xref: /dragonfly/sys/dev/drm/drm_ioctl.c (revision 84b31f29)
1 /*
2  * Created: Fri Jan  8 09:01:26 1999 by faith@valinux.com
3  *
4  * Copyright 1999 Precision Insight, Inc., Cedar Park, Texas.
5  * Copyright 2000 VA Linux Systems, Inc., Sunnyvale, California.
6  * All Rights Reserved.
7  *
8  * Author Rickard E. (Rik) Faith <faith@valinux.com>
9  * Author Gareth Hughes <gareth@valinux.com>
10  *
11  * Permission is hereby granted, free of charge, to any person obtaining a
12  * copy of this software and associated documentation files (the "Software"),
13  * to deal in the Software without restriction, including without limitation
14  * the rights to use, copy, modify, merge, publish, distribute, sublicense,
15  * and/or sell copies of the Software, and to permit persons to whom the
16  * Software is furnished to do so, subject to the following conditions:
17  *
18  * The above copyright notice and this permission notice (including the next
19  * paragraph) shall be included in all copies or substantial portions of the
20  * Software.
21  *
22  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
23  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
24  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.  IN NO EVENT SHALL
25  * VA LINUX SYSTEMS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
26  * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
27  * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
28  * OTHER DEALINGS IN THE SOFTWARE.
29  */
30 
31 #include <sys/devfs.h>
32 
33 #include <drm/drmP.h>
34 #include <drm/drm_core.h>
35 #include "drm_legacy.h"
36 
37 #include <linux/export.h>
38 
39 static int drm_version(struct drm_device *dev, void *data,
40 		       struct drm_file *file_priv);
41 
42 #define DRM_IOCTL_DEF(ioctl, _func, _flags) \
43 	[DRM_IOCTL_NR(ioctl)] = {.cmd = ioctl, .func = _func, .flags = _flags, .cmd_drv = 0, .name = #ioctl}
44 
45 /** Ioctl table */
46 static const struct drm_ioctl_desc drm_ioctls[] = {
47 	DRM_IOCTL_DEF(DRM_IOCTL_VERSION, drm_version, DRM_UNLOCKED),
48 	DRM_IOCTL_DEF(DRM_IOCTL_GET_UNIQUE, drm_getunique, 0),
49 	DRM_IOCTL_DEF(DRM_IOCTL_GET_MAGIC, drm_getmagic, 0),
50 	DRM_IOCTL_DEF(DRM_IOCTL_IRQ_BUSID, drm_irq_by_busid, DRM_MASTER|DRM_ROOT_ONLY),
51 	DRM_IOCTL_DEF(DRM_IOCTL_GET_MAP, drm_getmap, DRM_UNLOCKED),
52 	DRM_IOCTL_DEF(DRM_IOCTL_GET_CLIENT, drm_getclient, DRM_UNLOCKED),
53 	DRM_IOCTL_DEF(DRM_IOCTL_GET_STATS, drm_getstats, DRM_UNLOCKED),
54 	DRM_IOCTL_DEF(DRM_IOCTL_GET_CAP, drm_getcap, DRM_UNLOCKED),
55 	DRM_IOCTL_DEF(DRM_IOCTL_SET_VERSION, drm_setversion, DRM_MASTER),
56 
57 	DRM_IOCTL_DEF(DRM_IOCTL_SET_UNIQUE, drm_setunique, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
58 	DRM_IOCTL_DEF(DRM_IOCTL_BLOCK, drm_noop, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
59 	DRM_IOCTL_DEF(DRM_IOCTL_UNBLOCK, drm_noop, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
60 	DRM_IOCTL_DEF(DRM_IOCTL_AUTH_MAGIC, drm_authmagic, DRM_AUTH|DRM_MASTER),
61 
62 	DRM_IOCTL_DEF(DRM_IOCTL_ADD_MAP, drm_addmap_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
63 	DRM_IOCTL_DEF(DRM_IOCTL_RM_MAP, drm_rmmap_ioctl, DRM_AUTH),
64 
65 	DRM_IOCTL_DEF(DRM_IOCTL_SET_SAREA_CTX, drm_legacy_setsareactx, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
66 	DRM_IOCTL_DEF(DRM_IOCTL_GET_SAREA_CTX, drm_legacy_getsareactx, DRM_AUTH),
67 
68 	DRM_IOCTL_DEF(DRM_IOCTL_SET_MASTER, drm_setmaster_ioctl, DRM_ROOT_ONLY),
69 	DRM_IOCTL_DEF(DRM_IOCTL_DROP_MASTER, drm_dropmaster_ioctl, DRM_ROOT_ONLY),
70 
71 	DRM_IOCTL_DEF(DRM_IOCTL_ADD_CTX, drm_legacy_addctx, DRM_AUTH|DRM_ROOT_ONLY),
72 	DRM_IOCTL_DEF(DRM_IOCTL_RM_CTX, drm_legacy_rmctx, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
73 	DRM_IOCTL_DEF(DRM_IOCTL_MOD_CTX, drm_noop, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
74 	DRM_IOCTL_DEF(DRM_IOCTL_GET_CTX, drm_legacy_getctx, DRM_AUTH),
75 	DRM_IOCTL_DEF(DRM_IOCTL_SWITCH_CTX, drm_legacy_switchctx, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
