vboxguest_core.c 42 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611
  1. /* SPDX-License-Identifier: (GPL-2.0 OR CDDL-1.0) */
  2. /*
  3. * vboxguest core guest-device handling code, VBoxGuest.cpp in upstream svn.
  4. *
  5. * Copyright (C) 2007-2016 Oracle Corporation
  6. */
  7. #include <linux/device.h>
  8. #include <linux/mm.h>
  9. #include <linux/sched.h>
  10. #include <linux/sizes.h>
  11. #include <linux/slab.h>
  12. #include <linux/vbox_err.h>
  13. #include <linux/vbox_utils.h>
  14. #include <linux/vmalloc.h>
  15. #include "vboxguest_core.h"
  16. #include "vboxguest_version.h"
  17. /* Get the pointer to the first HGCM parameter. */
  18. #define VBG_IOCTL_HGCM_CALL_PARMS(a) \
  19. ((struct vmmdev_hgcm_function_parameter *)( \
  20. (u8 *)(a) + sizeof(struct vbg_ioctl_hgcm_call)))
  21. /* Get the pointer to the first HGCM parameter in a 32-bit request. */
  22. #define VBG_IOCTL_HGCM_CALL_PARMS32(a) \
  23. ((struct vmmdev_hgcm_function_parameter32 *)( \
  24. (u8 *)(a) + sizeof(struct vbg_ioctl_hgcm_call)))
  25. #define GUEST_MAPPINGS_TRIES 5
  26. /**
  27. * Reserves memory in which the VMM can relocate any guest mappings
  28. * that are floating around.
  29. *
  30. * This operation is a little bit tricky since the VMM might not accept
  31. * just any address because of address clashes between the three contexts
  32. * it operates in, so we try several times.
  33. *
  34. * Failure to reserve the guest mappings is ignored.
  35. *
  36. * @gdev: The Guest extension device.
  37. */
  38. static void vbg_guest_mappings_init(struct vbg_dev *gdev)
  39. {
  40. struct vmmdev_hypervisorinfo *req;
  41. void *guest_mappings[GUEST_MAPPINGS_TRIES];
  42. struct page **pages = NULL;
  43. u32 size, hypervisor_size;
  44. int i, rc;
  45. /* Query the required space. */
  46. req = vbg_req_alloc(sizeof(*req), VMMDEVREQ_GET_HYPERVISOR_INFO);
  47. if (!req)
  48. return;
  49. req->hypervisor_start = 0;
  50. req->hypervisor_size = 0;
  51. rc = vbg_req_perform(gdev, req);
  52. if (rc < 0)
  53. goto out;
  54. /*
  55. * The VMM will report back if there is nothing it wants to map, like
  56. * for instance in VT-x and AMD-V mode.
  57. */
  58. if (req->hypervisor_size == 0)
  59. goto out;
  60. hypervisor_size = req->hypervisor_size;
  61. /* Add 4M so that we can align the vmap to 4MiB as the host requires. */
  62. size = PAGE_ALIGN(req->hypervisor_size) + SZ_4M;
  63. pages = kmalloc_array(size >> PAGE_SHIFT, sizeof(*pages), GFP_KERNEL);
  64. if (!pages)
  65. goto out;
  66. gdev->guest_mappings_dummy_page = alloc_page(GFP_HIGHUSER);
  67. if (!gdev->guest_mappings_dummy_page)
  68. goto out;
  69. for (i = 0; i < (size >> PAGE_SHIFT); i++)
  70. pages[i] = gdev->guest_mappings_dummy_page;
  71. /*
  72. * Try several times, the VMM might not accept some addresses because
  73. * of address clashes between the three contexts.
  74. */
  75. for (i = 0; i < GUEST_MAPPINGS_TRIES; i++) {
  76. guest_mappings[i] = vmap(pages, (size >> PAGE_SHIFT),
  77. VM_MAP, PAGE_KERNEL_RO);
  78. if (!guest_mappings[i])
  79. break;
  80. req->header.request_type = VMMDEVREQ_SET_HYPERVISOR_INFO;
  81. req->header.rc = VERR_INTERNAL_ERROR;
  82. req->hypervisor_size = hypervisor_size;
  83. req->hypervisor_start =
  84. (unsigned long)PTR_ALIGN(guest_mappings[i], SZ_4M);
  85. rc = vbg_req_perform(gdev, req);
  86. if (rc >= 0) {
  87. gdev->guest_mappings = guest_mappings[i];
  88. break;
  89. }
  90. }
  91. /* Free vmap's from failed attempts. */
  92. while (--i >= 0)
  93. vunmap(guest_mappings[i]);
  94. /* On failure free the dummy-page backing the vmap */
  95. if (!gdev->guest_mappings) {
  96. __free_page(gdev->guest_mappings_dummy_page);
  97. gdev->guest_mappings_dummy_page = NULL;
  98. }
  99. out:
  100. vbg_req_free(req, sizeof(*req));
  101. kfree(pages);
  102. }
  103. /**
  104. * Undo what vbg_guest_mappings_init did.
  105. *
  106. * @gdev: The Guest extension device.
  107. */
  108. static void vbg_guest_mappings_exit(struct vbg_dev *gdev)
  109. {
  110. struct vmmdev_hypervisorinfo *req;
  111. int rc;
  112. if (!gdev->guest_mappings)
  113. return;
  114. /*
  115. * Tell the host that we're going to free the memory we reserved for
  116. * it, the free it up. (Leak the memory if anything goes wrong here.)
  117. */
  118. req = vbg_req_alloc(sizeof(*req), VMMDEVREQ_SET_HYPERVISOR_INFO);
  119. if (!req)
  120. return;
  121. req->hypervisor_start = 0;
  122. req->hypervisor_size = 0;
  123. rc = vbg_req_perform(gdev, req);
  124. vbg_req_free(req, sizeof(*req));
  125. if (rc < 0) {
  126. vbg_err("%s error: %d\n", __func__, rc);
  127. return;
  128. }
  129. vunmap(gdev->guest_mappings);
  130. gdev->guest_mappings = NULL;
  131. __free_page(gdev->guest_mappings_dummy_page);
  132. gdev->guest_mappings_dummy_page = NULL;
  133. }
  134. /**
  135. * Report the guest information to the host.
  136. * Return: 0 or negative errno value.
  137. * @gdev: The Guest extension device.
  138. */
  139. static int vbg_report_guest_info(struct vbg_dev *gdev)
  140. {
  141. /*
  142. * Allocate and fill in the two guest info reports.
  143. */
  144. struct vmmdev_guest_info *req1 = NULL;
  145. struct vmmdev_guest_info2 *req2 = NULL;
  146. int rc, ret = -ENOMEM;
  147. req1 = vbg_req_alloc(sizeof(*req1), VMMDEVREQ_REPORT_GUEST_INFO);
  148. req2 = vbg_req_alloc(sizeof(*req2), VMMDEVREQ_REPORT_GUEST_INFO2);
  149. if (!req1 || !req2)
  150. goto out_free;
  151. req1->interface_version = VMMDEV_VERSION;
  152. req1->os_type = VMMDEV_OSTYPE_LINUX26;
  153. #if __BITS_PER_LONG == 64
  154. req1->os_type |= VMMDEV_OSTYPE_X64;
  155. #endif
  156. req2->additions_major = VBG_VERSION_MAJOR;
  157. req2->additions_minor = VBG_VERSION_MINOR;
  158. req2->additions_build = VBG_VERSION_BUILD;
  159. req2->additions_revision = VBG_SVN_REV;
  160. /* (no features defined yet) */
  161. req2->additions_features = 0;
  162. strlcpy(req2->name, VBG_VERSION_STRING,
  163. sizeof(req2->name));
  164. /*
  165. * There are two protocols here:
  166. * 1. INFO2 + INFO1. Supported by >=3.2.51.
  167. * 2. INFO1 and optionally INFO2. The old protocol.
  168. *
  169. * We try protocol 2 first. It will fail with VERR_NOT_SUPPORTED
  170. * if not supported by the VMMDev (message ordering requirement).
