]> git.proxmox.com Git - mirror_edk2.git/blame_incremental - MdeModulePkg/Core/Dxe/Mem/Page.c
MdePkg UefiSpec.h: Update comments for OEM reserved memory type.
[mirror_edk2.git] / MdeModulePkg / Core / Dxe / Mem / Page.c
... / ...
CommitLineData
1/** @file\r
2 UEFI Memory page management functions.\r
3\r
4Copyright (c) 2007 - 2015, Intel Corporation. All rights reserved.<BR>\r
5This program and the accompanying materials\r
6are licensed and made available under the terms and conditions of the BSD License\r
7which accompanies this distribution. The full text of the license may be found at\r
8http://opensource.org/licenses/bsd-license.php\r
9\r
10THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
11WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
12\r
13**/\r
14\r
15#include "DxeMain.h"\r
16#include "Imem.h"\r
17\r
18#define EFI_DEFAULT_PAGE_ALLOCATION_ALIGNMENT (EFI_PAGE_SIZE)\r
19\r
20//\r
21// Entry for tracking the memory regions for each memory type to coalesce similar memory types\r
22//\r
23typedef struct {\r
24 EFI_PHYSICAL_ADDRESS BaseAddress;\r
25 EFI_PHYSICAL_ADDRESS MaximumAddress;\r
26 UINT64 CurrentNumberOfPages;\r
27 UINT64 NumberOfPages;\r
28 UINTN InformationIndex;\r
29 BOOLEAN Special;\r
30 BOOLEAN Runtime;\r
31} EFI_MEMORY_TYPE_STATISTICS;\r
32\r
33//\r
34// MemoryMap - The current memory map\r
35//\r
36UINTN mMemoryMapKey = 0;\r
37\r
38#define MAX_MAP_DEPTH 6\r
39\r
40///\r
41/// mMapDepth - depth of new descriptor stack\r
42///\r
43UINTN mMapDepth = 0;\r
44///\r
45/// mMapStack - space to use as temp storage to build new map descriptors\r
46///\r
47MEMORY_MAP mMapStack[MAX_MAP_DEPTH];\r
48UINTN mFreeMapStack = 0;\r
49///\r
50/// This list maintain the free memory map list\r
51///\r
52LIST_ENTRY mFreeMemoryMapEntryList = INITIALIZE_LIST_HEAD_VARIABLE (mFreeMemoryMapEntryList);\r
53BOOLEAN mMemoryTypeInformationInitialized = FALSE;\r
54\r
55EFI_MEMORY_TYPE_STATISTICS mMemoryTypeStatistics[EfiMaxMemoryType + 1] = {\r
56 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, TRUE, FALSE }, // EfiReservedMemoryType\r
57 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiLoaderCode\r
58 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiLoaderData\r
59 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiBootServicesCode\r
60 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiBootServicesData\r
61 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, TRUE, TRUE }, // EfiRuntimeServicesCode\r
62 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, TRUE, TRUE }, // EfiRuntimeServicesData\r
63 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiConventionalMemory\r
64 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiUnusableMemory\r
65 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, TRUE, FALSE }, // EfiACPIReclaimMemory\r
66 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, TRUE, FALSE }, // EfiACPIMemoryNVS\r
67 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiMemoryMappedIO\r
68 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiMemoryMappedIOPortSpace\r
69 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, TRUE, TRUE }, // EfiPalCode\r
70 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE }, // EfiPersistentMemory\r
71 { 0, MAX_ADDRESS, 0, 0, EfiMaxMemoryType, FALSE, FALSE } // EfiMaxMemoryType\r
72};\r
73\r
74EFI_PHYSICAL_ADDRESS mDefaultMaximumAddress = MAX_ADDRESS;\r
75EFI_PHYSICAL_ADDRESS mDefaultBaseAddress = MAX_ADDRESS;\r
76\r
77EFI_MEMORY_TYPE_INFORMATION gMemoryTypeInformation[EfiMaxMemoryType + 1] = {\r
78 { EfiReservedMemoryType, 0 },\r
79 { EfiLoaderCode, 0 },\r
80 { EfiLoaderData, 0 },\r
81 { EfiBootServicesCode, 0 },\r
82 { EfiBootServicesData, 0 },\r
83 { EfiRuntimeServicesCode, 0 },\r
84 { EfiRuntimeServicesData, 0 },\r
85 { EfiConventionalMemory, 0 },\r
86 { EfiUnusableMemory, 0 },\r
87 { EfiACPIReclaimMemory, 0 },\r
88 { EfiACPIMemoryNVS, 0 },\r
89 { EfiMemoryMappedIO, 0 },\r
90 { EfiMemoryMappedIOPortSpace, 0 },\r
91 { EfiPalCode, 0 },\r
92 { EfiPersistentMemory, 0 },\r
93 { EfiMaxMemoryType, 0 }\r
94};\r
95//\r
96// Only used when load module at fixed address feature is enabled. True means the memory is alreay successfully allocated\r
97// and ready to load the module in to specified address.or else, the memory is not ready and module will be loaded at a \r
98// address assigned by DXE core.\r
99//\r
100GLOBAL_REMOVE_IF_UNREFERENCED BOOLEAN gLoadFixedAddressCodeMemoryReady = FALSE;\r
101\r
102/**\r
103 Enter critical section by gaining lock on gMemoryLock.\r
104\r
105**/\r
106VOID\r
107CoreAcquireMemoryLock (\r
108 VOID\r
109 )\r
110{\r
111 CoreAcquireLock (&gMemoryLock);\r
112}\r
113\r
114\r
115\r
116/**\r
117 Exit critical section by releasing lock on gMemoryLock.\r
118\r
119**/\r
120VOID\r
121CoreReleaseMemoryLock (\r
122 VOID\r
123 )\r
124{\r
125 CoreReleaseLock (&gMemoryLock);\r
126}\r
127\r
128\r
129\r
130\r
131/**\r
132 Internal function. Removes a descriptor entry.\r
133\r
134 @param Entry The entry to remove\r
135\r
136**/\r
137VOID\r
138RemoveMemoryMapEntry (\r
139 IN OUT MEMORY_MAP *Entry\r
140 )\r
141{\r
142 RemoveEntryList (&Entry->Link);\r
143 Entry->Link.ForwardLink = NULL;\r
144\r
145 if (Entry->FromPages) {\r
146 //\r
147 // Insert the free memory map descriptor to the end of mFreeMemoryMapEntryList\r
148 //\r
149 InsertTailList (&mFreeMemoryMapEntryList, &Entry->Link);\r
150 }\r
151}\r
152\r
153/**\r
154 Internal function. Adds a ranges to the memory map.\r
155 The range must not already exist in the map.\r
156\r
157 @param Type The type of memory range to add\r
158 @param Start The starting address in the memory range Must be\r
159 paged aligned\r
160 @param End The last address in the range Must be the last\r
161 byte of a page\r
162 @param Attribute The attributes of the memory range to add\r
163\r
164**/\r
165VOID\r
166CoreAddRange (\r
167 IN EFI_MEMORY_TYPE Type,\r
168 IN EFI_PHYSICAL_ADDRESS Start,\r
169 IN EFI_PHYSICAL_ADDRESS End,\r
170 IN UINT64 Attribute\r
171 )\r
172{\r
173 LIST_ENTRY *Link;\r
174 MEMORY_MAP *Entry;\r
175\r
176 ASSERT ((Start & EFI_PAGE_MASK) == 0);\r
177 ASSERT (End > Start) ;\r
178\r
179 ASSERT_LOCKED (&gMemoryLock);\r
180\r
181 DEBUG ((DEBUG_PAGE, "AddRange: %lx-%lx to %d\n", Start, End, Type));\r
182 \r
183 //\r
184 // If memory of type EfiConventionalMemory is being added that includes the page \r
185 // starting at address 0, then zero the page starting at address 0. This has \r
186 // two benifits. It helps find NULL pointer bugs and it also maximizes \r
187 // compatibility with operating systems that may evaluate memory in this page \r
188 // for legacy data structures. If memory of any other type is added starting \r
189 // at address 0, then do not zero the page at address 0 because the page is being \r
190 // used for other purposes.\r
191 // \r
192 if (Type == EfiConventionalMemory && Start == 0 && (End >= EFI_PAGE_SIZE - 1)) {\r
193 SetMem ((VOID *)(UINTN)Start, EFI_PAGE_SIZE, 0);\r
194 }\r
195 \r
196 //\r
197 // Memory map being altered so updated key\r
198 //\r
199 mMemoryMapKey += 1;\r
200\r
201 //\r
202 // UEFI 2.0 added an event group for notificaiton on memory map changes.\r
203 // So we need to signal this Event Group every time the memory map changes.\r
204 // If we are in EFI 1.10 compatability mode no event groups will be\r
205 // found and nothing will happen we we call this function. These events\r
206 // will get signaled but since a lock is held around the call to this\r
