]> git.proxmox.com Git - mirror_edk2.git/blame - MdeModulePkg/Core/Dxe/Mem/Page.c
MdeModulePkg DxeCore/PiSmmCore: Add UEFI memory and SMRAM profile support.
[mirror_edk2.git] / MdeModulePkg / Core / Dxe / Mem / Page.c
CommitLineData
504214c4 1/** @file\r
504214c4
LG
2 UEFI Memory page management functions.\r
3\r
6e1e5405 4Copyright (c) 2007 - 2014, Intel Corporation. All rights reserved.<BR>\r
cd5ebaa0 5This program and the accompanying materials\r
23c98c94 6are licensed and made available under the terms and conditions of the BSD License\r
7which accompanies this distribution. The full text of the license may be found at\r
8http://opensource.org/licenses/bsd-license.php\r
9\r
10THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
11WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
28a00297 12\r
504214c4 13**/\r
28a00297 14\r
9c4ac31c 15#include "DxeMain.h"\r
ec90508b 16#include "Imem.h"\r
28a00297 17\r
18#define EFI_DEFAULT_PAGE_ALLOCATION_ALIGNMENT (EFI_PAGE_SIZE)\r
19\r
20//\r
d45fd260 21// Entry for tracking the memory regions for each memory type to coalesce similar memory types\r
28a00297 22//\r
23typedef struct {\r
24 EFI_PHYSICAL_ADDRESS BaseAddress;\r
25 EFI_PHYSICAL_ADDRESS MaximumAddress;\r
26 UINT64 CurrentNumberOfPages;\r
b74350e9 27 UINT64 NumberOfPages;\r
28a00297 28 UINTN InformationIndex;\r
b74350e9 29 BOOLEAN Special;\r
30 BOOLEAN Runtime;\r
d613c2a8 31} EFI_MEMORY_TYPE_STATISTICS;\r
28a00297 32\r
33//\r
34// MemoryMap - The current memory map\r
35//\r
36UINTN mMemoryMapKey = 0;\r
37\r
28a00297 38#define MAX_MAP_DEPTH 6\r
dc8d93ca 39\r
40///\r
41/// mMapDepth - depth of new descriptor stack\r
42///\r
28a00297 43UINTN mMapDepth = 0;\r
dc8d93ca 44///\r
45/// mMapStack - space to use as temp storage to build new map descriptors\r
46///\r
28a00297 47MEMORY_MAP mMapStack[MAX_MAP_DEPTH];\r
48UINTN mFreeMapStack = 0;\r
dc8d93ca 49///\r
50/// This list maintain the free memory map list\r
51///\r
e94a9ff7 52LIST_ENTRY mFreeMemoryMapEntryList = INITIALIZE_LIST_HEAD_VARIABLE (mFreeMemoryMapEntryList);\r
53BOOLEAN mMemoryTypeInformationInitialized = FALSE;\r
28a00297 54\r
d613c2a8 55EFI_MEMORY_TYPE_STATISTICS mMemoryTypeStatistics[EfiMaxMemoryType + 1] = {\r
f3f2e05d 56 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, TRUE, FALSE }, // EfiReservedMemoryType\r
57 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiLoaderCode\r
58 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiLoaderData\r
59 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiBootServicesCode\r
60 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiBootServicesData\r
61 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, TRUE, TRUE }, // EfiRuntimeServicesCode\r
62 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, TRUE, TRUE }, // EfiRuntimeServicesData\r
63 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiConventionalMemory\r
64 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiUnusableMemory\r
65 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, TRUE, FALSE }, // EfiACPIReclaimMemory\r
66 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, TRUE, FALSE }, // EfiACPIMemoryNVS\r
67 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiMemoryMappedIO\r
68 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiMemoryMappedIOPortSpace\r
69 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, TRUE, TRUE }, // EfiPalCode\r
70 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE } // EfiMaxMemoryType\r
28a00297 71};\r
72\r
f3f2e05d 73EFI_PHYSICAL_ADDRESS mDefaultMaximumAddress = MAX_ADDRESS;\r
2345e7d4 74EFI_PHYSICAL_ADDRESS mDefaultBaseAddress = MAX_ADDRESS;\r
28a00297 75\r
76EFI_MEMORY_TYPE_INFORMATION gMemoryTypeInformation[EfiMaxMemoryType + 1] = {\r
77 { EfiReservedMemoryType, 0 },\r
78 { EfiLoaderCode, 0 },\r
79 { EfiLoaderData, 0 },\r
80 { EfiBootServicesCode, 0 },\r
81 { EfiBootServicesData, 0 },\r
82 { EfiRuntimeServicesCode, 0 },\r
83 { EfiRuntimeServicesData, 0 },\r
84 { EfiConventionalMemory, 0 },\r
85 { EfiUnusableMemory, 0 },\r
86 { EfiACPIReclaimMemory, 0 },\r
87 { EfiACPIMemoryNVS, 0 },\r
88 { EfiMemoryMappedIO, 0 },\r
89 { EfiMemoryMappedIOPortSpace, 0 },\r
90 { EfiPalCode, 0 },\r
91 { EfiMaxMemoryType, 0 }\r
92};\r
54ea99a7 93//\r
94// Only used when load module at fixed address feature is enabled. True means the memory is alreay successfully allocated\r
95// and ready to load the module in to specified address.or else, the memory is not ready and module will be loaded at a \r
96// address assigned by DXE core.\r
97//\r
98GLOBAL_REMOVE_IF_UNREFERENCED BOOLEAN gLoadFixedAddressCodeMemoryReady = FALSE;\r
d9177625 99\r
162ed594 100/**\r
d9177625 101 Enter critical section by gaining lock on gMemoryLock.\r
162ed594 102\r
103**/\r
23c98c94 104VOID\r
d9177625 105CoreAcquireMemoryLock (\r
106 VOID\r
107 )\r
108{\r
109 CoreAcquireLock (&gMemoryLock);\r
110}\r
111\r
112\r
113\r
114/**\r
115 Exit critical section by releasing lock on gMemoryLock.\r
116\r
117**/\r
118VOID\r
119CoreReleaseMemoryLock (\r
28a00297 120 VOID\r
d9177625 121 )\r
122{\r
123 CoreReleaseLock (&gMemoryLock);\r
124}\r
125\r
126\r
127\r
128\r
129/**\r
130 Internal function. Removes a descriptor entry.\r
131\r
132 @param Entry The entry to remove\r
133\r
134**/\r
135VOID\r
136RemoveMemoryMapEntry (\r
137 IN OUT MEMORY_MAP *Entry\r
138 )\r
139{\r
140 RemoveEntryList (&Entry->Link);\r
141 Entry->Link.ForwardLink = NULL;\r
142\r
143 if (Entry->FromPages) {\r
144 //\r
145 // Insert the free memory map descriptor to the end of mFreeMemoryMapEntryList\r
146 //\r
147 InsertTailList (&mFreeMemoryMapEntryList, &Entry->Link);\r
148 }\r
149}\r
162ed594 150\r
151/**\r
152 Internal function. Adds a ranges to the memory map.\r
153 The range must not already exist in the map.\r
154\r
022c6d45 155 @param Type The type of memory range to add\r
156 @param Start The starting address in the memory range Must be\r
157 paged aligned\r
158 @param End The last address in the range Must be the last\r
159 byte of a page\r
160 @param Attribute The attributes of the memory range to add\r
28a00297 161\r
162ed594 162**/\r
28a00297 163VOID\r
164CoreAddRange (\r
165 IN EFI_MEMORY_TYPE Type,\r
166 IN EFI_PHYSICAL_ADDRESS Start,\r
167 IN EFI_PHYSICAL_ADDRESS End,\r
168 IN UINT64 Attribute\r
d9177625 169 )\r
170{\r
171 LIST_ENTRY *Link;\r
172 MEMORY_MAP *Entry;\r
28a00297 173\r
d9177625 174 ASSERT ((Start & EFI_PAGE_MASK) == 0);\r
175 ASSERT (End > Start) ;\r
162ed594 176\r
d9177625 177 ASSERT_LOCKED (&gMemoryLock);\r
28a00297 178\r
d9177625 179 DEBUG ((DEBUG_PAGE, "AddRange: %lx-%lx to %d\n", Start, End, Type));\r
d436d5ca 180 \r
181 //\r
182 // If memory of type EfiConventionalMemory is being added that includes the page \r
183 // starting at address 0, then zero the page starting at address 0. This has \r
184 // two benifits. It helps find NULL pointer bugs and it also maximizes \r
185 // compatibility with operating systems that may evaluate memory in this page \r
186 // for legacy data structures. If memory of any other type is added starting \r
187 // at address 0, then do not zero the page at address 0 because the page is being \r
188 // used for other purposes.\r
189 // \r
190 if (Type == EfiConventionalMemory && Start == 0 && (End >= EFI_PAGE_SIZE - 1)) {\r
191 SetMem ((VOID *)(UINTN)Start, EFI_PAGE_SIZE, 0);\r
192 }\r
193 \r
d9177625 194 //\r
195 // Memory map being altered so updated key\r
196 //\r
197 mMemoryMapKey += 1;\r
