mirror of https://github.com/acidanthera/audk.git
4565 lines
96 KiB
C
4565 lines
96 KiB
C
/*++
|
|
|
|
Copyright (c) 2006, Intel Corporation
|
|
All rights reserved. This program and the accompanying materials
|
|
are licensed and made available under the terms and conditions of the BSD License
|
|
which accompanies this distribution. The full text of the license may be found at
|
|
http://opensource.org/licenses/bsd-license.php
|
|
|
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
|
|
Module Name:
|
|
|
|
EbcExecute.c
|
|
|
|
Abstract:
|
|
|
|
Contains code that implements the virtual machine.
|
|
|
|
--*/
|
|
|
|
#include "EbcInt.h"
|
|
#include "EbcExecute.h"
|
|
|
|
|
|
//
|
|
// Define some useful data size constants to allow switch statements based on
|
|
// size of operands or data.
|
|
//
|
|
#define DATA_SIZE_INVALID 0
|
|
#define DATA_SIZE_8 1
|
|
#define DATA_SIZE_16 2
|
|
#define DATA_SIZE_32 4
|
|
#define DATA_SIZE_64 8
|
|
#define DATA_SIZE_N 48 // 4 or 8
|
|
//
|
|
// Structure we'll use to dispatch opcodes to execute functions.
|
|
//
|
|
typedef struct {
|
|
EFI_STATUS (*ExecuteFunction) (IN VM_CONTEXT * VmPtr);
|
|
}
|
|
VM_TABLE_ENTRY;
|
|
|
|
typedef
|
|
UINT64
|
|
(*DATA_MANIP_EXEC_FUNCTION) (
|
|
IN VM_CONTEXT * VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
INT16
|
|
VmReadIndex16 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 CodeOffset
|
|
);
|
|
|
|
STATIC
|
|
INT32
|
|
VmReadIndex32 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 CodeOffset
|
|
);
|
|
|
|
STATIC
|
|
INT64
|
|
VmReadIndex64 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 CodeOffset
|
|
);
|
|
|
|
STATIC
|
|
UINT8
|
|
VmReadMem8 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr
|
|
);
|
|
|
|
STATIC
|
|
UINT16
|
|
VmReadMem16 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr
|
|
);
|
|
|
|
STATIC
|
|
UINT32
|
|
VmReadMem32 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
VmReadMem64 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr
|
|
);
|
|
|
|
STATIC
|
|
UINTN
|
|
VmReadMemN (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
VmWriteMem8 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
UINTN Addr,
|
|
IN UINT8 Data
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
VmWriteMem16 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
UINTN Addr,
|
|
IN UINT16 Data
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
VmWriteMem32 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
UINTN Addr,
|
|
IN UINT32 Data
|
|
);
|
|
|
|
STATIC
|
|
UINT16
|
|
VmReadCode16 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 Offset
|
|
);
|
|
|
|
STATIC
|
|
UINT32
|
|
VmReadCode32 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 Offset
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
VmReadCode64 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 Offset
|
|
);
|
|
|
|
STATIC
|
|
INT8
|
|
VmReadImmed8 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 Offset
|
|
);
|
|
|
|
STATIC
|
|
INT16
|
|
VmReadImmed16 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 Offset
|
|
);
|
|
|
|
STATIC
|
|
INT32
|
|
VmReadImmed32 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 Offset
|
|
);
|
|
|
|
STATIC
|
|
INT64
|
|
VmReadImmed64 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 Offset
|
|
);
|
|
|
|
STATIC
|
|
UINTN
|
|
ConvertStackAddr (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteDataManip (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN BOOLEAN IsSignedOperation
|
|
);
|
|
|
|
//
|
|
// Functions that execute VM opcodes
|
|
//
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteBREAK (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteJMP (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteJMP8 (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteCALL (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteRET (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteCMP (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteCMPI (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteMOVxx (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteMOVI (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteMOVIn (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteMOVREL (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecutePUSHn (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecutePUSH (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecutePOPn (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecutePOP (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteSignedDataManip (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteUnsignedDataManip (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteLOADSP (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteSTORESP (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteMOVsnd (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteMOVsnw (
|
|
IN VM_CONTEXT *VmPtr
|
|
);
|
|
|
|
//
|
|
// Data manipulation subfunctions
|
|
//
|
|
STATIC
|
|
UINT64
|
|
ExecuteNOT (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteNEG (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteADD (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteSUB (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteMUL (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteMULU (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteDIV (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteDIVU (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteMOD (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteMODU (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteAND (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteOR (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteXOR (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteSHL (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteSHR (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteASHR (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteEXTNDB (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteEXTNDW (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteEXTNDD (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
);
|
|
|
|
//
|
|
// Once we retrieve the operands for the data manipulation instructions,
|
|
// call these functions to perform the operation.
|
|
//
|
|
static CONST DATA_MANIP_EXEC_FUNCTION mDataManipDispatchTable[] = {
|
|
ExecuteNOT,
|
|
ExecuteNEG,
|
|
ExecuteADD,
|
|
ExecuteSUB,
|
|
ExecuteMUL,
|
|
ExecuteMULU,
|
|
ExecuteDIV,
|
|
ExecuteDIVU,
|
|
ExecuteMOD,
|
|
ExecuteMODU,
|
|
ExecuteAND,
|
|
ExecuteOR,
|
|
ExecuteXOR,
|
|
ExecuteSHL,
|
|
ExecuteSHR,
|
|
ExecuteASHR,
|
|
ExecuteEXTNDB,
|
|
ExecuteEXTNDW,
|
|
ExecuteEXTNDD,
|
|
};
|
|
|
|
static CONST VM_TABLE_ENTRY mVmOpcodeTable[] = {
|
|
{ ExecuteBREAK }, // opcode 0x00
|
|
{ ExecuteJMP }, // opcode 0x01
|
|
{ ExecuteJMP8 }, // opcode 0x02
|
|
{ ExecuteCALL }, // opcode 0x03
|
|
{ ExecuteRET }, // opcode 0x04
|
|
{ ExecuteCMP }, // opcode 0x05 CMPeq
|
|
{ ExecuteCMP }, // opcode 0x06 CMPlte
|
|
{ ExecuteCMP }, // opcode 0x07 CMPgte
|
|
{ ExecuteCMP }, // opcode 0x08 CMPulte
|
|
{ ExecuteCMP }, // opcode 0x09 CMPugte
|
|
{ ExecuteUnsignedDataManip }, // opcode 0x0A NOT
|
|
{ ExecuteSignedDataManip }, // opcode 0x0B NEG
|
|
{ ExecuteSignedDataManip }, // opcode 0x0C ADD
|
|
{ ExecuteSignedDataManip }, // opcode 0x0D SUB
|
|
{ ExecuteSignedDataManip }, // opcode 0x0E MUL
|
|
{ ExecuteUnsignedDataManip }, // opcode 0x0F MULU
|
|
{ ExecuteSignedDataManip }, // opcode 0x10 DIV
|
|
{ ExecuteUnsignedDataManip }, // opcode 0x11 DIVU
|
|
{ ExecuteSignedDataManip }, // opcode 0x12 MOD
|
|
{ ExecuteUnsignedDataManip }, // opcode 0x13 MODU
|
|
{ ExecuteUnsignedDataManip }, // opcode 0x14 AND
|
|
{ ExecuteUnsignedDataManip }, // opcode 0x15 OR
|
|
{ ExecuteUnsignedDataManip }, // opcode 0x16 XOR
|
|
{ ExecuteUnsignedDataManip }, // opcode 0x17 SHL
|
|
{ ExecuteUnsignedDataManip }, // opcode 0x18 SHR
|
|
{ ExecuteSignedDataManip }, // opcode 0x19 ASHR
|
|
{ ExecuteUnsignedDataManip }, // opcode 0x1A EXTNDB
|
|
{ ExecuteUnsignedDataManip }, // opcode 0x1B EXTNDW
|
|
{ ExecuteUnsignedDataManip }, // opcode 0x1C EXTNDD
|
|
{ ExecuteMOVxx }, // opcode 0x1D MOVBW
|
|
{ ExecuteMOVxx }, // opcode 0x1E MOVWW
|
|
{ ExecuteMOVxx }, // opcode 0x1F MOVDW
|
|
{ ExecuteMOVxx }, // opcode 0x20 MOVQW
|
|
{ ExecuteMOVxx }, // opcode 0x21 MOVBD
|
|
{ ExecuteMOVxx }, // opcode 0x22 MOVWD
|
|
{ ExecuteMOVxx }, // opcode 0x23 MOVDD
|
|
{ ExecuteMOVxx }, // opcode 0x24 MOVQD
|
|
{ ExecuteMOVsnw }, // opcode 0x25 MOVsnw
|
|
{ ExecuteMOVsnd }, // opcode 0x26 MOVsnd
|
|
{ NULL }, // opcode 0x27
|
|
{ ExecuteMOVxx }, // opcode 0x28 MOVqq
|
|
{ ExecuteLOADSP }, // opcode 0x29 LOADSP SP1, R2
|
|
{ ExecuteSTORESP }, // opcode 0x2A STORESP R1, SP2
|
|
{ ExecutePUSH }, // opcode 0x2B PUSH {@}R1 [imm16]
|
|
{ ExecutePOP }, // opcode 0x2C POP {@}R1 [imm16]
|
|
{ ExecuteCMPI }, // opcode 0x2D CMPIEQ
|
|
{ ExecuteCMPI }, // opcode 0x2E CMPILTE
|
|
{ ExecuteCMPI }, // opcode 0x2F CMPIGTE
|
|
{ ExecuteCMPI }, // opcode 0x30 CMPIULTE
|
|
{ ExecuteCMPI }, // opcode 0x31 CMPIUGTE
|
|
{ ExecuteMOVxx }, // opcode 0x32 MOVN
|
|
{ ExecuteMOVxx }, // opcode 0x33 MOVND
|
|
{ NULL }, // opcode 0x34
|
|
{ ExecutePUSHn }, // opcode 0x35
|
|
{ ExecutePOPn }, // opcode 0x36
|
|
{ ExecuteMOVI }, // opcode 0x37 - mov immediate data
|
|
{ ExecuteMOVIn }, // opcode 0x38 - mov immediate natural
|
|
{ ExecuteMOVREL } // opcode 0x39 - move data relative to PC
|
|
};
|
|
|
|
//
|
|
// Length of JMP instructions, depending on upper two bits of opcode.
|
|
//
|
|
static CONST UINT8 mJMPLen[] = { 2, 2, 6, 10 };
|
|
|
|
//
|
|
// Simple Debugger Protocol GUID
|
|
//
|
|
EFI_GUID mEbcSimpleDebuggerProtocolGuid = EFI_EBC_SIMPLE_DEBUGGER_PROTOCOL_GUID;
|
|
|
|
EFI_STATUS
|
|
EbcExecuteInstructions (
|
|
IN EFI_EBC_VM_TEST_PROTOCOL *This,
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN OUT UINTN *InstructionCount
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Given a pointer to a new VM context, execute one or more instructions. This
|
|
function is only used for test purposes via the EBC VM test protocol.
|
|
|
|
Arguments:
|
|
|
|
This - pointer to protocol interface
|
|
VmPtr - pointer to a VM context
|
|
InstructionCount - how many instructions to execute. 0 if don't count.
|
|
|
|
Returns:
|
|
|
|
EFI_UNSUPPORTED
|
|
EFI_SUCCESS
|
|
|
|
--*/
|
|
{
|
|
UINTN ExecFunc;
|
|
EFI_STATUS Status;
|
|
UINTN InstructionsLeft;
|
|
UINTN SavedInstructionCount;
|
|
|
|
Status = EFI_SUCCESS;
|
|
|
|
if (*InstructionCount == 0) {
|
|
InstructionsLeft = 1;
|
|
} else {
|
|
InstructionsLeft = *InstructionCount;
|
|
}
|
|
|
|
SavedInstructionCount = *InstructionCount;
|
|
*InstructionCount = 0;
|
|
|
|
//
|
|
// Index into the opcode table using the opcode byte for this instruction.
|
|
// This gives you the execute function, which we first test for null, then
|
|
// call it if it's not null.
|
|
//
|
|
while (InstructionsLeft != 0) {
|
|
ExecFunc = (UINTN) mVmOpcodeTable[(*VmPtr->Ip & 0x3F)].ExecuteFunction;
|
|
if (ExecFunc == (UINTN) NULL) {
|
|
EbcDebugSignalException (EXCEPT_EBC_INVALID_OPCODE, EXCEPTION_FLAG_FATAL, VmPtr);
|
|
return EFI_UNSUPPORTED;
|
|
} else {
|
|
mVmOpcodeTable[(*VmPtr->Ip & 0x3F)].ExecuteFunction (VmPtr);
|
|
*InstructionCount = *InstructionCount + 1;
|
|
}
|
|
|
|
//
|
|
// Decrement counter if applicable
|
|
//
|
|
if (SavedInstructionCount != 0) {
|
|
InstructionsLeft--;
|
|
}
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
EFI_STATUS
|
|
EbcExecute (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Execute an EBC image from an entry point or from a published protocol.
|
|
|
|
Arguments:
|
|
|
|
VmPtr - pointer to prepared VM context.
|
|
|
|
Returns:
|
|
|
|
Standard EBC status.
|
|
|
|
--*/
|
|
{
|
|
UINTN ExecFunc;
|
|
UINT8 StackCorrupted;
|
|
EFI_STATUS Status;
|
|
EFI_EBC_SIMPLE_DEBUGGER_PROTOCOL *EbcSimpleDebugger;
|
|
|
|
mVmPtr = VmPtr;
|
|
EbcSimpleDebugger = NULL;
|
|
Status = EFI_SUCCESS;
|
|
StackCorrupted = 0;
|
|
|
|
//
|
|
// Make sure the magic value has been put on the stack before we got here.
|
|
//
|
|
if (*VmPtr->StackMagicPtr != (UINTN) VM_STACK_KEY_VALUE) {
|
|
StackCorrupted = 1;
|
|
}
|
|
|
|
VmPtr->FramePtr = (VOID *) ((UINT8 *) (UINTN) VmPtr->R[0] + 8);
|
|
|
|
//
|
|
// Try to get the debug support for EBC
|
|
//
|
|
DEBUG_CODE_BEGIN ();
|
|
Status = gBS->LocateProtocol (
|
|
&mEbcSimpleDebuggerProtocolGuid,
|
|
NULL,
|
|
(VOID **) &EbcSimpleDebugger
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
EbcSimpleDebugger = NULL;
|
|
}
|
|
DEBUG_CODE_END ();
|
|
|
|
//
|
|
// Save the start IP for debug. For example, if we take an exception we
|
|
// can print out the location of the exception relative to the entry point,
|
|
// which could then be used in a disassembly listing to find the problem.