207 // function the notificaiton events will only be called after this funciton\r
208 // returns and the lock is released.\r
209 //\r
210 CoreNotifySignalList (&gEfiEventMemoryMapChangeGuid);\r
211\r
212 //\r
213 // Look for adjoining memory descriptor\r
214 //\r
215\r
216 // Two memory descriptors can only be merged if they have the same Type\r
217 // and the same Attribute\r
218 //\r
219\r
220 Link = gMemoryMap.ForwardLink;\r
221 while (Link != &gMemoryMap) {\r
222 Entry = CR (Link, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
223 Link = Link->ForwardLink;\r
224\r
225 if (Entry->Type != Type) {\r
226 continue;\r
227 }\r
228\r
229 if (Entry->Attribute != Attribute) {\r
230 continue;\r
231 }\r
232\r
233 if (Entry->End + 1 == Start) {\r
234\r
235 Start = Entry->Start;\r
236 RemoveMemoryMapEntry (Entry);\r
237\r
238 } else if (Entry->Start == End + 1) {\r
239\r
240 End = Entry->End;\r
241 RemoveMemoryMapEntry (Entry);\r
242 }\r
243 }\r
244\r
245 //\r
246 // Add descriptor\r
247 //\r
248\r
249 mMapStack[mMapDepth].Signature = MEMORY_MAP_SIGNATURE;\r
250 mMapStack[mMapDepth].FromPages = FALSE;\r
251 mMapStack[mMapDepth].Type = Type;\r
252 mMapStack[mMapDepth].Start = Start;\r
253 mMapStack[mMapDepth].End = End;\r
254 mMapStack[mMapDepth].VirtualStart = 0;\r
255 mMapStack[mMapDepth].Attribute = Attribute;\r
256 InsertTailList (&gMemoryMap, &mMapStack[mMapDepth].Link);\r
257\r
258 mMapDepth += 1;\r
259 ASSERT (mMapDepth < MAX_MAP_DEPTH);\r
260\r
261 return ;\r
262}\r
263\r
264/**\r
265 Internal function. Deque a descriptor entry from the mFreeMemoryMapEntryList.\r
266 If the list is emtry, then allocate a new page to refuel the list.\r
267 Please Note this algorithm to allocate the memory map descriptor has a property\r
268 that the memory allocated for memory entries always grows, and will never really be freed\r
269 For example, if the current boot uses 2000 memory map entries at the maximum point, but\r
270 ends up with only 50 at the time the OS is booted, then the memory associated with the 1950\r
271 memory map entries is still allocated from EfiBootServicesMemory.\r
272\r
273\r
274 @return The Memory map descriptor dequed from the mFreeMemoryMapEntryList\r
275\r
276**/\r
277MEMORY_MAP *\r
278AllocateMemoryMapEntry (\r
279 VOID\r
280 )\r
281{\r
282 MEMORY_MAP* FreeDescriptorEntries;\r
283 MEMORY_MAP* Entry;\r
284 UINTN Index;\r
285\r
286 if (IsListEmpty (&mFreeMemoryMapEntryList)) {\r
287 //\r
288 // The list is empty, to allocate one page to refuel the list\r
289 //\r
290 FreeDescriptorEntries = CoreAllocatePoolPages (EfiBootServicesData, EFI_SIZE_TO_PAGES(DEFAULT_PAGE_ALLOCATION), DEFAULT_PAGE_ALLOCATION);\r
291 if(FreeDescriptorEntries != NULL) {\r
292 //\r
293 // Enque the free memmory map entries into the list\r
294 //\r
295 for (Index = 0; Index< DEFAULT_PAGE_ALLOCATION / sizeof(MEMORY_MAP); Index++) {\r
296 FreeDescriptorEntries[Index].Signature = MEMORY_MAP_SIGNATURE;\r
297 InsertTailList (&mFreeMemoryMapEntryList, &FreeDescriptorEntries[Index].Link);\r
298 }\r
299 } else {\r
300 return NULL;\r
301 }\r
302 }\r
303 //\r
304 // dequeue the first descriptor from the list\r
305 //\r
306 Entry = CR (mFreeMemoryMapEntryList.ForwardLink, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
307 RemoveEntryList (&Entry->Link);\r
308\r
309 return Entry;\r
310}\r
311\r
312\r
313/**\r
314 Internal function. Moves any memory descriptors that are on the\r
315 temporary descriptor stack to heap.\r
316\r
317**/\r
318VOID\r
319CoreFreeMemoryMapStack (\r
320 VOID\r
321 )\r
322{\r
323 MEMORY_MAP *Entry;\r
324 MEMORY_MAP *Entry2;\r
325 LIST_ENTRY *Link2;\r
326\r
327 ASSERT_LOCKED (&gMemoryLock);\r
328\r
329 //\r
330 // If already freeing the map stack, then return\r
331 //\r
332 if (mFreeMapStack != 0) {\r
333 return ;\r
334 }\r
335\r
336 //\r
337 // Move the temporary memory descriptor stack into pool\r
338 //\r
339 mFreeMapStack += 1;\r
340\r
341 while (mMapDepth != 0) {\r
342 //\r
343 // Deque an memory map entry from mFreeMemoryMapEntryList\r
344 //\r
345 Entry = AllocateMemoryMapEntry ();\r
346\r
347 ASSERT (Entry);\r
348\r
349 //\r
350 // Update to proper entry\r
351 //\r
352 mMapDepth -= 1;\r
353\r
354 if (mMapStack[mMapDepth].Link.ForwardLink != NULL) {\r
355\r
356 //\r
357 // Move this entry to general memory\r
358 //\r
359 RemoveEntryList (&mMapStack[mMapDepth].Link);\r
360 mMapStack[mMapDepth].Link.ForwardLink = NULL;\r
361\r
362 CopyMem (Entry , &mMapStack[mMapDepth], sizeof (MEMORY_MAP));\r
363 Entry->FromPages = TRUE;\r
364\r
365 //\r
366 // Find insertion location\r
367 //\r
368 for (Link2 = gMemoryMap.ForwardLink; Link2 != &gMemoryMap; Link2 = Link2->ForwardLink) {\r
369 Entry2 = CR (Link2, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
370 if (Entry2->FromPages && Entry2->Start > Entry->Start) {\r
371 break;\r
372 }\r
373 }\r
374\r
375 InsertTailList (Link2, &Entry->Link);\r
376\r
377 } else {\r
378 //\r
379 // This item of mMapStack[mMapDepth] has already been dequeued from gMemoryMap list,\r
380 // so here no need to move it to memory.\r
381 //\r
382 InsertTailList (&mFreeMemoryMapEntryList, &Entry->Link);\r
383 }\r
384 }\r
385\r
386 mFreeMapStack -= 1;\r
387}\r
388\r
389/**\r
390 Find untested but initialized memory regions in GCD map and convert them to be DXE allocatable.\r
391\r
392**/\r
393BOOLEAN\r
394PromoteMemoryResource (\r
395 VOID\r
396 )\r
397{\r
398 LIST_ENTRY *Link;\r
399 EFI_GCD_MAP_ENTRY *Entry;\r
400 BOOLEAN Promoted;\r
401\r
402 DEBUG ((DEBUG_PAGE, "Promote the memory resource\n"));\r
403\r
404 CoreAcquireGcdMemoryLock ();\r
405\r
406 Promoted = FALSE;\r
407 Link = mGcdMemorySpaceMap.ForwardLink;\r
408 while (Link != &mGcdMemorySpaceMap) {\r
409\r
410 Entry = CR (Link, EFI_GCD_MAP_ENTRY, Link, EFI_GCD_MAP_SIGNATURE);\r
411\r
412 if (Entry->GcdMemoryType == EfiGcdMemoryTypeReserved &&\r
413 Entry->EndAddress < MAX_ADDRESS &&\r
414 (Entry->Capabilities & (EFI_MEMORY_PRESENT | EFI_MEMORY_INITIALIZED | EFI_MEMORY_TESTED)) ==\r
415 (EFI_MEMORY_PRESENT | EFI_MEMORY_INITIALIZED)) {\r
416 //\r
417 // Update the GCD map\r
418 //\r
419 if ((Entry->Capabilities & EFI_MEMORY_MORE_RELIABLE) == EFI_MEMORY_MORE_RELIABLE) {\r
420 Entry->GcdMemoryType = EfiGcdMemoryTypeMoreReliable;\r
421 } else {\r
422 Entry->GcdMemoryType = EfiGcdMemoryTypeSystemMemory;\r
423 }\r
424 Entry->Capabilities |= EFI_MEMORY_TESTED;\r
425 Entry->ImageHandle = gDxeCoreImageHandle;\r
426 Entry->DeviceHandle = NULL;\r
427\r
428 //\r
429 // Add to allocable system memory resource\r
430 //\r
431\r
432 CoreAddRange (\r
433 EfiConventionalMemory,\r
434 Entry->BaseAddress,\r
435 Entry->EndAddress,\r
436 Entry->Capabilities & ~(EFI_MEMORY_PRESENT | EFI_MEMORY_INITIALIZED | EFI_MEMORY_TESTED | EFI_MEMORY_RUNTIME)\r
437 );\r
438 CoreFreeMemoryMapStack ();\r
439\r
440 Promoted = TRUE;\r
441 }\r
442\r
443 Link = Link->ForwardLink;\r
444 }\r
445\r
446 CoreReleaseGcdMemoryLock ();\r
447\r
448 return Promoted;\r
449}\r
450/**\r
451 This function try to allocate Runtime code & Boot time code memory range. If LMFA enabled, 2 patchable PCD \r
452 PcdLoadFixAddressRuntimeCodePageNumber & PcdLoadFixAddressBootTimeCodePageNumber which are set by tools will record the \r
453 size of boot time and runtime code.\r
454\r
455**/\r
456VOID\r
457CoreLoadingFixedAddressHook (\r
458 VOID\r
459 )\r
460{\r
461 UINT32 RuntimeCodePageNumber;\r
462 UINT32 BootTimeCodePageNumber;\r
463 EFI_PHYSICAL_ADDRESS RuntimeCodeBase;\r
