VirtualBox

source: vbox/trunk/src/VBox/Devices/EFI/Firmware/OvmfPkg/XenPlatformPei/MemDetect.c@ 85801

Last change on this file since 85801 was 80721, checked in by vboxsync, 5 years ago

Devices/EFI/FirmwareNew: Start upgrade process to edk2-stable201908 (compiles on Windows and works to some extent), bugref:4643

  • Property svn:eol-style set to native
File size: 12.6 KB
Line 
1/**@file
2 Memory Detection for Virtual Machines.
3
4 Copyright (c) 2006 - 2016, Intel Corporation. All rights reserved.<BR>
5 Copyright (c) 2019, Citrix Systems, Inc.
6
7 SPDX-License-Identifier: BSD-2-Clause-Patent
8
9Module Name:
10
11 MemDetect.c
12
13**/
14
15//
16// The package level header files this module uses
17//
18#include <IndustryStandard/Q35MchIch9.h>
19#include <PiPei.h>
20
21//
22// The Library classes this module consumes
23//
24#include <Library/BaseLib.h>
25#include <Library/BaseMemoryLib.h>
26#include <Library/DebugLib.h>
27#include <Library/HobLib.h>
28#include <Library/IoLib.h>
29#include <Library/PcdLib.h>
30#include <Library/PciLib.h>
31#include <Library/PeimEntryPoint.h>
32#include <Library/ResourcePublicationLib.h>
33
34#include "Platform.h"
35#include "Cmos.h"
36
37UINT8 mPhysMemAddressWidth;
38
39STATIC UINT32 mS3AcpiReservedMemoryBase;
40STATIC UINT32 mS3AcpiReservedMemorySize;
41
42STATIC UINT16 mQ35TsegMbytes;
43
44VOID
45Q35TsegMbytesInitialization (
46 VOID
47 )
48{
49 UINT16 ExtendedTsegMbytes;
50 RETURN_STATUS PcdStatus;
51
52 if (mHostBridgeDevId != INTEL_Q35_MCH_DEVICE_ID) {
53 DEBUG ((
54 DEBUG_ERROR,
55 "%a: no TSEG (SMRAM) on host bridge DID=0x%04x; "
56 "only DID=0x%04x (Q35) is supported\n",
57 __FUNCTION__,
58 mHostBridgeDevId,
59 INTEL_Q35_MCH_DEVICE_ID
60 ));
61 ASSERT (FALSE);
62 CpuDeadLoop ();
63 }
64
65 //
66 // Check if QEMU offers an extended TSEG.
67 //
68 // This can be seen from writing MCH_EXT_TSEG_MB_QUERY to the MCH_EXT_TSEG_MB
69 // register, and reading back the register.
70 //
71 // On a QEMU machine type that does not offer an extended TSEG, the initial
72 // write overwrites whatever value a malicious guest OS may have placed in
73 // the (unimplemented) register, before entering S3 or rebooting.
74 // Subsequently, the read returns MCH_EXT_TSEG_MB_QUERY unchanged.
75 //
76 // On a QEMU machine type that offers an extended TSEG, the initial write
77 // triggers an update to the register. Subsequently, the value read back
78 // (which is guaranteed to differ from MCH_EXT_TSEG_MB_QUERY) tells us the
79 // number of megabytes.
80 //
81 PciWrite16 (DRAMC_REGISTER_Q35 (MCH_EXT_TSEG_MB), MCH_EXT_TSEG_MB_QUERY);
82 ExtendedTsegMbytes = PciRead16 (DRAMC_REGISTER_Q35 (MCH_EXT_TSEG_MB));
83 if (ExtendedTsegMbytes == MCH_EXT_TSEG_MB_QUERY) {
84 mQ35TsegMbytes = PcdGet16 (PcdQ35TsegMbytes);
85 return;
86 }
87
88 DEBUG ((
89 DEBUG_INFO,
90 "%a: QEMU offers an extended TSEG (%d MB)\n",
91 __FUNCTION__,
92 ExtendedTsegMbytes
93 ));
94 PcdStatus = PcdSet16S (PcdQ35TsegMbytes, ExtendedTsegMbytes);
95 ASSERT_RETURN_ERROR (PcdStatus);
96 mQ35TsegMbytes = ExtendedTsegMbytes;
97}
98
99STATIC
100UINT64
101GetHighestSystemMemoryAddress (
102 BOOLEAN Below4gb
103 )
104{
105 EFI_E820_ENTRY64 *E820Map;
106 UINT32 E820EntriesCount;
107 EFI_E820_ENTRY64 *Entry;
108 EFI_STATUS Status;
109 UINT32 Loop;
110 UINT64 HighestAddress;
111 UINT64 EntryEnd;
112
113 HighestAddress = 0;
114
115 Status = XenGetE820Map (&E820Map, &E820EntriesCount);
116 ASSERT_EFI_ERROR (Status);
117
118 for (Loop = 0; Loop < E820EntriesCount; Loop++) {
119 Entry = E820Map + Loop;
120 EntryEnd = Entry->BaseAddr + Entry->Length;
121
122 if (Entry->Type == EfiAcpiAddressRangeMemory &&
123 EntryEnd > HighestAddress) {
124
125 if (Below4gb && (EntryEnd <= BASE_4GB)) {
126 HighestAddress = EntryEnd;
127 } else if (!Below4gb && (EntryEnd >= BASE_4GB)) {
128 HighestAddress = EntryEnd;
129 }
130 }
131 }
132
133 //
134 // Round down the end address.
