blob: bad9154633593140e934cbb02be9b5979e050705 [file] [log] [blame]
Hans de Goede579db9d2017-11-30 17:01:26 +01001/* SPDX-License-Identifier: (GPL-2.0 OR CDDL-1.0) */
2/*
3 * vboxguest vmm-req and hgcm-call code, VBoxGuestR0LibHGCMInternal.cpp,
4 * VBoxGuestR0LibGenericRequest.cpp and RTErrConvertToErrno.cpp in vbox svn.
5 *
6 * Copyright (C) 2006-2016 Oracle Corporation
7 */
8
9#include <linux/errno.h>
10#include <linux/kernel.h>
11#include <linux/mm.h>
12#include <linux/module.h>
13#include <linux/sizes.h>
14#include <linux/slab.h>
15#include <linux/uaccess.h>
16#include <linux/vmalloc.h>
17#include <linux/vbox_err.h>
18#include <linux/vbox_utils.h>
19#include "vboxguest_core.h"
20
21/* Get the pointer to the first parameter of a HGCM call request. */
22#define VMMDEV_HGCM_CALL_PARMS(a) \
23 ((struct vmmdev_hgcm_function_parameter *)( \
24 (u8 *)(a) + sizeof(struct vmmdev_hgcm_call)))
25
26/* The max parameter buffer size for a user request. */
27#define VBG_MAX_HGCM_USER_PARM (24 * SZ_1M)
28/* The max parameter buffer size for a kernel request. */
29#define VBG_MAX_HGCM_KERNEL_PARM (16 * SZ_1M)
30
31#define VBG_DEBUG_PORT 0x504
32
33/* This protects vbg_log_buf and serializes VBG_DEBUG_PORT accesses */
34static DEFINE_SPINLOCK(vbg_log_lock);
35static char vbg_log_buf[128];
36
37#define VBG_LOG(name, pr_func) \
38void name(const char *fmt, ...) \
39{ \
40 unsigned long flags; \
41 va_list args; \
42 int i, count; \
43 \
44 va_start(args, fmt); \
45 spin_lock_irqsave(&vbg_log_lock, flags); \
46 \
47 count = vscnprintf(vbg_log_buf, sizeof(vbg_log_buf), fmt, args);\
48 for (i = 0; i < count; i++) \
49 outb(vbg_log_buf[i], VBG_DEBUG_PORT); \
50 \
51 pr_func("%s", vbg_log_buf); \
52 \
53 spin_unlock_irqrestore(&vbg_log_lock, flags); \
54 va_end(args); \
55} \
56EXPORT_SYMBOL(name)
57
58VBG_LOG(vbg_info, pr_info);
59VBG_LOG(vbg_warn, pr_warn);
60VBG_LOG(vbg_err, pr_err);
61#if defined(DEBUG) && !defined(CONFIG_DYNAMIC_DEBUG)
62VBG_LOG(vbg_debug, pr_debug);
63#endif
64
65void *vbg_req_alloc(size_t len, enum vmmdev_request_type req_type)
66{
67 struct vmmdev_request_header *req;
68
69 req = kmalloc(len, GFP_KERNEL | __GFP_DMA32);
70 if (!req)
71 return NULL;
72
73 memset(req, 0xaa, len);
74
75 req->size = len;
76 req->version = VMMDEV_REQUEST_HEADER_VERSION;
77 req->request_type = req_type;
78 req->rc = VERR_GENERAL_FAILURE;
79 req->reserved1 = 0;
80 req->reserved2 = 0;
81
82 return req;
83}
84
Hans de Goedef6f98852018-04-18 15:24:48 +020085void vbg_req_free(void *req, size_t len)
86{
87 if (!req)
88 return;
89
90 kfree(req);
91}
92
Hans de Goede579db9d2017-11-30 17:01:26 +010093/* Note this function returns a VBox status code, not a negative errno!! */
94int vbg_req_perform(struct vbg_dev *gdev, void *req)
95{
96 unsigned long phys_req = virt_to_phys(req);
97
98 outl(phys_req, gdev->io_port + VMMDEV_PORT_OFF_REQUEST);
99 /*
100 * The host changes the request as a result of the outl, make sure
101 * the outl and any reads of the req happen in the correct order.
