]> asedeno.scripts.mit.edu Git - linux.git/commitdiff
vsock/vmci: register vmci_transport only when VMCI guest/host are active
authorStefano Garzarella <sgarzare@redhat.com>
Thu, 14 Nov 2019 09:57:47 +0000 (10:57 +0100)
committerDavid S. Miller <davem@davemloft.net>
Fri, 15 Nov 2019 02:12:18 +0000 (18:12 -0800)
To allow other transports to be loaded with vmci_transport,
we register the vmci_transport as G2H or H2G only when a VMCI guest
or host is active.

To do that, this patch adds a callback registered in the vmci driver
that will be called when the host or guest becomes active.
This callback will register the vmci_transport in the VSOCK core.

Cc: Jorgen Hansen <jhansen@vmware.com>
Signed-off-by: Stefano Garzarella <sgarzare@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
drivers/misc/vmw_vmci/vmci_driver.c
drivers/misc/vmw_vmci/vmci_driver.h
drivers/misc/vmw_vmci/vmci_guest.c
drivers/misc/vmw_vmci/vmci_host.c
include/linux/vmw_vmci_api.h
net/vmw_vsock/vmci_transport.c

index 819e35995d32068d47d6f194ba0cfccf7463a0d9..95fed4664a2d2f74c00a52dcda93f5c7cc4193cd 100644 (file)
@@ -28,6 +28,10 @@ MODULE_PARM_DESC(disable_guest,
 static bool vmci_guest_personality_initialized;
 static bool vmci_host_personality_initialized;
 
+static DEFINE_MUTEX(vmci_vsock_mutex); /* protects vmci_vsock_transport_cb */
+static vmci_vsock_cb vmci_vsock_transport_cb;
+bool vmci_vsock_cb_host_called;
+
 /*
  * vmci_get_context_id() - Gets the current context ID.
  *
@@ -45,6 +49,69 @@ u32 vmci_get_context_id(void)
 }
 EXPORT_SYMBOL_GPL(vmci_get_context_id);
 
+/*
+ * vmci_register_vsock_callback() - Register the VSOCK vmci_transport callback.
+ *
+ * The callback will be called when the first host or guest becomes active,
+ * or if they are already active when this function is called.
+ * To unregister the callback, call this function with NULL parameter.
+ *
+ * Returns 0 on success. -EBUSY if a callback is already registered.
+ */
+int vmci_register_vsock_callback(vmci_vsock_cb callback)
+{
+       int err = 0;
+
+       mutex_lock(&vmci_vsock_mutex);
+
+       if (vmci_vsock_transport_cb && callback) {
+               err = -EBUSY;
+               goto out;
+       }
+
+       vmci_vsock_transport_cb = callback;
+
+       if (!vmci_vsock_transport_cb) {
+               vmci_vsock_cb_host_called = false;
+               goto out;
+       }
+
+       if (vmci_guest_code_active())
+               vmci_vsock_transport_cb(false);
+
+       if (vmci_host_users() > 0) {
+               vmci_vsock_cb_host_called = true;
+               vmci_vsock_transport_cb(true);
+       }
+
+out:
+       mutex_unlock(&vmci_vsock_mutex);
+       return err;
+}
+EXPORT_SYMBOL_GPL(vmci_register_vsock_callback);
+
+void vmci_call_vsock_callback(bool is_host)
+{
+       mutex_lock(&vmci_vsock_mutex);
+
+       if (!vmci_vsock_transport_cb)
+               goto out;
+
+       /* In the host, this function could be called multiple times,
+        * but we want to register it only once.
+        */
+       if (is_host) {
+               if (vmci_vsock_cb_host_called)
+                       goto out;
+
+               vmci_vsock_cb_host_called = true;
+       }
+
+       vmci_vsock_transport_cb(is_host);
+out:
+       mutex_unlock(&vmci_vsock_mutex);
+}
+
 static int __init vmci_drv_init(void)
 {
        int vmci_err;
index aab81b67670c55e9130717fe9f210a62545954fe..990682480bf6e13e5f77f0d35ce0643b34b7a43b 100644 (file)
@@ -36,10 +36,12 @@ extern struct pci_dev *vmci_pdev;
 
 u32 vmci_get_context_id(void);
 int vmci_send_datagram(struct vmci_datagram *dg);
+void vmci_call_vsock_callback(bool is_host);
 
 int vmci_host_init(void);
 void vmci_host_exit(void);
 bool vmci_host_code_active(void);
+int vmci_host_users(void);
 
 int vmci_guest_init(void);
 void vmci_guest_exit(void);
index 7a84a48c75da347425b6cf9405ebb462a0461af6..cc8eeb361fcdb580d5e2aa28e3283bfae2ddca18 100644 (file)
@@ -637,6 +637,8 @@ static int vmci_guest_probe_device(struct pci_dev *pdev,
                  vmci_dev->iobase + VMCI_CONTROL_ADDR);
 
        pci_set_drvdata(pdev, vmci_dev);
+
+       vmci_call_vsock_callback(false);
        return 0;
 
 err_free_irq:
index 833e2bd248a57344f310696b5b352c4a48232716..ff3c396146ffb06fb4b2e6045d5a50df0f6456e0 100644 (file)
@@ -108,6 +108,11 @@ bool vmci_host_code_active(void)
             atomic_read(&vmci_host_active_users) > 0);
 }
 
