162306a36Sopenharmony_ci/* SPDX-License-Identifier: GPL-2.0 */ 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * vboxguest linux pci driver, char-dev and input-device code, 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (C) 2006-2016 Oracle Corporation 662306a36Sopenharmony_ci */ 762306a36Sopenharmony_ci 862306a36Sopenharmony_ci#include <linux/cred.h> 962306a36Sopenharmony_ci#include <linux/input.h> 1062306a36Sopenharmony_ci#include <linux/kernel.h> 1162306a36Sopenharmony_ci#include <linux/miscdevice.h> 1262306a36Sopenharmony_ci#include <linux/module.h> 1362306a36Sopenharmony_ci#include <linux/pci.h> 1462306a36Sopenharmony_ci#include <linux/poll.h> 1562306a36Sopenharmony_ci#include <linux/vbox_utils.h> 1662306a36Sopenharmony_ci#include "vboxguest_core.h" 1762306a36Sopenharmony_ci 1862306a36Sopenharmony_ci/** The device name. */ 1962306a36Sopenharmony_ci#define DEVICE_NAME "vboxguest" 2062306a36Sopenharmony_ci/** The device name for the device node open to everyone. */ 2162306a36Sopenharmony_ci#define DEVICE_NAME_USER "vboxuser" 2262306a36Sopenharmony_ci/** VirtualBox PCI vendor ID. */ 2362306a36Sopenharmony_ci#define VBOX_VENDORID 0x80ee 2462306a36Sopenharmony_ci/** VMMDev PCI card product ID. */ 2562306a36Sopenharmony_ci#define VMMDEV_DEVICEID 0xcafe 2662306a36Sopenharmony_ci 2762306a36Sopenharmony_ci/** Mutex protecting the global vbg_gdev pointer used by vbg_get/put_gdev. */ 2862306a36Sopenharmony_cistatic DEFINE_MUTEX(vbg_gdev_mutex); 2962306a36Sopenharmony_ci/** Global vbg_gdev pointer used by vbg_get/put_gdev. */ 3062306a36Sopenharmony_cistatic struct vbg_dev *vbg_gdev; 3162306a36Sopenharmony_ci 3262306a36Sopenharmony_cistatic u32 vbg_misc_device_requestor(struct inode *inode) 3362306a36Sopenharmony_ci{ 3462306a36Sopenharmony_ci u32 requestor = VMMDEV_REQUESTOR_USERMODE | 3562306a36Sopenharmony_ci VMMDEV_REQUESTOR_CON_DONT_KNOW | 3662306a36Sopenharmony_ci VMMDEV_REQUESTOR_TRUST_NOT_GIVEN; 3762306a36Sopenharmony_ci 3862306a36Sopenharmony_ci if (from_kuid(current_user_ns(), current_uid()) == 0) 3962306a36Sopenharmony_ci requestor |= VMMDEV_REQUESTOR_USR_ROOT; 4062306a36Sopenharmony_ci else 4162306a36Sopenharmony_ci requestor |= VMMDEV_REQUESTOR_USR_USER; 4262306a36Sopenharmony_ci 4362306a36Sopenharmony_ci if (in_egroup_p(inode->i_gid)) 4462306a36Sopenharmony_ci requestor |= VMMDEV_REQUESTOR_GRP_VBOX; 4562306a36Sopenharmony_ci 4662306a36Sopenharmony_ci return requestor; 4762306a36Sopenharmony_ci} 4862306a36Sopenharmony_ci 4962306a36Sopenharmony_cistatic int vbg_misc_device_open(struct inode *inode, struct file *filp) 5062306a36Sopenharmony_ci{ 5162306a36Sopenharmony_ci struct vbg_session *session; 5262306a36Sopenharmony_ci struct vbg_dev *gdev; 5362306a36Sopenharmony_ci 5462306a36Sopenharmony_ci /* misc_open sets filp->private_data to our misc device */ 5562306a36Sopenharmony_ci gdev = container_of(filp->private_data, struct vbg_dev, misc_device); 5662306a36Sopenharmony_ci 5762306a36Sopenharmony_ci session = vbg_core_open_session(gdev, vbg_misc_device_requestor(inode)); 5862306a36Sopenharmony_ci if (IS_ERR(session)) 5962306a36Sopenharmony_ci return PTR_ERR(session); 6062306a36Sopenharmony_ci 6162306a36Sopenharmony_ci