mirror of https://github.com/acidanthera/audk.git
MdeModulePkg/PiSmmCore: Implement heap guard feature for SMM mode
This feature makes use of paging mechanism to add a hidden (not present) page just before and after the allocated memory block. If the code tries to access memory outside of the allocated part, page fault exception will be triggered. This feature is controlled by three PCDs: gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPropertyMask gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPoolType gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPageType BIT2 and BIT3 of PcdHeapGuardPropertyMask can be used to enable or disable memory guard for SMM page and pool respectively. PcdHeapGuardPoolType and/or PcdHeapGuardPageType are used to enable or disable guard for specific type of memory. For example, we can turn on guard only for EfiRuntimeServicesCode and EfiRuntimeServicesData by setting the PCD with value 0x60. Pool memory is not ususally integer multiple of one page, and is more likely less than a page. There's no way to monitor the overflow at both top and bottom of pool memory. BIT7 of PcdHeapGuardPropertyMask is used to control how to position the head of pool memory so that it's easier to catch memory overflow in memory growing direction or in decreasing direction. Cc: Eric Dong <eric.dong@intel.com> Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Laszlo Ersek <lersek@redhat.com> Cc: Ruiyu Ni <ruiyu.ni@intel.com> Suggested-by: Ayellet Wolman <ayellet.wolman@intel.com> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Jian J Wang <jian.j.wang@intel.com> Reviewed-by: Jiewen Yao <jiewen.yao@intel.com> Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
This commit is contained in:
parent
af4f4b3468
commit
2930ef9809
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,398 @@
|
|||
/** @file
|
||||
Data structure and functions to allocate and free memory space.
|
||||
|
||||
Copyright (c) 2017, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
http://opensource.org/licenses/bsd-license.php
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
**/
|
||||
|
||||
#ifndef _HEAPGUARD_H_
|
||||
#define _HEAPGUARD_H_
|
||||
|
||||
#include "PiSmmCore.h"
|
||||
|
||||
//
|
||||
// Following macros are used to define and access the guarded memory bitmap
|
||||
// table.
|
||||
//
|
||||
// To simplify the access and reduce the memory used for this table, the
|
||||
// table is constructed in the similar way as page table structure but in
|
||||
// reverse direction, i.e. from bottom growing up to top.
|
||||
//
|
||||
// - 1-bit tracks 1 page (4KB)
|
||||
// - 1-UINT64 map entry tracks 256KB memory
|
||||
// - 1K-UINT64 map table tracks 256MB memory
|
||||
// - Five levels of tables can track any address of memory of 64-bit
|
||||
// system, like below.
|
||||
//
|
||||
// 512 * 512 * 512 * 512 * 1K * 64b * 4K
|
||||
// 111111111 111111111 111111111 111111111 1111111111 111111 111111111111
|
||||
// 63 54 45 36 27 17 11 0
|
||||
// 9b 9b 9b 9b 10b 6b 12b
|
||||
// L0 -> L1 -> L2 -> L3 -> L4 -> bits -> page
|
||||
// 1FF 1FF 1FF 1FF 3FF 3F FFF
|
||||
//
|
||||
// L4 table has 1K * sizeof(UINT64) = 8K (2-page), which can track 256MB
|
||||
// memory. Each table of L0-L3 will be allocated when its memory address
|
||||
// range is to be tracked. Only 1-page will be allocated each time. This
|
||||
// can save memories used to establish this map table.
|
||||
//
|
||||
// For a normal configuration of system with 4G memory, two levels of tables
|
||||
// can track the whole memory, because two levels (L3+L4) of map tables have
|
||||
// already coverred 37-bit of memory address. And for a normal UEFI BIOS,
|
||||
// less than 128M memory would be consumed during boot. That means we just
|
||||
// need
|
||||
//
|
||||
// 1-page (L3) + 2-page (L4)
|
||||
//
|
||||
// memory (3 pages) to track the memory allocation works. In this case,
|
||||
// there's no need to setup L0-L2 tables.
