winedos / Improve tracing
Jukka Heinonen
jhei at iki.fi
Sat Apr 12 14:45:21 CDT 2003
This patch makes protected mode interrupts print
as much tracing information as real mode interrupts.
Also, relay tracing stuff is added back to interrupt
handling.
Changelog:
Interrupt handling now prints more trace information.
Replaced some magic numbers with preprocessor constants.
Index: dlls/winedos/interrupts.c
===================================================================
RCS file: /home/wine/wine/dlls/winedos/interrupts.c,v
retrieving revision 1.14
diff -u -r1.14 interrupts.c
--- dlls/winedos/interrupts.c 4 Mar 2003 02:16:20 -0000 1.14
+++ dlls/winedos/interrupts.c 12 Apr 2003 19:36:03 -0000
@@ -36,6 +36,8 @@
WINE_DEFAULT_DEBUG_CHANNEL(int);
+WINE_DECLARE_DEBUG_CHANNEL(relay);
+
static FARPROC16 DOSVM_Vectors16[256];
static FARPROC48 DOSVM_Vectors48[256];
@@ -70,6 +72,14 @@
};
+/*
+ * Sizes of real mode and protected mode interrupt stubs.
+ */
+#define DOSVM_STUB_RM 4
+#define DOSVM_STUB_PM16 5
+#define DOSVM_STUB_PM48 6
+
+
/**********************************************************************
* DOSVM_DefaultHandler
*
@@ -173,6 +183,19 @@
*/
void WINAPI DOSVM_EmulateInterruptPM( CONTEXT86 *context, BYTE intnum )
{
+ if (TRACE_ON(relay))
+ {
+ DPRINTF( "Call DOS int 0x%02x ret=%04lx:%08lx\n",
+ intnum, context->SegCs, context->Eip );
+ DPRINTF( " eax=%08lx ebx=%08lx ecx=%08lx edx=%08lx\n",
+ context->Eax, context->Ebx, context->Ecx, context->Edx );
+ DPRINTF( " esi=%08lx edi=%08lx ebp=%08lx esp=%08lx \n",
+ context->Esi, context->Edi, context->Ebp, context->Esp );
+ DPRINTF( " ds=%04lx es=%04lx fs=%04lx gs=%04lx flags=%08lx\n",
+ context->SegDs, context->SegEs,
+ context->SegFs, context->SegGs, context->EFlags );
+ }
+
if (context->SegCs == DOSVM_dpmi_segments->dpmi_sel)
{
DOSVM_BuildCallFrame( context,
@@ -188,6 +211,13 @@
}
else if (context->SegCs == DOSVM_dpmi_segments->int48_sel)
{
+ if (intnum != context->Eip / DOSVM_STUB_PM48)
+ WARN( "interrupt stub has been modified "
+ "(interrupt is %02x, interrupt stub is %02lx)\n",
+ intnum, context->Eip/DOSVM_STUB_PM48 );
+
+ TRACE( "builtin interrupt %02x has been branched to\n", intnum );
+
if (intnum == 0x25 || intnum == 0x26)
DOSVM_PushFlags( context, TRUE, TRUE );
@@ -197,6 +227,13 @@
}
else if (context->SegCs == DOSVM_dpmi_segments->int16_sel)
{
+ if (intnum != context->Eip / DOSVM_STUB_PM16)
+ WARN( "interrupt stub has been modified "
+ "(interrupt is %02x, interrupt stub is %02lx)\n",
+ intnum, context->Eip/DOSVM_STUB_PM16 );
+
+ TRACE( "builtin interrupt %02x has been branched to\n", intnum );
+
if (intnum == 0x25 || intnum == 0x26)
DOSVM_PushFlags( context, FALSE, TRUE );
@@ -227,12 +264,17 @@
if (addr.selector == DOSVM_dpmi_segments->int48_sel)
{
+ TRACE( "builtin interrupt %02lx has been invoked "
+ "(through vector %02x)\n",
+ addr.offset / DOSVM_STUB_PM48, intnum );
+
if (intnum == 0x25 || intnum == 0x26)
DOSVM_PushFlags( context, TRUE, FALSE );
- DOSVM_BuildCallFrame( context,
- DOSVM_IntProcRelay,
- DOSVM_GetBuiltinHandler(intnum) );
+ DOSVM_BuildCallFrame( context,
+ DOSVM_IntProcRelay,
+ DOSVM_GetBuiltinHandler(
+ addr.offset/DOSVM_STUB_PM48 ) );
}
else
{
@@ -240,6 +282,9 @@
context->SegSs,
context->Esp);
+ TRACE( "invoking hooked interrupt %02x at %04x:%08lx\n",
+ intnum, addr.selector, addr.offset );
+
/* Push the flags and return address on the stack */
*(--stack) = context->EFlags;
*(--stack) = context->SegCs;
@@ -257,12 +302,17 @@
if (SELECTOROF(addr) == DOSVM_dpmi_segments->int16_sel)
{
+ TRACE( "builtin interrupt %02x has been invoked "
+ "(through vector %02x)\n",
+ OFFSETOF(addr)/DOSVM_STUB_PM16, intnum );
+
if (intnum == 0x25 || intnum == 0x26)
DOSVM_PushFlags( context, FALSE, FALSE );
