Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

955 lines
22 KiB

/*++
Copyright (c) 1990-2001 Microsoft Corporation
Module Name:
kdp.h
Abstract:
Private include file for the Kernel Debugger subcomponent
of the NTOS project
Author:
Mike O'Leary (mikeol) 29-June-1989
Revision History:
--*/
#pragma warning(disable:4201) // nameless struct/union
#pragma warning(disable:4214) // bit field types other than int
#pragma warning(disable:4115) // named type definition in parentheses
#pragma warning(disable:4127) // condition expression is constant
#include "ntos.h"
#include "ki.h"
#define NOEXTAPI
#include "wdbgexts.h"
#include "ntdbg.h"
#include "string.h"
#include "stdlib.h"
#include "kddll.h"
#if defined(_ALPHA_)
#include "alphaops.h"
//
// Define KD private PCR routines.
//
// Using the following private KD routines allows the kernel debugger to
// step over breakpoints in modules that call the standard PCR routines.
//
PKPCR KdpGetPcr();
ULONG KdpReadInternalProcessorState(PVOID, ULONG);
ULONG KdpReadInternalProcessorCounters(PVOID, ULONG);
struct _KPRCB *
KdpGetCurrentPrcb();
struct _KTHREAD *
KdpGetCurrentThread();
//
// Redefine the standard PCR routines
//
#undef KiPcr
#define KiPcr KdpGetPcr()
#undef KeGetPcr
#undef KeGetCurrentPrcb
#undef KeGetCurrentThread
#undef KeIsExecutingDpc
#define KeGetPcr() KdpGetPcr()
#define KeGetCurrentPrcb() KdpGetCurrentPrcb()
#define KeGetCurrentThread() KdpGetCurrentThread()
//
// Define TYPES
//
#define KDP_BREAKPOINT_TYPE ULONG
#define KDP_BREAKPOINT_BUFFER sizeof(ULONG)
// longword aligned
#define KDP_BREAKPOINT_ALIGN 3
#define KDP_BREAKPOINT_INSTR_ALIGN 3
// actual instruction is "call_pal kbpt"
#define KDP_BREAKPOINT_VALUE KBPT_FUNC
#elif defined(_IA64_)
// IA64 instruction is in a 128-bit bundle. Each bundle consists of 3 instruction slots.
// Each instruction slot is 41-bit long.
//
//
// 127 87 86 46 45 5 4 1 0
// ------------------------------------------------------------
// | slot 2 | slot 1 | slot 0 |template|S|
// ------------------------------------------------------------
//
// 127 96 95 64 63 32 31 0
// ------------------------------------------------------------
// | byte 3 | byte 2 | byte 1 | byte 0 |
// ------------------------------------------------------------
//
// This presents two incompatibilities with conventional processors:
// 1. The IA64 IP address is at the bundle bundary. The instruction slot number is
// stored in ISR.ei at the time of exception.
// 2. The 41-bit instruction format is not byte-aligned.
//
// Break instruction insertion must be done with proper bit-shifting to align with the selected
// instruction slot. Further, to insert break instruction insertion at a specific slot, we must
// be able to specify instruction slot as part of the address. We therefore define an EM address as
// bundle address + slot number with the least significant two bit always zero:
//
// 31 4 3 2 1 0
// --------------------------------
// | bundle address |slot#|0 0|
// --------------------------------
//
// The EM address as defined is the byte-aligned address that is closest to the actual instruction slot.
// i.e., The EM instruction address of slot #0 is equal to bundle address.
// slot #1 is equal to bundle address + 4.
// slot #2 is equal to bundle address + 8.
//
// Upon exception, the bundle address is kept in IIP, and the instruction slot which caused
// the exception is in ISR.ei. Kernel exception handler will construct the flat address and
// export it in ExceptionRecord.ExceptionAddress.
#define KDP_BREAKPOINT_TYPE ULONGLONG // 64-bit ULONGLONG type is needed to cover 41-bit EM break instruction.
#define KDP_BREAKPOINT_BUFFER (2 * sizeof(ULONGLONG))
#define KDP_BREAKPOINT_ALIGN 0x3 // An EM address consists of bundle and slot number and is 32-bit aligned.
