18c2ecf20Sopenharmony_ci/* SPDX-License-Identifier: GPL-2.0 */ 28c2ecf20Sopenharmony_ci/* 38c2ecf20Sopenharmony_ci * vboxguest linux pci driver, char-dev and input-device code, 48c2ecf20Sopenharmony_ci * 58c2ecf20Sopenharmony_ci * Copyright (C) 2006-2016 Oracle Corporation 68c2ecf20Sopenharmony_ci */ 78c2ecf20Sopenharmony_ci 88c2ecf20Sopenharmony_ci#include <linux/cred.h> 98c2ecf20Sopenharmony_ci#include <linux/input.h> 108c2ecf20Sopenharmony_ci#include <linux/kernel.h> 118c2ecf20Sopenharmony_ci#include <linux/miscdevice.h> 128c2ecf20Sopenharmony_ci#include <linux/module.h> 138c2ecf20Sopenharmony_ci#include <linux/pci.h> 148c2ecf20Sopenharmony_ci#include <linux/poll.h> 158c2ecf20Sopenharmony_ci#include <linux/vbox_utils.h> 168c2ecf20Sopenharmony_ci#include "vboxguest_core.h" 178c2ecf20Sopenharmony_ci 188c2ecf20Sopenharmony_ci/** The device name. */ 198c2ecf20Sopenharmony_ci#define DEVICE_NAME "vboxguest" 208c2ecf20Sopenharmony_ci/** The device name for the device node open to everyone. */ 218c2ecf20Sopenharmony_ci#define DEVICE_NAME_USER "vboxuser" 228c2ecf20Sopenharmony_ci/** VirtualBox PCI vendor ID. */ 238c2ecf20Sopenharmony_ci#define VBOX_VENDORID 0x80ee 248c2ecf20Sopenharmony_ci/** VMMDev PCI card product ID. */ 258c2ecf20Sopenharmony_ci#define VMMDEV_DEVICEID 0xcafe 268c2ecf20Sopenharmony_ci 278c2ecf20Sopenharmony_ci/** Mutex protecting the global vbg_gdev pointer used by vbg_get/put_gdev. */ 288c2ecf20Sopenharmony_cistatic DEFINE_MUTEX(vbg_gdev_mutex); 298c2ecf20Sopenharmony_ci/** Global vbg_gdev pointer used by vbg_get/put_gdev. */ 308c2ecf20Sopenharmony_cistatic struct vbg_dev *vbg_gdev; 318c2ecf20Sopenharmony_ci 328c2ecf20Sopenharmony_cistatic u32 vbg_misc_device_requestor(struct inode *inode) 338c2ecf20Sopenharmony_ci{ 348c2ecf20Sopenharmony_ci u32 requestor = VMMDEV_REQUESTOR_USERMODE | 358c2ecf20Sopenharmony_ci VMMDEV_REQUESTOR_CON_DONT_KNOW | 368c2ecf20Sopenharmony_ci VMMDEV_REQUESTOR_TRUST_NOT_GIVEN; 378c2ecf20Sopenharmony_ci 388c2ecf20Sopenharmony_ci if (from_kuid(current_user_ns(), current_uid()) == 0) 398c2ecf20Sopenharmony_ci requestor |= VMMDEV_REQUESTOR_USR_ROOT; 408c2ecf20Sopenharmony_ci else 418c2ecf20Sopenharmony_ci requestor |= VMMDEV_REQUESTOR_USR_USER; 428c2ecf20Sopenharmony_ci 438c2ecf20Sopenharmony_ci if (in_egroup_p(inode->i_gid)) 448c2ecf20Sopenharmony_ci requestor |= VMMDEV_REQUESTOR_GRP_VBOX; 458c2ecf20Sopenharmony_ci 468c2ecf20Sopenharmony_ci return requestor; 478c2ecf20Sopenharmony_ci} 488c2ecf20Sopenharmony_ci 498c2ecf20Sopenharmony_cistatic int vbg_misc_device_open(struct inode *inode, struct file *filp) 508c2ecf20Sopenharmony_ci{ 518c2ecf20Sopenharmony_ci struct vbg_session *session; 528c2ecf20Sopenharmony_ci struct vbg_dev *gdev; 538c2ecf20Sopenharmony_ci 548c2ecf20Sopenharmony_ci /* misc_open sets filp->private_data to our misc device */ 558c2ecf20Sopenharmony_ci gdev = container_of(filp->private_data, struct vbg_dev, misc_device); 568c2ecf20Sopenharmony_ci 578c2ecf20Sopenharmony_ci session = vbg_core_open_session(gdev, vbg_misc_device_requestor(inode)); 588c2ecf20Sopenharmony_ci if (IS_ERR(session)) 598c2ecf20Sopenharmony_ci return PTR_ERR(session); 608c2ecf20Sopenharmony_ci 618c2ecf20Sopenharmony_ci filp->private_data = session; 