]> git.proxmox.com Git - mirror_qemu.git/blame - util/qemu-sockets.c
tests: move virtio entirely to qos-test
[mirror_qemu.git] / util / qemu-sockets.c
CommitLineData
305b0eb2
AL
1/*
2 * inet and unix socket functions for qemu
3 *
4 * (c) 2008 Gerd Hoffmann <kraxel@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 of the License.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
e6d91ab6
PB
14 *
15 * Contributions after 2012-01-13 are licensed under the terms of the
16 * GNU GPL, version 2 or (at your option) any later version.
305b0eb2 17 */
aafd7584 18#include "qemu/osdep.h"
d247d25f 19
6a02c806
SH
20#ifdef CONFIG_AF_VSOCK
21#include <linux/vm_sockets.h>
22#endif /* CONFIG_AF_VSOCK */
23
83c9089e 24#include "monitor/monitor.h"
bd269ebc 25#include "qapi/clone-visitor.h"
da34e65c 26#include "qapi/error.h"
9af23989 27#include "qapi/qapi-visit-sockets.h"
1de7afc9 28#include "qemu/sockets.h"
1de7afc9 29#include "qemu/main-loop.h"
b3db211f
DB
30#include "qapi/qobject-input-visitor.h"
31#include "qapi/qobject-output-visitor.h"
f348b6d1 32#include "qemu/cutils.h"
d247d25f
AL
33
34#ifndef AI_ADDRCONFIG
35# define AI_ADDRCONFIG 0
36#endif
340849a9 37
3de3d698
WB
38#ifndef AI_V4MAPPED
39# define AI_V4MAPPED 0
40#endif
d247d25f 41
6979a813
DB
42#ifndef AI_NUMERICSERV
43# define AI_NUMERICSERV 0
44#endif
45
2af2bf67 46
d247d25f
AL
47static int inet_getport(struct addrinfo *e)
48{
49 struct sockaddr_in *i4;
50 struct sockaddr_in6 *i6;
51
52 switch (e->ai_family) {
53 case PF_INET6:
54 i6 = (void*)e->ai_addr;
55 return ntohs(i6->sin6_port);
56 case PF_INET:
57 i4 = (void*)e->ai_addr;
58 return ntohs(i4->sin_port);
59 default:
60 return 0;
61 }
62}
63
64static void inet_setport(struct addrinfo *e, int port)
65{
66 struct sockaddr_in *i4;
67 struct sockaddr_in6 *i6;
68
69 switch (e->ai_family) {
70 case PF_INET6:
71 i6 = (void*)e->ai_addr;
72 i6->sin6_port = htons(port);
73 break;
74 case PF_INET:
75 i4 = (void*)e->ai_addr;
76 i4->sin_port = htons(port);
77 break;
78 }
79}
80
a589569f
WX
81NetworkAddressFamily inet_netfamily(int family)
82{
83 switch (family) {
84 case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6;
85 case PF_INET: return NETWORK_ADDRESS_FAMILY_IPV4;
86 case PF_UNIX: return NETWORK_ADDRESS_FAMILY_UNIX;
6a02c806
SH
87#ifdef CONFIG_AF_VSOCK
88 case PF_VSOCK: return NETWORK_ADDRESS_FAMILY_VSOCK;
89#endif /* CONFIG_AF_VSOCK */
a589569f
WX
90 }
91 return NETWORK_ADDRESS_FAMILY_UNKNOWN;
92}
93
58dc31f1
DB
94bool fd_is_socket(int fd)
95{
96 int optval;
97 socklen_t optlen = sizeof(optval);
98 return !qemu_getsockopt(fd, SOL_SOCKET, SO_TYPE, &optval, &optlen);
99}
100
101
1856835d
DB
102/*
103 * Matrix we're trying to apply
104 *
105 * ipv4 ipv6 family
106 * - - PF_UNSPEC
107 * - f PF_INET
108 * - t PF_INET6
109 * f - PF_INET6
110 * f f <error>
111 * f t PF_INET6
112 * t - PF_INET
113 * t f PF_INET
94bc0d19 114 * t t PF_INET6/PF_UNSPEC
1856835d 115 *
d43eda3d 116 * NB, this matrix is only about getting the necessary results
1856835d
DB
117 * from getaddrinfo(). Some of the cases require further work
118 * after reading results from getaddrinfo in order to fully
94bc0d19
DB
119 * apply the logic the end user wants.
120 *
121 * In the first and last cases, we must set IPV6_V6ONLY=0
122 * when binding, to allow a single listener to potentially
123 * accept both IPv4+6 addresses.
1856835d 124 */
c1b412f1
DB
125int inet_ai_family_from_address(InetSocketAddress *addr,
126 Error **errp)
1856835d
DB
127{
128 if (addr->has_ipv6 && addr->has_ipv4 &&
129 !addr->ipv6 && !addr->ipv4) {
130 error_setg(errp, "Cannot disable IPv4 and IPv6 at same time");
131 return PF_UNSPEC;
132 }
94bc0d19
DB
133 if ((addr->has_ipv6 && addr->ipv6) && (addr->has_ipv4 && addr->ipv4)) {
134 /*
135 * Some backends can only do a single listener. In that case
136 * we want empty hostname to resolve to "::" and then use the
137 * flag IPV6_V6ONLY==0 to get both protocols on 1 socket. This
138 * doesn't work for addresses other than "", so they're just
139 * inevitably broken until multiple listeners can be used,
140 * and thus we honour getaddrinfo automatic protocol detection
141 * Once all backends do multi-listener, remove the PF_INET6
142 * branch entirely.
143 */
144 if (!addr->host || g_str_equal(addr->host, "")) {
145 return PF_INET6;
146 } else {
147 return PF_UNSPEC;
148 }
149 }
1856835d
DB
150 if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) {
151 return PF_INET6;
152 }
153 if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) {
154 return PF_INET;
155 }
156 return PF_UNSPEC;
157}
158
39f80521
KO
159static int create_fast_reuse_socket(struct addrinfo *e)
160{
161 int slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol);
162 if (slisten < 0) {
163 return -1;
164 }
165 socket_set_fast_reuse(slisten);
166 return slisten;
167}
168
89382c3d
KO
169static int try_bind(int socket, InetSocketAddress *saddr, struct addrinfo *e)
170{
171#ifndef IPV6_V6ONLY
172 return bind(socket, e->ai_addr, e->ai_addrlen);
173#else
174 /*
175 * Deals with first & last cases in matrix in comment
176 * for inet_ai_family_from_address().
