code scrub:
1. updated functions header. 2. sync some comments for .S files. 3. fixed some error in AsmFuncs.S git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@7044 6f19259b-4bc3-4df7-8a09-765794883524
This commit is contained in:
@@ -1,7 +1,7 @@
|
||||
#/**@file
|
||||
# Low leve IA32 specific debug support functions.
|
||||
#
|
||||
# Copyright (c) 2006, Intel Corporation
|
||||
# Copyright (c) 2006 - 2008, Intel Corporation. <BR>
|
||||
# All rights reserved. This program and the accompanying materials
|
||||
# are licensed and made available under the terms and conditions of the BSD License
|
||||
# which accompanies this distribution. The full text of the license may be found at
|
||||
@@ -18,16 +18,27 @@
|
||||
.globl ASM_PFX(CommonIdtEntry)
|
||||
.globl ASM_PFX(FxStorSupport)
|
||||
|
||||
ASM_PFX(StubSize): .long ASM_PFX(InterruptEntryStubEnd) - ASM_PFX(InterruptEntryStub)
|
||||
ASM_PFX(AppEsp): .long 0x11111111 # ?
|
||||
ASM_PFX(DebugEsp): .long 0x22222222 # ?
|
||||
ASM_PFX(ExtraPush): .long 0x33333333 # ?
|
||||
ASM_PFX(ExceptData): .long 0x44444444 # ?
|
||||
ASM_PFX(Eflags): .long 0x55555555 # ?
|
||||
ASM_PFX(OrigVector): .long 0x66666666 # ?
|
||||
ASM_PFX(StubSize): .long ASM_PFX(InterruptEntryStubEnd) - ASM_PFX(InterruptEntryStub)
|
||||
|
||||
#------------------------------------------------------------------------------
|
||||
# BOOLEAN
|
||||
# FxStorSupport (
|
||||
# void
|
||||
# )
|
||||
#
|
||||
# Abstract: Returns TRUE if FxStor instructions are supported
|
||||
#
|
||||
.globl ASM_PFX(FxStorSupport)
|
||||
ASM_PFX(FxStorSupport):
|
||||
#
|
||||
# cpuid corrupts ebx which must be preserved per the C calling convention
|
||||
#
|
||||
push %ebx
|
||||
mov $0x1,%eax
|
||||
cpuid
|
||||
@@ -36,6 +47,15 @@ ASM_PFX(FxStorSupport):
|
||||
shr $0x18,%eax
|
||||
pop %ebx
|
||||
ret
|
||||
#------------------------------------------------------------------------------
|
||||
# void
|
||||
# Vect2Desc (
|
||||
# DESCRIPTOR * DestDesc,
|
||||
# void (*Vector) (void)
|
||||
# )
|
||||
#
|
||||
# Abstract: Encodes an IDT descriptor with the given physical address
|
||||
#
|
||||
|
||||
.globl ASM_PFX(Vect2Desc)
|
||||
ASM_PFX(Vect2Desc):
|
||||
@@ -53,18 +73,68 @@ ASM_PFX(Vect2Desc):
|
||||
|
||||
.globl ASM_PFX(InterruptEntryStub)
|
||||
ASM_PFX(InterruptEntryStub):
|
||||
mov %esp,0x0
|
||||
mov $0x0,%esp
|
||||
push $0x0
|
||||
jmp ASM_PFX(CommonIdtEntry)
|
||||
mov %esp,0x0 # save stack top
|
||||
mov $0x0,%esp # switch to debugger stack
|
||||
push $0x0 # push vector number - will be modified before installed
|
||||
jmp ASM_PFX(CommonIdtEntry) # jump CommonIdtEntry
|
||||
.globl ASM_PFX(InterruptEntryStubEnd)
|
||||
ASM_PFX(InterruptEntryStubEnd):
|
||||
|
||||
#------------------------------------------------------------------------------
|
||||
# CommonIdtEntry
|
||||
#
|
||||
# Abstract: This code is not a function, but is the common part for all IDT
|
||||
# vectors.
|
||||
#
|
||||
.globl ASM_PFX(CommonIdtEntry)
|
||||
ASM_PFX(CommonIdtEntry):