76 	DRM_IOCTL_DEF(DRM_IOCTL_NEW_CTX, drm_legacy_newctx, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
77 	DRM_IOCTL_DEF(DRM_IOCTL_RES_CTX, drm_legacy_resctx, DRM_AUTH),
78 
79 	DRM_IOCTL_DEF(DRM_IOCTL_ADD_DRAW, drm_noop, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
80 	DRM_IOCTL_DEF(DRM_IOCTL_RM_DRAW, drm_noop, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
81 
82 	DRM_IOCTL_DEF(DRM_IOCTL_LOCK, drm_lock, DRM_AUTH),
83 	DRM_IOCTL_DEF(DRM_IOCTL_UNLOCK, drm_unlock, DRM_AUTH),
84 
85 	DRM_IOCTL_DEF(DRM_IOCTL_FINISH, drm_noop, DRM_AUTH),
86 
87 	DRM_IOCTL_DEF(DRM_IOCTL_ADD_BUFS, drm_addbufs, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
88 	DRM_IOCTL_DEF(DRM_IOCTL_MARK_BUFS, drm_markbufs, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
89 	DRM_IOCTL_DEF(DRM_IOCTL_INFO_BUFS, drm_infobufs, DRM_AUTH),
90 	DRM_IOCTL_DEF(DRM_IOCTL_MAP_BUFS, drm_mapbufs, DRM_AUTH),
91 	DRM_IOCTL_DEF(DRM_IOCTL_FREE_BUFS, drm_freebufs, DRM_AUTH),
92 	DRM_IOCTL_DEF(DRM_IOCTL_DMA, drm_dma, DRM_AUTH),
93 
94 	DRM_IOCTL_DEF(DRM_IOCTL_CONTROL, drm_control, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
95 
96 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_ACQUIRE, drm_agp_acquire_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
97 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_RELEASE, drm_agp_release_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
98 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_ENABLE, drm_agp_enable_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
99 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_INFO, drm_agp_info_ioctl, DRM_AUTH),
100 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_ALLOC, drm_agp_alloc_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
101 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_FREE, drm_agp_free_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
102 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_BIND, drm_agp_bind_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
103 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_UNBIND, drm_agp_unbind_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
104 
105 	DRM_IOCTL_DEF(DRM_IOCTL_SG_ALLOC, drm_sg_alloc, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
106 	DRM_IOCTL_DEF(DRM_IOCTL_SG_FREE, drm_sg_free, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
107 
108 	DRM_IOCTL_DEF(DRM_IOCTL_WAIT_VBLANK, drm_wait_vblank, DRM_UNLOCKED),
109 
110 	DRM_IOCTL_DEF(DRM_IOCTL_MODESET_CTL, drm_modeset_ctl, 0),
111 
112 	DRM_IOCTL_DEF(DRM_IOCTL_UPDATE_DRAW, drm_noop, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
113 
114 	DRM_IOCTL_DEF(DRM_IOCTL_GEM_CLOSE, drm_gem_close_ioctl, DRM_UNLOCKED),
115 	DRM_IOCTL_DEF(DRM_IOCTL_GEM_FLINK, drm_gem_flink_ioctl, DRM_AUTH|DRM_UNLOCKED),
116 	DRM_IOCTL_DEF(DRM_IOCTL_GEM_OPEN, drm_gem_open_ioctl, DRM_AUTH|DRM_UNLOCKED),
117 
118 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETRESOURCES, drm_mode_getresources, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
119 
120 #if 0
121 	DRM_IOCTL_DEF(DRM_IOCTL_PRIME_HANDLE_TO_FD, drm_prime_handle_to_fd_ioctl, DRM_AUTH|DRM_UNLOCKED),
122 	DRM_IOCTL_DEF(DRM_IOCTL_PRIME_FD_TO_HANDLE, drm_prime_fd_to_handle_ioctl, DRM_AUTH|DRM_UNLOCKED),
123 #endif
124 
125 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETPLANERESOURCES, drm_mode_getplane_res, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
126 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETCRTC, drm_mode_getcrtc, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
127 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_SETCRTC, drm_mode_setcrtc, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
128 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETPLANE, drm_mode_getplane, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
129 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_SETPLANE, drm_mode_setplane, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
