]> git.proxmox.com Git - mirror_qemu.git/blame - util/qemu-sockets.c
vl: make sure char-pty message displayed by moving setbuf to the beginning
[mirror_qemu.git] / util / qemu-sockets.c
CommitLineData
305b0eb2
AL
1/*
2 * inet and unix socket functions for qemu
3 *
4 * (c) 2008 Gerd Hoffmann <kraxel@redhat.com>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 of the License.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
e6d91ab6
PB
14 *
15 * Contributions after 2012-01-13 are licensed under the terms of the
16 * GNU GPL, version 2 or (at your option) any later version.
305b0eb2 17 */
aafd7584 18#include "qemu/osdep.h"
d247d25f 19
6a02c806
SH
20#ifdef CONFIG_AF_VSOCK
21#include <linux/vm_sockets.h>
22#endif /* CONFIG_AF_VSOCK */
23
a8d25326 24#include "qemu-common.h"
83c9089e 25#include "monitor/monitor.h"
bd269ebc 26#include "qapi/clone-visitor.h"
da34e65c 27#include "qapi/error.h"
9af23989 28#include "qapi/qapi-visit-sockets.h"
1de7afc9 29#include "qemu/sockets.h"
1de7afc9 30#include "qemu/main-loop.h"
b3db211f
DB
31#include "qapi/qobject-input-visitor.h"
32#include "qapi/qobject-output-visitor.h"
f348b6d1 33#include "qemu/cutils.h"
d247d25f
AL
34
35#ifndef AI_ADDRCONFIG
36# define AI_ADDRCONFIG 0
37#endif
340849a9 38
3de3d698
WB
39#ifndef AI_V4MAPPED
40# define AI_V4MAPPED 0
41#endif
d247d25f 42
6979a813
DB
43#ifndef AI_NUMERICSERV
44# define AI_NUMERICSERV 0
45#endif
46
2af2bf67 47
d247d25f
AL
48static int inet_getport(struct addrinfo *e)
49{
50 struct sockaddr_in *i4;
51 struct sockaddr_in6 *i6;
52
53 switch (e->ai_family) {
54 case PF_INET6:
55 i6 = (void*)e->ai_addr;
56 return ntohs(i6->sin6_port);
57 case PF_INET:
58 i4 = (void*)e->ai_addr;
59 return ntohs(i4->sin_port);
60 default:
61 return 0;
62 }
63}
64
65static void inet_setport(struct addrinfo *e, int port)
66{
67 struct sockaddr_in *i4;
68 struct sockaddr_in6 *i6;
69
70 switch (e->ai_family) {
71 case PF_INET6:
72 i6 = (void*)e->ai_addr;
73 i6->sin6_port = htons(port);
74 break;
75 case PF_INET:
76 i4 = (void*)e->ai_addr;
77 i4->sin_port = htons(port);
78 break;
79 }
80}
81
a589569f
WX
82NetworkAddressFamily inet_netfamily(int family)
83{
84 switch (family) {
85 case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6;
86 case PF_INET: return NETWORK_ADDRESS_FAMILY_IPV4;
87 case PF_UNIX: return NETWORK_ADDRESS_FAMILY_UNIX;
6a02c806
SH
88#ifdef CONFIG_AF_VSOCK
89 case PF_VSOCK: return NETWORK_ADDRESS_FAMILY_VSOCK;
90#endif /* CONFIG_AF_VSOCK */
a589569f
WX
91 }
92 return NETWORK_ADDRESS_FAMILY_UNKNOWN;
93}
94
58dc31f1
DB
95bool fd_is_socket(int fd)
96{
97 int optval;
98 socklen_t optlen = sizeof(optval);
99 return !qemu_getsockopt(fd, SOL_SOCKET, SO_TYPE, &optval, &optlen);
100}
101
102
1856835d
DB
103/*
104 * Matrix we're trying to apply
105 *
106 * ipv4 ipv6 family
107 * - - PF_UNSPEC
108 * - f PF_INET
109 * - t PF_INET6
110 * f - PF_INET6
111 * f f <error>
112 * f t PF_INET6
113 * t - PF_INET
114 * t f PF_INET
94bc0d19 115 * t t PF_INET6/PF_UNSPEC
1856835d 116 *
d43eda3d 117 * NB, this matrix is only about getting the necessary results
1856835d
DB
118 * from getaddrinfo(). Some of the cases require further work
119 * after reading results from getaddrinfo in order to fully
94bc0d19
DB
120 * apply the logic the end user wants.
121 *
122 * In the first and last cases, we must set IPV6_V6ONLY=0
123 * when binding, to allow a single listener to potentially
124 * accept both IPv4+6 addresses.
1856835d 125 */
c1b412f1
DB
126int inet_ai_family_from_address(InetSocketAddress *addr,
127 Error **errp)
1856835d
DB
128{
129 if (addr->has_ipv6 && addr->has_ipv4 &&
130 !addr->ipv6 && !addr->ipv4) {
131 error_setg(errp, "Cannot disable IPv4 and IPv6 at same time");
132 return PF_UNSPEC;
133 }
94bc0d19
DB
134 if ((addr->has_ipv6 && addr->ipv6) && (addr->has_ipv4 && addr->ipv4)) {
135 /*
136 * Some backends can only do a single listener. In that case
137 * we want empty hostname to resolve to "::" and then use the
138 * flag IPV6_V6ONLY==0 to get both protocols on 1 socket. This
139 * doesn't work for addresses other than "", so they're just
140 * inevitably broken until multiple listeners can be used,
141 * and thus we honour getaddrinfo automatic protocol detection
142 * Once all backends do multi-listener, remove the PF_INET6
143 * branch entirely.
144 */
145 if (!addr->host || g_str_equal(addr->host, "")) {
146 return PF_INET6;
147 } else {
148 return PF_UNSPEC;
149 }
150 }
1856835d
DB
151 if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) {
152 return PF_INET6;
153 }
154 if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) {
155 return PF_INET;
156 }
157 return PF_UNSPEC;
158}
159
39f80521
KO
160static int create_fast_reuse_socket(struct addrinfo *e)
161{
162 int slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol);
163 if (slisten < 0) {
164 return -1;
165 }
166 socket_set_fast_reuse(slisten);
167 return slisten;
168}
169
89382c3d
KO
170static int try_bind(int socket, InetSocketAddress *saddr, struct addrinfo *e)
171{
172#ifndef IPV6_V6ONLY
173 return bind(socket, e->ai_addr, e->ai_addrlen);
174#else
175 /*
176 * Deals with first & last cases in matrix in comment
177 * for inet_ai_family_from_address().
