blob: 7e30ae0635cc271f69011662be6c9b5ba8cee6f2 [file] [log] [blame]
Thomas Gleixner43aa3132019-05-29 07:17:54 -07001// SPDX-License-Identifier: GPL-2.0-only
K. Y. Srinivasan013254762014-02-16 11:34:30 -08002/*
3 * An implementation of file copy service.
4 *
5 * Copyright (C) 2014, Microsoft, Inc.
6 *
7 * Author : K. Y. Srinivasan <ksrinivasan@novell.com>
K. Y. Srinivasan013254762014-02-16 11:34:30 -08008 */
9
10#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
11
K. Y. Srinivasan013254762014-02-16 11:34:30 -080012#include <linux/nls.h>
13#include <linux/workqueue.h>
K. Y. Srinivasan013254762014-02-16 11:34:30 -080014#include <linux/hyperv.h>
15#include <linux/sched.h>
K. Y. Srinivasan013254762014-02-16 11:34:30 -080016
17#include "hyperv_vmbus.h"
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -070018#include "hv_utils_transport.h"
K. Y. Srinivasan013254762014-02-16 11:34:30 -080019
20#define WIN8_SRV_MAJOR 1
21#define WIN8_SRV_MINOR 1
22#define WIN8_SRV_VERSION (WIN8_SRV_MAJOR << 16 | WIN8_SRV_MINOR)
23
Alex Nga1656452017-01-28 12:37:17 -070024#define FCOPY_VER_COUNT 1
25static const int fcopy_versions[] = {
26 WIN8_SRV_VERSION
27};
28
29#define FW_VER_COUNT 1
30static const int fw_versions[] = {
31 UTIL_FW_VERSION
32};
33
K. Y. Srinivasan013254762014-02-16 11:34:30 -080034/*
35 * Global state maintained for transaction that is being processed.
36 * For a class of integration services, including the "file copy service",
37 * the specified protocol is a "request/response" protocol which means that
38 * there can only be single outstanding transaction from the host at any
39 * given point in time. We use this to simplify memory management in this
40 * driver - we cache and process only one message at a time.
41 *
42 * While the request/response protocol is guaranteed by the host, we further
43 * ensure this by serializing packet processing in this driver - we do not
44 * read additional packets from the VMBUs until the current packet is fully
45 * handled.
K. Y. Srinivasan013254762014-02-16 11:34:30 -080046 */
47
48static struct {
Vitaly Kuznetsov4c93ccc2015-04-11 18:07:49 -070049 int state; /* hvutil_device_state */
K. Y. Srinivasan013254762014-02-16 11:34:30 -080050 int recv_len; /* number of bytes received. */
51 struct hv_fcopy_hdr *fcopy_msg; /* current message */
K. Y. Srinivasan013254762014-02-16 11:34:30 -080052 struct vmbus_channel *recv_channel; /* chn we got the request */
53 u64 recv_req_id; /* request ID. */
K. Y. Srinivasan013254762014-02-16 11:34:30 -080054} fcopy_transaction;
55
K. Y. Srinivasan013254762014-02-16 11:34:30 -080056static void fcopy_respond_to_host(int error);
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -070057static void fcopy_send_data(struct work_struct *dummy);
Vitaly Kuznetsov1d072332015-04-11 18:07:45 -070058static void fcopy_timeout_func(struct work_struct *dummy);
59static DECLARE_DELAYED_WORK(fcopy_timeout_work, fcopy_timeout_func);
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -070060static DECLARE_WORK(fcopy_send_work, fcopy_send_data);
61static const char fcopy_devname[] = "vmbus/hv_fcopy";
K. Y. Srinivasan013254762014-02-16 11:34:30 -080062static u8 *recv_buffer;
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -070063static struct hvutil_transport *hvt;
Vitaly Kuznetsova4d1ee52015-04-11 18:07:58 -070064/*
65 * This state maintains the version number registered by the daemon.
66 */
67static int dm_reg_value;
K. Y. Srinivasan013254762014-02-16 11:34:30 -080068
Olaf Hering3cace4a2015-12-14 16:01:33 -080069static void fcopy_poll_wrapper(void *channel)
70{
71 /* Transaction is finished, reset the state here to avoid races. */
72 fcopy_transaction.state = HVUTIL_READY;
73 hv_fcopy_onchannelcallback(channel);
74}
75
Vitaly Kuznetsov1d072332015-04-11 18:07:45 -070076static void fcopy_timeout_func(struct work_struct *dummy)
K. Y. Srinivasan013254762014-02-16 11:34:30 -080077{
78 /*
79 * If the timer fires, the user-mode component has not responded;
80 * process the pending transaction.
