| /** @file | |
| Page table management support. | |
| Copyright (c) 2017 - 2019, Intel Corporation. All rights reserved.<BR> | |
| Copyright (c) 2017, AMD Incorporated. All rights reserved.<BR> | |
| SPDX-License-Identifier: BSD-2-Clause-Patent | |
| **/ | |
| #include <Base.h> | |
| #include <Uefi.h> | |
| #include <Library/PeCoffGetEntryPointLib.h> | |
| #include <Library/SerialPortLib.h> | |
| #include <Library/SynchronizationLib.h> | |
| #include <Library/PrintLib.h> | |
| #include <Protocol/SmmBase2.h> | |
| #include <Register/Intel/Cpuid.h> | |
| #include <Register/Intel/Msr.h> | |
| #include "CpuDxe.h" | |
| #include "CpuPageTable.h" | |
| /// | |
| /// Page Table Entry | |
| /// | |
| #define IA32_PG_P BIT0 | |
| #define IA32_PG_RW BIT1 | |
| #define IA32_PG_U BIT2 | |
| #define IA32_PG_WT BIT3 | |
| #define IA32_PG_CD BIT4 | |
| #define IA32_PG_A BIT5 | |
| #define IA32_PG_D BIT6 | |
| #define IA32_PG_PS BIT7 | |
| #define IA32_PG_PAT_2M BIT12 | |
| #define IA32_PG_PAT_4K IA32_PG_PS | |
| #define IA32_PG_PMNT BIT62 | |
| #define IA32_PG_NX BIT63 | |
| #define PAGE_ATTRIBUTE_BITS (IA32_PG_D | IA32_PG_A | IA32_PG_U | IA32_PG_RW | IA32_PG_P) | |
| #define PAGE_ATTRIBUTE_BITS_POST_SPLIT (IA32_PG_RW | IA32_PG_P) | |
| // | |
| // Bits 1, 2, 5, 6 are reserved in the IA32 PAE PDPTE | |
| // X64 PAE PDPTE does not have such restriction | |
| // | |
| #define IA32_PAE_PDPTE_ATTRIBUTE_BITS (IA32_PG_P) | |
| #define PAGE_PROGATE_BITS (IA32_PG_NX | PAGE_ATTRIBUTE_BITS) | |
| #define PAGING_4K_MASK 0xFFF | |
| #define PAGING_2M_MASK 0x1FFFFF | |
| #define PAGING_1G_MASK 0x3FFFFFFF | |
| #define PAGING_PAE_INDEX_MASK 0x1FF | |
| #define PAGING_4K_ADDRESS_MASK_64 0x000FFFFFFFFFF000ull | |
| #define PAGING_2M_ADDRESS_MASK_64 0x000FFFFFFFE00000ull | |
| #define PAGING_1G_ADDRESS_MASK_64 0x000FFFFFC0000000ull | |
| #define MAX_PF_ENTRY_COUNT 10 | |
| #define MAX_DEBUG_MESSAGE_LENGTH 0x100 | |
| #define IA32_PF_EC_ID BIT4 | |
| typedef enum { | |
| PageNone, | |
| Page4K, | |
| Page2M, | |
| Page1G, | |
| } PAGE_ATTRIBUTE; | |
| typedef struct { | |
| PAGE_ATTRIBUTE Attribute; | |
| UINT64 Length; | |
| UINT64 AddressMask; | |
| } PAGE_ATTRIBUTE_TABLE; | |
| typedef enum { | |
| PageActionAssign, | |
| PageActionSet, | |
| PageActionClear, | |
| } PAGE_ACTION; | |
| PAGE_ATTRIBUTE_TABLE mPageAttributeTable[] = { | |
| { Page4K, SIZE_4KB, PAGING_4K_ADDRESS_MASK_64 }, | |
| { Page2M, SIZE_2MB, PAGING_2M_ADDRESS_MASK_64 }, | |
| { Page1G, SIZE_1GB, PAGING_1G_ADDRESS_MASK_64 }, | |
| }; | |
| PAGE_TABLE_POOL *mPageTablePool = NULL; | |
| BOOLEAN mPageTablePoolLock = FALSE; | |
| PAGE_TABLE_LIB_PAGING_CONTEXT mPagingContext; | |
| EFI_SMM_BASE2_PROTOCOL *mSmmBase2 = NULL; | |
| // | |
| // Record the page fault exception count for one instruction execution. | |
| // | |
| UINTN *mPFEntryCount; | |
| UINT64 *(*mLastPFEntryPointer)[MAX_PF_ENTRY_COUNT]; | |
| /** | |
| Check if current execution environment is in SMM mode or not, via | |
| EFI_SMM_BASE2_PROTOCOL. | |
| This is necessary because of the fact that MdePkg\Library\SmmMemoryAllocationLib | |
| supports to free memory outside SMRAM. The library will call gBS->FreePool() or | |
| gBS->FreePages() and then SetMemorySpaceAttributes interface in turn to change | |
| memory paging attributes during free operation, if some memory related features | |
| are enabled (like Heap Guard). | |
| This means that SetMemorySpaceAttributes() has chance to run in SMM mode. This | |
| will cause incorrect result because SMM mode always loads its own page tables, | |
| which are usually different from DXE. This function can be used to detect such | |
| situation and help to avoid further misoperations. | |
| @retval TRUE In SMM mode. | |
| @retval FALSE Not in SMM mode. | |
| **/ | |
| BOOLEAN | |
| IsInSmm ( | |
| VOID | |
| ) | |
| { | |
| BOOLEAN InSmm; | |
| InSmm = FALSE; | |
| if (mSmmBase2 == NULL) { | |
| gBS->LocateProtocol (&gEfiSmmBase2ProtocolGuid, NULL, (VOID **)&mSmmBase2); | |
| } | |
| if (mSmmBase2 != NULL) { | |
| mSmmBase2->InSmm (mSmmBase2, &InSmm); | |
| } | |
| // | |
| // mSmmBase2->InSmm() can only detect if the caller is running in SMRAM | |
| // or from SMM driver. It cannot tell if the caller is running in SMM mode. | |
| // Check page table base address to guarantee that because SMM mode willl | |
| // load its own page table. | |
| // | |
| return (InSmm && | |
| mPagingContext.ContextData.X64.PageTableBase != (UINT64)AsmReadCr3 ()); | |
| } | |
| /** | |
| Return current paging context. | |
| @param[in,out] PagingContext The paging context. | |
| **/ | |
| VOID | |
| GetCurrentPagingContext ( | |
| IN OUT PAGE_TABLE_LIB_PAGING_CONTEXT *PagingContext | |
| ) | |
| { | |
| UINT32 RegEax; | |
| CPUID_EXTENDED_CPU_SIG_EDX RegEdx; | |
| MSR_IA32_EFER_REGISTER MsrEfer; | |
| IA32_CR4 Cr4; | |
| IA32_CR0 Cr0; | |
| UINT32 *Attributes; | |
| UINTN *PageTableBase; | |
| // | |
| // Don't retrieve current paging context from processor if in SMM mode. | |
| // | |
| if (!IsInSmm ()) { | |
| ZeroMem (&mPagingContext, sizeof (mPagingContext)); | |
| if (sizeof (UINTN) == sizeof (UINT64)) { | |
| mPagingContext.MachineType = IMAGE_FILE_MACHINE_X64; | |
| } else { | |
| mPagingContext.MachineType = IMAGE_FILE_MACHINE_I386; | |
| } | |
| GetPagingDetails (&mPagingContext.ContextData, &PageTableBase, &Attributes); | |
| Cr0.UintN = AsmReadCr0 (); | |
| Cr4.UintN = AsmReadCr4 (); | |
| if (Cr0.Bits.PG != 0) { | |
