[PATCH v3 03/13] arm64: improve CONFIG_STRICT_DEVMEM handling

Ard Biesheuvel ard.biesheuvel at linaro.org
Wed Nov 26 08:23:34 PST 2014


On 26 November 2014 at 10:30, Dave Young <dyoung at redhat.com> wrote:
> On 11/18/14 at 01:57pm, Ard Biesheuvel wrote:
>> Improve the handling of /dev/mem mappings under CONFIG_STRICT_DEVMEM by:
>> - allowing read-only access to parts of System RAM that are not
>>   considered memory by the kernel, this is mainly intended for exposing
>>   UEFI Configuration tables to userland;
>
> Ard, can you elabrate a bit? Are this for the acpi case because no dtb in
> procfs?
>

No, that is a different issue.

> Anyway I also think using /dev/mem looks not a good way to expose
> infomation to userspace.
>

This is for compatibility with existing tools like dmidecode and lshw
that already use /dev/mem.
However, on x86, the tables they access are in iomem resource ranges
that are accessible under CONFIG_STRICT_DEVMEM, whereas on arm64,
those regions are inaccessible.

So while our position is that using /dev/mem for *anything* is an
awful idea, this particular patch just tries to bring arm64 in line
with what currently existing tools expect.

-- 
Ard.



>> - avoid using non-cached mappings for those parts of System RAM, as it
>>   may result in mismatched attributes.
>>
>> Signed-off-by: Ard Biesheuvel <ard.biesheuvel at linaro.org>
>> ---
>>  arch/arm64/mm/mmap.c |  5 +++--
>>  arch/arm64/mm/mmu.c  | 15 ++++++++++++++-
>>  2 files changed, 17 insertions(+), 3 deletions(-)
>>
>> diff --git a/arch/arm64/mm/mmap.c b/arch/arm64/mm/mmap.c
>> index 1d73662f00ff..802cdf0df921 100644
>> --- a/arch/arm64/mm/mmap.c
>> +++ b/arch/arm64/mm/mmap.c
>> @@ -127,14 +127,15 @@ int valid_mmap_phys_addr_range(unsigned long pfn, size_t size)
>>  /*
>>   * devmem_is_allowed() checks to see if /dev/mem access to a certain address
>>   * is valid. The argument is a physical page number.  We mimic x86 here by
>> - * disallowing access to system RAM as well as device-exclusive MMIO regions.
>> + * disallowing access to system RAM that is in active use by the kernel, as
>> + * well as device-exclusive MMIO regions.
>>   * This effectively disable read()/write() on /dev/mem.
>>   */
>>  int devmem_is_allowed(unsigned long pfn)
>>  {
>>       if (iomem_is_exclusive(pfn << PAGE_SHIFT))
>>               return 0;
>> -     if (!page_is_ram(pfn))
>> +     if (!pfn_valid(pfn))
>>               return 1;
>>       return 0;
>>  }
>> diff --git a/arch/arm64/mm/mmu.c b/arch/arm64/mm/mmu.c
>> index 4d583aa9ff4e..93ba10838359 100644
>> --- a/arch/arm64/mm/mmu.c
>> +++ b/arch/arm64/mm/mmu.c
>> @@ -121,7 +121,7 @@ early_param("cachepolicy", early_cachepolicy);
>>  pgprot_t phys_mem_access_prot(struct file *file, unsigned long pfn,
>>                             unsigned long size, pgprot_t vma_prot)
>>  {
>> -     if (!pfn_valid(pfn))
>> +     if (!page_is_ram(pfn))
>>               return pgprot_noncached(vma_prot);
>>       else if (file->f_flags & O_SYNC)
>>               return pgprot_writecombine(vma_prot);
>> @@ -129,6 +129,19 @@ pgprot_t phys_mem_access_prot(struct file *file, unsigned long pfn,
>>  }
>>  EXPORT_SYMBOL(phys_mem_access_prot);
>>
>> +/*
>> + * This definition of phys_mem_access_prot_allowed() overrides
>> + * the __weak definition in drivers/char/mem.c
>> + */
>> +int phys_mem_access_prot_allowed(struct file *file, unsigned long pfn,
>> +                              unsigned long size, pgprot_t *prot)
>> +{
>> +     /* Disallow read-write access to reserved system RAM */
>> +     if ((pgprot_val(*prot) & PTE_WRITE) && page_is_ram(pfn))
>> +             return 0;
>> +     return 1;
>> +}
>> +
>>  static void __init *early_alloc(unsigned long sz)
>>  {
>>       void *ptr = __va(memblock_alloc(sz, sz));
>> --
>> 1.8.3.2
>>



More information about the linux-arm-kernel mailing list