]> git.proxmox.com Git - mirror_qemu.git/blame - util/qemu-sockets.c
sockets: Bypass "replace empty @path" for abstract unix sockets
[mirror_qemu.git] / util / qemu-sockets.c
CommitLineData
305b0eb2
AL
1/*
2 * inet and unix socket functions for qemu
3 *
4 * (c) 2008 Gerd Hoffmann <kraxel@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 of the License.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
e6d91ab6
PB
14 *
15 * Contributions after 2012-01-13 are licensed under the terms of the
16 * GNU GPL, version 2 or (at your option) any later version.
305b0eb2 17 */
aafd7584 18#include "qemu/osdep.h"
d247d25f 19
6a02c806
SH
20#ifdef CONFIG_AF_VSOCK
21#include <linux/vm_sockets.h>
22#endif /* CONFIG_AF_VSOCK */
23
a8d25326 24#include "qemu-common.h"
83c9089e 25#include "monitor/monitor.h"
bd269ebc 26#include "qapi/clone-visitor.h"
da34e65c 27#include "qapi/error.h"
9af23989 28#include "qapi/qapi-visit-sockets.h"
1de7afc9 29#include "qemu/sockets.h"
1de7afc9 30#include "qemu/main-loop.h"
b3db211f
DB
31#include "qapi/qobject-input-visitor.h"
32#include "qapi/qobject-output-visitor.h"
f348b6d1 33#include "qemu/cutils.h"
e5b6353c 34#include "trace.h"
d247d25f
AL
35
36#ifndef AI_ADDRCONFIG
37# define AI_ADDRCONFIG 0
38#endif
340849a9 39
3de3d698
WB
40#ifndef AI_V4MAPPED
41# define AI_V4MAPPED 0
42#endif
d247d25f 43
6979a813
DB
44#ifndef AI_NUMERICSERV
45# define AI_NUMERICSERV 0
46#endif
47
2af2bf67 48
d247d25f
AL
49static int inet_getport(struct addrinfo *e)
50{
51 struct sockaddr_in *i4;
52 struct sockaddr_in6 *i6;
53
54 switch (e->ai_family) {
55 case PF_INET6:
56 i6 = (void*)e->ai_addr;
57 return ntohs(i6->sin6_port);
58 case PF_INET:
59 i4 = (void*)e->ai_addr;
60 return ntohs(i4->sin_port);
61 default:
62 return 0;
63 }
64}
65
66static void inet_setport(struct addrinfo *e, int port)
67{
68 struct sockaddr_in *i4;
69 struct sockaddr_in6 *i6;
70
71 switch (e->ai_family) {
72 case PF_INET6:
73 i6 = (void*)e->ai_addr;
74 i6->sin6_port = htons(port);
75 break;
76 case PF_INET:
77 i4 = (void*)e->ai_addr;
78 i4->sin_port = htons(port);
79 break;
80 }
81}
82
a589569f
WX
83NetworkAddressFamily inet_netfamily(int family)
84{
85 switch (family) {
86 case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6;
87 case PF_INET: return NETWORK_ADDRESS_FAMILY_IPV4;
88 case PF_UNIX: return NETWORK_ADDRESS_FAMILY_UNIX;
6a02c806
SH
89#ifdef CONFIG_AF_VSOCK
90 case PF_VSOCK: return NETWORK_ADDRESS_FAMILY_VSOCK;
91#endif /* CONFIG_AF_VSOCK */
a589569f
WX
92 }
93 return NETWORK_ADDRESS_FAMILY_UNKNOWN;
94}
95
58dc31f1
DB
96bool fd_is_socket(int fd)
97{
98 int optval;
99 socklen_t optlen = sizeof(optval);
100 return !qemu_getsockopt(fd, SOL_SOCKET, SO_TYPE, &optval, &optlen);
101}
102
103
1856835d
DB
104/*
105 * Matrix we're trying to apply
106 *
107 * ipv4 ipv6 family
108 * - - PF_UNSPEC
109 * - f PF_INET
110 * - t PF_INET6
111 * f - PF_INET6
112 * f f <error>
113 * f t PF_INET6
114 * t - PF_INET
115 * t f PF_INET
94bc0d19 116 * t t PF_INET6/PF_UNSPEC
1856835d 117 *
d43eda3d 118 * NB, this matrix is only about getting the necessary results
1856835d
DB
119 * from getaddrinfo(). Some of the cases require further work
120 * after reading results from getaddrinfo in order to fully
94bc0d19
DB
121 * apply the logic the end user wants.
122 *
123 * In the first and last cases, we must set IPV6_V6ONLY=0
124 * when binding, to allow a single listener to potentially
125 * accept both IPv4+6 addresses.
1856835d 126 */
c1b412f1
DB
127int inet_ai_family_from_address(InetSocketAddress *addr,
128 Error **errp)
1856835d
DB
129{
130 if (addr->has_ipv6 && addr->has_ipv4 &&
131 !addr->ipv6 && !addr->ipv4) {
132 error_setg(errp, "Cannot disable IPv4 and IPv6 at same time");
133 return PF_UNSPEC;
134 }
94bc0d19
DB
135 if ((addr->has_ipv6 && addr->ipv6) && (addr->has_ipv4 && addr->ipv4)) {
136 /*
137 * Some backends can only do a single listener. In that case
138 * we want empty hostname to resolve to "::" and then use the
139 * flag IPV6_V6ONLY==0 to get both protocols on 1 socket. This
140 * doesn't work for addresses other than "", so they're just
141 * inevitably broken until multiple listeners can be used,
142 * and thus we honour getaddrinfo automatic protocol detection
143 * Once all backends do multi-listener, remove the PF_INET6
144 * branch entirely.
145 */
146 if (!addr->host || g_str_equal(addr->host, "")) {
147 return PF_INET6;
148 } else {
149 return PF_UNSPEC;
150 }
151 }
1856835d
DB
152 if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) {
153 return PF_INET6;
154 }
155 if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) {
156 return PF_INET;
157 }
158 return PF_UNSPEC;
159}
160
39f80521
KO
161static int create_fast_reuse_socket(struct addrinfo *e)
162{
163 int slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol);
164 if (slisten < 0) {
165 return -1;
166 }
167 socket_set_fast_reuse(slisten);
168 return slisten;
169}
170
89382c3d
KO
171static int try_bind(int socket, InetSocketAddress *saddr, struct addrinfo *e)
172{
173#ifndef IPV6_V6ONLY
174 return bind(socket, e->ai_addr, e->ai_addrlen);
175#else
176 /*
177 * Deals with first & last cases in matrix in comment
178 * for inet_ai_family_from_address().