| *PageTableBase = (AsmReadCr3 () & PAGING_4K_ADDRESS_MASK_64); | |
| } else { | |
| *PageTableBase = 0; | |
| } | |
| if (Cr0.Bits.WP != 0) { | |
| *Attributes |= PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_WP_ENABLE; | |
| } | |
| if (Cr4.Bits.PSE != 0) { | |
| *Attributes |= PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_PSE; | |
| } | |
| if (Cr4.Bits.PAE != 0) { | |
| *Attributes |= PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_PAE; | |
| } | |
| if (Cr4.Bits.LA57 != 0) { | |
| *Attributes |= PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_5_LEVEL; | |
| } | |
| AsmCpuid (CPUID_EXTENDED_FUNCTION, &RegEax, NULL, NULL, NULL); | |
| if (RegEax >= CPUID_EXTENDED_CPU_SIG) { | |
| AsmCpuid (CPUID_EXTENDED_CPU_SIG, NULL, NULL, NULL, &RegEdx.Uint32); | |
| if (RegEdx.Bits.NX != 0) { | |
| // XD supported | |
| MsrEfer.Uint64 = AsmReadMsr64 (MSR_CORE_IA32_EFER); | |
| if (MsrEfer.Bits.NXE != 0) { | |
| // XD activated | |
| *Attributes |= PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_XD_ACTIVATED; | |
| } | |
| } | |
| if (RegEdx.Bits.Page1GB != 0) { | |
| *Attributes |= PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_PAGE_1G_SUPPORT; | |
| } | |
| } | |
| } | |
| // | |
| // This can avoid getting SMM paging context if in SMM mode. We cannot assume | |
| // SMM mode shares the same paging context as DXE. | |
| // | |
| CopyMem (PagingContext, &mPagingContext, sizeof (mPagingContext)); | |
| } | |
| /** | |
| Return length according to page attributes. | |
| @param[in] PageAttributes The page attribute of the page entry. | |
| @return The length of page entry. | |
| **/ | |
| UINTN | |
| PageAttributeToLength ( | |
| IN PAGE_ATTRIBUTE PageAttribute | |
| ) | |
| { | |
| UINTN Index; | |
| for (Index = 0; Index < sizeof (mPageAttributeTable)/sizeof (mPageAttributeTable[0]); Index++) { | |
| if (PageAttribute == mPageAttributeTable[Index].Attribute) { | |
| return (UINTN)mPageAttributeTable[Index].Length; | |
| } | |
| } | |
| return 0; | |
| } | |
| /** | |
| Return address mask according to page attributes. | |
| @param[in] PageAttributes The page attribute of the page entry. | |
| @return The address mask of page entry. | |
| **/ | |
| UINTN | |
| PageAttributeToMask ( | |
| IN PAGE_ATTRIBUTE PageAttribute | |
| ) | |
| { | |
| UINTN Index; | |
| for (Index = 0; Index < sizeof (mPageAttributeTable)/sizeof (mPageAttributeTable[0]); Index++) { | |
| if (PageAttribute == mPageAttributeTable[Index].Attribute) { | |
| return (UINTN)mPageAttributeTable[Index].AddressMask; | |
| } | |
| } | |
| return 0; | |
| } | |
| /** | |
| Return page table entry to match the address. | |
| @param[in] PagingContext The paging context. | |
| @param[in] Address The address to be checked. | |
| @param[out] PageAttributes The page attribute of the page entry. | |
| @return The page entry. | |
| **/ | |
| VOID * | |
| GetPageTableEntry ( | |
| IN PAGE_TABLE_LIB_PAGING_CONTEXT *PagingContext, | |
| IN PHYSICAL_ADDRESS Address, | |
| OUT PAGE_ATTRIBUTE *PageAttribute | |
| ) | |
| { | |
| UINTN Index1; | |
| UINTN Index2; | |
| UINTN Index3; | |
| UINTN Index4; | |
| UINTN Index5; | |
| UINT64 *L1PageTable; | |
| UINT64 *L2PageTable; | |
| UINT64 *L3PageTable; | |
| UINT64 *L4PageTable; | |
| UINT64 *L5PageTable; | |
| UINT64 AddressEncMask; | |
| ASSERT (PagingContext != NULL); | |
| Index5 = ((UINTN)RShiftU64 (Address, 48)) & PAGING_PAE_INDEX_MASK; | |
| Index4 = ((UINTN)RShiftU64 (Address, 39)) & PAGING_PAE_INDEX_MASK; | |
| Index3 = ((UINTN)Address >> 30) & PAGING_PAE_INDEX_MASK; | |
| Index2 = ((UINTN)Address >> 21) & PAGING_PAE_INDEX_MASK; | |
| Index1 = ((UINTN)Address >> 12) & PAGING_PAE_INDEX_MASK; | |
| // Make sure AddressEncMask is contained to smallest supported address field. | |
| // | |
| AddressEncMask = PcdGet64 (PcdPteMemoryEncryptionAddressOrMask) & PAGING_1G_ADDRESS_MASK_64; | |
| if (AddressEncMask == 0) { | |
| AddressEncMask = PcdGet64 (PcdTdxSharedBitMask) & PAGING_1G_ADDRESS_MASK_64; | |
| } | |
| if (PagingContext->MachineType == IMAGE_FILE_MACHINE_X64) { | |
| if ((PagingContext->ContextData.X64.Attributes & PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_5_LEVEL) != 0) { | |
| L5PageTable = (UINT64 *)(UINTN)PagingContext->ContextData.X64.PageTableBase; | |
| if (L5PageTable[Index5] == 0) { | |
| *PageAttribute = PageNone; | |
| return NULL; | |
| } | |
| L4PageTable = (UINT64 *)(UINTN)(L5PageTable[Index5] & ~AddressEncMask & PAGING_4K_ADDRESS_MASK_64); | |
| } else { | |
| L4PageTable = (UINT64 *)(UINTN)PagingContext->ContextData.X64.PageTableBase; | |
| } | |
| if (L4PageTable[Index4] == 0) { | |
| *PageAttribute = PageNone; | |
| return NULL; | |
| } | |
| L3PageTable = (UINT64 *)(UINTN)(L4PageTable[Index4] & ~AddressEncMask & PAGING_4K_ADDRESS_MASK_64); | |
| } else { | |
| ASSERT ((PagingContext->ContextData.Ia32.Attributes & PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_PAE) != 0); | |
| L3PageTable = (UINT64 *)(UINTN)PagingContext->ContextData.Ia32.PageTableBase; | |
| } | |
| if (L3PageTable[Index3] == 0) { | |
| *PageAttribute = PageNone; | |
| return NULL; | |
| } | |
| if ((L3PageTable[Index3] & IA32_PG_PS) != 0) { | |
| // 1G | |
| *PageAttribute = Page1G; | |
| return &L3PageTable[Index3]; | |
| } | |
| L2PageTable = (UINT64 *)(UINTN)(L3PageTable[Index3] & ~AddressEncMask & PAGING_4K_ADDRESS_MASK_64); | |
| if (L2PageTable[Index2] == 0) { | |
| *PageAttribute = PageNone; | |
