mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-11-01 17:08:10 +00:00
ea44d19076
There are bugs on vhci with usb 3.0 storage device. In USB, each SG list entry buffer should be divisible by the bulk max packet size. But with native SG support, this problem doesn't matter because the SG buffer is treated as contiguous buffer. But without native SG support, USB storage driver breaks SG list into several URBs and the error occurs because of a buffer size of URB that cannot be divided by the bulk max packet size. The error situation is as follows. When USB Storage driver requests 31.5 KB data and has SG list which has 3584 bytes buffer followed by 7 4096 bytes buffer for some reason. USB Storage driver splits this SG list into several URBs because VHCI doesn't support SG and sends them separately. So the first URB buffer size is 3584 bytes. When receiving data from device, USB 3.0 device sends data packet of 1024 bytes size because the max packet size of BULK pipe is 1024 bytes. So device sends 4096 bytes. But the first URB buffer has only 3584 bytes buffer size. So host controller terminates the transfer even though there is more data to receive. So, vhci needs to support SG transfer to prevent this error. In this patch, vhci supports SG regardless of whether the server's host controller supports SG or not, because stub driver splits SG list into several URBs if the server's host controller doesn't support SG. To support SG, vhci sets URB_DMA_MAP_SG flag in urb->transfer_flags if URB has SG list and this flag will tell stub driver to use SG list. After receiving urb from stub driver, vhci clear URB_DMA_MAP_SG flag to avoid unnecessary DMA unmapping in HCD. vhci sends each SG list entry to stub driver. Then, stub driver sees the total length of the buffer and allocates SG table and pages according to the total buffer length calling sgl_alloc(). After stub driver receives completed URB, it again sends each SG list entry to vhci. If the server's host controller doesn't support SG, stub driver breaks a single SG request into several URBs and submits them to the server's host controller. When all the split URBs are completed, stub driver reassembles the URBs into a single return command and sends it to vhci. Moreover, in the situation where vhci supports SG, but stub driver does not, or vice versa, usbip works normally. Because there is no protocol modification, there is no problem in communication between server and client even if the one has a kernel without SG support. In the case of vhci supports SG and stub driver doesn't, because vhci sends only the total length of the buffer to stub driver as it did before the patch applied, stub driver only needs to allocate the required length of buffers using only kmalloc() regardless of whether vhci supports SG or not. But stub driver has to allocate buffer with kmalloc() as much as the total length of SG buffer which is quite huge when vhci sends SG request, so it has overhead in buffer allocation in this situation. If stub driver needs to send data buffer to vhci because of IN pipe, stub driver also sends only total length of buffer as metadata and then sends real data as vhci does. Then vhci receive data from stub driver and store it to