  171. */
  172. rc = vbg_req_perform(gdev, req2);
  173. if (rc >= 0) {
  174. rc = vbg_req_perform(gdev, req1);
  175. } else if (rc == VERR_NOT_SUPPORTED || rc == VERR_NOT_IMPLEMENTED) {
  176. rc = vbg_req_perform(gdev, req1);
  177. if (rc >= 0) {
  178. rc = vbg_req_perform(gdev, req2);
  179. if (rc == VERR_NOT_IMPLEMENTED)
  180. rc = VINF_SUCCESS;
  181. }
  182. }
  183. ret = vbg_status_code_to_errno(rc);
  184. out_free:
  185. vbg_req_free(req2, sizeof(*req2));
  186. vbg_req_free(req1, sizeof(*req1));
  187. return ret;
  188. }
  189. /**
  190. * Report the guest driver status to the host.
  191. * Return: 0 or negative errno value.
  192. * @gdev: The Guest extension device.
  193. * @active: Flag whether the driver is now active or not.
  194. */
  195. static int vbg_report_driver_status(struct vbg_dev *gdev, bool active)
  196. {
  197. struct vmmdev_guest_status *req;
  198. int rc;
  199. req = vbg_req_alloc(sizeof(*req), VMMDEVREQ_REPORT_GUEST_STATUS);
  200. if (!req)
  201. return -ENOMEM;
  202. req->facility = VBOXGUEST_FACILITY_TYPE_VBOXGUEST_DRIVER;
  203. if (active)
  204. req->status = VBOXGUEST_FACILITY_STATUS_ACTIVE;
  205. else
  206. req->status = VBOXGUEST_FACILITY_STATUS_INACTIVE;
  207. req->flags = 0;
  208. rc = vbg_req_perform(gdev, req);
  209. if (rc == VERR_NOT_IMPLEMENTED) /* Compatibility with older hosts. */
  210. rc = VINF_SUCCESS;
  211. vbg_req_free(req, sizeof(*req));
  212. return vbg_status_code_to_errno(rc);
  213. }
  214. /**
  215. * Inflate the balloon by one chunk. The caller owns the balloon mutex.
  216. * Return: 0 or negative errno value.
  217. * @gdev: The Guest extension device.
  218. * @chunk_idx: Index of the chunk.
  219. */
  220. static int vbg_balloon_inflate(struct vbg_dev *gdev, u32 chunk_idx)
  221. {
  222. struct vmmdev_memballoon_change *req = gdev->mem_balloon.change_req;
  223. struct page **pages;
  224. int i, rc, ret;
  225. pages = kmalloc_array(VMMDEV_MEMORY_BALLOON_CHUNK_PAGES,
  226. sizeof(*pages),
  227. GFP_KERNEL | __GFP_NOWARN);
  228. if (!pages)
  229. return -ENOMEM;
  230. req->header.size = sizeof(*req);
  231. req->inflate = true;
  232. req->pages = VMMDEV_MEMORY_BALLOON_CHUNK_PAGES;
  233. for (i = 0; i < VMMDEV_MEMORY_BALLOON_CHUNK_PAGES; i++) {
  234. pages[i] = alloc_page(GFP_KERNEL | __GFP_NOWARN);
  235. if (!pages[i]) {
  236. ret = -ENOMEM;
  237. goto out_error;
  238. }
  239. req->phys_page[i] = page_to_phys(pages[i]);
  240. }
  241. rc = vbg_req_perform(gdev, req);
  242. if (rc < 0) {
  243. vbg_err("%s error, rc: %d\n", __func__, rc);
  244. ret = vbg_status_code_to_errno(rc);
  245. goto out_error;
  246. }
  247. gdev->mem_balloon.pages[chunk_idx] = pages;
  248. return 0;
  249. out_error:
  250. while (--i >= 0)
  251. __free_page(pages[i]);
  252. kfree(pages);
  253. return ret;
  254. }
  255. /**
  256. * Deflate the balloon by one chunk. The caller owns the balloon mutex.
  257. * Return: 0 or negative errno value.
  258. * @gdev: The Guest extension device.
  259. * @chunk_idx: Index of the chunk.
  260. */
  261. static int vbg_balloon_deflate(struct vbg_dev *gdev, u32 chunk_idx)
  262. {
  263. struct vmmdev_memballoon_change *req = gdev->mem_balloon.change_req;
  264. struct page **pages = gdev->mem_balloon.pages[chunk_idx];
  265. int i, rc;
  266. req->header.size = sizeof(*req);
  267. req->inflate = false;
  268. req->pages = VMMDEV_MEMORY_BALLOON_CHUNK_PAGES;
  269. for (i = 0; i < VMMDEV_MEMORY_BALLOON_CHUNK_PAGES; i++)
  270. req->phys_page[i] = page_to_phys(pages[i]);
  271. rc = vbg_req_perform(gdev, req);
  272. if (rc < 0) {
  273. vbg_err("%s error, rc: %d\n", __func__, rc);
  274. return vbg_status_code_to_errno(rc);
  275. }
  276. for (i = 0; i < VMMDEV_MEMORY_BALLOON_CHUNK_PAGES; i++)
  277. __free_page(pages[i]);
  278. kfree(pages);
  279. gdev->mem_balloon.pages[chunk_idx] = NULL;
  280. return 0;
  281. }
  282. /**
  283. * Respond to VMMDEV_EVENT_BALLOON_CHANGE_REQUEST events, query the size
  284. * the host wants the balloon to be and adjust accordingly.
  285. */
  286. static void vbg_balloon_work(struct work_struct *work)
  287. {
  288. struct vbg_dev *gdev =
  289. container_of(work, struct vbg_dev, mem_balloon.work);
  290. struct vmmdev_memballoon_info *req = gdev->mem_balloon.get_req;
  291. u32 i, chunks;
  292. int rc, ret;
  293. /*
  294. * Setting this bit means that we request the value from the host and
  295. * change the guest memory balloon according to the returned value.
  296. */
  297. req->event_ack = VMMDEV_EVENT_BALLOON_CHANGE_REQUEST;
  298. rc = vbg_req_perform(gdev, req);
  299. if (rc < 0) {
  300. vbg_err("%s error, rc: %d)\n", __func__, rc);
  301. return;
  302. }
  303. /*
  304. * The host always returns the same maximum amount of chunks, so
  305. * we do this once.
  306. */
  307. if (!gdev->mem_balloon.max_chunks) {
  308. gdev->mem_balloon.pages =
  309. devm_kcalloc(gdev->dev, req->phys_mem_chunks,
  310. sizeof(struct page **), GFP_KERNEL);
  311. if (!gdev->mem_balloon.pages)
  312. return;
  313. gdev->mem_balloon.max_chunks = req->phys_mem_chunks;
  314. }
  315. chunks = req->balloon_chunks;
  316. if (chunks > gdev->mem_balloon.max_chunks) {
  317. vbg_err("%s: illegal balloon size %u (max=%u)\n",
  318. __func__, chunks, gdev->mem_balloon.max_chunks);
  319. return;
  320. }
  321. if (chunks > gdev->mem_balloon.chunks) {
  322. /* inflate */
  323. for (i = gdev->mem_balloon.chunks; i < chunks; i++) {
  324. ret = vbg_balloon_inflate(gdev, i);
  325. if (ret < 0)
  326. return;
  327. gdev->mem_balloon.chunks++;
  328. }
  329. } else {
  330. /* deflate */
  331. for (i = gdev->mem_balloon.chunks; i-- > chunks;) {
  332. ret = vbg_balloon_deflate(gdev, i);
  333. if (ret < 0)
  334. return;
  335. gdev->mem_balloon.chunks--;
  336. }
  337. }
  338. }
  339. /**
  340. * Callback for heartbeat timer.
  341. */
  342. static void vbg_heartbeat_timer(struct timer_list *t)
  343. {
  344. struct vbg_dev *gdev = from_timer(gdev, t, heartbeat_timer);
  345. vbg_req_perform(gdev, gdev->guest_heartbeat_req);
  346. mod_timer(&gdev->heartbeat_timer,
  347. msecs_to_jiffies(gdev->heartbeat_interval_ms));
  348. }
  349. /**
  350. * Configure the host to check guest's heartbeat
  351. * and get heartbeat interval from the host.