179 */
180 int v6only =
181 ((!saddr->has_ipv4 && !saddr->has_ipv6) ||
182 (saddr->has_ipv4 && saddr->ipv4 &&
183 saddr->has_ipv6 && saddr->ipv6)) ? 0 : 1;
184 int stat;
185
186 rebind:
187 if (e->ai_family == PF_INET6) {
188 qemu_setsockopt(socket, IPPROTO_IPV6, IPV6_V6ONLY, &v6only,
189 sizeof(v6only));
190 }
191
192 stat = bind(socket, e->ai_addr, e->ai_addrlen);
193 if (!stat) {
194 return 0;
195 }
196
197 /* If we got EADDRINUSE from an IPv6 bind & v6only is unset,
198 * it could be that the IPv4 port is already claimed, so retry
199 * with v6only set
200 */
201 if (e->ai_family == PF_INET6 && errno == EADDRINUSE && !v6only) {
202 v6only = 1;
203 goto rebind;
204 }
205 return stat;
206#endif
207}
208
1856835d
DB
209static int inet_listen_saddr(InetSocketAddress *saddr,
210 int port_offset,
e5b6353c 211 int num,
1856835d 212 Error **errp)
d247d25f
AL
213{
214 struct addrinfo ai,*res,*e;
d247d25f
AL
215 char port[33];
216 char uaddr[INET6_ADDRSTRLEN+1];
217 char uport[33];
9cf961bb 218 int rc, port_min, port_max, p;
10a7b7e6 219 int slisten = -1;
9cf961bb
KO
220 int saved_errno = 0;
221 bool socket_created = false;
1856835d 222 Error *err = NULL;
d247d25f 223
aec21d31
VSO
224 if (saddr->keep_alive) {
225 error_setg(errp, "keep-alive option is not supported for passive "
226 "sockets");
227 return -1;
228 }
229
d247d25f 230 memset(&ai,0, sizeof(ai));
3de3d698 231 ai.ai_flags = AI_PASSIVE;
6979a813
DB
232 if (saddr->has_numeric && saddr->numeric) {
233 ai.ai_flags |= AI_NUMERICHOST | AI_NUMERICSERV;
234 }
1856835d 235 ai.ai_family = inet_ai_family_from_address(saddr, &err);
e5bc776f 236 ai.ai_socktype = SOCK_STREAM;
d247d25f 237
1856835d
DB
238 if (err) {
239 error_propagate(errp, err);
240 return -1;
241 }
242
243 if (saddr->host == NULL) {
0983f5e6 244 error_setg(errp, "host not specified");
e5bc776f 245 return -1;
d247d25f 246 }
1856835d
DB
247 if (saddr->port != NULL) {
248 pstrcpy(port, sizeof(port), saddr->port);
0983f5e6
DB
249 } else {
250 port[0] = '\0';
251 }
d247d25f
AL
252
253 /* lookup */
8bc89127
GH
254 if (port_offset) {
255 unsigned long long baseport;
0983f5e6
DB
256 if (strlen(port) == 0) {
257 error_setg(errp, "port not specified");
258 return -1;
259 }
8bc89127
GH
260 if (parse_uint_full(port, &baseport, 10) < 0) {
261 error_setg(errp, "can't convert to a number: %s", port);
262 return -1;
263 }
264 if (baseport > 65535 ||
265 baseport + port_offset > 65535) {
266 error_setg(errp, "port %s out of range", port);
267 return -1;
268 }
269 snprintf(port, sizeof(port), "%d", (int)baseport + port_offset);
270 }
1856835d 271 rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL,
0983f5e6 272 strlen(port) ? port : NULL, &ai, &res);
d247d25f 273 if (rc != 0) {
1856835d
DB
274 error_setg(errp, "address resolution failed for %s:%s: %s",
275 saddr->host, port, gai_strerror(rc));
d247d25f
AL
276 return -1;
277 }
d247d25f 278
9cf961bb 279 /* create socket + bind/listen */
d247d25f 280 for (e = res; e != NULL; e = e->ai_next) {
39b6efc8 281 getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
7d37435b
PB
282 uaddr,INET6_ADDRSTRLEN,uport,32,
283 NI_NUMERICHOST | NI_NUMERICSERV);
39f80521 284
877691f9 285 port_min = inet_getport(e);
1856835d 286 port_max = saddr->has_to ? saddr->to + port_offset : port_min;
877691f9
MA
287 for (p = port_min; p <= port_max; p++) {
288 inet_setport(e, p);
10a7b7e6
DB
289
290 slisten = create_fast_reuse_socket(e);
291 if (slisten < 0) {
292 /* First time we expect we might fail to create the socket
293 * eg if 'e' has AF_INET6 but ipv6 kmod is not loaded.
294 * Later iterations should always succeed if first iteration
295 * worked though, so treat that as fatal.
296 */
297 if (p == port_min) {
9cf961bb
KO
298 continue;
299 } else {
10a7b7e6
DB
300 error_setg_errno(errp, errno,
301 "Failed to recreate failed listening socket");
9cf961bb 302 goto listen_failed;
029409e5 303 }
d247d25f 304 }
10a7b7e6
DB
305 socket_created = true;
306
307 rc = try_bind(slisten, saddr, e);
308 if (rc < 0) {
309 if (errno != EADDRINUSE) {
310 error_setg_errno(errp, errno, "Failed to bind socket");
311 goto listen_failed;
312 }
313 } else {
e5b6353c 314 if (!listen(slisten, num)) {
10a7b7e6
DB
315 goto listen_ok;
316 }
317 if (errno != EADDRINUSE) {
318 error_setg_errno(errp, errno, "Failed to listen on socket");
319 goto listen_failed;
320 }
9cf961bb
KO
321 }
322 /* Someone else managed to bind to the same port and beat us
323 * to listen on it! Socket semantics does not allow us to
324 * recover from this situation, so we need to recreate the
325 * socket to allow bind attempts for subsequent ports:
326 */
327 closesocket(slisten);
10a7b7e6 328 slisten = -1;
d247d25f 329 }
9cf961bb
KO
330 }
331 error_setg_errno(errp, errno,
332 socket_created ?
