2
0

qemu-sockets.c 39 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474
  1. /*
  2. * inet and unix socket functions for qemu
  3. *
  4. * (c) 2008 Gerd Hoffmann <kraxel@redhat.com>
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License as published by
  8. * the Free Software Foundation; under version 2 of the License.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * Contributions after 2012-01-13 are licensed under the terms of the
  16. * GNU GPL, version 2 or (at your option) any later version.
  17. */
  18. #include "qemu/osdep.h"
  19. #ifdef CONFIG_AF_VSOCK
  20. #include <linux/vm_sockets.h>
  21. #endif /* CONFIG_AF_VSOCK */
  22. #include "monitor/monitor.h"
  23. #include "qapi/clone-visitor.h"
  24. #include "qapi/error.h"
  25. #include "qapi/qapi-visit-sockets.h"
  26. #include "qemu/sockets.h"
  27. #include "qemu/main-loop.h"
  28. #include "qapi/qobject-input-visitor.h"
  29. #include "qapi/qobject-output-visitor.h"
  30. #include "qemu/cutils.h"
  31. #include "trace.h"
  32. #ifndef AI_ADDRCONFIG
  33. # define AI_ADDRCONFIG 0
  34. #endif
  35. #ifndef AI_V4MAPPED
  36. # define AI_V4MAPPED 0
  37. #endif
  38. #ifndef AI_NUMERICSERV
  39. # define AI_NUMERICSERV 0
  40. #endif
  41. static int inet_getport(struct addrinfo *e)
  42. {
  43. struct sockaddr_in *i4;
  44. struct sockaddr_in6 *i6;
  45. switch (e->ai_family) {
  46. case PF_INET6:
  47. i6 = (void*)e->ai_addr;
  48. return ntohs(i6->sin6_port);
  49. case PF_INET:
  50. i4 = (void*)e->ai_addr;
  51. return ntohs(i4->sin_port);
  52. default:
  53. return 0;
  54. }
  55. }
  56. static void inet_setport(struct addrinfo *e, int port)
  57. {
  58. struct sockaddr_in *i4;
  59. struct sockaddr_in6 *i6;
  60. switch (e->ai_family) {
  61. case PF_INET6:
  62. i6 = (void*)e->ai_addr;
  63. i6->sin6_port = htons(port);
  64. break;
  65. case PF_INET:
  66. i4 = (void*)e->ai_addr;
  67. i4->sin_port = htons(port);
  68. break;
  69. }
  70. }
  71. NetworkAddressFamily inet_netfamily(int family)
  72. {
  73. switch (family) {
  74. case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6;
  75. case PF_INET: return NETWORK_ADDRESS_FAMILY_IPV4;
  76. case PF_UNIX: return NETWORK_ADDRESS_FAMILY_UNIX;
  77. #ifdef CONFIG_AF_VSOCK
  78. case PF_VSOCK: return NETWORK_ADDRESS_FAMILY_VSOCK;
  79. #endif /* CONFIG_AF_VSOCK */
  80. }
  81. return NETWORK_ADDRESS_FAMILY_UNKNOWN;
  82. }
  83. bool fd_is_socket(int fd)
  84. {
  85. int optval;
  86. socklen_t optlen = sizeof(optval);
  87. return !getsockopt(fd, SOL_SOCKET, SO_TYPE, &optval, &optlen);
  88. }
  89. /*
  90. * Matrix we're trying to apply
  91. *
  92. * ipv4 ipv6 family
  93. * - - PF_UNSPEC
  94. * - f PF_INET
  95. * - t PF_INET6
  96. * f - PF_INET6
  97. * f f <error>
  98. * f t PF_INET6
  99. * t - PF_INET
  100. * t f PF_INET
  101. * t t PF_INET6/PF_UNSPEC
  102. *
  103. * NB, this matrix is only about getting the necessary results
  104. * from getaddrinfo(). Some of the cases require further work
  105. * after reading results from getaddrinfo in order to fully
  106. * apply the logic the end user wants.
  107. *
  108. * In the first and last cases, we must set IPV6_V6ONLY=0
  109. * when binding, to allow a single listener to potentially
  110. * accept both IPv4+6 addresses.
  111. */
  112. int inet_ai_family_from_address(InetSocketAddress *addr,
  113. Error **errp)
  114. {
  115. if (addr->has_ipv6 && addr->has_ipv4 &&
  116. !addr->ipv6 && !addr->ipv4) {
  117. error_setg(errp, "Cannot disable IPv4 and IPv6 at same time");
  118. return PF_UNSPEC;
  119. }
  120. if ((addr->has_ipv6 && addr->ipv6) && (addr->has_ipv4 && addr->ipv4)) {
  121. /*
  122. * Some backends can only do a single listener. In that case
  123. * we want empty hostname to resolve to "::" and then use the
  124. * flag IPV6_V6ONLY==0 to get both protocols on 1 socket. This
  125. * doesn't work for addresses other than "", so they're just
  126. * inevitably broken until multiple listeners can be used,
  127. * and thus we honour getaddrinfo automatic protocol detection
  128. * Once all backends do multi-listener, remove the PF_INET6
  129. * branch entirely.
  130. */
  131. if (!addr->host || g_str_equal(addr->host, "")) {
  132. return PF_INET6;
  133. } else {
  134. return PF_UNSPEC;
  135. }
  136. }
  137. if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) {
  138. return PF_INET6;
  139. }
  140. if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) {
  141. return PF_INET;
  142. }
  143. return PF_UNSPEC;
  144. }
  145. static int create_fast_reuse_socket(struct addrinfo *e)
  146. {
  147. int slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol);
  148. if (slisten < 0) {
  149. return -1;
  150. }
  151. socket_set_fast_reuse(slisten);
  152. return slisten;
  153. }
  154. static int try_bind(int socket, InetSocketAddress *saddr, struct addrinfo *e)
  155. {
  156. #ifndef IPV6_V6ONLY
  157. return bind(socket, e->ai_addr, e->ai_addrlen);
  158. #else
  159. /*
  160. * Deals with first & last cases in matrix in comment
  161. * for inet_ai_family_from_address().
