET_ADDRESS_LEGACY_KIND_INET:
1263 addr->type = SOCKET_ADDRESS_TYPE_INET;
1264 QAPI_CLONE_MEMBERS(InetSocketAddress, &addr->u.inet,
1265 addr_legacy->u.inet.data);
1266 break;
1267 case SOCKET_ADDRESS_LEGACY_KIND_UNIX:
1268 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1269 QAPI_CLONE_MEMBERS(UnixSocketAddress, &addr->u.q_unix,
1270 addr_legacy->u.q_unix.data);
1271 break;
1272 case SOCKET_ADDRESS_LEGACY_KIND_VSOCK:
1273 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1274 QAPI_CLONE_MEMBERS(VsockSocketAddress, &addr->u.vsock,
1275 addr_legacy->u.vsock.data);
1276 break;
1277 case SOCKET_ADDRESS_LEGACY_KIND_FD:
1278 addr->type = SOCKET_ADDRESS_TYPE_FD;
1279 QAPI_CLONE_MEMBERS(String, &addr->u.fd, addr_legacy->u.fd.data);
1280 break;
1281 default:
1282 abort();
1283 }
1284
1285 return addr;
1286}