2005-04-17 06:20:36 +08:00
|
|
|
/**
|
2005-09-25 12:28:13 +08:00
|
|
|
* \file drm_fops.c
|
2005-04-17 06:20:36 +08:00
|
|
|
* File operations for DRM
|
2005-09-25 12:28:13 +08:00
|
|
|
*
|
2005-04-17 06:20:36 +08:00
|
|
|
* \author Rickard E. (Rik) Faith <faith@valinux.com>
|
|
|
|
* \author Daryll Strauss <daryll@valinux.com>
|
|
|
|
* \author Gareth Hughes <gareth@valinux.com>
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Created: Mon Jan 4 08:58:31 1999 by faith@valinux.com
|
|
|
|
*
|
|
|
|
* Copyright 1999 Precision Insight, Inc., Cedar Park, Texas.
|
|
|
|
* Copyright 2000 VA Linux Systems, Inc., Sunnyvale, California.
|
|
|
|
* All Rights Reserved.
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a
|
|
|
|
* copy of this software and associated documentation files (the "Software"),
|
|
|
|
* to deal in the Software without restriction, including without limitation
|
|
|
|
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
|
|
|
* and/or sell copies of the Software, and to permit persons to whom the
|
|
|
|
* Software is furnished to do so, subject to the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice (including the next
|
|
|
|
* paragraph) shall be included in all copies or substantial portions of the
|
|
|
|
* Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
|
|
|
* VA LINUX SYSTEMS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
|
|
|
|
* OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
|
|
|
|
* ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
|
|
|
|
* OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
2012-10-03 01:01:07 +08:00
|
|
|
#include <drm/drmP.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/poll.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 16:04:11 +08:00
|
|
|
#include <linux/slab.h>
|
2011-08-30 23:04:30 +08:00
|
|
|
#include <linux/module.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2010-07-11 05:51:39 +08:00
|
|
|
/* from BKL pushdown: note that nothing else serializes idr_find() */
|
|
|
|
DEFINE_MUTEX(drm_global_mutex);
|
2010-08-26 12:58:57 +08:00
|
|
|
EXPORT_SYMBOL(drm_global_mutex);
|
2010-07-11 05:51:39 +08:00
|
|
|
|
2005-09-25 12:28:13 +08:00
|
|
|
static int drm_open_helper(struct inode *inode, struct file *filp,
|
2014-01-29 17:18:02 +08:00
|
|
|
struct drm_minor *minor);
|
2005-07-07 19:03:38 +08:00
|
|
|
|
2007-07-11 13:53:27 +08:00
|
|
|
static int drm_setup(struct drm_device * dev)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
2013-08-08 21:41:15 +08:00
|
|
|
if (dev->driver->firstopen &&
|
|
|
|
!drm_core_check_feature(dev, DRIVER_MODESET)) {
|
2005-11-10 19:16:34 +08:00
|
|
|
ret = dev->driver->firstopen(dev);
|
2005-09-25 12:28:13 +08:00
|
|
|
if (ret != 0)
|
2005-04-17 06:20:36 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-08-08 21:41:35 +08:00
|
|
|
ret = drm_legacy_dma_setup(dev);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
|
2005-09-25 12:28:13 +08:00
|
|
|
DRM_DEBUG("\n");
|
2005-04-17 06:20:36 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Open file.
|
2005-09-25 12:28:13 +08:00
|
|
|
*
|
2005-04-17 06:20:36 +08:00
|
|
|
* \param inode device inode
|
|
|
|
* \param filp file pointer.
|
|
|
|
* \return zero on success or a negative number on failure.
|
|
|
|
*
|
|
|
|
* Searches the DRM device with the same minor number, calls open_helper(), and
|
|
|
|
* increments the device open count. If the open count was previous at zero,
|
|
|
|
* i.e., it's the first that the device is open, then calls setup().
|
|
|
|
*/
|
2005-09-25 12:28:13 +08:00
|
|
|
int drm_open(struct inode *inode, struct file *filp)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2014-01-29 17:49:19 +08:00
|
|
|
struct drm_device *dev;
|
2008-04-21 14:47:32 +08:00
|
|
|
struct drm_minor *minor;
|
2014-01-29 17:49:19 +08:00
|
|
|
int retcode;
|
2012-10-30 01:35:01 +08:00
|
|
|
int need_setup = 0;
|
|
|
|
struct address_space *old_mapping;
|
2013-04-02 21:56:10 +08:00
|
|
|
struct address_space *old_imapping;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-01-29 17:49:19 +08:00
|
|
|
minor = drm_minor_acquire(iminor(inode));
|
|
|
|
if (IS_ERR(minor))
|
|
|
|
return PTR_ERR(minor);
|
2005-09-25 12:28:13 +08:00
|
|
|
|
2014-01-29 17:49:19 +08:00
|
|
|
dev = minor->dev;
|
|
|
|
if (drm_device_is_unplugged(dev)) {
|
|
|
|
retcode = -ENODEV;
|
|
|
|
goto err_release;
|
|
|
|
}
|
2012-02-20 22:18:07 +08:00
|
|
|
|
2012-10-30 01:35:01 +08:00
|
|
|
if (!dev->open_count++)
|
|
|
|
need_setup = 1;
|
|
|
|
mutex_lock(&dev->struct_mutex);
|
2013-04-02 21:56:10 +08:00
|
|
|
old_imapping = inode->i_mapping;
|
2012-10-30 01:35:01 +08:00
|
|
|
old_mapping = dev->dev_mapping;
|
|
|
|
if (old_mapping == NULL)
|
|
|
|
dev->dev_mapping = &inode->i_data;
|
|
|
|
/* ihold ensures nobody can remove inode with our i_data */
|
|
|
|
ihold(container_of(dev->dev_mapping, struct inode, i_data));
|
|
|
|
inode->i_mapping = dev->dev_mapping;
|
|
|
|
filp->f_mapping = dev->dev_mapping;
|
|
|
|
mutex_unlock(&dev->struct_mutex);
|
|
|
|
|
2014-01-29 17:18:02 +08:00
|
|
|
retcode = drm_open_helper(inode, filp, minor);
|
2012-10-30 01:35:01 +08:00
|
|
|
if (retcode)
|
|
|
|
goto err_undo;
|
|
|
|
if (need_setup) {
|
|
|
|
retcode = drm_setup(dev);
|
|
|
|
if (retcode)
|
|
|
|
goto err_undo;
|
2008-11-08 06:05:41 +08:00
|
|
|
}
|
2012-10-30 01:35:01 +08:00
|
|
|
return 0;
|
2008-11-06 02:31:53 +08:00
|
|
|
|
2012-10-30 01:35:01 +08:00
|
|
|
err_undo:
|
|
|
|
mutex_lock(&dev->struct_mutex);
|
2013-04-02 21:56:10 +08:00
|
|
|
filp->f_mapping = old_imapping;
|
|
|
|
inode->i_mapping = old_imapping;
|
2012-10-30 01:35:01 +08:00
|
|
|
iput(container_of(dev->dev_mapping, struct inode, i_data));
|
|
|
|
dev->dev_mapping = old_mapping;
|
|
|
|
mutex_unlock(&dev->struct_mutex);
|
|
|
|
dev->open_count--;
|
2014-01-29 17:49:19 +08:00
|
|
|
err_release:
|
|
|
|
drm_minor_release(minor);
|
2005-04-17 06:20:36 +08:00
|
|
|
return retcode;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(drm_open);
|
|
|
|
|
2006-01-02 18:32:48 +08:00
|
|
|
/**
|
|
|
|
* File \c open operation.