|
|
//
|
|
VmPtr->EntryPoint = (VOID *) VmPtr->Ip;
|
|
|
|
//
|
|
// We'll wait for this flag to know when we're done. The RET
|
|
// instruction sets it if it runs out of stack.
|
|
//
|
|
VmPtr->StopFlags = 0;
|
|
while (!(VmPtr->StopFlags & STOPFLAG_APP_DONE)) {
|
|
//
|
|
// If we've found a simple debugger protocol, call it
|
|
//
|
|
DEBUG_CODE_BEGIN ();
|
|
if (EbcSimpleDebugger != NULL) {
|
|
EbcSimpleDebugger->Debugger (EbcSimpleDebugger, VmPtr);
|
|
}
|
|
DEBUG_CODE_END ();
|
|
|
|
//
|
|
// Verify the opcode is in range. Otherwise generate an exception.
|
|
//
|
|
if ((*VmPtr->Ip & OPCODE_M_OPCODE) >= (sizeof (mVmOpcodeTable) / sizeof (mVmOpcodeTable[0]))) {
|
|
EbcDebugSignalException (EXCEPT_EBC_INVALID_OPCODE, EXCEPTION_FLAG_FATAL, VmPtr);
|
|
Status = EFI_UNSUPPORTED;
|
|
goto Done;
|
|
}
|
|
//
|
|
// Use the opcode bits to index into the opcode dispatch table. If the
|
|
// function pointer is null then generate an exception.
|
|
//
|
|
ExecFunc = (UINTN) mVmOpcodeTable[(*VmPtr->Ip & OPCODE_M_OPCODE)].ExecuteFunction;
|
|
if (ExecFunc == (UINTN) NULL) {
|
|
EbcDebugSignalException (EXCEPT_EBC_INVALID_OPCODE, EXCEPTION_FLAG_FATAL, VmPtr);
|
|
Status = EFI_UNSUPPORTED;
|
|
goto Done;
|
|
}
|
|
//
|
|
// The EBC VM is a strongly ordered processor, so perform a fence operation before
|
|
// and after each instruction is executed.
|
|
//
|
|
MemoryFence ();
|
|
|
|
mVmOpcodeTable[(*VmPtr->Ip & OPCODE_M_OPCODE)].ExecuteFunction (VmPtr);
|
|
|
|
MemoryFence ();
|
|
|
|
//
|
|
// If the step flag is set, signal an exception and continue. We don't
|
|
// clear it here. Assuming the debugger is responsible for clearing it.
|
|
//
|
|
if (VMFLAG_ISSET (VmPtr, VMFLAGS_STEP)) {
|
|
EbcDebugSignalException (EXCEPT_EBC_STEP, EXCEPTION_FLAG_NONE, VmPtr);
|
|
}
|
|
//
|
|
// Make sure stack has not been corrupted. Only report it once though.
|
|
//
|
|
if (!StackCorrupted && (*VmPtr->StackMagicPtr != (UINTN) VM_STACK_KEY_VALUE)) {
|
|
EbcDebugSignalException (EXCEPT_EBC_STACK_FAULT, EXCEPTION_FLAG_FATAL, VmPtr);
|
|
StackCorrupted = 1;
|
|
}
|
|
if (!StackCorrupted && ((UINT64)VmPtr->R[0] <= (UINT64)(UINTN) VmPtr->StackTop)) {
|
|
EbcDebugSignalException (EXCEPT_EBC_STACK_FAULT, EXCEPTION_FLAG_FATAL, VmPtr);
|
|
StackCorrupted = 1;
|
|
}
|
|
}
|
|
|
|
Done:
|
|
mVmPtr = NULL;
|
|
|
|
return Status;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteMOVxx (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Execute the MOVxx instructions.
|
|
|
|
Arguments:
|
|
|
|
VmPtr - pointer to a VM context.
|
|
|
|
Returns:
|
|
|
|
EFI_UNSUPPORTED
|
|
EFI_SUCCESS
|
|
|
|
Instruction format:
|
|
|
|
MOV[b|w|d|q|n]{w|d} {@}R1 {Index16|32}, {@}R2 {Index16|32}
|
|
MOVqq {@}R1 {Index64}, {@}R2 {Index64}
|
|
|
|
Copies contents of [R2] -> [R1], zero extending where required.
|
|
|
|
First character indicates the size of the move.
|
|
Second character indicates the size of the index(s).
|
|
|
|
Invalid to have R1 direct with index.
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 OpcMasked;
|
|
UINT8 Operands;
|
|
UINT8 Size;
|
|
UINT8 MoveSize;
|
|
INT16 Index16;
|
|
INT32 Index32;
|
|
INT64 Index64Op1;
|
|
INT64 Index64Op2;
|
|
UINT64 Data64;
|
|
UINT64 DataMask;
|
|
UINTN Source;
|
|
|
|
Opcode = GETOPCODE (VmPtr);
|
|
OpcMasked = (UINT8) (Opcode & OPCODE_M_OPCODE);
|
|
|
|
//
|
|
// Get the operands byte so we can get R1 and R2
|
|
//
|
|
Operands = GETOPERANDS (VmPtr);
|
|
|
|
//
|
|
// Assume no indexes
|
|
//
|
|
Index64Op1 = 0;
|
|
Index64Op2 = 0;
|
|
Data64 = 0;
|
|
|
|
//
|
|
// Determine if we have an index/immediate data. Base instruction size
|
|
// is 2 (opcode + operands). Add to this size each index specified.
|
|
//
|
|
Size = 2;
|
|
if (Opcode & (OPCODE_M_IMMED_OP1 | OPCODE_M_IMMED_OP2)) {
|
|
//
|
|
// Determine size of the index from the opcode. Then get it.
|
|
//
|
|
if ((OpcMasked <= OPCODE_MOVQW) || (OpcMasked == OPCODE_MOVNW)) {
|
|
//
|
|
// MOVBW, MOVWW, MOVDW, MOVQW, and MOVNW have 16-bit immediate index.
|
|
// Get one or both index values.
|
|
//
|
|
if (Opcode & OPCODE_M_IMMED_OP1) {
|
|
Index16 = VmReadIndex16 (VmPtr, 2);
|
|
Index64Op1 = (INT64) Index16;
|
|
Size += sizeof (UINT16);
|
|
}
|
|
|
|
if (Opcode & OPCODE_M_IMMED_OP2) {
|
|
Index16 = VmReadIndex16 (VmPtr, Size);
|
|
Index64Op2 = (INT64) Index16;
|
|
Size += sizeof (UINT16);
|
|
}
|
|
} else if ((OpcMasked <= OPCODE_MOVQD) || (OpcMasked == OPCODE_MOVND)) {
|
|
//
|
|
// MOVBD, MOVWD, MOVDD, MOVQD, and MOVND have 32-bit immediate index
|
|
//
|
|
if (Opcode & OPCODE_M_IMMED_OP1) {
|
|
Index32 = VmReadIndex32 (VmPtr, 2);
|
|
Index64Op1 = (INT64) Index32;
|
|
Size += sizeof (UINT32);
|
|
}
|
|
|
|
if (Opcode & OPCODE_M_IMMED_OP2) {
|
|
Index32 = VmReadIndex32 (VmPtr, Size);
|
|
Index64Op2 = (INT64) Index32;
|
|
Size += sizeof (UINT32);
|
|
}
|
|
} else if (OpcMasked == OPCODE_MOVQQ) {
|
|
//
|
|
// MOVqq -- only form with a 64-bit index
|
|
//
|
|
if (Opcode & OPCODE_M_IMMED_OP1) {
|
|
Index64Op1 = VmReadIndex64 (VmPtr, 2);
|
|
Size += sizeof (UINT64);
|
|
}
|
|
|
|
if (Opcode & OPCODE_M_IMMED_OP2) {
|
|
Index64Op2 = VmReadIndex64 (VmPtr, Size);
|
|
Size += sizeof (UINT64);
|
|
}
|
|
} else {
|
|
//
|
|
// Obsolete MOVBQ, MOVWQ, MOVDQ, and MOVNQ have 64-bit immediate index
|
|
//
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INSTRUCTION_ENCODING,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
}
|
|
//
|
|
// Determine the size of the move, and create a mask for it so we can
|
|
// clear unused bits.
|
|
//
|
|
if ((OpcMasked == OPCODE_MOVBW) || (OpcMasked == OPCODE_MOVBD)) {
|
|
MoveSize = DATA_SIZE_8;
|
|
DataMask = 0xFF;
|
|
} else if ((OpcMasked == OPCODE_MOVWW) || (OpcMasked == OPCODE_MOVWD)) {
|
|
MoveSize = DATA_SIZE_16;
|
|
DataMask = 0xFFFF;
|
|
} else if ((OpcMasked == OPCODE_MOVDW) || (OpcMasked == OPCODE_MOVDD)) {
|
|
MoveSize = DATA_SIZE_32;
|
|
DataMask = 0xFFFFFFFF;
|
|
} else if ((OpcMasked == OPCODE_MOVQW) || (OpcMasked == OPCODE_MOVQD) || (OpcMasked == OPCODE_MOVQQ)) {
|
|
MoveSize = DATA_SIZE_64;
|
|
DataMask = (UINT64)~0;
|
|
} else if ((OpcMasked == OPCODE_MOVNW) || (OpcMasked == OPCODE_MOVND)) {
|
|
MoveSize = DATA_SIZE_N;
|
|
DataMask = (UINT64)~0 >> (64 - 8 * sizeof (UINTN));
|
|
} else {
|
|
//
|
|
// We were dispatched to this function and we don't recognize the opcode
|
|
//
|
|
EbcDebugSignalException (EXCEPT_EBC_UNDEFINED, EXCEPTION_FLAG_FATAL, VmPtr);
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
//
|
|
// Now get the source address
|
|
//
|
|
if (OPERAND2_INDIRECT (Operands)) {
|
|
//
|
|
// Indirect form @R2. Compute address of operand2
|
|
//
|
|
Source = (UINTN) (VmPtr->R[OPERAND2_REGNUM (Operands)] + Index64Op2);
|
|
//
|
|
// Now get the data from the source. Always 0-extend and let the compiler
|
|
// sign-extend where required.
|
|
//
|
|
switch (MoveSize) {
|
|
case DATA_SIZE_8:
|
|
Data64 = (UINT64) (UINT8) VmReadMem8 (VmPtr, Source);
|
|
break;
|
|
|
|
case DATA_SIZE_16:
|
|
Data64 = (UINT64) (UINT16) VmReadMem16 (VmPtr, Source);
|
|
break;
|
|
|
|
case DATA_SIZE_32:
|
|
Data64 = (UINT64) (UINT32) VmReadMem32 (VmPtr, Source);
|
|
break;
|
|
|
|
case DATA_SIZE_64:
|
|
Data64 = (UINT64) VmReadMem64 (VmPtr, Source);
|
|
break;
|
|
|
|
case DATA_SIZE_N:
|
|
Data64 = (UINT64) (UINTN) VmReadMemN (VmPtr, Source);
|
|
break;
|
|
|
|
default:
|
|
//
|
|
// not reached
|
|
//
|
|
break;
|
|
}
|
|
} else {
|
|
//
|
|
// Not indirect source: MOVxx {@}Rx, Ry [Index]
|
|
//
|
|
Data64 = VmPtr->R[OPERAND2_REGNUM (Operands)] + Index64Op2;
|
|
//
|
|
// Did Operand2 have an index? If so, treat as two signed values since
|
|
// indexes are signed values.
|
|
//
|
|
if (Opcode & OPCODE_M_IMMED_OP2) {
|
|
//
|
|
// NOTE: need to find a way to fix this, most likely by changing the VM
|
|
// implementation to remove the stack gap. To do that, we'd need to
|
|
// allocate stack space for the VM and actually set the system
|
|
// stack pointer to the allocated buffer when the VM starts.
|
|
//
|
|
// Special case -- if someone took the address of a function parameter
|
|
// then we need to make sure it's not in the stack gap. We can identify
|
|
// this situation if (Operand2 register == 0) && (Operand2 is direct)
|
|
// && (Index applies to Operand2) && (Index > 0) && (Operand1 register != 0)
|
|
// Situations that to be aware of:
|
|
// * stack adjustments at beginning and end of functions R0 = R0 += stacksize
|
|
//
|
|
if ((OPERAND2_REGNUM (Operands) == 0) &&
|
|
(!OPERAND2_INDIRECT (Operands)) &&
|
|
(Index64Op2 > 0) &&
|
|
(OPERAND1_REGNUM (Operands) == 0) &&
|
|
(OPERAND1_INDIRECT (Operands))
|
|
) {
|
|
Data64 = (UINT64) ConvertStackAddr (VmPtr, (UINTN) (INT64) Data64);
|
|
}
|
|
}
|
|
}
|
|
//
|
|
// Now write it back
|
|
//
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
//
|
|
// Reuse the Source variable to now be dest.
|
|
//
|
|
Source = (UINTN) (VmPtr->R[OPERAND1_REGNUM (Operands)] + Index64Op1);
|
|
//
|
|
// Do the write based on the size
|
|
//
|
|
switch (MoveSize) {
|
|
case DATA_SIZE_8:
|
|
VmWriteMem8 (VmPtr, Source, (UINT8) Data64);
|
|
break;
|
|
|
|
case DATA_SIZE_16:
|
|
VmWriteMem16 (VmPtr, Source, (UINT16) Data64);
|
|
break;
|
|
|
|
case DATA_SIZE_32:
|
|
VmWriteMem32 (VmPtr, Source, (UINT32) Data64);
|
|
break;
|
|
|
|
case DATA_SIZE_64:
|
|
VmWriteMem64 (VmPtr, Source, Data64);
|
|
break;
|
|
|
|
case DATA_SIZE_N:
|
|
VmWriteMemN (VmPtr, Source, (UINTN) Data64);
|
|
break;
|
|
|
|
default:
|
|
//
|
|
// not reached
|
|
//
|
|
break;
|
|
}
|
|
} else {
|
|
//
|
|
// Operand1 direct.
|
|
// Make sure we didn't have an index on operand1.
|
|
//
|
|
if (Opcode & OPCODE_M_IMMED_OP1) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INSTRUCTION_ENCODING,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
//
|
|
// Direct storage in register. Clear unused bits and store back to
|
|
// register.
