Message ID | ce51dd78fd7aa0856d160b2d94c82f68dd4e7056.1579055705.git-series.marmarek@invisiblethingslab.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | Add support for qemu-xen runnning in a Linux-based stubdomain. | expand |
On 15.01.2020 03:39, Marek Marczykowski-Górecki wrote: > Add a simple proxy for tunneling socket connection over vchan. This is > based on existing vchan-node* applications, but extended with socket > support. vchan-socket-proxy serves both as a client and as a server, > depending on parameters. It can be used to transparently communicate > with an application in another domian that normally expose UNIX socket > interface. Specifically, it's written to communicate with qemu running > within stubdom. > > Server mode listens for vchan connections and when one is opened, > connects to a pointed UNIX socket. Client mode listens on UNIX > socket and when someone connects, opens a vchan connection. Only > a single connection at a time is supported. > > Additionally, socket can be provided as a number - in which case it's > interpreted as already open FD (in case of UNIX listening socket - > listen() needs to be already called). Or "-" meaning stdin/stdout - in > which case it is reduced to vchan-node2 functionality. > > Example usage: > > 1. (in dom0) vchan-socket-proxy --mode=client <DOMID> > /local/domain/<DOMID>/data/vchan/1234 /run/qemu.(DOMID) > > 2. (in DOMID) vchan-socket-proxy --mode=server 0 > /local/domain/<DOMID>/data/vchan/1234 /run/qemu.(DOMID) > > This will listen on /run/qemu.(DOMID) in dom0 and whenever connection is > made, it will connect to DOMID, where server process will connect to > /run/qemu.(DOMID) there. When client disconnects, vchan connection is > terminated and server vchan-socket-proxy process also disconnects from > qemu. > > Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com> > --- > .gitignore | 1 +- I guess this is why various non-tool-stack maintainers have been Cc-ed. It would have been nice if you had stripped the unnecessary Cc-s. I don't think ./MAINTAINERS can properly express a suitable rule of Cc REST if the adjustment is not simply accompanying the addition of some new output file. > tools/libvchan/Makefile | 7 +- > tools/libvchan/init.c.rej | 60 ++++- Now since I've been Cc-ed, I'd like to ask what this is about. Jan
On Wed, Jan 15, 2020 at 12:02:42PM +0100, Jan Beulich wrote: > On 15.01.2020 03:39, Marek Marczykowski-Górecki wrote: > > .gitignore | 1 +- > > I guess this is why various non-tool-stack maintainers have > been Cc-ed. It would have been nice if you had stripped the > unnecessary Cc-s. I don't think ./MAINTAINERS can properly > express a suitable rule of Cc REST if the adjustment is not > simply accompanying the addition of some new output file. Maybe a solution would be to make use of more .gitignore files in specific subdirs? I see there are some, but for example tools/misc is mentioned in _both_ toplevel .gitignore and tools/misc/.gitignore. > > tools/libvchan/Makefile | 7 +- > > tools/libvchan/init.c.rej | 60 ++++- > > Now since I've been Cc-ed, I'd like to ask what this is about. This is obviously a mistake. Will remove in the next revision.
On 16.01.2020 18:11, Marek Marczykowski-Górecki wrote: > On Wed, Jan 15, 2020 at 12:02:42PM +0100, Jan Beulich wrote: >> On 15.01.2020 03:39, Marek Marczykowski-Górecki wrote: >>> .gitignore | 1 +- >> >> I guess this is why various non-tool-stack maintainers have >> been Cc-ed. It would have been nice if you had stripped the >> unnecessary Cc-s. I don't think ./MAINTAINERS can properly >> express a suitable rule of Cc REST if the adjustment is not >> simply accompanying the addition of some new output file. > > Maybe a solution would be to make use of more .gitignore files in > specific subdirs? I see there are some, but for example tools/misc is > mentioned in _both_ toplevel .gitignore and tools/misc/.gitignore. Well, yes, we've been discussing this elsewhere. We should settle on one model (central vs per-main-subtree vs per-dir), I think. I have no particular preference except for disliking any mixed models. Jan
On Jan 14, 2020, at 21:42, Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com> wrote: > > diff --git a/tools/libvchan/Makefile b/tools/libvchan/Makefile > index 7892750..1c845ca 100644 > --- a/tools/libvchan/Makefile > +++ b/tools/libvchan/Makefile > @@ -13,6 +13,7 @@ LIBVCHAN_PIC_OBJS = $(patsubst %.o,%.opic,$(LIBVCHAN_OBJS)) > LIBVCHAN_LIBS = $(LDLIBS_libxenstore) $(LDLIBS_libxengnttab) $(LDLIBS_libxenevtchn) > $(LIBVCHAN_OBJS) $(LIBVCHAN_PIC_OBJS): CFLAGS += $(CFLAGS_libxenstore) $(CFLAGS_libxengnttab) $(CFLAGS_libxenevtchn) > $(NODE_OBJS) $(NODE2_OBJS): CFLAGS += $(CFLAGS_libxengnttab) $(CFLAGS_libxenevtchn) > +vchan-socket-proxy.o: CFLAGS += $(CFLAGS_libxenstore) $(CFLAGS_libxenctrl) $(CFLAGS_libxengnttab) $(CFLAGS_libxenevtchn) > > MAJOR = 4.14 > MINOR = 0 > @@ -39,7 +40,7 @@ $(PKG_CONFIG_LOCAL): PKG_CONFIG_LIBDIR = $(CURDIR) > $(PKG_CONFIG_LOCAL): PKG_CONFIG_CFLAGS_LOCAL = $(CFLAGS_xeninclude) > > .PHONY: all > -all: libxenvchan.so vchan-node1 vchan-node2 libxenvchan.a $(PKG_CONFIG_INST) $(PKG_CONFIG_LOCAL) > +all: libxenvchan.so vchan-node1 vchan-node2 vchan-socket-proxy libxenvchan.a $(PKG_CONFIG_INST) $(PKG_CONFIG_LOCAL) > > libxenvchan.so: libxenvchan.so.$(MAJOR) > ln -sf $< $@ > @@ -59,6 +60,9 @@ vchan-node1: $(NODE_OBJS) libxenvchan.so > vchan-node2: $(NODE2_OBJS) libxenvchan.so > $(CC) $(LDFLAGS) -o $@ $(NODE2_OBJS) $(LDLIBS_libxenvchan) $(APPEND_LDFLAGS) > > +vchan-socket-proxy: vchan-socket-proxy.o libxenvchan.so > + $(CC) $(LDFLAGS) -o $@ $< $(LDLIBS_libxenvchan) $(LDLIBS_libxenstore) $(LDLIBS_libxenctrl) $(APPEND_LDFLAGS) > + > .PHONY: install > install: all > $(INSTALL_DIR) $(DESTDIR)$(libdir) > @@ -66,6 +70,7 @@ install: all > $(INSTALL_PROG) libxenvchan.so.