diff options
Diffstat (limited to 'drivers/gpu/drm/drm_drv.c')
| -rw-r--r-- | drivers/gpu/drm/drm_drv.c | 226 | 
1 files changed, 108 insertions, 118 deletions
diff --git a/drivers/gpu/drm/drm_drv.c b/drivers/gpu/drm/drm_drv.c index e572dd20bde..8218078b613 100644 --- a/drivers/gpu/drm/drm_drv.c +++ b/drivers/gpu/drm/drm_drv.c @@ -61,7 +61,7 @@ static int drm_version(struct drm_device *dev, void *data,  /** Ioctl table */  static const struct drm_ioctl_desc drm_ioctls[] = { -	DRM_IOCTL_DEF(DRM_IOCTL_VERSION, drm_version, DRM_UNLOCKED), +	DRM_IOCTL_DEF(DRM_IOCTL_VERSION, drm_version, DRM_UNLOCKED|DRM_RENDER_ALLOW),  	DRM_IOCTL_DEF(DRM_IOCTL_GET_UNIQUE, drm_getunique, 0),  	DRM_IOCTL_DEF(DRM_IOCTL_GET_MAGIC, drm_getmagic, 0),  	DRM_IOCTL_DEF(DRM_IOCTL_IRQ_BUSID, drm_irq_by_busid, DRM_MASTER|DRM_ROOT_ONLY), @@ -69,6 +69,7 @@ static const struct drm_ioctl_desc drm_ioctls[] = {  	DRM_IOCTL_DEF(DRM_IOCTL_GET_CLIENT, drm_getclient, DRM_UNLOCKED),  	DRM_IOCTL_DEF(DRM_IOCTL_GET_STATS, drm_getstats, DRM_UNLOCKED),  	DRM_IOCTL_DEF(DRM_IOCTL_GET_CAP, drm_getcap, DRM_UNLOCKED|DRM_RENDER_ALLOW), +	DRM_IOCTL_DEF(DRM_IOCTL_SET_CLIENT_CAP, drm_setclientcap, 0),  	DRM_IOCTL_DEF(DRM_IOCTL_SET_VERSION, drm_setversion, DRM_MASTER),  	DRM_IOCTL_DEF(DRM_IOCTL_SET_UNIQUE, drm_setunique, DRM_AUTH|DRM_MASTER|DRM_ROOT_ONLY), @@ -170,76 +171,6 @@ static const struct drm_ioctl_desc drm_ioctls[] = {  #define DRM_CORE_IOCTL_COUNT	ARRAY_SIZE( drm_ioctls ) -/** - * drm_legacy_dev_reinit - * - * Reinitializes a legacy/ums drm device in it's lastclose function. - */ -static void drm_legacy_dev_reinit(struct drm_device *dev) -{ -	int i; - -	if (drm_core_check_feature(dev, DRIVER_MODESET)) -		return; - -	atomic_set(&dev->ioctl_count, 0); -	atomic_set(&dev->vma_count, 0); - -	for (i = 0; i < ARRAY_SIZE(dev->counts); i++) -		atomic_set(&dev->counts[i], 0); - -	dev->sigdata.lock = NULL; - -	dev->context_flag = 0; -	dev->last_context = 0; -	dev->if_version = 0; -} - -/** - * Take down the DRM device. - * - * \param dev DRM device structure. - * - * Frees every resource in \p dev. - * - * \sa drm_device - */ -int drm_lastclose(struct drm_device * dev) -{ -	struct drm_vma_entry *vma, *vma_temp; - -	DRM_DEBUG("\n"); - -	if (dev->driver->lastclose) -		dev->driver->lastclose(dev); -	DRM_DEBUG("driver lastclose completed\n"); - -	if (dev->irq_enabled && !drm_core_check_feature(dev, DRIVER_MODESET)) -		drm_irq_uninstall(dev); - -	mutex_lock(&dev->struct_mutex); - -	drm_agp_clear(dev); - -	drm_legacy_sg_cleanup(dev); - -	/* Clear vma list (only built for debugging) */ -	list_for_each_entry_safe(vma, vma_temp, &dev->vmalist, head) { -		list_del(&vma->head); -		kfree(vma); -	} - -	drm_legacy_dma_takedown(dev); - -	dev->dev_mapping = NULL; -	mutex_unlock(&dev->struct_mutex); - -	drm_legacy_dev_reinit(dev); - -	DRM_DEBUG("lastclose completed\n"); -	return 0; -} -  /** File operations structure */  static