81 */
82 fcopy_respond_to_host(HV_E_FAIL);
Olaf Hering3cace4a2015-12-14 16:01:33 -080083 hv_poll_channel(fcopy_transaction.recv_channel, fcopy_poll_wrapper);
K. Y. Srinivasan013254762014-02-16 11:34:30 -080084}
85
Vitaly Kuznetsove0fa3e52016-06-09 17:08:57 -070086static void fcopy_register_done(void)
87{
88 pr_debug("FCP: userspace daemon registered\n");
89 hv_poll_channel(fcopy_transaction.recv_channel, fcopy_poll_wrapper);
90}
91
K. Y. Srinivasan013254762014-02-16 11:34:30 -080092static int fcopy_handle_handshake(u32 version)
93{
Vitaly Kuznetsova4d1ee52015-04-11 18:07:58 -070094 u32 our_ver = FCOPY_CURRENT_VERSION;
95
K. Y. Srinivasan013254762014-02-16 11:34:30 -080096 switch (version) {
Vitaly Kuznetsova4d1ee52015-04-11 18:07:58 -070097 case FCOPY_VERSION_0:
98 /* Daemon doesn't expect us to reply */
99 dm_reg_value = version;
100 break;
101 case FCOPY_VERSION_1:
102 /* Daemon expects us to reply with our own version */
Vitaly Kuznetsove0fa3e52016-06-09 17:08:57 -0700103 if (hvutil_transport_send(hvt, &our_ver, sizeof(our_ver),
104 fcopy_register_done))
Vitaly Kuznetsova4d1ee52015-04-11 18:07:58 -0700105 return -EFAULT;
106 dm_reg_value = version;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800107 break;
108 default:
109 /*
110 * For now we will fail the registration.
111 * If and when we have multiple versions to
112 * deal with, we will be backward compatible.
113 * We will add this code when needed.
114 */
115 return -EINVAL;
116 }
Vitaly Kuznetsove0fa3e52016-06-09 17:08:57 -0700117 pr_debug("FCP: userspace daemon ver. %d connected\n", version);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800118 return 0;
119}
120
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700121static void fcopy_send_data(struct work_struct *dummy)
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800122{
Vitaly Kuznetsov25ef06f2015-08-01 16:08:12 -0700123 struct hv_start_fcopy *smsg_out = NULL;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800124 int operation = fcopy_transaction.fcopy_msg->operation;
125 struct hv_start_fcopy *smsg_in;
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700126 void *out_src;
127 int rc, out_len;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800128
129 /*
130 * The strings sent from the host are encoded in
131 * in utf16; convert it to utf8 strings.
132 * The host assures us that the utf16 strings will not exceed
133 * the max lengths specified. We will however, reserve room
134 * for the string terminating character - in the utf16s_utf8s()
135 * function we limit the size of the buffer where the converted
136 * string is placed to W_MAX_PATH -1 to guarantee
137 * that the strings can be properly terminated!
138 */
139
140 switch (operation) {
141 case START_FILE_COPY:
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700142 out_len = sizeof(struct hv_start_fcopy);
Vitaly Kuznetsov25ef06f2015-08-01 16:08:12 -0700143 smsg_out = kzalloc(sizeof(*smsg_out), GFP_KERNEL);
144 if (!smsg_out)
145 return;
146
147 smsg_out->hdr.operation = operation;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800148 smsg_in = (struct hv_start_fcopy *)fcopy_transaction.fcopy_msg;
149
150 utf16s_to_utf8s((wchar_t *)smsg_in->file_name, W_MAX_PATH,
151 UTF16_LITTLE_ENDIAN,
Vitaly Kuznetsov25ef06f2015-08-01 16:08:12 -0700152 (__u8 *)&smsg_out->file_name, W_MAX_PATH - 1);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800153
154 utf16s_to_utf8s((wchar_t *)smsg_in->path_name, W_MAX_PATH,
155 UTF16_LITTLE_ENDIAN,
Vitaly Kuznetsov25ef06f2015-08-01 16:08:12 -0700156 (__u8 *)&smsg_out->path_name, W_MAX_PATH - 1);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800157
Vitaly Kuznetsov25ef06f2015-08-01 16:08:12 -0700158 smsg_out->copy_flags = smsg_in->copy_flags;
159 smsg_out->file_size = smsg_in->file_size;
160 out_src = smsg_out;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800161 break;
162
Olaf Hering549e6582017-09-21 23:41:48 -0700163 case WRITE_TO_FILE:
164 out_src = fcopy_transaction.fcopy_msg;
165 out_len = sizeof(struct hv_do_fcopy);
166 break;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800167 default:
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700168 out_src = fcopy_transaction.fcopy_msg;
169 out_len = fcopy_transaction.recv_len;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800170 break;
171 }
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700172
173 fcopy_transaction.state = HVUTIL_USERSPACE_REQ;
Vitaly Kuznetsove0fa3e52016-06-09 17:08:57 -0700174 rc = hvutil_transport_send(hvt, out_src, out_len, NULL);
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700175 if (rc) {
176 pr_debug("FCP: failed to communicate to the daemon: %d\n", rc);
177 if (cancel_delayed_work_sync(&fcopy_timeout_work)) {
178 fcopy_respond_to_host(HV_E_FAIL);
179 fcopy_transaction.state = HVUTIL_READY;
180 }
181 }
Vitaly Kuznetsov25ef06f2015-08-01 16:08:12 -0700182 kfree(smsg_out);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800183}
184
185/*
186 * Send a response back to the host.
