]> git.proxmox.com Git - mirror_edk2.git/blob - MdeModulePkg/Core/DxeIplPeim/DxeLoad.c
Fix the ICC waring for unreachable code.
[mirror_edk2.git] / MdeModulePkg / Core / DxeIplPeim / DxeLoad.c
1 /** @file
2 Last PEIM.
3 Responsibility of this module is to load the DXE Core from a Firmware Volume.
4
5 Copyright (c) 2006 - 2008, Intel Corporation. <BR>
6 All rights reserved. This program and the accompanying materials
7 are licensed and made available under the terms and conditions of the BSD License
8 which accompanies this distribution. The full text of the license may be found at
9 http://opensource.org/licenses/bsd-license.php
10
11 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
12 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
13
14 **/
15
16 #include "DxeIpl.h"
17
18 //
19 // This global variable indicates whether this module has been shadowed
20 // to memory.
21 //
22 BOOLEAN gInMemory = FALSE;
23
24 //
25 // Module Globals used in the DXE to PEI handoff
26 // These must be module globals, so the stack can be switched
27 //
28 CONST EFI_DXE_IPL_PPI mDxeIplPpi = {
29 DxeLoadCore
30 };
31
32 CONST EFI_PEI_GUIDED_SECTION_EXTRACTION_PPI mCustomGuidedSectionExtractionPpi = {
33 CustomGuidedSectionExtract
34 };
35
36 CONST EFI_PEI_DECOMPRESS_PPI mDecompressPpi = {
37 Decompress
38 };
39
40 CONST EFI_PEI_PPI_DESCRIPTOR mPpiList[] = {
41 {
42 EFI_PEI_PPI_DESCRIPTOR_PPI,
43 &gEfiDxeIplPpiGuid,
44 (VOID *) &mDxeIplPpi
45 },
46 {
47 (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
48 &gEfiPeiDecompressPpiGuid,
49 (VOID *) &mDecompressPpi
50 }
51 };
52
53 CONST EFI_PEI_PPI_DESCRIPTOR gEndOfPeiSignalPpi = {
54 (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
55 &gEfiEndOfPeiSignalPpiGuid,
56 NULL
57 };
58
59 /**
60 Initializes the Dxe Ipl PPI
61
62 @param FfsHandle The handle of FFS file.
63 @param PeiServices General purpose services available to
64 every PEIM.
65 @return EFI_SUCESS
66
67 **/
68 EFI_STATUS
69 EFIAPI
70 PeimInitializeDxeIpl (
71 IN EFI_PEI_FILE_HANDLE FfsHandle,
72 IN EFI_PEI_SERVICES **PeiServices
73 )
74 {
75 EFI_STATUS Status;
76 EFI_BOOT_MODE BootMode;
77 EFI_GUID *ExtractHandlerGuidTable;
78 UINTN ExtractHandlerNumber;
79 EFI_PEI_PPI_DESCRIPTOR *GuidPpi;
80
81 BootMode = GetBootModeHob ();
82
83 if (BootMode != BOOT_ON_S3_RESUME) {
84 Status = PeiServicesRegisterForShadow (FfsHandle);
85 if (Status == EFI_SUCCESS) {
86 //
87 // EFI_SUCESS means the first time call register for shadow
88 //
89 return Status;
90 } else if (Status == EFI_ALREADY_STARTED) {
91
92 //
93 // Get custom extract guided section method guid list
94 //
95 ExtractHandlerNumber = ExtractGuidedSectionGetGuidList (&ExtractHandlerGuidTable);
96
97 //
98 // Install custom extraction guid ppi
99 //
100 if (ExtractHandlerNumber > 0) {
101 GuidPpi = (EFI_PEI_PPI_DESCRIPTOR *) AllocatePool (ExtractHandlerNumber * sizeof (EFI_PEI_PPI_DESCRIPTOR));
102 ASSERT (GuidPpi != NULL);
103 while (ExtractHandlerNumber-- > 0) {
104 GuidPpi->Flags = EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST;
105 GuidPpi->Ppi = (VOID *) &mCustomGuidedSectionExtractionPpi;
106 GuidPpi->Guid = &(ExtractHandlerGuidTable [ExtractHandlerNumber]);
107 Status = PeiServicesInstallPpi (GuidPpi++);
108 ASSERT_EFI_ERROR(Status);
109 }
110 }
111 } else {
112 ASSERT (FALSE);
113 }
114 }
115
116 //
117 // Install DxeIpl and Decompress PPIs.
