blob: 660036da744953ef93ccd204df470b04e64daaee [file] [log] [blame]
Thomas Gleixner43aa3132019-05-29 07:17:54 -07001// SPDX-License-Identifier: GPL-2.0-only
K. Y. Srinivasan013254762014-02-16 11:34:30 -08002/*
3 * An implementation of file copy service.
4 *
5 * Copyright (C) 2014, Microsoft, Inc.
6 *
7 * Author : K. Y. Srinivasan <ksrinivasan@novell.com>
K. Y. Srinivasan013254762014-02-16 11:34:30 -08008 */
9
10#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
11
K. Y. Srinivasan013254762014-02-16 11:34:30 -080012#include <linux/nls.h>
13#include <linux/workqueue.h>
K. Y. Srinivasan013254762014-02-16 11:34:30 -080014#include <linux/hyperv.h>
15#include <linux/sched.h>
Himadri Pandyab14d7492019-07-25 05:03:14 +000016#include <asm/hyperv-tlfs.h>
K. Y. Srinivasan013254762014-02-16 11:34:30 -080017
18#include "hyperv_vmbus.h"
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -070019#include "hv_utils_transport.h"
K. Y. Srinivasan013254762014-02-16 11:34:30 -080020
21#define WIN8_SRV_MAJOR 1
22#define WIN8_SRV_MINOR 1
23#define WIN8_SRV_VERSION (WIN8_SRV_MAJOR << 16 | WIN8_SRV_MINOR)
24
Alex Nga1656452017-01-28 12:37:17 -070025#define FCOPY_VER_COUNT 1
26static const int fcopy_versions[] = {
27 WIN8_SRV_VERSION
28};
29
30#define FW_VER_COUNT 1
31static const int fw_versions[] = {
32 UTIL_FW_VERSION
33};
34
K. Y. Srinivasan013254762014-02-16 11:34:30 -080035/*
36 * Global state maintained for transaction that is being processed.
37 * For a class of integration services, including the "file copy service",
38 * the specified protocol is a "request/response" protocol which means that
39 * there can only be single outstanding transaction from the host at any
40 * given point in time. We use this to simplify memory management in this
41 * driver - we cache and process only one message at a time.
42 *
43 * While the request/response protocol is guaranteed by the host, we further
44 * ensure this by serializing packet processing in this driver - we do not
45 * read additional packets from the VMBUs until the current packet is fully
46 * handled.
K. Y. Srinivasan013254762014-02-16 11:34:30 -080047 */
48
49static struct {
Vitaly Kuznetsov4c93ccc2015-04-11 18:07:49 -070050 int state; /* hvutil_device_state */
K. Y. Srinivasan013254762014-02-16 11:34:30 -080051 int recv_len; /* number of bytes received. */
52 struct hv_fcopy_hdr *fcopy_msg; /* current message */
K. Y. Srinivasan013254762014-02-16 11:34:30 -080053 struct vmbus_channel *recv_channel; /* chn we got the request */
54 u64 recv_req_id; /* request ID. */
K. Y. Srinivasan013254762014-02-16 11:34:30 -080055} fcopy_transaction;
56
K. Y. Srinivasan013254762014-02-16 11:34:30 -080057static void fcopy_respond_to_host(int error);
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -070058static void fcopy_send_data(struct work_struct *dummy);
Vitaly Kuznetsov1d072332015-04-11 18:07:45 -070059static void fcopy_timeout_func(struct work_struct *dummy);
60static DECLARE_DELAYED_WORK(fcopy_timeout_work, fcopy_timeout_func);
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -070061static DECLARE_WORK(fcopy_send_work, fcopy_send_data);
62static const char fcopy_devname[] = "vmbus/hv_fcopy";
K. Y. Srinivasan013254762014-02-16 11:34:30 -080063static u8 *recv_buffer;
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -070064static struct hvutil_transport *hvt;
Vitaly Kuznetsova4d1ee52015-04-11 18:07:58 -070065/*
66 * This state maintains the version number registered by the daemon.
