mirror of
https://github.com/CloverHackyColor/CloverBootloader.git
synced 2024-12-26 16:47:40 +01:00
1383 lines
44 KiB
C
1383 lines
44 KiB
C
/** @file
|
|
Page table management support.
|
|
|
|
Copyright (c) 2017 - 2019, Intel Corporation. All rights reserved.<BR>
|
|
Copyright (c) 2017, AMD Incorporated. All rights reserved.<BR>
|
|
|
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
|
|
|
**/
|
|
|
|
#include <Base.h>
|
|
#include <Uefi.h>
|
|
#include <Library/PeCoffGetEntryPointLib.h>
|
|
#include <Library/SerialPortLib.h>
|
|
#include <Library/SynchronizationLib.h>
|
|
#include <Library/PrintLib.h>
|
|
#include <Protocol/SmmBase2.h>
|
|
#include <Register/Intel/Cpuid.h>
|
|
#include <Register/Intel/Msr.h>
|
|
|
|
#include "CpuDxe.h"
|
|
#include "CpuPageTable.h"
|
|
|
|
///
|
|
/// Page Table Entry
|
|
///
|
|
#define IA32_PG_P BIT0
|
|
#define IA32_PG_RW BIT1
|
|
#define IA32_PG_U BIT2
|
|
#define IA32_PG_WT BIT3
|
|
#define IA32_PG_CD BIT4
|
|
#define IA32_PG_A BIT5
|
|
#define IA32_PG_D BIT6
|
|
#define IA32_PG_PS BIT7
|
|
#define IA32_PG_PAT_2M BIT12
|
|
#define IA32_PG_PAT_4K IA32_PG_PS
|
|
#define IA32_PG_PMNT BIT62
|
|
#define IA32_PG_NX BIT63
|
|
|
|
#define PAGE_ATTRIBUTE_BITS (IA32_PG_D | IA32_PG_A | IA32_PG_U | IA32_PG_RW | IA32_PG_P)
|
|
//
|
|
// Bits 1, 2, 5, 6 are reserved in the IA32 PAE PDPTE
|
|
// X64 PAE PDPTE does not have such restriction
|
|
//
|
|
#define IA32_PAE_PDPTE_ATTRIBUTE_BITS (IA32_PG_P)
|
|
|
|
#define PAGE_PROGATE_BITS (IA32_PG_NX | PAGE_ATTRIBUTE_BITS)
|
|
|
|
#define PAGING_4K_MASK 0xFFF
|
|
#define PAGING_2M_MASK 0x1FFFFF
|
|
#define PAGING_1G_MASK 0x3FFFFFFF
|
|
|
|
#define PAGING_PAE_INDEX_MASK 0x1FF
|
|
|
|
#define PAGING_4K_ADDRESS_MASK_64 0x000FFFFFFFFFF000ull
|
|
#define PAGING_2M_ADDRESS_MASK_64 0x000FFFFFFFE00000ull
|
|
#define PAGING_1G_ADDRESS_MASK_64 0x000FFFFFC0000000ull
|
|
|
|
#define MAX_PF_ENTRY_COUNT 10
|
|
#define MAX_DEBUG_MESSAGE_LENGTH 0x100
|
|
#define IA32_PF_EC_ID BIT4
|
|
|
|
typedef enum {
|
|
PageNone,
|
|
Page4K,
|
|
Page2M,
|
|
Page1G,
|
|
} PAGE_ATTRIBUTE;
|
|
|
|
typedef struct {
|
|
PAGE_ATTRIBUTE Attribute;
|
|
UINT64 Length;
|
|
UINT64 AddressMask;
|
|
} PAGE_ATTRIBUTE_TABLE;
|
|
|
|
typedef enum {
|
|
PageActionAssign,
|
|
PageActionSet,
|
|
PageActionClear,
|
|
} PAGE_ACTION;
|
|
|
|
PAGE_ATTRIBUTE_TABLE mPageAttributeTable[] = {
|
|
{Page4K, SIZE_4KB, PAGING_4K_ADDRESS_MASK_64},
|
|
{Page2M, SIZE_2MB, PAGING_2M_ADDRESS_MASK_64},
|
|
{Page1G, SIZE_1GB, PAGING_1G_ADDRESS_MASK_64},
|
|
};
|
|
|
|
PAGE_TABLE_POOL *mPageTablePool = NULL;
|
|
BOOLEAN mPageTablePoolLock = FALSE;
|
|
PAGE_TABLE_LIB_PAGING_CONTEXT mPagingContext;
|
|
EFI_SMM_BASE2_PROTOCOL *mSmmBase2 = NULL;
|
|
|
|
//
|
|
// Record the page fault exception count for one instruction execution.
|
|
//
|
|
UINTN *mPFEntryCount;
|
|
UINT64 *(*mLastPFEntryPointer)[MAX_PF_ENTRY_COUNT];
|
|
|
|
/**
|
|
Check if current execution environment is in SMM mode or not, via
|
|
EFI_SMM_BASE2_PROTOCOL.
|
|
|
|
This is necessary because of the fact that MdePkg\Library\SmmMemoryAllocationLib
|
|
supports to free memory outside SMRAM. The library will call gBS->FreePool() or
|
|
gBS->FreePages() and then SetMemorySpaceAttributes interface in turn to change
|
|
memory paging attributes during free operation, if some memory related features
|
|
are enabled (like Heap Guard).
|
|
|
|
This means that SetMemorySpaceAttributes() has chance to run in SMM mode. This
|
|
will cause incorrect result because SMM mode always loads its own page tables,
|
|
which are usually different from DXE. This function can be used to detect such
|
|
situation and help to avoid further misoperations.
|
|
|
|
@retval TRUE In SMM mode.
|
|
@retval FALSE Not in SMM mode.
|
|
**/
|
|
BOOLEAN
|
|
IsInSmm (
|
|
VOID
|
|
)
|
|
{
|
|
BOOLEAN InSmm;
|
|
|
|
InSmm = FALSE;
|
|
if (mSmmBase2 == NULL) {
|
|
gBS->LocateProtocol (&gEfiSmmBase2ProtocolGuid, NULL, (VOID **)&mSmmBase2);
|
|
}
|
|
|
|
if (mSmmBase2 != NULL) {
|
|
mSmmBase2->InSmm (mSmmBase2, &InSmm);
|
|
}
|
|
|
|
//
|
|
// mSmmBase2->InSmm() can only detect if the caller is running in SMRAM
|
|
// or from SMM driver. It cannot tell if the caller is running in SMM mode.
|
|
// Check page table base address to guarantee that because SMM mode willl
|
|
// load its own page table.
|
|
//
|
|
return (InSmm &&
|
|
mPagingContext.ContextData.X64.PageTableBase != (UINT64)AsmReadCr3());
|
|
}
|
|
|
|
/**
|
|
Return current paging context.
|
|
|
|
@param[in,out] PagingContext The paging context.
|
|
**/
|
|
VOID
|
|
GetCurrentPagingContext (
|
|
IN OUT PAGE_TABLE_LIB_PAGING_CONTEXT *PagingContext
|
|
)
|
|
{
|
|
UINT32 RegEax;
|
|
CPUID_EXTENDED_CPU_SIG_EDX RegEdx;
|
|
MSR_IA32_EFER_REGISTER MsrEfer;
|
|
IA32_CR4 Cr4;
|
|
IA32_CR0 Cr0;
|
|
UINT32 *Attributes;
|
|
UINTN *PageTableBase;
|
|
|
|
//
|
|
// Don't retrieve current paging context from processor if in SMM mode.