  162. */
  163. int v6only =
  164. ((!saddr->has_ipv4 && !saddr->has_ipv6) ||
  165. (saddr->has_ipv4 && saddr->ipv4 &&
  166. saddr->has_ipv6 && saddr->ipv6)) ? 0 : 1;
  167. int stat;
  168. rebind:
  169. if (e->ai_family == PF_INET6) {
  170. setsockopt(socket, IPPROTO_IPV6, IPV6_V6ONLY, &v6only,
  171. sizeof(v6only));
  172. }
  173. stat = bind(socket, e->ai_addr, e->ai_addrlen);
  174. if (!stat) {
  175. return 0;
  176. }
  177. /* If we got EADDRINUSE from an IPv6 bind & v6only is unset,
  178. * it could be that the IPv4 port is already claimed, so retry
  179. * with v6only set
  180. */
  181. if (e->ai_family == PF_INET6 && errno == EADDRINUSE && !v6only) {
  182. v6only = 1;
  183. goto rebind;
  184. }
  185. return stat;
  186. #endif
  187. }
  188. static int inet_listen_saddr(InetSocketAddress *saddr,
  189. int port_offset,
  190. int num,
  191. Error **errp)
  192. {
  193. ERRP_GUARD();
  194. struct addrinfo ai, *res, *e;
  195. char port[33];
  196. char uaddr[INET6_ADDRSTRLEN+1];
  197. char uport[33];
  198. int rc, port_min, port_max, p;
  199. int slisten = -1;
  200. int saved_errno = 0;
  201. bool socket_created = false;
  202. if (saddr->keep_alive) {
  203. error_setg(errp, "keep-alive option is not supported for passive "
  204. "sockets");
  205. return -1;
  206. }
  207. memset(&ai,0, sizeof(ai));
  208. ai.ai_flags = AI_PASSIVE;
  209. if (saddr->has_numeric && saddr->numeric) {
  210. ai.ai_flags |= AI_NUMERICHOST | AI_NUMERICSERV;
  211. }
  212. ai.ai_socktype = SOCK_STREAM;
  213. ai.ai_family = inet_ai_family_from_address(saddr, errp);
  214. if (*errp) {
  215. return -1;
  216. }
  217. if (saddr->host == NULL) {
  218. error_setg(errp, "host not specified");
  219. return -1;
  220. }
  221. if (saddr->port != NULL) {
  222. pstrcpy(port, sizeof(port), saddr->port);
  223. } else {
  224. port[0] = '\0';
  225. }
  226. /* lookup */
  227. if (port_offset) {
  228. unsigned long long baseport;
  229. if (strlen(port) == 0) {
  230. error_setg(errp, "port not specified");
  231. return -1;
  232. }
  233. if (parse_uint_full(port, &baseport, 10) < 0) {
  234. error_setg(errp, "can't convert to a number: %s", port);
  235. return -1;
  236. }
  237. if (baseport > 65535 ||
  238. baseport + port_offset > 65535) {
  239. error_setg(errp, "port %s out of range", port);
  240. return -1;
  241. }
  242. snprintf(port, sizeof(port), "%d", (int)baseport + port_offset);
  243. }
  244. rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL,
  245. strlen(port) ? port : NULL, &ai, &res);
  246. if (rc != 0) {
  247. error_setg(errp, "address resolution failed for %s:%s: %s",
  248. saddr->host, port, gai_strerror(rc));
  249. return -1;
  250. }
  251. /* create socket + bind/listen */
  252. for (e = res; e != NULL; e = e->ai_next) {
  253. #ifdef HAVE_IPPROTO_MPTCP
  254. if (saddr->has_mptcp && saddr->mptcp) {
  255. e->ai_protocol = IPPROTO_MPTCP;
  256. }
  257. #endif
  258. getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
  259. uaddr,INET6_ADDRSTRLEN,uport,32,
  260. NI_NUMERICHOST | NI_NUMERICSERV);
  261. port_min = inet_getport(e);
  262. port_max = saddr->has_to ? saddr->to + port_offset : port_min;
  263. for (p = port_min; p <= port_max; p++) {
  264. inet_setport(e, p);
  265. slisten = create_fast_reuse_socket(e);
  266. if (slisten < 0) {
  267. /* First time we expect we might fail to create the socket
  268. * eg if 'e' has AF_INET6 but ipv6 kmod is not loaded.
  269. * Later iterations should always succeed if first iteration
  270. * worked though, so treat that as fatal.
  271. */
  272. if (p == port_min) {
  273. continue;
  274. } else {
  275. error_setg_errno(errp, errno,
  276. "Failed to recreate failed listening socket");
  277. goto listen_failed;
  278. }
  279. }
  280. socket_created = true;
  281. rc = try_bind(slisten, saddr, e);
  282. if (rc < 0) {
  283. if (errno != EADDRINUSE) {
  284. error_setg_errno(errp, errno, "Failed to bind socket");
  285. goto listen_failed;
  286. }
  287. } else {
  288. if (!listen(slisten, num)) {
  289. goto listen_ok;
  290. }
  291. if (errno != EADDRINUSE) {
  292. error_setg_errno(errp, errno, "Failed to listen on socket");
  293. goto listen_failed;
  294. }
  295. }
  296. /* Someone else managed to bind to the same port and beat us
  297. * to listen on it! Socket semantics does not allow us to
  298. * recover from this situation, so we need to recreate the
  299. * socket to allow bind attempts for subsequent ports:
  300. */
  301. close(slisten);
  302. slisten = -1;
  303. }
  304. }
  305. error_setg_errno(errp, errno,
  306. socket_created ?
