]> git.proxmox.com Git - mirror_qemu.git/blame - util/qemu-sockets.c
qemu-sockets: move and rename SocketAddress_to_str()
[mirror_qemu.git] / util / qemu-sockets.c
CommitLineData
305b0eb2
AL
1/*
2 * inet and unix socket functions for qemu
3 *
4 * (c) 2008 Gerd Hoffmann <kraxel@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 of the License.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
e6d91ab6
PB
14 *
15 * Contributions after 2012-01-13 are licensed under the terms of the
16 * GNU GPL, version 2 or (at your option) any later version.
305b0eb2 17 */
aafd7584 18#include "qemu/osdep.h"
d247d25f 19
6a02c806
SH
20#ifdef CONFIG_AF_VSOCK
21#include <linux/vm_sockets.h>
22#endif /* CONFIG_AF_VSOCK */
23
83c9089e 24#include "monitor/monitor.h"
bd269ebc 25#include "qapi/clone-visitor.h"
da34e65c 26#include "qapi/error.h"
9af23989 27#include "qapi/qapi-visit-sockets.h"
1de7afc9 28#include "qemu/sockets.h"
1de7afc9 29#include "qemu/main-loop.h"
b3db211f
DB
30#include "qapi/qobject-input-visitor.h"
31#include "qapi/qobject-output-visitor.h"
f348b6d1 32#include "qemu/cutils.h"
e5b6353c 33#include "trace.h"
d247d25f
AL
34
35#ifndef AI_ADDRCONFIG
36# define AI_ADDRCONFIG 0
37#endif
340849a9 38
3de3d698
WB
39#ifndef AI_V4MAPPED
40# define AI_V4MAPPED 0
41#endif
d247d25f 42
6979a813
DB
43#ifndef AI_NUMERICSERV
44# define AI_NUMERICSERV 0
45#endif
46
2af2bf67 47
d247d25f
AL
48static int inet_getport(struct addrinfo *e)
49{
50 struct sockaddr_in *i4;
51 struct sockaddr_in6 *i6;
52
53 switch (e->ai_family) {
54 case PF_INET6:
55 i6 = (void*)e->ai_addr;
56 return ntohs(i6->sin6_port);
57 case PF_INET:
58 i4 = (void*)e->ai_addr;
59 return ntohs(i4->sin_port);
60 default:
61 return 0;
62 }
63}
64
65static void inet_setport(struct addrinfo *e, int port)
66{
67 struct sockaddr_in *i4;
68 struct sockaddr_in6 *i6;
69
70 switch (e->ai_family) {
71 case PF_INET6:
72 i6 = (void*)e->ai_addr;
73 i6->sin6_port = htons(port);
74 break;
75 case PF_INET:
76 i4 = (void*)e->ai_addr;
77 i4->sin_port = htons(port);
78 break;
79 }
80}
81
a589569f
WX
82NetworkAddressFamily inet_netfamily(int family)
83{
84 switch (family) {
85 case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6;
86 case PF_INET: return NETWORK_ADDRESS_FAMILY_IPV4;
87 case PF_UNIX: return NETWORK_ADDRESS_FAMILY_UNIX;
6a02c806
SH
88#ifdef CONFIG_AF_VSOCK
89 case PF_VSOCK: return NETWORK_ADDRESS_FAMILY_VSOCK;
90#endif /* CONFIG_AF_VSOCK */
a589569f
WX
91 }
92 return NETWORK_ADDRESS_FAMILY_UNKNOWN;
93}
94
58dc31f1
DB
95bool fd_is_socket(int fd)
96{
97 int optval;
98 socklen_t optlen = sizeof(optval);
e7b79428 99 return !getsockopt(fd, SOL_SOCKET, SO_TYPE, &optval, &optlen);
58dc31f1
DB
100}
101
102
1856835d
DB
103/*
104 * Matrix we're trying to apply
105 *
106 * ipv4 ipv6 family
107 * - - PF_UNSPEC
108 * - f PF_INET
109 * - t PF_INET6
110 * f - PF_INET6
111 * f f <error>
112 * f t PF_INET6
113 * t - PF_INET
114 * t f PF_INET
94bc0d19 115 * t t PF_INET6/PF_UNSPEC
1856835d 116 *
d43eda3d 117 * NB, this matrix is only about getting the necessary results
1856835d
DB
118 * from getaddrinfo(). Some of the cases require further work
119 * after reading results from getaddrinfo in order to fully
94bc0d19
DB
120 * apply the logic the end user wants.
121 *
122 * In the first and last cases, we must set IPV6_V6ONLY=0
123 * when binding, to allow a single listener to potentially
124 * accept both IPv4+6 addresses.
1856835d 125 */
c1b412f1
DB
126int inet_ai_family_from_address(InetSocketAddress *addr,
127 Error **errp)
1856835d
DB
128{
129 if (addr->has_ipv6 && addr->has_ipv4 &&
130 !addr->ipv6 && !addr->ipv4) {
131 error_setg(errp, "Cannot disable IPv4 and IPv6 at same time");
132 return PF_UNSPEC;
133 }
94bc0d19
DB
134 if ((addr->has_ipv6 && addr->ipv6) && (addr->has_ipv4 && addr->ipv4)) {
135 /*
136 * Some backends can only do a single listener. In that case
137 * we want empty hostname to resolve to "::" and then use the
138 * flag IPV6_V6ONLY==0 to get both protocols on 1 socket. This
139 * doesn't work for addresses other than "", so they're just
140 * inevitably broken until multiple listeners can be used,
141 * and thus we honour getaddrinfo automatic protocol detection
142 * Once all backends do multi-listener, remove the PF_INET6
143 * branch entirely.
144 */
145 if (!addr->host || g_str_equal(addr->host, "")) {
146 return PF_INET6;
147 } else {
148 return PF_UNSPEC;
149 }
150 }
1856835d
DB
151 if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) {
152 return PF_INET6;
153 }
154 if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) {
155 return PF_INET;
156 }
157 return PF_UNSPEC;
158}
159
39f80521
KO
160static int create_fast_reuse_socket(struct addrinfo *e)
161{
162 int slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol);
163 if (slisten < 0) {
164 return -1;
165 }
166 socket_set_fast_reuse(slisten);
167 return slisten;
168}
169
89382c3d
KO
170static int try_bind(int socket, InetSocketAddress *saddr, struct addrinfo *e)
171{
172#ifndef IPV6_V6ONLY
173 return bind(socket, e->ai_addr, e->ai_addrlen);
174#else
175 /*
176 * Deals with first & last cases in matrix in comment
177 * for inet_ai_family_from_address().