#define KDP_BREAKPOINT_INSTR_ALIGN 0xf
#define KDP_BREAKPOINT_VALUE (BREAK_INSTR | (BREAKPOINT_STOP << 6))
#elif defined(_X86_) || defined(_AMD64_)
#define KDP_BREAKPOINT_TYPE UCHAR
#define KDP_BREAKPOINT_BUFFER sizeof(UCHAR)
#define KDP_BREAKPOINT_ALIGN 0
#define KDP_BREAKPOINT_INSTR_ALIGN 0
#define KDP_BREAKPOINT_VALUE 0xcc
#endif
//
// Define constants.
//
//
// Addresses above GLOBAL_BREAKPOINT_LIMIT are either in system space
// or part of dynlink, so we treat them as global.
//
#define GLOBAL_BREAKPOINT_LIMIT 1610612736L // 1.5gigabytes
//
// Define breakpoint table entry structure.
//
#define KD_BREAKPOINT_IN_USE 0x00000001
#define KD_BREAKPOINT_NEEDS_WRITE 0x00000002
#define KD_BREAKPOINT_SUSPENDED 0x00000004
#define KD_BREAKPOINT_NEEDS_REPLACE 0x00000008
// IA64 specific defines
#define KD_BREAKPOINT_STATE_MASK 0x0000000f
#define KD_BREAKPOINT_IA64_MASK 0x000f0000
#define KD_BREAKPOINT_IA64_MODE 0x00010000 // IA64 mode
#define KD_BREAKPOINT_IA64_MOVL 0x00020000 // MOVL instruction displaced
typedef struct _BREAKPOINT_ENTRY {
ULONG Flags;
ULONG_PTR DirectoryTableBase;
PVOID Address;
KDP_BREAKPOINT_TYPE Content;
} BREAKPOINT_ENTRY, *PBREAKPOINT_ENTRY;
//
// Misc defines
//
#define MAXIMUM_RETRIES 20
#define DBGKD_MAX_SPECIAL_CALLS 10
typedef struct _TRACE_DATA_SYM {
ULONG SymMin;
ULONG SymMax;
} TRACE_DATA_SYM, *PTRACE_DATA_SYM;
#define KD_MAX_REMOTE_FILES 16
typedef struct _KD_REMOTE_FILE {
ULONG64 RemoteHandle;
} KD_REMOTE_FILE, *PKD_REMOTE_FILE;
//
// Define function prototypes.
//
NTSTATUS
KdpPrint(
IN ULONG ComponentId,
IN ULONG Level,
IN PCHAR Message,
IN USHORT Length,
IN KPROCESSOR_MODE PreviousMode,
IN PKTRAP_FRAME TrapFrame,
IN PKEXCEPTION_FRAME ExceptionFrame,
OUT PBOOLEAN Completion
);
BOOLEAN
KdpPrintString (
IN PSTRING Output
);
USHORT
KdpPrompt(
IN PCHAR Message,
IN USHORT MessageLength,
IN OUT PCHAR Reply,
IN USHORT ReplyLength,
IN KPROCESSOR_MODE PreviousMode,
IN PKTRAP_FRAME TrapFrame,
IN PKEXCEPTION_FRAME ExceptionFrame
);
BOOLEAN
KdpPromptString (
IN PSTRING Output,
IN OUT PSTRING Input
);
BOOLEAN
KdpReport(
IN PKTRAP_FRAME TrapFrame,
IN PKEXCEPTION_FRAME ExceptionFrame,
IN PEXCEPTION_RECORD ExceptionRecord,
IN PCONTEXT ContextRecord,
IN KPROCESSOR_MODE PreviousMode,
IN BOOLEAN SecondChance
);
VOID
KdpSymbol(
IN PSTRING String,
IN PKD_SYMBOLS_INFO Symbol,
IN BOOLEAN Unload,
IN KPROCESSOR_MODE PreviousMode,
IN PCONTEXT ContextRecord,
IN PKTRAP_FRAME TrapFrame,
IN PKEXCEPTION_FRAME ExceptionFrame
);
VOID
KdpCommandString(
IN PSTRING Name,
IN PSTRING Command,
IN KPROCESSOR_MODE PreviousMode,
IN PCONTEXT ContextRecord,
IN PKTRAP_FRAME TrapFrame,
IN PKEXCEPTION_FRAME ExceptionFrame
);
ULONG
KdpAddBreakpoint (
IN PVOID Address
);
BOOLEAN
KdpDeleteBreakpoint (
IN ULONG Handle
);
BOOLEAN
KdpDeleteBreakpointRange (
IN PVOID Lower,
IN PVOID Upper
);
#if defined(_IA64_)
BOOLEAN
KdpSuspendBreakpointRange (
IN PVOID Lower,
IN PVOID Upper
);
BOOLEAN
KdpRestoreBreakpointRange (
IN PVOID Lower,
IN PVOID Upper
);
#endif
#if i386
BOOLEAN
KdpCheckTracePoint(