filp->private_data = session; 6262306a36Sopenharmony_ci return 0; 6362306a36Sopenharmony_ci} 6462306a36Sopenharmony_ci 6562306a36Sopenharmony_cistatic int vbg_misc_device_user_open(struct inode *inode, struct file *filp) 6662306a36Sopenharmony_ci{ 6762306a36Sopenharmony_ci struct vbg_session *session; 6862306a36Sopenharmony_ci struct vbg_dev *gdev; 6962306a36Sopenharmony_ci 7062306a36Sopenharmony_ci /* misc_open sets filp->private_data to our misc device */ 7162306a36Sopenharmony_ci gdev = container_of(filp->private_data, struct vbg_dev, 7262306a36Sopenharmony_ci misc_device_user); 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_ci session = vbg_core_open_session(gdev, vbg_misc_device_requestor(inode) | 7562306a36Sopenharmony_ci VMMDEV_REQUESTOR_USER_DEVICE); 7662306a36Sopenharmony_ci if (IS_ERR(session)) 7762306a36Sopenharmony_ci return PTR_ERR(session); 7862306a36Sopenharmony_ci 7962306a36Sopenharmony_ci filp->private_data = session; 8062306a36Sopenharmony_ci return 0; 8162306a36Sopenharmony_ci} 8262306a36Sopenharmony_ci 8362306a36Sopenharmony_ci/** 8462306a36Sopenharmony_ci * Close device. 8562306a36Sopenharmony_ci * Return: 0 on success, negated errno on failure. 8662306a36Sopenharmony_ci * @inode: Pointer to inode info structure. 8762306a36Sopenharmony_ci * @filp: Associated file pointer. 8862306a36Sopenharmony_ci */ 8962306a36Sopenharmony_cistatic int vbg_misc_device_close(struct inode *inode, struct file *filp) 9062306a36Sopenharmony_ci{ 9162306a36Sopenharmony_ci vbg_core_close_session(filp->private_data); 9262306a36Sopenharmony_ci filp->private_data = NULL; 9362306a36Sopenharmony_ci return 0; 9462306a36Sopenharmony_ci} 9562306a36Sopenharmony_ci 9662306a36Sopenharmony_ci/** 9762306a36Sopenharmony_ci * Device I/O Control entry point. 9862306a36Sopenharmony_ci * Return: 0 on success, negated errno on failure. 9962306a36Sopenharmony_ci * @filp: Associated file pointer. 10062306a36Sopenharmony_ci * @req: The request specified to ioctl(). 10162306a36Sopenharmony_ci * @arg: The argument specified to ioctl(). 10262306a36Sopenharmony_ci */ 10362306a36Sopenharmony_cistatic long vbg_misc_device_ioctl(struct file *filp, unsigned int req, 10462306a36Sopenharmony_ci unsigned long arg) 10562306a36Sopenharmony_ci{ 10662306a36Sopenharmony_ci struct vbg_session *session = filp->private_data; 10762306a36Sopenharmony_ci size_t returned_size, size; 10862306a36Sopenharmony_ci struct vbg_ioctl_hdr hdr; 10962306a36Sopenharmony_ci bool is_vmmdev_req; 11062306a36Sopenharmony_ci int ret = 0; 11162306a36Sopenharmony_ci void *buf; 11262306a36Sopenharmony_ci 11362306a36Sopenharmony_ci if (copy_from_user(&hdr, (void *)arg, sizeof(hdr))) 11462306a36Sopenharmony_ci return -EFAULT; 11562306a36Sopenharmony_ci 11662306a36Sopenharmony_ci if (hdr.version != VBG_IOCTL_HDR_VERSION) 11762306a36Sopenharmony_ci return -EINVAL; 11862306a36Sopenharmony_ci 11962306a36Sopenharmony_ci if (hdr.size_in < sizeof(hdr) || 12062306a36Sopenharmony_ci (hdr.size_out && hdr.size_out < sizeof(hdr))) 12162306a36Sopenharmony_ci return -EINVAL; 12262306a36Sopenharmony_ci 12362306a36Sopenharmony_ci size = max(hdr.size_in, hdr.size_out); 12462306a36Sopenharmony_ci if (_IOC_SIZE(req) && _IOC_SIZE(req) != size) 