6db4831e98
Android 14
227 lines
6.3 KiB
C
227 lines
6.3 KiB
C
/*
|
|
* VMware VMCI Driver
|
|
*
|
|
* Copyright (C) 2012 VMware, Inc. All rights reserved.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License as published by the
|
|
* Free Software Foundation version 2 and no later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful, but
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
|
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
* for more details.
|
|
*/
|
|
|
|
#include <linux/vmw_vmci_defs.h>
|
|
#include <linux/vmw_vmci_api.h>
|
|
|
|
#include "vmci_context.h"
|
|
#include "vmci_driver.h"
|
|
#include "vmci_route.h"
|
|
|
|
/*
|
|
* Make a routing decision for the given source and destination handles.
|
|
* This will try to determine the route using the handles and the available
|
|
* devices. Will set the source context if it is invalid.
|
|
*/
|
|
int vmci_route(struct vmci_handle *src,
|
|
const struct vmci_handle *dst,
|
|
bool from_guest,
|
|
enum vmci_route *route)
|
|
{
|
|
bool has_host_device = vmci_host_code_active();
|
|
bool has_guest_device = vmci_guest_code_active();
|
|
|
|
*route = VMCI_ROUTE_NONE;
|
|
|
|
/*
|
|
* "from_guest" is only ever set to true by
|
|
* IOCTL_VMCI_DATAGRAM_SEND (or by the vmkernel equivalent),
|
|
* which comes from the VMX, so we know it is coming from a
|
|
* guest.
|
|
*
|
|
* To avoid inconsistencies, test these once. We will test
|
|
* them again when we do the actual send to ensure that we do
|
|
* not touch a non-existent device.
|
|
*/
|
|
|
|
/* Must have a valid destination context. */
|
|
if (VMCI_INVALID_ID == dst->context)
|
|
return VMCI_ERROR_INVALID_ARGS;
|
|
|
|
/* Anywhere to hypervisor. */
|
|
if (VMCI_HYPERVISOR_CONTEXT_ID == dst->context) {
|
|
|
|
/*
|
|
* If this message already came from a guest then we
|
|
* cannot send it to the hypervisor. It must come
|
|
* from a local client.
|
|
*/
|
|
if (from_guest)
|
|
return VMCI_ERROR_DST_UNREACHABLE;
|
|
|
|
/*
|
|
* We must be acting as a guest in order to send to
|
|
* the hypervisor.
|
|
*/
|
|
if (!has_guest_device)
|
|
return VMCI_ERROR_DEVICE_NOT_FOUND;
|
|
|
|
/* And we cannot send if the source is the host context. */
|
|
if (VMCI_HOST_CONTEXT_ID == src->context)
|
|
return VMCI_ERROR_INVALID_ARGS;
|
|
|
|
/*
|
|
* If the client passed the ANON source handle then
|
|
* respect it (both context and resource are invalid).
|
|
* However, if they passed only an invalid context,
|
|
* then they probably mean ANY, in which case we
|
|
* should set the real context here before passing it
|
|
* down.
|
|
*/
|
|
if (VMCI_INVALID_ID == src->context &&
|
|
VMCI_INVALID_ID != src->resource)
|
|
src->context = vmci_get_context_id();
|
|
|
|
/* Send from local client down to the hypervisor. */
|
|
*route = VMCI_ROUTE_AS_GUEST;
|
|
return VMCI_SUCCESS;
|
|
}
|
|
|
|
/* Anywhere to local client on host. */
|
|
if (VMCI_HOST_CONTEXT_ID == dst->context) {
|
|
/*
|
|
* If it is not from a guest but we are acting as a
|
|
* guest, then we need to send it down to the host.
|
|
* Note that if we are also acting as a host then this
|
|
* will prevent us from sending from local client to
|
|
* local client, but we accept that restriction as a
|
|
* way to remove any ambiguity from the host context.
|
|
*/
|
|
if (src->context == VMCI_HYPERVISOR_CONTEXT_ID) {
|
|
/*
|
|
* If the hypervisor is the source, this is
|
|
* host local communication. The hypervisor
|
|
* may send vmci event datagrams to the host
|
|
* itself, but it will never send datagrams to
|
|
* an "outer host" through the guest device.
