2009-05-27 23:10:18 +02:00
|
|
|
/**@file
|
|
|
|
Memory Detection for Virtual Machines.
|
|
|
|
|
2014-02-01 22:22:43 +01:00
|
|
|
Copyright (c) 2006 - 2014, Intel Corporation. All rights reserved.<BR>
|
2010-04-28 14:43:04 +02:00
|
|
|
This program and the accompanying materials
|
2009-05-27 23:10:18 +02:00
|
|
|
are licensed and made available under the terms and conditions of the BSD License
|
|
|
|
which accompanies this distribution. The full text of the license may be found at
|
|
|
|
http://opensource.org/licenses/bsd-license.php
|
|
|
|
|
|
|
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
|
|
|
|
|
|
Module Name:
|
|
|
|
|
|
|
|
MemDetect.c
|
|
|
|
|
|
|
|
**/
|
|
|
|
|
|
|
|
//
|
|
|
|
// The package level header files this module uses
|
|
|
|
//
|
|
|
|
#include <PiPei.h>
|
|
|
|
|
|
|
|
//
|
|
|
|
// The Library classes this module consumes
|
|
|
|
//
|
2014-03-04 09:03:23 +01:00
|
|
|
#include <Library/BaseMemoryLib.h>
|
2009-05-27 23:10:18 +02:00
|
|
|
#include <Library/DebugLib.h>
|
|
|
|
#include <Library/HobLib.h>
|
|
|
|
#include <Library/IoLib.h>
|
2010-01-04 17:17:59 +01:00
|
|
|
#include <Library/PcdLib.h>
|
2009-05-27 23:10:18 +02:00
|
|
|
#include <Library/PeimEntryPoint.h>
|
|
|
|
#include <Library/ResourcePublicationLib.h>
|
2011-10-28 08:04:01 +02:00
|
|
|
#include <Library/MtrrLib.h>
|
2009-05-27 23:10:18 +02:00
|
|
|
|
|
|
|
#include "Platform.h"
|
|
|
|
#include "Cmos.h"
|
|
|
|
|
2014-02-01 22:22:43 +01:00
|
|
|
UINT32
|
2011-01-21 17:51:00 +01:00
|
|
|
GetSystemMemorySizeBelow4gb (
|
2014-02-01 22:22:43 +01:00
|
|
|
VOID
|
2009-05-27 23:10:18 +02:00
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT8 Cmos0x34;
|
|
|
|
UINT8 Cmos0x35;
|
|
|
|
|
|
|
|
//
|
|
|
|
// CMOS 0x34/0x35 specifies the system memory above 16 MB.
|
|
|
|
// * CMOS(0x35) is the high byte
|
|
|
|
// * CMOS(0x34) is the low byte
|
|
|
|
// * The size is specified in 64kb chunks
|
|
|
|
// * Since this is memory above 16MB, the 16MB must be added
|
|
|
|
// into the calculation to get the total memory size.
|
|
|
|
//
|
|
|
|
|
|
|
|
Cmos0x34 = (UINT8) CmosRead8 (0x34);
|
|
|
|
Cmos0x35 = (UINT8) CmosRead8 (0x35);
|
|
|
|
|
2010-10-13 09:07:29 +02:00
|
|
|
return (((UINTN)((Cmos0x35 << 8) + Cmos0x34) << 16) + SIZE_16MB);
|
2009-05-27 23:10:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-01-21 17:51:00 +01:00
|
|
|
STATIC
|
|
|
|
UINT64
|
|
|
|
GetSystemMemorySizeAbove4gb (
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT32 Size;
|
|
|
|
UINTN CmosIndex;
|
|
|
|
|
|
|
|
//
|
|
|
|
// CMOS 0x5b-0x5d specifies the system memory above 4GB MB.