102 */
103 mb();
104
105 return ((struct vmmdev_request_header *)req)->rc;
106}
107
108static bool hgcm_req_done(struct vbg_dev *gdev,
109 struct vmmdev_hgcmreq_header *header)
110{
111 unsigned long flags;
112 bool done;
113
114 spin_lock_irqsave(&gdev->event_spinlock, flags);
115 done = header->flags & VMMDEV_HGCM_REQ_DONE;
116 spin_unlock_irqrestore(&gdev->event_spinlock, flags);
117
118 return done;
119}
120
121int vbg_hgcm_connect(struct vbg_dev *gdev,
122 struct vmmdev_hgcm_service_location *loc,
123 u32 *client_id, int *vbox_status)
124{
125 struct vmmdev_hgcm_connect *hgcm_connect = NULL;
126 int rc;
127
128 hgcm_connect = vbg_req_alloc(sizeof(*hgcm_connect),
129 VMMDEVREQ_HGCM_CONNECT);
130 if (!hgcm_connect)
131 return -ENOMEM;
132
133 hgcm_connect->header.flags = 0;
134 memcpy(&hgcm_connect->loc, loc, sizeof(*loc));
135 hgcm_connect->client_id = 0;
136
137 rc = vbg_req_perform(gdev, hgcm_connect);
138
139 if (rc == VINF_HGCM_ASYNC_EXECUTE)
140 wait_event(gdev->hgcm_wq,
141 hgcm_req_done(gdev, &hgcm_connect->header));
142
143 if (rc >= 0) {
144 *client_id = hgcm_connect->client_id;
145 rc = hgcm_connect->header.result;
146 }
147
Hans de Goedef6f98852018-04-18 15:24:48 +0200148 vbg_req_free(hgcm_connect, sizeof(*hgcm_connect));
Hans de Goede579db9d2017-11-30 17:01:26 +0100149
150 *vbox_status = rc;
151 return 0;
152}
153EXPORT_SYMBOL(vbg_hgcm_connect);
154
155int vbg_hgcm_disconnect(struct vbg_dev *gdev, u32 client_id, int *vbox_status)
156{
157 struct vmmdev_hgcm_disconnect *hgcm_disconnect = NULL;
158 int rc;
159
160 hgcm_disconnect = vbg_req_alloc(sizeof(*hgcm_disconnect),
161 VMMDEVREQ_HGCM_DISCONNECT);
162 if (!hgcm_disconnect)
163 return -ENOMEM;
164
165 hgcm_disconnect->header.flags = 0;
166 hgcm_disconnect->client_id = client_id;
167
168 rc = vbg_req_perform(gdev, hgcm_disconnect);
169
170 if (rc == VINF_HGCM_ASYNC_EXECUTE)
171 wait_event(gdev->hgcm_wq,
172 hgcm_req_done(gdev, &hgcm_disconnect->header));
173
174 if (rc >= 0)
175 rc = hgcm_disconnect->header.result;
176
Hans de Goedef6f98852018-04-18 15:24:48 +0200177 vbg_req_free(hgcm_disconnect, sizeof(*hgcm_disconnect));
Hans de Goede579db9d2017-11-30 17:01:26 +0100178
179 *vbox_status = rc;
180 return 0;
181}
182EXPORT_SYMBOL(vbg_hgcm_disconnect);
183
184static u32 hgcm_call_buf_size_in_pages(void *buf, u32 len)
185{
186 u32 size = PAGE_ALIGN(len + ((unsigned long)buf & ~PAGE_MASK));
187
188 return size >> PAGE_SHIFT;
189}
190
191static void hgcm_call_add_pagelist_size(void *buf, u32 len, size_t *extra)
192{
193 u32 page_count;
194
195 page_count = hgcm_call_buf_size_in_pages(buf, len);
196 *extra += offsetof(struct vmmdev_hgcm_pagelist, pages[page_count]);
197}
198
199static int hgcm_call_preprocess_linaddr(
200 const struct vmmdev_hgcm_function_parameter *src_parm,
201 void **bounce_buf_ret, size_t *extra)
202{
203 void *buf, *bounce_buf;
204 bool copy_in;
205 u32 len;
206 int ret;
207
208 buf = (void *)src_parm->u.pointer.u.linear_addr;
209 len = src_parm->u.pointer.size;
210 copy_in = src_parm->type != VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT;
211
212 if (len > VBG_MAX_HGCM_USER_PARM)
213 return -E2BIG;
214
215 bounce_buf = kvmalloc(len, GFP_KERNEL);
216 if (!bounce_buf)
217 return -ENOMEM;
218
219 if (copy_in) {
220 ret = copy_from_user(bounce_buf, (void __user *)buf, len);
221 if (ret)
222 return -EFAULT;
223 } else {
224 memset(bounce_buf, 0, len);
225 }
226
227 *bounce_buf_ret = bounce_buf;
228 hgcm_call_add_pagelist_size(bounce_buf, len, extra);
229 return 0;
230}
231
232/**
233 * Preprocesses the HGCM call, validate parameters, alloc bounce buffers and
234 * figure out how much extra storage we need for page lists.