162ed594 198\r
d9177625 199 //\r
200 // UEFI 2.0 added an event group for notificaiton on memory map changes.\r
201 // So we need to signal this Event Group every time the memory map changes.\r
202 // If we are in EFI 1.10 compatability mode no event groups will be\r
203 // found and nothing will happen we we call this function. These events\r
204 // will get signaled but since a lock is held around the call to this\r
205 // function the notificaiton events will only be called after this funciton\r
206 // returns and the lock is released.\r
207 //\r
208 CoreNotifySignalList (&gEfiEventMemoryMapChangeGuid);\r
162ed594 209\r
d9177625 210 //\r
211 // Look for adjoining memory descriptor\r
212 //\r
28a00297 213\r
d9177625 214 // Two memory descriptors can only be merged if they have the same Type\r
215 // and the same Attribute\r
216 //\r
162ed594 217\r
d9177625 218 Link = gMemoryMap.ForwardLink;\r
219 while (Link != &gMemoryMap) {\r
220 Entry = CR (Link, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
221 Link = Link->ForwardLink;\r
162ed594 222\r
d9177625 223 if (Entry->Type != Type) {\r
224 continue;\r
225 }\r
226\r
227 if (Entry->Attribute != Attribute) {\r
228 continue;\r
229 }\r
230\r
231 if (Entry->End + 1 == Start) {\r
232\r
233 Start = Entry->Start;\r
234 RemoveMemoryMapEntry (Entry);\r
235\r
236 } else if (Entry->Start == End + 1) {\r
237\r
238 End = Entry->End;\r
239 RemoveMemoryMapEntry (Entry);\r
240 }\r
241 }\r
242\r
243 //\r
244 // Add descriptor\r
245 //\r
246\r
247 mMapStack[mMapDepth].Signature = MEMORY_MAP_SIGNATURE;\r
248 mMapStack[mMapDepth].FromPages = FALSE;\r
249 mMapStack[mMapDepth].Type = Type;\r
250 mMapStack[mMapDepth].Start = Start;\r
251 mMapStack[mMapDepth].End = End;\r
252 mMapStack[mMapDepth].VirtualStart = 0;\r
253 mMapStack[mMapDepth].Attribute = Attribute;\r
254 InsertTailList (&gMemoryMap, &mMapStack[mMapDepth].Link);\r
255\r
256 mMapDepth += 1;\r
257 ASSERT (mMapDepth < MAX_MAP_DEPTH);\r
258\r
259 return ;\r
260}\r
022c6d45 261\r
162ed594 262/**\r
263 Internal function. Deque a descriptor entry from the mFreeMemoryMapEntryList.\r
264 If the list is emtry, then allocate a new page to refuel the list.\r
265 Please Note this algorithm to allocate the memory map descriptor has a property\r
266 that the memory allocated for memory entries always grows, and will never really be freed\r
267 For example, if the current boot uses 2000 memory map entries at the maximum point, but\r
268 ends up with only 50 at the time the OS is booted, then the memory associated with the 1950\r
269 memory map entries is still allocated from EfiBootServicesMemory.\r
270\r
271\r
272 @return The Memory map descriptor dequed from the mFreeMemoryMapEntryList\r
273\r
274**/\r
28a00297 275MEMORY_MAP *\r
276AllocateMemoryMapEntry (\r
277 VOID\r
d9177625 278 )\r
279{\r
280 MEMORY_MAP* FreeDescriptorEntries;\r
281 MEMORY_MAP* Entry;\r
282 UINTN Index;\r
283\r
284 if (IsListEmpty (&mFreeMemoryMapEntryList)) {\r
285 //\r
286 // The list is empty, to allocate one page to refuel the list\r
287 //\r
288 FreeDescriptorEntries = CoreAllocatePoolPages (EfiBootServicesData, EFI_SIZE_TO_PAGES(DEFAULT_PAGE_ALLOCATION), DEFAULT_PAGE_ALLOCATION);\r
289 if(FreeDescriptorEntries != NULL) {\r
290 //\r
291 // Enque the free memmory map entries into the list\r
292 //\r
293 for (Index = 0; Index< DEFAULT_PAGE_ALLOCATION / sizeof(MEMORY_MAP); Index++) {\r
294 FreeDescriptorEntries[Index].Signature = MEMORY_MAP_SIGNATURE;\r
295 InsertTailList (&mFreeMemoryMapEntryList, &FreeDescriptorEntries[Index].Link);\r
296 }\r
297 } else {\r
298 return NULL;\r
299 }\r
300 }\r
301 //\r
302 // dequeue the first descriptor from the list\r
303 //\r
304 Entry = CR (mFreeMemoryMapEntryList.ForwardLink, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
305 RemoveEntryList (&Entry->Link);\r
306\r
307 return Entry;\r
308}\r
022c6d45 309\r
162ed594 310\r
311/**\r
d9177625 312 Internal function. Moves any memory descriptors that are on the\r
313 temporary descriptor stack to heap.\r
162ed594 314\r
315**/\r
28a00297 316VOID\r
d9177625 317CoreFreeMemoryMapStack (\r
28a00297 318 VOID\r
319 )\r
28a00297 320{\r
d9177625 321 MEMORY_MAP *Entry;\r
322 MEMORY_MAP *Entry2;\r
323 LIST_ENTRY *Link2;\r
28a00297 324\r
d9177625 325 ASSERT_LOCKED (&gMemoryLock);\r
28a00297 326\r
d9177625 327 //\r
328 // If already freeing the map stack, then return\r
329 //\r
330 if (mFreeMapStack != 0) {\r
331 return ;\r
332 }\r
162ed594 333\r
d9177625 334 //\r
335 // Move the temporary memory descriptor stack into pool\r
336 //\r
337 mFreeMapStack += 1;\r
162ed594 338\r
d9177625 339 while (mMapDepth != 0) {\r
340 //\r
341 // Deque an memory map entry from mFreeMemoryMapEntryList\r
342 //\r
343 Entry = AllocateMemoryMapEntry ();\r
344\r
345 ASSERT (Entry);\r
346\r
347 //\r
348 // Update to proper entry\r
349 //\r
350 mMapDepth -= 1;\r
351\r
352 if (mMapStack[mMapDepth].Link.ForwardLink != NULL) {\r
353\r
354 //\r
355 // Move this entry to general memory\r
356 //\r
357 RemoveEntryList (&mMapStack[mMapDepth].Link);\r
358 mMapStack[mMapDepth].Link.ForwardLink = NULL;\r
359\r
360 CopyMem (Entry , &mMapStack[mMapDepth], sizeof (MEMORY_MAP));\r
361 Entry->FromPages = TRUE;\r
362\r
363 //\r
364 // Find insertion location\r
365 //\r
366 for (Link2 = gMemoryMap.ForwardLink; Link2 != &gMemoryMap; Link2 = Link2->ForwardLink) {\r
367 Entry2 = CR (Link2, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
368 if (Entry2->FromPages && Entry2->Start > Entry->Start) {\r
369 break;\r
370 }\r
371 }\r
372\r
373 InsertTailList (Link2, &Entry->Link);\r
374\r
375 } else {\r
376 //\r
377 // This item of mMapStack[mMapDepth] has already been dequeued from gMemoryMap list,\r
378 // so here no need to move it to memory.\r
379 //\r
380 InsertTailList (&mFreeMemoryMapEntryList, &Entry->Link);\r
381 }\r
382 }\r
28a00297 383\r
d9177625 384 mFreeMapStack -= 1;\r
385}\r
162ed594 386\r
387/**\r
388 Find untested but initialized memory regions in GCD map and convert them to be DXE allocatable.\r
389\r
390**/\r
2345e7d4 391BOOLEAN\r
28a00297 392PromoteMemoryResource (\r
393 VOID\r
394 )\r
28a00297 395{\r
2345e7d4 396 LIST_ENTRY *Link;\r
397 EFI_GCD_MAP_ENTRY *Entry;\r
398 BOOLEAN Promoted;\r
28a00297 399\r
d45fd260 400 DEBUG ((DEBUG_PAGE, "Promote the memory resource\n"));\r
022c6d45 401\r
28a00297 402 CoreAcquireGcdMemoryLock ();\r
022c6d45 403\r
2345e7d4 404 Promoted = FALSE;\r
28a00297 405 Link = mGcdMemorySpaceMap.ForwardLink;\r
406 while (Link != &mGcdMemorySpaceMap) {\r
407\r
408 Entry = CR (Link, EFI_GCD_MAP_ENTRY, Link, EFI_GCD_MAP_SIGNATURE);\r
409\r
410 if (Entry->GcdMemoryType == EfiGcdMemoryTypeReserved &&\r
f3f2e05d 411 Entry->EndAddress < MAX_ADDRESS &&\r
28a00297 412 (Entry->Capabilities & (EFI_MEMORY_PRESENT | EFI_MEMORY_INITIALIZED | EFI_MEMORY_TESTED)) ==\r
413 (EFI_MEMORY_PRESENT | EFI_MEMORY_INITIALIZED)) {\r
414 //\r
415 // Update the GCD map\r
416 //\r
417 Entry->GcdMemoryType = EfiGcdMemoryTypeSystemMemory;\r
418 Entry->Capabilities |= EFI_MEMORY_TESTED;\r
419 Entry->ImageHandle = gDxeCoreImageHandle;\r
420 Entry->DeviceHandle = NULL;\r
421\r
422 //\r
423 // Add to allocable system memory resource\r
022c6d45 424 //\r
28a00297 425\r
426 CoreAddRange (\r
022c6d45 427 EfiConventionalMemory,\r
428 Entry->BaseAddress,\r
429 Entry->EndAddress,\r
28a00297 430 Entry->Capabilities & ~(EFI_MEMORY_PRESENT | EFI_MEMORY_INITIALIZED | EFI_MEMORY_TESTED | EFI_MEMORY_RUNTIME)\r
431 );\r
