msm_cvp_ioctl.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2018-2021, The Linux Foundation. All rights reserved.
  4. */
  5. #include <linux/compat.h>
  6. #include "cvp_private.h"
  7. #include "cvp_hfi_api.h"
  8. static int _get_pkt_hdr_from_user(struct eva_kmd_arg __user *up,
  9. struct cvp_hal_session_cmd_pkt *pkt_hdr)
  10. {
  11. struct eva_kmd_hfi_packet *u;
  12. struct cvp_hfi_msg_session_hdr *hdr;
  13. hdr = (struct cvp_hfi_msg_session_hdr *)pkt_hdr;
  14. u = &up->data.hfi_pkt;
  15. if (get_user(pkt_hdr->size, &u->pkt_data[0]))
  16. return -EFAULT;
  17. if (get_user(pkt_hdr->packet_type, &u->pkt_data[1]))
  18. return -EFAULT;
  19. if (get_pkt_index(pkt_hdr) < 0) {
  20. dprintk(CVP_ERR, "user mode provides incorrect hfi\n");
  21. goto set_default_pkt_hdr;
  22. }
  23. if (pkt_hdr->size > MAX_HFI_PKT_SIZE*sizeof(unsigned int)) {
  24. dprintk(CVP_ERR, "user HFI packet too large %x\n",
  25. pkt_hdr->size);
  26. return -EINVAL;
  27. }
  28. return 0;
  29. set_default_pkt_hdr:
  30. pkt_hdr->size = get_msg_size(hdr);
  31. return 0;
  32. }
  33. static int _get_fence_pkt_hdr_from_user(struct eva_kmd_arg __user *up,
  34. struct cvp_hal_session_cmd_pkt *pkt_hdr)
  35. {
  36. struct eva_kmd_hfi_synx_packet __user *u;
  37. u = &up->data.hfi_synx_pkt;
  38. if (get_user(pkt_hdr->size, &u->pkt_data[0]))
  39. return -EFAULT;
  40. if (get_user(pkt_hdr->packet_type, &u->pkt_data[1]))
  41. return -EFAULT;
  42. if (pkt_hdr->size > (MAX_HFI_PKT_SIZE*sizeof(unsigned int)))
  43. return -EINVAL;
  44. return 0;
  45. }
  46. /* Size is in unit of u32 */
  47. static int _copy_pkt_from_user(struct eva_kmd_arg *kp,
  48. struct eva_kmd_arg __user *up,
  49. unsigned int size)
  50. {
  51. struct eva_kmd_hfi_packet *k, *u;
  52. int i;
  53. k = &kp->data.hfi_pkt;
  54. u = &up->data.hfi_pkt;
  55. for (i = 0; i < size; i++)
  56. if (get_user(k->pkt_data[i], &u->pkt_data[i]))
  57. return -EFAULT;
  58. return 0;
  59. }
  60. static int _copy_synx_data_from_user(
  61. struct eva_kmd_hfi_synx_packet *k,
  62. struct eva_kmd_hfi_synx_packet __user *u)
  63. {
  64. int i;
  65. for (i = 0; i < MAX_FENCE_DATA_SIZE; i++) {
  66. if (get_user(k->fence_data[i], &u->fence_data[i]))
  67. return -EFAULT;
  68. }
  69. return 0;
  70. }
  71. /* Size is in unit of u32 */
  72. static int _copy_fence_data_from_user_deprecate(
  73. struct eva_kmd_hfi_fence_packet *k,
  74. struct eva_kmd_hfi_fence_packet __user *u)
  75. {
  76. int i;
  77. for (i = 0; i < MAX_HFI_FENCE_SIZE; i++) {
  78. if (get_user(k->fence_data[i], &u->fence_data[i]))
  79. return -EFAULT;
  80. }
  81. if (get_user(k->frame_id, &u->frame_id)) {
  82. dprintk(CVP_ERR, "Failed to get frame id from fence pkt\n");
  83. return -EFAULT;
  84. }
  85. return 0;
  86. }
  87. static int _copy_fence_pkt_from_user(struct eva_kmd_arg *kp,
  88. struct eva_kmd_arg __user *up)
