From c3b6ccf65b21e7f3abda5317b16cb3105af3f272 Mon Sep 17 00:00:00 2001 From: Michael Brown Date: Wed, 16 Jul 2014 01:25:37 +0100 Subject: [efi] Allow for interception of boot services calls by loaded image When building with DEBUG=efi_wrap, print details of calls made by the loaded image to selected boot services functions. Signed-off-by: Michael Brown --- src/image/efi_image.c | 4 ++++ 1 file changed, 4 insertions(+) (limited to 'src/image') diff --git a/src/image/efi_image.c b/src/image/efi_image.c index 5de915b0..9c366bb2 100644 --- a/src/image/efi_image.c +++ b/src/image/efi_image.c @@ -28,6 +28,7 @@ FILE_LICENCE ( GPL2_OR_LATER ); #include #include #include +#include #include #include #include @@ -222,6 +223,9 @@ static int efi_image_exec ( struct image *image ) { /* Release network devices for use via SNP */ efi_snp_release(); + /* Wrap calls made by the loaded image (for debugging) */ + efi_wrap ( handle, loaded.image ); + /* Start the image */ if ( ( efirc = bs->StartImage ( handle, NULL, NULL ) ) != 0 ) { rc = -EEFI_START ( efirc ); -- cgit v1.2.3-55-g7522