the corresponding buffer of SG list entry. And for the case of stub driver supports SG and vhci doesn't, since the USB storage driver checks that vhci doesn't support SG and sends the request to stub driver by splitting the SG list into multiple URBs, stub driver allocates a buffer for each URB with kmalloc() as it did before this patch. * Test environment Test uses two difference machines and two different kernel version to make mismatch situation between the client and the server where vhci supports SG, but stub driver does not, or vice versa. All tests are conducted in both full SG support that both vhci and stub support SG and half SG support that is the mismatch situation. Test kernel version is 5.3-rc6 with commit "usb: add a HCD_DMA flag instead of guestimating DMA capabilities" to avoid unnecessary DMA mapping and unmapping. - Test kernel version - 5.3-rc6 with SG support - 5.1.20-200.fc29.x86_64 without SG support * SG support test - Test devices - Super-speed storage device - SanDisk Ultra USB 3.0 - High-speed storage device - SMI corporation USB 2.0 flash drive - Test description Test read and write operation of mass storage device that uses the BULK transfer. In test, the client reads and writes files whose size is over 1G and it works normally. * Regression test - Test devices - Super-speed device - Logitech Brio webcam - High-speed device - Logitech C920 HD Pro webcam - Full-speed device - Logitech bluetooth mouse - Britz BR-Orion speaker - Low-speed device - Logitech wired mouse - Test description Moving and click test for mouse. To test the webcam, use gnome-cheese. To test the speaker, play music and video on the client. All works normally. * VUDC compatibility test VUDC also works well with this patch. Tests are done with two USB gadget created by CONFIGFS USB gadget. Both use the BULK pipe. 1. Serial gadget 2. Mass storage gadget - Serial gadget test Serial gadget on the host sends and receives data using cat command on the /dev/ttyGS<N>. The client uses minicom to communicate with the serial gadget. - Mass storage gadget test After connecting the gadget with vhci, use "dd" to test read and write operation on the client side. Read - dd if=/dev/sd<N> iflag=direct of=/dev/null bs=1G count=1 Write - dd if=<my file path> iflag=direct of=/dev/sd<N> bs=1G count=1 Signed-off-by: Suwan Kim <suwan.kim027@gmail.com> Acked-by: Shuah khan <skhan@linuxfoundation.org> Link: https://lore.kernel.org/r/20190828032741.12234-1-suwan.kim027@gmail.com Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
432 lines
8.9 KiB
C
432 lines
8.9 KiB
C
// SPDX-License-Identifier: GPL-2.0+
|
|
/*
|
|
* Copyright (C) 2003-2008 Takahiro Hirofuchi
|
|
*/
|
|
|
|
#include <linux/string.h>
|
|
#include <linux/module.h>
|
|
#include <linux/device.h>
|
|
#include <linux/scatterlist.h>
|
|
|
|
#include "usbip_common.h"
|
|
#include "stub.h"
|
|
|
|
#define DRIVER_AUTHOR "Takahiro Hirofuchi"
|
|
#define DRIVER_DESC "USB/IP Host Driver"
|
|
|
|
struct kmem_cache *stub_priv_cache;
|
|
|
|
/*
|
|
* busid_tables defines matching busids that usbip can grab. A user can change
|
|
* dynamically what device is locally used and what device is exported to a
|
|
* remote host.
|
|
*/
|
|
#define MAX_BUSID 16
|
|