+int vmci_host_users(void)
+{
+       return atomic_read(&vmci_host_active_users);
+}
+
 /*
  * Called on open of /dev/vmci.
  */
@@ -338,6 +343,8 @@ static int vmci_host_do_init_context(struct vmci_host_dev *vmci_host_dev,
        vmci_host_dev->ct_type = VMCIOBJ_CONTEXT;
        atomic_inc(&vmci_host_active_users);
 
+       vmci_call_vsock_callback(true);
+
        retval = 0;
 
 out:
index acd9fafe4fc6142a19d0ca353f03dbed2e263df2..f28907345c8086b90f80f201eefc163708489b4b 100644 (file)
@@ -19,6 +19,7 @@
 struct msghdr;
 typedef void (vmci_device_shutdown_fn) (void *device_registration,
                                        void *user_data);
+typedef void (*vmci_vsock_cb) (bool is_host);
 
 int vmci_datagram_create_handle(u32 resource_id, u32 flags,
                                vmci_datagram_recv_cb recv_cb,
@@ -37,6 +38,7 @@ int vmci_doorbell_destroy(struct vmci_handle handle);
 int vmci_doorbell_notify(struct vmci_handle handle, u32 priv_flags);
 u32 vmci_get_context_id(void);
 bool vmci_is_context_owner(u32 context_id, kuid_t uid);
+int vmci_register_vsock_callback(vmci_vsock_cb callback);
 
 int vmci_event_subscribe(u32 event,
                         vmci_event_cb callback, void *callback_data,
index 86030ecb53ddae0587988f614322f02451c440e3..d9c9c834ad6f1c508c1ceff4f88a7221f53d0a72 100644 (file)
@@ -2054,19 +2054,21 @@ static bool vmci_check_transport(struct vsock_sock *vsk)
        return vsk->transport == &vmci_transport;
 }
 
-static int __init vmci_transport_init(void)
+void vmci_vsock_transport_cb(bool is_host)
 {
-       int features = VSOCK_TRANSPORT_F_DGRAM | VSOCK_TRANSPORT_F_H2G;
-       int cid;
-       int err;
+       int features;
 
-       cid = vmci_get_context_id();
+       if (is_host)
+               features = VSOCK_TRANSPORT_F_H2G;
+       else
+               features = VSOCK_TRANSPORT_F_G2H;
 
-       if (cid == VMCI_INVALID_ID)
-               return -EINVAL;
+       vsock_core_register(&vmci_transport, features);
+}
 
-       if (cid != VMCI_HOST_CONTEXT_ID)
-               features |= VSOCK_TRANSPORT_F_G2H;
+static int __init vmci_transport_init(void)
+{
+       int err;
 
        /* Create the datagram handle that we will use to send and receive all
         * VSocket control messages for this context.
@@ -2080,7 +2082,6 @@ static int __init vmci_transport_init(void)
                pr_err("Unable to create datagram handle. (%d)\n", err);
                return vmci_transport_error_to_vsock_error(err);
        }
-
        err = vmci_event_subscribe(VMCI_EVENT_QP_RESUMED,
                                   vmci_transport_qp_resumed_cb,
                                   NULL, &vmci_transport_qp_resumed_sub_id);
@@ -2091,12 +2092,21 @@ static int __init vmci_transport_init(void)
                goto err_destroy_stream_handle;
        }
 
-       err = vsock_core_register(&vmci_transport, features);
+       /* Register only with dgram feature, other features (H2G, G2H) will be
+        * registered when the first host or guest becomes active.
+        */
+       err = vsock_core_register(&vmci_transport, VSOCK_TRANSPORT_F_DGRAM);
        if (err < 0)
                goto err_unsubscribe;
 
+       err = vmci_register_vsock_callback(vmci_vsock_transport_cb);
+       if (err < 0)
+               goto err_unregister;
+
        return 0;
 
+err_unregister:
+       vsock_core_unregister(&vmci_transport);
 err_unsubscribe:
        vmci_event_unsubscribe(vmci_transport_qp_resumed_sub_id);
 err_destroy_stream_handle:
@@ -2122,6 +2132,7 @@ static void __exit vmci_transport_exit(void)
                vmci_transport_qp_resumed_sub_id = VMCI_INVALID_ID;
        }
 
+       vmci_register_vsock_callback(NULL);
        vsock_core_unregister(&vmci_transport);
 }
 module_exit(vmci_transport_exit);