similar to: [PATCH 0/4] vsock/virtio: several fixes in the .probe() and .remove()

Displaying 20 results from an estimated 4000 matches similar to: "[PATCH 0/4] vsock/virtio: several fixes in the .probe() and .remove()"

2019 May 29
2
[PATCH 3/4] vsock/virtio: fix flush of works during the .remove()
On 2019/5/28 ??6:56, Stefano Garzarella wrote: > We flush all pending works before to call vdev->config->reset(vdev), > but other works can be queued before the vdev->config->del_vqs(vdev), > so we add another flush after it, to avoid use after free. > > Suggested-by: Michael S. Tsirkin <mst at redhat.com> > Signed-off-by: Stefano Garzarella <sgarzare at
2019 May 29
2
[PATCH 3/4] vsock/virtio: fix flush of works during the .remove()
On 2019/5/28 ??6:56, Stefano Garzarella wrote: > We flush all pending works before to call vdev->config->reset(vdev), > but other works can be queued before the vdev->config->del_vqs(vdev), > so we add another flush after it, to avoid use after free. > > Suggested-by: Michael S. Tsirkin <mst at redhat.com> > Signed-off-by: Stefano Garzarella <sgarzare at
2019 May 30
2
[PATCH 3/4] vsock/virtio: fix flush of works during the .remove()
On 2019/5/29 ??6:58, Stefano Garzarella wrote: > On Wed, May 29, 2019 at 11:22:40AM +0800, Jason Wang wrote: >> On 2019/5/28 ??6:56, Stefano Garzarella wrote: >>> We flush all pending works before to call vdev->config->reset(vdev), >>> but other works can be queued before the vdev->config->del_vqs(vdev), >>> so we add another flush after it, to avoid
2019 May 30
2
[PATCH 3/4] vsock/virtio: fix flush of works during the .remove()
On 2019/5/29 ??6:58, Stefano Garzarella wrote: > On Wed, May 29, 2019 at 11:22:40AM +0800, Jason Wang wrote: >> On 2019/5/28 ??6:56, Stefano Garzarella wrote: >>> We flush all pending works before to call vdev->config->reset(vdev), >>> but other works can be queued before the vdev->config->del_vqs(vdev), >>> so we add another flush after it, to avoid
2019 Jul 05
4
[PATCH v3 0/3] vsock/virtio: several fixes in the .probe() and .remove()
During the review of "[PATCH] vsock/virtio: Initialize core virtio vsock before registering the driver", Stefan pointed out some possible issues in the .probe() and .remove() callbacks of the virtio-vsock driver. This series tries to solve these issues: - Patch 1 adds RCU critical sections to avoid use-after-free of 'the_virtio_vsock' pointer. - Patch 2 stops workers before to
2019 Jun 28
11
[PATCH v2 0/3] vsock/virtio: several fixes in the .probe() and .remove()
During the review of "[PATCH] vsock/virtio: Initialize core virtio vsock before registering the driver", Stefan pointed out some possible issues in the .probe() and .remove() callbacks of the virtio-vsock driver. This series tries to solve these issues: - Patch 1 adds RCU critical sections to avoid use-after-free of 'the_virtio_vsock' pointer. - Patch 2 stops workers before to
2019 Jun 28
11
[PATCH v2 0/3] vsock/virtio: several fixes in the .probe() and .remove()
During the review of "[PATCH] vsock/virtio: Initialize core virtio vsock before registering the driver", Stefan pointed out some possible issues in the .probe() and .remove() callbacks of the virtio-vsock driver. This series tries to solve these issues: - Patch 1 adds RCU critical sections to avoid use-after-free of 'the_virtio_vsock' pointer. - Patch 2 stops workers before to
2019 May 30
2
[PATCH 3/4] vsock/virtio: fix flush of works during the .remove()
On 2019/5/30 ??6:10, Stefano Garzarella wrote: > On Thu, May 30, 2019 at 05:46:18PM +0800, Jason Wang wrote: >> On 2019/5/29 ??6:58, Stefano Garzarella wrote: >>> On Wed, May 29, 2019 at 11:22:40AM +0800, Jason Wang wrote: >>>> On 2019/5/28 ??6:56, Stefano Garzarella wrote: >>>>> We flush all pending works before to call vdev->config->reset(vdev),
2019 May 30
2
[PATCH 3/4] vsock/virtio: fix flush of works during the .remove()
On 2019/5/30 ??6:10, Stefano Garzarella wrote: > On Thu, May 30, 2019 at 05:46:18PM +0800, Jason Wang wrote: >> On 2019/5/29 ??6:58, Stefano Garzarella wrote: >>> On Wed, May 29, 2019 at 11:22:40AM +0800, Jason Wang wrote: >>>> On 2019/5/28 ??6:56, Stefano Garzarella wrote: >>>>> We flush all pending works before to call vdev->config->reset(vdev),
2019 May 31
2
[PATCH 3/4] vsock/virtio: fix flush of works during the .remove()
On 2019/5/31 ??4:18, Stefano Garzarella wrote: > On Thu, May 30, 2019 at 07:59:14PM +0800, Jason Wang wrote: >> On 2019/5/30 ??6:10, Stefano Garzarella wrote: >>> On Thu, May 30, 2019 at 05:46:18PM +0800, Jason Wang wrote: >>>> On 2019/5/29 ??6:58, Stefano Garzarella wrote: >>>>> On Wed, May 29, 2019 at 11:22:40AM +0800, Jason Wang wrote:
