qxl: fix qxl_set_dirty call in qxl_dirty_one_surface
[qemu.git] / util / qemu-sockets.c
blob777af49d53cd759e2445539fcf6dd27a342baf16
1 /*
2 * inet and unix socket functions for qemu
4 * (c) 2008 Gerd Hoffmann <kraxel@redhat.com>
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 of the License.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * Contributions after 2012-01-13 are licensed under the terms of the
16 * GNU GPL, version 2 or (at your option) any later version.
18 #include "qemu/osdep.h"
20 #include "monitor/monitor.h"
21 #include "qapi/error.h"
22 #include "qemu/sockets.h"
23 #include "qemu/main-loop.h"
24 #include "qapi/qmp-input-visitor.h"
25 #include "qapi/qmp-output-visitor.h"
26 #include "qapi-visit.h"
27 #include "qemu/cutils.h"
29 #ifndef AI_ADDRCONFIG
30 # define AI_ADDRCONFIG 0
31 #endif
33 #ifndef AI_V4MAPPED
34 # define AI_V4MAPPED 0
35 #endif
38 static int inet_getport(struct addrinfo *e)
40 struct sockaddr_in *i4;
41 struct sockaddr_in6 *i6;
43 switch (e->ai_family) {
44 case PF_INET6:
45 i6 = (void*)e->ai_addr;
46 return ntohs(i6->sin6_port);
47 case PF_INET:
48 i4 = (void*)e->ai_addr;
49 return ntohs(i4->sin_port);
50 default:
51 return 0;
55 static void inet_setport(struct addrinfo *e, int port)
57 struct sockaddr_in *i4;
58 struct sockaddr_in6 *i6;
60 switch (e->ai_family) {
61 case PF_INET6:
62 i6 = (void*)e->ai_addr;
63 i6->sin6_port = htons(port);
64 break;
65 case PF_INET:
66 i4 = (void*)e->ai_addr;
67 i4->sin_port = htons(port);
68 break;
72 NetworkAddressFamily inet_netfamily(int family)
74 switch (family) {
75 case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6;
76 case PF_INET: return NETWORK_ADDRESS_FAMILY_IPV4;
77 case PF_UNIX: return NETWORK_ADDRESS_FAMILY_UNIX;
79 return NETWORK_ADDRESS_FAMILY_UNKNOWN;
83 * Matrix we're trying to apply
85 * ipv4 ipv6 family
86 * - - PF_UNSPEC
87 * - f PF_INET
88 * - t PF_INET6
89 * f - PF_INET6
90 * f f <error>
91 * f t PF_INET6
92 * t - PF_INET
93 * t f PF_INET
94 * t t PF_INET6
96 * NB, this matrix is only about getting the necessary results
97 * from getaddrinfo(). Some of the cases require further work
98 * after reading results from getaddrinfo in order to fully
99 * apply the logic the end user wants. eg with the last case
100 * ipv4=t + ipv6=t + PF_INET6, getaddrinfo alone can only
101 * guarantee the ipv6=t part of the request - we need more
102 * checks to provide ipv4=t part of the guarantee. This is
103 * outside scope of this method and not currently handled by
104 * callers at all.
