2018-08-27 17:34:44 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
2018-09-11 21:42:04 +08:00
|
|
|
#include <linux/cred.h>
|
2018-08-27 17:34:44 +08:00
|
|
|
#include <linux/device.h>
|
|
|
|
#include <linux/dma-buf.h>
|
2022-11-11 04:13:46 +08:00
|
|
|
#include <linux/dma-resv.h>
|
2018-08-27 17:34:44 +08:00
|
|
|
#include <linux/highmem.h>
|
2018-09-11 21:42:04 +08:00
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/kernel.h>
|
2018-08-27 17:34:44 +08:00
|
|
|
#include <linux/memfd.h>
|
2018-09-11 21:42:04 +08:00
|
|
|
#include <linux/miscdevice.h>
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/shmem_fs.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/udmabuf.h>
|
2022-11-18 01:18:09 +08:00
|
|
|
#include <linux/vmalloc.h>
|
|
|
|
#include <linux/iosys-map.h>
|
2018-08-27 17:34:44 +08:00
|
|
|
|
2021-06-12 05:21:07 +08:00
|
|
|
static int list_limit = 1024;
|
|
|
|
module_param(list_limit, int, 0644);
|
|
|
|
MODULE_PARM_DESC(list_limit, "udmabuf_create_list->count limit. Default is 1024.");
|
|
|
|
|
|
|
|
static int size_limit_mb = 64;
|
|
|
|
module_param(size_limit_mb, int, 0644);
|
|
|
|
MODULE_PARM_DESC(size_limit_mb, "Max size of a dmabuf, in megabytes. Default is 64.");
|
2018-09-11 21:42:10 +08:00
|
|
|
|
2018-08-27 17:34:44 +08:00
|
|
|
struct udmabuf {
|
2018-09-11 21:42:06 +08:00
|
|
|
pgoff_t pagecount;
|
2018-08-27 17:34:44 +08:00
|
|
|
struct page **pages;
|
2019-12-03 09:36:27 +08:00
|
|
|
struct sg_table *sg;
|
2019-12-03 09:36:25 +08:00
|
|
|
struct miscdevice *device;
|
2018-08-27 17:34:44 +08:00
|
|
|
};
|
|
|
|
|
2019-01-04 07:26:34 +08:00
|
|
|
static vm_fault_t udmabuf_vm_fault(struct vm_fault *vmf)
|
2018-08-27 17:34:44 +08:00
|
|
|
{
|
|
|
|
struct vm_area_struct *vma = vmf->vma;
|
|
|
|
struct udmabuf *ubuf = vma->vm_private_data;
|
2022-06-20 15:15:47 +08:00
|
|
|
pgoff_t pgoff = vmf->pgoff;
|
2018-08-27 17:34:44 +08:00
|
|
|
|
2022-06-20 15:15:47 +08:00
|
|
|
if (pgoff >= ubuf->pagecount)
|
|
|
|
return VM_FAULT_SIGBUS;
|
|
|
|
vmf->page = ubuf->pages[pgoff];
|
2018-08-27 17:34:44 +08:00
|
|
|
get_page(vmf->page);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct vm_operations_struct udmabuf_vm_ops = {
|
|
|
|
.fault = udmabuf_vm_fault,
|
|
|
|
};
|
|
|
|
|
|
|
|
static int mmap_udmabuf(struct dma_buf *buf, struct vm_area_struct *vma)
|
|
|
|
{
|
|
|
|
struct udmabuf *ubuf = buf->priv;
|
|
|
|
|
|
|
|
if ((vma->vm_flags & (VM_SHARED | VM_MAYSHARE)) == 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
vma->vm_ops = &udmabuf_vm_ops;
|
|
|
|
vma->vm_private_data = ubuf;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-11-18 01:18:09 +08:00
|
|
|
static int vmap_udmabuf(struct dma_buf *buf, struct iosys_map *map)
|
|
|
|
{
|
|
|
|
struct udmabuf *ubuf = buf->priv;
|
|
|
|
void *vaddr;
|
|
|
|
|
|
|
|
dma_resv_assert_held(buf->resv);
|
|
|
|
|
|
|
|
vaddr = vm_map_ram(ubuf->pages, ubuf->pagecount, -1);
|
|
|
|
if (!vaddr)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