432 CoreFreeMemoryMapStack ();\r
022c6d45 433\r
2345e7d4 434 Promoted = TRUE;\r
28a00297 435 }\r
436\r
437 Link = Link->ForwardLink;\r
438 }\r
022c6d45 439\r
28a00297 440 CoreReleaseGcdMemoryLock ();\r
022c6d45 441\r
2345e7d4 442 return Promoted;\r
28a00297 443}\r
54ea99a7 444/**\r
445 This function try to allocate Runtime code & Boot time code memory range. If LMFA enabled, 2 patchable PCD \r
446 PcdLoadFixAddressRuntimeCodePageNumber & PcdLoadFixAddressBootTimeCodePageNumber which are set by tools will record the \r
447 size of boot time and runtime code.\r
28a00297 448\r
54ea99a7 449**/\r
450VOID\r
451CoreLoadingFixedAddressHook (\r
452 VOID\r
453 )\r
454{\r
455 UINT32 RuntimeCodePageNumber;\r
456 UINT32 BootTimeCodePageNumber;\r
457 EFI_PHYSICAL_ADDRESS RuntimeCodeBase;\r
458 EFI_PHYSICAL_ADDRESS BootTimeCodeBase;\r
459 EFI_STATUS Status;\r
460\r
461 //\r
462 // Make sure these 2 areas are not initialzied.\r
463 //\r
464 if (!gLoadFixedAddressCodeMemoryReady) { \r
465 RuntimeCodePageNumber = PcdGet32(PcdLoadFixAddressRuntimeCodePageNumber);\r
466 BootTimeCodePageNumber= PcdGet32(PcdLoadFixAddressBootTimeCodePageNumber);\r
467 RuntimeCodeBase = (EFI_PHYSICAL_ADDRESS)(gLoadModuleAtFixAddressConfigurationTable.DxeCodeTopAddress - EFI_PAGES_TO_SIZE (RuntimeCodePageNumber));\r
468 BootTimeCodeBase = (EFI_PHYSICAL_ADDRESS)(RuntimeCodeBase - EFI_PAGES_TO_SIZE (BootTimeCodePageNumber));\r
469 //\r
470 // Try to allocate runtime memory.\r
471 //\r
472 Status = CoreAllocatePages (\r
473 AllocateAddress,\r
474 EfiRuntimeServicesCode,\r
475 RuntimeCodePageNumber,\r
476 &RuntimeCodeBase\r
477 );\r
478 if (EFI_ERROR(Status)) {\r
479 //\r
480 // Runtime memory allocation failed \r
481 //\r
482 return;\r
483 }\r
484 //\r
485 // Try to allocate boot memory.\r
486 //\r
487 Status = CoreAllocatePages (\r
488 AllocateAddress,\r
489 EfiBootServicesCode,\r
490 BootTimeCodePageNumber,\r
491 &BootTimeCodeBase\r
492 );\r
493 if (EFI_ERROR(Status)) {\r
494 //\r
495 // boot memory allocation failed. Free Runtime code range and will try the allocation again when \r
496 // new memory range is installed.\r
497 //\r
498 CoreFreePages (\r
499 RuntimeCodeBase,\r
500 RuntimeCodePageNumber\r
501 );\r
502 return;\r
503 }\r
504 gLoadFixedAddressCodeMemoryReady = TRUE;\r
505 } \r
506 return;\r
507} \r
28a00297 508\r
162ed594 509/**\r
28a00297 510 Called to initialize the memory map and add descriptors to\r
511 the current descriptor list.\r
28a00297 512 The first descriptor that is added must be general usable\r
513 memory as the addition allocates heap.\r
514\r
022c6d45 515 @param Type The type of memory to add\r
516 @param Start The starting address in the memory range Must be\r
517 page aligned\r
518 @param NumberOfPages The number of pages in the range\r
519 @param Attribute Attributes of the memory to add\r
28a00297 520\r
162ed594 521 @return None. The range is added to the memory map\r
28a00297 522\r
162ed594 523**/\r
524VOID\r
525CoreAddMemoryDescriptor (\r
526 IN EFI_MEMORY_TYPE Type,\r
527 IN EFI_PHYSICAL_ADDRESS Start,\r
528 IN UINT64 NumberOfPages,\r
529 IN UINT64 Attribute\r
530 )\r
28a00297 531{\r
532 EFI_PHYSICAL_ADDRESS End;\r
533 EFI_STATUS Status;\r
534 UINTN Index;\r
535 UINTN FreeIndex;\r
54ea99a7 536 \r
28a00297 537 if ((Start & EFI_PAGE_MASK) != 0) {\r
538 return;\r
539 }\r
540\r
541 if (Type >= EfiMaxMemoryType && Type <= 0x7fffffff) {\r
542 return;\r
543 }\r
28a00297 544 CoreAcquireMemoryLock ();\r
545 End = Start + LShiftU64 (NumberOfPages, EFI_PAGE_SHIFT) - 1;\r
546 CoreAddRange (Type, Start, End, Attribute);\r
547 CoreFreeMemoryMapStack ();\r
548 CoreReleaseMemoryLock ();\r
549\r
54ea99a7 550 //\r
551 // If Loading Module At Fixed Address feature is enabled. try to allocate memory with Runtime code & Boot time code type\r
552 //\r
852081fc 553 if (PcdGet64(PcdLoadModuleAtFixAddressEnable) != 0) {\r
54ea99a7 554 CoreLoadingFixedAddressHook();\r
555 }\r
556 \r
28a00297 557 //\r
558 // Check to see if the statistics for the different memory types have already been established\r
559 //\r
560 if (mMemoryTypeInformationInitialized) {\r
561 return;\r
562 }\r
563\r
54ea99a7 564 \r
28a00297 565 //\r
566 // Loop through each memory type in the order specified by the gMemoryTypeInformation[] array\r
567 //\r
568 for (Index = 0; gMemoryTypeInformation[Index].Type != EfiMaxMemoryType; Index++) {\r
569 //\r
570 // Make sure the memory type in the gMemoryTypeInformation[] array is valid\r
571 //\r
572 Type = (EFI_MEMORY_TYPE) (gMemoryTypeInformation[Index].Type);\r
3d78c020 573 if ((UINT32)Type > EfiMaxMemoryType) {\r
28a00297 574 continue;\r
575 }\r
28a00297 576 if (gMemoryTypeInformation[Index].NumberOfPages != 0) {\r
577 //\r
578 // Allocate pages for the current memory type from the top of available memory\r
579 //\r
580 Status = CoreAllocatePages (\r
581 AllocateAnyPages,\r
582 Type,\r
583 gMemoryTypeInformation[Index].NumberOfPages,\r
584 &mMemoryTypeStatistics[Type].BaseAddress\r
585 );\r
586 if (EFI_ERROR (Status)) {\r
587 //\r
022c6d45 588 // If an error occurs allocating the pages for the current memory type, then\r
28a00297 589 // free all the pages allocates for the previous memory types and return. This\r
590 // operation with be retied when/if more memory is added to the system\r
591 //\r
592 for (FreeIndex = 0; FreeIndex < Index; FreeIndex++) {\r
593 //\r
594 // Make sure the memory type in the gMemoryTypeInformation[] array is valid\r
595 //\r
596 Type = (EFI_MEMORY_TYPE) (gMemoryTypeInformation[FreeIndex].Type);\r
3d78c020 597 if ((UINT32)Type > EfiMaxMemoryType) {\r
28a00297 598 continue;\r
599 }\r
600\r
601 if (gMemoryTypeInformation[FreeIndex].NumberOfPages != 0) {\r
602 CoreFreePages (\r
022c6d45 603 mMemoryTypeStatistics[Type].BaseAddress,\r
28a00297 604 gMemoryTypeInformation[FreeIndex].NumberOfPages\r
605 );\r
606 mMemoryTypeStatistics[Type].BaseAddress = 0;\r
f3f2e05d 607 mMemoryTypeStatistics[Type].MaximumAddress = MAX_ADDRESS;\r
28a00297 608 }\r
609 }\r
610 return;\r
611 }\r
612\r
613 //\r
614 // Compute the address at the top of the current statistics\r
615 //\r
022c6d45 616 mMemoryTypeStatistics[Type].MaximumAddress =\r
617 mMemoryTypeStatistics[Type].BaseAddress +\r
28a00297 618 LShiftU64 (gMemoryTypeInformation[Index].NumberOfPages, EFI_PAGE_SHIFT) - 1;\r
619\r
620 //\r
022c6d45 621 // If the current base address is the lowest address so far, then update the default\r
28a00297 622 // maximum address\r
623 //\r
624 if (mMemoryTypeStatistics[Type].BaseAddress < mDefaultMaximumAddress) {\r
625 mDefaultMaximumAddress = mMemoryTypeStatistics[Type].BaseAddress - 1;\r
626 }\r
627 }\r
628 }\r
629\r
630 //\r
631 // There was enough system memory for all the the memory types were allocated. So,\r
632 // those memory areas can be freed for future allocations, and all future memory\r
633 // allocations can occur within their respective bins\r
634 //\r
635 for (Index = 0; gMemoryTypeInformation[Index].Type != EfiMaxMemoryType; Index++) {\r
636 //\r
637 // Make sure the memory type in the gMemoryTypeInformation[] array is valid\r
638 //\r
639 Type = (EFI_MEMORY_TYPE) (gMemoryTypeInformation[Index].Type);\r
3d78c020 640 if ((UINT32)Type > EfiMaxMemoryType) {\r
28a00297 641 continue;\r
642 }\r
28a00297 643 if (gMemoryTypeInformation[Index].NumberOfPages != 0) {\r
644 CoreFreePages (\r
022c6d45 645 mMemoryTypeStatistics[Type].BaseAddress,\r
28a00297 646 gMemoryTypeInformation[Index].NumberOfPages\r
647 );\r
