1 /*
2 * Created: Tue Feb 2 08:37:54 1999 by faith@valinux.com
3 *
4 * Copyright 1999 Precision Insight, Inc., Cedar Park, Texas.
5 * Copyright 2000 VA Linux Systems, Inc., Sunnyvale, California.
6 * All Rights Reserved.
7 *
8 * Author Rickard E. (Rik) Faith <faith@valinux.com>
9 * Author Gareth Hughes <gareth@valinux.com>
10 *
11 * Permission is hereby granted, free of charge, to any person obtaining a
12 * copy of this software and associated documentation files (the "Software"),
13 * to deal in the Software without restriction, including without limitation
14 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
15 * and/or sell copies of the Software, and to permit persons to whom the
16 * Software is furnished to do so, subject to the following conditions:
17 *
18 * The above copyright notice and this permission notice (including the next
19 * paragraph) shall be included in all copies or substantial portions of the
20 * Software.
21 *
22 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
23 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
24 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
25 * VA LINUX SYSTEMS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
26 * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
27 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
28 * OTHER DEALINGS IN THE SOFTWARE.
29 */
30
31 #include <linux/slab.h>
32
33 #include <drm/drm_auth.h>
34 #include <drm/drm_drv.h>
35 #include <drm/drm_file.h>
36 #include <drm/drm_lease.h>
37 #include <drm/drm_print.h>
38
39 #include "drm_internal.h"
40 #include "drm_legacy.h"
41
42 /**
43 * DOC: master and authentication
44 *
45 * &struct drm_master is used to track groups of clients with open
46 * primary/legacy device nodes. For every &struct drm_file which has had at
47 * least once successfully became the device master (either through the
48 * SET_MASTER IOCTL, or implicitly through opening the primary device node when
49 * no one else is the current master that time) there exists one &drm_master.
50 * This is noted in &drm_file.is_master. All other clients have just a pointer
51 * to the &drm_master they are associated with.
52 *
53 * In addition only one &drm_master can be the current master for a &drm_device.
54 * It can be switched through the DROP_MASTER and SET_MASTER IOCTL, or
55 * implicitly through closing/openeing the primary device node. See also
56 * drm_is_current_master().
57 *
58 * Clients can authenticate against the current master (if it matches their own)
59 * using the GETMAGIC and AUTHMAGIC IOCTLs. Together with exchanging masters,
60 * this allows controlled access to the device for an entire group of mutually
61 * trusted clients.
62 */
63
drm_getmagic(struct drm_device * dev,void * data,struct drm_file * file_priv)64 int drm_getmagic(struct drm_device *dev, void *data, struct drm_file *file_priv)
65 {
66 struct drm_auth *auth = data;
67 int ret = 0;
68
69 mutex_lock(&dev->master_mutex);
70 if (!file_priv->magic) {
71 ret = idr_alloc(&file_priv->master->magic_map, file_priv, 1, 0, GFP_KERNEL);
72 if (ret >= 0) {
73 file_priv->magic = ret;
74 }
75 }
76 auth->magic = file_priv->magic;
77 mutex_unlock(&dev->master_mutex);
78
79 DRM_DEBUG("%u\n", auth->magic);
80
81 return ret < 0 ? ret : 0;
82 }
83
drm_authmagic(struct drm_device * dev,void * data,struct drm_file * file_priv)84 int drm_authmagic(struct drm_device *dev, void *data, struct drm_file *file_priv)
85 {
86 struct drm_auth *auth = data;
87 struct drm_file *file;
88