|
|
//
|
|
VmPtr->R[OPERAND1_REGNUM (Operands)] = Data64 & DataMask;
|
|
}
|
|
//
|
|
// Advance the instruction pointer
|
|
//
|
|
VmPtr->Ip += Size;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteBREAK (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Execute the EBC BREAK instruction
|
|
|
|
Arguments:
|
|
|
|
VmPtr - pointer to current VM context
|
|
|
|
Returns:
|
|
|
|
EFI_UNSUPPORTED
|
|
EFI_SUCCESS
|
|
|
|
--*/
|
|
{
|
|
UINT8 Operands;
|
|
VOID *EbcEntryPoint;
|
|
VOID *Thunk;
|
|
UINT64 U64EbcEntryPoint;
|
|
INT32 Offset;
|
|
|
|
Operands = GETOPERANDS (VmPtr);
|
|
switch (Operands) {
|
|
//
|
|
// Runaway program break. Generate an exception and terminate
|
|
//
|
|
case 0:
|
|
EbcDebugSignalException (EXCEPT_EBC_BAD_BREAK, EXCEPTION_FLAG_FATAL, VmPtr);
|
|
break;
|
|
|
|
//
|
|
// Get VM version -- return VM revision number in R7
|
|
//
|
|
case 1:
|
|
//
|
|
// Bits:
|
|
// 63-17 = 0
|
|
// 16-8 = Major version
|
|
// 7-0 = Minor version
|
|
//
|
|
VmPtr->R[7] = GetVmVersion ();
|
|
break;
|
|
|
|
//
|
|
// Debugger breakpoint
|
|
//
|
|
case 3:
|
|
VmPtr->StopFlags |= STOPFLAG_BREAKPOINT;
|
|
//
|
|
// See if someone has registered a handler
|
|
//
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_BREAKPOINT,
|
|
EXCEPTION_FLAG_NONE,
|
|
VmPtr
|
|
);
|
|
break;
|
|
|
|
//
|
|
// System call, which there are none, so NOP it.
|
|
//
|
|
case 4:
|
|
break;
|
|
|
|
//
|
|
// Create a thunk for EBC code. R7 points to a 32-bit (in a 64-bit slot)
|
|
// "offset from self" pointer to the EBC entry point.
|
|
// After we're done, *(UINT64 *)R7 will be the address of the new thunk.
|
|
//
|
|
case 5:
|
|
Offset = (INT32) VmReadMem32 (VmPtr, (UINTN) VmPtr->R[7]);
|
|
U64EbcEntryPoint = (UINT64) (VmPtr->R[7] + Offset + 4);
|
|
EbcEntryPoint = (VOID *) (UINTN) U64EbcEntryPoint;
|
|
|
|
//
|
|
// Now create a new thunk
|
|
//
|
|
EbcCreateThunks (VmPtr->ImageHandle, EbcEntryPoint, &Thunk, 0);
|
|
|
|
//
|
|
// Finally replace the EBC entry point memory with the thunk address
|
|
//
|
|
VmWriteMem64 (VmPtr, (UINTN) VmPtr->R[7], (UINT64) (UINTN) Thunk);
|
|
break;
|
|
|
|
//
|
|
// Compiler setting version per value in R7
|
|
//
|
|
case 6:
|
|
VmPtr->CompilerVersion = (UINT32) VmPtr->R[7];
|
|
//
|
|
// Check compiler version against VM version?
|
|
//
|
|
break;
|
|
|
|
//
|
|
// Unhandled break code. Signal exception.
|
|
//
|
|
default:
|
|
EbcDebugSignalException (EXCEPT_EBC_BAD_BREAK, EXCEPTION_FLAG_FATAL, VmPtr);
|
|
break;
|
|
}
|
|
//
|
|
// Advance IP
|
|
//
|
|
VmPtr->Ip += 2;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteJMP (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the JMP instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to VM context
|
|
|
|
Returns:
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
JMP64{cs|cc} Immed64
|
|
JMP32{cs|cc} {@}R1 {Immed32|Index32}
|
|
|
|
Encoding:
|
|
b0.7 - immediate data present
|
|
b0.6 - 1 = 64 bit immediate data
|
|
0 = 32 bit immediate data
|
|
b1.7 - 1 = conditional
|
|
b1.6 1 = CS (condition set)
|
|
0 = CC (condition clear)
|
|
b1.4 1 = relative address
|
|
0 = absolute address
|
|
b1.3 1 = operand1 indirect
|
|
b1.2-0 operand 1
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 CompareSet;
|
|
UINT8 ConditionFlag;
|
|
UINT8 Size;
|
|
UINT8 Operand;
|
|
UINT64 Data64;
|
|
INT32 Index32;
|
|
UINTN Addr;
|
|
|
|
Operand = GETOPERANDS (VmPtr);
|
|
Opcode = GETOPCODE (VmPtr);
|
|
|
|
//
|
|
// Get instruction length from the opcode. The upper two bits are used here
|
|
// to index into the length array.
|
|
//
|
|
Size = mJMPLen[(Opcode >> 6) & 0x03];
|
|
|
|
//
|
|
// Decode instruction conditions
|
|
// If we haven't met the condition, then simply advance the IP and return.
|
|
//
|
|
CompareSet = (UINT8) ((Operand & JMP_M_CS) ? 1 : 0);
|
|
ConditionFlag = (UINT8) VMFLAG_ISSET (VmPtr, VMFLAGS_CC);
|
|
if (Operand & CONDITION_M_CONDITIONAL) {
|
|
if (CompareSet != ConditionFlag) {
|
|
VmPtr->Ip += Size;
|
|
return EFI_SUCCESS;
|
|
}
|
|
}
|
|
//
|
|
// Check for 64-bit form and do it right away since it's the most
|
|
// straight-forward form.
|
|
//
|
|
if (Opcode & OPCODE_M_IMMDATA64) {
|
|
//
|
|
// Double check for immediate-data, which is required. If not there,
|
|
// then signal an exception
|
|
//
|
|
if (!(Opcode & OPCODE_M_IMMDATA)) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INSTRUCTION_ENCODING,
|
|
EXCEPTION_FLAG_ERROR,
|
|
VmPtr
|
|
);
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
//
|
|
// 64-bit immediate data is full address. Read the immediate data,
|
|
// check for alignment, and jump absolute.
|
|
//
|
|
Data64 = VmReadImmed64 (VmPtr, 2);
|
|
if (!IS_ALIGNED ((UINTN) Data64, sizeof (UINT16))) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_ALIGNMENT_CHECK,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
//
|
|
// Take jump -- relative or absolute
|
|
//
|
|
if (Operand & JMP_M_RELATIVE) {
|
|
VmPtr->Ip += (UINTN) Data64 + Size;
|
|
} else {
|
|
VmPtr->Ip = (VMIP) (UINTN) Data64;
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
//
|
|
// 32-bit forms:
|
|
// Get the index if there is one. May be either an index, or an immediate
|
|
// offset depending on indirect operand.
|
|
// JMP32 @R1 Index32 -- immediate data is an index
|
|
// JMP32 R1 Immed32 -- immedate data is an offset
|
|
//
|
|
if (Opcode & OPCODE_M_IMMDATA) {
|
|
if (OPERAND1_INDIRECT (Operand)) {
|
|
Index32 = VmReadIndex32 (VmPtr, 2);
|
|
} else {
|
|
Index32 = VmReadImmed32 (VmPtr, 2);
|
|
}
|
|
} else {
|
|
Index32 = 0;
|
|
}
|
|
//
|
|
// Get the register data. If R == 0, then special case where it's ignored.
|
|
//
|
|
if (OPERAND1_REGNUM (Operand) == 0) {
|
|
Data64 = 0;
|
|
} else {
|
|
Data64 = OPERAND1_REGDATA (VmPtr, Operand);
|
|
}
|
|
//
|
|
// Decode the forms
|
|
//
|
|
if (OPERAND1_INDIRECT (Operand)) {
|
|
//
|
|
// Form: JMP32 @Rx {Index32}
|
|
//
|
|
Addr = VmReadMemN (VmPtr, (UINTN) Data64 + Index32);
|
|
if (!IS_ALIGNED ((UINTN) Addr, sizeof (UINT16))) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_ALIGNMENT_CHECK,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
if (Operand & JMP_M_RELATIVE) {
|
|
VmPtr->Ip += (UINTN) Addr + Size;
|
|
} else {
|
|
VmPtr->Ip = (VMIP) Addr;
|
|
}
|
|
} else {
|
|
//
|
|
// Form: JMP32 Rx {Immed32}
|
|
//
|
|
Addr = (UINTN) (Data64 + Index32);
|
|
if (!IS_ALIGNED ((UINTN) Addr, sizeof (UINT16))) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_ALIGNMENT_CHECK,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
if (Operand & JMP_M_RELATIVE) {
|
|
VmPtr->Ip += (UINTN) Addr + Size;
|
|
} else {
|
|
VmPtr->Ip = (VMIP) Addr;
|
|
}
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteJMP8 (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC JMP8 instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
JMP8{cs|cc} Offset/2
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 ConditionFlag;
|
|
UINT8 CompareSet;
|
|
INT8 Offset;
|
|
|
|
//
|
|
// Decode instruction.
|
|
//
|
|
Opcode = GETOPCODE (VmPtr);
|
|
CompareSet = (UINT8) ((Opcode & JMP_M_CS) ? 1 : 0);
|
|
ConditionFlag = (UINT8) VMFLAG_ISSET (VmPtr, VMFLAGS_CC);
|
|
|
|
//
|
|
// If we haven't met the condition, then simply advance the IP and return
|
|
//
|
|
if (Opcode & CONDITION_M_CONDITIONAL) {
|
|
if (CompareSet != ConditionFlag) {
|
|
VmPtr->Ip += 2;
|
|
return EFI_SUCCESS;
|
|
}
|
|
}
|
|
//
|
|
// Get the offset from the instruction stream. It's relative to the
|
|
// following instruction, and divided by 2.
|
|
//
|
|
Offset = VmReadImmed8 (VmPtr, 1);
|
|
//
|
|
// Want to check for offset == -2 and then raise an exception?
|
|
//
|
|
VmPtr->Ip += (Offset * 2) + 2;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteMOVI (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Execute the EBC MOVI
|
|
|
|
Arguments:
|
|
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
|
|
MOVI[b|w|d|q][w|d|q] {@}R1 {Index16}, ImmData16|32|64
|
|
|
|
First variable character specifies the move size
|
|
Second variable character specifies size of the immediate data
|
|
|
|
Sign-extend the immediate data to the size of the operation, and zero-extend
|
|
if storing to a register.
|
|
|
|
Operand1 direct with index/immed is invalid.
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 Operands;
|
|
UINT8 Size;
|
|
INT16 Index16;
|
|
INT64 ImmData64;
|
|
UINT64 Op1;
|
|
UINT64 Mask64;
|
|
|
|
//
|
|
// Get the opcode and operands byte so we can get R1 and R2
|
|
//
|
|
Opcode = GETOPCODE (VmPtr);
|
|
Operands = GETOPERANDS (VmPtr);
|
|
|
|
//
|
|
// Get the index (16-bit) if present
|
|
//
|
|
if (Operands & MOVI_M_IMMDATA) {
|
|
Index16 = VmReadIndex16 (VmPtr, 2);
|
|
Size = 4;
|
|
} else {
|
|
Index16 = 0;
|
|
Size = 2;
|
|
}
|
|
//
|
|
// Extract the immediate data. Sign-extend always.
|
|
//
|
|
if ((Opcode & MOVI_M_DATAWIDTH) == MOVI_DATAWIDTH16) {
|
|
ImmData64 = (INT64) (INT16) VmReadImmed16 (VmPtr, Size);
|
|
Size += 2;
|
|
} else if ((Opcode & MOVI_M_DATAWIDTH) == MOVI_DATAWIDTH32) {
|
|
ImmData64 = (INT64) (INT32) VmReadImmed32 (VmPtr, Size);
|
|
Size += 4;
|
|
} else if ((Opcode & MOVI_M_DATAWIDTH) == MOVI_DATAWIDTH64) {
|
|
ImmData64 = (INT64) VmReadImmed64 (VmPtr, Size);
|
|
Size += 8;
|
|
} else {
|
|
//
|
|
// Invalid encoding
|
|
//
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INSTRUCTION_ENCODING,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
//
|
|
// Now write back the result
|
|
//
|
|
if (!OPERAND1_INDIRECT (Operands)) {
|
|
//
|
|
// Operand1 direct. Make sure it didn't have an index.
|
|
//
|
|
if (Operands & MOVI_M_IMMDATA) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INSTRUCTION_ENCODING,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
//
|
|
// Writing directly to a register. Clear unused bits.
|
|
//
|
|
if ((Operands & MOVI_M_MOVEWIDTH) == MOVI_MOVEWIDTH8) {
|
|
Mask64 = 0x000000FF;
|
|
} else if ((Operands & MOVI_M_MOVEWIDTH) == MOVI_MOVEWIDTH16) {
|
|
Mask64 = 0x0000FFFF;
|
|
} else if ((Operands & MOVI_M_MOVEWIDTH) == MOVI_MOVEWIDTH32) {
|
|
Mask64 = 0x00000000FFFFFFFF;
|
|
} else {
|
|
Mask64 = (UINT64)~0;
|
|
}
|
|
|
|
VmPtr->R[OPERAND1_REGNUM (Operands)] = ImmData64 & Mask64;
|
|
} else {
|
|
//
|
|
// Get the address then write back based on size of the move
|
|
//
|
|
Op1 = (UINT64) VmPtr->R[OPERAND1_REGNUM (Operands)] + Index16;
|
|
if ((Operands & MOVI_M_MOVEWIDTH) == MOVI_MOVEWIDTH8) {
|
|
VmWriteMem8 (VmPtr, (UINTN) Op1, (UINT8) ImmData64);
|
|
} else if ((Operands & MOVI_M_MOVEWIDTH) == MOVI_MOVEWIDTH16) {
|
|
VmWriteMem16 (VmPtr, (UINTN) Op1, (UINT16) ImmData64);
|
|
} else if ((Operands & MOVI_M_MOVEWIDTH) == MOVI_MOVEWIDTH32) {
|
|
VmWriteMem32 (VmPtr, (UINTN) Op1, (UINT32) ImmData64);
|
|
} else {
|
|
VmWriteMem64 (VmPtr, (UINTN) Op1, ImmData64);
|
|
}
|
|
}
|
|
//
|
|
// Advance the instruction pointer
|
|
//
|
|
VmPtr->Ip += Size;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteMOVIn (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Execute the EBC MOV immediate natural. This instruction moves an immediate
|
|
index value into a register or memory location.