333 "Failed to find an available port" :
334 "Failed to create a socket");
335listen_failed:
336 saved_errno = errno;
337 if (slisten >= 0) {
d247d25f
AL
338 closesocket(slisten);
339 }
d247d25f 340 freeaddrinfo(res);
9cf961bb 341 errno = saved_errno;
d247d25f
AL
342 return -1;
343
9cf961bb 344listen_ok:
d247d25f
AL
345 freeaddrinfo(res);
346 return slisten;
347}
348
05bc1d8a
MT
349#ifdef _WIN32
350#define QEMU_SOCKET_RC_INPROGRESS(rc) \
351 ((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY)
352#else
353#define QEMU_SOCKET_RC_INPROGRESS(rc) \
354 ((rc) == -EINPROGRESS)
355#endif
356
dfc00eb7
DB
357static int inet_connect_addr(const InetSocketAddress *saddr,
358 struct addrinfo *addr, Error **errp)
233aa5c2
OW
359{
360 int sock, rc;
361
05bc1d8a
MT
362 sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
363 if (sock < 0) {
dfc00eb7
DB
364 error_setg_errno(errp, errno, "Failed to create socket family %d",
365 addr->ai_family);
05bc1d8a
MT
366 return -1;
367 }
04fd1c78 368 socket_set_fast_reuse(sock);
b2587932 369
05bc1d8a
MT
370 /* connect to peer */
371 do {
372 rc = 0;
373 if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) {
b16a44e1 374 rc = -errno;
05bc1d8a
MT
375 }
376 } while (rc == -EINTR);
377
b2587932 378 if (rc < 0) {
dfc00eb7
DB
379 error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
380 saddr->host, saddr->port);
05bc1d8a
MT
381 closesocket(sock);
382 return -1;
383 }
b2587932 384
05bc1d8a
MT
385 return sock;
386}
387
2942e420
DB
388static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr,
389 Error **errp)
05bc1d8a
MT
390{
391 struct addrinfo ai, *res;
392 int rc;
2942e420 393 Error *err = NULL;
340849a9 394 static int useV4Mapped = 1;
d247d25f 395
05bc1d8a 396 memset(&ai, 0, sizeof(ai));
233aa5c2 397
340849a9 398 ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
d73415a3 399 if (qatomic_read(&useV4Mapped)) {
340849a9
DB
400 ai.ai_flags |= AI_V4MAPPED;
401 }
2942e420 402 ai.ai_family = inet_ai_family_from_address(saddr, &err);
f4c94c7c 403 ai.ai_socktype = SOCK_STREAM;
d247d25f 404
2942e420
DB
405 if (err) {
406 error_propagate(errp, err);
05bc1d8a 407 return NULL;
d247d25f
AL
408 }
409
2942e420
DB
410 if (saddr->host == NULL || saddr->port == NULL) {
411 error_setg(errp, "host and/or port not specified");
412 return NULL;
05bc1d8a 413 }
d247d25f
AL
414
415 /* lookup */
2942e420 416 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
340849a9
DB
417
418 /* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but
419 * then don't implement it in their getaddrinfo(). Detect
8cc360b9 420 * this and retry without the flag since that's preferable
340849a9
DB
421 * to a fatal error
422 */
423 if (rc == EAI_BADFLAGS &&
424 (ai.ai_flags & AI_V4MAPPED)) {
d73415a3 425 qatomic_set(&useV4Mapped, 0);
340849a9
DB
426 ai.ai_flags &= ~AI_V4MAPPED;
427 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
428 }
05bc1d8a 429 if (rc != 0) {
2942e420
DB
430 error_setg(errp, "address resolution failed for %s:%s: %s",
431 saddr->host, saddr->port, gai_strerror(rc));
05bc1d8a
MT
432 return NULL;
433 }
434 return res;
435}
436
5db5f44c
OW
437/**
438 * Create a socket and connect it to an address.
439 *
2942e420 440 * @saddr: Inet socket address specification
5db5f44c
OW
441 * @errp: set on error
442 *
443 * Returns: -1 on error, file descriptor on success.
444 */
b2587932 445int inet_connect_saddr(InetSocketAddress *saddr, Error **errp)
05bc1d8a 446{
3f9286b7 447 Error *local_err = NULL;
05bc1d8a
MT
448 struct addrinfo *res, *e;
449 int sock = -1;
05bc1d8a 450
2942e420 451 res = inet_parse_connect_saddr(saddr, errp);
05bc1d8a
MT
452 if (!res) {
453 return -1;
454 }
455
d247d25f 456 for (e = res; e != NULL; e = e->ai_next) {
3f9286b7
MA
457 error_free(local_err);
458 local_err = NULL;
dfc00eb7 459 sock = inet_connect_addr(saddr, e, &local_err);
3f9286b7 460 if (sock >= 0) {
05bc1d8a 461 break;
a6ba35b3 462 }
d247d25f 463 }
3f9286b7 464
da5e1169
VSO
465 freeaddrinfo(res);
466
3f9286b7
MA
467 if (sock < 0) {
468 error_propagate(errp, local_err);
da5e1169 469 return sock;
3f9286b7 470 }
b2587932 471
aec21d31
VSO
472 if (saddr->keep_alive) {
473 int val = 1;
474 int ret = qemu_setsockopt(sock, SOL_SOCKET, SO_KEEPALIVE,
475 &val, sizeof(val));
476
477 if (ret < 0) {
478 error_setg_errno(errp, errno, "Unable to set KEEPALIVE");
479 close(sock);
480 return -1;
481 }
482 }
483
05bc1d8a 484 return sock;
d247d25f
AL
485}
486
8b39910e
DB
487static int inet_dgram_saddr(InetSocketAddress *sraddr,
488 InetSocketAddress *sladdr,
489 Error **errp)
7e1b35b4
GH
490{
491 struct addrinfo ai, *peer = NULL, *local = NULL;
492 const char *addr;
493 const char *port;
7e1b35b4 494 int sock = -1, rc;
8b39910e 495 Error *err = NULL;
7e1b35b4
GH
496
497 /* lookup peer addr */
498 memset(&ai,0, sizeof(ai));
3de3d698 499 ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG;
8b39910e 500 ai.ai_family = inet_ai_family_from_address(sraddr, &err);
7e1b35b4
GH
501 ai.ai_socktype = SOCK_DGRAM;
502
8b39910e
DB
503 if (err) {
504 error_propagate(errp, err);
58c652c0 505 goto err;
8b39910e
DB
506 }
507
508 addr = sraddr->host;
509 port = sraddr->port;
7e1b35b4
GH
510 if (addr == NULL || strlen(addr) == 0) {
