2019-09-03 11:58:42 +02:00
|
|
|
/** @file
|
|
|
|
|
|
|
|
Copyright (c) 2007 - 2016, Intel Corporation. All rights reserved.<BR>
|
|
|
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
|
|
|
|
|
|
|
|
|
|
|
**/
|
|
|
|
|
|
|
|
#include "Edb.h"
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
Check the Hook flag, and trigger exception if match.
|
|
|
|
|
|
|
|
@param VmPtr - EbcDebuggerCheckHookFlag
|
|
|
|
@param Flag - Feature flag
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerCheckHookFlag (
|
|
|
|
IN VM_CONTEXT *VmPtr,
|
|
|
|
IN UINT32 Flag
|
|
|
|
)
|
|
|
|
{
|
|
|
|
if ((mDebuggerPrivate.FeatureFlags & Flag) == Flag) {
|
|
|
|
mDebuggerPrivate.StatusFlags = Flag;
|
|
|
|
EbcDebugSignalException (
|
|
|
|
EXCEPT_EBC_BREAKPOINT,
|
|
|
|
EXCEPTION_FLAG_NONE,
|
|
|
|
VmPtr
|
|
|
|
);
|
|
|
|
}
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
It will record soruce address for Callstack entry.
|
|
|
|
|
|
|
|
@param SourceEntry - Source address
|
|
|
|
@param Type - Branch type
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerPushCallstackSource (
|
|
|
|
IN UINT64 SourceEntry,
|
|
|
|
IN EFI_DEBUGGER_BRANCH_TYPE Type
|
|
|
|
)
|
|
|
|
{
|
|
|
|
if (mDebuggerPrivate.CallStackEntryCount > EFI_DEBUGGER_CALLSTACK_MAX) {
|
|
|
|
ASSERT (FALSE);
|
|
|
|
mDebuggerPrivate.CallStackEntryCount = EFI_DEBUGGER_CALLSTACK_MAX;
|
|
|
|
}
|
|
|
|
//
|
|
|
|
// Record the new callstack entry
|
|
|
|
//
|
|
|
|
mDebuggerPrivate.CallStackEntry[mDebuggerPrivate.CallStackEntryCount].SourceAddress = SourceEntry;
|
|
|
|
mDebuggerPrivate.CallStackEntry[mDebuggerPrivate.CallStackEntryCount].Type = Type;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Do not change CallStackEntryCount
|
|
|
|
//
|
|
|
|
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
It will record parameter for Callstack entry.
|
|
|
|
|
|
|
|
@param ParameterAddress - The address for the parameter
|
|
|
|
@param Type - Branch type
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerPushCallstackParameter (
|
|
|
|
IN UINT64 ParameterAddress,
|
|
|
|
IN EFI_DEBUGGER_BRANCH_TYPE Type
|
|
|
|
)
|
|
|
|
{
|
|
|
|
if (mDebuggerPrivate.CallStackEntryCount > EFI_DEBUGGER_CALLSTACK_MAX) {
|
|
|
|
ASSERT (FALSE);
|
|
|
|
mDebuggerPrivate.CallStackEntryCount = EFI_DEBUGGER_CALLSTACK_MAX;
|
|
|
|
}
|
|
|
|
//
|
|
|
|
// Record the new callstack parameter
|
|
|
|
//
|
|
|
|
mDebuggerPrivate.CallStackEntry[mDebuggerPrivate.CallStackEntryCount].ParameterAddr = (UINTN)ParameterAddress;
|
2020-05-01 18:26:28 +02:00
|
|
|
CopyMem(
|
2019-09-03 11:58:42 +02:00
|
|
|
mDebuggerPrivate.CallStackEntry[mDebuggerPrivate.CallStackEntryCount].Parameter,
|
|
|
|
(VOID *)(UINTN)ParameterAddress,
|
|
|
|
sizeof(mDebuggerPrivate.CallStackEntry[mDebuggerPrivate.CallStackEntryCount].Parameter)
|
|
|
|
);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Do not change CallStackEntryCount
|
|
|
|
//
|
|
|
|
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
It will record source address for callstack entry.