118 //
119 Status = PeiServicesInstallPpi (mPpiList);
120 ASSERT_EFI_ERROR(Status);
121
122 return Status;
123 }
124
125 /**
126 Main entry point to last PEIM.
127
128 @param This Entry point for DXE IPL PPI.
129 @param PeiServices General purpose services available to every PEIM.
130 @param HobList Address to the Pei HOB list.
131
132 @return EFI_SUCCESS DXE core was successfully loaded.
133 @return EFI_OUT_OF_RESOURCES There are not enough resources to load DXE core.
134
135 **/
136 EFI_STATUS
137 EFIAPI
138 DxeLoadCore (
139 IN EFI_DXE_IPL_PPI *This,
140 IN EFI_PEI_SERVICES **PeiServices,
141 IN EFI_PEI_HOB_POINTERS HobList
142 )
143 {
144 EFI_STATUS Status;
145 EFI_FV_FILE_INFO DxeCoreFileInfo;
146 EFI_PHYSICAL_ADDRESS DxeCoreAddress;
147 UINT64 DxeCoreSize;
148 EFI_PHYSICAL_ADDRESS DxeCoreEntryPoint;
149 EFI_BOOT_MODE BootMode;
150 EFI_PEI_FILE_HANDLE FileHandle;
151 EFI_PEI_READ_ONLY_VARIABLE2_PPI *Variable;
152 UINTN DataSize;
153 EFI_MEMORY_TYPE_INFORMATION MemoryData[EfiMaxMemoryType + 1];
154
155 //
156 // if in S3 Resume, restore configure
157 //
158 BootMode = GetBootModeHob ();
159
160 if (BootMode == BOOT_ON_S3_RESUME) {
161 Status = AcpiS3ResumeOs();
162 ASSERT_EFI_ERROR (Status);
163 } else if (BootMode == BOOT_IN_RECOVERY_MODE) {
164 Status = PeiRecoverFirmware ();
165 if (EFI_ERROR (Status)) {
166 DEBUG ((DEBUG_ERROR, "Load Recovery Capsule Failed.(Status = %r)\n", Status));
167 CpuDeadLoop ();
168 }
169
170 //
171 // Now should have a HOB with the DXE core w/ the old HOB destroyed
172 //
173 }
174
175 Status = PeiServicesLocatePpi (
176 &gEfiPeiReadOnlyVariable2PpiGuid,
177 0,
178 NULL,
179 (VOID **)&Variable
180 );
181 if (!EFI_ERROR (Status)) {
182 DataSize = sizeof (MemoryData);
183 Status = Variable->GetVariable (
184 Variable,
185 EFI_MEMORY_TYPE_INFORMATION_VARIABLE_NAME,
186 &gEfiMemoryTypeInformationGuid,
187 NULL,
188 &DataSize,
189 &MemoryData
190 );
191 if (!EFI_ERROR (Status)) {
192 //
193 // Build the GUID'd HOB for DXE
194 //
195 BuildGuidDataHob (
196 &gEfiMemoryTypeInformationGuid,
197 MemoryData,
198 DataSize
199 );
200 }
201 }
202
203 //
204 // Look in all the FVs present in PEI and find the DXE Core FileHandle
205 //
206 FileHandle = DxeIplFindDxeCore ();
207
208 //
209 // Load the DXE Core from a Firmware Volume, may use LoadFile ppi to do this for save code size.
210 //
211 Status = PeiLoadFile (
212 FileHandle,
213 &DxeCoreAddress,
214 &DxeCoreSize,
215 &DxeCoreEntryPoint
216 );
217 ASSERT_EFI_ERROR (Status);
218
219 //
220 // Get the DxeCore File Info from the FileHandle for the DxeCore GUID file name.
