On Mon, Oct 25, 2021 at 11:04:42AM -0500, michael.christie@xxxxxxxxxx wrote: > On 10/23/21 3:11 PM, Michael S. Tsirkin wrote: > > On Fri, Oct 22, 2021 at 01:17:26PM -0500, michael.christie@xxxxxxxxxx wrote: > >> On 10/22/21 11:12 AM, michael.christie@xxxxxxxxxx wrote: > >>> On 10/22/21 5:47 AM, Michael S. Tsirkin wrote: > >>>>> diff --git a/include/uapi/linux/vhost.h b/include/uapi/linux/vhost.h > >>>>> index c998860d7bbc..e5c0669430e5 100644 > >>>>> --- a/include/uapi/linux/vhost.h > >>>>> +++ b/include/uapi/linux/vhost.h > >>>>> @@ -70,6 +70,17 @@ > >>>>> #define VHOST_VRING_BIG_ENDIAN 1 > >>>>> #define VHOST_SET_VRING_ENDIAN _IOW(VHOST_VIRTIO, 0x13, struct vhost_vring_state) > >>>>> #define VHOST_GET_VRING_ENDIAN _IOW(VHOST_VIRTIO, 0x14, struct vhost_vring_state) > >>>>> +/* By default, a device gets one vhost_worker created during VHOST_SET_OWNER > >>>>> + * that its virtqueues share. This allows userspace to create a vhost_worker > >>>>> + * and map a virtqueue to it or map a virtqueue to an existing worker. > >>>>> + * > >>>>> + * If pid > 0 and it matches an existing vhost_worker thread it will be bound > >>>>> + * to the vq. If pid is VHOST_VRING_NEW_WORKER, then a new worker will be > >>>>> + * created and bound to the vq. > >>>>> + * > >>>>> + * This must be called after VHOST_SET_OWNER and before the vq is active. > >>>>> + */ > >>>> > >>>> A couple of things here: > >>>> it's probably a good idea not to make it match pid exactly, > >>>> if for no other reason than I'm not sure we want to > >>>> commit this being a pid. Let's just call it an id? > >>> > >>> Ok. > >>> > >>>> And maybe byteswap it or xor with some value > >>>> just to make sure userspace does not begin abusing it anyway. > >>>> > >>>> Also, interaction with pid namespace is unclear to me. > >>>> Can you document what happens here? > >>> > >>> This current patchset only allows the vhost_dev owner to > >>> create/bind workers for devices it owns, so namespace don't come > >> > >> I made a mistake here. The patches do restrict VHOST_SET_VRING_WORKER > >> to the same owner like I wrote. However, it looks like we could have 2 > >> threads with the same mm pointer so vhost_dev_check_owner returns true, > >> but they could be in different namespaces. > >> > >> Even though we are not going to pass the pid_t between user/kernel > >> space, should I add a pid namespace check when I repost the patches? > > > > Um it's part of the ioctl. How you are not going to pass it around? > > The not passing a pid around was referring to your comment about > obfuscating the pid. I might have misunderstood you and thought you > wanted to do something more like you suggested below where to userspace > it's just some int as far as userspace knows. > > > > > > So if we do worry about this, I would just make it a 64 bit integer, > > rename it "id" and increment each time a thread is created. > > > Yeah, this works for me. I just used a ida to allocate the id. We can > then use it's lookup functions too. Probably for the best, linear lookups will make destroying lots of threads and O(N^2) operation.