xref: /openbmc/qemu/util/qemu-sockets.c (revision 2df9f571)
1 /*
2  *  inet and unix socket functions for qemu
3  *
4  *  (c) 2008 Gerd Hoffmann <kraxel@redhat.com>
5  *
6  *  This program is free software; you can redistribute it and/or modify
7  *  it under the terms of the GNU General Public License as published by
8  *  the Free Software Foundation; under version 2 of the License.
9  *
10  *  This program is distributed in the hope that it will be useful,
11  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
12  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13  *  GNU General Public License for more details.
14  *
15  * Contributions after 2012-01-13 are licensed under the terms of the
16  * GNU GPL, version 2 or (at your option) any later version.
17  */
18 #include "qemu/osdep.h"
19 
20 #ifdef CONFIG_AF_VSOCK
21 #include <linux/vm_sockets.h>
22 #endif /* CONFIG_AF_VSOCK */
23 
24 #include "qemu-common.h"
25 #include "monitor/monitor.h"
26 #include "qapi/clone-visitor.h"
27 #include "qapi/error.h"
28 #include "qapi/qapi-visit-sockets.h"
29 #include "qemu/sockets.h"
30 #include "qemu/main-loop.h"
31 #include "qapi/qobject-input-visitor.h"
32 #include "qapi/qobject-output-visitor.h"
33 #include "qemu/cutils.h"
34 #include "trace.h"
35 
36 #ifndef AI_ADDRCONFIG
37 # define AI_ADDRCONFIG 0
38 #endif
39 
40 #ifndef AI_V4MAPPED
41 # define AI_V4MAPPED 0
42 #endif
43 
44 #ifndef AI_NUMERICSERV
45 # define AI_NUMERICSERV 0
46 #endif
47 
48 
49 static int inet_getport(struct addrinfo *e)
50 {
51     struct sockaddr_in *i4;
52     struct sockaddr_in6 *i6;
53 
54     switch (e->ai_family) {
55     case PF_INET6:
56         i6 = (void*)e->ai_addr;
57         return ntohs(i6->sin6_port);
58     case PF_INET:
59         i4 = (void*)e->ai_addr;
60         return ntohs(i4->sin_port);
61     default:
62         return 0;
63     }
64 }
65 
66 static void inet_setport(struct addrinfo *e, int port)
67 {
68     struct sockaddr_in *i4;
69     struct sockaddr_in6 *i6;
70 
71     switch (e->ai_family) {
72     case PF_INET6:
73         i6 = (void*)e->ai_addr;
74         i6->sin6_port = htons(port);
75         break;
76     case PF_INET:
77         i4 = (void*)e->ai_addr;
78         i4->sin_port = htons(port);
79         break;
80     }
81 }
82 
83 NetworkAddressFamily inet_netfamily(int family)
84 {
85     switch (family) {
86     case PF_INET6: return NETWORK_ADDRESS_FAMILY_IPV6;
87     case PF_INET:  return NETWORK_ADDRESS_FAMILY_IPV4;
88     case PF_UNIX:  return NETWORK_ADDRESS_FAMILY_UNIX;
89 #ifdef CONFIG_AF_VSOCK
90     case PF_VSOCK: return NETWORK_ADDRESS_FAMILY_VSOCK;
91 #endif /* CONFIG_AF_VSOCK */
92     }
93     return NETWORK_ADDRESS_FAMILY_UNKNOWN;
94 }
95 
96 bool fd_is_socket(int fd)
97 {
98     int optval;
99     socklen_t optlen = sizeof(optval);
100     return !qemu_getsockopt(fd, SOL_SOCKET, SO_TYPE, &optval, &optlen);
101 }
102 
103 
104 /*
105  * Matrix we're trying to apply
106  *
107  *  ipv4  ipv6   family
108  *   -     -       PF_UNSPEC
109  *   -     f       PF_INET
110  *   -     t       PF_INET6
111  *   f     -       PF_INET6
112  *   f     f       <error>
113  *   f     t       PF_INET6
114  *   t     -       PF_INET
115  *   t     f       PF_INET
116  *   t     t       PF_INET6/PF_UNSPEC
117  *
118  * NB, this matrix is only about getting the necessary results
119  * from getaddrinfo(). Some of the cases require further work
120  * after reading results from getaddrinfo in order to fully
121  * apply the logic the end user wants.
122  *
123  * In the first and last cases, we must set IPV6_V6ONLY=0
124  * when binding, to allow a single listener to potentially
125  * accept both IPv4+6 addresses.
126  */
127 int inet_ai_family_from_address(InetSocketAddress *addr,
128                                 Error **errp)
129 {
130     if (addr->has_ipv6 && addr->has_ipv4 &&
131         !addr->ipv6 && !addr->ipv4) {
132         error_setg(errp, "Cannot disable IPv4 and IPv6 at same time");
133         return PF_UNSPEC;
134     }
135     if ((addr->has_ipv6 && addr->ipv6) && (addr->has_ipv4 && addr->ipv4)) {
136         /*
137          * Some backends can only do a single listener. In that case
138          * we want empty hostname to resolve to "::" and then use the
139          * flag IPV6_V6ONLY==0 to get both protocols on 1 socket. This
140          * doesn't work for addresses other than "", so they're just
141          * inevitably broken until multiple listeners can be used,
142          * and thus we honour getaddrinfo automatic protocol detection
143          * Once all backends do multi-listener, remove the PF_INET6
144          * branch entirely.
