search for: vmci_host

Displaying 20 results from an estimated 28 matches for "vmci_host".

Did you mean: mic_host
2015 Jan 14
0
[PATCH] VMCI: Fix two UVA mapping bugs
...MCI context was destroyed. Fixed this by remembering the page. Acked-by: Andy King <acking at vmware.com> Acked-by: Darius Davis <darius at vmware.com> Signed-off-by: Jorgen Hansen <jhansen at vmware.com> --- drivers/misc/vmw_vmci/vmci_driver.c | 2 +- drivers/misc/vmw_vmci/vmci_host.c | 13 +++++++------ 2 files changed, 8 insertions(+), 7 deletions(-) diff --git a/drivers/misc/vmw_vmci/vmci_driver.c b/drivers/misc/vmw_vmci/vmci_driver.c index 3dee7ae..032d35c 100644 --- a/drivers/misc/vmw_vmci/vmci_driver.c +++ b/drivers/misc/vmw_vmci/vmci_driver.c @@ -113,5 +113,5 @@ mo...
2015 Feb 19
0
[PATCH] VMCI: Check userland-provided datagram size
...check. Acked-by: Jorgen Hansen <jhansen at vmware.com> Acked-by: Aditya Sarwade <asarwade at vmware.com> Signed-off-by: Andy King <acking at vmware.com> Reported-by: David Ramos <daramos at stanford.edu> --- drivers/misc/vmw_vmci/vmci_driver.c | 2 +- drivers/misc/vmw_vmci/vmci_host.c | 6 ++++++ 2 files changed, 7 insertions(+), 1 deletion(-) diff --git a/drivers/misc/vmw_vmci/vmci_driver.c b/drivers/misc/vmw_vmci/vmci_driver.c index 032d35c..cf264a1 100644 --- a/drivers/misc/vmw_vmci/vmci_driver.c +++ b/drivers/misc/vmw_vmci/vmci_driver.c @@ -113,5 +113,5 @@ module_exit(v...
2015 Jan 14
0
[PATCH] VMCI: Fix two UVA mapping bugs
...MCI context was destroyed. Fixed this by remembering the page. Acked-by: Andy King <acking at vmware.com> Acked-by: Darius Davis <darius at vmware.com> Signed-off-by: Jorgen Hansen <jhansen at vmware.com> --- drivers/misc/vmw_vmci/vmci_driver.c | 2 +- drivers/misc/vmw_vmci/vmci_host.c | 13 +++++++------ 2 files changed, 8 insertions(+), 7 deletions(-) diff --git a/drivers/misc/vmw_vmci/vmci_driver.c b/drivers/misc/vmw_vmci/vmci_driver.c index 3dee7ae..032d35c 100644 --- a/drivers/misc/vmw_vmci/vmci_driver.c +++ b/drivers/misc/vmw_vmci/vmci_driver.c @@ -113,5 +113,5 @@ mo...
2015 Feb 19
0
[PATCH] VMCI: Check userland-provided datagram size
...check. Acked-by: Jorgen Hansen <jhansen at vmware.com> Acked-by: Aditya Sarwade <asarwade at vmware.com> Signed-off-by: Andy King <acking at vmware.com> Reported-by: David Ramos <daramos at stanford.edu> --- drivers/misc/vmw_vmci/vmci_driver.c | 2 +- drivers/misc/vmw_vmci/vmci_host.c | 6 ++++++ 2 files changed, 7 insertions(+), 1 deletion(-) diff --git a/drivers/misc/vmw_vmci/vmci_driver.c b/drivers/misc/vmw_vmci/vmci_driver.c index 032d35c..cf264a1 100644 --- a/drivers/misc/vmw_vmci/vmci_driver.c +++ b/drivers/misc/vmw_vmci/vmci_driver.c @@ -113,5 +113,5 @@ module_exit(v...