178 */
179 int v6only =
180 ((!saddr->has_ipv4 && !saddr->has_ipv6) ||
181 (saddr->has_ipv4 && saddr->ipv4 &&
182 saddr->has_ipv6 && saddr->ipv6)) ? 0 : 1;
183 int stat;
184
185 rebind:
186 if (e->ai_family == PF_INET6) {
e7b79428
MAL
187 setsockopt(socket, IPPROTO_IPV6, IPV6_V6ONLY, &v6only,
188 sizeof(v6only));
89382c3d
KO
189 }
190
191 stat = bind(socket, e->ai_addr, e->ai_addrlen);
192 if (!stat) {
193 return 0;
194 }
195
196 /* If we got EADDRINUSE from an IPv6 bind & v6only is unset,
197 * it could be that the IPv4 port is already claimed, so retry
198 * with v6only set
199 */
200 if (e->ai_family == PF_INET6 && errno == EADDRINUSE && !v6only) {
201 v6only = 1;
202 goto rebind;
203 }
204 return stat;
205#endif
206}
207
1856835d
DB
208static int inet_listen_saddr(InetSocketAddress *saddr,
209 int port_offset,
e5b6353c 210 int num,
1856835d 211 Error **errp)
d247d25f
AL
212{
213 struct addrinfo ai,*res,*e;
d247d25f
AL
214 char port[33];
215 char uaddr[INET6_ADDRSTRLEN+1];
216 char uport[33];
9cf961bb 217 int rc, port_min, port_max, p;
10a7b7e6 218 int slisten = -1;
9cf961bb
KO
219 int saved_errno = 0;
220 bool socket_created = false;
1856835d 221 Error *err = NULL;
d247d25f 222
aec21d31
VSO
223 if (saddr->keep_alive) {
224 error_setg(errp, "keep-alive option is not supported for passive "
225 "sockets");
226 return -1;
227 }
228
d247d25f 229 memset(&ai,0, sizeof(ai));
3de3d698 230 ai.ai_flags = AI_PASSIVE;
6979a813
DB
231 if (saddr->has_numeric && saddr->numeric) {
232 ai.ai_flags |= AI_NUMERICHOST | AI_NUMERICSERV;
233 }
1856835d 234 ai.ai_family = inet_ai_family_from_address(saddr, &err);
e5bc776f 235 ai.ai_socktype = SOCK_STREAM;
d247d25f 236
1856835d
DB
237 if (err) {
238 error_propagate(errp, err);
239 return -1;
240 }
241
242 if (saddr->host == NULL) {
0983f5e6 243 error_setg(errp, "host not specified");
e5bc776f 244 return -1;
d247d25f 245 }
1856835d
DB
246 if (saddr->port != NULL) {
247 pstrcpy(port, sizeof(port), saddr->port);
0983f5e6
DB
248 } else {
249 port[0] = '\0';
250 }
d247d25f
AL
251
252 /* lookup */
8bc89127
GH
253 if (port_offset) {
254 unsigned long long baseport;
0983f5e6
DB
255 if (strlen(port) == 0) {
256 error_setg(errp, "port not specified");
257 return -1;
258 }
8bc89127
GH
259 if (parse_uint_full(port, &baseport, 10) < 0) {
260 error_setg(errp, "can't convert to a number: %s", port);
261 return -1;
262 }
263 if (baseport > 65535 ||
264 baseport + port_offset > 65535) {
265 error_setg(errp, "port %s out of range", port);
266 return -1;
267 }
268 snprintf(port, sizeof(port), "%d", (int)baseport + port_offset);
269 }
1856835d 270 rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL,
0983f5e6 271 strlen(port) ? port : NULL, &ai, &res);
d247d25f 272 if (rc != 0) {
1856835d
DB
273 error_setg(errp, "address resolution failed for %s:%s: %s",
274 saddr->host, port, gai_strerror(rc));
d247d25f
AL
275 return -1;
276 }
d247d25f 277
9cf961bb 278 /* create socket + bind/listen */
d247d25f 279 for (e = res; e != NULL; e = e->ai_next) {
653163fc 280#ifdef HAVE_IPPROTO_MPTCP
8bd1078a
DDAG
281 if (saddr->has_mptcp && saddr->mptcp) {
282 e->ai_protocol = IPPROTO_MPTCP;
283 }
284#endif
39b6efc8 285 getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
7d37435b
PB
286 uaddr,INET6_ADDRSTRLEN,uport,32,
287 NI_NUMERICHOST | NI_NUMERICSERV);
39f80521 288
877691f9 289 port_min = inet_getport(e);
1856835d 290 port_max = saddr->has_to ? saddr->to + port_offset : port_min;
877691f9
MA
291 for (p = port_min; p <= port_max; p++) {
292 inet_setport(e, p);
10a7b7e6
DB
293
294 slisten = create_fast_reuse_socket(e);
295 if (slisten < 0) {
296 /* First time we expect we might fail to create the socket
297 * eg if 'e' has AF_INET6 but ipv6 kmod is not loaded.
298 * Later iterations should always succeed if first iteration
299 * worked though, so treat that as fatal.
300 */
301 if (p == port_min) {
9cf961bb
KO
302 continue;
303 } else {
10a7b7e6
DB
304 error_setg_errno(errp, errno,
305 "Failed to recreate failed listening socket");
9cf961bb 306 goto listen_failed;
029409e5 307 }
d247d25f 308 }
10a7b7e6
DB
309 socket_created = true;
310
311 rc = try_bind(slisten, saddr, e);
312 if (rc < 0) {
313 if (errno != EADDRINUSE) {
314 error_setg_errno(errp, errno, "Failed to bind socket");
315 goto listen_failed;
316 }
317 } else {
e5b6353c 318 if (!listen(slisten, num)) {
10a7b7e6
DB
319 goto listen_ok;
320 }
321 if (errno != EADDRINUSE) {
322 error_setg_errno(errp, errno, "Failed to listen on socket");
323 goto listen_failed;
324 }
9cf961bb
KO
325 }
326 /* Someone else managed to bind to the same port and beat us
327 * to listen on it! Socket semantics does not allow us to
328 * recover from this situation, so we need to recreate the
329 * socket to allow bind attempts for subsequent ports:
330 */
331 closesocket(slisten);
10a7b7e6 332 slisten = -1;
d247d25f 333 }
9cf961bb
KO
334 }
335 error_setg_errno(errp, errno,
336 socket_created ?
