Commit graph

5 commits

Author SHA1 Message Date
Eelco Dolstra 3f255b35cd * qemu-kvm updated to 0.12.1.2.
svn path=/nixpkgs/trunk/; revision=19192
2010-01-03 19:36:32 +00:00
Eelco Dolstra b67e9a0415 * qemu-kvm unix domain patch: when accepting a connection, initialise
the remote address / port to something sensible.  Otherwise
  simultaneous connections to the same guest port don't work properly.

svn path=/nixpkgs/trunk/; revision=16805
2009-08-21 15:40:32 +00:00
Eelco Dolstra c7eb810826 * haddr -> hport.
svn path=/nixpkgs/trunk/; revision=16804
2009-08-21 14:26:46 +00:00
Eelco Dolstra 098626dc86 * hport is in network order, so it needs to be converted back to host
order...
* Remove the socket file automatically.

svn path=/nixpkgs/trunk/; revision=16602
2009-08-07 09:54:03 +00:00
Eelco Dolstra 2ae0060bde * qemu-kvm: a quick hack to support connecting a Unix domain socket on
the host to a TCP port on the guest.  This will be useful for
  automated testing using QEMU virtual machines.  Using TCP ports on
  the host is insecure and hard to manage (since you need to pick an
  available host port).

  For example:

    $ qemu-system-x86_64 ... -redir tcp:65535::514

  creates a Unix domain socket `./65535.socket' on the host.  (There
  is no proper syntax yet, so as a hack all host "ports" above 0xff00
  are treated in this way.)  Connections to that socket are then
  forwarded to TCP port 514 on the guest.  So the guest can do

    $ nc -l -p 514 -e /bin/sh

  to execute a shell for incoming connections on port 514, and then
  the host can do

    $ socat stdio ./65535.socket

  to run a shell on the guest.

svn path=/nixpkgs/trunk/; revision=16593
2009-08-05 17:26:39 +00:00