]> git.proxmox.com Git - mirror_qemu.git/blame - util/qemu-sockets.c
Merge remote-tracking branch 'remotes/thuth-gitlab/tags/pull-request-2021-09-06'...
[mirror_qemu.git] / util / qemu-sockets.c
CommitLineData
305b0eb2
AL
1/*
2 * inet and unix socket functions for qemu
3 *
4 * (c) 2008 Gerd Hoffmann <kraxel@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 of the License.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
e6d91ab6
PB
14 *
15 * Contributions after 2012-01-13 are licensed under the terms of the
16 * GNU GPL, version 2 or (at your option) any later version.
305b0eb2 17 */
aafd7584 18#include "qemu/osdep.h"
d247d25f 19
6a02c806
SH
20#ifdef CONFIG_AF_VSOCK
21#include <linux/vm_sockets.h>
22#endif /* CONFIG_AF_VSOCK */
23
a8d25326 24#include "qemu-common.h"
83c9089e 25#include "monitor/monitor.h"
bd269ebc 26#include "qapi/clone-visitor.h"
da34e65c 27#include "qapi/error.h"
9af23989 28#include "qapi/qapi-visit-sockets.h"
1de7afc9 29#include "qemu/sockets.h"
1de7afc9 30#include "qemu/main-loop.h"
b3db211f
DB
31#include "qapi/qobject-input-visitor.h"
32#include "qapi/qobject-output-visitor.h"
f348b6d1 33#include "qemu/cutils.h"
e5b6353c 34#include "trace.h"
d247d25f
AL
35
36#ifndef AI_ADDRCONFIG
37# define AI_ADDRCONFIG 0
38#endif
340849a9 39
3de3d698
WB
40#ifndef AI_V4MAPPED
41# define AI_V4MAPPED 0
42#endif
d247d25f 43
6979a813
DB
44#ifndef AI_NUMERICSERV
45# define AI_NUMERICSERV 0
46#endif
47
2af2bf67 48
d247d25f
AL
49static int inet_getport(struct addrinfo *e)
50{
51 struct sockaddr_in *i4;
52 struct sockaddr_in6 *i6;
53
54 switch (e->ai_family) {
55 case PF_INET6:
56 i6 = (void*)e->ai_addr;
57 return ntohs(i6->sin6_port);
58 case PF_INET:
59 i4 = (void*)e->ai_addr;
60 return ntohs(i4->sin_port);
61 default:
62 return 0;
63 }
64}
65
66static void inet_setport(struct addrinfo *e, int port)
67{
68 struct sockaddr_in *i4;
69 struct sockaddr_in6 *i6;
70
71 switch (e->ai_family) {
72 case PF_INET6:
73 i6 = (void*)e->ai_addr;
74 i6->sin6_port = htons(port);
75 break;
76 case PF_INET:
77 i4 = (void*)e->ai_addr;
78 i4->sin_port = htons(port);
79 break;
80 }
81}
82
a589569f
WX
83NetworkAddressFamily inet_netfamily(int family)
84{
85 switch (family) {
86 case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6;
87 case PF_INET: return NETWORK_ADDRESS_FAMILY_IPV4;
88 case PF_UNIX: return NETWORK_ADDRESS_FAMILY_UNIX;
6a02c806
SH
89#ifdef CONFIG_AF_VSOCK
90 case PF_VSOCK: return NETWORK_ADDRESS_FAMILY_VSOCK;
91#endif /* CONFIG_AF_VSOCK */
a589569f
WX
92 }
93 return NETWORK_ADDRESS_FAMILY_UNKNOWN;
94}
95
58dc31f1
DB
96bool fd_is_socket(int fd)
97{
98 int optval;
99 socklen_t optlen = sizeof(optval);
100 return !qemu_getsockopt(fd, SOL_SOCKET, SO_TYPE, &optval, &optlen);
101}
102
103
1856835d
DB
104/*
105 * Matrix we're trying to apply
106 *
107 * ipv4 ipv6 family
108 * - - PF_UNSPEC
109 * - f PF_INET
110 * - t PF_INET6
111 * f - PF_INET6
112 * f f <error>
113 * f t PF_INET6
114 * t - PF_INET
115 * t f PF_INET
94bc0d19 116 * t t PF_INET6/PF_UNSPEC
1856835d 117 *
d43eda3d 118 * NB, this matrix is only about getting the necessary results
1856835d
DB
119 * from getaddrinfo(). Some of the cases require further work
120 * after reading results from getaddrinfo in order to fully
94bc0d19
DB
121 * apply the logic the end user wants.
122 *
123 * In the first and last cases, we must set IPV6_V6ONLY=0
124 * when binding, to allow a single listener to potentially
125 * accept both IPv4+6 addresses.
1856835d 126 */
c1b412f1
DB
127int inet_ai_family_from_address(InetSocketAddress *addr,
128 Error **errp)
1856835d
DB
129{
130 if (addr->has_ipv6 && addr->has_ipv4 &&
131 !addr->ipv6 && !addr->ipv4) {
132 error_setg(errp, "Cannot disable IPv4 and IPv6 at same time");
133 return PF_UNSPEC;
134 }
94bc0d19
DB
135 if ((addr->has_ipv6 && addr->ipv6) && (addr->has_ipv4 && addr->ipv4)) {
136 /*
137 * Some backends can only do a single listener. In that case
138 * we want empty hostname to resolve to "::" and then use the
139 * flag IPV6_V6ONLY==0 to get both protocols on 1 socket. This
140 * doesn't work for addresses other than "", so they're just
141 * inevitably broken until multiple listeners can be used,
142 * and thus we honour getaddrinfo automatic protocol detection
143 * Once all backends do multi-listener, remove the PF_INET6
144 * branch entirely.
145 */
146 if (!addr->host || g_str_equal(addr->host, "")) {
147 return PF_INET6;
148 } else {
149 return PF_UNSPEC;
150 }
151 }
1856835d
DB
152 if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) {
153 return PF_INET6;
154 }
155 if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) {
156 return PF_INET;
157 }
158 return PF_UNSPEC;
159}
160
39f80521
KO
161static int create_fast_reuse_socket(struct addrinfo *e)
162{
163 int slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol);
164 if (slisten < 0) {
165 return -1;
166 }
167 socket_set_fast_reuse(slisten);
168 return slisten;
169}
170
89382c3d
KO
171static int try_bind(int socket, InetSocketAddress *saddr, struct addrinfo *e)
172{
173#ifndef IPV6_V6ONLY
174 return bind(socket, e->ai_addr, e->ai_addrlen);
175#else
176 /*
177 * Deals with first & last cases in matrix in comment
178 * for inet_ai_family_from_address().