628c2ecf20Sopenharmony_ci return 0; 638c2ecf20Sopenharmony_ci} 648c2ecf20Sopenharmony_ci 658c2ecf20Sopenharmony_cistatic int vbg_misc_device_user_open(struct inode *inode, struct file *filp) 668c2ecf20Sopenharmony_ci{ 678c2ecf20Sopenharmony_ci struct vbg_session *session; 688c2ecf20Sopenharmony_ci struct vbg_dev *gdev; 698c2ecf20Sopenharmony_ci 708c2ecf20Sopenharmony_ci /* misc_open sets filp->private_data to our misc device */ 718c2ecf20Sopenharmony_ci gdev = container_of(filp->private_data, struct vbg_dev, 728c2ecf20Sopenharmony_ci misc_device_user); 738c2ecf20Sopenharmony_ci 748c2ecf20Sopenharmony_ci session = vbg_core_open_session(gdev, vbg_misc_device_requestor(inode) | 758c2ecf20Sopenharmony_ci VMMDEV_REQUESTOR_USER_DEVICE); 768c2ecf20Sopenharmony_ci if (IS_ERR(session)) 778c2ecf20Sopenharmony_ci return PTR_ERR(session); 788c2ecf20Sopenharmony_ci 798c2ecf20Sopenharmony_ci filp->private_data = session; 808c2ecf20Sopenharmony_ci return 0; 818c2ecf20Sopenharmony_ci} 828c2ecf20Sopenharmony_ci 838c2ecf20Sopenharmony_ci/** 848c2ecf20Sopenharmony_ci * Close device. 858c2ecf20Sopenharmony_ci * Return: 0 on success, negated errno on failure. 868c2ecf20Sopenharmony_ci * @inode: Pointer to inode info structure. 878c2ecf20Sopenharmony_ci * @filp: Associated file pointer. 888c2ecf20Sopenharmony_ci */ 898c2ecf20Sopenharmony_cistatic int vbg_misc_device_close(struct inode *inode, struct file *filp) 908c2ecf20Sopenharmony_ci{ 918c2ecf20Sopenharmony_ci vbg_core_close_session(filp->private_data); 928c2ecf20Sopenharmony_ci filp->private_data = NULL; 938c2ecf20Sopenharmony_ci return 0; 948c2ecf20Sopenharmony_ci} 958c2ecf20Sopenharmony_ci 968c2ecf20Sopenharmony_ci/** 978c2ecf20Sopenharmony_ci * Device I/O Control entry point. 988c2ecf20Sopenharmony_ci * Return: 0 on success, negated errno on failure. 998c2ecf20Sopenharmony_ci * @filp: Associated file pointer. 1008c2ecf20Sopenharmony_ci * @req: The request specified to ioctl(). 1018c2ecf20Sopenharmony_ci * @arg: The argument specified to ioctl(). 1028c2ecf20Sopenharmony_ci */ 1038c2ecf20Sopenharmony_cistatic long vbg_misc_device_ioctl(struct file *filp, unsigned int req, 1048c2ecf20Sopenharmony_ci unsigned long arg) 1058c2ecf20Sopenharmony_ci{ 1068c2ecf20Sopenharmony_ci struct vbg_session *session = filp->private_data; 1078c2ecf20Sopenharmony_ci size_t returned_size, size; 1088c2ecf20Sopenharmony_ci struct vbg_ioctl_hdr hdr; 1098c2ecf20Sopenharmony_ci bool is_vmmdev_req; 1108c2ecf20Sopenharmony_ci int ret = 0; 1118c2ecf20Sopenharmony_ci void *buf; 1128c2ecf20Sopenharmony_ci 1138c2ecf20Sopenharmony_ci if (copy_from_user(&hdr, (void *)arg, sizeof(hdr))) 1148c2ecf20Sopenharmony_ci return -EFAULT; 1158c2ecf20Sopenharmony_ci 1168c2ecf20Sopenharmony_ci if (hdr.version != VBG_IOCTL_HDR_VERSION) 1178c2ecf20Sopenharmony_ci return -EINVAL; 1188c2ecf20Sopenharmony_ci 1198c2ecf20Sopenharmony_ci if (hdr.size_in < sizeof(hdr) || 1208c2ecf20Sopenharmony_ci (hdr.size_out && hdr.size_out < sizeof(hdr))) 1218c2ecf20Sopenharmony_ci return -EINVAL; 1228c2ecf20Sopenharmony_ci 1238c2ecf20Sopenharmony_ci size = max(hdr.size_in, hdr.size_out); 1248c2ecf20Sopenharmony_ci if (_IOC_SIZE(req) && _IOC_SIZE(req) != size) 1258c2ecf20Sopenharmony_ci return -EINVAL; 1268c2ecf20Sopenharmony_ci if (size > SZ_16M) 1278c2ecf20Sopenharmony_ci return -E2BIG; 1288c2ecf20Sopenharmony_ci 1298c2ecf20Sopenharmony_ci /* 1308c2ecf20Sopenharmony_ci * IOCTL_VMMDEV_REQUEST needs the buffer to be below 4G to avoid 1318c2ecf20Sopenharmony_ci * the need for a bounce-buffer and another copy later on. 1328c2ecf20Sopenharmony_ci */ 1338c2ecf20Sopenharmony_ci is_vmmdev_req = (req & ~IOCSIZE_MASK) == VBG_IOCTL_VMMDEV_REQUEST(0) || 1348c2ecf20Sopenharmony_ci req == VBG_IOCTL_VMMDEV_REQUEST_BIG || 1358c2ecf20Sopenharmony_ci req == VBG_IOCTL_VMMDEV_REQUEST_BIG_ALT; 1368c2ecf20Sopenharmony_ci 1378c2ecf20Sopenharmony_ci if (is_vmmdev_req) 1388c2ecf20Sopenharmony_ci buf = vbg_req_alloc(size, VBG_IOCTL_HDR_TYPE_DEFAULT, 1398c2ecf20Sopenharmony_ci session->requestor); 1408c2ecf20Sopenharmony_ci else 1418c2ecf20Sopenharmony_ci buf = kmalloc(size, GFP_KERNEL); 1428c2ecf20Sopenharmony_ci if (!buf) 1438c2ecf20Sopenharmony_ci return -ENOMEM; 1448c2ecf20Sopenharmony_ci 1458c2ecf20Sopenharmony_ci *((struct vbg_ioctl_hdr *)buf) = hdr; 1468c2ecf20Sopenharmony_ci if (copy_from_user(buf + sizeof(hdr), (void *)arg + sizeof(hdr), 1478c2ecf20Sopenharmony_ci hdr.size_in - sizeof(hdr))) { 1488c2ecf20Sopenharmony_ci ret = -EFAULT; 1498c2ecf20Sopenharmony_ci goto out; 1508c2ecf20Sopenharmony_ci } 1518c2ecf20Sopenharmony_ci if (hdr.size_in < size) 1528c2ecf20Sopenharmony_ci memset(buf + hdr.size_in, 0, size - hdr.size_in); 1538c2ecf20Sopenharmony_ci 1548c2ecf20Sopenharmony_ci ret = vbg_core_ioctl(session, req, buf); 1558c2ecf20Sopenharmony_ci if (ret) 1568c2ecf20Sopenharmony_ci goto out; 1578c2ecf20Sopenharmony_ci 1588c2ecf20Sopenharmony_ci returned_size = ((struct vbg_ioctl_hdr *)buf)->size_out; 1598c2ecf20Sopenharmony_ci if (returned_size > size) { 1608c2ecf20Sopenharmony_ci vbg_debug("%s: too much output data %zu > %zu\n", 1618c2ecf20Sopenharmony_ci __func__, returned_size, size); 1628c2ecf20Sopenharmony_ci returned_size = size; 1638c2ecf20Sopenharmony_ci } 1648c2ecf20Sopenharmony_ci if (copy_to_user((void *)arg, buf, returned_size) != 0) 1658c2ecf20Sopenharmony_ci ret = -EFAULT; 1668c2ecf20Sopenharmony_ci 1678c2ecf20Sopenharmony_ciout: 1688c2ecf20Sopenharmony_ci if (is_vmmdev_req) 1698c2ecf20Sopenharmony_ci vbg_req_free(buf, size); 1708c2ecf20Sopenharmony_ci else 1718c2ecf20Sopenharmony_ci kfree(buf); 1728c2ecf20Sopenharmony_ci 1738c2ecf20Sopenharmony_ci return ret; 1748c2ecf20Sopenharmony_ci} 1758c2ecf20Sopenharmony_ci 1768c2ecf20Sopenharmony_ci/** The file_operations structures. */ 1778c2ecf20Sopenharmony_cistatic const struct file_operations vbg_misc_device_fops = { 1788c2ecf20Sopenharmony_ci .owner = THIS_MODULE, 1798c2ecf20Sopenharmony_ci .open = vbg_misc_device_open, 1808c2ecf20Sopenharmony_ci .release = vbg_misc_device_close, 1818c2ecf20Sopenharmony_ci .unlocked_ioctl = vbg_misc_device_ioctl, 1828c2ecf20Sopenharmony_ci#ifdef CONFIG_COMPAT 1838c2ecf20Sopenharmony_ci .compat_ioctl = vbg_misc_device_ioctl, 1848c2ecf20Sopenharmony_ci#endif 1858c2ecf20Sopenharmony_ci}; 1868c2ecf20Sopenharmony_cistatic const struct file_operations vbg_misc_device_user_fops = { 1878c2ecf20Sopenharmony_ci .owner = THIS_MODULE, 1888c2ecf20Sopenharmony_ci .open = vbg_misc_device_user_open, 1898c2ecf20Sopenharmony_ci .release = vbg_misc_device_close, 1908c2ecf20Sopenharmony_ci .unlocked_ioctl = vbg_misc_device_ioctl, 1918c2ecf20Sopenharmony_ci#ifdef CONFIG_COMPAT 1928c2ecf20Sopenharmony_ci .compat_ioctl = vbg_misc_device_ioctl, 1938c2ecf20Sopenharmony_ci#endif 1948c2ecf20Sopenharmony_ci}; 1958c2ecf20Sopenharmony_ci 1968c2ecf20Sopenharmony_ci/** 1978c2ecf20Sopenharmony_ci * Called when the input device is first opened. 