130 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_CURSOR, drm_mode_cursor_ioctl, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
131 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETGAMMA, drm_mode_gamma_get_ioctl, DRM_UNLOCKED),
132 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_SETGAMMA, drm_mode_gamma_set_ioctl, DRM_MASTER|DRM_UNLOCKED),
133 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETENCODER, drm_mode_getencoder, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
134 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETCONNECTOR, drm_mode_getconnector, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
135 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_ATTACHMODE, drm_noop, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
136 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_DETACHMODE, drm_noop, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
137 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETPROPERTY, drm_mode_getproperty_ioctl, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
138 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_SETPROPERTY, drm_mode_connector_property_set_ioctl, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
139 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETPROPBLOB, drm_mode_getblob_ioctl, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
140 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETFB, drm_mode_getfb, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
141 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_ADDFB, drm_mode_addfb, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
142 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_ADDFB2, drm_mode_addfb2, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
143 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_RMFB, drm_mode_rmfb, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
144 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_PAGE_FLIP, drm_mode_page_flip_ioctl, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
145 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_DIRTYFB, drm_mode_dirtyfb_ioctl, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
146 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_CREATE_DUMB, drm_mode_create_dumb_ioctl, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
147 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_MAP_DUMB, drm_mode_mmap_dumb_ioctl, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
148 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_DESTROY_DUMB, drm_mode_destroy_dumb_ioctl, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
149 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_OBJ_GETPROPERTIES, drm_mode_obj_get_properties_ioctl, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
150 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_OBJ_SETPROPERTY, drm_mode_obj_set_property_ioctl, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
151 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_CURSOR2, drm_mode_cursor2_ioctl, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
152 };
153 
154 #define DRM_CORE_IOCTL_COUNT	ARRAY_SIZE( drm_ioctls )
155 
156 /**
157  * Get the bus id.
158  *
159  * \param inode device inode.
160  * \param file_priv DRM file private.
161  * \param cmd command.
162  * \param arg user argument, pointing to a drm_unique structure.
163  * \return zero on success or a negative number on failure.
164  *
165  * Copies the bus id from drm_device::unique into user space.
166  */
167 int drm_getunique(struct drm_device *dev, void *data,
168 		  struct drm_file *file_priv)
169 {
170 	struct drm_unique *u = data;
171 
172 	if (u->unique_len >= dev->unique_len) {
173 		if (copy_to_user(u->unique, dev->unique, dev->unique_len))
174 			return -EFAULT;
175 	}
176 	u->unique_len = dev->unique_len;
177 
178 	return 0;
179 }
180 
181 /**
182  * Set the bus id.