179 */
180 int v6only =
181 ((!saddr->has_ipv4 && !saddr->has_ipv6) ||
182 (saddr->has_ipv4 && saddr->ipv4 &&
183 saddr->has_ipv6 && saddr->ipv6)) ? 0 : 1;
184 int stat;
185
186 rebind:
187 if (e->ai_family == PF_INET6) {
188 qemu_setsockopt(socket, IPPROTO_IPV6, IPV6_V6ONLY, &v6only,
189 sizeof(v6only));
190 }
191
192 stat = bind(socket, e->ai_addr, e->ai_addrlen);
193 if (!stat) {
194 return 0;
195 }
196
197 /* If we got EADDRINUSE from an IPv6 bind & v6only is unset,
198 * it could be that the IPv4 port is already claimed, so retry
199 * with v6only set
200 */
201 if (e->ai_family == PF_INET6 && errno == EADDRINUSE && !v6only) {
202 v6only = 1;
203 goto rebind;
204 }
205 return stat;
206#endif
207}
208
1856835d
DB
209static int inet_listen_saddr(InetSocketAddress *saddr,
210 int port_offset,
e5b6353c 211 int num,
1856835d 212 Error **errp)
d247d25f
AL
213{
214 struct addrinfo ai,*res,*e;
d247d25f
AL
215 char port[33];
216 char uaddr[INET6_ADDRSTRLEN+1];
217 char uport[33];
9cf961bb 218 int rc, port_min, port_max, p;
10a7b7e6 219 int slisten = -1;
9cf961bb
KO
220 int saved_errno = 0;
221 bool socket_created = false;
1856835d 222 Error *err = NULL;
d247d25f 223
aec21d31
VSO
224 if (saddr->keep_alive) {
225 error_setg(errp, "keep-alive option is not supported for passive "
226 "sockets");
227 return -1;
228 }
229
d247d25f 230 memset(&ai,0, sizeof(ai));
3de3d698 231 ai.ai_flags = AI_PASSIVE;
6979a813
DB
232 if (saddr->has_numeric && saddr->numeric) {
233 ai.ai_flags |= AI_NUMERICHOST | AI_NUMERICSERV;
234 }
1856835d 235 ai.ai_family = inet_ai_family_from_address(saddr, &err);
e5bc776f 236 ai.ai_socktype = SOCK_STREAM;
d247d25f 237
1856835d
DB
238 if (err) {
239 error_propagate(errp, err);
240 return -1;
241 }
242
243 if (saddr->host == NULL) {
0983f5e6 244 error_setg(errp, "host not specified");
e5bc776f 245 return -1;
d247d25f 246 }
1856835d
DB
247 if (saddr->port != NULL) {
248 pstrcpy(port, sizeof(port), saddr->port);
0983f5e6
DB
249 } else {
250 port[0] = '\0';
251 }
d247d25f
AL
252
253 /* lookup */
8bc89127
GH
254 if (port_offset) {
255 unsigned long long baseport;
0983f5e6
DB
256 if (strlen(port) == 0) {
257 error_setg(errp, "port not specified");
258 return -1;
259 }
8bc89127
GH
260 if (parse_uint_full(port, &baseport, 10) < 0) {
261 error_setg(errp, "can't convert to a number: %s", port);
262 return -1;
263 }
264 if (baseport > 65535 ||
265 baseport + port_offset > 65535) {
266 error_setg(errp, "port %s out of range", port);
267 return -1;
268 }
269 snprintf(port, sizeof(port), "%d", (int)baseport + port_offset);
270 }
1856835d 271 rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL,
0983f5e6 272 strlen(port) ? port : NULL, &ai, &res);
d247d25f 273 if (rc != 0) {
1856835d
DB
274 error_setg(errp, "address resolution failed for %s:%s: %s",
275 saddr->host, port, gai_strerror(rc));
d247d25f
AL
276 return -1;
277 }
d247d25f 278
9cf961bb 279 /* create socket + bind/listen */
d247d25f 280 for (e = res; e != NULL; e = e->ai_next) {
8bd1078a
DDAG
281#ifdef IPPROTO_MPTCP
282 if (saddr->has_mptcp && saddr->mptcp) {
283 e->ai_protocol = IPPROTO_MPTCP;
284 }
285#endif
39b6efc8 286 getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
7d37435b
PB
287 uaddr,INET6_ADDRSTRLEN,uport,32,
288 NI_NUMERICHOST | NI_NUMERICSERV);
39f80521 289
877691f9 290 port_min = inet_getport(e);
1856835d 291 port_max = saddr->has_to ? saddr->to + port_offset : port_min;
877691f9
MA
292 for (p = port_min; p <= port_max; p++) {
293 inet_setport(e, p);
10a7b7e6
DB
294
295 slisten = create_fast_reuse_socket(e);
296 if (slisten < 0) {
297 /* First time we expect we might fail to create the socket
298 * eg if 'e' has AF_INET6 but ipv6 kmod is not loaded.
299 * Later iterations should always succeed if first iteration
300 * worked though, so treat that as fatal.
301 */
302 if (p == port_min) {
9cf961bb
KO
303 continue;
304 } else {
10a7b7e6
DB
305 error_setg_errno(errp, errno,
306 "Failed to recreate failed listening socket");
9cf961bb 307 goto listen_failed;
029409e5 308 }
d247d25f 309 }
10a7b7e6
DB
310 socket_created = true;
311
312 rc = try_bind(slisten, saddr, e);
313 if (rc < 0) {
314 if (errno != EADDRINUSE) {
315 error_setg_errno(errp, errno, "Failed to bind socket");
316 goto listen_failed;
317 }
318 } else {
e5b6353c 319 if (!listen(slisten, num)) {
10a7b7e6
DB
320 goto listen_ok;
321 }
322 if (errno != EADDRINUSE) {
323 error_setg_errno(errp, errno, "Failed to listen on socket");
324 goto listen_failed;
325 }
9cf961bb
KO
326 }
327 /* Someone else managed to bind to the same port and beat us
328 * to listen on it! Socket semantics does not allow us to
329 * recover from this situation, so we need to recreate the
330 * socket to allow bind attempts for subsequent ports:
331 */
332 closesocket(slisten);
10a7b7e6 333 slisten = -1;
d247d25f 334 }
9cf961bb
KO
335 }
336 error_setg_errno(errp, errno,
337 socket_created ?