2019 Nov 11
2
[PATCH net-next 12/14] vsock/vmci: register vmci_transport only when VMCI guest/host are active
...ds with vsock (and with this solution it can continue to do that, so none of our old products break due to changed behavior, which is great). Shouldn't vhost behave similar, so that any module that registers a h2g transport only does so if it is in active use? > --- a/drivers/misc/vmw_vmci/vmci_host.c > +++ b/drivers/misc/vmw_vmci/vmci_host.c > @@ -108,6 +108,11 @@ bool vmci_host_code_active(void) > atomic_read(&vmci_host_active_users) > 0); > } > > +int vmci_host_users(void) > +{ > + return atomic_read(&vmci_host_active_users); > +} > + >...
2019 Nov 11
2
[PATCH net-next 12/14] vsock/vmci: register vmci_transport only when VMCI guest/host are active
...ds with vsock (and with this solution it can continue to do that, so none of our old products break due to changed behavior, which is great). Shouldn't vhost behave similar, so that any module that registers a h2g transport only does so if it is in active use? > --- a/drivers/misc/vmw_vmci/vmci_host.c > +++ b/drivers/misc/vmw_vmci/vmci_host.c > @@ -108,6 +108,11 @@ bool vmci_host_code_active(void) > atomic_read(&vmci_host_active_users) > 0); > } > > +int vmci_host_users(void) > +{ > + return atomic_read(&vmci_host_active_users); > +} > + >...
2019 Oct 23
0
[PATCH net-next 12/14] vsock/vmci: register vmci_transport only when VMCI guest/host are active
...: Jorgen Hansen <jhansen at vmware.com> Signed-off-by: Stefano Garzarella <sgarzare at redhat.com> --- drivers/misc/vmw_vmci/vmci_driver.c | 50 +++++++++++++++++++++++++++++ drivers/misc/vmw_vmci/vmci_driver.h | 2 ++ drivers/misc/vmw_vmci/vmci_guest.c | 2 ++ drivers/misc/vmw_vmci/vmci_host.c | 7 ++++ include/linux/vmw_vmci_api.h | 2 ++ net/vmw_vsock/vmci_transport.c | 29 +++++++++++------ 6 files changed, 82 insertions(+), 10 deletions(-) diff --git a/drivers/misc/vmw_vmci/vmci_driver.c b/drivers/misc/vmw_vmci/vmci_driver.c index 819e35995d32..195afbd7edc1 100644...
2019 Nov 12
1
[PATCH net-next 12/14] vsock/vmci: register vmci_transport only when VMCI guest/host are active
...h2g transport only does so if it is in active use? > > > > The vhost-vsock module will load when the first hypervisor open > /dev/vhost-vsock, so in theory, when there's at least one active user. Ok, sounds good then. > > > > > > --- a/drivers/misc/vmw_vmci/vmci_host.c > > > +++ b/drivers/misc/vmw_vmci/vmci_host.c > > > @@ -108,6 +108,11 @@ bool vmci_host_code_active(void) > > > atomic_read(&vmci_host_active_users) > 0); > > > } > > > > > > +int vmci_host_users(void) > > > +{ > &gt...
2019 Nov 11
0
[PATCH net-next 12/14] vsock/vmci: register vmci_transport only when VMCI guest/host are active
...behave similar, so that any module > that registers a h2g transport only does so if it is in active use? > The vhost-vsock module will load when the first hypervisor open /dev/vhost-vsock, so in theory, when there's at least one active user. > > > --- a/drivers/misc/vmw_vmci/vmci_host.c > > +++ b/drivers/misc/vmw_vmci/vmci_host.c > > @@ -108,6 +108,11 @@ bool vmci_host_code_active(void) > > atomic_read(&vmci_host_active_users) > 0); > > } > > > > +int vmci_host_users(void) > > +{ > > + return atomic_read(&vmci_h...
2015 Feb 15
1
vmci: read overrun bug in dg_dispatch_as_host() (drivers/misc/vmw_vmci/vmci_datagram.c)
...sed for local communication. The bug occurs for the IOCTL_VMCI_DATAGRAM_SEND ioctl, and our tool reports the following partial backtrace: #0 memcpy () #1 dg_dispatch_as_host () at drivers/misc/vmw_vmci/vmci_datagram.c:245 #2 vmci_datagram_dispatch () at drivers/misc/vmw_vmci/vmci_datagram.c:347 #3 vmci_host_do_send_datagram () at drivers/misc/vmw_vmci/vmci_host.c:404 Here?s the relevant code snippet from dg_dispatch_as_host(): 171: dg_size = VMCI_DG_SIZE(dg); ... 235: dg_info = kmalloc(sizeof(*dg_info) + 236: (size_t) dg->payload_size, GFP_ATOMIC); 237: if (!dg_info) { 238:...