183  *
184  * \param inode device inode.
185  * \param file_priv DRM file private.
186  * \param cmd command.
187  * \param arg user argument, pointing to a drm_unique structure.
188  * \return zero on success or a negative number on failure.
189  *
190  * Copies the bus id from userspace into drm_device::unique, and verifies that
191  * it matches the device this DRM is attached to (EINVAL otherwise).  Deprecated
192  * in interface version 1.1 and will return EBUSY when setversion has requested
193  * version 1.1 or greater.
194  */
195 int drm_setunique(struct drm_device *dev, void *data,
196 		  struct drm_file *file_priv)
197 {
198 	struct drm_unique *u = data;
199 	int domain, bus, slot, func, ret;
200 	char *busid;
201 
202 	/* Check and copy in the submitted Bus ID */
203 	if (!u->unique_len || u->unique_len > 1024)
204 		return -EINVAL;
205 
206 	busid = kmalloc(u->unique_len + 1, M_DRM, M_WAITOK);
207 	if (busid == NULL)
208 		return -ENOMEM;
209 
210 	if (copy_from_user(busid, u->unique, u->unique_len)) {
211 		drm_free(busid, M_DRM);
212 		return -EFAULT;
213 	}
214 	busid[u->unique_len] = '\0';
215 
216 	/* Return error if the busid submitted doesn't match the device's actual
217 	 * busid.
218 	 */
219 	ret = ksscanf(busid, "PCI:%d:%d:%d", &bus, &slot, &func);
220 	if (ret != 3) {
221 		drm_free(busid, M_DRM);
222 		return -EINVAL;
223 	}
224 	domain = bus >> 8;
225 	bus &= 0xff;
226 
227 	if ((domain != dev->pci_domain) ||
228 	    (bus != dev->pci_bus) ||
229 	    (slot != dev->pci_slot) ||
230 	    (func != dev->pci_func)) {
231 		drm_free(busid, M_DRM);
232 		return -EINVAL;
233 	}
234 
235 	/* Actually set the device's busid now. */
236 	DRM_LOCK(dev);
237 	if (dev->unique_len || dev->unique) {
238 		DRM_UNLOCK(dev);
239 		return -EBUSY;
240 	}
241 
242 	dev->unique_len = u->unique_len;
243 	dev->unique = busid;
244 	DRM_UNLOCK(dev);
245 
246 	return 0;
247 }
248 
249 static int drm_set_busid(struct drm_device *dev, struct drm_file *file_priv)
250 {
251 
252 	DRM_LOCK(dev);
253 
254 	dev->unique_len = 20;
255 	dev->unique = kmalloc(dev->unique_len + 1, M_DRM, M_WAITOK | M_NULLOK);
256 	if (dev->unique == NULL) {
257 		DRM_UNLOCK(dev);
258 		return -ENOMEM;
259 	}
260 
261 	ksnprintf(dev->unique, dev->unique_len, "pci:%04x:%02x:%02x.%1x",
262 	    dev->pci_domain, dev->pci_bus, dev->pci_slot, dev->pci_func);
263 
264 	DRM_UNLOCK(dev);
265 
266 	return 0;
267 }
268 
269 /**
270  * Get a mapping information.
271  *
272  * \param inode device inode.
273  * \param file_priv DRM file private.
274  * \param cmd command.
275  * \param arg user argument, pointing to a drm_map structure.
276  *
277  * \return zero on success or a negative number on failure.