b74350e9 648 mMemoryTypeStatistics[Type].NumberOfPages = gMemoryTypeInformation[Index].NumberOfPages;\r
28a00297 649 gMemoryTypeInformation[Index].NumberOfPages = 0;\r
650 }\r
651 }\r
652\r
653 //\r
654 // If the number of pages reserved for a memory type is 0, then all allocations for that type\r
655 // should be in the default range.\r
656 //\r
657 for (Type = (EFI_MEMORY_TYPE) 0; Type < EfiMaxMemoryType; Type++) {\r
658 for (Index = 0; gMemoryTypeInformation[Index].Type != EfiMaxMemoryType; Index++) {\r
659 if (Type == (EFI_MEMORY_TYPE)gMemoryTypeInformation[Index].Type) {\r
660 mMemoryTypeStatistics[Type].InformationIndex = Index;\r
661 }\r
662 }\r
663 mMemoryTypeStatistics[Type].CurrentNumberOfPages = 0;\r
f3f2e05d 664 if (mMemoryTypeStatistics[Type].MaximumAddress == MAX_ADDRESS) {\r
28a00297 665 mMemoryTypeStatistics[Type].MaximumAddress = mDefaultMaximumAddress;\r
666 }\r
667 }\r
668\r
669 mMemoryTypeInformationInitialized = TRUE;\r
670}\r
671\r
672\r
162ed594 673/**\r
674 Internal function. Converts a memory range to the specified type.\r
675 The range must exist in the memory map.\r
676\r
022c6d45 677 @param Start The first address of the range Must be page\r
678 aligned\r
679 @param NumberOfPages The number of pages to convert\r
680 @param NewType The new type for the memory range\r
162ed594 681\r
022c6d45 682 @retval EFI_INVALID_PARAMETER Invalid parameter\r
683 @retval EFI_NOT_FOUND Could not find a descriptor cover the specified\r
684 range or convertion not allowed.\r
685 @retval EFI_SUCCESS Successfully converts the memory range to the\r
162ed594 686 specified type.\r
687\r
688**/\r
28a00297 689EFI_STATUS\r
690CoreConvertPages (\r
691 IN UINT64 Start,\r
692 IN UINT64 NumberOfPages,\r
693 IN EFI_MEMORY_TYPE NewType\r
694 )\r
28a00297 695{\r
696\r
697 UINT64 NumberOfBytes;\r
698 UINT64 End;\r
699 UINT64 RangeEnd;\r
700 UINT64 Attribute;\r
701 LIST_ENTRY *Link;\r
702 MEMORY_MAP *Entry;\r
703\r
704 Entry = NULL;\r
705 NumberOfBytes = LShiftU64 (NumberOfPages, EFI_PAGE_SHIFT);\r
706 End = Start + NumberOfBytes - 1;\r
707\r
708 ASSERT (NumberOfPages);\r
709 ASSERT ((Start & EFI_PAGE_MASK) == 0);\r
710 ASSERT (End > Start) ;\r
711 ASSERT_LOCKED (&gMemoryLock);\r
712\r
71f68914 713 if (NumberOfPages == 0 || ((Start & EFI_PAGE_MASK) != 0) || (Start > (Start + NumberOfBytes))) {\r
28a00297 714 return EFI_INVALID_PARAMETER;\r
715 }\r
716\r
717 //\r
718 // Convert the entire range\r
719 //\r
720\r
721 while (Start < End) {\r
722\r
723 //\r
724 // Find the entry that the covers the range\r
725 //\r
726 for (Link = gMemoryMap.ForwardLink; Link != &gMemoryMap; Link = Link->ForwardLink) {\r
727 Entry = CR (Link, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
728\r
729 if (Entry->Start <= Start && Entry->End > Start) {\r
730 break;\r
731 }\r
732 }\r
733\r
734 if (Link == &gMemoryMap) {\r
162ed594 735 DEBUG ((DEBUG_ERROR | DEBUG_PAGE, "ConvertPages: failed to find range %lx - %lx\n", Start, End));\r
28a00297 736 return EFI_NOT_FOUND;\r
737 }\r
738\r
739 //\r
740 // Convert range to the end, or to the end of the descriptor\r
741 // if that's all we've got\r
742 //\r
743 RangeEnd = End;\r
525aded9 744\r
745 ASSERT (Entry != NULL);\r
28a00297 746 if (Entry->End < End) {\r
747 RangeEnd = Entry->End;\r
748 }\r
749\r
162ed594 750 DEBUG ((DEBUG_PAGE, "ConvertRange: %lx-%lx to %d\n", Start, RangeEnd, NewType));\r
28a00297 751\r
752 //\r
753 // Debug code - verify conversion is allowed\r
754 //\r
755 if (!(NewType == EfiConventionalMemory ? 1 : 0) ^ (Entry->Type == EfiConventionalMemory ? 1 : 0)) {\r
d45fd260 756 DEBUG ((DEBUG_ERROR | DEBUG_PAGE, "ConvertPages: Incompatible memory types\n"));\r
28a00297 757 return EFI_NOT_FOUND;\r
022c6d45 758 }\r
28a00297 759\r
760 //\r
761 // Update counters for the number of pages allocated to each memory type\r
762 //\r
3d78c020 763 if ((UINT32)Entry->Type < EfiMaxMemoryType) {\r
2345e7d4 764 if ((Start >= mMemoryTypeStatistics[Entry->Type].BaseAddress && Start <= mMemoryTypeStatistics[Entry->Type].MaximumAddress) ||\r
765 (Start >= mDefaultBaseAddress && Start <= mDefaultMaximumAddress) ) {\r
28a00297 766 if (NumberOfPages > mMemoryTypeStatistics[Entry->Type].CurrentNumberOfPages) {\r
767 mMemoryTypeStatistics[Entry->Type].CurrentNumberOfPages = 0;\r
768 } else {\r
769 mMemoryTypeStatistics[Entry->Type].CurrentNumberOfPages -= NumberOfPages;\r
770 }\r
771 }\r
772 }\r
773\r
3d78c020 774 if ((UINT32)NewType < EfiMaxMemoryType) {\r
2345e7d4 775 if ((Start >= mMemoryTypeStatistics[NewType].BaseAddress && Start <= mMemoryTypeStatistics[NewType].MaximumAddress) ||\r
776 (Start >= mDefaultBaseAddress && Start <= mDefaultMaximumAddress) ) {\r
28a00297 777 mMemoryTypeStatistics[NewType].CurrentNumberOfPages += NumberOfPages;\r
2345e7d4 778 if (mMemoryTypeStatistics[NewType].CurrentNumberOfPages > gMemoryTypeInformation[mMemoryTypeStatistics[NewType].InformationIndex].NumberOfPages) {\r
28a00297 779 gMemoryTypeInformation[mMemoryTypeStatistics[NewType].InformationIndex].NumberOfPages = (UINT32)mMemoryTypeStatistics[NewType].CurrentNumberOfPages;\r
780 }\r
781 }\r
782 }\r
783\r
784 //\r
785 // Pull range out of descriptor\r
786 //\r
787 if (Entry->Start == Start) {\r
022c6d45 788\r
28a00297 789 //\r
790 // Clip start\r
791 //\r
792 Entry->Start = RangeEnd + 1;\r
793\r
794 } else if (Entry->End == RangeEnd) {\r
022c6d45 795\r
28a00297 796 //\r
797 // Clip end\r
798 //\r
799 Entry->End = Start - 1;\r
800\r
801 } else {\r
802\r
803 //\r
804 // Pull it out of the center, clip current\r
805 //\r
022c6d45 806\r
28a00297 807 //\r
808 // Add a new one\r
809 //\r
810 mMapStack[mMapDepth].Signature = MEMORY_MAP_SIGNATURE;\r
811 mMapStack[mMapDepth].FromPages = FALSE;\r
812 mMapStack[mMapDepth].Type = Entry->Type;\r
813 mMapStack[mMapDepth].Start = RangeEnd+1;\r
814 mMapStack[mMapDepth].End = Entry->End;\r
815\r
816 //\r
817 // Inherit Attribute from the Memory Descriptor that is being clipped\r
818 //\r
819 mMapStack[mMapDepth].Attribute = Entry->Attribute;\r
820\r
821 Entry->End = Start - 1;\r
822 ASSERT (Entry->Start < Entry->End);\r
823\r
824 Entry = &mMapStack[mMapDepth];\r
825 InsertTailList (&gMemoryMap, &Entry->Link);\r
826\r
827 mMapDepth += 1;\r
828 ASSERT (mMapDepth < MAX_MAP_DEPTH);\r
829 }\r
830\r
831 //\r
022c6d45 832 // The new range inherits the same Attribute as the Entry\r
28a00297 833 //it is being cut out of\r
834 //\r
835 Attribute = Entry->Attribute;\r
836\r
837 //\r
838 // If the descriptor is empty, then remove it from the map\r
839 //\r
840 if (Entry->Start == Entry->End + 1) {\r
841 RemoveMemoryMapEntry (Entry);\r
842 Entry = NULL;\r
843 }\r
022c6d45 844\r
28a00297 845 //\r
846 // Add our new range in\r
847 //\r
848 CoreAddRange (NewType, Start, RangeEnd, Attribute);\r
38c7df98 849 if (NewType == EfiConventionalMemory) {\r
9a340872 850 //\r
851 // Avoid calling DEBUG_CLEAR_MEMORY() for an address of 0 because this\r
852 // macro will ASSERT() if address is 0. Instead, CoreAddRange() guarantees\r
853 // that the page starting at address 0 is always filled with zeros.\r
854 //\r
855 if (Start == 0) {\r
856 if (RangeEnd > EFI_PAGE_SIZE) {\r
857 DEBUG_CLEAR_MEMORY ((VOID *)(UINTN) EFI_PAGE_SIZE, (UINTN) (RangeEnd - EFI_PAGE_SIZE + 1));\r
858 }\r
859 } else {\r
860 DEBUG_CLEAR_MEMORY ((VOID *)(UINTN) Start, (UINTN) (RangeEnd - Start + 1));\r
861 }\r
38c7df98 862 }\r
28a00297 863\r
864 //\r
865 // Move any map descriptor stack to general pool\r
866 //\r
867 CoreFreeMemoryMapStack ();\r