static struct bus_id_priv busid_table[MAX_BUSID];
|
|
static spinlock_t busid_table_lock;
|
|
|
|
static void init_busid_table(void)
|
|
{
|
|
int i;
|
|
|
|
/*
|
|
* This also sets the bus_table[i].status to
|
|
* STUB_BUSID_OTHER, which is 0.
|
|
*/
|
|
memset(busid_table, 0, sizeof(busid_table));
|
|
|
|
spin_lock_init(&busid_table_lock);
|
|
|
|
for (i = 0; i < MAX_BUSID; i++)
|
|
spin_lock_init(&busid_table[i].busid_lock);
|
|
}
|
|
|
|
/*
|
|
* Find the index of the busid by name.
|
|
* Must be called with busid_table_lock held.
|
|
*/
|
|
static int get_busid_idx(const char *busid)
|
|
{
|
|
int i;
|
|
int idx = -1;
|
|
|
|
for (i = 0; i < MAX_BUSID; i++) {
|
|
spin_lock(&busid_table[i].busid_lock);
|
|
if (busid_table[i].name[0])
|
|
if (!strncmp(busid_table[i].name, busid, BUSID_SIZE)) {
|
|
idx = i;
|
|
spin_unlock(&busid_table[i].busid_lock);
|
|
break;
|
|
}
|
|
spin_unlock(&busid_table[i].busid_lock);
|
|
}
|
|
return idx;
|
|
}
|
|
|
|
/* Returns holding busid_lock. Should call put_busid_priv() to unlock */
|
|
struct bus_id_priv *get_busid_priv(const char *busid)
|
|
{
|
|
int idx;
|
|
struct bus_id_priv *bid = NULL;
|
|
|
|
spin_lock(&busid_table_lock);
|
|
idx = get_busid_idx(busid);
|
|
if (idx >= 0) {
|
|
bid = &(busid_table[idx]);
|
|
/* get busid_lock before returning */
|
|
spin_lock(&bid->busid_lock);
|
|
}
|
|
spin_unlock(&busid_table_lock);
|
|
|
|
return bid;
|
|
}
|
|
|
|
void put_busid_priv(struct bus_id_priv *bid)
|
|
{
|
|
if (bid)
|
|
spin_unlock(&bid->busid_lock);
|
|
}
|
|
|
|
static int add_match_busid(char *busid)
|
|
{
|
|
int i;
|
|
int ret = -1;
|
|
|
|
spin_lock(&busid_table_lock);
|
|
/* already registered? */
|
|
if (get_busid_idx(busid) >= 0) {
|
|
ret = 0;
|
|
goto out;
|
|
}
|
|
|
|
for (i = 0; i < MAX_BUSID; i++) {
|
|
spin_lock(&busid_table[i].busid_lock);
|
|
if (!busid_table[i].name[0]) {
|
|
strlcpy(busid_table[i].name, busid, BUSID_SIZE);
|
|
if ((busid_table[i].status != STUB_BUSID_ALLOC) &&
|
|
(busid_table[i].status != STUB_BUSID_REMOV))
|
|
busid_table[i].status = STUB_BUSID_ADDED;
|
|
ret = 0;
|
|
spin_unlock(&busid_table[i].busid_lock);
|
|
break;
|
|
}
|
|
spin_unlock(&busid_table[i].busid_lock);
|
|
}
|
|
|
|
out:
|
|
spin_unlock(&busid_table_lock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
int del_match_busid(char *busid)
|
|
{
|
|
int idx;
|
|
int ret = -1;
|
|
|
|
spin_lock(&busid_table_lock);
|
|
idx = get_busid_idx(busid);
|
|
if (idx < 0)
|
|
goto out;
|
|
|
|
/* found */
|
|
ret = 0;
|
|
|
|
spin_lock(&busid_table[idx].busid_lock);
|
|
|
|
if (busid_table[idx].status == STUB_BUSID_OTHER)
|
|
memset(busid_table[idx].name, 0, BUSID_SIZE);
|
|
|
|
if ((busid_table[idx].status != STUB_BUSID_OTHER) &&
|
|
(busid_table[idx].status != STUB_BUSID_ADDED))
|
|
busid_table[idx].status = STUB_BUSID_REMOV;
|
|
|
|
spin_unlock(&busid_table[idx].busid_lock);
|
|
out:
|
|
spin_unlock(&busid_table_lock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t match_busid_show(struct device_driver *drv, char *buf)
|
|
{
|
|
int i;
|
|
char *out = buf;
|
|
|
|
spin_lock(&busid_table_lock);
|
|
for (i = 0; i < MAX_BUSID; i++) {
|
|
spin_lock(&busid_table[i].busid_lock);
|
|
if (busid_table[i].name[0])
|
|
out += sprintf(out, "%s ", busid_table[i].name);
