History log of /openbsd/sys/dev/pv/vmt.c (Results 1 – 25 of 32)
Revision Date Author Comments
# b4155af8 24-May-2024 jsg <jsg@openbsd.org>

remove unneeded includes


# b510f7b4 26-Sep-2023 mvs <mvs@openbsd.org>

Use shared netlock to protect ifnet data within vmt_tclo_broadcastip().
Execute vmt_tclo_tick() timeout handler in process context to allow
context switch within vmt_tclo_broadcastip().

ok yasuoka


# 98dbb30e 07-Jan-2023 asou <asou@openbsd.org>

The maximum length of the value is extended to 64k bytes.

ok yasuoka


# 529a7364 28-Dec-2022 asou <asou@openbsd.org>

Change space character to TAB.

ok tb mlarkin giovanni


# 0b965e09 26-Dec-2022 asou <asou@openbsd.org>

Add close vmt.


# 45d281fc 03-Dec-2022 yasuoka <yasuoka@openbsd.org>

Modify vmt to use the buffer allocated in pvbus directly instead of
the buffer in the vmt softc when doing RPC for PVBUSIOC_KV{READ|WRITE}
ioctl.

ok asou


# ccb45f8e 08-Sep-2022 kn <kn@openbsd.org>

Rename global ifnet TAILQ

Naming the list like the struct itself makes for awful grepping.
Call the global variable "ifnetlist" from now on.

There used to be kvm(3) consumers in base picking up thi

Rename global ifnet TAILQ

Naming the list like the struct itself makes for awful grepping.
Call the global variable "ifnetlist" from now on.

There used to be kvm(3) consumers in base picking up this symbol, but those
have long been converted to other interfaces.

A few potential ports users remain, same deal as sys/net/if_var.h r1.116
"Remove struct ifnet's unused if_switchport member": they get bumped.

Previous users pointed out by deraadt
OK bluhm

show more ...


# 4b1a56af 09-Jan-2022 jsg <jsg@openbsd.org>

spelling
feedback and ok tb@ jmc@ ok ratchov@


# ffaee248 05-Nov-2021 mpi <mpi@openbsd.org>

Constify struct cfattach.


# 2f79a14d 11-Feb-2021 mestre <mestre@openbsd.org>

Initialize var since it's used in a condition a little bit afterwards.

CID 1501713

ok jmatthew@


# 319c37cd 15-Jan-2021 jmatthew <jmatthew@openbsd.org>

Report full IP address information to the host. Contrary to what I wrote
here 10 years ago, xdr isn't scary at all.

ok dlg@


# 73a8717b 13-Jan-2021 jmatthew <jmatthew@openbsd.org>

Make vm_rpc_send_rpci_tx_buf() use the buffer passed in, not the buffer
allocated as part of the softc, though it's always been the same buffer
so far.

ok dlg@


# b02e1729 13-Jan-2021 jmatthew <jmatthew@openbsd.org>

put M_ZERO in the right place

ok dlg@


# 3209772d 24-Jun-2020 cheloha <cheloha@openbsd.org>

kernel: use gettime(9)/getuptime(9) in lieu of time_second(9)/time_uptime(9)

time_second(9) and time_uptime(9) are widely used in the kernel to
quickly get the system UTC or system uptime as a time_

kernel: use gettime(9)/getuptime(9) in lieu of time_second(9)/time_uptime(9)

time_second(9) and time_uptime(9) are widely used in the kernel to
quickly get the system UTC or system uptime as a time_t. However,
time_t is 64-bit everywhere, so it is not generally safe to use them
on 32-bit platforms: you have a split-read problem if your hardware
cannot perform atomic 64-bit reads.

This patch replaces time_second(9) with gettime(9), a safer successor
interface, throughout the kernel. Similarly, time_uptime(9) is replaced
with getuptime(9).

There is a performance cost on 32-bit platforms in exchange for
eliminating the split-read problem: instead of two register reads you
now have a lockless read loop to pull the values from the timehands.
This is really not *too* bad in the grand scheme of things, but
compared to what we were doing before it is several times slower.

There is no performance cost on 64-bit (__LP64__) platforms.

With input from visa@, dlg@, and tedu@.

Several bugs squashed by visa@.

ok kettenis@

show more ...


