ArmPkg/OpteeLib: Map shared communication buffer non-executable
The OP-TEE secure OS exposes a non-secure memory region for communication between the secure OS itself and any clients in the non-secure firmware. This memory is writable by non-secure and is not used for code only data, and so it should be mapped non-executable. Signed-off-by: Ard Biesheuvel <ardb@kernel.org> Reviewed-by: Leif Lindholm <quic_llindhol@quicinc.com>
This commit is contained in:
		
				
					committed by
					
						![mergify[bot]](/avatar/e3df20cd7a67969c41a65f03bea54961?size=40) mergify[bot]
						mergify[bot]
					
				
			
			
				
	
			
			
			
						parent
						
							8a1f540596
						
					
				
				
					commit
					2f8b51d6af
				
			| @@ -86,7 +86,12 @@ OpteeSharedMemoryRemap ( | |||||||
|     return EFI_BUFFER_TOO_SMALL; |     return EFI_BUFFER_TOO_SMALL; | ||||||
|   } |   } | ||||||
|  |  | ||||||
|   Status = ArmSetMemoryAttributes (PhysicalAddress, Size, EFI_MEMORY_WB, 0); |   Status = ArmSetMemoryAttributes ( | ||||||
|  |              PhysicalAddress, | ||||||
|  |              Size, | ||||||
|  |              EFI_MEMORY_WB | EFI_MEMORY_XP, | ||||||
|  |              0 | ||||||
|  |              ); | ||||||
|   if (EFI_ERROR (Status)) { |   if (EFI_ERROR (Status)) { | ||||||
|     return Status; |     return Status; | ||||||
|   } |   } | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user