|
|
/*++
Copyright (c) 1990-2001 Microsoft Corporation
Module Name:
kdp.h
Abstract:
Private include file for the Kernel Debugger subcomponent of the NTOS project
Author:
Mike O'Leary (mikeol) 29-June-1989
Revision History:
--*/
#pragma warning(disable:4201) // nameless struct/union
#pragma warning(disable:4214) // bit field types other than int
#pragma warning(disable:4115) // named type definition in parentheses
#pragma warning(disable:4127) // condition expression is constant
#include "ntos.h"
#include "ki.h"
#define NOEXTAPI
#include "wdbgexts.h"
#include "ntdbg.h"
#include "string.h"
#include "stdlib.h"
#include "kddll.h"
#if defined(_ALPHA_)
#include "alphaops.h"
//
// Define KD private PCR routines.
//
// Using the following private KD routines allows the kernel debugger to
// step over breakpoints in modules that call the standard PCR routines.
//
PKPCR KdpGetPcr();
ULONG KdpReadInternalProcessorState(PVOID, ULONG); ULONG KdpReadInternalProcessorCounters(PVOID, ULONG);
struct _KPRCB * KdpGetCurrentPrcb();
struct _KTHREAD * KdpGetCurrentThread();
//
// Redefine the standard PCR routines
//
#undef KiPcr
#define KiPcr KdpGetPcr()
#undef KeGetPcr
#undef KeGetCurrentPrcb
#undef KeGetCurrentThread
#undef KeIsExecutingDpc
#define KeGetPcr() KdpGetPcr()
#define KeGetCurrentPrcb() KdpGetCurrentPrcb()
#define KeGetCurrentThread() KdpGetCurrentThread()
//
// Define TYPES
//
#define KDP_BREAKPOINT_TYPE ULONG
#define KDP_BREAKPOINT_BUFFER sizeof(ULONG)
// longword aligned
#define KDP_BREAKPOINT_ALIGN 3
#define KDP_BREAKPOINT_INSTR_ALIGN 3
// actual instruction is "call_pal kbpt"
#define KDP_BREAKPOINT_VALUE KBPT_FUNC
#elif defined(_IA64_)
// IA64 instruction is in a 128-bit bundle. Each bundle consists of 3 instruction slots.
// Each instruction slot is 41-bit long.
//
//
// 127 87 86 46 45 5 4 1 0
// ------------------------------------------------------------
// | slot 2 | slot 1 | slot 0 |template|S|
// ------------------------------------------------------------
//
// 127 96 95 64 63 32 31 0
// ------------------------------------------------------------
// | byte 3 | byte 2 | byte 1 | byte 0 |
// ------------------------------------------------------------
//
// This presents two incompatibilities with conventional processors:
// 1. The IA64 IP address is at the bundle bundary. The instruction slot number is
// stored in ISR.ei at the time of exception.
// 2. The 41-bit instruction format is not byte-aligned.
//
// Break instruction insertion must be done with proper bit-shifting to align with the selected
// instruction slot. Further, to insert break instruction insertion at a specific slot, we must
// be able to specify instruction slot as part of the address. We therefore define an EM address as
// bundle address + slot number with the least significant two bit always zero:
//
// 31 4 3 2 1 0
// --------------------------------
// | bundle address |slot#|0 0|
// --------------------------------
//
// The EM address as defined is the byte-aligned address that is closest to the actual instruction slot.
// i.e., The EM instruction address of slot #0 is equal to bundle address.
// slot #1 is equal to bundle address + 4.
// slot #2 is equal to bundle address + 8.
//
// Upon exception, the bundle address is kept in IIP, and the instruction slot which caused
// the exception is in ISR.ei. Kernel exception handler will construct the flat address and
// export it in ExceptionRecord.ExceptionAddress.
#define KDP_BREAKPOINT_TYPE ULONGLONG // 64-bit ULONGLONG type is needed to cover 41-bit EM break instruction.