235 * Return: 0 or negative errno value.
236 * @src_parm: Pointer to source function call parameters
237 * @parm_count: Number of function call parameters.
238 * @bounce_bufs_ret: Where to return the allocated bouncebuffer array
239 * @extra: Where to return the extra request space needed for
240 * physical page lists.
241 */
242static int hgcm_call_preprocess(
243 const struct vmmdev_hgcm_function_parameter *src_parm,
244 u32 parm_count, void ***bounce_bufs_ret, size_t *extra)
245{
246 void *buf, **bounce_bufs = NULL;
247 u32 i, len;
248 int ret;
249
250 for (i = 0; i < parm_count; i++, src_parm++) {
251 switch (src_parm->type) {
252 case VMMDEV_HGCM_PARM_TYPE_32BIT:
253 case VMMDEV_HGCM_PARM_TYPE_64BIT:
254 break;
255
256 case VMMDEV_HGCM_PARM_TYPE_LINADDR:
257 case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
258 case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
259 if (!bounce_bufs) {
260 bounce_bufs = kcalloc(parm_count,
261 sizeof(void *),
262 GFP_KERNEL);
263 if (!bounce_bufs)
264 return -ENOMEM;
265
266 *bounce_bufs_ret = bounce_bufs;
267 }
268
269 ret = hgcm_call_preprocess_linaddr(src_parm,
270 &bounce_bufs[i],
271 extra);
272 if (ret)
273 return ret;
274
275 break;
276
277 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL:
278 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_IN:
279 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_OUT:
280 buf = (void *)src_parm->u.pointer.u.linear_addr;
281 len = src_parm->u.pointer.size;
282 if (WARN_ON(len > VBG_MAX_HGCM_KERNEL_PARM))
283 return -E2BIG;
284
285 hgcm_call_add_pagelist_size(buf, len, extra);
286 break;
287
288 default:
289 return -EINVAL;
290 }
291 }
292
293 return 0;
294}
295
296/**
297 * Translates linear address types to page list direction flags.
298 *
299 * Return: page list flags.
300 * @type: The type.