$(MAJOR).$(MINOR) $(DESTDIR)$(libdir) > ln -sf libxenvchan.so.$(MAJOR).$(MINOR) $(DESTDIR)$(libdir)/libxenvchan.so.$(MAJOR) > ln -sf libxenvchan.so.$(MAJOR) $(DESTDIR)$(libdir)/libxenvchan.so > + $(INSTALL_PROG) vchan-socket-proxy $(DESTDIR)$(bindir) Does this need directory creation, to avoid vchan binary being named "bin"? + $(INSTALL_DIR) $(DESTDIR)$(bindir) > diff --git a/tools/libvchan/vchan-socket-proxy.c b/tools/libvchan/vchan-socket-proxy.c > new file mode 100644 > index 0000000..6b4ae09 > --- /dev/null > +++ b/tools/libvchan/vchan-socket-proxy.c > @@ -0,0 +1,469 @@ > +/** > + * @file > + * @section AUTHORS > + * > + * Copyright (C) 2010 Rafal Wojtczuk <rafal@invisiblethingslab.com> > + * > + * Authors: > + * Rafal Wojtczuk <rafal@invisiblethingslab.com> > + * Daniel De Graaf <dgdegra@tycho.nsa.gov> > + * Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com> > + * > + * @section LICENSE > + * > + * This program is free software; you can redistribute it and/or > + * modify it under the terms of the GNU Lesser General Public > + * License as published by the Free Software Foundation; either > + * version 2.1 of the License, or (at your option) any later version. > + * > + * This program is distributed in the hope that it will be useful, > + * but WITHOUT ANY WARRANTY; without even the implied warranty of > + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU > + * Lesser General Public License for more details. > + * > + * You should have received a copy of the GNU Lesser General Public > + * License along with this program; If not, see <http://www.gnu.org/licenses/>. > + * > + * @section DESCRIPTION > + * > + * This is a vchan to unix socket proxy. Vchan server is set, and on client > + * connection, local socket connection is established. Communication is bidirectional. > + * One client is served at a time, clients needs to coordinate this themselves. > + */ > + > +#include <stdlib.h> > +#include <stdio.h> > +#include <string.h> > +#include <unistd.h> > +#include <fcntl.h> > +#include <errno.h> > +#include <sys/socket.h> > +#include <sys/un.h> > +#include <getopt.h> > + > +#include <xenstore.h> > +#include <xenctrl.h> > +#include <libxenvchan.h> > + > +static void usage(char** argv) > +{ > + fprintf(stderr, "usage:\n" > + "\t%s [options] domainid nodepath [socket-path|file-no|-]\n" > + "\n" > + "options:\n" > + "\t-m, --mode=client|server - vchan connection mode\n" > + "\t-m, --state-path=path - xenstore path where write \"running\" to at startup\n" > + "\t-v, --verbose - verbose logging\n" > + "\n" > + "client: client of a vchan connection, fourth parameter can be:\n" > + "\tsocket-path: listen on a UNIX socket at this path and connect to vchan\n" > + "\t whenever new connection is accepted;\n" > + "\t handle multiple _subsequent_ connections, until terminated\n" > + "\tfile-no: except open FD of a socket in listen mode; otherwise similar to socket-path\n" > + "\t-: open vchan connection immediately and pass the data from stdin/stdout;\n" > + "\t terminate when vchan connection is closed\n" > + "server: server of a vchan connection, fourth parameter can be:\n" > + "\tsocket-path: connect to this UNIX socket when new vchan connection is accepted\n" > + "\t handle multiple _subsequent_ connections, until terminated\n" > + "\tfile-no: pass data to/from this FD; terminate when vchan connection is closed\n" > + "\t-: pass data to/from stdin/stdout; terminatate when vchan connection is closed\n", > + argv[0]); > + exit(1); > +} > + > +#define BUFSIZE 8192 > +char inbuf[BUFSIZE]; > +char outbuf[BUFSIZE]; > +int insiz = 0; > +int outsiz = 0; > +int verbose = 0; > + > +static void vchan_wr(struct libxenvchan *ctrl) { > + int ret; > + > + if (!insiz) > + return; > + ret = libxenvchan_write(ctrl, inbuf, insiz); > + if (ret < 0) { > + fprintf(stderr, "vchan write failed\n"); > + exit(1); > + } > + if (verbose) > + fprintf(stderr, "written %d bytes to vchan\n", ret); > + if (ret > 0) { > + insiz -= ret; > + memmove(inbuf, inbuf + ret, insiz); > + } > +} > + > +static void socket_wr(int output_fd) { > + int ret; > + > + if (!outsiz) > + return; > + ret = write(output_fd, outbuf, outsiz); > + if (ret < 0 && errno != EAGAIN) > + exit(1); > + if (ret > 0) { > + outsiz -= ret; > + memmove(outbuf, outbuf + ret, outsiz); > + } > +} > + > +static int set_nonblocking(int fd, int nonblocking) { > + int flags = fcntl(fd, F_GETFL); > + if (flags == -1) > + return -1; > + > + if (nonblocking) > + flags |= O_NONBLOCK; > + else > + flags &= ~O_NONBLOCK; > + > + if (fcntl(fd, F_SETFL, flags) == -1) > + return -1; > + > + return 0; > +} > + > +static int connect_socket(const char *path_or_fd) { > + int fd; > + char *endptr; > + struct sockaddr_un addr; > + > + fd = strtoll(path_or_fd, &endptr, 0); > + if (*endptr == '\0') { > + set_nonblocking(fd, 1); > + return fd; > + } > + > + fd = socket(AF_UNIX, SOCK_STREAM, 0); > + if (fd == -1) > + return -1; > + > + addr.sun_family = AF_UNIX; > + strncpy(addr.sun_path, path_or_fd, sizeof(addr.sun_path)); > + if (connect(fd, (const struct sockaddr *)&addr, sizeof(addr)) == -1) { > + close(fd); > + return -1; > + } > + > + set_nonblocking(fd, 1); > + > + return fd; > +} > + > +static int listen_socket(const char *path_or_fd) { > + int fd; > + char *endptr; > + struct sockaddr_un addr; > + > + fd = strtoll(path_or_fd, &endptr, 0); > + if (*endptr == '\0') { > + return fd; > + } > + > + /* if not a number, assume a socket path */ > + fd = socket(AF_UNIX, SOCK_STREAM, 0); > + if (fd == -1) > + return -1; > + > + addr.sun_family = AF_UNIX; > + strncpy(addr.sun_path, path_or_fd, sizeof(addr.sun_path)); > + if (bind(fd, (const struct sockaddr *)&addr, sizeof(addr)) == -1) { > + close(fd); > + return -1; > + } > + if (listen(fd, 5) != 0) { > + close(fd); > + return -1; > + } > + > + return fd; > +} > + > +static struct libxenvchan *connect_vchan(int domid, const char *path) { > + struct libxenvchan *ctrl = NULL; > + struct xs_handle *xs = NULL; > + xc_interface *xc = NULL; > + xc_dominfo_t dominfo; > + char **watch_ret; > + unsigned int watch_num; > + int ret; > + > + xs = xs_open(XS_OPEN_READONLY); > + if (!xs) { > + perror("xs_open"); > + goto out; > + } > + xc = xc_interface_open(NULL, NULL, XC_OPENFLAG_NON_REENTRANT); > + if (!xc) { > + perror("xc_interface_open"); > + goto out; > + } > + /* wait for vchan server to create *path* */ > + xs_watch(xs, path, "path"); > + xs_watch(xs, "@releaseDomain", "release"); > + while ((watch_ret = xs_read_watch(xs, &watch_num))) { > + /* don't care about exact which fired the watch */ > + free(watch_ret); > + ctrl = libxenvchan_client_init(NULL, domid, path); > + if (ctrl) > + break; > + > + ret = xc_domain_getinfo(xc, domid, 1, &dominfo); > + /* break the loop if domain is definitely not there anymore, but > + * continue if it is or the call failed (like EPERM) */ > + if (ret == -1 && errno == ESRCH) > + break; > + if (ret == 1 && (dominfo.domid != (uint32_t)domid || dominfo.dying)) > + break; > + } > + > +out: > + if (xc) > + xc_interface_close(xc); > + if (xs) > + xs_close(xs); > + return ctrl; > +} > + > + > +static void discard_buffers(struct libxenvchan *ctrl) { > + /* discard local buffers */ > + insiz = 0; > + outsiz = 0; > + > + /* discard remaining incoming data */ > + while (libxenvchan_data_ready(ctrl)) { > + if (libxenvchan_read(ctrl, inbuf, BUFSIZE) == -1) { > + perror("vchan read"); > + exit(1); > + } > + } > +} > + > +int data_loop(struct libxenvchan *ctrl, int input_fd, int output_fd) > +{ > + int ret; > + int libxenvchan_fd; > + int max_fd; > + > + libxenvchan_fd = libxenvchan_fd_for_select(ctrl); > + for (;;) { > + fd_set rfds; > + fd_set wfds; > + FD_ZERO(&rfds); > + FD_ZERO(&wfds); > + > + max_fd = -1; > + if (input_fd != -1 && insiz != BUFSIZE) { > + FD_SET(input_fd, &rfds); > + if (input_fd > max_fd) > + max_fd = input_fd; > + } > + if (output_fd != -1 && outsiz) { > + FD_SET(output_fd, &wfds); > + if (output_fd > max_fd) > + max_fd = output_fd; > + } > + FD_SET(libxenvchan_fd, &rfds); > + if (libxenvchan_fd > max_fd) > + max_fd = libxenvchan_fd; > + ret = select(max_fd + 1, &rfds, &wfds, NULL, NULL); > + if (ret < 0) { > + perror("select"); > + exit(1); > + } > + if (FD_ISSET(libxenvchan_fd, &rfds)) { > + libxenvchan_wait(ctrl); > + if (!libxenvchan_is_open(ctrl)) { > + if (verbose) > + fprintf(stderr, "vchan client disconnected\n"); > + while (outsiz) > + socket_wr(output_fd); > + close(output_fd); > + close(input_fd); > + discard_buffers(ctrl); > + break; > + } > + vchan_wr(ctrl); > + } > + > + /* socket_fd guaranteed to be != -1 */ > + > + if (FD_ISSET(input_fd, &rfds)) { > + ret = read(input_fd, inbuf + insiz, BUFSIZE - insiz); > + if (ret < 0 && errno != EAGAIN) > + exit(1); > + if (verbose) > + fprintf(stderr, "from-unix: %.*s\n", ret, inbuf + insiz); > + if (ret == 0) { > + /* EOF on socket, write everything in the buffer and close the > + * socket */ > + while (insiz) { > + vchan_wr(ctrl); > + libxenvchan_wait(ctrl); > + } > + close(input_fd); > + input_fd = -1; > + /* TODO: maybe signal the vchan client somehow? */ > + break; > + } > + if (ret) > + insiz += ret; > + vchan_wr(ctrl); > + } > + if (FD_ISSET(output_fd, &wfds)) > + socket_wr(output_fd); > + while (libxenvchan_data_ready(ctrl) && outsiz < BUFSIZE) { > + ret = libxenvchan_read(ctrl, outbuf + outsiz, BUFSIZE - outsiz); > + if (ret < 0) > + exit(1); > + if (verbose) > + fprintf(stderr, "from-vchan: %.*s\n", ret, outbuf + outsiz); > + outsiz += ret; > + socket_wr(output_fd); > + } > + } > + return 0; > +} > + > +/** > + Simple libxenvchan application, both client and server. > + Both sides may write and read, both from the libxenvchan and from > + stdin/stdout (just like netcat). > +*/ > + > +static struct option options[] = { > + { "mode", required_argument, NULL, 'm' }, > + { "verbose", no_argument, NULL, 'v' }, > + { "state-path", required_argument, NULL, 's' }, > + { } > +}; > + > +int main(int argc, char **argv) > +{ > + int is_server = 0; > + int socket_fd; When compiled for OpenEmbedded / OpenXT, gcc complained about socket_fd being uninitialized before possible use. Rich
On Fri, Jan 17, 2020 at 01:44:20PM -0500, Rich Persaud wrote: > On Jan 14, 2020, at 21:42, Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com> wrote: > > @@ -66,6 +70,7 @@ install: all > > $(INSTALL_PROG) libxenvchan.so.$(MAJOR).$(MINOR) $(DESTDIR)$(libdir) > > ln -sf libxenvchan.so.$(MAJOR).$(MINOR) $(DESTDIR)$(libdir)/libxenvchan.so.$(MAJOR) > > ln -sf libxenvchan.so.$(MAJOR) $(DESTDIR)$(libdir)/libxenvchan.so > > + $(INSTALL_PROG) vchan-socket-proxy $(DESTDIR)$(bindir) > > Does this need directory creation, to avoid vchan binary being named "bin"? > + $(INSTALL_DIR) $(DESTDIR)$(bindir) I guess it depends on makefile execution order. I'll add it to be on the safe side. > > +int main(int argc, char **argv) > > +{ > > + int is_server = 0; > > + int socket_fd; > > When compiled for OpenEmbedded / OpenXT, gcc complained about socket_fd being uninitialized before possible use. I think gcc is wrong here - in all the paths socket_fd is used, it is initialized under the same conditions (socket_path != "-" and !is_server). But I'll add initializer to mute this warning.