511 addr = "localhost";
512 }
513 if (port == NULL || strlen(port) == 0) {
4f085c82 514 error_setg(errp, "remote port not specified");
58c652c0 515 goto err;
7e1b35b4
GH
516 }
517
9cd1883c 518 if ((rc = getaddrinfo(addr, port, &ai, &peer)) != 0) {
4f085c82
PB
519 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
520 gai_strerror(rc));
26015051 521 goto err;
7e1b35b4 522 }
7e1b35b4
GH
523
524 /* lookup local addr */
525 memset(&ai,0, sizeof(ai));
526 ai.ai_flags = AI_PASSIVE;
527 ai.ai_family = peer->ai_family;
528 ai.ai_socktype = SOCK_DGRAM;
529
8b39910e
DB
530 if (sladdr) {
531 addr = sladdr->host;
532 port = sladdr->port;
533 if (addr == NULL || strlen(addr) == 0) {
534 addr = NULL;
535 }
536 if (!port || strlen(port) == 0) {
537 port = "0";
538 }
539 } else {
7e1b35b4 540 addr = NULL;
7e1b35b4 541 port = "0";
8b39910e 542 }
7e1b35b4 543
9cd1883c 544 if ((rc = getaddrinfo(addr, port, &ai, &local)) != 0) {
4f085c82
PB
545 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
546 gai_strerror(rc));
39b38459 547 goto err;
7e1b35b4 548 }
7e1b35b4
GH
549
550 /* create socket */
40ff6d7e 551 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol);
7e1b35b4 552 if (sock < 0) {
dfc00eb7
DB
553 error_setg_errno(errp, errno, "Failed to create socket family %d",
554 peer->ai_family);
7e1b35b4
GH
555 goto err;
556 }
04fd1c78 557 socket_set_fast_reuse(sock);
7e1b35b4
GH
558
559 /* bind socket */
7e1b35b4 560 if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) {
235256a2 561 error_setg_errno(errp, errno, "Failed to bind socket");
7e1b35b4
GH
562 goto err;
563 }
564
565 /* connect to peer */
7e1b35b4 566 if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) {
dfc00eb7
DB
567 error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
568 addr, port);
7e1b35b4
GH
569 goto err;
570 }
571
572 freeaddrinfo(local);
573 freeaddrinfo(peer);
574 return sock;
575
576err:
26015051 577 if (sock != -1) {
7e1b35b4 578 closesocket(sock);
26015051
C
579 }
580 if (local) {
7e1b35b4 581 freeaddrinfo(local);
26015051
C
582 }
583 if (peer) {
7e1b35b4 584 freeaddrinfo(peer);
26015051
C
585 }
586
7e1b35b4
GH
587 return -1;
588}
589
f4c94c7c 590/* compatibility wrapper */
3e32370a
DB
591static int inet_parse_flag(const char *flagname, const char *optstr, bool *val,
592 Error **errp)
593{
594 char *end;
595 size_t len;
596
597 end = strstr(optstr, ",");
598 if (end) {
599 if (end[1] == ',') { /* Reject 'ipv6=on,,foo' */
600 error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
601 return -1;
602 }
603 len = end - optstr;
604 } else {
605 len = strlen(optstr);
606 }
607 if (len == 0 || (len == 3 && strncmp(optstr, "=on", len) == 0)) {
608 *val = true;
609 } else if (len == 4 && strncmp(optstr, "=off", len) == 0) {
610 *val = false;
611 } else {
612 error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
613 return -1;
614 }
615 return 0;
616}
617
0785bd7a 618int inet_parse(InetSocketAddress *addr, const char *str, Error **errp)
f4c94c7c
GH
619{
620 const char *optstr, *h;
55a10996 621 char host[65];
f4c94c7c 622 char port[33];
879e45c7 623 int to;
f4c94c7c 624 int pos;
3e32370a 625 char *begin;
f4c94c7c 626
0785bd7a 627 memset(addr, 0, sizeof(*addr));
879e45c7 628
f4c94c7c
GH
629 /* parse address */
630 if (str[0] == ':') {
631 /* no host given */
879e45c7 632 host[0] = '\0';
9cd1883c 633 if (sscanf(str, ":%32[^,]%n", port, &pos) != 1) {
2f002c43 634 error_setg(errp, "error parsing port in address '%s'", str);
0785bd7a 635 return -1;
f4c94c7c
GH
636 }
637 } else if (str[0] == '[') {
638 /* IPv6 addr */
9cd1883c 639 if (sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 640 error_setg(errp, "error parsing IPv6 address '%s'", str);
0785bd7a 641 return -1;
f4c94c7c 642 }
f4c94c7c 643 } else {
391b7b97 644 /* hostname or IPv4 addr */
9cd1883c 645 if (sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 646 error_setg(errp, "error parsing address '%s'", str);
0785bd7a 647 return -1;
f4c94c7c
GH
648 }
649 }
879e45c7
PB
650
651 addr->host = g_strdup(host);
652 addr->port = g_strdup(port);
f4c94c7c
GH
653
654 /* parse options */
655 optstr = str + pos;
656 h = strstr(optstr, ",to=");
879e45c7 657 if (h) {
1ccbc285
AP
658 h += 4;
659 if (sscanf(h, "%d%n", &to, &pos) != 1 ||
660 (h[pos] != '\0' && h[pos] != ',')) {
879e45c7 661 error_setg(errp, "error parsing to= argument");
0785bd7a 662 return -1;
879e45c7
PB
663 }
664 addr->has_to = true;
665 addr->to = to;
666 }
3e32370a
DB
667 begin = strstr(optstr, ",ipv4");
668 if (begin) {
669 if (inet_parse_flag("ipv4", begin + 5, &addr->ipv4, errp) < 0) {
670 return -1;
671 }
672 addr->has_ipv4 = true;
879e45c7 673 }
3e32370a
DB
674 begin = strstr(optstr, ",ipv6");
675 if (begin) {
676 if (inet_parse_flag("ipv6", begin + 5, &addr->ipv6, errp) < 0) {
677 return -1;
678 }
679 addr->has_ipv6 = true;
879e45c7 680 }
aec21d31
VSO
681 begin = strstr(optstr, ",keep-alive");
682 if (begin) {
683 if (inet_parse_flag("keep-alive", begin + strlen(",keep-alive"),
684 &addr->keep_alive, errp) < 0)
685 {
686 return -1;
687 }
688 addr->has_keep_alive = true;
689 }
0785bd7a 690 return 0;
879e45c7
PB
691}
692
e5bc776f 693
5db5f44c
OW
694/**
695 * Create a blocking socket and connect it to an address.