178 */
179 int v6only =
180 ((!saddr->has_ipv4 && !saddr->has_ipv6) ||
181 (saddr->has_ipv4 && saddr->ipv4 &&
182 saddr->has_ipv6 && saddr->ipv6)) ? 0 : 1;
183 int stat;
184
185 rebind:
186 if (e->ai_family == PF_INET6) {
187 qemu_setsockopt(socket, IPPROTO_IPV6, IPV6_V6ONLY, &v6only,
188 sizeof(v6only));
189 }
190
191 stat = bind(socket, e->ai_addr, e->ai_addrlen);
192 if (!stat) {
193 return 0;
194 }
195
196 /* If we got EADDRINUSE from an IPv6 bind & v6only is unset,
197 * it could be that the IPv4 port is already claimed, so retry
198 * with v6only set
199 */
200 if (e->ai_family == PF_INET6 && errno == EADDRINUSE && !v6only) {
201 v6only = 1;
202 goto rebind;
203 }
204 return stat;
205#endif
206}
207
1856835d
DB
208static int inet_listen_saddr(InetSocketAddress *saddr,
209 int port_offset,
1856835d 210 Error **errp)
d247d25f
AL
211{
212 struct addrinfo ai,*res,*e;
d247d25f
AL
213 char port[33];
214 char uaddr[INET6_ADDRSTRLEN+1];
215 char uport[33];
9cf961bb 216 int rc, port_min, port_max, p;
10a7b7e6 217 int slisten = -1;
9cf961bb
KO
218 int saved_errno = 0;
219 bool socket_created = false;
1856835d 220 Error *err = NULL;
d247d25f
AL
221
222 memset(&ai,0, sizeof(ai));
3de3d698 223 ai.ai_flags = AI_PASSIVE;
6979a813
DB
224 if (saddr->has_numeric && saddr->numeric) {
225 ai.ai_flags |= AI_NUMERICHOST | AI_NUMERICSERV;
226 }
1856835d 227 ai.ai_family = inet_ai_family_from_address(saddr, &err);
e5bc776f 228 ai.ai_socktype = SOCK_STREAM;
d247d25f 229
1856835d
DB
230 if (err) {
231 error_propagate(errp, err);
232 return -1;
233 }
234
235 if (saddr->host == NULL) {
0983f5e6 236 error_setg(errp, "host not specified");
e5bc776f 237 return -1;
d247d25f 238 }
1856835d
DB
239 if (saddr->port != NULL) {
240 pstrcpy(port, sizeof(port), saddr->port);
0983f5e6
DB
241 } else {
242 port[0] = '\0';
243 }
d247d25f
AL
244
245 /* lookup */
8bc89127
GH
246 if (port_offset) {
247 unsigned long long baseport;
0983f5e6
DB
248 if (strlen(port) == 0) {
249 error_setg(errp, "port not specified");
250 return -1;
251 }
8bc89127
GH
252 if (parse_uint_full(port, &baseport, 10) < 0) {
253 error_setg(errp, "can't convert to a number: %s", port);
254 return -1;
255 }
256 if (baseport > 65535 ||
257 baseport + port_offset > 65535) {
258 error_setg(errp, "port %s out of range", port);
259 return -1;
260 }
261 snprintf(port, sizeof(port), "%d", (int)baseport + port_offset);
262 }
1856835d 263 rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL,
0983f5e6 264 strlen(port) ? port : NULL, &ai, &res);
d247d25f 265 if (rc != 0) {
1856835d
DB
266 error_setg(errp, "address resolution failed for %s:%s: %s",
267 saddr->host, port, gai_strerror(rc));
d247d25f
AL
268 return -1;
269 }
d247d25f 270
9cf961bb 271 /* create socket + bind/listen */
d247d25f 272 for (e = res; e != NULL; e = e->ai_next) {
39b6efc8 273 getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
7d37435b
PB
274 uaddr,INET6_ADDRSTRLEN,uport,32,
275 NI_NUMERICHOST | NI_NUMERICSERV);
39f80521 276
877691f9 277 port_min = inet_getport(e);
1856835d 278 port_max = saddr->has_to ? saddr->to + port_offset : port_min;
877691f9
MA
279 for (p = port_min; p <= port_max; p++) {
280 inet_setport(e, p);
10a7b7e6
DB
281
282 slisten = create_fast_reuse_socket(e);
283 if (slisten < 0) {
284 /* First time we expect we might fail to create the socket
285 * eg if 'e' has AF_INET6 but ipv6 kmod is not loaded.
286 * Later iterations should always succeed if first iteration
287 * worked though, so treat that as fatal.
288 */
289 if (p == port_min) {
9cf961bb
KO
290 continue;
291 } else {
10a7b7e6
DB
292 error_setg_errno(errp, errno,
293 "Failed to recreate failed listening socket");
9cf961bb 294 goto listen_failed;
029409e5 295 }
d247d25f 296 }
10a7b7e6
DB
297 socket_created = true;
298
299 rc = try_bind(slisten, saddr, e);
300 if (rc < 0) {
301 if (errno != EADDRINUSE) {
302 error_setg_errno(errp, errno, "Failed to bind socket");
303 goto listen_failed;
304 }
305 } else {
306 if (!listen(slisten, 1)) {
307 goto listen_ok;
308 }
309 if (errno != EADDRINUSE) {
310 error_setg_errno(errp, errno, "Failed to listen on socket");
311 goto listen_failed;
312 }
9cf961bb
KO
313 }
314 /* Someone else managed to bind to the same port and beat us
315 * to listen on it! Socket semantics does not allow us to
316 * recover from this situation, so we need to recreate the
317 * socket to allow bind attempts for subsequent ports:
318 */
319 closesocket(slisten);
10a7b7e6 320 slisten = -1;
d247d25f 321 }
9cf961bb
KO
322 }
323 error_setg_errno(errp, errno,
324 socket_created ?