iosys_map_set_vaddr(map, vaddr);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void vunmap_udmabuf(struct dma_buf *buf, struct iosys_map *map)
|
|
|
|
{
|
|
|
|
struct udmabuf *ubuf = buf->priv;
|
|
|
|
|
|
|
|
dma_resv_assert_held(buf->resv);
|
|
|
|
|
|
|
|
vm_unmap_ram(map->vaddr, ubuf->pagecount);
|
|
|
|
}
|
|
|
|
|
2019-12-03 09:36:26 +08:00
|
|
|
static struct sg_table *get_sg_table(struct device *dev, struct dma_buf *buf,
|
|
|
|
enum dma_data_direction direction)
|
2018-08-27 17:34:44 +08:00
|
|
|
{
|
2019-12-03 09:36:26 +08:00
|
|
|
struct udmabuf *ubuf = buf->priv;
|
2018-08-27 17:34:44 +08:00
|
|
|
struct sg_table *sg;
|
2018-09-11 21:42:05 +08:00
|
|
|
int ret;
|
2018-08-27 17:34:44 +08:00
|
|
|
|
|
|
|
sg = kzalloc(sizeof(*sg), GFP_KERNEL);
|
|
|
|
if (!sg)
|
2018-09-11 21:42:05 +08:00
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
ret = sg_alloc_table_from_pages(sg, ubuf->pages, ubuf->pagecount,
|
|
|
|
0, ubuf->pagecount << PAGE_SHIFT,
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (ret < 0)
|
|
|
|
goto err;
|
2020-04-06 22:41:45 +08:00
|
|
|
ret = dma_map_sgtable(dev, sg, direction, 0);
|
|
|
|
if (ret < 0)
|
2018-09-11 21:42:05 +08:00
|
|
|
goto err;
|
2018-08-27 17:34:44 +08:00
|
|
|
return sg;
|
|
|
|
|
2018-09-11 21:42:05 +08:00
|
|
|
err:
|
2018-08-27 17:34:44 +08:00
|
|
|
sg_free_table(sg);
|
|
|
|
kfree(sg);
|
2018-09-11 21:42:05 +08:00
|
|
|
return ERR_PTR(ret);
|
2018-08-27 17:34:44 +08:00
|
|
|
}
|
|
|
|
|
2019-12-03 09:36:26 +08:00
|
|
|
static void put_sg_table(struct device *dev, struct sg_table *sg,
|
|
|
|
enum dma_data_direction direction)
|
|
|
|
{
|
2020-04-06 22:41:45 +08:00
|
|
|
dma_unmap_sgtable(dev, sg, direction, 0);
|
2019-12-03 09:36:26 +08:00
|
|
|
sg_free_table(sg);
|
|
|
|
kfree(sg);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct sg_table *map_udmabuf(struct dma_buf_attachment *at,
|
|
|
|
enum dma_data_direction direction)
|
|
|
|
{
|
|
|
|
return get_sg_table(at->dev, at->dmabuf, direction);
|
|
|
|
}
|
|
|
|
|
2018-08-27 17:34:44 +08:00
|
|
|
static void unmap_udmabuf(struct dma_buf_attachment *at,
|
|
|
|
struct sg_table *sg,
|
|
|
|
enum dma_data_direction direction)
|
|
|
|
{
|
2019-12-03 09:36:26 +08:00
|
|
|
return put_sg_table(at->dev, sg, direction);
|
2018-08-27 17:34:44 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void release_udmabuf(struct dma_buf *buf)
|
|
|
|
{
|
|
|
|
struct udmabuf *ubuf = buf->priv;
|
2019-12-03 09:36:27 +08:00
|
|
|
struct device *dev = ubuf->device->this_device;
|
2018-08-27 17:34:44 +08:00
|
|
|
pgoff_t pg;
|
|
|
|
|
2019-12-03 09:36:27 +08:00
|
|
|
if (ubuf->sg)
|
|
|
|
put_sg_table(dev, ubuf->sg, DMA_BIDIRECTIONAL);
|
|
|
|
|
2018-08-27 17:34:44 +08:00
|
|
|
for (pg = 0; pg < ubuf->pagecount; pg++)
|
|
|
|
put_page(ubuf->pages[pg]);
|
|
|
|
kfree(ubuf->pages);
|
|
|
|
kfree(ubuf);
|
|
|
|
}
|
|
|
|
|
2019-12-03 09:36:27 +08:00
|
|
|
static int begin_cpu_udmabuf(struct dma_buf *buf,
|
|
|
|
enum dma_data_direction direction)
|
|
|
|
{
|
|
|
|
struct udmabuf *ubuf = buf->priv;
|
|
|
|
struct device *dev = ubuf->device->this_device;
|
2022-08-25 14:35:22 +08:00
