2 * Copyright (C) 2010-2016 ARM Limited. All rights reserved.
4 * This program is free software and is provided to you under the terms of the GNU General Public License version 2
5 * as published by the Free Software Foundation, and any use by you of this program is subject to the terms of such GNU licence.
7 * A copy of the licence is included with the program, and can also be obtained from Free Software
8 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
10 #include <linux/fs.h> /* file system operations */
11 #include <asm/uaccess.h> /* user space access */
15 #include "mali_kernel_common.h"
16 #include "mali_session.h"
17 #include "mali_ukk_wrappers.h"
19 int mem_alloc_wrapper(struct mali_session_data *session_data, _mali_uk_alloc_mem_s __user *uargs)
21 _mali_uk_alloc_mem_s kargs;
22 _mali_osk_errcode_t err;
24 MALI_CHECK_NON_NULL(uargs, -EINVAL);
25 MALI_CHECK_NON_NULL(session_data, -EINVAL);
27 if (0 != copy_from_user(&kargs, uargs, sizeof(_mali_uk_alloc_mem_s))) {
30 kargs.ctx = (uintptr_t)session_data;
32 err = _mali_ukk_mem_allocate(&kargs);
34 if (_MALI_OSK_ERR_OK != err) {
35 return map_errcode(err);
38 if (0 != put_user(kargs.backend_handle, &uargs->backend_handle)) {
45 int mem_free_wrapper(struct mali_session_data *session_data, _mali_uk_free_mem_s __user *uargs)
47 _mali_uk_free_mem_s kargs;
48 _mali_osk_errcode_t err;
50 MALI_CHECK_NON_NULL(uargs, -EINVAL);
51 MALI_CHECK_NON_NULL(session_data, -EINVAL);
53 if (0 != copy_from_user(&kargs, uargs, sizeof(_mali_uk_free_mem_s))) {
56 kargs.ctx = (uintptr_t)session_data;
58 err = _mali_ukk_mem_free(&kargs);
60 if (_MALI_OSK_ERR_OK != err) {
61 return map_errcode(err);
64 if (0 != put_user(kargs.free_pages_nr, &uargs->free_pages_nr)) {
71 int mem_bind_wrapper(struct mali_session_data *session_data, _mali_uk_bind_mem_s __user *uargs)
73 _mali_uk_bind_mem_s kargs;
74 _mali_osk_errcode_t err;
76 MALI_CHECK_NON_NULL(uargs, -EINVAL);
77 MALI_CHECK_NON_NULL(session_data, -EINVAL);
79 if (0 != copy_from_user(&kargs, uargs, sizeof(_mali_uk_bind_mem_s))) {
82 kargs.ctx = (uintptr_t)session_data;
84 err = _mali_ukk_mem_bind(&kargs);
86 if (_MALI_OSK_ERR_OK != err) {
87 return map_errcode(err);
93 int mem_unbind_wrapper(struct mali_session_data *session_data, _mali_uk_unbind_mem_s __user *uargs)
95 _mali_uk_unbind_mem_s kargs;
96 _mali_osk_errcode_t err;
98 MALI_CHECK_NON_NULL(uargs, -EINVAL);
99 MALI_CHECK_NON_NULL(session_data, -EINVAL);
101 if (0 != copy_from_user(&kargs, uargs, sizeof(_mali_uk_unbind_mem_s))) {
104 kargs.ctx = (uintptr_t)session_data;
106 err = _mali_ukk_mem_unbind(&kargs);
108 if (_MALI_OSK_ERR_OK != err) {
109 return map_errcode(err);
116 int mem_cow_wrapper(struct mali_session_data *session_data, _mali_uk_cow_mem_s __user *uargs)
118 _mali_uk_cow_mem_s kargs;
119 _mali_osk_errcode_t err;
121 MALI_CHECK_NON_NULL(uargs, -EINVAL);
122 MALI_CHECK_NON_NULL(session_data, -EINVAL);
124 if (0 != copy_from_user(&kargs, uargs, sizeof(_mali_uk_cow_mem_s))) {
127 kargs.ctx = (uintptr_t)session_data;
129 err = _mali_ukk_mem_cow(&kargs);
131 if (_MALI_OSK_ERR_OK != err) {
132 return map_errcode(err);
135 if (0 != put_user(kargs.backend_handle, &uargs->backend_handle)) {
142 int mem_cow_modify_range_wrapper(struct mali_session_data *session_data, _mali_uk_cow_modify_range_s __user *uargs)
144 _mali_uk_cow_modify_range_s kargs;
145 _mali_osk_errcode_t err;
147 MALI_CHECK_NON_NULL(uargs, -EINVAL);
148 MALI_CHECK_NON_NULL(session_data, -EINVAL);
150 if (0 != copy_from_user(&kargs, uargs, sizeof(_mali_uk_cow_modify_range_s))) {
153 kargs.ctx = (uintptr_t)session_data;
155 err = _mali_ukk_mem_cow_modify_range(&kargs);
157 if (_MALI_OSK_ERR_OK != err) {
158 return map_errcode(err);
161 if (0 != put_user(kargs.change_pages_nr, &uargs->change_pages_nr)) {
168 int mem_resize_mem_wrapper(struct mali_session_data *session_data, _mali_uk_mem_resize_s __user *uargs)
