Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp3309240ybn; Fri, 27 Sep 2019 04:32:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqxzAryLI8F5y7+jXu1HUjh35l/MX7Pen3A2B0T06Ic+Y6J6z/pQ3ceF7NH017p1R31FWUqj X-Received: by 2002:a50:e691:: with SMTP id z17mr3930267edm.84.1569583920060; Fri, 27 Sep 2019 04:32:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569583920; cv=none; d=google.com; s=arc-20160816; b=eYQIUZps/U1VXAJAq0ILSrPJreANE8412wxfSrP/xlsNQPa2RkAdk1siTWiCH7UuZ9 scEQ5NX4qVbrfbIfUoGjrW27QJ0OWEmJ3wOXcZL/UVdZELK+qEgksVhNftIA3eNSXOVC LovpN8HZMcH+CI/01tUUryPMn5Wm6BbrvsigbjO5Qx/NqWF2fPzVzYVsbyslOLCOiXhO QWBSdxD2lLAo8UN/izDfDVgfDYKQUU0Cs0pIIYLp+d2NJ19hqX6pW8CQm7iVecH5nNN/ xqbfCSGBrSo7LevP56tItKhdeRAMqNI35vCUJNSgE8LqGjkFtaVdUsngMtx9F862+Bzd ogxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=NS79fULV+nl0mRQfEhdVy3JDTXOkcCJutKXjBPMC+4k=; b=oc2etv585bQaAMBgxx37hus63fERucX80JAKwRdv7nm/kJ8y9vG68I/WbjQuRPnuiC Rp1ja2sfkrx6VIqr2aSgAdIKjDxFgFcYYvC9BYYW1fQJ4BCo9g2RJEZkf6NjTsB1rK8e v+Uqo/vWV7pbTDgQ4bpPm9uUiwroZK9ERP2jYYJ4oFDywaYuRECZo5rb0fB74otDAZ3h xaFFpJroc65okXR2NZFg1yeh/wWooIX8H1l01kZL29KgCBv3YB2JYm3WoAXfG6qrU1IJ ZQKXi6NwvnfYFj5RbBt6KYHy0HvtIXx4djh1YCuqC22yrNxrS5MZmRJG9MDA+zGMq7Rv Le1g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d14si2595034ejr.358.2019.09.27.04.31.35; Fri, 27 Sep 2019 04:32:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727800AbfI0L2g (ORCPT + 99 others); Fri, 27 Sep 2019 07:28:36 -0400 Received: from mx1.redhat.com ([209.132.183.28]:59366 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725890AbfI0L2f (ORCPT ); Fri, 27 Sep 2019 07:28:35 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 9B537309BF12; Fri, 27 Sep 2019 11:28:34 +0000 (UTC) Received: from steredhat.redhat.com (ovpn-117-249.ams2.redhat.com [10.36.117.249]) by smtp.corp.redhat.com (Postfix) with ESMTP id 2F2AE5D9C3; Fri, 27 Sep 2019 11:28:27 +0000 (UTC) From: Stefano Garzarella To: netdev@vger.kernel.org Cc: linux-hyperv@vger.kernel.org, "K. Y. Srinivasan" , Stefan Hajnoczi , Sasha Levin , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, "David S. Miller" , virtualization@lists.linux-foundation.org, Stephen Hemminger , Jason Wang , "Michael S. Tsirkin" , Haiyang Zhang , Dexuan Cui , Jorgen Hansen Subject: [RFC PATCH 11/13] vsock: add 'transport_hg' to handle g2h\h2g transports Date: Fri, 27 Sep 2019 13:27:01 +0200 Message-Id: <20190927112703.17745-12-sgarzare@redhat.com> In-Reply-To: <20190927112703.17745-1-sgarzare@redhat.com> References: <20190927112703.17745-1-sgarzare@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.45]); Fri, 27 Sep 2019 11:28:34 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org VMCI transport provides both g2h and h2g behaviors in a single transport. We are able to set (or not) the g2h behavior, detecting if we are in a VMware guest (or not), but the h2g feature is always set. This prevents to load other h2g transports while we are in a VMware guest. This patch adds a new 'transport_hg' to handle this case, reducing the priority of transports that provide both g2h and h2g behaviors. A transport that has g2h and h2g features, can be bypassed by a transport that