xref: /dragonfly/sys/dev/drm/drm_ioctl.c (revision a1282e19)
1 /*
2  * Created: Fri Jan  8 09:01:26 1999 by faith@valinux.com
3  *
4  * Copyright 1999 Precision Insight, Inc., Cedar Park, Texas.
5  * Copyright 2000 VA Linux Systems, Inc., Sunnyvale, California.
6  * All Rights Reserved.
7  *
8  * Author Rickard E. (Rik) Faith <faith@valinux.com>
9  * Author Gareth Hughes <gareth@valinux.com>
10  *
11  * Permission is hereby granted, free of charge, to any person obtaining a
12  * copy of this software and associated documentation files (the "Software"),
13  * to deal in the Software without restriction, including without limitation
14  * the rights to use, copy, modify, merge, publish, distribute, sublicense,
15  * and/or sell copies of the Software, and to permit persons to whom the
16  * Software is furnished to do so, subject to the following conditions:
17  *
18  * The above copyright notice and this permission notice (including the next
19  * paragraph) shall be included in all copies or substantial portions of the
20  * Software.
21  *
22  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
23  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
24  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.  IN NO EVENT SHALL
25  * VA LINUX SYSTEMS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
26  * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
27  * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
28  * OTHER DEALINGS IN THE SOFTWARE.
29  */
30 
31 #include <sys/devfs.h>
32 
33 #include <drm/drmP.h>
34 #include <drm/drm_core.h>
35 #include "drm_legacy.h"
36 
37 #include <linux/export.h>
38 
39 static int drm_version(struct drm_device *dev, void *data,
40 		       struct drm_file *file_priv);
41 
42 #define DRM_IOCTL_DEF(ioctl, _func, _flags) \
43 	[DRM_IOCTL_NR(ioctl)] = {.cmd = ioctl, .func = _func, .flags = _flags, .cmd_drv = 0, .name = #ioctl}
44 
45 /** Ioctl table */
46 static const struct drm_ioctl_desc drm_ioctls[] = {
47 	DRM_IOCTL_DEF(DRM_IOCTL_VERSION, drm_version, DRM_UNLOCKED),
48 	DRM_IOCTL_DEF(DRM_IOCTL_GET_UNIQUE, drm_getunique, 0),
49 	DRM_IOCTL_DEF(DRM_IOCTL_GET_MAGIC, drm_getmagic, 0),
50 	DRM_IOCTL_DEF(DRM_IOCTL_IRQ_BUSID, drm_irq_by_busid, DRM_MASTER|DRM_ROOT_ONLY),
51 	DRM_IOCTL_DEF(DRM_IOCTL_GET_MAP, drm_getmap, DRM_UNLOCKED),
52 	DRM_IOCTL_DEF(DRM_IOCTL_GET_CLIENT, drm_getclient, DRM_UNLOCKED),
53 	DRM_IOCTL_DEF(DRM_IOCTL_GET_STATS, drm_getstats, DRM_UNLOCKED),
54 	DRM_IOCTL_DEF(DRM_IOCTL_GET_CAP, drm_getcap, DRM_UNLOCKED),
55 	DRM_IOCTL_DEF(DRM_IOCTL_SET_VERSION, drm_setversion, DRM_MASTER),
56 
57 	DRM_IOCTL_DEF(DRM_IOCTL_SET_UNIQUE, drm_setunique, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
58 	DRM_IOCTL_DEF(DRM_IOCTL_BLOCK, drm_noop, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
59 	DRM_IOCTL_DEF(DRM_IOCTL_UNBLOCK, drm_noop, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
60 	DRM_IOCTL_DEF(DRM_IOCTL_AUTH_MAGIC, drm_authmagic, DRM_AUTH|DRM_MASTER),
61 
62 	DRM_IOCTL_DEF(DRM_IOCTL_ADD_MAP, drm_legacy_addmap_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
63 	DRM_IOCTL_DEF(DRM_IOCTL_RM_MAP, drm_legacy_rmmap_ioctl, DRM_AUTH),
64 
65 	DRM_IOCTL_DEF(DRM_IOCTL_SET_SAREA_CTX, drm_legacy_setsareactx, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
66 	DRM_IOCTL_DEF(DRM_IOCTL_GET_SAREA_CTX, drm_legacy_getsareactx, DRM_AUTH),
67 
68 	DRM_IOCTL_DEF(DRM_IOCTL_SET_MASTER, drm_setmaster_ioctl, DRM_ROOT_ONLY),
69 	DRM_IOCTL_DEF(DRM_IOCTL_DROP_MASTER, drm_dropmaster_ioctl, DRM_ROOT_ONLY),
70 
71 	DRM_IOCTL_DEF(DRM_IOCTL_ADD_CTX, drm_legacy_addctx, DRM_AUTH|DRM_ROOT_ONLY),
72 	DRM_IOCTL_DEF(DRM_IOCTL_RM_CTX, drm_legacy_rmctx, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
73 	DRM_IOCTL_DEF(DRM_IOCTL_MOD_CTX, drm_noop, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