  352. * Return: 0 or negative errno value.
  353. * @gdev: The Guest extension device.
  354. * @enabled: Set true to enable guest heartbeat checks on host.
  355. */
  356. static int vbg_heartbeat_host_config(struct vbg_dev *gdev, bool enabled)
  357. {
  358. struct vmmdev_heartbeat *req;
  359. int rc;
  360. req = vbg_req_alloc(sizeof(*req), VMMDEVREQ_HEARTBEAT_CONFIGURE);
  361. if (!req)
  362. return -ENOMEM;
  363. req->enabled = enabled;
  364. req->interval_ns = 0;
  365. rc = vbg_req_perform(gdev, req);
  366. do_div(req->interval_ns, 1000000); /* ns -> ms */
  367. gdev->heartbeat_interval_ms = req->interval_ns;
  368. vbg_req_free(req, sizeof(*req));
  369. return vbg_status_code_to_errno(rc);
  370. }
  371. /**
  372. * Initializes the heartbeat timer. This feature may be disabled by the host.
  373. * Return: 0 or negative errno value.
  374. * @gdev: The Guest extension device.
  375. */
  376. static int vbg_heartbeat_init(struct vbg_dev *gdev)
  377. {
  378. int ret;
  379. /* Make sure that heartbeat checking is disabled if we fail. */
  380. ret = vbg_heartbeat_host_config(gdev, false);
  381. if (ret < 0)
  382. return ret;
  383. ret = vbg_heartbeat_host_config(gdev, true);
  384. if (ret < 0)
  385. return ret;
  386. gdev->guest_heartbeat_req = vbg_req_alloc(
  387. sizeof(*gdev->guest_heartbeat_req),
  388. VMMDEVREQ_GUEST_HEARTBEAT);
  389. if (!gdev->guest_heartbeat_req)
  390. return -ENOMEM;
  391. vbg_info("%s: Setting up heartbeat to trigger every %d milliseconds\n",
  392. __func__, gdev->heartbeat_interval_ms);
  393. mod_timer(&gdev->heartbeat_timer, 0);
  394. return 0;
  395. }
  396. /**
  397. * Cleanup hearbeat code, stop HB timer and disable host heartbeat checking.
  398. * @gdev: The Guest extension device.
  399. */
  400. static void vbg_heartbeat_exit(struct vbg_dev *gdev)
  401. {
  402. del_timer_sync(&gdev->heartbeat_timer);
  403. vbg_heartbeat_host_config(gdev, false);
  404. vbg_req_free(gdev->guest_heartbeat_req,
  405. sizeof(*gdev->guest_heartbeat_req));
  406. }
  407. /**
  408. * Applies a change to the bit usage tracker.
  409. * Return: true if the mask changed, false if not.
  410. * @tracker: The bit usage tracker.
  411. * @changed: The bits to change.
  412. * @previous: The previous value of the bits.
  413. */
  414. static bool vbg_track_bit_usage(struct vbg_bit_usage_tracker *tracker,
  415. u32 changed, u32 previous)
  416. {
  417. bool global_change = false;
  418. while (changed) {
  419. u32 bit = ffs(changed) - 1;
  420. u32 bitmask = BIT(bit);
  421. if (bitmask & previous) {
  422. tracker->per_bit_usage[bit] -= 1;
  423. if (tracker->per_bit_usage[bit] == 0) {
  424. global_change = true;
  425. tracker->mask &= ~bitmask;
  426. }
  427. } else {
  428. tracker->per_bit_usage[bit] += 1;
  429. if (tracker->per_bit_usage[bit] == 1) {
  430. global_change = true;
  431. tracker->mask |= bitmask;
  432. }
  433. }
  434. changed &= ~bitmask;
  435. }
  436. return global_change;
  437. }
  438. /**
  439. * Init and termination worker for resetting the (host) event filter on the host
  440. * Return: 0 or negative errno value.
  441. * @gdev: The Guest extension device.
  442. * @fixed_events: Fixed events (init time).
  443. */
  444. static int vbg_reset_host_event_filter(struct vbg_dev *gdev,
  445. u32 fixed_events)
  446. {
  447. struct vmmdev_mask *req;
  448. int rc;
  449. req = vbg_req_alloc(sizeof(*req), VMMDEVREQ_CTL_GUEST_FILTER_MASK);
  450. if (!req)
  451. return -ENOMEM;
  452. req->not_mask = U32_MAX & ~fixed_events;
  453. req->or_mask = fixed_events;
  454. rc = vbg_req_perform(gdev, req);
  455. if (rc < 0)
  456. vbg_err("%s error, rc: %d\n", __func__, rc);
  457. vbg_req_free(req, sizeof(*req));
  458. return vbg_status_code_to_errno(rc);
  459. }
  460. /**
  461. * Changes the event filter mask for the given session.
  462. *
  463. * This is called in response to VBG_IOCTL_CHANGE_FILTER_MASK as well as to
  464. * do session cleanup. Takes the session spinlock.
  465. *
  466. * Return: 0 or negative errno value.
  467. * @gdev: The Guest extension device.
  468. * @session: The session.
  469. * @or_mask: The events to add.
  470. * @not_mask: The events to remove.
  471. * @session_termination: Set if we're called by the session cleanup code.
  472. * This tweaks the error handling so we perform
  473. * proper session cleanup even if the host
  474. * misbehaves.
  475. */
  476. static int vbg_set_session_event_filter(struct vbg_dev *gdev,
  477. struct vbg_session *session,
  478. u32 or_mask, u32 not_mask,
  479. bool session_termination)
  480. {
  481. struct vmmdev_mask *req;
  482. u32 changed, previous;
  483. int rc, ret = 0;
  484. /* Allocate a request buffer before taking the spinlock */
  485. req = vbg_req_alloc(sizeof(*req), VMMDEVREQ_CTL_GUEST_FILTER_MASK);
  486. if (!req) {
  487. if (!session_termination)
  488. return -ENOMEM;
  489. /* Ignore allocation failure, we must do session cleanup. */
  490. }
  491. mutex_lock(&gdev->session_mutex);
  492. /* Apply the changes to the session mask. */
  493. previous = session->event_filter;
  494. session->event_filter |= or_mask;
  495. session->event_filter &= ~not_mask;
  496. /* If anything actually changed, update the global usage counters. */
  497. changed = previous ^ session->event_filter;
  498. if (!changed)
  499. goto out;
  500. vbg_track_bit_usage(&gdev->event_filter_tracker, changed, previous);
  501. or_mask = gdev->fixed_events | gdev->event_filter_tracker.mask;
  502. if (gdev->event_filter_host == or_mask || !req)
  503. goto out;
  504. gdev->event_filter_host = or_mask;
  505. req->or_mask = or_mask;
  506. req->not_mask = ~or_mask;
  507. rc = vbg_req_perform(gdev, req);
  508. if (rc < 0) {
  509. ret = vbg_status_code_to_errno(rc);
  510. /* Failed, roll back (unless it's session termination time). */
  511. gdev->event_filter_host = U32_MAX;
  512. if (session_termination)
  513. goto out;
  514. vbg_track_bit_usage(&gdev->event_filter_tracker, changed,
  515. session->event_filter);
  516. session->event_filter = previous;
  517. }
  518. out:
  519. mutex_unlock(&gdev->session_mutex);
  520. vbg_req_free(req, sizeof(*req));
  521. return ret;
  522. }
  523. /**
  524. * Init and termination worker for set guest capabilities to zero on the host.
  525. * Return: 0 or negative errno value.
  526. * @gdev: The Guest extension device.