|
||||
//
|
||||
|
||||
//
|
||||
// Each entry occupies 8B/64b. 1-page can hold 512 entries, which spans 9
|
||||
// bits in address. (512 = 1 << 9)
|
||||
//
|
||||
#define BYTE_LENGTH_SHIFT 3 // (8 = 1 << 3)
|
||||
|
||||
#define GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT \
|
||||
(EFI_PAGE_SHIFT - BYTE_LENGTH_SHIFT)
|
||||
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH 5
|
||||
|
||||
// Use UINT64_index + bit_index_of_UINT64 to locate the bit in may
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT 6 // (64 = 1 << 6)
|
||||
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BITS \
|
||||
(1 << GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT)
|
||||
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BYTES \
|
||||
(GUARDED_HEAP_MAP_ENTRY_BITS / 8)
|
||||
|
||||
// L4 table address width: 64 - 9 * 4 - 6 - 12 = 10b
|
||||
#define GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
(GUARDED_HEAP_MAP_ENTRY_BITS \
|
||||
- GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 4 \
|
||||
- GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
- EFI_PAGE_SHIFT)
|
||||
|
||||
// L4 table address mask: (1 << 10 - 1) = 0x3FF
|
||||
#define GUARDED_HEAP_MAP_ENTRY_MASK \
|
||||
((1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) - 1)
|
||||
|
||||
// Size of each L4 table: (1 << 10) * 8 = 8KB = 2-page
|
||||
#define GUARDED_HEAP_MAP_SIZE \
|
||||
((1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) * GUARDED_HEAP_MAP_ENTRY_BYTES)
|
||||
|
||||
// Memory size tracked by one L4 table: 8KB * 8 * 4KB = 256MB
|
||||
#define GUARDED_HEAP_MAP_UNIT_SIZE \
|
||||
(GUARDED_HEAP_MAP_SIZE * 8 * EFI_PAGE_SIZE)
|
||||
|
||||
// L4 table entry number: 8KB / 8 = 1024
|
||||
#define GUARDED_HEAP_MAP_ENTRIES_PER_UNIT \
|
||||
(GUARDED_HEAP_MAP_SIZE / GUARDED_HEAP_MAP_ENTRY_BYTES)
|
||||
|
||||
// L4 table entry indexing
|
||||
#define GUARDED_HEAP_MAP_ENTRY_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT) \
|
||||
& GUARDED_HEAP_MAP_ENTRY_MASK)
|
||||
|
||||
// L4 table entry bit indexing
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BIT_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT) \
|
||||
& ((1 << GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT) - 1))
|
||||
|
||||
//
|
||||
// Total bits (pages) tracked by one L4 table (65536-bit)
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_BITS \
|
||||
(1 << (GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT))
|
||||
|
||||
//
|
||||
// Bit indexing inside the whole L4 table (0 - 65535)
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_BIT_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT) \
|
||||
& ((1 << (GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT)) - 1))
|
||||
|
||||
//
|
||||
// Memory address bit width tracked by L4 table: 10 + 6 + 12 = 28
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_SHIFT \
|
||||
(GUARDED_HEAP_MAP_ENTRY_SHIFT + GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
+ EFI_PAGE_SHIFT)
|
||||
|
||||
//
|
||||
// Macro used to initialize the local array variable for map table traversing
|
||||
// {55, 46, 37, 28, 18}
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH_SHIFTS \
|
||||
{ \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 3, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 2, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT, \
|
||||
EFI_PAGE_SHIFT + GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
}
|
||||
|
||||
//
|
||||
// Masks used to extract address range of each level of table
|
||||
// {0x1FF, 0x1FF, 0x1FF, 0x1FF, 0x3FF}
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH_MASKS \
|
||||
{ \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) - 1 \
|
||||
}
|
||||
|
||||
//
|
||||
// Memory type to guard (matching the related PCD definition)
|
||||
//
|
||||
#define GUARD_HEAP_TYPE_POOL BIT2
|
||||
#define GUARD_HEAP_TYPE_PAGE BIT3
|
||||
|
||||
//
|
||||
// Debug message level
|
||||
//
|
||||
#define HEAP_GUARD_DEBUG_LEVEL (DEBUG_POOL|DEBUG_PAGE)
|
||||
|
||||
typedef struct {
|
||||
UINT32 TailMark;
|
||||
UINT32 HeadMark;
|
||||
EFI_PHYSICAL_ADDRESS Address;
|
||||
LIST_ENTRY Link;
|
||||
} HEAP_GUARD_NODE;
|
||||
|
||||
/**
|
||||
Set head Guard and tail Guard for the given memory range.