135 //
136 return HighestAddress & ~(UINT64)EFI_PAGE_MASK;
137}
138
139UINT32
140GetSystemMemorySizeBelow4gb (
141 VOID
142 )
143{
144 UINT8 Cmos0x34;
145 UINT8 Cmos0x35;
146
147 //
148 // In PVH case, there is no CMOS, we have to calculate the memory size
149 // from parsing the E820
150 //
151 if (XenPvhDetected ()) {
152 UINT64 HighestAddress;
153
154 HighestAddress = GetHighestSystemMemoryAddress (TRUE);
155 ASSERT (HighestAddress > 0 && HighestAddress <= BASE_4GB);
156
157 return HighestAddress;
158 }
159
160 //
161 // CMOS 0x34/0x35 specifies the system memory above 16 MB.
162 // * CMOS(0x35) is the high byte
163 // * CMOS(0x34) is the low byte
164 // * The size is specified in 64kb chunks
165 // * Since this is memory above 16MB, the 16MB must be added
166 // into the calculation to get the total memory size.
167 //
168
169 Cmos0x34 = (UINT8) CmosRead8 (0x34);
170 Cmos0x35 = (UINT8) CmosRead8 (0x35);
171
172 return (UINT32) (((UINTN)((Cmos0x35 << 8) + Cmos0x34) << 16) + SIZE_16MB);
173}
174
175
176STATIC
177UINT64
178GetSystemMemorySizeAbove4gb (
179 )
180{
181 UINT32 Size;
182 UINTN CmosIndex;
183
184 //
185 // In PVH case, there is no CMOS, we have to calculate the memory size
186 // from parsing the E820
187 //
188 if (XenPvhDetected ()) {
189 UINT64 HighestAddress;
190
191 HighestAddress = GetHighestSystemMemoryAddress (FALSE);
192 ASSERT (HighestAddress == 0 || HighestAddress >= BASE_4GB);
193
194 if (HighestAddress >= BASE_4GB) {
195 HighestAddress -= BASE_4GB;
196 }
197
198 return HighestAddress;
199 }
200
201 //
202 // CMOS 0x5b-0x5d specifies the system memory above 4GB MB.
203 // * CMOS(0x5d) is the most significant size byte
204 // * CMOS(0x5c) is the middle size byte
205 // * CMOS(0x5b) is the least significant size byte
206 // * The size is specified in 64kb chunks
207 //
208
209 Size = 0;
210 for (CmosIndex = 0x5d; CmosIndex >= 0x5b; CmosIndex--) {
211 Size = (UINT32) (Size << 8) + (UINT32) CmosRead8 (CmosIndex);
212 }
213
214 return LShiftU64 (Size, 16);
215}
216
217
218/**
219 Return the highest address that DXE could possibly use, plus one.
220**/
221STATIC
222UINT64
223GetFirstNonAddress (
224 VOID
225 )
226{
227 UINT64 FirstNonAddress;
228 UINT64 Pci64Base, Pci64Size;
229 RETURN_STATUS PcdStatus;
230
231 FirstNonAddress = BASE_4GB + GetSystemMemorySizeAbove4gb ();
232
233 //
234 // If DXE is 32-bit, then we're done; PciBusDxe will degrade 64-bit MMIO
235 // resources to 32-bit anyway. See DegradeResource() in
236 // "PciResourceSupport.c".
237 //
238#ifdef MDE_CPU_IA32
239 if (!FeaturePcdGet (PcdDxeIplSwitchToLongMode)) {
240 return FirstNonAddress;
241 }
242#endif
243
244 //
245 // Otherwise, in order to calculate the highest address plus one, we must
246 // consider the 64-bit PCI host aperture too. Fetch the default size.