338 "Failed to find an available port" :
339 "Failed to create a socket");
340listen_failed:
341 saved_errno = errno;
342 if (slisten >= 0) {
d247d25f
AL
343 closesocket(slisten);
344 }
d247d25f 345 freeaddrinfo(res);
9cf961bb 346 errno = saved_errno;
d247d25f
AL
347 return -1;
348
9cf961bb 349listen_ok:
d247d25f
AL
350 freeaddrinfo(res);
351 return slisten;
352}
353
05bc1d8a
MT
354#ifdef _WIN32
355#define QEMU_SOCKET_RC_INPROGRESS(rc) \
356 ((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY)
357#else
358#define QEMU_SOCKET_RC_INPROGRESS(rc) \
359 ((rc) == -EINPROGRESS)
360#endif
361
dfc00eb7
DB
362static int inet_connect_addr(const InetSocketAddress *saddr,
363 struct addrinfo *addr, Error **errp)
233aa5c2
OW
364{
365 int sock, rc;
366
05bc1d8a
MT
367 sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
368 if (sock < 0) {
dfc00eb7
DB
369 error_setg_errno(errp, errno, "Failed to create socket family %d",
370 addr->ai_family);
05bc1d8a
MT
371 return -1;
372 }
04fd1c78 373 socket_set_fast_reuse(sock);
b2587932 374
05bc1d8a
MT
375 /* connect to peer */
376 do {
377 rc = 0;
378 if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) {
b16a44e1 379 rc = -errno;
05bc1d8a
MT
380 }
381 } while (rc == -EINTR);
382
b2587932 383 if (rc < 0) {
dfc00eb7
DB
384 error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
385 saddr->host, saddr->port);
05bc1d8a
MT
386 closesocket(sock);
387 return -1;
388 }
b2587932 389
05bc1d8a
MT
390 return sock;
391}
392
2942e420
DB
393static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr,
394 Error **errp)
05bc1d8a
MT
395{
396 struct addrinfo ai, *res;
397 int rc;
2942e420 398 Error *err = NULL;
340849a9 399 static int useV4Mapped = 1;
d247d25f 400
05bc1d8a 401 memset(&ai, 0, sizeof(ai));
233aa5c2 402
340849a9 403 ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
d73415a3 404 if (qatomic_read(&useV4Mapped)) {
340849a9
DB
405 ai.ai_flags |= AI_V4MAPPED;
406 }
2942e420 407 ai.ai_family = inet_ai_family_from_address(saddr, &err);
f4c94c7c 408 ai.ai_socktype = SOCK_STREAM;
d247d25f 409
2942e420
DB
410 if (err) {
411 error_propagate(errp, err);
05bc1d8a 412 return NULL;
d247d25f
AL
413 }
414
2942e420
DB
415 if (saddr->host == NULL || saddr->port == NULL) {
416 error_setg(errp, "host and/or port not specified");
417 return NULL;
05bc1d8a 418 }
d247d25f
AL
419
420 /* lookup */
2942e420 421 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
340849a9
DB
422
423 /* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but
424 * then don't implement it in their getaddrinfo(). Detect
8cc360b9 425 * this and retry without the flag since that's preferable
340849a9
DB
426 * to a fatal error
427 */
428 if (rc == EAI_BADFLAGS &&
429 (ai.ai_flags & AI_V4MAPPED)) {
d73415a3 430 qatomic_set(&useV4Mapped, 0);
340849a9
DB
431 ai.ai_flags &= ~AI_V4MAPPED;
432 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
433 }
05bc1d8a 434 if (rc != 0) {
2942e420
DB
435 error_setg(errp, "address resolution failed for %s:%s: %s",
436 saddr->host, saddr->port, gai_strerror(rc));
05bc1d8a
MT
437 return NULL;
438 }
439 return res;
440}
441
5db5f44c
OW
442/**
443 * Create a socket and connect it to an address.
444 *
2942e420 445 * @saddr: Inet socket address specification
5db5f44c
OW
446 * @errp: set on error
447 *
448 * Returns: -1 on error, file descriptor on success.
449 */
b2587932 450int inet_connect_saddr(InetSocketAddress *saddr, Error **errp)
05bc1d8a 451{
3f9286b7 452 Error *local_err = NULL;
05bc1d8a
MT
453 struct addrinfo *res, *e;
454 int sock = -1;
05bc1d8a 455
2942e420 456 res = inet_parse_connect_saddr(saddr, errp);
05bc1d8a
MT
457 if (!res) {
458 return -1;
459 }
460
d247d25f 461 for (e = res; e != NULL; e = e->ai_next) {
3f9286b7
MA
462 error_free(local_err);
463 local_err = NULL;
8bd1078a
DDAG
464
465#ifdef IPPROTO_MPTCP
466 if (saddr->has_mptcp && saddr->mptcp) {
467 e->ai_protocol = IPPROTO_MPTCP;
468 }
469#endif
470
dfc00eb7 471 sock = inet_connect_addr(saddr, e, &local_err);
3f9286b7 472 if (sock >= 0) {
05bc1d8a 473 break;
a6ba35b3 474 }
d247d25f 475 }
3f9286b7 476
da5e1169
VSO
477 freeaddrinfo(res);
478
3f9286b7
MA
479 if (sock < 0) {
480 error_propagate(errp, local_err);
da5e1169 481 return sock;
3f9286b7 482 }
b2587932 483
aec21d31
VSO
484 if (saddr->keep_alive) {
485 int val = 1;
486 int ret = qemu_setsockopt(sock, SOL_SOCKET, SO_KEEPALIVE,
487 &val, sizeof(val));
488
489 if (ret < 0) {
490 error_setg_errno(errp, errno, "Unable to set KEEPALIVE");
491 close(sock);
492 return -1;
493 }
494 }
495
05bc1d8a 496 return sock;
d247d25f
AL
497}
498
8b39910e
DB
499static int inet_dgram_saddr(InetSocketAddress *sraddr,
500 InetSocketAddress *sladdr,
501 Error **errp)
7e1b35b4
GH
502{
503 struct addrinfo ai, *peer = NULL, *local = NULL;
504 const char *addr;
505 const char *port;
7e1b35b4 506 int sock = -1, rc;
8b39910e 507 Error *err = NULL;
7e1b35b4
GH
508
509 /* lookup peer addr */
510 memset(&ai,0, sizeof(ai));
3de3d698 511 ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG;
8b39910e 512 ai.ai_family = inet_ai_family_from_address(sraddr, &err);
7e1b35b4
GH
513 ai.ai_socktype = SOCK_DGRAM;
514
8b39910e
DB
515 if (err) {
516 error_propagate(errp, err);
58c652c0 517 goto err;
8b39910e
DB
518 }
519
520 addr = sraddr->host;
521 port = sraddr->port;
7e1b35b4
GH
522 if (addr == NULL || strlen(addr) == 0) {
523 addr = "localhost";
524 }
525 if (port == NULL || strlen(port) == 0) {
