@@ -474,18 +474,23 @@ nvkm_ioctl_path(struct nvkm_handle *parent, u32 type, u32 nr, u32 *path,
nv_debug(object, "handle 0x%08x not found\n", path[nr]);
return -ENOENT;
}
nvkm_namedb_put(handle);
parent = handle;
}
if (owner != NVIF_IOCTL_V0_OWNER_ANY && owner != handle->route) {
- nv_ioctl(object, "object route != owner\n");
- return -EACCES;
+ nv_ioctl(object, "object route != owner: route = 0x%x, owner = 0x$%x\n",
+ handle->route, owner);
+ /* return -EACCES; */
+
+ /* continue anyway - this is required for calling objects
+ * created in the kernel for this client from userspace, such
+ * as the channel fifo object or its gr obj. */
}
*route = handle->route;
*token = handle->token;
if (ret = -EINVAL, type < ARRAY_SIZE(nvkm_ioctl_v0)) {
if (nvkm_ioctl_v0[type].version == 0)
ret = nvkm_ioctl_v0[type].func(handle, data, size);
}
HACK: Some objects we need to access from userspace are first created in kernel, and thus owned by the kernel layer. Bypass a safety mechanism that allows to only use userspace-created objects and create new ones (for userspace). The objects do not span across processes but are still owned by the same client. This will need to be fixed in some proper way. Will these objects be managed by userspace at some point? Signed-off-by: Konsta Hölttä <kholtta@nvidia.com> --- drm/nouveau/nvkm/core/ioctl.c | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-)