mirror of https://github.com/acidanthera/audk.git
MdeModulePkg: Fix unix style of EOL
Cc: Wu Hao <hao.a.wu@intel.com> Cc: Star Zeng <star.zeng@intel.com> Cc: Eric Dong <eric.dong@intel.com> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Jian J Wang <jian.j.wang@intel.com> Reviewed-by: Hao Wu <hao.a.wu@intel.com>
This commit is contained in:
parent
a89b923ea9
commit
e63da9f033
|
@ -56,7 +56,7 @@
|
|||
Mem/MemData.c
|
||||
Mem/Imem.h
|
||||
Mem/MemoryProfileRecord.c
|
||||
Mem/HeapGuard.c
|
||||
Mem/HeapGuard.c
|
||||
FwVolBlock/FwVolBlock.c
|
||||
FwVolBlock/FwVolBlock.h
|
||||
FwVol/FwVolWrite.c
|
||||
|
@ -194,9 +194,9 @@
|
|||
gEfiMdeModulePkgTokenSpaceGuid.PcdImageProtectionPolicy ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdDxeNxMemoryProtectionPolicy ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdNullPointerDetectionPropertyMask ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPageType ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPoolType ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPropertyMask ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPageType ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPoolType ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPropertyMask ## CONSUMES
|
||||
|
||||
# [Hob]
|
||||
# RESOURCE_DESCRIPTOR ## CONSUMES
|
||||
|
|
File diff suppressed because it is too large
Load Diff
|
@ -1,394 +1,394 @@
|
|||
/** @file
|
||||
Data type, macros and function prototypes of heap guard feature.
|
||||
|
||||
Copyright (c) 2017, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
http://opensource.org/licenses/bsd-license.php
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
**/
|
||||
|
||||
#ifndef _HEAPGUARD_H_
|
||||
#define _HEAPGUARD_H_
|
||||
|
||||
//
|
||||
// Following macros are used to define and access the guarded memory bitmap
|
||||
// table.
|
||||
//
|
||||
// To simplify the access and reduce the memory used for this table, the
|
||||
// table is constructed in the similar way as page table structure but in
|
||||
// reverse direction, i.e. from bottom growing up to top.
|
||||
//
|
||||
// - 1-bit tracks 1 page (4KB)
|
||||
// - 1-UINT64 map entry tracks 256KB memory
|
||||
// - 1K-UINT64 map table tracks 256MB memory
|
||||
// - Five levels of tables can track any address of memory of 64-bit
|
||||
// system, like below.
|
||||
//
|
||||
// 512 * 512 * 512 * 512 * 1K * 64b * 4K
|
||||
// 111111111 111111111 111111111 111111111 1111111111 111111 111111111111
|
||||
// 63 54 45 36 27 17 11 0
|
||||
// 9b 9b 9b 9b 10b 6b 12b
|
||||
// L0 -> L1 -> L2 -> L3 -> L4 -> bits -> page
|
||||
// 1FF 1FF 1FF 1FF 3FF 3F FFF
|
||||
//
|
||||
// L4 table has 1K * sizeof(UINT64) = 8K (2-page), which can track 256MB
|
||||
// memory. Each table of L0-L3 will be allocated when its memory address
|
||||
// range is to be tracked. Only 1-page will be allocated each time. This
|
||||
// can save memories used to establish this map table.
|
||||
//
|
||||
// For a normal configuration of system with 4G memory, two levels of tables
|
||||
// can track the whole memory, because two levels (L3+L4) of map tables have
|
||||
// already coverred 37-bit of memory address. And for a normal UEFI BIOS,
|
||||
// less than 128M memory would be consumed during boot. That means we just
|
||||
// need
|
||||
//
|
||||
// 1-page (L3) + 2-page (L4)
|
||||
//
|
||||
// memory (3 pages) to track the memory allocation works. In this case,
|
||||
// there's no need to setup L0-L2 tables.
|
||||
//
|
||||
|
||||
//
|
||||
// Each entry occupies 8B/64b. 1-page can hold 512 entries, which spans 9
|
||||
// bits in address. (512 = 1 << 9)
|
||||
//
|
||||
#define BYTE_LENGTH_SHIFT 3 // (8 = 1 << 3)
|
||||
|
||||
#define GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT \
|
||||
(EFI_PAGE_SHIFT - BYTE_LENGTH_SHIFT)
|
||||
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH 5
|
||||
|
||||
// Use UINT64_index + bit_index_of_UINT64 to locate the bit in may
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT 6 // (64 = 1 << 6)
|
||||
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BITS \
|
||||
(1 << GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT)
|
||||
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BYTES \
|
||||
(GUARDED_HEAP_MAP_ENTRY_BITS / 8)
|
||||
|
||||
// L4 table address width: 64 - 9 * 4 - 6 - 12 = 10b
|
||||
#define GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
(GUARDED_HEAP_MAP_ENTRY_BITS \
|
||||
- GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 4 \
|
||||
- GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
- EFI_PAGE_SHIFT)
|
||||
|
||||
// L4 table address mask: (1 << 10 - 1) = 0x3FF
|
||||
#define GUARDED_HEAP_MAP_ENTRY_MASK \
|
||||
((1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) - 1)
|
||||
|
||||
// Size of each L4 table: (1 << 10) * 8 = 8KB = 2-page
|
||||
#define GUARDED_HEAP_MAP_SIZE \
|
||||
((1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) * GUARDED_HEAP_MAP_ENTRY_BYTES)
|
||||
|
||||
// Memory size tracked by one L4 table: 8KB * 8 * 4KB = 256MB
|
||||
#define GUARDED_HEAP_MAP_UNIT_SIZE \
|
||||
(GUARDED_HEAP_MAP_SIZE * 8 * EFI_PAGE_SIZE)
|
||||
|
||||
// L4 table entry number: 8KB / 8 = 1024
|
||||
#define GUARDED_HEAP_MAP_ENTRIES_PER_UNIT \
|
||||
(GUARDED_HEAP_MAP_SIZE / GUARDED_HEAP_MAP_ENTRY_BYTES)
|
||||
|
||||
// L4 table entry indexing
|
||||
#define GUARDED_HEAP_MAP_ENTRY_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT) \
|
||||
& GUARDED_HEAP_MAP_ENTRY_MASK)
|
||||
|
||||
// L4 table entry bit indexing
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BIT_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT) \
|
||||
& ((1 << GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT) - 1))
|
||||
|
||||
//
|
||||
// Total bits (pages) tracked by one L4 table (65536-bit)
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_BITS \
|
||||
(1 << (GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT))
|
||||
|
||||
//
|
||||
// Bit indexing inside the whole L4 table (0 - 65535)
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_BIT_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT) \
|
||||
& ((1 << (GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT)) - 1))
|
||||
|
||||
//
|
||||
// Memory address bit width tracked by L4 table: 10 + 6 + 12 = 28
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_SHIFT \
|
||||
(GUARDED_HEAP_MAP_ENTRY_SHIFT + GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
+ EFI_PAGE_SHIFT)
|
||||
|
||||
//
|
||||
// Macro used to initialize the local array variable for map table traversing
|
||||
// {55, 46, 37, 28, 18}
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH_SHIFTS \
|
||||
{ \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 3, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 2, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT, \
|
||||
EFI_PAGE_SHIFT + GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
}
|
||||
|
||||
//
|
||||
// Masks used to extract address range of each level of table
|
||||
// {0x1FF, 0x1FF, 0x1FF, 0x1FF, 0x3FF}
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH_MASKS \
|
||||
{ \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) - 1 \
|
||||
}
|
||||
|
||||
//
|
||||
// Memory type to guard (matching the related PCD definition)
|
||||
//
|
||||
#define GUARD_HEAP_TYPE_POOL BIT0
|
||||
#define GUARD_HEAP_TYPE_PAGE BIT1
|
||||
|
||||
//
|
||||
// Debug message level
|
||||
//
|
||||
#define HEAP_GUARD_DEBUG_LEVEL (DEBUG_POOL|DEBUG_PAGE)
|
||||
|
||||
typedef struct {
|
||||
UINT32 TailMark;
|
||||
UINT32 HeadMark;
|
||||
EFI_PHYSICAL_ADDRESS Address;
|
||||
LIST_ENTRY Link;
|
||||
} HEAP_GUARD_NODE;
|
||||
|
||||
/**
|
||||
Internal function. Converts a memory range to the specified type.
|
||||
The range must exist in the memory map.
|
||||
|
||||
@param Start The first address of the range Must be page
|
||||
aligned.
|
||||
@param NumberOfPages The number of pages to convert.
|
||||
@param NewType The new type for the memory range.
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Invalid parameter.
|
||||
@retval EFI_NOT_FOUND Could not find a descriptor cover the specified
|
||||
range or convertion not allowed.
|
||||
@retval EFI_SUCCESS Successfully converts the memory range to the
|
||||
specified type.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
CoreConvertPages (
|
||||
IN UINT64 Start,
|
||||
IN UINT64 NumberOfPages,
|
||||
IN EFI_MEMORY_TYPE NewType
|
||||
);
|
||||
|
||||
/**
|
||||
Allocate or free guarded memory.
|
||||
|
||||
@param[in] Start Start address of memory to allocate or free.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
@param[in] NewType Memory type to convert to.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
EFI_STATUS
|
||||
CoreConvertPagesWithGuard (
|
||||
IN UINT64 Start,
|
||||
IN UINTN NumberOfPages,
|
||||
IN EFI_MEMORY_TYPE NewType
|
||||
);
|
||||
|
||||
/**
|
||||
Set head Guard and tail Guard for the given memory range.
|
||||
|
||||
@param[in] Memory Base address of memory to set guard for.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
SetGuardForMemory (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Unset head Guard and tail Guard for the given memory range.
|
||||
|
||||
@param[in] Memory Base address of memory to unset guard for.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
UnsetGuardForMemory (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the base and number of pages to really allocate according to Guard.
|
||||
|
||||
@param[in,out] Memory Base address of free memory.
|
||||
@param[in,out] NumberOfPages Size of memory to allocate.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
AdjustMemoryA (
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN OUT UINTN *NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the start address and number of pages to free according to Guard.
|
||||
|
||||
The purpose of this function is to keep the shared Guard page with adjacent
|
||||
memory block if it's still in guard, or free it if no more sharing. Another
|
||||
is to reserve pages as Guard pages in partial page free situation.
|
||||
|
||||
@param[in,out] Memory Base address of memory to free.
|
||||
@param[in,out] NumberOfPages Size of memory to free.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
AdjustMemoryF (
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN OUT UINTN *NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust address of free memory according to existing and/or required Guard.
|
||||
|
||||
This function will check if there're existing Guard pages of adjacent
|
||||
memory blocks, and try to use it as the Guard page of the memory to be
|
||||
allocated.
|
||||
|
||||
@param[in] Start Start address of free memory block.
|
||||
@param[in] Size Size of free memory block.
|
||||
@param[in] SizeRequested Size of memory to allocate.
|
||||
|
||||
@return The end address of memory block found.
|
||||
@return 0 if no enough space for the required size of memory and its Guard.
|
||||
**/
|
||||
UINT64
|
||||
AdjustMemoryS (
|
||||
IN UINT64 Start,
|
||||
IN UINT64 Size,
|
||||
IN UINT64 SizeRequested
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the pool at the given address should be guarded or not.
|
||||
|
||||
@param[in] MemoryType Pool type to check.
|
||||
|
||||
|
||||
@return TRUE The given type of pool should be guarded.
|
||||
@return FALSE The given type of pool should not be guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsPoolTypeToGuard (
|
||||
IN EFI_MEMORY_TYPE MemoryType
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address should be guarded or not.
|
||||
|
||||
@param[in] MemoryType Page type to check.
|
||||
@param[in] AllocateType Allocation type to check.
|
||||
|
||||
@return TRUE The given type of page should be guarded.
|
||||
@return FALSE The given type of page should not be guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsPageTypeToGuard (
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN EFI_ALLOCATE_TYPE AllocateType
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address is guarded or not.
|
||||
|
||||
@param[in] Address The address to check for.
|
||||
|
||||
@return TRUE The page at Address is guarded.
|
||||
@return FALSE The page at Address is not guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
IsMemoryGuarded (
|
||||
IN EFI_PHYSICAL_ADDRESS Address
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address is a Guard page or not.
|
||||
|
||||
@param[in] Address The address to check for.
|
||||
|
||||
@return TRUE The page at Address is a Guard page.
|
||||
@return FALSE The page at Address is not a Guard page.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
IsGuardPage (
|
||||
IN EFI_PHYSICAL_ADDRESS Address
|
||||
);
|
||||
|
||||
/**
|
||||
Dump the guarded memory bit map.
|
||||
**/
|
||||
VOID
|
||||
EFIAPI
|
||||
DumpGuardedMemoryBitmap (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the pool head position to make sure the Guard page is adjavent to
|
||||
pool tail or pool head.
|
||||
|
||||
@param[in] Memory Base address of memory allocated.
|
||||
@param[in] NoPages Number of pages actually allocated.
|
||||
@param[in] Size Size of memory requested.
|
||||
(plus pool head/tail overhead)
|
||||
|
||||
@return Address of pool head.
|
||||
**/
|
||||
VOID *
|
||||
AdjustPoolHeadA (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NoPages,
|
||||
IN UINTN Size
|
||||
);
|
||||
|
||||
/**
|
||||
Get the page base address according to pool head address.
|
||||
|
||||
@param[in] Memory Head address of pool to free.
|
||||
|
||||
@return Address of pool head.
|
||||
**/
|
||||
VOID *
|
||||
AdjustPoolHeadF (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory
|
||||
);
|
||||
|
||||
extern BOOLEAN mOnGuarding;
|
||||
|
||||
#endif
|
||||
/** @file
|
||||
Data type, macros and function prototypes of heap guard feature.
|
||||
|
||||
Copyright (c) 2017, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
http://opensource.org/licenses/bsd-license.php
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
**/
|
||||
|
||||
#ifndef _HEAPGUARD_H_
|
||||
#define _HEAPGUARD_H_
|
||||
|
||||
//
|
||||
// Following macros are used to define and access the guarded memory bitmap
|
||||
// table.
|
||||
//
|
||||
// To simplify the access and reduce the memory used for this table, the
|
||||
// table is constructed in the similar way as page table structure but in
|
||||
// reverse direction, i.e. from bottom growing up to top.
|
||||
//
|
||||
// - 1-bit tracks 1 page (4KB)
|
||||
// - 1-UINT64 map entry tracks 256KB memory
|
||||
// - 1K-UINT64 map table tracks 256MB memory
|
||||
// - Five levels of tables can track any address of memory of 64-bit
|
||||
// system, like below.
|
||||
//
|
||||
// 512 * 512 * 512 * 512 * 1K * 64b * 4K
|
||||
// 111111111 111111111 111111111 111111111 1111111111 111111 111111111111
|
||||
// 63 54 45 36 27 17 11 0
|
||||
// 9b 9b 9b 9b 10b 6b 12b
|
||||
// L0 -> L1 -> L2 -> L3 -> L4 -> bits -> page
|
||||
// 1FF 1FF 1FF 1FF 3FF 3F FFF
|
||||
//
|
||||
// L4 table has 1K * sizeof(UINT64) = 8K (2-page), which can track 256MB
|
||||
// memory. Each table of L0-L3 will be allocated when its memory address
|
||||
// range is to be tracked. Only 1-page will be allocated each time. This
|
||||
// can save memories used to establish this map table.
|
||||
//
|
||||
// For a normal configuration of system with 4G memory, two levels of tables
|
||||
// can track the whole memory, because two levels (L3+L4) of map tables have
|
||||
// already coverred 37-bit of memory address. And for a normal UEFI BIOS,
|
||||
// less than 128M memory would be consumed during boot. That means we just
|
||||
// need
|
||||
//
|
||||
// 1-page (L3) + 2-page (L4)
|
||||
//
|
||||
// memory (3 pages) to track the memory allocation works. In this case,
|
||||
// there's no need to setup L0-L2 tables.
|
||||
//
|
||||
|
||||
//
|
||||
// Each entry occupies 8B/64b. 1-page can hold 512 entries, which spans 9
|
||||
// bits in address. (512 = 1 << 9)
|
||||
//
|
||||
#define BYTE_LENGTH_SHIFT 3 // (8 = 1 << 3)
|
||||
|
||||
#define GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT \
|
||||
(EFI_PAGE_SHIFT - BYTE_LENGTH_SHIFT)
|
||||
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH 5
|
||||
|
||||
// Use UINT64_index + bit_index_of_UINT64 to locate the bit in may
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT 6 // (64 = 1 << 6)
|
||||
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BITS \
|
||||
(1 << GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT)
|
||||
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BYTES \
|
||||
(GUARDED_HEAP_MAP_ENTRY_BITS / 8)
|
||||
|
||||
// L4 table address width: 64 - 9 * 4 - 6 - 12 = 10b
|
||||
#define GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
(GUARDED_HEAP_MAP_ENTRY_BITS \
|
||||
- GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 4 \
|
||||
- GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
- EFI_PAGE_SHIFT)
|
||||
|
||||
// L4 table address mask: (1 << 10 - 1) = 0x3FF
|
||||
#define GUARDED_HEAP_MAP_ENTRY_MASK \
|
||||
((1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) - 1)
|
||||
|
||||
// Size of each L4 table: (1 << 10) * 8 = 8KB = 2-page
|
||||
#define GUARDED_HEAP_MAP_SIZE \
|
||||
((1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) * GUARDED_HEAP_MAP_ENTRY_BYTES)
|
||||
|
||||
// Memory size tracked by one L4 table: 8KB * 8 * 4KB = 256MB
|
||||
#define GUARDED_HEAP_MAP_UNIT_SIZE \
|
||||
(GUARDED_HEAP_MAP_SIZE * 8 * EFI_PAGE_SIZE)
|
||||
|
||||
// L4 table entry number: 8KB / 8 = 1024
|
||||
#define GUARDED_HEAP_MAP_ENTRIES_PER_UNIT \
|
||||
(GUARDED_HEAP_MAP_SIZE / GUARDED_HEAP_MAP_ENTRY_BYTES)
|
||||
|
||||
// L4 table entry indexing
|
||||
#define GUARDED_HEAP_MAP_ENTRY_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT) \
|
||||
& GUARDED_HEAP_MAP_ENTRY_MASK)
|
||||
|
||||
// L4 table entry bit indexing
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BIT_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT) \
|
||||
& ((1 << GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT) - 1))
|
||||
|
||||
//
|
||||
// Total bits (pages) tracked by one L4 table (65536-bit)
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_BITS \
|
||||
(1 << (GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT))
|
||||
|
||||
//
|
||||
// Bit indexing inside the whole L4 table (0 - 65535)
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_BIT_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT) \
|
||||
& ((1 << (GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT)) - 1))
|
||||
|
||||
//
|
||||
// Memory address bit width tracked by L4 table: 10 + 6 + 12 = 28
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_SHIFT \
|
||||
(GUARDED_HEAP_MAP_ENTRY_SHIFT + GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
+ EFI_PAGE_SHIFT)
|
||||
|
||||
//
|
||||
// Macro used to initialize the local array variable for map table traversing
|
||||
// {55, 46, 37, 28, 18}
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH_SHIFTS \
|
||||
{ \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 3, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 2, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT, \
|
||||
EFI_PAGE_SHIFT + GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
}
|
||||
|
||||
//
|
||||
// Masks used to extract address range of each level of table
|
||||
// {0x1FF, 0x1FF, 0x1FF, 0x1FF, 0x3FF}
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH_MASKS \
|
||||
{ \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) - 1 \
|
||||
}
|
||||
|
||||
//
|
||||
// Memory type to guard (matching the related PCD definition)
|
||||
//
|
||||
#define GUARD_HEAP_TYPE_POOL BIT0
|
||||
#define GUARD_HEAP_TYPE_PAGE BIT1
|
||||
|
||||
//
|
||||
// Debug message level
|
||||
//
|
||||
#define HEAP_GUARD_DEBUG_LEVEL (DEBUG_POOL|DEBUG_PAGE)
|
||||
|
||||
typedef struct {
|
||||
UINT32 TailMark;
|
||||
UINT32 HeadMark;
|
||||
EFI_PHYSICAL_ADDRESS Address;
|
||||
LIST_ENTRY Link;
|
||||
} HEAP_GUARD_NODE;
|
||||
|
||||
/**
|
||||
Internal function. Converts a memory range to the specified type.
|
||||
The range must exist in the memory map.
|
||||
|
||||
@param Start The first address of the range Must be page
|
||||
aligned.
|
||||
@param NumberOfPages The number of pages to convert.
|
||||
@param NewType The new type for the memory range.