12562306a36Sopenharmony_ci return -EINVAL; 12662306a36Sopenharmony_ci if (size > SZ_16M) 12762306a36Sopenharmony_ci return -E2BIG; 12862306a36Sopenharmony_ci 12962306a36Sopenharmony_ci /* 13062306a36Sopenharmony_ci * IOCTL_VMMDEV_REQUEST needs the buffer to be below 4G to avoid 13162306a36Sopenharmony_ci * the need for a bounce-buffer and another copy later on. 13262306a36Sopenharmony_ci */ 13362306a36Sopenharmony_ci is_vmmdev_req = (req & ~IOCSIZE_MASK) == VBG_IOCTL_VMMDEV_REQUEST(0) || 13462306a36Sopenharmony_ci req == VBG_IOCTL_VMMDEV_REQUEST_BIG || 13562306a36Sopenharmony_ci req == VBG_IOCTL_VMMDEV_REQUEST_BIG_ALT; 13662306a36Sopenharmony_ci 13762306a36Sopenharmony_ci if (is_vmmdev_req) 13862306a36Sopenharmony_ci buf = vbg_req_alloc(size, VBG_IOCTL_HDR_TYPE_DEFAULT, 13962306a36Sopenharmony_ci session->requestor); 14062306a36Sopenharmony_ci else 14162306a36Sopenharmony_ci buf = kmalloc(size, GFP_KERNEL); 14262306a36Sopenharmony_ci if (!buf) 14362306a36Sopenharmony_ci return -ENOMEM; 14462306a36Sopenharmony_ci 14562306a36Sopenharmony_ci *((struct vbg_ioctl_hdr *)buf) = hdr; 14662306a36Sopenharmony_ci if (copy_from_user(buf + sizeof(hdr), (void *)arg + sizeof(hdr), 14762306a36Sopenharmony_ci hdr.size_in - sizeof(hdr))) { 14862306a36Sopenharmony_ci ret = -EFAULT; 14962306a36Sopenharmony_ci goto out; 15062306a36Sopenharmony_ci } 15162306a36Sopenharmony_ci if (hdr.size_in < size) 15262306a36Sopenharmony_ci memset(buf + hdr.size_in, 0, size - hdr.size_in); 15362306a36Sopenharmony_ci 15462306a36Sopenharmony_ci ret = vbg_core_ioctl(session, req, buf); 15562306a36Sopenharmony_ci if (ret) 15662306a36Sopenharmony_ci goto out; 15762306a36Sopenharmony_ci 15862306a36Sopenharmony_ci returned_size = ((struct vbg_ioctl_hdr *)buf)->size_out; 15962306a36Sopenharmony_ci if (returned_size > size) { 16062306a36Sopenharmony_ci vbg_debug("%s: too much output data %zu > %zu\n", 16162306a36Sopenharmony_ci __func__, returned_size, size); 16262306a36Sopenharmony_ci returned_size = size; 16362306a36Sopenharmony_ci } 16462306a36Sopenharmony_ci if (copy_to_user((void *)arg, buf, returned_size) != 0) 16562306a36Sopenharmony_ci ret = -EFAULT; 16662306a36Sopenharmony_ci 16762306a36Sopenharmony_ciout: 16862306a36Sopenharmony_ci if (is_vmmdev_req) 16962306a36Sopenharmony_ci vbg_req_free(buf, size); 17062306a36Sopenharmony_ci else 17162306a36Sopenharmony_ci kfree(buf); 17262306a36Sopenharmony_ci 17362306a36Sopenharmony_ci return ret; 17462306a36Sopenharmony_ci} 17562306a36Sopenharmony_ci 17662306a36Sopenharmony_ci/** The file_operations structures. */ 17762306a36Sopenharmony_cistatic const struct file_operations vbg_misc_device_fops = { 17862306a36Sopenharmony_ci .owner = THIS_MODULE, 17962306a36Sopenharmony_ci .open = vbg_misc_device_open, 18062306a36Sopenharmony_ci .release = vbg_misc_device_close, 18162306a36Sopenharmony_ci .unlocked_ioctl = vbg_misc_device_ioctl, 18262306a36Sopenharmony_ci#ifdef CONFIG_COMPAT 18362306a36Sopenharmony_ci .compat_ioctl = vbg_misc_device_ioctl, 18462306a36Sopenharmony_ci#endif 18562306a36Sopenharmony_ci}; 18662306a36Sopenharmony_cistatic const struct file_operations vbg_misc_device_user_fops = { 18762306a36Sopenharmony_ci .owner = THIS_MODULE, 18862306a36Sopenharmony_ci .open = vbg_misc_device_user_open, 18962306a36Sopenharmony_ci .release = vbg_misc_device_close, 19062306a36Sopenharmony_ci .unlocked_ioctl = vbg_misc_device_ioctl, 19162306a36Sopenharmony_ci#ifdef CONFIG_COMPAT 19262306a36Sopenharmony_ci .compat_ioctl = vbg_misc_device_ioctl, 19362306a36Sopenharmony_ci#endif 19462306a36Sopenharmony_ci}; 19562306a36Sopenharmony_ci 19662306a36Sopenharmony_ci/** 19762306a36Sopenharmony_ci * Called when the input device is first opened. 19862306a36Sopenharmony_ci * 19962306a36Sopenharmony_ci * Sets up absolute mouse reporting. 20062306a36Sopenharmony_ci */ 20162306a36Sopenharmony_cistatic int vbg_input_open(struct input_dev *input) 20262306a36Sopenharmony_ci{ 20362306a36Sopenharmony_ci struct vbg_dev *gdev = input_get_drvdata(input); 20462306a36Sopenharmony_ci u32 feat = VMMDEV_MOUSE_GUEST_CAN_ABSOLUTE | VMMDEV_MOUSE_NEW_PROTOCOL; 20562306a36Sopenharmony_ci 20662306a36Sopenharmony_ci return vbg_core_set_mouse_status(gdev, feat); 20762306a36Sopenharmony_ci} 20862306a36Sopenharmony_ci 20962306a36Sopenharmony_ci/** 21062306a36Sopenharmony_ci * Called if all open handles to the input device are closed. 21162306a36Sopenharmony_ci * 21262306a36Sopenharmony_ci * Disables absolute reporting. 21362306a36Sopenharmony_ci */ 21462306a36Sopenharmony_cistatic void vbg_input_close(struct input_dev *input) 21562306a36Sopenharmony_ci{ 21662306a36Sopenharmony_ci struct vbg_dev *gdev = input_get_drvdata(input); 21762306a36Sopenharmony_ci 21862306a36Sopenharmony_ci vbg_core_set_mouse_status(gdev, 0); 21962306a36Sopenharmony_ci} 22062306a36Sopenharmony_ci 22162306a36Sopenharmony_ci/** 22262306a36Sopenharmony_ci * Creates the kernel input device. 22362306a36Sopenharmony_ci * 22462306a36Sopenharmony_ci * Return: 0 on success, negated errno on failure. 22562306a36Sopenharmony_ci */ 22662306a36Sopenharmony_cistatic int vbg_create_input_device(struct vbg_dev *gdev) 22762306a36Sopenharmony_ci{ 22862306a36Sopenharmony_ci struct input_dev *input; 22962306a36Sopenharmony_ci 23062306a36Sopenharmony_ci input = devm_input_allocate_device(gdev->dev); 23162306a36Sopenharmony_ci if (!input) 23262306a36Sopenharmony_ci return -ENOMEM; 23362306a36Sopenharmony_ci 23462306a36Sopenharmony_ci input->id.bustype = BUS_PCI; 23562306a36Sopenharmony_ci input->id.vendor = VBOX_VENDORID; 23662306a36Sopenharmony_ci input->id.product = VMMDEV_DEVICEID; 23762306a36Sopenharmony_ci input->open = vbg_input_open; 23862306a36Sopenharmony_ci input->close = vbg_input_close; 23962306a36Sopenharmony_ci input->dev.parent = gdev->dev; 24062306a36Sopenharmony_ci input->name = "VirtualBox mouse integration"; 24162306a36Sopenharmony_ci 24262306a36Sopenharmony_ci input_set_abs_params(input, ABS_X, VMMDEV_MOUSE_RANGE_MIN, 24362306a36Sopenharmony_ci VMMDEV_MOUSE_RANGE_MAX, 0, 0); 24462306a36Sopenharmony_ci input_set_abs_params(input, ABS_Y, VMMDEV_MOUSE_RANGE_MIN, 24562306a36Sopenharmony_ci VMMDEV_MOUSE_RANGE_MAX, 0, 0); 24662306a36Sopenharmony_ci input_set_capability(input, EV_KEY, BTN_MOUSE); 24762306a36Sopenharmony_ci input_set_drvdata(input, gdev); 24862306a36Sopenharmony_ci 24962306a36Sopenharmony_ci gdev->input = input; 