  89. { struct eva_kmd_hfi_synx_packet *k;
  90. struct eva_kmd_hfi_synx_packet __user *u;
  91. struct eva_kmd_hfi_fence_packet __user *u1;
  92. int i;
  93. k = &kp->data.hfi_synx_pkt;
  94. u = &up->data.hfi_synx_pkt;
  95. u1 = &up->data.hfi_fence_pkt;
  96. for (i = 0; i < MAX_HFI_PKT_SIZE; i++)
  97. if (get_user(k->pkt_data[i], &u->pkt_data[i]))
  98. return -EFAULT;
  99. if (get_user(k->fence_data[0], &u->fence_data[0]))
  100. return -EFAULT;
  101. if (k->fence_data[0] == 0xFEEDFACE)
  102. return _copy_synx_data_from_user(k, u);
  103. else
  104. return _copy_fence_data_from_user_deprecate(
  105. (struct eva_kmd_hfi_fence_packet *)k, u1);
  106. }
  107. static int _copy_frameid_from_user(struct eva_kmd_arg *kp,
  108. struct eva_kmd_arg __user *up)
  109. {
  110. if (get_user(kp->data.frame_id, &up->data.frame_id)) {
  111. dprintk(CVP_ERR, "Failed to get frame id from user\n");
  112. return -EFAULT;
  113. }
  114. return 0;
  115. }
  116. static int _copy_sysprop_from_user(struct eva_kmd_arg *kp,
  117. struct eva_kmd_arg __user *up)
  118. {
  119. struct eva_kmd_sys_properties *k, *u;
  120. k = &kp->data.sys_properties;
  121. u = &up->data.sys_properties;
  122. if (get_user(k->prop_num, &u->prop_num))
  123. return -EFAULT;
  124. if (k->prop_num < 1 || k->prop_num > 32) {
  125. dprintk(CVP_ERR, "Num of prop out of range %d\n", k->prop_num);
  126. return -EFAULT;
  127. }
  128. return _copy_pkt_from_user(kp, up,
  129. (k->prop_num*((sizeof(struct eva_kmd_sys_property)>>2)+1)));
  130. }
  131. static int _copy_pkt_to_user(struct eva_kmd_arg *kp,
  132. struct eva_kmd_arg __user *up,
  133. unsigned int size)
  134. {
  135. struct eva_kmd_hfi_packet *k, *u;
  136. int i;
  137. k = &kp->data.hfi_pkt;
  138. u = &up->data.hfi_pkt;
  139. for (i = 0; i < size; i++)
  140. if (put_user(k->pkt_data[i], &u->pkt_data[i]))
  141. return -EFAULT;
  142. return 0;
  143. }
  144. static int _copy_fence_pkt_to_user(struct eva_kmd_arg *kp,
  145. struct eva_kmd_arg __user *up)
  146. {
  147. struct eva_kmd_hfi_synx_packet *k;
  148. struct eva_kmd_hfi_synx_packet __user *u;
  149. int i;
  150. k = &kp->data.hfi_synx_pkt;
  151. u = &up->data.hfi_synx_pkt;
  152. for (i = 0; i < MAX_HFI_PKT_SIZE; i++) {
  153. if (put_user(k->pkt_data[i], &u->pkt_data[i]))
  154. return -EFAULT;
  155. }
  156. return 0;
  157. }
  158. static int _copy_sysprop_to_user(struct eva_kmd_arg *kp,
  159. struct eva_kmd_arg __user *up)
  160. {
  161. struct eva_kmd_sys_properties *k;
  162. struct eva_kmd_sys_properties __user *u;
  163. int i;
  164. k = &kp->data.sys_properties;
  165. u = &up->data.sys_properties;
  166. for (i = 0; i < 8; i++)
  167. if (put_user(k->prop_data[i].data, &u->prop_data[i].data))
  168. return -EFAULT;
  169. return 0;
  170. }
  171. static void print_hfi_short(struct eva_kmd_arg __user *up)
  172. {
  173. struct eva_kmd_hfi_packet *pkt;