337 "Failed to find an available port" :
338 "Failed to create a socket");
339listen_failed:
340 saved_errno = errno;
341 if (slisten >= 0) {
d247d25f
AL
342 closesocket(slisten);
343 }
d247d25f 344 freeaddrinfo(res);
9cf961bb 345 errno = saved_errno;
d247d25f
AL
346 return -1;
347
9cf961bb 348listen_ok:
d247d25f
AL
349 freeaddrinfo(res);
350 return slisten;
351}
352
05bc1d8a
MT
353#ifdef _WIN32
354#define QEMU_SOCKET_RC_INPROGRESS(rc) \
355 ((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY)
356#else
357#define QEMU_SOCKET_RC_INPROGRESS(rc) \
358 ((rc) == -EINPROGRESS)
359#endif
360
dfc00eb7
DB
361static int inet_connect_addr(const InetSocketAddress *saddr,
362 struct addrinfo *addr, Error **errp)
233aa5c2
OW
363{
364 int sock, rc;
365
05bc1d8a
MT
366 sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
367 if (sock < 0) {
dfc00eb7
DB
368 error_setg_errno(errp, errno, "Failed to create socket family %d",
369 addr->ai_family);
05bc1d8a
MT
370 return -1;
371 }
04fd1c78 372 socket_set_fast_reuse(sock);
b2587932 373
05bc1d8a
MT
374 /* connect to peer */
375 do {
376 rc = 0;
377 if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) {
b16a44e1 378 rc = -errno;
05bc1d8a
MT
379 }
380 } while (rc == -EINTR);
381
b2587932 382 if (rc < 0) {
dfc00eb7
DB
383 error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
384 saddr->host, saddr->port);
05bc1d8a
MT
385 closesocket(sock);
386 return -1;
387 }
b2587932 388
05bc1d8a
MT
389 return sock;
390}
391
2942e420
DB
392static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr,
393 Error **errp)
05bc1d8a
MT
394{
395 struct addrinfo ai, *res;
396 int rc;
2942e420 397 Error *err = NULL;
340849a9 398 static int useV4Mapped = 1;
d247d25f 399
05bc1d8a 400 memset(&ai, 0, sizeof(ai));
233aa5c2 401
340849a9 402 ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
d73415a3 403 if (qatomic_read(&useV4Mapped)) {
340849a9
DB
404 ai.ai_flags |= AI_V4MAPPED;
405 }
2942e420 406 ai.ai_family = inet_ai_family_from_address(saddr, &err);
f4c94c7c 407 ai.ai_socktype = SOCK_STREAM;
d247d25f 408
2942e420
DB
409 if (err) {
410 error_propagate(errp, err);
05bc1d8a 411 return NULL;
d247d25f
AL
412 }
413
2942e420
DB
414 if (saddr->host == NULL || saddr->port == NULL) {
415 error_setg(errp, "host and/or port not specified");
416 return NULL;
05bc1d8a 417 }
d247d25f
AL
418
419 /* lookup */
2942e420 420 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
340849a9
DB
421
422 /* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but
423 * then don't implement it in their getaddrinfo(). Detect
8cc360b9 424 * this and retry without the flag since that's preferable
340849a9
DB
425 * to a fatal error
426 */
427 if (rc == EAI_BADFLAGS &&
428 (ai.ai_flags & AI_V4MAPPED)) {
d73415a3 429 qatomic_set(&useV4Mapped, 0);
340849a9
DB
430 ai.ai_flags &= ~AI_V4MAPPED;
431 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
432 }
05bc1d8a 433 if (rc != 0) {
2942e420
DB
434 error_setg(errp, "address resolution failed for %s:%s: %s",
435 saddr->host, saddr->port, gai_strerror(rc));
05bc1d8a
MT
436 return NULL;
437 }
438 return res;
439}
440
5db5f44c
OW
441/**
442 * Create a socket and connect it to an address.
443 *
2942e420 444 * @saddr: Inet socket address specification
5db5f44c
OW
445 * @errp: set on error
446 *
447 * Returns: -1 on error, file descriptor on success.
448 */
b2587932 449int inet_connect_saddr(InetSocketAddress *saddr, Error **errp)
05bc1d8a 450{
3f9286b7 451 Error *local_err = NULL;
05bc1d8a
MT
452 struct addrinfo *res, *e;
453 int sock = -1;
05bc1d8a 454
2942e420 455 res = inet_parse_connect_saddr(saddr, errp);
05bc1d8a
MT
456 if (!res) {
457 return -1;
458 }
459
d247d25f 460 for (e = res; e != NULL; e = e->ai_next) {
3f9286b7
MA
461 error_free(local_err);
462 local_err = NULL;
8bd1078a 463
653163fc 464#ifdef HAVE_IPPROTO_MPTCP
8bd1078a
DDAG
465 if (saddr->has_mptcp && saddr->mptcp) {
466 e->ai_protocol = IPPROTO_MPTCP;
467 }
468#endif
469
dfc00eb7 470 sock = inet_connect_addr(saddr, e, &local_err);
3f9286b7 471 if (sock >= 0) {
05bc1d8a 472 break;
a6ba35b3 473 }
d247d25f 474 }
3f9286b7 475
da5e1169
VSO
476 freeaddrinfo(res);
477
3f9286b7
MA
478 if (sock < 0) {
479 error_propagate(errp, local_err);
da5e1169 480 return sock;
3f9286b7 481 }
b2587932 482
aec21d31
VSO
483 if (saddr->keep_alive) {
484 int val = 1;
e7b79428
MAL
485 int ret = setsockopt(sock, SOL_SOCKET, SO_KEEPALIVE,
486 &val, sizeof(val));
aec21d31
VSO
487
488 if (ret < 0) {
489 error_setg_errno(errp, errno, "Unable to set KEEPALIVE");
e3fdb13e 490 closesocket(sock);
aec21d31
VSO
491 return -1;
492 }
493 }
494
05bc1d8a 495 return sock;
d247d25f
AL
496}
497
8b39910e
DB
498static int inet_dgram_saddr(InetSocketAddress *sraddr,
499 InetSocketAddress *sladdr,
500 Error **errp)
7e1b35b4
GH
501{
502 struct addrinfo ai, *peer = NULL, *local = NULL;
503 const char *addr;
504 const char *port;
7e1b35b4 505 int sock = -1, rc;
8b39910e 506 Error *err = NULL;
7e1b35b4
GH
507
508 /* lookup peer addr */
509 memset(&ai,0, sizeof(ai));
3de3d698 510 ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG;
8b39910e 511 ai.ai_family = inet_ai_family_from_address(sraddr, &err);
7e1b35b4
GH
512 ai.ai_socktype = SOCK_DGRAM;
513
8b39910e
DB
514 if (err) {
515 error_propagate(errp, err);
58c652c0 516 goto err;
8b39910e
DB
517 }
518
519 addr = sraddr->host;
520 port = sraddr->port;
7e1b35b4
GH
521 if (addr == NULL || strlen(addr) == 0) {
522 addr = "localhost";
523 }
