diff options
author | 2025-04-29 19:46:21 -0700 | |
---|---|---|
committer | 2025-05-01 09:43:48 -0700 | |
commit | 1b3f2bd04d90f61e1f291b5e365b9bc4ce0ea7c7 (patch) | |
tree | 1ea766f39a277a5b1305905e64aa187da0d7c954 /scripts/gdb/linux/utils.py | |
parent | x86/mm: Remove now unused SHARED_KERNEL_PMD (diff) | |
download | linux-rng-1b3f2bd04d90f61e1f291b5e365b9bc4ce0ea7c7.tar.xz linux-rng-1b3f2bd04d90f61e1f291b5e365b9bc4ce0ea7c7.zip |
x86/devmem: Remove duplicate range_is_allowed() definition
17 years ago, Venki suggested [1] "A future improvement would be to
avoid the range_is_allowed duplication".
The only thing preventing a common implementation is that
phys_mem_access_prot_allowed() expects the range check to exit
immediately when PAT is disabled [2]. I.e. there is no cache conflict to
manage in that case. This cleanup was noticed on the path to
considering changing range_is_allowed() policy to blanket deny /dev/mem
for private (confidential computing) memory.
Note, however that phys_mem_access_prot_allowed() has long since stopped
being relevant for managing cache-type validation due to [3], and [4].
Commit 0124cecfc85a ("x86, PAT: disable /dev/mem mmap RAM with PAT") [1]
Commit 9e41bff2708e ("x86: fix /dev/mem mmap breakage when PAT is disabled") [2]
Commit 1886297ce0c8 ("x86/mm/pat: Fix BUG_ON() in mmap_mem() on QEMU/i386") [3]
Commit 0c3c8a18361a ("x86, PAT: Remove duplicate memtype reserve in devmem mmap") [4]
Signed-off-by: Dan Williams <dan.j.williams@intel.com>
Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com>
Reviewed-by: Nikolay Borisov <nik.borisov@suse.com>
Reviewed-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Link: https://lore.kernel.org/all/20250430024622.1134277-2-dan.j.williams%40intel.com
Diffstat (limited to 'scripts/gdb/linux/utils.py')
0 files changed, 0 insertions, 0 deletions