  174. unsigned int words[5];
  175. pkt = &up->data.hfi_pkt;
  176. if (get_user(words[0], &up->type) ||
  177. get_user(words[1], &up->buf_offset) ||
  178. get_user(words[2], &up->buf_num) ||
  179. get_user(words[3], &pkt->pkt_data[0]) ||
  180. get_user(words[4], &pkt->pkt_data[1]))
  181. dprintk(CVP_ERR, "Failed to print ioctl cmd\n");
  182. dprintk(CVP_HFI, "IOCTL cmd type %#x, offset %d, num %d, pkt %d %#x\n",
  183. words[0], words[1], words[2], words[3], words[4]);
  184. }
  185. static int _copy_session_ctrl_to_user(
  186. struct eva_kmd_session_control *k,
  187. struct eva_kmd_session_control *u)
  188. {
  189. int i;
  190. if (put_user(k->ctrl_type, &u->ctrl_type))
  191. return -EFAULT;
  192. for (i = 0; i < 8; i++)
  193. if (put_user(k->ctrl_data[i], &u->ctrl_data[i]))
  194. return -EFAULT;
  195. return 0;
  196. }
  197. static int _get_session_ctrl_from_user(
  198. struct eva_kmd_session_control *k,
  199. struct eva_kmd_session_control *u)
  200. {
  201. int i;
  202. if (get_user(k->ctrl_type, &u->ctrl_type))
  203. return -EFAULT;
  204. for (i = 0; i < 8; i++)
  205. if (get_user(k->ctrl_data[i], &u->ctrl_data[i]))
  206. return -EFAULT;
  207. return 0;
  208. }
  209. static int _get_session_info_from_user(
  210. struct eva_kmd_session_info *k,
  211. struct eva_kmd_session_info __user *u)
  212. {
  213. int i;
  214. if (get_user(k->session_id, &u->session_id))
  215. return -EFAULT;
  216. for (i = 0; i < 10; i++)
  217. if (get_user(k->reserved[i], &u->reserved[i]))
  218. return -EFAULT;
  219. return 0;
  220. }
  221. static int convert_from_user(struct eva_kmd_arg *kp,
  222. unsigned long arg,
  223. struct msm_cvp_inst *inst)
  224. {
  225. int rc = 0;
  226. int i;
  227. struct eva_kmd_arg __user *up = (struct eva_kmd_arg *)arg;
  228. struct cvp_hal_session_cmd_pkt pkt_hdr;
  229. int pkt_idx;
  230. if (!kp || !up) {
  231. dprintk(CVP_ERR, "%s: invalid params\n", __func__);
  232. return -EINVAL;
  233. }
  234. print_hfi_short(up);
  235. if (get_user(kp->type, &up->type))
  236. return -EFAULT;
  237. if (get_user(kp->buf_offset, &up->buf_offset) ||
  238. get_user(kp->buf_num, &up->buf_num))
  239. return -EFAULT;
  240. switch (kp->type) {
  241. case EVA_KMD_GET_SESSION_INFO:
  242. {
  243. struct eva_kmd_session_info *k;
  244. struct eva_kmd_session_info __user *u;
  245. k = &kp->data.session;
  246. u = &up->data.session;
  247. if (_get_session_info_from_user(k, u)) {
  248. dprintk(CVP_ERR, "fail to get sess info\n");
  249. return -EFAULT;
  250. }
  251. break;
  252. }
  253. case EVA_KMD_REGISTER_BUFFER:
  254. {
  255. struct eva_kmd_buffer *k, *u;
  256. k = &kp->data.regbuf;
  257. u = &up->data.regbuf;
  258. if (get_user(k->type, &u->type) ||
  259. get_user(k->index, &u->index) ||
  260. get_user(k->fd, &u->fd) ||
  261. get_user(k->size, &u->size) ||
