MdeModulePkg: Fix unix style of EOL
Cc: Wu Hao <hao.a.wu@intel.com> Cc: Star Zeng <star.zeng@intel.com> Cc: Eric Dong <eric.dong@intel.com> Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Jian J Wang <jian.j.wang@intel.com> Reviewed-by: Hao Wu <hao.a.wu@intel.com>
This commit is contained in:
File diff suppressed because it is too large
Load Diff
@@ -1,398 +1,398 @@
|
||||
/** @file
|
||||
Data structure and functions to allocate and free memory space.
|
||||
|
||||
Copyright (c) 2017, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
http://opensource.org/licenses/bsd-license.php
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
**/
|
||||
|
||||
#ifndef _HEAPGUARD_H_
|
||||
#define _HEAPGUARD_H_
|
||||
|
||||
#include "PiSmmCore.h"
|
||||
|
||||
//
|
||||
// Following macros are used to define and access the guarded memory bitmap
|
||||
// table.
|
||||
//
|
||||
// To simplify the access and reduce the memory used for this table, the
|
||||
// table is constructed in the similar way as page table structure but in
|
||||
// reverse direction, i.e. from bottom growing up to top.
|
||||
//
|
||||
// - 1-bit tracks 1 page (4KB)
|
||||
// - 1-UINT64 map entry tracks 256KB memory
|
||||
// - 1K-UINT64 map table tracks 256MB memory
|
||||
// - Five levels of tables can track any address of memory of 64-bit
|
||||
// system, like below.
|
||||
//
|
||||
// 512 * 512 * 512 * 512 * 1K * 64b * 4K
|
||||
// 111111111 111111111 111111111 111111111 1111111111 111111 111111111111
|
||||
// 63 54 45 36 27 17 11 0
|
||||
// 9b 9b 9b 9b 10b 6b 12b
|
||||
// L0 -> L1 -> L2 -> L3 -> L4 -> bits -> page
|
||||
// 1FF 1FF 1FF 1FF 3FF 3F FFF
|
||||
//
|
||||
// L4 table has 1K * sizeof(UINT64) = 8K (2-page), which can track 256MB
|
||||
// memory. Each table of L0-L3 will be allocated when its memory address
|
||||
// range is to be tracked. Only 1-page will be allocated each time. This
|
||||
// can save memories used to establish this map table.
|
||||
//
|
||||
// For a normal configuration of system with 4G memory, two levels of tables
|
||||
// can track the whole memory, because two levels (L3+L4) of map tables have
|
||||
// already coverred 37-bit of memory address. And for a normal UEFI BIOS,
|
||||
// less than 128M memory would be consumed during boot. That means we just
|
||||
// need
|
||||
//
|
||||
// 1-page (L3) + 2-page (L4)
|
||||
//
|
||||
// memory (3 pages) to track the memory allocation works. In this case,
|
||||
// there's no need to setup L0-L2 tables.
|
||||
//
|
||||
|
||||
//
|
||||
// Each entry occupies 8B/64b. 1-page can hold 512 entries, which spans 9
|
||||
// bits in address. (512 = 1 << 9)
|
||||
//
|
||||
#define BYTE_LENGTH_SHIFT 3 // (8 = 1 << 3)
|
||||
|
||||
#define GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT \
|
||||
(EFI_PAGE_SHIFT - BYTE_LENGTH_SHIFT)
|
||||
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH 5
|
||||
|
||||
// Use UINT64_index + bit_index_of_UINT64 to locate the bit in may
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT 6 // (64 = 1 << 6)
|
||||
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BITS \
|
||||
(1 << GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT)
|
||||
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BYTES \
|
||||
(GUARDED_HEAP_MAP_ENTRY_BITS / 8)
|
||||
|
||||
// L4 table address width: 64 - 9 * 4 - 6 - 12 = 10b
|
||||
#define GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
(GUARDED_HEAP_MAP_ENTRY_BITS \
|
||||
- GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 4 \
|
||||
- GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
- EFI_PAGE_SHIFT)
|
||||
|
||||
// L4 table address mask: (1 << 10 - 1) = 0x3FF
|
||||
#define GUARDED_HEAP_MAP_ENTRY_MASK \
|
||||
((1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) - 1)
|
||||
|
||||
// Size of each L4 table: (1 << 10) * 8 = 8KB = 2-page
|
||||
#define GUARDED_HEAP_MAP_SIZE \
|
||||
((1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) * GUARDED_HEAP_MAP_ENTRY_BYTES)
|
||||
|
||||
// Memory size tracked by one L4 table: 8KB * 8 * 4KB = 256MB
|
||||
#define GUARDED_HEAP_MAP_UNIT_SIZE \
|
||||
(GUARDED_HEAP_MAP_SIZE * 8 * EFI_PAGE_SIZE)
|
||||
|
||||
// L4 table entry number: 8KB / 8 = 1024
|
||||
#define GUARDED_HEAP_MAP_ENTRIES_PER_UNIT \
|
||||
(GUARDED_HEAP_MAP_SIZE / GUARDED_HEAP_MAP_ENTRY_BYTES)
|
||||
|
||||
// L4 table entry indexing
|
||||
#define GUARDED_HEAP_MAP_ENTRY_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT) \
|
||||
& GUARDED_HEAP_MAP_ENTRY_MASK)
|
||||
|
||||
// L4 table entry bit indexing
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BIT_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT) \
|
||||
& ((1 << GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT) - 1))
|
||||
|
||||
//
|
||||
// Total bits (pages) tracked by one L4 table (65536-bit)
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_BITS \
|
||||
(1 << (GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT))
|
||||
|
||||
//
|
||||
// Bit indexing inside the whole L4 table (0 - 65535)
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_BIT_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT) \
|
||||
& ((1 << (GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT)) - 1))
|
||||
|
||||
//
|
||||
// Memory address bit width tracked by L4 table: 10 + 6 + 12 = 28
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_SHIFT \
|
||||
(GUARDED_HEAP_MAP_ENTRY_SHIFT + GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
+ EFI_PAGE_SHIFT)
|
||||
|
||||
//
|
||||
// Macro used to initialize the local array variable for map table traversing
|
||||
// {55, 46, 37, 28, 18}
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH_SHIFTS \
|
||||
{ \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 3, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 2, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT, \
|
||||
EFI_PAGE_SHIFT + GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
}
|
||||
|
||||
//
|
||||
// Masks used to extract address range of each level of table
|
||||
// {0x1FF, 0x1FF, 0x1FF, 0x1FF, 0x3FF}
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH_MASKS \
|
||||
{ \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) - 1 \
|
||||
}
|
||||
|
||||
//
|
||||
// Memory type to guard (matching the related PCD definition)
|
||||
//
|
||||
#define GUARD_HEAP_TYPE_POOL BIT2
|
||||
#define GUARD_HEAP_TYPE_PAGE BIT3
|
||||
|
||||
//
|
||||
// Debug message level
|
||||
//
|
||||
#define HEAP_GUARD_DEBUG_LEVEL (DEBUG_POOL|DEBUG_PAGE)
|
||||
|
||||
typedef struct {
|
||||
UINT32 TailMark;
|
||||
UINT32 HeadMark;
|
||||
EFI_PHYSICAL_ADDRESS Address;
|
||||
LIST_ENTRY Link;
|
||||
} HEAP_GUARD_NODE;
|
||||
|
||||
/**
|
||||
Set head Guard and tail Guard for the given memory range.
