msm_cvp_ioctl.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2018-2021, The Linux Foundation. All rights reserved.
  4. * Copyright (c) 2024 Qualcomm Innovation Center, Inc. All rights reserved.
  5. */
  6. #include <linux/compat.h>
  7. #include "cvp_private.h"
  8. #include "cvp_hfi_api.h"
  9. static int _get_pkt_hdr_from_user(struct eva_kmd_arg __user *up,
  10. struct cvp_hal_session_cmd_pkt *pkt_hdr)
  11. {
  12. struct eva_kmd_hfi_packet *u;
  13. struct cvp_hfi_msg_session_hdr *hdr;
  14. hdr = (struct cvp_hfi_msg_session_hdr *)pkt_hdr;
  15. u = &up->data.hfi_pkt;
  16. if (get_user(pkt_hdr->size, &u->pkt_data[0]))
  17. return -EFAULT;
  18. if (get_user(pkt_hdr->packet_type, &u->pkt_data[1]))
  19. return -EFAULT;
  20. if (get_pkt_index(pkt_hdr) < 0) {
  21. dprintk(CVP_ERR, "user mode provides incorrect hfi\n");
  22. goto set_default_pkt_hdr;
  23. }
  24. if (pkt_hdr->size > MAX_HFI_PKT_SIZE*sizeof(unsigned int)) {
  25. dprintk(CVP_ERR, "user HFI packet too large %x\n",
  26. pkt_hdr->size);
  27. return -EINVAL;
  28. }
  29. return 0;
  30. set_default_pkt_hdr:
  31. pkt_hdr->size = get_msg_size(hdr);
  32. return 0;
  33. }
  34. static int _get_fence_pkt_hdr_from_user(struct eva_kmd_arg __user *up,
  35. struct cvp_hal_session_cmd_pkt *pkt_hdr)
  36. {
  37. struct eva_kmd_hfi_synx_packet __user *u;
  38. u = &up->data.hfi_synx_pkt;
  39. if (get_user(pkt_hdr->size, &u->pkt_data[0]))
  40. return -EFAULT;
  41. if (get_user(pkt_hdr->packet_type, &u->pkt_data[1]))
  42. return -EFAULT;
  43. if (pkt_hdr->size > (MAX_HFI_PKT_SIZE*sizeof(unsigned int)))
  44. return -EINVAL;
  45. return 0;
  46. }
  47. /* Size is in unit of u32 */
  48. static int _copy_pkt_from_user(struct eva_kmd_arg *kp,
  49. struct eva_kmd_arg __user *up,
  50. unsigned int start, unsigned int size)
  51. {
  52. struct eva_kmd_hfi_packet *k, *u;
  53. int i;
  54. k = &kp->data.hfi_pkt;
  55. u = &up->data.hfi_pkt;
  56. for (i = start; i < start + size; i++)
  57. if (get_user(k->pkt_data[i], &u->pkt_data[i]))
  58. return -EFAULT;
  59. if (get_user(k->oob_buf, &u->oob_buf))
  60. return -EFAULT;
  61. return 0;
  62. }
  63. static int _copy_synx_data_from_user(
  64. struct eva_kmd_hfi_synx_packet *k,
  65. struct eva_kmd_hfi_synx_packet __user *u)
  66. {
  67. int i;
  68. for (i = 0; i < MAX_FENCE_DATA_SIZE; i++) {
  69. if (get_user(k->fence_data[i], &u->fence_data[i]))
  70. return -EFAULT;
  71. }
  72. if (get_user(k->oob_buf, &u->oob_buf))
  73. return -EFAULT;
  74. return 0;
  75. }
  76. /* Size is in unit of u32 */
  77. static int _copy_fence_data_from_user_deprecate(
  78. struct eva_kmd_hfi_fence_packet *k,
  79. struct eva_kmd_hfi_fence_packet __user *u)
  80. {
  81. int i;
  82. for (i = 0; i < MAX_HFI_FENCE_SIZE; i++) {
  83. if (get_user(k->fence_data[i], &u->fence_data[i]))
  84. return -EFAULT;
  85. }
  86. if (get_user(k->frame_id, &u->frame_id)) {
  87. dprintk(CVP_ERR, "Failed to get frame id from fence pkt\n");