464 EFI_PHYSICAL_ADDRESS BootTimeCodeBase;\r
465 EFI_STATUS Status;\r
466\r
467 //\r
468 // Make sure these 2 areas are not initialzied.\r
469 //\r
470 if (!gLoadFixedAddressCodeMemoryReady) { \r
471 RuntimeCodePageNumber = PcdGet32(PcdLoadFixAddressRuntimeCodePageNumber);\r
472 BootTimeCodePageNumber= PcdGet32(PcdLoadFixAddressBootTimeCodePageNumber);\r
473 RuntimeCodeBase = (EFI_PHYSICAL_ADDRESS)(gLoadModuleAtFixAddressConfigurationTable.DxeCodeTopAddress - EFI_PAGES_TO_SIZE (RuntimeCodePageNumber));\r
474 BootTimeCodeBase = (EFI_PHYSICAL_ADDRESS)(RuntimeCodeBase - EFI_PAGES_TO_SIZE (BootTimeCodePageNumber));\r
475 //\r
476 // Try to allocate runtime memory.\r
477 //\r
478 Status = CoreAllocatePages (\r
479 AllocateAddress,\r
480 EfiRuntimeServicesCode,\r
481 RuntimeCodePageNumber,\r
482 &RuntimeCodeBase\r
483 );\r
484 if (EFI_ERROR(Status)) {\r
485 //\r
486 // Runtime memory allocation failed \r
487 //\r
488 return;\r
489 }\r
490 //\r
491 // Try to allocate boot memory.\r
492 //\r
493 Status = CoreAllocatePages (\r
494 AllocateAddress,\r
495 EfiBootServicesCode,\r
496 BootTimeCodePageNumber,\r
497 &BootTimeCodeBase\r
498 );\r
499 if (EFI_ERROR(Status)) {\r
500 //\r
501 // boot memory allocation failed. Free Runtime code range and will try the allocation again when \r
502 // new memory range is installed.\r
503 //\r
504 CoreFreePages (\r
505 RuntimeCodeBase,\r
506 RuntimeCodePageNumber\r
507 );\r
508 return;\r
509 }\r
510 gLoadFixedAddressCodeMemoryReady = TRUE;\r
511 } \r
512 return;\r
513} \r
514\r
515/**\r
516 Called to initialize the memory map and add descriptors to\r
517 the current descriptor list.\r
518 The first descriptor that is added must be general usable\r
519 memory as the addition allocates heap.\r
520\r
521 @param Type The type of memory to add\r
522 @param Start The starting address in the memory range Must be\r
523 page aligned\r
524 @param NumberOfPages The number of pages in the range\r
525 @param Attribute Attributes of the memory to add\r
526\r
527 @return None. The range is added to the memory map\r
528\r
529**/\r
530VOID\r
531CoreAddMemoryDescriptor (\r
532 IN EFI_MEMORY_TYPE Type,\r
533 IN EFI_PHYSICAL_ADDRESS Start,\r
534 IN UINT64 NumberOfPages,\r
535 IN UINT64 Attribute\r
536 )\r
537{\r
538 EFI_PHYSICAL_ADDRESS End;\r
539 EFI_STATUS Status;\r
540 UINTN Index;\r
541 UINTN FreeIndex;\r
542 \r
543 if ((Start & EFI_PAGE_MASK) != 0) {\r
544 return;\r
545 }\r
546\r
547 if (Type >= EfiMaxMemoryType && Type <= 0x7fffffff) {\r
548 return;\r
549 }\r
550 CoreAcquireMemoryLock ();\r
551 End = Start + LShiftU64 (NumberOfPages, EFI_PAGE_SHIFT) - 1;\r
552 CoreAddRange (Type, Start, End, Attribute);\r
553 CoreFreeMemoryMapStack ();\r
554 CoreReleaseMemoryLock ();\r
555\r
556 //\r
557 // If Loading Module At Fixed Address feature is enabled. try to allocate memory with Runtime code & Boot time code type\r
558 //\r
559 if (PcdGet64(PcdLoadModuleAtFixAddressEnable) != 0) {\r
560 CoreLoadingFixedAddressHook();\r
561 }\r
562 \r
563 //\r
564 // Check to see if the statistics for the different memory types have already been established\r
565 //\r
566 if (mMemoryTypeInformationInitialized) {\r
567 return;\r
568 }\r
569\r
570 \r
571 //\r
572 // Loop through each memory type in the order specified by the gMemoryTypeInformation[] array\r
573 //\r
574 for (Index = 0; gMemoryTypeInformation[Index].Type != EfiMaxMemoryType; Index++) {\r
575 //\r
576 // Make sure the memory type in the gMemoryTypeInformation[] array is valid\r
577 //\r
578 Type = (EFI_MEMORY_TYPE) (gMemoryTypeInformation[Index].Type);\r
579 if ((UINT32)Type > EfiMaxMemoryType) {\r
580 continue;\r
581 }\r
582 if (gMemoryTypeInformation[Index].NumberOfPages != 0) {\r
583 //\r
584 // Allocate pages for the current memory type from the top of available memory\r
585 //\r
586 Status = CoreAllocatePages (\r
587 AllocateAnyPages,\r
588 Type,\r
589 gMemoryTypeInformation[Index].NumberOfPages,\r
590 &mMemoryTypeStatistics[Type].BaseAddress\r
591 );\r
592 if (EFI_ERROR (Status)) {\r
593 //\r
594 // If an error occurs allocating the pages for the current memory type, then\r
595 // free all the pages allocates for the previous memory types and return. This\r
596 // operation with be retied when/if more memory is added to the system\r
597 //\r
598 for (FreeIndex = 0; FreeIndex < Index; FreeIndex++) {\r
599 //\r
600 // Make sure the memory type in the gMemoryTypeInformation[] array is valid\r
601 //\r
602 Type = (EFI_MEMORY_TYPE) (gMemoryTypeInformation[FreeIndex].Type);\r
603 if ((UINT32)Type > EfiMaxMemoryType) {\r
604 continue;\r
605 }\r
606\r
607 if (gMemoryTypeInformation[FreeIndex].NumberOfPages != 0) {\r
608 CoreFreePages (\r
609 mMemoryTypeStatistics[Type].BaseAddress,\r
610 gMemoryTypeInformation[FreeIndex].NumberOfPages\r
611 );\r
612 mMemoryTypeStatistics[Type].BaseAddress = 0;\r
613 mMemoryTypeStatistics[Type].MaximumAddress = MAX_ADDRESS;\r
614 }\r
615 }\r
616 return;\r
617 }\r
618\r
619 //\r
620 // Compute the address at the top of the current statistics\r
621 //\r
622 mMemoryTypeStatistics[Type].MaximumAddress =\r
623 mMemoryTypeStatistics[Type].BaseAddress +\r
624 LShiftU64 (gMemoryTypeInformation[Index].NumberOfPages, EFI_PAGE_SHIFT) - 1;\r
625\r
626 //\r
627 // If the current base address is the lowest address so far, then update the default\r
628 // maximum address\r
629 //\r
630 if (mMemoryTypeStatistics[Type].BaseAddress < mDefaultMaximumAddress) {\r
631 mDefaultMaximumAddress = mMemoryTypeStatistics[Type].BaseAddress - 1;\r
632 }\r
633 }\r
634 }\r
635\r
636 //\r
637 // There was enough system memory for all the the memory types were allocated. So,\r
638 // those memory areas can be freed for future allocations, and all future memory\r
639 // allocations can occur within their respective bins\r
640 //\r
641 for (Index = 0; gMemoryTypeInformation[Index].Type != EfiMaxMemoryType; Index++) {\r
642 //\r
643 // Make sure the memory type in the gMemoryTypeInformation[] array is valid\r
644 //\r
645 Type = (EFI_MEMORY_TYPE) (gMemoryTypeInformation[Index].Type);\r
646 if ((UINT32)Type > EfiMaxMemoryType) {\r
647 continue;\r
648 }\r
649 if (gMemoryTypeInformation[Index].NumberOfPages != 0) {\r
650 CoreFreePages (\r
651 mMemoryTypeStatistics[Type].BaseAddress,\r
652 gMemoryTypeInformation[Index].NumberOfPages\r
653 );\r
654 mMemoryTypeStatistics[Type].NumberOfPages = gMemoryTypeInformation[Index].NumberOfPages;\r
655 gMemoryTypeInformation[Index].NumberOfPages = 0;\r
656 }\r
657 }\r
658\r
659 //\r
660 // If the number of pages reserved for a memory type is 0, then all allocations for that type\r
661 // should be in the default range.\r
662 //\r
663 for (Type = (EFI_MEMORY_TYPE) 0; Type < EfiMaxMemoryType; Type++) {\r
664 for (Index = 0; gMemoryTypeInformation[Index].Type != EfiMaxMemoryType; Index++) {\r
665 if (Type == (EFI_MEMORY_TYPE)gMemoryTypeInformation[Index].Type) {\r
666 mMemoryTypeStatistics[Type].InformationIndex = Index;\r
667 }\r
668 }\r
669 mMemoryTypeStatistics[Type].CurrentNumberOfPages = 0;\r
670 if (mMemoryTypeStatistics[Type].MaximumAddress == MAX_ADDRESS) {\r
671 mMemoryTypeStatistics[Type].MaximumAddress = mDefaultMaximumAddress;\r
672 }\r
673 }\r
674\r
675 mMemoryTypeInformationInitialized = TRUE;\r
676}\r
677\r
678\r
679/**\r
680 Internal function. Converts a memory range to the specified type or attributes.\r
681 The range must exist in the memory map. Either ChangingType or\r
682 ChangingAttributes must be set, but not both.\r
683\r