  527. */
  528. static int vbg_reset_host_capabilities(struct vbg_dev *gdev)
  529. {
  530. struct vmmdev_mask *req;
  531. int rc;
  532. req = vbg_req_alloc(sizeof(*req), VMMDEVREQ_SET_GUEST_CAPABILITIES);
  533. if (!req)
  534. return -ENOMEM;
  535. req->not_mask = U32_MAX;
  536. req->or_mask = 0;
  537. rc = vbg_req_perform(gdev, req);
  538. if (rc < 0)
  539. vbg_err("%s error, rc: %d\n", __func__, rc);
  540. vbg_req_free(req, sizeof(*req));
  541. return vbg_status_code_to_errno(rc);
  542. }
  543. /**
  544. * Sets the guest capabilities for a session. Takes the session spinlock.
  545. * Return: 0 or negative errno value.
  546. * @gdev: The Guest extension device.
  547. * @session: The session.
  548. * @or_mask: The capabilities to add.
  549. * @not_mask: The capabilities to remove.
  550. * @session_termination: Set if we're called by the session cleanup code.
  551. * This tweaks the error handling so we perform
  552. * proper session cleanup even if the host
  553. * misbehaves.
  554. */
  555. static int vbg_set_session_capabilities(struct vbg_dev *gdev,
  556. struct vbg_session *session,
  557. u32 or_mask, u32 not_mask,
  558. bool session_termination)
  559. {
  560. struct vmmdev_mask *req;
  561. u32 changed, previous;
  562. int rc, ret = 0;
  563. /* Allocate a request buffer before taking the spinlock */
  564. req = vbg_req_alloc(sizeof(*req), VMMDEVREQ_SET_GUEST_CAPABILITIES);
  565. if (!req) {
  566. if (!session_termination)
  567. return -ENOMEM;
  568. /* Ignore allocation failure, we must do session cleanup. */
  569. }
  570. mutex_lock(&gdev->session_mutex);
  571. /* Apply the changes to the session mask. */
  572. previous = session->guest_caps;
  573. session->guest_caps |= or_mask;
  574. session->guest_caps &= ~not_mask;
  575. /* If anything actually changed, update the global usage counters. */
  576. changed = previous ^ session->guest_caps;
  577. if (!changed)
  578. goto out;
  579. vbg_track_bit_usage(&gdev->guest_caps_tracker, changed, previous);
  580. or_mask = gdev->guest_caps_tracker.mask;
  581. if (gdev->guest_caps_host == or_mask || !req)
  582. goto out;
  583. gdev->guest_caps_host = or_mask;
  584. req->or_mask = or_mask;
  585. req->not_mask = ~or_mask;
  586. rc = vbg_req_perform(gdev, req);
  587. if (rc < 0) {
  588. ret = vbg_status_code_to_errno(rc);
  589. /* Failed, roll back (unless it's session termination time). */
  590. gdev->guest_caps_host = U32_MAX;
  591. if (session_termination)
  592. goto out;
  593. vbg_track_bit_usage(&gdev->guest_caps_tracker, changed,
  594. session->guest_caps);
  595. session->guest_caps = previous;
  596. }
  597. out:
  598. mutex_unlock(&gdev->session_mutex);
  599. vbg_req_free(req, sizeof(*req));
  600. return ret;
  601. }
  602. /**
  603. * vbg_query_host_version get the host feature mask and version information.
  604. * Return: 0 or negative errno value.
  605. * @gdev: The Guest extension device.
  606. */
  607. static int vbg_query_host_version(struct vbg_dev *gdev)
  608. {
  609. struct vmmdev_host_version *req;
  610. int rc, ret;
  611. req = vbg_req_alloc(sizeof(*req), VMMDEVREQ_GET_HOST_VERSION);
  612. if (!req)
  613. return -ENOMEM;
  614. rc = vbg_req_perform(gdev, req);
  615. ret = vbg_status_code_to_errno(rc);
  616. if (ret) {
  617. vbg_err("%s error: %d\n", __func__, rc);
  618. goto out;
  619. }
  620. snprintf(gdev->host_version, sizeof(gdev->host_version), "%u.%u.%ur%u",
  621. req->major, req->minor, req->build, req->revision);
  622. gdev->host_features = req->features;
  623. vbg_info("vboxguest: host-version: %s %#x\n", gdev->host_version,
  624. gdev->host_features);
  625. if (!(req->features & VMMDEV_HVF_HGCM_PHYS_PAGE_LIST)) {
  626. vbg_err("vboxguest: Error host too old (does not support page-lists)\n");
  627. ret = -ENODEV;
  628. }
  629. out:
  630. vbg_req_free(req, sizeof(*req));
  631. return ret;
  632. }
  633. /**
  634. * Initializes the VBoxGuest device extension when the
  635. * device driver is loaded.
  636. *
  637. * The native code locates the VMMDev on the PCI bus and retrieve
  638. * the MMIO and I/O port ranges, this function will take care of
  639. * mapping the MMIO memory (if present). Upon successful return
  640. * the native code should set up the interrupt handler.
  641. *
  642. * Return: 0 or negative errno value.
  643. *
  644. * @gdev: The Guest extension device.
  645. * @fixed_events: Events that will be enabled upon init and no client
  646. * will ever be allowed to mask.
  647. */
  648. int vbg_core_init(struct vbg_dev *gdev, u32 fixed_events)
  649. {
  650. int ret = -ENOMEM;
  651. gdev->fixed_events = fixed_events | VMMDEV_EVENT_HGCM;
  652. gdev->event_filter_host = U32_MAX; /* forces a report */
  653. gdev->guest_caps_host = U32_MAX; /* forces a report */
  654. init_waitqueue_head(&gdev->event_wq);
  655. init_waitqueue_head(&gdev->hgcm_wq);
  656. spin_lock_init(&gdev->event_spinlock);
  657. mutex_init(&gdev->session_mutex);
  658. mutex_init(&gdev->cancel_req_mutex);
  659. timer_setup(&gdev->heartbeat_timer, vbg_heartbeat_timer, 0);
  660. INIT_WORK(&gdev->mem_balloon.work, vbg_balloon_work);
  661. gdev->mem_balloon.get_req =
  662. vbg_req_alloc(sizeof(*gdev->mem_balloon.get_req),
  663. VMMDEVREQ_GET_MEMBALLOON_CHANGE_REQ);
  664. gdev->mem_balloon.change_req =
  665. vbg_req_alloc(sizeof(*gdev->mem_balloon.change_req),
  666. VMMDEVREQ_CHANGE_MEMBALLOON);
  667. gdev->cancel_req =
  668. vbg_req_alloc(sizeof(*(gdev->cancel_req)),
  669. VMMDEVREQ_HGCM_CANCEL2);
  670. gdev->ack_events_req =
  671. vbg_req_alloc(sizeof(*gdev->ack_events_req),
  672. VMMDEVREQ_ACKNOWLEDGE_EVENTS);
  673. gdev->mouse_status_req =
  674. vbg_req_alloc(sizeof(*gdev->mouse_status_req),
  675. VMMDEVREQ_GET_MOUSE_STATUS);
  676. if (!gdev->mem_balloon.get_req || !gdev->mem_balloon.change_req ||
  677. !gdev->cancel_req || !gdev->ack_events_req ||
  678. !gdev->mouse_status_req)
  679. goto err_free_reqs;
  680. ret = vbg_query_host_version(gdev);
  681. if (ret)
  682. goto err_free_reqs;
  683. ret = vbg_report_guest_info(gdev);
  684. if (ret) {
  685. vbg_err("vboxguest: vbg_report_guest_info error: %d\n", ret);
  686. goto err_free_reqs;
  687. }
  688. ret = vbg_reset_host_event_filter(gdev, gdev->fixed_events);
  689. if (ret) {
  690. vbg_err("vboxguest: Error setting fixed event filter: %d\n",
  691. ret);
  692. goto err_free_reqs;
  693. }
  694. ret = vbg_reset_host_capabilities(gdev);
  695. if (ret) {
  696. vbg_err("vboxguest: Error clearing guest capabilities: %d\n",
  697. ret);
  698. goto err_free_reqs;
  699. }
  700. ret = vbg_core_set_mouse_status(gdev, 0);
  701. if (ret) {
  702. vbg_err("vboxguest: Error clearing mouse status: %d\n", ret);
  703. goto err_free_reqs;
  704. }
  705. /* These may fail without requiring the driver init to fail. */
  706. vbg_guest_mappings_init(gdev);
  707. vbg_heartbeat_init(gdev);
  708. /* All Done! */
  709. ret = vbg_report_driver_status(gdev, true);
  710. if (ret < 0)
  711. vbg_err("vboxguest: Error reporting driver status: %d\n", ret);
  712. return 0;
  713. err_free_reqs:
  714. vbg_req_free(gdev->mouse_status_req,
  715. sizeof(*gdev->mouse_status_req));
  716. vbg_req_free(gdev->ack_events_req,
  717. sizeof(*gdev->ack_events_req));
  718. vbg_req_free(gdev->cancel_req,
  719. sizeof(*gdev->cancel_req));
  720. vbg_req_free(gdev->mem_balloon.change_req,
  721. sizeof(*gdev->mem_balloon.change_req));
  722. vbg_req_free(gdev->mem_balloon.get_req,
  723. sizeof(*gdev->mem_balloon.get_req));
  724. return ret;
  725. }
  726. /**
  727. * Call this on exit to clean-up vboxguest-core managed resources.