|
|
|
|
*
|
|
|
|
* \param inode device inode.
|
|
|
|
* \param filp file pointer.
|
|
|
|
*
|
|
|
|
* Puts the dev->fops corresponding to the device minor number into
|
|
|
|
* \p filp, call the \c open method, and restore the file operations.
|
|
|
|
*/
|
|
|
|
int drm_stub_open(struct inode *inode, struct file *filp)
|
|
|
|
{
|
2014-01-29 17:49:19 +08:00
|
|
|
struct drm_device *dev;
|
2008-04-21 14:47:32 +08:00
|
|
|
struct drm_minor *minor;
|
2006-01-02 18:32:48 +08:00
|
|
|
int err = -ENODEV;
|
2013-09-23 02:17:15 +08:00
|
|
|
const struct file_operations *new_fops;
|
2006-01-02 18:32:48 +08:00
|
|
|
|
|
|
|
DRM_DEBUG("\n");
|
|
|
|
|
2010-07-11 05:51:39 +08:00
|
|
|
mutex_lock(&drm_global_mutex);
|
2014-01-29 17:49:19 +08:00
|
|
|
minor = drm_minor_acquire(iminor(inode));
|
|
|
|
if (IS_ERR(minor))
|
|
|
|
goto out_unlock;
|
2006-01-02 18:32:48 +08:00
|
|
|
|
2014-01-29 17:49:19 +08:00
|
|
|
dev = minor->dev;
|
2012-02-20 22:18:07 +08:00
|
|
|
if (drm_device_is_unplugged(dev))
|
2014-01-29 17:49:19 +08:00
|
|
|
goto out_release;
|
2012-02-20 22:18:07 +08:00
|
|
|
|
2013-09-23 02:17:15 +08:00
|
|
|
new_fops = fops_get(dev->driver->fops);
|
|
|
|
if (!new_fops)
|
2014-01-29 17:49:19 +08:00
|
|
|
goto out_release;
|
2006-01-02 18:32:48 +08:00
|
|
|
|
2013-09-23 02:17:15 +08:00
|
|
|
replace_fops(filp, new_fops);
|
|
|
|
if (filp->f_op->open)
|
|
|
|
err = filp->f_op->open(inode, filp);
|
2014-01-29 17:49:19 +08:00
|
|
|
|
|
|
|
out_release:
|
|
|
|
drm_minor_release(minor);
|
|
|
|
out_unlock:
|
2010-07-11 05:51:39 +08:00
|
|
|
mutex_unlock(&drm_global_mutex);
|
2006-01-02 18:32:48 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check whether DRI will run on this CPU.
|
|
|
|
*
|
|
|
|
* \return non-zero if the DRI will run on this CPU, or zero otherwise.
|
|
|
|
*/
|
|
|
|
static int drm_cpu_valid(void)
|
|
|
|
{
|
|
|
|
#if defined(__i386__)
|
|
|
|
if (boot_cpu_data.x86 == 3)
|
|
|
|
return 0; /* No cmpxchg on a 386 */
|
|
|
|
#endif
|
|
|
|
#if defined(__sparc__) && !defined(__sparc_v9__)
|
|
|
|
return 0; /* No cmpxchg before v9 sparc. */
|
|
|
|
#endif
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Called whenever a process opens /dev/drm.
|
|
|
|
*
|
|
|
|
* \param inode device inode.
|
|
|
|
* \param filp file pointer.
|
2014-01-29 17:18:02 +08:00
|
|
|
* \param minor acquired minor-object.
|
2006-01-02 18:32:48 +08:00
|
|
|
* \return zero on success or a negative number on failure.
|
|
|
|
*
|
|
|
|
* Creates and initializes a drm_file structure for the file private data in \p
|
|
|
|
* filp and add it into the double linked list in \p dev.