278  *
279  * Searches for the mapping with the specified offset and copies its information
280  * into userspace
281  */
282 int drm_getmap(struct drm_device *dev, void *data,
283 	       struct drm_file *file_priv)
284 {
285 	struct drm_map *map = data;
286 	struct drm_map_list *r_list = NULL;
287 	struct list_head *list;
288 	int idx;
289 	int i;
290 
291 	idx = map->offset;
292 	if (idx < 0) {
293 		return -EINVAL;
294 	}
295 
296 	i = 0;
297 	DRM_LOCK(dev);
298 	list_for_each(list, &dev->maplist) {
299 		if (i == idx) {
300 			r_list = list_entry(list, struct drm_map_list, head);
301 			break;
302 		}
303 		i++;
304 	}
305 	if (!r_list || !r_list->map) {
306 		DRM_UNLOCK(dev);
307 		return -EINVAL;
308 	}
309 
310 	map->offset = r_list->map->offset;
311 	map->size = r_list->map->size;
312 	map->type = r_list->map->type;
313 	map->flags = r_list->map->flags;
314 	map->handle = r_list->map->handle;
315 	map->mtrr   = r_list->map->mtrr;
316 	DRM_UNLOCK(dev);
317 
318 	return 0;
319 }
320 
321 /**
322  * Get client information.
323  *
324  * \param inode device inode.
325  * \param file_priv DRM file private.
326  * \param cmd command.
327  * \param arg user argument, pointing to a drm_client structure.
328  *
329  * \return zero on success or a negative number on failure.
330  *
331  * Searches for the client with the specified index and copies its information
332  * into userspace
333  */
334 int drm_getclient(struct drm_device *dev, void *data,
335 		  struct drm_file *file_priv)
336 {
337 	struct drm_client *client = data;
338 	struct drm_file *pt;
339 	int idx;
340 	int i = 0;
341 
342 	idx = client->idx;
343 	DRM_LOCK(dev);
344 	list_for_each_entry(pt, &dev->filelist, lhead) {
345 		if (i++ >= idx) {
346 			client->auth  = pt->authenticated;
347 			client->pid   = pt->pid;
348 			client->uid   = pt->uid;
349 			client->magic = pt->magic;
350 			client->iocs  = pt->ioctl_count;
351 			DRM_UNLOCK(dev);
352 
353 			return 0;
354 		}
355 	}
356 	DRM_UNLOCK(dev);
357 
358 	return -EINVAL;
359 }
360 
361 /**
362  * Get statistics information.
363  *
364  * \param inode device inode.
365  * \param file_priv DRM file private.
366  * \param cmd command.
367  * \param arg user argument, pointing to a drm_stats structure.
368  *
369  * \return zero on success or a negative number on failure.
370  */
371 int drm_getstats(struct drm_device *dev, void *data, struct drm_file *file_priv)
372 {
373 	struct drm_stats *stats = data;
374 	int          i;
375 
376 	memset(stats, 0, sizeof(struct drm_stats));
377 
378 	DRM_LOCK(dev);
379 
380 	for (i = 0; i < dev->counters; i++) {
381 		if (dev->types[i] == _DRM_STAT_LOCK)
382 			stats->data[i].value =
383 			    (dev->lock.hw_lock ? dev->lock.hw_lock->lock : 0);
384 		else
385 			stats->data[i].value = atomic_read(&dev->counts[i]);
386 		stats->data[i].type = dev->types[i];
387 	}
388 
389 	stats->count = dev->counters;
390 
391 	DRM_UNLOCK(dev);
392 
393 	return 0;
394 }
395 
396 /**
397  * Get device/driver capabilities
398  */
399 int drm_getcap(struct drm_device *dev, void *data, struct drm_file *file_priv)
400 {
401 	struct drm_get_cap *req = data;
402 
403 	req->value = 0;
404 	switch (req->capability) {
405 	case DRM_CAP_DUMB_BUFFER:
406 		if (dev->driver->dumb_create)
407 			req->value = 1;
408 		break;
409 	case DRM_CAP_VBLANK_HIGH_CRTC:
410 		req->value = 1;
411 		break;
412 	case DRM_CAP_DUMB_PREFERRED_DEPTH:
413 		req->value = dev->mode_config.preferred_depth;