145          */
146         if (!addr->host || g_str_equal(addr->host, "")) {
147             return PF_INET6;
148         } else {
149             return PF_UNSPEC;
150         }
151     }
152     if ((addr->has_ipv6 && addr->ipv6) || (addr->has_ipv4 && !addr->ipv4)) {
153         return PF_INET6;
154     }
155     if ((addr->has_ipv4 && addr->ipv4) || (addr->has_ipv6 && !addr->ipv6)) {
156         return PF_INET;
157     }
158     return PF_UNSPEC;
159 }
160 
161 static int create_fast_reuse_socket(struct addrinfo *e)
162 {
163     int slisten = qemu_socket(e->ai_family, e->ai_socktype, e->ai_protocol);
164     if (slisten < 0) {
165         return -1;
166     }
167     socket_set_fast_reuse(slisten);
168     return slisten;
169 }
170 
171 static int try_bind(int socket, InetSocketAddress *saddr, struct addrinfo *e)
172 {
173 #ifndef IPV6_V6ONLY
174     return bind(socket, e->ai_addr, e->ai_addrlen);
175 #else
176     /*
177      * Deals with first & last cases in matrix in comment
178      * for inet_ai_family_from_address().
179      */
180     int v6only =
181         ((!saddr->has_ipv4 && !saddr->has_ipv6) ||
182          (saddr->has_ipv4 && saddr->ipv4 &&
183           saddr->has_ipv6 && saddr->ipv6)) ? 0 : 1;
184     int stat;
185 
186  rebind:
187     if (e->ai_family == PF_INET6) {
188         qemu_setsockopt(socket, IPPROTO_IPV6, IPV6_V6ONLY, &v6only,
189                         sizeof(v6only));
190     }
191 
192     stat = bind(socket, e->ai_addr, e->ai_addrlen);
193     if (!stat) {
194         return 0;
195     }
196 
197     /* If we got EADDRINUSE from an IPv6 bind & v6only is unset,
198      * it could be that the IPv4 port is already claimed, so retry
199      * with v6only set
200      */
201     if (e->ai_family == PF_INET6 && errno == EADDRINUSE && !v6only) {
202         v6only = 1;
203         goto rebind;
204     }
205     return stat;
206 #endif
207 }
208 
209 static int inet_listen_saddr(InetSocketAddress *saddr,
210                              int port_offset,
211                              int num,
212                              Error **errp)
213 {
214     struct addrinfo ai,*res,*e;
215     char port[33];
216     char uaddr[INET6_ADDRSTRLEN+1];
217     char uport[33];
218     int rc, port_min, port_max, p;
219     int slisten = -1;
220     int saved_errno = 0;
221     bool socket_created = false;
222     Error *err = NULL;
223 
224     if (saddr->keep_alive) {
225         error_setg(errp, "keep-alive option is not supported for passive "
226                    "sockets");
227         return -1;
228     }
229 
230     memset(&ai,0, sizeof(ai));
231     ai.ai_flags = AI_PASSIVE;
232     if (saddr->has_numeric && saddr->numeric) {
233         ai.ai_flags |= AI_NUMERICHOST | AI_NUMERICSERV;
234     }
235     ai.ai_family = inet_ai_family_from_address(saddr, &err);
236     ai.ai_socktype = SOCK_STREAM;
237 
238     if (err) {
239         error_propagate(errp, err);
240         return -1;
241     }
242 
243     if (saddr->host == NULL) {
244         error_setg(errp, "host not specified");
245         return -1;
246     }
247     if (saddr->port != NULL) {
248         pstrcpy(port, sizeof(port), saddr->port);
249     } else {
250         port[0] = '\0';
251     }
252 
253     /* lookup */
254     if (port_offset) {
255         unsigned long long baseport;
256         if (strlen(port) == 0) {
257             error_setg(errp, "port not specified");
258             return -1;
259         }
260         if (parse_uint_full(port, &baseport, 10) < 0) {
261             error_setg(errp, "can't convert to a number: %s", port);
262             return -1;
263         }
264         if (baseport > 65535 ||
265             baseport + port_offset > 65535) {
266             error_setg(errp, "port %s out of range", port);
267             return -1;
268         }
269         snprintf(port, sizeof(port), "%d", (int)baseport + port_offset);
270     }
271     rc = getaddrinfo(strlen(saddr->host) ? saddr->host : NULL,
272                      strlen(port) ? port : NULL, &ai, &res);
273     if (rc != 0) {
274         error_setg(errp, "address resolution failed for %s:%s: %s",
275                    saddr->host, port, gai_strerror(rc));
276         return -1;
277     }
278 
279     /* create socket + bind/listen */
280     for (e = res; e != NULL; e = e->ai_next) {
281         getnameinfo((struct sockaddr*)e->ai_addr,e->ai_addrlen,
282                         uaddr,INET6_ADDRSTRLEN,uport,32,
283                         NI_NUMERICHOST | NI_NUMERICSERV);
284 
285         port_min = inet_getport(e);
286         port_max = saddr->has_to ? saddr->to + port_offset : port_min;
287         for (p = port_min; p <= port_max; p++) {
288             inet_setport(e, p);
289 
290             slisten = create_fast_reuse_socket(e);
291             if (slisten < 0) {
292                 /* First time we expect we might fail to create the socket
293                  * eg if 'e' has AF_INET6 but ipv6 kmod is not loaded.
294                  * Later iterations should always succeed if first iteration
295                  * worked though, so treat that as fatal.