2019 May 31
2
[PATCH 3/4] vsock/virtio: fix flush of works during the .remove()
On 2019/5/31 ??4:18, Stefano Garzarella wrote: > On Thu, May 30, 2019 at 07:59:14PM +0800, Jason Wang wrote: >> On 2019/5/30 ??6:10, Stefano Garzarella wrote: >>> On Thu, May 30, 2019 at 05:46:18PM +0800, Jason Wang wrote: >>>> On 2019/5/29 ??6:58, Stefano Garzarella wrote: >>>>> On Wed, May 29, 2019 at 11:22:40AM +0800, Jason Wang wrote:
2019 Jun 13
1
[PATCH 3/4] vsock/virtio: fix flush of works during the .remove()
On 2019/6/6 ??4:11, Stefano Garzarella wrote: > On Fri, May 31, 2019 at 05:56:39PM +0800, Jason Wang wrote: >> On 2019/5/31 ??4:18, Stefano Garzarella wrote: >>> On Thu, May 30, 2019 at 07:59:14PM +0800, Jason Wang wrote: >>>> On 2019/5/30 ??6:10, Stefano Garzarella wrote: >>>>> On Thu, May 30, 2019 at 05:46:18PM +0800, Jason Wang wrote:
2019 Jul 03
3
[PATCH v2 1/3] vsock/virtio: use RCU to avoid use-after-free on the_virtio_vsock
On 2019/6/28 ??8:36, Stefano Garzarella wrote: > Some callbacks used by the upper layers can run while we are in the > .remove(). A potential use-after-free can happen, because we free > the_virtio_vsock without knowing if the callbacks are over or not. > > To solve this issue we move the assignment of the_virtio_vsock at the > end of .probe(), when we finished all the
2019 Jul 03
3
[PATCH v2 1/3] vsock/virtio: use RCU to avoid use-after-free on the_virtio_vsock
On 2019/6/28 ??8:36, Stefano Garzarella wrote: > Some callbacks used by the upper layers can run while we are in the > .remove(). A potential use-after-free can happen, because we free > the_virtio_vsock without knowing if the callbacks are over or not. > > To solve this issue we move the assignment of the_virtio_vsock at the > end of .probe(), when we finished all the
2019 Feb 01
3
[PATCH v3 0/2] vsock/virtio: fix issues on device hot-unplug
These patches try to handle the hot-unplug of vsock virtio transport device in a proper way. Maybe move the vsock_core_init()/vsock_core_exit() functions in the module_init and module_exit of vsock_virtio_transport module can't be the best way, but the architecture of vsock_core forces us to this approach for now. The vsock_core proto_ops expect a valid pointer to the transport device, so we
2019 Feb 01
3
[PATCH v3 0/2] vsock/virtio: fix issues on device hot-unplug
These patches try to handle the hot-unplug of vsock virtio transport device in a proper way. Maybe move the vsock_core_init()/vsock_core_exit() functions in the module_init and module_exit of vsock_virtio_transport module can't be the best way, but the architecture of vsock_core forces us to this approach for now. The vsock_core proto_ops expect a valid pointer to the transport device, so we
2019 Jul 04
2
[PATCH v2 1/3] vsock/virtio: use RCU to avoid use-after-free on the_virtio_vsock
On 2019/7/3 ??6:41, Stefano Garzarella wrote: > On Wed, Jul 03, 2019 at 05:53:58PM +0800, Jason Wang wrote: >> On 2019/6/28 ??8:36, Stefano Garzarella wrote: >>> Some callbacks used by the upper layers can run while we are in the >>> .remove(). A potential use-after-free can happen, because we free >>> the_virtio_vsock without knowing if the callbacks are over
2019 Jul 04
2
[PATCH v2 1/3] vsock/virtio: use RCU to avoid use-after-free on the_virtio_vsock
On 2019/7/3 ??6:41, Stefano Garzarella wrote: > On Wed, Jul 03, 2019 at 05:53:58PM +0800, Jason Wang wrote: >> On 2019/6/28 ??8:36, Stefano Garzarella wrote: >>> Some callbacks used by the upper layers can run while we are in the >>> .remove(). A potential use-after-free can happen, because we free >>> the_virtio_vsock without knowing if the callbacks are over
2016 Jul 28
6
[RFC v6 0/6] Add virtio transport for AF_VSOCK
This series is based on v4.7. This RFC is the implementation for the new VIRTIO Socket device. It is developed in parallel with the VIRTIO device specification and proves the design. Once the specification has been accepted I will send a non-RFC version of this patch series. v6: * Add VHOST_VSOCK_SET_RUNNING ioctl to start/stop vhost cleanly * Add graceful shutdown to avoid port reuse while
2016 Jul 28
6
[RFC v6 0/6] Add virtio transport for AF_VSOCK
This series is based on v4.7. This RFC is the implementation for the new VIRTIO Socket device. It is developed in parallel with the VIRTIO device specification and proves the design. Once the specification has been accepted I will send a non-RFC version of this patch series. v6: * Add VHOST_VSOCK_SET_RUNNING ioctl to start/stop vhost cleanly * Add graceful shutdown to avoid port reuse while