|
|
|
|
*/
|
|
|
|
static int drm_open_helper(struct inode *inode, struct file *filp,
|
2014-01-29 17:18:02 +08:00
|
|
|
struct drm_minor *minor)
|
2006-01-02 18:32:48 +08:00
|
|
|
{
|
2014-01-29 17:18:02 +08:00
|
|
|
struct drm_device *dev = minor->dev;
|
2007-07-11 13:53:27 +08:00
|
|
|
struct drm_file *priv;
|
2006-01-02 18:32:48 +08:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (filp->f_flags & O_EXCL)
|
|
|
|
return -EBUSY; /* No exclusive opens */
|
|
|
|
if (!drm_cpu_valid())
|
|
|
|
return -EINVAL;
|
2012-09-12 13:55:05 +08:00
|
|
|
if (dev->switch_power_state != DRM_SWITCH_POWER_ON && dev->switch_power_state != DRM_SWITCH_POWER_DYNAMIC_OFF)
|
2010-12-07 07:20:40 +08:00
|
|
|
return -EINVAL;
|
2006-01-02 18:32:48 +08:00
|
|
|
|
2014-01-29 17:18:02 +08:00
|
|
|
DRM_DEBUG("pid = %d, minor = %d\n", task_pid_nr(current), minor->index);
|
2006-01-02 18:32:48 +08:00
|
|
|
|
2010-05-14 03:58:56 +08:00
|
|
|
priv = kzalloc(sizeof(*priv), GFP_KERNEL);
|
2006-01-02 18:32:48 +08:00
|
|
|
if (!priv)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
filp->private_data = priv;
|
2007-08-25 18:23:09 +08:00
|
|
|
priv->filp = filp;
|
2008-09-02 09:03:14 +08:00
|
|
|
priv->uid = current_euid();
|
2012-02-08 08:47:26 +08:00
|
|
|
priv->pid = get_pid(task_pid(current));
|
2014-01-29 17:18:02 +08:00
|
|
|
priv->minor = minor;
|
2013-07-02 08:53:28 +08:00
|
|
|
|
2006-01-02 18:32:48 +08:00
|
|
|
/* for compatibility root is always authenticated */
|
2013-10-29 16:55:57 +08:00
|
|
|
priv->always_authenticated = capable(CAP_SYS_ADMIN);
|
|
|
|
priv->authenticated = priv->always_authenticated;
|
2006-01-02 18:32:48 +08:00
|
|
|
priv->lock_count = 0;
|
|
|
|
|
2007-05-26 03:01:51 +08:00
|
|
|
INIT_LIST_HEAD(&priv->lhead);
|
2008-11-08 06:05:41 +08:00
|
|
|
INIT_LIST_HEAD(&priv->fbs);
|
drm: revamp locking around fb creation/destruction
Well, at least step 1. The goal here is that framebuffer objects can
survive outside of the mode_config lock, with just a reference held
as protection. The first step to get there is to introduce a special
fb_lock which protects fb lookup, creation and destruction, to make
them appear atomic.
This new fb_lock can nest within the mode_config lock. But the idea is
(once the reference counting part is completed) that we only quickly
take that fb_lock to lookup a framebuffer and grab a reference,
without any other locks involved.
vmwgfx is the only driver which does framebuffer lookups itself, also
wrap those calls to drm_mode_object_find with the new lock.
Also protect the fb_list walking in i915 and omapdrm with the new lock.
As a slight complication there's also the list of user-created fbs
attached to the file private. The problem now is that at fclose() time
we need to walk that list, eventually do a modeset call to remove the
fb from active usage (and are required to be able to take the
mode_config lock), but in the end we need to grab the new fb_lock to
remove the fb from the list. The easiest solution is to add another
mutex to protect this per-file list.
Currently that new fbs_lock nests within the modeset locks and so
appears redudant. But later patches will switch around this sequence
so that taking the modeset locks in the fb destruction path is
optional in the fastpath. Ultimately the goal is that addfb and rmfb
do not require the mode_config lock, since otherwise they have the
potential to introduce stalls in the pageflip sequence of a compositor
(if the compositor e.g. switches to a fullscreen client or if it
enables a plane). But that requires a few more steps and hoops to jump
through.
Note that framebuffer creation/destruction is now double-protected -
once by the fb_lock and in parts by the idr_lock. The later would be
unnecessariy if framebuffers would have their own idr allocator. But
that's material for another patch (series).
v2: Properly initialize the fb->filp_head list in _init, otherwise the
newly added WARN to check whether the fb isn't on a fpriv list any
more will fail for driver-private objects.
v3: Fixup two error-case unlock bugs spotted by Richard Wilbur.
Reviewed-by: Rob Clark <rob@ti.com>
Signed-off-by: Daniel Vetter <daniel.vetter@ffwll.ch>
2012-12-11 04:19:18 +08:00
|
|
|
mutex_init(&priv->fbs_lock);
|
2009-09-12 02:33:34 +08:00
|
|
|
INIT_LIST_HEAD(&priv->event_list);
|
|
|
|
init_waitqueue_head(&priv->event_wait);
|
|
|
|
priv->event_space = 4096; /* set aside 4k for event buffer */
|
2007-05-26 03:01:51 +08:00
|
|
|
|
2008-07-31 03:06:12 +08:00
|
|
|
if (dev->driver->driver_features & DRIVER_GEM)
|
|
|
|
drm_gem_open(dev, priv);
|
|
|
|
|
2011-11-25 23:21:02 +08:00
|
|
|
if (drm_core_check_feature(dev, DRIVER_PRIME))
|
|
|
|
drm_prime_init_file_private(&priv->prime);
|
|
|
|
|
2006-01-02 18:32:48 +08:00
|
|
|
if (dev->driver->open) {
|
|
|
|
ret = dev->driver->open(dev, priv);
|
|
|
|
if (ret < 0)
|
2013-07-02 08:53:28 +08:00
|
|
|
goto out_prime_destroy;
|
2006-01-02 18:32:48 +08:00
|
|
|
}
|
|
|
|
|
drm: implement experimental render nodes
Render nodes provide an API for userspace to use non-privileged GPU
commands without any running DRM-Master. It is useful for offscreen
rendering, GPGPU clients, and normal render clients which do not perform
modesetting.
