Received: by 2002:ac0:a874:0:0:0:0:0 with SMTP id c49csp471997ima; Fri, 15 Mar 2019 07:03:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqwNudIQR2OLwouPe0bB/mfUbBIewlmTsg+IPTQXLAycLUYkC1rdQYPYkVYvUiHMYRkVejyx X-Received: by 2002:a17:902:586:: with SMTP id f6mr4349327plf.68.1552658591780; Fri, 15 Mar 2019 07:03:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552658591; cv=none; d=google.com; s=arc-20160816; b=ag4nlF7s2TlJ6pRqXoE6gVQnw5R2p8taqQcy4qiQsk7Ly1ILmGbGhQZVoIflShvKjZ 0I59dJMoYnN21XQz95EUvds5iSOSgo2sSRbLcyaYuInl6VlPeQQ1IJczYHBW2ImiujeF Rzm4pJ/pvpqfMRjYP5nhfD2ZH6S5QuYpmlyRrxxeGwyfuQdERKPpmAXkP2OLz/rGE6um vwyjU+Uy+CdAfGgfEvQbDzDk8fs8kwp1Qc2lhljKPllcEud7nakw2Xs0K/UpZ+lUtIn/ oRWyFDZEzJy9GTYdiI6UysABQeeGkGM/2V87eSIi/ivfUoo+EZqHy2RJUvCZQxyBYTU7 zYmw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=TsYlPJDcdAEcP7V1FsXTQnv92wlc+4D9PK7k66SlkV4=; b=gEwPXuBmzOEzQuzyAO/sFzJkEJvsH1dz/X4FzE1LsEbKODEYA2Ta1dOthJVoZG4a8x cTONGzxJdzXKP29DL8irqXdIGJc48BUMJ+Oh8NR8cRABA3T7Klc9o18PSRpWfGxQs1Rz 8LGwr2y4WvqaR4XsowrVuyC/tYx4cZlPobuQOcCF5tz7DIn+EqbHXOKaVjhBcWlM4nGh rjKlXoLFkeXsVbg0NGsWKOoOxH8KDBKvIHIR4PlVqgRszpScGL/HXTBnNggKcA49/Vk1 FfBxze94vGHucbJWoZSIiEHInmfFu2tj3FiLXL9c+uv4j4UaLenI9d2Rh9LPWKf7tT09 obbw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e1si1799574pgs.451.2019.03.15.07.02.54; Fri, 15 Mar 2019 07:03:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729185AbfCOOCL (ORCPT + 99 others); Fri, 15 Mar 2019 10:02:11 -0400 Received: from alexa-out-blr-02.qualcomm.com ([103.229.18.198]:47894 "EHLO alexa-out-blr.qualcomm.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729001AbfCOOCK (ORCPT ); Fri, 15 Mar 2019 10:02:10 -0400 X-IronPort-AV: E=Sophos;i="5.58,482,1544466600"; d="scan'208";a="381568" Received: from ironmsg01-blr.qualcomm.com ([10.86.208.130]) by alexa-out-blr.qualcomm.com with ESMTP/TLS/AES256-SHA; 15 Mar 2019 19:29:10 +0530 X-IronPort-AV: E=McAfee;i="5900,7806,9195"; a="7884577" Received: from gkohli-linux.qualcomm.com ([10.204.78.26]) by ironmsg01-blr.qualcomm.com with ESMTP; 15 Mar 2019 19:29:10 +0530 Received: by gkohli-linux.qualcomm.com (Postfix, from userid 427023) id 396A01B5F; Fri, 15 Mar 2019 19:29:09 +0530 (IST) From: Gaurav Kohli To: srinivas.kandagatla@linaro.org, linux-kernel@vger.kernel.org Cc: linux-arm-msm@vger.kernel.org, Gaurav Kohli Subject: [PATCH v1] nvmem: core: Set no-read-write provider to avoid userspace read/write Date: Fri, 15 Mar 2019 19:29:05 +0530 Message-Id: <1552658345-13450-1-git-send-email-gkohli@codeaurora.org> X-Mailer: git-send-email 1.9.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Current nvmem framework allows user space to read all register space populated by nvmem binary file, In case we don't want to expose value of registers to userspace and only want kernel space to read cell value from nvmem_cell_read_u32. To protect the same, Add no-read-write property to prevent read from userspace. Signed-off-by: Gaurav Kohli --- v1: Fix no_read_write update condition diff --git a/drivers/nvmem/core.c b/drivers/nvmem/core.c index f24008b..d9594ee 100644 --- a/drivers/nvmem/core.c +++ b/drivers/nvmem/core.c @@ -27,6 +27,7 @@ struct nvmem_device { struct kref refcnt; size_t size; bool read_only; + bool no_read_write; int flags; enum nvmem_type type; struct bin_attribute eeprom; @@ -120,6 +121,9 @@ static ssize_t bin_attr_nvmem_read(struct file *filp, struct kobject *kobj, dev = container_of(kobj, struct device, kobj); nvmem = to_nvmem_device(dev); + /* if no-read-write, then stop from reading */ + if (nvmem->no_read_write) + return -EPERM; /* Stop the user from reading */ if (pos >= nvmem->size) return 0; @@ -154,6 +158,10 @@ static ssize_t bin_attr_nvmem_write(struct file *filp, struct kobject *kobj, dev = container_of(kobj, struct device, kobj); nvmem = to_nvmem_device(dev); + /* if no-read-write, then stop from writing */ + if (nvmem->no_read_write) + return -EPERM; + /* Stop the user from writing */ if (pos >= nvmem->size) return -EFBIG; @@ -651,6 +659,8 @@ struct nvmem_device *nvmem_register(const struct nvmem_config *config) nvmem->read_only = device_property_present(config->dev, "read-only") || config->read_only || !nvmem->reg_write; + nvmem->no_read_write = of_property_read_bool(np, "no-read-write"); + if (config->root_only) nvmem->dev.groups = nvmem->read_only ? nvmem_ro_root_dev_groups : -- Qualcomm India Private Limited, on behalf of Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project.