[coreboot-gerrit] New patch to review for coreboot: arm64: Add stack dump to exception handler
Julius Werner (jwerner@chromium.org)
gerrit at coreboot.org
Sat May 21 03:16:34 CEST 2016
Julius Werner (jwerner at chromium.org) just uploaded a new patch set to gerrit, which you can find at https://review.coreboot.org/14931
-gerrit
commit 86f3ba0c07c2ec9aef61282dc0ec7d50ce69b956
Author: Julius Werner <jwerner at chromium.org>
Date: Fri May 20 18:06:22 2016 -0700
arm64: Add stack dump to exception handler
Some exceptions (like from calling a NULL function pointer) are easier
to narrow down with a dump of the call stack. Let's take a page out of
ARM32's book and add that feature to ARM64 as well. Also changed the
output format to two register columns, to make it easier to fit a whole
exception dump on one screen.
Applied to both coreboot and libpayload and synced the output format
between both back up.
Change-Id: I19768d13d8fa8adb84f0edda2af12f20508eb2db
Signed-off-by: Julius Werner <jwerner at chromium.org>
---
payloads/libpayload/arch/arm64/exception.c | 29 +++++++++++++++++++----
src/arch/arm64/armv8/exception.c | 37 ++++++++++++++++++++++--------
2 files changed, 52 insertions(+), 14 deletions(-)
diff --git a/payloads/libpayload/arch/arm64/exception.c b/payloads/libpayload/arch/arm64/exception.c
index 2330a98..a9901e1 100644
--- a/payloads/libpayload/arch/arm64/exception.c
+++ b/payloads/libpayload/arch/arm64/exception.c
@@ -60,15 +60,35 @@ static struct exception_handler_info exceptions[EXC_COUNT] = {
[EXC_SERROR_ELX_32] = {"_serror_elx_32"},
};
+static void dump_stack(uintptr_t addr, size_t bytes)
+{
+ int i, j;
+ const int line = 8;
+ uint64_t *ptr = (uint64_t *)(addr & ~(line * sizeof(*ptr) - 1));
+
+ printf("Dumping stack:\n");
+ for (i = bytes / sizeof(*ptr); i >= 0; i -= line) {
+ printf("%p: ", ptr + i);
+ for (j = i; j < i + line; j++)
+ printf("%016llx ", *(ptr + j));
+ printf("\n");
+ }
+}
+
static void print_regs(struct exception_state *state)
{
int i;
- printf("ELR = 0x%016llx\n",state->elr);
- printf("ESR = 0x%08llx\n",state->esr);
- for (i = 0; i < 31; i++) {
- printf("X%02d = 0x%016llx\n", i, state->regs[i]);
+ printf("ELR = 0x%016llx ESR = 0x%08llx\n",
+ state->elr, state->esr);
+ printf("FAR = 0x%016llx SPSR = 0x%08x\n",
+ raw_read_far_current(), raw_read_spsr_current());
+ for (i = 0; i < 30; i += 2) {
+ printf("X%02d = 0x%016llx X%02d = 0x%016llx\n",
+ i, state->regs[i], i + 1, state->regs[i + 1]);
}
+ printf("X30 = 0x%016llx SP = 0x%016llx\n",
+ state->regs[30], raw_read_sp_el0());
}
void exception_dispatch(struct exception_state *state, int idx);
@@ -89,6 +109,7 @@ void exception_dispatch(struct exception_state *state, int idx)
printf("exception _not_used.\n");
}
print_regs(state);
+ dump_stack(raw_read_sp_el0() - 16, 512);
if (test_exc) {
state->elr += 4;
diff --git a/src/arch/arm64/armv8/exception.c b/src/arch/arm64/armv8/exception.c
index b872a55..52e9e31 100644
--- a/src/arch/arm64/armv8/exception.c
+++ b/src/arch/arm64/armv8/exception.c
@@ -57,22 +57,38 @@ static const char *exception_names[NUM_EXC_VIDS] = {
[EXC_VID_LOW32_SERR] = "_serror_elx_32"
};
+static void dump_stack(uintptr_t addr, size_t bytes)
+{
+ int i, j;
+ const int line = 8;
+ uint64_t *ptr = (uint64_t *)(addr & ~(line * sizeof(*ptr) - 1));
+
+ printk(BIOS_DEBUG, "Dumping stack:\n");
+ for (i = bytes / sizeof(*ptr); i >= 0; i -= line) {
+ printk(BIOS_DEBUG, "%p: ", ptr + i);
+ for (j = i; j < i + line; j++)
+ printk(BIOS_DEBUG, "%016llx ", *(ptr + j));
+ printk(BIOS_DEBUG, "\n");
+ }
+}
+
static void print_regs(struct exc_state *exc_state)
{
int i;
struct elx_state *elx = &exc_state->elx;
struct regs *regs = &exc_state->regs;
- uint64_t elx_esr = raw_read_esr_current();
- uint64_t elx_far = raw_read_far_current();
-
- printk(BIOS_DEBUG, "ELR = 0x%016llx\n", elx->elr);
- printk(BIOS_DEBUG, "ESR = 0x%016llx\n", elx_esr);
- printk(BIOS_DEBUG, "SPSR = 0x%08llx\n", elx->spsr);
- printk(BIOS_DEBUG, "FAR = 0x%016llx\n", elx_far);
- printk(BIOS_DEBUG, "SP = 0x%016llx\n", regs->sp);
- for (i = X0_INDEX; i < XMAX_INDEX; i++)
- printk(BIOS_DEBUG, "X%02d = 0x%016llx\n", i, regs->x[i]);
+ printk(BIOS_DEBUG, "ELR = 0x%016llx ESR = 0x%08x\n",
+ elx->elr, raw_read_esr_current());
+ printk(BIOS_DEBUG, "FAR = 0x%016llx SPSR = 0x%08x\n",
+ raw_read_far_current(), raw_read_spsr_current());
+ for (i = 0; i < 30; i += 2) {
+ printk(BIOS_DEBUG,
+ "X%02d = 0x%016llx X%02d = 0x%016llx\n",
+ i, regs->x[i], i + 1, regs->x[i + 1]);
+ }
+ printk(BIOS_DEBUG, "X30 = 0x%016llx SP = 0x%016llx\n",
+ regs->x[30], regs->sp);
}
@@ -119,6 +135,7 @@ static void print_exception_info(struct exc_state *state, uint64_t idx)
printk(BIOS_DEBUG, "exception %s\n", exception_names[idx]);
print_regs(state);
+ dump_stack(state->regs.sp, 512);
}
static void print_exception_and_die(struct exc_state *state, uint64_t idx)
More information about the coreboot-gerrit
mailing list