ARM: integrator: Retire LM and IM-PD1 boardfile code
[linux/fpc-iii.git] / drivers / virt / vboxguest / vboxguest_utils.c
blob7396187ee32a7d5990dd29b224cf52311862ac14
1 /* SPDX-License-Identifier: (GPL-2.0 OR CDDL-1.0) */
2 /*
3 * vboxguest vmm-req and hgcm-call code, VBoxGuestR0LibHGCMInternal.cpp,
4 * VBoxGuestR0LibGenericRequest.cpp and RTErrConvertToErrno.cpp in vbox svn.
6 * Copyright (C) 2006-2016 Oracle Corporation
7 */
9 #include <linux/errno.h>
10 #include <linux/io.h>
11 #include <linux/kernel.h>
12 #include <linux/mm.h>
13 #include <linux/module.h>
14 #include <linux/sizes.h>
15 #include <linux/slab.h>
16 #include <linux/uaccess.h>
17 #include <linux/vmalloc.h>
18 #include <linux/vbox_err.h>
19 #include <linux/vbox_utils.h>
20 #include "vboxguest_core.h"
22 /* Get the pointer to the first parameter of a HGCM call request. */
23 #define VMMDEV_HGCM_CALL_PARMS(a) \
24 ((struct vmmdev_hgcm_function_parameter *)( \
25 (u8 *)(a) + sizeof(struct vmmdev_hgcm_call)))
27 /* The max parameter buffer size for a user request. */
28 #define VBG_MAX_HGCM_USER_PARM (24 * SZ_1M)
29 /* The max parameter buffer size for a kernel request. */
30 #define VBG_MAX_HGCM_KERNEL_PARM (16 * SZ_1M)
32 #define VBG_DEBUG_PORT 0x504
34 /* This protects vbg_log_buf and serializes VBG_DEBUG_PORT accesses */
35 static DEFINE_SPINLOCK(vbg_log_lock);
36 static char vbg_log_buf[128];
38 #define VBG_LOG(name, pr_func) \
39 void name(const char *fmt, ...) \
40 { \
41 unsigned long flags; \
42 va_list args; \
43 int i, count; \
45 va_start(args, fmt); \
46 spin_lock_irqsave(&vbg_log_lock, flags); \
48 count = vscnprintf(vbg_log_buf, sizeof(vbg_log_buf), fmt, args);\
49 for (i = 0; i < count; i++) \
50 outb(vbg_log_buf[i], VBG_DEBUG_PORT); \
52 pr_func("%s", vbg_log_buf); \
54 spin_unlock_irqrestore(&vbg_log_lock, flags); \
55 va_end(args); \
56 } \
57 EXPORT_SYMBOL(name)
59 VBG_LOG(vbg_info, pr_info);
60 VBG_LOG(vbg_warn, pr_warn);
61 VBG_LOG(vbg_err, pr_err);
62 #if defined(DEBUG) && !defined(CONFIG_DYNAMIC_DEBUG)
63 VBG_LOG(vbg_debug, pr_debug);
64 #endif
66 void *vbg_req_alloc(size_t len, enum vmmdev_request_type req_type,
67 u32 requestor)
69 struct vmmdev_request_header *req;
70 int order = get_order(PAGE_ALIGN(len));
72 req = (void *)__get_free_pages(GFP_KERNEL | GFP_DMA32, order);
73 if (!req)
74 return NULL;
76 memset(req, 0xaa, len);
78 req->size = len;
79 req->version = VMMDEV_REQUEST_HEADER_VERSION;
80 req->request_type = req_type;
81 req->rc = VERR_GENERAL_FAILURE;
82 req->reserved1 = 0;
83 req->requestor = requestor;
85 return req;
88 void vbg_req_free(void *req, size_t len)
90 if (!req)
91 return;
93 free_pages((unsigned long)req, get_order(PAGE_ALIGN(len)));
96 /* Note this function returns a VBox status code, not a negative errno!! */
97 int vbg_req_perform(struct vbg_dev *gdev, void *req)
99 unsigned long phys_req = virt_to_phys(req);
101 outl(phys_req, gdev->io_port + VMMDEV_PORT_OFF_REQUEST);
103 * The host changes the request as a result of the outl, make sure
104 * the outl and any reads of the req happen in the correct order.