Compared to legacy clients, render clients no longer need any
authentication to perform client ioctls. Instead, user-space controls
render/client access to GPUs via filesystem access-modes on the
render-node. Once a render-node was opened, a client has full access to
the client/render operations on the GPU. However, no modesetting or ioctls
that affect global state are allowed on render nodes.
To prevent privilege-escalation, drivers must explicitly state that they
support render nodes. They must mark their render-only ioctls as
DRM_RENDER_ALLOW so render clients can use them. Furthermore, they must
support clients without any attached master.
If filesystem access-modes are not enough for fine-grained access control
to render nodes (very unlikely, considering the versaitlity of FS-ACLs),
you may still fall-back to fd-passing from server to client (which allows
arbitrary access-control). However, note that revoking access is
currently impossible and unlikely to get implemented.
Note: Render clients no longer have any associated DRM-Master as they are
supposed to be independent of any server state. DRM core highly depends on
file_priv->master to be non-NULL for modesetting/ctx/etc. commands.
Therefore, drivers must be very careful to not require DRM-Master if they
support DRIVER_RENDER.
So far render-nodes are protected by "drm_rnodes". As long as this
module-parameter is not set to 1, a driver will not create render nodes.
This allows us to experiment with the API a bit before we stabilize it.
v2: drop insecure GEM_FLINK to force use of dmabuf
Signed-off-by: David Herrmann <dh.herrmann@gmail.com>
Signed-off-by: Dave Airlie <airlied@redhat.com>
2013-08-26 00:29:00 +08:00
|
|
|
/* if there is no current master make this fd it, but do not create
|
|
|
|
* any master object for render clients */
|
2006-02-02 16:37:46 +08:00
|
|
|
mutex_lock(&dev->struct_mutex);
|
drm: implement experimental render nodes
Render nodes provide an API for userspace to use non-privileged GPU
commands without any running DRM-Master. It is useful for offscreen
rendering, GPGPU clients, and normal render clients which do not perform
modesetting.
Compared to legacy clients, render clients no longer need any
authentication to perform client ioctls. Instead, user-space controls
render/client access to GPUs via filesystem access-modes on the
render-node. Once a render-node was opened, a client has full access to
the client/render operations on the GPU. However, no modesetting or ioctls
that affect global state are allowed on render nodes.
To prevent privilege-escalation, drivers must explicitly state that they
support render nodes. They must mark their render-only ioctls as
DRM_RENDER_ALLOW so render clients can use them. Furthermore, they must
support clients without any attached master.
If filesystem access-modes are not enough for fine-grained access control
to render nodes (very unlikely, considering the versaitlity of FS-ACLs),
you may still fall-back to fd-passing from server to client (which allows
arbitrary access-control). However, note that revoking access is
currently impossible and unlikely to get implemented.
Note: Render clients no longer have any associated DRM-Master as they are
supposed to be independent of any server state. DRM core highly depends on
file_priv->master to be non-NULL for modesetting/ctx/etc. commands.
Therefore, drivers must be very careful to not require DRM-Master if they
support DRIVER_RENDER.
So far render-nodes are protected by "drm_rnodes". As long as this
module-parameter is not set to 1, a driver will not create render nodes.
This allows us to experiment with the API a bit before we stabilize it.
v2: drop insecure GEM_FLINK to force use of dmabuf
Signed-off-by: David Herrmann <dh.herrmann@gmail.com>
Signed-off-by: Dave Airlie <airlied@redhat.com>
2013-08-26 00:29:00 +08:00
|
|
|
if (!priv->minor->master && !drm_is_render_client(priv)) {
|
2008-11-28 12:22:24 +08:00
|
|
|
/* create a new master */
|
|
|
|
priv->minor->master = drm_master_create(priv->minor);
|
|
|
|
if (!priv->minor->master) {
|
2009-03-27 18:34:28 +08:00
|
|
|
mutex_unlock(&dev->struct_mutex);
|
2008-11-28 12:22:24 +08:00
|
|
|
ret = -ENOMEM;
|
2013-07-02 08:53:28 +08:00
|
|
|
goto out_close;
|
2008-11-28 12:22:24 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
priv->is_master = 1;
|
|
|
|
/* take another reference for the copy in the local file priv */
|
|
|
|
priv->master = drm_master_get(priv->minor->master);
|
|
|
|
|
|
|
|
priv->authenticated = 1;
|
|
|
|
|
|
|
|
mutex_unlock(&dev->struct_mutex);
|
|
|
|
if (dev->driver->master_create) {
|
|
|
|
ret = dev->driver->master_create(dev, priv->master);
|
|
|
|
if (ret) {
|
|
|
|
mutex_lock(&dev->struct_mutex);
|
|
|
|
/* drop both references if this fails */
|
|
|
|
drm_master_put(&priv->minor->master);
|
|
|
|
drm_master_put(&priv->master);
|
|
|
|
mutex_unlock(&dev->struct_mutex);
|
2013-07-02 08:53:28 +08:00
|
|
|
goto out_close;
|
2008-11-28 12:22:24 +08:00
|
|
|
}
|
|
|
|
}
|
2009-12-03 02:15:25 +08:00
|
|
|
mutex_lock(&dev->struct_mutex);
|
|
|
|
if (dev->driver->master_set) {
|
|
|
|
ret = dev->driver->master_set(dev, priv, true);
|
|
|
|
if (ret) {
|
|
|
|
/* drop both references if this fails */
|
|
|
|
drm_master_put(&priv->minor->master);
|
|
|
|
drm_master_put(&priv->master);
|
|
|
|
mutex_unlock(&dev->struct_mutex);
|
2013-07-02 08:53:28 +08:00
|
|
|
goto out_close;
|
2009-12-03 02:15:25 +08:00
|
|
|
}
|
|
|
|
}
|
drm: implement experimental render nodes
Render nodes provide an API for userspace to use non-privileged GPU
commands without any running DRM-Master. It is useful for offscreen
rendering, GPGPU clients, and normal render clients which do not perform
modesetting.