74 	DRM_IOCTL_DEF(DRM_IOCTL_GET_CTX, drm_legacy_getctx, DRM_AUTH),
75 	DRM_IOCTL_DEF(DRM_IOCTL_SWITCH_CTX, drm_legacy_switchctx, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
76 	DRM_IOCTL_DEF(DRM_IOCTL_NEW_CTX, drm_legacy_newctx, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
77 	DRM_IOCTL_DEF(DRM_IOCTL_RES_CTX, drm_legacy_resctx, DRM_AUTH),
78 
79 	DRM_IOCTL_DEF(DRM_IOCTL_ADD_DRAW, drm_noop, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
80 	DRM_IOCTL_DEF(DRM_IOCTL_RM_DRAW, drm_noop, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
81 
82 	DRM_IOCTL_DEF(DRM_IOCTL_LOCK, drm_lock, DRM_AUTH),
83 	DRM_IOCTL_DEF(DRM_IOCTL_UNLOCK, drm_unlock, DRM_AUTH),
84 
85 	DRM_IOCTL_DEF(DRM_IOCTL_FINISH, drm_noop, DRM_AUTH),
86 
87 	DRM_IOCTL_DEF(DRM_IOCTL_ADD_BUFS, drm_legacy_addbufs, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
88 	DRM_IOCTL_DEF(DRM_IOCTL_MARK_BUFS, drm_legacy_markbufs, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
89 	DRM_IOCTL_DEF(DRM_IOCTL_INFO_BUFS, drm_legacy_infobufs, DRM_AUTH),
90 	DRM_IOCTL_DEF(DRM_IOCTL_MAP_BUFS, drm_legacy_mapbufs, DRM_AUTH),
91 	DRM_IOCTL_DEF(DRM_IOCTL_FREE_BUFS, drm_legacy_freebufs, DRM_AUTH),
92 	DRM_IOCTL_DEF(DRM_IOCTL_DMA, drm_legacy_dma_ioctl, DRM_AUTH),
93 
94 	DRM_IOCTL_DEF(DRM_IOCTL_CONTROL, drm_control, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
95 
96 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_ACQUIRE, drm_agp_acquire_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
97 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_RELEASE, drm_agp_release_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
98 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_ENABLE, drm_agp_enable_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
99 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_INFO, drm_agp_info_ioctl, DRM_AUTH),
100 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_ALLOC, drm_agp_alloc_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
101 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_FREE, drm_agp_free_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
102 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_BIND, drm_agp_bind_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
103 	DRM_IOCTL_DEF(DRM_IOCTL_AGP_UNBIND, drm_agp_unbind_ioctl, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
104 
105 	DRM_IOCTL_DEF(DRM_IOCTL_SG_ALLOC, drm_legacy_sg_alloc, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
106 	DRM_IOCTL_DEF(DRM_IOCTL_SG_FREE, drm_legacy_sg_free, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
107 
108 	DRM_IOCTL_DEF(DRM_IOCTL_WAIT_VBLANK, drm_wait_vblank, DRM_UNLOCKED),
109 
110 	DRM_IOCTL_DEF(DRM_IOCTL_MODESET_CTL, drm_modeset_ctl, 0),
111 
112 	DRM_IOCTL_DEF(DRM_IOCTL_UPDATE_DRAW, drm_noop, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY),
113 
114 	DRM_IOCTL_DEF(DRM_IOCTL_GEM_CLOSE, drm_gem_close_ioctl, DRM_UNLOCKED),
115 	DRM_IOCTL_DEF(DRM_IOCTL_GEM_FLINK, drm_gem_flink_ioctl, DRM_AUTH|DRM_UNLOCKED),
116 	DRM_IOCTL_DEF(DRM_IOCTL_GEM_OPEN, drm_gem_open_ioctl, DRM_AUTH|DRM_UNLOCKED),
117 
118 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETRESOURCES, drm_mode_getresources, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
119 
120 #if 0
121 	DRM_IOCTL_DEF(DRM_IOCTL_PRIME_HANDLE_TO_FD, drm_prime_handle_to_fd_ioctl, DRM_AUTH|DRM_UNLOCKED),
122 	DRM_IOCTL_DEF(DRM_IOCTL_PRIME_FD_TO_HANDLE, drm_prime_fd_to_handle_ioctl, DRM_AUTH|DRM_UNLOCKED),
123 #endif
124 
125 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETPLANERESOURCES, drm_mode_getplane_res, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
126 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETCRTC, drm_mode_getcrtc, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
127 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_SETCRTC, drm_mode_setcrtc, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