|
||||
|
||||
@param[in] Memory Base address of memory to set guard for.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
SetGuardForMemory (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Unset head Guard and tail Guard for the given memory range.
|
||||
|
||||
@param[in] Memory Base address of memory to unset guard for.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
UnsetGuardForMemory (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the base and number of pages to really allocate according to Guard.
|
||||
|
||||
@param[in,out] Memory Base address of free memory.
|
||||
@param[in,out] NumberOfPages Size of memory to allocate.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
AdjustMemoryA (
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN OUT UINTN *NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the start address and number of pages to free according to Guard.
|
||||
|
||||
The purpose of this function is to keep the shared Guard page with adjacent
|
||||
memory block if it's still in guard, or free it if no more sharing. Another
|
||||
is to reserve pages as Guard pages in partial page free situation.
|
||||
|
||||
@param[in,out] Memory Base address of memory to free.
|
||||
@param[in,out] NumberOfPages Size of memory to free.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
AdjustMemoryF (
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN OUT UINTN *NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the pool at the given address should be guarded or not.
|
||||
|
||||
@param[in] MemoryType Pool type to check.
|
||||
|
||||
|
||||
@return TRUE The given type of pool should be guarded.
|
||||
@return FALSE The given type of pool should not be guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsPoolTypeToGuard (
|
||||
IN EFI_MEMORY_TYPE MemoryType
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address should be guarded or not.
|
||||
|
||||
@param[in] MemoryType Page type to check.
|
||||
@param[in] AllocateType Allocation type to check.
|
||||
|
||||
@return TRUE The given type of page should be guarded.
|
||||
@return FALSE The given type of page should not be guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsPageTypeToGuard (
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN EFI_ALLOCATE_TYPE AllocateType
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address is guarded or not.
|
||||
|
||||
@param[in] Address The address to check for.
|
||||
|
||||
@return TRUE The page at Address is guarded.
|
||||
@return FALSE The page at Address is not guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
IsMemoryGuarded (
|
||||
IN EFI_PHYSICAL_ADDRESS Address
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address is a Guard page or not.
|
||||
|
||||
@param[in] Address The address to check for.
|
||||
|
||||
@return TRUE The page at Address is a Guard page.
|
||||
@return FALSE The page at Address is not a Guard page.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
IsGuardPage (
|
||||
IN EFI_PHYSICAL_ADDRESS Address
|
||||
);
|
||||
|
||||
/**
|
||||
Dump the guarded memory bit map.
|
||||
**/
|
||||
VOID
|
||||
EFIAPI
|
||||
DumpGuardedMemoryBitmap (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the pool head position to make sure the Guard page is adjavent to
|
||||
pool tail or pool head.
|
||||
|
||||
@param[in] Memory Base address of memory allocated.
|
||||
@param[in] NoPages Number of pages actually allocated.
|
||||
@param[in] Size Size of memory requested.
|
||||
(plus pool head/tail overhead)
|
||||
|
||||
@return Address of pool head.
|
||||
**/
|
||||
VOID *
|
||||
AdjustPoolHeadA (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NoPages,
|
||||
IN UINTN Size
|
||||
);
|
||||
|
||||
/**
|
||||
Get the page base address according to pool head address.
|
||||
|
||||
@param[in] Memory Head address of pool to free.
|
||||
|
||||
@return Address of pool head.
|
||||
**/
|
||||
VOID *
|
||||
AdjustPoolHeadF (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory
|
||||
);
|
||||
|
||||
/**
|
||||
Helper function of memory allocation with Guard pages.
|
||||
|
||||
@param FreePageList The free page node.
|
||||
@param NumberOfPages Number of pages to be allocated.
|
||||
@param MaxAddress Request to allocate memory below this address.
|
||||
@param MemoryType Type of memory requested.
|
||||
|
||||
@return Memory address of allocated pages.
|
||||
**/
|
||||
UINTN
|
||||
InternalAllocMaxAddressWithGuard (
|
||||
IN OUT LIST_ENTRY *FreePageList,
|
||||
IN UINTN NumberOfPages,
|
||||
IN UINTN MaxAddress,
|
||||
IN EFI_MEMORY_TYPE MemoryType
|
||||
);
|
||||
|
||||
/**
|
||||
Helper function of memory free with Guard pages.
|
||||
|
||||
@param[in] Memory Base address of memory being freed.
|
||||
@param[in] NumberOfPages The number of pages to free.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range.
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or
|
||||
NumberOfPages is zero.
|
||||
@return EFI_SUCCESS Pages successfully freed.
|
||||
**/
|
||||
EFI_STATUS
|
||||
SmmInternalFreePagesExWithGuard (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the heap guard is enabled for page and/or pool allocation.
|
||||
|
||||
@return TRUE/FALSE.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsHeapGuardEnabled (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Debug function used to verify if the Guard page is well set or not.
|
||||
|
||||
@param[in] BaseAddress Address of memory to check.
|
||||
@param[in] NumberOfPages Size of memory in pages.
|
||||
|
||||
@return TRUE The head Guard and tail Guard are both well set.
|
||||
@return FALSE The head Guard and/or tail Guard are not well set.
|
||||
**/
|
||||
BOOLEAN
|
||||
VerifyMemoryGuard (
|
||||
IN EFI_PHYSICAL_ADDRESS BaseAddress,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
extern BOOLEAN mOnGuarding;
|
||||
|
||||
#endif
|
||||
/** @file
|
||||
Data structure and functions to allocate and free memory space.