106 mb();
108 return ((struct vmmdev_request_header *)req)->rc;
111 static bool hgcm_req_done(struct vbg_dev *gdev,
112 struct vmmdev_hgcmreq_header *header)
114 unsigned long flags;
115 bool done;
117 spin_lock_irqsave(&gdev->event_spinlock, flags);
118 done = header->flags & VMMDEV_HGCM_REQ_DONE;
119 spin_unlock_irqrestore(&gdev->event_spinlock, flags);
121 return done;
124 int vbg_hgcm_connect(struct vbg_dev *gdev, u32 requestor,
125 struct vmmdev_hgcm_service_location *loc,
126 u32 *client_id, int *vbox_status)
128 struct vmmdev_hgcm_connect *hgcm_connect = NULL;
129 int rc;
131 hgcm_connect = vbg_req_alloc(sizeof(*hgcm_connect),
132 VMMDEVREQ_HGCM_CONNECT, requestor);
133 if (!hgcm_connect)
134 return -ENOMEM;
136 hgcm_connect->header.flags = 0;
137 memcpy(&hgcm_connect->loc, loc, sizeof(*loc));
138 hgcm_connect->client_id = 0;
140 rc = vbg_req_perform(gdev, hgcm_connect);
142 if (rc == VINF_HGCM_ASYNC_EXECUTE)
143 wait_event(gdev->hgcm_wq,
144 hgcm_req_done(gdev, &hgcm_connect->header));
146 if (rc >= 0) {
147 *client_id = hgcm_connect->client_id;
148 rc = hgcm_connect->header.result;
151 vbg_req_free(hgcm_connect, sizeof(*hgcm_connect));
153 *vbox_status = rc;
154 return 0;
156 EXPORT_SYMBOL(vbg_hgcm_connect);
158 int vbg_hgcm_disconnect(struct vbg_dev *gdev, u32 requestor,
159 u32 client_id, int *vbox_status)
161 struct vmmdev_hgcm_disconnect *hgcm_disconnect = NULL;
162 int rc;
164 hgcm_disconnect = vbg_req_alloc(sizeof(*hgcm_disconnect),
165 VMMDEVREQ_HGCM_DISCONNECT,
166 requestor);
167 if (!hgcm_disconnect)
168 return -ENOMEM;
170 hgcm_disconnect->header.flags = 0;
171 hgcm_disconnect->client_id = client_id;
173 rc = vbg_req_perform(gdev, hgcm_disconnect);
175 if (rc == VINF_HGCM_ASYNC_EXECUTE)
176 wait_event(gdev->hgcm_wq,
177 hgcm_req_done(gdev, &hgcm_disconnect->header));
179 if (rc >= 0)
180 rc = hgcm_disconnect->header.result;
182 vbg_req_free(hgcm_disconnect, sizeof(*hgcm_disconnect));
184 *vbox_status = rc;
185 return 0;
187 EXPORT_SYMBOL(vbg_hgcm_disconnect);
189 static u32 hgcm_call_buf_size_in_pages(void *buf, u32 len)
191 u32 size = PAGE_ALIGN(len + ((unsigned long)buf & ~PAGE_MASK));
193 return size >> PAGE_SHIFT;
196 static void hgcm_call_add_pagelist_size(void *buf, u32 len, size_t *extra)
198 u32 page_count;
200 page_count = hgcm_call_buf_size_in_pages(buf, len);
201 *extra += offsetof(struct vmmdev_hgcm_pagelist, pages[page_count]);
204 static int hgcm_call_preprocess_linaddr(
205 const struct vmmdev_hgcm_function_parameter *src_parm,
206 void **bounce_buf_ret, size_t *extra)
208 void *buf, *bounce_buf;
209 bool copy_in;
210 u32 len;
211 int ret;
213 buf = (void *)src_parm->u.pointer.u.linear_addr;
214 len = src_parm->u.pointer.size;
215 copy_in = src_parm->type != VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT;
217 if (len > VBG_MAX_HGCM_USER_PARM)
218 return -E2BIG;
220 bounce_buf = kvmalloc(len, GFP_KERNEL);
221 if (!bounce_buf)
222 return -ENOMEM;
224 *bounce_buf_ret = bounce_buf;
226 if (copy_in) {
227 ret = copy_from_user(bounce_buf, (void __user *)buf, len);
228 if (ret)
229 return -EFAULT;
230 } else {
231 memset(bounce_buf, 0, len);
234 hgcm_call_add_pagelist_size(bounce_buf, len, extra);
235 return 0;
239 * Preprocesses the HGCM call, validate parameters, alloc bounce buffers and
240 * figure out how much extra storage we need for page lists.