89 DRM_DEBUG("%u\n", auth->magic);
90
91 mutex_lock(&dev->master_mutex);
92 file = idr_find(&file_priv->master->magic_map, auth->magic);
93 if (file) {
94 file->authenticated = 1;
95 idr_replace(&file_priv->master->magic_map, NULL, auth->magic);
96 }
97 mutex_unlock(&dev->master_mutex);
98
99 return file ? 0 : -EINVAL;
100 }
101
drm_master_create(struct drm_device * dev)102 struct drm_master *drm_master_create(struct drm_device *dev)
103 {
104 struct drm_master *master;
105
106 master = kzalloc(sizeof(*master), GFP_KERNEL);
107 if (!master) {
108 return NULL;
109 }
110
111 kref_init(&master->refcount);
112 drm_master_legacy_init(master);
113 idr_init(&master->magic_map);
114 master->dev = dev;
115
116 /* initialize the tree of output resource lessees */
117 INIT_LIST_HEAD(&master->lessees);
118 INIT_LIST_HEAD(&master->lessee_list);
119 idr_init(&master->leases);
120 idr_init(&master->lessee_idr);
121
122 return master;
123 }
124
drm_set_master(struct drm_device * dev,struct drm_file * fpriv,bool new_master)125 static void drm_set_master(struct drm_device *dev, struct drm_file *fpriv, bool new_master)
126 {
127 dev->master = drm_master_get(fpriv->master);
128 if (dev->driver->master_set) {
129 dev->driver->master_set(dev, fpriv, new_master);
130 }
131
132 fpriv->was_master = true;
133 }
134
drm_new_set_master(struct drm_device * dev,struct drm_file * fpriv)135 static int drm_new_set_master(struct drm_device *dev, struct drm_file *fpriv)
136 {
137 struct drm_master *old_master;
138
139 lockdep_assert_held_once(&dev->master_mutex);
140
141 WARN_ON(fpriv->is_master);
142 old_master = fpriv->master;
143 fpriv->master = drm_master_create(dev);
144 if (!fpriv->master) {
145 fpriv->master = old_master;
146 return -ENOMEM;
147 }
148
149 fpriv->is_master = 1;
150 fpriv->authenticated = 1;
151
152 drm_set_master(dev, fpriv, true);
153
154 if (old_master) {
155 drm_master_put(&old_master);
156 }
157
158 return 0;
159 }
160
161 /*
162 * In the olden days the SET/DROP_MASTER ioctls used to return EACCES when
163 * CAP_SYS_ADMIN was not set. This was used to prevent rogue applications
164 * from becoming master and/or failing to release it.
165 *
166 * At the same time, the first client (for a given VT) is _always_ master.
167 * Thus in order for the ioctls to succeed, one had to _explicitly_ run the
168 * application as root or flip the setuid bit.
169 *
170 * If the CAP_SYS_ADMIN was missing, no other client could become master...
171 * EVER :-( Leading to a) the graphics session dying badly or b) a completely
172 * locked session.
173 *
174 *
175 * As some point systemd-logind was introduced to orchestrate and delegate
176 * master as applicable. It does so by opening the fd and passing it to users
177 * while in itself logind a) does the set/drop master per users' request and
178 * b) * implicitly drops master on VT switch.
179 *
180 * Even though logind looks like the future, there are a few issues:
181 * - some platforms don't have equivalent (Android, CrOS, some BSDs) so
182 * root is required _solely_ for SET/DROP MASTER.
183 * - applications may not be updated to use it,
184 * - any client which fails to drop master* can DoS the application using
185 * logind, to a varying degree.
186 *
187 * * Either due missing CAP_SYS_ADMIN or simply not calling DROP_MASTER.
188 *
189 *
190 * Here we implement the next best thing:
191 * - ensure the logind style of fd passing works unchanged, and
192 * - allow a client to drop/set master, iff it is/was master at a given point
193 * in time.
