1 /* SPDX-License-Identifier: (GPL-2.0 OR CDDL-1.0) */
2 /*
3  * vboxguest vmm-req and hgcm-call code, VBoxGuestR0LibHGCMInternal.cpp,
4  * VBoxGuestR0LibGenericRequest.cpp and RTErrConvertToErrno.cpp in vbox svn.
5  *
6  * Copyright (C) 2006-2016 Oracle Corporation
7  */
8 
9 #include <linux/errno.h>
10 #include <linux/io.h>
11 #include <linux/kernel.h>
12 #include <linux/mm.h>
13 #include <linux/module.h>
14 #include <linux/sizes.h>
15 #include <linux/slab.h>
16 #include <linux/uaccess.h>
17 #include <linux/vmalloc.h>
18 #include <linux/vbox_err.h>
19 #include <linux/vbox_utils.h>
20 #include "vboxguest_core.h"
21 
22 /* Get the pointer to the first parameter of a HGCM call request. */
23 #define VMMDEV_HGCM_CALL_PARMS(a) \
24 	((struct vmmdev_hgcm_function_parameter *)( \
25 		(u8 *)(a) + sizeof(struct vmmdev_hgcm_call)))
26 
27 /* The max parameter buffer size for a user request. */
28 #define VBG_MAX_HGCM_USER_PARM		(24 * SZ_1M)
29 /* The max parameter buffer size for a kernel request. */
30 #define VBG_MAX_HGCM_KERNEL_PARM	(16 * SZ_1M)
31 
32 #define VBG_DEBUG_PORT			0x504
33 
34 /* This protects vbg_log_buf and serializes VBG_DEBUG_PORT accesses */
35 static DEFINE_SPINLOCK(vbg_log_lock);
36 static char vbg_log_buf[128];
37 
38 #define VBG_LOG(name, pr_func) \
39 void name(const char *fmt, ...)						\
40 {									\
41 	unsigned long flags;						\
42 	va_list args;							\
43 	int i, count;							\
44 									\
45 	va_start(args, fmt);						\
46 	spin_lock_irqsave(&vbg_log_lock, flags);			\
47 									\
48 	count = vscnprintf(vbg_log_buf, sizeof(vbg_log_buf), fmt, args);\
49 	for (i = 0; i < count; i++)					\
50 		outb(vbg_log_buf[i], VBG_DEBUG_PORT);			\
51 									\
52 	pr_func("%s", vbg_log_buf);					\
53 									\
54 	spin_unlock_irqrestore(&vbg_log_lock, flags);			\
55 	va_end(args);							\
56 }									\
57 EXPORT_SYMBOL(name)
58 
59 VBG_LOG(vbg_info, pr_info);
60 VBG_LOG(vbg_warn, pr_warn);
61 VBG_LOG(vbg_err, pr_err);
62 #if defined(DEBUG) && !defined(CONFIG_DYNAMIC_DEBUG)
63 VBG_LOG(vbg_debug, pr_debug);
64 #endif
65 
66 void *vbg_req_alloc(size_t len, enum vmmdev_request_type req_type,
67 		    u32 requestor)
68 {
69 	struct vmmdev_request_header *req;
70 	int order = get_order(PAGE_ALIGN(len));
71 
72 	req = (void *)__get_free_pages(GFP_KERNEL | GFP_DMA32, order);
73 	if (!req)
74 		return NULL;
75 
76 	memset(req, 0xaa, len);
77 
78 	req->size = len;
79 	req->version = VMMDEV_REQUEST_HEADER_VERSION;
80 	req->request_type = req_type;
81 	req->rc = VERR_GENERAL_FAILURE;
82 	req->reserved1 = 0;
83 	req->requestor = requestor;
84 
85 	return req;
86 }
87 
88 void vbg_req_free(void *req, size_t len)
89 {
90 	if (!req)
91 		return;
92 
93 	free_pages((unsigned long)req, get_order(PAGE_ALIGN(len)));
94 }
95 
96 /* Note this function returns a VBox status code, not a negative errno!! */
97 int vbg_req_perform(struct vbg_dev *gdev, void *req)
98 {
99 	unsigned long phys_req = virt_to_phys(req);
100 
101 	outl(phys_req, gdev->io_port + VMMDEV_PORT_OFF_REQUEST);
102 	/*
103 	 * The host changes the request as a result of the outl, make sure
104 	 * the outl and any reads of the req happen in the correct order.