Compared to legacy clients, render clients no longer need any
authentication to perform client ioctls. Instead, user-space controls
render/client access to GPUs via filesystem access-modes on the
render-node. Once a render-node was opened, a client has full access to
the client/render operations on the GPU. However, no modesetting or ioctls
that affect global state are allowed on render nodes.
To prevent privilege-escalation, drivers must explicitly state that they
support render nodes. They must mark their render-only ioctls as
DRM_RENDER_ALLOW so render clients can use them. Furthermore, they must
support clients without any attached master.
If filesystem access-modes are not enough for fine-grained access control
to render nodes (very unlikely, considering the versaitlity of FS-ACLs),
you may still fall-back to fd-passing from server to client (which allows
arbitrary access-control). However, note that revoking access is
currently impossible and unlikely to get implemented.
Note: Render clients no longer have any associated DRM-Master as they are
supposed to be independent of any server state. DRM core highly depends on
file_priv->master to be non-NULL for modesetting/ctx/etc. commands.
Therefore, drivers must be very careful to not require DRM-Master if they
support DRIVER_RENDER.
So far render-nodes are protected by "drm_rnodes". As long as this
module-parameter is not set to 1, a driver will not create render nodes.
This allows us to experiment with the API a bit before we stabilize it.
v2: drop insecure GEM_FLINK to force use of dmabuf
Signed-off-by: David Herrmann <dh.herrmann@gmail.com>
Signed-off-by: Dave Airlie <airlied@redhat.com>
2013-08-26 00:29:00 +08:00
|
|
|
} else if (!drm_is_render_client(priv)) {
|
2008-11-28 12:22:24 +08:00
|
|
|
/* get a reference to the master */
|
|
|
|
priv->master = drm_master_get(priv->minor->master);
|
|
|
|
}
|
drm: implement experimental render nodes
Render nodes provide an API for userspace to use non-privileged GPU
commands without any running DRM-Master. It is useful for offscreen
rendering, GPGPU clients, and normal render clients which do not perform
modesetting.
Compared to legacy clients, render clients no longer need any
authentication to perform client ioctls. Instead, user-space controls
render/client access to GPUs via filesystem access-modes on the
render-node. Once a render-node was opened, a client has full access to
the client/render operations on the GPU. However, no modesetting or ioctls
that affect global state are allowed on render nodes.
To prevent privilege-escalation, drivers must explicitly state that they
support render nodes. They must mark their render-only ioctls as
DRM_RENDER_ALLOW so render clients can use them. Furthermore, they must
support clients without any attached master.
If filesystem access-modes are not enough for fine-grained access control
to render nodes (very unlikely, considering the versaitlity of FS-ACLs),
you may still fall-back to fd-passing from server to client (which allows
arbitrary access-control). However, note that revoking access is
currently impossible and unlikely to get implemented.
Note: Render clients no longer have any associated DRM-Master as they are
supposed to be independent of any server state. DRM core highly depends on
file_priv->master to be non-NULL for modesetting/ctx/etc. commands.
Therefore, drivers must be very careful to not require DRM-Master if they
support DRIVER_RENDER.
So far render-nodes are protected by "drm_rnodes". As long as this
module-parameter is not set to 1, a driver will not create render nodes.
This allows us to experiment with the API a bit before we stabilize it.
v2: drop insecure GEM_FLINK to force use of dmabuf
Signed-off-by: David Herrmann <dh.herrmann@gmail.com>
Signed-off-by: Dave Airlie <airlied@redhat.com>
2013-08-26 00:29:00 +08:00
|
|
|
mutex_unlock(&dev->struct_mutex);
|
2007-05-26 03:01:51 +08:00
|
|
|
|
2008-11-28 12:22:24 +08:00
|
|
|
mutex_lock(&dev->struct_mutex);
|
2007-05-26 03:01:51 +08:00
|
|
|
list_add(&priv->lhead, &dev->filelist);
|
2006-02-02 16:37:46 +08:00
|
|
|
mutex_unlock(&dev->struct_mutex);
|
2006-01-02 18:32:48 +08:00
|
|
|
|
|
|
|
#ifdef __alpha__
|
|
|
|
/*
|
|
|
|
* Default the hose
|
|
|
|
*/
|
|
|
|
if (!dev->hose) {
|
|
|
|
struct pci_dev *pci_dev;
|
|
|
|
pci_dev = pci_get_class(PCI_CLASS_DISPLAY_VGA << 8, NULL);
|
|
|
|
if (pci_dev) {
|
|
|
|
dev->hose = pci_dev->sysdata;
|
|
|
|
pci_dev_put(pci_dev);
|
|
|
|
}
|
|
|
|
if (!dev->hose) {
