cregit-Linux how code gets into the kernel

Release 4.7 drivers/input/serio/hyperv-keyboard.c

/*
 *  Copyright (c) 2013, Microsoft Corporation.
 *
 *  This program is free software; you can redistribute it and/or modify it
 *  under the terms and conditions of the GNU General Public License,
 *  version 2, as published by the Free Software Foundation.
 *
 *  This program is distributed in the hope it will be useful, but WITHOUT
 *  ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 *  FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
 *  more details.
 */

#include <linux/init.h>
#include <linux/module.h>
#include <linux/device.h>
#include <linux/completion.h>
#include <linux/hyperv.h>
#include <linux/serio.h>
#include <linux/slab.h>

/*
 * Current version 1.0
 *
 */

#define SYNTH_KBD_VERSION_MAJOR 1

#define SYNTH_KBD_VERSION_MINOR	0

#define SYNTH_KBD_VERSION		(SYNTH_KBD_VERSION_MINOR | \
                                         (SYNTH_KBD_VERSION_MAJOR << 16))


/*
 * Message types in the synthetic input protocol
 */

enum synth_kbd_msg_type {
	
SYNTH_KBD_PROTOCOL_REQUEST = 1,
	
SYNTH_KBD_PROTOCOL_RESPONSE = 2,
	
SYNTH_KBD_EVENT = 3,
	
SYNTH_KBD_LED_INDICATORS = 4,
};

/*
 * Basic message structures.
 */

struct synth_kbd_msg_hdr {
	
__le32 type;
};


struct synth_kbd_msg {
	
struct synth_kbd_msg_hdr header;
	
char data[]; /* Enclosed message */
};


union synth_kbd_version {
	
__le32 version;
};

/*
 * Protocol messages
 */

struct synth_kbd_protocol_request {
	
struct synth_kbd_msg_hdr header;
	
union synth_kbd_version version_requested;
};


#define PROTOCOL_ACCEPTED	BIT(0)

struct synth_kbd_protocol_response {
	
struct synth_kbd_msg_hdr header;
	
__le32 proto_status;
};


#define IS_UNICODE	BIT(0)

#define IS_BREAK	BIT(1)

#define IS_E0		BIT(2)

#define IS_E1		BIT(3)

struct synth_kbd_keystroke {
	
struct synth_kbd_msg_hdr header;
	
__le16 make_code;
	
__le16 reserved0;
	
__le32 info; /* Additional information */
};



#define HK_MAXIMUM_MESSAGE_SIZE 256


#define KBD_VSC_SEND_RING_BUFFER_SIZE		(10 * PAGE_SIZE)

#define KBD_VSC_RECV_RING_BUFFER_SIZE		(10 * PAGE_SIZE)


#define XTKBD_EMUL0     0xe0

#define XTKBD_EMUL1     0xe1

#define XTKBD_RELEASE   0x80


/*
 * Represents a keyboard device
 */

struct hv_kbd_dev {
	
struct hv_device *hv_dev;
	
struct serio *hv_serio;
	
struct synth_kbd_protocol_request protocol_req;
	
struct synth_kbd_protocol_response protocol_resp;
	/* Synchronize the request/response if needed */
	
struct completion wait_event;
	
spinlock_t lock; /* protects 'started' field */
	
bool started;
};


static void hv_kbd_on_receive(struct hv_device *hv_dev, struct synth_kbd_msg *msg, u32 msg_length) { struct hv_kbd_dev *kbd_dev = hv_get_drvdata(hv_dev); struct synth_kbd_keystroke *ks_msg; unsigned long flags; u32 msg_type = __le32_to_cpu(msg->header.type); u32 info; u16 scan_code; switch (msg_type) { case SYNTH_KBD_PROTOCOL_RESPONSE: /* * Validate the information provided by the host. * If the host is giving us a bogus packet, * drop the packet (hoping the problem * goes away). */ if (msg_length < sizeof(struct synth_kbd_protocol_response)) { dev_err(&hv_dev->device, "Illegal protocol response packet (len: %d)\n", msg_length); break; } memcpy(&kbd_dev->protocol_resp, msg, sizeof(struct synth_kbd_protocol_response)); complete(&kbd_dev->wait_event); break; case SYNTH_KBD_EVENT: /* * Validate the information provided by the host. * If the host is giving us a bogus packet, * drop the packet (hoping the problem * goes away). */ if (msg_length < sizeof(struct synth_kbd_keystroke)) { dev_err(&hv_dev->device, "Illegal keyboard event packet (len: %d)\n", msg_length); break; } ks_msg = (struct synth_kbd_keystroke *)msg; info = __le32_to_cpu(ks_msg->info); /* * Inject the information through the serio interrupt. */ spin_lock_irqsave(&kbd_dev->lock, flags); if (kbd_dev->started) { if (info & IS_E0) serio_interrupt(kbd_dev->hv_serio, XTKBD_EMUL0, 0); if (info & IS_E1) serio_interrupt(kbd_dev->hv_serio, XTKBD_EMUL1, 0); scan_code = __le16_to_cpu(ks_msg->make_code); if (info & IS_BREAK) scan_code |= XTKBD_RELEASE; serio_interrupt(kbd_dev->hv_serio, scan_code, 0); } spin_unlock_irqrestore(&kbd_dev->lock, flags); /* * Only trigger a wakeup on key down, otherwise * "echo freeze > /sys/power/state" can't really enter the * state because the Enter-UP can trigger a wakeup at once. */ if (!(info & IS_BREAK)) pm_wakeup_event(&hv_dev->device, 0); break; default: dev_err(&hv_dev->device, "unhandled message type %d\n", msg_type); } }