325 "Failed to find an available port" :
326 "Failed to create a socket");
327listen_failed:
328 saved_errno = errno;
329 if (slisten >= 0) {
d247d25f
AL
330 closesocket(slisten);
331 }
d247d25f 332 freeaddrinfo(res);
9cf961bb 333 errno = saved_errno;
d247d25f
AL
334 return -1;
335
9cf961bb 336listen_ok:
d247d25f
AL
337 freeaddrinfo(res);
338 return slisten;
339}
340
05bc1d8a
MT
341#ifdef _WIN32
342#define QEMU_SOCKET_RC_INPROGRESS(rc) \
343 ((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY)
344#else
345#define QEMU_SOCKET_RC_INPROGRESS(rc) \
346 ((rc) == -EINPROGRESS)
347#endif
348
b2587932 349static int inet_connect_addr(struct addrinfo *addr, Error **errp);
233aa5c2 350
b2587932 351static int inet_connect_addr(struct addrinfo *addr, Error **errp)
233aa5c2
OW
352{
353 int sock, rc;
354
05bc1d8a
MT
355 sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
356 if (sock < 0) {
235256a2 357 error_setg_errno(errp, errno, "Failed to create socket");
05bc1d8a
MT
358 return -1;
359 }
04fd1c78 360 socket_set_fast_reuse(sock);
b2587932 361
05bc1d8a
MT
362 /* connect to peer */
363 do {
364 rc = 0;
365 if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) {
b16a44e1 366 rc = -errno;
05bc1d8a
MT
367 }
368 } while (rc == -EINTR);
369
b2587932 370 if (rc < 0) {
235256a2 371 error_setg_errno(errp, errno, "Failed to connect socket");
05bc1d8a
MT
372 closesocket(sock);
373 return -1;
374 }
b2587932 375
05bc1d8a
MT
376 return sock;
377}
378
2942e420
DB
379static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr,
380 Error **errp)
05bc1d8a
MT
381{
382 struct addrinfo ai, *res;
383 int rc;
2942e420 384 Error *err = NULL;
340849a9 385 static int useV4Mapped = 1;
d247d25f 386
05bc1d8a 387 memset(&ai, 0, sizeof(ai));
233aa5c2 388
340849a9
DB
389 ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
390 if (atomic_read(&useV4Mapped)) {
391 ai.ai_flags |= AI_V4MAPPED;
392 }
2942e420 393 ai.ai_family = inet_ai_family_from_address(saddr, &err);
f4c94c7c 394 ai.ai_socktype = SOCK_STREAM;
d247d25f 395
2942e420
DB
396 if (err) {
397 error_propagate(errp, err);
05bc1d8a 398 return NULL;
d247d25f
AL
399 }
400
2942e420
DB
401 if (saddr->host == NULL || saddr->port == NULL) {
402 error_setg(errp, "host and/or port not specified");
403 return NULL;
05bc1d8a 404 }
d247d25f
AL
405
406 /* lookup */
2942e420 407 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
340849a9
DB
408
409 /* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but
410 * then don't implement it in their getaddrinfo(). Detect
411 * this and retry without the flag since that's preferrable
412 * to a fatal error
413 */
414 if (rc == EAI_BADFLAGS &&
415 (ai.ai_flags & AI_V4MAPPED)) {
416 atomic_set(&useV4Mapped, 0);
417 ai.ai_flags &= ~AI_V4MAPPED;
418 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
419 }
05bc1d8a 420 if (rc != 0) {
2942e420
DB
421 error_setg(errp, "address resolution failed for %s:%s: %s",
422 saddr->host, saddr->port, gai_strerror(rc));
05bc1d8a
MT
423 return NULL;
424 }
425 return res;
426}
427
5db5f44c
OW
428/**
429 * Create a socket and connect it to an address.
430 *
2942e420 431 * @saddr: Inet socket address specification
5db5f44c
OW
432 * @errp: set on error
433 *
434 * Returns: -1 on error, file descriptor on success.
435 */
b2587932 436int inet_connect_saddr(InetSocketAddress *saddr, Error **errp)
05bc1d8a 437{
3f9286b7 438 Error *local_err = NULL;
05bc1d8a
MT
439 struct addrinfo *res, *e;
440 int sock = -1;
05bc1d8a 441
2942e420 442 res = inet_parse_connect_saddr(saddr, errp);
05bc1d8a
MT
443 if (!res) {
444 return -1;
445 }
446
d247d25f 447 for (e = res; e != NULL; e = e->ai_next) {
3f9286b7
MA
448 error_free(local_err);
449 local_err = NULL;
b2587932 450 sock = inet_connect_addr(e, &local_err);
3f9286b7 451 if (sock >= 0) {
05bc1d8a 452 break;
a6ba35b3 453 }
d247d25f 454 }
3f9286b7
MA
455
456 if (sock < 0) {
457 error_propagate(errp, local_err);
3f9286b7 458 }
b2587932 459
d247d25f 460 freeaddrinfo(res);
05bc1d8a 461 return sock;
d247d25f
AL
462}
463
8b39910e
DB
464static int inet_dgram_saddr(InetSocketAddress *sraddr,
465 InetSocketAddress *sladdr,
466 Error **errp)
7e1b35b4
GH
467{
468 struct addrinfo ai, *peer = NULL, *local = NULL;
469 const char *addr;
470 const char *port;
7e1b35b4 471 int sock = -1, rc;
8b39910e 472 Error *err = NULL;
7e1b35b4
GH
473
474 /* lookup peer addr */
475 memset(&ai,0, sizeof(ai));
3de3d698 476 ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG;
8b39910e 477 ai.ai_family = inet_ai_family_from_address(sraddr, &err);
7e1b35b4
GH
478 ai.ai_socktype = SOCK_DGRAM;
479
8b39910e
DB
480 if (err) {
481 error_propagate(errp, err);
58c652c0 482 goto err;
8b39910e
DB
483 }
484
485 addr = sraddr->host;
486 port = sraddr->port;
7e1b35b4
GH
487 if (addr == NULL || strlen(addr) == 0) {
488 addr = "localhost";
489 }
490 if (port == NULL || strlen(port) == 0) {
