[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAO3upoYuwq8V1hSHFHB5KKosCyuVd5PoOxmmb9haLtWcfGZKUA@mail.gmail.com>
Date: Mon, 16 Jul 2018 14:22:12 -0700
From: Todd Poynor <toddpoynor@...il.com>
To: Dmitry Torokhov <dtor@...omium.org>
Cc: Rob Springer <rspringer@...gle.com>,
John Joseph <jnjoseph@...gle.com>,
Ben Chan <benchan@...omium.org>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Zhongze Hu <frankhu@...omium.org>,
Simon Que <sque@...omium.org>,
Guenter Roeck <groeck@...omium.org>,
devel@...verdev.osuosl.org, lkml <linux-kernel@...r.kernel.org>,
Todd Poynor <toddpoynor@...gle.com>
Subject: Re: [PATCH 11/18] staging: gasket: always allow root open for write
On Sat, Jul 14, 2018 at 1:25 AM, Dmitry Torokhov <dtor@...omium.org> wrote:
> On Sat, Jul 14, 2018 at 8:58 AM Todd Poynor <toddpoynor@...il.com> wrote:
>>
>> From: Todd Poynor <toddpoynor@...gle.com>
>>
>> Always allow root to open device for writing.
>>
>> Drop special-casing of ioctl permissions for root vs. owner.
>>
>> Reported-by: Dmitry Torokhov <dtor@...omium.org>
>> Signed-off-by: Zhongze Hu <frankhu@...omium.org>
>> Signed-off-by: Todd Poynor <toddpoynor@...gle.com>
>
> I think this patch is good as is, but as a followup you should create
> a patch that supports user namespaces, i.e. replaces
> capable(CAP_SYS_ADMIN) with ns_capable(...) in gasket_open() so you
> can allow containers to control the device, if necessary.
Thanks, I'll add that to the list.
>
> Reviewed-by: Dmitry Torokhov <dtor@...omium.org>
>
> Thanks,
> Dmitry
--
Todd
Powered by blists - more mailing lists