301 */
302static u32 hgcm_call_linear_addr_type_to_pagelist_flags(
303 enum vmmdev_hgcm_function_parameter_type type)
304{
305 switch (type) {
306 default:
307 WARN_ON(1);
308 /* Fall through */
309 case VMMDEV_HGCM_PARM_TYPE_LINADDR:
310 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL:
311 return VMMDEV_HGCM_F_PARM_DIRECTION_BOTH;
312
313 case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
314 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_IN:
315 return VMMDEV_HGCM_F_PARM_DIRECTION_TO_HOST;
316
317 case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
318 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_OUT:
319 return VMMDEV_HGCM_F_PARM_DIRECTION_FROM_HOST;
320 }
321}
322
323static void hgcm_call_init_linaddr(struct vmmdev_hgcm_call *call,
324 struct vmmdev_hgcm_function_parameter *dst_parm, void *buf, u32 len,
325 enum vmmdev_hgcm_function_parameter_type type, u32 *off_extra)
326{
327 struct vmmdev_hgcm_pagelist *dst_pg_lst;
328 struct page *page;
329 bool is_vmalloc;
330 u32 i, page_count;
331
332 dst_parm->type = type;
333
334 if (len == 0) {
335 dst_parm->u.pointer.size = 0;
336 dst_parm->u.pointer.u.linear_addr = 0;
337 return;
338 }
339
340 dst_pg_lst = (void *)call + *off_extra;
341 page_count = hgcm_call_buf_size_in_pages(buf, len);
342 is_vmalloc = is_vmalloc_addr(buf);
343
344 dst_parm->type = VMMDEV_HGCM_PARM_TYPE_PAGELIST;
345 dst_parm->u.page_list.size = len;
346 dst_parm->u.page_list.offset = *off_extra;
347 dst_pg_lst->flags = hgcm_call_linear_addr_type_to_pagelist_flags(type);
348 dst_pg_lst->offset_first_page = (unsigned long)buf & ~PAGE_MASK;
349 dst_pg_lst->page_count = page_count;
350
351 for (i = 0; i < page_count; i++) {
352 if (is_vmalloc)
353 page = vmalloc_to_page(buf);
354 else
355 page = virt_to_page(buf);
356
357 dst_pg_lst->pages[i] = page_to_phys(page);
358 buf += PAGE_SIZE;
359 }
360
361 *off_extra += offsetof(struct vmmdev_hgcm_pagelist, pages[page_count]);
362}
363
364/**
365 * Initializes the call request that we're sending to the host.
366 * @call: The call to initialize.
367 * @client_id: The client ID of the caller.
368 * @function: The function number of the function to call.
369 * @src_parm: Pointer to source function call parameters.
370 * @parm_count: Number of function call parameters.
371 * @bounce_bufs: The bouncebuffer array.
372 */
373static void hgcm_call_init_call(
374 struct vmmdev_hgcm_call *call, u32 client_id, u32 function,
375 const struct vmmdev_hgcm_function_parameter *src_parm,
376 u32 parm_count, void **bounce_bufs)
377{
378 struct vmmdev_hgcm_function_parameter *dst_parm =
379 VMMDEV_HGCM_CALL_PARMS(call);
380 u32 i, off_extra = (uintptr_t)(dst_parm + parm_count) - (uintptr_t)call;
381 void *buf;
382
383 call->header.flags = 0;
384 call->header.result = VINF_SUCCESS;
385 call->client_id = client_id;
386 call->function = function;
387 call->parm_count = parm_count;
388
389 for (i = 0; i < parm_count; i++, src_parm++, dst_parm++) {
390 switch (src_parm->type) {
391 case VMMDEV_HGCM_PARM_TYPE_32BIT:
392 case VMMDEV_HGCM_PARM_TYPE_64BIT:
393 *dst_parm = *src_parm;
394 break;
395
396 case VMMDEV_HGCM_PARM_TYPE_LINADDR:
397 case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
398 case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
399 hgcm_call_init_linaddr(call, dst_parm, bounce_bufs[i],
400 src_parm->u.pointer.size,
401 src_parm->type, &off_extra);
402 break;
403
404 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL:
405 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_IN:
406 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_OUT:
407 buf = (void *)src_parm->u.pointer.u.linear_addr;
408 hgcm_call_init_linaddr(call, dst_parm, buf,
409 src_parm->u.pointer.size,
410 src_parm->type, &off_extra);
411 break;
412
413 default:
414 WARN_ON(1);
415 dst_parm->type = VMMDEV_HGCM_PARM_TYPE_INVALID;
416 }
417 }
418}
419
420/**
421 * Tries to cancel a pending HGCM call.
422 *
423 * Return: VBox status code
424 */
425static int hgcm_cancel_call(struct vbg_dev *gdev, struct vmmdev_hgcm_call *call)
426{
427 int rc;
428
429 /*
430 * We use a pre-allocated request for cancellations, which is
431 * protected by cancel_req_mutex. This means that all cancellations
432 * get serialized, this should be fine since they should be rare.
