2 * Created: Tue Feb 2 08:37:54 1999 by faith@valinux.com
4 * Copyright 1999 Precision Insight, Inc., Cedar Park, Texas.
5 * Copyright 2000 VA Linux Systems, Inc., Sunnyvale, California.
8 * Author Rickard E. (Rik) Faith <faith@valinux.com>
9 * Author Gareth Hughes <gareth@valinux.com>
11 * Permission is hereby granted, free of charge, to any person obtaining a
12 * copy of this software and associated documentation files (the "Software"),
13 * to deal in the Software without restriction, including without limitation
14 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
15 * and/or sell copies of the Software, and to permit persons to whom the
16 * Software is furnished to do so, subject to the following conditions:
18 * The above copyright notice and this permission notice (including the next
19 * paragraph) shall be included in all copies or substantial portions of the
22 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
23 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
24 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
25 * VA LINUX SYSTEMS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
26 * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
27 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
28 * OTHER DEALINGS IN THE SOFTWARE.
31 #include <linux/slab.h>
33 #include <drm/drm_auth.h>
34 #include <drm/drm_drv.h>
35 #include <drm/drm_file.h>
36 #include <drm/drm_lease.h>
37 #include <drm/drm_print.h>
39 #include "drm_internal.h"
40 #include "drm_legacy.h"
43 * DOC: master and authentication
45 * &struct drm_master is used to track groups of clients with open
46 * primary/legacy device nodes. For every &struct drm_file which has had at
47 * least once successfully became the device master (either through the
48 * SET_MASTER IOCTL, or implicitly through opening the primary device node when
49 * no one else is the current master that time) there exists one &drm_master.
50 * This is noted in &drm_file.is_master. All other clients have just a pointer
51 * to the &drm_master they are associated with.
53 * In addition only one &drm_master can be the current master for a &drm_device.
54 * It can be switched through the DROP_MASTER and SET_MASTER IOCTL, or
55 * implicitly through closing/openeing the primary device node. See also
56 * drm_is_current_master().
58 * Clients can authenticate against the current master (if it matches their own)
59 * using the GETMAGIC and AUTHMAGIC IOCTLs. Together with exchanging masters,
60 * this allows controlled access to the device for an entire group of mutually
64 int drm_getmagic(struct drm_device
*dev
, void *data
, struct drm_file
*file_priv
)
66 struct drm_auth
*auth
= data
;
69 mutex_lock(&dev
->master_mutex
);
70 if (!file_priv
->magic
) {
71 ret
= idr_alloc(&file_priv
->master
->magic_map
, file_priv
,
74 file_priv
->magic
= ret
;
76 auth
->magic
= file_priv
->magic
;
77 mutex_unlock(&dev
->master_mutex
);
79 DRM_DEBUG("%u\n", auth
->magic
);
81 return ret
< 0 ? ret
: 0;
84 int drm_authmagic(struct drm_device
*dev
, void *data
,
85 struct drm_file
*file_priv
)
87 struct drm_auth
*auth
= data
;
88 struct drm_file
*file
;
90 DRM_DEBUG("%u\n", auth
->magic
);
92 mutex_lock(&dev
->master_mutex
);
93 file
= idr_find(&file_priv
->master
->magic_map
, auth
->magic
);
95 file
->authenticated
= 1;
96 idr_replace(&file_priv
->master
->magic_map
, NULL
, auth
->magic
);
98 mutex_unlock(&dev
->master_mutex
);
100 return file
? 0 : -EINVAL
;
103 struct drm_master
*drm_master_create(struct drm_device
*dev
)
105 struct drm_master
*master
;
107 master
= kzalloc(sizeof(*master
), GFP_KERNEL
);
111 kref_init(&master
->refcount
);
112 drm_master_legacy_init(master
);
113 idr_init(&master
->magic_map
);
116 /* initialize the tree of output resource lessees */
117 INIT_LIST_HEAD(&master
->lessees
);
118 INIT_LIST_HEAD(&master
->lessee_list
);
119 idr_init(&master
->leases
);
120 idr_init(&master
->lessee_idr
);
125 static void drm_set_master(struct drm_device
*dev
, struct drm_file
*fpriv
,
128 dev
->master
= drm_master_get(fpriv
->master
);
129 if (dev
->driver
->master_set
)
130 dev
->driver
->master_set(dev
, fpriv
, new_master
);
132 fpriv
->was_master
= true;
135 static int drm_new_set_master(struct drm_device
*dev
, struct drm_file
*fpriv
)
137 struct drm_master
*old_master
;
139 lockdep_assert_held_once(&dev
->master_mutex
);
141 WARN_ON(fpriv
->is_master
);
142 old_master
= fpriv
->master
;
143 fpriv
->master
= drm_master_create(dev
);
144 if (!fpriv
->master
) {
145 fpriv
->master
= old_master
;
149 fpriv
->is_master
= 1;
150 fpriv
->authenticated
= 1;
152 drm_set_master(dev
, fpriv
, true);
155 drm_master_put(&old_master
);
161 * In the olden days the SET/DROP_MASTER ioctls used to return EACCES when
162 * CAP_SYS_ADMIN was not set. This was used to prevent rogue applications
163 * from becoming master and/or failing to release it.
