Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1126114pxb; Thu, 4 Mar 2021 04:07:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJwU+snrgfPYXyKhPsOgG8TZuliCrJrwBHfAbPutsuXpRxG8ZH8siBPqUgUACb15Tm9SVKx/ X-Received: by 2002:a17:906:a44:: with SMTP id x4mr3773071ejf.101.1614859632092; Thu, 04 Mar 2021 04:07:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614859632; cv=none; d=google.com; s=arc-20160816; b=GpiUAK2hIGsHnLWEflxsN6gsvErhh0hs9ogJE0bxDjazwzdcwXUxq+pVoYPneJd+sh eB33MqHCykOWZpon3PEQ1JSkwzrjMLPAwVnVl3yL9vu2/z/qUPo1AJPmdEKF7SsWy3hI pwHzXa/r4YS7wdAgtrMdqRm7x9RF180LWt4ferD/ySziAZzMwLjKebGKN1tWdYxOS/d5 bCQorowTwjP62fh3N84VB6ttDZgSAvVGui87q6aK8+oDL6k9N4xxnLAYG1oejti9q706 Clqzh3U43rIqpgl/mPJL792KPxU3qQERelsdx32HHKDxdnnqoxYNPixC6AS43hcq5FtV 31rA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=4p1DEoVyZ0ul8zQDDAxlxC/Kk9l9swD/AvRf7fZLd+4=; b=ooQ8TvPmSrtUckWGdAzL1eRcNQlSk9/CfavvxZY3ukf0HiuDFEF3WUFd9/wyk63qK3 isPODW2+EJ/uTCVUEcaPKgwaHCOBE8KgT6iu23AkUFkGVrnP/1eW5aXkkfPdZM4hJ+QC Lg2LJmekQhdYuUEPgXhLSE2GOHyjPTP1Cbgf1eERFbdTbGjK1X9KVO6QtylLwquYjOJy m5i2T2aYaVArC77dLggMk+86il1zvQ8kzILbtrCf+LEbhxyalEaMf9fB1oPOWtImrWkM WPq0I0tBFG661uurL3X/Fi95D+g0xuIswujWXxF9RWQY3s3J6CpjeVY73P4p2nKITQa3 SJNA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@walle.cc header.s=mail2016061301 header.b=XZ+1FoQB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h6si17008023ejs.315.2021.03.04.04.06.49; Thu, 04 Mar 2021 04:07:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@walle.cc header.s=mail2016061301 header.b=XZ+1FoQB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1578269AbhCCSQ4 (ORCPT + 99 others); Wed, 3 Mar 2021 13:16:56 -0500 Received: from ssl.serverraum.org ([176.9.125.105]:60637 "EHLO ssl.serverraum.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343964AbhCCP61 (ORCPT ); Wed, 3 Mar 2021 10:58:27 -0500 Received: from mwalle01.fritz.box (unknown [IPv6:2a02:810c:c200:2e91:fa59:71ff:fe9b:b851]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ssl.serverraum.org (Postfix) with ESMTPSA id 84BB32223A; Wed, 3 Mar 2021 16:57:42 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=walle.cc; s=mail2016061301; t=1614787063; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=4p1DEoVyZ0ul8zQDDAxlxC/Kk9l9swD/AvRf7fZLd+4=; b=XZ+1FoQBNNGvpzi04s+0FINOgnBBSq2AMuVWXQnR+eSts0E2Znv9gr9YMLNazvAgnfovB1 Bp8BykjoDDmRDmeOAD4g/Cx9xW+ENvb1TMupm/IiOa5WSe/C3lGcECXI8fxT40lrS61997 r0ynvzFZk/7FTTJZr5jyuHHwT1bTPBg= From: Michael Walle To: linux-mtd@lists.infradead.org, linux-kernel@vger.kernel.org Cc: Miquel Raynal , Richard Weinberger , Vignesh Raghavendra , Greg Kroah-Hartman , Michael Walle Subject: [PATCH] mtd: require write permissions for locking and badblock ioctls Date: Wed, 3 Mar 2021 16:57:35 +0100 Message-Id: <20210303155735.25887-1-michael@walle.cc> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org MEMLOCK, MEMUNLOCK and OTPLOCK modify protection bits. Thus require write permission. Depending on the hardware MEMLOCK might even be write-once, e.g. for SPI-NOR flashes with their WP# tied to GND. OTPLOCK is always write-once. MEMSETBADBLOCK modifies the bad block table. Fixes: f7e6b19bc764 ("mtd: properly check all write ioctls for permissions") Signed-off-by: Michael Walle --- drivers/mtd/mtdchar.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/drivers/mtd/mtdchar.c b/drivers/mtd/mtdchar.c index 57c4a2f0b703..30c8273c1eff 100644 --- a/drivers/mtd/mtdchar.c +++ b/drivers/mtd/mtdchar.c @@ -643,16 +643,12 @@ static int mtdchar_ioctl(struct file *file, u_int cmd, u_long arg) case MEMGETINFO: case MEMREADOOB: case MEMREADOOB64: - case MEMLOCK: - case MEMUNLOCK: case MEMISLOCKED: case MEMGETOOBSEL: case MEMGETBADBLOCK: - case MEMSETBADBLOCK: case OTPSELECT: case OTPGETREGIONCOUNT: case OTPGETREGIONINFO: - case OTPLOCK: case ECCGETLAYOUT: case ECCGETSTATS: case MTDFILEMODE: @@ -663,9 +659,13 @@ static int mtdchar_ioctl(struct file *file, u_int cmd, u_long arg) /* "dangerous" commands */ case MEMERASE: case MEMERASE64: + case MEMLOCK: + case MEMUNLOCK: + case MEMSETBADBLOCK: case MEMWRITEOOB: case MEMWRITEOOB64: case MEMWRITE: + case OTPLOCK: if (!(file->f_mode & FMODE_WRITE)) return -EPERM; break; -- 2.20.1