105 	 */
106 	mb();
107 
108 	return ((struct vmmdev_request_header *)req)->rc;
109 }
110 
111 static bool hgcm_req_done(struct vbg_dev *gdev,
112 			  struct vmmdev_hgcmreq_header *header)
113 {
114 	unsigned long flags;
115 	bool done;
116 
117 	spin_lock_irqsave(&gdev->event_spinlock, flags);
118 	done = header->flags & VMMDEV_HGCM_REQ_DONE;
119 	spin_unlock_irqrestore(&gdev->event_spinlock, flags);
120 
121 	return done;
122 }
123 
124 int vbg_hgcm_connect(struct vbg_dev *gdev, u32 requestor,
125 		     struct vmmdev_hgcm_service_location *loc,
126 		     u32 *client_id, int *vbox_status)
127 {
128 	struct vmmdev_hgcm_connect *hgcm_connect = NULL;
129 	int rc;
130 
131 	hgcm_connect = vbg_req_alloc(sizeof(*hgcm_connect),
132 				     VMMDEVREQ_HGCM_CONNECT, requestor);
133 	if (!hgcm_connect)
134 		return -ENOMEM;
135 
136 	hgcm_connect->header.flags = 0;
137 	memcpy(&hgcm_connect->loc, loc, sizeof(*loc));
138 	hgcm_connect->client_id = 0;
139 
140 	rc = vbg_req_perform(gdev, hgcm_connect);
141 
142 	if (rc == VINF_HGCM_ASYNC_EXECUTE)
143 		wait_event(gdev->hgcm_wq,
144 			   hgcm_req_done(gdev, &hgcm_connect->header));
145 
146 	if (rc >= 0) {
147 		*client_id = hgcm_connect->client_id;
148 		rc = hgcm_connect->header.result;
149 	}
150 
151 	vbg_req_free(hgcm_connect, sizeof(*hgcm_connect));
152 
153 	*vbox_status = rc;
154 	return 0;
155 }
156 EXPORT_SYMBOL(vbg_hgcm_connect);
157 
158 int vbg_hgcm_disconnect(struct vbg_dev *gdev, u32 requestor,
159 			u32 client_id, int *vbox_status)
160 {
161 	struct vmmdev_hgcm_disconnect *hgcm_disconnect = NULL;
162 	int rc;
163 
164 	hgcm_disconnect = vbg_req_alloc(sizeof(*hgcm_disconnect),
165 					VMMDEVREQ_HGCM_DISCONNECT,
166 					requestor);
167 	if (!hgcm_disconnect)
168 		return -ENOMEM;
169 
170 	hgcm_disconnect->header.flags = 0;
171 	hgcm_disconnect->client_id = client_id;
172 
173 	rc = vbg_req_perform(gdev, hgcm_disconnect);
174 
175 	if (rc == VINF_HGCM_ASYNC_EXECUTE)
176 		wait_event(gdev->hgcm_wq,
177 			   hgcm_req_done(gdev, &hgcm_disconnect->header));
178 
179 	if (rc >= 0)
180 		rc = hgcm_disconnect->header.result;
181 
182 	vbg_req_free(hgcm_disconnect, sizeof(*hgcm_disconnect));
183 
184 	*vbox_status = rc;
185 	return 0;
186 }
187 EXPORT_SYMBOL(vbg_hgcm_disconnect);
188 
189 static u32 hgcm_call_buf_size_in_pages(void *buf, u32 len)
190 {
191 	u32 size = PAGE_ALIGN(len + ((unsigned long)buf & ~PAGE_MASK));
192 
193 	return size >> PAGE_SHIFT;
194 }
195 
196 static void hgcm_call_add_pagelist_size(void *buf, u32 len, size_t *extra)
197 {
198 	u32 page_count;
199 
200 	page_count = hgcm_call_buf_size_in_pages(buf, len);
201 	*extra += offsetof(struct vmmdev_hgcm_pagelist, pages[page_count]);
202 }
203 
204 static int hgcm_call_preprocess_linaddr(
205 	const struct vmmdev_hgcm_function_parameter *src_parm,
206 	void **bounce_buf_ret, size_t *extra)
207 {
208 	void *buf, *bounce_buf;
209 	bool copy_in;
210 	u32 len;
211 	int ret;
212 
213 	buf = (void *)src_parm->u.pointer.u.linear_addr;
214 	len = src_parm->u.pointer.size;
215 	copy_in = src_parm->type != VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT;
216 
217 	if (len > VBG_MAX_HGCM_USER_PARM)
218 		return -E2BIG;
219 
220 	bounce_buf = kvmalloc(len, GFP_KERNEL);
221 	if (!bounce_buf)
222 		return -ENOMEM;
223 
224 	*bounce_buf_ret = bounce_buf;
225 
226 	if (copy_in) {
227 		ret = copy_from_user(bounce_buf, (void __user *)buf, len);
228 		if (ret)
229 			return -EFAULT;
230 	} else {
231 		memset(bounce_buf, 0, len);
232 	}
233 
234 	hgcm_call_add_pagelist_size(bounce_buf, len, extra);
235 	return 0;
236 }
237 
238 /**
239  * Preprocesses the HGCM call, validate parameters, alloc bounce buffers and
240  * figure out how much extra storage we need for page lists.