1988c2ecf20Sopenharmony_ci * 1998c2ecf20Sopenharmony_ci * Sets up absolute mouse reporting. 2008c2ecf20Sopenharmony_ci */ 2018c2ecf20Sopenharmony_cistatic int vbg_input_open(struct input_dev *input) 2028c2ecf20Sopenharmony_ci{ 2038c2ecf20Sopenharmony_ci struct vbg_dev *gdev = input_get_drvdata(input); 2048c2ecf20Sopenharmony_ci u32 feat = VMMDEV_MOUSE_GUEST_CAN_ABSOLUTE | VMMDEV_MOUSE_NEW_PROTOCOL; 2058c2ecf20Sopenharmony_ci 2068c2ecf20Sopenharmony_ci return vbg_core_set_mouse_status(gdev, feat); 2078c2ecf20Sopenharmony_ci} 2088c2ecf20Sopenharmony_ci 2098c2ecf20Sopenharmony_ci/** 2108c2ecf20Sopenharmony_ci * Called if all open handles to the input device are closed. 2118c2ecf20Sopenharmony_ci * 2128c2ecf20Sopenharmony_ci * Disables absolute reporting. 2138c2ecf20Sopenharmony_ci */ 2148c2ecf20Sopenharmony_cistatic void vbg_input_close(struct input_dev *input) 2158c2ecf20Sopenharmony_ci{ 2168c2ecf20Sopenharmony_ci struct vbg_dev *gdev = input_get_drvdata(input); 2178c2ecf20Sopenharmony_ci 2188c2ecf20Sopenharmony_ci vbg_core_set_mouse_status(gdev, 0); 2198c2ecf20Sopenharmony_ci} 2208c2ecf20Sopenharmony_ci 2218c2ecf20Sopenharmony_ci/** 2228c2ecf20Sopenharmony_ci * Creates the kernel input device. 2238c2ecf20Sopenharmony_ci * 2248c2ecf20Sopenharmony_ci * Return: 0 on success, negated errno on failure. 2258c2ecf20Sopenharmony_ci */ 2268c2ecf20Sopenharmony_cistatic int vbg_create_input_device(struct vbg_dev *gdev) 2278c2ecf20Sopenharmony_ci{ 2288c2ecf20Sopenharmony_ci struct input_dev *input; 2298c2ecf20Sopenharmony_ci 2308c2ecf20Sopenharmony_ci input = devm_input_allocate_device(gdev->dev); 2318c2ecf20Sopenharmony_ci if (!input) 2328c2ecf20Sopenharmony_ci return -ENOMEM; 2338c2ecf20Sopenharmony_ci 2348c2ecf20Sopenharmony_ci input->id.bustype = BUS_PCI; 2358c2ecf20Sopenharmony_ci input->id.vendor = VBOX_VENDORID; 2368c2ecf20Sopenharmony_ci input->id.product = VMMDEV_DEVICEID; 2378c2ecf20Sopenharmony_ci input->open = vbg_input_open; 2388c2ecf20Sopenharmony_ci input->close = vbg_input_close; 2398c2ecf20Sopenharmony_ci input->dev.parent = gdev->dev; 2408c2ecf20Sopenharmony_ci input->name = "VirtualBox mouse integration"; 2418c2ecf20Sopenharmony_ci 2428c2ecf20Sopenharmony_ci input_set_abs_params(input, ABS_X, VMMDEV_MOUSE_RANGE_MIN, 2438c2ecf20Sopenharmony_ci VMMDEV_MOUSE_RANGE_MAX, 0, 0); 2448c2ecf20Sopenharmony_ci input_set_abs_params(input, ABS_Y, VMMDEV_MOUSE_RANGE_MIN, 2458c2ecf20Sopenharmony_ci VMMDEV_MOUSE_RANGE_MAX, 0, 0); 2468c2ecf20Sopenharmony_ci input_set_capability(input, EV_KEY, BTN_MOUSE); 2478c2ecf20Sopenharmony_ci input_set_drvdata(input, gdev); 2488c2ecf20Sopenharmony_ci 2498c2ecf20Sopenharmony_ci gdev->input = input; 2508c2ecf20Sopenharmony_ci 2518c2ecf20Sopenharmony_ci return input_register_device(gdev->input); 2528c2ecf20Sopenharmony_ci} 