#define KDP_BREAKPOINT_BUFFER (2 * sizeof(ULONGLONG))
#define KDP_BREAKPOINT_ALIGN 0x3 // An EM address consists of bundle and slot number and is 32-bit aligned.
#define KDP_BREAKPOINT_INSTR_ALIGN 0xf
#define KDP_BREAKPOINT_VALUE (BREAK_INSTR | (BREAKPOINT_STOP << 6))
#elif defined(_X86_) || defined(_AMD64_)
#define KDP_BREAKPOINT_TYPE UCHAR
#define KDP_BREAKPOINT_BUFFER sizeof(UCHAR)
#define KDP_BREAKPOINT_ALIGN 0
#define KDP_BREAKPOINT_INSTR_ALIGN 0
#define KDP_BREAKPOINT_VALUE 0xcc
#endif
//
// Define constants.
//
//
// Addresses above GLOBAL_BREAKPOINT_LIMIT are either in system space
// or part of dynlink, so we treat them as global.
//
#define GLOBAL_BREAKPOINT_LIMIT 1610612736L // 1.5gigabytes
//
// Define breakpoint table entry structure.
//
#define KD_BREAKPOINT_IN_USE 0x00000001
#define KD_BREAKPOINT_NEEDS_WRITE 0x00000002
#define KD_BREAKPOINT_SUSPENDED 0x00000004
#define KD_BREAKPOINT_NEEDS_REPLACE 0x00000008
// IA64 specific defines
#define KD_BREAKPOINT_STATE_MASK 0x0000000f
#define KD_BREAKPOINT_IA64_MASK 0x000f0000
#define KD_BREAKPOINT_IA64_MODE 0x00010000 // IA64 mode
#define KD_BREAKPOINT_IA64_MOVL 0x00020000 // MOVL instruction displaced
typedef struct _BREAKPOINT_ENTRY { ULONG Flags; ULONG_PTR DirectoryTableBase; PVOID Address; KDP_BREAKPOINT_TYPE Content; } BREAKPOINT_ENTRY, *PBREAKPOINT_ENTRY;
//
// Misc defines
//
#define MAXIMUM_RETRIES 20
#define DBGKD_MAX_SPECIAL_CALLS 10
typedef struct _TRACE_DATA_SYM { ULONG SymMin; ULONG SymMax; } TRACE_DATA_SYM, *PTRACE_DATA_SYM;
#define KD_MAX_REMOTE_FILES 16
typedef struct _KD_REMOTE_FILE { ULONG64 RemoteHandle; } KD_REMOTE_FILE, *PKD_REMOTE_FILE;
//
// Define function prototypes.
//
NTSTATUS KdpPrint( IN ULONG ComponentId, IN ULONG Level, IN PCHAR Message, IN USHORT Length, IN KPROCESSOR_MODE PreviousMode, IN PKTRAP_FRAME TrapFrame, IN PKEXCEPTION_FRAME ExceptionFrame, OUT PBOOLEAN Completion );
BOOLEAN KdpPrintString ( IN PSTRING Output );
USHORT KdpPrompt( IN PCHAR Message, IN USHORT MessageLength, IN OUT PCHAR Reply, IN USHORT ReplyLength, IN KPROCESSOR_MODE PreviousMode, IN PKTRAP_FRAME TrapFrame, IN PKEXCEPTION_FRAME ExceptionFrame );
BOOLEAN KdpPromptString ( IN PSTRING Output, IN OUT PSTRING Input );
BOOLEAN KdpReport( IN PKTRAP_FRAME TrapFrame, IN PKEXCEPTION_FRAME ExceptionFrame, IN PEXCEPTION_RECORD ExceptionRecord, IN PCONTEXT ContextRecord, IN KPROCESSOR_MODE PreviousMode, IN BOOLEAN SecondChance );
VOID KdpSymbol( IN PSTRING String, IN PKD_SYMBOLS_INFO Symbol, IN BOOLEAN Unload, IN KPROCESSOR_MODE PreviousMode, IN PCONTEXT ContextRecord, IN PKTRAP_FRAME TrapFrame, IN PKEXCEPTION_FRAME ExceptionFrame );
VOID KdpCommandString( IN PSTRING Name, IN PSTRING Command, IN KPROCESSOR_MODE PreviousMode, IN PCONTEXT ContextRecord, IN PKTRAP_FRAME TrapFrame, IN PKEXCEPTION_FRAME ExceptionFrame );
ULONG KdpAddBreakpoint ( IN PVOID Address );
BOOLEAN KdpDeleteBreakpoint ( IN ULONG Handle );
BOOLEAN KdpDeleteBreakpointRange ( IN PVOID Lower, IN PVOID Upper );
#if defined(_IA64_)
BOOLEAN KdpSuspendBreakpointRange ( IN PVOID Lower, IN PVOID Upper );