868\r
869 //\r
870 // Bump the starting address, and convert the next range\r
871 //\r
872 Start = RangeEnd + 1;\r
873 }\r
874\r
875 //\r
876 // Converted the whole range, done\r
877 //\r
878\r
879 return EFI_SUCCESS;\r
880}\r
881\r
882\r
162ed594 883\r
884/**\r
885 Internal function. Finds a consecutive free page range below\r
886 the requested address.\r
887\r
022c6d45 888 @param MaxAddress The address that the range must be below\r
35f9e94e 889 @param MinAddress The address that the range must be above\r
022c6d45 890 @param NumberOfPages Number of pages needed\r
891 @param NewType The type of memory the range is going to be\r
892 turned into\r
893 @param Alignment Bits to align with\r
162ed594 894\r
895 @return The base address of the range, or 0 if the range was not found\r
896\r
897**/\r
28a00297 898UINT64\r
899CoreFindFreePagesI (\r
900 IN UINT64 MaxAddress,\r
2345e7d4 901 IN UINT64 MinAddress,\r
28a00297 902 IN UINT64 NumberOfPages,\r
903 IN EFI_MEMORY_TYPE NewType,\r
904 IN UINTN Alignment\r
905 )\r
28a00297 906{\r
907 UINT64 NumberOfBytes;\r
908 UINT64 Target;\r
909 UINT64 DescStart;\r
910 UINT64 DescEnd;\r
911 UINT64 DescNumberOfBytes;\r
912 LIST_ENTRY *Link;\r
913 MEMORY_MAP *Entry;\r
914\r
915 if ((MaxAddress < EFI_PAGE_MASK) ||(NumberOfPages == 0)) {\r
916 return 0;\r
917 }\r
918\r
919 if ((MaxAddress & EFI_PAGE_MASK) != EFI_PAGE_MASK) {\r
022c6d45 920\r
28a00297 921 //\r
922 // If MaxAddress is not aligned to the end of a page\r
923 //\r
022c6d45 924\r
28a00297 925 //\r
926 // Change MaxAddress to be 1 page lower\r
927 //\r
928 MaxAddress -= (EFI_PAGE_MASK + 1);\r
022c6d45 929\r
28a00297 930 //\r
931 // Set MaxAddress to a page boundary\r
932 //\r
6e1e5405 933 MaxAddress &= ~(UINT64)EFI_PAGE_MASK;\r
022c6d45 934\r
28a00297 935 //\r
936 // Set MaxAddress to end of the page\r
937 //\r
938 MaxAddress |= EFI_PAGE_MASK;\r
939 }\r
940\r
941 NumberOfBytes = LShiftU64 (NumberOfPages, EFI_PAGE_SHIFT);\r
942 Target = 0;\r
943\r
944 for (Link = gMemoryMap.ForwardLink; Link != &gMemoryMap; Link = Link->ForwardLink) {\r
945 Entry = CR (Link, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
022c6d45 946\r
28a00297 947 //\r
948 // If it's not a free entry, don't bother with it\r
949 //\r
950 if (Entry->Type != EfiConventionalMemory) {\r
951 continue;\r
952 }\r
953\r
954 DescStart = Entry->Start;\r
955 DescEnd = Entry->End;\r
956\r
957 //\r
2345e7d4 958 // If desc is past max allowed address or below min allowed address, skip it\r
28a00297 959 //\r
2345e7d4 960 if ((DescStart >= MaxAddress) || (DescEnd < MinAddress)) {\r
28a00297 961 continue;\r
962 }\r
963\r
964 //\r
965 // If desc ends past max allowed address, clip the end\r
966 //\r
967 if (DescEnd >= MaxAddress) {\r
968 DescEnd = MaxAddress;\r
969 }\r
970\r
971 DescEnd = ((DescEnd + 1) & (~(Alignment - 1))) - 1;\r
972\r
973 //\r
022c6d45 974 // Compute the number of bytes we can used from this\r
28a00297 975 // descriptor, and see it's enough to satisfy the request\r
976 //\r
977 DescNumberOfBytes = DescEnd - DescStart + 1;\r
978\r
979 if (DescNumberOfBytes >= NumberOfBytes) {\r
2345e7d4 980 //\r
981 // If the start of the allocated range is below the min address allowed, skip it\r
982 //\r
983 if ((DescEnd - NumberOfBytes + 1) < MinAddress) {\r
984 continue;\r
985 }\r
28a00297 986\r
987 //\r
988 // If this is the best match so far remember it\r
989 //\r
990 if (DescEnd > Target) {\r
991 Target = DescEnd;\r
992 }\r
993 }\r
022c6d45 994 }\r
28a00297 995\r
996 //\r
997 // If this is a grow down, adjust target to be the allocation base\r
998 //\r
999 Target -= NumberOfBytes - 1;\r
1000\r
1001 //\r
1002 // If we didn't find a match, return 0\r
1003 //\r
1004 if ((Target & EFI_PAGE_MASK) != 0) {\r
1005 return 0;\r
1006 }\r
1007\r
1008 return Target;\r
1009}\r
1010\r
162ed594 1011\r
1012/**\r
1013 Internal function. Finds a consecutive free page range below\r
1014 the requested address\r
1015\r
022c6d45 1016 @param MaxAddress The address that the range must be below\r
1017 @param NoPages Number of pages needed\r
1018 @param NewType The type of memory the range is going to be\r
1019 turned into\r
1020 @param Alignment Bits to align with\r
162ed594 1021\r
1022 @return The base address of the range, or 0 if the range was not found.\r
1023\r
1024**/\r
28a00297 1025UINT64\r
1026FindFreePages (\r
1027 IN UINT64 MaxAddress,\r
1028 IN UINT64 NoPages,\r
1029 IN EFI_MEMORY_TYPE NewType,\r
1030 IN UINTN Alignment\r
1031 )\r
28a00297 1032{\r
2345e7d4 1033 UINT64 Start;\r
28a00297 1034\r
2345e7d4 1035 //\r
1036 // Attempt to find free pages in the preferred bin based on the requested memory type\r
1037 //\r
3d78c020 1038 if ((UINT32)NewType < EfiMaxMemoryType && MaxAddress >= mMemoryTypeStatistics[NewType].MaximumAddress) {\r
2345e7d4 1039 Start = CoreFindFreePagesI (\r
1040 mMemoryTypeStatistics[NewType].MaximumAddress, \r
1041 mMemoryTypeStatistics[NewType].BaseAddress, \r
1042 NoPages, \r
1043 NewType, \r
1044 Alignment\r
1045 );\r
1046 if (Start != 0) {\r
1047 return Start;\r
1048 }\r
1049 }\r
28a00297 1050\r
2345e7d4 1051 //\r
1052 // Attempt to find free pages in the default allocation bin\r
1053 //\r
1054 if (MaxAddress >= mDefaultMaximumAddress) {\r
1055 Start = CoreFindFreePagesI (mDefaultMaximumAddress, 0, NoPages, NewType, Alignment);\r
1056 if (Start != 0) {\r
1057 if (Start < mDefaultBaseAddress) {\r
1058 mDefaultBaseAddress = Start;\r
1059 }\r
1060 return Start;\r
28a00297 1061 }\r
1062 }\r
1063\r
2345e7d4 1064 //\r
1065 // The allocation did not succeed in any of the prefered bins even after \r
1066 // promoting resources. Attempt to find free pages anywhere is the requested \r
1067 // address range. If this allocation fails, then there are not enough \r
1068 // resources anywhere to satisfy the request.\r
1069 //\r
1070 Start = CoreFindFreePagesI (MaxAddress, 0, NoPages, NewType, Alignment);\r
1071 if (Start != 0) {\r
1072 return Start;\r
1073 }\r
28a00297 1074\r
2345e7d4 1075 //\r
1076 // If allocations from the preferred bins fail, then attempt to promote memory resources.\r
1077 //\r
1078 if (!PromoteMemoryResource ()) {\r
1079 return 0;\r
28a00297 1080 }\r
1081\r
2345e7d4 1082 //\r
1083 // If any memory resources were promoted, then re-attempt the allocation\r
1084 //\r
1085 return FindFreePages (MaxAddress, NoPages, NewType, Alignment);\r
28a00297 1086}\r
1087\r
1088\r
162ed594 1089/**\r
1090 Allocates pages from the memory map.\r
1091\r
022c6d45 1092 @param Type The type of allocation to perform\r
1093 @param MemoryType The type of memory to turn the allocated pages\r
1094 into\r
1095 @param NumberOfPages The number of pages to allocate\r
1096 @param Memory A pointer to receive the base allocated memory\r
1097 address\r
162ed594 1098\r
1099 @return Status. On success, Memory is filled in with the base address allocated\r
022c6d45 1100 @retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in\r
1101 spec.\r
1102 @retval EFI_NOT_FOUND Could not allocate pages match the requirement.\r
1103 @retval EFI_OUT_OF_RESOURCES No enough pages to allocate.\r
162ed594 1104 @retval EFI_SUCCESS Pages successfully allocated.\r
1105\r
1106**/\r
28a00297 1107EFI_STATUS\r
1108EFIAPI\r
84edd20b 1109CoreInternalAllocatePages (\r
28a00297 1110 IN EFI_ALLOCATE_TYPE Type,\r
1111 IN EFI_MEMORY_TYPE MemoryType,\r
1112 IN UINTN NumberOfPages,\r
1113 IN OUT EFI_PHYSICAL_ADDRESS *Memory\r
1114 )\r
28a00297 1115{\r
1116 EFI_STATUS Status;\r
1117 UINT64 Start;\r