106 static int inet_ai_family_from_address(InetSocketAddress *addr,
107 Error **errp)
109 if (addr->has_ipv6 && addr->has_ipv4 &&
110 !addr->ipv6 && !addr->ipv4) {
111 error_setg(errp, "Cannot disable IPv4 and IPv6 at same time");
112 return PF_UNSPEC;
114 if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) {
115 return PF_INET6;
117 if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) {
118 return PF_INET;
120 return PF_UNSPEC;
123 static int inet_listen_saddr(InetSocketAddress *saddr,
124 int port_offset,
125 bool update_addr,
126 Error **errp)
128 struct addrinfo ai,*res,*e;
129 char port[33];
130 char uaddr[INET6_ADDRSTRLEN+1];
131 char uport[33];
132 int slisten, rc, port_min, port_max, p;
133 Error *err = NULL;
135 memset(&ai,0, sizeof(ai));
136 ai.ai_flags = AI_PASSIVE;
137 ai.ai_family = inet_ai_family_from_address(saddr, &err);
138 ai.ai_socktype = SOCK_STREAM;
140 if (err) {
141 error_propagate(errp, err);
142 return -1;
145 if (saddr->host == NULL) {
146 error_setg(errp, "host not specified");
147 return -1;
149 if (saddr->port != NULL) {
150 pstrcpy(port, sizeof(port), saddr->port);
151 } else {
152 port[0] = '\0';
155 /* lookup */
156 if (port_offset) {
157 unsigned long long baseport;
158 if (strlen(port) == 0) {
159 error_setg(errp, "port not specified");
160 return -1;
162 if (parse_uint_full(port, &baseport, 10) < 0) {
163 error_setg(errp, "can't convert to a number: %s", port);
164 return -1;
166 if (baseport > 65535 ||
167 baseport + port_offset > 65535) {
168 error_setg(errp, "port %s out of range", port);
169 return -1;
171 snprintf(port, sizeof(port), "%d", (int)baseport + port_offset);
173 rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL,
174 strlen(port) ? port : NULL, &ai, &res);
175 if (rc != 0) {
176 error_setg(errp, "address resolution failed for %s:%s: %s",
177 saddr->host, port, gai_strerror(rc));
178 return -1;
181 /* create socket + bind */
182 for (e = res; e != NULL; e = e->ai_next) {
183 getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
184 uaddr,INET6_ADDRSTRLEN,uport,32,
185 NI_NUMERICHOST | NI_NUMERICSERV);
186 slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol);
187 if (slisten < 0) {
188 if (!e->ai_next) {
189 error_setg_errno(errp, errno, "Failed to create socket");
191 continue;
194 socket_set_fast_reuse(slisten);
195 #ifdef IPV6_V6ONLY
196 if (e->ai_family == PF_INET6) {
197 /* listen on both ipv4 and ipv6 */
198 const int off = 0;
199 qemu_setsockopt(slisten, IPPROTO_IPV6, IPV6_V6ONLY, &off,
200 sizeof(off));
202 #endif
204 port_min = inet_getport(e);
205 port_max = saddr->has_to ? saddr->to + port_offset : port_min;
206 for (p = port_min; p <= port_max; p++) {
207 inet_setport(e, p);
208 if (bind(slisten, e->ai_addr, e->ai_addrlen) == 0) {
209 goto listen;
211 if (p == port_max) {
212 if (!e->ai_next) {
213 error_setg_errno(errp, errno, "Failed to bind socket");
217 closesocket(slisten);
219 freeaddrinfo(res);
220 return -1;
222 listen:
223 if (listen(slisten,1) != 0) {
224 error_setg_errno(errp, errno, "Failed to listen on socket");
225 closesocket(slisten);
226 freeaddrinfo(res);
227 return -1;
229 if (update_addr) {
230 g_free(saddr->host);
231 saddr->host = g_strdup(uaddr);
232 g_free(saddr->port);
233 saddr->port = g_strdup_printf("%d",
234 inet_getport(e) - port_offset);
235 saddr->has_ipv6 = saddr->ipv6 = e->ai_family == PF_INET6;
236 saddr->has_ipv4 = saddr->ipv4 = e->ai_family != PF_INET6;
238 freeaddrinfo(res);
239 return slisten;
242 #ifdef _WIN32
243 #define QEMU_SOCKET_RC_INPROGRESS(rc) \
244 ((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY)
245 #else
246 #define QEMU_SOCKET_RC_INPROGRESS(rc) \
247 ((rc) == -EINPROGRESS)
248 #endif
250 /* Struct to store connect state for non blocking connect */
251 typedef struct ConnectState {
252 int fd;
253 struct addrinfo *addr_list;
254 struct addrinfo *current_addr;
255 NonBlockingConnectHandler *callback;
256 void *opaque;
257 } ConnectState;