2538c2ecf20Sopenharmony_ci 2548c2ecf20Sopenharmony_cistatic ssize_t host_version_show(struct device *dev, 2558c2ecf20Sopenharmony_ci struct device_attribute *attr, char *buf) 2568c2ecf20Sopenharmony_ci{ 2578c2ecf20Sopenharmony_ci struct vbg_dev *gdev = dev_get_drvdata(dev); 2588c2ecf20Sopenharmony_ci 2598c2ecf20Sopenharmony_ci return sprintf(buf, "%s\n", gdev->host_version); 2608c2ecf20Sopenharmony_ci} 2618c2ecf20Sopenharmony_ci 2628c2ecf20Sopenharmony_cistatic ssize_t host_features_show(struct device *dev, 2638c2ecf20Sopenharmony_ci struct device_attribute *attr, char *buf) 2648c2ecf20Sopenharmony_ci{ 2658c2ecf20Sopenharmony_ci struct vbg_dev *gdev = dev_get_drvdata(dev); 2668c2ecf20Sopenharmony_ci 2678c2ecf20Sopenharmony_ci return sprintf(buf, "%#x\n", gdev->host_features); 2688c2ecf20Sopenharmony_ci} 2698c2ecf20Sopenharmony_ci 2708c2ecf20Sopenharmony_cistatic DEVICE_ATTR_RO(host_version); 2718c2ecf20Sopenharmony_cistatic DEVICE_ATTR_RO(host_features); 2728c2ecf20Sopenharmony_ci 2738c2ecf20Sopenharmony_ci/** 2748c2ecf20Sopenharmony_ci * Does the PCI detection and init of the device. 2758c2ecf20Sopenharmony_ci * 2768c2ecf20Sopenharmony_ci * Return: 0 on success, negated errno on failure. 2778c2ecf20Sopenharmony_ci */ 2788c2ecf20Sopenharmony_cistatic int vbg_pci_probe(struct pci_dev *pci, const struct pci_device_id *id) 2798c2ecf20Sopenharmony_ci{ 2808c2ecf20Sopenharmony_ci struct device *dev = &pci->dev; 2818c2ecf20Sopenharmony_ci resource_size_t io, io_len, mmio, mmio_len; 2828c2ecf20Sopenharmony_ci struct vmmdev_memory *vmmdev; 2838c2ecf20Sopenharmony_ci struct vbg_dev *gdev; 2848c2ecf20Sopenharmony_ci int ret; 2858c2ecf20Sopenharmony_ci 2868c2ecf20Sopenharmony_ci gdev = devm_kzalloc(dev, sizeof(*gdev), GFP_KERNEL); 2878c2ecf20Sopenharmony_ci if (!gdev) 2888c2ecf20Sopenharmony_ci return -ENOMEM; 2898c2ecf20Sopenharmony_ci 2908c2ecf20Sopenharmony_ci ret = pci_enable_device(pci); 2918c2ecf20Sopenharmony_ci if (ret != 0) { 2928c2ecf20Sopenharmony_ci vbg_err("vboxguest: Error enabling device: %d\n", ret); 2938c2ecf20Sopenharmony_ci return ret; 2948c2ecf20Sopenharmony_ci } 2958c2ecf20Sopenharmony_ci 2968c2ecf20Sopenharmony_ci ret = -ENODEV; 2978c2ecf20Sopenharmony_ci 2988c2ecf20Sopenharmony_ci io = pci_resource_start(pci, 0); 2998c2ecf20Sopenharmony_ci io_len = pci_resource_len(pci, 0); 3008c2ecf20Sopenharmony_ci if (!io || !io_len) { 3018c2ecf20Sopenharmony_ci vbg_err("vboxguest: Error IO-port resource (0) is missing\n"); 3028c2ecf20Sopenharmony_ci goto err_disable_pcidev; 3038c2ecf20Sopenharmony_ci } 3048c2ecf20Sopenharmony_ci if (devm_request_region(dev, io, io_len, DEVICE_NAME) == NULL) { 3058c2ecf20Sopenharmony_ci vbg_err("vboxguest: Error could not claim IO resource\n"); 3068c2ecf20Sopenharmony_ci ret = -EBUSY; 3078c2ecf20Sopenharmony_ci goto err_disable_pcidev; 3088c2ecf20Sopenharmony_ci } 3098c2ecf20Sopenharmony_ci 3108c2ecf20Sopenharmony_ci mmio = pci_resource_start(pci, 1); 3118c2ecf20Sopenharmony_ci mmio_len = pci_resource_len(pci, 1); 3128c2ecf20Sopenharmony_ci if (!mmio || !mmio_len) { 3138c2ecf20Sopenharmony_ci vbg_err("vboxguest: Error MMIO resource (1) is missing\n"); 3148c2ecf20Sopenharmony_ci goto err_disable_pcidev; 3158c2ecf20Sopenharmony_ci } 3168c2ecf20Sopenharmony_ci 3178c2ecf20Sopenharmony_ci if (devm_request_mem_region(dev, mmio, mmio_len, DEVICE_NAME) == NULL) { 3188c2ecf20Sopenharmony_ci vbg_err("vboxguest: Error could not claim MMIO resource\n"); 3198c2ecf20Sopenharmony_ci ret = -EBUSY; 3208c2ecf20Sopenharmony_ci goto err_disable_pcidev; 3218c2ecf20Sopenharmony_ci } 3228c2ecf20Sopenharmony_ci 3238c2ecf20Sopenharmony_ci vmmdev = devm_ioremap(dev, mmio, mmio_len); 3248c2ecf20Sopenharmony_ci if (!vmmdev) { 3258c2ecf20Sopenharmony_ci vbg_err("vboxguest: Error ioremap failed; MMIO addr=%pap size=%pap\n", 3268c2ecf20Sopenharmony_ci &mmio, &mmio_len); 3278c2ecf20Sopenharmony_ci goto err_disable_pcidev; 3288c2ecf20Sopenharmony_ci } 3298c2ecf20Sopenharmony_ci 3308c2ecf20Sopenharmony_ci /* Validate MMIO region version and size. */ 3318c2ecf20Sopenharmony_ci if (vmmdev->version != VMMDEV_MEMORY_VERSION || 3328c2ecf20Sopenharmony_ci vmmdev->size < 32 || vmmdev->size > mmio_len) { 3338c2ecf20Sopenharmony_ci vbg_err("vboxguest: Bogus VMMDev memory; version=%08x (expected %08x) size=%d (expected <= %d)\n", 3348c2ecf20Sopenharmony_ci vmmdev->version, VMMDEV_MEMORY_VERSION, 3358c2ecf20Sopenharmony_ci vmmdev->size, (int)mmio_len); 3368c2ecf20Sopenharmony_ci goto err_disable_pcidev; 3378c2ecf20Sopenharmony_ci } 3388c2ecf20Sopenharmony_ci 3398c2ecf20Sopenharmony_ci gdev->io_port = io; 3408c2ecf20Sopenharmony_ci gdev->mmio = vmmdev; 3418c2ecf20Sopenharmony_ci gdev->dev = dev; 3428c2ecf20Sopenharmony_ci gdev->misc_device.minor = MISC_DYNAMIC_MINOR; 3438c2ecf20Sopenharmony_ci gdev->misc_device.name = DEVICE_NAME; 3448c2ecf20Sopenharmony_ci gdev->misc_device.fops = &vbg_misc_device_fops; 3458c2ecf20Sopenharmony_ci gdev->misc_device_user.minor = MISC_DYNAMIC_MINOR; 3468c2ecf20Sopenharmony_ci gdev->misc_device_user.name = DEVICE_NAME_USER; 3478c2ecf20Sopenharmony_ci gdev->misc_device_user.fops = &vbg_misc_device_user_fops; 3488c2ecf20Sopenharmony_ci 3498c2ecf20Sopenharmony_ci ret = vbg_core_init(gdev, VMMDEV_EVENT_MOUSE_POSITION_CHANGED); 3508c2ecf20Sopenharmony_ci if (ret) 3518c2ecf20Sopenharmony_ci goto err_disable_pcidev; 3528c2ecf20Sopenharmony_ci 3538c2ecf20Sopenharmony_ci ret = vbg_create_input_device(gdev); 3548c2ecf20Sopenharmony_ci if (ret) { 3558c2ecf20Sopenharmony_ci vbg_err("vboxguest: Error creating input device: %d\n", ret); 3568c2ecf20Sopenharmony_ci goto err_vbg_core_exit; 3578c2ecf20Sopenharmony_ci } 3588c2ecf20Sopenharmony_ci 3598c2ecf20Sopenharmony_ci ret = request_irq(pci->irq, vbg_core_isr, IRQF_SHARED, DEVICE_NAME, 3608c2ecf20Sopenharmony_ci gdev); 3618c2ecf20Sopenharmony_ci if (ret) { 3628c2ecf20Sopenharmony_ci vbg_err("vboxguest: Error requesting irq: %d\n", ret); 3638c2ecf20Sopenharmony_ci goto err_vbg_core_exit; 3648c2ecf20Sopenharmony_ci } 3658c2ecf20Sopenharmony_ci 3668c2ecf20Sopenharmony_ci ret = misc_register(&gdev->misc_device); 3678c2ecf20Sopenharmony_ci if (ret) { 3688c2ecf20Sopenharmony_ci vbg_err("vboxguest: Error misc_register %s failed: %d\n", 3698c2ecf20Sopenharmony_ci DEVICE_NAME, ret); 3708c2ecf20Sopenharmony_ci goto err_free_irq; 3718c2ecf20Sopenharmony_ci } 3728c2ecf20Sopenharmony_ci 3738c2ecf20Sopenharmony_ci ret = misc_register(&gdev->misc_device_user); 3748c2ecf20Sopenharmony_ci