[U-Boot] [PATCH v4 19/21] sandbox: Allow to execute from RAM
Alexander Graf
agraf at suse.de
Mon Jun 18 15:23:13 UTC 2018
With efi_loader, we may want to execute payloads from RAM. By default,
permissions on the RAM region don't allow us to execute from there though.
So whenever we get into the efi_loader case, let's mark RAM as executable.
That way we still protect normal cases, but allow for efi binaries to
directly get executed from within RAM.
For this, we hook into the already existing allow_unaligned() call which
also transitions the system over into semantics required by the UEFI
specification.
Signed-off-by: Alexander Graf <agraf at suse.de>
---
arch/sandbox/cpu/cpu.c | 14 ++++++++++++++
arch/sandbox/cpu/os.c | 14 ++++++++++++++
include/os.h | 19 +++++++++++++++++++
3 files changed, 47 insertions(+)
diff --git a/arch/sandbox/cpu/cpu.c b/arch/sandbox/cpu/cpu.c
index 9087026d71..641b66a0a7 100644
--- a/arch/sandbox/cpu/cpu.c
+++ b/arch/sandbox/cpu/cpu.c
@@ -192,3 +192,17 @@ void efi_add_known_memory(void)
}
#endif
+
+#if CONFIG_IS_ENABLED(EFI_LOADER)
+
+void allow_unaligned(void)
+{
+ int r;
+
+ r = os_mprotect(gd->arch.ram_buf, gd->ram_size,
+ OS_PROT_READ | OS_PROT_WRITE | OS_PROT_EXEC);
+
+ assert(!r);
+}
+
+#endif
diff --git a/arch/sandbox/cpu/os.c b/arch/sandbox/cpu/os.c
index 9cfdc9f31f..9fa79a8843 100644
--- a/arch/sandbox/cpu/os.c
+++ b/arch/sandbox/cpu/os.c
@@ -183,6 +183,20 @@ void *os_realloc(void *ptr, size_t length)
return buf;
}
+int os_mprotect(void *ptr, size_t length, int prot)
+{
+ int p = 0;
+
+ if (prot & OS_PROT_READ)
+ p |= PROT_READ;
+ if (prot & OS_PROT_WRITE)
+ p |= PROT_WRITE;
+ if (prot & OS_PROT_EXEC)
+ p |= PROT_EXEC;
+
+ return mprotect(ptr, length, p);
+}
+
void os_usleep(unsigned long usec)
{
usleep(usec);
diff --git a/include/os.h b/include/os.h
index c8e0f52d30..d451e12064 100644
--- a/include/os.h
+++ b/include/os.h
@@ -157,6 +157,25 @@ void os_free(void *ptr);
void *os_realloc(void *ptr, size_t length);
/**
+ * Modify protection of a memory region
+ *
+ * This function changes the memory protection scheme of a given memory
+ * region. Using it you can for example allow execution of memory that
+ * would otherwise prohibit it.
+ *
+ * \param ptr Pointer to memory region to modify
+ * \param length New length for memory block
+ * \param prot New protection scheme (ORed OS_PROT_ values)
+ * \return 0 on success, -1 otherwise.
+ */
+int os_mprotect(void *ptr, size_t length, int prot);
+
+/* Defines for "prot" in os_mprotect() */
+#define OS_PROT_READ 0x1
+#define OS_PROT_WRITE 0x2
+#define OS_PROT_EXEC 0x4
+
+/**
* Access to the usleep function of the os
*
* \param usec Time to sleep in micro seconds
--
2.12.3
More information about the U-Boot
mailing list