433 */
434 mutex_lock(&gdev->cancel_req_mutex);
435 gdev->cancel_req->phys_req_to_cancel = virt_to_phys(call);
436 rc = vbg_req_perform(gdev, gdev->cancel_req);
437 mutex_unlock(&gdev->cancel_req_mutex);
438
439 if (rc == VERR_NOT_IMPLEMENTED) {
440 call->header.flags |= VMMDEV_HGCM_REQ_CANCELLED;
441 call->header.header.request_type = VMMDEVREQ_HGCM_CANCEL;
442
443 rc = vbg_req_perform(gdev, call);
444 if (rc == VERR_INVALID_PARAMETER)
445 rc = VERR_NOT_FOUND;
446 }
447
448 if (rc >= 0)
449 call->header.flags |= VMMDEV_HGCM_REQ_CANCELLED;
450
451 return rc;
452}
453
454/**
455 * Performs the call and completion wait.
456 * Return: 0 or negative errno value.
457 * @gdev: The VBoxGuest device extension.
458 * @call: The call to execute.
459 * @timeout_ms: Timeout in ms.
460 * @leak_it: Where to return the leak it / free it, indicator.
461 * Cancellation fun.
462 */
463static int vbg_hgcm_do_call(struct vbg_dev *gdev, struct vmmdev_hgcm_call *call,
464 u32 timeout_ms, bool *leak_it)
465{
466 int rc, cancel_rc, ret;
467 long timeout;
468
469 *leak_it = false;
470
471 rc = vbg_req_perform(gdev, call);
472
473 /*
474 * If the call failed, then pretend success. Upper layers will
475 * interpret the result code in the packet.
476 */
477 if (rc < 0) {
478 call->header.result = rc;
479 return 0;
480 }
481
482 if (rc != VINF_HGCM_ASYNC_EXECUTE)
483 return 0;
484
485 /* Host decided to process the request asynchronously, wait for it */
486 if (timeout_ms == U32_MAX)
487 timeout = MAX_SCHEDULE_TIMEOUT;
488 else
489 timeout = msecs_to_jiffies(timeout_ms);
490
491 timeout = wait_event_interruptible_timeout(
492 gdev->hgcm_wq,
493 hgcm_req_done(gdev, &call->header),
494 timeout);
495
496 /* timeout > 0 means hgcm_req_done has returned true, so success */
497 if (timeout > 0)
498 return 0;
499
500 if (timeout == 0)
501 ret = -ETIMEDOUT;
502 else
503 ret = -EINTR;
504
505 /* Cancel the request */
506 cancel_rc = hgcm_cancel_call(gdev, call);
507 if (cancel_rc >= 0)
508 return ret;
509
510 /*
511 * Failed to cancel, this should mean that the cancel has lost the
512 * race with normal completion, wait while the host completes it.
513 */
514 if (cancel_rc == VERR_NOT_FOUND || cancel_rc == VERR_SEM_DESTROYED)
515 timeout = msecs_to_jiffies(500);
516 else
517 timeout = msecs_to_jiffies(2000);
518
519 timeout = wait_event_timeout(gdev->hgcm_wq,
520 hgcm_req_done(gdev, &call->header),
521 timeout);
522
523 if (WARN_ON(timeout == 0)) {
524 /* We really should never get here */
525 vbg_err("%s: Call timedout and cancellation failed, leaking the request\n",
526 __func__);
527 *leak_it = true;
528 return ret;
529 }
530
531 /* The call has completed normally after all */
532 return 0;
533}
534
535/**
536 * Copies the result of the call back to the caller info structure and user
537 * buffers.
538 * Return: 0 or negative errno value.
539 * @call: HGCM call request.
540 * @dst_parm: Pointer to function call parameters destination.
541 * @parm_count: Number of function call parameters.
542 * @bounce_bufs: The bouncebuffer array.