|
||||
|
||||
Copyright (c) 2017, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
http://opensource.org/licenses/bsd-license.php
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
**/
|
||||
|
||||
#ifndef _HEAPGUARD_H_
|
||||
#define _HEAPGUARD_H_
|
||||
|
||||
#include "PiSmmCore.h"
|
||||
|
||||
//
|
||||
// Following macros are used to define and access the guarded memory bitmap
|
||||
// table.
|
||||
//
|
||||
// To simplify the access and reduce the memory used for this table, the
|
||||
// table is constructed in the similar way as page table structure but in
|
||||
// reverse direction, i.e. from bottom growing up to top.
|
||||
//
|
||||
// - 1-bit tracks 1 page (4KB)
|
||||
// - 1-UINT64 map entry tracks 256KB memory
|
||||
// - 1K-UINT64 map table tracks 256MB memory
|
||||
// - Five levels of tables can track any address of memory of 64-bit
|
||||
// system, like below.
|
||||
//
|
||||
// 512 * 512 * 512 * 512 * 1K * 64b * 4K
|
||||
// 111111111 111111111 111111111 111111111 1111111111 111111 111111111111
|
||||
// 63 54 45 36 27 17 11 0
|
||||
// 9b 9b 9b 9b 10b 6b 12b
|
||||
// L0 -> L1 -> L2 -> L3 -> L4 -> bits -> page
|
||||
// 1FF 1FF 1FF 1FF 3FF 3F FFF
|
||||
//
|
||||
// L4 table has 1K * sizeof(UINT64) = 8K (2-page), which can track 256MB
|
||||
// memory. Each table of L0-L3 will be allocated when its memory address
|
||||
// range is to be tracked. Only 1-page will be allocated each time. This
|
||||
// can save memories used to establish this map table.
|
||||
//
|
||||
// For a normal configuration of system with 4G memory, two levels of tables
|
||||
// can track the whole memory, because two levels (L3+L4) of map tables have
|
||||
// already coverred 37-bit of memory address. And for a normal UEFI BIOS,
|
||||
// less than 128M memory would be consumed during boot. That means we just
|
||||
// need
|
||||
//
|
||||
// 1-page (L3) + 2-page (L4)
|
||||
//
|
||||
// memory (3 pages) to track the memory allocation works. In this case,
|
||||
// there's no need to setup L0-L2 tables.
|
||||
//
|
||||
|
||||
//
|
||||
// Each entry occupies 8B/64b. 1-page can hold 512 entries, which spans 9
|
||||
// bits in address. (512 = 1 << 9)
|
||||
//
|
||||
#define BYTE_LENGTH_SHIFT 3 // (8 = 1 << 3)
|
||||
|
||||
#define GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT \
|
||||
(EFI_PAGE_SHIFT - BYTE_LENGTH_SHIFT)
|
||||
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH 5
|
||||
|
||||
// Use UINT64_index + bit_index_of_UINT64 to locate the bit in may
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT 6 // (64 = 1 << 6)
|
||||
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BITS \
|
||||
(1 << GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT)
|
||||
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BYTES \
|
||||
(GUARDED_HEAP_MAP_ENTRY_BITS / 8)
|
||||
|
||||
// L4 table address width: 64 - 9 * 4 - 6 - 12 = 10b
|
||||
#define GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
(GUARDED_HEAP_MAP_ENTRY_BITS \
|
||||
- GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 4 \
|
||||
- GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
- EFI_PAGE_SHIFT)
|
||||
|
||||
// L4 table address mask: (1 << 10 - 1) = 0x3FF
|
||||
#define GUARDED_HEAP_MAP_ENTRY_MASK \
|
||||
((1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) - 1)
|
||||
|
||||
// Size of each L4 table: (1 << 10) * 8 = 8KB = 2-page
|
||||
#define GUARDED_HEAP_MAP_SIZE \
|
||||
((1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) * GUARDED_HEAP_MAP_ENTRY_BYTES)
|
||||
|
||||
// Memory size tracked by one L4 table: 8KB * 8 * 4KB = 256MB
|
||||
#define GUARDED_HEAP_MAP_UNIT_SIZE \
|
||||
(GUARDED_HEAP_MAP_SIZE * 8 * EFI_PAGE_SIZE)
|
||||
|
||||
// L4 table entry number: 8KB / 8 = 1024
|
||||
#define GUARDED_HEAP_MAP_ENTRIES_PER_UNIT \
|
||||
(GUARDED_HEAP_MAP_SIZE / GUARDED_HEAP_MAP_ENTRY_BYTES)
|
||||
|
||||
// L4 table entry indexing
|
||||
#define GUARDED_HEAP_MAP_ENTRY_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT) \
|
||||
& GUARDED_HEAP_MAP_ENTRY_MASK)
|
||||
|
||||
// L4 table entry bit indexing
|
||||
#define GUARDED_HEAP_MAP_ENTRY_BIT_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT) \
|
||||
& ((1 << GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT) - 1))
|
||||
|
||||
//
|
||||
// Total bits (pages) tracked by one L4 table (65536-bit)
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_BITS \
|
||||
(1 << (GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT))
|
||||
|
||||
//
|
||||
// Bit indexing inside the whole L4 table (0 - 65535)
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_BIT_INDEX(Address) \
|
||||
(RShiftU64 (Address, EFI_PAGE_SHIFT) \
|
||||
& ((1 << (GUARDED_HEAP_MAP_ENTRY_SHIFT \
|
||||
+ GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT)) - 1))
|
||||
|
||||
//
|
||||
// Memory address bit width tracked by L4 table: 10 + 6 + 12 = 28
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_SHIFT \
|
||||
(GUARDED_HEAP_MAP_ENTRY_SHIFT + GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
+ EFI_PAGE_SHIFT)
|
||||
|
||||
//
|
||||
// Macro used to initialize the local array variable for map table traversing
|
||||
// {55, 46, 37, 28, 18}
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH_SHIFTS \
|
||||
{ \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 3, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT * 2, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT + GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT, \
|
||||
GUARDED_HEAP_MAP_TABLE_SHIFT, \
|
||||
EFI_PAGE_SHIFT + GUARDED_HEAP_MAP_ENTRY_BIT_SHIFT \
|
||||
}
|
||||
|
||||
//
|
||||
// Masks used to extract address range of each level of table
|
||||
// {0x1FF, 0x1FF, 0x1FF, 0x1FF, 0x3FF}
|
||||
//
|
||||
#define GUARDED_HEAP_MAP_TABLE_DEPTH_MASKS \
|
||||
{ \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_TABLE_ENTRY_SHIFT) - 1, \
|
||||
(1 << GUARDED_HEAP_MAP_ENTRY_SHIFT) - 1 \
|
||||
}
|
||||
|
||||
//
|
||||
// Memory type to guard (matching the related PCD definition)
|
||||
//
|
||||
#define GUARD_HEAP_TYPE_POOL BIT2
|
||||
#define GUARD_HEAP_TYPE_PAGE BIT3
|
||||
|
||||
//
|
||||
// Debug message level
|
||||
//
|
||||
#define HEAP_GUARD_DEBUG_LEVEL (DEBUG_POOL|DEBUG_PAGE)
|
||||
|
||||
typedef struct {
|
||||
UINT32 TailMark;
|
||||
UINT32 HeadMark;
|
||||
EFI_PHYSICAL_ADDRESS Address;
|
||||
LIST_ENTRY Link;
|
||||
} HEAP_GUARD_NODE;
|
||||
|
||||
/**
|
||||
Set head Guard and tail Guard for the given memory range.