67 */
68static int dm_reg_value;
K. Y. Srinivasan013254762014-02-16 11:34:30 -080069
Olaf Hering3cace4a2015-12-14 16:01:33 -080070static void fcopy_poll_wrapper(void *channel)
71{
72 /* Transaction is finished, reset the state here to avoid races. */
73 fcopy_transaction.state = HVUTIL_READY;
Andrea Parri (Microsoft)238d2ed82020-04-06 02:15:08 +020074 tasklet_schedule(&((struct vmbus_channel *)channel)->callback_event);
Olaf Hering3cace4a2015-12-14 16:01:33 -080075}
76
Vitaly Kuznetsov1d072332015-04-11 18:07:45 -070077static void fcopy_timeout_func(struct work_struct *dummy)
K. Y. Srinivasan013254762014-02-16 11:34:30 -080078{
79 /*
80 * If the timer fires, the user-mode component has not responded;
81 * process the pending transaction.
82 */
83 fcopy_respond_to_host(HV_E_FAIL);
Olaf Hering3cace4a2015-12-14 16:01:33 -080084 hv_poll_channel(fcopy_transaction.recv_channel, fcopy_poll_wrapper);
K. Y. Srinivasan013254762014-02-16 11:34:30 -080085}
86
Vitaly Kuznetsove0fa3e52016-06-09 17:08:57 -070087static void fcopy_register_done(void)
88{
89 pr_debug("FCP: userspace daemon registered\n");
90 hv_poll_channel(fcopy_transaction.recv_channel, fcopy_poll_wrapper);
91}
92
K. Y. Srinivasan013254762014-02-16 11:34:30 -080093static int fcopy_handle_handshake(u32 version)
94{
Vitaly Kuznetsova4d1ee52015-04-11 18:07:58 -070095 u32 our_ver = FCOPY_CURRENT_VERSION;
96
K. Y. Srinivasan013254762014-02-16 11:34:30 -080097 switch (version) {
Vitaly Kuznetsova4d1ee52015-04-11 18:07:58 -070098 case FCOPY_VERSION_0:
99 /* Daemon doesn't expect us to reply */
100 dm_reg_value = version;
101 break;
102 case FCOPY_VERSION_1:
103 /* Daemon expects us to reply with our own version */
Vitaly Kuznetsove0fa3e52016-06-09 17:08:57 -0700104 if (hvutil_transport_send(hvt, &our_ver, sizeof(our_ver),
105 fcopy_register_done))
Vitaly Kuznetsova4d1ee52015-04-11 18:07:58 -0700106 return -EFAULT;
107 dm_reg_value = version;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800108 break;
109 default:
110 /*
111 * For now we will fail the registration.
112 * If and when we have multiple versions to
113 * deal with, we will be backward compatible.
114 * We will add this code when needed.
115 */
116 return -EINVAL;
117 }
Vitaly Kuznetsove0fa3e52016-06-09 17:08:57 -0700118 pr_debug("FCP: userspace daemon ver. %d connected\n", version);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800119 return 0;
120}
121
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700122static void fcopy_send_data(struct work_struct *dummy)
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800123{
Vitaly Kuznetsov25ef06f2015-08-01 16:08:12 -0700124 struct hv_start_fcopy *smsg_out = NULL;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800125 int operation = fcopy_transaction.fcopy_msg->operation;
126 struct hv_start_fcopy *smsg_in;
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700127 void *out_src;
128 int rc, out_len;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800129
130 /*
131 * The strings sent from the host are encoded in
132 * in utf16; convert it to utf8 strings.
133 * The host assures us that the utf16 strings will not exceed
134 * the max lengths specified. We will however, reserve room
135 * for the string terminating character - in the utf16s_utf8s()
136 * function we limit the size of the buffer where the converted
137 * string is placed to W_MAX_PATH -1 to guarantee
138 * that the strings can be properly terminated!
