static int pci_ioctl(dev_t dev, int cmd, intptr_t arg, int mode, cred_t *credp, int *rvalp) { pci_t *pci_p; dev_info_t *dip; minor_t minor = getminor(dev); int rv = ENOTTY; pci_p = DEV_TO_SOFTSTATE(dev); if (pci_p == NULL) return (ENXIO); dip = pci_p->pci_dip; DEBUG2(DBG_IOCTL, dip, "dev=%x: cmd=%x\n", dev, cmd); #ifdef PCI_DMA_TEST if (IS_DMATEST(cmd)) { *rvalp = pci_dma_test(cmd, dip, pci_p, arg); return (0); } #endif switch (PCIHP_AP_MINOR_NUM_TO_PCI_DEVNUM(minor)) { case PCI_TOOL_REG_MINOR_NUM: switch (cmd) { case PCITOOL_DEVICE_SET_REG: case PCITOOL_DEVICE_GET_REG: /* Require full privileges. */ if (secpolicy_kmdb(credp)) rv = EPERM; else rv = pcitool_dev_reg_ops( dev, (void *)arg, cmd, mode); break; case PCITOOL_NEXUS_SET_REG: case PCITOOL_NEXUS_GET_REG: /* Require full privileges. */ if (secpolicy_kmdb(credp)) rv = EPERM; else rv = pcitool_bus_reg_ops( dev, (void *)arg, cmd, mode); break; } break; case PCI_TOOL_INTR_MINOR_NUM: switch (cmd) { case PCITOOL_DEVICE_SET_INTR: /* Require PRIV_SYS_RES_CONFIG, same as psradm */ if (secpolicy_ponline(credp)) { rv = EPERM; break; } /*FALLTHRU*/ /* These require no special privileges. */ case PCITOOL_DEVICE_GET_INTR: case PCITOOL_DEVICE_NUM_INTR: rv = pcitool_intr_admn(dev, (void *)arg, cmd, mode); break; } break; /* * All non-PCItool ioctls go through here, including: * devctl ioctls with minor number PCIHP_DEVCTL_MINOR and * those for attachment points with where minor number is the * device number. */ default: if (pci_p->hotplug_capable == B_TRUE) rv = pcihp_ops->cb_ioctl( dev, cmd, arg, mode, credp, rvalp); else rv = pci_devctl_ioctl( dip, cmd, arg, mode, credp, rvalp); break; } return (rv); }
/* ARGSUSED */ static int px_ioctl(dev_t dev, int cmd, intptr_t arg, int mode, cred_t *credp, int *rvalp) { px_t *px_p = PX_DEV_TO_SOFTSTATE(dev); int minor = getminor(dev); dev_info_t *dip; int rv = ENOTTY; if (px_p == NULL) return (ENXIO); dip = px_p->px_dip; DBG(DBG_IOCTL, dip, "dev=%x: cmd=%x\n", dev, cmd); #ifdef PX_DMA_TEST if (IS_DMATEST(cmd)) { *rvalp = px_dma_test(cmd, dip, px_p, arg); return (0); } #endif /* PX_DMA_TEST */ switch (PCI_MINOR_NUM_TO_PCI_DEVNUM(minor)) { /* * PCI tools. */ case PCI_TOOL_REG_MINOR_NUM: switch (cmd) { case PCITOOL_DEVICE_SET_REG: case PCITOOL_DEVICE_GET_REG: /* Require full privileges. */ if (secpolicy_kmdb(credp)) rv = EPERM; else rv = pxtool_dev_reg_ops(dip, (void *)arg, cmd, mode); break; case PCITOOL_NEXUS_SET_REG: case PCITOOL_NEXUS_GET_REG: /* Require full privileges. */ if (secpolicy_kmdb(credp)) rv = EPERM; else rv = pxtool_bus_reg_ops(dip, (void *)arg, cmd, mode); break; default: rv = ENOTTY; } return (rv); case PCI_TOOL_INTR_MINOR_NUM: switch (cmd) { case PCITOOL_DEVICE_SET_INTR: /* Require full privileges. */ if (secpolicy_kmdb(credp)) { rv = EPERM; break; } /*FALLTHRU*/ /* These require no special privileges. */ case PCITOOL_DEVICE_GET_INTR: case PCITOOL_SYSTEM_INTR_INFO: rv = pxtool_intr(dip, (void *)arg, cmd, mode); break; default: rv = ENOTTY; } return (rv); default: /* To handle devctl and hotplug related ioctls */ rv = pcie_ioctl(dip, dev, cmd, arg, mode, credp, rvalp); break; } if ((cmd & ~PPMREQ_MASK) == PPMREQ) { /* Need privileges to use these ioctls. */ if (drv_priv(credp)) { DBG(DBG_TOOLS, dip, "px_tools: Insufficient privileges\n"); return (EPERM); } return (px_lib_pmctl(cmd, px_p)); } return (rv); }