|
|
|
|
|
|
|
|
@param DestEntry - Source address
|
|
|
|
@param Type - Branch type
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerPushCallstackDest (
|
|
|
|
IN UINT64 DestEntry,
|
|
|
|
IN EFI_DEBUGGER_BRANCH_TYPE Type
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINTN Index;
|
|
|
|
|
|
|
|
if (mDebuggerPrivate.CallStackEntryCount < EFI_DEBUGGER_CALLSTACK_MAX) {
|
|
|
|
//
|
|
|
|
// If there is empty entry for callstack, add it
|
|
|
|
//
|
|
|
|
ASSERT (mDebuggerPrivate.CallStackEntry[mDebuggerPrivate.CallStackEntryCount].Type == Type);
|
|
|
|
mDebuggerPrivate.CallStackEntry[mDebuggerPrivate.CallStackEntryCount].DestAddress = DestEntry;
|
|
|
|
mDebuggerPrivate.CallStackEntryCount ++;
|
|
|
|
} else {
|
|
|
|
//
|
|
|
|
// If there is no empty entry for callstack, throw the oldest one
|
|
|
|
//
|
|
|
|
ASSERT (mDebuggerPrivate.CallStackEntry[EFI_DEBUGGER_TRACE_MAX].Type == Type);
|
|
|
|
for (Index = 0; Index < EFI_DEBUGGER_CALLSTACK_MAX; Index++) {
|
2020-05-01 18:26:28 +02:00
|
|
|
CopyMem(&mDebuggerPrivate.CallStackEntry[Index],
|
2019-09-03 11:58:42 +02:00
|
|
|
&mDebuggerPrivate.CallStackEntry[Index + 1],
|
|
|
|
sizeof (mDebuggerPrivate.CallStackEntry[Index])
|
|
|
|
);
|
|
|
|
}
|
|
|
|
mDebuggerPrivate.CallStackEntry[EFI_DEBUGGER_CALLSTACK_MAX - 1].DestAddress = DestEntry;
|
|
|
|
mDebuggerPrivate.CallStackEntryCount = EFI_DEBUGGER_CALLSTACK_MAX;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
It will throw the newest Callstack entry.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerPopCallstack (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
if ((mDebuggerPrivate.CallStackEntryCount > 0) &&
|
|
|
|
(mDebuggerPrivate.CallStackEntryCount <= EFI_DEBUGGER_CALLSTACK_MAX)) {
|
|
|
|
//
|
|
|
|
// Throw the newest one
|
|
|
|
//
|
|
|
|
mDebuggerPrivate.CallStackEntryCount --;
|
|
|
|
mDebuggerPrivate.CallStackEntry[mDebuggerPrivate.CallStackEntryCount].SourceAddress = 0;
|
|
|
|
mDebuggerPrivate.CallStackEntry[mDebuggerPrivate.CallStackEntryCount].DestAddress = 0;
|
|
|
|
} else if (mDebuggerPrivate.CallStackEntryCount == 0) {
|
|
|
|
//
|
|
|
|
// NOT assert here because it is reasonable, because when we start to build
|
|
|
|
// callstack, we do not know how many function already called.
|
|
|
|
//
|
|
|
|
} else {
|
|
|
|
ASSERT (FALSE);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
It will record source address for trace entry.
|
|
|
|
|
|
|
|
@param SourceEntry - Source address
|
|
|
|
@param Type - Branch type
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerPushTraceSourceEntry (
|
|
|
|
IN UINT64 SourceEntry,
|
|
|
|
IN EFI_DEBUGGER_BRANCH_TYPE Type
|
|
|
|
)
|
|
|
|
{
|
|
|
|
if (mDebuggerPrivate.TraceEntryCount > EFI_DEBUGGER_TRACE_MAX) {
|
|
|
|
ASSERT (FALSE);
|
|
|
|
mDebuggerPrivate.TraceEntryCount = EFI_DEBUGGER_TRACE_MAX;
|
|
|
|
}
|
|
|
|
//
|
|
|
|
// Record the new trace entry
|
|
|
|
//
|
|
|
|
mDebuggerPrivate.TraceEntry[mDebuggerPrivate.TraceEntryCount].SourceAddress = SourceEntry;
|
|
|
|
mDebuggerPrivate.TraceEntry[mDebuggerPrivate.TraceEntryCount].Type = Type;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Do not change TraceEntryCount
|
|
|
|
//
|
|
|
|
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
It will record destination address for trace entry.