|
|
|
int ret = 0;
|
2019-12-03 09:36:27 +08:00
|
|
|
|
|
|
|
if (!ubuf->sg) {
|
|
|
|
ubuf->sg = get_sg_table(dev, buf, direction);
|
2022-08-25 14:35:22 +08:00
|
|
|
if (IS_ERR(ubuf->sg)) {
|
|
|
|
ret = PTR_ERR(ubuf->sg);
|
|
|
|
ubuf->sg = NULL;
|
|
|
|
}
|
2019-12-03 09:36:27 +08:00
|
|
|
} else {
|
udmabuf: fix dma-buf cpu access
I'm just going to put Chia's review comment here since it sums
the issue rather nicely:
"(1) Semantically, a dma-buf is in DMA domain. CPU access from the
importer must be surrounded by {begin,end}_cpu_access. This gives the
exporter a chance to move the buffer to the CPU domain temporarily.
(2) When the exporter itself has other means to do CPU access, it is
only reasonable for the exporter to move the buffer to the CPU domain
before access, and to the DMA domain after access. The exporter can
potentially reuse {begin,end}_cpu_access for that purpose.
Because of (1), udmabuf does need to implement the
{begin,end}_cpu_access hooks. But "begin" should mean
dma_sync_sg_for_cpu and "end" should mean dma_sync_sg_for_device.
Because of (2), if userspace wants to continuing accessing through the
memfd mapping, it should call udmabuf's {begin,end}_cpu_access to
avoid cache issues."
Reported-by: Chia-I Wu <olvaffe@gmail.com>
Suggested-by: Chia-I Wu <olvaffe@gmail.com>
Fixes: 284562e1f348 ("udmabuf: implement begin_cpu_access/end_cpu_access hooks")
Signed-off-by: Gurchetan Singh <gurchetansingh@chromium.org>
Link: http://patchwork.freedesktop.org/patch/msgid/20191217230228.453-1-gurchetansingh@chromium.org
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
2019-12-18 07:02:28 +08:00
|
|
|
dma_sync_sg_for_cpu(dev, ubuf->sg->sgl, ubuf->sg->nents,
|
|
|
|
direction);
|
2019-12-03 09:36:27 +08:00
|
|
|
}
|
|
|
|
|
2022-08-25 14:35:22 +08:00
|
|
|
return ret;
|
2019-12-03 09:36:27 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int end_cpu_udmabuf(struct dma_buf *buf,
|
|
|
|
enum dma_data_direction direction)
|
|
|
|
{
|
|
|
|
struct udmabuf *ubuf = buf->priv;
|
|
|
|
struct device *dev = ubuf->device->this_device;
|
|
|
|
|
|
|
|
if (!ubuf->sg)
|
|
|
|
return -EINVAL;
|
|
|
|
|
udmabuf: fix dma-buf cpu access
I'm just going to put Chia's review comment here since it sums
the issue rather nicely:
"(1) Semantically, a dma-buf is in DMA domain. CPU access from the
importer must be surrounded by {begin,end}_cpu_access. This gives the
exporter a chance to move the buffer to the CPU domain temporarily.
(2) When the exporter itself has other means to do CPU access, it is
only reasonable for the exporter to move the buffer to the CPU domain
before access, and to the DMA domain after access. The exporter can
potentially reuse {begin,end}_cpu_access for that purpose.
Because of (1), udmabuf does need to implement the
{begin,end}_cpu_access hooks. But "begin" should mean
dma_sync_sg_for_cpu and "end" should mean dma_sync_sg_for_device.
Because of (2), if userspace wants to continuing accessing through the
memfd mapping, it should call udmabuf's {begin,end}_cpu_access to
avoid cache issues."