1118 UINT64 MaxAddress;\r
1119 UINTN Alignment;\r
1120\r
3d78c020 1121 if ((UINT32)Type >= MaxAllocateType) {\r
28a00297 1122 return EFI_INVALID_PARAMETER;\r
1123 }\r
1124\r
1125 if ((MemoryType >= EfiMaxMemoryType && MemoryType <= 0x7fffffff) ||\r
1126 MemoryType == EfiConventionalMemory) {\r
1127 return EFI_INVALID_PARAMETER;\r
1128 }\r
1129\r
3e058701
ED
1130 if (Memory == NULL) {\r
1131 return EFI_INVALID_PARAMETER;\r
1132 }\r
1133\r
28a00297 1134 Alignment = EFI_DEFAULT_PAGE_ALLOCATION_ALIGNMENT;\r
1135\r
1136 if (MemoryType == EfiACPIReclaimMemory ||\r
1137 MemoryType == EfiACPIMemoryNVS ||\r
1138 MemoryType == EfiRuntimeServicesCode ||\r
1139 MemoryType == EfiRuntimeServicesData) {\r
1140\r
1141 Alignment = EFI_ACPI_RUNTIME_PAGE_ALLOCATION_ALIGNMENT;\r
1142 }\r
1143\r
1144 if (Type == AllocateAddress) {\r
1145 if ((*Memory & (Alignment - 1)) != 0) {\r
1146 return EFI_NOT_FOUND;\r
1147 }\r
1148 }\r
1149\r
1150 NumberOfPages += EFI_SIZE_TO_PAGES (Alignment) - 1;\r
1151 NumberOfPages &= ~(EFI_SIZE_TO_PAGES (Alignment) - 1);\r
1152\r
1153 //\r
022c6d45 1154 // If this is for below a particular address, then\r
28a00297 1155 //\r
1156 Start = *Memory;\r
022c6d45 1157\r
28a00297 1158 //\r
1159 // The max address is the max natively addressable address for the processor\r
1160 //\r
f3f2e05d 1161 MaxAddress = MAX_ADDRESS;\r
022c6d45 1162\r
28a00297 1163 if (Type == AllocateMaxAddress) {\r
1164 MaxAddress = Start;\r
1165 }\r
1166\r
1167 CoreAcquireMemoryLock ();\r
022c6d45 1168\r
28a00297 1169 //\r
1170 // If not a specific address, then find an address to allocate\r
1171 //\r
1172 if (Type != AllocateAddress) {\r
1173 Start = FindFreePages (MaxAddress, NumberOfPages, MemoryType, Alignment);\r
1174 if (Start == 0) {\r
1175 Status = EFI_OUT_OF_RESOURCES;\r
1176 goto Done;\r
1177 }\r
1178 }\r
1179\r
1180 //\r
1181 // Convert pages from FreeMemory to the requested type\r
1182 //\r
1183 Status = CoreConvertPages (Start, NumberOfPages, MemoryType);\r
1184\r
1185Done:\r
1186 CoreReleaseMemoryLock ();\r
1187\r
1188 if (!EFI_ERROR (Status)) {\r
1189 *Memory = Start;\r
1190 }\r
1191\r
1192 return Status;\r
1193}\r
1194\r
84edd20b
SZ
1195/**\r
1196 Allocates pages from the memory map.\r
1197\r
1198 @param Type The type of allocation to perform\r
1199 @param MemoryType The type of memory to turn the allocated pages\r
1200 into\r
1201 @param NumberOfPages The number of pages to allocate\r
1202 @param Memory A pointer to receive the base allocated memory\r
1203 address\r
1204\r
1205 @return Status. On success, Memory is filled in with the base address allocated\r
1206 @retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in\r
1207 spec.\r
1208 @retval EFI_NOT_FOUND Could not allocate pages match the requirement.\r
1209 @retval EFI_OUT_OF_RESOURCES No enough pages to allocate.\r
1210 @retval EFI_SUCCESS Pages successfully allocated.\r
1211\r
1212**/\r
1213EFI_STATUS\r
1214EFIAPI\r
1215CoreAllocatePages (\r
1216 IN EFI_ALLOCATE_TYPE Type,\r
1217 IN EFI_MEMORY_TYPE MemoryType,\r
1218 IN UINTN NumberOfPages,\r
1219 OUT EFI_PHYSICAL_ADDRESS *Memory\r
1220 )\r
1221{\r
1222 EFI_STATUS Status;\r
1223\r
1224 Status = CoreInternalAllocatePages (Type, MemoryType, NumberOfPages, Memory);\r
1225 if (!EFI_ERROR (Status)) {\r
1226 CoreUpdateProfile ((EFI_PHYSICAL_ADDRESS) (UINTN) RETURN_ADDRESS (0), MemoryProfileActionAllocatePages, MemoryType, EFI_PAGES_TO_SIZE (NumberOfPages), (VOID *) (UINTN) *Memory);\r
1227 }\r
1228 return Status;\r
1229}\r
28a00297 1230\r
162ed594 1231/**\r
1232 Frees previous allocated pages.\r
1233\r
022c6d45 1234 @param Memory Base address of memory being freed\r
1235 @param NumberOfPages The number of pages to free\r
162ed594 1236\r
022c6d45 1237 @retval EFI_NOT_FOUND Could not find the entry that covers the range\r
1238 @retval EFI_INVALID_PARAMETER Address not aligned\r
162ed594 1239 @return EFI_SUCCESS -Pages successfully freed.\r
1240\r
1241**/\r
022c6d45 1242EFI_STATUS\r
28a00297 1243EFIAPI\r
84edd20b 1244CoreInternalFreePages (\r
28a00297 1245 IN EFI_PHYSICAL_ADDRESS Memory,\r
1246 IN UINTN NumberOfPages\r
1247 )\r
28a00297 1248{\r
1249 EFI_STATUS Status;\r
1250 LIST_ENTRY *Link;\r
1251 MEMORY_MAP *Entry;\r
1252 UINTN Alignment;\r
1253\r
1254 //\r
1255 // Free the range\r
1256 //\r
1257 CoreAcquireMemoryLock ();\r
1258\r
1259 //\r
1260 // Find the entry that the covers the range\r
1261 //\r
1262 Entry = NULL;\r
1263 for (Link = gMemoryMap.ForwardLink; Link != &gMemoryMap; Link = Link->ForwardLink) {\r
1264 Entry = CR(Link, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
1265 if (Entry->Start <= Memory && Entry->End > Memory) {\r
1266 break;\r
1267 }\r
1268 }\r
1269 if (Link == &gMemoryMap) {\r
a5ca8fa7 1270 Status = EFI_NOT_FOUND;\r
1271 goto Done;\r
28a00297 1272 }\r
1273\r
1274 Alignment = EFI_DEFAULT_PAGE_ALLOCATION_ALIGNMENT;\r
1275\r
525aded9 1276 ASSERT (Entry != NULL);\r
28a00297 1277 if (Entry->Type == EfiACPIReclaimMemory ||\r
1278 Entry->Type == EfiACPIMemoryNVS ||\r
1279 Entry->Type == EfiRuntimeServicesCode ||\r
1280 Entry->Type == EfiRuntimeServicesData) {\r
1281\r
1282 Alignment = EFI_ACPI_RUNTIME_PAGE_ALLOCATION_ALIGNMENT;\r
1283\r
1284 }\r
1285\r
1286 if ((Memory & (Alignment - 1)) != 0) {\r
a5ca8fa7 1287 Status = EFI_INVALID_PARAMETER;\r
1288 goto Done;\r
28a00297 1289 }\r
1290\r
1291 NumberOfPages += EFI_SIZE_TO_PAGES (Alignment) - 1;\r
1292 NumberOfPages &= ~(EFI_SIZE_TO_PAGES (Alignment) - 1);\r
1293\r
1294 Status = CoreConvertPages (Memory, NumberOfPages, EfiConventionalMemory);\r
1295\r
28a00297 1296 if (EFI_ERROR (Status)) {\r
a5ca8fa7 1297 goto Done;\r
28a00297 1298 }\r
1299\r
a5ca8fa7 1300Done:\r
1301 CoreReleaseMemoryLock ();\r
28a00297 1302 return Status;\r
1303}\r
1304\r
84edd20b
SZ
1305/**\r
1306 Frees previous allocated pages.\r
1307\r
1308 @param Memory Base address of memory being freed\r
1309 @param NumberOfPages The number of pages to free\r
1310\r
1311 @retval EFI_NOT_FOUND Could not find the entry that covers the range\r
1312 @retval EFI_INVALID_PARAMETER Address not aligned\r
1313 @return EFI_SUCCESS -Pages successfully freed.\r
1314\r
1315**/\r
1316EFI_STATUS\r
1317EFIAPI\r
1318CoreFreePages (\r
1319 IN EFI_PHYSICAL_ADDRESS Memory,\r
1320 IN UINTN NumberOfPages\r
1321 )\r
1322{\r
1323 EFI_STATUS Status;\r
1324\r
1325 Status = CoreInternalFreePages (Memory, NumberOfPages);\r
1326 if (!EFI_ERROR (Status)) {\r
1327 CoreUpdateProfile ((EFI_PHYSICAL_ADDRESS) (UINTN) RETURN_ADDRESS (0), MemoryProfileActionFreePages, 0, EFI_PAGES_TO_SIZE (NumberOfPages), (VOID *) (UINTN) Memory);\r
1328 }\r
1329 return Status;\r
1330}\r
1331\r
2345e7d4 1332/**\r
1333 This function checks to see if the last memory map descriptor in a memory map\r
1334 can be merged with any of the other memory map descriptors in a memorymap.\r
1335 Memory descriptors may be merged if they are adjacent and have the same type\r
1336 and attributes.\r
1337\r
1338 @param MemoryMap A pointer to the start of the memory map.\r
1339 @param MemoryMapDescriptor A pointer to the last descriptor in MemoryMap.\r
1340 @param DescriptorSize The size, in bytes, of an individual\r
1341 EFI_MEMORY_DESCRIPTOR.\r
1342\r
1343 @return A pointer to the next available descriptor in MemoryMap\r
1344\r
1345**/\r
1346EFI_MEMORY_DESCRIPTOR *\r
1347MergeMemoryMapDescriptor (\r
1348 IN EFI_MEMORY_DESCRIPTOR *MemoryMap,\r
1349 IN EFI_MEMORY_DESCRIPTOR *MemoryMapDescriptor,\r
1350 IN UINTN DescriptorSize\r
1351 )\r
1352{\r
1353 //\r