|
||||
|
||||
@param[in] Memory Base address of memory to set guard for.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
SetGuardForMemory (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Unset head Guard and tail Guard for the given memory range.
|
||||
|
||||
@param[in] Memory Base address of memory to unset guard for.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
UnsetGuardForMemory (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the base and number of pages to really allocate according to Guard.
|
||||
|
||||
@param[in,out] Memory Base address of free memory.
|
||||
@param[in,out] NumberOfPages Size of memory to allocate.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
AdjustMemoryA (
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN OUT UINTN *NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the start address and number of pages to free according to Guard.
|
||||
|
||||
The purpose of this function is to keep the shared Guard page with adjacent
|
||||
memory block if it's still in guard, or free it if no more sharing. Another
|
||||
is to reserve pages as Guard pages in partial page free situation.
|
||||
|
||||
@param[in,out] Memory Base address of memory to free.
|
||||
@param[in,out] NumberOfPages Size of memory to free.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
AdjustMemoryF (
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN OUT UINTN *NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the pool at the given address should be guarded or not.
|
||||
|
||||
@param[in] MemoryType Pool type to check.
|
||||
|
||||
|
||||
@return TRUE The given type of pool should be guarded.
|
||||
@return FALSE The given type of pool should not be guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsPoolTypeToGuard (
|
||||
IN EFI_MEMORY_TYPE MemoryType
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address should be guarded or not.
|
||||
|
||||
@param[in] MemoryType Page type to check.
|
||||
@param[in] AllocateType Allocation type to check.
|
||||
|
||||
@return TRUE The given type of page should be guarded.
|
||||
@return FALSE The given type of page should not be guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsPageTypeToGuard (
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN EFI_ALLOCATE_TYPE AllocateType
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address is guarded or not.
|
||||
|
||||
@param[in] Address The address to check for.
|
||||
|
||||
@return TRUE The page at Address is guarded.
|
||||
@return FALSE The page at Address is not guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
IsMemoryGuarded (
|
||||
IN EFI_PHYSICAL_ADDRESS Address
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address is a Guard page or not.
|
||||
|
||||
@param[in] Address The address to check for.
|
||||
|
||||
@return TRUE The page at Address is a Guard page.
|
||||
@return FALSE The page at Address is not a Guard page.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
IsGuardPage (
|
||||
IN EFI_PHYSICAL_ADDRESS Address
|
||||
);
|
||||
|
||||
/**
|
||||
Dump the guarded memory bit map.
|
||||
**/
|
||||
VOID
|
||||
EFIAPI
|
||||
DumpGuardedMemoryBitmap (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the pool head position to make sure the Guard page is adjavent to
|
||||
pool tail or pool head.
|
||||
|
||||
@param[in] Memory Base address of memory allocated.
|
||||
@param[in] NoPages Number of pages actually allocated.
|
||||
@param[in] Size Size of memory requested.
|
||||
(plus pool head/tail overhead)
|
||||
|
||||
@return Address of pool head.
|
||||
**/
|
||||
VOID *
|
||||
AdjustPoolHeadA (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NoPages,
|
||||
IN UINTN Size
|
||||
);
|
||||
|
||||
/**
|
||||
Get the page base address according to pool head address.
|
||||
|
||||
@param[in] Memory Head address of pool to free.
|
||||
|
||||
@return Address of pool head.
|
||||
**/
|
||||
VOID *
|
||||
AdjustPoolHeadF (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory
|
||||
);
|
||||
|
||||
/**
|
||||
Helper function of memory allocation with Guard pages.
|
||||
|
||||
@param FreePageList The free page node.
|
||||
@param NumberOfPages Number of pages to be allocated.