241 * Return: 0 or negative errno value.
242 * @src_parm: Pointer to source function call parameters
243 * @parm_count: Number of function call parameters.
244 * @bounce_bufs_ret: Where to return the allocated bouncebuffer array
245 * @extra: Where to return the extra request space needed for
246 * physical page lists.
248 static int hgcm_call_preprocess(
249 const struct vmmdev_hgcm_function_parameter *src_parm,
250 u32 parm_count, void ***bounce_bufs_ret, size_t *extra)
252 void *buf, **bounce_bufs = NULL;
253 u32 i, len;
254 int ret;
256 for (i = 0; i < parm_count; i++, src_parm++) {
257 switch (src_parm->type) {
258 case VMMDEV_HGCM_PARM_TYPE_32BIT:
259 case VMMDEV_HGCM_PARM_TYPE_64BIT:
260 break;
262 case VMMDEV_HGCM_PARM_TYPE_LINADDR:
263 case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
264 case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
265 if (!bounce_bufs) {
266 bounce_bufs = kcalloc(parm_count,
267 sizeof(void *),
268 GFP_KERNEL);
269 if (!bounce_bufs)
270 return -ENOMEM;
272 *bounce_bufs_ret = bounce_bufs;
275 ret = hgcm_call_preprocess_linaddr(src_parm,
276 &bounce_bufs[i],
277 extra);
278 if (ret)
279 return ret;
281 break;
283 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL:
284 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_IN:
285 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_OUT:
286 buf = (void *)src_parm->u.pointer.u.linear_addr;
287 len = src_parm->u.pointer.size;
288 if (WARN_ON(len > VBG_MAX_HGCM_KERNEL_PARM))
289 return -E2BIG;
291 hgcm_call_add_pagelist_size(buf, len, extra);
292 break;
294 default:
295 return -EINVAL;
299 return 0;
303 * Translates linear address types to page list direction flags.
305 * Return: page list flags.
306 * @type: The type.