524 if (port == NULL || strlen(port) == 0) {
4f085c82 525 error_setg(errp, "remote port not specified");
58c652c0 526 goto err;
7e1b35b4
GH
527 }
528
9cd1883c 529 if ((rc = getaddrinfo(addr, port, &ai, &peer)) != 0) {
4f085c82
PB
530 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
531 gai_strerror(rc));
26015051 532 goto err;
7e1b35b4 533 }
7e1b35b4
GH
534
535 /* lookup local addr */
536 memset(&ai,0, sizeof(ai));
537 ai.ai_flags = AI_PASSIVE;
538 ai.ai_family = peer->ai_family;
539 ai.ai_socktype = SOCK_DGRAM;
540
8b39910e
DB
541 if (sladdr) {
542 addr = sladdr->host;
543 port = sladdr->port;
544 if (addr == NULL || strlen(addr) == 0) {
545 addr = NULL;
546 }
547 if (!port || strlen(port) == 0) {
548 port = "0";
549 }
550 } else {
7e1b35b4 551 addr = NULL;
7e1b35b4 552 port = "0";
8b39910e 553 }
7e1b35b4 554
9cd1883c 555 if ((rc = getaddrinfo(addr, port, &ai, &local)) != 0) {
4f085c82
PB
556 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
557 gai_strerror(rc));
39b38459 558 goto err;
7e1b35b4 559 }
7e1b35b4
GH
560
561 /* create socket */
40ff6d7e 562 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol);
7e1b35b4 563 if (sock < 0) {
dfc00eb7
DB
564 error_setg_errno(errp, errno, "Failed to create socket family %d",
565 peer->ai_family);
7e1b35b4
GH
566 goto err;
567 }
04fd1c78 568 socket_set_fast_reuse(sock);
7e1b35b4
GH
569
570 /* bind socket */
7e1b35b4 571 if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) {
235256a2 572 error_setg_errno(errp, errno, "Failed to bind socket");
7e1b35b4
GH
573 goto err;
574 }
575
576 /* connect to peer */
7e1b35b4 577 if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) {
dfc00eb7
DB
578 error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
579 addr, port);
7e1b35b4
GH
580 goto err;
581 }
582
583 freeaddrinfo(local);
584 freeaddrinfo(peer);
585 return sock;
586
587err:
26015051 588 if (sock != -1) {
7e1b35b4 589 closesocket(sock);
26015051
C
590 }
591 if (local) {
7e1b35b4 592 freeaddrinfo(local);
26015051
C
593 }
594 if (peer) {
7e1b35b4 595 freeaddrinfo(peer);
26015051
C
596 }
597
7e1b35b4
GH
598 return -1;
599}
600
f4c94c7c 601/* compatibility wrapper */
3e32370a
DB
602static int inet_parse_flag(const char *flagname, const char *optstr, bool *val,
603 Error **errp)
604{
605 char *end;
606 size_t len;
607
608 end = strstr(optstr, ",");
609 if (end) {
610 if (end[1] == ',') { /* Reject 'ipv6=on,,foo' */
611 error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
612 return -1;
613 }
614 len = end - optstr;
615 } else {
616 len = strlen(optstr);
617 }
618 if (len == 0 || (len == 3 && strncmp(optstr, "=on", len) == 0)) {
619 *val = true;
620 } else if (len == 4 && strncmp(optstr, "=off", len) == 0) {
621 *val = false;
622 } else {
623 error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
624 return -1;
625 }
626 return 0;
627}
628
0785bd7a 629int inet_parse(InetSocketAddress *addr, const char *str, Error **errp)
f4c94c7c
GH
630{
631 const char *optstr, *h;
55a10996 632 char host[65];
f4c94c7c 633 char port[33];
879e45c7 634 int to;
f4c94c7c 635 int pos;
3e32370a 636 char *begin;
f4c94c7c 637
0785bd7a 638 memset(addr, 0, sizeof(*addr));
879e45c7 639
f4c94c7c
GH
640 /* parse address */
641 if (str[0] == ':') {
642 /* no host given */
879e45c7 643 host[0] = '\0';
9cd1883c 644 if (sscanf(str, ":%32[^,]%n", port, &pos) != 1) {
2f002c43 645 error_setg(errp, "error parsing port in address '%s'", str);
0785bd7a 646 return -1;
f4c94c7c
GH
647 }
648 } else if (str[0] == '[') {
649 /* IPv6 addr */
9cd1883c 650 if (sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 651 error_setg(errp, "error parsing IPv6 address '%s'", str);
0785bd7a 652 return -1;
f4c94c7c 653 }
f4c94c7c 654 } else {
391b7b97 655 /* hostname or IPv4 addr */
9cd1883c 656 if (sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 657 error_setg(errp, "error parsing address '%s'", str);
0785bd7a 658 return -1;
f4c94c7c
GH
659 }
660 }
879e45c7
PB
661
662 addr->host = g_strdup(host);
663 addr->port = g_strdup(port);
f4c94c7c
GH
664
665 /* parse options */
666 optstr = str + pos;
667 h = strstr(optstr, ",to=");
879e45c7 668 if (h) {
1ccbc285
AP
669 h += 4;
670 if (sscanf(h, "%d%n", &to, &pos) != 1 ||
671 (h[pos] != '\0' && h[pos] != ',')) {
879e45c7 672 error_setg(errp, "error parsing to= argument");
0785bd7a 673 return -1;
879e45c7
PB
674 }
675 addr->has_to = true;
676 addr->to = to;
677 }
3e32370a
DB
678 begin = strstr(optstr, ",ipv4");
679 if (begin) {
680 if (inet_parse_flag("ipv4", begin + 5, &addr->ipv4, errp) < 0) {
681 return -1;
682 }
683 addr->has_ipv4 = true;
879e45c7 684 }
3e32370a
DB
685 begin = strstr(optstr, ",ipv6");
686 if (begin) {
687 if (inet_parse_flag("ipv6", begin + 5, &addr->ipv6, errp) < 0) {
688 return -1;
689 }
690 addr->has_ipv6 = true;
879e45c7 691 }
aec21d31
VSO
692 begin = strstr(optstr, ",keep-alive");
693 if (begin) {
694 if (inet_parse_flag("keep-alive", begin + strlen(",keep-alive"),
695 &addr->keep_alive, errp) < 0)
696 {
697 return -1;
698 }
699 addr->has_keep_alive = true;
700 }
653163fc 701#ifdef HAVE_IPPROTO_MPTCP
8bd1078a
DDAG
702 begin = strstr(optstr, ",mptcp");
703 if (begin) {
704 if (inet_parse_flag("mptcp", begin + strlen(",mptcp"),
705 &addr->mptcp, errp) < 0)
706 {
707 return -1;
708 }
709 addr->has_mptcp = true;
710 }
711#endif
0785bd7a 712 return 0;
879e45c7
PB
713}
714
e5bc776f 715
5db5f44c
OW
716/**
717 * Create a blocking socket and connect it to an address.