|
|
//
|
|
if (!IsInSmm ()) {
|
|
ZeroMem (&mPagingContext, sizeof(mPagingContext));
|
|
if (sizeof(UINTN) == sizeof(UINT64)) {
|
|
mPagingContext.MachineType = IMAGE_FILE_MACHINE_X64;
|
|
} else {
|
|
mPagingContext.MachineType = IMAGE_FILE_MACHINE_I386;
|
|
}
|
|
|
|
GetPagingDetails (&mPagingContext.ContextData, &PageTableBase, &Attributes);
|
|
|
|
Cr0.UintN = AsmReadCr0 ();
|
|
Cr4.UintN = AsmReadCr4 ();
|
|
|
|
if (Cr0.Bits.PG != 0) {
|
|
*PageTableBase = (AsmReadCr3 () & PAGING_4K_ADDRESS_MASK_64);
|
|
} else {
|
|
*PageTableBase = 0;
|
|
}
|
|
if (Cr0.Bits.WP != 0) {
|
|
*Attributes |= PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_WP_ENABLE;
|
|
}
|
|
if (Cr4.Bits.PSE != 0) {
|
|
*Attributes |= PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_PSE;
|
|
}
|
|
if (Cr4.Bits.PAE != 0) {
|
|
*Attributes |= PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_PAE;
|
|
}
|
|
if (Cr4.Bits.LA57 != 0) {
|
|
*Attributes |= PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_5_LEVEL;
|
|
}
|
|
|
|
AsmCpuid (CPUID_EXTENDED_FUNCTION, &RegEax, NULL, NULL, NULL);
|
|
if (RegEax >= CPUID_EXTENDED_CPU_SIG) {
|
|
AsmCpuid (CPUID_EXTENDED_CPU_SIG, NULL, NULL, NULL, &RegEdx.Uint32);
|
|
|
|
if (RegEdx.Bits.NX != 0) {
|
|
// XD supported
|
|
MsrEfer.Uint64 = AsmReadMsr64(MSR_CORE_IA32_EFER);
|
|
if (MsrEfer.Bits.NXE != 0) {
|
|
// XD activated
|
|
*Attributes |= PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_XD_ACTIVATED;
|
|
}
|
|
}
|
|
|
|
if (RegEdx.Bits.Page1GB != 0) {
|
|
*Attributes |= PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_PAGE_1G_SUPPORT;
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// This can avoid getting SMM paging context if in SMM mode. We cannot assume
|
|
// SMM mode shares the same paging context as DXE.
|
|
//
|
|
CopyMem (PagingContext, &mPagingContext, sizeof (mPagingContext));
|
|
}
|
|
|
|
/**
|
|
Return length according to page attributes.
|
|
|
|
@param[in] PageAttributes The page attribute of the page entry.
|
|
|
|
@return The length of page entry.
|
|
**/
|
|
UINTN
|
|
PageAttributeToLength (
|
|
IN PAGE_ATTRIBUTE PageAttribute
|
|
)
|
|
{
|
|
UINTN Index;
|
|
for (Index = 0; Index < sizeof(mPageAttributeTable)/sizeof(mPageAttributeTable[0]); Index++) {
|
|
if (PageAttribute == mPageAttributeTable[Index].Attribute) {
|
|
return (UINTN)mPageAttributeTable[Index].Length;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
Return address mask according to page attributes.
|
|
|
|
@param[in] PageAttributes The page attribute of the page entry.
|
|
|
|
@return The address mask of page entry.
|
|
**/
|
|
UINTN
|
|
PageAttributeToMask (
|
|
IN PAGE_ATTRIBUTE PageAttribute
|
|
)
|
|
{
|
|
UINTN Index;
|
|
for (Index = 0; Index < sizeof(mPageAttributeTable)/sizeof(mPageAttributeTable[0]); Index++) {
|
|
if (PageAttribute == mPageAttributeTable[Index].Attribute) {
|
|
return (UINTN)mPageAttributeTable[Index].AddressMask;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
Return page table entry to match the address.
|
|
|
|
@param[in] PagingContext The paging context.
|
|
@param[in] Address The address to be checked.
|
|
@param[out] PageAttributes The page attribute of the page entry.
|
|
|
|
@return The page entry.
|
|
**/
|
|
VOID *
|
|
GetPageTableEntry (
|
|
IN PAGE_TABLE_LIB_PAGING_CONTEXT *PagingContext,
|
|
IN PHYSICAL_ADDRESS Address,
|
|
OUT PAGE_ATTRIBUTE *PageAttribute
|
|
)
|
|
{
|
|
UINTN Index1;
|
|
UINTN Index2;
|
|
UINTN Index3;
|
|
UINTN Index4;
|
|
UINTN Index5;
|
|
UINT64 *L1PageTable;
|
|
UINT64 *L2PageTable;
|
|
UINT64 *L3PageTable;
|
|
UINT64 *L4PageTable;
|
|
UINT64 *L5PageTable;
|
|
UINT64 AddressEncMask;
|
|
|
|
ASSERT (PagingContext != NULL);
|
|
|
|
Index5 = ((UINTN)RShiftU64 (Address, 48)) & PAGING_PAE_INDEX_MASK;
|
|
Index4 = ((UINTN)RShiftU64 (Address, 39)) & PAGING_PAE_INDEX_MASK;
|
|
Index3 = ((UINTN)Address >> 30) & PAGING_PAE_INDEX_MASK;
|
|
Index2 = ((UINTN)Address >> 21) & PAGING_PAE_INDEX_MASK;
|
|
Index1 = ((UINTN)Address >> 12) & PAGING_PAE_INDEX_MASK;
|
|
|
|
// Make sure AddressEncMask is contained to smallest supported address field.
|
|
//
|
|
AddressEncMask = PcdGet64 (PcdPteMemoryEncryptionAddressOrMask) & PAGING_1G_ADDRESS_MASK_64;
|
|
|
|
if (PagingContext->MachineType == IMAGE_FILE_MACHINE_X64) {
|
|
if ((PagingContext->ContextData.X64.Attributes & PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_5_LEVEL) != 0) {
|
|
L5PageTable = (UINT64 *)(UINTN)PagingContext->ContextData.X64.PageTableBase;
|
|
if (L5PageTable[Index5] == 0) {
|
|
*PageAttribute = PageNone;
|
|
return NULL;
|
|
}
|
|
|
|
L4PageTable = (UINT64 *)(UINTN)(L5PageTable[Index5] & ~AddressEncMask & PAGING_4K_ADDRESS_MASK_64);
|
|
} else {
|
|
L4PageTable = (UINT64 *)(UINTN)PagingContext->ContextData.X64.PageTableBase;
|
|
}
|
|
if (L4PageTable[Index4] == 0) {
|
|
*PageAttribute = PageNone;
|
|
return NULL;
|
|
}
|
|
|
|
L3PageTable = (UINT64 *)(UINTN)(L4PageTable[Index4] & ~AddressEncMask & PAGING_4K_ADDRESS_MASK_64);
|
|
} else {
|
|
ASSERT((PagingContext->ContextData.Ia32.Attributes & PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_PAE) != 0);
|
|
L3PageTable = (UINT64 *)(UINTN)PagingContext->ContextData.Ia32.PageTableBase;
|
|
}
|
|
if (L3PageTable[Index3] == 0) {
|
|
*PageAttribute = PageNone;
|
|
return NULL;
|
|
}
|
|
if ((L3PageTable[Index3] & IA32_PG_PS) != 0) {
|
|
// 1G
|
|
*PageAttribute = Page1G;
|
|
return &L3PageTable[Index3];
|
|
}
|
|
|
|
L2PageTable = (UINT64 *)(UINTN)(L3PageTable[Index3] & ~AddressEncMask & PAGING_4K_ADDRESS_MASK_64);
|
|
if (L2PageTable[Index2] == 0) {
|
|
*PageAttribute = PageNone;
|
|
return NULL;
|
|
}
|
|
if ((L2PageTable[Index2] & IA32_PG_PS) != 0) {
|
|
// 2M
|
|
*PageAttribute = Page2M;
|
|
return &L2PageTable[Index2];
|
|
}
|
|
|
|
// 4k
|
|
L1PageTable = (UINT64 *)(UINTN)(L2PageTable[Index2] & ~AddressEncMask & PAGING_4K_ADDRESS_MASK_64);
|
|
if ((L1PageTable[Index1] == 0) && (Address != 0)) {
|
|
*PageAttribute = PageNone;
|
|
return NULL;
|
|
}
|
|
*PageAttribute = Page4K;
|
|
return &L1PageTable[Index1];
|
|
}
|
|
|
|
/**
|
|
Return memory attributes of page entry.