| return NULL; | |
| } | |
| if ((L2PageTable[Index2] & IA32_PG_PS) != 0) { | |
| // 2M | |
| *PageAttribute = Page2M; | |
| return &L2PageTable[Index2]; | |
| } | |
| // 4k | |
| L1PageTable = (UINT64 *)(UINTN)(L2PageTable[Index2] & ~AddressEncMask & PAGING_4K_ADDRESS_MASK_64); | |
| if ((L1PageTable[Index1] == 0) && (Address != 0)) { | |
| *PageAttribute = PageNone; | |
| return NULL; | |
| } | |
| *PageAttribute = Page4K; | |
| return &L1PageTable[Index1]; | |
| } | |
| /** | |
| Return memory attributes of page entry. | |
| @param[in] PageEntry The page entry. | |
| @return Memory attributes of page entry. | |
| **/ | |
| UINT64 | |
| GetAttributesFromPageEntry ( | |
| IN UINT64 *PageEntry | |
| ) | |
| { | |
| UINT64 Attributes; | |
| Attributes = 0; | |
| if ((*PageEntry & IA32_PG_P) == 0) { | |
| Attributes |= EFI_MEMORY_RP; | |
| } | |
| if ((*PageEntry & IA32_PG_RW) == 0) { | |
| Attributes |= EFI_MEMORY_RO; | |
| } | |
| if ((*PageEntry & IA32_PG_NX) != 0) { | |
| Attributes |= EFI_MEMORY_XP; | |
| } | |
| return Attributes; | |
| } | |
| /** | |
| Modify memory attributes of page entry. | |
| @param[in] PagingContext The paging context. | |
| @param[in] PageEntry The page entry. | |
| @param[in] Attributes The bit mask of attributes to modify for the memory region. | |
| @param[in] PageAction The page action. | |
| @param[out] IsModified TRUE means page table modified. FALSE means page table not modified. | |
| **/ | |
| VOID | |
| ConvertPageEntryAttribute ( | |
| IN PAGE_TABLE_LIB_PAGING_CONTEXT *PagingContext, | |
| IN UINT64 *PageEntry, | |
| IN UINT64 Attributes, | |
| IN PAGE_ACTION PageAction, | |
| OUT BOOLEAN *IsModified | |
| ) | |
| { | |
| UINT64 CurrentPageEntry; | |
| UINT64 NewPageEntry; | |
| UINT32 *PageAttributes; | |
| CurrentPageEntry = *PageEntry; | |
| NewPageEntry = CurrentPageEntry; | |
| if ((Attributes & EFI_MEMORY_RP) != 0) { | |
| switch (PageAction) { | |
| case PageActionAssign: | |
| case PageActionSet: | |
| NewPageEntry &= ~(UINT64)IA32_PG_P; | |
| break; | |
| case PageActionClear: | |
| NewPageEntry |= IA32_PG_P; | |
| break; | |
| } | |
| } else { | |
| switch (PageAction) { | |
| case PageActionAssign: | |
| NewPageEntry |= IA32_PG_P; | |
| break; | |
| case PageActionSet: | |
| case PageActionClear: | |
| break; | |
| } | |
| } | |
| if ((Attributes & EFI_MEMORY_RO) != 0) { | |
| switch (PageAction) { | |
| case PageActionAssign: | |
| case PageActionSet: | |
| NewPageEntry &= ~(UINT64)IA32_PG_RW; | |
| break; | |
| case PageActionClear: | |
| NewPageEntry |= IA32_PG_RW; | |
| break; | |
| } | |
| } else { | |
| switch (PageAction) { | |
| case PageActionAssign: | |
| NewPageEntry |= IA32_PG_RW; | |
| break; | |
| case PageActionSet: | |
| case PageActionClear: | |
| break; | |
| } | |
| } | |
| GetPagingDetails (&PagingContext->ContextData, NULL, &PageAttributes); | |
| if ((*PageAttributes & PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_XD_ACTIVATED) != 0) { | |
| if ((Attributes & EFI_MEMORY_XP) != 0) { | |
| switch (PageAction) { | |
| case PageActionAssign: | |
| case PageActionSet: | |
| NewPageEntry |= IA32_PG_NX; | |
| break; | |
| case PageActionClear: | |
| NewPageEntry &= ~IA32_PG_NX; | |
| break; | |
| } | |
| } else { | |
| switch (PageAction) { | |
| case PageActionAssign: | |
| NewPageEntry &= ~IA32_PG_NX; | |
| break; | |
| case PageActionSet: | |
| case PageActionClear: | |
| break; | |
| } | |
| } | |
| } | |
| *PageEntry = NewPageEntry; | |
| if (CurrentPageEntry != NewPageEntry) { | |
| *IsModified = TRUE; | |
| DEBUG ((DEBUG_VERBOSE, "ConvertPageEntryAttribute 0x%lx", CurrentPageEntry)); | |
| DEBUG ((DEBUG_VERBOSE, "->0x%lx\n", NewPageEntry)); | |
| } else { | |
| *IsModified = FALSE; | |
| } | |
| } | |
| /** | |
| This function returns if there is need to split page entry. | |
| @param[in] BaseAddress The base address to be checked. | |
| @param[in] Length The length to be checked. | |
| @param[in] PageEntry The page entry to be checked. | |
| @param[in] PageAttribute The page attribute of the page entry. | |
| @retval SplitAttributes on if there is need to split page entry. | |
| **/ | |
| PAGE_ATTRIBUTE | |
| NeedSplitPage ( | |
| IN PHYSICAL_ADDRESS BaseAddress, | |
| IN UINT64 Length, | |
| IN UINT64 *PageEntry, | |
| IN PAGE_ATTRIBUTE PageAttribute | |
| ) | |
| { | |
| UINT64 PageEntryLength; | |
| PageEntryLength = PageAttributeToLength (PageAttribute); | |
| if (((BaseAddress & (PageEntryLength - 1)) == 0) && (Length >= PageEntryLength)) { | |
| return PageNone; | |
| } | |
| if (((BaseAddress & PAGING_2M_MASK) != 0) || (Length < SIZE_2MB)) { | |
| return Page4K; | |
| } | |
| return Page2M; | |
| } | |
| /** | |
| This function splits one page entry to small page entries. | |
| @param[in] PageEntry The page entry to be splitted. | |
| @param[in] PageAttribute The page attribute of the page entry. | |
| @param[in] SplitAttribute How to split the page entry. | |
| @param[in] AllocatePagesFunc If page split is needed, this function is used to allocate more pages. | |
| @retval RETURN_SUCCESS The page entry is splitted. | |
| @retval RETURN_UNSUPPORTED The page entry does not support to be splitted. | |
| @retval RETURN_OUT_OF_RESOURCES No resource to split page entry. | |
| **/ | |
| RETURN_STATUS | |
| SplitPage ( | |
| IN UINT64 *PageEntry, | |
| IN PAGE_ATTRIBUTE PageAttribute, | |
| IN PAGE_ATTRIBUTE SplitAttribute, | |
| IN PAGE_TABLE_LIB_ALLOCATE_PAGES AllocatePagesFunc | |