  307. "Failed to find an available port" :
  308. "Failed to create a socket");
  309. listen_failed:
  310. saved_errno = errno;
  311. if (slisten >= 0) {
  312. close(slisten);
  313. }
  314. freeaddrinfo(res);
  315. errno = saved_errno;
  316. return -1;
  317. listen_ok:
  318. freeaddrinfo(res);
  319. return slisten;
  320. }
  321. #ifdef _WIN32
  322. #define QEMU_SOCKET_RC_INPROGRESS(rc) \
  323. ((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY)
  324. #else
  325. #define QEMU_SOCKET_RC_INPROGRESS(rc) \
  326. ((rc) == -EINPROGRESS)
  327. #endif
  328. static int inet_connect_addr(const InetSocketAddress *saddr,
  329. struct addrinfo *addr, Error **errp)
  330. {
  331. int sock, rc;
  332. sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
  333. if (sock < 0) {
  334. error_setg_errno(errp, errno, "Failed to create socket family %d",
  335. addr->ai_family);
  336. return -1;
  337. }
  338. socket_set_fast_reuse(sock);
  339. /* connect to peer */
  340. do {
  341. rc = 0;
  342. if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) {
  343. rc = -errno;
  344. }
  345. } while (rc == -EINTR);
  346. if (rc < 0) {
  347. error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
  348. saddr->host, saddr->port);
  349. close(sock);
  350. return -1;
  351. }
  352. return sock;
  353. }
  354. static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr,
  355. Error **errp)
  356. {
  357. ERRP_GUARD();
  358. struct addrinfo ai, *res;
  359. int rc;
  360. static int useV4Mapped = 1;
  361. memset(&ai, 0, sizeof(ai));
  362. ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
  363. if (qatomic_read(&useV4Mapped)) {
  364. ai.ai_flags |= AI_V4MAPPED;
  365. }
  366. ai.ai_socktype = SOCK_STREAM;
  367. ai.ai_family = inet_ai_family_from_address(saddr, errp);
  368. if (*errp) {
  369. return NULL;
  370. }
  371. if (saddr->host == NULL || saddr->port == NULL) {
  372. error_setg(errp, "host and/or port not specified");
  373. return NULL;
  374. }
  375. /* lookup */
  376. rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
  377. /* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but
  378. * then don't implement it in their getaddrinfo(). Detect
  379. * this and retry without the flag since that's preferable
  380. * to a fatal error
  381. */
  382. if (rc == EAI_BADFLAGS &&
  383. (ai.ai_flags & AI_V4MAPPED)) {
  384. qatomic_set(&useV4Mapped, 0);
  385. ai.ai_flags &= ~AI_V4MAPPED;
  386. rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
  387. }
  388. if (rc != 0) {
  389. error_setg(errp, "address resolution failed for %s:%s: %s",
  390. saddr->host, saddr->port, gai_strerror(rc));
  391. return NULL;
  392. }
  393. return res;
  394. }
  395. /**
  396. * Create a socket and connect it to an address.
  397. *
  398. * @saddr: Inet socket address specification
  399. * @errp: set on error
  400. *
  401. * Returns: -1 on error, file descriptor on success.
  402. */
  403. int inet_connect_saddr(InetSocketAddress *saddr, Error **errp)
  404. {
  405. Error *local_err = NULL;
  406. struct addrinfo *res, *e;
  407. int sock = -1;
  408. res = inet_parse_connect_saddr(saddr, errp);
  409. if (!res) {
  410. return -1;
  411. }
  412. for (e = res; e != NULL; e = e->ai_next) {
  413. error_free(local_err);
  414. local_err = NULL;
  415. #ifdef HAVE_IPPROTO_MPTCP
  416. if (saddr->has_mptcp && saddr->mptcp) {
  417. e->ai_protocol = IPPROTO_MPTCP;
  418. }
  419. #endif
  420. sock = inet_connect_addr(saddr, e, &local_err);
  421. if (sock >= 0) {
  422. break;
  423. }
  424. }
  425. freeaddrinfo(res);
  426. if (sock < 0) {
  427. error_propagate(errp, local_err);
  428. return sock;
  429. }
  430. if (saddr->keep_alive) {
  431. int val = 1;
  432. int ret = setsockopt(sock, SOL_SOCKET, SO_KEEPALIVE,
  433. &val, sizeof(val));
  434. if (ret < 0) {
  435. error_setg_errno(errp, errno, "Unable to set KEEPALIVE");
  436. close(sock);
  437. return -1;
  438. }
  439. }
  440. return sock;
  441. }
  442. static int inet_dgram_saddr(InetSocketAddress *sraddr,
  443. InetSocketAddress *sladdr,
  444. Error **errp)
  445. {
  446. ERRP_GUARD();
  447. struct addrinfo ai, *peer = NULL, *local = NULL;
  448. const char *addr;
  449. const char *port;
  450. int sock = -1, rc;
  451. /* lookup peer addr */
  452. memset(&ai,0, sizeof(ai));
  453. ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG;
  454. ai.ai_socktype = SOCK_DGRAM;
  455. ai.ai_family = inet_ai_family_from_address(sraddr, errp);
  456. if (*errp) {
  457. goto err;
  458. }
  459. addr = sraddr->host;
  460. port = sraddr->port;
  461. if (addr == NULL || strlen(addr) == 0) {
  462. addr = "localhost";
  463. }
  464. if (port == NULL || strlen(port) == 0) {
  465. error_setg(errp, "remote port not specified");
  466. goto err;
  467. }
  468. if ((rc = getaddrinfo(addr, port, &ai, &peer)) != 0) {
