Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp241498imm; Fri, 13 Jul 2018 23:00:50 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdbr6oyGlXM/GbYFRoLgaxEIWS9nhUsO8ET60ner3a13dKZl6giJZRAA2TD6c+23SZhFWgo X-Received: by 2002:a17:902:b28:: with SMTP id 37-v6mr8825460plq.201.1531548050862; Fri, 13 Jul 2018 23:00:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531548050; cv=none; d=google.com; s=arc-20160816; b=aqo5s0cPmMMuIvTMfjpnS6oAd57WeuUjzYKZ0D5T+UKWzXJQGJ4HNUlZmKaKtW8cGc 08rWLFc/2uB30gBskmHOR2WWSky/nL8oskImPRxnZ0e0pPZKgznqfph+ztXHX/KGvwx8 qqOYB2pkLKIh+NtC7CTG4Bw+3IyqObB/02RD2xeX7WvkYNKTvNlbFaxK8nRsCBaRtkhU UpMOXQ74pOSVUprtg9N7Zz1CnPMbQAVCB+Hv21wccLCEHjSgqRr/Edook8Mj5dtYGC7s QSMYbrTeDwSR+RVZ/4P865kdJqusXDdaHzaTI7FGDYPqrgjewzxks+QLjM6yRynHxdp+ C07w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=CIqn9XBUK+09yrfWLIctLQX/l49zOjLWve/MhhxDZ6U=; b=aB0/SfS6EKsUca80N7C4kKG8UrrOnahnD8IMsG5Jg8PjKvZCAmbkwGBXGI1nS7+lo7 Q+rLIOwisrgmg8Z89v7OHe3z53vVsIk2x0Wpha7uVUvmLXv3AMx9+5zC1p2vh0uUg+bH 23NVpt2QURcqRZs7CYIeS9aOQXiHFUtQZp5DdAPkVtelvAKlwQjIBhe+Pq95yFRd2U9w LVyNsOVOUyJTSNU7xGUZIImNu45ZpXkIcjyDBa6MiLpDMoMSvDcI24iTEkPIWc3IZQ5z Hi5IXONnK8ICLS/eb0OpdT8cqkeouLmtlZZI27v7OWvqjJzHeceGvdU0G7JSaaWHtyXz keSw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Gh1E9pQA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y191-v6si27657064pfg.246.2018.07.13.23.00.36; Fri, 13 Jul 2018 23:00:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Gh1E9pQA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728135AbeGNGQp (ORCPT + 99 others); Sat, 14 Jul 2018 02:16:45 -0400 Received: from mail-pf0-f194.google.com ([209.85.192.194]:41044 "EHLO mail-pf0-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727561AbeGNGQo (ORCPT ); Sat, 14 Jul 2018 02:16:44 -0400 Received: by mail-pf0-f194.google.com with SMTP id c21-v6so19139661pfn.8 for ; Fri, 13 Jul 2018 22:58:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=CIqn9XBUK+09yrfWLIctLQX/l49zOjLWve/MhhxDZ6U=; b=Gh1E9pQAZblROVtdhfjAgOw6FQRdl44h6w/S+rXsXuviQI74oNhJ6qKZs5msB5RGMo KA0RTw4Mpso1QqetBUL/wS5TnNve34XMKSBoSemIdXel8/4ofHHo3jv+d81tYSXF4RGq W7qdSbb8nTbHXYRLKDSokJcbdQSKtNq6qTwzcmzg1sp8VjahdRdGO5gcp30++9dH8tds 5tDSRXTGX1kkS3qmJZnhhkwFA63bhdw34S46ZLRueeJMPaq7RV0XgLQyl4qCgxKWP3df bD/dtvjyKgvwBfX/WZMk5ZG8REoRIeN9Ff2RgvvOYF+W491/LEllR4Gcppmg8JzVM+b+ lTFw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=CIqn9XBUK+09yrfWLIctLQX/l49zOjLWve/MhhxDZ6U=; b=nfZw0+7skfrKsAMmqvp4WdBoUwFRaHKtNKU3q6hjgpR41mX97yEiDbW1zJyjvG/uPz yxTeX+VcF+0tygzEGjneKLg+9gs/l0VWodQqINEc0aT93WU2DZ09/uqtVibFrJodGR0s sxYaG7k4m6WC5rxGxkTaJF0UY3RhRmDVqq0botxqDMxEFDRkIn9EqzkdopyY8RCA1mnH ngzTJvxEckRokLBc/HzwNqWwWQjYw2qib0qzd/XakvoEJTPo3fvkKJMLg95cemdXymY8 Zz5nZFWzN7bdm8n1oop/eA/RfRuvrh9bxi/Ty+FL2gZFn5Lzq51FXiw0v9yV7/zEIS5E xveA== X-Gm-Message-State: AOUpUlGBEmsUlmRNbj1HZFhPgOlVTKj4FJabfzECWDjCrn9X9qdnxyXW B439IpzIpA8Oo+FmC9DYrsY= X-Received: by 2002:a63:be4a:: with SMTP id g10-v6mr8406111pgo.378.1531547935137; Fri, 13 Jul 2018 22:58:55 -0700 (PDT) Received: from toddpoynor2.mtv.corp.google.com ([2620:0:1000:3701:7d29:cd13:d903:7908]) by smtp.gmail.com with ESMTPSA id 203-v6sm48411112pgb.14.2018.07.13.22.58.54 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 13 Jul 2018 22:58:54 -0700 (PDT) From: Todd Poynor To: Rob Springer , John Joseph , Ben Chan , Greg Kroah-Hartman Cc: Zhongze Hu , Simon Que , Dmitry Torokhov , Guenter Roeck , devel@driverdev.osuosl.org, linux-kernel@vger.kernel.org, Todd Poynor Subject: [PATCH 11/18] staging: gasket: always allow root open for write Date: Fri, 13 Jul 2018 22:58:09 -0700 Message-Id: <20180714055816.223754-12-toddpoynor@gmail.com> X-Mailer: git-send-email 2.18.0.203.gfac676dfb9-goog In-Reply-To: <20180714055816.223754-1-toddpoynor@gmail.com> References: <20180714055816.223754-1-toddpoynor@gmail.