| ) | |
| { | |
| UINT64 BaseAddress; | |
| UINT64 *NewPageEntry; | |
| UINTN Index; | |
| UINT64 AddressEncMask; | |
| ASSERT (PageAttribute == Page2M || PageAttribute == Page1G); | |
| ASSERT (AllocatePagesFunc != NULL); | |
| // Make sure AddressEncMask is contained to smallest supported address field. | |
| // | |
| AddressEncMask = PcdGet64 (PcdPteMemoryEncryptionAddressOrMask) & PAGING_1G_ADDRESS_MASK_64; | |
| if (PageAttribute == Page2M) { | |
| // | |
| // Split 2M to 4K | |
| // | |
| ASSERT (SplitAttribute == Page4K); | |
| if (SplitAttribute == Page4K) { | |
| NewPageEntry = AllocatePagesFunc (1); | |
| DEBUG ((DEBUG_VERBOSE, "Split - 0x%x\n", NewPageEntry)); | |
| if (NewPageEntry == NULL) { | |
| return RETURN_OUT_OF_RESOURCES; | |
| } | |
| BaseAddress = *PageEntry & ~AddressEncMask & PAGING_2M_ADDRESS_MASK_64; | |
| for (Index = 0; Index < SIZE_4KB / sizeof (UINT64); Index++) { | |
| NewPageEntry[Index] = (BaseAddress + SIZE_4KB * Index) | AddressEncMask | ((*PageEntry) & PAGE_PROGATE_BITS); | |
| } | |
| (*PageEntry) = (UINT64)(UINTN)NewPageEntry | AddressEncMask | PAGE_ATTRIBUTE_BITS_POST_SPLIT; | |
| return RETURN_SUCCESS; | |
| } else { | |
| return RETURN_UNSUPPORTED; | |
| } | |
| } else if (PageAttribute == Page1G) { | |
| // | |
| // Split 1G to 2M | |
| // No need support 1G->4K directly, we should use 1G->2M, then 2M->4K to get more compact page table. | |
| // | |
| ASSERT (SplitAttribute == Page2M || SplitAttribute == Page4K); | |
| if (((SplitAttribute == Page2M) || (SplitAttribute == Page4K))) { | |
| NewPageEntry = AllocatePagesFunc (1); | |
| DEBUG ((DEBUG_VERBOSE, "Split - 0x%x\n", NewPageEntry)); | |
| if (NewPageEntry == NULL) { | |
| return RETURN_OUT_OF_RESOURCES; | |
| } | |
| BaseAddress = *PageEntry & ~AddressEncMask & PAGING_1G_ADDRESS_MASK_64; | |
| for (Index = 0; Index < SIZE_4KB / sizeof (UINT64); Index++) { | |
| NewPageEntry[Index] = (BaseAddress + SIZE_2MB * Index) | AddressEncMask | IA32_PG_PS | ((*PageEntry) & PAGE_PROGATE_BITS); | |
| } | |
| (*PageEntry) = (UINT64)(UINTN)NewPageEntry | AddressEncMask | PAGE_ATTRIBUTE_BITS_POST_SPLIT; | |
| return RETURN_SUCCESS; | |
| } else { | |
| return RETURN_UNSUPPORTED; | |
| } | |
| } else { | |
| return RETURN_UNSUPPORTED; | |
| } | |
| } | |
| /** | |
| Check the WP status in CR0 register. This bit is used to lock or unlock write | |
| access to pages marked as read-only. | |
| @retval TRUE Write protection is enabled. | |
| @retval FALSE Write protection is disabled. | |
| **/ | |
| BOOLEAN | |
| IsReadOnlyPageWriteProtected ( | |
| VOID | |
| ) | |
| { | |
| IA32_CR0 Cr0; | |
| // | |
| // To avoid unforseen consequences, don't touch paging settings in SMM mode | |
| // in this driver. | |
| // | |
| if (!IsInSmm ()) { | |
| Cr0.UintN = AsmReadCr0 (); | |
| return (BOOLEAN)(Cr0.Bits.WP != 0); | |
| } | |
| return FALSE; | |
| } | |
| /** | |
| Disable Write Protect on pages marked as read-only. | |
| **/ | |
| VOID | |
| DisableReadOnlyPageWriteProtect ( | |
| VOID | |
| ) | |
| { | |
| IA32_CR0 Cr0; | |
| // | |
| // To avoid unforseen consequences, don't touch paging settings in SMM mode | |
| // in this driver. | |
| // | |
| if (!IsInSmm ()) { | |
| Cr0.UintN = AsmReadCr0 (); | |
| Cr0.Bits.WP = 0; | |
| AsmWriteCr0 (Cr0.UintN); | |
| } | |
| } | |
| /** | |
| Enable Write Protect on pages marked as read-only. | |
| **/ | |
| VOID | |
| EnableReadOnlyPageWriteProtect ( | |
| VOID | |
| ) | |
| { | |
| IA32_CR0 Cr0; | |
| // | |
| // To avoid unforseen consequences, don't touch paging settings in SMM mode | |
| // in this driver. | |
| // | |
| if (!IsInSmm ()) { | |
| Cr0.UintN = AsmReadCr0 (); | |
| Cr0.Bits.WP = 1; | |
| AsmWriteCr0 (Cr0.UintN); | |
| } | |
| } | |
| /** | |
| This function modifies the page attributes for the memory region specified by BaseAddress and | |
| Length from their current attributes to the attributes specified by Attributes. | |
| Caller should make sure BaseAddress and Length is at page boundary. | |
| @param[in] PagingContext The paging context. NULL means get page table from current CPU context. | |
| @param[in] BaseAddress The physical address that is the start address of a memory region. | |
| @param[in] Length The size in bytes of the memory region. | |
| @param[in] Attributes The bit mask of attributes to modify for the memory region. | |
| @param[in] PageAction The page action. | |
| @param[in] AllocatePagesFunc If page split is needed, this function is used to allocate more pages. | |
| NULL mean page split is unsupported. | |
| @param[out] IsSplitted TRUE means page table splitted. FALSE means page table not splitted. | |
| @param[out] IsModified TRUE means page table modified. FALSE means page table not modified. | |
| @retval RETURN_SUCCESS The attributes were modified for the memory region. | |
| @retval RETURN_ACCESS_DENIED The attributes for the memory resource range specified by | |
| BaseAddress and Length cannot be modified. | |
| @retval RETURN_INVALID_PARAMETER Length is zero. | |
| Attributes specified an illegal combination of attributes that | |
| cannot be set together. | |
| @retval RETURN_OUT_OF_RESOURCES There are not enough system resources to modify the attributes of | |
| the memory resource range. | |
| @retval RETURN_UNSUPPORTED The processor does not support one or more bytes of the memory | |
| resource range specified by BaseAddress and Length. | |