177 */
178 int v6only =
179 ((!saddr->has_ipv4 && !saddr->has_ipv6) ||
180 (saddr->has_ipv4 && saddr->ipv4 &&
181 saddr->has_ipv6 && saddr->ipv6)) ? 0 : 1;
182 int stat;
183
184 rebind:
185 if (e->ai_family == PF_INET6) {
186 qemu_setsockopt(socket, IPPROTO_IPV6, IPV6_V6ONLY, &v6only,
187 sizeof(v6only));
188 }
189
190 stat = bind(socket, e->ai_addr, e->ai_addrlen);
191 if (!stat) {
192 return 0;
193 }
194
195 /* If we got EADDRINUSE from an IPv6 bind & v6only is unset,
196 * it could be that the IPv4 port is already claimed, so retry
197 * with v6only set
198 */
199 if (e->ai_family == PF_INET6 && errno == EADDRINUSE && !v6only) {
200 v6only = 1;
201 goto rebind;
202 }
203 return stat;
204#endif
205}
206
1856835d
DB
207static int inet_listen_saddr(InetSocketAddress *saddr,
208 int port_offset,
1856835d 209 Error **errp)
d247d25f
AL
210{
211 struct addrinfo ai,*res,*e;
d247d25f
AL
212 char port[33];
213 char uaddr[INET6_ADDRSTRLEN+1];
214 char uport[33];
9cf961bb 215 int rc, port_min, port_max, p;
10a7b7e6 216 int slisten = -1;
9cf961bb
KO
217 int saved_errno = 0;
218 bool socket_created = false;
1856835d 219 Error *err = NULL;
d247d25f
AL
220
221 memset(&ai,0, sizeof(ai));
3de3d698 222 ai.ai_flags = AI_PASSIVE;
6979a813
DB
223 if (saddr->has_numeric && saddr->numeric) {
224 ai.ai_flags |= AI_NUMERICHOST | AI_NUMERICSERV;
225 }
1856835d 226 ai.ai_family = inet_ai_family_from_address(saddr, &err);
e5bc776f 227 ai.ai_socktype = SOCK_STREAM;
d247d25f 228
1856835d
DB
229 if (err) {
230 error_propagate(errp, err);
231 return -1;
232 }
233
234 if (saddr->host == NULL) {
0983f5e6 235 error_setg(errp, "host not specified");
e5bc776f 236 return -1;
d247d25f 237 }
1856835d
DB
238 if (saddr->port != NULL) {
239 pstrcpy(port, sizeof(port), saddr->port);
0983f5e6
DB
240 } else {
241 port[0] = '\0';
242 }
d247d25f
AL
243
244 /* lookup */
8bc89127
GH
245 if (port_offset) {
246 unsigned long long baseport;
0983f5e6
DB
247 if (strlen(port) == 0) {
248 error_setg(errp, "port not specified");
249 return -1;
250 }
8bc89127
GH
251 if (parse_uint_full(port, &baseport, 10) < 0) {
252 error_setg(errp, "can't convert to a number: %s", port);
253 return -1;
254 }
255 if (baseport > 65535 ||
256 baseport + port_offset > 65535) {
257 error_setg(errp, "port %s out of range", port);
258 return -1;
259 }
260 snprintf(port, sizeof(port), "%d", (int)baseport + port_offset);
261 }
1856835d 262 rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL,
0983f5e6 263 strlen(port) ? port : NULL, &ai, &res);
d247d25f 264 if (rc != 0) {
1856835d
DB
265 error_setg(errp, "address resolution failed for %s:%s: %s",
266 saddr->host, port, gai_strerror(rc));
d247d25f
AL
267 return -1;
268 }
d247d25f 269
9cf961bb 270 /* create socket + bind/listen */
d247d25f 271 for (e = res; e != NULL; e = e->ai_next) {
39b6efc8 272 getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
7d37435b
PB
273 uaddr,INET6_ADDRSTRLEN,uport,32,
274 NI_NUMERICHOST | NI_NUMERICSERV);
39f80521 275
877691f9 276 port_min = inet_getport(e);
1856835d 277 port_max = saddr->has_to ? saddr->to + port_offset : port_min;
877691f9
MA
278 for (p = port_min; p <= port_max; p++) {
279 inet_setport(e, p);
10a7b7e6
DB
280
281 slisten = create_fast_reuse_socket(e);
282 if (slisten < 0) {
283 /* First time we expect we might fail to create the socket
284 * eg if 'e' has AF_INET6 but ipv6 kmod is not loaded.
285 * Later iterations should always succeed if first iteration
286 * worked though, so treat that as fatal.
287 */
288 if (p == port_min) {
9cf961bb
KO
289 continue;
290 } else {
10a7b7e6
DB
291 error_setg_errno(errp, errno,
292 "Failed to recreate failed listening socket");
9cf961bb 293 goto listen_failed;
029409e5 294 }
d247d25f 295 }
10a7b7e6
DB
296 socket_created = true;
297
298 rc = try_bind(slisten, saddr, e);
299 if (rc < 0) {
300 if (errno != EADDRINUSE) {
301 error_setg_errno(errp, errno, "Failed to bind socket");
302 goto listen_failed;
303 }
304 } else {
305 if (!listen(slisten, 1)) {
306 goto listen_ok;
307 }
308 if (errno != EADDRINUSE) {
309 error_setg_errno(errp, errno, "Failed to listen on socket");
310 goto listen_failed;
311 }
9cf961bb
KO
312 }
313 /* Someone else managed to bind to the same port and beat us
314 * to listen on it! Socket semantics does not allow us to
315 * recover from this situation, so we need to recreate the
316 * socket to allow bind attempts for subsequent ports:
317 */
318 closesocket(slisten);
10a7b7e6 319 slisten = -1;
d247d25f 320 }
9cf961bb
KO
321 }
322 error_setg_errno(errp, errno,
323 socket_created ?
