From patchwork Wed Feb 28 15:44:40 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ard Biesheuvel X-Patchwork-Id: 130003 Delivered-To: patch@linaro.org Received: by 10.46.66.2 with SMTP id p2csp1168766lja; Wed, 28 Feb 2018 07:44:54 -0800 (PST) X-Google-Smtp-Source: AG47ELv1PDJFGBuyb5UxvxVmVNYGmD0hq5i05XP95RUh2RcZNOJrm8Ow5cmEQkWXl++Xq85aN/Ev X-Received: by 10.99.47.132 with SMTP id v126mr8632025pgv.42.1519832694103; Wed, 28 Feb 2018 07:44:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519832694; cv=none; d=google.com; s=arc-20160816; b=CNLLN3IT471FwTi941WBxUQ39NVCRuOqaxODhNLft4m5oJvYFslFu5/PO0yAHbnGjg 4TkbUzBvd+GbROdDEQcfVQ4ZtWGBKVVzcPm4idFF3B26GKOU9H1IWmOOK8C0rStJahT+ PyhQ7tvPWimuvX9KQBtH4Rnzm5m22i/WMqukDrafMfqTRuoTrHRCIVM9WNId5vOMpdDt /4XC5DwXwvzZ5YKveO8vBGzl42ycPDvuzlGWAd+O+xV1U5BqCsHIlAw9wA2BgjtciKXJ aaktf0xch0YXyXCbaxBgDNNkE+INqrmHDxgzqFNJ7tZm/Rjq7R1go1vgJXOKUc8XOhMd H7jw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:content-transfer-encoding:mime-version:cc :list-subscribe:list-help:list-post:list-archive:list-unsubscribe :list-id:precedence:subject:message-id:date:to:from:dkim-signature :delivered-to:arc-authentication-results; bh=gN8HhcrP6j8asXIoQqvnwAhY2sjv1nz/gCKJ2/WfB94=; b=T9qjZcGMYbF4AmjJ9pKM/q+WZo990M26PnL6BLIUGqCBosNqIvreaDX5Fos6p497Ir EzbG0drLD+Ul5vovNonWgrHLxckBqg3qxPVmovFG3UKJouIPxYSmuEEBqtAOfK1US3IZ V5uF1IFSFYJ0pmIvO1q6gqftMEl6HK/ZrRK9bVdD2sjFT3zeER66K5wYlwsF60JG3cYT Iza4fZDSgC8BSpnXflhwHzcRjYvgSXNTk6WQimsfVCI3I+G4thZE+KhNkjaPrlMYaM0J rAiVUXQAxLGYhHHh1NUGFMcX9xtGuIopEwvMHCSDTveKYDerqhUO39vEvqeLoDVdbteU LJoQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org header.s=google header.b=Xx6awq7k; spf=pass (google.com: best guess record for domain of edk2-devel-bounces@lists.01.org designates 198.145.21.10 as permitted sender) smtp.mailfrom=edk2-devel-bounces@lists.01.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from ml01.01.org (ml01.01.org. [198.145.21.10]) by mx.google.com with ESMTPS id k8-v6si1471873pli.490.2018.02.28.07.44.53 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 28 Feb 2018 07:44:54 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of edk2-devel-bounces@lists.01.org designates 198.145.21.10 as permitted sender) client-ip=198.145.21.10; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@linaro.org header.s=google header.b=Xx6awq7k; spf=pass (google.com: best guess record for domain of edk2-devel-bounces@lists.01.org designates 198.145.21.10 as permitted sender) smtp.mailfrom=edk2-devel-bounces@lists.01.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 8C10522402E07; Wed, 28 Feb 2018 07:38:45 -0800 (PST) X-Original-To: edk2-devel@lists.01.org Delivered-To: edk2-devel@lists.01.org Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=2a00:1450:400c:c09::243; helo=mail-wm0-x243.google.com; envelope-from=ard.biesheuvel@linaro.org; receiver=edk2-devel@lists.01.org Received: from mail-wm0-x243.google.com (mail-wm0-x243.google.com [IPv6:2a00:1450:400c:c09::243]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 87B8B22402DE5 for ; Wed, 28 Feb 2018 07:38:43 -0800 (PST) Received: by mail-wm0-x243.google.com with SMTP id t6so5925668wmt.5 for ; Wed, 28 Feb 2018 07:44:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id; bh=/nagrUO8UN+BxHPBO8Q1Ip1XdGvWFchlfNh01SoLTUg=; b=Xx6awq7kSJwIh2NKjft1fR1rlJc6UpfsolMBMultLoVnhROJEKQfcvxrvB5NW/tso9 HIgKj6nbX+u/xR0WJLdWjTS2TqJyJKCeKzCsYm286rN9M0TxSWkhRB9dZl3iL0qOGfsO KP+aWkuK/X1vjhulPnHKEn4MeLUbLd366r74k= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=/nagrUO8UN+BxHPBO8Q1Ip1XdGvWFchlfNh01SoLTUg=; b=HA+6CRw404CsfUxyOnS+xMQ7GuiPLLpeY6ktyiUp/3wv4JmA96pKNUI8VC/wk4tQ7x CepIwRWVnztal6uG12BK9tyR06eTE2B5aAAWdenti7ERD+6gwRuXb1kGxsETw93B5Fq/ WpoyfxXrnbi/P03ElMf3oU1rMSFpWrsf4bHHnWlZ13z31ArjThbdN0KVjjnrW2//+cq0 X+afPrpMAjPozLbZ1KbWP8uKwHpiB9lgSfmhc/+Vv02AtG/iX+J8GlwrkLs1YLY+oZEa 9AK+DDwcIYcGu9VQCVc09bDdT1O/ZnlQoRFJ9f1H2wdga1nyddMU20+a9a/ze/PkIpfw g4YA== X-Gm-Message-State: APf1xPA1p20AVOnWMGCnwAuTj+tyQmHourPUd6IigiDdT6tKwY9QK0fs vTtx1IJCWfbHvkerL1X37mTKOAK7hDk= X-Received: by 10.28.245.3 with SMTP id t3mr165740wmh.134.1519832688384; Wed, 28 Feb 2018 07:44:48 -0800 (PST) Received: from localhost.localdomain ([160.163.57.8]) by smtp.gmail.com with ESMTPSA id k18sm3326204wmd.4.2018.02.28.07.44.46 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 28 Feb 2018 07:44:47 -0800 (PST) From: Ard Biesheuvel To: edk2-devel@lists.01.org Date: Wed, 28 Feb 2018 15:44:40 +0000 Message-Id: <20180228154441.10554-1-ard.biesheuvel@linaro.org> X-Mailer: git-send-email 2.11.0 Subject: [edk2] [PATCH 1/2] ArmPlatformPkg/MemoryInitPeiLib: revert "don't reserve primary FV in memory" X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: leif.lindholm@linaro.org, Ard Biesheuvel MIME-Version: 1.0 Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" Commit 8ae5fc182941 ("ArmPlatformPkg/MemoryInitPeiLib: don't reserve primary FV in memory") deleted the code that removes the memory covering the primary firmware volume from the memory map. The assumption was that this is no longer necessary now that we no longer expose compression and PE/COFF loader library code from the PrePi module to DXE core. However, the FV is still declared, and so code may attempt to access it anyway, which may cause unexpected results depending on whether the memory has been reused for other purposes in the mean time. So revert this change in preparation of dealing with this in a better way. Signed-off-by: Ard Biesheuvel --- ArmPlatformPkg/MemoryInitPei/MemoryInitPeiLib.c | 69 ++++++++++++++++++++ 1 file changed, 69 insertions(+) -- 2.11.0 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel diff --git a/ArmPlatformPkg/MemoryInitPei/MemoryInitPeiLib.c b/ArmPlatformPkg/MemoryInitPei/MemoryInitPeiLib.c index d03214b5df66..2feb11f21d5d 100644 --- a/ArmPlatformPkg/MemoryInitPei/MemoryInitPeiLib.c +++ b/ArmPlatformPkg/MemoryInitPei/MemoryInitPeiLib.c @@ -70,7 +70,11 @@ MemoryPeim ( { ARM_MEMORY_REGION_DESCRIPTOR *MemoryTable; EFI_RESOURCE_ATTRIBUTE_TYPE ResourceAttributes; + UINT64 ResourceLength; EFI_PEI_HOB_POINTERS NextHob; + EFI_PHYSICAL_ADDRESS