296                  */
297                 if (p == port_min) {
298                     continue;
299                 } else {
300                     error_setg_errno(errp, errno,
301                                      "Failed to recreate failed listening socket");
302                     goto listen_failed;
303                 }
304             }
305             socket_created = true;
306 
307             rc = try_bind(slisten, saddr, e);
308             if (rc < 0) {
309                 if (errno != EADDRINUSE) {
310                     error_setg_errno(errp, errno, "Failed to bind socket");
311                     goto listen_failed;
312                 }
313             } else {
314                 if (!listen(slisten, num)) {
315                     goto listen_ok;
316                 }
317                 if (errno != EADDRINUSE) {
318                     error_setg_errno(errp, errno, "Failed to listen on socket");
319                     goto listen_failed;
320                 }
321             }
322             /* Someone else managed to bind to the same port and beat us
323              * to listen on it! Socket semantics does not allow us to
324              * recover from this situation, so we need to recreate the
325              * socket to allow bind attempts for subsequent ports:
326              */
327             closesocket(slisten);
328             slisten = -1;
329         }
330     }
331     error_setg_errno(errp, errno,
332                      socket_created ?
333                      "Failed to find an available port" :
334                      "Failed to create a socket");
335 listen_failed:
336     saved_errno = errno;
337     if (slisten >= 0) {
338         closesocket(slisten);
339     }
340     freeaddrinfo(res);
341     errno = saved_errno;
342     return -1;
343 
344 listen_ok:
345     freeaddrinfo(res);
346     return slisten;
347 }
348 
349 #ifdef _WIN32
350 #define QEMU_SOCKET_RC_INPROGRESS(rc) \
351     ((rc) == -EINPROGRESS || (rc) == -EWOULDBLOCK || (rc) == -WSAEALREADY)
352 #else
353 #define QEMU_SOCKET_RC_INPROGRESS(rc) \
354     ((rc) == -EINPROGRESS)
355 #endif
356 
357 static int inet_connect_addr(struct addrinfo *addr, Error **errp);
358 
359 static int inet_connect_addr(struct addrinfo *addr, Error **errp)
360 {
361     int sock, rc;
362 
363     sock = qemu_socket(addr->ai_family, addr->ai_socktype, addr->ai_protocol);
364     if (sock < 0) {
365         error_setg_errno(errp, errno, "Failed to create socket");
366         return -1;
367     }
368     socket_set_fast_reuse(sock);
369 
370     /* connect to peer */
371     do {
372         rc = 0;
373         if (connect(sock, addr->ai_addr, addr->ai_addrlen) < 0) {
374             rc = -errno;
375         }
376     } while (rc == -EINTR);
377 
378     if (rc < 0) {
379         error_setg_errno(errp, errno, "Failed to connect socket");
380         closesocket(sock);
381         return -1;
382     }
383 
384     return sock;
385 }
386 
387 static struct addrinfo *inet_parse_connect_saddr(InetSocketAddress *saddr,
388                                                  Error **errp)
389 {
390     struct addrinfo ai, *res;
391     int rc;
392     Error *err = NULL;
393     static int useV4Mapped = 1;
394 
395     memset(&ai, 0, sizeof(ai));
396 
397     ai.ai_flags = AI_CANONNAME | AI_ADDRCONFIG;
398     if (atomic_read(&useV4Mapped)) {
399         ai.ai_flags |= AI_V4MAPPED;
400     }
401     ai.ai_family = inet_ai_family_from_address(saddr, &err);
402     ai.ai_socktype = SOCK_STREAM;
403 
404     if (err) {
405         error_propagate(errp, err);
406         return NULL;
407     }
408 
409     if (saddr->host == NULL || saddr->port == NULL) {
410         error_setg(errp, "host and/or port not specified");
411         return NULL;
412     }
413 
414     /* lookup */
415     rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
416 
417     /* At least FreeBSD and OS-X 10.6 declare AI_V4MAPPED but
418      * then don't implement it in their getaddrinfo(). Detect
419      * this and retry without the flag since that's preferrable
420      * to a fatal error
421      */
422     if (rc == EAI_BADFLAGS &&
423         (ai.ai_flags & AI_V4MAPPED)) {
424         atomic_set(&useV4Mapped, 0);
425         ai.ai_flags &= ~AI_V4MAPPED;
426         rc = getaddrinfo(saddr->host, saddr->port, &ai, &res);
427     }
428     if (rc != 0) {
429         error_setg(errp, "address resolution failed for %s:%s: %s",
430                    saddr->host, saddr->port, gai_strerror(rc));
431         return NULL;
432     }
433     return res;
434 }
435 
436 /**
437  * Create a socket and connect it to an address.
438  *
439  * @saddr: Inet socket address specification
440  * @errp: set on error
441  *
442  * Returns: -1 on error, file descriptor on success.