BOOLEAN KdpRestoreBreakpointRange ( IN PVOID Lower, IN PVOID Upper ); #endif
#if i386
BOOLEAN KdpCheckTracePoint( IN PEXCEPTION_RECORD ExceptionRecord, IN OUT PCONTEXT ContextRecord );
NTSTATUS KdGetTraceInformation ( OUT PVOID TraceInformation, IN ULONG TraceInformationLength, OUT PULONG RequiredLength );
VOID KdSetInternalBreakpoint ( IN PDBGKD_MANIPULATE_STATE64 m );
#endif
NTSTATUS KdQuerySpecialCalls ( IN PDBGKD_MANIPULATE_STATE64 m, IN ULONG Length, OUT PULONG RequiredLength );
VOID KdSetSpecialCall ( IN PDBGKD_MANIPULATE_STATE64 m, IN PCONTEXT ContextRecord );
VOID KdClearSpecialCalls ( VOID );
VOID KdpQuickMoveMemory ( IN PCHAR Destination, IN PCHAR Source, IN ULONG Length );
NTSTATUS KdpCopyMemoryChunks( ULONG64 Address, PVOID Buffer, ULONG TotalSize, ULONG ChunkSize, ULONG Flags, PULONG ActualSize OPTIONAL );
//
// KdpCopyMemoryChunks always copies between an untrusted address
// and a trusted buffer. The following two macros express a read
// form of this and a write form in a way similar to RtlCopyMemory
// for convenient replacement of RtlCopyMemory calls.
//
// Read memory from an untrusted pointer into a trusted buffer.
#define KdpCopyFromPtr(Dst, Src, Size, Done) \
KdpCopyMemoryChunks((ULONG_PTR)(Src), Dst, Size, 0, \ MMDBG_COPY_UNSAFE, Done) // Write memory from a trusted buffer through an untrusted pointer.
#define KdpCopyToPtr(Dst, Src, Size, Done) \
KdpCopyMemoryChunks((ULONG_PTR)(Dst), Src, Size, 0, \ MMDBG_COPY_WRITE | MMDBG_COPY_UNSAFE, Done)
ULONG KdpReceivePacket ( IN ULONG ExpectedPacketType, OUT PSTRING MessageHeader, OUT PSTRING MessageData, OUT PULONG DataLength );
NTSTATUS KdpAllowDisable( VOID );
VOID KdpSetContextState( IN OUT PDBGKD_ANY_WAIT_STATE_CHANGE WaitStateChange, IN PCONTEXT ContextRecord );
VOID KdpSetStateChange( IN OUT PDBGKD_ANY_WAIT_STATE_CHANGE WaitStateChange, IN PEXCEPTION_RECORD ExceptionRecord, IN PCONTEXT ContextRecord, IN BOOLEAN SecondChance );
VOID KdpGetStateChange( IN PDBGKD_MANIPULATE_STATE64 ManipulateState, IN PCONTEXT ContextRecord );
VOID KdpSendPacket ( IN ULONG PacketType, IN PSTRING MessageHeader, IN PSTRING MessageData OPTIONAL );
BOOLEAN KdpTrap ( IN PKTRAP_FRAME TrapFrame, IN PKEXCEPTION_FRAME ExceptionFrame, IN PEXCEPTION_RECORD ExceptionRecord64, IN PCONTEXT ContextRecord, IN KPROCESSOR_MODE PreviousMode, IN BOOLEAN SecondChance );
BOOLEAN KdpSwitchProcessor ( IN PEXCEPTION_RECORD ExceptionRecord, IN OUT PCONTEXT ContextRecord, IN BOOLEAN SecondChance );
BOOLEAN KdpReportExceptionStateChange ( IN PEXCEPTION_RECORD ExceptionRecord, IN OUT PCONTEXT ContextRecord, IN BOOLEAN SecondChance );
BOOLEAN KdpReportLoadSymbolsStateChange ( IN PSTRING PathName, IN PKD_SYMBOLS_INFO SymbolInfo, IN BOOLEAN UnloadSymbols, IN OUT PCONTEXT ContextRecord );
VOID KdpReportCommandStringStateChange ( IN PSTRING Name, IN PSTRING Command, IN OUT PCONTEXT ContextRecord );
KCONTINUE_STATUS KdpSendWaitContinue( IN ULONG PacketType, IN PSTRING MessageHeader, IN PSTRING MessageData OPTIONAL, IN OUT PCONTEXT ContextRecord );
VOID KdpReadVirtualMemory( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
#if 0