const struct file_operations drm_stub_fops = {  	.owner = THIS_MODULE, @@ -355,6 +286,45 @@ static int drm_version(struct drm_device *dev, void *data,  }  /** + * drm_ioctl_permit - Check ioctl permissions against caller + * + * @flags: ioctl permission flags. + * @file_priv: Pointer to struct drm_file identifying the caller. + * + * Checks whether the caller is allowed to run an ioctl with the + * indicated permissions. If so, returns zero. Otherwise returns an + * error code suitable for ioctl return. + */ +static int drm_ioctl_permit(u32 flags, struct drm_file *file_priv) +{ +	/* ROOT_ONLY is only for CAP_SYS_ADMIN */ +	if (unlikely((flags & DRM_ROOT_ONLY) && !capable(CAP_SYS_ADMIN))) +		return -EACCES; + +	/* AUTH is only for authenticated or render client */ +	if (unlikely((flags & DRM_AUTH) && !drm_is_render_client(file_priv) && +		     !file_priv->authenticated)) +		return -EACCES; + +	/* MASTER is only for master or control clients */ +	if (unlikely((flags & DRM_MASTER) && !file_priv->is_master && +		     !drm_is_control_client(file_priv))) +		return -EACCES; + +	/* Control clients must be explicitly allowed */ +	if (unlikely(!(flags & DRM_CONTROL_ALLOW) && +		     drm_is_control_client(file_priv))) +		return -EACCES; + +	/* Render clients must be explicitly allowed */ +	if (unlikely(!(flags & DRM_RENDER_ALLOW) && +		     drm_is_render_client(file_priv))) +		return -EACCES; + +	return 0; +} + +/**   * Called whenever a process performs an ioctl on /dev/drm.   *   * \param inode device inode. @@ -384,10 +354,6 @@ long drm_ioctl(struct file *filp,  	if (drm_device_is_unplugged(dev))  		return -ENODEV; -	atomic_inc(&dev->ioctl_count); -	atomic_inc(&dev->counts[_DRM_STAT_IOCTLS]); -	++file_priv->ioctl_count; -  	if ((nr >= DRM_CORE_IOCTL_COUNT) &&  	    ((nr < DRM_COMMAND_BASE) || (nr >= DRM_COMMAND_END)))  		goto err_i1; @@ -402,80 +368,104 @@ long drm_ioctl(struct file *filp,  		cmd = ioctl->cmd_drv;  	}  	else if ((nr >= DRM_COMMAND_END) || (nr < DRM_COMMAND_BASE)) { +		u32 drv_size; +  		ioctl = &drm_ioctls[nr]; -		cmd = ioctl->cmd; + +		drv_size = _IOC_SIZE(ioctl->cmd);  		usize = asize = _IOC_SIZE(cmd); +		if (drv_size > asize) +			asize = drv_size; + +		cmd = ioctl->cmd;  	} else  		goto err_i1;  	DRM_DEBUG("pid=%d, dev=0x%lx, auth=%d, %s\n",  		  task_pid_nr(current), -		  (long)old_encode_dev(file_priv->minor->device), +		  (long)old_encode_dev(file_priv->minor->kdev->devt),  		  file_priv->authenticated, ioctl->name);  	/* Do not trust userspace, use our own definition */  	func = ioctl->func; -	if (!func) { +	if (unlikely(!func)) {  		DRM_DEBUG("no function\n");  		retcode = -EINVAL; -	} else if (((ioctl->flags & DRM_ROOT_ONLY) && !capable(CAP_SYS_ADMIN)) || -		   ((ioctl->flags & DRM_AUTH) && !drm_is_render_client(file_priv) && !file_priv->authenticated) || -		   ((ioctl->flags & DRM_MASTER) && !file_priv->is_master) || -		   (!