This source file includes following definitions.
- create_mapping_protection
- efi_create_mapping
- set_permissions
- efi_set_mapping_permissions
- efi_poweroff_required
- efi_handle_corrupted_x18
   1 
   2 
   3 
   4 
   5 
   6 
   7 
   8 
   9 
  10 #include <linux/efi.h>
  11 #include <linux/init.h>
  12 
  13 #include <asm/efi.h>
  14 
  15 
  16 
  17 
  18 
  19 
  20 static __init pteval_t create_mapping_protection(efi_memory_desc_t *md)
  21 {
  22         u64 attr = md->attribute;
  23         u32 type = md->type;
  24 
  25         if (type == EFI_MEMORY_MAPPED_IO)
  26                 return PROT_DEVICE_nGnRE;
  27 
  28         if (WARN_ONCE(!PAGE_ALIGNED(md->phys_addr),
  29                       "UEFI Runtime regions are not aligned to 64 KB -- buggy firmware?"))
  30                 
  31 
  32 
  33 
  34 
  35                 return pgprot_val(PAGE_KERNEL_EXEC);
  36 
  37         
  38         if ((attr & (EFI_MEMORY_XP | EFI_MEMORY_RO)) ==
  39             (EFI_MEMORY_XP | EFI_MEMORY_RO))
  40                 return pgprot_val(PAGE_KERNEL_RO);
  41 
  42         
  43         if (attr & EFI_MEMORY_RO)
  44                 return pgprot_val(PAGE_KERNEL_ROX);
  45 
  46         
  47         if (((attr & (EFI_MEMORY_RP | EFI_MEMORY_WP | EFI_MEMORY_XP)) ==
  48              EFI_MEMORY_XP) ||
  49             type != EFI_RUNTIME_SERVICES_CODE)
  50                 return pgprot_val(PAGE_KERNEL);
  51 
  52         
  53         return pgprot_val(PAGE_KERNEL_EXEC);
  54 }
  55 
  56 
  57 struct screen_info screen_info __section(.data);
  58 
  59 int __init efi_create_mapping(struct mm_struct *mm, efi_memory_desc_t *md)
  60 {
  61         pteval_t prot_val = create_mapping_protection(md);
  62         bool page_mappings_only = (md->type == EFI_RUNTIME_SERVICES_CODE ||
  63                                    md->type == EFI_RUNTIME_SERVICES_DATA);
  64 
  65         if (!PAGE_ALIGNED(md->phys_addr) ||
  66             !PAGE_ALIGNED(md->num_pages << EFI_PAGE_SHIFT)) {
  67                 
  68 
  69 
  70 
  71 
  72 
  73 
  74 
  75 
  76                 page_mappings_only = true;
  77         }
  78 
  79         create_pgd_mapping(mm, md->phys_addr, md->virt_addr,
  80                            md->num_pages << EFI_PAGE_SHIFT,
  81                            __pgprot(prot_val | PTE_NG), page_mappings_only);
  82         return 0;
  83 }
  84 
  85 static int __init set_permissions(pte_t *ptep, unsigned long addr, void *data)
  86 {
  87         efi_memory_desc_t *md = data;
  88         pte_t pte = READ_ONCE(*ptep);
  89 
  90         if (md->attribute & EFI_MEMORY_RO)
  91                 pte = set_pte_bit(pte, __pgprot(PTE_RDONLY));
  92         if (md->attribute & EFI_MEMORY_XP)
  93                 pte = set_pte_bit(pte, __pgprot(PTE_PXN));
  94         set_pte(ptep, pte);
  95         return 0;
  96 }
  97 
  98 int __init efi_set_mapping_permissions(struct mm_struct *mm,
  99                                        efi_memory_desc_t *md)
 100 {
 101         BUG_ON(md->type != EFI_RUNTIME_SERVICES_CODE &&
 102                md->type != EFI_RUNTIME_SERVICES_DATA);
 103 
 104         
 105 
 106 
 107 
 108 
 109 
 110 
 111         return apply_to_page_range(mm, md->virt_addr,
 112                                    md->num_pages << EFI_PAGE_SHIFT,
 113                                    set_permissions, md);
 114 }
 115 
 116 
 117 
 118 
 119 
 120 bool efi_poweroff_required(void)
 121 {
 122         return efi_enabled(EFI_RUNTIME_SERVICES);
 123 }
 124 
 125 asmlinkage efi_status_t efi_handle_corrupted_x18(efi_status_t s, const char *f)
 126 {
 127         pr_err_ratelimited(FW_BUG "register x18 corrupted by EFI %s\n", f);
 128         return s;
 129 }