mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 10:40:15 +02:00 
			
		
		
		
	don't carry MAY_OPEN in op->acc_mode
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
This commit is contained in:
		
							parent
							
								
									b40ef8696f
								
							
						
					
					
						commit
						62fb4a155f
					
				
					 3 changed files with 12 additions and 18 deletions
				
			
		| 
						 | 
				
			
			@ -119,7 +119,7 @@ SYSCALL_DEFINE1(uselib, const char __user *, library)
 | 
			
		|||
	int error = PTR_ERR(tmp);
 | 
			
		||||
	static const struct open_flags uselib_flags = {
 | 
			
		||||
		.open_flag = O_LARGEFILE | O_RDONLY | __FMODE_EXEC,
 | 
			
		||||
		.acc_mode = MAY_READ | MAY_EXEC | MAY_OPEN,
 | 
			
		||||
		.acc_mode = MAY_READ | MAY_EXEC,
 | 
			
		||||
		.intent = LOOKUP_OPEN,
 | 
			
		||||
		.lookup_flags = LOOKUP_FOLLOW,
 | 
			
		||||
	};
 | 
			
		||||
| 
						 | 
				
			
			@ -763,7 +763,7 @@ static struct file *do_open_execat(int fd, struct filename *name, int flags)
 | 
			
		|||
	int err;
 | 
			
		||||
	struct open_flags open_exec_flags = {
 | 
			
		||||
		.open_flag = O_LARGEFILE | O_RDONLY | __FMODE_EXEC,
 | 
			
		||||
		.acc_mode = MAY_EXEC | MAY_OPEN,
 | 
			
		||||
		.acc_mode = MAY_EXEC,
 | 
			
		||||
		.intent = LOOKUP_OPEN,
 | 
			
		||||
		.lookup_flags = LOOKUP_FOLLOW,
 | 
			
		||||
	};
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										21
									
								
								fs/namei.c
									
									
									
									
									
								
							
							
						
						
									
										21
									
								
								fs/namei.c
									
									
									
									
									
								
							| 
						 | 
				
			
			@ -2663,10 +2663,6 @@ static int may_open(struct path *path, int acc_mode, int flag)
 | 
			
		|||
	struct inode *inode = dentry->d_inode;
 | 
			
		||||
	int error;
 | 
			
		||||
 | 
			
		||||
	/* O_PATH? */
 | 
			
		||||
	if (!acc_mode)
 | 
			
		||||
		return 0;
 | 
			
		||||
 | 
			
		||||
	if (!inode)
 | 
			
		||||
		return -ENOENT;
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -2688,7 +2684,7 @@ static int may_open(struct path *path, int acc_mode, int flag)
 | 
			
		|||
		break;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	error = inode_permission(inode, acc_mode);
 | 
			
		||||
	error = inode_permission(inode, MAY_OPEN | acc_mode);
 | 
			
		||||
	if (error)
 | 
			
		||||
		return error;
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -2880,7 +2876,7 @@ static int atomic_open(struct nameidata *nd, struct dentry *dentry,
 | 
			
		|||
	if (*opened & FILE_CREATED) {
 | 
			
		||||
		WARN_ON(!(open_flag & O_CREAT));
 | 
			
		||||
		fsnotify_create(dir, dentry);
 | 
			
		||||
		acc_mode = MAY_OPEN;
 | 
			
		||||
		acc_mode = 0;
 | 
			
		||||
	}
 | 
			
		||||
	error = may_open(&file->f_path, acc_mode, open_flag);
 | 
			
		||||
	if (error)
 | 
			
		||||
| 
						 | 
				
			
			@ -3093,7 +3089,7 @@ static int do_last(struct nameidata *nd,
 | 
			
		|||
		/* Don't check for write permission, don't truncate */
 | 
			
		||||
		open_flag &= ~O_TRUNC;
 | 
			
		||||
		will_truncate = false;
 | 
			
		||||
		acc_mode = MAY_OPEN;
 | 
			
		||||
		acc_mode = 0;
 | 
			
		||||
		path_to_nameidata(&path, nd);
 | 
			
		||||
		goto finish_open_created;
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			@ -3177,10 +3173,11 @@ static int do_last(struct nameidata *nd,
 | 
			
		|||
		got_write = true;
 | 
			
		||||
	}
 | 
			
		||||
finish_open_created:
 | 
			
		||||
	error = may_open(&nd->path, acc_mode, open_flag);
 | 
			
		||||
	if (error)
 | 
			
		||||
		goto out;
 | 
			
		||||
 | 
			
		||||
	if (likely(!(open_flag & O_PATH))) {
 | 
			
		||||
		error = may_open(&nd->path, acc_mode, open_flag);
 | 
			
		||||
		if (error)
 | 
			
		||||
			goto out;
 | 
			
		||||
	}
 | 
			
		||||
	BUG_ON(*opened & FILE_OPENED); /* once it's opened, it's opened */
 | 
			
		||||
	error = vfs_open(&nd->path, file, current_cred());
 | 
			
		||||
	if (!error) {
 | 
			
		||||
| 
						 | 
				
			
			@ -3267,7 +3264,7 @@ static int do_tmpfile(struct nameidata *nd, unsigned flags,
 | 
			
		|||
		goto out2;
 | 
			
		||||
	audit_inode(nd->name, child, 0);
 | 
			
		||||
	/* Don't check for other permissions, the inode was just created */
 | 
			
		||||
	error = may_open(&path, MAY_OPEN, op->open_flag);
 | 
			
		||||
	error = may_open(&path, 0, op->open_flag);
 | 
			
		||||
	if (error)
 | 
			
		||||
		goto out2;
 | 
			
		||||
	file->f_path.mnt = path.mnt;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -887,7 +887,7 @@ EXPORT_SYMBOL(dentry_open);
 | 
			
		|||
static inline int build_open_flags(int flags, umode_t mode, struct open_flags *op)
 | 
			
		||||
{
 | 
			
		||||
	int lookup_flags = 0;
 | 
			
		||||
	int acc_mode;
 | 
			
		||||
	int acc_mode = ACC_MODE(flags);
 | 
			
		||||
 | 
			
		||||
	if (flags & (O_CREAT | __O_TMPFILE))
 | 
			
		||||
		op->mode = (mode & S_IALLUGO) | S_IFREG;
 | 
			
		||||
| 
						 | 
				
			
			@ -909,7 +909,6 @@ static inline int build_open_flags(int flags, umode_t mode, struct open_flags *o
 | 
			
		|||
	if (flags & __O_TMPFILE) {
 | 
			
		||||
		if ((flags & O_TMPFILE_MASK) != O_TMPFILE)
 | 
			
		||||
			return -EINVAL;
 | 
			
		||||
		acc_mode = MAY_OPEN | ACC_MODE(flags);
 | 
			
		||||
		if (!(acc_mode & MAY_WRITE))
 | 
			
		||||
			return -EINVAL;
 | 
			
		||||
	} else if (flags & O_PATH) {
 | 
			
		||||
| 
						 | 
				
			
			@ -919,8 +918,6 @@ static inline int build_open_flags(int flags, umode_t mode, struct open_flags *o
 | 
			
		|||
		 */
 | 
			
		||||
		flags &= O_DIRECTORY | O_NOFOLLOW | O_PATH;
 | 
			
		||||
		acc_mode = 0;
 | 
			
		||||
	} else {
 | 
			
		||||
		acc_mode = MAY_OPEN | ACC_MODE(flags);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	op->open_flag = flags;
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in a new issue