684 @param Start The first address of the range Must be page\r
685 aligned\r
686 @param NumberOfPages The number of pages to convert\r
687 @param ChangingType Boolean indicating that type value should be changed\r
688 @param NewType The new type for the memory range\r
689 @param ChangingAttributes Boolean indicating that attributes value should be changed\r
690 @param NewAttributes The new attributes for the memory range\r
691\r
692 @retval EFI_INVALID_PARAMETER Invalid parameter\r
693 @retval EFI_NOT_FOUND Could not find a descriptor cover the specified\r
694 range or convertion not allowed.\r
695 @retval EFI_SUCCESS Successfully converts the memory range to the\r
696 specified type.\r
697\r
698**/\r
699EFI_STATUS\r
700CoreConvertPagesEx (\r
701 IN UINT64 Start,\r
702 IN UINT64 NumberOfPages,\r
703 IN BOOLEAN ChangingType,\r
704 IN EFI_MEMORY_TYPE NewType,\r
705 IN BOOLEAN ChangingAttributes,\r
706 IN UINT64 NewAttributes\r
707 )\r
708{\r
709\r
710 UINT64 NumberOfBytes;\r
711 UINT64 End;\r
712 UINT64 RangeEnd;\r
713 UINT64 Attribute;\r
714 EFI_MEMORY_TYPE MemType;\r
715 LIST_ENTRY *Link;\r
716 MEMORY_MAP *Entry;\r
717\r
718 Entry = NULL;\r
719 NumberOfBytes = LShiftU64 (NumberOfPages, EFI_PAGE_SHIFT);\r
720 End = Start + NumberOfBytes - 1;\r
721\r
722 ASSERT (NumberOfPages);\r
723 ASSERT ((Start & EFI_PAGE_MASK) == 0);\r
724 ASSERT (End > Start) ;\r
725 ASSERT_LOCKED (&gMemoryLock);\r
726 ASSERT ( (ChangingType == FALSE) || (ChangingAttributes == FALSE) );\r
727\r
728 if (NumberOfPages == 0 || ((Start & EFI_PAGE_MASK) != 0) || (Start > (Start + NumberOfBytes))) {\r
729 return EFI_INVALID_PARAMETER;\r
730 }\r
731\r
732 //\r
733 // Convert the entire range\r
734 //\r
735\r
736 while (Start < End) {\r
737\r
738 //\r
739 // Find the entry that the covers the range\r
740 //\r
741 for (Link = gMemoryMap.ForwardLink; Link != &gMemoryMap; Link = Link->ForwardLink) {\r
742 Entry = CR (Link, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
743\r
744 if (Entry->Start <= Start && Entry->End > Start) {\r
745 break;\r
746 }\r
747 }\r
748\r
749 if (Link == &gMemoryMap) {\r
750 DEBUG ((DEBUG_ERROR | DEBUG_PAGE, "ConvertPages: failed to find range %lx - %lx\n", Start, End));\r
751 return EFI_NOT_FOUND;\r
752 }\r
753\r
754 //\r
755 // Convert range to the end, or to the end of the descriptor\r
756 // if that's all we've got\r
757 //\r
758 RangeEnd = End;\r
759\r
760 ASSERT (Entry != NULL);\r
761 if (Entry->End < End) {\r
762 RangeEnd = Entry->End;\r
763 }\r
764\r
765 if (ChangingType) {\r
766 DEBUG ((DEBUG_PAGE, "ConvertRange: %lx-%lx to type %d\n", Start, RangeEnd, NewType));\r
767 }\r
768 if (ChangingAttributes) {\r
769 DEBUG ((DEBUG_PAGE, "ConvertRange: %lx-%lx to attr %lx\n", Start, RangeEnd, NewAttributes));\r
770 }\r
771\r
772 if (ChangingType) {\r
773 //\r
774 // Debug code - verify conversion is allowed\r
775 //\r
776 if (!(NewType == EfiConventionalMemory ? 1 : 0) ^ (Entry->Type == EfiConventionalMemory ? 1 : 0)) {\r
777 DEBUG ((DEBUG_ERROR | DEBUG_PAGE, "ConvertPages: Incompatible memory types\n"));\r
778 return EFI_NOT_FOUND;\r
779 }\r
780\r
781 //\r
782 // Update counters for the number of pages allocated to each memory type\r
783 //\r
784 if ((UINT32)Entry->Type < EfiMaxMemoryType) {\r
785 if ((Start >= mMemoryTypeStatistics[Entry->Type].BaseAddress && Start <= mMemoryTypeStatistics[Entry->Type].MaximumAddress) ||\r
786 (Start >= mDefaultBaseAddress && Start <= mDefaultMaximumAddress) ) {\r
787 if (NumberOfPages > mMemoryTypeStatistics[Entry->Type].CurrentNumberOfPages) {\r
788 mMemoryTypeStatistics[Entry->Type].CurrentNumberOfPages = 0;\r
789 } else {\r
790 mMemoryTypeStatistics[Entry->Type].CurrentNumberOfPages -= NumberOfPages;\r
791 }\r
792 }\r
793 }\r
794\r
795 if ((UINT32)NewType < EfiMaxMemoryType) {\r
796 if ((Start >= mMemoryTypeStatistics[NewType].BaseAddress && Start <= mMemoryTypeStatistics[NewType].MaximumAddress) ||\r
797 (Start >= mDefaultBaseAddress && Start <= mDefaultMaximumAddress) ) {\r
798 mMemoryTypeStatistics[NewType].CurrentNumberOfPages += NumberOfPages;\r
799 if (mMemoryTypeStatistics[NewType].CurrentNumberOfPages > gMemoryTypeInformation[mMemoryTypeStatistics[NewType].InformationIndex].NumberOfPages) {\r
800 gMemoryTypeInformation[mMemoryTypeStatistics[NewType].InformationIndex].NumberOfPages = (UINT32)mMemoryTypeStatistics[NewType].CurrentNumberOfPages;\r
801 }\r
802 }\r
803 }\r
804 }\r
805\r
806 //\r
807 // Pull range out of descriptor\r
808 //\r
809 if (Entry->Start == Start) {\r
810\r
811 //\r
812 // Clip start\r
813 //\r
814 Entry->Start = RangeEnd + 1;\r
815\r
816 } else if (Entry->End == RangeEnd) {\r
817\r
818 //\r
819 // Clip end\r
820 //\r
821 Entry->End = Start - 1;\r
822\r
823 } else {\r
824\r
825 //\r
826 // Pull it out of the center, clip current\r
827 //\r
828\r
829 //\r
830 // Add a new one\r
831 //\r
832 mMapStack[mMapDepth].Signature = MEMORY_MAP_SIGNATURE;\r
833 mMapStack[mMapDepth].FromPages = FALSE;\r
834 mMapStack[mMapDepth].Type = Entry->Type;\r
835 mMapStack[mMapDepth].Start = RangeEnd+1;\r
836 mMapStack[mMapDepth].End = Entry->End;\r
837\r
838 //\r
839 // Inherit Attribute from the Memory Descriptor that is being clipped\r
840 //\r
841 mMapStack[mMapDepth].Attribute = Entry->Attribute;\r
842\r
843 Entry->End = Start - 1;\r
844 ASSERT (Entry->Start < Entry->End);\r
845\r
846 Entry = &mMapStack[mMapDepth];\r
847 InsertTailList (&gMemoryMap, &Entry->Link);\r
848\r
849 mMapDepth += 1;\r
850 ASSERT (mMapDepth < MAX_MAP_DEPTH);\r
851 }\r
852\r
853 //\r
854 // The new range inherits the same Attribute as the Entry\r
855 // it is being cut out of unless attributes are being changed\r
856 //\r
857 if (ChangingType) {\r
858 Attribute = Entry->Attribute;\r
859 MemType = NewType;\r
860 } else {\r
861 Attribute = NewAttributes;\r
862 MemType = Entry->Type;\r
863 }\r
864\r
865 //\r
866 // If the descriptor is empty, then remove it from the map\r
867 //\r
868 if (Entry->Start == Entry->End + 1) {\r
869 RemoveMemoryMapEntry (Entry);\r
870 Entry = NULL;\r
871 }\r
872\r
873 //\r
874 // Add our new range in\r
875 //\r
876 CoreAddRange (MemType, Start, RangeEnd, Attribute);\r
877 if (ChangingType && (MemType == EfiConventionalMemory)) {\r
878 //\r
879 // Avoid calling DEBUG_CLEAR_MEMORY() for an address of 0 because this\r
880 // macro will ASSERT() if address is 0. Instead, CoreAddRange() guarantees\r
881 // that the page starting at address 0 is always filled with zeros.\r
882 //\r
883 if (Start == 0) {\r
884 if (RangeEnd > EFI_PAGE_SIZE) {\r
885 DEBUG_CLEAR_MEMORY ((VOID *)(UINTN) EFI_PAGE_SIZE, (UINTN) (RangeEnd - EFI_PAGE_SIZE + 1));\r
886 }\r
887 } else {\r
888 DEBUG_CLEAR_MEMORY ((VOID *)(UINTN) Start, (UINTN) (RangeEnd - Start + 1));\r
889 }\r
890 }\r
891\r
892 //\r
893 // Move any map descriptor stack to general pool\r
894 //\r
895 CoreFreeMemoryMapStack ();\r
896\r
897 //\r
898 // Bump the starting address, and convert the next range\r
899 //\r
900 Start = RangeEnd + 1;\r
901 }\r
902\r
903 //\r
904 // Converted the whole range, done\r
905 //\r
906\r
907 return EFI_SUCCESS;\r
908}\r
909\r
910\r
911/**\r
912 Internal function. Converts a memory range to the specified type.\r
913 The range must exist in the memory map.\r
914\r
915 @param Start The first address of the range Must be page\r
916 aligned\r
917 @param NumberOfPages The number of pages to convert\r
918 @param NewType The new type for the memory range\r
919\r
920 @retval EFI_INVALID_PARAMETER Invalid parameter\r