308 static u32 hgcm_call_linear_addr_type_to_pagelist_flags(
309 enum vmmdev_hgcm_function_parameter_type type)
311 switch (type) {
312 default:
313 WARN_ON(1);
314 fallthrough;
315 case VMMDEV_HGCM_PARM_TYPE_LINADDR:
316 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL:
317 return VMMDEV_HGCM_F_PARM_DIRECTION_BOTH;
319 case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
320 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_IN:
321 return VMMDEV_HGCM_F_PARM_DIRECTION_TO_HOST;
323 case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
324 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_OUT:
325 return VMMDEV_HGCM_F_PARM_DIRECTION_FROM_HOST;
329 static void hgcm_call_init_linaddr(struct vmmdev_hgcm_call *call,
330 struct vmmdev_hgcm_function_parameter *dst_parm, void *buf, u32 len,
331 enum vmmdev_hgcm_function_parameter_type type, u32 *off_extra)
333 struct vmmdev_hgcm_pagelist *dst_pg_lst;
334 struct page *page;
335 bool is_vmalloc;
336 u32 i, page_count;
338 dst_parm->type = type;
340 if (len == 0) {
341 dst_parm->u.pointer.size = 0;
342 dst_parm->u.pointer.u.linear_addr = 0;
343 return;
346 dst_pg_lst = (void *)call + *off_extra;
347 page_count = hgcm_call_buf_size_in_pages(buf, len);
348 is_vmalloc = is_vmalloc_addr(buf);
350 dst_parm->type = VMMDEV_HGCM_PARM_TYPE_PAGELIST;
351 dst_parm->u.page_list.size = len;
352 dst_parm->u.page_list.offset = *off_extra;
353 dst_pg_lst->flags = hgcm_call_linear_addr_type_to_pagelist_flags(type);
354 dst_pg_lst->offset_first_page = (unsigned long)buf & ~PAGE_MASK;
355 dst_pg_lst->page_count = page_count;
357 for (i = 0; i < page_count; i++) {
358 if (is_vmalloc)
359 page = vmalloc_to_page(buf);
360 else
361 page = virt_to_page(buf);
363 dst_pg_lst->pages[i] = page_to_phys(page);
364 buf += PAGE_SIZE;
367 *off_extra += offsetof(struct vmmdev_hgcm_pagelist, pages[page_count]);
371 * Initializes the call request that we're sending to the host.
372 * @call: The call to initialize.
373 * @client_id: The client ID of the caller.
374 * @function: The function number of the function to call.
375 * @src_parm: Pointer to source function call parameters.
376 * @parm_count: Number of function call parameters.
377 * @bounce_bufs: The bouncebuffer array.
379 static void hgcm_call_init_call(
380 struct vmmdev_hgcm_call *call, u32 client_id, u32 function,
381 const struct vmmdev_hgcm_function_parameter *src_parm,
382 u32 parm_count, void **bounce_bufs)
384 struct vmmdev_hgcm_function_parameter *dst_parm =
385 VMMDEV_HGCM_CALL_PARMS(call);
386 u32 i, off_extra = (uintptr_t)(dst_parm + parm_count) - (uintptr_t)call;
387 void *buf;
389 call->header.flags = 0;
390 call->header.result = VINF_SUCCESS;
391 call->client_id = client_id;
392 call->function = function;
393 call->parm_count = parm_count;
395 for (i = 0; i < parm_count; i++, src_parm++, dst_parm++) {
396 switch (src_parm->type) {
397 case VMMDEV_HGCM_PARM_TYPE_32BIT:
398 case VMMDEV_HGCM_PARM_TYPE_64BIT:
399 *dst_parm = *src_parm;
400 break;
402 case VMMDEV_HGCM_PARM_TYPE_LINADDR:
403 case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
404 case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
405 hgcm_call_init_linaddr(call, dst_parm, bounce_bufs[i],
406 src_parm->u.pointer.size,
407 src_parm->type, &off_extra);
408 break;
410 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL:
411 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_IN:
412 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_OUT:
413 buf = (void *)src_parm->u.pointer.u.linear_addr;
414 hgcm_call_init_linaddr(call, dst_parm, buf,
415 src_parm->u.pointer.size,
416 src_parm->type, &off_extra);
417 break;
419 default:
420 WARN_ON(1);
421 dst_parm->type = VMMDEV_HGCM_PARM_TYPE_INVALID;
427 * Tries to cancel a pending HGCM call.
429 * Return: VBox status code
431 static int hgcm_cancel_call(struct vbg_dev *gdev, struct vmmdev_hgcm_call *call)
433 int rc;
436 * We use a pre-allocated request for cancellations, which is
437 * protected by cancel_req_mutex. This means that all cancellations
438 * get serialized, this should be fine since they should be rare.