324 "Failed to find an available port" :
325 "Failed to create a socket");
326listen_failed:
327 saved_errno = errno;
328 if (slisten >= 0) {
d247d25f
AL
329 closesocket(slisten);
330 }
d247d25f 331 freeaddrinfo(res);
9cf961bb 332 errno = saved_errno;
d247d25f
AL
333 return -1;
334
9cf961bb 335listen_ok:
d247d25f
AL
336 freeaddrinfo(res);
337 return slisten;
338}
339
05bc1d8a
MT
340#ifdef _WIN32
341#define QEMU_SOCKET_RC_INPROGRESS(rc) \
342 ((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY)
343#else
344#define QEMU_SOCKET_RC_INPROGRESS(rc) \
345 ((rc) == -EINPROGRESS)
346#endif
347
b2587932 348static int inet_connect_addr(struct addrinfo *addr, Error **errp);
233aa5c2 349
b2587932 350static int inet_connect_addr(struct addrinfo *addr, Error **errp)
233aa5c2
OW
351{
352 int sock, rc;
353
05bc1d8a
MT
354 sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
355 if (sock < 0) {
235256a2 356 error_setg_errno(errp, errno, "Failed to create socket");
05bc1d8a
MT
357 return -1;
358 }
04fd1c78 359 socket_set_fast_reuse(sock);
b2587932 360
05bc1d8a
MT
361 /* connect to peer */
362 do {
363 rc = 0;
364 if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) {
b16a44e1 365 rc = -errno;
05bc1d8a
MT
366 }
367 } while (rc == -EINTR);
368
b2587932 369 if (rc < 0) {
235256a2 370 error_setg_errno(errp, errno, "Failed to connect socket");
05bc1d8a
MT
371 closesocket(sock);
372 return -1;
373 }
b2587932 374
05bc1d8a
MT
375 return sock;
376}
377
2942e420
DB
378static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr,
379 Error **errp)
05bc1d8a
MT
380{
381 struct addrinfo ai, *res;
382 int rc;
2942e420 383 Error *err = NULL;
340849a9 384 static int useV4Mapped = 1;
d247d25f 385
05bc1d8a 386 memset(&ai, 0, sizeof(ai));
233aa5c2 387
340849a9
DB
388 ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
389 if (atomic_read(&useV4Mapped)) {
390 ai.ai_flags |= AI_V4MAPPED;
391 }
2942e420 392 ai.ai_family = inet_ai_family_from_address(saddr, &err);
f4c94c7c 393 ai.ai_socktype = SOCK_STREAM;
d247d25f 394
2942e420
DB
395 if (err) {
396 error_propagate(errp, err);
05bc1d8a 397 return NULL;
d247d25f
AL
398 }
399
2942e420
DB
400 if (saddr->host == NULL || saddr->port == NULL) {
401 error_setg(errp, "host and/or port not specified");
402 return NULL;
05bc1d8a 403 }
d247d25f
AL
404
405 /* lookup */
2942e420 406 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
340849a9
DB
407
408 /* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but
409 * then don't implement it in their getaddrinfo(). Detect
410 * this and retry without the flag since that's preferrable
411 * to a fatal error
412 */
413 if (rc == EAI_BADFLAGS &&
414 (ai.ai_flags & AI_V4MAPPED)) {
415 atomic_set(&useV4Mapped, 0);
416 ai.ai_flags &= ~AI_V4MAPPED;
417 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
418 }
05bc1d8a 419 if (rc != 0) {
2942e420
DB
420 error_setg(errp, "address resolution failed for %s:%s: %s",
421 saddr->host, saddr->port, gai_strerror(rc));
05bc1d8a
MT
422 return NULL;
423 }
424 return res;
425}
426
5db5f44c
OW
427/**
428 * Create a socket and connect it to an address.
429 *
2942e420 430 * @saddr: Inet socket address specification
5db5f44c
OW
431 * @errp: set on error
432 *
433 * Returns: -1 on error, file descriptor on success.
434 */
b2587932 435int inet_connect_saddr(InetSocketAddress *saddr, Error **errp)
05bc1d8a 436{
3f9286b7 437 Error *local_err = NULL;
05bc1d8a
MT
438 struct addrinfo *res, *e;
439 int sock = -1;
05bc1d8a 440
2942e420 441 res = inet_parse_connect_saddr(saddr, errp);
05bc1d8a
MT
442 if (!res) {
443 return -1;
444 }
445
d247d25f 446 for (e = res; e != NULL; e = e->ai_next) {
3f9286b7
MA
447 error_free(local_err);
448 local_err = NULL;
b2587932 449 sock = inet_connect_addr(e, &local_err);
3f9286b7 450 if (sock >= 0) {
05bc1d8a 451 break;
a6ba35b3 452 }
d247d25f 453 }
3f9286b7
MA
454
455 if (sock < 0) {
456 error_propagate(errp, local_err);
3f9286b7 457 }
b2587932 458
d247d25f 459 freeaddrinfo(res);
05bc1d8a 460 return sock;
d247d25f
AL
461}
462
8b39910e
DB
463static int inet_dgram_saddr(InetSocketAddress *sraddr,
464 InetSocketAddress *sladdr,
465 Error **errp)
7e1b35b4
GH
466{
467 struct addrinfo ai, *peer = NULL, *local = NULL;
468 const char *addr;
469 const char *port;
7e1b35b4 470 int sock = -1, rc;
8b39910e 471 Error *err = NULL;
7e1b35b4
GH
472
473 /* lookup peer addr */
474 memset(&ai,0, sizeof(ai));
3de3d698 475 ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG;
8b39910e 476 ai.ai_family = inet_ai_family_from_address(sraddr, &err);
7e1b35b4
GH
477 ai.ai_socktype = SOCK_DGRAM;
478
8b39910e
DB
479 if (err) {
480 error_propagate(errp, err);
58c652c0 481 goto err;
8b39910e
DB
482 }
483
484 addr = sraddr->host;
485 port = sraddr->port;
7e1b35b4
GH
486 if (addr == NULL || strlen(addr) == 0) {
487 addr = "localhost";
488 }
489 if (port == NULL || strlen(port) == 0) {