25062306a36Sopenharmony_ci 25162306a36Sopenharmony_ci return input_register_device(gdev->input); 25262306a36Sopenharmony_ci} 25362306a36Sopenharmony_ci 25462306a36Sopenharmony_cistatic ssize_t host_version_show(struct device *dev, 25562306a36Sopenharmony_ci struct device_attribute *attr, char *buf) 25662306a36Sopenharmony_ci{ 25762306a36Sopenharmony_ci struct vbg_dev *gdev = dev_get_drvdata(dev); 25862306a36Sopenharmony_ci 25962306a36Sopenharmony_ci return sprintf(buf, "%s\n", gdev->host_version); 26062306a36Sopenharmony_ci} 26162306a36Sopenharmony_ci 26262306a36Sopenharmony_cistatic ssize_t host_features_show(struct device *dev, 26362306a36Sopenharmony_ci struct device_attribute *attr, char *buf) 26462306a36Sopenharmony_ci{ 26562306a36Sopenharmony_ci struct vbg_dev *gdev = dev_get_drvdata(dev); 26662306a36Sopenharmony_ci 26762306a36Sopenharmony_ci return sprintf(buf, "%#x\n", gdev->host_features); 26862306a36Sopenharmony_ci} 26962306a36Sopenharmony_ci 27062306a36Sopenharmony_cistatic DEVICE_ATTR_RO(host_version); 27162306a36Sopenharmony_cistatic DEVICE_ATTR_RO(host_features); 27262306a36Sopenharmony_ci 27362306a36Sopenharmony_cistatic struct attribute *vbg_pci_attrs[] = { 27462306a36Sopenharmony_ci &dev_attr_host_version.attr, 27562306a36Sopenharmony_ci &dev_attr_host_features.attr, 27662306a36Sopenharmony_ci NULL, 27762306a36Sopenharmony_ci}; 27862306a36Sopenharmony_ciATTRIBUTE_GROUPS(vbg_pci); 27962306a36Sopenharmony_ci 28062306a36Sopenharmony_ci/** 28162306a36Sopenharmony_ci * Does the PCI detection and init of the device. 28262306a36Sopenharmony_ci * 28362306a36Sopenharmony_ci * Return: 0 on success, negated errno on failure. 28462306a36Sopenharmony_ci */ 28562306a36Sopenharmony_cistatic int vbg_pci_probe(struct pci_dev *pci, const struct pci_device_id *id) 28662306a36Sopenharmony_ci{ 28762306a36Sopenharmony_ci struct device *dev = &pci->dev; 28862306a36Sopenharmony_ci resource_size_t io, io_len, mmio, mmio_len; 28962306a36Sopenharmony_ci struct vmmdev_memory *vmmdev; 29062306a36Sopenharmony_ci struct vbg_dev *gdev; 29162306a36Sopenharmony_ci int ret; 29262306a36Sopenharmony_ci 29362306a36Sopenharmony_ci gdev = devm_kzalloc(dev, sizeof(*gdev), GFP_KERNEL); 29462306a36Sopenharmony_ci if (!gdev) 29562306a36Sopenharmony_ci return -ENOMEM; 29662306a36Sopenharmony_ci 29762306a36Sopenharmony_ci ret = pci_enable_device(pci); 29862306a36Sopenharmony_ci if (ret != 0) { 29962306a36Sopenharmony_ci vbg_err("vboxguest: Error enabling device: %d\n", ret); 30062306a36Sopenharmony_ci return ret; 30162306a36Sopenharmony_ci } 30262306a36Sopenharmony_ci 30362306a36Sopenharmony_ci ret = -ENODEV; 30462306a36Sopenharmony_ci 30562306a36Sopenharmony_ci io = pci_resource_start(pci, 0); 30662306a36Sopenharmony_ci io_len = pci_resource_len(pci, 0); 30762306a36Sopenharmony_ci if (!io || !io_len) { 30862306a36Sopenharmony_ci vbg_err("vboxguest: Error IO-port resource (0) is missing\n"); 30962306a36Sopenharmony_ci goto err_disable_pcidev; 31062306a36Sopenharmony_ci } 31162306a36Sopenharmony_ci if (devm_request_region(dev, io, io_len, DEVICE_NAME) == NULL) { 31262306a36Sopenharmony_ci vbg_err("vboxguest: Error could not claim IO resource\n"); 31362306a36Sopenharmony_ci