|
|
|
|
Arguments:
|
|
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
|
|
MOVIn[w|d|q] {@}R1 {Index16}, Index16|32|64
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 Operands;
|
|
UINT8 Size;
|
|
INT16 Index16;
|
|
INT16 ImmedIndex16;
|
|
INT32 ImmedIndex32;
|
|
INT64 ImmedIndex64;
|
|
UINT64 Op1;
|
|
|
|
//
|
|
// Get the opcode and operands byte so we can get R1 and R2
|
|
//
|
|
Opcode = GETOPCODE (VmPtr);
|
|
Operands = GETOPERANDS (VmPtr);
|
|
|
|
//
|
|
// Get the operand1 index (16-bit) if present
|
|
//
|
|
if (Operands & MOVI_M_IMMDATA) {
|
|
Index16 = VmReadIndex16 (VmPtr, 2);
|
|
Size = 4;
|
|
} else {
|
|
Index16 = 0;
|
|
Size = 2;
|
|
}
|
|
//
|
|
// Extract the immediate data and convert to a 64-bit index.
|
|
//
|
|
if ((Opcode & MOVI_M_DATAWIDTH) == MOVI_DATAWIDTH16) {
|
|
ImmedIndex16 = VmReadIndex16 (VmPtr, Size);
|
|
ImmedIndex64 = (INT64) ImmedIndex16;
|
|
Size += 2;
|
|
} else if ((Opcode & MOVI_M_DATAWIDTH) == MOVI_DATAWIDTH32) {
|
|
ImmedIndex32 = VmReadIndex32 (VmPtr, Size);
|
|
ImmedIndex64 = (INT64) ImmedIndex32;
|
|
Size += 4;
|
|
} else if ((Opcode & MOVI_M_DATAWIDTH) == MOVI_DATAWIDTH64) {
|
|
ImmedIndex64 = VmReadIndex64 (VmPtr, Size);
|
|
Size += 8;
|
|
} else {
|
|
//
|
|
// Invalid encoding
|
|
//
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INSTRUCTION_ENCODING,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
//
|
|
// Now write back the result
|
|
//
|
|
if (!OPERAND1_INDIRECT (Operands)) {
|
|
//
|
|
// Check for MOVIn R1 Index16, Immed (not indirect, with index), which
|
|
// is illegal
|
|
//
|
|
if (Operands & MOVI_M_IMMDATA) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INSTRUCTION_ENCODING,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
VmPtr->R[OPERAND1_REGNUM (Operands)] = ImmedIndex64;
|
|
} else {
|
|
//
|
|
// Get the address
|
|
//
|
|
Op1 = (UINT64) VmPtr->R[OPERAND1_REGNUM (Operands)] + Index16;
|
|
VmWriteMemN (VmPtr, (UINTN) Op1, (INTN) ImmedIndex64);
|
|
}
|
|
//
|
|
// Advance the instruction pointer
|
|
//
|
|
VmPtr->Ip += Size;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteMOVREL (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Execute the EBC MOVREL instruction.
|
|
Dest <- Ip + ImmData
|
|
|
|
Arguments:
|
|
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
|
|
MOVREL[w|d|q] {@}R1 {Index16}, ImmData16|32|64
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 Operands;
|
|
UINT8 Size;
|
|
INT16 Index16;
|
|
INT64 ImmData64;
|
|
UINT64 Op1;
|
|
UINT64 Op2;
|
|
|
|
//
|
|
// Get the opcode and operands byte so we can get R1 and R2
|
|
//
|
|
Opcode = GETOPCODE (VmPtr);
|
|
Operands = GETOPERANDS (VmPtr);
|
|
|
|
//
|
|
// Get the Operand 1 index (16-bit) if present
|
|
//
|
|
if (Operands & MOVI_M_IMMDATA) {
|
|
Index16 = VmReadIndex16 (VmPtr, 2);
|
|
Size = 4;
|
|
} else {
|
|
Index16 = 0;
|
|
Size = 2;
|
|
}
|
|
//
|
|
// Get the immediate data.
|
|
//
|
|
if ((Opcode & MOVI_M_DATAWIDTH) == MOVI_DATAWIDTH16) {
|
|
ImmData64 = (INT64) VmReadImmed16 (VmPtr, Size);
|
|
Size += 2;
|
|
} else if ((Opcode & MOVI_M_DATAWIDTH) == MOVI_DATAWIDTH32) {
|
|
ImmData64 = (INT64) VmReadImmed32 (VmPtr, Size);
|
|
Size += 4;
|
|
} else if ((Opcode & MOVI_M_DATAWIDTH) == MOVI_DATAWIDTH64) {
|
|
ImmData64 = VmReadImmed64 (VmPtr, Size);
|
|
Size += 8;
|
|
} else {
|
|
//
|
|
// Invalid encoding
|
|
//
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INSTRUCTION_ENCODING,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
//
|
|
// Compute the value and write back the result
|
|
//
|
|
Op2 = (UINT64) ((INT64) ((UINT64) (UINTN) VmPtr->Ip) + (INT64) ImmData64 + Size);
|
|
if (!OPERAND1_INDIRECT (Operands)) {
|
|
//
|
|
// Check for illegal combination of operand1 direct with immediate data
|
|
//
|
|
if (Operands & MOVI_M_IMMDATA) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INSTRUCTION_ENCODING,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
VmPtr->R[OPERAND1_REGNUM (Operands)] = (VM_REGISTER) Op2;
|
|
} else {
|
|
//
|
|
// Get the address = [Rx] + Index16
|
|
// Write back the result. Always a natural size write, since
|
|
// we're talking addresses here.
|
|
//
|
|
Op1 = (UINT64) VmPtr->R[OPERAND1_REGNUM (Operands)] + Index16;
|
|
VmWriteMemN (VmPtr, (UINTN) Op1, (UINTN) Op2);
|
|
}
|
|
//
|
|
// Advance the instruction pointer
|
|
//
|
|
VmPtr->Ip += Size;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteMOVsnw (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Execute the EBC MOVsnw instruction. This instruction loads a signed
|
|
natural value from memory or register to another memory or register. On
|
|
32-bit machines, the value gets sign-extended to 64 bits if the destination
|
|
is a register.
|
|
|
|
Arguments:
|
|
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
|
|
MOVsnw {@}R1 {Index16}, {@}R2 {Index16|Immed16}
|
|
|
|
0:7 1=>operand1 index present
|
|
0:6 1=>operand2 index present
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 Operands;
|
|
UINT8 Size;
|
|
INT16 Op1Index;
|
|
INT16 Op2Index;
|
|
UINT64 Op2;
|
|
|
|
//
|
|
// Get the opcode and operand bytes
|
|
//
|
|
Opcode = GETOPCODE (VmPtr);
|
|
Operands = GETOPERANDS (VmPtr);
|
|
|
|
Op1Index = Op2Index = 0;
|
|
|
|
//
|
|
// Get the indexes if present.
|
|
//
|
|
Size = 2;
|
|
if (Opcode & OPCODE_M_IMMED_OP1) {
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
Op1Index = VmReadIndex16 (VmPtr, 2);
|
|
} else {
|
|
//
|
|
// Illegal form operand1 direct with index: MOVsnw R1 Index16, {@}R2
|
|
//
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INSTRUCTION_ENCODING,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
Size += sizeof (UINT16);
|
|
}
|
|
|
|
if (Opcode & OPCODE_M_IMMED_OP2) {
|
|
if (OPERAND2_INDIRECT (Operands)) {
|
|
Op2Index = VmReadIndex16 (VmPtr, Size);
|
|
} else {
|
|
Op2Index = VmReadImmed16 (VmPtr, Size);
|
|
}
|
|
|
|
Size += sizeof (UINT16);
|
|
}
|
|
//
|
|
// Get the data from the source.
|
|
//
|
|
Op2 = (INT64) ((INTN) (VmPtr->R[OPERAND2_REGNUM (Operands)] + Op2Index));
|
|
if (OPERAND2_INDIRECT (Operands)) {
|
|
Op2 = (INT64) (INTN) VmReadMemN (VmPtr, (UINTN) Op2);
|
|
}
|
|
//
|
|
// Now write back the result.
|
|
//
|
|
if (!OPERAND1_INDIRECT (Operands)) {
|
|
VmPtr->R[OPERAND1_REGNUM (Operands)] = Op2;
|
|
} else {
|
|
VmWriteMemN (VmPtr, (UINTN) (VmPtr->R[OPERAND1_REGNUM (Operands)] + Op1Index), (UINTN) Op2);
|
|
}
|
|
//
|
|
// Advance the instruction pointer
|
|
//
|
|
VmPtr->Ip += Size;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteMOVsnd (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Execute the EBC MOVsnw instruction. This instruction loads a signed
|
|
natural value from memory or register to another memory or register. On
|
|
32-bit machines, the value gets sign-extended to 64 bits if the destination
|
|
is a register.
|
|
|
|
Arguments:
|
|
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
|
|
MOVsnd {@}R1 {Indx32}, {@}R2 {Index32|Immed32}
|
|
|
|
0:7 1=>operand1 index present
|
|
0:6 1=>operand2 index present
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 Operands;
|
|
UINT8 Size;
|
|
INT32 Op1Index;
|
|
INT32 Op2Index;
|
|
UINT64 Op2;
|
|
|
|
//
|
|
// Get the opcode and operand bytes
|
|
//
|
|
Opcode = GETOPCODE (VmPtr);
|
|
Operands = GETOPERANDS (VmPtr);
|
|
|
|
Op1Index = Op2Index = 0;
|
|
|
|
//
|
|
// Get the indexes if present.
|
|
//
|
|
Size = 2;
|
|
if (Opcode & OPCODE_M_IMMED_OP1) {
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
Op1Index = VmReadIndex32 (VmPtr, 2);
|
|
} else {
|
|
//
|
|
// Illegal form operand1 direct with index: MOVsnd R1 Index16,..
|
|
//
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INSTRUCTION_ENCODING,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
Size += sizeof (UINT32);
|
|
}
|
|
|
|
if (Opcode & OPCODE_M_IMMED_OP2) {
|
|
if (OPERAND2_INDIRECT (Operands)) {
|
|
Op2Index = VmReadIndex32 (VmPtr, Size);
|
|
} else {
|
|
Op2Index = VmReadImmed32 (VmPtr, Size);
|
|
}
|
|
|
|
Size += sizeof (UINT32);
|
|
}
|
|
//
|
|
// Get the data from the source.
|
|
//
|
|
Op2 = (INT64) ((INTN) (VmPtr->R[OPERAND2_REGNUM (Operands)] + Op2Index));
|
|
if (OPERAND2_INDIRECT (Operands)) {
|
|
Op2 = (INT64) (INTN) VmReadMemN (VmPtr, (UINTN) Op2);
|
|
}
|
|
//
|
|
// Now write back the result.
|
|
//
|
|
if (!OPERAND1_INDIRECT (Operands)) {
|
|
VmPtr->R[OPERAND1_REGNUM (Operands)] = Op2;
|
|
} else {
|
|
VmWriteMemN (VmPtr, (UINTN) (VmPtr->R[OPERAND1_REGNUM (Operands)] + Op1Index), (UINTN) Op2);
|
|
}
|
|
//
|
|
// Advance the instruction pointer
|
|
//
|
|
VmPtr->Ip += Size;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecutePUSHn (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC PUSHn instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
PUSHn {@}R1 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 Operands;
|
|
INT16 Index16;
|
|
UINTN DataN;
|
|
|
|
//
|
|
// Get opcode and operands
|
|
//
|
|
Opcode = GETOPCODE (VmPtr);
|
|
Operands = GETOPERANDS (VmPtr);
|
|
|
|
//
|
|
// Get index if present
|
|
//
|
|
if (Opcode & PUSHPOP_M_IMMDATA) {
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
Index16 = VmReadIndex16 (VmPtr, 2);
|
|
} else {
|
|
Index16 = VmReadImmed16 (VmPtr, 2);
|
|
}
|
|
|
|
VmPtr->Ip += 4;
|
|
} else {
|
|
Index16 = 0;
|
|
VmPtr->Ip += 2;
|
|
}
|
|
//
|
|
// Get the data to push
|
|
//
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
DataN = VmReadMemN (VmPtr, (UINTN) (VmPtr->R[OPERAND1_REGNUM (Operands)] + Index16));
|
|
} else {
|
|
DataN = (UINTN) (VmPtr->R[OPERAND1_REGNUM (Operands)] + Index16);
|
|
}
|
|
//
|
|
// Adjust the stack down.
|
|
//
|
|
VmPtr->R[0] -= sizeof (UINTN);
|
|
VmWriteMemN (VmPtr, (UINTN) VmPtr->R[0], DataN);
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecutePUSH (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC PUSH instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
PUSH[32|64] {@}R1 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 Operands;
|
|
UINT32 Data32;
|
|
UINT64 Data64;
|
|
INT16 Index16;
|
|
|
|
//
|
|
// Get opcode and operands
|
|
//
|
|
Opcode = GETOPCODE (VmPtr);
|
|
Operands = GETOPERANDS (VmPtr);
|
|
//
|
|
// Get immediate index if present, then advance the IP.