  469. error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
  470. gai_strerror(rc));
  471. goto err;
  472. }
  473. /* lookup local addr */
  474. memset(&ai,0, sizeof(ai));
  475. ai.ai_flags = AI_PASSIVE;
  476. ai.ai_family = peer->ai_family;
  477. ai.ai_socktype = SOCK_DGRAM;
  478. if (sladdr) {
  479. addr = sladdr->host;
  480. port = sladdr->port;
  481. if (addr == NULL || strlen(addr) == 0) {
  482. addr = NULL;
  483. }
  484. if (!port || strlen(port) == 0) {
  485. port = "0";
  486. }
  487. } else {
  488. addr = NULL;
  489. port = "0";
  490. }
  491. if ((rc = getaddrinfo(addr, port, &ai, &local)) != 0) {
  492. error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
  493. gai_strerror(rc));
  494. goto err;
  495. }
  496. /* create socket */
  497. sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol);
  498. if (sock < 0) {
  499. error_setg_errno(errp, errno, "Failed to create socket family %d",
  500. peer->ai_family);
  501. goto err;
  502. }
  503. socket_set_fast_reuse(sock);
  504. /* bind socket */
  505. if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) {
  506. error_setg_errno(errp, errno, "Failed to bind socket");
  507. goto err;
  508. }
  509. /* connect to peer */
  510. if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) {
  511. error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
  512. addr, port);
  513. goto err;
  514. }
  515. freeaddrinfo(local);
  516. freeaddrinfo(peer);
  517. return sock;
  518. err:
  519. if (sock != -1) {
  520. close(sock);
  521. }
  522. if (local) {
  523. freeaddrinfo(local);
  524. }
  525. if (peer) {
  526. freeaddrinfo(peer);
  527. }
  528. return -1;
  529. }
  530. /* compatibility wrapper */
  531. static int inet_parse_flag(const char *flagname, const char *optstr, bool *val,
  532. Error **errp)
  533. {
  534. char *end;
  535. size_t len;
  536. end = strstr(optstr, ",");
  537. if (end) {
  538. if (end[1] == ',') { /* Reject 'ipv6=on,,foo' */
  539. error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
  540. return -1;
  541. }
  542. len = end - optstr;
  543. } else {
  544. len = strlen(optstr);
  545. }
  546. if (len == 0 || (len == 3 && strncmp(optstr, "=on", len) == 0)) {
  547. *val = true;
  548. } else if (len == 4 && strncmp(optstr, "=off", len) == 0) {
  549. *val = false;
  550. } else {
  551. error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
  552. return -1;
  553. }
  554. return 0;
  555. }
  556. int inet_parse(InetSocketAddress *addr, const char *str, Error **errp)
  557. {
  558. const char *optstr, *h;
  559. char host[65];
  560. char port[33];
  561. int to;
  562. int pos;
  563. char *begin;
  564. memset(addr, 0, sizeof(*addr));
  565. /* parse address */
  566. if (str[0] == ':') {
  567. /* no host given */
  568. host[0] = '\0';
  569. if (sscanf(str, ":%32[^,]%n", port, &pos) != 1) {
  570. error_setg(errp, "error parsing port in address '%s'", str);
  571. return -1;
  572. }
  573. } else if (str[0] == '[') {
  574. /* IPv6 addr */
  575. if (sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos) != 2) {
  576. error_setg(errp, "error parsing IPv6 address '%s'", str);
  577. return -1;
  578. }
  579. } else {
  580. /* hostname or IPv4 addr */
  581. if (sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos) != 2) {
  582. error_setg(errp, "error parsing address '%s'", str);
  583. return -1;
  584. }
  585. }
  586. addr->host = g_strdup(host);
  587. addr->port = g_strdup(port);
  588. /* parse options */
  589. optstr = str + pos;
  590. h = strstr(optstr, ",to=");
  591. if (h) {
  592. h += 4;
  593. if (sscanf(h, "%d%n", &to, &pos) != 1 ||
  594. (h[pos] != '\0' && h[pos] != ',')) {
  595. error_setg(errp, "error parsing to= argument");
  596. return -1;
  597. }
  598. addr->has_to = true;
  599. addr->to = to;
  600. }
  601. begin = strstr(optstr, ",ipv4");
  602. if (begin) {
  603. if (inet_parse_flag("ipv4", begin + 5, &addr->ipv4, errp) < 0) {
  604. return -1;
  605. }
  606. addr->has_ipv4 = true;
  607. }
  608. begin = strstr(optstr, ",ipv6");
  609. if (begin) {
  610. if (inet_parse_flag("ipv6", begin + 5, &addr->ipv6, errp) < 0) {
  611. return -1;
  612. }
  613. addr->has_ipv6 = true;
  614. }
  615. begin = strstr(optstr, ",keep-alive");
  616. if (begin) {
  617. if (inet_parse_flag("keep-alive", begin + strlen(",keep-alive"),
  618. &addr->keep_alive, errp) < 0)
  619. {
  620. return -1;
  621. }
  622. addr->has_keep_alive = true;
  623. }
  624. #ifdef HAVE_IPPROTO_MPTCP
  625. begin = strstr(optstr, ",mptcp");
  626. if (begin) {
  627. if (inet_parse_flag("mptcp", begin + strlen(",mptcp"),
  628. &addr->mptcp, errp) < 0)
  629. {
  630. return -1;
  631. }
  632. addr->has_mptcp = true;
  633. }
  634. #endif
  635. return 0;
  636. }
  637. /**
  638. * Create a blocking socket and connect it to an address.