| The bit mask of attributes is not support for the memory resource | |
| range specified by BaseAddress and Length. | |
| **/ | |
| RETURN_STATUS | |
| ConvertMemoryPageAttributes ( | |
| IN PAGE_TABLE_LIB_PAGING_CONTEXT *PagingContext OPTIONAL, | |
| IN PHYSICAL_ADDRESS BaseAddress, | |
| IN UINT64 Length, | |
| IN UINT64 Attributes, | |
| IN PAGE_ACTION PageAction, | |
| IN PAGE_TABLE_LIB_ALLOCATE_PAGES AllocatePagesFunc OPTIONAL, | |
| OUT BOOLEAN *IsSplitted OPTIONAL, | |
| OUT BOOLEAN *IsModified OPTIONAL | |
| ) | |
| { | |
| PAGE_TABLE_LIB_PAGING_CONTEXT CurrentPagingContext; | |
| UINT64 *PageEntry; | |
| PAGE_ATTRIBUTE PageAttribute; | |
| UINTN PageEntryLength; | |
| PAGE_ATTRIBUTE SplitAttribute; | |
| RETURN_STATUS Status; | |
| BOOLEAN IsEntryModified; | |
| BOOLEAN IsWpEnabled; | |
| if ((BaseAddress & (SIZE_4KB - 1)) != 0) { | |
| DEBUG ((DEBUG_ERROR, "BaseAddress(0x%lx) is not aligned!\n", BaseAddress)); | |
| return EFI_UNSUPPORTED; | |
| } | |
| if ((Length & (SIZE_4KB - 1)) != 0) { | |
| DEBUG ((DEBUG_ERROR, "Length(0x%lx) is not aligned!\n", Length)); | |
| return EFI_UNSUPPORTED; | |
| } | |
| if (Length == 0) { | |
| DEBUG ((DEBUG_ERROR, "Length is 0!\n")); | |
| return RETURN_INVALID_PARAMETER; | |
| } | |
| if ((Attributes & ~EFI_MEMORY_ATTRIBUTE_MASK) != 0) { | |
| DEBUG ((DEBUG_ERROR, "Attributes(0x%lx) has unsupported bit\n", Attributes)); | |
| return EFI_UNSUPPORTED; | |
| } | |
| if (PagingContext == NULL) { | |
| GetCurrentPagingContext (&CurrentPagingContext); | |
| } else { | |
| CopyMem (&CurrentPagingContext, PagingContext, sizeof (CurrentPagingContext)); | |
| } | |
| switch (CurrentPagingContext.MachineType) { | |
| case IMAGE_FILE_MACHINE_I386: | |
| if (CurrentPagingContext.ContextData.Ia32.PageTableBase == 0) { | |
| if (Attributes == 0) { | |
| return EFI_SUCCESS; | |
| } else { | |
| DEBUG ((DEBUG_ERROR, "PageTable is 0!\n")); | |
| return EFI_UNSUPPORTED; | |
| } | |
| } | |
| if ((CurrentPagingContext.ContextData.Ia32.Attributes & PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_PAE) == 0) { | |
| DEBUG ((DEBUG_ERROR, "Non-PAE Paging!\n")); | |
| return EFI_UNSUPPORTED; | |
| } | |
| if ((BaseAddress + Length) > BASE_4GB) { | |
| DEBUG ((DEBUG_ERROR, "Beyond 4GB memory in 32-bit mode!\n")); | |
| return EFI_UNSUPPORTED; | |
| } | |
| break; | |
| case IMAGE_FILE_MACHINE_X64: | |
| ASSERT (CurrentPagingContext.ContextData.X64.PageTableBase != 0); | |
| break; | |
| default: | |
| ASSERT (FALSE); | |
| return EFI_UNSUPPORTED; | |
| break; | |
| } | |
| // DEBUG ((DEBUG_ERROR, "ConvertMemoryPageAttributes(%x) - %016lx, %016lx, %02lx\n", IsSet, BaseAddress, Length, Attributes)); | |
| if (IsSplitted != NULL) { | |
| *IsSplitted = FALSE; | |
| } | |
| if (IsModified != NULL) { | |
| *IsModified = FALSE; | |
| } | |
| if (AllocatePagesFunc == NULL) { | |
| AllocatePagesFunc = AllocatePageTableMemory; | |
| } | |
| // | |
| // Make sure that the page table is changeable. | |
| // | |
| IsWpEnabled = IsReadOnlyPageWriteProtected (); | |
| if (IsWpEnabled) { | |
| DisableReadOnlyPageWriteProtect (); | |
| } | |
| // | |
| // Below logic is to check 2M/4K page to make sure we do not waste memory. | |
| // | |
| Status = EFI_SUCCESS; | |
| while (Length != 0) { | |
| PageEntry = GetPageTableEntry (&CurrentPagingContext, BaseAddress, &PageAttribute); | |
| if (PageEntry == NULL) { | |
| Status = RETURN_UNSUPPORTED; | |
| goto Done; | |
| } | |
| PageEntryLength = PageAttributeToLength (PageAttribute); | |
| SplitAttribute = NeedSplitPage (BaseAddress, Length, PageEntry, PageAttribute); | |
| if (SplitAttribute == PageNone) { | |
| ConvertPageEntryAttribute (&CurrentPagingContext, PageEntry, Attributes, PageAction, &IsEntryModified); | |
| if (IsEntryModified) { | |
| if (IsModified != NULL) { | |
| *IsModified = TRUE; | |
| } | |
| } | |
| // | |
| // Convert success, move to next | |
| // | |
| BaseAddress += PageEntryLength; | |
| Length -= PageEntryLength; | |
| } else { | |
| if (AllocatePagesFunc == NULL) { | |
| Status = RETURN_UNSUPPORTED; | |
| goto Done; | |
| } | |
| Status = SplitPage (PageEntry, PageAttribute, SplitAttribute, AllocatePagesFunc); | |
| if (RETURN_ERROR (Status)) { | |
| Status = RETURN_UNSUPPORTED; | |
| goto Done; | |
| } | |
| if (IsSplitted != NULL) { | |
| *IsSplitted = TRUE; | |
| } | |
| if (IsModified != NULL) { | |
| *IsModified = TRUE; | |
| } | |
| // | |
| // Just split current page | |
| // Convert success in next around | |
| // | |
| } | |
| } | |
| Done: | |
| // | |
| // Restore page table write protection, if any. | |
| // | |
| if (IsWpEnabled) { | |
| EnableReadOnlyPageWriteProtect (); | |
| } | |
| return Status; | |
| } | |
| /** | |
| This function assigns the page attributes for the memory region specified by BaseAddress and | |
| Length from their current attributes to the attributes specified by Attributes. | |
| Caller should make sure BaseAddress and Length is at page boundary. | |
| Caller need guarantee the TPL <= TPL_NOTIFY, if there is split page request. | |
| @param[in] PagingContext The paging context. NULL means get page table from current CPU context. | |
| @param[in] BaseAddress The physical address that is the start address of a memory region. | |
| @param[in] Length The size in bytes of the memory region. | |
| @param[in] Attributes The bit mask of attributes to set for the memory region. | |
| @param[in] AllocatePagesFunc If page split is needed, this function is used to allocate more pages. | |