|
|
|
|
@param[in] PageEntry The page entry.
|
|
|
|
@return Memory attributes of page entry.
|
|
**/
|
|
UINT64
|
|
GetAttributesFromPageEntry (
|
|
IN UINT64 *PageEntry
|
|
)
|
|
{
|
|
UINT64 Attributes;
|
|
Attributes = 0;
|
|
if ((*PageEntry & IA32_PG_P) == 0) {
|
|
Attributes |= EFI_MEMORY_RP;
|
|
}
|
|
if ((*PageEntry & IA32_PG_RW) == 0) {
|
|
Attributes |= EFI_MEMORY_RO;
|
|
}
|
|
if ((*PageEntry & IA32_PG_NX) != 0) {
|
|
Attributes |= EFI_MEMORY_XP;
|
|
}
|
|
return Attributes;
|
|
}
|
|
|
|
/**
|
|
Modify memory attributes of page entry.
|
|
|
|
@param[in] PagingContext The paging context.
|
|
@param[in] PageEntry The page entry.
|
|
@param[in] Attributes The bit mask of attributes to modify for the memory region.
|
|
@param[in] PageAction The page action.
|
|
@param[out] IsModified TRUE means page table modified. FALSE means page table not modified.
|
|
**/
|
|
VOID
|
|
ConvertPageEntryAttribute (
|
|
IN PAGE_TABLE_LIB_PAGING_CONTEXT *PagingContext,
|
|
IN UINT64 *PageEntry,
|
|
IN UINT64 Attributes,
|
|
IN PAGE_ACTION PageAction,
|
|
OUT BOOLEAN *IsModified
|
|
)
|
|
{
|
|
UINT64 CurrentPageEntry;
|
|
UINT64 NewPageEntry;
|
|
UINT32 *PageAttributes;
|
|
|
|
CurrentPageEntry = *PageEntry;
|
|
NewPageEntry = CurrentPageEntry;
|
|
if ((Attributes & EFI_MEMORY_RP) != 0) {
|
|
switch (PageAction) {
|
|
case PageActionAssign:
|
|
case PageActionSet:
|
|
NewPageEntry &= ~(UINT64)IA32_PG_P;
|
|
break;
|
|
case PageActionClear:
|
|
NewPageEntry |= IA32_PG_P;
|
|
break;
|
|
}
|
|
} else {
|
|
switch (PageAction) {
|
|
case PageActionAssign:
|
|
NewPageEntry |= IA32_PG_P;
|
|
break;
|
|
case PageActionSet:
|
|
case PageActionClear:
|
|
break;
|
|
}
|
|
}
|
|
if ((Attributes & EFI_MEMORY_RO) != 0) {
|
|
switch (PageAction) {
|
|
case PageActionAssign:
|
|
case PageActionSet:
|
|
NewPageEntry &= ~(UINT64)IA32_PG_RW;
|
|
break;
|
|
case PageActionClear:
|
|
NewPageEntry |= IA32_PG_RW;
|
|
break;
|
|
}
|
|
} else {
|
|
switch (PageAction) {
|
|
case PageActionAssign:
|
|
NewPageEntry |= IA32_PG_RW;
|
|
break;
|
|
case PageActionSet:
|
|
case PageActionClear:
|
|
break;
|
|
}
|
|
}
|
|
|
|
GetPagingDetails (&PagingContext->ContextData, NULL, &PageAttributes);
|
|
|
|
if ((*PageAttributes & PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_XD_ACTIVATED) != 0) {
|
|
if ((Attributes & EFI_MEMORY_XP) != 0) {
|
|
switch (PageAction) {
|
|
case PageActionAssign:
|
|
case PageActionSet:
|
|
NewPageEntry |= IA32_PG_NX;
|
|
break;
|
|
case PageActionClear:
|
|
NewPageEntry &= ~IA32_PG_NX;
|
|
break;
|
|
}
|
|
} else {
|
|
switch (PageAction) {
|
|
case PageActionAssign:
|
|
NewPageEntry &= ~IA32_PG_NX;
|
|
break;
|
|
case PageActionSet:
|
|
case PageActionClear:
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
*PageEntry = NewPageEntry;
|
|
if (CurrentPageEntry != NewPageEntry) {
|
|
*IsModified = TRUE;
|
|
DEBUG ((DEBUG_VERBOSE, "ConvertPageEntryAttribute 0x%lx", CurrentPageEntry));
|
|
DEBUG ((DEBUG_VERBOSE, "->0x%lx\n", NewPageEntry));
|
|
} else {
|
|
*IsModified = FALSE;
|
|
}
|
|
}
|
|
|
|
/**
|
|
This function returns if there is need to split page entry.
|
|
|
|
@param[in] BaseAddress The base address to be checked.
|
|
@param[in] Length The length to be checked.
|
|
@param[in] PageEntry The page entry to be checked.
|
|
@param[in] PageAttribute The page attribute of the page entry.
|
|
|
|
@retval SplitAttributes on if there is need to split page entry.
|
|
**/
|
|
PAGE_ATTRIBUTE
|
|
NeedSplitPage (
|
|
IN PHYSICAL_ADDRESS BaseAddress,
|
|
IN UINT64 Length,
|
|
IN UINT64 *PageEntry,
|
|
IN PAGE_ATTRIBUTE PageAttribute
|
|
)
|
|
{
|
|
UINT64 PageEntryLength;
|
|
|
|
PageEntryLength = PageAttributeToLength (PageAttribute);
|
|
|
|
if (((BaseAddress & (PageEntryLength - 1)) == 0) && (Length >= PageEntryLength)) {
|
|
return PageNone;
|
|
}
|
|
|
|
if (((BaseAddress & PAGING_2M_MASK) != 0) || (Length < SIZE_2MB)) {
|
|
return Page4K;
|
|
}
|
|
|
|
return Page2M;
|
|
}
|
|
|
|
/**
|
|
This function splits one page entry to small page entries.
|
|
|
|
@param[in] PageEntry The page entry to be splitted.
|
|
@param[in] PageAttribute The page attribute of the page entry.
|
|
@param[in] SplitAttribute How to split the page entry.
|
|
@param[in] AllocatePagesFunc If page split is needed, this function is used to allocate more pages.