440 mutex_lock(&gdev->cancel_req_mutex);
441 gdev->cancel_req->phys_req_to_cancel = virt_to_phys(call);
442 rc = vbg_req_perform(gdev, gdev->cancel_req);
443 mutex_unlock(&gdev->cancel_req_mutex);
445 if (rc == VERR_NOT_IMPLEMENTED) {
446 call->header.flags |= VMMDEV_HGCM_REQ_CANCELLED;
447 call->header.header.request_type = VMMDEVREQ_HGCM_CANCEL;
449 rc = vbg_req_perform(gdev, call);
450 if (rc == VERR_INVALID_PARAMETER)
451 rc = VERR_NOT_FOUND;
454 if (rc >= 0)
455 call->header.flags |= VMMDEV_HGCM_REQ_CANCELLED;
457 return rc;
461 * Performs the call and completion wait.
462 * Return: 0 or negative errno value.
463 * @gdev: The VBoxGuest device extension.
464 * @call: The call to execute.
465 * @timeout_ms: Timeout in ms.
466 * @leak_it: Where to return the leak it / free it, indicator.
467 * Cancellation fun.
469 static int vbg_hgcm_do_call(struct vbg_dev *gdev, struct vmmdev_hgcm_call *call,
470 u32 timeout_ms, bool *leak_it)
472 int rc, cancel_rc, ret;
473 long timeout;
475 *leak_it = false;
477 rc = vbg_req_perform(gdev, call);
480 * If the call failed, then pretend success. Upper layers will
481 * interpret the result code in the packet.
483 if (rc < 0) {
484 call->header.result = rc;
485 return 0;
488 if (rc != VINF_HGCM_ASYNC_EXECUTE)
489 return 0;
491 /* Host decided to process the request asynchronously, wait for it */
492 if (timeout_ms == U32_MAX)
493 timeout = MAX_SCHEDULE_TIMEOUT;
494 else
495 timeout = msecs_to_jiffies(timeout_ms);
497 timeout = wait_event_interruptible_timeout(
498 gdev->hgcm_wq,
499 hgcm_req_done(gdev, &call->header),
500 timeout);
502 /* timeout > 0 means hgcm_req_done has returned true, so success */
503 if (timeout > 0)
504 return 0;
506 if (timeout == 0)
507 ret = -ETIMEDOUT;
508 else
509 ret = -EINTR;
511 /* Cancel the request */
512 cancel_rc = hgcm_cancel_call(gdev, call);
513 if (cancel_rc >= 0)
514 return ret;
517 * Failed to cancel, this should mean that the cancel has lost the
518 * race with normal completion, wait while the host completes it.
520 if (cancel_rc == VERR_NOT_FOUND || cancel_rc == VERR_SEM_DESTROYED)
521 timeout = msecs_to_jiffies(500);
522 else
523 timeout = msecs_to_jiffies(2000);
525 timeout = wait_event_timeout(gdev->hgcm_wq,
526 hgcm_req_done(gdev, &call->header),
527 timeout);
529 if (WARN_ON(timeout == 0)) {
530 /* We really should never get here */
531 vbg_err("%s: Call timedout and cancellation failed, leaking the request\n",
532 __func__);
533 *leak_it = true;
534 return ret;
537 /* The call has completed normally after all */
538 return 0;
542 * Copies the result of the call back to the caller info structure and user
543 * buffers.
544 * Return: 0 or negative errno value.
545 * @call: HGCM call request.
546 * @dst_parm: Pointer to function call parameters destination.
547 * @parm_count: Number of function call parameters.
548 * @bounce_bufs: The bouncebuffer array.