Reported-by: Chia-I Wu <olvaffe@gmail.com>
Suggested-by: Chia-I Wu <olvaffe@gmail.com>
Fixes: 284562e1f348 ("udmabuf: implement begin_cpu_access/end_cpu_access hooks")
Signed-off-by: Gurchetan Singh <gurchetansingh@chromium.org>
Link: http://patchwork.freedesktop.org/patch/msgid/20191217230228.453-1-gurchetansingh@chromium.org
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
2019-12-18 07:02:28 +08:00
|
|
|
dma_sync_sg_for_device(dev, ubuf->sg->sgl, ubuf->sg->nents, direction);
|
2019-12-03 09:36:27 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-09-11 21:42:07 +08:00
|
|
|
static const struct dma_buf_ops udmabuf_ops = {
|
2019-12-03 09:36:24 +08:00
|
|
|
.cache_sgt_mapping = true,
|
|
|
|
.map_dma_buf = map_udmabuf,
|
|
|
|
.unmap_dma_buf = unmap_udmabuf,
|
|
|
|
.release = release_udmabuf,
|
|
|
|
.mmap = mmap_udmabuf,
|
2022-11-18 01:18:09 +08:00
|
|
|
.vmap = vmap_udmabuf,
|
|
|
|
.vunmap = vunmap_udmabuf,
|
2019-12-03 09:36:27 +08:00
|
|
|
.begin_cpu_access = begin_cpu_udmabuf,
|
|
|
|
.end_cpu_access = end_cpu_udmabuf,
|
2018-08-27 17:34:44 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
#define SEALS_WANTED (F_SEAL_SHRINK)
|
|
|
|
#define SEALS_DENIED (F_SEAL_WRITE)
|
|
|
|
|
2019-12-03 09:36:25 +08:00
|
|
|
static long udmabuf_create(struct miscdevice *device,
|
|
|
|
struct udmabuf_create_list *head,
|
|
|
|
struct udmabuf_create_item *list)
|
2018-08-27 17:34:44 +08:00
|
|
|
{
|
|
|
|
DEFINE_DMA_BUF_EXPORT_INFO(exp_info);
|
|
|
|
struct file *memfd = NULL;
|
2021-06-10 02:29:15 +08:00
|
|
|
struct address_space *mapping = NULL;
|
2018-08-27 17:34:44 +08:00
|
|
|
struct udmabuf *ubuf;
|
|
|
|
struct dma_buf *buf;
|
2018-09-11 21:42:11 +08:00
|
|
|
pgoff_t pgoff, pgcnt, pgidx, pgbuf = 0, pglimit;
|
2023-06-09 04:49:27 +08:00
|
|
|
struct page *page;
|
2018-08-27 17:34:44 +08:00
|
|
|
int seals, ret = -EINVAL;
|
|
|
|
u32 i, flags;
|
|
|
|
|
2018-09-11 21:42:15 +08:00
|
|
|
ubuf = kzalloc(sizeof(*ubuf), GFP_KERNEL);
|
2018-08-27 17:34:44 +08:00
|
|
|
if (!ubuf)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2018-09-11 21:42:10 +08:00
|
|
|
pglimit = (size_limit_mb * 1024 * 1024) >> PAGE_SHIFT;
|
2018-08-27 17:34:44 +08:00
|
|
|
for (i = 0; i < head->count; i++) {
|
|
|
|
if (!IS_ALIGNED(list[i].offset, PAGE_SIZE))
|
2018-09-11 21:42:11 +08:00
|
|
|
goto err;
|
2018-08-27 17:34:44 +08:00
|
|
|
if (!IS_ALIGNED(list[i].size, PAGE_SIZE))
|
2018-09-11 21:42:11 +08:00
|
|
|
goto err;
|
2018-08-27 17:34:44 +08:00
|
|
|
ubuf->pagecount += list[i].size >> PAGE_SHIFT;
|
2018-09-11 21:42:10 +08:00
|
|
|
if (ubuf->pagecount > pglimit)
|
2018-09-11 21:42:11 +08:00
|
|
|
goto err;
|
2018-08-27 17:34:44 +08:00
|
|
|
}
|
2021-12-30 22:26:49 +08:00
|
|
|
|
|
|
|
if (!ubuf->pagecount)
|
|
|
|
goto err;
|
|
|
|
|
2018-09-11 21:42:15 +08:00
|
|
|
ubuf->pages = kmalloc_array(ubuf->pagecount, sizeof(*ubuf->pages),
|
2018-08-27 17:34:44 +08:00
|
|
|
GFP_KERNEL);
|