221 //
222 Status = PeiServicesFfsGetFileInfo (FileHandle, &DxeCoreFileInfo);
223 ASSERT_EFI_ERROR (Status);
224
225 //
226 // Add HOB for the DXE Core
227 //
228 BuildModuleHob (
229 &DxeCoreFileInfo.FileName,
230 DxeCoreAddress,
231 EFI_SIZE_TO_PAGES ((UINTN) DxeCoreSize) * EFI_PAGE_SIZE,
232 DxeCoreEntryPoint
233 );
234
235 //
236 // Report Status Code EFI_SW_PEI_PC_HANDOFF_TO_NEXT
237 //
238 REPORT_STATUS_CODE (
239 EFI_PROGRESS_CODE,
240 PcdGet32(PcdStatusCodeValuePeiHandoffToDxe)
241 );
242
243 DEBUG ((DEBUG_INFO | DEBUG_LOAD, "Loading DXE CORE at 0x%10p EntryPoint=0x%10p\n", (VOID *)(UINTN)DxeCoreAddress, FUNCTION_ENTRY_POINT (DxeCoreEntryPoint)));
244
245 //
246 // Transfer control to the DXE Core
247 // The handoff state is simply a pointer to the HOB list
248 //
249 HandOffToDxeCore (DxeCoreEntryPoint, HobList);
250 //
251 // If we get here, then the DXE Core returned. This is an error
252 // Dxe Core should not return.
253 //
254 ASSERT (FALSE);
255 CpuDeadLoop ();
256
257 return EFI_OUT_OF_RESOURCES;
258 }
259
260
261 /**
262 Searches DxeCore in all firmware Volumes and loads the first
263 instance that contains DxeCore.
264
265 @return FileHandle of DxeCore to load DxeCore.
266
267 **/
268 EFI_PEI_FILE_HANDLE
269 DxeIplFindDxeCore (
270 VOID
271 )
272 {
273 EFI_STATUS Status;
274 UINTN Instance;
275 EFI_PEI_FV_HANDLE VolumeHandle;
276 EFI_PEI_FILE_HANDLE FileHandle;
277
278 Instance = 0;
279 while (TRUE) {
280 //
281 // Traverse all firmware volume instances
282 //
283 Status = PeiServicesFfsFindNextVolume (Instance, &VolumeHandle);
284 //
285 // If some error occurs here, then we cannot find any firmware
286 // volume that may contain DxeCore.
287 //
288 ASSERT_EFI_ERROR (Status);
289
290 //
291 // Find the DxeCore file type from the beginning in this firmware volume.
292 //
293 FileHandle = NULL;
294 Status = PeiServicesFfsFindNextFile (EFI_FV_FILETYPE_DXE_CORE, VolumeHandle, &FileHandle);
295 if (!EFI_ERROR (Status)) {
296 //
297 // Find DxeCore FileHandle in this volume, then we skip other firmware volume and
298 // return the FileHandle.
299 //
300 return FileHandle;
301 }
302 //
303 // We cannot find DxeCore in this firmware volume, then search the next volume.
304 //
305 Instance++;
306 }
307 }
308
309
310 /**
311 Loads and relocates a PE/COFF image into memory.
312
313 @param FileHandle The image file handle
314 @param ImageAddress The base address of the relocated PE/COFF image
315 @param ImageSize The size of the relocated PE/COFF image
316 @param EntryPoint The entry point of the relocated PE/COFF image
317
318 @return EFI_SUCCESS The file was loaded and relocated
319 @return EFI_OUT_OF_RESOURCES There was not enough memory to load and relocate the PE/COFF file
320
321 **/
322 EFI_STATUS
323 PeiLoadFile (
324 IN EFI_PEI_FILE_HANDLE FileHandle,
325 OUT EFI_PHYSICAL_ADDRESS *ImageAddress,
326 OUT UINT64 *ImageSize,
327 OUT EFI_PHYSICAL_ADDRESS *EntryPoint
328 )
329 {
330
331 EFI_STATUS Status;
332 PE_COFF_LOADER_IMAGE_CONTEXT ImageContext;
333 VOID *Pe32Data;
334
335 //
336 // First try to find the PE32 section in this ffs file.
337 //
338 Status = PeiServicesFfsFindSectionData (
339 EFI_SECTION_PE32,
340 FileHandle,
341 &Pe32Data
342 );
343 if (EFI_ERROR (Status)) {
344 //
345 // NO image types we support so exit.