ret = -EBUSY; 31462306a36Sopenharmony_ci goto err_disable_pcidev; 31562306a36Sopenharmony_ci } 31662306a36Sopenharmony_ci 31762306a36Sopenharmony_ci mmio = pci_resource_start(pci, 1); 31862306a36Sopenharmony_ci mmio_len = pci_resource_len(pci, 1); 31962306a36Sopenharmony_ci if (!mmio || !mmio_len) { 32062306a36Sopenharmony_ci vbg_err("vboxguest: Error MMIO resource (1) is missing\n"); 32162306a36Sopenharmony_ci goto err_disable_pcidev; 32262306a36Sopenharmony_ci } 32362306a36Sopenharmony_ci 32462306a36Sopenharmony_ci if (devm_request_mem_region(dev, mmio, mmio_len, DEVICE_NAME) == NULL) { 32562306a36Sopenharmony_ci vbg_err("vboxguest: Error could not claim MMIO resource\n"); 32662306a36Sopenharmony_ci ret = -EBUSY; 32762306a36Sopenharmony_ci goto err_disable_pcidev; 32862306a36Sopenharmony_ci } 32962306a36Sopenharmony_ci 33062306a36Sopenharmony_ci vmmdev = devm_ioremap(dev, mmio, mmio_len); 33162306a36Sopenharmony_ci if (!vmmdev) { 33262306a36Sopenharmony_ci vbg_err("vboxguest: Error ioremap failed; MMIO addr=%pap size=%pap\n", 33362306a36Sopenharmony_ci &mmio, &mmio_len); 33462306a36Sopenharmony_ci goto err_disable_pcidev; 33562306a36Sopenharmony_ci } 33662306a36Sopenharmony_ci 33762306a36Sopenharmony_ci /* Validate MMIO region version and size. */ 33862306a36Sopenharmony_ci if (vmmdev->version != VMMDEV_MEMORY_VERSION || 33962306a36Sopenharmony_ci vmmdev->size < 32 || vmmdev->size > mmio_len) { 34062306a36Sopenharmony_ci vbg_err("vboxguest: Bogus VMMDev memory; version=%08x (expected %08x) size=%d (expected <= %d)\n", 34162306a36Sopenharmony_ci vmmdev->version, VMMDEV_MEMORY_VERSION, 34262306a36Sopenharmony_ci vmmdev->size, (int)mmio_len); 34362306a36Sopenharmony_ci goto err_disable_pcidev; 34462306a36Sopenharmony_ci } 34562306a36Sopenharmony_ci 34662306a36Sopenharmony_ci gdev->io_port = io; 34762306a36Sopenharmony_ci gdev->mmio = vmmdev; 34862306a36Sopenharmony_ci gdev->dev = dev; 34962306a36Sopenharmony_ci gdev->misc_device.minor = MISC_DYNAMIC_MINOR; 35062306a36Sopenharmony_ci gdev->misc_device.name = DEVICE_NAME; 35162306a36Sopenharmony_ci gdev->misc_device.fops = &vbg_misc_device_fops; 35262306a36Sopenharmony_ci gdev->misc_device_user.minor = MISC_DYNAMIC_MINOR; 35362306a36Sopenharmony_ci gdev->misc_device_user.name = DEVICE_NAME_USER; 35462306a36Sopenharmony_ci gdev->misc_device_user.fops = &vbg_misc_device_user_fops; 35562306a36Sopenharmony_ci 35662306a36Sopenharmony_ci ret = vbg_core_init(gdev, VMMDEV_EVENT_MOUSE_POSITION_CHANGED); 35762306a36Sopenharmony_ci if (ret) 35862306a36Sopenharmony_ci goto err_disable_pcidev; 35962306a36Sopenharmony_ci 36062306a36Sopenharmony_ci ret = vbg_create_input_device(gdev); 36162306a36Sopenharmony_ci if (ret) { 36262306a36Sopenharmony_ci vbg_err("vboxguest: Error creating input device: %d\n", ret); 36362306a36Sopenharmony_ci goto err_vbg_core_exit; 36462306a36Sopenharmony_ci } 36562306a36Sopenharmony_ci 36662306a36Sopenharmony_ci ret = request_irq(pci->irq, vbg_core_isr, IRQF_SHARED, DEVICE_NAME, 36762306a36Sopenharmony_ci gdev); 36862306a36Sopenharmony_ci if (ret) { 36962306a36Sopenharmony_ci vbg_err("vboxguest: Error requesting irq: %d\n", ret); 37062306a36Sopenharmony_ci goto err_vbg_core_exit; 