2015 Feb 15
1
vmci: read overrun bug in dg_dispatch_as_host() (drivers/misc/vmw_vmci/vmci_datagram.c)
...sed for local communication. The bug occurs for the IOCTL_VMCI_DATAGRAM_SEND ioctl, and our tool reports the following partial backtrace: #0 memcpy () #1 dg_dispatch_as_host () at drivers/misc/vmw_vmci/vmci_datagram.c:245 #2 vmci_datagram_dispatch () at drivers/misc/vmw_vmci/vmci_datagram.c:347 #3 vmci_host_do_send_datagram () at drivers/misc/vmw_vmci/vmci_host.c:404 Here?s the relevant code snippet from dg_dispatch_as_host(): 171: dg_size = VMCI_DG_SIZE(dg); ... 235: dg_info = kmalloc(sizeof(*dg_info) + 236: (size_t) dg->payload_size, GFP_ATOMIC); 237: if (!dg_info) { 238:...
2019 Oct 23
33
[PATCH net-next 00/14] vsock: add multi-transports support
...VMCI guest/host are active vsock: prevent transport modules unloading vsock: fix bind() behaviour taking care of CID drivers/misc/vmw_vmci/vmci_driver.c | 50 ++++ drivers/misc/vmw_vmci/vmci_driver.h | 2 + drivers/misc/vmw_vmci/vmci_guest.c | 2 + drivers/misc/vmw_vmci/vmci_host.c | 7 + drivers/vhost/vsock.c | 96 +++--- include/linux/virtio_vsock.h | 18 +- include/linux/vm_sockets.h | 15 - include/linux/vmw_vmci_api.h | 2 + include/net/af_vsock.h | 44 +-- include/net/vsock_addr.h...
2019 Oct 23
33
[PATCH net-next 00/14] vsock: add multi-transports support
...VMCI guest/host are active vsock: prevent transport modules unloading vsock: fix bind() behaviour taking care of CID drivers/misc/vmw_vmci/vmci_driver.c | 50 ++++ drivers/misc/vmw_vmci/vmci_driver.h | 2 + drivers/misc/vmw_vmci/vmci_guest.c | 2 + drivers/misc/vmw_vmci/vmci_host.c | 7 + drivers/vhost/vsock.c | 96 +++--- include/linux/virtio_vsock.h | 18 +- include/linux/vm_sockets.h | 15 - include/linux/vmw_vmci_api.h | 2 + include/net/af_vsock.h | 44 +-- include/net/vsock_addr.h...
2019 Nov 14
15
[PATCH net-next v2 00/15] vsock: add multi-transports support
...nloading vsock: fix bind() behaviour taking care of CID vhost/vsock: refuse CID assigned to the guest->host transport drivers/misc/vmw_vmci/vmci_driver.c | 67 +++++ drivers/misc/vmw_vmci/vmci_driver.h | 2 + drivers/misc/vmw_vmci/vmci_guest.c | 2 + drivers/misc/vmw_vmci/vmci_host.c | 7 + drivers/vhost/vsock.c | 102 ++++--- include/linux/virtio_vsock.h | 18 +- include/linux/vm_sockets.h | 15 - include/linux/vmw_vmci_api.h | 2 + include/net/af_vsock.h | 45 +-- include/net/vsock_addr.h...
2012 Aug 30
2
[PATCH 01/11] vmci_context.patch: VMCI context list operations.
...pr_warn("Failed to get privilege flags for " \ + "destination (handle=0x%x:0x%x).", + handle.context, handle.resource); + goto out; + } + + if (srcCID != VMCI_HOST_CONTEXT_ID || + srcPrivFlags == VMCI_NO_PRIVILEGE_FLAGS) { + srcPrivFlags = vmci_context_get_priv_flags(srcCID); + } + + if (vmci_deny_interaction(srcPrivFlags, dstPrivFlags)) { + result = VMCI_ERROR_NO_ACCESS...