|
||||
@param MaxAddress Request to allocate memory below this address.
|
||||
@param MemoryType Type of memory requested.
|
||||
|
||||
@return Memory address of allocated pages.
|
||||
**/
|
||||
UINTN
|
||||
InternalAllocMaxAddressWithGuard (
|
||||
IN OUT LIST_ENTRY *FreePageList,
|
||||
IN UINTN NumberOfPages,
|
||||
IN UINTN MaxAddress,
|
||||
IN EFI_MEMORY_TYPE MemoryType
|
||||
);
|
||||
|
||||
/**
|
||||
Helper function of memory free with Guard pages.
|
||||
|
||||
@param[in] Memory Base address of memory being freed.
|
||||
@param[in] NumberOfPages The number of pages to free.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range.
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or
|
||||
NumberOfPages is zero.
|
||||
@return EFI_SUCCESS Pages successfully freed.
|
||||
**/
|
||||
EFI_STATUS
|
||||
SmmInternalFreePagesExWithGuard (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the heap guard is enabled for page and/or pool allocation.
|
||||
|
||||
@return TRUE/FALSE.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsHeapGuardEnabled (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Debug function used to verify if the Guard page is well set or not.
|
||||
|
||||
@param[in] BaseAddress Address of memory to check.
|
||||
@param[in] NumberOfPages Size of memory in pages.
|
||||
|
||||
@return TRUE The head Guard and tail Guard are both well set.
|
||||
@return FALSE The head Guard and/or tail Guard are not well set.
|
||||
**/
|
||||
BOOLEAN
|
||||
VerifyMemoryGuard (
|
||||
IN EFI_PHYSICAL_ADDRESS BaseAddress,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
extern BOOLEAN mOnGuarding;
|
||||
|
||||
#endif
|
|
@ -64,6 +64,8 @@ LIST_ENTRY mFreeMemoryMapEntryList = INITIALIZE_LIST_HEAD_VARIABLE (mFreeMemor
|
|||
@param[out] Memory A pointer to receive the base allocated memory
|
||||
address.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in spec.
|
||||
@retval EFI_NOT_FOUND Could not allocate pages match the requirement.
|
||||
|
@ -77,7 +79,8 @@ SmmInternalAllocatePagesEx (
|
|||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN AddRegion
|
||||
IN BOOLEAN AddRegion,
|
||||
IN BOOLEAN NeedGuard
|
||||
);
|
||||
|
||||
/**
|
||||
|
@ -112,7 +115,8 @@ AllocateMemoryMapEntry (
|
|||
EfiRuntimeServicesData,
|
||||
EFI_SIZE_TO_PAGES (RUNTIME_PAGE_ALLOCATION_GRANULARITY),
|
||||
&Mem,
|
||||
TRUE
|
||||
TRUE,
|
||||
FALSE
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
if(!EFI_ERROR (Status)) {
|
||||
|
@ -688,6 +692,8 @@ InternalAllocAddress (
|
|||
@param[out] Memory A pointer to receive the base allocated memory
|
||||
address.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in spec.
|
||||
@retval EFI_NOT_FOUND Could not allocate pages match the requirement.
|
||||
|
@ -701,7 +707,8 @@ SmmInternalAllocatePagesEx (
|
|||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN AddRegion
|
||||
IN BOOLEAN AddRegion,
|
||||
IN BOOLEAN NeedGuard
|
||||
)
|
||||
{
|
||||
UINTN RequestedAddress;
|
||||
|
@ -723,6 +730,21 @@ SmmInternalAllocatePagesEx (
|
|||
case AllocateAnyPages:
|
||||
RequestedAddress = (UINTN)(-1);
|
||||
case AllocateMaxAddress:
|
||||
if (NeedGuard) {
|
||||
*Memory = InternalAllocMaxAddressWithGuard (
|
||||
&mSmmMemoryMap,
|
||||
NumberOfPages,
|
||||
RequestedAddress,
|
||||
MemoryType
|
||||
);
|
||||
if (*Memory == (UINTN)-1) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
} else {
|
||||
ASSERT (VerifyMemoryGuard (*Memory, NumberOfPages) == TRUE);
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
}
|
||||
|
||||
*Memory = InternalAllocMaxAddress (
|
||||
&mSmmMemoryMap,
|
||||
NumberOfPages,
|
||||
|
@ -766,6 +788,8 @@ SmmInternalAllocatePagesEx (
|
|||
@param[in] NumberOfPages The number of pages to allocate.
|
||||
@param[out] Memory A pointer to receive the base allocated memory
|
||||
address.