-
+
DOSVM_BuildCallFrame( context,
DOSVM_IntProcRelay,
- DOSVM_GetBuiltinHandler(intnum) );
+ DOSVM_GetBuiltinHandler(
+ OFFSETOF(addr)/DOSVM_STUB_PM16 ) );
}
else
{
@@ -270,6 +320,9 @@
context->SegSs,
context->Esp);
+ TRACE( "invoking hooked interrupt %02x at %04x:%04x\n",
+ intnum, SELECTOROF(addr), OFFSETOF(addr) );
+
/* Push the flags and return address on the stack */
*(--stack) = LOWORD(context->EFlags);
*(--stack) = context->SegCs;
@@ -277,7 +330,7 @@
ADD_LOWORD( context->Esp, -6 );
/* Jump to the interrupt handler */
- context->SegCs = HIWORD(addr);
+ context->SegCs = HIWORD(addr);
context->Eip = LOWORD(addr);
}
}
@@ -298,6 +351,19 @@
*/
BOOL WINAPI DOSVM_EmulateInterruptRM( CONTEXT86 *context, BYTE intnum )
{
+ if (TRACE_ON(relay))
+ {
+ DPRINTF( "Call DOS int 0x%02x ret=%04lx:%08lx\n",
+ intnum, context->SegCs, context->Eip );
+ DPRINTF( " eax=%08lx ebx=%08lx ecx=%08lx edx=%08lx\n",
+ context->Eax, context->Ebx, context->Ecx, context->Edx );
+ DPRINTF( " esi=%08lx edi=%08lx ebp=%08lx esp=%08lx \n",
+ context->Esi, context->Edi, context->Ebp, context->Esp );
+ DPRINTF( " ds=%04lx es=%04lx fs=%04lx gs=%04lx flags=%08lx\n",
+ context->SegDs, context->SegEs,
+ context->SegFs, context->SegGs, context->EFlags );
+ }
+
/* check for our real-mode hooks */
if (intnum == 0x31)
{
@@ -312,9 +378,10 @@
/* check if the call is from our fake BIOS interrupt stubs */
if (context->SegCs==0xf000)
{
- if (intnum != (context->Eip/4))
- TRACE( "something fishy going on here (interrupt stub is %02lx)\n",
- context->Eip/4 );
+ if (intnum != context->Eip / DOSVM_STUB_RM)
+ WARN( "interrupt stub has been modified "
+ "(interrupt is %02x, interrupt stub is %02lx)\n",
+ intnum, context->Eip/DOSVM_STUB_RM );
TRACE( "builtin interrupt %02x has been branched to\n", intnum );
@@ -345,9 +412,10 @@
if (SELECTOROF(handler) == 0xf000)
{
/* if so, call it directly */
- TRACE( "builtin interrupt %02x has been invoked (through vector %02x)\n",
- OFFSETOF(handler)/4, intnum );
- DOSVM_CallBuiltinHandler( context, OFFSETOF(handler)/4 );
+ TRACE( "builtin interrupt %02x has been invoked "
+ "(through vector %02x)\n",
+ OFFSETOF(handler)/DOSVM_STUB_RM, intnum );
+ DOSVM_CallBuiltinHandler( context, OFFSETOF(handler)/DOSVM_STUB_RM );
}
else
{
@@ -355,8 +423,8 @@
WORD* stack = PTR_REAL_TO_LIN( context->SegSs, context->Esp );
WORD flag = LOWORD( context->EFlags );
- TRACE_(int)( "invoking hooked interrupt %02x at %04x:%04x\n",
- intnum, SELECTOROF(handler), OFFSETOF(handler) );
+ TRACE( "invoking hooked interrupt %02x at %04x:%04x\n",
+ intnum, SELECTOROF(handler), OFFSETOF(handler) );
/* Copy virtual interrupt flag to pushed interrupt flag. */
if (context->EFlags & VIF_MASK)
@@ -387,6 +455,7 @@
return ((FARPROC16*)0)[intnum];
}
+
/**********************************************************************
* DOSVM_SetRMHandler
*
@@ -410,7 +479,7 @@
if (!DOSVM_Vectors16[intnum])
{
FARPROC16 proc = (FARPROC16)MAKESEGPTR( DOSVM_dpmi_segments->int16_sel,
- 5 * intnum );
+ DOSVM_STUB_PM16 * intnum );
DOSVM_Vectors16[intnum] = proc;
}
return DOSVM_Vectors16[intnum];
@@ -429,6 +498,7 @@
DOSVM_Vectors16[intnum] = handler;
}
+
/**********************************************************************
* DOSVM_GetPMHandler48
*
@@ -440,10 +510,11 @@
if (!DOSVM_Vectors48[intnum].selector)
{
DOSVM_Vectors48[intnum].selector = DOSVM_dpmi_segments->int48_sel;
- DOSVM_Vectors48[intnum].offset = 6 * intnum;
+ DOSVM_Vectors48[intnum].offset = DOSVM_STUB_PM48 * intnum;
}
return DOSVM_Vectors48[intnum];
}
+
/**********************************************************************
* DOSVM_SetPMHandler48
--
Jukka Heinonen <http://www.iki.fi/jhei/>
More information about the wine-patches
mailing list