550 static int hgcm_call_copy_back_result(
551 const struct vmmdev_hgcm_call *call,
552 struct vmmdev_hgcm_function_parameter *dst_parm,
553 u32 parm_count, void **bounce_bufs)
555 const struct vmmdev_hgcm_function_parameter *src_parm =
556 VMMDEV_HGCM_CALL_PARMS(call);
557 void __user *p;
558 int ret;
559 u32 i;
561 /* Copy back parameters. */
562 for (i = 0; i < parm_count; i++, src_parm++, dst_parm++) {
563 switch (dst_parm->type) {
564 case VMMDEV_HGCM_PARM_TYPE_32BIT:
565 case VMMDEV_HGCM_PARM_TYPE_64BIT:
566 *dst_parm = *src_parm;
567 break;
569 case VMMDEV_HGCM_PARM_TYPE_PAGELIST:
570 dst_parm->u.page_list.size = src_parm->u.page_list.size;
571 break;
573 case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
574 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL:
575 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_IN:
576 case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_OUT:
577 dst_parm->u.pointer.size = src_parm->u.pointer.size;
578 break;
580 case VMMDEV_HGCM_PARM_TYPE_LINADDR:
581 case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
582 dst_parm->u.pointer.size = src_parm->u.pointer.size;
584 p = (void __user *)dst_parm->u.pointer.u.linear_addr;
585 ret = copy_to_user(p, bounce_bufs[i],
586 min(src_parm->u.pointer.size,
587 dst_parm->u.pointer.size));
588 if (ret)
589 return -EFAULT;
590 break;
592 default:
593 WARN_ON(1);
594 return -EINVAL;
598 return 0;
601 int vbg_hgcm_call(struct vbg_dev *gdev, u32 requestor, u32 client_id,
602 u32 function, u32 timeout_ms,
603 struct vmmdev_hgcm_function_parameter *parms, u32 parm_count,
604 int *vbox_status)
606 struct vmmdev_hgcm_call *call;
607 void **bounce_bufs = NULL;
608 bool leak_it;
609 size_t size;
610 int i, ret;
612 size = sizeof(struct vmmdev_hgcm_call) +
613 parm_count * sizeof(struct vmmdev_hgcm_function_parameter);
615 * Validate and buffer the parameters for the call. This also increases
616 * call_size with the amount of extra space needed for page lists.
618 ret = hgcm_call_preprocess(parms, parm_count, &bounce_bufs, &size);
619 if (ret) {
620 /* Even on error bounce bufs may still have been allocated */
621 goto free_bounce_bufs;
624 call = vbg_req_alloc(size, VMMDEVREQ_HGCM_CALL, requestor);
625 if (!call) {
626 ret = -ENOMEM;
627 goto free_bounce_bufs;
630 hgcm_call_init_call(call, client_id, function, parms, parm_count,
631 bounce_bufs);
633 ret = vbg_hgcm_do_call(gdev, call, timeout_ms, &leak_it);
634 if (ret == 0) {
635 *vbox_status = call->header.result;
636 ret = hgcm_call_copy_back_result(call, parms, parm_count,
637 bounce_bufs);
640 if (!leak_it)
641 vbg_req_free(call, size);
643 free_bounce_bufs:
644 if (bounce_bufs) {
645 for (i = 0; i < parm_count; i++)
646 kvfree(bounce_bufs[i]);
647 kfree(bounce_bufs);