|
|
|
|
@retval RETURN_SUCCESS The page entry is splitted.
|
|
@retval RETURN_UNSUPPORTED The page entry does not support to be splitted.
|
|
@retval RETURN_OUT_OF_RESOURCES No resource to split page entry.
|
|
**/
|
|
RETURN_STATUS
|
|
SplitPage (
|
|
IN UINT64 *PageEntry,
|
|
IN PAGE_ATTRIBUTE PageAttribute,
|
|
IN PAGE_ATTRIBUTE SplitAttribute,
|
|
IN PAGE_TABLE_LIB_ALLOCATE_PAGES AllocatePagesFunc
|
|
)
|
|
{
|
|
UINT64 BaseAddress;
|
|
UINT64 *NewPageEntry;
|
|
UINTN Index;
|
|
UINT64 AddressEncMask;
|
|
|
|
ASSERT (PageAttribute == Page2M || PageAttribute == Page1G);
|
|
|
|
ASSERT (AllocatePagesFunc != NULL);
|
|
|
|
// Make sure AddressEncMask is contained to smallest supported address field.
|
|
//
|
|
AddressEncMask = PcdGet64 (PcdPteMemoryEncryptionAddressOrMask) & PAGING_1G_ADDRESS_MASK_64;
|
|
|
|
if (PageAttribute == Page2M) {
|
|
//
|
|
// Split 2M to 4K
|
|
//
|
|
ASSERT (SplitAttribute == Page4K);
|
|
if (SplitAttribute == Page4K) {
|
|
NewPageEntry = AllocatePagesFunc (1);
|
|
DEBUG ((DEBUG_VERBOSE, "Split - 0x%x\n", NewPageEntry));
|
|
if (NewPageEntry == NULL) {
|
|
return RETURN_OUT_OF_RESOURCES;
|
|
}
|
|
BaseAddress = *PageEntry & ~AddressEncMask & PAGING_2M_ADDRESS_MASK_64;
|
|
for (Index = 0; Index < SIZE_4KB / sizeof(UINT64); Index++) {
|
|
NewPageEntry[Index] = (BaseAddress + SIZE_4KB * Index) | AddressEncMask | ((*PageEntry) & PAGE_PROGATE_BITS);
|
|
}
|
|
(*PageEntry) = (UINT64)(UINTN)NewPageEntry | AddressEncMask | ((*PageEntry) & PAGE_ATTRIBUTE_BITS);
|
|
return RETURN_SUCCESS;
|
|
} else {
|
|
return RETURN_UNSUPPORTED;
|
|
}
|
|
} else if (PageAttribute == Page1G) {
|
|
//
|
|
// Split 1G to 2M
|
|
// No need support 1G->4K directly, we should use 1G->2M, then 2M->4K to get more compact page table.
|
|
//
|
|
ASSERT (SplitAttribute == Page2M || SplitAttribute == Page4K);
|
|
if ((SplitAttribute == Page2M || SplitAttribute == Page4K)) {
|
|
NewPageEntry = AllocatePagesFunc (1);
|
|
DEBUG ((DEBUG_VERBOSE, "Split - 0x%x\n", NewPageEntry));
|
|
if (NewPageEntry == NULL) {
|
|
return RETURN_OUT_OF_RESOURCES;
|
|
}
|
|
BaseAddress = *PageEntry & ~AddressEncMask & PAGING_1G_ADDRESS_MASK_64;
|
|
for (Index = 0; Index < SIZE_4KB / sizeof(UINT64); Index++) {
|
|
NewPageEntry[Index] = (BaseAddress + SIZE_2MB * Index) | AddressEncMask | IA32_PG_PS | ((*PageEntry) & PAGE_PROGATE_BITS);
|
|
}
|
|
(*PageEntry) = (UINT64)(UINTN)NewPageEntry | AddressEncMask | ((*PageEntry) & PAGE_ATTRIBUTE_BITS);
|
|
return RETURN_SUCCESS;
|
|
} else {
|
|
return RETURN_UNSUPPORTED;
|
|
}
|
|
} else {
|
|
return RETURN_UNSUPPORTED;
|
|
}
|
|
}
|
|
|
|
/**
|
|
Check the WP status in CR0 register. This bit is used to lock or unlock write
|
|
access to pages marked as read-only.
|
|
|
|
@retval TRUE Write protection is enabled.
|
|
@retval FALSE Write protection is disabled.
|
|
**/
|
|
BOOLEAN
|
|
IsReadOnlyPageWriteProtected (
|
|
VOID
|
|
)
|
|
{
|
|
IA32_CR0 Cr0;
|
|
//
|
|
// To avoid unforseen consequences, don't touch paging settings in SMM mode
|
|
// in this driver.
|
|
//
|
|
if (!IsInSmm ()) {
|
|
Cr0.UintN = AsmReadCr0 ();
|
|
return (BOOLEAN) (Cr0.Bits.WP != 0);
|
|
}
|
|
return FALSE;
|
|
}
|
|
|
|
/**
|
|
Disable Write Protect on pages marked as read-only.
|
|
**/
|
|
VOID
|
|
DisableReadOnlyPageWriteProtect (
|
|
VOID
|
|
)
|
|
{
|
|
IA32_CR0 Cr0;
|
|
//
|
|
// To avoid unforseen consequences, don't touch paging settings in SMM mode
|
|
// in this driver.
|
|
//
|
|
if (!IsInSmm ()) {
|
|
Cr0.UintN = AsmReadCr0 ();
|
|
Cr0.Bits.WP = 0;
|
|
AsmWriteCr0 (Cr0.UintN);
|
|
}
|
|
}
|
|
|
|
/**
|
|
Enable Write Protect on pages marked as read-only.
|
|
**/
|
|
VOID
|
|
EnableReadOnlyPageWriteProtect (
|
|
VOID
|
|
)
|
|
{
|
|
IA32_CR0 Cr0;
|
|
//
|
|
// To avoid unforseen consequences, don't touch paging settings in SMM mode
|
|
// in this driver.
|
|
//
|
|
if (!IsInSmm ()) {
|
|
Cr0.UintN = AsmReadCr0 ();
|
|
Cr0.Bits.WP = 1;
|
|
AsmWriteCr0 (Cr0.UintN);
|
|
}
|
|
}
|
|
|
|
/**
|
|
This function modifies the page attributes for the memory region specified by BaseAddress and
|
|
Length from their current attributes to the attributes specified by Attributes.
|
|
|
|
Caller should make sure BaseAddress and Length is at page boundary.
|
|
|
|
@param[in] PagingContext The paging context. NULL means get page table from current CPU context.
|
|
@param[in] BaseAddress The physical address that is the start address of a memory region.
|
|
@param[in] Length The size in bytes of the memory region.
|
|
@param[in] Attributes The bit mask of attributes to modify for the memory region.
|
|
@param[in] PageAction The page action.
|
|
@param[in] AllocatePagesFunc If page split is needed, this function is used to allocate more pages.
|
|
NULL mean page split is unsupported.
|
|
@param[out] IsSplitted TRUE means page table splitted. FALSE means page table not splitted.
|
|
@param[out] IsModified TRUE means page table modified. FALSE means page table not modified.
|
|
|
|
@retval RETURN_SUCCESS The attributes were modified for the memory region.
|
|
@retval RETURN_ACCESS_DENIED The attributes for the memory resource range specified by
|
|
BaseAddress and Length cannot be modified.
|
|
@retval RETURN_INVALID_PARAMETER Length is zero.