|
||||
|
||||
@param[in] Memory Base address of memory to set guard for.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
SetGuardForMemory (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Unset head Guard and tail Guard for the given memory range.
|
||||
|
||||
@param[in] Memory Base address of memory to unset guard for.
|
||||
@param[in] NumberOfPages Memory size in pages.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
UnsetGuardForMemory (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the base and number of pages to really allocate according to Guard.
|
||||
|
||||
@param[in,out] Memory Base address of free memory.
|
||||
@param[in,out] NumberOfPages Size of memory to allocate.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
AdjustMemoryA (
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN OUT UINTN *NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the start address and number of pages to free according to Guard.
|
||||
|
||||
The purpose of this function is to keep the shared Guard page with adjacent
|
||||
memory block if it's still in guard, or free it if no more sharing. Another
|
||||
is to reserve pages as Guard pages in partial page free situation.
|
||||
|
||||
@param[in,out] Memory Base address of memory to free.
|
||||
@param[in,out] NumberOfPages Size of memory to free.
|
||||
|
||||
@return VOID.
|
||||
**/
|
||||
VOID
|
||||
AdjustMemoryF (
|
||||
IN OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN OUT UINTN *NumberOfPages
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the pool at the given address should be guarded or not.
|
||||
|
||||
@param[in] MemoryType Pool type to check.
|
||||
|
||||
|
||||
@return TRUE The given type of pool should be guarded.
|
||||
@return FALSE The given type of pool should not be guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsPoolTypeToGuard (
|
||||
IN EFI_MEMORY_TYPE MemoryType
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address should be guarded or not.
|
||||
|
||||
@param[in] MemoryType Page type to check.
|
||||
@param[in] AllocateType Allocation type to check.
|
||||
|
||||
@return TRUE The given type of page should be guarded.
|
||||
@return FALSE The given type of page should not be guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsPageTypeToGuard (
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN EFI_ALLOCATE_TYPE AllocateType
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address is guarded or not.
|
||||
|
||||
@param[in] Address The address to check for.
|
||||
|
||||
@return TRUE The page at Address is guarded.
|
||||
@return FALSE The page at Address is not guarded.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
IsMemoryGuarded (
|
||||
IN EFI_PHYSICAL_ADDRESS Address
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the page at the given address is a Guard page or not.
|
||||
|
||||
@param[in] Address The address to check for.
|
||||
|
||||
@return TRUE The page at Address is a Guard page.
|
||||
@return FALSE The page at Address is not a Guard page.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
IsGuardPage (
|
||||
IN EFI_PHYSICAL_ADDRESS Address
|
||||
);
|
||||
|
||||
/**
|
||||
Dump the guarded memory bit map.
|
||||
**/
|
||||
VOID
|
||||
EFIAPI
|
||||
DumpGuardedMemoryBitmap (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Adjust the pool head position to make sure the Guard page is adjavent to
|
||||
pool tail or pool head.
|
||||
|
||||
@param[in] Memory Base address of memory allocated.
|
||||
@param[in] NoPages Number of pages actually allocated.
|
||||
@param[in] Size Size of memory requested.
|
||||
(plus pool head/tail overhead)
|
||||
|
||||
@return Address of pool head.
|
||||
**/
|
||||
VOID *
|
||||
AdjustPoolHeadA (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NoPages,
|
||||
IN UINTN Size
|
||||
);
|
||||
|
||||
/**
|
||||
Get the page base address according to pool head address.
|
||||
|
||||
@param[in] Memory Head address of pool to free.
|
||||
|
||||
@return Address of pool head.
|
||||
**/
|
||||
VOID *
|
||||
AdjustPoolHeadF (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory
|
||||
);
|
||||
|
||||
/**
|
||||
Helper function of memory allocation with Guard pages.
|
||||
|
||||
@param FreePageList The free page node.
|
||||
@param NumberOfPages Number of pages to be allocated.
|
||||
@param MaxAddress Request to allocate memory below this address.
|
||||
@param MemoryType Type of memory requested.
|
||||
|
||||
@return Memory address of allocated pages.
|
||||
**/
|
||||
UINTN
|
||||
InternalAllocMaxAddressWithGuard (
|
||||
IN OUT LIST_ENTRY *FreePageList,
|
||||
IN UINTN NumberOfPages,
|
||||
IN UINTN MaxAddress,
|
||||
IN EFI_MEMORY_TYPE MemoryType
|
||||
);
|
||||
|
||||
/**
|
||||
Helper function of memory free with Guard pages.
|
||||
|
||||
@param[in] Memory Base address of memory being freed.
|
||||
@param[in] NumberOfPages The number of pages to free.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range.