921 @retval EFI_NOT_FOUND Could not find a descriptor cover the specified\r
922 range or convertion not allowed.\r
923 @retval EFI_SUCCESS Successfully converts the memory range to the\r
924 specified type.\r
925\r
926**/\r
927EFI_STATUS\r
928CoreConvertPages (\r
929 IN UINT64 Start,\r
930 IN UINT64 NumberOfPages,\r
931 IN EFI_MEMORY_TYPE NewType\r
932 )\r
933{\r
934 return CoreConvertPagesEx(Start, NumberOfPages, TRUE, NewType, FALSE, 0);\r
935}\r
936\r
937\r
938/**\r
939 Internal function. Converts a memory range to use new attributes.\r
940\r
941 @param Start The first address of the range Must be page\r
942 aligned\r
943 @param NumberOfPages The number of pages to convert\r
944 @param NewAttributes The new attributes value for the range.\r
945\r
946**/\r
947VOID\r
948CoreUpdateMemoryAttributes (\r
949 IN EFI_PHYSICAL_ADDRESS Start,\r
950 IN UINT64 NumberOfPages,\r
951 IN UINT64 NewAttributes\r
952 )\r
953{\r
954 CoreAcquireMemoryLock ();\r
955\r
956 //\r
957 // Update the attributes to the new value\r
958 //\r
959 CoreConvertPagesEx(Start, NumberOfPages, FALSE, (EFI_MEMORY_TYPE)0, TRUE, NewAttributes);\r
960\r
961 CoreReleaseMemoryLock ();\r
962}\r
963\r
964\r
965/**\r
966 Internal function. Finds a consecutive free page range below\r
967 the requested address.\r
968\r
969 @param MaxAddress The address that the range must be below\r
970 @param MinAddress The address that the range must be above\r
971 @param NumberOfPages Number of pages needed\r
972 @param NewType The type of memory the range is going to be\r
973 turned into\r
974 @param Alignment Bits to align with\r
975\r
976 @return The base address of the range, or 0 if the range was not found\r
977\r
978**/\r
979UINT64\r
980CoreFindFreePagesI (\r
981 IN UINT64 MaxAddress,\r
982 IN UINT64 MinAddress,\r
983 IN UINT64 NumberOfPages,\r
984 IN EFI_MEMORY_TYPE NewType,\r
985 IN UINTN Alignment\r
986 )\r
987{\r
988 UINT64 NumberOfBytes;\r
989 UINT64 Target;\r
990 UINT64 DescStart;\r
991 UINT64 DescEnd;\r
992 UINT64 DescNumberOfBytes;\r
993 LIST_ENTRY *Link;\r
994 MEMORY_MAP *Entry;\r
995\r
996 if ((MaxAddress < EFI_PAGE_MASK) ||(NumberOfPages == 0)) {\r
997 return 0;\r
998 }\r
999\r
1000 if ((MaxAddress & EFI_PAGE_MASK) != EFI_PAGE_MASK) {\r
1001\r
1002 //\r
1003 // If MaxAddress is not aligned to the end of a page\r
1004 //\r
1005\r
1006 //\r
1007 // Change MaxAddress to be 1 page lower\r
1008 //\r
1009 MaxAddress -= (EFI_PAGE_MASK + 1);\r
1010\r
1011 //\r
1012 // Set MaxAddress to a page boundary\r
1013 //\r
1014 MaxAddress &= ~(UINT64)EFI_PAGE_MASK;\r
1015\r
1016 //\r
1017 // Set MaxAddress to end of the page\r
1018 //\r
1019 MaxAddress |= EFI_PAGE_MASK;\r
1020 }\r
1021\r
1022 NumberOfBytes = LShiftU64 (NumberOfPages, EFI_PAGE_SHIFT);\r
1023 Target = 0;\r
1024\r
1025 for (Link = gMemoryMap.ForwardLink; Link != &gMemoryMap; Link = Link->ForwardLink) {\r
1026 Entry = CR (Link, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
1027\r
1028 //\r
1029 // If it's not a free entry, don't bother with it\r
1030 //\r
1031 if (Entry->Type != EfiConventionalMemory) {\r
1032 continue;\r
1033 }\r
1034\r
1035 DescStart = Entry->Start;\r
1036 DescEnd = Entry->End;\r
1037\r
1038 //\r
1039 // If desc is past max allowed address or below min allowed address, skip it\r
1040 //\r
1041 if ((DescStart >= MaxAddress) || (DescEnd < MinAddress)) {\r
1042 continue;\r
1043 }\r
1044\r
1045 //\r
1046 // If desc ends past max allowed address, clip the end\r
1047 //\r
1048 if (DescEnd >= MaxAddress) {\r
1049 DescEnd = MaxAddress;\r
1050 }\r
1051\r
1052 DescEnd = ((DescEnd + 1) & (~(Alignment - 1))) - 1;\r
1053\r
1054 //\r
1055 // Compute the number of bytes we can used from this\r
1056 // descriptor, and see it's enough to satisfy the request\r
1057 //\r
1058 DescNumberOfBytes = DescEnd - DescStart + 1;\r
1059\r
1060 if (DescNumberOfBytes >= NumberOfBytes) {\r
1061 //\r
1062 // If the start of the allocated range is below the min address allowed, skip it\r
1063 //\r
1064 if ((DescEnd - NumberOfBytes + 1) < MinAddress) {\r
1065 continue;\r
1066 }\r
1067\r
1068 //\r
1069 // If this is the best match so far remember it\r
1070 //\r
1071 if (DescEnd > Target) {\r
1072 Target = DescEnd;\r
1073 }\r
1074 }\r
1075 }\r
1076\r
1077 //\r
1078 // If this is a grow down, adjust target to be the allocation base\r
1079 //\r
1080 Target -= NumberOfBytes - 1;\r
1081\r
1082 //\r
1083 // If we didn't find a match, return 0\r
1084 //\r
1085 if ((Target & EFI_PAGE_MASK) != 0) {\r
1086 return 0;\r
1087 }\r
1088\r
1089 return Target;\r
1090}\r
1091\r
1092\r
1093/**\r
1094 Internal function. Finds a consecutive free page range below\r
1095 the requested address\r
1096\r
1097 @param MaxAddress The address that the range must be below\r
1098 @param NoPages Number of pages needed\r
1099 @param NewType The type of memory the range is going to be\r
1100 turned into\r
1101 @param Alignment Bits to align with\r
1102\r
1103 @return The base address of the range, or 0 if the range was not found.\r
1104\r
1105**/\r
1106UINT64\r
1107FindFreePages (\r
1108 IN UINT64 MaxAddress,\r
1109 IN UINT64 NoPages,\r
1110 IN EFI_MEMORY_TYPE NewType,\r
1111 IN UINTN Alignment\r
1112 )\r
1113{\r
1114 UINT64 Start;\r
1115\r
1116 //\r
1117 // Attempt to find free pages in the preferred bin based on the requested memory type\r
1118 //\r
1119 if ((UINT32)NewType < EfiMaxMemoryType && MaxAddress >= mMemoryTypeStatistics[NewType].MaximumAddress) {\r
1120 Start = CoreFindFreePagesI (\r
1121 mMemoryTypeStatistics[NewType].MaximumAddress, \r
1122 mMemoryTypeStatistics[NewType].BaseAddress, \r
1123 NoPages, \r
1124 NewType, \r
1125 Alignment\r
1126 );\r
1127 if (Start != 0) {\r
1128 return Start;\r
1129 }\r
1130 }\r
1131\r
1132 //\r
1133 // Attempt to find free pages in the default allocation bin\r
1134 //\r
1135 if (MaxAddress >= mDefaultMaximumAddress) {\r
1136 Start = CoreFindFreePagesI (mDefaultMaximumAddress, 0, NoPages, NewType, Alignment);\r
1137 if (Start != 0) {\r
1138 if (Start < mDefaultBaseAddress) {\r
1139 mDefaultBaseAddress = Start;\r
1140 }\r
1141 return Start;\r
1142 }\r
1143 }\r
1144\r
1145 //\r
1146 // The allocation did not succeed in any of the prefered bins even after \r
1147 // promoting resources. Attempt to find free pages anywhere is the requested \r
1148 // address range. If this allocation fails, then there are not enough \r
1149 // resources anywhere to satisfy the request.\r
1150 //\r
1151 Start = CoreFindFreePagesI (MaxAddress, 0, NoPages, NewType, Alignment);\r
1152 if (Start != 0) {\r
1153 return Start;\r
1154 }\r
1155\r
1156 //\r
1157 // If allocations from the preferred bins fail, then attempt to promote memory resources.\r
1158 //\r
1159 if (!PromoteMemoryResource ()) {\r
1160 return 0;\r
1161 }\r
1162\r
1163 //\r
1164 // If any memory resources were promoted, then re-attempt the allocation\r
1165 //\r
1166 return FindFreePages (MaxAddress, NoPages, NewType, Alignment);\r
1167}\r
1168\r
1169\r
1170/**\r
1171 Allocates pages from the memory map.\r
1172\r
1173 @param Type The type of allocation to perform\r
1174 @param MemoryType The type of memory to turn the allocated pages\r
1175 into\r
1176 @param NumberOfPages The number of pages to allocate\r
1177 @param Memory A pointer to receive the base allocated memory\r
1178 address\r
1179\r
1180 @return Status. On success, Memory is filled in with the base address allocated\r
1181 @retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in\r
1182 spec.\r
1183 @retval EFI_NOT_FOUND Could not allocate pages match the requirement.\r