4f085c82 526 error_setg(errp, "remote port not specified");
58c652c0 527 goto err;
7e1b35b4
GH
528 }
529
9cd1883c 530 if ((rc = getaddrinfo(addr, port, &ai, &peer)) != 0) {
4f085c82
PB
531 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
532 gai_strerror(rc));
26015051 533 goto err;
7e1b35b4 534 }
7e1b35b4
GH
535
536 /* lookup local addr */
537 memset(&ai,0, sizeof(ai));
538 ai.ai_flags = AI_PASSIVE;
539 ai.ai_family = peer->ai_family;
540 ai.ai_socktype = SOCK_DGRAM;
541
8b39910e
DB
542 if (sladdr) {
543 addr = sladdr->host;
544 port = sladdr->port;
545 if (addr == NULL || strlen(addr) == 0) {
546 addr = NULL;
547 }
548 if (!port || strlen(port) == 0) {
549 port = "0";
550 }
551 } else {
7e1b35b4 552 addr = NULL;
7e1b35b4 553 port = "0";
8b39910e 554 }
7e1b35b4 555
9cd1883c 556 if ((rc = getaddrinfo(addr, port, &ai, &local)) != 0) {
4f085c82
PB
557 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
558 gai_strerror(rc));
39b38459 559 goto err;
7e1b35b4 560 }
7e1b35b4
GH
561
562 /* create socket */
40ff6d7e 563 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol);
7e1b35b4 564 if (sock < 0) {
dfc00eb7
DB
565 error_setg_errno(errp, errno, "Failed to create socket family %d",
566 peer->ai_family);
7e1b35b4
GH
567 goto err;
568 }
04fd1c78 569 socket_set_fast_reuse(sock);
7e1b35b4
GH
570
571 /* bind socket */
7e1b35b4 572 if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) {
235256a2 573 error_setg_errno(errp, errno, "Failed to bind socket");
7e1b35b4
GH
574 goto err;
575 }
576
577 /* connect to peer */
7e1b35b4 578 if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) {
dfc00eb7
DB
579 error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
580 addr, port);
7e1b35b4
GH
581 goto err;
582 }
583
584 freeaddrinfo(local);
585 freeaddrinfo(peer);
586 return sock;
587
588err:
26015051 589 if (sock != -1) {
7e1b35b4 590 closesocket(sock);
26015051
C
591 }
592 if (local) {
7e1b35b4 593 freeaddrinfo(local);
26015051
C
594 }
595 if (peer) {
7e1b35b4 596 freeaddrinfo(peer);
26015051
C
597 }
598
7e1b35b4
GH
599 return -1;
600}
601
f4c94c7c 602/* compatibility wrapper */
3e32370a
DB
603static int inet_parse_flag(const char *flagname, const char *optstr, bool *val,
604 Error **errp)
605{
606 char *end;
607 size_t len;
608
609 end = strstr(optstr, ",");
610 if (end) {
611 if (end[1] == ',') { /* Reject 'ipv6=on,,foo' */
612 error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
613 return -1;
614 }
615 len = end - optstr;
616 } else {
617 len = strlen(optstr);
618 }
619 if (len == 0 || (len == 3 && strncmp(optstr, "=on", len) == 0)) {
620 *val = true;
621 } else if (len == 4 && strncmp(optstr, "=off", len) == 0) {
622 *val = false;
623 } else {
624 error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
625 return -1;
626 }
627 return 0;
628}
629
0785bd7a 630int inet_parse(InetSocketAddress *addr, const char *str, Error **errp)
f4c94c7c
GH
631{
632 const char *optstr, *h;
55a10996 633 char host[65];
f4c94c7c 634 char port[33];
879e45c7 635 int to;
f4c94c7c 636 int pos;
3e32370a 637 char *begin;
f4c94c7c 638
0785bd7a 639 memset(addr, 0, sizeof(*addr));
879e45c7 640
f4c94c7c
GH
641 /* parse address */
642 if (str[0] == ':') {
643 /* no host given */
879e45c7 644 host[0] = '\0';
9cd1883c 645 if (sscanf(str, ":%32[^,]%n", port, &pos) != 1) {
2f002c43 646 error_setg(errp, "error parsing port in address '%s'", str);
0785bd7a 647 return -1;
f4c94c7c
GH
648 }
649 } else if (str[0] == '[') {
650 /* IPv6 addr */
9cd1883c 651 if (sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 652 error_setg(errp, "error parsing IPv6 address '%s'", str);
0785bd7a 653 return -1;
f4c94c7c 654 }
f4c94c7c 655 } else {
391b7b97 656 /* hostname or IPv4 addr */
9cd1883c 657 if (sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 658 error_setg(errp, "error parsing address '%s'", str);
0785bd7a 659 return -1;
f4c94c7c
GH
660 }
661 }
879e45c7
PB
662
663 addr->host = g_strdup(host);
664 addr->port = g_strdup(port);
f4c94c7c
GH
665
666 /* parse options */
667 optstr = str + pos;
668 h = strstr(optstr, ",to=");
879e45c7 669 if (h) {
1ccbc285
AP
670 h += 4;
671 if (sscanf(h, "%d%n", &to, &pos) != 1 ||
672 (h[pos] != '\0' && h[pos] != ',')) {
879e45c7 673 error_setg(errp, "error parsing to= argument");
0785bd7a 674 return -1;
879e45c7
PB
675 }
676 addr->has_to = true;
677 addr->to = to;
678 }
3e32370a
DB
679 begin = strstr(optstr, ",ipv4");
680 if (begin) {
681 if (inet_parse_flag("ipv4", begin + 5, &addr->ipv4, errp) < 0) {
682 return -1;
683 }
684 addr->has_ipv4 = true;
879e45c7 685 }
3e32370a
DB
686 begin = strstr(optstr, ",ipv6");
687 if (begin) {
688 if (inet_parse_flag("ipv6", begin + 5, &addr->ipv6, errp) < 0) {
689 return -1;
690 }
691 addr->has_ipv6 = true;
879e45c7 692 }
aec21d31
VSO
693 begin = strstr(optstr, ",keep-alive");
694 if (begin) {
695 if (inet_parse_flag("keep-alive", begin + strlen(",keep-alive"),
696 &addr->keep_alive, errp) < 0)
697 {
698 return -1;
699 }
700 addr->has_keep_alive = true;
701 }
8bd1078a
DDAG
702#ifdef IPPROTO_MPTCP
703 begin = strstr(optstr, ",mptcp");
704 if (begin) {
705 if (inet_parse_flag("mptcp", begin + strlen(",mptcp"),
706 &addr->mptcp, errp) < 0)
707 {
708 return -1;
709 }
710 addr->has_mptcp = true;
711 }
712#endif
0785bd7a 713 return 0;
879e45c7
PB
714}
715
e5bc776f 716
5db5f44c
OW
717/**
718 * Create a blocking socket and connect it to an address.