Contributors

PersonTokensPropCommitsCommitProp
ky srinivasanky srinivasan27093.10%266.67%
dexuan cuidexuan cui206.90%133.33%
Total290100.00%3100.00%


static void hv_kbd_handle_received_packet(struct hv_device *hv_dev, struct vmpacket_descriptor *desc, u32 bytes_recvd, u64 req_id) { struct synth_kbd_msg *msg; u32 msg_sz; switch (desc->type) { case VM_PKT_COMP: break; case VM_PKT_DATA_INBAND: /* * We have a packet that has "inband" data. The API used * for retrieving the packet guarantees that the complete * packet is read. So, minimally, we should be able to * parse the payload header safely (assuming that the host * can be trusted. Trusting the host seems to be a * reasonable assumption because in a virtualized * environment there is not whole lot you can do if you * don't trust the host. * * Nonetheless, let us validate if the host can be trusted * (in a trivial way). The interesting aspect of this * validation is how do you recover if we discover that the * host is not to be trusted? Simply dropping the packet, I * don't think is an appropriate recovery. In the interest * of failing fast, it may be better to crash the guest. * For now, I will just drop the packet! */ msg_sz = bytes_recvd - (desc->offset8 << 3); if (msg_sz <= sizeof(struct synth_kbd_msg_hdr)) { /* * Drop the packet and hope * the problem magically goes away. */ dev_err(&hv_dev->device, "Illegal packet (type: %d, tid: %llx, size: %d)\n", desc->type, req_id, msg_sz); break; } msg = (void *)desc + (desc->offset8 << 3); hv_kbd_on_receive(hv_dev, msg, msg_sz); break; default: dev_err(&hv_dev->device, "unhandled packet type %d, tid %llx len %d\n", desc->type, req_id, bytes_recvd); break; } }

Contributors

PersonTokensPropCommitsCommitProp
ky srinivasanky srinivasan136100.00%1100.00%
Total136100.00%1100.00%


static void hv_kbd_on_channel_callback(void *context) { struct hv_device *hv_dev = context; void *buffer; int bufferlen = 0x100; /* Start with sensible size */ u32 bytes_recvd; u64 req_id; int error; buffer = kmalloc(bufferlen, GFP_ATOMIC); if (!buffer) return; while (1) { error = vmbus_recvpacket_raw(hv_dev->channel, buffer, bufferlen, &bytes_recvd, &req_id); switch (error) { case 0: if (bytes_recvd == 0) { kfree(buffer); return; } hv_kbd_handle_received_packet(hv_dev, buffer, bytes_recvd, req_id); break; case -ENOBUFS: kfree(buffer); /* Handle large packet */ bufferlen = bytes_recvd; buffer = kmalloc(bytes_recvd, GFP_ATOMIC); if (!buffer) return; break; } } }

Contributors

PersonTokensPropCommitsCommitProp
ky srinivasanky srinivasan141100.00%1100.00%
Total141100.00%1100.00%


static int hv_kbd_connect_to_vsp(struct hv_device *hv_dev) { struct hv_kbd_dev *kbd_dev = hv_get_drvdata(hv_dev); struct synth_kbd_protocol_request *request; struct synth_kbd_protocol_response *response; u32 proto_status; int error; request = &kbd_dev->protocol_req; memset(request, 0, sizeof(struct synth_kbd_protocol_request)); request->header.type = __cpu_to_le32(SYNTH_KBD_PROTOCOL_REQUEST); request->version_requested.version = __cpu_to_le32(SYNTH_KBD_VERSION); error = vmbus_sendpacket(hv_dev->channel, request, sizeof(struct synth_kbd_protocol_request), (unsigned long)request, VM_PKT_DATA_INBAND, VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED); if (error) return error; if (!wait_for_completion_timeout(&kbd_dev->wait_event, 10 * HZ)) return -ETIMEDOUT; response = &kbd_dev->protocol_resp; proto_status = __le32_to_cpu(response->proto_status); if (!(proto_status & PROTOCOL_ACCEPTED)) { dev_err(&hv_dev->device, "synth_kbd protocol request failed (version %d)\n", SYNTH_KBD_VERSION); return -ENODEV; } return 0; }