1184 @retval EFI_OUT_OF_RESOURCES No enough pages to allocate.\r
1185 @retval EFI_SUCCESS Pages successfully allocated.\r
1186\r
1187**/\r
1188EFI_STATUS\r
1189EFIAPI\r
1190CoreInternalAllocatePages (\r
1191 IN EFI_ALLOCATE_TYPE Type,\r
1192 IN EFI_MEMORY_TYPE MemoryType,\r
1193 IN UINTN NumberOfPages,\r
1194 IN OUT EFI_PHYSICAL_ADDRESS *Memory\r
1195 )\r
1196{\r
1197 EFI_STATUS Status;\r
1198 UINT64 Start;\r
1199 UINT64 MaxAddress;\r
1200 UINTN Alignment;\r
1201\r
1202 if ((UINT32)Type >= MaxAllocateType) {\r
1203 return EFI_INVALID_PARAMETER;\r
1204 }\r
1205\r
1206 if ((MemoryType >= EfiMaxMemoryType && MemoryType <= 0x7fffffff) ||\r
1207 (MemoryType == EfiConventionalMemory) || (MemoryType == EfiPersistentMemory)) {\r
1208 return EFI_INVALID_PARAMETER;\r
1209 }\r
1210\r
1211 if (Memory == NULL) {\r
1212 return EFI_INVALID_PARAMETER;\r
1213 }\r
1214\r
1215 Alignment = EFI_DEFAULT_PAGE_ALLOCATION_ALIGNMENT;\r
1216\r
1217 if (MemoryType == EfiACPIReclaimMemory ||\r
1218 MemoryType == EfiACPIMemoryNVS ||\r
1219 MemoryType == EfiRuntimeServicesCode ||\r
1220 MemoryType == EfiRuntimeServicesData) {\r
1221\r
1222 Alignment = EFI_ACPI_RUNTIME_PAGE_ALLOCATION_ALIGNMENT;\r
1223 }\r
1224\r
1225 if (Type == AllocateAddress) {\r
1226 if ((*Memory & (Alignment - 1)) != 0) {\r
1227 return EFI_NOT_FOUND;\r
1228 }\r
1229 }\r
1230\r
1231 NumberOfPages += EFI_SIZE_TO_PAGES (Alignment) - 1;\r
1232 NumberOfPages &= ~(EFI_SIZE_TO_PAGES (Alignment) - 1);\r
1233\r
1234 //\r
1235 // If this is for below a particular address, then\r
1236 //\r
1237 Start = *Memory;\r
1238\r
1239 //\r
1240 // The max address is the max natively addressable address for the processor\r
1241 //\r
1242 MaxAddress = MAX_ADDRESS;\r
1243\r
1244 if (Type == AllocateMaxAddress) {\r
1245 MaxAddress = Start;\r
1246 }\r
1247\r
1248 CoreAcquireMemoryLock ();\r
1249\r
1250 //\r
1251 // If not a specific address, then find an address to allocate\r
1252 //\r
1253 if (Type != AllocateAddress) {\r
1254 Start = FindFreePages (MaxAddress, NumberOfPages, MemoryType, Alignment);\r
1255 if (Start == 0) {\r
1256 Status = EFI_OUT_OF_RESOURCES;\r
1257 goto Done;\r
1258 }\r
1259 }\r
1260\r
1261 //\r
1262 // Convert pages from FreeMemory to the requested type\r
1263 //\r
1264 Status = CoreConvertPages (Start, NumberOfPages, MemoryType);\r
1265\r
1266Done:\r
1267 CoreReleaseMemoryLock ();\r
1268\r
1269 if (!EFI_ERROR (Status)) {\r
1270 *Memory = Start;\r
1271 }\r
1272\r
1273 return Status;\r
1274}\r
1275\r
1276/**\r
1277 Allocates pages from the memory map.\r
1278\r
1279 @param Type The type of allocation to perform\r
1280 @param MemoryType The type of memory to turn the allocated pages\r
1281 into\r
1282 @param NumberOfPages The number of pages to allocate\r
1283 @param Memory A pointer to receive the base allocated memory\r
1284 address\r
1285\r
1286 @return Status. On success, Memory is filled in with the base address allocated\r
1287 @retval EFI_INVALID_PARAMETER Parameters violate checking rules defined in\r
1288 spec.\r
1289 @retval EFI_NOT_FOUND Could not allocate pages match the requirement.\r
1290 @retval EFI_OUT_OF_RESOURCES No enough pages to allocate.\r
1291 @retval EFI_SUCCESS Pages successfully allocated.\r
1292\r
1293**/\r
1294EFI_STATUS\r
1295EFIAPI\r
1296CoreAllocatePages (\r
1297 IN EFI_ALLOCATE_TYPE Type,\r
1298 IN EFI_MEMORY_TYPE MemoryType,\r
1299 IN UINTN NumberOfPages,\r
1300 OUT EFI_PHYSICAL_ADDRESS *Memory\r
1301 )\r
1302{\r
1303 EFI_STATUS Status;\r
1304\r
1305 Status = CoreInternalAllocatePages (Type, MemoryType, NumberOfPages, Memory);\r
1306 if (!EFI_ERROR (Status)) {\r
1307 CoreUpdateProfile ((EFI_PHYSICAL_ADDRESS) (UINTN) RETURN_ADDRESS (0), MemoryProfileActionAllocatePages, MemoryType, EFI_PAGES_TO_SIZE (NumberOfPages), (VOID *) (UINTN) *Memory);\r
1308 }\r
1309 return Status;\r
1310}\r
1311\r
1312/**\r
1313 Frees previous allocated pages.\r
1314\r
1315 @param Memory Base address of memory being freed\r
1316 @param NumberOfPages The number of pages to free\r
1317\r
1318 @retval EFI_NOT_FOUND Could not find the entry that covers the range\r
1319 @retval EFI_INVALID_PARAMETER Address not aligned\r
1320 @return EFI_SUCCESS -Pages successfully freed.\r
1321\r
1322**/\r
1323EFI_STATUS\r
1324EFIAPI\r
1325CoreInternalFreePages (\r
1326 IN EFI_PHYSICAL_ADDRESS Memory,\r
1327 IN UINTN NumberOfPages\r
1328 )\r
1329{\r
1330 EFI_STATUS Status;\r
1331 LIST_ENTRY *Link;\r
1332 MEMORY_MAP *Entry;\r
1333 UINTN Alignment;\r
1334\r
1335 //\r
1336 // Free the range\r
1337 //\r
1338 CoreAcquireMemoryLock ();\r
1339\r
1340 //\r
1341 // Find the entry that the covers the range\r
1342 //\r
1343 Entry = NULL;\r
1344 for (Link = gMemoryMap.ForwardLink; Link != &gMemoryMap; Link = Link->ForwardLink) {\r
1345 Entry = CR(Link, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
1346 if (Entry->Start <= Memory && Entry->End > Memory) {\r
1347 break;\r
1348 }\r
1349 }\r
1350 if (Link == &gMemoryMap) {\r
1351 Status = EFI_NOT_FOUND;\r
1352 goto Done;\r
1353 }\r
1354\r
1355 Alignment = EFI_DEFAULT_PAGE_ALLOCATION_ALIGNMENT;\r
1356\r
1357 ASSERT (Entry != NULL);\r
1358 if (Entry->Type == EfiACPIReclaimMemory ||\r
1359 Entry->Type == EfiACPIMemoryNVS ||\r
1360 Entry->Type == EfiRuntimeServicesCode ||\r
1361 Entry->Type == EfiRuntimeServicesData) {\r
1362\r
1363 Alignment = EFI_ACPI_RUNTIME_PAGE_ALLOCATION_ALIGNMENT;\r
1364\r
1365 }\r
1366\r
1367 if ((Memory & (Alignment - 1)) != 0) {\r
1368 Status = EFI_INVALID_PARAMETER;\r
1369 goto Done;\r
1370 }\r
1371\r
1372 NumberOfPages += EFI_SIZE_TO_PAGES (Alignment) - 1;\r
1373 NumberOfPages &= ~(EFI_SIZE_TO_PAGES (Alignment) - 1);\r
1374\r
1375 Status = CoreConvertPages (Memory, NumberOfPages, EfiConventionalMemory);\r
1376\r
1377 if (EFI_ERROR (Status)) {\r
1378 goto Done;\r
1379 }\r
1380\r
1381Done:\r
1382 CoreReleaseMemoryLock ();\r
1383 return Status;\r
1384}\r
1385\r
1386/**\r
1387 Frees previous allocated pages.\r
1388\r
1389 @param Memory Base address of memory being freed\r
1390 @param NumberOfPages The number of pages to free\r
1391\r
1392 @retval EFI_NOT_FOUND Could not find the entry that covers the range\r
1393 @retval EFI_INVALID_PARAMETER Address not aligned\r
1394 @return EFI_SUCCESS -Pages successfully freed.\r
1395\r
1396**/\r
1397EFI_STATUS\r
1398EFIAPI\r
1399CoreFreePages (\r
1400 IN EFI_PHYSICAL_ADDRESS Memory,\r
1401 IN UINTN NumberOfPages\r
1402 )\r
1403{\r
1404 EFI_STATUS Status;\r
1405\r
1406 Status = CoreInternalFreePages (Memory, NumberOfPages);\r
1407 if (!EFI_ERROR (Status)) {\r
1408 CoreUpdateProfile ((EFI_PHYSICAL_ADDRESS) (UINTN) RETURN_ADDRESS (0), MemoryProfileActionFreePages, (EFI_MEMORY_TYPE) 0, EFI_PAGES_TO_SIZE (NumberOfPages), (VOID *) (UINTN) Memory);\r
1409 }\r
1410 return Status;\r
1411}\r
1412\r
1413/**\r
1414 This function checks to see if the last memory map descriptor in a memory map\r
1415 can be merged with any of the other memory map descriptors in a memorymap.\r
1416 Memory descriptors may be merged if they are adjacent and have the same type\r
1417 and attributes.\r
1418\r
1419 @param MemoryMap A pointer to the start of the memory map.\r
1420 @param MemoryMapDescriptor A pointer to the last descriptor in MemoryMap.\r
1421 @param DescriptorSize The size, in bytes, of an individual\r
1422 EFI_MEMORY_DESCRIPTOR.\r
1423\r
1424 @return A pointer to the next available descriptor in MemoryMap\r
1425\r
1426**/\r
1427EFI_MEMORY_DESCRIPTOR *\r
1428MergeMemoryMapDescriptor (\r