|
|
|
|
struct pci_bus *b = pci_bus_b(pci_root_buses.next);
|
|
|
|
if (b)
|
|
|
|
dev->hose = b->sysdata;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return 0;
|
2013-07-02 08:53:28 +08:00
|
|
|
|
|
|
|
out_close:
|
|
|
|
if (dev->driver->postclose)
|
|
|
|
dev->driver->postclose(dev, priv);
|
|
|
|
out_prime_destroy:
|
|
|
|
if (drm_core_check_feature(dev, DRIVER_PRIME))
|
|
|
|
drm_prime_destroy_file_private(&priv->prime);
|
|
|
|
if (dev->driver->driver_features & DRIVER_GEM)
|
|
|
|
drm_gem_release(dev, priv);
|
|
|
|
put_pid(priv->pid);
|
2009-03-25 03:23:04 +08:00
|
|
|
kfree(priv);
|
2006-01-02 18:32:48 +08:00
|
|
|
filp->private_data = NULL;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2008-11-28 12:22:24 +08:00
|
|
|
static void drm_master_release(struct drm_device *dev, struct file *filp)
|
|
|
|
{
|
|
|
|
struct drm_file *file_priv = filp->private_data;
|
|
|
|
|
|
|
|
if (drm_i_have_hw_lock(dev, file_priv)) {
|
|
|
|
DRM_DEBUG("File %p released, freeing lock for context %d\n",
|
|
|
|
filp, _DRM_LOCKING_CONTEXT(file_priv->master->lock.hw_lock->lock));
|
|
|
|
drm_lock_free(&file_priv->master->lock,
|
|
|
|
_DRM_LOCKING_CONTEXT(file_priv->master->lock.hw_lock->lock));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-09-12 02:33:34 +08:00
|
|
|
static void drm_events_release(struct drm_file *file_priv)
|
|
|
|
{
|
|
|
|
struct drm_device *dev = file_priv->minor->dev;
|
|
|
|
struct drm_pending_event *e, *et;
|
|
|
|
struct drm_pending_vblank_event *v, *vt;
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&dev->event_lock, flags);
|
|
|
|
|
|
|
|
/* Remove pending flips */
|
|
|
|
list_for_each_entry_safe(v, vt, &dev->vblank_event_list, base.link)
|
|
|
|
if (v->base.file_priv == file_priv) {
|
|
|
|
list_del(&v->base.link);
|
|
|
|
drm_vblank_put(dev, v->pipe);
|
|
|
|
v->base.destroy(&v->base);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove unconsumed events */
|
2013-10-29 19:30:26 +08:00
|
|
|
list_for_each_entry_safe(e, et, &file_priv->event_list, link) {
|
|
|
|
list_del(&e->link);
|
2009-09-12 02:33:34 +08:00
|
|
|
e->destroy(e);
|
2013-10-29 19:30:26 +08:00
|
|
|
}
|
2009-09-12 02:33:34 +08:00
|
|
|
|
|
|
|
spin_unlock_irqrestore(&dev->event_lock, flags);
|
|
|
|
}
|
|
|
|
|
2013-10-02 17:23:36 +08:00
|
|
|
/**
|
|
|
|
* drm_legacy_dev_reinit
|
|
|
|
*
|
|
|
|
* Reinitializes a legacy/ums drm device in it's lastclose function.
|
|
|
|
*/
|
|
|
|
static void drm_legacy_dev_reinit(struct drm_device *dev)
|
|
|
|
{
|
|
|
|
if (drm_core_check_feature(dev, DRIVER_MODESET))
|
|
|
|
return;
|
|
|
|
|
|
|
|
dev->sigdata.lock = NULL;
|
|
|
|
|
|
|
|
dev->context_flag = 0;
|
|
|
|
dev->last_context = 0;
|
|
|
|
dev->if_version = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Take down the DRM device.
|
|
|
|
*
|
|
|
|
* \param dev DRM device structure.
|
|
|
|
*
|
|
|
|
* Frees every resource in \p dev.
|
|
|
|
*
|
|
|
|
* \sa drm_device
|
|
|
|
*/
|
|
|
|
int drm_lastclose(struct drm_device * dev)
|
|
|
|
{
|
|
|
|
struct drm_vma_entry *vma, *vma_temp;
|
|
|
|
|
|
|
|
DRM_DEBUG("\n");
|
|
|
|
|
|
|
|
if (dev->driver->lastclose)
|
|
|
|
dev->driver->lastclose(dev);
|
|
|
|
DRM_DEBUG("driver lastclose completed\n");
|
|
|
|
|
|
|
|
if (dev->irq_enabled && !drm_core_check_feature(dev, DRIVER_MODESET))
|
|
|
|
drm_irq_uninstall(dev);
|
|
|
|
|
|
|
|
mutex_lock(&dev->struct_mutex);
|
|
|
|
|
|
|
|
drm_agp_clear(dev);
|
|
|
|
|
|
|
|
drm_legacy_sg_cleanup(dev);
|
|
|
|
|
|
|
|
/* Clear vma list (only built for debugging) */
|
|
|
|
list_for_each_entry_safe(vma, vma_temp, &dev->vmalist, head) {
|
|
|
|
list_del(&vma->head);
|
|
|
|
kfree(vma);
|
|
|
|
}
|
|
|
|
|
|
|
|
drm_legacy_dma_takedown(dev);
|
|
|
|
|
|
|
|
dev->dev_mapping = NULL;
|
|
|
|
mutex_unlock(&dev->struct_mutex);
|
|
|
|
|
|
|
|
drm_legacy_dev_reinit(dev);
|
|
|
|
|
|
|
|
DRM_DEBUG("lastclose completed\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* Release file.
|
|
|
|
*
|
|
|
|
* \param inode device inode
|
2007-08-25 18:23:09 +08:00
|
|
|
* \param file_priv DRM file private.
|
2005-04-17 06:20:36 +08:00
|
|
|
* \return zero on success or a negative number on failure.
|
|
|
|
*
|
|
|
|
* If the hardware lock is held then free it, and take it again for the kernel
|
|
|
|
* context since it's necessary to reclaim buffers. Unlink the file private
|
|
|
|
* data from its list and free it. Decreases the open count and if it reaches
|
2005-11-10 19:16:34 +08:00
|
|
|
* zero calls drm_lastclose().