128 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETPLANE, drm_mode_getplane, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
129 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_SETPLANE, drm_mode_setplane, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
130 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_CURSOR, drm_mode_cursor_ioctl, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
131 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETGAMMA, drm_mode_gamma_get_ioctl, DRM_UNLOCKED),
132 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_SETGAMMA, drm_mode_gamma_set_ioctl, DRM_MASTER|DRM_UNLOCKED),
133 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETENCODER, drm_mode_getencoder, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
134 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETCONNECTOR, drm_mode_getconnector, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
135 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_ATTACHMODE, drm_noop, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
136 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_DETACHMODE, drm_noop, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
137 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETPROPERTY, drm_mode_getproperty_ioctl, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
138 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_SETPROPERTY, drm_mode_connector_property_set_ioctl, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
139 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETPROPBLOB, drm_mode_getblob_ioctl, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
140 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_GETFB, drm_mode_getfb, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
141 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_ADDFB, drm_mode_addfb, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
142 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_ADDFB2, drm_mode_addfb2, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
143 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_RMFB, drm_mode_rmfb, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
144 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_PAGE_FLIP, drm_mode_page_flip_ioctl, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
145 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_DIRTYFB, drm_mode_dirtyfb_ioctl, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
146 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_CREATE_DUMB, drm_mode_create_dumb_ioctl, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
147 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_MAP_DUMB, drm_mode_mmap_dumb_ioctl, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
148 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_DESTROY_DUMB, drm_mode_destroy_dumb_ioctl, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
149 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_OBJ_GETPROPERTIES, drm_mode_obj_get_properties_ioctl, DRM_CONTROL_ALLOW|DRM_UNLOCKED),
150 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_OBJ_SETPROPERTY, drm_mode_obj_set_property_ioctl, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
151 	DRM_IOCTL_DEF(DRM_IOCTL_MODE_CURSOR2, drm_mode_cursor2_ioctl, DRM_MASTER|DRM_CONTROL_ALLOW|DRM_UNLOCKED),
152 };
153 
154 #define DRM_CORE_IOCTL_COUNT	ARRAY_SIZE( drm_ioctls )
155 
156 /**
157  * Get the bus id.
158  *
159  * \param inode device inode.
160  * \param file_priv DRM file private.
161  * \param cmd command.
162  * \param arg user argument, pointing to a drm_unique structure.
163  * \return zero on success or a negative number on failure.
164  *
165  * Copies the bus id from drm_device::unique into user space.