696 *
697 * @str: address string
698 * @errp: set in case of an error
699 *
700 * Returns -1 in case of error, file descriptor on success
701 **/
702int inet_connect(const char *str, Error **errp)
f4c94c7c 703{
f4c94c7c 704 int sock = -1;
0785bd7a 705 InetSocketAddress *addr = g_new(InetSocketAddress, 1);
f4c94c7c 706
0785bd7a 707 if (!inet_parse(addr, str, errp)) {
b2587932 708 sock = inet_connect_saddr(addr, errp);
5db5f44c 709 }
0785bd7a 710 qapi_free_InetSocketAddress(addr);
5db5f44c
OW
711 return sock;
712}
713
6a02c806
SH
714#ifdef CONFIG_AF_VSOCK
715static bool vsock_parse_vaddr_to_sockaddr(const VsockSocketAddress *vaddr,
716 struct sockaddr_vm *svm,
717 Error **errp)
718{
719 unsigned long long val;
720
721 memset(svm, 0, sizeof(*svm));
722 svm->svm_family = AF_VSOCK;
723
724 if (parse_uint_full(vaddr->cid, &val, 10) < 0 ||
725 val > UINT32_MAX) {
726 error_setg(errp, "Failed to parse cid '%s'", vaddr->cid);
727 return false;
728 }
729 svm->svm_cid = val;
730
731 if (parse_uint_full(vaddr->port, &val, 10) < 0 ||
732 val > UINT32_MAX) {
733 error_setg(errp, "Failed to parse port '%s'", vaddr->port);
734 return false;
735 }
736 svm->svm_port = val;
737
738 return true;
739}
740
dfc00eb7
DB
741static int vsock_connect_addr(const VsockSocketAddress *vaddr,
742 const struct sockaddr_vm *svm, Error **errp)
6a02c806
SH
743{
744 int sock, rc;
745
6a02c806
SH
746 sock = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
747 if (sock < 0) {
dfc00eb7
DB
748 error_setg_errno(errp, errno, "Failed to create socket family %d",
749 AF_VSOCK);
6a02c806
SH
750 return -1;
751 }
b2587932 752
6a02c806
SH
753 /* connect to peer */
754 do {
755 rc = 0;
756 if (connect(sock, (const struct sockaddr *)svm, sizeof(*svm)) < 0) {
757 rc = -errno;
758 }
759 } while (rc == -EINTR);
760
b2587932 761 if (rc < 0) {
dfc00eb7
DB
762 error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
763 vaddr->cid, vaddr->port);
6a02c806
SH
764 closesocket(sock);
765 return -1;
766 }
b2587932 767
6a02c806
SH
768 return sock;
769}
770
b2587932 771static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
6a02c806
SH
772{
773 struct sockaddr_vm svm;
6a02c806
SH
774
775 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
776 return -1;
777 }
778
dfc00eb7 779 return vsock_connect_addr(vaddr, &svm, errp);
6a02c806
SH
780}
781
782static int vsock_listen_saddr(VsockSocketAddress *vaddr,
e5b6353c 783 int num,
6a02c806
SH
784 Error **errp)
785{
786 struct sockaddr_vm svm;
787 int slisten;
788
789 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
790 return -1;
791 }
792
793 slisten = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
794 if (slisten < 0) {
795 error_setg_errno(errp, errno, "Failed to create socket");
796 return -1;
797 }
798
799 if (bind(slisten, (const struct sockaddr *)&svm, sizeof(svm)) != 0) {
800 error_setg_errno(errp, errno, "Failed to bind socket");
801 closesocket(slisten);
802 return -1;
803 }
804
e5b6353c 805 if (listen(slisten, num) != 0) {
6a02c806
SH
806 error_setg_errno(errp, errno, "Failed to listen on socket");
807 closesocket(slisten);
808 return -1;
809 }
810 return slisten;
811}
812
4db5c619
MA
813static int vsock_parse(VsockSocketAddress *addr, const char *str,
814 Error **errp)
6a02c806 815{
6a02c806
SH
816 char cid[33];
817 char port[33];
818 int n;
819
820 if (sscanf(str, "%32[^:]:%32[^,]%n", cid, port, &n) != 2) {
821 error_setg(errp, "error parsing address '%s'", str);
4db5c619 822 return -1;
6a02c806
SH
823 }
824 if (str[n] != '\0') {
825 error_setg(errp, "trailing characters in address '%s'", str);
4db5c619 826 return -1;
6a02c806
SH
827 }
828
6a02c806
SH
829 addr->cid = g_strdup(cid);
830 addr->port = g_strdup(port);
4db5c619 831 return 0;
6a02c806
SH
832}
833#else
834static void vsock_unsupported(Error **errp)
835{
836 error_setg(errp, "socket family AF_VSOCK unsupported");
837}
838
b2587932 839static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
6a02c806
SH
840{
841 vsock_unsupported(errp);
842 return -1;
843}
844
845static int vsock_listen_saddr(VsockSocketAddress *vaddr,
e5b6353c 846 int num,
6a02c806
SH
847 Error **errp)
848{
849 vsock_unsupported(errp);
850 return -1;
851}
852
4db5c619
MA
853static int vsock_parse(VsockSocketAddress *addr, const char *str,
854 Error **errp)
6a02c806
SH
855{
856 vsock_unsupported(errp);
4db5c619 857 return -1;
6a02c806
SH
858}
859#endif /* CONFIG_AF_VSOCK */
860
d247d25f
AL
861#ifndef _WIN32
862
1856835d 863static int unix_listen_saddr(UnixSocketAddress *saddr,
e5b6353c 864 int num,
1856835d 865 Error **errp)
d247d25f
AL
866{
867 struct sockaddr_un un;
62b6adfb 868 int sock, fd;
ad9579aa
DB
869 char *pathbuf = NULL;
870 const char *path;
2d2023c3 871 size_t pathlen;
776b97d3 872 size_t addrlen;
d247d25f 873
40ff6d7e 874 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 875 if (sock < 0) {
b658c53d 876 error_setg_errno(errp, errno, "Failed to create Unix socket");
39b6efc8 877 return -1;
d247d25f
AL
878 }
879
ef298e38 880 if (saddr->path[0] || saddr->abstract) {
ad9579aa 881 path = saddr->path;
d247d25f 882 } else {
b658c53d
PB
883 const char *tmpdir = getenv("TMPDIR");
884 tmpdir = tmpdir ? tmpdir : "/tmp";
ad9579aa
DB
885 path = pathbuf = g_strdup_printf("%s/qemu-socket-XXXXXX", tmpdir);
886 }
b658c53d 887
2d2023c3 888 pathlen = strlen(path);
776b97d3
XZ
889 if (pathlen > sizeof(un.sun_path) ||
890 (saddr->abstract && pathlen > (sizeof(un.sun_path) - 1))) {
ad9579aa
DB
891 error_setg(errp, "UNIX socket path '%s' is too long", path);
892 error_append_hint(errp, "Path must be less than %zu bytes\n",
776b97d3 893 saddr->abstract ? sizeof(un.sun_path) - 1 :
ad9579aa
DB
894 sizeof(un.sun_path));
895 goto err;
896 }
897
898 if (pathbuf != NULL) {
d247d25f
AL
899 /*
900 * This dummy fd usage silences the mktemp() unsecure warning.
901 * Using mkstemp() doesn't make things more secure here
902 * though. bind() complains about existing files, so we have
903 * to unlink first and thus re-open the race window. The
904 * worst case possible is bind() failing, i.e. a DoS attack.