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Todd Poynor Always allow root to open device for writing. Drop special-casing of ioctl permissions for root vs. owner. Reported-by: Dmitry Torokhov Signed-off-by: Zhongze Hu Signed-off-by: Todd Poynor --- drivers/staging/gasket/apex_driver.c | 9 +++------ drivers/staging/gasket/gasket_core.c | 8 +++++--- drivers/staging/gasket/gasket_ioctl.c | 15 ++++++--------- 3 files changed, 14 insertions(+), 18 deletions(-) diff --git a/drivers/staging/gasket/apex_driver.c b/drivers/staging/gasket/apex_driver.c index b1318482ba65..ffe11d8168ea 100644 --- a/drivers/staging/gasket/apex_driver.c +++ b/drivers/staging/gasket/apex_driver.c @@ -644,13 +644,10 @@ static bool is_gcb_in_reset(struct gasket_dev *gasket_dev) static uint apex_ioctl_check_permissions(struct file *filp, uint cmd) { struct gasket_dev *gasket_dev = filp->private_data; - int root = capable(CAP_SYS_ADMIN); - int is_owner = gasket_dev->dev_info.ownership.is_owned && - current->tgid == gasket_dev->dev_info.ownership.owner; + fmode_t write; - if (root || is_owner) - return 1; - return 0; + write = filp->f_mode & FMODE_WRITE; + return write; } /* diff --git a/drivers/staging/gasket/gasket_core.c b/drivers/staging/gasket/gasket_core.c index 0c45c54254fb..5908964f0039 100644 --- a/drivers/staging/gasket/gasket_core.c +++ b/drivers/staging/gasket/gasket_core.c @@ -1101,6 +1101,7 @@ static int gasket_open(struct inode *inode, struct file *filp) char task_name[TASK_COMM_LEN]; struct gasket_cdev_info *dev_info = container_of(inode->i_cdev, struct gasket_cdev_info, cdev); + int is_root = capable(CAP_SYS_ADMIN); gasket_dev = dev_info->gasket_dev_ptr; driver_desc = gasket_dev->internal_desc->driver_desc; @@ -1114,7 +1115,7 @@ static int gasket_open(struct inode *inode, struct file *filp) "Attempting to open with tgid %u (%s) (f_mode: 0%03o, " "fmode_write: %d is_root: %u)", current->tgid, task_name, filp->f_mode, - (filp->f_mode & FMODE_WRITE), capable(CAP_SYS_ADMIN)); + (filp->f_mode & FMODE_WRITE), is_root); /* Always allow non-writing accesses. */ if (!(filp->f_mode & FMODE_WRITE)) { @@ -1128,8 +1129,9 @@ static int gasket_open(struct inode *inode, struct file *filp) gasket_dev, "Current owner open count (owning tgid %u): %d.", ownership->owner, ownership->write_open_count); - /* Opening a node owned by another TGID is an error (even root.) */ - if (ownership->is_owned && ownership->owner != current->tgid) { + /* Opening a node owned by another TGID is an error (unless root) */ + if (ownership->is_owned && ownership->owner != current->tgid && + !is_root) { gasket_log_error( gasket_dev, "Process %u is opening a node held by %u.", diff --git a/drivers/staging/gasket/gasket_ioctl.c b/drivers/staging/gasket/gasket_ioctl.c index 4758083fb19b..23875fd465f6 100644 --- a/drivers/staging/gasket/gasket_ioctl.c +++ b/drivers/staging/gasket/gasket_ioctl.c @@ -180,7 +180,7 @@ long gasket_is_supported_ioctl(uint cmd) */ static uint gasket_ioctl_check_permissions(struct file *filp, uint cmd) { - uint alive, root, device_owner; + uint alive; fmode_t read, write; struct gasket_dev *gasket_dev = (struct gasket_dev *)filp->private_data; @@ -191,33 +191,30 @@ static uint gasket_ioctl_check_permissions(struct file *filp, uint cmd) alive, gasket_dev->status); } - root = capable(CAP_SYS_ADMIN); read = filp->f_mode & FMODE_READ; write = filp->f_mode & FMODE_WRITE; - device_owner = (gasket_dev->dev_info.ownership.is_owned && - current->tgid == gasket_dev->dev_info.ownership.owner); switch (cmd) { case GASKET_IOCTL_RESET: case GASKET_IOCTL_CLEAR_INTERRUPT_COUNTS: - return root || (write && device_owner); + return write; case GASKET_IOCTL_PAGE_TABLE_SIZE: case GASKET_IOCTL_SIMPLE_PAGE_TABLE_SIZE: case GASKET_IOCTL_NUMBER_PAGE_TABLES: - return root || read; + return read; case GASKET_IOCTL_PARTITION_PAGE_TABLE: case GASKET_IOCTL_CONFIG_COHERENT_ALLOCATOR: - return alive && (root || (write && device_owner)); + return alive && write; case GASKET_IOCTL_MAP_BUFFER: case GASKET_IOCTL_UNMAP_BUFFER: - return alive && (root || (write && device_owner)); + return alive && write; case GASKET_IOCTL_CLEAR_EVENTFD: case GASKET_IOCTL_SET_EVENTFD: - return alive && (root || (write && device_owner)); + return alive && write; } return 0; /* unknown permissions */ -- 2.18.0.203.gfac676dfb9-goog