247 //
248 Pci64Size = PcdGet64 (PcdPciMmio64Size);
249
250 if (Pci64Size == 0) {
251 if (mBootMode != BOOT_ON_S3_RESUME) {
252 DEBUG ((DEBUG_INFO, "%a: disabling 64-bit PCI host aperture\n",
253 __FUNCTION__));
254 PcdStatus = PcdSet64S (PcdPciMmio64Size, 0);
255 ASSERT_RETURN_ERROR (PcdStatus);
256 }
257
258 //
259 // There's nothing more to do; the amount of memory above 4GB fully
260 // determines the highest address plus one. The memory hotplug area (see
261 // below) plays no role for the firmware in this case.
262 //
263 return FirstNonAddress;
264 }
265
266 //
267 // SeaBIOS aligns both boundaries of the 64-bit PCI host aperture to 1GB, so
268 // that the host can map it with 1GB hugepages. Follow suit.
269 //
270 Pci64Base = ALIGN_VALUE (FirstNonAddress, (UINT64)SIZE_1GB);
271 Pci64Size = ALIGN_VALUE (Pci64Size, (UINT64)SIZE_1GB);
272
273 //
274 // The 64-bit PCI host aperture should also be "naturally" aligned. The
275 // alignment is determined by rounding the size of the aperture down to the
276 // next smaller or equal power of two. That is, align the aperture by the
277 // largest BAR size that can fit into it.
278 //
279 Pci64Base = ALIGN_VALUE (Pci64Base, GetPowerOfTwo64 (Pci64Size));
280
281 if (mBootMode != BOOT_ON_S3_RESUME) {
282 //
283 // The core PciHostBridgeDxe driver will automatically add this range to
284 // the GCD memory space map through our PciHostBridgeLib instance; here we
285 // only need to set the PCDs.
286 //
287 PcdStatus = PcdSet64S (PcdPciMmio64Base, Pci64Base);
288 ASSERT_RETURN_ERROR (PcdStatus);
289 PcdStatus = PcdSet64S (PcdPciMmio64Size, Pci64Size);
290 ASSERT_RETURN_ERROR (PcdStatus);
291
292 DEBUG ((DEBUG_INFO, "%a: Pci64Base=0x%Lx Pci64Size=0x%Lx\n",
293 __FUNCTION__, Pci64Base, Pci64Size));
294 }
295
296 //
297 // The useful address space ends with the 64-bit PCI host aperture.
298 //
299 FirstNonAddress = Pci64Base + Pci64Size;
300 return FirstNonAddress;
301}
302
303
304/**
305 Initialize the mPhysMemAddressWidth variable, based on guest RAM size.
306**/
307VOID
308AddressWidthInitialization (
309 VOID
310 )
311{
312 UINT64 FirstNonAddress;
313
314 //
315 // As guest-physical memory size grows, the permanent PEI RAM requirements
316 // are dominated by the identity-mapping page tables built by the DXE IPL.
317 // The DXL IPL keys off of the physical address bits advertized in the CPU
318 // HOB. To conserve memory, we calculate the minimum address width here.
319 //
320 FirstNonAddress = GetFirstNonAddress ();
321 mPhysMemAddressWidth = (UINT8)HighBitSet64 (FirstNonAddress);
322
323 //
324 // If FirstNonAddress is not an integral power of two, then we need an
325 // additional bit.
326 //
327 if ((FirstNonAddress & (FirstNonAddress - 1)) != 0) {
328 ++mPhysMemAddressWidth;
329 }
330
331 //
332 // The minimum address width is 36 (covers up to and excluding 64 GB, which
333 // is the maximum for Ia32 + PAE). The theoretical architecture maximum for
334 // X64 long mode is 52 bits, but the DXE IPL clamps that down to 48 bits. We
335 // can simply assert that here, since 48 bits are good enough for 256 TB.
336 //
337 if (mPhysMemAddressWidth <= 36) {
338 mPhysMemAddressWidth = 36;
339 }
340 ASSERT (mPhysMemAddressWidth <= 48);
341}
342
343
344/**
345 Calculate the cap for the permanent PEI memory.
346**/
347STATIC
348UINT32
349GetPeiMemoryCap (
350 VOID
351 )
352{
353 BOOLEAN Page1GSupport;
354 UINT32 RegEax;
355 UINT32 RegEdx;
356 UINT32 Pml4Entries;
357 UINT32 PdpEntries;
358 UINTN TotalPages;
359
360 //
361 // If DXE is 32-bit, then just return the traditional 64 MB cap.