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Invalid parameter.
|
||||
@retval EFI_NOT_FOUND Could not find a descriptor cover the specified
|
||||
range or convertion not allowed.
|
||||
@retval EFI_SUCCESS Successfully converts the memory range to the
|
||||
specified type.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
CoreConvertPages (
|
||||
IN UINT64 Start,
|
||||
IN UINT64 NumberOfPages,
|
||||
IN EFI_MEMORY_TYPE NewType
|
||||
);
|
||||
|
||||
/**
|
||||
Allocate or free guarded memory.
|
||||
|
||||
@param[in] Start Start address of memory to allocate or free.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
@param[in] NewType Memory type to convert to.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
EFI_STATUS
|
||||
CoreConvertPagesWithGuard (
|
||||
IN UINT64 Start,
|
||||
IN UINTN NumberOfPages,
|
||||
IN EFI_MEMORY_TYPE NewType
|
||||
);
|
||||
|
||||
/**
|
||||
Set head Guard and tail Guard for the given memory range.
|
||||
|
||||
@param[in] Memory Base address of memory to set guard for.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
SetGuardForMemory (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Unset head Guard and tail Guard for the given memory range.
|
||||
|
||||
@param[in] Memory Base address of memory to unset guard for.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
UnsetGuardForMemory (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the base and number of pages to really allocate according to Guard.
|
||||
|
||||
@param[in,out] Memory Base address of free memory.
|
||||
@param[in,out] NumberOfPages Size of memory to allocate.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
AdjustMemoryA (
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN OUT UINTN *NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the start address and number of pages to free according to Guard.
|
||||
|
||||
The purpose of this function is to keep the shared Guard page with adjacent
|
||||
memory block if it's still in guard, or free it if no more sharing. Another
|
||||
is to reserve pages as Guard pages in partial page free situation.
|
||||
|
||||
@param[in,out] Memory Base address of memory to free.
|
||||
@param[in,out] NumberOfPages Size of memory to free.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
AdjustMemoryF (
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN OUT UINTN *NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust address of free memory according to existing and/or required Guard.
|
||||
|
||||
This function will check if there're existing Guard pages of adjacent
|
||||
memory blocks, and try to use it as the Guard page of the memory to be
|
||||
allocated.
|
||||
|
||||
@param[in] Start Start address of free memory block.
|
||||
@param[in] Size Size of free memory block.
|
||||
@param[in] SizeRequested Size of memory to allocate.
|
||||
|
||||
@return The end address of memory block found.
|
||||
@return 0 if no enough space for the required size of memory and its Guard.
|
||||
**/
|
||||
UINT64
|
||||
AdjustMemoryS (
|
||||
IN UINT64 Start,
|
||||
IN UINT64 Size,
|
||||
IN UINT64 SizeRequested
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the pool at the given address should be guarded or not.
|
||||
|
||||
@param[in] MemoryType Pool type to check.
|
||||
|
||||
|
||||
@return TRUE The given type of pool should be guarded.
|
||||
@return FALSE The given type of pool should not be guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsPoolTypeToGuard (
|
||||
IN EFI_MEMORY_TYPE MemoryType
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address should be guarded or not.
|
||||
|
||||
@param[in] MemoryType Page type to check.
|
||||
@param[in] AllocateType Allocation type to check.
|
||||
|
||||
@return TRUE The given type of page should be guarded.
|
||||
@return FALSE The given type of page should not be guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsPageTypeToGuard (
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN EFI_ALLOCATE_TYPE AllocateType
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address is guarded or not.
|
||||
|
||||
@param[in] Address The address to check for.
|
||||
|
||||
@return TRUE The page at Address is guarded.
|
||||
@return FALSE The page at Address is not guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
IsMemoryGuarded (
|
||||
IN EFI_PHYSICAL_ADDRESS Address
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address is a Guard page or not.
|
||||
|
||||
@param[in] Address The address to check for.
|
||||
|
||||
@return TRUE The page at Address is a Guard page.
|
||||
@return FALSE The page at Address is not a Guard page.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
IsGuardPage (
|
||||
IN EFI_PHYSICAL_ADDRESS Address
|
||||
);
|
||||
|
||||
/**
|
||||
Dump the guarded memory bit map.
|
||||
**/
|
||||
VOID
|
||||
EFIAPI
|
||||
DumpGuardedMemoryBitmap (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the pool head position to make sure the Guard page is adjavent to
|
||||
pool tail or pool head.
|
||||
|
||||
@param[in] Memory Base address of memory allocated.
|
||||
@param[in] NoPages Number of pages actually allocated.
|
||||
@param[in] Size Size of memory requested.
|
||||
(plus pool head/tail overhead)
|
||||
|
||||
@return Address of pool head.
|
||||
**/
|
||||
VOID *
|
||||
AdjustPoolHeadA (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NoPages,
|
||||
IN UINTN Size
|
||||
);
|
||||
|
||||
/**
|
||||
Get the page base address according to pool head address.
|
||||
|
||||
@param[in] Memory Head address of pool to free.
|
||||
|
||||
@return Address of pool head.
|
||||
**/
|
||||
VOID *
|
||||
AdjustPoolHeadF (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory
|
||||
);
|
||||
|
||||
extern BOOLEAN mOnGuarding;
|
||||
|
||||
#endif
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
/** @file
|
||||
Data structure and functions to allocate and free memory space.
|
||||
|
||||
Copyright (c) 2006 - 2017, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2006 - 2017, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
|
@ -61,7 +61,7 @@ typedef struct {
|
|||
@param PoolType The type of memory for the new pool pages
|
||||
@param NumberOfPages No of pages to allocate
|
||||
@param Alignment Bits to align.
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
|
||||
@return The allocated memory, or NULL
|
||||
|
||||
|
@ -70,8 +70,8 @@ VOID *
|
|||
CoreAllocatePoolPages (
|
||||
IN EFI_MEMORY_TYPE PoolType,
|
||||
IN UINTN NumberOfPages,
|
||||
IN UINTN Alignment,
|
||||
IN BOOLEAN NeedGuard
|
||||
IN UINTN Alignment,
|
||||
IN BOOLEAN NeedGuard
|
||||
);
|
||||
|
||||
|
||||
|
@ -97,7 +97,7 @@ CoreFreePoolPages (
|
|||
|
||||
@param PoolType Type of pool to allocate
|
||||
@param Size The amount of pool to allocate
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
|
||||
@return The allocate pool, or NULL
|
||||
|
||||
|
@ -105,8 +105,8 @@ CoreFreePoolPages (
|
|||
VOID *
|
||||
CoreAllocatePoolI (
|
||||
IN EFI_MEMORY_TYPE PoolType,
|
||||
IN UINTN Size,
|
||||
IN BOOLEAN NeedGuard
|
||||
IN UINTN Size,
|
||||
IN BOOLEAN NeedGuard
|
||||
);
|
||||
|
||||
|
||||
|
@ -149,34 +149,34 @@ CoreReleaseMemoryLock (
|
|||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Allocates pages from the memory map.
|
||||
|
||||
@param Type The type of allocation to perform
|
||||
@param MemoryType The type of memory to turn the allocated pages
|
||||
into
|
||||
@param NumberOfPages The number of pages to allocate
|
||||
@param Memory A pointer to receive the base allocated memory
|
||||
address
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
|
||||
@return Status. On success, Memory is filled in with the base address allocated
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in
|
||||
spec.
|
||||
@retval EFI_NOT_FOUND Could not allocate pages match the requirement.
|
||||
@retval EFI_OUT_OF_RESOURCES No enough pages to allocate.
|
||||
@retval EFI_SUCCESS Pages successfully allocated.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
CoreInternalAllocatePages (
|
||||
IN EFI_ALLOCATE_TYPE Type,
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN NeedGuard
|
||||
);
|
||||
/**
|
||||
Allocates pages from the memory map.
|
||||
|
||||
@param Type The type of allocation to perform
|
||||
@param MemoryType The type of memory to turn the allocated pages
|
||||
into
|
||||
@param NumberOfPages The number of pages to allocate
|
||||
@param Memory A pointer to receive the base allocated memory
|
||||
address
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
|
||||
@return Status. On success, Memory is filled in with the base address allocated
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in
|
||||
spec.
|
||||
@retval EFI_NOT_FOUND Could not allocate pages match the requirement.
|
||||
@retval EFI_OUT_OF_RESOURCES No enough pages to allocate.
|
||||
@retval EFI_SUCCESS Pages successfully allocated.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
CoreInternalAllocatePages (
|
||||
IN EFI_ALLOCATE_TYPE Type,
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN NeedGuard
|
||||
);
|
||||
|
||||
//
|
||||
// Internal Global data
|
||||
|
|
|
@ -14,7 +14,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|||
|
||||
#include "DxeMain.h"
|
||||
#include "Imem.h"
|
||||
#include "HeapGuard.h"
|
||||
#include "HeapGuard.h"
|
||||
|
||||
//
|
||||
// Entry for tracking the memory regions for each memory type to coalesce similar memory types
|
||||
|
@ -288,12 +288,12 @@ AllocateMemoryMapEntry (
|
|||
//
|
||||
// The list is empty, to allocate one page to refuel the list
|
||||
//
|
||||
FreeDescriptorEntries = CoreAllocatePoolPages (
|
||||
EfiBootServicesData,
|
||||
FreeDescriptorEntries = CoreAllocatePoolPages (
|
||||
EfiBootServicesData,
|
||||
EFI_SIZE_TO_PAGES (DEFAULT_PAGE_ALLOCATION_GRANULARITY),
|
||||
DEFAULT_PAGE_ALLOCATION_GRANULARITY,
|
||||
FALSE
|
||||
);
|
||||
DEFAULT_PAGE_ALLOCATION_GRANULARITY,
|
||||
FALSE
|
||||
);
|
||||
if (FreeDescriptorEntries != NULL) {
|
||||
//
|
||||
// Enque the free memmory map entries into the list
|
||||
|
@ -901,40 +901,40 @@ CoreConvertPagesEx (
|
|||
CoreAddRange (MemType, Start, RangeEnd, Attribute);
|
||||
if (ChangingType && (MemType == EfiConventionalMemory)) {
|
||||
if (Start == 0) {
|
||||
//
|
||||
// Avoid calling DEBUG_CLEAR_MEMORY() for an address of 0 because this
|
||||
// macro will ASSERT() if address is 0. Instead, CoreAddRange()
|
||||
// guarantees that the page starting at address 0 is always filled
|
||||
// with zeros.
|
||||
//
|
||||
//
|
||||
// Avoid calling DEBUG_CLEAR_MEMORY() for an address of 0 because this
|
||||
// macro will ASSERT() if address is 0. Instead, CoreAddRange()
|
||||
// guarantees that the page starting at address 0 is always filled
|
||||
// with zeros.
|
||||
//
|
||||
if (RangeEnd > EFI_PAGE_SIZE) {
|
||||
DEBUG_CLEAR_MEMORY ((VOID *)(UINTN) EFI_PAGE_SIZE, (UINTN) (RangeEnd - EFI_PAGE_SIZE + 1));
|
||||
}
|
||||
} else {
|
||||
//
|
||||
// If Heap Guard is enabled, the page at the top and/or bottom of
|
||||
// this memory block to free might be inaccessible. Skipping them
|
||||
// to avoid page fault exception.
|
||||
//
|
||||
UINT64 StartToClear;
|
||||
UINT64 EndToClear;
|
||||
|
||||
StartToClear = Start;
|
||||
EndToClear = RangeEnd;
|
||||
if (PcdGet8 (PcdHeapGuardPropertyMask) & (BIT1|BIT0)) {
|
||||
if (IsGuardPage(StartToClear)) {
|
||||
StartToClear += EFI_PAGE_SIZE;
|
||||
}
|
||||
if (IsGuardPage (EndToClear)) {
|
||||
EndToClear -= EFI_PAGE_SIZE;
|
||||
}
|
||||
ASSERT (EndToClear > StartToClear);
|
||||
}
|
||||
|
||||
DEBUG_CLEAR_MEMORY(
|
||||
(VOID *)(UINTN)StartToClear,
|
||||
(UINTN)(EndToClear - StartToClear + 1)
|
||||
);
|
||||
//
|
||||
// If Heap Guard is enabled, the page at the top and/or bottom of
|
||||
// this memory block to free might be inaccessible. Skipping them
|
||||
// to avoid page fault exception.
|
||||
//
|
||||
UINT64 StartToClear;
|
||||
UINT64 EndToClear;
|
||||
|
||||
StartToClear = Start;
|
||||
EndToClear = RangeEnd;
|
||||
if (PcdGet8 (PcdHeapGuardPropertyMask) & (BIT1|BIT0)) {
|
||||
if (IsGuardPage(StartToClear)) {
|
||||
StartToClear += EFI_PAGE_SIZE;
|
||||
}
|
||||
if (IsGuardPage (EndToClear)) {
|
||||
EndToClear -= EFI_PAGE_SIZE;
|
||||
}
|
||||
ASSERT (EndToClear > StartToClear);
|
||||
}
|
||||
|
||||
DEBUG_CLEAR_MEMORY(
|
||||
(VOID *)(UINTN)StartToClear,
|
||||
(UINTN)(EndToClear - StartToClear + 1)
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -1021,7 +1021,7 @@ CoreUpdateMemoryAttributes (
|
|||
@param NewType The type of memory the range is going to be
|
||||
turned into
|
||||
@param Alignment Bits to align with
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
|
||||
@return The base address of the range, or 0 if the range was not found
|
||||
|
||||
|
@ -1032,8 +1032,8 @@ CoreFindFreePagesI (
|
|||
IN UINT64 MinAddress,
|
||||
IN UINT64 NumberOfPages,
|
||||
IN EFI_MEMORY_TYPE NewType,
|
||||
IN UINTN Alignment,
|
||||
IN BOOLEAN NeedGuard
|
||||
IN UINTN Alignment,
|
||||
IN BOOLEAN NeedGuard
|
||||
)
|
||||
{
|
||||
UINT64 NumberOfBytes;
|
||||
|
@ -1125,17 +1125,17 @@ CoreFindFreePagesI (
|
|||
// If this is the best match so far remember it
|
||||
//
|
||||
if (DescEnd > Target) {
|
||||
if (NeedGuard) {
|
||||
DescEnd = AdjustMemoryS (
|
||||
DescEnd + 1 - DescNumberOfBytes,
|
||||
DescNumberOfBytes,
|
||||
NumberOfBytes
|
||||
);
|
||||
if (DescEnd == 0) {
|
||||
continue;
|
||||
}
|
||||
}
|
||||
|
||||
if (NeedGuard) {
|
||||
DescEnd = AdjustMemoryS (
|
||||
DescEnd + 1 - DescNumberOfBytes,
|
||||
DescNumberOfBytes,
|
||||
NumberOfBytes
|
||||
);
|
||||
if (DescEnd == 0) {
|
||||
continue;
|
||||
}
|
||||
}
|
||||
|
||||
Target = DescEnd;
|
||||
}
|
||||
}
|
||||
|
@ -1166,7 +1166,7 @@ CoreFindFreePagesI (
|
|||
@param NewType The type of memory the range is going to be
|
||||
turned into
|
||||
@param Alignment Bits to align with
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
|
||||
@return The base address of the range, or 0 if the range was not found.