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or
|
||||
NumberOfPages is zero.
|
||||
@return EFI_SUCCESS Pages successfully freed.
|
||||
**/
|
||||
EFI_STATUS
|
||||
SmmInternalFreePagesExWithGuard (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Check to see if the heap guard is enabled for page and/or pool allocation.
|
||||
|
||||
@return TRUE/FALSE.
|
||||
**/
|
||||
BOOLEAN
|
||||
IsHeapGuardEnabled (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Debug function used to verify if the Guard page is well set or not.
|
||||
|
||||
@param[in] BaseAddress Address of memory to check.
|
||||
@param[in] NumberOfPages Size of memory in pages.
|
||||
|
||||
@return TRUE The head Guard and tail Guard are both well set.
|
||||
@return FALSE The head Guard and/or tail Guard are not well set.
|
||||
**/
|
||||
BOOLEAN
|
||||
VerifyMemoryGuard (
|
||||
IN EFI_PHYSICAL_ADDRESS BaseAddress,
|
||||
IN UINTN NumberOfPages
|
||||
);
|
||||
|
||||
extern BOOLEAN mOnGuarding;
|
||||
|
||||
#endif
|
||||
|
@@ -64,8 +64,8 @@ LIST_ENTRY mFreeMemoryMapEntryList = INITIALIZE_LIST_HEAD_VARIABLE (mFreeMemor
|
||||
@param[out] Memory A pointer to receive the base allocated memory
|
||||
address.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in spec.
|
||||
@retval EFI_NOT_FOUND Could not allocate pages match the requirement.
|
||||
@@ -79,8 +79,8 @@ SmmInternalAllocatePagesEx (
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN AddRegion,
|
||||
IN BOOLEAN NeedGuard
|
||||
IN BOOLEAN AddRegion,
|
||||
IN BOOLEAN NeedGuard
|
||||
);
|
||||
|
||||
/**
|
||||
@@ -115,8 +115,8 @@ AllocateMemoryMapEntry (
|
||||
EfiRuntimeServicesData,
|
||||
EFI_SIZE_TO_PAGES (RUNTIME_PAGE_ALLOCATION_GRANULARITY),
|
||||
&Mem,
|
||||
TRUE,
|
||||
FALSE
|
||||
TRUE,
|
||||
FALSE
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
if(!EFI_ERROR (Status)) {
|
||||
@@ -692,8 +692,8 @@ InternalAllocAddress (
|
||||
@param[out] Memory A pointer to receive the base allocated memory
|
||||
address.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in spec.
|
||||
@retval EFI_NOT_FOUND Could not allocate pages match the requirement.
|
||||
@@ -707,8 +707,8 @@ SmmInternalAllocatePagesEx (
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN AddRegion,
|
||||
IN BOOLEAN NeedGuard
|
||||
IN BOOLEAN AddRegion,
|
||||
IN BOOLEAN NeedGuard
|
||||
)
|
||||
{
|
||||
UINTN RequestedAddress;
|
||||
@@ -730,21 +730,21 @@ SmmInternalAllocatePagesEx (
|
||||
case AllocateAnyPages:
|
||||
RequestedAddress = (UINTN)(-1);
|
||||
case AllocateMaxAddress:
|
||||
if (NeedGuard) {
|
||||
*Memory = InternalAllocMaxAddressWithGuard (
|
||||
&mSmmMemoryMap,
|
||||
NumberOfPages,
|
||||
RequestedAddress,
|
||||
MemoryType
|
||||
);
|
||||
if (*Memory == (UINTN)-1) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
} else {
|
||||
ASSERT (VerifyMemoryGuard (*Memory, NumberOfPages) == TRUE);
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
}
|
||||
|
||||
if (NeedGuard) {
|
||||
*Memory = InternalAllocMaxAddressWithGuard (
|
||||
&mSmmMemoryMap,
|
||||
NumberOfPages,
|
||||
RequestedAddress,
|
||||
MemoryType
|
||||
);
|
||||
if (*Memory == (UINTN)-1) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
} else {
|
||||
ASSERT (VerifyMemoryGuard (*Memory, NumberOfPages) == TRUE);
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
}
|
||||
|
||||
*Memory = InternalAllocMaxAddress (
|
||||
&mSmmMemoryMap,
|
||||
NumberOfPages,
|
||||
@@ -788,8 +788,8 @@ SmmInternalAllocatePagesEx (
|
||||
@param[in] NumberOfPages The number of pages to allocate.
|
||||
@param[out] Memory A pointer to receive the base allocated memory
|
||||
address.
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
@param[in] NeedGuard Flag to indicate Guard page is needed
|
||||
or not
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in spec.
|
||||
@retval EFI_NOT_FOUND Could not allocate pages match the requirement.
|
||||
@@ -803,12 +803,12 @@ SmmInternalAllocatePages (
|
||||
IN EFI_ALLOCATE_TYPE Type,
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN NeedGuard
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN NeedGuard
|
||||
)
|
||||
{
|
||||
return SmmInternalAllocatePagesEx (Type, MemoryType, NumberOfPages, Memory,
|
||||
FALSE, NeedGuard);
|
||||
return SmmInternalAllocatePagesEx (Type, MemoryType, NumberOfPages, Memory,
|
||||
FALSE, NeedGuard);
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -837,11 +837,11 @@ SmmAllocatePages (
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
BOOLEAN NeedGuard;
|
||||
BOOLEAN NeedGuard;
|
||||
|
||||
NeedGuard = IsPageTypeToGuard (MemoryType, Type);
|
||||
Status = SmmInternalAllocatePages (Type, MemoryType, NumberOfPages, Memory,
|
||||
NeedGuard);
|
||||
NeedGuard = IsPageTypeToGuard (MemoryType, Type);
|
||||
Status = SmmInternalAllocatePages (Type, MemoryType, NumberOfPages, Memory,
|
||||
NeedGuard);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
SmmCoreUpdateProfile (
|
||||
(EFI_PHYSICAL_ADDRESS) (UINTN) RETURN_ADDRESS (0),
|
||||
@@ -960,7 +960,7 @@ SmmInternalFreePagesEx (
|
||||
|
||||
@param[in] Memory Base address of memory being freed.
|
||||
@param[in] NumberOfPages The number of pages to free.
|
||||
@param[in] IsGuarded Is the memory to free guarded or not.
|
||||
@param[in] IsGuarded Is the memory to free guarded or not.
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range.