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in spec.
|
||||
@retval EFI_NOT_FOUND Could not allocate pages match the requirement.
|
||||
|
@ -779,10 +803,12 @@ SmmInternalAllocatePages (
|
|||
IN EFI_ALLOCATE_TYPE Type,
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN NeedGuard
|
||||
)
|
||||
{
|
||||
return SmmInternalAllocatePagesEx (Type, MemoryType, NumberOfPages, Memory, FALSE);
|
||||
return SmmInternalAllocatePagesEx (Type, MemoryType, NumberOfPages, Memory,
|
||||
FALSE, NeedGuard);
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -811,8 +837,11 @@ SmmAllocatePages (
|
|||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
BOOLEAN NeedGuard;
|
||||
|
||||
Status = SmmInternalAllocatePages (Type, MemoryType, NumberOfPages, Memory);
|
||||
NeedGuard = IsPageTypeToGuard (MemoryType, Type);
|
||||
Status = SmmInternalAllocatePages (Type, MemoryType, NumberOfPages, Memory,
|
||||
NeedGuard);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
SmmCoreUpdateProfile (
|
||||
(EFI_PHYSICAL_ADDRESS) (UINTN) RETURN_ADDRESS (0),
|
||||
|
@ -931,6 +960,7 @@ SmmInternalFreePagesEx (
|
|||
|
||||
@param[in] Memory Base address of memory being freed.
|
||||
@param[in] NumberOfPages The number of pages to free.
|
||||
@param[in] IsGuarded Is the memory to free guarded or not.
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range.
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or NumberOfPages is zero.
|
||||
|
@ -941,9 +971,13 @@ EFI_STATUS
|
|||
EFIAPI
|
||||
SmmInternalFreePages (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN IsGuarded
|
||||
)
|
||||
{
|
||||
if (IsGuarded) {
|
||||
return SmmInternalFreePagesExWithGuard (Memory, NumberOfPages, FALSE);
|
||||
}
|
||||
return SmmInternalFreePagesEx (Memory, NumberOfPages, FALSE);
|
||||
}
|
||||
|
||||
|
@ -966,8 +1000,10 @@ SmmFreePages (
|
|||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
BOOLEAN IsGuarded;
|
||||
|
||||
Status = SmmInternalFreePages (Memory, NumberOfPages);
|
||||
IsGuarded = IsHeapGuardEnabled () && IsMemoryGuarded (Memory);
|
||||
Status = SmmInternalFreePages (Memory, NumberOfPages, IsGuarded);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
SmmCoreUpdateProfile (
|
||||
(EFI_PHYSICAL_ADDRESS) (UINTN) RETURN_ADDRESS (0),
|
||||
|
|
|
@ -506,6 +506,11 @@ SmmEntryPoint (
|
|||
//
|
||||
PlatformHookBeforeSmmDispatch ();
|
||||
|
||||
//
|
||||
// Call memory management hook function
|
||||
//
|
||||
SmmEntryPointMemoryManagementHook ();
|
||||
|
||||
//
|
||||
// If a legacy boot has occured, then make sure gSmmCorePrivate is not accessed
|
||||
//
|
||||
|
@ -699,7 +704,7 @@ SmmMain (
|
|||
//
|
||||
gSmmCorePrivate->Smst = &gSmmCoreSmst;
|
||||
gSmmCorePrivate->SmmEntryPoint = SmmEntryPoint;
|
||||
|
||||
|
||||
//
|
||||
// No need to initialize memory service.