187 */
188
189static void
190fcopy_respond_to_host(int error)
191{
192 struct icmsg_hdr *icmsghdr;
193 u32 buf_len;
194 struct vmbus_channel *channel;
195 u64 req_id;
196
197 /*
198 * Copy the global state for completing the transaction. Note that
199 * only one transaction can be active at a time. This is guaranteed
200 * by the file copy protocol implemented by the host. Furthermore,
201 * the "transaction active" state we maintain ensures that there can
202 * only be one active transaction at a time.
203 */
204
205 buf_len = fcopy_transaction.recv_len;
206 channel = fcopy_transaction.recv_channel;
207 req_id = fcopy_transaction.recv_req_id;
208
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800209 icmsghdr = (struct icmsg_hdr *)
210 &recv_buffer[sizeof(struct vmbuspipe_hdr)];
211
212 if (channel->onchannel_callback == NULL)
213 /*
214 * We have raced with util driver being unloaded;
215 * silently return.
216 */
217 return;
218
219 icmsghdr->status = error;
220 icmsghdr->icflags = ICMSGHDRFLAG_TRANSACTION | ICMSGHDRFLAG_RESPONSE;
221 vmbus_sendpacket(channel, recv_buffer, buf_len, req_id,
222 VM_PKT_DATA_INBAND, 0);
223}
224
225void hv_fcopy_onchannelcallback(void *context)
226{
227 struct vmbus_channel *channel = context;
228 u32 recvlen;
229 u64 requestid;
230 struct hv_fcopy_hdr *fcopy_msg;
231 struct icmsg_hdr *icmsghdr;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800232 int fcopy_srv_version;
233
Olaf Hering3cace4a2015-12-14 16:01:33 -0800234 if (fcopy_transaction.state > HVUTIL_READY)
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800235 return;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800236
237 vmbus_recvpacket(channel, recv_buffer, PAGE_SIZE * 2, &recvlen,
238 &requestid);
239 if (recvlen <= 0)
240 return;
241
242 icmsghdr = (struct icmsg_hdr *)&recv_buffer[
243 sizeof(struct vmbuspipe_hdr)];
244 if (icmsghdr->icmsgtype == ICMSGTYPE_NEGOTIATE) {
Alex Ng1274a692017-01-28 12:37:18 -0700245 if (vmbus_prep_negotiate_resp(icmsghdr, recv_buffer,
Alex Nga1656452017-01-28 12:37:17 -0700246 fw_versions, FW_VER_COUNT,
247 fcopy_versions, FCOPY_VER_COUNT,
Alex Ng1274a692017-01-28 12:37:18 -0700248 NULL, &fcopy_srv_version)) {
249
250 pr_info("FCopy IC version %d.%d\n",
251 fcopy_srv_version >> 16,
252 fcopy_srv_version & 0xFFFF);
253 }
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800254 } else {
255 fcopy_msg = (struct hv_fcopy_hdr *)&recv_buffer[
256 sizeof(struct vmbuspipe_hdr) +
257 sizeof(struct icmsg_hdr)];
258
259 /*
260 * Stash away this global state for completing the
261 * transaction; note transactions are serialized.