165 * At the same time, the first client (for a given VT) is _always_ master.
166 * Thus in order for the ioctls to succeed, one had to _explicitly_ run the
167 * application as root or flip the setuid bit.
169 * If the CAP_SYS_ADMIN was missing, no other client could become master...
170 * EVER :-( Leading to a) the graphics session dying badly or b) a completely
174 * As some point systemd-logind was introduced to orchestrate and delegate
175 * master as applicable. It does so by opening the fd and passing it to users
176 * while in itself logind a) does the set/drop master per users' request and
177 * b) * implicitly drops master on VT switch.
179 * Even though logind looks like the future, there are a few issues:
180 * - some platforms don't have equivalent (Android, CrOS, some BSDs) so
181 * root is required _solely_ for SET/DROP MASTER.
182 * - applications may not be updated to use it,
183 * - any client which fails to drop master* can DoS the application using
184 * logind, to a varying degree.
186 * * Either due missing CAP_SYS_ADMIN or simply not calling DROP_MASTER.
189 * Here we implement the next best thing:
190 * - ensure the logind style of fd passing works unchanged, and
191 * - allow a client to drop/set master, iff it is/was master at a given point
194 * Note: DROP_MASTER cannot be free for all, as an arbitrator user could:
195 * - DoS/crash the arbitrator - details would be implementation specific
196 * - open the node, become master implicitly and cause issues
198 * As a result this fixes the following when using root-less build w/o logind
201 * - various compositors based on wlroots
204 drm_master_check_perm(struct drm_device
*dev
, struct drm_file
*file_priv
)
206 if (file_priv
->pid
== task_pid(current
) && file_priv
->was_master
)
209 if (!capable(CAP_SYS_ADMIN
))
215 int drm_setmaster_ioctl(struct drm_device
*dev
, void *data
,
216 struct drm_file
*file_priv
)
220 mutex_lock(&dev
->master_mutex
);
222 ret
= drm_master_check_perm(dev
, file_priv
);
226 if (drm_is_current_master(file_priv
))
234 if (!file_priv
->master
) {
239 if (!file_priv
->is_master
) {
240 ret
= drm_new_set_master(dev
, file_priv
);
244 if (file_priv
->master
->lessor
!= NULL
) {
245 DRM_DEBUG_LEASE("Attempt to set lessee %d as master\n", file_priv
->master
->lessee_id
);
250 drm_set_master(dev
, file_priv
, false);
252 mutex_unlock(&dev
->master_mutex
);
256 static void drm_drop_master(struct drm_device
*dev
,
257 struct drm_file
*fpriv
)
259 if (dev
->driver
->master_drop
)
260 dev
->driver
->master_drop(dev
, fpriv
);
261 drm_master_put(&dev
->master
);
264 int drm_dropmaster_ioctl(struct drm_device
*dev
, void *data
,
265 struct drm_file
*file_priv
)
269 mutex_lock(&dev
->master_mutex
);
271 ret
= drm_master_check_perm(dev
, file_priv
);
275 if (!drm_is_current_master(file_priv
)) {
285 if (file_priv
->master
->lessor
!= NULL
) {
286 DRM_DEBUG_LEASE("Attempt to drop lessee %d as master\n", file_priv
->master
->lessee_id
);
291 drm_drop_master(dev
, file_priv
);
293 mutex_unlock(&dev
->master_mutex
);
297 int drm_master_open(struct drm_file
*file_priv
)
299 struct drm_device
*dev
= file_priv
->minor
->dev
;
302 /* if there is no current master make this fd it, but do not create