On Tue, Jan 14, 2020 at 9:42 PM Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com> wrote: > > Add a simple proxy for tunneling socket connection over vchan. This is > based on existing vchan-node* applications, but extended with socket > support. vchan-socket-proxy serves both as a client and as a server, > depending on parameters. It can be used to transparently communicate > with an application in another domian that normally expose UNIX socket > interface. Specifically, it's written to communicate with qemu running > within stubdom. > > Server mode listens for vchan connections and when one is opened, > connects to a pointed UNIX socket. Client mode listens on UNIX > socket and when someone connects, opens a vchan connection. Only > a single connection at a time is supported. > > Additionally, socket can be provided as a number - in which case it's > interpreted as already open FD (in case of UNIX listening socket - > listen() needs to be already called). Or "-" meaning stdin/stdout - in > which case it is reduced to vchan-node2 functionality. > > Example usage: > > 1. (in dom0) vchan-socket-proxy --mode=client <DOMID> > /local/domain/<DOMID>/data/vchan/1234 /run/qemu.(DOMID) > > 2. (in DOMID) vchan-socket-proxy --mode=server 0 > /local/domain/<DOMID>/data/vchan/1234 /run/qemu.(DOMID) > > This will listen on /run/qemu.(DOMID) in dom0 and whenever connection is > made, it will connect to DOMID, where server process will connect to > /run/qemu.(DOMID) there. When client disconnects, vchan connection is > terminated and server vchan-socket-proxy process also disconnects from > qemu. > > Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com> > --- Looks good. A few typos and string updates below. Reviewed-by: Jason Andryuk <jandryuk@gmail.com> <snip> > diff --git a/tools/libvchan/vchan-socket-proxy.c b/tools/libvchan/vchan-socket-proxy.c > new file mode 100644 > index 0000000..6b4ae09 > --- /dev/null > +++ b/tools/libvchan/vchan-socket-proxy.c <snip> > +static void usage(char** argv) > +{ > + fprintf(stderr, "usage:\n" > + "\t%s [options] domainid nodepath [socket-path|file-no|-]\n" > + "\n" > + "options:\n" > + "\t-m, --mode=client|server - vchan connection mode\n" Add "(client by default)"? > + "\t-m, --state-path=path - xenstore path where write \"running\" to at startup\n" -s is the short option here. > + "\t-v, --verbose - verbose logging\n" > + "\n" > + "client: client of a vchan connection, fourth parameter can be:\n" > + "\tsocket-path: listen on a UNIX socket at this path and connect to vchan\n" > + "\t whenever new connection is accepted;\n" > + "\t handle multiple _subsequent_ connections, until terminated\n" > + "\tfile-no: except open FD of a socket in listen mode; otherwise similar to socket-path\n" Many of these lines are long and hard to read on 80 column terminals. > + "\t-: open vchan connection immediately and pass the data from stdin/stdout;\n" > + "\t terminate when vchan connection is closed\n" > + "server: server of a vchan connection, fourth parameter can be:\n" > + "\tsocket-path: connect to this UNIX socket when new vchan connection is accepted\n" > + "\t handle multiple _subsequent_ connections, until terminated\n" > + "\tfile-no: pass data to/from this FD; terminate when vchan connection is closed\n" > + "\t-: pass data to/from stdin/stdout; terminatate when vchan connection is closed\n", s/terminatate/terminate/ > + argv[0]); > + exit(1); > +} > + > +#define BUFSIZE 8192 > +char inbuf[BUFSIZE]; > +char outbuf[BUFSIZE]; > +int insiz = 0; > +int outsiz = 0; > +int verbose = 0; > + > +static void vchan_wr(struct libxenvchan *ctrl) { > + int ret; > + > + if (!insiz) > + return; > + ret = libxenvchan_write(ctrl, inbuf, insiz); > + if (ret < 0) { > + fprintf(stderr, "vchan write failed\n"); > + exit(1); > + } > + if (verbose) > + fprintf(stderr, "written %d bytes to vchan\n", ret); s/written/wrote/ > + if (ret > 0) { > + insiz -= ret; > + memmove(inbuf, inbuf + ret, insiz); > + } > +} > + <snip> > + > +int data_loop(struct libxenvchan *ctrl, int input_fd, int output_fd) > +{ > + int ret; > + int libxenvchan_fd; > + int max_fd; > + > + libxenvchan_fd = libxenvchan_fd_for_select(ctrl); > + for (;;) { > + fd_set rfds; > + fd_set wfds; > + FD_ZERO(&rfds); > + FD_ZERO(&wfds); > + > + max_fd = -1; > + if (input_fd != -1 && insiz != BUFSIZE) { > + FD_SET(input_fd, &rfds); > + if (input_fd > max_fd) > + max_fd = input_fd; > + } > + if (output_fd != -1 && outsiz) { > + FD_SET(output_fd, &wfds); > + if (output_fd > max_fd) > + max_fd = output_fd; > + } > + FD_SET(libxenvchan_fd, &rfds); > + if (libxenvchan_fd > max_fd) > + max_fd = libxenvchan_fd; > + ret = select(max_fd + 1, &rfds, &wfds, NULL, NULL); > + if (ret < 0) { > + perror("select"); > + exit(1); > + } > + if (FD_ISSET(libxenvchan_fd, &rfds)) { > + libxenvchan_wait(ctrl); > + if (!libxenvchan_is_open(ctrl)) { > + if (verbose) > + fprintf(stderr, "vchan client disconnected\n"); > + while (outsiz) > + socket_wr(output_fd); > + close(output_fd); > + close(input_fd); > + discard_buffers(ctrl); > + break; > + } > + vchan_wr(ctrl); > + } > + > + /* socket_fd guaranteed to be != -1 */ Old comment? > + if (FD_ISSET(input_fd, &rfds)) { > + ret = read(input_fd, inbuf + insiz, BUFSIZE - insiz); > + if (ret < 0 && errno != EAGAIN) > + exit(1); > + if (verbose) > + fprintf(stderr, "from-unix: %.