(ioctl->flags & DRM_CONTROL_ALLOW) && (file_priv->minor->type == DRM_MINOR_CONTROL)) || -		   (!(ioctl->flags & DRM_RENDER_ALLOW) && drm_is_render_client(file_priv))) { -		retcode = -EACCES; -	} else { -		if (cmd & (IOC_IN | IOC_OUT)) { -			if (asize <= sizeof(stack_kdata)) { -				kdata = stack_kdata; -			} else { -				kdata = kmalloc(asize, GFP_KERNEL); -				if (!kdata) { -					retcode = -ENOMEM; -					goto err_i1; -				} -			} -			if (asize > usize) -				memset(kdata + usize, 0, asize - usize); -		} +		goto err_i1; +	} -		if (cmd & IOC_IN) { -			if (copy_from_user(kdata, (void __user *)arg, -					   usize) != 0) { -				retcode = -EFAULT; +	retcode = drm_ioctl_permit(ioctl->flags, file_priv); +	if (unlikely(retcode)) +		goto err_i1; + +	if (cmd & (IOC_IN | IOC_OUT)) { +		if (asize <= sizeof(stack_kdata)) { +			kdata = stack_kdata; +		} else { +			kdata = kmalloc(asize, GFP_KERNEL); +			if (!kdata) { +				retcode = -ENOMEM;  				goto err_i1;  			} -		} else -			memset(kdata, 0, usize); - -		if (ioctl->flags & DRM_UNLOCKED) -			retcode = func(dev, kdata, file_priv); -		else { -			mutex_lock(&drm_global_mutex); -			retcode = func(dev, kdata, file_priv); -			mutex_unlock(&drm_global_mutex);  		} +		if (asize > usize) +			memset(kdata + usize, 0, asize - usize); +	} -		if (cmd & IOC_OUT) { -			if (copy_to_user((void __user *)arg, kdata, -					 usize) != 0) -				retcode = -EFAULT; +	if (cmd & IOC_IN) { +		if (copy_from_user(kdata, (void __user *)arg, +				   usize) != 0) { +			retcode = -EFAULT; +			goto err_i1;  		} +	} else if (cmd & IOC_OUT) { +		memset(kdata, 0, usize); +	} + +	if (ioctl->flags & DRM_UNLOCKED) +		retcode = func(dev, kdata, file_priv); +	else { +		mutex_lock(&drm_global_mutex); +		retcode = func(dev, kdata, file_priv); +		mutex_unlock(&drm_global_mutex); +	} + +	if (cmd & IOC_OUT) { +		if (copy_to_user((void __user *)arg, kdata, +				 usize) != 0) +			retcode = -EFAULT;  	}        err_i1:  	if (!ioctl) -		DRM_DEBUG("invalid iotcl: pid=%d, dev=0x%lx, auth=%d, cmd=0x%02x, nr=0x%02x\n", +		DRM_DEBUG("invalid ioctl: pid=%d, dev=0x%lx, auth=%d, cmd=0x%02x, nr=0x%02x\n",  			  task_pid_nr(current), -			  (long)old_encode_dev(file_priv->minor->device), +			  (long)old_encode_dev(file_priv->minor->kdev->devt),  			  file_priv->authenticated, cmd, nr);  	if (kdata != stack_kdata)  		kfree(kdata); -	atomic_dec(&dev->ioctl_count);  	if (retcode)  		DRM_DEBUG("ret = %d\n", retcode);  	return retcode;  }  EXPORT_SYMBOL(drm_ioctl); + +/** + * drm_ioctl_flags - Check for core ioctl and return ioctl permission flags + * + * @nr: Ioctl number. + * @flags: Where to return the ioctl permission flags + */ +bool drm_ioctl_flags(unsigned int nr, unsigned int *flags) +{ +	if ((nr >= DRM_COMMAND_END && nr < DRM_CORE_IOCTL_COUNT) || +	    (nr < DRM_COMMAND_BASE)) { +		*flags = drm_ioctls[nr].flags; +		return true; +	} + +	return false; +} +EXPORT_SYMBOL(drm_ioctl_flags);  | 