  88. return -EFAULT;
  89. }
  90. return 0;
  91. }
  92. static int _copy_fence_pkt_from_user(struct eva_kmd_arg *kp,
  93. struct eva_kmd_arg __user *up)
  94. { struct eva_kmd_hfi_synx_packet *k;
  95. struct eva_kmd_hfi_synx_packet __user *u;
  96. struct eva_kmd_hfi_fence_packet __user *u1;
  97. int i;
  98. k = &kp->data.hfi_synx_pkt;
  99. u = &up->data.hfi_synx_pkt;
  100. u1 = &up->data.hfi_fence_pkt;
  101. for (i = 0; i < MAX_HFI_PKT_SIZE; i++)
  102. if (get_user(k->pkt_data[i], &u->pkt_data[i]))
  103. return -EFAULT;
  104. if (get_user(k->fence_data[0], &u->fence_data[0]))
  105. return -EFAULT;
  106. if (k->fence_data[0] == 0xFEEDFACE)
  107. return _copy_synx_data_from_user(k, u);
  108. else
  109. return _copy_fence_data_from_user_deprecate(
  110. (struct eva_kmd_hfi_fence_packet *)k, u1);
  111. }
  112. static int _copy_frameid_from_user(struct eva_kmd_arg *kp,
  113. struct eva_kmd_arg __user *up)
  114. {
  115. if (get_user(kp->data.frame_id, &up->data.frame_id)) {
  116. dprintk(CVP_ERR, "Failed to get frame id from user\n");
  117. return -EFAULT;
  118. }
  119. return 0;
  120. }
  121. static int _copy_sysprop_from_user(struct eva_kmd_arg *kp,
  122. struct eva_kmd_arg __user *up)
  123. {
  124. struct eva_kmd_sys_properties *k, *u;
  125. k = &kp->data.sys_properties;
  126. u = &up->data.sys_properties;
  127. if (get_user(k->prop_num, &u->prop_num))
  128. return -EFAULT;
  129. if (k->prop_num < 1 || k->prop_num > MAX_KMD_PROP_NUM_PER_PACKET) {
  130. dprintk(CVP_ERR, "Num of prop out of range %d\n", k->prop_num);
  131. return -EFAULT;
  132. }
  133. return _copy_pkt_from_user(kp, up, 1,
  134. (k->prop_num * (sizeof(struct eva_kmd_sys_property) >> 2)));
  135. }
  136. static int _copy_pkt_to_user(struct eva_kmd_arg *kp,
  137. struct eva_kmd_arg __user *up,
  138. unsigned int size)
  139. {
  140. struct eva_kmd_hfi_packet *k, *u;
  141. int i;
  142. k = &kp->data.hfi_pkt;
  143. u = &up->data.hfi_pkt;
  144. for (i = 0; i < size; i++)
  145. if (put_user(k->pkt_data[i], &u->pkt_data[i]))
  146. return -EFAULT;
  147. if (put_user(k->oob_buf, &u->oob_buf))
  148. return -EFAULT;
  149. return 0;
  150. }
  151. static int _copy_fence_pkt_to_user(struct eva_kmd_arg *kp,
  152. struct eva_kmd_arg __user *up)
  153. {
  154. struct eva_kmd_hfi_synx_packet *k;
  155. struct eva_kmd_hfi_synx_packet __user *u;
  156. int i;
  157. k = &kp->data.hfi_synx_pkt;
  158. u = &up->data.hfi_synx_pkt;
  159. for (i = 0; i < MAX_HFI_PKT_SIZE; i++) {
  160. if (put_user(k->pkt_data[i], &u->pkt_data[i]))
  161. return -EFAULT;
  162. }
  163. if (put_user(k->oob_buf, &u->oob_buf))
  164. return -EFAULT;
  165. return 0;
  166. }
  167. static int _copy_sysprop_to_user(struct eva_kmd_arg *kp,
  168. struct eva_kmd_arg __user *up)
  169. {
  170. struct eva_kmd_sys_properties *k;
  171. struct eva_kmd_sys_properties __user *u;
  172. int i;
  173. k = &kp->data.sys_properties;