718 *
719 * @str: address string
720 * @errp: set in case of an error
721 *
722 * Returns -1 in case of error, file descriptor on success
723 **/
724int inet_connect(const char *str, Error **errp)
f4c94c7c 725{
f4c94c7c 726 int sock = -1;
0785bd7a 727 InetSocketAddress *addr = g_new(InetSocketAddress, 1);
f4c94c7c 728
0785bd7a 729 if (!inet_parse(addr, str, errp)) {
b2587932 730 sock = inet_connect_saddr(addr, errp);
5db5f44c 731 }
0785bd7a 732 qapi_free_InetSocketAddress(addr);
5db5f44c
OW
733 return sock;
734}
735
6a02c806
SH
736#ifdef CONFIG_AF_VSOCK
737static bool vsock_parse_vaddr_to_sockaddr(const VsockSocketAddress *vaddr,
738 struct sockaddr_vm *svm,
739 Error **errp)
740{
741 unsigned long long val;
742
743 memset(svm, 0, sizeof(*svm));
744 svm->svm_family = AF_VSOCK;
745
746 if (parse_uint_full(vaddr->cid, &val, 10) < 0 ||
747 val > UINT32_MAX) {
748 error_setg(errp, "Failed to parse cid '%s'", vaddr->cid);
749 return false;
750 }
751 svm->svm_cid = val;
752
753 if (parse_uint_full(vaddr->port, &val, 10) < 0 ||
754 val > UINT32_MAX) {
755 error_setg(errp, "Failed to parse port '%s'", vaddr->port);
756 return false;
757 }
758 svm->svm_port = val;
759
760 return true;
761}
762
dfc00eb7
DB
763static int vsock_connect_addr(const VsockSocketAddress *vaddr,
764 const struct sockaddr_vm *svm, Error **errp)
6a02c806
SH
765{
766 int sock, rc;
767
6a02c806
SH
768 sock = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
769 if (sock < 0) {
dfc00eb7
DB
770 error_setg_errno(errp, errno, "Failed to create socket family %d",
771 AF_VSOCK);
6a02c806
SH
772 return -1;
773 }
b2587932 774
6a02c806
SH
775 /* connect to peer */
776 do {
777 rc = 0;
778 if (connect(sock, (const struct sockaddr *)svm, sizeof(*svm)) < 0) {
779 rc = -errno;
780 }
781 } while (rc == -EINTR);
782
b2587932 783 if (rc < 0) {
dfc00eb7
DB
784 error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
785 vaddr->cid, vaddr->port);
6a02c806
SH
786 closesocket(sock);
787 return -1;
788 }
b2587932 789
6a02c806
SH
790 return sock;
791}
792
b2587932 793static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
6a02c806
SH
794{
795 struct sockaddr_vm svm;
6a02c806
SH
796
797 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
798 return -1;
799 }
800
dfc00eb7 801 return vsock_connect_addr(vaddr, &svm, errp);
6a02c806
SH
802}
803
804static int vsock_listen_saddr(VsockSocketAddress *vaddr,
e5b6353c 805 int num,
6a02c806
SH
806 Error **errp)
807{
808 struct sockaddr_vm svm;
809 int slisten;
810
811 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
812 return -1;
813 }
814
815 slisten = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
816 if (slisten < 0) {
817 error_setg_errno(errp, errno, "Failed to create socket");
818 return -1;
819 }
820
821 if (bind(slisten, (const struct sockaddr *)&svm, sizeof(svm)) != 0) {
822 error_setg_errno(errp, errno, "Failed to bind socket");
823 closesocket(slisten);
824 return -1;
825 }
826
e5b6353c 827 if (listen(slisten, num) != 0) {
6a02c806
SH
828 error_setg_errno(errp, errno, "Failed to listen on socket");
829 closesocket(slisten);
830 return -1;
831 }
832 return slisten;
833}
834
4db5c619
MA
835static int vsock_parse(VsockSocketAddress *addr, const char *str,
836 Error **errp)
6a02c806 837{
6a02c806
SH
838 char cid[33];
839 char port[33];
840 int n;
841
842 if (sscanf(str, "%32[^:]:%32[^,]%n", cid, port, &n) != 2) {
843 error_setg(errp, "error parsing address '%s'", str);
4db5c619 844 return -1;
6a02c806
SH
845 }
846 if (str[n] != '\0') {
847 error_setg(errp, "trailing characters in address '%s'", str);
4db5c619 848 return -1;
6a02c806
SH
849 }
850
6a02c806
SH
851 addr->cid = g_strdup(cid);
852 addr->port = g_strdup(port);
4db5c619 853 return 0;
6a02c806
SH
854}
855#else
856static void vsock_unsupported(Error **errp)
857{
858 error_setg(errp, "socket family AF_VSOCK unsupported");
859}
860
b2587932 861static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
6a02c806
SH
862{
863 vsock_unsupported(errp);
864 return -1;
865}
866
867static int vsock_listen_saddr(VsockSocketAddress *vaddr,
e5b6353c 868 int num,
6a02c806
SH
869 Error **errp)
870{
871 vsock_unsupported(errp);
872 return -1;
873}
874
4db5c619
MA
875static int vsock_parse(VsockSocketAddress *addr, const char *str,
876 Error **errp)
6a02c806
SH
877{
878 vsock_unsupported(errp);
4db5c619 879 return -1;
6a02c806
SH
880}
881#endif /* CONFIG_AF_VSOCK */
882
8acefc79
MA
883static bool saddr_is_abstract(UnixSocketAddress *saddr)
884{
885#ifdef CONFIG_LINUX
886 return saddr->abstract;
887#else
888 return false;
889#endif
890}
891
892static bool saddr_is_tight(UnixSocketAddress *saddr)
893{
894#ifdef CONFIG_LINUX
895 return !saddr->has_tight || saddr->tight;
896#else
897 return false;
898#endif
899}
900
1856835d 901static int unix_listen_saddr(UnixSocketAddress *saddr,
e5b6353c 902 int num,
1856835d 903 Error **errp)
d247d25f 904{
8acefc79 905 bool abstract = saddr_is_abstract(saddr);
d247d25f 906 struct sockaddr_un un;
62b6adfb 907 int sock, fd;
ad9579aa
DB
908 char *pathbuf = NULL;
909 const char *path;
2d2023c3 910 size_t pathlen;
776b97d3 911 size_t addrlen;
d247d25f 912
40ff6d7e 913 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 914 if (sock < 0) {
b658c53d 915 error_setg_errno(errp, errno, "Failed to create Unix socket");
39b6efc8 916 return -1;
d247d25f
AL
917 }
918
8acefc79 919 if (saddr->path[0] || abstract) {
ad9579aa 920 path = saddr->path;
d247d25f 921 } else {
b658c53d
PB
922 const char *tmpdir = getenv("TMPDIR");
923 tmpdir = tmpdir ? tmpdir : "/tmp";
ad9579aa
DB
924 path = pathbuf = g_strdup_printf("%s/qemu-socket-XXXXXX", tmpdir);
925 }
b658c53d 926
2d2023c3 927 pathlen = strlen(path);
776b97d3 928 if (pathlen > sizeof(un.sun_path) ||
8acefc79 929 (abstract && pathlen > (sizeof(un.sun_path) - 1))) {
ad9579aa
DB
930 error_setg(errp, "UNIX socket path '%s' is too long", path);
931 error_append_hint(errp, "Path must be less than %zu bytes\n",
8acefc79 932 abstract ? sizeof(un.sun_path) - 1 :
ad9579aa
DB
933 sizeof(un.sun_path));
934 goto err;
935 }
936
937 if (pathbuf != NULL) {
d247d25f
AL
938 /*
939 * This dummy fd usage silences the mktemp() unsecure warning.
940 * Using mkstemp() doesn't make things more secure here
941 * though. bind() complains about existing files, so we have
942 * to unlink first and thus re-open the race window. The
943 * worst case possible is bind() failing, i.e. a DoS attack.