  728. *
  729. * The native code should call this before the driver is loaded,
  730. * but don't call this on shutdown.
  731. * @gdev: The Guest extension device.
  732. */
  733. void vbg_core_exit(struct vbg_dev *gdev)
  734. {
  735. vbg_heartbeat_exit(gdev);
  736. vbg_guest_mappings_exit(gdev);
  737. /* Clear the host flags (mouse status etc). */
  738. vbg_reset_host_event_filter(gdev, 0);
  739. vbg_reset_host_capabilities(gdev);
  740. vbg_core_set_mouse_status(gdev, 0);
  741. vbg_req_free(gdev->mouse_status_req,
  742. sizeof(*gdev->mouse_status_req));
  743. vbg_req_free(gdev->ack_events_req,
  744. sizeof(*gdev->ack_events_req));
  745. vbg_req_free(gdev->cancel_req,
  746. sizeof(*gdev->cancel_req));
  747. vbg_req_free(gdev->mem_balloon.change_req,
  748. sizeof(*gdev->mem_balloon.change_req));
  749. vbg_req_free(gdev->mem_balloon.get_req,
  750. sizeof(*gdev->mem_balloon.get_req));
  751. }
  752. /**
  753. * Creates a VBoxGuest user session.
  754. *
  755. * vboxguest_linux.c calls this when userspace opens the char-device.
  756. * Return: A pointer to the new session or an ERR_PTR on error.
  757. * @gdev: The Guest extension device.
  758. * @user: Set if this is a session for the vboxuser device.
  759. */
  760. struct vbg_session *vbg_core_open_session(struct vbg_dev *gdev, bool user)
  761. {
  762. struct vbg_session *session;
  763. session = kzalloc(sizeof(*session), GFP_KERNEL);
  764. if (!session)
  765. return ERR_PTR(-ENOMEM);
  766. session->gdev = gdev;
  767. session->user_session = user;
  768. return session;
  769. }
  770. /**
  771. * Closes a VBoxGuest session.
  772. * @session: The session to close (and free).
  773. */
  774. void vbg_core_close_session(struct vbg_session *session)
  775. {
  776. struct vbg_dev *gdev = session->gdev;
  777. int i, rc;
  778. vbg_set_session_capabilities(gdev, session, 0, U32_MAX, true);
  779. vbg_set_session_event_filter(gdev, session, 0, U32_MAX, true);
  780. for (i = 0; i < ARRAY_SIZE(session->hgcm_client_ids); i++) {
  781. if (!session->hgcm_client_ids[i])
  782. continue;
  783. vbg_hgcm_disconnect(gdev, session->hgcm_client_ids[i], &rc);
  784. }
  785. kfree(session);
  786. }
  787. static int vbg_ioctl_chk(struct vbg_ioctl_hdr *hdr, size_t in_size,
  788. size_t out_size)
  789. {
  790. if (hdr->size_in != (sizeof(*hdr) + in_size) ||
  791. hdr->size_out != (sizeof(*hdr) + out_size))
  792. return -EINVAL;
  793. return 0;
  794. }
  795. static int vbg_ioctl_driver_version_info(
  796. struct vbg_ioctl_driver_version_info *info)
  797. {
  798. const u16 vbg_maj_version = VBG_IOC_VERSION >> 16;
  799. u16 min_maj_version, req_maj_version;
  800. if (vbg_ioctl_chk(&info->hdr, sizeof(info->u.in), sizeof(info->u.out)))
  801. return -EINVAL;
  802. req_maj_version = info->u.in.req_version >> 16;
  803. min_maj_version = info->u.in.min_version >> 16;
  804. if (info->u.in.min_version > info->u.in.req_version ||
  805. min_maj_version != req_maj_version)
  806. return -EINVAL;
  807. if (info->u.in.min_version <= VBG_IOC_VERSION &&
  808. min_maj_version == vbg_maj_version) {
  809. info->u.out.session_version = VBG_IOC_VERSION;
  810. } else {
  811. info->u.out.session_version = U32_MAX;
  812. info->hdr.rc = VERR_VERSION_MISMATCH;
  813. }
  814. info->u.out.driver_version = VBG_IOC_VERSION;
  815. info->u.out.driver_revision = 0;
  816. info->u.out.reserved1 = 0;
  817. info->u.out.reserved2 = 0;
  818. return 0;
  819. }
  820. static bool vbg_wait_event_cond(struct vbg_dev *gdev,
  821. struct vbg_session *session,
  822. u32 event_mask)
  823. {
  824. unsigned long flags;
  825. bool wakeup;
  826. u32 events;
  827. spin_lock_irqsave(&gdev->event_spinlock, flags);
  828. events = gdev->pending_events & event_mask;
  829. wakeup = events || session->cancel_waiters;
  830. spin_unlock_irqrestore(&gdev->event_spinlock, flags);
  831. return wakeup;
  832. }
  833. /* Must be called with the event_lock held */
  834. static u32 vbg_consume_events_locked(struct vbg_dev *gdev,
  835. struct vbg_session *session,
  836. u32 event_mask)
  837. {
  838. u32 events = gdev->pending_events & event_mask;
  839. gdev->pending_events &= ~events;
  840. return events;
  841. }
  842. static int vbg_ioctl_wait_for_events(struct vbg_dev *gdev,
  843. struct vbg_session *session,
  844. struct vbg_ioctl_wait_for_events *wait)
  845. {
  846. u32 timeout_ms = wait->u.in.timeout_ms;
  847. u32 event_mask = wait->u.in.events;
  848. unsigned long flags;
  849. long timeout;
  850. int ret = 0;
  851. if (vbg_ioctl_chk(&wait->hdr, sizeof(wait->u.in), sizeof(wait->u.out)))
  852. return -EINVAL;
  853. if (timeout_ms == U32_MAX)
  854. timeout = MAX_SCHEDULE_TIMEOUT;
  855. else
  856. timeout = msecs_to_jiffies(timeout_ms);
  857. wait->u.out.events = 0;
  858. do {
  859. timeout = wait_event_interruptible_timeout(
  860. gdev->event_wq,
  861. vbg_wait_event_cond(gdev, session, event_mask),
  862. timeout);
  863. spin_lock_irqsave(&gdev->event_spinlock, flags);
  864. if (timeout < 0 || session->cancel_waiters) {
  865. ret = -EINTR;
  866. } else if (timeout == 0) {
  867. ret = -ETIMEDOUT;
  868. } else {
  869. wait->u.out.events =
  870. vbg_consume_events_locked(gdev, session, event_mask);
  871. }
  872. spin_unlock_irqrestore(&gdev->event_spinlock, flags);
  873. /*
  874. * Someone else may have consumed the event(s) first, in
  875. * which case we go back to waiting.
