227 lines
		
	
	
	
		
			6.3 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
		
		
			
		
	
	
			227 lines
		
	
	
	
		
			6.3 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
|   | /*
 | ||
|  |  * VMware VMCI Driver | ||
|  |  * | ||
|  |  * Copyright (C) 2012 VMware, Inc. All rights reserved. | ||
|  |  * | ||
|  |  * This program is free software; you can redistribute it and/or modify it | ||
|  |  * under the terms of the GNU General Public License as published by the | ||
|  |  * Free Software Foundation version 2 and no later version. | ||
|  |  * | ||
|  |  * This program is distributed in the hope that it will be useful, but | ||
|  |  * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY | ||
|  |  * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License | ||
|  |  * for more details. | ||
|  |  */ | ||
|  | 
 | ||
|  | #include <linux/vmw_vmci_defs.h>
 | ||
|  | #include <linux/vmw_vmci_api.h>
 | ||
|  | 
 | ||
|  | #include "vmci_context.h"
 | ||
|  | #include "vmci_driver.h"
 | ||
|  | #include "vmci_route.h"
 | ||
|  | 
 | ||
|  | /*
 | ||
|  |  * Make a routing decision for the given source and destination handles. | ||
|  |  * This will try to determine the route using the handles and the available | ||
|  |  * devices.  Will set the source context if it is invalid. | ||
|  |  */ | ||
|  | int vmci_route(struct vmci_handle *src, | ||
|  | 	       const struct vmci_handle *dst, | ||
|  | 	       bool from_guest, | ||
|  | 	       enum vmci_route *route) | ||
|  | { | ||
|  | 	bool has_host_device = vmci_host_code_active(); | ||
|  | 	bool has_guest_device = vmci_guest_code_active(); | ||
|  | 
 | ||
|  | 	*route = VMCI_ROUTE_NONE; | ||
|  | 
 | ||
|  | 	/*
 | ||
|  | 	 * "from_guest" is only ever set to true by | ||
|  | 	 * IOCTL_VMCI_DATAGRAM_SEND (or by the vmkernel equivalent), | ||
|  | 	 * which comes from the VMX, so we know it is coming from a | ||
|  | 	 * guest. | ||
|  | 	 * | ||
|  | 	 * To avoid inconsistencies, test these once.  We will test | ||
|  | 	 * them again when we do the actual send to ensure that we do | ||
|  | 	 * not touch a non-existent device. | ||
|  | 	 */ | ||
|  | 
 | ||
|  | 	/* Must have a valid destination context. */ | ||
|  | 	if (VMCI_INVALID_ID == dst->context) | ||
|  | 		return VMCI_ERROR_INVALID_ARGS; | ||
|  | 
 | ||
|  | 	/* Anywhere to hypervisor. */ | ||
|  | 	if (VMCI_HYPERVISOR_CONTEXT_ID == dst->context) { | ||
|  | 
 | ||
|  | 		/*
 | ||
|  | 		 * If this message already came from a guest then we | ||
|  | 		 * cannot send it to the hypervisor.  It must come | ||
|  | 		 * from a local client. | ||
|  | 		 */ | ||
|  | 		if (from_guest) | ||
|  | 			return VMCI_ERROR_DST_UNREACHABLE; | ||
|  | 
 | ||
|  | 		/*
 | ||
|  | 		 * We must be acting as a guest in order to send to | ||
|  | 		 * the hypervisor. | ||
|  | 		 */ | ||
|  | 		if (!has_guest_device) | ||
|  | 			return VMCI_ERROR_DEVICE_NOT_FOUND; | ||
|  | 
 | ||
|  | 		/* And we cannot send if the source is the host context. */ | ||
|  | 		if (VMCI_HOST_CONTEXT_ID == src->context) | ||
|  | 			return VMCI_ERROR_INVALID_ARGS; | ||
|  | 
 | ||
|  | 		/*
 | ||
|  | 		 * If the client passed the ANON source handle then | ||
|  | 		 * respect it (both context and resource are invalid). | ||
|  | 		 * However, if they passed only an invalid context, | ||
|  | 		 * then they probably mean ANY, in which case we | ||
|  | 		 * should set the real context here before passing it | ||
|  | 		 * down. | ||
|  | 		 */ | ||
|  | 		if (VMCI_INVALID_ID == src->context && | ||
|  | 		    VMCI_INVALID_ID != src->resource) | ||
|  | 			src->context = vmci_get_context_id(); | ||
|  | 
 | ||
|  | 		/* Send from local client down to the hypervisor. */ | ||
|  | 		*route = VMCI_ROUTE_AS_GUEST; | ||
|  | 		return VMCI_SUCCESS; | ||
|  | 	} | ||
|  | 
 | ||
|  | 	/* Anywhere to local client on host. */ | ||
|  | 	if (VMCI_HOST_CONTEXT_ID == dst->context) { | ||
|  | 		/*
 | ||
|  | 		 * If it is not from a guest but we are acting as a | ||
|  | 		 * guest, then we need to send it down to the host. | ||
|  | 		 * Note that if we are also acting as a host then this | ||
|  | 		 * will prevent us from sending from local client to | ||
|  | 		 * local client, but we accept that restriction as a | ||
|  | 		 * way to remove any ambiguity from the host context. | ||
|  | 		 */ | ||
|  | 		if (src->context == VMCI_HYPERVISOR_CONTEXT_ID) { | ||
|  | 			/*
 | ||