944 */
ad9579aa 945 fd = mkstemp(pathbuf);
b658c53d
PB
946 if (fd < 0) {
947 error_setg_errno(errp, errno,
ad9579aa 948 "Failed to make a temporary socket %s", pathbuf);
b658c53d
PB
949 goto err;
950 }
951 close(fd);
d247d25f 952 }
d247d25f 953
8acefc79 954 if (!abstract && unlink(path) < 0 && errno != ENOENT) {
0ef705a2 955 error_setg_errno(errp, errno,
ad9579aa 956 "Failed to unlink socket %s", path);
0ef705a2
CR
957 goto err;
958 }
ad9579aa
DB
959
960 memset(&un, 0, sizeof(un));
961 un.sun_family = AF_UNIX;
776b97d3 962 addrlen = sizeof(un);
ad9579aa 963
8acefc79 964 if (abstract) {
776b97d3
XZ
965 un.sun_path[0] = '\0';
966 memcpy(&un.sun_path[1], path, pathlen);
8acefc79 967 if (saddr_is_tight(saddr)) {
776b97d3
XZ
968 addrlen = offsetof(struct sockaddr_un, sun_path) + 1 + pathlen;
969 }
970 } else {
971 memcpy(un.sun_path, path, pathlen);
972 }
973
974 if (bind(sock, (struct sockaddr *) &un, addrlen) < 0) {
56382bd5 975 error_setg_errno(errp, errno, "Failed to bind socket to %s", path);
d247d25f
AL
976 goto err;
977 }
e5b6353c 978 if (listen(sock, num) < 0) {
235256a2 979 error_setg_errno(errp, errno, "Failed to listen on socket");
d247d25f
AL
980 goto err;
981 }
982
62473511 983 g_free(pathbuf);
d247d25f
AL
984 return sock;
985
986err:
ad9579aa 987 g_free(pathbuf);
d247d25f
AL
988 closesocket(sock);
989 return -1;
990}
991
b2587932 992static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
d247d25f 993{
8acefc79 994 bool abstract = saddr_is_abstract(saddr);
d247d25f 995 struct sockaddr_un un;
1fc05adf 996 int sock, rc;
2d2023c3 997 size_t pathlen;
776b97d3 998 size_t addrlen;
d247d25f 999
2942e420 1000 if (saddr->path == NULL) {
312fd5f2 1001 error_setg(errp, "unix connect: no path specified");
2af2bf67
GH
1002 return -1;
1003 }
1004
40ff6d7e 1005 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 1006 if (sock < 0) {
235256a2 1007 error_setg_errno(errp, errno, "Failed to create socket");
39b6efc8 1008 return -1;
d247d25f
AL
1009 }
1010
2d2023c3 1011 pathlen = strlen(saddr->path);
776b97d3 1012 if (pathlen > sizeof(un.sun_path) ||
8acefc79 1013 (abstract && pathlen > (sizeof(un.sun_path) - 1))) {
ad9579aa
DB
1014 error_setg(errp, "UNIX socket path '%s' is too long", saddr->path);
1015 error_append_hint(errp, "Path must be less than %zu bytes\n",
8acefc79 1016 abstract ? sizeof(un.sun_path) - 1 :
ad9579aa
DB
1017 sizeof(un.sun_path));
1018 goto err;
1019 }
1020
d247d25f
AL
1021 memset(&un, 0, sizeof(un));
1022 un.sun_family = AF_UNIX;
776b97d3 1023 addrlen = sizeof(un);
1fc05adf 1024
8acefc79 1025 if (abstract) {
776b97d3
XZ
1026 un.sun_path[0] = '\0';
1027 memcpy(&un.sun_path[1], saddr->path, pathlen);
8acefc79 1028 if (saddr_is_tight(saddr)) {
776b97d3
XZ
1029 addrlen = offsetof(struct sockaddr_un, sun_path) + 1 + pathlen;
1030 }
1031 } else {
1032 memcpy(un.sun_path, saddr->path, pathlen);
1033 }
1fc05adf
PB
1034 /* connect to peer */
1035 do {
1036 rc = 0;
776b97d3 1037 if (connect(sock, (struct sockaddr *) &un, addrlen) < 0) {
b16a44e1 1038 rc = -errno;
1fc05adf
PB
1039 }
1040 } while (rc == -EINTR);
1041
1fc05adf 1042 if (rc < 0) {
dfc00eb7 1043 error_setg_errno(errp, -rc, "Failed to connect to '%s'",
ad9579aa
DB
1044 saddr->path);
1045 goto err;
d247d25f
AL
1046 }
1047
d247d25f 1048 return sock;
ad9579aa
DB
1049
1050 err:
e3fdb13e 1051 closesocket(sock);
ad9579aa 1052 return -1;
d247d25f
AL
1053}
1054
2af2bf67 1055/* compatibility wrapper */
62473511 1056int unix_listen(const char *str, Error **errp)
62b6adfb 1057{
1856835d 1058 UnixSocketAddress *saddr;
caf88d74 1059 int sock;
62b6adfb 1060
1856835d 1061 saddr = g_new0(UnixSocketAddress, 1);
caf88d74 1062 saddr->path = g_strdup(str);
e5b6353c 1063 sock = unix_listen_saddr(saddr, 1, errp);
1856835d 1064 qapi_free_UnixSocketAddress(saddr);
62b6adfb
GH
1065 return sock;
1066}
1067
7fc4e63e 1068int unix_connect(const char *path, Error **errp)
2af2bf67 1069{
2942e420 1070 UnixSocketAddress *saddr;
2af2bf67
GH
1071 int sock;
1072
2942e420
DB
1073 saddr = g_new0(UnixSocketAddress, 1);
1074 saddr->path = g_strdup(path);
b2587932 1075 sock = unix_connect_saddr(saddr, errp);
2942e420 1076 qapi_free_UnixSocketAddress(saddr);
1fc05adf
PB
1077 return sock;
1078}
1079
18bf1c94
LV
1080char *socket_uri(SocketAddress *addr)
1081{
1082 switch (addr->type) {
1083 case SOCKET_ADDRESS_TYPE_INET:
1084 return g_strdup_printf("tcp:%s:%s",
1085 addr->u.inet.host,
1086 addr->u.inet.port);
1087 case SOCKET_ADDRESS_TYPE_UNIX:
1088 return g_strdup_printf("unix:%s",
1089 addr->u.q_unix.path);
1090 case SOCKET_ADDRESS_TYPE_FD:
1091 return g_strdup_printf("fd:%s", addr->u.fd.str);
1092 case SOCKET_ADDRESS_TYPE_VSOCK:
1093 return g_strdup_printf("tcp:%s:%s",
1094 addr->u.vsock.cid,
1095 addr->u.vsock.port);
1096 default:
1097 return g_strdup("unknown address type");
1098 }
1099}
1fc05adf 1100
bd269ebc 1101SocketAddress *socket_parse(const char *str, Error **errp)
101f9cbc 1102{
bd269ebc 1103 SocketAddress *addr;
101f9cbc 1104
bd269ebc 1105 addr = g_new0(SocketAddress, 1);
101f9cbc
PB
1106 if (strstart(str, "unix:", NULL)) {
1107 if (str[5] == '\0') {
312fd5f2 1108 error_setg(errp, "invalid Unix socket address");
101f9cbc
PB
1109 goto fail;
1110 } else {
bd269ebc
MA
1111 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1112 addr->u.q_unix.path = g_strdup(str + 5);
101f9cbc
PB
1113 }
1114 } else if (strstart(str, "fd:", NULL)) {