1429 IN EFI_MEMORY_DESCRIPTOR *MemoryMap,\r
1430 IN EFI_MEMORY_DESCRIPTOR *MemoryMapDescriptor,\r
1431 IN UINTN DescriptorSize\r
1432 )\r
1433{\r
1434 //\r
1435 // Traverse the array of descriptors in MemoryMap\r
1436 //\r
1437 for (; MemoryMap != MemoryMapDescriptor; MemoryMap = NEXT_MEMORY_DESCRIPTOR (MemoryMap, DescriptorSize)) {\r
1438 //\r
1439 // Check to see if the Type fields are identical.\r
1440 //\r
1441 if (MemoryMap->Type != MemoryMapDescriptor->Type) {\r
1442 continue;\r
1443 }\r
1444\r
1445 //\r
1446 // Check to see if the Attribute fields are identical.\r
1447 //\r
1448 if (MemoryMap->Attribute != MemoryMapDescriptor->Attribute) {\r
1449 continue;\r
1450 }\r
1451\r
1452 //\r
1453 // Check to see if MemoryMapDescriptor is immediately above MemoryMap\r
1454 //\r
1455 if (MemoryMap->PhysicalStart + EFI_PAGES_TO_SIZE ((UINTN)MemoryMap->NumberOfPages) == MemoryMapDescriptor->PhysicalStart) { \r
1456 //\r
1457 // Merge MemoryMapDescriptor into MemoryMap\r
1458 //\r
1459 MemoryMap->NumberOfPages += MemoryMapDescriptor->NumberOfPages;\r
1460\r
1461 //\r
1462 // Return MemoryMapDescriptor as the next available slot int he MemoryMap array\r
1463 //\r
1464 return MemoryMapDescriptor;\r
1465 }\r
1466\r
1467 //\r
1468 // Check to see if MemoryMapDescriptor is immediately below MemoryMap\r
1469 //\r
1470 if (MemoryMap->PhysicalStart - EFI_PAGES_TO_SIZE ((UINTN)MemoryMapDescriptor->NumberOfPages) == MemoryMapDescriptor->PhysicalStart) {\r
1471 //\r
1472 // Merge MemoryMapDescriptor into MemoryMap\r
1473 //\r
1474 MemoryMap->PhysicalStart = MemoryMapDescriptor->PhysicalStart;\r
1475 MemoryMap->VirtualStart = MemoryMapDescriptor->VirtualStart;\r
1476 MemoryMap->NumberOfPages += MemoryMapDescriptor->NumberOfPages;\r
1477\r
1478 //\r
1479 // Return MemoryMapDescriptor as the next available slot int he MemoryMap array\r
1480 //\r
1481 return MemoryMapDescriptor;\r
1482 }\r
1483 }\r
1484\r
1485 //\r
1486 // MemoryMapDescrtiptor could not be merged with any descriptors in MemoryMap.\r
1487 //\r
1488 // Return the slot immediately after MemoryMapDescriptor as the next available \r
1489 // slot in the MemoryMap array\r
1490 //\r
1491 return NEXT_MEMORY_DESCRIPTOR (MemoryMapDescriptor, DescriptorSize);\r
1492}\r
1493\r
1494/**\r
1495 This function returns a copy of the current memory map. The map is an array of\r
1496 memory descriptors, each of which describes a contiguous block of memory.\r
1497\r
1498 @param MemoryMapSize A pointer to the size, in bytes, of the\r
1499 MemoryMap buffer. On input, this is the size of\r
1500 the buffer allocated by the caller. On output,\r
1501 it is the size of the buffer returned by the\r
1502 firmware if the buffer was large enough, or the\r
1503 size of the buffer needed to contain the map if\r
1504 the buffer was too small.\r
1505 @param MemoryMap A pointer to the buffer in which firmware places\r
1506 the current memory map.\r
1507 @param MapKey A pointer to the location in which firmware\r
1508 returns the key for the current memory map.\r
1509 @param DescriptorSize A pointer to the location in which firmware\r
1510 returns the size, in bytes, of an individual\r
1511 EFI_MEMORY_DESCRIPTOR.\r
1512 @param DescriptorVersion A pointer to the location in which firmware\r
1513 returns the version number associated with the\r
1514 EFI_MEMORY_DESCRIPTOR.\r
1515\r
1516 @retval EFI_SUCCESS The memory map was returned in the MemoryMap\r
1517 buffer.\r
1518 @retval EFI_BUFFER_TOO_SMALL The MemoryMap buffer was too small. The current\r
1519 buffer size needed to hold the memory map is\r
1520 returned in MemoryMapSize.\r
1521 @retval EFI_INVALID_PARAMETER One of the parameters has an invalid value.\r
1522\r
1523**/\r
1524EFI_STATUS\r
1525EFIAPI\r
1526CoreGetMemoryMap (\r
1527 IN OUT UINTN *MemoryMapSize,\r
1528 IN OUT EFI_MEMORY_DESCRIPTOR *MemoryMap,\r
1529 OUT UINTN *MapKey,\r
1530 OUT UINTN *DescriptorSize,\r
1531 OUT UINT32 *DescriptorVersion\r
1532 )\r
1533{\r
1534 EFI_STATUS Status;\r
1535 UINTN Size;\r
1536 UINTN BufferSize;\r
1537 UINTN NumberOfEntries;\r
1538 LIST_ENTRY *Link;\r
1539 MEMORY_MAP *Entry;\r
1540 EFI_GCD_MAP_ENTRY *GcdMapEntry;\r
1541 EFI_MEMORY_TYPE Type;\r
1542 EFI_MEMORY_DESCRIPTOR *MemoryMapStart;\r
1543\r
1544 //\r
1545 // Make sure the parameters are valid\r
1546 //\r
1547 if (MemoryMapSize == NULL) {\r
1548 return EFI_INVALID_PARAMETER;\r
1549 }\r
1550\r
1551 CoreAcquireGcdMemoryLock ();\r
1552\r
1553 //\r
1554 // Count the number of Reserved and runtime MMIO entries\r
1555 // And, count the number of Persistent entries.\r
1556 //\r
1557 NumberOfEntries = 0;\r
1558 for (Link = mGcdMemorySpaceMap.ForwardLink; Link != &mGcdMemorySpaceMap; Link = Link->ForwardLink) {\r
1559 GcdMapEntry = CR (Link, EFI_GCD_MAP_ENTRY, Link, EFI_GCD_MAP_SIGNATURE);\r
1560 if ((GcdMapEntry->GcdMemoryType == EfiGcdMemoryTypePersistentMemory) || \r
1561 (GcdMapEntry->GcdMemoryType == EfiGcdMemoryTypeReserved) ||\r
1562 ((GcdMapEntry->GcdMemoryType == EfiGcdMemoryTypeMemoryMappedIo) &&\r
1563 ((GcdMapEntry->Attributes & EFI_MEMORY_RUNTIME) == EFI_MEMORY_RUNTIME))) {\r
1564 NumberOfEntries ++;\r
1565 }\r
1566 }\r
1567\r
1568 Size = sizeof (EFI_MEMORY_DESCRIPTOR);\r
1569\r
1570 //\r
1571 // Make sure Size != sizeof(EFI_MEMORY_DESCRIPTOR). This will\r
1572 // prevent people from having pointer math bugs in their code.\r
1573 // now you have to use *DescriptorSize to make things work.\r
1574 //\r
1575 Size += sizeof(UINT64) - (Size % sizeof (UINT64));\r
1576\r
1577 if (DescriptorSize != NULL) {\r
1578 *DescriptorSize = Size;\r
1579 }\r
1580\r
1581 if (DescriptorVersion != NULL) {\r
1582 *DescriptorVersion = EFI_MEMORY_DESCRIPTOR_VERSION;\r
1583 }\r
1584\r
1585 CoreAcquireMemoryLock ();\r
1586\r
1587 //\r
1588 // Compute the buffer size needed to fit the entire map\r
1589 //\r
1590 BufferSize = Size * NumberOfEntries;\r
1591 for (Link = gMemoryMap.ForwardLink; Link != &gMemoryMap; Link = Link->ForwardLink) {\r
1592 BufferSize += Size;\r
1593 }\r
1594\r
1595 if (*MemoryMapSize < BufferSize) {\r
1596 Status = EFI_BUFFER_TOO_SMALL;\r
1597 goto Done;\r
1598 }\r
1599\r
1600 if (MemoryMap == NULL) {\r
1601 Status = EFI_INVALID_PARAMETER;\r
1602 goto Done;\r
1603 }\r
1604\r
1605 //\r
1606 // Build the map\r
1607 //\r
1608 ZeroMem (MemoryMap, BufferSize);\r
1609 MemoryMapStart = MemoryMap;\r
1610 for (Link = gMemoryMap.ForwardLink; Link != &gMemoryMap; Link = Link->ForwardLink) {\r
1611 Entry = CR (Link, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
1612 ASSERT (Entry->VirtualStart == 0);\r
1613\r
1614 //\r
1615 // Convert internal map into an EFI_MEMORY_DESCRIPTOR\r
1616 //\r
1617 MemoryMap->Type = Entry->Type;\r
1618 MemoryMap->PhysicalStart = Entry->Start;\r
1619 MemoryMap->VirtualStart = Entry->VirtualStart;\r
1620 MemoryMap->NumberOfPages = RShiftU64 (Entry->End - Entry->Start + 1, EFI_PAGE_SHIFT);\r
1621 //\r
1622 // If the memory type is EfiConventionalMemory, then determine if the range is part of a\r
1623 // memory type bin and needs to be converted to the same memory type as the rest of the\r
1624 // memory type bin in order to minimize EFI Memory Map changes across reboots. This\r
1625 // improves the chances for a successful S4 resume in the presence of minor page allocation\r
1626 // differences across reboots.\r
1627 //\r
1628 if (MemoryMap->Type == EfiConventionalMemory) {\r
1629 for (Type = (EFI_MEMORY_TYPE) 0; Type < EfiMaxMemoryType; Type++) {\r
1630 if (mMemoryTypeStatistics[Type].Special &&\r