139 */
140
141 switch (operation) {
142 case START_FILE_COPY:
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700143 out_len = sizeof(struct hv_start_fcopy);
Vitaly Kuznetsov25ef06f2015-08-01 16:08:12 -0700144 smsg_out = kzalloc(sizeof(*smsg_out), GFP_KERNEL);
145 if (!smsg_out)
146 return;
147
148 smsg_out->hdr.operation = operation;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800149 smsg_in = (struct hv_start_fcopy *)fcopy_transaction.fcopy_msg;
150
151 utf16s_to_utf8s((wchar_t *)smsg_in->file_name, W_MAX_PATH,
152 UTF16_LITTLE_ENDIAN,
Vitaly Kuznetsov25ef06f2015-08-01 16:08:12 -0700153 (__u8 *)&smsg_out->file_name, W_MAX_PATH - 1);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800154
155 utf16s_to_utf8s((wchar_t *)smsg_in->path_name, W_MAX_PATH,
156 UTF16_LITTLE_ENDIAN,
Vitaly Kuznetsov25ef06f2015-08-01 16:08:12 -0700157 (__u8 *)&smsg_out->path_name, W_MAX_PATH - 1);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800158
Vitaly Kuznetsov25ef06f2015-08-01 16:08:12 -0700159 smsg_out->copy_flags = smsg_in->copy_flags;
160 smsg_out->file_size = smsg_in->file_size;
161 out_src = smsg_out;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800162 break;
163
Olaf Hering549e6582017-09-21 23:41:48 -0700164 case WRITE_TO_FILE:
165 out_src = fcopy_transaction.fcopy_msg;
166 out_len = sizeof(struct hv_do_fcopy);
167 break;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800168 default:
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700169 out_src = fcopy_transaction.fcopy_msg;
170 out_len = fcopy_transaction.recv_len;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800171 break;
172 }
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700173
174 fcopy_transaction.state = HVUTIL_USERSPACE_REQ;
Vitaly Kuznetsove0fa3e52016-06-09 17:08:57 -0700175 rc = hvutil_transport_send(hvt, out_src, out_len, NULL);
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700176 if (rc) {
177 pr_debug("FCP: failed to communicate to the daemon: %d\n", rc);
178 if (cancel_delayed_work_sync(&fcopy_timeout_work)) {
179 fcopy_respond_to_host(HV_E_FAIL);
180 fcopy_transaction.state = HVUTIL_READY;
181 }
182 }
Vitaly Kuznetsov25ef06f2015-08-01 16:08:12 -0700183 kfree(smsg_out);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800184}
185
186/*
187 * Send a response back to the host.
188 */
189
190static void
191fcopy_respond_to_host(int error)
192{
193 struct icmsg_hdr *icmsghdr;
194 u32 buf_len;
195 struct vmbus_channel *channel;
196 u64 req_id;
197
198 /*
199 * Copy the global state for completing the transaction. Note that
200 * only one transaction can be active at a time. This is guaranteed
201 * by the file copy protocol implemented by the host. Furthermore,
202 * the "transaction active" state we maintain ensures that there can
203 * only be one active transaction at a time.
204 */
205
206 buf_len = fcopy_transaction.recv_len;
207 channel = fcopy_transaction.recv_channel;
208 req_id = fcopy_transaction.recv_req_id;
209
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800210 icmsghdr = (struct icmsg_hdr *)
211 &recv_buffer[sizeof(struct vmbuspipe_hdr)];
212
213 if (channel->onchannel_callback == NULL)
214 /*
215 * We have raced with util driver being unloaded;
216 * silently return.
217 */
218 return;
219
220 icmsghdr->status = error;
221 icmsghdr->icflags = ICMSGHDRFLAG_TRANSACTION | ICMSGHDRFLAG_RESPONSE;
222 vmbus_sendpacket(channel, recv_buffer, buf_len, req_id,
223 VM_PKT_DATA_INBAND, 0);
224}
225
226void hv_fcopy_onchannelcallback(void *context)
227{
228 struct vmbus_channel *channel = context;
229 u32 recvlen;
230 u64 requestid;
231 struct hv_fcopy_hdr *fcopy_msg;
232 struct icmsg_hdr *icmsghdr;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800233 int fcopy_srv_version;
234
Olaf Hering3cace4a2015-12-14 16:01:33 -0800235 if (fcopy_transaction.state > HVUTIL_READY)
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800236 return;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800237
Andres Beltran06caa772020-11-09 11:07:04 +0100238 if (vmbus_recvpacket(channel, recv_buffer, HV_HYP_PAGE_SIZE * 2, &recvlen, &requestid)) {