1354 // Traverse the array of descriptors in MemoryMap\r
1355 //\r
1356 for (; MemoryMap != MemoryMapDescriptor; MemoryMap = NEXT_MEMORY_DESCRIPTOR (MemoryMap, DescriptorSize)) {\r
1357 //\r
1358 // Check to see if the Type fields are identical.\r
1359 //\r
1360 if (MemoryMap->Type != MemoryMapDescriptor->Type) {\r
1361 continue;\r
1362 }\r
1363\r
1364 //\r
1365 // Check to see if the Attribute fields are identical.\r
1366 //\r
1367 if (MemoryMap->Attribute != MemoryMapDescriptor->Attribute) {\r
1368 continue;\r
1369 }\r
1370\r
1371 //\r
1372 // Check to see if MemoryMapDescriptor is immediately above MemoryMap\r
1373 //\r
1374 if (MemoryMap->PhysicalStart + EFI_PAGES_TO_SIZE ((UINTN)MemoryMap->NumberOfPages) == MemoryMapDescriptor->PhysicalStart) { \r
1375 //\r
1376 // Merge MemoryMapDescriptor into MemoryMap\r
1377 //\r
1378 MemoryMap->NumberOfPages += MemoryMapDescriptor->NumberOfPages;\r
1379\r
1380 //\r
1381 // Return MemoryMapDescriptor as the next available slot int he MemoryMap array\r
1382 //\r
1383 return MemoryMapDescriptor;\r
1384 }\r
1385\r
1386 //\r
1387 // Check to see if MemoryMapDescriptor is immediately below MemoryMap\r
1388 //\r
1389 if (MemoryMap->PhysicalStart - EFI_PAGES_TO_SIZE ((UINTN)MemoryMapDescriptor->NumberOfPages) == MemoryMapDescriptor->PhysicalStart) {\r
1390 //\r
1391 // Merge MemoryMapDescriptor into MemoryMap\r
1392 //\r
1393 MemoryMap->PhysicalStart = MemoryMapDescriptor->PhysicalStart;\r
1394 MemoryMap->VirtualStart = MemoryMapDescriptor->VirtualStart;\r
1395 MemoryMap->NumberOfPages += MemoryMapDescriptor->NumberOfPages;\r
1396\r
1397 //\r
1398 // Return MemoryMapDescriptor as the next available slot int he MemoryMap array\r
1399 //\r
1400 return MemoryMapDescriptor;\r
1401 }\r
1402 }\r
1403\r
1404 //\r
1405 // MemoryMapDescrtiptor could not be merged with any descriptors in MemoryMap.\r
1406 //\r
1407 // Return the slot immediately after MemoryMapDescriptor as the next available \r
1408 // slot in the MemoryMap array\r
1409 //\r
1410 return NEXT_MEMORY_DESCRIPTOR (MemoryMapDescriptor, DescriptorSize);\r
1411}\r
28a00297 1412\r
162ed594 1413/**\r
1414 This function returns a copy of the current memory map. The map is an array of\r
1415 memory descriptors, each of which describes a contiguous block of memory.\r
1416\r
022c6d45 1417 @param MemoryMapSize A pointer to the size, in bytes, of the\r
1418 MemoryMap buffer. On input, this is the size of\r
1419 the buffer allocated by the caller. On output,\r
1420 it is the size of the buffer returned by the\r
1421 firmware if the buffer was large enough, or the\r
1422 size of the buffer needed to contain the map if\r
1423 the buffer was too small.\r
1424 @param MemoryMap A pointer to the buffer in which firmware places\r
1425 the current memory map.\r
1426 @param MapKey A pointer to the location in which firmware\r
1427 returns the key for the current memory map.\r
1428 @param DescriptorSize A pointer to the location in which firmware\r
1429 returns the size, in bytes, of an individual\r
1430 EFI_MEMORY_DESCRIPTOR.\r
1431 @param DescriptorVersion A pointer to the location in which firmware\r
1432 returns the version number associated with the\r
1433 EFI_MEMORY_DESCRIPTOR.\r
1434\r
1435 @retval EFI_SUCCESS The memory map was returned in the MemoryMap\r
1436 buffer.\r
1437 @retval EFI_BUFFER_TOO_SMALL The MemoryMap buffer was too small. The current\r
1438 buffer size needed to hold the memory map is\r
1439 returned in MemoryMapSize.\r
162ed594 1440 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.\r
1441\r
1442**/\r
28a00297 1443EFI_STATUS\r
1444EFIAPI\r
1445CoreGetMemoryMap (\r
1446 IN OUT UINTN *MemoryMapSize,\r
1447 IN OUT EFI_MEMORY_DESCRIPTOR *MemoryMap,\r
1448 OUT UINTN *MapKey,\r
1449 OUT UINTN *DescriptorSize,\r
1450 OUT UINT32 *DescriptorVersion\r
1451 )\r
28a00297 1452{\r
1453 EFI_STATUS Status;\r
022c6d45 1454 UINTN Size;\r
1455 UINTN BufferSize;\r
28a00297 1456 UINTN NumberOfRuntimeEntries;\r
1457 LIST_ENTRY *Link;\r
022c6d45 1458 MEMORY_MAP *Entry;\r
1459 EFI_GCD_MAP_ENTRY *GcdMapEntry;\r
b74350e9 1460 EFI_MEMORY_TYPE Type;\r
2345e7d4 1461 EFI_MEMORY_DESCRIPTOR *MemoryMapStart;\r
28a00297 1462\r
1463 //\r
1464 // Make sure the parameters are valid\r
1465 //\r
1466 if (MemoryMapSize == NULL) {\r
1467 return EFI_INVALID_PARAMETER;\r
1468 }\r
022c6d45 1469\r
28a00297 1470 CoreAcquireGcdMemoryLock ();\r
022c6d45 1471\r
28a00297 1472 //\r
1473 // Count the number of Reserved and MMIO entries that are marked for runtime use\r
1474 //\r
1475 NumberOfRuntimeEntries = 0;\r
1476 for (Link = mGcdMemorySpaceMap.ForwardLink; Link != &mGcdMemorySpaceMap; Link = Link->ForwardLink) {\r
1477 GcdMapEntry = CR (Link, EFI_GCD_MAP_ENTRY, Link, EFI_GCD_MAP_SIGNATURE);\r
1478 if ((GcdMapEntry->GcdMemoryType == EfiGcdMemoryTypeReserved) ||\r
1479 (GcdMapEntry->GcdMemoryType == EfiGcdMemoryTypeMemoryMappedIo)) {\r
1480 if ((GcdMapEntry->Attributes & EFI_MEMORY_RUNTIME) == EFI_MEMORY_RUNTIME) {\r
1481 NumberOfRuntimeEntries++;\r
1482 }\r
1483 }\r
1484 }\r
1485\r
1486 Size = sizeof (EFI_MEMORY_DESCRIPTOR);\r
1487\r
1488 //\r
1489 // Make sure Size != sizeof(EFI_MEMORY_DESCRIPTOR). This will\r
1490 // prevent people from having pointer math bugs in their code.\r
1491 // now you have to use *DescriptorSize to make things work.\r
1492 //\r
1493 Size += sizeof(UINT64) - (Size % sizeof (UINT64));\r
1494\r
1495 if (DescriptorSize != NULL) {\r
1496 *DescriptorSize = Size;\r
1497 }\r
022c6d45 1498\r
28a00297 1499 if (DescriptorVersion != NULL) {\r
1500 *DescriptorVersion = EFI_MEMORY_DESCRIPTOR_VERSION;\r
1501 }\r
1502\r
1503 CoreAcquireMemoryLock ();\r
1504\r
1505 //\r
1506 // Compute the buffer size needed to fit the entire map\r
1507 //\r
1508 BufferSize = Size * NumberOfRuntimeEntries;\r
1509 for (Link = gMemoryMap.ForwardLink; Link != &gMemoryMap; Link = Link->ForwardLink) {\r
1510 BufferSize += Size;\r
1511 }\r
1512\r
1513 if (*MemoryMapSize < BufferSize) {\r
1514 Status = EFI_BUFFER_TOO_SMALL;\r
1515 goto Done;\r
1516 }\r
1517\r
1518 if (MemoryMap == NULL) {\r
1519 Status = EFI_INVALID_PARAMETER;\r
1520 goto Done;\r
1521 }\r
1522\r
1523 //\r
1524 // Build the map\r
1525 //\r
383c303c 1526 ZeroMem (MemoryMap, BufferSize);\r
2345e7d4 1527 MemoryMapStart = MemoryMap;\r
28a00297 1528 for (Link = gMemoryMap.ForwardLink; Link != &gMemoryMap; Link = Link->ForwardLink) {\r
1529 Entry = CR (Link, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
1530 ASSERT (Entry->VirtualStart == 0);\r
1531\r
b74350e9 1532 //\r
1533 // Convert internal map into an EFI_MEMORY_DESCRIPTOR\r
1534 //\r
28a00297 1535 MemoryMap->Type = Entry->Type;\r
1536 MemoryMap->PhysicalStart = Entry->Start;\r
1537 MemoryMap->VirtualStart = Entry->VirtualStart;\r
1538 MemoryMap->NumberOfPages = RShiftU64 (Entry->End - Entry->Start + 1, EFI_PAGE_SHIFT);\r
b74350e9 1539 //\r
1540 // If the memory type is EfiConventionalMemory, then determine if the range is part of a\r
022c6d45 1541 // memory type bin and needs to be converted to the same memory type as the rest of the\r
1542 // memory type bin in order to minimize EFI Memory Map changes across reboots. This\r
b74350e9 1543 // improves the chances for a successful S4 resume in the presence of minor page allocation\r
1544 // differences across reboots.\r
1545 //\r
1546 if (MemoryMap->Type == EfiConventionalMemory) {\r
1547 for (Type = (EFI_MEMORY_TYPE) 0; Type < EfiMaxMemoryType; Type++) {\r
1548 if (mMemoryTypeStatistics[Type].Special &&\r