|
|
Attributes specified an illegal combination of attributes that
|
|
cannot be set together.
|
|
@retval RETURN_OUT_OF_RESOURCES There are not enough system resources to modify the attributes of
|
|
the memory resource range.
|
|
@retval RETURN_UNSUPPORTED The processor does not support one or more bytes of the memory
|
|
resource range specified by BaseAddress and Length.
|
|
The bit mask of attributes is not support for the memory resource
|
|
range specified by BaseAddress and Length.
|
|
**/
|
|
RETURN_STATUS
|
|
ConvertMemoryPageAttributes (
|
|
IN PAGE_TABLE_LIB_PAGING_CONTEXT *PagingContext OPTIONAL,
|
|
IN PHYSICAL_ADDRESS BaseAddress,
|
|
IN UINT64 Length,
|
|
IN UINT64 Attributes,
|
|
IN PAGE_ACTION PageAction,
|
|
IN PAGE_TABLE_LIB_ALLOCATE_PAGES AllocatePagesFunc OPTIONAL,
|
|
OUT BOOLEAN *IsSplitted, OPTIONAL
|
|
OUT BOOLEAN *IsModified OPTIONAL
|
|
)
|
|
{
|
|
PAGE_TABLE_LIB_PAGING_CONTEXT CurrentPagingContext;
|
|
UINT64 *PageEntry;
|
|
PAGE_ATTRIBUTE PageAttribute;
|
|
UINTN PageEntryLength;
|
|
PAGE_ATTRIBUTE SplitAttribute;
|
|
RETURN_STATUS Status;
|
|
BOOLEAN IsEntryModified;
|
|
BOOLEAN IsWpEnabled;
|
|
|
|
if ((BaseAddress & (SIZE_4KB - 1)) != 0) {
|
|
DEBUG ((DEBUG_ERROR, "BaseAddress(0x%lx) is not aligned!\n", BaseAddress));
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
if ((Length & (SIZE_4KB - 1)) != 0) {
|
|
DEBUG ((DEBUG_ERROR, "Length(0x%lx) is not aligned!\n", Length));
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
if (Length == 0) {
|
|
DEBUG ((DEBUG_ERROR, "Length is 0!\n"));
|
|
return RETURN_INVALID_PARAMETER;
|
|
}
|
|
|
|
if ((Attributes & ~(EFI_MEMORY_RP | EFI_MEMORY_RO | EFI_MEMORY_XP)) != 0) {
|
|
DEBUG ((DEBUG_ERROR, "Attributes(0x%lx) has unsupported bit\n", Attributes));
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
if (PagingContext == NULL) {
|
|
GetCurrentPagingContext (&CurrentPagingContext);
|
|
} else {
|
|
CopyMem (&CurrentPagingContext, PagingContext, sizeof(CurrentPagingContext));
|
|
}
|
|
switch(CurrentPagingContext.MachineType) {
|
|
case IMAGE_FILE_MACHINE_I386:
|
|
if (CurrentPagingContext.ContextData.Ia32.PageTableBase == 0) {
|
|
if (Attributes == 0) {
|
|
return EFI_SUCCESS;
|
|
} else {
|
|
DEBUG ((DEBUG_ERROR, "PageTable is 0!\n"));
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
}
|
|
if ((CurrentPagingContext.ContextData.Ia32.Attributes & PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_PAE) == 0) {
|
|
DEBUG ((DEBUG_ERROR, "Non-PAE Paging!\n"));
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
if ((BaseAddress + Length) > BASE_4GB) {
|
|
DEBUG ((DEBUG_ERROR, "Beyond 4GB memory in 32-bit mode!\n"));
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
break;
|
|
case IMAGE_FILE_MACHINE_X64:
|
|
ASSERT (CurrentPagingContext.ContextData.X64.PageTableBase != 0);
|
|
break;
|
|
default:
|
|
ASSERT(FALSE);
|
|
return EFI_UNSUPPORTED;
|
|
break;
|
|
}
|
|
|
|
// DEBUG ((DEBUG_ERROR, "ConvertMemoryPageAttributes(%x) - %016lx, %016lx, %02lx\n", IsSet, BaseAddress, Length, Attributes));
|
|
|
|
if (IsSplitted != NULL) {
|
|
*IsSplitted = FALSE;
|
|
}
|
|
if (IsModified != NULL) {
|
|
*IsModified = FALSE;
|
|
}
|
|
if (AllocatePagesFunc == NULL) {
|
|
AllocatePagesFunc = AllocatePageTableMemory;
|
|
}
|
|
|
|
//
|
|
// Make sure that the page table is changeable.
|
|
//
|
|
IsWpEnabled = IsReadOnlyPageWriteProtected ();
|
|
if (IsWpEnabled) {
|
|
DisableReadOnlyPageWriteProtect ();
|
|
}
|
|
|
|
//
|
|
// Below logic is to check 2M/4K page to make sure we do not waste memory.
|
|
//
|
|
Status = EFI_SUCCESS;
|
|
while (Length != 0) {
|
|
PageEntry = GetPageTableEntry (&CurrentPagingContext, BaseAddress, &PageAttribute);
|
|
if (PageEntry == NULL) {
|
|
Status = RETURN_UNSUPPORTED;
|
|
goto Done;
|
|
}
|
|
PageEntryLength = PageAttributeToLength (PageAttribute);
|
|
SplitAttribute = NeedSplitPage (BaseAddress, Length, PageEntry, PageAttribute);
|
|
if (SplitAttribute == PageNone) {
|
|
ConvertPageEntryAttribute (&CurrentPagingContext, PageEntry, Attributes, PageAction, &IsEntryModified);
|
|
if (IsEntryModified) {
|
|
if (IsModified != NULL) {
|
|
*IsModified = TRUE;
|
|
}
|
|
}
|
|
//
|
|
// Convert success, move to next
|
|
//
|
|
BaseAddress += PageEntryLength;
|
|
Length -= PageEntryLength;
|
|
} else {
|
|
if (AllocatePagesFunc == NULL) {
|
|
Status = RETURN_UNSUPPORTED;
|
|
goto Done;
|
|
}
|
|
Status = SplitPage (PageEntry, PageAttribute, SplitAttribute, AllocatePagesFunc);
|
|
if (RETURN_ERROR (Status)) {
|
|
Status = RETURN_UNSUPPORTED;
|
|
goto Done;
|
|
}
|
|
if (IsSplitted != NULL) {
|
|
*IsSplitted = TRUE;
|
|
}
|
|
if (IsModified != NULL) {
|
|
*IsModified = TRUE;
|
|
}
|
|
//
|
|
// Just split current page
|
|
// Convert success in next around
|
|
//
|
|
}
|
|
}
|
|
|
|
Done:
|
|
//
|
|
// Restore page table write protection, if any.
|
|
//
|
|
if (IsWpEnabled) {
|
|
EnableReadOnlyPageWriteProtect ();
|
|
}
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
This function assigns the page attributes for the memory region specified by BaseAddress and
|
|
Length from their current attributes to the attributes specified by Attributes.
|
|
|
|
Caller should make sure BaseAddress and Length is at page boundary.
|
|
|
|
Caller need guarantee the TPL <= TPL_NOTIFY, if there is split page request.
|
|
|
|
@param[in] PagingContext The paging context. NULL means get page table from current CPU context.
|
|
@param[in] BaseAddress The physical address that is the start address of a memory region.
|
|
@param[in] Length The size in bytes of the memory region.