650 return ret;
652 EXPORT_SYMBOL(vbg_hgcm_call);
654 #ifdef CONFIG_COMPAT
655 int vbg_hgcm_call32(
656 struct vbg_dev *gdev, u32 requestor, u32 client_id, u32 function,
657 u32 timeout_ms, struct vmmdev_hgcm_function_parameter32 *parm32,
658 u32 parm_count, int *vbox_status)
660 struct vmmdev_hgcm_function_parameter *parm64 = NULL;
661 u32 i, size;
662 int ret = 0;
664 /* KISS allocate a temporary request and convert the parameters. */
665 size = parm_count * sizeof(struct vmmdev_hgcm_function_parameter);
666 parm64 = kzalloc(size, GFP_KERNEL);
667 if (!parm64)
668 return -ENOMEM;
670 for (i = 0; i < parm_count; i++) {
671 switch (parm32[i].type) {
672 case VMMDEV_HGCM_PARM_TYPE_32BIT:
673 parm64[i].type = VMMDEV_HGCM_PARM_TYPE_32BIT;
674 parm64[i].u.value32 = parm32[i].u.value32;
675 break;
677 case VMMDEV_HGCM_PARM_TYPE_64BIT:
678 parm64[i].type = VMMDEV_HGCM_PARM_TYPE_64BIT;
679 parm64[i].u.value64 = parm32[i].u.value64;
680 break;
682 case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
683 case VMMDEV_HGCM_PARM_TYPE_LINADDR:
684 case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
685 parm64[i].type = parm32[i].type;
686 parm64[i].u.pointer.size = parm32[i].u.pointer.size;
687 parm64[i].u.pointer.u.linear_addr =
688 parm32[i].u.pointer.u.linear_addr;
689 break;
691 default:
692 ret = -EINVAL;
694 if (ret < 0)
695 goto out_free;
698 ret = vbg_hgcm_call(gdev, requestor, client_id, function, timeout_ms,
699 parm64, parm_count, vbox_status);
700 if (ret < 0)
701 goto out_free;
703 /* Copy back. */
704 for (i = 0; i < parm_count; i++, parm32++, parm64++) {
705 switch (parm64[i].type) {
706 case VMMDEV_HGCM_PARM_TYPE_32BIT:
707 parm32[i].u.value32 = parm64[i].u.value32;
708 break;
710 case VMMDEV_HGCM_PARM_TYPE_64BIT:
711 parm32[i].u.value64 = parm64[i].u.value64;
712 break;
714 case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
715 case VMMDEV_HGCM_PARM_TYPE_LINADDR:
716 case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
717 parm32[i].u.pointer.size = parm64[i].u.pointer.size;
718 break;
720 default:
721 WARN_ON(1);
722 ret = -EINVAL;
726 out_free:
727 kfree(parm64);
728 return ret;
730 #endif
732 static const int vbg_status_code_to_errno_table[] = {
733 [-VERR_ACCESS_DENIED] = -EPERM,
734 [-VERR_FILE_NOT_FOUND] = -ENOENT,
735 [-VERR_PROCESS_NOT_FOUND] = -ESRCH,
736 [-VERR_INTERRUPTED] = -EINTR,
737 [-VERR_DEV_IO_ERROR] = -EIO,
738 [-VERR_TOO_MUCH_DATA] = -E2BIG,
739 [-VERR_BAD_EXE_FORMAT] = -ENOEXEC,
740 [-VERR_INVALID_HANDLE] = -EBADF,
741 [-VERR_TRY_AGAIN] = -EAGAIN,
742 [-VERR_NO_MEMORY] = -ENOMEM,
743 [-VERR_INVALID_POINTER] = -EFAULT,
744 [-VERR_RESOURCE_BUSY] = -EBUSY,
745 [-VERR_ALREADY_EXISTS] = -EEXIST,
746 [-VERR_NOT_SAME_DEVICE] = -EXDEV,
747 [-VERR_NOT_A_DIRECTORY] = -ENOTDIR,