194 *
195 * Note: DROP_MASTER cannot be free for all, as an arbitrator user could:
196 * - DoS/crash the arbitrator - details would be implementation specific
197 * - open the node, become master implicitly and cause issues
198 *
199 * As a result this fixes the following when using root-less build w/o logind
200 * - startx
201 * - weston
202 * - various compositors based on wlroots
203 */
drm_master_check_perm(struct drm_device * dev,struct drm_file * file_priv)204 static int drm_master_check_perm(struct drm_device *dev, struct drm_file *file_priv)
205 {
206 if (file_priv->pid == task_pid(current) && file_priv->was_master) {
207 return 0;
208 }
209
210 if (!capable(CAP_SYS_ADMIN)) {
211 return -EACCES;
212 }
213
214 return 0;
215 }
216
drm_setmaster_ioctl(struct drm_device * dev,void * data,struct drm_file * file_priv)217 int drm_setmaster_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv)
218 {
219 int ret;
220
221 mutex_lock(&dev->master_mutex);
222
223 ret = drm_master_check_perm(dev, file_priv);
224 if (ret) {
225 goto out_unlock;
226 }
227
228 if (drm_is_current_master(file_priv)) {
229 goto out_unlock;
230 }
231
232 if (dev->master) {
233 ret = -EBUSY;
234 goto out_unlock;
235 }
236
237 if (!file_priv->master) {
238 ret = -EINVAL;
239 goto out_unlock;
240 }
241
242 if (!file_priv->is_master) {
243 ret = drm_new_set_master(dev, file_priv);
244 goto out_unlock;
245 }
246
247 if (file_priv->master->lessor != NULL) {
248 DRM_DEBUG_LEASE("Attempt to set lessee %d as master\n", file_priv->master->lessee_id);
249 ret = -EINVAL;
250 goto out_unlock;
251 }
252
253 drm_set_master(dev, file_priv, false);
254 out_unlock:
255 mutex_unlock(&dev->master_mutex);
256 return ret;
257 }
258
drm_drop_master(struct drm_device * dev,struct drm_file * fpriv)259 static void drm_drop_master(struct drm_device *dev, struct drm_file *fpriv)
260 {
261 if (dev->driver->master_drop) {
262 dev->driver->master_drop(dev, fpriv);
263 }
264 drm_master_put(&dev->master);
265 }
266
drm_dropmaster_ioctl(struct drm_device * dev,void * data,struct drm_file * file_priv)267 int drm_dropmaster_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv)
268 {
269 int ret;
270
271 mutex_lock(&dev->master_mutex);
272
273 ret = drm_master_check_perm(dev, file_priv);
274 if (ret) {
275 goto out_unlock;
276 }
277
278 if (!drm_is_current_master(file_priv)) {
279 ret = -EINVAL;
280 goto out_unlock;
281 }
282
283 if (!dev->master) {
284 ret = -EINVAL;
285 goto out_unlock;
286 }
287
288 if (file_priv->master->lessor != NULL) {
289 DRM_DEBUG_LEASE("Attempt to drop lessee %d as master\n", file_priv->master->lessee_id);
290 ret = -EINVAL;
291 goto out_unlock;
292 }
293
294 drm_drop_master(dev, file_priv);
295 out_unlock:
296 mutex_unlock(&dev->master_mutex);
297 return ret;
298 }
299
drm_master_open(struct drm_file * file_priv)300 int drm_master_open(struct drm_file *file_priv)
301 {
302 struct drm_device *dev = file_priv->minor->dev;
303 int ret = 0;
304
305 /* if there is no current master make this fd it, but do not create
306 * any master object for render clients */
307 mutex_lock(&dev->master_mutex);
308 if (!dev->master) {
309 ret = drm_new_set_master(dev, file_priv);
310 } else {
311 file_priv->master = drm_master_get(dev->master);
312 }
313 mutex_unlock(&dev->master_mutex);
314
315 return ret;
316 }
317
drm_master_release(struct drm_file * file_priv)318 void drm_master_release(struct drm_file *file_priv)
319 {
320 struct drm_device *dev = file_priv->minor->dev;
321 struct drm_master *master;
322
323 mutex_lock(&dev->master_mutex);
324 master = file_priv->master;
325 if (file_priv->magic) {
326 idr_remove(&file_priv->master->magic_map, file_priv->magic);
327 }
328
329 if (!drm_is_current_master(file_priv)) {
330 goto out;
331 }
332
333 drm_legacy_lock_master_cleanup(dev, master);
334
335 if (dev->master == file_priv->master) {
336 drm_drop_master(dev, file_priv);
337 }
338 out:
339 if (drm_core_check_feature(dev, DRIVER_MODESET) && file_priv->is_master) {
340 /* Revoke any leases held by this or lessees, but only if
341 * this is the "real" master
342 */
343 drm_lease_revoke(master);
344 }
345
346 /* drop the master reference held by the file priv */
347 if (file_priv->master) {
348 drm_master_put(&file_priv->master);
349 }
350 mutex_unlock(&dev->master_mutex);
351 }
352
353 /**
354 * drm_is_current_master - checks whether @priv is the current master
355 * @fpriv: DRM file private
356 *
357 * Checks whether @fpriv is current master on its device. This decides whether a
358 * client is allowed to run DRM_MASTER IOCTLs.