|
||||
|
||||
|
@ -1176,8 +1176,8 @@ FindFreePages (
|
|||
IN UINT64 MaxAddress,
|
||||
IN UINT64 NoPages,
|
||||
IN EFI_MEMORY_TYPE NewType,
|
||||
IN UINTN Alignment,
|
||||
IN BOOLEAN NeedGuard
|
||||
IN UINTN Alignment,
|
||||
IN BOOLEAN NeedGuard
|
||||
)
|
||||
{
|
||||
UINT64 Start;
|
||||
|
@ -1191,8 +1191,8 @@ FindFreePages (
|
|||
mMemoryTypeStatistics[NewType].BaseAddress,
|
||||
NoPages,
|
||||
NewType,
|
||||
Alignment,
|
||||
NeedGuard
|
||||
Alignment,
|
||||
NeedGuard
|
||||
);
|
||||
if (Start != 0) {
|
||||
return Start;
|
||||
|
@ -1203,8 +1203,8 @@ FindFreePages (
|
|||
// Attempt to find free pages in the default allocation bin
|
||||
//
|
||||
if (MaxAddress >= mDefaultMaximumAddress) {
|
||||
Start = CoreFindFreePagesI (mDefaultMaximumAddress, 0, NoPages, NewType,
|
||||
Alignment, NeedGuard);
|
||||
Start = CoreFindFreePagesI (mDefaultMaximumAddress, 0, NoPages, NewType,
|
||||
Alignment, NeedGuard);
|
||||
if (Start != 0) {
|
||||
if (Start < mDefaultBaseAddress) {
|
||||
mDefaultBaseAddress = Start;
|
||||
|
@ -1219,8 +1219,8 @@ FindFreePages (
|
|||
// address range. If this allocation fails, then there are not enough
|
||||
// resources anywhere to satisfy the request.
|
||||
//
|
||||
Start = CoreFindFreePagesI (MaxAddress, 0, NoPages, NewType, Alignment,
|
||||
NeedGuard);
|
||||
Start = CoreFindFreePagesI (MaxAddress, 0, NoPages, NewType, Alignment,
|
||||
NeedGuard);
|
||||
if (Start != 0) {
|
||||
return Start;
|
||||
}
|
||||
|
@ -1235,7 +1235,7 @@ FindFreePages (
|
|||
//
|
||||
// If any memory resources were promoted, then re-attempt the allocation
|
||||
//
|
||||
return FindFreePages (MaxAddress, NoPages, NewType, Alignment, NeedGuard);
|
||||
return FindFreePages (MaxAddress, NoPages, NewType, Alignment, NeedGuard);
|
||||
}
|
||||
|
||||
|
||||
|
@ -1248,7 +1248,7 @@ FindFreePages (
|
|||
@param NumberOfPages The number of pages to allocate
|
||||
@param Memory A pointer to receive the base allocated memory
|
||||
address
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
|
||||
@return Status. On success, Memory is filled in with the base address allocated
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in
|
||||
|
@ -1264,8 +1264,8 @@ CoreInternalAllocatePages (
|
|||
IN EFI_ALLOCATE_TYPE Type,
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN NeedGuard
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN NeedGuard
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
|
@ -1351,8 +1351,8 @@ CoreInternalAllocatePages (
|
|||
// If not a specific address, then find an address to allocate
|
||||
//
|
||||
if (Type != AllocateAddress) {
|
||||
Start = FindFreePages (MaxAddress, NumberOfPages, MemoryType, Alignment,
|
||||
NeedGuard);
|
||||
Start = FindFreePages (MaxAddress, NumberOfPages, MemoryType, Alignment,
|
||||
NeedGuard);
|
||||
if (Start == 0) {
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto Done;
|
||||
|
@ -1362,19 +1362,19 @@ CoreInternalAllocatePages (
|
|||
//
|
||||
// Convert pages from FreeMemory to the requested type
|
||||
//
|
||||
if (NeedGuard) {
|
||||
Status = CoreConvertPagesWithGuard(Start, NumberOfPages, MemoryType);
|
||||
} else {
|
||||
Status = CoreConvertPages(Start, NumberOfPages, MemoryType);
|
||||
}
|
||||
if (NeedGuard) {
|
||||
Status = CoreConvertPagesWithGuard(Start, NumberOfPages, MemoryType);
|
||||
} else {
|
||||
Status = CoreConvertPages(Start, NumberOfPages, MemoryType);
|
||||
}
|
||||
|
||||
Done:
|
||||
CoreReleaseMemoryLock ();
|
||||
|
||||
if (!EFI_ERROR (Status)) {
|
||||
if (NeedGuard) {
|
||||
SetGuardForMemory (Start, NumberOfPages);
|
||||
}
|
||||
if (NeedGuard) {
|
||||
SetGuardForMemory (Start, NumberOfPages);
|
||||
}
|
||||
*Memory = Start;
|
||||
}
|
||||
|
||||
|
@ -1409,11 +1409,11 @@ CoreAllocatePages (
|
|||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
BOOLEAN NeedGuard;
|
||||
BOOLEAN NeedGuard;
|
||||
|
||||
NeedGuard = IsPageTypeToGuard (MemoryType, Type) && !mOnGuarding;
|
||||
Status = CoreInternalAllocatePages (Type, MemoryType, NumberOfPages, Memory,
|
||||
NeedGuard);
|
||||
NeedGuard = IsPageTypeToGuard (MemoryType, Type) && !mOnGuarding;
|
||||
Status = CoreInternalAllocatePages (Type, MemoryType, NumberOfPages, Memory,
|
||||
NeedGuard);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
CoreUpdateProfile (
|
||||
(EFI_PHYSICAL_ADDRESS) (UINTN) RETURN_ADDRESS (0),
|
||||
|
@ -1454,7 +1454,7 @@ CoreInternalFreePages (
|
|||
LIST_ENTRY *Link;
|
||||
MEMORY_MAP *Entry;
|
||||
UINTN Alignment;
|
||||
BOOLEAN IsGuarded;
|
||||
BOOLEAN IsGuarded;
|
||||
|
||||
//
|
||||
// Free the range
|
||||
|
@ -1464,7 +1464,7 @@ CoreInternalFreePages (
|
|||
//
|
||||
// Find the entry that the covers the range
|
||||
//
|
||||
IsGuarded = FALSE;
|
||||
IsGuarded = FALSE;
|
||||
Entry = NULL;
|
||||
for (Link = gMemoryMap.ForwardLink; Link != &gMemoryMap; Link = Link->ForwardLink) {
|
||||
Entry = CR(Link, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);
|
||||
|
@ -1501,20 +1501,20 @@ CoreInternalFreePages (
|
|||
*MemoryType = Entry->Type;
|
||||
}
|
||||
|
||||
IsGuarded = IsPageTypeToGuard (Entry->Type, AllocateAnyPages) &&
|
||||
IsMemoryGuarded (Memory);
|
||||
if (IsGuarded) {
|
||||
Status = CoreConvertPagesWithGuard (Memory, NumberOfPages,
|
||||
EfiConventionalMemory);
|
||||
} else {
|
||||
Status = CoreConvertPages (Memory, NumberOfPages, EfiConventionalMemory);
|
||||
IsGuarded = IsPageTypeToGuard (Entry->Type, AllocateAnyPages) &&
|
||||
IsMemoryGuarded (Memory);
|
||||
if (IsGuarded) {
|
||||
Status = CoreConvertPagesWithGuard (Memory, NumberOfPages,
|
||||
EfiConventionalMemory);
|
||||
} else {
|
||||
Status = CoreConvertPages (Memory, NumberOfPages, EfiConventionalMemory);
|
||||
}
|
||||
|
||||
Done:
|
||||
CoreReleaseMemoryLock ();
|
||||
if (IsGuarded) {
|
||||
UnsetGuardForMemory(Memory, NumberOfPages);
|
||||
}
|
||||
if (IsGuarded) {
|
||||
UnsetGuardForMemory(Memory, NumberOfPages);
|
||||
}
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
@ -1912,12 +1912,12 @@ Done:
|
|||
|
||||
*MemoryMapSize = BufferSize;
|
||||
|
||||
DEBUG_CODE (
|
||||
if (PcdGet8 (PcdHeapGuardPropertyMask) & (BIT1|BIT0)) {
|
||||
DumpGuardedMemoryBitmap ();
|
||||
}
|
||||
);
|
||||
|
||||
DEBUG_CODE (
|
||||
if (PcdGet8 (PcdHeapGuardPropertyMask) & (BIT1|BIT0)) {
|
||||
DumpGuardedMemoryBitmap ();
|
||||
}
|
||||
);
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
@ -1929,7 +1929,7 @@ Done:
|
|||
@param PoolType The type of memory for the new pool pages
|
||||
@param NumberOfPages No of pages to allocate
|
||||
@param Alignment Bits to align.
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
|
||||
@return The allocated memory, or NULL
|
||||
|
||||
|
@ -1938,8 +1938,8 @@ VOID *
|
|||
CoreAllocatePoolPages (
|
||||
IN EFI_MEMORY_TYPE PoolType,
|
||||
IN UINTN NumberOfPages,
|
||||
IN UINTN Alignment,
|
||||
IN BOOLEAN NeedGuard
|
||||
IN UINTN Alignment,
|
||||
IN BOOLEAN NeedGuard
|
||||
)
|
||||
{
|
||||
UINT64 Start;
|
||||
|
@ -1947,8 +1947,8 @@ CoreAllocatePoolPages (
|
|||
//
|
||||
// Find the pages to convert
|
||||
//
|
||||
Start = FindFreePages (MAX_ADDRESS, NumberOfPages, PoolType, Alignment,
|
||||
NeedGuard);
|
||||
Start = FindFreePages (MAX_ADDRESS, NumberOfPages, PoolType, Alignment,
|
||||
NeedGuard);
|
||||
|
||||
//
|
||||
// Convert it to boot services data
|
||||
|
@ -1956,11 +1956,11 @@ CoreAllocatePoolPages (
|
|||
if (Start == 0) {
|
||||
DEBUG ((DEBUG_ERROR | DEBUG_PAGE, "AllocatePoolPages: failed to allocate %d pages\n", (UINT32)NumberOfPages));
|
||||
} else {
|
||||
if (NeedGuard) {
|
||||
CoreConvertPagesWithGuard (Start, NumberOfPages, PoolType);
|
||||
} else {
|
||||
CoreConvertPages (Start, NumberOfPages, PoolType);
|
||||
}
|
||||
if (NeedGuard) {
|
||||
CoreConvertPagesWithGuard (Start, NumberOfPages, PoolType);
|
||||
} else {
|
||||
CoreConvertPages (Start, NumberOfPages, PoolType);
|
||||
}
|
||||
}
|
||||
|
||||
return (VOID *)(UINTN) Start;
|
||||
|
|
|
@ -14,7 +14,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|||
|
||||
#include "DxeMain.h"
|
||||
#include "Imem.h"
|
||||
#include "HeapGuard.h"
|
||||
#include "HeapGuard.h"
|
||||
|
||||
STATIC EFI_LOCK mPoolMemoryLock = EFI_INITIALIZE_LOCK_VARIABLE (TPL_NOTIFY);
|
||||
|
||||
|
@ -170,7 +170,7 @@ LookupPoolHead (
|
|||
}
|
||||
}
|
||||
|
||||
Pool = CoreAllocatePoolI (EfiBootServicesData, sizeof (POOL), FALSE);
|
||||
Pool = CoreAllocatePoolI (EfiBootServicesData, sizeof (POOL), FALSE);
|
||||
if (Pool == NULL) {
|
||||
return NULL;
|
||||
}
|
||||
|
@ -215,8 +215,8 @@ CoreInternalAllocatePool (
|
|||
OUT VOID **Buffer
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
BOOLEAN NeedGuard;
|
||||
EFI_STATUS Status;
|
||||
BOOLEAN NeedGuard;
|
||||
|
||||
//
|
||||
// If it's not a valid type, fail it
|
||||
|
@ -240,8 +240,8 @@ CoreInternalAllocatePool (
|
|||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
|
||||
NeedGuard = IsPoolTypeToGuard (PoolType) && !mOnGuarding;
|
||||
|
||||
NeedGuard = IsPoolTypeToGuard (PoolType) && !mOnGuarding;
|
||||
|
||||
//
|
||||
// Acquire the memory lock and make the allocation
|
||||
//
|
||||
|
@ -250,7 +250,7 @@ CoreInternalAllocatePool (
|
|||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
|
||||
*Buffer = CoreAllocatePoolI (PoolType, Size, NeedGuard);
|
||||
*Buffer = CoreAllocatePoolI (PoolType, Size, NeedGuard);
|
||||
CoreReleaseLock (&mPoolMemoryLock);
|
||||
return (*Buffer != NULL) ? EFI_SUCCESS : EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
|
@ -302,7 +302,7 @@ CoreAllocatePool (
|
|||
@param PoolType The type of memory for the new pool pages
|
||||
@param NoPages No of pages to allocate
|
||||
@param Granularity Bits to align.
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
|
||||
@return The allocated memory, or NULL
|
||||
|
||||
|
@ -312,8 +312,8 @@ VOID *
|
|||
CoreAllocatePoolPagesI (
|
||||
IN EFI_MEMORY_TYPE PoolType,
|
||||
IN UINTN NoPages,
|
||||
IN UINTN Granularity,
|
||||
IN BOOLEAN NeedGuard
|
||||
IN UINTN Granularity,
|
||||
IN BOOLEAN NeedGuard
|
||||
)
|
||||
{
|
||||
VOID *Buffer;
|
||||
|
@ -324,14 +324,14 @@ CoreAllocatePoolPagesI (
|
|||
return NULL;
|
||||
}
|
||||
|
||||
Buffer = CoreAllocatePoolPages (PoolType, NoPages, Granularity, NeedGuard);
|
||||
Buffer = CoreAllocatePoolPages (PoolType, NoPages, Granularity, NeedGuard);
|
||||
CoreReleaseMemoryLock ();
|
||||
|
||||
if (Buffer != NULL) {
|
||||
if (NeedGuard) {
|
||||
SetGuardForMemory ((EFI_PHYSICAL_ADDRESS)(UINTN)Buffer, NoPages);
|
||||
}
|
||||
ApplyMemoryProtectionPolicy(EfiConventionalMemory, PoolType,
|
||||
if (NeedGuard) {
|
||||
SetGuardForMemory ((EFI_PHYSICAL_ADDRESS)(UINTN)Buffer, NoPages);
|
||||
}
|
||||
ApplyMemoryProtectionPolicy(EfiConventionalMemory, PoolType,
|
||||
(EFI_PHYSICAL_ADDRESS)(UINTN)Buffer, EFI_PAGES_TO_SIZE (NoPages));
|
||||
}
|
||||
return Buffer;
|
||||
|
@ -343,7 +343,7 @@ CoreAllocatePoolPagesI (
|
|||
|
||||
@param PoolType Type of pool to allocate
|
||||
@param Size The amount of pool to allocate
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
|
||||
@return The allocate pool, or NULL
|
||||
|
||||
|
@ -351,8 +351,8 @@ CoreAllocatePoolPagesI (
|
|||
VOID *
|
||||
CoreAllocatePoolI (
|
||||
IN EFI_MEMORY_TYPE PoolType,
|
||||
IN UINTN Size,
|
||||
IN BOOLEAN NeedGuard
|
||||
IN UINTN Size,
|
||||
IN BOOLEAN NeedGuard
|
||||
)
|
||||
{
|
||||
POOL *Pool;
|
||||
|
@ -366,7 +366,7 @@ CoreAllocatePoolI (
|
|||
UINTN Offset, MaxOffset;
|
||||
UINTN NoPages;
|
||||
UINTN Granularity;
|
||||
BOOLEAN HasPoolTail;
|
||||
BOOLEAN HasPoolTail;
|
||||
|
||||
ASSERT_LOCKED (&mPoolMemoryLock);
|
||||
|
||||
|
@ -384,9 +384,9 @@ CoreAllocatePoolI (
|
|||
// Adjust the size by the pool header & tail overhead
|
||||
//
|
||||
|
||||
HasPoolTail = !(NeedGuard &&
|
||||
((PcdGet8 (PcdHeapGuardPropertyMask) & BIT7) == 0));
|
||||
|
||||
HasPoolTail = !(NeedGuard &&
|
||||
((PcdGet8 (PcdHeapGuardPropertyMask) & BIT7) == 0));
|
||||
|
||||
//
|
||||
// Adjusting the Size to be of proper alignment so that
|
||||
// we don't get an unaligned access fault later when
|
||||
|
@ -406,16 +406,16 @@ CoreAllocatePoolI (
|
|||
// If allocation is over max size, just allocate pages for the request
|
||||
// (slow)
|
||||
//
|
||||
if (Index >= SIZE_TO_LIST (Granularity) || NeedGuard) {
|
||||
if (!HasPoolTail) {
|
||||
Size -= sizeof (POOL_TAIL);
|
||||
}
|
||||
NoPages = EFI_SIZE_TO_PAGES (Size) + EFI_SIZE_TO_PAGES (Granularity) - 1;
|
||||
if (Index >= SIZE_TO_LIST (Granularity) || NeedGuard) {
|
||||
if (!HasPoolTail) {
|
||||
Size -= sizeof (POOL_TAIL);
|
||||
}
|
||||
NoPages = EFI_SIZE_TO_PAGES (Size) + EFI_SIZE_TO_PAGES (Granularity) - 1;
|
||||
NoPages &= ~(UINTN)(EFI_SIZE_TO_PAGES (Granularity) - 1);
|
||||
Head = CoreAllocatePoolPagesI (PoolType, NoPages, Granularity, NeedGuard);
|
||||
if (NeedGuard) {
|
||||
Head = AdjustPoolHeadA ((EFI_PHYSICAL_ADDRESS)(UINTN)Head, NoPages, Size);
|
||||
}
|
||||
Head = CoreAllocatePoolPagesI (PoolType, NoPages, Granularity, NeedGuard);
|
||||
if (NeedGuard) {
|
||||
Head = AdjustPoolHeadA ((EFI_PHYSICAL_ADDRESS)(UINTN)Head, NoPages, Size);
|
||||
}
|
||||
goto Done;
|
||||
}
|
||||
|
||||
|
@ -443,8 +443,8 @@ CoreAllocatePoolI (
|
|||
//
|
||||
// Get another page
|
||||
//
|
||||
NewPage = CoreAllocatePoolPagesI (PoolType, EFI_SIZE_TO_PAGES (Granularity),
|
||||
Granularity, NeedGuard);
|
||||
NewPage = CoreAllocatePoolPagesI (PoolType, EFI_SIZE_TO_PAGES (Granularity),
|
||||
Granularity, NeedGuard);
|
||||
if (NewPage == NULL) {
|
||||
goto Done;
|
||||
}
|
||||
|
@ -490,11 +490,11 @@ Done:
|
|||
|
||||
if (Head != NULL) {
|
||||
|
||||
//
|
||||
// Account the allocation
|
||||
//
|
||||
Pool->Used += Size;
|
||||
|
||||
//
|
||||
// Account the allocation
|
||||
//
|
||||
Pool->Used += Size;
|
||||
|
||||
//
|
||||
// If we have a pool buffer, fill in the header & tail info
|
||||
//
|
||||
|
@ -502,24 +502,24 @@ Done:
|
|||
Head->Size = Size;
|
||||
Head->Type = (EFI_MEMORY_TYPE) PoolType;
|
||||
Buffer = Head->Data;
|
||||
|
||||
if (HasPoolTail) {
|
||||
Tail = HEAD_TO_TAIL (Head);
|
||||
Tail->Signature = POOL_TAIL_SIGNATURE;
|
||||
Tail->Size = Size;
|
||||
|
||||
Size -= POOL_OVERHEAD;
|
||||
} else {
|
||||
Size -= SIZE_OF_POOL_HEAD;
|
||||
}
|
||||
|
||||
DEBUG_CLEAR_MEMORY (Buffer, Size);
|
||||
|
||||
if (HasPoolTail) {
|
||||
Tail = HEAD_TO_TAIL (Head);
|
||||
Tail->Signature = POOL_TAIL_SIGNATURE;
|
||||
Tail->Size = Size;
|
||||
|
||||
Size -= POOL_OVERHEAD;
|
||||
} else {
|
||||
Size -= SIZE_OF_POOL_HEAD;
|
||||
}
|
||||
|
||||
DEBUG_CLEAR_MEMORY (Buffer, Size);
|
||||
|
||||
DEBUG ((
|
||||
DEBUG_POOL,
|
||||
"AllocatePoolI: Type %x, Addr %p (len %lx) %,ld\n", PoolType,
|
||||
Buffer,
|
||||
(UINT64)Size,
|
||||
(UINT64)Size,
|
||||
(UINT64) Pool->Used
|
||||
));
|
||||
|
||||
|
@ -619,34 +619,34 @@ CoreFreePoolPagesI (
|
|||
(EFI_PHYSICAL_ADDRESS)(UINTN)Memory, EFI_PAGES_TO_SIZE (NoPages));
|
||||
}
|
||||
|
||||
/**
|
||||
Internal function. Frees guarded pool pages.