if (ret) { 3758c2ecf20Sopenharmony_ci vbg_err("vboxguest: Error misc_register %s failed: %d\n", 3768c2ecf20Sopenharmony_ci DEVICE_NAME_USER, ret); 3778c2ecf20Sopenharmony_ci goto err_unregister_misc_device; 3788c2ecf20Sopenharmony_ci } 3798c2ecf20Sopenharmony_ci 3808c2ecf20Sopenharmony_ci mutex_lock(&vbg_gdev_mutex); 3818c2ecf20Sopenharmony_ci if (!vbg_gdev) 3828c2ecf20Sopenharmony_ci vbg_gdev = gdev; 3838c2ecf20Sopenharmony_ci else 3848c2ecf20Sopenharmony_ci ret = -EBUSY; 3858c2ecf20Sopenharmony_ci mutex_unlock(&vbg_gdev_mutex); 3868c2ecf20Sopenharmony_ci 3878c2ecf20Sopenharmony_ci if (ret) { 3888c2ecf20Sopenharmony_ci vbg_err("vboxguest: Error more then 1 vbox guest pci device\n"); 3898c2ecf20Sopenharmony_ci goto err_unregister_misc_device_user; 3908c2ecf20Sopenharmony_ci } 3918c2ecf20Sopenharmony_ci 3928c2ecf20Sopenharmony_ci pci_set_drvdata(pci, gdev); 3938c2ecf20Sopenharmony_ci device_create_file(dev, &dev_attr_host_version); 3948c2ecf20Sopenharmony_ci device_create_file(dev, &dev_attr_host_features); 3958c2ecf20Sopenharmony_ci 3968c2ecf20Sopenharmony_ci vbg_info("vboxguest: misc device minor %d, IRQ %d, I/O port %x, MMIO at %pap (size %pap)\n", 3978c2ecf20Sopenharmony_ci gdev->misc_device.minor, pci->irq, gdev->io_port, 3988c2ecf20Sopenharmony_ci &mmio, &mmio_len); 3998c2ecf20Sopenharmony_ci 4008c2ecf20Sopenharmony_ci return 0; 4018c2ecf20Sopenharmony_ci 4028c2ecf20Sopenharmony_cierr_unregister_misc_device_user: 4038c2ecf20Sopenharmony_ci misc_deregister(&gdev->misc_device_user); 4048c2ecf20Sopenharmony_cierr_unregister_misc_device: 4058c2ecf20Sopenharmony_ci misc_deregister(&gdev->misc_device); 4068c2ecf20Sopenharmony_cierr_free_irq: 4078c2ecf20Sopenharmony_ci free_irq(pci->irq, gdev); 4088c2ecf20Sopenharmony_cierr_vbg_core_exit: 4098c2ecf20Sopenharmony_ci vbg_core_exit(gdev); 4108c2ecf20Sopenharmony_cierr_disable_pcidev: 4118c2ecf20Sopenharmony_ci pci_disable_device(pci); 4128c2ecf20Sopenharmony_ci 4138c2ecf20Sopenharmony_ci return ret; 4148c2ecf20Sopenharmony_ci} 4158c2ecf20Sopenharmony_ci 4168c2ecf20Sopenharmony_cistatic void vbg_pci_remove(struct pci_dev *pci) 4178c2ecf20Sopenharmony_ci{ 4188c2ecf20Sopenharmony_ci struct vbg_dev *gdev = pci_get_drvdata(pci); 4198c2ecf20Sopenharmony_ci 4208c2ecf20Sopenharmony_ci mutex_lock(&vbg_gdev_mutex); 4218c2ecf20Sopenharmony_ci vbg_gdev = NULL; 4228c2ecf20Sopenharmony_ci mutex_unlock(&vbg_gdev_mutex); 4238c2ecf20Sopenharmony_ci 4248c2ecf20Sopenharmony_ci free_irq(pci->irq, gdev); 4258c2ecf20Sopenharmony_ci device_remove_file(gdev->dev, &dev_attr_host_features); 4268c2ecf20Sopenharmony_ci device_remove_file(gdev->dev, &dev_attr_host_version); 4278c2ecf20Sopenharmony_ci misc_deregister(&gdev->misc_device_user); 4288c2ecf20Sopenharmony_ci misc_deregister(&gdev->misc_device); 4298c2ecf20Sopenharmony_ci vbg_core_exit(gdev); 4308c2ecf20Sopenharmony_ci pci_disable_device(pci); 4318c2ecf20Sopenharmony_ci} 4328c2ecf20Sopenharmony_ci 4338c2ecf20Sopenharmony_cistruct vbg_dev *vbg_get_gdev(void) 4348c2ecf20Sopenharmony_ci{ 4358c2ecf20Sopenharmony_ci mutex_lock(&vbg_gdev_mutex); 4368c2ecf20Sopenharmony_ci 4378c2ecf20Sopenharmony_ci /* 4388c2ecf20Sopenharmony_ci * Note on success we keep the mutex locked until vbg_put_gdev(), 4398c2ecf20Sopenharmony_ci * this stops vbg_pci_remove from removing the device from underneath 4408c2ecf20Sopenharmony_ci * vboxsf. vboxsf will only hold a reference for a short while. 