|
|
|
if (!ubuf->pages) {
|
|
|
|
ret = -ENOMEM;
|
2018-09-11 21:42:11 +08:00
|
|
|
goto err;
|
2018-08-27 17:34:44 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
pgbuf = 0;
|
|
|
|
for (i = 0; i < head->count; i++) {
|
2018-09-11 21:42:12 +08:00
|
|
|
ret = -EBADFD;
|
2018-08-27 17:34:44 +08:00
|
|
|
memfd = fget(list[i].memfd);
|
|
|
|
if (!memfd)
|
2018-09-11 21:42:11 +08:00
|
|
|
goto err;
|
2022-08-21 01:10:13 +08:00
|
|
|
mapping = memfd->f_mapping;
|
2023-06-09 04:49:27 +08:00
|
|
|
if (!shmem_mapping(mapping))
|
2018-09-11 21:42:11 +08:00
|
|
|
goto err;
|
2018-08-27 17:34:44 +08:00
|
|
|
seals = memfd_fcntl(memfd, F_GET_SEALS, 0);
|
2018-09-11 21:42:12 +08:00
|
|
|
if (seals == -EINVAL)
|
|
|
|
goto err;
|
|
|
|
ret = -EINVAL;
|
|
|
|
if ((seals & SEALS_WANTED) != SEALS_WANTED ||
|
2018-08-27 17:34:44 +08:00
|
|
|
(seals & SEALS_DENIED) != 0)
|
2018-09-11 21:42:11 +08:00
|
|
|
goto err;
|
2018-08-27 17:34:44 +08:00
|
|
|
pgoff = list[i].offset >> PAGE_SHIFT;
|
|
|
|
pgcnt = list[i].size >> PAGE_SHIFT;
|
|
|
|
for (pgidx = 0; pgidx < pgcnt; pgidx++) {
|
2023-06-09 04:49:27 +08:00
|
|
|
page = shmem_read_mapping_page(mapping, pgoff + pgidx);
|
|
|
|
if (IS_ERR(page)) {
|
|
|
|
ret = PTR_ERR(page);
|
|
|
|
goto err;
|
2018-08-27 17:34:44 +08:00
|
|
|
}
|
|
|
|
ubuf->pages[pgbuf++] = page;
|
|
|
|
}
|
|
|
|
fput(memfd);
|
2018-09-11 21:42:11 +08:00
|
|
|
memfd = NULL;
|
2018-08-27 17:34:44 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
exp_info.ops = &udmabuf_ops;
|
|
|
|
exp_info.size = ubuf->pagecount << PAGE_SHIFT;
|
|
|
|
exp_info.priv = ubuf;
|
2018-11-14 20:20:29 +08:00
|
|
|
exp_info.flags = O_RDWR;
|
2018-08-27 17:34:44 +08:00
|
|
|
|
2019-12-03 09:36:25 +08:00
|
|
|
ubuf->device = device;
|
2018-08-27 17:34:44 +08:00
|
|
|
buf = dma_buf_export(&exp_info);
|
|
|
|
if (IS_ERR(buf)) {
|
|
|
|
ret = PTR_ERR(buf);
|
2018-09-11 21:42:11 +08:00
|
|
|
goto err;
|
2018-08-27 17:34:44 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
flags = 0;
|
|
|
|
if (head->flags & UDMABUF_FLAGS_CLOEXEC)
|
|
|
|
flags |= O_CLOEXEC;
|
|
|
|
return dma_buf_fd(buf, flags);
|
|
|
|
|
2018-09-11 21:42:11 +08:00
|
|
|
err:
|
2018-08-27 17:34:44 +08:00
|
|
|
while (pgbuf > 0)
|
|
|
|
put_page(ubuf->pages[--pgbuf]);
|
2018-09-05 03:07:49 +08:00
|
|
|
if (memfd)
|
|
|
|
fput(memfd);
|
2018-08-27 17:34:44 +08:00
|
|
|
kfree(ubuf->pages);
|
|
|
|
kfree(ubuf);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static long udmabuf_ioctl_create(struct file *filp, unsigned long arg)
|
|
|
|
{
|
|
|
|
struct udmabuf_create create;
|
|
|
|
struct udmabuf_create_list head;
|
|
|
|
struct udmabuf_create_item list;
|
|
|
|
|
|
|
|
if (copy_from_user(&create, (void __user *)arg,
|
2018-09-11 21:42:15 +08:00
|
|
|
sizeof(create)))
|
2018-08-27 17:34:44 +08:00
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
head.flags = create.flags;
|
|
|
|
head.count = 1;
|
|
|
|