414 		break;
415 	case DRM_CAP_DUMB_PREFER_SHADOW:
416 		req->value = dev->mode_config.prefer_shadow;
417 		break;
418 	case DRM_CAP_TIMESTAMP_MONOTONIC:
419 		req->value = drm_timestamp_monotonic;
420 		break;
421 	default:
422 		return -EINVAL;
423 	}
424 	return 0;
425 }
426 
427 /**
428  * Set device/driver capabilities
429  */
430 int
431 drm_setclientcap(struct drm_device *dev, void *data, struct drm_file *file_priv)
432 {
433 	struct drm_set_client_cap *req = data;
434 
435 	switch (req->capability) {
436 	case DRM_CLIENT_CAP_STEREO_3D:
437 		if (req->value > 1)
438 			return -EINVAL;
439 		file_priv->stereo_allowed = req->value;
440 		break;
441 	case DRM_CLIENT_CAP_UNIVERSAL_PLANES:
442 		if (req->value > 1)
443 			return -EINVAL;
444 		file_priv->universal_planes = req->value;
445 		break;
446 	default:
447 		return -EINVAL;
448 	}
449 
450 	return 0;
451 }
452 
453 /**
454  * Setversion ioctl.
455  *
456  * \param inode device inode.
457  * \param file_priv DRM file private.
458  * \param cmd command.
459  * \param arg user argument, pointing to a drm_lock structure.
460  * \return zero on success or negative number on failure.
461  *
462  * Sets the requested interface version
463  */
464 int drm_setversion(struct drm_device *dev, void *data, struct drm_file *file_priv)
465 {
466 	struct drm_set_version *sv = data;
467 	struct drm_set_version ver;
468 	int if_version, retcode = 0;
469 
470 	/* Save the incoming data, and set the response before continuing
471 	 * any further.
472 	 */
473 	ver = *sv;
474 	sv->drm_di_major = DRM_IF_MAJOR;
475 	sv->drm_di_minor = DRM_IF_MINOR;
476 	sv->drm_dd_major = dev->driver->major;
477 	sv->drm_dd_minor = dev->driver->minor;
478 
479 	if (ver.drm_di_major != -1) {
480 		if (ver.drm_di_major != DRM_IF_MAJOR ||
481 		    ver.drm_di_minor < 0 || ver.drm_di_minor > DRM_IF_MINOR) {
482 			return -EINVAL;
483 		}
484 		if_version = DRM_IF_VERSION(ver.drm_di_major,
485 		    ver.drm_dd_minor);
486 		dev->if_version = DRM_MAX(if_version, dev->if_version);
487 		if (ver.drm_di_minor >= 1) {
488 			/*
489 			 * Version 1.1 includes tying of DRM to specific device
490 			 * Version 1.4 has proper PCI domain support
491 			 */
492 			retcode = drm_set_busid(dev, file_priv);
493 			if (retcode)
494 				return retcode;
495 		}
496 	}
497 
498 	if (ver.drm_dd_major != -1) {
499 		if (ver.drm_dd_major != dev->driver->major ||
500 		    ver.drm_dd_minor < 0 ||
501 		    ver.drm_dd_minor > dev->driver->minor)
502 		{
503 			return -EINVAL;
504 		}
505 	}
506 
507 	return 0;
508 }
509 
510 /** No-op ioctl. */
511 int drm_noop(struct drm_device *dev, void *data,
512 	     struct drm_file *file_priv)
513 {
514 	DRM_DEBUG("\n");
515 	return 0;
516 }
517 EXPORT_SYMBOL(drm_noop);
518 
519 /**
520  * Copy and IOCTL return string to user space
521  */
522 static int drm_copy_field(char __user *buf, size_t *buf_len, const char *value)
523 {
524 	int len;
525 
526 	/* don't overflow userbuf */
527 	len = strlen(value);
528 	if (len > *buf_len)
529 		len = *buf_len;
530 
531 	/* let userspace know exact length of driver value (which could be
532 	 * larger than the userspace-supplied buffer) */
533 	*buf_len = strlen(value);
534 
535 	/* finally, try filling in the userbuf */
536 	if (len && buf)
537 		if (copy_to_user(buf, value, len))
538 			return -EFAULT;
539 	return 0;
540 }
541 
542 /**
543  * Get version information
544  *
545  * \param inode device inode.