719 *
720 * @str: address string
721 * @errp: set in case of an error
722 *
723 * Returns -1 in case of error, file descriptor on success
724 **/
725int inet_connect(const char *str, Error **errp)
f4c94c7c 726{
f4c94c7c 727 int sock = -1;
0785bd7a 728 InetSocketAddress *addr = g_new(InetSocketAddress, 1);
f4c94c7c 729
0785bd7a 730 if (!inet_parse(addr, str, errp)) {
b2587932 731 sock = inet_connect_saddr(addr, errp);
5db5f44c 732 }
0785bd7a 733 qapi_free_InetSocketAddress(addr);
5db5f44c
OW
734 return sock;
735}
736
6a02c806
SH
737#ifdef CONFIG_AF_VSOCK
738static bool vsock_parse_vaddr_to_sockaddr(const VsockSocketAddress *vaddr,
739 struct sockaddr_vm *svm,
740 Error **errp)
741{
742 unsigned long long val;
743
744 memset(svm, 0, sizeof(*svm));
745 svm->svm_family = AF_VSOCK;
746
747 if (parse_uint_full(vaddr->cid, &val, 10) < 0 ||
748 val > UINT32_MAX) {
749 error_setg(errp, "Failed to parse cid '%s'", vaddr->cid);
750 return false;
751 }
752 svm->svm_cid = val;
753
754 if (parse_uint_full(vaddr->port, &val, 10) < 0 ||
755 val > UINT32_MAX) {
756 error_setg(errp, "Failed to parse port '%s'", vaddr->port);
757 return false;
758 }
759 svm->svm_port = val;
760
761 return true;
762}
763
dfc00eb7
DB
764static int vsock_connect_addr(const VsockSocketAddress *vaddr,
765 const struct sockaddr_vm *svm, Error **errp)
6a02c806
SH
766{
767 int sock, rc;
768
6a02c806
SH
769 sock = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
770 if (sock < 0) {
dfc00eb7
DB
771 error_setg_errno(errp, errno, "Failed to create socket family %d",
772 AF_VSOCK);
6a02c806
SH
773 return -1;
774 }
b2587932 775
6a02c806
SH
776 /* connect to peer */
777 do {
778 rc = 0;
779 if (connect(sock, (const struct sockaddr *)svm, sizeof(*svm)) < 0) {
780 rc = -errno;
781 }
782 } while (rc == -EINTR);
783
b2587932 784 if (rc < 0) {
dfc00eb7
DB
785 error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
786 vaddr->cid, vaddr->port);
6a02c806
SH
787 closesocket(sock);
788 return -1;
789 }
b2587932 790
6a02c806
SH
791 return sock;
792}
793
b2587932 794static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
6a02c806
SH
795{
796 struct sockaddr_vm svm;
6a02c806
SH
797
798 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
799 return -1;
800 }
801
dfc00eb7 802 return vsock_connect_addr(vaddr, &svm, errp);
6a02c806
SH
803}
804
805static int vsock_listen_saddr(VsockSocketAddress *vaddr,
e5b6353c 806 int num,
6a02c806
SH
807 Error **errp)
808{
809 struct sockaddr_vm svm;
810 int slisten;
811
812 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
813 return -1;
814 }
815
816 slisten = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
817 if (slisten < 0) {
818 error_setg_errno(errp, errno, "Failed to create socket");
819 return -1;
820 }
821
822 if (bind(slisten, (const struct sockaddr *)&svm, sizeof(svm)) != 0) {
823 error_setg_errno(errp, errno, "Failed to bind socket");
824 closesocket(slisten);
825 return -1;
826 }
827
e5b6353c 828 if (listen(slisten, num) != 0) {
6a02c806
SH
829 error_setg_errno(errp, errno, "Failed to listen on socket");
830 closesocket(slisten);
831 return -1;
832 }
833 return slisten;
834}
835
4db5c619
MA
836static int vsock_parse(VsockSocketAddress *addr, const char *str,
837 Error **errp)
6a02c806 838{
6a02c806
SH
839 char cid[33];
840 char port[33];
841 int n;
842
843 if (sscanf(str, "%32[^:]:%32[^,]%n", cid, port, &n) != 2) {
844 error_setg(errp, "error parsing address '%s'", str);
4db5c619 845 return -1;
6a02c806
SH
846 }
847 if (str[n] != '\0') {
848 error_setg(errp, "trailing characters in address '%s'", str);
4db5c619 849 return -1;
6a02c806
SH
850 }
851
6a02c806
SH
852 addr->cid = g_strdup(cid);
853 addr->port = g_strdup(port);
4db5c619 854 return 0;
6a02c806
SH
855}
856#else
857static void vsock_unsupported(Error **errp)
858{
859 error_setg(errp, "socket family AF_VSOCK unsupported");
860}
861
b2587932 862static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
6a02c806
SH
863{
864 vsock_unsupported(errp);
865 return -1;
866}
867
868static int vsock_listen_saddr(VsockSocketAddress *vaddr,
e5b6353c 869 int num,
6a02c806
SH
870 Error **errp)
871{
872 vsock_unsupported(errp);
873 return -1;
874}
875
4db5c619
MA
876static int vsock_parse(VsockSocketAddress *addr, const char *str,
877 Error **errp)
6a02c806
SH
878{
879 vsock_unsupported(errp);
4db5c619 880 return -1;
6a02c806
SH
881}
882#endif /* CONFIG_AF_VSOCK */
883
d247d25f
AL
884#ifndef _WIN32
885
8acefc79
MA
886static bool saddr_is_abstract(UnixSocketAddress *saddr)
887{
888#ifdef CONFIG_LINUX
889 return saddr->abstract;
890#else
891 return false;
892#endif
893}
894
895static bool saddr_is_tight(UnixSocketAddress *saddr)
896{
897#ifdef CONFIG_LINUX
898 return !saddr->has_tight || saddr->tight;
899#else
900 return false;
901#endif
902}
903
1856835d 904static int unix_listen_saddr(UnixSocketAddress *saddr,
e5b6353c 905 int num,
1856835d 906 Error **errp)
d247d25f 907{
8acefc79 908 bool abstract = saddr_is_abstract(saddr);
d247d25f 909 struct sockaddr_un un;
62b6adfb 910 int sock, fd;
ad9579aa
DB
911 char *pathbuf = NULL;
912 const char *path;
2d2023c3 913 size_t pathlen;
776b97d3 914 size_t addrlen;
d247d25f 915
40ff6d7e 916 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 917 if (sock < 0) {
b658c53d 918 error_setg_errno(errp, errno, "Failed to create Unix socket");
39b6efc8 919 return -1;
d247d25f
AL
920 }
921
8acefc79 922 if (saddr->path[0] || abstract) {
ad9579aa 923 path = saddr->path;
d247d25f 924 } else {
b658c53d
PB
925 const char *tmpdir = getenv("TMPDIR");
926 tmpdir = tmpdir ? tmpdir : "/tmp";
ad9579aa
DB
927 path = pathbuf = g_strdup_printf("%s/qemu-socket-XXXXXX", tmpdir);
928 }
b658c53d 929
2d2023c3 930 pathlen = strlen(path);
776b97d3 931 if (pathlen > sizeof(un.sun_path) ||
8acefc79 932 (abstract && pathlen > (sizeof(un.sun_path) - 1))) {
ad9579aa
DB
933 error_setg(errp, "UNIX socket path '%s' is too long", path);
934 error_append_hint(errp, "Path must be less than %zu bytes\n",
8acefc79 935 abstract ? sizeof(un.sun_path) - 1 :
ad9579aa
DB
936 sizeof(un.sun_path));
937 goto err;
938 }
939
940 if (pathbuf != NULL) {
d247d25f
AL
941 /*
942 * This dummy fd usage silences the mktemp() unsecure warning.
943 * Using mkstemp() doesn't make things more secure here
944 * though. bind() complains about existing files, so we have
945 * to unlink first and thus re-open the race window. The
946 * worst case possible is bind() failing, i.e. a DoS attack.