303 * any master object for render clients */
304 mutex_lock(&dev
->master_mutex
);
306 ret
= drm_new_set_master(dev
, file_priv
);
308 file_priv
->master
= drm_master_get(dev
->master
);
309 mutex_unlock(&dev
->master_mutex
);
314 void drm_master_release(struct drm_file
*file_priv
)
316 struct drm_device
*dev
= file_priv
->minor
->dev
;
317 struct drm_master
*master
= file_priv
->master
;
319 mutex_lock(&dev
->master_mutex
);
320 if (file_priv
->magic
)
321 idr_remove(&file_priv
->master
->magic_map
, file_priv
->magic
);
323 if (!drm_is_current_master(file_priv
))
326 drm_legacy_lock_master_cleanup(dev
, master
);
328 if (dev
->master
== file_priv
->master
)
329 drm_drop_master(dev
, file_priv
);
331 if (drm_core_check_feature(dev
, DRIVER_MODESET
) && file_priv
->is_master
) {
332 /* Revoke any leases held by this or lessees, but only if
333 * this is the "real" master
335 drm_lease_revoke(master
);
338 /* drop the master reference held by the file priv */
339 if (file_priv
->master
)
340 drm_master_put(&file_priv
->master
);
341 mutex_unlock(&dev
->master_mutex
);
345 * drm_is_current_master - checks whether @priv is the current master
346 * @fpriv: DRM file private
348 * Checks whether @fpriv is current master on its device. This decides whether a
349 * client is allowed to run DRM_MASTER IOCTLs.
351 * Most of the modern IOCTL which require DRM_MASTER are for kernel modesetting
352 * - the current master is assumed to own the non-shareable display hardware.
354 bool drm_is_current_master(struct drm_file
*fpriv
)
356 return fpriv
->is_master
&& drm_lease_owner(fpriv
->master
) == fpriv
->minor
->dev
->master
;
358 EXPORT_SYMBOL(drm_is_current_master
);
361 * drm_master_get - reference a master pointer
362 * @master: &struct drm_master
364 * Increments the reference count of @master and returns a pointer to @master.
366 struct drm_master
*drm_master_get(struct drm_master
*master
)
368 kref_get(&master
->refcount
);
371 EXPORT_SYMBOL(drm_master_get
);
373 static void drm_master_destroy(struct kref
*kref
)
375 struct drm_master
*master
= container_of(kref
, struct drm_master
, refcount
);
376 struct drm_device
*dev
= master
->dev
;
378 if (drm_core_check_feature(dev
, DRIVER_MODESET
))
379 drm_lease_destroy(master
);
381 drm_legacy_master_rmmaps(dev
, master
);
383 idr_destroy(&master
->magic_map
);
384 idr_destroy(&master
->leases
);
385 idr_destroy(&master
->lessee_idr
);
387 kfree(master
->unique
);
392 * drm_master_put - unreference and clear a master pointer
393 * @master: pointer to a pointer of &struct drm_master
395 * This decrements the &drm_master behind @master and sets it to NULL.
397 void drm_master_put(struct drm_master
**master
)
399 kref_put(&(*master
)->refcount
, drm_master_destroy
);
402 EXPORT_SYMBOL(drm_master_put
);
404 /* Used by drm_client and drm_fb_helper */
405 bool drm_master_internal_acquire(struct drm_device
*dev
)
407 mutex_lock(&dev
->master_mutex
);
409 mutex_unlock(&dev
->master_mutex
);
415 EXPORT_SYMBOL(drm_master_internal_acquire
);
417 /* Used by drm_client and drm_fb_helper */
418 void drm_master_internal_release(struct drm_device
*dev
)
420 mutex_unlock(&dev
->master_mutex
);
422 EXPORT_SYMBOL(drm_master_internal_release
);