|
|
*/
|
|
|
|
if (has_host_device) {
|
|
*route = VMCI_ROUTE_AS_HOST;
|
|
return VMCI_SUCCESS;
|
|
} else {
|
|
return VMCI_ERROR_DEVICE_NOT_FOUND;
|
|
}
|
|
}
|
|
|
|
if (!from_guest && has_guest_device) {
|
|
/* If no source context then use the current. */
|
|
if (VMCI_INVALID_ID == src->context)
|
|
src->context = vmci_get_context_id();
|
|
|
|
/* Send it from local client down to the host. */
|
|
*route = VMCI_ROUTE_AS_GUEST;
|
|
return VMCI_SUCCESS;
|
|
}
|
|
|
|
/*
|
|
* Otherwise we already received it from a guest and
|
|
* it is destined for a local client on this host, or
|
|
* it is from another local client on this host. We
|
|
* must be acting as a host to service it.
|
|
*/
|
|
if (!has_host_device)
|
|
return VMCI_ERROR_DEVICE_NOT_FOUND;
|
|
|
|
if (VMCI_INVALID_ID == src->context) {
|
|
/*
|
|
* If it came from a guest then it must have a
|
|
* valid context. Otherwise we can use the
|
|
* host context.
|
|
*/
|
|
if (from_guest)
|
|
return VMCI_ERROR_INVALID_ARGS;
|
|
|
|
src->context = VMCI_HOST_CONTEXT_ID;
|
|
}
|
|
|
|
/* Route to local client. */
|
|
*route = VMCI_ROUTE_AS_HOST;
|
|
return VMCI_SUCCESS;
|
|
}
|
|
|
|
/*
|
|
* If we are acting as a host then this might be destined for
|
|
* a guest.
|
|
*/
|
|
if (has_host_device) {
|
|
/* It will have a context if it is meant for a guest. */
|
|
if (vmci_ctx_exists(dst->context)) {
|
|
if (VMCI_INVALID_ID == src->context) {
|
|
/*
|
|
* If it came from a guest then it
|
|
* must have a valid context.
|
|
* Otherwise we can use the host
|
|
* context.
|
|
*/
|
|
|
|
if (from_guest)
|
|
return VMCI_ERROR_INVALID_ARGS;
|
|
|
|
src->context = VMCI_HOST_CONTEXT_ID;
|
|
} else if (VMCI_CONTEXT_IS_VM(src->context) &&
|
|
src->context != dst->context) {
|
|
/*
|
|
* VM to VM communication is not
|
|
* allowed. Since we catch all
|
|
* communication destined for the host
|
|
* above, this must be destined for a
|
|
* VM since there is a valid context.
|
|
*/
|
|
|
|
return VMCI_ERROR_DST_UNREACHABLE;
|
|
}
|
|
|
|
/* Pass it up to the guest. */
|
|
*route = VMCI_ROUTE_AS_HOST;
|
|
return VMCI_SUCCESS;
|
|
} else if (!has_guest_device) {
|
|
/*
|
|
* The host is attempting to reach a CID
|
|
* without an active context, and we can't
|
|
* send it down, since we have no guest
|
|
* device.
|
|
*/
|
|
|
|
return VMCI_ERROR_DST_UNREACHABLE;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* We must be a guest trying to send to another guest, which means
|
|
* we need to send it down to the host. We do not filter out VM to
|
|
* VM communication here, since we want to be able to use the guest
|
|
* driver on older versions that do support VM to VM communication.
|
|
*/
|
|
if (!has_guest_device) {
|
|
/*
|
|
* Ending up here means we have neither guest nor host
|
|
* device.
|
|
*/
|
|
return VMCI_ERROR_DEVICE_NOT_FOUND;
|
|
}
|
|
|
|
/* If no source context then use the current context. */
|
|
if (VMCI_INVALID_ID == src->context)
|
|
src->context = vmci_get_context_id();
|
|
|
|
/*
|
|
* Send it from local client down to the host, which will
|
|
* route it to the other guest for us.
|
|
*/
|
|
*route = VMCI_ROUTE_AS_GUEST;
|
|
return VMCI_SUCCESS;
|
|
}
|