748 [-VERR_PATH_NOT_FOUND] = -ENOTDIR,
749 [-VERR_INVALID_NAME] = -ENOENT,
750 [-VERR_IS_A_DIRECTORY] = -EISDIR,
751 [-VERR_INVALID_PARAMETER] = -EINVAL,
752 [-VERR_TOO_MANY_OPEN_FILES] = -ENFILE,
753 [-VERR_INVALID_FUNCTION] = -ENOTTY,
754 [-VERR_SHARING_VIOLATION] = -ETXTBSY,
755 [-VERR_FILE_TOO_BIG] = -EFBIG,
756 [-VERR_DISK_FULL] = -ENOSPC,
757 [-VERR_SEEK_ON_DEVICE] = -ESPIPE,
758 [-VERR_WRITE_PROTECT] = -EROFS,
759 [-VERR_BROKEN_PIPE] = -EPIPE,
760 [-VERR_DEADLOCK] = -EDEADLK,
761 [-VERR_FILENAME_TOO_LONG] = -ENAMETOOLONG,
762 [-VERR_FILE_LOCK_FAILED] = -ENOLCK,
763 [-VERR_NOT_IMPLEMENTED] = -ENOSYS,
764 [-VERR_NOT_SUPPORTED] = -ENOSYS,
765 [-VERR_DIR_NOT_EMPTY] = -ENOTEMPTY,
766 [-VERR_TOO_MANY_SYMLINKS] = -ELOOP,
767 [-VERR_NO_MORE_FILES] = -ENODATA,
768 [-VERR_NO_DATA] = -ENODATA,
769 [-VERR_NET_NO_NETWORK] = -ENONET,
770 [-VERR_NET_NOT_UNIQUE_NAME] = -ENOTUNIQ,
771 [-VERR_NO_TRANSLATION] = -EILSEQ,
772 [-VERR_NET_NOT_SOCKET] = -ENOTSOCK,
773 [-VERR_NET_DEST_ADDRESS_REQUIRED] = -EDESTADDRREQ,
774 [-VERR_NET_MSG_SIZE] = -EMSGSIZE,
775 [-VERR_NET_PROTOCOL_TYPE] = -EPROTOTYPE,
776 [-VERR_NET_PROTOCOL_NOT_AVAILABLE] = -ENOPROTOOPT,
777 [-VERR_NET_PROTOCOL_NOT_SUPPORTED] = -EPROTONOSUPPORT,
778 [-VERR_NET_SOCKET_TYPE_NOT_SUPPORTED] = -ESOCKTNOSUPPORT,
779 [-VERR_NET_OPERATION_NOT_SUPPORTED] = -EOPNOTSUPP,
780 [-VERR_NET_PROTOCOL_FAMILY_NOT_SUPPORTED] = -EPFNOSUPPORT,
781 [-VERR_NET_ADDRESS_FAMILY_NOT_SUPPORTED] = -EAFNOSUPPORT,
782 [-VERR_NET_ADDRESS_IN_USE] = -EADDRINUSE,
783 [-VERR_NET_ADDRESS_NOT_AVAILABLE] = -EADDRNOTAVAIL,
784 [-VERR_NET_DOWN] = -ENETDOWN,
785 [-VERR_NET_UNREACHABLE] = -ENETUNREACH,
786 [-VERR_NET_CONNECTION_RESET] = -ENETRESET,
787 [-VERR_NET_CONNECTION_ABORTED] = -ECONNABORTED,
788 [-VERR_NET_CONNECTION_RESET_BY_PEER] = -ECONNRESET,
789 [-VERR_NET_NO_BUFFER_SPACE] = -ENOBUFS,
790 [-VERR_NET_ALREADY_CONNECTED] = -EISCONN,
791 [-VERR_NET_NOT_CONNECTED] = -ENOTCONN,
792 [-VERR_NET_SHUTDOWN] = -ESHUTDOWN,
793 [-VERR_NET_TOO_MANY_REFERENCES] = -ETOOMANYREFS,
794 [-VERR_TIMEOUT] = -ETIMEDOUT,
795 [-VERR_NET_CONNECTION_REFUSED] = -ECONNREFUSED,
796 [-VERR_NET_HOST_DOWN] = -EHOSTDOWN,
797 [-VERR_NET_HOST_UNREACHABLE] = -EHOSTUNREACH,
798 [-VERR_NET_ALREADY_IN_PROGRESS] = -EALREADY,
799 [-VERR_NET_IN_PROGRESS] = -EINPROGRESS,
800 [-VERR_MEDIA_NOT_PRESENT] = -ENOMEDIUM,
801 [-VERR_MEDIA_NOT_RECOGNIZED] = -EMEDIUMTYPE,
804 int vbg_status_code_to_errno(int rc)
806 if (rc >= 0)
807 return 0;
809 rc = -rc;
810 if (rc >= ARRAY_SIZE(vbg_status_code_to_errno_table) ||
811 vbg_status_code_to_errno_table[rc] == 0) {
812 vbg_warn("%s: Unhandled err %d\n", __func__, -rc);
813 return -EPROTO;
816 return vbg_status_code_to_errno_table[rc];
818 EXPORT_SYMBOL(vbg_status_code_to_errno);