166  */
167 int drm_getunique(struct drm_device *dev, void *data,
168 		  struct drm_file *file_priv)
169 {
170 	struct drm_unique *u = data;
171 
172 	if (u->unique_len >= dev->unique_len) {
173 		if (copy_to_user(u->unique, dev->unique, dev->unique_len))
174 			return -EFAULT;
175 	}
176 	u->unique_len = dev->unique_len;
177 
178 	return 0;
179 }
180 
181 /**
182  * Set the bus id.
183  *
184  * \param inode device inode.
185  * \param file_priv DRM file private.
186  * \param cmd command.
187  * \param arg user argument, pointing to a drm_unique structure.
188  * \return zero on success or a negative number on failure.
189  *
190  * Copies the bus id from userspace into drm_device::unique, and verifies that
191  * it matches the device this DRM is attached to (EINVAL otherwise).  Deprecated
192  * in interface version 1.1 and will return EBUSY when setversion has requested
193  * version 1.1 or greater.
194  */
195 int drm_setunique(struct drm_device *dev, void *data,
196 		  struct drm_file *file_priv)
197 {
198 	struct drm_unique *u = data;
199 	int domain, bus, slot, func, ret;
200 	char *busid;
201 
202 	/* Check and copy in the submitted Bus ID */
203 	if (!u->unique_len || u->unique_len > 1024)
204 		return -EINVAL;
205 
206 	busid = kmalloc(u->unique_len + 1, M_DRM, M_WAITOK);
207 	if (busid == NULL)
208 		return -ENOMEM;
209 
210 	if (copy_from_user(busid, u->unique, u->unique_len)) {
211 		drm_free(busid, M_DRM);
212 		return -EFAULT;
213 	}
214 	busid[u->unique_len] = '\0';
215 
216 	/* Return error if the busid submitted doesn't match the device's actual
217 	 * busid.
218 	 */
219 	ret = ksscanf(busid, "PCI:%d:%d:%d", &bus, &slot, &func);
220 	if (ret != 3) {
221 		drm_free(busid, M_DRM);
222 		return -EINVAL;
223 	}
224 	domain = bus >> 8;
225 	bus &= 0xff;
226 
227 	if ((domain != dev->pci_domain) ||
228 	    (bus != dev->pci_bus) ||
229 	    (slot != dev->pci_slot) ||
230 	    (func != dev->pci_func)) {
231 		drm_free(busid, M_DRM);
232 		return -EINVAL;
233 	}
234 
235 	/* Actually set the device's busid now. */
236 	DRM_LOCK(dev);
237 	if (dev->unique_len || dev->unique) {
238 		DRM_UNLOCK(dev);
239 		return -EBUSY;
240 	}
241 
242 	dev->unique_len = u->unique_len;
243 	dev->unique = busid;
244 	DRM_UNLOCK(dev);
245 
246 	return 0;
247 }
248 
249 static int drm_set_busid(struct drm_device *dev, struct drm_file *file_priv)
250 {
251 
252 	DRM_LOCK(dev);
253 
254 	dev->unique_len = 20;
255 	dev->unique = kmalloc(dev->unique_len + 1, M_DRM, M_WAITOK | M_NULLOK);
256 	if (dev->unique == NULL) {
257 		DRM_UNLOCK(dev);
258 		return -ENOMEM;
259 	}
260 
261 	ksnprintf(dev->unique, dev->unique_len, "pci:%04x:%02x:%02x.%1x",
262 	    dev->pci_domain, dev->pci_bus, dev->pci_slot, dev->pci_func);
263 
264 	DRM_UNLOCK(dev);
265 
266 	return 0;
267 }
268 
269 /**
270  * Get a mapping information.
271  *
272  * \param inode device inode.
273  * \param file_priv DRM file private.
274  * \param cmd command.
275  * \param arg user argument, pointing to a drm_map structure.
276  *
277  * \return zero on success or a negative number on failure.