IN PEXCEPTION_RECORD ExceptionRecord,
IN OUT PCONTEXT ContextRecord
);
NTSTATUS
KdGetTraceInformation (
OUT PVOID TraceInformation,
IN ULONG TraceInformationLength,
OUT PULONG RequiredLength
);
VOID
KdSetInternalBreakpoint (
IN PDBGKD_MANIPULATE_STATE64 m
);
#endif
NTSTATUS
KdQuerySpecialCalls (
IN PDBGKD_MANIPULATE_STATE64 m,
IN ULONG Length,
OUT PULONG RequiredLength
);
VOID
KdSetSpecialCall (
IN PDBGKD_MANIPULATE_STATE64 m,
IN PCONTEXT ContextRecord
);
VOID
KdClearSpecialCalls (
VOID
);
VOID
KdpQuickMoveMemory (
IN PCHAR Destination,
IN PCHAR Source,
IN ULONG Length
);
NTSTATUS
KdpCopyMemoryChunks(
ULONG64 Address,
PVOID Buffer,
ULONG TotalSize,
ULONG ChunkSize,
ULONG Flags,
PULONG ActualSize OPTIONAL
);
//
// KdpCopyMemoryChunks always copies between an untrusted address
// and a trusted buffer. The following two macros express a read
// form of this and a write form in a way similar to RtlCopyMemory
// for convenient replacement of RtlCopyMemory calls.
//
// Read memory from an untrusted pointer into a trusted buffer.
#define KdpCopyFromPtr(Dst, Src, Size, Done) \
KdpCopyMemoryChunks((ULONG_PTR)(Src), Dst, Size, 0, \
MMDBG_COPY_UNSAFE, Done)
// Write memory from a trusted buffer through an untrusted pointer.
#define KdpCopyToPtr(Dst, Src, Size, Done) \
KdpCopyMemoryChunks((ULONG_PTR)(Dst), Src, Size, 0, \
MMDBG_COPY_WRITE | MMDBG_COPY_UNSAFE, Done)
ULONG
KdpReceivePacket (
IN ULONG ExpectedPacketType,
OUT PSTRING MessageHeader,
OUT PSTRING MessageData,
OUT PULONG DataLength
);
NTSTATUS
KdpAllowDisable(
VOID
);
VOID
KdpSetContextState(
IN OUT PDBGKD_ANY_WAIT_STATE_CHANGE WaitStateChange,
IN PCONTEXT ContextRecord
);
VOID
KdpSetStateChange(
IN OUT PDBGKD_ANY_WAIT_STATE_CHANGE WaitStateChange,
IN PEXCEPTION_RECORD ExceptionRecord,
IN PCONTEXT ContextRecord,
IN BOOLEAN SecondChance
);
VOID
KdpGetStateChange(
IN PDBGKD_MANIPULATE_STATE64 ManipulateState,
IN PCONTEXT ContextRecord
);
VOID
KdpSendPacket (
IN ULONG PacketType,
IN PSTRING MessageHeader,
IN PSTRING MessageData OPTIONAL
);
BOOLEAN
KdpTrap (
IN PKTRAP_FRAME TrapFrame,
IN PKEXCEPTION_FRAME ExceptionFrame,
IN PEXCEPTION_RECORD ExceptionRecord64,
IN PCONTEXT ContextRecord,
IN KPROCESSOR_MODE PreviousMode,
IN BOOLEAN SecondChance
);
BOOLEAN
KdpSwitchProcessor (
IN PEXCEPTION_RECORD ExceptionRecord,
IN OUT PCONTEXT ContextRecord,
IN BOOLEAN SecondChance
);
BOOLEAN
KdpReportExceptionStateChange (
IN PEXCEPTION_RECORD ExceptionRecord,
IN OUT PCONTEXT ContextRecord,
IN BOOLEAN SecondChance
);
BOOLEAN
KdpReportLoadSymbolsStateChange (
IN PSTRING PathName,
IN PKD_SYMBOLS_INFO SymbolInfo,
IN BOOLEAN UnloadSymbols,
IN OUT PCONTEXT ContextRecord
);
VOID
KdpReportCommandStringStateChange (
IN PSTRING Name,
IN PSTRING Command,
IN OUT PCONTEXT ContextRecord
);
KCONTINUE_STATUS
KdpSendWaitContinue(
IN ULONG PacketType,
IN PSTRING MessageHeader,
IN PSTRING MessageData OPTIONAL,
IN OUT PCONTEXT ContextRecord
);
VOID
KdpReadVirtualMemory(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
#if 0
VOID
KdpReadVirtualMemory64(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