|
|
|
|
// * CMOS(0x5d) is the most significant size byte
|
|
|
|
// * CMOS(0x5c) is the middle size byte
|
|
|
|
// * CMOS(0x5b) is the least significant size byte
|
|
|
|
// * The size is specified in 64kb chunks
|
|
|
|
//
|
|
|
|
|
|
|
|
Size = 0;
|
|
|
|
for (CmosIndex = 0x5d; CmosIndex >= 0x5b; CmosIndex--) {
|
|
|
|
Size = (UINT32) (Size << 8) + (UINT32) CmosRead8 (CmosIndex);
|
|
|
|
}
|
|
|
|
|
|
|
|
return LShiftU64 (Size, 16);
|
|
|
|
}
|
|
|
|
|
2013-12-08 02:36:07 +01:00
|
|
|
/**
|
|
|
|
Publish PEI core memory
|
|
|
|
|
|
|
|
@return EFI_SUCCESS The PEIM initialized successfully.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
PublishPeiMemory (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_STATUS Status;
|
|
|
|
EFI_PHYSICAL_ADDRESS MemoryBase;
|
|
|
|
UINT64 MemorySize;
|
|
|
|
UINT64 LowerMemorySize;
|
|
|
|
|
2014-03-04 09:02:16 +01:00
|
|
|
if (mBootMode == BOOT_ON_S3_RESUME) {
|
|
|
|
MemoryBase = PcdGet32 (PcdS3AcpiReservedMemoryBase);
|
|
|
|
MemorySize = PcdGet32 (PcdS3AcpiReservedMemorySize);
|
|
|
|
} else {
|
|
|
|
LowerMemorySize = GetSystemMemorySizeBelow4gb ();
|
|
|
|
|
|
|
|
//
|
|
|
|
// Determine the range of memory to use during PEI
|
|
|
|
//
|
|
|
|
MemoryBase = PcdGet32 (PcdOvmfDxeMemFvBase) + PcdGet32 (PcdOvmfDxeMemFvSize);
|
|
|
|
MemorySize = LowerMemorySize - MemoryBase;
|
|
|
|
if (MemorySize > SIZE_64MB) {
|
|
|
|
MemoryBase = LowerMemorySize - SIZE_64MB;
|
|
|
|
MemorySize = SIZE_64MB;
|
|
|
|
}
|
2013-12-08 02:36:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Publish this memory to the PEI Core
|
|
|
|
//
|
|
|
|
Status = PublishSystemMemory(MemoryBase, MemorySize);
|
|
|
|
ASSERT_EFI_ERROR (Status);
|
|
|
|
|
|
|
|
return Status;
|
|
|
|
}
|
|
|
|
|
2011-01-21 17:51:00 +01:00
|
|
|
|
2009-05-27 23:10:18 +02:00
|
|
|
/**
|
2014-02-01 22:22:48 +01:00
|
|
|
Peform Memory Detection for QEMU / KVM
|
2009-05-27 23:10:18 +02:00
|
|
|
|
|
|
|
**/
|
2014-02-01 22:22:48 +01:00
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
QemuInitializeRam (
|
|
|
|
VOID
|
2009-05-27 23:10:18 +02:00
|
|
|
)
|
|
|
|
{
|
2011-01-21 17:51:00 +01:00
|
|
|
UINT64 LowerMemorySize;
|
|
|
|
UINT64 UpperMemorySize;
|
2009-05-27 23:10:18 +02:00
|
|
|
|
2014-02-01 22:22:48 +01:00
|
|
|
DEBUG ((EFI_D_INFO, "%a called\n", __FUNCTION__));
|
2009-05-27 23:10:18 +02:00
|
|
|
|
|
|
|
//
|
|
|
|
// Determine total memory size available
|
|
|
|
//
|
2011-01-21 17:51:00 +01:00
|
|
|
LowerMemorySize = GetSystemMemorySizeBelow4gb ();
|
|
|
|
UpperMemorySize = GetSystemMemorySizeAbove4gb ();
|
2009-05-27 23:10:18 +02:00
|
|
|
|
2014-03-04 09:02:30 +01:00
|
|
|
if (mBootMode != BOOT_ON_S3_RESUME) {
|
|
|
|
//
|
|
|
|
// Create memory HOBs
|
|
|
|
//
|
|
|
|
AddMemoryRangeHob (BASE_1MB, LowerMemorySize);
|
|
|
|
AddMemoryRangeHob (0, BASE_512KB + BASE_128KB);
|
|
|
|
}
|
2009-05-27 23:10:18 +02:00
|
|
|
|
2013-12-26 21:44:20 +01:00
|
|
|
MtrrSetMemoryAttribute (BASE_1MB, LowerMemorySize - BASE_1MB, CacheWriteBack);
|
2011-10-28 08:04:01 +02:00
|
|
|
|
2011-10-31 16:58:18 +01:00
|
|
|
MtrrSetMemoryAttribute (0, BASE_512KB + BASE_128KB, CacheWriteBack);
|
2011-10-28 08:04:01 +02:00
|
|
|
|
2011-01-21 17:51:00 +01:00
|
|
|
if (UpperMemorySize != 0) {
|
2014-03-04 09:02:30 +01:00
|
|
|
if (mBootMode != BOOT_ON_S3_RESUME) {
|
|
|
|
AddUntestedMemoryBaseSizeHob (BASE_4GB, UpperMemorySize);
|
|
|
|
}
|
2011-10-28 08:04:01 +02:00
|
|
|