VOID KdpReadVirtualMemory64( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context ); #endif
VOID KdpWriteVirtualMemory( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
#if 0
VOID KdpWriteVirtualMemory64( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context ); #endif
VOID KdpReadPhysicalMemory( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpWritePhysicalMemory( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpCheckLowMemory( IN PDBGKD_MANIPULATE_STATE64 m );
VOID KdpGetContext( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpSetContext( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpWriteBreakpoint( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpRestoreBreakpoint( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpReadControlSpace( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpWriteControlSpace( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpReadIoSpace( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpWriteIoSpace( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpReadIoSpaceExtended ( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpWriteIoSpaceExtended ( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpReadMachineSpecificRegister( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpWriteMachineSpecificRegister( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpGetBusData ( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpSetBusData ( IN PDBGKD_MANIPULATE_STATE64 m, IN PSTRING AdditionalData, IN PCONTEXT Context );
VOID KdpSendTraceData( PSTRING Data );
VOID KdpSuspendBreakpoint ( ULONG Handle );
VOID KdpSuspendAllBreakpoints ( VOID );
VOID KdpRestoreAllBreakpoints ( VOID );
#if !defined(_TRUSTED_WINDOWS_)
VOID KdpTimeSlipDpcRoutine ( PKDPC Dpc, PVOID DeferredContext, PVOID SystemArgument1, PVOID SystemArgument2 );
VOID KdpTimeSlipWork ( IN PVOID Context ); #endif
//
// Routines shared between the debugger and
// NtSystemDebugControl.
//
VOID KdpSysGetVersion( PDBGKD_GET_VERSION64 Version );
NTSTATUS KdpSysReadControlSpace( ULONG Processor, ULONG64 Address, PVOID Buffer, ULONG Request, PULONG Actual );
NTSTATUS KdpSysWriteControlSpace( ULONG Processor, ULONG64 Address, PVOID Buffer, ULONG Request, PULONG Actual );
NTSTATUS KdpSysReadIoSpace( INTERFACE_TYPE InterfaceType, ULONG BusNumber, ULONG AddressSpace, ULONG64 Address, PVOID Buffer, ULONG Request, PULONG Actual );
NTSTATUS KdpSysWriteIoSpace( INTERFACE_TYPE InterfaceType, ULONG BusNumber, ULONG AddressSpace, ULONG64 Address, PVOID Buffer, ULONG Request, PULONG Actual );
NTSTATUS KdpSysReadMsr( ULONG Msr, PULONG64 Data );
NTSTATUS KdpSysWriteMsr( ULONG Msr, PULONG64 Data );
NTSTATUS KdpSysReadBusData( BUS_DATA_TYPE BusDataType, ULONG BusNumber, ULONG SlotNumber, ULONG Address, PVOID Buffer, ULONG Request, PULONG Actual );
NTSTATUS KdpSysWriteBusData( BUS_DATA_TYPE BusDataType, ULONG BusNumber, ULONG SlotNumber, ULONG Address, PVOID Buffer, ULONG Request, PULONG Actual );
NTSTATUS KdpSysCheckLowMemory( ULONG MmFlags );
//
// Define dummy prototype so the address of the standard breakpoint instruction
// can be captured.