| NULL mean page split is unsupported. | |
| @retval RETURN_SUCCESS The attributes were cleared for the memory region. | |
| @retval RETURN_ACCESS_DENIED The attributes for the memory resource range specified by | |
| BaseAddress and Length cannot be modified. | |
| @retval RETURN_INVALID_PARAMETER Length is zero. | |
| Attributes specified an illegal combination of attributes that | |
| cannot be set together. | |
| @retval RETURN_OUT_OF_RESOURCES There are not enough system resources to modify the attributes of | |
| the memory resource range. | |
| @retval RETURN_UNSUPPORTED The processor does not support one or more bytes of the memory | |
| resource range specified by BaseAddress and Length. | |
| The bit mask of attributes is not support for the memory resource | |
| range specified by BaseAddress and Length. | |
| **/ | |
| RETURN_STATUS | |
| EFIAPI | |
| AssignMemoryPageAttributes ( | |
| IN PAGE_TABLE_LIB_PAGING_CONTEXT *PagingContext OPTIONAL, | |
| IN PHYSICAL_ADDRESS BaseAddress, | |
| IN UINT64 Length, | |
| IN UINT64 Attributes, | |
| IN PAGE_TABLE_LIB_ALLOCATE_PAGES AllocatePagesFunc OPTIONAL | |
| ) | |
| { | |
| RETURN_STATUS Status; | |
| BOOLEAN IsModified; | |
| BOOLEAN IsSplitted; | |
| // DEBUG((DEBUG_INFO, "AssignMemoryPageAttributes: 0x%lx - 0x%lx (0x%lx)\n", BaseAddress, Length, Attributes)); | |
| Status = ConvertMemoryPageAttributes (PagingContext, BaseAddress, Length, Attributes, PageActionAssign, AllocatePagesFunc, &IsSplitted, &IsModified); | |
| if (!EFI_ERROR (Status)) { | |
| if ((PagingContext == NULL) && IsModified) { | |
| // | |
| // Flush TLB as last step. | |
| // | |
| // Note: Since APs will always init CR3 register in HLT loop mode or do | |
| // TLB flush in MWAIT loop mode, there's no need to flush TLB for them | |
| // here. | |
| // | |
| CpuFlushTlb (); | |
| } | |
| } | |
| return Status; | |
| } | |
| /** | |
| Check if Execute Disable feature is enabled or not. | |
| **/ | |
| BOOLEAN | |
| IsExecuteDisableEnabled ( | |
| VOID | |
| ) | |
| { | |
| MSR_CORE_IA32_EFER_REGISTER MsrEfer; | |
| MsrEfer.Uint64 = AsmReadMsr64 (MSR_IA32_EFER); | |
| return (MsrEfer.Bits.NXE == 1); | |
| } | |
| /** | |
| Update GCD memory space attributes according to current page table setup. | |
| **/ | |
| VOID | |
| RefreshGcdMemoryAttributesFromPaging ( | |
| VOID | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| UINTN NumberOfDescriptors; | |
| EFI_GCD_MEMORY_SPACE_DESCRIPTOR *MemorySpaceMap; | |
| PAGE_TABLE_LIB_PAGING_CONTEXT PagingContext; | |
| PAGE_ATTRIBUTE PageAttribute; | |
| UINT64 *PageEntry; | |
| UINT64 PageLength; | |
| UINT64 MemorySpaceLength; | |
| UINT64 Length; | |
| UINT64 BaseAddress; | |
| UINT64 PageStartAddress; | |
| UINT64 Attributes; | |
| UINT64 Capabilities; | |
| UINT64 NewAttributes; | |
| UINTN Index; | |
| // | |
| // Assuming that memory space map returned is sorted already; otherwise sort | |
| // them in the order of lowest address to highest address. | |
| // | |
| Status = gDS->GetMemorySpaceMap (&NumberOfDescriptors, &MemorySpaceMap); | |
| ASSERT_EFI_ERROR (Status); | |
| GetCurrentPagingContext (&PagingContext); | |
| Attributes = 0; | |
| NewAttributes = 0; | |
| BaseAddress = 0; | |
| PageLength = 0; | |
| if (IsExecuteDisableEnabled ()) { | |
| Capabilities = EFI_MEMORY_RO | EFI_MEMORY_RP | EFI_MEMORY_XP; | |
| } else { | |
| Capabilities = EFI_MEMORY_RO | EFI_MEMORY_RP; | |
| } | |
| for (Index = 0; Index < NumberOfDescriptors; Index++) { | |
| if (MemorySpaceMap[Index].GcdMemoryType == EfiGcdMemoryTypeNonExistent) { | |
| continue; | |
| } | |
| // | |
| // Sync the actual paging related capabilities back to GCD service first. | |
| // As a side effect (good one), this can also help to avoid unnecessary | |
| // memory map entries due to the different capabilities of the same type | |
| // memory, such as multiple RT_CODE and RT_DATA entries in memory map, | |
| // which could cause boot failure of some old Linux distro (before v4.3). | |
| // | |
| Status = gDS->SetMemorySpaceCapabilities ( | |
| MemorySpaceMap[Index].BaseAddress, | |
| MemorySpaceMap[Index].Length, | |
| MemorySpaceMap[Index].Capabilities | Capabilities | |
| ); | |
| if (EFI_ERROR (Status)) { | |
| // | |
| // If we cannot update the capabilities, we cannot update its | |
| // attributes either. So just simply skip current block of memory. | |
| // | |
| DEBUG (( | |
| DEBUG_WARN, | |
| "Failed to update capability: [%lu] %016lx - %016lx (%016lx -> %016lx)\r\n", | |
| (UINT64)Index, | |
| MemorySpaceMap[Index].BaseAddress, | |
| MemorySpaceMap[Index].BaseAddress + MemorySpaceMap[Index].Length - 1, | |
| MemorySpaceMap[Index].Capabilities, | |
| MemorySpaceMap[Index].Capabilities | Capabilities | |
| )); | |
| continue; | |
| } | |
| if (MemorySpaceMap[Index].BaseAddress >= (BaseAddress + PageLength)) { | |
| // | |
| // Current memory space starts at a new page. Resetting PageLength will | |
| // trigger a retrieval of page attributes at new address. | |
| // | |
| PageLength = 0; | |
| } else { | |
| // | |
| // In case current memory space is not adjacent to last one | |
| // | |
| PageLength -= (MemorySpaceMap[Index].BaseAddress - BaseAddress); | |
| } | |
| // | |
| // Sync actual page attributes to GCD | |
| // | |
| BaseAddress = MemorySpaceMap[Index].BaseAddress; | |
| MemorySpaceLength = MemorySpaceMap[Index].Length; | |
| while (MemorySpaceLength > 0) { | |