|
|
//
|
|
if (Opcode & PUSHPOP_M_IMMDATA) {
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
Index16 = VmReadIndex16 (VmPtr, 2);
|
|
} else {
|
|
Index16 = VmReadImmed16 (VmPtr, 2);
|
|
}
|
|
|
|
VmPtr->Ip += 4;
|
|
} else {
|
|
Index16 = 0;
|
|
VmPtr->Ip += 2;
|
|
}
|
|
//
|
|
// Get the data to push
|
|
//
|
|
if (Opcode & PUSHPOP_M_64) {
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
Data64 = VmReadMem64 (VmPtr, (UINTN) (VmPtr->R[OPERAND1_REGNUM (Operands)] + Index16));
|
|
} else {
|
|
Data64 = (UINT64) VmPtr->R[OPERAND1_REGNUM (Operands)] + Index16;
|
|
}
|
|
//
|
|
// Adjust the stack down, then write back the data
|
|
//
|
|
VmPtr->R[0] -= sizeof (UINT64);
|
|
VmWriteMem64 (VmPtr, (UINTN) VmPtr->R[0], Data64);
|
|
} else {
|
|
//
|
|
// 32-bit data
|
|
//
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
Data32 = VmReadMem32 (VmPtr, (UINTN) (VmPtr->R[OPERAND1_REGNUM (Operands)] + Index16));
|
|
} else {
|
|
Data32 = (UINT32) VmPtr->R[OPERAND1_REGNUM (Operands)] + Index16;
|
|
}
|
|
//
|
|
// Adjust the stack down and write the data
|
|
//
|
|
VmPtr->R[0] -= sizeof (UINT32);
|
|
VmWriteMem32 (VmPtr, (UINTN) VmPtr->R[0], Data32);
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecutePOPn (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC POPn instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
POPn {@}R1 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 Operands;
|
|
INT16 Index16;
|
|
UINTN DataN;
|
|
|
|
//
|
|
// Get opcode and operands
|
|
//
|
|
Opcode = GETOPCODE (VmPtr);
|
|
Operands = GETOPERANDS (VmPtr);
|
|
//
|
|
// Get immediate data if present, and advance the IP
|
|
//
|
|
if (Opcode & PUSHPOP_M_IMMDATA) {
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
Index16 = VmReadIndex16 (VmPtr, 2);
|
|
} else {
|
|
Index16 = VmReadImmed16 (VmPtr, 2);
|
|
}
|
|
|
|
VmPtr->Ip += 4;
|
|
} else {
|
|
Index16 = 0;
|
|
VmPtr->Ip += 2;
|
|
}
|
|
//
|
|
// Read the data off the stack, then adjust the stack pointer
|
|
//
|
|
DataN = VmReadMemN (VmPtr, (UINTN) VmPtr->R[0]);
|
|
VmPtr->R[0] += sizeof (UINTN);
|
|
//
|
|
// Do the write-back
|
|
//
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
VmWriteMemN (VmPtr, (UINTN) (VmPtr->R[OPERAND1_REGNUM (Operands)] + Index16), DataN);
|
|
} else {
|
|
VmPtr->R[OPERAND1_REGNUM (Operands)] = (INT64) (UINT64) ((UINTN) DataN + Index16);
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecutePOP (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC POP instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
POP {@}R1 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 Operands;
|
|
INT16 Index16;
|
|
INT32 Data32;
|
|
UINT64 Data64;
|
|
|
|
//
|
|
// Get opcode and operands
|
|
//
|
|
Opcode = GETOPCODE (VmPtr);
|
|
Operands = GETOPERANDS (VmPtr);
|
|
//
|
|
// Get immediate data if present, and advance the IP.
|
|
//
|
|
if (Opcode & PUSHPOP_M_IMMDATA) {
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
Index16 = VmReadIndex16 (VmPtr, 2);
|
|
} else {
|
|
Index16 = VmReadImmed16 (VmPtr, 2);
|
|
}
|
|
|
|
VmPtr->Ip += 4;
|
|
} else {
|
|
Index16 = 0;
|
|
VmPtr->Ip += 2;
|
|
}
|
|
//
|
|
// Get the data off the stack, then write it to the appropriate location
|
|
//
|
|
if (Opcode & PUSHPOP_M_64) {
|
|
//
|
|
// Read the data off the stack, then adjust the stack pointer
|
|
//
|
|
Data64 = VmReadMem64 (VmPtr, (UINTN) VmPtr->R[0]);
|
|
VmPtr->R[0] += sizeof (UINT64);
|
|
//
|
|
// Do the write-back
|
|
//
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
VmWriteMem64 (VmPtr, (UINTN) (VmPtr->R[OPERAND1_REGNUM (Operands)] + Index16), Data64);
|
|
} else {
|
|
VmPtr->R[OPERAND1_REGNUM (Operands)] = Data64 + Index16;
|
|
}
|
|
} else {
|
|
//
|
|
// 32-bit pop. Read it off the stack and adjust the stack pointer
|
|
//
|
|
Data32 = (INT32) VmReadMem32 (VmPtr, (UINTN) VmPtr->R[0]);
|
|
VmPtr->R[0] += sizeof (UINT32);
|
|
//
|
|
// Do the write-back
|
|
//
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
VmWriteMem32 (VmPtr, (UINTN) (VmPtr->R[OPERAND1_REGNUM (Operands)] + Index16), Data32);
|
|
} else {
|
|
VmPtr->R[OPERAND1_REGNUM (Operands)] = (INT64) Data32 + Index16;
|
|
}
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteCALL (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Implements the EBC CALL instruction.
|
|
|
|
Instruction format:
|
|
|
|
CALL64 Immed64
|
|
CALL32 {@}R1 {Immed32|Index32}
|
|
CALLEX64 Immed64
|
|
CALLEX16 {@}R1 {Immed32}
|
|
|
|
If Rx == R0, then it's a PC relative call to PC = PC + imm32.
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context.
|
|
|
|
Returns:
|
|
Standard EFI_STATUS
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 Operands;
|
|
INT32 Immed32;
|
|
UINT8 Size;
|
|
INT64 Immed64;
|
|
VOID *FramePtr;
|
|
|
|
//
|
|
// Get opcode and operands
|
|
//
|
|
Opcode = GETOPCODE (VmPtr);
|
|
Operands = GETOPERANDS (VmPtr);
|
|
//
|
|
// Assign these as well to avoid compiler warnings
|
|
//
|
|
Immed64 = 0;
|
|
Immed32 = 0;
|
|
|
|
FramePtr = VmPtr->FramePtr;
|
|
//
|
|
// Determine the instruction size, and get immediate data if present
|
|
//
|
|
if (Opcode & OPCODE_M_IMMDATA) {
|
|
if (Opcode & OPCODE_M_IMMDATA64) {
|
|
Immed64 = VmReadImmed64 (VmPtr, 2);
|
|
Size = 10;
|
|
} else {
|
|
//
|
|
// If register operand is indirect, then the immediate data is an index
|
|
//
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
Immed32 = VmReadIndex32 (VmPtr, 2);
|
|
} else {
|
|
Immed32 = VmReadImmed32 (VmPtr, 2);
|
|
}
|
|
|
|
Size = 6;
|
|
}
|
|
} else {
|
|
Size = 2;
|
|
}
|
|
//
|
|
// If it's a call to EBC, adjust the stack pointer down 16 bytes and
|
|
// put our return address and frame pointer on the VM stack.
|
|
//
|
|
if ((Operands & OPERAND_M_NATIVE_CALL) == 0) {
|
|
VmPtr->R[0] -= 8;
|
|
VmWriteMemN (VmPtr, (UINTN) VmPtr->R[0], (UINTN) FramePtr);
|
|
VmPtr->FramePtr = (VOID *) (UINTN) VmPtr->R[0];
|
|
VmPtr->R[0] -= 8;
|
|
VmWriteMem64 (VmPtr, (UINTN) VmPtr->R[0], (UINT64) (UINTN) (VmPtr->Ip + Size));
|
|
}
|
|
//
|
|
// If 64-bit data, then absolute jump only
|
|
//
|
|
if (Opcode & OPCODE_M_IMMDATA64) {
|
|
//
|
|
// Native or EBC call?
|
|
//
|
|
if ((Operands & OPERAND_M_NATIVE_CALL) == 0) {
|
|
VmPtr->Ip = (VMIP) (UINTN) Immed64;
|
|
} else {
|
|
//
|
|
// Call external function, get the return value, and advance the IP
|
|
//
|
|
EbcLLCALLEX (VmPtr, (UINTN) Immed64, (UINTN) VmPtr->R[0], FramePtr, Size);
|
|
}
|
|
} else {
|
|
//
|
|
// Get the register data. If operand1 == 0, then ignore register and
|
|
// take immediate data as relative or absolute address.
|
|
// Compiler should take care of upper bits if 32-bit machine.
|
|
//
|
|
if (OPERAND1_REGNUM (Operands) != 0) {
|
|
Immed64 = (UINT64) (UINTN) VmPtr->R[OPERAND1_REGNUM (Operands)];
|
|
}
|
|
//
|
|
// Get final address
|
|
//
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
Immed64 = (INT64) (UINT64) (UINTN) VmReadMemN (VmPtr, (UINTN) (Immed64 + Immed32));
|
|
} else {
|
|
Immed64 += Immed32;
|
|
}
|
|
//
|
|
// Now determine if external call, and then if relative or absolute
|
|
//
|
|
if ((Operands & OPERAND_M_NATIVE_CALL) == 0) {
|
|
//
|
|
// EBC call. Relative or absolute? If relative, then it's relative to the
|
|
// start of the next instruction.
|
|
//
|
|
if (Operands & OPERAND_M_RELATIVE_ADDR) {
|
|
VmPtr->Ip += Immed64 + Size;
|
|
} else {
|
|
VmPtr->Ip = (VMIP) (UINTN) Immed64;
|
|
}
|
|
} else {
|
|
//
|
|
// Native call. Relative or absolute?
|
|
//
|
|
if (Operands & OPERAND_M_RELATIVE_ADDR) {
|
|
EbcLLCALLEX (VmPtr, (UINTN) (Immed64 + VmPtr->Ip + Size), (UINTN) VmPtr->R[0], FramePtr, Size);
|
|
} else {
|
|
if (VmPtr->StopFlags & STOPFLAG_BREAK_ON_CALLEX) {
|
|
CpuBreakpoint ();
|
|
}
|
|
|
|
EbcLLCALLEX (VmPtr, (UINTN) Immed64, (UINTN) VmPtr->R[0], FramePtr, Size);
|
|
}
|
|
}
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteRET (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC RET instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
RET
|
|
|
|
--*/
|
|
{
|
|
//
|
|
// If we're at the top of the stack, then simply set the done
|
|
// flag and return
|
|
//
|
|
if (VmPtr->StackRetAddr == (UINT64) VmPtr->R[0]) {
|
|
VmPtr->StopFlags |= STOPFLAG_APP_DONE;
|
|
} else {
|
|
//
|
|
// Pull the return address off the VM app's stack and set the IP
|
|
// to it
|
|
//
|
|
if (!IS_ALIGNED ((UINTN) VmPtr->R[0], sizeof (UINT16))) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_ALIGNMENT_CHECK,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
}
|
|
//
|
|
// Restore the IP and frame pointer from the stack
|
|
//
|
|
VmPtr->Ip = (VMIP) (UINTN) VmReadMem64 (VmPtr, (UINTN) VmPtr->R[0]);
|
|
VmPtr->R[0] += 8;
|
|
VmPtr->FramePtr = (VOID *) VmReadMemN (VmPtr, (UINTN) VmPtr->R[0]);
|
|
VmPtr->R[0] += 8;
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteCMP (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC CMP instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
CMP[32|64][eq|lte|gte|ulte|ugte] R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 Operands;
|
|
UINT8 Size;
|
|
INT16 Index16;
|
|
UINT32 Flag;
|
|
INT64 Op2;
|
|
INT64 Op1;
|
|
|
|
//
|
|
// Get opcode and operands
|
|
//
|
|
Opcode = GETOPCODE (VmPtr);
|
|
Operands = GETOPERANDS (VmPtr);
|
|
//
|
|
// Get the register data we're going to compare to
|
|
//
|
|
Op1 = VmPtr->R[OPERAND1_REGNUM (Operands)];
|
|
//
|
|
// Get immediate data
|
|
//
|
|
if (Opcode & OPCODE_M_IMMDATA) {
|
|
if (OPERAND2_INDIRECT (Operands)) {
|
|
Index16 = VmReadIndex16 (VmPtr, 2);
|
|
} else {
|
|
Index16 = VmReadImmed16 (VmPtr, 2);
|
|
}
|
|
|
|
Size = 4;
|
|
} else {
|
|
Index16 = 0;
|
|
Size = 2;
|
|
}
|
|
//
|
|
// Now get Op2
|
|
//
|
|
if (OPERAND2_INDIRECT (Operands)) {
|
|
if (Opcode & OPCODE_M_64BIT) {
|
|
Op2 = (INT64) VmReadMem64 (VmPtr, (UINTN) (VmPtr->R[OPERAND2_REGNUM (Operands)] + Index16));
|
|
} else {
|
|
//
|
|
// 32-bit operations. 0-extend the values for all cases.
|
|
//
|
|
Op2 = (INT64) (UINT64) ((UINT32) VmReadMem32 (VmPtr, (UINTN) (VmPtr->R[OPERAND2_REGNUM (Operands)] + Index16)));
|
|
}
|
|
} else {
|
|
Op2 = VmPtr->R[OPERAND2_REGNUM (Operands)] + Index16;
|
|
}
|
|
//
|
|
// Now do the compare
|
|
//
|
|
Flag = 0;
|
|
if (Opcode & OPCODE_M_64BIT) {
|
|
//
|
|
// 64-bit compares
|
|
//
|
|
switch (Opcode & OPCODE_M_OPCODE) {
|
|
case OPCODE_CMPEQ:
|
|
if (Op1 == Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPLTE:
|
|
if (Op1 <= Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPGTE:
|
|
if (Op1 >= Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPULTE:
|
|
if ((UINT64) Op1 <= (UINT64) Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPUGTE:
|
|
if ((UINT64) Op1 >= (UINT64) Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
ASSERT (0);
|
|
}
|
|
} else {
|
|
//
|
|
// 32-bit compares
|
|
//
|
|
switch (Opcode & OPCODE_M_OPCODE) {
|
|
case OPCODE_CMPEQ:
|
|
if ((INT32) Op1 == (INT32) Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPLTE:
|
|
if ((INT32) Op1 <= (INT32) Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPGTE:
|
|
if ((INT32) Op1 >= (INT32) Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPULTE:
|
|
if ((UINT32) Op1 <= (UINT32) Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPUGTE:
|
|
if ((UINT32) Op1 >= (UINT32) Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
ASSERT (0);
|
|
}
|
|
}
|
|
//
|
|
// Now set the flag accordingly for the comparison
|
|
//
|
|
if (Flag) {
|
|
VMFLAG_SET (VmPtr, VMFLAGS_CC);
|
|
} else {
|
|
VMFLAG_CLEAR (VmPtr, VMFLAGS_CC);
|
|
}
|
|
//
|
|
// Advance the IP
|
|
//
|
|
VmPtr->Ip += Size;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteCMPI (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC CMPI instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
CMPI[32|64]{w|d}[eq|lte|gte|ulte|ugte] {@}Rx {Index16}, Immed16|Immed32
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
UINT8 Operands;
|
|
UINT8 Size;
|
|
INT64 Op1;
|
|
INT64 Op2;
|
|
INT16 Index16;
|
|
UINT32 Flag;
|
|
|
|
//
|
|
// Get opcode and operands
|
|
//
|
|
Opcode = GETOPCODE (VmPtr);
|
|
Operands = GETOPERANDS (VmPtr);
|
|
|
|
//
|
|
// Get operand1 index if present
|
|
//
|
|
Size = 2;
|
|
if (Operands & OPERAND_M_CMPI_INDEX) {
|
|
Index16 = VmReadIndex16 (VmPtr, 2);
|
|
Size += 2;
|
|
} else {
|
|
Index16 = 0;
|
|
}
|
|
//
|
|
// Get operand1 data we're going to compare to
|
|
//
|
|
Op1 = (INT64) VmPtr->R[OPERAND1_REGNUM (Operands)];
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
//
|
|
// Indirect operand1. Fetch 32 or 64-bit value based on compare size.