1115 if (str[3] == '\0') {
312fd5f2 1116 error_setg(errp, "invalid file descriptor address");
101f9cbc
PB
1117 goto fail;
1118 } else {
bd269ebc
MA
1119 addr->type = SOCKET_ADDRESS_TYPE_FD;
1120 addr->u.fd.str = g_strdup(str + 3);
101f9cbc 1121 }
6a02c806 1122 } else if (strstart(str, "vsock:", NULL)) {
bd269ebc
MA
1123 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1124 if (vsock_parse(&addr->u.vsock, str + strlen("vsock:"), errp)) {
6a02c806
SH
1125 goto fail;
1126 }
101f9cbc 1127 } else {
bd269ebc
MA
1128 addr->type = SOCKET_ADDRESS_TYPE_INET;
1129 if (inet_parse(&addr->u.inet, str, errp)) {
101f9cbc
PB
1130 goto fail;
1131 }
1132 }
1133 return addr;
1134
1135fail:
bd269ebc 1136 qapi_free_SocketAddress(addr);
101f9cbc
PB
1137 return NULL;
1138}
1139
37179e9e 1140static int socket_get_fd(const char *fdstr, Error **errp)
30bdb3c5 1141{
947e4744 1142 Monitor *cur_mon = monitor_cur();
1723d6b1
DB
1143 int fd;
1144 if (cur_mon) {
1145 fd = monitor_get_fd(cur_mon, fdstr, errp);
1146 if (fd < 0) {
1147 return -1;
1148 }
1149 } else {
1150 if (qemu_strtoi(fdstr, NULL, 10, &fd) < 0) {
1151 error_setg_errno(errp, errno,
1152 "Unable to parse FD number %s",
1153 fdstr);
1154 return -1;
1155 }
30bdb3c5
DB
1156 }
1157 if (!fd_is_socket(fd)) {
1158 error_setg(errp, "File descriptor '%s' is not a socket", fdstr);
1159 close(fd);
1160 return -1;
1161 }
1162 return fd;
1163}
1164
c5423704
VSO
1165int socket_address_parse_named_fd(SocketAddress *addr, Error **errp)
1166{
1167 int fd;
1168
1169 if (addr->type != SOCKET_ADDRESS_TYPE_FD) {
1170 return 0;
1171 }
1172
1173 fd = socket_get_fd(addr->u.fd.str, errp);
1174 if (fd < 0) {
1175 return fd;
1176 }
1177
1178 g_free(addr->u.fd.str);
1179 addr->u.fd.str = g_strdup_printf("%d", fd);
1180
1181 return 0;
1182}
1183
b2587932 1184int socket_connect(SocketAddress *addr, Error **errp)
101f9cbc 1185{
101f9cbc
PB
1186 int fd;
1187
2d32adda 1188 switch (addr->type) {
bd269ebc 1189 case SOCKET_ADDRESS_TYPE_INET:
b2587932 1190 fd = inet_connect_saddr(&addr->u.inet, errp);
101f9cbc
PB
1191 break;
1192
bd269ebc 1193 case SOCKET_ADDRESS_TYPE_UNIX:
b2587932 1194 fd = unix_connect_saddr(&addr->u.q_unix, errp);
101f9cbc
PB
1195 break;
1196
bd269ebc 1197 case SOCKET_ADDRESS_TYPE_FD:
37179e9e 1198 fd = socket_get_fd(addr->u.fd.str, errp);
101f9cbc
PB
1199 break;
1200
bd269ebc 1201 case SOCKET_ADDRESS_TYPE_VSOCK:
b2587932 1202 fd = vsock_connect_saddr(&addr->u.vsock, errp);
6a02c806
SH
1203 break;
1204
101f9cbc
PB
1205 default:
1206 abort();
1207 }
101f9cbc
PB
1208 return fd;
1209}
1210
e5b6353c 1211int socket_listen(SocketAddress *addr, int num, Error **errp)
101f9cbc 1212{
101f9cbc
PB
1213 int fd;
1214
e5b6353c 1215 trace_socket_listen(num);
2d32adda 1216 switch (addr->type) {
bd269ebc 1217 case SOCKET_ADDRESS_TYPE_INET:
e5b6353c 1218 fd = inet_listen_saddr(&addr->u.inet, 0, num, errp);
101f9cbc
PB
1219 break;
1220
bd269ebc 1221 case SOCKET_ADDRESS_TYPE_UNIX:
e5b6353c 1222 fd = unix_listen_saddr(&addr->u.q_unix, num, errp);
101f9cbc
PB
1223 break;
1224
bd269ebc 1225 case SOCKET_ADDRESS_TYPE_FD:
37179e9e
SH
1226 fd = socket_get_fd(addr->u.fd.str, errp);
1227 if (fd < 0) {
1228 return -1;
1229 }
1230
1231 /*
1232 * If the socket is not yet in the listen state, then transition it to
1233 * the listen state now.
1234 *
1235 * If it's already listening then this updates the backlog value as
1236 * requested.
1237 *
1238 * If this socket cannot listen because it's already in another state
1239 * (e.g. unbound or connected) then we'll catch the error here.
1240 */
1241 if (listen(fd, num) != 0) {
1242 error_setg_errno(errp, errno, "Failed to listen on fd socket");
1243 closesocket(fd);
1244 return -1;
1245 }
101f9cbc
PB
1246 break;
1247
bd269ebc 1248 case SOCKET_ADDRESS_TYPE_VSOCK:
e5b6353c 1249 fd = vsock_listen_saddr(&addr->u.vsock, num, errp);
6a02c806
SH
1250 break;
1251
101f9cbc
PB
1252 default:
1253 abort();
1254 }
101f9cbc
PB
1255 return fd;
1256}
1257
74b6ce43
MAL
1258void socket_listen_cleanup(int fd, Error **errp)
1259{
bd269ebc 1260 SocketAddress *addr;
74b6ce43
MAL
1261
1262 addr = socket_local_address(fd, errp);
2d7ad7c0
DB
1263 if (!addr) {
1264 return;
1265 }
74b6ce43 1266
bd269ebc
MA
1267 if (addr->type == SOCKET_ADDRESS_TYPE_UNIX
1268 && addr->u.q_unix.path) {
1269 if (unlink(addr->u.q_unix.path) < 0 && errno != ENOENT) {
74b6ce43
MAL
1270 error_setg_errno(errp, errno,
1271 "Failed to unlink socket %s",
bd269ebc 1272 addr->u.q_unix.path);
74b6ce43
MAL
1273 }
1274 }
1275
bd269ebc 1276 qapi_free_SocketAddress(addr);
74b6ce43
MAL
1277}
1278
bd269ebc 1279int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp)
3ecc059d 1280{
3ecc059d
GH
1281 int fd;
1282
ca0b64e5 1283 /*
bd269ebc 1284 * TODO SOCKET_ADDRESS_TYPE_FD when fd is AF_INET or AF_INET6
ca0b64e5
MA
1285 * (although other address families can do SOCK_DGRAM, too)
1286 */
2d32adda 1287 switch (remote->type) {
bd269ebc
MA
1288 case SOCKET_ADDRESS_TYPE_INET:
1289 fd = inet_dgram_saddr(&remote->u.inet,
1290 local ? &local->u.inet : NULL, errp);
3ecc059d
GH
1291 break;
1292
1293 default:
1294 error_setg(errp, "socket type unsupported for datagram");
7a5b6af1 1295 fd = -1;
3ecc059d 1296 }
3ecc059d
GH
1297 return fd;
1298}
17c55dec
DB
1299
1300
bd269ebc 1301static SocketAddress *
17c55dec
DB
1302socket_sockaddr_to_address_inet(struct sockaddr_storage *sa,
