ArmPkg/OpteeLib: Map shared communication buffer non-executable
The OP-TEE secure OS exposes a non-secure memory region for communication between the secure OS itself and any clients in the non-secure firmware. This memory is writable by non-secure and is not used for code only data, and so it should be mapped non-executable. Signed-off-by: Ard Biesheuvel <ardb@kernel.org> Reviewed-by: Leif Lindholm <quic_llindhol@quicinc.com>
This commit is contained in:
		
				
					committed by
					
						![mergify[bot]](/avatar/e3df20cd7a67969c41a65f03bea54961?size=40) mergify[bot]
						mergify[bot]
					
				
			
			
				
	
			
			
			
						parent
						
							8a1f540596
						
					
				
				
					commit
					2f8b51d6af
				
			| @@ -86,7 +86,12 @@ OpteeSharedMemoryRemap ( | ||||
|     return EFI_BUFFER_TOO_SMALL; | ||||
|   } | ||||
|  | ||||
|   Status = ArmSetMemoryAttributes (PhysicalAddress, Size, EFI_MEMORY_WB, 0); | ||||
|   Status = ArmSetMemoryAttributes ( | ||||
|              PhysicalAddress, | ||||
|              Size, | ||||
|              EFI_MEMORY_WB | EFI_MEMORY_XP, | ||||
|              0 | ||||
|              ); | ||||
|   if (EFI_ERROR (Status)) { | ||||
|     return Status; | ||||
|   } | ||||
|   | ||||
		Reference in New Issue
	
	Block a user