Contributors

PersonTokensPropCommitsCommitProp
ky srinivasanky srinivasan178100.00%1100.00%
Total178100.00%1100.00%


static int hv_kbd_start(struct serio *serio) { struct hv_kbd_dev *kbd_dev = serio->port_data; unsigned long flags; spin_lock_irqsave(&kbd_dev->lock, flags); kbd_dev->started = true; spin_unlock_irqrestore(&kbd_dev->lock, flags); return 0; }

Contributors

PersonTokensPropCommitsCommitProp
ky srinivasanky srinivasan53100.00%1100.00%
Total53100.00%1100.00%


static void hv_kbd_stop(struct serio *serio) { struct hv_kbd_dev *kbd_dev = serio->port_data; unsigned long flags; spin_lock_irqsave(&kbd_dev->lock, flags); kbd_dev->started = false; spin_unlock_irqrestore(&kbd_dev->lock, flags); }

Contributors

PersonTokensPropCommitsCommitProp
ky srinivasanky srinivasan50100.00%1100.00%
Total50100.00%1100.00%


static int hv_kbd_probe(struct hv_device *hv_dev, const struct hv_vmbus_device_id *dev_id) { struct hv_kbd_dev *kbd_dev; struct serio *hv_serio; int error; kbd_dev = kzalloc(sizeof(struct hv_kbd_dev), GFP_KERNEL); hv_serio = kzalloc(sizeof(struct serio), GFP_KERNEL); if (!kbd_dev || !hv_serio) { error = -ENOMEM; goto err_free_mem; } kbd_dev->hv_dev = hv_dev; kbd_dev->hv_serio = hv_serio; spin_lock_init(&kbd_dev->lock); init_completion(&kbd_dev->wait_event); hv_set_drvdata(hv_dev, kbd_dev); hv_serio->dev.parent = &hv_dev->device; hv_serio->id.type = SERIO_8042_XL; hv_serio->port_data = kbd_dev; strlcpy(hv_serio->name, dev_name(&hv_dev->device), sizeof(hv_serio->name)); strlcpy(hv_serio->phys, dev_name(&hv_dev->device), sizeof(hv_serio->phys)); hv_serio->start = hv_kbd_start; hv_serio->stop = hv_kbd_stop; error = vmbus_open(hv_dev->channel, KBD_VSC_SEND_RING_BUFFER_SIZE, KBD_VSC_RECV_RING_BUFFER_SIZE, NULL, 0, hv_kbd_on_channel_callback, hv_dev); if (error) goto err_free_mem; error = hv_kbd_connect_to_vsp(hv_dev); if (error) goto err_close_vmbus; serio_register_port(kbd_dev->hv_serio); device_init_wakeup(&hv_dev->device, true); return 0; err_close_vmbus: vmbus_close(hv_dev->channel); err_free_mem: kfree(hv_serio); kfree(kbd_dev); return error; }

Contributors

PersonTokensPropCommitsCommitProp
ky srinivasanky srinivasan26696.38%150.00%
dexuan cuidexuan cui103.62%150.00%
Total276100.00%2100.00%


static int hv_kbd_remove(struct hv_device *hv_dev) { struct hv_kbd_dev *kbd_dev = hv_get_drvdata(hv_dev); device_init_wakeup(&hv_dev->device, false); serio_unregister_port(kbd_dev->hv_serio); vmbus_close(hv_dev->channel); kfree(kbd_dev); hv_set_drvdata(hv_dev, NULL); return 0; }

Contributors

PersonTokensPropCommitsCommitProp
ky srinivasanky srinivasan5083.33%150.00%
dexuan cuidexuan cui1016.67%150.00%
Total60100.00%2100.00%

static const struct hv_vmbus_device_id id_table[] = { /* Keyboard guid */ { HV_KBD_GUID, }, { }, }; MODULE_DEVICE_TABLE(vmbus, id_table); static struct hv_driver hv_kbd_drv = { .name = KBUILD_MODNAME, .id_table = id_table, .probe = hv_kbd_probe, .remove = hv_kbd_remove, };
static int __init hv_kbd_init(void) { return vmbus_driver_register(&hv_kbd_drv); }

Contributors

PersonTokensPropCommitsCommitProp
ky srinivasanky srinivasan16100.00%1100.00%
Total16100.00%1100.00%


static void __exit hv_kbd_exit(void) { vmbus_driver_unregister(&hv_kbd_drv); }

Contributors

PersonTokensPropCommitsCommitProp
ky srinivasanky srinivasan15100.00%1100.00%
Total15100.00%1100.00%

MODULE_LICENSE("GPL"); module_init(hv_kbd_init); module_exit(hv_kbd_exit);

Overall Contributors

PersonTokensPropCommitsCommitProp
ky srinivasanky srinivasan145297.32%266.67%
dexuan cuidexuan cui402.68%133.33%
Total1492100.00%3100.00%
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
{% endraw %}