|
2011-10-31 16:58:18 +01:00
|
|
|
MtrrSetMemoryAttribute (BASE_4GB, UpperMemorySize, CacheWriteBack);
|
2011-01-21 17:51:00 +01:00
|
|
|
}
|
2009-05-27 23:10:18 +02:00
|
|
|
}
|
|
|
|
|
2014-02-01 22:22:48 +01:00
|
|
|
/**
|
|
|
|
Publish system RAM and reserve memory regions
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
InitializeRamRegions (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
2014-02-01 22:22:54 +01:00
|
|
|
if (!mXen) {
|
|
|
|
QemuInitializeRam ();
|
|
|
|
} else {
|
|
|
|
XenPublishRamRegions ();
|
|
|
|
}
|
2014-03-04 09:02:16 +01:00
|
|
|
|
|
|
|
if (mS3Supported && mBootMode != BOOT_ON_S3_RESUME) {
|
|
|
|
//
|
|
|
|
// This is the memory range that will be used for PEI on S3 resume
|
|
|
|
//
|
|
|
|
BuildMemoryAllocationHob (
|
|
|
|
(EFI_PHYSICAL_ADDRESS)(UINTN) PcdGet32 (PcdS3AcpiReservedMemoryBase),
|
|
|
|
(UINT64)(UINTN) PcdGet32 (PcdS3AcpiReservedMemorySize),
|
|
|
|
EfiACPIMemoryNVS
|
|
|
|
);
|
2014-03-04 09:02:45 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// Cover the initial RAM area used as stack and temporary PEI heap.
|
|
|
|
//
|
|
|
|
// This is reserved as ACPI NVS so it can be used on S3 resume.
|
|
|
|
//
|
|
|
|
BuildMemoryAllocationHob (
|
|
|
|
PcdGet32 (PcdOvmfSecPeiTempRamBase),
|
|
|
|
PcdGet32 (PcdOvmfSecPeiTempRamSize),
|
|
|
|
EfiACPIMemoryNVS
|
|
|
|
);
|
2014-03-04 09:02:52 +01:00
|
|
|
|
|
|
|
#ifdef MDE_CPU_X64
|
|
|
|
//
|
|
|
|
// Reserve the initial page tables built by the reset vector code.
|
|
|
|
//
|
|
|
|
// Since this memory range will be used by the Reset Vector on S3
|
|
|
|
// resume, it must be reserved as ACPI NVS.
|
|
|
|
//
|
|
|
|
BuildMemoryAllocationHob (
|
|
|
|
(EFI_PHYSICAL_ADDRESS)(UINTN) PcdGet32 (PcdOvmfSecPageTablesBase),
|
|
|
|
(UINT64)(UINTN) PcdGet32 (PcdOvmfSecPageTablesSize),
|
|
|
|
EfiACPIMemoryNVS
|
|
|
|
);
|
|
|
|
#endif
|
OvmfPkg: PlatformPei: lifecycle fixes for the LockBox area
If (mBootMode == BOOT_ON_S3_RESUME) -- that is, we are resuming --, then
the patch has no observable effect.
If (mBootMode != BOOT_ON_S3_RESUME && mS3Supported) -- that is, we are
booting or rebooting, and S3 is supported), then the patch has no
observable effect either.
If (mBootMode != BOOT_ON_S3_RESUME && !mS3Supported) -- that is, we are
booting or rebooting, and S3 is unsupported), then the patch effects the
following two fixes:
- The LockBox storage is reserved from DXE (but not the OS). Drivers in
DXE may save data in the LockBox regardless of S3 support, potentially
corrupting any overlapping allocations. Make sure there's no overlap.
- The LockBox storage is cleared. A LockBox inherited across a non-resume
reboot, populated with well-known GUIDs, breaks drivers that want to
save entries with those GUIDs.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Tested-by: Matt Fleming <matt.fleming@intel.com>
Reviewed-by: Jordan Justen <jordan.l.justen@intel.com>
git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@15418 6f19259b-4bc3-4df7-8a09-765794883524
2014-03-31 22:35:50 +02:00
|
|
|
}
|
2014-03-04 09:03:23 +01:00
|
|
|
|
OvmfPkg: PlatformPei: lifecycle fixes for the LockBox area
If (mBootMode == BOOT_ON_S3_RESUME) -- that is, we are resuming --, then
the patch has no observable effect.
If (mBootMode != BOOT_ON_S3_RESUME && mS3Supported) -- that is, we are
booting or rebooting, and S3 is supported), then the patch has no
observable effect either.