4f085c82 491 error_setg(errp, "remote port not specified");
58c652c0 492 goto err;
7e1b35b4
GH
493 }
494
9cd1883c 495 if ((rc = getaddrinfo(addr, port, &ai, &peer)) != 0) {
4f085c82
PB
496 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
497 gai_strerror(rc));
26015051 498 goto err;
7e1b35b4 499 }
7e1b35b4
GH
500
501 /* lookup local addr */
502 memset(&ai,0, sizeof(ai));
503 ai.ai_flags = AI_PASSIVE;
504 ai.ai_family = peer->ai_family;
505 ai.ai_socktype = SOCK_DGRAM;
506
8b39910e
DB
507 if (sladdr) {
508 addr = sladdr->host;
509 port = sladdr->port;
510 if (addr == NULL || strlen(addr) == 0) {
511 addr = NULL;
512 }
513 if (!port || strlen(port) == 0) {
514 port = "0";
515 }
516 } else {
7e1b35b4 517 addr = NULL;
7e1b35b4 518 port = "0";
8b39910e 519 }
7e1b35b4 520
9cd1883c 521 if ((rc = getaddrinfo(addr, port, &ai, &local)) != 0) {
4f085c82
PB
522 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
523 gai_strerror(rc));
39b38459 524 goto err;
7e1b35b4 525 }
7e1b35b4
GH
526
527 /* create socket */
40ff6d7e 528 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol);
7e1b35b4 529 if (sock < 0) {
235256a2 530 error_setg_errno(errp, errno, "Failed to create socket");
7e1b35b4
GH
531 goto err;
532 }
04fd1c78 533 socket_set_fast_reuse(sock);
7e1b35b4
GH
534
535 /* bind socket */
7e1b35b4 536 if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) {
235256a2 537 error_setg_errno(errp, errno, "Failed to bind socket");
7e1b35b4
GH
538 goto err;
539 }
540
541 /* connect to peer */
7e1b35b4 542 if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) {
235256a2 543 error_setg_errno(errp, errno, "Failed to connect socket");
7e1b35b4
GH
544 goto err;
545 }
546
547 freeaddrinfo(local);
548 freeaddrinfo(peer);
549 return sock;
550
551err:
26015051 552 if (sock != -1) {
7e1b35b4 553 closesocket(sock);
26015051
C
554 }
555 if (local) {
7e1b35b4 556 freeaddrinfo(local);
26015051
C
557 }
558 if (peer) {
7e1b35b4 559 freeaddrinfo(peer);
26015051
C
560 }
561
7e1b35b4
GH
562 return -1;
563}
564
f4c94c7c 565/* compatibility wrapper */
3e32370a
DB
566static int inet_parse_flag(const char *flagname, const char *optstr, bool *val,
567 Error **errp)
568{
569 char *end;
570 size_t len;
571
572 end = strstr(optstr, ",");
573 if (end) {
574 if (end[1] == ',') { /* Reject 'ipv6=on,,foo' */
575 error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
576 return -1;
577 }
578 len = end - optstr;
579 } else {
580 len = strlen(optstr);
581 }
582 if (len == 0 || (len == 3 && strncmp(optstr, "=on", len) == 0)) {
583 *val = true;
584 } else if (len == 4 && strncmp(optstr, "=off", len) == 0) {
585 *val = false;
586 } else {
587 error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
588 return -1;
589 }
590 return 0;
591}
592
0785bd7a 593int inet_parse(InetSocketAddress *addr, const char *str, Error **errp)
f4c94c7c
GH
594{
595 const char *optstr, *h;
55a10996 596 char host[65];
f4c94c7c 597 char port[33];
879e45c7 598 int to;
f4c94c7c 599 int pos;
3e32370a 600 char *begin;
f4c94c7c 601
0785bd7a 602 memset(addr, 0, sizeof(*addr));
879e45c7 603
f4c94c7c
GH
604 /* parse address */
605 if (str[0] == ':') {
606 /* no host given */
879e45c7 607 host[0] = '\0';
9cd1883c 608 if (sscanf(str, ":%32[^,]%n", port, &pos) != 1) {
2f002c43 609 error_setg(errp, "error parsing port in address '%s'", str);
0785bd7a 610 return -1;
f4c94c7c
GH
611 }
612 } else if (str[0] == '[') {
613 /* IPv6 addr */
9cd1883c 614 if (sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 615 error_setg(errp, "error parsing IPv6 address '%s'", str);
0785bd7a 616 return -1;
f4c94c7c 617 }
f4c94c7c 618 } else {
391b7b97 619 /* hostname or IPv4 addr */
9cd1883c 620 if (sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos) != 2) {
2f002c43 621 error_setg(errp, "error parsing address '%s'", str);
0785bd7a 622 return -1;
f4c94c7c
GH
623 }
624 }
879e45c7
PB
625
626 addr->host = g_strdup(host);
627 addr->port = g_strdup(port);
f4c94c7c
GH
628
629 /* parse options */
630 optstr = str + pos;
631 h = strstr(optstr, ",to=");
879e45c7 632 if (h) {
1ccbc285
AP
633 h += 4;
634 if (sscanf(h, "%d%n", &to, &pos) != 1 ||
635 (h[pos] != '\0' && h[pos] != ',')) {
879e45c7 636 error_setg(errp, "error parsing to= argument");
0785bd7a 637 return -1;
879e45c7
PB
638 }
639 addr->has_to = true;
640 addr->to = to;
641 }
3e32370a
DB
642 begin = strstr(optstr, ",ipv4");
643 if (begin) {
644 if (inet_parse_flag("ipv4", begin + 5, &addr->ipv4, errp) < 0) {
645 return -1;
646 }
647 addr->has_ipv4 = true;
879e45c7 648 }
3e32370a
DB
649 begin = strstr(optstr, ",ipv6");
650 if (begin) {
651 if (inet_parse_flag("ipv6", begin + 5, &addr->ipv6, errp) < 0) {
652 return -1;
653 }
654 addr->has_ipv6 = true;
879e45c7 655 }
0785bd7a 656 return 0;
879e45c7
PB
657}
658
e5bc776f 659
5db5f44c
OW
660/**
661 * Create a blocking socket and connect it to an address.