#endif
VOID
KdpWriteVirtualMemory(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
#if 0
VOID
KdpWriteVirtualMemory64(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
#endif
VOID
KdpReadPhysicalMemory(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpWritePhysicalMemory(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpCheckLowMemory(
IN PDBGKD_MANIPULATE_STATE64 m
);
VOID
KdpGetContext(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpSetContext(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpWriteBreakpoint(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpRestoreBreakpoint(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpReadControlSpace(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpWriteControlSpace(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpReadIoSpace(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpWriteIoSpace(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpReadIoSpaceExtended (
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpWriteIoSpaceExtended (
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpReadMachineSpecificRegister(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpWriteMachineSpecificRegister(
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpGetBusData (
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpSetBusData (
IN PDBGKD_MANIPULATE_STATE64 m,
IN PSTRING AdditionalData,
IN PCONTEXT Context
);
VOID
KdpSendTraceData(
PSTRING Data
);
VOID
KdpSuspendBreakpoint (
ULONG Handle
);
VOID
KdpSuspendAllBreakpoints (
VOID
);
VOID
KdpRestoreAllBreakpoints (
VOID
);
#if !defined(_TRUSTED_WINDOWS_)
VOID
KdpTimeSlipDpcRoutine (
PKDPC Dpc,
PVOID DeferredContext,
PVOID SystemArgument1,
PVOID SystemArgument2
);
VOID
KdpTimeSlipWork (
IN PVOID Context
);
#endif
//
// Routines shared between the debugger and
// NtSystemDebugControl.
//
VOID
KdpSysGetVersion(
PDBGKD_GET_VERSION64 Version
);
NTSTATUS
KdpSysReadControlSpace(
ULONG Processor,
ULONG64 Address,
PVOID Buffer,
ULONG Request,
PULONG Actual
);
NTSTATUS
KdpSysWriteControlSpace(
ULONG Processor,
ULONG64 Address,
PVOID Buffer,
ULONG Request,
PULONG Actual
);
NTSTATUS
KdpSysReadIoSpace(
INTERFACE_TYPE InterfaceType,
ULONG BusNumber,
ULONG AddressSpace,
ULONG64 Address,
PVOID Buffer,
ULONG Request,
PULONG Actual
);
NTSTATUS
KdpSysWriteIoSpace(
INTERFACE_TYPE InterfaceType,
ULONG BusNumber,
ULONG AddressSpace,
ULONG64 Address,
PVOID Buffer,
ULONG Request,
PULONG Actual
);
NTSTATUS
KdpSysReadMsr(
ULONG Msr,
PULONG64 Data
);
NTSTATUS
KdpSysWriteMsr(
ULONG Msr,
PULONG64 Data
);
NTSTATUS
KdpSysReadBusData(
BUS_DATA_TYPE BusDataType,
ULONG BusNumber,
ULONG SlotNumber,
ULONG Address,
PVOID Buffer,
ULONG Request,
PULONG Actual
);
NTSTATUS
KdpSysWriteBusData(
BUS_DATA_TYPE BusDataType,
ULONG BusNumber,
ULONG SlotNumber,
ULONG Address,
PVOID Buffer,
ULONG Request,
PULONG Actual
);
NTSTATUS
KdpSysCheckLowMemory(
ULONG MmFlags
);
//
// Define dummy prototype so the address of the standard breakpoint instruction
// can be captured.