2012 Aug 30
2
[PATCH 01/11] vmci_context.patch: VMCI context list operations.
...pr_warn("Failed to get privilege flags for " \ + "destination (handle=0x%x:0x%x).", + handle.context, handle.resource); + goto out; + } + + if (srcCID != VMCI_HOST_CONTEXT_ID || + srcPrivFlags == VMCI_NO_PRIVILEGE_FLAGS) { + srcPrivFlags = vmci_context_get_priv_flags(srcCID); + } + + if (vmci_deny_interaction(srcPrivFlags, dstPrivFlags)) { + result = VMCI_ERROR_NO_ACCESS...
2012 Oct 30
29
[PATCH 00/12] VMCI for Linux upstreaming
...| 50 drivers/misc/vmw_vmci/vmci_event.c | 371 +++ drivers/misc/vmw_vmci/vmci_event.h | 25 drivers/misc/vmw_vmci/vmci_guest.c | 765 ++++++ drivers/misc/vmw_vmci/vmci_handle_array.c | 162 + drivers/misc/vmw_vmci/vmci_handle_array.h | 46 drivers/misc/vmw_vmci/vmci_host.c | 1046 +++++++++ drivers/misc/vmw_vmci/vmci_queue_pair.c | 3556 +++++++++++++++++++++++++++++ drivers/misc/vmw_vmci/vmci_queue_pair.h | 191 ++ drivers/misc/vmw_vmci/vmci_resource.c | 237 ++ drivers/misc/vmw_vmci/vmci_resource.h | 59 drivers/misc/vmw_vmci/vmci_route.c...
2012 Oct 30
29
[PATCH 00/12] VMCI for Linux upstreaming
...| 50 drivers/misc/vmw_vmci/vmci_event.c | 371 +++ drivers/misc/vmw_vmci/vmci_event.h | 25 drivers/misc/vmw_vmci/vmci_guest.c | 765 ++++++ drivers/misc/vmw_vmci/vmci_handle_array.c | 162 + drivers/misc/vmw_vmci/vmci_handle_array.h | 46 drivers/misc/vmw_vmci/vmci_host.c | 1046 +++++++++ drivers/misc/vmw_vmci/vmci_queue_pair.c | 3556 +++++++++++++++++++++++++++++ drivers/misc/vmw_vmci/vmci_queue_pair.h | 191 ++ drivers/misc/vmw_vmci/vmci_resource.c | 237 ++ drivers/misc/vmw_vmci/vmci_resource.h | 59 drivers/misc/vmw_vmci/vmci_route.c...
2013 Jan 08
13
[PATCH 00/12] VMCI for Linux upstreaming
..., vmci_privilege_flags. Use C99 style initialization for struct VMCI_INVALID_HANDLE. Use inline function instead of macro for VMCI_HANDLE_INVALID. No change for vmw_vmci_api.h location (under include/linux/ directory). No change for macros VMCI_CONTEXT_IS_VM, VMCI_HOST_CONTEXT_ID, VMCI_RESERVED_CID_LIMIT, VMCI_HYPERVISOR_CONTEXT_ID and VMCI_WELL_KNOWN_CONTEXT_ID. Still in header file include/linux/vmw_vmci_defs.h This addresses Greg's several comments on Thu, 15 Nov 2012 16:01:18 -0800 Re: [PATCH 12/12]...
2013 Jan 08
13
[PATCH 00/12] VMCI for Linux upstreaming
..., vmci_privilege_flags. Use C99 style initialization for struct VMCI_INVALID_HANDLE. Use inline function instead of macro for VMCI_HANDLE_INVALID. No change for vmw_vmci_api.h location (under include/linux/ directory). No change for macros VMCI_CONTEXT_IS_VM, VMCI_HOST_CONTEXT_ID, VMCI_RESERVED_CID_LIMIT, VMCI_HYPERVISOR_CONTEXT_ID and VMCI_WELL_KNOWN_CONTEXT_ID. Still in header file include/linux/vmw_vmci_defs.h This addresses Greg's several comments on Thu, 15 Nov 2012 16:01:18 -0800 Re: [PATCH 12/12]...