543 */
544static int hgcm_call_copy_back_result(
545 const struct vmmdev_hgcm_call *call,
546 struct vmmdev_hgcm_function_parameter *dst_parm,
547 u32 parm_count, void **bounce_bufs)
548{
549 const struct vmmdev_hgcm_function_parameter *src_parm =
550 VMMDEV_HGCM_CALL_PARMS(call);
551 void __user *p;
552 int ret;
553 u32 i;
554
555 /* Copy back parameters. */
556 for (i = 0; i < parm_count; i++, src_parm++, dst_parm++) {
557 switch (dst_parm->type) {
558 case VMMDEV_HGCM_PARM_TYPE_32BIT:
559 case VMMDEV_HGCM_PARM_TYPE_64BIT:
560 *dst_parm = *src_parm;
561 break;
562
563 case VMMDEV_HGCM_PARM_TYPE_PAGELIST:
564 dst_parm->u.page_list.size = src_parm->u.page_list.size;
565 break;
566
567 case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
568 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL:
569 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_IN:
570 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_OUT:
571 dst_parm->u.pointer.size = src_parm->u.pointer.size;
572 break;
573
574 case VMMDEV_HGCM_PARM_TYPE_LINADDR:
575 case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
576 dst_parm->u.pointer.size = src_parm->u.pointer.size;
577
578 p = (void __user *)dst_parm->u.pointer.u.linear_addr;
579 ret = copy_to_user(p, bounce_bufs[i],
580 min(src_parm->u.pointer.size,
581 dst_parm->u.pointer.size));
582 if (ret)
583 return -EFAULT;
584 break;
585
586 default:
587 WARN_ON(1);
588 return -EINVAL;
589 }
590 }
591
592 return 0;
593}
594
595int vbg_hgcm_call(struct vbg_dev *gdev, u32 client_id, u32 function,
596 u32 timeout_ms, struct vmmdev_hgcm_function_parameter *parms,
597 u32 parm_count, int *vbox_status)
598{
599 struct vmmdev_hgcm_call *call;
600 void **bounce_bufs = NULL;
601 bool leak_it;
602 size_t size;
603 int i, ret;
604
605 size = sizeof(struct vmmdev_hgcm_call) +
606 parm_count * sizeof(struct vmmdev_hgcm_function_parameter);
607 /*
608 * Validate and buffer the parameters for the call. This also increases
609 * call_size with the amount of extra space needed for page lists.
610 */
611 ret = hgcm_call_preprocess(parms, parm_count, &bounce_bufs, &size);
612 if (ret) {
613 /* Even on error bounce bufs may still have been allocated */
614 goto free_bounce_bufs;
615 }
616
617 call = vbg_req_alloc(size, VMMDEVREQ_HGCM_CALL);
618 if (!call) {
619 ret = -ENOMEM;
620 goto free_bounce_bufs;
621 }
622
623 hgcm_call_init_call(call, client_id, function, parms, parm_count,
624 bounce_bufs);
625
626 ret = vbg_hgcm_do_call(gdev, call, timeout_ms, &leak_it);
627 if (ret == 0) {
628 *vbox_status = call->header.result;
629 ret = hgcm_call_copy_back_result(call, parms, parm_count,
630 bounce_bufs);
631 }
632
633 if (!leak_it)
Hans de Goedef6f98852018-04-18 15:24:48 +0200634 vbg_req_free(call, size);
Hans de Goede579db9d2017-11-30 17:01:26 +0100635
636free_bounce_bufs:
637 if (bounce_bufs) {
638 for (i = 0; i < parm_count; i++)
639 kvfree(bounce_bufs[i]);