  174. u = &up->data.sys_properties;
  175. for (i = 0; i < 8; i++)
  176. if (put_user(k->prop_data[i].data, &u->prop_data[i].data))
  177. return -EFAULT;
  178. return 0;
  179. }
  180. static void print_hfi_short(struct eva_kmd_arg __user *up)
  181. {
  182. struct eva_kmd_hfi_packet *pkt;
  183. unsigned int words[5];
  184. pkt = &up->data.hfi_pkt;
  185. if (get_user(words[0], &up->type) ||
  186. get_user(words[1], &up->buf_offset) ||
  187. get_user(words[2], &up->buf_num) ||
  188. get_user(words[3], &pkt->pkt_data[0]) ||
  189. get_user(words[4], &pkt->pkt_data[1]))
  190. dprintk(CVP_ERR, "Failed to print ioctl cmd\n");
  191. dprintk(CVP_HFI, "IOCTL cmd type %#x, offset %d, num %d, pkt %d %#x\n",
  192. words[0], words[1], words[2], words[3], words[4]);
  193. }
  194. static int _copy_session_ctrl_to_user(
  195. struct eva_kmd_session_control *k,
  196. struct eva_kmd_session_control *u)
  197. {
  198. int i;
  199. if (put_user(k->ctrl_type, &u->ctrl_type))
  200. return -EFAULT;
  201. for (i = 0; i < 8; i++)
  202. if (put_user(k->ctrl_data[i], &u->ctrl_data[i]))
  203. return -EFAULT;
  204. return 0;
  205. }
  206. static int _get_session_ctrl_from_user(
  207. struct eva_kmd_session_control *k,
  208. struct eva_kmd_session_control *u)
  209. {
  210. int i;
  211. if (get_user(k->ctrl_type, &u->ctrl_type))
  212. return -EFAULT;
  213. for (i = 0; i < 8; i++)
  214. if (get_user(k->ctrl_data[i], &u->ctrl_data[i]))
  215. return -EFAULT;
  216. return 0;
  217. }
  218. static int _get_session_info_from_user(
  219. struct eva_kmd_session_info *k,
  220. struct eva_kmd_session_info __user *u)
  221. {
  222. int i;
  223. if (get_user(k->session_id, &u->session_id))
  224. return -EFAULT;
  225. for (i = 0; i < 10; i++)
  226. if (get_user(k->reserved[i], &u->reserved[i]))
  227. return -EFAULT;
  228. return 0;
  229. }
  230. static int convert_from_user(struct eva_kmd_arg *kp,
  231. unsigned long arg,
  232. struct msm_cvp_inst *inst)
  233. {
  234. int rc = 0;
  235. int i;
  236. struct eva_kmd_arg __user *up = (struct eva_kmd_arg *)arg;
  237. struct cvp_hal_session_cmd_pkt pkt_hdr;
  238. int pkt_idx;
  239. if (!kp || !up) {
  240. dprintk_rl(CVP_ERR, "%s: invalid params\n", __func__);
  241. return -EINVAL;
  242. }
  243. print_hfi_short(up);
  244. if (get_user(kp->type, &up->type))
  245. return -EFAULT;
  246. if (get_user(kp->buf_offset, &up->buf_offset) ||
  247. get_user(kp->buf_num, &up->buf_num))
  248. return -EFAULT;
  249. switch (kp->type) {
  250. case EVA_KMD_GET_SESSION_INFO:
  251. {
  252. struct eva_kmd_session_info *k;
  253. struct eva_kmd_session_info __user *u;
  254. k = &kp->data.session;
  255. u = &up->data.session;
  256. if (_get_session_info_from_user(k, u)) {
  257. dprintk(CVP_ERR, "fail to get sess info\n");
  258. return -EFAULT;
  259. }
  260. break;
  261. }
  262. case EVA_KMD_REGISTER_BUFFER:
  263. {
  264. struct eva_kmd_buffer *k, *u;
  265. k = &kp->data.regbuf;