list.memfd = create.memfd;
|
|
|
|
list.offset = create.offset;
|
|
|
|
list.size = create.size;
|
|
|
|
|
2019-12-03 09:36:25 +08:00
|
|
|
return udmabuf_create(filp->private_data, &head, &list);
|
2018-08-27 17:34:44 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static long udmabuf_ioctl_create_list(struct file *filp, unsigned long arg)
|
|
|
|
{
|
|
|
|
struct udmabuf_create_list head;
|
|
|
|
struct udmabuf_create_item *list;
|
|
|
|
int ret = -EINVAL;
|
|
|
|
u32 lsize;
|
|
|
|
|
|
|
|
if (copy_from_user(&head, (void __user *)arg, sizeof(head)))
|
|
|
|
return -EFAULT;
|
2018-09-11 21:42:10 +08:00
|
|
|
if (head.count > list_limit)
|
2018-08-27 17:34:44 +08:00
|
|
|
return -EINVAL;
|
|
|
|
lsize = sizeof(struct udmabuf_create_item) * head.count;
|
|
|
|
list = memdup_user((void __user *)(arg + sizeof(head)), lsize);
|
|
|
|
if (IS_ERR(list))
|
|
|
|
return PTR_ERR(list);
|
|
|
|
|
2019-12-03 09:36:25 +08:00
|
|
|
ret = udmabuf_create(filp->private_data, &head, list);
|
2018-08-27 17:34:44 +08:00
|
|
|
kfree(list);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static long udmabuf_ioctl(struct file *filp, unsigned int ioctl,
|
|
|
|
unsigned long arg)
|
|
|
|
{
|
|
|
|
long ret;
|
|
|
|
|
|
|
|
switch (ioctl) {
|
|
|
|
case UDMABUF_CREATE:
|
|
|
|
ret = udmabuf_ioctl_create(filp, arg);
|
|
|
|
break;
|
|
|
|
case UDMABUF_CREATE_LIST:
|
|
|
|
ret = udmabuf_ioctl_create_list(filp, arg);
|
|
|
|
break;
|
|
|
|
default:
|
2018-09-11 21:42:13 +08:00
|
|
|
ret = -ENOTTY;
|
2018-08-27 17:34:44 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct file_operations udmabuf_fops = {
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.unlocked_ioctl = udmabuf_ioctl,
|
2020-09-04 02:16:52 +08:00
|
|
|
#ifdef CONFIG_COMPAT
|
|
|
|
.compat_ioctl = udmabuf_ioctl,
|
|
|
|
#endif
|
2018-08-27 17:34:44 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static struct miscdevice udmabuf_misc = {
|
|
|
|
.minor = MISC_DYNAMIC_MINOR,
|
|
|
|
.name = "udmabuf",
|
|
|
|
.fops = &udmabuf_fops,
|
|
|
|
};
|
|
|
|
|
|
|
|
static int __init udmabuf_dev_init(void)
|
|
|
|
{
|
2022-05-21 04:52:35 +08:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = misc_register(&udmabuf_misc);
|
|
|
|
if (ret < 0) {
|
|
|
|
pr_err("Could not initialize udmabuf device\n");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = dma_coerce_mask_and_coherent(udmabuf_misc.this_device,
|
|
|
|
DMA_BIT_MASK(64));
|
|
|
|
if (ret < 0) {
|
|
|
|
pr_err("Could not setup DMA mask for udmabuf device\n");
|
|
|
|
misc_deregister(&udmabuf_misc);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
2018-08-27 17:34:44 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void __exit udmabuf_dev_exit(void)
|
|
|
|
{
|
|
|
|
misc_deregister(&udmabuf_misc);
|
|
|
|
}
|
|
|
|
|
|
|
|
module_init(udmabuf_dev_init)
|
|
|
|
module_exit(udmabuf_dev_exit)
|
|
|
|
|
|
|
|
MODULE_AUTHOR("Gerd Hoffmann <kraxel@redhat.com>");
|