239 pr_err_ratelimited("Fcopy request received. Could not read into recv buf\n");
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800240 return;
Andres Beltran06caa772020-11-09 11:07:04 +0100241 }
242
243 if (!recvlen)
244 return;
245
246 /* Ensure recvlen is big enough to read header data */
247 if (recvlen < ICMSG_HDR) {
248 pr_err_ratelimited("Fcopy request received. Packet length too small: %d\n",
249 recvlen);
250 return;
251 }
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800252
253 icmsghdr = (struct icmsg_hdr *)&recv_buffer[
254 sizeof(struct vmbuspipe_hdr)];
Andres Beltran06caa772020-11-09 11:07:04 +0100255
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800256 if (icmsghdr->icmsgtype == ICMSGTYPE_NEGOTIATE) {
Andres Beltran06caa772020-11-09 11:07:04 +0100257 if (vmbus_prep_negotiate_resp(icmsghdr,
258 recv_buffer, recvlen,
Alex Nga1656452017-01-28 12:37:17 -0700259 fw_versions, FW_VER_COUNT,
260 fcopy_versions, FCOPY_VER_COUNT,
Alex Ng1274a692017-01-28 12:37:18 -0700261 NULL, &fcopy_srv_version)) {
262
263 pr_info("FCopy IC version %d.%d\n",
264 fcopy_srv_version >> 16,
265 fcopy_srv_version & 0xFFFF);
266 }
Andres Beltran06caa772020-11-09 11:07:04 +0100267 } else if (icmsghdr->icmsgtype == ICMSGTYPE_FCOPY) {
268 /* Ensure recvlen is big enough to contain hv_fcopy_hdr */
269 if (recvlen < ICMSG_HDR + sizeof(struct hv_fcopy_hdr)) {
270 pr_err_ratelimited("Invalid Fcopy hdr. Packet length too small: %u\n",
271 recvlen);
272 return;
273 }
274 fcopy_msg = (struct hv_fcopy_hdr *)&recv_buffer[ICMSG_HDR];
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800275
276 /*
277 * Stash away this global state for completing the
278 * transaction; note transactions are serialized.
279 */
280
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800281 fcopy_transaction.recv_len = recvlen;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800282 fcopy_transaction.recv_req_id = requestid;
283 fcopy_transaction.fcopy_msg = fcopy_msg;
284
Vitaly Kuznetsov4c93ccc2015-04-11 18:07:49 -0700285 if (fcopy_transaction.state < HVUTIL_READY) {
286 /* Userspace is not registered yet */
287 fcopy_respond_to_host(HV_E_FAIL);
288 return;
289 }
290 fcopy_transaction.state = HVUTIL_HOSTMSG_RECEIVED;
291
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800292 /*
293 * Send the information to the user-level daemon.
294 */
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700295 schedule_work(&fcopy_send_work);
K. Y. Srinivasanc0b200c2015-12-14 16:01:32 -0800296 schedule_delayed_work(&fcopy_timeout_work,
297 HV_UTIL_TIMEOUT * HZ);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800298 return;
Andres Beltran06caa772020-11-09 11:07:04 +0100299 } else {
300 pr_err_ratelimited("Fcopy request received. Invalid msg type: %d\n",
301 icmsghdr->icmsgtype);
302 return;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800303 }
304 icmsghdr->icflags = ICMSGHDRFLAG_TRANSACTION | ICMSGHDRFLAG_RESPONSE;
305 vmbus_sendpacket(channel, recv_buffer, recvlen, requestid,
306 VM_PKT_DATA_INBAND, 0);
307}
308
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700309/* Callback when data is received from userspace */
310static int fcopy_on_msg(void *msg, int len)
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800311{
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700312 int *val = (int *)msg;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800313
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700314 if (len != sizeof(int))
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800315 return -EINVAL;
316
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700317 if (fcopy_transaction.state == HVUTIL_DEVICE_INIT)
318 return fcopy_handle_handshake(*val);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800319
Vitaly Kuznetsov4c93ccc2015-04-11 18:07:49 -0700320 if (fcopy_transaction.state != HVUTIL_USERSPACE_REQ)
321 return -EINVAL;
322
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800323 /*
324 * Complete the transaction by forwarding the result
325 * to the host. But first, cancel the timeout.