|
||||
##
|
||||
## At this point, the stub has saved the current application stack esp into AppEsp
|
||||
## and switched stacks to the debug stack, where it pushed the vector number
|
||||
##
|
||||
## The application stack looks like this:
|
||||
##
|
||||
## ...
|
||||
## (last application stack entry)
|
||||
## eflags from interrupted task
|
||||
## CS from interrupted task
|
||||
## EIP from interrupted task
|
||||
## Error code <-------------------- Only present for some exeption types
|
||||
##
|
||||
##
|
||||
|
||||
|
||||
## The stub switched us to the debug stack and pushed the interrupt number.
|
||||
##
|
||||
## Next, construct the context record. It will be build on the debug stack by
|
||||
## pushing the registers in the correct order so as to create the context structure
|
||||
## on the debug stack. The context record must be built from the end back to the
|
||||
## beginning because the stack grows down...
|
||||
#
|
||||
## For reference, the context record looks like this:
|
||||
##
|
||||
## typedef
|
||||
## struct {
|
||||
## UINT32 ExceptionData;
|
||||
## FX_SAVE_STATE_IA32 FxSaveState;
|
||||
## UINT32 Dr0, Dr1, Dr2, Dr3, Dr6, Dr7;
|
||||
## UINT32 Cr0, Cr2, Cr3, Cr4;
|
||||
## UINT32 EFlags;
|
||||
## UINT32 Ldtr, Tr;
|
||||
## UINT32 Gdtr[2], Idtr[2];
|
||||
## UINT32 Eip;
|
||||
## UINT32 Gs, Fs, Es, Ds, Cs, Ss;
|
||||
## UINT32 Edi, Esi, Ebp, Esp, Ebx, Edx, Ecx, Eax;
|
||||
## } SYSTEM_CONTEXT_IA32; // 32 bit system context record
|
||||
|
||||
## UINT32 Edi, Esi, Ebp, Esp, Ebx, Edx, Ecx, Eax;
|
||||
pusha
|
||||
## Save interrupt state eflags register...
|
||||
pushf
|
||||
pop %eax
|
||||
## We need to determine if any extra data was pushed by the exception, and if so, save it
|
||||
## To do this, we check the exception number pushed by the stub, and cache the
|
||||
## result in a variable since we'll need this again.
|
||||
mov %eax,0x0
|
||||
cmpl $0x8,0x0
|
||||
jne ASM_PFX(CommonIdtEntry+0x20)
|
||||
@@ -95,6 +165,9 @@ ASM_PFX(CommonIdtEntry):
|
||||
movl $0x1,0x0
|
||||
jmp ASM_PFX(CommonIdtEntry+0xa8)
|
||||
movl $0x0,0x0
|
||||
## If there's some extra data, save it also, and modify the saved AppEsp to effectively
|
||||
## pop this value off the application's stack.
|
||||
|
||||
cmpl $0x1,0x0
|
||||
jne ASM_PFX(CommonIdtEntry+0xc8)
|
||||
mov 0x0,%eax
|
||||
@@ -104,13 +177,23 @@ ASM_PFX(CommonIdtEntry):
|
||||
mov %eax,0x0
|
||||
jmp ASM_PFX(CommonIdtEntry+0xd2)