346 //
347 return Status;
348 }
349
350 ZeroMem (&ImageContext, sizeof (ImageContext));
351 ImageContext.Handle = Pe32Data;
352 Status = GetImageReadFunction (&ImageContext);
353
354 ASSERT_EFI_ERROR (Status);
355
356 Status = PeCoffLoaderGetImageInfo (&ImageContext);
357 if (EFI_ERROR (Status)) {
358 return Status;
359 }
360 //
361 // Allocate Memory for the image
362 //
363 ImageContext.ImageAddress = (EFI_PHYSICAL_ADDRESS)(UINTN) AllocatePages (EFI_SIZE_TO_PAGES ((UINT32) ImageContext.ImageSize));
364 ASSERT (ImageContext.ImageAddress != 0);
365
366 //
367 // Load the image to our new buffer
368 //
369 Status = PeCoffLoaderLoadImage (&ImageContext);
370 if (EFI_ERROR (Status)) {
371 return Status;
372 }
373 //
374 // Relocate the image in our new buffer
375 //
376 Status = PeCoffLoaderRelocateImage (&ImageContext);
377 if (EFI_ERROR (Status)) {
378 return Status;
379 }
380
381 //
382 // Flush the instruction cache so the image data is written before we execute it
383 //
384 InvalidateInstructionCacheRange ((VOID *)(UINTN)ImageContext.ImageAddress, (UINTN)ImageContext.ImageSize);
385
386 *ImageAddress = ImageContext.ImageAddress;
387 *ImageSize = ImageContext.ImageSize;
388 *EntryPoint = ImageContext.EntryPoint;
389
390 return EFI_SUCCESS;
391 }
392
393
394
395
396 /**
397 The ExtractSection() function processes the input section and
398 returns a pointer to the section contents. If the section being
399 extracted does not require processing (if the section
400 GuidedSectionHeader.Attributes has the
401 EFI_GUIDED_SECTION_PROCESSING_REQUIRED field cleared), then
402 OutputBuffer is just updated to point to the start of the
403 section's contents. Otherwise, *Buffer must be allocated
404 from PEI permanent memory.
405
406 @param This Indicates the
407 EFI_PEI_GUIDED_SECTION_EXTRACTION_PPI instance.
408 Buffer containing the input GUIDed section to be
409 processed. OutputBuffer OutputBuffer is
410 allocated from PEI permanent memory and contains
411 the new section stream.
412 @param InputSection A pointer to the input buffer, which contains
413 the input section to be processed.
414 @param OutputBuffer A pointer to a caller-allocated buffer, whose
415 size is specified by the contents of OutputSize.
416 @param OutputSize A pointer to a caller-allocated
417 UINTN in which the size of *OutputBuffer
418 allocation is stored. If the function
419 returns anything other than EFI_SUCCESS,
420 the value of OutputSize is undefined.
421 @param AuthenticationStatus A pointer to a caller-allocated
422 UINT32 that indicates the
423 authentication status of the
424 output buffer. If the input
425 section's GuidedSectionHeader.
426 Attributes field has the
427 EFI_GUIDED_SECTION_AUTH_STATUS_VALID
428 bit as clear,
429 AuthenticationStatus must return
430 zero. These bits reflect the
431 status of the extraction
432 operation. If the function
433 returns anything other than
434 EFI_SUCCESS, the value of
435 AuthenticationStatus is
436 undefined.
437
438 @retval EFI_SUCCESS The InputSection was
439 successfully processed and the
440 section contents were returned.
441
442 @retval EFI_OUT_OF_RESOURCES The system has insufficient
443 resources to process the request.
444
445 @retval EFI_INVALID_PARAMETER The GUID in InputSection does
446 not match this instance of the
447 GUIDed Section Extraction PPI.
448
449 **/
450 EFI_STATUS
451 CustomGuidedSectionExtract (
452 IN CONST EFI_PEI_GUIDED_SECTION_EXTRACTION_PPI *This,
453 IN CONST VOID *InputSection,
454 OUT VOID **OutputBuffer,
455 OUT UINTN *OutputSize,
456 OUT UINT32 *AuthenticationStatus
457 )
458 {
459 EFI_STATUS Status;
460 UINT8 *ScratchBuffer;
461 UINT32 ScratchBufferSize;
462 UINT32 OutputBufferSize;
463 UINT16 SectionAttribute;
464
465 //
466 // Init local variable
467 //
468 ScratchBuffer = NULL;
469
470 //
471 // Call GetInfo to get the size and attribute of input guided section data.
