[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20190103000213.230652-3-evgreen@chromium.org>
Date: Wed, 2 Jan 2019 16:02:13 -0800
From: Evan Green <evgreen@...omium.org>
To: Andy Gross <andy.gross@...aro.org>
Cc: Bjorn Andersson <bjorn.andersson@...aro.org>,
Brian Norris <briannorris@...omium.org>,
Ben Chan <benchan@...omium.org>,
Evan Green <evgreen@...omium.org>,
linux-arm-msm@...r.kernel.org,
David Brown <david.brown@...aro.org>,
linux-kernel@...r.kernel.org
Subject: [PATCH v3 2/2] soc: qcom: rmtfs-mem: Make sysfs attributes world-readable
In order to run an rmtfs daemon as an unprivileged user, that user would
need access to the phys_addr and size sysfs attributes. Sharing these
attributes with unprivileged users doesn't really leak anything
sensitive, since if you have access to physical memory, the jig is
up anyway.
Make those attributes readable by all.
Signed-off-by: Evan Green <evgreen@...omium.org>
Reviewed-by: Brian Norris <briannorris@...omium.org>
Reviewed-by: Bjorn Andersson <bjorn.andersson@...aro.org>
---
Changes in v3: None
Changes in v2: None
drivers/soc/qcom/rmtfs_mem.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/soc/qcom/rmtfs_mem.c b/drivers/soc/qcom/rmtfs_mem.c
index b2fa8fc8016c0..7200d762a9510 100644
--- a/drivers/soc/qcom/rmtfs_mem.c
+++ b/drivers/soc/qcom/rmtfs_mem.c
@@ -45,9 +45,9 @@ static ssize_t qcom_rmtfs_mem_show(struct device *dev,
struct device_attribute *attr,
char *buf);
-static DEVICE_ATTR(phys_addr, 0400, qcom_rmtfs_mem_show, NULL);
-static DEVICE_ATTR(size, 0400, qcom_rmtfs_mem_show, NULL);
-static DEVICE_ATTR(client_id, 0400, qcom_rmtfs_mem_show, NULL);
+static DEVICE_ATTR(phys_addr, 0444, qcom_rmtfs_mem_show, NULL);
+static DEVICE_ATTR(size, 0444, qcom_rmtfs_mem_show, NULL);
+static DEVICE_ATTR(client_id, 0444, qcom_rmtfs_mem_show, NULL);
static ssize_t qcom_rmtfs_mem_show(struct device *dev,
struct device_attribute *attr,
--
2.18.1
Powered by blists - more mailing lists