4f085c82 490 error_setg(errp, "remote port not specified");
58c652c0 491 goto err;
7e1b35b4
GH
492 }
493
9cd1883c 494 if ((rc = getaddrinfo(addr, port, &ai, &peer)) != 0) {
4f085c82
PB
495 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
496 gai_strerror(rc));
26015051 497 goto err;
7e1b35b4 498 }
7e1b35b4
GH
499
500 /* lookup local addr */
501 memset(&ai,0, sizeof(ai));
502 ai.ai_flags = AI_PASSIVE;
503 ai.ai_family = peer->ai_family;
504 ai.ai_socktype = SOCK_DGRAM;
505
8b39910e
DB
506 if (sladdr) {
507 addr = sladdr->host;
508 port = sladdr->port;
509 if (addr == NULL || strlen(addr) == 0) {
510 addr = NULL;
511 }
512 if (!port || strlen(port) == 0) {
513 port = "0";
514 }
515 } else {
7e1b35b4 516 addr = NULL;
7e1b35b4 517 port = "0";
8b39910e 518 }
7e1b35b4 519
9cd1883c 520 if ((rc = getaddrinfo(addr, port, &ai, &local)) != 0) {
4f085c82
PB
521 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
522 gai_strerror(rc));
39b38459 523 goto err;
7e1b35b4 524 }
7e1b35b4
GH
525
526 /* create socket */
40ff6d7e 527 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol);
7e1b35b4 528 if (sock < 0) {
235256a2 529 error_setg_errno(errp, errno, "Failed to create socket");
7e1b35b4
GH
530 goto err;
531 }
04fd1c78 532 socket_set_fast_reuse(sock);
7e1b35b4
GH
533
534 /* bind socket */
7e1b35b4 535 if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) {
235256a2 536 error_setg_errno(errp, errno, "Failed to bind socket");
7e1b35b4
GH
537 goto err;
538 }
539
540 /* connect to peer */
7e1b35b4 541 if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) {
235256a2 542 error_setg_errno(errp, errno, "Failed to connect socket");
7e1b35b4
GH
543 goto err;
544 }
545
546 freeaddrinfo(local);
547 freeaddrinfo(peer);
548 return sock;
549
550err:
26015051 551 if (sock != -1) {
7e1b35b4 552 closesocket(sock);
26015051
C
553 }
554 if (local) {
7e1b35b4 555 freeaddrinfo(local);
26015051
C
556 }
557 if (peer) {
7e1b35b4 558 freeaddrinfo(peer);
26015051
C
559 }
560
7e1b35b4
GH
561 return -1;
562}
563
f4c94c7c 564/* compatibility wrapper */
3e32370a
DB
565static int inet_parse_flag(const char *flagname, const char *optstr, bool *val,
566 Error **errp)
567{
568 char *end;
569 size_t len;
570
571 end = strstr(optstr, ",");
572 if (end) {
573 if (end[1] == ',') { /* Reject 'ipv6=on,,foo' */
574 error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
575 return -1;
576 }
577 len = end - optstr;
578 } else {
579 len = strlen(optstr);
580 }
581 if (len == 0 || (len == 3 && strncmp(optstr, "=on", len) == 0)) {
582 *val = true;
583 } else if (len == 4 && strncmp(optstr, "=off", len) == 0) {
584 *val = false;
585 } else {
586 error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
587 return -1;
588 }
589 return 0;
590}
591
0785bd7a 592int inet_parse(InetSocketAddress *addr, const char *str, Error **errp)
f4c94c7c
GH
593{
594 const char *optstr, *h;
55a10996 595 char host[65];
f4c94c7c 596 char port[33];
879e45c7 597 int to;
f4c94c7c 598 int pos;
3e32370a 599 char *begin;
f4c94c7c 600
0785bd7a 601 memset(addr, 0, sizeof(*addr));
879e45c7 602
f4c94c7c
GH
603 /* parse address */
604 if (str[0] == ':') {
605 /* no host given */
879e45c7 606 host[0] = '\0';
9cd1883c 607 if (sscanf(str, ":%32[^,]%n", port, &pos) != 1) {
2f002c43 608 error_setg(errp, "error parsing port in address '%s'", str);
0785bd7a 609 return -1;
f4c94c7c
GH
610 }
611 } else if (str[0] == '[') {
612 /* IPv6 addr */
9cd1883c 613 if (sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 614 error_setg(errp, "error parsing IPv6 address '%s'", str);
0785bd7a 615 return -1;
f4c94c7c 616 }
f4c94c7c 617 } else {
391b7b97 618 /* hostname or IPv4 addr */
9cd1883c 619 if (sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 620 error_setg(errp, "error parsing address '%s'", str);
0785bd7a 621 return -1;
f4c94c7c
GH
622 }
623 }
879e45c7
PB
624
625 addr->host = g_strdup(host);
626 addr->port = g_strdup(port);
f4c94c7c
GH
627
628 /* parse options */
629 optstr = str + pos;
630 h = strstr(optstr, ",to=");
879e45c7 631 if (h) {
1ccbc285
AP
632 h += 4;
633 if (sscanf(h, "%d%n", &to, &pos) != 1 ||
634 (h[pos] != '\0' && h[pos] != ',')) {
879e45c7 635 error_setg(errp, "error parsing to= argument");
0785bd7a 636 return -1;
879e45c7
PB
637 }
638 addr->has_to = true;
639 addr->to = to;
640 }
3e32370a
DB
641 begin = strstr(optstr, ",ipv4");
642 if (begin) {
643 if (inet_parse_flag("ipv4", begin + 5, &addr->ipv4, errp) < 0) {
644 return -1;
645 }
646 addr->has_ipv4 = true;
879e45c7 647 }
3e32370a
DB
648 begin = strstr(optstr, ",ipv6");
649 if (begin) {
650 if (inet_parse_flag("ipv6", begin + 5, &addr->ipv6, errp) < 0) {
651 return -1;
652 }
653 addr->has_ipv6 = true;
879e45c7 654 }
0785bd7a 655 return 0;
879e45c7
PB
656}
657
e5bc776f 658
5db5f44c
OW
659/**
660 * Create a blocking socket and connect it to an address.