//
// N.B. This function is NEVER called.
//
VOID
RtlpBreakWithStatusInstruction (
VOID
);
//
// Define external references.
//
#define KDP_MESSAGE_BUFFER_SIZE 4096
extern BREAKPOINT_ENTRY KdpBreakpointTable[BREAKPOINT_TABLE_SIZE];
extern KD_REMOTE_FILE KdpRemoteFiles[KD_MAX_REMOTE_FILES];
extern KSPIN_LOCK KdpDebuggerLock;
extern PKDEBUG_ROUTINE KiDebugRoutine;
extern PKDEBUG_SWITCH_ROUTINE KiDebugSwitchRoutine;
extern KDP_BREAKPOINT_TYPE KdpBreakpointInstruction;
extern UCHAR DECLSPEC_ALIGN(8) KdpMessageBuffer[KDP_MESSAGE_BUFFER_SIZE];
extern UCHAR KdpPathBuffer[KDP_MESSAGE_BUFFER_SIZE];
extern BOOLEAN KdpOweBreakpoint;
extern LARGE_INTEGER KdPerformanceCounterRate;
extern LARGE_INTEGER KdTimerStart;
extern LARGE_INTEGER KdTimerStop;
extern LARGE_INTEGER KdTimerDifference;
extern ULONG KdComponentTableSize;
extern PULONG KdComponentTable[];
extern BOOLEAN BreakpointsSuspended;
extern LIST_ENTRY KdpDebuggerDataListHead;
typedef struct {
ULONG64 Addr; // pc address of breakpoint
ULONG Flags; // Flags bits
ULONG Calls; // # of times traced routine called
ULONG CallsLastCheck; // # of calls at last periodic (1s) check
ULONG MaxCallsPerPeriod;
ULONG MinInstructions; // largest number of instructions for 1 call
ULONG MaxInstructions; // smallest # of instructions for 1 call
ULONG TotalInstructions; // total instructions for all calls
ULONG Handle; // handle in (regular) bpt table
PVOID Thread; // Thread that's skipping this BP
ULONG64 ReturnAddress; // return address (if not COUNTONLY)
} DBGKD_INTERNAL_BREAKPOINT, *PDBGKD_INTERNAL_BREAKPOINT;
extern DBGKD_INTERNAL_BREAKPOINT KdpInternalBPs[DBGKD_MAX_INTERNAL_BREAKPOINTS];
extern ULONG_PTR KdpCurrentSymbolStart;
extern ULONG_PTR KdpCurrentSymbolEnd;
extern LONG KdpNextCallLevelChange;
extern ULONG_PTR KdSpecialCalls[];
extern ULONG KdNumberOfSpecialCalls;
extern ULONG_PTR InitialSP;
extern ULONG KdpNumInternalBreakpoints;
extern KTIMER InternalBreakpointTimer;
extern KDPC InternalBreakpointCheckDpc;
extern BOOLEAN KdpPortLocked;
extern LARGE_INTEGER KdpTimeEntered;
extern DBGKD_TRACE_DATA TraceDataBuffer[];
extern ULONG TraceDataBufferPosition;
extern TRACE_DATA_SYM TraceDataSyms[];
extern UCHAR NextTraceDataSym;
extern UCHAR NumTraceDataSyms;
extern ULONG IntBPsSkipping;
extern BOOLEAN WatchStepOver;
extern BOOLEAN BreakPointTimerStarted;
extern PVOID WSOThread;
extern ULONG_PTR WSOEsp;
extern ULONG WatchStepOverHandle;
extern ULONG_PTR WatchStepOverBreakAddr;
extern BOOLEAN WatchStepOverSuspended;
extern ULONG InstructionsTraced;
extern BOOLEAN SymbolRecorded;
extern LONG CallLevelChange;
extern LONG_PTR oldpc;
extern BOOLEAN InstrCountInternal;
extern BOOLEAN BreakpointsSuspended;
extern BOOLEAN KdpControlCPressed;
