linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH 0/2] x86/efi: Enable restrictive mapping of EFI runtime
@ 2016-01-30  1:04 Sai Praneeth Prakhya
       [not found] ` <1454115880-6914-1-git-send-email-sai.praneeth.prakhya-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
  0 siblings, 1 reply; 6+ messages in thread
From: Sai Praneeth Prakhya @ 2016-01-30  1:04 UTC (permalink / raw)
  To: linux-efi-u79uwXL29TY76Z2rM5mHXA
  Cc: Sai Praneeth, Borislav Petkov, Lee, Chun-Yi, Ricardo Neri,
	Ravi Shankar, Matt Fleming

From: Sai Praneeth <sai.praneeth.prakhya-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>

UEFI v2.5 specification introduced a new configuration table called 
EFI_PROPERTIES_TABLE. Currently it is only used to convey that UEFI 
runtime code and data sections of the executable image are separate. 
Patches ("x86/efi: Add support for EFI_MEMORY_RO attribute introduced 
by UEFIv2.5") and ("x86/efi: Add support for UEFIv2.5 Properties table")
and ("x86/efi: Introduce EFI_NX_PE_DATA bit and set it from properties 
table") have already added support for this feature and sets 
EFI_NX_PE_DATA bit if this feature is detected. The following two 
patches will update mappings of these runtime regions. Patch 1 is a 
prerequisite which modifies kernel_map_pages_pgd (), so that we could 
map regions as read/write or read-only. Patch 2 does the restrictive 
mapping for runtime regions. EFI runtime code regions are mapped 
read-only and EFI runtime data regions are mapped not executable.

Sai Praneeth (2):
  x86/mm/pageattr: Don't implicitly allow _PAGE_RW in
    kernel_map_pages_in_pgd()
  x86/efi: Map EFI_MEMORY_{XP,RO} memory region bits to EFI page tables

 arch/x86/include/asm/efi.h     |  2 +-
 arch/x86/mm/pageattr.c         |  3 +++
 arch/x86/platform/efi/efi.c    |  9 +++++--
 arch/x86/platform/efi/efi_64.c | 53 +++++++++++++++++++++++++++++++++++-------
 4 files changed, 56 insertions(+), 11 deletions(-)

Cc: Borislav Petkov <bp-Gina5bIWoIWzQB+pC5nmwQ@public.gmane.org>
Cc: Lee, Chun-Yi <jlee-IBi9RG/b67k@public.gmane.org>
Cc: Ricardo Neri <ricardo.neri-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
Cc: Ravi Shankar <ravi.v.shankar-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
Signed-off-by: Matt Fleming <matt-mF/unelCI9GS6iBeEJttW/XRex20P6io@public.gmane.org>
Signed-off-by: Sai Praneeth Prakhya <sai.praneeth.prakhya-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>

-- 
2.1.4

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2016-02-11 14:57 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-01-30  1:04 [PATCH 0/2] x86/efi: Enable restrictive mapping of EFI runtime Sai Praneeth Prakhya
     [not found] ` <1454115880-6914-1-git-send-email-sai.praneeth.prakhya-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2016-01-30  1:04   ` [PATCH 1/2] x86/mm/pageattr: Don't implicitly allow _PAGE_RW in kernel_map_pages_in_pgd() Sai Praneeth Prakhya
     [not found]     ` <1454115880-6914-2-git-send-email-sai.praneeth.prakhya-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2016-02-11 14:40       ` Matt Fleming
2016-01-30  1:04   ` [PATCH 2/2] x86/efi: Map EFI_MEMORY_{XP,RO} memory region bits to EFI page tables Sai Praneeth Prakhya
     [not found]     ` <1454115880-6914-3-git-send-email-sai.praneeth.prakhya-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2016-02-11 14:42       ` Matt Fleming
2016-02-11 14:57       ` Matt Fleming

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).