| if (PageLength == 0) { | |
| PageEntry = GetPageTableEntry (&PagingContext, BaseAddress, &PageAttribute); | |
| if (PageEntry == NULL) { | |
| break; | |
| } | |
| // | |
| // Note current memory space might start in the middle of a page | |
| // | |
| PageStartAddress = (*PageEntry) & (UINT64)PageAttributeToMask (PageAttribute); | |
| PageLength = PageAttributeToLength (PageAttribute) - (BaseAddress - PageStartAddress); | |
| Attributes = GetAttributesFromPageEntry (PageEntry); | |
| } | |
| Length = MIN (PageLength, MemorySpaceLength); | |
| if (Attributes != (MemorySpaceMap[Index].Attributes & | |
| EFI_MEMORY_ATTRIBUTE_MASK)) | |
| { | |
| NewAttributes = (MemorySpaceMap[Index].Attributes & | |
| ~EFI_MEMORY_ATTRIBUTE_MASK) | Attributes; | |
| Status = gDS->SetMemorySpaceAttributes ( | |
| BaseAddress, | |
| Length, | |
| NewAttributes | |
| ); | |
| ASSERT_EFI_ERROR (Status); | |
| DEBUG (( | |
| DEBUG_VERBOSE, | |
| "Updated memory space attribute: [%lu] %016lx - %016lx (%016lx -> %016lx)\r\n", | |
| (UINT64)Index, | |
| BaseAddress, | |
| BaseAddress + Length - 1, | |
| MemorySpaceMap[Index].Attributes, | |
| NewAttributes | |
| )); | |
| } | |
| PageLength -= Length; | |
| MemorySpaceLength -= Length; | |
| BaseAddress += Length; | |
| } | |
| } | |
| FreePool (MemorySpaceMap); | |
| } | |
| /** | |
| Initialize a buffer pool for page table use only. | |
| To reduce the potential split operation on page table, the pages reserved for | |
| page table should be allocated in the times of PAGE_TABLE_POOL_UNIT_PAGES and | |
| at the boundary of PAGE_TABLE_POOL_ALIGNMENT. So the page pool is always | |
| initialized with number of pages greater than or equal to the given PoolPages. | |
| Once the pages in the pool are used up, this method should be called again to | |
| reserve at least another PAGE_TABLE_POOL_UNIT_PAGES. Usually this won't happen | |
| often in practice. | |
| @param[in] PoolPages The least page number of the pool to be created. | |
| @retval TRUE The pool is initialized successfully. | |
| @retval FALSE The memory is out of resource. | |
| **/ | |
| BOOLEAN | |
| InitializePageTablePool ( | |
| IN UINTN PoolPages | |
| ) | |
| { | |
| VOID *Buffer; | |
| BOOLEAN IsModified; | |
| // | |
| // Do not allow re-entrance. | |
| // | |
| if (mPageTablePoolLock) { | |
| return FALSE; | |
| } | |
| mPageTablePoolLock = TRUE; | |
| IsModified = FALSE; | |
| // | |
| // Always reserve at least PAGE_TABLE_POOL_UNIT_PAGES, including one page for | |
| // header. | |
| // | |
| PoolPages += 1; // Add one page for header. | |
| PoolPages = ((PoolPages - 1) / PAGE_TABLE_POOL_UNIT_PAGES + 1) * | |
| PAGE_TABLE_POOL_UNIT_PAGES; | |
| Buffer = AllocateAlignedPages (PoolPages, PAGE_TABLE_POOL_ALIGNMENT); | |
| if (Buffer == NULL) { | |
| DEBUG ((DEBUG_ERROR, "ERROR: Out of aligned pages\r\n")); | |
| goto Done; | |
| } | |
| DEBUG (( | |
| DEBUG_INFO, | |
| "Paging: added %lu pages to page table pool\r\n", | |
| (UINT64)PoolPages | |
| )); | |
| // | |
| // Link all pools into a list for easier track later. | |
| // | |
| if (mPageTablePool == NULL) { | |
| mPageTablePool = Buffer; | |
| mPageTablePool->NextPool = mPageTablePool; | |
| } else { | |
| ((PAGE_TABLE_POOL *)Buffer)->NextPool = mPageTablePool->NextPool; | |
| mPageTablePool->NextPool = Buffer; | |
| mPageTablePool = Buffer; | |
| } | |
| // | |
| // Reserve one page for pool header. | |
| // | |
| mPageTablePool->FreePages = PoolPages - 1; | |
| mPageTablePool->Offset = EFI_PAGES_TO_SIZE (1); | |
| // | |
| // Mark the whole pool pages as read-only. | |
| // | |
| ConvertMemoryPageAttributes ( | |
| NULL, | |
| (PHYSICAL_ADDRESS)(UINTN)Buffer, | |
| EFI_PAGES_TO_SIZE (PoolPages), | |
| EFI_MEMORY_RO, | |
| PageActionSet, | |
| AllocatePageTableMemory, | |
| NULL, | |
| &IsModified | |
| ); | |
| ASSERT (IsModified == TRUE); | |
| Done: | |
| mPageTablePoolLock = FALSE; | |
| return IsModified; | |
| } | |
| /** | |
| This API provides a way to allocate memory for page table. | |
| This API can be called more than once to allocate memory for page tables. | |
| Allocates the number of 4KB pages and returns a pointer to the allocated | |
| buffer. The buffer returned is aligned on a 4KB boundary. | |
| If Pages is 0, then NULL is returned. | |
| If there is not enough memory remaining to satisfy the request, then NULL is | |
| returned. | |
| @param Pages The number of 4 KB pages to allocate. | |
| @return A pointer to the allocated buffer or NULL if allocation fails. | |
| **/ | |
| VOID * | |
| EFIAPI | |
| AllocatePageTableMemory ( | |
| IN UINTN Pages | |
| ) | |
| { | |
| VOID *Buffer; | |
| if (Pages == 0) { | |
| return NULL; | |
| } | |
| // | |
| // Renew the pool if necessary. | |
| // | |
| if ((mPageTablePool == NULL) || | |
| (Pages > mPageTablePool->FreePages)) | |
| { | |
| if (!InitializePageTablePool (Pages)) { | |
| return NULL; | |
| } | |
| } | |
| Buffer = (UINT8 *)mPageTablePool + mPageTablePool->Offset; | |
| mPageTablePool->Offset += EFI_PAGES_TO_SIZE (Pages); | |
| mPageTablePool->FreePages -= Pages; | |
| return Buffer; | |
| } | |
| /** | |
| Special handler for #DB exception, which will restore the page attributes | |
| (not-present). It should work with #PF handler which will set pages to | |
| 'present'. | |
| @param ExceptionType Exception type. | |
| @param SystemContext Pointer to EFI_SYSTEM_CONTEXT. | |
| **/ | |
| VOID | |
| EFIAPI | |