  639. *
  640. * @str: address string
  641. * @errp: set in case of an error
  642. *
  643. * Returns -1 in case of error, file descriptor on success
  644. **/
  645. int inet_connect(const char *str, Error **errp)
  646. {
  647. int sock = -1;
  648. InetSocketAddress *addr = g_new(InetSocketAddress, 1);
  649. if (!inet_parse(addr, str, errp)) {
  650. sock = inet_connect_saddr(addr, errp);
  651. }
  652. qapi_free_InetSocketAddress(addr);
  653. return sock;
  654. }
  655. #ifdef CONFIG_AF_VSOCK
  656. static bool vsock_parse_vaddr_to_sockaddr(const VsockSocketAddress *vaddr,
  657. struct sockaddr_vm *svm,
  658. Error **errp)
  659. {
  660. unsigned long long val;
  661. memset(svm, 0, sizeof(*svm));
  662. svm->svm_family = AF_VSOCK;
  663. if (parse_uint_full(vaddr->cid, &val, 10) < 0 ||
  664. val > UINT32_MAX) {
  665. error_setg(errp, "Failed to parse cid '%s'", vaddr->cid);
  666. return false;
  667. }
  668. svm->svm_cid = val;
  669. if (parse_uint_full(vaddr->port, &val, 10) < 0 ||
  670. val > UINT32_MAX) {
  671. error_setg(errp, "Failed to parse port '%s'", vaddr->port);
  672. return false;
  673. }
  674. svm->svm_port = val;
  675. return true;
  676. }
  677. static int vsock_connect_addr(const VsockSocketAddress *vaddr,
  678. const struct sockaddr_vm *svm, Error **errp)
  679. {
  680. int sock, rc;
  681. sock = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
  682. if (sock < 0) {
  683. error_setg_errno(errp, errno, "Failed to create socket family %d",
  684. AF_VSOCK);
  685. return -1;
  686. }
  687. /* connect to peer */
  688. do {
  689. rc = 0;
  690. if (connect(sock, (const struct sockaddr *)svm, sizeof(*svm)) < 0) {
  691. rc = -errno;
  692. }
  693. } while (rc == -EINTR);
  694. if (rc < 0) {
  695. error_setg_errno(errp, errno, "Failed to connect to '%s:%s'",
  696. vaddr->cid, vaddr->port);
  697. close(sock);
  698. return -1;
  699. }
  700. return sock;
  701. }
  702. static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
  703. {
  704. struct sockaddr_vm svm;
  705. if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
  706. return -1;
  707. }
  708. return vsock_connect_addr(vaddr, &svm, errp);
  709. }
  710. static int vsock_listen_saddr(VsockSocketAddress *vaddr,
  711. int num,
  712. Error **errp)
  713. {
  714. struct sockaddr_vm svm;
  715. int slisten;
  716. if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
  717. return -1;
  718. }
  719. slisten = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
  720. if (slisten < 0) {
  721. error_setg_errno(errp, errno, "Failed to create socket");
  722. return -1;
  723. }
  724. if (bind(slisten, (const struct sockaddr *)&svm, sizeof(svm)) != 0) {
  725. error_setg_errno(errp, errno, "Failed to bind socket");
  726. close(slisten);
  727. return -1;
  728. }
  729. if (listen(slisten, num) != 0) {
  730. error_setg_errno(errp, errno, "Failed to listen on socket");
  731. close(slisten);
  732. return -1;
  733. }
  734. return slisten;
  735. }
  736. static int vsock_parse(VsockSocketAddress *addr, const char *str,
  737. Error **errp)
  738. {
  739. char cid[33];
  740. char port[33];
  741. int n;
  742. if (sscanf(str, "%32[^:]:%32[^,]%n", cid, port, &n) != 2) {
  743. error_setg(errp, "error parsing address '%s'", str);
  744. return -1;
  745. }
  746. if (str[n] != '\0') {
  747. error_setg(errp, "trailing characters in address '%s'", str);
  748. return -1;
  749. }
  750. addr->cid = g_strdup(cid);
  751. addr->port = g_strdup(port);
  752. return 0;
  753. }
  754. #else
  755. static void vsock_unsupported(Error **errp)
  756. {
  757. error_setg(errp, "socket family AF_VSOCK unsupported");
  758. }
  759. static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
  760. {
  761. vsock_unsupported(errp);
  762. return -1;
  763. }
  764. static int vsock_listen_saddr(VsockSocketAddress *vaddr,
  765. int num,
  766. Error **errp)
  767. {
  768. vsock_unsupported(errp);
  769. return -1;
  770. }
  771. static int vsock_parse(VsockSocketAddress *addr, const char *str,
  772. Error **errp)
  773. {
  774. vsock_unsupported(errp);
  775. return -1;
  776. }
  777. #endif /* CONFIG_AF_VSOCK */
  778. static bool saddr_is_abstract(UnixSocketAddress *saddr)
  779. {
  780. #ifdef CONFIG_LINUX
  781. return saddr->abstract;
  782. #else
  783. return false;
  784. #endif
  785. }
  786. static bool saddr_is_tight(UnixSocketAddress *saddr)
  787. {
  788. #ifdef CONFIG_LINUX
  789. return !saddr->has_tight || saddr->tight;
  790. #else
  791. return false;
  792. #endif
  793. }
  794. static int unix_listen_saddr(UnixSocketAddress *saddr,
  795. int num,
  796. Error **errp)
  797. {
  798. bool abstract = saddr_is_abstract(saddr);
  799. struct sockaddr_un un;
  800. int sock, fd;
  801. char *pathbuf = NULL;
  802. const char *path;
  803. size_t pathlen;
  804. size_t addrlen;
  805. sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
  806. if (sock < 0) {
  807. error_setg_errno(errp, errno, "Failed to create Unix socket");
  808. return -1;
  809. }
  810. if (saddr->path[0] || abstract) {
  811. path = saddr->path;
  812. } else {
  813. path = pathbuf = g_strdup_printf("%s/qemu-socket-XXXXXX",
  814. g_get_tmp_dir());
  815. }
  816. pathlen = strlen(path);
  817. if (pathlen > sizeof(un.sun_path) ||
  818. (abstract && pathlen > (sizeof(un.sun_path) - 1))) {
  819. error_setg(errp, "UNIX socket path '%s' is too long", path);
  820. error_append_hint(errp, "Path must be less than %zu bytes\n",
  821. abstract ? sizeof(un.sun_path) - 1 :
  822. sizeof(un.sun_path));
  823. goto err;
  824. }
  825. if (pathbuf != NULL) {
  826. /*
  827. * This dummy fd usage silences the mktemp() unsecure warning.
  828. * Using mkstemp() doesn't make things more secure here
  829. * though. bind() complains about existing files, so we have
  830. * to unlink first and thus re-open the race window. The
  831. * worst case possible is bind() failing, i.e. a DoS attack.