662 *
663 * @str: address string
664 * @errp: set in case of an error
665 *
666 * Returns -1 in case of error, file descriptor on success
667 **/
668int inet_connect(const char *str, Error **errp)
f4c94c7c 669{
f4c94c7c 670 int sock = -1;
0785bd7a 671 InetSocketAddress *addr = g_new(InetSocketAddress, 1);
f4c94c7c 672
0785bd7a 673 if (!inet_parse(addr, str, errp)) {
b2587932 674 sock = inet_connect_saddr(addr, errp);
5db5f44c 675 }
0785bd7a 676 qapi_free_InetSocketAddress(addr);
5db5f44c
OW
677 return sock;
678}
679
6a02c806
SH
680#ifdef CONFIG_AF_VSOCK
681static bool vsock_parse_vaddr_to_sockaddr(const VsockSocketAddress *vaddr,
682 struct sockaddr_vm *svm,
683 Error **errp)
684{
685 unsigned long long val;
686
687 memset(svm, 0, sizeof(*svm));
688 svm->svm_family = AF_VSOCK;
689
690 if (parse_uint_full(vaddr->cid, &val, 10) < 0 ||
691 val > UINT32_MAX) {
692 error_setg(errp, "Failed to parse cid '%s'", vaddr->cid);
693 return false;
694 }
695 svm->svm_cid = val;
696
697 if (parse_uint_full(vaddr->port, &val, 10) < 0 ||
698 val > UINT32_MAX) {
699 error_setg(errp, "Failed to parse port '%s'", vaddr->port);
700 return false;
701 }
702 svm->svm_port = val;
703
704 return true;
705}
706
b2587932 707static int vsock_connect_addr(const struct sockaddr_vm *svm, Error **errp)
6a02c806
SH
708{
709 int sock, rc;
710
6a02c806
SH
711 sock = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
712 if (sock < 0) {
713 error_setg_errno(errp, errno, "Failed to create socket");
714 return -1;
715 }
b2587932 716
6a02c806
SH
717 /* connect to peer */
718 do {
719 rc = 0;
720 if (connect(sock, (const struct sockaddr *)svm, sizeof(*svm)) < 0) {
721 rc = -errno;
722 }
723 } while (rc == -EINTR);
724
b2587932 725 if (rc < 0) {
6a02c806
SH
726 error_setg_errno(errp, errno, "Failed to connect socket");
727 closesocket(sock);
728 return -1;
729 }
b2587932 730
6a02c806
SH
731 return sock;
732}
733
b2587932 734static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
6a02c806
SH
735{
736 struct sockaddr_vm svm;
737 int sock = -1;
6a02c806
SH
738
739 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
740 return -1;
741 }
742
b2587932 743 sock = vsock_connect_addr(&svm, errp);
6a02c806 744
6a02c806
SH
745 return sock;
746}
747
748static int vsock_listen_saddr(VsockSocketAddress *vaddr,
749 Error **errp)
750{
751 struct sockaddr_vm svm;
752 int slisten;
753
754 if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
755 return -1;
756 }
757
758 slisten = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
759 if (slisten < 0) {
760 error_setg_errno(errp, errno, "Failed to create socket");
761 return -1;
762 }
763
764 if (bind(slisten, (const struct sockaddr *)&svm, sizeof(svm)) != 0) {
765 error_setg_errno(errp, errno, "Failed to bind socket");
766 closesocket(slisten);
767 return -1;
768 }
769
770 if (listen(slisten, 1) != 0) {
771 error_setg_errno(errp, errno, "Failed to listen on socket");
772 closesocket(slisten);
773 return -1;
774 }
775 return slisten;
776}
777
4db5c619
MA
778static int vsock_parse(VsockSocketAddress *addr, const char *str,
779 Error **errp)
6a02c806 780{
6a02c806
SH
781 char cid[33];
782 char port[33];
783 int n;
784
785 if (sscanf(str, "%32[^:]:%32[^,]%n", cid, port, &n) != 2) {
786 error_setg(errp, "error parsing address '%s'", str);
4db5c619 787 return -1;
6a02c806
SH
788 }
789 if (str[n] != '\0') {
790 error_setg(errp, "trailing characters in address '%s'", str);
4db5c619 791 return -1;
6a02c806
SH
792 }
793
6a02c806
SH
794 addr->cid = g_strdup(cid);
795 addr->port = g_strdup(port);
4db5c619 796 return 0;
6a02c806
SH
797}
798#else
799static void vsock_unsupported(Error **errp)
800{
801 error_setg(errp, "socket family AF_VSOCK unsupported");
802}
803
b2587932 804static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
6a02c806
SH
805{
806 vsock_unsupported(errp);
807 return -1;
808}
809
810static int vsock_listen_saddr(VsockSocketAddress *vaddr,
811 Error **errp)
812{
813 vsock_unsupported(errp);
814 return -1;
815}
816
4db5c619
MA
817static int vsock_parse(VsockSocketAddress *addr, const char *str,
818 Error **errp)
6a02c806
SH
819{
820 vsock_unsupported(errp);
4db5c619 821 return -1;
6a02c806
SH
822}
823#endif /* CONFIG_AF_VSOCK */
824
d247d25f
AL
825#ifndef _WIN32
826
1856835d 827static int unix_listen_saddr(UnixSocketAddress *saddr,
1856835d 828 Error **errp)
d247d25f
AL
829{
830 struct sockaddr_un un;
62b6adfb 831 int sock, fd;
ad9579aa
DB
832 char *pathbuf = NULL;
833 const char *path;
2d2023c3 834 size_t pathlen;
d247d25f 835
40ff6d7e 836 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 837 if (sock < 0) {
b658c53d 838 error_setg_errno(errp, errno, "Failed to create Unix socket");
39b6efc8 839 return -1;
d247d25f
AL
840 }
841
ad9579aa
DB
842 if (saddr->path && saddr->path[0]) {
843 path = saddr->path;
d247d25f 844 } else {
b658c53d
PB
845 const char *tmpdir = getenv("TMPDIR");
846 tmpdir = tmpdir ? tmpdir : "/tmp";
ad9579aa
DB
847 path = pathbuf = g_strdup_printf("%s/qemu-socket-XXXXXX", tmpdir);
848 }
b658c53d 849
2d2023c3
DB
850 pathlen = strlen(path);
851 if (pathlen > sizeof(un.sun_path)) {
ad9579aa
DB
852 error_setg(errp, "UNIX socket path '%s' is too long", path);
853 error_append_hint(errp, "Path must be less than %zu bytes\n",
854 sizeof(un.sun_path));
855 goto err;
856 }
857
858 if (pathbuf != NULL) {
d247d25f
AL
859 /*
860 * This dummy fd usage silences the mktemp() unsecure warning.