443  */
444 int inet_connect_saddr(InetSocketAddress *saddr, Error **errp)
445 {
446     Error *local_err = NULL;
447     struct addrinfo *res, *e;
448     int sock = -1;
449 
450     res = inet_parse_connect_saddr(saddr, errp);
451     if (!res) {
452         return -1;
453     }
454 
455     for (e = res; e != NULL; e = e->ai_next) {
456         error_free(local_err);
457         local_err = NULL;
458         sock = inet_connect_addr(e, &local_err);
459         if (sock >= 0) {
460             break;
461         }
462     }
463 
464     freeaddrinfo(res);
465 
466     if (sock < 0) {
467         error_propagate(errp, local_err);
468         return sock;
469     }
470 
471     if (saddr->keep_alive) {
472         int val = 1;
473         int ret = qemu_setsockopt(sock, SOL_SOCKET, SO_KEEPALIVE,
474                                   &val, sizeof(val));
475 
476         if (ret < 0) {
477             error_setg_errno(errp, errno, "Unable to set KEEPALIVE");
478             close(sock);
479             return -1;
480         }
481     }
482 
483     return sock;
484 }
485 
486 static int inet_dgram_saddr(InetSocketAddress *sraddr,
487                             InetSocketAddress *sladdr,
488                             Error **errp)
489 {
490     struct addrinfo ai, *peer = NULL, *local = NULL;
491     const char *addr;
492     const char *port;
493     int sock = -1, rc;
494     Error *err = NULL;
495 
496     /* lookup peer addr */
497     memset(&ai,0, sizeof(ai));
498     ai.ai_flags = AI_CANONNAME | AI_V4MAPPED | AI_ADDRCONFIG;
499     ai.ai_family = inet_ai_family_from_address(sraddr, &err);
500     ai.ai_socktype = SOCK_DGRAM;
501 
502     if (err) {
503         error_propagate(errp, err);
504         goto err;
505     }
506 
507     addr = sraddr->host;
508     port = sraddr->port;
509     if (addr == NULL || strlen(addr) == 0) {
510         addr = "localhost";
511     }
512     if (port == NULL || strlen(port) == 0) {
513         error_setg(errp, "remote port not specified");
514         goto err;
515     }
516 
517     if ((rc = getaddrinfo(addr, port, &ai, &peer)) != 0) {
518         error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
519                    gai_strerror(rc));
520         goto err;
521     }
522 
523     /* lookup local addr */
524     memset(&ai,0, sizeof(ai));
525     ai.ai_flags = AI_PASSIVE;
526     ai.ai_family = peer->ai_family;
527     ai.ai_socktype = SOCK_DGRAM;
528 
529     if (sladdr) {
530         addr = sladdr->host;
531         port = sladdr->port;
532         if (addr == NULL || strlen(addr) == 0) {
533             addr = NULL;
534         }
535         if (!port || strlen(port) == 0) {
536             port = "0";
537         }
538     } else {
539         addr = NULL;
540         port = "0";
541     }
542 
543     if ((rc = getaddrinfo(addr, port, &ai, &local)) != 0) {
544         error_setg(errp, "address resolution failed for %s:%s: %s", addr, port,
545                    gai_strerror(rc));
546         goto err;
547     }
548 
549     /* create socket */
550     sock = qemu_socket(peer->ai_family, peer->ai_socktype, peer->ai_protocol);
551     if (sock < 0) {
552         error_setg_errno(errp, errno, "Failed to create socket");
553         goto err;
554     }
555     socket_set_fast_reuse(sock);
556 
557     /* bind socket */
558     if (bind(sock, local->ai_addr, local->ai_addrlen) < 0) {
559         error_setg_errno(errp, errno, "Failed to bind socket");
560         goto err;
561     }
562 
563     /* connect to peer */
564     if (connect(sock,peer->ai_addr,peer->ai_addrlen) < 0) {
565         error_setg_errno(errp, errno, "Failed to connect socket");
566         goto err;
567     }
568 
569     freeaddrinfo(local);
570     freeaddrinfo(peer);
571     return sock;
572 
573 err:
574     if (sock != -1) {
575         closesocket(sock);
576     }
577     if (local) {
578         freeaddrinfo(local);
579     }
580     if (peer) {
581         freeaddrinfo(peer);
582     }
583 
584     return -1;
585 }
586 
587 /* compatibility wrapper */
588 static int inet_parse_flag(const char *flagname, const char *optstr, bool *val,
589                            Error **errp)
590 {
591     char *end;
592     size_t len;
593 
594     end = strstr(optstr, ",");
595     if (end) {
596         if (end[1] == ',') { /* Reject 'ipv6=on,,foo' */
597             error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
598             return -1;
599         }
600         len = end - optstr;
601     } else {
602         len = strlen(optstr);
603     }
604     if (len == 0 || (len == 3 && strncmp(optstr, "=on", len) == 0)) {
605         *val = true;
606     } else if (len == 4 && strncmp(optstr, "=off", len) == 0) {
607         *val = false;
608     } else {
609         error_setg(errp, "error parsing '%s' flag '%s'", flagname, optstr);
610         return -1;
611     }
612     return 0;
613 }
614 
615 int inet_parse(InetSocketAddress *addr, const char *str, Error **errp)
616 {
617     const char *optstr, *h;
618     char host[65];
619     char port[33];
620     int to;
621     int pos;
622     char *begin;
623 
624     memset(addr, 0, sizeof(*addr));
625 
626     /* parse address */
627     if (str[0] == ':') {
628         /* no host given */
629         host[0] = '\0';
630         if (sscanf(str, ":%32[^,]%n", port, &pos) != 1) {
631             error_setg(errp, "error parsing port in address '%s'", str);
632             return -1;
633         }
634     } else if (str[0] == '[') {
635         /* IPv6 addr */
636         if (sscanf(str, "[%64[^]]]:%32[^,]%n", host, port, &pos) != 2) {
637             error_setg(errp, "error parsing IPv6 address '%s'", str);
638             return -1;
639         }
640     } else {
641         /* hostname or IPv4 addr */
642         if (sscanf(str, "%64[^:]:%32[^,]%n", host, port, &pos) != 2) {
643             error_setg(errp, "error parsing address '%s'", str);
644             return -1;
645         }
646     }
647 
648     addr->host = g_strdup(host);
649     addr->port = g_strdup(port);
650 
651     /* parse options */
652     optstr = str + pos;
653     h = strstr(optstr, ",to=");
654     if (h) {
655         h += 4;
656         if (sscanf(h, "%d%n", &to, &pos) != 1 ||
657             (h[pos] != '\0' && h[pos] != ',')) {
658             error_setg(errp, "error parsing to= argument");
659             return -1;
660         }
661         addr->has_to = true;
662         addr->to = to;
663     }
664     begin = strstr(optstr, ",ipv4");
665     if (begin) {
666         if (inet_parse_flag("ipv4", begin + 5, &addr->ipv4, errp) < 0) {
667             return -1;
668         }
669         addr->has_ipv4 = true;
670     }
671     begin = strstr(optstr, ",ipv6");
672     if (begin) {
673         if (inet_parse_flag("ipv6", begin + 5, &addr->ipv6, errp) < 0) {
674             return -1;
675         }
676         addr->has_ipv6 = true;
677     }
678     begin = strstr(optstr, ",keep-alive");
679     if (begin) {
680         if (inet_parse_flag("keep-alive", begin + strlen(",keep-alive"),
681                             &addr->keep_alive, errp) < 0)
682         {
683             return -1;
684         }
685         addr->has_keep_alive = true;
686     }
687     return 0;
688 }
689 
690 
691 /**
692  * Create a blocking socket and connect it to an address.