has only the h2g feature. Signed-off-by: Stefano Garzarella --- net/vmw_vsock/af_vsock.c | 29 ++++++++++++++++++++++++----- 1 file changed, 24 insertions(+), 5 deletions(-) diff --git a/net/vmw_vsock/af_vsock.c b/net/vmw_vsock/af_vsock.c index c52203fe52c4..c5f46b8242ce 100644 --- a/net/vmw_vsock/af_vsock.c +++ b/net/vmw_vsock/af_vsock.c @@ -134,6 +134,8 @@ static struct proto vsock_proto = { static const struct vsock_transport *transport_h2g; /* Transport used for guest->host communication */ static const struct vsock_transport *transport_g2h; +/* Transport used for both host->guest and guest->host communication */ +static const struct vsock_transport *transport_hg; /* Transport used for DGRAM communication */ static const struct vsock_transport *transport_dgram; static DEFINE_MUTEX(vsock_register_mutex); @@ -402,10 +404,13 @@ int vsock_assign_transport(struct vsock_sock *vsk, struct vsock_sock *psk) vsk->transport = transport_dgram; break; case SOCK_STREAM: - if (vsk->remote_addr.svm_cid > VMADDR_CID_HOST) + if (vsk->remote_addr.svm_cid > VMADDR_CID_HOST) { vsk->transport = transport_h2g; - else + if (!vsk->transport) + vsk->transport = transport_hg; + } else { vsk->transport = transport_g2h; + } break; default: return -ESOCKTNOSUPPORT; @@ -423,7 +428,7 @@ static bool vsock_find_cid(unsigned int cid) if (transport_g2h && cid == transport_g2h->get_local_cid()) return true; - if (transport_h2g && cid == VMADDR_CID_HOST) + if ((transport_h2g || transport_hg) && cid == VMADDR_CID_HOST) return true; return false; @@ -1997,6 +2002,8 @@ static long vsock_dev_do_ioctl(struct file *filp, cid = transport_g2h->get_local_cid(); else if (transport_h2g) cid = transport_h2g->get_local_cid(); + else if (transport_hg) + cid = transport_hg->get_local_cid(); if (put_user(cid, p) != 0) retval = -EFAULT; @@ -2093,13 +2100,14 @@ EXPORT_SYMBOL_GPL(vsock_core_get_transport); int vsock_core_register(const struct vsock_transport *t) { - const struct vsock_transport *t_h2g, *t_g2h, *t_dgram; + const struct vsock_transport *t_h2g, *t_hg, *t_g2h, *t_dgram; int err = mutex_lock_interruptible(&vsock_register_mutex); if (err) return err; t_h2g = transport_h2g; + t_hg = transport_hg; t_g2h = transport_g2h; t_dgram = transport_dgram; @@ -2107,7 +2115,14 @@ int vsock_core_register(const struct vsock_transport *t) * same transport. We are able to set the G2H feature only if we are * in a VMware guest, but we are not able to do the same for the host. */ - if (t->features & VSOCK_TRANSPORT_F_H2G) { + if ((t->features & VSOCK_TRANSPORT_F_H2G) && + (t->features & VSOCK_TRANSPORT_F_G2H)) { + if (t_hg) { + err = -EBUSY; + goto err_busy; + } + t_hg = t; + } else if (t->features & VSOCK_TRANSPORT_F_H2G) { if (t_h2g) { err = -EBUSY; goto err_busy; @@ -2132,6 +2147,7 @@ int vsock_core_register(const struct vsock_transport *t) } transport_h2g = t_h2g; + transport_hg = t_hg; transport_g2h = t_g2h; transport_dgram = t_dgram; @@ -2151,6 +2167,9 @@ void vsock_core_unregister(const struct vsock_transport *t) if (transport_h2g == t) transport_h2g = NULL; + if (transport_hg == t) + transport_hg = NULL; + if (transport_g2h == t) transport_g2h = NULL; -- 2.21.0