947 */
ad9579aa 948 fd = mkstemp(pathbuf);
b658c53d
PB
949 if (fd < 0) {
950 error_setg_errno(errp, errno,
ad9579aa 951 "Failed to make a temporary socket %s", pathbuf);
b658c53d
PB
952 goto err;
953 }
954 close(fd);
d247d25f 955 }
d247d25f 956
8acefc79 957 if (!abstract && unlink(path) < 0 && errno != ENOENT) {
0ef705a2 958 error_setg_errno(errp, errno,
ad9579aa 959 "Failed to unlink socket %s", path);
0ef705a2
CR
960 goto err;
961 }
ad9579aa
DB
962
963 memset(&un, 0, sizeof(un));
964 un.sun_family = AF_UNIX;
776b97d3 965 addrlen = sizeof(un);
ad9579aa 966
8acefc79 967 if (abstract) {
776b97d3
XZ
968 un.sun_path[0] = '\0';
969 memcpy(&un.sun_path[1], path, pathlen);
8acefc79 970 if (saddr_is_tight(saddr)) {
776b97d3
XZ
971 addrlen = offsetof(struct sockaddr_un, sun_path) + 1 + pathlen;
972 }
973 } else {
974 memcpy(un.sun_path, path, pathlen);
975 }
976
977 if (bind(sock, (struct sockaddr *) &un, addrlen) < 0) {
56382bd5 978 error_setg_errno(errp, errno, "Failed to bind socket to %s", path);
d247d25f
AL
979 goto err;
980 }
e5b6353c 981 if (listen(sock, num) < 0) {
235256a2 982 error_setg_errno(errp, errno, "Failed to listen on socket");
d247d25f
AL
983 goto err;
984 }
985
62473511 986 g_free(pathbuf);
d247d25f
AL
987 return sock;
988
989err:
ad9579aa 990 g_free(pathbuf);
d247d25f
AL
991 closesocket(sock);
992 return -1;
993}
994
b2587932 995static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
d247d25f 996{
8acefc79 997 bool abstract = saddr_is_abstract(saddr);
d247d25f 998 struct sockaddr_un un;
1fc05adf 999 int sock, rc;
2d2023c3 1000 size_t pathlen;
776b97d3 1001 size_t addrlen;
d247d25f 1002
2942e420 1003 if (saddr->path == NULL) {
312fd5f2 1004 error_setg(errp, "unix connect: no path specified");
2af2bf67
GH
1005 return -1;
1006 }
1007
40ff6d7e 1008 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 1009 if (sock < 0) {
235256a2 1010 error_setg_errno(errp, errno, "Failed to create socket");
39b6efc8 1011 return -1;
d247d25f
AL
1012 }
1013
2d2023c3 1014 pathlen = strlen(saddr->path);
776b97d3 1015 if (pathlen > sizeof(un.sun_path) ||
8acefc79 1016 (abstract && pathlen > (sizeof(un.sun_path) - 1))) {
ad9579aa
DB
1017 error_setg(errp, "UNIX socket path '%s' is too long", saddr->path);
1018 error_append_hint(errp, "Path must be less than %zu bytes\n",
8acefc79 1019 abstract ? sizeof(un.sun_path) - 1 :
ad9579aa
DB
1020 sizeof(un.sun_path));
1021 goto err;
1022 }
1023
d247d25f
AL
1024 memset(&un, 0, sizeof(un));
1025 un.sun_family = AF_UNIX;
776b97d3 1026 addrlen = sizeof(un);
1fc05adf 1027
8acefc79 1028 if (abstract) {
776b97d3
XZ
1029 un.sun_path[0] = '\0';
1030 memcpy(&un.sun_path[1], saddr->path, pathlen);
8acefc79 1031 if (saddr_is_tight(saddr)) {
776b97d3
XZ
1032 addrlen = offsetof(struct sockaddr_un, sun_path) + 1 + pathlen;
1033 }
1034 } else {
1035 memcpy(un.sun_path, saddr->path, pathlen);
1036 }
1fc05adf
PB
1037 /* connect to peer */
1038 do {
1039 rc = 0;
776b97d3 1040 if (connect(sock, (struct sockaddr *) &un, addrlen) < 0) {
b16a44e1 1041 rc = -errno;
1fc05adf
PB
1042 }
1043 } while (rc == -EINTR);
1044
1fc05adf 1045 if (rc < 0) {
dfc00eb7 1046 error_setg_errno(errp, -rc, "Failed to connect to '%s'",
ad9579aa
DB
1047 saddr->path);
1048 goto err;
d247d25f
AL
1049 }
1050
d247d25f 1051 return sock;
ad9579aa
DB
1052
1053 err:
1054 close(sock);
ad9579aa 1055 return -1;
d247d25f
AL
1056}
1057
0c814709
PB
1058#else
1059
1856835d 1060static int unix_listen_saddr(UnixSocketAddress *saddr,
e5b6353c 1061 int num,
1856835d 1062 Error **errp)
0c814709 1063{
58899664 1064 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
1065 errno = ENOTSUP;
1066 return -1;
1067}
1068
b2587932 1069static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
0c814709 1070{
58899664 1071 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
1072 errno = ENOTSUP;
1073 return -1;
1074}
1075#endif
1076
2af2bf67 1077/* compatibility wrapper */
62473511 1078int unix_listen(const char *str, Error **errp)
62b6adfb 1079{
1856835d 1080 UnixSocketAddress *saddr;
caf88d74 1081 int sock;
62b6adfb 1082
1856835d 1083 saddr = g_new0(UnixSocketAddress, 1);
caf88d74 1084 saddr->path = g_strdup(str);
e5b6353c 1085 sock = unix_listen_saddr(saddr, 1, errp);
1856835d 1086 qapi_free_UnixSocketAddress(saddr);
62b6adfb
GH
1087 return sock;
1088}
1089
7fc4e63e 1090int unix_connect(const char *path, Error **errp)
2af2bf67 1091{
2942e420 1092 UnixSocketAddress *saddr;
2af2bf67
GH
1093 int sock;
1094
2942e420
DB
1095 saddr = g_new0(UnixSocketAddress, 1);
1096 saddr->path = g_strdup(path);
b2587932 1097 sock = unix_connect_saddr(saddr, errp);
2942e420 1098 qapi_free_UnixSocketAddress(saddr);
1fc05adf
PB
1099 return sock;
1100}
1101
1102
bd269ebc 1103SocketAddress *socket_parse(const char *str, Error **errp)
101f9cbc 1104{
bd269ebc 1105 SocketAddress *addr;
101f9cbc 1106
bd269ebc 1107 addr = g_new0(SocketAddress, 1);
101f9cbc
PB
1108 if (strstart(str, "unix:", NULL)) {
1109 if (str[5] == '\0') {
312fd5f2 1110 error_setg(errp, "invalid Unix socket address");
101f9cbc
PB
1111 goto fail;
1112 } else {
bd269ebc
MA
1113 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1114 addr->u.q_unix.path = g_strdup(str + 5);
101f9cbc
PB
1115 }
1116 } else if (strstart(str, "fd:", NULL)) {
1117 if (str[3] == '\0') {
312fd5f2 1118 error_setg(errp, "invalid file descriptor address");