693  *
694  * @str: address string
695  * @errp: set in case of an error
696  *
697  * Returns -1 in case of error, file descriptor on success
698  **/
699 int inet_connect(const char *str, Error **errp)
700 {
701     int sock = -1;
702     InetSocketAddress *addr = g_new(InetSocketAddress, 1);
703 
704     if (!inet_parse(addr, str, errp)) {
705         sock = inet_connect_saddr(addr, errp);
706     }
707     qapi_free_InetSocketAddress(addr);
708     return sock;
709 }
710 
711 #ifdef CONFIG_AF_VSOCK
712 static bool vsock_parse_vaddr_to_sockaddr(const VsockSocketAddress *vaddr,
713                                           struct sockaddr_vm *svm,
714                                           Error **errp)
715 {
716     unsigned long long val;
717 
718     memset(svm, 0, sizeof(*svm));
719     svm->svm_family = AF_VSOCK;
720 
721     if (parse_uint_full(vaddr->cid, &val, 10) < 0 ||
722         val > UINT32_MAX) {
723         error_setg(errp, "Failed to parse cid '%s'", vaddr->cid);
724         return false;
725     }
726     svm->svm_cid = val;
727 
728     if (parse_uint_full(vaddr->port, &val, 10) < 0 ||
729         val > UINT32_MAX) {
730         error_setg(errp, "Failed to parse port '%s'", vaddr->port);
731         return false;
732     }
733     svm->svm_port = val;
734 
735     return true;
736 }
737 
738 static int vsock_connect_addr(const struct sockaddr_vm *svm, Error **errp)
739 {
740     int sock, rc;
741 
742     sock = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
743     if (sock < 0) {
744         error_setg_errno(errp, errno, "Failed to create socket");
745         return -1;
746     }
747 
748     /* connect to peer */
749     do {
750         rc = 0;
751         if (connect(sock, (const struct sockaddr *)svm, sizeof(*svm)) < 0) {
752             rc = -errno;
753         }
754     } while (rc == -EINTR);
755 
756     if (rc < 0) {
757         error_setg_errno(errp, errno, "Failed to connect socket");
758         closesocket(sock);
759         return -1;
760     }
761 
762     return sock;
763 }
764 
765 static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
766 {
767     struct sockaddr_vm svm;
768 
769     if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
770         return -1;
771     }
772 
773     return vsock_connect_addr(&svm, errp);
774 }
775 
776 static int vsock_listen_saddr(VsockSocketAddress *vaddr,
777                               int num,
778                               Error **errp)
779 {
780     struct sockaddr_vm svm;
781     int slisten;
782 
783     if (!vsock_parse_vaddr_to_sockaddr(vaddr, &svm, errp)) {
784         return -1;
785     }
786 
787     slisten = qemu_socket(AF_VSOCK, SOCK_STREAM, 0);
788     if (slisten < 0) {
789         error_setg_errno(errp, errno, "Failed to create socket");
790         return -1;
791     }
792 
793     if (bind(slisten, (const struct sockaddr *)&svm, sizeof(svm)) != 0) {
794         error_setg_errno(errp, errno, "Failed to bind socket");
795         closesocket(slisten);
796         return -1;
797     }
798 
799     if (listen(slisten, num) != 0) {
800         error_setg_errno(errp, errno, "Failed to listen on socket");
801         closesocket(slisten);
802         return -1;
803     }
804     return slisten;
805 }
806 
807 static int vsock_parse(VsockSocketAddress *addr, const char *str,
808                        Error **errp)
809 {
810     char cid[33];
811     char port[33];
812     int n;
813 
814     if (sscanf(str, "%32[^:]:%32[^,]%n", cid, port, &n) != 2) {
815         error_setg(errp, "error parsing address '%s'", str);
816         return -1;
817     }
818     if (str[n] != '\0') {
819         error_setg(errp, "trailing characters in address '%s'", str);
820         return -1;
821     }
822 
823     addr->cid = g_strdup(cid);
824     addr->port = g_strdup(port);
825     return 0;
826 }
827 #else
828 static void vsock_unsupported(Error **errp)
829 {
830     error_setg(errp, "socket family AF_VSOCK unsupported");
831 }
832 
833 static int vsock_connect_saddr(VsockSocketAddress *vaddr, Error **errp)
834 {
835     vsock_unsupported(errp);
836     return -1;
837 }
838 
839 static int vsock_listen_saddr(VsockSocketAddress *vaddr,
840                               int num,
841                               Error **errp)
842 {
843     vsock_unsupported(errp);
844     return -1;
845 }
846 
847 static int vsock_parse(VsockSocketAddress *addr, const char *str,
848                         Error **errp)
849 {
850     vsock_unsupported(errp);
851     return -1;
852 }
853 #endif /* CONFIG_AF_VSOCK */
854 
855 #ifndef _WIN32
856 
857 static int unix_listen_saddr(UnixSocketAddress *saddr,
858                              int num,
859                              Error **errp)
860 {
861     struct sockaddr_un un;
862     int sock, fd;
863     char *pathbuf = NULL;
864     const char *path;
865     size_t pathlen;
866 
867     sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
868     if (sock < 0) {
869         error_setg_errno(errp, errno, "Failed to create Unix socket");
870         return -1;
871     }
872 
873     if (saddr->path && saddr->path[0]) {
874         path = saddr->path;
875     } else {
876         const char *tmpdir = getenv("TMPDIR");
877         tmpdir = tmpdir ? tmpdir : "/tmp";
878         path = pathbuf = g_strdup_printf("%s/qemu-socket-XXXXXX", tmpdir);
879     }
880 
881     pathlen = strlen(path);
882     if (pathlen > sizeof(un.sun_path)) {
883         error_setg(errp, "UNIX socket path '%s' is too long", path);
884         error_append_hint(errp, "Path must be less than %zu bytes\n",
885                           sizeof(un.sun_path));
886         goto err;
887     }
888 
889     if (pathbuf != NULL) {
890         /*
891          * This dummy fd usage silences the mktemp() unsecure warning.
