• Daniel Vetter's avatar
    PCI: Obey iomem restrictions for procfs mmap · dc217d2c
    Daniel Vetter authored
    There's three ways to access PCI BARs from userspace: /dev/mem, sysfs
    files, and the old proc interface. Two check against
    iomem_is_exclusive, proc never did. And with CONFIG_IO_STRICT_DEVMEM,
    this starts to matter, since we don't want random userspace having
    access to PCI BARs while a driver is loaded and using it.
    
    Fix this by adding the same iomem_is_exclusive() check we already have
    on the sysfs side in pci_mmap_resource().
    Acked-by: default avatarBjorn Helgaas <bhelgaas@google.com>
    References: 90a545e9 ("restrict /dev/mem to idle io memory ranges")
    Signed-off-by: default avatarDaniel Vetter <daniel.vetter@intel.com>
    Cc: Jason Gunthorpe <jgg@ziepe.ca>
    Cc: Kees Cook <keescook@chromium.org>
    Cc: Dan Williams <dan.j.williams@intel.com>
    Cc: Andrew Morton <akpm@linux-foundation.org>
    Cc: John Hubbard <jhubbard@nvidia.com>
    Cc: Jérôme Glisse <jglisse@redhat.com>
    Cc: Jan Kara <jack@suse.cz>
    Cc: Dan Williams <dan.j.williams@intel.com>
    Cc: linux-mm@kvack.org
    Cc: linux-arm-kernel@lists.infradead.org
    Cc: linux-samsung-soc@vger.kernel.org
    Cc: linux-media@vger.kernel.org
    Cc: Bjorn Helgaas <bhelgaas@google.com>
    Cc: linux-pci@vger.kernel.org
    Signed-off-by: default avatarDaniel Vetter <daniel.vetter@ffwll.ch>
    Link: https://patchwork.freedesktop.org/patch/msgid/20201127164131.2244124-9-daniel.vetter@ffwll.ch
    dc217d2c
proc.c 9.66 KB