Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp557447pxu; Wed, 7 Oct 2020 09:49:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy/iBogMs/4NmUocRVWTaUqwWj2bQNJopP08AldZFa1jw0Rhrvc03TCVBCbe2BxDWaDkrgI X-Received: by 2002:a17:906:3ac5:: with SMTP id z5mr4319772ejd.46.1602089382777; Wed, 07 Oct 2020 09:49:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602089382; cv=none; d=google.com; s=arc-20160816; b=A/40G1ubW4Y5fmvJw7VCMN6NcGw9BefcwAPQA6xuUITGYOU4C3uMoj1XmFU69XQXpr VwthO0wZTHVRhhUOF9VAsWYS4MfIK1kd172v7gxUH+GLh+8oG+q5tzBtWtVrHF30Nojd GwK/aRdFuLQ9mo+3UGOxdyNgPSBodf+FiC/4CvmQFHYdiMgA7wiE4Dz0xE2Rci7OXpvg k5b9YQzLSzPODOtJBfvdfu+qDi8EeWB7LSNK3MIL2bk10JmDzy3TlzMTViT/LljGP8MS ksSiblPKWRfN877Xkgl0VyEM1nOWGzfiypqMv9D2kuwXs/L9aAEM/UacQHMF5pvJTUZz bZ3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=P02GBIE7m0UGj1Ja16VfRtl1rny8rrQDbz10f0cDTbo=; b=oruvHfvGzdzS9XqcoiaGPu4iUtNXEk+DWebrQ18jeVc5kv+C2rnDKgU38GNjwJtoro 4FmzTtJm1vegx/fblFHNEiNEMAWybYEGhuxNzP0atvYVMsAnTEik83bD+btlJUEEf5OJ g2jBl7jcm/WOgrxMHtWeTuWOSNd/BeeZmFxWVDvV2XT5t6fH4xw6bjYz5ABhO7b4qpJd VMHreRcT/8vTDFh92iiv1LfS1mt2U3T89wEI1WJ3+D8rfRRBN9y78hTAA6McCrPApu0c LMMKgarsiNGo/iOP91Nv2yfHPCEEm4f5PXnXOMBDYYyEYVLOv2/Rq0LYxP9IffAjgdg7 BVCg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=jOfg2aPb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e8si2052529ejh.23.2020.10.07.09.49.19; Wed, 07 Oct 2020 09:49:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=jOfg2aPb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728826AbgJGQpr (ORCPT + 99 others); Wed, 7 Oct 2020 12:45:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52714 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728365AbgJGQor (ORCPT ); Wed, 7 Oct 2020 12:44:47 -0400 Received: from mail-wr1-x441.google.com (mail-wr1-x441.google.com [IPv6:2a00:1450:4864:20::441]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5F0A2C061755 for ; Wed, 7 Oct 2020 09:44:47 -0700 (PDT) Received: by mail-wr1-x441.google.com with SMTP id e17so2959826wru.12 for ; Wed, 07 Oct 2020 09:44:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=P02GBIE7m0UGj1Ja16VfRtl1rny8rrQDbz10f0cDTbo=; b=jOfg2aPb+p2PctbbcpGPk2VTV8x+SKSCmFeHr5kNnGpMzP9+KndzTdMPcmKSmVIBOL Sn8AtpmXpRju+60FUKJKw5WoTBtH4QSJvymhz/0+3ZeCxQuRUo3jPklVq4Ib9EuOwEj2 sPoeQoG2BgasR1J/L7Iui7jQ8XopY468hCzwc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=P02GBIE7m0UGj1Ja16VfRtl1rny8rrQDbz10f0cDTbo=; b=QsbvtgV4S8gq6sDPLMZv7KPW+0W0Tf9gWiaPIGI5TlhdUkw0sOk5aKioj0+g5smzXJ 5Qmf/PWu0PjrSD9Ouzq44tNZYz8HPEK4spce6Y+GmxFdjaZ6PvBmOPEkmpkUaEe/gLuw rR3Ht34iClRQCXepIxsl9dtMSdALB7uXmHS2M81DC1vXHW9r5wUuRMV0R/WggeOi4fpo BYtHILemT9bGwRN317o8A8S9jpmu+y7130WnQxcTHP9PypYUP2+mCWhptpOgLZWvgFE9 MeYt8/0+D/aIIkeEEl2V+YFmHEHROimsV/I78MusOe/9TmID7g6AQkIgZjr5GJInDopp +SyA== X-Gm-Message-State: AOAM530W2NH2ASTyXuO7zNAeEy1qtBMthIOX/QJyX09eYSBcQrjh8jg4 JTvN1TFSJeX23Kfs/qutdn7kuQ== X-Received: by 2002:adf:ba4f:: with SMTP id t15mr4383017wrg.335.1602089086053; Wed, 07 Oct 2020 09:44:46 -0700 (PDT) Received: from phenom.ffwll.local ([2a02:168:57f4:0:efd0:b9e5:5ae6:c2fa]) by smtp.gmail.com with ESMTPSA id z191sm3332280wme.40.2020.10.07.09.44.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 07 Oct 2020 09:44:45 -0700 (PDT) From: Daniel Vetter To: DRI Development , LKML Cc: kvm@vger.kernel.org, linux-mm@kvack.org, linux-arm-kernel@lists.infradead.org, linux-samsung-soc@vger.kernel.org, linux-media@vger.kernel.org, linux-s390@vger.kernel.org, Daniel Vetter , Daniel Vetter , Jason Gunthorpe , Kees Cook , Dan Williams , Andrew Morton , John Hubbard , =?UTF-8?q?J=C3=A9r=C3=B4me=20Glisse?= , Jan Kara , Bjorn Helgaas , linux-pci@vger.kernel.org Subject: [PATCH 09/13] PCI: obey iomem restrictions for procfs mmap Date: Wed, 7 Oct 2020 18:44:22 +0200 Message-Id: <20201007164426.1812530-10-daniel.vetter@ffwll.ch> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20201007164426.1812530-1-daniel.vetter@ffwll.ch> References: <20201007164426.1812530-1-daniel.vetter@ffwll.ch> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org There's three ways to access pci bars from userspace: /dev/mem, sysfs files, and the old proc interface. Two check against iomem_is_exclusive, proc never did. And with CONFIG_IO_STRICT_DEVMEM, this starts to matter, since we don't want random userspace having access to pci bars while a driver is loaded and using it. Fix this. References: 90a545e98126 ("restrict /dev/mem to idle io memory ranges") Signed-off-by: Daniel Vetter Cc: Jason Gunthorpe Cc: Kees Cook Cc: Dan Williams Cc: Andrew Morton Cc: John Hubbard Cc: Jérôme Glisse Cc: Jan Kara Cc: Dan Williams Cc: linux-mm@kvack.org Cc: linux-arm-kernel@lists.infradead.org Cc: linux-samsung-soc@vger.kernel.org Cc: linux-media@vger.kernel.org Cc: Bjorn Helgaas Cc: linux-pci@vger.kernel.org --- drivers/pci/proc.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/drivers/pci/proc.c b/drivers/pci/proc.c index d35186b01d98..3a2f90beb4cb 100644 --- a/drivers/pci/proc.c +++ b/drivers/pci/proc.c @@ -274,6 +274,11 @@ static int proc_bus_pci_mmap(struct file *file, struct vm_area_struct *vma) else return -EINVAL; } + + if (dev->resource[i].flags & IORESOURCE_MEM && + iomem_is_exclusive(dev->resource[i].start)) + return -EINVAL; + ret = pci_mmap_page_range(dev, i, vma, fpriv->mmap_state, write_combine); if (ret < 0) -- 2.28.0