lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20160412140301.GC29405@stefanha-x1.localdomain>
Date:	Tue, 12 Apr 2016 15:03:01 +0100
From:	Stefan Hajnoczi <stefanha@...hat.com>
To:	Antoine Martin <antoine@...afix.co.uk>
Cc:	netdev@...r.kernel.org
Subject: Re: AF_VSOCK status

On Mon, Apr 11, 2016 at 06:53:05PM +0700, Antoine Martin wrote:
> > There are a few existing ways to achieve that without involving 
> > virtio-vsock: vhost-user or ivshmem.
> Yes, I've looked at those and they seem a bit overkill for what we
> want to achieve. We don't want sharing with multiple guests, or
> interrupts.
> All we want is a chunk of host memory to be accessible from the guest..

ivshmem does that.  It operates in two modes, it sounds like you want
the first and simpler mode ("ivshmem-plain").

Take a look at hw/misc/ivshmem.c in QEMU.

Stefan

Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