  262. get_user(k->offset, &u->offset) ||
  263. get_user(k->pixelformat, &u->pixelformat) ||
  264. get_user(k->flags, &u->flags))
  265. return -EFAULT;
  266. for (i = 0; i < 5; i++)
  267. if (get_user(k->reserved[i], &u->reserved[i]))
  268. return -EFAULT;
  269. break;
  270. }
  271. case EVA_KMD_UNREGISTER_BUFFER:
  272. {
  273. struct eva_kmd_buffer *k, *u;
  274. k = &kp->data.unregbuf;
  275. u = &up->data.unregbuf;
  276. if (get_user(k->type, &u->type) ||
  277. get_user(k->index, &u->index) ||
  278. get_user(k->fd, &u->fd) ||
  279. get_user(k->size, &u->size) ||
  280. get_user(k->offset, &u->offset) ||
  281. get_user(k->pixelformat, &u->pixelformat) ||
  282. get_user(k->flags, &u->flags))
  283. return -EFAULT;
  284. for (i = 0; i < 5; i++)
  285. if (get_user(k->reserved[i], &u->reserved[i]))
  286. return -EFAULT;
  287. break;
  288. }
  289. case EVA_KMD_SEND_CMD_PKT:
  290. {
  291. if (_get_pkt_hdr_from_user(up, &pkt_hdr)) {
  292. dprintk(CVP_ERR, "Invalid syscall: %x, %x, %x\n",
  293. kp->type, pkt_hdr.size, pkt_hdr.packet_type);
  294. return -EFAULT;
  295. }
  296. rc = _copy_pkt_from_user(kp, up, (pkt_hdr.size >> 2));
  297. break;
  298. }
  299. case EVA_KMD_SEND_FENCE_CMD_PKT:
  300. {
  301. if (_get_fence_pkt_hdr_from_user(up, &pkt_hdr)) {
  302. dprintk(CVP_ERR, "Invalid syscall: %x, %x, %x\n",
  303. kp->type, pkt_hdr.size, pkt_hdr.packet_type);
  304. return -EFAULT;
  305. }
  306. dprintk(CVP_HFI, "system call cmd pkt: %d 0x%x\n",
  307. pkt_hdr.size, pkt_hdr.packet_type);
  308. pkt_idx = get_pkt_index(&pkt_hdr);
  309. if (pkt_idx < 0) {
  310. dprintk(CVP_ERR, "%s incorrect packet %d, %x\n",
  311. __func__,
  312. pkt_hdr.size,
  313. pkt_hdr.packet_type);
  314. return -EFAULT;
  315. }
  316. rc = _copy_fence_pkt_from_user(kp, up);
  317. break;
  318. }
  319. case EVA_KMD_RECEIVE_MSG_PKT:
  320. break;
  321. case EVA_KMD_SESSION_CONTROL:
  322. {
  323. struct eva_kmd_session_control *k, *u;
  324. k = &kp->data.session_ctrl;
  325. u = &up->data.session_ctrl;
  326. rc = _get_session_ctrl_from_user(k, u);
  327. break;
  328. }
  329. case EVA_KMD_GET_SYS_PROPERTY:
  330. {
  331. if (_copy_sysprop_from_user(kp, up)) {
  332. dprintk(CVP_ERR, "Failed to get sysprop from user\n");
  333. return -EFAULT;
  334. }
  335. break;
  336. }
  337. case EVA_KMD_SET_SYS_PROPERTY:
  338. {
  339. if (_copy_sysprop_from_user(kp, up)) {
  340. dprintk(CVP_ERR, "Failed to set sysprop from user\n");
  341. return -EFAULT;
  342. }
  343. break;
  344. }
  345. case EVA_KMD_FLUSH_ALL:
  346. case EVA_KMD_UPDATE_POWER:
  347. break;
  348. case EVA_KMD_FLUSH_FRAME:
  349. {
  350. if (_copy_frameid_from_user(kp, up))
  351. return -EFAULT;
  352. break;
  353. }
  354. default:
  355. dprintk(CVP_ERR, "%s: unknown cmd type 0x%x\n",
  356. __func__, kp->type);
  357. rc = -EINVAL;
  358. break;
  359. }
  360. return rc;
  361. }