|
|
|
|
|
|
|
|
@param DestEntry - Destination address
|
|
|
|
@param Type - Branch type
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerPushTraceDestEntry (
|
|
|
|
IN UINT64 DestEntry,
|
|
|
|
IN EFI_DEBUGGER_BRANCH_TYPE Type
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINTN Index;
|
|
|
|
|
|
|
|
if (mDebuggerPrivate.TraceEntryCount < EFI_DEBUGGER_TRACE_MAX) {
|
|
|
|
//
|
|
|
|
// If there is empty entry for trace, add it
|
|
|
|
//
|
|
|
|
ASSERT (mDebuggerPrivate.TraceEntry[mDebuggerPrivate.TraceEntryCount].Type == Type);
|
|
|
|
mDebuggerPrivate.TraceEntry[mDebuggerPrivate.TraceEntryCount].DestAddress = DestEntry;
|
|
|
|
mDebuggerPrivate.TraceEntryCount ++;
|
|
|
|
} else {
|
|
|
|
//
|
|
|
|
// If there is no empty entry for trace, throw the oldest one
|
|
|
|
//
|
|
|
|
ASSERT (mDebuggerPrivate.TraceEntry[EFI_DEBUGGER_TRACE_MAX].Type == Type);
|
|
|
|
for (Index = 0; Index < EFI_DEBUGGER_TRACE_MAX; Index++) {
|
|
|
|
mDebuggerPrivate.TraceEntry[Index] = mDebuggerPrivate.TraceEntry[Index + 1];
|
|
|
|
}
|
|
|
|
mDebuggerPrivate.TraceEntry[EFI_DEBUGGER_CALLSTACK_MAX - 1].DestAddress = DestEntry;
|
|
|
|
mDebuggerPrivate.TraceEntryCount = EFI_DEBUGGER_TRACE_MAX;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
It will record address for StepEntry, if STEPOVER or STEPOUT is enabled.
|
|
|
|
|
|
|
|
@param Entry - Break Address
|
|
|
|
@param FramePtr - Break Frame pointer
|
|
|
|
@param Flag - for STEPOVER or STEPOUT
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerPushStepEntry (
|
|
|
|
IN UINT64 Entry,
|
|
|
|
IN UINT64 FramePtr,
|
|
|
|
IN UINT32 Flag
|
|
|
|
)
|
|
|
|
{
|
|
|
|
//
|
|
|
|
// Check StepOver
|
|
|
|
//
|
|
|
|
if ((Flag == EFI_DEBUG_FLAG_EBC_STEPOVER) &&
|
|
|
|
((mDebuggerPrivate.FeatureFlags & EFI_DEBUG_FLAG_EBC_STEPOVER) == EFI_DEBUG_FLAG_EBC_STEPOVER)) {
|
|
|
|
mDebuggerPrivate.StepContext.BreakAddress = Entry;
|
|
|
|
mDebuggerPrivate.StepContext.FramePointer = FramePtr;
|
|
|
|
mDebuggerPrivate.FeatureFlags &= ~EFI_DEBUG_FLAG_EBC_B_STEPOVER;
|
|
|
|
}
|
|
|
|
//
|
|
|
|
// Check StepOut
|
|
|
|
//
|
|
|
|
if ((Flag == EFI_DEBUG_FLAG_EBC_STEPOUT) &&
|
|
|
|
((mDebuggerPrivate.FeatureFlags & EFI_DEBUG_FLAG_EBC_STEPOUT) == EFI_DEBUG_FLAG_EBC_STEPOUT)) {
|
|
|
|
mDebuggerPrivate.StepContext.BreakAddress = Entry;
|
|
|
|
mDebuggerPrivate.StepContext.FramePointer = FramePtr;
|
|
|
|
mDebuggerPrivate.FeatureFlags &= ~EFI_DEBUG_FLAG_EBC_B_STEPOUT;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
Notify the callback function when an event is triggered.
|
|
|
|
|
|
|
|
@param Event Indicates the event that invoke this function.
|
|
|
|
@param Context Indicates the calling context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
EbcDebuggerBreakEventFunc (
|
|
|
|
IN EFI_EVENT Event,
|
|
|
|
IN VOID *Context
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_STATUS Status;
|
|
|
|
|
|
|
|
if ((mDebuggerPrivate.FeatureFlags & EFI_DEBUG_FLAG_EBC_BOK) != EFI_DEBUG_FLAG_EBC_BOK) {
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
Status = gBS->CheckEvent (gST->ConIn->WaitForKey);
|
|
|
|
if (Status == EFI_SUCCESS) {
|
|
|
|
mDebuggerPrivate.StatusFlags = EFI_DEBUG_FLAG_EBC_BOK;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in InitializeEbcDriver.