| DebugExceptionHandler ( | |
| IN EFI_EXCEPTION_TYPE ExceptionType, | |
| IN EFI_SYSTEM_CONTEXT SystemContext | |
| ) | |
| { | |
| UINTN CpuIndex; | |
| UINTN PFEntry; | |
| BOOLEAN IsWpEnabled; | |
| MpInitLibWhoAmI (&CpuIndex); | |
| // | |
| // Clear last PF entries | |
| // | |
| IsWpEnabled = IsReadOnlyPageWriteProtected (); | |
| if (IsWpEnabled) { | |
| DisableReadOnlyPageWriteProtect (); | |
| } | |
| for (PFEntry = 0; PFEntry < mPFEntryCount[CpuIndex]; PFEntry++) { | |
| if (mLastPFEntryPointer[CpuIndex][PFEntry] != NULL) { | |
| *mLastPFEntryPointer[CpuIndex][PFEntry] &= ~(UINT64)IA32_PG_P; | |
| } | |
| } | |
| if (IsWpEnabled) { | |
| EnableReadOnlyPageWriteProtect (); | |
| } | |
| // | |
| // Reset page fault exception count for next page fault. | |
| // | |
| mPFEntryCount[CpuIndex] = 0; | |
| // | |
| // Flush TLB | |
| // | |
| CpuFlushTlb (); | |
| // | |
| // Clear TF in EFLAGS | |
| // | |
| if (mPagingContext.MachineType == IMAGE_FILE_MACHINE_I386) { | |
| SystemContext.SystemContextIa32->Eflags &= (UINT32) ~BIT8; | |
| } else { | |
| SystemContext.SystemContextX64->Rflags &= (UINT64) ~BIT8; | |
| } | |
| } | |
| /** | |
| Special handler for #PF exception, which will set the pages which caused | |
| #PF to be 'present'. The attribute of those pages should be restored in | |
| the subsequent #DB handler. | |
| @param ExceptionType Exception type. | |
| @param SystemContext Pointer to EFI_SYSTEM_CONTEXT. | |
| **/ | |
| VOID | |
| EFIAPI | |
| PageFaultExceptionHandler ( | |
| IN EFI_EXCEPTION_TYPE ExceptionType, | |
| IN EFI_SYSTEM_CONTEXT SystemContext | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| UINT64 PFAddress; | |
| PAGE_TABLE_LIB_PAGING_CONTEXT PagingContext; | |
| PAGE_ATTRIBUTE PageAttribute; | |
| UINT64 Attributes; | |
| UINT64 *PageEntry; | |
| UINTN Index; | |
| UINTN CpuIndex; | |
| UINTN PageNumber; | |
| BOOLEAN NonStopMode; | |
| PFAddress = AsmReadCr2 () & ~EFI_PAGE_MASK; | |
| if (PFAddress < BASE_4KB) { | |
| NonStopMode = NULL_DETECTION_NONSTOP_MODE ? TRUE : FALSE; | |
| } else { | |
| NonStopMode = HEAP_GUARD_NONSTOP_MODE ? TRUE : FALSE; | |
| } | |
| if (NonStopMode) { | |
| MpInitLibWhoAmI (&CpuIndex); | |
| GetCurrentPagingContext (&PagingContext); | |
| // | |
| // Memory operation cross page boundary, like "rep mov" instruction, will | |
| // cause infinite loop between this and Debug Trap handler. We have to make | |
| // sure that current page and the page followed are both in PRESENT state. | |
| // | |
| PageNumber = 2; | |
| while (PageNumber > 0) { | |
| PageEntry = GetPageTableEntry (&PagingContext, PFAddress, &PageAttribute); | |
| ASSERT (PageEntry != NULL); | |
| if (PageEntry != NULL) { | |
| Attributes = GetAttributesFromPageEntry (PageEntry); | |
| if ((Attributes & EFI_MEMORY_RP) != 0) { | |
| Attributes &= ~EFI_MEMORY_RP; | |
| Status = AssignMemoryPageAttributes ( | |
| &PagingContext, | |
| PFAddress, | |
| EFI_PAGE_SIZE, | |
| Attributes, | |
| NULL | |
| ); | |
| if (!EFI_ERROR (Status)) { | |
| Index = mPFEntryCount[CpuIndex]; | |
| // | |
| // Re-retrieve page entry because above calling might update page | |
| // table due to table split. | |
| // | |
| PageEntry = GetPageTableEntry (&PagingContext, PFAddress, &PageAttribute); | |
| mLastPFEntryPointer[CpuIndex][Index++] = PageEntry; | |
| mPFEntryCount[CpuIndex] = Index; | |
| } | |
| } | |
| } | |
| PFAddress += EFI_PAGE_SIZE; | |
| --PageNumber; | |
| } | |
| } | |
| // | |
| // Initialize the serial port before dumping. | |
| // | |
| SerialPortInitialize (); | |
| // | |
| // Display ExceptionType, CPU information and Image information | |
| // | |
| DumpCpuContext (ExceptionType, SystemContext); | |
| if (NonStopMode) { | |
| // | |
| // Set TF in EFLAGS | |
| // | |
| if (mPagingContext.MachineType == IMAGE_FILE_MACHINE_I386) { | |
| SystemContext.SystemContextIa32->Eflags |= (UINT32)BIT8; | |
| } else { | |
| SystemContext.SystemContextX64->Rflags |= (UINT64)BIT8; | |
| } | |
| } else { | |
| CpuDeadLoop (); | |
| } | |
| } | |
| /** | |
| Initialize the Page Table lib. | |
| **/ | |
| VOID | |
| InitializePageTableLib ( | |
| VOID | |
| ) | |
| { | |
| PAGE_TABLE_LIB_PAGING_CONTEXT CurrentPagingContext; | |
| UINT32 *Attributes; | |
| UINTN *PageTableBase; | |
| GetCurrentPagingContext (&CurrentPagingContext); | |
| GetPagingDetails (&CurrentPagingContext.ContextData, &PageTableBase, &Attributes); | |
| // | |
| // Reserve memory of page tables for future uses, if paging is enabled. | |
| // | |
| if ((*PageTableBase != 0) && | |
| ((*Attributes & PAGE_TABLE_LIB_PAGING_CONTEXT_IA32_X64_ATTRIBUTES_PAE) != 0)) | |
| { | |
| DisableReadOnlyPageWriteProtect (); | |
| InitializePageTablePool (1); | |
| EnableReadOnlyPageWriteProtect (); | |
| } | |
| if (HEAP_GUARD_NONSTOP_MODE || NULL_DETECTION_NONSTOP_MODE) { | |
| mPFEntryCount = (UINTN *)AllocateZeroPool (sizeof (UINTN) * mNumberOfProcessors); | |
| ASSERT (mPFEntryCount != NULL); | |
| mLastPFEntryPointer = (UINT64 *(*)[MAX_PF_ENTRY_COUNT]) | |
| AllocateZeroPool (sizeof (mLastPFEntryPointer[0]) * mNumberOfProcessors); | |
| ASSERT (mLastPFEntryPointer != NULL); | |
| } | |
| DEBUG ((DEBUG_INFO, "CurrentPagingContext:\n")); | |
| DEBUG ((DEBUG_INFO, " MachineType - 0x%x\n", CurrentPagingContext.MachineType)); | |
| DEBUG ((DEBUG_INFO, " PageTableBase - 0x%Lx\n", (UINT64)*PageTableBase)); | |
| DEBUG ((DEBUG_INFO, " Attributes - 0x%x\n", *Attributes)); | |
| return; | |
| } |