892          * Using mkstemp() doesn't make things more secure here
893          * though.  bind() complains about existing files, so we have
894          * to unlink first and thus re-open the race window.  The
895          * worst case possible is bind() failing, i.e. a DoS attack.
896          */
897         fd = mkstemp(pathbuf);
898         if (fd < 0) {
899             error_setg_errno(errp, errno,
900                              "Failed to make a temporary socket %s", pathbuf);
901             goto err;
902         }
903         close(fd);
904     }
905 
906     if (unlink(path) < 0 && errno != ENOENT) {
907         error_setg_errno(errp, errno,
908                          "Failed to unlink socket %s", path);
909         goto err;
910     }
911 
912     memset(&un, 0, sizeof(un));
913     un.sun_family = AF_UNIX;
914     memcpy(un.sun_path, path, pathlen);
915 
916     if (bind(sock, (struct sockaddr*) &un, sizeof(un)) < 0) {
917         error_setg_errno(errp, errno, "Failed to bind socket to %s", path);
918         goto err;
919     }
920     if (listen(sock, num) < 0) {
921         error_setg_errno(errp, errno, "Failed to listen on socket");
922         goto err;
923     }
924 
925     g_free(pathbuf);
926     return sock;
927 
928 err:
929     g_free(pathbuf);
930     closesocket(sock);
931     return -1;
932 }
933 
934 static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
935 {
936     struct sockaddr_un un;
937     int sock, rc;
938     size_t pathlen;
939 
940     if (saddr->path == NULL) {
941         error_setg(errp, "unix connect: no path specified");
942         return -1;
943     }
944 
945     sock = qemu_socket(PF_UNIX, SOCK_STREAM, 0);
946     if (sock < 0) {
947         error_setg_errno(errp, errno, "Failed to create socket");
948         return -1;
949     }
950 
951     pathlen = strlen(saddr->path);
952     if (pathlen > sizeof(un.sun_path)) {
953         error_setg(errp, "UNIX socket path '%s' is too long", saddr->path);
954         error_append_hint(errp, "Path must be less than %zu bytes\n",
955                           sizeof(un.sun_path));
956         goto err;
957     }
958 
959     memset(&un, 0, sizeof(un));
960     un.sun_family = AF_UNIX;
961     memcpy(un.sun_path, saddr->path, pathlen);
962 
963     /* connect to peer */
964     do {
965         rc = 0;
966         if (connect(sock, (struct sockaddr *) &un, sizeof(un)) < 0) {
967             rc = -errno;
968         }
969     } while (rc == -EINTR);
970 
971     if (rc < 0) {
972         error_setg_errno(errp, -rc, "Failed to connect socket %s",
973                          saddr->path);
974         goto err;
975     }
976 
977     return sock;
978 
979  err:
980     close(sock);
981     return -1;
982 }
983 
984 #else
985 
986 static int unix_listen_saddr(UnixSocketAddress *saddr,
987                              int num,
988                              Error **errp)
989 {
990     error_setg(errp, "unix sockets are not available on windows");
991     errno = ENOTSUP;
992     return -1;
993 }
994 
995 static int unix_connect_saddr(UnixSocketAddress *saddr, Error **errp)
996 {
997     error_setg(errp, "unix sockets are not available on windows");
998     errno = ENOTSUP;
999     return -1;
1000 }
1001 #endif
1002 
1003 /* compatibility wrapper */
1004 int unix_listen(const char *str, Error **errp)
1005 {
1006     UnixSocketAddress *saddr;
1007     int sock;
1008 
1009     saddr = g_new0(UnixSocketAddress, 1);
1010     saddr->path = g_strdup(str);
1011     sock = unix_listen_saddr(saddr, 1, errp);
1012     qapi_free_UnixSocketAddress(saddr);
1013     return sock;
1014 }
1015 
1016 int unix_connect(const char *path, Error **errp)
1017 {
1018     UnixSocketAddress *saddr;
1019     int sock;
1020 
1021     saddr = g_new0(UnixSocketAddress, 1);
1022     saddr->path = g_strdup(path);
1023     sock = unix_connect_saddr(saddr, errp);
1024     qapi_free_UnixSocketAddress(saddr);
1025     return sock;
1026 }
1027 
1028 
1029 SocketAddress *socket_parse(const char *str, Error **errp)
1030 {
1031     SocketAddress *addr;
1032 
1033     addr = g_new0(SocketAddress, 1);
1034     if (strstart(str, "unix:", NULL)) {
1035         if (str[5] == '\0') {
1036             error_setg(errp, "invalid Unix socket address");
1037             goto fail;
1038         } else {
1039             addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1040             addr->u.q_unix.path = g_strdup(str + 5);
1041         }
1042     } else if (strstart(str, "fd:", NULL)) {
1043         if (str[3] == '\0') {
1044             error_setg(errp, "invalid file descriptor address");
1045             goto fail;
1046         } else {
1047             addr->type = SOCKET_ADDRESS_TYPE_FD;
1048             addr->u.fd.str = g_strdup(str + 3);
1049         }
1050     } else if (strstart(str, "vsock:", NULL)) {