|
||||
|
||||
@param PoolType The type of memory for the pool pages
|
||||
@param Memory The base address to free
|
||||
@param NoPages The number of pages to free
|
||||
|
||||
**/
|
||||
STATIC
|
||||
VOID
|
||||
CoreFreePoolPagesWithGuard (
|
||||
IN EFI_MEMORY_TYPE PoolType,
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NoPages
|
||||
)
|
||||
{
|
||||
EFI_PHYSICAL_ADDRESS MemoryGuarded;
|
||||
UINTN NoPagesGuarded;
|
||||
|
||||
MemoryGuarded = Memory;
|
||||
NoPagesGuarded = NoPages;
|
||||
|
||||
AdjustMemoryF (&Memory, &NoPages);
|
||||
CoreFreePoolPagesI (PoolType, Memory, NoPages);
|
||||
|
||||
UnsetGuardForMemory (MemoryGuarded, NoPagesGuarded);
|
||||
}
|
||||
|
||||
/**
|
||||
Internal function. Frees guarded pool pages.
|
||||
|
||||
@param PoolType The type of memory for the pool pages
|
||||
@param Memory The base address to free
|
||||
@param NoPages The number of pages to free
|
||||
|
||||
**/
|
||||
STATIC
|
||||
VOID
|
||||
CoreFreePoolPagesWithGuard (
|
||||
IN EFI_MEMORY_TYPE PoolType,
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NoPages
|
||||
)
|
||||
{
|
||||
EFI_PHYSICAL_ADDRESS MemoryGuarded;
|
||||
UINTN NoPagesGuarded;
|
||||
|
||||
MemoryGuarded = Memory;
|
||||
NoPagesGuarded = NoPages;
|
||||
|
||||
AdjustMemoryF (&Memory, &NoPages);
|
||||
CoreFreePoolPagesI (PoolType, Memory, NoPages);
|
||||
|
||||
UnsetGuardForMemory (MemoryGuarded, NoPagesGuarded);
|
||||
}
|
||||
|
||||
/**
|
||||
Internal function to free a pool entry.
|
||||
Caller must have the memory lock held
|
||||
|
@ -675,8 +675,8 @@ CoreFreePoolI (
|
|||
UINTN Offset;
|
||||
BOOLEAN AllFree;
|
||||
UINTN Granularity;
|
||||
BOOLEAN IsGuarded;
|
||||
BOOLEAN HasPoolTail;
|
||||
BOOLEAN IsGuarded;
|
||||
BOOLEAN HasPoolTail;
|
||||
|
||||
ASSERT(Buffer != NULL);
|
||||
//
|
||||
|
@ -689,32 +689,32 @@ CoreFreePoolI (
|
|||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
IsGuarded = IsPoolTypeToGuard (Head->Type) &&
|
||||
IsMemoryGuarded ((EFI_PHYSICAL_ADDRESS)(UINTN)Head);
|
||||
HasPoolTail = !(IsGuarded &&
|
||||
((PcdGet8 (PcdHeapGuardPropertyMask) & BIT7) == 0));
|
||||
IsGuarded = IsPoolTypeToGuard (Head->Type) &&
|
||||
IsMemoryGuarded ((EFI_PHYSICAL_ADDRESS)(UINTN)Head);
|
||||
HasPoolTail = !(IsGuarded &&
|
||||
((PcdGet8 (PcdHeapGuardPropertyMask) & BIT7) == 0));
|
||||
|
||||
if (HasPoolTail) {
|
||||
Tail = HEAD_TO_TAIL (Head);
|
||||
ASSERT (Tail != NULL);
|
||||
if (HasPoolTail) {
|
||||
Tail = HEAD_TO_TAIL (Head);
|
||||
ASSERT (Tail != NULL);
|
||||
|
||||
//
|
||||
// Debug
|
||||
//
|
||||
ASSERT (Tail->Signature == POOL_TAIL_SIGNATURE);
|
||||
ASSERT (Head->Size == Tail->Size);
|
||||
//
|
||||
// Debug
|
||||
//
|
||||
ASSERT (Tail->Signature == POOL_TAIL_SIGNATURE);
|
||||
ASSERT (Head->Size == Tail->Size);
|
||||
|
||||
if (Tail->Signature != POOL_TAIL_SIGNATURE) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
if (Head->Size != Tail->Size) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
if (Tail->Signature != POOL_TAIL_SIGNATURE) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
if (Head->Size != Tail->Size) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
}
|
||||
|
||||
ASSERT_LOCKED (&mPoolMemoryLock);
|
||||
|
||||
ASSERT_LOCKED (&mPoolMemoryLock);
|
||||
|
||||
//
|
||||
// Determine the pool type and account for it
|
||||
//
|
||||
|
@ -749,27 +749,27 @@ CoreFreePoolI (
|
|||
//
|
||||
// If it's not on the list, it must be pool pages
|
||||
//
|
||||
if (Index >= SIZE_TO_LIST (Granularity) || IsGuarded) {
|
||||
if (Index >= SIZE_TO_LIST (Granularity) || IsGuarded) {
|
||||
|
||||
//
|
||||
// Return the memory pages back to free memory
|
||||
//
|
||||
NoPages = EFI_SIZE_TO_PAGES (Size) + EFI_SIZE_TO_PAGES (Granularity) - 1;
|
||||
NoPages = EFI_SIZE_TO_PAGES (Size) + EFI_SIZE_TO_PAGES (Granularity) - 1;
|
||||
NoPages &= ~(UINTN)(EFI_SIZE_TO_PAGES (Granularity) - 1);
|
||||
if (IsGuarded) {
|
||||
Head = AdjustPoolHeadF ((EFI_PHYSICAL_ADDRESS)(UINTN)Head);
|
||||
CoreFreePoolPagesWithGuard (
|
||||
Pool->MemoryType,
|
||||
(EFI_PHYSICAL_ADDRESS)(UINTN)Head,
|
||||
NoPages
|
||||
);
|
||||
} else {
|
||||
CoreFreePoolPagesI (
|
||||
Pool->MemoryType,
|
||||
(EFI_PHYSICAL_ADDRESS)(UINTN)Head,
|
||||
NoPages
|
||||
);
|
||||
}
|
||||
if (IsGuarded) {
|
||||
Head = AdjustPoolHeadF ((EFI_PHYSICAL_ADDRESS)(UINTN)Head);
|
||||
CoreFreePoolPagesWithGuard (
|
||||
Pool->MemoryType,
|
||||
(EFI_PHYSICAL_ADDRESS)(UINTN)Head,
|
||||
NoPages
|
||||
);
|
||||
} else {
|
||||
CoreFreePoolPagesI (
|
||||
Pool->MemoryType,
|
||||
(EFI_PHYSICAL_ADDRESS)(UINTN)Head,
|
||||
NoPages
|
||||
);
|
||||
}
|
||||
|
||||
} else {
|
||||
|
||||
|
|
|
@ -1065,15 +1065,15 @@ CoreInitializeMemoryProtection (
|
|||
// - code regions should have no EFI_MEMORY_XP attribute
|
||||
// - EfiConventionalMemory and EfiBootServicesData should use the
|
||||
// same attribute
|
||||
// - heap guard should not be enabled for the same type of memory
|
||||
// - heap guard should not be enabled for the same type of memory
|
||||
//
|
||||
ASSERT ((GetPermissionAttributeForMemoryType (EfiBootServicesCode) & EFI_MEMORY_XP) == 0);
|
||||
ASSERT ((GetPermissionAttributeForMemoryType (EfiRuntimeServicesCode) & EFI_MEMORY_XP) == 0);
|
||||
ASSERT ((GetPermissionAttributeForMemoryType (EfiLoaderCode) & EFI_MEMORY_XP) == 0);
|
||||
ASSERT (GetPermissionAttributeForMemoryType (EfiBootServicesData) ==
|
||||
GetPermissionAttributeForMemoryType (EfiConventionalMemory));
|
||||
ASSERT ((PcdGet64 (PcdDxeNxMemoryProtectionPolicy) & PcdGet64 (PcdHeapGuardPoolType)) == 0);
|
||||
ASSERT ((PcdGet64 (PcdDxeNxMemoryProtectionPolicy) & PcdGet64 (PcdHeapGuardPageType)) == 0);
|
||||
ASSERT ((PcdGet64 (PcdDxeNxMemoryProtectionPolicy) & PcdGet64 (PcdHeapGuardPoolType)) == 0);
|
||||
ASSERT ((PcdGet64 (PcdDxeNxMemoryProtectionPolicy) & PcdGet64 (PcdHeapGuardPageType)) == 0);
|
||||
|
||||
if (mImageProtectionPolicy != 0 || PcdGet64 (PcdDxeNxMemoryProtectionPolicy) != 0) {
|
||||
Status = CoreCreateEvent (
|
||||
|
|
|
@ -116,7 +116,7 @@
|
|||
gEfiMdeModulePkgTokenSpaceGuid.PcdUse1GPageTable ## SOMETIMES_CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdPteMemoryEncryptionAddressOrMask ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdNullPointerDetectionPropertyMask ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPropertyMask ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPropertyMask ## CONSUMES
|
||||
|
||||
[Pcd.IA32,Pcd.X64,Pcd.ARM,Pcd.AARCH64]
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdSetNxForStack ## SOMETIMES_CONSUMES
|
||||
|
|
|
@ -211,37 +211,37 @@ IsExecuteDisableBitAvailable (
|
|||
return Available;
|
||||
}
|
||||
|
||||
/**
|
||||
The function will check if page table should be setup or not.
|
||||
|
||||
@retval TRUE Page table should be created.
|
||||
@retval FALSE Page table should not be created.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
ToBuildPageTable (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
if (!IsIa32PaeSupport ()) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if (IsNullDetectionEnabled ()) {
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
if (PcdGet8 (PcdHeapGuardPropertyMask) != 0) {
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
if (PcdGetBool (PcdSetNxForStack) && IsExecuteDisableBitAvailable ()) {
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
The function will check if page table should be setup or not.
|
||||
|
||||
@retval TRUE Page table should be created.
|
||||
@retval FALSE Page table should not be created.
|
||||
|
||||
**/
|
||||
BOOLEAN
|
||||
ToBuildPageTable (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
if (!IsIa32PaeSupport ()) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if (IsNullDetectionEnabled ()) {
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
if (PcdGet8 (PcdHeapGuardPropertyMask) != 0) {
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
if (PcdGetBool (PcdSetNxForStack) && IsExecuteDisableBitAvailable ()) {
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/**
|
||||
Transfers control to DxeCore.
|
||||
|
||||
|
@ -416,7 +416,7 @@ HandOffToDxeCore (
|
|||
TopOfStack = (EFI_PHYSICAL_ADDRESS) (UINTN) ALIGN_POINTER (TopOfStack, CPU_STACK_ALIGNMENT);
|
||||
|
||||
PageTables = 0;
|
||||
BuildPageTablesIa32Pae = ToBuildPageTable ();
|
||||
BuildPageTablesIa32Pae = ToBuildPageTable ();
|
||||
if (BuildPageTablesIa32Pae) {
|
||||
PageTables = Create4GPageTablesIa32Pae (BaseOfStack, STACK_SIZE);
|
||||
if (IsExecuteDisableBitAvailable ()) {
|
||||
|
|
File diff suppressed because it is too large
Load Diff
|
@ -1,398 +1,398 @@
|
|||
/** @file
|
||||
Data structure and functions to allocate and free memory space.
|
||||
|
||||
Copyright (c) 2017, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
http://opensource.org/licenses/bsd-license.php
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
**/
|
||||
|
||||
#ifndef _HEAPGUARD_H_
|
||||
#define _HEAPGUARD_H_
|
||||
|
||||
#include "PiSmmCore.h"
|
||||
|
||||
//
|
||||
// Following macros are used to define and access the guarded memory bitmap
|
||||
// table.
|
||||
//
|
||||
// To simplify the access and reduce the memory used for this table, the
|
||||
// table is constructed in the similar way as page table structure but in
|
||||
// reverse direction, i.e. from bottom growing up to top.
|
||||
//
|
||||
// - 1-bit tracks 1 page (4KB)
|
||||
// - 1-UINT64 map entry tracks 256KB memory
|
||||
// - 1K-UINT64 map table tracks 256MB memory
|
||||
// - Five levels of tables can track any address of memory of 64-bit
|
||||
// system, like below.
|
||||
//
|
||||
// 512 * 512 * 512 * 512 * 1K * 64b * 4K
|
||||
// 111111111 111111111 111111111 111111111 1111111111 111111 111111111111
|
||||
// 63 54 45 36 27 17 11 0
|
||||
// 9b 9b 9b 9b 10b 6b 12b
|
||||
// L0 -> L1 -> L2 -> L3 -> L4 -> bits -> page
|
||||
// 1FF 1FF 1FF 1FF 3FF 3F FFF
|
||||
//
|
||||
// L4 table has 1K * sizeof(UINT64) = 8K (2-page), which can track 256MB
|
||||
// memory. Each table of L0-L3 will be allocated when its memory address
|
||||
// range is to be tracked. Only 1-page will be allocated each time. This
|
||||
// can save memories used to establish this map table.
|
||||
//
|
||||
// For a normal configuration of system with 4G memory, two levels of tables
|
||||
// can track the whole memory, because two levels (L3+L4) of map tables have
|
||||
// already coverred 37-bit of memory address. And for a normal UEFI BIOS,
|
||||
// less than 128M memory would be consumed during boot. That means we just
|
||||
// need
|
||||
//
|
||||
// 1-page (L3) + 2-page (L4)
|
||||
//
|
||||
// memory (3 pages) to track the memory allocation works. In this case,
|
||||
// there's no need to setup L0-L2 tables.