|
|
spin_unlock(&busid_table[i].busid_lock);
|
|
}
|
|
spin_unlock(&busid_table_lock);
|
|
out += sprintf(out, "\n");
|
|
|
|
return out - buf;
|
|
}
|
|
|
|
static ssize_t match_busid_store(struct device_driver *dev, const char *buf,
|
|
size_t count)
|
|
{
|
|
int len;
|
|
char busid[BUSID_SIZE];
|
|
|
|
if (count < 5)
|
|
return -EINVAL;
|
|
|
|
/* busid needs to include \0 termination */
|
|
len = strlcpy(busid, buf + 4, BUSID_SIZE);
|
|
if (sizeof(busid) <= len)
|
|
return -EINVAL;
|
|
|
|
if (!strncmp(buf, "add ", 4)) {
|
|
if (add_match_busid(busid) < 0)
|
|
return -ENOMEM;
|
|
|
|
pr_debug("add busid %s\n", busid);
|
|
return count;
|
|
}
|
|
|
|
if (!strncmp(buf, "del ", 4)) {
|
|
if (del_match_busid(busid) < 0)
|
|
return -ENODEV;
|
|
|
|
pr_debug("del busid %s\n", busid);
|
|
return count;
|
|
}
|
|
|
|
return -EINVAL;
|
|
}
|
|
static DRIVER_ATTR_RW(match_busid);
|
|
|
|
static int do_rebind(char *busid, struct bus_id_priv *busid_priv)
|
|
{
|
|
int ret = 0;
|
|
|
|
/* device_attach() callers should hold parent lock for USB */
|
|
if (busid_priv->udev->dev.parent)
|
|
device_lock(busid_priv->udev->dev.parent);
|
|
ret = device_attach(&busid_priv->udev->dev);
|
|
if (busid_priv->udev->dev.parent)
|
|
device_unlock(busid_priv->udev->dev.parent);
|
|
if (ret < 0)
|
|
dev_err(&busid_priv->udev->dev, "rebind failed\n");
|
|
return ret;
|
|
}
|
|
|
|
static void stub_device_rebind(void)
|
|
{
|
|
#if IS_MODULE(CONFIG_USBIP_HOST)
|
|
struct bus_id_priv *busid_priv;
|
|
int i;
|
|
|
|
/* update status to STUB_BUSID_OTHER so probe ignores the device */
|
|
spin_lock(&busid_table_lock);
|
|
for (i = 0; i < MAX_BUSID; i++) {
|
|
if (busid_table[i].name[0] &&
|
|
busid_table[i].shutdown_busid) {
|
|
busid_priv = &(busid_table[i]);
|
|
busid_priv->status = STUB_BUSID_OTHER;
|
|
}
|
|
}
|
|
spin_unlock(&busid_table_lock);
|
|
|
|
/* now run rebind - no need to hold locks. driver files are removed */
|
|
for (i = 0; i < MAX_BUSID; i++) {
|
|
if (busid_table[i].name[0] &&
|
|
busid_table[i].shutdown_busid) {
|
|
busid_priv = &(busid_table[i]);
|
|
do_rebind(busid_table[i].name, busid_priv);
|
|
}
|
|
}
|
|
#endif
|
|
}
|
|
|
|
static ssize_t rebind_store(struct device_driver *dev, const char *buf,
|
|
size_t count)
|
|
{
|
|
int ret;
|
|
int len;
|
|
struct bus_id_priv *bid;
|
|
|
|
/* buf length should be less that BUSID_SIZE */
|
|
len = strnlen(buf, BUSID_SIZE);
|
|
|
|
if (!(len < BUSID_SIZE))
|
|
return -EINVAL;
|
|
|
|
bid = get_busid_priv(buf);
|
|
if (!bid)
|
|
return -ENODEV;
|
|
|
|
/* mark the device for deletion so probe ignores it during rescan */
|
|
bid->status = STUB_BUSID_OTHER;
|
|
/* release the busid lock */
|
|
put_busid_priv(bid);
|
|
|
|
ret = do_rebind((char *) buf, bid);
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
/* delete device from busid_table */
|
|
del_match_busid((char *) buf);
|
|
|
|
return count;
|
|
}
|
|
|
|
static DRIVER_ATTR_WO(rebind);
|
|
|
|
static struct stub_priv *stub_priv_pop_from_listhead(struct list_head *listhead)
|
|
{
|
|
struct stub_priv *priv, *tmp;
|
|
|
|
list_for_each_entry_safe(priv, tmp, listhead, list) {
|
|
list_del_init(&priv->list);
|
|
return priv;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