262 */
263
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800264 fcopy_transaction.recv_len = recvlen;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800265 fcopy_transaction.recv_req_id = requestid;
266 fcopy_transaction.fcopy_msg = fcopy_msg;
267
Vitaly Kuznetsov4c93ccc2015-04-11 18:07:49 -0700268 if (fcopy_transaction.state < HVUTIL_READY) {
269 /* Userspace is not registered yet */
270 fcopy_respond_to_host(HV_E_FAIL);
271 return;
272 }
273 fcopy_transaction.state = HVUTIL_HOSTMSG_RECEIVED;
274
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800275 /*
276 * Send the information to the user-level daemon.
277 */
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700278 schedule_work(&fcopy_send_work);
K. Y. Srinivasanc0b200c2015-12-14 16:01:32 -0800279 schedule_delayed_work(&fcopy_timeout_work,
280 HV_UTIL_TIMEOUT * HZ);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800281 return;
282 }
283 icmsghdr->icflags = ICMSGHDRFLAG_TRANSACTION | ICMSGHDRFLAG_RESPONSE;
284 vmbus_sendpacket(channel, recv_buffer, recvlen, requestid,
285 VM_PKT_DATA_INBAND, 0);
286}
287
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700288/* Callback when data is received from userspace */
289static int fcopy_on_msg(void *msg, int len)
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800290{
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700291 int *val = (int *)msg;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800292
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700293 if (len != sizeof(int))
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800294 return -EINVAL;
295
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700296 if (fcopy_transaction.state == HVUTIL_DEVICE_INIT)
297 return fcopy_handle_handshake(*val);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800298
Vitaly Kuznetsov4c93ccc2015-04-11 18:07:49 -0700299 if (fcopy_transaction.state != HVUTIL_USERSPACE_REQ)
300 return -EINVAL;
301
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800302 /*
303 * Complete the transaction by forwarding the result
304 * to the host. But first, cancel the timeout.
305 */
Vitaly Kuznetsov4c93ccc2015-04-11 18:07:49 -0700306 if (cancel_delayed_work_sync(&fcopy_timeout_work)) {
307 fcopy_transaction.state = HVUTIL_USERSPACE_RECV;
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700308 fcopy_respond_to_host(*val);
Olaf Hering3cace4a2015-12-14 16:01:33 -0800309 hv_poll_channel(fcopy_transaction.recv_channel,
310 fcopy_poll_wrapper);
Vitaly Kuznetsov242f3122015-04-11 18:07:42 -0700311 }
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800312
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800313 return 0;
314}
315
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700316static void fcopy_on_reset(void)
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800317{
318 /*
319 * The daemon has exited; reset the state.
320 */
Vitaly Kuznetsov4c93ccc2015-04-11 18:07:49 -0700321 fcopy_transaction.state = HVUTIL_DEVICE_INIT;
Dexuan Cuid9b16522015-01-14 01:55:10 -0800322
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700323 if (cancel_delayed_work_sync(&fcopy_timeout_work))
Dexuan Cuid9b16522015-01-14 01:55:10 -0800324 fcopy_respond_to_host(HV_E_FAIL);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800325}
326
327int hv_fcopy_init(struct hv_util_service *srv)
328{
329 recv_buffer = srv->recv_buffer;
K. Y. Srinivasanb9830d12016-02-26 15:13:19 -0800330 fcopy_transaction.recv_channel = srv->channel;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800331
332 /*
333 * When this driver loads, the user level daemon that
334 * processes the host requests may not yet be running.
335 * Defer processing channel callbacks until the daemon
336 * has registered.
337 */
Vitaly Kuznetsov4c93ccc2015-04-11 18:07:49 -0700338 fcopy_transaction.state = HVUTIL_DEVICE_INIT;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800339
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700340 hvt = hvutil_transport_init(fcopy_devname, 0, 0,
341 fcopy_on_msg, fcopy_on_reset);
342 if (!hvt)
343 return -EFAULT;
344
345 return 0;
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800346}
347
348void hv_fcopy_deinit(void)
349{
Vitaly Kuznetsov4c93ccc2015-04-11 18:07:49 -0700350 fcopy_transaction.state = HVUTIL_DEVICE_DYING;
Vitaly Kuznetsov1d072332015-04-11 18:07:45 -0700351 cancel_delayed_work_sync(&fcopy_timeout_work);
Vitaly Kuznetsovc7e490f2015-04-11 18:07:53 -0700352 hvutil_transport_destroy(hvt);
K. Y. Srinivasan013254762014-02-16 11:34:30 -0800353}