  832. */
  833. fd = mkstemp(pathbuf);
  834. if (fd < 0) {
  835. error_setg_errno(errp, errno,
  836. "Failed to make a temporary socket %s", pathbuf);
  837. goto err;
  838. }
  839. close(fd);
  840. }
  841. if (!abstract && unlink(path) < 0 && errno != ENOENT) {
  842. error_setg_errno(errp, errno,
  843. "Failed to unlink socket %s", path);
  844. goto err;
  845. }
  846. memset(&un, 0, sizeof(un));
  847. un.sun_family = AF_UNIX;
  848. addrlen = sizeof(un);
  849. if (abstract) {
  850. un.sun_path[0] = '\0';
  851. memcpy(&un.sun_path[1], path, pathlen);
  852. if (saddr_is_tight(saddr)) {
  853. addrlen = offsetof(struct sockaddr_un, sun_path) + 1 + pathlen;
  854. }
  855. } else {
  856. memcpy(un.sun_path, path, pathlen);
  857. }
  858. if (bind(sock, (struct sockaddr *) &un, addrlen) < 0) {
  859. error_setg_errno(errp, errno, "Failed to bind socket to %s", path);
  860. goto err;
  861. }
  862. if (listen(sock, num) < 0) {
  863. error_setg_errno(errp, errno, "Failed to listen on socket");
  864. goto err;
  865. }
  866. g_free(pathbuf);
  867. return sock;
  868. err:
  869. g_free(pathbuf);
  870. close(sock);
  871. return -1;
  872. }
  873. static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
  874. {
  875. bool abstract = saddr_is_abstract(saddr);
  876. struct sockaddr_un un;
  877. int sock, rc;
  878. size_t pathlen;
  879. size_t addrlen;
  880. if (saddr->path == NULL) {
  881. error_setg(errp, "unix connect: no path specified");
  882. return -1;
  883. }
  884. sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
  885. if (sock < 0) {
  886. error_setg_errno(errp, errno, "Failed to create socket");
  887. return -1;
  888. }
  889. pathlen = strlen(saddr->path);
  890. if (pathlen > sizeof(un.sun_path) ||
  891. (abstract && pathlen > (sizeof(un.sun_path) - 1))) {
  892. error_setg(errp, "UNIX socket path '%s' is too long", saddr->path);
  893. error_append_hint(errp, "Path must be less than %zu bytes\n",
  894. abstract ? sizeof(un.sun_path) - 1 :
  895. sizeof(un.sun_path));
  896. goto err;
  897. }
  898. memset(&un, 0, sizeof(un));
  899. un.sun_family = AF_UNIX;
  900. addrlen = sizeof(un);
  901. if (abstract) {
  902. un.sun_path[0] = '\0';
  903. memcpy(&un.sun_path[1], saddr->path, pathlen);
  904. if (saddr_is_tight(saddr)) {
  905. addrlen = offsetof(struct sockaddr_un, sun_path) + 1 + pathlen;
  906. }
  907. } else {
  908. memcpy(un.sun_path, saddr->path, pathlen);
  909. }
  910. /* connect to peer */
  911. do {
  912. rc = 0;
  913. if (connect(sock, (struct sockaddr *) &un, addrlen) < 0) {
  914. rc = -errno;
  915. }
  916. } while (rc == -EINTR);
  917. if (rc < 0) {
  918. error_setg_errno(errp, -rc, "Failed to connect to '%s'",
  919. saddr->path);
  920. goto err;
  921. }
  922. return sock;
  923. err:
  924. close(sock);
  925. return -1;
  926. }
  927. /* compatibility wrapper */
  928. int unix_listen(const char *str, Error **errp)
  929. {
  930. UnixSocketAddress *saddr;
  931. int sock;
  932. saddr = g_new0(UnixSocketAddress, 1);
  933. saddr->path = g_strdup(str);
  934. sock = unix_listen_saddr(saddr, 1, errp);
  935. qapi_free_UnixSocketAddress(saddr);
  936. return sock;
  937. }
  938. int unix_connect(const char *path, Error **errp)
  939. {
  940. UnixSocketAddress *saddr;
  941. int sock;
  942. saddr = g_new0(UnixSocketAddress, 1);
  943. saddr->path = g_strdup(path);
  944. sock = unix_connect_saddr(saddr, errp);
  945. qapi_free_UnixSocketAddress(saddr);
  946. return sock;
  947. }
  948. char *socket_uri(SocketAddress *addr)
  949. {
  950. switch (addr->type) {
  951. case SOCKET_ADDRESS_TYPE_INET:
  952. return g_strdup_printf("tcp:%s:%s",
  953. addr->u.inet.host,
  954. addr->u.inet.port);
  955. case SOCKET_ADDRESS_TYPE_UNIX:
  956. return g_strdup_printf("unix:%s",
  957. addr->u.q_unix.path);
  958. case SOCKET_ADDRESS_TYPE_FD:
  959. return g_strdup_printf("fd:%s", addr->u.fd.str);
  960. case SOCKET_ADDRESS_TYPE_VSOCK:
  961. return g_strdup_printf("vsock:%s:%s",
  962. addr->u.vsock.cid,
  963. addr->u.vsock.port);
  964. default:
  965. return g_strdup("unknown address type");
  966. }
  967. }
  968. SocketAddress *socket_parse(const char *str, Error **errp)
  969. {
  970. SocketAddress *addr;
  971. addr = g_new0(SocketAddress, 1);
  972. if (strstart(str, "unix:", NULL)) {
  973. if (str[5] == '\0') {
  974. error_setg(errp, "invalid Unix socket address");
  975. goto fail;
  976. } else {
  977. addr->type = SOCKET_ADDRESS_TYPE_UNIX;
  978. addr->u.q_unix.path = g_strdup(str + 5);
  979. }
  980. } else if (strstart(str, "fd:", NULL)) {
  981. if (str[3] == '\0') {
  982. error_setg(errp, "invalid file descriptor address");
  983. goto fail;
  984. } else {
  985. addr->type = SOCKET_ADDRESS_TYPE_FD;
  986. addr->u.fd.str = g_strdup(str + 3);
  987. }
  988. } else if (strstart(str, "vsock:", NULL)) {