905 */
ad9579aa 906 fd = mkstemp(pathbuf);
b658c53d
PB
907 if (fd < 0) {
908 error_setg_errno(errp, errno,
ad9579aa 909 "Failed to make a temporary socket %s", pathbuf);
b658c53d
PB
910 goto err;
911 }
912 close(fd);
d247d25f 913 }
d247d25f 914
776b97d3 915 if (!saddr->abstract && unlink(path) < 0 && errno != ENOENT) {
0ef705a2 916 error_setg_errno(errp, errno,
ad9579aa 917 "Failed to unlink socket %s", path);
0ef705a2
CR
918 goto err;
919 }
ad9579aa
DB
920
921 memset(&un, 0, sizeof(un));
922 un.sun_family = AF_UNIX;
776b97d3 923 addrlen = sizeof(un);
ad9579aa 924
776b97d3
XZ
925 if (saddr->abstract) {
926 un.sun_path[0] = '\0';
927 memcpy(&un.sun_path[1], path, pathlen);
b08cc97d 928 if (!saddr->has_tight || saddr->tight) {
776b97d3
XZ
929 addrlen = offsetof(struct sockaddr_un, sun_path) + 1 + pathlen;
930 }
931 } else {
932 memcpy(un.sun_path, path, pathlen);
933 }
934
935 if (bind(sock, (struct sockaddr *) &un, addrlen) < 0) {
56382bd5 936 error_setg_errno(errp, errno, "Failed to bind socket to %s", path);
d247d25f
AL
937 goto err;
938 }
e5b6353c 939 if (listen(sock, num) < 0) {
235256a2 940 error_setg_errno(errp, errno, "Failed to listen on socket");
d247d25f
AL
941 goto err;
942 }
943
62473511 944 g_free(pathbuf);
d247d25f
AL
945 return sock;
946
947err:
ad9579aa 948 g_free(pathbuf);
d247d25f
AL
949 closesocket(sock);
950 return -1;
951}
952
b2587932 953static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
d247d25f
AL
954{
955 struct sockaddr_un un;
1fc05adf 956 int sock, rc;
2d2023c3 957 size_t pathlen;
776b97d3 958 size_t addrlen;
d247d25f 959
2942e420 960 if (saddr->path == NULL) {
312fd5f2 961 error_setg(errp, "unix connect: no path specified");
2af2bf67
GH
962 return -1;
963 }
964
40ff6d7e 965 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 966 if (sock < 0) {
235256a2 967 error_setg_errno(errp, errno, "Failed to create socket");
39b6efc8 968 return -1;
d247d25f
AL
969 }
970
2d2023c3 971 pathlen = strlen(saddr->path);
776b97d3
XZ
972 if (pathlen > sizeof(un.sun_path) ||
973 (saddr->abstract && pathlen > (sizeof(un.sun_path) - 1))) {
ad9579aa
DB
974 error_setg(errp, "UNIX socket path '%s' is too long", saddr->path);
975 error_append_hint(errp, "Path must be less than %zu bytes\n",
776b97d3 976 saddr->abstract ? sizeof(un.sun_path) - 1 :
ad9579aa
DB
977 sizeof(un.sun_path));
978 goto err;
979 }
980
d247d25f
AL
981 memset(&un, 0, sizeof(un));
982 un.sun_family = AF_UNIX;
776b97d3 983 addrlen = sizeof(un);
1fc05adf 984
776b97d3
XZ
985 if (saddr->abstract) {
986 un.sun_path[0] = '\0';
987 memcpy(&un.sun_path[1], saddr->path, pathlen);
b08cc97d 988 if (!saddr->has_tight || saddr->tight) {
776b97d3
XZ
989 addrlen = offsetof(struct sockaddr_un, sun_path) + 1 + pathlen;
990 }
991 } else {
992 memcpy(un.sun_path, saddr->path, pathlen);
993 }
1fc05adf
PB
994 /* connect to peer */
995 do {
996 rc = 0;
776b97d3 997 if (connect(sock, (struct sockaddr *) &un, addrlen) < 0) {
b16a44e1 998 rc = -errno;
1fc05adf
PB
999 }
1000 } while (rc == -EINTR);
1001
1fc05adf 1002 if (rc < 0) {
dfc00eb7 1003 error_setg_errno(errp, -rc, "Failed to connect to '%s'",
ad9579aa
DB
1004 saddr->path);
1005 goto err;
d247d25f
AL
1006 }
1007
d247d25f 1008 return sock;
ad9579aa
DB
1009
1010 err:
1011 close(sock);
ad9579aa 1012 return -1;
d247d25f
AL
1013}
1014
0c814709
PB
1015#else
1016
1856835d 1017static int unix_listen_saddr(UnixSocketAddress *saddr,
e5b6353c 1018 int num,
1856835d 1019 Error **errp)
0c814709 1020{
58899664 1021 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
1022 errno = ENOTSUP;
1023 return -1;
1024}
1025
b2587932 1026static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
0c814709 1027{
58899664 1028 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
1029 errno = ENOTSUP;
1030 return -1;
1031}
1032#endif
1033
2af2bf67 1034/* compatibility wrapper */
62473511 1035int unix_listen(const char *str, Error **errp)
62b6adfb 1036{
1856835d 1037 UnixSocketAddress *saddr;
caf88d74 1038 int sock;
62b6adfb 1039
1856835d 1040 saddr = g_new0(UnixSocketAddress, 1);
caf88d74 1041 saddr->path = g_strdup(str);
e5b6353c 1042 sock = unix_listen_saddr(saddr, 1, errp);
1856835d 1043 qapi_free_UnixSocketAddress(saddr);
62b6adfb
GH
1044 return sock;
1045}
1046
7fc4e63e 1047int unix_connect(const char *path, Error **errp)
2af2bf67 1048{
2942e420 1049 UnixSocketAddress *saddr;
2af2bf67
GH
1050 int sock;
1051
2942e420
DB
1052 saddr = g_new0(UnixSocketAddress, 1);
1053 saddr->path = g_strdup(path);
b2587932 1054 sock = unix_connect_saddr(saddr, errp);
2942e420 1055 qapi_free_UnixSocketAddress(saddr);
1fc05adf
PB
1056 return sock;
1057}
1058
1059
bd269ebc 1060SocketAddress *socket_parse(const char *str, Error **errp)
101f9cbc 1061{
bd269ebc 1062 SocketAddress *addr;
101f9cbc 1063
bd269ebc 1064 addr = g_new0(SocketAddress, 1);
101f9cbc
PB
1065 if (strstart(str, "unix:", NULL)) {
1066 if (str[5] == '\0') {
312fd5f2 1067 error_setg(errp, "invalid Unix socket address");
101f9cbc
PB
1068 goto fail;
1069 } else {