278  *
279  * Searches for the mapping with the specified offset and copies its information
280  * into userspace
281  */
282 int drm_getmap(struct drm_device *dev, void *data,
283 	       struct drm_file *file_priv)
284 {
285 	struct drm_map *map = data;
286 	struct drm_map_list *r_list = NULL;
287 	struct list_head *list;
288 	int idx;
289 	int i;
290 
291 	idx = map->offset;
292 	if (idx < 0) {
293 		return -EINVAL;
294 	}
295 
296 	i = 0;
297 	DRM_LOCK(dev);
298 	list_for_each(list, &dev->maplist) {
299 		if (i == idx) {
300 			r_list = list_entry(list, struct drm_map_list, head);
301 			break;
302 		}
303 		i++;
304 	}
305 	if (!r_list || !r_list->map) {
306 		DRM_UNLOCK(dev);
307 		return -EINVAL;
308 	}
309 
310 	map->offset = r_list->map->offset;
311 	map->size = r_list->map->size;
312 	map->type = r_list->map->type;
313 	map->flags = r_list->map->flags;
314 	map->handle = r_list->map->handle;
315 	map->mtrr   = r_list->map->mtrr;
316 	DRM_UNLOCK(dev);
317 
318 	return 0;
319 }
320 
321 /**
322  * Get client information.
323  *
324  * \param inode device inode.
325  * \param file_priv DRM file private.
326  * \param cmd command.
327  * \param arg user argument, pointing to a drm_client structure.
328  *
329  * \return zero on success or a negative number on failure.
330  *
331  * Searches for the client with the specified index and copies its information
332  * into userspace
333  */
334 int drm_getclient(struct drm_device *dev, void *data,
335 		  struct drm_file *file_priv)
336 {
337 	struct drm_client *client = data;
338 	struct drm_file *pt;
339 	int idx;
340 	int i = 0;
341 
342 	idx = client->idx;
343 	DRM_LOCK(dev);
344 	list_for_each_entry(pt, &dev->filelist, lhead) {
345 		if (i++ >= idx) {
346 			client->auth  = pt->authenticated;
347 			client->pid   = pt->pid;
348 			client->uid   = pt->uid;
349 			client->magic = pt->magic;
350 			client->iocs  = pt->ioctl_count;
351 			DRM_UNLOCK(dev);
352 
353 			return 0;
354 		}
355 	}
356 	DRM_UNLOCK(dev);
357 
358 	return -EINVAL;
359 }
360 
361 /**
362  * Get statistics information.
363  *
364  * \param inode device inode.
365  * \param file_priv DRM file private.
366  * \param cmd command.
367  * \param arg user argument, pointing to a drm_stats structure.
368  *
369  * \return zero on success or a negative number on failure.
370  */
371 int drm_getstats(struct drm_device *dev, void *data, struct drm_file *file_priv)
372 {
373 	struct drm_stats *stats = data;
374 	int          i;
375 
376 	memset(stats, 0, sizeof(struct drm_stats));
377 
378 	DRM_LOCK(dev);
379 
380 	for (i = 0; i < dev->counters; i++) {
381 		if (dev->types[i] == _DRM_STAT_LOCK)
382 			stats->data[i].value =
383 			    (dev->lock.hw_lock ? dev->lock.hw_lock->lock : 0);
384 		else
385 			stats->data[i].value = atomic_read(&dev->counts[i]);
386 		stats->data[i].type = dev->types[i];
387 	}
388 
389 	stats->count = dev->counters;
390 
391 	DRM_UNLOCK(dev);
392 
393 	return 0;
394 }
395 
396 /**
397  * Get device/driver capabilities
398  */
399 int drm_getcap(struct drm_device *dev, void *data, struct drm_file *file_priv)
400 {
401 	struct drm_get_cap *req = data;
402 
403 	req->value = 0;
404 	switch (req->capability) {
405 	case DRM_CAP_DUMB_BUFFER:
406 		if (dev->driver->dumb_create)
407 			req->value = 1;
408 		break;
409 	case DRM_CAP_VBLANK_HIGH_CRTC:
410 		req->value = 1;
411 		break;
412 	case DRM_CAP_DUMB_PREFERRED_DEPTH:
413 		req->value = dev->mode_config.preferred_depth;
414 		break;
415 	case DRM_CAP_DUMB_PREFER_SHADOW:
416 		req->value = dev->mode_config.prefer_shadow;
417 		break;
418 	case DRM_CAP_TIMESTAMP_MONOTONIC:
419 		req->value = drm_timestamp_monotonic;
420 		break;
421 	case DRM_CAP_CURSOR_WIDTH:
422 		if (dev->mode_config.cursor_width)
423 			req->value = dev->mode_config.cursor_width;
424 		else
425 			req->value = 64;
426 		break;
427 	case DRM_CAP_CURSOR_HEIGHT:
428 		if (dev->mode_config.cursor_height)
429 			req->value = dev->mode_config.cursor_height;
430 		else
431 			req->value = 64;
432 		break;
433 	default:
434 		return -EINVAL;
435 	}
436 	return 0;
437 }
438 
439 /**
440  * Set device/driver capabilities
441  */
442 int
443 drm_setclientcap(struct drm_device *dev, void *data, struct drm_file *file_priv)
444 {
445 	struct drm_set_client_cap *req = data;
446 
447 	switch (req->capability) {
448 	case DRM_CLIENT_CAP_STEREO_3D:
449 		if (req->value > 1)
450 			return -EINVAL;
451 		file_priv->stereo_allowed = req->value;
452 		break;
453 	case DRM_CLIENT_CAP_UNIVERSAL_PLANES:
454 		if (req->value > 1)
455 			return -EINVAL;
456 		file_priv->universal_planes = req->value;
457 		break;
458 	default:
459 		return -EINVAL;
460 	}
461 
462 	return 0;
463 }
464 
465 /**
466  * Setversion ioctl.
467  *
468  * \param inode device inode.
469  * \param file_priv DRM file private.
470  * \param cmd command.
471  * \param arg user argument, pointing to a drm_lock structure.
472  * \return zero on success or negative number on failure.
473  *
474  * Sets the requested interface version
475  */
476 int drm_setversion(struct drm_device *dev, void *data, struct drm_file *file_priv)
477 {
478 	struct drm_set_version *sv = data;
479 	struct drm_set_version ver;
480 	int if_version, retcode = 0;
481 
482 	/* Save the incoming data, and set the response before continuing
483 	 * any further.
484 	 */
485 	ver = *sv;
486 	sv->drm_di_major = DRM_IF_MAJOR;
487 	sv->drm_di_minor = DRM_IF_MINOR;
488 	sv->drm_dd_major = dev->driver->major;
489 	sv->drm_dd_minor = dev->driver->minor;
490 
491 	if (ver.drm_di_major != -1) {
492 		if (ver.drm_di_major != DRM_IF_MAJOR ||
493 		    ver.drm_di_minor < 0 || ver.drm_di_minor > DRM_IF_MINOR) {
494 			return -EINVAL;
495 		}
496 		if_version = DRM_IF_VERSION(ver.drm_di_major,
497 		    ver.drm_dd_minor);
498 		dev->if_version = DRM_MAX(if_version, dev->if_version);
499 		if (ver.drm_di_minor >= 1) {
500 			/*
501 			 * Version 1.1 includes tying of DRM to specific device
502 			 * Version 1.4 has proper PCI domain support
503 			 */
504 			retcode = drm_set_busid(dev, file_priv);
505 			if (retcode)
506 				return retcode;
507 		}
508 	}
509 
510 	if (ver.drm_dd_major != -1) {
511 		if (ver.drm_dd_major != dev->driver->major ||
512 		    ver.drm_dd_minor < 0 ||
513 		    ver.drm_dd_minor > dev->driver->minor)
514 		{
515 			return -EINVAL;
516 		}
517 	}
518 
519 	return 0;
520 }
521 
522 /** No-op ioctl. */
523 int drm_noop(struct drm_device *dev, void *data,
524 	     struct drm_file *file_priv)
525 {
526 	DRM_DEBUG("\n");
527 	return 0;
528 }
529 EXPORT_SYMBOL(drm_noop);
530 
531 /**
532  * Copy and IOCTL return string to user space
533  */
534 static int drm_copy_field(char __user *buf, size_t *buf_len, const char *value)
535 {
536 	int len;
537 
538 	/* don't overflow userbuf */
539 	len = strlen(value);
540 	if (len > *buf_len)
541 		len = *buf_len;
542 
543 	/* let userspace know exact length of driver value (which could be
544 	 * larger than the userspace-supplied buffer) */
545 	*buf_len = strlen(value);
546 
547 	/* finally, try filling in the userbuf */
548 	if (len && buf)
549 		if (copy_to_user(buf, value, len))
550 			return -EFAULT;
551 	return 0;
552 }
553 
554 /**
555  * Get version information
556  *
557  * \param inode device inode.