1549 mMemoryTypeStatistics[Type].NumberOfPages > 0 &&\r
1550 Entry->Start >= mMemoryTypeStatistics[Type].BaseAddress &&\r
e94a9ff7 1551 Entry->End <= mMemoryTypeStatistics[Type].MaximumAddress) {\r
b74350e9 1552 MemoryMap->Type = Type;\r
1553 }\r
1554 }\r
1555 }\r
1556 MemoryMap->Attribute = Entry->Attribute;\r
10fe0d81
RN
1557 if (MemoryMap->Type < EfiMaxMemoryType) {\r
1558 if (mMemoryTypeStatistics[MemoryMap->Type].Runtime) {\r
1559 MemoryMap->Attribute |= EFI_MEMORY_RUNTIME;\r
1560 }\r
28a00297 1561 }\r
022c6d45 1562\r
2345e7d4 1563 //\r
1564 // Check to see if the new Memory Map Descriptor can be merged with an \r
1565 // existing descriptor if they are adjacent and have the same attributes\r
1566 //\r
1567 MemoryMap = MergeMemoryMapDescriptor (MemoryMapStart, MemoryMap, Size);\r
28a00297 1568 }\r
1569\r
1570 for (Link = mGcdMemorySpaceMap.ForwardLink; Link != &mGcdMemorySpaceMap; Link = Link->ForwardLink) {\r
1571 GcdMapEntry = CR (Link, EFI_GCD_MAP_ENTRY, Link, EFI_GCD_MAP_SIGNATURE);\r
1572 if ((GcdMapEntry->GcdMemoryType == EfiGcdMemoryTypeReserved) ||\r
1573 (GcdMapEntry->GcdMemoryType == EfiGcdMemoryTypeMemoryMappedIo)) {\r
1574 if ((GcdMapEntry->Attributes & EFI_MEMORY_RUNTIME) == EFI_MEMORY_RUNTIME) {\r
dc8d93ca 1575 // \r
1576 // Create EFI_MEMORY_DESCRIPTOR for every Reserved and MMIO GCD entries\r
1577 // that are marked for runtime use\r
1578 //\r
28a00297 1579 MemoryMap->PhysicalStart = GcdMapEntry->BaseAddress;\r
1580 MemoryMap->VirtualStart = 0;\r
1581 MemoryMap->NumberOfPages = RShiftU64 ((GcdMapEntry->EndAddress - GcdMapEntry->BaseAddress + 1), EFI_PAGE_SHIFT);\r
1582 MemoryMap->Attribute = GcdMapEntry->Attributes & ~EFI_MEMORY_PORT_IO;\r
1583\r
1584 if (GcdMapEntry->GcdMemoryType == EfiGcdMemoryTypeReserved) {\r
1585 MemoryMap->Type = EfiReservedMemoryType;\r
1586 } else if (GcdMapEntry->GcdMemoryType == EfiGcdMemoryTypeMemoryMappedIo) {\r
1587 if ((GcdMapEntry->Attributes & EFI_MEMORY_PORT_IO) == EFI_MEMORY_PORT_IO) {\r
1588 MemoryMap->Type = EfiMemoryMappedIOPortSpace;\r
1589 } else {\r
1590 MemoryMap->Type = EfiMemoryMappedIO;\r
1591 }\r
1592 }\r
1593\r
2345e7d4 1594 //\r
1595 // Check to see if the new Memory Map Descriptor can be merged with an \r
1596 // existing descriptor if they are adjacent and have the same attributes\r
1597 //\r
1598 MemoryMap = MergeMemoryMapDescriptor (MemoryMapStart, MemoryMap, Size);\r
28a00297 1599 }\r
1600 }\r
1601 }\r
022c6d45 1602\r
2345e7d4 1603 //\r
1604 // Compute the size of the buffer actually used after all memory map descriptor merge operations\r
1605 //\r
1606 BufferSize = ((UINT8 *)MemoryMap - (UINT8 *)MemoryMapStart);\r
1607\r
28a00297 1608 Status = EFI_SUCCESS;\r
1609\r
1610Done:\r
022c6d45 1611 //\r
1612 // Update the map key finally\r
1613 //\r
28a00297 1614 if (MapKey != NULL) {\r
1615 *MapKey = mMemoryMapKey;\r
1616 }\r
022c6d45 1617\r
e439df50 1618 CoreReleaseMemoryLock ();\r
1619\r
1620 CoreReleaseGcdMemoryLock ();\r
1621\r
28a00297 1622 *MemoryMapSize = BufferSize;\r
022c6d45 1623\r
28a00297 1624 return Status;\r
1625}\r
1626\r
28a00297 1627\r
162ed594 1628/**\r
28a00297 1629 Internal function. Used by the pool functions to allocate pages\r
1630 to back pool allocation requests.\r
1631\r
022c6d45 1632 @param PoolType The type of memory for the new pool pages\r
1633 @param NumberOfPages No of pages to allocate\r
1634 @param Alignment Bits to align.\r
28a00297 1635\r
162ed594 1636 @return The allocated memory, or NULL\r
28a00297 1637\r
162ed594 1638**/\r
1639VOID *\r
1640CoreAllocatePoolPages (\r
1641 IN EFI_MEMORY_TYPE PoolType,\r
1642 IN UINTN NumberOfPages,\r
1643 IN UINTN Alignment\r
1644 )\r
28a00297 1645{\r
1646 UINT64 Start;\r
1647\r
1648 //\r
1649 // Find the pages to convert\r
1650 //\r
f3f2e05d 1651 Start = FindFreePages (MAX_ADDRESS, NumberOfPages, PoolType, Alignment);\r
28a00297 1652\r
1653 //\r
1654 // Convert it to boot services data\r
1655 //\r
1656 if (Start == 0) {\r
7df7393f 1657 DEBUG ((DEBUG_ERROR | DEBUG_PAGE, "AllocatePoolPages: failed to allocate %d pages\n", (UINT32)NumberOfPages));\r
28a00297 1658 } else {\r
1659 CoreConvertPages (Start, NumberOfPages, PoolType);\r
1660 }\r
1661\r
e94a9ff7 1662 return (VOID *)(UINTN) Start;\r
28a00297 1663}\r
1664\r
162ed594 1665\r
1666/**\r
1667 Internal function. Frees pool pages allocated via AllocatePoolPages ()\r
1668\r
022c6d45 1669 @param Memory The base address to free\r
162ed594 1670 @param NumberOfPages The number of pages to free\r
1671\r
1672**/\r
28a00297 1673VOID\r
1674CoreFreePoolPages (\r
1675 IN EFI_PHYSICAL_ADDRESS Memory,\r
1676 IN UINTN NumberOfPages\r
1677 )\r
28a00297 1678{\r
1679 CoreConvertPages (Memory, NumberOfPages, EfiConventionalMemory);\r
1680}\r
1681\r
1682\r
28a00297 1683\r
162ed594 1684/**\r
1685 Make sure the memory map is following all the construction rules,\r
28a00297 1686 it is the last time to check memory map error before exit boot services.\r
1687\r
022c6d45 1688 @param MapKey Memory map key\r
28a00297 1689\r
022c6d45 1690 @retval EFI_INVALID_PARAMETER Memory map not consistent with construction\r
1691 rules.\r
162ed594 1692 @retval EFI_SUCCESS Valid memory map.\r
28a00297 1693\r
162ed594 1694**/\r
1695EFI_STATUS\r
1696CoreTerminateMemoryMap (\r
1697 IN UINTN MapKey\r
1698 )\r
28a00297 1699{\r
1700 EFI_STATUS Status;\r
1701 LIST_ENTRY *Link;\r
1702 MEMORY_MAP *Entry;\r
1703\r
1704 Status = EFI_SUCCESS;\r
1705\r
1706 CoreAcquireMemoryLock ();\r
1707\r
1708 if (MapKey == mMemoryMapKey) {\r
1709\r
1710 //\r
1711 // Make sure the memory map is following all the construction rules\r
1712 // This is the last chance we will be able to display any messages on\r
1713 // the console devices.\r
1714 //\r
1715\r
1716 for (Link = gMemoryMap.ForwardLink; Link != &gMemoryMap; Link = Link->ForwardLink) {\r
1717 Entry = CR(Link, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
6e536468 1718 if ((Entry->Attribute & EFI_MEMORY_RUNTIME) != 0) {\r
28a00297 1719 if (Entry->Type == EfiACPIReclaimMemory || Entry->Type == EfiACPIMemoryNVS) {\r
d45fd260 1720 DEBUG((DEBUG_ERROR | DEBUG_PAGE, "ExitBootServices: ACPI memory entry has RUNTIME attribute set.\n"));\r
1721 Status = EFI_INVALID_PARAMETER;\r
1722 goto Done;\r
28a00297 1723 }\r
6e536468 1724 if ((Entry->Start & (EFI_ACPI_RUNTIME_PAGE_ALLOCATION_ALIGNMENT - 1)) != 0) {\r
d45fd260 1725 DEBUG((DEBUG_ERROR | DEBUG_PAGE, "ExitBootServices: A RUNTIME memory entry is not on a proper alignment.\n"));\r
1726 Status = EFI_INVALID_PARAMETER;\r
1727 goto Done;\r
28a00297 1728 }\r
6e536468 1729 if (((Entry->End + 1) & (EFI_ACPI_RUNTIME_PAGE_ALLOCATION_ALIGNMENT - 1)) != 0) {\r
d45fd260 1730 DEBUG((DEBUG_ERROR | DEBUG_PAGE, "ExitBootServices: A RUNTIME memory entry is not on a proper alignment.\n"));\r
1731 Status = EFI_INVALID_PARAMETER;\r
1732 goto Done;\r
28a00297 1733 }\r
1734 }\r
1735 }\r
1736\r
1737 //\r
1738 // The map key they gave us matches what we expect. Fall through and\r
1739 // return success. In an ideal world we would clear out all of\r
1740 // EfiBootServicesCode and EfiBootServicesData. However this function\r
1741 // is not the last one called by ExitBootServices(), so we have to\r
1742 // preserve the memory contents.\r
1743 //\r
1744 } else {\r
1745 Status = EFI_INVALID_PARAMETER;\r
1746 }\r
1747\r
d45fd260 1748Done:\r
28a00297 1749 CoreReleaseMemoryLock ();\r
1750\r
1751 return Status;\r
1752}\r
1753\r
1754\r
1755\r
1756\r
1757\r
1758\r
1759\r
1760\r
162ed594 1761\r