|
|
@param[in] Attributes The bit mask of attributes to set for the memory region.
|
|
@param[in] AllocatePagesFunc If page split is needed, this function is used to allocate more pages.
|
|
NULL mean page split is unsupported.
|
|
|
|
@retval RETURN_SUCCESS The attributes were cleared for the memory region.
|
|
@retval RETURN_ACCESS_DENIED The attributes for the memory resource range specified by
|
|
BaseAddress and Length cannot be modified.
|
|
@retval RETURN_INVALID_PARAMETER Length is zero.
|
|
Attributes specified an illegal combination of attributes that
|
|
cannot be set together.
|
|
@retval RETURN_OUT_OF_RESOURCES There are not enough system resources to modify the attributes of
|
|
the memory resource range.
|
|
@retval RETURN_UNSUPPORTED The processor does not support one or more bytes of the memory
|
|
resource range specified by BaseAddress and Length.
|
|
The bit mask of attributes is not support for the memory resource
|
|
range specified by BaseAddress and Length.
|
|
**/
|
|
RETURN_STATUS
|
|
EFIAPI
|
|
AssignMemoryPageAttributes (
|
|
IN PAGE_TABLE_LIB_PAGING_CONTEXT *PagingContext OPTIONAL,
|
|
IN PHYSICAL_ADDRESS BaseAddress,
|
|
IN UINT64 Length,
|
|
IN UINT64 Attributes,
|
|
IN PAGE_TABLE_LIB_ALLOCATE_PAGES AllocatePagesFunc OPTIONAL
|
|
)
|
|
{
|
|
RETURN_STATUS Status;
|
|
BOOLEAN IsModified;
|
|
BOOLEAN IsSplitted;
|
|
|
|
// DEBUG((DEBUG_INFO, "AssignMemoryPageAttributes: 0x%lx - 0x%lx (0x%lx)\n", BaseAddress, Length, Attributes));
|
|
Status = ConvertMemoryPageAttributes (PagingContext, BaseAddress, Length, Attributes, PageActionAssign, AllocatePagesFunc, &IsSplitted, &IsModified);
|
|
if (!EFI_ERROR(Status)) {
|
|
if ((PagingContext == NULL) && IsModified) {
|
|
//
|
|
// Flush TLB as last step.
|
|
//
|
|
// Note: Since APs will always init CR3 register in HLT loop mode or do
|
|
// TLB flush in MWAIT loop mode, there's no need to flush TLB for them
|
|
// here.
|
|
//
|
|
CpuFlushTlb();
|
|
}
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
Check if Execute Disable feature is enabled or not.
|
|
**/
|
|
BOOLEAN
|
|
IsExecuteDisableEnabled (
|
|
VOID
|
|
)
|
|
{
|
|
MSR_CORE_IA32_EFER_REGISTER MsrEfer;
|
|
|
|
MsrEfer.Uint64 = AsmReadMsr64 (MSR_IA32_EFER);
|
|
return (MsrEfer.Bits.NXE == 1);
|
|
}
|
|
|
|
/**
|
|
Update GCD memory space attributes according to current page table setup.
|
|
**/
|
|
VOID
|
|
RefreshGcdMemoryAttributesFromPaging (
|
|
VOID
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
UINTN NumberOfDescriptors;
|
|
EFI_GCD_MEMORY_SPACE_DESCRIPTOR *MemorySpaceMap;
|
|
PAGE_TABLE_LIB_PAGING_CONTEXT PagingContext;
|
|
PAGE_ATTRIBUTE PageAttribute;
|
|
UINT64 *PageEntry;
|
|
UINT64 PageLength;
|
|
UINT64 MemorySpaceLength;
|
|
UINT64 Length;
|
|
UINT64 BaseAddress;
|
|
UINT64 PageStartAddress;
|
|
UINT64 Attributes;
|
|
UINT64 Capabilities;
|
|
UINT64 NewAttributes;
|
|
UINTN Index;
|
|
|
|
//
|
|
// Assuming that memory space map returned is sorted already; otherwise sort
|
|
// them in the order of lowest address to highest address.
|
|
//
|
|
Status = gDS->GetMemorySpaceMap (&NumberOfDescriptors, &MemorySpaceMap);
|
|
ASSERT_EFI_ERROR (Status);
|
|
|
|
GetCurrentPagingContext (&PagingContext);
|
|
|
|
Attributes = 0;
|
|
NewAttributes = 0;
|
|
BaseAddress = 0;
|
|
PageLength = 0;
|
|
|
|
if (IsExecuteDisableEnabled ()) {
|
|
Capabilities = EFI_MEMORY_RO | EFI_MEMORY_RP | EFI_MEMORY_XP;
|
|
} else {
|
|
Capabilities = EFI_MEMORY_RO | EFI_MEMORY_RP;
|
|
}
|
|
|
|
for (Index = 0; Index < NumberOfDescriptors; Index++) {
|
|
if (MemorySpaceMap[Index].GcdMemoryType == EfiGcdMemoryTypeNonExistent) {
|
|
continue;
|
|
}
|
|
|
|
//
|
|
// Sync the actual paging related capabilities back to GCD service first.
|
|
// As a side effect (good one), this can also help to avoid unnecessary
|
|
// memory map entries due to the different capabilities of the same type
|
|
// memory, such as multiple RT_CODE and RT_DATA entries in memory map,
|
|
// which could cause boot failure of some old Linux distro (before v4.3).
|
|
//
|
|
Status = gDS->SetMemorySpaceCapabilities (
|
|
MemorySpaceMap[Index].BaseAddress,
|
|
MemorySpaceMap[Index].Length,
|
|
MemorySpaceMap[Index].Capabilities | Capabilities
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
//
|
|
// If we cannot update the capabilities, we cannot update its
|
|
// attributes either. So just simply skip current block of memory.
|
|
//
|
|
DEBUG ((
|
|
DEBUG_WARN,
|
|
"Failed to update capability: [%lu] %016lx - %016lx (%016lx -> %016lx)\r\n",
|
|
(UINT64)Index, MemorySpaceMap[Index].BaseAddress,
|
|
MemorySpaceMap[Index].BaseAddress + MemorySpaceMap[Index].Length - 1,
|
|
MemorySpaceMap[Index].Capabilities,
|
|
MemorySpaceMap[Index].Capabilities | Capabilities
|
|
));
|
|
continue;
|
|
}
|
|
|
|
if (MemorySpaceMap[Index].BaseAddress >= (BaseAddress + PageLength)) {
|
|
//
|
|
// Current memory space starts at a new page. Resetting PageLength will
|
|
// trigger a retrieval of page attributes at new address.