|
||||
//
|
||||
|
||||
//
|
||||
// Each entry occupies 8B/64b. 1-page can hold 512 entries, which spans 9
|
||||
// bits in address. (512 = 1 << 9)
|
||||
//
|
||||
#define BYTE_LENGTH_SHIFT 3 // (8 = 1 << 3)
|
||||
|
||||
#define GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT \
|
||||
(EFI_PAGE_SHIFT - BYTE_LENGTH_SHIFT)
|
||||
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH 5
|
||||
|
||||
// Use UINT64_index + bit_index_of_UINT64 to locate the bit in may
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT 6 // (64 = 1 << 6)
|
||||
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BITS \
|
||||
(1 << GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT)
|
||||
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BYTES \
|
||||
(GUARDED_HEAP_MAP_ENTRY_BITS / 8)
|
||||
|
||||
// L4 table address width: 64 - 9 * 4 - 6 - 12 = 10b
|
||||
#define GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
(GUARDED_HEAP_MAP_ENTRY_BITS \
|
||||
- GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 4 \
|
||||
- GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
- EFI_PAGE_SHIFT)
|
||||
|
||||
// L4 table address mask: (1 << 10 - 1) = 0x3FF
|
||||
#define GUARDED_HEAP_MAP_ENTRY_MASK \
|
||||
((1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) - 1)
|
||||
|
||||
// Size of each L4 table: (1 << 10) * 8 = 8KB = 2-page
|
||||
#define GUARDED_HEAP_MAP_SIZE \
|
||||
((1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) * GUARDED_HEAP_MAP_ENTRY_BYTES)
|
||||
|
||||
// Memory size tracked by one L4 table: 8KB * 8 * 4KB = 256MB
|
||||
#define GUARDED_HEAP_MAP_UNIT_SIZE \
|
||||
(GUARDED_HEAP_MAP_SIZE * 8 * EFI_PAGE_SIZE)
|
||||
|
||||
// L4 table entry number: 8KB / 8 = 1024
|
||||
#define GUARDED_HEAP_MAP_ENTRIES_PER_UNIT \
|
||||
(GUARDED_HEAP_MAP_SIZE / GUARDED_HEAP_MAP_ENTRY_BYTES)
|
||||
|
||||
// L4 table entry indexing
|
||||
#define GUARDED_HEAP_MAP_ENTRY_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT) \
|
||||
& GUARDED_HEAP_MAP_ENTRY_MASK)
|
||||
|
||||
// L4 table entry bit indexing
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BIT_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT) \
|
||||
& ((1 << GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT) - 1))
|
||||
|
||||
//
|
||||
// Total bits (pages) tracked by one L4 table (65536-bit)
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_BITS \
|
||||
(1 << (GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT))
|
||||
|
||||
//
|
||||
// Bit indexing inside the whole L4 table (0 - 65535)
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_BIT_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT) \
|
||||
& ((1 << (GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT)) - 1))
|
||||
|
||||
//
|
||||
// Memory address bit width tracked by L4 table: 10 + 6 + 12 = 28
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_SHIFT \
|
||||
(GUARDED_HEAP_MAP_ENTRY_SHIFT + GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
+ EFI_PAGE_SHIFT)
|
||||
|
||||
//
|
||||
// Macro used to initialize the local array variable for map table traversing
|
||||
// {55, 46, 37, 28, 18}
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH_SHIFTS \
|
||||
{ \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 3, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 2, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT, \
|
||||
EFI_PAGE_SHIFT + GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
}
|
||||
|
||||
//
|
||||
// Masks used to extract address range of each level of table
|
||||
// {0x1FF, 0x1FF, 0x1FF, 0x1FF, 0x3FF}
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH_MASKS \
|
||||
{ \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) - 1 \
|
||||
}
|
||||
|
||||
//
|
||||
// Memory type to guard (matching the related PCD definition)
|
||||
//
|
||||
#define GUARD_HEAP_TYPE_POOL BIT2
|
||||
#define GUARD_HEAP_TYPE_PAGE BIT3
|
||||
|
||||
//
|
||||
// Debug message level
|
||||
//
|
||||
#define HEAP_GUARD_DEBUG_LEVEL (DEBUG_POOL|DEBUG_PAGE)
|
||||
|
||||
typedef struct {
|
||||
UINT32 TailMark;
|
||||
UINT32 HeadMark;
|
||||
EFI_PHYSICAL_ADDRESS Address;
|
||||
LIST_ENTRY Link;
|
||||
} HEAP_GUARD_NODE;
|
||||
|
||||
/**
|
||||
Set head Guard and tail Guard for the given memory range.
|
||||
|
||||
@param[in] Memory Base address of memory to set guard for.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
SetGuardForMemory (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Unset head Guard and tail Guard for the given memory range.
|
||||
|
||||
@param[in] Memory Base address of memory to unset guard for.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
UnsetGuardForMemory (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the base and number of pages to really allocate according to Guard.
|
||||
|
||||
@param[in,out] Memory Base address of free memory.
|
||||
@param[in,out] NumberOfPages Size of memory to allocate.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
AdjustMemoryA (
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN OUT UINTN *NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the start address and number of pages to free according to Guard.
|
||||
|
||||
The purpose of this function is to keep the shared Guard page with adjacent
|
||||
memory block if it's still in guard, or free it if no more sharing. Another
|
||||
is to reserve pages as Guard pages in partial page free situation.
|
||||
|
||||
@param[in,out] Memory Base address of memory to free.
|
||||
@param[in,out] NumberOfPages Size of memory to free.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
AdjustMemoryF (
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN OUT UINTN *NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the pool at the given address should be guarded or not.
|
||||
|
||||
@param[in] MemoryType Pool type to check.
|
||||
|
||||
|
||||
@return TRUE The given type of pool should be guarded.
|
||||
@return FALSE The given type of pool should not be guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsPoolTypeToGuard (
|
||||
IN EFI_MEMORY_TYPE MemoryType
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address should be guarded or not.
|
||||
|
||||
@param[in] MemoryType Page type to check.
|
||||
@param[in] AllocateType Allocation type to check.
|
||||
|
||||
@return TRUE The given type of page should be guarded.
|
||||
@return FALSE The given type of page should not be guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsPageTypeToGuard (
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN EFI_ALLOCATE_TYPE AllocateType
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address is guarded or not.
|
||||
|
||||
@param[in] Address The address to check for.
|
||||
|
||||
@return TRUE The page at Address is guarded.
|
||||
@return FALSE The page at Address is not guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
IsMemoryGuarded (
|
||||
IN EFI_PHYSICAL_ADDRESS Address
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address is a Guard page or not.
|
||||
|
||||
@param[in] Address The address to check for.
|
||||
|
||||
@return TRUE The page at Address is a Guard page.
|
||||
@return FALSE The page at Address is not a Guard page.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
IsGuardPage (
|
||||
IN EFI_PHYSICAL_ADDRESS Address
|
||||
);
|
||||
|
||||
/**
|
||||
Dump the guarded memory bit map.
|
||||
**/
|
||||
VOID
|
||||
EFIAPI
|
||||
DumpGuardedMemoryBitmap (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the pool head position to make sure the Guard page is adjavent to
|
||||
pool tail or pool head.
|
||||
|
||||
@param[in] Memory Base address of memory allocated.
|
||||
@param[in] NoPages Number of pages actually allocated.
|
||||
@param[in] Size Size of memory requested.
|
||||
(plus pool head/tail overhead)
|
||||
|
||||
@return Address of pool head.
|
||||
**/
|
||||
VOID *
|
||||
AdjustPoolHeadA (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NoPages,
|
||||
IN UINTN Size
|
||||
);
|
||||
|
||||
/**
|
||||
Get the page base address according to pool head address.
|
||||
|
||||
@param[in] Memory Head address of pool to free.
|
||||
|
||||
@return Address of pool head.
|
||||
**/
|
||||
VOID *
|
||||
AdjustPoolHeadF (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory
|
||||
);
|
||||
|
||||
/**
|
||||
Helper function of memory allocation with Guard pages.
|
||||
|
||||
@param FreePageList The free page node.
|
||||
@param NumberOfPages Number of pages to be allocated.
|
||||
@param MaxAddress Request to allocate memory below this address.
|
||||
@param MemoryType Type of memory requested.
|
||||
|
||||
@return Memory address of allocated pages.
|
||||
**/
|
||||
UINTN
|
||||
InternalAllocMaxAddressWithGuard (
|
||||
IN OUT LIST_ENTRY *FreePageList,
|
||||
IN UINTN NumberOfPages,
|
||||
IN UINTN MaxAddress,
|
||||
IN EFI_MEMORY_TYPE MemoryType
|
||||
);
|
||||
|
||||
/**
|
||||
Helper function of memory free with Guard pages.
|
||||
|
||||
@param[in] Memory Base address of memory being freed.
|
||||
@param[in] NumberOfPages The number of pages to free.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range.
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or
|
||||
NumberOfPages is zero.
|
||||
@return EFI_SUCCESS Pages successfully freed.
|
||||
**/
|
||||
EFI_STATUS
|
||||
SmmInternalFreePagesExWithGuard (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the heap guard is enabled for page and/or pool allocation.
|
||||
|
||||
@return TRUE/FALSE.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsHeapGuardEnabled (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Debug function used to verify if the Guard page is well set or not.
|
||||
|
||||
@param[in] BaseAddress Address of memory to check.
|
||||
@param[in] NumberOfPages Size of memory in pages.
|
||||
|
||||
@return TRUE The head Guard and tail Guard are both well set.
|
||||
@return FALSE The head Guard and/or tail Guard are not well set.
|
||||
**/
|
||||
BOOLEAN
|
||||
VerifyMemoryGuard (
|
||||
IN EFI_PHYSICAL_ADDRESS BaseAddress,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
extern BOOLEAN mOnGuarding;
|
||||
|
||||
#endif
|
||||
/** @file
|
||||
Data structure and functions to allocate and free memory space.
|
||||
|
||||
Copyright (c) 2017, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
http://opensource.org/licenses/bsd-license.php
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
**/
|
||||
|
||||
#ifndef _HEAPGUARD_H_
|
||||
#define _HEAPGUARD_H_
|
||||
|
||||
#include "PiSmmCore.h"
|
||||
|
||||
//
|
||||
// Following macros are used to define and access the guarded memory bitmap
|
||||
// table.
|
||||
//
|
||||
// To simplify the access and reduce the memory used for this table, the
|
||||
// table is constructed in the similar way as page table structure but in
|
||||
// reverse direction, i.e. from bottom growing up to top.
|
||||
//
|
||||
// - 1-bit tracks 1 page (4KB)
|
||||
// - 1-UINT64 map entry tracks 256KB memory
|
||||
// - 1K-UINT64 map table tracks 256MB memory
|
||||
// - Five levels of tables can track any address of memory of 64-bit
|
||||
// system, like below.
|
||||
//
|
||||
// 512 * 512 * 512 * 512 * 1K * 64b * 4K
|
||||
// 111111111 111111111 111111111 111111111 1111111111 111111 111111111111
|
||||
// 63 54 45 36 27 17 11 0
|
||||
// 9b 9b 9b 9b 10b 6b 12b
|
||||
// L0 -> L1 -> L2 -> L3 -> L4 -> bits -> page
|
||||
// 1FF 1FF 1FF 1FF 3FF 3F FFF
|
||||
//
|
||||
// L4 table has 1K * sizeof(UINT64) = 8K (2-page), which can track 256MB
|
||||
// memory. Each table of L0-L3 will be allocated when its memory address
|
||||
// range is to be tracked. Only 1-page will be allocated each time. This
|
||||
// can save memories used to establish this map table.
|
||||
//
|
||||
// For a normal configuration of system with 4G memory, two levels of tables
|
||||
// can track the whole memory, because two levels (L3+L4) of map tables have
|
||||
// already coverred 37-bit of memory address. And for a normal UEFI BIOS,
|
||||
// less than 128M memory would be consumed during boot. That means we just
|
||||
// need
|
||||
//
|
||||
// 1-page (L3) + 2-page (L4)
|
||||
//
|
||||
// memory (3 pages) to track the memory allocation works. In this case,
|
||||
// there's no need to setup L0-L2 tables.
|
||||
//
|
||||
|
||||
//
|
||||
// Each entry occupies 8B/64b. 1-page can hold 512 entries, which spans 9
|
||||
// bits in address. (512 = 1 << 9)
|
||||
//
|
||||
#define BYTE_LENGTH_SHIFT 3 // (8 = 1 << 3)
|
||||
|
||||
#define GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT \
|
||||
(EFI_PAGE_SHIFT - BYTE_LENGTH_SHIFT)
|
||||
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH 5
|
||||
|
||||
// Use UINT64_index + bit_index_of_UINT64 to locate the bit in may
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT 6 // (64 = 1 << 6)
|
||||
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BITS \
|
||||
(1 << GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT)
|
||||
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BYTES \
|
||||
(GUARDED_HEAP_MAP_ENTRY_BITS / 8)
|
||||
|
||||
// L4 table address width: 64 - 9 * 4 - 6 - 12 = 10b
|
||||
#define GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
(GUARDED_HEAP_MAP_ENTRY_BITS \
|
||||
- GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 4 \
|
||||
- GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
- EFI_PAGE_SHIFT)
|
||||
|
||||
// L4 table address mask: (1 << 10 - 1) = 0x3FF
|
||||
#define GUARDED_HEAP_MAP_ENTRY_MASK \
|
||||
((1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) - 1)
|
||||
|
||||
// Size of each L4 table: (1 << 10) * 8 = 8KB = 2-page
|
||||
#define GUARDED_HEAP_MAP_SIZE \
|
||||
((1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) * GUARDED_HEAP_MAP_ENTRY_BYTES)
|
||||
|
||||
// Memory size tracked by one L4 table: 8KB * 8 * 4KB = 256MB
|
||||
#define GUARDED_HEAP_MAP_UNIT_SIZE \
|
||||
(GUARDED_HEAP_MAP_SIZE * 8 * EFI_PAGE_SIZE)
|
||||
|
||||
// L4 table entry number: 8KB / 8 = 1024
|
||||
#define GUARDED_HEAP_MAP_ENTRIES_PER_UNIT \
|
||||
(GUARDED_HEAP_MAP_SIZE / GUARDED_HEAP_MAP_ENTRY_BYTES)
|
||||
|
||||
// L4 table entry indexing
|
||||
#define GUARDED_HEAP_MAP_ENTRY_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT) \
|
||||
& GUARDED_HEAP_MAP_ENTRY_MASK)
|
||||
|
||||
// L4 table entry bit indexing
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BIT_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT) \
|
||||
& ((1 << GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT) - 1))
|
||||
|
||||
//
|
||||
// Total bits (pages) tracked by one L4 table (65536-bit)
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_BITS \
|
||||
(1 << (GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT))
|
||||
|
||||
//
|
||||
// Bit indexing inside the whole L4 table (0 - 65535)
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_BIT_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT) \
|
||||
& ((1 << (GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT)) - 1))
|
||||
|
||||
//
|
||||
// Memory address bit width tracked by L4 table: 10 + 6 + 12 = 28
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_SHIFT \
|
||||
(GUARDED_HEAP_MAP_ENTRY_SHIFT + GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
+ EFI_PAGE_SHIFT)
|
||||
|
||||
//
|
||||
// Macro used to initialize the local array variable for map table traversing
|
||||
// {55, 46, 37, 28, 18}
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH_SHIFTS \
|
||||
{ \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 3, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 2, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT, \
|
||||
EFI_PAGE_SHIFT + GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
}
|
||||
|
||||
//
|
||||
// Masks used to extract address range of each level of table
|
||||
// {0x1FF, 0x1FF, 0x1FF, 0x1FF, 0x3FF}
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH_MASKS \
|
||||
{ \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) - 1 \
|
||||
}
|
||||
|
||||
//
|
||||
// Memory type to guard (matching the related PCD definition)
|
||||
//
|
||||
#define GUARD_HEAP_TYPE_POOL BIT2
|
||||
#define GUARD_HEAP_TYPE_PAGE BIT3
|
||||
|
||||
//
|
||||
// Debug message level
|
||||
//
|
||||
#define HEAP_GUARD_DEBUG_LEVEL (DEBUG_POOL|DEBUG_PAGE)
|
||||
|
||||
typedef struct {
|
||||
UINT32 TailMark;
|
||||
UINT32 HeadMark;
|
||||
EFI_PHYSICAL_ADDRESS Address;
|
||||
LIST_ENTRY Link;
|
||||
} HEAP_GUARD_NODE;
|
||||
|
||||
/**
|
||||
Set head Guard and tail Guard for the given memory range.
|
||||
|
||||
@param[in] Memory Base address of memory to set guard for.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
SetGuardForMemory (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Unset head Guard and tail Guard for the given memory range.
|
||||
|
||||
@param[in] Memory Base address of memory to unset guard for.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
UnsetGuardForMemory (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the base and number of pages to really allocate according to Guard.
|
||||
|
||||
@param[in,out] Memory Base address of free memory.
|
||||
@param[in,out] NumberOfPages Size of memory to allocate.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
AdjustMemoryA (
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN OUT UINTN *NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the start address and number of pages to free according to Guard.
|
||||
|
||||
The purpose of this function is to keep the shared Guard page with adjacent
|
||||
memory block if it's still in guard, or free it if no more sharing. Another
|
||||
is to reserve pages as Guard pages in partial page free situation.
|
||||
|
||||
@param[in,out] Memory Base address of memory to free.
|
||||
@param[in,out] NumberOfPages Size of memory to free.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
AdjustMemoryF (
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN OUT UINTN *NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the pool at the given address should be guarded or not.
|
||||
|
||||
@param[in] MemoryType Pool type to check.
|
||||
|
||||
|
||||
@return TRUE The given type of pool should be guarded.
|
||||
@return FALSE The given type of pool should not be guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsPoolTypeToGuard (
|
||||
IN EFI_MEMORY_TYPE MemoryType
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address should be guarded or not.
|
||||
|
||||
@param[in] MemoryType Page type to check.
|
||||
@param[in] AllocateType Allocation type to check.
|
||||
|
||||
@return TRUE The given type of page should be guarded.
|
||||
@return FALSE The given type of page should not be guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsPageTypeToGuard (
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN EFI_ALLOCATE_TYPE AllocateType
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address is guarded or not.
|
||||
|
||||
@param[in] Address The address to check for.
|
||||
|
||||
@return TRUE The page at Address is guarded.
|
||||
@return FALSE The page at Address is not guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
IsMemoryGuarded (
|
||||
IN EFI_PHYSICAL_ADDRESS Address
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address is a Guard page or not.
|
||||
|
||||
@param[in] Address The address to check for.
|
||||
|
||||
@return TRUE The page at Address is a Guard page.
|
||||
@return FALSE The page at Address is not a Guard page.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
IsGuardPage (
|
||||
IN EFI_PHYSICAL_ADDRESS Address
|
||||
);
|
||||
|
||||
/**
|
||||
Dump the guarded memory bit map.
|
||||
**/
|
||||
VOID
|
||||
EFIAPI
|
||||
DumpGuardedMemoryBitmap (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the pool head position to make sure the Guard page is adjavent to
|
||||
pool tail or pool head.
|
||||
|
||||
@param[in] Memory Base address of memory allocated.
|
||||
@param[in] NoPages Number of pages actually allocated.
|
||||
@param[in] Size Size of memory requested.
|
||||
(plus pool head/tail overhead)
|
||||
|
||||
@return Address of pool head.
|
||||
**/
|
||||
VOID *
|
||||
AdjustPoolHeadA (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NoPages,
|
||||
IN UINTN Size
|
||||
);
|
||||
|
||||
/**
|
||||
Get the page base address according to pool head address.
|
||||
|
||||
@param[in] Memory Head address of pool to free.
|
||||
|
||||
@return Address of pool head.
|
||||
**/
|
||||
VOID *
|
||||
AdjustPoolHeadF (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory
|
||||
);
|
||||
|
||||
/**
|
||||
Helper function of memory allocation with Guard pages.
|
||||
|
||||
@param FreePageList The free page node.
|
||||
@param NumberOfPages Number of pages to be allocated.
|
||||
@param MaxAddress Request to allocate memory below this address.
|
||||
@param MemoryType Type of memory requested.
|
||||
|
||||
@return Memory address of allocated pages.
|
||||
**/
|
||||
UINTN
|
||||
InternalAllocMaxAddressWithGuard (
|
||||
IN OUT LIST_ENTRY *FreePageList,
|
||||
IN UINTN NumberOfPages,
|
||||
IN UINTN MaxAddress,
|
||||
IN EFI_MEMORY_TYPE MemoryType
|
||||
);
|
||||
|
||||
/**
|
||||
Helper function of memory free with Guard pages.
|
||||
|
||||
@param[in] Memory Base address of memory being freed.
|
||||
@param[in] NumberOfPages The number of pages to free.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range.
