Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2587423imm; Thu, 9 Aug 2018 16:06:35 -0700 (PDT) X-Google-Smtp-Source: AA+uWPxWDzTUMCCiii/kEK0Z/GE4IviZsbfgWWaQRBOl305tRj3l+C0hFSeqqNCYxkCnUtnUJp8L X-Received: by 2002:a63:1d5e:: with SMTP id d30-v6mr3996277pgm.12.1533855995511; Thu, 09 Aug 2018 16:06:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1533855995; cv=none; d=google.com; s=arc-20160816; b=V8P4XN/TTNPeBTLcOQdq5wXkJh6MaH0RkeTSFoISAEzDY9dlwsUGnOb2FeQMYG3Mea xTArGirwbQUVXLRVh4NtziOb5MhlmfS0tGMGwHDHVMccErtufDKAGRf8UR5P+Kb6eXgQ 9RIBq371DgQEwMmiSvD4tnIoSGGtdzIoh/rxnMliV2dajujOMTpkHAlCne/LBmYNa9+V IO2leWc14RPXsX9Cx6f0ocy+iPGNNpHsejmhhsw4rX8Ypq8+r1YWdrwMqIz0y5h+3O+3 4UyZfjrjf8kdo2iIpjyYIsZtvdHTye8LA3H3HSLC9uIWNKItDH90uvOOgI2TkkkShj47 T70Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:subject:user-agent:message-id :references:cc:in-reply-to:from:to:content-transfer-encoding :mime-version:dkim-signature:arc-authentication-results; bh=7qHkOxVlVyaGLDdR6zs2X8MRVLljmE/NXWuhsozuKV4=; b=B31L+s3uNJJRXKNj2e3VrOenBZ//K07KyV0sqgnGZt9VGFOrF/L2mKurRQ4R6sgLXx BOiKEeKrpV7VyoYELSXT0SlHaeiHvNqQ81lzw8pTT7U9DZin6A2GraHNvJ4Qf9nnvPIk HsVJ/EDi76Di3GTNKjefS589WwmOr5V9U0mxlPvhCStDgibAJ14NS5cok9G1AitG4+F8 75v0LDFYwHMCh+jo4no4X6FYBJ7NU4tzxA1VFrO23fQIKGjsipUOYyaW6FFKWA6cG/W2 njgkUk5bOkUth5nYG81mhCg95UhrILruYVHpkjWlPUch/PXAAPdQN8aqwKSZD2sqDNv6 AZpw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=cIMENDdA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q129-v6si8036888pga.217.2018.08.09.16.05.51; Thu, 09 Aug 2018 16:06:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=cIMENDdA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727500AbeHJBaX (ORCPT + 99 others); Thu, 9 Aug 2018 21:30:23 -0400 Received: from mail-pl0-f68.google.com ([209.85.160.68]:40191 "EHLO mail-pl0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726756AbeHJBaW (ORCPT ); Thu, 9 Aug 2018 21:30:22 -0400 Received: by mail-pl0-f68.google.com with SMTP id s17-v6so3165451plp.7 for ; Thu, 09 Aug 2018 16:03:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:content-transfer-encoding:to:from:in-reply-to:cc :references:message-id:user-agent:subject:date; bh=7qHkOxVlVyaGLDdR6zs2X8MRVLljmE/NXWuhsozuKV4=; b=cIMENDdAIES0knWIOW8JvUVYlVVfDbRL+WI+Jtxw3aOz4UsaU1K2U68jGtwfxsbg3u viwEY4qRnxVQyfKQ4tTlSgJ/N2f3ComlqwoYbHjPuiRlZV91ROWWBlC8p9aMw0I5hzBC 9h8NJVPfgpRHRJUnsRWdaBsVGIw2Qz5IdbbL8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:content-transfer-encoding:to:from :in-reply-to:cc:references:message-id:user-agent:subject:date; bh=7qHkOxVlVyaGLDdR6zs2X8MRVLljmE/NXWuhsozuKV4=; b=nHxH7ExbO97HwMFvMkka0iZIvm9uxUHRswRiNgxP01uQNjWoeMwkaAlOw950rBSpWU uVZPtyeX+jxxcQV7REBn9JF9oWW6f8TlIZFnFpWvwPtDKSJNiEnS6Kb4FZnmpZH2ZHtO +js0jPHyCk8ka+9Hsl0qaSCScc+9cXpNAqBu19t5mI0vGewHT4HUqwDi22g5a2xtoXE6 dWyQlGEJBpW8F8zD5j9p01saGJN4eEEoHLU9UNEPZ8dG+sXH6yfRank6NyW9wf8OeKSV dUeDHwMN6ijF6dGI7SqgxegSsNABARMZjvmkB2pBOY0lrFEcdstkA+o0/o+gF0ckBCxb ym4Q== X-Gm-Message-State: AOUpUlEF+I82DMdQS5aC8jc0wwqi3bZ1181sCZQdE2xmdSLDetoNxg1A ZtCHmvuYCPQRNT1OeV7LHNvv9Q== X-Received: by 2002:a17:902:e85:: with SMTP id 5-v6mr3669498plx.73.1533855799965; Thu, 09 Aug 2018 16:03:19 -0700 (PDT) Received: from localhost ([2620:15c:202:201:7e28:b9f3:6afc:5326]) by smtp.gmail.com with ESMTPSA id 16-v6sm12422038pfp.6.2018.08.09.16.03.19 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Thu, 09 Aug 2018 16:03:19 -0700 (PDT) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable To: Julius Werner From: Stephen Boyd In-Reply-To: Cc: Greg Kroah-Hartman , LKML , Wei-Ning Huang , Julius Werner , Brian Norris , samuel@sholland.org References: <20180809171722.144325-1-swboyd@chromium.org> <20180809171722.144325-8-swboyd@chromium.org> Message-ID: <153385579866.220756.16086660810932774163@swboyd.mtv.corp.google.com> User-Agent: alot/0.7 Subject: Re: [PATCH v3 7/7] firmware: coreboot: Request table region for exclusive access Date: Thu, 09 Aug 2018 16:03:18 -0700 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Quoting Julius Werner (2018-08-09 14:07:31) > On Thu, Aug 9, 2018 at 10:17 AM Stephen Boyd wrote: > > > > Call request_mem_region() on the entire coreboot table to make sure > > other devices don't attempt to map the coreboot table in their drivers. > > If drivers need that support, it would be better to provide bus APIs > > they can use to do that through the mapping created in this file. > > > = > Does this prevent userspace from mapping this region via /dev/mem? If > so, let's please not do it to not break compatibility with existing > tools. No it doesn't break. I can still read the memory here with /dev/mem (and cbmem). But that seems to be because of a couple reasons. First, I have CONFIG_STRICT_DEVMEM=3Dy but CONFIG_IO_STRICT_DEVMEM=3Dn. This allows me to map memory that isn't system ram. If CONFIG_IO_STRICT_DEVMEM=3Dy then mapping this I/O region through /dev/mem here would be denied . Furthermore, I see that my system RAM excludes this coreboot table so it doesn't fall into the bucket that CONFIG_STRICT_DEVMEM would find. > (I guess an alternative would be to rewrite 'cbmem' to use > /sys/bus/coreboot/devices if available to get its coreboot table > information. But we'd still need to maintain the old path for > backwards compatibility anyway, so that would really just make it more > complicated.) This sounds like a good idea. Userspace reaching into /dev/mem is not good from a kernel hardening perspective. That's why those strict devmem configs exist. Can cbmem be updated to query information from device drivers instead, so that we can enable CONFIG_IO_STRICT_DEVMEM as well?