  876. */
  877. } while (ret == 0 && wait->u.out.events == 0);
  878. return ret;
  879. }
  880. static int vbg_ioctl_interrupt_all_wait_events(struct vbg_dev *gdev,
  881. struct vbg_session *session,
  882. struct vbg_ioctl_hdr *hdr)
  883. {
  884. unsigned long flags;
  885. if (hdr->size_in != sizeof(*hdr) || hdr->size_out != sizeof(*hdr))
  886. return -EINVAL;
  887. spin_lock_irqsave(&gdev->event_spinlock, flags);
  888. session->cancel_waiters = true;
  889. spin_unlock_irqrestore(&gdev->event_spinlock, flags);
  890. wake_up(&gdev->event_wq);
  891. return 0;
  892. }
  893. /**
  894. * Checks if the VMM request is allowed in the context of the given session.
  895. * Return: 0 or negative errno value.
  896. * @gdev: The Guest extension device.
  897. * @session: The calling session.
  898. * @req: The request.
  899. */
  900. static int vbg_req_allowed(struct vbg_dev *gdev, struct vbg_session *session,
  901. const struct vmmdev_request_header *req)
  902. {
  903. const struct vmmdev_guest_status *guest_status;
  904. bool trusted_apps_only;
  905. switch (req->request_type) {
  906. /* Trusted users apps only. */
  907. case VMMDEVREQ_QUERY_CREDENTIALS:
  908. case VMMDEVREQ_REPORT_CREDENTIALS_JUDGEMENT:
  909. case VMMDEVREQ_REGISTER_SHARED_MODULE:
  910. case VMMDEVREQ_UNREGISTER_SHARED_MODULE:
  911. case VMMDEVREQ_WRITE_COREDUMP:
  912. case VMMDEVREQ_GET_CPU_HOTPLUG_REQ:
  913. case VMMDEVREQ_SET_CPU_HOTPLUG_STATUS:
  914. case VMMDEVREQ_CHECK_SHARED_MODULES:
  915. case VMMDEVREQ_GET_PAGE_SHARING_STATUS:
  916. case VMMDEVREQ_DEBUG_IS_PAGE_SHARED:
  917. case VMMDEVREQ_REPORT_GUEST_STATS:
  918. case VMMDEVREQ_REPORT_GUEST_USER_STATE:
  919. case VMMDEVREQ_GET_STATISTICS_CHANGE_REQ:
  920. trusted_apps_only = true;
  921. break;
  922. /* Anyone. */
  923. case VMMDEVREQ_GET_MOUSE_STATUS:
  924. case VMMDEVREQ_SET_MOUSE_STATUS:
  925. case VMMDEVREQ_SET_POINTER_SHAPE:
  926. case VMMDEVREQ_GET_HOST_VERSION:
  927. case VMMDEVREQ_IDLE:
  928. case VMMDEVREQ_GET_HOST_TIME:
  929. case VMMDEVREQ_SET_POWER_STATUS:
  930. case VMMDEVREQ_ACKNOWLEDGE_EVENTS:
  931. case VMMDEVREQ_CTL_GUEST_FILTER_MASK:
  932. case VMMDEVREQ_REPORT_GUEST_STATUS:
  933. case VMMDEVREQ_GET_DISPLAY_CHANGE_REQ:
  934. case VMMDEVREQ_VIDEMODE_SUPPORTED:
  935. case VMMDEVREQ_GET_HEIGHT_REDUCTION:
  936. case VMMDEVREQ_GET_DISPLAY_CHANGE_REQ2:
  937. case VMMDEVREQ_VIDEMODE_SUPPORTED2:
  938. case VMMDEVREQ_VIDEO_ACCEL_ENABLE:
  939. case VMMDEVREQ_VIDEO_ACCEL_FLUSH:
  940. case VMMDEVREQ_VIDEO_SET_VISIBLE_REGION:
  941. case VMMDEVREQ_GET_DISPLAY_CHANGE_REQEX:
  942. case VMMDEVREQ_GET_SEAMLESS_CHANGE_REQ:
  943. case VMMDEVREQ_GET_VRDPCHANGE_REQ:
  944. case VMMDEVREQ_LOG_STRING:
  945. case VMMDEVREQ_GET_SESSION_ID:
  946. trusted_apps_only = false;
  947. break;
  948. /* Depends on the request parameters... */
  949. case VMMDEVREQ_REPORT_GUEST_CAPABILITIES:
  950. guest_status = (const struct vmmdev_guest_status *)req;
  951. switch (guest_status->facility) {
  952. case VBOXGUEST_FACILITY_TYPE_ALL:
  953. case VBOXGUEST_FACILITY_TYPE_VBOXGUEST_DRIVER:
  954. vbg_err("Denying userspace vmm report guest cap. call facility %#08x\n",
  955. guest_status->facility);
  956. return -EPERM;
  957. case VBOXGUEST_FACILITY_TYPE_VBOX_SERVICE:
  958. trusted_apps_only = true;
  959. break;
  960. case VBOXGUEST_FACILITY_TYPE_VBOX_TRAY_CLIENT:
  961. case VBOXGUEST_FACILITY_TYPE_SEAMLESS:
  962. case VBOXGUEST_FACILITY_TYPE_GRAPHICS:
  963. default:
  964. trusted_apps_only = false;
  965. break;
  966. }
  967. break;
  968. /* Anything else is not allowed. */
  969. default:
  970. vbg_err("Denying userspace vmm call type %#08x\n",
  971. req->request_type);
  972. return -EPERM;
  973. }
  974. if (trusted_apps_only && session->user_session) {
  975. vbg_err("Denying userspace vmm call type %#08x through vboxuser device node\n",
  976. req->request_type);
  977. return -EPERM;
  978. }
  979. return 0;
  980. }
  981. static int vbg_ioctl_vmmrequest(struct vbg_dev *gdev,
  982. struct vbg_session *session, void *data)
  983. {
  984. struct vbg_ioctl_hdr *hdr = data;
  985. int ret;
  986. if (hdr->size_in != hdr->size_out)
  987. return -EINVAL;
  988. if (hdr->size_in > VMMDEV_MAX_VMMDEVREQ_SIZE)
  989. return -E2BIG;
  990. if (hdr->type == VBG_IOCTL_HDR_TYPE_DEFAULT)
  991. return -EINVAL;
  992. ret = vbg_req_allowed(gdev, session, data);
  993. if (ret < 0)
  994. return ret;
  995. vbg_req_perform(gdev, data);
  996. WARN_ON(hdr->rc == VINF_HGCM_ASYNC_EXECUTE);
  997. return 0;
  998. }
  999. static int vbg_ioctl_hgcm_connect(struct vbg_dev *gdev,
  1000. struct vbg_session *session,
  1001. struct vbg_ioctl_hgcm_connect *conn)
  1002. {
  1003. u32 client_id;
  1004. int i, ret;
  1005. if (vbg_ioctl_chk(&conn->hdr, sizeof(conn->u.in), sizeof(conn->u.out)))
  1006. return -EINVAL;
  1007. /* Find a free place in the sessions clients array and claim it */
  1008. mutex_lock(&gdev->session_mutex);
  1009. for (i = 0; i < ARRAY_SIZE(session->hgcm_client_ids); i++) {
  1010. if (!session->hgcm_client_ids[i]) {
  1011. session->hgcm_client_ids[i] = U32_MAX;
  1012. break;
  1013. }
  1014. }
  1015. mutex_unlock(&gdev->session_mutex);
  1016. if (i >= ARRAY_SIZE(session->hgcm_client_ids))
  1017. return -EMFILE;
  1018. ret = vbg_hgcm_connect(gdev, &conn->u.in.loc, &client_id,
  1019. &conn->hdr.rc);
  1020. mutex_lock(&gdev->session_mutex);
  1021. if (ret == 0 && conn->hdr.rc >= 0) {
  1022. conn->u.out.client_id = client_id;
  1023. session->hgcm_client_ids[i] = client_id;
  1024. } else {
  1025. conn->u.out.client_id = 0;
  1026. session->hgcm_client_ids[i] = 0;
  1027. }
  1028. mutex_unlock(&gdev->session_mutex);
  1029. return ret;
  1030. }
  1031. static int vbg_ioctl_hgcm_disconnect(struct vbg_dev *gdev,
  1032. struct vbg_session *session,
  1033. struct vbg_ioctl_hgcm_disconnect *disconn)
  1034. {
  1035. u32 client_id;
  1036. int i, ret;
  1037. if (vbg_ioctl_chk(&disconn->hdr, sizeof(disconn->u.in), 0))
  1038. return -EINVAL;