640 kfree(bounce_bufs);
641 }
642
643 return ret;
644}
645EXPORT_SYMBOL(vbg_hgcm_call);
646
647#ifdef CONFIG_COMPAT
648int vbg_hgcm_call32(
649 struct vbg_dev *gdev, u32 client_id, u32 function, u32 timeout_ms,
650 struct vmmdev_hgcm_function_parameter32 *parm32, u32 parm_count,
651 int *vbox_status)
652{
653 struct vmmdev_hgcm_function_parameter *parm64 = NULL;
654 u32 i, size;
655 int ret = 0;
656
657 /* KISS allocate a temporary request and convert the parameters. */
658 size = parm_count * sizeof(struct vmmdev_hgcm_function_parameter);
659 parm64 = kzalloc(size, GFP_KERNEL);
660 if (!parm64)
661 return -ENOMEM;
662
663 for (i = 0; i < parm_count; i++) {
664 switch (parm32[i].type) {
665 case VMMDEV_HGCM_PARM_TYPE_32BIT:
666 parm64[i].type = VMMDEV_HGCM_PARM_TYPE_32BIT;
667 parm64[i].u.value32 = parm32[i].u.value32;
668 break;
669
670 case VMMDEV_HGCM_PARM_TYPE_64BIT:
671 parm64[i].type = VMMDEV_HGCM_PARM_TYPE_64BIT;
672 parm64[i].u.value64 = parm32[i].u.value64;
673 break;
674
675 case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
676 case VMMDEV_HGCM_PARM_TYPE_LINADDR:
677 case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
678 parm64[i].type = parm32[i].type;
679 parm64[i].u.pointer.size = parm32[i].u.pointer.size;
680 parm64[i].u.pointer.u.linear_addr =
681 parm32[i].u.pointer.u.linear_addr;
682 break;
683
684 default:
685 ret = -EINVAL;
686 }
687 if (ret < 0)
688 goto out_free;
689 }
690
691 ret = vbg_hgcm_call(gdev, client_id, function, timeout_ms,
692 parm64, parm_count, vbox_status);
693 if (ret < 0)
694 goto out_free;
695
696 /* Copy back. */
697 for (i = 0; i < parm_count; i++, parm32++, parm64++) {
698 switch (parm64[i].type) {
699 case VMMDEV_HGCM_PARM_TYPE_32BIT:
700 parm32[i].u.value32 = parm64[i].u.value32;
701 break;
702
703 case VMMDEV_HGCM_PARM_TYPE_64BIT:
704 parm32[i].u.value64 = parm64[i].u.value64;
705 break;
706
707 case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
708 case VMMDEV_HGCM_PARM_TYPE_LINADDR:
709 case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
710 parm32[i].u.pointer.size = parm64[i].u.pointer.size;
711 break;
712
713 default:
714 WARN_ON(1);
715 ret = -EINVAL;
716 }
717 }
718
719out_free:
720 kfree(parm64);
721 return ret;
722}
723#endif
724
725static const int vbg_status_code_to_errno_table[] = {
726 [-VERR_ACCESS_DENIED] = -EPERM,
727 [-VERR_FILE_NOT_FOUND] = -ENOENT,
728 [-VERR_PROCESS_NOT_FOUND] = -ESRCH,
729 [-VERR_INTERRUPTED] = -EINTR,
730 [-VERR_DEV_IO_ERROR] = -EIO,
731 [-VERR_TOO_MUCH_DATA] = -E2BIG,
732 [-VERR_BAD_EXE_FORMAT] = -ENOEXEC,
733 [-VERR_INVALID_HANDLE] = -EBADF,
734 [-VERR_TRY_AGAIN] = -EAGAIN,
735 [-VERR_NO_MEMORY] = -ENOMEM,
736 [-VERR_INVALID_POINTER] = -EFAULT,
737 [-VERR_RESOURCE_BUSY] = -EBUSY,
738 [-VERR_ALREADY_EXISTS] = -EEXIST,
739 [-VERR_NOT_SAME_DEVICE] = -EXDEV,
740 [-VERR_NOT_A_DIRECTORY] = -ENOTDIR,
741 [-VERR_PATH_NOT_FOUND] = -ENOTDIR,