472 //
473 Status = ExtractGuidedSectionGetInfo (
474 InputSection,
475 &OutputBufferSize,
476 &ScratchBufferSize,
477 &SectionAttribute
478 );
479
480 if (EFI_ERROR (Status)) {
481 DEBUG ((DEBUG_ERROR, "GetInfo from guided section Failed - %r\n", Status));
482 return Status;
483 }
484
485 if (ScratchBufferSize != 0) {
486 //
487 // Allocate scratch buffer
488 //
489 ScratchBuffer = AllocatePages (EFI_SIZE_TO_PAGES (ScratchBufferSize));
490 if (ScratchBuffer == NULL) {
491 return EFI_OUT_OF_RESOURCES;
492 }
493 }
494
495 if (((SectionAttribute & EFI_GUIDED_SECTION_PROCESSING_REQUIRED) != 0) && OutputBufferSize > 0) {
496 //
497 // Allocate output buffer
498 //
499 *OutputBuffer = AllocatePages (EFI_SIZE_TO_PAGES (OutputBufferSize) + 1);
500 if (*OutputBuffer == NULL) {
501 return EFI_OUT_OF_RESOURCES;
502 }
503 DEBUG ((DEBUG_INFO, "Customed Guided section Memory Size required is 0x%x and address is 0x%p\n", OutputBufferSize, *OutputBuffer));
504 //
505 // *OutputBuffer still is one section. Adjust *OutputBuffer offset,
506 // skip EFI section header to make section data at page alignment.
507 //
508 *OutputBuffer = (VOID *)((UINT8 *) *OutputBuffer + EFI_PAGE_SIZE - sizeof (EFI_COMMON_SECTION_HEADER));
509 }
510
511 Status = ExtractGuidedSectionDecode (
512 InputSection,
513 OutputBuffer,
514 ScratchBuffer,
515 AuthenticationStatus
516 );
517 if (EFI_ERROR (Status)) {
518 //
519 // Decode failed
520 //
521 DEBUG ((DEBUG_ERROR, "Extract guided section Failed - %r\n", Status));
522 return Status;
523 }
524
525 *OutputSize = (UINTN) OutputBufferSize;
526
527 return EFI_SUCCESS;
528 }
529
530
531
532 /**
533 Decompresses a section to the output buffer.
534
535 This function lookes up the compression type field in the input section and
536 applies the appropriate compression algorithm to compress the section to a
537 callee allocated buffer.
538
539 @param This Points to this instance of the
540 EFI_PEI_DECOMPRESS_PEI PPI.
541 @param CompressionSection Points to the compressed section.
542 @param OutputBuffer Holds the returned pointer to the decompressed
543 sections.
544 @param OutputSize Holds the returned size of the decompress
545 section streams.
546
547 @retval EFI_SUCCESS The section was decompressed successfully.
548 OutputBuffer contains the resulting data and
549 OutputSize contains the resulting size.
550
551 **/
552 EFI_STATUS
553 EFIAPI
554 Decompress (
555 IN CONST EFI_PEI_DECOMPRESS_PPI *This,
556 IN CONST EFI_COMPRESSION_SECTION *CompressionSection,
557 OUT VOID **OutputBuffer,
558 OUT UINTN *OutputSize
559 )
560 {
561 EFI_STATUS Status;
562 UINT8 *DstBuffer;
563 UINT8 *ScratchBuffer;
564 UINTN DstBufferSize;
565 UINT32 ScratchBufferSize;
566 EFI_COMMON_SECTION_HEADER *Section;
567 UINTN SectionLength;
568
569 if (CompressionSection->CommonHeader.Type != EFI_SECTION_COMPRESSION) {
570 ASSERT (FALSE);
571 return EFI_INVALID_PARAMETER;
572 }
573
574 Section = (EFI_COMMON_SECTION_HEADER *) CompressionSection;
575 SectionLength = *(UINT32 *) (Section->Size) & 0x00ffffff;
576
577 //
578 // This is a compression set, expand it
579 //
580 switch (CompressionSection->CompressionType) {
581 case EFI_STANDARD_COMPRESSION:
582 //
583 // Load EFI standard compression.
584 // For compressed data, decompress them to dstbuffer.