546  * \param filp file pointer.
547  * \param cmd command.
548  * \param arg user argument, pointing to a drm_version structure.
549  * \return zero on success or negative number on failure.
550  *
551  * Fills in the version information in \p arg.
552  */
553 static int drm_version(struct drm_device *dev, void *data,
554 		       struct drm_file *file_priv)
555 {
556 	struct drm_version *version = data;
557 	int err;
558 
559 	version->version_major = dev->driver->major;
560 	version->version_minor = dev->driver->minor;
561 	version->version_patchlevel = dev->driver->patchlevel;
562 	err = drm_copy_field(version->name, &version->name_len,
563 			dev->driver->name);
564 	if (!err)
565 		err = drm_copy_field(version->date, &version->date_len,
566 				dev->driver->date);
567 	if (!err)
568 		err = drm_copy_field(version->desc, &version->desc_len,
569 				dev->driver->desc);
570 
571 	return err;
572 }
573 
574 /**
575  * drm_ioctl_permit - Check ioctl permissions against caller
576  *
577  * @flags: ioctl permission flags.
578  * @file_priv: Pointer to struct drm_file identifying the caller.
579  *
580  * Checks whether the caller is allowed to run an ioctl with the
581  * indicated permissions. If so, returns zero. Otherwise returns an
582  * error code suitable for ioctl return.
583  */
584 #if 0
585 static int drm_ioctl_permit(u32 flags, struct drm_file *file_priv)
586 {
587 	/* ROOT_ONLY is only for CAP_SYS_ADMIN */
588 	if (unlikely((flags & DRM_ROOT_ONLY) && !capable(CAP_SYS_ADMIN)))
589 		return -EACCES;
590 
591 	/* AUTH is only for authenticated or render client */
592 	if (unlikely((flags & DRM_AUTH) && !drm_is_render_client(file_priv) &&
593 		     !file_priv->authenticated))
594 		return -EACCES;
595 
596 	/* MASTER is only for master or control clients */
597 	if (unlikely((flags & DRM_MASTER) && !file_priv->is_master &&
598 		     !drm_is_control_client(file_priv)))
599 		return -EACCES;
600 
601 	/* Control clients must be explicitly allowed */
602 	if (unlikely(!(flags & DRM_CONTROL_ALLOW) &&
603 		     drm_is_control_client(file_priv)))
604 		return -EACCES;
605 
606 	/* Render clients must be explicitly allowed */
607 	if (unlikely(!(flags & DRM_RENDER_ALLOW) &&
608 		     drm_is_render_client(file_priv)))
609 		return -EACCES;
610 
611 	return 0;
612 }
613 #endif
614 
615 /**
616  * Called whenever a process performs an ioctl on /dev/drm.
617  *
618  * \param inode device inode.
619  * \param file_priv DRM file private.
620  * \param cmd command.
621  * \param arg user argument.
622  * \return zero on success or negative number on failure.
623  *
624  * Looks up the ioctl function in the ::ioctls table, checking for root
625  * previleges if so required, and dispatches to the respective function.