359 *
360 * Most of the modern IOCTL which require DRM_MASTER are for kernel modesetting
361 * - the current master is assumed to own the non-shareable display hardware.
362 */
drm_is_current_master(struct drm_file * fpriv)363 bool drm_is_current_master(struct drm_file *fpriv)
364 {
365 return fpriv->is_master && drm_lease_owner(fpriv->master) == fpriv->minor->dev->master;
366 }
367 EXPORT_SYMBOL(drm_is_current_master);
368
369 /**
370 * drm_master_get - reference a master pointer
371 * @master: &struct drm_master
372 *
373 * Increments the reference count of @master and returns a pointer to @master.
374 */
drm_master_get(struct drm_master * master)375 struct drm_master *drm_master_get(struct drm_master *master)
376 {
377 kref_get(&master->refcount);
378 return master;
379 }
380 EXPORT_SYMBOL(drm_master_get);
381
drm_master_destroy(struct kref * kref)382 static void drm_master_destroy(struct kref *kref)
383 {
384 struct drm_master *master = container_of(kref, struct drm_master, refcount);
385 struct drm_device *dev = master->dev;
386
387 if (drm_core_check_feature(dev, DRIVER_MODESET)) {
388 drm_lease_destroy(master);
389 }
390
391 drm_legacy_master_rmmaps(dev, master);
392
393 idr_destroy(&master->magic_map);
394 idr_destroy(&master->leases);
395 idr_destroy(&master->lessee_idr);
396
397 kfree(master->unique);
398 kfree(master);
399 }
400
401 /**
402 * drm_master_put - unreference and clear a master pointer
403 * @master: pointer to a pointer of &struct drm_master
404 *
405 * This decrements the &drm_master behind @master and sets it to NULL.
406 */
drm_master_put(struct drm_master ** master)407 void drm_master_put(struct drm_master **master)
408 {
409 kref_put(&(*master)->refcount, drm_master_destroy);
410 *master = NULL;
411 }
412 EXPORT_SYMBOL(drm_master_put);
413
414 /* Used by drm_client and drm_fb_helper */
drm_master_internal_acquire(struct drm_device * dev)415 bool drm_master_internal_acquire(struct drm_device *dev)
416 {
417 mutex_lock(&dev->master_mutex);
418 if (dev->master) {
419 mutex_unlock(&dev->master_mutex);
420 return false;
421 }
422
423 return true;
424 }
425 EXPORT_SYMBOL(drm_master_internal_acquire);
426
427 /* Used by drm_client and drm_fb_helper */
drm_master_internal_release(struct drm_device * dev)428 void drm_master_internal_release(struct drm_device *dev)
429 {
430 mutex_unlock(&dev->master_mutex);
431 }
432 EXPORT_SYMBOL(drm_master_internal_release);
433