  1039. client_id = disconn->u.in.client_id;
  1040. if (client_id == 0 || client_id == U32_MAX)
  1041. return -EINVAL;
  1042. mutex_lock(&gdev->session_mutex);
  1043. for (i = 0; i < ARRAY_SIZE(session->hgcm_client_ids); i++) {
  1044. if (session->hgcm_client_ids[i] == client_id) {
  1045. session->hgcm_client_ids[i] = U32_MAX;
  1046. break;
  1047. }
  1048. }
  1049. mutex_unlock(&gdev->session_mutex);
  1050. if (i >= ARRAY_SIZE(session->hgcm_client_ids))
  1051. return -EINVAL;
  1052. ret = vbg_hgcm_disconnect(gdev, client_id, &disconn->hdr.rc);
  1053. mutex_lock(&gdev->session_mutex);
  1054. if (ret == 0 && disconn->hdr.rc >= 0)
  1055. session->hgcm_client_ids[i] = 0;
  1056. else
  1057. session->hgcm_client_ids[i] = client_id;
  1058. mutex_unlock(&gdev->session_mutex);
  1059. return ret;
  1060. }
  1061. static bool vbg_param_valid(enum vmmdev_hgcm_function_parameter_type type)
  1062. {
  1063. switch (type) {
  1064. case VMMDEV_HGCM_PARM_TYPE_32BIT:
  1065. case VMMDEV_HGCM_PARM_TYPE_64BIT:
  1066. case VMMDEV_HGCM_PARM_TYPE_LINADDR:
  1067. case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
  1068. case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
  1069. return true;
  1070. default:
  1071. return false;
  1072. }
  1073. }
  1074. static int vbg_ioctl_hgcm_call(struct vbg_dev *gdev,
  1075. struct vbg_session *session, bool f32bit,
  1076. struct vbg_ioctl_hgcm_call *call)
  1077. {
  1078. size_t actual_size;
  1079. u32 client_id;
  1080. int i, ret;
  1081. if (call->hdr.size_in < sizeof(*call))
  1082. return -EINVAL;
  1083. if (call->hdr.size_in != call->hdr.size_out)
  1084. return -EINVAL;
  1085. if (call->parm_count > VMMDEV_HGCM_MAX_PARMS)
  1086. return -E2BIG;
  1087. client_id = call->client_id;
  1088. if (client_id == 0 || client_id == U32_MAX)
  1089. return -EINVAL;
  1090. actual_size = sizeof(*call);
  1091. if (f32bit)
  1092. actual_size += call->parm_count *
  1093. sizeof(struct vmmdev_hgcm_function_parameter32);
  1094. else
  1095. actual_size += call->parm_count *
  1096. sizeof(struct vmmdev_hgcm_function_parameter);
  1097. if (call->hdr.size_in < actual_size) {
  1098. vbg_debug("VBG_IOCTL_HGCM_CALL: hdr.size_in %d required size is %zd\n",
  1099. call->hdr.size_in, actual_size);
  1100. return -EINVAL;
  1101. }
  1102. call->hdr.size_out = actual_size;
  1103. /* Validate parameter types */
  1104. if (f32bit) {
  1105. struct vmmdev_hgcm_function_parameter32 *parm =
  1106. VBG_IOCTL_HGCM_CALL_PARMS32(call);
  1107. for (i = 0; i < call->parm_count; i++)
  1108. if (!vbg_param_valid(parm[i].type))
  1109. return -EINVAL;
  1110. } else {
  1111. struct vmmdev_hgcm_function_parameter *parm =
  1112. VBG_IOCTL_HGCM_CALL_PARMS(call);
  1113. for (i = 0; i < call->parm_count; i++)
  1114. if (!vbg_param_valid(parm[i].type))
  1115. return -EINVAL;
  1116. }
  1117. /*
  1118. * Validate the client id.
  1119. */
  1120. mutex_lock(&gdev->session_mutex);
  1121. for (i = 0; i < ARRAY_SIZE(session->hgcm_client_ids); i++)
  1122. if (session->hgcm_client_ids[i] == client_id)
  1123. break;
  1124. mutex_unlock(&gdev->session_mutex);
  1125. if (i >= ARRAY_SIZE(session->hgcm_client_ids)) {
  1126. vbg_debug("VBG_IOCTL_HGCM_CALL: INVALID handle. u32Client=%#08x\n",
  1127. client_id);
  1128. return -EINVAL;
  1129. }
  1130. if (IS_ENABLED(CONFIG_COMPAT) && f32bit)
  1131. ret = vbg_hgcm_call32(gdev, client_id,
  1132. call->function, call->timeout_ms,
  1133. VBG_IOCTL_HGCM_CALL_PARMS32(call),
  1134. call->parm_count, &call->hdr.rc);
  1135. else
  1136. ret = vbg_hgcm_call(gdev, client_id,
  1137. call->function, call->timeout_ms,
  1138. VBG_IOCTL_HGCM_CALL_PARMS(call),
  1139. call->parm_count, &call->hdr.rc);
  1140. if (ret == -E2BIG) {
  1141. /* E2BIG needs to be reported through the hdr.rc field. */
  1142. call->hdr.rc = VERR_OUT_OF_RANGE;
  1143. ret = 0;
  1144. }
  1145. if (ret && ret != -EINTR && ret != -ETIMEDOUT)
  1146. vbg_err("VBG_IOCTL_HGCM_CALL error: %d\n", ret);
  1147. return ret;
  1148. }
  1149. static int vbg_ioctl_log(struct vbg_ioctl_log *log)
  1150. {
  1151. if (log->hdr.size_out != sizeof(log->hdr))
  1152. return -EINVAL;
  1153. vbg_info("%.*s", (int)(log->hdr.size_in - sizeof(log->hdr)),
  1154. log->u.in.msg);
  1155. return 0;
  1156. }
  1157. static int vbg_ioctl_change_filter_mask(struct vbg_dev *gdev,
  1158. struct vbg_session *session,
  1159. struct vbg_ioctl_change_filter *filter)
  1160. {
  1161. u32 or_mask, not_mask;
  1162. if (vbg_ioctl_chk(&filter->hdr, sizeof(filter->u.in), 0))
  1163. return -EINVAL;
  1164. or_mask = filter->u.in.or_mask;
  1165. not_mask = filter->u.in.not_mask;
  1166. if ((or_mask | not_mask) & ~VMMDEV_EVENT_VALID_EVENT_MASK)
  1167. return -EINVAL;
  1168. return vbg_set_session_event_filter(gdev, session, or_mask, not_mask,
  1169. false);
  1170. }
  1171. static int vbg_ioctl_change_guest_capabilities(struct vbg_dev *gdev,
  1172. struct vbg_session *session, struct vbg_ioctl_set_guest_caps *caps)
  1173. {
  1174. u32 or_mask, not_mask;
  1175. int ret;
  1176. if (vbg_ioctl_chk(&caps->hdr, sizeof(caps->u.in), sizeof(caps->u.out)))
  1177. return -EINVAL;
  1178. or_mask = caps->u.in.or_mask;
  1179. not_mask = caps->u.in.not_mask;
  1180. if ((or_mask | not_mask) & ~VMMDEV_GUEST_CAPABILITIES_MASK)
  1181. return -EINVAL;
  1182. ret = vbg_set_session_capabilities(gdev, session, or_mask, not_mask,
  1183. false);
  1184. if (ret)
  1185. return ret;
  1186. caps->u.out.session_caps = session->guest_caps;
  1187. caps->u.out.global_caps = gdev->guest_caps_host;
  1188. return 0;
  1189. }
  1190. static int vbg_ioctl_check_balloon(struct vbg_dev *gdev,
  1191. struct vbg_ioctl_check_balloon *balloon_info)
  1192. {
  1193. if (vbg_ioctl_chk(&balloon_info->hdr, 0, sizeof(balloon_info->u.out)))
  1194. return -EINVAL;
  1195. balloon_info->u.out.balloon_chunks = gdev->mem_balloon.chunks;
  1196. /*
  1197. * Under Linux we handle VMMDEV_EVENT_BALLOON_CHANGE_REQUEST
  1198. * events entirely in the kernel, see vbg_core_isr().