661 *
662 * @str: address string
663 * @errp: set in case of an error
664 *
665 * Returns -1 in case of error, file descriptor on success
666 **/
667int inet_connect(const char *str, Error **errp)
f4c94c7c 668{
f4c94c7c 669 int sock = -1;
0785bd7a 670 InetSocketAddress *addr = g_new(InetSocketAddress, 1);
f4c94c7c 671
0785bd7a 672 if (!inet_parse(addr, str, errp)) {
b2587932 673 sock = inet_connect_saddr(addr, errp);
5db5f44c 674 }
0785bd7a 675 qapi_free_InetSocketAddress(addr);
5db5f44c
OW
676 return sock;
677}
678
6a02c806
SH
679#ifdef CONFIG_AF_VSOCK
680static bool vsock_parse_vaddr_to_sockaddr(const VsockSocketAddress *vaddr,
681 struct sockaddr_vm *svm,
682 Error **errp)
683{
684 unsigned long long val;
685
686 memset(svm, 0, sizeof(*svm));
687 svm->svm_family = AF_VSOCK;
688
689 if (parse_uint_full(vaddr->cid, &val, 10) < 0 ||
690 val > UINT32_MAX) {
691 error_setg(errp, "Failed to parse cid '%s'", vaddr->cid);
692 return false;
693 }
694 svm->svm_cid = val;
695
696 if (parse_uint_full(vaddr->port, &val, 10) < 0 ||
697 val > UINT32_MAX) {
698 error_setg(errp, "Failed to parse port '%s'", vaddr->port);
699 return false;
700 }
701 svm->svm_port = val;
702
703 return true;
704}
705
b2587932 706static int vsock_connect_addr(const struct sockaddr_vm *svm, Error **errp)
6a02c806
SH
707{
708 int sock, rc;
709
6a02c806
SH
710 sock = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
711 if (sock < 0) {
712 error_setg_errno(errp, errno, "Failed to create socket");
713 return -1;
714 }
b2587932 715
6a02c806
SH
716 /* connect to peer */
717 do {
718 rc = 0;
719 if (connect(sock, (const struct sockaddr *)svm, sizeof(*svm)) < 0) {
720 rc = -errno;
721 }
722 } while (rc == -EINTR);
723
b2587932 724 if (rc < 0) {
6a02c806
SH
725 error_setg_errno(errp, errno, "Failed to connect socket");
726 closesocket(sock);
727 return -1;
728 }
b2587932 729
6a02c806
SH
730 return sock;
731}
732
b2587932 733static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
6a02c806
SH
734{
735 struct sockaddr_vm svm;
736 int sock = -1;
6a02c806
SH
737
738 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
739 return -1;
740 }
741
b2587932 742 sock = vsock_connect_addr(&svm, errp);
6a02c806 743
6a02c806
SH
744 return sock;
745}
746
747static int vsock_listen_saddr(VsockSocketAddress *vaddr,
748 Error **errp)
749{
750 struct sockaddr_vm svm;
751 int slisten;
752
753 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
754 return -1;
755 }
756
757 slisten = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
758 if (slisten < 0) {
759 error_setg_errno(errp, errno, "Failed to create socket");
760 return -1;
761 }
762
763 if (bind(slisten, (const struct sockaddr *)&svm, sizeof(svm)) != 0) {
764 error_setg_errno(errp, errno, "Failed to bind socket");
765 closesocket(slisten);
766 return -1;
767 }
768
769 if (listen(slisten, 1) != 0) {
770 error_setg_errno(errp, errno, "Failed to listen on socket");
771 closesocket(slisten);
772 return -1;
773 }
774 return slisten;
775}
776
4db5c619
MA
777static int vsock_parse(VsockSocketAddress *addr, const char *str,
778 Error **errp)
6a02c806 779{
6a02c806
SH
780 char cid[33];
781 char port[33];
782 int n;
783
784 if (sscanf(str, "%32[^:]:%32[^,]%n", cid, port, &n) != 2) {
785 error_setg(errp, "error parsing address '%s'", str);
4db5c619 786 return -1;
6a02c806
SH
787 }
788 if (str[n] != '\0') {
789 error_setg(errp, "trailing characters in address '%s'", str);
4db5c619 790 return -1;
6a02c806
SH
791 }
792
6a02c806
SH
793 addr->cid = g_strdup(cid);
794 addr->port = g_strdup(port);
4db5c619 795 return 0;
6a02c806
SH
796}
797#else
798static void vsock_unsupported(Error **errp)
799{
800 error_setg(errp, "socket family AF_VSOCK unsupported");
801}
802
b2587932 803static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
6a02c806
SH
804{
805 vsock_unsupported(errp);
806 return -1;
807}
808
809static int vsock_listen_saddr(VsockSocketAddress *vaddr,
810 Error **errp)
811{
812 vsock_unsupported(errp);
813 return -1;
814}
815
4db5c619
MA
816static int vsock_parse(VsockSocketAddress *addr, const char *str,
817 Error **errp)
6a02c806
SH
818{
819 vsock_unsupported(errp);
4db5c619 820 return -1;
6a02c806
SH
821}
822#endif /* CONFIG_AF_VSOCK */
823
d247d25f
AL
824#ifndef _WIN32
825
1856835d 826static int unix_listen_saddr(UnixSocketAddress *saddr,
1856835d 827 Error **errp)
d247d25f
AL
828{
829 struct sockaddr_un un;
62b6adfb 830 int sock, fd;
ad9579aa
DB
831 char *pathbuf = NULL;
832 const char *path;
d247d25f 833
40ff6d7e 834 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 835 if (sock < 0) {
b658c53d 836 error_setg_errno(errp, errno, "Failed to create Unix socket");
39b6efc8 837 return -1;
d247d25f
AL
838 }
839
ad9579aa
DB
840 if (saddr->path && saddr->path[0]) {
841 path = saddr->path;
d247d25f 842 } else {
b658c53d
PB
843 const char *tmpdir = getenv("TMPDIR");
844 tmpdir = tmpdir ? tmpdir : "/tmp";
ad9579aa
DB
845 path = pathbuf = g_strdup_printf("%s/qemu-socket-XXXXXX", tmpdir);
846 }
b658c53d 847
ad9579aa
DB
848 if (strlen(path) > sizeof(un.sun_path)) {
849 error_setg(errp, "UNIX socket path '%s' is too long", path);
850 error_append_hint(errp, "Path must be less than %zu bytes\n",
851 sizeof(un.sun_path));
852 goto err;
853 }
854
855 if (pathbuf != NULL) {
d247d25f
AL
856 /*
857 * This dummy fd usage silences the mktemp() unsecure warning.
858 * Using mkstemp() doesn't make things more secure here
859 * though. bind() complains about existing files, so we have
860 * to unlink first and thus re-open the race window. The
861 * worst case possible is bind() failing, i.e. a DoS attack.