void stub_free_priv_and_urb(struct stub_priv *priv)
|
|
{
|
|
struct urb *urb;
|
|
int i;
|
|
|
|
for (i = 0; i < priv->num_urbs; i++) {
|
|
urb = priv->urbs[i];
|
|
|
|
if (!urb)
|
|
return;
|
|
|
|
kfree(urb->setup_packet);
|
|
urb->setup_packet = NULL;
|
|
|
|
|
|
if (urb->transfer_buffer && !priv->sgl) {
|
|
kfree(urb->transfer_buffer);
|
|
urb->transfer_buffer = NULL;
|
|
}
|
|
|
|
if (urb->num_sgs) {
|
|
sgl_free(urb->sg);
|
|
urb->sg = NULL;
|
|
urb->num_sgs = 0;
|
|
}
|
|
|
|
usb_free_urb(urb);
|
|
}
|
|
if (!list_empty(&priv->list))
|
|
list_del(&priv->list);
|
|
if (priv->sgl)
|
|
sgl_free(priv->sgl);
|
|
kfree(priv->urbs);
|
|
kmem_cache_free(stub_priv_cache, priv);
|
|
}
|
|
|
|
static struct stub_priv *stub_priv_pop(struct stub_device *sdev)
|
|
{
|
|
unsigned long flags;
|
|
struct stub_priv *priv;
|
|
|
|
spin_lock_irqsave(&sdev->priv_lock, flags);
|
|
|
|
priv = stub_priv_pop_from_listhead(&sdev->priv_init);
|
|
if (priv)
|
|
goto done;
|
|
|
|
priv = stub_priv_pop_from_listhead(&sdev->priv_tx);
|
|
if (priv)
|
|
goto done;
|
|
|
|
priv = stub_priv_pop_from_listhead(&sdev->priv_free);
|
|
|
|
done:
|
|
spin_unlock_irqrestore(&sdev->priv_lock, flags);
|
|
|
|
return priv;
|
|
}
|
|
|
|
void stub_device_cleanup_urbs(struct stub_device *sdev)
|
|
{
|
|
struct stub_priv *priv;
|
|
int i;
|
|
|
|
dev_dbg(&sdev->udev->dev, "Stub device cleaning up urbs\n");
|
|
|
|
while ((priv = stub_priv_pop(sdev))) {
|
|
for (i = 0; i < priv->num_urbs; i++)
|
|
usb_kill_urb(priv->urbs[i]);
|
|
|
|
stub_free_priv_and_urb(priv);
|
|
}
|
|
}
|
|
|
|
static int __init usbip_host_init(void)
|
|
{
|
|
int ret;
|
|
|
|
init_busid_table();
|
|
|
|
stub_priv_cache = KMEM_CACHE(stub_priv, SLAB_HWCACHE_ALIGN);
|
|
if (!stub_priv_cache) {
|
|
pr_err("kmem_cache_create failed\n");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
ret = usb_register_device_driver(&stub_driver, THIS_MODULE);
|
|
if (ret) {
|
|
pr_err("usb_register failed %d\n", ret);
|
|
goto err_usb_register;
|
|
}
|
|
|
|
ret = driver_create_file(&stub_driver.drvwrap.driver,
|
|
&driver_attr_match_busid);
|
|
if (ret) {
|
|
pr_err("driver_create_file failed\n");
|
|
goto err_create_file;
|
|
}
|
|
|
|
ret = driver_create_file(&stub_driver.drvwrap.driver,
|
|
&driver_attr_rebind);
|
|
if (ret) {
|
|
pr_err("driver_create_file failed\n");
|
|
goto err_create_file;
|
|
}
|
|
|
|
return ret;
|
|
|
|
err_create_file:
|
|
usb_deregister_device_driver(&stub_driver);
|
|
err_usb_register:
|
|
kmem_cache_destroy(stub_priv_cache);
|
|
return ret;
|
|
}
|
|
|
|
static void __exit usbip_host_exit(void)
|
|
{
|
|
driver_remove_file(&stub_driver.drvwrap.driver,
|
|
&driver_attr_match_busid);
|
|
|
|
driver_remove_file(&stub_driver.drvwrap.driver,
|
|
&driver_attr_rebind);
|
|
|
|
/*
|
|
* deregister() calls stub_disconnect() for all devices. Device
|
|
* specific data is cleared in stub_disconnect().
|
|
*/
|
|
usb_deregister_device_driver(&stub_driver);
|
|
|
|
/* initiate scan to attach devices */
|
|
stub_device_rebind();
|
|
|
|
kmem_cache_destroy(stub_priv_cache);
|
|
}
|
|
|
|
module_init(usbip_host_init);
|
|
module_exit(usbip_host_exit);
|
|
|
|
MODULE_AUTHOR(DRIVER_AUTHOR);
|
|
MODULE_DESCRIPTION(DRIVER_DESC);
|
|
MODULE_LICENSE("GPL");
|