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or
|
||||
NumberOfPages is zero.
|
||||
@return EFI_SUCCESS Pages successfully freed.
|
||||
**/
|
||||
EFI_STATUS
|
||||
SmmInternalFreePagesExWithGuard (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the heap guard is enabled for page and/or pool allocation.
|
||||
|
||||
@return TRUE/FALSE.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsHeapGuardEnabled (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Debug function used to verify if the Guard page is well set or not.
|
||||
|
||||
@param[in] BaseAddress Address of memory to check.
|
||||
@param[in] NumberOfPages Size of memory in pages.
|
||||
|
||||
@return TRUE The head Guard and tail Guard are both well set.
|
||||
@return FALSE The head Guard and/or tail Guard are not well set.
|
||||
**/
|
||||
BOOLEAN
|
||||
VerifyMemoryGuard (
|
||||
IN EFI_PHYSICAL_ADDRESS BaseAddress,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
extern BOOLEAN mOnGuarding;
|
||||
|
||||
#endif
|
||||
|
|
|
@ -64,8 +64,8 @@ LIST_ENTRY mFreeMemoryMapEntryList = INITIALIZE_LIST_HEAD_VARIABLE (mFreeMemor
|
|||
@param[out] Memory A pointer to receive the base allocated memory
|
||||
address.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in spec.
|
||||
@retval EFI_NOT_FOUND Could not allocate pages match the requirement.
|
||||
|
@ -79,8 +79,8 @@ SmmInternalAllocatePagesEx (
|
|||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN AddRegion,
|
||||
IN BOOLEAN NeedGuard
|
||||
IN BOOLEAN AddRegion,
|
||||
IN BOOLEAN NeedGuard
|
||||
);
|
||||
|
||||
/**
|
||||
|
@ -115,8 +115,8 @@ AllocateMemoryMapEntry (
|
|||
EfiRuntimeServicesData,
|
||||
EFI_SIZE_TO_PAGES (RUNTIME_PAGE_ALLOCATION_GRANULARITY),
|
||||
&Mem,
|
||||
TRUE,
|
||||
FALSE
|
||||
TRUE,
|
||||
FALSE
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
if(!EFI_ERROR (Status)) {
|
||||
|
@ -692,8 +692,8 @@ InternalAllocAddress (
|
|||
@param[out] Memory A pointer to receive the base allocated memory
|
||||
address.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in spec.
|
||||
@retval EFI_NOT_FOUND Could not allocate pages match the requirement.
|
||||
|
@ -707,8 +707,8 @@ SmmInternalAllocatePagesEx (
|
|||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN AddRegion,
|
||||
IN BOOLEAN NeedGuard
|
||||
IN BOOLEAN AddRegion,
|
||||
IN BOOLEAN NeedGuard
|
||||
)
|
||||
{
|
||||
UINTN RequestedAddress;
|
||||
|
@ -730,21 +730,21 @@ SmmInternalAllocatePagesEx (
|
|||
case AllocateAnyPages:
|
||||
RequestedAddress = (UINTN)(-1);
|
||||
case AllocateMaxAddress:
|
||||
if (NeedGuard) {
|
||||
*Memory = InternalAllocMaxAddressWithGuard (
|
||||
&mSmmMemoryMap,
|
||||
NumberOfPages,
|
||||
RequestedAddress,
|
||||
MemoryType
|
||||
);
|
||||
if (*Memory == (UINTN)-1) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
} else {
|
||||
ASSERT (VerifyMemoryGuard (*Memory, NumberOfPages) == TRUE);
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
}
|
||||
|
||||
if (NeedGuard) {
|
||||
*Memory = InternalAllocMaxAddressWithGuard (
|
||||
&mSmmMemoryMap,
|
||||
NumberOfPages,
|
||||
RequestedAddress,
|
||||
MemoryType
|
||||
);
|
||||
if (*Memory == (UINTN)-1) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
} else {
|
||||
ASSERT (VerifyMemoryGuard (*Memory, NumberOfPages) == TRUE);
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
}
|
||||
|
||||
*Memory = InternalAllocMaxAddress (
|
||||
&mSmmMemoryMap,
|
||||
NumberOfPages,
|
||||
|
@ -788,8 +788,8 @@ SmmInternalAllocatePagesEx (
|
|||
@param[in] NumberOfPages The number of pages to allocate.
|
||||
@param[out] Memory A pointer to receive the base allocated memory
|
||||
address.
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in spec.
|
||||
@retval EFI_NOT_FOUND Could not allocate pages match the requirement.
|
||||
|
@ -803,12 +803,12 @@ SmmInternalAllocatePages (
|
|||
IN EFI_ALLOCATE_TYPE Type,
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN NeedGuard
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN NeedGuard
|
||||
)
|
||||
{
|
||||
return SmmInternalAllocatePagesEx (Type, MemoryType, NumberOfPages, Memory,
|
||||
FALSE, NeedGuard);
|
||||
return SmmInternalAllocatePagesEx (Type, MemoryType, NumberOfPages, Memory,
|
||||
FALSE, NeedGuard);
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -837,11 +837,11 @@ SmmAllocatePages (
|
|||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
BOOLEAN NeedGuard;
|
||||
BOOLEAN NeedGuard;
|
||||
|
||||
NeedGuard = IsPageTypeToGuard (MemoryType, Type);
|
||||
Status = SmmInternalAllocatePages (Type, MemoryType, NumberOfPages, Memory,
|
||||
NeedGuard);
|
||||
NeedGuard = IsPageTypeToGuard (MemoryType, Type);
|
||||
Status = SmmInternalAllocatePages (Type, MemoryType, NumberOfPages, Memory,
|
||||
NeedGuard);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
SmmCoreUpdateProfile (
|
||||
(EFI_PHYSICAL_ADDRESS) (UINTN) RETURN_ADDRESS (0),
|
||||
|
@ -960,7 +960,7 @@ SmmInternalFreePagesEx (
|
|||
|
||||
@param[in] Memory Base address of memory being freed.
|
||||
@param[in] NumberOfPages The number of pages to free.
|
||||
@param[in] IsGuarded Is the memory to free guarded or not.
|
||||
@param[in] IsGuarded Is the memory to free guarded or not.
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range.
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or NumberOfPages is zero.
|
||||
|
@ -971,13 +971,13 @@ EFI_STATUS
|
|||
EFIAPI
|
||||
SmmInternalFreePages (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN IsGuarded
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN IsGuarded
|
||||
)
|
||||
{
|
||||
if (IsGuarded) {
|
||||
return SmmInternalFreePagesExWithGuard (Memory, NumberOfPages, FALSE);
|
||||
}
|
||||
if (IsGuarded) {
|
||||
return SmmInternalFreePagesExWithGuard (Memory, NumberOfPages, FALSE);
|
||||
}
|
||||
return SmmInternalFreePagesEx (Memory, NumberOfPages, FALSE);
|
||||
}
|
||||
|
||||
|
@ -1000,10 +1000,10 @@ SmmFreePages (
|
|||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
BOOLEAN IsGuarded;
|
||||
BOOLEAN IsGuarded;
|
||||
|
||||
IsGuarded = IsHeapGuardEnabled () && IsMemoryGuarded (Memory);
|
||||
Status = SmmInternalFreePages (Memory, NumberOfPages, IsGuarded);
|
||||
IsGuarded = IsHeapGuardEnabled () && IsMemoryGuarded (Memory);
|
||||
Status = SmmInternalFreePages (Memory, NumberOfPages, IsGuarded);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
SmmCoreUpdateProfile (
|
||||
(EFI_PHYSICAL_ADDRESS) (UINTN) RETURN_ADDRESS (0),
|
||||
|
|
|
@ -506,11 +506,11 @@ SmmEntryPoint (
|
|||
//
|
||||
PlatformHookBeforeSmmDispatch ();
|
||||
|
||||
//
|
||||
// Call memory management hook function
|
||||
//
|
||||
SmmEntryPointMemoryManagementHook ();
|
||||
|
||||
//
|
||||
// Call memory management hook function
|
||||
//
|
||||
SmmEntryPointMemoryManagementHook ();
|
||||
|
||||
//
|
||||
// If a legacy boot has occured, then make sure gSmmCorePrivate is not accessed
|
||||
//
|
||||
|
@ -704,7 +704,7 @@ SmmMain (
|
|||
//
|
||||
gSmmCorePrivate->Smst = &gSmmCoreSmst;
|
||||
gSmmCorePrivate->SmmEntryPoint = SmmEntryPoint;
|
||||
|
||||
|
||||
//
|
||||
// No need to initialize memory service.
|
||||
// It is done in constructor of PiSmmCoreMemoryAllocationLib(),
|
||||
|
|
|
@ -33,7 +33,7 @@
|
|||
#include <Protocol/SmmLegacyBoot.h>
|
||||
#include <Protocol/SmmReadyToBoot.h>
|
||||
#include <Protocol/SmmEndOfS3Resume.h>
|
||||
#include <Protocol/SmmMemoryAttribute.h>
|
||||
#include <Protocol/SmmMemoryAttribute.h>
|
||||
|
||||
#include <Guid/Apriori.h>
|
||||
#include <Guid/EventGroup.h>
|
||||
|
@ -61,7 +61,7 @@
|
|||
#include <Library/SmmMemLib.h>
|
||||
|
||||
#include "PiSmmCorePrivateData.h"
|
||||
#include "HeapGuard.h"
|
||||
#include "HeapGuard.h"
|
||||
|
||||
//
|
||||
// Used to build a table of SMI Handlers that the SMM Core registers
|
||||
|
@ -320,7 +320,7 @@ SmmAllocatePages (
|
|||
@param NumberOfPages The number of pages to allocate
|
||||
@param Memory A pointer to receive the base allocated memory
|
||||
address
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in spec.
|
||||
@retval EFI_NOT_FOUND Could not allocate pages match the requirement.
|
||||
|
@ -334,8 +334,8 @@ SmmInternalAllocatePages (
|
|||
IN EFI_ALLOCATE_TYPE Type,
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN NeedGuard
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN NeedGuard
|
||||
);
|
||||
|
||||
/**
|
||||
|
@ -361,8 +361,8 @@ SmmFreePages (
|
|||
|
||||
@param Memory Base address of memory being freed
|
||||
@param NumberOfPages The number of pages to free
|
||||
@param IsGuarded Flag to indicate if the memory is guarded
|
||||
or not
|
||||
@param IsGuarded Flag to indicate if the memory is guarded
|
||||
or not
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or NumberOfPages is zero.
|
||||
|
@ -373,8 +373,8 @@ EFI_STATUS
|
|||
EFIAPI
|
||||
SmmInternalFreePages (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN IsGuarded
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN IsGuarded
|
||||
);
|
||||
|
||||
/**
|
||||
|
@ -1262,74 +1262,74 @@ typedef enum {
|
|||
|
||||
extern LIST_ENTRY mSmmPoolLists[SmmPoolTypeMax][MAX_POOL_INDEX];
|
||||
|
||||
/**
|
||||
Internal Function. Allocate n pages from given free page node.
|
||||
|
||||
@param Pages The free page node.
|
||||
@param NumberOfPages Number of pages to be allocated.
|
||||
@param MaxAddress Request to allocate memory below this address.
|
||||
|
||||
@return Memory address of allocated pages.
|
||||
|
||||
**/
|
||||
UINTN
|
||||
InternalAllocPagesOnOneNode (
|
||||
IN OUT FREE_PAGE_LIST *Pages,
|
||||
IN UINTN NumberOfPages,
|
||||
IN UINTN MaxAddress
|
||||
);
|
||||
|
||||
/**
|
||||
Update SMM memory map entry.
|
||||
|
||||
@param[in] Type The type of allocation to perform.
|
||||
@param[in] Memory The base of memory address.
|
||||
@param[in] NumberOfPages The number of pages to allocate.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
**/
|
||||
VOID
|
||||
ConvertSmmMemoryMapEntry (
|
||||
IN EFI_MEMORY_TYPE Type,
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Internal function. Moves any memory descriptors that are on the
|
||||
temporary descriptor stack to heap.
|
||||
|
||||
**/
|
||||
VOID
|
||||
CoreFreeMemoryMapStack (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Frees previous allocated pages.
|
||||
|
||||
@param[in] Memory Base address of memory being freed.
|
||||
@param[in] NumberOfPages The number of pages to free.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range.
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or NumberOfPages is zero.
|
||||
@return EFI_SUCCESS Pages successfully freed.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
SmmInternalFreePagesEx (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Hook function used to set all Guard pages after entering SMM mode.
|
||||
**/
|
||||
VOID
|
||||
SmmEntryPointMemoryManagementHook (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Internal Function. Allocate n pages from given free page node.
|
||||
|
||||
@param Pages The free page node.
|
||||
@param NumberOfPages Number of pages to be allocated.
|
||||
@param MaxAddress Request to allocate memory below this address.
|
||||
|
||||
@return Memory address of allocated pages.
|
||||
|
||||
**/
|
||||
UINTN
|
||||
InternalAllocPagesOnOneNode (
|
||||
IN OUT FREE_PAGE_LIST *Pages,
|
||||
IN UINTN NumberOfPages,
|
||||
IN UINTN MaxAddress
|
||||
);
|
||||
|
||||
/**
|
||||
Update SMM memory map entry.
|
||||
|
||||
@param[in] Type The type of allocation to perform.
|
||||
@param[in] Memory The base of memory address.
|
||||
@param[in] NumberOfPages The number of pages to allocate.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
**/
|
||||
VOID
|
||||
ConvertSmmMemoryMapEntry (
|
||||
IN EFI_MEMORY_TYPE Type,
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Internal function. Moves any memory descriptors that are on the
|
||||
temporary descriptor stack to heap.
|
||||
|
||||
**/
|
||||
VOID
|
||||
CoreFreeMemoryMapStack (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Frees previous allocated pages.
|
||||
|
||||
@param[in] Memory Base address of memory being freed.
|
||||
@param[in] NumberOfPages The number of pages to free.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range.
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or NumberOfPages is zero.
|
||||
@return EFI_SUCCESS Pages successfully freed.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
SmmInternalFreePagesEx (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Hook function used to set all Guard pages after entering SMM mode.