bd269ebc
MA
1070 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1071 addr->u.q_unix.path = g_strdup(str + 5);
101f9cbc
PB
1072 }
1073 } else if (strstart(str, "fd:", NULL)) {
1074 if (str[3] == '\0') {
312fd5f2 1075 error_setg(errp, "invalid file descriptor address");
101f9cbc
PB
1076 goto fail;
1077 } else {
bd269ebc
MA
1078 addr->type = SOCKET_ADDRESS_TYPE_FD;
1079 addr->u.fd.str = g_strdup(str + 3);
101f9cbc 1080 }
6a02c806 1081 } else if (strstart(str, "vsock:", NULL)) {
bd269ebc
MA
1082 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1083 if (vsock_parse(&addr->u.vsock, str + strlen("vsock:"), errp)) {
6a02c806
SH
1084 goto fail;
1085 }
101f9cbc 1086 } else {
bd269ebc
MA
1087 addr->type = SOCKET_ADDRESS_TYPE_INET;
1088 if (inet_parse(&addr->u.inet, str, errp)) {
101f9cbc
PB
1089 goto fail;
1090 }
1091 }
1092 return addr;
1093
1094fail:
bd269ebc 1095 qapi_free_SocketAddress(addr);
101f9cbc
PB
1096 return NULL;
1097}
1098
e5b6353c 1099static int socket_get_fd(const char *fdstr, int num, Error **errp)
30bdb3c5 1100{
947e4744 1101 Monitor *cur_mon = monitor_cur();
1723d6b1 1102 int fd;
e5b6353c
JQ
1103 if (num != 1) {
1104 error_setg_errno(errp, EINVAL, "socket_get_fd: too many connections");
1105 return -1;
1106 }
1723d6b1
DB
1107 if (cur_mon) {
1108 fd = monitor_get_fd(cur_mon, fdstr, errp);
1109 if (fd < 0) {
1110 return -1;
1111 }
1112 } else {
1113 if (qemu_strtoi(fdstr, NULL, 10, &fd) < 0) {
1114 error_setg_errno(errp, errno,
1115 "Unable to parse FD number %s",
1116 fdstr);
1117 return -1;
1118 }
30bdb3c5
DB
1119 }
1120 if (!fd_is_socket(fd)) {
1121 error_setg(errp, "File descriptor '%s' is not a socket", fdstr);
1122 close(fd);
1123 return -1;
1124 }
1125 return fd;
1126}
1127
b2587932 1128int socket_connect(SocketAddress *addr, Error **errp)
101f9cbc 1129{
101f9cbc
PB
1130 int fd;
1131
2d32adda 1132 switch (addr->type) {
bd269ebc 1133 case SOCKET_ADDRESS_TYPE_INET:
b2587932 1134 fd = inet_connect_saddr(&addr->u.inet, errp);
101f9cbc
PB
1135 break;
1136
bd269ebc 1137 case SOCKET_ADDRESS_TYPE_UNIX:
b2587932 1138 fd = unix_connect_saddr(&addr->u.q_unix, errp);
101f9cbc
PB
1139 break;
1140
bd269ebc 1141 case SOCKET_ADDRESS_TYPE_FD:
e5b6353c 1142 fd = socket_get_fd(addr->u.fd.str, 1, errp);
101f9cbc
PB
1143 break;
1144
bd269ebc 1145 case SOCKET_ADDRESS_TYPE_VSOCK:
b2587932 1146 fd = vsock_connect_saddr(&addr->u.vsock, errp);
6a02c806
SH
1147 break;
1148
101f9cbc
PB
1149 default:
1150 abort();
1151 }
101f9cbc
PB
1152 return fd;
1153}
1154
e5b6353c 1155int socket_listen(SocketAddress *addr, int num, Error **errp)
101f9cbc 1156{
101f9cbc
PB
1157 int fd;
1158
e5b6353c 1159 trace_socket_listen(num);
2d32adda 1160 switch (addr->type) {
bd269ebc 1161 case SOCKET_ADDRESS_TYPE_INET:
e5b6353c 1162 fd = inet_listen_saddr(&addr->u.inet, 0, num, errp);
101f9cbc
PB
1163 break;
1164
bd269ebc 1165 case SOCKET_ADDRESS_TYPE_UNIX:
e5b6353c 1166 fd = unix_listen_saddr(&addr->u.q_unix, num, errp);
101f9cbc
PB
1167 break;
1168
bd269ebc 1169 case SOCKET_ADDRESS_TYPE_FD:
e5b6353c 1170 fd = socket_get_fd(addr->u.fd.str, num, errp);
101f9cbc
PB
1171 break;
1172
bd269ebc 1173 case SOCKET_ADDRESS_TYPE_VSOCK:
e5b6353c 1174 fd = vsock_listen_saddr(&addr->u.vsock, num, errp);
6a02c806
SH
1175 break;
1176
101f9cbc
PB
1177 default:
1178 abort();
1179 }
101f9cbc
PB
1180 return fd;
1181}
1182
74b6ce43
MAL
1183void socket_listen_cleanup(int fd, Error **errp)
1184{
bd269ebc 1185 SocketAddress *addr;
74b6ce43
MAL
1186
1187 addr = socket_local_address(fd, errp);
2d7ad7c0
DB
1188 if (!addr) {
1189 return;
1190 }
74b6ce43 1191
bd269ebc
MA
1192 if (addr->type == SOCKET_ADDRESS_TYPE_UNIX
1193 && addr->u.q_unix.path) {
1194 if (unlink(addr->u.q_unix.path) < 0 && errno != ENOENT) {
74b6ce43
MAL
1195 error_setg_errno(errp, errno,
1196 "Failed to unlink socket %s",
bd269ebc 1197 addr->u.q_unix.path);
74b6ce43
MAL
1198 }
1199 }
1200
bd269ebc 1201 qapi_free_SocketAddress(addr);
74b6ce43
MAL
1202}
1203
bd269ebc 1204int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp)
3ecc059d 1205{
3ecc059d
GH
1206 int fd;
1207
ca0b64e5 1208 /*
bd269ebc 1209 * TODO SOCKET_ADDRESS_TYPE_FD when fd is AF_INET or AF_INET6
ca0b64e5
MA
1210 * (although other address families can do SOCK_DGRAM, too)
1211 */
2d32adda 1212 switch (remote->type) {
bd269ebc
MA
1213 case SOCKET_ADDRESS_TYPE_INET:
1214 fd = inet_dgram_saddr(&remote->u.inet,
1215 local ? &local->u.inet : NULL, errp);
3ecc059d
GH
1216 break;
1217
1218 default:
1219 error_setg(errp, "socket type unsupported for datagram");
7a5b6af1 1220 fd = -1;
3ecc059d 1221 }
3ecc059d
GH
1222 return fd;
1223}
17c55dec
DB
1224
1225
bd269ebc 1226static SocketAddress *
17c55dec
DB
1227socket_sockaddr_to_address_inet(struct sockaddr_storage *sa,
1228 socklen_t salen,
1229 Error **errp)
1230{
1231 char host[NI_MAXHOST];
1232 char serv[NI_MAXSERV];
bd269ebc 1233 SocketAddress *addr;
0399293e 1234 InetSocketAddress *inet;
17c55dec
DB
1235 int ret;
1236
1237 ret = getnameinfo((struct sockaddr *)sa, salen,