|
|
//
|
|
if (Opcode & OPCODE_M_CMPI64) {
|
|
Op1 = (INT64) VmReadMem64 (VmPtr, (UINTN) Op1 + Index16);
|
|
} else {
|
|
Op1 = (INT64) VmReadMem32 (VmPtr, (UINTN) Op1 + Index16);
|
|
}
|
|
} else {
|
|
//
|
|
// Better not have been an index with direct. That is, CMPI R1 Index,...
|
|
// is illegal.
|
|
//
|
|
if (Operands & OPERAND_M_CMPI_INDEX) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INSTRUCTION_ENCODING,
|
|
EXCEPTION_FLAG_ERROR,
|
|
VmPtr
|
|
);
|
|
VmPtr->Ip += Size;
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
}
|
|
//
|
|
// Get immediate data -- 16- or 32-bit sign extended
|
|
//
|
|
if (Opcode & OPCODE_M_CMPI32_DATA) {
|
|
Op2 = (INT64) VmReadImmed32 (VmPtr, Size);
|
|
Size += 4;
|
|
} else {
|
|
//
|
|
// 16-bit immediate data. Sign extend always.
|
|
//
|
|
Op2 = (INT64) ((INT16) VmReadImmed16 (VmPtr, Size));
|
|
Size += 2;
|
|
}
|
|
//
|
|
// Now do the compare
|
|
//
|
|
Flag = 0;
|
|
if (Opcode & OPCODE_M_CMPI64) {
|
|
//
|
|
// 64 bit comparison
|
|
//
|
|
switch (Opcode & OPCODE_M_OPCODE) {
|
|
case OPCODE_CMPIEQ:
|
|
if (Op1 == (INT64) Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPILTE:
|
|
if (Op1 <= (INT64) Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPIGTE:
|
|
if (Op1 >= (INT64) Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPIULTE:
|
|
if ((UINT64) Op1 <= (UINT64) ((UINT32) Op2)) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPIUGTE:
|
|
if ((UINT64) Op1 >= (UINT64) ((UINT32) Op2)) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
ASSERT (0);
|
|
}
|
|
} else {
|
|
//
|
|
// 32-bit comparisons
|
|
//
|
|
switch (Opcode & OPCODE_M_OPCODE) {
|
|
case OPCODE_CMPIEQ:
|
|
if ((INT32) Op1 == Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPILTE:
|
|
if ((INT32) Op1 <= Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPIGTE:
|
|
if ((INT32) Op1 >= Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPIULTE:
|
|
if ((UINT32) Op1 <= (UINT32) Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
case OPCODE_CMPIUGTE:
|
|
if ((UINT32) Op1 >= (UINT32) Op2) {
|
|
Flag = 1;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
ASSERT (0);
|
|
}
|
|
}
|
|
//
|
|
// Now set the flag accordingly for the comparison
|
|
//
|
|
if (Flag) {
|
|
VMFLAG_SET (VmPtr, VMFLAGS_CC);
|
|
} else {
|
|
VMFLAG_CLEAR (VmPtr, VMFLAGS_CC);
|
|
}
|
|
//
|
|
// Advance the IP
|
|
//
|
|
VmPtr->Ip += Size;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteNOT (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC NOT instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
~Op2
|
|
|
|
Instruction syntax:
|
|
NOT[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
return ~Op2;
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteNEG (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC NEG instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
Op2 * -1
|
|
|
|
Instruction syntax:
|
|
NEG[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
return ~Op2 + 1;
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteADD (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Execute the EBC ADD instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
Op1 + Op2
|
|
|
|
Instruction syntax:
|
|
ADD[32|64] {@}R1, {@}R2 {Index16}
|
|
|
|
--*/
|
|
{
|
|
return Op1 + Op2;
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteSUB (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC SUB instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
Op1 - Op2
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
SUB[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
if (*VmPtr->Ip & DATAMANIP_M_64) {
|
|
return (UINT64) ((INT64) ((INT64) Op1 - (INT64) Op2));
|
|
} else {
|
|
return (UINT64) ((INT64) ((INT32) Op1 - (INT32) Op2));
|
|
}
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteMUL (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Execute the EBC MUL instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
Op1 * Op2
|
|
|
|
Instruction syntax:
|
|
MUL[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
if (*VmPtr->Ip & DATAMANIP_M_64) {
|
|
return MultS64x64 ((INT64)Op1, (INT64)Op2);
|
|
} else {
|
|
return (UINT64) ((INT64) ((INT32) Op1 * (INT32) Op2));
|
|
}
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteMULU (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC MULU instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
(unsigned)Op1 * (unsigned)Op2
|
|
|
|
Instruction syntax:
|
|
MULU[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
if (*VmPtr->Ip & DATAMANIP_M_64) {
|
|
return MultU64x64 (Op1, Op2);
|
|
} else {
|
|
return (UINT64) ((UINT32) Op1 * (UINT32) Op2);
|
|
}
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteDIV (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Execute the EBC DIV instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
Op1/Op2
|
|
|
|
Instruction syntax:
|
|
DIV[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
INT64 Remainder;
|
|
|
|
//
|
|
// Check for divide-by-0
|
|
//
|
|
if (Op2 == 0) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_DIVIDE_ERROR,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
|
|
return 0;
|
|
} else {
|
|
if (*VmPtr->Ip & DATAMANIP_M_64) {
|
|
return (UINT64) (DivS64x64Remainder (Op1, Op2, &Remainder));
|
|
} else {
|
|
return (UINT64) ((INT64) ((INT32) Op1 / (INT32) Op2));
|
|
}
|
|
}
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteDIVU (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC DIVU instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
(unsigned)Op1 / (unsigned)Op2
|
|
|
|
Instruction syntax:
|
|
DIVU[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
UINT64 Remainder;
|
|
|
|
//
|
|
// Check for divide-by-0
|
|
//
|
|
if (Op2 == 0) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_DIVIDE_ERROR,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
return 0;
|
|
} else {
|
|
//
|
|
// Get the destination register
|
|
//
|
|
if (*VmPtr->Ip & DATAMANIP_M_64) {
|
|
return (UINT64) (DivU64x64Remainder ((INT64)Op1, (INT64)Op2, &Remainder));
|
|
} else {
|
|
return (UINT64) ((UINT32) Op1 / (UINT32) Op2);
|
|
}
|
|
}
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteMOD (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC MOD instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
Op1 MODULUS Op2
|
|
|
|
Instruction syntax:
|
|
MOD[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
INT64 Remainder;
|
|
|
|
//
|
|
// Check for divide-by-0
|
|
//
|
|
if (Op2 == 0) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_DIVIDE_ERROR,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
return 0;
|
|
} else {
|
|
DivS64x64Remainder ((INT64)Op1, (INT64)Op2, &Remainder);
|
|
return Remainder;
|
|
}
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteMODU (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC MODU instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
Op1 UNSIGNED_MODULUS Op2
|
|
|
|
Instruction syntax:
|
|
MODU[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
UINT64 Remainder;
|
|
|
|
//
|
|
// Check for divide-by-0
|
|
//
|
|
if (Op2 == 0) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_DIVIDE_ERROR,
|
|
EXCEPTION_FLAG_FATAL,
|
|
VmPtr
|
|
);
|
|
return 0;
|
|
} else {
|
|
DivU64x64Remainder (Op1, Op2, &Remainder);
|
|
return Remainder;
|
|
}
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteAND (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC AND instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
Op1 AND Op2
|
|
|
|
Instruction syntax:
|
|
AND[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
return Op1 & Op2;
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteOR (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC OR instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
Op1 OR Op2
|
|
|
|
Instruction syntax:
|
|
OR[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
return Op1 | Op2;
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteXOR (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC XOR instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
Op1 XOR Op2
|
|
|
|
Instruction syntax:
|
|
XOR[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
return Op1 ^ Op2;
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteSHL (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Execute the EBC SHL shift left instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
Op1 << Op2
|
|
|
|
Instruction syntax:
|
|
SHL[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
if (*VmPtr->Ip & DATAMANIP_M_64) {
|
|
return LShiftU64 (Op1, (UINTN)Op2);
|
|
} else {
|
|
return (UINT64) ((UINT32) ((UINT32) Op1 << (UINT32) Op2));
|
|
}
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteSHR (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC SHR instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
Op1 >> Op2 (unsigned operands)
|
|
|
|
Instruction syntax:
|
|
SHR[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
if (*VmPtr->Ip & DATAMANIP_M_64) {
|
|
return RShiftU64 (Op1, (UINTN)Op2);
|
|
} else {
|
|
return (UINT64) ((UINT32) Op1 >> (UINT32) Op2);
|
|
}
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteASHR (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC ASHR instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
Op1 >> Op2 (signed)
|
|
|
|
Instruction syntax:
|
|
ASHR[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
--*/
|
|
{
|
|
if (*VmPtr->Ip & DATAMANIP_M_64) {
|
|
return ARShiftU64 (Op1, (UINTN)Op2);
|
|
} else {
|
|
return (UINT64) ((INT64) ((INT32) Op1 >> (UINT32) Op2));
|
|
}
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteEXTNDB (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC EXTNDB instruction to sign-extend a byte value.
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
(INT64)(INT8)Op2
|
|
|
|
Instruction syntax:
|
|
EXTNDB[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
|
|
--*/
|
|
{
|
|
INT8 Data8;
|
|
INT64 Data64;
|
|
//
|
|
// Convert to byte, then return as 64-bit signed value to let compiler
|
|
// sign-extend the value
|
|
//
|
|
Data8 = (INT8) Op2;
|
|
Data64 = (INT64) Data8;
|
|
|
|
return (UINT64) Data64;
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
ExecuteEXTNDW (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC EXTNDW instruction to sign-extend a 16-bit value.
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
(INT64)(INT16)Op2
|
|
|
|
Instruction syntax:
|
|
EXTNDW[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
|
|
--*/
|
|
{
|
|
INT16 Data16;
|
|
INT64 Data64;
|
|
//
|
|
// Convert to word, then return as 64-bit signed value to let compiler
|
|
// sign-extend the value
|
|
//
|
|
Data16 = (INT16) Op2;
|
|
Data64 = (INT64) Data16;
|
|
|
|
return (UINT64) Data64;
|
|
}
|
|
//
|
|
// Execute the EBC EXTNDD instruction.
|
|
//
|
|
// Format: EXTNDD {@}Rx, {@}Ry [Index16|Immed16]
|
|
// EXTNDD Dest, Source
|
|
//
|
|
// Operation: Dest <- SignExtended((DWORD)Source))
|
|
//
|
|
STATIC
|
|
UINT64
|
|
ExecuteEXTNDD (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT64 Op1,
|
|
IN UINT64 Op2
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC EXTNDD instruction to sign-extend a 32-bit value.
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Op1 - Operand 1 from the instruction
|
|
Op2 - Operand 2 from the instruction
|
|
|
|
Returns:
|
|
(INT64)(INT32)Op2
|
|
|
|
Instruction syntax:
|
|
EXTNDD[32|64] {@}R1, {@}R2 {Index16|Immed16}
|
|
|
|
|
|
--*/
|
|
{
|
|
INT32 Data32;
|
|
INT64 Data64;
|
|
//
|
|
// Convert to 32-bit value, then return as 64-bit signed value to let compiler
|
|
// sign-extend the value
|
|
//
|
|
Data32 = (INT32) Op2;
|
|
Data64 = (INT64) Data32;
|
|
|
|
return (UINT64) Data64;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteSignedDataManip (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
{
|
|
//
|
|
// Just call the data manipulation function with a flag indicating this
|
|
// is a signed operation.
|
|
//
|
|
return ExecuteDataManip (VmPtr, TRUE);
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteUnsignedDataManip (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
{
|
|
//
|
|
// Just call the data manipulation function with a flag indicating this
|
|
// is not a signed operation.
|
|
//
|
|
return ExecuteDataManip (VmPtr, FALSE);
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteDataManip (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN BOOLEAN IsSignedOp
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute all the EBC data manipulation instructions.
|
|
Since the EBC data manipulation instructions all have the same basic form,
|
|
they can share the code that does the fetch of operands and the write-back
|
|
of the result. This function performs the fetch of the operands (even if
|
|
both are not needed to be fetched, like NOT instruction), dispatches to the
|
|
appropriate subfunction, then writes back the returned result.
|
|
|
|
Arguments:
|
|
VmPtr - pointer to VM context
|
|
|
|
Returns:
|
|
Standard EBC status
|
|
|
|
Format:
|
|
INSTRUCITON[32|64] {@}R1, {@}R2 {Immed16|Index16}
|
|
|
|
--*/
|
|
{
|
|
UINT8 Opcode;
|
|
INT16 Index16;
|
|
UINT8 Operands;
|
|
UINT8 Size;
|
|
UINT64 Op1;
|
|
UINT64 Op2;
|
|
|
|
//
|
|
// Get opcode and operands
|
|
//
|
|
Opcode = GETOPCODE (VmPtr);
|
|
Operands = GETOPERANDS (VmPtr);
|
|
|
|
//
|
|
// Determine if we have immediate data by the opcode
|
|
//
|
|
if (Opcode & DATAMANIP_M_IMMDATA) {
|
|
//
|
|
// Index16 if Ry is indirect, or Immed16 if Ry direct.
|
|
//
|
|
if (OPERAND2_INDIRECT (Operands)) {
|
|
Index16 = VmReadIndex16 (VmPtr, 2);
|
|
} else {
|
|
Index16 = VmReadImmed16 (VmPtr, 2);
|
|
}
|
|
|
|
Size = 4;
|
|
} else {
|
|
Index16 = 0;
|
|
Size = 2;
|
|
}
|
|
//
|
|
// Now get operand2 (source). It's of format {@}R2 {Index16|Immed16}
|
|
//
|
|
Op2 = (UINT64) VmPtr->R[OPERAND2_REGNUM (Operands)] + Index16;
|
|
if (OPERAND2_INDIRECT (Operands)) {
|
|
//
|
|
// Indirect form: @R2 Index16. Fetch as 32- or 64-bit data
|
|
//
|
|
if (Opcode & DATAMANIP_M_64) {
|
|
Op2 = VmReadMem64 (VmPtr, (UINTN) Op2);
|
|
} else {
|
|
//
|
|
// Read as signed value where appropriate.