|
||||
**/
|
||||
VOID
|
||||
SmmEntryPointMemoryManagementHook (
|
||||
VOID
|
||||
);
|
||||
|
||||
#endif
|
||||
|
|
|
@ -40,7 +40,7 @@
|
|||
SmramProfileRecord.c
|
||||
MemoryAttributesTable.c
|
||||
SmiHandlerProfile.c
|
||||
HeapGuard.c
|
||||
HeapGuard.c
|
||||
|
||||
[Packages]
|
||||
MdePkg/MdePkg.dec
|
||||
|
@ -90,8 +90,8 @@
|
|||
gEfiSmmGpiDispatch2ProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEfiSmmIoTrapDispatch2ProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEfiSmmUsbDispatch2ProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEfiSmmCpuProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEdkiiSmmMemoryAttributeProtocolGuid ## CONSUMES
|
||||
gEfiSmmCpuProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEdkiiSmmMemoryAttributeProtocolGuid ## CONSUMES
|
||||
|
||||
[Pcd]
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdLoadFixAddressSmmCodePageNumber ## SOMETIMES_CONSUMES
|
||||
|
@ -100,9 +100,9 @@
|
|||
gEfiMdeModulePkgTokenSpaceGuid.PcdMemoryProfilePropertyMask ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdMemoryProfileDriverPath ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdSmiHandlerProfilePropertyMask ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPageType ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPoolType ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPropertyMask ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPageType ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPoolType ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPropertyMask ## CONSUMES
|
||||
|
||||
[Guids]
|
||||
gAprioriGuid ## SOMETIMES_CONSUMES ## File
|
||||
|
|
|
@ -144,9 +144,9 @@ InternalAllocPoolByIndex (
|
|||
Status = EFI_SUCCESS;
|
||||
Hdr = NULL;
|
||||
if (PoolIndex == MAX_POOL_INDEX) {
|
||||
Status = SmmInternalAllocatePages (AllocateAnyPages, PoolType,
|
||||
EFI_SIZE_TO_PAGES (MAX_POOL_SIZE << 1),
|
||||
&Address, FALSE);
|
||||
Status = SmmInternalAllocatePages (AllocateAnyPages, PoolType,
|
||||
EFI_SIZE_TO_PAGES (MAX_POOL_SIZE << 1),
|
||||
&Address, FALSE);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
|
@ -245,9 +245,9 @@ SmmInternalAllocatePool (
|
|||
EFI_STATUS Status;
|
||||
EFI_PHYSICAL_ADDRESS Address;
|
||||
UINTN PoolIndex;
|
||||
BOOLEAN HasPoolTail;
|
||||
BOOLEAN NeedGuard;
|
||||
UINTN NoPages;
|
||||
BOOLEAN HasPoolTail;
|
||||
BOOLEAN NeedGuard;
|
||||
UINTN NoPages;
|
||||
|
||||
Address = 0;
|
||||
|
||||
|
@ -256,47 +256,47 @@ SmmInternalAllocatePool (
|
|||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
NeedGuard = IsPoolTypeToGuard (PoolType);
|
||||
HasPoolTail = !(NeedGuard &&
|
||||
((PcdGet8 (PcdHeapGuardPropertyMask) & BIT7) == 0));
|
||||
|
||||
NeedGuard = IsPoolTypeToGuard (PoolType);
|
||||
HasPoolTail = !(NeedGuard &&
|
||||
((PcdGet8 (PcdHeapGuardPropertyMask) & BIT7) == 0));
|
||||
|
||||
//
|
||||
// Adjust the size by the pool header & tail overhead
|
||||
//
|
||||
Size += POOL_OVERHEAD;
|
||||
if (Size > MAX_POOL_SIZE || NeedGuard) {
|
||||
if (!HasPoolTail) {
|
||||
Size -= sizeof (POOL_TAIL);
|
||||
}
|
||||
|
||||
NoPages = EFI_SIZE_TO_PAGES (Size);
|
||||
Status = SmmInternalAllocatePages (AllocateAnyPages, PoolType, NoPages,
|
||||
&Address, NeedGuard);
|
||||
if (Size > MAX_POOL_SIZE || NeedGuard) {
|
||||
if (!HasPoolTail) {
|
||||
Size -= sizeof (POOL_TAIL);
|
||||
}
|
||||
|
||||
NoPages = EFI_SIZE_TO_PAGES (Size);
|
||||
Status = SmmInternalAllocatePages (AllocateAnyPages, PoolType, NoPages,
|
||||
&Address, NeedGuard);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
if (NeedGuard) {
|
||||
ASSERT (VerifyMemoryGuard (Address, NoPages) == TRUE);
|
||||
Address = (EFI_PHYSICAL_ADDRESS)(UINTN)AdjustPoolHeadA (
|
||||
Address,
|
||||
NoPages,
|
||||
Size
|
||||
);
|
||||
}
|
||||
|
||||
if (NeedGuard) {
|
||||
ASSERT (VerifyMemoryGuard (Address, NoPages) == TRUE);
|
||||
Address = (EFI_PHYSICAL_ADDRESS)(UINTN)AdjustPoolHeadA (
|
||||
Address,
|
||||
NoPages,
|
||||
Size
|
||||
);
|
||||
}
|
||||
|
||||
PoolHdr = (POOL_HEADER*)(UINTN)Address;
|
||||
PoolHdr->Signature = POOL_HEAD_SIGNATURE;
|
||||
PoolHdr->Size = EFI_PAGES_TO_SIZE (NoPages);
|
||||
PoolHdr->Available = FALSE;
|
||||
PoolHdr->Type = PoolType;
|
||||
|
||||
if (HasPoolTail) {
|
||||
PoolTail = HEAD_TO_TAIL (PoolHdr);
|
||||
PoolTail->Signature = POOL_TAIL_SIGNATURE;
|
||||
PoolTail->Size = PoolHdr->Size;
|
||||
}
|
||||
|
||||
|
||||
if (HasPoolTail) {
|
||||
PoolTail = HEAD_TO_TAIL (PoolHdr);
|
||||
PoolTail->Signature = POOL_TAIL_SIGNATURE;
|
||||
PoolTail->Size = PoolHdr->Size;
|
||||
}
|
||||
|
||||
*Buffer = PoolHdr + 1;
|
||||
return Status;
|
||||
}
|
||||
|
@ -368,18 +368,18 @@ SmmInternalFreePool (
|
|||
{
|
||||
FREE_POOL_HEADER *FreePoolHdr;
|
||||
POOL_TAIL *PoolTail;
|
||||
BOOLEAN HasPoolTail;
|
||||
BOOLEAN MemoryGuarded;
|
||||
BOOLEAN HasPoolTail;
|
||||
BOOLEAN MemoryGuarded;
|
||||
|
||||
if (Buffer == NULL) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
MemoryGuarded = IsHeapGuardEnabled () &&
|
||||
IsMemoryGuarded ((EFI_PHYSICAL_ADDRESS)(UINTN)Buffer);
|
||||
HasPoolTail = !(MemoryGuarded &&
|
||||
((PcdGet8 (PcdHeapGuardPropertyMask) & BIT7) == 0));
|
||||
|
||||
MemoryGuarded = IsHeapGuardEnabled () &&
|
||||
IsMemoryGuarded ((EFI_PHYSICAL_ADDRESS)(UINTN)Buffer);
|
||||
HasPoolTail = !(MemoryGuarded &&
|
||||
((PcdGet8 (PcdHeapGuardPropertyMask) & BIT7) == 0));
|
||||
|
||||
FreePoolHdr = (FREE_POOL_HEADER*)((POOL_HEADER*)Buffer - 1);
|
||||
ASSERT (FreePoolHdr->Header.Signature == POOL_HEAD_SIGNATURE);
|
||||
ASSERT (!FreePoolHdr->Header.Available);
|
||||
|
@ -387,28 +387,28 @@ SmmInternalFreePool (
|
|||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
if (HasPoolTail) {
|
||||
PoolTail = HEAD_TO_TAIL (&FreePoolHdr->Header);
|
||||
ASSERT (PoolTail->Signature == POOL_TAIL_SIGNATURE);
|
||||
ASSERT (FreePoolHdr->Header.Size == PoolTail->Size);
|
||||
if (PoolTail->Signature != POOL_TAIL_SIGNATURE) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
if (FreePoolHdr->Header.Size != PoolTail->Size) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
} else {
|
||||
PoolTail = NULL;
|
||||
if (HasPoolTail) {
|
||||
PoolTail = HEAD_TO_TAIL (&FreePoolHdr->Header);
|
||||
ASSERT (PoolTail->Signature == POOL_TAIL_SIGNATURE);
|
||||
ASSERT (FreePoolHdr->Header.Size == PoolTail->Size);
|
||||
if (PoolTail->Signature != POOL_TAIL_SIGNATURE) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
if (FreePoolHdr->Header.Size != PoolTail->Size) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
} else {
|
||||
PoolTail = NULL;
|
||||
}
|
||||
|
||||
if (MemoryGuarded) {
|
||||
Buffer = AdjustPoolHeadF ((EFI_PHYSICAL_ADDRESS)(UINTN)FreePoolHdr);
|
||||
return SmmInternalFreePages (
|
||||
(EFI_PHYSICAL_ADDRESS)(UINTN)Buffer,
|
||||
EFI_SIZE_TO_PAGES (FreePoolHdr->Header.Size),
|
||||
TRUE
|
||||
);
|
||||
if (MemoryGuarded) {
|
||||
Buffer = AdjustPoolHeadF ((EFI_PHYSICAL_ADDRESS)(UINTN)FreePoolHdr);
|
||||
return SmmInternalFreePages (
|
||||
(EFI_PHYSICAL_ADDRESS)(UINTN)Buffer,
|
||||
EFI_SIZE_TO_PAGES (FreePoolHdr->Header.Size),
|
||||
TRUE
|
||||
);
|
||||
}
|
||||
|
||||
if (FreePoolHdr->Header.Size > MAX_POOL_SIZE) {
|
||||
|
@ -416,8 +416,8 @@ SmmInternalFreePool (
|
|||
ASSERT ((FreePoolHdr->Header.Size & EFI_PAGE_MASK) == 0);
|
||||
return SmmInternalFreePages (
|
||||
(EFI_PHYSICAL_ADDRESS)(UINTN)FreePoolHdr,
|
||||
EFI_SIZE_TO_PAGES (FreePoolHdr->Header.Size),
|
||||
FALSE
|
||||
EFI_SIZE_TO_PAGES (FreePoolHdr->Header.Size),
|
||||
FALSE
|
||||
);
|
||||
}
|
||||
return InternalFreePoolByIndex (FreePoolHdr, PoolTail);
|
||||
|
|
|
@ -1,136 +1,136 @@
|
|||
/** @file
|
||||
SMM Memory Attribute Protocol provides retrieval and update service
|
||||
for memory attributes in EFI SMM environment.
|
||||
|
||||
Copyright (c) 2017, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
http://opensource.org/licenses/bsd-license.php
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
**/
|
||||
|
||||
#ifndef __SMM_MEMORYATTRIBUTE_H__
|
||||
#define __SMM_MEMORYATTRIBUTE_H__
|
||||
|
||||
//{69B792EA-39CE-402D-A2A6-F721DE351DFE}
|
||||
#define EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL_GUID \
|
||||
{ \
|
||||
0x69b792ea, 0x39ce, 0x402d, { 0xa2, 0xa6, 0xf7, 0x21, 0xde, 0x35, 0x1d, 0xfe } \
|
||||
}
|
||||
|
||||
typedef struct _EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL;
|
||||
|
||||
/**
|
||||
This function set given attributes of the memory region specified by
|
||||
BaseAddress and Length.
|
||||
|
||||
@param This The EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL instance.
|
||||
@param BaseAddress The physical address that is the start address of
|
||||
a memory region.
|
||||
@param Length The size in bytes of the memory region.
|
||||
@param Attributes The bit mask of attributes to set for the memory
|
||||
region.
|
||||
|
||||
@retval EFI_SUCCESS The attributes were set for the memory region.
|
||||
@retval EFI_INVALID_PARAMETER Length is zero.
|
||||
Attributes specified an illegal combination of
|
||||
attributes that cannot be set together.
|
||||
@retval EFI_UNSUPPORTED The processor does not support one or more
|
||||
bytes of the memory resource range specified
|
||||
by BaseAddress and Length.
|
||||
The bit mask of attributes is not support for
|
||||
the memory resource range specified by
|
||||
BaseAddress and Length.
|
||||
|
||||
**/
|
||||
typedef
|
||||
EFI_STATUS
|
||||
(EFIAPI *EDKII_SMM_SET_MEMORY_ATTRIBUTES)(
|
||||
IN EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL *This,
|
||||
IN EFI_PHYSICAL_ADDRESS BaseAddress,
|
||||
IN UINT64 Length,
|
||||
IN UINT64 Attributes
|
||||
);
|
||||
|
||||
/**
|
||||
This function clears given attributes of the memory region specified by
|
||||
BaseAddress and Length.
|
||||
|
||||
@param This The EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL instance.
|
||||
@param BaseAddress The physical address that is the start address of
|
||||
a memory region.
|
||||
@param Length The size in bytes of the memory region.
|
||||
@param Attributes The bit mask of attributes to set for the memory
|
||||
region.
|
||||
|
||||
@retval EFI_SUCCESS The attributes were set for the memory region.
|
||||
@retval EFI_INVALID_PARAMETER Length is zero.
|
||||
Attributes specified an illegal combination of
|
||||
attributes that cannot be set together.
|
||||
@retval EFI_UNSUPPORTED The processor does not support one or more
|
||||
bytes of the memory resource range specified
|
||||
by BaseAddress and Length.
|
||||
The bit mask of attributes is not support for
|
||||
the memory resource range specified by
|
||||
BaseAddress and Length.
|
||||
|
||||
**/
|
||||
typedef
|
||||
EFI_STATUS
|
||||
(EFIAPI *EDKII_SMM_CLEAR_MEMORY_ATTRIBUTES)(
|
||||
IN EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL *This,
|
||||
IN EFI_PHYSICAL_ADDRESS BaseAddress,
|
||||
IN UINT64 Length,
|
||||
IN UINT64 Attributes
|
||||
);
|
||||
|
||||
/**
|
||||
This function retrieve the attributes of the memory region specified by
|
||||
BaseAddress and Length. If different attributes are got from different part
|
||||
of the memory region, EFI_NO_MAPPING will be returned.
|
||||
|
||||
@param This The EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL instance.
|
||||
@param BaseAddress The physical address that is the start address of
|
||||
a memory region.
|
||||
@param Length The size in bytes of the memory region.
|
||||
@param Attributes Pointer to attributes returned.
|
||||
|
||||
@retval EFI_SUCCESS The attributes got for the memory region.
|
||||
@retval EFI_INVALID_PARAMETER Length is zero.
|
||||
Attributes is NULL.
|
||||
@retval EFI_NO_MAPPING Attributes are not consistent cross the memory
|
||||
region.
|
||||
@retval EFI_UNSUPPORTED The processor does not support one or more
|
||||
bytes of the memory resource range specified
|
||||
by BaseAddress and Length.
|
||||
The bit mask of attributes is not support for
|
||||
the memory resource range specified by
|
||||
BaseAddress and Length.
|
||||
|
||||
**/
|
||||
typedef
|
||||
EFI_STATUS
|
||||
(EFIAPI *EDKII_SMM_GET_MEMORY_ATTRIBUTES)(
|
||||
IN EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL *This,
|
||||
IN EFI_PHYSICAL_ADDRESS BaseAddress,
|
||||
IN UINT64 Length,
|
||||
OUT UINT64 *Attributes
|
||||
);
|
||||
|
||||
///
|
||||
/// SMM Memory Attribute Protocol provides services to retrieve or update
|
||||
/// attribute of memory in the EFI SMM environment.
|
||||
///
|
||||
struct _EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL {
|
||||
EDKII_SMM_GET_MEMORY_ATTRIBUTES GetMemoryAttributes;
|
||||
EDKII_SMM_SET_MEMORY_ATTRIBUTES SetMemoryAttributes;
|
||||
EDKII_SMM_CLEAR_MEMORY_ATTRIBUTES ClearMemoryAttributes;
|
||||
};
|
||||
|
||||
extern EFI_GUID gEdkiiSmmMemoryAttributeProtocolGuid;
|
||||
|
||||
#endif
|
||||
/** @file
|
||||
SMM Memory Attribute Protocol provides retrieval and update service
|
||||
for memory attributes in EFI SMM environment.
|
||||
|
||||
Copyright (c) 2017, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
http://opensource.org/licenses/bsd-license.php
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
**/
|
||||
|
||||
#ifndef __SMM_MEMORYATTRIBUTE_H__
|
||||
#define __SMM_MEMORYATTRIBUTE_H__
|
||||
|
||||
//{69B792EA-39CE-402D-A2A6-F721DE351DFE}
|
||||
#define EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL_GUID \
|
||||
{ \
|
||||
0x69b792ea, 0x39ce, 0x402d, { 0xa2, 0xa6, 0xf7, 0x21, 0xde, 0x35, 0x1d, 0xfe } \
|
||||
}
|
||||
|
||||
typedef struct _EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL;
|
||||
|
||||
/**
|
||||
This function set given attributes of the memory region specified by
|
||||
BaseAddress and Length.
|
||||
|
||||
@param This The EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL instance.
|
||||
@param BaseAddress The physical address that is the start address of
|
||||
a memory region.
|
||||
@param Length The size in bytes of the memory region.
|
||||
@param Attributes The bit mask of attributes to set for the memory
|
||||
region.
|
||||
|
||||
@retval EFI_SUCCESS The attributes were set for the memory region.
|
||||
@retval EFI_INVALID_PARAMETER Length is zero.
|
||||
Attributes specified an illegal combination of
|
||||
attributes that cannot be set together.
|
||||
@retval EFI_UNSUPPORTED The processor does not support one or more
|
||||
bytes of the memory resource range specified
|
||||
by BaseAddress and Length.
|
||||
The bit mask of attributes is not support for
|
||||
the memory resource range specified by
|
||||
BaseAddress and Length.
|
||||
|
||||
**/
|
||||
typedef
|
||||
EFI_STATUS
|
||||
(EFIAPI *EDKII_SMM_SET_MEMORY_ATTRIBUTES)(
|
||||
IN EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL *This,
|
||||
IN EFI_PHYSICAL_ADDRESS BaseAddress,
|
||||
IN UINT64 Length,
|
||||
IN UINT64 Attributes
|
||||
);
|
||||
|
||||
/**
|
||||
This function clears given attributes of the memory region specified by
|
||||
BaseAddress and Length.
|
||||
|
||||
@param This The EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL instance.
|
||||
@param BaseAddress The physical address that is the start address of
|
||||
a memory region.
|
||||
@param Length The size in bytes of the memory region.
|
||||
@param Attributes The bit mask of attributes to set for the memory
|
||||
region.
|
||||
|
||||
@retval EFI_SUCCESS The attributes were set for the memory region.
|
||||
@retval EFI_INVALID_PARAMETER Length is zero.
|
||||
Attributes specified an illegal combination of
|
||||
attributes that cannot be set together.
|
||||
@retval EFI_UNSUPPORTED The processor does not support one or more
|
||||
bytes of the memory resource range specified
|
||||
by BaseAddress and Length.
|
||||
The bit mask of attributes is not support for
|
||||
the memory resource range specified by
|
||||
BaseAddress and Length.
|
||||
|
||||
**/
|
||||
typedef
|
||||
EFI_STATUS
|
||||
(EFIAPI *EDKII_SMM_CLEAR_MEMORY_ATTRIBUTES)(
|
||||
IN EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL *This,
|
||||
IN EFI_PHYSICAL_ADDRESS BaseAddress,
|
||||
IN UINT64 Length,
|
||||
IN UINT64 Attributes
|
||||
);
|
||||
|
||||
/**
|
||||
This function retrieve the attributes of the memory region specified by
|
||||
BaseAddress and Length. If different attributes are got from different part
|
||||
of the memory region, EFI_NO_MAPPING will be returned.
|
||||
|
||||
@param This The EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL instance.
|
||||
@param BaseAddress The physical address that is the start address of
|
||||
a memory region.
|
||||
@param Length The size in bytes of the memory region.
|
||||
@param Attributes Pointer to attributes returned.
|
||||
|
||||
@retval EFI_SUCCESS The attributes got for the memory region.
|
||||
@retval EFI_INVALID_PARAMETER Length is zero.
|
||||
Attributes is NULL.
|
||||
@retval EFI_NO_MAPPING Attributes are not consistent cross the memory
|
||||
region.
|
||||
@retval EFI_UNSUPPORTED The processor does not support one or more
|
||||
bytes of the memory resource range specified
|
||||
by BaseAddress and Length.
|
||||
The bit mask of attributes is not support for
|
||||
the memory resource range specified by
|
||||
BaseAddress and Length.
|
||||
|
||||
**/
|
||||
typedef
|
||||
EFI_STATUS
|
||||
(EFIAPI *EDKII_SMM_GET_MEMORY_ATTRIBUTES)(
|
||||
IN EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL *This,
|
||||
IN EFI_PHYSICAL_ADDRESS BaseAddress,
|
||||
IN UINT64 Length,
|
||||
OUT UINT64 *Attributes
|
||||
);
|
||||
|
||||
///
|
||||
/// SMM Memory Attribute Protocol provides services to retrieve or update
|
||||
/// attribute of memory in the EFI SMM environment.