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or NumberOfPages is zero.
|
||||
@@ -971,13 +971,13 @@ EFI_STATUS
|
||||
EFIAPI
|
||||
SmmInternalFreePages (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN IsGuarded
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN IsGuarded
|
||||
)
|
||||
{
|
||||
if (IsGuarded) {
|
||||
return SmmInternalFreePagesExWithGuard (Memory, NumberOfPages, FALSE);
|
||||
}
|
||||
if (IsGuarded) {
|
||||
return SmmInternalFreePagesExWithGuard (Memory, NumberOfPages, FALSE);
|
||||
}
|
||||
return SmmInternalFreePagesEx (Memory, NumberOfPages, FALSE);
|
||||
}
|
||||
|
||||
@@ -1000,10 +1000,10 @@ SmmFreePages (
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
BOOLEAN IsGuarded;
|
||||
BOOLEAN IsGuarded;
|
||||
|
||||
IsGuarded = IsHeapGuardEnabled () && IsMemoryGuarded (Memory);
|
||||
Status = SmmInternalFreePages (Memory, NumberOfPages, IsGuarded);
|
||||
IsGuarded = IsHeapGuardEnabled () && IsMemoryGuarded (Memory);
|
||||
Status = SmmInternalFreePages (Memory, NumberOfPages, IsGuarded);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
SmmCoreUpdateProfile (
|
||||
(EFI_PHYSICAL_ADDRESS) (UINTN) RETURN_ADDRESS (0),
|
||||
|
@@ -506,11 +506,11 @@ SmmEntryPoint (
|
||||
//
|
||||
PlatformHookBeforeSmmDispatch ();
|
||||
|
||||
//
|
||||
// Call memory management hook function
|
||||
//
|
||||
SmmEntryPointMemoryManagementHook ();
|
||||
|
||||
//
|
||||
// Call memory management hook function
|
||||
//
|
||||
SmmEntryPointMemoryManagementHook ();
|
||||
|
||||
//
|
||||
// If a legacy boot has occured, then make sure gSmmCorePrivate is not accessed
|
||||
//
|
||||
@@ -704,7 +704,7 @@ SmmMain (
|
||||
//
|
||||
gSmmCorePrivate->Smst = &gSmmCoreSmst;
|
||||
gSmmCorePrivate->SmmEntryPoint = SmmEntryPoint;
|
||||
|
||||
|
||||
//
|
||||
// No need to initialize memory service.
|
||||
// It is done in constructor of PiSmmCoreMemoryAllocationLib(),
|
||||
|
@@ -33,7 +33,7 @@
|
||||
#include <Protocol/SmmLegacyBoot.h>
|
||||
#include <Protocol/SmmReadyToBoot.h>
|
||||
#include <Protocol/SmmEndOfS3Resume.h>
|
||||
#include <Protocol/SmmMemoryAttribute.h>
|
||||
#include <Protocol/SmmMemoryAttribute.h>
|
||||
|
||||
#include <Guid/Apriori.h>
|
||||
#include <Guid/EventGroup.h>
|
||||
@@ -61,7 +61,7 @@
|
||||
#include <Library/SmmMemLib.h>
|
||||
|
||||
#include "PiSmmCorePrivateData.h"
|
||||
#include "HeapGuard.h"
|
||||
#include "HeapGuard.h"
|
||||
|
||||
//
|
||||
// Used to build a table of SMI Handlers that the SMM Core registers
|
||||
@@ -320,7 +320,7 @@ SmmAllocatePages (
|
||||
@param NumberOfPages The number of pages to allocate
|
||||
@param Memory A pointer to receive the base allocated memory
|
||||
address
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
@param NeedGuard Flag to indicate Guard page is needed or not
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in spec.
|
||||
@retval EFI_NOT_FOUND Could not allocate pages match the requirement.
|
||||
@@ -334,8 +334,8 @@ SmmInternalAllocatePages (
|
||||
IN EFI_ALLOCATE_TYPE Type,
|
||||
IN EFI_MEMORY_TYPE MemoryType,
|
||||
IN UINTN NumberOfPages,
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN NeedGuard
|
||||
OUT EFI_PHYSICAL_ADDRESS *Memory,
|
||||
IN BOOLEAN NeedGuard
|
||||
);
|
||||
|
||||
/**
|
||||
@@ -361,8 +361,8 @@ SmmFreePages (
|
||||
|
||||
@param Memory Base address of memory being freed
|
||||
@param NumberOfPages The number of pages to free
|
||||
@param IsGuarded Flag to indicate if the memory is guarded
|
||||
or not
|
||||
@param IsGuarded Flag to indicate if the memory is guarded
|
||||
or not
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or NumberOfPages is zero.
|
||||
@@ -373,8 +373,8 @@ EFI_STATUS
|
||||
EFIAPI
|
||||
SmmInternalFreePages (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN IsGuarded
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN IsGuarded
|
||||
);
|
||||
|
||||
/**
|
||||
@@ -1262,74 +1262,74 @@ typedef enum {
|
||||
|
||||
extern LIST_ENTRY mSmmPoolLists[SmmPoolTypeMax][MAX_POOL_INDEX];
|
||||
|
||||
/**
|
||||
Internal Function. Allocate n pages from given free page node.
|
||||
|
||||
@param Pages The free page node.
|
||||
@param NumberOfPages Number of pages to be allocated.
|
||||
@param MaxAddress Request to allocate memory below this address.
|
||||
|
||||
@return Memory address of allocated pages.
|
||||
|
||||
**/
|
||||
UINTN
|
||||
InternalAllocPagesOnOneNode (
|
||||
IN OUT FREE_PAGE_LIST *Pages,
|
||||
IN UINTN NumberOfPages,
|
||||
IN UINTN MaxAddress
|
||||
);
|
||||
|
||||
/**
|
||||
Update SMM memory map entry.
|
||||
|
||||
@param[in] Type The type of allocation to perform.
|
||||
@param[in] Memory The base of memory address.
|
||||
@param[in] NumberOfPages The number of pages to allocate.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
**/
|
||||
VOID
|
||||
ConvertSmmMemoryMapEntry (
|
||||
IN EFI_MEMORY_TYPE Type,
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Internal function. Moves any memory descriptors that are on the
|
||||
temporary descriptor stack to heap.
|
||||
|
||||
**/
|
||||
VOID
|
||||
CoreFreeMemoryMapStack (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Frees previous allocated pages.
|
||||
|
||||
@param[in] Memory Base address of memory being freed.
|
||||
@param[in] NumberOfPages The number of pages to free.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range.