|  | 			 * If the hypervisor is the source, this is | ||
|  | 			 * host local communication. The hypervisor | ||
|  | 			 * may send vmci event datagrams to the host | ||
|  | 			 * itself, but it will never send datagrams to | ||
|  | 			 * an "outer host" through the guest device. | ||
|  | 			 */ | ||
|  | 
 | ||
|  | 			if (has_host_device) { | ||
|  | 				*route = VMCI_ROUTE_AS_HOST; | ||
|  | 				return VMCI_SUCCESS; | ||
|  | 			} else { | ||
|  | 				return VMCI_ERROR_DEVICE_NOT_FOUND; | ||
|  | 			} | ||
|  | 		} | ||
|  | 
 | ||
|  | 		if (!from_guest && has_guest_device) { | ||
|  | 			/* If no source context then use the current. */ | ||
|  | 			if (VMCI_INVALID_ID == src->context) | ||
|  | 				src->context = vmci_get_context_id(); | ||
|  | 
 | ||
|  | 			/* Send it from local client down to the host. */ | ||
|  | 			*route = VMCI_ROUTE_AS_GUEST; | ||
|  | 			return VMCI_SUCCESS; | ||
|  | 		} | ||
|  | 
 | ||
|  | 		/*
 | ||
|  | 		 * Otherwise we already received it from a guest and | ||
|  | 		 * it is destined for a local client on this host, or | ||
|  | 		 * it is from another local client on this host.  We | ||
|  | 		 * must be acting as a host to service it. | ||
|  | 		 */ | ||
|  | 		if (!has_host_device) | ||
|  | 			return VMCI_ERROR_DEVICE_NOT_FOUND; | ||
|  | 
 | ||
|  | 		if (VMCI_INVALID_ID == src->context) { | ||
|  | 			/*
 | ||
|  | 			 * If it came from a guest then it must have a | ||
|  | 			 * valid context.  Otherwise we can use the | ||
|  | 			 * host context. | ||
|  | 			 */ | ||
|  | 			if (from_guest) | ||
|  | 				return VMCI_ERROR_INVALID_ARGS; | ||
|  | 
 | ||
|  | 			src->context = VMCI_HOST_CONTEXT_ID; | ||
|  | 		} | ||
|  | 
 | ||
|  | 		/* Route to local client. */ | ||
|  | 		*route = VMCI_ROUTE_AS_HOST; | ||
|  | 		return VMCI_SUCCESS; | ||
|  | 	} | ||
|  | 
 | ||
|  | 	/*
 | ||
|  | 	 * If we are acting as a host then this might be destined for | ||
|  | 	 * a guest. | ||
|  | 	 */ | ||
|  | 	if (has_host_device) { | ||
|  | 		/* It will have a context if it is meant for a guest. */ | ||
|  | 		if (vmci_ctx_exists(dst->context)) { | ||
|  | 			if (VMCI_INVALID_ID == src->context) { | ||
|  | 				/*
 | ||
|  | 				 * If it came from a guest then it | ||
|  | 				 * must have a valid context. | ||
|  | 				 * Otherwise we can use the host | ||
|  | 				 * context. | ||
|  | 				 */ | ||
|  | 
 | ||
|  | 				if (from_guest) | ||
|  | 					return VMCI_ERROR_INVALID_ARGS; | ||
|  | 
 | ||
|  | 				src->context = VMCI_HOST_CONTEXT_ID; | ||
|  | 			} else if (VMCI_CONTEXT_IS_VM(src->context) && | ||
|  | 				   src->context != dst->context) { | ||
|  | 				/*
 | ||
|  | 				 * VM to VM communication is not | ||
|  | 				 * allowed. Since we catch all | ||
|  | 				 * communication destined for the host | ||
|  | 				 * above, this must be destined for a | ||
|  | 				 * VM since there is a valid context. | ||
|  | 				 */ | ||
|  | 
 | ||
|  | 				return VMCI_ERROR_DST_UNREACHABLE; | ||
|  | 			} | ||
|  | 
 | ||
|  | 			/* Pass it up to the guest. */ | ||
|  | 			*route = VMCI_ROUTE_AS_HOST; | ||
|  | 			return VMCI_SUCCESS; | ||
|  | 		} else if (!has_guest_device) { | ||
|  | 			/*
 | ||
|  | 			 * The host is attempting to reach a CID | ||
|  | 			 * without an active context, and we can't | ||
|  | 			 * send it down, since we have no guest | ||
|  | 			 * device. | ||
|  | 			 */ | ||
|  | 
 | ||
|  | 			return VMCI_ERROR_DST_UNREACHABLE; | ||
|  | 		} | ||
|  | 	} | ||
|  | 
 | ||
|  | 	/*
 | ||
|  | 	 * We must be a guest trying to send to another guest, which means | ||
|  | 	 * we need to send it down to the host. We do not filter out VM to | ||
|  | 	 * VM communication here, since we want to be able to use the guest | ||
|  | 	 * driver on older versions that do support VM to VM communication. | ||
|  | 	 */ | ||
|  | 	if (!has_guest_device) { | ||
|  | 		/*
 | ||
|  | 		 * Ending up here means we have neither guest nor host | ||
|  | 		 * device. | ||
|  | 		 */ | ||
|  | 		return VMCI_ERROR_DEVICE_NOT_FOUND; | ||
|  | 	} | ||
|  | 
 | ||
|  | 	/* If no source context then use the current context. */ | ||
|  | 	if (VMCI_INVALID_ID == src->context) | ||
|  | 		src->context = vmci_get_context_id(); | ||
|  | 
 | ||
|  | 	/*
 | ||
|  | 	 * Send it from local client down to the host, which will | ||
|  | 	 * route it to the other guest for us. | ||
|  | 	 */ | ||
|  | 	*route = VMCI_ROUTE_AS_GUEST; | ||
|  | 	return VMCI_SUCCESS; | ||
|  | } |