  362. static int _put_user_session_info(
  363. struct eva_kmd_session_info *k,
  364. struct eva_kmd_session_info __user *u)
  365. {
  366. int i;
  367. if (put_user(k->session_id, &u->session_id))
  368. return -EFAULT;
  369. for (i = 0; i < 10; i++)
  370. if (put_user(k->reserved[i], &u->reserved[i]))
  371. return -EFAULT;
  372. return 0;
  373. }
  374. static int convert_to_user(struct eva_kmd_arg *kp, unsigned long arg)
  375. {
  376. int rc = 0;
  377. int i, size;
  378. struct eva_kmd_arg __user *up = (struct eva_kmd_arg *)arg;
  379. struct cvp_hal_session_cmd_pkt pkt_hdr;
  380. if (!kp || !up) {
  381. dprintk(CVP_ERR, "%s: invalid params\n", __func__);
  382. return -EINVAL;
  383. }
  384. if (put_user(kp->type, &up->type))
  385. return -EFAULT;
  386. switch (kp->type) {
  387. case EVA_KMD_RECEIVE_MSG_PKT:
  388. {
  389. struct eva_kmd_hfi_packet *k, *u;
  390. struct cvp_hfi_msg_session_hdr *hdr;
  391. k = &kp->data.hfi_pkt;
  392. u = &up->data.hfi_pkt;
  393. hdr = (struct cvp_hfi_msg_session_hdr *)k;
  394. size = get_msg_size(hdr) >> 2;
  395. for (i = 0; i < size; i++)
  396. if (put_user(k->pkt_data[i], &u->pkt_data[i]))
  397. return -EFAULT;
  398. break;
  399. }
  400. case EVA_KMD_GET_SESSION_INFO:
  401. {
  402. struct eva_kmd_session_info *k;
  403. struct eva_kmd_session_info __user *u;
  404. k = &kp->data.session;
  405. u = &up->data.session;
  406. if (_put_user_session_info(k, u)) {
  407. dprintk(CVP_ERR, "fail to copy sess info to user\n");
  408. return -EFAULT;
  409. }
  410. break;
  411. }
  412. case EVA_KMD_REGISTER_BUFFER:
  413. {
  414. struct eva_kmd_buffer *k, *u;
  415. k = &kp->data.regbuf;
  416. u = &up->data.regbuf;
  417. if (put_user(k->type, &u->type) ||
  418. put_user(k->index, &u->index) ||
  419. put_user(k->fd, &u->fd) ||
  420. put_user(k->size, &u->size) ||
  421. put_user(k->offset, &u->offset) ||
  422. put_user(k->pixelformat, &u->pixelformat) ||
  423. put_user(k->flags, &u->flags))
  424. return -EFAULT;
  425. for (i = 0; i < 5; i++)
  426. if (put_user(k->reserved[i], &u->reserved[i]))
  427. return -EFAULT;
  428. break;
  429. }
  430. case EVA_KMD_UNREGISTER_BUFFER:
  431. {
  432. struct eva_kmd_buffer *k, *u;
  433. k = &kp->data.unregbuf;
  434. u = &up->data.unregbuf;
  435. if (put_user(k->type, &u->type) ||
  436. put_user(k->index, &u->index) ||
  437. put_user(k->fd, &u->fd) ||
  438. put_user(k->size, &u->size) ||
  439. put_user(k->offset, &u->offset) ||
  440. put_user(k->pixelformat, &u->pixelformat) ||
  441. put_user(k->flags, &u->flags))
  442. return -EFAULT;
  443. for (i = 0; i < 5; i++)
  444. if (put_user(k->reserved[i], &u->reserved[i]))
  445. return -EFAULT;
  446. break;
  447. }
  448. case EVA_KMD_SEND_CMD_PKT:
  449. {
  450. if (_get_pkt_hdr_from_user(up, &pkt_hdr))
  451. return -EFAULT;
  452. dprintk(CVP_HFI, "Send user cmd pkt: %d %d\n",