|
||||
// It is done in constructor of PiSmmCoreMemoryAllocationLib(),
|
||||
|
|
|
@ -33,6 +33,7 @@
|
|||
#include <Protocol/SmmLegacyBoot.h>
|
||||
#include <Protocol/SmmReadyToBoot.h>
|
||||
#include <Protocol/SmmEndOfS3Resume.h>
|
||||
#include <Protocol/SmmMemoryAttribute.h>
|
||||
|
||||
#include <Guid/Apriori.h>
|
||||
#include <Guid/EventGroup.h>
|
||||
|
@ -60,6 +61,7 @@
|
|||
#include <Library/SmmMemLib.h>
|
||||
|
||||
#include "PiSmmCorePrivateData.h"
|
||||
#include "HeapGuard.h"
|
||||
|
||||
//
|
||||
// Used to build a table of SMI Handlers that the SMM Core registers
|
||||
|
@ -318,6 +320,7 @@ SmmAllocatePages (
|
|||
@param NumberOfPages The number of pages to allocate
|
||||
@param Memory A pointer to receive the base allocated memory
|
||||
address
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in spec.
|
||||
@retval EFI_NOT_FOUND Could not allocate pages match the requirement.
|
||||
|
@ -331,7 +334,8 @@ SmmInternalAllocatePages (
|
|||
IN EFI_ALLOCATE_TYPE Type,
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN NeedGuard
|
||||
);
|
||||
|
||||
/**
|
||||
|
@ -357,6 +361,8 @@ SmmFreePages (
|
|||
|
||||
@param Memory Base address of memory being freed
|
||||
@param NumberOfPages The number of pages to free
|
||||
@param IsGuarded Flag to indicate if the memory is guarded
|
||||
or not
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or NumberOfPages is zero.
|
||||
|
@ -367,7 +373,8 @@ EFI_STATUS
|
|||
EFIAPI
|
||||
SmmInternalFreePages (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN IsGuarded
|
||||
);
|
||||
|
||||
/**
|
||||
|
@ -1255,4 +1262,74 @@ typedef enum {
|
|||
|
||||
extern LIST_ENTRY mSmmPoolLists[SmmPoolTypeMax][MAX_POOL_INDEX];
|
||||
|
||||
/**
|
||||
Internal Function. Allocate n pages from given free page node.
|
||||
|
||||
@param Pages The free page node.
|
||||
@param NumberOfPages Number of pages to be allocated.
|
||||
@param MaxAddress Request to allocate memory below this address.
|
||||
|
||||
@return Memory address of allocated pages.
|
||||
|
||||
**/
|
||||
UINTN
|
||||
InternalAllocPagesOnOneNode (
|
||||
IN OUT FREE_PAGE_LIST *Pages,
|
||||
IN UINTN NumberOfPages,
|
||||
IN UINTN MaxAddress
|
||||
);
|
||||
|
||||
/**
|
||||
Update SMM memory map entry.
|
||||
|
||||
@param[in] Type The type of allocation to perform.
|
||||
@param[in] Memory The base of memory address.
|
||||
@param[in] NumberOfPages The number of pages to allocate.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
**/
|
||||
VOID
|
||||
ConvertSmmMemoryMapEntry (
|
||||
IN EFI_MEMORY_TYPE Type,
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Internal function. Moves any memory descriptors that are on the
|
||||
temporary descriptor stack to heap.
|
||||
|
||||
**/
|
||||
VOID
|
||||
CoreFreeMemoryMapStack (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Frees previous allocated pages.
|
||||
|
||||
@param[in] Memory Base address of memory being freed.
|
||||
@param[in] NumberOfPages The number of pages to free.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range.
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or NumberOfPages is zero.
|
||||
@return EFI_SUCCESS Pages successfully freed.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
SmmInternalFreePagesEx (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Hook function used to set all Guard pages after entering SMM mode.