861 * Using mkstemp() doesn't make things more secure here
862 * though. bind() complains about existing files, so we have
863 * to unlink first and thus re-open the race window. The
864 * worst case possible is bind() failing, i.e. a DoS attack.
865 */
ad9579aa 866 fd = mkstemp(pathbuf);
b658c53d
PB
867 if (fd < 0) {
868 error_setg_errno(errp, errno,
ad9579aa 869 "Failed to make a temporary socket %s", pathbuf);
b658c53d
PB
870 goto err;
871 }
872 close(fd);
d247d25f 873 }
d247d25f 874
ad9579aa 875 if (unlink(path) < 0 && errno != ENOENT) {
0ef705a2 876 error_setg_errno(errp, errno,
ad9579aa 877 "Failed to unlink socket %s", path);
0ef705a2
CR
878 goto err;
879 }
ad9579aa
DB
880
881 memset(&un, 0, sizeof(un));
882 un.sun_family = AF_UNIX;
2d2023c3 883 memcpy(un.sun_path, path, pathlen);
ad9579aa 884
d247d25f 885 if (bind(sock, (struct sockaddr*) &un, sizeof(un)) < 0) {
56382bd5 886 error_setg_errno(errp, errno, "Failed to bind socket to %s", path);
d247d25f
AL
887 goto err;
888 }
889 if (listen(sock, 1) < 0) {
235256a2 890 error_setg_errno(errp, errno, "Failed to listen on socket");
d247d25f
AL
891 goto err;
892 }
893
62473511 894 g_free(pathbuf);
d247d25f
AL
895 return sock;
896
897err:
ad9579aa 898 g_free(pathbuf);
d247d25f
AL
899 closesocket(sock);
900 return -1;
901}
902
b2587932 903static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
d247d25f
AL
904{
905 struct sockaddr_un un;
1fc05adf 906 int sock, rc;
2d2023c3 907 size_t pathlen;
d247d25f 908
2942e420 909 if (saddr->path == NULL) {
312fd5f2 910 error_setg(errp, "unix connect: no path specified");
2af2bf67
GH
911 return -1;
912 }
913
40ff6d7e 914 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
d247d25f 915 if (sock < 0) {
235256a2 916 error_setg_errno(errp, errno, "Failed to create socket");
39b6efc8 917 return -1;
d247d25f
AL
918 }
919
2d2023c3
DB
920 pathlen = strlen(saddr->path);
921 if (pathlen > sizeof(un.sun_path)) {
ad9579aa
DB
922 error_setg(errp, "UNIX socket path '%s' is too long", saddr->path);
923 error_append_hint(errp, "Path must be less than %zu bytes\n",
924 sizeof(un.sun_path));
925 goto err;
926 }
927
d247d25f
AL
928 memset(&un, 0, sizeof(un));
929 un.sun_family = AF_UNIX;
2d2023c3 930 memcpy(un.sun_path, saddr->path, pathlen);
1fc05adf
PB
931
932 /* connect to peer */
933 do {
934 rc = 0;
935 if (connect(sock, (struct sockaddr *) &un, sizeof(un)) < 0) {
b16a44e1 936 rc = -errno;
1fc05adf
PB
937 }
938 } while (rc == -EINTR);
939
1fc05adf 940 if (rc < 0) {
ad9579aa
DB
941 error_setg_errno(errp, -rc, "Failed to connect socket %s",
942 saddr->path);
943 goto err;
d247d25f
AL
944 }
945
d247d25f 946 return sock;
ad9579aa
DB
947
948 err:
949 close(sock);
ad9579aa 950 return -1;
d247d25f
AL
951}
952
0c814709
PB
953#else
954
1856835d 955static int unix_listen_saddr(UnixSocketAddress *saddr,
1856835d 956 Error **errp)
0c814709 957{
58899664 958 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
959 errno = ENOTSUP;
960 return -1;
961}
962
b2587932 963static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
0c814709 964{
58899664 965 error_setg(errp, "unix sockets are not available on windows");
0c814709
PB
966 errno = ENOTSUP;
967 return -1;
968}
969#endif
970
2af2bf67 971/* compatibility wrapper */
62473511 972int unix_listen(const char *str, Error **errp)
62b6adfb 973{
1856835d 974 UnixSocketAddress *saddr;
caf88d74 975 int sock;
62b6adfb 976
1856835d 977 saddr = g_new0(UnixSocketAddress, 1);
caf88d74 978 saddr->path = g_strdup(str);
62473511 979 sock = unix_listen_saddr(saddr, errp);
1856835d 980 qapi_free_UnixSocketAddress(saddr);
62b6adfb
GH
981 return sock;
982}
983
7fc4e63e 984int unix_connect(const char *path, Error **errp)
2af2bf67 985{
2942e420 986 UnixSocketAddress *saddr;
2af2bf67
GH
987 int sock;
988
2942e420
DB
989 saddr = g_new0(UnixSocketAddress, 1);
990 saddr->path = g_strdup(path);
b2587932 991 sock = unix_connect_saddr(saddr, errp);
2942e420 992 qapi_free_UnixSocketAddress(saddr);
1fc05adf
PB
993 return sock;
994}
995
996
bd269ebc 997SocketAddress *socket_parse(const char *str, Error **errp)
101f9cbc 998{
bd269ebc 999 SocketAddress *addr;
101f9cbc 1000
bd269ebc 1001 addr = g_new0(SocketAddress, 1);
101f9cbc
PB
1002 if (strstart(str, "unix:", NULL)) {
1003 if (str[5] == '\0') {
312fd5f2 1004 error_setg(errp, "invalid Unix socket address");
101f9cbc
PB
1005 goto fail;
1006 } else {
bd269ebc
MA
1007 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1008 addr->u.q_unix.path = g_strdup(str + 5);
101f9cbc
PB
1009 }
1010 } else if (strstart(str, "fd:", NULL)) {
1011 if (str[3] == '\0') {