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or NumberOfPages is zero.
|
||||
@return EFI_SUCCESS Pages successfully freed.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
SmmInternalFreePagesEx (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Hook function used to set all Guard pages after entering SMM mode.
|
||||
**/
|
||||
VOID
|
||||
SmmEntryPointMemoryManagementHook (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Internal Function. Allocate n pages from given free page node.
|
||||
|
||||
@param Pages The free page node.
|
||||
@param NumberOfPages Number of pages to be allocated.
|
||||
@param MaxAddress Request to allocate memory below this address.
|
||||
|
||||
@return Memory address of allocated pages.
|
||||
|
||||
**/
|
||||
UINTN
|
||||
InternalAllocPagesOnOneNode (
|
||||
IN OUT FREE_PAGE_LIST *Pages,
|
||||
IN UINTN NumberOfPages,
|
||||
IN UINTN MaxAddress
|
||||
);
|
||||
|
||||
/**
|
||||
Update SMM memory map entry.
|
||||
|
||||
@param[in] Type The type of allocation to perform.
|
||||
@param[in] Memory The base of memory address.
|
||||
@param[in] NumberOfPages The number of pages to allocate.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
**/
|
||||
VOID
|
||||
ConvertSmmMemoryMapEntry (
|
||||
IN EFI_MEMORY_TYPE Type,
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Internal function. Moves any memory descriptors that are on the
|
||||
temporary descriptor stack to heap.
|
||||
|
||||
**/
|
||||
VOID
|
||||
CoreFreeMemoryMapStack (
|
||||
VOID
|
||||
);
|
||||
|
||||
/**
|
||||
Frees previous allocated pages.
|
||||
|
||||
@param[in] Memory Base address of memory being freed.
|
||||
@param[in] NumberOfPages The number of pages to free.
|
||||
@param[in] AddRegion If this memory is new added region.
|
||||
|
||||
@retval EFI_NOT_FOUND Could not find the entry that covers the range.
|
||||
@retval EFI_INVALID_PARAMETER Address not aligned, Address is zero or NumberOfPages is zero.
|
||||
@return EFI_SUCCESS Pages successfully freed.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
SmmInternalFreePagesEx (
|
||||
IN EFI_PHYSICAL_ADDRESS Memory,
|
||||
IN UINTN NumberOfPages,
|
||||
IN BOOLEAN AddRegion
|
||||
);
|
||||
|
||||
/**
|
||||
Hook function used to set all Guard pages after entering SMM mode.
|
||||
**/
|
||||
VOID
|
||||
SmmEntryPointMemoryManagementHook (
|
||||
VOID
|
||||
);
|
||||
|
||||
#endif
|
||||
|
@@ -40,7 +40,7 @@
|
||||
SmramProfileRecord.c
|
||||
MemoryAttributesTable.c
|
||||
SmiHandlerProfile.c
|
||||
HeapGuard.c
|
||||
HeapGuard.c
|
||||
|
||||
[Packages]
|
||||
MdePkg/MdePkg.dec
|
||||
@@ -90,8 +90,8 @@
|
||||
gEfiSmmGpiDispatch2ProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEfiSmmIoTrapDispatch2ProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEfiSmmUsbDispatch2ProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEfiSmmCpuProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEdkiiSmmMemoryAttributeProtocolGuid ## CONSUMES
|
||||
gEfiSmmCpuProtocolGuid ## SOMETIMES_CONSUMES
|
||||
gEdkiiSmmMemoryAttributeProtocolGuid ## CONSUMES
|
||||
|
||||
[Pcd]
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdLoadFixAddressSmmCodePageNumber ## SOMETIMES_CONSUMES
|
||||
@@ -100,9 +100,9 @@
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdMemoryProfilePropertyMask ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdMemoryProfileDriverPath ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdSmiHandlerProfilePropertyMask ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPageType ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPoolType ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPropertyMask ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPageType ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPoolType ## CONSUMES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPropertyMask ## CONSUMES
|
||||
|
||||
[Guids]
|
||||
gAprioriGuid ## SOMETIMES_CONSUMES ## File
|
||||
|
@@ -144,9 +144,9 @@ InternalAllocPoolByIndex (
|
||||
Status = EFI_SUCCESS;
|
||||
Hdr = NULL;
|
||||
if (PoolIndex == MAX_POOL_INDEX) {
|
||||
Status = SmmInternalAllocatePages (AllocateAnyPages, PoolType,
|
||||
EFI_SIZE_TO_PAGES (MAX_POOL_SIZE << 1),
|
||||
&Address, FALSE);
|
||||
Status = SmmInternalAllocatePages (AllocateAnyPages, PoolType,
|
||||
EFI_SIZE_TO_PAGES (MAX_POOL_SIZE << 1),
|
||||
&Address, FALSE);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
@@ -245,9 +245,9 @@ SmmInternalAllocatePool (
|
||||
EFI_STATUS Status;
|
||||
EFI_PHYSICAL_ADDRESS Address;
|
||||
UINTN PoolIndex;
|
||||
BOOLEAN HasPoolTail;
|
||||
BOOLEAN NeedGuard;
|
||||
UINTN NoPages;
|
||||
BOOLEAN HasPoolTail;
|
||||
BOOLEAN NeedGuard;
|
||||
UINTN NoPages;
|
||||
|
||||
Address = 0;
|
||||
|
||||
@@ -256,47 +256,47 @@ SmmInternalAllocatePool (
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
NeedGuard = IsPoolTypeToGuard (PoolType);
|
||||
HasPoolTail = !(NeedGuard &&
|
||||