*s\n", ret, inbuf + insiz); > + if (ret == 0) { > + /* EOF on socket, write everything in the buffer and close the > + * socket */ Change to socket to input_fd? > + while (insiz) { > + vchan_wr(ctrl); > + libxenvchan_wait(ctrl); > + } > + close(input_fd); > + input_fd = -1; > + /* TODO: maybe signal the vchan client somehow? */ > + break; > + } > + if (ret) > + insiz += ret; > + vchan_wr(ctrl); > + } > + if (FD_ISSET(output_fd, &wfds)) > + socket_wr(output_fd); > + while (libxenvchan_data_ready(ctrl) && outsiz < BUFSIZE) { > + ret = libxenvchan_read(ctrl, outbuf + outsiz, BUFSIZE - outsiz); > + if (ret < 0) > + exit(1); > + if (verbose) > + fprintf(stderr, "from-vchan: %.*s\n", ret, outbuf + outsiz); > + outsiz += ret; > + socket_wr(output_fd); > + } > + } > + return 0; > +} > + <snip>
On Tue, Jan 21, 2020 at 02:43:03PM -0500, Jason Andryuk wrote: > On Tue, Jan 14, 2020 at 9:42 PM Marek Marczykowski-Górecki > <marmarek@invisiblethingslab.com> wrote: > > > > Add a simple proxy for tunneling socket connection over vchan. This is > > based on existing vchan-node* applications, but extended with socket > > support. vchan-socket-proxy serves both as a client and as a server, > > depending on parameters. It can be used to transparently communicate > > with an application in another domian that normally expose UNIX socket > > interface. Specifically, it's written to communicate with qemu running > > within stubdom. > > > > Server mode listens for vchan connections and when one is opened, > > connects to a pointed UNIX socket. Client mode listens on UNIX > > socket and when someone connects, opens a vchan connection. Only > > a single connection at a time is supported. > > > > Additionally, socket can be provided as a number - in which case it's > > interpreted as already open FD (in case of UNIX listening socket - > > listen() needs to be already called). Or "-" meaning stdin/stdout - in > > which case it is reduced to vchan-node2 functionality. > > > > Example usage: > > > > 1. (in dom0) vchan-socket-proxy --mode=client <DOMID> > > /local/domain/<DOMID>/data/vchan/1234 /run/qemu.(DOMID) > > > > 2. (in DOMID) vchan-socket-proxy --mode=server 0 > > /local/domain/<DOMID>/data/vchan/1234 /run/qemu.(DOMID) > > > > This will listen on /run/qemu.(DOMID) in dom0 and whenever connection is > > made, it will connect to DOMID, where server process will connect to > > /run/qemu.(DOMID) there. When client disconnects, vchan connection is > > terminated and server vchan-socket-proxy process also disconnects from > > qemu. > > > > Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com> > > --- > > Looks good. A few typos and string updates below. Thanks, adjusted. > Reviewed-by: Jason Andryuk <jandryuk@gmail.com>
diff --git a/.gitignore b/.gitignore index 017856c..1c9dd93 100644 --- a/.gitignore +++ b/.gitignore @@ -372,6 +372,7 @@ tools/misc/xenwatchdogd tools/misc/xen-hvmcrash tools/misc/xen-lowmemd tools/libvchan/vchan-node[12] +tools/libvchan/vchan-socket-proxy tools/ocaml/*/.ocamldep.make tools/ocaml/*/*.cm[ixao] tools/ocaml/*/*.cmxa diff --git a/tools/libvchan/Makefile b/tools/libvchan/Makefile index 7892750..1c845ca 100644 --- a/tools/libvchan/Makefile +++ b/tools/libvchan/Makefile @@ -13,6 +13,7 @@ LIBVCHAN_PIC_OBJS = $(patsubst %.o,%.opic,$(LIBVCHAN_OBJS)) LIBVCHAN_LIBS = $(LDLIBS_libxenstore) $(LDLIBS_libxengnttab) $(LDLIBS_libxenevtchn) $(LIBVCHAN_OBJS) $(LIBVCHAN_PIC_OBJS): CFLAGS += $(CFLAGS_libxenstore) $(CFLAGS_libxengnttab) $(CFLAGS_libxenevtchn) $(NODE_OBJS) $(NODE2_OBJS): CFLAGS += $(CFLAGS_libxengnttab) $(CFLAGS_libxenevtchn) +vchan-socket-proxy.o: CFLAGS += $(CFLAGS_libxenstore) $(CFLAGS_libxenctrl) $(CFLAGS_libxengnttab) $(CFLAGS_libxenevtchn) MAJOR = 4.14 MINOR = 0 @@ -39,7 +40,7 @@ $(PKG_CONFIG_LOCAL): PKG_CONFIG_LIBDIR = $(CURDIR) $(PKG_CONFIG_LOCAL): PKG_CONFIG_CFLAGS_LOCAL = $(CFLAGS_xeninclude) .PHONY: all -all: libxenvchan.so vchan-node1 vchan-node2 libxenvchan.a $(PKG_CONFIG_INST) $(PKG_CONFIG_LOCAL) +all: libxenvchan.so vchan-node1 vchan-node2 vchan-socket-proxy libxenvchan.a $(PKG_CONFIG_INST) $(PKG_CONFIG_LOCAL) libxenvchan.so: libxenvchan.so.$(MAJOR) ln -sf $< $@ @@ -59,6 +60,9 @@ vchan-node1: $(NODE_OBJS) libxenvchan.so vchan-node2: $(NODE2_OBJS) libxenvchan.so $(CC) $(LDFLAGS) -o $@ $(NODE2_OBJS) $(LDLIBS_libxenvchan) $(APPEND_LDFLAGS) +vchan-socket-proxy: vchan-socket-proxy.o libxenvchan.so + $(CC) $(LDFLAGS) -o $@ $< $(LDLIBS_libxenvchan) $(LDLIBS_libxenstore) $(LDLIBS_libxenctrl) $(APPEND_LDFLAGS) + .PHONY: install install: all $(INSTALL_DIR) $(DESTDIR)$(libdir) @@ -66,6 +70,7 @@ install: all $(INSTALL_PROG) libxenvchan.so.$(MAJOR).$(MINOR) $(DESTDIR)$(libdir) ln -sf libxenvchan.so.$(MAJOR).$(MINOR) $(DESTDIR)$(libdir)/libxenvchan.so.$(MAJOR) ln -sf libxenvchan.so.