558  * \param filp file pointer.
559  * \param cmd command.
560  * \param arg user argument, pointing to a drm_version structure.
561  * \return zero on success or negative number on failure.
562  *
563  * Fills in the version information in \p arg.
564  */
565 static int drm_version(struct drm_device *dev, void *data,
566 		       struct drm_file *file_priv)
567 {
568 	struct drm_version *version = data;
569 	int err;
570 
571 	version->version_major = dev->driver->major;
572 	version->version_minor = dev->driver->minor;
573 	version->version_patchlevel = dev->driver->patchlevel;
574 	err = drm_copy_field(version->name, &version->name_len,
575 			dev->driver->name);
576 	if (!err)
577 		err = drm_copy_field(version->date, &version->date_len,
578 				dev->driver->date);
579 	if (!err)
580 		err = drm_copy_field(version->desc, &version->desc_len,
581 				dev->driver->desc);
582 
583 	return err;
584 }
585 
586 /**
587  * drm_ioctl_permit - Check ioctl permissions against caller
588  *
589  * @flags: ioctl permission flags.
590  * @file_priv: Pointer to struct drm_file identifying the caller.
591  *
592  * Checks whether the caller is allowed to run an ioctl with the
593  * indicated permissions. If so, returns zero. Otherwise returns an
594  * error code suitable for ioctl return.
595  */
596 #if 0
597 static int drm_ioctl_permit(u32 flags, struct drm_file *file_priv)
598 {
599 	/* ROOT_ONLY is only for CAP_SYS_ADMIN */
600 	if (unlikely((flags & DRM_ROOT_ONLY) && !capable(CAP_SYS_ADMIN)))
601 		return -EACCES;
602 
603 	/* AUTH is only for authenticated or render client */
604 	if (unlikely((flags & DRM_AUTH) && !drm_is_render_client(file_priv) &&
605 		     !file_priv->authenticated))
606 		return -EACCES;
607 
608 	/* MASTER is only for master or control clients */
609 	if (unlikely((flags & DRM_MASTER) && !file_priv->is_master &&
610 		     !drm_is_control_client(file_priv)))
611 		return -EACCES;
612 
613 	/* Control clients must be explicitly allowed */
614 	if (unlikely(!(flags & DRM_CONTROL_ALLOW) &&
615 		     drm_is_control_client(file_priv)))
616 		return -EACCES;
617 
618 	/* Render clients must be explicitly allowed */
619 	if (unlikely(!(flags & DRM_RENDER_ALLOW) &&
620 		     drm_is_render_client(file_priv)))
621 		return -EACCES;
622 
623 	return 0;
624 }
625 #endif
626 
627 /**
628  * Called whenever a process performs an ioctl on /dev/drm.
629  *
630  * \param inode device inode.
631  * \param file_priv DRM file private.
632  * \param cmd command.
633  * \param arg user argument.
634  * \return zero on success or negative number on failure.
635  *
636  * Looks up the ioctl function in the ::ioctls table, checking for root
637  * previleges if so required, and dispatches to the respective function.