37162306a36Sopenharmony_ci } 37262306a36Sopenharmony_ci 37362306a36Sopenharmony_ci ret = misc_register(&gdev->misc_device); 37462306a36Sopenharmony_ci if (ret) { 37562306a36Sopenharmony_ci vbg_err("vboxguest: Error misc_register %s failed: %d\n", 37662306a36Sopenharmony_ci DEVICE_NAME, ret); 37762306a36Sopenharmony_ci goto err_free_irq; 37862306a36Sopenharmony_ci } 37962306a36Sopenharmony_ci 38062306a36Sopenharmony_ci ret = misc_register(&gdev->misc_device_user); 38162306a36Sopenharmony_ci if (ret) { 38262306a36Sopenharmony_ci vbg_err("vboxguest: Error misc_register %s failed: %d\n", 38362306a36Sopenharmony_ci DEVICE_NAME_USER, ret); 38462306a36Sopenharmony_ci goto err_unregister_misc_device; 38562306a36Sopenharmony_ci } 38662306a36Sopenharmony_ci 38762306a36Sopenharmony_ci mutex_lock(&vbg_gdev_mutex); 38862306a36Sopenharmony_ci if (!vbg_gdev) 38962306a36Sopenharmony_ci vbg_gdev = gdev; 39062306a36Sopenharmony_ci else 39162306a36Sopenharmony_ci ret = -EBUSY; 39262306a36Sopenharmony_ci mutex_unlock(&vbg_gdev_mutex); 39362306a36Sopenharmony_ci 39462306a36Sopenharmony_ci if (ret) { 39562306a36Sopenharmony_ci vbg_err("vboxguest: Error more then 1 vbox guest pci device\n"); 39662306a36Sopenharmony_ci goto err_unregister_misc_device_user; 39762306a36Sopenharmony_ci } 39862306a36Sopenharmony_ci 39962306a36Sopenharmony_ci pci_set_drvdata(pci, gdev); 40062306a36Sopenharmony_ci 40162306a36Sopenharmony_ci return 0; 40262306a36Sopenharmony_ci 40362306a36Sopenharmony_cierr_unregister_misc_device_user: 40462306a36Sopenharmony_ci misc_deregister(&gdev->misc_device_user); 40562306a36Sopenharmony_cierr_unregister_misc_device: 40662306a36Sopenharmony_ci misc_deregister(&gdev->misc_device); 40762306a36Sopenharmony_cierr_free_irq: 40862306a36Sopenharmony_ci free_irq(pci->irq, gdev); 40962306a36Sopenharmony_cierr_vbg_core_exit: 41062306a36Sopenharmony_ci vbg_core_exit(gdev); 41162306a36Sopenharmony_cierr_disable_pcidev: 41262306a36Sopenharmony_ci pci_disable_device(pci); 41362306a36Sopenharmony_ci 41462306a36Sopenharmony_ci return ret; 41562306a36Sopenharmony_ci} 41662306a36Sopenharmony_ci 41762306a36Sopenharmony_cistatic void vbg_pci_remove(struct pci_dev *pci) 41862306a36Sopenharmony_ci{ 41962306a36Sopenharmony_ci struct vbg_dev *gdev = pci_get_drvdata(pci); 42062306a36Sopenharmony_ci 42162306a36Sopenharmony_ci mutex_lock(&vbg_gdev_mutex); 42262306a36Sopenharmony_ci vbg_gdev = NULL; 42362306a36Sopenharmony_ci mutex_unlock(&vbg_gdev_mutex); 42462306a36Sopenharmony_ci 42562306a36Sopenharmony_ci free_irq(pci->irq, gdev); 42662306a36Sopenharmony_ci misc_deregister(&gdev->misc_device_user); 42762306a36Sopenharmony_ci misc_deregister(&gdev->misc_device); 42862306a36Sopenharmony_ci vbg_core_exit(gdev); 42962306a36Sopenharmony_ci pci_disable_device(pci); 43062306a36Sopenharmony_ci} 43162306a36Sopenharmony_ci 43262306a36Sopenharmony_cistruct vbg_dev *vbg_get_gdev(void) 43362306a36Sopenharmony_ci{ 43462306a36Sopenharmony_ci mutex_lock(&vbg_gdev_mutex); 43562306a36Sopenharmony_ci 43662306a36Sopenharmony_ci /* 43762306a36Sopenharmony_ci * Note on success we keep the mutex locked until vbg_put_gdev(), 43862306a36Sopenharmony_ci * this stops vbg_pci_remove from removing the device from underneath 43962306a36Sopenharmony_ci * vboxsf. vboxsf will only hold a reference for a short while. 