259 static int inet_connect_addr(struct addrinfo *addr, bool *in_progress,
260 ConnectState *connect_state, Error **errp);
262 static void wait_for_connect(void *opaque)
264 ConnectState *s = opaque;
265 int val = 0, rc = 0;
266 socklen_t valsize = sizeof(val);
267 bool in_progress;
268 Error *err = NULL;
270 qemu_set_fd_handler(s->fd, NULL, NULL, NULL);
272 do {
273 rc = qemu_getsockopt(s->fd, SOL_SOCKET, SO_ERROR, &val, &valsize);
274 } while (rc == -1 && errno == EINTR);
276 /* update rc to contain error */
277 if (!rc && val) {
278 rc = -1;
279 errno = val;
282 /* connect error */
283 if (rc < 0) {
284 error_setg_errno(&err, errno, "Error connecting to socket");
285 closesocket(s->fd);
286 s->fd = rc;
289 /* try to connect to the next address on the list */
290 if (s->current_addr) {
291 while (s->current_addr->ai_next != NULL && s->fd < 0) {
292 s->current_addr = s->current_addr->ai_next;
293 s->fd = inet_connect_addr(s->current_addr, &in_progress, s, NULL);
294 if (s->fd < 0) {
295 error_free(err);
296 err = NULL;
297 error_setg_errno(&err, errno, "Unable to start socket connect");
299 /* connect in progress */
300 if (in_progress) {
301 goto out;
305 freeaddrinfo(s->addr_list);
308 if (s->callback) {
309 s->callback(s->fd, err, s->opaque);
311 g_free(s);
312 out:
313 error_free(err);
316 static int inet_connect_addr(struct addrinfo *addr, bool *in_progress,
317 ConnectState *connect_state, Error **errp)
319 int sock, rc;
321 *in_progress = false;
323 sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
324 if (sock < 0) {
325 error_setg_errno(errp, errno, "Failed to create socket");
326 return -1;
328 socket_set_fast_reuse(sock);
329 if (connect_state != NULL) {
330 qemu_set_nonblock(sock);
332 /* connect to peer */
333 do {
334 rc = 0;
335 if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) {
336 rc = -errno;
338 } while (rc == -EINTR);
340 if (connect_state != NULL && QEMU_SOCKET_RC_INPROGRESS(rc)) {
341 connect_state->fd = sock;
342 qemu_set_fd_handler(sock, NULL, wait_for_connect, connect_state);
343 *in_progress = true;
344 } else if (rc < 0) {
345 error_setg_errno(errp, errno, "Failed to connect socket");
346 closesocket(sock);
347 return -1;
349 return sock;
352 static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr,
353 Error **errp)
355 struct addrinfo ai, *res;
356 int rc;
357 Error *err = NULL;
358 static int useV4Mapped = 1;
360 memset(&ai, 0, sizeof(ai));
362 ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
363 if (atomic_read(&useV4Mapped)) {
364 ai.ai_flags |= AI_V4MAPPED;
366 ai.ai_family = inet_ai_family_from_address(saddr, &err);
367 ai.ai_socktype = SOCK_STREAM;
369 if (err) {
370 error_propagate(errp, err);
371 return NULL;
374 if (saddr->host == NULL || saddr->port == NULL) {
375 error_setg(errp, "host and/or port not specified");
376 return NULL;
379 /* lookup */
380 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
382 /* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but
383 * then don't implement it in their getaddrinfo(). Detect
384 * this and retry without the flag since that's preferrable
385 * to a fatal error
387 if (rc == EAI_BADFLAGS &&
388 (ai.ai_flags & AI_V4MAPPED)) {
389 atomic_set(&useV4Mapped, 0);
390 ai.ai_flags &= ~AI_V4MAPPED;
391 rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
393 if (rc != 0) {
394 error_setg(errp, "address resolution failed for %s:%s: %s",
395 saddr->host, saddr->port, gai_strerror(rc));
396 return NULL;
398 return res;
402 * Create a socket and connect it to an address.
404 * @saddr: Inet socket address specification
405 * @errp: set on error
406 * @callback: callback function for non-blocking connect
407 * @opaque: opaque for callback function
409 * Returns: -1 on error, file descriptor on success.
411 * If @callback is non-null, the connect is non-blocking. If this
412 * function succeeds, callback will be called when the connection
413 * completes, with the file descriptor on success, or -1 on error.