101f9cbc
PB
1119 goto fail;
1120 } else {
bd269ebc
MA
1121 addr->type = SOCKET_ADDRESS_TYPE_FD;
1122 addr->u.fd.str = g_strdup(str + 3);
101f9cbc 1123 }
6a02c806 1124 } else if (strstart(str, "vsock:", NULL)) {
bd269ebc
MA
1125 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1126 if (vsock_parse(&addr->u.vsock, str + strlen("vsock:"), errp)) {
6a02c806
SH
1127 goto fail;
1128 }
101f9cbc 1129 } else {
bd269ebc
MA
1130 addr->type = SOCKET_ADDRESS_TYPE_INET;
1131 if (inet_parse(&addr->u.inet, str, errp)) {
101f9cbc
PB
1132 goto fail;
1133 }
1134 }
1135 return addr;
1136
1137fail:
bd269ebc 1138 qapi_free_SocketAddress(addr);
101f9cbc
PB
1139 return NULL;
1140}
1141
37179e9e 1142static int socket_get_fd(const char *fdstr, Error **errp)
30bdb3c5 1143{
947e4744 1144 Monitor *cur_mon = monitor_cur();
1723d6b1
DB
1145 int fd;
1146 if (cur_mon) {
1147 fd = monitor_get_fd(cur_mon, fdstr, errp);
1148 if (fd < 0) {
1149 return -1;
1150 }
1151 } else {
1152 if (qemu_strtoi(fdstr, NULL, 10, &fd) < 0) {
1153 error_setg_errno(errp, errno,
1154 "Unable to parse FD number %s",
1155 fdstr);
1156 return -1;
1157 }
30bdb3c5
DB
1158 }
1159 if (!fd_is_socket(fd)) {
1160 error_setg(errp, "File descriptor '%s' is not a socket", fdstr);
1161 close(fd);
1162 return -1;
1163 }
1164 return fd;
1165}
1166
c5423704
VSO
1167int socket_address_parse_named_fd(SocketAddress *addr, Error **errp)
1168{
1169 int fd;
1170
1171 if (addr->type != SOCKET_ADDRESS_TYPE_FD) {
1172 return 0;
1173 }
1174
1175 fd = socket_get_fd(addr->u.fd.str, errp);
1176 if (fd < 0) {
1177 return fd;
1178 }
1179
1180 g_free(addr->u.fd.str);
1181 addr->u.fd.str = g_strdup_printf("%d", fd);
1182
1183 return 0;
1184}
1185
b2587932 1186int socket_connect(SocketAddress *addr, Error **errp)
101f9cbc 1187{
101f9cbc
PB
1188 int fd;
1189
2d32adda 1190 switch (addr->type) {
bd269ebc 1191 case SOCKET_ADDRESS_TYPE_INET:
b2587932 1192 fd = inet_connect_saddr(&addr->u.inet, errp);
101f9cbc
PB
1193 break;
1194
bd269ebc 1195 case SOCKET_ADDRESS_TYPE_UNIX:
b2587932 1196 fd = unix_connect_saddr(&addr->u.q_unix, errp);
101f9cbc
PB
1197 break;
1198
bd269ebc 1199 case SOCKET_ADDRESS_TYPE_FD:
37179e9e 1200 fd = socket_get_fd(addr->u.fd.str, errp);
101f9cbc
PB
1201 break;
1202
bd269ebc 1203 case SOCKET_ADDRESS_TYPE_VSOCK:
b2587932 1204 fd = vsock_connect_saddr(&addr->u.vsock, errp);
6a02c806
SH
1205 break;
1206
101f9cbc
PB
1207 default:
1208 abort();
1209 }
101f9cbc
PB
1210 return fd;
1211}
1212
e5b6353c 1213int socket_listen(SocketAddress *addr, int num, Error **errp)
101f9cbc 1214{
101f9cbc
PB
1215 int fd;
1216
e5b6353c 1217 trace_socket_listen(num);
2d32adda 1218 switch (addr->type) {
bd269ebc 1219 case SOCKET_ADDRESS_TYPE_INET:
e5b6353c 1220 fd = inet_listen_saddr(&addr->u.inet, 0, num, errp);
101f9cbc
PB
1221 break;
1222
bd269ebc 1223 case SOCKET_ADDRESS_TYPE_UNIX:
e5b6353c 1224 fd = unix_listen_saddr(&addr->u.q_unix, num, errp);
101f9cbc
PB
1225 break;
1226
bd269ebc 1227 case SOCKET_ADDRESS_TYPE_FD:
37179e9e
SH
1228 fd = socket_get_fd(addr->u.fd.str, errp);
1229 if (fd < 0) {
1230 return -1;
1231 }
1232
1233 /*
1234 * If the socket is not yet in the listen state, then transition it to
1235 * the listen state now.
1236 *
1237 * If it's already listening then this updates the backlog value as
1238 * requested.
1239 *
1240 * If this socket cannot listen because it's already in another state
1241 * (e.g. unbound or connected) then we'll catch the error here.
1242 */
1243 if (listen(fd, num) != 0) {
1244 error_setg_errno(errp, errno, "Failed to listen on fd socket");
1245 closesocket(fd);
1246 return -1;
1247 }
101f9cbc
PB
1248 break;
1249
bd269ebc 1250 case SOCKET_ADDRESS_TYPE_VSOCK:
e5b6353c 1251 fd = vsock_listen_saddr(&addr->u.vsock, num, errp);
6a02c806
SH
1252 break;
1253
101f9cbc
PB
1254 default:
1255 abort();
1256 }
101f9cbc
PB
1257 return fd;
1258}
1259
74b6ce43
MAL
1260void socket_listen_cleanup(int fd, Error **errp)
1261{
bd269ebc 1262 SocketAddress *addr;
74b6ce43
MAL
1263
1264 addr = socket_local_address(fd, errp);
2d7ad7c0
DB
1265 if (!addr) {
1266 return;
1267 }
74b6ce43 1268
bd269ebc
MA
1269 if (addr->type == SOCKET_ADDRESS_TYPE_UNIX
1270 && addr->u.q_unix.path) {
1271 if (unlink(addr->u.q_unix.path) < 0 && errno != ENOENT) {
74b6ce43
MAL
1272 error_setg_errno(errp, errno,
1273 "Failed to unlink socket %s",
bd269ebc 1274 addr->u.q_unix.path);
74b6ce43
MAL
1275 }
1276 }
1277
bd269ebc 1278 qapi_free_SocketAddress(addr);
74b6ce43
MAL
1279}
1280
bd269ebc 1281int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp)
3ecc059d 1282{
3ecc059d
GH
1283 int fd;
1284
ca0b64e5 1285 /*
bd269ebc 1286 * TODO SOCKET_ADDRESS_TYPE_FD when fd is AF_INET or AF_INET6
ca0b64e5
MA
1287 * (although other address families can do SOCK_DGRAM, too)
1288 */
2d32adda 1289 switch (remote->type) {
bd269ebc
MA
1290 case SOCKET_ADDRESS_TYPE_INET:
1291 fd = inet_dgram_saddr(&remote->u.inet,
1292 local ? &local->u.inet : NULL, errp);
3ecc059d
GH
1293 break;
1294
1295 default:
1296 error_setg(errp, "socket type unsupported for datagram");
7a5b6af1 1297 fd = -1;
3ecc059d 1298 }
3ecc059d
GH
1299 return fd;
1300}
17c55dec
DB
1301
1302
bd269ebc 1303static SocketAddress *
17c55dec
DB
1304socket_sockaddr_to_address_inet(struct sockaddr_storage *sa,
1305 socklen_t salen,
1306 Error **errp)
1307{
1308 char host[NI_MAXHOST];