  989. addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
  990. if (vsock_parse(&addr->u.vsock, str + strlen("vsock:"), errp)) {
  991. goto fail;
  992. }
  993. } else if (strstart(str, "tcp:", NULL)) {
  994. addr->type = SOCKET_ADDRESS_TYPE_INET;
  995. if (inet_parse(&addr->u.inet, str + strlen("tcp:"), errp)) {
  996. goto fail;
  997. }
  998. } else {
  999. addr->type = SOCKET_ADDRESS_TYPE_INET;
  1000. if (inet_parse(&addr->u.inet, str, errp)) {
  1001. goto fail;
  1002. }
  1003. }
  1004. return addr;
  1005. fail:
  1006. qapi_free_SocketAddress(addr);
  1007. return NULL;
  1008. }
  1009. static int socket_get_fd(const char *fdstr, Error **errp)
  1010. {
  1011. Monitor *cur_mon = monitor_cur();
  1012. int fd;
  1013. if (cur_mon) {
  1014. fd = monitor_get_fd(cur_mon, fdstr, errp);
  1015. if (fd < 0) {
  1016. return -1;
  1017. }
  1018. } else {
  1019. if (qemu_strtoi(fdstr, NULL, 10, &fd) < 0) {
  1020. error_setg_errno(errp, errno,
  1021. "Unable to parse FD number %s",
  1022. fdstr);
  1023. return -1;
  1024. }
  1025. }
  1026. if (!fd_is_socket(fd)) {
  1027. error_setg(errp, "File descriptor '%s' is not a socket", fdstr);
  1028. close(fd);
  1029. return -1;
  1030. }
  1031. return fd;
  1032. }
  1033. int socket_address_parse_named_fd(SocketAddress *addr, Error **errp)
  1034. {
  1035. int fd;
  1036. if (addr->type != SOCKET_ADDRESS_TYPE_FD) {
  1037. return 0;
  1038. }
  1039. fd = socket_get_fd(addr->u.fd.str, errp);
  1040. if (fd < 0) {
  1041. return fd;
  1042. }
  1043. g_free(addr->u.fd.str);
  1044. addr->u.fd.str = g_strdup_printf("%d", fd);
  1045. return 0;
  1046. }
  1047. int socket_connect(SocketAddress *addr, Error **errp)
  1048. {
  1049. int fd;
  1050. switch (addr->type) {
  1051. case SOCKET_ADDRESS_TYPE_INET:
  1052. fd = inet_connect_saddr(&addr->u.inet, errp);
  1053. break;
  1054. case SOCKET_ADDRESS_TYPE_UNIX:
  1055. fd = unix_connect_saddr(&addr->u.q_unix, errp);
  1056. break;
  1057. case SOCKET_ADDRESS_TYPE_FD:
  1058. fd = socket_get_fd(addr->u.fd.str, errp);
  1059. break;
  1060. case SOCKET_ADDRESS_TYPE_VSOCK:
  1061. fd = vsock_connect_saddr(&addr->u.vsock, errp);
  1062. break;
  1063. default:
  1064. abort();
  1065. }
  1066. return fd;
  1067. }
  1068. int socket_listen(SocketAddress *addr, int num, Error **errp)
  1069. {
  1070. int fd;
  1071. trace_socket_listen(num);
  1072. switch (addr->type) {
  1073. case SOCKET_ADDRESS_TYPE_INET:
  1074. fd = inet_listen_saddr(&addr->u.inet, 0, num, errp);
  1075. break;
  1076. case SOCKET_ADDRESS_TYPE_UNIX:
  1077. fd = unix_listen_saddr(&addr->u.q_unix, num, errp);
  1078. break;
  1079. case SOCKET_ADDRESS_TYPE_FD:
  1080. fd = socket_get_fd(addr->u.fd.str, errp);
  1081. if (fd < 0) {
  1082. return -1;
  1083. }
  1084. /*
  1085. * If the socket is not yet in the listen state, then transition it to
  1086. * the listen state now.
  1087. *
  1088. * If it's already listening then this updates the backlog value as
  1089. * requested.
  1090. *
  1091. * If this socket cannot listen because it's already in another state
  1092. * (e.g. unbound or connected) then we'll catch the error here.
  1093. */
  1094. if (listen(fd, num) != 0) {
  1095. error_setg_errno(errp, errno, "Failed to listen on fd socket");
  1096. close(fd);
  1097. return -1;
  1098. }
  1099. break;
  1100. case SOCKET_ADDRESS_TYPE_VSOCK:
  1101. fd = vsock_listen_saddr(&addr->u.vsock, num, errp);
  1102. break;
  1103. default:
  1104. abort();
  1105. }
  1106. return fd;
  1107. }
  1108. void socket_listen_cleanup(int fd, Error **errp)
  1109. {
  1110. SocketAddress *addr;
  1111. addr = socket_local_address(fd, errp);
  1112. if (!addr) {
  1113. return;
  1114. }
  1115. if (addr->type == SOCKET_ADDRESS_TYPE_UNIX
  1116. && addr->u.q_unix.path) {
  1117. if (unlink(addr->u.q_unix.path) < 0 && errno != ENOENT) {
  1118. error_setg_errno(errp, errno,
  1119. "Failed to unlink socket %s",
  1120. addr->u.q_unix.path);
  1121. }
  1122. }
  1123. qapi_free_SocketAddress(addr);
  1124. }
  1125. int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp)
  1126. {
  1127. int fd;
  1128. /*
  1129. * TODO SOCKET_ADDRESS_TYPE_FD when fd is AF_INET or AF_INET6
  1130. * (although other address families can do SOCK_DGRAM, too)
  1131. */
  1132. switch (remote->type) {
  1133. case SOCKET_ADDRESS_TYPE_INET:
  1134. fd = inet_dgram_saddr(&remote->u.inet,
  1135. local ? &local->u.inet : NULL, errp);
  1136. break;
  1137. default:
  1138. error_setg(errp, "socket type unsupported for datagram");
  1139. fd = -1;
  1140. }
  1141. return fd;
  1142. }
  1143. static SocketAddress *
  1144. socket_sockaddr_to_address_inet(struct sockaddr_storage *sa,
  1145. socklen_t salen,
  1146. Error **errp)
  1147. {
  1148. char host[NI_MAXHOST];
  1149. char serv[NI_MAXSERV];
  1150. SocketAddress *addr;