1051         addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1052         if (vsock_parse(&addr->u.vsock, str + strlen("vsock:"), errp)) {
1053             goto fail;
1054         }
1055     } else {
1056         addr->type = SOCKET_ADDRESS_TYPE_INET;
1057         if (inet_parse(&addr->u.inet, str, errp)) {
1058             goto fail;
1059         }
1060     }
1061     return addr;
1062 
1063 fail:
1064     qapi_free_SocketAddress(addr);
1065     return NULL;
1066 }
1067 
1068 static int socket_get_fd(const char *fdstr, int num, Error **errp)
1069 {
1070     int fd;
1071     if (num != 1) {
1072         error_setg_errno(errp, EINVAL, "socket_get_fd: too many connections");
1073         return -1;
1074     }
1075     if (cur_mon) {
1076         fd = monitor_get_fd(cur_mon, fdstr, errp);
1077         if (fd < 0) {
1078             return -1;
1079         }
1080     } else {
1081         if (qemu_strtoi(fdstr, NULL, 10, &fd) < 0) {
1082             error_setg_errno(errp, errno,
1083                              "Unable to parse FD number %s",
1084                              fdstr);
1085             return -1;
1086         }
1087     }
1088     if (!fd_is_socket(fd)) {
1089         error_setg(errp, "File descriptor '%s' is not a socket", fdstr);
1090         close(fd);
1091         return -1;
1092     }
1093     return fd;
1094 }
1095 
1096 int socket_connect(SocketAddress *addr, Error **errp)
1097 {
1098     int fd;
1099 
1100     switch (addr->type) {
1101     case SOCKET_ADDRESS_TYPE_INET:
1102         fd = inet_connect_saddr(&addr->u.inet, errp);
1103         break;
1104 
1105     case SOCKET_ADDRESS_TYPE_UNIX:
1106         fd = unix_connect_saddr(&addr->u.q_unix, errp);
1107         break;
1108 
1109     case SOCKET_ADDRESS_TYPE_FD:
1110         fd = socket_get_fd(addr->u.fd.str, 1, errp);
1111         break;
1112 
1113     case SOCKET_ADDRESS_TYPE_VSOCK:
1114         fd = vsock_connect_saddr(&addr->u.vsock, errp);
1115         break;
1116 
1117     default:
1118         abort();
1119     }
1120     return fd;
1121 }
1122 
1123 int socket_listen(SocketAddress *addr, int num, Error **errp)
1124 {
1125     int fd;
1126 
1127     trace_socket_listen(num);
1128     switch (addr->type) {
1129     case SOCKET_ADDRESS_TYPE_INET:
1130         fd = inet_listen_saddr(&addr->u.inet, 0, num, errp);
1131         break;
1132 
1133     case SOCKET_ADDRESS_TYPE_UNIX:
1134         fd = unix_listen_saddr(&addr->u.q_unix, num, errp);
1135         break;
1136 
1137     case SOCKET_ADDRESS_TYPE_FD:
1138         fd = socket_get_fd(addr->u.fd.str, num, errp);
1139         break;
1140 
1141     case SOCKET_ADDRESS_TYPE_VSOCK:
1142         fd = vsock_listen_saddr(&addr->u.vsock, num, errp);
1143         break;
1144 
1145     default:
1146         abort();
1147     }
1148     return fd;
1149 }
1150 
1151 void socket_listen_cleanup(int fd, Error **errp)
1152 {
1153     SocketAddress *addr;
1154 
1155     addr = socket_local_address(fd, errp);
1156     if (!addr) {
1157         return;
1158     }
1159 
1160     if (addr->type == SOCKET_ADDRESS_TYPE_UNIX
1161         && addr->u.q_unix.path) {
1162         if (unlink(addr->u.q_unix.path) < 0 && errno != ENOENT) {
1163             error_setg_errno(errp, errno,
1164                              "Failed to unlink socket %s",
1165                              addr->u.q_unix.path);
1166         }
1167     }
1168 
1169     qapi_free_SocketAddress(addr);
1170 }
1171 
1172 int socket_dgram(SocketAddress *remote, SocketAddress *local, Error **errp)
1173 {
1174     int fd;
1175 
1176     /*
1177      * TODO SOCKET_ADDRESS_TYPE_FD when fd is AF_INET or AF_INET6
1178      * (although other address families can do SOCK_DGRAM, too)
1179      */
1180     switch (remote->type) {
1181     case SOCKET_ADDRESS_TYPE_INET:
1182         fd = inet_dgram_saddr(&remote->u.inet,
1183                               local ? &local->u.inet : NULL, errp);
1184         break;
1185 
1186     default:
1187         error_setg(errp, "socket type unsupported for datagram");
1188         fd = -1;
1189     }
1190     return fd;
1191 }
1192 
1193 
1194 static SocketAddress *
1195 socket_sockaddr_to_address_inet(struct sockaddr_storage *sa,
1196                                 socklen_t salen,
1197                                 Error **errp)
1198 {
1199     char host[NI_MAXHOST];
1200     char serv[NI_MAXSERV];
1201     SocketAddress *addr;
1202     InetSocketAddress *inet;
1203     int ret;
1204 
1205     ret = getnameinfo((struct sockaddr *)sa, salen,
1206                       host, sizeof(host),
1207                       serv, sizeof(serv),
1208                       NI_NUMERICHOST | NI_NUMERICSERV);
1209     if (ret != 0) {
1210         error_setg(errp, "Cannot format numeric socket address: %s",
1211                    gai_strerror(ret));