|
||||
**/
|
||||
VOID
|
||||
SmmEntryPointMemoryManagementHook (
|
||||
VOID
|
||||
);
|
||||
|
||||
#endif
|
||||
|
|
|
@ -40,6 +40,7 @@
|
|||
SmramProfileRecord.c
|
||||
MemoryAttributesTable.c
|
||||
SmiHandlerProfile.c
|
||||
HeapGuard.c
|
||||
|
||||
[Packages]
|
||||
MdePkg/MdePkg.dec
|
||||
|
@ -89,6 +90,8 @@
|
|||
gEfiSmmGpiDispatch2ProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEfiSmmIoTrapDispatch2ProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEfiSmmUsbDispatch2ProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEfiSmmCpuProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEdkiiSmmMemoryAttributeProtocolGuid ## CONSUMES
|
||||
|
||||
[Pcd]
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdLoadFixAddressSmmCodePageNumber ## SOMETIMES_CONSUMES
|
||||
|
@ -97,6 +100,9 @@
|
|||
gEfiMdeModulePkgTokenSpaceGuid.PcdMemoryProfilePropertyMask ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdMemoryProfileDriverPath ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdSmiHandlerProfilePropertyMask ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPageType ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPoolType ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPropertyMask ## CONSUMES
|
||||
|
||||
[Guids]
|
||||
gAprioriGuid ## SOMETIMES_CONSUMES ## File
|
||||
|
|
|
@ -144,7 +144,9 @@ InternalAllocPoolByIndex (
|
|||
Status = EFI_SUCCESS;
|
||||
Hdr = NULL;
|
||||
if (PoolIndex == MAX_POOL_INDEX) {
|
||||
Status = SmmInternalAllocatePages (AllocateAnyPages, PoolType, EFI_SIZE_TO_PAGES (MAX_POOL_SIZE << 1), &Address);
|
||||
Status = SmmInternalAllocatePages (AllocateAnyPages, PoolType,
|
||||
EFI_SIZE_TO_PAGES (MAX_POOL_SIZE << 1),
|
||||
&Address, FALSE);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
|
@ -243,6 +245,9 @@ SmmInternalAllocatePool (
|
|||
EFI_STATUS Status;
|
||||
EFI_PHYSICAL_ADDRESS Address;
|
||||
UINTN PoolIndex;
|
||||
BOOLEAN HasPoolTail;
|
||||
BOOLEAN NeedGuard;
|
||||
UINTN NoPages;
|
||||
|
||||
Address = 0;
|
||||
|
||||
|
@ -251,25 +256,47 @@ SmmInternalAllocatePool (
|
|||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
NeedGuard = IsPoolTypeToGuard (PoolType);
|
||||
HasPoolTail = !(NeedGuard &&
|
||||
((PcdGet8 (PcdHeapGuardPropertyMask) & BIT7) == 0));
|
||||
|
||||
//
|
||||
// Adjust the size by the pool header & tail overhead
|
||||
//
|
||||
Size += POOL_OVERHEAD;
|
||||
if (Size > MAX_POOL_SIZE) {
|
||||
Size = EFI_SIZE_TO_PAGES (Size);
|
||||
Status = SmmInternalAllocatePages (AllocateAnyPages, PoolType, Size, &Address);
|
||||
if (Size > MAX_POOL_SIZE || NeedGuard) {
|
||||
if (!HasPoolTail) {
|
||||
Size -= sizeof (POOL_TAIL);
|
||||
}
|
||||
|
||||
NoPages = EFI_SIZE_TO_PAGES (Size);
|
||||
Status = SmmInternalAllocatePages (AllocateAnyPages, PoolType, NoPages,
|
||||
&Address, NeedGuard);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
if (NeedGuard) {
|
||||
ASSERT (VerifyMemoryGuard (Address, NoPages) == TRUE);
|
||||
Address = (EFI_PHYSICAL_ADDRESS)(UINTN)AdjustPoolHeadA (
|
||||
Address,
|
||||