$(MAJOR) $(DESTDIR)$(libdir)/libxenvchan.so + $(INSTALL_PROG) vchan-socket-proxy $(DESTDIR)$(bindir) $(INSTALL_DATA) libxenvchan.h $(DESTDIR)$(includedir) $(INSTALL_DATA) libxenvchan.a $(DESTDIR)$(libdir) $(INSTALL_DATA) xenvchan.pc $(DESTDIR)$(PKG_INSTALLDIR) diff --git a/tools/libvchan/init.c.rej b/tools/libvchan/init.c.rej new file mode 100644 index 0000000..8b3ed73 --- /dev/null +++ b/tools/libvchan/init.c.rej @@ -0,0 +1,60 @@ +--- tools/libvchan/init.c ++++ tools/libvchan/init.c +@@ -266,31 +266,33 @@ static int init_xs_srv(struct libxenvchan *ctrl, int domain, const char* xs_base + perms[1].id = domain; + perms[1].perms = XS_PERM_READ; + +-retry_transaction: +- xs_trans = xs_transaction_start(xs); +- if (!xs_trans) +- goto fail; +- +- snprintf(ref, sizeof ref, "%d", ring_ref); +- snprintf(buf, sizeof buf, "%s/ring-ref", xs_base); +- if (!xs_write(xs, xs_trans, buf, ref, strlen(ref))) +- goto fail; +- if (!xs_set_permissions(xs, xs_trans, buf, perms, 2)) +- goto fail; +- +- snprintf(ref, sizeof ref, "%d", ctrl->event_port); +- snprintf(buf, sizeof buf, "%s/event-channel", xs_base); +- if (!xs_write(xs, xs_trans, buf, ref, strlen(ref))) +- goto fail; +- if (!xs_set_permissions(xs, xs_trans, buf, perms, 2)) +- goto fail; +- +- if (!xs_transaction_end(xs, xs_trans, 0)) { +- if (errno == EAGAIN) +- goto retry_transaction; +- } else { +- ret = 0; ++ for (;;) { ++ xs_trans = xs_transaction_start(xs); ++ if (!xs_trans) ++ goto fail; ++ ++ snprintf(ref, sizeof ref, "%d", ring_ref); ++ snprintf(buf, sizeof buf, "%s/ring-ref", xs_base); ++ if (!xs_write(xs, xs_trans, buf, ref, strlen(ref))) ++ goto fail; ++ if (!xs_set_permissions(xs, xs_trans, buf, perms, 2)) ++ goto fail; ++ ++ snprintf(ref, sizeof ref, "%d", ctrl->event_port); ++ snprintf(buf, sizeof buf, "%s/event-channel", xs_base); ++ if (!xs_write(xs, xs_trans, buf, ref, strlen(ref))) ++ goto fail; ++ if (!xs_set_permissions(xs, xs_trans, buf, perms, 2)) ++ goto fail; ++ ++ if (xs_transaction_end(xs, xs_trans, 0)) ++ break; ++ else if (errno != EAGAIN) ++ goto fail; ++ /* EAGAIN, retry */ + } ++ ret = 0; ++ + fail: + free(domid_str); + xs_close(xs); diff --git a/tools/libvchan/vchan-socket-proxy.c b/tools/libvchan/vchan-socket-proxy.c new file mode 100644 index 0000000..6b4ae09 --- /dev/null +++ b/tools/libvchan/vchan-socket-proxy.c @@ -0,0 +1,469 @@ +/** + * @file + * @section AUTHORS + * + * Copyright (C) 2010 Rafal Wojtczuk <rafal@invisiblethingslab.com> + * + * Authors: + * Rafal Wojtczuk <rafal@invisiblethingslab.com> + * Daniel De Graaf <dgdegra@tycho.nsa.gov> + * Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com> + * + * @section LICENSE + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU Lesser General Public + * License as published by the Free Software Foundation; either + * version 2.1 of the License, or (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * Lesser General Public License for more details. + * + * You should have received a copy of the GNU Lesser General Public + * License along with this program; If not, see <http://www.gnu.org/licenses/>. + * + * @section DESCRIPTION + * + * This is a vchan to unix socket proxy. Vchan server is set, and on client + * connection, local socket connection is established. Communication is bidirectional. + * One client is served at a time, clients needs to coordinate this themselves. + */ + +#include <stdlib.h> +#include <stdio.h> +#include <string.h> +#include <unistd.h> +#include <fcntl.h> +#include <errno.h> +#include <sys/socket.h> +#include <sys/un.h> +#include <getopt.h> + +#include <xenstore.h> +#include <xenctrl.h> +#include <libxenvchan.h> + +static void usage(char** argv) +{ + fprintf(stderr, "usage:\n" + "\t%s [options] domainid nodepath [socket-path|file-no|-]\n" + "\n" + "options:\n" + "\t-m, --mode=client|server - vchan connection mode\n" + "\t-m, --state-path=path - xenstore path where write \"running\" to at startup\n" + "\t-v, --verbose - verbose logging\n" + "\n" + "client: client of a vchan connection, fourth parameter can be:\n" + "\tsocket-path: listen on a UNIX socket at this path and connect to vchan\n" + "\t whenever new connection is accepted;\n" + "\t handle multiple _subsequent_ connections, until terminated\n" + "\tfile-no: except open FD of a socket in listen mode; otherwise similar to socket-path\n" + "\t-: open vchan connection immediately and pass the data from stdin/stdout;\n" + "\t terminate when vchan connection is closed\n" + "server: server of a vchan connection, fourth parameter can be:\n" + "\tsocket-path: connect to this UNIX socket when new vchan connection is accepted\n" + "\t handle multiple _subsequent_ connections, until terminated\n" + "\tfile-no: pass data to/from this FD; terminate when vchan connection is closed\n" + "\t-: pass data to/from stdin/stdout; terminatate when vchan connection is closed\n", + argv[0]); + exit(1); +} + +#define BUFSIZE 8192 +char inbuf[BUFSIZE]; +char outbuf[BUFSIZE]; +int insiz = 0; +int outsiz = 0; +int verbose = 0; + +static void vchan_wr(struct libxenvchan *ctrl) { + int ret; + + if (!insiz) + return; + ret = libxenvchan_write(ctrl, inbuf, insiz); + if (ret < 0) { + fprintf(stderr, "vchan write failed\n"); + exit(1); + } + if (verbose) + fprintf(stderr, "written %d bytes to vchan\n", ret); + if (ret > 0) { + insiz -= ret; + memmove(inbuf, inbuf + ret, insiz); + } +} + +static void socket_wr(int output_fd) { + int ret; + + if (!outsiz) + return; + ret = write(output_fd, outbuf, outsiz); + if (ret < 0 && errno != EAGAIN) + exit(1); + if (ret > 0) { + outsiz -= ret; + memmove(outbuf, outbuf + ret, outsiz); + } +} + +static int set_nonblocking(int fd, int nonblocking) { + int flags = fcntl(fd, F_GETFL); + if (flags == -1) + return -1; + + if (nonblocking) + flags |= O_NONBLOCK; + else + flags &= ~O_NONBLOCK; + + if (fcntl(fd, F_SETFL, flags) == -1) + return -1; + + return 0; +} + +static int connect_socket(const char *path_or_fd) { + int fd; + char *endptr; + struct sockaddr_un addr; + + fd = strtoll(path_or_fd, &endptr, 0); + if (*endptr == '\0') { + set_nonblocking(fd, 1); + return fd; + } + + fd = socket(AF_UNIX, SOCK_STREAM, 0); + if (fd == -1) + return -1; + + addr.sun_family = AF_UNIX; + strncpy(addr.sun_path, path_or_fd, sizeof(addr.sun_path)); + if (connect(fd, (const struct sockaddr *)&addr, sizeof(addr)) == -1) { + close(fd); + return -1; + } + + set_nonblocking(fd, 1); + + return fd; +} + +static int listen_socket(const char *path_or_fd) { + int fd; + char *endptr; + struct sockaddr_un addr; + + fd = strtoll(path_or_fd, &endptr, 0); + if (*endptr == '\0') { + return fd; + } + + /* if not a number, assume a socket path */ + fd = socket(AF_UNIX, SOCK_STREAM, 0); + if (fd == -1) + return -1; + + addr.sun_family = AF_UNIX; + strncpy(addr.sun_path, path_or_fd, sizeof(addr.sun_path)); + if (bind(fd, (const struct sockaddr *)&addr, sizeof(addr)) == -1) { + close(fd); + return -1; + } + if (listen(fd, 5) != 0) { + close(fd); + return -1; + } + + return fd; +} + +static struct libxenvchan *connect_vchan(int domid, const char *path) { + struct libxenvchan *ctrl = NULL; + struct xs_handle *xs = NULL; + xc_interface *xc = NULL; + xc_dominfo_t dominfo; + char **watch_ret; + unsigned int watch_num; + int ret; + + xs = xs_open(XS_OPEN_READONLY); + if (!xs) { + perror("xs_open"); + goto out; + } + xc = xc_interface_open(NULL, NULL, XC_OPENFLAG_NON_REENTRANT); + if (!xc) { + perror("xc_interface_open"); + goto out; + } + /* wait for vchan server to create *path* */ + xs_watch(xs, path, "path"); + xs_watch(xs, "@releaseDomain", "release"); + while ((watch_ret = xs_read_watch(xs, &watch_num))) { + /* don't care about exact which fired the watch */ + free(watch_ret); + ctrl = libxenvchan_client_init(NULL, domid, path); + if (ctrl) + break; + + ret = xc_domain_getinfo(xc, domid, 1, &dominfo); + /* break the loop if domain is definitely not there anymore, but + * continue if it is or the call failed (like EPERM) */ + if (ret == -1 && errno == ESRCH) + break; + if (ret == 1 && (dominfo.domid != (uint32_t)domid || dominfo.dying)) + break; + } + +out: + if (xc) + xc_interface_close(xc); + if (xs) + xs_close(xs); + return ctrl; +} + + +static void discard_buffers(struct libxenvchan *ctrl) { + /* discard local buffers */ + insiz = 0; + outsiz = 0; + + /* discard remaining incoming data */ + while (libxenvchan_data_ready(ctrl)) { + if (libxenvchan_read(ctrl, inbuf, BUFSIZE) == -1) { + perror("vchan read"); + exit(1); + } + } +} + +int data_loop(struct libxenvchan *ctrl, int input_fd, int output_fd) +{ + int ret; + int libxenvchan_fd; + int max_fd; + + libxenvchan_fd = libxenvchan_fd_for_select(ctrl); + for (;;) { + fd_set rfds; + fd_set wfds; + FD_ZERO(&rfds); + FD_ZERO(&wfds); + + max_fd = -1; + if (input_fd != -1 && insiz != BUFSIZE) { + FD_SET(input_fd, &rfds); + if (input_fd > max_fd) + max_fd = input_fd; + } + if (output_fd != -1 && outsiz) { + FD_SET(output_fd, &wfds); + if (output_fd > max_fd) + max_fd = output_fd; + } + FD_SET(libxenvchan_fd, &rfds); + if (libxenvchan_fd > max_fd) + max_fd = libxenvchan_fd; + ret = select(max_fd + 1, &rfds, &wfds, NULL, NULL); + if (ret < 0) { + perror("select"); + exit(1); + } + if (FD_ISSET(libxenvchan_fd, &rfds)) { + libxenvchan_wait(ctrl); + if (!libxenvchan_is_open(ctrl)) { + if (verbose) + fprintf(stderr, "vchan client disconnected\n"); + while (outsiz) + socket_wr(output_fd); + close(output_fd); + close(input_fd); + discard_buffers(ctrl); + break; + } + vchan_wr(ctrl); + } + + /* socket_fd guaranteed to be != -1 */ + + if (FD_ISSET(input_fd, &rfds)) { + ret = read(input_fd, inbuf + insiz, BUFSIZE - insiz); + if (ret < 0 && errno != EAGAIN) + exit(1); + if (verbose) + fprintf(stderr, "from-unix: %.*s\n", ret, inbuf + insiz); + if (ret == 0) { + /* EOF on socket, write everything in the buffer and close the + * socket */ + while (insiz) { + vchan_wr(ctrl); + libxenvchan_wait(ctrl); + } + close(input_fd); + input_fd = -1; + /* TODO: maybe signal the vchan client somehow? */ + break; + } + if (ret) + insiz += ret; + vchan_wr(ctrl); + } + if (FD_ISSET(output_fd, &wfds)) + socket_wr(output_fd); + while (libxenvchan_data_ready(ctrl) && outsiz < BUFSIZE) { + ret = libxenvchan_read(ctrl, outbuf + outsiz, BUFSIZE - outsiz); + if (ret < 0) + exit(1); + if (verbose) + fprintf(stderr, "from-vchan: %.