|
|
//
|
|
PageLength = 0;
|
|
} else {
|
|
//
|
|
// In case current memory space is not adjacent to last one
|
|
//
|
|
PageLength -= (MemorySpaceMap[Index].BaseAddress - BaseAddress);
|
|
}
|
|
|
|
//
|
|
// Sync actual page attributes to GCD
|
|
//
|
|
BaseAddress = MemorySpaceMap[Index].BaseAddress;
|
|
MemorySpaceLength = MemorySpaceMap[Index].Length;
|
|
while (MemorySpaceLength > 0) {
|
|
if (PageLength == 0) {
|
|
PageEntry = GetPageTableEntry (&PagingContext, BaseAddress, &PageAttribute);
|
|
if (PageEntry == NULL) {
|
|
break;
|
|
}
|
|
|
|
//
|
|
// Note current memory space might start in the middle of a page
|
|
//
|
|
PageStartAddress = (*PageEntry) & (UINT64)PageAttributeToMask(PageAttribute);
|
|
PageLength = PageAttributeToLength (PageAttribute) - (BaseAddress - PageStartAddress);
|
|
Attributes = GetAttributesFromPageEntry (PageEntry);
|
|
}
|
|
|
|
Length = MIN (PageLength, MemorySpaceLength);
|
|
if (Attributes != (MemorySpaceMap[Index].Attributes &
|
|
EFI_MEMORY_PAGETYPE_MASK)) {
|
|
NewAttributes = (MemorySpaceMap[Index].Attributes &
|
|
~EFI_MEMORY_PAGETYPE_MASK) | Attributes;
|
|
Status = gDS->SetMemorySpaceAttributes (
|
|
BaseAddress,
|
|
Length,
|
|
NewAttributes
|
|
);
|
|
ASSERT_EFI_ERROR (Status);
|
|
DEBUG ((
|
|
DEBUG_VERBOSE,
|
|
"Updated memory space attribute: [%lu] %016lx - %016lx (%016lx -> %016lx)\r\n",
|
|
(UINT64)Index, BaseAddress, BaseAddress + Length - 1,
|
|
MemorySpaceMap[Index].Attributes,
|
|
NewAttributes
|
|
));
|
|
}
|
|
|
|
PageLength -= Length;
|
|
MemorySpaceLength -= Length;
|
|
BaseAddress += Length;
|
|
}
|
|
}
|
|
|
|
FreePool (MemorySpaceMap);
|
|
}
|
|
|
|
/**
|
|
Initialize a buffer pool for page table use only.
|
|
|
|
To reduce the potential split operation on page table, the pages reserved for
|
|
page table should be allocated in the times of PAGE_TABLE_POOL_UNIT_PAGES and
|
|
at the boundary of PAGE_TABLE_POOL_ALIGNMENT. So the page pool is always
|
|
initialized with number of pages greater than or equal to the given PoolPages.
|
|
|
|
Once the pages in the pool are used up, this method should be called again to
|
|
reserve at least another PAGE_TABLE_POOL_UNIT_PAGES. Usually this won't happen
|
|
often in practice.
|
|
|
|
@param[in] PoolPages The least page number of the pool to be created.
|
|
|
|
@retval TRUE The pool is initialized successfully.
|
|
@retval FALSE The memory is out of resource.
|
|
**/
|
|
BOOLEAN
|
|
InitializePageTablePool (
|
|
IN UINTN PoolPages
|
|
)
|
|
{
|
|
VOID *Buffer;
|
|
BOOLEAN IsModified;
|
|
|
|
//
|
|
// Do not allow re-entrance.
|
|
//
|
|
if (mPageTablePoolLock) {
|
|
return FALSE;
|
|
}
|
|
|
|
mPageTablePoolLock = TRUE;
|
|
IsModified = FALSE;
|
|
|
|
//
|
|
// Always reserve at least PAGE_TABLE_POOL_UNIT_PAGES, including one page for
|
|
// header.
|
|
//
|
|
PoolPages += 1; // Add one page for header.
|
|
PoolPages = ((PoolPages - 1) / PAGE_TABLE_POOL_UNIT_PAGES + 1) *
|
|
PAGE_TABLE_POOL_UNIT_PAGES;
|
|
Buffer = AllocateAlignedPages (PoolPages, PAGE_TABLE_POOL_ALIGNMENT);
|
|
if (Buffer == NULL) {
|
|
DEBUG ((DEBUG_ERROR, "ERROR: Out of aligned pages\r\n"));
|
|
goto Done;
|
|
}
|
|
|
|
DEBUG ((
|
|
DEBUG_INFO,
|
|
"Paging: added %lu pages to page table pool\r\n",
|
|
(UINT64)PoolPages
|
|
));
|
|
|
|
//
|
|
// Link all pools into a list for easier track later.
|
|
//
|
|
if (mPageTablePool == NULL) {
|
|
mPageTablePool = Buffer;
|
|
mPageTablePool->NextPool = mPageTablePool;
|
|
} else {
|
|
((PAGE_TABLE_POOL *)Buffer)->NextPool = mPageTablePool->NextPool;
|
|
mPageTablePool->NextPool = Buffer;
|
|
mPageTablePool = Buffer;
|
|
}
|
|
|
|
//
|
|
// Reserve one page for pool header.
|
|
//
|
|
mPageTablePool->FreePages = PoolPages - 1;
|
|
mPageTablePool->Offset = EFI_PAGES_TO_SIZE (1);
|
|
|
|
//
|
|
// Mark the whole pool pages as read-only.
|
|
//
|
|
ConvertMemoryPageAttributes (
|
|
NULL,
|
|
(PHYSICAL_ADDRESS)(UINTN)Buffer,
|
|
EFI_PAGES_TO_SIZE (PoolPages),
|
|
EFI_MEMORY_RO,
|
|
PageActionSet,
|
|
AllocatePageTableMemory,
|
|
NULL,
|
|
&IsModified
|
|
);
|
|
ASSERT (IsModified == TRUE);
|
|
|
|
Done:
|
|
mPageTablePoolLock = FALSE;
|
|
return IsModified;
|
|
}
|
|
|
|
/**
|
|
This API provides a way to allocate memory for page table.
|
|
|
|
This API can be called more than once to allocate memory for page tables.
|
|
|
|
Allocates the number of 4KB pages and returns a pointer to the allocated
|
|
buffer. The buffer returned is aligned on a 4KB boundary.
|
|
|
|
If Pages is 0, then NULL is returned.
|
|
If there is not enough memory remaining to satisfy the request, then NULL is
|
|
returned.
|
|
|
|
@param Pages The number of 4 KB pages to allocate.
|
|
|
|
@return A pointer to the allocated buffer or NULL if allocation fails.
|
|
|
|
**/
|
|
VOID *
|
|
EFIAPI
|
|
AllocatePageTableMemory (
|
|
IN UINTN Pages
|
|
)
|
|
{
|
|
VOID *Buffer;
|
|
|
|
if (Pages == 0) {
|
|
return NULL;
|
|
}
|
|
|
|
//
|
|
// Renew the pool if necessary.
|
|
//
|
|
if (mPageTablePool == NULL ||
|
|
Pages > mPageTablePool->FreePages) {
|
|
if (!InitializePageTablePool (Pages)) {
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
Buffer = (UINT8 *)mPageTablePool + mPageTablePool->Offset;
|
|
|
|
mPageTablePool->Offset += EFI_PAGES_TO_SIZE (Pages);
|
|
mPageTablePool->FreePages -= Pages;
|
|
|
|
return Buffer;
|
|
}
|
|
|
|
/**
|
|
Special handler for #DB exception, which will restore the page attributes
|
|
(not-present). It should work with #PF handler which will set pages to
|
|
'present'.
|
|
|
|
@param ExceptionType Exception type.
|
|
@param SystemContext Pointer to EFI_SYSTEM_CONTEXT.