1212         return NULL;
1213     }
1214 
1215     addr = g_new0(SocketAddress, 1);
1216     addr->type = SOCKET_ADDRESS_TYPE_INET;
1217     inet = &addr->u.inet;
1218     inet->host = g_strdup(host);
1219     inet->port = g_strdup(serv);
1220     if (sa->ss_family == AF_INET) {
1221         inet->has_ipv4 = inet->ipv4 = true;
1222     } else {
1223         inet->has_ipv6 = inet->ipv6 = true;
1224     }
1225 
1226     return addr;
1227 }
1228 
1229 
1230 #ifndef WIN32
1231 static SocketAddress *
1232 socket_sockaddr_to_address_unix(struct sockaddr_storage *sa,
1233                                 socklen_t salen,
1234                                 Error **errp)
1235 {
1236     SocketAddress *addr;
1237     struct sockaddr_un *su = (struct sockaddr_un *)sa;
1238 
1239     addr = g_new0(SocketAddress, 1);
1240     addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1241     if (su->sun_path[0]) {
1242         addr->u.q_unix.path = g_strndup(su->sun_path, sizeof(su->sun_path));
1243     }
1244 
1245     return addr;
1246 }
1247 #endif /* WIN32 */
1248 
1249 #ifdef CONFIG_AF_VSOCK
1250 static SocketAddress *
1251 socket_sockaddr_to_address_vsock(struct sockaddr_storage *sa,
1252                                  socklen_t salen,
1253                                  Error **errp)
1254 {
1255     SocketAddress *addr;
1256     VsockSocketAddress *vaddr;
1257     struct sockaddr_vm *svm = (struct sockaddr_vm *)sa;
1258 
1259     addr = g_new0(SocketAddress, 1);
1260     addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1261     vaddr = &addr->u.vsock;
1262     vaddr->cid = g_strdup_printf("%u", svm->svm_cid);
1263     vaddr->port = g_strdup_printf("%u", svm->svm_port);
1264 
1265     return addr;
1266 }
1267 #endif /* CONFIG_AF_VSOCK */
1268 
1269 SocketAddress *
1270 socket_sockaddr_to_address(struct sockaddr_storage *sa,
1271                            socklen_t salen,
1272                            Error **errp)
1273 {
1274     switch (sa->ss_family) {
1275     case AF_INET:
1276     case AF_INET6:
1277         return socket_sockaddr_to_address_inet(sa, salen, errp);
1278 
1279 #ifndef WIN32
1280     case AF_UNIX:
1281         return socket_sockaddr_to_address_unix(sa, salen, errp);
1282 #endif /* WIN32 */
1283 
1284 #ifdef CONFIG_AF_VSOCK
1285     case AF_VSOCK:
1286         return socket_sockaddr_to_address_vsock(sa, salen, errp);
1287 #endif
1288 
1289     default:
1290         error_setg(errp, "socket family %d unsupported",
1291                    sa->ss_family);
1292         return NULL;
1293     }
1294     return 0;
1295 }
1296 
1297 
1298 SocketAddress *socket_local_address(int fd, Error **errp)
1299 {
1300     struct sockaddr_storage ss;
1301     socklen_t sslen = sizeof(ss);
1302 
1303     if (getsockname(fd, (struct sockaddr *)&ss, &sslen) < 0) {
1304         error_setg_errno(errp, errno, "%s",
1305                          "Unable to query local socket address");
1306         return NULL;
1307     }
1308 
1309     return socket_sockaddr_to_address(&ss, sslen, errp);
1310 }
1311 
1312 
1313 SocketAddress *socket_remote_address(int fd, Error **errp)
1314 {
1315     struct sockaddr_storage ss;
1316     socklen_t sslen = sizeof(ss);
1317 
1318     if (getpeername(fd, (struct sockaddr *)&ss, &sslen) < 0) {
1319         error_setg_errno(errp, errno, "%s",
1320                          "Unable to query remote socket address");
1321         return NULL;
1322     }
1323 
1324     return socket_sockaddr_to_address(&ss, sslen, errp);
1325 }
1326 
1327 
1328 SocketAddress *socket_address_flatten(SocketAddressLegacy *addr_legacy)
1329 {
1330     SocketAddress *addr;
1331 
1332     if (!addr_legacy) {
1333         return NULL;
1334     }
1335 
1336     addr = g_new(SocketAddress, 1);
1337 
1338     switch (addr_legacy->type) {
1339     case SOCKET_ADDRESS_LEGACY_KIND_INET:
1340         addr->type = SOCKET_ADDRESS_TYPE_INET;
1341         QAPI_CLONE_MEMBERS(InetSocketAddress, &addr->u.inet,
1342                            addr_legacy->u.inet.data);
1343         break;
1344     case SOCKET_ADDRESS_LEGACY_KIND_UNIX:
1345         addr->type = SOCKET_ADDRESS_TYPE_UNIX;
1346         QAPI_CLONE_MEMBERS(UnixSocketAddress, &addr->u.q_unix,
1347                            addr_legacy->u.q_unix.data);
1348         break;
1349     case SOCKET_ADDRESS_LEGACY_KIND_VSOCK:
1350         addr->type = SOCKET_ADDRESS_TYPE_VSOCK;
1351         QAPI_CLONE_MEMBERS(VsockSocketAddress, &addr->u.vsock,
1352                            addr_legacy->u.vsock.data);
1353         break;
1354     case SOCKET_ADDRESS_LEGACY_KIND_FD:
1355         addr->type = SOCKET_ADDRESS_TYPE_FD;
1356         QAPI_CLONE_MEMBERS(String, &addr->u.fd, addr_legacy->u.fd.data);
1357         break;
1358     default:
1359         abort();
1360     }
1361 
1362     return addr;
1363 }
1364