|
|
|
|
It will init the EbcDebuggerPrivate data structure.
|
|
|
|
|
|
|
|
@param Handle - The EbcDebugProtocol handle.
|
|
|
|
@param EbcDebugProtocol - The EbcDebugProtocol interface.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookInit (
|
|
|
|
IN EFI_HANDLE Handle,
|
|
|
|
IN EFI_DEBUG_SUPPORT_PROTOCOL *EbcDebugProtocol
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_STATUS Status;
|
|
|
|
UINTN Index;
|
|
|
|
EFI_DEBUGGER_SYMBOL_OBJECT *Object;
|
|
|
|
EFI_DEBUGGER_SYMBOL_ENTRY *Entry;
|
|
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
// Register all exception handler
|
|
|
|
//
|
|
|
|
for (Index = EXCEPT_EBC_UNDEFINED; Index <= EXCEPT_EBC_STEP; Index++) {
|
|
|
|
EbcDebugProtocol->RegisterExceptionCallback (
|
|
|
|
EbcDebugProtocol,
|
|
|
|
0,
|
|
|
|
NULL,
|
|
|
|
Index
|
|
|
|
);
|
|
|
|
EbcDebugProtocol->RegisterExceptionCallback (
|
|
|
|
EbcDebugProtocol,
|
|
|
|
0,
|
|
|
|
EdbExceptionHandler,
|
|
|
|
Index
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Init Symbol
|
|
|
|
//
|
2020-04-28 12:49:24 +02:00
|
|
|
Object = AllocateZeroPool(sizeof(EFI_DEBUGGER_SYMBOL_OBJECT) * EFI_DEBUGGER_SYMBOL_OBJECT_MAX);
|
2019-09-03 11:58:42 +02:00
|
|
|
ASSERT (Object != NULL);
|
|
|
|
mDebuggerPrivate.DebuggerSymbolContext.Object = Object;
|
|
|
|
mDebuggerPrivate.DebuggerSymbolContext.ObjectCount = 0;
|
|
|
|
mDebuggerPrivate.DebuggerSymbolContext.MaxObjectCount = EFI_DEBUGGER_SYMBOL_OBJECT_MAX;
|
|
|
|
for (Index = 0; Index < EFI_DEBUGGER_SYMBOL_OBJECT_MAX; Index++) {
|
2020-04-28 12:49:24 +02:00
|
|
|
Entry = AllocateZeroPool(sizeof(EFI_DEBUGGER_SYMBOL_ENTRY) * EFI_DEBUGGER_SYMBOL_ENTRY_MAX);
|
2019-09-03 11:58:42 +02:00
|
|
|
ASSERT (Entry != NULL);
|
|
|
|
Object[Index].Entry = Entry;
|
|
|
|
Object[Index].MaxEntryCount = EFI_DEBUGGER_SYMBOL_ENTRY_MAX;
|
2020-04-28 12:49:24 +02:00
|
|
|
Object[Index].SourceBuffer = AllocateZeroPool(sizeof(VOID *) * (EFI_DEBUGGER_SYMBOL_ENTRY_MAX + 1));
|
2019-09-03 11:58:42 +02:00
|
|
|
ASSERT (Object[Index].SourceBuffer != NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// locate PciRootBridgeIo
|
|
|
|
//
|
|
|
|
Status = gBS->LocateProtocol (
|
|
|
|
&gEfiPciRootBridgeIoProtocolGuid,
|
|
|
|
NULL,
|
|
|
|
(VOID**) &mDebuggerPrivate.PciRootBridgeIo
|
|
|
|
);
|
|
|
|
|
|
|
|
//
|
|
|
|
// locate DebugImageInfoTable
|
|
|
|
//
|
|
|
|
Status = EfiGetSystemConfigurationTable (
|
|
|
|
&gEfiDebugImageInfoTableGuid,
|
|
|
|
(VOID**) &mDebuggerPrivate.DebugImageInfoTableHeader
|
|
|
|
);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Register Debugger Configuration Protocol, for config in shell
|
|
|
|
//
|
|
|
|
Status = gBS->InstallProtocolInterface (
|
|
|
|
&Handle,
|
|
|
|
&gEfiDebuggerConfigurationProtocolGuid,
|
|
|
|
EFI_NATIVE_INTERFACE,
|
|
|
|