|
|
//
|
|
if (IsSignedOp) {
|
|
Op2 = (UINT64) (INT64) ((INT32) VmReadMem32 (VmPtr, (UINTN) Op2));
|
|
} else {
|
|
Op2 = (UINT64) VmReadMem32 (VmPtr, (UINTN) Op2);
|
|
}
|
|
}
|
|
} else {
|
|
if ((Opcode & DATAMANIP_M_64) == 0) {
|
|
if (IsSignedOp) {
|
|
Op2 = (UINT64) (INT64) ((INT32) Op2);
|
|
} else {
|
|
Op2 = (UINT64) ((UINT32) Op2);
|
|
}
|
|
}
|
|
}
|
|
//
|
|
// Get operand1 (destination and sometimes also an actual operand)
|
|
// of form {@}R1
|
|
//
|
|
Op1 = VmPtr->R[OPERAND1_REGNUM (Operands)];
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
if (Opcode & DATAMANIP_M_64) {
|
|
Op1 = VmReadMem64 (VmPtr, (UINTN) Op1);
|
|
} else {
|
|
if (IsSignedOp) {
|
|
Op1 = (UINT64) (INT64) ((INT32) VmReadMem32 (VmPtr, (UINTN) Op1));
|
|
} else {
|
|
Op1 = (UINT64) VmReadMem32 (VmPtr, (UINTN) Op1);
|
|
}
|
|
}
|
|
} else {
|
|
if ((Opcode & DATAMANIP_M_64) == 0) {
|
|
if (IsSignedOp) {
|
|
Op1 = (UINT64) (INT64) ((INT32) Op1);
|
|
} else {
|
|
Op1 = (UINT64) ((UINT32) Op1);
|
|
}
|
|
}
|
|
}
|
|
//
|
|
// Dispatch to the computation function
|
|
//
|
|
if (((Opcode & OPCODE_M_OPCODE) - OPCODE_NOT) >=
|
|
(sizeof (mDataManipDispatchTable) / sizeof (mDataManipDispatchTable[0]))
|
|
) {
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INVALID_OPCODE,
|
|
EXCEPTION_FLAG_ERROR,
|
|
VmPtr
|
|
);
|
|
//
|
|
// Advance and return
|
|
//
|
|
VmPtr->Ip += Size;
|
|
return EFI_UNSUPPORTED;
|
|
} else {
|
|
Op2 = mDataManipDispatchTable[(Opcode & OPCODE_M_OPCODE) - OPCODE_NOT](VmPtr, Op1, Op2);
|
|
}
|
|
//
|
|
// Write back the result.
|
|
//
|
|
if (OPERAND1_INDIRECT (Operands)) {
|
|
Op1 = VmPtr->R[OPERAND1_REGNUM (Operands)];
|
|
if (Opcode & DATAMANIP_M_64) {
|
|
VmWriteMem64 (VmPtr, (UINTN) Op1, Op2);
|
|
} else {
|
|
VmWriteMem32 (VmPtr, (UINTN) Op1, (UINT32) Op2);
|
|
}
|
|
} else {
|
|
//
|
|
// Storage back to a register. Write back, clearing upper bits (as per
|
|
// the specification) if 32-bit operation.
|
|
//
|
|
VmPtr->R[OPERAND1_REGNUM (Operands)] = Op2;
|
|
if ((Opcode & DATAMANIP_M_64) == 0) {
|
|
VmPtr->R[OPERAND1_REGNUM (Operands)] &= 0xFFFFFFFF;
|
|
}
|
|
}
|
|
//
|
|
// Advance the instruction pointer
|
|
//
|
|
VmPtr->Ip += Size;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteLOADSP (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC LOADSP instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
LOADSP SP1, R2
|
|
|
|
--*/
|
|
{
|
|
UINT8 Operands;
|
|
|
|
//
|
|
// Get the operands
|
|
//
|
|
Operands = GETOPERANDS (VmPtr);
|
|
|
|
//
|
|
// Do the operation
|
|
//
|
|
switch (OPERAND1_REGNUM (Operands)) {
|
|
//
|
|
// Set flags
|
|
//
|
|
case 0:
|
|
//
|
|
// Spec states that this instruction will not modify reserved bits in
|
|
// the flags register.
|
|
//
|
|
VmPtr->Flags = (VmPtr->Flags &~VMFLAGS_ALL_VALID) | (VmPtr->R[OPERAND2_REGNUM (Operands)] & VMFLAGS_ALL_VALID);
|
|
break;
|
|
|
|
default:
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INSTRUCTION_ENCODING,
|
|
EXCEPTION_FLAG_WARNING,
|
|
VmPtr
|
|
);
|
|
VmPtr->Ip += 2;
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
VmPtr->Ip += 2;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
ExecuteSTORESP (
|
|
IN VM_CONTEXT *VmPtr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Execute the EBC STORESP instruction
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
|
|
Returns:
|
|
Standard EFI_STATUS
|
|
|
|
Instruction syntax:
|
|
STORESP Rx, FLAGS|IP
|
|
|
|
--*/
|
|
{
|
|
UINT8 Operands;
|
|
|
|
//
|
|
// Get the operands
|
|
//
|
|
Operands = GETOPERANDS (VmPtr);
|
|
|
|
//
|
|
// Do the operation
|
|
//
|
|
switch (OPERAND2_REGNUM (Operands)) {
|
|
//
|
|
// Get flags
|
|
//
|
|
case 0:
|
|
//
|
|
// Retrieve the value in the flags register, then clear reserved bits
|
|
//
|
|
VmPtr->R[OPERAND1_REGNUM (Operands)] = (UINT64) (VmPtr->Flags & VMFLAGS_ALL_VALID);
|
|
break;
|
|
|
|
//
|
|
// Get IP -- address of following instruction
|
|
//
|
|
case 1:
|
|
VmPtr->R[OPERAND1_REGNUM (Operands)] = (UINT64) (UINTN) VmPtr->Ip + 2;
|
|
break;
|
|
|
|
default:
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_INSTRUCTION_ENCODING,
|
|
EXCEPTION_FLAG_WARNING,
|
|
VmPtr
|
|
);
|
|
VmPtr->Ip += 2;
|
|
return EFI_UNSUPPORTED;
|
|
break;
|
|
}
|
|
|
|
VmPtr->Ip += 2;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
INT16
|
|
VmReadIndex16 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 CodeOffset
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Decode a 16-bit index to determine the offset. Given an index value:
|
|
|
|
b15 - sign bit
|
|
b14:12 - number of bits in this index assigned to natural units (=a)
|
|
ba:11 - constant units = C
|
|
b0:a - natural units = N
|
|
|
|
Given this info, the offset can be computed by:
|
|
offset = sign_bit * (C + N * sizeof(UINTN))
|
|
|
|
Max offset is achieved with index = 0x7FFF giving an offset of
|
|
0x27B (32-bit machine) or 0x477 (64-bit machine).
|
|
Min offset is achieved with index =
|
|
|
|
Arguments:
|
|
VmPtr - pointer to VM context
|
|
CodeOffset - offset from IP of the location of the 16-bit index to decode
|
|
|
|
Returns:
|
|
The decoded offset.
|
|
|
|
--*/
|
|
{
|
|
UINT16 Index;
|
|
INT16 Offset;
|
|
INT16 C;
|
|
INT16 N;
|
|
INT16 NBits;
|
|
INT16 Mask;
|
|
|
|
//
|
|
// First read the index from the code stream
|
|
//
|
|
Index = VmReadCode16 (VmPtr, CodeOffset);
|
|
|
|
//
|
|
// Get the mask for N. First get the number of bits from the index.
|
|
//
|
|
NBits = (INT16) ((Index & 0x7000) >> 12);
|
|
|
|
//
|
|
// Scale it for 16-bit indexes
|
|
//
|
|
NBits *= 2;
|
|
|
|
//
|
|
// Now using the number of bits, create a mask.
|
|
//
|
|
Mask = (INT16) ((INT16)~0 << NBits);
|
|
|
|
//
|
|
// Now using the mask, extract N from the lower bits of the index.
|
|
//
|
|
N = (INT16) (Index &~Mask);
|
|
|
|
//
|
|
// Now compute C
|
|
//
|
|
C = (INT16) (((Index &~0xF000) & Mask) >> NBits);
|
|
|
|
Offset = (INT16) (N * sizeof (UINTN) + C);
|
|
|
|
//
|
|
// Now set the sign
|
|
//
|
|
if (Index & 0x8000) {
|
|
//
|
|
// Do it the hard way to work around a bogus compiler warning
|
|
//
|
|
// Offset = -1 * Offset;
|
|
//
|
|
Offset = (INT16) ((INT32) Offset * -1);
|
|
}
|
|
|
|
return Offset;
|
|
}
|
|
|
|
STATIC
|
|
INT32
|
|
VmReadIndex32 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 CodeOffset
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Decode a 32-bit index to determine the offset.
|
|
|
|
Arguments:
|
|
VmPtr - pointer to VM context
|
|
CodeOffset - offset from IP of the location of the 32-bit index to decode
|
|
|
|
Returns:
|
|
Converted index per EBC VM specification
|
|
|
|
--*/
|
|
{
|
|
UINT32 Index;
|
|
INT32 Offset;
|
|
INT32 C;
|
|
INT32 N;
|
|
INT32 NBits;
|
|
INT32 Mask;
|
|
|
|
Index = VmReadImmed32 (VmPtr, CodeOffset);
|
|
|
|
//
|
|
// Get the mask for N. First get the number of bits from the index.
|
|
//
|
|
NBits = (Index & 0x70000000) >> 28;
|
|
|
|
//
|
|
// Scale it for 32-bit indexes
|
|
//
|
|
NBits *= 4;
|
|
|
|
//
|
|
// Now using the number of bits, create a mask.
|
|
//
|
|
Mask = (INT32)~0 << NBits;
|
|
|
|
//
|
|
// Now using the mask, extract N from the lower bits of the index.
|
|
//
|
|
N = Index &~Mask;
|
|
|
|
//
|
|
// Now compute C
|
|
//
|
|
C = ((Index &~0xF0000000) & Mask) >> NBits;
|
|
|
|
Offset = N * sizeof (UINTN) + C;
|
|
|
|
//
|
|
// Now set the sign
|
|
//
|
|
if (Index & 0x80000000) {
|
|
Offset = Offset * -1;
|
|
}
|
|
|
|
return Offset;
|
|
}
|
|
|
|
STATIC
|
|
INT64
|
|
VmReadIndex64 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 CodeOffset
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Decode a 64-bit index to determine the offset.
|
|
|
|
Arguments:
|
|
VmPtr - pointer to VM context
|
|
CodeOffset - offset from IP of the location of the 64-bit index to decode
|
|
|
|
Returns:
|
|
Converted index per EBC VM specification
|
|
|
|
--*/
|
|
{
|
|
UINT64 Index;
|
|
INT64 Offset;
|
|
INT64 C;
|
|
INT64 N;
|
|
INT64 NBits;
|
|
INT64 Mask;
|
|
|
|
Index = VmReadCode64 (VmPtr, CodeOffset);
|
|
|
|
//
|
|
// Get the mask for N. First get the number of bits from the index.
|
|
//
|
|
NBits = RShiftU64 ((Index & 0x7000000000000000ULL), 60);
|
|
|
|
//
|
|
// Scale it for 64-bit indexes (multiply by 8 by shifting left 3)
|
|
//
|
|
NBits = LShiftU64 ((UINT64)NBits, 3);
|
|
|
|
//
|
|
// Now using the number of bits, create a mask.
|
|
//
|
|
Mask = (LShiftU64 ((UINT64)~0, (UINTN)NBits));
|
|
|
|
//
|
|
// Now using the mask, extract N from the lower bits of the index.
|
|
//
|
|
N = Index &~Mask;
|
|
|
|
//
|
|
// Now compute C
|
|
//
|
|
C = ARShiftU64 (((Index &~0xF000000000000000ULL) & Mask), (UINTN)NBits);
|
|
|
|
Offset = MultU64x64 (N, sizeof (UINTN)) + C;
|
|
|
|
//
|
|
// Now set the sign
|
|
//
|
|
if (Index & 0x8000000000000000ULL) {
|
|
Offset = MultS64x64 (Offset, -1);
|
|
}
|
|
|
|
return Offset;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
VmWriteMem8 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr,
|
|
IN UINT8 Data
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
The following VmWriteMem? routines are called by the EBC data
|
|
movement instructions that write to memory. Since these writes
|
|
may be to the stack, which looks like (high address on top) this,
|
|
|
|
[EBC entry point arguments]
|
|
[VM stack]
|
|
[EBC stack]
|
|
|
|
we need to detect all attempts to write to the EBC entry point argument
|
|
stack area and adjust the address (which will initially point into the
|
|
VM stack) to point into the EBC entry point arguments.
