Changeset 744 in vbox
- Timestamp:
- Feb 7, 2007 11:17:44 AM (18 years ago)
- svn:sync-xref-src-repo-rev:
- 18396
- Location:
- trunk/src/VBox/VMM/PATM
- Files:
-
- 2 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/VBox/VMM/PATM/PATMA.asm
r743 r744 1684 1684 push eax 1685 1685 push ecx 1686 push edx 1687 lea edx, [esp + 12 - 4] ; stack address to store return address 1686 1688 lock or dword [ss:PATM_PENDINGACTION], PATM_ACTION_LOG_CALL 1687 1689 mov eax, PATM_ACTION_LOG_CALL 1688 1690 mov ecx, PATM_ACTION_MAGIC 1689 1691 db 0fh, 0bh ; illegal instr (hardcoded assumption in PATMHandleIllegalInstrTrap) 1692 pop edx 1690 1693 pop ecx 1691 1694 pop eax … … 2131 2134 %ifdef PATM_LOG_PATCHINSTR 2132 2135 push eax 2136 push ebx 2133 2137 push ecx 2134 2138 push edx 2135 2139 mov edx, eax ; return address 2140 lea ebx, [esp+16+12+16] ; stack address containing the return address 2136 2141 lock or dword [ss:PATM_PENDINGACTION], PATM_ACTION_LOG_RET 2137 2142 mov eax, PATM_ACTION_LOG_RET … … 2140 2145 pop edx 2141 2146 pop ecx 2147 pop ebx 2142 2148 pop eax 2143 2149 %endif … … 2190 2196 %ifdef PATM_LOG_PATCHINSTR 2191 2197 push eax 2198 push ebx 2192 2199 push ecx 2193 2200 push edx 2194 2201 mov edx, eax ; return address 2202 lea ebx, [esp+16+12+16] ; stack address containing the return address 2195 2203 lock or dword [ss:PATM_PENDINGACTION], PATM_ACTION_LOG_RET 2196 2204 mov eax, PATM_ACTION_LOG_RET … … 2199 2207 pop edx 2200 2208 pop ecx 2209 pop ebx 2201 2210 pop eax 2202 2211 %endif -
trunk/src/VBox/VMM/PATM/VMMAll/PATMAll.cpp
r741 r744 637 637 638 638 case PATM_ACTION_LOG_RET: 639 Log(("PATMGC: RET to %VGv iopl=%d\n", pRegFrame->edx, X86_EFL_GET_IOPL(pVM->patm.s.CTXSUFF(pGCState)->uVMFlags)));639 Log(("PATMGC: RET to %VGv ESP=%VGv iopl=%d\n", pRegFrame->edx, pRegFrame->ebx, X86_EFL_GET_IOPL(pVM->patm.s.CTXSUFF(pGCState)->uVMFlags))); 640 640 pRegFrame->eip += PATM_ILLEGAL_INSTR_SIZE; 641 641 return VINF_SUCCESS; 642 642 643 643 case PATM_ACTION_LOG_CALL: 644 Log(("PATMGC: CALL to %VGv return addr %VGv iopl=%d\n", pVM->patm.s.CTXSUFF(pGCState)->GCCallPatchTargetAddr, pVM->patm.s.CTXSUFF(pGCState)->GCCallReturnAddr, X86_EFL_GET_IOPL(pVM->patm.s.CTXSUFF(pGCState)->uVMFlags)));644 Log(("PATMGC: CALL to %VGv return addr %VGv ESP=%VGv iopl=%d\n", pVM->patm.s.CTXSUFF(pGCState)->GCCallPatchTargetAddr, pVM->patm.s.CTXSUFF(pGCState)->GCCallReturnAddr, pRegFrame->edx, X86_EFL_GET_IOPL(pVM->patm.s.CTXSUFF(pGCState)->uVMFlags))); 645 645 pRegFrame->eip += PATM_ILLEGAL_INSTR_SIZE; 646 646 return VINF_SUCCESS;
Note:
See TracChangeset
for help on using the changeset viewer.