312fd5f2 1012 error_setg(errp, "invalid file descriptor address");
101f9cbc
PB
1013 goto fail;
1014 } else {
bd269ebc
MA
1015 addr->type = SOCKET_ADDRESS_TYPE_FD;
1016 addr->u.fd.str = g_strdup(str + 3);
101f9cbc 1017 }
6a02c806 1018 } else if (strstart(str, "vsock:", NULL)) {
bd269ebc
MA
1019 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1020 if (vsock_parse(&addr->u.vsock, str + strlen("vsock:"), errp)) {
6a02c806
SH
1021 goto fail;
1022 }
101f9cbc 1023 } else {
bd269ebc
MA
1024 addr->type = SOCKET_ADDRESS_TYPE_INET;
1025 if (inet_parse(&addr->u.inet, str, errp)) {
101f9cbc
PB
1026 goto fail;
1027 }
1028 }
1029 return addr;
1030
1031fail:
bd269ebc 1032 qapi_free_SocketAddress(addr);
101f9cbc
PB
1033 return NULL;
1034}
1035
30bdb3c5
DB
1036static int socket_get_fd(const char *fdstr, Error **errp)
1037{
1723d6b1
DB
1038 int fd;
1039 if (cur_mon) {
1040 fd = monitor_get_fd(cur_mon, fdstr, errp);
1041 if (fd < 0) {
1042 return -1;
1043 }
1044 } else {
1045 if (qemu_strtoi(fdstr, NULL, 10, &fd) < 0) {
1046 error_setg_errno(errp, errno,
1047 "Unable to parse FD number %s",
1048 fdstr);
1049 return -1;
1050 }
30bdb3c5
DB
1051 }
1052 if (!fd_is_socket(fd)) {
1053 error_setg(errp, "File descriptor '%s' is not a socket", fdstr);
1054 close(fd);
1055 return -1;
1056 }
1057 return fd;
1058}
1059
b2587932 1060int socket_connect(SocketAddress *addr, Error **errp)
101f9cbc 1061{
101f9cbc
PB
1062 int fd;
1063
2d32adda 1064 switch (addr->type) {
bd269ebc 1065 case SOCKET_ADDRESS_TYPE_INET:
b2587932 1066 fd = inet_connect_saddr(&addr->u.inet, errp);
101f9cbc
PB
1067 break;
1068
bd269ebc 1069 case SOCKET_ADDRESS_TYPE_UNIX:
b2587932 1070 fd = unix_connect_saddr(&addr->u.q_unix, errp);
101f9cbc
PB
1071 break;
1072
bd269ebc 1073 case SOCKET_ADDRESS_TYPE_FD:
30bdb3c5 1074 fd = socket_get_fd(addr->u.fd.str, errp);
101f9cbc
PB
1075 break;
1076
bd269ebc 1077 case SOCKET_ADDRESS_TYPE_VSOCK:
b2587932 1078 fd = vsock_connect_saddr(&addr->u.vsock, errp);
6a02c806
SH
1079 break;
1080
101f9cbc
PB
1081 default:
1082 abort();
1083 }
101f9cbc
PB
1084 return fd;
1085}
1086
bd269ebc 1087int socket_listen(SocketAddress *addr, Error **errp)
101f9cbc 1088{
101f9cbc
PB
1089 int fd;
1090
2d32adda 1091 switch (addr->type) {
bd269ebc 1092 case SOCKET_ADDRESS_TYPE_INET:
62473511 1093 fd = inet_listen_saddr(&addr->u.inet, 0, errp);
101f9cbc
PB
1094 break;
1095
bd269ebc 1096 case SOCKET_ADDRESS_TYPE_UNIX:
62473511 1097 fd = unix_listen_saddr(&addr->u.q_unix, errp);
101f9cbc
PB
1098 break;
1099
bd269ebc 1100 case SOCKET_ADDRESS_TYPE_FD:
30bdb3c5 1101 fd = socket_get_fd(addr->u.fd.str, errp);
101f9cbc
PB
1102 break;
1103
bd269ebc
MA
1104 case SOCKET_ADDRESS_TYPE_VSOCK:
1105 fd = vsock_listen_saddr(&addr->u.vsock, errp);
6a02c806
SH
1106 break;
1107
101f9cbc
PB
1108 default:
1109 abort();
1110 }
101f9cbc
PB
1111 return fd;
1112}
1113
74b6ce43
MAL
1114void socket_listen_cleanup(int fd, Error **errp)
1115{
bd269ebc 1116 SocketAddress *addr;
74b6ce43
MAL
1117
1118 addr = socket_local_address(fd, errp);
2d7ad7c0
DB
1119 if (!addr) {
1120 return;
1121 }
74b6ce43 1122
bd269ebc
MA
1123 if (addr->type == SOCKET_ADDRESS_TYPE_UNIX
1124 && addr->u.q_unix.path) {
1125 if (unlink(addr->u.q_unix.path) < 0 && errno != ENOENT) {
74b6ce43
MAL
1126 error_setg_errno(errp, errno,
1127 "Failed to unlink socket %s",
bd269ebc 1128 addr->u.q_unix.path);
74b6ce43
MAL
1129 }
1130 }
1131
bd269ebc 1132 qapi_free_SocketAddress(addr);
74b6ce43
MAL
1133}
1134
bd269ebc 1135int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp)
3ecc059d 1136{
3ecc059d
GH
1137 int fd;
1138
ca0b64e5 1139 /*
bd269ebc 1140 * TODO SOCKET_ADDRESS_TYPE_FD when fd is AF_INET or AF_INET6
ca0b64e5
MA
1141 * (although other address families can do SOCK_DGRAM, too)
1142 */
2d32adda 1143 switch (remote->type) {
bd269ebc
MA
1144 case SOCKET_ADDRESS_TYPE_INET:
1145 fd = inet_dgram_saddr(&remote->u.inet,
1146 local ? &local->u.inet : NULL, errp);
3ecc059d
GH
1147 break;
1148
1149 default:
1150 error_setg(errp, "socket type unsupported for datagram");
7a5b6af1 1151 fd = -1;
3ecc059d 1152 }
3ecc059d
GH
1153 return fd;
1154}
17c55dec
DB
1155
1156
bd269ebc 1157static SocketAddress *
17c55dec
DB
1158socket_sockaddr_to_address_inet(struct sockaddr_storage *sa,
1159 socklen_t salen,
1160 Error **errp)
1161{
1162 char host[NI_MAXHOST];
1163 char serv[NI_MAXSERV];
bd269ebc 1164 SocketAddress *addr;
0399293e 1165 InetSocketAddress *inet;
17c55dec
DB
1166 int ret;
1167
1168 ret = getnameinfo((struct sockaddr *)sa, salen,
1169 host, sizeof(host),
1170 serv, sizeof(serv),
1171 NI_NUMERICHOST | NI_NUMERICSERV);