&mDebuggerPrivate.DebuggerConfiguration
|
|
|
|
);
|
|
|
|
|
|
|
|
//
|
|
|
|
//
|
|
|
|
// Create break event
|
|
|
|
//
|
|
|
|
Status = gBS->CreateEvent (
|
|
|
|
EVT_TIMER | EVT_NOTIFY_SIGNAL,
|
|
|
|
TPL_CALLBACK,
|
|
|
|
EbcDebuggerBreakEventFunc,
|
|
|
|
NULL,
|
|
|
|
&mDebuggerPrivate.BreakEvent
|
|
|
|
);
|
2020-04-23 11:08:10 +02:00
|
|
|
if (!EFI_ERROR(Status)) {
|
2019-09-03 11:58:42 +02:00
|
|
|
Status = gBS->SetTimer (
|
|
|
|
mDebuggerPrivate.BreakEvent,
|
|
|
|
TimerPeriodic,
|
|
|
|
EFI_DEBUG_BREAK_TIMER_INTERVAL
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in UnloadImage for EBC Interpreter.
|
|
|
|
It clean up the environment.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookUnload (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINTN Index;
|
|
|
|
UINTN SubIndex;
|
|
|
|
EFI_DEBUGGER_SYMBOL_OBJECT *Object;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Close the break event
|
|
|
|
//
|
|
|
|
if (mDebuggerPrivate.BreakEvent != NULL) {
|
|
|
|
gBS->CloseEvent (mDebuggerPrivate.BreakEvent);
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Clean up the symbol
|
|
|
|
//
|
|
|
|
Object = mDebuggerPrivate.DebuggerSymbolContext.Object;
|
|
|
|
for (Index = 0; Index < EFI_DEBUGGER_SYMBOL_OBJECT_MAX; Index++) {
|
|
|
|
//
|
|
|
|
// Clean up Entry
|
|
|
|
//
|
2020-04-23 11:08:10 +02:00
|
|
|
gBS->FreePool(Object[Index].Entry);
|
2019-09-03 11:58:42 +02:00
|
|
|
Object[Index].Entry = NULL;
|
|
|
|
Object[Index].EntryCount = 0;
|
|
|
|
//
|
|
|
|
// Clean up source buffer
|
|
|
|
//
|
|
|
|
for (SubIndex = 0; Object[Index].SourceBuffer[SubIndex] != NULL; SubIndex++) {
|
2020-04-23 11:08:10 +02:00
|
|
|
gBS->FreePool(Object[Index].SourceBuffer[SubIndex]);
|
2019-09-03 11:58:42 +02:00
|
|
|
Object[Index].SourceBuffer[SubIndex] = NULL;
|
|
|
|
}
|
2020-04-23 11:08:10 +02:00
|
|
|
gBS->FreePool(Object[Index].SourceBuffer);
|
2019-09-03 11:58:42 +02:00
|
|
|
Object[Index].SourceBuffer = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Clean up Object
|
|
|
|
//
|
2020-04-23 11:08:10 +02:00
|
|
|
gBS->FreePool(Object);
|
2019-09-03 11:58:42 +02:00
|
|
|
mDebuggerPrivate.DebuggerSymbolContext.Object = NULL;
|
|
|
|
mDebuggerPrivate.DebuggerSymbolContext.ObjectCount = 0;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Done
|
|
|
|
//
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in EbcUnloadImage.
|
|
|
|
Currently do nothing here.
|
|
|
|
|
|
|
|
@param Handle - The EbcImage handle.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookEbcUnloadImage (
|
|
|
|
IN EFI_HANDLE Handle
|
|
|
|
)
|
|
|
|
{
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in ExecuteEbcImageEntryPoint.
|
|
|
|
It will record the call-stack entry. (-1 means EbcImageEntryPoint call)
|
|
|
|
and trigger Exception if BOE enabled.