Hans de Goedef72c3502018-01-15 18:46:25 +0100742 [-VERR_INVALID_NAME] = -ENOENT,
Hans de Goede579db9d2017-11-30 17:01:26 +0100743 [-VERR_IS_A_DIRECTORY] = -EISDIR,
744 [-VERR_INVALID_PARAMETER] = -EINVAL,
745 [-VERR_TOO_MANY_OPEN_FILES] = -ENFILE,
746 [-VERR_INVALID_FUNCTION] = -ENOTTY,
747 [-VERR_SHARING_VIOLATION] = -ETXTBSY,
748 [-VERR_FILE_TOO_BIG] = -EFBIG,
749 [-VERR_DISK_FULL] = -ENOSPC,
750 [-VERR_SEEK_ON_DEVICE] = -ESPIPE,
751 [-VERR_WRITE_PROTECT] = -EROFS,
752 [-VERR_BROKEN_PIPE] = -EPIPE,
753 [-VERR_DEADLOCK] = -EDEADLK,
754 [-VERR_FILENAME_TOO_LONG] = -ENAMETOOLONG,
755 [-VERR_FILE_LOCK_FAILED] = -ENOLCK,
756 [-VERR_NOT_IMPLEMENTED] = -ENOSYS,
757 [-VERR_NOT_SUPPORTED] = -ENOSYS,
758 [-VERR_DIR_NOT_EMPTY] = -ENOTEMPTY,
759 [-VERR_TOO_MANY_SYMLINKS] = -ELOOP,
Hans de Goedef72c3502018-01-15 18:46:25 +0100760 [-VERR_NO_MORE_FILES] = -ENODATA,
Hans de Goede579db9d2017-11-30 17:01:26 +0100761 [-VERR_NO_DATA] = -ENODATA,
762 [-VERR_NET_NO_NETWORK] = -ENONET,
763 [-VERR_NET_NOT_UNIQUE_NAME] = -ENOTUNIQ,
764 [-VERR_NO_TRANSLATION] = -EILSEQ,
765 [-VERR_NET_NOT_SOCKET] = -ENOTSOCK,
766 [-VERR_NET_DEST_ADDRESS_REQUIRED] = -EDESTADDRREQ,
767 [-VERR_NET_MSG_SIZE] = -EMSGSIZE,
768 [-VERR_NET_PROTOCOL_TYPE] = -EPROTOTYPE,
769 [-VERR_NET_PROTOCOL_NOT_AVAILABLE] = -ENOPROTOOPT,
770 [-VERR_NET_PROTOCOL_NOT_SUPPORTED] = -EPROTONOSUPPORT,
771 [-VERR_NET_SOCKET_TYPE_NOT_SUPPORTED] = -ESOCKTNOSUPPORT,
772 [-VERR_NET_OPERATION_NOT_SUPPORTED] = -EOPNOTSUPP,
773 [-VERR_NET_PROTOCOL_FAMILY_NOT_SUPPORTED] = -EPFNOSUPPORT,
774 [-VERR_NET_ADDRESS_FAMILY_NOT_SUPPORTED] = -EAFNOSUPPORT,
775 [-VERR_NET_ADDRESS_IN_USE] = -EADDRINUSE,
776 [-VERR_NET_ADDRESS_NOT_AVAILABLE] = -EADDRNOTAVAIL,
777 [-VERR_NET_DOWN] = -ENETDOWN,
778 [-VERR_NET_UNREACHABLE] = -ENETUNREACH,
779 [-VERR_NET_CONNECTION_RESET] = -ENETRESET,
780 [-VERR_NET_CONNECTION_ABORTED] = -ECONNABORTED,
781 [-VERR_NET_CONNECTION_RESET_BY_PEER] = -ECONNRESET,
782 [-VERR_NET_NO_BUFFER_SPACE] = -ENOBUFS,
783 [-VERR_NET_ALREADY_CONNECTED] = -EISCONN,
784 [-VERR_NET_NOT_CONNECTED] = -ENOTCONN,
785 [-VERR_NET_SHUTDOWN] = -ESHUTDOWN,
786 [-VERR_NET_TOO_MANY_REFERENCES] = -ETOOMANYREFS,
787 [-VERR_TIMEOUT] = -ETIMEDOUT,
788 [-VERR_NET_CONNECTION_REFUSED] = -ECONNREFUSED,
789 [-VERR_NET_HOST_DOWN] = -EHOSTDOWN,
790 [-VERR_NET_HOST_UNREACHABLE] = -EHOSTUNREACH,
791 [-VERR_NET_ALREADY_IN_PROGRESS] = -EALREADY,
792 [-VERR_NET_IN_PROGRESS] = -EINPROGRESS,
793 [-VERR_MEDIA_NOT_PRESENT] = -ENOMEDIUM,
794 [-VERR_MEDIA_NOT_RECOGNIZED] = -EMEDIUMTYPE,
795};
796
797int vbg_status_code_to_errno(int rc)
798{
799 if (rc >= 0)
800 return 0;
801
802 rc = -rc;
803 if (rc >= ARRAY_SIZE(vbg_status_code_to_errno_table) ||
804 vbg_status_code_to_errno_table[rc] == 0) {
805 vbg_warn("%s: Unhandled err %d\n", __func__, -rc);
806 return -EPROTO;
807 }
808
809 return vbg_status_code_to_errno_table[rc];
810}
811EXPORT_SYMBOL(vbg_status_code_to_errno);