44062306a36Sopenharmony_ci */ 44162306a36Sopenharmony_ci if (vbg_gdev) 44262306a36Sopenharmony_ci return vbg_gdev; 44362306a36Sopenharmony_ci 44462306a36Sopenharmony_ci mutex_unlock(&vbg_gdev_mutex); 44562306a36Sopenharmony_ci return ERR_PTR(-ENODEV); 44662306a36Sopenharmony_ci} 44762306a36Sopenharmony_ciEXPORT_SYMBOL(vbg_get_gdev); 44862306a36Sopenharmony_ci 44962306a36Sopenharmony_civoid vbg_put_gdev(struct vbg_dev *gdev) 45062306a36Sopenharmony_ci{ 45162306a36Sopenharmony_ci WARN_ON(gdev != vbg_gdev); 45262306a36Sopenharmony_ci mutex_unlock(&vbg_gdev_mutex); 45362306a36Sopenharmony_ci} 45462306a36Sopenharmony_ciEXPORT_SYMBOL(vbg_put_gdev); 45562306a36Sopenharmony_ci 45662306a36Sopenharmony_ci/** 45762306a36Sopenharmony_ci * Callback for mouse events. 45862306a36Sopenharmony_ci * 45962306a36Sopenharmony_ci * This is called at the end of the ISR, after leaving the event spinlock, if 46062306a36Sopenharmony_ci * VMMDEV_EVENT_MOUSE_POSITION_CHANGED was raised by the host. 46162306a36Sopenharmony_ci * 46262306a36Sopenharmony_ci * @gdev: The device extension. 46362306a36Sopenharmony_ci */ 46462306a36Sopenharmony_civoid vbg_linux_mouse_event(struct vbg_dev *gdev) 46562306a36Sopenharmony_ci{ 46662306a36Sopenharmony_ci int rc; 46762306a36Sopenharmony_ci 46862306a36Sopenharmony_ci /* Report events to the kernel input device */ 46962306a36Sopenharmony_ci gdev->mouse_status_req->mouse_features = 0; 47062306a36Sopenharmony_ci gdev->mouse_status_req->pointer_pos_x = 0; 47162306a36Sopenharmony_ci gdev->mouse_status_req->pointer_pos_y = 0; 47262306a36Sopenharmony_ci rc = vbg_req_perform(gdev, gdev->mouse_status_req); 47362306a36Sopenharmony_ci if (rc >= 0) { 47462306a36Sopenharmony_ci input_report_abs(gdev->input, ABS_X, 47562306a36Sopenharmony_ci gdev->mouse_status_req->pointer_pos_x); 47662306a36Sopenharmony_ci input_report_abs(gdev->input, ABS_Y, 47762306a36Sopenharmony_ci gdev->mouse_status_req->pointer_pos_y); 47862306a36Sopenharmony_ci input_sync(gdev->input); 47962306a36Sopenharmony_ci } 48062306a36Sopenharmony_ci} 48162306a36Sopenharmony_ci 48262306a36Sopenharmony_cistatic const struct pci_device_id vbg_pci_ids[] = { 48362306a36Sopenharmony_ci { .vendor = VBOX_VENDORID, .device = VMMDEV_DEVICEID }, 48462306a36Sopenharmony_ci {} 48562306a36Sopenharmony_ci}; 48662306a36Sopenharmony_ciMODULE_DEVICE_TABLE(pci, vbg_pci_ids); 48762306a36Sopenharmony_ci 48862306a36Sopenharmony_cistatic struct pci_driver vbg_pci_driver = { 48962306a36Sopenharmony_ci .name = DEVICE_NAME, 49062306a36Sopenharmony_ci .dev_groups = vbg_pci_groups, 49162306a36Sopenharmony_ci .id_table = vbg_pci_ids, 49262306a36Sopenharmony_ci .probe = vbg_pci_probe, 49362306a36Sopenharmony_ci .remove = vbg_pci_remove, 49462306a36Sopenharmony_ci}; 49562306a36Sopenharmony_ci 49662306a36Sopenharmony_cimodule_pci_driver(vbg_pci_driver); 49762306a36Sopenharmony_ci 49862306a36Sopenharmony_ciMODULE_AUTHOR("Oracle Corporation"); 49962306a36Sopenharmony_ciMODULE_DESCRIPTION("Oracle VM VirtualBox Guest Additions for Linux Module"); 50062306a36Sopenharmony_ciMODULE_LICENSE("GPL"); 501