|
|
|
|
|
|
|
|
|
|
|
|
@param VmPtr - pointer to VM context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookExecuteEbcImageEntryPoint (
|
|
|
|
IN VM_CONTEXT *VmPtr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EbcDebuggerPushCallstackSource ((UINT64)(UINTN)-1, EfiDebuggerBranchTypeEbcCall);
|
|
|
|
EbcDebuggerPushCallstackParameter ((UINT64)(UINTN)VmPtr->Gpr[0], EfiDebuggerBranchTypeEbcCall);
|
|
|
|
EbcDebuggerPushCallstackDest ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcCall);
|
|
|
|
EbcDebuggerCheckHookFlag (VmPtr, EFI_DEBUG_FLAG_EBC_BOE);
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in ExecuteEbcImageEntryPoint.
|
|
|
|
It will record the call-stack entry. (-2 means EbcInterpret call)
|
|
|
|
and trigger Exception if BOT enabled.
|
|
|
|
|
|
|
|
@param VmPtr - pointer to VM context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookEbcInterpret (
|
|
|
|
IN VM_CONTEXT *VmPtr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EbcDebuggerPushCallstackSource ((UINT64)(UINTN)-2, EfiDebuggerBranchTypeEbcCall);
|
|
|
|
EbcDebuggerPushCallstackParameter ((UINT64)(UINTN)VmPtr->Gpr[0], EfiDebuggerBranchTypeEbcCall);
|
|
|
|
EbcDebuggerPushCallstackDest ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcCall);
|
|
|
|
EbcDebuggerCheckHookFlag (VmPtr, EFI_DEBUG_FLAG_EBC_BOT);
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in EbcExecute, before ExecuteFunction.
|
|
|
|
It will trigger Exception if GoTil, StepOver, or StepOut hit.
|
|
|
|
|
|
|
|
@param VmPtr - pointer to VM context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookExecuteStart (
|
|
|
|
IN VM_CONTEXT *VmPtr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_TPL CurrentTpl;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check Ip for GoTil
|
|
|
|
//
|
|
|
|
if (mDebuggerPrivate.GoTilContext.BreakAddress == (UINT64)(UINTN)VmPtr->Ip) {
|
|
|
|
mDebuggerPrivate.StatusFlags = EFI_DEBUG_FLAG_EBC_GT;
|
|
|
|
mDebuggerPrivate.GoTilContext.BreakAddress = 0;
|
|
|
|
EbcDebugSignalException (
|
|
|
|
EXCEPT_EBC_BREAKPOINT,
|
|
|
|
EXCEPTION_FLAG_NONE,
|
|
|
|
VmPtr
|
|
|
|
);
|
|
|
|
mDebuggerPrivate.StatusFlags &= ~EFI_DEBUG_FLAG_EBC_B_GT;
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
//
|
|
|
|
// Check ReturnAddress for StepOver
|
|
|
|
//
|
|
|
|
if ((mDebuggerPrivate.StepContext.BreakAddress == (UINT64)(UINTN)VmPtr->Ip) &&
|
|
|
|
(mDebuggerPrivate.StepContext.FramePointer == (UINT64)(UINTN)VmPtr->FramePtr)) {
|
|
|
|
mDebuggerPrivate.StatusFlags = EFI_DEBUG_FLAG_EBC_STEPOVER;
|
|
|
|
mDebuggerPrivate.StepContext.BreakAddress = 0;
|
|
|
|
mDebuggerPrivate.StepContext.FramePointer = 0;
|
|
|
|
EbcDebugSignalException (
|
|
|
|
EXCEPT_EBC_BREAKPOINT,
|
|
|
|
EXCEPTION_FLAG_NONE,
|
|
|
|
VmPtr
|
|
|
|
);
|
|
|
|
mDebuggerPrivate.StatusFlags &= ~EFI_DEBUG_FLAG_EBC_B_STEPOVER;
|
|
|
|
}
|
|
|
|
//
|
|
|
|
// Check FramePtr for StepOut
|
|
|
|
//
|
|
|
|
if (mDebuggerPrivate.StepContext.BreakAddress == (UINT64)(UINTN)VmPtr->FramePtr) {
|
|
|
|
mDebuggerPrivate.StatusFlags = EFI_DEBUG_FLAG_EBC_STEPOUT;
|
|
|
|
mDebuggerPrivate.StepContext.BreakAddress = 0;
|
|
|
|
mDebuggerPrivate.StepContext.FramePointer = 0;
|
|
|
|
EbcDebugSignalException (
|
|
|
|
EXCEPT_EBC_BREAKPOINT,
|
|
|
|
EXCEPTION_FLAG_NONE,
|
|
|
|
VmPtr
|
|
|
|
);
|
|
|
|
mDebuggerPrivate.StatusFlags &= ~EFI_DEBUG_FLAG_EBC_B_STEPOUT;
|
|
|
|
}
|
|
|
|
//
|
|
|
|
// Check Flags for BreakOnKey
|
|
|
|
//
|
|
|
|