862 */
ad9579aa 863 fd = mkstemp(pathbuf);
b658c53d
PB
864 if (fd < 0) {
865 error_setg_errno(errp, errno,
ad9579aa 866 "Failed to make a temporary socket %s", pathbuf);
b658c53d
PB
867 goto err;
868 }
869 close(fd);
d247d25f 870 }
d247d25f 871
ad9579aa 872 if (unlink(path) < 0 && errno != ENOENT) {
0ef705a2 873 error_setg_errno(errp, errno,
ad9579aa 874 "Failed to unlink socket %s", path);
0ef705a2
CR
875 goto err;
876 }
ad9579aa
DB
877
878 memset(&un, 0, sizeof(un));
879 un.sun_family = AF_UNIX;
880 strncpy(un.sun_path, path, sizeof(un.sun_path));
881
d247d25f 882 if (bind(sock, (struct sockaddr*) &un, sizeof(un)) < 0) {
56382bd5 883 error_setg_errno(errp, errno, "Failed to bind socket to %s", path);
d247d25f
AL
884 goto err;
885 }
886 if (listen(sock, 1) < 0) {
235256a2 887 error_setg_errno(errp, errno, "Failed to listen on socket");
d247d25f
AL
888 goto err;
889 }
890
62473511 891 g_free(pathbuf);
d247d25f
AL
892 return sock;
893
894err:
ad9579aa 895 g_free(pathbuf);
d247d25f
AL
896 closesocket(sock);
897 return -1;
898}
899
b2587932 900static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
d247d25f
AL
901{
902 struct sockaddr_un un;
1fc05adf 903 int sock, rc;
d247d25f 904
2942e420 905 if (saddr->path == NULL) {
312fd5f2 906 error_setg(errp, "unix connect: no path specified");
2af2bf67
GH
907 return -1;
908 }
909
40ff6d7e 910 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 911 if (sock < 0) {
235256a2 912 error_setg_errno(errp, errno, "Failed to create socket");
39b6efc8 913 return -1;
d247d25f
AL
914 }
915
ad9579aa
DB
916 if (strlen(saddr->path) > sizeof(un.sun_path)) {
917 error_setg(errp, "UNIX socket path '%s' is too long", saddr->path);
918 error_append_hint(errp, "Path must be less than %zu bytes\n",
919 sizeof(un.sun_path));
920 goto err;
921 }
922
d247d25f
AL
923 memset(&un, 0, sizeof(un));
924 un.sun_family = AF_UNIX;
ad9579aa 925 strncpy(un.sun_path, saddr->path, sizeof(un.sun_path));
1fc05adf
PB
926
927 /* connect to peer */
928 do {
929 rc = 0;
930 if (connect(sock, (struct sockaddr *) &un, sizeof(un)) < 0) {
b16a44e1 931 rc = -errno;
1fc05adf
PB
932 }
933 } while (rc == -EINTR);
934
1fc05adf 935 if (rc < 0) {
ad9579aa
DB
936 error_setg_errno(errp, -rc, "Failed to connect socket %s",
937 saddr->path);
938 goto err;
d247d25f
AL
939 }
940
d247d25f 941 return sock;
ad9579aa
DB
942
943 err:
944 close(sock);
ad9579aa 945 return -1;
d247d25f
AL
946}
947
0c814709
PB
948#else
949
1856835d 950static int unix_listen_saddr(UnixSocketAddress *saddr,
1856835d 951 Error **errp)
0c814709 952{
58899664 953 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
954 errno = ENOTSUP;
955 return -1;
956}
957
b2587932 958static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
0c814709 959{
58899664 960 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
961 errno = ENOTSUP;
962 return -1;
963}
964#endif
965
2af2bf67 966/* compatibility wrapper */
62473511 967int unix_listen(const char *str, Error **errp)
62b6adfb 968{
62b6adfb
GH
969 char *path, *optstr;
970 int sock, len;
1856835d 971 UnixSocketAddress *saddr;
62b6adfb 972
1856835d 973 saddr = g_new0(UnixSocketAddress, 1);
62b6adfb
GH
974
975 optstr = strchr(str, ',');
976 if (optstr) {
977 len = optstr - str;
978 if (len) {
7267c094 979 path = g_malloc(len+1);
62b6adfb 980 snprintf(path, len+1, "%.*s", len, str);
1856835d 981 saddr->path = path;
62b6adfb
GH
982 }
983 } else {
1856835d 984 saddr->path = g_strdup(str);
62b6adfb
GH
985 }
986
62473511 987 sock = unix_listen_saddr(saddr, errp);
26015051 988
1856835d 989 qapi_free_UnixSocketAddress(saddr);
62b6adfb
GH
990 return sock;
991}
992
7fc4e63e 993int unix_connect(const char *path, Error **errp)
2af2bf67 994{
2942e420 995 UnixSocketAddress *saddr;
2af2bf67
GH
996 int sock;
997
2942e420
DB
998 saddr = g_new0(UnixSocketAddress, 1);
999 saddr->path = g_strdup(path);
b2587932 1000 sock = unix_connect_saddr(saddr, errp);
2942e420 1001 qapi_free_UnixSocketAddress(saddr);
1fc05adf
PB
1002 return sock;
1003}
1004
1005
bd269ebc 1006SocketAddress *socket_parse(const char *str, Error **errp)
101f9cbc 1007{
bd269ebc 1008 SocketAddress *addr;
101f9cbc 1009
bd269ebc 1010 addr = g_new0(SocketAddress, 1);
101f9cbc
PB
1011 if (strstart(str, "unix:", NULL)) {
1012 if (str[5] == '\0') {
312fd5f2 1013 error_setg(errp, "invalid Unix socket address");
101f9cbc
PB
1014 goto fail;
1015 } else {
bd269ebc
MA
1016 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1017 addr->u.q_unix.path = g_strdup(str + 5);
101f9cbc
PB
1018 }
1019 } else if (strstart(str, "fd:", NULL)) {
1020 if (str[3] == '\0') {