//
// N.B. This function is NEVER called.
//
VOID RtlpBreakWithStatusInstruction ( VOID );
//
// Define external references.
//
#define KDP_MESSAGE_BUFFER_SIZE 4096
extern BREAKPOINT_ENTRY KdpBreakpointTable[BREAKPOINT_TABLE_SIZE]; extern KD_REMOTE_FILE KdpRemoteFiles[KD_MAX_REMOTE_FILES]; extern KSPIN_LOCK KdpDebuggerLock; extern PKDEBUG_ROUTINE KiDebugRoutine; extern PKDEBUG_SWITCH_ROUTINE KiDebugSwitchRoutine; extern KDP_BREAKPOINT_TYPE KdpBreakpointInstruction; extern UCHAR DECLSPEC_ALIGN(8) KdpMessageBuffer[KDP_MESSAGE_BUFFER_SIZE]; extern UCHAR KdpPathBuffer[KDP_MESSAGE_BUFFER_SIZE]; extern BOOLEAN KdpOweBreakpoint;
extern LARGE_INTEGER KdPerformanceCounterRate; extern LARGE_INTEGER KdTimerStart; extern LARGE_INTEGER KdTimerStop; extern LARGE_INTEGER KdTimerDifference;
extern ULONG KdComponentTableSize; extern PULONG KdComponentTable[];
extern BOOLEAN BreakpointsSuspended; extern LIST_ENTRY KdpDebuggerDataListHead;
typedef struct { ULONG64 Addr; // pc address of breakpoint
ULONG Flags; // Flags bits
ULONG Calls; // # of times traced routine called
ULONG CallsLastCheck; // # of calls at last periodic (1s) check
ULONG MaxCallsPerPeriod; ULONG MinInstructions; // largest number of instructions for 1 call
ULONG MaxInstructions; // smallest # of instructions for 1 call
ULONG TotalInstructions; // total instructions for all calls
ULONG Handle; // handle in (regular) bpt table
PVOID Thread; // Thread that's skipping this BP
ULONG64 ReturnAddress; // return address (if not COUNTONLY)
} DBGKD_INTERNAL_BREAKPOINT, *PDBGKD_INTERNAL_BREAKPOINT;
extern DBGKD_INTERNAL_BREAKPOINT KdpInternalBPs[DBGKD_MAX_INTERNAL_BREAKPOINTS];
extern ULONG_PTR KdpCurrentSymbolStart; extern ULONG_PTR KdpCurrentSymbolEnd; extern LONG KdpNextCallLevelChange; extern ULONG_PTR KdSpecialCalls[]; extern ULONG KdNumberOfSpecialCalls; extern ULONG_PTR InitialSP; extern ULONG KdpNumInternalBreakpoints; extern KTIMER InternalBreakpointTimer; extern KDPC InternalBreakpointCheckDpc; extern BOOLEAN KdpPortLocked; extern LARGE_INTEGER KdpTimeEntered;
extern DBGKD_TRACE_DATA TraceDataBuffer[]; extern ULONG TraceDataBufferPosition; extern TRACE_DATA_SYM TraceDataSyms[]; extern UCHAR NextTraceDataSym; extern UCHAR NumTraceDataSyms; extern ULONG IntBPsSkipping; extern BOOLEAN WatchStepOver; extern BOOLEAN BreakPointTimerStarted; extern PVOID WSOThread; extern ULONG_PTR WSOEsp; extern ULONG WatchStepOverHandle; extern ULONG_PTR WatchStepOverBreakAddr; extern BOOLEAN WatchStepOverSuspended; extern ULONG InstructionsTraced; extern BOOLEAN SymbolRecorded; extern LONG CallLevelChange; extern LONG_PTR oldpc; extern BOOLEAN InstrCountInternal; extern BOOLEAN BreakpointsSuspended; extern BOOLEAN KdpControlCPressed; extern KD_CONTEXT KdpContext;