585 //
586 Status = UefiDecompressGetInfo (
587 (UINT8 *) ((EFI_COMPRESSION_SECTION *) Section + 1),
588 (UINT32) SectionLength - sizeof (EFI_COMPRESSION_SECTION),
589 (UINT32 *) &DstBufferSize,
590 &ScratchBufferSize
591 );
592 if (EFI_ERROR (Status)) {
593 //
594 // GetInfo failed
595 //
596 DEBUG ((DEBUG_ERROR, "Decompress GetInfo Failed - %r\n", Status));
597 return EFI_NOT_FOUND;
598 }
599 //
600 // Allocate scratch buffer
601 //
602 ScratchBuffer = AllocatePages (EFI_SIZE_TO_PAGES (ScratchBufferSize));
603 if (ScratchBuffer == NULL) {
604 return EFI_OUT_OF_RESOURCES;
605 }
606 //
607 // Allocate destination buffer, extra one page for adjustment
608 //
609 DstBuffer = AllocatePages (EFI_SIZE_TO_PAGES (DstBufferSize) + 1);
610 if (DstBuffer == NULL) {
611 return EFI_OUT_OF_RESOURCES;
612 }
613 //
614 // DstBuffer still is one section. Adjust DstBuffer offset, skip EFI section header
615 // to make section data at page alignment.
616 //
617 DstBuffer = DstBuffer + EFI_PAGE_SIZE - sizeof (EFI_COMMON_SECTION_HEADER);
618 //
619 // Call decompress function
620 //
621 Status = UefiDecompress (
622 (CHAR8 *) ((EFI_COMPRESSION_SECTION *) Section + 1),
623 DstBuffer,
624 ScratchBuffer
625 );
626 if (EFI_ERROR (Status)) {
627 //
628 // Decompress failed
629 //
630 DEBUG ((DEBUG_ERROR, "Decompress Failed - %r\n", Status));
631 return EFI_NOT_FOUND;
632 }
633 break;
634
635 case EFI_NOT_COMPRESSED:
636 //
637 // Allocate destination buffer
638 //
639 DstBufferSize = CompressionSection->UncompressedLength;
640 DstBuffer = AllocatePages (EFI_SIZE_TO_PAGES (DstBufferSize) + 1);
641 if (DstBuffer == NULL) {
642 return EFI_OUT_OF_RESOURCES;
643 }
644 //
645 // Adjust DstBuffer offset, skip EFI section header
646 // to make section data at page alignment.
647 //
648 DstBuffer = DstBuffer + EFI_PAGE_SIZE - sizeof (EFI_COMMON_SECTION_HEADER);
649 //
650 // stream is not actually compressed, just encapsulated. So just copy it.
651 //
652 CopyMem (DstBuffer, CompressionSection + 1, DstBufferSize);
653 break;
654
655 default:
656 //
657 // Don't support other unknown compression type.
658 //
659 ASSERT (FALSE);
660 return EFI_NOT_FOUND;
661 }
662
663 *OutputSize = DstBufferSize;
664 *OutputBuffer = DstBuffer;
665
666 return EFI_SUCCESS;
667 }
668
669
670
671
672 /**
673 Updates the Stack HOB passed to DXE phase.
674
675 This function traverses the whole HOB list and update the stack HOB to
676 reflect the real stack that is used by DXE core.
677
678 @param BaseAddress The lower address of stack used by DxeCore.
679 @param Length The length of stack used by DxeCore.
680
681 **/
682 VOID
683 UpdateStackHob (
684 IN EFI_PHYSICAL_ADDRESS BaseAddress,
685 IN UINT64 Length
686 )
687 {
688 EFI_PEI_HOB_POINTERS Hob;
689
690 Hob.Raw = GetHobList ();
691 while ((Hob.Raw = GetNextHob (EFI_HOB_TYPE_MEMORY_ALLOCATION, Hob.Raw)) != NULL) {
692 if (CompareGuid (&gEfiHobMemoryAllocStackGuid, &(Hob.MemoryAllocationStack->AllocDescriptor.Name))) {
693 //
694 // Build a new memory allocation HOB with old stack info with EfiConventionalMemory type
695 // to be reclaimed by DXE core.
696 //
697 BuildMemoryAllocationHob (
698 Hob.MemoryAllocationStack->AllocDescriptor.MemoryBaseAddress,
699 Hob.MemoryAllocationStack->AllocDescriptor.MemoryLength,
700 EfiConventionalMemory
701 );
702 //
703 // Update the BSP Stack Hob to reflect the new stack info.
704 //
705 Hob.MemoryAllocationStack->AllocDescriptor.MemoryBaseAddress = BaseAddress;
706 Hob.MemoryAllocationStack->AllocDescriptor.MemoryLength = Length;
707 break;
708 }
709 Hob.Raw = GET_NEXT_HOB (Hob);
710 }
711 }