312fd5f2 1021 error_setg(errp, "invalid file descriptor address");
101f9cbc
PB
1022 goto fail;
1023 } else {
bd269ebc
MA
1024 addr->type = SOCKET_ADDRESS_TYPE_FD;
1025 addr->u.fd.str = g_strdup(str + 3);
101f9cbc 1026 }
6a02c806 1027 } else if (strstart(str, "vsock:", NULL)) {
bd269ebc
MA
1028 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1029 if (vsock_parse(&addr->u.vsock, str + strlen("vsock:"), errp)) {
6a02c806
SH
1030 goto fail;
1031 }
101f9cbc 1032 } else {
bd269ebc
MA
1033 addr->type = SOCKET_ADDRESS_TYPE_INET;
1034 if (inet_parse(&addr->u.inet, str, errp)) {
101f9cbc
PB
1035 goto fail;
1036 }
1037 }
1038 return addr;
1039
1040fail:
bd269ebc 1041 qapi_free_SocketAddress(addr);
101f9cbc
PB
1042 return NULL;
1043}
1044
30bdb3c5
DB
1045static int socket_get_fd(const char *fdstr, Error **errp)
1046{
1723d6b1
DB
1047 int fd;
1048 if (cur_mon) {
1049 fd = monitor_get_fd(cur_mon, fdstr, errp);
1050 if (fd < 0) {
1051 return -1;
1052 }
1053 } else {
1054 if (qemu_strtoi(fdstr, NULL, 10, &fd) < 0) {
1055 error_setg_errno(errp, errno,
1056 "Unable to parse FD number %s",
1057 fdstr);
1058 return -1;
1059 }
30bdb3c5
DB
1060 }
1061 if (!fd_is_socket(fd)) {
1062 error_setg(errp, "File descriptor '%s' is not a socket", fdstr);
1063 close(fd);
1064 return -1;
1065 }
1066 return fd;
1067}
1068
b2587932 1069int socket_connect(SocketAddress *addr, Error **errp)
101f9cbc 1070{
101f9cbc
PB
1071 int fd;
1072
2d32adda 1073 switch (addr->type) {
bd269ebc 1074 case SOCKET_ADDRESS_TYPE_INET:
b2587932 1075 fd = inet_connect_saddr(&addr->u.inet, errp);
101f9cbc
PB
1076 break;
1077
bd269ebc 1078 case SOCKET_ADDRESS_TYPE_UNIX:
b2587932 1079 fd = unix_connect_saddr(&addr->u.q_unix, errp);
101f9cbc
PB
1080 break;
1081
bd269ebc 1082 case SOCKET_ADDRESS_TYPE_FD:
30bdb3c5 1083 fd = socket_get_fd(addr->u.fd.str, errp);
101f9cbc
PB
1084 break;
1085
bd269ebc 1086 case SOCKET_ADDRESS_TYPE_VSOCK:
b2587932 1087 fd = vsock_connect_saddr(&addr->u.vsock, errp);
6a02c806
SH
1088 break;
1089
101f9cbc
PB
1090 default:
1091 abort();
1092 }
101f9cbc
PB
1093 return fd;
1094}
1095
bd269ebc 1096int socket_listen(SocketAddress *addr, Error **errp)
101f9cbc 1097{
101f9cbc
PB
1098 int fd;
1099
2d32adda 1100 switch (addr->type) {
bd269ebc 1101 case SOCKET_ADDRESS_TYPE_INET:
62473511 1102 fd = inet_listen_saddr(&addr->u.inet, 0, errp);
101f9cbc
PB
1103 break;
1104
bd269ebc 1105 case SOCKET_ADDRESS_TYPE_UNIX:
62473511 1106 fd = unix_listen_saddr(&addr->u.q_unix, errp);
101f9cbc
PB
1107 break;
1108
bd269ebc 1109 case SOCKET_ADDRESS_TYPE_FD:
30bdb3c5 1110 fd = socket_get_fd(addr->u.fd.str, errp);
101f9cbc
PB
1111 break;
1112
bd269ebc
MA
1113 case SOCKET_ADDRESS_TYPE_VSOCK:
1114 fd = vsock_listen_saddr(&addr->u.vsock, errp);
6a02c806
SH
1115 break;
1116
101f9cbc
PB
1117 default:
1118 abort();
1119 }
101f9cbc
PB
1120 return fd;
1121}
1122
74b6ce43
MAL
1123void socket_listen_cleanup(int fd, Error **errp)
1124{
bd269ebc 1125 SocketAddress *addr;
74b6ce43
MAL
1126
1127 addr = socket_local_address(fd, errp);
2d7ad7c0
DB
1128 if (!addr) {
1129 return;
1130 }
74b6ce43 1131
bd269ebc
MA
1132 if (addr->type == SOCKET_ADDRESS_TYPE_UNIX
1133 && addr->u.q_unix.path) {
1134 if (unlink(addr->u.q_unix.path) < 0 && errno != ENOENT) {
74b6ce43
MAL
1135 error_setg_errno(errp, errno,
1136 "Failed to unlink socket %s",
bd269ebc 1137 addr->u.q_unix.path);
74b6ce43
MAL
1138 }
1139 }
1140
bd269ebc 1141 qapi_free_SocketAddress(addr);
74b6ce43
MAL
1142}
1143
bd269ebc 1144int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp)
3ecc059d 1145{
3ecc059d
GH
1146 int fd;
1147
ca0b64e5 1148 /*
bd269ebc 1149 * TODO SOCKET_ADDRESS_TYPE_FD when fd is AF_INET or AF_INET6
ca0b64e5
MA
1150 * (although other address families can do SOCK_DGRAM, too)
1151 */
2d32adda 1152 switch (remote->type) {
bd269ebc
MA
1153 case SOCKET_ADDRESS_TYPE_INET:
1154 fd = inet_dgram_saddr(&remote->u.inet,
1155 local ? &local->u.inet : NULL, errp);
3ecc059d
GH
1156 break;
1157
1158 default:
1159 error_setg(errp, "socket type unsupported for datagram");
7a5b6af1 1160 fd = -1;
3ecc059d 1161 }
3ecc059d
GH
1162 return fd;
1163}
17c55dec
DB
1164
1165
bd269ebc 1166static SocketAddress *
17c55dec
DB
1167socket_sockaddr_to_address_inet(struct sockaddr_storage *sa,
1168 socklen_t salen,
1169 Error **errp)
1170{
1171 char host[NI_MAXHOST];
1172 char serv[NI_MAXSERV];
bd269ebc 1173 SocketAddress *addr;
0399293e 1174 InetSocketAddress *inet;
17c55dec
DB
1175 int ret;
1176
1177 ret = getnameinfo((struct sockaddr *)sa, salen,
1178 host, sizeof(host),
1179 serv, sizeof(serv),
