On Thu, Jun 29, 2017 at 9:19 PM, Mika Westerberg
<mika.westerb...@linux.intel.com> wrote:
> Firmware upgrade tools that decide which NVM image should be uploaded to
> the Thunderbolt controller need to access active parts of the NVM even
> if they are not run as root. The information in active NVM is not
> considered security critical so we can use the default permissions set
> by the NVMem framework.
>
> Writing the NVM image is still left as root only operation.
>
> While there mark the active NVM as read-only in the filesystem.
>
> Reported-by: Yehezkel Bernat <yehezkel.ber...@intel.com>
> Signed-off-by: Mika Westerberg <mika.westerb...@linux.intel.com>

Sorry for the late reply (I'm on vacation :P).

Signed-off-by: Andreas Noever <andreas.noe...@gmail.com>

> ---
> Hi,
>
> This applies on top of my Thunderbolt patches in Greg's char-misc-next
> branch.
>
> Thanks.
>
>  drivers/thunderbolt/switch.c | 3 ++-
>  1 file changed, 2 insertions(+), 1 deletion(-)
>
> diff --git a/drivers/thunderbolt/switch.c b/drivers/thunderbolt/switch.c
> index ab3e8f410444..40219a706309 100644
> --- a/drivers/thunderbolt/switch.c
> +++ b/drivers/thunderbolt/switch.c
> @@ -281,9 +281,11 @@ static struct nvmem_device *register_nvmem(struct 
> tb_switch *sw, int id,
>         if (active) {
>                 config.name = "nvm_active";
>                 config.reg_read = tb_switch_nvm_read;
> +               config.read_only = true;
>         } else {
>                 config.name = "nvm_non_active";
>                 config.reg_write = tb_switch_nvm_write;
> +               config.root_only = true;
>         }
>
>         config.id = id;
> @@ -292,7 +294,6 @@ static struct nvmem_device *register_nvmem(struct 
> tb_switch *sw, int id,
>         config.size = size;
>         config.dev = &sw->dev;
>         config.owner = THIS_MODULE;
> -       config.root_only = true;
>         config.priv = sw;
>
>         return nvmem_register(&config);
> --
> 2.11.0
>

Reply via email to