# c8f27247 29-May-2020 deraadt <deraadt@openbsd.org>

dev/rndvar.h no longer has statistical interfaces (removed during various
conversion steps). it only contains kernel prototypes for 4 interfaces,
all of which legitimately belong in sys/systm.h, whi

dev/rndvar.h no longer has statistical interfaces (removed during various
conversion steps). it only contains kernel prototypes for 4 interfaces,
all of which legitimately belong in sys/systm.h, which are already included
by all enqueue_randomness() users.

show more ...


# 421bfb1f 16-Feb-2020 jmatthew <jmatthew@openbsd.org>

Force a guest info update when we get a Capabilities_Register command.
ESXi doesn't carry the guest info over when a guest gets moved to a
different host, and this appears to be the only hint the gue

Force a guest info update when we get a Capabilities_Register command.
ESXi doesn't carry the guest info over when a guest gets moved to a
different host, and this appears to be the only hint the guest gets
that this has happened.

ok dlg@

show more ...


# 44bcf650 31-Dec-2019 jsg <jsg@openbsd.org>

include sys/sensors.h for sensor use


# 9e9abf5b 28-Apr-2018 jasper <jasper@openbsd.org>

replace add_*_randomness with enqueue_randomness()

this gets rid of the source annotation which doesn't really add
anything other than adding complexitiy. randomess is generally
good enough that the

replace add_*_randomness with enqueue_randomness()

this gets rid of the source annotation which doesn't really add
anything other than adding complexitiy. randomess is generally
good enough that the few extra bits that the source type would
add are not worth it.

ok mikeb@ deraadt@

show more ...


# c72a87aa 08-Mar-2018 jmatthew <jmatthew@openbsd.org>

Implement the VMWare vmbackup protocol using vfs_stall(). This lets you
clone running guests and take disk-only snapshots, most of the time ending
up with a clean filesystem.

ok dlg@ deraadt@


# 6aba050a 04-Jun-2017 jmatthew <jmatthew@openbsd.org>

update link to Ken Kato's vmware backdoor protocol documentation
from Seth Jackson


# 46523e56 03-Feb-2017 jsg <jsg@openbsd.org>

yasuoka@ reported that a "guest shutdown" resulted in a reboot instead
of a shutdown. Correct a mistake in rev 1.11 to make this trigger a
shutdown again.

ok reyk@


# 0f265ed3 10-Jan-2017 reyk <reyk@openbsd.org>

Introduce pvbus_reboot() and pvbus_shutdown() to move the repeated
tasks from the PV drivers into a central place. While here, we
figured out that it is not needed to check for allowpowerdown on the

Introduce pvbus_reboot() and pvbus_shutdown() to move the repeated
tasks from the PV drivers into a central place. While here, we
figured out that it is not needed to check for allowpowerdown on the
hypervisor-initiated shutdown requests.

OK mikeb@

show more ...


# 946c0a6b 04-Oct-2016 kettenis <kettenis@openbsd.org>

Use "%s" in vm_rpc_send_rpci_tx() call. Avoids a "format string is not a
string literal" warning from clang.

ok jca@


# 7242e163 03-Feb-2016 reyk <reyk@openbsd.org>

Increase the RPC buffer once more to 4096 bytes. The guestinfo.ovfEnv
mechanism is used to configure VMs in the VMware vSphere world:
instead of using individual key-value guestinfo.* properties, it

Increase the RPC buffer once more to 4096 bytes. The guestinfo.ovfEnv
mechanism is used to configure VMs in the VMware vSphere world:
instead of using individual key-value guestinfo.* properties, it uses
the guestinfo.ovfEnv value to pass an enterprise-compliant XML file
that includes key-value properties. This file can be rather large,
especially with comments, but 4k ought to be enough for anybody.
Also change a stack buffer to malloc'ed memory in the ioctl path.

OK mikeb@

show more ...


# bf6e4a06 27-Jan-2016 reyk <reyk@openbsd.org>

Add a key-value interface to pvbus(4) that allows to get or set values
in the underlying information store of the host from the OpenBSD-VM's
userspace. OpenBSD did not provide access to these stores

Add a key-value interface to pvbus(4) that allows to get or set values
in the underlying information store of the host from the OpenBSD-VM's
userspace. OpenBSD did not provide access to these stores before,
mostly because we did not want to add a custom tool and interface for
each hypervisor. The pvbus(4) interface provides backends for
xen(4)'s XenStore and vmt(4)'s VMware Tools "guestinfo". These
information stores are fairly different, XenStore is a "filesystem"
while vmt is a RPC, and the key-value abstraction limits them a bit
but provides the most wanted functionality.

Discussed with many
OK mikeb@

show more ...


12