  1199. */
  1200. balloon_info->u.out.handle_in_r3 = false;
  1201. return 0;
  1202. }
  1203. static int vbg_ioctl_write_core_dump(struct vbg_dev *gdev,
  1204. struct vbg_ioctl_write_coredump *dump)
  1205. {
  1206. struct vmmdev_write_core_dump *req;
  1207. if (vbg_ioctl_chk(&dump->hdr, sizeof(dump->u.in), 0))
  1208. return -EINVAL;
  1209. req = vbg_req_alloc(sizeof(*req), VMMDEVREQ_WRITE_COREDUMP);
  1210. if (!req)
  1211. return -ENOMEM;
  1212. req->flags = dump->u.in.flags;
  1213. dump->hdr.rc = vbg_req_perform(gdev, req);
  1214. vbg_req_free(req, sizeof(*req));
  1215. return 0;
  1216. }
  1217. /**
  1218. * Common IOCtl for user to kernel communication.
  1219. * Return: 0 or negative errno value.
  1220. * @session: The client session.
  1221. * @req: The requested function.
  1222. * @data: The i/o data buffer, minimum size sizeof(struct vbg_ioctl_hdr).
  1223. */
  1224. int vbg_core_ioctl(struct vbg_session *session, unsigned int req, void *data)
  1225. {
  1226. unsigned int req_no_size = req & ~IOCSIZE_MASK;
  1227. struct vbg_dev *gdev = session->gdev;
  1228. struct vbg_ioctl_hdr *hdr = data;
  1229. bool f32bit = false;
  1230. hdr->rc = VINF_SUCCESS;
  1231. if (!hdr->size_out)
  1232. hdr->size_out = hdr->size_in;
  1233. /*
  1234. * hdr->version and hdr->size_in / hdr->size_out minimum size are
  1235. * already checked by vbg_misc_device_ioctl().
  1236. */
  1237. /* For VMMDEV_REQUEST hdr->type != VBG_IOCTL_HDR_TYPE_DEFAULT */
  1238. if (req_no_size == VBG_IOCTL_VMMDEV_REQUEST(0) ||
  1239. req == VBG_IOCTL_VMMDEV_REQUEST_BIG ||
  1240. req == VBG_IOCTL_VMMDEV_REQUEST_BIG_ALT)
  1241. return vbg_ioctl_vmmrequest(gdev, session, data);
  1242. if (hdr->type != VBG_IOCTL_HDR_TYPE_DEFAULT)
  1243. return -EINVAL;
  1244. /* Fixed size requests. */
  1245. switch (req) {
  1246. case VBG_IOCTL_DRIVER_VERSION_INFO:
  1247. return vbg_ioctl_driver_version_info(data);
  1248. case VBG_IOCTL_HGCM_CONNECT:
  1249. return vbg_ioctl_hgcm_connect(gdev, session, data);
  1250. case VBG_IOCTL_HGCM_DISCONNECT:
  1251. return vbg_ioctl_hgcm_disconnect(gdev, session, data);
  1252. case VBG_IOCTL_WAIT_FOR_EVENTS:
  1253. return vbg_ioctl_wait_for_events(gdev, session, data);
  1254. case VBG_IOCTL_INTERRUPT_ALL_WAIT_FOR_EVENTS:
  1255. return vbg_ioctl_interrupt_all_wait_events(gdev, session, data);
  1256. case VBG_IOCTL_CHANGE_FILTER_MASK:
  1257. return vbg_ioctl_change_filter_mask(gdev, session, data);
  1258. case VBG_IOCTL_CHANGE_GUEST_CAPABILITIES:
  1259. return vbg_ioctl_change_guest_capabilities(gdev, session, data);
  1260. case VBG_IOCTL_CHECK_BALLOON:
  1261. return vbg_ioctl_check_balloon(gdev, data);
  1262. case VBG_IOCTL_WRITE_CORE_DUMP:
  1263. return vbg_ioctl_write_core_dump(gdev, data);
  1264. }
  1265. /* Variable sized requests. */
  1266. switch (req_no_size) {
  1267. #ifdef CONFIG_COMPAT
  1268. case VBG_IOCTL_HGCM_CALL_32(0):
  1269. f32bit = true;
  1270. /* Fall through */
  1271. #endif
  1272. case VBG_IOCTL_HGCM_CALL(0):
  1273. return vbg_ioctl_hgcm_call(gdev, session, f32bit, data);
  1274. case VBG_IOCTL_LOG(0):
  1275. case VBG_IOCTL_LOG_ALT(0):
  1276. return vbg_ioctl_log(data);
  1277. }
  1278. vbg_debug("VGDrvCommonIoCtl: Unknown req %#08x\n", req);
  1279. return -ENOTTY;
  1280. }
  1281. /**
  1282. * Report guest supported mouse-features to the host.
  1283. *
  1284. * Return: 0 or negative errno value.
  1285. * @gdev: The Guest extension device.
  1286. * @features: The set of features to report to the host.
  1287. */
  1288. int vbg_core_set_mouse_status(struct vbg_dev *gdev, u32 features)
  1289. {
  1290. struct vmmdev_mouse_status *req;
  1291. int rc;
  1292. req = vbg_req_alloc(sizeof(*req), VMMDEVREQ_SET_MOUSE_STATUS);
  1293. if (!req)
  1294. return -ENOMEM;
  1295. req->mouse_features = features;
  1296. req->pointer_pos_x = 0;
  1297. req->pointer_pos_y = 0;
  1298. rc = vbg_req_perform(gdev, req);
  1299. if (rc < 0)
  1300. vbg_err("%s error, rc: %d\n", __func__, rc);
  1301. vbg_req_free(req, sizeof(*req));
  1302. return vbg_status_code_to_errno(rc);
  1303. }
  1304. /** Core interrupt service routine. */
  1305. irqreturn_t vbg_core_isr(int irq, void *dev_id)
  1306. {
  1307. struct vbg_dev *gdev = dev_id;
  1308. struct vmmdev_events *req = gdev->ack_events_req;
  1309. bool mouse_position_changed = false;
  1310. unsigned long flags;
  1311. u32 events = 0;
  1312. int rc;
  1313. if (!gdev->mmio->V.V1_04.have_events)
  1314. return IRQ_NONE;
  1315. /* Get and acknowlegde events. */
  1316. req->header.rc = VERR_INTERNAL_ERROR;
  1317. req->events = 0;
  1318. rc = vbg_req_perform(gdev, req);
  1319. if (rc < 0) {
  1320. vbg_err("Error performing events req, rc: %d\n", rc);
  1321. return IRQ_NONE;
  1322. }
  1323. events = req->events;
  1324. if (events & VMMDEV_EVENT_MOUSE_POSITION_CHANGED) {
  1325. mouse_position_changed = true;
  1326. events &= ~VMMDEV_EVENT_MOUSE_POSITION_CHANGED;
  1327. }
  1328. if (events & VMMDEV_EVENT_HGCM) {
  1329. wake_up(&gdev->hgcm_wq);
  1330. events &= ~VMMDEV_EVENT_HGCM;
  1331. }
  1332. if (events & VMMDEV_EVENT_BALLOON_CHANGE_REQUEST) {
  1333. schedule_work(&gdev->mem_balloon.work);
  1334. events &= ~VMMDEV_EVENT_BALLOON_CHANGE_REQUEST;
  1335. }
  1336. if (events) {
  1337. spin_lock_irqsave(&gdev->event_spinlock, flags);
  1338. gdev->pending_events |= events;
  1339. spin_unlock_irqrestore(&gdev->event_spinlock, flags);
  1340. wake_up(&gdev->event_wq);
  1341. }
  1342. if (mouse_position_changed)
  1343. vbg_linux_mouse_event(gdev);
  1344. return IRQ_HANDLED;
  1345. }