626  */
627 int drm_ioctl(struct dev_ioctl_args *ap)
628 {
629 	struct cdev *kdev = ap->a_head.a_dev;
630 	struct drm_device *dev;
631 	const struct drm_ioctl_desc *ioctl = NULL;
632 	u_long cmd = ap->a_cmd;
633 	unsigned int nr = DRM_IOCTL_NR(cmd);
634 	int retcode = 0;
635 	caddr_t data = ap->a_data;
636 	int (*func)(struct drm_device *dev, void *data, struct drm_file *file_priv);
637 	int is_driver_ioctl = 0;
638 	struct drm_file *file_priv;
639 
640 	dev = drm_get_device_from_kdev(kdev);
641 
642 	retcode = devfs_get_cdevpriv(ap->a_fp, (void **)&file_priv);
643 	if (retcode !=0) {
644 		DRM_ERROR("can't find authenticator\n");
645 		return EINVAL;
646 	}
647 
648 	atomic_inc(&dev->counts[_DRM_STAT_IOCTLS]);
649 
650 	if (drm_device_is_unplugged(dev))
651 		return ENODEV;
652 
653 	if (IOCGROUP(cmd) != DRM_IOCTL_BASE) {
654 		DRM_DEBUG("Bad ioctl group 0x%x\n", (int)IOCGROUP(cmd));
655 		return EINVAL;
656 	}
657 
658 	ioctl = &drm_ioctls[nr];
659 	/* It's not a core DRM ioctl, try driver-specific. */
660 	if (ioctl->func == NULL && nr >= DRM_COMMAND_BASE) {
661 		/* The array entries begin at DRM_COMMAND_BASE ioctl nr */
662 		nr -= DRM_COMMAND_BASE;
663 		if (nr >= dev->driver->num_ioctls) {
664 			return EINVAL;
665 		}
666 		ioctl = &dev->driver->ioctls[nr];
667 		is_driver_ioctl = 1;
668 	}
669 
670 	DRM_DEBUG_VERBOSE("pid=%d, cmd=0x%02lx, nr=0x%02x, dev 0x%lx, auth=%d\n",
671 	    DRM_CURRENTPID, cmd, nr, (long)dev->dev,
672 	    file_priv->authenticated);
673 
674 	/* Do not trust userspace, use our own definition */
675 	func = ioctl->func;
676 
677 	if (func == NULL) {
678 		DRM_DEBUG("no function\n");
679 		return EINVAL;
680 	}
681 
682 	if (((ioctl->flags & DRM_ROOT_ONLY) && !capable(CAP_SYS_ADMIN)) ||
683 	    ((ioctl->flags & DRM_AUTH) && !file_priv->authenticated) ||
684 	    ((ioctl->flags & DRM_MASTER) && !file_priv->master))
685 		return EACCES;
686 
687 	if (is_driver_ioctl) {
688 		if ((ioctl->flags & DRM_UNLOCKED) == 0)
689 			mutex_lock(&drm_global_mutex);
690 		/* shared code returns -errno */
691 		retcode = -func(dev, data, file_priv);
692 		if (retcode == ERESTARTSYS)
693 			retcode = EINTR;
694 		if ((ioctl->flags & DRM_UNLOCKED) == 0)
695 			mutex_unlock(&drm_global_mutex);
696 	} else {
697 		retcode = -func(dev, data, file_priv);
698 		if (retcode == ERESTARTSYS)
699 			retcode = EINTR;
700 	}
701 
702 	if (!ioctl)
703 		DRM_DEBUG("invalid ioctl: pid=%d, dev=0x%lx, auth=%d, cmd=0x%02lx, nr=0x%02x\n",
704 			  DRM_CURRENTPID,
705 			  (long)dev->dev,
706 			  file_priv->authenticated, cmd, nr);
707 
708 	if (retcode)
709 		DRM_DEBUG("ret = %d\n", retcode);
710 	return retcode;
711 }
712 
713 /**
714  * drm_ioctl_flags - Check for core ioctl and return ioctl permission flags
715  *
716  * @nr: Ioctl number.
717  * @flags: Where to return the ioctl permission flags
718  */
719 bool drm_ioctl_flags(unsigned int nr, unsigned int *flags)
720 {
721 	if ((nr >= DRM_COMMAND_END && nr < DRM_CORE_IOCTL_COUNT) ||
722 	    (nr < DRM_COMMAND_BASE)) {
723 		*flags = drm_ioctls[nr].flags;
724 		return true;
725 	}
726 
727 	return false;
728 }
729 EXPORT_SYMBOL(drm_ioctl_flags);
730