|
||||
///
|
||||
struct _EDKII_SMM_MEMORY_ATTRIBUTE_PROTOCOL {
|
||||
EDKII_SMM_GET_MEMORY_ATTRIBUTES GetMemoryAttributes;
|
||||
EDKII_SMM_SET_MEMORY_ATTRIBUTES SetMemoryAttributes;
|
||||
EDKII_SMM_CLEAR_MEMORY_ATTRIBUTES ClearMemoryAttributes;
|
||||
};
|
||||
|
||||
extern EFI_GUID gEdkiiSmmMemoryAttributeProtocolGuid;
|
||||
|
||||
#endif
|
||||
|
|
|
@ -559,9 +559,9 @@
|
|||
## Include/Protocol/SmmEndofS3Resume.h
|
||||
gEdkiiSmmEndOfS3ResumeProtocolGuid = { 0x96f5296d, 0x05f7, 0x4f3c, {0x84, 0x67, 0xe4, 0x56, 0x89, 0x0e, 0x0c, 0xb5 } }
|
||||
|
||||
## Include/Protocol/SmmMemoryAttribute.h
|
||||
gEdkiiSmmMemoryAttributeProtocolGuid = { 0x69b792ea, 0x39ce, 0x402d, { 0xa2, 0xa6, 0xf7, 0x21, 0xde, 0x35, 0x1d, 0xfe } }
|
||||
|
||||
## Include/Protocol/SmmMemoryAttribute.h
|
||||
gEdkiiSmmMemoryAttributeProtocolGuid = { 0x69b792ea, 0x39ce, 0x402d, { 0xa2, 0xa6, 0xf7, 0x21, 0xde, 0x35, 0x1d, 0xfe } }
|
||||
|
||||
#
|
||||
# [Error.gEfiMdeModulePkgTokenSpaceGuid]
|
||||
# 0x80000001 | Invalid value provided.
|
||||
|
@ -892,63 +892,63 @@
|
|||
# @Prompt Init Value in Temp Stack
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdInitValueInTempStack|0x5AA55AA5|UINT32|0x30001051
|
||||
|
||||
## Indicates which type allocation need guard page.
|
||||
# Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>
|
||||
# EfiReservedMemoryType 0x0000000000000001<BR>
|
||||
# EfiLoaderCode 0x0000000000000002<BR>
|
||||
# EfiLoaderData 0x0000000000000004<BR>
|
||||
# EfiBootServicesCode 0x0000000000000008<BR>
|
||||
# EfiBootServicesData 0x0000000000000010<BR>
|
||||
# EfiRuntimeServicesCode 0x0000000000000020<BR>
|
||||
# EfiRuntimeServicesData 0x0000000000000040<BR>
|
||||
# EfiConventionalMemory 0x0000000000000080<BR>
|
||||
# EfiUnusableMemory 0x0000000000000100<BR>
|
||||
# EfiACPIReclaimMemory 0x0000000000000200<BR>
|
||||
# EfiACPIMemoryNVS 0x0000000000000400<BR>
|
||||
# EfiMemoryMappedIO 0x0000000000000800<BR>
|
||||
# EfiMemoryMappedIOPortSpace 0x0000000000001000<BR>
|
||||
# EfiPalCode 0x0000000000002000<BR>
|
||||
# EfiPersistentMemory 0x0000000000004000<BR>
|
||||
# OEM Reserved 0x4000000000000000<BR>
|
||||
# OS Reserved 0x8000000000000000<BR>
|
||||
# e.g. LoaderCode+LoaderData+BootServicesCode+BootServicesData are needed, 0x1E should be used.<BR>
|
||||
# @Prompt The memory type mask for Page Guard.
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPageType|0x0|UINT64|0x30001052
|
||||
|
||||
## Indicates which type allocation need guard page.
|
||||
# Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>
|
||||
# EfiReservedMemoryType 0x0000000000000001<BR>
|
||||
# EfiLoaderCode 0x0000000000000002<BR>
|
||||
# EfiLoaderData 0x0000000000000004<BR>
|
||||
# EfiBootServicesCode 0x0000000000000008<BR>
|
||||
# EfiBootServicesData 0x0000000000000010<BR>
|
||||
# EfiRuntimeServicesCode 0x0000000000000020<BR>
|
||||
# EfiRuntimeServicesData 0x0000000000000040<BR>
|
||||
# EfiConventionalMemory 0x0000000000000080<BR>
|
||||
# EfiUnusableMemory 0x0000000000000100<BR>
|
||||
# EfiACPIReclaimMemory 0x0000000000000200<BR>
|
||||
# EfiACPIMemoryNVS 0x0000000000000400<BR>
|
||||
# EfiMemoryMappedIO 0x0000000000000800<BR>
|
||||
# EfiMemoryMappedIOPortSpace 0x0000000000001000<BR>
|
||||
# EfiPalCode 0x0000000000002000<BR>
|
||||
# EfiPersistentMemory 0x0000000000004000<BR>
|
||||
# OEM Reserved 0x4000000000000000<BR>
|
||||
# OS Reserved 0x8000000000000000<BR>
|
||||
# e.g. LoaderCode+LoaderData+BootServicesCode+BootServicesData are needed, 0x1E should be used.<BR>
|
||||
# @Prompt The memory type mask for Pool Guard.
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPoolType|0x0|UINT64|0x30001053
|
||||
|
||||
## This mask is to control Heap Guard behavior.
|
||||
# BIT0 - Enable UEFI page guard.<BR>
|
||||
# BIT1 - Enable UEFI pool guard.<BR>
|
||||
# BIT2 - Enable SMM page guard.<BR>
|
||||
# BIT3 - Enable SMM pool guard.<BR>
|
||||
# BIT7 - The direction of Guard Page for Pool Guard.
|
||||
# 0 - The returned pool is adjacent to the bottom guard page.<BR>
|
||||
# 1 - The returned pool is adjacent to the top guard page.<BR>
|
||||
# @Prompt The Heap Guard feature mask
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPropertyMask|0x0|UINT8|0x30001054
|
||||
|
||||
## Indicates which type allocation need guard page.
|
||||
# Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>
|
||||
# EfiReservedMemoryType 0x0000000000000001<BR>
|
||||
# EfiLoaderCode 0x0000000000000002<BR>
|
||||
# EfiLoaderData 0x0000000000000004<BR>
|
||||
# EfiBootServicesCode 0x0000000000000008<BR>
|
||||
# EfiBootServicesData 0x0000000000000010<BR>
|
||||
# EfiRuntimeServicesCode 0x0000000000000020<BR>
|
||||
# EfiRuntimeServicesData 0x0000000000000040<BR>
|
||||
# EfiConventionalMemory 0x0000000000000080<BR>
|
||||
# EfiUnusableMemory 0x0000000000000100<BR>
|
||||
# EfiACPIReclaimMemory 0x0000000000000200<BR>
|
||||
# EfiACPIMemoryNVS 0x0000000000000400<BR>
|
||||
# EfiMemoryMappedIO 0x0000000000000800<BR>
|
||||
# EfiMemoryMappedIOPortSpace 0x0000000000001000<BR>
|
||||
# EfiPalCode 0x0000000000002000<BR>
|
||||
# EfiPersistentMemory 0x0000000000004000<BR>
|
||||
# OEM Reserved 0x4000000000000000<BR>
|
||||
# OS Reserved 0x8000000000000000<BR>
|
||||
# e.g. LoaderCode+LoaderData+BootServicesCode+BootServicesData are needed, 0x1E should be used.<BR>
|
||||
# @Prompt The memory type mask for Page Guard.
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPageType|0x0|UINT64|0x30001052
|
||||
|
||||
## Indicates which type allocation need guard page.
|
||||
# Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>
|
||||
# EfiReservedMemoryType 0x0000000000000001<BR>
|
||||
# EfiLoaderCode 0x0000000000000002<BR>
|
||||
# EfiLoaderData 0x0000000000000004<BR>
|
||||
# EfiBootServicesCode 0x0000000000000008<BR>
|
||||
# EfiBootServicesData 0x0000000000000010<BR>
|
||||
# EfiRuntimeServicesCode 0x0000000000000020<BR>
|
||||
# EfiRuntimeServicesData 0x0000000000000040<BR>
|
||||
# EfiConventionalMemory 0x0000000000000080<BR>
|
||||
# EfiUnusableMemory 0x0000000000000100<BR>
|
||||
# EfiACPIReclaimMemory 0x0000000000000200<BR>
|
||||
# EfiACPIMemoryNVS 0x0000000000000400<BR>
|
||||
# EfiMemoryMappedIO 0x0000000000000800<BR>
|
||||
# EfiMemoryMappedIOPortSpace 0x0000000000001000<BR>
|
||||
# EfiPalCode 0x0000000000002000<BR>
|
||||
# EfiPersistentMemory 0x0000000000004000<BR>
|
||||
# OEM Reserved 0x4000000000000000<BR>
|
||||
# OS Reserved 0x8000000000000000<BR>
|
||||
# e.g. LoaderCode+LoaderData+BootServicesCode+BootServicesData are needed, 0x1E should be used.<BR>
|
||||
# @Prompt The memory type mask for Pool Guard.
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPoolType|0x0|UINT64|0x30001053
|
||||
|
||||
## This mask is to control Heap Guard behavior.
|
||||
# BIT0 - Enable UEFI page guard.<BR>
|
||||
# BIT1 - Enable UEFI pool guard.<BR>
|
||||
# BIT2 - Enable SMM page guard.<BR>
|
||||
# BIT3 - Enable SMM pool guard.<BR>
|
||||
# BIT7 - The direction of Guard Page for Pool Guard.
|
||||
# 0 - The returned pool is adjacent to the bottom guard page.<BR>
|
||||
# 1 - The returned pool is adjacent to the top guard page.<BR>
|
||||
# @Prompt The Heap Guard feature mask
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPropertyMask|0x0|UINT8|0x30001054
|
||||
|
||||
[PcdsFixedAtBuild, PcdsPatchableInModule]
|
||||
## Dynamic type PCD can be registered callback function for Pcd setting action.
|
||||
# PcdMaxPeiPcdCallBackNumberPerPcdEntry indicates the maximum number of callback function
|
||||
|
|
|
@ -1146,61 +1146,61 @@
|
|||
"SEC fills the full temp stack with this values. When switch stack, PeiCore can check\n"
|
||||
"this value in the temp stack to know how many stack has been used.\n"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPageType_PROMPT #language en-US "The memory type mask for Page Guard"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPageType_HELP #language en-US "Indicates which type allocation need guard page.\n"
|
||||
" Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>\n"
|
||||
" EfiReservedMemoryType 0x0000000000000001\n"
|
||||
" EfiLoaderCode 0x0000000000000002\n"
|
||||
" EfiLoaderData 0x0000000000000004\n"
|
||||
" EfiBootServicesCode 0x0000000000000008\n"
|
||||
" EfiBootServicesData 0x0000000000000010\n"
|
||||
" EfiRuntimeServicesCode 0x0000000000000020\n"
|
||||
" EfiRuntimeServicesData 0x0000000000000040\n"
|
||||
" EfiConventionalMemory 0x0000000000000080\n"
|
||||
" EfiUnusableMemory 0x0000000000000100\n"
|
||||
" EfiACPIReclaimMemory 0x0000000000000200\n"
|
||||
" EfiACPIMemoryNVS 0x0000000000000400\n"
|
||||
" EfiMemoryMappedIO 0x0000000000000800\n"
|
||||
" EfiMemoryMappedIOPortSpace 0x0000000000001000\n"
|
||||
" EfiPalCode 0x0000000000002000\n"
|
||||
" EfiPersistentMemory 0x0000000000004000\n"
|
||||
" OEM Reserved 0x4000000000000000\n"
|
||||
" OS Reserved 0x8000000000000000\n"
|
||||
" e.g. LoaderCode+LoaderData+BootServicesCode+BootServicesData are needed, 0x1E should be used.<BR>"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPoolType_PROMPT #language en-US "The memory type mask for Pool Guard"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPoolType_HELP #language en-US "Indicates which type allocation need guard page.\n"
|
||||
" Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>\n"
|
||||
" EfiReservedMemoryType 0x0000000000000001\n"
|
||||
" EfiLoaderCode 0x0000000000000002\n"
|
||||
" EfiLoaderData 0x0000000000000004\n"
|
||||
" EfiBootServicesCode 0x0000000000000008\n"
|
||||
" EfiBootServicesData 0x0000000000000010\n"
|
||||
" EfiRuntimeServicesCode 0x0000000000000020\n"
|
||||
" EfiRuntimeServicesData 0x0000000000000040\n"
|
||||
" EfiConventionalMemory 0x0000000000000080\n"
|
||||
" EfiUnusableMemory 0x0000000000000100\n"
|
||||
" EfiACPIReclaimMemory 0x0000000000000200\n"
|
||||
" EfiACPIMemoryNVS 0x0000000000000400\n"
|
||||
" EfiMemoryMappedIO 0x0000000000000800\n"
|
||||
" EfiMemoryMappedIOPortSpace 0x0000000000001000\n"
|
||||
" EfiPalCode 0x0000000000002000\n"
|
||||
" EfiPersistentMemory 0x0000000000004000\n"
|
||||
" OEM Reserved 0x4000000000000000\n"
|
||||
" OS Reserved 0x8000000000000000\n"
|
||||
" e.g. LoaderCode+LoaderData+BootServicesCode+BootServicesData are needed, 0x1E should be used.<BR>"
|
||||
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPropertyMask_PROMPT #language en-US "The Heap Guard feature mask"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPropertyMask_HELP #language en-US "This mask is to control Heap Guard behavior.\n"
|
||||
" BIT0 - Enable UEFI page guard.<BR>\n"
|
||||
" BIT1 - Enable UEFI pool guard.<BR>\n"
|
||||
" BIT2 - Enable SMM page guard.<BR>\n"
|
||||
" BIT3 - Enable SMM pool guard.<BR>\n"
|
||||
" BIT7 - The direction of Guard Page for Pool Guard.\n"
|
||||
" 0 - The returned pool is adjacent to the bottom guard page.<BR>\n"
|
||||
" 1 - The returned pool is adjacent to the top guard page.<BR>"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPageType_PROMPT #language en-US "The memory type mask for Page Guard"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPageType_HELP #language en-US "Indicates which type allocation need guard page.\n"
|
||||
" Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>\n"
|
||||
" EfiReservedMemoryType 0x0000000000000001\n"
|
||||
" EfiLoaderCode 0x0000000000000002\n"
|
||||
" EfiLoaderData 0x0000000000000004\n"
|
||||
" EfiBootServicesCode 0x0000000000000008\n"
|
||||
" EfiBootServicesData 0x0000000000000010\n"
|
||||
" EfiRuntimeServicesCode 0x0000000000000020\n"
|
||||
" EfiRuntimeServicesData 0x0000000000000040\n"
|
||||
" EfiConventionalMemory 0x0000000000000080\n"
|
||||
" EfiUnusableMemory 0x0000000000000100\n"
|
||||
" EfiACPIReclaimMemory 0x0000000000000200\n"
|
||||
" EfiACPIMemoryNVS 0x0000000000000400\n"
|
||||
" EfiMemoryMappedIO 0x0000000000000800\n"
|
||||
" EfiMemoryMappedIOPortSpace 0x0000000000001000\n"
|
||||
" EfiPalCode 0x0000000000002000\n"
|
||||
" EfiPersistentMemory 0x0000000000004000\n"
|
||||
" OEM Reserved 0x4000000000000000\n"
|
||||
" OS Reserved 0x8000000000000000\n"
|
||||
" e.g. LoaderCode+LoaderData+BootServicesCode+BootServicesData are needed, 0x1E should be used.<BR>"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPoolType_PROMPT #language en-US "The memory type mask for Pool Guard"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPoolType_HELP #language en-US "Indicates which type allocation need guard page.\n"
|
||||
" Below is bit mask for this PCD: (Order is same as UEFI spec)<BR>\n"
|
||||
" EfiReservedMemoryType 0x0000000000000001\n"
|
||||
" EfiLoaderCode 0x0000000000000002\n"
|
||||
" EfiLoaderData 0x0000000000000004\n"
|
||||
" EfiBootServicesCode 0x0000000000000008\n"
|
||||
" EfiBootServicesData 0x0000000000000010\n"
|
||||
" EfiRuntimeServicesCode 0x0000000000000020\n"
|
||||
" EfiRuntimeServicesData 0x0000000000000040\n"
|
||||
" EfiConventionalMemory 0x0000000000000080\n"
|
||||
" EfiUnusableMemory 0x0000000000000100\n"
|
||||
" EfiACPIReclaimMemory 0x0000000000000200\n"
|
||||
" EfiACPIMemoryNVS 0x0000000000000400\n"
|
||||
" EfiMemoryMappedIO 0x0000000000000800\n"
|
||||
" EfiMemoryMappedIOPortSpace 0x0000000000001000\n"
|
||||
" EfiPalCode 0x0000000000002000\n"
|
||||
" EfiPersistentMemory 0x0000000000004000\n"
|
||||
" OEM Reserved 0x4000000000000000\n"
|
||||
" OS Reserved 0x8000000000000000\n"
|
||||
" e.g. LoaderCode+LoaderData+BootServicesCode+BootServicesData are needed, 0x1E should be used.<BR>"
|
||||
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPropertyMask_PROMPT #language en-US "The Heap Guard feature mask"
|
||||
|
||||
#string STR_gEfiMdeModulePkgTokenSpaceGuid_PcdHeapGuardPropertyMask_HELP #language en-US "This mask is to control Heap Guard behavior.\n"
|
||||
" BIT0 - Enable UEFI page guard.<BR>\n"
|
||||
" BIT1 - Enable UEFI pool guard.<BR>\n"
|
||||
" BIT2 - Enable SMM page guard.<BR>\n"
|
||||
" BIT3 - Enable SMM pool guard.<BR>\n"
|
||||
" BIT7 - The direction of Guard Page for Pool Guard.\n"
|
||||
" 0 - The returned pool is adjacent to the bottom guard page.<BR>\n"
|
||||
" 1 - The returned pool is adjacent to the top guard page.<BR>"
|
||||
|
||||
|
|
Loading…
Reference in New Issue