|
|
|
|
**/
|
|
VOID
|
|
EFIAPI
|
|
DebugExceptionHandler (
|
|
IN EFI_EXCEPTION_TYPE ExceptionType,
|
|
IN EFI_SYSTEM_CONTEXT SystemContext
|
|
)
|
|
{
|
|
UINTN CpuIndex;
|
|
UINTN PFEntry;
|
|
BOOLEAN IsWpEnabled;
|
|
|
|
MpInitLibWhoAmI (&CpuIndex);
|
|
|
|
//
|
|
// Clear last PF entries
|
|
//
|
|
IsWpEnabled = IsReadOnlyPageWriteProtected ();
|
|
if (IsWpEnabled) {
|
|
DisableReadOnlyPageWriteProtect ();
|
|
}
|
|
|
|
for (PFEntry = 0; PFEntry < mPFEntryCount[CpuIndex]; PFEntry++) {
|
|
if (mLastPFEntryPointer[CpuIndex][PFEntry] != NULL) {
|
|
*mLastPFEntryPointer[CpuIndex][PFEntry] &= ~(UINT64)IA32_PG_P;
|
|
}
|
|
}
|
|
|
|
if (IsWpEnabled) {
|
|
EnableReadOnlyPageWriteProtect ();
|
|
}
|
|
|
|
//
|
|
// Reset page fault exception count for next page fault.
|
|
//
|
|
mPFEntryCount[CpuIndex] = 0;
|
|
|
|
//
|
|
// Flush TLB
|
|
//
|
|
CpuFlushTlb ();
|
|
|
|
//
|
|
// Clear TF in EFLAGS
|
|
//
|
|
if (mPagingContext.MachineType == IMAGE_FILE_MACHINE_I386) {
|
|
SystemContext.SystemContextIa32->Eflags &= (UINT32)~BIT8;
|
|
} else {
|
|
SystemContext.SystemContextX64->Rflags &= (UINT64)~BIT8;
|
|
}
|
|
}
|
|
|
|
/**
|
|
Special handler for #PF exception, which will set the pages which caused
|
|
#PF to be 'present'. The attribute of those pages should be restored in
|
|
the subsequent #DB handler.
|
|
|
|
@param ExceptionType Exception type.
|
|
@param SystemContext Pointer to EFI_SYSTEM_CONTEXT.
|
|
|
|
**/
|
|
VOID
|
|
EFIAPI
|
|
PageFaultExceptionHandler (
|
|
IN EFI_EXCEPTION_TYPE ExceptionType,
|
|
IN EFI_SYSTEM_CONTEXT SystemContext
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
UINT64 PFAddress;
|
|
PAGE_TABLE_LIB_PAGING_CONTEXT PagingContext;
|
|
PAGE_ATTRIBUTE PageAttribute;
|
|
UINT64 Attributes;
|
|
UINT64 *PageEntry;
|
|
UINTN Index;
|
|
UINTN CpuIndex;
|
|
UINTN PageNumber;
|
|
BOOLEAN NonStopMode;
|
|
|
|
PFAddress = AsmReadCr2 () & ~EFI_PAGE_MASK;
|
|
if (PFAddress < BASE_4KB) {
|
|
NonStopMode = NULL_DETECTION_NONSTOP_MODE ? TRUE : FALSE;
|
|
} else {
|
|
NonStopMode = HEAP_GUARD_NONSTOP_MODE ? TRUE : FALSE;
|
|
}
|
|
|
|
if (NonStopMode) {
|
|
MpInitLibWhoAmI (&CpuIndex);
|
|
GetCurrentPagingContext (&PagingContext);
|
|
//
|
|
// Memory operation cross page boundary, like "rep mov" instruction, will
|
|
// cause infinite loop between this and Debug Trap handler. We have to make
|
|
// sure that current page and the page followed are both in PRESENT state.
|
|
//
|
|
PageNumber = 2;
|
|
while (PageNumber > 0) {
|
|
PageEntry = GetPageTableEntry (&PagingContext, PFAddress, &PageAttribute);
|
|
ASSERT(PageEntry != NULL);
|
|
|
|
if (PageEntry != NULL) {
|
|
Attributes = GetAttributesFromPageEntry (PageEntry);
|
|
if ((Attributes & EFI_MEMORY_RP) != 0) {
|
|
Attributes &= ~EFI_MEMORY_RP;
|
|
Status = AssignMemoryPageAttributes (&PagingContext, PFAddress,
|
|
EFI_PAGE_SIZE, Attributes, NULL);
|
|
if (!EFI_ERROR(Status)) {
|
|
Index = mPFEntryCount[CpuIndex];
|
|
//
|
|
// Re-retrieve page entry because above calling might update page
|
|
// table due to table split.
|
|
//
|
|
PageEntry = GetPageTableEntry (&PagingContext, PFAddress, &PageAttribute);
|
|
mLastPFEntryPointer[CpuIndex][Index++] = PageEntry;
|
|
mPFEntryCount[CpuIndex] = Index;
|
|
}
|
|
}
|
|
}
|
|
|
|
PFAddress += EFI_PAGE_SIZE;
|
|
--PageNumber;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Initialize the serial port before dumping.
|
|
//
|
|
SerialPortInitialize ();
|
|
//
|
|
// Display ExceptionType, CPU information and Image information
|
|
//
|
|
DumpCpuContext (ExceptionType, SystemContext);
|
|
if (NonStopMode) {
|
|
//
|
|
// Set TF in EFLAGS
|
|
//
|
|
if (mPagingContext.MachineType == IMAGE_FILE_MACHINE_I386) {
|
|
SystemContext.SystemContextIa32->Eflags |= (UINT32)BIT8;
|
|
} else {
|
|
SystemContext.SystemContextX64->Rflags |= (UINT64)BIT8;
|
|
}
|
|
} else {
|
|
CpuDeadLoop ();
|
|
}
|
|
}
|
|
|
|
/**
|
|
Initialize the Page Table lib.
|
|
**/
|
|
VOID
|
|
InitializePageTableLib (
|
|
VOID
|
|
)
|
|
{
|
|
PAGE_TABLE_LIB_PAGING_CONTEXT CurrentPagingContext;
|
|
UINT32 *Attributes;
|
|
UINTN *PageTableBase;
|
|
|
|
GetCurrentPagingContext (&CurrentPagingContext);
|
|
|
|
GetPagingDetails (&CurrentPagingContext.ContextData, &PageTableBase, &Attributes);
|
|
|
|
//
|
|
// Reserve memory of page tables for future uses, if paging is enabled.
|
|
//
|
|
if ((*PageTableBase != 0) &&
|
|
(*Attributes & PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_PAE) != 0) {
|
|
DisableReadOnlyPageWriteProtect ();
|
|
InitializePageTablePool (1);
|
|
EnableReadOnlyPageWriteProtect ();
|
|
}
|
|
|
|
if (HEAP_GUARD_NONSTOP_MODE || NULL_DETECTION_NONSTOP_MODE) {
|
|
mPFEntryCount = (UINTN *)AllocateZeroPool (sizeof (UINTN) * mNumberOfProcessors);
|
|
ASSERT (mPFEntryCount != NULL);
|
|
|
|
mLastPFEntryPointer = (UINT64 *(*)[MAX_PF_ENTRY_COUNT])
|
|
AllocateZeroPool (sizeof (mLastPFEntryPointer[0]) * mNumberOfProcessors);
|
|
ASSERT (mLastPFEntryPointer != NULL);
|
|
}
|
|
|
|
DEBUG ((DEBUG_INFO, "CurrentPagingContext:\n"));
|
|
DEBUG ((DEBUG_INFO, " MachineType - 0x%x\n", CurrentPagingContext.MachineType));
|
|
DEBUG ((DEBUG_INFO, " PageTableBase - 0x%Lx\n", (UINT64)*PageTableBase));
|
|
DEBUG ((DEBUG_INFO, " Attributes - 0x%x\n", *Attributes));
|
|
|
|
return ;
|
|
}
|
|
|