1172 if (ret != 0) {
1173 error_setg(errp, "Cannot format numeric socket address: %s",
1174 gai_strerror(ret));
1175 return NULL;
1176 }
1177
bd269ebc
MA
1178 addr = g_new0(SocketAddress, 1);
1179 addr->type = SOCKET_ADDRESS_TYPE_INET;
1180 inet = &addr->u.inet;
0399293e
EB
1181 inet->host = g_strdup(host);
1182 inet->port = g_strdup(serv);
17c55dec 1183 if (sa->ss_family == AF_INET) {
0399293e 1184 inet->has_ipv4 = inet->ipv4 = true;
17c55dec 1185 } else {
0399293e 1186 inet->has_ipv6 = inet->ipv6 = true;
17c55dec
DB
1187 }
1188
1189 return addr;
1190}
1191
1192
1193#ifndef WIN32
bd269ebc 1194static SocketAddress *
17c55dec
DB
1195socket_sockaddr_to_address_unix(struct sockaddr_storage *sa,
1196 socklen_t salen,
1197 Error **errp)
1198{
bd269ebc 1199 SocketAddress *addr;
17c55dec
DB
1200 struct sockaddr_un *su = (struct sockaddr_un *)sa;
1201
bd269ebc
MA
1202 addr = g_new0(SocketAddress, 1);
1203 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
17c55dec 1204 if (su->sun_path[0]) {
bd269ebc 1205 addr->u.q_unix.path = g_strndup(su->sun_path, sizeof(su->sun_path));
17c55dec
DB
1206 }
1207
1208 return addr;
1209}
1210#endif /* WIN32 */
1211
6a02c806 1212#ifdef CONFIG_AF_VSOCK
bd269ebc 1213static SocketAddress *
6a02c806
SH
1214socket_sockaddr_to_address_vsock(struct sockaddr_storage *sa,
1215 socklen_t salen,
1216 Error **errp)
1217{
bd269ebc 1218 SocketAddress *addr;
6a02c806
SH
1219 VsockSocketAddress *vaddr;
1220 struct sockaddr_vm *svm = (struct sockaddr_vm *)sa;
1221
bd269ebc
MA
1222 addr = g_new0(SocketAddress, 1);
1223 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1224 vaddr = &addr->u.vsock;
6a02c806
SH
1225 vaddr->cid = g_strdup_printf("%u", svm->svm_cid);
1226 vaddr->port = g_strdup_printf("%u", svm->svm_port);
1227
1228 return addr;
1229}
1230#endif /* CONFIG_AF_VSOCK */
1231
bd269ebc 1232SocketAddress *
17c55dec
DB
1233socket_sockaddr_to_address(struct sockaddr_storage *sa,
1234 socklen_t salen,
1235 Error **errp)
1236{
1237 switch (sa->ss_family) {
1238 case AF_INET:
1239 case AF_INET6:
1240 return socket_sockaddr_to_address_inet(sa, salen, errp);
1241
1242#ifndef WIN32
1243 case AF_UNIX:
1244 return socket_sockaddr_to_address_unix(sa, salen, errp);
1245#endif /* WIN32 */
1246
6a02c806
SH
1247#ifdef CONFIG_AF_VSOCK
1248 case AF_VSOCK:
1249 return socket_sockaddr_to_address_vsock(sa, salen, errp);
1250#endif
1251
17c55dec
DB
1252 default:
1253 error_setg(errp, "socket family %d unsupported",
1254 sa->ss_family);
1255 return NULL;
1256 }
1257 return 0;
1258}
1259
1260
bd269ebc 1261SocketAddress *socket_local_address(int fd, Error **errp)
17c55dec
DB
1262{
1263 struct sockaddr_storage ss;
1264 socklen_t sslen = sizeof(ss);
1265
1266 if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1267 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1268 "Unable to query local socket address");
1269 return NULL;
1270 }
1271
1272 return socket_sockaddr_to_address(&ss, sslen, errp);
1273}
1274
1275
bd269ebc 1276SocketAddress *socket_remote_address(int fd, Error **errp)
17c55dec
DB
1277{
1278 struct sockaddr_storage ss;
1279 socklen_t sslen = sizeof(ss);
1280
1281 if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) {
b16a44e1 1282 error_setg_errno(errp, errno, "%s",
17c55dec
DB
1283 "Unable to query remote socket address");
1284 return NULL;
1285 }
1286
1287 return socket_sockaddr_to_address(&ss, sslen, errp);
1288}
2a8e21c7 1289
216411b8 1290
bd269ebc
MA
1291SocketAddress *socket_address_flatten(SocketAddressLegacy *addr_legacy)
1292{
fc0f0059 1293 SocketAddress *addr;
bd269ebc
MA
1294
1295 if (!addr_legacy) {
1296 return NULL;
1297 }
1298
fc0f0059
MA
1299 addr = g_new(SocketAddress, 1);
1300
bd269ebc
MA
1301 switch (addr_legacy->type) {
1302 case SOCKET_ADDRESS_LEGACY_KIND_INET:
1303 addr->type = SOCKET_ADDRESS_TYPE_INET;
1304 QAPI_CLONE_MEMBERS(InetSocketAddress, &addr->u.inet,
1305 addr_legacy->u.inet.data);
1306 break;
1307 case SOCKET_ADDRESS_LEGACY_KIND_UNIX:
1308 addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1309 QAPI_CLONE_MEMBERS(UnixSocketAddress, &addr->u.q_unix,
1310 addr_legacy->u.q_unix.data);
1311 break;
1312 case SOCKET_ADDRESS_LEGACY_KIND_VSOCK:
1313 addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1314 QAPI_CLONE_MEMBERS(VsockSocketAddress, &addr->u.vsock,
1315 addr_legacy->u.vsock.data);
1316 break;
1317 case SOCKET_ADDRESS_LEGACY_KIND_FD:
1318 addr->type = SOCKET_ADDRESS_TYPE_FD;
1319 QAPI_CLONE_MEMBERS(String, &addr->u.fd, addr_legacy->u.fd.data);
1320 break;
1321 default:
1322 abort();
1323 }
1324
1325 return addr;
1326}