  1151. InetSocketAddress *inet;
  1152. int ret;
  1153. ret = getnameinfo((struct sockaddr *)sa, salen,
  1154. host, sizeof(host),
  1155. serv, sizeof(serv),
  1156. NI_NUMERICHOST | NI_NUMERICSERV);
  1157. if (ret != 0) {
  1158. error_setg(errp, "Cannot format numeric socket address: %s",
  1159. gai_strerror(ret));
  1160. return NULL;
  1161. }
  1162. addr = g_new0(SocketAddress, 1);
  1163. addr->type = SOCKET_ADDRESS_TYPE_INET;
  1164. inet = &addr->u.inet;
  1165. inet->host = g_strdup(host);
  1166. inet->port = g_strdup(serv);
  1167. if (sa->ss_family == AF_INET) {
  1168. inet->has_ipv4 = inet->ipv4 = true;
  1169. } else {
  1170. inet->has_ipv6 = inet->ipv6 = true;
  1171. }
  1172. return addr;
  1173. }
  1174. static SocketAddress *
  1175. socket_sockaddr_to_address_unix(struct sockaddr_storage *sa,
  1176. socklen_t salen,
  1177. Error **errp)
  1178. {
  1179. SocketAddress *addr;
  1180. struct sockaddr_un *su = (struct sockaddr_un *)sa;
  1181. addr = g_new0(SocketAddress, 1);
  1182. addr->type = SOCKET_ADDRESS_TYPE_UNIX;
  1183. salen -= offsetof(struct sockaddr_un, sun_path);
  1184. #ifdef CONFIG_LINUX
  1185. if (salen > 0 && !su->sun_path[0]) {
  1186. /* Linux abstract socket */
  1187. addr->u.q_unix.path = g_strndup(su->sun_path + 1, salen - 1);
  1188. addr->u.q_unix.has_abstract = true;
  1189. addr->u.q_unix.abstract = true;
  1190. addr->u.q_unix.has_tight = true;
  1191. addr->u.q_unix.tight = salen < sizeof(su->sun_path);
  1192. return addr;
  1193. }
  1194. #endif
  1195. addr->u.q_unix.path = g_strndup(su->sun_path, salen);
  1196. return addr;
  1197. }
  1198. #ifdef CONFIG_AF_VSOCK
  1199. static SocketAddress *
  1200. socket_sockaddr_to_address_vsock(struct sockaddr_storage *sa,
  1201. socklen_t salen,
  1202. Error **errp)
  1203. {
  1204. SocketAddress *addr;
  1205. VsockSocketAddress *vaddr;
  1206. struct sockaddr_vm *svm = (struct sockaddr_vm *)sa;
  1207. addr = g_new0(SocketAddress, 1);
  1208. addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
  1209. vaddr = &addr->u.vsock;
  1210. vaddr->cid = g_strdup_printf("%u", svm->svm_cid);
  1211. vaddr->port = g_strdup_printf("%u", svm->svm_port);
  1212. return addr;
  1213. }
  1214. #endif /* CONFIG_AF_VSOCK */
  1215. SocketAddress *
  1216. socket_sockaddr_to_address(struct sockaddr_storage *sa,
  1217. socklen_t salen,
  1218. Error **errp)
  1219. {
  1220. switch (sa->ss_family) {
  1221. case AF_INET:
  1222. case AF_INET6:
  1223. return socket_sockaddr_to_address_inet(sa, salen, errp);
  1224. case AF_UNIX:
  1225. return socket_sockaddr_to_address_unix(sa, salen, errp);
  1226. #ifdef CONFIG_AF_VSOCK
  1227. case AF_VSOCK:
  1228. return socket_sockaddr_to_address_vsock(sa, salen, errp);
  1229. #endif
  1230. default:
  1231. error_setg(errp, "socket family %d unsupported",
  1232. sa->ss_family);
  1233. return NULL;
  1234. }
  1235. return 0;
  1236. }
  1237. SocketAddress *socket_local_address(int fd, Error **errp)
  1238. {
  1239. struct sockaddr_storage ss;
  1240. socklen_t sslen = sizeof(ss);
  1241. if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) {
  1242. error_setg_errno(errp, errno, "%s",
  1243. "Unable to query local socket address");
  1244. return NULL;
  1245. }
  1246. return socket_sockaddr_to_address(&ss, sslen, errp);
  1247. }
  1248. SocketAddress *socket_remote_address(int fd, Error **errp)
  1249. {
  1250. struct sockaddr_storage ss;
  1251. socklen_t sslen = sizeof(ss);
  1252. if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) {
  1253. error_setg_errno(errp, errno, "%s",
  1254. "Unable to query remote socket address");
  1255. return NULL;
  1256. }
  1257. return socket_sockaddr_to_address(&ss, sslen, errp);
  1258. }
  1259. SocketAddress *socket_address_flatten(SocketAddressLegacy *addr_legacy)
  1260. {
  1261. SocketAddress *addr;
  1262. if (!addr_legacy) {
  1263. return NULL;
  1264. }
  1265. addr = g_new(SocketAddress, 1);
  1266. switch (addr_legacy->type) {
  1267. case SOCKET_ADDRESS_TYPE_INET:
  1268. addr->type = SOCKET_ADDRESS_TYPE_INET;
  1269. QAPI_CLONE_MEMBERS(InetSocketAddress, &addr->u.inet,
  1270. addr_legacy->u.inet.data);
  1271. break;
  1272. case SOCKET_ADDRESS_TYPE_UNIX:
  1273. addr->type = SOCKET_ADDRESS_TYPE_UNIX;
  1274. QAPI_CLONE_MEMBERS(UnixSocketAddress, &addr->u.q_unix,
  1275. addr_legacy->u.q_unix.data);
  1276. break;
  1277. case SOCKET_ADDRESS_TYPE_VSOCK:
  1278. addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
  1279. QAPI_CLONE_MEMBERS(VsockSocketAddress, &addr->u.vsock,
  1280. addr_legacy->u.vsock.data);
  1281. break;
  1282. case SOCKET_ADDRESS_TYPE_FD:
  1283. addr->type = SOCKET_ADDRESS_TYPE_FD;
  1284. QAPI_CLONE_MEMBERS(String, &addr->u.fd, addr_legacy->u.fd.data);
  1285. break;
  1286. default:
  1287. abort();
  1288. }
  1289. return addr;
  1290. }