1180 NI_NUMERICHOST | NI_NUMERICSERV);
1181 if (ret != 0) {
1182 error_setg(errp, "Cannot format numeric socket address: %s",
1183 gai_strerror(ret));
1184 return NULL;
1185 }
1186
bd269ebc
MA
1187 addr = g_new0(SocketAddress, 1);
1188 addr->type = SOCKET_ADDRESS_TYPE_INET;
1189 inet = &addr->u.inet;
0399293e
EB
1190 inet->host = g_strdup(host);
1191 inet->port = g_strdup(serv);
17c55dec 1192 if (sa->ss_family == AF_INET) {
0399293e 1193 inet->has_ipv4 = inet->ipv4 = true;
17c55dec 1194 } else {
0399293e 1195 inet->has_ipv6 = inet->ipv6 = true;
17c55dec
DB
1196 }
1197
1198 return addr;
1199}
1200
1201
1202#ifndef WIN32
bd269ebc 1203static SocketAddress *
17c55dec
DB
1204socket_sockaddr_to_address_unix(struct sockaddr_storage *sa,
1205 socklen_t salen,
1206 Error **errp)
1207{
bd269ebc 1208 SocketAddress *addr;
17c55dec
DB
1209 struct sockaddr_un *su = (struct sockaddr_un *)sa;
1210
bd269ebc
MA
1211 addr = g_new0(SocketAddress, 1);
1212 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
17c55dec 1213 if (su->sun_path[0]) {
bd269ebc 1214 addr->u.q_unix.path = g_strndup(su->sun_path, sizeof(su->sun_path));
17c55dec
DB
1215 }
1216
1217 return addr;
1218}
1219#endif /* WIN32 */
1220
6a02c806 1221#ifdef CONFIG_AF_VSOCK
bd269ebc 1222static SocketAddress *
6a02c806
SH
1223socket_sockaddr_to_address_vsock(struct sockaddr_storage *sa,
1224 socklen_t salen,
1225 Error **errp)
1226{
bd269ebc 1227 SocketAddress *addr;
6a02c806
SH
1228 VsockSocketAddress *vaddr;
1229 struct sockaddr_vm *svm = (struct sockaddr_vm *)sa;
1230
bd269ebc
MA
1231 addr = g_new0(SocketAddress, 1);
1232 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1233 vaddr = &addr->u.vsock;
6a02c806
SH
1234 vaddr->cid = g_strdup_printf("%u", svm->svm_cid);
1235 vaddr->port = g_strdup_printf("%u", svm->svm_port);
1236
1237 return addr;
1238}
1239#endif /* CONFIG_AF_VSOCK */
1240
bd269ebc 1241SocketAddress *
17c55dec
DB
1242socket_sockaddr_to_address(struct sockaddr_storage *sa,
1243 socklen_t salen,
1244 Error **errp)
1245{
1246 switch (sa->ss_family) {
1247 case AF_INET:
1248 case AF_INET6:
1249 return socket_sockaddr_to_address_inet(sa, salen, errp);
1250
1251#ifndef WIN32
1252 case AF_UNIX:
1253 return socket_sockaddr_to_address_unix(sa, salen, errp);
1254#endif /* WIN32 */
1255
6a02c806
SH
1256#ifdef CONFIG_AF_VSOCK
1257 case AF_VSOCK:
1258 return socket_sockaddr_to_address_vsock(sa, salen, errp);
1259#endif
1260
17c55dec
DB
1261 default:
1262 error_setg(errp, "socket family %d unsupported",
1263 sa->ss_family);
1264 return NULL;
1265 }
1266 return 0;
1267}
1268
1269
bd269ebc 1270SocketAddress *socket_local_address(int fd, Error **errp)
17c55dec
DB
1271{
1272 struct sockaddr_storage ss;
1273 socklen_t sslen = sizeof(ss);
1274
1275 if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1276 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1277 "Unable to query local socket address");
1278 return NULL;
1279 }
1280
1281 return socket_sockaddr_to_address(&ss, sslen, errp);
1282}
1283
1284
bd269ebc 1285SocketAddress *socket_remote_address(int fd, Error **errp)
17c55dec
DB
1286{
1287 struct sockaddr_storage ss;
1288 socklen_t sslen = sizeof(ss);
1289
1290 if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1291 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1292 "Unable to query remote socket address");
1293 return NULL;
1294 }
1295
1296 return socket_sockaddr_to_address(&ss, sslen, errp);
1297}
2a8e21c7 1298
216411b8 1299
bd269ebc
MA
1300SocketAddress *socket_address_flatten(SocketAddressLegacy *addr_legacy)
1301{
fc0f0059 1302 SocketAddress *addr;
bd269ebc
MA
1303
1304 if (!addr_legacy) {
1305 return NULL;
1306 }
1307
fc0f0059
MA
1308 addr = g_new(SocketAddress, 1);
1309
bd269ebc
MA
1310 switch (addr_legacy->type) {
1311 case SOCKET_ADDRESS_LEGACY_KIND_INET:
1312 addr->type = SOCKET_ADDRESS_TYPE_INET;
1313 QAPI_CLONE_MEMBERS(InetSocketAddress, &addr->u.inet,
1314 addr_legacy->u.inet.data);
1315 break;
1316 case SOCKET_ADDRESS_LEGACY_KIND_UNIX:
1317 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1318 QAPI_CLONE_MEMBERS(UnixSocketAddress, &addr->u.q_unix,
1319 addr_legacy->u.q_unix.data);
1320 break;
1321 case SOCKET_ADDRESS_LEGACY_KIND_VSOCK:
1322 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1323 QAPI_CLONE_MEMBERS(VsockSocketAddress, &addr->u.vsock,
1324 addr_legacy->u.vsock.data);
1325 break;
1326 case SOCKET_ADDRESS_LEGACY_KIND_FD:
1327 addr->type = SOCKET_ADDRESS_TYPE_FD;
1328 QAPI_CLONE_MEMBERS(String, &addr->u.fd, addr_legacy->u.fd.data);
1329 break;
1330 default:
1331 abort();
1332 }
1333
1334 return addr;
1335}