1238 host, sizeof(host),
1239 serv, sizeof(serv),
1240 NI_NUMERICHOST | NI_NUMERICSERV);
1241 if (ret != 0) {
1242 error_setg(errp, "Cannot format numeric socket address: %s",
1243 gai_strerror(ret));
1244 return NULL;
1245 }
1246
bd269ebc
MA
1247 addr = g_new0(SocketAddress, 1);
1248 addr->type = SOCKET_ADDRESS_TYPE_INET;
1249 inet = &addr->u.inet;
0399293e
EB
1250 inet->host = g_strdup(host);
1251 inet->port = g_strdup(serv);
17c55dec 1252 if (sa->ss_family == AF_INET) {
0399293e 1253 inet->has_ipv4 = inet->ipv4 = true;
17c55dec 1254 } else {
0399293e 1255 inet->has_ipv6 = inet->ipv6 = true;
17c55dec
DB
1256 }
1257
1258 return addr;
1259}
1260
1261
1262#ifndef WIN32
bd269ebc 1263static SocketAddress *
17c55dec
DB
1264socket_sockaddr_to_address_unix(struct sockaddr_storage *sa,
1265 socklen_t salen,
1266 Error **errp)
1267{
bd269ebc 1268 SocketAddress *addr;
17c55dec
DB
1269 struct sockaddr_un *su = (struct sockaddr_un *)sa;
1270
bd269ebc
MA
1271 addr = g_new0(SocketAddress, 1);
1272 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
3b14b4ec
MA
1273#ifdef CONFIG_LINUX
1274 if (!su->sun_path[0]) {
1275 /* Linux abstract socket */
1276 addr->u.q_unix.path = g_strndup(su->sun_path + 1,
1277 sizeof(su->sun_path) - 1);
1278 addr->u.q_unix.has_abstract = true;
1279 addr->u.q_unix.abstract = true;
1280 addr->u.q_unix.has_tight = true;
1281 addr->u.q_unix.tight = salen < sizeof(*su);
1282 return addr;
17c55dec 1283 }
3b14b4ec 1284#endif
17c55dec 1285
3b14b4ec 1286 addr->u.q_unix.path = g_strndup(su->sun_path, sizeof(su->sun_path));
17c55dec
DB
1287 return addr;
1288}
1289#endif /* WIN32 */
1290
6a02c806 1291#ifdef CONFIG_AF_VSOCK
bd269ebc 1292static SocketAddress *
6a02c806
SH
1293socket_sockaddr_to_address_vsock(struct sockaddr_storage *sa,
1294 socklen_t salen,
1295 Error **errp)
1296{
bd269ebc 1297 SocketAddress *addr;
6a02c806
SH
1298 VsockSocketAddress *vaddr;
1299 struct sockaddr_vm *svm = (struct sockaddr_vm *)sa;
1300
bd269ebc
MA
1301 addr = g_new0(SocketAddress, 1);
1302 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1303 vaddr = &addr->u.vsock;
6a02c806
SH
1304 vaddr->cid = g_strdup_printf("%u", svm->svm_cid);
1305 vaddr->port = g_strdup_printf("%u", svm->svm_port);
1306
1307 return addr;
1308}
1309#endif /* CONFIG_AF_VSOCK */
1310
bd269ebc 1311SocketAddress *
17c55dec
DB
1312socket_sockaddr_to_address(struct sockaddr_storage *sa,
1313 socklen_t salen,
1314 Error **errp)
1315{
1316 switch (sa->ss_family) {
1317 case AF_INET:
1318 case AF_INET6:
1319 return socket_sockaddr_to_address_inet(sa, salen, errp);
1320
1321#ifndef WIN32
1322 case AF_UNIX:
1323 return socket_sockaddr_to_address_unix(sa, salen, errp);
1324#endif /* WIN32 */
1325
6a02c806
SH
1326#ifdef CONFIG_AF_VSOCK
1327 case AF_VSOCK:
1328 return socket_sockaddr_to_address_vsock(sa, salen, errp);
1329#endif
1330
17c55dec
DB
1331 default:
1332 error_setg(errp, "socket family %d unsupported",
1333 sa->ss_family);
1334 return NULL;
1335 }
1336 return 0;
1337}
1338
1339
bd269ebc 1340SocketAddress *socket_local_address(int fd, Error **errp)
17c55dec
DB
1341{
1342 struct sockaddr_storage ss;
1343 socklen_t sslen = sizeof(ss);
1344
1345 if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1346 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1347 "Unable to query local socket address");
1348 return NULL;
1349 }
1350
1351 return socket_sockaddr_to_address(&ss, sslen, errp);
1352}
1353
1354
bd269ebc 1355SocketAddress *socket_remote_address(int fd, Error **errp)
17c55dec
DB
1356{
1357 struct sockaddr_storage ss;
1358 socklen_t sslen = sizeof(ss);
1359
1360 if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1361 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1362 "Unable to query remote socket address");
1363 return NULL;
1364 }
1365
1366 return socket_sockaddr_to_address(&ss, sslen, errp);
1367}
2a8e21c7 1368
216411b8 1369
bd269ebc
MA
1370SocketAddress *socket_address_flatten(SocketAddressLegacy *addr_legacy)
1371{
fc0f0059 1372 SocketAddress *addr;
bd269ebc
MA
1373
1374 if (!addr_legacy) {
1375 return NULL;
1376 }
1377
fc0f0059
MA
1378 addr = g_new(SocketAddress, 1);
1379
bd269ebc
MA
1380 switch (addr_legacy->type) {
1381 case SOCKET_ADDRESS_LEGACY_KIND_INET:
1382 addr->type = SOCKET_ADDRESS_TYPE_INET;
1383 QAPI_CLONE_MEMBERS(InetSocketAddress, &addr->u.inet,
1384 addr_legacy->u.inet.data);
1385 break;
1386 case SOCKET_ADDRESS_LEGACY_KIND_UNIX:
1387 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1388 QAPI_CLONE_MEMBERS(UnixSocketAddress, &addr->u.q_unix,
1389 addr_legacy->u.q_unix.data);
1390 break;
1391 case SOCKET_ADDRESS_LEGACY_KIND_VSOCK:
1392 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1393 QAPI_CLONE_MEMBERS(VsockSocketAddress, &addr->u.vsock,
1394 addr_legacy->u.vsock.data);
1395 break;
1396 case SOCKET_ADDRESS_LEGACY_KIND_FD:
1397 addr->type = SOCKET_ADDRESS_TYPE_FD;
1398 QAPI_CLONE_MEMBERS(String, &addr->u.fd, addr_legacy->u.fd.data);
1399 break;
1400 default:
1401 abort();
1402 }
1403
1404 return addr;
1405}