<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net/vmw_vsock, branch v3.9</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/net/vmw_vsock?h=v3.9</id>
<link rel='self' href='https://git.amat.us/linux/atom/net/vmw_vsock?h=v3.9'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2013-04-07T20:28:02Z</updated>
<entry>
<title>VSOCK: Fix missing msg_namelen update in vsock_stream_recvmsg()</title>
<updated>2013-04-07T20:28:02Z</updated>
<author>
<name>Mathias Krause</name>
<email>minipli@googlemail.com</email>
</author>
<published>2013-04-07T01:52:02Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=d5e0d0f607a7a029c6563a0470d88255c89a8d11'/>
<id>urn:sha1:d5e0d0f607a7a029c6563a0470d88255c89a8d11</id>
<content type='text'>
The code misses to update the msg_namelen member to 0 and therefore
makes net/socket.c leak the local, uninitialized sockaddr_storage
variable to userland -- 128 bytes of kernel stack memory.

Cc: Andy King &lt;acking@vmware.com&gt;
Cc: Dmitry Torokhov &lt;dtor@vmware.com&gt;
Cc: George Zhang &lt;georgezhang@vmware.com&gt;
Signed-off-by: Mathias Krause &lt;minipli@googlemail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>VSOCK: vmci - fix possible info leak in vmci_transport_dgram_dequeue()</title>
<updated>2013-04-07T20:28:02Z</updated>
<author>
<name>Mathias Krause</name>
<email>minipli@googlemail.com</email>
</author>
<published>2013-04-07T01:52:01Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=680d04e0ba7e926233e3b9cee59125ce181f66ba'/>
<id>urn:sha1:680d04e0ba7e926233e3b9cee59125ce181f66ba</id>
<content type='text'>
In case we received no data on the call to skb_recv_datagram(), i.e.
skb-&gt;data is NULL, vmci_transport_dgram_dequeue() will return with 0
without updating msg_namelen leading to net/socket.c leaking the local,
uninitialized sockaddr_storage variable to userland -- 128 bytes of
kernel stack memory.

Fix this by moving the already existing msg_namelen assignment a few
lines above.

Cc: Andy King &lt;acking@vmware.com&gt;
Cc: Dmitry Torokhov &lt;dtor@vmware.com&gt;
Cc: George Zhang &lt;georgezhang@vmware.com&gt;
Signed-off-by: Mathias Krause &lt;minipli@googlemail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>VSOCK: Handle changes to the VMCI context ID.</title>
<updated>2013-04-02T18:39:17Z</updated>
<author>
<name>Reilly Grant</name>
<email>grantr@vmware.com</email>
</author>
<published>2013-04-01T18:41:52Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=990454b5a48babde44a23c0f22bae5523f4fdf13'/>
<id>urn:sha1:990454b5a48babde44a23c0f22bae5523f4fdf13</id>
<content type='text'>
The VMCI context ID of a virtual machine may change at any time. There
is a VMCI event which signals this but datagrams may be processed before
this is handled. It is therefore necessary to be flexible about the
destination context ID of any datagrams received. (It can be assumed to
be correct because it is provided by the hypervisor.) The context ID on
existing sockets should be updated to reflect how the hypervisor is
currently referring to the system.

Signed-off-by: Reilly Grant &lt;grantr@vmware.com&gt;
Acked-by: Andy King &lt;acking@vmware.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>VSOCK: Don't reject PF_VSOCK protocol</title>
<updated>2013-02-18T20:02:51Z</updated>
<author>
<name>Andy King</name>
<email>acking@vmware.com</email>
</author>
<published>2013-02-18T06:04:13Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6cf1c5fc26c6507bcb0edced6fcda876a79b5a6d'/>
<id>urn:sha1:6cf1c5fc26c6507bcb0edced6fcda876a79b5a6d</id>
<content type='text'>
Allow our own family as the protocol value for socket creation.

Reported-by: Gerd Hoffmann &lt;kraxel@redhat.com&gt;
Signed-off-by: Andy King &lt;acking@vmware.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>VSOCK: get rid of vsock_version.h</title>
<updated>2013-02-18T20:02:51Z</updated>
<author>
<name>Dmitry Torokhov</name>
<email>dtor@vmware.com</email>
</author>
<published>2013-02-18T06:04:11Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=7ccd7de691bcc7194deb68b1db391861ada5427e'/>
<id>urn:sha1:7ccd7de691bcc7194deb68b1db391861ada5427e</id>
<content type='text'>
There isn't really a need to have a separate file for it.

Acked-by: Andy King &lt;acking@vmware.com&gt;
Signed-off-by: Dmitry Torokhov &lt;dtor@vmware.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>VSOCK: get rid of EXPORT_SYMTAB</title>
<updated>2013-02-18T20:02:51Z</updated>
<author>
<name>Dmitry Torokhov</name>
<email>dtor@vmware.com</email>
</author>
<published>2013-02-18T06:04:10Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=7777ac3860327da557665f6e53cd82fbe40f151b'/>
<id>urn:sha1:7777ac3860327da557665f6e53cd82fbe40f151b</id>
<content type='text'>
This is the default behavior for a looooooong time.

Acked-by: Andy King &lt;acking@vmware.com&gt;
Signed-off-by: Dmitry Torokhov &lt;dtor@vmware.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>VSOCK: Introduce VM Sockets</title>
<updated>2013-02-11T00:41:08Z</updated>
<author>
<name>Andy King</name>
<email>acking@vmware.com</email>
</author>
<published>2013-02-06T14:23:56Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=d021c344051af91f42c5ba9fdedc176740cbd238'/>
<id>urn:sha1:d021c344051af91f42c5ba9fdedc176740cbd238</id>
<content type='text'>
VM Sockets allows communication between virtual machines and the hypervisor.
User level applications both in a virtual machine and on the host can use the
VM Sockets API, which facilitates fast and efficient communication between
guest virtual machines and their host.  A socket address family, designed to be
compatible with UDP and TCP at the interface level, is provided.

Today, VM Sockets is used by various VMware Tools components inside the guest
for zero-config, network-less access to VMware host services.  In addition to
this, VMware's users are using VM Sockets for various applications, where
network access of the virtual machine is restricted or non-existent.  Examples
of this are VMs communicating with device proxies for proprietary hardware
running as host applications and automated testing of applications running
within virtual machines.

The VMware VM Sockets are similar to other socket types, like Berkeley UNIX
socket interface.  The VM Sockets module supports both connection-oriented
stream sockets like TCP, and connectionless datagram sockets like UDP. The VM
Sockets protocol family is defined as "AF_VSOCK" and the socket operations
split for SOCK_DGRAM and SOCK_STREAM.

For additional information about the use of VM Sockets, please refer to the
VM Sockets Programming Guide available at:

https://www.vmware.com/support/developer/vmci-sdk/

Signed-off-by: George Zhang &lt;georgezhang@vmware.com&gt;
Signed-off-by: Dmitry Torokhov &lt;dtor@vmware.com&gt;
Signed-off-by: Andy king &lt;acking@vmware.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