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Addr - adddress to write to
|
|
Data - value to write to Addr
|
|
|
|
Returns:
|
|
Standard EFI_STATUS
|
|
|
|
--*/
|
|
{
|
|
//
|
|
// Convert the address if it's in the stack gap
|
|
//
|
|
Addr = ConvertStackAddr (VmPtr, Addr);
|
|
*(UINT8 *) Addr = Data;
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
VmWriteMem16 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr,
|
|
IN UINT16 Data
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
|
|
//
|
|
// Convert the address if it's in the stack gap
|
|
//
|
|
Addr = ConvertStackAddr (VmPtr, Addr);
|
|
|
|
//
|
|
// Do a simple write if aligned
|
|
//
|
|
if (IS_ALIGNED (Addr, sizeof (UINT16))) {
|
|
*(UINT16 *) Addr = Data;
|
|
} else {
|
|
//
|
|
// Write as two bytes
|
|
//
|
|
MemoryFence ();
|
|
if ((Status = VmWriteMem8 (VmPtr, Addr, (UINT8) Data)) != EFI_SUCCESS) {
|
|
return Status;
|
|
}
|
|
|
|
MemoryFence ();
|
|
if ((Status = VmWriteMem8 (VmPtr, Addr + 1, (UINT8) (Data >> 8))) != EFI_SUCCESS) {
|
|
return Status;
|
|
}
|
|
|
|
MemoryFence ();
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
STATIC
|
|
EFI_STATUS
|
|
VmWriteMem32 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr,
|
|
IN UINT32 Data
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
|
|
//
|
|
// Convert the address if it's in the stack gap
|
|
//
|
|
Addr = ConvertStackAddr (VmPtr, Addr);
|
|
|
|
//
|
|
// Do a simple write if aligned
|
|
//
|
|
if (IS_ALIGNED (Addr, sizeof (UINT32))) {
|
|
*(UINT32 *) Addr = Data;
|
|
} else {
|
|
//
|
|
// Write as two words
|
|
//
|
|
MemoryFence ();
|
|
if ((Status = VmWriteMem16 (VmPtr, Addr, (UINT16) Data)) != EFI_SUCCESS) {
|
|
return Status;
|
|
}
|
|
|
|
MemoryFence ();
|
|
if ((Status = VmWriteMem16 (VmPtr, Addr + sizeof (UINT16), (UINT16) (Data >> 16))) != EFI_SUCCESS) {
|
|
return Status;
|
|
}
|
|
|
|
MemoryFence ();
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
EFI_STATUS
|
|
VmWriteMem64 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr,
|
|
IN UINT64 Data
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
UINT32 Data32;
|
|
|
|
//
|
|
// Convert the address if it's in the stack gap
|
|
//
|
|
Addr = ConvertStackAddr (VmPtr, Addr);
|
|
|
|
//
|
|
// Do a simple write if aligned
|
|
//
|
|
if (IS_ALIGNED (Addr, sizeof (UINT64))) {
|
|
*(UINT64 *) Addr = Data;
|
|
} else {
|
|
//
|
|
// Write as two 32-bit words
|
|
//
|
|
MemoryFence ();
|
|
if ((Status = VmWriteMem32 (VmPtr, Addr, (UINT32) Data)) != EFI_SUCCESS) {
|
|
return Status;
|
|
}
|
|
|
|
MemoryFence ();
|
|
Data32 = (UINT32) (((UINT32 *) &Data)[1]);
|
|
if ((Status = VmWriteMem32 (VmPtr, Addr + sizeof (UINT32), Data32)) != EFI_SUCCESS) {
|
|
return Status;
|
|
}
|
|
|
|
MemoryFence ();
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
EFI_STATUS
|
|
VmWriteMemN (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr,
|
|
IN UINTN Data
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
UINTN Index;
|
|
|
|
Status = EFI_SUCCESS;
|
|
|
|
//
|
|
// Convert the address if it's in the stack gap
|
|
//
|
|
Addr = ConvertStackAddr (VmPtr, Addr);
|
|
|
|
//
|
|
// Do a simple write if aligned
|
|
//
|
|
if (IS_ALIGNED (Addr, sizeof (UINTN))) {
|
|
*(UINTN *) Addr = Data;
|
|
} else {
|
|
for (Index = 0; Index < sizeof (UINTN) / sizeof (UINT32); Index++) {
|
|
MemoryFence ();
|
|
Status = VmWriteMem32 (VmPtr, Addr + Index * sizeof (UINT32), (UINT32) Data);
|
|
MemoryFence ();
|
|
Data = (UINTN)RShiftU64 ((UINT64)Data, 32);
|
|
}
|
|
}
|
|
|
|
return Status;
|
|
}
|
|
|
|
STATIC
|
|
INT8
|
|
VmReadImmed8 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 Offset
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
The following VmReadImmed routines are called by the EBC execute
|
|
functions to read EBC immediate values from the code stream.
|
|
Since we can't assume alignment, each tries to read in the biggest
|
|
chunks size available, but will revert to smaller reads if necessary.
|
|
|
|
Arguments:
|
|
VmPtr - pointer to a VM context
|
|
Offset - offset from IP of the code bytes to read.
|
|
|
|
Returns:
|
|
Signed data of the requested size from the specified address.
|
|
|
|
--*/
|
|
{
|
|
//
|
|
// Simply return the data in flat memory space
|
|
//
|
|
return * (INT8 *) (VmPtr->Ip + Offset);
|
|
}
|
|
|
|
STATIC
|
|
INT16
|
|
VmReadImmed16 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 Offset
|
|
)
|
|
{
|
|
//
|
|
// Read direct if aligned
|
|
//
|
|
if (IS_ALIGNED ((UINTN) VmPtr->Ip + Offset, sizeof (INT16))) {
|
|
return * (INT16 *) (VmPtr->Ip + Offset);
|
|
} else {
|
|
//
|
|
// All code word reads should be aligned
|
|
//
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_ALIGNMENT_CHECK,
|
|
EXCEPTION_FLAG_WARNING,
|
|
VmPtr
|
|
);
|
|
}
|
|
//
|
|
// Return unaligned data
|
|
//
|
|
return (INT16) (*(UINT8 *) (VmPtr->Ip + Offset) + (*(UINT8 *) (VmPtr->Ip + Offset + 1) << 8));
|
|
}
|
|
|
|
STATIC
|
|
INT32
|
|
VmReadImmed32 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 Offset
|
|
)
|
|
{
|
|
UINT32 Data;
|
|
|
|
//
|
|
// Read direct if aligned
|
|
//
|
|
if (IS_ALIGNED ((UINTN) VmPtr->Ip + Offset, sizeof (UINT32))) {
|
|
return * (INT32 *) (VmPtr->Ip + Offset);
|
|
}
|
|
//
|
|
// Return unaligned data
|
|
//
|
|
Data = (UINT32) VmReadCode16 (VmPtr, Offset);
|
|
Data |= (UINT32) (VmReadCode16 (VmPtr, Offset + 2) << 16);
|
|
return Data;
|
|
}
|
|
|
|
STATIC
|
|
INT64
|
|
VmReadImmed64 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 Offset
|
|
)
|
|
{
|
|
UINT64 Data64;
|
|
UINT32 Data32;
|
|
UINT8 *Ptr;
|
|
|
|
//
|
|
// Read direct if aligned
|
|
//
|
|
if (IS_ALIGNED ((UINTN) VmPtr->Ip + Offset, sizeof (UINT64))) {
|
|
return * (UINT64 *) (VmPtr->Ip + Offset);
|
|
}
|
|
//
|
|
// Return unaligned data.
|
|
//
|
|
Ptr = (UINT8 *) &Data64;
|
|
Data32 = VmReadCode32 (VmPtr, Offset);
|
|
*(UINT32 *) Ptr = Data32;
|
|
Ptr += sizeof (Data32);
|
|
Data32 = VmReadCode32 (VmPtr, Offset + sizeof (UINT32));
|
|
*(UINT32 *) Ptr = Data32;
|
|
return Data64;
|
|
}
|
|
|
|
STATIC
|
|
UINT16
|
|
VmReadCode16 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 Offset
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
The following VmReadCode() routines provide the ability to read raw
|
|
unsigned data from the code stream.
|
|
|
|
Arguments:
|
|
VmPtr - pointer to VM context
|
|
Offset - offset from current IP to the raw data to read.
|
|
|
|
Returns:
|
|
The raw unsigned 16-bit value from the code stream.
|
|
|
|
--*/
|
|
{
|
|
//
|
|
// Read direct if aligned
|
|
//
|
|
if (IS_ALIGNED ((UINTN) VmPtr->Ip + Offset, sizeof (UINT16))) {
|
|
return * (UINT16 *) (VmPtr->Ip + Offset);
|
|
} else {
|
|
//
|
|
// All code word reads should be aligned
|
|
//
|
|
EbcDebugSignalException (
|
|
EXCEPT_EBC_ALIGNMENT_CHECK,
|
|
EXCEPTION_FLAG_WARNING,
|
|
VmPtr
|
|
);
|
|
}
|
|
//
|
|
// Return unaligned data
|
|
//
|
|
return (UINT16) (*(UINT8 *) (VmPtr->Ip + Offset) + (*(UINT8 *) (VmPtr->Ip + Offset + 1) << 8));
|
|
}
|
|
|
|
STATIC
|
|
UINT32
|
|
VmReadCode32 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 Offset
|
|
)
|
|
{
|
|
UINT32 Data;
|
|
//
|
|
// Read direct if aligned
|
|
//
|
|
if (IS_ALIGNED ((UINTN) VmPtr->Ip + Offset, sizeof (UINT32))) {
|
|
return * (UINT32 *) (VmPtr->Ip + Offset);
|
|
}
|
|
//
|
|
// Return unaligned data
|
|
//
|
|
Data = (UINT32) VmReadCode16 (VmPtr, Offset);
|
|
Data |= (VmReadCode16 (VmPtr, Offset + 2) << 16);
|
|
return Data;
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
VmReadCode64 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINT32 Offset
|
|
)
|
|
{
|
|
UINT64 Data64;
|
|
UINT32 Data32;
|
|
UINT8 *Ptr;
|
|
|
|
//
|
|
// Read direct if aligned
|
|
//
|
|
if (IS_ALIGNED ((UINTN) VmPtr->Ip + Offset, sizeof (UINT64))) {
|
|
return * (UINT64 *) (VmPtr->Ip + Offset);
|
|
}
|
|
//
|
|
// Return unaligned data.
|
|
//
|
|
Ptr = (UINT8 *) &Data64;
|
|
Data32 = VmReadCode32 (VmPtr, Offset);
|
|
*(UINT32 *) Ptr = Data32;
|
|
Ptr += sizeof (Data32);
|
|
Data32 = VmReadCode32 (VmPtr, Offset + sizeof (UINT32));
|
|
*(UINT32 *) Ptr = Data32;
|
|
return Data64;
|
|
}
|
|
|
|
STATIC
|
|
UINT8
|
|
VmReadMem8 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr
|
|
)
|
|
{
|
|
//
|
|
// Convert the address if it's in the stack gap
|
|
//
|
|
Addr = ConvertStackAddr (VmPtr, Addr);
|
|
//
|
|
// Simply return the data in flat memory space
|
|
//
|
|
return * (UINT8 *) Addr;
|
|
}
|
|
|
|
STATIC
|
|
UINT16
|
|
VmReadMem16 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr
|
|
)
|
|
{
|
|
//
|
|
// Convert the address if it's in the stack gap
|
|
//
|
|
Addr = ConvertStackAddr (VmPtr, Addr);
|
|
//
|
|
// Read direct if aligned
|
|
//
|
|
if (IS_ALIGNED (Addr, sizeof (UINT16))) {
|
|
return * (UINT16 *) Addr;
|
|
}
|
|
//
|
|
// Return unaligned data
|
|
//
|
|
return (UINT16) (*(UINT8 *) Addr + (*(UINT8 *) (Addr + 1) << 8));
|
|
}
|
|
|
|
STATIC
|
|
UINT32
|
|
VmReadMem32 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr
|
|
)
|
|
{
|
|
UINT32 Data;
|
|
|
|
//
|
|
// Convert the address if it's in the stack gap
|
|
//
|
|
Addr = ConvertStackAddr (VmPtr, Addr);
|
|
//
|
|
// Read direct if aligned
|
|
//
|
|
if (IS_ALIGNED (Addr, sizeof (UINT32))) {
|
|
return * (UINT32 *) Addr;
|
|
}
|
|
//
|
|
// Return unaligned data
|
|
//
|
|
Data = (UINT32) VmReadMem16 (VmPtr, Addr);
|
|
Data |= (VmReadMem16 (VmPtr, Addr + 2) << 16);
|
|
return Data;
|
|
}
|
|
|
|
STATIC
|
|
UINT64
|
|
VmReadMem64 (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr
|
|
)
|
|
{
|
|
UINT64 Data;
|
|
UINT32 Data32;
|
|
|
|
//
|
|
// Convert the address if it's in the stack gap
|
|
//
|
|
Addr = ConvertStackAddr (VmPtr, Addr);
|
|
|
|
//
|
|
// Read direct if aligned
|
|
//
|
|
if (IS_ALIGNED (Addr, sizeof (UINT64))) {
|
|
return * (UINT64 *) Addr;
|
|
}
|
|
//
|
|
// Return unaligned data. Assume little endian.
|
|
//
|
|
Data = (UINT64) VmReadMem32 (VmPtr, Addr);
|
|
Data32 = VmReadMem32 (VmPtr, Addr + sizeof (UINT32));
|
|
*(UINT32 *) ((UINT32 *) &Data + 1) = Data32;
|
|
return Data;
|
|
}
|
|
|
|
STATIC
|
|
UINTN
|
|
ConvertStackAddr (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Given an address that EBC is going to read from or write to, return
|
|
an appropriate address that accounts for a gap in the stack.
|
|
|
|
The stack for this application looks like this (high addr on top)
|
|
[EBC entry point arguments]
|
|
[VM stack]
|
|
[EBC stack]
|
|
|
|
The EBC assumes that its arguments are at the top of its stack, which
|
|
is where the VM stack is really. Therefore if the EBC does memory
|
|
accesses into the VM stack area, then we need to convert the address
|
|
to point to the EBC entry point arguments area. Do this here.
|
|
|
|
Arguments:
|
|
|
|
VmPtr - pointer to VM context
|
|
Addr - address of interest
|
|
|
|
Returns:
|
|
|
|
The unchanged address if it's not in the VM stack region. Otherwise,
|
|
adjust for the stack gap and return the modified address.
|
|
|
|
--*/
|
|
{
|
|
ASSERT(((Addr < VmPtr->LowStackTop) || (Addr > VmPtr->HighStackBottom)));
|
|
return Addr;
|
|
}
|
|
|
|
STATIC
|
|
UINTN
|
|
VmReadMemN (
|
|
IN VM_CONTEXT *VmPtr,
|
|
IN UINTN Addr
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
Read a natural value from memory. May or may not be aligned.
|
|
|
|
Arguments:
|
|
VmPtr - current VM context
|
|
Addr - the address to read from
|
|
|
|
Returns:
|
|
The natural value at address Addr.
|
|
|
|
--*/
|
|
{
|
|
UINTN Data;
|
|
volatile UINT32 Size;
|
|
UINT8 *FromPtr;
|
|
UINT8 *ToPtr;
|
|
//
|
|
// Convert the address if it's in the stack gap
|
|
//
|
|
Addr = ConvertStackAddr (VmPtr, Addr);
|
|
//
|
|
// Read direct if aligned
|
|
//
|
|
if (IS_ALIGNED (Addr, sizeof (UINTN))) {
|
|
return * (UINTN *) Addr;
|
|
}
|
|
//
|
|
// Return unaligned data
|
|
//
|
|
Data = 0;
|
|
FromPtr = (UINT8 *) Addr;
|
|
ToPtr = (UINT8 *) &Data;
|
|
|
|
for (Size = 0; Size < sizeof (Data); Size++) {
|
|
*ToPtr = *FromPtr;
|
|
ToPtr++;
|
|
FromPtr++;
|
|
}
|
|
|
|
return Data;
|
|
}
|
|
|
|
UINT64
|
|
GetVmVersion (
|
|
VOID
|
|
)
|
|
{
|
|
return (UINT64) (((VM_MAJOR_VERSION & 0xFFFF) << 16) | ((VM_MINOR_VERSION & 0xFFFF)));
|
|
}
|