1309 char serv[NI_MAXSERV];
bd269ebc 1310 SocketAddress *addr;
0399293e 1311 InetSocketAddress *inet;
17c55dec
DB
1312 int ret;
1313
1314 ret = getnameinfo((struct sockaddr *)sa, salen,
1315 host, sizeof(host),
1316 serv, sizeof(serv),
1317 NI_NUMERICHOST | NI_NUMERICSERV);
1318 if (ret != 0) {
1319 error_setg(errp, "Cannot format numeric socket address: %s",
1320 gai_strerror(ret));
1321 return NULL;
1322 }
1323
bd269ebc
MA
1324 addr = g_new0(SocketAddress, 1);
1325 addr->type = SOCKET_ADDRESS_TYPE_INET;
1326 inet = &addr->u.inet;
0399293e
EB
1327 inet->host = g_strdup(host);
1328 inet->port = g_strdup(serv);
17c55dec 1329 if (sa->ss_family == AF_INET) {
0399293e 1330 inet->has_ipv4 = inet->ipv4 = true;
17c55dec 1331 } else {
0399293e 1332 inet->has_ipv6 = inet->ipv6 = true;
17c55dec
DB
1333 }
1334
1335 return addr;
1336}
1337
1338
1339#ifndef WIN32
bd269ebc 1340static SocketAddress *
17c55dec
DB
1341socket_sockaddr_to_address_unix(struct sockaddr_storage *sa,
1342 socklen_t salen,
1343 Error **errp)
1344{
bd269ebc 1345 SocketAddress *addr;
17c55dec
DB
1346 struct sockaddr_un *su = (struct sockaddr_un *)sa;
1347
4cfd970e
MAL
1348 assert(salen >= sizeof(su->sun_family) + 1 &&
1349 salen <= sizeof(struct sockaddr_un));
1350
bd269ebc
MA
1351 addr = g_new0(SocketAddress, 1);
1352 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
3b14b4ec
MA
1353#ifdef CONFIG_LINUX
1354 if (!su->sun_path[0]) {
1355 /* Linux abstract socket */
1356 addr->u.q_unix.path = g_strndup(su->sun_path + 1,
4cfd970e 1357 salen - sizeof(su->sun_family) - 1);
3b14b4ec
MA
1358 addr->u.q_unix.has_abstract = true;
1359 addr->u.q_unix.abstract = true;
1360 addr->u.q_unix.has_tight = true;
1361 addr->u.q_unix.tight = salen < sizeof(*su);
1362 return addr;
17c55dec 1363 }
3b14b4ec 1364#endif
17c55dec 1365
3b14b4ec 1366 addr->u.q_unix.path = g_strndup(su->sun_path, sizeof(su->sun_path));
17c55dec
DB
1367 return addr;
1368}
1369#endif /* WIN32 */
1370
6a02c806 1371#ifdef CONFIG_AF_VSOCK
bd269ebc 1372static SocketAddress *
6a02c806
SH
1373socket_sockaddr_to_address_vsock(struct sockaddr_storage *sa,
1374 socklen_t salen,
1375 Error **errp)
1376{
bd269ebc 1377 SocketAddress *addr;
6a02c806
SH
1378 VsockSocketAddress *vaddr;
1379 struct sockaddr_vm *svm = (struct sockaddr_vm *)sa;
1380
bd269ebc
MA
1381 addr = g_new0(SocketAddress, 1);
1382 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1383 vaddr = &addr->u.vsock;
6a02c806
SH
1384 vaddr->cid = g_strdup_printf("%u", svm->svm_cid);
1385 vaddr->port = g_strdup_printf("%u", svm->svm_port);
1386
1387 return addr;
1388}
1389#endif /* CONFIG_AF_VSOCK */
1390
bd269ebc 1391SocketAddress *
17c55dec
DB
1392socket_sockaddr_to_address(struct sockaddr_storage *sa,
1393 socklen_t salen,
1394 Error **errp)
1395{
1396 switch (sa->ss_family) {
1397 case AF_INET:
1398 case AF_INET6:
1399 return socket_sockaddr_to_address_inet(sa, salen, errp);
1400
1401#ifndef WIN32
1402 case AF_UNIX:
1403 return socket_sockaddr_to_address_unix(sa, salen, errp);
1404#endif /* WIN32 */
1405
6a02c806
SH
1406#ifdef CONFIG_AF_VSOCK
1407 case AF_VSOCK:
1408 return socket_sockaddr_to_address_vsock(sa, salen, errp);
1409#endif
1410
17c55dec
DB
1411 default:
1412 error_setg(errp, "socket family %d unsupported",
1413 sa->ss_family);
1414 return NULL;
1415 }
1416 return 0;
1417}
1418
1419
bd269ebc 1420SocketAddress *socket_local_address(int fd, Error **errp)
17c55dec
DB
1421{
1422 struct sockaddr_storage ss;
1423 socklen_t sslen = sizeof(ss);
1424
1425 if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1426 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1427 "Unable to query local socket address");
1428 return NULL;
1429 }
1430
1431 return socket_sockaddr_to_address(&ss, sslen, errp);
1432}
1433
1434
bd269ebc 1435SocketAddress *socket_remote_address(int fd, Error **errp)
17c55dec
DB
1436{
1437 struct sockaddr_storage ss;
1438 socklen_t sslen = sizeof(ss);
1439
1440 if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1441 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1442 "Unable to query remote socket address");
1443 return NULL;
1444 }
1445
1446 return socket_sockaddr_to_address(&ss, sslen, errp);
1447}
2a8e21c7 1448
216411b8 1449
bd269ebc
MA
1450SocketAddress *socket_address_flatten(SocketAddressLegacy *addr_legacy)
1451{
fc0f0059 1452 SocketAddress *addr;
bd269ebc
MA
1453
1454 if (!addr_legacy) {
1455 return NULL;
1456 }
1457
fc0f0059
MA
1458 addr = g_new(SocketAddress, 1);
1459
bd269ebc
MA
1460 switch (addr_legacy->type) {
1461 case SOCKET_ADDRESS_LEGACY_KIND_INET:
1462 addr->type = SOCKET_ADDRESS_TYPE_INET;
1463 QAPI_CLONE_MEMBERS(InetSocketAddress, &addr->u.inet,
1464 addr_legacy->u.inet.data);
1465 break;
1466 case SOCKET_ADDRESS_LEGACY_KIND_UNIX:
1467 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1468 QAPI_CLONE_MEMBERS(UnixSocketAddress, &addr->u.q_unix,
1469 addr_legacy->u.q_unix.data);
1470 break;
1471 case SOCKET_ADDRESS_LEGACY_KIND_VSOCK:
1472 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1473 QAPI_CLONE_MEMBERS(VsockSocketAddress, &addr->u.vsock,
1474 addr_legacy->u.vsock.data);
1475 break;
1476 case SOCKET_ADDRESS_LEGACY_KIND_FD:
1477 addr->type = SOCKET_ADDRESS_TYPE_FD;
1478 QAPI_CLONE_MEMBERS(String, &addr->u.fd, addr_legacy->u.fd.data);
1479 break;
1480 default:
1481 abort();
1482 }
1483
1484 return addr;
1485}