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
2005-09-25 12:28:13 +08:00
|
|
|
int drm_release(struct inode *inode, struct file *filp)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2007-08-25 18:23:09 +08:00
|
|
|
struct drm_file *file_priv = filp->private_data;
|
2014-01-29 17:49:19 +08:00
|
|
|
struct drm_minor *minor = file_priv->minor;
|
|
|
|
struct drm_device *dev = minor->dev;
|
2005-04-17 06:20:36 +08:00
|
|
|
int retcode = 0;
|
|
|
|
|
2010-07-11 05:51:39 +08:00
|
|
|
mutex_lock(&drm_global_mutex);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2005-09-25 12:28:13 +08:00
|
|
|
DRM_DEBUG("open_count = %d\n", dev->open_count);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2005-11-10 19:16:34 +08:00
|
|
|
if (dev->driver->preclose)
|
2007-08-25 18:23:09 +08:00
|
|
|
dev->driver->preclose(dev, file_priv);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* ========================================================
|
|
|
|
* Begin inline drm_release
|
|
|
|
*/
|
|
|
|
|
2005-09-25 12:28:13 +08:00
|
|
|
DRM_DEBUG("pid = %d, device = 0x%lx, open_count = %d\n",
|
2007-10-19 14:40:40 +08:00
|
|
|
task_pid_nr(current),
|
2014-01-29 20:12:31 +08:00
|
|
|
(long)old_encode_dev(file_priv->minor->kdev->devt),
|
2005-09-25 12:28:13 +08:00
|
|
|
dev->open_count);
|
|
|
|
|
2012-01-25 01:54:21 +08:00
|
|
|
/* Release any auth tokens that might point to this file_priv,
|
|
|
|
(do that under the drm_global_mutex) */
|
|
|
|
if (file_priv->magic)
|
|
|
|
(void) drm_remove_magic(file_priv->master, file_priv->magic);
|
|
|
|
|
2008-11-28 12:22:24 +08:00
|
|
|
/* if the master has gone away we can't do anything with the lock */
|
|
|
|
if (file_priv->minor->master)
|
|
|
|
drm_master_release(dev, filp);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2011-10-26 06:31:26 +08:00
|
|
|
if (drm_core_check_feature(dev, DRIVER_HAVE_DMA))
|
|
|
|
drm_core_reclaim_buffers(dev, file_priv);
|
|
|
|
|
2009-09-12 02:33:34 +08:00
|
|
|
drm_events_release(file_priv);
|
|
|
|
|
2009-02-13 03:37:56 +08:00
|
|
|
if (dev->driver->driver_features & DRIVER_MODESET)
|
|
|
|
drm_fb_release(file_priv);
|
|
|
|
|
2012-04-14 19:52:13 +08:00
|
|
|
if (dev->driver->driver_features & DRIVER_GEM)
|
|
|
|
drm_gem_release(dev, file_priv);
|
|
|
|
|
2013-09-20 06:32:59 +08:00
|
|
|
mutex_lock(&dev->ctxlist_mutex);
|
|
|
|
if (!list_empty(&dev->ctxlist)) {
|
|
|
|
struct drm_ctx_list *pos, *n;
|
|
|
|
|
|
|
|
list_for_each_entry_safe(pos, n, &dev->ctxlist, head) {
|
|
|
|
if (pos->tag == file_priv &&
|
|
|
|
pos->handle != DRM_KERNEL_CONTEXT) {
|
|
|
|
if (dev->driver->context_dtor)
|
|
|
|
dev->driver->context_dtor(dev,
|
|
|
|
pos->handle);
|
|
|
|
|
|
|
|
drm_ctxbitmap_free(dev, pos->handle);
|
|
|
|
|
|
|
|
list_del(&pos->head);
|
|
|
|
kfree(pos);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
mutex_unlock(&dev->ctxlist_mutex);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-02-02 16:37:46 +08:00
|
|
|
mutex_lock(&dev->struct_mutex);
|
2008-11-28 12:22:24 +08:00
|
|
|
|
|
|
|
if (file_priv->is_master) {
|
2009-03-02 18:10:56 +08:00
|
|
|
struct drm_master *master = file_priv->master;
|
2007-07-11 13:53:27 +08:00
|
|
|
struct drm_file *temp;
|
2008-11-28 12:22:24 +08:00
|
|
|
list_for_each_entry(temp, &dev->filelist, lhead) {
|
|
|
|
if ((temp->master == file_priv->master) &&
|
|
|
|
(temp != file_priv))
|
2013-10-29 16:55:57 +08:00
|
|
|
temp->authenticated = temp->always_authenticated;
|
2008-11-28 12:22:24 +08:00
|
|
|
}
|
2007-05-26 03:01:51 +08:00
|
|
|
|
2009-03-02 18:10:56 +08:00
|
|
|
/**
|
|
|
|
* Since the master is disappearing, so is the
|
|
|
|
* possibility to lock.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (master->lock.hw_lock) {
|
|
|
|
if (dev->sigdata.lock == master->lock.hw_lock)
|
|
|
|
dev->sigdata.lock = NULL;
|
|
|
|
master->lock.hw_lock = NULL;
|
|
|
|
master->lock.file_priv = NULL;
|
|
|
|
wake_up_interruptible_all(&master->lock.lock_queue);
|
|
|
|
}
|
|
|
|
|
2008-11-28 12:22:24 +08:00
|
|
|
if (file_priv->minor->master == file_priv->master) {
|
|
|
|
/* drop the reference held my the minor */
|
2009-12-03 02:15:25 +08:00
|
|
|
if (dev->driver->master_drop)
|
|
|
|
dev->driver->master_drop(dev, file_priv, true);
|
2008-11-28 12:22:24 +08:00
|
|
|
drm_master_put(&file_priv->minor->master);
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2008-11-28 12:22:24 +08:00
|
|
|
|
2012-05-16 04:40:10 +08:00
|
|
|
BUG_ON(dev->dev_mapping == NULL);
|
|
|
|
iput(container_of(dev->dev_mapping, struct inode, i_data));
|
|
|
|
|
2008-11-28 12:22:24 +08:00
|
|
|
/* drop the reference held my the file priv */
|
drm: implement experimental render nodes
Render nodes provide an API for userspace to use non-privileged GPU
commands without any running DRM-Master. It is useful for offscreen
rendering, GPGPU clients, and normal render clients which do not perform
modesetting.
Compared to legacy clients, render clients no longer need any
authentication to perform client ioctls. Instead, user-space controls
render/client access to GPUs via filesystem access-modes on the
render-node. Once a render-node was opened, a client has full access to
the client/render operations on the GPU. However, no modesetting or ioctls
that affect global state are allowed on render nodes.