if (mDebuggerPrivate.StatusFlags == EFI_DEBUG_FLAG_EBC_BOK) {
|
|
|
|
//
|
|
|
|
// Only break when the current TPL <= TPL_APPLICATION
|
|
|
|
//
|
|
|
|
CurrentTpl = gBS->RaiseTPL (TPL_HIGH_LEVEL);
|
|
|
|
gBS->RestoreTPL (CurrentTpl);
|
|
|
|
if (CurrentTpl <= TPL_APPLICATION) {
|
|
|
|
EbcDebugSignalException (
|
|
|
|
EXCEPT_EBC_BREAKPOINT,
|
|
|
|
EXCEPTION_FLAG_NONE,
|
|
|
|
VmPtr
|
|
|
|
);
|
|
|
|
mDebuggerPrivate.StatusFlags &= ~EFI_DEBUG_FLAG_EBC_B_BOK;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in EbcExecute, after ExecuteFunction.
|
|
|
|
It will record StepOut Entry if need.
|
|
|
|
|
|
|
|
@param VmPtr - pointer to VM context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookExecuteEnd (
|
|
|
|
IN VM_CONTEXT *VmPtr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINTN Address;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Use FramePtr as checkpoint for StepOut
|
|
|
|
//
|
2020-05-01 18:26:28 +02:00
|
|
|
CopyMem(&Address, (VOID *)((UINTN)VmPtr->FramePtr), sizeof(Address));
|
2019-09-03 11:58:42 +02:00
|
|
|
EbcDebuggerPushStepEntry (Address, (UINT64)(UINTN)VmPtr->FramePtr, EFI_DEBUG_FLAG_EBC_STEPOUT);
|
|
|
|
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in ExecuteCALL, before move IP.
|
|
|
|
It will trigger Exception if BOC enabled,
|
|
|
|
and record Callstack, and trace information.
|
|
|
|
|
|
|
|
@param VmPtr - pointer to VM context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookCALLStart (
|
|
|
|
IN VM_CONTEXT *VmPtr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EbcDebuggerCheckHookFlag (VmPtr, EFI_DEBUG_FLAG_EBC_BOC);
|
|
|
|
EbcDebuggerPushCallstackSource ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcCall);
|
|
|
|
EbcDebuggerPushCallstackParameter ((UINT64)(UINTN)VmPtr->Gpr[0], EfiDebuggerBranchTypeEbcCall);
|
|
|
|
EbcDebuggerPushTraceSourceEntry ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcCall);
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in ExecuteCALL, after move IP.
|
|
|
|
It will record Callstack, trace information
|
|
|
|
and record StepOver/StepOut Entry if need.
|
|
|
|
|
|
|
|
@param VmPtr - pointer to VM context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookCALLEnd (
|
|
|
|
IN VM_CONTEXT *VmPtr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT64 Address;
|
|
|
|
UINTN FramePtr;
|
|
|
|
|
|
|
|
EbcDebuggerPushCallstackDest ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcCall);
|
|
|
|
EbcDebuggerPushTraceDestEntry ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcCall);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Get Old FramePtr
|
|
|
|
//
|
2020-05-01 18:26:28 +02:00
|
|
|
CopyMem(&FramePtr, (VOID *)((UINTN)VmPtr->FramePtr), sizeof(FramePtr));
|
2019-09-03 11:58:42 +02:00
|
|
|
|
|
|
|
//
|
|
|
|
// Use ReturnAddress as checkpoint for StepOver
|
|
|
|
//
|
2020-05-01 18:26:28 +02:00
|
|
|
CopyMem(&Address, (VOID *)(UINTN)VmPtr->Gpr[0], sizeof(Address));
|
2019-09-03 11:58:42 +02:00
|
|
|
EbcDebuggerPushStepEntry (Address, FramePtr, EFI_DEBUG_FLAG_EBC_STEPOVER);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Use FramePtr as checkpoint for StepOut
|
|
|
|
//
|
|
|
|
Address = 0;
|
2020-05-01 18:26:28 +02:00
|
|
|
CopyMem(&Address, (VOID *)(FramePtr), sizeof(UINTN));
|
2019-09-03 11:58:42 +02:00
|
|
|
EbcDebuggerPushStepEntry (Address, FramePtr, EFI_DEBUG_FLAG_EBC_STEPOUT);
|
|
|
|
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in ExecuteCALL, before call EbcLLCALLEX.
|
|
|
|
It will trigger Exception if BOCX enabled,
|
|
|
|
and record Callstack information.
|
|
|
|
|
|
|
|
@param VmPtr - pointer to VM context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookCALLEXStart (
|
|
|
|
IN VM_CONTEXT *VmPtr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EbcDebuggerCheckHookFlag (VmPtr, EFI_DEBUG_FLAG_EBC_BOCX);
|
|
|
|
// EbcDebuggerPushCallstackSource ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcCallEx);
|
|
|
|
// EbcDebuggerPushCallstackParameter ((UINT64)(UINTN)VmPtr->R[0], EfiDebuggerBranchTypeEbcCallEx);
|
|
|
|
EbcDebuggerPushTraceSourceEntry ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcCallEx);
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in ExecuteCALL, after call EbcLLCALLEX.
|
|
|
|
It will record trace information.
|
|
|
|
|
|
|
|
@param VmPtr - pointer to VM context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookCALLEXEnd (
|
|
|
|
IN VM_CONTEXT *VmPtr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
// EbcDebuggerPushCallstackDest ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcCallEx);
|
|
|
|
EbcDebuggerPushTraceDestEntry ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcCallEx);
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in ExecuteRET, before move IP.
|
|
|
|
It will trigger Exception if BOR enabled,
|
|
|
|
and record Callstack, and trace information.
|
|
|
|
|
|
|
|
@param VmPtr - pointer to VM context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookRETStart (
|
|
|
|
IN VM_CONTEXT *VmPtr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EbcDebuggerCheckHookFlag (VmPtr, EFI_DEBUG_FLAG_EBC_BOR);
|
|
|
|
EbcDebuggerPopCallstack ();
|
|
|
|
EbcDebuggerPushTraceSourceEntry ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcRet);
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in ExecuteRET, after move IP.
|
|
|
|
It will record trace information.
|
|
|
|
|
|
|
|
@param VmPtr - pointer to VM context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookRETEnd (
|
|
|
|
IN VM_CONTEXT *VmPtr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EbcDebuggerPushTraceDestEntry ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcRet);
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in ExecuteJMP, before move IP.
|
|
|
|
It will record trace information.
|
|
|
|
|
|
|
|
@param VmPtr - pointer to VM context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookJMPStart (
|
|
|
|
IN VM_CONTEXT *VmPtr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EbcDebuggerPushTraceSourceEntry ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcJmp);
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in ExecuteJMP, after move IP.
|
|
|
|
It will record trace information.
|
|
|
|
|
|
|
|
@param VmPtr - pointer to VM context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookJMPEnd (
|
|
|
|
IN VM_CONTEXT *VmPtr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EbcDebuggerPushTraceDestEntry ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcJmp);
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in ExecuteJMP8, before move IP.
|
|
|
|
It will record trace information.
|
|
|
|
|
|
|
|
@param VmPtr - pointer to VM context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookJMP8Start (
|
|
|
|
IN VM_CONTEXT *VmPtr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EbcDebuggerPushTraceSourceEntry ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcJmp8);
|
|
|
|
return ;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
|
|
|
The hook in ExecuteJMP8, after move IP.
|
|
|
|
It will record trace information.
|
|
|
|
|
|
|
|
@param VmPtr - pointer to VM context.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EbcDebuggerHookJMP8End (
|
|
|
|
IN VM_CONTEXT *VmPtr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EbcDebuggerPushTraceDestEntry ((UINT64)(UINTN)VmPtr->Ip, EfiDebuggerBranchTypeEbcJmp8);
|
|
|
|
return ;
|
|
|
|
}
|