241  * Return: 0 or negative errno value.
242  * @src_parm:         Pointer to source function call parameters
243  * @parm_count:       Number of function call parameters.
244  * @bounce_bufs_ret:  Where to return the allocated bouncebuffer array
245  * @extra:            Where to return the extra request space needed for
246  *                    physical page lists.
247  */
248 static int hgcm_call_preprocess(
249 	const struct vmmdev_hgcm_function_parameter *src_parm,
250 	u32 parm_count, void ***bounce_bufs_ret, size_t *extra)
251 {
252 	void *buf, **bounce_bufs = NULL;
253 	u32 i, len;
254 	int ret;
255 
256 	for (i = 0; i < parm_count; i++, src_parm++) {
257 		switch (src_parm->type) {
258 		case VMMDEV_HGCM_PARM_TYPE_32BIT:
259 		case VMMDEV_HGCM_PARM_TYPE_64BIT:
260 			break;
261 
262 		case VMMDEV_HGCM_PARM_TYPE_LINADDR:
263 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
264 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
265 			if (!bounce_bufs) {
266 				bounce_bufs = kcalloc(parm_count,
267 						      sizeof(void *),
268 						      GFP_KERNEL);
269 				if (!bounce_bufs)
270 					return -ENOMEM;
271 
272 				*bounce_bufs_ret = bounce_bufs;
273 			}
274 
275 			ret = hgcm_call_preprocess_linaddr(src_parm,
276 							   &bounce_bufs[i],
277 							   extra);
278 			if (ret)
279 				return ret;
280 
281 			break;
282 
283 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL:
284 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_IN:
285 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_OUT:
286 			buf = (void *)src_parm->u.pointer.u.linear_addr;
287 			len = src_parm->u.pointer.size;
288 			if (WARN_ON(len > VBG_MAX_HGCM_KERNEL_PARM))
289 				return -E2BIG;
290 
291 			hgcm_call_add_pagelist_size(buf, len, extra);
292 			break;
293 
294 		default:
295 			return -EINVAL;
296 		}
297 	}
298 
299 	return 0;
300 }
301 
302 /**
303  * Translates linear address types to page list direction flags.
304  *
305  * Return: page list flags.
306  * @type:  The type.
307  */
308 static u32 hgcm_call_linear_addr_type_to_pagelist_flags(
309 	enum vmmdev_hgcm_function_parameter_type type)
310 {
311 	switch (type) {
312 	default:
313 		WARN_ON(1);
314 		/* Fall through */
315 	case VMMDEV_HGCM_PARM_TYPE_LINADDR:
316 	case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL:
317 		return VMMDEV_HGCM_F_PARM_DIRECTION_BOTH;
318 
319 	case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
320 	case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_IN:
321 		return VMMDEV_HGCM_F_PARM_DIRECTION_TO_HOST;
322 
323 	case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
324 	case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_OUT:
325 		return VMMDEV_HGCM_F_PARM_DIRECTION_FROM_HOST;
326 	}
327 }
328 
329 static void hgcm_call_init_linaddr(struct vmmdev_hgcm_call *call,
330 	struct vmmdev_hgcm_function_parameter *dst_parm, void *buf, u32 len,
331 	enum vmmdev_hgcm_function_parameter_type type, u32 *off_extra)
332 {
333 	struct vmmdev_hgcm_pagelist *dst_pg_lst;
334 	struct page *page;
335 	bool is_vmalloc;
336 	u32 i, page_count;
337 
338 	dst_parm->type = type;
339 
340 	if (len == 0) {
341 		dst_parm->u.pointer.size = 0;
342 		dst_parm->u.pointer.u.linear_addr = 0;
343 		return;
344 	}
345 
346 	dst_pg_lst = (void *)call + *off_extra;
347 	page_count = hgcm_call_buf_size_in_pages(buf, len);
348 	is_vmalloc = is_vmalloc_addr(buf);
349 
350 	dst_parm->type = VMMDEV_HGCM_PARM_TYPE_PAGELIST;
351 	dst_parm->u.page_list.size = len;
352 	dst_parm->u.page_list.offset = *off_extra;
353 	dst_pg_lst->flags = hgcm_call_linear_addr_type_to_pagelist_flags(type);
354 	dst_pg_lst->offset_first_page = (unsigned long)buf & ~PAGE_MASK;
355 	dst_pg_lst->page_count = page_count;
356 
357 	for (i = 0; i < page_count; i++) {
358 		if (is_vmalloc)
359 			page = vmalloc_to_page(buf);
360 		else
361 			page = virt_to_page(buf);
362 
363 		dst_pg_lst->pages[i] = page_to_phys(page);
364 		buf += PAGE_SIZE;
365 	}
366 
367 	*off_extra += offsetof(struct vmmdev_hgcm_pagelist, pages[page_count]);
368 }
369 
370 /**
371  * Initializes the call request that we're sending to the host.
372  * @call:            The call to initialize.
373  * @client_id:       The client ID of the caller.
374  * @function:        The function number of the function to call.
375  * @src_parm:        Pointer to source function call parameters.
376  * @parm_count:      Number of function call parameters.
377  * @bounce_bufs:     The bouncebuffer array.
378  */
379 static void hgcm_call_init_call(
380 	struct vmmdev_hgcm_call *call, u32 client_id, u32 function,
381 	const struct vmmdev_hgcm_function_parameter *src_parm,
382 	u32 parm_count, void **bounce_bufs)
383 {
384 	struct vmmdev_hgcm_function_parameter *dst_parm =
385 		VMMDEV_HGCM_CALL_PARMS(call);
386 	u32 i, off_extra = (uintptr_t)(dst_parm + parm_count) - (uintptr_t)call;
387 	void *buf;
388 
389 	call->header.flags = 0;
390 	call->header.result = VINF_SUCCESS;
391 	call->client_id = client_id;
392 	call->function = function;
393 	call->parm_count = parm_count;
394 
395 	for (i = 0; i < parm_count; i++, src_parm++, dst_parm++) {
396 		switch (src_parm->type) {
397 		case VMMDEV_HGCM_PARM_TYPE_32BIT:
398 		case VMMDEV_HGCM_PARM_TYPE_64BIT:
399 			*dst_parm = *src_parm;
400 			break;
401 
402 		case VMMDEV_HGCM_PARM_TYPE_LINADDR:
403 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
404 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
405 			hgcm_call_init_linaddr(call, dst_parm, bounce_bufs[i],
406 					       src_parm->u.pointer.size,
407 					       src_parm->type, &off_extra);
408 			break;
409 
410 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL:
411 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_IN:
412 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_OUT:
413 			buf = (void *)src_parm->u.pointer.u.linear_addr;
414 			hgcm_call_init_linaddr(call, dst_parm, buf,
415 					       src_parm->u.pointer.size,
416 					       src_parm->type, &off_extra);
417 			break;
418 
419 		default:
420 			WARN_ON(1);
421 			dst_parm->type = VMMDEV_HGCM_PARM_TYPE_INVALID;
422 		}
423 	}
424 }
425 
426 /**
427  * Tries to cancel a pending HGCM call.
428  *
429  * Return: VBox status code
430  */
431 static int hgcm_cancel_call(struct vbg_dev *gdev, struct vmmdev_hgcm_call *call)
432 {
433 	int rc;
434 
435 	/*
436 	 * We use a pre-allocated request for cancellations, which is
437 	 * protected by cancel_req_mutex. This means that all cancellations
438 	 * get serialized, this should be fine since they should be rare.
439 	 */
440 	mutex_lock(&gdev->cancel_req_mutex);
441 	gdev->cancel_req->phys_req_to_cancel = virt_to_phys(call);
442 	rc = vbg_req_perform(gdev, gdev->cancel_req);
443 	mutex_unlock(&gdev->cancel_req_mutex);
444 
445 	if (rc == VERR_NOT_IMPLEMENTED) {
446 		call->header.flags |= VMMDEV_HGCM_REQ_CANCELLED;
447 		call->header.header.request_type = VMMDEVREQ_HGCM_CANCEL;
448 
449 		rc = vbg_req_perform(gdev, call);
450 		if (rc == VERR_INVALID_PARAMETER)
451 			rc = VERR_NOT_FOUND;
452 	}
453 
454 	if (rc >= 0)
455 		call->header.flags |= VMMDEV_HGCM_REQ_CANCELLED;
456 
457 	return rc;
458 }
459 
460 /**
461  * Performs the call and completion wait.
462  * Return: 0 or negative errno value.
463  * @gdev:        The VBoxGuest device extension.
464  * @call:        The call to execute.
465  * @timeout_ms:  Timeout in ms.
466  * @leak_it:     Where to return the leak it / free it, indicator.
467  *               Cancellation fun.
468  */
469 static int vbg_hgcm_do_call(struct vbg_dev *gdev, struct vmmdev_hgcm_call *call,
470 			    u32 timeout_ms, bool *leak_it)
471 {
472 	int rc, cancel_rc, ret;
473 	long timeout;
474 
475 	*leak_it = false;
476 
477 	rc = vbg_req_perform(gdev, call);
478 
479 	/*
480 	 * If the call failed, then pretend success. Upper layers will
481 	 * interpret the result code in the packet.
482 	 */
483 	if (rc < 0) {
484 		call->header.result = rc;
485 		return 0;
486 	}
487 
488 	if (rc != VINF_HGCM_ASYNC_EXECUTE)
489 		return 0;
490 
491 	/* Host decided to process the request asynchronously, wait for it */
492 	if (timeout_ms == U32_MAX)
493 		timeout = MAX_SCHEDULE_TIMEOUT;
494 	else
495 		timeout = msecs_to_jiffies(timeout_ms);
496 
497 	timeout = wait_event_interruptible_timeout(
498 					gdev->hgcm_wq,
499 					hgcm_req_done(gdev, &call->header),
500 					timeout);
501 
502 	/* timeout > 0 means hgcm_req_done has returned true, so success */
503 	if (timeout > 0)
504 		return 0;
505 
506 	if (timeout == 0)
507 		ret = -ETIMEDOUT;
508 	else
509 		ret = -EINTR;
510 
511 	/* Cancel the request */
512 	cancel_rc = hgcm_cancel_call(gdev, call);
513 	if (cancel_rc >= 0)
514 		return ret;
515 
516 	/*
517 	 * Failed to cancel, this should mean that the cancel has lost the
518 	 * race with normal completion, wait while the host completes it.
519 	 */
520 	if (cancel_rc == VERR_NOT_FOUND || cancel_rc == VERR_SEM_DESTROYED)
521 		timeout = msecs_to_jiffies(500);
522 	else
523 		timeout = msecs_to_jiffies(2000);
524 
525 	timeout = wait_event_timeout(gdev->hgcm_wq,
526 				     hgcm_req_done(gdev, &call->header),
527 				     timeout);
528 
529 	if (WARN_ON(timeout == 0)) {
530 		/* We really should never get here */
531 		vbg_err("%s: Call timedout and cancellation failed, leaking the request\n",
532 			__func__);
533 		*leak_it = true;
534 		return ret;
535 	}
536 
537 	/* The call has completed normally after all */
538 	return 0;
539 }
540 
541 /**
542  * Copies the result of the call back to the caller info structure and user
543  * buffers.
544  * Return: 0 or negative errno value.
545  * @call:            HGCM call request.
546  * @dst_parm:        Pointer to function call parameters destination.
547  * @parm_count:      Number of function call parameters.
548  * @bounce_bufs:     The bouncebuffer array.
549  */
550 static int hgcm_call_copy_back_result(
551 	const struct vmmdev_hgcm_call *call,
552 	struct vmmdev_hgcm_function_parameter *dst_parm,
553 	u32 parm_count, void **bounce_bufs)
554 {
555 	const struct vmmdev_hgcm_function_parameter *src_parm =
556 		VMMDEV_HGCM_CALL_PARMS(call);
557 	void __user *p;
558 	int ret;
559 	u32 i;
560 
561 	/* Copy back parameters. */
562 	for (i = 0; i < parm_count; i++, src_parm++, dst_parm++) {
563 		switch (dst_parm->type) {
564 		case VMMDEV_HGCM_PARM_TYPE_32BIT:
565 		case VMMDEV_HGCM_PARM_TYPE_64BIT:
566 			*dst_parm = *src_parm;
567 			break;
568 
569 		case VMMDEV_HGCM_PARM_TYPE_PAGELIST:
570 			dst_parm->u.page_list.size = src_parm->u.page_list.size;
571 			break;
572 
573 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
574 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL:
575 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_IN:
576 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_KERNEL_OUT:
577 			dst_parm->u.pointer.size = src_parm->u.pointer.size;
578 			break;
579 
580 		case VMMDEV_HGCM_PARM_TYPE_LINADDR:
581 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
582 			dst_parm->u.pointer.size = src_parm->u.pointer.size;
583 
584 			p = (void __user *)dst_parm->u.pointer.u.linear_addr;
585 			ret = copy_to_user(p, bounce_bufs[i],
586 					   min(src_parm->u.pointer.size,
587 					       dst_parm->u.pointer.size));
588 			if (ret)
589 				return -EFAULT;
590 			break;
591 
592 		default:
593 			WARN_ON(1);
594 			return -EINVAL;
595 		}
596 	}
597 
598 	return 0;
599 }
600 
601 int vbg_hgcm_call(struct vbg_dev *gdev, u32 requestor, u32 client_id,
602 		  u32 function, u32 timeout_ms,
603 		  struct vmmdev_hgcm_function_parameter *parms, u32 parm_count,
604 		  int *vbox_status)
605 {
606 	struct vmmdev_hgcm_call *call;
607 	void **bounce_bufs = NULL;
608 	bool leak_it;
609 	size_t size;
610 	int i, ret;
611 
612 	size = sizeof(struct vmmdev_hgcm_call) +
613 		   parm_count * sizeof(struct vmmdev_hgcm_function_parameter);
614 	/*
615 	 * Validate and buffer the parameters for the call. This also increases
616 	 * call_size with the amount of extra space needed for page lists.
617 	 */
618 	ret = hgcm_call_preprocess(parms, parm_count, &bounce_bufs, &size);
619 	if (ret) {
620 		/* Even on error bounce bufs may still have been allocated */
621 		goto free_bounce_bufs;
622 	}
623 
624 	call = vbg_req_alloc(size, VMMDEVREQ_HGCM_CALL, requestor);
625 	if (!call) {
626 		ret = -ENOMEM;
627 		goto free_bounce_bufs;
628 	}
629 
630 	hgcm_call_init_call(call, client_id, function, parms, parm_count,
631 			    bounce_bufs);
632 
633 	ret = vbg_hgcm_do_call(gdev, call, timeout_ms, &leak_it);
634 	if (ret == 0) {
635 		*vbox_status = call->header.result;
636 		ret = hgcm_call_copy_back_result(call, parms, parm_count,
637 						 bounce_bufs);
638 	}
639 
640 	if (!leak_it)
641 		vbg_req_free(call, size);
642 
643 free_bounce_bufs:
644 	if (bounce_bufs) {
645 		for (i = 0; i < parm_count; i++)
646 			kvfree(bounce_bufs[i]);
647 		kfree(bounce_bufs);
648 	}
649 
650 	return ret;
651 }
652 EXPORT_SYMBOL(vbg_hgcm_call);
653 
654 #ifdef CONFIG_COMPAT
655 int vbg_hgcm_call32(
656 	struct vbg_dev *gdev, u32 requestor, u32 client_id, u32 function,
657 	u32 timeout_ms, struct vmmdev_hgcm_function_parameter32 *parm32,
658 	u32 parm_count, int *vbox_status)
659 {
660 	struct vmmdev_hgcm_function_parameter *parm64 = NULL;
661 	u32 i, size;
662 	int ret = 0;
663 
664 	/* KISS allocate a temporary request and convert the parameters. */
665 	size = parm_count * sizeof(struct vmmdev_hgcm_function_parameter);
666 	parm64 = kzalloc(size, GFP_KERNEL);
667 	if (!parm64)
668 		return -ENOMEM;
669 
670 	for (i = 0; i < parm_count; i++) {
671 		switch (parm32[i].type) {
672 		case VMMDEV_HGCM_PARM_TYPE_32BIT:
673 			parm64[i].type = VMMDEV_HGCM_PARM_TYPE_32BIT;
674 			parm64[i].u.value32 = parm32[i].u.value32;
675 			break;
676 
677 		case VMMDEV_HGCM_PARM_TYPE_64BIT:
678 			parm64[i].type = VMMDEV_HGCM_PARM_TYPE_64BIT;
679 			parm64[i].u.value64 = parm32[i].u.value64;
680 			break;
681 
682 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
683 		case VMMDEV_HGCM_PARM_TYPE_LINADDR:
684 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
685 			parm64[i].type = parm32[i].type;
686 			parm64[i].u.pointer.size = parm32[i].u.pointer.size;
687 			parm64[i].u.pointer.u.linear_addr =
688 			    parm32[i].u.pointer.u.linear_addr;
689 			break;
690 
691 		default:
692 			ret = -EINVAL;
693 		}
694 		if (ret < 0)
695 			goto out_free;
696 	}
697 
698 	ret = vbg_hgcm_call(gdev, requestor, client_id, function, timeout_ms,
699 			    parm64, parm_count, vbox_status);
700 	if (ret < 0)
701 		goto out_free;
702 
703 	/* Copy back. */
704 	for (i = 0; i < parm_count; i++, parm32++, parm64++) {
705 		switch (parm64[i].type) {
706 		case VMMDEV_HGCM_PARM_TYPE_32BIT:
707 			parm32[i].u.value32 = parm64[i].u.value32;
708 			break;
709 
710 		case VMMDEV_HGCM_PARM_TYPE_64BIT:
711 			parm32[i].u.value64 = parm64[i].u.value64;
712 			break;
713 
714 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_OUT:
715 		case VMMDEV_HGCM_PARM_TYPE_LINADDR:
716 		case VMMDEV_HGCM_PARM_TYPE_LINADDR_IN:
717 			parm32[i].u.pointer.size = parm64[i].u.pointer.size;
718 			break;
719 
720 		default:
721 			WARN_ON(1);
722 			ret = -EINVAL;
723 		}
724 	}
725 
726 out_free:
727 	kfree(parm64);
728 	return ret;
729 }
730 #endif
731 
732 static const int vbg_status_code_to_errno_table[] = {
733 	[-VERR_ACCESS_DENIED]                            = -EPERM,
734 	[-VERR_FILE_NOT_FOUND]                           = -ENOENT,
735 	[-VERR_PROCESS_NOT_FOUND]                        = -ESRCH,
736 	[-VERR_INTERRUPTED]                              = -EINTR,
737 	[-VERR_DEV_IO_ERROR]                             = -EIO,
738 	[-VERR_TOO_MUCH_DATA]                            = -E2BIG,
739 	[-VERR_BAD_EXE_FORMAT]                           = -ENOEXEC,
740 	[-VERR_INVALID_HANDLE]                           = -EBADF,
741 	[-VERR_TRY_AGAIN]                                = -EAGAIN,
742 	[-VERR_NO_MEMORY]                                = -ENOMEM,
743 	[-VERR_INVALID_POINTER]                          = -EFAULT,
744 	[-VERR_RESOURCE_BUSY]                            = -EBUSY,
745 	[-VERR_ALREADY_EXISTS]                           = -EEXIST,
746 	[-VERR_NOT_SAME_DEVICE]                          = -EXDEV,
747 	[-VERR_NOT_A_DIRECTORY]                          = -ENOTDIR,
748 	[-VERR_PATH_NOT_FOUND]                           = -ENOTDIR,
749 	[-VERR_INVALID_NAME]                             = -ENOENT,
750 	[-VERR_IS_A_DIRECTORY]                           = -EISDIR,
751 	[-VERR_INVALID_PARAMETER]                        = -EINVAL,
752 	[-VERR_TOO_MANY_OPEN_FILES]                      = -ENFILE,
753 	[-VERR_INVALID_FUNCTION]                         = -ENOTTY,
754 	[-VERR_SHARING_VIOLATION]                        = -ETXTBSY,
755 	[-VERR_FILE_TOO_BIG]                             = -EFBIG,