  266. u = &up->data.regbuf;
  267. if (get_user(k->type, &u->type) ||
  268. get_user(k->index, &u->index) ||
  269. get_user(k->fd, &u->fd) ||
  270. get_user(k->size, &u->size) ||
  271. get_user(k->offset, &u->offset) ||
  272. get_user(k->pixelformat, &u->pixelformat) ||
  273. get_user(k->flags, &u->flags))
  274. return -EFAULT;
  275. for (i = 0; i < 5; i++)
  276. if (get_user(k->reserved[i], &u->reserved[i]))
  277. return -EFAULT;
  278. break;
  279. }
  280. case EVA_KMD_UNREGISTER_BUFFER:
  281. {
  282. struct eva_kmd_buffer *k, *u;
  283. k = &kp->data.unregbuf;
  284. u = &up->data.unregbuf;
  285. if (get_user(k->type, &u->type) ||
  286. get_user(k->index, &u->index) ||
  287. get_user(k->fd, &u->fd) ||
  288. get_user(k->size, &u->size) ||
  289. get_user(k->offset, &u->offset) ||
  290. get_user(k->pixelformat, &u->pixelformat) ||
  291. get_user(k->flags, &u->flags))
  292. return -EFAULT;
  293. for (i = 0; i < 5; i++)
  294. if (get_user(k->reserved[i], &u->reserved[i]))
  295. return -EFAULT;
  296. break;
  297. }
  298. case EVA_KMD_SEND_CMD_PKT:
  299. {
  300. if (_get_pkt_hdr_from_user(up, &pkt_hdr)) {
  301. dprintk(CVP_ERR, "Invalid syscall: %x, %x, %x\n",
  302. kp->type, pkt_hdr.size, pkt_hdr.packet_type);
  303. return -EFAULT;
  304. }
  305. rc = _copy_pkt_from_user(kp, up, 0, (pkt_hdr.size >> 2));
  306. break;
  307. }
  308. case EVA_KMD_SEND_FENCE_CMD_PKT:
  309. {
  310. if (_get_fence_pkt_hdr_from_user(up, &pkt_hdr)) {
  311. dprintk(CVP_ERR, "Invalid syscall: %x, %x, %x\n",
  312. kp->type, pkt_hdr.size, pkt_hdr.packet_type);
  313. return -EFAULT;
  314. }
  315. dprintk(CVP_HFI, "system call cmd pkt: %d 0x%x\n",
  316. pkt_hdr.size, pkt_hdr.packet_type);
  317. pkt_idx = get_pkt_index(&pkt_hdr);
  318. if (pkt_idx < 0) {
  319. dprintk(CVP_ERR, "%s incorrect packet %d, %x\n",
  320. __func__,
  321. pkt_hdr.size,
  322. pkt_hdr.packet_type);
  323. return -EFAULT;
  324. }
  325. rc = _copy_fence_pkt_from_user(kp, up);
  326. break;
  327. }
  328. case EVA_KMD_RECEIVE_MSG_PKT:
  329. break;
  330. case EVA_KMD_SESSION_CONTROL:
  331. {
  332. struct eva_kmd_session_control *k, *u;
  333. k = &kp->data.session_ctrl;
  334. u = &up->data.session_ctrl;
  335. rc = _get_session_ctrl_from_user(k, u);
  336. break;
  337. }
  338. case EVA_KMD_GET_SYS_PROPERTY:
  339. {
  340. if (_copy_sysprop_from_user(kp, up)) {
  341. dprintk(CVP_ERR, "Failed to get sysprop from user\n");
  342. return -EFAULT;
  343. }
  344. break;
  345. }
  346. case EVA_KMD_SET_SYS_PROPERTY:
  347. {
  348. if (_copy_sysprop_from_user(kp, up)) {
  349. dprintk(CVP_ERR, "Failed to set sysprop from user\n");
  350. return -EFAULT;
  351. }
  352. break;
  353. }
  354. case EVA_KMD_FLUSH_ALL:
  355. case EVA_KMD_UPDATE_POWER:
  356. break;
  357. case EVA_KMD_FLUSH_FRAME:
  358. {
  359. if (_copy_frameid_from_user(kp, up))
  360. return -EFAULT;
  361. break;
  362. }
  363. default:
  364. dprintk_rl(CVP_ERR, "%s: unknown cmd type 0x%x\n",
  365. __func__, kp->type);
  366. rc = -EINVAL;
  367. break;
  368. }
  369. return rc;
  370. }
  371. static int _put_user_session_info(
  372. struct eva_kmd_session_info *k,
  373. struct eva_kmd_session_info __user *u)
  374. {
  375. int i;
  376. if (put_user(k->session_id, &u->session_id))
  377. return -EFAULT;
  378. for (i = 0; i < 10; i++)
  379. if (put_user(k->reserved[i], &u->reserved[i]))
  380. return -EFAULT;
  381. return 0;
  382. }
  383. static int convert_to_user(struct eva_kmd_arg *kp, unsigned long arg)
  384. {
  385. int rc = 0;
  386. int i, size;
  387. struct eva_kmd_arg __user *up = (struct eva_kmd_arg *)arg;
  388. struct cvp_hal_session_cmd_pkt pkt_hdr;
  389. if (!kp || !up) {
  390. dprintk(CVP_ERR, "%s: invalid params\n", __func__);
  391. return -EINVAL;
  392. }
  393. if (put_user(kp->type, &up->type))
  394. return -EFAULT;
  395. switch (kp->type) {
  396. case EVA_KMD_RECEIVE_MSG_PKT:
  397. {
  398. struct eva_kmd_hfi_packet *k, *u;
  399. struct cvp_hfi_msg_session_hdr *hdr;
  400. k = &kp->data.hfi_pkt;
  401. u = &up->data.hfi_pkt;
  402. hdr = (struct cvp_hfi_msg_session_hdr *)k;
  403. size = get_msg_size(hdr) >> 2;
  404. for (i = 0; i < size; i++)
  405. if (put_user(k->pkt_data[i], &u->pkt_data[i]))
  406. return -EFAULT;
  407. break;
  408. }
  409. case EVA_KMD_GET_SESSION_INFO:
  410. {
  411. struct eva_kmd_session_info *k;
  412. struct eva_kmd_session_info __user *u;
  413. k = &kp->data.session;
  414. u = &up->data.session;
  415. if (_put_user_session_info(k, u)) {
  416. dprintk(CVP_ERR, "fail to copy sess info to user\n");
  417. return -EFAULT;
  418. }
  419. break;
  420. }
  421. case EVA_KMD_REGISTER_BUFFER:
  422. {
  423. struct eva_kmd_buffer *k, *u;
  424. k = &kp->data.regbuf;
  425. u = &up->data.regbuf;
  426. if (put_user(k->type, &u->type) ||
  427. put_user(k->index, &u->index) ||
  428. put_user(k->fd, &u->fd) ||
  429. put_user(k->size, &u->size) ||
  430. put_user(k->offset, &u->offset) ||
  431. put_user(k->pixelformat, &u->pixelformat) ||
  432. put_user(k->flags, &u->flags))
  433. return -EFAULT;
  434. for (i = 0; i < 5; i++)
  435. if (put_user(k->reserved[i], &u->reserved[i]))
  436. return -EFAULT;
  437. break;
  438. }
  439. case EVA_KMD_UNREGISTER_BUFFER:
  440. {
  441. struct eva_kmd_buffer *k, *u;
  442. k = &kp->data.unregbuf;
  443. u = &up->data.unregbuf;
  444. if (put_user(k->type, &u->type) ||
  445. put_user(k->index, &u->index) ||
  446. put_user(k->fd, &u->fd) ||
  447. put_user(k->size, &u->size) ||
  448. put_user(k->offset, &u->offset) ||
  449. put_user(k->pixelformat, &u->pixelformat) ||
  450. put_user(k->flags, &u->flags))
  451. return -EFAULT;
  452. for (i = 0; i < 5; i++)
  453. if (put_user(k->reserved[i], &u->reserved[i]))
  454. return -EFAULT;
  455. break;
  456. }
  457. case EVA_KMD_SEND_CMD_PKT:
  458. {
  459. if (_get_pkt_hdr_from_user(up, &pkt_hdr))