extern KD_CONTEXT KdpContext;
extern KDP_BREAKPOINT_TYPE KdpBreakpointInstruction;
extern UCHAR KdPrintDefaultCircularBuffer[KDPRINTDEFAULTBUFFERSIZE];
extern PUCHAR KdPrintCircularBuffer;
extern PUCHAR KdPrintWritePointer;
extern ULONG KdPrintRolloverCount;
extern ULONG KdPrintBufferChanges;
extern KSPIN_LOCK KdpPrintSpinLock;
extern KSPIN_LOCK KdpDataSpinLock;
extern LIST_ENTRY KdpDebuggerDataListHead;
extern DBGKD_GET_VERSION64 KdVersionBlock;
extern KDDEBUGGER_DATA64 KdDebuggerDataBlock;
extern KDPC KdpTimeSlipDpc;
extern WORK_QUEUE_ITEM KdpTimeSlipWorkItem;
extern KTIMER KdpTimeSlipTimer;
extern ULONG KdpTimeSlipPending;
extern KSPIN_LOCK KdpTimeSlipEventLock;
extern PVOID KdpTimeSlipEvent;
extern BOOLEAN KdpDebuggerStructuresInitialized;
extern ULONG KdEnteredDebugger;
extern BOOLEAN KdPreviouslyEnabled;
//
// !search support (page hit database)
//
//
// Hit database where search results are stored (kddata.c).
// The debugger extensions know how to extract the information
// from here.
//
// Note that the size of the hit database is large enough to
// accomodate any searches because the !search extension works
// in batches of pages < PAGE_SIZE and for every page we register only
// one hit.
//
#define SEARCH_PAGE_HIT_DATABASE_SIZE PAGE_SIZE
extern PFN_NUMBER KdpSearchPageHits[SEARCH_PAGE_HIT_DATABASE_SIZE];
extern ULONG KdpSearchPageHitOffsets[SEARCH_PAGE_HIT_DATABASE_SIZE];
extern ULONG KdpSearchPageHitIndex;
//
// Set to true while a physical memory search is in progress.
// Reset at the end of the search. This is done in the debugger
// extension and it is a flag used by KdpCheckLowMemory to get
// onto a different code path.
//
extern LOGICAL KdpSearchInProgress;
//
// These variables store the current state of the search operation.
// They can be used to restore an interrupted search.
//
extern PFN_NUMBER KdpSearchStartPageFrame;
extern PFN_NUMBER KdpSearchEndPageFrame;
extern ULONG_PTR KdpSearchAddressRangeStart;
extern ULONG_PTR KdpSearchAddressRangeEnd;
extern PFN_NUMBER KdpSearchPfnValue;
//
// Checkpoint variable used to test if we have the right
// debugging symbols.
//
#define KDP_SEARCH_SYMBOL_CHECK 0xABCDDCBA
extern ULONG KdpSearchCheckPoint;
//
// Page search flags
//
#define KDP_SEARCH_ALL_OFFSETS_IN_PAGE 0x0001
//
// Private procedure prototypes
//
BOOLEAN
KdpAcquireBreakpoint(
IN ULONG Number
);
VOID
KdpInitCom(
VOID
);
VOID
KdpPortLock(
VOID
);
VOID
KdpPortUnlock(
VOID
);
BOOLEAN
KdpPollBreakInWithPortLock(
VOID
);
USHORT
KdpReceivePacketLeader (
IN ULONG PacketType,
OUT PULONG PacketLeader
);
#if DBG
#include <stdio.h>
#define DPRINT(s) KdpDprintf s
VOID
KdpDprintf(
IN PCHAR f,
...
);
#else
#define DPRINT(s)
#endif