extern KDP_BREAKPOINT_TYPE KdpBreakpointInstruction; extern UCHAR KdPrintDefaultCircularBuffer[KDPRINTDEFAULTBUFFERSIZE]; extern PUCHAR KdPrintCircularBuffer; extern PUCHAR KdPrintWritePointer; extern ULONG KdPrintRolloverCount; extern ULONG KdPrintBufferChanges; extern KSPIN_LOCK KdpPrintSpinLock; extern KSPIN_LOCK KdpDataSpinLock; extern LIST_ENTRY KdpDebuggerDataListHead; extern DBGKD_GET_VERSION64 KdVersionBlock; extern KDDEBUGGER_DATA64 KdDebuggerDataBlock; extern KDPC KdpTimeSlipDpc; extern WORK_QUEUE_ITEM KdpTimeSlipWorkItem; extern KTIMER KdpTimeSlipTimer; extern ULONG KdpTimeSlipPending; extern KSPIN_LOCK KdpTimeSlipEventLock; extern PVOID KdpTimeSlipEvent; extern BOOLEAN KdpDebuggerStructuresInitialized; extern ULONG KdEnteredDebugger; extern BOOLEAN KdPreviouslyEnabled;
//
// !search support (page hit database)
//
//
// Hit database where search results are stored (kddata.c).
// The debugger extensions know how to extract the information
// from here.
//
// Note that the size of the hit database is large enough to
// accomodate any searches because the !search extension works
// in batches of pages < PAGE_SIZE and for every page we register only
// one hit.
//
#define SEARCH_PAGE_HIT_DATABASE_SIZE PAGE_SIZE
extern PFN_NUMBER KdpSearchPageHits[SEARCH_PAGE_HIT_DATABASE_SIZE]; extern ULONG KdpSearchPageHitOffsets[SEARCH_PAGE_HIT_DATABASE_SIZE];
extern ULONG KdpSearchPageHitIndex;
//
// Set to true while a physical memory search is in progress.
// Reset at the end of the search. This is done in the debugger
// extension and it is a flag used by KdpCheckLowMemory to get
// onto a different code path.
//
extern LOGICAL KdpSearchInProgress;
//
// These variables store the current state of the search operation.
// They can be used to restore an interrupted search.
//
extern PFN_NUMBER KdpSearchStartPageFrame; extern PFN_NUMBER KdpSearchEndPageFrame;
extern ULONG_PTR KdpSearchAddressRangeStart; extern ULONG_PTR KdpSearchAddressRangeEnd;
extern PFN_NUMBER KdpSearchPfnValue;
//
// Checkpoint variable used to test if we have the right
// debugging symbols.
//
#define KDP_SEARCH_SYMBOL_CHECK 0xABCDDCBA
extern ULONG KdpSearchCheckPoint;
//
// Page search flags
//
#define KDP_SEARCH_ALL_OFFSETS_IN_PAGE 0x0001
//
// Private procedure prototypes
//
BOOLEAN KdpAcquireBreakpoint( IN ULONG Number );
VOID KdpInitCom( VOID );
VOID KdpPortLock( VOID );
VOID KdpPortUnlock( VOID );
BOOLEAN KdpPollBreakInWithPortLock( VOID );
USHORT KdpReceivePacketLeader ( IN ULONG PacketType, OUT PULONG PacketLeader );
#if DBG
#include <stdio.h>
#define DPRINT(s) KdpDprintf s
VOID KdpDprintf( IN PCHAR f, ... );
#else
#define DPRINT(s)
#endif
|