  460. return -EFAULT;
  461. dprintk(CVP_HFI, "Send user cmd pkt: %d %d\n",
  462. pkt_hdr.size, pkt_hdr.packet_type);
  463. rc = _copy_pkt_to_user(kp, up, (pkt_hdr.size >> 2));
  464. break;
  465. }
  466. case EVA_KMD_SEND_FENCE_CMD_PKT:
  467. {
  468. if (_get_fence_pkt_hdr_from_user(up, &pkt_hdr))
  469. return -EFAULT;
  470. dprintk(CVP_HFI, "Send user cmd pkt: %d %d\n",
  471. pkt_hdr.size, pkt_hdr.packet_type);
  472. rc = _copy_fence_pkt_to_user(kp, up);
  473. break;
  474. }
  475. case EVA_KMD_SESSION_CONTROL:
  476. {
  477. struct eva_kmd_session_control *k, *u;
  478. k = &kp->data.session_ctrl;
  479. u = &up->data.session_ctrl;
  480. rc = _copy_session_ctrl_to_user(k, u);
  481. break;
  482. }
  483. case EVA_KMD_GET_SYS_PROPERTY:
  484. {
  485. if (_copy_sysprop_to_user(kp, up)) {
  486. dprintk(CVP_ERR, "Fail to copy sysprop to user\n");
  487. return -EFAULT;
  488. }
  489. break;
  490. }
  491. case EVA_KMD_FLUSH_ALL:
  492. case EVA_KMD_FLUSH_FRAME:
  493. case EVA_KMD_SET_SYS_PROPERTY:
  494. case EVA_KMD_UPDATE_POWER:
  495. break;
  496. default:
  497. dprintk(CVP_ERR, "%s: unknown cmd type 0x%x\n",
  498. __func__, kp->type);
  499. rc = -EINVAL;
  500. break;
  501. }
  502. return rc;
  503. }
  504. static long cvp_ioctl(struct msm_cvp_inst *inst,
  505. unsigned int cmd, unsigned long arg)
  506. {
  507. int rc;
  508. struct eva_kmd_arg *karg;
  509. if (!inst) {
  510. dprintk(CVP_ERR, "%s: invalid params\n", __func__);
  511. return -EINVAL;
  512. }
  513. karg = kzalloc(sizeof(*karg), GFP_KERNEL);
  514. if (!karg)
  515. return -ENOMEM;
  516. if (convert_from_user(karg, arg, inst)) {
  517. dprintk_rl(CVP_ERR, "%s: failed to get from user cmd %x\n",
  518. __func__, karg->type);
  519. kfree(karg);
  520. return -EFAULT;
  521. }
  522. rc = msm_cvp_private((void *)inst, cmd, karg);
  523. if (rc) {
  524. dprintk(CVP_ERR, "%s: failed cmd type %x %d\n",
  525. __func__, karg->type, rc);
  526. kfree(karg);
  527. return rc;
  528. }
  529. if (convert_to_user(karg, arg)) {
  530. dprintk(CVP_ERR, "%s: failed to copy to user cmd %x\n",
  531. __func__, karg->type);
  532. kfree(karg);
  533. return -EFAULT;
  534. }
  535. kfree(karg);
  536. return rc;
  537. }
  538. long cvp_unblocked_ioctl(struct file *filp,
  539. unsigned int cmd, unsigned long arg)
  540. {
  541. struct msm_cvp_inst *inst;
  542. if (!filp || !filp->private_data) {
  543. dprintk(CVP_ERR, "%s: invalid params\n", __func__);
  544. return -EINVAL;
  545. }
  546. inst = filp->private_data;
  547. return cvp_ioctl(inst, cmd, arg);
  548. }
  549. long cvp_compat_ioctl(struct file *filp,
  550. unsigned int cmd, unsigned long arg)
  551. {
  552. struct msm_cvp_inst *inst;
  553. if (!filp || !filp->private_data) {
  554. dprintk(CVP_ERR, "%s: invalid params\n", __func__);
  555. return -EINVAL;
  556. }
  557. inst = filp->private_data;
  558. return cvp_ioctl(inst, cmd, (unsigned long)compat_ptr(arg));
  559. }