638  */
639 int drm_ioctl(struct dev_ioctl_args *ap)
640 {
641 	struct cdev *kdev = ap->a_head.a_dev;
642 	struct drm_device *dev;
643 	const struct drm_ioctl_desc *ioctl = NULL;
644 	u_long cmd = ap->a_cmd;
645 	unsigned int nr = DRM_IOCTL_NR(cmd);
646 	int retcode = 0;
647 	caddr_t data = ap->a_data;
648 	int (*func)(struct drm_device *dev, void *data, struct drm_file *file_priv);
649 	int is_driver_ioctl = 0;
650 	struct drm_file *file_priv;
651 
652 	dev = drm_get_device_from_kdev(kdev);
653 
654 	retcode = devfs_get_cdevpriv(ap->a_fp, (void **)&file_priv);
655 	if (retcode !=0) {
656 		DRM_ERROR("can't find authenticator\n");
657 		return EINVAL;
658 	}
659 
660 	atomic_inc(&dev->counts[_DRM_STAT_IOCTLS]);
661 
662 	if (drm_device_is_unplugged(dev))
663 		return ENODEV;
664 
665 	if (IOCGROUP(cmd) != DRM_IOCTL_BASE) {
666 		DRM_DEBUG("Bad ioctl group 0x%x\n", (int)IOCGROUP(cmd));
667 		return EINVAL;
668 	}
669 
670 	ioctl = &drm_ioctls[nr];
671 	/* It's not a core DRM ioctl, try driver-specific. */
672 	if (ioctl->func == NULL && nr >= DRM_COMMAND_BASE) {
673 		/* The array entries begin at DRM_COMMAND_BASE ioctl nr */
674 		nr -= DRM_COMMAND_BASE;
675 		if (nr >= dev->driver->num_ioctls) {
676 			return EINVAL;
677 		}
678 		ioctl = &dev->driver->ioctls[nr];
679 		is_driver_ioctl = 1;
680 	}
681 
682 	DRM_DEBUG_VERBOSE("pid=%d, cmd=0x%02lx, nr=0x%02x, dev 0x%lx, auth=%d\n",
683 	    DRM_CURRENTPID, cmd, nr, (long)dev->dev,
684 	    file_priv->authenticated);
685 
686 	/* Do not trust userspace, use our own definition */
687 	func = ioctl->func;
688 
689 	if (func == NULL) {
690 		DRM_DEBUG("no function\n");
691 		return EINVAL;
692 	}
693 
694 	if (((ioctl->flags & DRM_ROOT_ONLY) && !capable(CAP_SYS_ADMIN)) ||
695 	    ((ioctl->flags & DRM_AUTH) && !file_priv->authenticated) ||
696 	    ((ioctl->flags & DRM_MASTER) && !file_priv->master))
697 		return EACCES;
698 
699 	if (is_driver_ioctl) {
700 		if ((ioctl->flags & DRM_UNLOCKED) == 0)
701 			mutex_lock(&drm_global_mutex);
702 		/* shared code returns -errno */
703 		retcode = -func(dev, data, file_priv);
704 		if (retcode == ERESTARTSYS)
705 			retcode = EINTR;
706 		if ((ioctl->flags & DRM_UNLOCKED) == 0)
707 			mutex_unlock(&drm_global_mutex);
708 	} else {
709 		retcode = -func(dev, data, file_priv);
710 		if (retcode == ERESTARTSYS)
711 			retcode = EINTR;
712 	}
713 
714 	if (!ioctl)
715 		DRM_DEBUG("invalid ioctl: pid=%d, dev=0x%lx, auth=%d, cmd=0x%02lx, nr=0x%02x\n",
716 			  DRM_CURRENTPID,
717 			  (long)dev->dev,
718 			  file_priv->authenticated, cmd, nr);
719 
720 	if (retcode)
721 		DRM_DEBUG("ret = %d\n", retcode);
722 	return retcode;
723 }
724 
725 /**
726  * drm_ioctl_flags - Check for core ioctl and return ioctl permission flags
727  *
728  * @nr: Ioctl number.
729  * @flags: Where to return the ioctl permission flags
730  */
731 bool drm_ioctl_flags(unsigned int nr, unsigned int *flags)
732 {
733 	if ((nr >= DRM_COMMAND_END && nr < DRM_CORE_IOCTL_COUNT) ||
734 	    (nr < DRM_COMMAND_BASE)) {
735 		*flags = drm_ioctls[nr].flags;
736 		return true;
737 	}
738 
739 	return false;
740 }
741 EXPORT_SYMBOL(drm_ioctl_flags);
742