|
||||
movl $0x0,0x0
|
||||
## The "pushad" above pushed the debug stack esp. Since what we're actually doing
|
||||
## is building the context record on the debug stack, we need to save the pushed
|
||||
## debug ESP, and replace it with the application's last stack entry...
|
||||
mov 0xc(%esp),%eax
|
||||
mov %eax,0x0
|
||||
mov 0x0,%eax
|
||||
add $0xc,%eax
|
||||
# application stack has eflags, cs, & eip, so
|
||||
# last actual application stack entry is
|
||||
# 12 bytes into the application stack.
|
||||
mov %eax,0xc(%esp)
|
||||
## continue building context record
|
||||
## UINT32 Gs, Fs, Es, Ds, Cs, Ss; insure high 16 bits of each is zero
|
||||
mov %ss,%eax
|
||||
push %eax
|
||||
|
||||
# CS from application is one entry back in application stack
|
||||
mov 0x0,%eax
|
||||
movzwl 0x4(%eax),%eax
|
||||
push %eax
|
||||
@@ -122,21 +205,35 @@ ASM_PFX(CommonIdtEntry):
|
||||
push %eax
|
||||
mov %gs,%eax
|
||||
push %eax
|
||||
|
||||
## UINT32 Eip;
|
||||
# Eip from application is on top of application stack
|
||||
mov 0x0,%eax
|
||||
pushl (%eax)
|
||||
|
||||
## UINT32 Gdtr[2], Idtr[2];
|
||||
push $0x0
|
||||
push $0x0
|
||||
sidtl (%esp)
|
||||
push $0x0
|
||||
push $0x0
|
||||
sgdtl (%esp)
|
||||
|
||||
## UINT32 Ldtr, Tr;
|
||||
xor %eax,%eax
|
||||
str %eax
|
||||
push %eax
|
||||
sldt %eax
|
||||
push %eax
|
||||
|
||||
## UINT32 EFlags;
|
||||
## Eflags from application is two entries back in application stack
|
||||
mov 0x0,%eax
|
||||
pushl 0x8(%eax)
|
||||
|
||||
## UINT32 Cr0, Cr1, Cr2, Cr3, Cr4;
|
||||
## insure FXSAVE/FXRSTOR is enabled in CR4...
|
||||
## ... while we're at it, make sure DE is also enabled...
|
||||
mov %cr4,%eax
|
||||
or $0x208,%eax
|
||||
mov %eax,%cr4
|
||||
@@ -148,12 +245,18 @@ ASM_PFX(CommonIdtEntry):
|
||||
push $0x0
|
||||
mov %cr0,%eax
|
||||
push %eax
|
||||
|
||||
## UINT32 Dr0, Dr1, Dr2, Dr3, Dr6, Dr7;
|
||||
mov %db7,%eax
|
||||
push %eax
|
||||
|
||||
## clear Dr7 while executing debugger itself
|
||||
xor %eax,%eax
|
||||
mov %eax,%db7
|
||||
mov %db6,%eax
|
||||
push %eax
|
||||
|
||||
## insure all status bits in dr6 are clear...
|
||||
xor %eax,%eax
|
||||
mov %eax,%db6
|
||||
mov %db3,%eax
|
||||
@@ -164,21 +267,38 @@ ASM_PFX(CommonIdtEntry):
|
||||
push %eax
|
||||
mov %db0,%eax
|
||||
push %eax
|
||||
|
||||
## FX_SAVE_STATE_IA32 FxSaveState;
|
||||
sub $0x200,%esp
|
||||
mov %esp,%edi
|
||||
# IMPORTANT!! The debug stack has been carefully constructed to
|
||||
# insure that esp and edi are 16 byte aligned when we get here.
|
||||
# They MUST be. If they are not, a GP fault will occur.
|
||||
fxsave (%edi)
|
||||
|
||||
## UINT32 ExceptionData;
|
||||
mov 0x0,%eax
|
||||
push %eax
|
||||
|
||||
# call to C code which will in turn call registered handler
|
||||
# pass in the vector number
|
||||
mov %esp,%eax
|
||||
push %eax
|
||||
mov 0x0,%eax
|
||||
push %eax
|
||||
call ASM_PFX(CommonIdtEntry+0x184)
|
||||
add $0x8,%esp
|
||||
|
||||
# restore context...
|
||||
## UINT32 ExceptionData;
|
||||
add $0x4,%esp
|
||||
|
||||
## FX_SAVE_STATE_IA32 FxSaveState;
|
||||
mov %esp,%esi
|
||||
fxrstor (%esi)
|
||||
add $0x200,%esp
|
||||
|
||||
## UINT32 Dr0, Dr1, Dr2, Dr3, Dr6, Dr7;
|
||||
pop %eax
|
||||
mov %eax,%db0
|
||||
pop %eax
|
||||
@@ -187,9 +307,13 @@ ASM_PFX(CommonIdtEntry):