*s\n", ret, outbuf + outsiz); + outsiz += ret; + socket_wr(output_fd); + } + } + return 0; +} + +/** + Simple libxenvchan application, both client and server. + Both sides may write and read, both from the libxenvchan and from + stdin/stdout (just like netcat). +*/ + +static struct option options[] = { + { "mode", required_argument, NULL, 'm' }, + { "verbose", no_argument, NULL, 'v' }, + { "state-path", required_argument, NULL, 's' }, + { } +}; + +int main(int argc, char **argv) +{ + int is_server = 0; + int socket_fd; + int input_fd, output_fd; + struct libxenvchan *ctrl = NULL; + const char *socket_path; + int domid; + const char *vchan_path; + const char *state_path = NULL; + int opt; + + while ((opt = getopt_long(argc, argv, "m:vs:", options, NULL)) != -1) { + switch (opt) { + case 'm': + if (strcmp(optarg, "server") == 0) + is_server = 1; + else if (strcmp(optarg, "client") == 0) + is_server = 0; + else { + fprintf(stderr, "invalid argument for --mode: %s\n", optarg); + usage(argv); + return 1; + } + break; + case 'v': + verbose = 1; + break; + case 's': + state_path = optarg; + break; + case '?': + usage(argv); + } + } + + if (argc-optind != 3) + usage(argv); + + domid = atoi(argv[optind]); + vchan_path = argv[optind+1]; + socket_path = argv[optind+2]; + + if (is_server) { + ctrl = libxenvchan_server_init(NULL, domid, vchan_path, 0, 0); + if (!ctrl) { + perror("libxenvchan_server_init"); + exit(1); + } + } else { + if (strcmp(socket_path, "-") == 0) { + input_fd = 0; + output_fd = 1; + } else { + socket_fd = listen_socket(socket_path); + if (socket_fd == -1) { + perror("listen socket"); + return 1; + } + } + } + + if (state_path) { + struct xs_handle *xs; + + xs = xs_open(0); + if (!xs) { + perror("xs_open"); + return 1; + } + if (!xs_write(xs, XBT_NULL, state_path, "running", strlen("running"))) { + perror("xs_write"); + return 1; + } + xs_close(xs); + } + + for (;;) { + if (is_server) { + /* wait for vchan connection */ + while (libxenvchan_is_open(ctrl) != 1) + libxenvchan_wait(ctrl); + /* vchan client connected, setup local FD if needed */ + if (strcmp(socket_path, "-") == 0) { + input_fd = 0; + output_fd = 1; + } else { + input_fd = output_fd = connect_socket(socket_path); + } + if (input_fd == -1) { + perror("connect socket"); + return 1; + } + if (data_loop(ctrl, input_fd, output_fd) != 0) + break; + /* keep it running only when get UNIX socket path */ + if (socket_path[0] != '/') + break; + } else { + /* wait for local socket connection */ + if (strcmp(socket_path, "-") != 0) + input_fd = output_fd = accept(socket_fd, NULL, NULL); + if (input_fd == -1) { + perror("accept"); + return 1; + } + set_nonblocking(input_fd, 1); + set_nonblocking(output_fd, 1); + ctrl = connect_vchan(domid, vchan_path); + if (!ctrl) { + perror("vchan client init"); + return 1; + } + if (data_loop(ctrl, input_fd, output_fd) != 0) + break; + /* don't reconnect if output was stdout */ + if (strcmp(socket_path, "-") == 0) + break; + + libxenvchan_close(ctrl); + ctrl = NULL; + } + } + return 0; +}
Add a simple proxy for tunneling socket connection over vchan. This is based on existing vchan-node* applications, but extended with socket support. vchan-socket-proxy serves both as a client and as a server, depending on parameters. It can be used to transparently communicate with an application in another domian that normally expose UNIX socket interface. Specifically, it's written to communicate with qemu running within stubdom. Server mode listens for vchan connections and when one is opened, connects to a pointed UNIX socket. Client mode listens on UNIX socket and when someone connects, opens a vchan connection. Only a single connection at a time is supported. Additionally, socket can be provided as a number - in which case it's interpreted as already open FD (in case of UNIX listening socket - listen() needs to be already called). Or "-" meaning stdin/stdout - in which case it is reduced to vchan-node2 functionality. Example usage: 1. (in dom0) vchan-socket-proxy --mode=client <DOMID> /local/domain/<DOMID>/data/vchan/1234 /run/qemu.(DOMID) 2. (in DOMID) vchan-socket-proxy --mode=server 0 /local/domain/<DOMID>/data/vchan/1234 /run/qemu.(DOMID) This will listen on /run/qemu.(DOMID) in dom0 and whenever connection is made, it will connect to DOMID, where server process will connect to /run/qemu.(DOMID) there. When client disconnects, vchan connection is terminated and server vchan-socket-proxy process also disconnects from qemu. Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com> --- .gitignore | 1 +- tools/libvchan/Makefile | 7 +- tools/libvchan/init.c.rej | 60 ++++- tools/libvchan/vchan-socket-proxy.c | 469 +++++++++++++++++++++++++++++- 4 files changed, 536 insertions(+), 1 deletion(-) create mode 100644 tools/libvchan/init.c.rej create mode 100644 tools/libvchan/vchan-socket-proxy.c