326 */
Vitaly Kuznetsov4c93ccc2015-04-11 18:07:49 -0700327 if (cancel_delayed_work_sync(&fcopy_timeout_work)) {
328 fcopy_transaction.state = HVUTIL_USERSPACE_RECV;
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700329 fcopy_respond_to_host(*val);
Olaf Hering3cace4a2015-12-14 16:01:33 -0800330 hv_poll_channel(fcopy_transaction.recv_channel,
331 fcopy_poll_wrapper);
Vitaly Kuznetsov242f3122015-04-11 18:07:42 -0700332 }
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800333
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800334 return 0;
335}
336
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700337static void fcopy_on_reset(void)
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800338{
339 /*
340 * The daemon has exited; reset the state.
341 */
Vitaly Kuznetsov4c93ccc2015-04-11 18:07:49 -0700342 fcopy_transaction.state = HVUTIL_DEVICE_INIT;
Dexuan Cuid9b16522015-01-14 01:55:10 -0800343
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700344 if (cancel_delayed_work_sync(&fcopy_timeout_work))
Dexuan Cuid9b16522015-01-14 01:55:10 -0800345 fcopy_respond_to_host(HV_E_FAIL);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800346}
347
348int hv_fcopy_init(struct hv_util_service *srv)
349{
350 recv_buffer = srv->recv_buffer;
K. Y. Srinivasanb9830d12016-02-26 15:13:19 -0800351 fcopy_transaction.recv_channel = srv->channel;
Andres Beltranadae1e92021-04-08 18:14:39 +0200352 fcopy_transaction.recv_channel->max_pkt_size = HV_HYP_PAGE_SIZE * 2;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800353
354 /*
355 * When this driver loads, the user level daemon that
356 * processes the host requests may not yet be running.
357 * Defer processing channel callbacks until the daemon
358 * has registered.
359 */
Vitaly Kuznetsov4c93ccc2015-04-11 18:07:49 -0700360 fcopy_transaction.state = HVUTIL_DEVICE_INIT;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800361
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700362 hvt = hvutil_transport_init(fcopy_devname, 0, 0,
363 fcopy_on_msg, fcopy_on_reset);
364 if (!hvt)
365 return -EFAULT;
366
367 return 0;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800368}
369
Dexuan Cui54e19d32020-01-25 21:49:44 -0800370static void hv_fcopy_cancel_work(void)
371{
372 cancel_delayed_work_sync(&fcopy_timeout_work);
373 cancel_work_sync(&fcopy_send_work);
374}
375
376int hv_fcopy_pre_suspend(void)
377{
378 struct vmbus_channel *channel = fcopy_transaction.recv_channel;
379 struct hv_fcopy_hdr *fcopy_msg;
380
381 /*
382 * Fake a CANCEL_FCOPY message for the user space daemon in case the
383 * daemon is in the middle of copying some file. It doesn't matter if
384 * there is already a message pending to be delivered to the user
385 * space since we force fcopy_transaction.state to be HVUTIL_READY, so
386 * the user space daemon's write() will fail with EINVAL (see
387 * fcopy_on_msg()), and the daemon will reset the device by closing
388 * and re-opening it.
389 */
390 fcopy_msg = kzalloc(sizeof(*fcopy_msg), GFP_KERNEL);
391 if (!fcopy_msg)
392 return -ENOMEM;
393
394 tasklet_disable(&channel->callback_event);
395
396 fcopy_msg->operation = CANCEL_FCOPY;
397
398 hv_fcopy_cancel_work();
399
400 /* We don't care about the return value. */
401 hvutil_transport_send(hvt, fcopy_msg, sizeof(*fcopy_msg), NULL);
402
403 kfree(fcopy_msg);
404
405 fcopy_transaction.state = HVUTIL_READY;
406
407 /* tasklet_enable() will be called in hv_fcopy_pre_resume(). */
408 return 0;
409}
410
411int hv_fcopy_pre_resume(void)
412{
413 struct vmbus_channel *channel = fcopy_transaction.recv_channel;
414
415 tasklet_enable(&channel->callback_event);
416
417 return 0;
418}
419
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800420void hv_fcopy_deinit(void)
421{
Vitaly Kuznetsov4c93ccc2015-04-11 18:07:49 -0700422 fcopy_transaction.state = HVUTIL_DEVICE_DYING;
Dexuan Cui54e19d32020-01-25 21:49:44 -0800423
424 hv_fcopy_cancel_work();
425
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700426 hvutil_transport_destroy(hvt);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800427}