1631 mMemoryTypeStatistics[Type].NumberOfPages > 0 &&\r
1632 Entry->Start >= mMemoryTypeStatistics[Type].BaseAddress &&\r
1633 Entry->End <= mMemoryTypeStatistics[Type].MaximumAddress) {\r
1634 MemoryMap->Type = Type;\r
1635 }\r
1636 }\r
1637 }\r
1638 MemoryMap->Attribute = Entry->Attribute;\r
1639 if (MemoryMap->Type < EfiMaxMemoryType) {\r
1640 if (mMemoryTypeStatistics[MemoryMap->Type].Runtime) {\r
1641 MemoryMap->Attribute |= EFI_MEMORY_RUNTIME;\r
1642 }\r
1643 }\r
1644\r
1645 //\r
1646 // Check to see if the new Memory Map Descriptor can be merged with an \r
1647 // existing descriptor if they are adjacent and have the same attributes\r
1648 //\r
1649 MemoryMap = MergeMemoryMapDescriptor (MemoryMapStart, MemoryMap, Size);\r
1650 }\r
1651\r
1652 for (Link = mGcdMemorySpaceMap.ForwardLink; Link != &mGcdMemorySpaceMap; Link = Link->ForwardLink) {\r
1653 GcdMapEntry = CR (Link, EFI_GCD_MAP_ENTRY, Link, EFI_GCD_MAP_SIGNATURE);\r
1654 if ((GcdMapEntry->GcdMemoryType == EfiGcdMemoryTypeReserved) ||\r
1655 ((GcdMapEntry->GcdMemoryType == EfiGcdMemoryTypeMemoryMappedIo) &&\r
1656 ((GcdMapEntry->Attributes & EFI_MEMORY_RUNTIME) == EFI_MEMORY_RUNTIME))) {\r
1657 // \r
1658 // Create EFI_MEMORY_DESCRIPTOR for every Reserved and runtime MMIO GCD entries\r
1659 //\r
1660 MemoryMap->PhysicalStart = GcdMapEntry->BaseAddress;\r
1661 MemoryMap->VirtualStart = 0;\r
1662 MemoryMap->NumberOfPages = RShiftU64 ((GcdMapEntry->EndAddress - GcdMapEntry->BaseAddress + 1), EFI_PAGE_SHIFT);\r
1663 MemoryMap->Attribute = GcdMapEntry->Attributes & ~EFI_MEMORY_PORT_IO;\r
1664\r
1665 if (GcdMapEntry->GcdMemoryType == EfiGcdMemoryTypeReserved) {\r
1666 MemoryMap->Type = EfiReservedMemoryType;\r
1667 } else if (GcdMapEntry->GcdMemoryType == EfiGcdMemoryTypeMemoryMappedIo) {\r
1668 if ((GcdMapEntry->Attributes & EFI_MEMORY_PORT_IO) == EFI_MEMORY_PORT_IO) {\r
1669 MemoryMap->Type = EfiMemoryMappedIOPortSpace;\r
1670 } else {\r
1671 MemoryMap->Type = EfiMemoryMappedIO;\r
1672 }\r
1673 }\r
1674\r
1675 //\r
1676 // Check to see if the new Memory Map Descriptor can be merged with an \r
1677 // existing descriptor if they are adjacent and have the same attributes\r
1678 //\r
1679 MemoryMap = MergeMemoryMapDescriptor (MemoryMapStart, MemoryMap, Size);\r
1680 }\r
1681 \r
1682 if (GcdMapEntry->GcdMemoryType == EfiGcdMemoryTypePersistentMemory) {\r
1683 // \r
1684 // Create EFI_MEMORY_DESCRIPTOR for every Persistent GCD entries\r
1685 //\r
1686 MemoryMap->PhysicalStart = GcdMapEntry->BaseAddress;\r
1687 MemoryMap->VirtualStart = 0;\r
1688 MemoryMap->NumberOfPages = RShiftU64 ((GcdMapEntry->EndAddress - GcdMapEntry->BaseAddress + 1), EFI_PAGE_SHIFT);\r
1689 MemoryMap->Attribute = GcdMapEntry->Attributes | EFI_MEMORY_NV;\r
1690 MemoryMap->Type = EfiPersistentMemory;\r
1691 \r
1692 //\r
1693 // Check to see if the new Memory Map Descriptor can be merged with an \r
1694 // existing descriptor if they are adjacent and have the same attributes\r
1695 //\r
1696 MemoryMap = MergeMemoryMapDescriptor (MemoryMapStart, MemoryMap, Size);\r
1697 }\r
1698 }\r
1699\r
1700 //\r
1701 // Compute the size of the buffer actually used after all memory map descriptor merge operations\r
1702 //\r
1703 BufferSize = ((UINT8 *)MemoryMap - (UINT8 *)MemoryMapStart);\r
1704\r
1705 Status = EFI_SUCCESS;\r
1706\r
1707Done:\r
1708 //\r
1709 // Update the map key finally\r
1710 //\r
1711 if (MapKey != NULL) {\r
1712 *MapKey = mMemoryMapKey;\r
1713 }\r
1714\r
1715 CoreReleaseMemoryLock ();\r
1716\r
1717 CoreReleaseGcdMemoryLock ();\r
1718\r
1719 *MemoryMapSize = BufferSize;\r
1720\r
1721 return Status;\r
1722}\r
1723\r
1724\r
1725/**\r
1726 Internal function. Used by the pool functions to allocate pages\r
1727 to back pool allocation requests.\r
1728\r
1729 @param PoolType The type of memory for the new pool pages\r
1730 @param NumberOfPages No of pages to allocate\r
1731 @param Alignment Bits to align.\r
1732\r
1733 @return The allocated memory, or NULL\r
1734\r
1735**/\r
1736VOID *\r
1737CoreAllocatePoolPages (\r
1738 IN EFI_MEMORY_TYPE PoolType,\r
1739 IN UINTN NumberOfPages,\r
1740 IN UINTN Alignment\r
1741 )\r
1742{\r
1743 UINT64 Start;\r
1744\r
1745 //\r
1746 // Find the pages to convert\r
1747 //\r
1748 Start = FindFreePages (MAX_ADDRESS, NumberOfPages, PoolType, Alignment);\r
1749\r
1750 //\r
1751 // Convert it to boot services data\r
1752 //\r
1753 if (Start == 0) {\r
1754 DEBUG ((DEBUG_ERROR | DEBUG_PAGE, "AllocatePoolPages: failed to allocate %d pages\n", (UINT32)NumberOfPages));\r
1755 } else {\r
1756 CoreConvertPages (Start, NumberOfPages, PoolType);\r
1757 }\r
1758\r
1759 return (VOID *)(UINTN) Start;\r
1760}\r
1761\r
1762\r
1763/**\r
1764 Internal function. Frees pool pages allocated via AllocatePoolPages ()\r
1765\r
1766 @param Memory The base address to free\r
1767 @param NumberOfPages The number of pages to free\r
1768\r
1769**/\r
1770VOID\r
1771CoreFreePoolPages (\r
1772 IN EFI_PHYSICAL_ADDRESS Memory,\r
1773 IN UINTN NumberOfPages\r
1774 )\r
1775{\r
1776 CoreConvertPages (Memory, NumberOfPages, EfiConventionalMemory);\r
1777}\r
1778\r
1779\r
1780\r
1781/**\r
1782 Make sure the memory map is following all the construction rules,\r
1783 it is the last time to check memory map error before exit boot services.\r
1784\r
1785 @param MapKey Memory map key\r
1786\r
1787 @retval EFI_INVALID_PARAMETER Memory map not consistent with construction\r
1788 rules.\r
1789 @retval EFI_SUCCESS Valid memory map.\r
1790\r
1791**/\r
1792EFI_STATUS\r
1793CoreTerminateMemoryMap (\r
1794 IN UINTN MapKey\r
1795 )\r
1796{\r
1797 EFI_STATUS Status;\r
1798 LIST_ENTRY *Link;\r
1799 MEMORY_MAP *Entry;\r
1800\r
1801 Status = EFI_SUCCESS;\r
1802\r
1803 CoreAcquireMemoryLock ();\r
1804\r
1805 if (MapKey == mMemoryMapKey) {\r
1806\r
1807 //\r
1808 // Make sure the memory map is following all the construction rules\r
1809 // This is the last chance we will be able to display any messages on\r
1810 // the console devices.\r
1811 //\r
1812\r
1813 for (Link = gMemoryMap.ForwardLink; Link != &gMemoryMap; Link = Link->ForwardLink) {\r
1814 Entry = CR(Link, MEMORY_MAP, Link, MEMORY_MAP_SIGNATURE);\r
1815 if (Entry->Type < EfiMaxMemoryType) {\r
1816 if (mMemoryTypeStatistics[Entry->Type].Runtime) {\r
1817 ASSERT (Entry->Type != EfiACPIReclaimMemory);\r
1818 ASSERT (Entry->Type != EfiACPIMemoryNVS);\r
1819 if ((Entry->Start & (EFI_ACPI_RUNTIME_PAGE_ALLOCATION_ALIGNMENT - 1)) != 0) {\r
1820 DEBUG((DEBUG_ERROR | DEBUG_PAGE, "ExitBootServices: A RUNTIME memory entry is not on a proper alignment.\n"));\r
1821 Status = EFI_INVALID_PARAMETER;\r
1822 goto Done;\r
1823 }\r
1824 if (((Entry->End + 1) & (EFI_ACPI_RUNTIME_PAGE_ALLOCATION_ALIGNMENT - 1)) != 0) {\r
1825 DEBUG((DEBUG_ERROR | DEBUG_PAGE, "ExitBootServices: A RUNTIME memory entry is not on a proper alignment.\n"));\r
1826 Status = EFI_INVALID_PARAMETER;\r
1827 goto Done;\r
1828 }\r
1829 }\r
1830 }\r
1831 }\r
1832\r
1833 //\r
1834 // The map key they gave us matches what we expect. Fall through and\r
1835 // return success. In an ideal world we would clear out all of\r
1836 // EfiBootServicesCode and EfiBootServicesData. However this function\r
1837 // is not the last one called by ExitBootServices(), so we have to\r
1838 // preserve the memory contents.\r
1839 //\r
1840 } else {\r
1841 Status = EFI_INVALID_PARAMETER;\r
1842 }\r
1843\r
1844Done:\r
1845 CoreReleaseMemoryLock ();\r
1846\r
1847 return Status;\r
1848}\r
1849\r
1850\r
1851\r
1852\r
1853\r
1854\r
1855\r
1856\r
1857\r