  453. pkt_hdr.size, pkt_hdr.packet_type);
  454. rc = _copy_pkt_to_user(kp, up, (pkt_hdr.size >> 2));
  455. break;
  456. }
  457. case EVA_KMD_SEND_FENCE_CMD_PKT:
  458. {
  459. if (_get_fence_pkt_hdr_from_user(up, &pkt_hdr))
  460. return -EFAULT;
  461. dprintk(CVP_HFI, "Send user cmd pkt: %d %d\n",
  462. pkt_hdr.size, pkt_hdr.packet_type);
  463. rc = _copy_fence_pkt_to_user(kp, up);
  464. break;
  465. }
  466. case EVA_KMD_SESSION_CONTROL:
  467. {
  468. struct eva_kmd_session_control *k, *u;
  469. k = &kp->data.session_ctrl;
  470. u = &up->data.session_ctrl;
  471. rc = _copy_session_ctrl_to_user(k, u);
  472. break;
  473. }
  474. case EVA_KMD_GET_SYS_PROPERTY:
  475. {
  476. if (_copy_sysprop_to_user(kp, up)) {
  477. dprintk(CVP_ERR, "Fail to copy sysprop to user\n");
  478. return -EFAULT;
  479. }
  480. break;
  481. }
  482. case EVA_KMD_FLUSH_ALL:
  483. case EVA_KMD_FLUSH_FRAME:
  484. case EVA_KMD_SET_SYS_PROPERTY:
  485. case EVA_KMD_UPDATE_POWER:
  486. break;
  487. default:
  488. dprintk(CVP_ERR, "%s: unknown cmd type 0x%x\n",
  489. __func__, kp->type);
  490. rc = -EINVAL;
  491. break;
  492. }
  493. return rc;
  494. }
  495. static long cvp_ioctl(struct msm_cvp_inst *inst,
  496. unsigned int cmd, unsigned long arg)
  497. {
  498. int rc;
  499. struct eva_kmd_arg *karg;
  500. if (!inst) {
  501. dprintk(CVP_ERR, "%s: invalid params\n", __func__);
  502. return -EINVAL;
  503. }
  504. karg = kzalloc(sizeof(*karg), GFP_KERNEL);
  505. if (!karg)
  506. return -ENOMEM;
  507. if (convert_from_user(karg, arg, inst)) {
  508. dprintk(CVP_ERR, "%s: failed to get from user cmd %x\n",
  509. __func__, karg->type);
  510. kfree(karg);
  511. return -EFAULT;
  512. }
  513. rc = msm_cvp_private((void *)inst, cmd, karg);
  514. if (rc) {
  515. dprintk(CVP_ERR, "%s: failed cmd type %x %d\n",
  516. __func__, karg->type, rc);
  517. kfree(karg);
  518. return rc;
  519. }
  520. if (convert_to_user(karg, arg)) {
  521. dprintk(CVP_ERR, "%s: failed to copy to user cmd %x\n",
  522. __func__, karg->type);
  523. kfree(karg);
  524. return -EFAULT;
  525. }
  526. kfree(karg);
  527. return rc;
  528. }
  529. long cvp_unblocked_ioctl(struct file *filp,
  530. unsigned int cmd, unsigned long arg)
  531. {
  532. struct msm_cvp_inst *inst;
  533. if (!filp || !filp->private_data) {
  534. dprintk(CVP_ERR, "%s: invalid params\n", __func__);
  535. return -EINVAL;
  536. }
  537. inst = filp->private_data;
  538. return cvp_ioctl(inst, cmd, arg);
  539. }
  540. long cvp_compat_ioctl(struct file *filp,
  541. unsigned int cmd, unsigned long arg)
  542. {
  543. struct msm_cvp_inst *inst;
  544. if (!filp || !filp->private_data) {
  545. dprintk(CVP_ERR, "%s: invalid params\n", __func__);
  546. return -EINVAL;
  547. }
  548. inst = filp->private_data;
  549. return cvp_ioctl(inst, cmd, (unsigned long)compat_ptr(arg));
  550. }