1303 socklen_t salen,
1304 Error **errp)
1305{
1306 char host[NI_MAXHOST];
1307 char serv[NI_MAXSERV];
bd269ebc 1308 SocketAddress *addr;
0399293e 1309 InetSocketAddress *inet;
17c55dec
DB
1310 int ret;
1311
1312 ret = getnameinfo((struct sockaddr *)sa, salen,
1313 host, sizeof(host),
1314 serv, sizeof(serv),
1315 NI_NUMERICHOST | NI_NUMERICSERV);
1316 if (ret != 0) {
1317 error_setg(errp, "Cannot format numeric socket address: %s",
1318 gai_strerror(ret));
1319 return NULL;
1320 }
1321
bd269ebc
MA
1322 addr = g_new0(SocketAddress, 1);
1323 addr->type = SOCKET_ADDRESS_TYPE_INET;
1324 inet = &addr->u.inet;
0399293e
EB
1325 inet->host = g_strdup(host);
1326 inet->port = g_strdup(serv);
17c55dec 1327 if (sa->ss_family == AF_INET) {
0399293e 1328 inet->has_ipv4 = inet->ipv4 = true;
17c55dec 1329 } else {
0399293e 1330 inet->has_ipv6 = inet->ipv6 = true;
17c55dec
DB
1331 }
1332
1333 return addr;
1334}
1335
1336
bd269ebc 1337static SocketAddress *
17c55dec
DB
1338socket_sockaddr_to_address_unix(struct sockaddr_storage *sa,
1339 socklen_t salen,
1340 Error **errp)
1341{
bd269ebc 1342 SocketAddress *addr;
17c55dec
DB
1343 struct sockaddr_un *su = (struct sockaddr_un *)sa;
1344
bd269ebc
MA
1345 addr = g_new0(SocketAddress, 1);
1346 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
118d527f 1347 salen -= offsetof(struct sockaddr_un, sun_path);
3b14b4ec 1348#ifdef CONFIG_LINUX
118d527f 1349 if (salen > 0 && !su->sun_path[0]) {
3b14b4ec 1350 /* Linux abstract socket */
118d527f 1351 addr->u.q_unix.path = g_strndup(su->sun_path + 1, salen - 1);
3b14b4ec
MA
1352 addr->u.q_unix.has_abstract = true;
1353 addr->u.q_unix.abstract = true;
1354 addr->u.q_unix.has_tight = true;
118d527f 1355 addr->u.q_unix.tight = salen < sizeof(su->sun_path);
3b14b4ec 1356 return addr;
17c55dec 1357 }
3b14b4ec 1358#endif
17c55dec 1359
118d527f 1360 addr->u.q_unix.path = g_strndup(su->sun_path, salen);
17c55dec
DB
1361 return addr;
1362}
17c55dec 1363
6a02c806 1364#ifdef CONFIG_AF_VSOCK
bd269ebc 1365static SocketAddress *
6a02c806
SH
1366socket_sockaddr_to_address_vsock(struct sockaddr_storage *sa,
1367 socklen_t salen,
1368 Error **errp)
1369{
bd269ebc 1370 SocketAddress *addr;
6a02c806
SH
1371 VsockSocketAddress *vaddr;
1372 struct sockaddr_vm *svm = (struct sockaddr_vm *)sa;
1373
bd269ebc
MA
1374 addr = g_new0(SocketAddress, 1);
1375 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1376 vaddr = &addr->u.vsock;
6a02c806
SH
1377 vaddr->cid = g_strdup_printf("%u", svm->svm_cid);
1378 vaddr->port = g_strdup_printf("%u", svm->svm_port);
1379
1380 return addr;
1381}
1382#endif /* CONFIG_AF_VSOCK */
1383
bd269ebc 1384SocketAddress *
17c55dec
DB
1385socket_sockaddr_to_address(struct sockaddr_storage *sa,
1386 socklen_t salen,
1387 Error **errp)
1388{
1389 switch (sa->ss_family) {
1390 case AF_INET:
1391 case AF_INET6:
1392 return socket_sockaddr_to_address_inet(sa, salen, errp);
1393
17c55dec
DB
1394 case AF_UNIX:
1395 return socket_sockaddr_to_address_unix(sa, salen, errp);
17c55dec 1396
6a02c806
SH
1397#ifdef CONFIG_AF_VSOCK
1398 case AF_VSOCK:
1399 return socket_sockaddr_to_address_vsock(sa, salen, errp);
1400#endif
1401
17c55dec
DB
1402 default:
1403 error_setg(errp, "socket family %d unsupported",
1404 sa->ss_family);
1405 return NULL;
1406 }
1407 return 0;
1408}
1409
1410
bd269ebc 1411SocketAddress *socket_local_address(int fd, Error **errp)
17c55dec
DB
1412{
1413 struct sockaddr_storage ss;
1414 socklen_t sslen = sizeof(ss);
1415
1416 if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1417 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1418 "Unable to query local socket address");
1419 return NULL;
1420 }
1421
1422 return socket_sockaddr_to_address(&ss, sslen, errp);
1423}
1424
1425
bd269ebc 1426SocketAddress *socket_remote_address(int fd, Error **errp)
17c55dec
DB
1427{
1428 struct sockaddr_storage ss;
1429 socklen_t sslen = sizeof(ss);
1430
1431 if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1432 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1433 "Unable to query remote socket address");
1434 return NULL;
1435 }
1436
1437 return socket_sockaddr_to_address(&ss, sslen, errp);
1438}
2a8e21c7 1439
216411b8 1440
bd269ebc
MA
1441SocketAddress *socket_address_flatten(SocketAddressLegacy *addr_legacy)
1442{
fc0f0059 1443 SocketAddress *addr;
bd269ebc
MA
1444
1445 if (!addr_legacy) {
1446 return NULL;
1447 }
1448
fc0f0059
MA
1449 addr = g_new(SocketAddress, 1);
1450
bd269ebc 1451 switch (addr_legacy->type) {
935a867c 1452 case SOCKET_ADDRESS_TYPE_INET:
bd269ebc
MA
1453 addr->type = SOCKET_ADDRESS_TYPE_INET;
1454 QAPI_CLONE_MEMBERS(InetSocketAddress, &addr->u.inet,
1455 addr_legacy->u.inet.data);
1456 break;
935a867c 1457 case SOCKET_ADDRESS_TYPE_UNIX:
bd269ebc
MA
1458 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1459 QAPI_CLONE_MEMBERS(UnixSocketAddress, &addr->u.q_unix,
1460 addr_legacy->u.q_unix.data);
1461 break;
935a867c 1462 case SOCKET_ADDRESS_TYPE_VSOCK:
bd269ebc
MA
1463 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1464 QAPI_CLONE_MEMBERS(VsockSocketAddress, &addr->u.vsock,
1465 addr_legacy->u.vsock.data);
1466 break;
935a867c 1467 case SOCKET_ADDRESS_TYPE_FD:
bd269ebc
MA
1468 addr->type = SOCKET_ADDRESS_TYPE_FD;
1469 QAPI_CLONE_MEMBERS(String, &addr->u.fd, addr_legacy->u.fd.data);
1470 break;
1471 default:
1472 abort();
1473 }
1474
1475 return addr;
1476}