NoPages,
|
||||
Size
|
||||
);
|
||||
}
|
||||
|
||||
PoolHdr = (POOL_HEADER*)(UINTN)Address;
|
||||
PoolHdr->Signature = POOL_HEAD_SIGNATURE;
|
||||
PoolHdr->Size = EFI_PAGES_TO_SIZE (Size);
|
||||
PoolHdr->Size = Size;
|
||||
PoolHdr->Available = FALSE;
|
||||
PoolHdr->Type = PoolType;
|
||||
PoolTail = HEAD_TO_TAIL(PoolHdr);
|
||||
PoolTail->Signature = POOL_TAIL_SIGNATURE;
|
||||
PoolTail->Size = PoolHdr->Size;
|
||||
|
||||
if (HasPoolTail) {
|
||||
PoolTail = HEAD_TO_TAIL (PoolHdr);
|
||||
PoolTail->Signature = POOL_TAIL_SIGNATURE;
|
||||
PoolTail->Size = PoolHdr->Size;
|
||||
}
|
||||
|
||||
*Buffer = PoolHdr + 1;
|
||||
return Status;
|
||||
}
|
||||
|
@ -341,28 +368,47 @@ SmmInternalFreePool (
|
|||
{
|
||||
FREE_POOL_HEADER *FreePoolHdr;
|
||||
POOL_TAIL *PoolTail;
|
||||
BOOLEAN HasPoolTail;
|
||||
BOOLEAN MemoryGuarded;
|
||||
|
||||
if (Buffer == NULL) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
MemoryGuarded = IsHeapGuardEnabled () &&
|
||||
IsMemoryGuarded ((EFI_PHYSICAL_ADDRESS)(UINTN)Buffer);
|
||||
HasPoolTail = !(MemoryGuarded &&
|
||||
((PcdGet8 (PcdHeapGuardPropertyMask) & BIT7) == 0));
|
||||
|
||||
FreePoolHdr = (FREE_POOL_HEADER*)((POOL_HEADER*)Buffer - 1);
|
||||
ASSERT (FreePoolHdr->Header.Signature == POOL_HEAD_SIGNATURE);
|
||||
ASSERT (!FreePoolHdr->Header.Available);
|
||||
PoolTail = HEAD_TO_TAIL(&FreePoolHdr->Header);
|
||||
ASSERT (PoolTail->Signature == POOL_TAIL_SIGNATURE);
|
||||
ASSERT (FreePoolHdr->Header.Size == PoolTail->Size);
|
||||
|
||||
if (FreePoolHdr->Header.Signature != POOL_HEAD_SIGNATURE) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
if (PoolTail->Signature != POOL_TAIL_SIGNATURE) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
if (HasPoolTail) {
|
||||
PoolTail = HEAD_TO_TAIL (&FreePoolHdr->Header);
|
||||
ASSERT (PoolTail->Signature == POOL_TAIL_SIGNATURE);
|
||||
ASSERT (FreePoolHdr->Header.Size == PoolTail->Size);
|
||||
if (PoolTail->Signature != POOL_TAIL_SIGNATURE) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
if (FreePoolHdr->Header.Size != PoolTail->Size) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
} else {
|
||||
PoolTail = NULL;
|
||||
}
|
||||
|
||||
if (FreePoolHdr->Header.Size != PoolTail->Size) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
if (MemoryGuarded) {
|
||||
Buffer = AdjustPoolHeadF ((EFI_PHYSICAL_ADDRESS)(UINTN)FreePoolHdr);
|
||||
return SmmInternalFreePages (
|
||||
(EFI_PHYSICAL_ADDRESS)(UINTN)Buffer,
|
||||
EFI_SIZE_TO_PAGES (FreePoolHdr->Header.Size),
|
||||
TRUE
|
||||
);
|
||||
}
|
||||
|
||||
if (FreePoolHdr->Header.Size > MAX_POOL_SIZE) {
|
||||
|
@ -370,7 +416,8 @@ SmmInternalFreePool (
|
|||
ASSERT ((FreePoolHdr->Header.Size & EFI_PAGE_MASK) == 0);
|
||||
return SmmInternalFreePages (
|
||||
(EFI_PHYSICAL_ADDRESS)(UINTN)FreePoolHdr,
|
||||
EFI_SIZE_TO_PAGES (FreePoolHdr->Header.Size)
|
||||
EFI_SIZE_TO_PAGES (FreePoolHdr->Header.Size),
|
||||
FALSE
|
||||
);
|
||||
}
|
||||
return InternalFreePoolByIndex (FreePoolHdr, PoolTail);
|
||||
|
|
Loading…
Reference in New Issue