756 	[-VERR_DISK_FULL]                                = -ENOSPC,
757 	[-VERR_SEEK_ON_DEVICE]                           = -ESPIPE,
758 	[-VERR_WRITE_PROTECT]                            = -EROFS,
759 	[-VERR_BROKEN_PIPE]                              = -EPIPE,
760 	[-VERR_DEADLOCK]                                 = -EDEADLK,
761 	[-VERR_FILENAME_TOO_LONG]                        = -ENAMETOOLONG,
762 	[-VERR_FILE_LOCK_FAILED]                         = -ENOLCK,
763 	[-VERR_NOT_IMPLEMENTED]                          = -ENOSYS,
764 	[-VERR_NOT_SUPPORTED]                            = -ENOSYS,
765 	[-VERR_DIR_NOT_EMPTY]                            = -ENOTEMPTY,
766 	[-VERR_TOO_MANY_SYMLINKS]                        = -ELOOP,
767 	[-VERR_NO_MORE_FILES]				 = -ENODATA,
768 	[-VERR_NO_DATA]                                  = -ENODATA,
769 	[-VERR_NET_NO_NETWORK]                           = -ENONET,
770 	[-VERR_NET_NOT_UNIQUE_NAME]                      = -ENOTUNIQ,
771 	[-VERR_NO_TRANSLATION]                           = -EILSEQ,
772 	[-VERR_NET_NOT_SOCKET]                           = -ENOTSOCK,
773 	[-VERR_NET_DEST_ADDRESS_REQUIRED]                = -EDESTADDRREQ,
774 	[-VERR_NET_MSG_SIZE]                             = -EMSGSIZE,
775 	[-VERR_NET_PROTOCOL_TYPE]                        = -EPROTOTYPE,
776 	[-VERR_NET_PROTOCOL_NOT_AVAILABLE]               = -ENOPROTOOPT,
777 	[-VERR_NET_PROTOCOL_NOT_SUPPORTED]               = -EPROTONOSUPPORT,
778 	[-VERR_NET_SOCKET_TYPE_NOT_SUPPORTED]            = -ESOCKTNOSUPPORT,
779 	[-VERR_NET_OPERATION_NOT_SUPPORTED]              = -EOPNOTSUPP,
780 	[-VERR_NET_PROTOCOL_FAMILY_NOT_SUPPORTED]        = -EPFNOSUPPORT,
781 	[-VERR_NET_ADDRESS_FAMILY_NOT_SUPPORTED]         = -EAFNOSUPPORT,
782 	[-VERR_NET_ADDRESS_IN_USE]                       = -EADDRINUSE,
783 	[-VERR_NET_ADDRESS_NOT_AVAILABLE]                = -EADDRNOTAVAIL,
784 	[-VERR_NET_DOWN]                                 = -ENETDOWN,
785 	[-VERR_NET_UNREACHABLE]                          = -ENETUNREACH,
786 	[-VERR_NET_CONNECTION_RESET]                     = -ENETRESET,
787 	[-VERR_NET_CONNECTION_ABORTED]                   = -ECONNABORTED,
788 	[-VERR_NET_CONNECTION_RESET_BY_PEER]             = -ECONNRESET,
789 	[-VERR_NET_NO_BUFFER_SPACE]                      = -ENOBUFS,
790 	[-VERR_NET_ALREADY_CONNECTED]                    = -EISCONN,
791 	[-VERR_NET_NOT_CONNECTED]                        = -ENOTCONN,
792 	[-VERR_NET_SHUTDOWN]                             = -ESHUTDOWN,
793 	[-VERR_NET_TOO_MANY_REFERENCES]                  = -ETOOMANYREFS,
794 	[-VERR_TIMEOUT]                                  = -ETIMEDOUT,
795 	[-VERR_NET_CONNECTION_REFUSED]                   = -ECONNREFUSED,
796 	[-VERR_NET_HOST_DOWN]                            = -EHOSTDOWN,
797 	[-VERR_NET_HOST_UNREACHABLE]                     = -EHOSTUNREACH,
798 	[-VERR_NET_ALREADY_IN_PROGRESS]                  = -EALREADY,
799 	[-VERR_NET_IN_PROGRESS]                          = -EINPROGRESS,
800 	[-VERR_MEDIA_NOT_PRESENT]                        = -ENOMEDIUM,
801 	[-VERR_MEDIA_NOT_RECOGNIZED]                     = -EMEDIUMTYPE,
802 };
803 
804 int vbg_status_code_to_errno(int rc)
805 {
806 	if (rc >= 0)
807 		return 0;
808 
809 	rc = -rc;
810 	if (rc >= ARRAY_SIZE(vbg_status_code_to_errno_table) ||
811 	    vbg_status_code_to_errno_table[rc] == 0) {
812 		vbg_warn("%s: Unhandled err %d\n", __func__, -rc);
813 		return -EPROTO;
814 	}
815 
816 	return vbg_status_code_to_errno_table[rc];
817 }
818 EXPORT_SYMBOL(vbg_status_code_to_errno);
819