To prevent privilege-escalation, drivers must explicitly state that they
support render nodes. They must mark their render-only ioctls as
DRM_RENDER_ALLOW so render clients can use them. Furthermore, they must
support clients without any attached master.
If filesystem access-modes are not enough for fine-grained access control
to render nodes (very unlikely, considering the versaitlity of FS-ACLs),
you may still fall-back to fd-passing from server to client (which allows
arbitrary access-control). However, note that revoking access is
currently impossible and unlikely to get implemented.
Note: Render clients no longer have any associated DRM-Master as they are
supposed to be independent of any server state. DRM core highly depends on
file_priv->master to be non-NULL for modesetting/ctx/etc. commands.
Therefore, drivers must be very careful to not require DRM-Master if they
support DRIVER_RENDER.
So far render-nodes are protected by "drm_rnodes". As long as this
module-parameter is not set to 1, a driver will not create render nodes.
This allows us to experiment with the API a bit before we stabilize it.
v2: drop insecure GEM_FLINK to force use of dmabuf
Signed-off-by: David Herrmann <dh.herrmann@gmail.com>
Signed-off-by: Dave Airlie <airlied@redhat.com>
2013-08-26 00:29:00 +08:00
|
|
|
if (file_priv->master)
|
|
|
|
drm_master_put(&file_priv->master);
|
2008-11-28 12:22:24 +08:00
|
|
|
file_priv->is_master = 0;
|
2007-08-25 18:23:09 +08:00
|
|
|
list_del(&file_priv->lhead);
|
2006-02-02 16:37:46 +08:00
|
|
|
mutex_unlock(&dev->struct_mutex);
|
2005-09-25 12:28:13 +08:00
|
|
|
|
2005-11-10 19:16:34 +08:00
|
|
|
if (dev->driver->postclose)
|
2007-08-25 18:23:09 +08:00
|
|
|
dev->driver->postclose(dev, file_priv);
|
2011-11-25 23:21:02 +08:00
|
|
|
|
2013-08-15 06:02:46 +08:00
|
|
|
|
2011-11-25 23:21:02 +08:00
|
|
|
if (drm_core_check_feature(dev, DRIVER_PRIME))
|
|
|
|
drm_prime_destroy_file_private(&file_priv->prime);
|
|
|
|
|
2012-02-08 08:47:26 +08:00
|
|
|
put_pid(file_priv->pid);
|
2009-03-25 03:23:04 +08:00
|
|
|
kfree(file_priv);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/* ========================================================
|
|
|
|
* End inline drm_release
|
|
|
|
*/
|
|
|
|
|
2005-09-25 12:28:13 +08:00
|
|
|
if (!--dev->open_count) {
|
2013-12-11 18:35:08 +08:00
|
|
|
retcode = drm_lastclose(dev);
|
2012-02-20 22:18:07 +08:00
|
|
|
if (drm_device_is_unplugged(dev))
|
|
|
|
drm_put_dev(dev);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2010-07-11 05:51:39 +08:00
|
|
|
mutex_unlock(&drm_global_mutex);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-01-29 17:49:19 +08:00
|
|
|
drm_minor_release(minor);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
return retcode;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(drm_release);
|
|
|
|
|
2009-09-12 02:33:34 +08:00
|
|
|
static bool
|
|
|
|
drm_dequeue_event(struct drm_file *file_priv,
|
|
|
|
size_t total, size_t max, struct drm_pending_event **out)
|
|
|
|
{
|
|
|
|
struct drm_device *dev = file_priv->minor->dev;
|
|
|
|
struct drm_pending_event *e;
|
|
|
|
unsigned long flags;
|
|
|
|
bool ret = false;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&dev->event_lock, flags);
|
|
|
|
|
|
|
|
*out = NULL;
|
|
|
|
if (list_empty(&file_priv->event_list))
|
|
|
|
goto out;
|
|
|
|
e = list_first_entry(&file_priv->event_list,
|
|
|
|
struct drm_pending_event, link);
|
|
|
|
if (e->event->length + total > max)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
file_priv->event_space += e->event->length;
|
|
|
|
list_del(&e->link);
|
|
|
|
*out = e;
|
|
|
|
ret = true;
|
|
|
|
|
|
|
|
out:
|
|
|
|
spin_unlock_irqrestore(&dev->event_lock, flags);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t drm_read(struct file *filp, char __user *buffer,
|
|
|
|
size_t count, loff_t *offset)
|
|
|
|
{
|
|
|
|
struct drm_file *file_priv = filp->private_data;
|
|
|
|
struct drm_pending_event *e;
|
|
|
|
size_t total;
|
|
|
|
ssize_t ret;
|
|
|
|
|
|
|
|
ret = wait_event_interruptible(file_priv->event_wait,
|
|
|
|
!list_empty(&file_priv->event_list));
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
total = 0;
|
|
|
|
while (drm_dequeue_event(file_priv, total, count, &e)) {
|
|
|
|
if (copy_to_user(buffer + total,
|
|
|
|
e->event, e->event->length)) {
|
|
|
|
total = -EFAULT;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
total += e->event->length;
|
|
|
|
e->destroy(e);
|
|
|
|
}
|
|
|
|
|
|
|
|
return total;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(drm_read);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
unsigned int drm_poll(struct file *filp, struct poll_table_struct *wait)
|
|
|
|
{
|
2009-09-12 02:33:34 +08:00
|
|
|
struct drm_file *file_priv = filp->private_data;
|
|
|
|
unsigned int mask = 0;
|
|
|
|
|
|
|
|
poll_wait(filp, &file_priv->event_wait, wait);
|
|
|
|
|
|
|
|
if (!list_empty(&file_priv->event_list))
|
|
|
|
mask |= POLLIN | POLLRDNORM;
|
|
|
|
|
|
|
|
return mask;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2005-09-25 12:28:13 +08:00
|
|
|
EXPORT_SYMBOL(drm_poll);
|