170 _mali_uk_mem_resize_s kargs;
171 _mali_osk_errcode_t err;
173 MALI_CHECK_NON_NULL(uargs, -EINVAL);
174 MALI_CHECK_NON_NULL(session_data, -EINVAL);
176 if (0 != copy_from_user(&kargs, uargs, sizeof(_mali_uk_mem_resize_s))) {
179 kargs.ctx = (uintptr_t)session_data;
181 err = _mali_ukk_mem_resize(&kargs);
183 if (_MALI_OSK_ERR_OK != err) {
184 return map_errcode(err);
190 int mem_write_safe_wrapper(struct mali_session_data *session_data, _mali_uk_mem_write_safe_s __user *uargs)
192 _mali_uk_mem_write_safe_s kargs;
193 _mali_osk_errcode_t err;
195 MALI_CHECK_NON_NULL(uargs, -EINVAL);
196 MALI_CHECK_NON_NULL(session_data, -EINVAL);
198 if (0 != copy_from_user(&kargs, uargs, sizeof(_mali_uk_mem_write_safe_s))) {
202 kargs.ctx = (uintptr_t)session_data;
204 /* Check if we can access the buffers */
205 if (!access_ok(VERIFY_WRITE, kargs.dest, kargs.size)
206 || !access_ok(VERIFY_READ, kargs.src, kargs.size)) {
210 /* Check if size wraps */
211 if ((kargs.size + kargs.dest) <= kargs.dest
212 || (kargs.size + kargs.src) <= kargs.src) {
216 err = _mali_ukk_mem_write_safe(&kargs);
217 if (_MALI_OSK_ERR_OK != err) {
218 return map_errcode(err);
221 if (0 != put_user(kargs.size, &uargs->size)) {
230 int mem_query_mmu_page_table_dump_size_wrapper(struct mali_session_data *session_data, _mali_uk_query_mmu_page_table_dump_size_s __user *uargs)
232 _mali_uk_query_mmu_page_table_dump_size_s kargs;
233 _mali_osk_errcode_t err;
235 MALI_CHECK_NON_NULL(uargs, -EINVAL);
236 MALI_CHECK_NON_NULL(session_data, -EINVAL);
238 kargs.ctx = (uintptr_t)session_data;
240 err = _mali_ukk_query_mmu_page_table_dump_size(&kargs);
241 if (_MALI_OSK_ERR_OK != err) return map_errcode(err);
243 if (0 != put_user(kargs.size, &uargs->size)) return -EFAULT;
248 int mem_dump_mmu_page_table_wrapper(struct mali_session_data *session_data, _mali_uk_dump_mmu_page_table_s __user *uargs)
250 _mali_uk_dump_mmu_page_table_s kargs;
251 _mali_osk_errcode_t err;
252 void __user *user_buffer;
257 MALI_CHECK_NON_NULL(uargs, -EINVAL);
258 /* the session_data pointer was validated by caller */
260 if (0 != copy_from_user(&kargs, uargs, sizeof(_mali_uk_dump_mmu_page_table_s)))
263 user_buffer = (void __user *)(uintptr_t)kargs.buffer;
264 if (!access_ok(VERIFY_WRITE, user_buffer, kargs.size))
267 /* allocate temporary buffer (kernel side) to store mmu page table info */
270 /* Allow at most 8MiB buffers, this is more than enough to dump a fully
271 * populated page table. */
272 if (kargs.size > SZ_8M)
275 buffer = (void *)(uintptr_t)_mali_osk_valloc(kargs.size);
276 if (NULL == buffer) {
281 kargs.ctx = (uintptr_t)session_data;
282 kargs.buffer = (uintptr_t)buffer;
283 err = _mali_ukk_dump_mmu_page_table(&kargs);
284 if (_MALI_OSK_ERR_OK != err) {
285 rc = map_errcode(err);
289 /* copy mmu page table info back to user space and update pointers */
290 if (0 != copy_to_user(user_buffer, buffer, kargs.size))
293 kargs.register_writes = kargs.register_writes -
294 (uintptr_t)buffer + (uintptr_t)user_buffer;
295 kargs.page_table_dump = kargs.page_table_dump -
296 (uintptr_t)buffer + (uintptr_t)user_buffer;
298 if (0 != copy_to_user(uargs, &kargs, sizeof(kargs)))
304 if (buffer) _mali_osk_vfree(buffer);
308 int mem_usage_get_wrapper(struct mali_session_data *session_data, _mali_uk_profiling_memory_usage_get_s __user *uargs)
310 _mali_osk_errcode_t err;
311 _mali_uk_profiling_memory_usage_get_s kargs;
313 MALI_CHECK_NON_NULL(uargs, -EINVAL);
314 MALI_CHECK_NON_NULL(session_data, -EINVAL);
316 if (0 != copy_from_user(&kargs, uargs, sizeof(_mali_uk_profiling_memory_usage_get_s))) {
320 kargs.ctx = (uintptr_t)session_data;
321 err = _mali_ukk_mem_usage_get(&kargs);
322 if (_MALI_OSK_ERR_OK != err) {
323 return map_errcode(err);
326 kargs.ctx = (uintptr_t)NULL; /* prevent kernel address to be returned to user space */
327 if (0 != copy_to_user(uargs, &kargs, sizeof(_mali_uk_profiling_memory_usage_get_s))) {