If (mBootMode != BOOT_ON_S3_RESUME && !mS3Supported) -- that is, we are
booting or rebooting, and S3 is unsupported), then the patch effects the
following two fixes:
- The LockBox storage is reserved from DXE (but not the OS). Drivers in
DXE may save data in the LockBox regardless of S3 support, potentially
corrupting any overlapping allocations. Make sure there's no overlap.
- The LockBox storage is cleared. A LockBox inherited across a non-resume
reboot, populated with well-known GUIDs, breaks drivers that want to
save entries with those GUIDs.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Tested-by: Matt Fleming <matt.fleming@intel.com>
Reviewed-by: Jordan Justen <jordan.l.justen@intel.com>
git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@15418 6f19259b-4bc3-4df7-8a09-765794883524
2014-03-31 22:35:50 +02:00
|
|
|
if (mBootMode != BOOT_ON_S3_RESUME) {
|
2014-03-04 09:03:23 +01:00
|
|
|
//
|
|
|
|
// Reserve the lock box storage area
|
|
|
|
//
|
|
|
|
// Since this memory range will be used on S3 resume, it must be
|
|
|
|
// reserved as ACPI NVS.
|
|
|
|
//
|
OvmfPkg: PlatformPei: lifecycle fixes for the LockBox area
If (mBootMode == BOOT_ON_S3_RESUME) -- that is, we are resuming --, then
the patch has no observable effect.
If (mBootMode != BOOT_ON_S3_RESUME && mS3Supported) -- that is, we are
booting or rebooting, and S3 is supported), then the patch has no
observable effect either.
If (mBootMode != BOOT_ON_S3_RESUME && !mS3Supported) -- that is, we are
booting or rebooting, and S3 is unsupported), then the patch effects the
following two fixes:
- The LockBox storage is reserved from DXE (but not the OS). Drivers in
DXE may save data in the LockBox regardless of S3 support, potentially
corrupting any overlapping allocations. Make sure there's no overlap.
- The LockBox storage is cleared. A LockBox inherited across a non-resume
reboot, populated with well-known GUIDs, breaks drivers that want to
save entries with those GUIDs.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Tested-by: Matt Fleming <matt.fleming@intel.com>
Reviewed-by: Jordan Justen <jordan.l.justen@intel.com>
git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@15418 6f19259b-4bc3-4df7-8a09-765794883524
2014-03-31 22:35:50 +02:00
|
|
|
// If S3 is unsupported, then various drivers might still write to the
|
|
|
|
// LockBox area. We ought to prevent DXE from serving allocation requests
|
|
|
|
// such that they would overlap the LockBox storage.
|
|
|
|
//
|
2014-03-04 09:03:23 +01:00
|
|
|
ZeroMem (
|
|
|
|
(VOID*)(UINTN) PcdGet32 (PcdOvmfLockBoxStorageBase),
|
|
|
|
(UINTN) PcdGet32 (PcdOvmfLockBoxStorageSize)
|
|
|
|
);
|
|
|
|
BuildMemoryAllocationHob (
|
|
|
|
(EFI_PHYSICAL_ADDRESS)(UINTN) PcdGet32 (PcdOvmfLockBoxStorageBase),
|
|
|
|
(UINT64)(UINTN) PcdGet32 (PcdOvmfLockBoxStorageSize),
|
OvmfPkg: PlatformPei: lifecycle fixes for the LockBox area
If (mBootMode == BOOT_ON_S3_RESUME) -- that is, we are resuming --, then
the patch has no observable effect.
If (mBootMode != BOOT_ON_S3_RESUME && mS3Supported) -- that is, we are
booting or rebooting, and S3 is supported), then the patch has no
observable effect either.
If (mBootMode != BOOT_ON_S3_RESUME && !mS3Supported) -- that is, we are
booting or rebooting, and S3 is unsupported), then the patch effects the
following two fixes:
- The LockBox storage is reserved from DXE (but not the OS). Drivers in
DXE may save data in the LockBox regardless of S3 support, potentially
corrupting any overlapping allocations. Make sure there's no overlap.
- The LockBox storage is cleared. A LockBox inherited across a non-resume
reboot, populated with well-known GUIDs, breaks drivers that want to
save entries with those GUIDs.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Tested-by: Matt Fleming <matt.fleming@intel.com>
Reviewed-by: Jordan Justen <jordan.l.justen@intel.com>
git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@15418 6f19259b-4bc3-4df7-8a09-765794883524
2014-03-31 22:35:50 +02:00
|
|
|
mS3Supported ? EfiACPIMemoryNVS : EfiBootServicesData
|
2014-03-04 09:03:23 +01:00
|
|
|
);
|
2014-03-04 09:02:16 +01:00
|
|
|
}
|
2014-02-01 22:22:48 +01:00
|
|
|
}
|