((PcdGet8 (PcdHeapGuardPropertyMask) & BIT7) == 0));
|
||||
|
||||
NeedGuard = IsPoolTypeToGuard (PoolType);
|
||||
HasPoolTail = !(NeedGuard &&
|
||||
((PcdGet8 (PcdHeapGuardPropertyMask) & BIT7) == 0));
|
||||
|
||||
//
|
||||
// Adjust the size by the pool header & tail overhead
|
||||
//
|
||||
Size += POOL_OVERHEAD;
|
||||
if (Size > MAX_POOL_SIZE || NeedGuard) {
|
||||
if (!HasPoolTail) {
|
||||
Size -= sizeof (POOL_TAIL);
|
||||
}
|
||||
|
||||
NoPages = EFI_SIZE_TO_PAGES (Size);
|
||||
Status = SmmInternalAllocatePages (AllocateAnyPages, PoolType, NoPages,
|
||||
&Address, NeedGuard);
|
||||
if (Size > MAX_POOL_SIZE || NeedGuard) {
|
||||
if (!HasPoolTail) {
|
||||
Size -= sizeof (POOL_TAIL);
|
||||
}
|
||||
|
||||
NoPages = EFI_SIZE_TO_PAGES (Size);
|
||||
Status = SmmInternalAllocatePages (AllocateAnyPages, PoolType, NoPages,
|
||||
&Address, NeedGuard);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
if (NeedGuard) {
|
||||
ASSERT (VerifyMemoryGuard (Address, NoPages) == TRUE);
|
||||
Address = (EFI_PHYSICAL_ADDRESS)(UINTN)AdjustPoolHeadA (
|
||||
Address,
|
||||
NoPages,
|
||||
Size
|
||||
);
|
||||
}
|
||||
|
||||
if (NeedGuard) {
|
||||
ASSERT (VerifyMemoryGuard (Address, NoPages) == TRUE);
|
||||
Address = (EFI_PHYSICAL_ADDRESS)(UINTN)AdjustPoolHeadA (
|
||||
Address,
|
||||
NoPages,
|
||||
Size
|
||||
);
|
||||
}
|
||||
|
||||
PoolHdr = (POOL_HEADER*)(UINTN)Address;
|
||||
PoolHdr->Signature = POOL_HEAD_SIGNATURE;
|
||||
PoolHdr->Size = EFI_PAGES_TO_SIZE (NoPages);
|
||||
PoolHdr->Available = FALSE;
|
||||
PoolHdr->Type = PoolType;
|
||||
|
||||
if (HasPoolTail) {
|
||||
PoolTail = HEAD_TO_TAIL (PoolHdr);
|
||||
PoolTail->Signature = POOL_TAIL_SIGNATURE;
|
||||
PoolTail->Size = PoolHdr->Size;
|
||||
}
|
||||
|
||||
|
||||
if (HasPoolTail) {
|
||||
PoolTail = HEAD_TO_TAIL (PoolHdr);
|
||||
PoolTail->Signature = POOL_TAIL_SIGNATURE;
|
||||
PoolTail->Size = PoolHdr->Size;
|
||||
}
|
||||
|
||||
*Buffer = PoolHdr + 1;
|
||||
return Status;
|
||||
}
|
||||
@@ -368,18 +368,18 @@ SmmInternalFreePool (
|
||||
{
|
||||
FREE_POOL_HEADER *FreePoolHdr;
|
||||
POOL_TAIL *PoolTail;
|
||||
BOOLEAN HasPoolTail;
|
||||
BOOLEAN MemoryGuarded;
|
||||
BOOLEAN HasPoolTail;
|
||||
BOOLEAN MemoryGuarded;
|
||||
|
||||
if (Buffer == NULL) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
MemoryGuarded = IsHeapGuardEnabled () &&
|
||||
IsMemoryGuarded ((EFI_PHYSICAL_ADDRESS)(UINTN)Buffer);
|
||||
HasPoolTail = !(MemoryGuarded &&
|
||||
((PcdGet8 (PcdHeapGuardPropertyMask) & BIT7) == 0));
|
||||
|
||||
MemoryGuarded = IsHeapGuardEnabled () &&
|
||||
IsMemoryGuarded ((EFI_PHYSICAL_ADDRESS)(UINTN)Buffer);
|
||||
HasPoolTail = !(MemoryGuarded &&
|
||||
((PcdGet8 (PcdHeapGuardPropertyMask) & BIT7) == 0));
|
||||
|
||||
FreePoolHdr = (FREE_POOL_HEADER*)((POOL_HEADER*)Buffer - 1);
|
||||
ASSERT (FreePoolHdr->Header.Signature == POOL_HEAD_SIGNATURE);
|
||||
ASSERT (!FreePoolHdr->Header.Available);
|
||||
@@ -387,28 +387,28 @@ SmmInternalFreePool (
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
if (HasPoolTail) {
|
||||
PoolTail = HEAD_TO_TAIL (&FreePoolHdr->Header);
|
||||
ASSERT (PoolTail->Signature == POOL_TAIL_SIGNATURE);
|
||||
ASSERT (FreePoolHdr->Header.Size == PoolTail->Size);
|
||||
if (PoolTail->Signature != POOL_TAIL_SIGNATURE) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
if (FreePoolHdr->Header.Size != PoolTail->Size) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
} else {
|
||||
PoolTail = NULL;
|
||||
if (HasPoolTail) {
|
||||
PoolTail = HEAD_TO_TAIL (&FreePoolHdr->Header);
|
||||
ASSERT (PoolTail->Signature == POOL_TAIL_SIGNATURE);
|
||||
ASSERT (FreePoolHdr->Header.Size == PoolTail->Size);
|
||||
if (PoolTail->Signature != POOL_TAIL_SIGNATURE) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
if (FreePoolHdr->Header.Size != PoolTail->Size) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
} else {
|
||||
PoolTail = NULL;
|
||||
}
|
||||
|
||||
if (MemoryGuarded) {
|
||||
Buffer = AdjustPoolHeadF ((EFI_PHYSICAL_ADDRESS)(UINTN)FreePoolHdr);
|
||||
return SmmInternalFreePages (
|
||||
(EFI_PHYSICAL_ADDRESS)(UINTN)Buffer,
|
||||
EFI_SIZE_TO_PAGES (FreePoolHdr->Header.Size),
|
||||
TRUE
|
||||
);
|
||||
if (MemoryGuarded) {
|
||||
Buffer = AdjustPoolHeadF ((EFI_PHYSICAL_ADDRESS)(UINTN)FreePoolHdr);
|
||||
return SmmInternalFreePages (
|
||||
(EFI_PHYSICAL_ADDRESS)(UINTN)Buffer,
|
||||
EFI_SIZE_TO_PAGES (FreePoolHdr->Header.Size),
|
||||
TRUE
|
||||
);
|
||||
}
|
||||
|
||||
if (FreePoolHdr->Header.Size > MAX_POOL_SIZE) {
|
||||
@@ -416,8 +416,8 @@ SmmInternalFreePool (
|
||||
ASSERT ((FreePoolHdr->Header.Size & EFI_PAGE_MASK) == 0);
|
||||
return SmmInternalFreePages (
|
||||
(EFI_PHYSICAL_ADDRESS)(UINTN)FreePoolHdr,
|
||||
EFI_SIZE_TO_PAGES (FreePoolHdr->Header.Size),
|
||||
FALSE
|
||||
EFI_SIZE_TO_PAGES (FreePoolHdr->Header.Size),
|
||||
FALSE
|
||||
);
|
||||
}
|
||||
return InternalFreePoolByIndex (FreePoolHdr, PoolTail);
|
||||
|
Reference in New Issue
Block a user