FdTop; + EFI_PHYSICAL_ADDRESS SystemMemoryTop; + EFI_PHYSICAL_ADDRESS ResourceTop; BOOLEAN Found; // Get Virtual Memory Map from the Platform Library @@ -117,6 +121,71 @@ MemoryPeim ( ); } + // + // Reserved the memory space occupied by the firmware volume + // + + SystemMemoryTop = (EFI_PHYSICAL_ADDRESS)PcdGet64 (PcdSystemMemoryBase) + (EFI_PHYSICAL_ADDRESS)PcdGet64 (PcdSystemMemorySize); + FdTop = (EFI_PHYSICAL_ADDRESS)PcdGet64 (PcdFdBaseAddress) + (EFI_PHYSICAL_ADDRESS)PcdGet32 (PcdFdSize); + + // EDK2 does not have the concept of boot firmware copied into DRAM. To avoid the DXE + // core to overwrite this area we must mark the region with the attribute non-present + if ((PcdGet64 (PcdFdBaseAddress) >= PcdGet64 (PcdSystemMemoryBase)) && (FdTop <= SystemMemoryTop)) { + Found = FALSE; + + // Search for System Memory Hob that contains the firmware + NextHob.Raw = GetHobList (); + while ((NextHob.Raw = GetNextHob (EFI_HOB_TYPE_RESOURCE_DESCRIPTOR, NextHob.Raw)) != NULL) { + if ((NextHob.ResourceDescriptor->ResourceType == EFI_RESOURCE_SYSTEM_MEMORY) && + (PcdGet64 (PcdFdBaseAddress) >= NextHob.ResourceDescriptor->PhysicalStart) && + (FdTop <= NextHob.ResourceDescriptor->PhysicalStart + NextHob.ResourceDescriptor->ResourceLength)) + { + ResourceAttributes = NextHob.ResourceDescriptor->ResourceAttribute; + ResourceLength = NextHob.ResourceDescriptor->ResourceLength; + ResourceTop = NextHob.ResourceDescriptor->PhysicalStart + ResourceLength; + + if (PcdGet64 (PcdFdBaseAddress) == NextHob.ResourceDescriptor->PhysicalStart) { + if (SystemMemoryTop == FdTop) { + NextHob.ResourceDescriptor->ResourceAttribute = ResourceAttributes & ~EFI_RESOURCE_ATTRIBUTE_PRESENT; + } else { + // Create the System Memory HOB for the firmware with the non-present attribute + BuildResourceDescriptorHob (EFI_RESOURCE_SYSTEM_MEMORY, + ResourceAttributes & ~EFI_RESOURCE_ATTRIBUTE_PRESENT, + PcdGet64 (PcdFdBaseAddress), + PcdGet32 (PcdFdSize)); + + // Top of the FD is system memory available for UEFI + NextHob.ResourceDescriptor->PhysicalStart += PcdGet32(PcdFdSize); + NextHob.ResourceDescriptor->ResourceLength -= PcdGet32(PcdFdSize); + } + } else { + // Create the System Memory HOB for the firmware with the non-present attribute + BuildResourceDescriptorHob (EFI_RESOURCE_SYSTEM_MEMORY, + ResourceAttributes & ~EFI_RESOURCE_ATTRIBUTE_PRESENT, + PcdGet64 (PcdFdBaseAddress), + PcdGet32 (PcdFdSize)); + + // Update the HOB + NextHob.ResourceDescriptor->ResourceLength = PcdGet64 (PcdFdBaseAddress) - NextHob.ResourceDescriptor->PhysicalStart; + + // If there is some memory available on the top of the FD then create a HOB + if (FdTop < NextHob.ResourceDescriptor->PhysicalStart + ResourceLength) { + // Create the System Memory HOB for the remaining region (top of the FD) + BuildResourceDescriptorHob (EFI_RESOURCE_SYSTEM_MEMORY, + ResourceAttributes, + FdTop, + ResourceTop - FdTop); + } + } + Found = TRUE; + break; + } + NextHob.Raw = GET_NEXT_HOB (NextHob); + } + + ASSERT(Found); + } + // Build Memory Allocation Hob InitMmu (MemoryTable);