4418c2ecf20Sopenharmony_ci */ 4428c2ecf20Sopenharmony_ci if (vbg_gdev) 4438c2ecf20Sopenharmony_ci return vbg_gdev; 4448c2ecf20Sopenharmony_ci 4458c2ecf20Sopenharmony_ci mutex_unlock(&vbg_gdev_mutex); 4468c2ecf20Sopenharmony_ci return ERR_PTR(-ENODEV); 4478c2ecf20Sopenharmony_ci} 4488c2ecf20Sopenharmony_ciEXPORT_SYMBOL(vbg_get_gdev); 4498c2ecf20Sopenharmony_ci 4508c2ecf20Sopenharmony_civoid vbg_put_gdev(struct vbg_dev *gdev) 4518c2ecf20Sopenharmony_ci{ 4528c2ecf20Sopenharmony_ci WARN_ON(gdev != vbg_gdev); 4538c2ecf20Sopenharmony_ci mutex_unlock(&vbg_gdev_mutex); 4548c2ecf20Sopenharmony_ci} 4558c2ecf20Sopenharmony_ciEXPORT_SYMBOL(vbg_put_gdev); 4568c2ecf20Sopenharmony_ci 4578c2ecf20Sopenharmony_ci/** 4588c2ecf20Sopenharmony_ci * Callback for mouse events. 4598c2ecf20Sopenharmony_ci * 4608c2ecf20Sopenharmony_ci * This is called at the end of the ISR, after leaving the event spinlock, if 4618c2ecf20Sopenharmony_ci * VMMDEV_EVENT_MOUSE_POSITION_CHANGED was raised by the host. 4628c2ecf20Sopenharmony_ci * 4638c2ecf20Sopenharmony_ci * @gdev: The device extension. 4648c2ecf20Sopenharmony_ci */ 4658c2ecf20Sopenharmony_civoid vbg_linux_mouse_event(struct vbg_dev *gdev) 4668c2ecf20Sopenharmony_ci{ 4678c2ecf20Sopenharmony_ci int rc; 4688c2ecf20Sopenharmony_ci 4698c2ecf20Sopenharmony_ci /* Report events to the kernel input device */ 4708c2ecf20Sopenharmony_ci gdev->mouse_status_req->mouse_features = 0; 4718c2ecf20Sopenharmony_ci gdev->mouse_status_req->pointer_pos_x = 0; 4728c2ecf20Sopenharmony_ci gdev->mouse_status_req->pointer_pos_y = 0; 4738c2ecf20Sopenharmony_ci rc = vbg_req_perform(gdev, gdev->mouse_status_req); 4748c2ecf20Sopenharmony_ci if (rc >= 0) { 4758c2ecf20Sopenharmony_ci input_report_abs(gdev->input, ABS_X, 4768c2ecf20Sopenharmony_ci gdev->mouse_status_req->pointer_pos_x); 4778c2ecf20Sopenharmony_ci input_report_abs(gdev->input, ABS_Y, 4788c2ecf20Sopenharmony_ci gdev->mouse_status_req->pointer_pos_y); 4798c2ecf20Sopenharmony_ci input_sync(gdev->input); 4808c2ecf20Sopenharmony_ci } 4818c2ecf20Sopenharmony_ci} 4828c2ecf20Sopenharmony_ci 4838c2ecf20Sopenharmony_cistatic const struct pci_device_id vbg_pci_ids[] = { 4848c2ecf20Sopenharmony_ci { .vendor = VBOX_VENDORID, .device = VMMDEV_DEVICEID }, 4858c2ecf20Sopenharmony_ci {} 4868c2ecf20Sopenharmony_ci}; 4878c2ecf20Sopenharmony_ciMODULE_DEVICE_TABLE(pci, vbg_pci_ids); 4888c2ecf20Sopenharmony_ci 4898c2ecf20Sopenharmony_cistatic struct pci_driver vbg_pci_driver = { 4908c2ecf20Sopenharmony_ci .name = DEVICE_NAME, 4918c2ecf20Sopenharmony_ci .id_table = vbg_pci_ids, 4928c2ecf20Sopenharmony_ci .probe = vbg_pci_probe, 4938c2ecf20Sopenharmony_ci .remove = vbg_pci_remove, 4948c2ecf20Sopenharmony_ci}; 4958c2ecf20Sopenharmony_ci 4968c2ecf20Sopenharmony_cimodule_pci_driver(vbg_pci_driver); 4978c2ecf20Sopenharmony_ci 4988c2ecf20Sopenharmony_ciMODULE_AUTHOR("Oracle Corporation"); 4998c2ecf20Sopenharmony_ciMODULE_DESCRIPTION("Oracle VM VirtualBox Guest Additions for Linux Module"); 5008c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL"); 501