362 //
363#ifdef MDE_CPU_IA32
364 if (!FeaturePcdGet (PcdDxeIplSwitchToLongMode)) {
365 return SIZE_64MB;
366 }
367#endif
368
369 //
370 // Dependent on physical address width, PEI memory allocations can be
371 // dominated by the page tables built for 64-bit DXE. So we key the cap off
372 // of those. The code below is based on CreateIdentityMappingPageTables() in
373 // "MdeModulePkg/Core/DxeIplPeim/X64/VirtualMemory.c".
374 //
375 Page1GSupport = FALSE;
376 if (PcdGetBool (PcdUse1GPageTable)) {
377 AsmCpuid (0x80000000, &RegEax, NULL, NULL, NULL);
378 if (RegEax >= 0x80000001) {
379 AsmCpuid (0x80000001, NULL, NULL, NULL, &RegEdx);
380 if ((RegEdx & BIT26) != 0) {
381 Page1GSupport = TRUE;
382 }
383 }
384 }
385
386 if (mPhysMemAddressWidth <= 39) {
387 Pml4Entries = 1;
388 PdpEntries = 1 << (mPhysMemAddressWidth - 30);
389 ASSERT (PdpEntries <= 0x200);
390 } else {
391 Pml4Entries = 1 << (mPhysMemAddressWidth - 39);
392 ASSERT (Pml4Entries <= 0x200);
393 PdpEntries = 512;
394 }
395
396 TotalPages = Page1GSupport ? Pml4Entries + 1 :
397 (PdpEntries + 1) * Pml4Entries + 1;
398 ASSERT (TotalPages <= 0x40201);
399
400 //
401 // Add 64 MB for miscellaneous allocations. Note that for
402 // mPhysMemAddressWidth values close to 36, the cap will actually be
403 // dominated by this increment.
404 //
405 return (UINT32)(EFI_PAGES_TO_SIZE (TotalPages) + SIZE_64MB);
406}
407
408
409/**
410 Publish PEI core memory
411
412 @return EFI_SUCCESS The PEIM initialized successfully.
413
414**/
415EFI_STATUS
416PublishPeiMemory (
417 VOID
418 )
419{
420 EFI_STATUS Status;
421 EFI_PHYSICAL_ADDRESS MemoryBase;
422 UINT64 MemorySize;
423 UINT32 LowerMemorySize;
424 UINT32 PeiMemoryCap;
425
426 LowerMemorySize = GetSystemMemorySizeBelow4gb ();
427
428 if (mBootMode == BOOT_ON_S3_RESUME) {
429 MemoryBase = mS3AcpiReservedMemoryBase;
430 MemorySize = mS3AcpiReservedMemorySize;
431 } else {
432 PeiMemoryCap = GetPeiMemoryCap ();
433 DEBUG ((DEBUG_INFO, "%a: mPhysMemAddressWidth=%d PeiMemoryCap=%u KB\n",
434 __FUNCTION__, mPhysMemAddressWidth, PeiMemoryCap >> 10));
435
436 //
437 // Determine the range of memory to use during PEI
438 //
439 MemoryBase =
440 PcdGet32 (PcdOvmfDxeMemFvBase) + PcdGet32 (PcdOvmfDxeMemFvSize);
441 MemorySize = LowerMemorySize - MemoryBase;
442 if (MemorySize > PeiMemoryCap) {
443 MemoryBase = LowerMemorySize - PeiMemoryCap;
444 MemorySize = PeiMemoryCap;
445 }
446 }
447
448 //
449 // Publish this memory to the PEI Core
450 //
451 Status = PublishSystemMemory(MemoryBase, MemorySize);
452 ASSERT_EFI_ERROR (Status);
453
454 return Status;
455}
456
457
458/**
459 Publish system RAM and reserve memory regions
460
461**/
462VOID
463InitializeRamRegions (
464 VOID
465 )
466{
467 XenPublishRamRegions ();
468
469 if (mBootMode != BOOT_ON_S3_RESUME) {
470 //
471 // Reserve the lock box storage area
472 //
473 // Since this memory range will be used on S3 resume, it must be
474 // reserved as ACPI NVS.
475 //
476 // If S3 is unsupported, then various drivers might still write to the
477 // LockBox area. We ought to prevent DXE from serving allocation requests
478 // such that they would overlap the LockBox storage.
479 //
480 ZeroMem (
481 (VOID*)(UINTN) PcdGet32 (PcdOvmfLockBoxStorageBase),
482 (UINTN) PcdGet32 (PcdOvmfLockBoxStorageSize)
483 );
484 BuildMemoryAllocationHob (
485 (EFI_PHYSICAL_ADDRESS)(UINTN) PcdGet32 (PcdOvmfLockBoxStorageBase),
486 (UINT64)(UINTN) PcdGet32 (PcdOvmfLockBoxStorageSize),
487 EfiBootServicesData
488 );
489 }
490}
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette