| // SPDX-License-Identifier: GPL-2.0-only |
| /* |
| * Copyright (C) 2015 Linaro Ltd <ard.biesheuvel@linaro.org> |
| */ |
| |
| #include <linux/efi.h> |
| #include <asm/efi.h> |
| #include <asm/mach/map.h> |
| #include <asm/mmu_context.h> |
| |
| static int __init set_permissions(pte_t *ptep, pgtable_t token, |
| unsigned long addr, void *data) |
| { |
| efi_memory_desc_t *md = data; |
| pte_t pte = *ptep; |
| |
| if (md->attribute & EFI_MEMORY_RO) |
| pte = set_pte_bit(pte, __pgprot(L_PTE_RDONLY)); |
| if (md->attribute & EFI_MEMORY_XP) |
| pte = set_pte_bit(pte, __pgprot(L_PTE_XN)); |
| set_pte_ext(ptep, pte, PTE_EXT_NG); |
| return 0; |
| } |
| |
| int __init efi_set_mapping_permissions(struct mm_struct *mm, |
| efi_memory_desc_t *md) |
| { |
| unsigned long base, size; |
| |
| base = md->virt_addr; |
| size = md->num_pages << EFI_PAGE_SHIFT; |
| |
| /* |
| * We can only use apply_to_page_range() if we can guarantee that the |
| * entire region was mapped using pages. This should be the case if the |
| * region does not cover any naturally aligned SECTION_SIZE sized |
| * blocks. |
| */ |
| if (round_down(base + size, SECTION_SIZE) < |
| round_up(base, SECTION_SIZE) + SECTION_SIZE) |
| return apply_to_page_range(mm, base, size, set_permissions, md); |
| |
| return 0; |
| } |
| |
| int __init efi_create_mapping(struct mm_struct *mm, efi_memory_desc_t *md) |
| { |
| struct map_desc desc = { |
| .virtual = md->virt_addr, |
| .pfn = __phys_to_pfn(md->phys_addr), |
| .length = md->num_pages * EFI_PAGE_SIZE, |
| }; |
| |
| /* |
| * Order is important here: memory regions may have all of the |
| * bits below set (and usually do), so we check them in order of |
| * preference. |
| */ |
| if (md->attribute & EFI_MEMORY_WB) |
| desc.type = MT_MEMORY_RWX; |
| else if (md->attribute & EFI_MEMORY_WT) |
| desc.type = MT_MEMORY_RWX_NONCACHED; |
| else if (md->attribute & EFI_MEMORY_WC) |
| desc.type = MT_DEVICE_WC; |
| else |
| desc.type = MT_DEVICE; |
| |
| create_mapping_late(mm, &desc, true); |
| |
| /* |
| * If stricter permissions were specified, apply them now. |
| */ |
| if (md->attribute & (EFI_MEMORY_RO | EFI_MEMORY_XP)) |
| return efi_set_mapping_permissions(mm, md); |
| return 0; |
| } |