|
||||
mov %eax,%db2
|
||||
pop %eax
|
||||
mov %eax,%db3
|
||||
|
||||
## skip restore of dr6. We cleared dr6 during the context save.
|
||||
add $0x4,%esp
|
||||
pop %eax
|
||||
mov %eax,%db7
|
||||
|
||||
## UINT32 Cr0, Cr1, Cr2, Cr3, Cr4;
|
||||
pop %eax
|
||||
mov %eax,%cr0
|
||||
add $0x4,%esp
|
||||
@@ -199,10 +323,25 @@ ASM_PFX(CommonIdtEntry):
|
||||
mov %eax,%cr3
|
||||
pop %eax
|
||||
mov %eax,%cr4
|
||||
|
||||
## UINT32 EFlags;
|
||||
mov 0x0,%eax
|
||||
popl 0x8(%eax)
|
||||
|
||||
## UINT32 Ldtr, Tr;
|
||||
## UINT32 Gdtr[2], Idtr[2];
|
||||
## Best not let anyone mess with these particular registers...
|
||||
add $0x18,%esp
|
||||
|
||||
## UINT32 Eip;
|
||||
popl (%eax)
|
||||
|
||||
## UINT32 SegGs, SegFs, SegEs, SegDs, SegCs, SegSs;
|
||||
## NOTE - modified segment registers could hang the debugger... We
|
||||
## could attempt to insulate ourselves against this possibility,
|
||||
## but that poses risks as well.
|
||||
##
|
||||
|
||||
pop %gs
|
||||
pop %fs
|
||||
pop %es
|
||||
@@ -210,35 +349,56 @@ ASM_PFX(CommonIdtEntry):
|
||||
popl 0x4(%eax)
|
||||
pop %ss
|
||||
mov 0xc(%esp),%ebx
|
||||
mov 0x0,%eax
|
||||
|
||||
## The next stuff to restore is the general purpose registers that were pushed
|
||||
## using the "pushad" instruction.
|
||||
##
|
||||
## The value of ESP as stored in the context record is the application ESP
|
||||
## including the 3 entries on the application stack caused by the exception
|
||||
## itself. It may have been modified by the debug agent, so we need to
|
||||
## determine if we need to relocate the application stack.
|
||||
|
||||
mov 0x0,%eax # move the potentially modified AppEsp into ebx
|
||||
add $0xc,%eax
|
||||
cmp %eax,%ebx
|
||||
je ASM_PFX(CommonIdtEntry+0x202)
|
||||
mov 0x0,%eax
|
||||
mov (%eax),%ecx
|
||||
mov (%eax),%ecx # EIP
|
||||
mov %ecx,(%ebx)
|
||||
mov 0x4(%eax),%ecx
|
||||
mov 0x4(%eax),%ecx # CS
|
||||
mov %ecx,0x4(%ebx)
|
||||
mov 0x8(%eax),%ecx
|
||||
mov 0x8(%eax),%ecx # EFLAGS
|
||||
mov %ecx,0x8(%ebx)
|
||||
mov %ebx,%eax
|
||||
|
||||
mov %ebx,%eax # modify the saved AppEsp to the new AppEsp
|
||||
mov %eax,0x0
|
||||
mov 0x0,%eax
|
||||
mov %eax,0xc(%esp)
|
||||
mov 0x0,%eax # restore the DebugEsp on the debug stack
|
||||
# so our "popad" will not cause a stack switch
|
||||
mov %eax,0xc(%esp)
|
||||
cmpl $0x68,0x0
|
||||
jne PhonyIretd+0xd
|
||||
## Restore eflags so when we chain, the flags will be exactly as if we were never here.
|
||||
## We gin up the stack to do an iretd so we can get ALL the flags.
|
||||
mov 0x0,%eax
|
||||
mov 0x8(%eax),%ebx
|
||||
and $0xfffffcff,%ebx
|
||||
and $0xfffffcff,%ebx # special handling for IF and TF
|
||||
push %ebx
|
||||
push %cs
|
||||
push $0x0
|
||||
iret
|
||||
|
||||
PhonyIretd:
|
||||
## UINT32 Edi, Esi, Ebp, Esp, Ebx, Edx, Ecx, Eax;
|
||||
popa
|
||||
|
||||
## Switch back to application stack
|
||||
mov 0x0,%esp
|
||||
jmp *0x0
|
||||
## Jump to original handler
|
||||
## UINT32 Edi, Esi, Ebp, Esp, Ebx, Edx, Ecx, Eax;
|
||||
popa
|
||||
## Switch back to application stack
|
||||
mov 0x0,%esp
|
||||
|
||||
## We're outa here...
|
||||
iret
|
||||
|
Reference in New Issue
Block a user