415 static int inet_connect_saddr(InetSocketAddress *saddr, Error **errp,
416 NonBlockingConnectHandler *callback, void *opaque)
418 Error *local_err = NULL;
419 struct addrinfo *res, *e;
420 int sock = -1;
421 bool in_progress;
422 ConnectState *connect_state = NULL;
424 res = inet_parse_connect_saddr(saddr, errp);
425 if (!res) {
426 return -1;
429 if (callback != NULL) {
430 connect_state = g_malloc0(sizeof(*connect_state));
431 connect_state->addr_list = res;
432 connect_state->callback = callback;
433 connect_state->opaque = opaque;
436 for (e = res; e != NULL; e = e->ai_next) {
437 error_free(local_err);
438 local_err = NULL;
439 if (connect_state != NULL) {
440 connect_state->current_addr = e;
442 sock = inet_connect_addr(e, &in_progress, connect_state, &local_err);
443 if (sock >= 0) {
444 break;
448 if (sock < 0) {
449 error_propagate(errp, local_err);
450 } else if (in_progress) {
451 /* wait_for_connect() will do the rest */
452 return sock;
453 } else {
454 if (callback) {
455 callback(sock, NULL, opaque);
458 g_free(connect_state);
459 freeaddrinfo(res);
460 return sock;
463 static int inet_dgram_saddr(InetSocketAddress *sraddr,
464 InetSocketAddress *sladdr,
465 Error **errp)
467 struct addrinfo ai, *peer = NULL, *local = NULL;
468 const char *addr;
469 const char *port;
470 int sock = -1, rc;
471 Error *err = NULL;
473 /* lookup peer addr */
474 memset(&ai,0, sizeof(ai));
475 ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG;
476 ai.ai_family = inet_ai_family_from_address(sraddr, &err);
477 ai.ai_socktype = SOCK_DGRAM;
479 if (err) {
480 error_propagate(errp, err);
481 goto err;
484 addr = sraddr->host;
485 port = sraddr->port;
486 if (addr == NULL || strlen(addr) == 0) {
487 addr = "localhost";
489 if (port == NULL || strlen(port) == 0) {
490 error_setg(errp, "remote port not specified");
491 goto err;
494 if (0 != (rc = getaddrinfo(addr, port, &ai, &peer))) {
495 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
496 gai_strerror(rc));
497 goto err;
500 /* lookup local addr */
501 memset(&ai,0, sizeof(ai));
502 ai.ai_flags = AI_PASSIVE;
503 ai.ai_family = peer->ai_family;
504 ai.ai_socktype = SOCK_DGRAM;
506 if (sladdr) {
507 addr = sladdr->host;
508 port = sladdr->port;
509 if (addr == NULL || strlen(addr) == 0) {
510 addr = NULL;
512 if (!port || strlen(port) == 0) {
513 port = "0";
515 } else {
516 addr = NULL;
517 port = "0";
520 if (0 != (rc = getaddrinfo(addr, port, &ai, &local))) {
521 error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
522 gai_strerror(rc));
523 goto err;
526 /* create socket */
527 sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol);
528 if (sock < 0) {
529 error_setg_errno(errp, errno, "Failed to create socket");
530 goto err;
532 socket_set_fast_reuse(sock);
534 /* bind socket */
535 if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) {
536 error_setg_errno(errp, errno, "Failed to bind socket");
537 goto err;
540 /* connect to peer */
541 if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) {
542 error_setg_errno(errp, errno, "Failed to connect socket");
543 goto err;
546 freeaddrinfo(local);
547 freeaddrinfo(peer);
548 return sock;
550 err:
551 if (-1 != sock)
552 closesocket(sock);
553 if (local)
554 freeaddrinfo(local);
555 if (peer)
556 freeaddrinfo(peer);
557 return -1;
560 /* compatibility wrapper */
561 InetSocketAddress *inet_parse(const char *str, Error **errp)
563 InetSocketAddress *addr;
564 const char *optstr, *h;
565 char host[65];
566 char port[33];
567 int to;
568 int pos;
570 addr = g_new0(InetSocketAddress, 1);
572 /* parse address */
573 if (str[0] == ':') {
574 /* no host given */
575 host[0] = '\0';
576 if (1 != sscanf(str, ":%32[^,]%n", port, &pos)) {
577 error_setg(errp, "error parsing port in address '%s'", str);
578 goto fail;
580 } else if (str[0] == '[') {
581 /* IPv6 addr */
582 if (2 != sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos)) {
583 error_setg(errp, "error parsing IPv6 address '%s'", str);
584 goto fail;
586 addr->ipv6 = addr->has_ipv6 = true;
587 } else {
588 /* hostname or IPv4 addr */
589 if (2 != sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos)) {
590 error_setg(errp, "error parsing address '%s'", str);
591 goto fail;
593 if (host[strspn(host, "0123456789.")] == '\0') {
594 addr->ipv4 = addr->has_ipv4 = true;
598 addr->host = g_strdup(host);
599 addr->port = g_strdup(port);
601 /* parse options */
602 optstr = str + pos;
603 h = strstr(optstr, ",to=");
604 if (h) {
605 h += 4;
606 if (sscanf(h, "%d%n", &to, &pos) != 1 ||
607 (h[pos] != '\0' && h[pos] != ',')) {
608 error_setg(errp, "error parsing to= argument");
609 goto fail;
611 addr->has_to = true;
612 addr->to = to;
614 if (strstr(optstr, ",ipv4")) {
615 addr->ipv4 = addr->has_ipv4 = true;
617 if (strstr(optstr, ",ipv6")) {
618 addr->ipv6 = addr->has_ipv6 = true;
620 return addr;
622 fail:
623 qapi_free_InetSocketAddress(addr);
624 return NULL;
627 int inet_listen(const char *str, char *ostr, int olen,
628 int socktype, int port_offset, Error **errp)
630 char *optstr;
631 int sock = -1;
632 InetSocketAddress *addr;
634 addr = inet_parse(str, errp);
635 if (addr != NULL) {
636 sock = inet_listen_saddr(addr, port_offset, true, errp);
637 if (sock != -1 && ostr) {
638 optstr = strchr(str, ',');
639 if (addr->ipv6) {
640 snprintf(ostr, olen, "[%s]:%s%s",
641 addr->host,
642 addr->port,
643 optstr ? optstr : "");
644 } else {
645 snprintf(ostr, olen, "%s:%s%s",
646 addr->host,
647 addr->port,
648 optstr ? optstr : "");
651 qapi_free_InetSocketAddress(addr);
653 return sock;
657 * Create a blocking socket and connect it to an address.
659 * @str: address string
660 * @errp: set in case of an error
662 * Returns -1 in case of error, file descriptor on success
664 int inet_connect(const char *str, Error **errp)
666 int sock = -1;
667 InetSocketAddress *addr;
669 addr = inet_parse(str, errp);
670 if (addr != NULL) {
671 sock = inet_connect_saddr(addr, errp, NULL, NULL);
672 qapi_free_InetSocketAddress(addr);
674 return sock;
678 * Create a non-blocking socket and connect it to an address.
679 * Calls the callback function with fd in case of success or -1 in case of
680 * error.
682 * @str: address string
683 * @callback: callback function that is called when connect completes,
684 * cannot be NULL.
685 * @opaque: opaque for callback function
686 * @errp: set in case of an error
688 * Returns: -1 on immediate error, file descriptor on success.
690 int inet_nonblocking_connect(const char *str,
691 NonBlockingConnectHandler *callback,
692 void *opaque, Error **errp)
694 int sock = -1;
695 InetSocketAddress *addr;
697 g_assert(callback != NULL);
699 addr = inet_parse(str, errp);
700 if (addr != NULL) {
701 sock = inet_connect_saddr(addr, errp, callback, opaque);
702 qapi_free_InetSocketAddress(addr);
704 return sock;
707 #ifndef _WIN32
709 static int unix_listen_saddr(UnixSocketAddress *saddr,
710 bool update_addr,
711 Error **errp)
713 struct sockaddr_un un;
714 int sock, fd;
716 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
717 if (sock < 0) {
718 error_setg_errno(errp, errno, "Failed to create Unix socket");
719 return -1;
722 memset(&un, 0, sizeof(un));
723 un.sun_family = AF_UNIX;
724 if (saddr->path && strlen(saddr->path)) {
725 snprintf(un.sun_path, sizeof(un.sun_path), "%s", saddr->path);
726 } else {
727 const char *tmpdir = getenv("TMPDIR");
728 tmpdir = tmpdir ? tmpdir : "/tmp";
729 if (snprintf(un.sun_path, sizeof(un.sun_path), "%s/qemu-socket-XXXXXX",
730 tmpdir) >= sizeof(un.sun_path)) {
731 error_setg_errno(errp, errno,
732 "TMPDIR environment variable (%s) too large", tmpdir);
733 goto err;
737 * This dummy fd usage silences the mktemp() unsecure warning.
738 * Using mkstemp() doesn't make things more secure here
739 * though. bind() complains about existing files, so we have
740 * to unlink first and thus re-open the race window. The
741 * worst case possible is bind() failing, i.e. a DoS attack.
743 fd = mkstemp(un.sun_path);
744 if (fd < 0) {
745 error_setg_errno(errp, errno,
746 "Failed to make a temporary socket name in %s", tmpdir);
747 goto err;
749 close(fd);
750 if (update_addr) {
751 g_free(saddr->path);
752 saddr->path = g_strdup(un.sun_path);
756 if (unlink(un.sun_path) < 0 && errno != ENOENT) {
757 error_setg_errno(errp, errno,
758 "Failed to unlink socket %s", un.sun_path);
759 goto err;
761 if (bind(sock, (struct sockaddr*) &un, sizeof(un)) < 0) {
762 error_setg_errno(errp, errno, "Failed to bind socket to %s", un.sun_path);
763 goto err;
765 if (listen(sock, 1) < 0) {
766 error_setg_errno(errp, errno, "Failed to listen on socket");
767 goto err;
770 return sock;
772 err:
773 closesocket(sock);
774 return -1;
777 static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp,
778 NonBlockingConnectHandler *callback, void *opaque)
780 struct sockaddr_un un;
781 ConnectState *connect_state = NULL;
782 int sock, rc;
784 if (saddr->path == NULL) {
785 error_setg(errp, "unix connect: no path specified");
786 return -1;
789 sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
790 if (sock < 0) {
791 error_setg_errno(errp, errno, "Failed to create socket");
792 return -1;
794 if (callback != NULL) {
795 connect_state = g_malloc0(sizeof(*connect_state));
796 connect_state->callback = callback;
797 connect_state->opaque = opaque;
798 qemu_set_nonblock(sock);
801 memset(&un, 0, sizeof(un));
802 un.sun_family = AF_UNIX;
803 snprintf(un.sun_path, sizeof(un.sun_path), "%s", saddr->path);
805 /* connect to peer */
806 do {
807 rc = 0;
808 if (connect(sock, (struct sockaddr *) &un, sizeof(un)) < 0) {
809 rc = -errno;
811 } while (rc == -EINTR);
813 if (connect_state != NULL && QEMU_SOCKET_RC_INPROGRESS(rc)) {
814 connect_state->fd = sock;
815 qemu_set_fd_handler(sock, NULL, wait_for_connect, connect_state);
816 return sock;
817 } else if (rc >= 0) {
818 /* non blocking socket immediate success, call callback */
819 if (callback != NULL) {
820 callback(sock, NULL, opaque);
824 if (rc < 0) {
825 error_setg_errno(errp, -rc, "Failed to connect socket");
826 close(sock);
827 sock = -1;
830 g_free(connect_state);
831 return sock;
834 #else
836 static int unix_listen_saddr(UnixSocketAddress *saddr,
837 bool update_addr,
838 Error **errp)
840 error_setg(errp, "unix sockets are not available on windows");
841 errno = ENOTSUP;
842 return -1;
845 static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp,
846 NonBlockingConnectHandler *callback, void *opaque)
848 error_setg(errp, "unix sockets are not available on windows");
849 errno = ENOTSUP;
850 return -1;
852 #endif
854 /* compatibility wrapper */
855 int unix_listen(const char *str, char *ostr, int olen, Error **errp)
857 char *path, *optstr;
858 int sock, len;
859 UnixSocketAddress *saddr;
861 saddr = g_new0(UnixSocketAddress, 1);
863 optstr = strchr(str, ',');
864 if (optstr) {
865 len = optstr - str;
866 if (len) {
867 path = g_malloc(len+1);
868 snprintf(path, len+1, "%.*s", len, str);
869 saddr->path = path;
871 } else {
872 saddr->path = g_strdup(str);
875 sock = unix_listen_saddr(saddr, true, errp);
877 if (sock != -1 && ostr)
878 snprintf(ostr, olen, "%s%s", saddr->path, optstr ? optstr : "");
879 qapi_free_UnixSocketAddress(saddr);
880 return sock;
883 int unix_connect(const char *path, Error **errp)
885 UnixSocketAddress *saddr;
886 int sock;
888 saddr = g_new0(UnixSocketAddress, 1);
889 saddr->path = g_strdup(path);
890 sock = unix_connect_saddr(saddr, errp, NULL, NULL);
891 qapi_free_UnixSocketAddress(saddr);
892 return sock;
896 int unix_nonblocking_connect(const char *path,
897 NonBlockingConnectHandler *callback,
898 void *opaque, Error **errp)
900 UnixSocketAddress *saddr;
901 int sock = -1;
903 g_assert(callback != NULL);
905 saddr = g_new0(UnixSocketAddress, 1);
906 saddr->path = g_strdup(path);
907 sock = unix_connect_saddr(saddr, errp, callback, opaque);
908 qapi_free_UnixSocketAddress(saddr);
909 return sock;
912 SocketAddress *socket_parse(const char *str, Error **errp)
914 SocketAddress *addr;
916 addr = g_new0(SocketAddress, 1);
917 if (strstart(str, "unix:", NULL)) {
918 if (str[5] == '\0') {
919 error_setg(errp, "invalid Unix socket address");
920 goto fail;
921 } else {
922 addr->type = SOCKET_ADDRESS_KIND_UNIX;
923 addr->u.q_unix.data = g_new(UnixSocketAddress, 1);
924 addr->u.q_unix.data->path = g_strdup(str + 5);
926 } else if (strstart(str, "fd:", NULL)) {
927 if (str[3] == '\0') {
928 error_setg(errp, "invalid file descriptor address");
929 goto fail;
930 } else {
931 addr->type = SOCKET_ADDRESS_KIND_FD;
932 addr->u.fd.data = g_new(String, 1);
933 addr->u.fd.data->str = g_strdup(str + 3);
935 } else {
936 addr->type = SOCKET_ADDRESS_KIND_INET;
937 addr->u.inet.data = inet_parse(str, errp);
938 if (addr->u.inet.data == NULL) {
939 goto fail;
942 return addr;
944 fail:
945 qapi_free_SocketAddress(addr);
946 return NULL;
949 int socket_connect(SocketAddress *addr, Error **errp,
950 NonBlockingConnectHandler *callback, void *opaque)
952 int fd;
954 switch (addr->type) {
955 case SOCKET_ADDRESS_KIND_INET:
956 fd = inet_connect_saddr(addr->u.inet.data, errp, callback, opaque);
957 break;
959 case SOCKET_ADDRESS_KIND_UNIX:
960 fd = unix_connect_saddr(addr->u.q_unix.data, errp, callback, opaque);
961 break;
963 case SOCKET_ADDRESS_KIND_FD:
964 fd = monitor_get_fd(cur_mon, addr->u.fd.data->str, errp);
965 if (fd >= 0 && callback) {
966 qemu_set_nonblock(fd);
967 callback(fd, NULL, opaque);
969 break;
971 default:
972 abort();
974 return fd;
977 int socket_listen(SocketAddress *addr, Error **errp)
979 int fd;
981 switch (addr->type) {
982 case SOCKET_ADDRESS_KIND_INET:
983 fd = inet_listen_saddr(addr->u.inet.data, 0, false, errp);
984 break;
986 case SOCKET_ADDRESS_KIND_UNIX:
987 fd = unix_listen_saddr(addr->u.q_unix.data, false, errp);
988 break;
990 case SOCKET_ADDRESS_KIND_FD:
991 fd = monitor_get_fd(cur_mon, addr->u.fd.data->str, errp);
992 break;
994 default:
995 abort();
997 return fd;
1000 void socket_listen_cleanup(int fd, Error **errp)
1002 SocketAddress *addr;
1004 addr = socket_local_address(fd, errp);
1006 if (addr->type == SOCKET_ADDRESS_KIND_UNIX
1007 && addr->u.q_unix.data->path) {
1008 if (unlink(addr->u.q_unix.data->path) < 0 && errno != ENOENT) {
1009 error_setg_errno(errp, errno,
1010 "Failed to unlink socket %s",
1011 addr->u.q_unix.data->path);
1015 qapi_free_SocketAddress(addr);
1018 int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp)
1020 int fd;
1022 switch (remote->type) {
1023 case SOCKET_ADDRESS_KIND_INET:
1024 fd = inet_dgram_saddr(remote->u.inet.data,
1025 local ? local->u.inet.data : NULL, errp);
1026 break;
1028 default:
1029 error_setg(errp, "socket type unsupported for datagram");
1030 fd = -1;
1032 return fd;
1036 static SocketAddress *
1037 socket_sockaddr_to_address_inet(struct sockaddr_storage *sa,
1038 socklen_t salen,
1039 Error **errp)
1041 char host[NI_MAXHOST];
1042 char serv[NI_MAXSERV];
1043 SocketAddress *addr;
1044 InetSocketAddress *inet;
1045 int ret;
1047 ret = getnameinfo((struct sockaddr *)sa, salen,
1048 host, sizeof(host),
1049 serv, sizeof(serv),
1050 NI_NUMERICHOST | NI_NUMERICSERV);
1051 if (ret != 0) {
1052 error_setg(errp, "Cannot format numeric socket address: %s",
1053 gai_strerror(ret));
1054 return NULL;
1057 addr = g_new0(SocketAddress, 1);
1058 addr->type = SOCKET_ADDRESS_KIND_INET;
1059 inet = addr->u.inet.data = g_new0(InetSocketAddress, 1);
1060 inet->host = g_strdup(host);
1061 inet->port = g_strdup(serv);
1062 if (sa->ss_family == AF_INET) {
1063 inet->has_ipv4 = inet->ipv4 = true;
1064 } else {
1065 inet->has_ipv6 = inet->ipv6 = true;
1068 return addr;
1072 #ifndef WIN32
1073 static SocketAddress *
1074 socket_sockaddr_to_address_unix(struct sockaddr_storage *sa,
1075 socklen_t salen,
1076 Error **errp)
1078 SocketAddress *addr;
1079 struct sockaddr_un *su = (struct sockaddr_un *)sa;
1081 addr = g_new0(SocketAddress, 1);
1082 addr->type = SOCKET_ADDRESS_KIND_UNIX;
1083 addr->u.q_unix.data = g_new0(UnixSocketAddress, 1);
1084 if (su->sun_path[0]) {
1085 addr->u.q_unix.data->path = g_strndup(su->sun_path,
1086 sizeof(su->sun_path));
1089 return addr;
1091 #endif /* WIN32 */
1093 SocketAddress *
1094 socket_sockaddr_to_address(struct sockaddr_storage *sa,
1095 socklen_t salen,
1096 Error **errp)
1098 switch (sa->ss_family) {
1099 case AF_INET:
1100 case AF_INET6:
1101 return socket_sockaddr_to_address_inet(sa, salen, errp);
1103 #ifndef WIN32
1104 case AF_UNIX:
1105 return socket_sockaddr_to_address_unix(sa, salen, errp);
1106 #endif /* WIN32 */
1108 default:
1109 error_setg(errp, "socket family %d unsupported",
1110 sa->ss_family);
1111 return NULL;
1113 return 0;
1117 SocketAddress *socket_local_address(int fd, Error **errp)
1119 struct sockaddr_storage ss;
1120 socklen_t sslen = sizeof(ss);
1122 if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) {
1123 error_setg_errno(errp, errno, "%s",
1124 "Unable to query local socket address");
1125 return NULL;
1128 return socket_sockaddr_to_address(&ss, sslen, errp);
1132 SocketAddress *socket_remote_address(int fd, Error **errp)
1134 struct sockaddr_storage ss;
1135 socklen_t sslen = sizeof(ss);
1137 if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) {
1138 error_setg_errno(errp, errno, "%s",
1139 "Unable to query remote socket address");
1140 return NULL;
1143 return socket_sockaddr_to_address(&ss, sslen, errp);
1146 char *socket_address_to_string(struct SocketAddress *addr, Error **errp)
1148 char *buf;
1149 InetSocketAddress *inet;
1150 char host_port[INET6_ADDRSTRLEN + 5 + 4];
1152 switch (addr->type) {
1153 case SOCKET_ADDRESS_KIND_INET:
1154 inet = addr->u.inet.data;
1155 if (strchr(inet->host, ':') == NULL) {
1156 snprintf(host_port, sizeof(host_port), "%s:%s", inet->host,
1157 inet->port);
1158 buf = g_strdup(host_port);
1159 } else {
1160 snprintf(host_port, sizeof(host_port), "[%s]:%s", inet->host,
1161 inet->port);
1162 buf = g_strdup(host_port);
1164 break;
1166 case SOCKET_ADDRESS_KIND_UNIX:
1167 buf = g_strdup(addr->u.q_unix.data->path);
1168 break;
1170 case SOCKET_ADDRESS_KIND_FD:
1171 buf = g_strdup(addr->u.fd.data->str);
1172 break;
1174 default:
1175 error_setg(errp, "socket family %d unsupported",
1176 addr->type);
1177 return NULL;
1179 return buf;